Compare commits

..

127 commits

Author SHA1 Message Date
5cd02be848
streamline version
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 20:58:12 +02:00
70cf39ea59
rm modulesPath
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 18:20:53 +02:00
33b8834f7a
add nixos-test-base to targetResource, fixing basic/cli tests
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 17:27:08 +02:00
dfc88a4b2b
fix primaryIPAddress
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 16:53:34 +02:00
e8b861f4b9
rm repart
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 15:55:32 +02:00
67c115f4f6
rm optional from deployer
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 15:45:40 +02:00
8e17e8bc9b
ensure acmeNodeIP is set
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 14:33:09 +02:00
3fa61eed0e
comment repart imports
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 14:21:51 +02:00
c4f7957b47
dedupe acme ip
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 21:10:46 +02:00
96a69c628e
fix import
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 20:45:17 +02:00
fb25554c7b
mv out qemu settings
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 20:10:41 +02:00
e091b18675
mv nixos-test-base from common to non-proxmox tests
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 20:10:22 +02:00
03a9c9b305
disable dhcp, fixing no-op
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 19:16:10 +02:00
2b87ce0819
move proxmox config out
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 19:06:02 +02:00
672c8ceafe
rm unused settings
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 17:38:16 +02:00
9ddc71acc3
simplify networking
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 17:16:48 +02:00
6da73f104f
rm disko
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 17:02:28 +02:00
86ee3a987b
rm wheel
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 17:02:19 +02:00
a721e80c73
rm comment
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 17:02:10 +02:00
3ee3458888
rm users
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 17:01:55 +02:00
23bb4e8f51
verbose ci
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 16:43:20 +02:00
d4ce6258ba
restore disk size
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
75a16cfdf8
add fixme
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
ecd4f319db
mv disko
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
d217fa5df9
rm flake invocation
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
4c331a100f
restore pm bash scripts
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
9f8177d8a4
clean up iso tf
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
79775c6b05
make upload depend on hash
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
e81be73fad
rename module to caller
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
3dd2412739
split proxmox upload/deploy
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
b707168bf2
reduce verbosity
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
1eb570c42a
restrict token roles
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
0e22347713
use token
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
276a376e3e
rm debug log comment
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
b8a1ce5b74
rename deployment method to prep for separation
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
299682884d
rm unused options
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
bc7e062d94
split out TF proxmox data model
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
495b750d76
limit disk size
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
77c46c0b32
clean some comments
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
774bae121e
clean out comments
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
934e4189b5
use insecure for test only
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
d8f5bc0a42
dedupe block
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
00aa2b9bec
lower memory
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
a4d87f2fcc
rename bridge
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
7c820bd5f8
fix tf syntax
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
b271dc5414
pass ipv6
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
59ab9ce863
add no-op second invocation
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
b1b5c3864a
rm apparently unnecessary gateway stuff
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
d1a8dbf13c
trigger update by codebase hash
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
4a081113b3
add fixmes
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
0f791aa723
rm memory size
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
65f6a3f9b6
output id
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
1949a50485
print to stderr
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
3cccd8b40f
todo wire credentials
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
6385c56566
rm debug key
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
e68d4b71a7
base-hash
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
5123ec0f87
rm comment
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
7f8b9abe71
grub default false
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
81fb644a4b
pkgs.qemu
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
b8737e552e
unprint await steps
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
e72071e82d
rename await
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
2e99d05cb0
fix null resource commands
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
296a5bdff1
make path in single host explicit
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
a94209e681
working networking
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
04e5bb58d6
raise limits
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
80265a8432
working networking
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
54f45d05e5
include await-ssh
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
81cfd8d6d9
execute await-ssh
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
b97dcfe43a
pass proxmox user/pw thru env var as well, should fix usage from flake again
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
a00190bc2c
use jumphost for test
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
d0534ef93a
bootable disk
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
91488a6c4e
rm broken async_pf fix
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
ae22484b72
rm old networking
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
cefbbcd66e
users
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
3a0d244324
factor out await.ssh
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
9bb01de2df
add debugging key
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
6439b097ce
fix verification
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
9e491f3eac
increase timeout
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:40 +02:00
c9e4105a86
add interface to ipv6 addresses
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
c47c52c0ac
don't reinstall bootloader
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
4bdbab420a
allow spaces in ssh opts
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
cd38494486
interface sata2 actually exposes initialization info on the vm
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
1924eceebd
verbose wait
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
8df7628fc1
comment ls echo
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
509f70ce7b
check hello application
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
da6b4205fa
restore jq package
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
f2617dc984
enable cloud-init
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
8918fb2301
ssh key
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
7a31718c8c
rm comment
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
43d694c519
propagate token
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
25027b200c
set up proxmox
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
4f506ee0fc
handle CA certificate
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
8e37afc9d5
add packages
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
889932691a
add fixmes
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
ddf3b3713f
prevent kernel panic
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
baaa9abb8f
use json format for output only
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
de8ba56887
propagate ssh key
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
11a2604b8a
default timeouts
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
9a24bc663f
propagate cd
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
15e9a93a1f
use variables
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
36bc294057
propagate ips
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
64f9c4e249
rm ubuntu
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
937796e822
output: separate ips
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
762186ce06
apply: json
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
97ee0e6878
un-generators
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
7c5e85c0b6
propagate datastore id
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
b1aa9668e3
add pve-manager for pvesh
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
5dad8e68cb
password default
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
439a379a4c
upstream nimbolus
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
826e1f0f0c
rm output comment
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
a82018a467
await SSH availability, resolving a race condition
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
72a54bc093
un-hardcode networking info
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
c0682276fc
rm bash-proxmox
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
ac1708cf2f
skip acme
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
8046781990
unlog steps
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
7d3b2d6b2d
clean up unused vms
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
1ed616833a
factor out TF setup
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
d43decfdcd
first time to get nix run pipeline to succeed including update step
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
14d1b00ba2
hardcoded networking setup for nix run vm 101
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
7ede8ec7db
start documenting needed proxmox user privileges
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
9a42aed892
back to qcow over size difference
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
66dca2857f
some cleanup
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
dd1f5d4316
automated deployment to proxmox (in nix run) of vm booting to login
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
b1da4cb8e8
simplify
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
272d62f2b8
bootable vm by repart
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
67f77cab23
get nix run to build a vm bootable by qemu
```
cp /nix/store/.../nixos.img disk.raw
chmod 0644 disk.raw
qemu-system-x86_64 -enable-kvm -m 2048 -drive
if=virtio,file=./disk.raw,format=raw -bios "$(nix eval --impure --expr
'(import <nixpkgs> { }).OVMF.fd.outPath' | jq -r)/FV/OVMF.fd"
```

Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
ef7f52f8f4
WIP: proxmox deployment
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>

continued

Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-22 15:31:39 +02:00
24 changed files with 36 additions and 76 deletions

View file

@ -1,5 +1,4 @@
{
pkgs,
runNixOSTest,
inputs,
sources,
@ -10,10 +9,7 @@ runNixOSTest {
../common/nixosTest.nix
./nixosTest.nix
];
_module.args = {
inherit inputs sources;
modulesPath = "${builtins.toString pkgs.path}/nixos/modules";
};
_module.args = { inherit inputs sources; };
inherit (import ./constants.nix)
targetMachines
pathToRoot

View file

@ -1,5 +1,4 @@
{
pkgs,
runNixOSTest,
inputs,
sources,
@ -10,10 +9,7 @@ runNixOSTest {
../common/nixosTest.nix
./nixosTest.nix
];
_module.args = {
inherit inputs sources;
modulesPath = "${builtins.toString pkgs.path}/nixos/modules";
};
_module.args = { inherit inputs sources; };
inherit (import ./constants.nix)
targetMachines
pathToRoot

View file

@ -3,7 +3,6 @@
lib,
pkgs,
config,
modulesPath,
sources,
...
}:
@ -76,7 +75,7 @@ in
machine =
(pkgs.nixos [
./targetNode.nix
"${modulesPath}/../lib/testing/nixos-test-base.nix"
"${sources.nixpkgs}/nixos/lib/testing/nixos-test-base.nix"
config.system.extraDependenciesFromModule
{
nixpkgs.hostPlatform = "x86_64-linux";

View file

@ -4,7 +4,6 @@
config,
hostPkgs,
sources,
modulesPath,
...
}:
@ -115,7 +114,7 @@ in
(genAttrs config.targetMachines (_: {
imports = [
./targetNode.nix
] ++ (lib.optional config.useFlake "${modulesPath}/../lib/testing/nixos-test-base.nix");
] ++ (lib.optional config.useFlake "${sources.nixpkgs}/nixos/lib/testing/nixos-test-base.nix");
_module.args = { inherit inputs sources; };
enableAcme = config.enableAcme;
acmeNodeIP = if config.enableAcme then config.nodes.acme.networking.primaryIPAddress else null;

View file

@ -2,11 +2,11 @@
inputs,
config,
lib,
modulesPath,
...
}:
let
sources = import ../../../npins;
testCerts = import "${inputs.nixpkgs}/nixos/tests/common/acme/server/snakeoil-certs.nix";
inherit (lib) mkIf mkMerge;
@ -15,8 +15,7 @@ in
_class = "nixos";
imports = [
"${modulesPath}/profiles/minimal.nix"
"${modulesPath}/profiles/qemu-guest.nix"
"${sources.nixpkgs}/nixos/modules/profiles/qemu-guest.nix"
./sharedOptions.nix
];

View file

@ -3,7 +3,6 @@
lib,
config,
sources,
modulesPath,
...
}:
@ -40,7 +39,7 @@ in
imports = [
./targetNode.nix
(lib.modules.importJSON (config.pathToCwd + "/${config.nodeName}-network.json"))
"${modulesPath}/../lib/testing/nixos-test-base.nix"
"${sources.nixpkgs}/nixos/lib/testing/nixos-test-base.nix"
];
_module.args = { inherit inputs sources; };

View file

@ -1,6 +1,6 @@
{
lib,
modulesPath,
sources ? import ../../../npins,
...
}:
{
@ -11,7 +11,7 @@
imports = [
../common/sharedOptions.nix
../common/targetNode.nix
"${modulesPath}/profiles/qemu-guest.nix"
"${sources.nixpkgs}/nixos/modules/profiles/qemu-guest.nix"
];
users.users = environment.config.resources."operator-environment".login-shell.apply {

View file

@ -1,7 +1,6 @@
{
config,
system,
modulesPath,
inputs,
sources ? import ../../../npins,
...
@ -10,7 +9,7 @@ let
inherit (sources) nixpkgs;
pkgs = import nixpkgs { inherit system; };
inherit (pkgs) lib;
inherit (pkgs.callPackage ../common/utils.nix { inherit modulesPath; }) mkNixosConfiguration;
inherit (pkgs.callPackage ../common/utils.nix { }) mkNixosConfiguration;
inherit (config)
nodeName
pathFromRoot
@ -18,7 +17,7 @@ let
;
in
(pkgs.callPackage ../../utils.nix { inherit inputs; }).evalModel (
{ config, modulesPath, ... }:
{ config, ... }:
{
imports = [ ../common/model.nix ];
config = {
@ -45,7 +44,7 @@ in
nixos.module = {
imports = [
(mkNixosConfiguration environment required-resources)
"${modulesPath}/../lib/testing/nixos-test-base.nix"
"${sources.nixpkgs}/nixos/lib/testing/nixos-test-base.nix"
];
};
_module.args = { inherit inputs sources; };

View file

@ -1,5 +1,4 @@
{
pkgs,
runNixOSTest,
inputs,
sources,
@ -12,10 +11,7 @@ runNixOSTest {
../common/nixosTest.nix
./nixosTest.nix
];
_module.args = {
inherit inputs sources;
modulesPath = "${builtins.toString pkgs.path}/nixos/modules";
};
_module.args = { inherit inputs sources; };
inherit (import ./constants.nix)
targetMachines
pathToRoot

View file

@ -7,7 +7,7 @@
outputs =
inputs:
import ./mkFlake.nix inputs (
{ inputs, modulesPath, ... }:
{ inputs, ... }:
let
system = "x86_64-linux";
in
@ -18,7 +18,7 @@
nixops4Deployments.check-deployment-model =
(import ./deployment/check/data-model-nixops4/data-model.nix {
inherit system inputs modulesPath;
inherit system inputs;
config = {
inherit (import ./deployment/check/data-model-nixops4/constants.nix) pathToRoot pathFromRoot;
nodeName = "nixops4";

View file

@ -1,7 +1,6 @@
{
config,
system,
modulesPath,
sources ? import ../../../npins,
...
}@args:
@ -9,7 +8,7 @@ let
inherit (sources) nixpkgs;
pkgs = import nixpkgs { inherit system; };
inherit (pkgs) lib;
inherit (pkgs.callPackage ../common/utils.nix { inherit modulesPath; }) mkNixosConfiguration;
inherit (pkgs.callPackage ../common/utils.nix { }) mkNixosConfiguration;
inherit (config)
nodeName
pathToRoot
@ -18,7 +17,7 @@ let
;
in
(pkgs.callPackage ../../utils.nix { }).evalModel (
{ config, modulesPath, ... }:
{ config, ... }:
{
imports = [ ../common/model.nix ];
config = {
@ -35,7 +34,7 @@ in
nixos-configuration = {
imports = [
(mkNixosConfiguration environment required-resources)
"${modulesPath}/../lib/testing/nixos-test-base.nix"
"${sources.nixpkgs}/nixos/lib/testing/nixos-test-base.nix"
];
};
system = targetSystem;

View file

@ -1,5 +1,4 @@
{
pkgs,
runNixOSTest,
inputs,
sources,
@ -12,10 +11,7 @@ runNixOSTest {
../common/nixosTest.nix
./nixosTest.nix
];
_module.args = {
inherit inputs sources;
modulesPath = "${builtins.toString pkgs.path}/nixos/modules";
};
_module.args = { inherit inputs sources; };
inherit (import ./constants.nix)
targetMachines
pathToRoot

View file

@ -1,7 +1,6 @@
{
lib,
pkgs,
modulesPath,
...
}:
let
@ -9,7 +8,7 @@ let
nodeName = "ssh";
deploy =
(import ./data-model.nix {
inherit system modulesPath;
inherit system;
config = {
inherit nodeName;
inherit (import ./constants.nix) pathToRoot;

View file

@ -42,10 +42,7 @@ pkgs.testers.runNixOSTest {
../common/nixosTest.nix
./nixosTest.nix
];
_module.args = {
inherit inputs sources;
modulesPath = "${builtins.toString pkgs.path}/nixos/modules";
};
_module.args = { inherit inputs sources; };
inherit (import ./constants.nix)
targetMachines
pathToRoot

View file

@ -1,7 +1,6 @@
{
lib,
pkgs,
modulesPath,
sources,
...
}:
@ -18,7 +17,7 @@ let
# FIXME generate the image `nixos-generate` was to make, but now do it for a desired `-c configuration.nix` rather than whatever generic thing now
template-deployment =
(import ./setups/template.nix {
inherit sources system modulesPath;
inherit sources system;
config = {
httpBackend = tfBackend "proxmox-test/upload";
nodeName = "pve";
@ -29,7 +28,7 @@ let
}).default.tf-proxmox-template;
vm-deployment =
(import ./setups/vm.nix {
inherit sources system modulesPath;
inherit sources system;
config = {
httpBackend = tfBackend "proxmox-test/nixos";
inherit (import ./constants.nix) pathToRoot;

View file

@ -1,7 +1,6 @@
{
config,
system,
modulesPath,
sources ? import ../../../../npins,
...
}:
@ -9,7 +8,7 @@ let
inherit (sources) nixpkgs;
pkgs = import nixpkgs { inherit system; };
inherit (pkgs) lib;
inherit (pkgs.callPackage ../../common/utils.nix { inherit modulesPath; }) mkNixosConfiguration;
inherit (pkgs.callPackage ../../common/utils.nix { inherit sources; }) mkNixosConfiguration;
inherit (config)
nodeName
targetSystem

View file

@ -1,7 +1,6 @@
{
config,
system,
modulesPath,
sources ? import ../../../../npins,
...
}@args:
@ -9,7 +8,7 @@ let
inherit (sources) nixpkgs;
pkgs = import nixpkgs { inherit system; };
inherit (pkgs) lib;
inherit (pkgs.callPackage ../../common/utils.nix { inherit modulesPath; }) mkNixosConfiguration;
inherit (pkgs.callPackage ../../common/utils.nix { inherit sources; }) mkNixosConfiguration;
inherit (config)
nodeName
pathToRoot

View file

@ -2,14 +2,13 @@
config,
system,
sources ? import ../../../npins,
modulesPath,
...
}@args:
let
inherit (sources) nixpkgs;
pkgs = import nixpkgs { inherit system; };
inherit (pkgs) lib;
inherit (pkgs.callPackage ../common/utils.nix { inherit modulesPath; }) mkNixosConfiguration;
inherit (pkgs.callPackage ../common/utils.nix { }) mkNixosConfiguration;
inherit (config)
nodeName
pathToRoot
@ -19,7 +18,7 @@ let
;
in
(pkgs.callPackage ../../utils.nix { }).evalModel (
{ config, modulesPath, ... }:
{ config, ... }:
{
imports = [ ../common/model.nix ];
config = {
@ -35,7 +34,7 @@ in
nixos-configuration = {
imports = [
(mkNixosConfiguration environment required-resources)
"${modulesPath}/../lib/testing/nixos-test-base.nix"
"${sources.nixpkgs}/nixos/lib/testing/nixos-test-base.nix"
];
};
system = targetSystem;

View file

@ -43,10 +43,7 @@ pkgs.testers.runNixOSTest {
../common/nixosTest.nix
./nixosTest.nix
];
_module.args = {
inherit inputs sources;
modulesPath = "${builtins.toString pkgs.path}/nixos/modules";
};
_module.args = { inherit inputs sources; };
inherit (import ./constants.nix)
targetMachines
pathToRoot

View file

@ -2,7 +2,6 @@
lib,
pkgs,
sources,
modulesPath,
...
}:
let
@ -12,7 +11,7 @@ let
backendPort = builtins.toString 8080;
deploy =
(import ./data-model.nix {
inherit system modulesPath;
inherit system;
config = {
inherit nodeName pathToRoot;
targetSystem = system;

View file

@ -1,5 +1,4 @@
{
pkgs,
runNixOSTest,
inputs,
sources,
@ -10,10 +9,7 @@ runNixOSTest {
../common/nixosTest.nix
./nixosTest.nix
];
_module.args = {
inherit inputs sources;
modulesPath = "${builtins.toString pkgs.path}/nixos/modules";
};
_module.args = { inherit inputs sources; };
inherit (import ./constants.nix)
targetMachines
pathToRoot

View file

@ -30,7 +30,6 @@ runNixOSTest {
sources
pkgs
;
modulesPath = "${builtins.toString pkgs.path}/nixos/modules";
};
imports = [
./proxmoxTest.nix

View file

@ -14,27 +14,27 @@
deployment-basic = import ./check/basic {
inherit (pkgs.testers) runNixOSTest;
inherit pkgs inputs sources;
inherit inputs sources;
};
deployment-cli = import ./check/cli {
inherit (pkgs.testers) runNixOSTest;
inherit pkgs inputs sources;
inherit inputs sources;
};
deployment-panel = import ./check/panel {
inherit (pkgs.testers) runNixOSTest;
inherit pkgs inputs sources;
inherit inputs sources;
};
deployment-model-ssh = import ./check/data-model-ssh {
inherit (pkgs.testers) runNixOSTest;
inherit pkgs inputs sources;
inherit inputs sources;
};
deployment-model-nixops4 = import ./check/data-model-nixops4 {
inherit (pkgs.testers) runNixOSTest;
inherit pkgs inputs sources;
inherit inputs sources;
};
deployment-model-tf = import ./check/data-model-tf {

View file

@ -10,7 +10,6 @@
(lib.evalModules {
specialArgs = {
inherit pkgs inputs;
modulesPath = "${builtins.toString pkgs.path}/nixos/modules";
};
modules = [
./data-model.nix