227 lines
6.7 KiB
Nix
227 lines
6.7 KiB
Nix
{ config, lib, pkgs, ... }:
|
|
|
|
let
|
|
cfg = config.services.burrow.headscale;
|
|
policyFile = ./burrow-headscale-policy.hujson;
|
|
in
|
|
{
|
|
options.services.burrow.headscale = {
|
|
enable = lib.mkEnableOption "the Burrow Headscale control plane";
|
|
|
|
domain = lib.mkOption {
|
|
type = lib.types.str;
|
|
default = "ts.burrow.net";
|
|
description = "Public Headscale control-plane domain.";
|
|
};
|
|
|
|
tailDomain = lib.mkOption {
|
|
type = lib.types.str;
|
|
default = "tail.burrow.net";
|
|
description = "MagicDNS suffix served by Headscale.";
|
|
};
|
|
|
|
port = lib.mkOption {
|
|
type = lib.types.port;
|
|
default = 8413;
|
|
description = "Local Headscale listen port.";
|
|
};
|
|
|
|
oidcIssuer = lib.mkOption {
|
|
type = lib.types.str;
|
|
default = "https://${config.services.burrow.authentik.domain}/application/o/${config.services.burrow.authentik.headscaleProviderSlug}/";
|
|
description = "OIDC issuer URL used by Headscale.";
|
|
};
|
|
|
|
oidcClientSecretFile = lib.mkOption {
|
|
type = lib.types.str;
|
|
default = config.services.burrow.authentik.headscaleClientSecretFile;
|
|
description = "Host-local file containing the OIDC client secret used by Headscale.";
|
|
};
|
|
|
|
bootstrapUsers = lib.mkOption {
|
|
type = with lib.types; listOf (submodule {
|
|
options = {
|
|
name = lib.mkOption {
|
|
type = str;
|
|
description = "Headscale username.";
|
|
};
|
|
displayName = lib.mkOption {
|
|
type = str;
|
|
description = "Friendly display name.";
|
|
};
|
|
email = lib.mkOption {
|
|
type = str;
|
|
description = "User email address.";
|
|
};
|
|
};
|
|
});
|
|
default = [
|
|
{
|
|
name = "contact";
|
|
displayName = "Burrow";
|
|
email = "contact@burrow.net";
|
|
}
|
|
{
|
|
name = "conrad";
|
|
displayName = "Conrad";
|
|
email = "conrad@burrow.net";
|
|
}
|
|
{
|
|
name = "agent";
|
|
displayName = "Agent";
|
|
email = "agent@burrow.net";
|
|
}
|
|
{
|
|
name = "infra";
|
|
displayName = "Infrastructure";
|
|
email = "infra@burrow.net";
|
|
}
|
|
];
|
|
description = "Users to create or reconcile inside Headscale.";
|
|
};
|
|
};
|
|
|
|
config = lib.mkIf cfg.enable {
|
|
environment.systemPackages = [ pkgs.headscale ];
|
|
|
|
systemd.services.burrow-headscale-client-secret = {
|
|
description = "Ensure the Burrow Headscale OIDC client secret exists";
|
|
before =
|
|
[ "headscale.service" ]
|
|
++ lib.optionals config.services.burrow.authentik.enable [ "burrow-authentik-runtime.service" ];
|
|
wantedBy =
|
|
[ "headscale.service" ]
|
|
++ lib.optionals config.services.burrow.authentik.enable [ "burrow-authentik-runtime.service" ];
|
|
path = [
|
|
pkgs.coreutils
|
|
pkgs.openssl
|
|
];
|
|
serviceConfig = {
|
|
Type = "oneshot";
|
|
User = "root";
|
|
Group = "root";
|
|
RemainAfterExit = true;
|
|
};
|
|
script = ''
|
|
set -euo pipefail
|
|
|
|
install -d -m 0755 /var/lib/burrow/intake
|
|
|
|
if [ ! -s ${lib.escapeShellArg cfg.oidcClientSecretFile} ]; then
|
|
umask 077
|
|
${pkgs.openssl}/bin/openssl rand -base64 48 > ${lib.escapeShellArg cfg.oidcClientSecretFile}
|
|
chown root:root ${lib.escapeShellArg cfg.oidcClientSecretFile}
|
|
chmod 0400 ${lib.escapeShellArg cfg.oidcClientSecretFile}
|
|
fi
|
|
'';
|
|
};
|
|
|
|
services.headscale = {
|
|
enable = true;
|
|
address = "127.0.0.1";
|
|
port = cfg.port;
|
|
settings = {
|
|
server_url = "https://${cfg.domain}";
|
|
dns = {
|
|
magic_dns = true;
|
|
base_domain = cfg.tailDomain;
|
|
nameservers.global = [
|
|
"1.1.1.1"
|
|
"1.0.0.1"
|
|
"2606:4700:4700::1111"
|
|
"2606:4700:4700::1001"
|
|
];
|
|
search_domains = [ cfg.tailDomain ];
|
|
};
|
|
database.sqlite.write_ahead_log = true;
|
|
log.level = "info";
|
|
policy = {
|
|
mode = "file";
|
|
path = policyFile;
|
|
};
|
|
oidc = {
|
|
only_start_if_oidc_is_available = true;
|
|
issuer = cfg.oidcIssuer;
|
|
client_id = cfg.domain;
|
|
client_secret_path = "\${CREDENTIALS_DIRECTORY}/oidc_client_secret";
|
|
scope = [
|
|
"openid"
|
|
"profile"
|
|
"email"
|
|
];
|
|
pkce = {
|
|
enabled = true;
|
|
method = "S256";
|
|
};
|
|
};
|
|
};
|
|
};
|
|
|
|
systemd.services.headscale = {
|
|
after =
|
|
[ "burrow-headscale-client-secret.service" ]
|
|
++ lib.optionals config.services.burrow.authentik.enable [ "burrow-authentik-ready.service" ];
|
|
wants =
|
|
[ "burrow-headscale-client-secret.service" ]
|
|
++ lib.optionals config.services.burrow.authentik.enable [ "burrow-authentik-ready.service" ];
|
|
requires =
|
|
[ "burrow-headscale-client-secret.service" ]
|
|
++ lib.optionals config.services.burrow.authentik.enable [ "burrow-authentik-ready.service" ];
|
|
serviceConfig.LoadCredential = [
|
|
"oidc_client_secret:${cfg.oidcClientSecretFile}"
|
|
];
|
|
};
|
|
|
|
systemd.services.headscale-bootstrap = {
|
|
description = "Bootstrap Burrow Headscale users";
|
|
after = [ "headscale.service" ];
|
|
requires = [ "headscale.service" ];
|
|
wantedBy = [ "multi-user.target" ];
|
|
path = [
|
|
pkgs.coreutils
|
|
pkgs.headscale
|
|
pkgs.jq
|
|
];
|
|
serviceConfig = {
|
|
Type = "oneshot";
|
|
User = "root";
|
|
Group = "root";
|
|
};
|
|
script = ''
|
|
set -euo pipefail
|
|
|
|
list_users() {
|
|
local users_json
|
|
users_json="$(${pkgs.headscale}/bin/headscale users list -o json)"
|
|
printf '%s\n' "$users_json" | ${pkgs.jq}/bin/jq -c 'if type == "array" then . else [] end'
|
|
}
|
|
|
|
ensure_user() {
|
|
local name="$1"
|
|
local display_name="$2"
|
|
local email="$3"
|
|
if list_users | ${pkgs.jq}/bin/jq -e --arg name "$name" 'map(select(.name == $name)) | length > 0' >/dev/null; then
|
|
return 0
|
|
fi
|
|
${pkgs.headscale}/bin/headscale users create "$name" --display-name "$display_name" --email "$email" >/dev/null
|
|
}
|
|
|
|
for _ in $(seq 1 60); do
|
|
if list_users >/dev/null 2>&1; then
|
|
break
|
|
fi
|
|
sleep 1
|
|
done
|
|
|
|
${lib.concatMapStringsSep "\n" (user: ''
|
|
ensure_user ${lib.escapeShellArg user.name} ${lib.escapeShellArg user.displayName} ${lib.escapeShellArg user.email}
|
|
'') cfg.bootstrapUsers}
|
|
'';
|
|
};
|
|
|
|
services.caddy.virtualHosts."${cfg.domain}".extraConfig = ''
|
|
encode gzip zstd
|
|
reverse_proxy 127.0.0.1:${toString cfg.port}
|
|
'';
|
|
};
|
|
}
|