{ config, lib, pkgs, ... }: let cfg = config.virtualisation.podman; inherit (lib) mkOption types; # Provides a fake "docker" binary mapping to podman dockerCompat = pkgs.runCommandNoCC "${pkgs.podman.pname}-docker-compat-${pkgs.podman.version}" { outputs = [ "out" "bin" "man" ]; inherit (pkgs.podman) meta; } '' mkdir $out mkdir -p $bin/bin ln -s ${pkgs.podman.bin}/bin/podman $bin/bin/docker mkdir -p $man/share/man/man1 for f in ${pkgs.podman.man}/share/man/man1/*; do basename=$(basename $f | sed s/podman/docker/g) ln -s $f $man/share/man/man1/$basename done ''; # Once https://github.com/NixOS/nixpkgs/pull/75584 is merged we can use the TOML generator toTOML = name: value: pkgs.runCommandNoCC name { nativeBuildInputs = [ pkgs.remarshal ]; value = builtins.toJSON value; passAsFile = [ "value" ]; } '' json2toml "$valuePath" "$out" ''; # Copy configuration files to avoid having the entire sources in the system closure copyFile = filePath: pkgs.runCommandNoCC (builtins.unsafeDiscardStringContext (builtins.baseNameOf filePath)) {} '' cp ${filePath} $out ''; in { options.virtualisation.podman = { enable = mkOption { type = types.bool; default = false; description = '' This option enables Podman, a daemonless container engine for developing, managing, and running OCI Containers on your Linux System. It is a drop-in replacement for the docker command. ''; }; dockerCompat = mkOption { type = types.bool; default = false; description = '' Create an alias mapping docker to podman. ''; }; registries = { search = mkOption { type = types.listOf types.str; default = [ "docker.io" "quay.io" ]; description = '' List of repositories to search. ''; }; insecure = mkOption { default = []; type = types.listOf types.str; description = '' List of insecure repositories. ''; }; block = mkOption { default = []; type = types.listOf types.str; description = '' List of blocked repositories. ''; }; }; policy = mkOption { default = {}; type = types.attrs; example = lib.literalExample '' { default = [ { type = "insecureAcceptAnything"; } ]; transports = { docker-daemon = { "" = [ { type = "insecureAcceptAnything"; } ]; }; }; } ''; description = '' Signature verification policy file. If this option is empty the default policy file from skopeo will be used. ''; }; users = mkOption { default = []; type = types.listOf types.str; description = '' List of users to set up subuid/subgid mappings for. This is a requirement for running containers in rootless mode. ''; }; libpod = mkOption { default = {}; description = "Libpod configuration"; type = types.submodule { options = { extraConfig = mkOption { type = types.lines; default = ""; description = '' Extra configuration that should be put in the libpod.conf configuration file ''; }; }; }; }; }; config = lib.mkIf cfg.enable { environment.systemPackages = [ pkgs.podman # Docker compat pkgs.runc # Default container runtime pkgs.crun # Default container runtime (cgroups v2) pkgs.conmon # Container runtime monitor pkgs.skopeo # Interact with container registry pkgs.slirp4netns # User-mode networking for unprivileged namespaces pkgs.fuse-overlayfs # CoW for images, much faster than default vfs pkgs.utillinux # nsenter pkgs.cni-plugins # Networking plugins pkgs.iptables ] ++ lib.optional cfg.dockerCompat dockerCompat; environment.etc."containers/libpod.conf".text = '' cni_plugin_dir = ["${pkgs.cni-plugins}/bin/"] cni_config_dir = "/etc/cni/net.d/" ${cfg.libpod.extraConfig} ''; environment.etc."cni/net.d/87-podman-bridge.conflist".source = copyFile "${pkgs.podman.src}/cni/87-podman-bridge.conflist"; environment.etc."containers/registries.conf".source = toTOML "registries.conf" { registries = lib.mapAttrs (n: v: { registries = v; }) cfg.registries; }; users.extraUsers = builtins.listToAttrs ( ( builtins.foldl' ( acc: user: { values = acc.values ++ [ { name = user; value = { subUidRanges = [ { startUid = acc.offset; count = 65536; } ]; subGidRanges = [ { startGid = acc.offset; count = 65536; } ]; }; } ]; offset = acc.offset + 65536; } ) { values = []; offset = 100000; } cfg.users ).values ); environment.etc."containers/policy.json".source = if cfg.policy != {} then pkgs.writeText "policy.json" (builtins.toJSON cfg.policy) else copyFile "${pkgs.skopeo.src}/default-policy.json"; }; }