forked from mirrors/nixpkgs
65 lines
1.4 KiB
Nix
65 lines
1.4 KiB
Nix
{ config, pkgs, lib, ... }:
|
|
|
|
with lib;
|
|
|
|
{
|
|
options.proxmoxLXC = {
|
|
privileged = mkOption {
|
|
type = types.bool;
|
|
default = false;
|
|
description = ''
|
|
Whether to enable privileged mounts
|
|
'';
|
|
};
|
|
manageNetwork = mkOption {
|
|
type = types.bool;
|
|
default = false;
|
|
description = ''
|
|
Whether to manage network interfaces through nix options
|
|
When false, systemd-networkd is enabled to accept network
|
|
configuration from proxmox.
|
|
'';
|
|
};
|
|
};
|
|
|
|
config =
|
|
let
|
|
cfg = config.proxmoxLXC;
|
|
in
|
|
{
|
|
system.build.tarball = pkgs.callPackage ../../lib/make-system-tarball.nix {
|
|
storeContents = [{
|
|
object = config.system.build.toplevel;
|
|
symlink = "none";
|
|
}];
|
|
|
|
contents = [{
|
|
source = config.system.build.toplevel + "/init";
|
|
target = "/sbin/init";
|
|
}];
|
|
|
|
extraCommands = "mkdir -p root etc/systemd/network";
|
|
};
|
|
|
|
boot = {
|
|
isContainer = true;
|
|
loader.initScript.enable = true;
|
|
};
|
|
|
|
networking = mkIf (!cfg.manageNetwork) {
|
|
useDHCP = false;
|
|
useHostResolvConf = false;
|
|
useNetworkd = true;
|
|
};
|
|
|
|
services.openssh = {
|
|
enable = mkDefault true;
|
|
startWhenNeeded = mkDefault true;
|
|
};
|
|
|
|
systemd.mounts = mkIf (!cfg.privileged)
|
|
[{ where = "/sys/kernel/debug"; enable = false; }];
|
|
|
|
};
|
|
}
|