blob: 42c9d077ad6339cead4cf60e0c47c0e7e2635767 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
|
# https://github.com/mitchellh/nixos-config/blob/main/machines/vm-aarch64-prl.nix
{
self,
config,
pkgs,
lib,
...
}:
with lib; {
imports = [
(self + "/profiles/vmware-guest.nix")
];
system.stateVersion = "24.05";
virtualisation.vmware.guest.enable = true;
virtualisation.docker.enable = false;
virtualisation.docker.rootless = {
enable = true;
setSocketVariable = true;
daemon.settings = {
hosts = ["unix:///run/user/${toString config.my.uid}/docker.sock" "tcp://127.0.0.1:2376"];
};
};
systemd.user.services.docker.serviceConfig.Environment = "DOCKERD_ROOTLESS_ROOTLESSKIT_FLAGS=\"-p 0.0.0.0:2376:2376/tcp\"";
systemd.user.services.docker.serviceConfig.ExecStart = let
cfg = config.virtualisation.docker.rootless;
in
mkForce "${cfg.package}/bin/dockerd-rootless --config-file=${(pkgs.formats.json {}).generate "daemon.json" cfg.daemon.settings}";
networking.hostName = "vm-aarch64";
programs.nix-ld.enable = true;
hm.xsession.initExtra = ''
${pkgs.xorg.xset}/bin/xset r rate 230 30
${pkgs.open-vm-tools}/bin/vmware-user-suid-wrapper
wal -R
dwm
'';
hm.services.ssh-agent.enable = true;
environment.variables = {
WEBKIT_DISABLE_COMPOSITING_MODE = 1;
};
environment.systemPackages = with pkgs; [
kubernetes-helm
(azure-cli.withExtensions [azure-cli.extensions.aks-preview azure-cli.extensions.account])
awscli2
(google-cloud-sdk.withExtraComponents (with google-cloud-sdk.components; [
gke-gcloud-auth-plugin
]))
k9s
kubectl
krew
kubelogin
just
(ffmpeg.override {
withXcb = true;
})
mpv
];
services.pcscd.enable = true;
sops.age.keyFile = "${config.hm.xdg.configHome}/sops/age/keys.txt";
my.shell = pkgs.nushell;
environment.shells = [pkgs.bashInteractive pkgs.zsh pkgs.nushell];
environment.pathsToLink = ["/share/zsh"];
programs.zsh.enable = true;
services.openssh.enable = true;
services.openssh.settings.PasswordAuthentication = true;
services.openssh.settings.PermitRootLogin = "yes";
# Setup qemu so we can run x86_64 binaries
boot.binfmt.emulatedSystems = ["x86_64-linux"];
# Disable the default module and import our override. We have
# customizations to make this work on aarch64.
disabledModules = ["virtualisation/vmware-guest.nix"];
# Interface is this on M1
networking.interfaces.ens160.useDHCP = true;
# Lots of stuff that uses aarch64 that claims doesn't work, but actually works.
nixpkgs.config.allowUnfree = true;
nixpkgs.config.allowUnsupportedSystem = true;
# This works through our custom module imported above
# virtualisation.vmware.guest.enable = true;
# Share our host filesystem
# fileSystems."/host" = {
# fsType = "fuse./run/current-system/sw/bin/vmhgfs-fuse";
# device = ".host:/";
# options = [
# "umask=22"
# "uid=1000"
# "gid=1000"
# "allow_other"
# "auto_unmount"
# "defaults"
# ];
# };
# Use the systemd-boot EFI boot loader.
boot.loader.systemd-boot.enable = true;
boot.loader.efi.canTouchEfiVariables = true;
# VMware, Parallels both only support this being 0 otherwise you see
# "error switching console mode" on boot.
boot.loader.systemd-boot.consoleMode = "0";
# Hardware
boot.initrd.availableKernelModules = ["xhci_pci" "nvme" "sr_mod"];
boot.initrd.kernelModules = [];
boot.kernelModules = [];
boot.extraModulePackages = [];
fileSystems."/" = {
device = "/dev/disk/by-label/nixos";
fsType = "ext4";
};
fileSystems."/boot" = {
device = "/dev/disk/by-label/boot";
fsType = "vfat";
options = ["fmask=0022" "dmask=0022"];
};
swapDevices = [];
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's
# still possible to use this option, but it's recommended to use it in conjunction
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
networking.useDHCP = lib.mkDefault true;
# networking.interfaces.ens160.useDHCP = lib.mkDefault true;
nixpkgs.hostPlatform = lib.mkDefault "aarch64-linux";
nix.settings.trusted-users = [my.username];
}
|