make the multi-node vm tests a bit more reliable
without these changes the tests will very repeatably (although not very
reliably) wedge in our runs. the ssh command starts, opens a sessions,
does something, the session closes again, but the test does not move on.
adding *just* the redirect and not the unit waits is not sufficient
either, it needs both. this feels like a bug in the nixos testing
framework somewhere, but digging that far is not in the cards right now.
Change-Id: Idab577b83a36cc4899bb5ffbb3d9adc04e83e51c
This commit is contained in:
parent
609a8e0d94
commit
34fb7a7e9d
|
@ -40,6 +40,11 @@ in {
|
||||||
"${pkgs.openssh}/bin/ssh-keygen", "-t", "ed25519", "-f", "key", "-N", ""
|
"${pkgs.openssh}/bin/ssh-keygen", "-t", "ed25519", "-f", "key", "-N", ""
|
||||||
], capture_output=True, check=True)
|
], capture_output=True, check=True)
|
||||||
|
|
||||||
|
server.succeed("systemctl start network-online.target")
|
||||||
|
client.succeed("systemctl start network-online.target")
|
||||||
|
server.wait_for_unit("network-online.target")
|
||||||
|
client.wait_for_unit("network-online.target")
|
||||||
|
|
||||||
client.succeed("mkdir -m 700 /root/.ssh")
|
client.succeed("mkdir -m 700 /root/.ssh")
|
||||||
client.copy_from_host("key", "/root/.ssh/id_ed25519")
|
client.copy_from_host("key", "/root/.ssh/id_ed25519")
|
||||||
client.succeed("chmod 600 /root/.ssh/id_ed25519")
|
client.succeed("chmod 600 /root/.ssh/id_ed25519")
|
||||||
|
@ -47,9 +52,8 @@ in {
|
||||||
# Install the SSH key on the server.
|
# Install the SSH key on the server.
|
||||||
server.succeed("mkdir -m 700 /root/.ssh")
|
server.succeed("mkdir -m 700 /root/.ssh")
|
||||||
server.copy_from_host("key.pub", "/root/.ssh/authorized_keys")
|
server.copy_from_host("key.pub", "/root/.ssh/authorized_keys")
|
||||||
server.wait_for_unit("sshd")
|
server.wait_for_unit("sshd.service")
|
||||||
client.wait_for_unit("network.target")
|
client.succeed(f"ssh -o StrictHostKeyChecking=no {server.name} 'echo hello world' >&2")
|
||||||
client.succeed(f"ssh -o StrictHostKeyChecking=no {server.name} 'echo hello world'")
|
|
||||||
|
|
||||||
# Copy the closure of package A from the client to the server.
|
# Copy the closure of package A from the client to the server.
|
||||||
server.fail("nix-store --check-validity ${pkgA}")
|
server.fail("nix-store --check-validity ${pkgA}")
|
||||||
|
|
|
@ -54,8 +54,12 @@ in {
|
||||||
|
|
||||||
start_all()
|
start_all()
|
||||||
|
|
||||||
server.wait_for_unit("sshd")
|
server.succeed("systemctl start network-online.target")
|
||||||
client.wait_for_unit("network.target")
|
client.succeed("systemctl start network-online.target")
|
||||||
|
server.wait_for_unit("network-online.target")
|
||||||
|
client.wait_for_unit("network-online.target")
|
||||||
|
|
||||||
|
server.wait_for_unit("sshd.service")
|
||||||
client.wait_for_unit("getty@tty1.service")
|
client.wait_for_unit("getty@tty1.service")
|
||||||
# Either the prompt: ]#
|
# Either the prompt: ]#
|
||||||
# or an OCR misreading of it: 1#
|
# or an OCR misreading of it: 1#
|
||||||
|
@ -82,7 +86,7 @@ in {
|
||||||
# Install the SSH key on the server.
|
# Install the SSH key on the server.
|
||||||
server.copy_from_host("key.pub", "/root/.ssh/authorized_keys")
|
server.copy_from_host("key.pub", "/root/.ssh/authorized_keys")
|
||||||
server.succeed("systemctl restart sshd")
|
server.succeed("systemctl restart sshd")
|
||||||
client.succeed(f"ssh -o StrictHostKeyChecking=no {server.name} 'echo hello world'")
|
client.succeed(f"ssh -o StrictHostKeyChecking=no {server.name} 'echo hello world' >&2")
|
||||||
client.succeed(f"ssh -O check {server.name}")
|
client.succeed(f"ssh -O check {server.name}")
|
||||||
client.succeed(f"ssh -O exit {server.name}")
|
client.succeed(f"ssh -O exit {server.name}")
|
||||||
client.fail(f"ssh -O check {server.name}")
|
client.fail(f"ssh -O check {server.name}")
|
||||||
|
|
|
@ -78,6 +78,11 @@ in
|
||||||
|
|
||||||
start_all()
|
start_all()
|
||||||
|
|
||||||
|
builder.succeed("systemctl start network-online.target")
|
||||||
|
client.succeed("systemctl start network-online.target")
|
||||||
|
builder.wait_for_unit("network-online.target")
|
||||||
|
client.wait_for_unit("network-online.target")
|
||||||
|
|
||||||
# Create an SSH key on the client.
|
# Create an SSH key on the client.
|
||||||
subprocess.run([
|
subprocess.run([
|
||||||
"${hostPkgs.openssh}/bin/ssh-keygen", "-t", "ed25519", "-f", "key", "-N", ""
|
"${hostPkgs.openssh}/bin/ssh-keygen", "-t", "ed25519", "-f", "key", "-N", ""
|
||||||
|
@ -87,11 +92,10 @@ in
|
||||||
client.succeed("chmod 600 /root/.ssh/id_ed25519")
|
client.succeed("chmod 600 /root/.ssh/id_ed25519")
|
||||||
|
|
||||||
# Install the SSH key on the builder.
|
# Install the SSH key on the builder.
|
||||||
client.wait_for_unit("network.target")
|
|
||||||
builder.succeed("mkdir -p -m 700 /root/.ssh")
|
builder.succeed("mkdir -p -m 700 /root/.ssh")
|
||||||
builder.copy_from_host("key.pub", "/root/.ssh/authorized_keys")
|
builder.copy_from_host("key.pub", "/root/.ssh/authorized_keys")
|
||||||
builder.wait_for_unit("sshd")
|
builder.wait_for_unit("sshd.service")
|
||||||
client.succeed(f"ssh -o StrictHostKeyChecking=no {builder.name} 'echo hello world'")
|
client.succeed(f"ssh -o StrictHostKeyChecking=no {builder.name} 'echo hello world' >&2")
|
||||||
|
|
||||||
# Perform a build
|
# Perform a build
|
||||||
out = client.succeed("nix-build ${expr nodes.client 1} 2> build-output")
|
out = client.succeed("nix-build ${expr nodes.client 1} 2> build-output")
|
||||||
|
|
|
@ -85,6 +85,13 @@ in
|
||||||
|
|
||||||
start_all()
|
start_all()
|
||||||
|
|
||||||
|
builder1.succeed("systemctl start network-online.target")
|
||||||
|
builder2.succeed("systemctl start network-online.target")
|
||||||
|
client.succeed("systemctl start network-online.target")
|
||||||
|
builder1.wait_for_unit("network-online.target")
|
||||||
|
builder2.wait_for_unit("network-online.target")
|
||||||
|
client.wait_for_unit("network-online.target")
|
||||||
|
|
||||||
# Create an SSH key on the client.
|
# Create an SSH key on the client.
|
||||||
subprocess.run([
|
subprocess.run([
|
||||||
"${hostPkgs.openssh}/bin/ssh-keygen", "-t", "ed25519", "-f", "key", "-N", ""
|
"${hostPkgs.openssh}/bin/ssh-keygen", "-t", "ed25519", "-f", "key", "-N", ""
|
||||||
|
@ -94,12 +101,11 @@ in
|
||||||
client.succeed("chmod 600 /root/.ssh/id_ed25519")
|
client.succeed("chmod 600 /root/.ssh/id_ed25519")
|
||||||
|
|
||||||
# Install the SSH key on the builders.
|
# Install the SSH key on the builders.
|
||||||
client.wait_for_unit("network.target")
|
|
||||||
for builder in [builder1, builder2]:
|
for builder in [builder1, builder2]:
|
||||||
builder.succeed("mkdir -p -m 700 /root/.ssh")
|
builder.succeed("mkdir -p -m 700 /root/.ssh")
|
||||||
builder.copy_from_host("key.pub", "/root/.ssh/authorized_keys")
|
builder.copy_from_host("key.pub", "/root/.ssh/authorized_keys")
|
||||||
builder.wait_for_unit("sshd")
|
builder.wait_for_unit("sshd.service")
|
||||||
client.succeed(f"ssh -o StrictHostKeyChecking=no {builder.name} 'echo hello world'")
|
client.succeed(f"ssh -o StrictHostKeyChecking=no {builder.name} 'echo hello world' >&2")
|
||||||
|
|
||||||
# Perform a build and check that it was performed on the builder.
|
# Perform a build and check that it was performed on the builder.
|
||||||
out = client.succeed(
|
out = client.succeed(
|
||||||
|
|
Loading…
Reference in a new issue