workflow releases
This commit is contained in:
parent
3146a0bd53
commit
48d5f1209e
6 changed files with 288 additions and 2 deletions
82
.forgejo/workflows/build-image.yml
Normal file
82
.forgejo/workflows/build-image.yml
Normal file
|
|
@ -0,0 +1,82 @@
|
|||
name: "Build & Upload NixOS Proxmox Image"
|
||||
|
||||
on:
|
||||
push:
|
||||
tags:
|
||||
- "v*" # triggers on v1.0.0, v1.2.3, etc.
|
||||
workflow_dispatch:
|
||||
|
||||
jobs:
|
||||
build-upload:
|
||||
runs-on: nixos-latest
|
||||
env:
|
||||
PROXMOX_HOST: 192.168.1.205
|
||||
PROXMOX_USER: forgejo-runner
|
||||
TEMPLATE_VMID: 9001
|
||||
LATEST_TEMPLATE_VMID: 9000
|
||||
|
||||
steps:
|
||||
- name: Install nodejs
|
||||
run: nix-env -iA nixpkgs.nodejs
|
||||
|
||||
- name: Checkout repo
|
||||
uses: actions/checkout@v4
|
||||
|
||||
- name: Set VERSION from tag or fallback
|
||||
run: |
|
||||
if [ -n "${CI_COMMIT_TAG}" ]; then
|
||||
echo "VERSION=${CI_COMMIT_TAG}" >> $GITHUB_ENV
|
||||
else
|
||||
echo "VERSION=dev-$(date +%s)" >> $GITHUB_ENV
|
||||
fi
|
||||
|
||||
- name: Build NixOS image
|
||||
run: nix build .#base --builders "ssh://root@nixos-builder.lab x86_64-linux"
|
||||
|
||||
- name: Prepare SSH
|
||||
env:
|
||||
PROXMOX_SSH_KEY: ${{ secrets.PROXMOX_SSH_KEY }}
|
||||
run: |
|
||||
mkdir -p ~/.ssh
|
||||
echo "$PROXMOX_SSH_KEY" > ~/.ssh/id_rsa
|
||||
chmod 600 ~/.ssh/id_rsa
|
||||
ssh-keyscan -H $PROXMOX_HOST >> ~/.ssh/known_hosts
|
||||
|
||||
# - name: Upload image to Proxmox and manage templates
|
||||
# run: |
|
||||
# set -e
|
||||
# IMAGE="result/vm-image.vma.zst"
|
||||
# REMOTE_NAME="nixos-base-image-${VERSION}.vma.zst"
|
||||
# REMOTE_PATH="/var/lib/vz/template/images/$REMOTE_NAME"
|
||||
|
||||
# echo "Uploading $IMAGE to Proxmox as $REMOTE_NAME"
|
||||
# scp $IMAGE $PROXMOX_USER@$PROXMOX_HOST:$REMOTE_PATH
|
||||
|
||||
# echo "Restoring as VMID $TEMPLATE_VMID"
|
||||
# ssh $PROXMOX_USER@$PROXMOX_HOST "
|
||||
# qm destroy $TEMPLATE_VMID --purge || true
|
||||
# qmrestore $REMOTE_PATH $TEMPLATE_VMID --unique
|
||||
# qm template $TEMPLATE_VMID
|
||||
|
||||
# echo 'Cloning to $LATEST_TEMPLATE_VMID as latest'
|
||||
# qm destroy $LATEST_TEMPLATE_VMID --purge || true
|
||||
# qm clone $TEMPLATE_VMID $LATEST_TEMPLATE_VMID --name nixos-base-latest
|
||||
# "
|
||||
|
||||
# - name: Prune old templates
|
||||
# run: |
|
||||
# ssh $PROXMOX_USER@$PROXMOX_HOST "
|
||||
# cd /var/lib/vz/template/images
|
||||
# ls -tp nixos-base-image-*.vma.zst | grep -v '/$' | tail -n +6 | xargs -r rm --
|
||||
# "
|
||||
|
||||
# - name: Create Forgejo Release (optional)
|
||||
# if: ${{ github.ref_type == 'tag' }}
|
||||
# uses: softprops/action-gh-release@v1
|
||||
# with:
|
||||
# name: "NixOS Base Image ${{ env.VERSION }}"
|
||||
# tag_name: ${{ env.VERSION }}
|
||||
# body: |
|
||||
# This release contains the NixOS base image for Proxmox labeled `${{ env.VERSION }}`.
|
||||
# files: |
|
||||
# result/vm-image.vma.zst
|
||||
31
README.md
31
README.md
|
|
@ -1,3 +1,30 @@
|
|||
# nixos-base-image
|
||||
# Nixs base image for promxox
|
||||
This is the nixos base image to be used as a template in proxmox
|
||||
|
||||
Base image for NixOS VM building on proxmox
|
||||
## Using this base image
|
||||
|
||||
Build the image on remote builder
|
||||
|
||||
```bash
|
||||
nix build .#base --builders "ssh://root@nixos-builder.lab x86_64-linux"
|
||||
```
|
||||
|
||||
Copy to target proxmox storage
|
||||
|
||||
```bash
|
||||
scp ./result/vzdump-qemu-nixos-*.vma.zst jupiter:/mnt/pve/templates-nfs/dump/
|
||||
```
|
||||
|
||||
In proxmox UI
|
||||
|
||||
* Go to datacenter->[node]->[storage]->backups
|
||||
* Restore the image which was uploaded now
|
||||
* Provide name, cpu, memory etc. Don't auto-start
|
||||
* Open the new VM -> click on `more` -> convert to template
|
||||
|
||||
## Testing the template manually
|
||||
|
||||
* click on base image -> more -> clone
|
||||
* Once cloned, provide cloud-init parameters as needed
|
||||
* Adjust hard-disk size as needed.
|
||||
* start and test
|
||||
|
|
|
|||
0
ansible.cfg
Normal file
0
ansible.cfg
Normal file
81
configuration.nix
Normal file
81
configuration.nix
Normal file
|
|
@ -0,0 +1,81 @@
|
|||
{ config, pkgs, modulesPath, lib, ... }:
|
||||
|
||||
{
|
||||
# We rely on the QEMU Guest Agent profile so that Proxmox can talk
|
||||
# to the VM’s guest-agent.
|
||||
imports = [
|
||||
# Enables QEMU Guest Agent support in the VM
|
||||
(modulesPath + "/profiles/qemu-guest.nix")
|
||||
];
|
||||
|
||||
config = {
|
||||
# Provide a default hostname
|
||||
networking.hostName = lib.mkDefault "base";
|
||||
# Allow unfree packages if you ever need them.
|
||||
nixpkgs.config.allowUnfree = true;
|
||||
|
||||
# QEMU Guest Agent (Proxmox integration)
|
||||
# Ensure the qemu-guest-agent service is enabled so Proxmox can query
|
||||
# the VM for IPs, etc.
|
||||
services.qemuGuest.enable = lib.mkDefault true;
|
||||
|
||||
# GRUB on the “boot drive”
|
||||
# Both live and template should install a bootloader on /dev/disk/by-label/nixos.
|
||||
boot.loader.grub.enable = lib.mkDefault true;
|
||||
boot.loader.grub.devices = [ "nodev" ];
|
||||
|
||||
# Grow the root partition on first boot
|
||||
boot.growPartition = lib.mkDefault true;
|
||||
|
||||
# Sudo: Do not require a password for wheel group
|
||||
security.sudo.wheelNeedsPassword = false;
|
||||
|
||||
# OpenSSH: disable password‐based auth, only allow key‐based
|
||||
services.openssh = {
|
||||
enable = true;
|
||||
settings.PermitRootLogin = "prohibit-password";
|
||||
settings.PasswordAuthentication = false;
|
||||
settings.KbdInteractiveAuthentication = false;
|
||||
};
|
||||
|
||||
programs.ssh.startAgent = true;
|
||||
|
||||
# root SSH authorized_keys
|
||||
users.users.root.openssh.authorizedKeys.keys = [
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICUP7m8jZJiclZGfSje8CeBYFhX10SrdtjYziuChmj1X plasmagoat@macbook-air"
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGlzZWik5bbH6/xjiCpwo1SQSJ/J/Cv7y4ZQ45P68GLB forgejo-runner"
|
||||
];
|
||||
|
||||
# Default filesystem on
|
||||
fileSystems."/" = lib.mkDefault {
|
||||
device = "/dev/disk/by-label/nixos";
|
||||
autoResize = true; # grow on first boot
|
||||
fsType = "ext4";
|
||||
};
|
||||
|
||||
# Timezone & Keyboard
|
||||
time.timeZone = "Europe/Copenhagen";
|
||||
console.keyMap = "dk-latin1";
|
||||
|
||||
# Default set of packages
|
||||
environment.systemPackages = with pkgs; [
|
||||
vim # emergencies
|
||||
git # pulling flakes, code
|
||||
curl # downloading things
|
||||
];
|
||||
|
||||
# Nix settings (cache, experimental, gc)
|
||||
nix.settings.trusted-users = [ "root" "@wheel" ];
|
||||
nix.settings.experimental-features = [ "nix-command" "flakes" ];
|
||||
nix.extraOptions = ''
|
||||
experimental-features = nix-command flakes
|
||||
keep-outputs = true
|
||||
keep-derivations = true
|
||||
'';
|
||||
nix.gc.automatic = true;
|
||||
nix.gc.dates = "weekly";
|
||||
nix.gc.options = "--delete-older-than 7d";
|
||||
|
||||
system.stateVersion = lib.mkDefault "25.05";
|
||||
};
|
||||
}
|
||||
63
flake.lock
generated
Normal file
63
flake.lock
generated
Normal file
|
|
@ -0,0 +1,63 @@
|
|||
{
|
||||
"nodes": {
|
||||
"nixlib": {
|
||||
"locked": {
|
||||
"lastModified": 1736643958,
|
||||
"narHash": "sha256-tmpqTSWVRJVhpvfSN9KXBvKEXplrwKnSZNAoNPf/S/s=",
|
||||
"owner": "nix-community",
|
||||
"repo": "nixpkgs.lib",
|
||||
"rev": "1418bc28a52126761c02dd3d89b2d8ca0f521181",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"owner": "nix-community",
|
||||
"repo": "nixpkgs.lib",
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"nixos-generators": {
|
||||
"inputs": {
|
||||
"nixlib": "nixlib",
|
||||
"nixpkgs": [
|
||||
"nixpkgs"
|
||||
]
|
||||
},
|
||||
"locked": {
|
||||
"lastModified": 1747663185,
|
||||
"narHash": "sha256-Obh50J+O9jhUM/FgXtI3he/QRNiV9+J53+l+RlKSaAk=",
|
||||
"owner": "nix-community",
|
||||
"repo": "nixos-generators",
|
||||
"rev": "ee07ba0d36c38e9915c55d2ac5a8fb0f05f2afcc",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"owner": "nix-community",
|
||||
"repo": "nixos-generators",
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"nixpkgs": {
|
||||
"locked": {
|
||||
"lastModified": 1749324915,
|
||||
"narHash": "sha256-aSpVf4BsMsXIlb5lUuF/N/nK1gbvwCKpRcyNEXoDb5k=",
|
||||
"owner": "nixos",
|
||||
"repo": "nixpkgs",
|
||||
"rev": "0e9e520ad13e41b04e90db358f0bba0970c42180",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
"owner": "nixos",
|
||||
"repo": "nixpkgs",
|
||||
"type": "github"
|
||||
}
|
||||
},
|
||||
"root": {
|
||||
"inputs": {
|
||||
"nixos-generators": "nixos-generators",
|
||||
"nixpkgs": "nixpkgs"
|
||||
}
|
||||
}
|
||||
},
|
||||
"root": "root",
|
||||
"version": 7
|
||||
}
|
||||
33
flake.nix
Normal file
33
flake.nix
Normal file
|
|
@ -0,0 +1,33 @@
|
|||
{
|
||||
description = "NixOS Base Image";
|
||||
|
||||
inputs = {
|
||||
# nixpkgs repo for system packages
|
||||
nixpkgs.url = "github:nixos/nixpkgs";
|
||||
# nixos-generators lets us produce a "proxmox"-formatted image
|
||||
nixos-generators = {
|
||||
url = "github:nix-community/nixos-generators";
|
||||
inputs.nixpkgs.follows = "nixpkgs";
|
||||
};
|
||||
};
|
||||
|
||||
outputs = { self, nixpkgs, nixos-generators,... }:
|
||||
{
|
||||
packages.x86_64-linux = {
|
||||
base = nixos-generators.nixosGenerate {
|
||||
system = "x86_64-linux";
|
||||
modules = [
|
||||
{
|
||||
# Pin nixpkgs to the flake input, so that the packages installed
|
||||
# come from the flake inputs.nixpkgs.url.
|
||||
nix.registry.nixpkgs.flake = nixpkgs;
|
||||
# set disk size to to 20G
|
||||
# virtualisation.diskSize = 20 * 1024;
|
||||
}
|
||||
./configuration.nix
|
||||
];
|
||||
format = "proxmox"; # outputs a .vma.zst suitable for qmrestore
|
||||
};
|
||||
};
|
||||
};
|
||||
}
|
||||
Loading…
Add table
Add a link
Reference in a new issue