mirror of
https://github.com/NixOS/nixpkgs.git
synced 2025-07-08 11:35:37 +03:00
Merge master into staging-next
This commit is contained in:
commit
a7f4ae0644
73 changed files with 899 additions and 238 deletions
|
@ -1527,6 +1527,7 @@
|
|||
./tasks/filesystems/jfs.nix
|
||||
./tasks/filesystems/nfs.nix
|
||||
./tasks/filesystems/ntfs.nix
|
||||
./tasks/filesystems/overlayfs.nix
|
||||
./tasks/filesystems/reiserfs.nix
|
||||
./tasks/filesystems/sshfs.nix
|
||||
./tasks/filesystems/squashfs.nix
|
||||
|
|
|
@ -64,8 +64,7 @@ in
|
|||
example = "--max-freed $((64 * 1024**3))";
|
||||
type = lib.types.singleLineStr;
|
||||
description = lib.mdDoc ''
|
||||
Options given to {file}`nix-collect-garbage` when the
|
||||
garbage collector is run automatically.
|
||||
Options given to [`nix-collect-garbage`](https://nixos.org/manual/nix/stable/command-ref/nix-collect-garbage) when the garbage collector is run automatically.
|
||||
'';
|
||||
};
|
||||
|
||||
|
|
144
nixos/modules/tasks/filesystems/overlayfs.nix
Normal file
144
nixos/modules/tasks/filesystems/overlayfs.nix
Normal file
|
@ -0,0 +1,144 @@
|
|||
{ config, lib, pkgs, utils, ... }:
|
||||
|
||||
let
|
||||
# The scripted initrd contains some magic to add the prefix to the
|
||||
# paths just in time, so we don't add it here.
|
||||
sysrootPrefix = fs:
|
||||
if config.boot.initrd.systemd.enable && (utils.fsNeededForBoot fs) then
|
||||
"/sysroot"
|
||||
else
|
||||
"";
|
||||
|
||||
# Returns a service that creates the required directories before the mount is
|
||||
# created.
|
||||
preMountService = _name: fs:
|
||||
let
|
||||
prefix = sysrootPrefix fs;
|
||||
|
||||
escapedMountpoint = utils.escapeSystemdPath (prefix + fs.mountPoint);
|
||||
mountUnit = "${escapedMountpoint}.mount";
|
||||
|
||||
upperdir = prefix + fs.overlay.upperdir;
|
||||
workdir = prefix + fs.overlay.workdir;
|
||||
in
|
||||
lib.mkIf (fs.overlay.upperdir != null)
|
||||
{
|
||||
"rw-${escapedMountpoint}" = {
|
||||
requiredBy = [ mountUnit ];
|
||||
before = [ mountUnit ];
|
||||
unitConfig = {
|
||||
DefaultDependencies = false;
|
||||
RequiresMountsFor = "${upperdir} ${workdir}";
|
||||
};
|
||||
serviceConfig = {
|
||||
Type = "oneshot";
|
||||
ExecStart = "${pkgs.coreutils}/bin/mkdir -p -m 0755 ${upperdir} ${workdir}";
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
overlayOpts = { config, ... }: {
|
||||
|
||||
options.overlay = {
|
||||
|
||||
lowerdir = lib.mkOption {
|
||||
type = with lib.types; nullOr (nonEmptyListOf (either str pathInStore));
|
||||
default = null;
|
||||
description = lib.mdDoc ''
|
||||
The list of path(s) to the lowerdir(s).
|
||||
|
||||
To create a writable overlay, you MUST provide an upperdir and a
|
||||
workdir.
|
||||
|
||||
You can create a read-only overlay when you provide multiple (at
|
||||
least 2!) lowerdirs and neither an upperdir nor a workdir.
|
||||
'';
|
||||
};
|
||||
|
||||
upperdir = lib.mkOption {
|
||||
type = lib.types.nullOr lib.types.str;
|
||||
default = null;
|
||||
description = lib.mdDoc ''
|
||||
The path to the upperdir.
|
||||
|
||||
If this is null, a read-only overlay is created using the lowerdir.
|
||||
|
||||
If you set this to some value you MUST also set `workdir`.
|
||||
'';
|
||||
};
|
||||
|
||||
workdir = lib.mkOption {
|
||||
type = lib.types.nullOr lib.types.str;
|
||||
default = null;
|
||||
description = lib.mdDoc ''
|
||||
The path to the workdir.
|
||||
|
||||
This MUST be set if you set `upperdir`.
|
||||
'';
|
||||
};
|
||||
|
||||
};
|
||||
|
||||
config = lib.mkIf (config.overlay.lowerdir != null) {
|
||||
fsType = "overlay";
|
||||
device = lib.mkDefault "overlay";
|
||||
|
||||
options =
|
||||
let
|
||||
prefix = sysrootPrefix config;
|
||||
|
||||
lowerdir = map (s: prefix + s) config.overlay.lowerdir;
|
||||
upperdir = prefix + config.overlay.upperdir;
|
||||
workdir = prefix + config.overlay.workdir;
|
||||
in
|
||||
[
|
||||
"lowerdir=${lib.concatStringsSep ":" lowerdir}"
|
||||
] ++ lib.optionals (config.overlay.upperdir != null) [
|
||||
"upperdir=${upperdir}"
|
||||
"workdir=${workdir}"
|
||||
] ++ (map (s: "x-systemd.requires-mounts-for=${s}") lowerdir);
|
||||
};
|
||||
|
||||
};
|
||||
in
|
||||
|
||||
{
|
||||
|
||||
options = {
|
||||
|
||||
# Merge the overlay options into the fileSystems option.
|
||||
fileSystems = lib.mkOption {
|
||||
type = lib.types.attrsOf (lib.types.submodule [ overlayOpts ]);
|
||||
};
|
||||
|
||||
};
|
||||
|
||||
config =
|
||||
let
|
||||
overlayFileSystems = lib.filterAttrs (_name: fs: (fs.overlay.lowerdir != null)) config.fileSystems;
|
||||
initrdFileSystems = lib.filterAttrs (_name: utils.fsNeededForBoot) overlayFileSystems;
|
||||
userspaceFileSystems = lib.filterAttrs (_name: fs: (!utils.fsNeededForBoot fs)) overlayFileSystems;
|
||||
in
|
||||
{
|
||||
|
||||
boot.initrd.availableKernelModules = lib.mkIf (initrdFileSystems != { }) [ "overlay" ];
|
||||
|
||||
assertions = lib.concatLists (lib.mapAttrsToList
|
||||
(_name: fs: [
|
||||
{
|
||||
assertion = (fs.overlay.upperdir == null) == (fs.overlay.workdir == null);
|
||||
message = "You cannot define a `lowerdir` without a `workdir` and vice versa for mount point: ${fs.mountPoint}";
|
||||
}
|
||||
{
|
||||
assertion = (fs.overlay.lowerdir != null && fs.overlay.upperdir == null) -> (lib.length fs.overlay.lowerdir) >= 2;
|
||||
message = "A read-only overlay (without an `upperdir`) requires at least 2 `lowerdir`s: ${fs.mountPoint}";
|
||||
}
|
||||
])
|
||||
config.fileSystems);
|
||||
|
||||
boot.initrd.systemd.services = lib.mkMerge (lib.mapAttrsToList preMountService initrdFileSystems);
|
||||
systemd.services = lib.mkMerge (lib.mapAttrsToList preMountService userspaceFileSystems);
|
||||
|
||||
};
|
||||
|
||||
}
|
|
@ -1066,10 +1066,18 @@ in
|
|||
''}
|
||||
'';
|
||||
|
||||
systemd.tmpfiles.rules = lib.mkIf config.boot.initrd.systemd.enable [
|
||||
"f /etc/NIXOS 0644 root root -"
|
||||
"d /boot 0644 root root -"
|
||||
];
|
||||
systemd.tmpfiles.settings."10-qemu-vm" = lib.mkIf config.boot.initrd.systemd.enable {
|
||||
"/etc/NIXOS".f = {
|
||||
mode = "0644";
|
||||
user = "root";
|
||||
group = "root";
|
||||
};
|
||||
"${config.boot.loader.efi.efiSysMountPoint}".d = {
|
||||
mode = "0644";
|
||||
user = "root";
|
||||
group = "root";
|
||||
};
|
||||
};
|
||||
|
||||
# After booting, register the closure of the paths in
|
||||
# `virtualisation.additionalPaths' in the Nix database in the VM. This
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue