Configuring linode and xrdp
This commit is contained in:
parent
318820f3eb
commit
69bbbd5162
4 changed files with 17 additions and 46 deletions
|
@ -9,7 +9,7 @@
|
|||
enable = true;
|
||||
defaultWindowManager = "${pkgs.xfce.xfce4-session}/bin/startxfce4";
|
||||
openFirewall = true;
|
||||
# confDir = "/etc/xrdp/conf";
|
||||
confDir = "/etc/xrdp/conf";
|
||||
};
|
||||
|
||||
environment.systemPackages = [
|
||||
|
|
|
@ -21,7 +21,7 @@
|
|||
privateKeyFile = "/run/secrets/wireguard_keys/framework-server";
|
||||
# Testing
|
||||
peers = [
|
||||
{ # osaka-vultr-01
|
||||
{ # osaka-linode-01
|
||||
publicKey = "yPZ3EmmIqCkReXf1DRTxzVaKQ2k+ifGmYJHji5nnMmE=";
|
||||
presharedKeyFile = "/run/secrets/wireguard_keys/preshared_key";
|
||||
persistentKeepalive = 5;
|
||||
|
|
|
@ -1,19 +1,28 @@
|
|||
{ config, lib, pkgs, modulesPath, desktop, username, ... }: {
|
||||
imports = [
|
||||
(modulesPath + "/profiles/qemu-guest.nix")
|
||||
./firewall.nix
|
||||
./wireguard.nix
|
||||
];
|
||||
|
||||
boot.loader.grub = true;
|
||||
|
||||
boot.initrd.availableKernelModules = [ "virtio_pci" "virtio_scsi" "ahci" ];
|
||||
boot.initrd.kernelModules = [ ];
|
||||
boot.kernelModules = [ ];
|
||||
boot.extraModulePackages = [ ];
|
||||
|
||||
fileSystems."/" = {
|
||||
device = "/dev/disk/by-label/nixos";
|
||||
fsType = "ext4";
|
||||
};
|
||||
|
||||
swapDevices = [ { device = "/dev/disk/by-label/linode-swap"; } ];
|
||||
|
||||
# Distributed Builds
|
||||
nix.distributedBuilds = true;
|
||||
nixpkgs.config.allowUnfree = false;
|
||||
|
||||
boot.initrd.availableKernelModules = [ "ata_piix" "ohci_pci" "virtio_pci" "virtio_blk" "sr_mod" ];
|
||||
boot.initrd.kernelModules = [ ];
|
||||
boot.kernelModules = [ "iptable_nat" "iptable_filter" "xt_nat" ];
|
||||
boot.extraModulePackages = [ ];
|
||||
virtualisation.hypervGuest.enable = true;
|
||||
|
||||
networking.useDHCP = lib.mkDefault true;
|
||||
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
||||
time.timeZone = "Asia/Tokyo";
|
||||
|
|
|
@ -1,38 +0,0 @@
|
|||
{
|
||||
boot.loader.grub.enableCryptodisk = true;
|
||||
disko.devices.disk.vda = {
|
||||
device = "/dev/vda";
|
||||
type = "disk";
|
||||
content = {
|
||||
type = "gpt";
|
||||
partitions = {
|
||||
boot = {
|
||||
size = "1M";
|
||||
type = "EF02";
|
||||
}; # partitions.boot
|
||||
ESP = {
|
||||
size = "500M";
|
||||
type = "EF00";
|
||||
content = {
|
||||
type = "filesystem";
|
||||
format = "vfat";
|
||||
mountpoint = "/boot";
|
||||
};
|
||||
}; # ESP
|
||||
luks = {
|
||||
size = "100%";
|
||||
content = {
|
||||
type = "luks";
|
||||
name = "crypted";
|
||||
extraOpenArgs = [ "--allow-discards" ];
|
||||
content = {
|
||||
type = "filesystem";
|
||||
format = "ext4";
|
||||
mountpoint = "/";
|
||||
}; # content
|
||||
}; # content
|
||||
}; # luks.partitions
|
||||
}; # partitions
|
||||
}; # content
|
||||
}; # disko.devices.disk.vda
|
||||
}
|
Loading…
Reference in a new issue