Compare commits

..

129 commits

Author SHA1 Message Date
098298a31c
properly propagate modulesPath
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 23:04:32 +02:00
43e4d3a497
streamline version
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:43:48 +02:00
c209a1bdad
rm modulesPath
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
e0c6390ef5
add nixos-test-base to targetResource, fixing basic/cli tests
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
b5c3caa984
fix primaryIPAddress
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
365fbc7c18
rm repart
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
d9b380d279
rm optional from deployer
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
1496b51be5
ensure acmeNodeIP is set
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
5c32e73cb1
comment repart imports
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
c574eb3ba8
dedupe acme ip
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
7b0db200c3
fix import
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
20ac7d6aff
mv out qemu settings
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
0cd7a523d0
mv nixos-test-base from common to non-proxmox tests
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
b242670cfc
disable dhcp, fixing no-op
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
a45d64bbf4
move proxmox config out
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
218330b676
rm unused settings
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
9d4a3cbf75
simplify networking
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
aaa49de5c0
rm disko
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
71a979e5db
rm wheel
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
e86035bc52
rm comment
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
4b2898f831
rm users
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
6cb8a38321
verbose ci
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
92b8535ff9
restore disk size
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
e64684f906
add fixme
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
ea1f76fd40
mv disko
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
f13a9e18a7
rm flake invocation
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
53dc08f5e9
restore pm bash scripts
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
0b3e545c58
clean up iso tf
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
b42d6887dd
make upload depend on hash
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
30f15835c1
rename module to caller
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
7ee1422f2b
split proxmox upload/deploy
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
cf24255ab9
reduce verbosity
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
eabd540910
restrict token roles
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
09297b9b4e
use token
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
80570064a9
rm debug log comment
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
c0e0aa1ee6
rename deployment method to prep for separation
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
9ede4a41f8
rm unused options
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
5b4d811c75
split out TF proxmox data model
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
d2d61f3646
limit disk size
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
74743b00fd
clean some comments
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
f0f23f43fe
clean out comments
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
9931269b17
use insecure for test only
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
bd4b870556
dedupe block
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
0654205eda
lower memory
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
a973c2589f
rename bridge
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
1b9c99b2d3
fix tf syntax
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
0e17329e2c
pass ipv6
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
be01af269d
add no-op second invocation
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
c6cfe9eef9
rm apparently unnecessary gateway stuff
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
aea15084fd
trigger update by codebase hash
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:39 +02:00
ab67a6d637
add fixmes
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
892b18e23f
rm memory size
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
37177ce993
output id
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
186cdbd79e
print to stderr
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
017bbf05b5
todo wire credentials
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
979747dd79
rm debug key
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
7bcc854ef1
base-hash
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
28264801d7
rm comment
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
56d8c4235b
grub default false
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
f97db2802c
pkgs.qemu
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
1328e76fe9
unprint await steps
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
1c52088125
rename await
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
3e0280c40e
fix null resource commands
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
67e28644f2
make path in single host explicit
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
35ff03c9f8
working networking
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
c25a1727a9
raise limits
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
ea26048e58
working networking
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
811f5c3f84
include await-ssh
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
89ced0cb82
execute await-ssh
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
a6a3396211
pass proxmox user/pw thru env var as well, should fix usage from flake again
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
6522ef8e67
use jumphost for test
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
c1fe32f12a
bootable disk
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
5b28788387
rm broken async_pf fix
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
42c1cfd888
rm old networking
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
430754cf95
users
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
98bc0754cc
factor out await.ssh
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
ca304932b6
add debugging key
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
bfe0e51983
fix verification
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
65863cd9e1
increase timeout
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
67fa4b2274
add interface to ipv6 addresses
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
469b22fe4e
don't reinstall bootloader
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
0d0890cb17
allow spaces in ssh opts
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
d35db3dcab
interface sata2 actually exposes initialization info on the vm
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
3eb42e7991
verbose wait
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
a40a23a3d7
comment ls echo
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
a758147b16
check hello application
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
73630ffac6
restore jq package
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
4009d6c8e0
enable cloud-init
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
b71d152b34
ssh key
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
4a0aa7f0a6
rm comment
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
f5db4bd51e
propagate token
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
27d33141d2
set up proxmox
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
6238b12f88
handle CA certificate
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
f8a2d11c2f
add packages
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
f13348fb57
add fixmes
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
29d8345a57
prevent kernel panic
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
d2ee86a77c
use json format for output only
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
e1a22437a0
propagate ssh key
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
9ebca54d50
default timeouts
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
09ef3ebbc7
propagate cd
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
d73fa538c1
use variables
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
d3a4137900
propagate ips
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
40fad454a7
rm ubuntu
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
6464cf61ec
output: separate ips
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
6c00f98801
apply: json
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
98d8a91a80
un-generators
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
b5d2b2cb87
propagate datastore id
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
b0b158050d
add pve-manager for pvesh
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
6613959037
password default
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
d3a0d66fe6
upstream nimbolus
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
d051c9ffc6
rm output comment
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
d76e0ddb98
await SSH availability, resolving a race condition
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
eb39b278a3
un-hardcode networking info
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
0758f6aa5b
rm bash-proxmox
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
3c375da97c
skip acme
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
a8a62f00cf
unlog steps
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
c5351e85ce
clean up unused vms
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
03e564f3d8
factor out TF setup
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
b89c7cbd3d
first time to get nix run pipeline to succeed including update step
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
c9c8d8b457
hardcoded networking setup for nix run vm 101
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
4d0e549c6b
start documenting needed proxmox user privileges
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:38 +02:00
c4e06a5748
back to qcow over size difference
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:37 +02:00
9bdfdf6ef7
some cleanup
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:37 +02:00
a6fdff0b18
automated deployment to proxmox (in nix run) of vm booting to login
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:37 +02:00
14d7ce7214
simplify
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:37 +02:00
a97d658f1e
bootable vm by repart
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:37 +02:00
df9814f0f5
get nix run to build a vm bootable by qemu
```
cp /nix/store/.../nixos.img disk.raw
chmod 0644 disk.raw
qemu-system-x86_64 -enable-kvm -m 2048 -drive
if=virtio,file=./disk.raw,format=raw -bios "$(nix eval --impure --expr
'(import <nixpkgs> { }).OVMF.fd.outPath' | jq -r)/FV/OVMF.fd"
```

Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:37 +02:00
7f6aad0a58
WIP: proxmox deployment
Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>

continued

Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
2025-10-23 22:42:37 +02:00
0440758e28 use minimal profile in test target nodes (#551)
Reviewed-on: fediversity/fediversity#551
2025-10-23 22:41:44 +02:00
24 changed files with 76 additions and 36 deletions

View file

@ -1,4 +1,5 @@
{
pkgs,
runNixOSTest,
inputs,
sources,
@ -9,7 +10,10 @@ runNixOSTest {
../common/nixosTest.nix
./nixosTest.nix
];
_module.args = { inherit inputs sources; };
_module.args = {
inherit inputs sources;
modulesPath = "${builtins.toString pkgs.path}/nixos/modules";
};
inherit (import ./constants.nix)
targetMachines
pathToRoot

View file

@ -1,4 +1,5 @@
{
pkgs,
runNixOSTest,
inputs,
sources,
@ -9,7 +10,10 @@ runNixOSTest {
../common/nixosTest.nix
./nixosTest.nix
];
_module.args = { inherit inputs sources; };
_module.args = {
inherit inputs sources;
modulesPath = "${builtins.toString pkgs.path}/nixos/modules";
};
inherit (import ./constants.nix)
targetMachines
pathToRoot

View file

@ -3,6 +3,7 @@
lib,
pkgs,
config,
modulesPath,
sources,
...
}:
@ -75,7 +76,7 @@ in
machine =
(pkgs.nixos [
./targetNode.nix
"${sources.nixpkgs}/nixos/lib/testing/nixos-test-base.nix"
"${modulesPath}/../lib/testing/nixos-test-base.nix"
config.system.extraDependenciesFromModule
{
nixpkgs.hostPlatform = "x86_64-linux";

View file

@ -4,6 +4,7 @@
config,
hostPkgs,
sources,
modulesPath,
...
}:
@ -114,7 +115,7 @@ in
(genAttrs config.targetMachines (_: {
imports = [
./targetNode.nix
] ++ (lib.optional config.useFlake "${sources.nixpkgs}/nixos/lib/testing/nixos-test-base.nix");
] ++ (lib.optional config.useFlake "${modulesPath}/../lib/testing/nixos-test-base.nix");
_module.args = { inherit inputs sources; };
enableAcme = config.enableAcme;
acmeNodeIP = if config.enableAcme then config.nodes.acme.networking.primaryIPAddress else null;

View file

@ -2,11 +2,11 @@
inputs,
config,
lib,
modulesPath,
...
}:
let
sources = import ../../../npins;
testCerts = import "${inputs.nixpkgs}/nixos/tests/common/acme/server/snakeoil-certs.nix";
inherit (lib) mkIf mkMerge;
@ -15,7 +15,8 @@ in
_class = "nixos";
imports = [
"${sources.nixpkgs}/nixos/modules/profiles/qemu-guest.nix"
"${modulesPath}/profiles/minimal.nix"
"${modulesPath}/profiles/qemu-guest.nix"
./sharedOptions.nix
];

View file

@ -3,6 +3,7 @@
lib,
config,
sources,
modulesPath,
...
}:
@ -39,7 +40,7 @@ in
imports = [
./targetNode.nix
(lib.modules.importJSON (config.pathToCwd + "/${config.nodeName}-network.json"))
"${sources.nixpkgs}/nixos/lib/testing/nixos-test-base.nix"
"${modulesPath}/../lib/testing/nixos-test-base.nix"
];
_module.args = { inherit inputs sources; };

View file

@ -1,6 +1,6 @@
{
lib,
sources ? import ../../../npins,
modulesPath,
...
}:
{
@ -11,7 +11,7 @@
imports = [
../common/sharedOptions.nix
../common/targetNode.nix
"${sources.nixpkgs}/nixos/modules/profiles/qemu-guest.nix"
"${modulesPath}/profiles/qemu-guest.nix"
];
users.users = environment.config.resources."operator-environment".login-shell.apply {

View file

@ -1,6 +1,7 @@
{
config,
system,
modulesPath,
inputs,
sources ? import ../../../npins,
...
@ -9,7 +10,7 @@ let
inherit (sources) nixpkgs;
pkgs = import nixpkgs { inherit system; };
inherit (pkgs) lib;
inherit (pkgs.callPackage ../common/utils.nix { }) mkNixosConfiguration;
inherit (pkgs.callPackage ../common/utils.nix { inherit modulesPath; }) mkNixosConfiguration;
inherit (config)
nodeName
pathFromRoot
@ -17,7 +18,7 @@ let
;
in
(pkgs.callPackage ../../utils.nix { inherit inputs; }).evalModel (
{ config, ... }:
{ config, modulesPath, ... }:
{
imports = [ ../common/model.nix ];
config = {
@ -44,7 +45,7 @@ in
nixos.module = {
imports = [
(mkNixosConfiguration environment required-resources)
"${sources.nixpkgs}/nixos/lib/testing/nixos-test-base.nix"
"${modulesPath}/../lib/testing/nixos-test-base.nix"
];
};
_module.args = { inherit inputs sources; };

View file

@ -1,4 +1,5 @@
{
pkgs,
runNixOSTest,
inputs,
sources,
@ -11,7 +12,10 @@ runNixOSTest {
../common/nixosTest.nix
./nixosTest.nix
];
_module.args = { inherit inputs sources; };
_module.args = {
inherit inputs sources;
modulesPath = "${builtins.toString pkgs.path}/nixos/modules";
};
inherit (import ./constants.nix)
targetMachines
pathToRoot

View file

@ -7,7 +7,7 @@
outputs =
inputs:
import ./mkFlake.nix inputs (
{ inputs, ... }:
{ inputs, modulesPath, ... }:
let
system = "x86_64-linux";
in
@ -18,7 +18,7 @@
nixops4Deployments.check-deployment-model =
(import ./deployment/check/data-model-nixops4/data-model.nix {
inherit system inputs;
inherit system inputs modulesPath;
config = {
inherit (import ./deployment/check/data-model-nixops4/constants.nix) pathToRoot pathFromRoot;
nodeName = "nixops4";

View file

@ -1,6 +1,7 @@
{
config,
system,
modulesPath,
sources ? import ../../../npins,
...
}@args:
@ -8,7 +9,7 @@ let
inherit (sources) nixpkgs;
pkgs = import nixpkgs { inherit system; };
inherit (pkgs) lib;
inherit (pkgs.callPackage ../common/utils.nix { }) mkNixosConfiguration;
inherit (pkgs.callPackage ../common/utils.nix { inherit modulesPath; }) mkNixosConfiguration;
inherit (config)
nodeName
pathToRoot
@ -17,7 +18,7 @@ let
;
in
(pkgs.callPackage ../../utils.nix { }).evalModel (
{ config, ... }:
{ config, modulesPath, ... }:
{
imports = [ ../common/model.nix ];
config = {
@ -34,7 +35,7 @@ in
nixos-configuration = {
imports = [
(mkNixosConfiguration environment required-resources)
"${sources.nixpkgs}/nixos/lib/testing/nixos-test-base.nix"
"${modulesPath}/../lib/testing/nixos-test-base.nix"
];
};
system = targetSystem;

View file

@ -1,4 +1,5 @@
{
pkgs,
runNixOSTest,
inputs,
sources,
@ -11,7 +12,10 @@ runNixOSTest {
../common/nixosTest.nix
./nixosTest.nix
];
_module.args = { inherit inputs sources; };
_module.args = {
inherit inputs sources;
modulesPath = "${builtins.toString pkgs.path}/nixos/modules";
};
inherit (import ./constants.nix)
targetMachines
pathToRoot

View file

@ -1,6 +1,7 @@
{
lib,
pkgs,
modulesPath,
...
}:
let
@ -8,7 +9,7 @@ let
nodeName = "ssh";
deploy =
(import ./data-model.nix {
inherit system;
inherit system modulesPath;
config = {
inherit nodeName;
inherit (import ./constants.nix) pathToRoot;

View file

@ -42,7 +42,10 @@ pkgs.testers.runNixOSTest {
../common/nixosTest.nix
./nixosTest.nix
];
_module.args = { inherit inputs sources; };
_module.args = {
inherit inputs sources;
modulesPath = "${builtins.toString pkgs.path}/nixos/modules";
};
inherit (import ./constants.nix)
targetMachines
pathToRoot

View file

@ -1,6 +1,7 @@
{
lib,
pkgs,
modulesPath,
sources,
...
}:
@ -17,7 +18,7 @@ let
# FIXME generate the image `nixos-generate` was to make, but now do it for a desired `-c configuration.nix` rather than whatever generic thing now
template-deployment =
(import ./setups/template.nix {
inherit sources system;
inherit sources system modulesPath;
config = {
httpBackend = tfBackend "proxmox-test/upload";
nodeName = "pve";
@ -28,7 +29,7 @@ let
}).default.tf-proxmox-template;
vm-deployment =
(import ./setups/vm.nix {
inherit sources system;
inherit sources system modulesPath;
config = {
httpBackend = tfBackend "proxmox-test/nixos";
inherit (import ./constants.nix) pathToRoot;

View file

@ -1,6 +1,7 @@
{
config,
system,
modulesPath,
sources ? import ../../../../npins,
...
}:
@ -8,7 +9,7 @@ let
inherit (sources) nixpkgs;
pkgs = import nixpkgs { inherit system; };
inherit (pkgs) lib;
inherit (pkgs.callPackage ../../common/utils.nix { inherit sources; }) mkNixosConfiguration;
inherit (pkgs.callPackage ../../common/utils.nix { inherit modulesPath; }) mkNixosConfiguration;
inherit (config)
nodeName
targetSystem

View file

@ -1,6 +1,7 @@
{
config,
system,
modulesPath,
sources ? import ../../../../npins,
...
}@args:
@ -8,7 +9,7 @@ let
inherit (sources) nixpkgs;
pkgs = import nixpkgs { inherit system; };
inherit (pkgs) lib;
inherit (pkgs.callPackage ../../common/utils.nix { inherit sources; }) mkNixosConfiguration;
inherit (pkgs.callPackage ../../common/utils.nix { inherit modulesPath; }) mkNixosConfiguration;
inherit (config)
nodeName
pathToRoot

View file

@ -2,13 +2,14 @@
config,
system,
sources ? import ../../../npins,
modulesPath,
...
}@args:
let
inherit (sources) nixpkgs;
pkgs = import nixpkgs { inherit system; };
inherit (pkgs) lib;
inherit (pkgs.callPackage ../common/utils.nix { }) mkNixosConfiguration;
inherit (pkgs.callPackage ../common/utils.nix { inherit modulesPath; }) mkNixosConfiguration;
inherit (config)
nodeName
pathToRoot
@ -18,7 +19,7 @@ let
;
in
(pkgs.callPackage ../../utils.nix { }).evalModel (
{ config, ... }:
{ config, modulesPath, ... }:
{
imports = [ ../common/model.nix ];
config = {
@ -34,7 +35,7 @@ in
nixos-configuration = {
imports = [
(mkNixosConfiguration environment required-resources)
"${sources.nixpkgs}/nixos/lib/testing/nixos-test-base.nix"
"${modulesPath}/../lib/testing/nixos-test-base.nix"
];
};
system = targetSystem;

View file

@ -43,7 +43,10 @@ pkgs.testers.runNixOSTest {
../common/nixosTest.nix
./nixosTest.nix
];
_module.args = { inherit inputs sources; };
_module.args = {
inherit inputs sources;
modulesPath = "${builtins.toString pkgs.path}/nixos/modules";
};
inherit (import ./constants.nix)
targetMachines
pathToRoot

View file

@ -2,6 +2,7 @@
lib,
pkgs,
sources,
modulesPath,
...
}:
let
@ -11,7 +12,7 @@ let
backendPort = builtins.toString 8080;
deploy =
(import ./data-model.nix {
inherit system;
inherit system modulesPath;
config = {
inherit nodeName pathToRoot;
targetSystem = system;

View file

@ -1,4 +1,5 @@
{
pkgs,
runNixOSTest,
inputs,
sources,
@ -9,7 +10,10 @@ runNixOSTest {
../common/nixosTest.nix
./nixosTest.nix
];
_module.args = { inherit inputs sources; };
_module.args = {
inherit inputs sources;
modulesPath = "${builtins.toString pkgs.path}/nixos/modules";
};
inherit (import ./constants.nix)
targetMachines
pathToRoot

View file

@ -30,6 +30,7 @@ runNixOSTest {
sources
pkgs
;
modulesPath = "${builtins.toString pkgs.path}/nixos/modules";
};
imports = [
./proxmoxTest.nix

View file

@ -14,27 +14,27 @@
deployment-basic = import ./check/basic {
inherit (pkgs.testers) runNixOSTest;
inherit inputs sources;
inherit pkgs inputs sources;
};
deployment-cli = import ./check/cli {
inherit (pkgs.testers) runNixOSTest;
inherit inputs sources;
inherit pkgs inputs sources;
};
deployment-panel = import ./check/panel {
inherit (pkgs.testers) runNixOSTest;
inherit inputs sources;
inherit pkgs inputs sources;
};
deployment-model-ssh = import ./check/data-model-ssh {
inherit (pkgs.testers) runNixOSTest;
inherit inputs sources;
inherit pkgs inputs sources;
};
deployment-model-nixops4 = import ./check/data-model-nixops4 {
inherit (pkgs.testers) runNixOSTest;
inherit inputs sources;
inherit pkgs inputs sources;
};
deployment-model-tf = import ./check/data-model-tf {

View file

@ -10,6 +10,7 @@
(lib.evalModules {
specialArgs = {
inherit pkgs inputs;
modulesPath = "${builtins.toString pkgs.path}/nixos/modules";
};
modules = [
./data-model.nix