feat(axol): Enable tailscale

Previously, we set up headscale. As the headscale server doesn't
automatically put the server running it into the tailscale network, we
also need to set up the tailscale daemon
This commit is contained in:
Skyler Grey 2024-07-28 08:54:30 +00:00
parent 740e35fb48
commit 79c7127564
6 changed files with 38 additions and 0 deletions

View file

@ -0,0 +1,8 @@
age-encryption.org/v1
-> ssh-ed25519 JMblKQ /KeQPyNmEYg1qHq5M4z3aQ7Jt4dwozMQMhmb1wzdDDw
kS77B2HAZxnhMzcD9bTkcyhGiRrkzEv6+UDcE0lonJU
-> BVh{PUl}-grease K D$G T_Ov7Cb
vmCUTiAi81FTpapoJgHlCO9e6ZXzUW5QfuclIZbG2gqoL6XKSvED84gdZeIeZ3TA
tSFu/4eADDeqoGKiFQSt/Ji+qy2XDmIVJh400QwcUsjZasRXMquGPn6jDxo
--- +5WuWL/wQ0EH3xpoQ3f5mLiHZNsXO8wGpsNBh+PfTkA
ËA©åߘõTfl—àæ×±×ÆZôdW4‰ÝNæ÷¤$[P#¡ZÜÔÜ<18>×þƒÃæ£A¥ÙFà r•bïd<C3AF>-`,@ÕµóÈÐäÕ

View file

@ -0,0 +1,8 @@
age-encryption.org/v1
-> ssh-ed25519 Z9MeFA 2SrMV2OMZdsZPSaxzxfgQF2ukrzRme+Vt4eAcT7dkAs
QpHJD8cT6DMR1FP1ft57hRCYjZW6aw16cEv61mBqADg
-> v.`66g}-grease CAkD Ap<g
BQxsewykSzbTiU+pZmYdy4b0E2I225h0XVUFQ3mMMxHKTznsJhdon86DByrlPIK5
S6W2AJ/wMHauk8EzHBTWsTiZnvmAk04OpLjxlgfl
--- xQos1NCssn+gCQMs3fdLeOxgOeLRvsYZlCW9cYRsGFs
/7}¨rÈÏÞÈ …ŠÄûk(-N(®ßˆÄÿPfún†¸E<45>3fLídɆ{AzB³ÒÿyS F³­Œ”8X¹©¨Ty´Ó8¾9°Puèá

View file

@ -57,6 +57,12 @@
database_password_path = config.age.secrets."clicks.services.headscale.database_password_path".path;
};
clicks.networking.tailscale = {
enable = true;
server = "vpn.auxolotl.org";
authKeyFile = config.age.secrets."clicks.networking.tailscale.authKeyFile".path;
};
age.secrets."clicks.services.headscale.database_password_path" = {
generator.script = "alnum";
group = "headscale";
@ -64,5 +70,10 @@
unstableName = true; # Clicks option to base the name on a hash of the contents ... helps with autorestarting services
};
age.secrets."clicks.networking.tailscale.authKeyFile" = {
rekeyFile = ./clicks.networking.tailscale.authKeyFile.age;
unstableName = true;
};
system.stateVersion = "23.11";
}

View file

@ -68,6 +68,17 @@
};
};
clicks.networking.tailscale = {
enable = true;
server = "vpn.auxolotl.org";
authKeyFile = config.age.secrets."clicks.networking.tailscale.authKeyFile".path;
};
age.secrets."clicks.networking.tailscale.authKeyFile" = {
rekeyFile = ./clicks.networking.tailscale.authKeyFile.age;
unstableName = true;
};
age.secrets."services.ci.master.tokenFile" = {
rekeyFile = ./services.ci.master.tokenFile.age;
group = "buildbot";