diff options
| author | scouckel <james.krinsky@gmail.com> | 2026-01-16 19:02:12 -0500 |
|---|---|---|
| committer | scouckel <james.krinsky@gmail.com> | 2026-01-16 19:02:12 -0500 |
| commit | 10895fd758ace94c68ecea1c66462144cf5b6cad (patch) | |
| tree | 6749ddf8244e03d1e034bac8d38f2c3c709c710d /modules/nixos/tailscale.nix | |
| parent | 183e634a00a30e3f6a44ee71c8105722a8969c8a (diff) | |
update + add nas w/ tailscale
Diffstat (limited to 'modules/nixos/tailscale.nix')
| -rw-r--r-- | modules/nixos/tailscale.nix | 25 |
1 files changed, 0 insertions, 25 deletions
diff --git a/modules/nixos/tailscale.nix b/modules/nixos/tailscale.nix deleted file mode 100644 index 9cba982..0000000 --- a/modules/nixos/tailscale.nix +++ /dev/null @@ -1,25 +0,0 @@ -{ config, ... }: - -{ - # 1. Enable the service and the firewall - services.tailscale.enable = true; - networking.nftables.enable = true; - networking.firewall = { - enable = true; - # Always allow traffic from your Tailscale network - trustedInterfaces = [ "tailscale0" ]; - # Allow the Tailscale UDP port through the firewall - allowedUDPPorts = [ config.services.tailscale.port ]; - }; - - # 2. Force tailscaled to use nftables (Critical for clean nftables-only systems) - # This avoids the "iptables-compat" translation layer issues. - systemd.services.tailscaled.serviceConfig.Environment = [ - "TS_DEBUG_FIREWALL_MODE=nftables" - ]; - - # 3. Optimization: Prevent systemd from waiting for network online - # (Optional but recommended for faster boot with VPNs) - systemd.network.wait-online.enable = false; - boot.initrd.systemd.network.wait-online.enable = false; - } |
