[prev in list] [next in list] [prev in thread] [next in thread] 

List:       nix-dev
Subject:    Re: [Nix-dev] nixos-container networking
From:       Tomasz Czyż <tomasz.czyz () gmail ! com>
Date:       2017-03-14 2:42:25
Message-ID: CAO1Hmo4ZLwAPZbx6f73LqhThMgN=j9abvvtuuUsXQd-WYq8sOQ () mail ! gmail ! com
[Download RAW message or body]

[Attachment #2 (multipart/alternative)]


Michael, Ian, thank you for your answers.

Looks like my problem was with the container name. I tried bunch of
different setups which didn't work and I discovered that when I'm using "-"
in container name it doesn't work (I had impression that worked one or two
times when I started machine from scratch, but most of the time didn't).

After I removed "-" from the name, looks like private network is working (I
can access private IP of container) so I don't need NAT actually.

Tom

2017-03-13 23:54 GMT+00:00 Ian-Woo Kim <ianwookim@gmail.com>:

> I've recently made nixos-container port forwarding easier (both
> imperative and declarative) and it's now merged into master.
>
> https://github.com/NixOS/nixpkgs/pull/20869
>
> Hope that this helps.
>
> Ian
>
> On Sun, Mar 12, 2017 at 7:52 PM, Michael Walker <mike@barrucadu.co.uk>
> wrote:
> > Tomasz,
> >
> > I have declarative container networking set up and working on a VPS,
> > but I wrote most of the configuration as I was learning things, so it
> > may not be the best way.
> >
> > Here's the configuration.nix for the VPS:
> > https://github.com/barrucadu/nixfiles/blob/master/hosts/innsmouth.nix
> > Each container has a config file here:
> > https://github.com/barrucadu/nixfiles/tree/master/containers
> >
> > Containers have ports forwarded to them via NAT; each container is
> > running a web server on port 80 with the host reverse-proxying via
> > nginx; the host also does https and letsencrypt for all the proxied
> > containers.
> >
> > At the top of the innsmouth.nix file, I have a "containerSpecs" record
> > which has all the details for each container. The relevant bits of the
> > config are:
> >
> > 1. Set up the networking and NAT:
> >
> > networking.nat.enable = true;
> > networking.nat.internalInterfaces = ["ve-+"];
> > networking.nat.externalInterface = "enp0s4";
> >
> > 2. Forward ports to containers:
> >
> > networking.nat.forwardPorts = concatMap
> >     ( {num, ports, ...}:
> >         map (p: { sourcePort = p; destination =
> > "192.168.255.${toString num}:${toString p}"; }) ports
> >     ) containerSpecs';
> >
> > 3. Define all the containers:
> >
> > containers = mapAttrs
> >     (_: {num, config, ...}:
> >         { autoStart = true
> >         ; privateNetwork = true
> >         ; hostAddress = "192.168.254.${toString num}"
> >         ; localAddress = "192.168.255.${toString num}"
> >         ; config = config
> >         ; }
> >     ) containerSpecs;
> >
> > 4. Reverse-proxy HTTPS to HTTP in each container, manage letsencrypt
> > certificates, and forward HTTP to HTTPS.
> >
> > This is a little complex as I have a fairly custom nginx config (see
> > the services/nginx.nix file in the repository), but the
> > reverse-proxying is fairly straightfoward. Here is the generated
> > nginx.conf: https://misc.barrucadu.co.uk/nginx.txt
> >
> > On 13 March 2017 at 02:12, Tomasz Czyż <tomasz.czyz@gmail.com> wrote:
> >> Hey,
> >>
> >> could anyone using nixos-container (declarative style) share how you
> setup
> >> networking?
> >>
> >> I'm trying to setup few containers with private network and http proxy
> at
> >> the front. Each container potentially could run application on port 80
> and I
> >> would like to expose them through proxy.
> >>
> >> I tried to set this up with
> >>
> >> privateNetwork=true;
> >> hostAddress
> >> localAddress
> >>
> >> and I tried to also run nat on the host with (just to enable outbound
> >> traffic)
> >> internalInterfaces = ["ve-+"];
> >> externalInterfaces = "eth0";
> >>
> >> but no luck.
> >> My next try will be creating bridge on the host and add containers to
> that
> >> bridge. Is that how you do stuff or are better ways of doing container
> >> networking?
> >>
> >> Tom
> >>
> >> _______________________________________________
> >> nix-dev mailing list
> >> nix-dev@lists.science.uu.nl
> >> http://lists.science.uu.nl/mailman/listinfo/nix-dev
> >>
> >
> >
> >
> > --
> > Michael Walker (http://www.barrucadu.co.uk)
> > _______________________________________________
> > nix-dev mailing list
> > nix-dev@lists.science.uu.nl
> > http://lists.science.uu.nl/mailman/listinfo/nix-dev
>



-- 
Tomasz Czyż

[Attachment #5 (text/html)]

<div dir="ltr"><div><div>Michael, Ian, thank you for your \
answers.<br><br></div><div>Looks like my problem was with the container name. I tried \
bunch of different setups which didn&#39;t work and I discovered that when I&#39;m \
using &quot;-&quot; in container name it doesn&#39;t work (I had impression that \
worked one or two times when I started machine from scratch, but most of the time \
didn&#39;t).<br><br></div><div>After I removed &quot;-&quot; from the name, looks \
like private network is working (I can access private IP of container) so I don&#39;t \
need NAT actually.<br><br></div><div>Tom<br></div></div></div><div \
class="gmail_extra"><br><div class="gmail_quote">2017-03-13 23:54 GMT+00:00 Ian-Woo \
Kim <span dir="ltr">&lt;<a href="mailto:ianwookim@gmail.com" \
target="_blank">ianwookim@gmail.com</a>&gt;</span>:<br><blockquote \
class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc \
solid;padding-left:1ex">I&#39;ve recently made nixos-container port forwarding easier \
(both<br> imperative and declarative) and it&#39;s now merged into master.<br>
<br>
<a href="https://github.com/NixOS/nixpkgs/pull/20869" rel="noreferrer" \
target="_blank">https://github.com/NixOS/<wbr>nixpkgs/pull/20869</a><br> <br>
Hope that this helps.<br>
<span class="HOEnZb"><font color="#888888"><br>
Ian<br>
</font></span><div class="HOEnZb"><div class="h5"><br>
On Sun, Mar 12, 2017 at 7:52 PM, Michael Walker &lt;<a \
href="mailto:mike@barrucadu.co.uk">mike@barrucadu.co.uk</a>&gt; wrote:<br> &gt; \
Tomasz,<br> &gt;<br>
&gt; I have declarative container networking set up and working on a VPS,<br>
&gt; but I wrote most of the configuration as I was learning things, so it<br>
&gt; may not be the best way.<br>
&gt;<br>
&gt; Here&#39;s the configuration.nix for the VPS:<br>
&gt; <a href="https://github.com/barrucadu/nixfiles/blob/master/hosts/innsmouth.nix" \
rel="noreferrer" target="_blank">https://github.com/barrucadu/<wbr>nixfiles/blob/master/hosts/<wbr>innsmouth.nix</a><br>
 &gt; Each container has a config file here:<br>
&gt; <a href="https://github.com/barrucadu/nixfiles/tree/master/containers" \
rel="noreferrer" target="_blank">https://github.com/barrucadu/<wbr>nixfiles/tree/master/<wbr>containers</a><br>
 &gt;<br>
&gt; Containers have ports forwarded to them via NAT; each container is<br>
&gt; running a web server on port 80 with the host reverse-proxying via<br>
&gt; nginx; the host also does https and letsencrypt for all the proxied<br>
&gt; containers.<br>
&gt;<br>
&gt; At the top of the innsmouth.nix file, I have a &quot;containerSpecs&quot; \
record<br> &gt; which has all the details for each container. The relevant bits of \
the<br> &gt; config are:<br>
&gt;<br>
&gt; 1. Set up the networking and NAT:<br>
&gt;<br>
&gt; networking.nat.enable = true;<br>
&gt; networking.nat.<wbr>internalInterfaces = [&quot;ve-+&quot;];<br>
&gt; networking.nat.<wbr>externalInterface = &quot;enp0s4&quot;;<br>
&gt;<br>
&gt; 2. Forward ports to containers:<br>
&gt;<br>
&gt; networking.nat.forwardPorts = concatMap<br>
&gt;        ( {num, ports, ...}:<br>
&gt;              map (p: { sourcePort = p; destination =<br>
&gt; &quot;192.168.255.${toString num}:${toString p}&quot;; }) ports<br>
&gt;        ) containerSpecs&#39;;<br>
&gt;<br>
&gt; 3. Define all the containers:<br>
&gt;<br>
&gt; containers = mapAttrs<br>
&gt;        (_: {num, config, ...}:<br>
&gt;              { autoStart = true<br>
&gt;              ; privateNetwork = true<br>
&gt;              ; hostAddress = &quot;192.168.254.${toString num}&quot;<br>
&gt;              ; localAddress = &quot;192.168.255.${toString num}&quot;<br>
&gt;              ; config = config<br>
&gt;              ; }<br>
&gt;        ) containerSpecs;<br>
&gt;<br>
&gt; 4. Reverse-proxy HTTPS to HTTP in each container, manage letsencrypt<br>
&gt; certificates, and forward HTTP to HTTPS.<br>
&gt;<br>
&gt; This is a little complex as I have a fairly custom nginx config (see<br>
&gt; the services/nginx.nix file in the repository), but the<br>
&gt; reverse-proxying is fairly straightfoward. Here is the generated<br>
&gt; nginx.conf: <a href="https://misc.barrucadu.co.uk/nginx.txt" rel="noreferrer" \
target="_blank">https://misc.barrucadu.co.uk/<wbr>nginx.txt</a><br> &gt;<br>
&gt; On 13 March 2017 at 02:12, Tomasz Czyż &lt;<a \
href="mailto:tomasz.czyz@gmail.com">tomasz.czyz@gmail.com</a>&gt; wrote:<br> &gt;&gt; \
Hey,<br> &gt;&gt;<br>
&gt;&gt; could anyone using nixos-container (declarative style) share how you \
setup<br> &gt;&gt; networking?<br>
&gt;&gt;<br>
&gt;&gt; I&#39;m trying to setup few containers with private network and http proxy \
at<br> &gt;&gt; the front. Each container potentially could run application on port \
80 and I<br> &gt;&gt; would like to expose them through proxy.<br>
&gt;&gt;<br>
&gt;&gt; I tried to set this up with<br>
&gt;&gt;<br>
&gt;&gt; privateNetwork=true;<br>
&gt;&gt; hostAddress<br>
&gt;&gt; localAddress<br>
&gt;&gt;<br>
&gt;&gt; and I tried to also run nat on the host with (just to enable outbound<br>
&gt;&gt; traffic)<br>
&gt;&gt; internalInterfaces = [&quot;ve-+&quot;];<br>
&gt;&gt; externalInterfaces = &quot;eth0&quot;;<br>
&gt;&gt;<br>
&gt;&gt; but no luck.<br>
&gt;&gt; My next try will be creating bridge on the host and add containers to \
that<br> &gt;&gt; bridge. Is that how you do stuff or are better ways of doing \
container<br> &gt;&gt; networking?<br>
&gt;&gt;<br>
&gt;&gt; Tom<br>
&gt;&gt;<br>
&gt;&gt; ______________________________<wbr>_________________<br>
&gt;&gt; nix-dev mailing list<br>
&gt;&gt; <a href="mailto:nix-dev@lists.science.uu.nl">nix-dev@lists.science.uu.nl</a><br>
 &gt;&gt; <a href="http://lists.science.uu.nl/mailman/listinfo/nix-dev" \
rel="noreferrer" target="_blank">http://lists.science.uu.nl/<wbr>mailman/listinfo/nix-dev</a><br>
 &gt;&gt;<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt; --<br>
&gt; Michael Walker (<a href="http://www.barrucadu.co.uk" rel="noreferrer" \
target="_blank">http://www.barrucadu.co.uk</a>)<br> &gt; \
______________________________<wbr>_________________<br> &gt; nix-dev mailing \
list<br> &gt; <a href="mailto:nix-dev@lists.science.uu.nl">nix-dev@lists.science.uu.nl</a><br>
 &gt; <a href="http://lists.science.uu.nl/mailman/listinfo/nix-dev" rel="noreferrer" \
target="_blank">http://lists.science.uu.nl/<wbr>mailman/listinfo/nix-dev</a><br> \
</div></div></blockquote></div><br><br clear="all"><br>-- <br><div \
class="gmail_signature" data-smartmail="gmail_signature">Tomasz Czyż</div> </div>



_______________________________________________
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic