colmena/integration-tests/tools.nix

194 lines
6 KiB
Nix
Raw Normal View History

2021-11-22 10:52:35 +01:00
# Adapted from the NixOps test in Nixpkgs.
#
# By default, we have four nodes: deployer, alpha, beta, gamma.
2021-11-22 10:52:35 +01:00
# deployer is where colmena will run.
#
# `nixos/lib/build-vms.nix` will generate NixOS configurations
# for each node, and we need to include those configurations
# in our Colmena setup as well.
{ insideVm ? false
, deployers ? [ "deployer" ] # Nodes configured as deployers (with Colmena and pre-built system closure)
, targets ? [ "alpha" "beta" "gamma" ] # Nodes configured as targets (minimal config)
, extraDeployerConfig ? {} # Extra config on the deployer
, prebuiltTarget ? "alpha" # Target node to prebuild system closure for, or null
, pkgs ? if insideVm then import <nixpkgs> {} else throw "Must specify pkgs"
, colmena ? if !insideVm then pkgs.colmena else throw "Cannot eval inside VM"
}:
with builtins;
assert elem "deployer" deployers;
2021-11-22 10:52:35 +01:00
let
inherit (pkgs) lib;
2021-11-22 10:52:35 +01:00
colmenaExec = "${colmena}/bin/colmena";
sshKeys = import (pkgs.path + "/nixos/tests/ssh-keys.nix") pkgs;
buildVms = import (pkgs.path + "/nixos/lib/build-vms.nix") {
inherit (pkgs) system pkgs lib;
};
# Common setup
nodes = let
# Setup for deployer nodes
#
# We include the input closure of a prebuilt system profile
# so it can build system profiles for the targets without
# network access.
deployerConfig = { pkgs, lib, config, ... }: {
imports = [
extraDeployerConfig
];
nix.registry = lib.mkIf (pkgs ? _inputs) {
nixpkgs.flake = pkgs._inputs.nixpkgs;
};
2021-11-22 10:52:35 +01:00
nix.nixPath = [
"nixpkgs=${pkgs.path}"
];
nix.binaryCaches = lib.mkForce [];
virtualisation = {
memorySize = 3072;
2021-11-22 10:52:35 +01:00
writableStore = true;
additionalPaths = [
"${pkgs.path}"
] ++ lib.optionals (prebuiltTarget != null) [
prebuiltSystem
(inputClosureOf prebuiltSystem)
2021-11-22 10:52:35 +01:00
];
};
services.openssh.enable = true;
users.users.root.openssh.authorizedKeys.keys = [
sshKeys.snakeOilPublicKey
];
2021-12-05 10:14:12 +01:00
environment.systemPackages = with pkgs; [
git # for git flake tests
inotify-tools # for key services build
2021-12-05 10:14:12 +01:00
# HACK: copy stderr to both stdout and stderr
# (the test framework only captures stdout, and only stderr appears on screen during the build)
2021-12-05 10:14:12 +01:00
(writeShellScriptBin "run-copy-stderr" ''
exec "$@" 2> >(tee /dev/stderr)
'')
];
2021-11-22 10:52:35 +01:00
};
# Setup for target nodes
#
# Kept as minimal as possible.
targetConfig = { lib, ... }: {
nix.binaryCaches = lib.mkForce [];
documentation.nixos.enable = lib.mkOverride 60 true;
2021-11-22 10:52:35 +01:00
services.openssh.enable = true;
users.users.root.openssh.authorizedKeys.keys = [
sshKeys.snakeOilPublicKey
];
virtualisation.writableStore = true;
};
deployerNodes = map (name: lib.nameValuePair name deployerConfig) deployers;
targetNodes = map (name: lib.nameValuePair name targetConfig) targets;
in listToAttrs (deployerNodes ++ targetNodes);
prebuiltSystem = let
2021-11-22 10:52:35 +01:00
all = buildVms.buildVirtualNetwork nodes;
in all.${prebuiltTarget}.config.system.build.toplevel;
2021-11-22 10:52:35 +01:00
# Utilities
getStandaloneConfigFor = node: let
configsWithIp = buildVms.assignIPAddresses nodes;
in { modulesPath, lib, config, ... }: {
imports = configsWithIp.${node} ++ [
(modulesPath + "/virtualisation/qemu-vm.nix")
(modulesPath + "/testing/test-instrumentation.nix")
];
documentation.nixos.enable = lib.mkOverride 55 false;
2021-11-22 10:52:35 +01:00
boot.loader.grub.enable = false;
system.nixos.revision = lib.mkForce "constant-nixos-revision";
# otherwise the evaluation is unnecessarily slow in VM
virtualisation.additionalPaths = lib.mkForce [];
nix.nixPath = lib.mkForce [ "nixpkgs=/nixpkgs" ];
deployment.tags = lib.optional (config.networking.hostName != "deployer") "target";
};
inputClosureOf = pkg: pkgs.runCommand "full-closure" {
refs = pkgs.writeReferencesToFile pkg.drvPath;
} ''
touch $out
while read ref; do
case $ref in
*.drv)
cat $ref >>$out
;;
esac
done <$refs
'';
makeTest = test: let
2022-04-04 02:16:01 +02:00
customArgs = [ "bundle" ];
targetList = "[${concatStringsSep ", " targets}]";
2021-11-22 10:52:35 +01:00
fullScript = ''
start_all()
'' + lib.optionalString (prebuiltTarget != null) ''
deployer.succeed("nix-store -qR ${prebuiltSystem}")
'' + ''
2021-11-22 10:52:35 +01:00
deployer.succeed("nix-store -qR ${pkgs.path}")
deployer.succeed("ln -sf ${pkgs.path} /nixpkgs")
deployer.succeed("mkdir -p /root/.ssh && touch /root/.ssh/id_rsa && chmod 600 /root/.ssh/id_rsa && cat ${sshKeys.snakeOilPrivateKey} > /root/.ssh/id_rsa")
${lib.optionalString (length targets != 0) ''
for node in ${targetList}:
2021-11-22 10:52:35 +01:00
node.wait_for_unit("sshd.service")
deployer.succeed(f"ssh -o StrictHostKeyChecking=accept-new {node.name} true", timeout=30)
''}
2021-11-22 10:52:35 +01:00
deployer.succeed("cp --no-preserve=mode -r ${bundle} /tmp/bundle && chmod u+w /tmp/bundle")
2021-12-18 23:35:06 +01:00
orig_store_paths = set(deployer.succeed("ls /nix/store").strip().split("\n"))
def get_new_store_paths():
2021-12-18 23:35:06 +01:00
cur_store_paths = set(deployer.succeed("ls /nix/store").strip().split("\n"))
new_store_paths = cur_store_paths.difference(orig_store_paths)
deployer.log(f"{len(new_store_paths)} store paths were created")
l = list(map(lambda n: f"/nix/store/{n}", new_store_paths))
return l
2021-11-22 10:52:35 +01:00
'' + test.testScript;
bundle = pkgs.stdenv.mkDerivation {
name = "${test.name}-bundle";
dontUnpack = true;
dontInstall = true;
buildPhase = ''
cp -r ${test.bundle} $out
chmod u+w $out
cp ${./tools.nix} $out/tools.nix
'';
};
combined = {
inherit nodes;
2022-04-04 02:16:01 +02:00
} // (removeAttrs test customArgs) // {
2021-11-22 10:52:35 +01:00
testScript = fullScript;
};
in lib.makeOverridable pkgs.nixosTest combined;
2021-11-22 10:52:35 +01:00
in {
inherit pkgs nodes colmena colmenaExec
2021-11-22 10:52:35 +01:00
getStandaloneConfigFor inputClosureOf makeTest;
}