blob: 5124adee13b649d62fce3d98ef21a4574e24be00 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
|
{
config,
pkgs,
lib,
...
}:
let
user = config.global.userdata.name;
in
{
programs.firejail.wrappedBinaries.slack = {
executable = lib.getExe pkgs.slack;
profile = "${pkgs.firejail}/etc/firejail/slack.profile";
};
virtualisation.docker.enable = true;
users.extraGroups.docker.members = [ user ];
systemd.services.k3s.path = [ pkgs.criu ];
environment = {
variables.KUBECONFIG = "/etc/rancher/k3s/k3s.yaml";
systemPackages = with pkgs; [
kubernetes-helm
k9s
];
};
services.k3s = {
enable = true;
gracefulNodeShutdown.enable = true;
clusterInit = true;
role = "server";
extraFlags = [
"--write-kubeconfig-group users"
"--write-kubeconfig-mode 0640"
# disabled because some wifi won't have IPv6 (2025 edition), and k3s fails on startup
# uncomment this to enble IPv6 ingress when humanity transcends
# "--cluster-cidr=10.42.0.0/16,fd12:b0d8:b00b::/56"
# "--service-cidr=10.43.0.0/16,fd12:b0d8:babe::/112"
# "--flannel-ipv6-masq"
];
manifests.traefik-daemonset = {
enable = true;
source = ./traefik-daemonset.yaml;
target = "traefik-daemonset.yaml";
};
};
}
|