nixfiles/nixos/boxes/colony/default.nix

160 lines
4.7 KiB
Nix
Raw Normal View History

{ lib, ... }: {
imports = [ ./vms ];
nixos.systems.colony = {
system = "x86_64-linux";
nixpkgs = "mine-stable";
home-manager = "mine-stable";
2022-02-19 22:55:53 +00:00
assignments = {
internal = {
altNames = [ "vm" ];
2022-06-05 16:40:44 +01:00
domain = lib.my.colony.domain;
ipv4.address = "${lib.my.colony.start.base.v4}2";
ipv6 = {
iid = "::2";
address = "${lib.my.colony.start.base.v6}2";
};
};
vms = {
ipv4 = {
address = "${lib.my.colony.start.vms.v4}1";
gateway = null;
};
ipv6.address = "${lib.my.colony.start.vms.v6}1";
};
2022-05-17 23:27:14 +01:00
};
configuration = { lib, pkgs, modulesPath, config, systems, assignments, allAssignments, ... }:
let
2022-05-29 15:22:49 +01:00
inherit (lib) mkIf mkMerge mkForce;
2022-05-17 23:27:14 +01:00
inherit (lib.my) networkdAssignment;
in
{
imports = [ "${modulesPath}/profiles/qemu-guest.nix" ];
2022-02-13 23:06:31 +00:00
boot.kernelParams = [ "intel_iommu=on" ];
boot.loader.systemd-boot.configurationLimit = 20;
fileSystems = {
"/boot" = {
device = "/dev/disk/by-label/ESP";
fsType = "vfat";
};
"/nix" = {
device = "/dev/ssds/colony-nix";
fsType = "ext4";
};
"/persist" = {
device = "/dev/ssds/colony-persist";
fsType = "ext4";
neededForBoot = true;
};
};
services = {
lvm = {
boot.thin.enable = true;
dmeventd.enable = true;
};
};
environment.systemPackages = with pkgs; [
pciutils
];
systemd = {
network = {
2022-05-18 23:29:52 +01:00
links = {
"10-base-ext" = {
matchConfig.MACAddress = "52:54:00:81:bd:a1";
linkConfig.Name = "base-ext";
};
};
netdevs = {
"25-base".netdevConfig = {
Name = "base";
Kind = "bridge";
};
2022-05-29 15:22:49 +01:00
"25-vms".netdevConfig = {
Name = "vms";
Kind = "bridge";
};
2022-05-29 15:22:49 +01:00
"30-vms-dummy".netdevConfig = {
Name = "vms0";
Kind = "dummy";
};
};
2022-05-18 22:52:42 +01:00
networks = {
"80-base" = networkdAssignment "base" assignments.internal;
2022-05-18 23:29:52 +01:00
"80-base-ext" = {
matchConfig.Name = "base-ext";
networkConfig.Bridge = "base";
};
"80-vms" = mkMerge [
(networkdAssignment "vms" assignments.vms)
{
networkConfig = {
IPv6AcceptRA = mkForce false;
IPv6SendRA = true;
};
ipv6SendRAConfig = {
DNS = [ allAssignments.estuary.base.ipv6.address ];
Domains = [ config.networking.domain ];
};
ipv6Prefixes = [
{
ipv6PrefixConfig.Prefix = lib.my.colony.prefixes.vms.v6;
}
];
routes = map (r: { routeConfig = r; }) [
{
Gateway = allAssignments.shill.internal.ipv4.address;
Destination = lib.my.colony.prefixes.ctrs.v4;
}
{
Gateway = allAssignments.shill.internal.ipv6.address;
Destination = lib.my.colony.prefixes.ctrs.v6;
}
];
}
];
2022-05-29 15:22:49 +01:00
# Just so the vms interface will come up (in networkd's eyes), allowing dependant VMs to start.
# Could tweak the `waitOnline` for a single VM, but this seems better overall?
"80-vms-dummy" = {
matchConfig.Name = "vms0";
networkConfig.Bridge = "vms";
2022-05-18 22:52:42 +01:00
};
};
};
};
#environment.etc."udev/udev.conf".text = "udev_log=debug";
2022-03-26 14:20:30 +00:00
#systemd.services.systemd-networkd.environment.SYSTEMD_LOG_LEVEL = "debug";
virtualisation = {
cores = 8;
memorySize = 8192;
qemu.options = [
"-machine q35"
"-accel kvm,kernel-irqchip=split"
"-device intel-iommu,intremap=on,caching-mode=on"
];
};
my = {
#deploy.generate.system.mode = "boot";
secrets = {
key = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKp5WDdDr/1NS3SJIDOKwcCNZDFOxqPAD7cbZWAP7EkX";
};
server.enable = true;
firewall = {
trustedInterfaces = [ "base" "vms" ];
};
};
};
2022-02-19 22:55:53 +00:00
};
2022-02-13 13:10:21 +00:00
}