mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-12-11 16:23:26 +00:00
861431f282
We will now ensure that no `initrdSecrets` leaks under no initrd secrets and that `initrdSecrets` are there if we do have initrd secrets.
202 lines
5.5 KiB
Nix
202 lines
5.5 KiB
Nix
{ system ? builtins.currentSystem,
|
|
config ? {},
|
|
pkgs ? import ../.. { inherit system config; }
|
|
}:
|
|
|
|
with import ../lib/testing-python.nix { inherit system pkgs; };
|
|
with pkgs.lib;
|
|
|
|
let
|
|
baseline = {
|
|
virtualisation.useBootLoader = true;
|
|
};
|
|
grub = {
|
|
boot.loader.grub.enable = true;
|
|
};
|
|
systemd-boot = {
|
|
boot.loader.systemd-boot.enable = true;
|
|
};
|
|
uefi = {
|
|
virtualisation.useEFIBoot = true;
|
|
boot.loader.efi.canTouchEfiVariables = true;
|
|
boot.loader.grub.efiSupport = true;
|
|
environment.systemPackages = [ pkgs.efibootmgr ];
|
|
};
|
|
standard = {
|
|
boot.bootspec.enable = true;
|
|
|
|
imports = [
|
|
baseline
|
|
systemd-boot
|
|
uefi
|
|
];
|
|
};
|
|
in
|
|
{
|
|
basic = makeTest {
|
|
name = "systemd-boot-with-bootspec";
|
|
meta.maintainers = with pkgs.lib.maintainers; [ raitobezarius ];
|
|
|
|
nodes.machine = standard;
|
|
|
|
testScript = ''
|
|
machine.start()
|
|
machine.wait_for_unit("multi-user.target")
|
|
|
|
machine.succeed("test -e /run/current-system/boot.json")
|
|
'';
|
|
};
|
|
|
|
grub = makeTest {
|
|
name = "grub-with-bootspec";
|
|
meta.maintainers = with pkgs.lib.maintainers; [ raitobezarius ];
|
|
|
|
nodes.machine = {
|
|
boot.bootspec.enable = true;
|
|
|
|
imports = [
|
|
baseline
|
|
grub
|
|
uefi
|
|
];
|
|
};
|
|
|
|
testScript = ''
|
|
machine.start()
|
|
machine.wait_for_unit("multi-user.target")
|
|
|
|
machine.succeed("test -e /run/current-system/boot.json")
|
|
'';
|
|
};
|
|
|
|
legacy-boot = makeTest {
|
|
name = "legacy-boot-with-bootspec";
|
|
meta.maintainers = with pkgs.lib.maintainers; [ raitobezarius ];
|
|
|
|
nodes.machine = {
|
|
boot.bootspec.enable = true;
|
|
|
|
imports = [
|
|
baseline
|
|
grub
|
|
];
|
|
};
|
|
|
|
testScript = ''
|
|
machine.start()
|
|
machine.wait_for_unit("multi-user.target")
|
|
|
|
machine.succeed("test -e /run/current-system/boot.json")
|
|
'';
|
|
};
|
|
|
|
# Check that initrd create corresponding entries in bootspec.
|
|
initrd = makeTest {
|
|
name = "bootspec-with-initrd";
|
|
meta.maintainers = with pkgs.lib.maintainers; [ raitobezarius ];
|
|
|
|
nodes.machine = {
|
|
imports = [ standard ];
|
|
environment.systemPackages = [ pkgs.jq ];
|
|
# It's probably the case, but we want to make it explicit here.
|
|
boot.initrd.enable = true;
|
|
};
|
|
|
|
testScript = ''
|
|
import json
|
|
|
|
machine.start()
|
|
machine.wait_for_unit("multi-user.target")
|
|
|
|
machine.succeed("test -e /run/current-system/boot.json")
|
|
|
|
bootspec = json.loads(machine.succeed("jq -r '.\"org.nixos.bootspec.v1\"' /run/current-system/boot.json"))
|
|
|
|
assert 'initrd' in bootspec, "Bootspec should contain initrd field when initrd is enabled"
|
|
assert 'initrdSecrets' not in bootspec, "Bootspec should not contain initrdSecrets when there's no initrdSecrets"
|
|
'';
|
|
};
|
|
|
|
# Check that initrd secrets create corresponding entries in bootspec.
|
|
initrd-secrets = makeTest {
|
|
name = "bootspec-with-initrd-secrets";
|
|
meta.maintainers = with pkgs.lib.maintainers; [ raitobezarius ];
|
|
|
|
nodes.machine = {
|
|
imports = [ standard ];
|
|
environment.systemPackages = [ pkgs.jq ];
|
|
# It's probably the case, but we want to make it explicit here.
|
|
boot.initrd.enable = true;
|
|
boot.initrd.secrets."/some/example" = pkgs.writeText "example-secret" "test";
|
|
};
|
|
|
|
testScript = ''
|
|
import json
|
|
|
|
machine.start()
|
|
machine.wait_for_unit("multi-user.target")
|
|
|
|
machine.succeed("test -e /run/current-system/boot.json")
|
|
|
|
bootspec = json.loads(machine.succeed("jq -r '.\"org.nixos.bootspec.v1\"' /run/current-system/boot.json"))
|
|
|
|
assert 'initrdSecrets' in bootspec, "Bootspec should contain an 'initrdSecrets' field given there's an initrd secret"
|
|
'';
|
|
};
|
|
|
|
|
|
# Check that specialisations create corresponding entries in bootspec.
|
|
specialisation = makeTest {
|
|
name = "bootspec-with-specialisation";
|
|
meta.maintainers = with pkgs.lib.maintainers; [ raitobezarius ];
|
|
|
|
nodes.machine = {
|
|
imports = [ standard ];
|
|
environment.systemPackages = [ pkgs.jq ];
|
|
specialisation.something.configuration = {};
|
|
};
|
|
|
|
testScript = ''
|
|
import json
|
|
|
|
machine.start()
|
|
machine.wait_for_unit("multi-user.target")
|
|
|
|
machine.succeed("test -e /run/current-system/boot.json")
|
|
machine.succeed("test -e /run/current-system/specialisation/something/boot.json")
|
|
|
|
sp_in_parent = json.loads(machine.succeed("jq -r '.\"org.nixos.specialisation.v1\".something' /run/current-system/boot.json"))
|
|
sp_in_fs = json.loads(machine.succeed("cat /run/current-system/specialisation/something/boot.json"))
|
|
|
|
assert sp_in_parent['org.nixos.bootspec.v1'] == sp_in_fs['org.nixos.bootspec.v1'], "Bootspecs of the same specialisation are different!"
|
|
'';
|
|
};
|
|
|
|
# Check that extensions are propagated.
|
|
extensions = makeTest {
|
|
name = "bootspec-with-extensions";
|
|
meta.maintainers = with pkgs.lib.maintainers; [ raitobezarius ];
|
|
|
|
nodes.machine = { config, ... }: {
|
|
imports = [ standard ];
|
|
environment.systemPackages = [ pkgs.jq ];
|
|
boot.bootspec.extensions = {
|
|
"org.nix-tests.product" = {
|
|
osRelease = config.environment.etc."os-release".source;
|
|
};
|
|
};
|
|
};
|
|
|
|
testScript = ''
|
|
machine.start()
|
|
machine.wait_for_unit("multi-user.target")
|
|
|
|
current_os_release = machine.succeed("cat /etc/os-release")
|
|
bootspec_os_release = machine.succeed("cat $(jq -r '.\"org.nix-tests.product\".osRelease' /run/current-system/boot.json)")
|
|
|
|
assert current_os_release == bootspec_os_release, "Filename referenced by extension has unexpected contents"
|
|
'';
|
|
};
|
|
|
|
}
|