 df7c405f32
			
		
	
	
		df7c405f32
		
			
		
	
	
	
	
		
			
			This avoids the dependence on the presence of /tmp, which causes issues with nixos-install
		
			
				
	
	
		
			105 lines
		
	
	
		
			4.3 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
			
		
		
	
	
			105 lines
		
	
	
		
			4.3 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
| { lib, ... }:
 | |
| {
 | |
| 
 | |
|   name = "activation-etc-overlay-immutable";
 | |
| 
 | |
|   meta.maintainers = with lib.maintainers; [ nikstur ];
 | |
| 
 | |
|   nodes.machine =
 | |
|     { pkgs, ... }:
 | |
|     {
 | |
|       system.etc.overlay.enable = true;
 | |
|       system.etc.overlay.mutable = false;
 | |
| 
 | |
|       # Prerequisites
 | |
|       systemd.sysusers.enable = true;
 | |
|       users.mutableUsers = false;
 | |
|       boot.initrd.systemd.enable = true;
 | |
|       boot.kernelPackages = pkgs.linuxPackages_latest;
 | |
|       time.timeZone = "Utc";
 | |
| 
 | |
|       # The standard resolvconf service tries to write to /etc and crashes,
 | |
|       # which makes nixos-rebuild exit uncleanly when switching into the new generation
 | |
|       services.resolved.enable = true;
 | |
| 
 | |
|       environment.etc = {
 | |
|         "mountpoint/.keep".text = "keep";
 | |
|         "filemount".text = "keep";
 | |
|       };
 | |
| 
 | |
|       specialisation.new-generation.configuration = {
 | |
|         environment.etc."newgen".text = "newgen";
 | |
|       };
 | |
|       specialisation.newer-generation.configuration = {
 | |
|         environment.etc."newergen".text = "newergen";
 | |
|       };
 | |
|     };
 | |
| 
 | |
|   testScript = # python
 | |
|     ''
 | |
|       newergen = machine.succeed("realpath /run/current-system/specialisation/newer-generation/bin/switch-to-configuration").rstrip()
 | |
| 
 | |
|       with subtest("/run/nixos-etc-metadata/ is mounted"):
 | |
|         print(machine.succeed("mountpoint /run/nixos-etc-metadata"))
 | |
| 
 | |
|       with subtest("No temporary files leaked into stage 2"):
 | |
|         machine.succeed("[ ! -e /etc-metadata-image ]")
 | |
|         machine.succeed("[ ! -e /etc-basedir ]")
 | |
| 
 | |
|       with subtest("/etc is mounted as an overlay"):
 | |
|         machine.succeed("findmnt --kernel --type overlay /etc")
 | |
| 
 | |
|       with subtest("direct symlinks point to the target without indirection"):
 | |
|         assert machine.succeed("readlink -n /etc/localtime") == "/etc/zoneinfo/Utc"
 | |
| 
 | |
|       with subtest("/etc/mtab points to the right file"):
 | |
|         assert "/proc/mounts" == machine.succeed("readlink --no-newline /etc/mtab")
 | |
| 
 | |
|       with subtest("Correct mode on the source password files"):
 | |
|         assert machine.succeed("stat -c '%a' /var/lib/nixos/etc/passwd") == "644\n"
 | |
|         assert machine.succeed("stat -c '%a' /var/lib/nixos/etc/group") == "644\n"
 | |
|         assert machine.succeed("stat -c '%a' /var/lib/nixos/etc/shadow") == "0\n"
 | |
|         assert machine.succeed("stat -c '%a' /var/lib/nixos/etc/gshadow") == "0\n"
 | |
| 
 | |
|       with subtest("Password files are symlinks to /var/lib/nixos/etc"):
 | |
|         assert machine.succeed("readlink -f /etc/passwd") == "/var/lib/nixos/etc/passwd\n"
 | |
|         assert machine.succeed("readlink -f /etc/group") == "/var/lib/nixos/etc/group\n"
 | |
|         assert machine.succeed("readlink -f /etc/shadow") == "/var/lib/nixos/etc/shadow\n"
 | |
|         assert machine.succeed("readlink -f /etc/gshadow") == "/var/lib/nixos/etc/gshadow\n"
 | |
| 
 | |
|       with subtest("switching to the same generation"):
 | |
|         machine.succeed("/run/current-system/bin/switch-to-configuration test")
 | |
| 
 | |
|       with subtest("the initrd didn't get rebuilt"):
 | |
|         machine.succeed("test /run/current-system/initrd -ef /run/current-system/specialisation/new-generation/initrd")
 | |
| 
 | |
|       with subtest("switching to a new generation"):
 | |
|         machine.fail("stat /etc/newgen")
 | |
| 
 | |
|         machine.succeed("mount -t tmpfs tmpfs /etc/mountpoint")
 | |
|         machine.succeed("touch /etc/mountpoint/extra-file")
 | |
|         machine.succeed("mount --bind /dev/null /etc/filemount")
 | |
| 
 | |
|         machine.succeed("/run/current-system/specialisation/new-generation/bin/switch-to-configuration switch")
 | |
| 
 | |
|         assert machine.succeed("cat /etc/newgen") == "newgen"
 | |
| 
 | |
|         print(machine.succeed("findmnt /etc/mountpoint"))
 | |
|         print(machine.succeed("ls /etc/mountpoint"))
 | |
|         print(machine.succeed("stat /etc/mountpoint/extra-file"))
 | |
|         print(machine.succeed("findmnt /etc/filemount"))
 | |
| 
 | |
|         machine.succeed(f"{newergen} switch")
 | |
| 
 | |
|         tmpMounts = machine.succeed("find /run -maxdepth 1 -type d -regex '/run/nixos-etc\\..*'").rstrip()
 | |
|         print(tmpMounts)
 | |
|         metaMounts = machine.succeed("find /run -maxdepth 1 -type d -regex '/run/nixos-etc-metadata.*'").rstrip()
 | |
|         print(metaMounts)
 | |
| 
 | |
|         numOfTmpMounts = len(tmpMounts.splitlines())
 | |
|         numOfMetaMounts = len(metaMounts.splitlines())
 | |
|         assert numOfTmpMounts == 0, f"Found {numOfTmpMounts} remaining tmpmounts"
 | |
|         assert numOfMetaMounts == 1, f"Found {numOfMetaMounts} remaining metamounts"
 | |
|     '';
 | |
| }
 |