Message ID | 20250331100928.5284-1-mcgrof@kernel.org (mailing list archive) |
---|---|
State | New |
Headers | show |
Series | [RFC] bringup: add semantics to start NixOS support | expand |
On Mon, Mar 31, 2025 at 03:09:28AM +0100, Luis Chamberlain wrote: > Tons still left to do... but hey, at least we get to trim clutter out > and can aim for a simple setup. TODO: > > - playbooks/bringup_nixos.yml > - playbooks/update_ssh_config_nixos.yml > > We can probably just trim nixos.nix.j2 so to at least bring up > a libvirt guest first, and then the second step is to use process > a set of target nodes under a simple workflow. > > So the only thing here this does is show how we need to first > add tons of "support" bools and make terraform and guestfs to select > them. That should probably just be its own patch before all this. > > Then the makefile shows the bare bones bringup we need. But we can > probably simplify that more. > > Signed-off-by: Luis Chamberlain <mcgrof@kernel.org> I have a WIP branch with some cleanup needed for this: https://github.com/dkruces/kdevops/commits/nixos/ * kdevops: add nixos support This simply makes kdevops runnable in NixOS by chaning all the shebangs in scripts/. * Makefile.kdevops: drop ansible_python_intepreter Once ansible cfg series are merged, I think we an get rid of the python interperter in the ansible calls and configure that in Kconfig -> ansible.cfg. * shell.nix Just to launch a Nix shell with all kdevops dependencies. * libvirt_user: add nixos support Generates a kdevops/ in your Nix configuration/ folder. Output: https://github.com/dkruces/nixos-config/tree/main/kdevops My initial idea was to generate NixOS configuration with Ansible [1]. But Joel tried something different with flakes I think. Adding him to get more feeback on it. One thing he found was the need of a hack to be able to launch virt-builder [2]: virt-builder virt-builder is installed with libguestfs, but has some issues from its packaging. It is possible to work around those issues without modifying the package (when a pristine nixpkgs is needed). $ mkdir -p ~/.config/virt-builder $ cd ~/.config/virt-builder $ ln -s /run/current-system/sw/etc/xdg/virt-builder/repos.d $ cd ~/.config $ ln -s virt-builder/ .virt-builder-wrapped This will make your user use the shipped repo configurations, and works around the fact that virt-builder reads its executable name to build its configuration path. The executable being wrapped, it is named differently. error: cannot find any suitable libguestfs supermin Use use the package libguestfs-with-appliance. See https://github.com/NixOS/nixpkgs/issues/37540 The description looks like changes are needed in the package upstream. Not sure why this is not merged and how it differs from other distros, though. Here the output for libguestfs nix package: https://github.com/NixOS/nixpkgs/blob/nixos-24.11/pkgs/by-name/li/libguestfs/package.nix#L141 [1] https://github.com/dkruces/kdevops/commit/2ef75c9913aafe88f5c454dab51908d0ad172b17 [2] https://nixos.wiki/wiki/Libvirt
On Tue, Apr 01, 2025 at 01:30:30PM +0200, Daniel Gomez wrote: > On Mon, Mar 31, 2025 at 03:09:28AM +0100, Luis Chamberlain wrote: > > Tons still left to do... but hey, at least we get to trim clutter out > > and can aim for a simple setup. TODO: > > > > - playbooks/bringup_nixos.yml > > - playbooks/update_ssh_config_nixos.yml > > > > We can probably just trim nixos.nix.j2 so to at least bring up > > a libvirt guest first, and then the second step is to use process > > a set of target nodes under a simple workflow. > > > > So the only thing here this does is show how we need to first > > add tons of "support" bools and make terraform and guestfs to select > > them. That should probably just be its own patch before all this. > > > > Then the makefile shows the bare bones bringup we need. But we can > > probably simplify that more. > > > > Signed-off-by: Luis Chamberlain <mcgrof@kernel.org> > > I have a WIP branch with some cleanup needed for this: > > https://github.com/dkruces/kdevops/commits/nixos/ OK that and this patch can likely get us going somewhere fast. > * kdevops: add nixos support > This simply makes kdevops runnable in NixOS by > chaning all the shebangs in scripts/. > > * Makefile.kdevops: drop ansible_python_intepreter > Once ansible cfg series are merged, I think we an get rid of the python > interperter in the ansible calls and configure that in Kconfig -> ansible.cfg. > > * shell.nix > Just to launch a Nix shell with all kdevops dependencies. > > * libvirt_user: add nixos support > Generates a kdevops/ in your Nix configuration/ folder. Output: > https://github.com/dkruces/nixos-config/tree/main/kdevops > > My initial idea was to generate NixOS configuration with Ansible [1]. If folks don't want to use libvirt they can just a config yaml entry describing their qemu junk, and Kconfig should be able then to read that in and populate pool crap and all that. Do nixos users with virtualization who are on debian use session URI or system URI? I ask as system URI crap requires privileges, which is why we do tons of hoops with sudo for system URI. Fedora based distros use session URI by default Debian based distros use system URI by default What do we want to assume for nix os users? > But Joel > tried something different with flakes I think. Adding him to get more feeback > on it. > > One thing he found was the need of a hack to be able to launch virt-builder [2]: Hrm, so the use case was to use virt-builder with nix? Is that the nixy way to deal with things? Luis
On Tue, Apr 01, 2025 at 02:17:09PM +0100, Luis Chamberlain wrote: > On Tue, Apr 01, 2025 at 01:30:30PM +0200, Daniel Gomez wrote: > > On Mon, Mar 31, 2025 at 03:09:28AM +0100, Luis Chamberlain wrote: > > > Tons still left to do... but hey, at least we get to trim clutter out > > > and can aim for a simple setup. TODO: > > > > > > - playbooks/bringup_nixos.yml > > > - playbooks/update_ssh_config_nixos.yml > > > > > > We can probably just trim nixos.nix.j2 so to at least bring up > > > a libvirt guest first, and then the second step is to use process > > > a set of target nodes under a simple workflow. > > > > > > So the only thing here this does is show how we need to first > > > add tons of "support" bools and make terraform and guestfs to select > > > them. That should probably just be its own patch before all this. > > > > > > Then the makefile shows the bare bones bringup we need. But we can > > > probably simplify that more. > > > > > > Signed-off-by: Luis Chamberlain <mcgrof@kernel.org> > > > > I have a WIP branch with some cleanup needed for this: > > > > https://github.com/dkruces/kdevops/commits/nixos/ > > OK that and this patch can likely get us going somewhere fast. > > > * kdevops: add nixos support > > This simply makes kdevops runnable in NixOS by > > chaning all the shebangs in scripts/. > > > > * Makefile.kdevops: drop ansible_python_intepreter > > Once ansible cfg series are merged, I think we an get rid of the python > > interperter in the ansible calls and configure that in Kconfig -> ansible.cfg. > > > > * shell.nix > > Just to launch a Nix shell with all kdevops dependencies. > > > > * libvirt_user: add nixos support > > Generates a kdevops/ in your Nix configuration/ folder. Output: > > https://github.com/dkruces/nixos-config/tree/main/kdevops > > > > My initial idea was to generate NixOS configuration with Ansible [1]. > > If folks don't want to use libvirt they can just a config yaml entry > describing their qemu junk, and Kconfig should be able then to read that > in and populate pool crap and all that. Do nixos users with > virtualization who are on debian use session URI or system URI? I ask > as system URI crap requires privileges, which is why we do tons of > hoops with sudo for system URI. > > Fedora based distros use session URI by default > Debian based distros use system URI by default My feedback and patches aim to enable kdevops on NixOS hosts, but I now realize this changes are for guests. Sorry for the noise. > > What do we want to assume for nix os users? > > > But Joel > > tried something different with flakes I think. Adding him to get more feeback > > on it. > > > > One thing he found was the need of a hack to be able to launch virt-builder [2]: > > Hrm, so the use case was to use virt-builder with nix? Is that the nixy > way to deal with things? I can't generalize, but nix approach, whether host or guest, it's quite different. For packages, user, groups etc, it would be enough to add a file in kdevops repository to statically define package dependencies and permissions needed. > > Luis
"Luis Chamberlain" <mcgrof@kernel.org> writes: > On Tue, Apr 01, 2025 at 01:30:30PM +0200, Daniel Gomez wrote: >> On Mon, Mar 31, 2025 at 03:09:28AM +0100, Luis Chamberlain wrote: >> > Tons still left to do... but hey, at least we get to trim clutter out >> > and can aim for a simple setup. TODO: >> > >> > - playbooks/bringup_nixos.yml >> > - playbooks/update_ssh_config_nixos.yml >> > >> > We can probably just trim nixos.nix.j2 so to at least bring up >> > a libvirt guest first, and then the second step is to use process >> > a set of target nodes under a simple workflow. >> > >> > So the only thing here this does is show how we need to first >> > add tons of "support" bools and make terraform and guestfs to select >> > them. That should probably just be its own patch before all this. >> > >> > Then the makefile shows the bare bones bringup we need. But we can >> > probably simplify that more. >> > >> > Signed-off-by: Luis Chamberlain <mcgrof@kernel.org> >> >> I have a WIP branch with some cleanup needed for this: >> >> https://github.com/dkruces/kdevops/commits/nixos/ > > OK that and this patch can likely get us going somewhere fast. > >> * kdevops: add nixos support >> This simply makes kdevops runnable in NixOS by >> chaning all the shebangs in scripts/. >> >> * Makefile.kdevops: drop ansible_python_intepreter >> Once ansible cfg series are merged, I think we an get rid of the python >> interperter in the ansible calls and configure that in Kconfig -> ansible.cfg. >> >> * shell.nix >> Just to launch a Nix shell with all kdevops dependencies. Would be cool if that was a flake with a devshell. >> >> * libvirt_user: add nixos support >> Generates a kdevops/ in your Nix configuration/ folder. Output: >> https://github.com/dkruces/nixos-config/tree/main/kdevops >> >> My initial idea was to generate NixOS configuration with Ansible [1]. > > If folks don't want to use libvirt they can just a config yaml entry > describing their qemu junk, and Kconfig should be able then to read that > in and populate pool crap and all that. Do nixos users with > virtualization who are on debian use session URI or system URI? I ask > as system URI crap requires privileges, which is why we do tons of > hoops with sudo for system URI. > > Fedora based distros use session URI by default > Debian based distros use system URI by default > > What do we want to assume for nix os users? > >> But Joel >> tried something different with flakes I think. Adding him to get more feeback >> on it. >> >> One thing he found was the need of a hack to be able to launch virt-builder [2]: > > Hrm, so the use case was to use virt-builder with nix? Is that the nixy > way to deal with things? I would suggest just spawning qemu directly with user mode networking. No need for root for any of this. Specifically, no need for virsh for just piecing together a few command line arguments. Best regards, Andreas Hindborg
"Daniel Gomez" <da.gomez@kernel.org> writes: > On Tue, Apr 01, 2025 at 02:17:09PM +0100, Luis Chamberlain wrote: >> On Tue, Apr 01, 2025 at 01:30:30PM +0200, Daniel Gomez wrote: >> > On Mon, Mar 31, 2025 at 03:09:28AM +0100, Luis Chamberlain wrote: >> > > Tons still left to do... but hey, at least we get to trim clutter out >> > > and can aim for a simple setup. TODO: >> > > >> > > - playbooks/bringup_nixos.yml >> > > - playbooks/update_ssh_config_nixos.yml >> > > >> > > We can probably just trim nixos.nix.j2 so to at least bring up >> > > a libvirt guest first, and then the second step is to use process >> > > a set of target nodes under a simple workflow. >> > > >> > > So the only thing here this does is show how we need to first >> > > add tons of "support" bools and make terraform and guestfs to select >> > > them. That should probably just be its own patch before all this. >> > > >> > > Then the makefile shows the bare bones bringup we need. But we can >> > > probably simplify that more. >> > > >> > > Signed-off-by: Luis Chamberlain <mcgrof@kernel.org> >> > >> > I have a WIP branch with some cleanup needed for this: >> > >> > https://github.com/dkruces/kdevops/commits/nixos/ >> >> OK that and this patch can likely get us going somewhere fast. >> >> > * kdevops: add nixos support >> > This simply makes kdevops runnable in NixOS by >> > chaning all the shebangs in scripts/. >> > >> > * Makefile.kdevops: drop ansible_python_intepreter >> > Once ansible cfg series are merged, I think we an get rid of the python >> > interperter in the ansible calls and configure that in Kconfig -> ansible.cfg. >> > >> > * shell.nix >> > Just to launch a Nix shell with all kdevops dependencies. >> > >> > * libvirt_user: add nixos support >> > Generates a kdevops/ in your Nix configuration/ folder. Output: >> > https://github.com/dkruces/nixos-config/tree/main/kdevops >> > >> > My initial idea was to generate NixOS configuration with Ansible [1]. >> >> If folks don't want to use libvirt they can just a config yaml entry >> describing their qemu junk, and Kconfig should be able then to read that >> in and populate pool crap and all that. Do nixos users with >> virtualization who are on debian use session URI or system URI? I ask >> as system URI crap requires privileges, which is why we do tons of >> hoops with sudo for system URI. >> >> Fedora based distros use session URI by default >> Debian based distros use system URI by default > > My feedback and patches aim to enable kdevops on NixOS hosts, but I now realize > this changes are for guests. > > Sorry for the noise. > >> >> What do we want to assume for nix os users? >> >> > But Joel >> > tried something different with flakes I think. Adding him to get more feeback >> > on it. >> > >> > One thing he found was the need of a hack to be able to launch virt-builder [2]: >> >> Hrm, so the use case was to use virt-builder with nix? Is that the nixy >> way to deal with things? > > I can't generalize, but nix approach, whether host or guest, it's quite > different. For packages, user, groups etc, it would be enough to add a file in > kdevops repository to statically define package dependencies and permissions > needed. No need for virt-builder or similar tools with nix virtual machines. You can simply mount the nix store into the vm with virtiofs and go. No image required. You probably want to generate a nix expression describing your vm from your kconfig settings. Seems like you might want to use ansible to do this, but really a small piece of shell script or python could do this for you. If you need any input on how to make this work, I can give you some input. I am booting a nixos vm in this way for my development workflow. Best regards, Andreas Hindborg
diff --git a/Kconfig b/Kconfig index 988782a9dc83..2b8363aeaccd 100644 --- a/Kconfig +++ b/Kconfig @@ -67,18 +67,26 @@ menu "Bring up methods" source "kconfigs/Kconfig.bringup" endmenu +if KDEVOPS_SUPPORTS_BRINGUP menu "Bring up goals" source "kconfigs/Kconfig.bringup.goals" endmenu +endif +if KDEVOPS_SUPPORTS_SYSCTL menu "Node sysctl configuration" source "kconfigs/Kconfig.sysctl" endmenu +endif +if KDEVOPS_SUPPORTS_WORKFLOWS menu "Target workflows" source "kconfigs/workflows/Kconfig" endmenu +endif +if KDEVOPS_SUPPORTS_CONFIG menu "Kdevops configuration" source "kconfigs/Kconfig.kdevops" endmenu +endif diff --git a/kconfigs/Kconfig.bringup b/kconfigs/Kconfig.bringup index a9aefc56e3fa..77493a5cec8d 100644 --- a/kconfigs/Kconfig.bringup +++ b/kconfigs/Kconfig.bringup @@ -1,6 +1,31 @@ config BRINGUP_SUPPORTS_CXL bool +config KDEVOPS_SUPPORTS_BRINGUP + bool + +config KDEVOPS_SUPPORTS_SYSCTL + bool + +config KDEVOPS_SUPPORTS_WORKFLOWS + bool + +config KDEVOPS_SUPPORTS_CONFIG + bool + +config KDEVOPS_SUPPORTS_LEGACY_KERNELCI + bool + +config KDEVOPS_NODE_PATH + string + output yaml + default "{{ guestfs_path }}" if KDEVOPS_ENABLE_GUESTFS + default "{{ nixos_path }}" if KDEVOPS_ENABLE_NIXOS + +config KDEVOPS_GENERATE_NODES + bool + output yaml + config KDEVOPS_ENABLE_GUESTFS bool output yaml @@ -13,6 +38,12 @@ config GUESTFS bool "Use guestfs-tools for local virtualization via KVM and libvirt" select KDEVOPS_ENABLE_GUESTFS select EXTRA_STORAGE_SUPPORTS_LARGEIO + select KDEVOPS_GENERATE_NODES + select KDEVOPS_SUPPORTS_BRINGUP + select KDEVOPS_SUPPORTS_SYSCTL + select KDEVOPS_SUPPORTS_WORKFLOWS + select KDEVOPS_SUPPORTS_CONFIG + select KDEVOPS_SUPPORTS_LEGACY_KERNELCI help This option will use libguestfs utilities instead of Vagrant to build guest images and spin them up using libvirt with KVM. @@ -23,6 +54,10 @@ config TERRAFORM select EXTRA_STORAGE_SUPPORTS_1K select EXTRA_STORAGE_SUPPORTS_2K select EXTRA_STORAGE_SUPPORTS_4K + select KDEVOPS_SUPPORTS_BRINGUP + select KDEVOPS_SUPPORTS_SYSCTL + select KDEVOPS_SUPPORTS_WORKFLOWS + select KDEVOPS_SUPPORTS_CONFIG help This option will enable use of Vagrant. Enable this if you want to use terraform to create nodes on a cloud environment such as: @@ -39,6 +74,18 @@ config TERRAFORM If you are not using a cloud environment just disable this. +config KDEVOPS_ENABLE_NIXOS + bool "Nix OS setup" + output yaml + select EXTRA_STORAGE_SUPPORTS_512 + select EXTRA_STORAGE_SUPPORTS_1K + select EXTRA_STORAGE_SUPPORTS_2K + select EXTRA_STORAGE_SUPPORTS_4K + select KDEVOPS_GENERATE_NODES + select KDEVOPS_SUPPORTS_CONFIG + help + Select this if you want to experiment with Nix OS. + config SKIP_BRINGUP bool "Skip bring up - bare metal or existing nodes" select EXTRA_STORAGE_SUPPORTS_512 diff --git a/kconfigs/Kconfig.kdevops b/kconfigs/Kconfig.kdevops index c613ff20c193..685abd4e3ce3 100644 --- a/kconfigs/Kconfig.kdevops +++ b/kconfigs/Kconfig.kdevops @@ -192,6 +192,8 @@ menu "Ansible post-bring up provisioning configuration" source "kconfigs/Kconfig.ansible_provisioning" endmenu +if KDEVOPS_SUPPORTS_LEGACY_KERNELCI menu "Kernel continous integration configuration" source "kconfigs/Kconfig.kernel-ci" endmenu +endif diff --git a/playbooks/roles/gen_nodes/defaults/main.yml b/playbooks/roles/gen_nodes/defaults/main.yml index 8ff9b87993a7..5d420dc5e6b3 100644 --- a/playbooks/roles/gen_nodes/defaults/main.yml +++ b/playbooks/roles/gen_nodes/defaults/main.yml @@ -1,5 +1,7 @@ # SPDX-License-Identifier GPL-2.0+ --- +kdevops_generate_nodes: False +kdevops_enable_nixos: False kdevops_enable_guestfs: False kdevops_enable_terraform: False kdevops_enable_vagrant: False @@ -19,6 +21,10 @@ kdevops_smbd_enable: False kdevops_krb5_enable: False kdevops_enable_iscsi: false + +kdevops_node_path: "" +nixos_path: "{{ topdir_path }}/nixos" + virtualbox_provider: False libvirt_provider: False diff --git a/playbooks/roles/gen_nodes/tasks/main.yml b/playbooks/roles/gen_nodes/tasks/main.yml index 8c6a1f705ee2..7f5b64bcd68f 100644 --- a/playbooks/roles/gen_nodes/tasks/main.yml +++ b/playbooks/roles/gen_nodes/tasks/main.yml @@ -18,6 +18,18 @@ command: "id -g -n" register: my_group +- name: Create NixOS directory + ansible.builtin.file: + path: "{{ kdevops_nix_path }}" + state: directory + when: kdevops_enable_nixos|bool + +- name: Generate NixOS devshell.nix + template: + src: devshell.nix.j2 + dest: "{{ kdevops_nix_path }}" + when: kdevops_enable_nixos|bool + - name: Fail if kdevops_host_prefix contains a dash fail: msg: "Invalid kdevops_host_prefix '{{ kdevops_host_prefix }}'. The prefix cannot contain a dash ('-')." @@ -544,7 +556,14 @@ include_vars: "{{ topdir_path }}/{{ kdevops_nodes }}" ignore_errors: yes when: - - kdevops_enable_guestfs|bool + - kdevops_generate_nodes|bool + +- name: Create local directories for each of the guests + ansible.builtin.file: + path: "{{ kdevops_node_path }}/{{ item.name }}" + state: directory + with_items: "{{ guestfs_nodes }}" + when: kdevops_enable_guestfs|bool - name: Create local directories for each of the guests ansible.builtin.file: diff --git a/playbooks/roles/gen_nodes/templates/nixos.nix.j2 b/playbooks/roles/gen_nodes/templates/nixos.nix.j2 new file mode 100644 index 000000000000..40eb59853e90 --- /dev/null +++ b/playbooks/roles/gen_nodes/templates/nixos.nix.j2 @@ -0,0 +1,34 @@ +{ config, pkgs, ... }: + +{ + imports = [ ./hardware-configuration.nix ]; + + networking.hostName = "{{ guest_hostname }}"; + networking.useDHCP = false; + + networking.interfaces.enp1s0.ipv4.addresses = [{ + address = "{{ guest_ip }}"; + prefixLength = 24; + }]; + networking.defaultGateway = "{{ guest_gateway }}"; + networking.nameservers = [ "{{ guest_dns }}" ]; + + time.timeZone = "UTC"; + + environment.systemPackages = with pkgs; [ + git + htop + sysbench + docker + ]; + + services.openssh.enable = true; + + users.users.kdevops = { + isNormalUser = true; + extraGroups = [ "wheel" ]; + password = "kdevops"; # for testing only; better to use hashedPassword + }; + + system.stateVersion = "24.05"; +} diff --git a/scripts/nixos.Makefile b/scripts/nixos.Makefile new file mode 100644 index 000000000000..65eec5efa8d0 --- /dev/null +++ b/scripts/nixos.Makefile @@ -0,0 +1,77 @@ +# SPDX-License-Identifier: copyleft-next-0.3.1 + +NIXOIS_ARGS := + +KDEVOPS_NODES_TEMPLATE := $(KDEVOPS_NODES_ROLE_TEMPLATE_DIR)/nixos_nodes.j2 +KDEVOPS_NODES := $(KDEVOPS_NODE_PATH)/kdevops_nodes.yaml + +export KDEVOPS_PROVISIONED_SSH := $(KDEVOPS_PROVISIONED_SSH_DEFAULT_GUARD) + +NIXOS_ARGS += data_home_dir=/home/kdevops +NIXOS_ARGS += kdevops_storage_pool_user='$(USER)' + +NIXOS_ARGS += libvirt_provider=True + +QEMU_GROUP:=$(subst ",,$(CONFIG_LIBVIRT_QEMU_GROUP)) +NIXOS_ARGS += kdevops_storage_pool_group='$(QEMU_GROUP)' +NIXOS_ARGS += storage_pool_group='$(QEMU_GROUP)' + +ANSIBLE_EXTRA_ARGS += $(NIXOS_ARGS) + +NIXOS_BRINGUP_DEPS := +NIXOS_BRINGUP_DEPS += install_nixos + +KDEVOPS_PROVISION_METHOD := bringup_nixos +KDEVOPS_PROVISION_STATUS_METHOD := status_nixos +KDEVOPS_PROVISION_DESTROY_METHOD := destroy_nixos + +$(KDEVOPS_PROVISIONED_SSH): + $(Q)if [[ "$(CONFIG_KDEVOPS_SSH_CONFIG_UPDATE)" == "y" ]]; then \ + ansible-playbook $(ANSIBLE_VERBOSE) --connection=local \ + --inventory localhost, \ + playbooks/update_ssh_config_nixos.yml \ + --extra-vars=@./extra_vars.yaml \ + -e 'ansible_python_interpreter=/usr/bin/python3' ;\ + LIBVIRT_DEFAULT_URI=$(CONFIG_LIBVIRT_URI) $(TOPDIR)/scripts/update_ssh_config_nixos.py; \ + fi + $(Q)ansible $(ANSIBLE_VERBOSE) -i hosts all -e 'ansible_python_interpreter=/usr/bin/python3' -m wait_for_connection + $(Q)touch $(KDEVOPS_PROVISIONED_SSH) + +install_nixos: + $(Q)ansible-playbook $(ANSIBLE_VERBOSE) --connection=local \ + --inventory localhost, \ + playbooks/bringup_nixos.yml \ + -e 'ansible_python_interpreter=/usr/bin/python3' \ + --extra-vars=@./extra_vars.yaml \ + --tags install-deps + +bringup_nixos: $(NIXOS_BRINGUP_DEPS) + $(Q)ansible-playbook $(ANSIBLE_VERBOSE) --connection=local \ + --inventory localhost, \ + playbooks/bringup_nixos.yml \ + -e 'ansible_python_interpreter=/usr/bin/python3' \ + --extra-vars=@./extra_vars.yaml \ + --tags bringup +PHONY += bringup_nixos + +status_nixos: + $(Q)ansible-playbook $(ANSIBLE_VERBOSE) --connection=local \ + --inventory localhost, \ + playbooks/bringup_nixos.yml \ + -e 'ansible_python_interpreter=/usr/bin/python3' \ + --extra-vars=@./extra_vars.yaml \ + --tags status +PHONY += status_nixos + +destroy_nixos: + $(Q)ansible-playbook $(ANSIBLE_VERBOSE) --connection=local \ + --inventory localhost, \ + playbooks/bringup_nixos.yml \ + -e 'ansible_python_interpreter=/usr/bin/python3' \ + --extra-vars=@./extra_vars.yaml \ + --tags destroy + $(Q)rm -f $(KDEVOPS_PROVISIONED_SSH) $(KDEVOPS_PROVISIONED_DEVCONFIG) +PHONY += destroy_nixos + +cleancache: + $(Q)echo fixme
Tons still left to do... but hey, at least we get to trim clutter out and can aim for a simple setup. TODO: - playbooks/bringup_nixos.yml - playbooks/update_ssh_config_nixos.yml We can probably just trim nixos.nix.j2 so to at least bring up a libvirt guest first, and then the second step is to use process a set of target nodes under a simple workflow. So the only thing here this does is show how we need to first add tons of "support" bools and make terraform and guestfs to select them. That should probably just be its own patch before all this. Then the makefile shows the bare bones bringup we need. But we can probably simplify that more. Signed-off-by: Luis Chamberlain <mcgrof@kernel.org> --- Kconfig | 8 ++ kconfigs/Kconfig.bringup | 47 +++++++++++ kconfigs/Kconfig.kdevops | 2 + playbooks/roles/gen_nodes/defaults/main.yml | 6 ++ playbooks/roles/gen_nodes/tasks/main.yml | 21 ++++- .../roles/gen_nodes/templates/nixos.nix.j2 | 34 ++++++++ scripts/nixos.Makefile | 77 +++++++++++++++++++ 7 files changed, 194 insertions(+), 1 deletion(-) create mode 100644 playbooks/roles/gen_nodes/templates/nixos.nix.j2 create mode 100644 scripts/nixos.Makefile