diff --git a/configurations/nixos/defiant/hardware-configuration.nix b/configurations/nixos/defiant/hardware-configuration.nix index 85dcd9e..3b3ac45 100644 --- a/configurations/nixos/defiant/hardware-configuration.nix +++ b/configurations/nixos/defiant/hardware-configuration.nix @@ -72,7 +72,7 @@ networkConfig.DHCP = "yes"; address = [ - "192.168.1.10/24" + "192.168.1.10" ]; gateway = ["192.168.1.1"]; diff --git a/configurations/nixos/horizon/configuration.nix b/configurations/nixos/horizon/configuration.nix index 082824d..dabb2cf 100644 --- a/configurations/nixos/horizon/configuration.nix +++ b/configurations/nixos/horizon/configuration.nix @@ -31,9 +31,6 @@ "wireguard-keys/tailscale-authkey/horizon" = { sopsFile = "${inputs.secrets}/wireguard-keys.yaml"; }; - # "wireguard-keys/proton/horizon" = { - # sopsFile = "${inputs.secrets}/wireguard-keys.yaml"; - # }; }; services = { @@ -58,46 +55,6 @@ syncthing.enable = true; }; - networking = { - # wg-quick.interfaces = { - # proton = { - # # IP address of this machine in the *tunnel network* - # address = ["10.2.0.1/32"]; - - # listenPort = 51820; - - # privateKeyFile = config.sops.secrets."wireguard-keys/proton/horizon".path; - - # peers = [ - # { - # publicKey = "Yu2fgynXUAASCkkrXWj76LRriFxKMTQq+zjTzyOKG1Q="; - # allowedIPs = ["0.0.0.0/0"]; - # endpoint = "84.17.63.8:51820"; - # persistentKeepalive = 25; - # } - # { - # publicKey = "OIPOmEDCJfuvTJ0dugMtY5L14gVpfpDdY3suniY5h3Y="; - # allowedIPs = ["0.0.0.0/0"]; - # endpoint = "68.169.42.242:51820"; - # persistentKeepalive = 25; - # } - # { - # publicKey = "uvEa3sdmi5d/OxozjecVIGQHgw4H42mNIX/QOulwDhs="; - # allowedIPs = ["0.0.0.0/0"]; - # } - # ]; - # }; - # }; - }; - - # networking.extraHosts = '' - # # 192.168.1.204 jan-leila.com - # 192.168.1.204 media.jan-leila.com - # # 192.168.1.204 drive.jan-leila.com - # 192.168.1.204 git.jan-leila.com - # # 192.168.1.204 search.jan-leila.com - # ''; - # Enable touchpad support (enabled default in most desktopManager). # services.xserver.libinput.enable = true; diff --git a/modules/nixos-modules/server/jellyfin.nix b/modules/nixos-modules/server/jellyfin.nix index 010ea1a..49d9a9f 100644 --- a/modules/nixos-modules/server/jellyfin.nix +++ b/modules/nixos-modules/server/jellyfin.nix @@ -49,6 +49,8 @@ in { pkgs.jellyfin-web pkgs.jellyfin-ffmpeg ]; + + networking.firewall.allowedTCPPorts = [jellyfinPort]; } (lib.mkIf config.services.fail2ban.enable { environment.etc = {