{ lib , modulesPath , pkgs , ... }: { imports = [ "${toString modulesPath}/profiles/minimal.nix" "${toString modulesPath}/profiles/qemu-guest.nix" ]; /* # SSH login for debugging services.sshd.enable = true; networking.firewall.allowedTCPPorts = [ 22 ]; services.openssh.settings.PermitRootLogin = lib.mkOverride 999 "yes"; users.users.root.openssh.authorizedKeys.keys = [ "sk-ssh-ed25519@openssh.com AAAAGnNrLXNzaC1lZDI1NTE5QG9wZW5zc2guY29tAAAAIDsb/Tr69YN5MQLweWPuJaRGm+h2kOyxfD6sqKEDTIwoAAAABHNzaDo=" "sk-ecdsa-sha2-nistp256@openssh.com AAAAInNrLWVjZHNhLXNoYTItbmlzdHAyNTZAb3BlbnNzaC5jb20AAAAIbmlzdHAyNTYAAABBBACLgT81iB1iWWVuXq6PdQ5GAAGhaZhSKnveQCvcNnAOZ5WKH80bZShKHyAYzrzbp8IGwLWJcZQ7TqRK+qZdfagAAAAEc3NoOg==" "ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBAYbUTKpy4QR3s944/hjJ1UK05asFEs/SmWeUbtS0cdA660sT4xHnRfals73FicOoz+uIucJCwn/SCM804j+wtM=" "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMNsmP15vH8BVKo7bdvIiiEjiQboPGcRPqJK0+bH4jKD" ]; */ # the container might want to listen on ports networking.firewall.enable = true; networking.firewall.allowedTCPPortRanges = [{ from = 1024; to = 65535; }]; networking.firewall.allowedUDPPortRanges = [{ from = 1024; to = 65535; }]; networking.useNetworkd = lib.mkDefault true; # don't fill up the logs networking.firewall.logRefusedConnections = false; virtualisation.docker.enable = true; systemd.services.docker_start_container = { description = "The main application container"; wantedBy = [ "multi-user.target" ]; after = [ "network-online.target" "docker.service" ]; requires = [ "network-online.target" "docker.service" ]; serviceConfig = { Type = "exec"; User = "root"; }; path = [ pkgs.curl pkgs.docker pkgs.teepot.teepot.tdx_extend pkgs.coreutils ]; script = '' set -eu -o pipefail : "''${CONTAINER_IMAGE:=$(curl --silent --fail "http://metadata.google.internal/computeMetadata/v1/instance/attributes/container_image" -H "Metadata-Flavor: Google")}" : "''${CONTAINER_HUB:=$(curl --silent --fail "http://metadata.google.internal/computeMetadata/v1/instance/attributes/container_hub" -H "Metadata-Flavor: Google")}" : "''${CONTAINER_USER:=$(curl --silent --fail "http://metadata.google.internal/computeMetadata/v1/instance/attributes/container_user" -H "Metadata-Flavor: Google")}" : "''${CONTAINER_TOKEN:=$(curl --silent --fail "http://metadata.google.internal/computeMetadata/v1/instance/attributes/container_token" -H "Metadata-Flavor: Google")}" : "''${CONTAINER_IMAGE:?Error: Missing CONTAINER_IMAGE}" : "''${CONTAINER_HUB:?Error: Missing CONTAINER_HUB}" if [[ $CONTAINER_USER ]] && [[ $CONTAINER_TOKEN ]]; then docker login -u "$CONTAINER_USER" -p "$CONTAINER_TOKEN" "$CONTAINER_HUB" fi docker pull "''${CONTAINER_HUB}/''${CONTAINER_IMAGE}" DIGEST=$(docker inspect --format '{{.Id}}' "''${CONTAINER_HUB}/''${CONTAINER_IMAGE}") DIGEST=''${DIGEST#sha256:} echo "Measuring $DIGEST" >&2 test -c /dev/tdx_guest && tdx-extend --digest "$DIGEST" --rtmr 3 exec docker run --init --privileged "sha256:$DIGEST" ''; postStop = lib.mkDefault '' shutdown --reboot +5 ''; }; services.prometheus.exporters.node = { enable = true; port = 9100; enabledCollectors = [ "logind" "systemd" ]; disabledCollectors = [ "textfile" ]; #openFirewall = true; #firewallFilter = "-i br0 -p tcp -m tcp --dport 9100"; }; environment.systemPackages = with pkgs; [ teepot.teepot ]; # /var is on tmpfs anyway services.journald.storage = "volatile"; # we can't rely on/trust the hypervisor services.timesyncd.enable = false; services.chrony = { enable = true; enableNTS = true; servers = [ "time.cloudflare.com" "ntppool1.time.nl" "ntppool2.time.nl" ]; }; systemd.services."chronyd".after = [ "network-online.target" ]; boot.kernelPackages = lib.mkForce pkgs.linuxPackages_6_12; boot.kernelPatches = [ { name = "tdx-rtmr"; patch = pkgs.fetchurl { url = "https://github.com/haraldh/linux/commit/12d08008a5c94175e7a7dfcee40dff33431d9033.patch"; hash = "sha256-sVDhvC3qnXpL5FRxWiQotH7Nl/oqRBQGjJGyhsKeBTA="; }; } ]; boot.kernelParams = [ "console=ttyS0,115200n8" "random.trust_cpu=on" ]; boot.consoleLogLevel = 7; boot.initrd.includeDefaultModules = false; boot.initrd.availableKernelModules = [ "tdx_guest" "nvme" "sd_mod" "dm_mod" "ata_piix" ]; boot.initrd.systemd.enable = lib.mkDefault true; services.logind.extraConfig = '' NAutoVTs=0 ReserveVT=0 ''; services.dbus.implementation = "broker"; boot.initrd.systemd.tpm2.enable = lib.mkForce false; systemd.tpm2.enable = lib.mkForce false; nix.enable = false; # it's a read-only nix store anyway security.pam.services.su.forwardXAuth = lib.mkForce false; users.mutableUsers = false; users.allowNoPasswordLogin = true; system.stateVersion = lib.version; system.switch.enable = lib.mkForce false; documentation.info.enable = lib.mkForce false; documentation.nixos.enable = lib.mkForce false; documentation.man.enable = lib.mkForce false; documentation.enable = lib.mkForce false; services.udisks2.enable = false; # udisks has become too bloated to have in a headless system # Get rid of the perl ecosystem to minimize the TCB and disk size # Remove perl from activation system.etc.overlay.enable = lib.mkDefault true; services.userborn.enable = lib.mkDefault true; # Random perl remnants system.disableInstallerTools = lib.mkForce true; programs.less.lessopen = lib.mkDefault null; programs.command-not-found.enable = lib.mkDefault false; boot.enableContainers = lib.mkForce false; boot.loader.grub.enable = lib.mkDefault false; environment.defaultPackages = lib.mkDefault [ ]; # Check that the system does not contain a Nix store path that contains the # string "perl". system.forbiddenDependenciesRegexes = [ "perl" ]; }