aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorEelco Dolstra <e.dolstra@tudelft.nl>2011-10-11 13:58:47 +0000
committerEelco Dolstra <e.dolstra@tudelft.nl>2011-10-11 13:58:47 +0000
commitd43a148204a983bf676750f50640969f8edf7350 (patch)
treec7cb878acc945701f517aa258697f1583b4fc1ea
parent2492914fbcd1d616c89b83fda0ee08551486273e (diff)
* Add a test for nix-copy-closure.
-rw-r--r--release.nix4
-rw-r--r--tests/nix-copy-closure.nix53
2 files changed, 57 insertions, 0 deletions
diff --git a/release.nix b/release.nix
index 5a6437427..4f3e5fac0 100644
--- a/release.nix
+++ b/release.nix
@@ -145,6 +145,10 @@ let
inherit nixpkgs nixos; nix = build { inherit system; }; system = "x86_64-linux";
}).test;
+ tests.nix_copy_closure = (import ./tests/nix-copy-closure.nix rec {
+ inherit nixpkgs nixos; nix = build { inherit system; }; system = "x86_64-linux";
+ }).test;
+
};
diff --git a/tests/nix-copy-closure.nix b/tests/nix-copy-closure.nix
new file mode 100644
index 000000000..5b00a9a5c
--- /dev/null
+++ b/tests/nix-copy-closure.nix
@@ -0,0 +1,53 @@
+# Test ‘nix-copy-closure’.
+
+{ nixpkgs, nixos, system, nix }:
+
+with import "${nixos}/lib/testing.nix" { inherit nixpkgs system; };
+
+makeTest ({ pkgs, ... }: let pkgA = pkgs.aterm; pkgB = pkgs.wget; in {
+
+ nodes =
+ { client =
+ { config, pkgs, ... }:
+ { virtualisation.writableStore = true;
+ virtualisation.pathsInNixDB = [ pkgA ];
+ environment.nix = nix;
+ };
+
+ server =
+ { config, pkgs, ... }:
+ { services.openssh.enable = true;
+ virtualisation.writableStore = true;
+ virtualisation.pathsInNixDB = [ pkgB ];
+ environment.nix = nix;
+ };
+ };
+
+ testScript = { nodes }:
+ ''
+ startAll;
+
+ # Create an SSH key on the client.
+ my $key = `${pkgs.openssh}/bin/ssh-keygen -t dsa -f key -N ""`;
+ $client->succeed("mkdir -m 700 /root/.ssh");
+ $client->copyFileFromHost("key", "/root/.ssh/id_dsa");
+ $client->succeed("chmod 600 /root/.ssh/id_dsa");
+
+ # Install the SSH key on the server.
+ $server->succeed("mkdir -m 700 /root/.ssh");
+ $server->copyFileFromHost("key.pub", "/root/.ssh/authorized_keys");
+ $server->waitForJob("sshd");
+ $client->succeed("ssh -o StrictHostKeyChecking=no " . $server->name() . " 'echo hello world'");
+
+ # Copy the closure of package A from the client to the server.
+ $server->fail("nix-store --check-validity ${pkgA}");
+ $client->succeed("nix-copy-closure --to server --gzip ${pkgA} >&2");
+ $server->succeed("nix-store --check-validity ${pkgA}");
+
+ # Copy the closure of package B from the server to the client.
+ $client->fail("nix-store --check-validity ${pkgB}");
+ $client->succeed("nix-copy-closure --from server --gzip ${pkgB} >&2");
+ $client->succeed("nix-store --check-validity ${pkgB}");
+ '';
+
+})