nix-super/tests/nix-copy-closure.nix

55 lines
1.8 KiB
Nix
Raw Normal View History

2011-10-11 16:58:47 +03:00
# Test nix-copy-closure.
2012-03-12 22:41:45 +02:00
{ system, nix }:
2011-10-11 16:58:47 +03:00
2013-10-11 11:57:23 +03:00
with import <nixpkgs/nixos/lib/testing.nix> { inherit system; };
2011-10-11 16:58:47 +03:00
2014-04-15 16:32:27 +03:00
makeTest (let pkgA = pkgs.aterm; pkgB = pkgs.wget; in {
2011-10-11 16:58:47 +03:00
nodes =
{ client =
{ config, pkgs, ... }:
{ virtualisation.writableStore = true;
virtualisation.pathsInNixDB = [ pkgA ];
2014-04-15 16:32:27 +03:00
nix.package = nix;
2011-10-11 16:58:47 +03:00
};
2011-10-11 16:58:47 +03:00
server =
{ config, pkgs, ... }:
{ services.openssh.enable = true;
virtualisation.writableStore = true;
virtualisation.pathsInNixDB = [ pkgB ];
2014-04-15 16:32:27 +03:00
nix.package = nix;
};
2011-10-11 16:58:47 +03:00
};
testScript = { nodes }:
''
startAll;
# Create an SSH key on the client.
my $key = `${pkgs.openssh}/bin/ssh-keygen -t dsa -f key -N ""`;
$client->succeed("mkdir -m 700 /root/.ssh");
$client->copyFileFromHost("key", "/root/.ssh/id_dsa");
$client->succeed("chmod 600 /root/.ssh/id_dsa");
# Install the SSH key on the server.
$server->succeed("mkdir -m 700 /root/.ssh");
$server->copyFileFromHost("key.pub", "/root/.ssh/authorized_keys");
$server->waitForUnit("sshd");
$client->waitForUnit("network.target");
2011-10-11 16:58:47 +03:00
$client->succeed("ssh -o StrictHostKeyChecking=no " . $server->name() . " 'echo hello world'");
# Copy the closure of package A from the client to the server.
$server->fail("nix-store --check-validity ${pkgA}");
$client->succeed("nix-copy-closure --to server --gzip ${pkgA} >&2");
$server->succeed("nix-store --check-validity ${pkgA}");
# Copy the closure of package B from the server to the client.
$client->fail("nix-store --check-validity ${pkgB}");
$client->succeed("nix-copy-closure --from server --gzip ${pkgB} >&2");
$client->succeed("nix-store --check-validity ${pkgB}");
'';
})