examples: add deploy-container-minimal.sh

This commit is contained in:
Erik Arvstedt 2020-10-18 13:41:57 +02:00
parent e6340426c1
commit b574cb097f
No known key found for this signature in database
GPG Key ID: 33312B944DD97846
4 changed files with 71 additions and 21 deletions

View File

@ -34,7 +34,7 @@ cd nix-bitcoin/examples/
nix-shell nix-shell
``` ```
The following example scripts set up a nix-bitcoin node according to `examples/configuration.nix` and then The following example scripts set up a nix-bitcoin node according to [`examples/configuration.nix`](examples/configuration.nix) and then
shut down immediately. They leave no traces (outside of `/nix/store`) on the host system. shut down immediately. They leave no traces (outside of `/nix/store`) on the host system.
- [`./deploy-container.sh`](examples/deploy-container.sh) creates a [NixOS container](https://github.com/erikarvstedt/extra-container).\ - [`./deploy-container.sh`](examples/deploy-container.sh) creates a [NixOS container](https://github.com/erikarvstedt/extra-container).\
@ -48,6 +48,12 @@ shut down immediately. They leave no traces (outside of `/nix/store`) on the hos
NixOps can be used to deploy to various other backends like cloud providers.\ NixOps can be used to deploy to various other backends like cloud providers.\
Requires: [Nix](https://nixos.org/nix/), [VirtualBox](https://www.virtualbox.org) Requires: [Nix](https://nixos.org/nix/), [VirtualBox](https://www.virtualbox.org)
- [`./deploy-container-minimal.sh`](examples/deploy-container-minimal.sh) creates a
container defined by [minimal-configuration.nix](examples/minimal-configuration.nix) that
doesn't use the [secure-node.nix](modules/presets/secure-node.nix) preset.
Also shows how to use nix-bitcoin in an existing NixOS config.\
Requires: [Nix](https://nixos.org/), a systemd-based Linux distro and root privileges
Run the examples with option `--interactive` or `-i` to start a shell for interacting with Run the examples with option `--interactive` or `-i` to start a shell for interacting with
the node: the node:
```bash ```bash
@ -55,7 +61,7 @@ the node:
``` ```
#### Tests #### Tests
The internal test suite is also useful for exploring features. The internal test suite is also useful for exploring features.\
The following `run-tests.sh` commands leave no traces (outside of `/nix/store`) on The following `run-tests.sh` commands leave no traces (outside of `/nix/store`) on
the host system. the host system.

View File

@ -0,0 +1,3 @@
#!/usr/bin/env bash
exec "${BASH_SOURCE[0]%/*}/deploy-container.sh" --minimal-config "$@"

View File

@ -8,23 +8,36 @@ set -euo pipefail
# Feel free to modify or to run nix-shell and execute individual statements of this # Feel free to modify or to run nix-shell and execute individual statements of this
# script in the interactive shell. # script in the interactive shell.
if [[ $(sysctl -n net.ipv4.ip_forward) != 1 ]]; then
echo "Error: IP forwarding (net.ipv4.ip_forward) is not enabled."
echo "Needed for container WAN access."
exit 1
fi
if [[ ! -v IN_NIX_SHELL ]]; then if [[ ! -v IN_NIX_SHELL ]]; then
echo "Running script in nix shell env..." echo "Running script in nix shell env..."
cd "${BASH_SOURCE[0]%/*}" cd "${BASH_SOURCE[0]%/*}"
exec nix-shell --run "./${BASH_SOURCE[0]##*/} $*" exec nix-shell --run "./${BASH_SOURCE[0]##*/} $*"
fi fi
if [[ $(sysctl -n net.ipv4.ip_forward || sudo sysctl -n net.ipv4.ip_forward) != 1 ]]; then
echo "Error: IP forwarding (net.ipv4.ip_forward) is not enabled."
echo "Needed for container WAN access."
exit 1
fi
if [[ $EUID != 0 ]]; then if [[ $EUID != 0 ]]; then
# NixOS containers require root permissions # NixOS containers require root permissions
exec sudo "PATH=$PATH" "NIX_PATH=$NIX_PATH" "IN_NIX_SHELL=$IN_NIX_SHELL" "${BASH_SOURCE[0]}" "$@" exec sudo "PATH=$PATH" "NIX_PATH=$NIX_PATH" "IN_NIX_SHELL=$IN_NIX_SHELL" "${BASH_SOURCE[0]}" "$@"
fi fi
interactive=
minimalConfig=
for arg in "$@"; do
case $arg in
-i|--interactive)
interactive=1
;;
--minimal-config)
minimalConfig=1
;;
esac
done
# These commands can also be executed interactively in a shell session # These commands can also be executed interactively in a shell session
demoCmds=' demoCmds='
echo echo
@ -37,33 +50,39 @@ echo
echo "lightning-cli state:" echo "lightning-cli state:"
c lightning-cli getinfo c lightning-cli getinfo
echo echo
echo "Node info:"
c nodeinfo
echo
echo "Bitcoind data dir:" echo "Bitcoind data dir:"
sudo ls -al /var/lib/containers/demo-node/var/lib/bitcoind sudo ls -al /var/lib/containers/demo-node/var/lib/bitcoind
' '
nodeInfoCmd='
echo
echo "Node info:"
c nodeinfo
'
case ${1:-} in if [[ $minimalConfig ]]; then
-i|--interactive) configuration=minimal-configuration.nix
runCmd= else
;; configuration=configuration.nix
*) demoCmds="${demoCmds}${nodeInfoCmd}"
runCmd=(--run bash -c "$demoCmds") fi
;;
esac if [[ $interactive ]]; then
runCmd=
else
runCmd=(--run bash -c "$demoCmds")
fi
# Build container. # Build container.
# Learn more: https://github.com/erikarvstedt/extra-container # Learn more: https://github.com/erikarvstedt/extra-container
# #
read -d '' src <<'EOF' || true read -d '' src <<EOF || true
{ pkgs, lib, ... }: { { pkgs, lib, ... }: {
containers.demo-node = { containers.demo-node = {
extra.addressPrefix = "10.250.0"; extra.addressPrefix = "10.250.0";
extra.enableWAN = true; extra.enableWAN = true;
config = { pkgs, config, lib, ... }: { config = { pkgs, config, lib, ... }: {
imports = [ imports = [
<nix-bitcoin/examples/configuration.nix> <nix-bitcoin/examples/${configuration}>
<nix-bitcoin/modules/secrets/generate-secrets.nix> <nix-bitcoin/modules/secrets/generate-secrets.nix>
]; ];
}; };

View File

@ -0,0 +1,22 @@
{ config, pkgs, lib, ... }: {
imports = [
<nix-bitcoin/modules/nix-bitcoin.nix>
<nix-bitcoin/modules/secrets/generate-secrets.nix>
];
services.bitcoind.enable = true;
services.clightning.enable = true;
# When using nix-bitcoin as part of a larger NixOS configuration, set the following to enable
# interactive access to nix-bitcoin features (like bitcoin-cli) for your system's main user
nix-bitcoin.operator = {
enable = true;
name = "main"; # Set this to your system's main user
};
# The system's main unprivileged user
users.users.main = {
isNormalUser = true;
password = "a";
};
}