jklasdljkdasjklasdlkj

This commit is contained in:
2025-10-31 22:12:21 +01:00
parent 5eb6ac7018
commit 4905d70abe
3 changed files with 17 additions and 8 deletions

View File

@@ -74,8 +74,9 @@ ssh.proxyJump = "login.stud.ntnu.no" # login.pvv.ntnu.no
# ssh.connectTimeout = 3
# wakeonlan 4c:cc:6a:05:51:01
["garp.tail9aac63.ts.net"] # gtx 1080
# aliases = [ "garp.pbsds.net" ]
#["garp.tail9aac63.ts.net"] # gtx 1080
["garp.tail9aac63.ts.net"] # gtx 3060 ti
aliases = [ "garp.pbsds.net" ]
buildMachine.systems = ["x86_64-linux", "i686-linux", "riscv64-linux"]
buildMachine.maxJobs = 2 # 8 threads 32GB
buildMachine.speedFactor = 4 # i7-6700

View File

@@ -17,9 +17,13 @@ lib.mkIf (!config.virtualisation.isVmVariant)
services.tailscale.authKeyFile = config.sops.secrets.tailscale-authkey-inner.path; # also enables autoconnect
sops.secrets.tailscale-authkey-inner.sopsFile = ../secrets/tailscale-inner.yaml;
# # Strict reverse path filtering breaks Tailscale exit node use and some subnet routing setups
# # https://github.com/tailscale/tailscale/issues/4432#issuecomment-1112819111
# networking.firewall.checkReversePath = "loose";
# https://wiki.nixos.org/wiki/Tailscale#DNS
services.resolved.enable = lib.mkDefault config.networking.networkmanager.enable;
# Strict reverse path filtering breaks Tailscale exit node use and some subnet routing setups
# https://wiki.nixos.org/wiki/Tailscale#No_internet_when_using_exit_node
# https://github.com/tailscale/tailscale/issues/4432#issuecomment-1112819111
networking.firewall.checkReversePath = lib.mkDefault "loose";
# TODO: why do people do this?
# networking.firewall.trustedInterfaces = [ interfaceName ];

View File

@@ -17,9 +17,13 @@ lib.mkIf (!config.virtualisation.isVmVariant)
services.tailscale.authKeyFile = config.sops.secrets.tailscale-authkey-outer.path; # also enables autoconnect
sops.secrets.tailscale-authkey-outer.sopsFile = ../secrets/tailscale-outer.yaml;
# # Strict reverse path filtering breaks Tailscale exit node use and some subnet routing setups
# # https://github.com/tailscale/tailscale/issues/4432#issuecomment-1112819111
# networking.firewall.checkReversePath = "loose";
# https://wiki.nixos.org/wiki/Tailscale#DNS
services.resolved.enable = lib.mkDefault config.networking.networkmanager.enable;
# Strict reverse path filtering breaks Tailscale exit node use and some subnet routing setups
# https://wiki.nixos.org/wiki/Tailscale#No_internet_when_using_exit_node
# https://github.com/tailscale/tailscale/issues/4432#issuecomment-1112819111
networking.firewall.checkReversePath = lib.mkDefault "loose";
# TODO: why do people do this?
# networking.firewall.trustedInterfaces = [ interfaceName ];