Add Burrow forge infrastructure and tailnet control plane
This commit is contained in:
parent
d1ed826389
commit
de25f240d5
51 changed files with 9058 additions and 0 deletions
225
nixos/modules/burrow-headscale.nix
Normal file
225
nixos/modules/burrow-headscale.nix
Normal file
|
|
@ -0,0 +1,225 @@
|
|||
{ config, lib, pkgs, ... }:
|
||||
|
||||
let
|
||||
cfg = config.services.burrow.headscale;
|
||||
policyFile = ./burrow-headscale-policy.hujson;
|
||||
in
|
||||
{
|
||||
options.services.burrow.headscale = {
|
||||
enable = lib.mkEnableOption "the Burrow Headscale control plane";
|
||||
|
||||
domain = lib.mkOption {
|
||||
type = lib.types.str;
|
||||
default = "ts.burrow.net";
|
||||
description = "Public Headscale control-plane domain.";
|
||||
};
|
||||
|
||||
tailDomain = lib.mkOption {
|
||||
type = lib.types.str;
|
||||
default = "tail.burrow.net";
|
||||
description = "MagicDNS suffix served by Headscale.";
|
||||
};
|
||||
|
||||
port = lib.mkOption {
|
||||
type = lib.types.port;
|
||||
default = 8413;
|
||||
description = "Local Headscale listen port.";
|
||||
};
|
||||
|
||||
oidcIssuer = lib.mkOption {
|
||||
type = lib.types.str;
|
||||
default = "https://${config.services.burrow.authentik.domain}/application/o/${config.services.burrow.authentik.headscaleProviderSlug}/";
|
||||
description = "OIDC issuer URL used by Headscale.";
|
||||
};
|
||||
|
||||
oidcClientSecretFile = lib.mkOption {
|
||||
type = lib.types.str;
|
||||
default = config.services.burrow.authentik.headscaleClientSecretFile;
|
||||
description = "Host-local file containing the OIDC client secret used by Headscale.";
|
||||
};
|
||||
|
||||
bootstrapUsers = lib.mkOption {
|
||||
type = with lib.types; listOf (submodule {
|
||||
options = {
|
||||
name = lib.mkOption {
|
||||
type = str;
|
||||
description = "Headscale username.";
|
||||
};
|
||||
displayName = lib.mkOption {
|
||||
type = str;
|
||||
description = "Friendly display name.";
|
||||
};
|
||||
email = lib.mkOption {
|
||||
type = str;
|
||||
description = "User email address.";
|
||||
};
|
||||
};
|
||||
});
|
||||
default = [
|
||||
{
|
||||
name = "contact";
|
||||
displayName = "Burrow";
|
||||
email = "contact@burrow.net";
|
||||
}
|
||||
{
|
||||
name = "conrad";
|
||||
displayName = "Conrad";
|
||||
email = "conrad@burrow.net";
|
||||
}
|
||||
{
|
||||
name = "agent";
|
||||
displayName = "Agent";
|
||||
email = "agent@burrow.net";
|
||||
}
|
||||
{
|
||||
name = "infra";
|
||||
displayName = "Infrastructure";
|
||||
email = "infra@burrow.net";
|
||||
}
|
||||
];
|
||||
description = "Users to create or reconcile inside Headscale.";
|
||||
};
|
||||
};
|
||||
|
||||
config = lib.mkIf cfg.enable {
|
||||
environment.systemPackages = [ pkgs.headscale ];
|
||||
|
||||
systemd.services.burrow-headscale-client-secret = {
|
||||
description = "Ensure the Burrow Headscale OIDC client secret exists";
|
||||
before =
|
||||
[ "headscale.service" ]
|
||||
++ lib.optionals config.services.burrow.authentik.enable [ "burrow-authentik-runtime.service" ];
|
||||
wantedBy =
|
||||
[ "headscale.service" ]
|
||||
++ lib.optionals config.services.burrow.authentik.enable [ "burrow-authentik-runtime.service" ];
|
||||
path = [
|
||||
pkgs.coreutils
|
||||
pkgs.openssl
|
||||
];
|
||||
serviceConfig = {
|
||||
Type = "oneshot";
|
||||
User = "root";
|
||||
Group = "root";
|
||||
RemainAfterExit = true;
|
||||
};
|
||||
script = ''
|
||||
set -euo pipefail
|
||||
|
||||
install -d -m 0755 /var/lib/burrow/intake
|
||||
|
||||
if [ ! -s ${lib.escapeShellArg cfg.oidcClientSecretFile} ]; then
|
||||
umask 077
|
||||
${pkgs.openssl}/bin/openssl rand -base64 48 > ${lib.escapeShellArg cfg.oidcClientSecretFile}
|
||||
chown root:root ${lib.escapeShellArg cfg.oidcClientSecretFile}
|
||||
chmod 0400 ${lib.escapeShellArg cfg.oidcClientSecretFile}
|
||||
fi
|
||||
'';
|
||||
};
|
||||
|
||||
services.headscale = {
|
||||
enable = true;
|
||||
address = "127.0.0.1";
|
||||
port = cfg.port;
|
||||
settings = {
|
||||
server_url = "https://${cfg.domain}";
|
||||
dns = {
|
||||
magic_dns = true;
|
||||
base_domain = cfg.tailDomain;
|
||||
nameservers.global = [
|
||||
"1.1.1.1"
|
||||
"1.0.0.1"
|
||||
"2606:4700:4700::1111"
|
||||
"2606:4700:4700::1001"
|
||||
];
|
||||
search_domains = [ cfg.tailDomain ];
|
||||
};
|
||||
database.sqlite.write_ahead_log = true;
|
||||
log.level = "info";
|
||||
policy = {
|
||||
mode = "file";
|
||||
path = policyFile;
|
||||
};
|
||||
oidc = {
|
||||
only_start_if_oidc_is_available = true;
|
||||
issuer = cfg.oidcIssuer;
|
||||
client_id = cfg.domain;
|
||||
client_secret_path = "\${CREDENTIALS_DIRECTORY}/oidc_client_secret";
|
||||
scope = [
|
||||
"openid"
|
||||
"profile"
|
||||
"email"
|
||||
];
|
||||
pkce = {
|
||||
enabled = true;
|
||||
method = "S256";
|
||||
};
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
systemd.services.headscale = {
|
||||
after =
|
||||
[ "burrow-headscale-client-secret.service" ]
|
||||
++ lib.optionals config.services.burrow.authentik.enable [ "burrow-authentik-ready.service" ];
|
||||
wants =
|
||||
[ "burrow-headscale-client-secret.service" ]
|
||||
++ lib.optionals config.services.burrow.authentik.enable [ "burrow-authentik-ready.service" ];
|
||||
requires =
|
||||
[ "burrow-headscale-client-secret.service" ]
|
||||
++ lib.optionals config.services.burrow.authentik.enable [ "burrow-authentik-ready.service" ];
|
||||
serviceConfig.LoadCredential = [
|
||||
"oidc_client_secret:${cfg.oidcClientSecretFile}"
|
||||
];
|
||||
};
|
||||
|
||||
systemd.services.headscale-bootstrap = {
|
||||
description = "Bootstrap Burrow Headscale users";
|
||||
after = [ "headscale.service" ];
|
||||
requires = [ "headscale.service" ];
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
path = [
|
||||
pkgs.coreutils
|
||||
pkgs.headscale
|
||||
pkgs.jq
|
||||
];
|
||||
serviceConfig = {
|
||||
Type = "oneshot";
|
||||
User = "root";
|
||||
Group = "root";
|
||||
};
|
||||
script = ''
|
||||
set -euo pipefail
|
||||
|
||||
list_users() {
|
||||
${pkgs.headscale}/bin/headscale users list -o json
|
||||
}
|
||||
|
||||
ensure_user() {
|
||||
local name="$1"
|
||||
local display_name="$2"
|
||||
local email="$3"
|
||||
if list_users | ${pkgs.jq}/bin/jq -e --arg name "$name" 'map(select(.name == $name)) | length > 0' >/dev/null; then
|
||||
return 0
|
||||
fi
|
||||
${pkgs.headscale}/bin/headscale users create "$name" --display-name "$display_name" --email "$email" >/dev/null
|
||||
}
|
||||
|
||||
for _ in $(seq 1 60); do
|
||||
if list_users >/dev/null 2>&1; then
|
||||
break
|
||||
fi
|
||||
sleep 1
|
||||
done
|
||||
|
||||
${lib.concatMapStringsSep "\n" (user: ''
|
||||
ensure_user ${lib.escapeShellArg user.name} ${lib.escapeShellArg user.displayName} ${lib.escapeShellArg user.email}
|
||||
'') cfg.bootstrapUsers}
|
||||
'';
|
||||
};
|
||||
|
||||
services.caddy.virtualHosts."${cfg.domain}".extraConfig = ''
|
||||
encode gzip zstd
|
||||
reverse_proxy 127.0.0.1:${toString cfg.port}
|
||||
'';
|
||||
};
|
||||
}
|
||||
Loading…
Add table
Add a link
Reference in a new issue