lol

Merge pull request #112746 from mkg20001/qemu-extra-disks

authored by

Maciej Krüger and committed by
GitHub
8429831b 971a85d2

+19 -16
+4 -1
nixos/modules/virtualisation/qemu-vm.nix
··· 7 7 # the VM in the host. On the other hand, the root filesystem is a 8 8 # read/writable disk image persistent across VM reboots. 9 9 10 - { config, lib, pkgs, ... }: 10 + { config, lib, pkgs, options, ... }: 11 11 12 12 with lib; 13 13 with import ../../lib/qemu-flags.nix { inherit pkgs; }; ··· 265 265 ]; 266 266 267 267 options = { 268 + 269 + virtualisation.fileSystems = options.fileSystems; 268 270 269 271 virtualisation.memorySize = 270 272 mkOption { ··· 659 661 # attribute should be disregarded for the purpose of building a VM 660 662 # test image (since those filesystems don't exist in the VM). 661 663 fileSystems = mkVMOverride ( 664 + cfg.fileSystems // 662 665 { "/".device = cfg.bootDevice; 663 666 ${if cfg.writableStore then "/nix/.ro-store" else "/nix/store"} = 664 667 { device = "store";
+1 -1
nixos/tests/bees.nix
··· 8 8 ${pkgs.btrfs-progs}/bin/mkfs.btrfs -f -L aux2 /dev/vdc 9 9 ''; 10 10 virtualisation.emptyDiskImages = [ 4096 4096 ]; 11 - fileSystems = lib.mkVMOverride { 11 + virtualisation.fileSystems = { 12 12 "/aux1" = { # filesystem configured to be deduplicated 13 13 device = "/dev/disk/by-label/aux1"; 14 14 fsType = "btrfs";
+1 -1
nixos/tests/fsck.nix
··· 4 4 machine = { lib, ... }: { 5 5 virtualisation.emptyDiskImages = [ 1 ]; 6 6 7 - fileSystems = lib.mkVMOverride { 7 + virtualisation.fileSystems = { 8 8 "/mnt" = { 9 9 device = "/dev/vdb"; 10 10 fsType = "ext4";
+2 -2
nixos/tests/glusterfs.nix
··· 3 3 let 4 4 client = { pkgs, ... } : { 5 5 environment.systemPackages = [ pkgs.glusterfs ]; 6 - fileSystems = pkgs.lib.mkVMOverride 6 + virtualisation.fileSystems = 7 7 { "/gluster" = 8 8 { device = "server1:/gv0"; 9 9 fsType = "glusterfs"; ··· 22 22 23 23 virtualisation.emptyDiskImages = [ 1024 ]; 24 24 25 - fileSystems = pkgs.lib.mkVMOverride 25 + virtualisation.fileSystems = 26 26 { "/data" = 27 27 { device = "/dev/disk/by-label/data"; 28 28 fsType = "ext4";
+1 -1
nixos/tests/hardened.nix
··· 18 18 boot.initrd.postDeviceCommands = '' 19 19 ${pkgs.dosfstools}/bin/mkfs.vfat -n EFISYS /dev/vdb 20 20 ''; 21 - fileSystems = lib.mkVMOverride { 21 + virtualisation.fileSystems = { 22 22 "/efi" = { 23 23 device = "/dev/disk/by-label/EFISYS"; 24 24 fsType = "vfat";
+1 -1
nixos/tests/locate.nix
··· 7 7 nodes = rec { 8 8 a = { 9 9 environment.systemPackages = with pkgs; [ sshfs ]; 10 - fileSystems = lib.mkVMOverride { 10 + virtualisation.fileSystems = { 11 11 "/ssh" = { 12 12 device = "alice@b:/"; 13 13 fsType = "fuse.sshfs";
+1 -1
nixos/tests/misc.nix
··· 16 16 environment.variables.EDITOR = mkOverride 0 "emacs"; 17 17 documentation.nixos.enable = mkOverride 0 true; 18 18 systemd.tmpfiles.rules = [ "d /tmp 1777 root root 10d" ]; 19 - fileSystems = mkVMOverride { "/tmp2" = 19 + virtualisation.fileSystems = { "/tmp2" = 20 20 { fsType = "tmpfs"; 21 21 options = [ "mode=1777" "noauto" ]; 22 22 };
+1 -1
nixos/tests/nextcloud/basic.nix
··· 15 15 echo "http://nextcloud/remote.php/webdav/ ${adminuser} ${adminpass}" > /tmp/davfs2-secrets 16 16 chmod 600 /tmp/davfs2-secrets 17 17 ''; 18 - fileSystems = pkgs.lib.mkVMOverride { 18 + virtualisation.fileSystems = { 19 19 "/mnt/dav" = { 20 20 device = "http://nextcloud/remote.php/webdav/"; 21 21 fsType = "davfs";
+1 -1
nixos/tests/nfs/kerberos.nix
··· 40 40 networking.domain = "nfs.test"; 41 41 networking.hostName = "client"; 42 42 43 - fileSystems = lib.mkVMOverride 43 + virtualisation.fileSystems = 44 44 { "/data" = { 45 45 device = "server.nfs.test:/"; 46 46 fsType = "nfs";
+1 -1
nixos/tests/nfs/simple.nix
··· 4 4 5 5 client = 6 6 { pkgs, ... }: 7 - { fileSystems = pkgs.lib.mkVMOverride 7 + { virtualisation.fileSystems = 8 8 { "/data" = 9 9 { # nfs4 exports the export with fsid=0 as a virtual root directory 10 10 device = if (version == 4) then "server:/" else "server:/data";
+1 -1
nixos/tests/orangefs.nix
··· 9 9 10 10 virtualisation.emptyDiskImages = [ 4096 ]; 11 11 12 - fileSystems = pkgs.lib.mkVMOverride 12 + virtualisation.fileSystems = 13 13 { "/data" = 14 14 { device = "/dev/disk/by-label/data"; 15 15 fsType = "ext4";
+1 -1
nixos/tests/samba.nix
··· 8 8 nodes = 9 9 { client = 10 10 { pkgs, ... }: 11 - { fileSystems = pkgs.lib.mkVMOverride 11 + { virtualisation.fileSystems = 12 12 { "/public" = { 13 13 fsType = "cifs"; 14 14 device = "//server/public";
+1 -1
nixos/tests/snapper.nix
··· 9 9 10 10 virtualisation.emptyDiskImages = [ 4096 ]; 11 11 12 - fileSystems = lib.mkVMOverride { 12 + virtualisation.fileSystems = { 13 13 "/home" = { 14 14 device = "/dev/disk/by-label/aux"; 15 15 fsType = "btrfs";
+1 -1
nixos/tests/systemd.nix
··· 9 9 10 10 environment.systemPackages = [ pkgs.cryptsetup ]; 11 11 12 - fileSystems = lib.mkVMOverride { 12 + virtualisation.fileSystems = { 13 13 "/test-x-initrd-mount" = { 14 14 device = "/dev/vdb"; 15 15 fsType = "ext2";
+1 -1
nixos/tests/zfs.nix
··· 29 29 30 30 # Setup regular fileSystems machinery to ensure forceImportAll can be 31 31 # tested via the regular service units. 32 - fileSystems = lib.mkVMOverride { 32 + virtualisation.fileSystems = { 33 33 "/forcepool" = { 34 34 device = "forcepool"; 35 35 fsType = "zfs";