1
0
Fork 0
Simple application VMs (hypervisor-based sandbox) based on Nix package manager.
 
 
 
Go to file
dump_stack() 43d42c2242
go modules
2019-12-30 15:55:00 +00:00
.github GitHub Actions: Fix fetch dependencies 2019-12-29 19:31:12 +00:00
screenshots Add screenshot 2018-07-05 07:46:31 +00:00
.envrc [feat] added environment files 2019-12-29 18:27:02 +03:00
.gitignore Generate X monitor section is no more required 2019-12-29 14:36:36 +00:00
LICENSE Add LICENSE 2018-06-30 22:15:11 +00:00
README.md Update README.md 2019-12-30 14:18:34 +00:00
appvm.go Do not fetch remote repository 2019-12-30 14:15:59 +00:00
base.nix.go Update used memory each second (minute previously) 2019-12-29 18:57:36 +00:00
builtin.go Embed builtin description for apps 2019-12-30 14:09:44 +00:00
generate.go Custom name for generate VMs 2019-12-30 13:58:18 +00:00
go.mod go modules 2019-12-30 15:55:00 +00:00
go.sum go modules 2019-12-30 15:55:00 +00:00
local.nix.template.go Embed base nix configuration to binary 2019-12-29 17:41:44 +00:00
shell.nix [feat] added environment files 2019-12-29 18:27:02 +03:00
xml.go Remove outdated TODO 2019-12-29 18:42:19 +00:00

README.md

Donate Donate

Nix application VMs: security through virtualization

Simple application VMs (hypervisor-based sandbox) based on Nix package manager.

Uses one read-only /nix directory for all appvms. So creating a new appvm (but not first) is just about one minute.

appvm screenshot

Dependencies

$ sudo apt install golang virt-manager curl git
$ sudo usermod -a -G libvirt $USER

$ echo 'export GOPATH=$HOME/go' >> ~/.bash_profile
$ echo 'export PATH=$PATH:$GOPATH/bin' >> ~/.bash_profile
$ echo 'source ~/.bash_profile' >> ~/.bashrc
$ source ~/.bash_profile

You need to relogin if you install virt-manager (libvirt) first time.

Install Nix package manager

$ sudo mkdir -m 0755 /nix && sudo chown $USER /nix
$ curl https://nixos.org/nix/install | sh
$ . ~/.nix-profile/etc/profile.d/nix.sh

Libvirt from user (required if you need access to shared files)

$ echo user = "\"$USER\"" | sudo tee -a /etc/libvirt/qemu.conf
$ sudo systemctl restart libvirtd

Install appvm tool

$ go get code.dumpstack.io/tools/appvm

Update appvm tool

$ go get -u code.dumpstack.io/tools/appvm

Generate new application

$ nix-channel --list
nix https://nixos.org/channels/nixos-unstable
$ appvm generate nix.firefox

Run application

$ appvm start chromium --verbose
$ # ... long wait for first time, because we need to collect a lot of packages

You can customize local settings in ~/.config/appvm/nix/local.nix.

Default hotkey to release cursor: ctrl+alt.

Shared directory

$ ls appvm/chromium
foo.tar.gz
bar.tar.gz

Close VM

$ appvm stop chromium

Automatic ballooning

Add this command:

$ appvm autoballoon

to crontab like that:

$ crontab -l
* * * * * /home/user/dev/go/bin/appvm autoballoon

App description

$ cat nix/chromium.nix
{pkgs, ...}:
{
  imports = [
    <nixpkgs/nixos/modules/virtualisation/qemu-vm.nix>
    <nix/base.nix>
  ];

  services.xserver.displayManager.sessionCommands =
    "while [ 1 ]; do ${pkgs.chromium}/bin/chromium; done &";
}

For create new app you should add package name (search at https://nixos.org/nixos/packages.html) and path to binary (typically same as package name).