forked from lix-project/lix
6d80870832
In particular, using fetchGit means we don't need hackery to clean the source tree when building from an unclean tree.
109 lines
3.4 KiB
Nix
109 lines
3.4 KiB
Nix
# Test Nix's remote build feature.
|
|
|
|
{ nixpkgs, system, nix }:
|
|
|
|
with import (nixpkgs + "/nixos/lib/testing.nix") { inherit system; };
|
|
|
|
makeTest (
|
|
|
|
let
|
|
|
|
# The configuration of the build slaves.
|
|
slave =
|
|
{ config, pkgs, ... }:
|
|
{ services.openssh.enable = true;
|
|
virtualisation.writableStore = true;
|
|
nix.package = nix;
|
|
nix.useSandbox = true;
|
|
};
|
|
|
|
# Trivial Nix expression to build remotely.
|
|
expr = config: nr: pkgs.writeText "expr.nix"
|
|
''
|
|
let utils = builtins.storePath ${config.system.build.extraUtils}; in
|
|
derivation {
|
|
name = "hello-${toString nr}";
|
|
system = "i686-linux";
|
|
PATH = "''${utils}/bin";
|
|
builder = "''${utils}/bin/sh";
|
|
args = [ "-c" "if [ ${toString nr} = 5 ]; then echo FAIL; exit 1; fi; echo Hello; mkdir $out $foo; cat /proc/sys/kernel/hostname > $out/host; ln -s $out $foo/bar; sleep 10" ];
|
|
outputs = [ "out" "foo" ];
|
|
}
|
|
'';
|
|
|
|
in
|
|
|
|
{
|
|
|
|
nodes =
|
|
{ slave1 = slave;
|
|
slave2 = slave;
|
|
|
|
client =
|
|
{ config, pkgs, ... }:
|
|
{ nix.maxJobs = 0; # force remote building
|
|
nix.distributedBuilds = true;
|
|
nix.buildMachines =
|
|
[ { hostName = "slave1";
|
|
sshUser = "root";
|
|
sshKey = "/root/.ssh/id_dsa";
|
|
system = "i686-linux";
|
|
maxJobs = 1;
|
|
}
|
|
{ hostName = "slave2";
|
|
sshUser = "root";
|
|
sshKey = "/root/.ssh/id_dsa";
|
|
system = "i686-linux";
|
|
maxJobs = 1;
|
|
}
|
|
];
|
|
virtualisation.writableStore = true;
|
|
virtualisation.pathsInNixDB = [ config.system.build.extraUtils ];
|
|
nix.package = nix;
|
|
nix.binaryCaches = [ ];
|
|
programs.ssh.extraConfig = "ConnectTimeout 30";
|
|
};
|
|
};
|
|
|
|
testScript = { nodes }:
|
|
''
|
|
startAll;
|
|
|
|
# Create an SSH key on the client.
|
|
my $key = `${pkgs.openssh}/bin/ssh-keygen -t dsa -f key -N ""`;
|
|
$client->succeed("mkdir -p -m 700 /root/.ssh");
|
|
$client->copyFileFromHost("key", "/root/.ssh/id_dsa");
|
|
$client->succeed("chmod 600 /root/.ssh/id_dsa");
|
|
|
|
# Install the SSH key on the slaves.
|
|
$client->waitForUnit("network.target");
|
|
foreach my $slave ($slave1, $slave2) {
|
|
$slave->succeed("mkdir -p -m 700 /root/.ssh");
|
|
$slave->copyFileFromHost("key.pub", "/root/.ssh/authorized_keys");
|
|
$slave->waitForUnit("sshd");
|
|
$client->succeed("ssh -o StrictHostKeyChecking=no " . $slave->name() . " 'echo hello world'");
|
|
}
|
|
|
|
# Perform a build and check that it was performed on the slave.
|
|
my $out = $client->succeed(
|
|
"nix-build ${expr nodes.client.config 1} 2> build-output",
|
|
"grep -q Hello build-output"
|
|
);
|
|
$slave1->succeed("test -e $out");
|
|
|
|
# And a parallel build.
|
|
my ($out1, $out2) = split /\s/,
|
|
$client->succeed('nix-store -r $(nix-instantiate ${expr nodes.client.config 2})\!out $(nix-instantiate ${expr nodes.client.config 3})\!out');
|
|
$slave1->succeed("test -e $out1 -o -e $out2");
|
|
$slave2->succeed("test -e $out1 -o -e $out2");
|
|
|
|
# And a failing build.
|
|
$client->fail("nix-build ${expr nodes.client.config 5}");
|
|
|
|
# Test whether the build hook automatically skips unavailable slaves.
|
|
$slave1->block;
|
|
$client->succeed("nix-build ${expr nodes.client.config 4}");
|
|
'';
|
|
|
|
})
|