2016-11-25 23:37:43 +00:00
|
|
|
|
# Test ‘nix-copy-closure’.
|
2011-10-11 13:58:47 +00:00
|
|
|
|
|
2019-10-04 08:45:33 +00:00
|
|
|
|
{ nixpkgs, system, overlay }:
|
2011-10-11 13:58:47 +00:00
|
|
|
|
|
2020-10-17 20:08:18 +00:00
|
|
|
|
with import (nixpkgs + "/nixos/lib/testing-python.nix") {
|
2019-10-04 08:45:33 +00:00
|
|
|
|
inherit system;
|
|
|
|
|
extraConfigurations = [ { nixpkgs.overlays = [ overlay ]; } ];
|
|
|
|
|
};
|
2011-10-11 13:58:47 +00:00
|
|
|
|
|
2016-03-30 15:20:53 +00:00
|
|
|
|
makeTest (let pkgA = pkgs.cowsay; pkgB = pkgs.wget; pkgC = pkgs.hello; in {
|
2011-10-11 13:58:47 +00:00
|
|
|
|
|
|
|
|
|
nodes =
|
|
|
|
|
{ client =
|
2019-11-05 10:12:25 +00:00
|
|
|
|
{ config, lib, pkgs, ... }:
|
2011-10-11 13:58:47 +00:00
|
|
|
|
{ virtualisation.writableStore = true;
|
|
|
|
|
virtualisation.pathsInNixDB = [ pkgA ];
|
2019-11-05 10:12:25 +00:00
|
|
|
|
nix.binaryCaches = lib.mkForce [ ];
|
2011-10-11 13:58:47 +00:00
|
|
|
|
};
|
2013-03-08 00:24:59 +00:00
|
|
|
|
|
2011-10-11 13:58:47 +00:00
|
|
|
|
server =
|
|
|
|
|
{ config, pkgs, ... }:
|
|
|
|
|
{ services.openssh.enable = true;
|
|
|
|
|
virtualisation.writableStore = true;
|
2014-07-09 23:50:29 +00:00
|
|
|
|
virtualisation.pathsInNixDB = [ pkgB pkgC ];
|
2013-03-08 00:24:59 +00:00
|
|
|
|
};
|
2011-10-11 13:58:47 +00:00
|
|
|
|
};
|
|
|
|
|
|
2020-10-17 20:08:18 +00:00
|
|
|
|
testScript = { nodes }: ''
|
|
|
|
|
# fmt: off
|
|
|
|
|
import subprocess
|
2011-10-11 13:58:47 +00:00
|
|
|
|
|
2020-10-17 20:08:18 +00:00
|
|
|
|
start_all()
|
2011-10-11 13:58:47 +00:00
|
|
|
|
|
2020-10-17 20:08:18 +00:00
|
|
|
|
# Create an SSH key on the client.
|
|
|
|
|
subprocess.run([
|
|
|
|
|
"${pkgs.openssh}/bin/ssh-keygen", "-t", "ed25519", "-f", "key", "-N", ""
|
|
|
|
|
], capture_output=True, check=True)
|
2011-10-11 13:58:47 +00:00
|
|
|
|
|
2020-10-17 20:08:18 +00:00
|
|
|
|
client.succeed("mkdir -m 700 /root/.ssh")
|
|
|
|
|
client.copy_from_host("key", "/root/.ssh/id_ed25519")
|
|
|
|
|
client.succeed("chmod 600 /root/.ssh/id_ed25519")
|
2011-10-11 13:58:47 +00:00
|
|
|
|
|
2020-10-17 20:08:18 +00:00
|
|
|
|
# Install the SSH key on the server.
|
|
|
|
|
server.succeed("mkdir -m 700 /root/.ssh")
|
|
|
|
|
server.copy_from_host("key.pub", "/root/.ssh/authorized_keys")
|
|
|
|
|
server.wait_for_unit("sshd")
|
|
|
|
|
client.wait_for_unit("network.target")
|
|
|
|
|
client.succeed(f"ssh -o StrictHostKeyChecking=no {server.name} 'echo hello world'")
|
2014-07-09 23:50:29 +00:00
|
|
|
|
|
2020-10-17 20:08:18 +00:00
|
|
|
|
# Copy the closure of package A from the client to the server.
|
|
|
|
|
server.fail("nix-store --check-validity ${pkgA}")
|
|
|
|
|
client.succeed("nix-copy-closure --to server --gzip ${pkgA} >&2")
|
|
|
|
|
server.succeed("nix-store --check-validity ${pkgA}")
|
2011-10-11 13:58:47 +00:00
|
|
|
|
|
2020-10-17 20:08:18 +00:00
|
|
|
|
# Copy the closure of package B from the server to the client.
|
|
|
|
|
client.fail("nix-store --check-validity ${pkgB}")
|
|
|
|
|
client.succeed("nix-copy-closure --from server --gzip ${pkgB} >&2")
|
|
|
|
|
client.succeed("nix-store --check-validity ${pkgB}")
|
|
|
|
|
|
|
|
|
|
# Copy the closure of package C via the SSH substituter.
|
|
|
|
|
client.fail("nix-store -r ${pkgC}")
|
|
|
|
|
# FIXME
|
|
|
|
|
# client.succeed(
|
|
|
|
|
# "nix-store --option use-ssh-substituter true"
|
|
|
|
|
# " --option ssh-substituter-hosts root\@server"
|
|
|
|
|
# " -r ${pkgC} >&2"
|
|
|
|
|
# )
|
|
|
|
|
# client.succeed("nix-store --check-validity ${pkgC}")
|
|
|
|
|
'';
|
2011-10-11 13:58:47 +00:00
|
|
|
|
})
|