Use systemd-nspawn to Create a Development Sandbox
| 968 words Last updated:
systemd-nspawn is a great tool for creating development sandboxes. Compared to other similar technologies, it’s lightweight, flexible, and easy to use. In this blog, I’ll present a simple guide to using it.
Advantages
I’ve been using traditional VMs and Docker for creating development environments. While both work fine, regardless of the performance, they suffer from being overly isolated. Two big headaches for me are host network sharing in traditional VMs and the immutability of Docker container ports and mounts.
systemd-nspawn is much more flexible. Every feature can be configured granularly and dynamically. For example, filesystem sharing can be configured to work like bind mounts, and network isolation can be disabled entirely, which exactly solves the two headaches mentioned above. Additionally, being part of systemd, it has the same excellent design as other systemd components.
Debian has a similar powerful tool called schroot. It is the official tool for automatic package building. Unfortunately, it seems to be a tool specific to Debian.
Usage
systemd-nspawn consists of two parts that work together to achieve its VM functionality:
- The program
systemd-nspawn
, which runs other programs in an isolated environment with user-specified settings. Each running VM is essentially a group of processes launched viasystemd-nspawn
. - Components for defining and managing VMs, possibly utilizing
systemd-nspawn
.
systemd-nspawn has a user interface similar to systemd service:
[name].service
=>[name].nspawn
: Define VMs.- Should be placed in
/etc/systemd/nspawn/
, wheremachinectl
scans for VM definitions. [name]
serves as the VM’s name. Use it to specify the VM when callingmachinectl
. Note: You’d better use a valid hostname (avoid illegal characters like.
) to prevent weird errors.- The options available roughly mirror
systemd-nspawn
’s CLI arguments, with some adjustments to better fit VM semantics. - Isolation-related options are usually prefixed with
Private
(e.g.,PrivateUsers=
).
- Should be placed in
systemctl
=>machinectl
: Manage VMs.enable
/disable
: Set whether the VM starts automatically at system boot.start
/poweroff
/reboot
/terminate
/kill
: Control the VM’s running state.login
/shell
: Do things inside the VM.
I’ll demonstrate how to create a Debian-based VM on Arch Linux as an example. You should adjust the commands based on your own situation.
Create Root Filesystem
The root filesystem of a distribution can be created using a special tool from
its package manager. For Debian-based distributions, it’s debootstrap
. If your
OS uses a different package manager ecosystem, the target distribution’s one and
its keyrings (which might reside somewhere else) have to be installed first.
|
|
Regular directories work perfectly as root filesystems, but other directory-like
things should work, too, such as btrfs
subvolume.
|
|
Now, run debootstrap
to create a minimal filesystem. Update the command with
the target distribution’s codename and one of its mirrors you select.
|
|
At this point, the filesystem contains only the distribution’s essential
packages, much like a base Docker image (e.g., debian
), so you can customize
it in a similar way.
Configure and Customize
I’ll present my personal configuration here as a reference. You can create a new one based on it or from scratch.
- Disable user isolation:
[Exec] PrivateUsers=no
- Disable network isolation:
[Network] Private=no
- Create a user with the same username, group name, UID and GIDs: should be done inside the VM.
- Only bind a subdirectory under home:
[Files] Bind=/home/[user]/[subdir]
- Set the hostname:
[Exec] Hostname=[hostname]
I disable user isolation because it’s implemented using the kernel’s user namespace, which adds many inconveniences due to UID/GID mapping.
So, the final .nspawn
file is like:
|
|
If machinectl
can already start the VM, you can log in to customize it
further. Otherwise, you can use systemd-nspawn
directly to enter the VM and
run commands inside it. --resolv-conf=bind-host
binds the host’s
/etc/resolv.conf
file to make the network work.
|
|
Now, inside the VM, you can do whatever you like. In my configuration, a correct user must be created manually.
|
|
Some setup may need to be done manually, especially those usually handled by the distribution’s installer.
- Update
/etc/hostname
with the VM’s real hostname. - Update
/etc/hosts
.
|
|
Ubuntu 20.04 specific: Due to a bug in systemd, the backport source has to be added.
|
|
Use
The following command starts a new shell session for the specified user inside the VM, where you can run commands and perform tasks.
|
|
Another way is to use login
command to enter the login console. From there,
you can log in as a user to start a shell session.
|
|
To exit a VM session (especially in the login console), press CTRL+]
three
times quickly in a row.
Snapshot
The easiest way to backup/snapshot a VM is to create an archive of the VM’s
filesystem. You can use any archive tool you prefer, such as the simple tar
.
If the VM’s filesystem is a btrfs
subvolume, native btrfs
snapshots can be
used here. Before creating a snapshot, you should power off the VM to avoid
archiving runtime files.
|
|
machinectl
also provides an image feature similar to Docker, though I’ve
never tried it. Feel free to explore it if you’re interested!