diff --git a/packages/checks/default.nix b/packages/checks/default.nix index 6b0ef99..9cf9bb0 100644 --- a/packages/checks/default.nix +++ b/packages/checks/default.nix @@ -15,10 +15,6 @@ in inherit (self) nixosModules; }; - cluster = pkgs.callPackage ./cluster.nix { - inherit config extendModules; - }; - garage = pkgs.callPackage ./garage.nix { inherit (self'.packages) garage consul; inherit (self) nixosModules; @@ -53,6 +49,10 @@ in searxng = pkgs.callPackage ./searxng.nix { inherit (self'.packages) searxng; }; + + simulacrum = pkgs.callPackage ./simulacrum.nix { + inherit config extendModules; + }; }; }; } diff --git a/packages/checks/cluster.nix b/packages/checks/simulacrum.nix similarity index 67% rename from packages/checks/cluster.nix rename to packages/checks/simulacrum.nix index e874e0c..522d17b 100644 --- a/packages/checks/cluster.nix +++ b/packages/checks/simulacrum.nix @@ -47,22 +47,38 @@ let in testers.runNixOSTest { - name = "cluster"; + name = "simulacrum"; node = { inherit specialArgs; }; nodes = lib.genAttrs nodes (node: { imports = [ specialArgs.depot.hours.${node}.nixos ./modules/nixos/age-dummy-secrets + ./modules/nixos/external-storage.nix ] ++ depot'.config.cluster.config.out.injectNixosConfig node; - environment.etc."ssh/ssh_host_ed25519_key" = { - source = snakeoil.ssh.private; - mode = "0400"; + systemd.services = { + hyprspace.enable = false; + cachix-agent.enable = false; + }; + + environment.etc = { + "ssh/ssh_host_ed25519_key" = { + source = snakeoil.ssh.private; + mode = "0400"; + }; + "dummy-secrets/cluster-wireguard-meshPrivateKey".source = lib.mkForce snakeoil.wireguard.private.${node}; + "dummy-secrets/grafana-agent-blackbox-secret-monitoring".text = lib.mkForce '' + SECRET_MONITORING_BLACKBOX_TARGET_1_NAME=example-external-service + SECRET_MONITORING_BLACKBOX_TARGET_1_MODULE=http2xx + SECRET_MONITORING_BLACKBOX_TARGET_1_ADDRESS=http://127.0.0.1:1 + ''; + "dummy-secrets/garageRpcSecret".text = lib.mkForce "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"; + }; + virtualisation = { + cores = 2; + memorySize = 4096; }; - environment.etc."dummy-secrets/cluster-wireguard-meshPrivateKey".source = lib.mkForce snakeoil.wireguard.private.${node}; - passthru.depot = depot'; - virtualisation.memorySize = 4096; }); testScript = ''