forked from lix-project/lix
30dcc19d1f
I think it is bad for these reasons when `tests/` contains a mix of functional and integration tests - Concepts is harder to understand, the documentation makes a good unit vs functional vs integration distinction, but when the integration tests are just two subdirs within `tests/` this is not clear. - Source filtering in the `flake.nix` is more complex. We need to filter out some of the dirs from `tests/`, rather than simply pick the dirs we want and take all of them. This is a good sign the structure of what we are trying to do is not matching the structure of the files. With this change we have a clean: ```shell-session $ git show 'HEAD:tests' tree HEAD:tests functional/ installer/ nixos/ ``` (cherry picked from commit 68c81c737571794f7246db53fb4774e94fcf4b7e)
66 lines
2.8 KiB
Bash
66 lines
2.8 KiB
Bash
source common.sh
|
|
|
|
requireDaemonNewerThan "2.8pre20220311"
|
|
|
|
enableFeatures "ca-derivations impure-derivations"
|
|
restartDaemon
|
|
|
|
clearStore
|
|
|
|
# Basic test of impure derivations: building one a second time should not use the previous result.
|
|
printf 0 > $TEST_ROOT/counter
|
|
|
|
# `nix derivation add` with impure derivations work
|
|
drvPath=$(nix-instantiate ./impure-derivations.nix -A impure)
|
|
nix derivation show $drvPath | jq .[] > $TEST_HOME/impure-drv.json
|
|
drvPath2=$(nix derivation add < $TEST_HOME/impure-drv.json)
|
|
[[ "$drvPath" = "$drvPath2" ]]
|
|
|
|
# But only with the experimental feature!
|
|
expectStderr 1 nix derivation add < $TEST_HOME/impure-drv.json --experimental-features nix-command | grepQuiet "experimental Nix feature 'impure-derivations' is disabled"
|
|
|
|
nix build --dry-run --json --file ./impure-derivations.nix impure.all
|
|
json=$(nix build -L --no-link --json --file ./impure-derivations.nix impure.all)
|
|
path1=$(echo $json | jq -r .[].outputs.out)
|
|
path1_stuff=$(echo $json | jq -r .[].outputs.stuff)
|
|
[[ $(< $path1/n) = 0 ]]
|
|
[[ $(< $path1_stuff/bla) = 0 ]]
|
|
|
|
[[ $(nix path-info --json $path1 | jq .[].ca) =~ fixed:r:sha256: ]]
|
|
|
|
path2=$(nix build -L --no-link --json --file ./impure-derivations.nix impure | jq -r .[].outputs.out)
|
|
[[ $(< $path2/n) = 1 ]]
|
|
|
|
# Test impure derivations that depend on impure derivations.
|
|
path3=$(nix build -L --no-link --json --file ./impure-derivations.nix impureOnImpure | jq -r .[].outputs.out)
|
|
[[ $(< $path3/n) = X2 ]]
|
|
|
|
path4=$(nix build -L --no-link --json --file ./impure-derivations.nix impureOnImpure | jq -r .[].outputs.out)
|
|
[[ $(< $path4/n) = X3 ]]
|
|
|
|
# Test that (self-)references work.
|
|
[[ $(< $path4/symlink/bla) = 3 ]]
|
|
[[ $(< $path4/self/n) = X3 ]]
|
|
|
|
# Input-addressed derivations cannot depend on impure derivations directly.
|
|
(! nix build -L --no-link --json --file ./impure-derivations.nix inputAddressed 2>&1) | grep 'depends on impure derivation'
|
|
|
|
drvPath=$(nix eval --json --file ./impure-derivations.nix impure.drvPath | jq -r .)
|
|
[[ $(nix derivation show $drvPath | jq ".[\"$drvPath\"].outputs.out.impure") = true ]]
|
|
[[ $(nix derivation show $drvPath | jq ".[\"$drvPath\"].outputs.stuff.impure") = true ]]
|
|
|
|
# Fixed-output derivations *can* depend on impure derivations.
|
|
path5=$(nix build -L --no-link --json --file ./impure-derivations.nix contentAddressed | jq -r .[].outputs.out)
|
|
[[ $(< $path5) = X ]]
|
|
[[ $(< $TEST_ROOT/counter) = 5 ]]
|
|
|
|
# And they should not be rebuilt.
|
|
path5=$(nix build -L --no-link --json --file ./impure-derivations.nix contentAddressed | jq -r .[].outputs.out)
|
|
[[ $(< $path5) = X ]]
|
|
[[ $(< $TEST_ROOT/counter) = 5 ]]
|
|
|
|
# Input-addressed derivations can depend on fixed-output derivations that depend on impure derivations.
|
|
path6=$(nix build -L --no-link --json --file ./impure-derivations.nix inputAddressedAfterCA | jq -r .[].outputs.out)
|
|
[[ $(< $path6) = X ]]
|
|
[[ $(< $TEST_ROOT/counter) = 5 ]]
|