summary refs log tree commit diff
path: root/modules/virtualisation/amazon-image.nix
blob: 7e04f0d29114e0811510c0f66ad6a949c22dfa19 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
{ config, pkgs, ... }:

with pkgs.lib;

{
  imports = [ ../profiles/headless.nix ./ec2-data.nix ];

  system.build.amazonImage =
    pkgs.vmTools.runInLinuxVM (
      pkgs.runCommand "amazon-image"
        { preVM =
            ''
              mkdir $out
              diskImage=$out/nixos.img
              ${pkgs.vmTools.qemu}/bin/qemu-img create -f raw $diskImage "4G"
              mv closure xchg/
            '';
          buildInputs = [ pkgs.utillinux pkgs.perl ];
          exportReferencesGraph =
            [ "closure" config.system.build.toplevel ];
        }
        ''
          # Create an empty filesystem and mount it.
          ${pkgs.e2fsprogs}/sbin/mkfs.ext4 -L nixos /dev/vda
          ${pkgs.e2fsprogs}/sbin/tune2fs -c 0 -i 0 /dev/vda
          mkdir /mnt
          mount /dev/vda /mnt

          # The initrd expects these directories to exist.
          mkdir /mnt/dev /mnt/proc /mnt/sys

          mount -o bind /proc /mnt/proc

          # Copy all paths in the closure to the filesystem.
          storePaths=$(perl ${pkgs.pathsFromGraph} /tmp/xchg/closure)

          mkdir -p /mnt/nix/store
          echo "copying everything (will take a while)..."
          cp -prd $storePaths /mnt/nix/store/

          # Register the paths in the Nix database.
          printRegistration=1 perl ${pkgs.pathsFromGraph} /tmp/xchg/closure | \
              chroot /mnt ${config.environment.nix}/bin/nix-store --load-db

          # Create the system profile to allow nixos-rebuild to work.
          chroot /mnt ${config.environment.nix}/bin/nix-env \
              -p /nix/var/nix/profiles/system --set ${config.system.build.toplevel}

          # `nixos-rebuild' requires an /etc/NIXOS.
          mkdir -p /mnt/etc
          touch /mnt/etc/NIXOS

          # `switch-to-configuration' requires a /bin/sh
          mkdir -p /mnt/bin
          ln -s ${config.system.build.binsh}/bin/sh /mnt/bin/sh

          # Install a configuration.nix.
          mkdir -p /mnt/etc/nixos
          cp ${./amazon-config.nix} /mnt/etc/nixos/configuration.nix

          # Generate the GRUB menu.
          chroot /mnt ${config.system.build.toplevel}/bin/switch-to-configuration boot

          umount /mnt/proc
          umount /mnt
        ''
    );

  fileSystems."/".device = "/dev/disk/by-label/nixos";

  boot.initrd.kernelModules = [ "xen-blkfront" ];
  boot.kernelModules = [ "xen-netfront" ];

  # Generate a GRUB menu.  Amazon's pv-grub uses this to boot our kernel/initrd.
  boot.loader.grub.version = 1;
  boot.loader.grub.device = "nodev";
  boot.loader.grub.timeout = 0;
  boot.loader.grub.extraPerEntryConfig = "root (hd0)";

  boot.initrd.postDeviceCommands =
    ''
      # Force udev to exit to prevent random "Device or resource busy
      # while trying to open /dev/xvda" errors from fsck.
      udevadm control --exit || true
      kill -9 -1
    '';

  # Mount all formatted ephemeral disks and activate all swap devices.
  # We cannot do this with the ‘fileSystems’ and ‘swapDevices’ options
  # because the set of devices is dependent on the instance type
  # (e.g. "m1.large" has one ephemeral filesystem and one swap device,
  # while "m1.large" has two ephemeral filesystems and no swap
  # devices).  Also, put /tmp and /var on /disk0, since it has a lot
  # more space than the root device.  Similarly, "move" /nix to /disk0
  # by layering a unionfs-fuse mount on top of it so we have a lot more space for
  # Nix operations.
  boot.initrd.postMountCommands =
    ''
      diskNr=0
      diskForUnionfs=
      for device in /dev/xvd[abcde]*; do
          if [ "$device" = /dev/xvda -o "$device" = /dev/xvda1 ]; then continue; fi
          fsType=$(blkid -o value -s TYPE "$device" || true)
          if [ "$fsType" = swap ]; then
              echo "activating swap device $device..."
              swapon "$device" || true
          elif [ "$fsType" = ext3 ]; then
              mp="/disk$diskNr"
              diskNr=$((diskNr + 1))
              echo "mounting $device on $mp..."
              if mountFS "$device" "$mp" "" ext3; then
                  if [ -z "$diskForUnionfs" ]; then diskForUnionfs="$mp"; fi
              fi
          else
              echo "skipping unknown device type $device"
          fi
      done

      if [ -n "$diskForUnionfs" ]; then
          mkdir -m 755 -p $targetRoot/$diskForUnionfs/root

          mkdir -m 1777 -p $targetRoot/$diskForUnionfs/root/tmp $targetRoot/tmp
          mount --bind $targetRoot/$diskForUnionfs/root/tmp $targetRoot/tmp

          if [ ! -e $targetRoot/.ebs ]; then
              mkdir -m 755 -p $targetRoot/$diskForUnionfs/root/var $targetRoot/var
              mount --bind $targetRoot/$diskForUnionfs/root/var $targetRoot/var

              mkdir -p /unionfs-chroot/ro-nix
              mount --rbind $targetRoot/nix /unionfs-chroot/ro-nix

              mkdir -m 755 -p $targetRoot/$diskForUnionfs/root/nix
              mkdir -p /unionfs-chroot/rw-nix
              mount --rbind $targetRoot/$diskForUnionfs/root/nix /unionfs-chroot/rw-nix

              unionfs -o allow_other,cow,nonempty,chroot=/unionfs-chroot,max_files=32768 /rw-nix=RW:/ro-nix=RO $targetRoot/nix
          fi
      fi
    '';

  boot.initrd.extraUtilsCommands =
    ''
      # We need swapon in the initrd.
      cp ${pkgs.utillinux}/sbin/swapon $out/bin
    '';

  # Don't put old configurations in the GRUB menu.  The user has no
  # way to select them anyway.
  boot.loader.grub.configurationLimit = 0;

  # Allow root logins only using the SSH key that the user specified
  # at instance creation time.
  services.openssh.enable = true;
  services.openssh.permitRootLogin = "without-password";

  # Force getting the hostname from EC2.
  networking.hostName = mkDefault "";

  # Always include cryptsetup so that Charon can use it.
  environment.systemPackages = [ pkgs.cryptsetup ];

  boot.initrd.supportedFilesystems = [ "unionfs-fuse" ];
}