Compare commits
3 Commits
hostbuilde
...
ea9baa3514
| Author | SHA1 | Date | |
|---|---|---|---|
| ea9baa3514 | |||
| c34102be09 | |||
| c2436d828e |
@@ -43,7 +43,6 @@ let
|
|||||||
defaultModules = baseModules;
|
defaultModules = baseModules;
|
||||||
|
|
||||||
makeMicroVM = hostName: ipv4Addr: macAddr: modules: [
|
makeMicroVM = hostName: ipv4Addr: macAddr: modules: [
|
||||||
self.nixosModules.malobeo.metrics
|
|
||||||
{
|
{
|
||||||
microvm = {
|
microvm = {
|
||||||
hypervisor = "cloud-hypervisor";
|
hypervisor = "cloud-hypervisor";
|
||||||
@@ -81,13 +80,6 @@ let
|
|||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
malobeo.metrics = {
|
|
||||||
enable = true;
|
|
||||||
enablePromtail = true;
|
|
||||||
logNginx = false;
|
|
||||||
lokiHost = "10.0.0.14";
|
|
||||||
};
|
|
||||||
|
|
||||||
systemd.network.enable = true;
|
systemd.network.enable = true;
|
||||||
|
|
||||||
systemd.network.networks."20-lan" = {
|
systemd.network.networks."20-lan" = {
|
||||||
@@ -202,4 +194,5 @@ in
|
|||||||
specialArgs.self = self;
|
specialArgs.self = self;
|
||||||
modules = defaultModules ++ [ ./testvm ];
|
modules = defaultModules ++ [ ./testvm ];
|
||||||
};
|
};
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -53,7 +53,7 @@ in
|
|||||||
};
|
};
|
||||||
|
|
||||||
services.malobeo.microvm.enableHostBridge = true;
|
services.malobeo.microvm.enableHostBridge = true;
|
||||||
services.malobeo.microvm.deployHosts = [ "infradocs" "nextcloud" "overwatch" ];
|
services.malobeo.microvm.deployHosts = [ "infradocs" "nextcloud" ];
|
||||||
|
|
||||||
networking = {
|
networking = {
|
||||||
firewall = {
|
firewall = {
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
{ config, lib, pkgs, inputs, ... }:
|
{ self, config, lib, pkgs, inputs, ... }:
|
||||||
|
|
||||||
with lib;
|
with lib;
|
||||||
|
|
||||||
@@ -9,16 +9,18 @@ with lib;
|
|||||||
};
|
};
|
||||||
|
|
||||||
imports = [
|
imports = [
|
||||||
|
self.nixosModules.malobeo.metrics
|
||||||
../durruti/documentation.nix
|
../durruti/documentation.nix
|
||||||
../modules/malobeo_user.nix
|
../modules/malobeo_user.nix
|
||||||
../modules/sshd.nix
|
../modules/sshd.nix
|
||||||
];
|
];
|
||||||
|
|
||||||
networking.firewall.allowedTCPPorts = [ 9002 ];
|
malobeo.metrics = {
|
||||||
|
enable = true;
|
||||||
malobeo.metrics.logNginx = lib.mkForce true;
|
enablePromtail = true;
|
||||||
|
logNginx = true;
|
||||||
users.users.promtail.extraGroups = [ "nginx" "systemd-journal" ];
|
lokiHost = "10.0.0.14";
|
||||||
|
};
|
||||||
|
|
||||||
system.stateVersion = "22.11"; # Did you read the comment?
|
system.stateVersion = "22.11"; # Did you read the comment?
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -86,12 +86,6 @@ in
|
|||||||
in
|
in
|
||||||
builtins.listToAttrs (map mapperFunc cfg.deployHosts);
|
builtins.listToAttrs (map mapperFunc cfg.deployHosts);
|
||||||
|
|
||||||
systemd.tmpfiles.rules = builtins.concatLists (map (name: [
|
|
||||||
"d /var/lib/microvms/${name}/var 0755 root root - -"
|
|
||||||
"d /var/lib/microvms/${name}/etc 0755 root root - -"
|
|
||||||
"d /${name} 0755 root root - -"
|
|
||||||
]) cfg.deployHosts);
|
|
||||||
|
|
||||||
systemd.services = builtins.foldl' (services: name: services // {
|
systemd.services = builtins.foldl' (services: name: services // {
|
||||||
"microvm-update@${name}" = {
|
"microvm-update@${name}" = {
|
||||||
description = "Update MicroVMs automatically";
|
description = "Update MicroVMs automatically";
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
{ config, lib, pkgs, inputs, ... }:
|
{ config, self, lib, pkgs, inputs, ... }:
|
||||||
|
|
||||||
with lib;
|
with lib;
|
||||||
|
|
||||||
@@ -9,11 +9,19 @@ with lib;
|
|||||||
};
|
};
|
||||||
|
|
||||||
imports = [
|
imports = [
|
||||||
|
self.nixosModules.malobeo.metrics
|
||||||
../modules/malobeo_user.nix
|
../modules/malobeo_user.nix
|
||||||
../modules/sshd.nix
|
../modules/sshd.nix
|
||||||
];
|
];
|
||||||
|
|
||||||
networking.firewall.allowedTCPPorts = [ 80 9080 9001 3100 ];
|
networking.firewall.allowedTCPPorts = [ 80 3100 ];
|
||||||
|
|
||||||
|
malobeo.metrics = {
|
||||||
|
enable = true;
|
||||||
|
enablePromtail = true;
|
||||||
|
logNginx = false;
|
||||||
|
lokiHost = "10.0.0.14";
|
||||||
|
};
|
||||||
|
|
||||||
services.grafana = {
|
services.grafana = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
|||||||
@@ -17,7 +17,6 @@ with lib;
|
|||||||
};
|
};
|
||||||
|
|
||||||
imports = [
|
imports = [
|
||||||
inputs.self.nixosModules.malobeo.vpn
|
|
||||||
../modules/malobeo_user.nix
|
../modules/malobeo_user.nix
|
||||||
../modules/sshd.nix
|
../modules/sshd.nix
|
||||||
../modules/minimal_tools.nix
|
../modules/minimal_tools.nix
|
||||||
|
|||||||
170
outputs.nix
170
outputs.nix
@@ -12,97 +12,6 @@
|
|||||||
let filter_system = name: if name == utils.lib.system.i686-linux then false else true;
|
let filter_system = name: if name == utils.lib.system.i686-linux then false else true;
|
||||||
in (utils.lib.eachSystem (builtins.filter filter_system utils.lib.defaultSystems) ( system:
|
in (utils.lib.eachSystem (builtins.filter filter_system utils.lib.defaultSystems) ( system:
|
||||||
let
|
let
|
||||||
baseModules = [
|
|
||||||
# make flake inputs accessiable in NixOS
|
|
||||||
{ _module.args.inputs = inputs; }
|
|
||||||
{
|
|
||||||
imports = [
|
|
||||||
({ pkgs, ... }: {
|
|
||||||
nix = {
|
|
||||||
extraOptions = ''
|
|
||||||
experimental-features = nix-command flakes
|
|
||||||
'';
|
|
||||||
|
|
||||||
settings = {
|
|
||||||
substituters = [
|
|
||||||
"https://cache.dynamicdiscord.de"
|
|
||||||
"https://cache.nixos.org/"
|
|
||||||
];
|
|
||||||
trusted-public-keys = [
|
|
||||||
"cache.dynamicdiscord.de:DKueZicqi2NhJJXz9MYgUbiyobMs10fTyHCgAUibRP4="
|
|
||||||
];
|
|
||||||
trusted-users = [ "root" "@wheel" ];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
})
|
|
||||||
sops-nix.nixosModules.sops
|
|
||||||
#microvm.nixosModules.microvm
|
|
||||||
];
|
|
||||||
}
|
|
||||||
];
|
|
||||||
defaultModules = baseModules;
|
|
||||||
|
|
||||||
makeMicroVM = hostName: ipv4Addr: macAddr: modules: [
|
|
||||||
self.nixosModules.malobeo.metrics
|
|
||||||
{
|
|
||||||
microvm = {
|
|
||||||
hypervisor = "cloud-hypervisor";
|
|
||||||
mem = 2560;
|
|
||||||
shares = [
|
|
||||||
{
|
|
||||||
source = "/nix/store";
|
|
||||||
mountPoint = "/nix/.ro-store";
|
|
||||||
tag = "store";
|
|
||||||
proto = "virtiofs";
|
|
||||||
socket = "store.socket";
|
|
||||||
}
|
|
||||||
{
|
|
||||||
source = "/var/lib/microvms/${hostName}/etc";
|
|
||||||
mountPoint = "/etc";
|
|
||||||
tag = "etc";
|
|
||||||
proto = "virtiofs";
|
|
||||||
socket = "etc.socket";
|
|
||||||
}
|
|
||||||
{
|
|
||||||
source = "/var/lib/microvms/${hostName}/var";
|
|
||||||
mountPoint = "/var";
|
|
||||||
tag = "var";
|
|
||||||
proto = "virtiofs";
|
|
||||||
socket = "var.socket";
|
|
||||||
}
|
|
||||||
];
|
|
||||||
|
|
||||||
interfaces = [
|
|
||||||
{
|
|
||||||
type = "tap";
|
|
||||||
id = "vm-${hostName}";
|
|
||||||
mac = "${macAddr}";
|
|
||||||
}
|
|
||||||
];
|
|
||||||
};
|
|
||||||
|
|
||||||
malobeo.metrics = {
|
|
||||||
enable = true;
|
|
||||||
enablePromtail = true;
|
|
||||||
logNginx = false;
|
|
||||||
lokiHost = "10.0.0.14";
|
|
||||||
};
|
|
||||||
|
|
||||||
systemd.network.enable = true;
|
|
||||||
|
|
||||||
systemd.network.networks."20-lan" = {
|
|
||||||
matchConfig.Type = "ether";
|
|
||||||
networkConfig = {
|
|
||||||
Address = [ "${ipv4Addr}/24" ];
|
|
||||||
Gateway = "10.0.0.1";
|
|
||||||
DNS = ["1.1.1.1"];
|
|
||||||
DHCP = "no";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
||||||
] ++ defaultModules ++ modules;
|
|
||||||
|
|
||||||
|
|
||||||
pkgs-unstable = nixpkgs-unstable.legacyPackages."${system}";
|
pkgs-unstable = nixpkgs-unstable.legacyPackages."${system}";
|
||||||
pkgs = nixpkgs.legacyPackages."${system}";
|
pkgs = nixpkgs.legacyPackages."${system}";
|
||||||
|
|
||||||
@@ -111,17 +20,7 @@ in (utils.lib.eachSystem (builtins.filter filter_system utils.lib.defaultSystems
|
|||||||
mem = pkgs.lib.mkForce 4096;
|
mem = pkgs.lib.mkForce 4096;
|
||||||
hypervisor = pkgs.lib.mkForce "qemu";
|
hypervisor = pkgs.lib.mkForce "qemu";
|
||||||
socket = pkgs.lib.mkForce null;
|
socket = pkgs.lib.mkForce null;
|
||||||
|
shares = pkgs.lib.mkForce ([
|
||||||
|
|
||||||
#needed for hosts that deploy imperative microvms (for example fanny)
|
|
||||||
writableStoreOverlay = pkgs.lib.mkIf options.writableStore "/nix/.rw-store";
|
|
||||||
volumes = pkgs.lib.mkIf options.writableStore [ {
|
|
||||||
image = "nix-store-overlay.img";
|
|
||||||
mountPoint = self.nixosConfigurations.${hostname}.config.microvm.writableStoreOverlay;
|
|
||||||
size = 2048;
|
|
||||||
} ];
|
|
||||||
|
|
||||||
shares = pkgs.lib.mkForce (pkgs.lib.optionals (!options.writableStore) [
|
|
||||||
{
|
{
|
||||||
tag = "ro-store";
|
tag = "ro-store";
|
||||||
source = "/nix/store";
|
source = "/nix/store";
|
||||||
@@ -135,18 +34,11 @@ in (utils.lib.eachSystem (builtins.filter filter_system utils.lib.defaultSystems
|
|||||||
tag = "var";
|
tag = "var";
|
||||||
}
|
}
|
||||||
]);
|
]);
|
||||||
|
|
||||||
interfaces = pkgs.lib.mkIf (!options.withNetworking) (pkgs.lib.mkForce [{
|
interfaces = pkgs.lib.mkIf (!options.withNetworking) (pkgs.lib.mkForce [{
|
||||||
type = "user";
|
type = "user";
|
||||||
id = "eth0";
|
id = "eth0";
|
||||||
mac = "02:23:de:ad:be:ef";
|
mac = "02:23:de:ad:be:ef";
|
||||||
}]);
|
}]);
|
||||||
|
|
||||||
#if networking is disabled forward port 80 to still have access to webservices
|
|
||||||
forwardPorts = pkgs.lib.mkIf (!options.withNetworking) (pkgs.lib.mkForce [
|
|
||||||
{ from = "host"; host.port = 8080; guest.port = 80; }
|
|
||||||
]);
|
|
||||||
|
|
||||||
};
|
};
|
||||||
|
|
||||||
fileSystems = {
|
fileSystems = {
|
||||||
@@ -194,59 +86,15 @@ in (utils.lib.eachSystem (builtins.filter filter_system utils.lib.defaultSystems
|
|||||||
}];
|
}];
|
||||||
};
|
};
|
||||||
|
|
||||||
buildVM = host: networking: sopsDummy: disableDisko: varPath: writableStore: (self.nixosConfigurations.${host}.extendModules {
|
buildVM = host: networking: sopsDummy: disableDisko: varPath: (self.nixosConfigurations.${host}.extendModules {
|
||||||
modules = [
|
modules = [
|
||||||
(vmMicroVMOverwrites host {
|
(vmMicroVMOverwrites host { withNetworking = networking; varPath = "${varPath}"; })
|
||||||
withNetworking = networking;
|
|
||||||
varPath = "${varPath}";
|
|
||||||
writableStore = writableStore; })
|
|
||||||
(if sopsDummy then (vmSopsOverwrites host) else {})
|
(if sopsDummy then (vmSopsOverwrites host) else {})
|
||||||
(if disableDisko then vmDiskoOverwrites else {})
|
(if disableDisko then vmDiskoOverwrites else {})
|
||||||
] ++ pkgs.lib.optionals (! self.nixosConfigurations.${host}.config ? microvm) [
|
] ++ pkgs.lib.optionals (! self.nixosConfigurations.${host}.config ? microvm) [
|
||||||
#microvm.nixosModules.microvm
|
microvm.nixosModules.microvm
|
||||||
] ++ pkgs.lib.optionals (self.nixosConfigurations.${host}.config ? services.malobeo.microvm.deployHosts) [
|
];
|
||||||
#microvm.nixosModules.host
|
}).config.microvm.declaredRunner;
|
||||||
{
|
|
||||||
services.malobeo.microvm.deployHosts = pkgs.lib.mkForce [];
|
|
||||||
systemd.tmpfiles.rules = builtins.concatLists (map (name: [
|
|
||||||
"q /var/lib/microvms/${name}/var 0755 root root - -"
|
|
||||||
"q /var/lib/microvms/${name}/etc 0755 root root - -"
|
|
||||||
"q /var/${name}/wow/it/works 0755 root root - -"
|
|
||||||
"q /var/lib/${name} 0755 root root - -"
|
|
||||||
"d /${name} 0755 root root - -"
|
|
||||||
]) self.nixosConfigurations.${host}.config.services.malobeo.microvm.deployHosts);
|
|
||||||
|
|
||||||
|
|
||||||
microvm.vms =
|
|
||||||
let
|
|
||||||
# Map the values to each hostname to then generate an Attrset using listToAttrs
|
|
||||||
mapperFunc = name: { inherit name; value = {
|
|
||||||
#pkgs = import self.nixosConfigurations.${name}.config.nixpkgs;
|
|
||||||
|
|
||||||
#pkgs = (buildVM name networking sopsDummy false "" false).config.nixpkgs;
|
|
||||||
#config = (buildVM name networking sopsDummy false "" false);
|
|
||||||
#pkgs = pkgs;
|
|
||||||
#config = self.nixosConfigurations.${name};
|
|
||||||
specialArgs.inputs = inputs;
|
|
||||||
specialArgs.self = self;
|
|
||||||
config = {
|
|
||||||
imports = (makeMicroVM "${name}" "10.0.0.11" "D0:E5:CA:F0:D7:E7" [
|
|
||||||
|
|
||||||
#(vmMicroVMOverwrites name {
|
|
||||||
# withNetworking = true;
|
|
||||||
# varPath = "";
|
|
||||||
# writableStore = false; })
|
|
||||||
(if sopsDummy then (vmSopsOverwrites name) else {})
|
|
||||||
|
|
||||||
|
|
||||||
]);
|
|
||||||
|
|
||||||
};
|
|
||||||
}; };
|
|
||||||
in
|
|
||||||
builtins.listToAttrs (map mapperFunc self.nixosConfigurations.${host}.config.services.malobeo.microvm.deployHosts);
|
|
||||||
}];
|
|
||||||
});
|
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
devShells.default =
|
devShells.default =
|
||||||
@@ -309,7 +157,6 @@ in (utils.lib.eachSystem (builtins.filter filter_system utils.lib.defaultSystems
|
|||||||
echo "--networking setup interfaces. requires root and hostbridge enabled on the host"
|
echo "--networking setup interfaces. requires root and hostbridge enabled on the host"
|
||||||
echo "--dummy-secrets run vm with dummy sops secrets"
|
echo "--dummy-secrets run vm with dummy sops secrets"
|
||||||
echo "--no-disko disable disko and initrd secrets. needed for real hosts like fanny"
|
echo "--no-disko disable disko and initrd secrets. needed for real hosts like fanny"
|
||||||
echo "--writable-store enables writable store. necessary for host with nested imperative microvms like fanny"
|
|
||||||
echo "--var path to directory that should be shared as /var. may require root otherwise some systemd units fail within vm. if dir is empty vm will populate"
|
echo "--var path to directory that should be shared as /var. may require root otherwise some systemd units fail within vm. if dir is empty vm will populate"
|
||||||
exit 1
|
exit 1
|
||||||
}
|
}
|
||||||
@@ -325,7 +172,6 @@ in (utils.lib.eachSystem (builtins.filter filter_system utils.lib.defaultSystems
|
|||||||
NETWORK=false
|
NETWORK=false
|
||||||
DUMMY_SECRETS=false
|
DUMMY_SECRETS=false
|
||||||
NO_DISKO=false
|
NO_DISKO=false
|
||||||
RW_STORE=false
|
|
||||||
VAR_PATH=""
|
VAR_PATH=""
|
||||||
|
|
||||||
# check argws
|
# check argws
|
||||||
@@ -335,7 +181,6 @@ in (utils.lib.eachSystem (builtins.filter filter_system utils.lib.defaultSystems
|
|||||||
--networking) NETWORK=true ;;
|
--networking) NETWORK=true ;;
|
||||||
--dummy-secrets) DUMMY_SECRETS=true ;;
|
--dummy-secrets) DUMMY_SECRETS=true ;;
|
||||||
--no-disko) NO_DISKO=true ;;
|
--no-disko) NO_DISKO=true ;;
|
||||||
--writable-store) RW_STORE=true ;;
|
|
||||||
--var)
|
--var)
|
||||||
if [[ -n "$2" && ! "$2" =~ ^- ]]; then
|
if [[ -n "$2" && ! "$2" =~ ^- ]]; then
|
||||||
VAR_PATH="$2"
|
VAR_PATH="$2"
|
||||||
@@ -353,12 +198,11 @@ in (utils.lib.eachSystem (builtins.filter filter_system utils.lib.defaultSystems
|
|||||||
echo "enable networking: $NETWORK"
|
echo "enable networking: $NETWORK"
|
||||||
echo "deploy dummy secrets: $DUMMY_SECRETS"
|
echo "deploy dummy secrets: $DUMMY_SECRETS"
|
||||||
echo "disable disko and initrd secrets: $NO_DISKO"
|
echo "disable disko and initrd secrets: $NO_DISKO"
|
||||||
echo "use writable store: $RW_STORE"
|
|
||||||
if [ -n "$VAR_PATH" ]; then
|
if [ -n "$VAR_PATH" ]; then
|
||||||
echo "sharing var directory: $VAR_PATH"
|
echo "sharing var directory: $VAR_PATH"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
${pkgs.nix}/bin/nix run --show-trace --impure --expr "((builtins.getFlake \"$(pwd)\").vmBuilder.x86_64-linux \"$HOSTNAME\" $NETWORK $DUMMY_SECRETS $NO_DISKO \"$VAR_PATH\" $RW_STORE).config.microvm.declaredRunner"
|
${pkgs.nix}/bin/nix run --show-trace --impure --expr "((builtins.getFlake \"$(pwd)\").vmBuilder.x86_64-linux \"$HOSTNAME\" $NETWORK $DUMMY_SECRETS $NO_DISKO \"$VAR_PATH\")"
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user