2024-12-13 08:58:09 -05:00
|
|
|
import ../make-test-python.nix (
|
|
|
|
{
|
|
|
|
pkgs,
|
|
|
|
lib,
|
|
|
|
|
|
|
|
lts ? true,
|
|
|
|
|
|
|
|
allTests ? false,
|
|
|
|
|
|
|
|
featureUser ? allTests,
|
|
|
|
initLegacy ? true,
|
|
|
|
initSystemd ? true,
|
|
|
|
instanceContainer ? allTests,
|
|
|
|
instanceVm ? allTests,
|
|
|
|
networkOvs ? allTests,
|
|
|
|
storageLvm ? allTests,
|
|
|
|
storageZfs ? allTests,
|
|
|
|
...
|
|
|
|
}:
|
|
|
|
|
|
|
|
let
|
|
|
|
releases =
|
|
|
|
init:
|
|
|
|
import ../../release.nix {
|
|
|
|
configuration = {
|
|
|
|
# Building documentation makes the test unnecessarily take a longer time:
|
|
|
|
documentation.enable = lib.mkForce false;
|
|
|
|
|
|
|
|
boot.initrd.systemd.enable = init == "systemd";
|
|
|
|
|
|
|
|
# Arbitrary sysctl modification to ensure containers can update sysctl
|
|
|
|
boot.kernel.sysctl."net.ipv4.ip_forward" = "1";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
images = init: {
|
|
|
|
container = {
|
|
|
|
metadata =
|
|
|
|
(releases init).incusContainerMeta.${pkgs.stdenv.hostPlatform.system}
|
|
|
|
+ "/tarball/nixos-image-lxc-*-${pkgs.stdenv.hostPlatform.system}.tar.xz";
|
|
|
|
|
|
|
|
rootfs =
|
|
|
|
(releases init).incusContainerImage.${pkgs.stdenv.hostPlatform.system}
|
|
|
|
+ "/nixos-lxc-image-${pkgs.stdenv.hostPlatform.system}.squashfs";
|
|
|
|
};
|
|
|
|
|
|
|
|
virtual-machine = {
|
|
|
|
metadata =
|
|
|
|
(releases init).incusVirtualMachineImageMeta.${pkgs.stdenv.hostPlatform.system} + "/*/*.tar.xz";
|
|
|
|
disk = (releases init).incusVirtualMachineImage.${pkgs.stdenv.hostPlatform.system} + "/nixos.qcow2";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
initVariants = lib.optionals initLegacy [ "legacy" ] ++ lib.optionals initSystemd [ "systemd" ];
|
|
|
|
|
|
|
|
canTestVm = instanceVm && pkgs.stdenv.isLinux && pkgs.stdenv.isx86_64;
|
|
|
|
in
|
|
|
|
{
|
|
|
|
name = "incus" + lib.optionalString lts "-lts";
|
|
|
|
|
|
|
|
meta = {
|
|
|
|
maintainers = lib.teams.lxc.members;
|
|
|
|
};
|
|
|
|
|
|
|
|
nodes.machine = {
|
|
|
|
virtualisation = {
|
|
|
|
cores = 2;
|
|
|
|
memorySize = 2048;
|
|
|
|
diskSize = 12 * 1024;
|
|
|
|
emptyDiskImages = [
|
|
|
|
# vdb for zfs
|
|
|
|
2048
|
|
|
|
# vdc for lvm
|
|
|
|
2048
|
|
|
|
];
|
|
|
|
|
|
|
|
incus = {
|
|
|
|
enable = true;
|
|
|
|
package = if lts then pkgs.incus-lts else pkgs.incus;
|
|
|
|
|
|
|
|
preseed = {
|
|
|
|
networks =
|
|
|
|
[
|
|
|
|
{
|
|
|
|
name = "incusbr0";
|
|
|
|
type = "bridge";
|
|
|
|
config = {
|
|
|
|
"ipv4.address" = "10.0.10.1/24";
|
|
|
|
"ipv4.nat" = "true";
|
|
|
|
};
|
|
|
|
}
|
|
|
|
]
|
|
|
|
++ lib.optionals networkOvs [
|
|
|
|
{
|
|
|
|
name = "ovsbr0";
|
|
|
|
type = "bridge";
|
|
|
|
config = {
|
|
|
|
"bridge.driver" = "openvswitch";
|
|
|
|
"ipv4.address" = "10.0.20.1/24";
|
|
|
|
"ipv4.nat" = "true";
|
|
|
|
};
|
|
|
|
}
|
|
|
|
];
|
|
|
|
profiles = [
|
|
|
|
{
|
|
|
|
name = "default";
|
|
|
|
devices = {
|
|
|
|
eth0 = {
|
|
|
|
name = "eth0";
|
|
|
|
network = "incusbr0";
|
|
|
|
type = "nic";
|
|
|
|
};
|
|
|
|
root = {
|
|
|
|
path = "/";
|
|
|
|
pool = "default";
|
|
|
|
size = "35GiB";
|
|
|
|
type = "disk";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
}
|
|
|
|
];
|
|
|
|
storage_pools = [
|
|
|
|
{
|
|
|
|
name = "default";
|
|
|
|
driver = "dir";
|
|
|
|
}
|
|
|
|
];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
vswitch.enable = networkOvs;
|
|
|
|
};
|
|
|
|
|
|
|
|
boot.supportedFilesystems = lib.optionals storageZfs [ "zfs" ];
|
|
|
|
boot.zfs.forceImportRoot = false;
|
|
|
|
|
|
|
|
environment.systemPackages = [ pkgs.parted ];
|
|
|
|
|
|
|
|
networking.hostId = "01234567";
|
|
|
|
networking.firewall.trustedInterfaces = [ "incusbr0" ];
|
|
|
|
|
|
|
|
services.lvm = {
|
|
|
|
boot.thin.enable = storageLvm;
|
|
|
|
dmeventd.enable = storageLvm;
|
|
|
|
};
|
|
|
|
|
|
|
|
networking.nftables.enable = true;
|
|
|
|
|
|
|
|
users.users.testuser = {
|
|
|
|
isNormalUser = true;
|
|
|
|
shell = pkgs.bashInteractive;
|
|
|
|
group = "incus";
|
|
|
|
uid = 1000;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
testScript = # python
|
|
|
|
''
|
|
|
|
import json
|
|
|
|
|
|
|
|
def wait_for_instance(name: str, project: str = "default"):
|
|
|
|
machine.wait_until_succeeds(f"incus exec {name} --disable-stdin --force-interactive --project {project} -- /run/current-system/sw/bin/systemctl is-system-running")
|
|
|
|
|
|
|
|
|
|
|
|
def wait_incus_exec_success(name: str, command: str, timeout: int = 900, project: str = "default"):
|
|
|
|
def check_command(_) -> bool:
|
|
|
|
status, _ = machine.execute(f"incus exec {name} --disable-stdin --force-interactive --project {project} -- {command}")
|
|
|
|
return status == 0
|
|
|
|
|
|
|
|
with machine.nested(f"Waiting for successful exec: {command}"):
|
|
|
|
retry(check_command, timeout)
|
|
|
|
|
|
|
|
|
|
|
|
def set_config(name: str, config: str, restart: bool = False, unset: bool = False):
|
|
|
|
if restart:
|
|
|
|
machine.succeed(f"incus stop {name}")
|
|
|
|
|
|
|
|
if unset:
|
|
|
|
machine.succeed(f"incus config unset {name} {config}")
|
|
|
|
else:
|
|
|
|
machine.succeed(f"incus config set {name} {config}")
|
|
|
|
|
|
|
|
if restart:
|
|
|
|
machine.succeed(f"incus start {name}")
|
|
|
|
wait_for_instance(name)
|
|
|
|
else:
|
|
|
|
# give a moment to settle
|
|
|
|
machine.sleep(1)
|
|
|
|
|
|
|
|
|
|
|
|
def cleanup():
|
|
|
|
# avoid conflict between preseed and cleanup operations
|
2025-01-14 19:34:48 -05:00
|
|
|
machine.execute("systemctl kill incus-preseed.service")
|
2024-12-13 08:58:09 -05:00
|
|
|
|
|
|
|
instances = json.loads(machine.succeed("incus list --format json --all-projects"))
|
|
|
|
with subtest("Stopping all running instances"):
|
|
|
|
for instance in [a for a in instances if a['status'] == 'Running']:
|
|
|
|
machine.execute(f"incus stop --force {instance['name']} --project {instance['project']}")
|
|
|
|
machine.execute(f"incus delete --force {instance['name']} --project {instance['project']}")
|
|
|
|
|
|
|
|
|
|
|
|
def check_sysctl(name: str):
|
|
|
|
with subtest("systemd sysctl settings are applied"):
|
|
|
|
machine.succeed(f"incus exec {name} -- systemctl status systemd-sysctl")
|
|
|
|
sysctl = machine.succeed(f"incus exec {name} -- sysctl net.ipv4.ip_forward").strip().split(" ")[-1]
|
|
|
|
assert "1" == sysctl, f"systemd-sysctl configuration not correctly applied, {sysctl} != 1"
|
|
|
|
|
|
|
|
|
|
|
|
with subtest("Wait for startup"):
|
|
|
|
machine.wait_for_unit("incus.service")
|
|
|
|
machine.wait_for_unit("incus-preseed.service")
|
|
|
|
|
|
|
|
|
|
|
|
with subtest("Verify preseed resources created"):
|
|
|
|
machine.succeed("incus profile show default")
|
|
|
|
machine.succeed("incus network info incusbr0")
|
|
|
|
machine.succeed("incus storage show default")
|
|
|
|
|
|
|
|
''
|
|
|
|
+ lib.optionalString instanceContainer (
|
|
|
|
lib.foldl (
|
|
|
|
acc: variant:
|
|
|
|
acc
|
|
|
|
# python
|
|
|
|
+ ''
|
|
|
|
metadata = "${(images variant).container.metadata}"
|
|
|
|
rootfs = "${(images variant).container.rootfs}"
|
|
|
|
alias = "nixos/container/${variant}"
|
|
|
|
variant = "${variant}"
|
|
|
|
|
2025-01-14 20:16:26 -05:00
|
|
|
with subtest("container image can be imported"):
|
2024-12-13 08:58:09 -05:00
|
|
|
machine.succeed(f"incus image import {metadata} {rootfs} --alias {alias}")
|
|
|
|
|
|
|
|
|
2025-01-14 20:16:26 -05:00
|
|
|
with subtest("container can be launched and managed"):
|
2024-12-13 08:58:09 -05:00
|
|
|
machine.succeed(f"incus launch {alias} container-{variant}1")
|
|
|
|
wait_for_instance(f"container-{variant}1")
|
|
|
|
|
|
|
|
|
2025-01-14 20:16:26 -05:00
|
|
|
with subtest("container mounts lxcfs overlays"):
|
2024-12-13 08:58:09 -05:00
|
|
|
machine.succeed(f"incus exec container-{variant}1 mount | grep 'lxcfs on /proc/cpuinfo type fuse.lxcfs'")
|
|
|
|
machine.succeed(f"incus exec container-{variant}1 mount | grep 'lxcfs on /proc/meminfo type fuse.lxcfs'")
|
|
|
|
|
|
|
|
|
2025-01-14 20:16:26 -05:00
|
|
|
with subtest("container CPU limits can be managed"):
|
|
|
|
set_config(f"container-{variant}1", "limits.cpu 1", restart=True)
|
|
|
|
wait_incus_exec_success(f"container-{variant}1", "nproc | grep '^1$'", timeout=15)
|
2024-12-13 08:58:09 -05:00
|
|
|
|
|
|
|
|
2025-01-14 20:16:26 -05:00
|
|
|
with subtest("container CPU limits can be hotplug changed"):
|
|
|
|
set_config(f"container-{variant}1", "limits.cpu 2")
|
|
|
|
wait_incus_exec_success(f"container-{variant}1", "nproc | grep '^2$'", timeout=15)
|
2024-12-13 08:58:09 -05:00
|
|
|
|
|
|
|
|
2025-01-14 20:16:26 -05:00
|
|
|
with subtest("container memory limits can be managed"):
|
|
|
|
set_config(f"container-{variant}1", "limits.memory 128MB", restart=True)
|
|
|
|
wait_incus_exec_success(f"container-{variant}1", "grep 'MemTotal:[[:space:]]*125000 kB' /proc/meminfo", timeout=15)
|
2024-12-13 08:58:09 -05:00
|
|
|
|
2025-01-14 20:16:26 -05:00
|
|
|
|
|
|
|
with subtest("container memory limits can be hotplug changed"):
|
|
|
|
set_config(f"container-{variant}1", "limits.memory 256MB")
|
|
|
|
wait_incus_exec_success(f"container-{variant}1", "grep 'MemTotal:[[:space:]]*250000 kB' /proc/meminfo", timeout=15)
|
|
|
|
|
|
|
|
|
|
|
|
with subtest("container software tpm can be configured"):
|
2024-12-13 08:58:09 -05:00
|
|
|
machine.succeed(f"incus config device add container-{variant}1 vtpm tpm path=/dev/tpm0 pathrm=/dev/tpmrm0")
|
|
|
|
machine.succeed(f"incus exec container-{variant}1 -- test -e /dev/tpm0")
|
|
|
|
machine.succeed(f"incus exec container-{variant}1 -- test -e /dev/tpmrm0")
|
|
|
|
machine.succeed(f"incus config device remove container-{variant}1 vtpm")
|
|
|
|
machine.fail(f"incus exec container-{variant}1 -- test -e /dev/tpm0")
|
|
|
|
|
|
|
|
|
2025-01-14 20:16:26 -05:00
|
|
|
with subtest("container lxc-generator compatibility"):
|
2024-12-13 08:58:09 -05:00
|
|
|
with subtest("lxc-container generator configures plain container"):
|
|
|
|
# default container is plain
|
|
|
|
machine.succeed(f"incus exec container-{variant}1 test -- -e /run/systemd/system/service.d/zzz-lxc-service.conf")
|
|
|
|
|
|
|
|
check_sysctl(f"container-{variant}1")
|
|
|
|
|
|
|
|
with subtest("lxc-container generator configures nested container"):
|
|
|
|
set_config(f"container-{variant}1", "security.nesting=true", restart=True)
|
|
|
|
|
|
|
|
machine.fail(f"incus exec container-{variant}1 test -- -e /run/systemd/system/service.d/zzz-lxc-service.conf")
|
|
|
|
target = machine.succeed(f"incus exec container-{variant}1 readlink -- -f /run/systemd/system/systemd-binfmt.service").strip()
|
|
|
|
assert target == "/dev/null", "lxc generator did not correctly mask /run/systemd/system/systemd-binfmt.service"
|
|
|
|
|
|
|
|
check_sysctl(f"container-{variant}1")
|
|
|
|
|
|
|
|
with subtest("lxc-container generator configures privileged container"):
|
|
|
|
# Create a new instance for a clean state
|
|
|
|
machine.succeed(f"incus launch {alias} container-{variant}2")
|
|
|
|
wait_for_instance(f"container-{variant}2")
|
|
|
|
|
|
|
|
machine.succeed(f"incus exec container-{variant}2 test -- -e /run/systemd/system/service.d/zzz-lxc-service.conf")
|
|
|
|
|
|
|
|
check_sysctl(f"container-{variant}2")
|
|
|
|
|
2025-01-14 20:16:26 -05:00
|
|
|
with subtest("container supports per-instance lxcfs"):
|
2025-01-14 20:03:50 -05:00
|
|
|
machine.succeed(f"incus stop container-{variant}1")
|
|
|
|
machine.fail(f"pgrep -a lxcfs | grep 'incus/devices/container-{variant}1/lxcfs'")
|
|
|
|
|
|
|
|
machine.succeed("incus config set instances.lxcfs.per_instance=true")
|
|
|
|
|
|
|
|
machine.succeed(f"incus start container-{variant}1")
|
|
|
|
wait_for_instance(f"container-{variant}1")
|
|
|
|
machine.succeed(f"pgrep -a lxcfs | grep 'incus/devices/container-{variant}1/lxcfs'")
|
|
|
|
|
2024-12-13 08:58:09 -05:00
|
|
|
|
2025-01-14 20:16:26 -05:00
|
|
|
with subtest("container can successfully restart"):
|
|
|
|
machine.succeed(f"incus restart container-{variant}1")
|
|
|
|
wait_for_instance(f"container-{variant}1")
|
|
|
|
|
|
|
|
|
|
|
|
with subtest("container remains running when softDaemonRestart is enabled and service is stopped"):
|
2024-12-13 08:58:09 -05:00
|
|
|
pid = machine.succeed(f"incus info container-{variant}1 | grep 'PID'").split(":")[1].strip()
|
|
|
|
machine.succeed(f"ps {pid}")
|
|
|
|
machine.succeed("systemctl stop incus")
|
|
|
|
machine.succeed(f"ps {pid}")
|
|
|
|
machine.succeed("systemctl start incus")
|
|
|
|
|
2025-01-14 20:16:26 -05:00
|
|
|
with subtest("containers stop with incus-startup.service"):
|
2025-01-14 19:34:48 -05:00
|
|
|
pid = machine.succeed(f"incus info container-{variant}1 | grep 'PID'").split(":")[1].strip()
|
|
|
|
machine.succeed(f"ps {pid}")
|
|
|
|
machine.succeed("systemctl stop incus-startup.service")
|
|
|
|
machine.wait_until_fails(f"ps {pid}", timeout=120)
|
|
|
|
machine.succeed("systemctl start incus-startup.service")
|
|
|
|
|
2024-12-13 08:58:09 -05:00
|
|
|
|
|
|
|
cleanup()
|
|
|
|
''
|
|
|
|
) "" initVariants
|
|
|
|
)
|
|
|
|
+ lib.optionalString canTestVm (
|
2024-12-18 22:48:41 -05:00
|
|
|
(lib.foldl (
|
2024-12-13 08:58:09 -05:00
|
|
|
acc: variant:
|
|
|
|
acc
|
|
|
|
# python
|
|
|
|
+ ''
|
|
|
|
metadata = "${(images variant).virtual-machine.metadata}"
|
|
|
|
disk = "${(images variant).virtual-machine.disk}"
|
|
|
|
alias = "nixos/virtual-machine/${variant}"
|
|
|
|
variant = "${variant}"
|
|
|
|
|
|
|
|
with subtest("virtual-machine image can be imported"):
|
|
|
|
machine.succeed(f"incus image import {metadata} {disk} --alias {alias}")
|
|
|
|
|
|
|
|
|
|
|
|
with subtest("virtual-machine can be created"):
|
|
|
|
machine.succeed(f"incus create {alias} vm-{variant}1 --vm --config limits.memory=512MB --config security.secureboot=false")
|
|
|
|
|
|
|
|
|
2025-01-14 20:16:26 -05:00
|
|
|
with subtest("virtual-machine software tpm can be configured"):
|
2024-12-13 08:58:09 -05:00
|
|
|
machine.succeed(f"incus config device add vm-{variant}1 vtpm tpm path=/dev/tpm0")
|
|
|
|
|
|
|
|
|
|
|
|
with subtest("virtual-machine can be launched and become available"):
|
|
|
|
machine.succeed(f"incus start vm-{variant}1")
|
|
|
|
wait_for_instance(f"vm-{variant}1")
|
|
|
|
|
|
|
|
|
2025-01-14 20:16:26 -05:00
|
|
|
with subtest("virtual-machine incus-agent is started"):
|
2024-12-13 08:58:09 -05:00
|
|
|
machine.succeed(f"incus exec vm-{variant}1 systemctl is-active incus-agent")
|
|
|
|
|
|
|
|
|
2025-01-14 20:16:26 -05:00
|
|
|
with subtest("virtual-machine incus-agent has a valid path"):
|
2024-12-13 08:58:09 -05:00
|
|
|
machine.succeed(f"incus exec vm-{variant}1 -- bash -c 'true'")
|
|
|
|
|
|
|
|
|
2025-01-14 20:16:26 -05:00
|
|
|
with subtest("virtual-machine CPU limits can be managed"):
|
2024-12-13 08:58:09 -05:00
|
|
|
set_config(f"vm-{variant}1", "limits.cpu 1", restart=True)
|
|
|
|
wait_incus_exec_success(f"vm-{variant}1", "nproc | grep '^1$'", timeout=90)
|
|
|
|
|
|
|
|
|
2025-01-14 20:16:26 -05:00
|
|
|
with subtest("virtual-machine CPU limits can be hotplug changed"):
|
2024-12-13 08:58:09 -05:00
|
|
|
set_config(f"vm-{variant}1", "limits.cpu 2")
|
|
|
|
wait_incus_exec_success(f"vm-{variant}1", "nproc | grep '^2$'", timeout=15)
|
|
|
|
|
|
|
|
|
2025-01-14 20:16:26 -05:00
|
|
|
with subtest("virtual-machine can successfully restart"):
|
|
|
|
machine.succeed(f"incus restart vm-{variant}1")
|
|
|
|
wait_for_instance(f"vm-{variant}1")
|
|
|
|
|
|
|
|
|
|
|
|
with subtest("virtual-machine remains running when softDaemonRestart is enabled and service is stopped"):
|
2024-12-13 08:58:09 -05:00
|
|
|
pid = machine.succeed(f"incus info vm-{variant}1 | grep 'PID'").split(":")[1].strip()
|
|
|
|
machine.succeed(f"ps {pid}")
|
|
|
|
machine.succeed("systemctl stop incus")
|
|
|
|
machine.succeed(f"ps {pid}")
|
|
|
|
machine.succeed("systemctl start incus")
|
|
|
|
|
|
|
|
|
2025-01-14 20:16:26 -05:00
|
|
|
with subtest("virtual-machines stop with incus-startup.service"):
|
2025-01-14 19:34:48 -05:00
|
|
|
pid = machine.succeed(f"incus info vm-{variant}1 | grep 'PID'").split(":")[1].strip()
|
|
|
|
machine.succeed(f"ps {pid}")
|
|
|
|
machine.succeed("systemctl stop incus-startup.service")
|
|
|
|
machine.wait_until_fails(f"ps {pid}", timeout=120)
|
|
|
|
machine.succeed("systemctl start incus-startup.service")
|
|
|
|
|
|
|
|
|
2024-12-13 08:58:09 -05:00
|
|
|
cleanup()
|
|
|
|
''
|
2024-12-18 22:48:41 -05:00
|
|
|
) "" initVariants)
|
|
|
|
+
|
|
|
|
# python
|
|
|
|
''
|
2025-01-14 20:16:26 -05:00
|
|
|
with subtest("virtual-machine can launch CSM (BIOS)"):
|
2024-12-18 22:48:41 -05:00
|
|
|
machine.succeed("incus init csm --vm --empty -c security.csm=true -c security.secureboot=false")
|
|
|
|
machine.succeed("incus start csm")
|
|
|
|
|
|
|
|
|
|
|
|
cleanup()
|
|
|
|
''
|
2024-12-13 08:58:09 -05:00
|
|
|
)
|
|
|
|
+
|
|
|
|
lib.optionalString featureUser # python
|
|
|
|
''
|
|
|
|
with subtest("incus-user allows restricted access for users"):
|
|
|
|
machine.fail("incus project show user-1000")
|
|
|
|
machine.succeed("su - testuser bash -c 'incus list'")
|
|
|
|
# a project is created dynamically for the user
|
|
|
|
machine.succeed("incus project show user-1000")
|
|
|
|
# users shouldn't be able to list storage pools
|
|
|
|
machine.fail("su - testuser bash -c 'incus storage list'")
|
|
|
|
|
|
|
|
|
|
|
|
with subtest("incus-user allows users to launch instances"):
|
|
|
|
machine.succeed("su - testuser bash -c 'incus image import ${(images "systemd").container.metadata} ${(images "systemd").container.rootfs} --alias nixos'")
|
|
|
|
machine.succeed("su - testuser bash -c 'incus launch nixos instance2'")
|
|
|
|
wait_for_instance("instance2", "user-1000")
|
|
|
|
|
|
|
|
cleanup()
|
|
|
|
''
|
|
|
|
+
|
|
|
|
lib.optionalString networkOvs # python
|
|
|
|
''
|
|
|
|
with subtest("Verify openvswitch bridge"):
|
|
|
|
machine.succeed("incus network info ovsbr0")
|
|
|
|
|
|
|
|
|
|
|
|
with subtest("Verify openvswitch bridge"):
|
|
|
|
machine.succeed("ovs-vsctl br-exists ovsbr0")
|
|
|
|
''
|
|
|
|
|
|
|
|
+
|
|
|
|
lib.optionalString storageZfs # python
|
|
|
|
''
|
|
|
|
with subtest("Verify zfs pool created and usable"):
|
|
|
|
machine.succeed(
|
|
|
|
"zpool status",
|
|
|
|
"parted --script /dev/vdb mklabel gpt",
|
|
|
|
"zpool create zfs_pool /dev/vdb",
|
|
|
|
)
|
|
|
|
|
|
|
|
machine.succeed("incus storage create zfs_pool zfs source=zfs_pool/incus")
|
|
|
|
machine.succeed("zfs list zfs_pool/incus")
|
|
|
|
|
|
|
|
machine.succeed("incus storage volume create zfs_pool test_fs --type filesystem")
|
|
|
|
machine.succeed("incus storage volume create zfs_pool test_vol --type block")
|
|
|
|
|
|
|
|
machine.succeed("incus storage show zfs_pool")
|
|
|
|
machine.succeed("incus storage volume list zfs_pool")
|
|
|
|
machine.succeed("incus storage volume show zfs_pool test_fs")
|
|
|
|
machine.succeed("incus storage volume show zfs_pool test_vol")
|
|
|
|
|
|
|
|
machine.succeed("incus create zfs1 --empty --storage zfs_pool")
|
|
|
|
machine.succeed("incus list zfs1")
|
|
|
|
''
|
|
|
|
|
|
|
|
+
|
|
|
|
lib.optionalString storageLvm # python
|
|
|
|
''
|
|
|
|
with subtest("Verify lvm pool created and usable"):
|
|
|
|
machine.succeed("incus storage create lvm_pool lvm source=/dev/vdc lvm.vg_name=incus_pool")
|
|
|
|
machine.succeed("vgs incus_pool")
|
|
|
|
|
|
|
|
machine.succeed("incus storage volume create lvm_pool test_fs --type filesystem")
|
|
|
|
machine.succeed("incus storage volume create lvm_pool test_vol --type block")
|
|
|
|
|
|
|
|
machine.succeed("incus storage show lvm_pool")
|
|
|
|
|
|
|
|
machine.succeed("incus storage volume list lvm_pool")
|
|
|
|
machine.succeed("incus storage volume show lvm_pool test_fs")
|
|
|
|
machine.succeed("incus storage volume show lvm_pool test_vol")
|
|
|
|
|
2024-12-22 19:33:23 -05:00
|
|
|
machine.succeed("incus create lvm1 --empty --storage lvm_pool")
|
2024-12-13 08:58:09 -05:00
|
|
|
machine.succeed("incus list lvm1")
|
|
|
|
'';
|
|
|
|
}
|
|
|
|
)
|