2015-06-08 08:59:00 -04:00
|
|
|
;;; GNU Guix --- Functional package management for GNU
|
|
|
|
;;; Copyright © 2015 David Thompson <davet@gnu.org>
|
2019-03-13 18:10:19 -04:00
|
|
|
;;; Copyright © 2016, 2017, 2019 Ludovic Courtès <ludo@gnu.org>
|
2019-05-10 07:26:16 -04:00
|
|
|
;;; Copyright © 2019 Arun Isaac <arunisaac@systemreboot.net>
|
2015-06-08 08:59:00 -04:00
|
|
|
;;;
|
|
|
|
;;; This file is part of GNU Guix.
|
|
|
|
;;;
|
|
|
|
;;; GNU Guix is free software; you can redistribute it and/or modify it
|
|
|
|
;;; under the terms of the GNU General Public License as published by
|
|
|
|
;;; the Free Software Foundation; either version 3 of the License, or (at
|
|
|
|
;;; your option) any later version.
|
|
|
|
;;;
|
|
|
|
;;; GNU Guix is distributed in the hope that it will be useful, but
|
|
|
|
;;; WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
;;; GNU General Public License for more details.
|
|
|
|
;;;
|
|
|
|
;;; You should have received a copy of the GNU General Public License
|
|
|
|
;;; along with GNU Guix. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
(define-module (gnu system linux-container)
|
|
|
|
#:use-module (ice-9 match)
|
|
|
|
#:use-module (srfi srfi-1)
|
|
|
|
#:use-module (guix config)
|
|
|
|
#:use-module (guix store)
|
|
|
|
#:use-module (guix gexp)
|
|
|
|
#:use-module (guix derivations)
|
|
|
|
#:use-module (guix monads)
|
2016-11-10 11:54:57 -05:00
|
|
|
#:use-module (guix modules)
|
2015-06-08 08:59:00 -04:00
|
|
|
#:use-module (gnu build linux-container)
|
2015-10-29 00:15:36 -04:00
|
|
|
#:use-module (gnu services)
|
2019-03-13 18:10:19 -04:00
|
|
|
#:use-module (gnu services base)
|
2015-06-08 08:59:00 -04:00
|
|
|
#:use-module (gnu system)
|
|
|
|
#:use-module (gnu system file-systems)
|
2017-02-02 18:20:40 -05:00
|
|
|
#:export (system-container
|
2015-06-08 08:59:00 -04:00
|
|
|
containerized-operating-system
|
|
|
|
container-script))
|
|
|
|
|
2019-05-10 07:26:16 -04:00
|
|
|
(define* (container-essential-services os #:key shared-network?)
|
2019-03-22 12:48:37 -04:00
|
|
|
"Return a list of essential services corresponding to OS, a
|
|
|
|
non-containerized OS. This procedure essentially strips essential services
|
|
|
|
from OS that are needed on the bare metal and not in a container."
|
|
|
|
(define base
|
|
|
|
(remove (lambda (service)
|
|
|
|
(memq (service-kind service)
|
|
|
|
(list (service-kind %linux-bare-metal-service)
|
|
|
|
firmware-service-type
|
|
|
|
system-service-type)))
|
2019-05-10 16:07:55 -04:00
|
|
|
(operating-system-default-essential-services os)))
|
2019-03-22 12:48:37 -04:00
|
|
|
|
|
|
|
(cons (service system-service-type
|
|
|
|
(let ((locale (operating-system-locale-directory os)))
|
|
|
|
(with-monad %store-monad
|
|
|
|
(return `(("locale" ,locale))))))
|
2019-05-10 07:26:16 -04:00
|
|
|
;; If network is to be shared with the host, remove network
|
|
|
|
;; configuration files from etc-service.
|
|
|
|
(if shared-network?
|
|
|
|
(modify-services base
|
|
|
|
(etc-service-type
|
|
|
|
files => (remove
|
|
|
|
(match-lambda
|
|
|
|
((filename _)
|
|
|
|
(member filename
|
|
|
|
(map basename %network-configuration-files))))
|
|
|
|
files)))
|
|
|
|
base)))
|
2019-03-22 12:48:37 -04:00
|
|
|
|
2019-05-10 12:16:45 -04:00
|
|
|
(define* (containerized-operating-system os mappings
|
|
|
|
#:key
|
|
|
|
shared-network?
|
|
|
|
(extra-file-systems '()))
|
2015-06-08 08:59:00 -04:00
|
|
|
"Return an operating system based on OS for use in a Linux container
|
|
|
|
environment. MAPPINGS is a list of <file-system-mapping> to realize in the
|
2019-05-10 12:16:45 -04:00
|
|
|
containerized OS. EXTRA-FILE-SYSTEMS is a list of file systems to add to OS."
|
2015-06-08 08:59:00 -04:00
|
|
|
(define user-file-systems
|
|
|
|
(remove (lambda (fs)
|
|
|
|
(let ((target (file-system-mount-point fs))
|
|
|
|
(source (file-system-device fs)))
|
|
|
|
(or (string=? target (%store-prefix))
|
|
|
|
(string=? target "/")
|
2016-02-08 17:33:12 -05:00
|
|
|
(and (string? source)
|
|
|
|
(string-prefix? "/dev/" source))
|
2019-05-10 12:11:25 -04:00
|
|
|
(string-prefix? "/dev/" target)
|
|
|
|
(string-prefix? "/sys/" target))))
|
2015-06-08 08:59:00 -04:00
|
|
|
(operating-system-file-systems os)))
|
|
|
|
|
|
|
|
(define (mapping->fs fs)
|
2017-02-02 18:20:40 -05:00
|
|
|
(file-system (inherit (file-system-mapping->bind-mount fs))
|
2015-06-08 08:59:00 -04:00
|
|
|
(needed-for-boot? #t)))
|
|
|
|
|
2019-03-13 18:10:19 -04:00
|
|
|
(define useless-services
|
|
|
|
;; Services that make no sense in a container. Those that attempt to
|
|
|
|
;; access /dev/tty[0-9] in particular cannot work in a container.
|
2019-05-10 07:26:16 -04:00
|
|
|
(append (list console-font-service-type
|
|
|
|
mingetty-service-type
|
|
|
|
agetty-service-type)
|
|
|
|
;; Remove nscd service if network is shared with the host.
|
|
|
|
(if shared-network?
|
|
|
|
(list nscd-service-type)
|
|
|
|
(list))))
|
|
|
|
|
2019-03-22 12:48:37 -04:00
|
|
|
(operating-system
|
|
|
|
(inherit os)
|
2015-06-08 08:59:00 -04:00
|
|
|
(swap-devices '()) ; disable swap
|
2019-05-10 07:26:16 -04:00
|
|
|
(essential-services (container-essential-services
|
2019-05-10 16:07:55 -04:00
|
|
|
this-operating-system
|
|
|
|
#:shared-network? shared-network?))
|
2019-03-13 18:10:19 -04:00
|
|
|
(services (remove (lambda (service)
|
|
|
|
(memq (service-kind service)
|
|
|
|
useless-services))
|
|
|
|
(operating-system-user-services os)))
|
2019-05-21 16:16:54 -04:00
|
|
|
(file-systems (append (map mapping->fs
|
|
|
|
(if shared-network?
|
|
|
|
(append %network-file-mappings mappings)
|
|
|
|
mappings))
|
2019-05-10 12:16:45 -04:00
|
|
|
extra-file-systems
|
2019-05-10 16:07:55 -04:00
|
|
|
user-file-systems
|
|
|
|
|
|
|
|
;; Provide a dummy root file system so we can create
|
|
|
|
;; a 'boot-parameters' file.
|
|
|
|
(list (file-system
|
|
|
|
(mount-point "/")
|
|
|
|
(device "nothing")
|
|
|
|
(type "dummy")))))))
|
2015-06-08 08:59:00 -04:00
|
|
|
|
2019-05-10 07:26:16 -04:00
|
|
|
(define* (container-script os #:key (mappings '()) shared-network?)
|
2015-06-08 08:59:00 -04:00
|
|
|
"Return a derivation of a script that runs OS as a Linux container.
|
|
|
|
MAPPINGS is a list of <file-system> objects that specify the files/directories
|
|
|
|
that will be shared with the host system."
|
2019-05-21 16:16:54 -04:00
|
|
|
(define nscd-run-directory "/var/run/nscd")
|
|
|
|
|
|
|
|
(define nscd-mapping
|
|
|
|
(file-system-mapping
|
|
|
|
(source nscd-run-directory)
|
|
|
|
(target nscd-run-directory)))
|
2019-05-10 12:16:45 -04:00
|
|
|
|
2019-05-10 16:07:55 -04:00
|
|
|
(define (mountable-file-system? file-system)
|
|
|
|
;; Return #t if FILE-SYSTEM should be mounted in the container.
|
|
|
|
(and (not (string=? "/" (file-system-mount-point file-system)))
|
|
|
|
(file-system-needed-for-boot? file-system)))
|
|
|
|
|
2019-05-21 16:16:54 -04:00
|
|
|
(define (os-file-system-specs os)
|
|
|
|
(map file-system->spec
|
|
|
|
(filter mountable-file-system?
|
|
|
|
(operating-system-file-systems os))))
|
|
|
|
|
|
|
|
(let* ((os (containerized-operating-system
|
|
|
|
os (cons %store-mapping mappings)
|
|
|
|
#:shared-network? shared-network?
|
|
|
|
#:extra-file-systems %container-file-systems))
|
|
|
|
(nscd-os (containerized-operating-system
|
|
|
|
os (cons* nscd-mapping %store-mapping mappings)
|
|
|
|
#:shared-network? shared-network?
|
|
|
|
#:extra-file-systems %container-file-systems))
|
|
|
|
(specs (os-file-system-specs os))
|
|
|
|
(nscd-specs (os-file-system-specs nscd-os)))
|
2015-06-08 08:59:00 -04:00
|
|
|
|
2019-03-22 12:48:37 -04:00
|
|
|
(define script
|
|
|
|
(with-imported-modules (source-module-closure
|
|
|
|
'((guix build utils)
|
|
|
|
(gnu build linux-container)))
|
|
|
|
#~(begin
|
|
|
|
(use-modules (gnu build linux-container)
|
|
|
|
(gnu system file-systems) ;spec->file-system
|
|
|
|
(guix build utils))
|
2015-06-08 08:59:00 -04:00
|
|
|
|
2019-05-21 16:16:54 -04:00
|
|
|
(call-with-container
|
|
|
|
(map spec->file-system
|
|
|
|
(if (and #$shared-network?
|
|
|
|
(file-exists? #$nscd-run-directory))
|
|
|
|
'#$nscd-specs
|
|
|
|
'#$specs))
|
2019-03-22 12:48:37 -04:00
|
|
|
(lambda ()
|
|
|
|
(setenv "HOME" "/root")
|
|
|
|
(setenv "TMPDIR" "/tmp")
|
|
|
|
(setenv "GUIX_NEW_SYSTEM" #$os)
|
|
|
|
(for-each mkdir-p '("/run" "/bin" "/etc" "/home" "/var"))
|
|
|
|
(primitive-load (string-append #$os "/boot")))
|
|
|
|
;; A range of 65536 uid/gids is used to cover 16 bits worth of
|
|
|
|
;; users and groups, which is sufficient for most cases.
|
|
|
|
;;
|
|
|
|
;; See: http://www.freedesktop.org/software/systemd/man/systemd-nspawn.html#--private-users=
|
2019-05-10 07:26:16 -04:00
|
|
|
#:host-uids 65536
|
|
|
|
#:namespaces (if #$shared-network?
|
|
|
|
(delq 'net %namespaces)
|
|
|
|
%namespaces)))))
|
2015-06-08 08:59:00 -04:00
|
|
|
|
2019-03-22 12:48:37 -04:00
|
|
|
(gexp->script "run-container" script)))
|