diff --git a/roles/yggdrasil-client.nix b/roles/yggdrasil-client.nix index 4fd9ade..c2fc6b5 100644 --- a/roles/yggdrasil-client.nix +++ b/roles/yggdrasil-client.nix @@ -9,8 +9,7 @@ in { services.yggdrasil = { enable = true; persistentKeys = true; - settings = - { + settings = { # Not connecting to global ygg network Peers = lib.mkDefault [ "quic://${secrets.yggdrasil-peer}:60003?password=${secrets.yggdrasil-password}" diff --git a/roles/yggdrasil-peer.nix b/roles/yggdrasil-peer.nix index 38a6ce9..40ea9b7 100644 --- a/roles/yggdrasil-peer.nix +++ b/roles/yggdrasil-peer.nix @@ -6,18 +6,15 @@ in { lib.mkEnableOption "Enable yggdrasil (semi-public) peer"; config = lib.mkIf (cfg.enable) { my.features.secrets = lib.mkForce true; - my.roles.yggdrasil-client.enable = true; + my.roles.yggdrasil-client.enable = true; services.yggdrasil = { - enable = true; - persistentKeys = true; - settings = - { + settings = { # Not connecting to global ygg network - Peers = lib.mkForce []; - Listen = [ + Peers = lib.mkForce [ ]; + Listen = [ "quic://[::]:60003?password=${secrets.yggdrasil-password}" "tls://[::]:60002?password=${secrets.yggdrasil-password}" - ]; + ]; }; }; networking.firewall.allowedTCPPorts = [ 60002 ];