2014-07-27 22:00:59 +00:00
|
|
|
# Systemd services for docker.
|
|
|
|
|
|
|
|
{ config, lib, pkgs, ... }:
|
|
|
|
|
|
|
|
with lib;
|
|
|
|
|
|
|
|
let
|
|
|
|
|
|
|
|
cfg = config.virtualisation.docker;
|
2014-12-01 16:20:18 +00:00
|
|
|
pro = config.networking.proxy.default;
|
|
|
|
proxy_env = optionalAttrs (pro != null) { Environment = "\"http_proxy=${pro}\""; };
|
2014-07-27 22:00:59 +00:00
|
|
|
|
|
|
|
in
|
|
|
|
|
|
|
|
{
|
|
|
|
###### interface
|
|
|
|
|
|
|
|
options.virtualisation.docker = {
|
|
|
|
enable =
|
|
|
|
mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
default = false;
|
|
|
|
description =
|
|
|
|
''
|
|
|
|
This option enables docker, a daemon that manages
|
|
|
|
linux containers. Users in the "docker" group can interact with
|
|
|
|
the daemon (e.g. to start or stop containers) using the
|
|
|
|
<command>docker</command> command line tool.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
socketActivation =
|
|
|
|
mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
default = false;
|
|
|
|
description =
|
|
|
|
''
|
|
|
|
This option enables docker with socket activation. I.e. docker will
|
|
|
|
start when first called by client.
|
|
|
|
|
|
|
|
Note: This is false by default because systemd lower than 214 that
|
|
|
|
nixos uses so far, doesn't support SocketGroup option, so socket
|
|
|
|
created by docker has root group now. This will likely be changed
|
|
|
|
in future. So set this option explicitly to false if you wish.
|
|
|
|
'';
|
|
|
|
};
|
2015-09-03 23:18:19 +00:00
|
|
|
storageDriver =
|
|
|
|
mkOption {
|
|
|
|
type = types.enum ["aufs" "btrfs" "devicemapper" "overlay" "zfs"];
|
|
|
|
description =
|
|
|
|
''
|
|
|
|
This option determines which Docker storage driver to use.
|
|
|
|
It is required but lacks a default value as its most
|
|
|
|
suitable value will depend the filesystems available on the
|
|
|
|
host.
|
|
|
|
'';
|
|
|
|
};
|
2014-07-27 22:00:59 +00:00
|
|
|
extraOptions =
|
|
|
|
mkOption {
|
2015-04-25 13:25:15 +00:00
|
|
|
type = types.separatedString " ";
|
2014-07-27 22:00:59 +00:00
|
|
|
default = "";
|
|
|
|
description =
|
|
|
|
''
|
|
|
|
The extra command-line options to pass to
|
|
|
|
<command>docker</command> daemon.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2015-07-20 13:28:49 +00:00
|
|
|
postStart =
|
|
|
|
mkOption {
|
2015-08-17 17:52:45 +00:00
|
|
|
type = types.lines;
|
2015-07-20 13:28:49 +00:00
|
|
|
default = ''
|
|
|
|
while ! [ -e /var/run/docker.sock ]; do
|
|
|
|
sleep 0.1
|
|
|
|
done
|
|
|
|
'';
|
|
|
|
description = ''
|
|
|
|
The postStart phase of the systemd service. You may need to
|
|
|
|
override this if you are passing in flags to docker which
|
|
|
|
don't cause the socket file to be created.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2014-07-27 22:00:59 +00:00
|
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
###### implementation
|
|
|
|
|
|
|
|
config = mkIf cfg.enable (mkMerge [
|
|
|
|
{ environment.systemPackages = [ pkgs.docker ];
|
2014-09-03 19:22:20 +00:00
|
|
|
users.extraGroups.docker.gid = config.ids.gids.docker;
|
2014-07-27 22:00:59 +00:00
|
|
|
}
|
|
|
|
(mkIf cfg.socketActivation {
|
|
|
|
|
|
|
|
systemd.services.docker = {
|
|
|
|
description = "Docker Application Container Engine";
|
|
|
|
after = [ "network.target" "docker.socket" ];
|
|
|
|
requires = [ "docker.socket" ];
|
|
|
|
serviceConfig = {
|
2015-09-03 23:18:19 +00:00
|
|
|
ExecStart = "${pkgs.docker}/bin/docker daemon --host=fd:// --group=docker --storage-driver=${cfg.storageDriver} ${cfg.extraOptions}";
|
2014-07-27 22:00:59 +00:00
|
|
|
# I'm not sure if that limits aren't too high, but it's what
|
|
|
|
# goes in config bundled with docker itself
|
|
|
|
LimitNOFILE = 1048576;
|
|
|
|
LimitNPROC = 1048576;
|
2014-11-07 11:46:36 +00:00
|
|
|
} // proxy_env;
|
2014-07-27 22:00:59 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
systemd.sockets.docker = {
|
|
|
|
description = "Docker Socket for the API";
|
|
|
|
wantedBy = [ "sockets.target" ];
|
|
|
|
socketConfig = {
|
|
|
|
ListenStream = "/var/run/docker.sock";
|
|
|
|
SocketMode = "0660";
|
|
|
|
SocketUser = "root";
|
|
|
|
SocketGroup = "docker";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
})
|
|
|
|
(mkIf (!cfg.socketActivation) {
|
|
|
|
|
|
|
|
systemd.services.docker = {
|
|
|
|
description = "Docker Application Container Engine";
|
|
|
|
wantedBy = [ "multi-user.target" ];
|
|
|
|
after = [ "network.target" ];
|
|
|
|
serviceConfig = {
|
2015-09-03 23:18:19 +00:00
|
|
|
ExecStart = "${pkgs.docker}/bin/docker daemon --group=docker --storage-driver=${cfg.storageDriver} ${cfg.extraOptions}";
|
2014-07-27 22:00:59 +00:00
|
|
|
# I'm not sure if that limits aren't too high, but it's what
|
|
|
|
# goes in config bundled with docker itself
|
|
|
|
LimitNOFILE = 1048576;
|
|
|
|
LimitNPROC = 1048576;
|
2014-11-07 11:46:36 +00:00
|
|
|
} // proxy_env;
|
2014-07-27 22:00:59 +00:00
|
|
|
|
2015-10-04 12:31:16 +00:00
|
|
|
path = [ pkgs.kmod ] ++ (optional (cfg.storageDriver == "zfs") pkgs.zfs);
|
2015-07-05 11:57:10 +00:00
|
|
|
environment.MODULE_DIR = "/run/current-system/kernel-modules/lib/modules";
|
|
|
|
|
2015-07-20 13:28:49 +00:00
|
|
|
postStart = cfg.postStart;
|
2014-11-23 00:27:04 +00:00
|
|
|
|
2014-07-27 22:00:59 +00:00
|
|
|
# Presumably some containers are running we don't want to interrupt
|
|
|
|
restartIfChanged = false;
|
|
|
|
};
|
|
|
|
})
|
|
|
|
]);
|
|
|
|
|
|
|
|
}
|