mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-11-22 21:50:55 +00:00
5e7bf8c5e9
From commit b63f65aea0dea11c20e9299210af1d2ee4299b58: I used tmpfiles.d instead of activation snippets to create the logs. It's good enough for upstream and other distros; it's probably good enough for us. The "reboot-wtmp" subtest fails because it it assumes that there is a reboot record even on the initial boot. This is only the case if wtmp is created within the activation script, but the implementation now uses tmpfiles.d, so the creation of the file is done at a much later stage. Apart from that, if you think about the state after the installation as "first boot", using the term "reboot" wouldn't probably make sense either. So in our subtest, we now reboot the machine and check the wtmp record afterwards as we did before. Signed-off-by: aszlig <aszlig@nix.build> Cc: @edolstra, @jameysharp, @Mic92
143 lines
4.9 KiB
Nix
143 lines
4.9 KiB
Nix
# Miscellaneous small tests that don't warrant their own VM run.
|
|
|
|
import ./make-test.nix ({ pkgs, ...} : rec {
|
|
name = "misc";
|
|
meta = with pkgs.stdenv.lib.maintainers; {
|
|
maintainers = [ eelco chaoflow ];
|
|
};
|
|
|
|
foo = pkgs.writeText "foo" "Hello World";
|
|
|
|
machine =
|
|
{ lib, ... }:
|
|
with lib;
|
|
{ swapDevices = mkOverride 0
|
|
[ { device = "/root/swapfile"; size = 128; } ];
|
|
environment.variables.EDITOR = mkOverride 0 "emacs";
|
|
documentation.nixos.enable = mkOverride 0 true;
|
|
systemd.tmpfiles.rules = [ "d /tmp 1777 root root 10d" ];
|
|
fileSystems = mkVMOverride { "/tmp2" =
|
|
{ fsType = "tmpfs";
|
|
options = [ "mode=1777" "noauto" ];
|
|
};
|
|
};
|
|
systemd.automounts = singleton
|
|
{ wantedBy = [ "multi-user.target" ];
|
|
where = "/tmp2";
|
|
};
|
|
users.users.sybil = { isNormalUser = true; group = "wheel"; };
|
|
security.sudo = { enable = true; wheelNeedsPassword = false; };
|
|
boot.kernel.sysctl."vm.swappiness" = 1;
|
|
boot.kernelParams = [ "vsyscall=emulate" ];
|
|
system.extraDependencies = [ foo ];
|
|
};
|
|
|
|
testScript =
|
|
''
|
|
subtest "nix-db", sub {
|
|
my $json = $machine->succeed("nix path-info --json ${foo}");
|
|
$json =~ /"narHash":"sha256:0afw0d9j1hvwiz066z93jiddc33nxg6i6qyp26vnqyglpyfivlq5"/ or die "narHash not set";
|
|
$json =~ /"narSize":128/ or die "narSize not set";
|
|
};
|
|
|
|
subtest "nixos-version", sub {
|
|
$machine->succeed("[ `nixos-version | wc -w` = 2 ]");
|
|
};
|
|
|
|
subtest "nixos-rebuild", sub {
|
|
$machine->succeed("nixos-rebuild --help | grep 'NixOS module' ");
|
|
};
|
|
|
|
# Sanity check for uid/gid assignment.
|
|
subtest "users-groups", sub {
|
|
$machine->succeed("[ `id -u messagebus` = 4 ]");
|
|
$machine->succeed("[ `id -g messagebus` = 4 ]");
|
|
$machine->succeed("[ `getent group users` = 'users:x:100:' ]");
|
|
};
|
|
|
|
# Regression test for GMP aborts on QEMU.
|
|
subtest "gmp", sub {
|
|
$machine->succeed("expr 1 + 2");
|
|
};
|
|
|
|
# Test that the swap file got created.
|
|
subtest "swapfile", sub {
|
|
$machine->waitForUnit("root-swapfile.swap");
|
|
$machine->succeed("ls -l /root/swapfile | grep 134217728");
|
|
};
|
|
|
|
# Test whether kernel.poweroff_cmd is set.
|
|
subtest "poweroff_cmd", sub {
|
|
$machine->succeed("[ -x \"\$(cat /proc/sys/kernel/poweroff_cmd)\" ]")
|
|
};
|
|
|
|
# Test whether the blkio controller is properly enabled.
|
|
subtest "blkio-cgroup", sub {
|
|
$machine->succeed("[ -n \"\$(cat /sys/fs/cgroup/blkio/blkio.sectors)\" ]")
|
|
};
|
|
|
|
# Test whether we have a reboot record in wtmp.
|
|
subtest "reboot-wtmp", sub {
|
|
$machine->shutdown;
|
|
$machine->waitForUnit('multi-user.target');
|
|
$machine->succeed("last | grep reboot >&2");
|
|
};
|
|
|
|
# Test whether we can override environment variables.
|
|
subtest "override-env-var", sub {
|
|
$machine->succeed('[ "$EDITOR" = emacs ]');
|
|
};
|
|
|
|
# Test whether hostname (and by extension nss_myhostname) works.
|
|
subtest "hostname", sub {
|
|
$machine->succeed('[ "`hostname`" = machine ]');
|
|
#$machine->succeed('[ "`hostname -s`" = machine ]');
|
|
};
|
|
|
|
# Test whether systemd-udevd automatically loads modules for our hardware.
|
|
$machine->succeed("systemctl start systemd-udev-settle.service");
|
|
subtest "udev-auto-load", sub {
|
|
$machine->waitForUnit('systemd-udev-settle.service');
|
|
$machine->succeed('lsmod | grep mousedev');
|
|
};
|
|
|
|
# Test whether systemd-tmpfiles-clean works.
|
|
subtest "tmpfiles", sub {
|
|
$machine->succeed('touch /tmp/foo');
|
|
$machine->succeed('systemctl start systemd-tmpfiles-clean');
|
|
$machine->succeed('[ -e /tmp/foo ]');
|
|
$machine->succeed('date -s "@$(($(date +%s) + 1000000))"'); # move into the future
|
|
$machine->succeed('systemctl start systemd-tmpfiles-clean');
|
|
$machine->fail('[ -e /tmp/foo ]');
|
|
};
|
|
|
|
# Test whether automounting works.
|
|
subtest "automount", sub {
|
|
$machine->fail("grep '/tmp2 tmpfs' /proc/mounts");
|
|
$machine->succeed("touch /tmp2/x");
|
|
$machine->succeed("grep '/tmp2 tmpfs' /proc/mounts");
|
|
};
|
|
|
|
subtest "shell-vars", sub {
|
|
$machine->succeed('[ -n "$NIX_PATH" ]');
|
|
};
|
|
|
|
subtest "nix-db", sub {
|
|
$machine->succeed("nix-store -qR /run/current-system | grep nixos-");
|
|
};
|
|
|
|
# Test sysctl
|
|
subtest "sysctl", sub {
|
|
$machine->waitForUnit("systemd-sysctl.service");
|
|
$machine->succeed('[ `sysctl -ne vm.swappiness` = 1 ]');
|
|
$machine->execute('sysctl vm.swappiness=60');
|
|
$machine->succeed('[ `sysctl -ne vm.swappiness` = 60 ]');
|
|
};
|
|
|
|
# Test boot parameters
|
|
subtest "bootparam", sub {
|
|
$machine->succeed('grep -Fq vsyscall=emulate /proc/cmdline');
|
|
};
|
|
'';
|
|
})
|