2015-06-08 14:59:00 +02:00
|
|
|
;;; GNU Guix --- Functional package management for GNU
|
|
|
|
;;; Copyright © 2015 David Thompson <davet@gnu.org>
|
2019-03-13 23:10:19 +01:00
|
|
|
;;; Copyright © 2016, 2017, 2019 Ludovic Courtès <ludo@gnu.org>
|
2019-05-10 13:26:16 +02:00
|
|
|
;;; Copyright © 2019 Arun Isaac <arunisaac@systemreboot.net>
|
2015-06-08 14:59:00 +02:00
|
|
|
;;;
|
|
|
|
;;; This file is part of GNU Guix.
|
|
|
|
;;;
|
|
|
|
;;; GNU Guix is free software; you can redistribute it and/or modify it
|
|
|
|
;;; under the terms of the GNU General Public License as published by
|
|
|
|
;;; the Free Software Foundation; either version 3 of the License, or (at
|
|
|
|
;;; your option) any later version.
|
|
|
|
;;;
|
|
|
|
;;; GNU Guix is distributed in the hope that it will be useful, but
|
|
|
|
;;; WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
;;; GNU General Public License for more details.
|
|
|
|
;;;
|
|
|
|
;;; You should have received a copy of the GNU General Public License
|
|
|
|
;;; along with GNU Guix. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
(define-module (gnu system linux-container)
|
|
|
|
#:use-module (ice-9 match)
|
|
|
|
#:use-module (srfi srfi-1)
|
|
|
|
#:use-module (guix config)
|
|
|
|
#:use-module (guix store)
|
|
|
|
#:use-module (guix gexp)
|
|
|
|
#:use-module (guix derivations)
|
|
|
|
#:use-module (guix monads)
|
2016-11-10 17:54:57 +01:00
|
|
|
#:use-module (guix modules)
|
2015-06-08 14:59:00 +02:00
|
|
|
#:use-module (gnu build linux-container)
|
2015-10-29 05:15:36 +01:00
|
|
|
#:use-module (gnu services)
|
2019-03-13 23:10:19 +01:00
|
|
|
#:use-module (gnu services base)
|
2019-05-25 08:19:42 +02:00
|
|
|
#:use-module (gnu services shepherd)
|
2015-06-08 14:59:00 +02:00
|
|
|
#:use-module (gnu system)
|
|
|
|
#:use-module (gnu system file-systems)
|
2017-02-03 00:20:40 +01:00
|
|
|
#:export (system-container
|
2015-06-08 14:59:00 +02:00
|
|
|
containerized-operating-system
|
|
|
|
container-script))
|
|
|
|
|
2019-05-10 13:26:16 +02:00
|
|
|
(define* (container-essential-services os #:key shared-network?)
|
2019-03-22 17:48:37 +01:00
|
|
|
"Return a list of essential services corresponding to OS, a
|
|
|
|
non-containerized OS. This procedure essentially strips essential services
|
|
|
|
from OS that are needed on the bare metal and not in a container."
|
|
|
|
(define base
|
|
|
|
(remove (lambda (service)
|
|
|
|
(memq (service-kind service)
|
|
|
|
(list (service-kind %linux-bare-metal-service)
|
|
|
|
firmware-service-type
|
|
|
|
system-service-type)))
|
2019-05-10 22:07:55 +02:00
|
|
|
(operating-system-default-essential-services os)))
|
2019-03-22 17:48:37 +01:00
|
|
|
|
|
|
|
(cons (service system-service-type
|
|
|
|
(let ((locale (operating-system-locale-directory os)))
|
|
|
|
(with-monad %store-monad
|
|
|
|
(return `(("locale" ,locale))))))
|
2019-05-10 13:26:16 +02:00
|
|
|
;; If network is to be shared with the host, remove network
|
|
|
|
;; configuration files from etc-service.
|
|
|
|
(if shared-network?
|
|
|
|
(modify-services base
|
|
|
|
(etc-service-type
|
|
|
|
files => (remove
|
|
|
|
(match-lambda
|
|
|
|
((filename _)
|
|
|
|
(member filename
|
|
|
|
(map basename %network-configuration-files))))
|
|
|
|
files)))
|
|
|
|
base)))
|
2019-03-22 17:48:37 +01:00
|
|
|
|
2019-05-25 08:19:42 +02:00
|
|
|
(define dummy-networking-service-type
|
|
|
|
(shepherd-service-type
|
|
|
|
'dummy-networking
|
|
|
|
(const (shepherd-service
|
|
|
|
(documentation "Provide loopback and networking without actually
|
|
|
|
doing anything.")
|
|
|
|
(provision '(loopback networking))
|
|
|
|
(start #~(const #t))))
|
|
|
|
#f))
|
|
|
|
|
2019-05-10 18:16:45 +02:00
|
|
|
(define* (containerized-operating-system os mappings
|
|
|
|
#:key
|
|
|
|
shared-network?
|
|
|
|
(extra-file-systems '()))
|
2015-06-08 14:59:00 +02:00
|
|
|
"Return an operating system based on OS for use in a Linux container
|
|
|
|
environment. MAPPINGS is a list of <file-system-mapping> to realize in the
|
2019-05-10 18:16:45 +02:00
|
|
|
containerized OS. EXTRA-FILE-SYSTEMS is a list of file systems to add to OS."
|
2015-06-08 14:59:00 +02:00
|
|
|
(define user-file-systems
|
|
|
|
(remove (lambda (fs)
|
|
|
|
(let ((target (file-system-mount-point fs))
|
|
|
|
(source (file-system-device fs)))
|
|
|
|
(or (string=? target (%store-prefix))
|
|
|
|
(string=? target "/")
|
2016-02-08 23:33:12 +01:00
|
|
|
(and (string? source)
|
|
|
|
(string-prefix? "/dev/" source))
|
2019-05-10 18:11:25 +02:00
|
|
|
(string-prefix? "/dev/" target)
|
|
|
|
(string-prefix? "/sys/" target))))
|
2015-06-08 14:59:00 +02:00
|
|
|
(operating-system-file-systems os)))
|
|
|
|
|
|
|
|
(define (mapping->fs fs)
|
2017-02-03 00:20:40 +01:00
|
|
|
(file-system (inherit (file-system-mapping->bind-mount fs))
|
2015-06-08 14:59:00 +02:00
|
|
|
(needed-for-boot? #t)))
|
|
|
|
|
2019-03-13 23:10:19 +01:00
|
|
|
(define useless-services
|
|
|
|
;; Services that make no sense in a container. Those that attempt to
|
|
|
|
;; access /dev/tty[0-9] in particular cannot work in a container.
|
2019-05-10 13:26:16 +02:00
|
|
|
(append (list console-font-service-type
|
|
|
|
mingetty-service-type
|
|
|
|
agetty-service-type)
|
|
|
|
;; Remove nscd service if network is shared with the host.
|
|
|
|
(if shared-network?
|
2019-05-25 08:19:42 +02:00
|
|
|
(list nscd-service-type
|
|
|
|
static-networking-service-type)
|
2019-05-10 13:26:16 +02:00
|
|
|
(list))))
|
|
|
|
|
2019-03-22 17:48:37 +01:00
|
|
|
(operating-system
|
|
|
|
(inherit os)
|
2015-06-08 14:59:00 +02:00
|
|
|
(swap-devices '()) ; disable swap
|
2019-05-10 13:26:16 +02:00
|
|
|
(essential-services (container-essential-services
|
2019-05-10 22:07:55 +02:00
|
|
|
this-operating-system
|
|
|
|
#:shared-network? shared-network?))
|
2019-05-25 08:19:42 +02:00
|
|
|
(services (append (remove (lambda (service)
|
|
|
|
(memq (service-kind service)
|
|
|
|
useless-services))
|
|
|
|
(operating-system-user-services os))
|
|
|
|
;; Many Guix services depend on a 'networking' shepherd
|
|
|
|
;; service, so make sure to provide a dummy 'networking'
|
|
|
|
;; service when we are sure that networking is already set up
|
|
|
|
;; in the host and can be used. That prevents double setup.
|
|
|
|
(if shared-network?
|
|
|
|
(list (service dummy-networking-service-type))
|
|
|
|
'())))
|
2019-05-21 22:16:54 +02:00
|
|
|
(file-systems (append (map mapping->fs
|
|
|
|
(if shared-network?
|
|
|
|
(append %network-file-mappings mappings)
|
|
|
|
mappings))
|
2019-05-10 18:16:45 +02:00
|
|
|
extra-file-systems
|
2019-05-10 22:07:55 +02:00
|
|
|
user-file-systems
|
|
|
|
|
|
|
|
;; Provide a dummy root file system so we can create
|
|
|
|
;; a 'boot-parameters' file.
|
|
|
|
(list (file-system
|
|
|
|
(mount-point "/")
|
|
|
|
(device "nothing")
|
|
|
|
(type "dummy")))))))
|
2015-06-08 14:59:00 +02:00
|
|
|
|
2019-05-10 13:26:16 +02:00
|
|
|
(define* (container-script os #:key (mappings '()) shared-network?)
|
2015-06-08 14:59:00 +02:00
|
|
|
"Return a derivation of a script that runs OS as a Linux container.
|
|
|
|
MAPPINGS is a list of <file-system> objects that specify the files/directories
|
|
|
|
that will be shared with the host system."
|
2019-05-21 22:16:54 +02:00
|
|
|
(define nscd-run-directory "/var/run/nscd")
|
|
|
|
|
|
|
|
(define nscd-mapping
|
|
|
|
(file-system-mapping
|
|
|
|
(source nscd-run-directory)
|
|
|
|
(target nscd-run-directory)))
|
2019-05-10 18:16:45 +02:00
|
|
|
|
2019-05-10 22:07:55 +02:00
|
|
|
(define (mountable-file-system? file-system)
|
|
|
|
;; Return #t if FILE-SYSTEM should be mounted in the container.
|
|
|
|
(and (not (string=? "/" (file-system-mount-point file-system)))
|
|
|
|
(file-system-needed-for-boot? file-system)))
|
|
|
|
|
2019-05-21 22:16:54 +02:00
|
|
|
(define (os-file-system-specs os)
|
|
|
|
(map file-system->spec
|
|
|
|
(filter mountable-file-system?
|
|
|
|
(operating-system-file-systems os))))
|
|
|
|
|
|
|
|
(let* ((os (containerized-operating-system
|
|
|
|
os (cons %store-mapping mappings)
|
|
|
|
#:shared-network? shared-network?
|
|
|
|
#:extra-file-systems %container-file-systems))
|
|
|
|
(nscd-os (containerized-operating-system
|
|
|
|
os (cons* nscd-mapping %store-mapping mappings)
|
|
|
|
#:shared-network? shared-network?
|
|
|
|
#:extra-file-systems %container-file-systems))
|
|
|
|
(specs (os-file-system-specs os))
|
|
|
|
(nscd-specs (os-file-system-specs nscd-os)))
|
2015-06-08 14:59:00 +02:00
|
|
|
|
2019-03-22 17:48:37 +01:00
|
|
|
(define script
|
|
|
|
(with-imported-modules (source-module-closure
|
|
|
|
'((guix build utils)
|
|
|
|
(gnu build linux-container)))
|
|
|
|
#~(begin
|
|
|
|
(use-modules (gnu build linux-container)
|
|
|
|
(gnu system file-systems) ;spec->file-system
|
|
|
|
(guix build utils))
|
2015-06-08 14:59:00 +02:00
|
|
|
|
2019-05-21 22:16:54 +02:00
|
|
|
(call-with-container
|
|
|
|
(map spec->file-system
|
|
|
|
(if (and #$shared-network?
|
|
|
|
(file-exists? #$nscd-run-directory))
|
|
|
|
'#$nscd-specs
|
|
|
|
'#$specs))
|
2019-03-22 17:48:37 +01:00
|
|
|
(lambda ()
|
|
|
|
(setenv "HOME" "/root")
|
|
|
|
(setenv "TMPDIR" "/tmp")
|
|
|
|
(setenv "GUIX_NEW_SYSTEM" #$os)
|
|
|
|
(for-each mkdir-p '("/run" "/bin" "/etc" "/home" "/var"))
|
|
|
|
(primitive-load (string-append #$os "/boot")))
|
|
|
|
;; A range of 65536 uid/gids is used to cover 16 bits worth of
|
|
|
|
;; users and groups, which is sufficient for most cases.
|
|
|
|
;;
|
|
|
|
;; See: http://www.freedesktop.org/software/systemd/man/systemd-nspawn.html#--private-users=
|
2019-05-10 13:26:16 +02:00
|
|
|
#:host-uids 65536
|
|
|
|
#:namespaces (if #$shared-network?
|
|
|
|
(delq 'net %namespaces)
|
|
|
|
%namespaces)))))
|
2015-06-08 14:59:00 +02:00
|
|
|
|
2019-03-22 17:48:37 +01:00
|
|
|
(gexp->script "run-container" script)))
|