forked from fediversity/fediversity
``` cp /nix/store/.../nixos.img disk.raw chmod 0644 disk.raw qemu-system-x86_64 -enable-kvm -m 2048 -drive if=virtio,file=./disk.raw,format=raw -bios "$(nix eval --impure --expr '(import <nixpkgs> { }).OVMF.fd.outPath' | jq -r)/FV/OVMF.fd" ``` Signed-off-by: Kiara Grouwstra <kiara@procolix.eu>
245 lines
9.3 KiB
Nix
245 lines
9.3 KiB
Nix
{
|
|
lib,
|
|
pkgs,
|
|
sources,
|
|
...
|
|
}:
|
|
let
|
|
inherit (pkgs) system;
|
|
deployment-config = {
|
|
inherit (import ./constants.nix) pathToRoot;
|
|
nodeName = "pve";
|
|
targetSystem = system;
|
|
sshOpts = [ ];
|
|
proxmox-user = "root@pam";
|
|
proxmox-password = "mytestpw";
|
|
node-name = "pve";
|
|
vm-names = [ "test14" ];
|
|
};
|
|
# FIXME generate the image `nixos-generate` was to make, but now do it for a desired `-c configuration.nix` rather than whatever generic thing now
|
|
deployment =
|
|
(import ../common/data-model.nix {
|
|
inherit system;
|
|
config = deployment-config;
|
|
# opt not to pass `inputs`, as we could only pass serializable arguments through to its self-call
|
|
})."bash-proxmox-deployment".bash-proxmox-host;
|
|
# tracking non-tarball downloads seems unsupported still in npins:
|
|
# https://github.com/andir/npins/issues/163
|
|
minimalIso = pkgs.fetchurl {
|
|
url = "https://releases.nixos.org/nixos/24.05/nixos-24.05.7139.bcba2fbf6963/nixos-minimal-24.05.7139.bcba2fbf6963-x86_64-linux.iso";
|
|
hash = "sha256-plre/mIHdIgU4xWU+9xErP+L4i460ZbcKq8iy2n4HT8=";
|
|
};
|
|
in
|
|
{
|
|
_class = "nixosTest";
|
|
imports = [
|
|
../common/data-model-options.nix
|
|
];
|
|
|
|
name = "deployment-model";
|
|
sourceFileset = lib.fileset.unions [
|
|
../../run/tf-proxmox/run.sh
|
|
];
|
|
|
|
nodes.pve =
|
|
{ sources, ... }:
|
|
{
|
|
imports = [
|
|
"${sources.proxmox-nixos}/modules/proxmox-ve"
|
|
];
|
|
users.users.root = {
|
|
password = "mytestpw";
|
|
hashedPasswordFile = lib.mkForce null;
|
|
};
|
|
services.proxmox-ve = {
|
|
enable = true;
|
|
ipAddress = "192.168.1.1";
|
|
vms = {
|
|
myvm1 = {
|
|
vmid = 100;
|
|
memory = 1024;
|
|
cores = 1;
|
|
sockets = 1;
|
|
kvm = true;
|
|
scsi = [ { file = "local:16"; } ];
|
|
cdrom = "local:iso/minimal.iso";
|
|
};
|
|
};
|
|
};
|
|
virtualisation = {
|
|
additionalPaths = [ minimalIso ];
|
|
diskSize = 2*1024;
|
|
memorySize = 2048;
|
|
};
|
|
};
|
|
|
|
nodes.deployer =
|
|
{ ... }:
|
|
{
|
|
nix.nixPath = [
|
|
(lib.concatStringsSep ":" (lib.mapAttrsToList (k: v: k + "=" + v) sources))
|
|
];
|
|
|
|
environment.systemPackages = [
|
|
deployment.run
|
|
];
|
|
|
|
# needed only when building from deployer
|
|
system.extraDependenciesFromModule =
|
|
{ pkgs, ... }:
|
|
{
|
|
environment.systemPackages = with pkgs; [
|
|
hello
|
|
];
|
|
};
|
|
system.extraDependencies =
|
|
# (lib.lists.map lib.traceVal)
|
|
# (
|
|
# (lib.lists.concatMap (
|
|
# pkg:
|
|
# (
|
|
# if
|
|
# pkg ? inputDerivation
|
|
# # error: output '/nix/store/dki9d3vldafg9ydrfm7x0g0rr0qljk98-sudo-1.9.16p2' is not allowed to refer to the following paths:
|
|
# # /nix/store/2xdmps65ryklmbf025bm4pxv16gb8ajv-sudo-1.9.16p2.tar.gz
|
|
# # /nix/store/58br4vk3q5akf4g8lx0pqzfhn47k3j8d-bash-5.2p37
|
|
# # /nix/store/8v6k283dpbc0qkdq81nb6mrxrgcb10i1-gcc-wrapper-14-20241116
|
|
# # /nix/store/9r1nl9ksiyszy4qzzg6y2gcdkca0xmhy-stdenv-linux
|
|
# # /nix/store/a4rmp6in7igbl1wbz9pli5nq0wiclq0y-groff-1.23.0
|
|
# # /nix/store/dki9d3vldafg9ydrfm7x0g0rr0qljk98-sudo-1.9.16p2
|
|
# # /nix/store/f5y58qz2fzpzgkhp0nizixi10x04ppyy-linux-pam-1.6.1
|
|
# # /nix/store/shkw4qm9qcw5sc5n1k5jznc83ny02r39-default-builder.sh
|
|
# # /nix/store/vj1c3wf9c11a0qs6p3ymfvrnsdgsdcbq-source-stdenv.sh
|
|
# # /nix/store/yh6qg1nsi5h2xblcr67030pz58fsaxx3-coreutils-9.6
|
|
# && !(lib.strings.hasInfix "sudo" (lib.traceVal (builtins.toString pkg)))
|
|
# then
|
|
# lib.trace "yes" [
|
|
# # lib.traceVal pkg.inputDerivation # not of type `path in the Nix store'
|
|
# (
|
|
# (
|
|
# x: builtins.trace "${builtins.toString pkg}: ${builtins.toString (lib.isPath x.inputDerivation)}" x
|
|
# )
|
|
# pkg
|
|
# ).inputDerivation
|
|
# ]
|
|
# else
|
|
# lib.trace "no" [ ]
|
|
# )
|
|
# ) machine.environment.systemPackages)
|
|
# ++ (let
|
|
# base =
|
|
# (import "${pkgs.nixos-generators}/share/nixos-generator/nixos-generate.nix" {
|
|
# inherit system;
|
|
# inherit (sources) nixpkgs;
|
|
# formatConfig = "${pkgs.nixos-generators}/share/nixos-generator/formats/proxmox.nix";
|
|
# configuration = "${pkgs.nixos-generators}/share/nixos-generator/configuration.nix";
|
|
# }).config;
|
|
# in [
|
|
# base.system.build.toplevel.inputDerivation
|
|
# base.system.build.etc.inputDerivation
|
|
# base.system.build.etcBasedir.inputDerivation
|
|
# base.system.build.etcMetadataImage.inputDerivation
|
|
# base.system.build.extraUtils.inputDerivation
|
|
# base.system.path.inputDerivation
|
|
# base.system.build.setEnvironment.inputDerivation
|
|
# base.system.build.vm.inputDerivation
|
|
# base.system.build.bootStage1.inputDerivation
|
|
# base.system.build.bootStage2.inputDerivation
|
|
# ])
|
|
# ++
|
|
[
|
|
# )
|
|
# (
|
|
# (x: builtins.trace "machine.system.build.vm.inputDerivation: ${builtins.toString (lib.isPath x)}" x)
|
|
# machine.system.build.toplevel.inputDerivation
|
|
# machine.system.build.etc.inputDerivation
|
|
# machine.system.build.etcBasedir.inputDerivation
|
|
# machine.system.build.etcMetadataImage.inputDerivation
|
|
# machine.system.build.extraUtils.inputDerivation
|
|
# machine.system.path.inputDerivation
|
|
# machine.system.build.setEnvironment.inputDerivation
|
|
# machine.system.build.vm.inputDerivation
|
|
# machine.system.build.bootStage1.inputDerivation
|
|
# machine.system.build.bootStage2.inputDerivation
|
|
pkgs.gnu-config
|
|
# pkgs.gnu-config.inputDerivation
|
|
pkgs.byacc
|
|
# pkgs.byacc.inputDerivation
|
|
pkgs.stdenv
|
|
pkgs.stdenvNoCC
|
|
sources.nixpkgs
|
|
pkgs.vte
|
|
|
|
# (
|
|
# ## We build a whole NixOS system that contains the module
|
|
# ## `system.extraDependenciesFromModule`, only to grab its
|
|
# ## configuration and the store paths needed to build it and
|
|
# ## dump them in `system.extraDependencies`.
|
|
# # see: https://git.fediversity.eu/Fediversity/Fediversity/pulls/338/files
|
|
|
|
# pkgs.closureInfo {
|
|
# rootPaths = map (drv: drv.drvPath) (
|
|
# [
|
|
# machine.system.build.toplevel.inputDerivation
|
|
# machine.system.build.etc.inputDerivation
|
|
# machine.system.build.etcBasedir.inputDerivation
|
|
# machine.system.build.etcMetadataImage.inputDerivation
|
|
# machine.system.build.extraUtils.inputDerivation
|
|
# machine.system.path.inputDerivation
|
|
# machine.system.build.setEnvironment.inputDerivation
|
|
# machine.system.build.vm.inputDerivation
|
|
# machine.system.build.bootStage1.inputDerivation
|
|
# machine.system.build.bootStage2.inputDerivation
|
|
# ]
|
|
# ++ lib.concatMap (x: if x ? source.inputDerivation then [ x.source.inputDerivation ] else [ ]) (
|
|
# lib.attrValues machine.environment.etc
|
|
# )
|
|
# ++ machine.environment.systemPackages
|
|
# );
|
|
# }
|
|
# )
|
|
|
|
]
|
|
# ++ lib.concatLists (
|
|
# lib.mapAttrsToList (
|
|
# _k: v:
|
|
# if v ? source.inputDerivation then
|
|
# [
|
|
# # v.source.inputDerivation
|
|
# (
|
|
# (
|
|
# x:
|
|
# builtins.trace "${builtins.toString (lib.attrNames v)}: ${builtins.toString (lib.isPath x.source.inputDerivation)}" x
|
|
# )
|
|
# v
|
|
# ).source.inputDerivation
|
|
# ]
|
|
# else
|
|
# [ ]
|
|
# ) machine.environment.etc
|
|
# )
|
|
# )
|
|
;
|
|
};
|
|
|
|
extraTestScript = ''
|
|
pve.wait_for_unit("pveproxy.service")
|
|
assert "running" in pve.succeed("pveproxy status")
|
|
pve.succeed("mkdir -p /run/pve")
|
|
assert "Proxmox" in pve.succeed("curl -s -i -k https://localhost:8006")
|
|
# pve.succeed("pvesh get /nodes && exit 1")
|
|
|
|
# pve.succeed("pvesh set /access/password --userid root@pam --password mypwdlol --confirmation-password mytestpw 1>&2")
|
|
# pve.succeed("curl -s -i -k -d '{\"userid\":\"root@pam\",\"password\":\"mypwdhaha\",\"confirmation-password\":\"mypwdlol\"}' -X PUT https://localhost:8006/api2/json/access/password 1>&2")
|
|
# on mistake: 401 No ticket
|
|
# pve.succeed("haha")
|
|
|
|
with subtest("Run the deployment"):
|
|
# target.fail("hello 1>&2")
|
|
deployer.succeed("""
|
|
${lib.getExe deployment.run}
|
|
""")
|
|
# target.wait_for_unit("multi-user.target")
|
|
# target.succeed("su - operator -c hello 1>&2")
|
|
'';
|
|
}
|