#headplane

chfkch :nixos: :rust:chfkch@ruhr.social
2026-02-09

✅ HeadScale configured to use OIDC
❌HeadPlane configured to use OIDC¹

¹ i need to set up HeadPlane anyway and thus, i need to set up my server to use flakes

#HeadScale #HeadPlane #TailScale #NixOS #OIDC

OK, final update on the wireguard with fancy little web UI (with OIDC) saga! After like 4 days of tinkering, we've discovered there isn't anything that meets all our needs... yet!

Headplane is by far the most featureful and actively maintained, but it's like not quite there. It's a solid 90% there though! They're even working on an official helm chart! They need a bit more documentation and little bit more work on the OIDC and just a little bit more decoupling from headscale itself and then they're there! I'll absolutely be keeping an eye on the project.

In the meantime, I'm honestly really pleased to say that headscale has come a long way and supports OIDC in a nice way now! It really does feel a lot more like what you'd expect from a corporate VPN. It works well with zitadel and I'll definitely be adding the setup to smol-k8s-lab soon :3

#headplane #headscale #wireguard

I really appreciate the because with no further explanation 😂

#headplane #headscale

screenshot of the OIDC section from the example config file for headplane that says:

The client ID for the OIDC client. For the best experience please ensure this is *identical* to the client_id you are using for Headscale. because

# client_id: "your-client-id"

We got headscale up using wrenix's chart!

https://codeberg.org/wrenix/helm-charts/src/branch/main/headscale

Now onto headplane! :heart_cyber:​

#headscale #headplane #helm #k8s

Lucas Janin 🇨🇦🇫🇷lucas3d
2025-07-28
chfkch :nixos: :rust:chfkch@ruhr.social
2025-04-29

Finally i got #HeadPlane working with my #Nix flake. Now i "just" need to create a systemd unit so i can include it as a service (currently its started manually for testing).

#HeadScale #NixOS

chfkch :nixos: :rust:chfkch@ruhr.social
2025-01-07

Okay so i got #Headplane running manually (non-nix) on my #NixOS host, but i fail to write a working package flake.
Why oh why does it have to be a #PNPM application. The wiki does not help much either.
Did any of you know of an app where i can get inspired? Or has done it themselves?
I am so close.

Lucas Janin 🇨🇦🇫🇷lucas3d
2025-01-06

I updated my and blog post with additional information about the Nginx Proxy Manager section (PiHole with wildcard DNS) and an improved ACL diagram that I believe is clearer and more accurate.

English: lucasjanin.com/2025/01/03/head

Français: lucasjanin.com/2025/01/03/head

My new Heascale ACL diagram
Lucas Janin 🇨🇦🇫🇷lucas3d
2025-01-03

Mon explortation avec et est documenté sur mon blog. J'y discute des différences entre un serveur et Tailscale, Headscale, la configuration de Docker Compose, l'interface , le contrôle d'accès via , l'intégration avec , les nœuds de sortie, les routes et l'installation sur macOS, iOS, Linux, Debian, Proxmox LXC, NAS et .


lucasjanin.com/2025/01/03/head

Lucas Janin 🇨🇦🇫🇷lucas3d
2025-01-03

My journey with and is documented on my blog. I discuss the differences between a server and Tailscale, Headscale, Docker Compose configuration, interface, access control through , integration with , exit nodes, routes, and installation on macOS, iOS, Linux, Debian, Proxmox LXC, NAS, and .

Note that I will not cover OIDC authentication at this time.

lucasjanin.com/2025/01/03/head

Lucas Janin 🇨🇦🇫🇷lucas3d
2025-01-02

Je finalise un nouveau billet en français pour mon blog sur mon déploiement de et dans mon . et Tailscale, Headscale, Docker Compose, , contrôle d'accès via ACL, intégration avec Nginx Proxy Manager, et plus encore. Je ne couvrirai pas encore l'authentification OIDC.

Faites-moi savoir si vous avez des questions spécifiques ou d'autres sujets que vous aimeriez que j'aborde.

Graphique de ma configuration ACL pour restreindre l'accès aux nodes Tailscale
Lucas Janin 🇨🇦🇫🇷lucas3d
2025-01-02

I'm working on a new blog post about my deployment of and in my for early 2025. I will discuss the differences between a server and Tailscale, Headscale, Docker Compose configuration, , access control through ACL configuration, integration with Nginx Proxy Manager, and more. Please note that I will not cover OIDC authentication yet.

Let me know if you have any specific questions or other topics you would like me to address.

My ACL map to limit the access between the Tailscale nodes.
Lucas Janin 🇨🇦🇫🇷lucas3d
2024-11-20

@meep Yep!
FYI, I’m using for the web interface of .

Lucas Janin 🇨🇦🇫🇷lucas3d
2024-06-12

@train I love and I’m using . It’s very stable. I don’t feel limited, but I never used server.

github.com/tale/headplane

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst