tohru, orm: tidy up vestigial wireguard config

This commit is contained in:
Katherina Walshe-Grey 2024-07-25 08:05:34 +01:00
parent e90afae7ac
commit 70247124a6
7 changed files with 16 additions and 24 deletions

View file

@ -4,11 +4,17 @@
imports = [ imports = [
./hardware-configuration.nix ./hardware-configuration.nix
./home.nix ./home.nix
./wireguard.nix
]; ];
boot.loader.systemd-boot.enable = true; boot.loader.systemd-boot.enable = true;
boot.loader.efi.canTouchEfiVariables = true; boot.loader.efi.canTouchEfiVariables = true;
age.secrets.wireguard-peer-orm.file = ../../secrets/wireguard-peer-orm.age;
birdsong.peer = {
enable = true;
privateKeyFile = config.age.secrets.wireguard-peer-orm.path;
};
system.stateVersion = "23.11"; system.stateVersion = "23.11";
} }

View file

@ -1,10 +0,0 @@
{ config, lib, pkgs, ... }:
{
age.secrets.wireguard-hub.file = ../../secrets/wireguard-hub.age;
birdsong.peer = {
enable = true;
privateKeyFile = config.age.secrets.wireguard-hub.path;
};
}

View file

@ -8,13 +8,20 @@
../../services/fonts.nix ../../services/fonts.nix
../../services/steam.nix ../../services/steam.nix
./syncthing.nix ./syncthing.nix
./wireguard.nix
]; ];
boot.loader.systemd-boot.enable = true; boot.loader.systemd-boot.enable = true;
boot.loader.efi.canTouchEfiVariables = true; boot.loader.efi.canTouchEfiVariables = true;
boot.loader.systemd-boot.editor = false; boot.loader.systemd-boot.editor = false;
age.secrets.wireguard-peer-tohru.file = ../../secrets/wireguard-peer-tohru.age;
birdsong.peer = {
enable = true;
privateKeyFile = config.age.secrets.wireguard-peer-tohru.path;
persistentKeepalive = 23;
};
programs.evolution.enable = true; programs.evolution.enable = true;
qenya.services.fonts.enable = true; qenya.services.fonts.enable = true;
qenya.services.steam.enable = true; qenya.services.steam.enable = true;

View file

@ -1,11 +0,0 @@
{ config, lib, pkgs, ... }:
{
age.secrets.wireguard-peer-tohru.file = ../../secrets/wireguard-peer-tohru.age;
birdsong.peer = {
enable = true;
privateKeyFile = config.age.secrets.wireguard-peer-tohru.path;
persistentKeepalive = 23;
};
}

View file

@ -4,7 +4,7 @@ let
commonKeys = keys.users.qenya; commonKeys = keys.users.qenya;
secrets = with keys; { secrets = with keys; {
wireguard-hub = [ machines.orm ]; wireguard-peer-orm = [ machines.orm ];
wireguard-peer-tohru = [ machines.tohru ]; wireguard-peer-tohru = [ machines.tohru ];
wireguard-peer-yevaud = [ machines.yevaud ]; wireguard-peer-yevaud = [ machines.yevaud ];
}; };