chore(third_party): Remove Tailscale derivation
This is now part of nixpkgs itself.
This commit is contained in:
parent
a0cb4703e8
commit
0f3d11f541
3 changed files with 0 additions and 146 deletions
|
@ -1,77 +0,0 @@
|
||||||
# NixOS module for Tailscale
|
|
||||||
{ config, lib, pkgs, ... }:
|
|
||||||
|
|
||||||
with lib;
|
|
||||||
|
|
||||||
let
|
|
||||||
cfg = config.services.tailscale;
|
|
||||||
|
|
||||||
aclVar = optionalAttrs (cfg.aclFile != null) {
|
|
||||||
ACL_FILE = "--acl-file=${cfg.aclFile}";
|
|
||||||
};
|
|
||||||
|
|
||||||
in {
|
|
||||||
options.services.tailscale = {
|
|
||||||
enable = mkEnableOption "Tailscale relay";
|
|
||||||
|
|
||||||
package = mkOption {
|
|
||||||
type = types.package;
|
|
||||||
default = pkgs.tailscale; # <- this doesn't actually exist yet
|
|
||||||
description = "Tailscale client package to use";
|
|
||||||
};
|
|
||||||
|
|
||||||
port = mkOption {
|
|
||||||
type = types.int;
|
|
||||||
default = 41641;
|
|
||||||
description = ''
|
|
||||||
Set the port to listen on for incoming VPN packets.
|
|
||||||
|
|
||||||
Remote nodes will automatically be informed about the new port
|
|
||||||
number, but you might want to configure this in order to set
|
|
||||||
external firewall settings.
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
|
|
||||||
aclFile = mkOption {
|
|
||||||
type = with types; nullOr path;
|
|
||||||
default = "${cfg.package}/etc/acl.json";
|
|
||||||
};
|
|
||||||
|
|
||||||
relayConf = mkOption {
|
|
||||||
type = types.path;
|
|
||||||
example = "/etc/tailscale.conf";
|
|
||||||
description = "The path to relay.conf";
|
|
||||||
};
|
|
||||||
|
|
||||||
extraFlags = mkOption {
|
|
||||||
type = with types; listOf str;
|
|
||||||
default = [];
|
|
||||||
description = "Extra flags you might want to pass to relaynode.";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
config = mkIf cfg.enable {
|
|
||||||
environment.systemPackages = [ cfg.package ];
|
|
||||||
|
|
||||||
systemd.services.tailscale-relay = {
|
|
||||||
description = "Traffic relay node for Tailscale IPN";
|
|
||||||
after = [ "network.target" ];
|
|
||||||
wantedBy = [ "multi-user.target" ];
|
|
||||||
path = with pkgs; [ iproute iptables ];
|
|
||||||
|
|
||||||
unitConfig.ConditionPathExists = cfg.relayConf;
|
|
||||||
|
|
||||||
script = concatStringsSep " " ([
|
|
||||||
"${cfg.package}/bin/relaynode"
|
|
||||||
"--port=${toString cfg.port}"
|
|
||||||
"--config=${cfg.relayConf}"
|
|
||||||
(optionalString (cfg.aclFile != null) "--acl-file=${cfg.aclFile}")
|
|
||||||
] ++ cfg.extraFlags);
|
|
||||||
|
|
||||||
serviceConfig = {
|
|
||||||
RuntimeDirectory = "tailscale";
|
|
||||||
LogsDirectory = "tailscale";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
|
@ -1,28 +0,0 @@
|
||||||
From ce33360524307b6da4f996a9f465260e121011f8 Mon Sep 17 00:00:00 2001
|
|
||||||
From: Vincent Ambo <tazjin@google.com>
|
|
||||||
Date: Tue, 11 Feb 2020 00:40:37 +0000
|
|
||||||
Subject: [PATCH] fix(control): Ensure control client has a logger function
|
|
||||||
|
|
||||||
For some reason this field ended up being nil in taillogin, which made
|
|
||||||
it difficult to actually log in.
|
|
||||||
---
|
|
||||||
control/controlclient/auto.go | 3 +++
|
|
||||||
1 file changed, 3 insertions(+)
|
|
||||||
|
|
||||||
diff --git a/control/controlclient/auto.go b/control/controlclient/auto.go
|
|
||||||
index 67f187f..09cdf6f 100644
|
|
||||||
--- a/control/controlclient/auto.go
|
|
||||||
+++ b/control/controlclient/auto.go
|
|
||||||
@@ -160,6 +160,9 @@ func NewNoStart(opts Options) (*Client, error) {
|
|
||||||
//
|
|
||||||
// It should only be called for clients created by NewNoStart.
|
|
||||||
func (c *Client) Start() {
|
|
||||||
+ c.logf = func(f string, args ...interface{}) {
|
|
||||||
+ fmt.Printf(f, args)
|
|
||||||
+ }
|
|
||||||
go c.authRoutine()
|
|
||||||
go c.mapRoutine()
|
|
||||||
}
|
|
||||||
--
|
|
||||||
2.23.0
|
|
||||||
|
|
41
third_party/tailscale/default.nix
vendored
41
third_party/tailscale/default.nix
vendored
|
@ -1,41 +0,0 @@
|
||||||
# This file packages the Tailscale client using the standard upstream
|
|
||||||
# Go packaging mechanisms instead of buildGo.nix
|
|
||||||
|
|
||||||
{ pkgs, lib, ... }:
|
|
||||||
|
|
||||||
let
|
|
||||||
inherit (pkgs) buildGoModule fetchFromGitHub;
|
|
||||||
in buildGoModule rec {
|
|
||||||
pname = "tailscale";
|
|
||||||
version = "fef25489";
|
|
||||||
|
|
||||||
src = fetchFromGitHub {
|
|
||||||
owner = "tailscale";
|
|
||||||
repo = "tailscale";
|
|
||||||
rev = "fef254898178d100f25b98530499adcf07cfded3";
|
|
||||||
sha256 = "1islxzr8lhnl2f0r686mcciwb8lzvqjczg9fs0nagr5pp6dsi9fa";
|
|
||||||
};
|
|
||||||
|
|
||||||
patches = [ ./0001-fix-client-logger.patch ];
|
|
||||||
|
|
||||||
goPackagePath = "tailscale.com";
|
|
||||||
modSha256 = "0cnih9flwgqjq4x4cwyac9yyz1prv2i2by1ki3g71ai8q621bq10";
|
|
||||||
subPackages = [
|
|
||||||
"cmd/relaynode"
|
|
||||||
"cmd/taillogin"
|
|
||||||
"cmd/tailscale"
|
|
||||||
"cmd/tailscaled"
|
|
||||||
];
|
|
||||||
|
|
||||||
postInstall = ''
|
|
||||||
mkdir -p $out/etc/
|
|
||||||
cp ${src}/cmd/relaynode/acl.json $out/etc/
|
|
||||||
'';
|
|
||||||
|
|
||||||
meta = with lib; {
|
|
||||||
homepage = "https://tailscale.com/";
|
|
||||||
description = "Private WireGuard networks made easy";
|
|
||||||
license = licenses.bsd3;
|
|
||||||
maintainers = with maintainers; [ tazjin ];
|
|
||||||
};
|
|
||||||
}
|
|
Loading…
Reference in a new issue