2014-04-14 14:02:44 +02:00
|
|
|
{ system ? builtins.currentSystem }:
|
2010-01-06 14:36:21 +01:00
|
|
|
|
2014-04-14 14:02:44 +02:00
|
|
|
with import ../lib/testing.nix { inherit system; };
|
|
|
|
with pkgs.lib;
|
2010-01-10 02:26:01 +01:00
|
|
|
|
2010-01-07 14:19:38 +01:00
|
|
|
let
|
2010-01-06 14:36:21 +01:00
|
|
|
|
2010-01-06 21:52:05 +01:00
|
|
|
# The configuration to install.
|
2017-02-15 23:59:40 +01:00
|
|
|
makeConfig = { bootLoader, grubVersion, grubDevice, grubIdentifier, grubUseEfi
|
2015-06-10 15:18:54 +02:00
|
|
|
, extraConfig, forceGrubReinstallCount ? 0
|
2015-05-21 12:37:14 +02:00
|
|
|
}:
|
2014-08-31 18:18:13 +02:00
|
|
|
pkgs.writeText "configuration.nix" ''
|
2014-12-05 18:19:27 +01:00
|
|
|
{ config, lib, pkgs, modulesPath, ... }:
|
2010-01-06 21:52:05 +01:00
|
|
|
|
2013-09-04 13:05:09 +02:00
|
|
|
{ imports =
|
2013-10-13 17:24:11 +02:00
|
|
|
[ ./hardware-configuration.nix
|
2014-03-30 16:52:56 +02:00
|
|
|
<nixpkgs/nixos/modules/testing/test-instrumentation.nix>
|
2010-01-06 21:52:05 +01:00
|
|
|
];
|
|
|
|
|
2017-08-24 00:54:31 +02:00
|
|
|
# To ensure that we can rebuild the grub configuration on the nixos-rebuild
|
|
|
|
system.extraDependencies = with pkgs; [ stdenvNoCC ];
|
|
|
|
|
2016-04-23 13:20:34 +02:00
|
|
|
${optionalString (bootLoader == "grub") ''
|
|
|
|
boot.loader.grub.version = ${toString grubVersion};
|
|
|
|
${optionalString (grubVersion == 1) ''
|
|
|
|
boot.loader.grub.splashImage = null;
|
|
|
|
''}
|
2017-02-15 23:59:40 +01:00
|
|
|
|
2016-04-23 13:20:34 +02:00
|
|
|
boot.loader.grub.extraConfig = "serial; terminal_output.serial";
|
2017-02-15 23:59:40 +01:00
|
|
|
${if grubUseEfi then ''
|
|
|
|
boot.loader.grub.device = "nodev";
|
|
|
|
boot.loader.grub.efiSupport = true;
|
|
|
|
boot.loader.grub.efiInstallAsRemovable = true; # XXX: needed for OVMF?
|
|
|
|
'' else ''
|
|
|
|
boot.loader.grub.device = "${grubDevice}";
|
|
|
|
boot.loader.grub.fsIdentifier = "${grubIdentifier}";
|
|
|
|
''}
|
2016-04-23 13:20:34 +02:00
|
|
|
|
|
|
|
boot.loader.grub.configurationLimit = 100 + ${toString forceGrubReinstallCount};
|
2012-04-11 11:42:53 +02:00
|
|
|
''}
|
2010-01-10 02:26:01 +01:00
|
|
|
|
2016-06-01 12:51:33 +02:00
|
|
|
${optionalString (bootLoader == "systemd-boot") ''
|
|
|
|
boot.loader.systemd-boot.enable = true;
|
2016-04-23 13:20:34 +02:00
|
|
|
''}
|
2014-09-04 19:30:25 +02:00
|
|
|
|
2017-02-20 20:57:16 +01:00
|
|
|
users.extraUsers.alice = {
|
|
|
|
isNormalUser = true;
|
|
|
|
home = "/home/alice";
|
|
|
|
description = "Alice Foobar";
|
|
|
|
};
|
|
|
|
|
2015-06-10 13:14:40 +02:00
|
|
|
hardware.enableAllFirmware = lib.mkForce false;
|
2014-12-09 13:27:00 +01:00
|
|
|
|
2015-05-21 12:37:14 +02:00
|
|
|
${replaceChars ["\n"] ["\n "] extraConfig}
|
2010-01-06 21:52:05 +01:00
|
|
|
}
|
|
|
|
'';
|
|
|
|
|
2011-09-14 20:20:50 +02:00
|
|
|
|
2013-09-16 13:24:49 +02:00
|
|
|
channelContents = [ pkgs.rlwrap ];
|
2011-09-14 20:20:50 +02:00
|
|
|
|
2010-01-10 02:26:01 +01:00
|
|
|
|
2015-06-10 13:14:40 +02:00
|
|
|
# The test script boots a NixOS VM, installs NixOS on an empty hard
|
2010-01-07 15:19:19 +01:00
|
|
|
# disk, and then reboot from the hard disk. It's parameterized with
|
|
|
|
# a test script fragment `createPartitions', which must create
|
2014-04-30 09:40:18 +02:00
|
|
|
# partitions and filesystems.
|
2017-02-15 23:59:40 +01:00
|
|
|
testScriptFun = { bootLoader, createPartitions, grubVersion, grubDevice, grubUseEfi
|
2015-05-21 12:40:07 +02:00
|
|
|
, grubIdentifier, preBootCommands, extraConfig
|
2015-05-21 12:37:14 +02:00
|
|
|
}:
|
2014-04-30 11:24:46 +02:00
|
|
|
let
|
2016-03-02 18:30:42 +01:00
|
|
|
iface = if grubVersion == 1 then "ide" else "virtio";
|
2017-02-15 23:59:40 +01:00
|
|
|
isEfi = bootLoader == "systemd-boot" || (bootLoader == "grub" && grubUseEfi);
|
2014-04-30 11:24:46 +02:00
|
|
|
qemuFlags =
|
2015-06-10 13:14:40 +02:00
|
|
|
(if system == "x86_64-linux" then "-m 768 " else "-m 512 ") +
|
|
|
|
(optionalString (system == "x86_64-linux") "-cpu kvm64 ");
|
2016-04-23 13:20:34 +02:00
|
|
|
hdFlags = ''hda => "vm-state-machine/machine.qcow2", hdaInterface => "${iface}", ''
|
2017-02-15 23:59:40 +01:00
|
|
|
+ optionalString isEfi ''bios => "${pkgs.OVMF.fd}/FV/OVMF.fd", '';
|
2014-04-30 11:24:46 +02:00
|
|
|
in
|
2010-01-06 14:36:21 +01:00
|
|
|
''
|
2010-01-10 02:26:01 +01:00
|
|
|
$machine->start;
|
2010-01-06 14:36:21 +01:00
|
|
|
|
2010-01-06 15:37:23 +01:00
|
|
|
# Make sure that we get a login prompt etc.
|
2012-10-24 18:22:53 +02:00
|
|
|
$machine->succeed("echo hello");
|
2012-11-09 11:45:57 +01:00
|
|
|
#$machine->waitForUnit('getty@tty2');
|
2017-08-29 16:15:15 +02:00
|
|
|
#$machine->waitForUnit("rogue");
|
2012-10-24 18:22:53 +02:00
|
|
|
$machine->waitForUnit("nixos-manual");
|
2010-01-06 21:52:05 +01:00
|
|
|
|
2014-05-30 21:22:25 +02:00
|
|
|
# Wait for hard disks to appear in /dev
|
|
|
|
$machine->succeed("udevadm settle");
|
|
|
|
|
2010-01-06 15:37:23 +01:00
|
|
|
# Partition the disk.
|
2010-01-07 14:19:38 +01:00
|
|
|
${createPartitions}
|
2010-01-06 15:37:23 +01:00
|
|
|
|
2010-01-06 21:52:05 +01:00
|
|
|
# Create the NixOS configuration.
|
2015-06-10 13:14:40 +02:00
|
|
|
$machine->succeed("nixos-generate-config --root /mnt");
|
2010-01-06 17:46:21 +01:00
|
|
|
|
2013-10-13 17:24:11 +02:00
|
|
|
$machine->succeed("cat /mnt/etc/nixos/hardware-configuration.nix >&2");
|
2010-01-06 21:52:05 +01:00
|
|
|
|
2010-01-07 14:19:38 +01:00
|
|
|
$machine->copyFileFromHost(
|
2017-02-15 23:59:40 +01:00
|
|
|
"${ makeConfig { inherit bootLoader grubVersion grubDevice grubIdentifier grubUseEfi extraConfig; } }",
|
2010-01-07 14:19:38 +01:00
|
|
|
"/mnt/etc/nixos/configuration.nix");
|
2010-01-06 17:46:21 +01:00
|
|
|
|
2010-01-06 21:52:05 +01:00
|
|
|
# Perform the installation.
|
2014-05-21 11:04:45 +02:00
|
|
|
$machine->succeed("nixos-install < /dev/null >&2");
|
2011-09-14 20:20:50 +02:00
|
|
|
|
2012-05-25 01:39:03 +02:00
|
|
|
# Do it again to make sure it's idempotent.
|
2014-05-21 11:04:45 +02:00
|
|
|
$machine->succeed("nixos-install < /dev/null >&2");
|
2012-05-25 01:39:03 +02:00
|
|
|
|
2014-04-30 14:51:27 +02:00
|
|
|
$machine->succeed("umount /mnt/boot || true");
|
|
|
|
$machine->succeed("umount /mnt");
|
|
|
|
$machine->succeed("sync");
|
|
|
|
|
2010-01-06 15:37:23 +01:00
|
|
|
$machine->shutdown;
|
2010-01-06 16:14:26 +01:00
|
|
|
|
|
|
|
# Now see if we can boot the installation.
|
2017-02-20 20:57:16 +01:00
|
|
|
$machine = createMachine({ ${hdFlags} qemuFlags => "${qemuFlags}", name => "boot-after-install" });
|
2011-09-14 20:20:50 +02:00
|
|
|
|
2015-06-10 13:14:40 +02:00
|
|
|
# For example to enter LUKS passphrase.
|
2015-05-21 12:40:07 +02:00
|
|
|
${preBootCommands}
|
|
|
|
|
2014-04-30 11:24:46 +02:00
|
|
|
# Did /boot get mounted?
|
2012-10-24 12:58:58 +02:00
|
|
|
$machine->waitForUnit("local-fs.target");
|
2014-04-30 11:24:46 +02:00
|
|
|
|
2016-04-23 13:20:34 +02:00
|
|
|
${if bootLoader == "grub" then
|
|
|
|
''$machine->succeed("test -e /boot/grub");''
|
|
|
|
else
|
|
|
|
''$machine->succeed("test -e /boot/loader/loader.conf");''
|
|
|
|
}
|
2010-01-07 15:59:43 +01:00
|
|
|
|
2015-01-15 18:36:38 +01:00
|
|
|
# Check whether /root has correct permissions.
|
|
|
|
$machine->succeed("stat -c '%a' /root") =~ /700/ or die;
|
|
|
|
|
2010-01-07 15:59:43 +01:00
|
|
|
# Did the swap device get activated?
|
2014-12-07 20:58:48 +01:00
|
|
|
# uncomment once https://bugs.freedesktop.org/show_bug.cgi?id=86930 is resolved
|
2017-01-25 16:55:11 +01:00
|
|
|
$machine->waitForUnit("swap.target");
|
|
|
|
$machine->succeed("cat /proc/swaps | grep -q /dev");
|
2011-09-14 20:20:50 +02:00
|
|
|
|
2017-02-20 20:57:16 +01:00
|
|
|
# Check that the store is in good shape
|
|
|
|
$machine->succeed("nix-store --verify --check-contents >&2");
|
|
|
|
|
2014-04-30 11:24:46 +02:00
|
|
|
# Check whether the channel works.
|
2016-04-12 16:24:45 +02:00
|
|
|
$machine->succeed("nix-env -iA nixos.procps >&2");
|
|
|
|
$machine->succeed("type -tP ps | tee /dev/stderr") =~ /.nix-profile/
|
2010-01-06 21:52:05 +01:00
|
|
|
or die "nix-env failed";
|
|
|
|
|
2017-02-20 20:57:16 +01:00
|
|
|
# Check that the daemon works, and that non-root users can run builds (this will build a new profile generation through the daemon)
|
|
|
|
$machine->succeed("su alice -l -c 'nix-env -iA nixos.procps' >&2");
|
|
|
|
|
2018-02-07 19:32:41 +01:00
|
|
|
# We need a writable Nix store on next boot.
|
2014-09-04 19:30:25 +02:00
|
|
|
$machine->copyFileFromHost(
|
2017-02-15 23:59:40 +01:00
|
|
|
"${ makeConfig { inherit bootLoader grubVersion grubDevice grubIdentifier grubUseEfi extraConfig; forceGrubReinstallCount = 1; } }",
|
2014-09-04 19:30:25 +02:00
|
|
|
"/etc/nixos/configuration.nix");
|
|
|
|
|
2014-04-30 11:24:46 +02:00
|
|
|
# Check whether nixos-rebuild works.
|
2012-10-24 18:22:53 +02:00
|
|
|
$machine->succeed("nixos-rebuild switch >&2");
|
2010-01-06 21:52:05 +01:00
|
|
|
|
2013-10-13 22:36:04 +02:00
|
|
|
# Test nixos-option.
|
|
|
|
$machine->succeed("nixos-option boot.initrd.kernelModules | grep virtio_console");
|
2014-09-05 18:49:05 +02:00
|
|
|
$machine->succeed("nixos-option boot.initrd.kernelModules | grep 'List of modules'");
|
2015-06-10 13:14:40 +02:00
|
|
|
$machine->succeed("nixos-option boot.initrd.kernelModules | grep qemu-guest.nix");
|
2013-10-13 22:36:04 +02:00
|
|
|
|
2010-01-06 16:14:26 +01:00
|
|
|
$machine->shutdown;
|
2010-01-06 23:53:27 +01:00
|
|
|
|
2014-09-04 19:30:25 +02:00
|
|
|
# Check whether a writable store build works
|
2017-02-20 20:57:16 +01:00
|
|
|
$machine = createMachine({ ${hdFlags} qemuFlags => "${qemuFlags}", name => "rebuild-switch" });
|
2015-05-21 12:40:07 +02:00
|
|
|
${preBootCommands}
|
2014-09-04 19:30:25 +02:00
|
|
|
$machine->waitForUnit("multi-user.target");
|
|
|
|
$machine->copyFileFromHost(
|
2017-02-15 23:59:40 +01:00
|
|
|
"${ makeConfig { inherit bootLoader grubVersion grubDevice grubIdentifier grubUseEfi extraConfig; forceGrubReinstallCount = 2; } }",
|
2014-09-04 19:30:25 +02:00
|
|
|
"/etc/nixos/configuration.nix");
|
|
|
|
$machine->succeed("nixos-rebuild boot >&2");
|
|
|
|
$machine->shutdown;
|
|
|
|
|
2010-01-06 23:53:27 +01:00
|
|
|
# And just to be sure, check that the machine still boots after
|
|
|
|
# "nixos-rebuild switch".
|
2017-02-20 20:57:16 +01:00
|
|
|
$machine = createMachine({ ${hdFlags} qemuFlags => "${qemuFlags}", "boot-after-rebuild-switch" });
|
2015-05-21 12:40:07 +02:00
|
|
|
${preBootCommands}
|
2012-10-24 18:22:53 +02:00
|
|
|
$machine->waitForUnit("network.target");
|
2010-01-06 23:53:27 +01:00
|
|
|
$machine->shutdown;
|
2010-01-06 16:14:26 +01:00
|
|
|
'';
|
2010-01-06 17:46:21 +01:00
|
|
|
|
2011-09-14 20:20:50 +02:00
|
|
|
|
2014-06-28 16:04:49 +02:00
|
|
|
makeInstallerTest = name:
|
2015-05-21 12:40:07 +02:00
|
|
|
{ createPartitions, preBootCommands ? "", extraConfig ? ""
|
2017-06-28 01:35:55 +02:00
|
|
|
, extraInstallerConfig ? {}
|
2016-06-01 12:51:33 +02:00
|
|
|
, bootLoader ? "grub" # either "grub" or "systemd-boot"
|
2017-02-15 23:59:40 +01:00
|
|
|
, grubVersion ? 2, grubDevice ? "/dev/vda", grubIdentifier ? "uuid", grubUseEfi ? false
|
2016-04-23 13:20:34 +02:00
|
|
|
, enableOCR ? false, meta ? {}
|
2015-05-21 12:37:14 +02:00
|
|
|
}:
|
2014-04-14 16:24:08 +02:00
|
|
|
makeTest {
|
2015-05-22 07:14:00 +02:00
|
|
|
inherit enableOCR;
|
2015-06-10 13:14:40 +02:00
|
|
|
name = "installer-" + name;
|
2015-07-12 12:09:40 +02:00
|
|
|
meta = with pkgs.stdenv.lib.maintainers; {
|
|
|
|
# put global maintainers here, individuals go into makeInstallerTest fkt call
|
|
|
|
maintainers = [ wkennington ] ++ (meta.maintainers or []);
|
|
|
|
};
|
2015-06-10 13:14:40 +02:00
|
|
|
nodes = {
|
|
|
|
|
2018-02-07 19:32:41 +01:00
|
|
|
# The configuration of the machine used to run "nixos-install".
|
2015-06-10 13:14:40 +02:00
|
|
|
machine =
|
|
|
|
{ config, lib, pkgs, ... }:
|
|
|
|
|
|
|
|
{ imports =
|
|
|
|
[ ../modules/profiles/installation-device.nix
|
|
|
|
../modules/profiles/base.nix
|
2017-06-28 01:35:55 +02:00
|
|
|
extraInstallerConfig
|
2015-06-10 13:14:40 +02:00
|
|
|
];
|
|
|
|
|
|
|
|
virtualisation.diskSize = 8 * 1024;
|
2015-12-01 11:23:19 +01:00
|
|
|
virtualisation.memorySize = 1024;
|
2015-06-10 13:14:40 +02:00
|
|
|
|
|
|
|
# Use a small /dev/vdb as the root disk for the
|
|
|
|
# installer. This ensures the target disk (/dev/vda) is
|
|
|
|
# the same during and after installation.
|
|
|
|
virtualisation.emptyDiskImages = [ 512 ];
|
2015-06-17 15:40:46 +02:00
|
|
|
virtualisation.bootDevice =
|
|
|
|
if grubVersion == 1 then "/dev/sdb" else "/dev/vdb";
|
|
|
|
virtualisation.qemu.diskInterface =
|
|
|
|
if grubVersion == 1 then "scsi" else "virtio";
|
2015-06-10 13:14:40 +02:00
|
|
|
|
2016-06-01 12:51:33 +02:00
|
|
|
boot.loader.systemd-boot.enable = mkIf (bootLoader == "systemd-boot") true;
|
2016-04-23 13:20:34 +02:00
|
|
|
|
2015-06-10 13:14:40 +02:00
|
|
|
hardware.enableAllFirmware = mkForce false;
|
|
|
|
|
|
|
|
# The test cannot access the network, so any packages we
|
|
|
|
# need must be included in the VM.
|
2016-07-24 17:17:04 +02:00
|
|
|
system.extraDependencies = with pkgs;
|
|
|
|
[ sudo
|
|
|
|
libxml2.bin
|
|
|
|
libxslt.bin
|
|
|
|
docbook5
|
|
|
|
docbook5_xsl
|
|
|
|
unionfs-fuse
|
|
|
|
ntp
|
2017-06-07 23:00:58 +02:00
|
|
|
nixos-artwork.wallpapers.gnome-dark
|
2016-07-24 17:17:04 +02:00
|
|
|
perlPackages.XMLLibXML
|
|
|
|
perlPackages.ListCompare
|
2016-07-17 22:16:58 +02:00
|
|
|
|
|
|
|
# add curl so that rather than seeing the test attempt to download
|
|
|
|
# curl's tarball, we see what it's trying to download
|
2016-07-24 17:17:04 +02:00
|
|
|
curl
|
2015-06-10 13:14:40 +02:00
|
|
|
]
|
2016-04-23 13:20:34 +02:00
|
|
|
++ optional (bootLoader == "grub" && grubVersion == 1) pkgs.grub
|
|
|
|
++ optionals (bootLoader == "grub" && grubVersion == 2) [ pkgs.grub2 pkgs.grub2_efi ];
|
2015-06-10 13:14:40 +02:00
|
|
|
|
|
|
|
nix.binaryCaches = mkForce [ ];
|
|
|
|
};
|
|
|
|
|
|
|
|
};
|
|
|
|
|
2010-01-10 02:26:01 +01:00
|
|
|
testScript = testScriptFun {
|
2016-04-23 13:20:34 +02:00
|
|
|
inherit bootLoader createPartitions preBootCommands
|
2017-02-15 23:59:40 +01:00
|
|
|
grubVersion grubDevice grubIdentifier grubUseEfi extraConfig;
|
2010-01-10 02:26:01 +01:00
|
|
|
};
|
2014-04-14 16:24:08 +02:00
|
|
|
};
|
2011-09-14 20:20:50 +02:00
|
|
|
|
2010-01-07 14:19:38 +01:00
|
|
|
|
|
|
|
in {
|
|
|
|
|
2010-05-16 22:44:45 +02:00
|
|
|
# !!! `parted mkpart' seems to silently create overlapping partitions.
|
|
|
|
|
|
|
|
|
2010-01-07 14:19:38 +01:00
|
|
|
# The (almost) simplest partitioning scheme: a swap partition and
|
|
|
|
# one big filesystem partition.
|
2014-06-28 16:04:49 +02:00
|
|
|
simple = makeInstallerTest "simple"
|
2011-09-14 20:20:50 +02:00
|
|
|
{ createPartitions =
|
2010-01-07 14:19:38 +01:00
|
|
|
''
|
2012-10-24 18:22:53 +02:00
|
|
|
$machine->succeed(
|
2017-10-08 15:35:47 +02:00
|
|
|
"parted --script /dev/vda mklabel msdos",
|
|
|
|
"parted --script /dev/vda -- mkpart primary linux-swap 1M 1024M",
|
|
|
|
"parted --script /dev/vda -- mkpart primary ext2 1024M -1s",
|
2010-01-07 14:19:38 +01:00
|
|
|
"udevadm settle",
|
|
|
|
"mkswap /dev/vda1 -L swap",
|
|
|
|
"swapon -L swap",
|
|
|
|
"mkfs.ext3 -L nixos /dev/vda2",
|
|
|
|
"mount LABEL=nixos /mnt",
|
|
|
|
);
|
|
|
|
'';
|
|
|
|
};
|
2011-09-14 20:20:50 +02:00
|
|
|
|
2016-06-01 12:51:33 +02:00
|
|
|
# Simple GPT/UEFI configuration using systemd-boot with 3 partitions: ESP, swap & root filesystem
|
2017-08-18 14:07:03 +02:00
|
|
|
simpleUefiSystemdBoot = makeInstallerTest "simpleUefiSystemdBoot"
|
2016-04-23 13:20:34 +02:00
|
|
|
{ createPartitions =
|
|
|
|
''
|
|
|
|
$machine->succeed(
|
2017-10-08 15:35:47 +02:00
|
|
|
"parted --script /dev/vda mklabel gpt",
|
|
|
|
"parted --script /dev/vda -- mkpart ESP fat32 1M 50MiB", # /boot
|
|
|
|
"parted --script /dev/vda -- set 1 boot on",
|
|
|
|
"parted --script /dev/vda -- mkpart primary linux-swap 50MiB 1024MiB",
|
|
|
|
"parted --script /dev/vda -- mkpart primary ext2 1024MiB -1MiB", # /
|
2016-04-23 13:20:34 +02:00
|
|
|
"udevadm settle",
|
|
|
|
"mkswap /dev/vda2 -L swap",
|
|
|
|
"swapon -L swap",
|
|
|
|
"mkfs.ext3 -L nixos /dev/vda3",
|
|
|
|
"mount LABEL=nixos /mnt",
|
|
|
|
"mkfs.vfat -n BOOT /dev/vda1",
|
|
|
|
"mkdir -p /mnt/boot",
|
|
|
|
"mount LABEL=BOOT /mnt/boot",
|
|
|
|
);
|
|
|
|
'';
|
2016-06-01 12:51:33 +02:00
|
|
|
bootLoader = "systemd-boot";
|
2016-04-23 13:20:34 +02:00
|
|
|
};
|
|
|
|
|
2017-02-15 23:59:40 +01:00
|
|
|
simpleUefiGrub = makeInstallerTest "simpleUefiGrub"
|
|
|
|
{ createPartitions =
|
|
|
|
''
|
|
|
|
$machine->succeed(
|
2017-11-19 22:49:36 +01:00
|
|
|
"parted --script /dev/vda mklabel gpt",
|
|
|
|
"parted --script /dev/vda -- mkpart ESP fat32 1M 50MiB", # /boot
|
|
|
|
"parted --script /dev/vda -- set 1 boot on",
|
|
|
|
"parted --script /dev/vda -- mkpart primary linux-swap 50MiB 1024MiB",
|
|
|
|
"parted --script /dev/vda -- mkpart primary ext2 1024MiB -1MiB", # /
|
2017-02-15 23:59:40 +01:00
|
|
|
"udevadm settle",
|
|
|
|
"mkswap /dev/vda2 -L swap",
|
|
|
|
"swapon -L swap",
|
|
|
|
"mkfs.ext3 -L nixos /dev/vda3",
|
|
|
|
"mount LABEL=nixos /mnt",
|
|
|
|
"mkfs.vfat -n BOOT /dev/vda1",
|
|
|
|
"mkdir -p /mnt/boot",
|
|
|
|
"mount LABEL=BOOT /mnt/boot",
|
|
|
|
);
|
|
|
|
'';
|
|
|
|
bootLoader = "grub";
|
|
|
|
grubUseEfi = true;
|
|
|
|
};
|
|
|
|
|
2010-01-07 14:19:38 +01:00
|
|
|
# Same as the previous, but now with a separate /boot partition.
|
2014-06-28 16:04:49 +02:00
|
|
|
separateBoot = makeInstallerTest "separateBoot"
|
2010-01-07 14:19:38 +01:00
|
|
|
{ createPartitions =
|
|
|
|
''
|
2012-10-24 18:22:53 +02:00
|
|
|
$machine->succeed(
|
2017-10-08 15:35:47 +02:00
|
|
|
"parted --script /dev/vda mklabel msdos",
|
|
|
|
"parted --script /dev/vda -- mkpart primary ext2 1M 50MB", # /boot
|
|
|
|
"parted --script /dev/vda -- mkpart primary linux-swap 50MB 1024M",
|
|
|
|
"parted --script /dev/vda -- mkpart primary ext2 1024M -1s", # /
|
2010-01-07 14:19:38 +01:00
|
|
|
"udevadm settle",
|
|
|
|
"mkswap /dev/vda2 -L swap",
|
|
|
|
"swapon -L swap",
|
|
|
|
"mkfs.ext3 -L nixos /dev/vda3",
|
|
|
|
"mount LABEL=nixos /mnt",
|
|
|
|
"mkfs.ext3 -L boot /dev/vda1",
|
2014-02-04 14:43:45 +01:00
|
|
|
"mkdir -p /mnt/boot",
|
2010-01-07 14:19:38 +01:00
|
|
|
"mount LABEL=boot /mnt/boot",
|
|
|
|
);
|
|
|
|
'';
|
|
|
|
};
|
2011-09-14 20:20:50 +02:00
|
|
|
|
2015-07-08 21:05:31 +02:00
|
|
|
# Same as the previous, but with fat32 /boot.
|
|
|
|
separateBootFat = makeInstallerTest "separateBootFat"
|
|
|
|
{ createPartitions =
|
|
|
|
''
|
|
|
|
$machine->succeed(
|
2017-10-08 15:35:47 +02:00
|
|
|
"parted --script /dev/vda mklabel msdos",
|
|
|
|
"parted --script /dev/vda -- mkpart primary ext2 1M 50MB", # /boot
|
|
|
|
"parted --script /dev/vda -- mkpart primary linux-swap 50MB 1024M",
|
|
|
|
"parted --script /dev/vda -- mkpart primary ext2 1024M -1s", # /
|
2015-07-08 21:05:31 +02:00
|
|
|
"udevadm settle",
|
|
|
|
"mkswap /dev/vda2 -L swap",
|
|
|
|
"swapon -L swap",
|
|
|
|
"mkfs.ext3 -L nixos /dev/vda3",
|
|
|
|
"mount LABEL=nixos /mnt",
|
|
|
|
"mkfs.vfat -n BOOT /dev/vda1",
|
|
|
|
"mkdir -p /mnt/boot",
|
|
|
|
"mount LABEL=BOOT /mnt/boot",
|
|
|
|
);
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2017-06-28 01:35:55 +02:00
|
|
|
# zfs on / with swap
|
|
|
|
zfsroot = makeInstallerTest "zfs-root"
|
|
|
|
{
|
|
|
|
extraInstallerConfig = {
|
|
|
|
boot.supportedFilesystems = [ "zfs" ];
|
|
|
|
};
|
|
|
|
|
|
|
|
extraConfig = ''
|
|
|
|
boot.supportedFilesystems = [ "zfs" ];
|
|
|
|
|
|
|
|
# Using by-uuid overrides the default of by-id, and is unique
|
|
|
|
# to the qemu disks, as they don't produce by-id paths for
|
|
|
|
# some reason.
|
|
|
|
boot.zfs.devNodes = "/dev/disk/by-uuid/";
|
|
|
|
networking.hostId = "00000000";
|
|
|
|
'';
|
|
|
|
|
|
|
|
createPartitions =
|
|
|
|
''
|
|
|
|
$machine->succeed(
|
2017-10-08 15:35:47 +02:00
|
|
|
"parted --script /dev/vda mklabel msdos",
|
|
|
|
"parted --script /dev/vda -- mkpart primary linux-swap 1M 1024M",
|
|
|
|
"parted --script /dev/vda -- mkpart primary 1024M -1s",
|
2017-06-28 01:35:55 +02:00
|
|
|
"udevadm settle",
|
|
|
|
|
|
|
|
"mkswap /dev/vda1 -L swap",
|
|
|
|
"swapon -L swap",
|
|
|
|
|
|
|
|
"zpool create rpool /dev/vda2",
|
|
|
|
"zfs create -o mountpoint=legacy rpool/root",
|
|
|
|
"mount -t zfs rpool/root /mnt",
|
|
|
|
|
|
|
|
"udevadm settle"
|
|
|
|
);
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2010-01-07 15:19:19 +01:00
|
|
|
# Create two physical LVM partitions combined into one volume group
|
2012-08-01 21:40:58 +02:00
|
|
|
# that contains the logical swap and root partitions.
|
2014-06-28 16:04:49 +02:00
|
|
|
lvm = makeInstallerTest "lvm"
|
2010-01-07 15:19:19 +01:00
|
|
|
{ createPartitions =
|
|
|
|
''
|
2012-10-24 18:22:53 +02:00
|
|
|
$machine->succeed(
|
2017-10-08 15:35:47 +02:00
|
|
|
"parted --script /dev/vda mklabel msdos",
|
|
|
|
"parted --script /dev/vda -- mkpart primary 1M 2048M", # PV1
|
|
|
|
"parted --script /dev/vda -- set 1 lvm on",
|
|
|
|
"parted --script /dev/vda -- mkpart primary 2048M -1s", # PV2
|
|
|
|
"parted --script /dev/vda -- set 2 lvm on",
|
2010-01-10 20:19:52 +01:00
|
|
|
"udevadm settle",
|
2012-08-01 21:40:58 +02:00
|
|
|
"pvcreate /dev/vda1 /dev/vda2",
|
|
|
|
"vgcreate MyVolGroup /dev/vda1 /dev/vda2",
|
2010-01-07 15:19:19 +01:00
|
|
|
"lvcreate --size 1G --name swap MyVolGroup",
|
|
|
|
"lvcreate --size 2G --name nixos MyVolGroup",
|
|
|
|
"mkswap -f /dev/MyVolGroup/swap -L swap",
|
|
|
|
"swapon -L swap",
|
2012-07-26 21:52:05 +02:00
|
|
|
"mkfs.xfs -L nixos /dev/MyVolGroup/nixos",
|
2010-01-07 15:19:19 +01:00
|
|
|
"mount LABEL=nixos /mnt",
|
|
|
|
);
|
|
|
|
'';
|
|
|
|
};
|
2010-05-16 22:44:45 +02:00
|
|
|
|
nixos/tests/installer: Add test for LUKS rootfs.
This serves as a regression test for #7859.
It's pretty straightforward, except from the fact that nixos-generate-
config doesn't detect LUKS devices and the "sleep 60".
As for the former, I have tried to add support for LUKS devices for
nixos-generate-config, but it's not so easy as it sounds, because we
need to create a device tree across all possible mappers and/or LVM up
to the "real" device and then decide whether it is relevant to what is
currently mounted. So I guess this is something for the nixpart branch
(see #2079).
And the latter isn't very trivial as well, because the LUKS passphrase
prompt is issued on /dev/console, which is the last "console=..." kernel
parameter (thus the `mkAfter`). So we can't simply grep the log, because
the prompt ends up being on one terminal only (tty0) and using select()
on $machine->{socket} doesn't work very well, because the FD is always
"ready for read". If we would read the FD, we would conflict with
$machine->connect and end up having an inconsistent state. Another idea
would be to use multithreading to do $machine->connect while feeding the
passphrase prompt in a loop and stop the thread once $machine->connect
is done. Turns out that this is not so easy as well, because the threads
need to share the $machine object and of course need to do properly
locking.
In the end I decided to use the "blindly hope that 60 seconds is enough"
approach for now and come up with a better solution later. Other VM
tests surely use sleep as well, but it's $machine->sleep, which is bound
to the clock of the VM, so if the build machine is on high load, a
$machine->sleep gets properly delayed but the timer outside the VM won't
get that delay, so the test is not deterministic.
Tested against the following revisions:
5e3fe39: Before the libgcrypt cleanup (a71f78a) that broke cryptsetup.
69a6848: While cryptsetup was broken (obviously the test failed).
15faa43: After cryptsetup has been switched to OpenSSL (fd588f9).
Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2015-05-21 12:42:00 +02:00
|
|
|
# Boot off an encrypted root partition
|
|
|
|
luksroot = makeInstallerTest "luksroot"
|
|
|
|
{ createPartitions = ''
|
|
|
|
$machine->succeed(
|
2017-10-08 15:35:47 +02:00
|
|
|
"parted --script /dev/vda mklabel msdos",
|
|
|
|
"parted --script /dev/vda -- mkpart primary ext2 1M 50MB", # /boot
|
|
|
|
"parted --script /dev/vda -- mkpart primary linux-swap 50M 1024M",
|
|
|
|
"parted --script /dev/vda -- mkpart primary 1024M -1s", # LUKS
|
nixos/tests/installer: Add test for LUKS rootfs.
This serves as a regression test for #7859.
It's pretty straightforward, except from the fact that nixos-generate-
config doesn't detect LUKS devices and the "sleep 60".
As for the former, I have tried to add support for LUKS devices for
nixos-generate-config, but it's not so easy as it sounds, because we
need to create a device tree across all possible mappers and/or LVM up
to the "real" device and then decide whether it is relevant to what is
currently mounted. So I guess this is something for the nixpart branch
(see #2079).
And the latter isn't very trivial as well, because the LUKS passphrase
prompt is issued on /dev/console, which is the last "console=..." kernel
parameter (thus the `mkAfter`). So we can't simply grep the log, because
the prompt ends up being on one terminal only (tty0) and using select()
on $machine->{socket} doesn't work very well, because the FD is always
"ready for read". If we would read the FD, we would conflict with
$machine->connect and end up having an inconsistent state. Another idea
would be to use multithreading to do $machine->connect while feeding the
passphrase prompt in a loop and stop the thread once $machine->connect
is done. Turns out that this is not so easy as well, because the threads
need to share the $machine object and of course need to do properly
locking.
In the end I decided to use the "blindly hope that 60 seconds is enough"
approach for now and come up with a better solution later. Other VM
tests surely use sleep as well, but it's $machine->sleep, which is bound
to the clock of the VM, so if the build machine is on high load, a
$machine->sleep gets properly delayed but the timer outside the VM won't
get that delay, so the test is not deterministic.
Tested against the following revisions:
5e3fe39: Before the libgcrypt cleanup (a71f78a) that broke cryptsetup.
69a6848: While cryptsetup was broken (obviously the test failed).
15faa43: After cryptsetup has been switched to OpenSSL (fd588f9).
Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2015-05-21 12:42:00 +02:00
|
|
|
"udevadm settle",
|
|
|
|
"mkswap /dev/vda2 -L swap",
|
|
|
|
"swapon -L swap",
|
|
|
|
"modprobe dm_mod dm_crypt",
|
|
|
|
"echo -n supersecret | cryptsetup luksFormat -q /dev/vda3 -",
|
|
|
|
"echo -n supersecret | cryptsetup luksOpen --key-file - /dev/vda3 cryptroot",
|
|
|
|
"mkfs.ext3 -L nixos /dev/mapper/cryptroot",
|
|
|
|
"mount LABEL=nixos /mnt",
|
|
|
|
"mkfs.ext3 -L boot /dev/vda1",
|
|
|
|
"mkdir -p /mnt/boot",
|
|
|
|
"mount LABEL=boot /mnt/boot",
|
|
|
|
);
|
|
|
|
'';
|
|
|
|
extraConfig = ''
|
|
|
|
boot.kernelParams = lib.mkAfter [ "console=tty0" ];
|
|
|
|
'';
|
2015-05-22 07:14:00 +02:00
|
|
|
enableOCR = true;
|
nixos/tests/installer: Add test for LUKS rootfs.
This serves as a regression test for #7859.
It's pretty straightforward, except from the fact that nixos-generate-
config doesn't detect LUKS devices and the "sleep 60".
As for the former, I have tried to add support for LUKS devices for
nixos-generate-config, but it's not so easy as it sounds, because we
need to create a device tree across all possible mappers and/or LVM up
to the "real" device and then decide whether it is relevant to what is
currently mounted. So I guess this is something for the nixpart branch
(see #2079).
And the latter isn't very trivial as well, because the LUKS passphrase
prompt is issued on /dev/console, which is the last "console=..." kernel
parameter (thus the `mkAfter`). So we can't simply grep the log, because
the prompt ends up being on one terminal only (tty0) and using select()
on $machine->{socket} doesn't work very well, because the FD is always
"ready for read". If we would read the FD, we would conflict with
$machine->connect and end up having an inconsistent state. Another idea
would be to use multithreading to do $machine->connect while feeding the
passphrase prompt in a loop and stop the thread once $machine->connect
is done. Turns out that this is not so easy as well, because the threads
need to share the $machine object and of course need to do properly
locking.
In the end I decided to use the "blindly hope that 60 seconds is enough"
approach for now and come up with a better solution later. Other VM
tests surely use sleep as well, but it's $machine->sleep, which is bound
to the clock of the VM, so if the build machine is on high load, a
$machine->sleep gets properly delayed but the timer outside the VM won't
get that delay, so the test is not deterministic.
Tested against the following revisions:
5e3fe39: Before the libgcrypt cleanup (a71f78a) that broke cryptsetup.
69a6848: While cryptsetup was broken (obviously the test failed).
15faa43: After cryptsetup has been switched to OpenSSL (fd588f9).
Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2015-05-21 12:42:00 +02:00
|
|
|
preBootCommands = ''
|
|
|
|
$machine->start;
|
2016-07-17 21:44:54 +02:00
|
|
|
$machine->waitForText(qr/Enter passphrase/);
|
nixos/tests/installer: Add test for LUKS rootfs.
This serves as a regression test for #7859.
It's pretty straightforward, except from the fact that nixos-generate-
config doesn't detect LUKS devices and the "sleep 60".
As for the former, I have tried to add support for LUKS devices for
nixos-generate-config, but it's not so easy as it sounds, because we
need to create a device tree across all possible mappers and/or LVM up
to the "real" device and then decide whether it is relevant to what is
currently mounted. So I guess this is something for the nixpart branch
(see #2079).
And the latter isn't very trivial as well, because the LUKS passphrase
prompt is issued on /dev/console, which is the last "console=..." kernel
parameter (thus the `mkAfter`). So we can't simply grep the log, because
the prompt ends up being on one terminal only (tty0) and using select()
on $machine->{socket} doesn't work very well, because the FD is always
"ready for read". If we would read the FD, we would conflict with
$machine->connect and end up having an inconsistent state. Another idea
would be to use multithreading to do $machine->connect while feeding the
passphrase prompt in a loop and stop the thread once $machine->connect
is done. Turns out that this is not so easy as well, because the threads
need to share the $machine object and of course need to do properly
locking.
In the end I decided to use the "blindly hope that 60 seconds is enough"
approach for now and come up with a better solution later. Other VM
tests surely use sleep as well, but it's $machine->sleep, which is bound
to the clock of the VM, so if the build machine is on high load, a
$machine->sleep gets properly delayed but the timer outside the VM won't
get that delay, so the test is not deterministic.
Tested against the following revisions:
5e3fe39: Before the libgcrypt cleanup (a71f78a) that broke cryptsetup.
69a6848: While cryptsetup was broken (obviously the test failed).
15faa43: After cryptsetup has been switched to OpenSSL (fd588f9).
Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2015-05-21 12:42:00 +02:00
|
|
|
$machine->sendChars("supersecret\n");
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2017-09-12 13:57:37 +02:00
|
|
|
# Test whether opening encrypted filesystem with keyfile
|
|
|
|
# Checks for regression of missing cryptsetup, when no luks device without
|
|
|
|
# keyfile is configured
|
|
|
|
filesystemEncryptedWithKeyfile = makeInstallerTest "filesystemEncryptedWithKeyfile"
|
|
|
|
{ createPartitions = ''
|
|
|
|
$machine->succeed(
|
2017-11-19 22:54:35 +01:00
|
|
|
"parted --script /dev/vda mklabel msdos",
|
|
|
|
"parted --script /dev/vda -- mkpart primary ext2 1M 50MB", # /boot
|
|
|
|
"parted --script /dev/vda -- mkpart primary linux-swap 50M 1024M",
|
|
|
|
"parted --script /dev/vda -- mkpart primary 1024M 1280M", # LUKS with keyfile
|
|
|
|
"parted --script /dev/vda -- mkpart primary 1280M -1s",
|
2017-09-12 13:57:37 +02:00
|
|
|
"udevadm settle",
|
|
|
|
"mkswap /dev/vda2 -L swap",
|
|
|
|
"swapon -L swap",
|
|
|
|
"mkfs.ext3 -L nixos /dev/vda4",
|
|
|
|
"mount LABEL=nixos /mnt",
|
|
|
|
"mkfs.ext3 -L boot /dev/vda1",
|
|
|
|
"mkdir -p /mnt/boot",
|
|
|
|
"mount LABEL=boot /mnt/boot",
|
|
|
|
"modprobe dm_mod dm_crypt",
|
|
|
|
"echo -n supersecret > /mnt/keyfile",
|
|
|
|
"cryptsetup luksFormat -q /dev/vda3 --key-file /mnt/keyfile",
|
|
|
|
"cryptsetup luksOpen --key-file /mnt/keyfile /dev/vda3 crypt",
|
|
|
|
"mkfs.ext3 -L test /dev/mapper/crypt",
|
|
|
|
"cryptsetup luksClose crypt",
|
|
|
|
"mkdir -p /mnt/test"
|
|
|
|
);
|
|
|
|
'';
|
|
|
|
extraConfig = ''
|
|
|
|
fileSystems."/test" =
|
|
|
|
{ device = "/dev/disk/by-label/test";
|
|
|
|
fsType = "ext3";
|
|
|
|
encrypted.enable = true;
|
|
|
|
encrypted.blkDev = "/dev/vda3";
|
|
|
|
encrypted.label = "crypt";
|
|
|
|
encrypted.keyFile = "/mnt-root/keyfile";
|
|
|
|
};
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2014-06-28 16:04:49 +02:00
|
|
|
swraid = makeInstallerTest "swraid"
|
2010-05-16 22:44:45 +02:00
|
|
|
{ createPartitions =
|
|
|
|
''
|
2012-10-24 18:22:53 +02:00
|
|
|
$machine->succeed(
|
2017-10-08 15:35:47 +02:00
|
|
|
"parted --script /dev/vda --"
|
2010-07-13 13:57:12 +02:00
|
|
|
. " mklabel msdos"
|
2015-04-01 08:35:47 +02:00
|
|
|
. " mkpart primary ext2 1M 100MB" # /boot
|
|
|
|
. " mkpart extended 100M -1s"
|
2017-11-25 07:46:28 +01:00
|
|
|
. " mkpart logical 102M 2102M" # md0 (root), first device
|
|
|
|
. " mkpart logical 2103M 4103M" # md0 (root), second device
|
|
|
|
. " mkpart logical 4104M 4360M" # md1 (swap), first device
|
|
|
|
. " mkpart logical 4361M 4617M", # md1 (swap), second device
|
2010-05-16 22:44:45 +02:00
|
|
|
"udevadm settle",
|
2010-07-13 13:57:12 +02:00
|
|
|
"ls -l /dev/vda* >&2",
|
|
|
|
"cat /proc/partitions >&2",
|
2010-06-20 18:05:15 +02:00
|
|
|
"mdadm --create --force /dev/md0 --metadata 1.2 --level=raid1 --raid-devices=2 /dev/vda5 /dev/vda6",
|
|
|
|
"mdadm --create --force /dev/md1 --metadata 1.2 --level=raid1 --raid-devices=2 /dev/vda7 /dev/vda8",
|
2012-03-20 22:45:24 +01:00
|
|
|
"udevadm settle",
|
2010-05-16 22:44:45 +02:00
|
|
|
"mkswap -f /dev/md1 -L swap",
|
|
|
|
"swapon -L swap",
|
|
|
|
"mkfs.ext3 -L nixos /dev/md0",
|
|
|
|
"mount LABEL=nixos /mnt",
|
2010-06-20 18:05:15 +02:00
|
|
|
"mkfs.ext3 -L boot /dev/vda1",
|
|
|
|
"mkdir /mnt/boot",
|
|
|
|
"mount LABEL=boot /mnt/boot",
|
2012-03-20 22:45:24 +01:00
|
|
|
"udevadm settle",
|
2010-05-16 22:44:45 +02:00
|
|
|
);
|
|
|
|
'';
|
2016-05-06 12:12:35 +02:00
|
|
|
preBootCommands = ''
|
|
|
|
$machine->start;
|
|
|
|
$machine->fail("dmesg | grep 'immediate safe mode'");
|
|
|
|
'';
|
2010-05-16 22:44:45 +02:00
|
|
|
};
|
2010-09-25 11:32:22 +02:00
|
|
|
|
2012-04-11 11:42:53 +02:00
|
|
|
# Test a basic install using GRUB 1.
|
2014-06-28 16:04:49 +02:00
|
|
|
grub1 = makeInstallerTest "grub1"
|
2012-04-11 11:42:53 +02:00
|
|
|
{ createPartitions =
|
|
|
|
''
|
2012-10-24 18:22:53 +02:00
|
|
|
$machine->succeed(
|
2017-10-08 15:35:47 +02:00
|
|
|
"parted --script /dev/sda mklabel msdos",
|
|
|
|
"parted --script /dev/sda -- mkpart primary linux-swap 1M 1024M",
|
|
|
|
"parted --script /dev/sda -- mkpart primary ext2 1024M -1s",
|
2012-04-11 11:42:53 +02:00
|
|
|
"udevadm settle",
|
2012-07-26 21:09:01 +02:00
|
|
|
"mkswap /dev/sda1 -L swap",
|
2012-04-11 11:42:53 +02:00
|
|
|
"swapon -L swap",
|
2012-07-26 21:09:01 +02:00
|
|
|
"mkfs.ext3 -L nixos /dev/sda2",
|
2012-04-11 11:42:53 +02:00
|
|
|
"mount LABEL=nixos /mnt",
|
|
|
|
);
|
|
|
|
'';
|
|
|
|
grubVersion = 1;
|
2012-07-26 21:09:01 +02:00
|
|
|
grubDevice = "/dev/sda";
|
2012-04-11 11:42:53 +02:00
|
|
|
};
|
|
|
|
|
2014-05-02 06:11:49 +02:00
|
|
|
# Test using labels to identify volumes in grub
|
2014-08-29 11:48:00 +02:00
|
|
|
simpleLabels = makeInstallerTest "simpleLabels" {
|
2014-05-02 06:11:49 +02:00
|
|
|
createPartitions = ''
|
|
|
|
$machine->succeed(
|
|
|
|
"sgdisk -Z /dev/vda",
|
2014-05-02 08:05:10 +02:00
|
|
|
"sgdisk -n 1:0:+1M -n 2:0:+1G -N 3 -t 1:ef02 -t 2:8200 -t 3:8300 -c 3:root /dev/vda",
|
2014-05-02 07:01:32 +02:00
|
|
|
"mkswap /dev/vda2 -L swap",
|
|
|
|
"swapon -L swap",
|
2014-05-02 07:25:38 +02:00
|
|
|
"mkfs.ext4 -L root /dev/vda3",
|
2014-05-02 06:11:49 +02:00
|
|
|
"mount LABEL=root /mnt",
|
|
|
|
);
|
|
|
|
'';
|
|
|
|
grubIdentifier = "label";
|
|
|
|
};
|
|
|
|
|
|
|
|
# Test using the provided disk name within grub
|
2014-05-02 09:03:25 +02:00
|
|
|
# TODO: Fix udev so the symlinks are unneeded in /dev/disks
|
2014-08-29 11:48:00 +02:00
|
|
|
simpleProvided = makeInstallerTest "simpleProvided" {
|
2014-05-02 06:11:49 +02:00
|
|
|
createPartitions = ''
|
2014-05-02 09:03:25 +02:00
|
|
|
my $UUID = "\$(blkid -s UUID -o value /dev/vda2)";
|
2014-05-02 06:11:49 +02:00
|
|
|
$machine->succeed(
|
|
|
|
"sgdisk -Z /dev/vda",
|
2014-05-02 09:53:32 +02:00
|
|
|
"sgdisk -n 1:0:+1M -n 2:0:+100M -n 3:0:+1G -N 4 -t 1:ef02 -t 2:8300 -t 3:8200 -t 4:8300 -c 2:boot -c 4:root /dev/vda",
|
2014-05-02 07:01:32 +02:00
|
|
|
"mkswap /dev/vda3 -L swap",
|
|
|
|
"swapon -L swap",
|
2014-05-02 06:11:49 +02:00
|
|
|
"mkfs.ext4 -L boot /dev/vda2",
|
2014-05-02 07:01:32 +02:00
|
|
|
"mkfs.ext4 -L root /dev/vda4",
|
2014-05-02 09:03:25 +02:00
|
|
|
);
|
|
|
|
$machine->execute("ln -s ../../vda2 /dev/disk/by-uuid/$UUID");
|
|
|
|
$machine->execute("ln -s ../../vda4 /dev/disk/by-label/root");
|
|
|
|
$machine->succeed(
|
2014-05-02 08:07:12 +02:00
|
|
|
"mount /dev/disk/by-label/root /mnt",
|
2014-05-02 06:11:49 +02:00
|
|
|
"mkdir /mnt/boot",
|
2014-05-02 09:03:25 +02:00
|
|
|
"mount /dev/disk/by-uuid/$UUID /mnt/boot"
|
2014-05-02 06:11:49 +02:00
|
|
|
);
|
|
|
|
'';
|
|
|
|
grubIdentifier = "provided";
|
|
|
|
};
|
|
|
|
|
2014-05-01 13:21:30 +02:00
|
|
|
# Simple btrfs grub testing
|
2014-08-29 11:48:00 +02:00
|
|
|
btrfsSimple = makeInstallerTest "btrfsSimple" {
|
2014-05-01 13:21:30 +02:00
|
|
|
createPartitions = ''
|
|
|
|
$machine->succeed(
|
|
|
|
"sgdisk -Z /dev/vda",
|
2014-05-02 08:05:10 +02:00
|
|
|
"sgdisk -n 1:0:+1M -n 2:0:+1G -N 3 -t 1:ef02 -t 2:8200 -t 3:8300 -c 3:root /dev/vda",
|
2014-05-02 07:01:32 +02:00
|
|
|
"mkswap /dev/vda2 -L swap",
|
|
|
|
"swapon -L swap",
|
|
|
|
"mkfs.btrfs -L root /dev/vda3",
|
2014-05-01 13:21:30 +02:00
|
|
|
"mount LABEL=root /mnt",
|
|
|
|
);
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
# Test to see if we can detect /boot and /nix on subvolumes
|
2014-08-29 11:48:00 +02:00
|
|
|
btrfsSubvols = makeInstallerTest "btrfsSubvols" {
|
2014-05-01 13:21:30 +02:00
|
|
|
createPartitions = ''
|
|
|
|
$machine->succeed(
|
|
|
|
"sgdisk -Z /dev/vda",
|
2014-05-02 08:05:10 +02:00
|
|
|
"sgdisk -n 1:0:+1M -n 2:0:+1G -N 3 -t 1:ef02 -t 2:8200 -t 3:8300 -c 3:root /dev/vda",
|
2014-05-02 07:01:32 +02:00
|
|
|
"mkswap /dev/vda2 -L swap",
|
|
|
|
"swapon -L swap",
|
|
|
|
"mkfs.btrfs -L root /dev/vda3",
|
2014-05-01 13:21:30 +02:00
|
|
|
"btrfs device scan",
|
|
|
|
"mount LABEL=root /mnt",
|
|
|
|
"btrfs subvol create /mnt/boot",
|
|
|
|
"btrfs subvol create /mnt/nixos",
|
2014-08-31 00:48:54 +02:00
|
|
|
"btrfs subvol create /mnt/nixos/default",
|
2014-05-01 13:21:30 +02:00
|
|
|
"umount /mnt",
|
2014-08-31 00:48:54 +02:00
|
|
|
"mount -o defaults,subvol=nixos/default LABEL=root /mnt",
|
2014-05-01 13:21:30 +02:00
|
|
|
"mkdir /mnt/boot",
|
|
|
|
"mount -o defaults,subvol=boot LABEL=root /mnt/boot",
|
|
|
|
);
|
|
|
|
'';
|
|
|
|
};
|
2014-08-30 01:37:28 +02:00
|
|
|
|
|
|
|
# Test to see if we can detect default and aux subvolumes correctly
|
|
|
|
btrfsSubvolDefault = makeInstallerTest "btrfsSubvolDefault" {
|
|
|
|
createPartitions = ''
|
|
|
|
$machine->succeed(
|
|
|
|
"sgdisk -Z /dev/vda",
|
|
|
|
"sgdisk -n 1:0:+1M -n 2:0:+1G -N 3 -t 1:ef02 -t 2:8200 -t 3:8300 -c 3:root /dev/vda",
|
|
|
|
"mkswap /dev/vda2 -L swap",
|
|
|
|
"swapon -L swap",
|
|
|
|
"mkfs.btrfs -L root /dev/vda3",
|
|
|
|
"btrfs device scan",
|
|
|
|
"mount LABEL=root /mnt",
|
|
|
|
"btrfs subvol create /mnt/badpath",
|
|
|
|
"btrfs subvol create /mnt/badpath/boot",
|
|
|
|
"btrfs subvol create /mnt/nixos",
|
|
|
|
"btrfs subvol set-default \$(btrfs subvol list /mnt | grep 'nixos' | awk '{print \$2}') /mnt",
|
|
|
|
"umount /mnt",
|
|
|
|
"mount -o defaults LABEL=root /mnt",
|
|
|
|
"mkdir -p /mnt/badpath/boot", # Help ensure the detection mechanism is actually looking up subvolumes
|
|
|
|
"mkdir /mnt/boot",
|
|
|
|
"mount -o defaults,subvol=badpath/boot LABEL=root /mnt/boot",
|
|
|
|
);
|
|
|
|
'';
|
|
|
|
};
|
2015-06-10 13:14:40 +02:00
|
|
|
|
2010-01-06 14:36:21 +01:00
|
|
|
}
|