2018-11-11 08:41:11 +00:00
|
|
|
{ system ? builtins.currentSystem,
|
|
|
|
config ? {},
|
2022-04-17 21:24:13 +00:00
|
|
|
pkgs ? import ../.. { inherit system config; },
|
|
|
|
systemdStage1 ? false
|
2018-11-11 08:41:11 +00:00
|
|
|
}:
|
2010-01-06 13:36:21 +00:00
|
|
|
|
2020-01-28 07:54:05 +00:00
|
|
|
with import ../lib/testing-python.nix { inherit system pkgs; };
|
2014-04-14 12:02:44 +00:00
|
|
|
with pkgs.lib;
|
2010-01-10 01:26:01 +00:00
|
|
|
|
2010-01-07 13:19:38 +00:00
|
|
|
let
|
2010-01-06 13:36:21 +00:00
|
|
|
|
2010-01-06 20:52:05 +00:00
|
|
|
# The configuration to install.
|
2022-04-04 16:22:03 +00:00
|
|
|
makeConfig = { bootLoader, grubDevice, grubIdentifier, grubUseEfi
|
2024-07-10 13:06:52 +00:00
|
|
|
, extraConfig, forceGrubReinstallCount ? 0, withTestInstrumentation ? true
|
2023-11-18 19:38:08 +00:00
|
|
|
, clevisTest
|
2015-05-21 10:37:14 +00:00
|
|
|
}:
|
2014-08-31 16:18:13 +00:00
|
|
|
pkgs.writeText "configuration.nix" ''
|
2014-12-05 17:19:27 +00:00
|
|
|
{ config, lib, pkgs, modulesPath, ... }:
|
2010-01-06 20:52:05 +00:00
|
|
|
|
2013-09-04 11:05:09 +00:00
|
|
|
{ imports =
|
2013-10-13 15:24:11 +00:00
|
|
|
[ ./hardware-configuration.nix
|
2024-07-10 13:06:52 +00:00
|
|
|
${if !withTestInstrumentation
|
2023-07-07 16:53:19 +00:00
|
|
|
then "" # Still included, but via installer/flake.nix
|
|
|
|
else "<nixpkgs/nixos/modules/testing/test-instrumentation.nix>"}
|
2010-01-06 20:52:05 +00:00
|
|
|
];
|
|
|
|
|
2023-07-07 14:41:40 +00:00
|
|
|
networking.hostName = "thatworked";
|
|
|
|
|
2023-01-15 15:06:07 +00:00
|
|
|
documentation.enable = false;
|
|
|
|
|
2017-08-23 22:54:31 +00:00
|
|
|
# To ensure that we can rebuild the grub configuration on the nixos-rebuild
|
|
|
|
system.extraDependencies = with pkgs; [ stdenvNoCC ];
|
|
|
|
|
2022-04-17 21:24:13 +00:00
|
|
|
${optionalString systemdStage1 "boot.initrd.systemd.enable = true;"}
|
|
|
|
|
2016-04-23 11:20:34 +00:00
|
|
|
${optionalString (bootLoader == "grub") ''
|
2020-04-23 00:30:19 +00:00
|
|
|
boot.loader.grub.extraConfig = "serial; terminal_output serial";
|
2017-02-15 22:59:40 +00:00
|
|
|
${if grubUseEfi then ''
|
|
|
|
boot.loader.grub.device = "nodev";
|
|
|
|
boot.loader.grub.efiSupport = true;
|
|
|
|
boot.loader.grub.efiInstallAsRemovable = true; # XXX: needed for OVMF?
|
|
|
|
'' else ''
|
|
|
|
boot.loader.grub.device = "${grubDevice}";
|
|
|
|
boot.loader.grub.fsIdentifier = "${grubIdentifier}";
|
|
|
|
''}
|
2016-04-23 11:20:34 +00:00
|
|
|
|
|
|
|
boot.loader.grub.configurationLimit = 100 + ${toString forceGrubReinstallCount};
|
2012-04-11 09:42:53 +00:00
|
|
|
''}
|
2010-01-10 01:26:01 +00:00
|
|
|
|
2016-06-01 10:51:33 +00:00
|
|
|
${optionalString (bootLoader == "systemd-boot") ''
|
|
|
|
boot.loader.systemd-boot.enable = true;
|
2016-04-23 11:20:34 +00:00
|
|
|
''}
|
2014-09-04 17:30:25 +00:00
|
|
|
|
2024-04-01 18:21:32 +00:00
|
|
|
boot.initrd.secrets."/etc/secret" = "/etc/nixos/secret";
|
2023-01-01 16:20:37 +00:00
|
|
|
|
2023-11-18 19:38:08 +00:00
|
|
|
${optionalString clevisTest ''
|
|
|
|
boot.kernelParams = [ "console=tty0" "ip=192.168.1.1:::255.255.255.0::eth1:none" ];
|
|
|
|
boot.initrd = {
|
|
|
|
availableKernelModules = [ "tpm_tis" ];
|
|
|
|
clevis = { enable = true; useTang = true; };
|
|
|
|
network.enable = true;
|
|
|
|
};
|
|
|
|
''}
|
|
|
|
|
2018-06-29 23:55:42 +00:00
|
|
|
users.users.alice = {
|
2017-02-20 19:57:16 +00:00
|
|
|
isNormalUser = true;
|
|
|
|
home = "/home/alice";
|
|
|
|
description = "Alice Foobar";
|
|
|
|
};
|
|
|
|
|
2015-06-10 11:14:40 +00:00
|
|
|
hardware.enableAllFirmware = lib.mkForce false;
|
2014-12-09 12:27:00 +00:00
|
|
|
|
2022-12-12 01:36:03 +00:00
|
|
|
${replaceStrings ["\n"] ["\n "] extraConfig}
|
2010-01-06 20:52:05 +00:00
|
|
|
}
|
|
|
|
'';
|
|
|
|
|
2011-09-14 18:20:50 +00:00
|
|
|
|
2015-06-10 11:14:40 +00:00
|
|
|
# The test script boots a NixOS VM, installs NixOS on an empty hard
|
2010-01-07 14:19:19 +00:00
|
|
|
# disk, and then reboot from the hard disk. It's parameterized with
|
|
|
|
# a test script fragment `createPartitions', which must create
|
2014-04-30 07:40:18 +00:00
|
|
|
# partitions and filesystems.
|
2023-10-23 18:20:10 +00:00
|
|
|
testScriptFun = { bootLoader, createPartitions, grubDevice, grubUseEfi, grubIdentifier
|
2024-04-01 18:21:32 +00:00
|
|
|
, postInstallCommands, postBootCommands, extraConfig
|
2024-07-10 15:49:55 +00:00
|
|
|
, testSpecialisationConfig, testFlakeSwitch, testByAttrSwitch, clevisTest, clevisFallbackTest
|
2024-01-19 10:39:01 +00:00
|
|
|
, disableFileSystems
|
2015-05-21 10:37:14 +00:00
|
|
|
}:
|
2024-02-26 08:32:32 +00:00
|
|
|
let
|
2024-04-01 18:21:32 +00:00
|
|
|
startTarget = ''
|
|
|
|
${optionalString clevisTest "tpm.start()"}
|
|
|
|
target.start()
|
|
|
|
${postBootCommands}
|
|
|
|
target.wait_for_unit("multi-user.target")
|
|
|
|
'';
|
|
|
|
in ''
|
|
|
|
${optionalString clevisTest ''
|
2024-02-26 08:32:32 +00:00
|
|
|
import os
|
2023-11-18 19:38:08 +00:00
|
|
|
import subprocess
|
2019-03-07 09:38:28 +00:00
|
|
|
|
2024-02-26 08:32:32 +00:00
|
|
|
tpm_folder = os.environ['NIX_BUILD_TOP']
|
2010-01-06 13:36:21 +00:00
|
|
|
|
2023-11-18 19:38:08 +00:00
|
|
|
class Tpm:
|
|
|
|
def __init__(self):
|
|
|
|
self.start()
|
|
|
|
|
|
|
|
def start(self):
|
|
|
|
self.proc = subprocess.Popen(["${pkgs.swtpm}/bin/swtpm",
|
|
|
|
"socket",
|
|
|
|
"--tpmstate", f"dir={tpm_folder}/swtpm",
|
|
|
|
"--ctrl", f"type=unixio,path={tpm_folder}/swtpm-sock",
|
|
|
|
"--tpm2"
|
|
|
|
])
|
|
|
|
|
|
|
|
# Check whether starting swtpm failed
|
|
|
|
try:
|
|
|
|
exit_code = self.proc.wait(timeout=0.2)
|
|
|
|
if exit_code is not None and exit_code != 0:
|
|
|
|
raise Exception("failed to start swtpm")
|
|
|
|
except subprocess.TimeoutExpired:
|
|
|
|
pass
|
|
|
|
|
|
|
|
"""Check whether the swtpm process exited due to an error"""
|
|
|
|
def check(self):
|
|
|
|
exit_code = self.proc.poll()
|
|
|
|
if exit_code is not None and exit_code != 0:
|
|
|
|
raise Exception("swtpm process died")
|
|
|
|
|
|
|
|
|
|
|
|
os.mkdir(f"{tpm_folder}/swtpm")
|
|
|
|
tpm = Tpm()
|
|
|
|
tpm.check()
|
2024-04-01 18:21:32 +00:00
|
|
|
''}
|
2023-11-18 19:38:08 +00:00
|
|
|
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.start()
|
2023-11-18 19:38:08 +00:00
|
|
|
${optionalString clevisTest ''
|
2024-04-01 18:21:32 +00:00
|
|
|
tang.start()
|
2023-11-18 19:38:08 +00:00
|
|
|
tang.wait_for_unit("sockets.target")
|
2024-01-14 02:18:34 +00:00
|
|
|
tang.systemctl("start network-online.target")
|
2023-11-18 19:38:08 +00:00
|
|
|
tang.wait_for_unit("network-online.target")
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.systemctl("start network-online.target")
|
|
|
|
installer.wait_for_unit("network-online.target")
|
2023-11-18 19:38:08 +00:00
|
|
|
''}
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.wait_for_unit("multi-user.target")
|
2010-01-06 16:46:21 +00:00
|
|
|
|
2020-01-28 07:54:05 +00:00
|
|
|
with subtest("Assert readiness of login prompt"):
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.succeed("echo hello")
|
2011-09-14 18:20:50 +00:00
|
|
|
|
2020-01-28 07:54:05 +00:00
|
|
|
with subtest("Wait for hard disks to appear in /dev"):
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.succeed("udevadm settle")
|
2012-05-24 23:39:03 +00:00
|
|
|
|
2020-01-28 07:54:05 +00:00
|
|
|
${createPartitions}
|
2014-04-30 12:51:27 +00:00
|
|
|
|
2020-01-28 07:54:05 +00:00
|
|
|
with subtest("Create the NixOS configuration"):
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.succeed("nixos-generate-config ${optionalString disableFileSystems "--no-filesystems"} --root /mnt")
|
|
|
|
installer.succeed("cat /mnt/etc/nixos/hardware-configuration.nix >&2")
|
|
|
|
installer.copy_from_host(
|
2020-01-28 07:54:05 +00:00
|
|
|
"${ makeConfig {
|
2022-04-04 16:22:03 +00:00
|
|
|
inherit bootLoader grubDevice grubIdentifier
|
2023-11-18 19:38:08 +00:00
|
|
|
grubUseEfi extraConfig clevisTest;
|
2020-01-28 07:54:05 +00:00
|
|
|
}
|
|
|
|
}",
|
|
|
|
"/mnt/etc/nixos/configuration.nix",
|
|
|
|
)
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.copy_from_host("${pkgs.writeText "secret" "secret"}", "/mnt/etc/nixos/secret")
|
2020-01-28 07:54:05 +00:00
|
|
|
|
2023-11-18 19:38:08 +00:00
|
|
|
${optionalString clevisTest ''
|
|
|
|
with subtest("Create the Clevis secret with Tang"):
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.systemctl("start network-online.target")
|
|
|
|
installer.wait_for_unit("network-online.target")
|
|
|
|
installer.succeed('echo -n password | clevis encrypt sss \'{"t": 2, "pins": {"tpm2": {}, "tang": {"url": "http://192.168.1.2"}}}\' -y > /mnt/etc/nixos/clevis-secret.jwe')''}
|
2023-11-18 19:38:08 +00:00
|
|
|
|
|
|
|
${optionalString clevisFallbackTest ''
|
|
|
|
with subtest("Shutdown Tang to check fallback to interactive prompt"):
|
|
|
|
tang.shutdown()
|
|
|
|
''}
|
|
|
|
|
2020-01-28 07:54:05 +00:00
|
|
|
with subtest("Perform the installation"):
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.succeed("nixos-install < /dev/null >&2")
|
2020-01-28 07:54:05 +00:00
|
|
|
|
|
|
|
with subtest("Do it again to make sure it's idempotent"):
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.succeed("nixos-install < /dev/null >&2")
|
2020-01-28 07:54:05 +00:00
|
|
|
|
2023-01-01 16:20:37 +00:00
|
|
|
with subtest("Check that we can build things in nixos-enter"):
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.succeed(
|
2023-01-01 16:20:37 +00:00
|
|
|
"""
|
|
|
|
nixos-enter -- nix-build --option substitute false -E 'derivation {
|
|
|
|
name = "t";
|
|
|
|
builder = "/bin/sh";
|
|
|
|
args = ["-c" "echo nixos-enter build > $out"];
|
|
|
|
system = builtins.currentSystem;
|
|
|
|
preferLocalBuild = true;
|
|
|
|
}'
|
|
|
|
"""
|
|
|
|
)
|
|
|
|
|
2023-10-23 18:20:10 +00:00
|
|
|
${postInstallCommands}
|
|
|
|
|
2020-01-28 07:54:05 +00:00
|
|
|
with subtest("Shutdown system after installation"):
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.succeed("umount -R /mnt")
|
|
|
|
installer.succeed("sync")
|
|
|
|
installer.shutdown()
|
2010-01-06 15:14:26 +00:00
|
|
|
|
2024-04-01 18:21:32 +00:00
|
|
|
# We're actually the same machine, just booting differently this time.
|
|
|
|
target.state_dir = installer.state_dir
|
2011-09-14 18:20:50 +00:00
|
|
|
|
2024-04-01 18:21:32 +00:00
|
|
|
# Now see if we can boot the installation.
|
|
|
|
${startTarget}
|
2015-05-21 10:40:07 +00:00
|
|
|
|
2020-01-28 07:54:05 +00:00
|
|
|
with subtest("Assert that /boot get mounted"):
|
2024-04-01 18:21:32 +00:00
|
|
|
target.wait_for_unit("local-fs.target")
|
2020-01-28 07:54:05 +00:00
|
|
|
${if bootLoader == "grub"
|
2024-04-01 18:21:32 +00:00
|
|
|
then ''target.succeed("test -e /boot/grub")''
|
|
|
|
else ''target.succeed("test -e /boot/loader/loader.conf")''
|
2020-01-28 07:54:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
with subtest("Check whether /root has correct permissions"):
|
2024-04-01 18:21:32 +00:00
|
|
|
assert "700" in target.succeed("stat -c '%a' /root")
|
2020-01-28 07:54:05 +00:00
|
|
|
|
|
|
|
with subtest("Assert swap device got activated"):
|
|
|
|
# uncomment once https://bugs.freedesktop.org/show_bug.cgi?id=86930 is resolved
|
2024-04-01 18:21:32 +00:00
|
|
|
target.wait_for_unit("swap.target")
|
|
|
|
target.succeed("cat /proc/swaps | grep -q /dev")
|
2020-01-28 07:54:05 +00:00
|
|
|
|
|
|
|
with subtest("Check that the store is in good shape"):
|
2024-04-01 18:21:32 +00:00
|
|
|
target.succeed("nix-store --verify --check-contents >&2")
|
2020-01-28 07:54:05 +00:00
|
|
|
|
|
|
|
with subtest("Check whether the channel works"):
|
2024-04-01 18:21:32 +00:00
|
|
|
target.succeed("nix-env -iA nixos.procps >&2")
|
|
|
|
assert ".nix-profile" in target.succeed("type -tP ps | tee /dev/stderr")
|
2020-01-28 07:54:05 +00:00
|
|
|
|
|
|
|
with subtest(
|
|
|
|
"Check that the daemon works, and that non-root users can run builds "
|
|
|
|
"(this will build a new profile generation through the daemon)"
|
|
|
|
):
|
2024-04-01 18:21:32 +00:00
|
|
|
target.succeed("su alice -l -c 'nix-env -iA nixos.procps' >&2")
|
2020-01-28 07:54:05 +00:00
|
|
|
|
|
|
|
with subtest("Configure system with writable Nix store on next boot"):
|
|
|
|
# we're not using copy_from_host here because the installer image
|
|
|
|
# doesn't know about the host-guest sharing mechanism.
|
2024-04-01 18:21:32 +00:00
|
|
|
target.copy_from_host_via_shell(
|
2020-01-28 07:54:05 +00:00
|
|
|
"${ makeConfig {
|
2022-04-04 16:22:03 +00:00
|
|
|
inherit bootLoader grubDevice grubIdentifier
|
2023-11-18 19:38:08 +00:00
|
|
|
grubUseEfi extraConfig clevisTest;
|
2020-01-28 07:54:05 +00:00
|
|
|
forceGrubReinstallCount = 1;
|
|
|
|
}
|
|
|
|
}",
|
|
|
|
"/etc/nixos/configuration.nix",
|
|
|
|
)
|
|
|
|
|
|
|
|
with subtest("Check whether nixos-rebuild works"):
|
2024-04-01 18:21:32 +00:00
|
|
|
target.succeed("nixos-rebuild switch >&2")
|
2020-01-28 07:54:05 +00:00
|
|
|
|
2024-05-14 06:34:03 +00:00
|
|
|
with subtest("Test nixos-option"):
|
|
|
|
kernel_modules = target.succeed("nixos-option boot.initrd.kernelModules")
|
|
|
|
assert "virtio_console" in kernel_modules
|
|
|
|
assert "List of modules" in kernel_modules
|
|
|
|
assert "qemu-guest.nix" in kernel_modules
|
2020-01-28 07:54:05 +00:00
|
|
|
|
2024-04-01 18:21:32 +00:00
|
|
|
target.shutdown()
|
2010-01-06 22:53:27 +00:00
|
|
|
|
2014-09-04 17:30:25 +00:00
|
|
|
# Check whether a writable store build works
|
2024-04-01 18:21:32 +00:00
|
|
|
${startTarget}
|
2020-01-28 07:54:05 +00:00
|
|
|
|
|
|
|
# we're not using copy_from_host here because the installer image
|
|
|
|
# doesn't know about the host-guest sharing mechanism.
|
2024-04-01 18:21:32 +00:00
|
|
|
target.copy_from_host_via_shell(
|
2020-01-28 07:54:05 +00:00
|
|
|
"${ makeConfig {
|
2022-04-04 16:22:03 +00:00
|
|
|
inherit bootLoader grubDevice grubIdentifier
|
2023-11-18 19:38:08 +00:00
|
|
|
grubUseEfi extraConfig clevisTest;
|
2020-01-28 07:54:05 +00:00
|
|
|
forceGrubReinstallCount = 2;
|
|
|
|
}
|
|
|
|
}",
|
|
|
|
"/etc/nixos/configuration.nix",
|
|
|
|
)
|
2024-04-01 18:21:32 +00:00
|
|
|
target.succeed("nixos-rebuild boot >&2")
|
|
|
|
target.shutdown()
|
2014-09-04 17:30:25 +00:00
|
|
|
|
2024-04-01 18:21:32 +00:00
|
|
|
# And just to be sure, check that the target still boots after "nixos-rebuild switch".
|
|
|
|
${startTarget}
|
|
|
|
target.wait_for_unit("network.target")
|
2023-07-07 14:41:40 +00:00
|
|
|
|
|
|
|
# Sanity check, is it the configuration.nix we generated?
|
2024-04-01 18:21:32 +00:00
|
|
|
hostname = target.succeed("hostname").strip()
|
2023-07-07 14:41:40 +00:00
|
|
|
assert hostname == "thatworked"
|
|
|
|
|
2024-04-01 18:21:32 +00:00
|
|
|
target.shutdown()
|
2019-03-07 09:38:28 +00:00
|
|
|
|
|
|
|
# Tests for validating clone configuration entries in grub menu
|
2020-01-28 07:54:05 +00:00
|
|
|
''
|
2020-03-05 22:07:20 +00:00
|
|
|
+ optionalString testSpecialisationConfig ''
|
2024-04-01 18:21:32 +00:00
|
|
|
# Reboot target
|
|
|
|
${startTarget}
|
2019-03-07 09:38:28 +00:00
|
|
|
|
2020-01-28 07:54:05 +00:00
|
|
|
with subtest("Booted configuration name should be 'Home'"):
|
|
|
|
# This is not the name that shows in the grub menu.
|
|
|
|
# The default configuration is always shown as "Default"
|
2024-04-01 18:21:32 +00:00
|
|
|
target.succeed("cat /run/booted-system/configuration-name >&2")
|
|
|
|
assert "Home" in target.succeed("cat /run/booted-system/configuration-name")
|
2019-03-07 09:38:28 +00:00
|
|
|
|
2020-01-28 07:54:05 +00:00
|
|
|
with subtest("We should **not** find a file named /etc/gitconfig"):
|
2024-04-01 18:21:32 +00:00
|
|
|
target.fail("test -e /etc/gitconfig")
|
2019-03-07 09:38:28 +00:00
|
|
|
|
2020-01-28 07:54:05 +00:00
|
|
|
with subtest("Set grub to boot the second configuration"):
|
2024-04-01 18:21:32 +00:00
|
|
|
target.succeed("grub-reboot 1")
|
2019-03-07 09:38:28 +00:00
|
|
|
|
2024-04-01 18:21:32 +00:00
|
|
|
target.shutdown()
|
2019-03-07 09:38:28 +00:00
|
|
|
|
2024-04-01 18:21:32 +00:00
|
|
|
# Reboot target
|
|
|
|
${startTarget}
|
2019-03-07 09:38:28 +00:00
|
|
|
|
2020-01-28 07:54:05 +00:00
|
|
|
with subtest("Booted configuration name should be Work"):
|
2024-04-01 18:21:32 +00:00
|
|
|
target.succeed("cat /run/booted-system/configuration-name >&2")
|
|
|
|
assert "Work" in target.succeed("cat /run/booted-system/configuration-name")
|
2019-03-07 09:38:28 +00:00
|
|
|
|
2020-01-28 07:54:05 +00:00
|
|
|
with subtest("We should find a file named /etc/gitconfig"):
|
2024-04-01 18:21:32 +00:00
|
|
|
target.succeed("test -e /etc/gitconfig")
|
2019-03-07 09:38:28 +00:00
|
|
|
|
2024-04-01 18:21:32 +00:00
|
|
|
target.shutdown()
|
2023-07-07 16:53:19 +00:00
|
|
|
''
|
2024-07-10 15:49:55 +00:00
|
|
|
+ optionalString testByAttrSwitch ''
|
|
|
|
with subtest("Configure system with attribute set"):
|
|
|
|
target.succeed("""
|
|
|
|
mkdir /root/my-config
|
|
|
|
mv /etc/nixos/hardware-configuration.nix /root/my-config/
|
|
|
|
rm /etc/nixos/configuration.nix
|
|
|
|
""")
|
|
|
|
target.copy_from_host_via_shell(
|
|
|
|
"${makeConfig {
|
|
|
|
inherit bootLoader grubDevice grubIdentifier grubUseEfi extraConfig clevisTest;
|
|
|
|
forceGrubReinstallCount = 1;
|
|
|
|
withTestInstrumentation = false;
|
|
|
|
}}",
|
|
|
|
"/root/my-config/configuration.nix",
|
|
|
|
)
|
|
|
|
target.copy_from_host_via_shell(
|
|
|
|
"${./installer/byAttrWithChannel.nix}",
|
|
|
|
"/root/my-config/default.nix",
|
|
|
|
)
|
|
|
|
with subtest("Switch to attribute set based config with channels"):
|
|
|
|
target.succeed("nixos-rebuild switch --file /root/my-config/default.nix")
|
|
|
|
|
|
|
|
target.shutdown()
|
|
|
|
|
|
|
|
${startTarget}
|
|
|
|
|
|
|
|
target.succeed("""
|
|
|
|
rm /root/my-config/default.nix
|
|
|
|
""")
|
|
|
|
target.copy_from_host_via_shell(
|
|
|
|
"${./installer/byAttrNoChannel.nix}",
|
|
|
|
"/root/my-config/default.nix",
|
|
|
|
)
|
|
|
|
|
|
|
|
target.succeed("""
|
|
|
|
pkgs=$(readlink -f /nix/var/nix/profiles/per-user/root/channels)/nixos
|
|
|
|
if ! [[ -e $pkgs/pkgs/top-level/default.nix ]]; then
|
|
|
|
echo 1>&2 "$pkgs does not seem to be a nixpkgs source. Please fix the test so that pkgs points to a nixpkgs source.";
|
|
|
|
exit 1;
|
|
|
|
fi
|
|
|
|
sed -e s^@nixpkgs@^$pkgs^ -i /root/my-config/default.nix
|
|
|
|
|
|
|
|
""")
|
|
|
|
|
|
|
|
with subtest("Switch to attribute set based config without channels"):
|
|
|
|
target.succeed("nixos-rebuild switch --file /root/my-config/default.nix")
|
|
|
|
|
|
|
|
target.shutdown()
|
|
|
|
|
|
|
|
${startTarget}
|
|
|
|
|
|
|
|
with subtest("nix-channel command is not available anymore"):
|
|
|
|
target.succeed("! which nix-channel")
|
|
|
|
|
|
|
|
with subtest("builtins.nixPath is now empty"):
|
|
|
|
target.succeed("""
|
|
|
|
[[ "[ ]" == "$(nix-instantiate builtins.nixPath --eval --expr)" ]]
|
|
|
|
""")
|
|
|
|
|
|
|
|
with subtest("<nixpkgs> does not resolve"):
|
|
|
|
target.succeed("""
|
|
|
|
! nix-instantiate '<nixpkgs>' --eval --expr
|
|
|
|
""")
|
|
|
|
|
|
|
|
with subtest("Evaluate attribute set based config in fresh env without nix-channel"):
|
|
|
|
target.succeed("nixos-rebuild switch --file /root/my-config/default.nix")
|
|
|
|
|
|
|
|
with subtest("Evaluate attribute set based config in fresh env without channel profiles"):
|
|
|
|
target.succeed("""
|
|
|
|
(
|
|
|
|
exec 1>&2
|
|
|
|
mkdir -p /root/restore
|
|
|
|
mv -v /root/.nix-channels /root/restore/
|
|
|
|
mv -v ~/.nix-defexpr /root/restore/
|
|
|
|
mkdir -p /root/restore/channels
|
|
|
|
mv -v /nix/var/nix/profiles/per-user/root/channels* /root/restore/channels/
|
|
|
|
)
|
|
|
|
""")
|
|
|
|
target.succeed("nixos-rebuild switch --file /root/my-config/default.nix")
|
|
|
|
''
|
|
|
|
+ optionalString (testByAttrSwitch && testFlakeSwitch) ''
|
|
|
|
with subtest("Restore channel profiles"):
|
|
|
|
target.succeed("""
|
|
|
|
(
|
|
|
|
exec 1>&2
|
|
|
|
mv -v /root/restore/.nix-channels /root/
|
|
|
|
mv -v /root/restore/.nix-defexpr ~/.nix-defexpr
|
|
|
|
mv -v /root/restore/channels/* /nix/var/nix/profiles/per-user/root/
|
|
|
|
rm -vrf /root/restore
|
|
|
|
)
|
|
|
|
""")
|
|
|
|
|
|
|
|
with subtest("Restore /etc/nixos"):
|
|
|
|
target.succeed("""
|
|
|
|
mv -v /root/my-config/hardware-configuration.nix /etc/nixos/
|
|
|
|
""")
|
|
|
|
target.copy_from_host_via_shell(
|
|
|
|
"${makeConfig {
|
|
|
|
inherit bootLoader grubDevice grubIdentifier grubUseEfi extraConfig clevisTest;
|
|
|
|
forceGrubReinstallCount = 1;
|
|
|
|
}}",
|
|
|
|
"/etc/nixos/configuration.nix",
|
|
|
|
)
|
|
|
|
|
|
|
|
with subtest("Restore /root/my-config"):
|
|
|
|
target.succeed("""
|
|
|
|
rm -vrf /root/my-config
|
|
|
|
""")
|
|
|
|
|
|
|
|
''
|
|
|
|
+ optionalString (testByAttrSwitch && !testFlakeSwitch) ''
|
|
|
|
target.shutdown()
|
|
|
|
''
|
2023-07-07 16:53:19 +00:00
|
|
|
+ optionalString testFlakeSwitch ''
|
2024-04-01 18:21:32 +00:00
|
|
|
${startTarget}
|
2023-07-07 16:53:19 +00:00
|
|
|
|
|
|
|
with subtest("Configure system with flake"):
|
|
|
|
# TODO: evaluate as user?
|
2024-04-01 18:21:32 +00:00
|
|
|
target.succeed("""
|
2023-07-07 16:53:19 +00:00
|
|
|
mkdir /root/my-config
|
|
|
|
mv /etc/nixos/hardware-configuration.nix /root/my-config/
|
|
|
|
rm /etc/nixos/configuration.nix
|
|
|
|
""")
|
2024-04-01 18:21:32 +00:00
|
|
|
target.copy_from_host_via_shell(
|
2023-07-08 18:49:37 +00:00
|
|
|
"${makeConfig {
|
2023-11-18 19:38:08 +00:00
|
|
|
inherit bootLoader grubDevice grubIdentifier grubUseEfi extraConfig clevisTest;
|
2023-07-08 18:49:37 +00:00
|
|
|
forceGrubReinstallCount = 1;
|
2024-07-10 13:06:52 +00:00
|
|
|
withTestInstrumentation = false;
|
2023-07-08 18:49:37 +00:00
|
|
|
}}",
|
2023-07-07 16:53:19 +00:00
|
|
|
"/root/my-config/configuration.nix",
|
|
|
|
)
|
2024-04-01 18:21:32 +00:00
|
|
|
target.copy_from_host_via_shell(
|
2023-07-07 16:53:19 +00:00
|
|
|
"${./installer/flake.nix}",
|
|
|
|
"/root/my-config/flake.nix",
|
|
|
|
)
|
2024-04-01 18:21:32 +00:00
|
|
|
target.succeed("""
|
2023-07-07 16:53:19 +00:00
|
|
|
# for some reason the image does not have `pkgs.path`, so
|
|
|
|
# we use readlink to find a Nixpkgs source.
|
|
|
|
pkgs=$(readlink -f /nix/var/nix/profiles/per-user/root/channels)/nixos
|
|
|
|
if ! [[ -e $pkgs/pkgs/top-level/default.nix ]]; then
|
|
|
|
echo 1>&2 "$pkgs does not seem to be a nixpkgs source. Please fix the test so that pkgs points to a nixpkgs source.";
|
|
|
|
exit 1;
|
|
|
|
fi
|
|
|
|
sed -e s^@nixpkgs@^$pkgs^ -i /root/my-config/flake.nix
|
|
|
|
""")
|
|
|
|
|
|
|
|
with subtest("Switch to flake based config"):
|
2024-07-16 19:34:09 +00:00
|
|
|
target.succeed("nixos-rebuild switch --flake /root/my-config#xyz 2>&1 | tee activation-log >&2")
|
|
|
|
|
|
|
|
target.succeed("""
|
|
|
|
cat -n activation-log >&2
|
|
|
|
""")
|
|
|
|
|
|
|
|
target.succeed("""
|
|
|
|
grep -F '/root/.nix-defexpr/channels exists, but channels have been disabled.' activation-log
|
|
|
|
""")
|
|
|
|
target.succeed("""
|
|
|
|
grep -F '/nix/var/nix/profiles/per-user/root/channels exists, but channels have been disabled.' activation-log
|
|
|
|
""")
|
|
|
|
target.succeed("""
|
|
|
|
grep -F '/root/.nix-defexpr/channels exists, but channels have been disabled.' activation-log
|
|
|
|
""")
|
|
|
|
target.succeed("""
|
|
|
|
grep -F 'Due to https://github.com/NixOS/nix/issues/9574, Nix may still use these channels when NIX_PATH is unset.' activation-log
|
|
|
|
""")
|
|
|
|
target.succeed("rm activation-log")
|
|
|
|
|
|
|
|
# Perform the suggested cleanups we've just seen in the log
|
|
|
|
# TODO after https://github.com/NixOS/nix/issues/9574: don't remove them yet
|
|
|
|
target.succeed("""
|
|
|
|
rm -rf /root/.nix-defexpr/channels /nix/var/nix/profiles/per-user/root/channels /root/.nix-defexpr/channels
|
|
|
|
""")
|
|
|
|
|
2023-07-07 16:53:19 +00:00
|
|
|
|
2024-04-01 18:21:32 +00:00
|
|
|
target.shutdown()
|
2023-07-07 16:53:19 +00:00
|
|
|
|
2024-04-01 18:21:32 +00:00
|
|
|
${startTarget}
|
2023-07-07 16:53:19 +00:00
|
|
|
|
|
|
|
with subtest("nix-channel command is not available anymore"):
|
2024-04-01 18:21:32 +00:00
|
|
|
target.succeed("! which nix-channel")
|
2023-07-07 16:53:19 +00:00
|
|
|
|
2023-07-07 21:12:39 +00:00
|
|
|
# Note that the channel profile is still present on disk, but configured
|
|
|
|
# not to be used.
|
2024-07-16 19:34:09 +00:00
|
|
|
# TODO after issue https://github.com/NixOS/nix/issues/9574: re-enable this assertion
|
|
|
|
# I believe what happens is
|
|
|
|
# - because of the issue, we've removed the `nix-path =` line from nix.conf
|
|
|
|
# - the "backdoor" shell is not a proper session and does not have `NIX_PATH=""` set
|
|
|
|
# - seeing no nix path settings at all, Nix loads its hardcoded default value,
|
|
|
|
# which is unfortunately non-empty
|
2024-07-16 19:44:34 +00:00
|
|
|
# Or maybe it's the new default NIX_PATH?? :(
|
2024-07-16 19:34:09 +00:00
|
|
|
# with subtest("builtins.nixPath is now empty"):
|
|
|
|
# target.succeed("""
|
|
|
|
# (
|
|
|
|
# set -x;
|
|
|
|
# [[ "[ ]" == "$(nix-instantiate builtins.nixPath --eval --expr)" ]];
|
|
|
|
# )
|
|
|
|
# """)
|
2023-07-07 21:12:39 +00:00
|
|
|
|
|
|
|
with subtest("<nixpkgs> does not resolve"):
|
2024-04-01 18:21:32 +00:00
|
|
|
target.succeed("""
|
2023-07-07 21:12:39 +00:00
|
|
|
! nix-instantiate '<nixpkgs>' --eval --expr
|
|
|
|
""")
|
|
|
|
|
2023-07-07 16:53:19 +00:00
|
|
|
with subtest("Evaluate flake config in fresh env without nix-channel"):
|
2024-04-01 18:21:32 +00:00
|
|
|
target.succeed("nixos-rebuild switch --flake /root/my-config#xyz")
|
2023-07-07 16:53:19 +00:00
|
|
|
|
|
|
|
with subtest("Evaluate flake config in fresh env without channel profiles"):
|
2024-04-01 18:21:32 +00:00
|
|
|
target.succeed("""
|
2023-07-07 16:53:19 +00:00
|
|
|
(
|
|
|
|
exec 1>&2
|
2024-07-16 19:34:09 +00:00
|
|
|
rm -vf /root/.nix-channels
|
2023-07-07 16:53:19 +00:00
|
|
|
rm -vrf ~/.nix-defexpr
|
|
|
|
rm -vrf /nix/var/nix/profiles/per-user/root/channels*
|
|
|
|
)
|
|
|
|
""")
|
2024-07-16 19:34:09 +00:00
|
|
|
target.succeed("nixos-rebuild switch --flake /root/my-config#xyz | tee activation-log >&2")
|
|
|
|
target.succeed("cat -n activation-log >&2")
|
|
|
|
target.succeed("! grep -F '/root/.nix-defexpr/channels' activation-log")
|
|
|
|
target.succeed("! grep -F 'but channels have been disabled' activation-log")
|
|
|
|
target.succeed("! grep -F 'https://github.com/NixOS/nix/issues/9574' activation-log")
|
2023-07-07 16:53:19 +00:00
|
|
|
|
2024-04-01 18:21:32 +00:00
|
|
|
target.shutdown()
|
2010-01-06 15:14:26 +00:00
|
|
|
'';
|
2010-01-06 16:46:21 +00:00
|
|
|
|
2011-09-14 18:20:50 +00:00
|
|
|
|
2014-06-28 14:04:49 +00:00
|
|
|
makeInstallerTest = name:
|
2023-10-23 18:20:10 +00:00
|
|
|
{ createPartitions
|
2024-04-01 18:21:32 +00:00
|
|
|
, postInstallCommands ? "", postBootCommands ? ""
|
2023-10-23 18:20:10 +00:00
|
|
|
, extraConfig ? ""
|
2017-06-27 23:35:55 +00:00
|
|
|
, extraInstallerConfig ? {}
|
2016-06-01 10:51:33 +00:00
|
|
|
, bootLoader ? "grub" # either "grub" or "systemd-boot"
|
2022-04-04 16:22:03 +00:00
|
|
|
, grubDevice ? "/dev/vda", grubIdentifier ? "uuid", grubUseEfi ? false
|
2016-04-23 11:20:34 +00:00
|
|
|
, enableOCR ? false, meta ? {}
|
2020-03-05 22:07:20 +00:00
|
|
|
, testSpecialisationConfig ? false
|
2023-07-07 16:53:19 +00:00
|
|
|
, testFlakeSwitch ? false
|
2024-07-10 15:49:55 +00:00
|
|
|
, testByAttrSwitch ? false
|
2023-11-18 19:38:08 +00:00
|
|
|
, clevisTest ? false
|
|
|
|
, clevisFallbackTest ? false
|
2024-01-19 10:39:01 +00:00
|
|
|
, disableFileSystems ? false
|
2015-05-21 10:37:14 +00:00
|
|
|
}:
|
2024-04-01 18:21:32 +00:00
|
|
|
let
|
|
|
|
isEfi = bootLoader == "systemd-boot" || (bootLoader == "grub" && grubUseEfi);
|
|
|
|
in makeTest {
|
2015-05-22 05:14:00 +00:00
|
|
|
inherit enableOCR;
|
2015-06-10 11:14:40 +00:00
|
|
|
name = "installer-" + name;
|
2023-06-19 16:31:06 +00:00
|
|
|
meta = {
|
2015-07-12 10:09:40 +00:00
|
|
|
# put global maintainers here, individuals go into makeInstallerTest fkt call
|
2019-01-26 10:01:09 +00:00
|
|
|
maintainers = (meta.maintainers or []);
|
2024-04-01 18:21:32 +00:00
|
|
|
# non-EFI tests can only run on x86
|
|
|
|
platforms = if isEfi then platforms.linux else [ "x86_64-linux" "i686-linux" ];
|
2015-07-12 10:09:40 +00:00
|
|
|
};
|
2024-04-01 18:21:32 +00:00
|
|
|
nodes = let
|
|
|
|
commonConfig = {
|
|
|
|
# builds stuff in the VM, needs more juice
|
|
|
|
virtualisation.diskSize = 8 * 1024;
|
|
|
|
virtualisation.cores = 8;
|
|
|
|
virtualisation.memorySize = 2048;
|
|
|
|
|
|
|
|
# both installer and target need to use the same drive
|
|
|
|
virtualisation.diskImage = "./target.qcow2";
|
2015-06-10 11:14:40 +00:00
|
|
|
|
2024-04-01 18:21:32 +00:00
|
|
|
# and the same TPM options
|
|
|
|
virtualisation.qemu.options = mkIf (clevisTest) [
|
|
|
|
"-chardev socket,id=chrtpm,path=$NIX_BUILD_TOP/swtpm-sock"
|
|
|
|
"-tpmdev emulator,id=tpm0,chardev=chrtpm"
|
|
|
|
"-device tpm-tis,tpmdev=tpm0"
|
|
|
|
];
|
|
|
|
};
|
|
|
|
in {
|
|
|
|
# The configuration of the system used to run "nixos-install".
|
|
|
|
installer = {
|
2020-01-28 07:54:05 +00:00
|
|
|
imports = [
|
2024-04-01 18:21:32 +00:00
|
|
|
commonConfig
|
2020-01-28 07:54:05 +00:00
|
|
|
../modules/profiles/installation-device.nix
|
|
|
|
../modules/profiles/base.nix
|
|
|
|
extraInstallerConfig
|
nixos/qemu-vm: use persistent block device names
This change removes the bespoke logic around identifying block devices.
Instead of trying to find the right device by iterating over
`qemu.drives` and guessing the right partition number (e.g.
/dev/vda{1,2}), devices are now identified by persistent names provided
by udev in /dev/disk/by-*.
Before this change, the root device was formatted on demand in the
initrd. However, this makes it impossible to use filesystem identifiers
to identify devices. Now, the formatting step is performed before the VM
is started. Because some tests, however, rely on this behaviour, a
utility function to replace this behaviour in added in
/nixos/tests/common/auto-format-root-device.nix.
Devices that contain neither a partition table nor a filesystem are
identified by their hardware serial number which is injecetd via QEMU
(and is thus persistent and predictable). PCI paths are not a reliably
way to identify devices because their availability and numbering depends
on the QEMU machine type.
This change makes the module more robust against changes in QEMU and the
kernel (non-persistent device naming) and by decoupling abstractions
(i.e. rootDevice, bootPartition, and bootLoaderDevice) enables further
improvement down the line.
2023-06-08 00:34:10 +00:00
|
|
|
./common/auto-format-root-device.nix
|
2020-01-28 07:54:05 +00:00
|
|
|
];
|
|
|
|
|
nixos/qemu-vm: use persistent block device names
This change removes the bespoke logic around identifying block devices.
Instead of trying to find the right device by iterating over
`qemu.drives` and guessing the right partition number (e.g.
/dev/vda{1,2}), devices are now identified by persistent names provided
by udev in /dev/disk/by-*.
Before this change, the root device was formatted on demand in the
initrd. However, this makes it impossible to use filesystem identifiers
to identify devices. Now, the formatting step is performed before the VM
is started. Because some tests, however, rely on this behaviour, a
utility function to replace this behaviour in added in
/nixos/tests/common/auto-format-root-device.nix.
Devices that contain neither a partition table nor a filesystem are
identified by their hardware serial number which is injecetd via QEMU
(and is thus persistent and predictable). PCI paths are not a reliably
way to identify devices because their availability and numbering depends
on the QEMU machine type.
This change makes the module more robust against changes in QEMU and the
kernel (non-persistent device naming) and by decoupling abstractions
(i.e. rootDevice, bootPartition, and bootLoaderDevice) enables further
improvement down the line.
2023-06-08 00:34:10 +00:00
|
|
|
# In systemdStage1, also automatically format the device backing the
|
|
|
|
# root filesystem.
|
|
|
|
virtualisation.fileSystems."/".autoFormat = systemdStage1;
|
|
|
|
|
2022-04-17 21:24:13 +00:00
|
|
|
boot.initrd.systemd.enable = systemdStage1;
|
|
|
|
|
2020-01-28 07:54:05 +00:00
|
|
|
# Use a small /dev/vdb as the root disk for the
|
|
|
|
# installer. This ensures the target disk (/dev/vda) is
|
|
|
|
# the same during and after installation.
|
|
|
|
virtualisation.emptyDiskImages = [ 512 ];
|
2022-04-04 16:22:03 +00:00
|
|
|
virtualisation.rootDevice = "/dev/vdb";
|
2020-01-28 07:54:05 +00:00
|
|
|
|
|
|
|
hardware.enableAllFirmware = mkForce false;
|
|
|
|
|
|
|
|
# The test cannot access the network, so any packages we
|
|
|
|
# need must be included in the VM.
|
|
|
|
system.extraDependencies = with pkgs; [
|
2023-07-21 07:36:29 +00:00
|
|
|
bintools
|
2022-01-22 20:44:44 +00:00
|
|
|
brotli
|
|
|
|
brotli.dev
|
|
|
|
brotli.lib
|
2020-01-28 07:54:05 +00:00
|
|
|
desktop-file-utils
|
|
|
|
docbook5
|
|
|
|
docbook_xsl_ns
|
2023-05-04 06:29:04 +00:00
|
|
|
kbd.dev
|
2022-04-05 16:54:45 +00:00
|
|
|
kmod.dev
|
2022-04-22 18:03:46 +00:00
|
|
|
libarchive.dev
|
2020-01-28 07:54:05 +00:00
|
|
|
libxml2.bin
|
|
|
|
libxslt.bin
|
|
|
|
nixos-artwork.wallpapers.simple-dark-gray-bottom
|
|
|
|
ntp
|
2024-09-06 10:39:31 +00:00
|
|
|
perlPackages.ConfigIniFiles
|
|
|
|
perlPackages.FileSlurp
|
|
|
|
perlPackages.JSON
|
2020-01-28 07:54:05 +00:00
|
|
|
perlPackages.ListCompare
|
|
|
|
perlPackages.XMLLibXML
|
2022-09-18 11:59:14 +00:00
|
|
|
# make-options-doc/default.nix
|
2024-01-12 14:22:49 +00:00
|
|
|
(python3.withPackages (p: [ p.mistune ]))
|
2020-01-28 07:54:05 +00:00
|
|
|
shared-mime-info
|
|
|
|
sudo
|
2024-09-08 05:27:28 +00:00
|
|
|
switch-to-configuration-ng
|
2020-01-28 07:54:05 +00:00
|
|
|
texinfo
|
|
|
|
unionfs-fuse
|
|
|
|
xorg.lndir
|
|
|
|
|
|
|
|
# add curl so that rather than seeing the test attempt to download
|
|
|
|
# curl's tarball, we see what it's trying to download
|
|
|
|
curl
|
|
|
|
]
|
2022-04-04 16:22:03 +00:00
|
|
|
++ optionals (bootLoader == "grub") (let
|
2024-02-18 22:35:17 +00:00
|
|
|
zfsSupport = extraInstallerConfig.boot.supportedFilesystems.zfs or false;
|
2021-02-13 03:33:46 +00:00
|
|
|
in [
|
|
|
|
(pkgs.grub2.override { inherit zfsSupport; })
|
|
|
|
(pkgs.grub2_efi.override { inherit zfsSupport; })
|
2024-09-08 05:27:28 +00:00
|
|
|
pkgs.nixos-artwork.wallpapers.simple-dark-gray-bootloader
|
|
|
|
pkgs.perlPackages.FileCopyRecursive
|
|
|
|
pkgs.perlPackages.XMLSAX
|
|
|
|
pkgs.perlPackages.XMLSAXBase
|
2024-04-01 18:21:32 +00:00
|
|
|
])
|
|
|
|
++ optionals (bootLoader == "systemd-boot") [
|
|
|
|
pkgs.zstd.bin
|
|
|
|
pkgs.mypy
|
|
|
|
pkgs.bootspec
|
|
|
|
]
|
|
|
|
++ optionals clevisTest [ pkgs.klibc ];
|
2020-01-28 07:54:05 +00:00
|
|
|
|
2021-11-19 22:36:26 +00:00
|
|
|
nix.settings = {
|
|
|
|
substituters = mkForce [];
|
|
|
|
hashed-mirrors = null;
|
|
|
|
connect-timeout = 1;
|
|
|
|
};
|
2020-01-28 07:54:05 +00:00
|
|
|
};
|
2015-06-10 11:14:40 +00:00
|
|
|
|
2024-04-01 18:21:32 +00:00
|
|
|
target = {
|
|
|
|
imports = [ commonConfig ];
|
|
|
|
virtualisation.useBootLoader = true;
|
|
|
|
virtualisation.useEFIBoot = isEfi;
|
|
|
|
virtualisation.useDefaultFilesystems = false;
|
2024-04-05 05:56:21 +00:00
|
|
|
virtualisation.efi.keepVariables = false;
|
2024-04-01 18:21:32 +00:00
|
|
|
|
|
|
|
virtualisation.fileSystems."/" = {
|
|
|
|
device = "/dev/disk/by-label/this-is-not-real-and-will-never-be-used";
|
|
|
|
fsType = "ext4";
|
|
|
|
};
|
|
|
|
};
|
2023-11-18 19:38:08 +00:00
|
|
|
} // optionalAttrs clevisTest {
|
|
|
|
tang = {
|
|
|
|
services.tang = {
|
|
|
|
enable = true;
|
|
|
|
listenStream = [ "80" ];
|
|
|
|
ipAddressAllow = [ "192.168.1.0/24" ];
|
|
|
|
};
|
|
|
|
networking.firewall.allowedTCPPorts = [ 80 ];
|
|
|
|
};
|
2015-06-10 11:14:40 +00:00
|
|
|
};
|
|
|
|
|
2010-01-10 01:26:01 +00:00
|
|
|
testScript = testScriptFun {
|
2024-04-01 18:21:32 +00:00
|
|
|
inherit bootLoader createPartitions postInstallCommands postBootCommands
|
2022-04-04 16:22:03 +00:00
|
|
|
grubDevice grubIdentifier grubUseEfi extraConfig
|
2024-07-10 15:49:55 +00:00
|
|
|
testSpecialisationConfig testFlakeSwitch testByAttrSwitch clevisTest clevisFallbackTest
|
2024-01-19 10:39:01 +00:00
|
|
|
disableFileSystems;
|
2010-01-10 01:26:01 +00:00
|
|
|
};
|
2014-04-14 14:24:08 +00:00
|
|
|
};
|
2011-09-14 18:20:50 +00:00
|
|
|
|
2020-01-28 07:54:05 +00:00
|
|
|
makeLuksRootTest = name: luksFormatOpts: makeInstallerTest name {
|
|
|
|
createPartitions = ''
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.succeed(
|
2019-03-01 22:47:19 +00:00
|
|
|
"flock /dev/vda parted --script /dev/vda -- mklabel msdos"
|
2021-11-30 01:53:14 +00:00
|
|
|
+ " mkpart primary ext2 1M 100MB" # /boot
|
|
|
|
+ " mkpart primary linux-swap 100M 1024M"
|
2020-01-28 07:54:05 +00:00
|
|
|
+ " mkpart primary 1024M -1s", # LUKS
|
2019-03-01 22:47:19 +00:00
|
|
|
"udevadm settle",
|
|
|
|
"mkswap /dev/vda2 -L swap",
|
|
|
|
"swapon -L swap",
|
|
|
|
"modprobe dm_mod dm_crypt",
|
|
|
|
"echo -n supersecret | cryptsetup luksFormat ${luksFormatOpts} -q /dev/vda3 -",
|
|
|
|
"echo -n supersecret | cryptsetup luksOpen --key-file - /dev/vda3 cryptroot",
|
|
|
|
"mkfs.ext3 -L nixos /dev/mapper/cryptroot",
|
|
|
|
"mount LABEL=nixos /mnt",
|
|
|
|
"mkfs.ext3 -L boot /dev/vda1",
|
|
|
|
"mkdir -p /mnt/boot",
|
|
|
|
"mount LABEL=boot /mnt/boot",
|
2020-01-28 07:54:05 +00:00
|
|
|
)
|
|
|
|
'';
|
|
|
|
extraConfig = ''
|
|
|
|
boot.kernelParams = lib.mkAfter [ "console=tty0" ];
|
|
|
|
'';
|
|
|
|
enableOCR = true;
|
2024-04-01 18:21:32 +00:00
|
|
|
postBootCommands = ''
|
|
|
|
target.wait_for_text("[Pp]assphrase for")
|
|
|
|
target.send_chars("supersecret\n")
|
2020-01-28 07:54:05 +00:00
|
|
|
'';
|
|
|
|
};
|
2019-03-01 22:47:19 +00:00
|
|
|
|
2019-03-07 09:30:11 +00:00
|
|
|
# The (almost) simplest partitioning scheme: a swap partition and
|
|
|
|
# one big filesystem partition.
|
2020-01-28 07:54:05 +00:00
|
|
|
simple-test-config = {
|
|
|
|
createPartitions = ''
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.succeed(
|
2020-01-28 07:54:05 +00:00
|
|
|
"flock /dev/vda parted --script /dev/vda -- mklabel msdos"
|
|
|
|
+ " mkpart primary linux-swap 1M 1024M"
|
|
|
|
+ " mkpart primary ext2 1024M -1s",
|
|
|
|
"udevadm settle",
|
|
|
|
"mkswap /dev/vda1 -L swap",
|
|
|
|
"swapon -L swap",
|
|
|
|
"mkfs.ext3 -L nixos /dev/vda2",
|
|
|
|
"mount LABEL=nixos /mnt",
|
|
|
|
)
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2023-07-07 16:53:19 +00:00
|
|
|
simple-test-config-flake = simple-test-config // {
|
|
|
|
testFlakeSwitch = true;
|
|
|
|
};
|
|
|
|
|
2024-07-10 15:49:55 +00:00
|
|
|
simple-test-config-by-attr = simple-test-config // {
|
|
|
|
testByAttrSwitch = true;
|
|
|
|
};
|
|
|
|
|
|
|
|
simple-test-config-from-by-attr-to-flake = simple-test-config // {
|
|
|
|
testByAttrSwitch = true;
|
|
|
|
testFlakeSwitch = true;
|
|
|
|
};
|
|
|
|
|
2020-01-28 07:54:05 +00:00
|
|
|
simple-uefi-grub-config = {
|
|
|
|
createPartitions = ''
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.succeed(
|
2020-01-28 07:54:05 +00:00
|
|
|
"flock /dev/vda parted --script /dev/vda -- mklabel gpt"
|
2021-02-18 09:58:25 +00:00
|
|
|
+ " mkpart ESP fat32 1M 100MiB" # /boot
|
2020-01-28 07:54:05 +00:00
|
|
|
+ " set 1 boot on"
|
2021-02-18 09:58:25 +00:00
|
|
|
+ " mkpart primary linux-swap 100MiB 1024MiB"
|
2020-01-28 07:54:05 +00:00
|
|
|
+ " mkpart primary ext2 1024MiB -1MiB", # /
|
|
|
|
"udevadm settle",
|
|
|
|
"mkswap /dev/vda2 -L swap",
|
|
|
|
"swapon -L swap",
|
|
|
|
"mkfs.ext3 -L nixos /dev/vda3",
|
|
|
|
"mount LABEL=nixos /mnt",
|
|
|
|
"mkfs.vfat -n BOOT /dev/vda1",
|
|
|
|
"mkdir -p /mnt/boot",
|
|
|
|
"mount LABEL=BOOT /mnt/boot",
|
|
|
|
)
|
|
|
|
'';
|
|
|
|
bootLoader = "grub";
|
|
|
|
grubUseEfi = true;
|
|
|
|
};
|
2019-03-07 09:38:28 +00:00
|
|
|
|
2020-03-05 22:07:20 +00:00
|
|
|
specialisation-test-extraconfig = {
|
2020-01-28 07:54:05 +00:00
|
|
|
extraConfig = ''
|
|
|
|
environment.systemPackages = [ pkgs.grub2 ];
|
|
|
|
boot.loader.grub.configurationName = "Home";
|
2020-03-05 22:07:20 +00:00
|
|
|
specialisation.work.configuration = {
|
2020-01-28 07:54:05 +00:00
|
|
|
boot.loader.grub.configurationName = lib.mkForce "Work";
|
|
|
|
|
|
|
|
environment.etc = {
|
|
|
|
"gitconfig".text = "
|
|
|
|
[core]
|
|
|
|
gitproxy = none for work.com
|
|
|
|
";
|
|
|
|
};
|
2020-03-05 22:07:20 +00:00
|
|
|
};
|
2020-01-28 07:54:05 +00:00
|
|
|
'';
|
2020-03-05 22:07:20 +00:00
|
|
|
testSpecialisationConfig = true;
|
2019-03-07 09:38:28 +00:00
|
|
|
};
|
2023-01-01 18:52:05 +00:00
|
|
|
# disable zfs so we can support latest kernel if needed
|
|
|
|
no-zfs-module = {
|
|
|
|
nixpkgs.overlays = [(final: super: {
|
|
|
|
zfs = super.zfs.overrideAttrs(_: {meta.platforms = [];});}
|
|
|
|
)];
|
|
|
|
};
|
2023-11-18 19:38:08 +00:00
|
|
|
|
|
|
|
mkClevisBcachefsTest = { fallback ? false }: makeInstallerTest "clevis-bcachefs${optionalString fallback "-fallback"}" {
|
|
|
|
clevisTest = true;
|
|
|
|
clevisFallbackTest = fallback;
|
|
|
|
enableOCR = fallback;
|
|
|
|
extraInstallerConfig = {
|
|
|
|
imports = [ no-zfs-module ];
|
|
|
|
boot.supportedFilesystems = [ "bcachefs" ];
|
|
|
|
environment.systemPackages = with pkgs; [ keyutils clevis ];
|
|
|
|
};
|
|
|
|
createPartitions = ''
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.succeed(
|
2023-11-18 19:38:08 +00:00
|
|
|
"flock /dev/vda parted --script /dev/vda -- mklabel msdos"
|
|
|
|
+ " mkpart primary ext2 1M 100MB"
|
|
|
|
+ " mkpart primary linux-swap 100M 1024M"
|
|
|
|
+ " mkpart primary 1024M -1s",
|
|
|
|
"udevadm settle",
|
|
|
|
"mkswap /dev/vda2 -L swap",
|
|
|
|
"swapon -L swap",
|
|
|
|
"keyctl link @u @s",
|
|
|
|
"echo -n password | mkfs.bcachefs -L root --encrypted /dev/vda3",
|
|
|
|
"echo -n password | bcachefs unlock /dev/vda3",
|
|
|
|
"echo -n password | mount -t bcachefs /dev/vda3 /mnt",
|
|
|
|
"mkfs.ext3 -L boot /dev/vda1",
|
|
|
|
"mkdir -p /mnt/boot",
|
|
|
|
"mount LABEL=boot /mnt/boot",
|
|
|
|
"udevadm settle")
|
|
|
|
'';
|
|
|
|
extraConfig = ''
|
|
|
|
boot.initrd.clevis.devices."/dev/vda3".secretFile = "/etc/nixos/clevis-secret.jwe";
|
|
|
|
|
|
|
|
# We override what nixos-generate-config has generated because we do
|
|
|
|
# not know the UUID in advance.
|
|
|
|
fileSystems."/" = lib.mkForce { device = "/dev/vda3"; fsType = "bcachefs"; };
|
|
|
|
'';
|
2024-04-01 18:21:32 +00:00
|
|
|
postBootCommands = optionalString fallback ''
|
|
|
|
target.wait_for_text("enter passphrase for")
|
|
|
|
target.send_chars("password\n")
|
2023-11-18 19:38:08 +00:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
mkClevisLuksTest = { fallback ? false }: makeInstallerTest "clevis-luks${optionalString fallback "-fallback"}" {
|
|
|
|
clevisTest = true;
|
|
|
|
clevisFallbackTest = fallback;
|
|
|
|
enableOCR = fallback;
|
|
|
|
extraInstallerConfig = {
|
|
|
|
environment.systemPackages = with pkgs; [ clevis ];
|
|
|
|
};
|
|
|
|
createPartitions = ''
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.succeed(
|
2023-11-18 19:38:08 +00:00
|
|
|
"flock /dev/vda parted --script /dev/vda -- mklabel msdos"
|
|
|
|
+ " mkpart primary ext2 1M 100MB"
|
|
|
|
+ " mkpart primary linux-swap 100M 1024M"
|
|
|
|
+ " mkpart primary 1024M -1s",
|
|
|
|
"udevadm settle",
|
|
|
|
"mkswap /dev/vda2 -L swap",
|
|
|
|
"swapon -L swap",
|
|
|
|
"modprobe dm_mod dm_crypt",
|
|
|
|
"echo -n password | cryptsetup luksFormat -q /dev/vda3 -",
|
|
|
|
"echo -n password | cryptsetup luksOpen --key-file - /dev/vda3 crypt-root",
|
|
|
|
"mkfs.ext3 -L nixos /dev/mapper/crypt-root",
|
|
|
|
"mount LABEL=nixos /mnt",
|
|
|
|
"mkfs.ext3 -L boot /dev/vda1",
|
|
|
|
"mkdir -p /mnt/boot",
|
|
|
|
"mount LABEL=boot /mnt/boot",
|
|
|
|
"udevadm settle")
|
|
|
|
'';
|
|
|
|
extraConfig = ''
|
|
|
|
boot.initrd.clevis.devices."crypt-root".secretFile = "/etc/nixos/clevis-secret.jwe";
|
|
|
|
'';
|
2024-04-01 18:21:32 +00:00
|
|
|
postBootCommands = optionalString fallback ''
|
2023-11-18 19:38:08 +00:00
|
|
|
${if systemdStage1 then ''
|
2024-04-01 18:21:32 +00:00
|
|
|
target.wait_for_text("Please enter")
|
2023-11-18 19:38:08 +00:00
|
|
|
'' else ''
|
2024-04-01 18:21:32 +00:00
|
|
|
target.wait_for_text("Passphrase for")
|
2023-11-18 19:38:08 +00:00
|
|
|
''}
|
2024-04-01 18:21:32 +00:00
|
|
|
target.send_chars("password\n")
|
2023-11-18 19:38:08 +00:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2024-06-12 17:06:38 +00:00
|
|
|
mkClevisZfsTest = { fallback ? false, parentDataset ? false }: makeInstallerTest "clevis-zfs${optionalString parentDataset "-parent-dataset"}${optionalString fallback "-fallback"}" {
|
2023-11-18 19:38:08 +00:00
|
|
|
clevisTest = true;
|
|
|
|
clevisFallbackTest = fallback;
|
|
|
|
enableOCR = fallback;
|
|
|
|
extraInstallerConfig = {
|
|
|
|
boot.supportedFilesystems = [ "zfs" ];
|
|
|
|
environment.systemPackages = with pkgs; [ clevis ];
|
|
|
|
};
|
|
|
|
createPartitions = ''
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.succeed(
|
2023-11-18 19:38:08 +00:00
|
|
|
"flock /dev/vda parted --script /dev/vda -- mklabel msdos"
|
|
|
|
+ " mkpart primary ext2 1M 100MB"
|
|
|
|
+ " mkpart primary linux-swap 100M 1024M"
|
|
|
|
+ " mkpart primary 1024M -1s",
|
|
|
|
"udevadm settle",
|
|
|
|
"mkswap /dev/vda2 -L swap",
|
|
|
|
"swapon -L swap",
|
2024-06-12 17:06:38 +00:00
|
|
|
'' + optionalString (!parentDataset) ''
|
2023-11-18 19:38:08 +00:00
|
|
|
"zpool create -O mountpoint=legacy rpool /dev/vda3",
|
|
|
|
"echo -n password | zfs create"
|
|
|
|
+ " -o encryption=aes-256-gcm -o keyformat=passphrase rpool/root",
|
2024-06-12 17:06:38 +00:00
|
|
|
'' + optionalString (parentDataset) ''
|
|
|
|
"echo -n password | zpool create -O mountpoint=none -O encryption=on -O keyformat=passphrase rpool /dev/vda3",
|
|
|
|
"zfs create -o mountpoint=legacy rpool/root",
|
|
|
|
'' +
|
|
|
|
''
|
2023-11-18 19:38:08 +00:00
|
|
|
"mount -t zfs rpool/root /mnt",
|
|
|
|
"mkfs.ext3 -L boot /dev/vda1",
|
|
|
|
"mkdir -p /mnt/boot",
|
|
|
|
"mount LABEL=boot /mnt/boot",
|
|
|
|
"udevadm settle")
|
|
|
|
'';
|
2024-06-12 17:06:38 +00:00
|
|
|
extraConfig = optionalString (!parentDataset) ''
|
2023-11-18 19:38:08 +00:00
|
|
|
boot.initrd.clevis.devices."rpool/root".secretFile = "/etc/nixos/clevis-secret.jwe";
|
2024-06-12 17:06:38 +00:00
|
|
|
'' + optionalString (parentDataset) ''
|
|
|
|
boot.initrd.clevis.devices."rpool".secretFile = "/etc/nixos/clevis-secret.jwe";
|
|
|
|
'' +
|
|
|
|
''
|
2023-11-18 19:38:08 +00:00
|
|
|
boot.zfs.requestEncryptionCredentials = true;
|
|
|
|
|
|
|
|
|
|
|
|
# Using by-uuid overrides the default of by-id, and is unique
|
|
|
|
# to the qemu disks, as they don't produce by-id paths for
|
|
|
|
# some reason.
|
|
|
|
boot.zfs.devNodes = "/dev/disk/by-uuid/";
|
|
|
|
networking.hostId = "00000000";
|
|
|
|
'';
|
2024-04-01 18:21:32 +00:00
|
|
|
postBootCommands = optionalString fallback ''
|
2023-11-18 19:38:08 +00:00
|
|
|
${if systemdStage1 then ''
|
2024-04-01 18:21:32 +00:00
|
|
|
target.wait_for_text("Enter key for rpool/root")
|
2023-11-18 19:38:08 +00:00
|
|
|
'' else ''
|
2024-04-01 18:21:32 +00:00
|
|
|
target.wait_for_text("Key load error")
|
2023-11-18 19:38:08 +00:00
|
|
|
''}
|
2024-04-01 18:21:32 +00:00
|
|
|
target.send_chars("password\n")
|
2023-11-18 19:38:08 +00:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2019-03-07 09:36:40 +00:00
|
|
|
in {
|
|
|
|
|
|
|
|
# !!! `parted mkpart' seems to silently create overlapping partitions.
|
|
|
|
|
|
|
|
|
|
|
|
# The (almost) simplest partitioning scheme: a swap partition and
|
|
|
|
# one big filesystem partition.
|
|
|
|
simple = makeInstallerTest "simple" simple-test-config;
|
2016-04-23 11:20:34 +00:00
|
|
|
|
2023-07-07 16:53:19 +00:00
|
|
|
switchToFlake = makeInstallerTest "switch-to-flake" simple-test-config-flake;
|
|
|
|
|
2024-07-10 15:49:55 +00:00
|
|
|
switchToByAttr = makeInstallerTest "switch-to-by-attr" simple-test-config-by-attr;
|
|
|
|
|
|
|
|
switchFromByAttrToFlake = makeInstallerTest "switch-from-by-attr-to-flake" simple-test-config-from-by-attr-to-flake;
|
|
|
|
|
2019-03-07 09:38:28 +00:00
|
|
|
# Test cloned configurations with the simple grub configuration
|
2020-03-05 22:07:20 +00:00
|
|
|
simpleSpecialised = makeInstallerTest "simpleSpecialised" (simple-test-config // specialisation-test-extraconfig);
|
2019-03-07 09:38:28 +00:00
|
|
|
|
2019-03-07 09:36:40 +00:00
|
|
|
# Simple GPT/UEFI configuration using systemd-boot with 3 partitions: ESP, swap & root filesystem
|
2020-01-28 07:54:05 +00:00
|
|
|
simpleUefiSystemdBoot = makeInstallerTest "simpleUefiSystemdBoot" {
|
|
|
|
createPartitions = ''
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.succeed(
|
2020-01-28 07:54:05 +00:00
|
|
|
"flock /dev/vda parted --script /dev/vda -- mklabel gpt"
|
2021-11-30 01:53:14 +00:00
|
|
|
+ " mkpart ESP fat32 1M 100MiB" # /boot
|
2020-01-28 07:54:05 +00:00
|
|
|
+ " set 1 boot on"
|
2021-11-30 01:53:14 +00:00
|
|
|
+ " mkpart primary linux-swap 100MiB 1024MiB"
|
2020-01-28 07:54:05 +00:00
|
|
|
+ " mkpart primary ext2 1024MiB -1MiB", # /
|
|
|
|
"udevadm settle",
|
|
|
|
"mkswap /dev/vda2 -L swap",
|
|
|
|
"swapon -L swap",
|
|
|
|
"mkfs.ext3 -L nixos /dev/vda3",
|
|
|
|
"mount LABEL=nixos /mnt",
|
|
|
|
"mkfs.vfat -n BOOT /dev/vda1",
|
|
|
|
"mkdir -p /mnt/boot",
|
|
|
|
"mount LABEL=BOOT /mnt/boot",
|
|
|
|
)
|
|
|
|
'';
|
|
|
|
bootLoader = "systemd-boot";
|
|
|
|
};
|
2017-02-15 22:59:40 +00:00
|
|
|
|
2019-03-07 09:36:40 +00:00
|
|
|
simpleUefiGrub = makeInstallerTest "simpleUefiGrub" simple-uefi-grub-config;
|
|
|
|
|
2019-03-07 09:38:28 +00:00
|
|
|
# Test cloned configurations with the uefi grub configuration
|
2020-03-05 22:07:20 +00:00
|
|
|
simpleUefiGrubSpecialisation = makeInstallerTest "simpleUefiGrubSpecialisation" (simple-uefi-grub-config // specialisation-test-extraconfig);
|
2019-03-07 09:38:28 +00:00
|
|
|
|
2010-01-07 13:19:38 +00:00
|
|
|
# Same as the previous, but now with a separate /boot partition.
|
2020-01-28 07:54:05 +00:00
|
|
|
separateBoot = makeInstallerTest "separateBoot" {
|
|
|
|
createPartitions = ''
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.succeed(
|
2020-01-28 07:54:05 +00:00
|
|
|
"flock /dev/vda parted --script /dev/vda -- mklabel msdos"
|
2021-11-30 01:53:14 +00:00
|
|
|
+ " mkpart primary ext2 1M 100MB" # /boot
|
|
|
|
+ " mkpart primary linux-swap 100MB 1024M"
|
2020-01-28 07:54:05 +00:00
|
|
|
+ " mkpart primary ext2 1024M -1s", # /
|
|
|
|
"udevadm settle",
|
|
|
|
"mkswap /dev/vda2 -L swap",
|
|
|
|
"swapon -L swap",
|
|
|
|
"mkfs.ext3 -L nixos /dev/vda3",
|
|
|
|
"mount LABEL=nixos /mnt",
|
|
|
|
"mkfs.ext3 -L boot /dev/vda1",
|
|
|
|
"mkdir -p /mnt/boot",
|
|
|
|
"mount LABEL=boot /mnt/boot",
|
|
|
|
)
|
|
|
|
'';
|
|
|
|
};
|
2011-09-14 18:20:50 +00:00
|
|
|
|
2015-07-08 19:05:31 +00:00
|
|
|
# Same as the previous, but with fat32 /boot.
|
2020-01-28 07:54:05 +00:00
|
|
|
separateBootFat = makeInstallerTest "separateBootFat" {
|
|
|
|
createPartitions = ''
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.succeed(
|
2020-01-28 07:54:05 +00:00
|
|
|
"flock /dev/vda parted --script /dev/vda -- mklabel msdos"
|
2021-11-30 01:53:14 +00:00
|
|
|
+ " mkpart primary ext2 1M 100MB" # /boot
|
|
|
|
+ " mkpart primary linux-swap 100MB 1024M"
|
2020-01-28 07:54:05 +00:00
|
|
|
+ " mkpart primary ext2 1024M -1s", # /
|
|
|
|
"udevadm settle",
|
|
|
|
"mkswap /dev/vda2 -L swap",
|
|
|
|
"swapon -L swap",
|
|
|
|
"mkfs.ext3 -L nixos /dev/vda3",
|
|
|
|
"mount LABEL=nixos /mnt",
|
|
|
|
"mkfs.vfat -n BOOT /dev/vda1",
|
|
|
|
"mkdir -p /mnt/boot",
|
|
|
|
"mount LABEL=BOOT /mnt/boot",
|
|
|
|
)
|
|
|
|
'';
|
|
|
|
};
|
2015-07-08 19:05:31 +00:00
|
|
|
|
2023-03-24 18:16:24 +00:00
|
|
|
# Same as the previous, but with ZFS /boot.
|
|
|
|
separateBootZfs = makeInstallerTest "separateBootZfs" {
|
|
|
|
extraInstallerConfig = {
|
|
|
|
boot.supportedFilesystems = [ "zfs" ];
|
|
|
|
};
|
|
|
|
|
|
|
|
extraConfig = ''
|
|
|
|
# Using by-uuid overrides the default of by-id, and is unique
|
|
|
|
# to the qemu disks, as they don't produce by-id paths for
|
|
|
|
# some reason.
|
|
|
|
boot.zfs.devNodes = "/dev/disk/by-uuid/";
|
|
|
|
networking.hostId = "00000000";
|
|
|
|
'';
|
|
|
|
|
|
|
|
createPartitions = ''
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.succeed(
|
2023-03-24 18:16:24 +00:00
|
|
|
"flock /dev/vda parted --script /dev/vda -- mklabel msdos"
|
|
|
|
+ " mkpart primary ext2 1M 256MB" # /boot
|
|
|
|
+ " mkpart primary linux-swap 256MB 1280M"
|
|
|
|
+ " mkpart primary ext2 1280M -1s", # /
|
|
|
|
"udevadm settle",
|
|
|
|
|
|
|
|
"mkswap /dev/vda2 -L swap",
|
|
|
|
"swapon -L swap",
|
|
|
|
|
|
|
|
"mkfs.ext4 -L nixos /dev/vda3",
|
|
|
|
"mount LABEL=nixos /mnt",
|
|
|
|
|
|
|
|
# Use as many ZFS features as possible to verify that GRUB can handle them
|
|
|
|
"zpool create"
|
|
|
|
" -o compatibility=grub2"
|
|
|
|
" -O utf8only=on"
|
|
|
|
" -O normalization=formD"
|
|
|
|
" -O compression=lz4" # Activate the lz4_compress feature
|
|
|
|
" -O xattr=sa"
|
|
|
|
" -O acltype=posixacl"
|
|
|
|
" bpool /dev/vda1",
|
|
|
|
"zfs create"
|
|
|
|
" -o recordsize=1M" # Prepare activating the large_blocks feature
|
|
|
|
" -o mountpoint=legacy"
|
|
|
|
" -o relatime=on"
|
|
|
|
" -o quota=1G"
|
|
|
|
" -o filesystem_limit=100" # Activate the filesystem_limits features
|
|
|
|
" bpool/boot",
|
|
|
|
|
|
|
|
# Snapshotting the top-level dataset would trigger a bug in GRUB2: https://github.com/openzfs/zfs/issues/13873
|
|
|
|
"zfs snapshot bpool/boot@snap-1", # Prepare activating the livelist and bookmarks features
|
|
|
|
"zfs clone bpool/boot@snap-1 bpool/test", # Activate the livelist feature
|
|
|
|
"zfs bookmark bpool/boot@snap-1 bpool/boot#bookmark", # Activate the bookmarks feature
|
|
|
|
"zpool checkpoint bpool", # Activate the zpool_checkpoint feature
|
|
|
|
"mkdir -p /mnt/boot",
|
|
|
|
"mount -t zfs bpool/boot /mnt/boot",
|
|
|
|
"touch /mnt/boot/empty", # Activate zilsaxattr feature
|
|
|
|
"dd if=/dev/urandom of=/mnt/boot/test bs=1M count=1", # Activate the large_blocks feature
|
|
|
|
|
|
|
|
# Print out all enabled and active ZFS features (and some other stuff)
|
|
|
|
"sync /mnt/boot",
|
|
|
|
"zpool get all bpool >&2",
|
|
|
|
|
|
|
|
# Abort early if GRUB2 doesn't like the disks
|
|
|
|
"grub-probe --target=device /mnt/boot >&2",
|
|
|
|
)
|
|
|
|
'';
|
|
|
|
|
|
|
|
# umount & export bpool before shutdown
|
|
|
|
# this is a fix for "cannot import 'bpool': pool was previously in use from another system."
|
|
|
|
postInstallCommands = ''
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.succeed("umount /mnt/boot")
|
|
|
|
installer.succeed("zpool export bpool")
|
2023-03-24 18:16:24 +00:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2017-06-27 23:35:55 +00:00
|
|
|
# zfs on / with swap
|
2020-01-28 07:54:05 +00:00
|
|
|
zfsroot = makeInstallerTest "zfs-root" {
|
|
|
|
extraInstallerConfig = {
|
|
|
|
boot.supportedFilesystems = [ "zfs" ];
|
|
|
|
};
|
2017-06-27 23:35:55 +00:00
|
|
|
|
2020-01-28 07:54:05 +00:00
|
|
|
extraConfig = ''
|
|
|
|
boot.supportedFilesystems = [ "zfs" ];
|
2017-06-27 23:35:55 +00:00
|
|
|
|
2020-01-28 07:54:05 +00:00
|
|
|
# Using by-uuid overrides the default of by-id, and is unique
|
|
|
|
# to the qemu disks, as they don't produce by-id paths for
|
|
|
|
# some reason.
|
|
|
|
boot.zfs.devNodes = "/dev/disk/by-uuid/";
|
|
|
|
networking.hostId = "00000000";
|
|
|
|
'';
|
2017-06-27 23:35:55 +00:00
|
|
|
|
2020-01-28 07:54:05 +00:00
|
|
|
createPartitions = ''
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.succeed(
|
2020-01-28 07:54:05 +00:00
|
|
|
"flock /dev/vda parted --script /dev/vda -- mklabel msdos"
|
2023-03-24 18:16:24 +00:00
|
|
|
+ " mkpart primary 1M 100MB" # /boot
|
2023-10-23 16:53:57 +00:00
|
|
|
+ " mkpart primary linux-swap 100M 1024M"
|
|
|
|
+ " mkpart primary 1024M -1s", # rpool
|
2020-01-28 07:54:05 +00:00
|
|
|
"udevadm settle",
|
2023-10-23 16:53:57 +00:00
|
|
|
"mkswap /dev/vda2 -L swap",
|
2020-01-28 07:54:05 +00:00
|
|
|
"swapon -L swap",
|
2023-10-23 16:53:57 +00:00
|
|
|
"zpool create rpool /dev/vda3",
|
2020-01-28 07:54:05 +00:00
|
|
|
"zfs create -o mountpoint=legacy rpool/root",
|
|
|
|
"mount -t zfs rpool/root /mnt",
|
2023-08-02 18:56:25 +00:00
|
|
|
"zfs create -o mountpoint=legacy rpool/root/usr",
|
|
|
|
"mkdir /mnt/usr",
|
|
|
|
"mount -t zfs rpool/root/usr /mnt/usr",
|
2023-03-24 18:16:24 +00:00
|
|
|
"mkfs.vfat -n BOOT /dev/vda1",
|
2023-10-23 16:53:57 +00:00
|
|
|
"mkdir /mnt/boot",
|
2023-03-24 18:16:24 +00:00
|
|
|
"mount LABEL=BOOT /mnt/boot",
|
2020-01-28 07:54:05 +00:00
|
|
|
"udevadm settle",
|
|
|
|
)
|
|
|
|
'';
|
|
|
|
};
|
2017-06-27 23:35:55 +00:00
|
|
|
|
2010-01-07 14:19:19 +00:00
|
|
|
# Create two physical LVM partitions combined into one volume group
|
2012-08-01 19:40:58 +00:00
|
|
|
# that contains the logical swap and root partitions.
|
2020-01-28 07:54:05 +00:00
|
|
|
lvm = makeInstallerTest "lvm" {
|
|
|
|
createPartitions = ''
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.succeed(
|
2020-01-28 07:54:05 +00:00
|
|
|
"flock /dev/vda parted --script /dev/vda -- mklabel msdos"
|
|
|
|
+ " mkpart primary 1M 2048M" # PV1
|
|
|
|
+ " set 1 lvm on"
|
|
|
|
+ " mkpart primary 2048M -1s" # PV2
|
|
|
|
+ " set 2 lvm on",
|
|
|
|
"udevadm settle",
|
|
|
|
"pvcreate /dev/vda1 /dev/vda2",
|
|
|
|
"vgcreate MyVolGroup /dev/vda1 /dev/vda2",
|
|
|
|
"lvcreate --size 1G --name swap MyVolGroup",
|
2022-03-24 00:12:24 +00:00
|
|
|
"lvcreate --size 6G --name nixos MyVolGroup",
|
2020-01-28 07:54:05 +00:00
|
|
|
"mkswap -f /dev/MyVolGroup/swap -L swap",
|
|
|
|
"swapon -L swap",
|
|
|
|
"mkfs.xfs -L nixos /dev/MyVolGroup/nixos",
|
|
|
|
"mount LABEL=nixos /mnt",
|
|
|
|
)
|
|
|
|
'';
|
2024-05-05 10:41:28 +00:00
|
|
|
extraConfig = optionalString systemdStage1 ''
|
|
|
|
boot.initrd.services.lvm.enable = true;
|
|
|
|
'';
|
2020-01-28 07:54:05 +00:00
|
|
|
};
|
2010-05-16 20:44:45 +00:00
|
|
|
|
2019-03-01 22:47:19 +00:00
|
|
|
# Boot off an encrypted root partition with the default LUKS header format
|
|
|
|
luksroot = makeLuksRootTest "luksroot-format1" "";
|
|
|
|
|
|
|
|
# Boot off an encrypted root partition with LUKS1 format
|
|
|
|
luksroot-format1 = makeLuksRootTest "luksroot-format1" "--type=LUKS1";
|
|
|
|
|
|
|
|
# Boot off an encrypted root partition with LUKS2 format
|
|
|
|
luksroot-format2 = makeLuksRootTest "luksroot-format2" "--type=LUKS2";
|
nixos/tests/installer: Add test for LUKS rootfs.
This serves as a regression test for #7859.
It's pretty straightforward, except from the fact that nixos-generate-
config doesn't detect LUKS devices and the "sleep 60".
As for the former, I have tried to add support for LUKS devices for
nixos-generate-config, but it's not so easy as it sounds, because we
need to create a device tree across all possible mappers and/or LVM up
to the "real" device and then decide whether it is relevant to what is
currently mounted. So I guess this is something for the nixpart branch
(see #2079).
And the latter isn't very trivial as well, because the LUKS passphrase
prompt is issued on /dev/console, which is the last "console=..." kernel
parameter (thus the `mkAfter`). So we can't simply grep the log, because
the prompt ends up being on one terminal only (tty0) and using select()
on $machine->{socket} doesn't work very well, because the FD is always
"ready for read". If we would read the FD, we would conflict with
$machine->connect and end up having an inconsistent state. Another idea
would be to use multithreading to do $machine->connect while feeding the
passphrase prompt in a loop and stop the thread once $machine->connect
is done. Turns out that this is not so easy as well, because the threads
need to share the $machine object and of course need to do properly
locking.
In the end I decided to use the "blindly hope that 60 seconds is enough"
approach for now and come up with a better solution later. Other VM
tests surely use sleep as well, but it's $machine->sleep, which is bound
to the clock of the VM, so if the build machine is on high load, a
$machine->sleep gets properly delayed but the timer outside the VM won't
get that delay, so the test is not deterministic.
Tested against the following revisions:
5e3fe39: Before the libgcrypt cleanup (a71f78a) that broke cryptsetup.
69a6848: While cryptsetup was broken (obviously the test failed).
15faa43: After cryptsetup has been switched to OpenSSL (fd588f9).
Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2015-05-21 10:42:00 +00:00
|
|
|
|
2017-09-12 11:57:37 +00:00
|
|
|
# Test whether opening encrypted filesystem with keyfile
|
|
|
|
# Checks for regression of missing cryptsetup, when no luks device without
|
|
|
|
# keyfile is configured
|
2020-01-28 07:54:05 +00:00
|
|
|
encryptedFSWithKeyfile = makeInstallerTest "encryptedFSWithKeyfile" {
|
|
|
|
createPartitions = ''
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.succeed(
|
2018-09-22 10:22:17 +00:00
|
|
|
"flock /dev/vda parted --script /dev/vda -- mklabel msdos"
|
2021-11-30 01:53:14 +00:00
|
|
|
+ " mkpart primary ext2 1M 100MB" # /boot
|
|
|
|
+ " mkpart primary linux-swap 100M 1024M"
|
2020-01-28 07:54:05 +00:00
|
|
|
+ " mkpart primary 1024M 1280M" # LUKS with keyfile
|
|
|
|
+ " mkpart primary 1280M -1s",
|
2017-09-12 11:57:37 +00:00
|
|
|
"udevadm settle",
|
|
|
|
"mkswap /dev/vda2 -L swap",
|
|
|
|
"swapon -L swap",
|
|
|
|
"mkfs.ext3 -L nixos /dev/vda4",
|
|
|
|
"mount LABEL=nixos /mnt",
|
|
|
|
"mkfs.ext3 -L boot /dev/vda1",
|
|
|
|
"mkdir -p /mnt/boot",
|
|
|
|
"mount LABEL=boot /mnt/boot",
|
|
|
|
"modprobe dm_mod dm_crypt",
|
|
|
|
"echo -n supersecret > /mnt/keyfile",
|
|
|
|
"cryptsetup luksFormat -q /dev/vda3 --key-file /mnt/keyfile",
|
|
|
|
"cryptsetup luksOpen --key-file /mnt/keyfile /dev/vda3 crypt",
|
|
|
|
"mkfs.ext3 -L test /dev/mapper/crypt",
|
|
|
|
"cryptsetup luksClose crypt",
|
2020-01-28 07:54:05 +00:00
|
|
|
"mkdir -p /mnt/test",
|
|
|
|
)
|
|
|
|
'';
|
|
|
|
extraConfig = ''
|
|
|
|
fileSystems."/test" = {
|
|
|
|
device = "/dev/disk/by-label/test";
|
|
|
|
fsType = "ext3";
|
|
|
|
encrypted.enable = true;
|
|
|
|
encrypted.blkDev = "/dev/vda3";
|
|
|
|
encrypted.label = "crypt";
|
2023-10-23 21:40:34 +00:00
|
|
|
encrypted.keyFile = "/${if systemdStage1 then "sysroot" else "mnt-root"}/keyfile";
|
2020-01-28 07:54:05 +00:00
|
|
|
};
|
|
|
|
'';
|
|
|
|
};
|
2017-09-12 11:57:37 +00:00
|
|
|
|
2023-01-15 02:25:17 +00:00
|
|
|
# Full disk encryption (root, kernel and initrd encrypted) using GRUB, GPT/UEFI,
|
|
|
|
# LVM-on-LUKS and a keyfile in initrd.secrets to enter the passphrase once
|
|
|
|
fullDiskEncryption = makeInstallerTest "fullDiskEncryption" {
|
|
|
|
createPartitions = ''
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.succeed(
|
2023-01-15 02:25:17 +00:00
|
|
|
"flock /dev/vda parted --script /dev/vda -- mklabel gpt"
|
|
|
|
+ " mkpart ESP fat32 1M 100MiB" # /boot/efi
|
|
|
|
+ " set 1 boot on"
|
|
|
|
+ " mkpart primary ext2 1024MiB -1MiB", # LUKS
|
|
|
|
"udevadm settle",
|
|
|
|
"modprobe dm_mod dm_crypt",
|
|
|
|
"dd if=/dev/random of=luks.key bs=256 count=1",
|
|
|
|
"echo -n supersecret | cryptsetup luksFormat -q --pbkdf-force-iterations 1000 --type luks1 /dev/vda2 -",
|
|
|
|
"echo -n supersecret | cryptsetup luksAddKey -q --pbkdf-force-iterations 1000 --key-file - /dev/vda2 luks.key",
|
|
|
|
"echo -n supersecret | cryptsetup luksOpen --key-file - /dev/vda2 crypt",
|
|
|
|
"pvcreate /dev/mapper/crypt",
|
|
|
|
"vgcreate crypt /dev/mapper/crypt",
|
|
|
|
"lvcreate -L 100M -n swap crypt",
|
|
|
|
"lvcreate -l '100%FREE' -n nixos crypt",
|
|
|
|
"mkfs.vfat -n efi /dev/vda1",
|
|
|
|
"mkfs.ext4 -L nixos /dev/crypt/nixos",
|
|
|
|
"mkswap -L swap /dev/crypt/swap",
|
|
|
|
"mount LABEL=nixos /mnt",
|
|
|
|
"mkdir -p /mnt/{etc/nixos,boot/efi}",
|
|
|
|
"mount LABEL=efi /mnt/boot/efi",
|
|
|
|
"swapon -L swap",
|
|
|
|
"mv luks.key /mnt/etc/nixos/"
|
|
|
|
)
|
|
|
|
'';
|
|
|
|
bootLoader = "grub";
|
|
|
|
grubUseEfi = true;
|
|
|
|
extraConfig = ''
|
|
|
|
boot.loader.grub.enableCryptodisk = true;
|
|
|
|
boot.loader.efi.efiSysMountPoint = "/boot/efi";
|
|
|
|
|
2024-04-01 18:21:32 +00:00
|
|
|
boot.initrd.secrets."/luks.key" = "/etc/nixos/luks.key";
|
2023-01-15 02:25:17 +00:00
|
|
|
boot.initrd.luks.devices.crypt =
|
|
|
|
{ device = "/dev/vda2";
|
|
|
|
keyFile = "/luks.key";
|
|
|
|
};
|
|
|
|
'';
|
|
|
|
enableOCR = true;
|
2024-04-01 18:21:32 +00:00
|
|
|
postBootCommands = ''
|
|
|
|
target.wait_for_text("Enter passphrase for")
|
|
|
|
target.send_chars("supersecret\n")
|
2023-01-15 02:25:17 +00:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2020-01-28 07:54:05 +00:00
|
|
|
swraid = makeInstallerTest "swraid" {
|
|
|
|
createPartitions = ''
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.succeed(
|
2020-01-28 07:54:05 +00:00
|
|
|
"flock /dev/vda parted --script /dev/vda --"
|
|
|
|
+ " mklabel msdos"
|
|
|
|
+ " mkpart primary ext2 1M 100MB" # /boot
|
|
|
|
+ " mkpart extended 100M -1s"
|
2020-09-05 08:32:42 +00:00
|
|
|
+ " mkpart logical 102M 3102M" # md0 (root), first device
|
|
|
|
+ " mkpart logical 3103M 6103M" # md0 (root), second device
|
|
|
|
+ " mkpart logical 6104M 6360M" # md1 (swap), first device
|
|
|
|
+ " mkpart logical 6361M 6617M", # md1 (swap), second device
|
2020-01-28 07:54:05 +00:00
|
|
|
"udevadm settle",
|
|
|
|
"ls -l /dev/vda* >&2",
|
|
|
|
"cat /proc/partitions >&2",
|
|
|
|
"udevadm control --stop-exec-queue",
|
|
|
|
"mdadm --create --force /dev/md0 --metadata 1.2 --level=raid1 "
|
|
|
|
+ "--raid-devices=2 /dev/vda5 /dev/vda6",
|
|
|
|
"mdadm --create --force /dev/md1 --metadata 1.2 --level=raid1 "
|
|
|
|
+ "--raid-devices=2 /dev/vda7 /dev/vda8",
|
|
|
|
"udevadm control --start-exec-queue",
|
|
|
|
"udevadm settle",
|
|
|
|
"mkswap -f /dev/md1 -L swap",
|
|
|
|
"swapon -L swap",
|
|
|
|
"mkfs.ext3 -L nixos /dev/md0",
|
|
|
|
"mount LABEL=nixos /mnt",
|
|
|
|
"mkfs.ext3 -L boot /dev/vda1",
|
|
|
|
"mkdir /mnt/boot",
|
|
|
|
"mount LABEL=boot /mnt/boot",
|
|
|
|
"udevadm settle",
|
|
|
|
)
|
|
|
|
'';
|
2024-04-01 18:21:32 +00:00
|
|
|
postBootCommands = ''
|
|
|
|
target.fail("dmesg | grep 'immediate safe mode'")
|
2020-01-28 07:54:05 +00:00
|
|
|
'';
|
|
|
|
};
|
2010-09-25 09:32:22 +00:00
|
|
|
|
2020-02-13 01:30:49 +00:00
|
|
|
bcache = makeInstallerTest "bcache" {
|
|
|
|
createPartitions = ''
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.succeed(
|
2020-02-13 01:30:49 +00:00
|
|
|
"flock /dev/vda parted --script /dev/vda --"
|
|
|
|
+ " mklabel msdos"
|
2021-11-30 01:53:14 +00:00
|
|
|
+ " mkpart primary ext2 1M 100MB" # /boot
|
|
|
|
+ " mkpart primary 100MB 512MB " # swap
|
2020-02-13 01:30:49 +00:00
|
|
|
+ " mkpart primary 512MB 1024MB" # Cache (typically SSD)
|
|
|
|
+ " mkpart primary 1024MB -1s ", # Backing device (typically HDD)
|
|
|
|
"modprobe bcache",
|
|
|
|
"udevadm settle",
|
|
|
|
"make-bcache -B /dev/vda4 -C /dev/vda3",
|
|
|
|
"udevadm settle",
|
|
|
|
"mkfs.ext3 -L nixos /dev/bcache0",
|
|
|
|
"mount LABEL=nixos /mnt",
|
|
|
|
"mkfs.ext3 -L boot /dev/vda1",
|
|
|
|
"mkdir /mnt/boot",
|
|
|
|
"mount LABEL=boot /mnt/boot",
|
|
|
|
"mkswap -f /dev/vda2 -L swap",
|
|
|
|
"swapon -L swap",
|
|
|
|
)
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2022-05-05 00:26:43 +00:00
|
|
|
bcachefsSimple = makeInstallerTest "bcachefs-simple" {
|
|
|
|
extraInstallerConfig = {
|
|
|
|
boot.supportedFilesystems = [ "bcachefs" ];
|
2023-01-01 18:52:05 +00:00
|
|
|
imports = [ no-zfs-module ];
|
2022-05-05 00:26:43 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
createPartitions = ''
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.succeed(
|
2022-05-05 00:26:43 +00:00
|
|
|
"flock /dev/vda parted --script /dev/vda -- mklabel msdos"
|
|
|
|
+ " mkpart primary ext2 1M 100MB" # /boot
|
|
|
|
+ " mkpart primary linux-swap 100M 1024M" # swap
|
|
|
|
+ " mkpart primary 1024M -1s", # /
|
|
|
|
"udevadm settle",
|
|
|
|
"mkswap /dev/vda2 -L swap",
|
|
|
|
"swapon -L swap",
|
|
|
|
"mkfs.bcachefs -L root /dev/vda3",
|
|
|
|
"mount -t bcachefs /dev/vda3 /mnt",
|
|
|
|
"mkfs.ext3 -L boot /dev/vda1",
|
|
|
|
"mkdir -p /mnt/boot",
|
|
|
|
"mount /dev/vda1 /mnt/boot",
|
|
|
|
)
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
bcachefsEncrypted = makeInstallerTest "bcachefs-encrypted" {
|
|
|
|
extraInstallerConfig = {
|
|
|
|
boot.supportedFilesystems = [ "bcachefs" ];
|
2023-01-01 18:52:05 +00:00
|
|
|
|
|
|
|
# disable zfs so we can support latest kernel if needed
|
|
|
|
imports = [ no-zfs-module ];
|
|
|
|
|
2022-05-05 00:26:43 +00:00
|
|
|
environment.systemPackages = with pkgs; [ keyutils ];
|
|
|
|
};
|
|
|
|
|
|
|
|
extraConfig = ''
|
2023-01-01 18:53:11 +00:00
|
|
|
boot.kernelParams = lib.mkAfter [ "console=tty0" ];
|
|
|
|
'';
|
|
|
|
|
|
|
|
enableOCR = true;
|
2024-04-01 18:21:32 +00:00
|
|
|
postBootCommands = ''
|
2023-10-21 15:56:47 +00:00
|
|
|
# Enter it wrong once
|
2024-04-01 18:21:32 +00:00
|
|
|
target.wait_for_text("enter passphrase for ")
|
|
|
|
target.send_chars("wrong\n")
|
2023-10-21 15:56:47 +00:00
|
|
|
# Then enter it right.
|
2024-04-01 18:21:32 +00:00
|
|
|
target.wait_for_text("enter passphrase for ")
|
|
|
|
target.send_chars("password\n")
|
2022-05-05 00:26:43 +00:00
|
|
|
'';
|
|
|
|
|
|
|
|
createPartitions = ''
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.succeed(
|
2022-05-05 00:26:43 +00:00
|
|
|
"flock /dev/vda parted --script /dev/vda -- mklabel msdos"
|
|
|
|
+ " mkpart primary ext2 1M 100MB" # /boot
|
|
|
|
+ " mkpart primary linux-swap 100M 1024M" # swap
|
|
|
|
+ " mkpart primary 1024M -1s", # /
|
|
|
|
"udevadm settle",
|
|
|
|
"mkswap /dev/vda2 -L swap",
|
|
|
|
"swapon -L swap",
|
|
|
|
"echo password | mkfs.bcachefs -L root --encrypted /dev/vda3",
|
2023-09-22 10:58:04 +00:00
|
|
|
"echo password | bcachefs unlock -k session /dev/vda3",
|
2023-06-15 17:25:37 +00:00
|
|
|
"echo password | mount -t bcachefs /dev/vda3 /mnt",
|
2022-05-05 00:26:43 +00:00
|
|
|
"mkfs.ext3 -L boot /dev/vda1",
|
|
|
|
"mkdir -p /mnt/boot",
|
|
|
|
"mount /dev/vda1 /mnt/boot",
|
|
|
|
)
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
bcachefsMulti = makeInstallerTest "bcachefs-multi" {
|
|
|
|
extraInstallerConfig = {
|
|
|
|
boot.supportedFilesystems = [ "bcachefs" ];
|
2023-01-01 18:52:05 +00:00
|
|
|
|
|
|
|
# disable zfs so we can support latest kernel if needed
|
|
|
|
imports = [ no-zfs-module ];
|
2022-05-05 00:26:43 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
createPartitions = ''
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.succeed(
|
2022-05-05 00:26:43 +00:00
|
|
|
"flock /dev/vda parted --script /dev/vda -- mklabel msdos"
|
|
|
|
+ " mkpart primary ext2 1M 100MB" # /boot
|
|
|
|
+ " mkpart primary linux-swap 100M 1024M" # swap
|
|
|
|
+ " mkpart primary 1024M 4096M" # /
|
|
|
|
+ " mkpart primary 4096M -1s", # /
|
|
|
|
"udevadm settle",
|
|
|
|
"mkswap /dev/vda2 -L swap",
|
|
|
|
"swapon -L swap",
|
|
|
|
"mkfs.bcachefs -L root --metadata_replicas 2 --foreground_target ssd --promote_target ssd --background_target hdd --label ssd /dev/vda3 --label hdd /dev/vda4",
|
|
|
|
"mount -t bcachefs /dev/vda3:/dev/vda4 /mnt",
|
|
|
|
"mkfs.ext3 -L boot /dev/vda1",
|
|
|
|
"mkdir -p /mnt/boot",
|
|
|
|
"mount /dev/vda1 /mnt/boot",
|
|
|
|
)
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2014-05-02 04:11:49 +00:00
|
|
|
# Test using labels to identify volumes in grub
|
2014-08-29 09:48:00 +00:00
|
|
|
simpleLabels = makeInstallerTest "simpleLabels" {
|
2014-05-02 04:11:49 +00:00
|
|
|
createPartitions = ''
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.succeed(
|
2020-01-28 07:54:05 +00:00
|
|
|
"sgdisk -Z /dev/vda",
|
|
|
|
"sgdisk -n 1:0:+1M -n 2:0:+1G -N 3 -t 1:ef02 -t 2:8200 -t 3:8300 -c 3:root /dev/vda",
|
|
|
|
"mkswap /dev/vda2 -L swap",
|
|
|
|
"swapon -L swap",
|
|
|
|
"mkfs.ext4 -L root /dev/vda3",
|
|
|
|
"mount LABEL=root /mnt",
|
|
|
|
)
|
2014-05-02 04:11:49 +00:00
|
|
|
'';
|
|
|
|
grubIdentifier = "label";
|
|
|
|
};
|
|
|
|
|
|
|
|
# Test using the provided disk name within grub
|
2014-05-02 07:03:25 +00:00
|
|
|
# TODO: Fix udev so the symlinks are unneeded in /dev/disks
|
2014-08-29 09:48:00 +00:00
|
|
|
simpleProvided = makeInstallerTest "simpleProvided" {
|
2014-05-02 04:11:49 +00:00
|
|
|
createPartitions = ''
|
2020-01-28 07:54:05 +00:00
|
|
|
uuid = "$(blkid -s UUID -o value /dev/vda2)"
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.succeed(
|
2020-01-28 07:54:05 +00:00
|
|
|
"sgdisk -Z /dev/vda",
|
|
|
|
"sgdisk -n 1:0:+1M -n 2:0:+100M -n 3:0:+1G -N 4 -t 1:ef02 -t 2:8300 "
|
|
|
|
+ "-t 3:8200 -t 4:8300 -c 2:boot -c 4:root /dev/vda",
|
|
|
|
"mkswap /dev/vda3 -L swap",
|
|
|
|
"swapon -L swap",
|
|
|
|
"mkfs.ext4 -L boot /dev/vda2",
|
|
|
|
"mkfs.ext4 -L root /dev/vda4",
|
|
|
|
)
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.execute(f"ln -s ../../vda2 /dev/disk/by-uuid/{uuid}")
|
|
|
|
installer.execute("ln -s ../../vda4 /dev/disk/by-label/root")
|
|
|
|
installer.succeed(
|
2020-01-28 07:54:05 +00:00
|
|
|
"mount /dev/disk/by-label/root /mnt",
|
|
|
|
"mkdir /mnt/boot",
|
|
|
|
f"mount /dev/disk/by-uuid/{uuid} /mnt/boot",
|
|
|
|
)
|
2014-05-02 04:11:49 +00:00
|
|
|
'';
|
|
|
|
grubIdentifier = "provided";
|
|
|
|
};
|
|
|
|
|
2014-05-01 11:21:30 +00:00
|
|
|
# Simple btrfs grub testing
|
2014-08-29 09:48:00 +00:00
|
|
|
btrfsSimple = makeInstallerTest "btrfsSimple" {
|
2014-05-01 11:21:30 +00:00
|
|
|
createPartitions = ''
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.succeed(
|
2020-01-28 07:54:05 +00:00
|
|
|
"sgdisk -Z /dev/vda",
|
|
|
|
"sgdisk -n 1:0:+1M -n 2:0:+1G -N 3 -t 1:ef02 -t 2:8200 -t 3:8300 -c 3:root /dev/vda",
|
|
|
|
"mkswap /dev/vda2 -L swap",
|
|
|
|
"swapon -L swap",
|
|
|
|
"mkfs.btrfs -L root /dev/vda3",
|
|
|
|
"mount LABEL=root /mnt",
|
|
|
|
)
|
2014-05-01 11:21:30 +00:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
# Test to see if we can detect /boot and /nix on subvolumes
|
2014-08-29 09:48:00 +00:00
|
|
|
btrfsSubvols = makeInstallerTest "btrfsSubvols" {
|
2014-05-01 11:21:30 +00:00
|
|
|
createPartitions = ''
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.succeed(
|
2020-01-28 07:54:05 +00:00
|
|
|
"sgdisk -Z /dev/vda",
|
|
|
|
"sgdisk -n 1:0:+1M -n 2:0:+1G -N 3 -t 1:ef02 -t 2:8200 -t 3:8300 -c 3:root /dev/vda",
|
|
|
|
"mkswap /dev/vda2 -L swap",
|
|
|
|
"swapon -L swap",
|
|
|
|
"mkfs.btrfs -L root /dev/vda3",
|
|
|
|
"btrfs device scan",
|
|
|
|
"mount LABEL=root /mnt",
|
|
|
|
"btrfs subvol create /mnt/boot",
|
|
|
|
"btrfs subvol create /mnt/nixos",
|
|
|
|
"btrfs subvol create /mnt/nixos/default",
|
|
|
|
"umount /mnt",
|
|
|
|
"mount -o defaults,subvol=nixos/default LABEL=root /mnt",
|
|
|
|
"mkdir /mnt/boot",
|
|
|
|
"mount -o defaults,subvol=boot LABEL=root /mnt/boot",
|
|
|
|
)
|
2014-05-01 11:21:30 +00:00
|
|
|
'';
|
|
|
|
};
|
2014-08-29 23:37:28 +00:00
|
|
|
|
|
|
|
# Test to see if we can detect default and aux subvolumes correctly
|
|
|
|
btrfsSubvolDefault = makeInstallerTest "btrfsSubvolDefault" {
|
|
|
|
createPartitions = ''
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.succeed(
|
2020-01-28 07:54:05 +00:00
|
|
|
"sgdisk -Z /dev/vda",
|
|
|
|
"sgdisk -n 1:0:+1M -n 2:0:+1G -N 3 -t 1:ef02 -t 2:8200 -t 3:8300 -c 3:root /dev/vda",
|
|
|
|
"mkswap /dev/vda2 -L swap",
|
|
|
|
"swapon -L swap",
|
|
|
|
"mkfs.btrfs -L root /dev/vda3",
|
|
|
|
"btrfs device scan",
|
|
|
|
"mount LABEL=root /mnt",
|
|
|
|
"btrfs subvol create /mnt/badpath",
|
|
|
|
"btrfs subvol create /mnt/badpath/boot",
|
|
|
|
"btrfs subvol create /mnt/nixos",
|
|
|
|
"btrfs subvol set-default "
|
2020-08-23 14:10:02 +00:00
|
|
|
+ "$(btrfs subvol list /mnt | grep 'nixos' | awk '{print $2}') /mnt",
|
2020-01-28 07:54:05 +00:00
|
|
|
"umount /mnt",
|
|
|
|
"mount -o defaults LABEL=root /mnt",
|
|
|
|
"mkdir -p /mnt/badpath/boot", # Help ensure the detection mechanism
|
|
|
|
# is actually looking up subvolumes
|
|
|
|
"mkdir /mnt/boot",
|
|
|
|
"mount -o defaults,subvol=badpath/boot LABEL=root /mnt/boot",
|
|
|
|
)
|
2014-08-29 23:37:28 +00:00
|
|
|
'';
|
|
|
|
};
|
2022-10-31 14:31:10 +00:00
|
|
|
|
|
|
|
# Test to see if we can deal with subvols that need to be escaped in fstab
|
|
|
|
btrfsSubvolEscape = makeInstallerTest "btrfsSubvolEscape" {
|
|
|
|
createPartitions = ''
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.succeed(
|
2022-10-31 14:31:10 +00:00
|
|
|
"sgdisk -Z /dev/vda",
|
|
|
|
"sgdisk -n 1:0:+1M -n 2:0:+1G -N 3 -t 1:ef02 -t 2:8200 -t 3:8300 -c 3:root /dev/vda",
|
|
|
|
"mkswap /dev/vda2 -L swap",
|
|
|
|
"swapon -L swap",
|
|
|
|
"mkfs.btrfs -L root /dev/vda3",
|
|
|
|
"btrfs device scan",
|
|
|
|
"mount LABEL=root /mnt",
|
|
|
|
"btrfs subvol create '/mnt/nixos in space'",
|
|
|
|
"btrfs subvol create /mnt/boot",
|
|
|
|
"umount /mnt",
|
|
|
|
"mount -o 'defaults,subvol=nixos in space' LABEL=root /mnt",
|
|
|
|
"mkdir /mnt/boot",
|
|
|
|
"mount -o defaults,subvol=boot LABEL=root /mnt/boot",
|
|
|
|
)
|
|
|
|
'';
|
|
|
|
};
|
2023-11-18 19:38:08 +00:00
|
|
|
} // {
|
|
|
|
clevisBcachefs = mkClevisBcachefsTest { };
|
|
|
|
clevisBcachefsFallback = mkClevisBcachefsTest { fallback = true; };
|
|
|
|
clevisLuks = mkClevisLuksTest { };
|
|
|
|
clevisLuksFallback = mkClevisLuksTest { fallback = true; };
|
|
|
|
clevisZfs = mkClevisZfsTest { };
|
|
|
|
clevisZfsFallback = mkClevisZfsTest { fallback = true; };
|
2024-06-12 17:06:38 +00:00
|
|
|
clevisZfsParentDataset = mkClevisZfsTest { parentDataset = true; };
|
|
|
|
clevisZfsParentDatasetFallback = mkClevisZfsTest { parentDataset = true; fallback = true; };
|
2023-05-07 16:47:44 +00:00
|
|
|
} // optionalAttrs systemdStage1 {
|
|
|
|
stratisRoot = makeInstallerTest "stratisRoot" {
|
|
|
|
createPartitions = ''
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.succeed(
|
2023-05-08 21:18:55 +00:00
|
|
|
"sgdisk --zap-all /dev/vda",
|
|
|
|
"sgdisk --new=1:0:+100M --typecode=0:ef00 /dev/vda", # /boot
|
|
|
|
"sgdisk --new=2:0:+1G --typecode=0:8200 /dev/vda", # swap
|
|
|
|
"sgdisk --new=3:0:+5G --typecode=0:8300 /dev/vda", # /
|
|
|
|
"udevadm settle",
|
2023-05-07 16:47:44 +00:00
|
|
|
|
2023-05-08 21:18:55 +00:00
|
|
|
"mkfs.vfat /dev/vda1",
|
|
|
|
"mkswap /dev/vda2 -L swap",
|
|
|
|
"swapon -L swap",
|
|
|
|
"stratis pool create my-pool /dev/vda3",
|
|
|
|
"stratis filesystem create my-pool nixos",
|
|
|
|
"udevadm settle",
|
2023-05-07 16:47:44 +00:00
|
|
|
|
2023-05-08 21:18:55 +00:00
|
|
|
"mount /dev/stratis/my-pool/nixos /mnt",
|
|
|
|
"mkdir -p /mnt/boot",
|
|
|
|
"mount /dev/vda1 /mnt/boot"
|
2023-05-07 16:47:44 +00:00
|
|
|
)
|
|
|
|
'';
|
|
|
|
bootLoader = "systemd-boot";
|
|
|
|
extraInstallerConfig = { modulesPath, ...}: {
|
|
|
|
config = {
|
|
|
|
services.stratis.enable = true;
|
|
|
|
environment.systemPackages = [
|
|
|
|
pkgs.stratis-cli
|
|
|
|
pkgs.thin-provisioning-tools
|
|
|
|
pkgs.lvm2.bin
|
|
|
|
pkgs.stratisd.initrd
|
|
|
|
];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
2024-01-19 10:39:01 +00:00
|
|
|
|
|
|
|
gptAutoRoot = let
|
|
|
|
rootPartType = {
|
|
|
|
ia32 = "44479540-F297-41B2-9AF7-D131D5F0458A";
|
|
|
|
x64 = "4F68BCE3-E8CD-4DB1-96E7-FBCAF984B709";
|
|
|
|
arm = "69DAD710-2CE4-4E3C-B16C-21A1D49ABED3";
|
|
|
|
aa64 = "B921B045-1DF0-41C3-AF44-4C6F280D3FAE";
|
|
|
|
}.${pkgs.stdenv.hostPlatform.efiArch};
|
|
|
|
in makeInstallerTest "gptAutoRoot" {
|
|
|
|
disableFileSystems = true;
|
|
|
|
createPartitions = ''
|
2024-04-01 18:21:32 +00:00
|
|
|
installer.succeed(
|
2024-01-19 10:39:01 +00:00
|
|
|
"sgdisk --zap-all /dev/vda",
|
|
|
|
"sgdisk --new=1:0:+100M --typecode=0:ef00 /dev/vda", # /boot
|
|
|
|
"sgdisk --new=2:0:+1G --typecode=0:8200 /dev/vda", # swap
|
|
|
|
"sgdisk --new=3:0:+5G --typecode=0:${rootPartType} /dev/vda", # /
|
|
|
|
"udevadm settle",
|
|
|
|
|
|
|
|
"mkfs.vfat /dev/vda1",
|
|
|
|
"mkswap /dev/vda2 -L swap",
|
|
|
|
"swapon -L swap",
|
|
|
|
"mkfs.ext4 -L root /dev/vda3",
|
|
|
|
"udevadm settle",
|
|
|
|
|
|
|
|
"mount /dev/vda3 /mnt",
|
|
|
|
"mkdir -p /mnt/boot",
|
|
|
|
"mount /dev/vda1 /mnt/boot"
|
|
|
|
)
|
|
|
|
'';
|
|
|
|
bootLoader = "systemd-boot";
|
|
|
|
extraConfig = ''
|
|
|
|
boot.initrd.systemd.root = "gpt-auto";
|
|
|
|
boot.initrd.supportedFilesystems = ["ext4"];
|
|
|
|
'';
|
|
|
|
};
|
2010-01-06 13:36:21 +00:00
|
|
|
}
|