aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorEelco Dolstra <e.dolstra@tudelft.nl>2011-10-11 13:06:59 +0000
committerEelco Dolstra <e.dolstra@tudelft.nl>2011-10-11 13:06:59 +0000
commit2492914fbcd1d616c89b83fda0ee08551486273e (patch)
tree58f0713bae6389d2e7737a7e93c53681dd27cf10
parentc362e4d718cb31e532a4e2d708d07a57bc3bdf55 (diff)
* Move the remote building test from the NixOS tree to the Nix tree.
-rw-r--r--release.nix9
-rw-r--r--tests/remote-builds.nix97
2 files changed, 104 insertions, 2 deletions
diff --git a/release.nix b/release.nix
index cc210d2c6..5a6437427 100644
--- a/release.nix
+++ b/release.nix
@@ -1,5 +1,5 @@
-{ nixpkgs ? ../nixpkgs
-, nix ? { outPath = ./.; rev = 1234; }
+{ nixpkgs ? <nixpkgs>, nixos ? <nixos>
+, nix ? { outPath = ../nix-export; rev = 1234; }
, officialRelease ? false
}:
@@ -140,6 +140,11 @@ let
deb_ubuntu1010x86_64 = makeDeb_x86_64 (diskImageFuns: diskImageFuns.ubuntu1010x86_64) 50;
+ # System tests.
+ tests.remote_builds = (import ./tests/remote-builds.nix rec {
+ inherit nixpkgs nixos; nix = build { inherit system; }; system = "x86_64-linux";
+ }).test;
+
};
diff --git a/tests/remote-builds.nix b/tests/remote-builds.nix
new file mode 100644
index 000000000..201ca9dba
--- /dev/null
+++ b/tests/remote-builds.nix
@@ -0,0 +1,97 @@
+# Test Nix's remote build feature.
+
+{ nixpkgs, nixos, system, nix }:
+
+with import "${nixos}/lib/testing.nix" { inherit nixpkgs system; };
+
+makeTest ({ pkgs, ... }:
+
+let
+
+ # The configuration of the build slaves.
+ slave =
+ { config, pkgs, ... }:
+ { services.openssh.enable = true;
+ virtualisation.writableStore = true;
+ environment.nix = nix;
+ };
+
+ # Trivial Nix expression to build remotely.
+ expr = config: nr: pkgs.writeText "expr.nix"
+ ''
+ let utils = builtins.storePath ${config.system.build.extraUtils}; in
+ derivation {
+ name = "hello-${toString nr}";
+ system = "i686-linux";
+ PATH = "''${utils}/bin";
+ builder = "''${utils}/bin/sh";
+ args = [ "-c" "echo Hello; mkdir $out; cat /proc/sys/kernel/hostname > $out/host; sleep 3" ];
+ }
+ '';
+
+in
+
+{
+
+ nodes =
+ { slave1 = slave;
+ slave2 = slave;
+
+ client =
+ { config, pkgs, ... }:
+ { nix.maxJobs = 0; # force remote building
+ nix.distributedBuilds = true;
+ nix.buildMachines =
+ [ { hostName = "slave1";
+ sshUser = "root";
+ sshKey = "/root/.ssh/id_dsa";
+ system = "i686-linux";
+ maxJobs = 1;
+ }
+ { hostName = "slave2";
+ sshUser = "root";
+ sshKey = "/root/.ssh/id_dsa";
+ system = "i686-linux";
+ maxJobs = 1;
+ }
+ ];
+ virtualisation.writableStore = true;
+ virtualisation.pathsInNixDB = [ config.system.build.extraUtils ];
+ environment.nix = nix;
+ };
+ };
+
+ testScript = { nodes }:
+ ''
+ startAll;
+
+ # Create an SSH key on the client.
+ my $key = `${pkgs.openssh}/bin/ssh-keygen -t dsa -f key -N ""`;
+ $client->succeed("mkdir -m 700 /root/.ssh");
+ $client->copyFileFromHost("key", "/root/.ssh/id_dsa");
+ $client->succeed("chmod 600 /root/.ssh/id_dsa");
+
+ # Install the SSH key on the slaves.
+ foreach my $slave ($slave1, $slave2) {
+ $slave->succeed("mkdir -m 700 /root/.ssh");
+ $slave->copyFileFromHost("key.pub", "/root/.ssh/authorized_keys");
+ $slave->waitForJob("sshd");
+ $client->succeed("ssh -o StrictHostKeyChecking=no " . $slave->name() . " 'echo hello world'");
+ }
+
+ # Perform a build and check that it was performed on the slave.
+ my $out = $client->succeed("nix-build ${expr nodes.client.config 1}");
+ $slave1->succeed("test -e $out");
+
+ # And a parallel build.
+ my ($out1, $out2) = split /\s/,
+ $client->succeed("nix-store -r \$(nix-instantiate ${expr nodes.client.config 2} ${expr nodes.client.config 3})");
+ $slave1->succeed("test -e $out1 -o -e $out2");
+ $slave2->succeed("test -e $out1 -o -e $out2");
+
+ # Test whether the build hook automatically skips unavailable slaves.
+ $slave1->block;
+ $client->succeed("nix-build ${expr nodes.client.config 4}");
+ '';
+
+})