aboutsummaryrefslogtreecommitdiff
path: root/nixpkgs/nixos/tests/openstack-image.nix
diff options
context:
space:
mode:
Diffstat (limited to 'nixpkgs/nixos/tests/openstack-image.nix')
-rw-r--r--nixpkgs/nixos/tests/openstack-image.nix70
1 files changed, 37 insertions, 33 deletions
diff --git a/nixpkgs/nixos/tests/openstack-image.nix b/nixpkgs/nixos/tests/openstack-image.nix
index 97c9137fe1d..0b57dfb8e7e 100644
--- a/nixpkgs/nixos/tests/openstack-image.nix
+++ b/nixpkgs/nixos/tests/openstack-image.nix
@@ -3,30 +3,30 @@
pkgs ? import ../.. { inherit system config; }
}:
-with import ../lib/testing.nix { inherit system pkgs; };
+with import ../lib/testing-python.nix { inherit system pkgs; };
with pkgs.lib;
with import common/ec2.nix { inherit makeTest pkgs; };
let
- image =
- (import ../lib/eval-config.nix {
- inherit system;
- modules = [
- ../maintainers/scripts/openstack/openstack-image.nix
- ../modules/testing/test-instrumentation.nix
- ../modules/profiles/qemu-guest.nix
- {
- # Needed by nixos-rebuild due to lack of network access.
- system.extraDependencies = with pkgs; [
- stdenv
- ];
- }
- ];
- }).config.system.build.openstackImage + "/nixos.qcow2";
+ image = (import ../lib/eval-config.nix {
+ inherit system;
+ modules = [
+ ../maintainers/scripts/openstack/openstack-image.nix
+ ../modules/testing/test-instrumentation.nix
+ ../modules/profiles/qemu-guest.nix
+ {
+ # Needed by nixos-rebuild due to lack of network access.
+ system.extraDependencies = with pkgs; [
+ stdenv
+ ];
+ }
+ ];
+ }).config.system.build.openstackImage + "/nixos.qcow2";
sshKeys = import ./ssh-keys.nix pkgs;
snakeOilPrivateKey = sshKeys.snakeOilPrivateKey.text;
+ snakeOilPrivateKeyFile = pkgs.writeText "private-key" snakeOilPrivateKey;
snakeOilPublicKey = sshKeys.snakeOilPublicKey;
in {
@@ -39,32 +39,36 @@ in {
SSH_HOST_ED25519_KEY:${replaceStrings ["\n"] ["|"] snakeOilPrivateKey}
'';
script = ''
- $machine->start;
- $machine->waitForFile("/etc/ec2-metadata/user-data");
- $machine->waitForUnit("sshd.service");
+ machine.start()
+ machine.wait_for_file("/etc/ec2-metadata/user-data")
+ machine.wait_for_unit("sshd.service")
- $machine->succeed("grep unknown /etc/ec2-metadata/ami-manifest-path");
+ machine.succeed("grep unknown /etc/ec2-metadata/ami-manifest-path")
# We have no keys configured on the client side yet, so this should fail
- $machine->fail("ssh -o BatchMode=yes localhost exit");
+ machine.fail("ssh -o BatchMode=yes localhost exit")
# Let's install our client private key
- $machine->succeed("mkdir -p ~/.ssh");
+ machine.succeed("mkdir -p ~/.ssh")
- $machine->succeed("echo '${snakeOilPrivateKey}' > ~/.ssh/id_ed25519");
- $machine->succeed("chmod 600 ~/.ssh/id_ed25519");
+ machine.copy_from_host_via_shell(
+ "${snakeOilPrivateKeyFile}", "~/.ssh/id_ed25519"
+ )
+ machine.succeed("chmod 600 ~/.ssh/id_ed25519")
# We haven't configured the host key yet, so this should still fail
- $machine->fail("ssh -o BatchMode=yes localhost exit");
+ machine.fail("ssh -o BatchMode=yes localhost exit")
# Add the host key; ssh should finally succeed
- $machine->succeed("echo localhost,127.0.0.1 ${snakeOilPublicKey} > ~/.ssh/known_hosts");
- $machine->succeed("ssh -o BatchMode=yes localhost exit");
+ machine.succeed(
+ "echo localhost,127.0.0.1 ${snakeOilPublicKey} > ~/.ssh/known_hosts"
+ )
+ machine.succeed("ssh -o BatchMode=yes localhost exit")
# Just to make sure resizing is idempotent.
- $machine->shutdown;
- $machine->start;
- $machine->waitForFile("/etc/ec2-metadata/user-data");
+ machine.shutdown()
+ machine.start()
+ machine.wait_for_file("/etc/ec2-metadata/user-data")
'';
};
@@ -86,9 +90,9 @@ in {
}
'';
script = ''
- $machine->start;
- $machine->waitForFile("/etc/testFile");
- $machine->succeed("cat /etc/testFile | grep -q 'whoa'");
+ machine.start()
+ machine.wait_for_file("/etc/testFile")
+ assert "whoa" in machine.succeed("cat /etc/testFile")
'';
};
}