nix build github:ES-Nix/NixOS-environments#image.image \
&& cp result/nixos.qcow2 nixos.qcow2 \
&& chmod 0755 nixos.qcow2
TODO: wrap it in a scrip.
nix shell nixpkgs#qemu
qemu-kvm \
-m 18G \
-nic user \
-hda nixos.qcow2 \
-nographic \
-enable-kvm \
-cpu host \
-smp $(nproc)
For now, login as root
and passwd is r00t
You can, once logged in, change de passwd of the user nixuser
with passwd nixuser
and logout and
login as the nixuser
with the passwd that was chosen.
nix build github:ES-Nix/NixOS-environments#image.image
cp result/nixos.qcow2 nixos.qcow2
chmod 0755 nixos.qcow2
Go to the directory that you want to clone and:
git clone https://github.com/ES-Nix/NixOS-environments.git \
&& cd NixOS-environments
nix build .#image.image
cp result/nixos.qcow2 nixos.qcow2
chmod 0755 nixos.qcow2
qemu-kvm \
-m 18G \
-nic user \
-hda nixos.qcow2 \
-nographic \
-enable-kvm \
-cpu host \
-smp $(nproc)
nix build .#image.image \
&& cp result/nixos.qcow2 nixos.qcow2 \
&& chmod 0755 nixos.qcow2 \
&& qemu-kvm \
-m 18G \
-nic user \
-hda nixos.qcow2 \
-nographic \
-enable-kvm \
-cpu host \
-smp $(nproc)
ssh-keygen -t rsa -f ssh-keys.nix
nmap -sn 192.168.1.0/24 --system-dns
echo '192.168.1.2 ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDbqkQxZD6I65C1cQ3A5N/LoTHR85x1k/tBbBymZsWw8' >> ~/.ssh/known_hosts
/etc/ssl/certs/ca-certificates.crt
ls -al /nix/store/ | grep cert
ls /etc/ssl/certs
TODO:
- NixOs Native Flake Deployment With LUKS Drive Encryption and LVM
- https://www.reddit.com/r/NixOS/comments/ebgezb/passwordless_ssh_authentication_in_nixos/fb4r5cj/?utm_source=reddit&utm_medium=web2x&context=3
TODO: the ssh thing
- https://git.redbrick.dcu.ie/m1cr0man/nix-configs-rb/src/branch/ylmcc-ssh/services/ssh.nix?lang=pt-PT
- https://nixos.wiki/wiki/Install_NixOS_on_a_Server_With_a_Different_Filesystem
(result/run-vm-kvm < /dev/null &) \
&& result/ssh-vm
podman run -it --rm busybox echo 'Ok!'
sudo -k -n podman run -it --rm busybox echo 'Ok!'
sudo \
sed \
's@Defaults\ssecure_path=\"@&'"$HOME"'\/.nix-profile\/bin:@' \
/etc/sudoers
nix build .#image.image \
&& cp result/nixos.qcow2 nixos.qcow2 \
&& chmod 0755 nixos.qcow2 \
&& qemu-kvm \
-m 18G \
-nic user \
-hda nixos.qcow2 \
-nographic \
-enable-kvm \
-cpu host \
-smp $(nproc)
nix \
profile \
install \
github:ES-Nix/podman-rootless/from-nixpkgs \
nixpkgs#cni \
nixpkgs#cni-plugins \
nixpkgs#kubernetes-helm \
nixpkgs#minikube \
nixpkgs#ripgrep \
&& mkdir -p -v /usr/lib/cni \
&& ln -fsv $(which firewall) /usr/lib/cni/firewall \
&& ln -fsv $(which bridge) /usr/lib/cni/bridge \
&& ln -fsv $(which portmap) /usr/lib/cni/portmap \
&& ln -fsv $(which tuning) /usr/lib/cni/tuning \
&& ln -fsv $(which host-local) /usr/lib/cni/host-local
podman network create podman
podman run -it --rm busybox echo 'Ok!'
nix \
profile \
install \
github:ES-Nix/podman-rootless/from-nixpkgs \
nixpkgs#cni \
nixpkgs#cni-plugins \
nixpkgs#kubernetes-helm \
nixpkgs#minikube \
nixpkgs#ripgrep \
&& echo '123' | sudo --stdin mkdir -p /usr/lib/cni \
&& sudo ln -fsv $(which bandwidth) /usr/lib/cni/bandwidth \
&& sudo ln -fsv $(which bridge) /usr/lib/cni/bridge \
&& sudo ln -fsv $(which dhcp) /usr/lib/cni/dhcp \
&& sudo ln -fsv $(which firewall) /usr/lib/cni/firewall \
&& sudo ln -fsv $(which host-device) /usr/lib/cni/host-device \
&& sudo ln -fsv $(which host-local) /usr/lib/cni/host-local \
&& sudo ln -fsv $(which ipvlan) /usr/lib/cni/ipvlan \
&& sudo ln -fsv $(which loopback) /usr/lib/cni/loopback \
&& sudo ln -fsv $(which macvlan) /usr/lib/cni/macvlan \
&& sudo ln -fsv $(which portmap) /usr/lib/cni/portmap \
&& sudo ln -fsv $(which ptp) /usr/lib/cni/ptp \
&& sudo ln -fsv $(which sbr) /usr/lib/cni/sbr \
&& sudo ln -fsv $(which static) /usr/lib/cni/static \
&& sudo ln -fsv $(which tuning) /usr/lib/cni/tuning \
&& sudo ln -fsv $(which vlan) /usr/lib/cni/vlan \
&& sudo ln -fsv $(which vrf) /usr/lib/cni/vrf \
&& echo '123' | sudo --stdin mkdir -p /lib/modules \
&& sudo podman network exists podman || sudo podman network create podman
sudo \
podman \
--log-level=error \
run \
-it \
--network=host \
--rm \
busybox \
echo \
'Ok!'
sudo podman network exists podman sudo podman network ls sudo -k -n podman run -it --rm busybox echo 'Ok!'
sudo rm -fr /usr/lib/cni /lib/modules sudo podman network rm podman sudo rm -fr /etc/cni/net.d/podman.conflist
sudo -k -n podman run -it --rm busybox echo 'Ok!'
sudo podman network exists podman || sudo podman network create podman minikube start --driver=podman
echo 'net.ipv4.ip_forward=1' > /etc/sysctl.con
WIP