more microvm rice

This commit is contained in:
iofq 2024-01-27 19:39:29 -06:00
parent 94ebce046b
commit 6ae9ddb73a
9 changed files with 123 additions and 49 deletions

6
flake.lock generated
View file

@ -449,11 +449,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1706385404, "lastModified": 1706391650,
"narHash": "sha256-Q7yUQBCH5J0xiWlH7w2Vux1QD2KCuWvshnA4rkz+HXI=", "narHash": "sha256-k2698eTOVfHN6LFpttmiuboW0LUP+FeL3N6+yXBl5NM=",
"owner": "iofq", "owner": "iofq",
"repo": "nvim.nix", "repo": "nvim.nix",
"rev": "8bd50ae3b2f028dccdd586bbedaa96361b301cca", "rev": "1d10de72aa4c26b9963357ba57b55881e4cf88e6",
"type": "github" "type": "github"
}, },
"original": { "original": {

View file

@ -1,4 +1,4 @@
{ packages, host, system, ... }: { host, ... }:
{ {
users.groups.plugdev = {}; # Create plugdev group users.groups.plugdev = {}; # Create plugdev group
networking.hostName = host.hostName; networking.hostName = host.hostName;

View file

@ -1,5 +1,4 @@
{ inputs, pkgs, attrs, system, ... }: { inputs, pkgs, attrs, system, ... }: {
{
t14 = inputs.nixpkgs.lib.nixosSystem { t14 = inputs.nixpkgs.lib.nixosSystem {
specialArgs = { specialArgs = {
inherit inputs system pkgs; inherit inputs system pkgs;
@ -16,7 +15,6 @@
}; };
rknrd = inputs.nixpkgs.lib.nixosSystem { rknrd = inputs.nixpkgs.lib.nixosSystem {
specialArgs = { specialArgs = {
inherit inputs system pkgs;
host = { host = {
hostName = "rknrd"; hostName = "rknrd";
username = attrs.username; username = attrs.username;
@ -30,6 +28,13 @@
htz = inputs.nixpkgs.lib.nixosSystem { htz = inputs.nixpkgs.lib.nixosSystem {
specialArgs = { specialArgs = {
inherit inputs system pkgs; inherit inputs system pkgs;
addressList = {
vm-test = {
ipv4 = "10.0.0.2";
subnet = "/24";
mac = "02:00:00:00:00:01";
};
};
host = { host = {
hostName = "htz"; hostName = "htz";
username = attrs.username; username = attrs.username;

View file

@ -1,23 +1,31 @@
{ pkgs, ... }: { { pkgs, addressList, ... }: {
imports = [ imports = [
./hardware-configuration.nix ./hardware-configuration.nix
./vms.nix ./vms
#./eth.nix #./eth.nix
]; ];
environment.systemPackages = with pkgs; [ environment.systemPackages = with pkgs; [
nfs-utils nfs-utils
vim vim
]; ];
boot.tmp.cleanOnBoot = true; networking = {
zramSwap.enable = false; hostName = "htz";
networking.hostName = "htz"; domain = "";
networking.domain = ""; firewall = {
networking.firewall = {
enable = true; enable = true;
allowedTCPPorts = [22]; allowedTCPPorts = [22];
allowedUDPPorts = []; allowedUDPPorts = [];
logRefusedConnections = true; logRefusedConnections = true;
}; };
nat = {
enable = true;
forwardPorts = [ {
proto = "tcp";
sourcePort = 80;
destination = addressList.vm-test.ipv4;
} ];
};
};
services.openssh.enable = true; services.openssh.enable = true;
users.users = { users.users = {
root = { root = {
@ -37,4 +45,5 @@
}; };
security.sudo.wheelNeedsPassword = false; security.sudo.wheelNeedsPassword = false;
nix.settings.trusted-users = ["e"]; nix.settings.trusted-users = ["e"];
system.stateVersion = "23.11";
} }

View file

@ -1,9 +1,9 @@
{ modulesPath, lib, ... }: { modulesPath, lib, ... }:
{ {
system.stateVersion = "23.11";
imports = [ (modulesPath + "/profiles/qemu-guest.nix") ]; imports = [ (modulesPath + "/profiles/qemu-guest.nix") ];
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux"; nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
boot = { boot = {
tmp.cleanOnBoot = true;
loader.grub = { loader.grub = {
efiSupport = true; efiSupport = true;
efiInstallAsRemovable = true; efiInstallAsRemovable = true;
@ -30,12 +30,15 @@
swapDevices = [{ swapDevices = [{
device = "/dev/dm-1"; device = "/dev/dm-1";
}]; }];
networking.useNetworkd = true; zramSwap.enable = false;
networking.nat = { networking = {
useNetworkd = true;
nat = {
enable = true; enable = true;
externalInterface = "enp0s31f6"; externalInterface = "enp0s31f6";
internalInterfaces = [ "microvm" ]; internalInterfaces = [ "microvm" ];
}; };
};
systemd.network = { systemd.network = {
enable = true; enable = true;
netdevs = { netdevs = {

View file

@ -1,24 +0,0 @@
{ self, ... }: {
microvm.vms = {
vm-test = {
flake = self;
updateFlake = "github:iofq/nix";
config = {
microvm.shares = [{
source = "/nix/store";
mountPoint = "/nix/.ro-store";
tag = "ro-store";
proto = "virtiofs";
}];
microvm.interfaces = [
{
type = "tap";
id = "vm-test";
mac = "02:00:00:00:00:01";
}
];
system.stateVersion = "23.11";
};
};
};
}

30
nixos/htz/vms/default.nix Normal file
View file

@ -0,0 +1,30 @@
{ lib, pkgs, addressList, ... }:
let genVMConfig = { name, config ? {}, ro-store ? true }: {
restartIfChanged = true;
pkgs = pkgs;
config = config // {
microvm = {
shares = lib.mkIf (ro-store == true) [{
source = "/nix/store";
mountPoint = "/nix/.ro-store";
tag = "ro-store";
proto = "virtiofs";
}];
interfaces = [
{
type = "tap";
id = name;
mac = addressList.${name}.mac;
}
];
};
} // import ./vmDefaults.nix { inherit name addressList; };
};
in {
microvm.vms = {
vm-test = genVMConfig {
name = "vm-test";
config = import ./vm-test.nix { inherit pkgs addressList; };
};
};
}

14
nixos/htz/vms/vm-test.nix Normal file
View file

@ -0,0 +1,14 @@
{ addressList, ... }: {
networking.firewall = {
enable = true;
allowedTCPPorts = [80];
allowedUDPPorts = [];
logRefusedConnections = true;
};
services.nginx.enable = true;
services.nginx.virtualHosts."default_server" = {
addSSL = false;
enableACME = false;
};
system.stateVersion = "23.11";
}

View file

@ -0,0 +1,37 @@
{ name, addressList, ...}: {
systemd.network = {
enable = true;
networks."20-lan" = {
matchConfig.Type = "ether";
networkConfig = {
Address = [(addressList.${name}.ipv4 + addressList.${name}.subnet)];
Gateway = "10.0.0.1";
DNS = ["1.1.1.1"];
IPv6AcceptRA = true;
DHCP = "no";
};
};
};
services.openssh.enable = true;
networking.firewall = {
enable = true;
allowedTCPPorts = [22];
allowedUDPPorts = [];
logRefusedConnections = true;
};
users.users = {
root = {
openssh.authorizedKeys.keys = [
''ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEV8yjC8g68hoIi5021A6MR0ggMy++8KjmtXMzyOir2c root@htz''
''ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILU2TUxKyGKoZ68IG4hw23RmxVf72u5K9W0StkgTr0b2 e@t14'' ];
};
e = {
isNormalUser = true;
extraGroups = [ "wheel" ];
openssh.authorizedKeys.keys = [
''ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEV8yjC8g68hoIi5021A6MR0ggMy++8KjmtXMzyOir2c root@htz''
''ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILU2TUxKyGKoZ68IG4hw23RmxVf72u5K9W0StkgTr0b2 e@t14''
];
};
};
}