From 092f79fdd6d26df2c5e9be3a790f7709889bf71c Mon Sep 17 00:00:00 2001 From: "quentin@aristote.fr" Date: Sun, 26 Jan 2025 23:12:07 +0100 Subject: networking: wireguard -> tailscale --- config/nix/remote-builds.nix | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) (limited to 'config/nix') diff --git a/config/nix/remote-builds.nix b/config/nix/remote-builds.nix index 5f23108..d252af2 100644 --- a/config/nix/remote-builds.nix +++ b/config/nix/remote-builds.nix @@ -1,22 +1,21 @@ {...}: { - networking.hosts."10.13.42.2" = ["hephaistos.local"]; programs.ssh = { extraConfig = '' - Host hephaistos.local + Host hephaistos.aristote.mesh # Prevent using ssh-agent or another keyfile, useful for testing IdentitiesOnly yes IdentityFile /etc/ssh/nixremote # The weakly privileged user on the remote builder – if not set, 'root' is used – which will hopefully fail User nixremote ''; - knownHosts."hephaistos.local".publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHvtqi8tziBuviUV8LDK2ddQQUbHdJYB02dgWTK5Olxq"; + knownHosts."hephaistos.aristote.mesh".publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHvtqi8tziBuviUV8LDK2ddQQUbHdJYB02dgWTK5Olxq"; }; nix = { distributedBuilds = true; buildMachines = [ { - hostName = "hephaistos.local"; + hostName = "hephaistos.aristote.mesh"; system = "x86_64-linux"; # Nix custom ssh-variant that avoids lots of "trusted-users" settings pain protocol = "ssh-ng"; -- cgit v1.2.3