nix-configs/nixos-modules/services/tailscale-openvpn.nix
2024-04-02 18:34:57 +02:00

85 lines
2.9 KiB
Nix

{ options, config, lib, pkgs, ... }:
with lib;
{
options.ragon.services.tailscale-openvpn = {
enable = mkEnableOption "Tailscale OpenVPN Bridge";
config = mkOption {
type = types.attrsOf types.str;
};
tsAuthKey = mkOption { type = types.str; };
script = mkOption { type = types.str; };
};
config =
let
cfg = config.ragon.services.tailscale-openvpn;
bridgeExt = "br-ovpn-ext";
container = server: "ovpn-${server}";
bridge = server: "br-ovpn-${server}";
in
mkIf cfg.enable
{
networking.bridges = {
${bridgeExt}.interfaces = [ ];
};
networking.interfaces = {
${bridgeExt}.ipv4.addresses = [{ address = "192.168.129.1"; prefixLength = 24; }];
};
networking.nat = {
enable = true;
internalInterfaces = [ bridgeExt ];
};
systemd.services = {
"container@".after = [ "network.target" ];
} // (mapAttrs'
(server: _: nameValuePair ("container@${container server}") ({ requires = [ "network-addresses-${bridgeExt}.service" ]; }))
cfg.config
);
containers = builtins.listToAttrs (imap0
(i: name: nameValuePair name
{
autoStart = true;
ephemeral = true;
enableTun = true;
privateNetwork = true;
hostBridge = bridgeExt;
localAddress = "192.168.129.${toString (i + 2)}/24";
bindMounts = {
"/host/run" = { hostPath = "/run"; isReadOnly = true; };
"/run/agenix.d" = { hostPath = "/run/agenix.d"; isReadOnly = true; };
};
config = {
networking.nameservers = [ "9.9.9.9" ];
systemd.services.ovpnScript = {
wantedBy = ["multi-user.target"];
script = ''${pkgs.bash}/bin/bash /host${cfg.script}'';
unitConfig.Type = "oneshot";
requiredBy = [ "tailscaled.service" "openvpn-ovpn.service"];
path = [ pkgs.dig pkgs.iproute2 ];
};
services.openvpn.servers.ovpn = {
config = ''
config /host${cfg.config.${name}}
'';
up = "echo nameserver $nameserver | ${pkgs.openresolv}/sbin/resolvconf -m 0 -a $dev";
down = "${pkgs.openresolv}/sbin/resolvconf -d $dev";
};
services.tailscale = {
enable = true;
useRoutingFeatures = "server";
extraUpFlags = [ "--advertise-exit-node" ];
authKeyFile = "/host${cfg.tsAuthKey}";
openFirewall = true;
};
system.stateVersion = "23.11";
};
})
(builtins.attrNames cfg.config));
};
}