2012-04-19 19:56:35 +01:00
|
|
|
# Miscellaneous small tests that don't warrant their own VM run.
|
|
|
|
|
2022-03-18 00:27:04 +00:00
|
|
|
import ./make-test-python.nix ({ pkgs, ...} : let
|
|
|
|
foo = pkgs.writeText "foo" "Hello World";
|
|
|
|
in {
|
2014-06-28 15:04:49 +01:00
|
|
|
name = "misc";
|
2021-01-10 19:08:30 +00:00
|
|
|
meta = with pkgs.lib.maintainers; {
|
2019-02-22 15:14:13 +00:00
|
|
|
maintainers = [ eelco ];
|
2015-07-12 11:09:40 +01:00
|
|
|
};
|
2012-04-19 19:56:35 +01:00
|
|
|
|
2022-03-20 23:15:30 +00:00
|
|
|
nodes.machine =
|
2018-07-20 21:56:59 +01:00
|
|
|
{ lib, ... }:
|
2014-04-29 14:29:52 +01:00
|
|
|
with lib;
|
|
|
|
{ swapDevices = mkOverride 0
|
2012-06-12 15:05:11 +01:00
|
|
|
[ { device = "/root/swapfile"; size = 128; } ];
|
2014-04-29 14:29:52 +01:00
|
|
|
environment.variables.EDITOR = mkOverride 0 "emacs";
|
2018-09-06 20:17:48 +01:00
|
|
|
documentation.nixos.enable = mkOverride 0 true;
|
2014-04-17 15:10:48 +01:00
|
|
|
systemd.tmpfiles.rules = [ "d /tmp 1777 root root 10d" ];
|
2021-02-14 11:23:50 +00:00
|
|
|
virtualisation.fileSystems = { "/tmp2" =
|
2014-07-30 12:15:29 +01:00
|
|
|
{ fsType = "tmpfs";
|
2015-10-21 18:37:14 +01:00
|
|
|
options = [ "mode=1777" "noauto" ];
|
2014-04-29 14:29:52 +01:00
|
|
|
};
|
2020-08-15 19:41:54 +01:00
|
|
|
# Tests https://discourse.nixos.org/t/how-to-make-a-derivations-executables-have-the-s-permission/8555
|
|
|
|
"/user-mount/point" = {
|
|
|
|
device = "/user-mount/source";
|
|
|
|
fsType = "none";
|
|
|
|
options = [ "bind" "rw" "user" "noauto" ];
|
|
|
|
};
|
|
|
|
"/user-mount/denied-point" = {
|
|
|
|
device = "/user-mount/denied-source";
|
|
|
|
fsType = "none";
|
|
|
|
options = [ "bind" "rw" "noauto" ];
|
|
|
|
};
|
2014-04-29 14:29:52 +01:00
|
|
|
};
|
|
|
|
systemd.automounts = singleton
|
|
|
|
{ wantedBy = [ "multi-user.target" ];
|
|
|
|
where = "/tmp2";
|
|
|
|
};
|
2016-03-25 05:28:01 +00:00
|
|
|
users.users.sybil = { isNormalUser = true; group = "wheel"; };
|
2020-08-15 19:41:54 +01:00
|
|
|
users.users.alice = { isNormalUser = true; };
|
2016-03-25 05:28:01 +00:00
|
|
|
security.sudo = { enable = true; wheelNeedsPassword = false; };
|
2017-09-16 10:47:21 +01:00
|
|
|
boot.kernel.sysctl."vm.swappiness" = 1;
|
2017-09-16 10:47:50 +01:00
|
|
|
boot.kernelParams = [ "vsyscall=emulate" ];
|
2018-02-07 14:47:19 +00:00
|
|
|
system.extraDependencies = [ foo ];
|
2012-06-12 15:05:11 +01:00
|
|
|
};
|
2012-04-19 19:56:35 +01:00
|
|
|
|
|
|
|
testScript =
|
|
|
|
''
|
2020-02-02 01:51:20 +00:00
|
|
|
import json
|
2018-02-07 14:47:19 +00:00
|
|
|
|
2012-04-19 19:56:35 +01:00
|
|
|
|
2020-02-02 01:51:20 +00:00
|
|
|
def get_path_info(path):
|
2021-11-10 04:13:14 +00:00
|
|
|
result = machine.succeed(f"nix --option experimental-features nix-command path-info --json {path}")
|
2020-02-02 01:51:20 +00:00
|
|
|
parsed = json.loads(result)
|
|
|
|
return parsed
|
2013-05-14 14:17:58 +01:00
|
|
|
|
2012-04-20 13:55:09 +01:00
|
|
|
|
2020-02-02 01:51:20 +00:00
|
|
|
with subtest("nix-db"):
|
|
|
|
info = get_path_info("${foo}")
|
2021-11-10 04:13:14 +00:00
|
|
|
print(info)
|
2012-06-12 15:05:11 +01:00
|
|
|
|
2020-02-02 01:51:20 +00:00
|
|
|
if (
|
|
|
|
info[0]["narHash"]
|
2021-11-10 04:13:14 +00:00
|
|
|
!= "sha256-BdMdnb/0eWy3EddjE83rdgzWWpQjfWPAj3zDIFMD3Ck="
|
2020-02-02 01:51:20 +00:00
|
|
|
):
|
|
|
|
raise Exception("narHash not set")
|
2013-03-27 16:20:41 +00:00
|
|
|
|
2020-02-02 01:51:20 +00:00
|
|
|
if info[0]["narSize"] != 128:
|
|
|
|
raise Exception("narSize not set")
|
2013-09-17 15:16:59 +01:00
|
|
|
|
2020-02-02 01:51:20 +00:00
|
|
|
with subtest("nixos-version"):
|
|
|
|
machine.succeed("[ `nixos-version | wc -w` = 2 ]")
|
2013-09-22 15:44:41 +01:00
|
|
|
|
2020-02-02 01:51:20 +00:00
|
|
|
with subtest("nixos-rebuild"):
|
|
|
|
assert "NixOS module" in machine.succeed("nixos-rebuild --help")
|
2013-09-24 10:27:25 +01:00
|
|
|
|
2020-02-02 01:51:20 +00:00
|
|
|
with subtest("Sanity check for uid/gid assignment"):
|
|
|
|
assert "4" == machine.succeed("id -u messagebus").strip()
|
|
|
|
assert "4" == machine.succeed("id -g messagebus").strip()
|
|
|
|
assert "users:x:100:" == machine.succeed("getent group users").strip()
|
2013-11-26 17:52:34 +00:00
|
|
|
|
2020-02-02 01:51:20 +00:00
|
|
|
with subtest("Regression test for GMP aborts on QEMU."):
|
|
|
|
machine.succeed("expr 1 + 2")
|
2014-04-17 11:22:24 +01:00
|
|
|
|
2020-02-02 01:51:20 +00:00
|
|
|
with subtest("the swap file got created"):
|
|
|
|
machine.wait_for_unit("root-swapfile.swap")
|
|
|
|
machine.succeed("ls -l /root/swapfile | grep 134217728")
|
2014-04-17 15:10:48 +01:00
|
|
|
|
2020-02-02 01:51:20 +00:00
|
|
|
with subtest("whether kernel.poweroff_cmd is set"):
|
|
|
|
machine.succeed('[ -x "$(cat /proc/sys/kernel/poweroff_cmd)" ]')
|
2014-04-29 14:29:52 +01:00
|
|
|
|
2020-12-01 16:03:53 +00:00
|
|
|
with subtest("whether the io cgroupv2 controller is properly enabled"):
|
|
|
|
machine.succeed("grep -q '\\bio\\b' /sys/fs/cgroup/cgroup.controllers")
|
2014-06-13 17:33:58 +01:00
|
|
|
|
2020-02-02 01:51:20 +00:00
|
|
|
with subtest("whether we have a reboot record in wtmp"):
|
|
|
|
machine.shutdown
|
|
|
|
machine.wait_for_unit("multi-user.target")
|
|
|
|
machine.succeed("last | grep reboot >&2")
|
2015-04-07 12:23:18 +01:00
|
|
|
|
2020-02-02 01:51:20 +00:00
|
|
|
with subtest("whether we can override environment variables"):
|
|
|
|
machine.succeed('[ "$EDITOR" = emacs ]')
|
2016-03-25 05:28:01 +00:00
|
|
|
|
2020-02-02 01:51:20 +00:00
|
|
|
with subtest("whether hostname (and by extension nss_myhostname) works"):
|
|
|
|
assert "machine" == machine.succeed("hostname").strip()
|
|
|
|
assert "machine" == machine.succeed("hostname -s").strip()
|
2017-09-16 10:47:50 +01:00
|
|
|
|
2020-02-02 01:51:20 +00:00
|
|
|
with subtest("whether systemd-udevd automatically loads modules for our hardware"):
|
|
|
|
machine.succeed("systemctl start systemd-udev-settle.service")
|
|
|
|
machine.wait_for_unit("systemd-udev-settle.service")
|
|
|
|
assert "mousedev" in machine.succeed("lsmod")
|
|
|
|
|
|
|
|
with subtest("whether systemd-tmpfiles-clean works"):
|
|
|
|
machine.succeed(
|
|
|
|
"touch /tmp/foo", "systemctl start systemd-tmpfiles-clean", "[ -e /tmp/foo ]"
|
|
|
|
)
|
|
|
|
# move into the future
|
|
|
|
machine.succeed(
|
|
|
|
'date -s "@$(($(date +%s) + 1000000))"',
|
|
|
|
"systemctl start systemd-tmpfiles-clean",
|
|
|
|
)
|
|
|
|
machine.fail("[ -e /tmp/foo ]")
|
|
|
|
|
|
|
|
with subtest("whether automounting works"):
|
|
|
|
machine.fail("grep '/tmp2 tmpfs' /proc/mounts")
|
|
|
|
machine.succeed("touch /tmp2/x")
|
|
|
|
machine.succeed("grep '/tmp2 tmpfs' /proc/mounts")
|
|
|
|
|
2020-08-15 19:41:54 +01:00
|
|
|
with subtest(
|
|
|
|
"Whether mounting by a user is possible with the `user` option in fstab (#95444)"
|
|
|
|
):
|
|
|
|
machine.succeed("mkdir -p /user-mount/source")
|
|
|
|
machine.succeed("touch /user-mount/source/file")
|
|
|
|
machine.succeed("chmod -R a+Xr /user-mount/source")
|
|
|
|
machine.succeed("mkdir /user-mount/point")
|
|
|
|
machine.succeed("chown alice:users /user-mount/point")
|
|
|
|
machine.succeed("su - alice -c 'mount /user-mount/point'")
|
|
|
|
machine.succeed("su - alice -c 'ls /user-mount/point/file'")
|
|
|
|
with subtest(
|
|
|
|
"Whether mounting by a user is denied without the `user` option in fstab"
|
|
|
|
):
|
|
|
|
machine.succeed("mkdir -p /user-mount/denied-source")
|
|
|
|
machine.succeed("touch /user-mount/denied-source/file")
|
|
|
|
machine.succeed("chmod -R a+Xr /user-mount/denied-source")
|
|
|
|
machine.succeed("mkdir /user-mount/denied-point")
|
|
|
|
machine.succeed("chown alice:users /user-mount/denied-point")
|
|
|
|
machine.fail("su - alice -c 'mount /user-mount/denied-point'")
|
|
|
|
|
2020-02-02 01:51:20 +00:00
|
|
|
with subtest("shell-vars"):
|
|
|
|
machine.succeed('[ -n "$NIX_PATH" ]')
|
|
|
|
|
|
|
|
with subtest("nix-db"):
|
|
|
|
machine.succeed("nix-store -qR /run/current-system | grep nixos-")
|
|
|
|
|
|
|
|
with subtest("Test sysctl"):
|
|
|
|
machine.wait_for_unit("systemd-sysctl.service")
|
|
|
|
assert "1" == machine.succeed("sysctl -ne vm.swappiness").strip()
|
|
|
|
machine.execute("sysctl vm.swappiness=60")
|
|
|
|
assert "60" == machine.succeed("sysctl -ne vm.swappiness").strip()
|
|
|
|
|
|
|
|
with subtest("Test boot parameters"):
|
|
|
|
assert "vsyscall=emulate" in machine.succeed("cat /proc/cmdline")
|
2012-04-19 19:56:35 +01:00
|
|
|
'';
|
2015-07-12 11:09:40 +01:00
|
|
|
})
|