mirror of
https://gitlab.alpinelinux.org/alpine/aports.git
synced 2026-03-09 23:51:37 +01:00
44 lines
1.5 KiB
Bash
44 lines
1.5 KiB
Bash
# Configuration for /etc/init.d/tailscale
|
|
|
|
# UDP port to listen on for WireGuard and peer-to-peer traffic. 0 means
|
|
# automatically select.
|
|
#port=41641
|
|
|
|
# Force the nftables firewall mode. Only change if you know what you are doing!
|
|
#firewall_mode="nftables"
|
|
|
|
# Don't send logs to Tailscale Inc. This also disables any technical support
|
|
# from Tailscale Inc.
|
|
no_logs_no_support=yes
|
|
|
|
# Log verbosity level; 0 is default, 1 or higher are increasingly verbose.
|
|
#verbose=0
|
|
|
|
# Path to file to redirect stderr into. Set to an empty string to disable
|
|
# the redirection.
|
|
#logfile="/var/log/tailscaled.log"
|
|
|
|
# Path of the service unix socket. It must be in its own directory (it will be
|
|
# created automatically), not directly in /run!
|
|
#socket="/run/tailscale/tailscaled.sock"
|
|
|
|
# Path to directory for storage of config state, TLS certs, temporary incoming
|
|
# Taildrop files, etc.
|
|
#statedir="/var/lib/tailscale"
|
|
|
|
# Additional options to pass to tailscaled.
|
|
#command_args=
|
|
|
|
# User and group to run tailscaled as.
|
|
#
|
|
# IMPORTANT: It's highly recommended to change this to "tailscale:tailscale" to
|
|
# run tailscaled without root privileges. However, in order for tailscaled to
|
|
# control /etc/resolv.conf, you must use either openresolv or networkmanager
|
|
# (tailscaled detects this based on the generated comment in resolv.conf).
|
|
# If you change this after running tailscale for the first time, you will need
|
|
# to run `chown -r tailscale:tailscale /var/lib/tailscale`.
|
|
#command_user="root:tailscale"
|
|
|
|
# Capabilities needed for running as an unprivileged user.
|
|
#capabilities="^cap_net_admin,cap_net_raw"
|