{ flake, ... }: let inherit (flake.config.people) user0; inherit (flake.config.services) instances; serviceCfg = instances.syncthing; in { syncthingVM = { user, ip, mac, userMac, ssh, syncID, deviceIP, }: { microvm.vms = { "${serviceCfg.name}-${user}" = { autostart = true; restartIfChanged = true; config = { system.stateVersion = "24.05"; time.timeZone = "America/Winnipeg"; users.users.root.openssh.authorizedKeys.keys = flake.config.people.users.${user0}.sshKeys; services = { syncthing = { enable = true; overrideDevices = false; overrideFolders = false; openDefaultPorts = true; systemService = true; guiAddress = "0.0.0.0:${toString serviceCfg.ports.port0}"; settings = { folders = { docs = { enable = true; id = "docs"; path = "/var/lib/${serviceCfg.name}/docs"; devices = [ "${user}Phone" ]; }; media = { enable = true; id = "media"; path = "/var/lib/${serviceCfg.name}/media"; devices = [ "${user}Phone" ]; }; misc = { enable = true; id = "misc"; path = "/var/lib/${serviceCfg.name}/misc"; devices = [ "${user}Phone" ]; }; }; devices = { "${user}Phone" = { autoAcceptFolders = true; name = "${user}Phone"; addresses = [ "tcp://${deviceIP}:${toString serviceCfg.ports.port2}" ]; id = syncID; }; }; }; }; openssh = { enable = true; settings = { PasswordAuthentication = false; PermitRootLogin = "prohibit-password"; }; }; }; networking.firewall.allowedTCPPorts = [ 22 serviceCfg.ports.port0 serviceCfg.ports.port1 serviceCfg.ports.port2 ]; systemd = { services = { systemd-networkd.wantedBy = [ "multi-user.target" ]; }; network = { enable = true; networks."20-lan" = { matchConfig.Name = "enp0s5"; addresses = [ { Address = "${ip}/24"; } ]; routes = [ { Destination = "0.0.0.0/0"; Gateway = "192.168.50.1"; } ]; dns = [ "1.1.1.1" "8.8.8.8" ]; }; }; tmpfiles.rules = [ "d /var/lib/${serviceCfg.name} 0755 ${serviceCfg.name} ${serviceCfg.name} -" "d /var/lib/${serviceCfg.name}/docs 0755 ${serviceCfg.name} ${serviceCfg.name} -" "d /var/lib/${serviceCfg.name}/media 0755 ${serviceCfg.name} ${serviceCfg.name} -" "d /var/lib/${serviceCfg.name}/misc 0755 ${serviceCfg.name} ${serviceCfg.name} -" ]; }; microvm = { vcpu = 1; mem = 512; hypervisor = "qemu"; interfaces = [ { type = "tap"; id = "vm-st-${user}"; mac = mac; } { type = "user"; id = "vm-sync"; mac = userMac; } ]; forwardPorts = [ { from = "host"; host.port = ssh; guest.port = 22; } ]; shares = [ { mountPoint = "/nix/.ro-store"; proto = "virtiofs"; source = "/nix/store"; tag = "read_only_nix_store"; } { mountPoint = "/var/lib/${serviceCfg.name}"; proto = "virtiofs"; source = "/mnt/storage/users/${user}/guests/${serviceCfg.name}"; tag = "${serviceCfg.name}_${user}_data"; } { mountPoint = "/var/lib/${serviceCfg.name}/docs"; proto = "virtiofs"; source = "/mnt/storage/users/${user}/home/docs"; tag = "${serviceCfg.name}_${user}_docs"; } { mountPoint = "/var/lib/${serviceCfg.name}/media"; proto = "virtiofs"; source = "/mnt/storage/users/${user}/home/media"; tag = "${serviceCfg.name}_${user}_media"; } { mountPoint = "/var/lib/${serviceCfg.name}/misc"; proto = "virtiofs"; source = "/mnt/storage/users/${user}/home/misc"; tag = "${serviceCfg.name}_${user}_misc"; } { mountPoint = "/run/secrets"; proto = "virtiofs"; source = "/run/secrets/${serviceCfg.name}"; tag = "host_secrets"; } ]; }; }; }; }; systemd.tmpfiles.rules = [ "d /mnt/storage/users/${user}/guests/${serviceCfg.name} 0751 microvm wheel - -" ]; }; }