nix: cleaner fileset
[julm/julm-nix.git] / hosts / oignon / networking.nix
index 50d53cab0da44f44cd72c1375d64b6767e80b2ef..0df3daaacf1899149b53ff2bad08383453b7c330 100644 (file)
@@ -3,6 +3,9 @@
   imports = [
     ../../nixos/profiles/dnscrypt-proxy2.nix
     ../../nixos/profiles/wireguard/wg-intra.nix
+    ../../nixos/profiles/networking/ssh.nix
+    ../../nixos/profiles/networking/wifi.nix
+    #../../nixos/profiles/openvpn/calyx.nix
     networking/nftables.nix
   ];
   install.substituteOnDestination = false;
     }
   '';
 
+  networking.hosts = {
+    #"80.67.180.129" = ["salons.sourcephile.fr"];
+  };
+
   networking.interfaces = { };
 
   networking.networkmanager = {
     '';
   };
 
-  networking.wireguard.wg-intra.peers = {
-    mermet.enable = true;
-    losurdo.enable = true;
-    patate.enable = true;
-    aubergine.enable = true;
-  };
-
-  systemd.services.sshd.serviceConfig.LoadCredentialEncrypted =
-    [ "ed25519.key:${inputs.self}/host/${hostName}/networking/ssh/ed25519.key.cred" ];
-  services.openssh.hostKeys =
-    [ { type = "ed25519"; path = "/run/credentials/sshd.service/ed25519.key"; }
-    ];
-
   environment.systemPackages = [
-    pkgs.iw
     pkgs.modem-manager-gui
   ];
+
+  systemd.services.sshd.serviceConfig.LoadCredentialEncrypted = [
+    "host.key:${ssh/host.key.cred}"
+  ];
 }