+1
modules/machines.nix
+1
modules/machines.nix
+2
-9
modules/nixos.nix
+2
-9
modules/nixos.nix
···
5
5
...
6
6
}:
7
7
{
8
+
imports = [ ./tailscale.nix ];
9
+
8
10
environment = {
9
11
systemPackages = with pkgs; [
10
12
binutils
···
29
31
programs.ssh.startAgent = true;
30
32
31
33
networking.nftables.enable = true;
32
-
33
-
services.tailscale.enable = !config.boot.isContainer;
34
-
networking.firewall.checkReversePath = "loose";
35
-
systemd.network.wait-online.ignoredInterfaces = [ "tailscale0" ];
36
-
networking.firewall.trustedInterfaces = [ "tailscale0" ];
37
-
boot.kernel.sysctl = {
38
-
"net.ipv4.ip_forward" = true;
39
-
"net.ipv6.conf.all.forwarding" = true;
40
-
};
41
34
42
35
services.fstrim.enable = true;
43
36
+16
modules/tailscale.nix
+16
modules/tailscale.nix
···
1
+
{
2
+
config,
3
+
pkgs,
4
+
lib,
5
+
...
6
+
}:
7
+
{
8
+
services.tailscale.enable = true;
9
+
networking.firewall.checkReversePath = "loose";
10
+
systemd.network.wait-online.ignoredInterfaces = [ "tailscale0" ];
11
+
networking.firewall.trustedInterfaces = [ "tailscale0" ];
12
+
boot.kernel.sysctl = {
13
+
"net.ipv4.ip_forward" = true;
14
+
"net.ipv6.conf.all.forwarding" = true;
15
+
};
16
+
}