summary refs log tree commit diff
path: root/nixos/tests/containers-ip.nix
diff options
context:
space:
mode:
authorJacek Galowicz <jacek.galowicz@cyberus-technology.de>2019-11-26 00:44:12 +0100
committerJacek Galowicz <jacek.galowicz@cyberus-technology.de>2019-11-27 09:13:02 +0100
commit07802f4d204c8cb5e9a8e6ff1ea25063f823798c (patch)
tree65a7fae2e7fd56a10475e18d87b7b5287c65559b /nixos/tests/containers-ip.nix
parent4e89f75ca6970549e5bfcd89fd41e239b6d83480 (diff)
downloadnixpkgs-07802f4d204c8cb5e9a8e6ff1ea25063f823798c.tar
nixpkgs-07802f4d204c8cb5e9a8e6ff1ea25063f823798c.tar.gz
nixpkgs-07802f4d204c8cb5e9a8e6ff1ea25063f823798c.tar.bz2
nixpkgs-07802f4d204c8cb5e9a8e6ff1ea25063f823798c.tar.lz
nixpkgs-07802f4d204c8cb5e9a8e6ff1ea25063f823798c.tar.xz
nixpkgs-07802f4d204c8cb5e9a8e6ff1ea25063f823798c.tar.zst
nixpkgs-07802f4d204c8cb5e9a8e6ff1ea25063f823798c.zip
nixos/containers-ip: Test both ipv4 and ipv6 in the same script
Diffstat (limited to 'nixos/tests/containers-ip.nix')
-rw-r--r--nixos/tests/containers-ip.nix77
1 files changed, 77 insertions, 0 deletions
diff --git a/nixos/tests/containers-ip.nix b/nixos/tests/containers-ip.nix
new file mode 100644
index 00000000000..8583a08c625
--- /dev/null
+++ b/nixos/tests/containers-ip.nix
@@ -0,0 +1,77 @@
+# Test for NixOS' container support.
+
+let
+  webserverFor = hostAddress: localAddress: {
+    inherit hostAddress localAddress;
+    privateNetwork = true;
+    config = {
+      services.httpd = {
+        enable = true;
+        adminAddr = "foo@example.org";
+      };
+      networking.firewall.allowedTCPPorts = [ 80 ];
+    };
+  };
+
+in import ./make-test-python.nix ({ pkgs, ...} : {
+  name = "containers-ipv4-ipv6";
+  meta = with pkgs.stdenv.lib.maintainers; {
+    maintainers = [ aristid aszlig eelco kampfschlaefer ];
+  };
+
+  machine =
+    { pkgs, ... }: {
+      imports = [ ../modules/installer/cd-dvd/channel.nix ];
+      virtualisation = {
+        writableStore = true;
+        memorySize = 768;
+      };
+
+      containers.webserver4 = webserverFor "10.231.136.1" "10.231.136.2";
+      containers.webserver6 = webserverFor "fc00::2" "fc00::1";
+      virtualisation.pathsInNixDB = [ pkgs.stdenv ];
+    };
+
+  testScript = { nodes, ... }: ''
+    import time
+
+
+    def curl_host(ip):
+        # put [] around ipv6 addresses for curl
+        host = ip if ":" not in ip else f"[{ip}]"
+        return f"curl --fail --connect-timeout 2 http://{host}/ > /dev/null"
+
+
+    def get_ip(container):
+        # need to distinguish because show-ip won't work for ipv6
+        if container == "webserver4":
+            ip = machine.succeed(f"nixos-container show-ip {container}").rstrip()
+            assert ip == "${nodes.machine.config.containers.webserver4.localAddress}"
+            return ip
+        return "${nodes.machine.config.containers.webserver6.localAddress}"
+
+
+    for container in "webserver4", "webserver6":
+        assert container in machine.succeed("nixos-container list")
+
+        with subtest(f"Start container {container}"):
+            machine.succeed(f"nixos-container start {container}")
+            # wait 2s for container to start and network to be up
+            time.sleep(2)
+
+        # Since "start" returns after the container has reached
+        # multi-user.target, we should now be able to access it.
+
+        ip = get_ip(container)
+        with subtest(f"{container} reacts to pings and HTTP requests"):
+            machine.succeed(f"ping -n -c1 {ip}")
+            machine.succeed(curl_host(ip))
+
+        with subtest(f"Stop container {container}"):
+            machine.succeed(f"nixos-container stop {container}")
+            machine.fail(curl_host(ip))
+
+        # Destroying a declarative container should fail.
+        machine.fail(f"nixos-container destroy {container}")
+  '';
+})