Compare commits
6 commits
7e5fcb446c
...
9893c5f059
Author | SHA1 | Date | |
---|---|---|---|
9893c5f059 | |||
b8413e1e51 | |||
2b556f7129 | |||
7e2add6d36 | |||
e03f6428bf | |||
32dcdf6601 |
16 changed files with 163 additions and 3 deletions
|
@ -26,10 +26,16 @@ testers.runNixOSTest {
|
|||
in {
|
||||
imports = [
|
||||
nixosModules.ascensions
|
||||
nixosModules.port-magic
|
||||
nixosModules.systemd-extras
|
||||
nixosModules.consul-distributed-services
|
||||
cluster.config.services.consul.nixos.ready
|
||||
];
|
||||
links.consulAgent = {
|
||||
protocol = "http";
|
||||
hostname = "consul";
|
||||
port = 8500;
|
||||
};
|
||||
systemd.services = {
|
||||
create-file = {
|
||||
serviceConfig.Type = "oneshot";
|
||||
|
@ -48,10 +54,10 @@ testers.runNixOSTest {
|
|||
consul kv put ${kvPath.${hostName}} ${hostName}
|
||||
fi
|
||||
'';
|
||||
environment.CONSUL_HTTP_ADDR = "consul:8500";
|
||||
environment.CONSUL_HTTP_ADDR = config.links.consulAgent.tuple;
|
||||
};
|
||||
ascend-create-kv = {
|
||||
environment.CONSUL_HTTP_ADDR = "consul:8500";
|
||||
environment.CONSUL_HTTP_ADDR = config.links.consulAgent.tuple;
|
||||
};
|
||||
};
|
||||
system.ascensions = {
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
{ config, lib, self, ... }:
|
||||
{ config, lib, self, extendModules, ... }:
|
||||
|
||||
let
|
||||
timeMachine = {
|
||||
|
@ -7,6 +7,7 @@ let
|
|||
in
|
||||
|
||||
{
|
||||
debug = lib.warn "debug mode is enabled" true;
|
||||
perSystem = { filters, pkgs, self', system, ... }: {
|
||||
checks = lib.mkIf (system == "x86_64-linux") {
|
||||
ascensions = pkgs.callPackage ./ascensions.nix {
|
||||
|
@ -49,6 +50,10 @@ in
|
|||
searxng = pkgs.callPackage ./searxng.nix {
|
||||
inherit (self'.packages) searxng;
|
||||
};
|
||||
|
||||
simulacrum = pkgs.callPackage ./simulacrum.nix {
|
||||
inherit config extendModules;
|
||||
};
|
||||
};
|
||||
};
|
||||
}
|
||||
|
|
12
packages/checks/modules/nixos/external-storage.nix
Normal file
12
packages/checks/modules/nixos/external-storage.nix
Normal file
|
@ -0,0 +1,12 @@
|
|||
{ config, lib, ... }:
|
||||
|
||||
{
|
||||
systemd.tmpfiles.settings."00-testing-external-storage-underlays" = lib.mapAttrs' (name: cfg: {
|
||||
name = cfg.mountpoint;
|
||||
value.d = {
|
||||
user = toString cfg.uid;
|
||||
group = toString cfg.gid;
|
||||
mode = "0700";
|
||||
};
|
||||
}) config.services.external-storage.underlays;
|
||||
}
|
119
packages/checks/simulacrum.nix
Normal file
119
packages/checks/simulacrum.nix
Normal file
|
@ -0,0 +1,119 @@
|
|||
{ testers, config, extendModules, lib, system }:
|
||||
|
||||
let
|
||||
lift = config;
|
||||
|
||||
snakeoil = {
|
||||
ssh = {
|
||||
public = lib.fileContents ./snakeoil/ssh/snakeoil-key.pub;
|
||||
private = ./snakeoil/ssh/snakeoil-key;
|
||||
};
|
||||
wireguard = {
|
||||
public = lib.genAttrs nodes (node: lib.fileContents ./snakeoil/wireguard/public-key-${toString digits.${node}});
|
||||
private = lib.genAttrs nodes (node: ./snakeoil/wireguard/private-key-${toString digits.${node}});
|
||||
};
|
||||
};
|
||||
|
||||
nodes = lib.attrNames config.gods.fromLight;
|
||||
digits = lib.attrsets.listToAttrs (lib.zipListsWith lib.nameValuePair nodes (lib.range 1 255));
|
||||
depot' = extendModules {
|
||||
modules = [
|
||||
({ config, ... }: {
|
||||
gods.fromLight = lib.mapAttrs (name: cfg: {
|
||||
interfaces.primary = {
|
||||
link = lib.mkForce "vprimary";
|
||||
};
|
||||
ssh.id.publicKey = lib.mkForce snakeoil.ssh.public;
|
||||
}) lift.gods.fromLight;
|
||||
|
||||
cluster = lib.mkForce (lift.cluster.extendModules {
|
||||
specialArgs.depot = config;
|
||||
modules = [
|
||||
{
|
||||
hostLinks = lib.genAttrs nodes (node: {
|
||||
mesh.extra = lib.mkForce (lift.cluster.config.hostLinks.${node}.mesh.extra // {
|
||||
pubKey = snakeoil.wireguard.public.${node};
|
||||
});
|
||||
});
|
||||
}
|
||||
];
|
||||
});
|
||||
})
|
||||
];
|
||||
};
|
||||
specialArgs = depot'.config.lib.summon system lib.id;
|
||||
in
|
||||
|
||||
testers.runNixOSTest {
|
||||
name = "simulacrum";
|
||||
|
||||
node = { inherit specialArgs; };
|
||||
nodes = lib.genAttrs nodes (node: let
|
||||
hour = depot'.config.hours.${node};
|
||||
in {
|
||||
imports = [
|
||||
specialArgs.depot.hours.${node}.nixos
|
||||
./modules/nixos/age-dummy-secrets
|
||||
./modules/nixos/external-storage.nix
|
||||
] ++ depot'.config.cluster.config.out.injectNixosConfig node;
|
||||
|
||||
boot.kernel.sysctl."net.ipv4.ip_forward" = "1";
|
||||
networking = {
|
||||
interfaces = {
|
||||
${hour.interfaces.primary.link} = {
|
||||
useDHCP = lib.mkForce false;
|
||||
virtual = true;
|
||||
ipv4.addresses = lib.mkForce [
|
||||
{
|
||||
address = hour.interfaces.primary.addr;
|
||||
prefixLength = 32;
|
||||
}
|
||||
];
|
||||
};
|
||||
eth1.ipv4.routes = lib.pipe nodes [
|
||||
(lib.filter (n: n != node))
|
||||
(map (n: let
|
||||
hour = depot'.config.hours.${n};
|
||||
in {
|
||||
address = hour.interfaces.primary.addrPublic;
|
||||
prefixLength = 32;
|
||||
via = "192.168.1.${toString digits.${n}}";
|
||||
}))
|
||||
];
|
||||
};
|
||||
|
||||
firewall.extraCommands = lib.mkAfter (lib.optionalString (hour.interfaces.primary.isNat) ''
|
||||
# self-nat
|
||||
iptables -t nat -A PREROUTING -d ${hour.interfaces.primary.addrPublic} -j DNAT --to-destination ${hour.interfaces.primary.addr}
|
||||
iptables -t nat -A POSTROUTING -s ${hour.interfaces.primary.addr} -j SNAT --to-source ${hour.interfaces.primary.addrPublic}
|
||||
'');
|
||||
};
|
||||
|
||||
systemd.services = {
|
||||
hyprspace.enable = false;
|
||||
cachix-agent.enable = false;
|
||||
};
|
||||
|
||||
environment.etc = {
|
||||
"ssh/ssh_host_ed25519_key" = {
|
||||
source = snakeoil.ssh.private;
|
||||
mode = "0400";
|
||||
};
|
||||
"dummy-secrets/cluster-wireguard-meshPrivateKey".source = lib.mkForce snakeoil.wireguard.private.${node};
|
||||
"dummy-secrets/grafana-agent-blackbox-secret-monitoring".text = lib.mkForce ''
|
||||
SECRET_MONITORING_BLACKBOX_TARGET_1_NAME=example-external-service
|
||||
SECRET_MONITORING_BLACKBOX_TARGET_1_MODULE=http2xx
|
||||
SECRET_MONITORING_BLACKBOX_TARGET_1_ADDRESS=http://127.0.0.1:1
|
||||
'';
|
||||
"dummy-secrets/garageRpcSecret".text = lib.mkForce "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa";
|
||||
};
|
||||
virtualisation = {
|
||||
cores = 2;
|
||||
memorySize = 4096;
|
||||
};
|
||||
});
|
||||
|
||||
testScript = ''
|
||||
grail.succeed("false")
|
||||
'';
|
||||
}
|
7
packages/checks/snakeoil/ssh/snakeoil-key
Normal file
7
packages/checks/snakeoil/ssh/snakeoil-key
Normal file
|
@ -0,0 +1,7 @@
|
|||
-----BEGIN OPENSSH PRIVATE KEY-----
|
||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
||||
QyNTUxOQAAACAOx03X+LtW0aN8ejdN4IJgDPrTZgVwe7WbXhhBvqVwgwAAAJAS78fWEu/H
|
||||
1gAAAAtzc2gtZWQyNTUxOQAAACAOx03X+LtW0aN8ejdN4IJgDPrTZgVwe7WbXhhBvqVwgw
|
||||
AAAEAUtGOZZIZdzGP6g85JuXBjDtciNQ9bLHNxSN5Gbwvb2Q7HTdf4u1bRo3x6N03ggmAM
|
||||
+tNmBXB7tZteGEG+pXCDAAAACW1heEBUSVRBTgECAwQ=
|
||||
-----END OPENSSH PRIVATE KEY-----
|
1
packages/checks/snakeoil/ssh/snakeoil-key.pub
Normal file
1
packages/checks/snakeoil/ssh/snakeoil-key.pub
Normal file
|
@ -0,0 +1 @@
|
|||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIA7HTdf4u1bRo3x6N03ggmAM+tNmBXB7tZteGEG+pXCD
|
1
packages/checks/snakeoil/wireguard/private-key-1
Normal file
1
packages/checks/snakeoil/wireguard/private-key-1
Normal file
|
@ -0,0 +1 @@
|
|||
YHzP8rBP6qiXs6ZdnvHop9KnCYRADIEejwZzAzvj8m4=
|
1
packages/checks/snakeoil/wireguard/private-key-2
Normal file
1
packages/checks/snakeoil/wireguard/private-key-2
Normal file
|
@ -0,0 +1 @@
|
|||
uD7X5E6N9d0sN+xPr/bWnehSa3bAok741GO7Z4I+Z3I=
|
1
packages/checks/snakeoil/wireguard/private-key-3
Normal file
1
packages/checks/snakeoil/wireguard/private-key-3
Normal file
|
@ -0,0 +1 @@
|
|||
YLl+hkWaCWx/5PpWs3cQ+bKqYdJef/qZ+FMTsM9ammM=
|
1
packages/checks/snakeoil/wireguard/private-key-4
Normal file
1
packages/checks/snakeoil/wireguard/private-key-4
Normal file
|
@ -0,0 +1 @@
|
|||
MNvWpMluuzQvPyGTp7jtyPSyz6n9lIly/WX1gW2NAHg=
|
1
packages/checks/snakeoil/wireguard/private-key-5
Normal file
1
packages/checks/snakeoil/wireguard/private-key-5
Normal file
|
@ -0,0 +1 @@
|
|||
QHyIJ3HoKGGFN28qOrQP4UyoQMP5bM7Idn2MzayKzEM=
|
1
packages/checks/snakeoil/wireguard/public-key-1
Normal file
1
packages/checks/snakeoil/wireguard/public-key-1
Normal file
|
@ -0,0 +1 @@
|
|||
TESTtbFybW5YREwtd18a1A4StS4YAIUS5/M1Lv0jHjA=
|
1
packages/checks/snakeoil/wireguard/public-key-2
Normal file
1
packages/checks/snakeoil/wireguard/public-key-2
Normal file
|
@ -0,0 +1 @@
|
|||
TEsTh7bthkaDh9A1CpqDi/F121ao5lRZqIJznLH8mB4=
|
1
packages/checks/snakeoil/wireguard/public-key-3
Normal file
1
packages/checks/snakeoil/wireguard/public-key-3
Normal file
|
@ -0,0 +1 @@
|
|||
tEST6afFmVN18o+EiWNFx+ax3MJwdQIeNfJSGEpffXw=
|
1
packages/checks/snakeoil/wireguard/public-key-4
Normal file
1
packages/checks/snakeoil/wireguard/public-key-4
Normal file
|
@ -0,0 +1 @@
|
|||
tEsT6s7VtM5C20eJBaq6UlQydAha8ATlmrTRe9T5jnM=
|
1
packages/checks/snakeoil/wireguard/public-key-5
Normal file
1
packages/checks/snakeoil/wireguard/public-key-5
Normal file
|
@ -0,0 +1 @@
|
|||
TEstYyb5IoqSL53HbSQwMhTaR16sxcWcMmXIBPd+1gE=
|
Loading…
Reference in a new issue