2009-08-31 14:56:19 +00:00
|
|
|
{ nixos ? ./..
|
* Stuff for automatic and manual testing of NixOS VMs.
lib/build-vms.nix contains a function `buildVirtualNetwork' that
takes a specification of a network of machines (as an attribute set
of NixOS machine configurations) and builds a script that starts
each configuration in a separate QEMU/KVM VM and connects them
together in a virtual network. This script can be run manually to
test the VMs interactively. There is also a function `runTests'
that starts and runs the virtual network in a derivation, and
then executes a test specification that tells the VMs to do certain
things (i.e., letting one VM send an HTTP request to a webserver on
another VM). The tests are written in Perl (for now).
tests/subversion.nix shows a simple example, namely a network of two
machines: a webserver that runs the Subversion subservice, and a
client. Apache, Subversion and a few other packages are built with
coverage analysis instrumentation. For instance,
$ nix-build tests/subversion.nix -A vms
$ ./result/bin/run-vms
starts two QEMU/KVM instances. When they have finished booting, the
webserver can be accessed from the host through
http://localhost:8081/.
It also has a small test suite:
$ nix-build tests/subversion.nix -A report
This runs the VMs in a derivation, runs the tests, and then produces
a distributed code coverage analysis report (i.e. it shows the
combined coverage on both machines).
The Perl test driver program is in lib/test-driver. It executes
commands on the guest machines by connecting to a root shell running
on port 514 (provided by modules/testing/test-instrumentation.nix).
The VMs are connected together in a virtual network using QEMU's
multicast feature. This isn't very secure. At the very least,
other processes on the same machine can listen to or send packets on
the virtual network. On the plus side, we don't need to be root to
set up a multicast virtual network, so we can do it from a
derivation. Maybe we can use VDE instead.
(Moved from the vario repository.)
svn path=/nixos/trunk/; revision=16899
2009-08-31 14:25:12 +00:00
|
|
|
, nixpkgs ? /etc/nixos/nixpkgs
|
2009-08-31 14:56:19 +00:00
|
|
|
, services ? /etc/nixos/services
|
2009-09-02 08:36:30 +00:00
|
|
|
, system ? builtins.currentSystem
|
* Stuff for automatic and manual testing of NixOS VMs.
lib/build-vms.nix contains a function `buildVirtualNetwork' that
takes a specification of a network of machines (as an attribute set
of NixOS machine configurations) and builds a script that starts
each configuration in a separate QEMU/KVM VM and connects them
together in a virtual network. This script can be run manually to
test the VMs interactively. There is also a function `runTests'
that starts and runs the virtual network in a derivation, and
then executes a test specification that tells the VMs to do certain
things (i.e., letting one VM send an HTTP request to a webserver on
another VM). The tests are written in Perl (for now).
tests/subversion.nix shows a simple example, namely a network of two
machines: a webserver that runs the Subversion subservice, and a
client. Apache, Subversion and a few other packages are built with
coverage analysis instrumentation. For instance,
$ nix-build tests/subversion.nix -A vms
$ ./result/bin/run-vms
starts two QEMU/KVM instances. When they have finished booting, the
webserver can be accessed from the host through
http://localhost:8081/.
It also has a small test suite:
$ nix-build tests/subversion.nix -A report
This runs the VMs in a derivation, runs the tests, and then produces
a distributed code coverage analysis report (i.e. it shows the
combined coverage on both machines).
The Perl test driver program is in lib/test-driver. It executes
commands on the guest machines by connecting to a root shell running
on port 514 (provided by modules/testing/test-instrumentation.nix).
The VMs are connected together in a virtual network using QEMU's
multicast feature. This isn't very secure. At the very least,
other processes on the same machine can listen to or send packets on
the virtual network. On the plus side, we don't need to be root to
set up a multicast virtual network, so we can do it from a
derivation. Maybe we can use VDE instead.
(Moved from the vario repository.)
svn path=/nixos/trunk/; revision=16899
2009-08-31 14:25:12 +00:00
|
|
|
}:
|
|
|
|
|
2009-09-02 23:37:58 +00:00
|
|
|
let pkgs = import nixpkgs { config = {}; inherit system; }; in
|
* Stuff for automatic and manual testing of NixOS VMs.
lib/build-vms.nix contains a function `buildVirtualNetwork' that
takes a specification of a network of machines (as an attribute set
of NixOS machine configurations) and builds a script that starts
each configuration in a separate QEMU/KVM VM and connects them
together in a virtual network. This script can be run manually to
test the VMs interactively. There is also a function `runTests'
that starts and runs the virtual network in a derivation, and
then executes a test specification that tells the VMs to do certain
things (i.e., letting one VM send an HTTP request to a webserver on
another VM). The tests are written in Perl (for now).
tests/subversion.nix shows a simple example, namely a network of two
machines: a webserver that runs the Subversion subservice, and a
client. Apache, Subversion and a few other packages are built with
coverage analysis instrumentation. For instance,
$ nix-build tests/subversion.nix -A vms
$ ./result/bin/run-vms
starts two QEMU/KVM instances. When they have finished booting, the
webserver can be accessed from the host through
http://localhost:8081/.
It also has a small test suite:
$ nix-build tests/subversion.nix -A report
This runs the VMs in a derivation, runs the tests, and then produces
a distributed code coverage analysis report (i.e. it shows the
combined coverage on both machines).
The Perl test driver program is in lib/test-driver. It executes
commands on the guest machines by connecting to a root shell running
on port 514 (provided by modules/testing/test-instrumentation.nix).
The VMs are connected together in a virtual network using QEMU's
multicast feature. This isn't very secure. At the very least,
other processes on the same machine can listen to or send packets on
the virtual network. On the plus side, we don't need to be root to
set up a multicast virtual network, so we can do it from a
derivation. Maybe we can use VDE instead.
(Moved from the vario repository.)
svn path=/nixos/trunk/; revision=16899
2009-08-31 14:25:12 +00:00
|
|
|
|
|
|
|
with pkgs;
|
|
|
|
|
|
|
|
rec {
|
|
|
|
|
|
|
|
inherit pkgs;
|
|
|
|
|
|
|
|
|
|
|
|
# Build a virtual network from an attribute set `{ machine1 =
|
|
|
|
# config1; ... machineN = configN; }', where `machineX' is the
|
|
|
|
# hostname and `configX' is a NixOS system configuration. The
|
|
|
|
# result is a script that starts a QEMU instance for each virtual
|
|
|
|
# machine. Each machine is given an arbitrary IP address in the
|
|
|
|
# virtual network.
|
|
|
|
buildVirtualNetwork =
|
|
|
|
{ nodes }:
|
|
|
|
|
|
|
|
let nodes_ = lib.mapAttrs (n: buildVM nodes_) (assignIPAddresses nodes); in
|
|
|
|
|
|
|
|
stdenv.mkDerivation {
|
|
|
|
name = "vms";
|
|
|
|
buildCommand =
|
|
|
|
''
|
|
|
|
ensureDir $out/vms
|
|
|
|
${
|
|
|
|
lib.concatMapStrings (vm:
|
|
|
|
''
|
|
|
|
ln -sn ${vm.config.system.build.vm} $out/vms/${vm.config.networking.hostName}
|
|
|
|
''
|
|
|
|
) (lib.attrValues nodes_)
|
|
|
|
}
|
|
|
|
|
|
|
|
ensureDir $out/bin
|
|
|
|
cat > $out/bin/run-vms <<EOF
|
|
|
|
#! ${stdenv.shell}
|
|
|
|
port=8080
|
|
|
|
for i in $out/vms/*; do
|
|
|
|
port2=\$((port++))
|
|
|
|
echo "forwarding localhost:\$port2 to \$(basename \$i):80"
|
|
|
|
QEMU_OPTS="-redir tcp:\$port2::80 -net nic,vlan=1 -net socket,vlan=1,mcast=232.0.1.1:1234" \$i/bin/run-*-vm &
|
|
|
|
done
|
|
|
|
EOF
|
|
|
|
chmod +x $out/bin/run-vms
|
|
|
|
''; # */
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
buildVM =
|
|
|
|
nodes: configuration:
|
|
|
|
|
|
|
|
import "${nixos}/lib/eval-config.nix" {
|
2009-09-02 08:36:30 +00:00
|
|
|
inherit nixpkgs services system;
|
* Stuff for automatic and manual testing of NixOS VMs.
lib/build-vms.nix contains a function `buildVirtualNetwork' that
takes a specification of a network of machines (as an attribute set
of NixOS machine configurations) and builds a script that starts
each configuration in a separate QEMU/KVM VM and connects them
together in a virtual network. This script can be run manually to
test the VMs interactively. There is also a function `runTests'
that starts and runs the virtual network in a derivation, and
then executes a test specification that tells the VMs to do certain
things (i.e., letting one VM send an HTTP request to a webserver on
another VM). The tests are written in Perl (for now).
tests/subversion.nix shows a simple example, namely a network of two
machines: a webserver that runs the Subversion subservice, and a
client. Apache, Subversion and a few other packages are built with
coverage analysis instrumentation. For instance,
$ nix-build tests/subversion.nix -A vms
$ ./result/bin/run-vms
starts two QEMU/KVM instances. When they have finished booting, the
webserver can be accessed from the host through
http://localhost:8081/.
It also has a small test suite:
$ nix-build tests/subversion.nix -A report
This runs the VMs in a derivation, runs the tests, and then produces
a distributed code coverage analysis report (i.e. it shows the
combined coverage on both machines).
The Perl test driver program is in lib/test-driver. It executes
commands on the guest machines by connecting to a root shell running
on port 514 (provided by modules/testing/test-instrumentation.nix).
The VMs are connected together in a virtual network using QEMU's
multicast feature. This isn't very secure. At the very least,
other processes on the same machine can listen to or send packets on
the virtual network. On the plus side, we don't need to be root to
set up a multicast virtual network, so we can do it from a
derivation. Maybe we can use VDE instead.
(Moved from the vario repository.)
svn path=/nixos/trunk/; revision=16899
2009-08-31 14:25:12 +00:00
|
|
|
modules = [ configuration ];
|
|
|
|
extraArgs = { inherit nodes; };
|
|
|
|
/* !!! bug in the module/option handling: this ignores the
|
|
|
|
config from assignIPAddresses. Too much magic.
|
|
|
|
configuration = {
|
|
|
|
imports = [configuration "${nixos}/modules/virtualisation/qemu-vm.nix"];
|
|
|
|
config = {
|
|
|
|
# We don't need the manual in a test VM, and leaving it out
|
|
|
|
# speeds up evaluation quite a bit.
|
|
|
|
services.nixosManual.enable = false;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
*/
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
# Given an attribute set { machine1 = config1; ... machineN =
|
|
|
|
# configN; }, sequentially assign IP addresses in the 192.168.1.0/24
|
|
|
|
# range to each machine, and set the hostname to the attribute name.
|
|
|
|
assignIPAddresses = nodes:
|
|
|
|
|
|
|
|
let
|
|
|
|
|
|
|
|
machines = lib.attrNames nodes;
|
|
|
|
|
|
|
|
machinesWithIP = zip machines
|
|
|
|
(map (n: "192.168.1.${toString n}") (lib.range 1 254));
|
|
|
|
|
|
|
|
# Generate a /etc/hosts file.
|
|
|
|
hosts = lib.concatMapStrings (m: "${m.second} ${m.first}\n") machinesWithIP;
|
|
|
|
|
|
|
|
nodes_ = map (m: lib.nameValuePair m.first
|
|
|
|
{ imports = [
|
|
|
|
(lib.getAttr m.first nodes)
|
|
|
|
"${nixos}/modules/virtualisation/qemu-vm.nix" # !!!
|
|
|
|
"${nixos}/modules/testing/test-instrumentation.nix" # !!! should only get added for automated test runs
|
|
|
|
];
|
|
|
|
config =
|
|
|
|
{ networking.hostName = m.first;
|
|
|
|
networking.interfaces =
|
|
|
|
[ { name = "eth1";
|
|
|
|
ipAddress = m.second;
|
|
|
|
}
|
|
|
|
];
|
|
|
|
networking.extraHosts = hosts;
|
|
|
|
services.nixosManual.enable = false; # !!!
|
|
|
|
};
|
|
|
|
}
|
|
|
|
) machinesWithIP;
|
|
|
|
|
|
|
|
in lib.listToAttrs nodes_;
|
|
|
|
|
|
|
|
|
|
|
|
# Zip two lists together. Should be moved to pkgs.lib.
|
|
|
|
zip = xs: ys:
|
|
|
|
if xs != [] && ys != [] then
|
|
|
|
[ {first = lib.head xs; second = lib.head ys;} ]
|
|
|
|
++ zip (lib.tail xs) (lib.tail ys)
|
|
|
|
else [];
|
|
|
|
|
|
|
|
|
|
|
|
# Run an automated test suite in the given virtual network.
|
|
|
|
# `network' must be the result of a call to the
|
|
|
|
# `buildVirtualNetwork' function. `tests' is a Perl fragment
|
|
|
|
# describing the tests.
|
|
|
|
runTests = network: tests:
|
|
|
|
stdenv.mkDerivation {
|
|
|
|
name = "vm-test-run";
|
|
|
|
inherit tests;
|
|
|
|
buildCommand =
|
|
|
|
''
|
|
|
|
mkdir $out
|
|
|
|
cp ${./test-driver/Machine.pm} Machine.pm
|
2009-09-02 19:59:26 +00:00
|
|
|
|
* Stuff for automatic and manual testing of NixOS VMs.
lib/build-vms.nix contains a function `buildVirtualNetwork' that
takes a specification of a network of machines (as an attribute set
of NixOS machine configurations) and builds a script that starts
each configuration in a separate QEMU/KVM VM and connects them
together in a virtual network. This script can be run manually to
test the VMs interactively. There is also a function `runTests'
that starts and runs the virtual network in a derivation, and
then executes a test specification that tells the VMs to do certain
things (i.e., letting one VM send an HTTP request to a webserver on
another VM). The tests are written in Perl (for now).
tests/subversion.nix shows a simple example, namely a network of two
machines: a webserver that runs the Subversion subservice, and a
client. Apache, Subversion and a few other packages are built with
coverage analysis instrumentation. For instance,
$ nix-build tests/subversion.nix -A vms
$ ./result/bin/run-vms
starts two QEMU/KVM instances. When they have finished booting, the
webserver can be accessed from the host through
http://localhost:8081/.
It also has a small test suite:
$ nix-build tests/subversion.nix -A report
This runs the VMs in a derivation, runs the tests, and then produces
a distributed code coverage analysis report (i.e. it shows the
combined coverage on both machines).
The Perl test driver program is in lib/test-driver. It executes
commands on the guest machines by connecting to a root shell running
on port 514 (provided by modules/testing/test-instrumentation.nix).
The VMs are connected together in a virtual network using QEMU's
multicast feature. This isn't very secure. At the very least,
other processes on the same machine can listen to or send packets on
the virtual network. On the plus side, we don't need to be root to
set up a multicast virtual network, so we can do it from a
derivation. Maybe we can use VDE instead.
(Moved from the vario repository.)
svn path=/nixos/trunk/; revision=16899
2009-08-31 14:25:12 +00:00
|
|
|
${perl}/bin/perl ${./test-driver/test-driver.pl} ${network}/vms/*/bin/run-*-vm
|
2009-09-02 19:59:26 +00:00
|
|
|
|
* Stuff for automatic and manual testing of NixOS VMs.
lib/build-vms.nix contains a function `buildVirtualNetwork' that
takes a specification of a network of machines (as an attribute set
of NixOS machine configurations) and builds a script that starts
each configuration in a separate QEMU/KVM VM and connects them
together in a virtual network. This script can be run manually to
test the VMs interactively. There is also a function `runTests'
that starts and runs the virtual network in a derivation, and
then executes a test specification that tells the VMs to do certain
things (i.e., letting one VM send an HTTP request to a webserver on
another VM). The tests are written in Perl (for now).
tests/subversion.nix shows a simple example, namely a network of two
machines: a webserver that runs the Subversion subservice, and a
client. Apache, Subversion and a few other packages are built with
coverage analysis instrumentation. For instance,
$ nix-build tests/subversion.nix -A vms
$ ./result/bin/run-vms
starts two QEMU/KVM instances. When they have finished booting, the
webserver can be accessed from the host through
http://localhost:8081/.
It also has a small test suite:
$ nix-build tests/subversion.nix -A report
This runs the VMs in a derivation, runs the tests, and then produces
a distributed code coverage analysis report (i.e. it shows the
combined coverage on both machines).
The Perl test driver program is in lib/test-driver. It executes
commands on the guest machines by connecting to a root shell running
on port 514 (provided by modules/testing/test-instrumentation.nix).
The VMs are connected together in a virtual network using QEMU's
multicast feature. This isn't very secure. At the very least,
other processes on the same machine can listen to or send packets on
the virtual network. On the plus side, we don't need to be root to
set up a multicast virtual network, so we can do it from a
derivation. Maybe we can use VDE instead.
(Moved from the vario repository.)
svn path=/nixos/trunk/; revision=16899
2009-08-31 14:25:12 +00:00
|
|
|
for i in */coverage-data; do
|
|
|
|
ensureDir $out/coverage-data
|
|
|
|
mv $i $out/coverage-data/$(dirname $i)
|
|
|
|
done
|
2009-09-02 19:59:26 +00:00
|
|
|
|
2009-09-02 23:16:33 +00:00
|
|
|
for i in $out/*.png; do
|
2009-09-02 19:59:26 +00:00
|
|
|
ensureDir $out/nix-support
|
2009-09-02 23:16:33 +00:00
|
|
|
echo "report screenshot $i" >> $out/nix-support/hydra-build-products
|
2009-09-02 19:59:26 +00:00
|
|
|
done
|
* Stuff for automatic and manual testing of NixOS VMs.
lib/build-vms.nix contains a function `buildVirtualNetwork' that
takes a specification of a network of machines (as an attribute set
of NixOS machine configurations) and builds a script that starts
each configuration in a separate QEMU/KVM VM and connects them
together in a virtual network. This script can be run manually to
test the VMs interactively. There is also a function `runTests'
that starts and runs the virtual network in a derivation, and
then executes a test specification that tells the VMs to do certain
things (i.e., letting one VM send an HTTP request to a webserver on
another VM). The tests are written in Perl (for now).
tests/subversion.nix shows a simple example, namely a network of two
machines: a webserver that runs the Subversion subservice, and a
client. Apache, Subversion and a few other packages are built with
coverage analysis instrumentation. For instance,
$ nix-build tests/subversion.nix -A vms
$ ./result/bin/run-vms
starts two QEMU/KVM instances. When they have finished booting, the
webserver can be accessed from the host through
http://localhost:8081/.
It also has a small test suite:
$ nix-build tests/subversion.nix -A report
This runs the VMs in a derivation, runs the tests, and then produces
a distributed code coverage analysis report (i.e. it shows the
combined coverage on both machines).
The Perl test driver program is in lib/test-driver. It executes
commands on the guest machines by connecting to a root shell running
on port 514 (provided by modules/testing/test-instrumentation.nix).
The VMs are connected together in a virtual network using QEMU's
multicast feature. This isn't very secure. At the very least,
other processes on the same machine can listen to or send packets on
the virtual network. On the plus side, we don't need to be root to
set up a multicast virtual network, so we can do it from a
derivation. Maybe we can use VDE instead.
(Moved from the vario repository.)
svn path=/nixos/trunk/; revision=16899
2009-08-31 14:25:12 +00:00
|
|
|
''; # */
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
# Generate a coverage report from the coverage data produced by
|
|
|
|
# runTests.
|
|
|
|
makeReport = x: runCommand "report" { buildInputs = [rsync]; }
|
|
|
|
''
|
|
|
|
for d in ${x}/coverage-data/*; do
|
|
|
|
|
|
|
|
echo "doing $d"
|
|
|
|
|
|
|
|
ensureDir $TMPDIR/gcov/
|
|
|
|
|
|
|
|
for i in $(cd $d/nix/store && ls); do
|
|
|
|
if ! test -e $TMPDIR/gcov/nix/store/$i; then
|
|
|
|
echo "copying $i"
|
|
|
|
mkdir -p $TMPDIR/gcov/$(echo $i | cut -c34-)
|
2009-09-02 09:38:16 +00:00
|
|
|
rsync -rv /nix/store/$i/.build/* $TMPDIR/gcov/
|
* Stuff for automatic and manual testing of NixOS VMs.
lib/build-vms.nix contains a function `buildVirtualNetwork' that
takes a specification of a network of machines (as an attribute set
of NixOS machine configurations) and builds a script that starts
each configuration in a separate QEMU/KVM VM and connects them
together in a virtual network. This script can be run manually to
test the VMs interactively. There is also a function `runTests'
that starts and runs the virtual network in a derivation, and
then executes a test specification that tells the VMs to do certain
things (i.e., letting one VM send an HTTP request to a webserver on
another VM). The tests are written in Perl (for now).
tests/subversion.nix shows a simple example, namely a network of two
machines: a webserver that runs the Subversion subservice, and a
client. Apache, Subversion and a few other packages are built with
coverage analysis instrumentation. For instance,
$ nix-build tests/subversion.nix -A vms
$ ./result/bin/run-vms
starts two QEMU/KVM instances. When they have finished booting, the
webserver can be accessed from the host through
http://localhost:8081/.
It also has a small test suite:
$ nix-build tests/subversion.nix -A report
This runs the VMs in a derivation, runs the tests, and then produces
a distributed code coverage analysis report (i.e. it shows the
combined coverage on both machines).
The Perl test driver program is in lib/test-driver. It executes
commands on the guest machines by connecting to a root shell running
on port 514 (provided by modules/testing/test-instrumentation.nix).
The VMs are connected together in a virtual network using QEMU's
multicast feature. This isn't very secure. At the very least,
other processes on the same machine can listen to or send packets on
the virtual network. On the plus side, we don't need to be root to
set up a multicast virtual network, so we can do it from a
derivation. Maybe we can use VDE instead.
(Moved from the vario repository.)
svn path=/nixos/trunk/; revision=16899
2009-08-31 14:25:12 +00:00
|
|
|
fi
|
|
|
|
done
|
|
|
|
|
|
|
|
chmod -R u+w $TMPDIR/gcov
|
|
|
|
|
|
|
|
find $TMPDIR/gcov -name "*.gcda" -exec rm {} \;
|
|
|
|
|
|
|
|
for i in $(cd $d/nix/store && ls); do
|
2009-09-02 09:38:16 +00:00
|
|
|
rsync -rv $d/nix/store/$i/.build/* $TMPDIR/gcov/
|
* Stuff for automatic and manual testing of NixOS VMs.
lib/build-vms.nix contains a function `buildVirtualNetwork' that
takes a specification of a network of machines (as an attribute set
of NixOS machine configurations) and builds a script that starts
each configuration in a separate QEMU/KVM VM and connects them
together in a virtual network. This script can be run manually to
test the VMs interactively. There is also a function `runTests'
that starts and runs the virtual network in a derivation, and
then executes a test specification that tells the VMs to do certain
things (i.e., letting one VM send an HTTP request to a webserver on
another VM). The tests are written in Perl (for now).
tests/subversion.nix shows a simple example, namely a network of two
machines: a webserver that runs the Subversion subservice, and a
client. Apache, Subversion and a few other packages are built with
coverage analysis instrumentation. For instance,
$ nix-build tests/subversion.nix -A vms
$ ./result/bin/run-vms
starts two QEMU/KVM instances. When they have finished booting, the
webserver can be accessed from the host through
http://localhost:8081/.
It also has a small test suite:
$ nix-build tests/subversion.nix -A report
This runs the VMs in a derivation, runs the tests, and then produces
a distributed code coverage analysis report (i.e. it shows the
combined coverage on both machines).
The Perl test driver program is in lib/test-driver. It executes
commands on the guest machines by connecting to a root shell running
on port 514 (provided by modules/testing/test-instrumentation.nix).
The VMs are connected together in a virtual network using QEMU's
multicast feature. This isn't very secure. At the very least,
other processes on the same machine can listen to or send packets on
the virtual network. On the plus side, we don't need to be root to
set up a multicast virtual network, so we can do it from a
derivation. Maybe we can use VDE instead.
(Moved from the vario repository.)
svn path=/nixos/trunk/; revision=16899
2009-08-31 14:25:12 +00:00
|
|
|
done
|
|
|
|
|
|
|
|
find $TMPDIR/gcov -name "*.gcda" -exec chmod 644 {} \;
|
|
|
|
|
|
|
|
echo "producing info..."
|
|
|
|
${pkgs.lcov}/bin/geninfo --ignore-errors source,gcov $TMPDIR/gcov --output-file $TMPDIR/app.info
|
|
|
|
cat $TMPDIR/app.info >> $TMPDIR/full.info
|
|
|
|
done
|
|
|
|
|
|
|
|
echo "making report..."
|
|
|
|
ensureDir $out/coverage
|
2009-09-01 22:22:45 +00:00
|
|
|
${pkgs.lcov}/bin/genhtml --show-details $TMPDIR/full.info -o $out/coverage
|
2009-09-02 07:52:36 +00:00
|
|
|
cp $TMPDIR/full.info $out/coverage/
|
2009-08-31 14:56:19 +00:00
|
|
|
|
|
|
|
ensureDir $out/nix-support
|
|
|
|
echo "report coverage $out/coverage" >> $out/nix-support/hydra-build-products
|
* Stuff for automatic and manual testing of NixOS VMs.
lib/build-vms.nix contains a function `buildVirtualNetwork' that
takes a specification of a network of machines (as an attribute set
of NixOS machine configurations) and builds a script that starts
each configuration in a separate QEMU/KVM VM and connects them
together in a virtual network. This script can be run manually to
test the VMs interactively. There is also a function `runTests'
that starts and runs the virtual network in a derivation, and
then executes a test specification that tells the VMs to do certain
things (i.e., letting one VM send an HTTP request to a webserver on
another VM). The tests are written in Perl (for now).
tests/subversion.nix shows a simple example, namely a network of two
machines: a webserver that runs the Subversion subservice, and a
client. Apache, Subversion and a few other packages are built with
coverage analysis instrumentation. For instance,
$ nix-build tests/subversion.nix -A vms
$ ./result/bin/run-vms
starts two QEMU/KVM instances. When they have finished booting, the
webserver can be accessed from the host through
http://localhost:8081/.
It also has a small test suite:
$ nix-build tests/subversion.nix -A report
This runs the VMs in a derivation, runs the tests, and then produces
a distributed code coverage analysis report (i.e. it shows the
combined coverage on both machines).
The Perl test driver program is in lib/test-driver. It executes
commands on the guest machines by connecting to a root shell running
on port 514 (provided by modules/testing/test-instrumentation.nix).
The VMs are connected together in a virtual network using QEMU's
multicast feature. This isn't very secure. At the very least,
other processes on the same machine can listen to or send packets on
the virtual network. On the plus side, we don't need to be root to
set up a multicast virtual network, so we can do it from a
derivation. Maybe we can use VDE instead.
(Moved from the vario repository.)
svn path=/nixos/trunk/; revision=16899
2009-08-31 14:25:12 +00:00
|
|
|
''; # */
|
|
|
|
|
|
|
|
}
|