chore: disable firewall for gaming specialisation

This commit is contained in:
Leon Schwarzäugl 2025-03-12 10:07:40 +01:00
parent 6f58255dc2
commit 8ded91166e
Signed by: swarsel
GPG key ID: 26A54C31F2A4FD84
2 changed files with 4 additions and 2 deletions

View file

@ -8099,11 +8099,12 @@ These sets of configuration do not need to be deployed on every host, for a mult
This opens a few gaming ports and installs the steam configuration suite for gaming. There are more options in [[#h:84fd7029-ecb6-4131-9333-289982f24ffa][Gaming]] (home-manager side). This opens a few gaming ports and installs the steam configuration suite for gaming. There are more options in [[#h:84fd7029-ecb6-4131-9333-289982f24ffa][Gaming]] (home-manager side).
#+begin_src nix :tangle profiles/nixos/optional/gaming.nix #+begin_src nix :tangle profiles/nixos/optional/gaming.nix
{ pkgs, ... }: { pkgs, lib, ... }:
{ {
specialisation = { specialisation = {
gaming.configuration = { gaming.configuration = {
networking = { networking = {
firewall.enable = lib.mkForce false;
firewall = { firewall = {
allowedUDPPorts = [ 4380 27036 14242 34197 ]; # 34197: factorio; 4380 27036 14242: barotrauma; allowedUDPPorts = [ 4380 27036 14242 34197 ]; # 34197: factorio; 4380 27036 14242: barotrauma;
allowedTCPPorts = [ ]; # 34197: factorio; 4380 27036 14242: barotrauma; 51820: wireguard allowedTCPPorts = [ ]; # 34197: factorio; 4380 27036 14242: barotrauma; 51820: wireguard

View file

@ -1,8 +1,9 @@
{ pkgs, ... }: { pkgs, lib, ... }:
{ {
specialisation = { specialisation = {
gaming.configuration = { gaming.configuration = {
networking = { networking = {
firewall.enable = lib.mkForce false;
firewall = { firewall = {
allowedUDPPorts = [ 4380 27036 14242 34197 ]; # 34197: factorio; 4380 27036 14242: barotrauma; allowedUDPPorts = [ 4380 27036 14242 34197 ]; # 34197: factorio; 4380 27036 14242: barotrauma;
allowedTCPPorts = [ ]; # 34197: factorio; 4380 27036 14242: barotrauma; 51820: wireguard allowedTCPPorts = [ ]; # 34197: factorio; 4380 27036 14242: barotrauma; 51820: wireguard