2020-04-24 23:36:52 +00:00
|
|
|
{ config, lib, pkgs, ... }:
|
|
|
|
|
|
|
|
with lib;
|
|
|
|
|
|
|
|
let
|
|
|
|
|
|
|
|
cfg = config.virtualisation.libvirtd;
|
|
|
|
vswitch = config.virtualisation.vswitch;
|
|
|
|
configFile = pkgs.writeText "libvirtd.conf" ''
|
2020-05-15 21:57:56 +00:00
|
|
|
auth_unix_ro = "polkit"
|
|
|
|
auth_unix_rw = "polkit"
|
2020-04-24 23:36:52 +00:00
|
|
|
${cfg.extraConfig}
|
|
|
|
'';
|
|
|
|
qemuConfigFile = pkgs.writeText "qemu.conf" ''
|
2021-10-17 09:34:42 +00:00
|
|
|
${optionalString cfg.qemu.ovmf.enable ''
|
2022-06-16 17:23:12 +00:00
|
|
|
nvram = [ "/run/libvirt/nix-ovmf/AAVMF_CODE.fd:/run/libvirt/nix-ovmf/AAVMF_VARS.fd", "/run/libvirt/nix-ovmf/OVMF_CODE.fd:/run/libvirt/nix-ovmf/OVMF_VARS.fd" ]
|
2020-04-24 23:36:52 +00:00
|
|
|
''}
|
2021-10-17 09:34:42 +00:00
|
|
|
${optionalString (!cfg.qemu.runAsRoot) ''
|
2020-04-24 23:36:52 +00:00
|
|
|
user = "qemu-libvirtd"
|
|
|
|
group = "qemu-libvirtd"
|
|
|
|
''}
|
2021-10-17 09:34:42 +00:00
|
|
|
${cfg.qemu.verbatimConfig}
|
2020-04-24 23:36:52 +00:00
|
|
|
'';
|
|
|
|
dirName = "libvirt";
|
|
|
|
subDirs = list: [ dirName ] ++ map (e: "${dirName}/${e}") list;
|
|
|
|
|
2021-10-17 09:34:42 +00:00
|
|
|
ovmfModule = types.submodule {
|
|
|
|
options = {
|
|
|
|
enable = mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
default = true;
|
2024-04-21 15:54:59 +00:00
|
|
|
description = ''
|
2021-10-17 09:34:42 +00:00
|
|
|
Allows libvirtd to take advantage of OVMF when creating new
|
|
|
|
QEMU VMs with UEFI boot.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2022-06-16 17:23:12 +00:00
|
|
|
# mkRemovedOptionModule does not work in submodules, do it manually
|
2021-10-17 09:34:42 +00:00
|
|
|
package = mkOption {
|
2022-06-16 17:23:12 +00:00
|
|
|
type = types.nullOr types.package;
|
|
|
|
default = null;
|
|
|
|
internal = true;
|
|
|
|
};
|
|
|
|
|
|
|
|
packages = mkOption {
|
|
|
|
type = types.listOf types.package;
|
|
|
|
default = [ pkgs.OVMF.fd ];
|
|
|
|
defaultText = literalExpression "[ pkgs.OVMF.fd ]";
|
|
|
|
example = literalExpression "[ pkgs.OVMFFull.fd pkgs.pkgsCross.aarch64-multiplatform.OVMF.fd ]";
|
2024-04-21 15:54:59 +00:00
|
|
|
description = ''
|
2022-06-16 17:23:12 +00:00
|
|
|
List of OVMF packages to use. Each listed package must contain files names FV/OVMF_CODE.fd and FV/OVMF_VARS.fd or FV/AAVMF_CODE.fd and FV/AAVMF_VARS.fd
|
2021-10-17 09:34:42 +00:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
swtpmModule = types.submodule {
|
|
|
|
options = {
|
|
|
|
enable = mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
default = false;
|
2024-04-21 15:54:59 +00:00
|
|
|
description = ''
|
2021-10-17 09:34:42 +00:00
|
|
|
Allows libvirtd to use swtpm to create an emulated TPM.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2024-01-02 11:29:13 +00:00
|
|
|
package = mkPackageOption pkgs "swtpm" { };
|
2021-10-17 09:34:42 +00:00
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
qemuModule = types.submodule {
|
|
|
|
options = {
|
2024-01-02 11:29:13 +00:00
|
|
|
package = mkPackageOption pkgs "qemu" {
|
|
|
|
extraDescription = ''
|
2021-10-17 09:34:42 +00:00
|
|
|
`pkgs.qemu` can emulate alien architectures (e.g. aarch64 on x86)
|
|
|
|
`pkgs.qemu_kvm` saves disk space allowing to emulate only host architectures.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
runAsRoot = mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
default = true;
|
2024-04-21 15:54:59 +00:00
|
|
|
description = ''
|
2021-10-17 09:34:42 +00:00
|
|
|
If true, libvirtd runs qemu as root.
|
|
|
|
If false, libvirtd runs qemu as unprivileged user qemu-libvirtd.
|
|
|
|
Changing this option to false may cause file permission issues
|
|
|
|
for existing guests. To fix these, manually change ownership
|
|
|
|
of affected files in /var/lib/libvirt/qemu to qemu-libvirtd.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
verbatimConfig = mkOption {
|
|
|
|
type = types.lines;
|
|
|
|
default = ''
|
|
|
|
namespaces = []
|
|
|
|
'';
|
2024-04-21 15:54:59 +00:00
|
|
|
description = ''
|
2021-10-17 09:34:42 +00:00
|
|
|
Contents written to the qemu configuration file, qemu.conf.
|
|
|
|
Make sure to include a proper namespace configuration when
|
|
|
|
supplying custom configuration.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
ovmf = mkOption {
|
|
|
|
type = ovmfModule;
|
|
|
|
default = { };
|
2024-04-21 15:54:59 +00:00
|
|
|
description = ''
|
2021-10-17 09:34:42 +00:00
|
|
|
QEMU's OVMF options.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
swtpm = mkOption {
|
|
|
|
type = swtpmModule;
|
|
|
|
default = { };
|
2024-04-21 15:54:59 +00:00
|
|
|
description = ''
|
2021-10-17 09:34:42 +00:00
|
|
|
QEMU's swtpm options.
|
|
|
|
'';
|
|
|
|
};
|
2024-01-13 08:15:51 +00:00
|
|
|
|
|
|
|
vhostUserPackages = mkOption {
|
|
|
|
type = types.listOf types.package;
|
|
|
|
default = [ ];
|
|
|
|
example = lib.literalExpression "[ pkgs.virtiofsd ]";
|
2024-04-21 15:54:59 +00:00
|
|
|
description = ''
|
2024-01-13 08:15:51 +00:00
|
|
|
Packages containing out-of-tree vhost-user drivers.
|
|
|
|
'';
|
|
|
|
};
|
2021-10-17 09:34:42 +00:00
|
|
|
};
|
|
|
|
};
|
2023-08-10 07:59:29 +00:00
|
|
|
|
|
|
|
hooksModule = types.submodule {
|
|
|
|
options = {
|
|
|
|
daemon = mkOption {
|
|
|
|
type = types.attrsOf types.path;
|
|
|
|
default = { };
|
2024-04-21 15:54:59 +00:00
|
|
|
description = ''
|
2023-08-10 07:59:29 +00:00
|
|
|
Hooks that will be placed under /var/lib/libvirt/hooks/daemon.d/
|
|
|
|
and called for daemon start/shutdown/SIGHUP events.
|
|
|
|
Please see https://libvirt.org/hooks.html for documentation.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
qemu = mkOption {
|
|
|
|
type = types.attrsOf types.path;
|
|
|
|
default = { };
|
2024-04-21 15:54:59 +00:00
|
|
|
description = ''
|
2023-08-10 07:59:29 +00:00
|
|
|
Hooks that will be placed under /var/lib/libvirt/hooks/qemu.d/
|
|
|
|
and called for qemu domains begin/end/migrate events.
|
|
|
|
Please see https://libvirt.org/hooks.html for documentation.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
lxc = mkOption {
|
|
|
|
type = types.attrsOf types.path;
|
|
|
|
default = { };
|
2024-04-21 15:54:59 +00:00
|
|
|
description = ''
|
2023-08-10 07:59:29 +00:00
|
|
|
Hooks that will be placed under /var/lib/libvirt/hooks/lxc.d/
|
|
|
|
and called for lxc domains begin/end events.
|
|
|
|
Please see https://libvirt.org/hooks.html for documentation.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
libxl = mkOption {
|
|
|
|
type = types.attrsOf types.path;
|
|
|
|
default = { };
|
2024-04-21 15:54:59 +00:00
|
|
|
description = ''
|
2023-08-10 07:59:29 +00:00
|
|
|
Hooks that will be placed under /var/lib/libvirt/hooks/libxl.d/
|
|
|
|
and called for libxl-handled xen domains begin/end events.
|
|
|
|
Please see https://libvirt.org/hooks.html for documentation.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
network = mkOption {
|
|
|
|
type = types.attrsOf types.path;
|
|
|
|
default = { };
|
2024-04-21 15:54:59 +00:00
|
|
|
description = ''
|
2023-08-10 07:59:29 +00:00
|
|
|
Hooks that will be placed under /var/lib/libvirt/hooks/lxc.d/
|
|
|
|
and called for networks begin/end events.
|
|
|
|
Please see https://libvirt.org/hooks.html for documentation.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
2024-01-02 11:29:13 +00:00
|
|
|
|
|
|
|
nssModule = types.submodule {
|
|
|
|
options = {
|
|
|
|
enable = mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
default = false;
|
2024-04-21 15:54:59 +00:00
|
|
|
description = ''
|
2024-01-02 11:29:13 +00:00
|
|
|
This option enables the older libvirt NSS module. This method uses
|
|
|
|
DHCP server records, therefore is dependent on the hostname provided
|
|
|
|
by the guest.
|
|
|
|
Please see https://libvirt.org/nss.html for more information.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
enableGuest = mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
default = false;
|
2024-04-21 15:54:59 +00:00
|
|
|
description = ''
|
2024-01-02 11:29:13 +00:00
|
|
|
This option enables the newer libvirt_guest NSS module. This module
|
|
|
|
uses the libvirt guest name instead of the hostname of the guest.
|
|
|
|
Please see https://libvirt.org/nss.html for more information.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
2021-10-17 09:34:42 +00:00
|
|
|
in
|
|
|
|
{
|
2020-04-24 23:36:52 +00:00
|
|
|
|
|
|
|
imports = [
|
|
|
|
(mkRemovedOptionModule [ "virtualisation" "libvirtd" "enableKVM" ]
|
2021-10-17 09:34:42 +00:00
|
|
|
"Set the option `virtualisation.libvirtd.qemu.package' instead.")
|
|
|
|
(mkRenamedOptionModule
|
|
|
|
[ "virtualisation" "libvirtd" "qemuPackage" ]
|
|
|
|
[ "virtualisation" "libvirtd" "qemu" "package" ])
|
|
|
|
(mkRenamedOptionModule
|
|
|
|
[ "virtualisation" "libvirtd" "qemuRunAsRoot" ]
|
|
|
|
[ "virtualisation" "libvirtd" "qemu" "runAsRoot" ])
|
|
|
|
(mkRenamedOptionModule
|
|
|
|
[ "virtualisation" "libvirtd" "qemuVerbatimConfig" ]
|
|
|
|
[ "virtualisation" "libvirtd" "qemu" "verbatimConfig" ])
|
|
|
|
(mkRenamedOptionModule
|
|
|
|
[ "virtualisation" "libvirtd" "qemuOvmf" ]
|
|
|
|
[ "virtualisation" "libvirtd" "qemu" "ovmf" "enable" ])
|
2022-06-16 17:23:12 +00:00
|
|
|
(mkRemovedOptionModule
|
2021-10-17 09:34:42 +00:00
|
|
|
[ "virtualisation" "libvirtd" "qemuOvmfPackage" ]
|
2022-06-16 17:23:12 +00:00
|
|
|
"If this option was set to `foo`, set the option `virtualisation.libvirtd.qemu.ovmf.packages' to `[foo.fd]` instead.")
|
2021-10-17 09:34:42 +00:00
|
|
|
(mkRenamedOptionModule
|
|
|
|
[ "virtualisation" "libvirtd" "qemuSwtpm" ]
|
|
|
|
[ "virtualisation" "libvirtd" "qemu" "swtpm" "enable" ])
|
2020-04-24 23:36:52 +00:00
|
|
|
];
|
|
|
|
|
|
|
|
###### interface
|
|
|
|
|
|
|
|
options.virtualisation.libvirtd = {
|
|
|
|
|
|
|
|
enable = mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
default = false;
|
2024-04-21 15:54:59 +00:00
|
|
|
description = ''
|
2020-04-24 23:36:52 +00:00
|
|
|
This option enables libvirtd, a daemon that manages
|
|
|
|
virtual machines. Users in the "libvirtd" group can interact with
|
|
|
|
the daemon (e.g. to start or stop VMs) using the
|
2022-08-12 12:06:08 +00:00
|
|
|
{command}`virsh` command line tool, among others.
|
2020-04-24 23:36:52 +00:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2024-01-02 11:29:13 +00:00
|
|
|
package = mkPackageOption pkgs "libvirt" { };
|
2021-02-18 02:12:21 +00:00
|
|
|
|
2020-04-24 23:36:52 +00:00
|
|
|
extraConfig = mkOption {
|
|
|
|
type = types.lines;
|
|
|
|
default = "";
|
2024-04-21 15:54:59 +00:00
|
|
|
description = ''
|
2020-04-24 23:36:52 +00:00
|
|
|
Extra contents appended to the libvirtd configuration file,
|
|
|
|
libvirtd.conf.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
extraOptions = mkOption {
|
|
|
|
type = types.listOf types.str;
|
|
|
|
default = [ ];
|
|
|
|
example = [ "--verbose" ];
|
2024-04-21 15:54:59 +00:00
|
|
|
description = ''
|
2020-04-24 23:36:52 +00:00
|
|
|
Extra command line arguments passed to libvirtd on startup.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
onBoot = mkOption {
|
2021-10-17 09:34:42 +00:00
|
|
|
type = types.enum [ "start" "ignore" ];
|
2020-04-24 23:36:52 +00:00
|
|
|
default = "start";
|
2024-04-21 15:54:59 +00:00
|
|
|
description = ''
|
2020-04-24 23:36:52 +00:00
|
|
|
Specifies the action to be done to / on the guests when the host boots.
|
|
|
|
The "start" option starts all guests that were running prior to shutdown
|
|
|
|
regardless of their autostart settings. The "ignore" option will not
|
2020-06-02 18:00:15 +00:00
|
|
|
start the formerly running guest on boot. However, any guest marked as
|
2020-04-24 23:36:52 +00:00
|
|
|
autostart will still be automatically started by libvirtd.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
onShutdown = mkOption {
|
2021-10-17 09:34:42 +00:00
|
|
|
type = types.enum [ "shutdown" "suspend" ];
|
2020-04-24 23:36:52 +00:00
|
|
|
default = "suspend";
|
2024-04-21 15:54:59 +00:00
|
|
|
description = ''
|
2020-04-24 23:36:52 +00:00
|
|
|
When shutting down / restarting the host what method should
|
|
|
|
be used to gracefully halt the guests. Setting to "shutdown"
|
|
|
|
will cause an ACPI shutdown of each guest. "suspend" will
|
|
|
|
attempt to save the state of the guests ready to restore on boot.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2022-12-28 21:21:41 +00:00
|
|
|
parallelShutdown = mkOption {
|
|
|
|
type = types.ints.unsigned;
|
|
|
|
default = 0;
|
2024-04-21 15:54:59 +00:00
|
|
|
description = ''
|
2022-12-28 21:21:41 +00:00
|
|
|
Number of guests that will be shutdown concurrently, taking effect when onShutdown
|
|
|
|
is set to "shutdown". If set to 0, guests will be shutdown one after another.
|
|
|
|
Number of guests on shutdown at any time will not exceed number set in this
|
|
|
|
variable.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2024-10-09 16:51:18 +00:00
|
|
|
shutdownTimeout = mkOption {
|
|
|
|
type = types.ints.unsigned;
|
|
|
|
default = 300;
|
|
|
|
description = ''
|
|
|
|
Number of seconds we're willing to wait for a guest to shut down.
|
|
|
|
If parallel shutdown is enabled, this timeout applies as a timeout
|
|
|
|
for shutting down all guests on a single URI defined in the variable URIS.
|
|
|
|
If this is 0, then there is no time out (use with caution, as guests might not
|
|
|
|
respond to a shutdown request).
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
startDelay = mkOption {
|
|
|
|
type = types.ints.unsigned;
|
|
|
|
default = 0;
|
|
|
|
description = ''
|
|
|
|
Number of seconds to wait between each guest start.
|
|
|
|
If set to 0, all guests will start up in parallel.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2020-04-24 23:36:52 +00:00
|
|
|
allowedBridges = mkOption {
|
|
|
|
type = types.listOf types.str;
|
|
|
|
default = [ "virbr0" ];
|
2024-04-21 15:54:59 +00:00
|
|
|
description = ''
|
2020-04-24 23:36:52 +00:00
|
|
|
List of bridge devices that can be used by qemu:///session
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2021-10-17 09:34:42 +00:00
|
|
|
qemu = mkOption {
|
|
|
|
type = qemuModule;
|
|
|
|
default = { };
|
2024-04-21 15:54:59 +00:00
|
|
|
description = ''
|
2021-10-17 09:34:42 +00:00
|
|
|
QEMU related options.
|
|
|
|
'';
|
|
|
|
};
|
2023-08-10 07:59:29 +00:00
|
|
|
|
|
|
|
hooks = mkOption {
|
|
|
|
type = hooksModule;
|
|
|
|
default = { };
|
2024-04-21 15:54:59 +00:00
|
|
|
description = ''
|
2023-08-10 07:59:29 +00:00
|
|
|
Hooks related options.
|
|
|
|
'';
|
|
|
|
};
|
2024-01-02 11:29:13 +00:00
|
|
|
|
|
|
|
nss = mkOption {
|
|
|
|
type = nssModule;
|
|
|
|
default = { };
|
2024-04-21 15:54:59 +00:00
|
|
|
description = ''
|
2024-01-02 11:29:13 +00:00
|
|
|
libvirt NSS module options.
|
|
|
|
'';
|
|
|
|
};
|
2024-07-01 15:47:52 +00:00
|
|
|
|
|
|
|
sshProxy = mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
default = true;
|
|
|
|
description = ''
|
|
|
|
Weither to configure OpenSSH to use the [SSH Proxy](https://libvirt.org/ssh-proxy.html).
|
|
|
|
'';
|
|
|
|
};
|
2020-04-24 23:36:52 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
###### implementation
|
|
|
|
|
|
|
|
config = mkIf cfg.enable {
|
|
|
|
|
2021-06-28 23:13:55 +00:00
|
|
|
assertions = [
|
|
|
|
{
|
2022-06-16 17:23:12 +00:00
|
|
|
assertion = config.virtualisation.libvirtd.qemu.ovmf.package == null;
|
|
|
|
message = ''
|
|
|
|
The option virtualisation.libvirtd.qemu.ovmf.package is superseded by virtualisation.libvirtd.qemu.ovmf.packages.
|
|
|
|
If this option was set to `foo`, set the option `virtualisation.libvirtd.qemu.ovmf.packages' to `[foo.fd]` instead.
|
|
|
|
'';
|
2021-06-28 23:13:55 +00:00
|
|
|
}
|
2021-10-17 09:34:42 +00:00
|
|
|
{
|
2022-06-16 17:23:12 +00:00
|
|
|
assertion = config.security.polkit.enable;
|
|
|
|
message = "The libvirtd module currently requires Polkit to be enabled ('security.polkit.enable = true').";
|
2021-10-17 09:34:42 +00:00
|
|
|
}
|
2021-06-28 23:13:55 +00:00
|
|
|
];
|
|
|
|
|
2020-04-24 23:36:52 +00:00
|
|
|
environment = {
|
|
|
|
# this file is expected in /etc/qemu and not sysconfdir (/var/lib)
|
2021-10-17 09:34:42 +00:00
|
|
|
etc."qemu/bridge.conf".text = lib.concatMapStringsSep "\n"
|
|
|
|
(e:
|
|
|
|
"allow ${e}")
|
|
|
|
cfg.allowedBridges;
|
|
|
|
systemPackages = with pkgs; [ libressl.nc iptables cfg.package cfg.qemu.package ];
|
2021-12-06 16:07:01 +00:00
|
|
|
etc.ethertypes.source = "${pkgs.iptables}/etc/ethertypes";
|
2020-04-24 23:36:52 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
boot.kernelModules = [ "tun" ];
|
|
|
|
|
|
|
|
users.groups.libvirtd.gid = config.ids.gids.libvirtd;
|
|
|
|
|
|
|
|
# libvirtd runs qemu as this user and group by default
|
|
|
|
users.extraGroups.qemu-libvirtd.gid = config.ids.gids.qemu-libvirtd;
|
|
|
|
users.extraUsers.qemu-libvirtd = {
|
|
|
|
uid = config.ids.uids.qemu-libvirtd;
|
|
|
|
isNormalUser = false;
|
|
|
|
group = "qemu-libvirtd";
|
|
|
|
};
|
|
|
|
|
|
|
|
security.wrappers.qemu-bridge-helper = {
|
2021-09-22 15:38:15 +00:00
|
|
|
setuid = true;
|
|
|
|
owner = "root";
|
|
|
|
group = "root";
|
2022-09-09 14:08:57 +00:00
|
|
|
source = "${cfg.qemu.package}/libexec/qemu-bridge-helper";
|
2020-04-24 23:36:52 +00:00
|
|
|
};
|
|
|
|
|
2024-07-01 15:47:52 +00:00
|
|
|
programs.ssh.extraConfig = mkIf cfg.sshProxy ''
|
|
|
|
Include ${cfg.package}/etc/ssh/ssh_config.d/30-libvirt-ssh-proxy.conf
|
|
|
|
'';
|
|
|
|
|
2021-02-18 02:12:21 +00:00
|
|
|
systemd.packages = [ cfg.package ];
|
2020-04-24 23:36:52 +00:00
|
|
|
|
|
|
|
systemd.services.libvirtd-config = {
|
|
|
|
description = "Libvirt Virtual Machine Management Daemon - configuration";
|
|
|
|
script = ''
|
|
|
|
# Copy default libvirt network config .xml files to /var/lib
|
|
|
|
# Files modified by the user will not be overwritten
|
2021-02-18 02:12:21 +00:00
|
|
|
for i in $(cd ${cfg.package}/var/lib && echo \
|
2022-08-21 13:32:41 +00:00
|
|
|
libvirt/qemu/networks/*.xml \
|
2020-04-24 23:36:52 +00:00
|
|
|
libvirt/nwfilter/*.xml );
|
|
|
|
do
|
|
|
|
mkdir -p /var/lib/$(dirname $i) -m 755
|
2023-07-15 17:15:38 +00:00
|
|
|
if [ ! -e /var/lib/$i ]; then
|
|
|
|
cp -pd ${cfg.package}/var/lib/$i /var/lib/$i
|
|
|
|
fi
|
2020-04-24 23:36:52 +00:00
|
|
|
done
|
|
|
|
|
|
|
|
# Copy generated qemu config to libvirt directory
|
|
|
|
cp -f ${qemuConfigFile} /var/lib/${dirName}/qemu.conf
|
|
|
|
|
|
|
|
# stable (not GC'able as in /nix/store) paths for using in <emulator> section of xml configs
|
2021-10-17 09:34:42 +00:00
|
|
|
for emulator in ${cfg.package}/libexec/libvirt_lxc ${cfg.qemu.package}/bin/qemu-kvm ${cfg.qemu.package}/bin/qemu-system-*; do
|
2020-04-24 23:36:52 +00:00
|
|
|
ln -s --force "$emulator" /run/${dirName}/nix-emulators/
|
|
|
|
done
|
|
|
|
|
2022-09-09 14:08:57 +00:00
|
|
|
for helper in bin/qemu-pr-helper; do
|
2021-10-17 09:34:42 +00:00
|
|
|
ln -s --force ${cfg.qemu.package}/$helper /run/${dirName}/nix-helpers/
|
2020-04-24 23:36:52 +00:00
|
|
|
done
|
|
|
|
|
2022-06-16 17:23:12 +00:00
|
|
|
${optionalString cfg.qemu.ovmf.enable (let
|
|
|
|
ovmfpackage = pkgs.buildEnv {
|
|
|
|
name = "qemu-ovmf";
|
|
|
|
paths = cfg.qemu.ovmf.packages;
|
|
|
|
};
|
|
|
|
in
|
|
|
|
''
|
|
|
|
ln -s --force ${ovmfpackage}/FV/AAVMF_CODE.fd /run/${dirName}/nix-ovmf/
|
|
|
|
ln -s --force ${ovmfpackage}/FV/OVMF_CODE.fd /run/${dirName}/nix-ovmf/
|
|
|
|
ln -s --force ${ovmfpackage}/FV/AAVMF_VARS.fd /run/${dirName}/nix-ovmf/
|
|
|
|
ln -s --force ${ovmfpackage}/FV/OVMF_VARS.fd /run/${dirName}/nix-ovmf/
|
|
|
|
'')}
|
2023-08-10 07:59:29 +00:00
|
|
|
|
|
|
|
# Symlink hooks to /var/lib/libvirt
|
|
|
|
${concatStringsSep "\n" (map (driver:
|
|
|
|
''
|
|
|
|
mkdir -p /var/lib/${dirName}/hooks/${driver}.d
|
|
|
|
rm -rf /var/lib/${dirName}/hooks/${driver}.d/*
|
|
|
|
${concatStringsSep "\n" (mapAttrsToList (name: value:
|
|
|
|
"ln -s --force ${value} /var/lib/${dirName}/hooks/${driver}.d/${name}") cfg.hooks.${driver})}
|
|
|
|
'') (attrNames cfg.hooks))}
|
2020-04-24 23:36:52 +00:00
|
|
|
'';
|
|
|
|
|
|
|
|
serviceConfig = {
|
|
|
|
Type = "oneshot";
|
|
|
|
RuntimeDirectoryPreserve = "yes";
|
|
|
|
LogsDirectory = subDirs [ "qemu" ];
|
|
|
|
RuntimeDirectory = subDirs [ "nix-emulators" "nix-helpers" "nix-ovmf" ];
|
|
|
|
StateDirectory = subDirs [ "dnsmasq" ];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
systemd.services.libvirtd = {
|
2022-11-21 17:40:18 +00:00
|
|
|
wantedBy = [ "multi-user.target" ];
|
2020-04-24 23:36:52 +00:00
|
|
|
requires = [ "libvirtd-config.service" ];
|
2021-03-09 03:18:52 +00:00
|
|
|
after = [ "libvirtd-config.service" ]
|
2021-10-17 09:34:42 +00:00
|
|
|
++ optional vswitch.enable "ovs-vswitchd.service";
|
2020-04-24 23:36:52 +00:00
|
|
|
|
|
|
|
environment.LIBVIRTD_ARGS = escapeShellArgs (
|
2021-10-17 09:34:42 +00:00
|
|
|
[
|
|
|
|
"--config"
|
|
|
|
configFile
|
|
|
|
"--timeout"
|
|
|
|
"120" # from ${libvirt}/var/lib/sysconfig/libvirtd
|
|
|
|
] ++ cfg.extraOptions
|
|
|
|
);
|
|
|
|
|
2024-01-02 11:29:13 +00:00
|
|
|
path = [ cfg.qemu.package pkgs.netcat ] # libvirtd requires qemu-img to manage disk images
|
2021-10-17 09:34:42 +00:00
|
|
|
++ optional vswitch.enable vswitch.package
|
|
|
|
++ optional cfg.qemu.swtpm.enable cfg.qemu.swtpm.package;
|
2020-04-24 23:36:52 +00:00
|
|
|
|
|
|
|
serviceConfig = {
|
|
|
|
Type = "notify";
|
|
|
|
KillMode = "process"; # when stopping, leave the VMs alone
|
|
|
|
Restart = "no";
|
2024-02-07 01:22:34 +00:00
|
|
|
OOMScoreAdjust = "-999";
|
2020-04-24 23:36:52 +00:00
|
|
|
};
|
|
|
|
restartIfChanged = false;
|
|
|
|
};
|
|
|
|
|
2022-04-15 01:41:22 +00:00
|
|
|
systemd.services.virtchd = {
|
|
|
|
path = [ pkgs.cloud-hypervisor ];
|
|
|
|
};
|
|
|
|
|
2020-04-24 23:36:52 +00:00
|
|
|
systemd.services.libvirt-guests = {
|
|
|
|
wantedBy = [ "multi-user.target" ];
|
2021-04-12 18:23:04 +00:00
|
|
|
path = with pkgs; [ coreutils gawk cfg.package ];
|
2020-04-24 23:36:52 +00:00
|
|
|
restartIfChanged = false;
|
|
|
|
|
|
|
|
environment.ON_BOOT = "${cfg.onBoot}";
|
|
|
|
environment.ON_SHUTDOWN = "${cfg.onShutdown}";
|
2022-12-28 21:21:41 +00:00
|
|
|
environment.PARALLEL_SHUTDOWN = "${toString cfg.parallelShutdown}";
|
2024-10-09 16:51:18 +00:00
|
|
|
environment.SHUTDOWN_TIMEOUT = "${toString cfg.shutdownTimeout}";
|
|
|
|
environment.START_DELAY = "${toString cfg.startDelay}";
|
2020-04-24 23:36:52 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
systemd.sockets.virtlogd = {
|
|
|
|
description = "Virtual machine log manager socket";
|
|
|
|
wantedBy = [ "sockets.target" ];
|
|
|
|
listenStreams = [ "/run/${dirName}/virtlogd-sock" ];
|
|
|
|
};
|
|
|
|
|
|
|
|
systemd.services.virtlogd = {
|
|
|
|
description = "Virtual machine log manager";
|
2021-02-18 02:12:21 +00:00
|
|
|
serviceConfig.ExecStart = "@${cfg.package}/sbin/virtlogd virtlogd";
|
2020-04-24 23:36:52 +00:00
|
|
|
restartIfChanged = false;
|
|
|
|
};
|
|
|
|
|
|
|
|
systemd.sockets.virtlockd = {
|
|
|
|
description = "Virtual machine lock manager socket";
|
|
|
|
wantedBy = [ "sockets.target" ];
|
|
|
|
listenStreams = [ "/run/${dirName}/virtlockd-sock" ];
|
|
|
|
};
|
|
|
|
|
|
|
|
systemd.services.virtlockd = {
|
|
|
|
description = "Virtual machine lock manager";
|
2021-02-18 02:12:21 +00:00
|
|
|
serviceConfig.ExecStart = "@${cfg.package}/sbin/virtlockd virtlockd";
|
2020-04-24 23:36:52 +00:00
|
|
|
restartIfChanged = false;
|
|
|
|
};
|
|
|
|
|
2020-07-18 16:06:22 +00:00
|
|
|
# https://libvirt.org/daemons.html#monolithic-systemd-integration
|
|
|
|
systemd.sockets.libvirtd.wantedBy = [ "sockets.target" ];
|
2020-05-15 21:57:56 +00:00
|
|
|
|
2024-01-13 08:15:51 +00:00
|
|
|
systemd.tmpfiles.rules = let
|
|
|
|
vhostUserCollection = pkgs.buildEnv {
|
|
|
|
name = "vhost-user";
|
|
|
|
paths = cfg.qemu.vhostUserPackages;
|
|
|
|
pathsToLink = [ "/share/qemu/vhost-user" ];
|
|
|
|
};
|
|
|
|
in [ "L+ /var/lib/qemu/vhost-user - - - - ${vhostUserCollection}/share/qemu/vhost-user" ];
|
|
|
|
|
2023-05-24 13:37:59 +00:00
|
|
|
security.polkit = {
|
|
|
|
enable = true;
|
|
|
|
extraConfig = ''
|
|
|
|
polkit.addRule(function(action, subject) {
|
|
|
|
if (action.id == "org.libvirt.unix.manage" &&
|
|
|
|
subject.isInGroup("libvirtd")) {
|
|
|
|
return polkit.Result.YES;
|
|
|
|
}
|
|
|
|
});
|
|
|
|
'';
|
|
|
|
};
|
2024-01-02 11:29:13 +00:00
|
|
|
|
|
|
|
system.nssModules = optional (cfg.nss.enable or cfg.nss.enableGuest) cfg.package;
|
2024-07-01 15:47:52 +00:00
|
|
|
system.nssDatabases.hosts = mkMerge [
|
|
|
|
# ensure that the NSS modules come between mymachines (which is 400) and resolve (which is 501)
|
|
|
|
(mkIf cfg.nss.enable (mkOrder 430 [ "libvirt" ]))
|
|
|
|
(mkIf cfg.nss.enableGuest (mkOrder 432 [ "libvirt_guest" ]))
|
2024-01-02 11:29:13 +00:00
|
|
|
];
|
2020-04-24 23:36:52 +00:00
|
|
|
};
|
|
|
|
}
|