2016-11-26 00:37:43 +01:00
|
|
|
|
# Test ‘nix-copy-closure’.
|
2011-10-11 15:58:47 +02:00
|
|
|
|
|
2019-10-04 10:45:33 +02:00
|
|
|
|
{ nixpkgs, system, overlay }:
|
2011-10-11 15:58:47 +02:00
|
|
|
|
|
2019-10-04 10:45:33 +02:00
|
|
|
|
with import (nixpkgs + "/nixos/lib/testing.nix") {
|
|
|
|
|
inherit system;
|
|
|
|
|
extraConfigurations = [ { nixpkgs.overlays = [ overlay ]; } ];
|
|
|
|
|
};
|
2011-10-11 15:58:47 +02:00
|
|
|
|
|
2016-03-30 17:20:53 +02:00
|
|
|
|
makeTest (let pkgA = pkgs.cowsay; pkgB = pkgs.wget; pkgC = pkgs.hello; in {
|
2011-10-11 15:58:47 +02:00
|
|
|
|
|
|
|
|
|
nodes =
|
|
|
|
|
{ client =
|
|
|
|
|
{ config, pkgs, ... }:
|
|
|
|
|
{ virtualisation.writableStore = true;
|
|
|
|
|
virtualisation.pathsInNixDB = [ pkgA ];
|
2014-07-10 01:50:29 +02:00
|
|
|
|
nix.binaryCaches = [ ];
|
2011-10-11 15:58:47 +02:00
|
|
|
|
};
|
2013-03-08 01:24:59 +01:00
|
|
|
|
|
2011-10-11 15:58:47 +02:00
|
|
|
|
server =
|
|
|
|
|
{ config, pkgs, ... }:
|
|
|
|
|
{ services.openssh.enable = true;
|
|
|
|
|
virtualisation.writableStore = true;
|
2014-07-10 01:50:29 +02:00
|
|
|
|
virtualisation.pathsInNixDB = [ pkgB pkgC ];
|
2013-03-08 01:24:59 +01:00
|
|
|
|
};
|
2011-10-11 15:58:47 +02:00
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
testScript = { nodes }:
|
|
|
|
|
''
|
|
|
|
|
startAll;
|
|
|
|
|
|
|
|
|
|
# Create an SSH key on the client.
|
2018-02-08 13:46:23 +01:00
|
|
|
|
my $key = `${pkgs.openssh}/bin/ssh-keygen -t ed25519 -f key -N ""`;
|
2011-10-11 15:58:47 +02:00
|
|
|
|
$client->succeed("mkdir -m 700 /root/.ssh");
|
2018-02-08 13:46:23 +01:00
|
|
|
|
$client->copyFileFromHost("key", "/root/.ssh/id_ed25519");
|
|
|
|
|
$client->succeed("chmod 600 /root/.ssh/id_ed25519");
|
2011-10-11 15:58:47 +02:00
|
|
|
|
|
|
|
|
|
# Install the SSH key on the server.
|
|
|
|
|
$server->succeed("mkdir -m 700 /root/.ssh");
|
|
|
|
|
$server->copyFileFromHost("key.pub", "/root/.ssh/authorized_keys");
|
2013-03-08 01:24:59 +01:00
|
|
|
|
$server->waitForUnit("sshd");
|
|
|
|
|
$client->waitForUnit("network.target");
|
2011-10-11 15:58:47 +02:00
|
|
|
|
$client->succeed("ssh -o StrictHostKeyChecking=no " . $server->name() . " 'echo hello world'");
|
|
|
|
|
|
|
|
|
|
# Copy the closure of package A from the client to the server.
|
|
|
|
|
$server->fail("nix-store --check-validity ${pkgA}");
|
|
|
|
|
$client->succeed("nix-copy-closure --to server --gzip ${pkgA} >&2");
|
|
|
|
|
$server->succeed("nix-store --check-validity ${pkgA}");
|
|
|
|
|
|
|
|
|
|
# Copy the closure of package B from the server to the client.
|
|
|
|
|
$client->fail("nix-store --check-validity ${pkgB}");
|
|
|
|
|
$client->succeed("nix-copy-closure --from server --gzip ${pkgB} >&2");
|
|
|
|
|
$client->succeed("nix-store --check-validity ${pkgB}");
|
2014-07-10 01:50:29 +02:00
|
|
|
|
|
|
|
|
|
# Copy the closure of package C via the SSH substituter.
|
|
|
|
|
$client->fail("nix-store -r ${pkgC}");
|
2016-05-31 11:18:30 +02:00
|
|
|
|
# FIXME
|
|
|
|
|
#$client->succeed(
|
|
|
|
|
# "nix-store --option use-ssh-substituter true"
|
|
|
|
|
# . " --option ssh-substituter-hosts root\@server"
|
|
|
|
|
# . " -r ${pkgC} >&2");
|
|
|
|
|
#$client->succeed("nix-store --check-validity ${pkgC}");
|
2011-10-11 15:58:47 +02:00
|
|
|
|
'';
|
|
|
|
|
|
|
|
|
|
})
|