nixos/tests/systemd-sysupdate: init
This commit is contained in:
parent
9b4d3b840e
commit
e6862fae8f
2 changed files with 67 additions and 0 deletions
|
@ -772,6 +772,7 @@ in {
|
||||||
systemd-portabled = handleTest ./systemd-portabled.nix {};
|
systemd-portabled = handleTest ./systemd-portabled.nix {};
|
||||||
systemd-repart = handleTest ./systemd-repart.nix {};
|
systemd-repart = handleTest ./systemd-repart.nix {};
|
||||||
systemd-shutdown = handleTest ./systemd-shutdown.nix {};
|
systemd-shutdown = handleTest ./systemd-shutdown.nix {};
|
||||||
|
systemd-sysupdate = runTest ./systemd-sysupdate.nix;
|
||||||
systemd-timesyncd = handleTest ./systemd-timesyncd.nix {};
|
systemd-timesyncd = handleTest ./systemd-timesyncd.nix {};
|
||||||
systemd-user-tmpfiles-rules = handleTest ./systemd-user-tmpfiles-rules.nix {};
|
systemd-user-tmpfiles-rules = handleTest ./systemd-user-tmpfiles-rules.nix {};
|
||||||
systemd-misc = handleTest ./systemd-misc.nix {};
|
systemd-misc = handleTest ./systemd-misc.nix {};
|
||||||
|
|
66
nixos/tests/systemd-sysupdate.nix
Normal file
66
nixos/tests/systemd-sysupdate.nix
Normal file
|
@ -0,0 +1,66 @@
|
||||||
|
# Tests downloading a signed update aritfact from a server to a target machine.
|
||||||
|
# This test does not rely on the `systemd.timer` units provided by the
|
||||||
|
# `systemd-sysupdate` module but triggers the `systemd-sysupdate` service
|
||||||
|
# manually to make the test more robust.
|
||||||
|
|
||||||
|
{ lib, pkgs, ... }:
|
||||||
|
|
||||||
|
let
|
||||||
|
gpgKeyring = import ./common/gpg-keyring.nix { inherit pkgs; };
|
||||||
|
in
|
||||||
|
{
|
||||||
|
name = "systemd-sysupdate";
|
||||||
|
|
||||||
|
meta.maintainers = with lib.maintainers; [ nikstur ];
|
||||||
|
|
||||||
|
nodes = {
|
||||||
|
server = { pkgs, ... }: {
|
||||||
|
networking.firewall.enable = false;
|
||||||
|
services.nginx = {
|
||||||
|
enable = true;
|
||||||
|
virtualHosts."server" = {
|
||||||
|
root = pkgs.runCommand "sysupdate-artifacts" { buildInputs = [ pkgs.gnupg ]; } ''
|
||||||
|
mkdir -p $out
|
||||||
|
cd $out
|
||||||
|
|
||||||
|
echo "nixos" > nixos_1.efi
|
||||||
|
sha256sum nixos_1.efi > SHA256SUMS
|
||||||
|
|
||||||
|
export GNUPGHOME="$(mktemp -d)"
|
||||||
|
cp -R ${gpgKeyring}/* $GNUPGHOME
|
||||||
|
|
||||||
|
gpg --batch --sign --detach-sign --output SHA256SUMS.gpg SHA256SUMS
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
target = {
|
||||||
|
systemd.sysupdate = {
|
||||||
|
enable = true;
|
||||||
|
transfers = {
|
||||||
|
"uki" = {
|
||||||
|
Source = {
|
||||||
|
Type = "url-file";
|
||||||
|
Path = "http://server/";
|
||||||
|
MatchPattern = "nixos_@v.efi";
|
||||||
|
};
|
||||||
|
Target = {
|
||||||
|
Path = "/boot/EFI/Linux";
|
||||||
|
MatchPattern = "nixos_@v.efi";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
environment.etc."systemd/import-pubring.gpg".source = "${gpgKeyring}/pubkey.gpg";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
testScript = ''
|
||||||
|
server.wait_for_unit("nginx.service")
|
||||||
|
|
||||||
|
target.succeed("systemctl start systemd-sysupdate")
|
||||||
|
assert "nixos" in target.wait_until_succeeds("cat /boot/EFI/Linux/nixos_1.efi", timeout=5)
|
||||||
|
'';
|
||||||
|
}
|
Loading…
Reference in a new issue