d659488209
we want to generate the GRUB menu without actually installing GRUB (because Amazon supplies its own pv-grub), and each menu entry requires "root (hd0)". For the first, allow boot.loader.grub.device to be set to "nodev" to indicate that the GRUB menu should be generated without installing GRUB. For the second, add an option boot.loader.grub.extraPerEntryConfig to allow commands to be added to each GRUB menu entry (in this case, "root (hd0)"). svn path=/nixos/trunk/; revision=22712
116 lines
3.6 KiB
Nix
116 lines
3.6 KiB
Nix
{ config, pkgs, ... }:
|
|
|
|
with pkgs.lib;
|
|
|
|
{
|
|
system.build.amazonImage =
|
|
pkgs.vmTools.runInLinuxVM (
|
|
pkgs.runCommand "amazon-image"
|
|
{ preVM =
|
|
''
|
|
mkdir $out
|
|
diskImage=$out/nixos.img
|
|
${pkgs.vmTools.kvm}/bin/qemu-img create -f raw $diskImage "4G"
|
|
'';
|
|
buildInputs = [ pkgs.utillinux pkgs.perl ];
|
|
exportReferencesGraph =
|
|
[ "closure" config.system.build.toplevel ];
|
|
}
|
|
''
|
|
# Create an empty filesysten and mount it.
|
|
${pkgs.e2fsprogs}/sbin/mkfs.ext3 -L nixos /dev/vda
|
|
${pkgs.e2fsprogs}/sbin/tune2fs -c 0 -i 0 /dev/vda
|
|
mkdir /mnt
|
|
mount /dev/vda /mnt
|
|
|
|
# The initrd expects these directories to exist.
|
|
mkdir /mnt/dev /mnt/proc /mnt/sys
|
|
|
|
# Copy all paths in the closure to the filesystem.
|
|
storePaths=$(perl ${pkgs.pathsFromGraph} $ORIG_TMPDIR/closure)
|
|
|
|
mkdir -p /mnt/nix/store
|
|
cp -prvd $storePaths /mnt/nix/store/
|
|
|
|
# Register the paths in the Nix database.
|
|
printRegistration=1 perl ${pkgs.pathsFromGraph} $ORIG_TMPDIR/closure | \
|
|
chroot /mnt ${config.environment.nix}/bin/nix-store --load-db
|
|
|
|
# Create the system profile to allow nixos-rebuild to work.
|
|
chroot /mnt ${config.environment.nix}/bin/nix-env \
|
|
-p /nix/var/nix/profiles/system --set ${config.system.build.toplevel}
|
|
|
|
# `nixos-rebuild' requires an /etc/NIXOS.
|
|
mkdir -p /mnt/etc
|
|
touch /mnt/etc/NIXOS
|
|
|
|
# Install a configuration.nix.
|
|
mkdir -p /mnt/etc/nixos
|
|
cp ${./amazon-config.nix} /mnt/etc/nixos/configuration.nix
|
|
|
|
# Generate the GRUB menu.
|
|
chroot /mnt ${config.system.build.toplevel}/bin/switch-to-configuration boot
|
|
|
|
umount /mnt
|
|
''
|
|
);
|
|
|
|
fileSystems =
|
|
[ { mountPoint = "/";
|
|
device = "/dev/disk/by-label/nixos";
|
|
}
|
|
{ mountPoint = "/data";
|
|
device = "/dev/xvdc";
|
|
autocreate = true;
|
|
}
|
|
];
|
|
|
|
swapDevices =
|
|
[ { device = "/dev/xvdb"; } ];
|
|
|
|
boot.initrd.kernelModules = [ "xen-blkfront" ];
|
|
boot.kernelModules = [ "xen-netfront" ];
|
|
|
|
# Generate a GRUB menu. Amazon's pv-grub uses this to boot our kernel/initrd.
|
|
boot.loader.grub.device = "nodev";
|
|
boot.loader.grub.timeout = 0;
|
|
boot.loader.grub.extraPerEntryConfig = "root (hd0)";
|
|
|
|
# There are no virtual consoles.
|
|
services.mingetty.ttys = [ ];
|
|
|
|
# Allow root logins only using the SSH key that the user specified
|
|
# at instance creation time.
|
|
services.openssh.enable = true;
|
|
services.openssh.permitRootLogin = "without-password";
|
|
|
|
# Obtain the SSH key and host name at startup time.
|
|
jobs.fetchEC2Data =
|
|
{ name = "fetch-ec2-data";
|
|
|
|
startOn = "ip-up";
|
|
|
|
task = true;
|
|
|
|
script =
|
|
''
|
|
echo "obtaining SSH key..."
|
|
mkdir -p /root/.ssh
|
|
${pkgs.curl}/bin/curl --retry 3 --retry-delay 0 --fail \
|
|
-o /root/key.pub \
|
|
http://169.254.169.254/1.0/meta-data/public-keys/0/openssh-key
|
|
if [ $? -eq 0 -a -e /root/key.pub ]; then
|
|
if ! grep -q -f /root/key.pub /root/.ssh/authorized_keys; then
|
|
cat /root/key.pub >> /root/.ssh/authorized_keys
|
|
echo "new key added to authorized_keys"
|
|
fi
|
|
chmod 600 /root/.ssh/authorized_keys
|
|
rm -f /root/key.pub
|
|
fi
|
|
|
|
echo "setting host name..."
|
|
${pkgs.nettools}/bin/hostname $(${pkgs.curl}/bin/curl http://169.254.169.254/1.0/meta-data/hostname)
|
|
'';
|
|
};
|
|
}
|