aboutsummaryrefslogtreecommitdiff
path: root/nixpkgs/nixos/tests/nfs.nix
diff options
context:
space:
mode:
Diffstat (limited to 'nixpkgs/nixos/tests/nfs.nix')
-rw-r--r--nixpkgs/nixos/tests/nfs.nix90
1 files changed, 0 insertions, 90 deletions
diff --git a/nixpkgs/nixos/tests/nfs.nix b/nixpkgs/nixos/tests/nfs.nix
deleted file mode 100644
index 2f655336e75..00000000000
--- a/nixpkgs/nixos/tests/nfs.nix
+++ /dev/null
@@ -1,90 +0,0 @@
-import ./make-test.nix ({ pkgs, version ? 4, ... }:
-
-let
-
- client =
- { pkgs, ... }:
- { fileSystems = pkgs.lib.mkVMOverride
- [ { mountPoint = "/data";
- # nfs4 exports the export with fsid=0 as a virtual root directory
- device = if (version == 4) then "server:/" else "server:/data";
- fsType = "nfs";
- options = [ "vers=${toString version}" ];
- }
- ];
- networking.firewall.enable = false; # FIXME: only open statd
- };
-
-in
-
-{
- name = "nfs";
- meta = with pkgs.stdenv.lib.maintainers; {
- maintainers = [ eelco ];
- };
-
- nodes =
- { client1 = client;
- client2 = client;
-
- server =
- { ... }:
- { services.nfs.server.enable = true;
- services.nfs.server.exports =
- ''
- /data 192.168.1.0/255.255.255.0(rw,no_root_squash,no_subtree_check,fsid=0)
- '';
- services.nfs.server.createMountPoints = true;
- networking.firewall.enable = false; # FIXME: figure out what ports need to be allowed
- };
- };
-
- testScript =
- ''
- $server->waitForUnit("nfs-server");
- $server->succeed("systemctl start network-online.target");
- $server->waitForUnit("network-online.target");
-
- startAll;
-
- $client1->waitForUnit("data.mount");
- $client1->succeed("echo bla > /data/foo");
- $server->succeed("test -e /data/foo");
-
- $client2->waitForUnit("data.mount");
- $client2->succeed("echo bla > /data/bar");
- $server->succeed("test -e /data/bar");
-
- # Test whether restarting ‘nfs-server’ works correctly.
- $server->succeed("systemctl restart nfs-server");
- $client2->succeed("echo bla >> /data/bar"); # will take 90 seconds due to the NFS grace period
-
- # Test whether we can get a lock.
- $client2->succeed("time flock -n -s /data/lock true");
-
- # Test locking: client 1 acquires an exclusive lock, so client 2
- # should then fail to acquire a shared lock.
- $client1->succeed("flock -x /data/lock -c 'touch locked; sleep 100000' &");
- $client1->waitForFile("locked");
- $client2->fail("flock -n -s /data/lock true");
-
- # Test whether client 2 obtains the lock if we reset client 1.
- $client2->succeed("flock -x /data/lock -c 'echo acquired; touch locked; sleep 100000' >&2 &");
- $client1->crash;
- $client1->start;
- $client2->waitForFile("locked");
-
- # Test whether locks survive a reboot of the server.
- $client1->waitForUnit("data.mount");
- $server->shutdown;
- $server->start;
- $client1->succeed("touch /data/xyzzy");
- $client1->fail("time flock -n -s /data/lock true");
-
- # Test whether unmounting during shutdown happens quickly.
- my $t1 = time;
- $client1->shutdown;
- my $duration = time - $t1;
- die "shutdown took too long ($duration seconds)" if $duration > 30;
- '';
-})