Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Qubes packages (Its alive!) #341215

Draft
wants to merge 33 commits into
base: master
Choose a base branch
from
Draft

Conversation

CertainLach
Copy link
Member

@CertainLach CertainLach commented Sep 11, 2024

Description of changes

You can initialize qubes database files using qubes-create from qubes-core-admin, and then you need to install some virtual machines - this can be done by running qvm-backup on QubesOS system, and qvm-backup-restore in NixOS.

After that, basic functionality will work.

Be careful with netvms, as dom0 updates will not work with them. Some loosening up of qubes security needs to be implemented, at least having "qvm-dom0-network-via-netvm" script (Which was present in QubesOS before, and now needs to be written from scratch?) would be a good start.

At this point, you're welcome for testing, but be aware that it is not finished yet.

image

Cc: @SigmaSquadron

Things done

  • Built on platform(s)
    • x86_64-linux
    • aarch64-linux
    • x86_64-darwin
    • aarch64-darwin
  • For non-Linux: Is sandboxing enabled in nix.conf? (See Nix manual)
    • sandbox = relaxed
    • sandbox = true
  • Tested, as applicable:
  • Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
  • Tested basic functionality of all binary files (usually in ./result/bin/)
  • 24.11 Release Notes (or backporting 23.11 and 24.05 Release notes)
    • (Package updates) Added a release notes entry if the change is major or breaking
    • (Module updates) Added a release notes entry if the change is significant
    • (Module addition) Added a release notes entry if adding a new NixOS module
  • Fits CONTRIBUTING.md.

Add a 👍 reaction to pull requests you find important.

@github-actions github-actions bot added 6.topic: python 6.topic: nixos Issues or PRs affecting NixOS modules, or package usability issues specific to NixOS 8.has: module (update) This PR changes an existing module in `nixos/` labels Sep 11, 2024
@SigmaSquadron SigmaSquadron self-requested a review September 11, 2024 16:38
Copy link
Contributor

@SigmaSquadron SigmaSquadron left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is wonderful! Feel free to add me as a maintainer to all of the Qubes packages as well.

Would you like to let the Qubes developers and users know about this by reviving that old Qubes issue about a NixOS template?

pkgs/applications/qubes/qubes-core-vchan-xen/default.nix Outdated Show resolved Hide resolved
pkgs/by-name/qu/qubes-core-qubesdb/package.nix Outdated Show resolved Hide resolved
pkgs/by-name/qu/qubes-manager/package.nix Outdated Show resolved Hide resolved
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The python files need a meta attribute set. Since a lot of the Qubes tools are GPLv2 and have the https://qubes-os.org homepage, we could deduplicate the meta attributes in a common file that is inherited and // updated as needed.


qubes-core-qubesdb = toPythonModule (pkgs.qubes-core-qubesdb.override {
inherit python;
withPython = true;
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Might be better to make the main derivation have withPython ? true, and drop the override.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Well, we still need to build this package using specific python version, thus override is inevitable

gtk3
];

# Should also be packaged as vm-only?
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

A split output package sounds good here IMO.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think current approach with passthru is okayish, as those packages are tightly bound.
Proper splitting will require a qubes package set, which I want to avoid.

mv $out/usr/* $out/
rm -rf $out/usr
# Scripts: qubes-rpc-multiplexer
cp ../lib/* $out/bin/
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
cp ../lib/* $out/bin/
cp ../lib/* $out/libexec/

Very optional. If it breaks something, revert to $out/bin. Having executable libraries on libexec would make this more cohesive with the xen package.

Copy link
Member Author

@CertainLach CertainLach Sep 11, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It is installed to bin, it is just located in lib in source code.
I want however to split some of sbin binaries to libexec

nixos/modules/virtualisation/qubes.nix Outdated Show resolved Hide resolved
@SigmaSquadron SigmaSquadron added 2.status: work-in-progress This PR isn't done 11.by: package-maintainer This PR was created by the maintainer of the package it changes labels Sep 11, 2024
@CertainLach
Copy link
Member Author

Pushed other batch of qubes fixes, now you can actually somehow manage VMs using qubes-manager, given that you have installed templates somehow (E.g you can copy VMs from other qubes installation). Standard qvm-template doesn't work, because it uses RPM to install such packages.

@SigmaSquadron xen needs python module, do you think it is possible to split it from xen package?

At least separate output will do, but ideally it needs to be built fully independently, since xen is a large package.
Also, another dependency cycle has been formed, this time it can't be resolved as with qrexec.

@CertainLach
Copy link
Member Author

Forgot to cherry-pick some changes from my workstation nixpkgs. Sorry for the dirty git history, I will rebase and clean it up after more polishing.

@SigmaSquadron
Copy link
Contributor

@SigmaSquadron xen needs python module, do you think it is possible to split it from xen package?

At least separate output will do, but ideally it needs to be built fully independently, since xen is a large package. Also, another dependency cycle has been formed, this time it can't be resolved as with qrexec.

I'm all for splitting the Python stuff from the main package, but I have no idea how to do that or how circular dependencies are even supposed to work in the first place.

Forgot to cherry-pick some changes from my workstation nixpkgs. Sorry for the dirty git history, I will rebase and clean it up after more polishing.

Feel free to dump everything in the draft PR. We can always beat the git history into a shape later.

@CertainLach
Copy link
Member Author

CertainLach commented Sep 12, 2024

how circular dependencies are even supposed to work in the first place.

Well, they don't, derivation circular dependencies needs to be resolved somehow. Some can be merged together, some can be updated to be loosely coupled (E.g use PATH or specific runtime environment variables), but they need to be fixed, derivation can't depend on itself (Except for $out, but it is only known at runtime), because derivation hash = hash of its inputs.

Right now, both of discovered dependency cycles are resolved using absolute system installation paths, and I'm not sure of a proper solution.

@SigmaSquadron
Copy link
Contributor

SigmaSquadron commented Sep 12, 2024

Some more information for the module:

Qubes' boot parameters:

virtualisation.xen.bootParams = [ "smt=off" "gnttab_max_frames=2048" "gnttab_max_maptrack_frames=4096" ];

Use the C-based XenStore (as Qubes doesn't use oxenstored due to the lack of security support for untrusted driver domains):

virtualisation.xen.store.path = "${pkgs.qubes-vmm-xen}/bin/xenstored";

Also, any systemd services brought in by the module need to have their Install sections duplicated in Nix code. (notably, wantedBy.)

@CertainLach
Copy link
Member Author

Also, any systemd services brought in by the module need to have their Install sections duplicated in Nix code. (notably, wantedBy.)

Yeah, of course, this is just a rough draft of how it should look, nothing work in this nixos module yet.

BTW, qubesd has non-critical crash on service stop when using python 3.11 due to new python features being used (QubesOS/qubes-core-admin@23be00c), and I can't upgrade it to 3.12 because of meson regression in Xen, do you have idea on how to fix that? #253751
Should have specified that this problem only affects Xen, qubes packages are building with python 3.12 just fine by itself.

@SigmaSquadron
Copy link
Contributor

and I can't upgrade it to 3.12 because of meson regression in Xen, do you have idea on how to fix that? #253751 Should have specified that this problem only affects Xen, qubes packages are building with python 3.12 just fine by itself.

The hacky solution is to python = (python312Packages.python.withPackages (p: [ p.setuptools ])); in Xen.

@CertainLach
Copy link
Member Author

Thrown even more broken code into the pile, now it is able to generate menu entries for VMs, and recognize PCI device names.

Nixos module is still broken, but now it might start most of the required things by itself.

@CertainLach
Copy link
Member Author

The hacky solution is to python = (python312Packages.python.withPackages (p: [ p.setuptools ])); in Xen.

This hacky solution sounds good enough for now, I don't know how many of the bugs are caused by python version older than upstream wants.

@CertainLach CertainLach changed the title Qubes packages (Pile of not working code) Qubes packages (Pile of semi-running code) Sep 15, 2024
@CertainLach CertainLach changed the title Qubes packages (Pile of semi-running code) Qubes packages (Its alive!) Sep 16, 2024
@CertainLach
Copy link
Member Author

Latest changes make it run in KDE Wayland session.
image

There are still many bugs, but basic functionality works perfectly fine.

@ofborg ofborg bot added the 2.status: merge conflict This PR has merge conflicts with the target branch label Sep 19, 2024
Comment on lines +46 to +63
# Bug:
# Loopback vchan connection not supported
# FATAL: vchan initialization failed
# Solution: Xenstore has no set domid
# It can be set manually using
# `run0 xenstore-write "/domid" 0`
# However it should always be set by default by something,
# and I am not sure how/where.
# FIXME: Is this still relevant? I don't remember where I have encountered this error,
# but I no longer have this problem.

# Bug:
# Not enough memory during start of VM
# Solution:
# Qubes memory manager overrides max memory of dom0 with
# total memory available, you need to set memory limit for it.
# I have no idea what writes this memory limit in QubesOS, but
# it can be set manually:
# `run0 xenstore-write /local/domain/0/memory/static-max 100000000`
# Note that the standard `xl mem-set` doesn't work for that, as it
# uses /vm/uuid/memory field instead.
# FIXME: Permanent solution needed.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Both of those looks like missing xen-init-dom0 call (normally a systemd service of this name, calling /usr/libexec/xen/bin/xen-init-dom0) - part of xen package

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The Xen module is enabled here, and that in turn enables the xen-init-dom0 systemd service here.

Well, that's what should happen. In theory. It works with vanilla Xen.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

First problem is fixed even without domid key.
I believe it was caused by hostname being not dom0, thus causing qubes-core-admin-client to misbehave, because it can't find domain according to hostname (qubes expects adminvm to have name == dom0 with no ability to change it, and if dom0 hostname is not dom0 - then it can't detect that current domain is dom0)

This was fixed by changing default dom0 hostname to dom0, and by setting qubesdb /name key to dom0 (Which is used as an alternative method of hostname detection) for the cases where you can't use dom0 as hostname.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

qubes expects adminvm to have name == dom0 with no ability to change it

Right... I know it's stupid, but unfortunately it's hardcoded in too many places right now...

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

qubesdb /name workaround works well for everything

@CertainLach
Copy link
Member Author

This branch is a little bit outdated, I'm debugging issues occured after nixos rebase.

For some reason, installation of StandaloneVM stopped working, qemu window appears, but it is always empty.

@nixos-discourse
Copy link

This pull request has been mentioned on NixOS Discourse. There might be relevant details there:

https://discourse.nixos.org/t/nixos-xen-project-reviving-the-xen-project-hypervisor-on-nixpkgs/52768/7

@CertainLach
Copy link
Member Author

Rebased&Cleaned up the whole history.

StandaloneVM installation is still broken, I believe this is caused by some upstream (qubes or nixos) changes, as I don't see any relevant changes between rebased and not rebased version of this PR.

+ // in QubesOS that works well: /bin/qubesdb-read => read, however in nixos, path before can contain a -:
+ // /nix/store/aaaaaa-qubesdb/qubesdb-read => qubesdb/qubesdb-read, which is not a valid qubesdb command.
+ // Fix it by first taking a filename (=removing all components ending in /) of a path.
+ cmd_argv0 = argv[0];
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

TODO: replace with basename() call, and submit this patch upstream

From dadc0d427eddaf49a6b213e7345c86e81a9c84e7 Mon Sep 17 00:00:00 2001
From: Yaroslav Bolyukin <iam@lach.pw>
Date: Mon, 16 Sep 2024 18:54:05 +0200
Subject: [PATCH 2/6] fix: broken qvm-device symlinks
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

TODO: This and relevant qubes-core-admin-client needs to be submitted upstream

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@CertainLach
Copy link
Member Author

Figured out StandaloneVM - this is caused by changes that were not included in the previous version of this PR, but in my private nixpkgs fork

    ++ lib.lists.optional withSeaBIOS "--with-system-seabios=${seabios}/share/seabios"

This is incorrect, as --with-system-seabios accepts full path to seabios binary, after replacing path with the correct one StandaloneVM installation works again.
TODO: Full path needs to be overrideable too, as we want to use qubes-seabios here, and it has different binary names inside.

@SigmaSquadron PTAL

Copy link
Contributor

@SigmaSquadron SigmaSquadron left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The build failures can probably be fixed with a rebase once #345171, #345192 and #341429 are merged.


Result of nixpkgs-review pr 341215 run on x86_64-linux 1

2 packages blacklisted:
  • nixos-install-tools
  • tests.nixos-functions.nixos-test
65 packages failed to build:
  • appvm
  • collectd
  • diffoscope
  • diffoscope.dist
  • diffoscope.man
  • docker-machine-kvm2
  • gnome-boxes
  • guestfs-tools
  • htcondor
  • libguestfs
  • librenms
  • libvirt
  • libvirt-glib
  • libvirt-glib.dev
  • libvirt-glib.devdoc
  • libvmi
  • libvmi.dev
  • libvmi.lib
  • mgmt
  • minikube
  • multipass
  • perl536Packages.SysVirt
  • perl536Packages.SysVirt.devdoc
  • perl538Packages.SysVirt
  • perl538Packages.SysVirt.devdoc
  • python311Packages.guestfs
  • python311Packages.guestfs.dist
  • python311Packages.libvirt
  • python311Packages.libvirt.dist
  • python312Packages.guestfs
  • python312Packages.guestfs.dist
  • python312Packages.libvirt
  • python312Packages.libvirt.dist
  • qemu_xen_4_17
  • qemu_xen_4_17.debug
  • qemu_xen_4_17.ga
  • rubyPackages.ruby-libvirt (rubyPackages_3_3.ruby-libvirt)
  • rubyPackages_3_1.ruby-libvirt
  • rubyPackages_3_2.ruby-libvirt
  • vagrant
  • virt-manager
  • virt-manager-qt
  • virt-manager.dist
  • virt-top
  • virt-viewer
  • xen (xenPackages.xen_4_19)
  • xen.boot (xenPackages.xen_4_19.boot)
  • xen.dev (xenPackages.xen_4_19.dev)
  • xen.doc (xenPackages.xen_4_19.doc)
  • xen.man (xenPackages.xen_4_19.man)
  • xenPackages.xen_4_17
  • xenPackages.xen_4_17-slim
  • xenPackages.xen_4_17-slim.boot
  • xenPackages.xen_4_17-slim.dev
  • xenPackages.xen_4_17-slim.doc
  • xenPackages.xen_4_17-slim.man
  • xenPackages.xen_4_17.boot
  • xenPackages.xen_4_17.dev
  • xenPackages.xen_4_17.doc
  • xenPackages.xen_4_17.man
  • xenPackages.xen_4_18
  • xenPackages.xen_4_18.boot
  • xenPackages.xen_4_18.dev
  • xenPackages.xen_4_18.doc
  • xenPackages.xen_4_18.man
66 packages built:
  • python311Packages.qubes-app-linux-usb-proxy
  • python311Packages.qubes-core-admin
  • python311Packages.qubes-core-admin-client
  • python311Packages.qubes-core-admin.man
  • python311Packages.qubes-core-libvirt
  • python311Packages.qubes-core-libvirt.dist
  • python311Packages.qubes-core-qrexec
  • python311Packages.qubes-core-qubesdb
  • python311Packages.qubes-core-qubesdb.dist
  • python311Packages.qubes-desktop-linux-common
  • python311Packages.qubes-desktop-linux-common.dist
  • python311Packages.qubes-imgconverter
  • python311Packages.qubes-imgconverter.dist
  • qubes-vmm-xen (python311Packages.qubes-vmm-pyxen)
  • qubes-vmm-xen.boot (python311Packages.qubes-vmm-pyxen.boot)
  • qubes-vmm-xen.dev (python311Packages.qubes-vmm-pyxen.dev)
  • qubes-vmm-xen.doc (python311Packages.qubes-vmm-pyxen.doc)
  • qubes-vmm-xen.man (python311Packages.qubes-vmm-pyxen.man)
  • python312Packages.qubes-app-linux-usb-proxy
  • python312Packages.qubes-core-admin
  • python312Packages.qubes-core-admin-client
  • python312Packages.qubes-core-admin.man
  • python312Packages.qubes-core-libvirt
  • python312Packages.qubes-core-libvirt.dist
  • python312Packages.qubes-core-qrexec
  • python312Packages.qubes-core-qubesdb
  • python312Packages.qubes-core-qubesdb.dist
  • python312Packages.qubes-desktop-linux-common
  • python312Packages.qubes-desktop-linux-common.dist
  • python312Packages.qubes-imgconverter
  • python312Packages.qubes-imgconverter.dist
  • qemu_qubes
  • qemu_qubes.debug
  • qemu_qubes.ga
  • qemu_xen (qemu_xen_4_19)
  • qemu_xen.debug (qemu_xen_4_19.debug)
  • qemu_xen.ga (qemu_xen_4_19.ga)
  • qemu_xen_4_18
  • qemu_xen_4_18.debug
  • qemu_xen_4_18.ga
  • qubes-artwork
  • qubes-core-admin-linux
  • qubes-core-agent-linux
  • qubes-core-agent-linux.man
  • qubes-core-libvirt
  • qubes-core-qubesdb
  • qubes-core-vchan-xen
  • qubes-desktop-linux-kde
  • qubes-gui-common
  • qubes-gui-daemon
  • qubes-linux-utils
  • qubes-manager
  • qubes-manager.dist
  • qubes-seabios
  • qubes-vmm-stubdom-linux
  • xen-guest-agent
  • xen-slim (xenPackages.xen_4_19-slim)
  • xen-slim.boot (xenPackages.xen_4_19-slim.boot)
  • xen-slim.dev (xenPackages.xen_4_19-slim.dev)
  • xen-slim.doc (xenPackages.xen_4_19-slim.doc)
  • xen-slim.man (xenPackages.xen_4_19-slim.man)
  • xenPackages.xen_4_18-slim
  • xenPackages.xen_4_18-slim.boot
  • xenPackages.xen_4_18-slim.dev
  • xenPackages.xen_4_18-slim.doc
  • xenPackages.xen_4_18-slim.man

@ethnh
Copy link
Contributor

ethnh commented Oct 5, 2024

god bless you seriously 🙇

@CertainLach
Copy link
Member Author

CertainLach commented Oct 14, 2024

Another rebase, this time StandaloneVM display is broken again?
This time seabios path is passed correctly as I can see, is it broken due to different reasons, or something in seabios/xen build has been broken in the meantime?

I don't even understand why seabios/xen are affecting this... As far as I can see, this is just a normal VM window (...however, without colored borders, for some reason?), created by this qubes qemu component: https://github.com/QubesOS/qubes-gui-agent-xen-hvm-stubdom, which is installed in stubdom (Extracted from qubes RPMs, it is too hard to build NixOS-based stubdom right now).

@wegank wegank added the 2.status: merge conflict This PR has merge conflicts with the target branch label Nov 1, 2024
@CertainLach
Copy link
Member Author

I have made some progress on QubesOS builders and building stubdom for NixOS-Qubes, however I believe it would be much easier to handle those tasks after base QubesOS packages are already merged in NixOS, even if they have suboptimal implementation (Looking at stubdom, which is extracted from QubesOS RPMs) sometimes.

Another way to simplify management of this package set would be extracting them to separate flake... Thoughts?

For now, I have updated all of packages to latest versions, rebased to latest master, and populated meta attributes as much as possible, to mark it ready for review.

Please ignore formatting deficiencies for now (Some of patches not present here might break on reformatting, and I would like to avoid too much rebase conflicts), there is enough of crimes against humanity here without that.

@CertainLach
Copy link
Member Author

StandaloneVM seems to be fixed again, but I would expect that it might break again due to unknown reasons, I believe this might be fixed after unification of package versions between dom0 and stubdom, which will only happen in the future, as building our own stubdom is too complicated for now.

@evq
Copy link

evq commented Nov 17, 2024

this is awesome work @CertainLach!

I've been working on Qubes packaging as well, coming at it from the angle of just creating a NixOS template vm that can be used under vanilla Qubes. I love the idea of using NixOS in dom0 as well.

as I'm fairly new to Nix I packaged it as a standalone flake to get feedback on how to best upstream it:
https://github.com/evq/qubes-nixos-template

if what I've created is complementary it'd be great to collaborate on merging the two.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
2.status: merge conflict This PR has merge conflicts with the target branch 2.status: work-in-progress This PR isn't done 6.topic: nixos Issues or PRs affecting NixOS modules, or package usability issues specific to NixOS 6.topic: python 6.topic: xen-project The Xen Project hypervisor 8.has: module (update) This PR changes an existing module in `nixos/` 8.has: package (new) This PR adds a new package 10.rebuild-darwin: 11-100 10.rebuild-linux: 11-100 11.by: package-maintainer This PR was created by the maintainer of the package it changes
Projects
None yet
Development

Successfully merging this pull request may close these issues.

7 participants