2009-06-18 18:16:12 +02:00
|
|
|
# This module creates a virtual machine from the NixOS configuration.
|
|
|
|
# Building the `config.system.build.vm' attribute gives you a command
|
|
|
|
# that starts a KVM/QEMU VM running the NixOS configuration defined in
|
|
|
|
# `config'. The Nix store is shared read-only with the host, which
|
|
|
|
# makes (re)building VMs very efficient. However, it also means you
|
|
|
|
# can't reconfigure the guest inside the guest - you need to rebuild
|
|
|
|
# the VM in the host. On the other hand, the root filesystem is a
|
|
|
|
# read/writable disk image persistent across VM reboots.
|
|
|
|
|
2009-12-15 15:05:01 +01:00
|
|
|
{ config, pkgs, ... }:
|
2009-06-18 18:16:12 +02:00
|
|
|
|
2009-11-06 22:38:40 +01:00
|
|
|
with pkgs.lib;
|
|
|
|
|
2009-06-19 17:19:56 +02:00
|
|
|
let
|
|
|
|
|
2011-09-14 20:20:50 +02:00
|
|
|
vmName =
|
|
|
|
if config.networking.hostName == ""
|
|
|
|
then "noname"
|
2011-06-21 12:46:21 +02:00
|
|
|
else config.networking.hostName;
|
2009-06-22 16:45:28 +02:00
|
|
|
|
2013-09-04 13:05:09 +02:00
|
|
|
cfg = config.virtualisation;
|
|
|
|
|
|
|
|
qemuGraphics = if cfg.graphics then "" else "-nographic";
|
|
|
|
kernelConsole = if cfg.graphics then "" else "console=ttyS0";
|
|
|
|
ttys = [ "tty1" "tty2" "tty3" "tty4" "tty5" "tty6" ];
|
|
|
|
|
|
|
|
# Shell script to start the VM.
|
|
|
|
startVM =
|
|
|
|
''
|
|
|
|
#! ${pkgs.stdenv.shell}
|
|
|
|
|
|
|
|
NIX_DISK_IMAGE=$(readlink -f ''${NIX_DISK_IMAGE:-${config.virtualisation.diskImage}})
|
|
|
|
|
|
|
|
if ! test -e "$NIX_DISK_IMAGE"; then
|
|
|
|
${pkgs.qemu_kvm}/bin/qemu-img create -f qcow2 "$NIX_DISK_IMAGE" \
|
|
|
|
${toString config.virtualisation.diskSize}M || exit 1
|
|
|
|
fi
|
|
|
|
|
|
|
|
# Create a directory for exchanging data with the VM.
|
|
|
|
if [ -z "$TMPDIR" -o -z "$USE_TMPDIR" ]; then
|
|
|
|
TMPDIR=$(mktemp -d nix-vm.XXXXXXXXXX --tmpdir)
|
|
|
|
fi
|
|
|
|
cd $TMPDIR
|
|
|
|
mkdir -p $TMPDIR/xchg
|
|
|
|
|
|
|
|
idx=2
|
|
|
|
extraDisks=""
|
|
|
|
${flip concatMapStrings cfg.emptyDiskImages (size: ''
|
|
|
|
${pkgs.qemu_kvm}/bin/qemu-img create -f raw "empty$idx" "${toString size}M"
|
|
|
|
extraDisks="$extraDisks -drive index=$idx,file=$(pwd)/empty$idx,if=virtio,werror=report"
|
|
|
|
idx=$((idx + 1))
|
|
|
|
'')}
|
|
|
|
|
|
|
|
# Start QEMU.
|
|
|
|
# "-boot menu=on" is there, because I don't know how to make qemu boot from 2nd hd.
|
|
|
|
exec ${pkgs.qemu_kvm}/bin/qemu-kvm \
|
|
|
|
-name ${vmName} \
|
|
|
|
-m ${toString config.virtualisation.memorySize} \
|
|
|
|
${optionalString (pkgs.stdenv.system == "x86_64-linux") "-cpu kvm64"} \
|
|
|
|
-net nic,vlan=0,model=virtio \
|
|
|
|
-net user,vlan=0''${QEMU_NET_OPTS:+,$QEMU_NET_OPTS} \
|
|
|
|
-virtfs local,path=/nix/store,security_model=none,mount_tag=store \
|
|
|
|
-virtfs local,path=$TMPDIR/xchg,security_model=none,mount_tag=xchg \
|
|
|
|
-virtfs local,path=''${SHARED_DIR:-$TMPDIR/xchg},security_model=none,mount_tag=shared \
|
|
|
|
${if cfg.useBootLoader then ''
|
|
|
|
-drive index=0,id=drive1,file=$NIX_DISK_IMAGE,if=virtio,cache=writeback,werror=report \
|
|
|
|
-drive index=1,id=drive2,file=${bootDisk}/disk.img,if=virtio,readonly \
|
|
|
|
-boot menu=on
|
|
|
|
'' else ''
|
|
|
|
-drive file=$NIX_DISK_IMAGE,if=virtio,cache=writeback,werror=report \
|
|
|
|
-kernel ${config.system.build.toplevel}/kernel \
|
|
|
|
-initrd ${config.system.build.toplevel}/initrd \
|
|
|
|
-append "$(cat ${config.system.build.toplevel}/kernel-params) init=${config.system.build.toplevel}/init regInfo=${regInfo} ${kernelConsole} $QEMU_KERNEL_PARAMS" \
|
|
|
|
''} \
|
|
|
|
$extraDisks \
|
|
|
|
${qemuGraphics} \
|
|
|
|
${toString config.virtualisation.qemu.options} \
|
|
|
|
$QEMU_OPTS
|
|
|
|
'';
|
|
|
|
|
|
|
|
|
|
|
|
regInfo = pkgs.runCommand "reginfo"
|
|
|
|
{ exportReferencesGraph =
|
|
|
|
map (x: [("closure-" + baseNameOf x) x]) config.virtualisation.pathsInNixDB;
|
|
|
|
buildInputs = [ pkgs.perl ];
|
|
|
|
preferLocalBuild = true;
|
|
|
|
}
|
|
|
|
''
|
|
|
|
printRegistration=1 perl ${pkgs.pathsFromGraph} closure-* > $out
|
|
|
|
'';
|
|
|
|
|
|
|
|
|
|
|
|
# Generate a hard disk image containing a /boot partition and GRUB
|
|
|
|
# in the MBR. Used when the `useBootLoader' option is set.
|
|
|
|
bootDisk =
|
|
|
|
pkgs.vmTools.runInLinuxVM (
|
|
|
|
pkgs.runCommand "nixos-boot-disk"
|
|
|
|
{ preVM =
|
|
|
|
''
|
|
|
|
mkdir $out
|
|
|
|
diskImage=$out/disk.img
|
|
|
|
${pkgs.qemu_kvm}/bin/qemu-img create -f qcow2 $diskImage "32M"
|
|
|
|
'';
|
|
|
|
buildInputs = [ pkgs.utillinux ];
|
|
|
|
}
|
|
|
|
''
|
|
|
|
# Create a single /boot partition.
|
|
|
|
${pkgs.parted}/sbin/parted /dev/vda mklabel msdos
|
|
|
|
${pkgs.parted}/sbin/parted /dev/vda -- mkpart primary ext2 1M -1s
|
|
|
|
. /sys/class/block/vda1/uevent
|
|
|
|
mknod /dev/vda1 b $MAJOR $MINOR
|
|
|
|
. /sys/class/block/vda/uevent
|
|
|
|
${pkgs.e2fsprogs}/sbin/mkfs.ext4 -L boot /dev/vda1
|
|
|
|
${pkgs.e2fsprogs}/sbin/tune2fs -c 0 -i 0 /dev/vda1
|
|
|
|
|
|
|
|
# Mount /boot.
|
|
|
|
mkdir /boot
|
|
|
|
mount /dev/vda1 /boot
|
|
|
|
|
|
|
|
# This is needed for GRUB 0.97, which doesn't know about virtio devices.
|
|
|
|
mkdir /boot/grub
|
|
|
|
echo '(hd0) /dev/vda' > /boot/grub/device.map
|
|
|
|
|
|
|
|
# Install GRUB and generate the GRUB boot menu.
|
|
|
|
touch /etc/NIXOS
|
|
|
|
mkdir -p /nix/var/nix/profiles
|
|
|
|
${config.system.build.toplevel}/bin/switch-to-configuration boot
|
|
|
|
|
|
|
|
umount /boot
|
|
|
|
''
|
|
|
|
);
|
|
|
|
|
|
|
|
in
|
|
|
|
|
|
|
|
{
|
|
|
|
imports = [ ../profiles/qemu-guest.nix ];
|
|
|
|
|
2009-06-19 17:19:56 +02:00
|
|
|
options = {
|
2011-09-14 20:20:50 +02:00
|
|
|
|
|
|
|
virtualisation.memorySize =
|
2009-12-14 12:15:37 +01:00
|
|
|
mkOption {
|
|
|
|
default = 384;
|
|
|
|
description =
|
|
|
|
''
|
|
|
|
Memory size (M) of virtual machine.
|
|
|
|
'';
|
|
|
|
};
|
2011-09-14 20:20:50 +02:00
|
|
|
|
|
|
|
virtualisation.diskSize =
|
2010-04-29 14:37:26 +02:00
|
|
|
mkOption {
|
|
|
|
default = 512;
|
|
|
|
description =
|
|
|
|
''
|
|
|
|
Disk size (M) of virtual machine.
|
|
|
|
'';
|
|
|
|
};
|
2011-09-14 20:20:50 +02:00
|
|
|
|
2009-06-19 17:19:56 +02:00
|
|
|
virtualisation.diskImage =
|
2009-11-06 22:38:40 +01:00
|
|
|
mkOption {
|
2009-06-22 16:45:28 +02:00
|
|
|
default = "./${vmName}.qcow2";
|
2009-06-19 17:19:56 +02:00
|
|
|
description =
|
|
|
|
''
|
|
|
|
Path to the disk image containing the root filesystem.
|
|
|
|
The image will be created on startup if it does not
|
|
|
|
exist.
|
|
|
|
'';
|
|
|
|
};
|
2011-09-14 20:20:50 +02:00
|
|
|
|
2013-06-28 04:12:06 +02:00
|
|
|
virtualisation.emptyDiskImages =
|
|
|
|
mkOption {
|
|
|
|
default = [];
|
2013-09-04 15:12:07 +02:00
|
|
|
type = types.listOf types.int;
|
2013-06-28 04:12:06 +02:00
|
|
|
description =
|
|
|
|
''
|
|
|
|
Additional disk images to provide to the VM, the value is a list of
|
|
|
|
sizes in megabytes the empty disk should be.
|
|
|
|
|
|
|
|
These disks are writeable by the VM and will be thrown away
|
|
|
|
afterwards.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2009-12-15 19:49:34 +01:00
|
|
|
virtualisation.graphics =
|
|
|
|
mkOption {
|
|
|
|
default = true;
|
|
|
|
description =
|
|
|
|
''
|
2010-01-10 02:20:30 +01:00
|
|
|
Whether to run QEMU with a graphics window, or access
|
2009-12-15 19:49:34 +01:00
|
|
|
the guest computer serial port through the host tty.
|
|
|
|
'';
|
|
|
|
};
|
2009-06-19 17:19:56 +02:00
|
|
|
|
2010-01-10 02:20:30 +01:00
|
|
|
virtualisation.pathsInNixDB =
|
|
|
|
mkOption {
|
|
|
|
default = [];
|
|
|
|
description =
|
|
|
|
''
|
|
|
|
The list of paths whose closure is registered in the Nix
|
|
|
|
database in the VM. All other paths in the host Nix store
|
|
|
|
appear in the guest Nix store as well, but are considered
|
|
|
|
garbage (because they are not registered in the Nix
|
|
|
|
database in the guest).
|
|
|
|
'';
|
|
|
|
};
|
2010-05-20 23:07:32 +02:00
|
|
|
|
2011-09-14 20:20:50 +02:00
|
|
|
virtualisation.vlans =
|
2010-05-20 23:07:32 +02:00
|
|
|
mkOption {
|
|
|
|
default = [ 1 ];
|
|
|
|
example = [ 1 2 ];
|
|
|
|
description =
|
|
|
|
''
|
|
|
|
Virtual networks to which the VM is connected. Each
|
|
|
|
number <replaceable>N</replaceable> in this list causes
|
|
|
|
the VM to have a virtual Ethernet interface attached to a
|
|
|
|
separate virtual network on which it will be assigned IP
|
|
|
|
address
|
|
|
|
<literal>192.168.<replaceable>N</replaceable>.<replaceable>M</replaceable></literal>,
|
|
|
|
where <replaceable>M</replaceable> is the index of this VM
|
|
|
|
in the list of VMs.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2011-09-14 20:20:50 +02:00
|
|
|
virtualisation.writableStore =
|
2010-08-24 14:59:16 +02:00
|
|
|
mkOption {
|
|
|
|
default = false;
|
|
|
|
description =
|
|
|
|
''
|
|
|
|
If enabled, the Nix store in the VM is made writable by
|
2012-12-16 17:56:49 +01:00
|
|
|
layering a unionfs-fuse/tmpfs filesystem on top of the host's Nix
|
2010-08-24 14:59:16 +02:00
|
|
|
store.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2013-08-01 02:10:13 +02:00
|
|
|
virtualisation.writableStoreUseTmpfs =
|
|
|
|
mkOption {
|
|
|
|
default = true;
|
|
|
|
description =
|
|
|
|
''
|
|
|
|
Use a tmpfs for the writable store instead of writing to the VM's
|
|
|
|
own filesystem.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2010-05-20 23:07:32 +02:00
|
|
|
networking.primaryIPAddress =
|
|
|
|
mkOption {
|
|
|
|
default = "";
|
|
|
|
internal = true;
|
|
|
|
description = "Primary IP address used in /etc/hosts.";
|
|
|
|
};
|
|
|
|
|
|
|
|
virtualisation.qemu.options =
|
|
|
|
mkOption {
|
2011-08-02 08:52:10 +02:00
|
|
|
default = [];
|
|
|
|
example = [ "-vga std" ];
|
2010-05-20 23:07:32 +02:00
|
|
|
description = "Options passed to QEMU.";
|
|
|
|
};
|
2010-09-13 14:34:58 +02:00
|
|
|
|
|
|
|
virtualisation.useBootLoader =
|
|
|
|
mkOption {
|
2010-09-13 15:43:53 +02:00
|
|
|
default = false;
|
2010-09-13 14:34:58 +02:00
|
|
|
description =
|
|
|
|
''
|
|
|
|
If enabled, the virtual machine will be booted using the
|
|
|
|
regular boot loader (i.e., GRUB 1 or 2). This allows
|
2010-09-13 15:43:53 +02:00
|
|
|
testing of the boot loader. If
|
2010-09-13 14:34:58 +02:00
|
|
|
disabled (the default), the VM directly boots the NixOS
|
|
|
|
kernel and initial ramdisk, bypassing the boot loader
|
|
|
|
altogether.
|
|
|
|
'';
|
|
|
|
};
|
2011-09-14 20:20:50 +02:00
|
|
|
|
2009-06-19 17:19:56 +02:00
|
|
|
};
|
|
|
|
|
2013-09-04 13:05:09 +02:00
|
|
|
config = {
|
|
|
|
|
2013-10-29 13:04:52 +01:00
|
|
|
boot.loader.grub.device = mkVMOverride "/dev/vda";
|
2013-09-04 13:05:09 +02:00
|
|
|
|
|
|
|
boot.initrd.supportedFilesystems = optional cfg.writableStore "unionfs-fuse";
|
|
|
|
|
|
|
|
boot.initrd.extraUtilsCommands =
|
|
|
|
''
|
|
|
|
# We need mke2fs in the initrd.
|
|
|
|
cp ${pkgs.e2fsprogs}/sbin/mke2fs $out/bin
|
|
|
|
'';
|
|
|
|
|
|
|
|
boot.initrd.postDeviceCommands =
|
|
|
|
''
|
|
|
|
# If the disk image appears to be empty, run mke2fs to
|
|
|
|
# initialise.
|
|
|
|
FSTYPE=$(blkid -o value -s TYPE /dev/vda || true)
|
|
|
|
if test -z "$FSTYPE"; then
|
|
|
|
mke2fs -t ext4 /dev/vda
|
|
|
|
fi
|
|
|
|
'';
|
|
|
|
|
|
|
|
boot.initrd.postMountCommands =
|
|
|
|
''
|
2013-10-16 11:36:09 +02:00
|
|
|
# Mark this as a NixOS machine.
|
2013-09-04 13:05:09 +02:00
|
|
|
mkdir -p $targetRoot/etc
|
|
|
|
echo -n > $targetRoot/etc/NIXOS
|
|
|
|
|
|
|
|
# Fix the permissions on /tmp.
|
|
|
|
chmod 1777 $targetRoot/tmp
|
|
|
|
|
|
|
|
mkdir -p $targetRoot/boot
|
|
|
|
${optionalString cfg.writableStore ''
|
|
|
|
mkdir -p /unionfs-chroot/ro-store
|
|
|
|
mount --rbind $targetRoot/nix/store /unionfs-chroot/ro-store
|
|
|
|
|
|
|
|
mkdir /unionfs-chroot/rw-store
|
|
|
|
${if cfg.writableStoreUseTmpfs then ''
|
|
|
|
mount -t tmpfs -o "mode=755" none /unionfs-chroot/rw-store
|
2010-09-13 14:34:58 +02:00
|
|
|
'' else ''
|
2013-09-04 13:05:09 +02:00
|
|
|
mkdir $targetRoot/.nix-rw-store
|
|
|
|
mount --bind $targetRoot/.nix-rw-store /unionfs-chroot/rw-store
|
|
|
|
''}
|
2010-09-13 14:34:58 +02:00
|
|
|
|
2013-09-04 13:05:09 +02:00
|
|
|
unionfs -o allow_other,cow,nonempty,chroot=/unionfs-chroot,max_files=32768,hide_meta_files /rw-store=RW:/ro-store=RO $targetRoot/nix/store
|
2013-08-01 02:10:13 +02:00
|
|
|
''}
|
2013-09-04 13:05:09 +02:00
|
|
|
'';
|
|
|
|
|
|
|
|
# After booting, register the closure of the paths in
|
|
|
|
# `virtualisation.pathsInNixDB' in the Nix database in the VM. This
|
|
|
|
# allows Nix operations to work in the VM. The path to the
|
|
|
|
# registration file is passed through the kernel command line to
|
|
|
|
# allow `system.build.toplevel' to be included. (If we had a direct
|
|
|
|
# reference to ${regInfo} here, then we would get a cyclic
|
|
|
|
# dependency.)
|
|
|
|
boot.postBootCommands =
|
|
|
|
''
|
|
|
|
if [[ "$(cat /proc/cmdline)" =~ regInfo=([^ ]*) ]]; then
|
2013-10-28 16:28:04 +01:00
|
|
|
${config.nix.package}/bin/nix-store --load-db < ''${BASH_REMATCH[1]}
|
2013-09-04 13:05:09 +02:00
|
|
|
fi
|
|
|
|
'';
|
|
|
|
|
|
|
|
virtualisation.pathsInNixDB = [ config.system.build.toplevel ];
|
|
|
|
|
|
|
|
virtualisation.qemu.options = [ "-vga std" "-usbdevice tablet" ];
|
|
|
|
|
2013-10-29 13:04:52 +01:00
|
|
|
# Mount the host filesystem via 9P, and bind-mount the Nix store
|
|
|
|
# of the host into our own filesystem. We use mkVMOverride to
|
|
|
|
# allow this module to be applied to "normal" NixOS system
|
|
|
|
# configuration, where the regular value for the `fileSystems'
|
|
|
|
# attribute should be disregarded for the purpose of building a VM
|
|
|
|
# test image (since those filesystems don't exist in the VM).
|
|
|
|
fileSystems = mkVMOverride
|
2013-09-04 13:05:09 +02:00
|
|
|
{ "/".device = "/dev/vda";
|
|
|
|
"/nix/store" =
|
|
|
|
{ device = "store";
|
|
|
|
fsType = "9p";
|
|
|
|
options = "trans=virtio,version=9p2000.L,msize=1048576,cache=loose";
|
|
|
|
};
|
|
|
|
"/tmp/xchg" =
|
|
|
|
{ device = "xchg";
|
|
|
|
fsType = "9p";
|
|
|
|
options = "trans=virtio,version=9p2000.L,msize=1048576,cache=loose";
|
|
|
|
neededForBoot = true;
|
|
|
|
};
|
|
|
|
"/tmp/shared" =
|
|
|
|
{ device = "shared";
|
|
|
|
fsType = "9p";
|
|
|
|
options = "trans=virtio,version=9p2000.L,msize=1048576";
|
|
|
|
neededForBoot = true;
|
|
|
|
};
|
|
|
|
} // optionalAttrs cfg.useBootLoader
|
|
|
|
{ "/boot" =
|
|
|
|
{ device = "/dev/disk/by-label/boot";
|
|
|
|
fsType = "ext4";
|
|
|
|
options = "ro";
|
|
|
|
noCheck = true; # fsck fails on a r/o filesystem
|
|
|
|
};
|
|
|
|
};
|
2013-08-01 02:10:13 +02:00
|
|
|
|
2013-10-29 13:04:52 +01:00
|
|
|
swapDevices = mkVMOverride [ ];
|
2013-10-29 13:31:01 +01:00
|
|
|
boot.initrd.luks.devices = mkVMOverride [];
|
2013-09-04 13:05:09 +02:00
|
|
|
|
|
|
|
# Don't run ntpd in the guest. It should get the correct time from KVM.
|
|
|
|
services.ntp.enable = false;
|
|
|
|
|
|
|
|
system.build.vm = pkgs.runCommand "nixos-vm" { preferLocalBuild = true; }
|
|
|
|
''
|
|
|
|
ensureDir $out/bin
|
|
|
|
ln -s ${config.system.build.toplevel} $out/system
|
|
|
|
ln -s ${pkgs.writeScript "run-nixos-vm" startVM} $out/bin/run-${vmName}-vm
|
|
|
|
'';
|
|
|
|
|
|
|
|
# When building a regular system configuration, override whatever
|
|
|
|
# video driver the host uses.
|
2013-10-29 13:04:52 +01:00
|
|
|
services.xserver.videoDriver = mkVMOverride null;
|
2014-01-19 14:01:25 +01:00
|
|
|
services.mesa.videoDrivers = mkVMOverride [ "vesa" ];
|
2013-10-29 13:04:52 +01:00
|
|
|
services.xserver.defaultDepth = mkVMOverride 0;
|
|
|
|
services.xserver.resolutions = mkVMOverride [ { x = 1024; y = 768; } ];
|
2013-09-04 13:05:09 +02:00
|
|
|
services.xserver.monitorSection =
|
|
|
|
''
|
|
|
|
# Set a higher refresh rate so that resolutions > 800x600 work.
|
|
|
|
HorizSync 30-140
|
|
|
|
VertRefresh 50-160
|
|
|
|
'';
|
|
|
|
|
|
|
|
# Wireless won't work in the VM.
|
2013-10-29 13:04:52 +01:00
|
|
|
networking.wireless.enable = mkVMOverride false;
|
2013-09-04 13:05:09 +02:00
|
|
|
|
|
|
|
system.requiredKernelConfig = with config.lib.kernelConfig;
|
|
|
|
[ (isEnabled "VIRTIO_BLK")
|
|
|
|
(isEnabled "VIRTIO_PCI")
|
|
|
|
(isEnabled "VIRTIO_NET")
|
|
|
|
(isEnabled "EXT4_FS")
|
|
|
|
(isYes "BLK_DEV")
|
|
|
|
(isYes "PCI")
|
|
|
|
(isYes "EXPERIMENTAL")
|
|
|
|
(isYes "NETDEVICES")
|
|
|
|
(isYes "NET_CORE")
|
|
|
|
(isYes "INET")
|
|
|
|
(isYes "NETWORK_FILESYSTEMS")
|
|
|
|
] ++ optional (!cfg.graphics) [
|
|
|
|
(isYes "SERIAL_8250_CONSOLE")
|
|
|
|
(isYes "SERIAL_8250")
|
|
|
|
];
|
2009-06-18 18:16:12 +02:00
|
|
|
|
2013-09-04 13:05:09 +02:00
|
|
|
};
|
2009-06-18 18:16:12 +02:00
|
|
|
}
|