2011-10-11 16:58:47 +03:00
|
|
|
|
# Test ‘nix-copy-closure’.
|
|
|
|
|
|
2012-03-12 22:41:45 +02:00
|
|
|
|
{ system, nix }:
|
2011-10-11 16:58:47 +03:00
|
|
|
|
|
2013-10-11 11:57:23 +03:00
|
|
|
|
with import <nixpkgs/nixos/lib/testing.nix> { inherit system; };
|
2011-10-11 16:58:47 +03:00
|
|
|
|
|
2016-03-30 18:20:53 +03:00
|
|
|
|
makeTest (let pkgA = pkgs.cowsay; pkgB = pkgs.wget; pkgC = pkgs.hello; in {
|
2011-10-11 16:58:47 +03:00
|
|
|
|
|
|
|
|
|
nodes =
|
|
|
|
|
{ client =
|
|
|
|
|
{ config, pkgs, ... }:
|
|
|
|
|
{ virtualisation.writableStore = true;
|
|
|
|
|
virtualisation.pathsInNixDB = [ pkgA ];
|
2014-04-15 16:32:27 +03:00
|
|
|
|
nix.package = nix;
|
2014-07-10 02:50:29 +03:00
|
|
|
|
nix.binaryCaches = [ ];
|
2011-10-11 16:58:47 +03:00
|
|
|
|
};
|
2013-03-08 02:24:59 +02:00
|
|
|
|
|
2011-10-11 16:58:47 +03:00
|
|
|
|
server =
|
|
|
|
|
{ config, pkgs, ... }:
|
|
|
|
|
{ services.openssh.enable = true;
|
|
|
|
|
virtualisation.writableStore = true;
|
2014-07-10 02:50:29 +03:00
|
|
|
|
virtualisation.pathsInNixDB = [ pkgB pkgC ];
|
2014-04-15 16:32:27 +03:00
|
|
|
|
nix.package = nix;
|
2013-03-08 02:24:59 +02:00
|
|
|
|
};
|
2011-10-11 16:58:47 +03:00
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
testScript = { nodes }:
|
|
|
|
|
''
|
|
|
|
|
startAll;
|
|
|
|
|
|
|
|
|
|
# Create an SSH key on the client.
|
|
|
|
|
my $key = `${pkgs.openssh}/bin/ssh-keygen -t dsa -f key -N ""`;
|
|
|
|
|
$client->succeed("mkdir -m 700 /root/.ssh");
|
|
|
|
|
$client->copyFileFromHost("key", "/root/.ssh/id_dsa");
|
|
|
|
|
$client->succeed("chmod 600 /root/.ssh/id_dsa");
|
|
|
|
|
|
|
|
|
|
# Install the SSH key on the server.
|
|
|
|
|
$server->succeed("mkdir -m 700 /root/.ssh");
|
|
|
|
|
$server->copyFileFromHost("key.pub", "/root/.ssh/authorized_keys");
|
2013-03-08 02:24:59 +02:00
|
|
|
|
$server->waitForUnit("sshd");
|
|
|
|
|
$client->waitForUnit("network.target");
|
2011-10-11 16:58:47 +03:00
|
|
|
|
$client->succeed("ssh -o StrictHostKeyChecking=no " . $server->name() . " 'echo hello world'");
|
|
|
|
|
|
|
|
|
|
# Copy the closure of package A from the client to the server.
|
|
|
|
|
$server->fail("nix-store --check-validity ${pkgA}");
|
|
|
|
|
$client->succeed("nix-copy-closure --to server --gzip ${pkgA} >&2");
|
|
|
|
|
$server->succeed("nix-store --check-validity ${pkgA}");
|
|
|
|
|
|
|
|
|
|
# Copy the closure of package B from the server to the client.
|
|
|
|
|
$client->fail("nix-store --check-validity ${pkgB}");
|
|
|
|
|
$client->succeed("nix-copy-closure --from server --gzip ${pkgB} >&2");
|
|
|
|
|
$client->succeed("nix-store --check-validity ${pkgB}");
|
2014-07-10 02:50:29 +03:00
|
|
|
|
|
|
|
|
|
# Copy the closure of package C via the SSH substituter.
|
|
|
|
|
$client->fail("nix-store -r ${pkgC}");
|
2016-05-31 12:18:30 +03:00
|
|
|
|
# FIXME
|
|
|
|
|
#$client->succeed(
|
|
|
|
|
# "nix-store --option use-ssh-substituter true"
|
|
|
|
|
# . " --option ssh-substituter-hosts root\@server"
|
|
|
|
|
# . " -r ${pkgC} >&2");
|
|
|
|
|
#$client->succeed("nix-store --check-validity ${pkgC}");
|
2011-10-11 16:58:47 +03:00
|
|
|
|
'';
|
|
|
|
|
|
|
|
|
|
})
|