1
0
Fork 0
mirror of https://github.com/LnL7/nix-darwin.git synced 2025-03-31 04:04:45 +00:00

colima: init

Allows the user to enable the Colima container runtime for macOS. Normally
Colima is run inside the current user's their context, but I wanted to use
Colima closer to how Docker works on Linux. Where the Docker daemon on Linux is
run as the root user, and users have to either run the docker command with sudo,
or add themselves to the docker group. Effectively enabling multi-user
interaction on macOS.

Just enabling the following config doesn't do a whole lot, as the user would
have to log in as the colima user to interact with the colima VM.

    services.colima.enable = true;

Instead, this module is meant to be used as follows, so that the user can use
Colima as a Docker Desktop for macOS alternative.

    services.colima = {
      enable = true;
      enableDockerCompatability = true;
    };

This will set up everything for the Docker CLI to work with the Colima VM under
the hood.

Co-authored-by: Sam <30577766+Samasaur1@users.noreply.github.com>
Refs: https://github.com/abiosoft/colima
This commit is contained in:
Bryan Honof 2025-01-16 18:23:58 +01:00
parent bd921223ba
commit ec825fd76e
No known key found for this signature in database
5 changed files with 241 additions and 0 deletions

View file

@ -39,11 +39,13 @@ in
ids.uids = {
nixbld = lib.mkDefault 350;
_prometheus-node-exporter = 534;
colima = 400;
};
ids.gids = {
nixbld = lib.mkDefault (if config.system.stateVersion < 5 then 30000 else 350);
_prometheus-node-exporter = 534;
_colima = 400;
};
};

View file

@ -61,6 +61,7 @@
./services/buildkite-agents.nix
./services/chunkwm.nix
./services/cachix-agent.nix
./services/colima
./services/dnsmasq.nix
./services/emacs.nix
./services/eternal-terminal.nix

View file

@ -0,0 +1,192 @@
{
config,
lib,
pkgs,
...
}:
with lib;
let
cfg = config.services.colima;
user = config.users.users."colima";
group = config.users.groups."_colima";
in
{
options.services.colima = {
enable = mkEnableOption "Colima, a macOS container runtime";
enableDockerCompatability = mkOption {
type = types.bool;
default = false;
description = ''
Create a symlink from Colima's socket to /var/run/docker.sock, and set
its permissions so that users part of the _colima group can use it.
'';
};
package = mkPackageOption pkgs "colima" { };
stateDir = lib.mkOption {
type = types.path;
default = "/var/lib/colima";
description = "State directory of the Colima process.";
};
logFile = mkOption {
type = types.path;
default = "/var/log/colima.log";
description = "Combined stdout and stderr of the colima process. Set to /dev/null to disable.";
};
groupMembers = mkOption {
type = types.listOf types.str;
default = [ ];
description = ''
List of users that should be added to the _colima group.
Only has effect with enableDockerCompatability enabled.
'';
};
runtime = mkOption {
type = types.enum [
"docker"
"containerd"
"incus"
];
default = "docker";
description = "The runtime to use with Colima.";
};
architectue = mkOption {
type = types.enum [
"x86_64"
"aarch64"
"host"
];
default = "host";
description = "The architecture to use for the Colima virtual machine.";
};
extraFlags = mkOption {
type = types.listOf types.str;
default = [ ];
example = [ "--vz-rosetta" ];
description = "Extra commandline options to pass to the colima start command.";
};
vmType = mkOption {
type = types.enum [
"qemu"
"vz"
];
default = "vz";
description = "Virtual machine type to use with Colima.";
};
};
config = mkMerge [
(mkIf cfg.enableDockerCompatability {
assertions = [
{
assertion = !cfg.enable;
message = "services.colima.enableDockerCompatability doesn't make sense without enabling services.colima.enable";
}
];
launchd.daemons.colima-docker-compat = {
script = ''
# Wait for the docker socket to be created. This is important when
# we enabled Colima and Docker compatability at the same time, for
# the first time. Colima takes a while creating the VM.
until [ -S ${cfg.stateDir}/.colima/default/docker.sock ]
do
sleep 5
done
chmod g+rw ${cfg.stateDir}/.colima/default/docker.sock
ln -sf ${cfg.stateDir}/.colima/default/docker.sock /var/run/docker.sock
'';
serviceConfig = {
RunAtLoad = true;
EnvironmentVariables.PATH = "/usr/bin:/bin:/usr/sbin:/sbin";
};
};
users.groups."_colima".members = cfg.groupMembers;
environment.systemPackages = [
pkgs.docker
];
})
(mkIf cfg.enable {
launchd.daemons.colima = {
script =
concatStringsSep " " [
"exec"
(getExe cfg.package)
"start"
"--foreground"
"--runtime ${cfg.runtime}"
"--arch ${cfg.architectue}"
"--vm-type ${cfg.vmType}"
]
+ escapeShellArgs cfg.extraFlags;
serviceConfig = {
KeepAlive = true;
RunAtLoad = true;
StandardErrorPath = cfg.logFile;
StandardOutPath = cfg.logFile;
GroupName = group.name;
UserName = user.name;
WorkingDirectory = cfg.stateDir;
EnvironmentVariables = {
PATH = "${pkgs.colima}/bin:${pkgs.docker}/bin:/usr/bin:/bin:/usr/sbin:/sbin";
COLIMA_HOME = "${cfg.stateDir}/.colima";
};
};
};
system.activationScripts.preActivation.text = ''
touch '${cfg.logFile}'
chown ${toString user.uid}:${toString user.gid} '${cfg.logFile}'
'';
users = {
knownGroups = [
"colima"
"_colima"
];
knownUsers = [
"colima"
"_colima"
];
};
users.users."colima" = {
uid = config.ids.uids.colima;
gid = config.ids.gids._colima;
home = cfg.stateDir;
# The username isn't allowed to have an underscore in the beginning of
# its name, otherwise the VM will fail to start with the following error
# > "[hostagent] identifier \"_colima\" must match ^[A-Za-z0-9]+(?:[._-](?:[A-Za-z0-9]+))*$: invalid argument" fields.level=fatal
name = "colima";
createHome = true;
shell = "/bin/bash";
description = "System user for Colima";
};
users.groups."_colima" = {
gid = config.ids.gids._colima;
name = "_colima";
description = "System group for Colima";
};
})
];
meta.maintainers = [
lib.maintainers.bryanhonof or "bryanhonof"
];
}

View file

@ -97,6 +97,7 @@ in {
tests.services-activate-system = makeTest ./tests/services-activate-system.nix;
tests.services-activate-system-changed-label-prefix = makeTest ./tests/services-activate-system-changed-label-prefix.nix;
tests.services-buildkite-agent = makeTest ./tests/services-buildkite-agent.nix;
tests.services-colima = makeTest ./tests/services-colima.nix;
tests.services-github-runners = makeTest ./tests/services-github-runners.nix;
tests.services-lorri = makeTest ./tests/services-lorri.nix;
tests.services-nix-daemon = makeTest ./tests/services-nix-daemon.nix;

45
tests/services-colima.nix Normal file
View file

@ -0,0 +1,45 @@
{ config, pkgs, ... }:
let
colima = pkgs.runCommand "colima-0.0.0" { } "mkdir $out";
in
{
services.colima = {
enable = true;
enableDockerCompatability = true;
package = colima;
groupMembers = [ "john" "jane" ];
};
test = ''
echo "checking colima service in /Library/LaunchDaemons" >&2
grep "org.nixos.colima" ${config.out}/Library/LaunchDaemons/org.nixos.colima.plist
grep "${colima}/bin/dnsmasq" ${config.out}/Library/LaunchDaemons/org.nixos.colima.plist
echo "checking colima docker compat service in /Library/LaunchDaemons" >&2
grep "org.nixos.colima-docker-compat" ${config.out}/Library/LaunchDaemons/org.nixos.colima-docker-compat.plist
echo "checking colima config" >&2
grep -F "--foreground" ${config.out}/Library/LaunchDaemons/org.nixos.colima.plist
grep -F "--runtime docker" ${config.out}/Library/LaunchDaemons/org.nixos.colima.plist
grep -F "--architectue host" ${config.out}/Library/LaunchDaemons/org.nixos.colima.plist
echo "checking user creation in /activate" >&2
grep "sysadminctl -addUser ${lib.escapeShellArgs [ "foo" "-UID" config.ids.uids.colima "-GID" config.ids.uids._colima "-fullName" "colima" "-home" "/var/lib/colima" "-shell" "/bin/bash" ]}" ${config.out}/activate
grep "createhomedir -cu ${lib.escapeShellArg "colima"}" ${config.out}/activate
grep "sysadminctl -addUser ${lib.escapeShellArgs [ "colima" "-UID" config.ids.uids.colima ]} .* ${lib.escapeShellArgs [ "-shell" "/bin/bash" ] }" ${config.out}/activate
grep "sysadminctl -addUser ${lib.escapeShellArg "colima"} .* ${lib.escapeShellArgs [ "-home" "/var/lib/colima" ]}" ${config.out}/activate
(! grep "dscl . -delete ${lib.escapeShellArg "/Users/colima"}" ${config.out}/activate)
(! grep "dscl . -delete ${lib.escapeShellArg "/Groups/_colima"}" ${config.out}/activate)
echo "checking group creation in /activate" >&2
grep "dscl . -create ${lib.escapeShellArg "/Groups/_colima"} PrimaryGroupID ${builtins.toString config.ids.gids._colima}" ${config.out}/activate
grep "dscl . -create ${lib.escapeShellArg "/Groups/_colima"} RealName ${lib.escapeShellArg "_colima"}" ${config.out}/activate
grep "dscl . -create ${lib.escapeShellArg "/Groups/_colima"} PrimaryGroupID ${builtins.toString config.ids.gids._colima}" ${config.out}/activate
(! grep "dscl . -delete ${lib.escapeShellArg "/Groups/_colima"}" ${config.out}/activate)
echo "checking group membership in /activate" >&2
grep "dscl . -create ${lib.escapeShellArg "/Groups/_colima"} GroupMembership ${lib.escapeShellArgs [ "john" "jane" ]}" ${config.out}/activate
'';
}