mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-10-31 22:51:22 +00:00
Merge pull request #182577 from squalus/coredump
nixos: systemd-coredump: improve disabled state
This commit is contained in:
commit
dfda3c3e04
@ -28,30 +28,37 @@ in {
|
||||
};
|
||||
};
|
||||
|
||||
config = {
|
||||
systemd.additionalUpstreamSystemUnits = [
|
||||
"systemd-coredump.socket"
|
||||
"systemd-coredump@.service"
|
||||
];
|
||||
config = mkMerge [
|
||||
|
||||
environment.etc = {
|
||||
"systemd/coredump.conf".text =
|
||||
''
|
||||
[Coredump]
|
||||
${cfg.extraConfig}
|
||||
'';
|
||||
(mkIf cfg.enable {
|
||||
systemd.additionalUpstreamSystemUnits = [
|
||||
"systemd-coredump.socket"
|
||||
"systemd-coredump@.service"
|
||||
];
|
||||
|
||||
# install provided sysctl snippets
|
||||
"sysctl.d/50-coredump.conf".source = "${systemd}/example/sysctl.d/50-coredump.conf";
|
||||
"sysctl.d/50-default.conf".source = "${systemd}/example/sysctl.d/50-default.conf";
|
||||
};
|
||||
environment.etc = {
|
||||
"systemd/coredump.conf".text =
|
||||
''
|
||||
[Coredump]
|
||||
${cfg.extraConfig}
|
||||
'';
|
||||
|
||||
users.users.systemd-coredump = {
|
||||
uid = config.ids.uids.systemd-coredump;
|
||||
group = "systemd-coredump";
|
||||
};
|
||||
users.groups.systemd-coredump = {};
|
||||
# install provided sysctl snippets
|
||||
"sysctl.d/50-coredump.conf".source = "${systemd}/example/sysctl.d/50-coredump.conf";
|
||||
"sysctl.d/50-default.conf".source = "${systemd}/example/sysctl.d/50-default.conf";
|
||||
};
|
||||
|
||||
users.users.systemd-coredump = {
|
||||
uid = config.ids.uids.systemd-coredump;
|
||||
group = "systemd-coredump";
|
||||
};
|
||||
users.groups.systemd-coredump = {};
|
||||
})
|
||||
|
||||
(mkIf (!cfg.enable) {
|
||||
boot.kernel.sysctl."kernel.core_pattern" = mkDefault "core";
|
||||
})
|
||||
|
||||
];
|
||||
|
||||
boot.kernel.sysctl."kernel.core_pattern" = mkIf (!cfg.enable) "core";
|
||||
};
|
||||
}
|
||||
|
@ -537,6 +537,7 @@ in {
|
||||
systemd-binfmt = handleTestOn ["x86_64-linux"] ./systemd-binfmt.nix {};
|
||||
systemd-boot = handleTest ./systemd-boot.nix {};
|
||||
systemd-confinement = handleTest ./systemd-confinement.nix {};
|
||||
systemd-coredump = handleTest ./systemd-coredump.nix {};
|
||||
systemd-cryptenroll = handleTest ./systemd-cryptenroll.nix {};
|
||||
systemd-escaping = handleTest ./systemd-escaping.nix {};
|
||||
systemd-initrd-btrfs-raid = handleTest ./systemd-initrd-btrfs-raid.nix {};
|
||||
|
44
nixos/tests/systemd-coredump.nix
Normal file
44
nixos/tests/systemd-coredump.nix
Normal file
@ -0,0 +1,44 @@
|
||||
import ./make-test-python.nix ({ pkgs, ... }:
|
||||
|
||||
let
|
||||
|
||||
crasher = pkgs.writeCBin "crasher" "int main;";
|
||||
|
||||
commonConfig = {
|
||||
systemd.services.crasher.serviceConfig = {
|
||||
ExecStart = "${crasher}/bin/crasher";
|
||||
StateDirectory = "crasher";
|
||||
WorkingDirectory = "%S/crasher";
|
||||
Restart = "no";
|
||||
};
|
||||
};
|
||||
|
||||
in
|
||||
|
||||
{
|
||||
name = "systemd-coredump";
|
||||
meta = with pkgs.lib.maintainers; {
|
||||
maintainers = [ squalus ];
|
||||
};
|
||||
|
||||
nodes.machine1 = { pkgs, lib, ... }: commonConfig;
|
||||
nodes.machine2 = { pkgs, lib, ... }: lib.recursiveUpdate commonConfig {
|
||||
systemd.coredump.enable = false;
|
||||
systemd.package = pkgs.systemd.override {
|
||||
withCoredump = false;
|
||||
};
|
||||
};
|
||||
|
||||
testScript = ''
|
||||
with subtest("systemd-coredump enabled"):
|
||||
machine1.wait_for_unit("multi-user.target")
|
||||
machine1.wait_for_unit("systemd-coredump.socket")
|
||||
machine1.systemctl("start crasher");
|
||||
machine1.wait_until_succeeds("coredumpctl list | grep crasher", timeout=10)
|
||||
machine1.fail("stat /var/lib/crasher/core")
|
||||
|
||||
with subtest("systemd-coredump disabled"):
|
||||
machine2.systemctl("start crasher");
|
||||
machine2.wait_until_succeeds("stat /var/lib/crasher/core", timeout=10)
|
||||
'';
|
||||
})
|
Loading…
Reference in New Issue
Block a user