add tudelft vm
Some checks failed
Lint / lint (push) Failing after 2m8s
Plex Update / update (push) Successful in 2m13s

This commit is contained in:
Vivian 2023-12-18 15:49:08 +01:00
parent 41d7901887
commit 3557cc4101
6 changed files with 53 additions and 32 deletions

30
flake.lock generated
View file

@ -664,11 +664,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1702538064, "lastModified": 1702814335,
"narHash": "sha256-At5GwJPu2tzvS9dllhBoZmqK6lkkh/sOp2YefWRlaL8=", "narHash": "sha256-Qck7BAMi3eydzT1WFOzp/SgECetyPpOn1dLgmxH2ebQ=",
"owner": "nix-community", "owner": "nix-community",
"repo": "home-manager", "repo": "home-manager",
"rev": "0e2e443ff24f9d75925e91b89d1da44b863734af", "rev": "e4dba0bd01956170667458be7b45f68170a63651",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -1066,11 +1066,11 @@
}, },
"nixpkgs_4": { "nixpkgs_4": {
"locked": { "locked": {
"lastModified": 1702483393, "lastModified": 1702855317,
"narHash": "sha256-xdZ+69I2z5ywVtJHW3+BQ99rKFDPkyaPNznstw+gfS8=", "narHash": "sha256-5EXeUkoWvrfbZQQLVRn7Ebb9LOt3DkVm6T0M31/VhtM=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "224b3a5ad9a960e4a6e3cd59233c1616164c5ef5", "rev": "3a16c6447466f4034c2d75fe7014477142c9513e",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -1161,11 +1161,11 @@
}, },
"nixpkgs_stable": { "nixpkgs_stable": {
"locked": { "locked": {
"lastModified": 1702350026, "lastModified": 1702759837,
"narHash": "sha256-A+GNZFZdfl4JdDphYKBJ5Ef1HOiFsP18vQe9mqjmUis=", "narHash": "sha256-u3XeJVRe/Q975nwFE+6ALEwypMKJEELMJKDAhSKyq3M=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "9463103069725474698139ab10f17a9d125da859", "rev": "b2566f4f897ac6224e094b167d9488d03e157f28",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -1181,11 +1181,11 @@
"pre-commit-hooks": "pre-commit-hooks" "pre-commit-hooks": "pre-commit-hooks"
}, },
"locked": { "locked": {
"lastModified": 1702508038, "lastModified": 1702895385,
"narHash": "sha256-m/Oo1A9fjd9WroX9Ta/K01qjN3Vz2M7VRnS1qCxE/pU=", "narHash": "sha256-xCfbHlBEPbjpecbhd9zJ79xyI9pURW9/BsY75DNIfs4=",
"owner": "pta2002", "owner": "pta2002",
"repo": "nixvim", "repo": "nixvim",
"rev": "41f5b167e7cfe2fe1ef90f7007708916bd65565d", "rev": "309e5644fc72ce82b31da5290638019f60a0a84b",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -1196,11 +1196,11 @@
}, },
"nur": { "nur": {
"locked": { "locked": {
"lastModified": 1702543472, "lastModified": 1702889123,
"narHash": "sha256-4qX7qaSoabwR+kK0tcPMhafjVyYJnHroRNlWAVG7sVU=", "narHash": "sha256-hgdt5ZE76rBbOXVgaBfTY5pT8VezeAeeYomyofrs9RY=",
"owner": "nix-community", "owner": "nix-community",
"repo": "NUR", "repo": "NUR",
"rev": "e45bc50d0fb04e748cf890062023da461c2476ad", "rev": "5eb36fd2d32f43177896e8dd5a7ba134d3d5e949",
"type": "github" "type": "github"
}, },
"original": { "original": {

View file

@ -125,12 +125,12 @@
}; };
# Broken # Broken
# proxmox-vm = nixos-generators.nixosGenerate { proxmox-vm = nixos-generators.nixosGenerate {
# inherit system pkgs specialArgs; inherit system specialArgs;
# format = "proxmox"; format = "proxmox";
# modules = util.base_imports modules = util.base_imports
# ++ [ (import ./nixos/templates/proxmox-vm.nix) ]; ++ [ (import ./nixos/templates/proxmox-vm.nix) ];
# }; };
}; };
# Use by running `nix develop` # Use by running `nix develop`
@ -142,12 +142,7 @@
colmena.packages.${system}.colmena colmena.packages.${system}.colmena
cachix cachix
deadnix deadnix
fluxcd
k9s
kubectl
kubectx
statix statix
terraform
nixfmt nixfmt
nixpkgs-fmt nixpkgs-fmt
nixUnstable nixUnstable
@ -158,7 +153,6 @@
(vault-push-approle-envs self { }) (vault-push-approle-envs self { })
(vault-push-approles self { }) (vault-push-approles self { })
fast-repl fast-repl
weave-gitops
]; ];
}; };
}; };

View file

@ -153,7 +153,10 @@
mac = "00:0c:29:9b:e1:c4"; mac = "00:0c:29:9b:e1:c4";
nix = false; nix = false;
}; };
# ip = "192.168.0.132"; "tudelft" = {
ip = "192.168.0.132";
mac = "AE:B3:93:4B:04:76";
};
"mastodon" = { "mastodon" = {
ip = "192.168.0.138"; ip = "192.168.0.138";
mac = "52:60:8a:06:86:9c"; mac = "52:60:8a:06:86:9c";

View file

@ -0,0 +1,22 @@
# Edit this configuration file to define what should be installed on
# your system. Help is available in the configuration.nix(5) man page
# and in the NixOS manual (accessible by running nixos-help).
{ pkgs, ... }:
{
imports = [ ];
# This value determines the NixOS release from which the default
# settings for stateful data, like file locations and database versions
# on your system were taken. Its perfectly fine and recommended to leave
# this value at the release version of the first install of this system.
# Before changing this value read the documentation for this option
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
system.stateVersion = "23.11"; # Did you read the comment?
# Additional packages
environment.systemPackages = with pkgs; [ ];
networking.firewall.allowedTCPPorts = [ ];
}

View file

@ -1,11 +1,12 @@
{ lib, ... }: { { lib, ... }: {
imports = [ ../common/common.nix ../common/generic-vm.nix ]; imports = [ ../common ../common/generic-vm.nix ];
proxmox.qemuConf = { proxmox.qemuConf = {
virtio0 = "local-zfs:vm-9999-disk-0"; virtio0 = "local-zfs:vm-9999-disk-0";
cores = 1; cores = 4;
memory = 1024; memory = 4096;
bios = "ovmf"; bios = "ovmf";
additionalSpace = "20G";
}; };
# Enable SSH # Enable SSH

View file

@ -3,6 +3,7 @@ let
inherit (builtins) filter attrValues concatMap mapAttrs; inherit (builtins) filter attrValues concatMap mapAttrs;
inherit (nixpkgs.lib.attrsets) mapAttrsToList; inherit (nixpkgs.lib.attrsets) mapAttrsToList;
base_imports = [ base_imports = [
./common
home-manager.nixosModules.home-manager home-manager.nixosModules.home-manager
mailserver.nixosModules.mailserver mailserver.nixosModules.mailserver
attic.nixosModules.atticd attic.nixosModules.atticd
@ -25,7 +26,7 @@ let
# Helper function to resolve what should be imported depending on the type of config (lxc, vm, bare metal) # Helper function to resolve what should be imported depending on the type of config (lxc, vm, bare metal)
resolve_imports = { hostname, realm, profile ? hostname, type ? "lxc", ... }: resolve_imports = { hostname, realm, profile ? hostname, type ? "lxc", ... }:
type_import type type_import type
++ [ ./common "${./.}/hosts/${realm}/${profile}/configuration.nix" ]; ++ [ "${./.}/hosts/${realm}/${profile}/configuration.nix" ];
# Add to whatever realm a host belong to its list of tags # Add to whatever realm a host belong to its list of tags
add_realm_to_tags = mapAttrs (realm: add_realm_to_tags = mapAttrs (realm: