diff --git a/flake.nix b/flake.nix index 7ec5a9d4..2fa4071d 100644 --- a/flake.nix +++ b/flake.nix @@ -41,7 +41,9 @@ # Manage Plasma desktop with Nix plasma-manager.url = "github:pjones/plasma-manager"; plasma-manager.inputs.nixpkgs.follows = "nixpkgs"; - # Gnome / KDE-like overview + # IP-based Firwall Rules - Pinned to v0.0.5 release + ip-firewall-rules.url = "github:Oak-Digital/nixos-ip-whitelist-firewall/commit/14e3346cc015d370b00a16b790a1c323b985ff63"; + ip-firewall-rules.inputs.nixpkgs.follows = "nixpkgs"; }; outputs = { self, nixpkgs, sops-nix, deploy-rs, ... } @inputs: let diff --git a/nixos/hosts/frankfurt-linode-01/default.nix b/nixos/hosts/frankfurt-linode-01/default.nix index 049fa887..b7de51bb 100644 --- a/nixos/hosts/frankfurt-linode-01/default.nix +++ b/nixos/hosts/frankfurt-linode-01/default.nix @@ -1,6 +1,12 @@ -{ lib, modulesPath, hostname, ... }: { +{ inputs, lib, modulesPath, hostname, ... }: +let + # ipOffice = ""; + ipIfargle = "97.71.91.121"; + ipSysctl = "172.185.76.221"; +in { imports = [ (modulesPath + "/profiles/qemu-guest.nix") + inputs.ip-whitelist.nixosModules.default (import ../../common/containers/derp.nix { domainName = "frankfurt.sysctl.io"; }) ../../common/services/tailscale-autoconnect.nix ../../common/services/podman.nix @@ -8,6 +14,18 @@ ./wireguard.nix ]; + # SSH Whitelist for certain IP's + networking.firewall.ipBasedAllowedTCPPorts = [ + { + port = 22; + ips = [ + # ipOffice + ipIfargle + ipSysctl + ]; + } + ]; + boot.initrd.availableKernelModules = [ "virtio_pci" "virtio_scsi" "ahci" "sd_mod" ]; boot.initrd.kernelModules = [ ]; boot.kernelModules = [ ];