Add tailscale firewall bypass option
This commit is contained in:
parent
0ceb61d32c
commit
97318f33f5
1 changed files with 27 additions and 2 deletions
|
@ -165,6 +165,32 @@ let
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
|
tailscale =
|
||||||
|
{ config, ... }:
|
||||||
|
{
|
||||||
|
options.common.linux = {
|
||||||
|
tailscale = {
|
||||||
|
firewall.allowPorts = mkOption {
|
||||||
|
type = types.listOf types.port;
|
||||||
|
description = "List of ports to allow tailscale to pass through";
|
||||||
|
default = [ ];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
config =
|
||||||
|
let
|
||||||
|
cfg = config.common.linux.tailscale;
|
||||||
|
in
|
||||||
|
{
|
||||||
|
# Enable tailscale
|
||||||
|
services.tailscale.enable = true;
|
||||||
|
networking.firewall.interfaces."tailscale0" = {
|
||||||
|
allowedUDPPorts = cfg.firewall.allowPorts;
|
||||||
|
allowedTCPPorts = cfg.firewall.allowPorts;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
imports = with modules; [
|
imports = with modules; [
|
||||||
|
@ -180,6 +206,7 @@ in
|
||||||
accounts
|
accounts
|
||||||
rt-audio
|
rt-audio
|
||||||
nix-ld
|
nix-ld
|
||||||
|
tailscale
|
||||||
];
|
];
|
||||||
|
|
||||||
options.common.linux = {
|
options.common.linux = {
|
||||||
|
@ -330,8 +357,6 @@ in
|
||||||
# Firewall: only open to SSH now
|
# Firewall: only open to SSH now
|
||||||
networking.firewall.allowedTCPPorts = [ 22 ];
|
networking.firewall.allowedTCPPorts = [ 22 ];
|
||||||
networking.firewall.allowedUDPPorts = [ 22 ];
|
networking.firewall.allowedUDPPorts = [ 22 ];
|
||||||
# Enable tailscale
|
|
||||||
services.tailscale.enable = true;
|
|
||||||
|
|
||||||
## Time and Region
|
## Time and Region
|
||||||
time.timeZone = lib.mkDefault "Europe/Zurich";
|
time.timeZone = lib.mkDefault "Europe/Zurich";
|
||||||
|
|
Loading…
Add table
Reference in a new issue