virtualisation/lxc-container: use system.build.image

phaer 06ad3811 f3563c99

Changed files
+98 -69
nixos
modules
+89 -69
nixos/modules/virtualisation/lxc-container.nix
···
-
{ lib, config, pkgs, ... }:
{
meta = {
···
imports = [
./lxc-instance-common.nix
-
(lib.mkRemovedOptionModule [ "virtualisation" "lxc" "nestedContainer" ] "")
-
(lib.mkRemovedOptionModule [ "virtualisation" "lxc" "privilegedContainer" ] "")
];
options = { };
-
config = let
-
initScript = if config.boot.initrd.systemd.enable then "prepare-root" else "init";
-
in {
-
boot.isContainer = true;
-
boot.postBootCommands =
-
''
# After booting, register the contents of the Nix store in the Nix
# database.
if [ -f /nix-path-registration ]; then
···
${config.nix.package.out}/bin/nix-env -p /nix/var/nix/profiles/system --set /run/current-system
'';
-
# supplement 99-ethernet-default-dhcp which excludes veth
-
systemd.network = lib.mkIf config.networking.useDHCP {
-
networks."99-lxc-veth-default-dhcp" = {
-
matchConfig = {
-
Type = "ether";
-
Kind = "veth";
-
Name = [
-
"en*"
-
"eth*"
-
];
};
-
DHCP = "yes";
-
networkConfig.IPv6PrivacyExtensions = "kernel";
};
-
};
-
system.build.tarball = pkgs.callPackage ../../lib/make-system-tarball.nix {
-
extraArgs = "--owner=0";
-
storeContents = [
-
{
-
object = config.system.build.toplevel;
-
symlink = "none";
-
}
-
];
-
contents = [
-
{
-
source = config.system.build.toplevel + "/${initScript}";
-
target = "/sbin/init";
-
}
-
# Technically this is not required for lxc, but having also make this configuration work with systemd-nspawn.
-
# Nixos will setup the same symlink after start.
-
{
-
source = config.system.build.toplevel + "/etc/os-release";
-
target = "/etc/os-release";
-
}
-
];
-
extraCommands = "mkdir -p proc sys dev";
-
};
-
system.build.squashfs = pkgs.callPackage ../../lib/make-squashfs.nix {
-
fileName = "nixos-lxc-image-${pkgs.stdenv.hostPlatform.system}";
-
hydraBuildProduct = true;
-
noStrip = true; # keep directory structure
-
comp = "zstd -Xcompression-level 6";
-
storeContents = [config.system.build.toplevel];
-
pseudoFiles = [
-
"/sbin d 0755 0 0"
-
"/sbin/init s 0555 0 0 ${config.system.build.toplevel}/${initScript}"
-
"/dev d 0755 0 0"
-
"/proc d 0555 0 0"
-
"/sys d 0555 0 0"
-
];
-
};
-
system.build.installBootLoader = pkgs.writeScript "install-lxc-sbin-init.sh" ''
-
#!${pkgs.runtimeShell}
-
${pkgs.coreutils}/bin/ln -fs "$1/${initScript}" /sbin/init
-
'';
-
# networkd depends on this, but systemd module disables this for containers
-
systemd.additionalUpstreamSystemUnits = ["systemd-udev-trigger.service"];
-
systemd.packages = [ pkgs.distrobuilder.generator ];
-
system.activationScripts.installInitScript = lib.mkForce ''
-
ln -fs $systemConfig/${initScript} /sbin/init
-
'';
-
};
}
···
+
{
+
lib,
+
config,
+
pkgs,
+
...
+
}:
{
meta = {
···
imports = [
./lxc-instance-common.nix
+
(lib.mkRemovedOptionModule [
+
"virtualisation"
+
"lxc"
+
"nestedContainer"
+
] "")
+
(lib.mkRemovedOptionModule [
+
"virtualisation"
+
"lxc"
+
"privilegedContainer"
+
] "")
];
options = { };
+
config =
+
let
+
initScript = if config.boot.initrd.systemd.enable then "prepare-root" else "init";
+
in
+
{
+
boot.isContainer = true;
+
boot.postBootCommands = ''
# After booting, register the contents of the Nix store in the Nix
# database.
if [ -f /nix-path-registration ]; then
···
${config.nix.package.out}/bin/nix-env -p /nix/var/nix/profiles/system --set /run/current-system
'';
+
# supplement 99-ethernet-default-dhcp which excludes veth
+
systemd.network = lib.mkIf config.networking.useDHCP {
+
networks."99-lxc-veth-default-dhcp" = {
+
matchConfig = {
+
Type = "ether";
+
Kind = "veth";
+
Name = [
+
"en*"
+
"eth*"
+
];
+
};
+
DHCP = "yes";
+
networkConfig.IPv6PrivacyExtensions = "kernel";
};
};
+
system.nixos.tags = lib.mkOverride 99 [ "lxc" ];
+
image.extension = "tar.xz";
+
image.filePath = "tarball/${config.image.fileName}";
+
system.build.image = lib.mkOverride 99 config.system.build.tarball;
+
system.build.tarball = pkgs.callPackage ../../lib/make-system-tarball.nix {
+
fileName = config.image.baseName;
+
extraArgs = "--owner=0";
+
storeContents = [
+
{
+
object = config.system.build.toplevel;
+
symlink = "none";
+
}
+
];
+
contents = [
+
{
+
source = config.system.build.toplevel + "/${initScript}";
+
target = "/sbin/init";
+
}
+
# Technically this is not required for lxc, but having also make this configuration work with systemd-nspawn.
+
# Nixos will setup the same symlink after start.
+
{
+
source = config.system.build.toplevel + "/etc/os-release";
+
target = "/etc/os-release";
+
}
+
];
+
extraCommands = "mkdir -p proc sys dev";
+
};
+
system.build.squashfs = pkgs.callPackage ../../lib/make-squashfs.nix {
+
fileName = "nixos-lxc-image-${pkgs.stdenv.hostPlatform.system}";
+
hydraBuildProduct = true;
+
noStrip = true; # keep directory structure
+
comp = "zstd -Xcompression-level 6";
+
+
storeContents = [ config.system.build.toplevel ];
+
pseudoFiles = [
+
"/sbin d 0755 0 0"
+
"/sbin/init s 0555 0 0 ${config.system.build.toplevel}/${initScript}"
+
"/dev d 0755 0 0"
+
"/proc d 0555 0 0"
+
"/sys d 0555 0 0"
+
];
+
};
+
system.build.installBootLoader = pkgs.writeScript "install-lxc-sbin-init.sh" ''
+
#!${pkgs.runtimeShell}
+
${pkgs.coreutils}/bin/ln -fs "$1/${initScript}" /sbin/init
+
'';
+
# networkd depends on this, but systemd module disables this for containers
+
systemd.additionalUpstreamSystemUnits = [ "systemd-udev-trigger.service" ];
+
systemd.packages = [ pkgs.distrobuilder.generator ];
+
system.activationScripts.installInitScript = lib.mkForce ''
+
ln -fs $systemConfig/${initScript} /sbin/init
+
'';
+
};
}
+9
nixos/modules/virtualisation/lxc-image-metadata.nix
···
else { files = []; properties = {}; };
in {
meta = {
maintainers = lib.teams.lxc.members;
};
···
};
config = {
system.build.metadata = pkgs.callPackage ../../lib/make-system-tarball.nix {
contents = [
{
source = toYAML "metadata.yaml" {
···
else { files = []; properties = {}; };
in {
+
imports = [
+
../image/file-options.nix
+
];
+
meta = {
maintainers = lib.teams.lxc.members;
};
···
};
config = {
+
system.nixos.tags = [ "lxc" "metadata" ];
+
image.extension = "tar.xz";
+
image.filePath = "tarball/${config.image.fileName}";
+
system.build.image = config.system.build.metadata;
system.build.metadata = pkgs.callPackage ../../lib/make-system-tarball.nix {
+
fileName = config.image.baseName;
contents = [
{
source = toYAML "metadata.yaml" {