Add Intuos
This commit is contained in:
parent
ef3a258b17
commit
56a402c7db
5 changed files with 5 additions and 3 deletions
|
@ -7,6 +7,7 @@
|
||||||
matchBlocks = {
|
matchBlocks = {
|
||||||
# Personal servers
|
# Personal servers
|
||||||
tower.hostname = "4e4:535:9d47:f367:becd:6557:458d:5b1b";
|
tower.hostname = "4e4:535:9d47:f367:becd:6557:458d:5b1b";
|
||||||
|
intuos.hostname = "40e:404:a427:da33:163e:97b3:a2a3:9ed4";
|
||||||
jupiter.hostname = "5ce:969c:40d1:9575:f5e:591d:c377:a20b";
|
jupiter.hostname = "5ce:969c:40d1:9575:f5e:591d:c377:a20b";
|
||||||
midas.hostname = "538:e163:87ba:f847:3646:18b6:6b01:d8f8";
|
midas.hostname = "538:e163:87ba:f847:3646:18b6:6b01:d8f8";
|
||||||
kitty.hostname = "53f:dc2d:80c9:3ca2:4b15:ef4d:38a0:c868";
|
kitty.hostname = "53f:dc2d:80c9:3ca2:4b15:ef4d:38a0:c868";
|
||||||
|
|
|
@ -6,6 +6,7 @@
|
||||||
|
|
||||||
config.services.mycelium.ips = {
|
config.services.mycelium.ips = {
|
||||||
tower = "4e4:535:9d47:f367:becd:6557:458d:5b1b";
|
tower = "4e4:535:9d47:f367:becd:6557:458d:5b1b";
|
||||||
|
intuos = "40e:404:a427:da33:163e:97b3:a2a3:9ed4";
|
||||||
jupiter = "5ce:969c:40d1:9575:f5e:591d:c377:a20b";
|
jupiter = "5ce:969c:40d1:9575:f5e:591d:c377:a20b";
|
||||||
midas = "538:e163:87ba:f847:3646:18b6:6b01:d8f8";
|
midas = "538:e163:87ba:f847:3646:18b6:6b01:d8f8";
|
||||||
kitty = "53f:dc2d:80c9:3ca2:4b15:ef4d:38a0:c868";
|
kitty = "53f:dc2d:80c9:3ca2:4b15:ef4d:38a0:c868";
|
||||||
|
|
|
@ -5,7 +5,7 @@
|
||||||
config = lib.mkIf config.services.nfs.server.enable {
|
config = lib.mkIf config.services.nfs.server.enable {
|
||||||
services.nfs.server.exports = "/storage *(rw)";
|
services.nfs.server.exports = "/storage *(rw)";
|
||||||
networking.firewall.extraInputRules = with config.services.mycelium.ips; ''
|
networking.firewall.extraInputRules = with config.services.mycelium.ips; ''
|
||||||
ip6 saddr { ${tower}, ${jupiter}, ${midas}, ${kitty}, ${prophet} } tcp dport 2049 accept
|
ip6 saddr { ${tower}, ${intuos}, ${jupiter}, ${midas}, ${kitty}, ${prophet} } tcp dport 2049 accept
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -24,7 +24,7 @@
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
networking.firewall.extraInputRules = with config.services.mycelium.ips; ''
|
networking.firewall.extraInputRules = with config.services.mycelium.ips; ''
|
||||||
ip6 saddr { ${tower}, ${jupiter} } tcp dport 1935 accept
|
ip6 saddr { ${tower}, ${intuos}, ${jupiter} } tcp dport 1935 accept
|
||||||
ip saddr { ${config.secrets.ips.luna}, ${config.secrets.ips.corn} } tcp dport 1935 accept
|
ip saddr { ${config.secrets.ips.luna}, ${config.secrets.ips.corn} } tcp dport 1935 accept
|
||||||
'';
|
'';
|
||||||
systemd.services.nginx.serviceConfig.ReadWritePaths = [ "/var/www/landing-page/streams/hls/" ];
|
systemd.services.nginx.serviceConfig.ReadWritePaths = [ "/var/www/landing-page/streams/hls/" ];
|
||||||
|
|
|
@ -8,7 +8,7 @@
|
||||||
rtmp-port = 1945;
|
rtmp-port = 1945;
|
||||||
};
|
};
|
||||||
networking.firewall.extraInputRules = with config.services.mycelium.ips; ''
|
networking.firewall.extraInputRules = with config.services.mycelium.ips; ''
|
||||||
ip6 saddr { ${tower}, ${jupiter} } tcp dport 1935 accept
|
ip6 saddr { ${tower}, ${intuos}, ${jupiter} } tcp dport 1935 accept
|
||||||
'';
|
'';
|
||||||
environment.persistence."/persist".directories = [ "/var/lib/owncast" ];
|
environment.persistence."/persist".directories = [ "/var/lib/owncast" ];
|
||||||
};
|
};
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue