This commit is contained in:
alsaiduq-lab 2025-09-02 13:20:43 -06:00
parent f8a5e7a715
commit b0429272f4
3 changed files with 31 additions and 23 deletions

32
flake.lock generated
View file

@ -82,11 +82,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1755776884, "lastModified": 1756679287,
"narHash": "sha256-CPM7zm6csUx7vSfKvzMDIjepEJv1u/usmaT7zydzbuI=", "narHash": "sha256-Xd1vOeY9ccDf5VtVK12yM0FS6qqvfUop8UQlxEB+gTQ=",
"owner": "nix-community", "owner": "nix-community",
"repo": "home-manager", "repo": "home-manager",
"rev": "4fb695d10890e9fc6a19deadf85ff79ffb78da86", "rev": "07fc025fe10487dd80f2ec694f1cd790e752d0e8",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -99,11 +99,11 @@
"i3-dotfiles": { "i3-dotfiles": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1754937929, "lastModified": 1756051379,
"narHash": "sha256-yVq6tSNi3L7KLoIaHJeTxrx2bli+6hqVhXRDkE528nE=", "narHash": "sha256-l1FDSO4/aqOEBQv7GPc96azTLWPCuwMMTW2mankB1S8=",
"ref": "refs/heads/master", "ref": "refs/heads/master",
"rev": "401c85b3dc19866c983a81dfc1c1b6c02b334073", "rev": "a89e12d6f50fbcae982e5ed84c5f18fdd7b92887",
"revCount": 8, "revCount": 11,
"type": "git", "type": "git",
"url": "ssh://git@github.com/alsaiduq-lab/i3-dotfiles" "url": "ssh://git@github.com/alsaiduq-lab/i3-dotfiles"
}, },
@ -120,11 +120,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1755655044, "lastModified": 1756692364,
"narHash": "sha256-43fb+p7xXCIimF7r8XhrDKo3uTkeKhMbzcJ4VdUOG/M=", "narHash": "sha256-EOJPoJfw8E+EVdGcKyVYntHnUovu6f/LhZNYWoaSdd0=",
"owner": "fufexan", "owner": "fufexan",
"repo": "nix-gaming", "repo": "nix-gaming",
"rev": "96cda5144e73514cd52d3e0e8b2bf116a5266b22", "rev": "23deedafada335ffa29d4adccebbb491cf55e3f0",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -163,11 +163,11 @@
}, },
"nixpkgs_2": { "nixpkgs_2": {
"locked": { "locked": {
"lastModified": 1755704039, "lastModified": 1756754095,
"narHash": "sha256-gKlP0LbyJ3qX0KObfIWcp5nbuHSb5EHwIvU6UcNBg2A=", "narHash": "sha256-9Rsn9XEWINExosFkKEqdp8EI6Mujr1gmQiyrEcts2ls=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "9cb344e96d5b6918e94e1bca2d9f3ea1e9615545", "rev": "7c815e513adbf03c9098b2bd230c1e0525c8a7f9",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -204,11 +204,11 @@
}, },
"unstable": { "unstable": {
"locked": { "locked": {
"lastModified": 1755736253, "lastModified": 1756696532,
"narHash": "sha256-jlIQRypNhB1PcB1BE+expE4xZeJxzoAGr1iUbHQta8s=", "narHash": "sha256-6FWagzm0b7I/IGigOv9pr6LL7NQ86mextfE8g8Q6HBg=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "596312aae91421d6923f18cecce934a7d3bfd6b8", "rev": "58dcbf1ec551914c3756c267b8b9c8c86baa1b2f",
"type": "github" "type": "github"
}, },
"original": { "original": {

View file

@ -8,23 +8,25 @@
[ (modulesPath + "/installer/scan/not-detected.nix") [ (modulesPath + "/installer/scan/not-detected.nix")
]; ];
boot.initrd.availableKernelModules = [ "nvme" "xhci_pci" "ahci" "usbhid" "usb_storage" "uas" "sd_mod" ]; boot.initrd.availableKernelModules = [ "nvme" "xhci_pci" "ahci" "usbhid" "uas" "sd_mod" ];
boot.initrd.kernelModules = [ ]; boot.initrd.kernelModules = [ ];
boot.kernelModules = [ "kvm-amd" ]; boot.kernelModules = [ "kvm-amd" ];
boot.extraModulePackages = [ ]; boot.extraModulePackages = [ ];
fileSystems."/" = fileSystems."/" =
{ device = "/dev/disk/by-uuid/dfac5ce5-a84e-4956-8b7d-e7f7f9fd6131"; { device = "/dev/disk/by-uuid/042fab51-5d9c-454f-bd8f-315af4060a7d";
fsType = "ext4"; fsType = "ext4";
}; };
fileSystems."/boot" = fileSystems."/boot" =
{ device = "/dev/disk/by-uuid/1C7F-E72A"; { device = "/dev/disk/by-uuid/5830-C7C5";
fsType = "vfat"; fsType = "vfat";
options = [ "fmask=0077" "dmask=0077" ]; options = [ "fmask=0077" "dmask=0077" ];
}; };
swapDevices = [ ]; swapDevices =
[ { device = "/dev/disk/by-uuid/68153c66-e234-49a8-9ec3-7e9af73efd1c"; }
];
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking # Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's # (the default) this is the recommended approach. When using systemd-networkd it's

View file

@ -1,10 +1,16 @@
{...}: { { pkgs, ... }:
{
services.tailscale = { services.tailscale = {
enable = true; enable = true;
# some tailscale update forced this
package = pkgs.tailscale.overrideAttrs (_: {
doCheck = false;
checkPhase = "true";
});
}; };
networking.firewall = { networking.firewall = {
allowedUDPPorts = [41641]; allowedUDPPorts = [ 41641 ];
trustedInterfaces = ["tailscale0"]; trustedInterfaces = [ "tailscale0" ];
}; };
} }