summary refs log tree commit diff
path: root/nixos/modules/virtualisation
Commit message (Collapse)AuthorAge
...
| * | | | nixos/openstackImage: default hostname is empty stringAntoine Eiche2019-02-11
| | | | | | | | | | | | | | | | | | | | | | | | | This is to let the `ec2-data.nix` module sets the hostname from the metadata API value.
| * | | | Rename `novaImage` to `openstackImage`Antoine Eiche2019-02-11
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | People don't necessary know `nova` is related to Openstack (it is a component of Openstack). So, it is more explicit to call it `openstackImage`.
| * | | | nova-image: add amazon-init module to the nova imageAntoine Eiche2019-01-28
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This allows the VM to provide a `configuration.nix` file to the VM. The test doesn't work in sandbox because it needs Internet (however it works interactively).
| * | | | nova-image: use wget instead of cloud-init (via EC2 API)Antoine Eiche2019-01-28
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The Openstack metadata service exposes the EC2 API. We use the existing `ec2.nix` module to configure the hostname and ssh keys of an Openstack Instance. A test checks the ssh server is well configured. This is mainly to reduce the size of the image (700MB). Also, declarative features provided by cloud-init are not really useful since we would prefer to use our `configuration.nix` file instead.
* | | | | Merge pull request #53419 from uvNikita/containers/fix-bridgeFlorian Klink2019-01-28
|\ \ \ \ \ | |/ / / / |/| | | | nixos/containers: add bridge without address specified
| * | | | nixos/containers: add bridge without address specifiedNikita Uvarov2019-01-07
| | |_|/ | |/| | | | | | | | | | | | | | | | | | According to systemd-nspawn(1), --network-bridge implies --network-veth, and --port option is supported only when private networking is enabled. Fixes #52417.
* | | | Merge pull request #53871 from elseym/fix-container-extravethsFranz Pletz2019-01-14
|\ \ \ \ | | | | | | | | | | nixos/containers: explicitly set link up on host for extraVeths
| * | | | nixos/containers: explicitly set link up on host for extraVethselseym2019-01-13
| |/ / /
* / / / modules/profiles/minimal: sound is disabled by defaultProfpatsch2019-01-13
|/ / / | | | | | | | | | | | | | | | The option is `false` by default since e349ccc77febd45abbd14be14f7de123ec4a4da2, so we don’t need to mention it explicitely in these minimal configs.
* | | nixos/modules/virtualisation/google-compute-config.nix: remove ↵Florian Klink2018-12-21
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | google-accounts-daemon Use googleOsLogin for login instead. This allows setting users.mutableUsers back to false, and to strip the security.sudo.extraConfig. security.sudo.enable is default anyhow, so we can remove that as well.
* | | Merge pull request #51393 from arianvp/container-namesFlorian Klink2018-12-05
|\ \ \ | | | | | | | | nixos/containers: Add assertion for container name length
| * | | nixos/containers: Add assertion for container name lengthArian van Putten2018-12-02
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | When privateNetwork is enabled, currently the container's interface name is derived from the container name. However, there's a hard limit on the size of interface names. To avoid conflicts and other issues, we set a limit on the container name when privateNetwork is enabled. Fixes #38509
* | | | Merge pull request #49392 from uvNikita/nixos/containers/vethsJörg Thalheim2018-12-03
|\ \ \ \ | |/ / / |/| | | nixos/containers: don't create veths if not configured
| * | | nixos/containers: don't create veths if not configuredNikita Uvarov2018-10-29
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Previously, setting "privateNetwork = true" without specifying host and local addresses would create unconfigured interfaces: ve-$INSTANCE on the host and eth0 inside the container. These changes is rebased part of the original PR #3021.
* | | | nixos/containers: simplify env var definitionErik Arvstedt2018-11-26
| | | | | | | | | | | | | | | | | | | | Also clear up the misleading comment: This env var isn't root-specific, it's needed for all users.
* | | | google-compute-image: make it a module and the size tuneable (#49854)Ding Xiang Fei2018-11-26
| | | | | | | | | | | | | | | | | | | | * move GCE system configuration to `google-compute-config.nix` * remove `fetch-ssh-keys` service (disabled in comment)
* | | | Merge branch 'master' of https://github.com/nixos/nixpkgs into ↵Ding Xiang Fei2018-11-26
|\ \ \ \ | | | | | | | | | | | | | | | tarball-closureinfo
| * | | | treewide: systemd timeout arguments to use infinity instead of 0 (#50934)Craig Younkins2018-11-25
| | |_|/ | |/| | | | | | Fixes https://github.com/NixOS/nixpkgs/issues/49700
| * | | Update GCE image for 18.09Rob Vermaas2018-11-16
| | | | | | | | | | | | | | | | (cherry picked from commit e0eb712136aa8cd786955e9109afbbf8ba42555c)
* | | | nixos/docker-image: add example usageJörg Thalheim2018-11-23
|/ / /
* | | Merge pull request #49670 from matthewbauer/pkgs-i686-removeMatthew Bauer2018-11-04
|\ \ \ | | | | | | | | Fix pkgsi686Linux assertion
| * | | treewide: remove pkgs_i686Matthew Bauer2018-11-03
| | | | | | | | | | | | | | | | | | | | | | | | This was getting evaluated eagerly causing assertion failures in aarch64 systems. We can replace usages of pkgs_i686 with pkgs.pkgsi686Linux.
* | | | nixos/google-network-daemon: systemd job type simple instead of oneshot (#49692)Sarah Brofeldt2018-11-03
| | | |
* | | | Merge pull request #49650 from srghma/srghma-patch-1Florian Klink2018-11-03
|\ \ \ \ | |/ / / |/| | | amazon-image: fix typo in comment
| * | | fix typoSergei Khoma2018-06-03
| | | | | | | | | | | | based on https://www.ec2instances.info/
* | | | nixos/dockerPreloader: preload docker images (#49379)lewo2018-11-03
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This module permits to preload Docker image in a VM in order to reduce OIs on file copies. This module has to be only used in testing environments, when the test requires several Docker images such as in Kubernetes tests. In this case, `virtualisation.dockerPreloader.images` can replace the `services.kubernetes.kubelet.seedDockerImages` options. The idea is to populate the /var/lib/docker directory by mounting qcow files (we uses qcow file to avoid permission issues) that contain images. For each image specified in config.virtualisation.dockerPreloader.images: 1. The image is loaded by Docker in a VM 2. The resulting /var/lib/docker is written to a QCOW file This set of QCOW files can then be used to populate the /var/lib/docker: 1. Each QCOW is mounted in the VM 2. Symlink are created from these mount points to /var/lib/docker 3. A /var/lib/docker/image/overlay2/repositories.json file is generated 4. The docker daemon is started.
* | | | Merge pull request #48771 from arianvp/container-tweaksJörg Thalheim2018-10-31
|\ \ \ \ | | | | | | | | | | nixos/containers: Introduce several tweaks to systemd-nspawn from upstream systemd
| * | | | nixos/containers: Introduce several tweaks to systemd-nspawn from upstream ↵Arian van Putten2018-10-22
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | systemd * Lets container@.service be activated by machines.target instead of multi-user.target According to the systemd manpages, all containers that are registered by machinectl, should be inside machines.target for easy stopping and starting container units altogether * make sure container@.service and container.slice instances are actually located in machine.slice https://plus.google.com/112206451048767236518/posts/SYAueyXHeEX See original commit: https://github.com/NixOS/systemd/commit/45d383a3b8 * Enable Cgroup delegation for nixos-containers Delegate=yes should be set for container scopes where a systemd instance inside the container shall manage the hierarchies below its own cgroup and have access to all controllers. This is equivalent to enabling all accounting options on the systemd process inside the system container. This means that systemd inside the container is responsible for managing Cgroup resources for unit files that enable accounting options inside. Without this option, units that make use of cgroup features within system containers might misbehave See original commit: https://github.com/NixOS/systemd/commit/a931ad47a8 from the manpage: Turns on delegation of further resource control partitioning to processes of the unit. Units where this is enabled may create and manage their own private subhierarchy of control groups below the control group of the unit itself. For unprivileged services (i.e. those using the User= setting) the unit's control group will be made accessible to the relevant user. When enabled the service manager will refrain from manipulating control groups or moving processes below the unit's control group, so that a clear concept of ownership is established: the control group tree above the unit's control group (i.e. towards the root control group) is owned and managed by the service manager of the host, while the control group tree below the unit's control group is owned and managed by the unit itself. Takes either a boolean argument or a list of control group controller names. If true, delegation is turned on, and all supported controllers are enabled for the unit, making them available to the unit's processes for management. If false, delegation is turned off entirely (and no additional controllers are enabled). If set to a list of controllers, delegation is turned on, and the specified controllers are enabled for the unit. Note that additional controllers than the ones specified might be made available as well, depending on configuration of the containing slice unit or other units contained in it. Note that assigning the empty string will enable delegation, but reset the list of controllers, all assignments prior to this will have no effect. Defaults to false. Note that controller delegation to less privileged code is only safe on the unified control group hierarchy. Accordingly, access to the specified controllers will not be granted to unprivileged services on the legacy hierarchy, even when requested. The following controller names may be specified: cpu, cpuacct, io, blkio, memory, devices, pids. Not all of these controllers are available on all kernels however, and some are specific to the unified hierarchy while others are specific to the legacy hierarchy. Also note that the kernel might support further controllers, which aren't covered here yet as delegation is either not supported at all for them or not defined cleanly.
* | | | | nixos/libvirtd: utilize onShutdown option (#49480)Lizard2018-10-31
| | | | | | | | | | | | | | | | | | | | | | | | | `services.virtualisation.libvirtd.onShutdown` was previously unused. While suspending a domain on host shutdown is the default, this commit makes it so domains can be shut down, also.
* | | | | postgresql*: use underscores in version numbersAlyssa Ross2018-10-30
| |_|/ / |/| | |
* | | | nixos/virtualbox-image: increase disk to 50GRenaud2018-10-28
|/ / / | | | | | | | | | | | | | | | | | | 100GB breaks cptofs but 50GB is fine and benchmarks shows it takes the same time as building the demo VBox VM with a 10GB disk + enabled VM sound output by default + set USB controller in USB2.0 mode + add manifest file in the OVA as it allows integrity checking on imports
* | | Merge pull request #48640 from gnidorah/kvmgtJörg Thalheim2018-10-19
|\ \ \ | | | | | | | | kvmgt module: add restart on failure
| * | | kvmgt module: add service restart on failuregnidorah2018-10-18
| | | |
* | | | Merge pull request #47975 from ↵Silvan Mosberger2018-10-17
|\ \ \ \ | | | | | | | | | | | | | | | | | | | | aneeshusa/make-container-journals-available-from-host containers: Make systemd journals available from the host
| * | | | nixos/containers: Make systemd journals available from the hostAneesh Agrawal2018-10-14
| | | | | | | | | | | | | | | | | | | | This is set by default if using the upstream systemd-nspawn@ units.
* | | | | amazon-image.nix: Disable udisksEelco Dolstra2018-10-15
| | | | | | | | | | | | | | | | | | | | This reduces the system closure by 89 MiB.
* | | | | ec2-amis.nix: Add 18.09 imagesEelco Dolstra2018-10-15
| | | | |
* | | | | nixos/qemu-guest-agent: pkgs.{kvm -> qemu} (#48293)volth2018-10-13
| |/ / / |/| | | | | | | there is no top-level pkgs.kvm
* | | | Merge pull request #47902 from pvgoran/correct-mkEnableOption-usesSilvan Mosberger2018-10-11
|\ \ \ \ | | | | | | | | | | nixos: correct improper uses of mkEnableOption, clarify service descr…
| * | | | nixos: correct improper uses of mkEnableOption, clarify service descriptionsPavel Goran2018-10-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Several service definitions used `mkEnableOption` with text starting with "Whether to", which produced funny option descriptions like "Whether to enable Whether to run the rspamd daemon..". This commit corrects this, and adds short descriptions of services to affected service definitions.
* | | | | Revert "Increase Virtualbox disk image size" (#48151)Renaud2018-10-10
| | | | |
* | | | | Merge pull request #47917 from arianvp/fix-imperative-containersSamuel Dionne-Riel2018-10-08
|\ \ \ \ \ | |_|/ / / |/| | | | Fix imperative containers
| * | | | nixos-container: Force container to talk to host nix-daemonArian van Putten2018-10-05
| |/ / / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | When logging into a container by using nixos-container root-login all nix-related commands in the container would fail, as they tried to modify the nix db and nix store, which are mounted read-only in the container. We want nixos-container to not try to modify the nix store at all, but instead delegate any build commands to the nix daemon of the host operating system. This already works for non-root users inside a nixos-container, as it doesn't 'own' the nix-store, and thus defaults to talking to the daemon socket at /nix/var/nix/daemon-socket/, which is bind-mounted to the host daemon-socket, causing all nix commands to be delegated to the host. However, when we are the root user inside the container, we have the same uid as the nix store owner, eventhough it's not actually the same root user (due to user namespaces). Nix gets confused, and is convinced it's running in single-user mode, and tries to modify the nix store directly instead. By setting `NIX_REMOTE=daemon` in `/etc/profile`, we force nix to operate in multi-user mode, so that it will talk to the host daemon instead, which will modify the nix store for the container. This fixes #40355
* | | | Merge pull request #46649 from brainrape/patch-1Matthew Bauer2018-10-05
|\ \ \ \ | |/ / / |/| | | Increase Virtualbox disk image size
| * | | Increase Virtualbox disk image sizeMárton Boros2018-09-13
| | | | | | | | | | | | | | | | 10G is not enough for a desktop installation, and resizing a Virtualbox disk image is a pain. Let's increase the default disk size to 100G. It does not require more storage space, since the empty bits are left out.
* | | | nixos on hyperv: hot-add CPUPeter Hoeg2018-09-28
| | | |
* | | | nixos on hyperv: load modules and set video modePeter Hoeg2018-09-28
| | | |
* | | | google-compute-engine: 20180510 -> 20180905zimbatm2018-09-26
| | | | | | | | | | | | | | | | The list of corresponding NixOS services are also updated
* | | | Revert "virtualization/qemu-vm: fix and improve virtio/scsi switching"Sarah Brofeldt2018-09-25
| | | | | | | | | | | | | | | | | | | | | | | | | | | | This reverts commit f777d2b719be0db4cb7819d5b6dbdd121db29a37. cc #34409 This breaks evaluation of the tested job: attribute 'diskInterface' missing, at /nix/store/5k9kk52bv6zsvsyyvpxhm8xmwyn2yjvx-source/pkgs/build-support/vm/default.nix:316:24
* | | | virtualization/qemu-vm: fix and improve virtio/scsi switchingStefan Junker2018-09-22
|/ / /