more devices
This commit is contained in:
parent
1c6f6ef6d3
commit
921a59a30e
4 changed files with 97 additions and 18 deletions
29
hosts/_common/components/stormd.nix
Normal file
29
hosts/_common/components/stormd.nix
Normal file
|
@ -0,0 +1,29 @@
|
||||||
|
{ pkgs, ... }:
|
||||||
|
{
|
||||||
|
# environment.systemPackages = with pkgs; [
|
||||||
|
# ];
|
||||||
|
|
||||||
|
# TODO make a derivation for stormd binary and get it properlly in the store. This is super janky and the binary just has to exist there right now.
|
||||||
|
|
||||||
|
# networking.firewall.allowedUDPPorts = [ 4242 ];
|
||||||
|
|
||||||
|
systemd.services."stormd" = {
|
||||||
|
description = "Stormd service";
|
||||||
|
wants = [ "basic.target" ];
|
||||||
|
after = [
|
||||||
|
"basic.target"
|
||||||
|
"network.target"
|
||||||
|
];
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
serviceConfig = {
|
||||||
|
Type = "notify";
|
||||||
|
Restart = "always";
|
||||||
|
RestartSec = 1;
|
||||||
|
ExecStart = "/etc/stormd/stormd daemon";
|
||||||
|
};
|
||||||
|
unitConfig = {
|
||||||
|
StartLimitIntervalSec = 5;
|
||||||
|
StartLimitBurst = 3;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
|
@ -16,6 +16,7 @@
|
||||||
(settings.hostsDir + "/_common/components/home_manager.nix")
|
(settings.hostsDir + "/_common/components/home_manager.nix")
|
||||||
(settings.hostsDir + "/_common/components/gnome_xorg.nix")
|
(settings.hostsDir + "/_common/components/gnome_xorg.nix")
|
||||||
(settings.hostsDir + "/_common/components/docker.nix")
|
(settings.hostsDir + "/_common/components/docker.nix")
|
||||||
|
# (settings.hostsDir + "/_common/components/stormd.nix") TODO figure out why this is failing
|
||||||
(settings.hostsDir + "/_common/components/nebula.nix")
|
(settings.hostsDir + "/_common/components/nebula.nix")
|
||||||
# Users this machine has
|
# Users this machine has
|
||||||
(settings.usersDir + "/root/configuration.nix")
|
(settings.usersDir + "/root/configuration.nix")
|
||||||
|
|
|
@ -1,39 +1,30 @@
|
||||||
{ age, ... }:
|
{ age, ... }:
|
||||||
{
|
{
|
||||||
|
# TODO can I put all IP's in the flake.nix top level settings and pull them in here instead?
|
||||||
programs.ssh = {
|
programs.ssh = {
|
||||||
enable = true;
|
enable = true;
|
||||||
matchBlocks = {
|
matchBlocks = {
|
||||||
|
# EXTERNAL
|
||||||
"github.com" = {
|
"github.com" = {
|
||||||
identityFile = age.secrets.nix2github.path;
|
identityFile = age.secrets.nix2github.path;
|
||||||
};
|
};
|
||||||
"bitbucket.org" = {
|
"bitbucket.org" = {
|
||||||
identityFile = age.secrets.nix2bitbucket.path;
|
identityFile = age.secrets.nix2bitbucket.path;
|
||||||
};
|
};
|
||||||
"h001" = {
|
# PERSONAL DEVICES
|
||||||
identityFile = age.secrets.nix2h001.path;
|
|
||||||
# TODO come back to these 10.12.14.## addrs and change them to intranet IP's instead of local network.
|
|
||||||
# LOCAL HOME NETWORK ONLY
|
|
||||||
hostname = "10.12.14.2";
|
|
||||||
user = "root";
|
|
||||||
};
|
|
||||||
"h002" = {
|
|
||||||
identityFile = age.secrets.nix2h002.path;
|
|
||||||
hostname = "10.20.40.12";
|
|
||||||
user = "luser";
|
|
||||||
};
|
|
||||||
"joe" = {
|
"joe" = {
|
||||||
identityFile = age.secrets.nix2joe.path;
|
identityFile = age.secrets.nix2joe.path;
|
||||||
hostname = "10.20.40.2";
|
hostname = "10.20.40.102";
|
||||||
user = "josh";
|
user = "josh";
|
||||||
};
|
};
|
||||||
"gpdPocket3" = {
|
"gpdPocket3" = {
|
||||||
identityFile = age.secrets.nix2gpdPocket3.path;
|
identityFile = age.secrets.nix2gpdPocket3.path;
|
||||||
hostname = "10.20.40.22"; # TODO onboard ot nebula network
|
hostname = "10.20.40.103";
|
||||||
user = "josh";
|
user = "josh";
|
||||||
};
|
};
|
||||||
"t" = {
|
"t" = {
|
||||||
identityFile = age.secrets.nix2t.path;
|
identityFile = age.secrets.nix2t.path;
|
||||||
hostname = "10.20.40.4"; # TODO get these from flake.nix hosts?
|
hostname = "10.20.40.180";
|
||||||
user = "joshua.bell";
|
user = "joshua.bell";
|
||||||
localForwards = [
|
localForwards = [
|
||||||
{
|
{
|
||||||
|
@ -51,14 +42,72 @@
|
||||||
TERM = "vt100";
|
TERM = "vt100";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
"mbptv" = {
|
||||||
|
identityFile = age.secrets.nix2gpdPocket3.path;
|
||||||
|
hostname = "10.20.40.109";
|
||||||
|
user = "waka";
|
||||||
|
setEnv = {
|
||||||
|
TERM = "vt100";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
"mbptv_" = {
|
||||||
|
identityFile = age.secrets.nix2gpdPocket3.path;
|
||||||
|
hostname = "10.12.14.101";
|
||||||
|
user = "waka";
|
||||||
|
setEnv = {
|
||||||
|
TERM = "vt100";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
"nothing1" = {
|
||||||
|
identityFile = age.secrets.nix2gpdPocket3.path;
|
||||||
|
hostname = "10.20.40.124";
|
||||||
|
user = "TODO";
|
||||||
|
};
|
||||||
|
"ipad1" = {
|
||||||
|
identityFile = age.secrets.nix2gpdPocket3.path;
|
||||||
|
hostname = "10.20.40.125";
|
||||||
|
user = "TODO";
|
||||||
|
};
|
||||||
|
"tab1" = {
|
||||||
|
identityFile = age.secrets.nix2gpdPocket3.path;
|
||||||
|
hostname = "10.20.40.120";
|
||||||
|
user = "TODO";
|
||||||
|
};
|
||||||
|
"pixel6" = {
|
||||||
|
identityFile = age.secrets.nix2gpdPocket3.path;
|
||||||
|
hostname = "10.20.40.126"; # TODO ON BOARD
|
||||||
|
user = "TODO";
|
||||||
|
};
|
||||||
|
# HOME SERVERS
|
||||||
|
"h001" = {
|
||||||
|
identityFile = age.secrets.nix2h001.path;
|
||||||
|
hostname = "10.20.40.190";
|
||||||
|
user = "root";
|
||||||
|
};
|
||||||
|
"h001_" = {
|
||||||
|
identityFile = age.secrets.nix2h001.path;
|
||||||
|
hostname = "10.12.14.2";
|
||||||
|
user = "root";
|
||||||
|
};
|
||||||
|
"h002" = {
|
||||||
|
identityFile = age.secrets.nix2h002.path;
|
||||||
|
hostname = "10.20.40.191";
|
||||||
|
user = "luser";
|
||||||
|
};
|
||||||
|
# LINODE SERVERS
|
||||||
"l001" = {
|
"l001" = {
|
||||||
identityFile = age.secrets.nix2l001.path;
|
identityFile = age.secrets.nix2l001.path;
|
||||||
hostname = "172.105.22.34";
|
hostname = "172.105.22.34"; # TODO REMOVE - OFF BOARD
|
||||||
user = "root";
|
user = "root";
|
||||||
};
|
};
|
||||||
|
"l002_" = {
|
||||||
|
identityFile = age.secrets.nix2l002.path;
|
||||||
|
hostname = "172.232.4.54";
|
||||||
|
user = "luser";
|
||||||
|
};
|
||||||
"l002" = {
|
"l002" = {
|
||||||
identityFile = age.secrets.nix2l002.path;
|
identityFile = age.secrets.nix2l002.path;
|
||||||
hostname = "172.232.4.54";
|
hostname = "10.20.40.1";
|
||||||
user = "luser";
|
user = "luser";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
{ settings, pkgs, ... }:
|
{ settings, ... }:
|
||||||
{
|
{
|
||||||
# Ensure SSH key pair generation for non-root users
|
# Ensure SSH key pair generation for non-root users
|
||||||
systemd.services.generate_ssh_key = {
|
systemd.services.generate_ssh_key = {
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue