home

My NixOS systems configurations.
Log | Files | Refs | LICENSE

commit b453d2d4f2f276c9049becaef5adb9a3c8f86d41
parent 778b9a8e80eb37f6e2a118438e9f1b0349baf059
Author: Vincent Demeester <vincent@sbr.pm>
Date:   Mon,  4 Mar 2024 12:28:03 +0100

Update machines to add demeter, athena and hass

Signed-off-by: Vincent Demeester <vincent@sbr.pm>

Diffstat:
Msecrets/machines.nix | 36++++++++++++++++--------------------
1 file changed, 16 insertions(+), 20 deletions(-)

diff --git a/secrets/machines.nix b/secrets/machines.nix @@ -25,6 +25,7 @@ let shikoku = "192.168.1.24"; synodine = "192.168.1.20"; wakasu = "192.168.1.77"; + hass = "192.168.1.181"; demeter = "192.168.1.182"; athena = "192.168.1.183"; }; @@ -44,6 +45,9 @@ let okinawa = "10.100.0.14"; naruhodo = "10.100.0.15"; sakhalin = "10.100.0.16"; + hass = "10.100.0.81"; + demeter = "10.100.0.82"; + athena = "10.100.0.83"; }; kerkouane = { allowedIPs = [ "${wireguard.ips.kerkouane}/32" ]; @@ -53,14 +57,6 @@ let allowedIPs = [ "${wireguard.ips.shikoku}/32" ]; publicKey = "foUoAvJXGyFV4pfEE6ISwivAgXpmYmHwpGq6X+HN+yA="; }; - # honshu = { - # allowedIPs = [ "${wireguard.ips.honshu}/32" ]; - # publicKey = "P206gLsHo/wf5zZK0IB4IbTuvDkmBL69PMqrG9Zrim4="; - # }; - # hokkaido = { - # allowedIPs = [ "${wireguard.ips.hokkaido}/32" ]; - # publicKey = "3/dL6eRELjtKNs40JVcd7DPsPmH4MFRUBntpy93JWUo="; - # }; wakasu = { allowedIPs = [ "${wireguard.ips.wakasu}/32" ]; publicKey = "qyxGnd/YJefqb4eEPqKO5XinvNx14fPcuZMNeYuBvSQ="; @@ -73,10 +69,6 @@ let allowedIPs = [ "${wireguard.ips.ipad}/32" ]; publicKey = "6viS+HqkW+qSj4X+Sj8n1PCJ6QIaZsOkmFQytlRvRwk="; }; - # kobe = { - # allowedIPs = [ "${wireguard.ips.kobe}/32" ]; - # publicKey = "vzRFxFNK83HHilXoXlw71bPvy1KJNUfbTMw6MMSaQVs="; - # }; # houbeb = { # allowedIPs = [ "${wireguard.ips.houbeb}/32" ]; # publicKey = "tzanPdQBkD6FrWjalZAuc3G9PtLgHjPVCBjvJDCgdSw="; @@ -93,9 +85,17 @@ let allowedIPs = [ "${wireguard.ips.aomi}/32" ]; publicKey = "XT4D9YLeVHwMb9R4mhBLSWHYF8iBO/UOT86MQL1jnA4="; }; - naruhodo = { - allowedIPs = [ "${wireguard.ips.naruhodo}/32" ]; - publicKey = "Fp4YmztYYepL+k5Xd9ciWK6EhbZomGOH9ZsVBYMFnlM="; + hass = { + allowedIPs = [ "${wireguard.ips.hass}/32" ]; + publicKey = "sLi6Qpm6yyI0kuJ5LzCKXzFhhTW3Q50krxSin+b/sWs="; + }; + demeter = { + allowedIPs = [ "${wireguard.ips.demeter}/32" ]; + publicKey = "0n1CwaCwBUkRYlq0ZRzHK1VFGx1mXPQZvLKtTA3dqRw="; + }; + athena = { + allowedIPs = [ "${wireguard.ips.athena}/32" ]; + publicKey = "3bmLHTJYq++uESQD/WA0Qml38IIchPG3sL4epKPGc0I="; }; }; ssh = { @@ -146,10 +146,6 @@ let key = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHJ3QqVCUiE4BIFKTJLN6mSnp9bLSnJ3gE8ScbAajGsH vincent@aomi"; authorized = true; }; - naruhodo = { - key = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIO7zGAceSiqFtWHwt7HVjN24SCyWCC26l6YrgUP/qtPc vincent@naruhodo"; - authorized = true; - }; }; in { @@ -160,7 +156,7 @@ in listenPort = 51820; endpointIP = "167.99.17.238"; persistentKeepalive = 25; - peers = [ wireguard.shikoku wireguard.wakasu wireguard.vincent wireguard.okinawa wireguard.sakhalin wireguard.naruhodo wireguard.aomi wireguard.ipad ]; # wireguard.honshu wireguard.hokkaido wireguard.houbeb + peers = [ wireguard.shikoku wireguard.wakasu wireguard.vincent wireguard.sakhalin wireguard.aomi wireguard.ipad wireguard.hass wireguard.demeter wireguard.athena ]; # wireguard.honshu wireguard.hokkaido wireguard.houbeb }; ssh = ssh; sshConfig = {