2014-05-20 19:59:08 +00:00
|
|
|
|
;;; GNU Guix --- Functional package management for GNU
|
2022-04-16 14:13:34 +00:00
|
|
|
|
;;; Copyright © 2013-2022 Ludovic Courtès <ludo@gnu.org>
|
2020-09-27 17:16:39 +00:00
|
|
|
|
;;; Copyright © 2020 Google LLC
|
2020-04-26 15:58:58 +00:00
|
|
|
|
;;; Copyright © 2020 Jakub Kądziołka <kuba@kadziolka.net>
|
2021-06-30 18:20:01 +00:00
|
|
|
|
;;; Copyright © 2020, 2021 Maxim Cournoyer <maxim.cournoyer@gmail.com>
|
2021-05-15 13:29:40 +00:00
|
|
|
|
;;; Copyright © 2021 Tobias Geerinckx-Rice <me@tobias.gr>
|
2022-07-19 16:40:28 +00:00
|
|
|
|
;;; Copyright © 2022 Oleg Pykhalov <go.wigust@gmail.com>
|
2014-05-20 19:59:08 +00:00
|
|
|
|
;;;
|
|
|
|
|
;;; This file is part of GNU Guix.
|
|
|
|
|
;;;
|
|
|
|
|
;;; GNU Guix is free software; you can redistribute it and/or modify it
|
|
|
|
|
;;; under the terms of the GNU General Public License as published by
|
|
|
|
|
;;; the Free Software Foundation; either version 3 of the License, or (at
|
|
|
|
|
;;; your option) any later version.
|
|
|
|
|
;;;
|
|
|
|
|
;;; GNU Guix is distributed in the hope that it will be useful, but
|
|
|
|
|
;;; WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
|
;;; GNU General Public License for more details.
|
|
|
|
|
;;;
|
|
|
|
|
;;; You should have received a copy of the GNU General Public License
|
|
|
|
|
;;; along with GNU Guix. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
|
|
(define-module (gnu system file-systems)
|
2015-06-28 04:39:43 +00:00
|
|
|
|
#:use-module (ice-9 match)
|
2017-10-03 20:27:27 +00:00
|
|
|
|
#:use-module (rnrs bytevectors)
|
2017-02-06 14:42:00 +00:00
|
|
|
|
#:use-module (srfi srfi-1)
|
2019-07-14 11:50:23 +00:00
|
|
|
|
#:use-module (srfi srfi-2)
|
2018-05-18 11:43:07 +00:00
|
|
|
|
#:use-module (srfi srfi-9)
|
2019-07-14 11:50:23 +00:00
|
|
|
|
#:use-module (srfi srfi-26)
|
|
|
|
|
#:use-module (srfi srfi-35)
|
2018-05-18 11:43:07 +00:00
|
|
|
|
#:use-module (srfi srfi-9 gnu)
|
2014-05-20 19:59:08 +00:00
|
|
|
|
#:use-module (guix records)
|
2021-11-07 17:42:11 +00:00
|
|
|
|
#:use-module ((guix diagnostics)
|
|
|
|
|
#:select (source-properties->location leave &fix-hint))
|
2020-07-25 13:48:35 +00:00
|
|
|
|
#:use-module (guix i18n)
|
2017-09-06 07:28:28 +00:00
|
|
|
|
#:use-module (gnu system uuid)
|
file-systems: Introduce (gnu system uuid).
* gnu/build/file-systems.scm (sub-bytevector)
(latin1->string, %fat32-endianness, fat32-uuid->string)
(%iso9660-uuid-rx, string->iso9660-uuid)
(iso9660-uuid->string, %network-byte-order)
(dce-uuid->string, %uuid-rx, string->dce-uuid)
(string->ext2-uuid, string->ext3-uuid, string->ext4-uuid)
(vhashq, %uuid-parsers, %uuid-printers, string->uuid)
(uuid->string): Move to...
* gnu/system/uuid.scm: ... here. New file.
* gnu/system/file-systems.scm (uuid): Move to the above file.
* gnu/system/vm.scm: Adjust accordingly.
* gnu/local.mk (GNU_SYSTEM_MODULES): Add uuid.scm.
2017-09-05 19:51:12 +00:00
|
|
|
|
#:re-export (uuid ;backward compatibility
|
|
|
|
|
string->uuid
|
2016-01-01 21:41:35 +00:00
|
|
|
|
uuid->string)
|
2018-05-18 08:11:17 +00:00
|
|
|
|
#:export (file-system
|
2014-05-20 19:59:08 +00:00
|
|
|
|
file-system?
|
|
|
|
|
file-system-device
|
2020-02-12 04:56:45 +00:00
|
|
|
|
file-system-device->string
|
2014-05-20 19:59:08 +00:00
|
|
|
|
file-system-mount-point
|
|
|
|
|
file-system-type
|
|
|
|
|
file-system-needed-for-boot?
|
|
|
|
|
file-system-flags
|
|
|
|
|
file-system-options
|
2019-09-25 13:43:41 +00:00
|
|
|
|
file-system-options->alist
|
|
|
|
|
alist->file-system-options
|
|
|
|
|
|
2015-12-21 23:25:40 +00:00
|
|
|
|
file-system-mount?
|
2020-07-31 11:43:20 +00:00
|
|
|
|
file-system-mount-may-fail?
|
2014-07-22 20:53:36 +00:00
|
|
|
|
file-system-check?
|
2021-05-15 13:29:40 +00:00
|
|
|
|
file-system-skip-check-if-clean?
|
|
|
|
|
file-system-repair
|
2014-07-22 20:53:36 +00:00
|
|
|
|
file-system-create-mount-point?
|
2015-07-17 17:24:15 +00:00
|
|
|
|
file-system-dependencies
|
2017-10-04 19:35:31 +00:00
|
|
|
|
file-system-location
|
2014-05-20 19:59:08 +00:00
|
|
|
|
|
2017-03-21 20:55:20 +00:00
|
|
|
|
file-system-type-predicate
|
2022-02-06 21:20:44 +00:00
|
|
|
|
file-system-mount-point-predicate
|
2019-07-14 11:50:23 +00:00
|
|
|
|
btrfs-subvolume?
|
|
|
|
|
btrfs-store-subvolume-file-name
|
2017-03-21 20:55:20 +00:00
|
|
|
|
|
2018-05-18 11:43:07 +00:00
|
|
|
|
file-system-label
|
|
|
|
|
file-system-label?
|
|
|
|
|
file-system-label->string
|
|
|
|
|
|
2015-06-28 04:39:43 +00:00
|
|
|
|
file-system->spec
|
2016-11-10 16:45:54 +00:00
|
|
|
|
spec->file-system
|
2016-08-04 17:08:08 +00:00
|
|
|
|
specification->file-system-mapping
|
2015-06-28 04:39:43 +00:00
|
|
|
|
|
2018-04-27 13:31:37 +00:00
|
|
|
|
%pseudo-file-system-types
|
2014-05-20 19:59:08 +00:00
|
|
|
|
%fuse-control-file-system
|
2014-07-22 14:57:57 +00:00
|
|
|
|
%binary-format-file-system
|
2020-07-31 10:58:16 +00:00
|
|
|
|
%debug-file-system
|
2020-07-31 11:43:36 +00:00
|
|
|
|
%efivars-file-system
|
2014-07-23 06:13:34 +00:00
|
|
|
|
%shared-memory-file-system
|
|
|
|
|
%pseudo-terminal-file-system
|
2016-09-27 09:20:40 +00:00
|
|
|
|
%tty-gid
|
2015-04-20 20:21:51 +00:00
|
|
|
|
%immutable-store
|
2015-06-19 00:40:57 +00:00
|
|
|
|
%control-groups
|
2015-09-03 20:58:08 +00:00
|
|
|
|
%elogind-file-systems
|
2014-07-22 14:57:57 +00:00
|
|
|
|
|
2014-09-11 21:39:15 +00:00
|
|
|
|
%base-file-systems
|
2023-07-27 11:59:08 +00:00
|
|
|
|
%base-live-file-systems
|
2015-06-28 04:42:16 +00:00
|
|
|
|
%container-file-systems
|
2014-09-11 21:39:15 +00:00
|
|
|
|
|
2015-06-27 14:45:34 +00:00
|
|
|
|
<file-system-mapping>
|
|
|
|
|
file-system-mapping
|
|
|
|
|
file-system-mapping?
|
|
|
|
|
file-system-mapping-source
|
|
|
|
|
file-system-mapping-target
|
|
|
|
|
file-system-mapping-writable?
|
|
|
|
|
|
2017-02-02 23:20:40 +00:00
|
|
|
|
file-system-mapping->bind-mount
|
|
|
|
|
|
2017-02-06 14:42:00 +00:00
|
|
|
|
%store-mapping
|
|
|
|
|
%network-configuration-files
|
2021-11-15 20:26:27 +00:00
|
|
|
|
%network-file-mappings
|
|
|
|
|
|
|
|
|
|
swap-space
|
|
|
|
|
swap-space?
|
|
|
|
|
swap-space-target
|
2021-11-15 20:26:29 +00:00
|
|
|
|
swap-space-dependencies
|
|
|
|
|
swap-space-priority
|
|
|
|
|
swap-space-discard?))
|
2014-05-20 19:59:08 +00:00
|
|
|
|
|
|
|
|
|
;;; Commentary:
|
|
|
|
|
;;;
|
|
|
|
|
;;; Declaring file systems to be mounted.
|
|
|
|
|
;;;
|
2017-03-21 20:55:20 +00:00
|
|
|
|
;;; Note: this file system is used both in the Shepherd and on the "host
|
|
|
|
|
;;; side", so it must not include (gnu packages …) modules.
|
|
|
|
|
;;;
|
2014-05-20 19:59:08 +00:00
|
|
|
|
;;; Code:
|
|
|
|
|
|
2021-11-07 17:42:11 +00:00
|
|
|
|
(eval-when (expand load eval)
|
|
|
|
|
(define invalid-file-system-flags
|
|
|
|
|
;; Note: Keep in sync with 'mount-flags->bit-mask'.
|
|
|
|
|
(let ((known-flags '(read-only
|
|
|
|
|
bind-mount no-suid no-dev no-exec
|
2023-02-26 00:00:00 +00:00
|
|
|
|
no-atime no-diratime strict-atime lazy-time
|
2022-07-19 16:40:28 +00:00
|
|
|
|
shared)))
|
2021-11-07 17:42:11 +00:00
|
|
|
|
(lambda (flags)
|
|
|
|
|
"Return the subset of FLAGS that is invalid."
|
|
|
|
|
(remove (cut memq <> known-flags) flags))))
|
|
|
|
|
|
|
|
|
|
(define (%validate-file-system-flags flags location)
|
|
|
|
|
"Raise an error if FLAGS contains invalid mount flags; otherwise return
|
|
|
|
|
FLAGS."
|
|
|
|
|
(match (invalid-file-system-flags flags)
|
|
|
|
|
(() flags)
|
|
|
|
|
(invalid
|
|
|
|
|
(leave (source-properties->location location)
|
|
|
|
|
(N_ "invalid file system mount flag:~{ ~s~}~%"
|
|
|
|
|
"invalid file system mount flags:~{ ~s~}~%"
|
|
|
|
|
(length invalid))
|
|
|
|
|
invalid)))))
|
|
|
|
|
|
|
|
|
|
(define-syntax validate-file-system-flags
|
|
|
|
|
(lambda (s)
|
|
|
|
|
"Validate the given file system mount flags, raising an error if invalid
|
|
|
|
|
flags are found."
|
|
|
|
|
(syntax-case s (quote)
|
|
|
|
|
((_ (quote (symbols ...))) ;validate at expansion time
|
|
|
|
|
(begin
|
|
|
|
|
(%validate-file-system-flags (syntax->datum #'(symbols ...))
|
|
|
|
|
(syntax-source s))
|
|
|
|
|
#'(quote (symbols ...))))
|
|
|
|
|
((_ flags)
|
|
|
|
|
#`(%validate-file-system-flags flags
|
|
|
|
|
'#,(datum->syntax s (syntax-source s))))
|
|
|
|
|
(id
|
|
|
|
|
(identifier? #'id)
|
|
|
|
|
#'%validate-file-system-flags))))
|
|
|
|
|
|
2014-05-20 19:59:08 +00:00
|
|
|
|
;; File system declaration.
|
2023-02-27 14:59:39 +00:00
|
|
|
|
(define-record-type* <file-system> file-system
|
2014-05-20 19:59:08 +00:00
|
|
|
|
make-file-system
|
|
|
|
|
file-system?
|
2018-05-18 11:43:07 +00:00
|
|
|
|
(device file-system-device) ; string | <uuid> | <file-system-label>
|
2014-05-20 19:59:08 +00:00
|
|
|
|
(mount-point file-system-mount-point) ; string
|
|
|
|
|
(type file-system-type) ; string
|
|
|
|
|
(flags file-system-flags ; list of symbols
|
2021-11-07 17:42:11 +00:00
|
|
|
|
(default '())
|
|
|
|
|
(sanitize validate-file-system-flags))
|
2014-05-20 19:59:08 +00:00
|
|
|
|
(options file-system-options ; string or #f
|
|
|
|
|
(default #f))
|
2015-12-21 23:25:40 +00:00
|
|
|
|
(mount? file-system-mount? ; Boolean
|
|
|
|
|
(default #t))
|
2020-07-31 11:43:20 +00:00
|
|
|
|
(mount-may-fail? file-system-mount-may-fail? ; Boolean
|
|
|
|
|
(default #f))
|
2014-11-25 15:01:21 +00:00
|
|
|
|
(needed-for-boot? %file-system-needed-for-boot? ; Boolean
|
2014-05-20 19:59:08 +00:00
|
|
|
|
(default #f))
|
|
|
|
|
(check? file-system-check? ; Boolean
|
2014-07-22 20:53:36 +00:00
|
|
|
|
(default #t))
|
2021-05-15 13:29:40 +00:00
|
|
|
|
(skip-check-if-clean? file-system-skip-check-if-clean? ; Boolean
|
2021-09-24 19:08:13 +00:00
|
|
|
|
(default #t))
|
2021-05-15 13:29:40 +00:00
|
|
|
|
(repair file-system-repair ; symbol or #f
|
|
|
|
|
(default 'preen))
|
2014-07-22 20:53:36 +00:00
|
|
|
|
(create-mount-point? file-system-create-mount-point? ; Boolean
|
2015-07-17 17:24:15 +00:00
|
|
|
|
(default #f))
|
2015-10-29 17:22:19 +00:00
|
|
|
|
(dependencies file-system-dependencies ; list of <file-system>
|
2017-10-04 19:35:31 +00:00
|
|
|
|
(default '())) ; or <mapped-device>
|
|
|
|
|
(location file-system-location
|
|
|
|
|
(default (current-source-location))
|
|
|
|
|
(innate)))
|
2014-05-20 19:59:08 +00:00
|
|
|
|
|
2018-05-18 11:43:07 +00:00
|
|
|
|
;; A file system label for use in the 'device' field.
|
|
|
|
|
(define-record-type <file-system-label>
|
|
|
|
|
(file-system-label label)
|
|
|
|
|
file-system-label?
|
|
|
|
|
(label file-system-label->string))
|
|
|
|
|
|
|
|
|
|
(set-record-type-printer! <file-system-label>
|
|
|
|
|
(lambda (obj port)
|
|
|
|
|
(format port "#<file-system-label ~s>"
|
|
|
|
|
(file-system-label->string obj))))
|
|
|
|
|
|
2017-02-03 10:26:25 +00:00
|
|
|
|
;; Note: This module is used both on the build side and on the host side.
|
|
|
|
|
;; Arrange not to pull (guix store) and (guix config) because the latter
|
|
|
|
|
;; differs from user to user.
|
|
|
|
|
(define (%store-prefix)
|
|
|
|
|
"Return the store prefix."
|
2018-06-06 21:58:18 +00:00
|
|
|
|
;; Note: If we have (guix store database) in the search path and we do *not*
|
|
|
|
|
;; have (guix store) proper, 'resolve-module' returns an empty (guix store)
|
|
|
|
|
;; with one sub-module.
|
2022-04-16 14:13:34 +00:00
|
|
|
|
(cond ((and=> (parameterize ((current-warning-port (%make-void-port "w0")))
|
|
|
|
|
(resolve-module '(guix store) #:ensure #f))
|
2018-06-06 21:58:18 +00:00
|
|
|
|
(lambda (store)
|
|
|
|
|
(module-variable store '%store-prefix)))
|
2017-02-03 10:26:25 +00:00
|
|
|
|
=>
|
2018-06-06 21:58:18 +00:00
|
|
|
|
(lambda (variable)
|
|
|
|
|
((variable-ref variable))))
|
2017-02-03 10:26:25 +00:00
|
|
|
|
((getenv "NIX_STORE")
|
|
|
|
|
=> identity)
|
|
|
|
|
(else
|
|
|
|
|
"/gnu/store")))
|
|
|
|
|
|
2017-01-16 21:33:46 +00:00
|
|
|
|
(define %not-slash
|
|
|
|
|
(char-set-complement (char-set #\/)))
|
|
|
|
|
|
|
|
|
|
(define (file-prefix? file1 file2)
|
2021-06-17 05:22:35 +00:00
|
|
|
|
"Return #t if FILE1 denotes the name of a file that is a parent of FILE2.
|
2021-06-30 18:20:01 +00:00
|
|
|
|
FILE1 and FILE2 must both be either absolute or relative file names, else #f
|
|
|
|
|
is returned.
|
|
|
|
|
|
2021-06-17 05:22:35 +00:00
|
|
|
|
For example:
|
2017-01-16 21:33:46 +00:00
|
|
|
|
|
|
|
|
|
(file-prefix? \"/gnu\" \"/gnu/store\")
|
|
|
|
|
=> #t
|
|
|
|
|
|
|
|
|
|
(file-prefix? \"/gn\" \"/gnu/store\")
|
|
|
|
|
=> #f
|
|
|
|
|
"
|
2021-06-30 18:20:01 +00:00
|
|
|
|
(define (absolute? file)
|
|
|
|
|
(string-prefix? "/" file))
|
|
|
|
|
|
|
|
|
|
(if (or (every absolute? (list file1 file2))
|
|
|
|
|
(every (negate absolute?) (list file1 file2)))
|
|
|
|
|
(let loop ((file1 (string-tokenize file1 %not-slash))
|
|
|
|
|
(file2 (string-tokenize file2 %not-slash)))
|
|
|
|
|
(match file1
|
|
|
|
|
(()
|
|
|
|
|
#t)
|
|
|
|
|
((head1 tail1 ...)
|
|
|
|
|
(match file2
|
|
|
|
|
((head2 tail2 ...)
|
|
|
|
|
(and (string=? head1 head2) (loop tail1 tail2)))
|
|
|
|
|
(()
|
|
|
|
|
#f)))))
|
|
|
|
|
;; FILE1 and FILE2 are a mix of absolute and relative file names.
|
|
|
|
|
#f))
|
2021-06-17 05:22:35 +00:00
|
|
|
|
|
|
|
|
|
(define (file-name-depth file-name)
|
|
|
|
|
(length (string-tokenize file-name %not-slash)))
|
|
|
|
|
|
2020-02-12 04:56:45 +00:00
|
|
|
|
(define* (file-system-device->string device #:key uuid-type)
|
|
|
|
|
"Return the string representations of the DEVICE field of a <file-system>
|
|
|
|
|
record. When the device is a UUID, its representation is chosen depending on
|
|
|
|
|
UUID-TYPE, a symbol such as 'dce or 'iso9660."
|
|
|
|
|
(match device
|
|
|
|
|
((? file-system-label?)
|
|
|
|
|
(file-system-label->string device))
|
|
|
|
|
((? uuid?)
|
|
|
|
|
(if uuid-type
|
|
|
|
|
(uuid->string (uuid-bytevector device) uuid-type)
|
|
|
|
|
(uuid->string device)))
|
|
|
|
|
((? string?)
|
|
|
|
|
device)))
|
|
|
|
|
|
2019-09-25 13:43:41 +00:00
|
|
|
|
(define (file-system-options->alist string)
|
|
|
|
|
"Translate the option string format of a <file-system> record into an
|
|
|
|
|
association list of options or option/value pairs."
|
|
|
|
|
(if string
|
|
|
|
|
(let ((options (string-split string #\,)))
|
|
|
|
|
(map (lambda (param)
|
|
|
|
|
(let ((=index (string-index param #\=)))
|
|
|
|
|
(if =index
|
|
|
|
|
(cons (string-take param =index)
|
|
|
|
|
(string-drop param (1+ =index)))
|
|
|
|
|
param)))
|
|
|
|
|
options))
|
|
|
|
|
'()))
|
|
|
|
|
|
|
|
|
|
(define (alist->file-system-options options)
|
|
|
|
|
"Return the string representation of OPTIONS, an association list. The
|
|
|
|
|
string obtained can be used as the option field of a <file-system> record."
|
|
|
|
|
(if (null? options)
|
|
|
|
|
#f
|
|
|
|
|
(string-join (map (match-lambda
|
|
|
|
|
((key . value)
|
|
|
|
|
(string-append key "=" value))
|
|
|
|
|
(key
|
|
|
|
|
key))
|
|
|
|
|
options)
|
|
|
|
|
",")))
|
|
|
|
|
|
2017-01-16 21:33:46 +00:00
|
|
|
|
(define (file-system-needed-for-boot? fs)
|
|
|
|
|
"Return true if FS has the 'needed-for-boot?' flag set, or if it holds the
|
|
|
|
|
store--e.g., if FS is the root file system."
|
2014-11-25 15:01:21 +00:00
|
|
|
|
(or (%file-system-needed-for-boot? fs)
|
2017-01-16 21:33:46 +00:00
|
|
|
|
(and (file-prefix? (file-system-mount-point fs) (%store-prefix))
|
|
|
|
|
(not (memq 'bind-mount (file-system-flags fs))))))
|
2014-11-25 15:01:21 +00:00
|
|
|
|
|
2015-06-28 04:39:43 +00:00
|
|
|
|
(define (file-system->spec fs)
|
|
|
|
|
"Return a list corresponding to file-system FS that can be passed to the
|
|
|
|
|
initrd code."
|
|
|
|
|
(match fs
|
2020-07-31 11:43:20 +00:00
|
|
|
|
(($ <file-system> device mount-point type flags options mount?
|
2021-05-15 13:29:40 +00:00
|
|
|
|
mount-may-fail? needed-for-boot?
|
|
|
|
|
check? skip-check-if-clean? repair)
|
2020-08-03 15:44:38 +00:00
|
|
|
|
;; Note: Add new fields towards the end for compatibility.
|
2018-05-18 11:43:07 +00:00
|
|
|
|
(list (cond ((uuid? device)
|
|
|
|
|
`(uuid ,(uuid-type device) ,(uuid-bytevector device)))
|
|
|
|
|
((file-system-label? device)
|
|
|
|
|
`(file-system-label ,(file-system-label->string device)))
|
|
|
|
|
(else device))
|
2021-05-15 13:29:40 +00:00
|
|
|
|
mount-point type flags options mount-may-fail?
|
|
|
|
|
check? skip-check-if-clean? repair))))
|
2015-06-28 04:39:43 +00:00
|
|
|
|
|
2016-11-10 16:45:54 +00:00
|
|
|
|
(define (spec->file-system sexp)
|
|
|
|
|
"Deserialize SEXP, a list, to the corresponding <file-system> object."
|
|
|
|
|
(match sexp
|
2021-05-15 13:29:40 +00:00
|
|
|
|
((device mount-point type flags options mount-may-fail?
|
|
|
|
|
check? skip-check-if-clean? repair
|
2020-08-03 15:44:38 +00:00
|
|
|
|
_ ...) ;placeholder for new fields
|
2016-11-10 16:45:54 +00:00
|
|
|
|
(file-system
|
2017-10-03 20:27:27 +00:00
|
|
|
|
(device (match device
|
|
|
|
|
(('uuid (? symbol? type) (? bytevector? bv))
|
|
|
|
|
(bytevector->uuid bv type))
|
2018-05-18 11:43:07 +00:00
|
|
|
|
(('file-system-label (? string? label))
|
|
|
|
|
(file-system-label label))
|
2017-10-03 20:27:27 +00:00
|
|
|
|
(_
|
|
|
|
|
device)))
|
2016-11-10 16:45:54 +00:00
|
|
|
|
(mount-point mount-point) (type type)
|
|
|
|
|
(flags flags) (options options)
|
2020-07-31 11:43:20 +00:00
|
|
|
|
(mount-may-fail? mount-may-fail?)
|
2021-05-15 13:29:40 +00:00
|
|
|
|
(check? check?)
|
|
|
|
|
(skip-check-if-clean? skip-check-if-clean?)
|
|
|
|
|
(repair repair)))))
|
2016-11-10 16:45:54 +00:00
|
|
|
|
|
2016-08-04 17:08:08 +00:00
|
|
|
|
(define (specification->file-system-mapping spec writable?)
|
|
|
|
|
"Read the SPEC and return the corresponding <file-system-mapping>. SPEC is
|
|
|
|
|
a string of the form \"SOURCE\" or \"SOURCE=TARGET\". The former specifies
|
|
|
|
|
that SOURCE from the host should be mounted at SOURCE in the other system.
|
|
|
|
|
The latter format specifies that SOURCE from the host should be mounted at
|
|
|
|
|
TARGET in the other system."
|
|
|
|
|
(let ((index (string-index spec #\=)))
|
|
|
|
|
(if index
|
|
|
|
|
(file-system-mapping
|
|
|
|
|
(source (substring spec 0 index))
|
|
|
|
|
(target (substring spec (+ 1 index)))
|
|
|
|
|
(writable? writable?))
|
|
|
|
|
(file-system-mapping
|
|
|
|
|
(source spec)
|
|
|
|
|
(target spec)
|
|
|
|
|
(writable? writable?)))))
|
|
|
|
|
|
2015-07-14 13:06:46 +00:00
|
|
|
|
|
|
|
|
|
;;;
|
|
|
|
|
;;; Common file systems.
|
|
|
|
|
;;;
|
|
|
|
|
|
2018-04-27 13:31:37 +00:00
|
|
|
|
(define %pseudo-file-system-types
|
|
|
|
|
;; List of know pseudo file system types. This is used when validating file
|
|
|
|
|
;; system definitions.
|
2022-09-20 07:03:07 +00:00
|
|
|
|
'("binfmt_misc" "cgroup" "cgroup2" "debugfs" "devpts" "devtmpfs" "efivarfs" "fusectl"
|
2023-12-03 02:37:26 +00:00
|
|
|
|
"hugetlbfs" "overlay" "proc" "securityfs" "sysfs" "tmpfs" "tracefs" "xenfs"))
|
2018-04-27 13:31:37 +00:00
|
|
|
|
|
2014-05-20 19:59:08 +00:00
|
|
|
|
(define %fuse-control-file-system
|
|
|
|
|
;; Control file system for Linux' file systems in user-space (FUSE).
|
|
|
|
|
(file-system
|
|
|
|
|
(device "fusectl")
|
|
|
|
|
(mount-point "/sys/fs/fuse/connections")
|
|
|
|
|
(type "fusectl")
|
|
|
|
|
(check? #f)))
|
|
|
|
|
|
|
|
|
|
(define %binary-format-file-system
|
|
|
|
|
;; Support for arbitrary executable binary format.
|
|
|
|
|
(file-system
|
|
|
|
|
(device "binfmt_misc")
|
|
|
|
|
(mount-point "/proc/sys/fs/binfmt_misc")
|
|
|
|
|
(type "binfmt_misc")
|
|
|
|
|
(check? #f)))
|
|
|
|
|
|
2020-07-31 10:58:16 +00:00
|
|
|
|
(define %debug-file-system
|
|
|
|
|
(file-system
|
|
|
|
|
(type "debugfs")
|
|
|
|
|
(device "none")
|
|
|
|
|
(mount-point "/sys/kernel/debug")
|
|
|
|
|
(check? #f)
|
|
|
|
|
(create-mount-point? #t)))
|
|
|
|
|
|
2020-07-31 11:43:36 +00:00
|
|
|
|
(define %efivars-file-system
|
|
|
|
|
;; Support for EFI variables file system.
|
|
|
|
|
(file-system
|
|
|
|
|
(device "efivarfs")
|
|
|
|
|
(mount-point "/sys/firmware/efi/efivars")
|
|
|
|
|
(type "efivarfs")
|
|
|
|
|
(mount-may-fail? #t)
|
|
|
|
|
(needed-for-boot? #f)
|
|
|
|
|
(check? #f)))
|
|
|
|
|
|
2014-07-22 21:13:53 +00:00
|
|
|
|
(define %tty-gid
|
|
|
|
|
;; ID of the 'tty' group. Allocate it statically to make it easy to refer
|
|
|
|
|
;; to it from here and from the 'tty' group definitions.
|
2014-07-24 22:12:35 +00:00
|
|
|
|
996)
|
2014-07-22 21:13:53 +00:00
|
|
|
|
|
|
|
|
|
(define %pseudo-terminal-file-system
|
|
|
|
|
;; The pseudo-terminal file system. It needs to be mounted so that
|
|
|
|
|
;; statfs(2) returns DEVPTS_SUPER_MAGIC like libc's getpt(3) expects (and
|
|
|
|
|
;; thus openpty(3) and its users, such as xterm.)
|
|
|
|
|
(file-system
|
|
|
|
|
(device "none")
|
|
|
|
|
(mount-point "/dev/pts")
|
|
|
|
|
(type "devpts")
|
|
|
|
|
(check? #f)
|
|
|
|
|
(needed-for-boot? #f)
|
|
|
|
|
(create-mount-point? #t)
|
|
|
|
|
(options (string-append "gid=" (number->string %tty-gid) ",mode=620"))))
|
2014-07-22 14:57:57 +00:00
|
|
|
|
|
2014-07-22 23:25:01 +00:00
|
|
|
|
(define %shared-memory-file-system
|
|
|
|
|
;; Shared memory.
|
|
|
|
|
(file-system
|
|
|
|
|
(device "tmpfs")
|
|
|
|
|
(mount-point "/dev/shm")
|
|
|
|
|
(type "tmpfs")
|
|
|
|
|
(check? #f)
|
|
|
|
|
(flags '(no-suid no-dev))
|
|
|
|
|
(options "size=50%") ;TODO: make size configurable
|
|
|
|
|
(create-mount-point? #t)))
|
|
|
|
|
|
2015-04-20 20:21:51 +00:00
|
|
|
|
(define %immutable-store
|
|
|
|
|
;; Read-only store to avoid users or daemons accidentally modifying it.
|
|
|
|
|
;; 'guix-daemon' has provisions to remount it read-write in its own name
|
|
|
|
|
;; space.
|
|
|
|
|
(file-system
|
|
|
|
|
(device (%store-prefix))
|
|
|
|
|
(mount-point (%store-prefix))
|
|
|
|
|
(type "none")
|
|
|
|
|
(check? #f)
|
2019-07-19 09:48:19 +00:00
|
|
|
|
(flags '(read-only bind-mount no-atime))))
|
2015-04-20 20:21:51 +00:00
|
|
|
|
|
2015-06-19 00:40:57 +00:00
|
|
|
|
(define %control-groups
|
2023-06-24 03:11:26 +00:00
|
|
|
|
;; The cgroup2 file system.
|
|
|
|
|
(list (file-system
|
|
|
|
|
(device "none")
|
|
|
|
|
(mount-point "/sys/fs/cgroup")
|
|
|
|
|
(type "cgroup2")
|
|
|
|
|
(check? #f)
|
|
|
|
|
(create-mount-point? #f))))
|
2015-06-19 00:40:57 +00:00
|
|
|
|
|
2015-09-03 20:58:08 +00:00
|
|
|
|
(define %elogind-file-systems
|
|
|
|
|
;; We don't use systemd, but these file systems are needed for elogind,
|
|
|
|
|
;; which was extracted from systemd.
|
2017-12-22 07:43:24 +00:00
|
|
|
|
(append
|
|
|
|
|
(list (file-system
|
|
|
|
|
(device "none")
|
|
|
|
|
(mount-point "/run/systemd")
|
|
|
|
|
(type "tmpfs")
|
|
|
|
|
(check? #f)
|
|
|
|
|
(flags '(no-suid no-dev no-exec))
|
|
|
|
|
(options "mode=0755")
|
|
|
|
|
(create-mount-point? #t))
|
|
|
|
|
(file-system
|
|
|
|
|
(device "none")
|
|
|
|
|
(mount-point "/run/user")
|
|
|
|
|
(type "tmpfs")
|
|
|
|
|
(check? #f)
|
|
|
|
|
(flags '(no-suid no-dev no-exec))
|
|
|
|
|
(options "mode=0755")
|
|
|
|
|
(create-mount-point? #t))
|
|
|
|
|
;; Elogind uses cgroups to organize processes, allowing it to map PIDs
|
|
|
|
|
;; to sessions. Elogind's cgroup hierarchy isn't associated with any
|
|
|
|
|
;; resource controller ("subsystem").
|
|
|
|
|
(file-system
|
|
|
|
|
(device "cgroup")
|
|
|
|
|
(mount-point "/sys/fs/cgroup/elogind")
|
|
|
|
|
(type "cgroup")
|
|
|
|
|
(check? #f)
|
|
|
|
|
(options "none,name=elogind")
|
|
|
|
|
(create-mount-point? #t)
|
|
|
|
|
(dependencies (list (car %control-groups)))))
|
|
|
|
|
%control-groups))
|
2015-09-03 20:58:08 +00:00
|
|
|
|
|
2014-07-22 14:57:57 +00:00
|
|
|
|
(define %base-file-systems
|
|
|
|
|
;; List of basic file systems to be mounted. Note that /proc and /sys are
|
|
|
|
|
;; currently mounted by the initrd.
|
2017-12-22 07:43:24 +00:00
|
|
|
|
(list %pseudo-terminal-file-system
|
2020-07-31 10:58:16 +00:00
|
|
|
|
%debug-file-system
|
2017-12-22 07:43:24 +00:00
|
|
|
|
%shared-memory-file-system
|
2020-07-31 11:43:36 +00:00
|
|
|
|
%efivars-file-system
|
2017-12-22 07:43:24 +00:00
|
|
|
|
%immutable-store))
|
2014-07-22 14:57:57 +00:00
|
|
|
|
|
2023-07-27 11:59:08 +00:00
|
|
|
|
(define %base-live-file-systems
|
|
|
|
|
;; This is the bare minimum to use live file-systems.
|
|
|
|
|
;; Used in installation-os.
|
|
|
|
|
(list (file-system
|
|
|
|
|
(mount-point "/")
|
|
|
|
|
(device (file-system-label "Guix_image"))
|
|
|
|
|
(type "ext4"))
|
|
|
|
|
|
|
|
|
|
;; Make /tmp a tmpfs instead of keeping the overlayfs. This
|
|
|
|
|
;; originally was used for unionfs because FUSE creates
|
|
|
|
|
;; '.fuse_hiddenXYZ' files for each open file, and this confuses
|
|
|
|
|
;; Guix's test suite, for instance (see
|
|
|
|
|
;; <http://bugs.gnu.org/23056>). We keep this for overlayfs to be
|
|
|
|
|
;; on the safe side.
|
|
|
|
|
(file-system
|
|
|
|
|
(mount-point "/tmp")
|
|
|
|
|
(device "none")
|
|
|
|
|
(type "tmpfs")
|
|
|
|
|
(check? #f))))
|
|
|
|
|
|
2015-06-28 04:42:16 +00:00
|
|
|
|
;; File systems for Linux containers differ from %base-file-systems in that
|
|
|
|
|
;; they impose additional restrictions such as no-exec or need different
|
|
|
|
|
;; options to function properly.
|
|
|
|
|
;;
|
|
|
|
|
;; The file system flags and options conform to the libcontainer
|
|
|
|
|
;; specification:
|
|
|
|
|
;; https://github.com/docker/libcontainer/blob/master/SPEC.md#filesystem
|
|
|
|
|
(define %container-file-systems
|
|
|
|
|
(list
|
2015-07-13 14:10:40 +00:00
|
|
|
|
;; Pseudo-terminal file system.
|
2015-06-28 04:42:16 +00:00
|
|
|
|
(file-system
|
|
|
|
|
(device "none")
|
|
|
|
|
(mount-point "/dev/pts")
|
|
|
|
|
(type "devpts")
|
|
|
|
|
(flags '(no-exec no-suid))
|
|
|
|
|
(needed-for-boot? #t)
|
|
|
|
|
(create-mount-point? #t)
|
|
|
|
|
(check? #f)
|
|
|
|
|
(options "newinstance,ptmxmode=0666,mode=620"))
|
|
|
|
|
;; Shared memory file system.
|
|
|
|
|
(file-system
|
|
|
|
|
(device "tmpfs")
|
|
|
|
|
(mount-point "/dev/shm")
|
|
|
|
|
(type "tmpfs")
|
|
|
|
|
(flags '(no-exec no-suid no-dev))
|
|
|
|
|
(options "mode=1777,size=65536k")
|
|
|
|
|
(needed-for-boot? #t)
|
|
|
|
|
(create-mount-point? #t)
|
|
|
|
|
(check? #f))
|
|
|
|
|
;; Message queue file system.
|
|
|
|
|
(file-system
|
|
|
|
|
(device "mqueue")
|
|
|
|
|
(mount-point "/dev/mqueue")
|
|
|
|
|
(type "mqueue")
|
|
|
|
|
(flags '(no-exec no-suid no-dev))
|
|
|
|
|
(needed-for-boot? #t)
|
|
|
|
|
(create-mount-point? #t)
|
|
|
|
|
(check? #f))))
|
|
|
|
|
|
2015-06-27 14:45:34 +00:00
|
|
|
|
|
|
|
|
|
;;;
|
|
|
|
|
;;; Shared file systems, for VMs/containers.
|
|
|
|
|
;;;
|
|
|
|
|
|
|
|
|
|
;; Mapping of host file system SOURCE to mount point TARGET in the guest.
|
|
|
|
|
(define-record-type* <file-system-mapping> file-system-mapping
|
|
|
|
|
make-file-system-mapping
|
|
|
|
|
file-system-mapping?
|
|
|
|
|
(source file-system-mapping-source) ;string
|
|
|
|
|
(target file-system-mapping-target) ;string
|
|
|
|
|
(writable? file-system-mapping-writable? ;Boolean
|
|
|
|
|
(default #f)))
|
|
|
|
|
|
2017-02-02 23:20:40 +00:00
|
|
|
|
(define (file-system-mapping->bind-mount mapping)
|
|
|
|
|
"Return a file system that realizes MAPPING, a <file-system-mapping>, using
|
|
|
|
|
a bind mount."
|
|
|
|
|
(match mapping
|
|
|
|
|
(($ <file-system-mapping> source target writable?)
|
|
|
|
|
(file-system
|
|
|
|
|
(mount-point target)
|
|
|
|
|
(device source)
|
|
|
|
|
(type "none")
|
|
|
|
|
(flags (if writable?
|
|
|
|
|
'(bind-mount)
|
|
|
|
|
'(bind-mount read-only)))
|
|
|
|
|
(check? #f)
|
|
|
|
|
(create-mount-point? #t)))))
|
|
|
|
|
|
2015-06-27 14:45:34 +00:00
|
|
|
|
(define %store-mapping
|
|
|
|
|
;; Mapping of the host's store into the guest.
|
|
|
|
|
(file-system-mapping
|
|
|
|
|
(source (%store-prefix))
|
|
|
|
|
(target (%store-prefix))
|
|
|
|
|
(writable? #f)))
|
|
|
|
|
|
2017-02-06 14:42:00 +00:00
|
|
|
|
(define %network-configuration-files
|
|
|
|
|
;; List of essential network configuration files.
|
|
|
|
|
'("/etc/resolv.conf"
|
|
|
|
|
"/etc/nsswitch.conf"
|
|
|
|
|
"/etc/services"
|
|
|
|
|
"/etc/hosts"))
|
|
|
|
|
|
|
|
|
|
(define %network-file-mappings
|
|
|
|
|
;; List of file mappings for essential network files.
|
|
|
|
|
(filter-map (lambda (file)
|
|
|
|
|
(file-system-mapping
|
|
|
|
|
(source file)
|
|
|
|
|
(target file)
|
|
|
|
|
;; XXX: On some GNU/Linux systems, /etc/resolv.conf is a
|
|
|
|
|
;; symlink to a file in a tmpfs which, for an unknown reason,
|
|
|
|
|
;; cannot be bind mounted read-only within the container.
|
2020-09-27 17:16:39 +00:00
|
|
|
|
(writable? (string=? file "/etc/resolv.conf"))))
|
|
|
|
|
%network-configuration-files))
|
2017-02-06 14:42:00 +00:00
|
|
|
|
|
2017-03-18 09:38:51 +00:00
|
|
|
|
(define (file-system-type-predicate type)
|
2017-03-21 21:07:08 +00:00
|
|
|
|
"Return a predicate that, when passed a file system, returns #t if that file
|
|
|
|
|
system has the given TYPE."
|
2017-03-18 09:38:51 +00:00
|
|
|
|
(lambda (fs)
|
|
|
|
|
(string=? (file-system-type fs) type)))
|
|
|
|
|
|
2022-02-06 21:20:44 +00:00
|
|
|
|
(define (file-system-mount-point-predicate mount-point)
|
|
|
|
|
"Return a predicate that, when passed a file system, returns #t if that file
|
|
|
|
|
system has the given MOUNT-POINT."
|
|
|
|
|
(lambda (fs)
|
|
|
|
|
(string=? (file-system-mount-point fs) mount-point)))
|
|
|
|
|
|
2019-07-14 11:50:23 +00:00
|
|
|
|
|
|
|
|
|
;;;
|
|
|
|
|
;;; Btrfs specific helpers.
|
|
|
|
|
;;;
|
|
|
|
|
|
|
|
|
|
(define (btrfs-subvolume? fs)
|
|
|
|
|
"Predicate to check if FS, a file-system object, is a Btrfs subvolume."
|
|
|
|
|
(and-let* ((btrfs-file-system? (string= "btrfs" (file-system-type fs)))
|
|
|
|
|
(option-keys (map (match-lambda
|
|
|
|
|
((key . value) key)
|
|
|
|
|
(key key))
|
|
|
|
|
(file-system-options->alist
|
|
|
|
|
(file-system-options fs)))))
|
|
|
|
|
(find (cut string-prefix? "subvol" <>) option-keys)))
|
|
|
|
|
|
|
|
|
|
(define (btrfs-store-subvolume-file-name file-systems)
|
|
|
|
|
"Return the subvolume file name within the Btrfs top level onto which the
|
|
|
|
|
store is located, else #f."
|
|
|
|
|
|
|
|
|
|
(define (prepend-slash/maybe s)
|
|
|
|
|
(if (string=? "/" (string-take s 1))
|
|
|
|
|
s
|
|
|
|
|
(string-append "/" s)))
|
|
|
|
|
|
|
|
|
|
(and-let* ((btrfs-subvolume-fs (filter btrfs-subvolume? file-systems))
|
|
|
|
|
(btrfs-subvolume-fs*
|
|
|
|
|
(sort btrfs-subvolume-fs
|
|
|
|
|
(lambda (fs1 fs2)
|
|
|
|
|
(> (file-name-depth (file-system-mount-point fs1))
|
|
|
|
|
(file-name-depth (file-system-mount-point fs2))))))
|
|
|
|
|
(store-subvolume-fs
|
|
|
|
|
(find (lambda (fs) (file-prefix? (file-system-mount-point fs)
|
|
|
|
|
(%store-prefix)))
|
|
|
|
|
btrfs-subvolume-fs*))
|
|
|
|
|
(options (file-system-options->alist
|
|
|
|
|
(file-system-options store-subvolume-fs))))
|
|
|
|
|
;; XXX: Deriving the subvolume name based from a subvolume ID is not
|
|
|
|
|
;; supported, as we'd need to query the actual file system.
|
|
|
|
|
(or (and=> (assoc-ref options "subvol") prepend-slash/maybe)
|
|
|
|
|
(raise (condition
|
|
|
|
|
(&message
|
|
|
|
|
(message "The store is on a Btrfs subvolume, but the \
|
2020-07-25 13:48:35 +00:00
|
|
|
|
subvolume name is unknown."))
|
|
|
|
|
(&fix-hint
|
|
|
|
|
(hint
|
|
|
|
|
(G_ "Use the @code{subvol} Btrfs file system option."))))))))
|
2019-07-14 11:50:23 +00:00
|
|
|
|
|
|
|
|
|
|
2021-11-15 20:26:27 +00:00
|
|
|
|
;;;
|
|
|
|
|
;;; Swap space
|
|
|
|
|
;;;
|
|
|
|
|
|
|
|
|
|
(define-record-type* <swap-space> swap-space make-swap-space
|
|
|
|
|
swap-space?
|
|
|
|
|
this-swap-space
|
|
|
|
|
(target swap-space-target)
|
|
|
|
|
(dependencies swap-space-dependencies
|
2021-11-15 20:26:29 +00:00
|
|
|
|
(default '()))
|
|
|
|
|
(priority swap-space-priority
|
|
|
|
|
(default #f))
|
|
|
|
|
(discard? swap-space-discard?
|
|
|
|
|
(default #f)))
|
2021-11-15 20:26:27 +00:00
|
|
|
|
|
2014-05-20 19:59:08 +00:00
|
|
|
|
;;; file-systems.scm ends here
|