1
0
Fork 0
mirror of https://github.com/nix-community/home-manager synced 2024-11-27 05:29:46 +01:00

podman: install package if enabled and create config files

This commit is contained in:
Dawid Dziurla 2024-11-04 11:36:05 +01:00
parent 8f6ca7855d
commit 02dfe57e5d
No known key found for this signature in database
GPG key ID: 7B6D8368172E9B0B
7 changed files with 167 additions and 3 deletions

View file

@ -1,6 +1,8 @@
{ config, pkgs, lib, ... }:
{
let
cfg = config.services.podman;
toml = pkgs.formats.toml { };
in {
meta.maintainers = with lib.hm.maintainers; [ bamhm182 n-hass ];
imports =
@ -8,10 +10,87 @@
options.services.podman = {
enable = lib.mkEnableOption "Podman, a daemonless container engine";
containersConf.settings = lib.mkOption {
type = toml.type;
default = { };
description = "containers.conf configuration";
};
storage.settings = lib.mkOption {
type = toml.type;
description = "storage.conf configuration";
};
registries = {
search = lib.mkOption {
type = lib.types.listOf lib.types.str;
default = [ "docker.io" ];
description = ''
List of repositories to search.
'';
};
insecure = lib.mkOption {
default = [ ];
type = lib.types.listOf lib.types.str;
description = ''
List of insecure repositories.
'';
};
block = lib.mkOption {
default = [ ];
type = lib.types.listOf lib.types.str;
description = ''
List of blocked repositories.
'';
};
};
policy = lib.mkOption {
default = { };
type = lib.types.attrs;
example = lib.literalExpression ''
{
default = [ { type = "insecureAcceptAnything"; } ];
transports = {
docker-daemon = {
"" = [ { type = "insecureAcceptAnything"; } ];
};
};
}
'';
description = ''
Signature verification policy file.
If this option is empty the default policy file from
`skopeo` will be used.
'';
};
};
config = lib.mkIf config.services.podman.enable {
config = lib.mkIf cfg.enable {
assertions =
[ (lib.hm.assertions.assertPlatform "podman" pkgs lib.platforms.linux) ];
home.packages = [ cfg.package ];
services.podman.storage.settings = {
storage.driver = lib.mkDefault "overlay";
};
xdg.configFile = {
"containers/policy.json".source = if cfg.policy != { } then
pkgs.writeText "policy.json" (builtins.toJSON cfg.policy)
else
"${pkgs.skopeo.policy}/default-policy.json";
"containers/registries.conf".source = toml.generate "registries.conf" {
registries = lib.mapAttrs (n: v: { registries = v; }) cfg.registries;
};
"containers/storage.conf".source =
toml.generate "storage.conf" cfg.storage.settings;
"containers/containers.conf".source =
toml.generate "containers.conf" cfg.containersConf.settings;
};
};
}

View file

@ -0,0 +1,10 @@
[network]
default_subnet = "172.16.10.0/24"
[[network.default_subnet_pools]]
base = "172.16.11.0/24"
size = 24
[[network.default_subnet_pools]]
base = "172.16.12.0/24"
size = 24

View file

@ -0,0 +1 @@
{"default":[{"type":"insecureAcceptAnything"}]}

View file

@ -0,0 +1,8 @@
[registries.block]
registries = ["ghcr.io", "gallery.ecr.aws"]
[registries.insecure]
registries = ["quay.io"]
[registries.search]
registries = ["docker.io"]

View file

@ -0,0 +1,4 @@
[storage]
driver = "overlay"
graphroot = "$HOME/.containers/graphroot"
runroot = "$HOME/.containers/runroot"

View file

@ -0,0 +1,61 @@
{ ... }:
{
services.podman = {
enable = true;
containersConf.settings = {
network = {
default_subnet = "172.16.10.0/24";
default_subnet_pools = [
{
base = "172.16.11.0/24";
size = 24;
}
{
base = "172.16.12.0/24";
size = 24;
}
];
};
};
storage.settings = {
storage = {
runroot = "$HOME/.containers/runroot";
graphroot = "$HOME/.containers/graphroot";
};
};
registries = {
block = [ "ghcr.io" "gallery.ecr.aws" ];
insecure = [ "quay.io" ];
search = [ "docker.io" ];
};
policy = { default = [{ type = "insecureAcceptAnything"; }]; };
};
nmt.script = ''
configPath=home-files/.config/containers
containersFile=$configPath/containers.conf
policyFile=$configPath/policy.json
registriesFile=$configPath/registries.conf
storageFile=$configPath/storage.conf
assertFileExists $containersFile
assertFileExists $policyFile
assertFileExists $registriesFile
assertFileExists $storageFile
containersFile=$(normalizeStorePaths $containersFile)
policyFile=$(normalizeStorePaths $policyFile)
registriesFile=$(normalizeStorePaths $registriesFile)
storageFile=$(normalizeStorePaths $storageFile)
assertFileContent $containersFile ${
./configuration-containers-expected.conf
}
assertFileContent $policyFile ${./configuration-policy-expected.json}
assertFileContent $registriesFile ${
./configuration-registries-expected.conf
}
assertFileContent $storageFile ${./configuration-storage-expected.conf}
'';
}

View file

@ -1,4 +1,5 @@
{
podman-configuration = ./configuration.nix;
podman-container = ./container.nix;
podman-integration = ./integration.nix;
podman-manifest = ./manifest.nix;