aboutsummaryrefslogtreecommitdiff
path: root/tests/modules.scm
blob: 57019c600cf2d9449918eaa4a5ae0999bfb39adb (about) (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
;;; GNU Guix --- Functional package management for GNU
;;; Copyright © 2016, 2017 Ludovic Courtès <ludo@gnu.org>
;;;
;;; This file is part of GNU Guix.
;;;
;;; GNU Guix is free software; you can redistribute it and/or modify it
;;; under the terms of the GNU General Public License as published by
;;; the Free Software Foundation; either version 3 of the License, or (at
;;; your option) any later version.
;;;
;;; GNU Guix is distributed in the hope that it will be useful, but
;;; WITHOUT ANY WARRANTY; without even the implied warranty of
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
;;; GNU General Public License for more details.
;;;
;;; You should have received a copy of the GNU General Public License
;;; along with GNU Guix.  If not, see <http://www.gnu.org/licenses/>.

(define-module (test-modules)
  #:use-module (guix modules)
  #:use-module ((guix build-system gnu) #:select (%gnu-build-system-modules))
  #:use-module ((guix utils) #:select (call-with-temporary-directory))
  #:use-module (srfi srfi-1)
  #:use-module (srfi srfi-34)
  #:use-module (srfi srfi-64))

(test-begin "modules")

(test-assert "closure of (guix build gnu-build-system)"
  (lset= equal?
         (live-module-closure '((guix build gnu-build-system)))
         (source-module-closure '((guix build gnu-build-system)))
         %gnu-build-system-modules
         (source-module-closure %gnu-build-system-modules)
         (live-module-closure %gnu-build-system-modules)))

(test-assert "closure of (gnu build install)"
  (lset= equal?
         (live-module-closure '((gnu build install)))
         (source-module-closure '((gnu build install)))))

(test-assert "closure of (gnu build vm)"
  (lset= equal?
         (live-module-closure '((gnu build vm)))
         (source-module-closure '((gnu build vm)))))

(test-equal "&missing-dependency-error"
  '(something that does not exist)
  (call-with-temporary-directory
   (lambda (directory)
     (call-with-output-file (string-append directory "/foobar.scm")
       (lambda (port)
         (write '(define-module (foobar)
                   #:use-module (something that does not exist))
                port)))

     (call-with-output-file (string-append directory "/baz.scm")
       (lambda (port)
         (write '(define-module (baz)
                   #:use-module (foobar))
                port)))

     (guard (c ((missing-dependency-error? c)
                (missing-dependency-module c)))
       (source-module-closure '((baz)) (list directory)
                              #:select? (const #t))))))

(test-end)
"allow_root" "allow_other") ",")))) (mntoptions (@ (require "nosuid,nodev"))) (logout (@ (wait "0") (hup "0") (term "no") (kill "no"))) (mkmountpoint (@ (enable "1") (remove "true"))))) (define (make-pam-mount-configuration-file config) (computed-file "pam_mount.conf.xml" #~(begin (use-modules (sxml simple)) (call-with-output-file #$output (lambda (port) (sxml->xml '(*TOP* (*PI* xml "version='1.0' encoding='utf-8'") (pam_mount #$@(pam-mount-configuration-rules config) (pmvarrun #$(file-append pam-mount "/sbin/pmvarrun -u '%(USER)' -o '%(OPERATION)'")) (cryptmount #$(file-append pam-mount (string-append "/sbin/mount.crypt" " '%(if %(CIPHER),-ocipher=%(CIPHER))'" " '%(if %(FSKEYCIPHER)," "-ofsk_cipher=%(FSKEYCIPHER))'" " '%(if %(FSKEYHASH),-ofsk_hash=%(FSKEYHASH))'" " '%(if %(FSKEYPATH),-okeyfile=%(FSKEYPATH))'" " '%(if %(OPTIONS),-o%(OPTIONS))'" " '%(VOLUME)' '%(MNTPT)'"))) (cryptumount #$(file-append pam-mount "/sbin/umount.crypt '%(MNTPT)'")))) port)))))) (define-record-type* <pam-mount-configuration> pam-mount-configuration make-pam-mount-configuration pam-mount-configuration? (rules pam-mount-configuration-rules (default %pam-mount-default-configuration))) (define (pam-mount-etc-service config) `(("security/pam_mount.conf.xml" ,(make-pam-mount-configuration-file config)))) (define (pam-mount-pam-service config) (define optional-pam-mount (pam-entry (control "optional") (module #~(string-append #$pam-mount "/lib/security/pam_mount.so")))) (list (lambda (pam) (if (member (pam-service-name pam) '("login" "su" "slim" "gdm-password")) (pam-service (inherit pam) (auth (append (pam-service-auth pam) (list optional-pam-mount))) (session (append (pam-service-session pam) (list optional-pam-mount)))) pam)))) (define pam-mount-service-type (service-type (name 'pam-mount) (extensions (list (service-extension etc-service-type pam-mount-etc-service) (service-extension pam-root-service-type pam-mount-pam-service))) (default-value (pam-mount-configuration)) (description "Activate PAM-Mount support. It allows mounting volumes for specific users when they log in.")))