virtualisation.lxc: indent config

This commit is contained in:
Maciej Krüger 2021-04-28 04:29:09 +02:00
parent d262f6f593
commit b9df9ca2c4
No known key found for this signature in database
GPG key ID: 0D948CE19CF49C5F

View file

@ -7,48 +7,50 @@ with lib;
../profiles/docker-container.nix # FIXME, shouldn't include something from profiles/
];
system.build.tarball = mkForce (pkgs.callPackage ../../lib/make-system-tarball.nix {
extraArgs = "--owner=0";
config = {
system.build.tarball = mkForce (pkgs.callPackage ../../lib/make-system-tarball.nix {
extraArgs = "--owner=0";
storeContents = [
config.system.build.toplevel
];
storeContents = [
config.system.build.toplevel
];
contents = [
{
source = pkgs.writeText "metadata.yaml" ''
architecture: ${builtins.elemAt (builtins.match "^([a-z0-9_]+).+" (toString pkgs.system)) 0}
creation_date: 0
properties:
description: NixOS ${config.system.nixos.codeName} ${config.system.nixos.label} ${pkgs.system}
os: nixos
release: ${config.system.nixos.codeName}
'';
target = "/metadata.yaml";
}
{
source = config.system.build.toplevel + "/init";
target = "/sbin/init";
}
];
contents = [
{
source = pkgs.writeText "metadata.yaml" ''
architecture: ${builtins.elemAt (builtins.match "^([a-z0-9_]+).+" (toString pkgs.system)) 0}
creation_date: 0
properties:
description: NixOS ${config.system.nixos.codeName} ${config.system.nixos.label} ${pkgs.system}
os: nixos
release: ${config.system.nixos.codeName}
'';
target = "/metadata.yaml";
}
{
source = config.system.build.toplevel + "/init";
target = "/sbin/init";
}
];
extraCommands = "mkdir -p proc sys dev";
});
extraCommands = "mkdir -p proc sys dev";
});
# Allow the user to login as root without password.
users.users.root.initialHashedPassword = mkOverride 150 "";
# Allow the user to login as root without password.
users.users.root.initialHashedPassword = mkOverride 150 "";
# Some more help text.
services.getty.helpLine =
''
# Some more help text.
services.getty.helpLine =
''
Log in as "root" with an empty password.
'';
Log in as "root" with an empty password.
'';
# Containers should be light-weight, so start sshd on demand.
services.openssh.enable = mkDefault true;
services.openssh.startWhenNeeded = mkDefault true;
# Containers should be light-weight, so start sshd on demand.
services.openssh.enable = mkDefault true;
services.openssh.startWhenNeeded = mkDefault true;
# Allow ssh connections
networking.firewall.allowedTCPPorts = [ 22 ];
# Allow ssh connections
networking.firewall.allowedTCPPorts = [ 22 ];
};
}