blob: a69cfe6ca22e7839b8db3dc0fc772ea92ca21e05 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
|
# broken, muchsync cant sync into the folders which should be handles by bindfs
# ls -la also does not show the full directory permissions
{ config, lib, pkgs, ... }:
with import <stockholm/lib>;
let
cname = "green";
in {
imports = [
<stockholm/lass/2configs/container-networking.nix>
<stockholm/lass/2configs/syncthing.nix>
];
programs.fuse.userAllowOther = true;
services.syncthing.declarative.folders."/var/lib/sync-containers/${cname}/securefs" = {
devices = [ "icarus" "skynet" "littleT" "shodan" "mors" "morpheus" ];
ignorePerms = false;
};
krebs.permown."/var/lib/sync-containers/${cname}/securefs" = {
file-mode = "u+rw";
directory-mode = "u+rwx";
owner = "syncthing";
keepGoing = false;
};
systemd.services."container@${cname}".reloadIfChanged = mkForce false;
containers.${cname} = {
config = { ... }: {
environment.systemPackages = [
pkgs.git
pkgs.rxvt-unicode-unwrapped.terminfo
];
services.openssh.enable = true;
users.users.root.openssh.authorizedKeys.keys = [
config.krebs.users.lass.pubkey
];
system.activationScripts.fuse = {
text = ''
${pkgs.coreutils}/bin/mknod /dev/fuse c 10 229
'';
deps = [];
};
};
allowedDevices = [
{ modifier = "rwm"; node = "/dev/fuse"; }
];
autoStart = false;
enableTun = true;
privateNetwork = true;
hostAddress = "10.233.2.15"; # TODO find way to automatically calculate IPs
localAddress = "10.233.2.16"; # TODO find way to automatically calculate IPs
};
environment.systemPackages = [
(pkgs.writeDashBin "start-${cname}" ''
set -euf
set -x
mkdir -p /var/lib/containers/${cname}/var/state
if ! mount | grep -q 'securefs on /var/lib/containers/${cname}/var/state type fuse.securefs'; then
if ! ${pkgs.securefs}/bin/securefs info /var/lib/sync-containers/${cname}/securefs; then
${pkgs.securefs}/bin/securefs create --format 4 /var/lib/sync-containers/${cname}/securefs
fi
${pkgs.securefs}/bin/securefs mount -b \
-o allow_other -o default_permissions \
--log /var/lib/sync-containers/${cname}/securefs.log \
/var/lib/sync-containers/${cname}/securefs /var/lib/containers/${cname}/var/state
fi
STATE=$(${pkgs.nixos-container}/bin/nixos-container status ${cname})
if [ "$STATE" = 'down' ]; then
${pkgs.nixos-container}/bin/nixos-container start ${cname}
fi
${pkgs.nixos-container}/bin/nixos-container run ${cname} -- ${pkgs.writeDash "deploy-${cname}" ''
set -x
mkdir -p /var/state/var_src
ln -sfTr /var/state/var_src /var/src
touch /etc/NIXOS
''}
if [ -h /var/lib/containers/${cname}/var/src/nixos-config ] && (! ping -c1 -q -w5 ${cname}.r); then
${pkgs.nixos-container}/bin/nixos-container run ${cname} -- nixos-rebuild -I /var/src switch
fi
'')
(pkgs.writeDashBin "stop-${cname}" ''
set -euf
${pkgs.nixos-container}/bin/nixos-container stop ${cname}
umount /var/lib/containers/${cname}/var/state
'')
];
}
|