Nix
flake.nix provided:
sh
$ nix flake show github:tale/headplane --all-systems
github:tale/headplane/ec6d455461955242393b60d9ce60c5123fa9784f?narHash=sha256-CM/vXzUiOed7i1Pp15KyV4FuIvumRlXnpF33dSWZZH4%3D
├───checks
│ ├───aarch64-darwin
│ │ └───default: derivation 'headplane-with-agent'
│ ├───x86_64-darwin
│ │ └───default: derivation 'headplane-with-agent'
│ └───x86_64-linux
│ └───default: derivation 'headplane-with-agent'
├───devShells
│ ├───aarch64-darwin
│ │ └───default: development environment 'headplane'
│ ├───x86_64-darwin
│ │ └───default: development environment 'headplane'
│ └───x86_64-linux
│ └───default: development environment 'headplane'
├───formatter
│ ├───aarch64-darwin: package 'alejandra-4.0.0'
│ ├───x86_64-darwin: package 'alejandra-4.0.0'
│ └───x86_64-linux: package 'alejandra-4.0.0'
├───nixosModules
│ └───headplane: NixOS module
├───overlays
│ └───default: Nixpkgs overlay
└───packages
├───aarch64-darwin
│ ├───headplane: package 'headplane-0.6.1'
│ ├───headplane-agent: package 'hp_agent-0.6.1'
│ ├───headplane-nixos-docs: package 'headplane-nixos-docs.md'
│ └───headplane-ssh-wasm: package 'headplane-ssh-wasm-0.6.1'
├───x86_64-darwin
│ ├───headplane: package 'headplane-0.6.1'
│ ├───headplane-agent: package 'hp_agent-0.6.1'
│ ├───headplane-nixos-docs: package 'headplane-nixos-docs.md'
│ └───headplane-ssh-wasm: package 'headplane-ssh-wasm-0.6.1'
└───x86_64-linux
├───headplane: package 'headplane-0.6.1'
├───headplane-agent: package 'hp_agent-0.6.1'
├───headplane-nixos-docs: package 'headplane-nixos-docs.md'
└───headplane-ssh-wasm: package 'headplane-ssh-wasm-0.6.1'
NixOS module options
Defined as services.headplane.*
, check the ./nix/
directory for details.
The full (generated by mise run nixos-docs
) list of services.headplane.settings.*
options: ./NixOS-options.md
Usage
- Add the
github:tale/headplane
flake input. - Import a default overlay to add
pkgs.headplane
. - Import NixOS module for
services.headplane.*
.
nix
# Your flake.nix
{
inputs = {
nixpkgs.url = "github:NixOS/nixpkgs/nixos-unstable";
headplane = {
url = "github:tale/headplane";
inputs.nixpkgs.follows = "nixpkgs";
};
};
outputs = {
nixpkgs,
headplane,
...
}: {
nixosConfigurations.MY_MACHINE = nixpkgs.lib.nixosSystem {
system = "x86_64-linux";
modules = [
# provides `services.headplane.*` NixOS options.
headplane.nixosModules.headplane
{
# provides `pkgs.headplane`
nixpkgs.overlays = [ headplane.overlays.default ];
}
{
{config, pkgs, ...}:
let
format = pkgs.formats.yaml {};
# A workaround generate a valid Headscale config accepted by Headplane when `config_strict == true`.
settings = lib.recursiveUpdate config.services.headscale.settings {
tls_cert_path = "/dev/null";
tls_key_path = "/dev/null";
policy.path = "/dev/null";
};
headscaleConfig = format.generate "headscale.yml" settings;
in {
services.headplane = {
enable = true;
settings = {
server = {
host = "127.0.0.1";
port = 3000;
# Using `sops-nix` as an example, can be a path to any file with a secret.
cookie_secret_path = config.sops.secrets."headplane/serverCookieSecret".path;
};
headscale = {
url = "https://example.com";
config_path = "${headscaleConfig}";
};
integration.agent = {
enabled = true;
# Using `sops-nix` as an example, can be a path to any file with a secret.
pre_authkey_path = config.sops.secrets."headplane/integrationAgentPreAuthkeyPath".path;
};
oidc = {
issuer = "https://oidc.example.com";
client_id = "headplane";
# Using `sops-nix` as an example, can be a path to any file with a secret.
client_secret_path = config.sops.secrets."headplane/oidcClientSecret".path;
disable_api_key_login = true;
# Might needed when integrating with Authelia.
token_endpoint_auth_method = "client_secret_basic";
# Using `sops-nix` as an example, can be a path to any file with a secret.
headscale_api_key_path = config.sops.secrets."headplane/oidcHeadscaleApiKey".path;
redirect_uri = "https://oidc.example.com/admin/oidc/callback";
};
};
};
}
}
];
};
};
}