diff --git a/terranix/tinc-test/02-build/configs/nixserver-server/configuration.nix b/terranix/tinc-test/02-build/configs/nixserver-server/configuration.nix index c116925..bcb1cda 100644 --- a/terranix/tinc-test/02-build/configs/nixserver-server/configuration.nix +++ b/terranix/tinc-test/02-build/configs/nixserver-server/configuration.nix @@ -10,7 +10,8 @@ to = 60100; }]; services.sshd.enable = true; - users.users.root.openssh.authorizedKeys.keyFiles = [ ]; + users.users.root.openssh.authorizedKeys.keyFiles = + [ ]; # wireshark programs.wireshark.enable = true; diff --git a/terranix/tinc-test/02-build/configs/nixserver-server/tinc.nix b/terranix/tinc-test/02-build/configs/nixserver-server/tinc.nix index 62f4d92..77a7679 100644 --- a/terranix/tinc-test/02-build/configs/nixserver-server/tinc.nix +++ b/terranix/tinc-test/02-build/configs/nixserver-server/tinc.nix @@ -1,12 +1,9 @@ # shared tinc file between client and server { config, pkgs, lib, ... }: -let - nixosMachines = import ; +let nixosMachines = import ; in { - imports = [ - - ]; + imports = [ ]; networking.firewall.trustedInterfaces = [ "tinc.private" ]; @@ -22,9 +19,7 @@ in { hosts = { server = { tincIp = "10.123.142.1"; - realAddress = [ - nixosMachines.nixserver-server.host.ipv4 - ]; + realAddress = [ nixosMachines.nixserver-server.host.ipv4 ]; publicKey = lib.fileContents ; }; sterni = {