{ config, pkgs, inputs, ... }: let inherit (inputs.nixpkgs-nixos-unstable.legacyPackages."x86_64-linux") tailscale; in { environment.systemPackages = [ tailscale ]; services.tailscale = { enable = true; package = tailscale; }; networking.firewall = { trustedInterfaces = [ "tailscale0" ]; allowedUDPPorts = [ config.services.tailscale.port ]; }; sops.secrets."tailscale-key-${config.networking.hostName}" = { sopsFile = ./keys.sops.yaml; restartUnits = [ "tailscale-auth.service" ]; }; systemd.services.tailscale-auth = { description = "Auth with tailscale"; after = [ "network-pre.target" "tailscale.service" ]; wants = [ "network-pre.target" "tailscale.service" ]; wantedBy = [ "multi-user.target" ]; serviceConfig.Type = "oneshot"; script = '' sleep 2 status="$(${tailscale}/bin/tailscale status -json | ${pkgs.jq}/bin/jq -r .BackendState)" if [ $status = "Running" ]; then # if so, then do nothing echo "already connected" exit 0 fi echo "$status, reauthing" ${tailscale}/bin/tailscale up --authkey `cat /run/secrets/tailscale-key-${config.networking.hostName}` ''; }; }