2009-06-18 16:16:12 +00:00
|
|
|
# This module creates a virtual machine from the NixOS configuration.
|
|
|
|
# Building the `config.system.build.vm' attribute gives you a command
|
|
|
|
# that starts a KVM/QEMU VM running the NixOS configuration defined in
|
|
|
|
# `config'. The Nix store is shared read-only with the host, which
|
|
|
|
# makes (re)building VMs very efficient. However, it also means you
|
|
|
|
# can't reconfigure the guest inside the guest - you need to rebuild
|
|
|
|
# the VM in the host. On the other hand, the root filesystem is a
|
|
|
|
# read/writable disk image persistent across VM reboots.
|
|
|
|
|
2021-02-11 10:02:45 +00:00
|
|
|
{ config, lib, pkgs, options, ... }:
|
2009-06-18 16:16:12 +00:00
|
|
|
|
2014-04-14 14:26:48 +00:00
|
|
|
with lib;
|
2009-11-06 21:38:40 +00:00
|
|
|
|
2009-06-19 15:19:56 +00:00
|
|
|
let
|
|
|
|
|
2021-06-23 15:46:46 +00:00
|
|
|
qemu-common = import ../../lib/qemu-common.nix { inherit lib pkgs; };
|
2016-12-15 13:05:54 +00:00
|
|
|
|
2013-09-04 11:05:09 +00:00
|
|
|
cfg = config.virtualisation;
|
|
|
|
|
2022-07-16 17:02:49 +00:00
|
|
|
opt = options.virtualisation;
|
|
|
|
|
2020-10-21 11:02:09 +00:00
|
|
|
qemu = cfg.qemu.package;
|
|
|
|
|
2018-05-10 06:10:19 +00:00
|
|
|
consoles = lib.concatMapStringsSep " " (c: "console=${c}") cfg.qemu.consoles;
|
2013-09-04 11:05:09 +00:00
|
|
|
|
2019-02-12 15:38:23 +00:00
|
|
|
driveOpts = { ... }: {
|
|
|
|
|
|
|
|
options = {
|
|
|
|
|
|
|
|
file = mkOption {
|
|
|
|
type = types.str;
|
2022-08-05 17:39:00 +00:00
|
|
|
description = lib.mdDoc "The file image used for this drive.";
|
2019-02-12 15:38:23 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
driveExtraOpts = mkOption {
|
|
|
|
type = types.attrsOf types.str;
|
|
|
|
default = {};
|
2022-08-05 17:39:00 +00:00
|
|
|
description = lib.mdDoc "Extra options passed to drive flag.";
|
2019-02-12 15:38:23 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
deviceExtraOpts = mkOption {
|
|
|
|
type = types.attrsOf types.str;
|
|
|
|
default = {};
|
2022-08-05 17:39:00 +00:00
|
|
|
description = lib.mdDoc "Extra options passed to device flag.";
|
2019-02-12 15:38:23 +00:00
|
|
|
};
|
|
|
|
|
2020-01-28 23:08:56 +00:00
|
|
|
name = mkOption {
|
|
|
|
type = types.nullOr types.str;
|
|
|
|
default = null;
|
|
|
|
description =
|
2022-08-05 17:39:00 +00:00
|
|
|
lib.mdDoc "A name for the drive. Must be unique in the drives list. Not passed to qemu.";
|
2020-01-28 23:08:56 +00:00
|
|
|
};
|
|
|
|
|
2019-02-12 15:38:23 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
};
|
|
|
|
|
2022-12-20 20:18:10 +00:00
|
|
|
selectPartitionTableLayout = { useEFIBoot, useDefaultFilesystems }:
|
|
|
|
if useDefaultFilesystems then
|
|
|
|
if useEFIBoot then "efi" else "legacy"
|
|
|
|
else "none";
|
|
|
|
|
2019-02-12 15:38:23 +00:00
|
|
|
driveCmdline = idx: { file, driveExtraOpts, deviceExtraOpts, ... }:
|
|
|
|
let
|
|
|
|
drvId = "drive${toString idx}";
|
|
|
|
mkKeyValue = generators.mkKeyValueDefault {} "=";
|
|
|
|
mkOpts = opts: concatStringsSep "," (mapAttrsToList mkKeyValue opts);
|
|
|
|
driveOpts = mkOpts (driveExtraOpts // {
|
|
|
|
index = idx;
|
|
|
|
id = drvId;
|
|
|
|
"if" = "none";
|
|
|
|
inherit file;
|
|
|
|
});
|
|
|
|
deviceOpts = mkOpts (deviceExtraOpts // {
|
|
|
|
drive = drvId;
|
|
|
|
});
|
|
|
|
device =
|
|
|
|
if cfg.qemu.diskInterface == "scsi" then
|
|
|
|
"-device lsi53c895a -device scsi-hd,${deviceOpts}"
|
|
|
|
else
|
|
|
|
"-device virtio-blk-pci,${deviceOpts}";
|
|
|
|
in
|
|
|
|
"-drive ${driveOpts} ${device}";
|
|
|
|
|
2021-06-23 14:58:33 +00:00
|
|
|
drivesCmdLine = drives: concatStringsSep "\\\n " (imap1 driveCmdline drives);
|
2018-04-29 23:43:17 +00:00
|
|
|
|
2020-06-14 03:54:20 +00:00
|
|
|
|
2020-01-28 22:30:41 +00:00
|
|
|
# Creates a device name from a 1-based a numerical index, e.g.
|
|
|
|
# * `driveDeviceName 1` -> `/dev/vda`
|
|
|
|
# * `driveDeviceName 2` -> `/dev/vdb`
|
|
|
|
driveDeviceName = idx:
|
|
|
|
let letter = elemAt lowerChars (idx - 1);
|
|
|
|
in if cfg.qemu.diskInterface == "scsi" then
|
|
|
|
"/dev/sd${letter}"
|
|
|
|
else
|
|
|
|
"/dev/vd${letter}";
|
|
|
|
|
2020-01-28 23:08:56 +00:00
|
|
|
lookupDriveDeviceName = driveName: driveList:
|
|
|
|
(findSingle (drive: drive.name == driveName)
|
|
|
|
(throw "Drive ${driveName} not found")
|
|
|
|
(throw "Multiple drives named ${driveName}") driveList).device;
|
|
|
|
|
|
|
|
addDeviceNames =
|
|
|
|
imap1 (idx: drive: drive // { device = driveDeviceName idx; });
|
|
|
|
|
2013-09-04 11:05:09 +00:00
|
|
|
# Shell script to start the VM.
|
|
|
|
startVM =
|
|
|
|
''
|
2021-01-10 00:22:05 +00:00
|
|
|
#! ${cfg.host.pkgs.runtimeShell}
|
|
|
|
|
|
|
|
export PATH=${makeBinPath [ cfg.host.pkgs.coreutils ]}''${PATH:+:}$PATH
|
2013-09-04 11:05:09 +00:00
|
|
|
|
2021-09-29 06:45:52 +00:00
|
|
|
set -e
|
|
|
|
|
2022-12-19 11:04:13 +00:00
|
|
|
NIX_DISK_IMAGE=$(readlink -f "''${NIX_DISK_IMAGE:-${toString config.virtualisation.diskImage}}") || test -z "$NIX_DISK_IMAGE"
|
2013-09-04 11:05:09 +00:00
|
|
|
|
2022-12-19 11:04:13 +00:00
|
|
|
if test -n "$NIX_DISK_IMAGE" && ! test -e "$NIX_DISK_IMAGE"; then
|
2022-12-20 20:18:10 +00:00
|
|
|
echo "Disk image do not exist, creating the virtualisation disk image..."
|
|
|
|
# If we are using a bootloader and default filesystems layout.
|
|
|
|
# We have to reuse the system image layout as a backing image format (CoW)
|
|
|
|
# So we can write on the top of it.
|
|
|
|
|
|
|
|
# If we are not using the default FS layout, potentially, we are interested into
|
|
|
|
# performing operations in postDeviceCommands or at early boot on the raw device.
|
|
|
|
# We can still boot through QEMU direct kernel boot feature.
|
|
|
|
|
|
|
|
# CoW prevent size to be attributed to an image.
|
|
|
|
# FIXME: raise this issue to upstream.
|
|
|
|
${qemu}/bin/qemu-img create \
|
|
|
|
${concatStringsSep " \\\n" ([ "-f qcow2" ]
|
|
|
|
++ optional (cfg.useBootLoader && cfg.useDefaultFilesystems) "-F qcow2 -b ${systemImage}/nixos.qcow2"
|
|
|
|
++ optional (!(cfg.useBootLoader && cfg.useDefaultFilesystems)) "-o size=${toString config.virtualisation.diskSize}M"
|
2023-05-04 07:52:49 +00:00
|
|
|
++ [ ''"$NIX_DISK_IMAGE"'' ])}
|
2022-12-20 20:18:10 +00:00
|
|
|
echo "Virtualisation disk image created."
|
2013-09-04 11:05:09 +00:00
|
|
|
fi
|
|
|
|
|
2015-01-26 20:13:31 +00:00
|
|
|
# Create a directory for storing temporary data of the running VM.
|
2021-09-29 06:45:52 +00:00
|
|
|
if [ -z "$TMPDIR" ] || [ -z "$USE_TMPDIR" ]; then
|
2013-09-04 11:05:09 +00:00
|
|
|
TMPDIR=$(mktemp -d nix-vm.XXXXXXXXXX --tmpdir)
|
|
|
|
fi
|
2015-12-29 15:39:26 +00:00
|
|
|
|
2022-07-16 16:20:16 +00:00
|
|
|
${lib.optionalString (cfg.useNixStoreImage)
|
|
|
|
(if cfg.writableStore
|
|
|
|
then ''
|
|
|
|
# Create a writable copy/snapshot of the store image.
|
|
|
|
${qemu}/bin/qemu-img create -f qcow2 -F qcow2 -b ${storeImage}/nixos.qcow2 "$TMPDIR"/store.img
|
|
|
|
''
|
|
|
|
else ''
|
|
|
|
(
|
|
|
|
cd ${builtins.storeDir}
|
|
|
|
${pkgs.erofs-utils}/bin/mkfs.erofs \
|
|
|
|
--force-uid=0 \
|
|
|
|
--force-gid=0 \
|
|
|
|
-U eb176051-bd15-49b7-9e6b-462e0b467019 \
|
|
|
|
-T 0 \
|
|
|
|
--exclude-regex="$(
|
|
|
|
<${pkgs.closureInfo { rootPaths = [ config.system.build.toplevel regInfo ]; }}/store-paths \
|
|
|
|
sed -e 's^.*/^^g' \
|
|
|
|
| cut -c -10 \
|
|
|
|
| ${pkgs.python3}/bin/python ${./includes-to-excludes.py} )" \
|
|
|
|
"$TMPDIR"/store.img \
|
|
|
|
. \
|
|
|
|
</dev/null >/dev/null
|
|
|
|
)
|
|
|
|
''
|
|
|
|
)
|
|
|
|
}
|
2021-10-05 20:32:56 +00:00
|
|
|
|
2015-01-26 20:13:31 +00:00
|
|
|
# Create a directory for exchanging data with the VM.
|
2021-06-23 14:45:04 +00:00
|
|
|
mkdir -p "$TMPDIR/xchg"
|
2013-09-04 11:05:09 +00:00
|
|
|
|
2023-04-26 16:28:31 +00:00
|
|
|
${lib.optionalString cfg.useEFIBoot
|
2021-06-23 14:58:33 +00:00
|
|
|
''
|
2023-04-26 16:28:31 +00:00
|
|
|
# Expose EFI variables, it's useful even when we are not using a bootloader (!).
|
|
|
|
# We might be interested in having EFI variable storage present even if we aren't booting via UEFI, hence
|
|
|
|
# no guard against `useBootLoader`. Examples:
|
|
|
|
# - testing PXE boot or other EFI applications
|
|
|
|
# - directbooting LinuxBoot, which `kexec()s` into a UEFI environment that can boot e.g. Windows
|
2022-12-20 20:18:10 +00:00
|
|
|
NIX_EFI_VARS=$(readlink -f "''${NIX_EFI_VARS:-${config.system.name}-efi-vars.fd}")
|
2023-04-26 16:28:31 +00:00
|
|
|
# VM needs writable EFI vars
|
|
|
|
if ! test -e "$NIX_EFI_VARS"; then
|
|
|
|
${if cfg.useBootLoader then
|
|
|
|
# We still need the EFI var from the make-disk-image derivation
|
|
|
|
# because our "switch-to-configuration" process might
|
|
|
|
# write into it and we want to keep this data.
|
|
|
|
''cp ${systemImage}/efi-vars.fd "$NIX_EFI_VARS"''
|
|
|
|
else
|
|
|
|
''cp ${cfg.efi.variables} "$NIX_EFI_VARS"''
|
|
|
|
}
|
|
|
|
chmod 0644 "$NIX_EFI_VARS"
|
|
|
|
fi
|
2021-06-23 14:58:33 +00:00
|
|
|
''}
|
2015-01-26 20:13:31 +00:00
|
|
|
|
2021-09-29 06:45:52 +00:00
|
|
|
cd "$TMPDIR"
|
2021-06-23 14:45:04 +00:00
|
|
|
|
2021-06-23 14:58:33 +00:00
|
|
|
${lib.optionalString (cfg.emptyDiskImages != []) "idx=0"}
|
2013-09-04 11:05:09 +00:00
|
|
|
${flip concatMapStrings cfg.emptyDiskImages (size: ''
|
2015-03-05 14:21:57 +00:00
|
|
|
if ! test -e "empty$idx.qcow2"; then
|
2016-12-15 13:05:54 +00:00
|
|
|
${qemu}/bin/qemu-img create -f qcow2 "empty$idx.qcow2" "${toString size}M"
|
2015-03-05 14:21:57 +00:00
|
|
|
fi
|
2013-09-04 11:05:09 +00:00
|
|
|
idx=$((idx + 1))
|
|
|
|
'')}
|
|
|
|
|
|
|
|
# Start QEMU.
|
2021-06-23 15:46:46 +00:00
|
|
|
exec ${qemu-common.qemuBinary qemu} \
|
2020-04-20 21:53:31 +00:00
|
|
|
-name ${config.system.name} \
|
2013-09-04 11:05:09 +00:00
|
|
|
-m ${toString config.virtualisation.memorySize} \
|
2017-04-10 14:50:05 +00:00
|
|
|
-smp ${toString config.virtualisation.cores} \
|
2018-04-28 09:48:06 +00:00
|
|
|
-device virtio-rng-pci \
|
2014-12-19 10:59:00 +00:00
|
|
|
${concatStringsSep " " config.virtualisation.qemu.networkingOptions} \
|
2021-06-23 15:17:15 +00:00
|
|
|
${concatStringsSep " \\\n "
|
|
|
|
(mapAttrsToList
|
|
|
|
(tag: share: "-virtfs local,path=${share.source},security_model=none,mount_tag=${tag}")
|
|
|
|
config.virtualisation.sharedDirectories)} \
|
2019-02-12 15:38:23 +00:00
|
|
|
${drivesCmdLine config.virtualisation.qemu.drives} \
|
2021-06-23 14:58:33 +00:00
|
|
|
${concatStringsSep " \\\n " config.virtualisation.qemu.options} \
|
2015-01-26 20:13:31 +00:00
|
|
|
$QEMU_OPTS \
|
2018-03-18 02:28:48 +00:00
|
|
|
"$@"
|
2013-09-04 11:05:09 +00:00
|
|
|
'';
|
|
|
|
|
|
|
|
|
2021-10-06 17:19:29 +00:00
|
|
|
regInfo = pkgs.closureInfo { rootPaths = config.virtualisation.additionalPaths; };
|
2013-09-04 11:05:09 +00:00
|
|
|
|
2022-12-20 20:18:10 +00:00
|
|
|
# System image is akin to a complete NixOS install with
|
|
|
|
# a boot partition and root partition.
|
|
|
|
systemImage = import ../../lib/make-disk-image.nix {
|
|
|
|
inherit pkgs config lib;
|
|
|
|
additionalPaths = [ regInfo ];
|
|
|
|
format = "qcow2";
|
|
|
|
onlyNixStore = false;
|
|
|
|
partitionTableType = selectPartitionTableLayout { inherit (cfg) useDefaultFilesystems useEFIBoot; };
|
|
|
|
# Bootloader should be installed on the system image only if we are booting through bootloaders.
|
|
|
|
# Though, if a user is not using our default filesystems, it is possible to not have any ESP
|
|
|
|
# or a strange partition table that's incompatible with GRUB configuration.
|
|
|
|
# As a consequence, this may lead to disk image creation failures.
|
|
|
|
# To avoid this, we prefer to let the user find out about how to install the bootloader on its ESP/disk.
|
|
|
|
# Usually, this can be through building your own disk image.
|
|
|
|
# TODO: If a user is interested into a more fine grained heuristic for `installBootLoader`
|
|
|
|
# by examining the actual contents of `cfg.fileSystems`, please send a PR.
|
|
|
|
installBootLoader = cfg.useBootLoader && cfg.useDefaultFilesystems;
|
|
|
|
touchEFIVars = cfg.useEFIBoot;
|
|
|
|
diskSize = "auto";
|
|
|
|
additionalSpace = "0M";
|
|
|
|
copyChannel = false;
|
|
|
|
OVMF = cfg.efi.OVMF;
|
|
|
|
};
|
2013-09-04 11:05:09 +00:00
|
|
|
|
2021-10-05 20:32:56 +00:00
|
|
|
storeImage = import ../../lib/make-disk-image.nix {
|
|
|
|
inherit pkgs config lib;
|
|
|
|
additionalPaths = [ regInfo ];
|
|
|
|
format = "qcow2";
|
|
|
|
onlyNixStore = true;
|
|
|
|
partitionTableType = "none";
|
|
|
|
installBootLoader = false;
|
2022-12-20 20:18:10 +00:00
|
|
|
touchEFIVars = false;
|
2021-10-05 20:32:56 +00:00
|
|
|
diskSize = "auto";
|
|
|
|
additionalSpace = "0M";
|
|
|
|
copyChannel = false;
|
|
|
|
};
|
|
|
|
|
2022-12-20 20:18:10 +00:00
|
|
|
bootConfiguration =
|
|
|
|
if cfg.useDefaultFilesystems
|
|
|
|
then
|
|
|
|
if cfg.useBootLoader
|
|
|
|
then
|
|
|
|
if cfg.useEFIBoot then "efi_bootloading_with_default_fs"
|
|
|
|
else "legacy_bootloading_with_default_fs"
|
|
|
|
else
|
|
|
|
"direct_boot_with_default_fs"
|
|
|
|
else
|
|
|
|
"custom";
|
|
|
|
suggestedRootDevice = {
|
|
|
|
"efi_bootloading_with_default_fs" = "${cfg.bootLoaderDevice}2";
|
|
|
|
"legacy_bootloading_with_default_fs" = "${cfg.bootLoaderDevice}1";
|
2023-05-06 19:41:14 +00:00
|
|
|
"direct_boot_with_default_fs" = cfg.bootLoaderDevice;
|
2022-12-20 20:18:10 +00:00
|
|
|
# This will enforce a NixOS module type checking error
|
|
|
|
# to ask explicitly the user to set a rootDevice.
|
|
|
|
# As it will look like `rootDevice = lib.mkDefault null;` after
|
|
|
|
# all "computations".
|
|
|
|
"custom" = null;
|
|
|
|
}.${bootConfiguration};
|
2013-09-04 11:05:09 +00:00
|
|
|
in
|
|
|
|
|
|
|
|
{
|
2018-11-03 00:00:53 +00:00
|
|
|
imports = [
|
|
|
|
../profiles/qemu-guest.nix
|
2021-10-06 17:19:29 +00:00
|
|
|
(mkRenamedOptionModule [ "virtualisation" "pathsInNixDB" ] [ "virtualisation" "additionalPaths" ])
|
2022-12-20 20:18:10 +00:00
|
|
|
(mkRemovedOptionModule [ "virtualisation" "bootDevice" ] "This option was renamed to `virtualisation.rootDevice`, as it was incorrectly named and misleading. Take the time to review what you want to do and look at the new options like `virtualisation.{bootLoaderDevice, bootPartition}`, open an issue in case of issues.")
|
|
|
|
(mkRemovedOptionModule [ "virtualisation" "efiVars" ] "This option was removed, it is possible to provide a template UEFI variable with `virtualisation.efi.variables` ; if this option is important to you, open an issue")
|
2023-04-12 17:55:43 +00:00
|
|
|
(mkRemovedOptionModule [ "virtualisation" "persistBootDevice" ] "Boot device is always persisted if you use a bootloader through the root disk image ; if this does not work for your usecase, please examine carefully what `virtualisation.{bootDevice, rootDevice, bootPartition}` options offer you and open an issue explaining your need.`")
|
2018-11-03 00:00:53 +00:00
|
|
|
];
|
2013-09-04 11:05:09 +00:00
|
|
|
|
2009-06-19 15:19:56 +00:00
|
|
|
options = {
|
2011-09-14 18:20:50 +00:00
|
|
|
|
2021-02-11 10:02:45 +00:00
|
|
|
virtualisation.fileSystems = options.fileSystems;
|
|
|
|
|
2011-09-14 18:20:50 +00:00
|
|
|
virtualisation.memorySize =
|
2009-12-14 11:15:37 +00:00
|
|
|
mkOption {
|
2021-06-23 15:09:18 +00:00
|
|
|
type = types.ints.positive;
|
2021-11-20 21:26:46 +00:00
|
|
|
default = 1024;
|
2009-12-14 11:15:37 +00:00
|
|
|
description =
|
2022-08-05 17:39:00 +00:00
|
|
|
lib.mdDoc ''
|
2021-06-23 15:09:18 +00:00
|
|
|
The memory size in megabytes of the virtual machine.
|
2009-12-14 11:15:37 +00:00
|
|
|
'';
|
|
|
|
};
|
2011-09-14 18:20:50 +00:00
|
|
|
|
2021-01-31 12:40:48 +00:00
|
|
|
virtualisation.msize =
|
|
|
|
mkOption {
|
2021-06-23 14:55:53 +00:00
|
|
|
type = types.ints.positive;
|
2021-11-24 00:33:53 +00:00
|
|
|
default = 16384;
|
2021-01-31 12:40:48 +00:00
|
|
|
description =
|
2022-08-05 17:39:00 +00:00
|
|
|
lib.mdDoc ''
|
2021-06-23 14:55:53 +00:00
|
|
|
The msize (maximum packet size) option passed to 9p file systems, in
|
2021-01-31 12:40:48 +00:00
|
|
|
bytes. Increasing this should increase performance significantly,
|
|
|
|
at the cost of higher RAM usage.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2011-09-14 18:20:50 +00:00
|
|
|
virtualisation.diskSize =
|
2010-04-29 12:37:26 +00:00
|
|
|
mkOption {
|
2021-06-23 15:09:18 +00:00
|
|
|
type = types.nullOr types.ints.positive;
|
2021-11-05 20:06:08 +00:00
|
|
|
default = 1024;
|
2010-04-29 12:37:26 +00:00
|
|
|
description =
|
2022-08-05 17:39:00 +00:00
|
|
|
lib.mdDoc ''
|
2021-06-23 15:09:18 +00:00
|
|
|
The disk size in megabytes of the virtual machine.
|
2010-04-29 12:37:26 +00:00
|
|
|
'';
|
|
|
|
};
|
2011-09-14 18:20:50 +00:00
|
|
|
|
2009-06-19 15:19:56 +00:00
|
|
|
virtualisation.diskImage =
|
2009-11-06 21:38:40 +00:00
|
|
|
mkOption {
|
2022-12-19 11:04:13 +00:00
|
|
|
type = types.nullOr types.str;
|
2020-04-20 21:53:31 +00:00
|
|
|
default = "./${config.system.name}.qcow2";
|
2021-11-26 00:16:05 +00:00
|
|
|
defaultText = literalExpression ''"./''${config.system.name}.qcow2"'';
|
2009-06-19 15:19:56 +00:00
|
|
|
description =
|
2022-08-05 17:39:00 +00:00
|
|
|
lib.mdDoc ''
|
2009-06-19 15:19:56 +00:00
|
|
|
Path to the disk image containing the root filesystem.
|
|
|
|
The image will be created on startup if it does not
|
|
|
|
exist.
|
2022-12-19 11:04:13 +00:00
|
|
|
|
|
|
|
If null, a tmpfs will be used as the root filesystem and
|
|
|
|
the VM's state will not be persistent.
|
2009-06-19 15:19:56 +00:00
|
|
|
'';
|
|
|
|
};
|
2011-09-14 18:20:50 +00:00
|
|
|
|
2022-12-20 20:18:10 +00:00
|
|
|
virtualisation.bootLoaderDevice =
|
2015-06-10 11:14:40 +00:00
|
|
|
mkOption {
|
2023-05-06 19:41:14 +00:00
|
|
|
type = types.path;
|
|
|
|
default = lookupDriveDeviceName "root" cfg.qemu.drives;
|
|
|
|
defaultText = literalExpression ''lookupDriveDeviceName "root" cfg.qemu.drives'';
|
2015-06-17 13:40:46 +00:00
|
|
|
example = "/dev/vda";
|
2015-06-10 11:14:40 +00:00
|
|
|
description =
|
2022-08-05 17:39:00 +00:00
|
|
|
lib.mdDoc ''
|
2022-12-20 20:18:10 +00:00
|
|
|
The disk to be used for the boot filesystem.
|
2023-05-06 19:41:14 +00:00
|
|
|
By default, it is the same disk as the root filesystem.
|
2022-12-20 20:18:10 +00:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
virtualisation.bootPartition =
|
|
|
|
mkOption {
|
|
|
|
type = types.nullOr types.path;
|
|
|
|
default = if cfg.useEFIBoot then "${cfg.bootLoaderDevice}1" else null;
|
|
|
|
defaultText = literalExpression ''if cfg.useEFIBoot then "''${cfg.bootLoaderDevice}1" else null'';
|
|
|
|
example = "/dev/vda1";
|
|
|
|
description =
|
|
|
|
lib.mdDoc ''
|
|
|
|
The boot partition to be used to mount /boot filesystem.
|
|
|
|
In legacy boots, this should be null.
|
|
|
|
By default, in EFI boot, it is the first partition of the boot device.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
virtualisation.rootDevice =
|
|
|
|
mkOption {
|
|
|
|
type = types.nullOr types.path;
|
|
|
|
example = "/dev/vda2";
|
|
|
|
description =
|
|
|
|
lib.mdDoc ''
|
|
|
|
The disk or partition to be used for the root filesystem.
|
|
|
|
By default (read the source code for more details):
|
|
|
|
|
|
|
|
- under EFI with a bootloader: 2nd partition of the boot disk
|
|
|
|
- in legacy boot with a bootloader: 1st partition of the boot disk
|
|
|
|
- in direct boot (i.e. without a bootloader): whole disk
|
|
|
|
|
|
|
|
In case you are not using a default boot device or a default filesystem, you have to set explicitly your root device.
|
2015-06-10 11:14:40 +00:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2013-06-28 02:12:06 +00:00
|
|
|
virtualisation.emptyDiskImages =
|
|
|
|
mkOption {
|
2021-06-23 15:09:18 +00:00
|
|
|
type = types.listOf types.ints.positive;
|
2013-06-28 02:12:06 +00:00
|
|
|
default = [];
|
|
|
|
description =
|
2022-08-05 17:39:00 +00:00
|
|
|
lib.mdDoc ''
|
2015-06-10 11:14:40 +00:00
|
|
|
Additional disk images to provide to the VM. The value is
|
|
|
|
a list of size in megabytes of each disk. These disks are
|
|
|
|
writeable by the VM.
|
2013-06-28 02:12:06 +00:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2009-12-15 18:49:34 +00:00
|
|
|
virtualisation.graphics =
|
|
|
|
mkOption {
|
2021-06-23 15:09:18 +00:00
|
|
|
type = types.bool;
|
2009-12-15 18:49:34 +00:00
|
|
|
default = true;
|
|
|
|
description =
|
2022-08-05 17:39:00 +00:00
|
|
|
lib.mdDoc ''
|
2018-05-05 11:51:04 +00:00
|
|
|
Whether to run QEMU with a graphics window, or in nographic mode.
|
|
|
|
Serial console will be enabled on both settings, but this will
|
|
|
|
change the preferred console.
|
|
|
|
'';
|
2009-12-15 18:49:34 +00:00
|
|
|
};
|
2009-06-19 15:19:56 +00:00
|
|
|
|
2021-06-23 15:18:21 +00:00
|
|
|
virtualisation.resolution =
|
|
|
|
mkOption {
|
|
|
|
type = options.services.xserver.resolutions.type.nestedTypes.elemType;
|
|
|
|
default = { x = 1024; y = 768; };
|
|
|
|
description =
|
2022-08-05 17:39:00 +00:00
|
|
|
lib.mdDoc ''
|
2021-06-23 15:18:21 +00:00
|
|
|
The resolution of the virtual machine display.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2017-04-10 14:50:05 +00:00
|
|
|
virtualisation.cores =
|
|
|
|
mkOption {
|
2021-06-23 15:09:18 +00:00
|
|
|
type = types.ints.positive;
|
2017-04-10 14:50:05 +00:00
|
|
|
default = 1;
|
|
|
|
description =
|
2022-08-05 17:39:00 +00:00
|
|
|
lib.mdDoc ''
|
2017-04-10 14:50:05 +00:00
|
|
|
Specify the number of cores the guest is permitted to use.
|
|
|
|
The number can be higher than the available cores on the
|
|
|
|
host system.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2021-06-23 15:17:15 +00:00
|
|
|
virtualisation.sharedDirectories =
|
|
|
|
mkOption {
|
|
|
|
type = types.attrsOf
|
|
|
|
(types.submodule {
|
|
|
|
options.source = mkOption {
|
|
|
|
type = types.str;
|
2022-08-05 17:39:00 +00:00
|
|
|
description = lib.mdDoc "The path of the directory to share, can be a shell variable";
|
2021-06-23 15:17:15 +00:00
|
|
|
};
|
|
|
|
options.target = mkOption {
|
|
|
|
type = types.path;
|
2022-08-05 17:39:00 +00:00
|
|
|
description = lib.mdDoc "The mount point of the directory inside the virtual machine";
|
2021-06-23 15:17:15 +00:00
|
|
|
};
|
|
|
|
});
|
|
|
|
default = { };
|
|
|
|
example = {
|
|
|
|
my-share = { source = "/path/to/be/shared"; target = "/mnt/shared"; };
|
|
|
|
};
|
|
|
|
description =
|
2022-08-05 17:39:00 +00:00
|
|
|
lib.mdDoc ''
|
2021-06-23 15:17:15 +00:00
|
|
|
An attributes set of directories that will be shared with the
|
|
|
|
virtual machine using VirtFS (9P filesystem over VirtIO).
|
|
|
|
The attribute name will be used as the 9P mount tag.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2021-10-06 17:19:29 +00:00
|
|
|
virtualisation.additionalPaths =
|
2010-01-10 01:20:30 +00:00
|
|
|
mkOption {
|
2021-06-23 15:09:18 +00:00
|
|
|
type = types.listOf types.path;
|
2010-01-10 01:20:30 +00:00
|
|
|
default = [];
|
|
|
|
description =
|
2022-08-05 17:39:00 +00:00
|
|
|
lib.mdDoc ''
|
2021-10-06 17:19:29 +00:00
|
|
|
A list of paths whose closure should be made available to
|
|
|
|
the VM.
|
|
|
|
|
|
|
|
When 9p is used, the closure is registered in the Nix
|
|
|
|
database in the VM. All other paths in the host Nix store
|
2010-01-10 01:20:30 +00:00
|
|
|
appear in the guest Nix store as well, but are considered
|
|
|
|
garbage (because they are not registered in the Nix
|
2021-10-06 17:19:29 +00:00
|
|
|
database of the guest).
|
|
|
|
|
2022-08-05 17:39:00 +00:00
|
|
|
When {option}`virtualisation.useNixStoreImage` is
|
2021-10-06 17:19:29 +00:00
|
|
|
set, the closure is copied to the Nix store image.
|
2010-01-10 01:20:30 +00:00
|
|
|
'';
|
|
|
|
};
|
2010-05-20 21:07:32 +00:00
|
|
|
|
2021-06-23 15:24:29 +00:00
|
|
|
virtualisation.forwardPorts = mkOption {
|
|
|
|
type = types.listOf
|
|
|
|
(types.submodule {
|
|
|
|
options.from = mkOption {
|
|
|
|
type = types.enum [ "host" "guest" ];
|
|
|
|
default = "host";
|
|
|
|
description =
|
2022-08-29 19:48:56 +00:00
|
|
|
lib.mdDoc ''
|
2021-06-23 15:24:29 +00:00
|
|
|
Controls the direction in which the ports are mapped:
|
|
|
|
|
2022-08-29 19:48:56 +00:00
|
|
|
- `"host"` means traffic from the host ports
|
|
|
|
is forwarded to the given guest port.
|
|
|
|
- `"guest"` means traffic from the guest ports
|
|
|
|
is forwarded to the given host port.
|
2021-06-23 15:24:29 +00:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
options.proto = mkOption {
|
|
|
|
type = types.enum [ "tcp" "udp" ];
|
|
|
|
default = "tcp";
|
2022-08-05 17:39:00 +00:00
|
|
|
description = lib.mdDoc "The protocol to forward.";
|
2021-06-23 15:24:29 +00:00
|
|
|
};
|
|
|
|
options.host.address = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
default = "";
|
2022-08-05 17:39:00 +00:00
|
|
|
description = lib.mdDoc "The IPv4 address of the host.";
|
2021-06-23 15:24:29 +00:00
|
|
|
};
|
|
|
|
options.host.port = mkOption {
|
|
|
|
type = types.port;
|
2022-08-05 17:39:00 +00:00
|
|
|
description = lib.mdDoc "The host port to be mapped.";
|
2021-06-23 15:24:29 +00:00
|
|
|
};
|
|
|
|
options.guest.address = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
default = "";
|
2022-08-05 17:39:00 +00:00
|
|
|
description = lib.mdDoc "The IPv4 address on the guest VLAN.";
|
2021-06-23 15:24:29 +00:00
|
|
|
};
|
|
|
|
options.guest.port = mkOption {
|
|
|
|
type = types.port;
|
2022-08-05 17:39:00 +00:00
|
|
|
description = lib.mdDoc "The guest port to be mapped.";
|
2021-06-23 15:24:29 +00:00
|
|
|
};
|
|
|
|
});
|
|
|
|
default = [];
|
2021-10-03 16:06:03 +00:00
|
|
|
example = lib.literalExpression
|
2021-06-23 15:24:29 +00:00
|
|
|
''
|
|
|
|
[ # forward local port 2222 -> 22, to ssh into the VM
|
|
|
|
{ from = "host"; host.port = 2222; guest.port = 22; }
|
|
|
|
|
|
|
|
# forward local port 80 -> 10.0.2.10:80 in the VLAN
|
|
|
|
{ from = "guest";
|
|
|
|
guest.address = "10.0.2.10"; guest.port = 80;
|
|
|
|
host.address = "127.0.0.1"; host.port = 80;
|
|
|
|
}
|
|
|
|
]
|
|
|
|
'';
|
|
|
|
description =
|
2022-08-30 00:30:04 +00:00
|
|
|
lib.mdDoc ''
|
2021-06-23 15:24:29 +00:00
|
|
|
When using the SLiRP user networking (default), this option allows to
|
|
|
|
forward ports to/from the host/guest.
|
|
|
|
|
2022-08-30 00:30:04 +00:00
|
|
|
::: {.warning}
|
|
|
|
If the NixOS firewall on the virtual machine is enabled, you also
|
|
|
|
have to open the guest ports to enable the traffic between host and
|
|
|
|
guest.
|
|
|
|
:::
|
2021-06-23 15:24:29 +00:00
|
|
|
|
2022-08-30 00:30:04 +00:00
|
|
|
::: {.note}
|
|
|
|
Currently QEMU supports only IPv4 forwarding.
|
|
|
|
:::
|
2021-06-23 15:24:29 +00:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2022-11-08 16:50:47 +00:00
|
|
|
virtualisation.restrictNetwork =
|
|
|
|
mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
default = false;
|
|
|
|
example = true;
|
|
|
|
description =
|
|
|
|
lib.mdDoc ''
|
|
|
|
If this option is enabled, the guest will be isolated, i.e. it will
|
|
|
|
not be able to contact the host and no guest IP packets will be
|
|
|
|
routed over the host to the outside. This option does not affect
|
|
|
|
any explicitly set forwarding rules.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2011-09-14 18:20:50 +00:00
|
|
|
virtualisation.vlans =
|
2010-05-20 21:07:32 +00:00
|
|
|
mkOption {
|
2021-06-23 15:09:18 +00:00
|
|
|
type = types.listOf types.ints.unsigned;
|
2023-05-22 03:38:52 +00:00
|
|
|
default = if config.virtualisation.interfaces == {} then [ 1 ] else [ ];
|
|
|
|
defaultText = lib.literalExpression ''if config.virtualisation.interfaces == {} then [ 1 ] else [ ]'';
|
2010-05-20 21:07:32 +00:00
|
|
|
example = [ 1 2 ];
|
|
|
|
description =
|
2022-08-05 17:39:00 +00:00
|
|
|
lib.mdDoc ''
|
2010-05-20 21:07:32 +00:00
|
|
|
Virtual networks to which the VM is connected. Each
|
2022-08-02 23:57:59 +00:00
|
|
|
number «N» in this list causes
|
2010-05-20 21:07:32 +00:00
|
|
|
the VM to have a virtual Ethernet interface attached to a
|
|
|
|
separate virtual network on which it will be assigned IP
|
|
|
|
address
|
2022-08-05 17:39:00 +00:00
|
|
|
`192.168.«N».«M»`,
|
2022-08-02 23:57:59 +00:00
|
|
|
where «M» is the index of this VM
|
2010-05-20 21:07:32 +00:00
|
|
|
in the list of VMs.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2023-05-22 03:38:52 +00:00
|
|
|
virtualisation.interfaces = mkOption {
|
|
|
|
default = {};
|
|
|
|
example = {
|
|
|
|
enp1s0.vlan = 1;
|
|
|
|
};
|
|
|
|
description = lib.mdDoc ''
|
|
|
|
Network interfaces to add to the VM.
|
|
|
|
'';
|
|
|
|
type = with types; attrsOf (submodule {
|
|
|
|
options = {
|
|
|
|
vlan = mkOption {
|
|
|
|
type = types.ints.unsigned;
|
|
|
|
description = lib.mdDoc ''
|
|
|
|
VLAN to which the network interface is connected.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
assignIP = mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
default = false;
|
|
|
|
description = lib.mdDoc ''
|
|
|
|
Automatically assign an IP address to the network interface using the same scheme as
|
|
|
|
virtualisation.vlans.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
};
|
|
|
|
});
|
|
|
|
};
|
|
|
|
|
2011-09-14 18:20:50 +00:00
|
|
|
virtualisation.writableStore =
|
2010-08-24 12:59:16 +00:00
|
|
|
mkOption {
|
2021-06-23 15:09:18 +00:00
|
|
|
type = types.bool;
|
2023-04-23 21:28:54 +00:00
|
|
|
default = cfg.mountHostNixStore;
|
|
|
|
defaultText = literalExpression "cfg.mountHostNixStore";
|
2010-08-24 12:59:16 +00:00
|
|
|
description =
|
2022-08-05 17:39:00 +00:00
|
|
|
lib.mdDoc ''
|
2010-08-24 12:59:16 +00:00
|
|
|
If enabled, the Nix store in the VM is made writable by
|
2016-12-21 19:49:08 +00:00
|
|
|
layering an overlay filesystem on top of the host's Nix
|
2010-08-24 12:59:16 +00:00
|
|
|
store.
|
2023-04-23 21:28:54 +00:00
|
|
|
|
|
|
|
By default, this is enabled if you mount a host Nix store.
|
2010-08-24 12:59:16 +00:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2013-08-01 00:10:13 +00:00
|
|
|
virtualisation.writableStoreUseTmpfs =
|
|
|
|
mkOption {
|
2021-06-23 15:09:18 +00:00
|
|
|
type = types.bool;
|
2013-08-01 00:10:13 +00:00
|
|
|
default = true;
|
|
|
|
description =
|
2022-08-05 17:39:00 +00:00
|
|
|
lib.mdDoc ''
|
2013-08-01 00:10:13 +00:00
|
|
|
Use a tmpfs for the writable store instead of writing to the VM's
|
|
|
|
own filesystem.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2010-05-20 21:07:32 +00:00
|
|
|
networking.primaryIPAddress =
|
|
|
|
mkOption {
|
2021-06-23 15:09:18 +00:00
|
|
|
type = types.str;
|
2010-05-20 21:07:32 +00:00
|
|
|
default = "";
|
|
|
|
internal = true;
|
2022-08-28 23:38:36 +00:00
|
|
|
description = lib.mdDoc "Primary IP address used in /etc/hosts.";
|
2010-05-20 21:07:32 +00:00
|
|
|
};
|
|
|
|
|
2021-01-10 00:22:05 +00:00
|
|
|
virtualisation.host.pkgs = mkOption {
|
|
|
|
type = options.nixpkgs.pkgs.type;
|
|
|
|
default = pkgs;
|
2022-11-03 14:52:19 +00:00
|
|
|
defaultText = literalExpression "pkgs";
|
2021-01-10 00:22:05 +00:00
|
|
|
example = literalExpression ''
|
|
|
|
import pkgs.path { system = "x86_64-darwin"; }
|
|
|
|
'';
|
2022-09-01 17:44:36 +00:00
|
|
|
description = lib.mdDoc ''
|
2021-01-10 00:22:05 +00:00
|
|
|
pkgs set to use for the host-specific packages of the vm runner.
|
|
|
|
Changing this to e.g. a Darwin package set allows running NixOS VMs on Darwin.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2014-12-19 10:59:00 +00:00
|
|
|
virtualisation.qemu = {
|
2020-10-21 11:02:09 +00:00
|
|
|
package =
|
|
|
|
mkOption {
|
|
|
|
type = types.package;
|
2021-01-10 00:22:05 +00:00
|
|
|
default = cfg.host.pkgs.qemu_kvm;
|
2022-11-03 14:52:19 +00:00
|
|
|
defaultText = literalExpression "config.virtualisation.host.pkgs.qemu_kvm";
|
|
|
|
example = literalExpression "pkgs.qemu_test";
|
2022-08-05 17:39:00 +00:00
|
|
|
description = lib.mdDoc "QEMU package to use.";
|
2020-10-21 11:02:09 +00:00
|
|
|
};
|
|
|
|
|
2014-12-19 10:59:00 +00:00
|
|
|
options =
|
|
|
|
mkOption {
|
2021-06-23 15:09:18 +00:00
|
|
|
type = types.listOf types.str;
|
2014-12-19 10:59:00 +00:00
|
|
|
default = [];
|
|
|
|
example = [ "-vga std" ];
|
2022-08-05 17:39:00 +00:00
|
|
|
description = lib.mdDoc "Options passed to QEMU.";
|
2014-12-19 10:59:00 +00:00
|
|
|
};
|
|
|
|
|
2018-05-10 06:10:19 +00:00
|
|
|
consoles = mkOption {
|
|
|
|
type = types.listOf types.str;
|
|
|
|
default = let
|
2021-06-23 15:46:46 +00:00
|
|
|
consoles = [ "${qemu-common.qemuSerialDevice},115200n8" "tty0" ];
|
2018-05-10 06:10:19 +00:00
|
|
|
in if cfg.graphics then consoles else reverseList consoles;
|
|
|
|
example = [ "console=tty1" ];
|
2022-08-05 17:39:00 +00:00
|
|
|
description = lib.mdDoc ''
|
2018-05-10 06:10:19 +00:00
|
|
|
The output console devices to pass to the kernel command line via the
|
2022-08-05 17:39:00 +00:00
|
|
|
`console` parameter, the primary console is the last
|
2018-05-10 06:10:19 +00:00
|
|
|
item of this list.
|
|
|
|
|
|
|
|
By default it enables both serial console and
|
2022-08-05 17:39:00 +00:00
|
|
|
`tty0`. The preferred console (last one) is based on
|
|
|
|
the value of {option}`virtualisation.graphics`.
|
2018-05-10 06:10:19 +00:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2014-12-19 10:59:00 +00:00
|
|
|
networkingOptions =
|
|
|
|
mkOption {
|
2021-06-23 15:24:29 +00:00
|
|
|
type = types.listOf types.str;
|
|
|
|
default = [ ];
|
|
|
|
example = [
|
2018-03-12 08:27:43 +00:00
|
|
|
"-net nic,netdev=user.0,model=virtio"
|
2021-06-23 15:24:29 +00:00
|
|
|
"-netdev user,id=user.0,\${QEMU_NET_OPTS:+,$QEMU_NET_OPTS}"
|
2014-12-19 10:59:00 +00:00
|
|
|
];
|
2022-08-05 17:39:00 +00:00
|
|
|
description = lib.mdDoc ''
|
2014-12-19 10:59:00 +00:00
|
|
|
Networking-related command-line options that should be passed to qemu.
|
2021-06-23 14:58:33 +00:00
|
|
|
The default is to use userspace networking (SLiRP).
|
2014-12-19 10:59:00 +00:00
|
|
|
|
2014-12-30 02:31:03 +00:00
|
|
|
If you override this option, be advised to keep
|
2021-06-23 15:24:29 +00:00
|
|
|
''${QEMU_NET_OPTS:+,$QEMU_NET_OPTS} (as seen in the example)
|
2014-12-19 10:59:00 +00:00
|
|
|
to keep the default runtime behaviour.
|
|
|
|
'';
|
|
|
|
};
|
2015-06-17 13:40:46 +00:00
|
|
|
|
2019-02-12 15:38:23 +00:00
|
|
|
drives =
|
|
|
|
mkOption {
|
|
|
|
type = types.listOf (types.submodule driveOpts);
|
2022-08-05 17:39:00 +00:00
|
|
|
description = lib.mdDoc "Drives passed to qemu.";
|
2020-01-28 23:08:56 +00:00
|
|
|
apply = addDeviceNames;
|
2019-02-12 15:38:23 +00:00
|
|
|
};
|
|
|
|
|
2015-06-17 13:40:46 +00:00
|
|
|
diskInterface =
|
|
|
|
mkOption {
|
2021-06-23 15:09:18 +00:00
|
|
|
type = types.enum [ "virtio" "scsi" "ide" ];
|
2015-06-17 13:40:46 +00:00
|
|
|
default = "virtio";
|
|
|
|
example = "scsi";
|
2022-08-05 17:39:00 +00:00
|
|
|
description = lib.mdDoc "The interface used for the virtual hard disks.";
|
2015-06-17 13:40:46 +00:00
|
|
|
};
|
2018-04-18 02:29:54 +00:00
|
|
|
|
|
|
|
guestAgent.enable =
|
|
|
|
mkOption {
|
|
|
|
type = types.bool;
|
2021-06-23 15:09:18 +00:00
|
|
|
default = true;
|
2022-08-05 17:39:00 +00:00
|
|
|
description = lib.mdDoc ''
|
2018-04-18 02:29:54 +00:00
|
|
|
Enable the Qemu guest agent.
|
|
|
|
'';
|
|
|
|
};
|
2022-02-06 06:55:49 +00:00
|
|
|
|
|
|
|
virtioKeyboard =
|
|
|
|
mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
default = true;
|
2022-08-05 17:39:00 +00:00
|
|
|
description = lib.mdDoc ''
|
2022-02-06 06:55:49 +00:00
|
|
|
Enable the virtio-keyboard device.
|
|
|
|
'';
|
|
|
|
};
|
2014-12-19 10:59:00 +00:00
|
|
|
};
|
2010-09-13 12:34:58 +00:00
|
|
|
|
2021-10-05 20:32:56 +00:00
|
|
|
virtualisation.useNixStoreImage =
|
|
|
|
mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
default = false;
|
2022-08-05 17:39:00 +00:00
|
|
|
description = lib.mdDoc ''
|
2021-10-05 20:32:56 +00:00
|
|
|
Build and use a disk image for the Nix store, instead of
|
|
|
|
accessing the host's one through 9p.
|
|
|
|
|
|
|
|
For applications which do a lot of reads from the store,
|
|
|
|
this can drastically improve performance, but at the cost of
|
|
|
|
disk space and image build time.
|
2023-04-23 21:28:54 +00:00
|
|
|
|
|
|
|
As an alternative, you can use a bootloader which will provide you
|
|
|
|
with a full NixOS system image containing a Nix store and
|
|
|
|
avoid mounting the host nix store through
|
|
|
|
{option}`virtualisation.mountHostNixStore`.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
virtualisation.mountHostNixStore =
|
|
|
|
mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
default = !cfg.useNixStoreImage && !cfg.useBootLoader;
|
|
|
|
defaultText = literalExpression "!cfg.useNixStoreImage && !cfg.useBootLoader";
|
|
|
|
description = lib.mdDoc ''
|
|
|
|
Mount the host Nix store as a 9p mount.
|
2021-10-05 20:32:56 +00:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2010-09-13 12:34:58 +00:00
|
|
|
virtualisation.useBootLoader =
|
|
|
|
mkOption {
|
2021-06-23 15:09:18 +00:00
|
|
|
type = types.bool;
|
2010-09-13 13:43:53 +00:00
|
|
|
default = false;
|
2010-09-13 12:34:58 +00:00
|
|
|
description =
|
2022-08-05 17:39:00 +00:00
|
|
|
lib.mdDoc ''
|
2010-09-13 12:34:58 +00:00
|
|
|
If enabled, the virtual machine will be booted using the
|
|
|
|
regular boot loader (i.e., GRUB 1 or 2). This allows
|
2010-09-13 13:43:53 +00:00
|
|
|
testing of the boot loader. If
|
2010-09-13 12:34:58 +00:00
|
|
|
disabled (the default), the VM directly boots the NixOS
|
|
|
|
kernel and initial ramdisk, bypassing the boot loader
|
|
|
|
altogether.
|
|
|
|
'';
|
|
|
|
};
|
2011-09-14 18:20:50 +00:00
|
|
|
|
2015-01-26 20:13:31 +00:00
|
|
|
virtualisation.useEFIBoot =
|
|
|
|
mkOption {
|
2021-06-23 15:09:18 +00:00
|
|
|
type = types.bool;
|
2015-01-26 20:13:31 +00:00
|
|
|
default = false;
|
|
|
|
description =
|
2022-08-05 17:39:00 +00:00
|
|
|
lib.mdDoc ''
|
2015-01-26 20:13:31 +00:00
|
|
|
If enabled, the virtual machine will provide a EFI boot
|
|
|
|
manager.
|
|
|
|
useEFIBoot is ignored if useBootLoader == false.
|
|
|
|
'';
|
2022-08-22 14:15:40 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
virtualisation.efi = {
|
2022-12-20 20:18:10 +00:00
|
|
|
OVMF = mkOption {
|
|
|
|
type = types.package;
|
|
|
|
default = (pkgs.OVMF.override {
|
|
|
|
secureBoot = cfg.useSecureBoot;
|
|
|
|
}).fd;
|
|
|
|
defaultText = ''(pkgs.OVMF.override {
|
|
|
|
secureBoot = cfg.useSecureBoot;
|
|
|
|
}).fd'';
|
|
|
|
description =
|
|
|
|
lib.mdDoc "OVMF firmware package, defaults to OVMF configured with secure boot if needed.";
|
|
|
|
};
|
|
|
|
|
2022-08-22 14:15:40 +00:00
|
|
|
firmware = mkOption {
|
|
|
|
type = types.path;
|
2022-12-20 20:18:10 +00:00
|
|
|
default = cfg.efi.OVMF.firmware;
|
|
|
|
defaultText = literalExpression "cfg.efi.OVMF.firmware";
|
2022-08-22 14:15:40 +00:00
|
|
|
description =
|
|
|
|
lib.mdDoc ''
|
|
|
|
Firmware binary for EFI implementation, defaults to OVMF.
|
|
|
|
'';
|
2015-01-26 20:13:31 +00:00
|
|
|
};
|
|
|
|
|
2022-08-22 14:15:40 +00:00
|
|
|
variables = mkOption {
|
|
|
|
type = types.path;
|
2022-12-20 20:18:10 +00:00
|
|
|
default = cfg.efi.OVMF.variables;
|
|
|
|
defaultText = literalExpression "cfg.efi.OVMF.variables";
|
2022-08-22 14:15:40 +00:00
|
|
|
description =
|
|
|
|
lib.mdDoc ''
|
|
|
|
Platform-specific flash binary for EFI variables, implementation-dependent to the EFI firmware.
|
|
|
|
Defaults to OVMF.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2022-06-22 02:03:43 +00:00
|
|
|
virtualisation.useDefaultFilesystems =
|
|
|
|
mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
default = true;
|
|
|
|
description =
|
2022-08-05 17:39:00 +00:00
|
|
|
lib.mdDoc ''
|
2022-06-22 02:03:43 +00:00
|
|
|
If enabled, the boot disk of the virtual machine will be
|
|
|
|
formatted and mounted with the default filesystems for
|
|
|
|
testing. Swap devices and LUKS will be disabled.
|
|
|
|
|
|
|
|
If disabled, a root filesystem has to be specified and
|
|
|
|
formatted (for example in the initial ramdisk).
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2022-12-20 20:18:10 +00:00
|
|
|
virtualisation.useSecureBoot =
|
2020-06-14 14:20:21 +00:00
|
|
|
mkOption {
|
2022-12-20 20:18:10 +00:00
|
|
|
type = types.bool;
|
|
|
|
default = false;
|
2020-06-14 14:20:21 +00:00
|
|
|
description =
|
2022-08-05 17:39:00 +00:00
|
|
|
lib.mdDoc ''
|
2022-12-20 20:18:10 +00:00
|
|
|
Enable Secure Boot support in the EFI firmware.
|
2020-06-14 14:20:21 +00:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2022-12-20 20:18:10 +00:00
|
|
|
|
2020-05-22 03:15:32 +00:00
|
|
|
virtualisation.bios =
|
|
|
|
mkOption {
|
|
|
|
type = types.nullOr types.package;
|
2021-06-23 15:09:18 +00:00
|
|
|
default = null;
|
2020-05-22 03:15:32 +00:00
|
|
|
description =
|
2022-08-15 05:16:25 +00:00
|
|
|
lib.mdDoc ''
|
|
|
|
An alternate BIOS (such as `qboot`) with which to start the VM.
|
|
|
|
Should contain a file named `bios.bin`.
|
|
|
|
If `null`, QEMU's builtin SeaBIOS will be used.
|
2020-05-22 03:15:32 +00:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2009-06-19 15:19:56 +00:00
|
|
|
};
|
|
|
|
|
2013-09-04 11:05:09 +00:00
|
|
|
config = {
|
|
|
|
|
2021-06-23 15:24:29 +00:00
|
|
|
assertions =
|
|
|
|
lib.concatLists (lib.flip lib.imap cfg.forwardPorts (i: rule:
|
|
|
|
[
|
|
|
|
{ assertion = rule.from == "guest" -> rule.proto == "tcp";
|
|
|
|
message =
|
|
|
|
''
|
|
|
|
Invalid virtualisation.forwardPorts.<entry ${toString i}>.proto:
|
|
|
|
Guest forwarding supports only TCP connections.
|
|
|
|
'';
|
|
|
|
}
|
|
|
|
{ assertion = rule.from == "guest" -> lib.hasPrefix "10.0.2." rule.guest.address;
|
|
|
|
message =
|
|
|
|
''
|
|
|
|
Invalid virtualisation.forwardPorts.<entry ${toString i}>.guest.address:
|
|
|
|
The address must be in the default VLAN (10.0.2.0/24).
|
|
|
|
'';
|
|
|
|
}
|
2023-05-26 17:43:58 +00:00
|
|
|
])) ++ [
|
|
|
|
{ assertion = pkgs.stdenv.hostPlatform.is32bit && cfg.memorySize < 2047;
|
|
|
|
message = ''
|
|
|
|
virtualisation.memorySize is above 2047, but qemu is only able to allocate 2047MB RAM on 32bit max.
|
|
|
|
'';
|
|
|
|
}
|
|
|
|
];
|
2021-06-23 15:24:29 +00:00
|
|
|
|
2022-07-16 17:02:49 +00:00
|
|
|
warnings =
|
|
|
|
optional (
|
|
|
|
cfg.writableStore &&
|
|
|
|
cfg.useNixStoreImage &&
|
2022-12-02 12:39:47 +00:00
|
|
|
opt.writableStore.highestPrio > lib.modules.defaultOverridePriority)
|
2022-07-16 17:02:49 +00:00
|
|
|
''
|
|
|
|
You have enabled ${opt.useNixStoreImage} = true,
|
|
|
|
without setting ${opt.writableStore} = false.
|
|
|
|
|
|
|
|
This causes a store image to be written to the store, which is
|
|
|
|
costly, especially for the binary cache, and because of the need
|
|
|
|
for more frequent garbage collection.
|
|
|
|
|
|
|
|
If you really need this combination, you can set ${opt.writableStore}
|
2022-08-14 10:48:43 +00:00
|
|
|
explicitly to true, incur the cost and make this warning go away.
|
2022-07-16 17:02:49 +00:00
|
|
|
Otherwise, we recommend
|
|
|
|
|
|
|
|
${opt.writableStore} = false;
|
|
|
|
'';
|
|
|
|
|
2022-12-20 20:18:10 +00:00
|
|
|
# In UEFI boot, we use a EFI-only partition table layout, thus GRUB will fail when trying to install
|
|
|
|
# legacy and UEFI. In order to avoid this, we have to put "nodev" to force UEFI-only installs.
|
|
|
|
# Otherwise, we set the proper bootloader device for this.
|
|
|
|
# FIXME: make a sense of this mess wrt to multiple ESP present in the system, probably use boot.efiSysMountpoint?
|
2023-05-06 19:41:14 +00:00
|
|
|
boot.loader.grub.device = mkVMOverride (if cfg.useEFIBoot then "nodev" else cfg.bootLoaderDevice);
|
2021-06-23 15:18:21 +00:00
|
|
|
boot.loader.grub.gfxmodeBios = with cfg.resolution; "${toString x}x${toString y}";
|
2022-12-20 20:18:10 +00:00
|
|
|
virtualisation.rootDevice = mkDefault suggestedRootDevice;
|
2013-09-04 11:05:09 +00:00
|
|
|
|
2022-07-16 16:20:16 +00:00
|
|
|
boot.initrd.kernelModules = optionals (cfg.useNixStoreImage && !cfg.writableStore) [ "erofs" ];
|
|
|
|
|
2022-08-08 23:09:37 +00:00
|
|
|
boot.loader.supportsInitrdSecrets = mkIf (!cfg.useBootLoader) (mkVMOverride false);
|
|
|
|
|
2023-05-06 19:41:14 +00:00
|
|
|
boot.initrd.extraUtilsCommands = lib.mkIf (cfg.useDefaultFilesystems && !config.boot.initrd.systemd.enable)
|
2013-09-04 11:05:09 +00:00
|
|
|
''
|
|
|
|
# We need mke2fs in the initrd.
|
2016-08-14 09:57:45 +00:00
|
|
|
copy_bin_and_libs ${pkgs.e2fsprogs}/bin/mke2fs
|
2013-09-04 11:05:09 +00:00
|
|
|
'';
|
|
|
|
|
2023-05-06 19:41:14 +00:00
|
|
|
boot.initrd.postDeviceCommands = lib.mkIf (cfg.useDefaultFilesystems && !config.boot.initrd.systemd.enable)
|
2013-09-04 11:05:09 +00:00
|
|
|
''
|
|
|
|
# If the disk image appears to be empty, run mke2fs to
|
|
|
|
# initialise.
|
2022-12-20 20:18:10 +00:00
|
|
|
FSTYPE=$(blkid -o value -s TYPE ${cfg.rootDevice} || true)
|
|
|
|
PARTTYPE=$(blkid -o value -s PTTYPE ${cfg.rootDevice} || true)
|
2022-09-06 00:10:59 +00:00
|
|
|
if test -z "$FSTYPE" -a -z "$PARTTYPE"; then
|
2022-12-20 20:18:10 +00:00
|
|
|
mke2fs -t ext4 ${cfg.rootDevice}
|
2013-09-04 11:05:09 +00:00
|
|
|
fi
|
|
|
|
'';
|
|
|
|
|
2022-04-30 17:17:57 +00:00
|
|
|
boot.initrd.postMountCommands = lib.mkIf (!config.boot.initrd.systemd.enable)
|
2013-09-04 11:05:09 +00:00
|
|
|
''
|
2013-10-16 09:36:09 +00:00
|
|
|
# Mark this as a NixOS machine.
|
2013-09-04 11:05:09 +00:00
|
|
|
mkdir -p $targetRoot/etc
|
|
|
|
echo -n > $targetRoot/etc/NIXOS
|
|
|
|
|
|
|
|
# Fix the permissions on /tmp.
|
|
|
|
chmod 1777 $targetRoot/tmp
|
|
|
|
|
|
|
|
mkdir -p $targetRoot/boot
|
2016-12-21 19:49:08 +00:00
|
|
|
|
|
|
|
${optionalString cfg.writableStore ''
|
|
|
|
echo "mounting overlay filesystem on /nix/store..."
|
2023-02-23 18:01:53 +00:00
|
|
|
mkdir -p -m 0755 $targetRoot/nix/.rw-store/store $targetRoot/nix/.rw-store/work $targetRoot/nix/store
|
2016-12-21 19:49:08 +00:00
|
|
|
mount -t overlay overlay $targetRoot/nix/store \
|
|
|
|
-o lowerdir=$targetRoot/nix/.ro-store,upperdir=$targetRoot/nix/.rw-store/store,workdir=$targetRoot/nix/.rw-store/work || fail
|
|
|
|
''}
|
2013-09-04 11:05:09 +00:00
|
|
|
'';
|
|
|
|
|
2022-04-30 17:17:57 +00:00
|
|
|
systemd.tmpfiles.rules = lib.mkIf config.boot.initrd.systemd.enable [
|
|
|
|
"f /etc/NIXOS 0644 root root -"
|
|
|
|
"d /boot 0644 root root -"
|
|
|
|
];
|
|
|
|
|
2013-09-04 11:05:09 +00:00
|
|
|
# After booting, register the closure of the paths in
|
2021-10-06 17:19:29 +00:00
|
|
|
# `virtualisation.additionalPaths' in the Nix database in the VM. This
|
2013-09-04 11:05:09 +00:00
|
|
|
# allows Nix operations to work in the VM. The path to the
|
|
|
|
# registration file is passed through the kernel command line to
|
|
|
|
# allow `system.build.toplevel' to be included. (If we had a direct
|
|
|
|
# reference to ${regInfo} here, then we would get a cyclic
|
|
|
|
# dependency.)
|
2022-03-21 21:28:37 +00:00
|
|
|
boot.postBootCommands = lib.mkIf config.nix.enable
|
2013-09-04 11:05:09 +00:00
|
|
|
''
|
|
|
|
if [[ "$(cat /proc/cmdline)" =~ regInfo=([^ ]*) ]]; then
|
2016-04-24 10:57:19 +00:00
|
|
|
${config.nix.package.out}/bin/nix-store --load-db < ''${BASH_REMATCH[1]}
|
2013-09-04 11:05:09 +00:00
|
|
|
fi
|
|
|
|
'';
|
|
|
|
|
2015-06-17 13:40:46 +00:00
|
|
|
boot.initrd.availableKernelModules =
|
2016-12-21 19:49:08 +00:00
|
|
|
optional cfg.writableStore "overlay"
|
2018-09-25 08:41:39 +00:00
|
|
|
++ optional (cfg.qemu.diskInterface == "scsi") "sym53c8xx";
|
2015-06-17 13:40:46 +00:00
|
|
|
|
2021-10-06 17:19:29 +00:00
|
|
|
virtualisation.additionalPaths = [ config.system.build.toplevel ];
|
2013-09-04 11:05:09 +00:00
|
|
|
|
2021-06-23 15:17:15 +00:00
|
|
|
virtualisation.sharedDirectories = {
|
2023-04-23 21:28:54 +00:00
|
|
|
nix-store = mkIf cfg.mountHostNixStore {
|
2021-10-05 20:32:56 +00:00
|
|
|
source = builtins.storeDir;
|
|
|
|
target = "/nix/store";
|
|
|
|
};
|
|
|
|
xchg = {
|
|
|
|
source = ''"$TMPDIR"/xchg'';
|
|
|
|
target = "/tmp/xchg";
|
|
|
|
};
|
|
|
|
shared = {
|
|
|
|
source = ''"''${SHARED_DIR:-$TMPDIR/xchg}"'';
|
|
|
|
target = "/tmp/shared";
|
|
|
|
};
|
2021-06-23 15:17:15 +00:00
|
|
|
};
|
|
|
|
|
2021-06-23 15:24:29 +00:00
|
|
|
virtualisation.qemu.networkingOptions =
|
|
|
|
let
|
|
|
|
forwardingOptions = flip concatMapStrings cfg.forwardPorts
|
|
|
|
({ proto, from, host, guest }:
|
|
|
|
if from == "host"
|
|
|
|
then "hostfwd=${proto}:${host.address}:${toString host.port}-" +
|
|
|
|
"${guest.address}:${toString guest.port},"
|
|
|
|
else "'guestfwd=${proto}:${guest.address}:${toString guest.port}-" +
|
|
|
|
"cmd:${pkgs.netcat}/bin/nc ${host.address} ${toString host.port}',"
|
|
|
|
);
|
2022-11-08 16:50:47 +00:00
|
|
|
restrictNetworkOption = lib.optionalString cfg.restrictNetwork "restrict=on,";
|
2021-06-23 15:24:29 +00:00
|
|
|
in
|
|
|
|
[
|
|
|
|
"-net nic,netdev=user.0,model=virtio"
|
2022-11-08 16:50:47 +00:00
|
|
|
"-netdev user,id=user.0,${forwardingOptions}${restrictNetworkOption}\"$QEMU_NET_OPTS\""
|
2021-06-23 15:24:29 +00:00
|
|
|
];
|
|
|
|
|
2018-03-07 16:28:33 +00:00
|
|
|
# FIXME: Consolidate this one day.
|
|
|
|
virtualisation.qemu.options = mkMerge [
|
2022-02-06 06:55:49 +00:00
|
|
|
(mkIf cfg.qemu.virtioKeyboard [
|
|
|
|
"-device virtio-keyboard"
|
|
|
|
])
|
2021-11-21 01:50:41 +00:00
|
|
|
(mkIf pkgs.stdenv.hostPlatform.isx86 [
|
2020-04-24 21:01:57 +00:00
|
|
|
"-usb" "-device usb-tablet,bus=usb-bus.0"
|
2019-02-12 15:38:23 +00:00
|
|
|
])
|
2022-07-30 16:18:27 +00:00
|
|
|
(mkIf pkgs.stdenv.hostPlatform.isAarch [
|
2019-02-12 15:38:23 +00:00
|
|
|
"-device virtio-gpu-pci" "-device usb-ehci,id=usb0" "-device usb-kbd" "-device usb-tablet"
|
|
|
|
])
|
2022-04-09 18:51:07 +00:00
|
|
|
(let
|
|
|
|
alphaNumericChars = lowerChars ++ upperChars ++ (map toString (range 0 9));
|
|
|
|
# Replace all non-alphanumeric characters with underscores
|
|
|
|
sanitizeShellIdent = s: concatMapStrings (c: if builtins.elem c alphaNumericChars then c else "_") (stringToCharacters s);
|
|
|
|
in mkIf (!cfg.useBootLoader) [
|
|
|
|
"-kernel \${NIXPKGS_QEMU_KERNEL_${sanitizeShellIdent config.system.name}:-${config.system.build.toplevel}/kernel}"
|
2019-02-12 15:38:23 +00:00
|
|
|
"-initrd ${config.system.build.toplevel}/initrd"
|
|
|
|
''-append "$(cat ${config.system.build.toplevel}/kernel-params) init=${config.system.build.toplevel}/init regInfo=${regInfo}/registration ${consoles} $QEMU_KERNEL_PARAMS"''
|
|
|
|
])
|
|
|
|
(mkIf cfg.useEFIBoot [
|
2022-08-22 14:15:40 +00:00
|
|
|
"-drive if=pflash,format=raw,unit=0,readonly=on,file=${cfg.efi.firmware}"
|
2022-12-20 20:18:10 +00:00
|
|
|
"-drive if=pflash,format=raw,unit=1,readonly=off,file=$NIX_EFI_VARS"
|
2019-02-12 15:38:23 +00:00
|
|
|
])
|
2020-05-22 03:15:32 +00:00
|
|
|
(mkIf (cfg.bios != null) [
|
|
|
|
"-bios ${cfg.bios}/bios.bin"
|
|
|
|
])
|
2019-02-12 15:38:23 +00:00
|
|
|
(mkIf (!cfg.graphics) [
|
|
|
|
"-nographic"
|
|
|
|
])
|
|
|
|
];
|
|
|
|
|
|
|
|
virtualisation.qemu.drives = mkMerge [
|
2022-12-19 11:04:13 +00:00
|
|
|
(mkIf (cfg.diskImage != null) [{
|
2020-01-28 23:08:56 +00:00
|
|
|
name = "root";
|
2021-06-23 14:45:04 +00:00
|
|
|
file = ''"$NIX_DISK_IMAGE"'';
|
2020-01-28 21:54:46 +00:00
|
|
|
driveExtraOpts.cache = "writeback";
|
|
|
|
driveExtraOpts.werror = "report";
|
2022-12-20 20:18:10 +00:00
|
|
|
deviceExtraOpts.bootindex = "1";
|
2022-12-19 11:04:13 +00:00
|
|
|
}])
|
2021-10-05 20:32:56 +00:00
|
|
|
(mkIf cfg.useNixStoreImage [{
|
|
|
|
name = "nix-store";
|
|
|
|
file = ''"$TMPDIR"/store.img'';
|
2022-12-20 20:18:10 +00:00
|
|
|
deviceExtraOpts.bootindex = "2";
|
2022-07-16 16:20:16 +00:00
|
|
|
driveExtraOpts.format = if cfg.writableStore then "qcow2" else "raw";
|
2021-10-05 20:32:56 +00:00
|
|
|
}])
|
2019-02-12 15:38:23 +00:00
|
|
|
(imap0 (idx: _: {
|
|
|
|
file = "$(pwd)/empty${toString idx}.qcow2";
|
|
|
|
driveExtraOpts.werror = "report";
|
|
|
|
}) cfg.emptyDiskImages)
|
2018-03-07 16:28:33 +00:00
|
|
|
];
|
2013-09-04 11:05:09 +00:00
|
|
|
|
2022-12-20 19:35:40 +00:00
|
|
|
fileSystems = mkVMOverride cfg.fileSystems;
|
|
|
|
|
2013-10-29 12:04:52 +00:00
|
|
|
# Mount the host filesystem via 9P, and bind-mount the Nix store
|
|
|
|
# of the host into our own filesystem. We use mkVMOverride to
|
|
|
|
# allow this module to be applied to "normal" NixOS system
|
|
|
|
# configuration, where the regular value for the `fileSystems'
|
|
|
|
# attribute should be disregarded for the purpose of building a VM
|
|
|
|
# test image (since those filesystems don't exist in the VM).
|
2022-12-20 19:35:40 +00:00
|
|
|
virtualisation.fileSystems = let
|
2021-06-23 15:17:15 +00:00
|
|
|
mkSharedDir = tag: share:
|
|
|
|
{
|
|
|
|
name =
|
|
|
|
if tag == "nix-store" && cfg.writableStore
|
2022-12-20 19:35:40 +00:00
|
|
|
then "/nix/.ro-store"
|
|
|
|
else share.target;
|
2021-06-23 15:17:15 +00:00
|
|
|
value.device = tag;
|
|
|
|
value.fsType = "9p";
|
|
|
|
value.neededForBoot = true;
|
|
|
|
value.options =
|
|
|
|
[ "trans=virtio" "version=9p2000.L" "msize=${toString cfg.msize}" ]
|
|
|
|
++ lib.optional (tag == "nix-store") "cache=loose";
|
|
|
|
};
|
2022-12-20 19:35:40 +00:00
|
|
|
in lib.mkMerge [
|
|
|
|
(lib.mapAttrs' mkSharedDir cfg.sharedDirectories)
|
|
|
|
{
|
|
|
|
"/" = lib.mkIf cfg.useDefaultFilesystems (if cfg.diskImage == null then {
|
|
|
|
device = "tmpfs";
|
|
|
|
fsType = "tmpfs";
|
|
|
|
} else {
|
2022-12-20 20:18:10 +00:00
|
|
|
device = cfg.rootDevice;
|
2022-12-20 19:35:40 +00:00
|
|
|
fsType = "ext4";
|
|
|
|
autoFormat = true;
|
|
|
|
});
|
2022-12-04 20:44:47 +00:00
|
|
|
"/tmp" = lib.mkIf config.boot.tmp.useTmpfs {
|
2022-06-22 02:03:43 +00:00
|
|
|
device = "tmpfs";
|
|
|
|
fsType = "tmpfs";
|
|
|
|
neededForBoot = true;
|
|
|
|
# Sync with systemd's tmp.mount;
|
2022-12-04 20:44:47 +00:00
|
|
|
options = [ "mode=1777" "strictatime" "nosuid" "nodev" "size=${toString config.boot.tmp.tmpfsSize}" ];
|
2022-06-22 02:03:43 +00:00
|
|
|
};
|
2022-12-20 19:35:40 +00:00
|
|
|
"/nix/${if cfg.writableStore then ".ro-store" else "store"}" = lib.mkIf cfg.useNixStoreImage {
|
2022-06-22 02:03:43 +00:00
|
|
|
device = "${lookupDriveDeviceName "nix-store" cfg.qemu.drives}";
|
|
|
|
neededForBoot = true;
|
|
|
|
options = [ "ro" ];
|
|
|
|
};
|
2022-12-20 19:35:40 +00:00
|
|
|
"/nix/.rw-store" = lib.mkIf (cfg.writableStore && cfg.writableStoreUseTmpfs) {
|
2022-06-22 02:03:43 +00:00
|
|
|
fsType = "tmpfs";
|
|
|
|
options = [ "mode=0755" ];
|
|
|
|
neededForBoot = true;
|
|
|
|
};
|
2022-12-20 20:18:10 +00:00
|
|
|
"/boot" = lib.mkIf (cfg.useBootLoader && cfg.bootPartition != null) {
|
|
|
|
device = cfg.bootPartition; # 1 for e.g. `vda1`, as created in `systemImage`
|
2022-06-22 02:03:43 +00:00
|
|
|
fsType = "vfat";
|
|
|
|
noCheck = true; # fsck fails on a r/o filesystem
|
|
|
|
};
|
2022-12-20 19:35:40 +00:00
|
|
|
}
|
|
|
|
];
|
2013-08-01 00:10:13 +00:00
|
|
|
|
2022-03-20 03:00:27 +00:00
|
|
|
boot.initrd.systemd = lib.mkIf (config.boot.initrd.systemd.enable && cfg.writableStore) {
|
|
|
|
mounts = [{
|
|
|
|
where = "/sysroot/nix/store";
|
|
|
|
what = "overlay";
|
|
|
|
type = "overlay";
|
|
|
|
options = "lowerdir=/sysroot/nix/.ro-store,upperdir=/sysroot/nix/.rw-store/store,workdir=/sysroot/nix/.rw-store/work";
|
2022-12-16 05:16:55 +00:00
|
|
|
wantedBy = ["initrd-fs.target"];
|
|
|
|
before = ["initrd-fs.target"];
|
2023-01-01 21:11:10 +00:00
|
|
|
requires = ["rw-store.service"];
|
|
|
|
after = ["rw-store.service"];
|
|
|
|
unitConfig.RequiresMountsFor = "/sysroot/nix/.ro-store";
|
2022-03-20 03:00:27 +00:00
|
|
|
}];
|
|
|
|
services.rw-store = {
|
2023-01-01 21:11:10 +00:00
|
|
|
unitConfig = {
|
|
|
|
DefaultDependencies = false;
|
|
|
|
RequiresMountsFor = "/sysroot/nix/.rw-store";
|
|
|
|
};
|
2022-03-20 03:00:27 +00:00
|
|
|
serviceConfig = {
|
|
|
|
Type = "oneshot";
|
2023-02-23 18:01:53 +00:00
|
|
|
ExecStart = "/bin/mkdir -p -m 0755 /sysroot/nix/.rw-store/store /sysroot/nix/.rw-store/work /sysroot/nix/store";
|
2022-03-20 03:00:27 +00:00
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2022-06-22 02:03:43 +00:00
|
|
|
swapDevices = (if cfg.useDefaultFilesystems then mkVMOverride else mkDefault) [ ];
|
|
|
|
boot.initrd.luks.devices = (if cfg.useDefaultFilesystems then mkVMOverride else mkDefault) {};
|
2013-09-04 11:05:09 +00:00
|
|
|
|
|
|
|
# Don't run ntpd in the guest. It should get the correct time from KVM.
|
2016-12-14 22:49:14 +00:00
|
|
|
services.timesyncd.enable = false;
|
2013-09-04 11:05:09 +00:00
|
|
|
|
2018-04-18 02:29:54 +00:00
|
|
|
services.qemuGuest.enable = cfg.qemu.guestAgent.enable;
|
|
|
|
|
2021-01-10 00:22:05 +00:00
|
|
|
system.build.vm = cfg.host.pkgs.runCommand "nixos-vm" {
|
2022-03-31 14:34:26 +00:00
|
|
|
preferLocalBuild = true;
|
|
|
|
meta.mainProgram = "run-${config.system.name}-vm";
|
|
|
|
}
|
2013-09-04 11:05:09 +00:00
|
|
|
''
|
2014-06-30 12:56:10 +00:00
|
|
|
mkdir -p $out/bin
|
2013-09-04 11:05:09 +00:00
|
|
|
ln -s ${config.system.build.toplevel} $out/system
|
2021-01-10 00:22:05 +00:00
|
|
|
ln -s ${cfg.host.pkgs.writeScript "run-nixos-vm" startVM} $out/bin/run-${config.system.name}-vm
|
2013-09-04 11:05:09 +00:00
|
|
|
'';
|
|
|
|
|
|
|
|
# When building a regular system configuration, override whatever
|
|
|
|
# video driver the host uses.
|
2014-07-14 12:18:16 +00:00
|
|
|
services.xserver.videoDrivers = mkVMOverride [ "modesetting" ];
|
2013-10-29 12:04:52 +00:00
|
|
|
services.xserver.defaultDepth = mkVMOverride 0;
|
2021-06-23 15:18:21 +00:00
|
|
|
services.xserver.resolutions = mkVMOverride [ cfg.resolution ];
|
2013-09-04 11:05:09 +00:00
|
|
|
services.xserver.monitorSection =
|
|
|
|
''
|
|
|
|
# Set a higher refresh rate so that resolutions > 800x600 work.
|
|
|
|
HorizSync 30-140
|
|
|
|
VertRefresh 50-160
|
|
|
|
'';
|
|
|
|
|
|
|
|
# Wireless won't work in the VM.
|
2013-10-29 12:04:52 +00:00
|
|
|
networking.wireless.enable = mkVMOverride false;
|
2019-11-24 11:56:44 +00:00
|
|
|
services.connman.enable = mkVMOverride false;
|
2013-09-04 11:05:09 +00:00
|
|
|
|
2014-04-18 00:40:01 +00:00
|
|
|
# Speed up booting by not waiting for ARP.
|
|
|
|
networking.dhcpcd.extraConfig = "noarp";
|
|
|
|
|
2014-04-19 08:13:46 +00:00
|
|
|
networking.usePredictableInterfaceNames = false;
|
|
|
|
|
2013-09-04 11:05:09 +00:00
|
|
|
system.requiredKernelConfig = with config.lib.kernelConfig;
|
|
|
|
[ (isEnabled "VIRTIO_BLK")
|
|
|
|
(isEnabled "VIRTIO_PCI")
|
|
|
|
(isEnabled "VIRTIO_NET")
|
|
|
|
(isEnabled "EXT4_FS")
|
2020-09-01 15:08:01 +00:00
|
|
|
(isEnabled "NET_9P_VIRTIO")
|
|
|
|
(isEnabled "9P_FS")
|
2013-09-04 11:05:09 +00:00
|
|
|
(isYes "BLK_DEV")
|
|
|
|
(isYes "PCI")
|
|
|
|
(isYes "NETDEVICES")
|
|
|
|
(isYes "NET_CORE")
|
|
|
|
(isYes "INET")
|
|
|
|
(isYes "NETWORK_FILESYSTEMS")
|
2020-09-01 15:00:14 +00:00
|
|
|
] ++ optionals (!cfg.graphics) [
|
2013-09-04 11:05:09 +00:00
|
|
|
(isYes "SERIAL_8250_CONSOLE")
|
|
|
|
(isYes "SERIAL_8250")
|
2020-09-01 15:08:01 +00:00
|
|
|
] ++ optionals (cfg.writableStore) [
|
|
|
|
(isEnabled "OVERLAY_FS")
|
2013-09-04 11:05:09 +00:00
|
|
|
];
|
2009-06-18 16:16:12 +00:00
|
|
|
|
2013-09-04 11:05:09 +00:00
|
|
|
};
|
2021-11-18 23:26:27 +00:00
|
|
|
|
|
|
|
# uses types of services/x11/xserver.nix
|
|
|
|
meta.buildDocsInSandbox = false;
|
2009-06-18 16:16:12 +00:00
|
|
|
}
|