Merge pull request #10922 from hercules-ci/functional-tests-on-nixos

Run the functional tests in a NixOS environment
This commit is contained in:
John Ericson 2024-06-24 13:36:13 -04:00 committed by GitHub
commit 5c497a992b
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
111 changed files with 526 additions and 81 deletions

View File

@ -31,6 +31,23 @@ jobs:
name: '${{ env.CACHIX_NAME }}' name: '${{ env.CACHIX_NAME }}'
signingKey: '${{ secrets.CACHIX_SIGNING_KEY }}' signingKey: '${{ secrets.CACHIX_SIGNING_KEY }}'
authToken: '${{ secrets.CACHIX_AUTH_TOKEN }}' authToken: '${{ secrets.CACHIX_AUTH_TOKEN }}'
- if: matrix.os == 'ubuntu-latest'
run: |
free -h
swapon --show
swap=$(swapon --show --noheadings | head -n 1 | awk '{print $1}')
echo "Found swap: $swap"
sudo swapoff $swap
# resize it (fallocate)
sudo fallocate -l 10G $swap
sudo mkswap $swap
sudo swapon $swap
free -h
(
while sleep 60; do
free -h
done
) &
- run: nix --experimental-features 'nix-command flakes' flake check -L - run: nix --experimental-features 'nix-command flakes' flake check -L
# Steps to test CI automation in your own fork. # Steps to test CI automation in your own fork.
@ -175,4 +192,4 @@ jobs:
- uses: actions/checkout@v4 - uses: actions/checkout@v4
- uses: DeterminateSystems/nix-installer-action@main - uses: DeterminateSystems/nix-installer-action@main
- uses: DeterminateSystems/magic-nix-cache-action@main - uses: DeterminateSystems/magic-nix-cache-action@main
- run: nix build -L .#hydraJobs.tests.githubFlakes .#hydraJobs.tests.tarballFlakes - run: nix build -L .#hydraJobs.tests.githubFlakes .#hydraJobs.tests.tarballFlakes .#hydraJobs.tests.functional_user

View File

@ -114,6 +114,8 @@ On other platforms they wouldn't be run at all.
The functional tests reside under the `tests/functional` directory and are listed in `tests/functional/local.mk`. The functional tests reside under the `tests/functional` directory and are listed in `tests/functional/local.mk`.
Each test is a bash script. Each test is a bash script.
Functional tests are run during `installCheck` in the `nix` package build, as well as separately from the build, in VM tests.
### Running the whole test suite ### Running the whole test suite
The whole test suite can be run with: The whole test suite can be run with:
@ -252,13 +254,30 @@ Regressions are caught, and improvements always show up in code review.
To ensure that characterisation testing doesn't make it harder to intentionally change these interfaces, there always must be an easy way to regenerate the expected output, as we do with `_NIX_TEST_ACCEPT=1`. To ensure that characterisation testing doesn't make it harder to intentionally change these interfaces, there always must be an easy way to regenerate the expected output, as we do with `_NIX_TEST_ACCEPT=1`.
### Running functional tests on NixOS
We run the functional tests not just in the build, but also in VM tests.
This helps us ensure that Nix works correctly on NixOS, and environments that have similar characteristics that are hard to reproduce in a build environment.
The recommended way to run these tests during development is:
```shell
nix build .#hydraJobs.tests.functional_user.quickBuild
```
The `quickBuild` attribute configures the test to use a `nix` package that's built without integration tests, so that you can iterate on the tests without performing recompilations due to the changed sources for `installCheck`.
Generally, this build is sufficient, but in nightly or CI we also test the attributes `functional_root` and `functional_trusted`, in which the test suite is run with different levels of authorization.
## Integration tests ## Integration tests
The integration tests are defined in the Nix flake under the `hydraJobs.tests` attribute. The integration tests are defined in the Nix flake under the `hydraJobs.tests` attribute.
These tests include everything that needs to interact with external services or run Nix in a non-trivial distributed setup. These tests include everything that needs to interact with external services or run Nix in a non-trivial distributed setup.
Because these tests are expensive and require more than what the standard github-actions setup provides, they only run on the master branch (on <https://hydra.nixos.org/jobset/nix/master>). Because these tests are expensive and require more than what the standard github-actions setup provides, they only run on the master branch (on <https://hydra.nixos.org/jobset/nix/master>).
You can run them manually with `nix build .#hydraJobs.tests.{testName}` or `nix-build -A hydraJobs.tests.{testName}` You can run them manually with `nix build .#hydraJobs.tests.{testName}` or `nix-build -A hydraJobs.tests.{testName}`.
If you are testing a build of `nix` that you haven't compiled yet, you may iterate faster by appending the `quickBuild` attribute: `nix build .#hydraJobs.tests.{testName}.quickBuild`.
## Installer tests ## Installer tests

View File

@ -227,6 +227,12 @@
; ;
}; };
nix_noTests = final.nix.override {
doCheck = false;
doInstallCheck = false;
installUnitTests = false;
};
# See https://github.com/NixOS/nixpkgs/pull/214409 # See https://github.com/NixOS/nixpkgs/pull/214409
# Remove when fixed in this flake's nixpkgs # Remove when fixed in this flake's nixpkgs
pre-commit = pre-commit =

View File

@ -58,13 +58,7 @@ in
self.packages.${system}.nix.override { enableGC = false; } self.packages.${system}.nix.override { enableGC = false; }
); );
buildNoTests = forAllSystems (system: buildNoTests = forAllSystems (system: nixpkgsFor.${system}.native.nix_noTests);
self.packages.${system}.nix.override {
doCheck = false;
doInstallCheck = false;
installUnitTests = false;
}
);
# Toggles some settings for better coverage. Windows needs these # Toggles some settings for better coverage. Windows needs these
# library combinations, and Debian build Nix with GNU readline too. # library combinations, and Debian build Nix with GNU readline too.

View File

@ -31,7 +31,7 @@ test "$hash1" = "sha256:$hash2"
#### New style commands #### New style commands
clearStore clearStoreIfPossible
( (
path1=$(nix store add ./dummy) path1=$(nix store add ./dummy)

View File

@ -2,7 +2,9 @@
source common.sh source common.sh
clearStore TODO_NixOS
clearStoreIfPossible
clearCacheCache clearCacheCache
# Fails without remote builders # Fails without remote builders

View File

@ -2,6 +2,8 @@
source common.sh source common.sh
TODO_NixOS
needLocalStore "'--no-require-sigs' cant be used with the daemon" needLocalStore "'--no-require-sigs' cant be used with the daemon"
# We can produce drvs directly into the binary cache # We can produce drvs directly into the binary cache

View File

@ -2,6 +2,8 @@
source common.sh source common.sh
TODO_NixOS
clearStore clearStore
clearCache clearCache

View File

@ -2,7 +2,7 @@
source common.sh source common.sh
clearStore clearStoreIfPossible
# https://github.com/NixOS/nix/issues/6572 # https://github.com/NixOS/nix/issues/6572
issue_6572_independent_outputs() { issue_6572_independent_outputs() {

View File

@ -2,6 +2,8 @@
source common.sh source common.sh
TODO_NixOS
################################################### ###################################################
# Check that --dry-run isn't confused with read-only mode # Check that --dry-run isn't confused with read-only mode
# https://github.com/NixOS/nix/issues/1795 # https://github.com/NixOS/nix/issues/1795

View File

@ -23,7 +23,7 @@ EOF
chmod +x "$TEST_ROOT/post-build-hook.sh" chmod +x "$TEST_ROOT/post-build-hook.sh"
rm -f "$TEST_ROOT/post-hook-counter" rm -f "$TEST_ROOT/post-hook-counter"
echo "post-build-hook = $TEST_ROOT/post-build-hook.sh" >> "$NIX_CONF_DIR/nix.conf" echo "post-build-hook = $TEST_ROOT/post-build-hook.sh" >> "$test_nix_conf"
} }
registerBuildHook registerBuildHook

View File

@ -4,6 +4,7 @@ source common.sh
enableFeatures "daemon-trust-override" enableFeatures "daemon-trust-override"
TODO_NixOS
restartDaemon restartDaemon
requireSandboxSupport requireSandboxSupport

View File

@ -4,6 +4,8 @@ source common.sh
enableFeatures "daemon-trust-override" enableFeatures "daemon-trust-override"
TODO_NixOS
restartDaemon restartDaemon
# Remote doesn't trust us # Remote doesn't trust us

View File

@ -4,6 +4,7 @@ source common.sh
enableFeatures "daemon-trust-override" enableFeatures "daemon-trust-override"
TODO_NixOS
restartDaemon restartDaemon
# Remote doesn't trusts us, but this is fine because we are only # Remote doesn't trusts us, but this is fine because we are only

View File

@ -2,7 +2,7 @@
source common.sh source common.sh
clearStore clearStoreIfPossible
# Make sure that 'nix build' returns all outputs by default. # Make sure that 'nix build' returns all outputs by default.
nix build -f multiple-outputs.nix --json a b --no-link | jq --exit-status ' nix build -f multiple-outputs.nix --json a b --no-link | jq --exit-status '

View File

@ -2,4 +2,6 @@ source ../common.sh
enableFeatures "ca-derivations" enableFeatures "ca-derivations"
TODO_NixOS
restartDaemon restartDaemon

View File

@ -2,6 +2,8 @@
source common.sh source common.sh
TODO_NixOS
clearStore clearStore
rm -rf "$TEST_ROOT/case" rm -rf "$TEST_ROOT/case"

View File

@ -2,6 +2,8 @@
source common.sh source common.sh
TODO_NixOS
clearStore clearStore
RESULT=$TEST_ROOT/result RESULT=$TEST_ROOT/result
@ -43,13 +45,18 @@ nix-build -o "$RESULT" check-refs.nix -A test7
# test10 should succeed (no disallowed references). # test10 should succeed (no disallowed references).
nix-build -o "$RESULT" check-refs.nix -A test10 nix-build -o "$RESULT" check-refs.nix -A test10
if isDaemonNewer 2.12pre20230103; then if ! isTestOnNixOS; then
if ! isDaemonNewer 2.16.0; then # If we have full control over our store, we can test some more things.
enableFeatures discard-references
restartDaemon if isDaemonNewer 2.12pre20230103; then
if ! isDaemonNewer 2.16.0; then
enableFeatures discard-references
restartDaemon
fi
# test11 should succeed.
test11=$(nix-build -o "$RESULT" check-refs.nix -A test11)
[[ -z $(nix-store -q --references "$test11") ]]
fi fi
# test11 should succeed.
test11=$(nix-build -o "$RESULT" check-refs.nix -A test11)
[[ -z $(nix-store -q --references "$test11") ]]
fi fi

View File

@ -2,7 +2,7 @@
source common.sh source common.sh
clearStore clearStoreIfPossible
RESULT=$TEST_ROOT/result RESULT=$TEST_ROOT/result

View File

@ -15,6 +15,8 @@ checkBuildTempDirRemoved ()
# written to build temp directories to verify created by this instance # written to build temp directories to verify created by this instance
checkBuildId=$(date +%s%N) checkBuildId=$(date +%s%N)
TODO_NixOS
clearStore clearStore
nix-build dependencies.nix --no-out-link nix-build dependencies.nix --no-out-link
@ -76,6 +78,8 @@ grep 'may not be deterministic' $TEST_ROOT/log
[ "$status" = "104" ] [ "$status" = "104" ]
if checkBuildTempDirRemoved $TEST_ROOT/log; then false; fi if checkBuildTempDirRemoved $TEST_ROOT/log; then false; fi
TODO_NixOS
clearStore clearStore
path=$(nix-build check.nix -A fetchurl --no-out-link) path=$(nix-build check.nix -A fetchurl --no-out-link)

View File

@ -39,6 +39,8 @@ EOF
cp simple.nix shell.nix simple.builder.sh config.nix "$flakeDir/" cp simple.nix shell.nix simple.builder.sh config.nix "$flakeDir/"
TODO_NixOS
outPath=$(nix build --print-out-paths --no-link --sandbox-paths '/nix? /bin? /lib? /lib64? /usr?' --store "$TEST_ROOT/x" path:"$flakeDir") outPath=$(nix build --print-out-paths --no-link --sandbox-paths '/nix? /bin? /lib? /lib64? /usr?' --store "$TEST_ROOT/x" path:"$flakeDir")
[[ $outPath =~ ^/nix2/store/.*-simple$ ]] [[ $outPath =~ ^/nix2/store/.*-simple$ ]]

View File

@ -1,5 +1,31 @@
# shellcheck shell=bash # shellcheck shell=bash
# for shellcheck
: "${test_nix_conf_dir?}" "${test_nix_conf?}"
if isTestOnNixOS; then
mkdir -p "$test_nix_conf_dir" "$TEST_HOME"
export NIX_USER_CONF_FILES="$test_nix_conf_dir/nix.conf"
mkdir -p "$test_nix_conf_dir" "$TEST_HOME"
! test -e "$test_nix_conf"
cat > "$test_nix_conf_dir/nix.conf" <<EOF
# TODO: this is not needed for all tests and prevents stable commands from be tested in isolation
experimental-features = nix-command flakes
flake-registry = $TEST_ROOT/registry.json
show-trace = true
EOF
# When we're doing everything in the same store, we need to bring
# dependencies into context.
sed -i "$(dirname "${BASH_SOURCE[0]}")"/../config.nix \
-e 's^\(shell\) = "/nix/store/\([^/]*\)/\(.*\)";^\1 = builtins.appendContext "/nix/store/\2" { "/nix/store/\2".path = true; } + "/\3";^' \
-e 's^\(path\) = "/nix/store/\([^/]*\)/\(.*\)";^\1 = builtins.appendContext "/nix/store/\2" { "/nix/store/\2".path = true; } + "/\3";^' \
;
else
test -n "$TEST_ROOT" test -n "$TEST_ROOT"
# We would delete any daemon socket, so let's stop the daemon first. # We would delete any daemon socket, so let's stop the daemon first.
killDaemon killDaemon
@ -41,3 +67,5 @@ EOF
nix-store --init nix-store --init
# Sanity check # Sanity check
test -e "$NIX_STATE_DIR"/db/db.sqlite test -e "$NIX_STATE_DIR"/db/db.sqlite
fi # !isTestOnNixOS

View File

@ -9,7 +9,6 @@ export coreutils=@coreutils@
#lsof=@lsof@ #lsof=@lsof@
export dot=@dot@ export dot=@dot@
export SHELL="@bash@"
export PAGER=cat export PAGER=cat
export busybox="@sandbox_shell@" export busybox="@sandbox_shell@"
@ -18,4 +17,9 @@ export system=@system@
export BUILD_SHARED_LIBS=@BUILD_SHARED_LIBS@ export BUILD_SHARED_LIBS=@BUILD_SHARED_LIBS@
if ! isTestOnNixOS; then
export SHELL="@bash@"
export PATH=@bindir@:$PATH
fi
fi fi

View File

@ -6,6 +6,15 @@ if [[ -z "${COMMON_VARS_AND_FUNCTIONS_SH_SOURCED-}" ]]; then
COMMON_VARS_AND_FUNCTIONS_SH_SOURCED=1 COMMON_VARS_AND_FUNCTIONS_SH_SOURCED=1
isTestOnNixOS() {
[[ "${isTestOnNixOS:-}" == 1 ]]
}
die() {
echo "unexpected fatal error: $*" >&2
exit 1
}
set +x set +x
commonDir="$(readlink -f "$(dirname "${BASH_SOURCE[0]-$0}")")" commonDir="$(readlink -f "$(dirname "${BASH_SOURCE[0]-$0}")")"
@ -17,27 +26,35 @@ source "$commonDir/subst-vars.sh"
source "$commonDir/paths.sh" source "$commonDir/paths.sh"
source "$commonDir/test-root.sh" source "$commonDir/test-root.sh"
export NIX_STORE_DIR test_nix_conf_dir=$TEST_ROOT/etc
if ! NIX_STORE_DIR=$(readlink -f $TEST_ROOT/store 2> /dev/null); then test_nix_conf=$test_nix_conf_dir/nix.conf
# Maybe the build directory is symlinked.
export NIX_IGNORE_SYMLINK_STORE=1
NIX_STORE_DIR=$TEST_ROOT/store
fi
export NIX_LOCALSTATE_DIR=$TEST_ROOT/var
export NIX_LOG_DIR=$TEST_ROOT/var/log/nix
export NIX_STATE_DIR=$TEST_ROOT/var/nix
export NIX_CONF_DIR=$TEST_ROOT/etc
export NIX_DAEMON_SOCKET_PATH=$TEST_ROOT/dSocket
unset NIX_USER_CONF_FILES
export _NIX_TEST_SHARED=$TEST_ROOT/shared
if [[ -n $NIX_STORE ]]; then
export _NIX_TEST_NO_SANDBOX=1
fi
export _NIX_IN_TEST=$TEST_ROOT/shared
export _NIX_TEST_NO_LSOF=1
export NIX_REMOTE=${NIX_REMOTE_-}
unset NIX_PATH
export TEST_HOME=$TEST_ROOT/test-home export TEST_HOME=$TEST_ROOT/test-home
if ! isTestOnNixOS; then
export NIX_STORE_DIR
if ! NIX_STORE_DIR=$(readlink -f $TEST_ROOT/store 2> /dev/null); then
# Maybe the build directory is symlinked.
export NIX_IGNORE_SYMLINK_STORE=1
NIX_STORE_DIR=$TEST_ROOT/store
fi
export NIX_LOCALSTATE_DIR=$TEST_ROOT/var
export NIX_LOG_DIR=$TEST_ROOT/var/log/nix
export NIX_STATE_DIR=$TEST_ROOT/var/nix
export NIX_CONF_DIR=$test_nix_conf_dir
export NIX_DAEMON_SOCKET_PATH=$TEST_ROOT/dSocket
unset NIX_USER_CONF_FILES
export _NIX_TEST_SHARED=$TEST_ROOT/shared
if [[ -n $NIX_STORE ]]; then
export _NIX_TEST_NO_SANDBOX=1
fi
export _NIX_IN_TEST=$TEST_ROOT/shared
export _NIX_TEST_NO_LSOF=1
export NIX_REMOTE=${NIX_REMOTE_-}
fi # ! isTestOnNixOS
unset NIX_PATH
export HOME=$TEST_HOME export HOME=$TEST_HOME
unset XDG_STATE_HOME unset XDG_STATE_HOME
unset XDG_DATA_HOME unset XDG_DATA_HOME
@ -59,7 +76,25 @@ clearProfiles() {
rm -rf "$profiles" rm -rf "$profiles"
} }
# Clear the store, but do not fail if we're in an environment where we can't.
# This allows the test to run in a NixOS test environment, where we use the system store.
# See doc/manual/src/contributing/testing.md / Running functional tests on NixOS.
clearStoreIfPossible() {
if isTestOnNixOS; then
echo "clearStoreIfPossible: Not clearing store, because we're on NixOS. Moving on."
else
doClearStore
fi
}
clearStore() { clearStore() {
if isTestOnNixOS; then
die "clearStore: not supported when testing on NixOS. If not essential, call clearStoreIfPossible. If really needed, add conditionals; e.g. if ! isTestOnNixOS; then ..."
fi
doClearStore
}
doClearStore() {
echo "clearing store..." echo "clearing store..."
chmod -R +w "$NIX_STORE_DIR" chmod -R +w "$NIX_STORE_DIR"
rm -rf "$NIX_STORE_DIR" rm -rf "$NIX_STORE_DIR"
@ -78,6 +113,10 @@ clearCacheCache() {
} }
startDaemon() { startDaemon() {
if isTestOnNixOS; then
die "startDaemon: not supported when testing on NixOS. Is it really needed? If so add conditionals; e.g. if ! isTestOnNixOS; then ..."
fi
# Dont start the daemon twice, as this would just make it loop indefinitely # Dont start the daemon twice, as this would just make it loop indefinitely
if [[ "${_NIX_TEST_DAEMON_PID-}" != '' ]]; then if [[ "${_NIX_TEST_DAEMON_PID-}" != '' ]]; then
return return
@ -104,6 +143,10 @@ startDaemon() {
} }
killDaemon() { killDaemon() {
if isTestOnNixOS; then
die "killDaemon: not supported when testing on NixOS. Is it really needed? If so add conditionals; e.g. if ! isTestOnNixOS; then ..."
fi
# Dont fail trying to stop a non-existant daemon twice # Dont fail trying to stop a non-existant daemon twice
if [[ "${_NIX_TEST_DAEMON_PID-}" == '' ]]; then if [[ "${_NIX_TEST_DAEMON_PID-}" == '' ]]; then
return return
@ -124,6 +167,10 @@ killDaemon() {
} }
restartDaemon() { restartDaemon() {
if isTestOnNixOS; then
die "restartDaemon: not supported when testing on NixOS. Is it really needed? If so add conditionals; e.g. if ! isTestOnNixOS; then ..."
fi
[[ -z "${_NIX_TEST_DAEMON_PID:-}" ]] && return 0 [[ -z "${_NIX_TEST_DAEMON_PID:-}" ]] && return 0
killDaemon killDaemon
@ -146,6 +193,12 @@ skipTest () {
exit 99 exit 99
} }
TODO_NixOS() {
if isTestOnNixOS; then
skipTest "This test has not been adapted for NixOS yet"
fi
}
requireDaemonNewerThan () { requireDaemonNewerThan () {
isDaemonNewer "$1" || skipTest "Daemon is too old" isDaemonNewer "$1" || skipTest "Daemon is too old"
} }
@ -163,7 +216,7 @@ requireGit() {
} }
fail() { fail() {
echo "$1" >&2 echo "test failed: $*" >&2
exit 1 exit 1
} }
@ -228,7 +281,7 @@ buggyNeedLocalStore() {
enableFeatures() { enableFeatures() {
local features="$1" local features="$1"
sed -i 's/experimental-features .*/& '"$features"'/' "$NIX_CONF_DIR"/nix.conf sed -i 's/experimental-features .*/& '"$features"'/' "$test_nix_conf_dir"/nix.conf
} }
set -x set -x

View File

@ -2,7 +2,7 @@
source common.sh source common.sh
clearStore clearStoreIfPossible
clearCache clearCache
outPath=$(nix-build dependencies.nix --no-out-link) outPath=$(nix-build dependencies.nix --no-out-link)

View File

@ -28,6 +28,8 @@ nix registry remove userhome-with-xdg
# Assert the .config folder hasn't been created. # Assert the .config folder hasn't been created.
[ ! -e "$HOME/.config" ] [ ! -e "$HOME/.config" ]
TODO_NixOS # Very specific test setup not compatible with the NixOS test environment?
# Test that files are loaded from XDG by default # Test that files are loaded from XDG by default
export XDG_CONFIG_HOME=$TEST_ROOT/confighome export XDG_CONFIG_HOME=$TEST_ROOT/confighome
export XDG_CONFIG_DIRS=$TEST_ROOT/dir1:$TEST_ROOT/dir2 export XDG_CONFIG_DIRS=$TEST_ROOT/dir1:$TEST_ROOT/dir2

View File

@ -10,6 +10,8 @@ if [[ -z "${NIX_DAEMON_PACKAGE-}" ]]; then
skipTest "not using the Nix daemon" skipTest "not using the Nix daemon"
fi fi
TODO_NixOS
killDaemon killDaemon
# Fill the db using the older Nix # Fill the db using the older Nix

View File

@ -2,7 +2,7 @@
source common.sh source common.sh
clearStore clearStoreIfPossible
# regression #9932 # regression #9932
echo ":env" | expect 1 nix eval --debugger --expr '(_: throw "oh snap") 42' echo ":env" | expect 1 nix eval --debugger --expr '(_: throw "oh snap") 42'

View File

@ -2,7 +2,7 @@
source common.sh source common.sh
clearStore clearStoreIfPossible
drvPath=$(nix-instantiate dependencies.nix) drvPath=$(nix-instantiate dependencies.nix)
@ -65,6 +65,8 @@ drvPath2=$(nix-instantiate dependencies.nix --argstr hashInvalidator yay)
# now --valid-derivers returns both # now --valid-derivers returns both
test "$(nix-store -q --valid-derivers "$outPath" | sort)" = "$(sort <<< "$drvPath"$'\n'"$drvPath2")" test "$(nix-store -q --valid-derivers "$outPath" | sort)" = "$(sort <<< "$drvPath"$'\n'"$drvPath2")"
TODO_NixOS # The following --delete fails, because it seems to be still alive. This might be caused by a different test using the same path. We should try make the derivations unique, e.g. naming after tests, and adding a timestamp that's constant for that test script run.
# check that nix-store --valid-derivers only returns existing drv # check that nix-store --valid-derivers only returns existing drv
nix-store --delete "$drvPath" nix-store --delete "$drvPath"
test "$(nix-store -q --valid-derivers "$outPath")" = "$drvPath2" test "$(nix-store -q --valid-derivers "$outPath")" = "$drvPath2"

View File

@ -2,6 +2,8 @@
source common.sh source common.sh
TODO_NixOS
needLocalStore "--dump-db requires a local store" needLocalStore "--dump-db requires a local store"
clearStore clearStore

View File

@ -5,4 +5,6 @@ requireDaemonNewerThan "2.16.0pre20230419"
enableFeatures "ca-derivations dynamic-derivations" enableFeatures "ca-derivations dynamic-derivations"
TODO_NixOS
restartDaemon restartDaemon

View File

@ -2,6 +2,8 @@
source common.sh source common.sh
TODO_NixOS
# Using `--eval-store` with the daemon will eventually copy everything # Using `--eval-store` with the daemon will eventually copy everything
# to the build store, invalidating most of the tests here # to the build store, invalidating most of the tests here
needLocalStore "“--eval-store” doesn't achieve much with the daemon" needLocalStore "“--eval-store” doesn't achieve much with the daemon"

View File

@ -2,7 +2,7 @@
source common.sh source common.sh
clearStore clearStoreIfPossible
testStdinHeredoc=$(nix eval -f - <<EOF testStdinHeredoc=$(nix eval -f - <<EOF
{ {

View File

@ -2,6 +2,8 @@
source common.sh source common.sh
TODO_NixOS
clearStore clearStore
clearProfiles clearProfiles

View File

@ -2,6 +2,8 @@
source common.sh source common.sh
TODO_NixOS
clearStore clearStore
outPath=$(nix-build dependencies.nix --no-out-link) outPath=$(nix-build dependencies.nix --no-out-link)

View File

@ -4,6 +4,8 @@ source common.sh
enableFeatures "fetch-closure" enableFeatures "fetch-closure"
TODO_NixOS
clearStore clearStore
clearCacheCache clearCacheCache

View File

@ -4,7 +4,7 @@ source common.sh
requireGit requireGit
clearStore clearStoreIfPossible
# Intentionally not in a canonical form # Intentionally not in a canonical form
# See https://github.com/NixOS/nix/issues/6195 # See https://github.com/NixOS/nix/issues/6195

View File

@ -4,7 +4,7 @@ source common.sh
requireGit requireGit
clearStore clearStoreIfPossible
repo="$TEST_ROOT/git" repo="$TEST_ROOT/git"

View File

@ -6,7 +6,7 @@ set -u
requireGit requireGit
clearStore clearStoreIfPossible
rootRepo=$TEST_ROOT/gitSubmodulesRoot rootRepo=$TEST_ROOT/gitSubmodulesRoot
subRepo=$TEST_ROOT/gitSubmodulesSub subRepo=$TEST_ROOT/gitSubmodulesSub

View File

@ -7,7 +7,7 @@ requireGit
enableFeatures "verified-fetches" enableFeatures "verified-fetches"
clearStore clearStoreIfPossible
repo="$TEST_ROOT/git" repo="$TEST_ROOT/git"

View File

@ -4,6 +4,8 @@ source common.sh
[[ $(type -p hg) ]] || skipTest "Mercurial not installed" [[ $(type -p hg) ]] || skipTest "Mercurial not installed"
TODO_NixOS
clearStore clearStore
# Intentionally not in a canonical form # Intentionally not in a canonical form

View File

@ -2,6 +2,8 @@
source common.sh source common.sh
TODO_NixOS
clearStore clearStore
cd "$TEST_ROOT" cd "$TEST_ROOT"

View File

@ -2,6 +2,8 @@
source common.sh source common.sh
TODO_NixOS
clearStore clearStore
# Test fetching a flat file. # Test fetching a flat file.

View File

@ -2,6 +2,8 @@
source common.sh source common.sh
TODO_NixOS
clearStore clearStore
path=$(nix-store -q $(nix-instantiate fixed.nix -A good.0)) path=$(nix-store -q $(nix-instantiate fixed.nix -A good.0))

View File

@ -28,6 +28,7 @@ EOF
# Without --accept-flake-config, the post hook should not run. # Without --accept-flake-config, the post hook should not run.
nix build < /dev/null nix build < /dev/null
(! [[ -f post-hook-ran ]]) (! [[ -f post-hook-ran ]])
TODO_NixOS
clearStore clearStore
nix build --accept-flake-config nix build --accept-flake-config

View File

@ -2,6 +2,8 @@
source ../common.sh source ../common.sh
TODO_NixOS
clearStore clearStore
rm -rf $TEST_HOME/.cache $TEST_HOME/.config $TEST_HOME/.local rm -rf $TEST_HOME/.cache $TEST_HOME/.config $TEST_HOME/.local

View File

@ -15,6 +15,8 @@ source common.sh
requireGit requireGit
TODO_NixOS
clearStore clearStore
# Submodules can't be fetched locally by default. # Submodules can't be fetched locally by default.

View File

@ -2,6 +2,8 @@
source ./common.sh source ./common.sh
TODO_NixOS
requireGit requireGit
clearStore clearStore

View File

@ -2,6 +2,8 @@
source ../common.sh source ../common.sh
TODO_NixOS
clearStore clearStore
rm -rf $TEST_HOME/.cache $TEST_HOME/.config $TEST_HOME/.local rm -rf $TEST_HOME/.cache $TEST_HOME/.config $TEST_HOME/.local
cp ../shell-hello.nix ../config.nix $TEST_HOME cp ../shell-hello.nix ../config.nix $TEST_HOME

View File

@ -2,7 +2,7 @@
source common.sh source common.sh
clearStore clearStoreIfPossible
writeSimpleFlake "$TEST_HOME" writeSimpleFlake "$TEST_HOME"
cd "$TEST_HOME" cd "$TEST_HOME"

View File

@ -2,7 +2,9 @@
source common.sh source common.sh
clearStore TODO_NixOS # Provide a `shell` variable. Try not to `export` it, perhaps.
clearStoreIfPossible
rm -rf $TEST_HOME/.cache $TEST_HOME/.config $TEST_HOME/.local rm -rf $TEST_HOME/.cache $TEST_HOME/.config $TEST_HOME/.local
cp ./simple.nix ./simple.builder.sh ./fmt.simple.sh ./config.nix $TEST_HOME cp ./simple.nix ./simple.builder.sh ./fmt.simple.sh ./config.nix $TEST_HOME
@ -31,5 +33,3 @@ EOF
nix fmt ./file ./folder | grep 'Formatting: ./file ./folder' nix fmt ./file ./folder | grep 'Formatting: ./file ./folder'
nix flake check nix flake check
nix flake show | grep -P "package 'formatter'" nix flake show | grep -P "package 'formatter'"
clearStore

View File

@ -4,6 +4,8 @@ source common.sh
needLocalStore "“min-free” and “max-free” are daemon options" needLocalStore "“min-free” and “max-free” are daemon options"
TODO_NixOS
clearStore clearStore
garbage1=$(nix store add-path --name garbage1 ./nar-access.sh) garbage1=$(nix store add-path --name garbage1 ./nar-access.sh)

View File

@ -2,6 +2,8 @@
source common.sh source common.sh
TODO_NixOS
clearStore clearStore
lockFifo1=$TEST_ROOT/test1.fifo lockFifo1=$TEST_ROOT/test1.fifo

View File

@ -4,6 +4,8 @@
# parallel with it. # parallel with it.
source common.sh source common.sh
TODO_NixOS
needLocalStore "the GC test needs a synchronisation point" needLocalStore "the GC test needs a synchronisation point"
clearStore clearStore

View File

@ -11,6 +11,8 @@ esac
set -m # enable job control, needed for kill set -m # enable job control, needed for kill
TODO_NixOS
profiles="$NIX_STATE_DIR"/profiles profiles="$NIX_STATE_DIR"/profiles
rm -rf "$profiles" rm -rf "$profiles"

View File

@ -2,6 +2,8 @@
source common.sh source common.sh
TODO_NixOS
clearStore clearStore
drvPath=$(nix-instantiate dependencies.nix) drvPath=$(nix-instantiate dependencies.nix)

View File

@ -1,5 +1,7 @@
source ../common.sh source ../common.sh
TODO_NixOS # Need to enable git hashing feature and make sure test is ok for store we don't clear
clearStore clearStore
clearCache clearCache

View File

@ -2,8 +2,6 @@
source common.sh source common.sh
clearStore
# test help output # test help output
nix-build --help nix-build --help

View File

@ -2,7 +2,7 @@
source common.sh source common.sh
clearStore clearStoreIfPossible
if nix-instantiate --readonly-mode ./import-derivation.nix; then if nix-instantiate --readonly-mode ./import-derivation.nix; then
echo "read-only evaluation of an imported derivation unexpectedly failed" echo "read-only evaluation of an imported derivation unexpectedly failed"

View File

@ -4,10 +4,12 @@ source common.sh
requireDaemonNewerThan "2.8pre20220311" requireDaemonNewerThan "2.8pre20220311"
TODO_NixOS
enableFeatures "ca-derivations impure-derivations" enableFeatures "ca-derivations impure-derivations"
restartDaemon restartDaemon
clearStore clearStoreIfPossible
# Basic test of impure derivations: building one a second time should not use the previous result. # Basic test of impure derivations: building one a second time should not use the previous result.
printf 0 > $TEST_ROOT/counter printf 0 > $TEST_ROOT/counter

View File

@ -5,6 +5,8 @@ source common.sh
# Needs the config option 'impure-env' to work # Needs the config option 'impure-env' to work
requireDaemonNewerThan "2.19.0" requireDaemonNewerThan "2.19.0"
TODO_NixOS
enableFeatures "configurable-impure-env" enableFeatures "configurable-impure-env"
restartDaemon restartDaemon
@ -20,13 +22,13 @@ startDaemon
varTest env_name value --impure-env env_name=value varTest env_name value --impure-env env_name=value
echo 'impure-env = set_in_config=config_value' >> "$NIX_CONF_DIR/nix.conf" echo 'impure-env = set_in_config=config_value' >> "$test_nix_conf"
set_in_config=daemon_value restartDaemon set_in_config=daemon_value restartDaemon
varTest set_in_config config_value varTest set_in_config config_value
varTest set_in_config client_value --impure-env set_in_config=client_value varTest set_in_config client_value --impure-env set_in_config=client_value
sed -i -e '/^trusted-users =/d' "$NIX_CONF_DIR/nix.conf" sed -i -e '/^trusted-users =/d' "$test_nix_conf"
env_name=daemon_value restartDaemon env_name=daemon_value restartDaemon

View File

@ -4,6 +4,8 @@ source common.sh
needLocalStore "the sandbox only runs on the builder side, so it makes no sense to test it with the daemon" needLocalStore "the sandbox only runs on the builder side, so it makes no sense to test it with the daemon"
TODO_NixOS
clearStore clearStore
requireSandboxSupport requireSandboxSupport

View File

@ -15,6 +15,8 @@ declare -a storesBad=(
"$storeBadRoot" "$storeBadLower" "$storeBadUpper" "$storeBadRoot" "$storeBadLower" "$storeBadUpper"
) )
TODO_NixOS
for i in "${storesBad[@]}"; do for i in "${storesBad[@]}"; do
echo $i echo $i
unshare --mount --map-root-user bash <<EOF unshare --mount --map-root-user bash <<EOF

View File

@ -1,5 +1,7 @@
source ../common/vars-and-functions.sh source ../common/vars-and-functions.sh
TODO_NixOS
# The new Linux mount interface does not seem to support remounting # The new Linux mount interface does not seem to support remounting
# OverlayFS mount points. # OverlayFS mount points.
# #
@ -31,7 +33,7 @@ requireEnvironment () {
} }
addConfig () { addConfig () {
echo "$1" >> "$NIX_CONF_DIR/nix.conf" echo "$1" >> "$test_nix_conf"
} }
setupConfig () { setupConfig () {

View File

@ -2,6 +2,8 @@
source common.sh source common.sh
TODO_NixOS
clearStore clearStore
path=$(nix-build dependencies.nix --no-out-link) path=$(nix-build dependencies.nix --no-out-link)

View File

@ -2,7 +2,9 @@
source common.sh source common.sh
clearStore TODO_NixOS
clearStoreIfPossible
rm -f $TEST_ROOT/result* rm -f $TEST_ROOT/result*

View File

@ -27,6 +27,8 @@ diff -u baz.cat-nar $storePath/foo/baz
nix store cat $storePath/foo/baz > baz.cat-nar nix store cat $storePath/foo/baz > baz.cat-nar
diff -u baz.cat-nar $storePath/foo/baz diff -u baz.cat-nar $storePath/foo/baz
TODO_NixOS
# Check that 'nix store cat' fails on invalid store paths. # Check that 'nix store cat' fails on invalid store paths.
invalidPath="$(dirname $storePath)/99999999999999999999999999999999-foo" invalidPath="$(dirname $storePath)/99999999999999999999999999999999-foo"
cp -r $storePath $invalidPath cp -r $storePath $invalidPath

View File

@ -4,6 +4,8 @@ source common.sh
# This test is run by `tests/functional/nested-sandboxing/runner.nix` in an extra layer of sandboxing. # This test is run by `tests/functional/nested-sandboxing/runner.nix` in an extra layer of sandboxing.
[[ -d /nix/store ]] || skipTest "running this test without Nix's deps being drawn from /nix/store is not yet supported" [[ -d /nix/store ]] || skipTest "running this test without Nix's deps being drawn from /nix/store is not yet supported"
TODO_NixOS
requireSandboxSupport requireSandboxSupport
source ./nested-sandboxing/command.sh source ./nested-sandboxing/command.sh

View File

@ -2,7 +2,9 @@
source common.sh source common.sh
clearStore TODO_NixOS
clearStoreIfPossible
outPath=$(nix-build dependencies.nix -o $TEST_ROOT/result) outPath=$(nix-build dependencies.nix -o $TEST_ROOT/result)
test "$(cat $TEST_ROOT/result/foobar)" = FOOBAR test "$(cat $TEST_ROOT/result/foobar)" = FOOBAR

View File

@ -2,6 +2,8 @@
source common.sh source common.sh
TODO_NixOS
clearStore clearStore
## Test `nix-collect-garbage -d` ## Test `nix-collect-garbage -d`

View File

@ -2,6 +2,8 @@ proto=$1
shift shift
(( $# == 0 )) (( $# == 0 ))
TODO_NixOS
clearStore clearStore
clearCache clearCache

View File

@ -4,6 +4,8 @@ source common.sh
source nix-copy-ssh-common.sh "ssh-ng" source nix-copy-ssh-common.sh "ssh-ng"
TODO_NixOS
clearStore clearStore
clearRemoteStore clearRemoteStore

View File

@ -2,6 +2,8 @@
source common.sh source common.sh
TODO_NixOS
clearStore clearStore
clearProfiles clearProfiles

View File

@ -2,7 +2,7 @@
source common.sh source common.sh
clearStore clearStoreIfPossible
if [[ -n ${CONTENT_ADDRESSED:-} ]]; then if [[ -n ${CONTENT_ADDRESSED:-} ]]; then
shellDotNix="$PWD/ca-shell.nix" shellDotNix="$PWD/ca-shell.nix"

View File

@ -2,11 +2,14 @@
source common.sh source common.sh
clearStore clearStoreIfPossible
outPath1=$(echo 'with import ./config.nix; mkDerivation { name = "foo1"; builder = builtins.toFile "builder" "mkdir $out; echo hello > $out/foo"; }' | nix-build - --no-out-link --auto-optimise-store) outPath1=$(echo 'with import ./config.nix; mkDerivation { name = "foo1"; builder = builtins.toFile "builder" "mkdir $out; echo hello > $out/foo"; }' | nix-build - --no-out-link --auto-optimise-store)
outPath2=$(echo 'with import ./config.nix; mkDerivation { name = "foo2"; builder = builtins.toFile "builder" "mkdir $out; echo hello > $out/foo"; }' | nix-build - --no-out-link --auto-optimise-store) outPath2=$(echo 'with import ./config.nix; mkDerivation { name = "foo2"; builder = builtins.toFile "builder" "mkdir $out; echo hello > $out/foo"; }' | nix-build - --no-out-link --auto-optimise-store)
TODO_NixOS # ignoring the client-specified setting 'auto-optimise-store', because it is a restricted setting and you are not a trusted user
# TODO: only continue when trusted user or root
inode1="$(stat --format=%i $outPath1/foo)" inode1="$(stat --format=%i $outPath1/foo)"
inode2="$(stat --format=%i $outPath2/foo)" inode2="$(stat --format=%i $outPath2/foo)"
if [ "$inode1" != "$inode2" ]; then if [ "$inode1" != "$inode2" ]; then

View File

@ -3,6 +3,7 @@
source common.sh source common.sh
testNormalization () { testNormalization () {
TODO_NixOS
clearStore clearStore
outPath=$(nix-build ./simple.nix --no-out-link) outPath=$(nix-build ./simple.nix --no-out-link)
test "$(stat -c %Y $outPath)" -eq 1 test "$(stat -c %Y $outPath)" -eq 1

View File

@ -4,6 +4,8 @@ source common.sh
# First, test that -jN performs builds in parallel. # First, test that -jN performs builds in parallel.
echo "testing nix-build -j..." echo "testing nix-build -j..."
TODO_NixOS
clearStore clearStore
rm -f $_NIX_TEST_SHARED.cur $_NIX_TEST_SHARED.max rm -f $_NIX_TEST_SHARED.cur $_NIX_TEST_SHARED.max

View File

@ -2,7 +2,7 @@
source common.sh source common.sh
clearStore clearStoreIfPossible
outPath=$(nix-build --no-out-link -E " outPath=$(nix-build --no-out-link -E "
with import ./config.nix; with import ./config.nix;

View File

@ -2,7 +2,7 @@
source common.sh source common.sh
clearStore clearStoreIfPossible
nix-build --no-out-link -E ' nix-build --no-out-link -E '
with import ./config.nix; with import ./config.nix;

View File

@ -2,12 +2,14 @@
source common.sh source common.sh
TODO_NixOS
clearStore clearStore
rm -f $TEST_ROOT/result rm -f $TEST_ROOT/result
export REMOTE_STORE=file:$TEST_ROOT/remote_store export REMOTE_STORE=file:$TEST_ROOT/remote_store
echo 'require-sigs = false' >> $NIX_CONF_DIR/nix.conf echo 'require-sigs = false' >> $test_nix_conf
restartDaemon restartDaemon

View File

@ -2,7 +2,7 @@
source common.sh source common.sh
clearStore clearStoreIfPossible
nix eval --expr 'assert 1 + 2 == 3; true' nix eval --expr 'assert 1 + 2 == 3; true'

View File

@ -6,6 +6,8 @@ enableFeatures "read-only-local-store"
needLocalStore "cannot open store read-only when daemon has already opened it writeable" needLocalStore "cannot open store read-only when daemon has already opened it writeable"
TODO_NixOS
clearStore clearStore
happy () { happy () {

View File

@ -2,6 +2,8 @@
source common.sh source common.sh
TODO_NixOS # NixOS doesn't provide $NIX_STATE_DIR (and shouldn't)
clearStore clearStore
outPath=$(nix-build --no-out-link readfile-context.nix) outPath=$(nix-build --no-out-link readfile-context.nix)

View File

@ -2,6 +2,8 @@
source common.sh source common.sh
TODO_NixOS # can't enable a sandbox feature easily
enableFeatures 'recursive-nix' enableFeatures 'recursive-nix'
restartDaemon restartDaemon

View File

@ -4,6 +4,8 @@ source common.sh
needLocalStore "uses some low-level store manipulations that arent available through the daemon" needLocalStore "uses some low-level store manipulations that arent available through the daemon"
TODO_NixOS
clearStore clearStore
max=500 max=500

View File

@ -2,6 +2,8 @@
source common.sh source common.sh
TODO_NixOS
clearStore clearStore
# Ensure "fake ssh" remote store works just as legacy fake ssh would. # Ensure "fake ssh" remote store works just as legacy fake ssh would.

View File

@ -4,6 +4,8 @@ source common.sh
needLocalStore "--repair needs a local store" needLocalStore "--repair needs a local store"
TODO_NixOS
clearStore clearStore
path=$(nix-build dependencies.nix -o $TEST_ROOT/result) path=$(nix-build dependencies.nix -o $TEST_ROOT/result)

View File

@ -22,6 +22,8 @@ replUndefinedVariable="
import $testDir/undefined-variable.nix import $testDir/undefined-variable.nix
" "
TODO_NixOS
testRepl () { testRepl () {
local nixArgs local nixArgs
nixArgs=("$@") nixArgs=("$@")

View File

@ -2,7 +2,7 @@
source common.sh source common.sh
clearStore clearStoreIfPossible
nix-instantiate --restrict-eval --eval -E '1 + 2' nix-instantiate --restrict-eval --eval -E '1 + 2'
(! nix-instantiate --eval --restrict-eval ./restricted.nix) (! nix-instantiate --eval --restrict-eval ./restricted.nix)

View File

@ -2,7 +2,7 @@
source common.sh source common.sh
clearStore clearStoreIfPossible
clearCache clearCache
(( $(nix search -f search.nix '' hello | wc -l) > 0 )) (( $(nix search -f search.nix '' hello | wc -l) > 0 ))

View File

@ -6,6 +6,8 @@
source common.sh source common.sh
TODO_NixOS
clearStore clearStore
startDaemon startDaemon

View File

@ -4,7 +4,7 @@ source common.sh
requireDaemonNewerThan "2.6.0pre20211215" requireDaemonNewerThan "2.6.0pre20211215"
clearStore clearStoreIfPossible
nix-build --no-out-link -E ' nix-build --no-out-link -E '
with import ./config.nix; with import ./config.nix;

View File

@ -2,6 +2,8 @@
source common.sh source common.sh
TODO_NixOS
clearStore clearStore
clearCache clearCache

View File

@ -2,7 +2,7 @@
source common.sh source common.sh
clearStore clearStoreIfPossible
clearCache clearCache
nix-store --generate-binary-cache-key cache1.example.org $TEST_ROOT/sk1 $TEST_ROOT/pk1 nix-store --generate-binary-cache-key cache1.example.org $TEST_ROOT/sk1 $TEST_ROOT/pk1
@ -16,6 +16,7 @@ outPath=$(nix-build dependencies.nix --no-out-link --secret-key-files "$TEST_ROO
# Verify that the path got signed. # Verify that the path got signed.
info=$(nix path-info --json $outPath) info=$(nix path-info --json $outPath)
echo $info | jq -e '.[] | .ultimate == true' echo $info | jq -e '.[] | .ultimate == true'
TODO_NixOS # looks like an actual bug? Following line fails on NixOS:
echo $info | jq -e '.[] | .signatures.[] | select(startswith("cache1.example.org"))' echo $info | jq -e '.[] | .signatures.[] | select(startswith("cache1.example.org"))'
echo $info | jq -e '.[] | .signatures.[] | select(startswith("cache2.example.org"))' echo $info | jq -e '.[] | .signatures.[] | select(startswith("cache2.example.org"))'

View File

@ -17,6 +17,8 @@ echo "output path is $outPath"
text=$(cat "$outPath/hello") text=$(cat "$outPath/hello")
if test "$text" != "Hello World!"; then exit 1; fi if test "$text" != "Hello World!"; then exit 1; fi
TODO_NixOS
# Directed delete: $outPath is not reachable from a root, so it should # Directed delete: $outPath is not reachable from a root, so it should
# be deleteable. # be deleteable.
nix-store --delete $outPath nix-store --delete $outPath

View File

@ -16,4 +16,6 @@ fi
expect 127 NIX_REMOTE=unix:$PWD/store nix store info || \ expect 127 NIX_REMOTE=unix:$PWD/store nix store info || \
fail "nix store info on a non-existent store should fail" fail "nix store info on a non-existent store should fail"
TODO_NixOS
[[ "$(echo "$STORE_INFO_JSON" | jq -r ".url")" == "${NIX_REMOTE:-local}" ]] [[ "$(echo "$STORE_INFO_JSON" | jq -r ".url")" == "${NIX_REMOTE:-local}" ]]

View File

@ -6,7 +6,7 @@ source common.sh
# tests for the older versions # tests for the older versions
requireDaemonNewerThan "2.4pre20210712" requireDaemonNewerThan "2.4pre20210712"
clearStore clearStoreIfPossible
rm -f $TEST_ROOT/result rm -f $TEST_ROOT/result
@ -21,6 +21,8 @@ env NIX_PATH=nixpkgs=shell.nix nix-shell structured-attrs-shell.nix \
nix develop -f structured-attrs-shell.nix -c bash -c 'test "3" = "$(jq ".my.list|length" < $NIX_ATTRS_JSON_FILE)"' nix develop -f structured-attrs-shell.nix -c bash -c 'test "3" = "$(jq ".my.list|length" < $NIX_ATTRS_JSON_FILE)"'
TODO_NixOS # following line fails.
# `nix develop` is a slightly special way of dealing with environment vars, it parses # `nix develop` is a slightly special way of dealing with environment vars, it parses
# these from a shell-file exported from a derivation. This is to test especially `outputs` # these from a shell-file exported from a derivation. This is to test especially `outputs`
# (which is an associative array in thsi case) being fine. # (which is an associative array in thsi case) being fine.

View File

@ -2,7 +2,7 @@
source common.sh source common.sh
clearStore clearStoreIfPossible
cd "$TEST_HOME" cd "$TEST_HOME"

View File

@ -7,6 +7,8 @@ requireSandboxSupport
if ! command -p -v unshare; then skipTest "Need unshare"; fi if ! command -p -v unshare; then skipTest "Need unshare"; fi
needLocalStore "The test uses --store always so we would just be bypassing the daemon" needLocalStore "The test uses --store always so we would just be bypassing the daemon"
TODO_NixOS
unshare --mount --map-root-user bash <<EOF unshare --mount --map-root-user bash <<EOF
source common.sh source common.sh

View File

@ -2,7 +2,7 @@
source common.sh source common.sh
clearStore clearStoreIfPossible
rm -rf $TEST_HOME rm -rf $TEST_HOME

Some files were not shown because too many files have changed in this diff Show More