2019-11-04 14:23:58 +02:00
|
|
|
source common.sh
|
|
|
|
|
2019-12-03 20:18:47 +02:00
|
|
|
# FIXME
|
2021-03-24 15:44:20 +02:00
|
|
|
if [[ $(uname) != Linux ]]; then exit 99; fi
|
2019-12-03 20:18:47 +02:00
|
|
|
|
2019-11-04 14:23:58 +02:00
|
|
|
clearStore
|
|
|
|
|
2020-06-25 19:26:34 +03:00
|
|
|
rm -f $TEST_ROOT/result
|
|
|
|
|
2020-07-24 21:38:56 +03:00
|
|
|
export unreachable=$(nix store add-path ./recursive.sh)
|
2019-11-04 14:23:58 +02:00
|
|
|
|
2021-06-23 18:27:18 +03:00
|
|
|
NIX_BIN_DIR=$(dirname $(type -p nix)) nix --extra-experimental-features 'nix-command recursive-nix' build -o $TEST_ROOT/result -L --impure --expr '
|
2019-11-04 14:23:58 +02:00
|
|
|
with import ./config.nix;
|
2021-06-23 18:27:18 +03:00
|
|
|
mkDerivation rec {
|
2019-11-04 14:23:58 +02:00
|
|
|
name = "recursive";
|
|
|
|
dummy = builtins.toFile "dummy" "bla bla";
|
|
|
|
SHELL = shell;
|
|
|
|
|
|
|
|
# Note: this is a string without context.
|
|
|
|
unreachable = builtins.getEnv "unreachable";
|
|
|
|
|
2021-06-23 18:27:18 +03:00
|
|
|
NIX_TESTS_CA_BY_DEFAULT = builtins.getEnv "NIX_TESTS_CA_BY_DEFAULT";
|
|
|
|
|
2019-11-04 14:48:58 +02:00
|
|
|
requiredSystemFeatures = [ "recursive-nix" ];
|
|
|
|
|
2019-11-04 14:23:58 +02:00
|
|
|
buildCommand = '\'\''
|
|
|
|
mkdir $out
|
2021-06-23 18:27:18 +03:00
|
|
|
opts="--experimental-features nix-command ${if (NIX_TESTS_CA_BY_DEFAULT == "1") then "--extra-experimental-features ca-derivations" else ""}"
|
2019-11-04 14:23:58 +02:00
|
|
|
|
2020-09-17 11:42:51 +03:00
|
|
|
PATH=${builtins.getEnv "NIX_BIN_DIR"}:$PATH
|
|
|
|
|
2019-11-04 14:23:58 +02:00
|
|
|
# Check that we can query/build paths in our input closure.
|
|
|
|
nix $opts path-info $dummy
|
|
|
|
nix $opts build $dummy
|
|
|
|
|
|
|
|
# Make sure we cannot query/build paths not in out input closure.
|
|
|
|
[[ -e $unreachable ]]
|
|
|
|
(! nix $opts path-info $unreachable)
|
|
|
|
(! nix $opts build $unreachable)
|
|
|
|
|
|
|
|
# Add something to the store.
|
|
|
|
echo foobar > foobar
|
2020-07-24 21:38:56 +03:00
|
|
|
foobar=$(nix $opts store add-path ./foobar)
|
2019-11-04 14:23:58 +02:00
|
|
|
|
|
|
|
nix $opts path-info $foobar
|
|
|
|
nix $opts build $foobar
|
|
|
|
|
|
|
|
# Add it to our closure.
|
|
|
|
ln -s $foobar $out/foobar
|
|
|
|
|
2021-06-23 18:27:18 +03:00
|
|
|
[[ $(nix $opts path-info --all | wc -l) -eq 4 ]]
|
2019-11-04 14:23:58 +02:00
|
|
|
|
|
|
|
# Build a derivation.
|
2019-12-04 01:31:09 +02:00
|
|
|
nix $opts build -L --impure --expr '\''
|
2021-06-23 18:27:18 +03:00
|
|
|
with import ${./config.nix};
|
|
|
|
mkDerivation {
|
2019-11-04 14:23:58 +02:00
|
|
|
name = "inner1";
|
2021-06-23 18:27:18 +03:00
|
|
|
buildCommand = "echo $fnord blaat > $out";
|
2019-11-04 14:23:58 +02:00
|
|
|
fnord = builtins.toFile "fnord" "fnord";
|
|
|
|
}
|
2019-12-04 01:31:09 +02:00
|
|
|
'\''
|
2019-11-04 14:23:58 +02:00
|
|
|
|
|
|
|
[[ $(nix $opts path-info --json ./result) =~ fnord ]]
|
|
|
|
|
|
|
|
ln -s $(nix $opts path-info ./result) $out/inner1
|
|
|
|
'\'\'';
|
2019-12-04 01:31:09 +02:00
|
|
|
}
|
2019-11-04 14:23:58 +02:00
|
|
|
'
|
|
|
|
|
|
|
|
[[ $(cat $TEST_ROOT/result/inner1) =~ blaat ]]
|
|
|
|
|
|
|
|
# Make sure the recursively created paths are in the closure.
|
|
|
|
nix path-info -r $TEST_ROOT/result | grep foobar
|
|
|
|
nix path-info -r $TEST_ROOT/result | grep fnord
|
|
|
|
nix path-info -r $TEST_ROOT/result | grep inner1
|