52 lines
1.1 KiB
Nix
52 lines
1.1 KiB
Nix
# Enables virtualization via QEMU/KVM
|
|
{
|
|
config,
|
|
lib,
|
|
pkgs,
|
|
...
|
|
}:
|
|
|
|
let
|
|
cfg = config.aux.system.services.virtualization;
|
|
in
|
|
{
|
|
options = {
|
|
aux.system.services.virtualization = {
|
|
enable = lib.mkEnableOption (lib.mdDoc "Enables virtualization hosting tools on this aux.system.");
|
|
user = lib.mkOption {
|
|
default = "";
|
|
type = lib.types.str;
|
|
description = "The default user to add as a KVM admin.";
|
|
};
|
|
};
|
|
};
|
|
|
|
config = lib.mkIf cfg.enable {
|
|
virtualisation = {
|
|
libvirtd = {
|
|
enable = true;
|
|
qemu = {
|
|
package = pkgs.qemu_kvm;
|
|
swtpm.enable = true;
|
|
ovmf.enable = true;
|
|
ovmf.packages = [ pkgs.OVMFFull.fd ];
|
|
};
|
|
};
|
|
spiceUSBRedirection.enable = true;
|
|
};
|
|
|
|
users.users.${cfg.user}.extraGroups = [ "libvirtd" ];
|
|
|
|
environment.systemPackages = with pkgs; [
|
|
spice
|
|
spice-gtk
|
|
spice-protocol
|
|
virt-viewer
|
|
];
|
|
programs.virt-manager.enable = true;
|
|
|
|
# Allow the default bridge interface to access the network
|
|
networking.firewall.trustedInterfaces = [ "virbr0" ];
|
|
};
|
|
}
|