diff options
| author | quentin@aristote.fr <quentin@aristote.fr> | 2025-01-26 23:12:07 +0100 |
|---|---|---|
| committer | quentin@aristote.fr <quentin@aristote.fr> | 2025-01-26 23:13:57 +0100 |
| commit | 092f79fdd6d26df2c5e9be3a790f7709889bf71c (patch) | |
| tree | 3cefbe03f8c2fa9132dc8b5c32cbdb618221261a /config/nix | |
| parent | 44bb33baf4d193445950d133652463dd5491c77c (diff) | |
networking: wireguard -> tailscale
Diffstat (limited to 'config/nix')
| -rw-r--r-- | config/nix/remote-builds.nix | 7 |
1 files changed, 3 insertions, 4 deletions
diff --git a/config/nix/remote-builds.nix b/config/nix/remote-builds.nix index 5f23108..d252af2 100644 --- a/config/nix/remote-builds.nix +++ b/config/nix/remote-builds.nix @@ -1,22 +1,21 @@ {...}: { - networking.hosts."10.13.42.2" = ["hephaistos.local"]; programs.ssh = { extraConfig = '' - Host hephaistos.local + Host hephaistos.aristote.mesh # Prevent using ssh-agent or another keyfile, useful for testing IdentitiesOnly yes IdentityFile /etc/ssh/nixremote # The weakly privileged user on the remote builder – if not set, 'root' is used – which will hopefully fail User nixremote ''; - knownHosts."hephaistos.local".publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHvtqi8tziBuviUV8LDK2ddQQUbHdJYB02dgWTK5Olxq"; + knownHosts."hephaistos.aristote.mesh".publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHvtqi8tziBuviUV8LDK2ddQQUbHdJYB02dgWTK5Olxq"; }; nix = { distributedBuilds = true; buildMachines = [ { - hostName = "hephaistos.local"; + hostName = "hephaistos.aristote.mesh"; system = "x86_64-linux"; # Nix custom ssh-variant that avoids lots of "trusted-users" settings pain protocol = "ssh-ng"; |
