nixos/machines/agentjones.nix

107 lines
2.3 KiB
Nix
Raw Normal View History

2023-01-25 11:48:44 +00:00
/*
Name: https://matrix.fandom.com/wiki/Agent_Jones
Type: Physical
Hardware: PowerEdge r210
From: 2011 (?)
Role: Firewall
Notes: Used to have Agent Smith as a partner but it died (Ironically)
*/
{ pkgs, lib, nodes, ... }:
let
# name of the server, sets teh hostname and record for it
name = "agentjones";
ip_pub = "193.1.99.72";
ip_priv = "193.1.99.125";
hostname = "${name}.skynet.ie";
2023-01-25 11:48:44 +00:00
in {
imports = [
# applications for this particular server
../applications/firewall.nix
../applications/dns.nix
./hardware/RM001.nix
2023-01-25 11:48:44 +00:00
];
deployment = {
targetHost = hostname;
targetPort = 22;
targetUser = "root";
2023-04-20 13:09:36 +00:00
tags = [ "active" ];
2023-01-25 11:48:44 +00:00
};
skynet_dns.records = {
external = [
"${name} A ${ip_pub}"
];
cname = [];
};
2023-01-25 13:14:11 +00:00
# keep the wired usb connection alive (front panel)
networking.interfaces.enp0s29u1u5u2.useDHCP = true;
2023-01-25 11:48:44 +00:00
networking.hostName = name;
# this has to be defined for any physical servers
# vms are defined by teh vm host
networking.interfaces = {
eno1 = {
2023-01-25 11:48:44 +00:00
ipv4.addresses = [
{
address = "193.1.99.72";
prefixLength = 26;
}
];
};
eno2 = {
#useDHCP = false;
ipv4.addresses = [
2023-01-25 13:14:11 +00:00
{
# internal address
address = "193.1.99.125";
prefixLength = 26;
2023-01-25 13:14:11 +00:00
}
2023-01-25 11:48:44 +00:00
];
};
};
# this server is teh firewall
skynet_firewall = {
# always good to know oneself
own = {
ip = ip_pub;
ports = {
tcp = [
# ssh in
22
];
udp = [];
};
};
enable = true;
# gonna have to get all the
forward = builtins.concatLists (
# using this function "(key: value: value.config.skynet_firewall.forward)" turn the values ointo a list
lib.attrsets.mapAttrsToList (key: value:
# make sure that anything running this firewall dosent count (recursion otherewise)
# firewall may want to open ports in itself but can deal with that later
if builtins.hasAttr "skynet_firewall" value.config
then (
if value.config.skynet_firewall.enable
then []
else value.config.skynet_firewall.forward
)
else []
) nodes
);
};
}