121 lines
2.4 KiB
Nix
121 lines
2.4 KiB
Nix
/*
|
|
|
|
Name: https://matrix.fandom.com/wiki/Agent_Jones
|
|
Type: Physical
|
|
Hardware: PowerEdge r210
|
|
From: 2011 (?)
|
|
Role: Firewall
|
|
Notes: Used to have Agent Smith as a partner but it died (Ironically)
|
|
*/
|
|
{
|
|
pkgs,
|
|
lib,
|
|
nodes,
|
|
...
|
|
}: let
|
|
# name of the server, sets teh hostname and record for it
|
|
name = "agentjones";
|
|
ip_pub = "193.1.99.72";
|
|
ip_priv = "193.1.99.125";
|
|
hostname = "${name}.skynet.ie";
|
|
in {
|
|
imports = [
|
|
./hardware/_base.nix
|
|
./hardware/RM001.nix
|
|
];
|
|
|
|
deployment = {
|
|
targetHost = hostname;
|
|
targetPort = 22;
|
|
targetUser = "root";
|
|
|
|
# somehow ssh from runner to this fails
|
|
tags = ["active-firewall"];
|
|
};
|
|
|
|
skynet_dns.records = [
|
|
{
|
|
record = name;
|
|
r_type = "A";
|
|
value = ip_pub;
|
|
server = true;
|
|
}
|
|
{
|
|
record = ip_pub;
|
|
r_type = "PTR";
|
|
value = hostname;
|
|
}
|
|
];
|
|
|
|
services.skynet_backup = {
|
|
host = {
|
|
ip = ip_pub;
|
|
name = name;
|
|
};
|
|
};
|
|
|
|
# keep the wired usb connection alive (front panel)
|
|
networking.interfaces.enp0s29u1u5u2.useDHCP = true;
|
|
|
|
networking.hostName = name;
|
|
# this has to be defined for any physical servers
|
|
# vms are defined by teh vm host
|
|
networking.interfaces = {
|
|
eno2 = {
|
|
ipv4.addresses = [
|
|
{
|
|
address = ip_pub;
|
|
prefixLength = 26;
|
|
}
|
|
];
|
|
};
|
|
eno1 = {
|
|
#useDHCP = false;
|
|
ipv4.addresses = [
|
|
{
|
|
# internal address
|
|
address = ip_priv;
|
|
prefixLength = 26;
|
|
}
|
|
];
|
|
};
|
|
};
|
|
|
|
# this server is teh firewall
|
|
skynet_firewall = {
|
|
# always good to know oneself
|
|
|
|
own = {
|
|
ip = ip_pub;
|
|
|
|
ports = {
|
|
tcp = [
|
|
# ssh in
|
|
22
|
|
];
|
|
udp = [];
|
|
};
|
|
};
|
|
|
|
enable = true;
|
|
|
|
# gonna have to get all the
|
|
forward = builtins.concatLists (
|
|
# using this function "(key: value: value.config.skynet_firewall.forward)" turn the values ointo a list
|
|
lib.attrsets.mapAttrsToList (
|
|
key: value:
|
|
# make sure that anything running this firewall dosent count (recursion otherewise)
|
|
# firewall may want to open ports in itself but can deal with that later
|
|
if builtins.hasAttr "skynet_firewall" value.config
|
|
then
|
|
(
|
|
if value.config.skynet_firewall.enable
|
|
then []
|
|
else value.config.skynet_firewall.forward
|
|
)
|
|
else []
|
|
)
|
|
nodes
|
|
);
|
|
};
|
|
}
|