summaryrefslogtreecommitdiff
path: root/modules/nixos/tailscale.nix
diff options
context:
space:
mode:
authorscouckel <james.krinsky@gmail.com>2026-01-16 19:02:12 -0500
committerscouckel <james.krinsky@gmail.com>2026-01-16 19:02:12 -0500
commit10895fd758ace94c68ecea1c66462144cf5b6cad (patch)
tree6749ddf8244e03d1e034bac8d38f2c3c709c710d /modules/nixos/tailscale.nix
parent183e634a00a30e3f6a44ee71c8105722a8969c8a (diff)
update + add nas w/ tailscale
Diffstat (limited to 'modules/nixos/tailscale.nix')
-rw-r--r--modules/nixos/tailscale.nix25
1 files changed, 0 insertions, 25 deletions
diff --git a/modules/nixos/tailscale.nix b/modules/nixos/tailscale.nix
deleted file mode 100644
index 9cba982..0000000
--- a/modules/nixos/tailscale.nix
+++ /dev/null
@@ -1,25 +0,0 @@
-{ config, ... }:
-
-{
- # 1. Enable the service and the firewall
- services.tailscale.enable = true;
- networking.nftables.enable = true;
- networking.firewall = {
- enable = true;
- # Always allow traffic from your Tailscale network
- trustedInterfaces = [ "tailscale0" ];
- # Allow the Tailscale UDP port through the firewall
- allowedUDPPorts = [ config.services.tailscale.port ];
- };
-
- # 2. Force tailscaled to use nftables (Critical for clean nftables-only systems)
- # This avoids the "iptables-compat" translation layer issues.
- systemd.services.tailscaled.serviceConfig.Environment = [
- "TS_DEBUG_FIREWALL_MODE=nftables"
- ];
-
- # 3. Optimization: Prevent systemd from waiting for network online
- # (Optional but recommended for faster boot with VPNs)
- systemd.network.wait-online.enable = false;
- boot.initrd.systemd.network.wait-online.enable = false;
- }