calcite: test comin
This commit is contained in:
parent
96e02e596c
commit
2f14c00f4e
5 changed files with 37 additions and 26 deletions
19
flake.nix
19
flake.nix
|
@ -123,6 +123,9 @@
|
|||
comin.nixosModules.comin
|
||||
];
|
||||
nodeNixosModules = {
|
||||
weilite = [
|
||||
./machines/weilite
|
||||
];
|
||||
calcite = [
|
||||
nixos-hardware.nixosModules.asus-zephyrus-ga401
|
||||
catppuccin.nixosModules.catppuccin
|
||||
|
@ -269,17 +272,6 @@
|
|||
] ++ sharedColmenaModules;
|
||||
};
|
||||
|
||||
weilite =
|
||||
{ ... }:
|
||||
{
|
||||
imports = [ machines/weilite ] ++ sharedColmenaModules;
|
||||
deployment = {
|
||||
targetHost = "weilite.coho-tet.ts.net";
|
||||
targetPort = 22;
|
||||
buildOnTarget = false;
|
||||
};
|
||||
nixpkgs.system = "x86_64-linux";
|
||||
};
|
||||
thorite =
|
||||
{ ... }:
|
||||
{
|
||||
|
@ -309,6 +301,11 @@
|
|||
calcite = mkNixos {
|
||||
hostname = "calcite";
|
||||
};
|
||||
|
||||
weilite = mkNixos {
|
||||
hostname = "weilite";
|
||||
};
|
||||
|
||||
baryte = mkNixos {
|
||||
hostname = "baryte";
|
||||
};
|
||||
|
|
11
garnix.yaml
11
garnix.yaml
|
@ -7,13 +7,4 @@ builds:
|
|||
- homeConfigurations.aarch64-linux.*
|
||||
- darwinConfigurations.*
|
||||
- nixosConfigurations.*
|
||||
branch: deploy
|
||||
- include:
|
||||
- '*.x86_64-linux.*'
|
||||
- defaultPackage.x86_64-linux
|
||||
- devShell.x86_64-linux
|
||||
- homeConfigurations.x86_64-linux.*
|
||||
- homeConfigurations.aarch64-linux.*
|
||||
- darwinConfigurations.*
|
||||
- nixosConfigurations.*
|
||||
branch: next
|
||||
branch: testing-calcite
|
||||
|
|
|
@ -122,6 +122,7 @@ in
|
|||
enable = true;
|
||||
options = {
|
||||
recolor = false;
|
||||
selection-clipboard = "clipboard";
|
||||
};
|
||||
};
|
||||
|
||||
|
|
|
@ -188,8 +188,8 @@ in
|
|||
services.printing.enable = true;
|
||||
services.printing.drivers = [
|
||||
pkgs.hplip
|
||||
pkgs.gutenprint
|
||||
pkgs.gutenprintBin
|
||||
pkgs.canon-cups-ufr2
|
||||
];
|
||||
hardware.sane = {
|
||||
enable = true;
|
||||
|
|
|
@ -12,19 +12,41 @@
|
|||
networking = {
|
||||
networkmanager = {
|
||||
enable = true;
|
||||
dns = "systemd-resolved";
|
||||
dns = "default";
|
||||
settings = {
|
||||
main = {
|
||||
rc-manager = "resolvconf";
|
||||
};
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
services.resolved = {
|
||||
networking.resolvconf = {
|
||||
enable = true;
|
||||
dnsExtensionMechanism = false;
|
||||
useLocalResolver = false;
|
||||
};
|
||||
|
||||
services.kresd = {
|
||||
enable = true;
|
||||
listenPlain = [ ];
|
||||
extraConfig = ''
|
||||
Cache=no
|
||||
log_level("notice")
|
||||
net.listen('127.0.0.1', 53)
|
||||
modules = { 'hints > iterate', 'stats', 'predict' }
|
||||
cache.size = 100 * MB
|
||||
trust_anchors.remove(".")
|
||||
policy.add(policy.all(policy.TLS_FORWARD( {
|
||||
{ "8.8.8.8", hostname="dns.google" } })))
|
||||
'';
|
||||
# policy.add(policy.suffix(policy.FORWARD({ "100.100.100.100" }), policy.todnames({ 'coho-tet.ts.net' })))
|
||||
};
|
||||
|
||||
# Enable Tailscale
|
||||
services.tailscale.enable = true;
|
||||
services.tailscale = {
|
||||
enable = true;
|
||||
extraUpFlags = [ "--accept-dns=false" ];
|
||||
};
|
||||
# services.tailscale.useRoutingFeatures = "both";
|
||||
|
||||
services.dae.enable = true;
|
||||
|
|
Loading…
Add table
Reference in a new issue