Merge branch 'no-aufs' into systemd

This commit is contained in:
Shea Levy 2012-12-17 13:02:35 -05:00
commit 835ee30b32
8 changed files with 76 additions and 50 deletions

View File

@ -192,15 +192,7 @@ in
options = "loop"; options = "loop";
}; };
# We need squashfs in the initrd to mount the compressed Nix store, boot.initrd.availableKernelModules = [ "squashfs" "iso9660" ];
# and aufs to make the root filesystem appear writable.
boot.extraModulePackages =
if config.boot.kernelPackages.aufs == null then
abort "This kernel doesn't have aufs enabled"
else
[ config.boot.kernelPackages.aufs ];
boot.initrd.availableKernelModules = [ "aufs" "squashfs" "iso9660" ];
boot.initrd.kernelModules = [ "loop" ]; boot.initrd.kernelModules = [ "loop" ];
@ -210,16 +202,20 @@ in
# /nix/store (the squashfs image) to make this a live CD. # /nix/store (the squashfs image) to make this a live CD.
boot.initrd.postMountCommands = boot.initrd.postMountCommands =
'' ''
mkdir /mnt-root-tmpfs mkdir -p /unionfs-chroot/ro-root
mount -t tmpfs -o "mode=755" none /mnt-root-tmpfs mount --rbind $targetRoot /unionfs-chroot/ro-root
mkdir /unionfs-chroot/rw-root
mount -t tmpfs -o "mode=755" none /unionfs-chroot/rw-root
mkdir /mnt-root-union mkdir /mnt-root-union
mount -t aufs -o dirs=/mnt-root-tmpfs=rw:$targetRoot=ro none /mnt-root-union unionfs -o allow_other,cow,chroot=/unionfs-chroot /rw-root=RW:/ro-root=RO /mnt-root-union
oldTargetRoot=$targetRoot
targetRoot=/mnt-root-union targetRoot=/mnt-root-union
mkdir /mnt-store-tmpfs mkdir /unionfs-chroot/rw-store
mount -t tmpfs -o "mode=755" none /mnt-store-tmpfs mount -t tmpfs -o "mode=755" none /unionfs-chroot/rw-store
mkdir -p $targetRoot/nix/store mkdir -p $oldTargetRoot/nix/store
mount -t aufs -o dirs=/mnt-store-tmpfs=rw:/mnt-root/nix/store=ro none /mnt-root-union/nix/store unionfs -o allow_other,cow,nonempty,chroot=/unionfs-chroot /rw-store=RW:/ro-root/nix/store=RO /mnt-root-union/nix/store
''; '';
# Closures to be copied to the Nix store on the CD, namely the init # Closures to be copied to the Nix store on the CD, namely the init
@ -311,7 +307,7 @@ in
''; '';
# Add vfat support to the initrd to enable people to copy the # Add vfat support to the initrd to enable people to copy the
# contents of the CD to a bootable USB stick. # contents of the CD to a bootable USB stick. Need unionfs-fuse for union mounts
boot.initrd.supportedFilesystems = [ "vfat" ]; boot.initrd.supportedFilesystems = [ "vfat" "unionfs-fuse" ];
} }

View File

@ -214,6 +214,7 @@
./tasks/filesystems/ext.nix ./tasks/filesystems/ext.nix
./tasks/filesystems/nfs.nix ./tasks/filesystems/nfs.nix
./tasks/filesystems/reiserfs.nix ./tasks/filesystems/reiserfs.nix
./tasks/filesystems/unionfs-fuse.nix
./tasks/filesystems/vfat.nix ./tasks/filesystems/vfat.nix
./tasks/filesystems/xfs.nix ./tasks/filesystems/xfs.nix
./tasks/kbd.nix ./tasks/kbd.nix

View File

@ -64,7 +64,7 @@ in
boot.extraModulePackages = mkOption { boot.extraModulePackages = mkOption {
default = []; default = [];
# !!! example = [pkgs.aufs pkgs.nvidia_x11]; # !!! example = [pkgs.nvidia_x11];
description = "A list of additional packages supplying kernel modules."; description = "A list of additional packages supplying kernel modules.";
}; };

View File

@ -332,8 +332,8 @@ exec 3>&-
udevadm control --exit || true udevadm control --exit || true
# Kill any remaining processes, just to be sure we're not taking any # Kill any remaining processes, just to be sure we're not taking any
# with us into stage 2. # with us into stage 2. unionfs-fuse mounts require the unionfs process.
pkill -9 -v 1 pkill -9 -v '(1|unionfs)'
if test -n "$debug1mounts"; then fail; fi if test -n "$debug1mounts"; then fail; fi

View File

@ -0,0 +1,19 @@
{ config, pkgs, ... }:
{
config = pkgs.lib.mkIf (pkgs.lib.any (fs: fs == "unionfs-fuse") config.boot.initrd.supportedFilesystems) {
boot.initrd.kernelModules = [ "fuse" ];
boot.initrd.extraUtilsCommands = ''
cp -v ${pkgs.fuse}/lib/libfuse* $out/lib
cp -v ${pkgs.unionfs-fuse}/bin/unionfs $out/bin
'';
boot.initrd.postDeviceCommands = ''
# Hacky!!! fuse hard-codes the path to mount
mkdir -p /nix/store/eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee-${pkgs.utillinux.name}/bin
ln -s $(which mount) /nix/store/eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee-${pkgs.utillinux.name}/bin
ln -s $(which umount) /nix/store/eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee-${pkgs.utillinux.name}/bin
'';
};
}

View File

@ -64,11 +64,9 @@ with pkgs.lib;
fileSystems."/".device = "/dev/disk/by-label/nixos"; fileSystems."/".device = "/dev/disk/by-label/nixos";
boot.initrd.kernelModules = [ "xen-blkfront" "aufs" ]; boot.initrd.kernelModules = [ "xen-blkfront" ];
boot.kernelModules = [ "xen-netfront" ]; boot.kernelModules = [ "xen-netfront" ];
boot.extraModulePackages = [ config.boot.kernelPackages.aufs ];
# Generate a GRUB menu. Amazon's pv-grub uses this to boot our kernel/initrd. # Generate a GRUB menu. Amazon's pv-grub uses this to boot our kernel/initrd.
boot.loader.grub.device = "nodev"; boot.loader.grub.device = "nodev";
boot.loader.grub.timeout = 0; boot.loader.grub.timeout = 0;
@ -89,12 +87,12 @@ with pkgs.lib;
# while "m1.large" has two ephemeral filesystems and no swap # while "m1.large" has two ephemeral filesystems and no swap
# devices). Also, put /tmp and /var on /disk0, since it has a lot # devices). Also, put /tmp and /var on /disk0, since it has a lot
# more space than the root device. Similarly, "move" /nix to /disk0 # more space than the root device. Similarly, "move" /nix to /disk0
# by layering an AUFS on top of it so we have a lot more space for # by layering a unionfs-fuse mount on top of it so we have a lot more space for
# Nix operations. # Nix operations.
boot.initrd.postMountCommands = boot.initrd.postMountCommands =
'' ''
diskNr=0 diskNr=0
diskForAufs= diskForUnionfs=
for device in /dev/xvd[abcde]*; do for device in /dev/xvd[abcde]*; do
if [ "$device" = /dev/xvda -o "$device" = /dev/xvda1 ]; then continue; fi if [ "$device" = /dev/xvda -o "$device" = /dev/xvda1 ]; then continue; fi
fsType=$(blkid -o value -s TYPE "$device" || true) fsType=$(blkid -o value -s TYPE "$device" || true)
@ -106,25 +104,31 @@ with pkgs.lib;
diskNr=$((diskNr + 1)) diskNr=$((diskNr + 1))
echo "mounting $device on $mp..." echo "mounting $device on $mp..."
if mountFS "$device" "$mp" "" ext3; then if mountFS "$device" "$mp" "" ext3; then
if [ -z "$diskForAufs" ]; then diskForAufs="$mp"; fi if [ -z "$diskForUnionfs" ]; then diskForUnionfs="$mp"; fi
fi fi
else else
echo "skipping unknown device type $device" echo "skipping unknown device type $device"
fi fi
done done
if [ -n "$diskForAufs" ]; then if [ -n "$diskForUnionfs" ]; then
mkdir -m 755 -p $targetRoot/$diskForAufs/root mkdir -m 755 -p $targetRoot/$diskForUnionfs/root
mkdir -m 1777 -p $targetRoot/$diskForAufs/root/tmp $targetRoot/tmp mkdir -m 1777 -p $targetRoot/$diskForUnionfs/root/tmp $targetRoot/tmp
mount --bind $targetRoot/$diskForAufs/root/tmp $targetRoot/tmp mount --bind $targetRoot/$diskForUnionfs/root/tmp $targetRoot/tmp
if [ ! -e $targetRoot/.ebs ]; then if [ ! -e $targetRoot/.ebs ]; then
mkdir -m 755 -p $targetRoot/$diskForAufs/root/var $targetRoot/var mkdir -m 755 -p $targetRoot/$diskForUnionfs/root/var $targetRoot/var
mount --bind $targetRoot/$diskForAufs/root/var $targetRoot/var mount --bind $targetRoot/$diskForUnionfs/root/var $targetRoot/var
mkdir -m 755 -p $targetRoot/$diskForAufs/root/nix mkdir -p /unionfs-chroot/ro-nix
mount -t aufs -o dirs=$targetRoot/$diskForAufs/root/nix=rw:$targetRoot/nix=rr none $targetRoot/nix mount --rbind $targetRoot/nix /unionfs-chroot/ro-nix
mkdir -m 755 -p $targetRoot/$diskForUnionfs/root/nix
mkdir -p /unionfs-chroot/rw-nix
mount --rbind $targetRoot/$diskForUnionfs/root/nix /unionfs-chroot/rw-nix
unionfs -o allow_other,cow,nonempty,chroot=/unionfs-chroot /rw-nix=RW:/ro-nix=RO $targetRoot/nix
fi fi
fi fi
''; '';
@ -149,4 +153,6 @@ with pkgs.lib;
# Always include cryptsetup so that Charon can use it. # Always include cryptsetup so that Charon can use it.
environment.systemPackages = [ pkgs.cryptsetup ]; environment.systemPackages = [ pkgs.cryptsetup ];
boot.initrd.supportedFilesystems = [ "unionfs-fuse" ];
} }

View File

@ -72,10 +72,6 @@ with pkgs.lib;
boot.kernelParams = [ "console=ttyS0" ]; boot.kernelParams = [ "console=ttyS0" ];
boot.initrd.kernelModules = [ "aufs" ];
boot.extraModulePackages = [ config.boot.kernelPackages.aufs ];
boot.loader.grub.version = 2; boot.loader.grub.version = 2;
boot.loader.grub.device = "/dev/vda"; boot.loader.grub.device = "/dev/vda";
boot.loader.grub.timeout = 0; boot.loader.grub.timeout = 0;
@ -83,8 +79,8 @@ with pkgs.lib;
# Put /tmp and /var on /ephemeral0, which has a lot more space. # Put /tmp and /var on /ephemeral0, which has a lot more space.
# Unfortunately we can't do this with the `fileSystems' option # Unfortunately we can't do this with the `fileSystems' option
# because it has no support for creating the source of a bind # because it has no support for creating the source of a bind
# mount. Also, "move" /nix to /ephemeral0 by layering an AUFS # mount. Also, "move" /nix to /ephemeral0 by layering a unionfs-fuse
# on top of it so we have a lot more space for Nix operations. # mount on top of it so we have a lot more space for Nix operations.
/* /*
boot.initrd.postMountCommands = boot.initrd.postMountCommands =
'' ''
@ -96,9 +92,16 @@ with pkgs.lib;
mkdir -m 755 -p $targetRoot/var mkdir -m 755 -p $targetRoot/var
mount --bind $targetRoot/ephemeral0/var $targetRoot/var mount --bind $targetRoot/ephemeral0/var $targetRoot/var
mkdir -p /unionfs-chroot/ro-nix
mount --rbind $targetRoot/nix /unionfs-chroot/ro-nix
mkdir -p /unionfs-chroot/rw-nix
mkdir -m 755 -p $targetRoot/ephemeral0/nix mkdir -m 755 -p $targetRoot/ephemeral0/nix
mount -t aufs -o dirs=$targetRoot/ephemeral0/nix=rw:$targetRoot/nix=rr none $targetRoot/nix mount --rbind $targetRoot/ephemeral0/nix /unionfs-chroot/rw-nix
unionfs -o allow_other,cow,nonempty,chroot=/unionfs-chroot /rw-nix=RW:/ro-nix=RO $targetRoot/nix
''; '';
boot.initrd.supportedFilesystems = [ "unionfs-fuse" ];
*/ */
# Since Nova allows VNC access to instances, it's nice to start to # Since Nova allows VNC access to instances, it's nice to start to

View File

@ -95,7 +95,7 @@ let
description = description =
'' ''
If enabled, the Nix store in the VM is made writable by If enabled, the Nix store in the VM is made writable by
layering an AUFS/tmpfs filesystem on top of the host's Nix layering a unionfs-fuse/tmpfs filesystem on top of the host's Nix
store. store.
''; '';
}; };
@ -250,11 +250,9 @@ in
# CIFS. Also use paravirtualised network and block devices for # CIFS. Also use paravirtualised network and block devices for
# performance. # performance.
boot.initrd.availableKernelModules = boot.initrd.availableKernelModules =
[ "cifs" "nls_utf8" "hmac" "md4" "ecb" "des_generic" ] [ "cifs" "nls_utf8" "hmac" "md4" "ecb" "des_generic" ];
++ optional cfg.writableStore [ "aufs" ];
boot.extraModulePackages = boot.initrd.supportedFilesystems = optional cfg.writableStore "unionfs-fuse";
optional cfg.writableStore config.boot.kernelPackages.aufs;
boot.initrd.extraUtilsCommands = boot.initrd.extraUtilsCommands =
'' ''
@ -288,9 +286,12 @@ in
mkdir -p $targetRoot/boot mkdir -p $targetRoot/boot
mount -o remount,ro $targetRoot/nix/store mount -o remount,ro $targetRoot/nix/store
${optionalString cfg.writableStore '' ${optionalString cfg.writableStore ''
mkdir /mnt-store-tmpfs mkdir -p /unionfs-chroot/ro-store
mount -t tmpfs -o "mode=755" none /mnt-store-tmpfs mount --rbind $targetRoot/nix/store /unionfs-chroot/ro-store
mount -t aufs -o dirs=/mnt-store-tmpfs=rw:$targetRoot/nix/store=rr none $targetRoot/nix/store
mkdir /unionfs-chroot/rw-store
mount -t tmpfs -o "mode=755" none /unionfs-chroot/rw-store
unionfs -o allow_other,cow,nonempty,chroot=/unionfs-chroot /rw-store=RW:/ro-store=RO $targetRoot/nix/store
''} ''}
''; '';