2025-02-10 21:55:08 +00:00
|
|
|
{
|
|
|
|
config,
|
|
|
|
pkgs,
|
|
|
|
lib,
|
|
|
|
...
|
|
|
|
}:
|
2023-02-17 16:28:50 +00:00
|
|
|
let
|
|
|
|
cfg = config.bordervm;
|
2025-02-10 21:55:08 +00:00
|
|
|
inherit (lib)
|
|
|
|
mkOption
|
|
|
|
mkEnableOption
|
|
|
|
mdDoc
|
|
|
|
types
|
|
|
|
optional
|
|
|
|
optionals
|
|
|
|
;
|
|
|
|
in
|
|
|
|
{
|
2023-02-17 16:28:50 +00:00
|
|
|
options.bordervm = {
|
2024-05-01 22:07:11 +00:00
|
|
|
keys = mkOption {
|
|
|
|
type = types.listOf types.str;
|
2024-06-30 15:58:29 +00:00
|
|
|
default = [ ];
|
2024-05-01 22:07:11 +00:00
|
|
|
};
|
2023-02-17 16:28:50 +00:00
|
|
|
l2tp = {
|
|
|
|
host = mkOption {
|
|
|
|
description = mdDoc ''
|
|
|
|
Hostname or IP address of an L2TP LNS that this VM
|
|
|
|
will connect to when it receives a PPPoE connection request
|
|
|
|
'';
|
|
|
|
type = types.str;
|
|
|
|
example = "l2tp.example.org";
|
|
|
|
};
|
|
|
|
port = mkOption {
|
|
|
|
description = mdDoc ''
|
|
|
|
Port number, if non-standard, of the LNS.
|
|
|
|
'';
|
|
|
|
type = types.int;
|
|
|
|
default = 1701;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
ethernet = {
|
2023-05-09 21:58:56 +00:00
|
|
|
pci = {
|
|
|
|
enable = mkEnableOption "passthru PCI ethernet";
|
|
|
|
id = mkOption {
|
|
|
|
description = ''
|
|
|
|
Host PCI ID (as shown by `lspci`) of the ethernet adaptor
|
|
|
|
to be used by the VM. This uses VFIO and requires setup
|
|
|
|
on the emulation host before it will work!
|
|
|
|
'';
|
|
|
|
type = types.str;
|
|
|
|
example = "04:00.0";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
usb = {
|
|
|
|
enable = mkEnableOption "passthru USB ethernet";
|
|
|
|
vendor = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
example = "0x0bda";
|
|
|
|
};
|
|
|
|
product = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
example = "0x8153";
|
|
|
|
};
|
2023-02-17 16:28:50 +00:00
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
2023-02-15 21:21:52 +00:00
|
|
|
imports = [
|
|
|
|
<nixpkgs/nixos/modules/virtualisation/qemu-vm.nix>
|
|
|
|
];
|
2023-02-17 16:28:50 +00:00
|
|
|
config = {
|
2024-06-30 15:58:29 +00:00
|
|
|
boot.kernelParams = [ "loglevel=9" ];
|
2023-02-17 16:28:50 +00:00
|
|
|
systemd.services.pppoe =
|
2024-06-30 15:58:29 +00:00
|
|
|
let
|
|
|
|
conf = pkgs.writeText "kpppoed.toml" ''
|
|
|
|
interface_name = "eth1"
|
|
|
|
services = [ "myservice" ]
|
|
|
|
lns_ipaddr = "${cfg.l2tp.host}:${builtins.toString cfg.l2tp.port}"
|
|
|
|
ac_name = "kpppoed-1.0"
|
|
|
|
'';
|
|
|
|
in
|
|
|
|
{
|
2023-02-17 16:28:50 +00:00
|
|
|
wantedBy = [ "multi-user.target" ];
|
|
|
|
after = [ "network-online.target" ];
|
|
|
|
serviceConfig = {
|
|
|
|
ExecStart = "${pkgs.go-l2tp}/bin/kpppoed -config ${conf}";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
systemd.services.tufted = {
|
2023-02-15 21:21:52 +00:00
|
|
|
wantedBy = [ "multi-user.target" ];
|
|
|
|
serviceConfig = {
|
2023-02-17 16:28:50 +00:00
|
|
|
ExecStart = "${pkgs.tufted}/bin/tufted /home/liminix/liminix";
|
2023-02-15 21:21:52 +00:00
|
|
|
};
|
|
|
|
};
|
2023-05-17 14:16:41 +00:00
|
|
|
services.openssh.enable = true;
|
2024-05-08 22:03:32 +00:00
|
|
|
services.dnsmasq = {
|
|
|
|
enable = true;
|
|
|
|
resolveLocalQueries = false;
|
2024-06-30 15:58:29 +00:00
|
|
|
settings = {
|
2024-05-08 22:03:32 +00:00
|
|
|
# domain-needed = true;
|
|
|
|
dhcp-range = [ "10.0.0.10,10.0.0.240" ];
|
|
|
|
interface = "eth1";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2024-08-10 22:05:50 +00:00
|
|
|
services.nginx = {
|
|
|
|
enable = true;
|
|
|
|
user = "liminix";
|
|
|
|
virtualHosts.${config.networking.hostName} = {
|
|
|
|
root = "/home/liminix";
|
|
|
|
default = true;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
systemd.services.nginx.serviceConfig.ProtectHome = "read-only";
|
|
|
|
|
2023-02-17 16:28:50 +00:00
|
|
|
systemd.services.sshd.wantedBy = pkgs.lib.mkForce [ "multi-user.target" ];
|
2023-02-15 21:21:52 +00:00
|
|
|
|
2023-02-17 16:28:50 +00:00
|
|
|
virtualisation = {
|
2024-12-22 16:01:38 +00:00
|
|
|
forwardPorts = [
|
|
|
|
{
|
|
|
|
from = "host";
|
|
|
|
host.port = 7654;
|
|
|
|
# guest.address = "10.0.2.15";
|
2025-02-10 21:55:08 +00:00
|
|
|
guest.port = 7654;
|
2024-12-22 16:01:38 +00:00
|
|
|
}
|
|
|
|
{
|
|
|
|
host.port = 2222;
|
|
|
|
guest.address = "10.0.2.15";
|
|
|
|
guest.port = 22;
|
2025-02-10 21:55:08 +00:00
|
|
|
}
|
|
|
|
];
|
2023-02-17 16:28:50 +00:00
|
|
|
qemu = {
|
2024-06-30 15:58:29 +00:00
|
|
|
networkingOptions = [ ];
|
|
|
|
options =
|
|
|
|
[ ]
|
|
|
|
++ optional cfg.ethernet.pci.enable "-device vfio-pci,host=${cfg.ethernet.pci.id}"
|
|
|
|
++ optionals cfg.ethernet.usb.enable [
|
2023-05-09 21:58:56 +00:00
|
|
|
"-device usb-ehci,id=ehci"
|
|
|
|
"-device usb-host,bus=ehci.0,vendorid=${cfg.ethernet.usb.vendor},productid=${cfg.ethernet.usb.product}"
|
2024-06-30 15:58:29 +00:00
|
|
|
]
|
|
|
|
++ [
|
2023-05-09 21:58:56 +00:00
|
|
|
"-nographic"
|
|
|
|
"-serial mon:stdio"
|
|
|
|
];
|
2023-02-17 16:28:50 +00:00
|
|
|
};
|
|
|
|
sharedDirectories = {
|
|
|
|
liminix = {
|
2024-07-01 19:53:03 +00:00
|
|
|
securityModel = "none";
|
2023-02-17 16:28:50 +00:00
|
|
|
source = builtins.toString ./.;
|
|
|
|
target = "/home/liminix/liminix";
|
|
|
|
};
|
|
|
|
};
|
2023-02-15 21:21:52 +00:00
|
|
|
};
|
2024-10-06 11:38:06 +00:00
|
|
|
|
|
|
|
services.tang = {
|
|
|
|
enable = true;
|
2025-02-10 21:55:08 +00:00
|
|
|
ipAddressAllow = [
|
|
|
|
"10.0.0.0/24"
|
|
|
|
"0.0.0.0/0"
|
|
|
|
];
|
2024-10-06 11:38:06 +00:00
|
|
|
};
|
|
|
|
|
2024-01-03 17:02:31 +00:00
|
|
|
environment.systemPackages =
|
2025-02-10 21:55:08 +00:00
|
|
|
let
|
|
|
|
wireshark-nogui = pkgs.wireshark.override { withQt = false; };
|
|
|
|
in
|
|
|
|
with pkgs;
|
|
|
|
[
|
|
|
|
tcpdump
|
|
|
|
wireshark-nogui
|
|
|
|
socat
|
|
|
|
tufted
|
|
|
|
iptables
|
|
|
|
usbutils
|
|
|
|
busybox
|
|
|
|
clevis
|
|
|
|
];
|
2023-02-17 16:28:50 +00:00
|
|
|
security.sudo.wheelNeedsPassword = false;
|
|
|
|
networking = {
|
|
|
|
hostName = "border";
|
2025-02-10 21:55:08 +00:00
|
|
|
firewall = {
|
|
|
|
enable = false;
|
|
|
|
};
|
2023-02-17 16:28:50 +00:00
|
|
|
interfaces.eth1 = {
|
|
|
|
useDHCP = false;
|
2025-02-10 21:55:08 +00:00
|
|
|
ipv4.addresses = [
|
|
|
|
{
|
|
|
|
address = "10.0.0.1";
|
|
|
|
prefixLength = 24;
|
|
|
|
}
|
|
|
|
];
|
2023-02-15 21:21:52 +00:00
|
|
|
};
|
2024-05-08 23:04:21 +00:00
|
|
|
nat = {
|
|
|
|
enable = true;
|
|
|
|
internalInterfaces = [ "eth1" ];
|
2024-06-30 15:58:29 +00:00
|
|
|
externalInterface = "eth0";
|
2024-05-08 23:04:21 +00:00
|
|
|
};
|
2023-02-15 21:21:52 +00:00
|
|
|
};
|
2023-02-17 16:28:50 +00:00
|
|
|
users.users.liminix = {
|
|
|
|
isNormalUser = true;
|
|
|
|
uid = 1000;
|
2024-06-30 15:58:29 +00:00
|
|
|
extraGroups = [ "wheel" ];
|
2024-05-01 22:07:11 +00:00
|
|
|
openssh.authorizedKeys.keys = cfg.keys;
|
2023-02-15 21:21:52 +00:00
|
|
|
};
|
2023-02-17 16:28:50 +00:00
|
|
|
services.getty.autologinUser = "liminix";
|
2023-02-15 21:21:52 +00:00
|
|
|
};
|
|
|
|
}
|