nixpkgs/nixos/modules/virtualisation/lxd.nix

110 lines
2.9 KiB
Nix
Raw Normal View History

2015-09-14 08:27:31 +02:00
# Systemd services for lxd.
{ config, lib, pkgs, ... }:
with lib;
let
cfg = config.virtualisation.lxd;
in
{
###### interface
options = {
2018-03-16 10:58:54 +01:00
virtualisation.lxd = {
enable = mkOption {
2015-09-14 08:27:31 +02:00
type = types.bool;
default = false;
2018-03-16 10:58:54 +01:00
description = ''
This option enables lxd, a daemon that manages
containers. Users in the "lxd" group can interact with
the daemon (e.g. to start or stop containers) using the
<command>lxc</command> command line tool, among others.
'';
2015-09-14 08:27:31 +02:00
};
2018-03-16 10:58:54 +01:00
zfsSupport = mkOption {
type = types.bool;
default = false;
description = ''
enables lxd to use zfs as a storage for containers.
This option is enabled by default if a zfs pool is configured
with nixos.
'';
};
recommendedSysctlSettings = mkOption {
type = types.bool;
default = false;
description = ''
enables various settings to avoid common pitfalls when
running containers requiring many file operations.
Fixes errors like "Too many open files" or
"neighbour: ndisc_cache: neighbor table overflow!".
See https://lxd.readthedocs.io/en/latest/production-setup/
for details.
'';
};
2018-03-16 10:58:54 +01:00
};
2015-09-14 08:27:31 +02:00
};
###### implementation
config = mkIf cfg.enable {
2018-03-16 10:58:54 +01:00
environment.systemPackages = [ pkgs.lxd ];
2015-09-14 08:27:31 +02:00
2018-02-10 09:18:53 +01:00
security.apparmor = {
enable = true;
profiles = [
"${pkgs.lxc}/etc/apparmor.d/usr.bin.lxc-start"
"${pkgs.lxc}/etc/apparmor.d/lxc-containers"
];
packages = [ pkgs.lxc ];
};
2018-03-16 10:58:54 +01:00
systemd.services.lxd = {
description = "LXD Container Management Daemon";
2015-09-14 08:27:31 +02:00
2018-03-16 10:58:54 +01:00
wantedBy = [ "multi-user.target" ];
after = [ "systemd-udev-settle.service" ];
2015-09-14 08:27:31 +02:00
2018-03-16 10:58:54 +01:00
path = lib.optional cfg.zfsSupport pkgs.zfs;
2015-09-14 08:27:31 +02:00
2018-03-16 10:58:54 +01:00
preStart = ''
mkdir -m 0755 -p /var/lib/lxc/rootfs
'';
2018-02-10 09:18:53 +01:00
2018-03-16 10:58:54 +01:00
serviceConfig = {
ExecStart = "@${pkgs.lxd.bin}/bin/lxd lxd --group lxd";
Type = "simple";
KillMode = "process"; # when stopping, leave the containers alone
LimitMEMLOCK = "infinity";
LimitNOFILE = "1048576";
LimitNPROC = "infinity";
TasksMax = "infinity";
2015-09-14 08:27:31 +02:00
};
2018-03-16 10:58:54 +01:00
};
users.groups.lxd.gid = config.ids.gids.lxd;
2015-09-14 08:27:31 +02:00
users.users.root = {
2015-09-14 08:27:31 +02:00
subUidRanges = [ { startUid = 1000000; count = 65536; } ];
subGidRanges = [ { startGid = 1000000; count = 65536; } ];
};
boot.kernel.sysctl = mkIf cfg.recommendedSysctlSettings {
"fs.inotify.max_queued_events" = 1048576;
"fs.inotify.max_user_instances" = 1048576;
"fs.inotify.max_user_watches" = 1048576;
"vm.max_map_count" = 262144;
"kernel.dmesg_restrict" = 1;
"net.ipv4.neigh.default.gc_thresh3" = 8192;
"net.ipv6.neigh.default.gc_thresh3" = 8192;
"kernel.keys.maxkeys" = 2000;
};
2015-09-14 08:27:31 +02:00
};
}