Skip to content

Commit

Permalink
test(nix): add basic functionality testing infra
Browse files Browse the repository at this point in the history
Use nixos-test scaffolding to spawn VMs and run any scripts in
`checks/*.sh` as tests inside of the VM. This should lessen the risk of
any obvious breakage in the CI but needs more and better tests to cover
more commands.

Signed-off-by: Thomas Mühlbacher <[email protected]>
  • Loading branch information
tmuehlbacher committed Jun 18, 2024
1 parent e237413 commit 34cafd2
Show file tree
Hide file tree
Showing 8 changed files with 296 additions and 25 deletions.
14 changes: 14 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -30,6 +30,20 @@ Build and install

Refer to [INSTALL.md](./INSTALL.md)

Testing
-------

Besides manual testing, which is also encouraged, there are also a number of
checks defined that are used for CI (e.g. github actions).

These checks can be listed using `nix flake show`. You can, for example, test
the current state of the repo or test every patch before publishing them.

```shell
$ nix flake check
$ git rev-list origin/master.. | xargs -I{} nix flake check "git+file://$(pwd)?rev={}"
```

Bug reports and contributions
-----------------------------

Expand Down
72 changes: 72 additions & 0 deletions checks/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,72 @@
# NixOS tests

Any `*.sh` file in this directory will be run in a NixOS VM for basic
functionality testing as part of CI. To list all outputs, including the checks,
you can use this command:

```shell
$ nix flake show
```

You can also run these tests locally by running `nix flake check`. To run one
specific test you can use `nix build` like this:

```shell
$ nix build ".#checks.x86_64-linux.subvolume"
```

With the flag `-L`/`--print-build-logs` outputs are shown fully as checks are
executing. Additionally, if the specific check has already been run locally, you
can view the log for the check or force another run with the following:

```shell
$ nix log .#checks.x86_64-linux.subvolume
$ nix build --rebuild .#checks.x86_64-linux.subvolume
```

If you need any more packages inside of the VM for a test, you can add them to
`environment.systemPackages` in `default.nix`. If you're unsure about the
package you need, [NixOS package search] may be able to help.

For more information about the NixOS testing library see the
[testing wiki article].

## Kernel version inside VM

By default `linuxPackages_latest` from nixpkgs is used in the testing VM. This
is the latest stable kernel version available in the nixpkgs revision. Updating
the nixpkgs flake input may update the used kernel. A custom-built kernel can be
used as well but with added build times in CI.

## Adding new tests

The easiest way to add new tests is of course to copy an existing test and adapt
it accordingly. Importantly, for nix to see a file as part of the sources, the
file needs to be in the git index. It doesn't have to be committed to the repo
just yet but you need to `git add` it. If `git ls-files` lists the file, nix
will also see it.

## Interactive debugging of tests

When writing a new test or experiencing a difficult to understand test failure,
an interactive login can be very handy. This can be achieved by building the
`driverInteractive` attribute of the check, for example like this:

```shell
$ nix build .#checks.x86_64-linux.subvolume.driverInteractive
```

The `nix build` will create a symlink in your working directory called `result`
which leads to a script that launches the VM interactively:

```shell
$ ./result/bin/nixos-test-driver
```

There is more information about this in the NixOS manual under
[running tests interactively].

[Linux wiki article]: https://wiki.nixos.org/wiki/Linux_kernel
[NixOS package search]: https://search.nixos.org
[running tests interactively]: https://nixos.org/manual/nixos/stable/#sec-running-nixos-tests-interactively
[testing wiki article]: https://wiki.nixos.org/wiki/NixOS_Testing_library
50 changes: 50 additions & 0 deletions checks/default.nix
Original file line number Diff line number Diff line change
@@ -0,0 +1,50 @@
{ pkgs }:
let
inherit (builtins) readDir;
inherit (pkgs.lib)
filterAttrs
genAttrs
hasSuffix
lists
mapAttrsToList
removeSuffix
splitString
;

basename = path: (lists.last (splitString "/" path));
scriptName = shFile: removeSuffix ".sh" (basename shFile);

scriptNames = mapAttrsToList (n: v: scriptName n) (
filterAttrs (n: v: v == "regular" && hasSuffix ".sh" n) (readDir ./.)
);

mkTest =
name:
pkgs.testers.runNixOSTest {
inherit name;

nodes.machine =
{ pkgs, ... }:
{
virtualisation.emptyDiskImages = [ 4096 ];
boot.supportedFilesystems = [ "bcachefs" ];
boot.kernelPackages = pkgs.linuxPackages_latest;

# Add any packages you need inside test scripts here
environment.systemPackages = with pkgs; [
genpass
keyutils
];

environment.variables = {
RUST_BACKTRACE = "full";
};
};

testScript = ''
machine.succeed("modprobe bcachefs")
machine.succeed("${./${name}.sh} 1>&2")
'';
};
in
genAttrs scriptNames mkTest
34 changes: 34 additions & 0 deletions checks/encrypted-multidev.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,34 @@
#!/usr/bin/env bash
set -euxo pipefail

blkdev="/dev/vdb"
mnt="/tmp/mnt"
pw=$(genpass)
uuid=$(uuidgen)

# link user and session keyrings so that the key can be found by the kernel
keyctl link @u @s

sfdisk "$blkdev" <<EOF
label: gpt
type=linux, size=1G
type=linux, size=1G
type=linux
EOF

udevadm settle

echo "$pw" | bcachefs format \
--verbose \
--encrypted \
--replicas=2 \
--uuid "$uuid" \
--fs_label test-fs \
"$blkdev"?

udevadm settle

mkdir -p "$mnt"
echo "$pw" | bcachefs mount -v "UUID=$uuid" "$mnt"

keyctl search @u user "bcachefs:$uuid"
39 changes: 39 additions & 0 deletions checks/encrypted-unlock.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,39 @@
#!/usr/bin/env bash
set -euxo pipefail

blkdev="/dev/vdb"
mnt="/tmp/mnt"
pw=$(genpass)
uuid=$(uuidgen)

# link user and session keyrings so that the key can be found by the kernel
keyctl link @u @s

echo "$pw" | bcachefs format \
--verbose \
--encrypted \
--uuid "$uuid" \
--fs_label test-fs \
"$blkdev"

udevadm settle

mkdir -p "$mnt"

bcachefs unlock -c "$blkdev"

echo "$pw" | bcachefs unlock "$blkdev"
key_id=$(keyctl search @u user "bcachefs:$uuid")

bcachefs mount -v "$blkdev" "$mnt"
umount "$mnt"

keyctl unlink "$key_id"

echo "$pw" | bcachefs unlock -k session "$blkdev"
key_id=$(keyctl search @s user "bcachefs:$uuid")

mount -t bcachefs "$blkdev" "$mnt"
umount "$mnt"

keyctl unlink "$key_id"
20 changes: 20 additions & 0 deletions checks/outputs.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,20 @@
#!/usr/bin/env bash
set -euxo pipefail

blkdev="/dev/vdb"
mnt="/tmp/mnt"
uuid=$(uuidgen)

bcachefs format \
--verbose \
--uuid "$uuid" \
--fs_label test-fs \
"$blkdev"

udevadm settle

mkdir -p "$mnt"
mount "$blkdev" "$mnt"

bcachefs show-super "$blkdev" | grep -i "external.*$uuid"
bcachefs fs usage "$mnt" | grep "$uuid"
36 changes: 36 additions & 0 deletions checks/subvolume.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,36 @@
#!/usr/bin/env bash
set -euxo pipefail

blkdev="/dev/vdb"
mnt="/tmp/mnt"
uuid=$(uuidgen)

bcachefs format \
--verbose \
--uuid "$uuid" \
--fs_label test-fs \
"$blkdev"

udevadm settle

mkdir -p "$mnt"
mount "$blkdev" "$mnt"

touch "$mnt/file1"

bcachefs subvolume create "$mnt/subvol1"
bcachefs subvolume delete "$mnt/subvol1"

(
cd "$mnt"

bcachefs subvolume create subvol1
bcachefs subvolume create subvol1/subvol1
bcachefs subvolume create subvol1/subvol2
touch subvol1/file1

rm subvol1/file1
bcachefs subvolume delete subvol1/subvol2
bcachefs subvolume delete subvol1/subvol1
bcachefs subvolume delete subvol1
)
56 changes: 31 additions & 25 deletions flake.nix
Original file line number Diff line number Diff line change
Expand Up @@ -143,31 +143,37 @@
}
);

checks.cargo-clippy = craneLib.cargoClippy (
commonArgs
// {
inherit cargoArtifacts;
cargoClippyExtraArgs = "--all-targets -- --deny warnings";
}
);

# we have to build our own `craneLib.cargoTest`
checks.cargo-test = craneLib.mkCargoDerivation (
commonArgs
// {
inherit cargoArtifacts;
doCheck = true;

enableParallelChecking = true;

pnameSuffix = "-test";
buildPhaseCargoCommand = "";
checkPhaseCargoCommand = ''
make ''${enableParallelChecking:+-j''${NIX_BUILD_CORES}} $makeFlags libbcachefs.a
cargo test --profile release -- --nocapture
'';
}
);
checks =
let
overlay = final: prev: { inherit (config.packages) bcachefs-tools; };

cargo-clippy = craneLib.cargoClippy (
commonArgs
// {
inherit cargoArtifacts;
cargoClippyExtraArgs = "--all-targets -- --deny warnings";
}
);

# we have to build our own `craneLib.cargoTest`
cargo-test = craneLib.mkCargoDerivation (
commonArgs
// {
inherit cargoArtifacts;
doCheck = true;

enableParallelChecking = true;

pnameSuffix = "-test";
buildPhaseCargoCommand = "";
checkPhaseCargoCommand = ''
make ''${enableParallelChecking:+-j''${NIX_BUILD_CORES}} $makeFlags libbcachefs.a
cargo test --profile release -- --nocapture
'';
}
);
in
(import ./checks { pkgs = pkgs.extend overlay; }) // { inherit cargo-clippy cargo-test; };

devShells.default = pkgs.mkShell {
inputsFrom = [
Expand Down

0 comments on commit 34cafd2

Please sign in to comment.