examples: add deploy-container-minimal.sh
This commit is contained in:
parent
e6340426c1
commit
b574cb097f
10
README.md
10
README.md
@ -34,7 +34,7 @@ cd nix-bitcoin/examples/
|
|||||||
nix-shell
|
nix-shell
|
||||||
```
|
```
|
||||||
|
|
||||||
The following example scripts set up a nix-bitcoin node according to `examples/configuration.nix` and then
|
The following example scripts set up a nix-bitcoin node according to [`examples/configuration.nix`](examples/configuration.nix) and then
|
||||||
shut down immediately. They leave no traces (outside of `/nix/store`) on the host system.
|
shut down immediately. They leave no traces (outside of `/nix/store`) on the host system.
|
||||||
|
|
||||||
- [`./deploy-container.sh`](examples/deploy-container.sh) creates a [NixOS container](https://github.com/erikarvstedt/extra-container).\
|
- [`./deploy-container.sh`](examples/deploy-container.sh) creates a [NixOS container](https://github.com/erikarvstedt/extra-container).\
|
||||||
@ -48,6 +48,12 @@ shut down immediately. They leave no traces (outside of `/nix/store`) on the hos
|
|||||||
NixOps can be used to deploy to various other backends like cloud providers.\
|
NixOps can be used to deploy to various other backends like cloud providers.\
|
||||||
Requires: [Nix](https://nixos.org/nix/), [VirtualBox](https://www.virtualbox.org)
|
Requires: [Nix](https://nixos.org/nix/), [VirtualBox](https://www.virtualbox.org)
|
||||||
|
|
||||||
|
- [`./deploy-container-minimal.sh`](examples/deploy-container-minimal.sh) creates a
|
||||||
|
container defined by [minimal-configuration.nix](examples/minimal-configuration.nix) that
|
||||||
|
doesn't use the [secure-node.nix](modules/presets/secure-node.nix) preset.
|
||||||
|
Also shows how to use nix-bitcoin in an existing NixOS config.\
|
||||||
|
Requires: [Nix](https://nixos.org/), a systemd-based Linux distro and root privileges
|
||||||
|
|
||||||
Run the examples with option `--interactive` or `-i` to start a shell for interacting with
|
Run the examples with option `--interactive` or `-i` to start a shell for interacting with
|
||||||
the node:
|
the node:
|
||||||
```bash
|
```bash
|
||||||
@ -55,7 +61,7 @@ the node:
|
|||||||
```
|
```
|
||||||
|
|
||||||
#### Tests
|
#### Tests
|
||||||
The internal test suite is also useful for exploring features.
|
The internal test suite is also useful for exploring features.\
|
||||||
The following `run-tests.sh` commands leave no traces (outside of `/nix/store`) on
|
The following `run-tests.sh` commands leave no traces (outside of `/nix/store`) on
|
||||||
the host system.
|
the host system.
|
||||||
|
|
||||||
|
3
examples/deploy-container-minimal.sh
Executable file
3
examples/deploy-container-minimal.sh
Executable file
@ -0,0 +1,3 @@
|
|||||||
|
#!/usr/bin/env bash
|
||||||
|
|
||||||
|
exec "${BASH_SOURCE[0]%/*}/deploy-container.sh" --minimal-config "$@"
|
@ -8,23 +8,36 @@ set -euo pipefail
|
|||||||
# Feel free to modify or to run nix-shell and execute individual statements of this
|
# Feel free to modify or to run nix-shell and execute individual statements of this
|
||||||
# script in the interactive shell.
|
# script in the interactive shell.
|
||||||
|
|
||||||
if [[ $(sysctl -n net.ipv4.ip_forward) != 1 ]]; then
|
|
||||||
echo "Error: IP forwarding (net.ipv4.ip_forward) is not enabled."
|
|
||||||
echo "Needed for container WAN access."
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
|
|
||||||
if [[ ! -v IN_NIX_SHELL ]]; then
|
if [[ ! -v IN_NIX_SHELL ]]; then
|
||||||
echo "Running script in nix shell env..."
|
echo "Running script in nix shell env..."
|
||||||
cd "${BASH_SOURCE[0]%/*}"
|
cd "${BASH_SOURCE[0]%/*}"
|
||||||
exec nix-shell --run "./${BASH_SOURCE[0]##*/} $*"
|
exec nix-shell --run "./${BASH_SOURCE[0]##*/} $*"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
if [[ $(sysctl -n net.ipv4.ip_forward || sudo sysctl -n net.ipv4.ip_forward) != 1 ]]; then
|
||||||
|
echo "Error: IP forwarding (net.ipv4.ip_forward) is not enabled."
|
||||||
|
echo "Needed for container WAN access."
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
if [[ $EUID != 0 ]]; then
|
if [[ $EUID != 0 ]]; then
|
||||||
# NixOS containers require root permissions
|
# NixOS containers require root permissions
|
||||||
exec sudo "PATH=$PATH" "NIX_PATH=$NIX_PATH" "IN_NIX_SHELL=$IN_NIX_SHELL" "${BASH_SOURCE[0]}" "$@"
|
exec sudo "PATH=$PATH" "NIX_PATH=$NIX_PATH" "IN_NIX_SHELL=$IN_NIX_SHELL" "${BASH_SOURCE[0]}" "$@"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
interactive=
|
||||||
|
minimalConfig=
|
||||||
|
for arg in "$@"; do
|
||||||
|
case $arg in
|
||||||
|
-i|--interactive)
|
||||||
|
interactive=1
|
||||||
|
;;
|
||||||
|
--minimal-config)
|
||||||
|
minimalConfig=1
|
||||||
|
;;
|
||||||
|
esac
|
||||||
|
done
|
||||||
|
|
||||||
# These commands can also be executed interactively in a shell session
|
# These commands can also be executed interactively in a shell session
|
||||||
demoCmds='
|
demoCmds='
|
||||||
echo
|
echo
|
||||||
@ -37,33 +50,39 @@ echo
|
|||||||
echo "lightning-cli state:"
|
echo "lightning-cli state:"
|
||||||
c lightning-cli getinfo
|
c lightning-cli getinfo
|
||||||
echo
|
echo
|
||||||
echo "Node info:"
|
|
||||||
c nodeinfo
|
|
||||||
echo
|
|
||||||
echo "Bitcoind data dir:"
|
echo "Bitcoind data dir:"
|
||||||
sudo ls -al /var/lib/containers/demo-node/var/lib/bitcoind
|
sudo ls -al /var/lib/containers/demo-node/var/lib/bitcoind
|
||||||
'
|
'
|
||||||
|
nodeInfoCmd='
|
||||||
|
echo
|
||||||
|
echo "Node info:"
|
||||||
|
c nodeinfo
|
||||||
|
'
|
||||||
|
|
||||||
case ${1:-} in
|
if [[ $minimalConfig ]]; then
|
||||||
-i|--interactive)
|
configuration=minimal-configuration.nix
|
||||||
runCmd=
|
else
|
||||||
;;
|
configuration=configuration.nix
|
||||||
*)
|
demoCmds="${demoCmds}${nodeInfoCmd}"
|
||||||
runCmd=(--run bash -c "$demoCmds")
|
fi
|
||||||
;;
|
|
||||||
esac
|
if [[ $interactive ]]; then
|
||||||
|
runCmd=
|
||||||
|
else
|
||||||
|
runCmd=(--run bash -c "$demoCmds")
|
||||||
|
fi
|
||||||
|
|
||||||
# Build container.
|
# Build container.
|
||||||
# Learn more: https://github.com/erikarvstedt/extra-container
|
# Learn more: https://github.com/erikarvstedt/extra-container
|
||||||
#
|
#
|
||||||
read -d '' src <<'EOF' || true
|
read -d '' src <<EOF || true
|
||||||
{ pkgs, lib, ... }: {
|
{ pkgs, lib, ... }: {
|
||||||
containers.demo-node = {
|
containers.demo-node = {
|
||||||
extra.addressPrefix = "10.250.0";
|
extra.addressPrefix = "10.250.0";
|
||||||
extra.enableWAN = true;
|
extra.enableWAN = true;
|
||||||
config = { pkgs, config, lib, ... }: {
|
config = { pkgs, config, lib, ... }: {
|
||||||
imports = [
|
imports = [
|
||||||
<nix-bitcoin/examples/configuration.nix>
|
<nix-bitcoin/examples/${configuration}>
|
||||||
<nix-bitcoin/modules/secrets/generate-secrets.nix>
|
<nix-bitcoin/modules/secrets/generate-secrets.nix>
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
22
examples/minimal-configuration.nix
Normal file
22
examples/minimal-configuration.nix
Normal file
@ -0,0 +1,22 @@
|
|||||||
|
{ config, pkgs, lib, ... }: {
|
||||||
|
imports = [
|
||||||
|
<nix-bitcoin/modules/nix-bitcoin.nix>
|
||||||
|
<nix-bitcoin/modules/secrets/generate-secrets.nix>
|
||||||
|
];
|
||||||
|
|
||||||
|
services.bitcoind.enable = true;
|
||||||
|
services.clightning.enable = true;
|
||||||
|
|
||||||
|
# When using nix-bitcoin as part of a larger NixOS configuration, set the following to enable
|
||||||
|
# interactive access to nix-bitcoin features (like bitcoin-cli) for your system's main user
|
||||||
|
nix-bitcoin.operator = {
|
||||||
|
enable = true;
|
||||||
|
name = "main"; # Set this to your system's main user
|
||||||
|
};
|
||||||
|
|
||||||
|
# The system's main unprivileged user
|
||||||
|
users.users.main = {
|
||||||
|
isNormalUser = true;
|
||||||
|
password = "a";
|
||||||
|
};
|
||||||
|
}
|
Loading…
Reference in New Issue
Block a user