installed tailscale on all machines
This commit is contained in:
parent
9bfa5c9e8d
commit
2e0f71a6fa
7 changed files with 133 additions and 62 deletions
|
@ -1,5 +1,16 @@
|
|||
# server nas
|
||||
{pkgs, ...}: {
|
||||
{
|
||||
inputs,
|
||||
config,
|
||||
pkgs,
|
||||
...
|
||||
}: {
|
||||
sops.secrets = {
|
||||
"wireguard-keys/tailscale-authkey/defiant" = {
|
||||
sopsFile = "${inputs.secrets}/wireguard-keys.yaml";
|
||||
};
|
||||
};
|
||||
|
||||
host = {
|
||||
users = {
|
||||
leyla = {
|
||||
|
@ -136,6 +147,10 @@
|
|||
"deepseek-r1:70b"
|
||||
];
|
||||
};
|
||||
tailscale = {
|
||||
enable = true;
|
||||
authKeyFile = config.sops.secrets."wireguard-keys/tailscale-authkey/defiant".path;
|
||||
};
|
||||
};
|
||||
|
||||
# disable computer sleeping
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
{
|
||||
config,
|
||||
inputs,
|
||||
pkgs,
|
||||
...
|
||||
|
@ -36,6 +37,15 @@
|
|||
|
||||
programs.adb.enable = true;
|
||||
|
||||
sops.secrets = {
|
||||
"wireguard-keys/tailscale-authkey/horizon" = {
|
||||
sopsFile = "${inputs.secrets}/wireguard-keys.yaml";
|
||||
};
|
||||
# "wireguard-keys/proton/horizon" = {
|
||||
# sopsFile = "${inputs.secrets}/wireguard-keys.yaml";
|
||||
# };
|
||||
};
|
||||
|
||||
services = {
|
||||
# sudo fprintd-enroll
|
||||
fprintd = {
|
||||
|
@ -49,6 +59,42 @@
|
|||
"deepseek-r1:1.5b"
|
||||
];
|
||||
};
|
||||
tailscale = {
|
||||
enable = true;
|
||||
authKeyFile = config.sops.secrets."wireguard-keys/tailscale-authkey/horizon".path;
|
||||
};
|
||||
};
|
||||
|
||||
networking = {
|
||||
# wg-quick.interfaces = {
|
||||
# proton = {
|
||||
# # IP address of this machine in the *tunnel network*
|
||||
# address = ["10.2.0.1/32"];
|
||||
|
||||
# listenPort = 51820;
|
||||
|
||||
# privateKeyFile = config.sops.secrets."wireguard-keys/proton/horizon".path;
|
||||
|
||||
# peers = [
|
||||
# {
|
||||
# publicKey = "Yu2fgynXUAASCkkrXWj76LRriFxKMTQq+zjTzyOKG1Q=";
|
||||
# allowedIPs = ["0.0.0.0/0"];
|
||||
# endpoint = "84.17.63.8:51820";
|
||||
# persistentKeepalive = 25;
|
||||
# }
|
||||
# {
|
||||
# publicKey = "OIPOmEDCJfuvTJ0dugMtY5L14gVpfpDdY3suniY5h3Y=";
|
||||
# allowedIPs = ["0.0.0.0/0"];
|
||||
# endpoint = "68.169.42.242:51820";
|
||||
# persistentKeepalive = 25;
|
||||
# }
|
||||
# {
|
||||
# publicKey = "uvEa3sdmi5d/OxozjecVIGQHgw4H42mNIX/QOulwDhs=";
|
||||
# allowedIPs = ["0.0.0.0/0"];
|
||||
# }
|
||||
# ];
|
||||
# };
|
||||
# };
|
||||
};
|
||||
|
||||
# networking.extraHosts = ''
|
||||
|
|
|
@ -6,19 +6,12 @@
|
|||
lib,
|
||||
pkgs,
|
||||
modulesPath,
|
||||
inputs,
|
||||
...
|
||||
}: {
|
||||
imports = [
|
||||
(modulesPath + "/installer/scan/not-detected.nix")
|
||||
];
|
||||
|
||||
sops.secrets = {
|
||||
"wireguard-keys/proton/horizon" = {
|
||||
sopsFile = "${inputs.secrets}/wireguard-keys.yaml";
|
||||
};
|
||||
};
|
||||
|
||||
boot = {
|
||||
initrd = {
|
||||
availableKernelModules = ["xhci_pci" "thunderbolt" "nvme" "usb_storage" "sd_mod"];
|
||||
|
@ -96,36 +89,6 @@
|
|||
networkmanager.enable = true;
|
||||
useDHCP = lib.mkDefault true;
|
||||
hostName = "horizon"; # Define your hostname.
|
||||
|
||||
# wg-quick.interfaces = {
|
||||
# proton = {
|
||||
# # IP address of this machine in the *tunnel network*
|
||||
# address = ["10.2.0.1/32"];
|
||||
|
||||
# listenPort = 51820;
|
||||
|
||||
# privateKeyFile = config.sops.secrets."wireguard-keys/proton/horizon".path;
|
||||
|
||||
# peers = [
|
||||
# {
|
||||
# publicKey = "Yu2fgynXUAASCkkrXWj76LRriFxKMTQq+zjTzyOKG1Q=";
|
||||
# allowedIPs = ["0.0.0.0/0"];
|
||||
# endpoint = "84.17.63.8:51820";
|
||||
# persistentKeepalive = 25;
|
||||
# }
|
||||
# {
|
||||
# publicKey = "OIPOmEDCJfuvTJ0dugMtY5L14gVpfpDdY3suniY5h3Y=";
|
||||
# allowedIPs = ["0.0.0.0/0"];
|
||||
# endpoint = "68.169.42.242:51820";
|
||||
# persistentKeepalive = 25;
|
||||
# }
|
||||
# {
|
||||
# publicKey = "uvEa3sdmi5d/OxozjecVIGQHgw4H42mNIX/QOulwDhs=";
|
||||
# allowedIPs = ["0.0.0.0/0"];
|
||||
# }
|
||||
# ];
|
||||
# };
|
||||
# };
|
||||
};
|
||||
|
||||
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
||||
|
|
|
@ -1,10 +1,19 @@
|
|||
{...}: {
|
||||
{
|
||||
inputs,
|
||||
config,
|
||||
...
|
||||
}: {
|
||||
imports = [
|
||||
./monitors.nix
|
||||
];
|
||||
|
||||
nixpkgs.config.allowUnfree = true;
|
||||
|
||||
sops.secrets = {
|
||||
"wireguard-keys/tailscale-authkey/twilight" = {
|
||||
sopsFile = "${inputs.secrets}/wireguard-keys.yaml";
|
||||
};
|
||||
};
|
||||
host = {
|
||||
users = {
|
||||
leyla = {
|
||||
|
@ -22,16 +31,22 @@
|
|||
};
|
||||
};
|
||||
|
||||
services.ollama = {
|
||||
enable = true;
|
||||
services = {
|
||||
ollama = {
|
||||
enable = true;
|
||||
|
||||
loadModels = [
|
||||
"deepseek-coder:6.7b"
|
||||
"deepseek-r1:8b"
|
||||
"deepseek-r1:32b"
|
||||
];
|
||||
loadModels = [
|
||||
"deepseek-coder:6.7b"
|
||||
"deepseek-r1:8b"
|
||||
"deepseek-r1:32b"
|
||||
];
|
||||
};
|
||||
|
||||
tailscale = {
|
||||
enable = true;
|
||||
authKeyFile = config.sops.secrets."wireguard-keys/tailscale-authkey/twilight".path;
|
||||
};
|
||||
};
|
||||
|
||||
programs.steam = {
|
||||
enable = true;
|
||||
remotePlay.openFirewall = true; # Open ports in the firewall for Steam Remote Play
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue