nixos/machines/agentjones.nix

98 lines
2.1 KiB
Nix
Raw Permalink Normal View History

2023-01-25 11:48:44 +00:00
/*
Name: https://matrix.fandom.com/wiki/Agent_Jones
Type: Physical
Hardware: PowerEdge r210
From: 2011 (?)
Role: Firewall
Notes: Used to have Agent Smith as a partner but it died (Ironically)
2023-01-25 11:48:44 +00:00
*/
{
pkgs,
lib,
nodes,
...
}: let
2023-01-25 11:48:44 +00:00
# name of the server, sets teh hostname and record for it
name = "agentjones";
ip_pub = "193.1.99.72";
hostname = "${name}.skynet.ie";
host = {
ip = ip_pub;
name = name;
hostname = hostname;
};
2023-01-25 11:48:44 +00:00
in {
imports = [
./hardware/RM001.nix
2023-01-25 11:48:44 +00:00
];
deployment = {
targetHost = hostname;
targetPort = 22;
targetUser = null;
2023-04-20 13:09:36 +00:00
# somehow ssh from runner to this fails
tags = ["active-firewall"];
2023-01-25 11:48:44 +00:00
};
services.skynet = {
host = host;
backup.enable = true;
2023-07-15 14:05:57 +00:00
};
2023-01-25 13:14:11 +00:00
# keep the wired usb connection alive (front panel)
# networking.interfaces.enp0s29u1u5u2.useDHCP = true;
2023-01-25 13:14:11 +00:00
2023-01-25 11:48:44 +00:00
networking.hostName = name;
# this has to be defined for any physical servers
# vms are defined by teh vm host
2023-12-22 15:52:34 +00:00
networking = {
defaultGateway.interface = lib.mkForce "eno1";
2023-12-22 15:52:34 +00:00
interfaces.eno1.ipv4.addresses = [
{
address = ip_pub;
prefixLength = 26;
}
];
2023-01-25 11:48:44 +00:00
};
# this server is teh firewall
skynet_firewall = {
# always good to know oneself
own = {
ip = ip_pub;
ports = {
tcp = [
# ssh in
22
];
udp = [];
};
};
enable = false;
2023-01-25 11:48:44 +00:00
# gonna have to get all the
forward = builtins.concatLists (
# using this function "(key: value: value.config.skynet_firewall.forward)" turn the values ointo a list
lib.attrsets.mapAttrsToList (
key: value:
2023-01-25 11:48:44 +00:00
# make sure that anything running this firewall dosent count (recursion otherewise)
# firewall may want to open ports in itself but can deal with that later
if builtins.hasAttr "skynet_firewall" value.config
then
(
if value.config.skynet_firewall.enable
then []
else value.config.skynet_firewall.forward
)
else []
)
nodes
2023-01-25 11:48:44 +00:00
);
};
}