2021-06-01 10:57:12 +00:00
|
|
|
{ config, lib, pkgs, ... }:
|
2020-04-24 23:36:52 +00:00
|
|
|
let
|
|
|
|
cfg = config.virtualisation.podman;
|
2021-01-09 10:05:03 +00:00
|
|
|
toml = pkgs.formats.toml { };
|
2021-06-04 09:07:49 +00:00
|
|
|
json = pkgs.formats.json { };
|
2020-04-24 23:36:52 +00:00
|
|
|
|
|
|
|
inherit (lib) mkOption types;
|
|
|
|
|
2022-04-03 18:54:34 +00:00
|
|
|
podmanPackage = (pkgs.podman.override {
|
|
|
|
extraPackages = cfg.extraPackages
|
|
|
|
++ lib.optional (builtins.elem "zfs" config.boot.supportedFilesystems) config.boot.zfs.package;
|
|
|
|
});
|
2020-05-03 17:38:23 +00:00
|
|
|
|
2020-04-24 23:36:52 +00:00
|
|
|
# Provides a fake "docker" binary mapping to podman
|
2022-08-21 13:32:41 +00:00
|
|
|
dockerCompat = pkgs.runCommand "${podmanPackage.pname}-docker-compat-${podmanPackage.version}"
|
|
|
|
{
|
|
|
|
outputs = [ "out" "man" ];
|
|
|
|
inherit (podmanPackage) meta;
|
|
|
|
} ''
|
2020-05-15 21:57:56 +00:00
|
|
|
mkdir -p $out/bin
|
|
|
|
ln -s ${podmanPackage}/bin/podman $out/bin/docker
|
2020-04-24 23:36:52 +00:00
|
|
|
|
|
|
|
mkdir -p $man/share/man/man1
|
2020-05-03 17:38:23 +00:00
|
|
|
for f in ${podmanPackage.man}/share/man/man1/*; do
|
2020-04-24 23:36:52 +00:00
|
|
|
basename=$(basename $f | sed s/podman/docker/g)
|
|
|
|
ln -s $f $man/share/man/man1/$basename
|
|
|
|
done
|
|
|
|
'';
|
|
|
|
|
2022-08-21 13:32:41 +00:00
|
|
|
net-conflist = pkgs.runCommand "87-podman-bridge.conflist"
|
|
|
|
{
|
|
|
|
nativeBuildInputs = [ pkgs.jq ];
|
|
|
|
extraPlugins = builtins.toJSON cfg.defaultNetwork.extraPlugins;
|
|
|
|
jqScript = ''
|
|
|
|
. + { "plugins": (.plugins + $extraPlugins) }
|
|
|
|
'';
|
|
|
|
} ''
|
2021-06-04 09:07:49 +00:00
|
|
|
jq <${cfg.package}/etc/cni/net.d/87-podman-bridge.conflist \
|
|
|
|
--argjson extraPlugins "$extraPlugins" \
|
|
|
|
"$jqScript" \
|
|
|
|
>$out
|
|
|
|
'';
|
|
|
|
|
2020-04-24 23:36:52 +00:00
|
|
|
in
|
|
|
|
{
|
2020-07-18 16:06:22 +00:00
|
|
|
imports = [
|
2021-12-19 01:06:50 +00:00
|
|
|
./dnsname.nix
|
|
|
|
./network-socket.nix
|
2020-07-18 16:06:22 +00:00
|
|
|
];
|
|
|
|
|
2020-04-24 23:36:52 +00:00
|
|
|
meta = {
|
|
|
|
maintainers = lib.teams.podman.members;
|
|
|
|
};
|
|
|
|
|
|
|
|
options.virtualisation.podman = {
|
|
|
|
|
|
|
|
enable =
|
|
|
|
mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
default = false;
|
2022-08-21 13:32:41 +00:00
|
|
|
description = lib.mdDoc ''
|
2020-04-24 23:36:52 +00:00
|
|
|
This option enables Podman, a daemonless container engine for
|
|
|
|
developing, managing, and running OCI Containers on your Linux System.
|
|
|
|
|
2022-08-21 13:32:41 +00:00
|
|
|
It is a drop-in replacement for the {command}`docker` command.
|
2020-04-24 23:36:52 +00:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2021-06-01 10:57:12 +00:00
|
|
|
dockerSocket.enable = mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
default = false;
|
2022-08-21 13:32:41 +00:00
|
|
|
description = lib.mdDoc ''
|
2021-06-01 10:57:12 +00:00
|
|
|
Make the Podman socket available in place of the Docker socket, so
|
|
|
|
Docker tools can find the Podman socket.
|
|
|
|
|
|
|
|
Podman implements the Docker API.
|
|
|
|
|
2022-08-21 13:32:41 +00:00
|
|
|
Users must be in the `podman` group in order to connect. As
|
2021-06-01 10:57:12 +00:00
|
|
|
with Docker, members of this group can gain root access.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2020-04-24 23:36:52 +00:00
|
|
|
dockerCompat = mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
default = false;
|
2022-08-21 13:32:41 +00:00
|
|
|
description = lib.mdDoc ''
|
|
|
|
Create an alias mapping {command}`docker` to {command}`podman`.
|
2020-04-24 23:36:52 +00:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2021-01-09 10:05:03 +00:00
|
|
|
enableNvidia = mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
default = false;
|
2022-08-21 13:32:41 +00:00
|
|
|
description = lib.mdDoc ''
|
2021-01-09 10:05:03 +00:00
|
|
|
Enable use of NVidia GPUs from within podman containers.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2020-05-03 17:38:23 +00:00
|
|
|
extraPackages = mkOption {
|
|
|
|
type = with types; listOf package;
|
|
|
|
default = [ ];
|
2021-10-06 13:57:05 +00:00
|
|
|
example = lib.literalExpression ''
|
2020-05-03 17:38:23 +00:00
|
|
|
[
|
|
|
|
pkgs.gvisor
|
|
|
|
]
|
|
|
|
'';
|
2022-08-21 13:32:41 +00:00
|
|
|
description = lib.mdDoc ''
|
2020-05-03 17:38:23 +00:00
|
|
|
Extra packages to be installed in the Podman wrapper.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2020-05-15 21:57:56 +00:00
|
|
|
package = lib.mkOption {
|
|
|
|
type = types.package;
|
|
|
|
default = podmanPackage;
|
|
|
|
internal = true;
|
2022-09-09 14:08:57 +00:00
|
|
|
description = lib.mdDoc ''
|
2020-05-15 21:57:56 +00:00
|
|
|
The final Podman package (including extra packages).
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2021-06-04 09:07:49 +00:00
|
|
|
defaultNetwork.extraPlugins = lib.mkOption {
|
|
|
|
type = types.listOf json.type;
|
2022-08-21 13:32:41 +00:00
|
|
|
default = [ ];
|
|
|
|
description = lib.mdDoc ''
|
2021-06-04 09:07:49 +00:00
|
|
|
Extra CNI plugin configurations to add to podman's default network.
|
|
|
|
'';
|
|
|
|
};
|
2020-05-15 21:57:56 +00:00
|
|
|
|
2020-04-24 23:36:52 +00:00
|
|
|
};
|
|
|
|
|
2021-01-09 10:05:03 +00:00
|
|
|
config = lib.mkIf cfg.enable (lib.mkMerge [
|
|
|
|
{
|
|
|
|
environment.systemPackages = [ cfg.package ]
|
|
|
|
++ lib.optional cfg.dockerCompat dockerCompat;
|
|
|
|
|
2021-06-04 09:07:49 +00:00
|
|
|
environment.etc."cni/net.d/87-podman-bridge.conflist".source = net-conflist;
|
2021-01-09 10:05:03 +00:00
|
|
|
|
|
|
|
virtualisation.containers = {
|
|
|
|
enable = true; # Enable common /etc/containers configuration
|
2021-04-12 18:23:04 +00:00
|
|
|
containersConf.settings = lib.optionalAttrs cfg.enableNvidia {
|
|
|
|
engine = {
|
|
|
|
conmon_env_vars = [ "PATH=${lib.makeBinPath [ pkgs.nvidia-podman ]}" ];
|
|
|
|
runtimes.nvidia = [ "${pkgs.nvidia-podman}/bin/nvidia-container-runtime" ];
|
|
|
|
};
|
|
|
|
};
|
2021-01-09 10:05:03 +00:00
|
|
|
};
|
2020-04-24 23:36:52 +00:00
|
|
|
|
2021-02-16 17:04:54 +00:00
|
|
|
systemd.packages = [ cfg.package ];
|
|
|
|
|
|
|
|
systemd.services.podman.serviceConfig = {
|
|
|
|
ExecStart = [ "" "${cfg.package}/bin/podman $LOGGING system service" ];
|
|
|
|
};
|
|
|
|
|
|
|
|
systemd.sockets.podman.wantedBy = [ "sockets.target" ];
|
2021-06-01 10:57:12 +00:00
|
|
|
systemd.sockets.podman.socketConfig.SocketGroup = "podman";
|
|
|
|
|
2022-06-16 17:23:12 +00:00
|
|
|
systemd.user.services.podman.serviceConfig = {
|
|
|
|
ExecStart = [ "" "${cfg.package}/bin/podman $LOGGING system service" ];
|
|
|
|
};
|
|
|
|
|
|
|
|
systemd.user.sockets.podman.wantedBy = [ "sockets.target" ];
|
|
|
|
|
2021-06-01 10:57:12 +00:00
|
|
|
systemd.tmpfiles.packages = [
|
|
|
|
# The /run/podman rule interferes with our podman group, so we remove
|
|
|
|
# it and let the systemd socket logic take care of it.
|
|
|
|
(pkgs.runCommand "podman-tmpfiles-nixos" { package = cfg.package; } ''
|
|
|
|
mkdir -p $out/lib/tmpfiles.d/
|
|
|
|
grep -v 'D! /run/podman 0700 root root' \
|
|
|
|
<$package/lib/tmpfiles.d/podman.conf \
|
|
|
|
>$out/lib/tmpfiles.d/podman.conf
|
2022-08-21 13:32:41 +00:00
|
|
|
'')
|
|
|
|
];
|
2021-02-16 17:04:54 +00:00
|
|
|
|
2021-06-01 10:57:12 +00:00
|
|
|
systemd.tmpfiles.rules =
|
|
|
|
lib.optionals cfg.dockerSocket.enable [
|
|
|
|
"L! /run/docker.sock - - - - /run/podman/podman.sock"
|
|
|
|
];
|
|
|
|
|
2022-08-21 13:32:41 +00:00
|
|
|
users.groups.podman = { };
|
2021-02-16 17:04:54 +00:00
|
|
|
|
2021-01-09 10:05:03 +00:00
|
|
|
assertions = [
|
|
|
|
{
|
|
|
|
assertion = cfg.dockerCompat -> !config.virtualisation.docker.enable;
|
|
|
|
message = "Option dockerCompat conflicts with docker";
|
|
|
|
}
|
2021-06-01 10:57:12 +00:00
|
|
|
{
|
|
|
|
assertion = cfg.dockerSocket.enable -> !config.virtualisation.docker.enable;
|
|
|
|
message = ''
|
|
|
|
The options virtualisation.podman.dockerSocket.enable and virtualisation.docker.enable conflict, because only one can serve the socket.
|
|
|
|
'';
|
|
|
|
}
|
2021-01-09 10:05:03 +00:00
|
|
|
];
|
|
|
|
}
|
|
|
|
]);
|
2020-04-24 23:36:52 +00:00
|
|
|
}
|