Configure global DNS nameservers for the Tailscale tailnet, setting trantor as the primary DNS server with Cloudflare as fallback. This enables custom DNS resolution across the entire tailnet. 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
77 lines
2.2 KiB
Nix
77 lines
2.2 KiB
Nix
# Required environment variables:
|
|
# CLOUDFLARE_API_TOKEN - API token with "Edit zone DNS" permissions
|
|
# TF_VAR_zone_id - Zone ID for baduhai.dev (find in Cloudflare dashboard)
|
|
# AWS_ACCESS_KEY_ID - Cloudflare R2 access key for state storage
|
|
# AWS_SECRET_ACCESS_KEY - Cloudflare R2 secret key for state storage
|
|
|
|
{ config, ... }:
|
|
|
|
{
|
|
terraform.required_providers.cloudflare = {
|
|
source = "cloudflare/cloudflare";
|
|
version = "~> 5.0";
|
|
};
|
|
|
|
terraform.backend.s3 = {
|
|
bucket = "terraform-state";
|
|
key = "cloudflare/baduhai.dev.tfstate";
|
|
region = "auto";
|
|
endpoint = "https://fcdf920bde00c3d013ee541f984da70e.r2.cloudflarestorage.com";
|
|
skip_credentials_validation = true;
|
|
skip_metadata_api_check = true;
|
|
skip_region_validation = true;
|
|
skip_requesting_account_id = true;
|
|
use_path_style = true;
|
|
};
|
|
|
|
variable = {
|
|
zone_id = {
|
|
description = "Cloudflare zone ID for baduhai.dev";
|
|
type = "string";
|
|
sensitive = true;
|
|
};
|
|
};
|
|
|
|
data = {
|
|
terraform_remote_state.trantor = {
|
|
backend = "s3";
|
|
config = {
|
|
bucket = "terraform-state";
|
|
key = "oci/trantor.tfstate";
|
|
region = "auto";
|
|
endpoint = "https://fcdf920bde00c3d013ee541f984da70e.r2.cloudflarestorage.com";
|
|
skip_credentials_validation = true;
|
|
skip_metadata_api_check = true;
|
|
skip_region_validation = true;
|
|
skip_requesting_account_id = true;
|
|
use_path_style = true;
|
|
};
|
|
};
|
|
};
|
|
|
|
resource = {
|
|
cloudflare_record.root = {
|
|
zone_id = config.variable.zone_id;
|
|
name = "@";
|
|
type = "A";
|
|
content = config.data.terraform_remote_state.trantor "outputs.instance_public_ip.value";
|
|
proxied = true;
|
|
};
|
|
|
|
cloudflare_record.www = {
|
|
zone_id = config.variable.zone_id;
|
|
name = "www";
|
|
type = "A";
|
|
content = config.data.terraform_remote_state.trantor "outputs.instance_public_ip.value";
|
|
proxied = true;
|
|
};
|
|
|
|
cloudflare_record.wildcard = {
|
|
zone_id = config.variable.zone_id;
|
|
name = "*";
|
|
type = "A";
|
|
content = config.data.terraform_remote_state.trantor "outputs.instance_public_ip.value";
|
|
proxied = true;
|
|
};
|
|
};
|
|
}
|