Revert "inline proxmox-template call (#588)" (#592)

Reverts commit 65a14f63ff, which seems to have caused a regression.

Reviewed-on: fediversity/fediversity#592
This commit is contained in:
Kiara Grouwstra 2025-11-21 13:03:27 +01:00
parent 65a14f63ff
commit bb100b698e
4 changed files with 87 additions and 55 deletions

View file

@ -7,61 +7,23 @@
}: }:
let let
inherit (pkgs) system; inherit (pkgs) system;
inherit (pkgs.callPackage ../../utils.nix { }) evalModel;
inherit (pkgs.callPackage ../common/utils.nix { inherit modulesPath; }) mkNixosConfiguration;
backendPort = builtins.toString 8080; backendPort = builtins.toString 8080;
tfBackend = fragment: { tfBackend = fragment: {
address = "http://localhost:${backendPort}/state/${fragment}"; address = "http://localhost:${backendPort}/state/${fragment}";
}; };
template-deployment = template-deployment =
(evalModel ( (import ./setups/template.nix {
{ config, ... }: inherit sources system modulesPath;
{ config = {
imports = [ ../common/model.nix ]; httpBackend = tfBackend "proxmox-test/upload";
config = { nodeName = "pve";
environments.default = environment: { targetSystem = system;
resources."operator-environment".login-shell = { node-name = "pve";
wheel = true; imageDatastoreId = "local";
username = "operator"; };
}; }).default.tf-proxmox-template;
implementation =
{
required-resources,
...
}:
{
tf-proxmox-template = {
nixos-configuration = {
imports = [
(mkNixosConfiguration environment required-resources)
./shared.nix
];
};
inherit system;
ssh.host = "pve";
httpBackend = tfBackend "proxmox-test/upload";
node-name = "pve";
imageDatastoreId = "local";
};
};
};
};
options.default =
let
env = config.environments.default;
in
lib.mkOption {
type = env.resource-mapping.output-type;
default = env.deployment {
deployment-name = "default";
# normally our template is distinct, but our test cannot download build deps due to sandboxing
configuration = config."example-configuration";
};
};
}
)).default.tf-proxmox-template;
vm-deployment = vm-deployment =
(import ./data-model.nix { (import ./setups/vm.nix {
inherit sources system modulesPath; inherit sources system modulesPath;
config = { config = {
httpBackend = tfBackend "proxmox-test/nixos"; httpBackend = tfBackend "proxmox-test/nixos";

View file

@ -1,12 +1,12 @@
{ {
lib, lib,
sources ? import ../../../npins, sources ? import ../../../../npins,
... ...
}: }:
{ {
imports = [ imports = [
"${sources.disko}/module.nix" "${sources.disko}/module.nix"
../../../infra/common/proxmox-qemu-vm.nix ../../../../infra/common/proxmox-qemu-vm.nix
]; ];
networking.useDHCP = false; networking.useDHCP = false;
services.qemuGuest.enable = true; services.qemuGuest.enable = true;

View file

@ -0,0 +1,70 @@
{
config,
system,
modulesPath,
sources ? import ../../../../npins,
...
}:
let
inherit (sources) nixpkgs;
pkgs = import nixpkgs { inherit system; };
inherit (pkgs) lib;
inherit (pkgs.callPackage ../../common/utils.nix { inherit modulesPath; }) mkNixosConfiguration;
inherit (config)
nodeName
targetSystem
httpBackend
node-name
imageDatastoreId
;
in
(pkgs.callPackage ../../../utils.nix { }).evalModel (
{ config, ... }:
{
imports = [ ../../common/model.nix ];
config = {
environments.default = environment: {
resources."operator-environment".login-shell = {
wheel = true;
username = "operator";
};
implementation =
{
required-resources,
...
}:
{
tf-proxmox-template = {
nixos-configuration = {
imports = [
(mkNixosConfiguration environment required-resources)
./shared.nix
];
};
system = targetSystem;
ssh = {
host = nodeName;
};
inherit
node-name
httpBackend
imageDatastoreId
;
};
};
};
};
options.default =
let
env = config.environments.default;
in
lib.mkOption {
type = env.resource-mapping.output-type;
default = env.deployment {
deployment-name = "default";
# normally our template is distinct, but our test cannot download build deps due to sandboxing
configuration = config."example-configuration";
};
};
}
)

View file

@ -2,14 +2,14 @@
config, config,
system, system,
modulesPath, modulesPath,
sources ? import ../../../npins, sources ? import ../../../../npins,
... ...
}@args: }@args:
let let
inherit (sources) nixpkgs; inherit (sources) nixpkgs;
pkgs = import nixpkgs { inherit system; }; pkgs = import nixpkgs { inherit system; };
inherit (pkgs) lib; inherit (pkgs) lib;
inherit (pkgs.callPackage ../common/utils.nix { inherit modulesPath; }) mkNixosConfiguration; inherit (pkgs.callPackage ../../common/utils.nix { inherit modulesPath; }) mkNixosConfiguration;
inherit (config) inherit (config)
nodeName nodeName
pathToRoot pathToRoot
@ -30,10 +30,10 @@ let
ipv6Address ipv6Address
; ;
in in
(pkgs.callPackage ../../utils.nix { }).evalModel ( (pkgs.callPackage ../../../utils.nix { }).evalModel (
{ config, ... }: { config, ... }:
{ {
imports = [ ../common/model.nix ]; imports = [ ../../common/model.nix ];
config = { config = {
environments.default = environment: { environments.default = environment: {
resources."operator-environment".login-shell = { resources."operator-environment".login-shell = {