summaryrefslogtreecommitdiffstats
path: root/nixos/tests/containers-tmpfs.nix
diff options
context:
space:
mode:
authorChristian Kampka <kampka@users.noreply.github.com>2016-11-22 02:11:33 +0100
committerFranz Pletz <fpletz@fnordicwalking.de>2016-11-22 02:11:33 +0100
commit35ecef2c6d0afebf09ab6504a00b6af14ca24973 (patch)
tree9a1fe5615804344c3796408c08178ab7f3ce627f /nixos/tests/containers-tmpfs.nix
parent49d608ac0066198a88eede8dd314bc8bd75e5b08 (diff)
containers module: Add tmpfs options (#20557)
Allows one or more directories to be mounted as a read-only file system. This makes it convenient to run volatile containers that do not retain application state.
Diffstat (limited to 'nixos/tests/containers-tmpfs.nix')
-rw-r--r--nixos/tests/containers-tmpfs.nix79
1 files changed, 79 insertions, 0 deletions
diff --git a/nixos/tests/containers-tmpfs.nix b/nixos/tests/containers-tmpfs.nix
new file mode 100644
index 000000000000..564831fa2737
--- /dev/null
+++ b/nixos/tests/containers-tmpfs.nix
@@ -0,0 +1,79 @@
+# Test for NixOS' container support.
+
+import ./make-test.nix ({ pkgs, ...} : {
+ name = "containers-bridge";
+ meta = with pkgs.stdenv.lib.maintainers; {
+ maintainers = [ ckampka ];
+ };
+
+ machine =
+ { config, pkgs, ... }:
+ { imports = [ ../modules/installer/cd-dvd/channel.nix ];
+ virtualisation.writableStore = true;
+ virtualisation.memorySize = 768;
+
+ containers.tmpfs =
+ {
+ autoStart = true;
+ tmpfs = [
+ # Mount var as a tmpfs
+ "/var"
+
+ # Add a nested mount inside a tmpfs
+ "/var/log"
+
+ # Add a tmpfs on a path that does not exist
+ "/some/random/path"
+ ];
+ config = { };
+ };
+
+ virtualisation.pathsInNixDB = [ pkgs.stdenv ];
+ };
+
+ testScript =
+ ''
+ $machine->waitForUnit("default.target");
+ $machine->succeed("nixos-container list") =~ /tmpfs/ or die;
+
+ # Start the tmpfs container.
+ #$machine->succeed("nixos-container status tmpfs") =~ /up/ or die;
+
+ # Verify that /var is mounted as a tmpfs
+ #$machine->succeed("nixos-container run tmpfs -- systemctl status var.mount --no-pager 2>/dev/null") =~ /What: tmpfs/ or die;
+ $machine->succeed("nixos-container run tmpfs -- mountpoint -q /var 2>/dev/null");
+
+ # Verify that /var/log is mounted as a tmpfs
+ $machine->succeed("nixos-container run tmpfs -- systemctl status var-log.mount --no-pager 2>/dev/null") =~ /What: tmpfs/ or die;
+ $machine->succeed("nixos-container run tmpfs -- mountpoint -q /var/log 2>/dev/null");
+
+ # Verify that /some/random/path is mounted as a tmpfs
+ $machine->succeed("nixos-container run tmpfs -- systemctl status some-random-path.mount --no-pager 2>/dev/null") =~ /What: tmpfs/ or die;
+ $machine->succeed("nixos-container run tmpfs -- mountpoint -q /some/random/path 2>/dev/null");
+
+ # Verify that files created in the container in a non-tmpfs directory are visible on the host.
+ # This establishes legitimacy for the following tests
+ $machine->succeed("nixos-container run tmpfs -- touch /root/test.file 2>/dev/null");
+ $machine->succeed("nixos-container run tmpfs -- ls -l /root | grep -q test.file 2>/dev/null");
+ $machine->succeed("test -e /var/lib/containers/tmpfs/root/test.file");
+
+
+ # Verify that /some/random/path is writable and that files created there
+ # are not in the hosts container dir but in the tmpfs
+ $machine->succeed("nixos-container run tmpfs -- touch /some/random/path/test.file 2>/dev/null");
+ $machine->succeed("nixos-container run tmpfs -- test -e /some/random/path/test.file 2>/dev/null");
+
+ $machine->fail("test -e /var/lib/containers/tmpfs/some/random/path/test.file");
+
+ # Verify that files created in the hosts container dir in a path where a tmpfs file system has been mounted
+ # are not visible to the container as the do not exist in the tmpfs
+ $machine->succeed("touch /var/lib/containers/tmpfs/var/test.file");
+
+ $machine->succeed("test -e /var/lib/containers/tmpfs/var/test.file");
+ $machine->succeed("ls -l /var/lib/containers/tmpfs/var/ | grep -q test.file 2>/dev/null");
+
+ $machine->fail("nixos-container run tmpfs -- ls -l /var | grep -q test.file 2>/dev/null");
+
+ '';
+
+})