diff --git a/nix/deployments/nixops.nix b/nix/deployments/nixops.nix index 83b9411..f0053f9 100644 --- a/nix/deployments/nixops.nix +++ b/nix/deployments/nixops.nix @@ -1,5 +1,6 @@ let nasIp = "192.168.1.168"; + serverIp = "192.168.1.44"; in { network = { @@ -17,9 +18,9 @@ in ]; - networking.wireless.networks."ShamblingHalfling 5Ghz-1" = { + networking.wireless.networks."lbheim" = { pskRaw = ( - (import ../system/framework/keys.nix).wifi."ShamblingHalfling 5Ghz-1".pskRaw + (import ../system/framework/keys.nix).wifi."lbheim".pskRaw ); }; @@ -29,7 +30,7 @@ in security.sudo.wheelNeedsPassword = false; home-manager.users.haak = (import ../home/commandline.nix); - # Configure the root account + # Configure the root account so that i can get in there from the framework laptop users.users.root.openssh.authorizedKeys.keys = [ (import ../system/framework/keys.nix).ssh.public ]; @@ -62,7 +63,7 @@ in server = { nodes, ... }: { - deployment.targetHost = "192.168.1.65"; + deployment.targetHost = serverIp; imports = [ ../system/xps11/configuration.nix ]; fileSystems."/storage" = { @@ -93,8 +94,6 @@ in allowedUDPPorts = [ 51820 ]; # Clients and peers can use the same port, see listenport }; - deployment.keys.wireguard.text = builtins.readFile ../../secrets/wireguard/svalbard; - # Enable WireGuard networking.wg-quick.interfaces = let