Merge pull request #238847 from nikstur/qemu-vm-external-disk-image
This commit is contained in:
commit
06f013e0cd
4 changed files with 86 additions and 5 deletions
|
@ -405,4 +405,10 @@ The module update takes care of the new config syntax and the data itself (user
|
||||||
|
|
||||||
- `python3.pkgs.flitBuildHook` has been removed. Use `flit-core` and `format = "pyproject"` instead.
|
- `python3.pkgs.flitBuildHook` has been removed. Use `flit-core` and `format = "pyproject"` instead.
|
||||||
|
|
||||||
|
- The `qemu-vm.nix` module now supports disabling overriding `fileSystems` with
|
||||||
|
`virtualisation.fileSystems`. This enables the user to boot VMs from
|
||||||
|
"external" disk images not created by the qemu-vm module. You can stop the
|
||||||
|
qemu-vm module from overriding `fileSystems` by setting
|
||||||
|
`virtualisation.fileSystems = lib.mkForce { };`.
|
||||||
|
|
||||||
- The `electron` packages now places its application files in `$out/libexec/electron` instead of `$out/lib/electron`. Packages using electron-builder will fail to build and need to be adjusted by changing `lib` to `libexec`.
|
- The `electron` packages now places its application files in `$out/libexec/electron` instead of `$out/lib/electron`. Packages using electron-builder will fail to build and need to be adjusted by changing `lib` to `libexec`.
|
||||||
|
|
|
@ -1121,11 +1121,12 @@ in
|
||||||
}) cfg.emptyDiskImages)
|
}) cfg.emptyDiskImages)
|
||||||
];
|
];
|
||||||
|
|
||||||
# Use mkVMOverride to enable building test VMs (e.g. via `nixos-rebuild
|
# By default, use mkVMOverride to enable building test VMs (e.g. via
|
||||||
# build-vm`) of a system configuration, where the regular value for the
|
# `nixos-rebuild build-vm`) of a system configuration, where the regular
|
||||||
# `fileSystems' attribute should be disregarded (since those filesystems
|
# value for the `fileSystems' attribute should be disregarded (since those
|
||||||
# don't necessarily exist in the VM).
|
# filesystems don't necessarily exist in the VM). You can disable this
|
||||||
fileSystems = mkVMOverride cfg.fileSystems;
|
# override by setting `virtualisation.fileSystems = lib.mkForce { };`.
|
||||||
|
fileSystems = lib.mkIf (cfg.fileSystems != { }) (mkVMOverride cfg.fileSystems);
|
||||||
|
|
||||||
virtualisation.fileSystems = let
|
virtualisation.fileSystems = let
|
||||||
mkSharedDir = tag: share:
|
mkSharedDir = tag: share:
|
||||||
|
|
|
@ -676,6 +676,7 @@ in {
|
||||||
qboot = handleTestOn ["x86_64-linux" "i686-linux"] ./qboot.nix {};
|
qboot = handleTestOn ["x86_64-linux" "i686-linux"] ./qboot.nix {};
|
||||||
qemu-vm-restrictnetwork = handleTest ./qemu-vm-restrictnetwork.nix {};
|
qemu-vm-restrictnetwork = handleTest ./qemu-vm-restrictnetwork.nix {};
|
||||||
qemu-vm-volatile-root = runTest ./qemu-vm-volatile-root.nix;
|
qemu-vm-volatile-root = runTest ./qemu-vm-volatile-root.nix;
|
||||||
|
qemu-vm-external-disk-image = runTest ./qemu-vm-external-disk-image.nix;
|
||||||
qgis = handleTest ./qgis.nix { qgisPackage = pkgs.qgis; };
|
qgis = handleTest ./qgis.nix { qgisPackage = pkgs.qgis; };
|
||||||
qgis-ltr = handleTest ./qgis.nix { qgisPackage = pkgs.qgis-ltr; };
|
qgis-ltr = handleTest ./qgis.nix { qgisPackage = pkgs.qgis-ltr; };
|
||||||
qownnotes = handleTest ./qownnotes.nix {};
|
qownnotes = handleTest ./qownnotes.nix {};
|
||||||
|
|
73
nixos/tests/qemu-vm-external-disk-image.nix
Normal file
73
nixos/tests/qemu-vm-external-disk-image.nix
Normal file
|
@ -0,0 +1,73 @@
|
||||||
|
# Tests that you can boot from an external disk image with the qemu-vm module.
|
||||||
|
# "External" here means that the image was not produced within the qemu-vm
|
||||||
|
# module and relies on the fileSystems option also set outside the qemu-vm
|
||||||
|
# module. Most notably, this tests that you can stop the qemu-vm module from
|
||||||
|
# overriding fileSystems with virtualisation.fileSystems so you don't have to
|
||||||
|
# replicate the previously set fileSystems in virtualisation.fileSystems.
|
||||||
|
|
||||||
|
{ lib, ... }:
|
||||||
|
|
||||||
|
let
|
||||||
|
rootFslabel = "external";
|
||||||
|
rootFsDevice = "/dev/disk/by-label/${rootFslabel}";
|
||||||
|
|
||||||
|
externalModule = { config, lib, pkgs, ... }: {
|
||||||
|
boot.loader.systemd-boot.enable = true;
|
||||||
|
|
||||||
|
fileSystems = {
|
||||||
|
"/".device = rootFsDevice;
|
||||||
|
};
|
||||||
|
|
||||||
|
system.build.diskImage = import ../lib/make-disk-image.nix {
|
||||||
|
inherit config lib pkgs;
|
||||||
|
label = rootFslabel;
|
||||||
|
partitionTableType = "efi";
|
||||||
|
format = "qcow2";
|
||||||
|
bootSize = "32M";
|
||||||
|
additionalSpace = "0M";
|
||||||
|
copyChannel = false;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
in
|
||||||
|
{
|
||||||
|
name = "qemu-vm-external-disk-image";
|
||||||
|
|
||||||
|
meta.maintainers = with lib.maintainers; [ nikstur ];
|
||||||
|
|
||||||
|
nodes.machine = { config, lib, pkgs, ... }: {
|
||||||
|
virtualisation.directBoot.enable = false;
|
||||||
|
virtualisation.mountHostNixStore = false;
|
||||||
|
virtualisation.useEFIBoot = true;
|
||||||
|
|
||||||
|
# This stops the qemu-vm module from overriding the fileSystems option
|
||||||
|
# with virtualisation.fileSystems.
|
||||||
|
virtualisation.fileSystems = lib.mkForce { };
|
||||||
|
|
||||||
|
imports = [ externalModule ];
|
||||||
|
};
|
||||||
|
|
||||||
|
testScript = { nodes, ... }: ''
|
||||||
|
import os
|
||||||
|
import subprocess
|
||||||
|
import tempfile
|
||||||
|
|
||||||
|
tmp_disk_image = tempfile.NamedTemporaryFile()
|
||||||
|
|
||||||
|
subprocess.run([
|
||||||
|
"${nodes.machine.virtualisation.qemu.package}/bin/qemu-img",
|
||||||
|
"create",
|
||||||
|
"-f",
|
||||||
|
"qcow2",
|
||||||
|
"-b",
|
||||||
|
"${nodes.machine.system.build.diskImage}/nixos.qcow2",
|
||||||
|
"-F",
|
||||||
|
"qcow2",
|
||||||
|
tmp_disk_image.name,
|
||||||
|
])
|
||||||
|
|
||||||
|
# Set NIX_DISK_IMAGE so that the qemu script finds the right disk image.
|
||||||
|
os.environ['NIX_DISK_IMAGE'] = tmp_disk_image.name
|
||||||
|
|
||||||
|
machine.succeed("findmnt --kernel --source ${rootFsDevice} --target /")
|
||||||
|
'';
|
||||||
|
}
|
Loading…
Reference in a new issue