NixOS system configurations + dotfiles via home-manager

tailscale: factor into separate module

Changed files
+19 -9
modules
+1
modules/machines.nix
··· 35 35 ../modules/niri.nix 36 36 ../modules/steam.nix 37 37 ../modules/gnome.nix 38 + ../modules/tailscale.nix 38 39 inputs.srvos.nixosModules.hardware-vultr-vm 39 40 inputs.nixos-hardware.nixosModules.common-gpu-amd 40 41 ];
+2 -9
modules/nixos.nix
··· 5 5 ... 6 6 }: 7 7 { 8 + imports = [ ./tailscale.nix ]; 9 + 8 10 environment = { 9 11 systemPackages = with pkgs; [ 10 12 binutils ··· 29 31 programs.ssh.startAgent = true; 30 32 31 33 networking.nftables.enable = true; 32 - 33 - services.tailscale.enable = !config.boot.isContainer; 34 - networking.firewall.checkReversePath = "loose"; 35 - systemd.network.wait-online.ignoredInterfaces = [ "tailscale0" ]; 36 - networking.firewall.trustedInterfaces = [ "tailscale0" ]; 37 - boot.kernel.sysctl = { 38 - "net.ipv4.ip_forward" = true; 39 - "net.ipv6.conf.all.forwarding" = true; 40 - }; 41 34 42 35 services.fstrim.enable = true; 43 36
+16
modules/tailscale.nix
··· 1 + { 2 + config, 3 + pkgs, 4 + lib, 5 + ... 6 + }: 7 + { 8 + services.tailscale.enable = true; 9 + networking.firewall.checkReversePath = "loose"; 10 + systemd.network.wait-online.ignoredInterfaces = [ "tailscale0" ]; 11 + networking.firewall.trustedInterfaces = [ "tailscale0" ]; 12 + boot.kernel.sysctl = { 13 + "net.ipv4.ip_forward" = true; 14 + "net.ipv6.conf.all.forwarding" = true; 15 + }; 16 + }