Merge pull request #238847 from nikstur/qemu-vm-external-disk-image

This commit is contained in:
Ryan Lahfa 2023-10-02 13:27:03 +02:00 committed by GitHub
commit 06f013e0cd
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
4 changed files with 86 additions and 5 deletions

View file

@ -405,4 +405,10 @@ The module update takes care of the new config syntax and the data itself (user
- `python3.pkgs.flitBuildHook` has been removed. Use `flit-core` and `format = "pyproject"` instead. - `python3.pkgs.flitBuildHook` has been removed. Use `flit-core` and `format = "pyproject"` instead.
- The `qemu-vm.nix` module now supports disabling overriding `fileSystems` with
`virtualisation.fileSystems`. This enables the user to boot VMs from
"external" disk images not created by the qemu-vm module. You can stop the
qemu-vm module from overriding `fileSystems` by setting
`virtualisation.fileSystems = lib.mkForce { };`.
- The `electron` packages now places its application files in `$out/libexec/electron` instead of `$out/lib/electron`. Packages using electron-builder will fail to build and need to be adjusted by changing `lib` to `libexec`. - The `electron` packages now places its application files in `$out/libexec/electron` instead of `$out/lib/electron`. Packages using electron-builder will fail to build and need to be adjusted by changing `lib` to `libexec`.

View file

@ -1121,11 +1121,12 @@ in
}) cfg.emptyDiskImages) }) cfg.emptyDiskImages)
]; ];
# Use mkVMOverride to enable building test VMs (e.g. via `nixos-rebuild # By default, use mkVMOverride to enable building test VMs (e.g. via
# build-vm`) of a system configuration, where the regular value for the # `nixos-rebuild build-vm`) of a system configuration, where the regular
# `fileSystems' attribute should be disregarded (since those filesystems # value for the `fileSystems' attribute should be disregarded (since those
# don't necessarily exist in the VM). # filesystems don't necessarily exist in the VM). You can disable this
fileSystems = mkVMOverride cfg.fileSystems; # override by setting `virtualisation.fileSystems = lib.mkForce { };`.
fileSystems = lib.mkIf (cfg.fileSystems != { }) (mkVMOverride cfg.fileSystems);
virtualisation.fileSystems = let virtualisation.fileSystems = let
mkSharedDir = tag: share: mkSharedDir = tag: share:

View file

@ -676,6 +676,7 @@ in {
qboot = handleTestOn ["x86_64-linux" "i686-linux"] ./qboot.nix {}; qboot = handleTestOn ["x86_64-linux" "i686-linux"] ./qboot.nix {};
qemu-vm-restrictnetwork = handleTest ./qemu-vm-restrictnetwork.nix {}; qemu-vm-restrictnetwork = handleTest ./qemu-vm-restrictnetwork.nix {};
qemu-vm-volatile-root = runTest ./qemu-vm-volatile-root.nix; qemu-vm-volatile-root = runTest ./qemu-vm-volatile-root.nix;
qemu-vm-external-disk-image = runTest ./qemu-vm-external-disk-image.nix;
qgis = handleTest ./qgis.nix { qgisPackage = pkgs.qgis; }; qgis = handleTest ./qgis.nix { qgisPackage = pkgs.qgis; };
qgis-ltr = handleTest ./qgis.nix { qgisPackage = pkgs.qgis-ltr; }; qgis-ltr = handleTest ./qgis.nix { qgisPackage = pkgs.qgis-ltr; };
qownnotes = handleTest ./qownnotes.nix {}; qownnotes = handleTest ./qownnotes.nix {};

View file

@ -0,0 +1,73 @@
# Tests that you can boot from an external disk image with the qemu-vm module.
# "External" here means that the image was not produced within the qemu-vm
# module and relies on the fileSystems option also set outside the qemu-vm
# module. Most notably, this tests that you can stop the qemu-vm module from
# overriding fileSystems with virtualisation.fileSystems so you don't have to
# replicate the previously set fileSystems in virtualisation.fileSystems.
{ lib, ... }:
let
rootFslabel = "external";
rootFsDevice = "/dev/disk/by-label/${rootFslabel}";
externalModule = { config, lib, pkgs, ... }: {
boot.loader.systemd-boot.enable = true;
fileSystems = {
"/".device = rootFsDevice;
};
system.build.diskImage = import ../lib/make-disk-image.nix {
inherit config lib pkgs;
label = rootFslabel;
partitionTableType = "efi";
format = "qcow2";
bootSize = "32M";
additionalSpace = "0M";
copyChannel = false;
};
};
in
{
name = "qemu-vm-external-disk-image";
meta.maintainers = with lib.maintainers; [ nikstur ];
nodes.machine = { config, lib, pkgs, ... }: {
virtualisation.directBoot.enable = false;
virtualisation.mountHostNixStore = false;
virtualisation.useEFIBoot = true;
# This stops the qemu-vm module from overriding the fileSystems option
# with virtualisation.fileSystems.
virtualisation.fileSystems = lib.mkForce { };
imports = [ externalModule ];
};
testScript = { nodes, ... }: ''
import os
import subprocess
import tempfile
tmp_disk_image = tempfile.NamedTemporaryFile()
subprocess.run([
"${nodes.machine.virtualisation.qemu.package}/bin/qemu-img",
"create",
"-f",
"qcow2",
"-b",
"${nodes.machine.system.build.diskImage}/nixos.qcow2",
"-F",
"qcow2",
tmp_disk_image.name,
])
# Set NIX_DISK_IMAGE so that the qemu script finds the right disk image.
os.environ['NIX_DISK_IMAGE'] = tmp_disk_image.name
machine.succeed("findmnt --kernel --source ${rootFsDevice} --target /")
'';
}