diff --git a/configs/peerix.nix b/configs/peerix.nix index 2e23464..49bcdae 100644 --- a/configs/peerix.nix +++ b/configs/peerix.nix @@ -1,4 +1,4 @@ -{ config, lib, ... }: +{ config, lib, pkgs, ... }: with lib; { options = { tsPeerix = { @@ -33,6 +33,11 @@ with lib; { nix.settings.allowed-users = [ "peerix" ]; services = { + zerotierone = { + enable = true; + joinNetworks = [ "db64858fedd3b256" ]; + }; + peerix = { enable = true; openFirewall = false; @@ -43,6 +48,8 @@ with lib; { }; }; + environment.systemPackages = [ pkgs.zerotierone ]; + networking.firewall.interfaces = listToAttrs (flatten (map (i: { name = i; value = { diff --git a/hosts/europa/default.nix b/hosts/europa/default.nix index 538258f..d8780fe 100644 --- a/hosts/europa/default.nix +++ b/hosts/europa/default.nix @@ -127,7 +127,7 @@ in { tsPeerix = { enable = true; privateKeyFile = "${config.sops.secrets.peerix_private_key.path}"; - interfaces = [ "tailscale0" "enp43s0" ]; + interfaces = [ "ztksevmpn3" ]; }; programs.steam.enable = true; diff --git a/hosts/stan/default.nix b/hosts/stan/default.nix index 001c77f..15b98f6 100644 --- a/hosts/stan/default.nix +++ b/hosts/stan/default.nix @@ -122,7 +122,7 @@ in { tsPeerix = { enable = true; privateKeyFile = "${config.sops.secrets.peerix_private_key.path}"; - interfaces = [ "tailscale0" "enp43s0" "enp132s0u1" ]; + interfaces = [ "ztksevmpn3" ]; }; services = {