2020-04-11 22:38:55 +02:00
|
|
|
{ system ? builtins.currentSystem,
|
|
|
|
config ? {},
|
|
|
|
pkgs ? import ../.. { inherit system config; }
|
|
|
|
}:
|
|
|
|
|
|
|
|
with import ../lib/testing-python.nix { inherit system pkgs; };
|
|
|
|
with pkgs.lib;
|
|
|
|
|
2020-06-14 20:14:43 +02:00
|
|
|
let
|
|
|
|
common = {
|
2020-04-11 22:38:55 +02:00
|
|
|
virtualisation.useBootLoader = true;
|
2020-12-23 20:58:12 +01:00
|
|
|
virtualisation.useEFIBoot = true;
|
2020-04-11 22:38:55 +02:00
|
|
|
boot.loader.systemd-boot.enable = true;
|
2020-06-14 05:25:34 +02:00
|
|
|
boot.loader.efi.canTouchEfiVariables = true;
|
|
|
|
environment.systemPackages = [ pkgs.efibootmgr ];
|
2020-04-11 22:38:55 +02:00
|
|
|
};
|
2020-06-14 20:14:43 +02:00
|
|
|
in
|
|
|
|
{
|
|
|
|
basic = makeTest {
|
|
|
|
name = "systemd-boot";
|
2021-01-10 20:08:30 +01:00
|
|
|
meta.maintainers = with pkgs.lib.maintainers; [ danielfullmer ];
|
2020-06-14 20:14:43 +02:00
|
|
|
|
|
|
|
machine = common;
|
|
|
|
|
|
|
|
testScript = ''
|
|
|
|
machine.start()
|
|
|
|
machine.wait_for_unit("multi-user.target")
|
2020-04-11 22:38:55 +02:00
|
|
|
|
2020-06-14 20:14:43 +02:00
|
|
|
machine.succeed("test -e /boot/loader/entries/nixos-generation-1.conf")
|
|
|
|
|
|
|
|
# Ensure we actually booted using systemd-boot
|
|
|
|
# Magic number is the vendor UUID used by systemd-boot.
|
|
|
|
machine.succeed(
|
|
|
|
"test -e /sys/firmware/efi/efivars/LoaderEntrySelected-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f"
|
|
|
|
)
|
2020-06-14 05:25:34 +02:00
|
|
|
|
|
|
|
# "bootctl install" should have created an EFI entry
|
|
|
|
machine.succeed('efibootmgr | grep "Linux Boot Manager"')
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2021-01-03 19:29:34 +01:00
|
|
|
# Check that specialisations create corresponding boot entries.
|
|
|
|
specialisation = makeTest {
|
|
|
|
name = "systemd-boot-specialisation";
|
2021-11-06 17:20:11 +01:00
|
|
|
meta.maintainers = with pkgs.lib.maintainers; [ lukegb ];
|
2021-01-03 19:29:34 +01:00
|
|
|
|
|
|
|
machine = { pkgs, lib, ... }: {
|
|
|
|
imports = [ common ];
|
|
|
|
specialisation.something.configuration = {};
|
|
|
|
};
|
|
|
|
|
|
|
|
testScript = ''
|
|
|
|
machine.start()
|
|
|
|
machine.wait_for_unit("multi-user.target")
|
|
|
|
|
|
|
|
machine.succeed(
|
|
|
|
"test -e /boot/loader/entries/nixos-generation-1-specialisation-something.conf"
|
|
|
|
)
|
|
|
|
machine.succeed(
|
|
|
|
"grep -q 'title NixOS (something)' /boot/loader/entries/nixos-generation-1-specialisation-something.conf"
|
|
|
|
)
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2020-06-14 05:25:34 +02:00
|
|
|
# Boot without having created an EFI entry--instead using default "/EFI/BOOT/BOOTX64.EFI"
|
|
|
|
fallback = makeTest {
|
|
|
|
name = "systemd-boot-fallback";
|
2021-01-10 20:08:30 +01:00
|
|
|
meta.maintainers = with pkgs.lib.maintainers; [ danielfullmer ];
|
2020-06-14 05:25:34 +02:00
|
|
|
|
|
|
|
machine = { pkgs, lib, ... }: {
|
|
|
|
imports = [ common ];
|
|
|
|
boot.loader.efi.canTouchEfiVariables = mkForce false;
|
|
|
|
};
|
|
|
|
|
|
|
|
testScript = ''
|
|
|
|
machine.start()
|
|
|
|
machine.wait_for_unit("multi-user.target")
|
|
|
|
|
|
|
|
machine.succeed("test -e /boot/loader/entries/nixos-generation-1.conf")
|
|
|
|
|
|
|
|
# Ensure we actually booted using systemd-boot
|
|
|
|
# Magic number is the vendor UUID used by systemd-boot.
|
|
|
|
machine.succeed(
|
|
|
|
"test -e /sys/firmware/efi/efivars/LoaderEntrySelected-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f"
|
|
|
|
)
|
|
|
|
|
|
|
|
# "bootctl install" should _not_ have created an EFI entry
|
|
|
|
machine.fail('efibootmgr | grep "Linux Boot Manager"')
|
2020-06-14 20:14:43 +02:00
|
|
|
'';
|
|
|
|
};
|
2020-04-11 22:38:55 +02:00
|
|
|
|
2020-06-14 20:14:43 +02:00
|
|
|
update = makeTest {
|
|
|
|
name = "systemd-boot-update";
|
2021-01-10 20:08:30 +01:00
|
|
|
meta.maintainers = with pkgs.lib.maintainers; [ danielfullmer ];
|
2020-04-11 22:38:55 +02:00
|
|
|
|
2020-06-14 20:14:43 +02:00
|
|
|
machine = common;
|
|
|
|
|
|
|
|
testScript = ''
|
|
|
|
machine.succeed("mount -o remount,rw /boot")
|
|
|
|
|
|
|
|
# Replace version inside sd-boot with something older. See magic[] string in systemd src/boot/efi/boot.c
|
|
|
|
machine.succeed(
|
|
|
|
"""
|
|
|
|
find /boot -iname '*.efi' -print0 | \
|
2021-09-30 16:33:34 +02:00
|
|
|
xargs -0 -I '{}' sed -i 's/#### LoaderInfo: systemd-boot .* ####/#### LoaderInfo: systemd-boot 000.0-1-notnixos ####/' '{}'
|
2020-06-14 20:14:43 +02:00
|
|
|
"""
|
|
|
|
)
|
|
|
|
|
|
|
|
output = machine.succeed("/run/current-system/bin/switch-to-configuration boot")
|
2021-10-15 16:17:09 +02:00
|
|
|
assert "updating systemd-boot from (000.0-1-notnixos) to " in output
|
2020-06-14 20:14:43 +02:00
|
|
|
'';
|
|
|
|
};
|
2021-12-19 05:53:47 +01:00
|
|
|
|
|
|
|
memtest86 = makeTest {
|
|
|
|
name = "systemd-boot-memtest86";
|
|
|
|
meta.maintainers = with pkgs.lib.maintainers; [ Enzime ];
|
|
|
|
|
|
|
|
machine = { pkgs, lib, ... }: {
|
|
|
|
imports = [ common ];
|
|
|
|
boot.loader.systemd-boot.memtest86.enable = true;
|
|
|
|
nixpkgs.config.allowUnfreePredicate = pkg: builtins.elem (lib.getName pkg) [
|
|
|
|
"memtest86-efi"
|
|
|
|
];
|
|
|
|
};
|
|
|
|
|
|
|
|
testScript = ''
|
|
|
|
machine.succeed("test -e /boot/loader/entries/memtest86.conf")
|
|
|
|
machine.succeed("test -e /boot/efi/memtest86/BOOTX64.efi")
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
netbootxyz = makeTest {
|
|
|
|
name = "systemd-boot-netbootxyz";
|
|
|
|
meta.maintainers = with pkgs.lib.maintainers; [ Enzime ];
|
|
|
|
|
|
|
|
machine = { pkgs, lib, ... }: {
|
|
|
|
imports = [ common ];
|
|
|
|
boot.loader.systemd-boot.netbootxyz.enable = true;
|
|
|
|
};
|
|
|
|
|
|
|
|
testScript = ''
|
|
|
|
machine.succeed("test -e /boot/loader/entries/o_netbootxyz.conf")
|
|
|
|
machine.succeed("test -e /boot/efi/netbootxyz/netboot.xyz.efi")
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
entryFilename = makeTest {
|
|
|
|
name = "systemd-boot-entry-filename";
|
|
|
|
meta.maintainers = with pkgs.lib.maintainers; [ Enzime ];
|
|
|
|
|
|
|
|
machine = { pkgs, lib, ... }: {
|
|
|
|
imports = [ common ];
|
|
|
|
boot.loader.systemd-boot.memtest86.enable = true;
|
|
|
|
boot.loader.systemd-boot.memtest86.entryFilename = "apple.conf";
|
|
|
|
nixpkgs.config.allowUnfreePredicate = pkg: builtins.elem (lib.getName pkg) [
|
|
|
|
"memtest86-efi"
|
|
|
|
];
|
|
|
|
};
|
|
|
|
|
|
|
|
testScript = ''
|
|
|
|
machine.fail("test -e /boot/loader/entries/memtest86.conf")
|
|
|
|
machine.succeed("test -e /boot/loader/entries/apple.conf")
|
|
|
|
machine.succeed("test -e /boot/efi/memtest86/BOOTX64.efi")
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
extraEntries = makeTest {
|
|
|
|
name = "systemd-boot-extra-entries";
|
|
|
|
meta.maintainers = with pkgs.lib.maintainers; [ Enzime ];
|
|
|
|
|
|
|
|
machine = { pkgs, lib, ... }: {
|
|
|
|
imports = [ common ];
|
|
|
|
boot.loader.systemd-boot.extraEntries = {
|
|
|
|
"banana.conf" = ''
|
|
|
|
title banana
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
testScript = ''
|
|
|
|
machine.succeed("test -e /boot/loader/entries/banana.conf")
|
|
|
|
machine.succeed("test -e /boot/efi/nixos/.extra-files/loader/entries/banana.conf")
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
extraFiles = makeTest {
|
|
|
|
name = "systemd-boot-extra-files";
|
|
|
|
meta.maintainers = with pkgs.lib.maintainers; [ Enzime ];
|
|
|
|
|
|
|
|
machine = { pkgs, lib, ... }: {
|
|
|
|
imports = [ common ];
|
|
|
|
boot.loader.systemd-boot.extraFiles = {
|
|
|
|
"efi/fruits/tomato.efi" = pkgs.netbootxyz-efi;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
testScript = ''
|
|
|
|
machine.succeed("test -e /boot/efi/fruits/tomato.efi")
|
|
|
|
machine.succeed("test -e /boot/efi/nixos/.extra-files/efi/fruits/tomato.efi")
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
switch-test = makeTest {
|
|
|
|
name = "systemd-boot-switch-test";
|
|
|
|
meta.maintainers = with pkgs.lib.maintainers; [ Enzime ];
|
|
|
|
|
|
|
|
nodes = {
|
|
|
|
inherit common;
|
|
|
|
|
|
|
|
machine = { pkgs, ... }: {
|
|
|
|
imports = [ common ];
|
|
|
|
boot.loader.systemd-boot.extraFiles = {
|
|
|
|
"efi/fruits/tomato.efi" = pkgs.netbootxyz-efi;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
with_netbootxyz = { pkgs, ... }: {
|
|
|
|
imports = [ common ];
|
|
|
|
boot.loader.systemd-boot.netbootxyz.enable = true;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
testScript = { nodes, ... }: let
|
|
|
|
originalSystem = nodes.machine.config.system.build.toplevel;
|
|
|
|
baseSystem = nodes.common.config.system.build.toplevel;
|
|
|
|
finalSystem = nodes.with_netbootxyz.config.system.build.toplevel;
|
|
|
|
in ''
|
|
|
|
machine.succeed("test -e /boot/efi/fruits/tomato.efi")
|
|
|
|
machine.succeed("test -e /boot/efi/nixos/.extra-files/efi/fruits/tomato.efi")
|
|
|
|
|
|
|
|
with subtest("remove files when no longer needed"):
|
|
|
|
machine.succeed("${baseSystem}/bin/switch-to-configuration boot")
|
|
|
|
machine.fail("test -e /boot/efi/fruits/tomato.efi")
|
|
|
|
machine.fail("test -d /boot/efi/fruits")
|
|
|
|
machine.succeed("test -d /boot/efi/nixos/.extra-files")
|
|
|
|
machine.fail("test -e /boot/efi/nixos/.extra-files/efi/fruits/tomato.efi")
|
|
|
|
machine.fail("test -d /boot/efi/nixos/.extra-files/efi/fruits")
|
|
|
|
|
|
|
|
with subtest("files are added back when needed again"):
|
|
|
|
machine.succeed("${originalSystem}/bin/switch-to-configuration boot")
|
|
|
|
machine.succeed("test -e /boot/efi/fruits/tomato.efi")
|
|
|
|
machine.succeed("test -e /boot/efi/nixos/.extra-files/efi/fruits/tomato.efi")
|
|
|
|
|
|
|
|
with subtest("simultaneously removing and adding files works"):
|
|
|
|
machine.succeed("${finalSystem}/bin/switch-to-configuration boot")
|
|
|
|
machine.fail("test -e /boot/efi/fruits/tomato.efi")
|
|
|
|
machine.fail("test -e /boot/efi/nixos/.extra-files/efi/fruits/tomato.efi")
|
|
|
|
machine.succeed("test -e /boot/loader/entries/o_netbootxyz.conf")
|
|
|
|
machine.succeed("test -e /boot/efi/netbootxyz/netboot.xyz.efi")
|
|
|
|
machine.succeed("test -e /boot/efi/nixos/.extra-files/loader/entries/o_netbootxyz.conf")
|
|
|
|
machine.succeed("test -e /boot/efi/nixos/.extra-files/efi/netbootxyz/netboot.xyz.efi")
|
|
|
|
'';
|
|
|
|
};
|
2020-04-11 22:38:55 +02:00
|
|
|
}
|