summary refs log tree commit diff
path: root/nixos/modules/virtualisation/containers.nix
diff options
context:
space:
mode:
authorNikita Uvarov <uv.nikita@gmail.com>2019-08-20 23:43:15 +0200
committerNikita Uvarov <uv.nikita@gmail.com>2019-08-21 00:01:29 +0200
commit7e7fc6471e86cbc167255d56d84e2cbb8b0365ab (patch)
tree4b8ac4108ca09078e2e314e8daf88b783fa5f8ef /nixos/modules/virtualisation/containers.nix
parentbacf5619e253214212dfc004eb18a6f0be07d367 (diff)
downloadnixpkgs-7e7fc6471e86cbc167255d56d84e2cbb8b0365ab.tar
nixpkgs-7e7fc6471e86cbc167255d56d84e2cbb8b0365ab.tar.gz
nixpkgs-7e7fc6471e86cbc167255d56d84e2cbb8b0365ab.tar.bz2
nixpkgs-7e7fc6471e86cbc167255d56d84e2cbb8b0365ab.tar.lz
nixpkgs-7e7fc6471e86cbc167255d56d84e2cbb8b0365ab.tar.xz
nixpkgs-7e7fc6471e86cbc167255d56d84e2cbb8b0365ab.tar.zst
nixpkgs-7e7fc6471e86cbc167255d56d84e2cbb8b0365ab.zip
nixos/containers: add unprivileged option
Fixes #57083.
Diffstat (limited to 'nixos/modules/virtualisation/containers.nix')
-rw-r--r--nixos/modules/virtualisation/containers.nix16
1 files changed, 14 insertions, 2 deletions
diff --git a/nixos/modules/virtualisation/containers.nix b/nixos/modules/virtualisation/containers.nix
index e1a91f7704e..b7cb29eaa22 100644
--- a/nixos/modules/virtualisation/containers.nix
+++ b/nixos/modules/virtualisation/containers.nix
@@ -139,6 +139,7 @@ let
         --bind="/nix/var/nix/profiles/per-container/$INSTANCE:/nix/var/nix/profiles" \
         --bind="/nix/var/nix/gcroots/per-container/$INSTANCE:/nix/var/nix/gcroots" \
         ${optionalString (!cfg.ephemeral) "--link-journal=try-guest"} \
+        ${optionalString (cfg.unprivileged) "-U"} \
         --setenv PRIVATE_NETWORK="$PRIVATE_NETWORK" \
         --setenv HOST_BRIDGE="$HOST_BRIDGE" \
         --setenv HOST_ADDRESS="$HOST_ADDRESS" \
@@ -238,8 +239,8 @@ let
     ExecReload = pkgs.writeScript "reload-container"
       ''
         #! ${pkgs.runtimeShell} -e
-        ${pkgs.nixos-container}/bin/nixos-container run "$INSTANCE" -- \
-          bash --login -c "''${SYSTEM_PATH:-/nix/var/nix/profiles/system}/bin/switch-to-configuration test"
+        ${pkgs.systemd}/bin/machinectl shell "$INSTANCE" \
+          ''${SYSTEM_PATH:-/nix/var/nix/profiles/system}/bin/switch-to-configuration test
       '';
 
     SyslogIdentifier = "container %i";
@@ -423,6 +424,7 @@ let
       extraVeths = {};
       additionalCapabilities = [];
       ephemeral = false;
+      unprivileged = false;
       allowedDevices = [];
       hostAddress = null;
       hostAddress6 = null;
@@ -516,6 +518,16 @@ in
               '';
             };
 
+            unprivileged = mkOption {
+              type = types.bool;
+              default = false;
+              description = ''
+                Run container in unprivileged mode using private users feature of <command>systemd-nspawn</command>.
+                This option is eqvivalent of adding -U parameter to <command>systemd-nspawn</command> command.
+                See <literal>systemd-nspawn(1)</literal> man page for more information.
+              '';
+            };
+
             ephemeral = mkOption {
               type = types.bool;
               default = false;