Adding initial version of the nixos cd insallation test script using

qemu_kvm. Installation doesn't take place yet. VM is started
printing a remote controlled "Hello".

This serves as example how to run a vm within a bulid job.

svn path=/nixos/trunk/; revision=18887
This commit is contained in:
Marc Weber 2009-12-11 00:51:13 +00:00
parent 086c3d6328
commit 4d7e344f69
7 changed files with 214 additions and 3 deletions

View File

@ -0,0 +1,54 @@
# See installation-cd-minimal.nix
# it's called insecure because it allows logging in as root without password
# So don't boot this cdrom to install your system :-)
{config, pkgs, ...}:
let
doOverride = pkgs.lib.mkOverride 0 {};
in
{
require = [ ./installation-cd-minimal.nix ];
installer.configModule = "./nixos/modules/installer/cd-dvd/installation-cd-minimal-test-insecure";
services.sshd.permitRootLogin = "yes";
jobs.sshd = {
startOn = doOverride "started network-interfaces";
};
boot.initrd.extraKernelModules =
["cifs" "virtio_net" "virtio_pci" "virtio_blk" "virtio_balloon" "nls_utf8"];
environment.systemPackages = [ pkgs.vim_configurable ];
boot.loader.grub.timeout = doOverride 0;
boot.loader.grub.default = 2;
# FIXME: rewrite pam.services the to be an attr list
# I only want to override sshd
security.pam.services = doOverride
# Most of these should be moved to specific modules.
[ { name = "cups"; }
{ name = "ejabberd"; }
{ name = "ftp"; }
{ name = "lshd"; rootOK =true; allowNullPassword =true; }
{ name = "passwd"; }
{ name = "samba"; }
{ name = "sshd"; rootOK = true; allowNullPassword =true; }
{ name = "xlock"; }
{ name = "chsh"; rootOK = true; }
{ name = "su"; rootOK = true; forwardXAuth = true; }
# Note: useradd, groupadd etc. aren't setuid root, so it
# doesn't really matter what the PAM config says as long as it
# lets root in.
{ name = "useradd"; rootOK = true; }
# Used by groupadd etc.
{ name = "shadow"; rootOK = true; }
{ name = "login"; ownDevices = true; allowNullPassword = true; }
];
}

View File

@ -34,8 +34,8 @@ let
in {
description = "OpenVPN-${name}";
startOn = "network-interfaces/started";
stopOn = "network-interfaces/stop";
startOn = "started network-interfaces";
stopOn = "stopping network-interfaces";
environment = { PATH = "${pkgs.coreutils}/bin"; };

View File

@ -82,6 +82,7 @@ in
<literal>yes</literal>, <literal>without-password</literal>,
<literal>forced-commands-only</literal> or
<literal>no</literal>.
If without-password doesn't work try <literal>yes</literal>.
'';
};

View File

@ -2,7 +2,7 @@
{pkgs, config, ...}:
let
inherit (pkgs.lib) mkOption mergeTypedOption mergeAttrs mapRecordFlatten
inherit (pkgs.lib) mkOption mergeTypedOption mergeAttrs
mapAttrs addErrorContext fold id filter textClosureMap noDepEntry
fullDepEntry;
inherit (builtins) attrNames;

View File

@ -90,6 +90,11 @@ let
description = "minimal";
};
iso_minimal_test_insecure = makeIso {
module = ./modules/installer/cd-dvd/installation-cd-minimal-test-insecure.nix;
description = "minimal-testing-only";
};
iso_minimal_fresh_kernel = makeIso {
module = ./modules/installer/cd-dvd/installation-cd-minimal-fresh-kernel.nix;
description = "minimal with 2.6.31-zen-branch";

View File

@ -0,0 +1,26 @@
# this is the configuration which will be installed.
# The configuration is prebuild before starting the vm because starting the vm
# causes some overhead.
{pkgs, config, ...}: {
# make system boot and accessible:
require = [ ../modules/installer/cd-dvd/installation-cd-minimal-test-insecure.nix ];
boot.loader.grub = {
device = "/dev/sda";
copyKernels = true;
bootDevice = "(hd0,0)";
};
fileSystems = [
{ mountPoint = "/";
device = "/dev/sda1";
neededForBoot = true;
}
];
fonts = {
enableFontConfig = false;
};
}

View File

@ -0,0 +1,125 @@
{ nixos ? ./..
, nixpkgs ? ../../nixpkgs
, services ? ../../nixos/services
, system ? builtins.currentSystem
, configPath ? ./test-nixos-install-from-cd.nix
}:
let
/*
test nixos installation automatically using a build job (unfinished)
run this test this way:
nix-build --no-out-link --show-trace tests/test-nixos-install-from-cd.nix
--no-out-link is important because creating ./result will cause rebuilding of
the iso as the nixos repository is included in the iso.
To prevent this make these paths point to another location:
nixosTarball = makeTarball "nixos.tar.bz2" (cleanSource ../../..);
nixpkgsTarball = makeTarball "nixpkgs.tar.bz2" (cleanSource pkgs.path);
*/
isos = (import ../release.nix) { inherit nixpkgs; };
isoFile =
# passed system = systom of iso
(isos.iso_minimal_test_insecure { inherit system; }).iso;
configuration = /pr/system_nixos_installer/nixos/tests/test-nixos-install-from-cd-config.nix;
eval = import ../lib/eval-config.nix {
inherit system nixpkgs;
modules = [ configuration ];
};
inherit (eval) pkgs config;
inherit (pkgs) qemu_kvm;
# prebuild system which will be installed for two reasons:
# build derivations are in store and can be reused
# the iso is only build when this suceeds (?)
systemDerivation = builtins.addErrorContext "while building system" config.system.build.toplevel;
in
rec {
test =
# FIXME: support i686 as well
# FIXME: X shouldn't be required
# Is there a way to use kvm when not running as root?
# Would using uml provide any advantages?
pkgs.runCommand "nixos-installation-test" { inherit systemDerivation; } ''
for path in ${pkgs.socat} ${pkgs.openssh} ${qemu_kvm}; do
PATH=$path/bin:$PATH
done
echo "creating image file"
qemu-img create -f qcow2 image 512M
# install the system
export DISPLAY=localhost:0.0
cat >> run-kvm.sh << EOF
#!/bin/sh
qemu-system-x86_64 -m 620 \
-no-kvm-irqchip \
-net nic -net user -smb \
-hda image \
-cdrom $(echo ${isoFile}/iso/*.iso) \
"\$@"
EOF
chmod +x run-kvm.sh
SOCKET_NAME=65535.socket
# run qemu-kvm in a background process
{ ./run-kvm.sh -boot d -redir tcp:''${SOCKET_NAME/.socket/}::22 \
|| { echo "starting kvm failed, exiting" 1>&2; pkill -9 $$; }
} &
# check that vm is still running
checkVM(){ [ -n "$(jobs -l)" ] || { echo "kvm died!?"; exit 1; }; }
waitTill(){
echo $1
while ! eval "$2"; do sleep 1; checkVM; done
}
SSH(){
ssh -v -o UserKnownHostsFile=/dev/null \
-o StrictHostKeyChecking=no \
-o ProxyCommand="socat stdio ./$SOCKET_NAME" \
root@127.0.0.1 \
"$@";
}
# wait for socket
waitTill "waiting for socket in $TMP" '[ ! -e ./$SOCKET_NAME ]'
waitTill "waiting for sshd job" "SSH 'echo Hello > /dev/tty1'"
# INSTALLATION
echo "installation should take place"
# REBOOT
echo "rebooting should take place"
# CHECK
echo "verify system is up and running"
# SHUTDOWN
SSH "shutdown -h now"
echo waiting for kvm to shutdown..
wait
'';
}