mirror of
https://github.com/SebastianStork/nixos-config.git
synced 2026-01-21 15:11:34 +01:00
Compare commits
3 commits
ac3b43a952
...
653ebd2c85
| Author | SHA1 | Date | |
|---|---|---|---|
| 653ebd2c85 | |||
| bd196f1f27 | |||
| df8682f4d0 |
3 changed files with 61 additions and 51 deletions
|
|
@ -29,12 +29,17 @@ in
|
||||||
|> lib.map (node: "\"${node.name}.${nebulaCfg.network.domain}. A ${node.address}\"");
|
|> lib.map (node: "\"${node.name}.${nebulaCfg.network.domain}. A ${node.address}\"");
|
||||||
};
|
};
|
||||||
|
|
||||||
forward-zone = lib.singleton {
|
forward-zone =
|
||||||
|
(lib.singleton {
|
||||||
name = ".";
|
name = ".";
|
||||||
forward-addr = [
|
forward-addr = [
|
||||||
"1.1.1.1"
|
"1.1.1.1"
|
||||||
"8.8.8.8"
|
"8.8.8.8"
|
||||||
];
|
];
|
||||||
|
})
|
||||||
|
++ lib.optional config.custom.services.tailscale.enable {
|
||||||
|
name = "${config.custom.services.tailscale.domain}";
|
||||||
|
forward-addr = [ "100.100.100.100" ];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
||||||
|
|
@ -51,8 +51,8 @@ in
|
||||||
config = lib.mkIf cfg.enable {
|
config = lib.mkIf cfg.enable {
|
||||||
assertions = [
|
assertions = [
|
||||||
{
|
{
|
||||||
assertion = config.custom.services.tailscale.enable;
|
assertion = config.custom.services.nebula.node.enable;
|
||||||
message = "Syncthing requires tailscale";
|
message = "Syncthing requires nebula";
|
||||||
}
|
}
|
||||||
{
|
{
|
||||||
assertion = cfg.isServer -> (cfg.gui.domain != null);
|
assertion = cfg.isServer -> (cfg.gui.domain != null);
|
||||||
|
|
@ -86,7 +86,8 @@ in
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
services.syncthing = {
|
services = {
|
||||||
|
syncthing = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
|
||||||
user = lib.mkIf (!cfg.isServer) "seb";
|
user = lib.mkIf (!cfg.isServer) "seb";
|
||||||
|
|
@ -105,9 +106,11 @@ in
|
||||||
|> lib.filterAttrs (name: _: name != config.networking.hostName)
|
|> lib.filterAttrs (name: _: name != config.networking.hostName)
|
||||||
|> lib.filterAttrs (_: value: value.config.custom.services.syncthing.enable)
|
|> lib.filterAttrs (_: value: value.config.custom.services.syncthing.enable)
|
||||||
|> lib.mapAttrs (
|
|> lib.mapAttrs (
|
||||||
name: value: {
|
_: value: {
|
||||||
id = value.config.custom.services.syncthing.deviceId;
|
id = value.config.custom.services.syncthing.deviceId;
|
||||||
addresses = [ "tcp://${name}.${config.custom.services.tailscale.domain}:${toString cfg.syncPort}" ];
|
addresses = [
|
||||||
|
"tcp://${value.config.custom.services.nebula.node.address}:${toString cfg.syncPort}"
|
||||||
|
];
|
||||||
}
|
}
|
||||||
);
|
);
|
||||||
|
|
||||||
|
|
@ -119,7 +122,7 @@ in
|
||||||
});
|
});
|
||||||
|
|
||||||
options = {
|
options = {
|
||||||
listenAddress = "tcp://0.0.0.0:${toString cfg.syncPort}";
|
listenAddress = "tcp://${config.custom.services.nebula.node.address}:${toString cfg.syncPort}";
|
||||||
globalAnnounceEnabled = false;
|
globalAnnounceEnabled = false;
|
||||||
localAnnounceEnabled = false;
|
localAnnounceEnabled = false;
|
||||||
relaysEnabled = false;
|
relaysEnabled = false;
|
||||||
|
|
@ -130,6 +133,16 @@ in
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
nebula.networks.mesh.firewall.inbound =
|
||||||
|
config.services.syncthing.settings.devices
|
||||||
|
|> lib.attrNames
|
||||||
|
|> lib.map (name: {
|
||||||
|
port = cfg.syncPort;
|
||||||
|
proto = "tcp";
|
||||||
|
host = name;
|
||||||
|
});
|
||||||
|
};
|
||||||
|
|
||||||
custom = {
|
custom = {
|
||||||
services = {
|
services = {
|
||||||
caddy.virtualHosts.${cfg.gui.domain}.port = lib.mkIf (cfg.gui.domain != null) cfg.gui.port;
|
caddy.virtualHosts.${cfg.gui.domain}.port = lib.mkIf (cfg.gui.domain != null) cfg.gui.port;
|
||||||
|
|
|
||||||
|
|
@ -35,13 +35,5 @@ in
|
||||||
systemd.services.tailscaled-set.after = [ "tailscaled-autoconnect.service" ];
|
systemd.services.tailscaled-set.after = [ "tailscaled-autoconnect.service" ];
|
||||||
|
|
||||||
custom.persistence.directories = [ "/var/lib/tailscale" ];
|
custom.persistence.directories = [ "/var/lib/tailscale" ];
|
||||||
|
|
||||||
# Disable search domain when nebula is in use
|
|
||||||
systemd.network.networks."50-tailscale" = lib.mkIf config.custom.services.nebula.node.enable {
|
|
||||||
matchConfig.Name = config.services.tailscale.interfaceName;
|
|
||||||
linkConfig.Unmanaged = lib.mkForce false;
|
|
||||||
dns = [ "100.100.100.100" ];
|
|
||||||
domains = [ ];
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue