diff options
author | Eelco Dolstra <e.dolstra@tudelft.nl> | 2011-10-11 13:58:47 +0000 |
---|---|---|
committer | Eelco Dolstra <e.dolstra@tudelft.nl> | 2011-10-11 13:58:47 +0000 |
commit | d43a148204a983bf676750f50640969f8edf7350 (patch) | |
tree | c7cb878acc945701f517aa258697f1583b4fc1ea | |
parent | 2492914fbcd1d616c89b83fda0ee08551486273e (diff) | |
download | guix-d43a148204a983bf676750f50640969f8edf7350.tar.gz |
* Add a test for nix-copy-closure.
-rw-r--r-- | release.nix | 4 | ||||
-rw-r--r-- | tests/nix-copy-closure.nix | 53 |
2 files changed, 57 insertions, 0 deletions
diff --git a/release.nix b/release.nix index 5a64374271..4f3e5fac02 100644 --- a/release.nix +++ b/release.nix @@ -145,6 +145,10 @@ let inherit nixpkgs nixos; nix = build { inherit system; }; system = "x86_64-linux"; }).test; + tests.nix_copy_closure = (import ./tests/nix-copy-closure.nix rec { + inherit nixpkgs nixos; nix = build { inherit system; }; system = "x86_64-linux"; + }).test; + }; diff --git a/tests/nix-copy-closure.nix b/tests/nix-copy-closure.nix new file mode 100644 index 0000000000..5b00a9a5c8 --- /dev/null +++ b/tests/nix-copy-closure.nix @@ -0,0 +1,53 @@ +# Test ‘nix-copy-closure’. + +{ nixpkgs, nixos, system, nix }: + +with import "${nixos}/lib/testing.nix" { inherit nixpkgs system; }; + +makeTest ({ pkgs, ... }: let pkgA = pkgs.aterm; pkgB = pkgs.wget; in { + + nodes = + { client = + { config, pkgs, ... }: + { virtualisation.writableStore = true; + virtualisation.pathsInNixDB = [ pkgA ]; + environment.nix = nix; + }; + + server = + { config, pkgs, ... }: + { services.openssh.enable = true; + virtualisation.writableStore = true; + virtualisation.pathsInNixDB = [ pkgB ]; + environment.nix = nix; + }; + }; + + testScript = { nodes }: + '' + startAll; + + # Create an SSH key on the client. + my $key = `${pkgs.openssh}/bin/ssh-keygen -t dsa -f key -N ""`; + $client->succeed("mkdir -m 700 /root/.ssh"); + $client->copyFileFromHost("key", "/root/.ssh/id_dsa"); + $client->succeed("chmod 600 /root/.ssh/id_dsa"); + + # Install the SSH key on the server. + $server->succeed("mkdir -m 700 /root/.ssh"); + $server->copyFileFromHost("key.pub", "/root/.ssh/authorized_keys"); + $server->waitForJob("sshd"); + $client->succeed("ssh -o StrictHostKeyChecking=no " . $server->name() . " 'echo hello world'"); + + # Copy the closure of package A from the client to the server. + $server->fail("nix-store --check-validity ${pkgA}"); + $client->succeed("nix-copy-closure --to server --gzip ${pkgA} >&2"); + $server->succeed("nix-store --check-validity ${pkgA}"); + + # Copy the closure of package B from the server to the client. + $client->fail("nix-store --check-validity ${pkgB}"); + $client->succeed("nix-copy-closure --from server --gzip ${pkgB} >&2"); + $client->succeed("nix-store --check-validity ${pkgB}"); + ''; + +}) |