68 lines
1.5 KiB
Nix
68 lines
1.5 KiB
Nix
{ config
|
|
, lib
|
|
, pkgs
|
|
, ...
|
|
}:
|
|
with lib; {
|
|
options = {
|
|
tsPeerix = {
|
|
enable = mkOption {
|
|
description = "Enable peerix";
|
|
default = false;
|
|
example = true;
|
|
type = lib.types.bool;
|
|
};
|
|
privateKeyFile = mkOption {
|
|
description = "Private key file for signing";
|
|
default = "";
|
|
example = "./private_key";
|
|
type = lib.types.path;
|
|
};
|
|
interfaces = mkOption {
|
|
description = "Interfaces to allow peerix to listen on.";
|
|
type = types.listOf types.str;
|
|
default = [ "tailscale0" ];
|
|
};
|
|
};
|
|
};
|
|
|
|
config = mkIf config.tsPeerix.enable {
|
|
users.groups.peerix = { name = "peerix"; };
|
|
users.users.peerix = {
|
|
name = "peerix";
|
|
group = "peerix";
|
|
isSystemUser = true;
|
|
};
|
|
|
|
nix.settings.allowed-users = [ "peerix" ];
|
|
|
|
services = {
|
|
zerotierone = {
|
|
enable = true;
|
|
joinNetworks = [ "db64858fedd3b256" ];
|
|
};
|
|
|
|
peerix = {
|
|
enable = true;
|
|
openFirewall = false;
|
|
user = "peerix";
|
|
group = "peerix";
|
|
privateKeyFile = "${config.tsPeerix.privateKeyFile}";
|
|
publicKeyFile = ./peerix.pubs;
|
|
};
|
|
};
|
|
|
|
environment.systemPackages = [ pkgs.zerotierone ];
|
|
|
|
networking.firewall.interfaces = listToAttrs (flatten (map
|
|
(i: {
|
|
name = i;
|
|
value = {
|
|
allowedUDPPorts = [ 12304 ];
|
|
allowedTCPPorts = [ 12304 ];
|
|
};
|
|
})
|
|
config.tsPeerix.interfaces));
|
|
};
|
|
}
|