aboutsummaryrefslogtreecommitdiff
path: root/tests/guix-pack.sh
blob: 4042e54aeb5b7727c4fb45740a9526cd97c60c21 (about) (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
# GNU Guix --- Functional package management for GNU
# Copyright © 2018 Chris Marusich <cmmarusich@gmail.com>
# Copyright © 2018, 2019, 2020, 2022, 2023 Ludovic Courtès <ludo@gnu.org>
#
# This file is part of GNU Guix.
#
# GNU Guix is free software; you can redistribute it and/or modify it
# under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 3 of the License, or (at
# your option) any later version.
#
# GNU Guix is distributed in the hope that it will be useful, but
# WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with GNU Guix.  If not, see <http://www.gnu.org/licenses/>.

#
# Test the `guix pack' command-line utility.
#

# A network connection is required to build %bootstrap-coreutils&co,
# which is required to run these tests with the --bootstrap option.
if ! guile -c '(getaddrinfo "www.gnu.org" "80" AI_NUMERICSERV)' 2> /dev/null; then
    exit 77
fi

guix pack --version

# Use --no-substitutes because we need to verify we can do this ourselves.
GUIX_BUILD_OPTIONS="--no-substitutes"
export GUIX_BUILD_OPTIONS

test_directory="`mktemp -d`"
trap 'chmod -Rf +w "$test_directory"; rm -rf "$test_directory"' EXIT

# Reject unsuppoted packages.
guix pack intelmetool -s armhf-linux -n && false

# Compute the derivation of a pack.
drv="`guix pack coreutils -d --no-grafts`"
guix gc -R "$drv" | grep "`guix build coreutils -d --no-grafts`"

# Compute the derivation of a cross-compiled pack.  Make sure it refers to the
# cross-compiled package and not to the native package.
drv="`guix pack idutils -d --no-grafts --target=arm-linux-gnueabihf`"
guix gc -R "$drv" | \
    grep "`guix build idutils --target=arm-linux-gnueabihf -d --no-grafts`"
guix gc -R "$drv" | grep "`guix build idutils -d --no-grafts`" && false

# Build a tarball with no compression.
guix pack --compression=none --bootstrap guile-bootstrap

# Build a tarball (with compression).  Check that '-e' works as well.
out1="`guix pack --bootstrap guile-bootstrap`"
out2="`guix pack --bootstrap -e '(@ (gnu packages bootstrap) %bootstrap-guile)'`"
test -n "$out1"
test "$out1" = "$out2"

# Test '--root'.
guix pack -r "$test_directory/my-guile" --bootstrap guile-bootstrap
test "`readlink "$test_directory/my-guile"`" = "$out1"
guix gc --list-roots | grep "^$test_directory/my-guile$"
rm "$test_directory/my-guile"

# Build a tarball with a symlink.
the_pack="`guix pack --bootstrap -S /opt/gnu/bin=bin guile-bootstrap`"

# Try to extract it.  Note: we cannot test whether /opt/gnu/bin/guile itself
# exists because /opt/gnu/bin may be an absolute symlink to a store item that
# has been GC'd.
cd "$test_directory"
tar -xf "$the_pack"
test -L opt/gnu/bin

is_available () {
    # Use the "type" shell builtin to see if the program is on PATH.
    type "$1" > /dev/null
}

if is_available chroot && is_available unshare && unshare -r true; then
    # Verify we can use what we built.
    unshare -r chroot . /opt/gnu/bin/guile --version
    cd -
else
    echo "warning: skipped some verification because chroot or unshare is unavailable" >&2
fi

# For the tests that build Docker images below, we currently have to use
# --dry-run because if we don't, there are only two possible cases:
#
#     Case 1: We do not use --bootstrap, and the build takes hours to finish
#             because it needs to build tar etc.
#
#     Case 2: We use --bootstrap, and the build fails because the bootstrap
#             Guile cannot dlopen shared libraries.  Not to mention the fact
#             that we would still have to build many non-bootstrap inputs
#             (e.g., guile-json) in order to create the Docker image.

# Build a Docker image.
guix pack --dry-run --bootstrap -f docker guile-bootstrap

# Build a Docker image with a symlink.
guix pack --dry-run --bootstrap -f docker -S /opt/gnu= guile-bootstrap

# Build a tarball pack of cross-compiled software.  Use coreutils because
# guile-bootstrap is not intended to be cross-compiled.
guix pack --dry-run --bootstrap --target=arm-linux-gnueabihf coreutils

# Likewise, 'guix pack -R' requires a full-blown toolchain (because
# 'glibc-bootstrap' lacks 'libc.a'), hence '--dry-run'.
guix pack -R --dry-run --bootstrap -S /mybin=bin guile-bootstrap

# Make sure package transformation options are honored.
chmod -Rf +w "$test_directory"; rm -r "$test_directory"
mkdir -p "$test_directory" -m 755
drv1="`guix pack --no-grafts -n guile 2>&1 | grep pack.*\.drv`"
drv2="`guix pack --no-grafts -n --with-source=guile=$test_directory guile 2>&1 | grep pack.*\.drv`"
test -n "$drv1"
test "$drv1" != "$drv2"

# Try '--manifest' options.
cat > "$test_directory/manifest1.scm" <<EOF
(specifications->manifest '("guile"))
EOF
cat > "$test_directory/manifest2.scm" <<EOF
(specifications->manifest '("emacs"))
EOF
drv="`guix pack --no-grafts -d -m "$test_directory/manifest1.scm" -m "$test_directory/manifest2.scm"`"
guix gc -R "$drv" | grep `guix build guile -d --no-grafts`
guix gc -R "$drv" | grep `guix build emacs -d --no-grafts`
tes (append (latest-channel-instances store (list one two)) (latest-channel-instances store (list two one))) (lambda (instance1 instance2) (string=? (channel-instance-commit instance1) (channel-instance-commit instance2))))))))))) (test-equal "latest-channel-instances #:validate-pull" 'descendant ;; Make sure the #:validate-pull procedure receives the right values. (let/ec return (with-temporary-git-repository directory '((add "a.txt" "A") (commit "first commit") (add "b.scm" "#t") (commit "second commit")) (with-repository directory repository (let* ((commit1 (find-commit repository "first")) (commit2 (find-commit repository "second")) (spec (channel (url (string-append "file://" directory)) (name 'foo))) (new (channel (inherit spec) (commit (oid->string (commit-id commit2))))) (old (channel (inherit spec) (commit (oid->string (commit-id commit1)))))) (define (validate-pull channel current commit relation) (return (and (eq? channel old) (string=? (oid->string (commit-id commit2)) current) (string=? (oid->string (commit-id commit1)) commit) relation))) (with-store store ;; Attempt a downgrade from NEW to OLD. (latest-channel-instances store (list old) #:current-channels (list new) #:validate-pull validate-pull))))))) (test-assert "channel-instances->manifest" ;; Compute the manifest for a graph of instances and make sure we get a ;; derivation graph that mirrors the instance graph. This test also ensures ;; we don't try to access Git repositores at all at this stage. (let* ((spec (lambda deps `(channel (version 0) (dependencies ,@(map (lambda (dep) `(channel (name ,dep) (url "http://example.org"))) deps))))) (guix (make-instance #:name 'guix)) (instance0 (make-instance #:name 'a)) (instance1 (make-instance #:name 'b #:spec (spec 'a))) (instance2 (make-instance #:name 'c #:spec (spec 'b))) (instance3 (make-instance #:name 'd #:spec (spec 'c 'a)))) (%graft? #f) ;don't try to build stuff ;; Create 'build-self.scm' so that GUIX is recognized as the 'guix' channel. (let ((source (channel-instance-checkout guix))) (mkdir (string-append source "/build-aux")) (call-with-output-file (string-append source "/build-aux/build-self.scm") (lambda (port) (write '(begin (use-modules (guix) (gnu packages bootstrap)) (lambda _ (package->derivation %bootstrap-guile))) port)))) (with-store store (let () (define manifest (run-with-store store (channel-instances->manifest (list guix instance0 instance1 instance2 instance3)))) (define entries (manifest-entries manifest)) (define (depends? drv in out) ;; Return true if DRV depends (directly or indirectly) on all of IN ;; and none of OUT. (let ((set (list->set (requisites store (list (derivation-file-name drv))))) (in (map derivation-file-name in)) (out (map derivation-file-name out))) (and (every (cut set-contains? set <>) in) (not (any (cut set-contains? set <>) out))))) (define (lookup name) (run-with-store store (lower-object (manifest-entry-item (manifest-lookup manifest (manifest-pattern (name name))))))) (let ((drv-guix (lookup "guix")) (drv0 (lookup "a")) (drv1 (lookup "b")) (drv2 (lookup "c")) (drv3 (lookup "d"))) (and (depends? drv-guix '() (list drv0 drv1 drv2 drv3)) (depends? drv0 (list) (list drv1 drv2 drv3)) (depends? drv1 (list drv0) (list drv2 drv3)) (depends? drv2 (list drv1) (list drv3)) (depends? drv3 (list drv2 drv0) (list)))))))) (test-equal "channel-news, no news" '() (with-temporary-git-repository directory '((add "a.txt" "A") (commit "the commit")) (with-repository directory repository (let ((channel (channel (url (string-append "file://" directory)) (name 'foo))) (latest (reference-name->oid repository "HEAD"))) (channel-news-for-commit channel (oid->string latest)))))) (test-assert "channel-news, one entry" (with-temporary-git-repository directory `((add ".guix-channel" ,(object->string '(channel (version 0) (news-file "news.scm")))) (commit "first commit") (add "src/a.txt" "A") (commit "second commit") (tag "tag-for-first-news-entry") (add "news.scm" ,(lambda (repository) (let ((previous (reference-name->oid repository "HEAD"))) (object->string `(channel-news (version 0) (entry (commit ,(oid->string previous)) (title (en "New file!") (eo "Nova dosiero!")) (body (en "Yeah, a.txt.")))))))) (commit "third commit") (add "src/b.txt" "B") (commit "fourth commit") (add "news.scm" ,(lambda (repository) (let ((second (commit-id (find-commit repository "second commit"))) (previous (reference-name->oid repository "HEAD"))) (object->string `(channel-news (version 0) (entry (commit ,(oid->string previous)) (title (en "Another file!")) (body (en "Yeah, b.txt."))) (entry (tag "tag-for-first-news-entry") (title (en "Old news.") (eo "Malnovaĵoj.")) (body (en "For a.txt")))))))) (commit "fifth commit")) (with-repository directory repository (define (find-commit* message) (oid->string (commit-id (find-commit repository message)))) (let ((channel (channel (url (string-append "file://" directory)) (name 'foo))) (commit1 (find-commit* "first commit")) (commit2 (find-commit* "second commit")) (commit3 (find-commit* "third commit")) (commit4 (find-commit* "fourth commit")) (commit5 (find-commit* "fifth commit"))) ;; First try fetching all the news up to a given commit. (and (null? (channel-news-for-commit channel commit2)) (lset= string=? (map channel-news-entry-commit (channel-news-for-commit channel commit5)) (list commit2 commit4)) (lset= equal? (map channel-news-entry-title (channel-news-for-commit channel commit5)) '((("en" . "Another file!")) (("en" . "Old news.") ("eo" . "Malnovaĵoj.")))) (lset= string=? (map channel-news-entry-commit (channel-news-for-commit channel commit3)) (list commit2)) ;; Now fetch news entries that apply to a commit range. (lset= string=? (map channel-news-entry-commit (channel-news-for-commit channel commit3 commit1)) (list commit2)) (lset= string=? (map channel-news-entry-commit (channel-news-for-commit channel commit5 commit3)) (list commit4)) (lset= string=? (map channel-news-entry-commit (channel-news-for-commit channel commit5 commit1)) (list commit4 commit2)) (lset= equal? (map channel-news-entry-tag (channel-news-for-commit channel commit5 commit1)) '(#f "tag-for-first-news-entry"))))))) (test-assert "channel-news, annotated tag" (with-temporary-git-repository directory `((add ".guix-channel" ,(object->string '(channel (version 0) (news-file "news.scm")))) (add "src/a.txt" "A") (commit "first commit") (tag "tag-for-first-news-entry" "This is an annotated tag.") (add "news.scm" ,(lambda (repository) (let ((previous (reference-name->oid repository "HEAD"))) (object->string `(channel-news (version 0) (entry (tag "tag-for-first-news-entry") (title (en "New file!")) (body (en "Yeah, a.txt.")))))))) (commit "second commit")) (with-repository directory repository (define (find-commit* message) (oid->string (commit-id (find-commit repository message)))) (let ((channel (channel (url (string-append "file://" directory)) (name 'foo))) (commit1 (find-commit* "first commit")) (commit2 (find-commit* "second commit"))) (and (null? (channel-news-for-commit channel commit1)) (lset= equal? (map channel-news-entry-title (channel-news-for-commit channel commit2)) '((("en" . "New file!")))) (lset= string=? (map channel-news-entry-tag (channel-news-for-commit channel commit2)) (list "tag-for-first-news-entry")) ;; This is an annotated tag, but 'channel-news-entry-commit' ;; should give us the commit ID, not the ID of the annotated tag ;; object. (lset= string=? (map channel-news-entry-commit (channel-news-for-commit channel commit2)) (list commit1))))))) (test-assert "latest-channel-instances, missing introduction for 'guix'" (with-temporary-git-repository directory '((add "a.txt" "A") (commit "first commit") (add "b.scm" "#t") (commit "second commit")) (with-repository directory repository (let* ((commit1 (find-commit repository "first")) (commit2 (find-commit repository "second")) (channel (channel (url (string-append "file://" directory)) (name 'guix)))) (guard (c ((formatted-message? c) (->bool (string-contains (formatted-message-string c) "introduction")))) (with-store store ;; Attempt a downgrade from NEW to OLD. (latest-channel-instances store (list channel)) #f)))))) (unless (gpg+git-available?) (test-skip 1)) (test-equal "authenticate-channel, wrong first commit signer" #t (with-fresh-gnupg-setup (list %ed25519-public-key-file %ed25519-secret-key-file %ed25519-2-public-key-file %ed25519-2-secret-key-file) (with-temporary-git-repository directory `((add ".guix-channel" ,(object->string '(channel (version 0) (keyring-reference "master")))) (add ".guix-authorizations" ,(object->string `(authorizations (version 0) ((,(key-fingerprint %ed25519-public-key-file) (name "Charlie")))))) (add "signer.key" ,(call-with-input-file %ed25519-public-key-file get-string-all)) (commit "first commit" (signer ,(key-fingerprint %ed25519-public-key-file))) (add "random" ,(random-text)) (commit "second commit" (signer ,(key-fingerprint %ed25519-public-key-file)))) (with-repository directory repository (let* ((commit1 (find-commit repository "first")) (commit2 (find-commit repository "second")) (intro (make-channel-introduction (commit-id-string commit1) (openpgp-public-key-fingerprint (read-openpgp-packet %ed25519-2-public-key-file)))) ;different key (channel (channel (name 'example) (url (string-append "file://" directory)) (introduction intro)))) (guard (c ((formatted-message? c) (and (string-contains (formatted-message-string c) "initial commit") (equal? (formatted-message-arguments c) (list (oid->string (commit-id commit1)) (key-fingerprint %ed25519-public-key-file) (key-fingerprint %ed25519-2-public-key-file)))))) (authenticate-channel channel directory (commit-id-string commit2) #:keyring-reference-prefix "") 'failed)))))) (unless (gpg+git-available?) (test-skip 1)) (test-equal "authenticate-channel, not a descendant of introductory commit" #t (with-fresh-gnupg-setup (list %ed25519-public-key-file %ed25519-secret-key-file %ed25519-2-public-key-file %ed25519-2-secret-key-file) (with-temporary-git-repository directory `((add ".guix-channel" ,(object->string '(channel (version 0) (keyring-reference "master")))) (add ".guix-authorizations" ,(object->string `(authorizations (version 0) ((,(key-fingerprint %ed25519-public-key-file) (name "Charlie")))))) (add "signer.key" ,(call-with-input-file %ed25519-public-key-file get-string-all)) (commit "first commit" (signer ,(key-fingerprint %ed25519-public-key-file))) (branch "alternate-branch") (checkout "alternate-branch") (add "something.txt" ,(random-text)) (commit "intro commit" (signer ,(key-fingerprint %ed25519-public-key-file))) (checkout "master") (add "random" ,(random-text)) (commit "second commit" (signer ,(key-fingerprint %ed25519-public-key-file)))) (with-repository directory repository (let* ((commit1 (find-commit repository "first")) (commit2 (find-commit repository "second")) (commit0 (commit-lookup repository (reference-target (branch-lookup repository "alternate-branch")))) (intro (make-channel-introduction (commit-id-string commit0) (openpgp-public-key-fingerprint (read-openpgp-packet %ed25519-public-key-file)))) (channel (channel (name 'example) (url (string-append "file://" directory)) (introduction intro)))) (guard (c ((formatted-message? c) (and (string-contains (formatted-message-string c) "not a descendant") (equal? (formatted-message-arguments c) (list (oid->string (commit-id commit2)) (oid->string (commit-id commit0))))))) (authenticate-channel channel directory (commit-id-string commit2) #:keyring-reference-prefix "") 'failed)))))) (unless (gpg+git-available?) (test-skip 1)) (test-equal "authenticate-channel, .guix-authorizations" #t (with-fresh-gnupg-setup (list %ed25519-public-key-file %ed25519-secret-key-file %ed25519-2-public-key-file %ed25519-2-secret-key-file) (with-temporary-git-repository directory `((add ".guix-channel" ,(object->string '(channel (version 0) (keyring-reference "channel-keyring")))) (add ".guix-authorizations" ,(object->string `(authorizations (version 0) ((,(key-fingerprint %ed25519-public-key-file) (name "Charlie")))))) (commit "zeroth commit") (add "a.txt" "A") (commit "first commit" (signer ,(key-fingerprint %ed25519-public-key-file))) (add "b.txt" "B") (commit "second commit" (signer ,(key-fingerprint %ed25519-public-key-file))) (add "c.txt" "C") (commit "third commit" (signer ,(key-fingerprint %ed25519-2-public-key-file))) (branch "channel-keyring") (checkout "channel-keyring") (add "signer.key" ,(call-with-input-file %ed25519-public-key-file get-string-all)) (add "other.key" ,(call-with-input-file %ed25519-2-public-key-file get-string-all)) (commit "keyring commit") (checkout "master")) (with-repository directory repository (let* ((commit1 (find-commit repository "first")) (commit2 (find-commit repository "second")) (commit3 (find-commit repository "third")) (intro (make-channel-introduction (commit-id-string commit1) (openpgp-public-key-fingerprint (read-openpgp-packet %ed25519-public-key-file)))) (channel (channel (name 'example) (url (string-append "file://" directory)) (introduction intro)))) ;; COMMIT1 and COMMIT2 are fine. (and (authenticate-channel channel directory (commit-id-string commit2) #:keyring-reference-prefix "") ;; COMMIT3 is signed by an unauthorized key according to its ;; parent's '.guix-authorizations' file. (guard (c ((unauthorized-commit-error? c) (and (oid=? (git-authentication-error-commit c) (commit-id commit3)) (bytevector=? (openpgp-public-key-fingerprint (unauthorized-commit-error-signing-key c)) (openpgp-public-key-fingerprint (read-openpgp-packet %ed25519-2-public-key-file)))))) (authenticate-channel channel directory (commit-id-string commit3) #:keyring-reference-prefix "") 'failed))))))) (unless (gpg+git-available?) (test-skip 1)) (test-equal "latest-channel-instances, authenticate dependency" #t ;; Make sure that a channel dependency that has an introduction is ;; authenticated. This test checks that an authentication error is raised ;; as it should when authenticating the dependency. (with-fresh-gnupg-setup (list %ed25519-public-key-file %ed25519-secret-key-file) (with-temporary-git-repository dependency-directory `((add ".guix-channel" ,(object->string '(channel (version 0) (keyring-reference "master")))) (add ".guix-authorizations" ,(object->string `(authorizations (version 0) ()))) (add "signer.key" ,(call-with-input-file %ed25519-public-key-file get-string-all)) (commit "zeroth commit" (signer ,(key-fingerprint %ed25519-public-key-file))) (add "foo.txt" "evil") (commit "unsigned commit")) (with-repository dependency-directory dependency (let* ((commit0 (find-commit dependency "zeroth")) (commit1 (find-commit dependency "unsigned")) (intro `(channel-introduction (version 0) (commit ,(commit-id-string commit0)) (signer ,(openpgp-format-fingerprint (openpgp-public-key-fingerprint (read-openpgp-packet %ed25519-public-key-file))))))) (with-temporary-git-repository directory `((add ".guix-channel" ,(object->string `(channel (version 0) (dependencies (channel (name test-channel) (url ,dependency-directory) (introduction ,intro)))))) (commit "single commit")) (let ((channel (channel (name 'test) (url directory)))) (guard (c ((unsigned-commit-error? c) (oid=? (git-authentication-error-commit c) (commit-id commit1)))) (with-store store (latest-channel-instances store (list channel)) 'failed))))))))) (test-end "channels")