diff --git a/flake.nix b/flake.nix index 9f0d54b..c598179 100644 --- a/flake.nix +++ b/flake.nix @@ -93,6 +93,24 @@ services.openssh.settings.PermitRootLogin = "without-password"; } ]; + x86_64-linux-modules-lxc-vm = [ + "${inputs.nixpkgs}/nixos/modules/virtualisation/lxd-virtual-machine.nix" + sops-nix.nixosModules.sops + srvos.nixosModules.server + lix-module.nixosModules.default + ./agents/fj-shadowfax-x86_64.nix + { + networking.hostName = "fj-x86_64-vm-01"; + users.users.root.openssh.authorizedKeys.keys = + [ + "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBsUe5YF5z8vGcEYtQX7AAiw2rJygGf2l7xxr8nZZa7w jahanson@legiondary" + "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJyA/yMPPo+scxBaDFUk7WeEyMAMhXUro5vi4feOKsJT jahanson@durincore" + "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILcLI5qN69BuoLp8p7nTYKoLdsBNmZB31OerZ63Car1g jahanson@telchar" + ]; + services.openssh.enable = true; + services.openssh.settings.PermitRootLogin = "without-password"; + } + ]; in { # NixOS configurations for manual deployment @@ -109,6 +127,12 @@ specialArgs = { inherit inputs; }; modules = x86_64-linux-modules; }; + + "fj-lxc-vm-x86_64" = lib.nixosSystem { + system = "x86_64-linux"; + specialArgs = { inherit inputs; }; + modules = x86_64-linux-modules-lxc-vm; + }; }; # Cachix deploy for automated deployments