diff options
author | Arnold Krille <arnold@arnoldarts.de> | 2016-03-18 15:29:45 +0100 |
---|---|---|
committer | Arnold Krille <arnold@arnoldarts.de> | 2016-04-02 17:07:41 +0200 |
commit | 2d6a2b41313464ba82297c4f6e86c7026c7d132e (patch) | |
tree | 45e5f6863336a6908496d6268a317b13d7cd1a4d /nixos | |
parent | 3b31c52d4b2784de33280feb9949f2ab8241ac50 (diff) | |
download | nixpkgs-2d6a2b41313464ba82297c4f6e86c7026c7d132e.tar nixpkgs-2d6a2b41313464ba82297c4f6e86c7026c7d132e.tar.gz nixpkgs-2d6a2b41313464ba82297c4f6e86c7026c7d132e.tar.bz2 nixpkgs-2d6a2b41313464ba82297c4f6e86c7026c7d132e.tar.lz nixpkgs-2d6a2b41313464ba82297c4f6e86c7026c7d132e.tar.xz nixpkgs-2d6a2b41313464ba82297c4f6e86c7026c7d132e.tar.zst nixpkgs-2d6a2b41313464ba82297c4f6e86c7026c7d132e.zip |
containers tests: Distinguish declarative and imperative containers
Diffstat (limited to 'nixos')
-rw-r--r-- | nixos/release.nix | 3 | ||||
-rw-r--r-- | nixos/tests/containers-imperative.nix (renamed from nixos/tests/containers.nix) | 37 | ||||
-rw-r--r-- | nixos/tests/containers-ipv4.nix | 55 |
3 files changed, 58 insertions, 37 deletions
diff --git a/nixos/release.nix b/nixos/release.nix index 2dc1b21daaf..7ef4ca8f934 100644 --- a/nixos/release.nix +++ b/nixos/release.nix @@ -199,9 +199,10 @@ in rec { tests.cadvisor = hydraJob (import tests/cadvisor.nix { system = "x86_64-linux"; }); tests.chromium = callSubTests tests/chromium.nix {}; tests.cjdns = callTest tests/cjdns.nix {}; - tests.containers = callTest tests/containers.nix {}; + tests.containers-ipv4 = callTest tests/containers-ipv4.nix {}; tests.containers-ipv6 = callTest tests/containers-ipv6.nix {}; tests.containers-bridge = callTest tests/containers-bridge.nix {}; + tests.containers-imperative = callTest tests/containers-imperative.nix {}; tests.docker = hydraJob (import tests/docker.nix { system = "x86_64-linux"; }); tests.dockerRegistry = hydraJob (import tests/docker-registry.nix { system = "x86_64-linux"; }); tests.dnscrypt-proxy = callTest tests/dnscrypt-proxy.nix { system = "x86_64-linux"; }; diff --git a/nixos/tests/containers.nix b/nixos/tests/containers-imperative.nix index 108feba0891..8d100fedf78 100644 --- a/nixos/tests/containers.nix +++ b/nixos/tests/containers-imperative.nix @@ -1,7 +1,7 @@ # Test for NixOS' container support. import ./make-test.nix ({ pkgs, ...} : { - name = "containers"; + name = "containers-imperative"; meta = with pkgs.stdenv.lib.maintainers; { maintainers = [ aristid aszlig eelco chaoflow ]; }; @@ -11,43 +11,11 @@ import ./make-test.nix ({ pkgs, ...} : { { imports = [ ../modules/installer/cd-dvd/channel.nix ]; virtualisation.writableStore = true; virtualisation.memorySize = 768; - - containers.webserver = - { privateNetwork = true; - hostAddress = "10.231.136.1"; - localAddress = "10.231.136.2"; - config = - { services.httpd.enable = true; - services.httpd.adminAddr = "foo@example.org"; - networking.firewall.allowedTCPPorts = [ 80 ]; - networking.firewall.allowPing = true; - }; - }; - virtualisation.pathsInNixDB = [ pkgs.stdenv ]; }; testScript = '' - $machine->succeed("nixos-container list") =~ /webserver/ or die; - - # Start the webserver container. - $machine->succeed("nixos-container start webserver"); - - # wait two seconds for the container to start and the network to be up - sleep 2; - - # Since "start" returns after the container has reached - # multi-user.target, we should now be able to access it. - my $ip = $machine->succeed("nixos-container show-ip webserver"); - chomp $ip; - $machine->succeed("ping -n -c1 $ip"); - $machine->succeed("curl --fail http://$ip/ > /dev/null"); - - # Stop the container. - $machine->succeed("nixos-container stop webserver"); - $machine->fail("curl --fail --connect-timeout 2 http://$ip/ > /dev/null"); - # Make sure we have a NixOS tree (required by ‘nixos-container create’). $machine->succeed("PAGER=cat nix-env -qa -A nixos.hello >&2"); @@ -114,9 +82,6 @@ import ./make-test.nix ({ pkgs, ...} : { # Ensure that the container path is gone "test ! -e /var/lib/containers/$id1" ); - - # Destroying a declarative container should fail. - $machine->fail("nixos-container destroy webserver"); ''; }) diff --git a/nixos/tests/containers-ipv4.nix b/nixos/tests/containers-ipv4.nix new file mode 100644 index 00000000000..8f1ab40221a --- /dev/null +++ b/nixos/tests/containers-ipv4.nix @@ -0,0 +1,55 @@ +# Test for NixOS' container support. + +import ./make-test.nix ({ pkgs, ...} : { + name = "containers-ipv4"; + meta = with pkgs.stdenv.lib.maintainers; { + maintainers = [ aristid aszlig eelco chaoflow ]; + }; + + machine = + { config, pkgs, ... }: + { imports = [ ../modules/installer/cd-dvd/channel.nix ]; + virtualisation.writableStore = true; + virtualisation.memorySize = 768; + + containers.webserver = + { privateNetwork = true; + hostAddress = "10.231.136.1"; + localAddress = "10.231.136.2"; + config = + { services.httpd.enable = true; + services.httpd.adminAddr = "foo@example.org"; + networking.firewall.allowedTCPPorts = [ 80 ]; + networking.firewall.allowPing = true; + }; + }; + + virtualisation.pathsInNixDB = [ pkgs.stdenv ]; + }; + + testScript = + '' + $machine->succeed("nixos-container list") =~ /webserver/ or die; + + # Start the webserver container. + $machine->succeed("nixos-container start webserver"); + + # wait two seconds for the container to start and the network to be up + sleep 2; + + # Since "start" returns after the container has reached + # multi-user.target, we should now be able to access it. + my $ip = $machine->succeed("nixos-container show-ip webserver"); + chomp $ip; + $machine->succeed("ping -n -c1 $ip"); + $machine->succeed("curl --fail http://$ip/ > /dev/null"); + + # Stop the container. + $machine->succeed("nixos-container stop webserver"); + $machine->fail("curl --fail --connect-timeout 2 http://$ip/ > /dev/null"); + + # Destroying a declarative container should fail. + $machine->fail("nixos-container destroy webserver"); + ''; + +}) |