Loading nixos/lib/test-driver/test_driver/machine.py +3 −3 Original line number Diff line number Diff line Loading @@ -133,7 +133,7 @@ def retry(fn: Callable, timeout: int = 900) -> None: class StartCommand: """The Base Start Command knows how to append the necesary """The Base Start Command knows how to append the necessary runtime qemu options as determined by a particular test driver run. Any such start command is expected to happily receive and append additional qemu args. Loading Loading @@ -211,7 +211,7 @@ class StartCommand: class NixStartScript(StartCommand): """A start script from nixos/modules/virtualiation/qemu-vm.nix that also satisfies the requirement of the BaseStartCommand. These Nix commands have the particular charactersitic that the These Nix commands have the particular characteristic that the machine name can be extracted out of them via a regex match. (Admittedly a _very_ implicit contract, evtl. TODO fix) """ Loading Loading @@ -527,7 +527,7 @@ class Machine: timeout_str = f"timeout {timeout}" # While sh is bash on NixOS, this is not the case for every distro. # We explicitely call bash here to allow for the driver to boot other distros as well. # We explicitly call bash here to allow for the driver to boot other distros as well. out_command = ( f"{timeout_str} bash -c {shlex.quote(command)} | (base64 --wrap 0; echo)\n" ) Loading nixos/tests/acme.nix +1 −1 Original line number Diff line number Diff line Loading @@ -407,7 +407,7 @@ in { # Ensures the issuer of our cert matches the chain # and matches the issuer we expect it to be. # It's a good validation to ensure the cert.pem and fullchain.pem # are not still selfsigned afer verification # are not still selfsigned after verification def check_issuer(node, cert_name, issuer): for fname in ("cert.pem", "fullchain.pem"): actual_issuer = node.succeed( Loading nixos/tests/atop.nix +1 −1 Original line number Diff line number Diff line Loading @@ -199,7 +199,7 @@ in ]; }; everything = makeTest { name = "atop-everthing"; name = "atop-everything"; nodes.machine = { programs.atop = { enable = true; Loading nixos/tests/boot-stage1.nix +1 −1 Original line number Diff line number Diff line Loading @@ -132,7 +132,7 @@ import ./make-test-python.nix ({ pkgs, ... }: { ''; }) # This canary process mimicks a storage daemon, which we do NOT want to be # This canary process mimics a storage daemon, which we do NOT want to be # killed before going into stage 2. For more on root storage daemons, see: # https://www.freedesktop.org/wiki/Software/systemd/RootStorageDaemons/ (mkCmdlineCanary { Loading nixos/tests/cockpit.nix +2 −2 Original line number Diff line number Diff line Loading @@ -93,7 +93,7 @@ import ./make-test-python.nix ( password_input = find_element(By.CSS_SELECTOR, 'input#login-password-input') set_value(password_input, "${password}") log("Submiting credentials for login") log("Submitting credentials for login") driver.find_element(By.CSS_SELECTOR, 'button#login-button').click() # driver.implicitly_wait(1) Loading @@ -102,7 +102,7 @@ import ./make-test-python.nix ( log("Waiting dashboard to load") wait_title_contains("${user}@server") log("Waiting for the frontend to initalize") log("Waiting for the frontend to initialize") sleep(1) log("Looking for that banner that tells about limited access") Loading Loading
nixos/lib/test-driver/test_driver/machine.py +3 −3 Original line number Diff line number Diff line Loading @@ -133,7 +133,7 @@ def retry(fn: Callable, timeout: int = 900) -> None: class StartCommand: """The Base Start Command knows how to append the necesary """The Base Start Command knows how to append the necessary runtime qemu options as determined by a particular test driver run. Any such start command is expected to happily receive and append additional qemu args. Loading Loading @@ -211,7 +211,7 @@ class StartCommand: class NixStartScript(StartCommand): """A start script from nixos/modules/virtualiation/qemu-vm.nix that also satisfies the requirement of the BaseStartCommand. These Nix commands have the particular charactersitic that the These Nix commands have the particular characteristic that the machine name can be extracted out of them via a regex match. (Admittedly a _very_ implicit contract, evtl. TODO fix) """ Loading Loading @@ -527,7 +527,7 @@ class Machine: timeout_str = f"timeout {timeout}" # While sh is bash on NixOS, this is not the case for every distro. # We explicitely call bash here to allow for the driver to boot other distros as well. # We explicitly call bash here to allow for the driver to boot other distros as well. out_command = ( f"{timeout_str} bash -c {shlex.quote(command)} | (base64 --wrap 0; echo)\n" ) Loading
nixos/tests/acme.nix +1 −1 Original line number Diff line number Diff line Loading @@ -407,7 +407,7 @@ in { # Ensures the issuer of our cert matches the chain # and matches the issuer we expect it to be. # It's a good validation to ensure the cert.pem and fullchain.pem # are not still selfsigned afer verification # are not still selfsigned after verification def check_issuer(node, cert_name, issuer): for fname in ("cert.pem", "fullchain.pem"): actual_issuer = node.succeed( Loading
nixos/tests/atop.nix +1 −1 Original line number Diff line number Diff line Loading @@ -199,7 +199,7 @@ in ]; }; everything = makeTest { name = "atop-everthing"; name = "atop-everything"; nodes.machine = { programs.atop = { enable = true; Loading
nixos/tests/boot-stage1.nix +1 −1 Original line number Diff line number Diff line Loading @@ -132,7 +132,7 @@ import ./make-test-python.nix ({ pkgs, ... }: { ''; }) # This canary process mimicks a storage daemon, which we do NOT want to be # This canary process mimics a storage daemon, which we do NOT want to be # killed before going into stage 2. For more on root storage daemons, see: # https://www.freedesktop.org/wiki/Software/systemd/RootStorageDaemons/ (mkCmdlineCanary { Loading
nixos/tests/cockpit.nix +2 −2 Original line number Diff line number Diff line Loading @@ -93,7 +93,7 @@ import ./make-test-python.nix ( password_input = find_element(By.CSS_SELECTOR, 'input#login-password-input') set_value(password_input, "${password}") log("Submiting credentials for login") log("Submitting credentials for login") driver.find_element(By.CSS_SELECTOR, 'button#login-button').click() # driver.implicitly_wait(1) Loading @@ -102,7 +102,7 @@ import ./make-test-python.nix ( log("Waiting dashboard to load") wait_title_contains("${user}@server") log("Waiting for the frontend to initalize") log("Waiting for the frontend to initialize") sleep(1) log("Looking for that banner that tells about limited access") Loading