checks/simulacrum: rename from cluster, add more stuff, WIP

This commit is contained in:
Max Headroom 2024-07-17 19:39:37 +02:00
parent f7a16924f3
commit 9472794b97
2 changed files with 27 additions and 11 deletions

View file

@ -16,10 +16,6 @@ in
inherit (config) cluster; inherit (config) cluster;
}; };
cluster = pkgs.callPackage ./cluster.nix {
inherit config extendModules;
};
garage = pkgs.callPackage ./garage.nix { garage = pkgs.callPackage ./garage.nix {
inherit (self'.packages) garage consul; inherit (self'.packages) garage consul;
inherit (self) nixosModules; inherit (self) nixosModules;
@ -54,6 +50,10 @@ in
searxng = pkgs.callPackage ./searxng.nix { searxng = pkgs.callPackage ./searxng.nix {
inherit (self'.packages) searxng; inherit (self'.packages) searxng;
}; };
simulacrum = pkgs.callPackage ./simulacrum.nix {
inherit config extendModules;
};
}; };
}; };
} }

View file

@ -47,22 +47,38 @@ let
in in
testers.runNixOSTest { testers.runNixOSTest {
name = "cluster"; name = "simulacrum";
node = { inherit specialArgs; }; node = { inherit specialArgs; };
nodes = lib.genAttrs nodes (node: { nodes = lib.genAttrs nodes (node: {
imports = [ imports = [
specialArgs.depot.hours.${node}.nixos specialArgs.depot.hours.${node}.nixos
./modules/nixos/age-dummy-secrets ./modules/nixos/age-dummy-secrets
./modules/nixos/external-storage.nix
] ++ depot'.config.cluster.config.out.injectNixosConfig node; ] ++ depot'.config.cluster.config.out.injectNixosConfig node;
environment.etc."ssh/ssh_host_ed25519_key" = { systemd.services = {
hyprspace.enable = false;
cachix-agent.enable = false;
};
environment.etc = {
"ssh/ssh_host_ed25519_key" = {
source = snakeoil.ssh.private; source = snakeoil.ssh.private;
mode = "0400"; mode = "0400";
}; };
environment.etc."dummy-secrets/cluster-wireguard-meshPrivateKey".source = lib.mkForce snakeoil.wireguard.private.${node}; "dummy-secrets/cluster-wireguard-meshPrivateKey".source = lib.mkForce snakeoil.wireguard.private.${node};
passthru.depot = depot'; "dummy-secrets/grafana-agent-blackbox-secret-monitoring".text = lib.mkForce ''
virtualisation.memorySize = 4096; SECRET_MONITORING_BLACKBOX_TARGET_1_NAME=example-external-service
SECRET_MONITORING_BLACKBOX_TARGET_1_MODULE=http2xx
SECRET_MONITORING_BLACKBOX_TARGET_1_ADDRESS=http://127.0.0.1:1
'';
"dummy-secrets/garageRpcSecret".text = lib.mkForce "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa";
};
virtualisation = {
cores = 2;
memorySize = 4096;
};
}); });
testScript = '' testScript = ''