2009-06-18 18:16:12 +02:00
|
|
|
# This module creates a virtual machine from the NixOS configuration.
|
|
|
|
# Building the `config.system.build.vm' attribute gives you a command
|
|
|
|
# that starts a KVM/QEMU VM running the NixOS configuration defined in
|
|
|
|
# `config'. The Nix store is shared read-only with the host, which
|
|
|
|
# makes (re)building VMs very efficient. However, it also means you
|
|
|
|
# can't reconfigure the guest inside the guest - you need to rebuild
|
|
|
|
# the VM in the host. On the other hand, the root filesystem is a
|
|
|
|
# read/writable disk image persistent across VM reboots.
|
|
|
|
|
2009-12-15 15:05:01 +01:00
|
|
|
{ config, pkgs, ... }:
|
2009-06-18 18:16:12 +02:00
|
|
|
|
2009-11-06 22:38:40 +01:00
|
|
|
with pkgs.lib;
|
|
|
|
|
2009-06-19 17:19:56 +02:00
|
|
|
let
|
|
|
|
|
2009-06-22 16:45:28 +02:00
|
|
|
vmName = config.networking.hostName;
|
|
|
|
|
2009-06-19 17:19:56 +02:00
|
|
|
options = {
|
2009-12-14 12:15:37 +01:00
|
|
|
virtualisation.memorySize =
|
|
|
|
mkOption {
|
|
|
|
default = 384;
|
|
|
|
description =
|
|
|
|
''
|
|
|
|
Memory size (M) of virtual machine.
|
|
|
|
'';
|
|
|
|
};
|
2009-06-19 17:19:56 +02:00
|
|
|
virtualisation.diskImage =
|
2009-11-06 22:38:40 +01:00
|
|
|
mkOption {
|
2009-06-22 16:45:28 +02:00
|
|
|
default = "./${vmName}.qcow2";
|
2009-06-19 17:19:56 +02:00
|
|
|
description =
|
|
|
|
''
|
|
|
|
Path to the disk image containing the root filesystem.
|
|
|
|
The image will be created on startup if it does not
|
|
|
|
exist.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
# Shell script to start the VM.
|
|
|
|
startVM =
|
|
|
|
''
|
|
|
|
#! ${pkgs.stdenv.shell}
|
|
|
|
|
|
|
|
export PATH=${pkgs.samba}/sbin:$PATH
|
|
|
|
|
|
|
|
NIX_DISK_IMAGE=''${NIX_DISK_IMAGE:-${config.virtualisation.diskImage}}
|
|
|
|
|
|
|
|
if ! test -e "$NIX_DISK_IMAGE"; then
|
2009-08-04 18:09:07 +02:00
|
|
|
${pkgs.qemu_kvm}/bin/qemu-img create -f qcow2 "$NIX_DISK_IMAGE" 512M || exit 1
|
2009-06-19 17:19:56 +02:00
|
|
|
fi
|
|
|
|
|
2009-08-05 13:43:51 +02:00
|
|
|
# -no-kvm-irqchip is needed to prevent the CIFS mount from
|
|
|
|
# hanging the VM on x86_64.
|
2009-12-14 12:15:37 +01:00
|
|
|
exec ${pkgs.qemu_kvm}/bin/qemu-system-x86_64 -m ${toString config.virtualisation.memorySize} \
|
2009-08-05 13:43:51 +02:00
|
|
|
-no-kvm-irqchip \
|
2009-06-19 17:19:56 +02:00
|
|
|
-net nic,model=virtio -net user -smb / \
|
|
|
|
-drive file=$NIX_DISK_IMAGE,if=virtio,boot=on \
|
2009-09-04 11:29:18 +02:00
|
|
|
-kernel ${config.system.build.toplevel}/kernel \
|
|
|
|
-initrd ${config.system.build.toplevel}/initrd \
|
2009-06-22 16:45:28 +02:00
|
|
|
$QEMU_OPTS \
|
2009-09-04 11:29:18 +02:00
|
|
|
-append "$(cat ${config.system.build.toplevel}/kernel-params) init=${config.system.build.bootStage2} systemConfig=${config.system.build.toplevel} $QEMU_KERNEL_PARAMS"
|
2009-06-19 17:19:56 +02:00
|
|
|
'';
|
|
|
|
|
|
|
|
in
|
|
|
|
|
2009-06-18 18:16:12 +02:00
|
|
|
{
|
2009-06-19 17:19:56 +02:00
|
|
|
require = options;
|
|
|
|
|
2009-06-18 18:16:12 +02:00
|
|
|
# All the modules the initrd needs to mount the host filesystem via
|
|
|
|
# CIFS. Also use paravirtualised network and block devices for
|
|
|
|
# performance.
|
2009-12-15 15:05:01 +01:00
|
|
|
boot.initrd.kernelModules =
|
2009-06-18 18:16:12 +02:00
|
|
|
["cifs" "virtio_net" "virtio_pci" "virtio_blk" "virtio_balloon" "nls_utf8"];
|
|
|
|
|
2009-06-19 17:19:56 +02:00
|
|
|
boot.initrd.extraUtilsCommands =
|
|
|
|
''
|
|
|
|
# We need mke2fs in the initrd.
|
|
|
|
cp ${pkgs.e2fsprogs}/sbin/mke2fs $out/bin
|
|
|
|
'';
|
|
|
|
|
2009-06-18 18:47:00 +02:00
|
|
|
boot.initrd.postDeviceCommands =
|
|
|
|
''
|
2009-06-19 17:19:56 +02:00
|
|
|
# Set up networking. Needed for CIFS mounting.
|
2009-06-18 18:47:00 +02:00
|
|
|
ipconfig 10.0.2.15:::::eth0:none
|
2009-06-19 17:19:56 +02:00
|
|
|
|
|
|
|
# If the disk image appears to be empty (fstype "unknown";
|
|
|
|
# hacky!!!), run mke2fs to initialise.
|
|
|
|
eval $(fstype /dev/vda)
|
|
|
|
if test "$FSTYPE" = unknown; then
|
|
|
|
mke2fs -t ext3 /dev/vda
|
|
|
|
fi
|
2009-06-18 18:47:00 +02:00
|
|
|
'';
|
|
|
|
|
|
|
|
# Mount the host filesystem via CIFS, and bind-mount the Nix store
|
2009-08-11 03:35:56 +02:00
|
|
|
# of the host into our own filesystem. We use mkOverride to allow
|
|
|
|
# this module to be applied to "normal" NixOS system configuration,
|
|
|
|
# where the regular value for the `fileSystems' attribute should be
|
|
|
|
# disregarded for the purpose of building a VM test image (since
|
|
|
|
# those filesystems don't exist in the VM).
|
2009-11-06 22:38:40 +01:00
|
|
|
fileSystems = mkOverride 50 {}
|
2009-06-18 18:16:12 +02:00
|
|
|
[ { mountPoint = "/";
|
|
|
|
device = "/dev/vda";
|
|
|
|
}
|
2009-06-18 18:47:00 +02:00
|
|
|
{ mountPoint = "/hostfs";
|
|
|
|
device = "//10.0.2.4/qemu";
|
|
|
|
fsType = "cifs";
|
2009-08-29 16:14:42 +02:00
|
|
|
options = "guest,username=nobody,noperm";
|
2009-06-18 18:47:00 +02:00
|
|
|
neededForBoot = true;
|
|
|
|
}
|
|
|
|
{ mountPoint = "/nix/store";
|
|
|
|
device = "/hostfs/nix/store";
|
|
|
|
options = "bind";
|
|
|
|
neededForBoot = true;
|
|
|
|
}
|
2009-08-11 16:28:25 +02:00
|
|
|
# Mount the host's Nix database. This allows read-only Nix
|
|
|
|
# operations in the guest to work properly.
|
|
|
|
{ mountPoint = "/nix/var/nix/db";
|
|
|
|
device = "/hostfs/nix/var/nix/db";
|
|
|
|
options = "bind";
|
|
|
|
}
|
2009-06-18 18:16:12 +02:00
|
|
|
];
|
|
|
|
|
|
|
|
# Starting DHCP brings down eth0, which kills the connection to the
|
|
|
|
# host filesystem and thus deadlocks the system.
|
|
|
|
networking.useDHCP = false;
|
|
|
|
|
2009-06-24 14:16:06 +02:00
|
|
|
networking.defaultGateway = "10.0.2.2";
|
|
|
|
|
2009-11-06 20:19:46 +01:00
|
|
|
networking.nameservers = [ "10.0.2.3" ];
|
|
|
|
|
2009-11-06 22:38:40 +01:00
|
|
|
networking.interfaces = singleton
|
|
|
|
{ name = "eth0";
|
|
|
|
ipAddress = "10.0.2.15";
|
|
|
|
};
|
|
|
|
|
2009-06-18 18:16:12 +02:00
|
|
|
system.build.vm = pkgs.runCommand "nixos-vm" {}
|
|
|
|
''
|
|
|
|
ensureDir $out/bin
|
2009-09-04 11:29:18 +02:00
|
|
|
ln -s ${config.system.build.toplevel} $out/system
|
2009-06-22 16:45:28 +02:00
|
|
|
ln -s ${pkgs.writeScript "run-nixos-vm" startVM} $out/bin/run-${vmName}-vm
|
2009-06-18 18:16:12 +02:00
|
|
|
'';
|
|
|
|
|
2009-06-19 16:30:56 +02:00
|
|
|
# sendfile() is currently broken over CIFS, so fix it here for all
|
|
|
|
# configurations that use Apache.
|
2009-07-16 18:13:35 +02:00
|
|
|
services.httpd.extraConfig =
|
|
|
|
''
|
|
|
|
EnableSendFile Off
|
|
|
|
'';
|
2009-08-11 04:02:01 +02:00
|
|
|
|
|
|
|
# When building a regular system configuration, override whatever
|
|
|
|
# video driver the host uses.
|
2009-11-06 22:38:40 +01:00
|
|
|
services.xserver.videoDriver = mkOverride 50 {} null;
|
|
|
|
services.xserver.videoDrivers = mkOverride 50 {} [ "cirrus" "vesa" ];
|
|
|
|
services.xserver.defaultDepth = mkOverride 50 {} 0;
|
|
|
|
services.xserver.resolutions = mkOverride 50 {} [];
|
2009-09-10 16:43:11 +02:00
|
|
|
|
|
|
|
# Wireless won't work in the VM.
|
2009-11-06 22:38:40 +01:00
|
|
|
networking.enableWLAN = mkOverride 50 {} false;
|
2009-06-18 18:16:12 +02:00
|
|
|
}
|