2019-08-22 20:45:20 +00:00
|
|
|
import ./make-test.nix (let
|
|
|
|
|
|
|
|
container = { ... }: {
|
|
|
|
boot.isContainer = true;
|
|
|
|
|
|
|
|
# use networkd to obtain systemd network setup
|
|
|
|
networking.useNetworkd = true;
|
|
|
|
|
|
|
|
# systemd-nspawn expects /sbin/init
|
|
|
|
boot.loader.initScript.enable = true;
|
|
|
|
|
|
|
|
imports = [ ../modules/profiles/minimal.nix ];
|
|
|
|
};
|
|
|
|
|
|
|
|
containerSystem = (import ../lib/eval-config.nix {
|
|
|
|
modules = [ container ];
|
|
|
|
}).config.system.build.toplevel;
|
|
|
|
|
|
|
|
containerName = "container";
|
2019-08-23 18:53:57 +00:00
|
|
|
containerRoot = "/var/lib/machines/${containerName}";
|
2019-08-22 20:45:20 +00:00
|
|
|
|
|
|
|
in {
|
|
|
|
name = "systemd-machinectl";
|
|
|
|
|
|
|
|
machine = { lib, ... }: {
|
|
|
|
# use networkd to obtain systemd network setup
|
|
|
|
networking.useNetworkd = true;
|
|
|
|
|
|
|
|
# open DHCP server on interface to container
|
|
|
|
networking.firewall.trustedInterfaces = [ "ve-+" ];
|
|
|
|
|
|
|
|
# do not try to access cache.nixos.org
|
|
|
|
nix.binaryCaches = lib.mkForce [];
|
|
|
|
|
|
|
|
virtualisation.pathsInNixDB = [ containerSystem ];
|
|
|
|
};
|
|
|
|
|
|
|
|
testScript = ''
|
|
|
|
startAll;
|
|
|
|
|
|
|
|
$machine->waitForUnit("default.target");
|
|
|
|
$machine->succeed("mkdir -p ${containerRoot}");
|
2019-08-23 18:53:57 +00:00
|
|
|
$machine->succeed("nixos-install --root ${containerRoot} --system ${containerSystem} --no-channel-copy --no-root-passwd --no-bootloader");
|
2019-08-22 20:45:20 +00:00
|
|
|
|
|
|
|
$machine->succeed("machinectl start ${containerName}");
|
|
|
|
$machine->waitUntilSucceeds("systemctl -M ${containerName} is-active default.target");
|
|
|
|
$machine->succeed("ping -n -c 1 ${containerName}");
|
2019-09-01 19:34:37 +00:00
|
|
|
$machine->succeed("test `stat ${containerRoot}/var/empty -c %u%g` != 00");
|
|
|
|
|
2019-08-22 20:45:20 +00:00
|
|
|
$machine->succeed("machinectl stop ${containerName}");
|
|
|
|
'';
|
|
|
|
})
|