Compare commits
8 Commits
67768004ee
...
d8cc6ab61c
Author | SHA1 | Date | |
---|---|---|---|
d8cc6ab61c | |||
cc6c790746 | |||
bcf5dac5d7 | |||
1c002c4065 | |||
2af8f2382a | |||
74f2aa6247 | |||
888a0d5f74 | |||
30153a2d4e |
@ -45,5 +45,7 @@
|
|||||||
|
|
||||||
openwrt = callPackage ./openwrt {};
|
openwrt = callPackage ./openwrt {};
|
||||||
|
|
||||||
|
initramfs-peek = callPackage ./initramfs-peek {};
|
||||||
|
min-copy-closure = callPackage ./min-copy-closure {};
|
||||||
hi = callPackage ./hi {};
|
hi = callPackage ./hi {};
|
||||||
}
|
}
|
||||||
|
37
pkgs/initramfs-peek/default.nix
Normal file
37
pkgs/initramfs-peek/default.nix
Normal file
@ -0,0 +1,37 @@
|
|||||||
|
{
|
||||||
|
busybox
|
||||||
|
, pkgsBuildBuild
|
||||||
|
, runCommand
|
||||||
|
, cpio
|
||||||
|
, writeReferencesToFile
|
||||||
|
, writeScript
|
||||||
|
} :
|
||||||
|
let
|
||||||
|
inherit (pkgsBuildBuild) gen_init_cpio;
|
||||||
|
script = writeScript "init" ''
|
||||||
|
#!/bin/sh
|
||||||
|
exec >/dev/console
|
||||||
|
echo Running in initramfs
|
||||||
|
PATH=${busybox}/bin:$PATH
|
||||||
|
export PATH
|
||||||
|
mount -t proc none /proc
|
||||||
|
mount -t sysfs none /sys
|
||||||
|
${busybox}/bin/sh
|
||||||
|
'';
|
||||||
|
refs = writeReferencesToFile busybox;
|
||||||
|
in runCommand "initramfs.cpio" { } ''
|
||||||
|
cat << SPECIALS | ${gen_init_cpio}/bin/gen_init_cpio /dev/stdin > out
|
||||||
|
dir /proc 0755 0 0
|
||||||
|
dir /sys 0755 0 0
|
||||||
|
dir /dev 0755 0 0
|
||||||
|
nod /dev/console 0600 0 0 c 5 1
|
||||||
|
nod /dev/mtdblock0 0600 0 0 b 31 0
|
||||||
|
dir /nix 0755 0 0
|
||||||
|
dir /nix/store 0755 0 0
|
||||||
|
dir /bin 0755 0 0
|
||||||
|
file /bin/sh ${busybox}/bin/sh 0755 0 0
|
||||||
|
file /init ${script} 0755 0 0
|
||||||
|
SPECIALS
|
||||||
|
find $(cat ${refs}) | ${pkgsBuildBuild.cpio}/bin/cpio -H newc -o -A -v -O out
|
||||||
|
cp out $out
|
||||||
|
''
|
15
pkgs/min-copy-closure/default.nix
Normal file
15
pkgs/min-copy-closure/default.nix
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
stdenv
|
||||||
|
, nix
|
||||||
|
, cpio
|
||||||
|
, openssh
|
||||||
|
}: stdenv.mkDerivation {
|
||||||
|
name = "min-copy-closure";
|
||||||
|
buildInputs = [ ];
|
||||||
|
propagatedBuildInputs = [ cpio openssh nix ];
|
||||||
|
src = ./.;
|
||||||
|
installPhase = ''
|
||||||
|
mkdir -p $out/bin
|
||||||
|
cp min-copy-closure.sh $out/bin/min-copy-closure
|
||||||
|
'';
|
||||||
|
}
|
2
pkgs/min-copy-closure/min-copy-closure.fnl
Normal file
2
pkgs/min-copy-closure/min-copy-closure.fnl
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
|
||||||
|
(local ssh (io.popen "
|
53
pkgs/min-copy-closure/min-copy-closure.sh
Executable file
53
pkgs/min-copy-closure/min-copy-closure.sh
Executable file
@ -0,0 +1,53 @@
|
|||||||
|
#!/usr/bin/env bash
|
||||||
|
|
||||||
|
ssh_command=${SSH_COMMAND-ssh}
|
||||||
|
target_host=$1
|
||||||
|
shift
|
||||||
|
|
||||||
|
if [ -z "$target_host" ] ; then
|
||||||
|
echo Usage: min-copy-closure target-host paths
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [ -n "$IN_NIX_BUILD" ] ; then
|
||||||
|
# can't run nix-store in a derivation, so we have to
|
||||||
|
# skip the requisites when running tests in hydra
|
||||||
|
paths=$@
|
||||||
|
else
|
||||||
|
paths=$(nix-store -q --requisites "$@")
|
||||||
|
fi
|
||||||
|
needed=""
|
||||||
|
|
||||||
|
coproc remote {
|
||||||
|
${ssh_command} -C -T ${target_host}
|
||||||
|
}
|
||||||
|
|
||||||
|
exec 10>&${remote[1]}
|
||||||
|
|
||||||
|
for p in $paths; do
|
||||||
|
echo -n Checking $(basename $p) ...
|
||||||
|
echo "test -e $p && echo skip || echo $p" >&10
|
||||||
|
read n <&${remote[0]}
|
||||||
|
case $n in
|
||||||
|
skip)
|
||||||
|
echo skip
|
||||||
|
;;
|
||||||
|
*)
|
||||||
|
needed="${needed} $n"
|
||||||
|
echo will copy
|
||||||
|
;;
|
||||||
|
esac
|
||||||
|
done
|
||||||
|
|
||||||
|
if test -z "$needed" ; then
|
||||||
|
echo Nothing to copy
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
echo "cd / && cpio -v -i >/dev/console" >&10
|
||||||
|
|
||||||
|
find $needed | cpio -H newc -o >&10
|
||||||
|
|
||||||
|
echo "date" >&10
|
||||||
|
read n <&${remote[0]}
|
||||||
|
echo $n
|
9
pkgs/min-copy-closure/receive.sh
Normal file
9
pkgs/min-copy-closure/receive.sh
Normal file
@ -0,0 +1,9 @@
|
|||||||
|
#!/usr/bin/env sh
|
||||||
|
cd /nix/store
|
||||||
|
while read f ; do
|
||||||
|
test "$f" = "end" && break
|
||||||
|
test -e $f || echo -n $f " "
|
||||||
|
done
|
||||||
|
mkdir -p /tmp/store
|
||||||
|
cd /tmp/store
|
||||||
|
cpio -i
|
@ -29,6 +29,8 @@ fi
|
|||||||
|
|
||||||
test -n "$2" || usage
|
test -n "$2" || usage
|
||||||
|
|
||||||
|
lan=${LAN-"socket,mcast=230.0.0.1:1235,localaddr=127.0.0.1"}
|
||||||
|
|
||||||
rootfs=$(mktemp mips-vm-fs-XXXXXX)
|
rootfs=$(mktemp mips-vm-fs-XXXXXX)
|
||||||
dd if=/dev/zero of=$rootfs bs=1M count=16 conv=sync
|
dd if=/dev/zero of=$rootfs bs=1M count=16 conv=sync
|
||||||
dd if=$2 of=$rootfs bs=65536 conv=sync,nocreat,notrunc
|
dd if=$2 of=$rootfs bs=65536 conv=sync,nocreat,notrunc
|
||||||
@ -47,7 +49,7 @@ qemu-system-mips \
|
|||||||
-drive file=$rootfs,format=raw,readonly=off,if=virtio,index=0 \
|
-drive file=$rootfs,format=raw,readonly=off,if=virtio,index=0 \
|
||||||
${initramfs} \
|
${initramfs} \
|
||||||
-netdev socket,id=access,mcast=230.0.0.1:1234,localaddr=127.0.0.1 \
|
-netdev socket,id=access,mcast=230.0.0.1:1234,localaddr=127.0.0.1 \
|
||||||
-device virtio-net-pci,disable-legacy=on,disable-modern=off,netdev=access,mac=ba:ad:1d:ea:21:02 \
|
-device virtio-net,disable-legacy=on,disable-modern=off,netdev=access,mac=ba:ad:1d:ea:21:02 \
|
||||||
-netdev socket,id=lan,mcast=230.0.0.1:1235,localaddr=127.0.0.1 \
|
-netdev ${lan},id=lan \
|
||||||
-device virtio-net-pci,disable-legacy=on,disable-modern=off,netdev=lan,mac=ba:ad:1d:ea:21:01 \
|
-device virtio-net,disable-legacy=on,disable-modern=off,netdev=lan,mac=ba:ad:1d:ea:21:01 \
|
||||||
-kernel $1 -display none $flags ${QEMU_OPTIONS}
|
-kernel $1 -display none $flags ${QEMU_OPTIONS}
|
||||||
|
@ -4,4 +4,5 @@
|
|||||||
wlan = import ./wlan/test.nix;
|
wlan = import ./wlan/test.nix;
|
||||||
pppoe = import ./pppoe/test.nix;
|
pppoe = import ./pppoe/test.nix;
|
||||||
jffs2 = import ./jffs2/test.nix;
|
jffs2 = import ./jffs2/test.nix;
|
||||||
|
min-copy-closure = import ./min-copy-closure/test.nix;
|
||||||
}
|
}
|
||||||
|
47
tests/min-copy-closure/configuration.nix
Normal file
47
tests/min-copy-closure/configuration.nix
Normal file
@ -0,0 +1,47 @@
|
|||||||
|
{ config, pkgs, lib, ... } :
|
||||||
|
let
|
||||||
|
inherit (pkgs) dropbear;
|
||||||
|
inherit (pkgs.pseudofile) dir symlink;
|
||||||
|
inherit (pkgs.liminix.services) oneshot longrun bundle target;
|
||||||
|
inherit
|
||||||
|
(pkgs.liminix.networking)
|
||||||
|
address
|
||||||
|
udhcpc
|
||||||
|
interface
|
||||||
|
route
|
||||||
|
;
|
||||||
|
in {
|
||||||
|
imports = [
|
||||||
|
../../vanilla-configuration.nix
|
||||||
|
../../modules/squashfs.nix
|
||||||
|
../../modules/jffs2.nix
|
||||||
|
];
|
||||||
|
config = {
|
||||||
|
services.sshd = longrun {
|
||||||
|
name = "sshd";
|
||||||
|
run = ''
|
||||||
|
mkdir -p /run/dropbear
|
||||||
|
${dropbear}/bin/dropbear -E -P /run/dropbear.pid -R -F
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
users.root = {
|
||||||
|
passwd = lib.mkForce "$6$GYDbeLSyoIdgDdZW$EXlz4oI7Jz1igSYd4cxwcWR4lqEc5AWdGWuPuBarQeUskFQsBCpPc0GgIPPDl1k7SgrnC82JzSWxvx5o0bvmx/";
|
||||||
|
openssh.authorizedKeys.keys = [
|
||||||
|
(builtins.readFile ./id.pub)
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
|
# services.dhcpc =
|
||||||
|
# let iface = config.hardware.networkInterfaces.lan;
|
||||||
|
# in (udhcpc iface {
|
||||||
|
# dependencies = [ config.services.hostname ];
|
||||||
|
# }) // { inherit (iface) device; };
|
||||||
|
|
||||||
|
rootfsType = "jffs2";
|
||||||
|
services.default = lib.mkForce (target {
|
||||||
|
name = "default";
|
||||||
|
contents = with config.services; [ loopback ntp defaultroute4 sshd dhcpv4 ];
|
||||||
|
});
|
||||||
|
};
|
||||||
|
}
|
38
tests/min-copy-closure/id
Normal file
38
tests/min-copy-closure/id
Normal file
@ -0,0 +1,38 @@
|
|||||||
|
-----BEGIN OPENSSH PRIVATE KEY-----
|
||||||
|
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAABlwAAAAdzc2gtcn
|
||||||
|
NhAAAAAwEAAQAAAYEAzCrNzkxcZlm73f1u1o8XbElUjBNd+++Hikk2t2ksDfmzJ0tRBlxh
|
||||||
|
hccwo7rGy/zvYvSEgvWARpbwvKA+mOPRxk2vJ5SZsFrgyg2qLWpjETYnT6N4WB2qlyeXBu
|
||||||
|
haEKIZRrXOA/rYby1zuAuh6MPt1g4bYacfX5sYFUgq1YRyrtSmfSMhNHsIHYEemVPrj13o
|
||||||
|
RBYISIY9C031wyQjGszYY+B6gi3Py4qzw3kuft9kGOHquml0OMmNvWiPnyfW1ZrIeve5FU
|
||||||
|
tvArCVjsUqN6sl3G+JiyeDNkT27K2Of0g1sxCvJfeHMmB6XPg0JEq57mgBnq9CXHsonZ+q
|
||||||
|
9lfygwg4v87rn4EXwzW2GvEaKVZffGGk6y6ZF5cG8W8EL1ZOg9df4vtjcxdPCmHueU35L3
|
||||||
|
4YZf58ibKNK6w23J2MYD1kXtj3MreMnkOsWBt267qIe/4fvbIDxtDfXdiAQSGDS1/o+btA
|
||||||
|
jGw708CtWMKKLbmwGMKq1k9BFcr7nzmZCHMuILonAAAFiB8p2oQfKdqEAAAAB3NzaC1yc2
|
||||||
|
EAAAGBAMwqzc5MXGZZu939btaPF2xJVIwTXfvvh4pJNrdpLA35sydLUQZcYYXHMKO6xsv8
|
||||||
|
72L0hIL1gEaW8LygPpjj0cZNryeUmbBa4MoNqi1qYxE2J0+jeFgdqpcnlwboWhCiGUa1zg
|
||||||
|
P62G8tc7gLoejD7dYOG2GnH1+bGBVIKtWEcq7Upn0jITR7CB2BHplT649d6EQWCEiGPQtN
|
||||||
|
9cMkIxrM2GPgeoItz8uKs8N5Ln7fZBjh6rppdDjJjb1oj58n1tWayHr3uRVLbwKwlY7FKj
|
||||||
|
erJdxviYsngzZE9uytjn9INbMQryX3hzJgelz4NCRKue5oAZ6vQlx7KJ2fqvZX8oMIOL/O
|
||||||
|
65+BF8M1thrxGilWX3xhpOsumReXBvFvBC9WToPXX+L7Y3MXTwph7nlN+S9+GGX+fImyjS
|
||||||
|
usNtydjGA9ZF7Y9zK3jJ5DrFgbduu6iHv+H72yA8bQ313YgEEhg0tf6Pm7QIxsO9PArVjC
|
||||||
|
ii25sBjCqtZPQRXK+585mQhzLiC6JwAAAAMBAAEAAAGACfdA6oQBsqFIsVJQmbqMWyXNMb
|
||||||
|
U0Tjrn89EVEajZlKkOnKlpgBT8UapibmuMjqJ/EOZ8nWPcahWuFJcB1zavo61hEl6Hjfsx
|
||||||
|
o8s89lCOG2X4T0PcePihvhUZoyWuV8eB0ljHgJw6+lpOnro6ogEGV/+CSKb+ugz5BPjr1l
|
||||||
|
ZLvsr0gYE4erZStBX8Z2GYSvw7fS9SIjAjRKz+hRL7f7BmE6H+eOJBlV7k3XLJ2TmQSkKk
|
||||||
|
0YqaOLdl6svyzsMEEpMmhb1Uzt7Nna0m43N6e0jZ0/p1wlO8LkslXONmRw2gzQZmdp0ceq
|
||||||
|
pAvyomQ7ywIyVrnBDZp6+PfZubA5QKkTdlXYAcQIdgcAC81BjP46P1sz9mjVzAcwN5Rf7Y
|
||||||
|
dIus0Wv7WBWL87q2AXMAcd8YYSaN1GgkHMNFIqVR5y92riJLGNdOr9wkDCNFra1TMOVKwj
|
||||||
|
nl/epYI84bz/umSAxVMcSJ8Wk4laiicYnsjCX1Now53w+Kzt4Qo/SVhZRFmJuR2GixAAAA
|
||||||
|
wQCersXMwaUatzbp2/tJpLDBLVsefNqHN0PZs4CX0NI8uatRJyIYYF/wnxLmNfPZ85YQ82
|
||||||
|
UmIejQODBR35MroRvYsnVZHphBNqX4/wHkQ8QIDlfG35PbOmhVnDHTUoKgg8X0NEriGHRG
|
||||||
|
F2uhysYu8qIhizx7ZsDcbKZ4SDH/xDtTXQIgSqBBsqbdIxWAdudlnVHd6ufuWMEvFBVExW
|
||||||
|
l+Zs3Daa/khpuVaQbI7Saes9bmpJtSE2UJO9KH6lzH4Kwe8sMAAADBAOw6/u30oIcpf13O
|
||||||
|
S4Yk39Ac9ZARpGY1FyyeJ9k6MYeE8uhPkBMLwQS+CWQWthSRk0WO/rFbCu4FJWoC1mZ0i0
|
||||||
|
0CpRApOiwyqm+8DrwEJPOPuC535nRR05aWTCcRwOFChmBrCtsWtRJ24pD+U5oe4aY1dFbZ
|
||||||
|
oIPqqbcHMk9xuATd2J5KucTG2PnSwhz2fArbn5Jz2e0VSi5pRspKz++JiCLsZ0Co/LNJDR
|
||||||
|
/T3rQ2KZNa++HaGT7GRNuL3wfr2uOGWQAAAMEA3UDieFsCTORFRxoWFvg4YKVYTJdj5Fy5
|
||||||
|
vFFoiHP61b4xKADdnMBnmw5wYbKLbTL1oawCpS+063RhSDoMueiylAzgKCQDF1ulkfK0e9
|
||||||
|
Fccs4ZfXg2niel/j+D0x7pk3kFCdCabqgI80avAjItcj8LnmrNEV3GK4VUIOqg//4SDXHV
|
||||||
|
lWYwYGJaImzO4NAUe6U+e7iY6cxCMSh2ETzfhkWi3R3p82XE6i5Q6W1SC9gojH6ARH4oZg
|
||||||
|
FQjzLfyJPuzzR/AAAADWRhbkBsb2FjbGhvc3QBAgMEBQ==
|
||||||
|
-----END OPENSSH PRIVATE KEY-----
|
1
tests/min-copy-closure/id.pub
Normal file
1
tests/min-copy-closure/id.pub
Normal file
@ -0,0 +1 @@
|
|||||||
|
ssh-rsa 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 dan@loaclhost
|
48
tests/min-copy-closure/test.nix
Normal file
48
tests/min-copy-closure/test.nix
Normal file
@ -0,0 +1,48 @@
|
|||||||
|
{
|
||||||
|
liminix
|
||||||
|
, nixpkgs
|
||||||
|
}:
|
||||||
|
let lmx = (import liminix {
|
||||||
|
device = import "${liminix}/devices/qemu/";
|
||||||
|
liminix-config = ./configuration.nix;
|
||||||
|
});
|
||||||
|
rogue = lmx.pkgs.rogue;
|
||||||
|
img = lmx.outputs.vmroot;
|
||||||
|
pkgs = import <nixpkgs> { overlays = [(import ../../overlay.nix)]; };
|
||||||
|
inherit (pkgs.pkgsBuildBuild) mips-vm;
|
||||||
|
in pkgs.runCommand "check" {
|
||||||
|
nativeBuildInputs = with pkgs; [
|
||||||
|
expect
|
||||||
|
mips-vm
|
||||||
|
socat
|
||||||
|
min-copy-closure
|
||||||
|
rogue
|
||||||
|
] ;
|
||||||
|
} ''
|
||||||
|
killpid(){
|
||||||
|
if test -e $1 && test -d /proc/`cat $1` ; then
|
||||||
|
pid=$(cat $1)
|
||||||
|
kill $pid
|
||||||
|
fi
|
||||||
|
}
|
||||||
|
|
||||||
|
cleanup(){
|
||||||
|
killpid ./vm/pid
|
||||||
|
}
|
||||||
|
|
||||||
|
trap cleanup EXIT
|
||||||
|
fatal(){
|
||||||
|
err=$?
|
||||||
|
echo "FAIL: command $(eval echo $BASH_COMMAND) exited with code $err"
|
||||||
|
exit $err
|
||||||
|
}
|
||||||
|
trap fatal ERR
|
||||||
|
|
||||||
|
mkdir vm
|
||||||
|
LAN=user,hostfwd=tcp::2022-:22 mips-vm --background ./vm ${img}/vmlinux ${img}/rootfs
|
||||||
|
expect ${./wait-until-ready.expect}
|
||||||
|
export SSH_COMMAND="ssh -o StrictHostKeyChecking=no -p 2022 -i ${./id}"
|
||||||
|
$SSH_COMMAND root@localhost echo ready
|
||||||
|
IN_NIX_BUILD=true min-copy-closure root@localhost ${rogue}
|
||||||
|
$SSH_COMMAND root@localhost ls -l ${rogue} >$out
|
||||||
|
''
|
5
tests/min-copy-closure/wait-until-ready.expect
Normal file
5
tests/min-copy-closure/wait-until-ready.expect
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
set timeout 60
|
||||||
|
|
||||||
|
spawn socat unix-connect:vm/console -
|
||||||
|
send "\r\n"
|
||||||
|
expect "login:"
|
@ -10,17 +10,17 @@ in rec {
|
|||||||
services.loopback = config.hardware.networkInterfaces.lo;
|
services.loopback = config.hardware.networkInterfaces.lo;
|
||||||
|
|
||||||
services.dhcpv4 =
|
services.dhcpv4 =
|
||||||
let iface = interface { type = "hardware"; device = "eth0"; };
|
let iface = interface { type = "hardware"; device = "eth1"; };
|
||||||
in udhcpc iface {};
|
in udhcpc iface {};
|
||||||
|
|
||||||
services.dhcpv6 =
|
services.dhcpv6 =
|
||||||
let iface = interface { type = "hardware"; device = "eth0"; };
|
let iface = interface { type = "hardware"; device = "eth1"; };
|
||||||
in odhcpc iface { uid = "e7"; };
|
in odhcpc iface { uid = "e7"; };
|
||||||
|
|
||||||
services.ntp = longrun {
|
services.ntp = longrun {
|
||||||
name = "ntp";
|
name = "ntp";
|
||||||
run = let inherit (services) dhcpv4 dhcpv6;
|
run = let inherit (services) dhcpv4 dhcpv6;
|
||||||
in "${pkgs.ntp}/bin/ntpd $(output ${dhcpv4} ntp_servers) $(output ${dhcpv6} NTP_IP})";
|
in "${pkgs.ntp}/bin/ntpd $(output ${dhcpv4} ntp_servers) $(output ${dhcpv6} NTP_IP)";
|
||||||
|
|
||||||
# I don't think it's possible to standardise the file names
|
# I don't think it's possible to standardise the file names
|
||||||
# generally, as different services have different outputs, but it
|
# generally, as different services have different outputs, but it
|
||||||
|
Loading…
Reference in New Issue
Block a user