From b0429272f44cf8b85268d14ef69ffdb9ef8b6c84 Mon Sep 17 00:00:00 2001 From: alsaiduq-lab Date: Tue, 2 Sep 2025 13:20:43 -0600 Subject: [PATCH] update --- flake.lock | 32 ++++++++++++++++---------------- hosts/hardware-configuration.nix | 10 ++++++---- hosts/modules/tailscale.nix | 12 +++++++++--- 3 files changed, 31 insertions(+), 23 deletions(-) diff --git a/flake.lock b/flake.lock index dce8e44..9464119 100644 --- a/flake.lock +++ b/flake.lock @@ -82,11 +82,11 @@ ] }, "locked": { - "lastModified": 1755776884, - "narHash": "sha256-CPM7zm6csUx7vSfKvzMDIjepEJv1u/usmaT7zydzbuI=", + "lastModified": 1756679287, + "narHash": "sha256-Xd1vOeY9ccDf5VtVK12yM0FS6qqvfUop8UQlxEB+gTQ=", "owner": "nix-community", "repo": "home-manager", - "rev": "4fb695d10890e9fc6a19deadf85ff79ffb78da86", + "rev": "07fc025fe10487dd80f2ec694f1cd790e752d0e8", "type": "github" }, "original": { @@ -99,11 +99,11 @@ "i3-dotfiles": { "flake": false, "locked": { - "lastModified": 1754937929, - "narHash": "sha256-yVq6tSNi3L7KLoIaHJeTxrx2bli+6hqVhXRDkE528nE=", + "lastModified": 1756051379, + "narHash": "sha256-l1FDSO4/aqOEBQv7GPc96azTLWPCuwMMTW2mankB1S8=", "ref": "refs/heads/master", - "rev": "401c85b3dc19866c983a81dfc1c1b6c02b334073", - "revCount": 8, + "rev": "a89e12d6f50fbcae982e5ed84c5f18fdd7b92887", + "revCount": 11, "type": "git", "url": "ssh://git@github.com/alsaiduq-lab/i3-dotfiles" }, @@ -120,11 +120,11 @@ ] }, "locked": { - "lastModified": 1755655044, - "narHash": "sha256-43fb+p7xXCIimF7r8XhrDKo3uTkeKhMbzcJ4VdUOG/M=", + "lastModified": 1756692364, + "narHash": "sha256-EOJPoJfw8E+EVdGcKyVYntHnUovu6f/LhZNYWoaSdd0=", "owner": "fufexan", "repo": "nix-gaming", - "rev": "96cda5144e73514cd52d3e0e8b2bf116a5266b22", + "rev": "23deedafada335ffa29d4adccebbb491cf55e3f0", "type": "github" }, "original": { @@ -163,11 +163,11 @@ }, "nixpkgs_2": { "locked": { - "lastModified": 1755704039, - "narHash": "sha256-gKlP0LbyJ3qX0KObfIWcp5nbuHSb5EHwIvU6UcNBg2A=", + "lastModified": 1756754095, + "narHash": "sha256-9Rsn9XEWINExosFkKEqdp8EI6Mujr1gmQiyrEcts2ls=", "owner": "NixOS", "repo": "nixpkgs", - "rev": "9cb344e96d5b6918e94e1bca2d9f3ea1e9615545", + "rev": "7c815e513adbf03c9098b2bd230c1e0525c8a7f9", "type": "github" }, "original": { @@ -204,11 +204,11 @@ }, "unstable": { "locked": { - "lastModified": 1755736253, - "narHash": "sha256-jlIQRypNhB1PcB1BE+expE4xZeJxzoAGr1iUbHQta8s=", + "lastModified": 1756696532, + "narHash": "sha256-6FWagzm0b7I/IGigOv9pr6LL7NQ86mextfE8g8Q6HBg=", "owner": "NixOS", "repo": "nixpkgs", - "rev": "596312aae91421d6923f18cecce934a7d3bfd6b8", + "rev": "58dcbf1ec551914c3756c267b8b9c8c86baa1b2f", "type": "github" }, "original": { diff --git a/hosts/hardware-configuration.nix b/hosts/hardware-configuration.nix index d703756..36e368b 100644 --- a/hosts/hardware-configuration.nix +++ b/hosts/hardware-configuration.nix @@ -8,23 +8,25 @@ [ (modulesPath + "/installer/scan/not-detected.nix") ]; - boot.initrd.availableKernelModules = [ "nvme" "xhci_pci" "ahci" "usbhid" "usb_storage" "uas" "sd_mod" ]; + boot.initrd.availableKernelModules = [ "nvme" "xhci_pci" "ahci" "usbhid" "uas" "sd_mod" ]; boot.initrd.kernelModules = [ ]; boot.kernelModules = [ "kvm-amd" ]; boot.extraModulePackages = [ ]; fileSystems."/" = - { device = "/dev/disk/by-uuid/dfac5ce5-a84e-4956-8b7d-e7f7f9fd6131"; + { device = "/dev/disk/by-uuid/042fab51-5d9c-454f-bd8f-315af4060a7d"; fsType = "ext4"; }; fileSystems."/boot" = - { device = "/dev/disk/by-uuid/1C7F-E72A"; + { device = "/dev/disk/by-uuid/5830-C7C5"; fsType = "vfat"; options = [ "fmask=0077" "dmask=0077" ]; }; - swapDevices = [ ]; + swapDevices = + [ { device = "/dev/disk/by-uuid/68153c66-e234-49a8-9ec3-7e9af73efd1c"; } + ]; # Enables DHCP on each ethernet and wireless interface. In case of scripted networking # (the default) this is the recommended approach. When using systemd-networkd it's diff --git a/hosts/modules/tailscale.nix b/hosts/modules/tailscale.nix index a86274a..fcec4e5 100644 --- a/hosts/modules/tailscale.nix +++ b/hosts/modules/tailscale.nix @@ -1,10 +1,16 @@ -{...}: { +{ pkgs, ... }: +{ services.tailscale = { enable = true; + # some tailscale update forced this + package = pkgs.tailscale.overrideAttrs (_: { + doCheck = false; + checkPhase = "true"; + }); }; networking.firewall = { - allowedUDPPorts = [41641]; - trustedInterfaces = ["tailscale0"]; + allowedUDPPorts = [ 41641 ]; + trustedInterfaces = [ "tailscale0" ]; }; }