summaryrefslogtreecommitdiffstats
path: root/nixos
diff options
context:
space:
mode:
authorNikolay Amiantov <ab@fmap.me>2021-12-15 01:07:58 +0300
committerNikolay Amiantov <ab@fmap.me>2021-12-22 14:23:23 +0300
commitab64310a5e5534a8c96d6523ba5a765d27beceaf (patch)
treedf239bf068804458e7a61b8d8df862c5f09f304a /nixos
parent721fde93ffcc941b7486e3ec77121d9a8ddbd64f (diff)
docker-rootless service: init
Diffstat (limited to 'nixos')
-rw-r--r--nixos/doc/manual/from_md/release-notes/rl-2205.section.xml8
-rw-r--r--nixos/doc/manual/release-notes/rl-2205.section.md1
-rw-r--r--nixos/modules/module-list.nix1
-rw-r--r--nixos/modules/virtualisation/docker-rootless.nix98
-rw-r--r--nixos/tests/all-tests.nix1
-rw-r--r--nixos/tests/docker-rootless.nix41
6 files changed, 150 insertions, 0 deletions
diff --git a/nixos/doc/manual/from_md/release-notes/rl-2205.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2205.section.xml
index ae6ff9d434ae..d11b29a6334d 100644
--- a/nixos/doc/manual/from_md/release-notes/rl-2205.section.xml
+++ b/nixos/doc/manual/from_md/release-notes/rl-2205.section.xml
@@ -35,6 +35,14 @@
</listitem>
<listitem>
<para>
+ <link xlink:href="https://docs.docker.com/engine/security/rootless/">rootless
+ Docker</link>, a <literal>systemd --user</literal> Docker
+ service which runs without root permissions. Available as
+ <link xlink:href="options.html#opt-virtualisation.docker.rootless.enable">virtualisation.docker.rootless.enable</link>.
+ </para>
+ </listitem>
+ <listitem>
+ <para>
<link xlink:href="https://www.elastic.co/guide/en/beats/filebeat/current/filebeat-overview.html">filebeat</link>,
a lightweight shipper for forwarding and centralizing log
data. Available as
diff --git a/nixos/doc/manual/release-notes/rl-2205.section.md b/nixos/doc/manual/release-notes/rl-2205.section.md
index 3e7f8d451b26..3990a3359b65 100644
--- a/nixos/doc/manual/release-notes/rl-2205.section.md
+++ b/nixos/doc/manual/release-notes/rl-2205.section.md
@@ -11,6 +11,7 @@ In addition to numerous new and upgraded packages, this release has the followin
## New Services {#sec-release-22.05-new-services}
- [aesmd](https://github.com/intel/linux-sgx#install-the-intelr-sgx-psw), the Intel SGX Architectural Enclave Service Manager. Available as [services.aesmd](#opt-services.aesmd.enable).
+- [rootless Docker](https://docs.docker.com/engine/security/rootless/), a `systemd --user` Docker service which runs without root permissions. Available as [virtualisation.docker.rootless.enable](options.html#opt-virtualisation.docker.rootless.enable).
- [filebeat](https://www.elastic.co/guide/en/beats/filebeat/current/filebeat-overview.html), a lightweight shipper for forwarding and centralizing log data. Available as [services.filebeat](#opt-services.filebeat.enable).
diff --git a/nixos/modules/module-list.nix b/nixos/modules/module-list.nix
index 30ad0db459ef..55de01735024 100644
--- a/nixos/modules/module-list.nix
+++ b/nixos/modules/module-list.nix
@@ -1187,6 +1187,7 @@
./virtualisation/oci-containers.nix
./virtualisation/cri-o.nix
./virtualisation/docker.nix
+ ./virtualisation/docker-rootless.nix
./virtualisation/ecs-agent.nix
./virtualisation/libvirtd.nix
./virtualisation/lxc.nix
diff --git a/nixos/modules/virtualisation/docker-rootless.nix b/nixos/modules/virtualisation/docker-rootless.nix
new file mode 100644
index 000000000000..0e7f05031420
--- /dev/null
+++ b/nixos/modules/virtualisation/docker-rootless.nix
@@ -0,0 +1,98 @@
+{ config, lib, pkgs, ... }:
+
+with lib;
+
+let
+
+ cfg = config.virtualisation.docker.rootless;
+ proxy_env = config.networking.proxy.envVars;
+ settingsFormat = pkgs.formats.json {};
+ daemonSettingsFile = settingsFormat.generate "daemon.json" cfg.daemon.settings;
+
+in
+
+{
+ ###### interface
+
+ options.virtualisation.docker.rootless = {
+ enable = mkOption {
+ type = types.bool;
+ default = false;
+ description = ''
+ This option enables docker in a rootless mode, a daemon that manages
+ linux containers. To interact with the daemon, one needs to set
+ <command>DOCKER_HOST=unix://$XDG_RUNTIME_DIR/docker.sock</command>.
+ '';
+ };
+
+ setSocketVariable = mkOption {
+ type = types.bool;
+ default = false;
+ description = ''
+ Point <command>DOCKER_HOST</command> to rootless Docker instance for
+ normal users by default.
+ '';
+ };
+
+ daemon.settings = mkOption {
+ type = settingsFormat.type;
+ default = { };
+ example = {
+ ipv6 = true;
+ "fixed-cidr-v6" = "fd00::/80";
+ };
+ description = ''
+ Configuration for docker daemon. The attributes are serialized to JSON used as daemon.conf.
+ See https://docs.docker.com/engine/reference/commandline/dockerd/#daemon-configuration-file
+ '';
+ };
+
+ package = mkOption {
+ default = pkgs.docker;
+ defaultText = literalExpression "pkgs.docker";
+ type = types.package;
+ example = literalExpression "pkgs.docker-edge";
+ description = ''
+ Docker package to be used in the module.
+ '';
+ };
+ };
+
+ ###### implementation
+
+ config = mkIf cfg.enable {
+ environment.systemPackages = [ cfg.package ];
+
+ environment.extraInit = optionalString cfg.setSocketVariable ''
+ if [ -z "$DOCKER_HOST" -a -n "$XDG_RUNTIME_DIR" ]; then
+ export DOCKER_HOST="unix://$XDG_RUNTIME_DIR/docker.sock"
+ fi
+ '';
+
+ # Taken from https://github.com/moby/moby/blob/master/contrib/dockerd-rootless-setuptool.sh
+ systemd.user.services.docker = {
+ wantedBy = [ "default.target" ];
+ description = "Docker Application Container Engine (Rootless)";
+ # needs newuidmap from pkgs.shadow
+ path = [ "/run/wrappers" ];
+ environment = proxy_env;
+ unitConfig.StartLimitInterval = "60s";
+ serviceConfig = {
+ Type = "notify";
+ ExecStart = "${cfg.package}/bin/dockerd-rootless --config-file=${daemonSettingsFile}";
+ ExecReload = "${pkgs.procps}/bin/kill -s HUP $MAINPID";
+ TimeoutSec = 0;
+ RestartSec = 2;
+ Restart = "always";
+ StartLimitBurst = 3;
+ LimitNOFILE = "infinity";
+ LimitNPROC = "infinity";
+ LimitCORE = "infinity";
+ Delegate = true;
+ NotifyAccess = "all";
+ KillMode = "mixed";
+ };
+ };
+ };
+
+}
diff --git a/nixos/tests/all-tests.nix b/nixos/tests/all-tests.nix
index 8f4d800abbfd..779519b965db 100644
--- a/nixos/tests/all-tests.nix
+++ b/nixos/tests/all-tests.nix
@@ -104,6 +104,7 @@ in
dnscrypt-wrapper = handleTestOn ["x86_64-linux"] ./dnscrypt-wrapper {};
doas = handleTest ./doas.nix {};
docker = handleTestOn ["x86_64-linux"] ./docker.nix {};
+ docker-rootless = handleTestOn ["x86_64-linux"] ./docker-rootless.nix {};
docker-edge = handleTestOn ["x86_64-linux"] ./docker-edge.nix {};
docker-registry = handleTest ./docker-registry.nix {};
docker-tools = handleTestOn ["x86_64-linux"] ./docker-tools.nix {};
diff --git a/nixos/tests/docker-rootless.nix b/nixos/tests/docker-rootless.nix
new file mode 100644
index 000000000000..e2a926eb3cb0
--- /dev/null
+++ b/nixos/tests/docker-rootless.nix
@@ -0,0 +1,41 @@
+# This test runs docker and checks if simple container starts
+
+import ./make-test-python.nix ({ lib, pkgs, ...} : {
+ name = "docker-rootless";
+ meta = with pkgs.lib.maintainers; {
+ maintainers = [ abbradar ];
+ };
+
+ nodes = {
+ machine = { pkgs, ... }: {
+ virtualisation.docker.rootless.enable = true;
+
+ users.users.alice = {
+ uid = 1000;
+ isNormalUser = true;
+ };
+ };
+ };
+
+ testScript = { nodes, ... }:
+ let
+ user = nodes.machine.config.users.users.alice;
+ sudo = lib.concatStringsSep " " [
+ "XDG_RUNTIME_DIR=/run/user/${toString user.uid}"
+ "DOCKER_HOST=unix:///run/user/${toString user.uid}/docker.sock"
+ "sudo" "--preserve-env=XDG_RUNTIME_DIR,DOCKER_HOST" "-u" "alice"
+ ];
+ in ''
+ machine.wait_for_unit("multi-user.target")
+
+ machine.succeed("loginctl enable-linger alice")
+ machine.wait_until_succeeds("${sudo} systemctl --user is-active docker.service")
+
+ machine.succeed("tar cv --files-from /dev/null | ${sudo} docker import - scratchimg")
+ machine.succeed(
+ "${sudo} docker run -d --name=sleeping -v /nix/store:/nix/store -v /run/current-system/sw/bin:/bin scratchimg /bin/sleep 10"
+ )
+ machine.succeed("${sudo} docker ps | grep sleeping")
+ machine.succeed("${sudo} docker stop sleeping")
+ '';
+})