calcite: test comin

This commit is contained in:
xinyangli 2025-03-04 18:32:55 +08:00
parent 96e02e596c
commit ccdf8021f4
Signed by: xin
SSH key fingerprint: SHA256:UU5pRTl7NiLFJbWJZa+snLylZSXIz5rgHmwjzv8v4oE
6 changed files with 41 additions and 30 deletions

8
flake.lock generated
View file

@ -401,11 +401,11 @@
"nixvim": "nixvim"
},
"locked": {
"lastModified": 1735219902,
"narHash": "sha256-s1aI4l9e0OX861wHsvAPqz/s8B9ZTltAMJzPRXt5Kqo=",
"lastModified": 1741086060,
"narHash": "sha256-35fw6MoEXEutctwNS0z7VQ0AX8thHhU2KT0UxD/s3P4=",
"ref": "refs/heads/master",
"rev": "4439691030d1a28f4ad49c542104e3f880f7c183",
"revCount": 25,
"rev": "9240bb4db98fe13b3fdaa0e15a06949959df568a",
"revCount": 26,
"type": "git",
"url": "https://git.xiny.li/xin/nixvim"
},

View file

@ -123,6 +123,9 @@
comin.nixosModules.comin
];
nodeNixosModules = {
weilite = [
./machines/weilite
];
calcite = [
nixos-hardware.nixosModules.asus-zephyrus-ga401
catppuccin.nixosModules.catppuccin
@ -269,17 +272,6 @@
] ++ sharedColmenaModules;
};
weilite =
{ ... }:
{
imports = [ machines/weilite ] ++ sharedColmenaModules;
deployment = {
targetHost = "weilite.coho-tet.ts.net";
targetPort = 22;
buildOnTarget = false;
};
nixpkgs.system = "x86_64-linux";
};
thorite =
{ ... }:
{
@ -309,6 +301,11 @@
calcite = mkNixos {
hostname = "calcite";
};
weilite = mkNixos {
hostname = "weilite";
};
baryte = mkNixos {
hostname = "baryte";
};

View file

@ -7,13 +7,4 @@ builds:
- homeConfigurations.aarch64-linux.*
- darwinConfigurations.*
- nixosConfigurations.*
branch: deploy
- include:
- '*.x86_64-linux.*'
- defaultPackage.x86_64-linux
- devShell.x86_64-linux
- homeConfigurations.x86_64-linux.*
- homeConfigurations.aarch64-linux.*
- darwinConfigurations.*
- nixosConfigurations.*
branch: next
branch: testing-calcite

View file

@ -122,6 +122,7 @@ in
enable = true;
options = {
recolor = false;
selection-clipboard = "clipboard";
};
};

View file

@ -188,8 +188,8 @@ in
services.printing.enable = true;
services.printing.drivers = [
pkgs.hplip
pkgs.gutenprint
pkgs.gutenprintBin
pkgs.canon-cups-ufr2
];
hardware.sane = {
enable = true;

View file

@ -12,19 +12,41 @@
networking = {
networkmanager = {
enable = true;
dns = "systemd-resolved";
dns = "default";
settings = {
main = {
rc-manager = "resolvconf";
};
};
};
};
services.resolved = {
networking.resolvconf = {
enable = true;
dnsExtensionMechanism = false;
useLocalResolver = false;
};
services.kresd = {
enable = true;
listenPlain = [ ];
extraConfig = ''
Cache=no
log_level("notice")
net.listen('127.0.0.1', 53)
modules = { 'hints > iterate', 'stats', 'predict' }
cache.size = 100 * MB
trust_anchors.remove(".")
policy.add(policy.all(policy.TLS_FORWARD( {
{ "8.8.8.8", hostname="dns.google" } })))
'';
# policy.add(policy.suffix(policy.FORWARD({ "100.100.100.100" }), policy.todnames({ 'coho-tet.ts.net' })))
};
# Enable Tailscale
services.tailscale.enable = true;
services.tailscale = {
enable = true;
extraUpFlags = [ "--accept-dns=false" ];
};
# services.tailscale.useRoutingFeatures = "both";
services.dae.enable = true;