···22 ln -s vda1 /dev/xvda1
23 '';
240025 # In a NixOS test the serial console is occupied by the "backdoor"
26 # (see testing/test-instrumentation.nix) and is incompatible with
27 # the configuration in virtualisation/amazon-image.nix.
···53 }
54 ];
55 }).config;
56- image = "${imageCfg.system.build.amazonImage}/${imageCfg.amazonImage.name}.vhd";
5758 sshKeys = import ./ssh-keys.nix pkgs;
59 snakeOilPrivateKey = sshKeys.snakeOilPrivateKey.text;
···63in {
64 boot-ec2-nixops = makeEc2Test {
65 name = "nixops-userdata";
066 inherit image;
67 sshPublicKey = snakeOilPublicKey; # That's right folks! My user's key is also the host key!
68···95 machine.succeed(
96 "echo localhost,127.0.0.1 ${snakeOilPublicKey} > ~/.ssh/known_hosts"
97 )
98- machine.succeed("ssh -o BatchMode=yes localhost exit")
99100 # Test whether the root disk was resized.
101 blocks, block_size = map(int, machine.succeed("stat -c %b:%S -f /").split(":"))
···22 ln -s vda1 /dev/xvda1
23 '';
2425+ amazonImage.format = "qcow2";
26+27 # In a NixOS test the serial console is occupied by the "backdoor"
28 # (see testing/test-instrumentation.nix) and is incompatible with
29 # the configuration in virtualisation/amazon-image.nix.
···55 }
56 ];
57 }).config;
58+ image = "${imageCfg.system.build.amazonImage}/${imageCfg.amazonImage.name}.qcow2";
5960 sshKeys = import ./ssh-keys.nix pkgs;
61 snakeOilPrivateKey = sshKeys.snakeOilPrivateKey.text;
···65in {
66 boot-ec2-nixops = makeEc2Test {
67 name = "nixops-userdata";
68+ meta.timeout = 600;
69 inherit image;
70 sshPublicKey = snakeOilPublicKey; # That's right folks! My user's key is also the host key!
71···98 machine.succeed(
99 "echo localhost,127.0.0.1 ${snakeOilPublicKey} > ~/.ssh/known_hosts"
100 )
101+ machine.succeed("ssh -o BatchMode=yes localhost exit", timeout=120)
102103 # Test whether the root disk was resized.
104 blocks, block_size = map(int, machine.succeed("stat -c %b:%S -f /").split(":"))