Allow disabling QEMU VM-specific options

This commit is contained in:
Nicolas Jeannerod 2025-02-12 11:03:25 +01:00 committed by Kiara Grouwstra
parent 8d2bda17f1
commit 0d8d418a91
Signed by: kiara
SSH key fingerprint: SHA256:COspvLoLJ5WC5rFb9ZDe5urVCkK4LJZOsjfF4duRJFU
2 changed files with 79 additions and 49 deletions

View file

@ -1,25 +1,45 @@
{ modulesPath, ... }: { config, lib, ... }:
let
inherit (lib) mkIf mkMerge;
in
{ {
imports = [ (modulesPath + "/profiles/qemu-guest.nix") ]; config = mkMerge [
{
boot = { boot.loader = {
loader = {
systemd-boot.enable = true; systemd-boot.enable = true;
efi.canTouchEfiVariables = true; efi.canTouchEfiVariables = true;
}; };
}
initrd = { (mkIf config.procolixVm.isQemuVm {
boot.initrd = {
availableKernelModules = [ availableKernelModules = [
"ata_piix" "ata_piix"
"uhci_hcd" "uhci_hcd"
"virtio_pci"
"virtio_scsi"
"sd_mod" "sd_mod"
"sr_mod" "sr_mod"
# from `/profiles/qemu-guest.nix`
"virtio_net"
"virtio_pci"
"virtio_mmio"
"virtio_blk"
"virtio_scsi"
"9p"
"9pnet_virtio"
];
kernelModules = [
"dm-snapshot"
# from `/profiles/qemu-guest.nix`
"virtio_balloon"
"virtio_console"
"virtio_rng"
"virtio_gpu"
]; ];
kernelModules = [ "dm-snapshot" ];
};
}; };
disko.devices.disk.main = { disko.devices.disk.main = {
@ -59,4 +79,6 @@
}; };
}; };
}; };
})
];
} }

View file

@ -175,5 +175,13 @@ in
this for testing machines, as it is a security hole for so many reasons. this for testing machines, as it is a security hole for so many reasons.
''; '';
}; };
isQemuVm = mkOption {
description = ''
Whether the machine is a QEMU VM. This will import all the necessary
things.
'';
default = true;
};
}; };
} }