checks/simulacrum: rename from cluster, add more stuff, WIP
This commit is contained in:
parent
f7a16924f3
commit
9472794b97
2 changed files with 27 additions and 11 deletions
|
@ -16,10 +16,6 @@ in
|
||||||
inherit (config) cluster;
|
inherit (config) cluster;
|
||||||
};
|
};
|
||||||
|
|
||||||
cluster = pkgs.callPackage ./cluster.nix {
|
|
||||||
inherit config extendModules;
|
|
||||||
};
|
|
||||||
|
|
||||||
garage = pkgs.callPackage ./garage.nix {
|
garage = pkgs.callPackage ./garage.nix {
|
||||||
inherit (self'.packages) garage consul;
|
inherit (self'.packages) garage consul;
|
||||||
inherit (self) nixosModules;
|
inherit (self) nixosModules;
|
||||||
|
@ -54,6 +50,10 @@ in
|
||||||
searxng = pkgs.callPackage ./searxng.nix {
|
searxng = pkgs.callPackage ./searxng.nix {
|
||||||
inherit (self'.packages) searxng;
|
inherit (self'.packages) searxng;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
simulacrum = pkgs.callPackage ./simulacrum.nix {
|
||||||
|
inherit config extendModules;
|
||||||
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -47,22 +47,38 @@ let
|
||||||
in
|
in
|
||||||
|
|
||||||
testers.runNixOSTest {
|
testers.runNixOSTest {
|
||||||
name = "cluster";
|
name = "simulacrum";
|
||||||
|
|
||||||
node = { inherit specialArgs; };
|
node = { inherit specialArgs; };
|
||||||
nodes = lib.genAttrs nodes (node: {
|
nodes = lib.genAttrs nodes (node: {
|
||||||
imports = [
|
imports = [
|
||||||
specialArgs.depot.hours.${node}.nixos
|
specialArgs.depot.hours.${node}.nixos
|
||||||
./modules/nixos/age-dummy-secrets
|
./modules/nixos/age-dummy-secrets
|
||||||
|
./modules/nixos/external-storage.nix
|
||||||
] ++ depot'.config.cluster.config.out.injectNixosConfig node;
|
] ++ depot'.config.cluster.config.out.injectNixosConfig node;
|
||||||
|
|
||||||
environment.etc."ssh/ssh_host_ed25519_key" = {
|
systemd.services = {
|
||||||
|
hyprspace.enable = false;
|
||||||
|
cachix-agent.enable = false;
|
||||||
|
};
|
||||||
|
|
||||||
|
environment.etc = {
|
||||||
|
"ssh/ssh_host_ed25519_key" = {
|
||||||
source = snakeoil.ssh.private;
|
source = snakeoil.ssh.private;
|
||||||
mode = "0400";
|
mode = "0400";
|
||||||
};
|
};
|
||||||
environment.etc."dummy-secrets/cluster-wireguard-meshPrivateKey".source = lib.mkForce snakeoil.wireguard.private.${node};
|
"dummy-secrets/cluster-wireguard-meshPrivateKey".source = lib.mkForce snakeoil.wireguard.private.${node};
|
||||||
passthru.depot = depot';
|
"dummy-secrets/grafana-agent-blackbox-secret-monitoring".text = lib.mkForce ''
|
||||||
virtualisation.memorySize = 4096;
|
SECRET_MONITORING_BLACKBOX_TARGET_1_NAME=example-external-service
|
||||||
|
SECRET_MONITORING_BLACKBOX_TARGET_1_MODULE=http2xx
|
||||||
|
SECRET_MONITORING_BLACKBOX_TARGET_1_ADDRESS=http://127.0.0.1:1
|
||||||
|
'';
|
||||||
|
"dummy-secrets/garageRpcSecret".text = lib.mkForce "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa";
|
||||||
|
};
|
||||||
|
virtualisation = {
|
||||||
|
cores = 2;
|
||||||
|
memorySize = 4096;
|
||||||
|
};
|
||||||
});
|
});
|
||||||
|
|
||||||
testScript = ''
|
testScript = ''
|
Loading…
Reference in a new issue