1 # GNU Guix --- Functional package management for GNU
2 # Copyright © 2015 David Thompson <davet@gnu.org>
4 # This file is part of GNU Guix.
6 # GNU Guix is free software; you can redistribute it and/or modify it
7 # under the terms of the GNU General Public License as published by
8 # the Free Software Foundation; either version 3 of the License, or (at
9 # your option) any later version.
11 # GNU Guix is distributed in the hope that it will be useful, but
12 # WITHOUT ANY WARRANTY; without even the implied warranty of
13 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 # GNU General Public License for more details.
16 # You should have received a copy of the GNU General Public License
17 # along with GNU Guix. If not, see <http://www.gnu.org/licenses/>.
20 # Test 'guix environment'.
25 guix environment
--version
27 if ! guile
-c '((@ (guix scripts environment) assert-container-features))'
29 # User containers are not supported; skip this test.
33 tmpdir
="t-guix-environment-$$"
34 trap 'rm -r "$tmpdir"' EXIT
38 # Make sure the exit value is preserved.
39 if guix environment
--container --ad-hoc --bootstrap guile-bootstrap \
40 -- guile
-c '(exit 42)'
47 # Make sure "localhost" resolves.
48 guix environment
--container --ad-hoc --bootstrap guile-bootstrap \
49 -- guile
-c '(exit (pair? (getaddrinfo "localhost" "80")))'
51 # We should get ECONNREFUSED, not ENETUNREACH, which would indicate that "lo"
53 guix environment
--container --ad-hoc --bootstrap guile-bootstrap \
54 -- guile
-c "(exit (= ECONNREFUSED
57 (let ((sock (socket AF_INET SOCK_STREAM 0)))
58 (connect sock AF_INET INADDR_LOOPBACK 12345)))
60 (pk 'errno (system-error-errno args))))))"
62 # Make sure '--preserve' is honored.
63 result
="`FOOBAR=42; export FOOBAR; guix environment -C --ad-hoc --bootstrap \
64 guile-bootstrap -E ^FOO -- guile -c '(display (getenv \"FOOBAR\"))'`"
67 # By default, the UID inside the container should be the same as outside.
69 inner_uid
="`guix environment -C --ad-hoc --bootstrap guile-bootstrap \
70 -- guile -c '(display (getuid))'`"
71 test $inner_uid = $uid
73 # When '--user' is passed, the UID should be 1000. (Note: Use a separate HOME
74 # so that we don't run into problems when the test directory is under /home.)
76 inner_uid
="`HOME=$tmpdir guix environment -C --ad-hoc --bootstrap guile-bootstrap \
77 --user=gnu-guix -- guile -c '(display (getuid))'`"
78 test $inner_uid = 1000
80 if test "x$USER" = "x"; then USER
="`id -un`"; fi
82 # Check whether /etc/passwd and /etc/group are valid.
83 guix environment
-C --ad-hoc --bootstrap guile-bootstrap \
84 -- guile
-c "(exit (string=? \"$USER\" (passwd:name (getpwuid (getuid)))))"
85 guix environment
-C --ad-hoc --bootstrap guile-bootstrap \
86 -- guile
-c '(exit (string? (group:name (getgrgid (getgid)))))'
87 guix environment
-C --ad-hoc --bootstrap guile-bootstrap \
88 -- guile
-c '(use-modules (srfi srfi-1))
89 (exit (every group:name
90 (map getgrgid (vector->list (getgroups)))))'
92 # Make sure file-not-found errors in mounts are reported.
93 if guix environment
--container --ad-hoc --bootstrap guile-bootstrap \
94 --expose=/does-not-exist
-- guile
-c 1 2> "$tmpdir/error"
98 grep "/does-not-exist" "$tmpdir/error"
99 grep "[Nn]o such file" "$tmpdir/error"
102 # Make sure that the right directories are mapped.
104 (use-modules (ice-9 rdelim)
109 (filter-map (lambda (line)
110 (match (string-split line #\space)
113 ;; Ignore the root file system.
116 ;; Ignore these types of file systems, except if they
117 ;; correspond to a parent file system.
118 ((_ mount (or \"tmpfs\" \"proc\" \"sysfs\" \"devtmpfs\"
119 \"devpts\" \"cgroup\" \"mqueue\") _ _ _)
120 (and (string-prefix? (getcwd) mount)
124 (string-split (call-with-input-file \"/proc/mounts\" read-string)
127 (for-each (lambda (mount)
132 guix environment
--container --ad-hoc --bootstrap guile-bootstrap \
133 -- guile
-c "$mount_test_code" > $tmpdir/mounts
136 test `wc -l < $tmpdir/mounts` -eq 4
138 current_dir
="`cd $PWD; pwd -P`"
139 grep -e "$current_dir$" $tmpdir/mounts
# current directory
140 grep $
(guix build guile-bootstrap
) $tmpdir/mounts
141 grep -e "$NIX_STORE_DIR/.*-bash" $tmpdir/mounts
# bootstrap bash
145 # Make sure 'GUIX_ENVIRONMENT' is set to '~/.guix-profile' when requested
146 # within a container.
149 (exit (and (string=? (getenv "GUIX_ENVIRONMENT")
150 (string-append (getenv "HOME") "/.guix-profile"))
151 (string-prefix? "'"$NIX_STORE_DIR"'"
152 (readlink (string-append (getenv "HOME")
153 "/.guix-profile")))))'
156 && guix environment
--bootstrap --container --link-profile \
157 --ad-hoc guile-bootstrap
--pure \
158 -- guile
-c "$linktest"
161 # Test that user can be mocked.
162 usertest
='(exit (and (string=? (getenv "HOME") "/home/foognu")
163 (string=? (passwd:name (getpwuid 1000)) "foognu")
164 (file-exists? "/home/foognu/umock")))'
165 touch "$tmpdir/umock"
166 HOME
="$tmpdir" guix environment
--bootstrap --container --user=foognu \
167 --ad-hoc guile-bootstrap
--pure \
168 --share="$tmpdir/umock" \
169 -- guile
-c "$usertest"
171 # if not sharing CWD, chdir home
174 && guix environment
--bootstrap --container --no-cwd --user=foo \
175 --ad-hoc guile-bootstrap
--pure \
176 -- /bin
/sh
-c 'test $(pwd) == "/home/foo" -a ! -d '"$tmpdir"
179 # Check the exit code.
182 (use-modules (system foreign))
183 ;; Purposely make Guile crash with a segfault. :)
184 (pointer->string (make-pointer 123) 123)"
186 if guix environment
--bootstrap --container \
187 --ad-hoc guile-bootstrap
-- guile
-c "$abnormal_exit_code"