mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-12-25 15:13:46 +00:00
ff2f00d425
Co-Authored-By: Janik <80165193+Janik-Haag@users.noreply.github.com>
63 lines
1.7 KiB
Nix
63 lines
1.7 KiB
Nix
import ./make-test-python.nix (
|
|
{ pkgs, ... }:
|
|
let
|
|
certs = import ./common/acme/server/snakeoil-certs.nix;
|
|
inherit (certs) domain;
|
|
in
|
|
{
|
|
name = "canaille";
|
|
meta.maintainers = with pkgs.lib.maintainers; [ erictapen ];
|
|
|
|
nodes.server =
|
|
{ pkgs, lib, ... }:
|
|
{
|
|
services.canaille = {
|
|
enable = true;
|
|
secretKeyFile = pkgs.writeText "canaille-secret-key" ''
|
|
this is not a secret key
|
|
'';
|
|
settings = {
|
|
SERVER_NAME = domain;
|
|
};
|
|
};
|
|
|
|
services.nginx.virtualHosts."${domain}" = {
|
|
enableACME = lib.mkForce false;
|
|
sslCertificate = certs."${domain}".cert;
|
|
sslCertificateKey = certs."${domain}".key;
|
|
};
|
|
|
|
networking.hosts."::1" = [ "${domain}" ];
|
|
networking.firewall.allowedTCPPorts = [
|
|
80
|
|
443
|
|
];
|
|
|
|
users.users.canaille.shell = pkgs.bashInteractive;
|
|
|
|
security.pki.certificateFiles = [ certs.ca.cert ];
|
|
};
|
|
|
|
nodes.client =
|
|
{ nodes, ... }:
|
|
{
|
|
networking.hosts."${nodes.server.networking.primaryIPAddress}" = [ "${domain}" ];
|
|
security.pki.certificateFiles = [ certs.ca.cert ];
|
|
};
|
|
|
|
testScript =
|
|
{ ... }:
|
|
''
|
|
import json
|
|
|
|
start_all()
|
|
server.wait_for_unit("canaille.socket")
|
|
server.wait_until_succeeds("curl -f https://${domain}")
|
|
server.succeed("sudo -iu canaille -- canaille create user --user-name admin --password adminpass --emails admin@${domain}")
|
|
json_str = server.succeed("sudo -iu canaille -- canaille get user")
|
|
assert json.loads(json_str)[0]["user_name"] == "admin"
|
|
server.succeed("sudo -iu canaille -- canaille check")
|
|
'';
|
|
}
|
|
)
|