 25bef2d8f9
			
		
	
	
		25bef2d8f9
		
	
	
	
	
		
			
			The library does not depend on stdenv, that `stdenv` exposes `lib` is an artifact of the ancient origins of nixpkgs.
		
			
				
	
	
		
			163 lines
		
	
	
		
			6.2 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
			
		
		
	
	
			163 lines
		
	
	
		
			6.2 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
| # Miscellaneous small tests that don't warrant their own VM run.
 | |
| 
 | |
| import ./make-test-python.nix ({ pkgs, ...} : rec {
 | |
|   name = "misc";
 | |
|   meta = with pkgs.lib.maintainers; {
 | |
|     maintainers = [ eelco ];
 | |
|   };
 | |
| 
 | |
|   foo = pkgs.writeText "foo" "Hello World";
 | |
| 
 | |
|   machine =
 | |
|     { lib, ... }:
 | |
|     with lib;
 | |
|     { swapDevices = mkOverride 0
 | |
|         [ { device = "/root/swapfile"; size = 128; } ];
 | |
|       environment.variables.EDITOR = mkOverride 0 "emacs";
 | |
|       documentation.nixos.enable = mkOverride 0 true;
 | |
|       systemd.tmpfiles.rules = [ "d /tmp 1777 root root 10d" ];
 | |
|       fileSystems = mkVMOverride { "/tmp2" =
 | |
|         { fsType = "tmpfs";
 | |
|           options = [ "mode=1777" "noauto" ];
 | |
|         };
 | |
|         # Tests https://discourse.nixos.org/t/how-to-make-a-derivations-executables-have-the-s-permission/8555
 | |
|         "/user-mount/point" = {
 | |
|           device = "/user-mount/source";
 | |
|           fsType = "none";
 | |
|           options = [ "bind" "rw" "user" "noauto" ];
 | |
|         };
 | |
|         "/user-mount/denied-point" = {
 | |
|           device = "/user-mount/denied-source";
 | |
|           fsType = "none";
 | |
|           options = [ "bind" "rw" "noauto" ];
 | |
|         };
 | |
|       };
 | |
|       systemd.automounts = singleton
 | |
|         { wantedBy = [ "multi-user.target" ];
 | |
|           where = "/tmp2";
 | |
|         };
 | |
|       users.users.sybil = { isNormalUser = true; group = "wheel"; };
 | |
|       users.users.alice = { isNormalUser = true; };
 | |
|       security.sudo = { enable = true; wheelNeedsPassword = false; };
 | |
|       boot.kernel.sysctl."vm.swappiness" = 1;
 | |
|       boot.kernelParams = [ "vsyscall=emulate" ];
 | |
|       system.extraDependencies = [ foo ];
 | |
|     };
 | |
| 
 | |
|   testScript =
 | |
|     ''
 | |
|       import json
 | |
| 
 | |
| 
 | |
|       def get_path_info(path):
 | |
|           result = machine.succeed(f"nix path-info --json {path}")
 | |
|           parsed = json.loads(result)
 | |
|           return parsed
 | |
| 
 | |
| 
 | |
|       with subtest("nix-db"):
 | |
|           info = get_path_info("${foo}")
 | |
| 
 | |
|           if (
 | |
|               info[0]["narHash"]
 | |
|               != "sha256:0afw0d9j1hvwiz066z93jiddc33nxg6i6qyp26vnqyglpyfivlq5"
 | |
|           ):
 | |
|               raise Exception("narHash not set")
 | |
| 
 | |
|           if info[0]["narSize"] != 128:
 | |
|               raise Exception("narSize not set")
 | |
| 
 | |
|       with subtest("nixos-version"):
 | |
|           machine.succeed("[ `nixos-version | wc -w` = 2 ]")
 | |
| 
 | |
|       with subtest("nixos-rebuild"):
 | |
|           assert "NixOS module" in machine.succeed("nixos-rebuild --help")
 | |
| 
 | |
|       with subtest("Sanity check for uid/gid assignment"):
 | |
|           assert "4" == machine.succeed("id -u messagebus").strip()
 | |
|           assert "4" == machine.succeed("id -g messagebus").strip()
 | |
|           assert "users:x:100:" == machine.succeed("getent group users").strip()
 | |
| 
 | |
|       with subtest("Regression test for GMP aborts on QEMU."):
 | |
|           machine.succeed("expr 1 + 2")
 | |
| 
 | |
|       with subtest("the swap file got created"):
 | |
|           machine.wait_for_unit("root-swapfile.swap")
 | |
|           machine.succeed("ls -l /root/swapfile | grep 134217728")
 | |
| 
 | |
|       with subtest("whether kernel.poweroff_cmd is set"):
 | |
|           machine.succeed('[ -x "$(cat /proc/sys/kernel/poweroff_cmd)" ]')
 | |
| 
 | |
|       with subtest("whether the io cgroupv2 controller is properly enabled"):
 | |
|           machine.succeed("grep -q '\\bio\\b' /sys/fs/cgroup/cgroup.controllers")
 | |
| 
 | |
|       with subtest("whether we have a reboot record in wtmp"):
 | |
|           machine.shutdown
 | |
|           machine.wait_for_unit("multi-user.target")
 | |
|           machine.succeed("last | grep reboot >&2")
 | |
| 
 | |
|       with subtest("whether we can override environment variables"):
 | |
|           machine.succeed('[ "$EDITOR" = emacs ]')
 | |
| 
 | |
|       with subtest("whether hostname (and by extension nss_myhostname) works"):
 | |
|           assert "machine" == machine.succeed("hostname").strip()
 | |
|           assert "machine" == machine.succeed("hostname -s").strip()
 | |
| 
 | |
|       with subtest("whether systemd-udevd automatically loads modules for our hardware"):
 | |
|           machine.succeed("systemctl start systemd-udev-settle.service")
 | |
|           machine.wait_for_unit("systemd-udev-settle.service")
 | |
|           assert "mousedev" in machine.succeed("lsmod")
 | |
| 
 | |
|       with subtest("whether systemd-tmpfiles-clean works"):
 | |
|           machine.succeed(
 | |
|               "touch /tmp/foo", "systemctl start systemd-tmpfiles-clean", "[ -e /tmp/foo ]"
 | |
|           )
 | |
|           # move into the future
 | |
|           machine.succeed(
 | |
|               'date -s "@$(($(date +%s) + 1000000))"',
 | |
|               "systemctl start systemd-tmpfiles-clean",
 | |
|           )
 | |
|           machine.fail("[ -e /tmp/foo ]")
 | |
| 
 | |
|       with subtest("whether automounting works"):
 | |
|           machine.fail("grep '/tmp2 tmpfs' /proc/mounts")
 | |
|           machine.succeed("touch /tmp2/x")
 | |
|           machine.succeed("grep '/tmp2 tmpfs' /proc/mounts")
 | |
| 
 | |
|       with subtest(
 | |
|           "Whether mounting by a user is possible with the `user` option in fstab (#95444)"
 | |
|       ):
 | |
|           machine.succeed("mkdir -p /user-mount/source")
 | |
|           machine.succeed("touch /user-mount/source/file")
 | |
|           machine.succeed("chmod -R a+Xr /user-mount/source")
 | |
|           machine.succeed("mkdir /user-mount/point")
 | |
|           machine.succeed("chown alice:users /user-mount/point")
 | |
|           machine.succeed("su - alice -c 'mount /user-mount/point'")
 | |
|           machine.succeed("su - alice -c 'ls /user-mount/point/file'")
 | |
|       with subtest(
 | |
|           "Whether mounting by a user is denied without the `user` option in  fstab"
 | |
|       ):
 | |
|           machine.succeed("mkdir -p /user-mount/denied-source")
 | |
|           machine.succeed("touch /user-mount/denied-source/file")
 | |
|           machine.succeed("chmod -R a+Xr /user-mount/denied-source")
 | |
|           machine.succeed("mkdir /user-mount/denied-point")
 | |
|           machine.succeed("chown alice:users /user-mount/denied-point")
 | |
|           machine.fail("su - alice -c 'mount /user-mount/denied-point'")
 | |
| 
 | |
|       with subtest("shell-vars"):
 | |
|           machine.succeed('[ -n "$NIX_PATH" ]')
 | |
| 
 | |
|       with subtest("nix-db"):
 | |
|           machine.succeed("nix-store -qR /run/current-system | grep nixos-")
 | |
| 
 | |
|       with subtest("Test sysctl"):
 | |
|           machine.wait_for_unit("systemd-sysctl.service")
 | |
|           assert "1" == machine.succeed("sysctl -ne vm.swappiness").strip()
 | |
|           machine.execute("sysctl vm.swappiness=60")
 | |
|           assert "60" == machine.succeed("sysctl -ne vm.swappiness").strip()
 | |
| 
 | |
|       with subtest("Test boot parameters"):
 | |
|           assert "vsyscall=emulate" in machine.succeed("cat /proc/cmdline")
 | |
|     '';
 | |
| })
 |