1
0
Fork 1
mirror of https://github.com/NixOS/nixpkgs.git synced 2024-11-30 01:20:40 +00:00
nixpkgs/nixos/modules/virtualisation/lxd.nix

163 lines
5.1 KiB
Nix
Raw Normal View History

2015-09-14 07:27:31 +01:00
# Systemd services for lxd.
{ config, lib, pkgs, ... }:
with lib;
let
cfg = config.virtualisation.lxd;
in {
imports = [
(mkRemovedOptionModule [ "virtualisation" "lxd" "zfsPackage" ] "Override zfs in an overlay instead to override it globally")
];
2015-09-14 07:27:31 +01:00
###### interface
options = {
2018-03-16 09:58:54 +00:00
virtualisation.lxd = {
enable = mkOption {
2015-09-14 07:27:31 +01:00
type = types.bool;
default = false;
2018-03-16 09:58:54 +00:00
description = ''
This option enables lxd, a daemon that manages
containers. Users in the "lxd" group can interact with
the daemon (e.g. to start or stop containers) using the
<command>lxc</command> command line tool, among others.
Most of the time, you'll also want to start lxcfs, so
that containers can "see" the limits:
<code>
virtualisation.lxc.lxcfs.enable = true;
</code>
2018-03-16 09:58:54 +00:00
'';
2015-09-14 07:27:31 +01:00
};
package = mkOption {
type = types.package;
2020-06-05 11:57:18 +01:00
default = pkgs.lxd.override { nftablesSupport = config.networking.nftables.enable; };
defaultText = "pkgs.lxd";
description = ''
The LXD package to use.
'';
};
lxcPackage = mkOption {
type = types.package;
default = pkgs.lxc;
defaultText = "pkgs.lxc";
description = ''
The LXC package to use with LXD (required for AppArmor profiles).
'';
};
2018-03-16 09:58:54 +00:00
zfsSupport = mkOption {
type = types.bool;
default = config.boot.zfs.enabled;
defaultText = "config.boot.zfs.enabled";
2018-03-16 09:58:54 +00:00
description = ''
Enables lxd to use zfs as a storage for containers.
2018-03-16 09:58:54 +00:00
This option is enabled by default if a zfs pool is configured
with nixos.
'';
};
2020-06-05 11:57:18 +01:00
recommendedSysctlSettings = mkOption {
type = types.bool;
default = false;
description = ''
Enables various settings to avoid common pitfalls when
running containers requiring many file operations.
Fixes errors like "Too many open files" or
"neighbour: ndisc_cache: neighbor table overflow!".
See https://lxd.readthedocs.io/en/latest/production-setup/
for details.
'';
};
2018-03-16 09:58:54 +00:00
};
2015-09-14 07:27:31 +01:00
};
###### implementation
config = mkIf cfg.enable {
environment.systemPackages = [ cfg.package ];
2015-09-14 07:27:31 +01:00
# Note: the following options are also declared in virtualisation.lxc, but
# the latter can't be simply enabled to reuse the formers, because it
# does a bunch of unrelated things.
systemd.tmpfiles.rules = [ "d /var/lib/lxc/rootfs 0755 root root -" ];
security.apparmor.packages = [ pkgs.lxcPackage ];
security.apparmor.profiles = [
"${cfg.lxcPackage}/etc/apparmor.d/lxc-containers"
"${cfg.lxcPackage}/etc/apparmor.d/usr.bin.lxc-start"
];
2018-02-10 08:18:53 +00:00
# TODO: remove once LXD gets proper support for cgroupsv2
# (currently most of the e.g. CPU accounting stuff doesn't work)
systemd.enableUnifiedCgroupHierarchy = false;
systemd.sockets.lxd = {
description = "LXD UNIX socket";
wantedBy = [ "sockets.target" ];
socketConfig = {
ListenStream = "/var/lib/lxd/unix.socket";
SocketMode = "0660";
SocketGroup = "lxd";
Service = "lxd.service";
};
};
2018-03-16 09:58:54 +00:00
systemd.services.lxd = {
description = "LXD Container Management Daemon";
2015-09-14 07:27:31 +01:00
2018-03-16 09:58:54 +00:00
wantedBy = [ "multi-user.target" ];
after = [ "network-online.target" "lxcfs.service" ];
requires = [ "network-online.target" "lxd.socket" "lxcfs.service" ];
documentation = [ "man:lxd(1)" ];
2015-09-14 07:27:31 +01:00
path = optional cfg.zfsSupport config.boot.zfs.package;
2018-02-10 08:18:53 +00:00
2018-03-16 09:58:54 +00:00
serviceConfig = {
ExecStart = "@${cfg.package}/bin/lxd lxd --group lxd";
ExecStartPost = "${cfg.package}/bin/lxd waitready --timeout=600";
ExecStop = "${cfg.package}/bin/lxd shutdown";
2018-03-16 09:58:54 +00:00
KillMode = "process"; # when stopping, leave the containers alone
LimitMEMLOCK = "infinity";
LimitNOFILE = "1048576";
LimitNPROC = "infinity";
TasksMax = "infinity";
Restart = "on-failure";
TimeoutStartSec = "600s";
TimeoutStopSec = "30s";
# By default, `lxd` loads configuration files from hard-coded
# `/usr/share/lxc/config` - since this is a no-go for us, we have to
# explicitly tell it where the actual configuration files are
Environment = mkIf (config.virtualisation.lxc.lxcfs.enable)
"LXD_LXC_TEMPLATE_CONFIG=${pkgs.lxcfs}/share/lxc/config";
2015-09-14 07:27:31 +01:00
};
2018-03-16 09:58:54 +00:00
};
users.groups.lxd.gid = config.ids.gids.lxd;
2015-09-14 07:27:31 +01:00
users.users.root = {
2015-09-14 07:27:31 +01:00
subUidRanges = [ { startUid = 1000000; count = 65536; } ];
subGidRanges = [ { startGid = 1000000; count = 65536; } ];
};
boot.kernel.sysctl = mkIf cfg.recommendedSysctlSettings {
"fs.inotify.max_queued_events" = 1048576;
"fs.inotify.max_user_instances" = 1048576;
"fs.inotify.max_user_watches" = 1048576;
"vm.max_map_count" = 262144;
"kernel.dmesg_restrict" = 1;
"net.ipv4.neigh.default.gc_thresh3" = 8192;
"net.ipv6.neigh.default.gc_thresh3" = 8192;
"kernel.keys.maxkeys" = 2000;
};
2015-09-14 07:27:31 +01:00
};
}