2019-12-15 18:29:17 +00:00
|
|
|
import ./make-test-python.nix ({ pkgs, ...} : {
|
2019-04-22 12:06:33 +00:00
|
|
|
name = "nzbget";
|
2021-01-10 19:08:30 +00:00
|
|
|
meta = with pkgs.lib.maintainers; {
|
2019-04-22 12:06:33 +00:00
|
|
|
maintainers = [ aanderse flokli ];
|
|
|
|
};
|
|
|
|
|
|
|
|
nodes = {
|
|
|
|
server = { ... }: {
|
|
|
|
services.nzbget.enable = true;
|
|
|
|
|
|
|
|
# hack, don't add (unfree) unrar to nzbget's path,
|
|
|
|
# so we can run this test in CI
|
2021-01-10 19:08:30 +00:00
|
|
|
systemd.services.nzbget.path = pkgs.lib.mkForce [ pkgs.p7zip ];
|
2019-04-22 12:06:33 +00:00
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
testScript = ''
|
2019-12-15 18:29:17 +00:00
|
|
|
start_all()
|
2019-04-22 12:06:33 +00:00
|
|
|
|
2019-12-15 18:29:17 +00:00
|
|
|
server.wait_for_unit("nzbget.service")
|
|
|
|
server.wait_for_unit("network.target")
|
|
|
|
server.wait_for_open_port(6789)
|
|
|
|
assert "This file is part of nzbget" in server.succeed(
|
2020-09-16 14:45:15 +00:00
|
|
|
"curl -f -s -u nzbget:tegbzn6789 http://127.0.0.1:6789"
|
2019-12-15 18:29:17 +00:00
|
|
|
)
|
|
|
|
server.succeed(
|
|
|
|
"${pkgs.nzbget}/bin/nzbget -n -o Control_iP=127.0.0.1 -o Control_port=6789 -o Control_password=tegbzn6789 -V"
|
|
|
|
)
|
2019-04-22 12:06:33 +00:00
|
|
|
'';
|
|
|
|
})
|