2006-03-01 14:15:33 +02:00
|
|
|
|
set -e
|
|
|
|
|
|
2016-10-19 16:17:39 +03:00
|
|
|
|
export TEST_ROOT=$(realpath ${TMPDIR:-/tmp}/nix-test)
|
2006-07-21 15:46:54 +03:00
|
|
|
|
export NIX_STORE_DIR
|
2007-08-14 16:43:51 +03:00
|
|
|
|
if ! NIX_STORE_DIR=$(readlink -f $TEST_ROOT/store 2> /dev/null); then
|
2006-07-21 15:46:54 +03:00
|
|
|
|
# Maybe the build directory is symlinked.
|
|
|
|
|
export NIX_IGNORE_SYMLINK_STORE=1
|
|
|
|
|
NIX_STORE_DIR=$TEST_ROOT/store
|
|
|
|
|
fi
|
2006-03-01 14:15:33 +02:00
|
|
|
|
export NIX_LOCALSTATE_DIR=$TEST_ROOT/var
|
|
|
|
|
export NIX_LOG_DIR=$TEST_ROOT/var/log/nix
|
|
|
|
|
export NIX_STATE_DIR=$TEST_ROOT/var/nix
|
|
|
|
|
export NIX_CONF_DIR=$TEST_ROOT/etc
|
2011-10-11 00:11:08 +03:00
|
|
|
|
export NIX_MANIFESTS_DIR=$TEST_ROOT/var/nix/manifests
|
2013-11-25 19:47:03 +02:00
|
|
|
|
export _NIX_TEST_SHARED=$TEST_ROOT/shared
|
2017-06-19 15:24:48 +03:00
|
|
|
|
if [[ -n $NIX_STORE ]]; then
|
|
|
|
|
export _NIX_TEST_NO_SANDBOX=1
|
|
|
|
|
fi
|
|
|
|
|
export _NIX_IN_TEST=$TEST_ROOT/shared
|
2012-07-27 00:12:42 +03:00
|
|
|
|
export NIX_REMOTE=$NIX_REMOTE_
|
2016-07-21 15:25:06 +03:00
|
|
|
|
unset NIX_PATH
|
2016-05-30 21:22:30 +03:00
|
|
|
|
export TEST_HOME=$TEST_ROOT/test-home
|
|
|
|
|
export HOME=$TEST_HOME
|
2017-11-24 04:50:01 +02:00
|
|
|
|
unset XDG_CACHE_HOME
|
2016-05-30 21:22:30 +03:00
|
|
|
|
mkdir -p $TEST_HOME
|
2006-03-01 14:15:33 +02:00
|
|
|
|
|
2012-03-19 02:20:02 +02:00
|
|
|
|
export PATH=@bindir@:$PATH
|
2016-05-31 14:07:24 +03:00
|
|
|
|
coreutils=@coreutils@
|
2011-10-11 00:11:08 +03:00
|
|
|
|
|
2006-03-01 14:15:33 +02:00
|
|
|
|
export dot=@dot@
|
2006-03-01 16:17:00 +02:00
|
|
|
|
export xmllint="@xmllint@"
|
2013-11-25 19:47:03 +02:00
|
|
|
|
export SHELL="@bash@"
|
2014-09-23 16:18:44 +03:00
|
|
|
|
export PAGER=cat
|
2015-02-10 12:54:06 +02:00
|
|
|
|
export HAVE_SODIUM="@HAVE_SODIUM@"
|
2017-12-29 22:42:14 +02:00
|
|
|
|
export HAVE_BROTLI="@HAVE_BROTLI@"
|
2006-03-01 14:15:33 +02:00
|
|
|
|
|
2013-11-25 19:47:03 +02:00
|
|
|
|
export version=@PACKAGE_VERSION@
|
2006-03-01 17:46:22 +02:00
|
|
|
|
export system=@system@
|
2006-03-01 14:51:18 +02:00
|
|
|
|
|
2014-02-17 13:22:50 +02:00
|
|
|
|
cacheDir=$TEST_ROOT/binary-cache
|
|
|
|
|
|
2006-03-01 16:26:03 +02:00
|
|
|
|
readLink() {
|
|
|
|
|
ls -l "$1" | sed 's/.*->\ //'
|
|
|
|
|
}
|
2006-09-21 21:54:08 +03:00
|
|
|
|
|
2009-03-18 18:35:35 +02:00
|
|
|
|
clearProfiles() {
|
|
|
|
|
profiles="$NIX_STATE_DIR"/profiles
|
2012-04-14 20:52:58 +03:00
|
|
|
|
rm -rf $profiles
|
2009-03-18 18:35:35 +02:00
|
|
|
|
}
|
|
|
|
|
|
2006-09-21 21:54:08 +03:00
|
|
|
|
clearStore() {
|
|
|
|
|
echo "clearing store..."
|
|
|
|
|
chmod -R +w "$NIX_STORE_DIR"
|
|
|
|
|
rm -rf "$NIX_STORE_DIR"
|
|
|
|
|
mkdir "$NIX_STORE_DIR"
|
2016-07-27 18:14:41 +03:00
|
|
|
|
rm -rf "$NIX_STATE_DIR"
|
|
|
|
|
mkdir "$NIX_STATE_DIR"
|
2011-10-11 00:32:34 +03:00
|
|
|
|
nix-store --init
|
2009-03-18 18:35:35 +02:00
|
|
|
|
clearProfiles
|
2006-09-21 21:54:08 +03:00
|
|
|
|
}
|
2007-08-13 16:15:02 +03:00
|
|
|
|
|
2014-02-17 13:22:50 +02:00
|
|
|
|
clearCache() {
|
|
|
|
|
rm -rf "$cacheDir"
|
|
|
|
|
}
|
|
|
|
|
|
2016-05-30 21:22:30 +03:00
|
|
|
|
clearCacheCache() {
|
|
|
|
|
rm -f $TEST_HOME/.cache/nix/binary-cache*
|
|
|
|
|
}
|
|
|
|
|
|
2011-07-20 14:50:13 +03:00
|
|
|
|
startDaemon() {
|
2011-10-11 14:14:30 +03:00
|
|
|
|
# Start the daemon, wait for the socket to appear. !!!
|
2016-11-26 01:37:43 +02:00
|
|
|
|
# ‘nix-daemon’ should have an option to fork into the background.
|
2011-10-11 14:14:30 +03:00
|
|
|
|
rm -f $NIX_STATE_DIR/daemon-socket/socket
|
2012-10-04 00:57:20 +03:00
|
|
|
|
nix-daemon &
|
2011-10-11 14:14:30 +03:00
|
|
|
|
for ((i = 0; i < 30; i++)); do
|
|
|
|
|
if [ -e $NIX_STATE_DIR/daemon-socket/socket ]; then break; fi
|
|
|
|
|
sleep 1
|
|
|
|
|
done
|
2011-07-20 14:50:13 +03:00
|
|
|
|
pidDaemon=$!
|
|
|
|
|
trap "kill -9 $pidDaemon" EXIT
|
|
|
|
|
export NIX_REMOTE=daemon
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
killDaemon() {
|
|
|
|
|
kill -9 $pidDaemon
|
|
|
|
|
wait $pidDaemon || true
|
|
|
|
|
trap "" EXIT
|
|
|
|
|
}
|
|
|
|
|
|
2018-01-13 15:18:35 +02:00
|
|
|
|
canUseSandbox() {
|
|
|
|
|
if [[ $(uname) != Linux ]]; then return 1; fi
|
|
|
|
|
|
|
|
|
|
if [ ! -L /proc/self/ns/user ]; then
|
|
|
|
|
echo "Kernel doesn't support user namespaces, skipping this test..."
|
|
|
|
|
return 1
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
if [ -e /proc/sys/kernel/unprivileged_userns_clone ]; then
|
|
|
|
|
if [ "$(cat /proc/sys/kernel/unprivileged_userns_clone)" != 1 ]; then
|
|
|
|
|
echo "Unprivileged user namespaces disabled by sysctl, skipping this test..."
|
|
|
|
|
return 1
|
|
|
|
|
fi
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
return 0
|
|
|
|
|
}
|
|
|
|
|
|
2009-03-17 19:38:32 +02:00
|
|
|
|
fail() {
|
|
|
|
|
echo "$1"
|
|
|
|
|
exit 1
|
|
|
|
|
}
|
2012-07-27 21:33:01 +03:00
|
|
|
|
|
2017-11-15 13:23:31 +02:00
|
|
|
|
expect() {
|
|
|
|
|
local expected res
|
|
|
|
|
expected="$1"
|
|
|
|
|
shift
|
|
|
|
|
set +e
|
|
|
|
|
"$@"
|
|
|
|
|
res="$?"
|
|
|
|
|
set -e
|
|
|
|
|
[[ $res -eq $expected ]]
|
|
|
|
|
}
|
|
|
|
|
|
2012-07-27 21:33:01 +03:00
|
|
|
|
set -x
|