diff --git a/applications/proxmox-lxc.nix b/applications/proxmox-lxc.nix index 964454e..9f1c970 100644 --- a/applications/proxmox-lxc.nix +++ b/applications/proxmox-lxc.nix @@ -12,19 +12,19 @@ with lib; { enable = mkOption { default = true; type = types.bool; - description = lib.mdDoc "Whether to enable the ProxmoxLXC."; + description = lib.mdDoc "Whether to enable the Proxmox VE LXC module."; }; privileged = mkOption { type = types.bool; default = false; - description = lib.mdDoc '' + description = '' Whether to enable privileged mounts ''; }; manageNetwork = mkOption { type = types.bool; default = false; - description = lib.mdDoc '' + description = '' Whether to manage network interfaces through nix options When false, systemd-networkd is enabled to accept network configuration from proxmox. @@ -33,7 +33,7 @@ with lib; { manageHostName = mkOption { type = types.bool; default = false; - description = lib.mdDoc '' + description = '' Whether to manage hostname through nix options When false, the hostname is picked up from /etc/hostname populated by proxmox. @@ -68,6 +68,8 @@ with lib; { loader.initScript.enable = true; }; + console.enable = true; + networking = mkIf (!cfg.manageNetwork) { useDHCP = false; useHostResolvConf = false; @@ -81,13 +83,14 @@ with lib; { startWhenNeeded = mkDefault true; }; - systemd.mounts = - mkIf (!cfg.privileged) - [ + systemd = { + mounts = mkIf (!cfg.privileged) [ { - where = "/sys/kernel/debug"; enable = false; + where = "/sys/kernel/debug"; } ]; + services."getty@".unitConfig.ConditionPathExists = ["" "/dev/%I"]; + }; }; }