add hyprland conf

This commit is contained in:
iofq 2024-03-10 03:13:58 -05:00
parent 1849fdc496
commit e1f0194350
No known key found for this signature in database
GPG key ID: ECF3B2DA38BF7183
21 changed files with 712 additions and 263 deletions

View file

@ -1,8 +1,105 @@
_: {
{
inputs,
lib,
pkgs,
system,
addressList,
...
}: let
genVMConfig = {
name,
config ? {},
...
}: {
restartIfChanged = true;
inherit pkgs;
# Merge custom config passed with defaults
config =
lib.attrsets.recursiveUpdate
{
microvm = {
shares = [
{
source = "/nix/store";
mountPoint = "/nix/.ro-store";
tag = "ro-store";
proto = "virtiofs";
}
];
interfaces = [
{
type = "tap";
id = name;
inherit (addressList.${name}) mac;
}
];
};
systemd.network = {
enable = true;
networks."20-lan" = {
matchConfig.Type = "ether";
networkConfig = {
Address = [(addressList.${name}.ipv4 + addressList.${name}.subnet)];
Gateway = "10.0.0.1";
DNS = ["1.1.1.1"];
IPv6AcceptRA = true;
DHCP = "no";
};
};
networks."19-docker" = {
matchConfig.Name = "veth*";
linkConfig = {
Unmanaged = true;
};
};
};
services.openssh = {
enable = true;
listenAddresses = [
{
addr = addressList.${name}.ipv4;
port = 22;
}
];
settings.PasswordAuthentication = false;
settings.KbdInteractiveAuthentication = false;
};
networking.firewall = {
enable = true;
allowedTCPPorts = [22];
allowedUDPPorts = [];
logRefusedConnections = true;
};
users.users = {
root = {
openssh.authorizedKeys.keys = [
''ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIItTJm2iu/5xacOoh4/JAvMtHE62duDlVVXpvVP+uQMR root@htz''
''ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHM4Zr0PFN7QdOG2aJ+nuzRCK6caulrpY6bphA1Ppl8Y e@t14''
];
};
e = {
isNormalUser = true;
extraGroups = ["wheel"];
openssh.authorizedKeys.keys = [
''ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIItTJm2iu/5xacOoh4/JAvMtHE62duDlVVXpvVP+uQMR root@htz''
''ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILU2TUxKyGKoZ68IG4hw23RmxVf72u5K9W0StkgTr0b2 e@t14''
];
};
};
documentation.enable = false;
system.stateVersion = "23.11";
}
config;
};
in {
microvm.vms = {
# vm-headscale = genVMConfig {
# name = "vm-headscale";
# config = import ./headscale.nix { inherit config; };
# };
vm-pool = genVMConfig {
name = "vm-pool";
config = import ./pool.nix {inherit pkgs system inputs;};
};
vm-k3s = genVMConfig {
name = "vm-k3s";
config = import ./k3s.nix {inherit pkgs;};
};
};
}

28
nixos/htz/vms/k3s.nix Normal file
View file

@ -0,0 +1,28 @@
{pkgs, ...}: {
environment.systemPackages = with pkgs; [
k3s
];
services.k3s = {
enable = true;
role = "server";
extraFlags = toString [
"--disable traefik"
];
};
networking.firewall = {
allowedTCPPorts = [6443];
};
services.tailscale.enable = true;
microvm = {
vcpu = 2;
mem = 4096;
volumes = [
{
image = "/var/lib/microvms/vm-k3s/vm-k3s-root.img";
label = "vm-pool-root";
mountPoint = "/";
size = 10000;
}
];
};
}

34
nixos/htz/vms/pool.nix Normal file
View file

@ -0,0 +1,34 @@
{
system,
inputs,
pkgs,
...
}: {
imports = [inputs.ethereum-nix.nixosModules.default];
environment.systemPackages = with pkgs; [
vim
inputs.ethereum-nix.packages.${system}.rocketpool
docker-compose
];
environment.interactiveShellInit = ''
alias rp='rocketpool --allow-root'
'';
virtualisation = {
docker = {
enable = true;
};
};
microvm = {
vcpu = 2;
mem = 4096;
volumes = [
{
image = "/var/lib/microvms/vm-pool/vm-pool-root.img";
label = "vm-pool-root";
mountPoint = "/";
size = 40000;
}
];
};
}