{ inputs, config, lib, pkgs, modulesPath, desktop, username, platform, ... }: { imports = [ (modulesPath + "/installer/scan/not-detected.nix") ../../common/modules/secureboot.nix ../../common/modules/ssh-luks.nix ../../common/services/podman.nix ./disks.nix ./mounts.nix ./cron.nix ]; environment.systemPackages = [ inputs.deploy-rs.packages.${platform}.deploy-rs ]; # steam , etc nixpkgs.config.allowUnfree = true; boot.initrd.availableKernelModules = [ "xhci_pci" "nvme" "thunderbolt" "sd_mod" "uas" ]; boot.initrd.kernelModules = [ "r8152" ]; boot.kernelModules = [ "kvm-intel" ]; boot.extraModulePackages = with config.boot.kernelPackages; [ acpi_call ]; networking.useDHCP = lib.mkDefault true; nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux"; powerManagement.cpuFreqGovernor = lib.mkDefault "performance"; hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware; # Set your time zone. time.timeZone = "America/Los_Angeles"; # Set the networking hostname: networking.hostName = "nuc-server"; networking.firewall.allowedTCPPorts = [ 22 ]; # Generic Tailscale configs are in /nixos/common/services/tailscale.nix # Set up the secrets file: sops.secrets."tailscale_keys/nuc-server" = { owner = "root"; sopsFile = ../../../secrets/tailscale.yaml; restartUnits = [ "tailscaled.service" "tailscaled-autoconnect.service" ]; }; services.tailscale.authKeyFile = "/run/secrets/tailscale_keys/nuc-server"; services.tailscale.extraUpFlags = [ "--advertise-exit-node" "--advertise-routes=10.2.0.0/24,192.168.1.13/32,192.168.1.14/32" ]; boot.kernel.sysctl = { "net.ipv4.ip_forward" = true; }; }