2022-09-04 14:57:14 +02:00
|
|
|
{ pkgs ? import <nixpkgs> {} }:
|
|
|
|
|
|
|
|
let
|
|
|
|
makeTest = import (pkgs.path + "/nixos/tests/make-test-python.nix");
|
|
|
|
makeTest' = args: makeTest args {
|
|
|
|
inherit pkgs;
|
|
|
|
inherit (pkgs) system;
|
|
|
|
};
|
|
|
|
|
|
|
|
in makeTest' {
|
|
|
|
name = "kexec-installer";
|
|
|
|
meta = with pkgs.lib.maintainers; {
|
|
|
|
maintainers = [ mic92 ];
|
|
|
|
};
|
|
|
|
|
|
|
|
nodes = {
|
2022-11-27 17:25:24 +01:00
|
|
|
node1 = { modulesPath, ... }: {
|
2022-11-27 17:45:21 +01:00
|
|
|
virtualisation.vlans = [ 1 ];
|
2022-11-27 17:25:24 +01:00
|
|
|
environment.noXlibs = false; # avoid recompilation
|
|
|
|
imports = [
|
|
|
|
(modulesPath + "/profiles/minimal.nix")
|
|
|
|
];
|
|
|
|
|
2022-12-19 13:52:05 +01:00
|
|
|
virtualisation.memorySize = 2 * 1024 + 767;
|
2022-09-04 14:57:14 +02:00
|
|
|
virtualisation.diskSize = 4 * 1024;
|
|
|
|
virtualisation.useBootLoader = true;
|
|
|
|
virtualisation.useEFIBoot = true;
|
|
|
|
boot.loader.systemd-boot.enable = true;
|
|
|
|
boot.loader.efi.canTouchEfiVariables = true;
|
|
|
|
services.openssh.enable = true;
|
2022-11-27 19:56:24 +01:00
|
|
|
|
2022-11-27 17:45:21 +01:00
|
|
|
networking = {
|
|
|
|
useNetworkd = true;
|
|
|
|
useDHCP = false;
|
|
|
|
};
|
2022-11-27 19:56:24 +01:00
|
|
|
|
|
|
|
systemd.network = {
|
|
|
|
networks = {
|
|
|
|
# systemd-networkd will load the first network unit file
|
|
|
|
# that matches, ordered lexiographically by filename.
|
|
|
|
# /etc/systemd/network/{40-eth1,99-main}.network already
|
|
|
|
# exists. This network unit must be loaded for the test,
|
|
|
|
# however, hence why this network is named such.
|
|
|
|
"01-eth1" = {
|
|
|
|
name = "eth1";
|
|
|
|
address = [
|
|
|
|
# Some static addresses that we want to see in the kexeced image
|
|
|
|
"192.168.42.1/24"
|
|
|
|
"42::1/64"
|
|
|
|
];
|
|
|
|
routes = [
|
|
|
|
# Some static routes that we want to see in the kexeced image
|
|
|
|
{ routeConfig = { Destination = "192.168.43.0/24"; }; }
|
|
|
|
{ routeConfig = { Destination = "192.168.44.0/24"; Gateway = "192.168.43.1"; }; }
|
|
|
|
{ routeConfig = { Destination = "43::0/64"; }; }
|
|
|
|
{ routeConfig = { Destination = "44::1/64"; Gateway = "43::1"; }; }
|
|
|
|
];
|
|
|
|
networkConfig = {
|
|
|
|
DHCP = "yes";
|
|
|
|
IPv6AcceptRA = true;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
2022-09-04 14:57:14 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
node2 = { pkgs, modulesPath, ... }: {
|
|
|
|
environment.systemPackages = [ pkgs.hello ];
|
|
|
|
imports = [
|
2022-11-27 17:13:33 +01:00
|
|
|
./module.nix
|
2022-09-04 14:57:14 +02:00
|
|
|
];
|
|
|
|
};
|
2022-11-27 17:45:21 +01:00
|
|
|
|
|
|
|
router = { config, pkgs, ... }: {
|
|
|
|
virtualisation.vlans = [ 1 ];
|
|
|
|
networking = {
|
|
|
|
useNetworkd = true;
|
|
|
|
useDHCP = false;
|
|
|
|
firewall.enable = false;
|
|
|
|
};
|
|
|
|
systemd.network = {
|
|
|
|
networks = {
|
|
|
|
# systemd-networkd will load the first network unit file
|
|
|
|
# that matches, ordered lexiographically by filename.
|
|
|
|
# /etc/systemd/network/{40-eth1,99-main}.network already
|
|
|
|
# exists. This network unit must be loaded for the test,
|
|
|
|
# however, hence why this network is named such.
|
|
|
|
"01-eth1" = {
|
|
|
|
name = "eth1";
|
|
|
|
address = [
|
2022-11-27 19:56:24 +01:00
|
|
|
"2001:db8::1/64"
|
|
|
|
];
|
|
|
|
ipv6Prefixes = [
|
|
|
|
{ ipv6PrefixConfig = { Prefix = "2001:db8::/64"; AddressAutoconfiguration = true; OnLink = true; }; }
|
|
|
|
];
|
2022-12-16 13:45:54 +01:00
|
|
|
# does not work in 22.11
|
|
|
|
#ipv6RoutePrefixes = [ { ipv6RoutePrefixConfig = { Route = "::/0"; LifetimeSec = 3600; }; }];
|
|
|
|
extraConfig = ''
|
|
|
|
[IPv6RoutePrefix]
|
|
|
|
Route = ::/0
|
|
|
|
LifetimeSec = 3600
|
|
|
|
'';
|
2022-11-27 17:45:21 +01:00
|
|
|
networkConfig = {
|
|
|
|
DHCPServer = true;
|
|
|
|
Address = "10.0.0.1/24";
|
|
|
|
IPv6SendRA = true;
|
|
|
|
};
|
|
|
|
dhcpServerConfig = {
|
|
|
|
PoolOffset = 100;
|
|
|
|
PoolSize = 1;
|
2022-11-27 19:56:24 +01:00
|
|
|
EmitRouter = true;
|
2022-11-27 17:45:21 +01:00
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2022-09-04 14:57:14 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
testScript = { nodes, ... }: ''
|
|
|
|
# Test whether reboot via kexec works.
|
2022-11-27 19:56:24 +01:00
|
|
|
|
|
|
|
router.wait_for_unit("network-online.target")
|
|
|
|
router.succeed("ip addr >&2")
|
|
|
|
router.succeed("ip route >&2")
|
|
|
|
router.succeed("ip -6 route >&2")
|
|
|
|
router.succeed("networkctl status eth1 >&2")
|
|
|
|
|
|
|
|
node1.wait_until_succeeds("ping -c1 10.0.0.1")
|
|
|
|
node1.wait_until_succeeds("ping -c1 2001:db8::1")
|
2022-11-27 17:55:25 +01:00
|
|
|
node1.succeed("ip addr >&2")
|
|
|
|
node1.succeed("ip route >&2")
|
|
|
|
node1.succeed("ip -6 route >&2")
|
2022-11-27 19:56:24 +01:00
|
|
|
node1.succeed("networkctl status eth1 >&2")
|
2022-09-04 14:57:14 +02:00
|
|
|
|
|
|
|
host_ed25519_before = node1.succeed("cat /etc/ssh/ssh_host_ed25519_key.pub")
|
|
|
|
node1.succeed('ssh-keygen -t ed25519 -f /root/.ssh/id_ed25519 -q -N ""')
|
|
|
|
root_ed25519_before = node1.succeed('tee /root/.ssh/authorized_keys < /root/.ssh/id_ed25519.pub')
|
2022-11-27 19:56:24 +01:00
|
|
|
|
2022-09-04 14:57:14 +02:00
|
|
|
# Kexec node1 to the toplevel of node2 via the kexec-boot script
|
|
|
|
node1.succeed('touch /run/foo')
|
|
|
|
node1.fail('hello')
|
2023-01-05 11:12:35 +01:00
|
|
|
node1.succeed('tar -xf ${nodes.node2.system.build.kexecTarball}/nixos-kexec-installer-${pkgs.system}.tar.gz -C /root')
|
2022-09-05 07:35:19 +02:00
|
|
|
node1.execute('/root/kexec/run')
|
2022-09-04 14:57:14 +02:00
|
|
|
# wait for machine to kexec
|
|
|
|
node1.execute('sleep 9999', check_return=False)
|
|
|
|
node1.succeed('! test -e /run/foo')
|
|
|
|
node1.succeed('hello')
|
|
|
|
node1.succeed('[ "$(hostname)" = "node2" ]')
|
|
|
|
node1.wait_for_unit("sshd.service")
|
|
|
|
|
|
|
|
host_ed25519_after = node1.succeed("cat /etc/ssh/ssh_host_ed25519_key.pub")
|
|
|
|
assert host_ed25519_before == host_ed25519_after, f"{host_ed25519_before} != {host_ed25519_after}"
|
|
|
|
|
|
|
|
root_ed25519_after = node1.succeed("cat /root/.ssh/authorized_keys")
|
|
|
|
assert root_ed25519_before == root_ed25519_after, f"{root_ed25519_before} != {root_ed25519_after}"
|
|
|
|
|
2022-11-27 19:56:24 +01:00
|
|
|
# See if we can reach the router after kexec
|
2023-01-05 11:03:55 +01:00
|
|
|
node1.wait_for_unit("restore-network.service")
|
2022-11-27 19:56:24 +01:00
|
|
|
node1.wait_until_succeeds("cat /etc/systemd/network/eth1.network >&2")
|
|
|
|
node1.wait_until_succeeds("ping -c1 10.0.0.1")
|
|
|
|
node1.wait_until_succeeds("ping -c1 2001:db8::1")
|
|
|
|
|
|
|
|
# Check if static addresses have been restored
|
|
|
|
node1.wait_until_succeeds("ping -c1 42::1")
|
|
|
|
node1.wait_until_succeeds("ping -c1 192.168.42.1")
|
|
|
|
|
|
|
|
out = node1.wait_until_succeeds("ip route get 192.168.43.2")
|
|
|
|
print(out)
|
|
|
|
assert "192.168.43.2 dev eth1" in out
|
|
|
|
|
|
|
|
out = node1.wait_until_succeeds("ip route get 192.168.44.2")
|
|
|
|
print(out)
|
|
|
|
assert "192.168.44.2 via 192.168.43.1" in out
|
|
|
|
|
|
|
|
out = node1.wait_until_succeeds("ip route get 43::2")
|
|
|
|
print(out)
|
|
|
|
assert "43::2 from :: dev eth1" in out
|
|
|
|
|
|
|
|
out = node1.wait_until_succeeds("ip route get 44::2")
|
|
|
|
print(out)
|
|
|
|
assert "44::2 from :: via 43::1" in out
|
|
|
|
|
|
|
|
node1.succeed("ip addr >&2")
|
|
|
|
node1.succeed("ip route >&2")
|
|
|
|
node1.succeed("ip -6 route >&2")
|
|
|
|
node1.succeed("networkctl status eth1 >&2")
|
|
|
|
|
2022-09-04 14:57:14 +02:00
|
|
|
node1.shutdown()
|
|
|
|
'';
|
|
|
|
}
|