1
0
Fork 0

switch to runNixOSTest

This commit is contained in:
ibizaman 2024-03-19 22:09:30 -07:00
parent b74655c1e2
commit fd642ac947
11 changed files with 21 additions and 42 deletions

View file

@ -45,7 +45,7 @@ let
raise Exception(f"Code is {response['code']}") raise Exception(f"Code is {response['code']}")
''; '';
basic = appname: pkgs.nixosTest { basic = appname: pkgs.testers.runNixOSTest {
name = "arr-${appname}-basic"; name = "arr-${appname}-basic";
nodes.server = { config, pkgs, ... }: { nodes.server = { config, pkgs, ... }: {
@ -59,7 +59,6 @@ let
../../modules/blocks/postgresql.nix ../../modules/blocks/postgresql.nix
../../modules/blocks/nginx.nix ../../modules/blocks/nginx.nix
../../modules/services/arr.nix ../../modules/services/arr.nix
(pkgs'.path + "/nixos/modules/profiles/minimal.nix")
(pkgs'.path + "/nixos/modules/profiles/headless.nix") (pkgs'.path + "/nixos/modules/profiles/headless.nix")
(pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix") (pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix")
]; ];

View file

@ -40,12 +40,11 @@ let
''; '';
in in
{ {
basic = pkgs.nixosTest { basic = pkgs.testers.runNixOSTest {
name = "audiobookshelf-basic"; name = "audiobookshelf-basic";
nodes.server = { config, pkgs, ... }: { nodes.server = { config, pkgs, ... }: {
imports = [ imports = [
(pkgs'.path + "/nixos/modules/profiles/minimal.nix")
(pkgs'.path + "/nixos/modules/profiles/headless.nix") (pkgs'.path + "/nixos/modules/profiles/headless.nix")
(pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix") (pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix")
{ {
@ -71,12 +70,11 @@ in
testScript = commonTestScript; testScript = commonTestScript;
}; };
cert = pkgs.nixosTest { cert = pkgs.testers.runNixOSTest {
name = "audiobookshelf-cert"; name = "audiobookshelf-cert";
nodes.server = { config, pkgs, ... }: { nodes.server = { config, pkgs, ... }: {
imports = [ imports = [
(pkgs'.path + "/nixos/modules/profiles/minimal.nix")
(pkgs'.path + "/nixos/modules/profiles/headless.nix") (pkgs'.path + "/nixos/modules/profiles/headless.nix")
(pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix") (pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix")
{ {
@ -123,12 +121,11 @@ in
testScript = commonTestScript; testScript = commonTestScript;
}; };
sso = pkgs.nixosTest { sso = pkgs.testers.runNixOSTest {
name = "audiobookshelf-sso"; name = "audiobookshelf-sso";
nodes.server = { config, pkgs, ... }: { nodes.server = { config, pkgs, ... }: {
imports = [ imports = [
(pkgs'.path + "/nixos/modules/profiles/minimal.nix")
(pkgs'.path + "/nixos/modules/profiles/headless.nix") (pkgs'.path + "/nixos/modules/profiles/headless.nix")
(pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix") (pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix")
{ {

View file

@ -5,12 +5,11 @@ let
ldapAdminPassword = "ldapAdminPassword"; ldapAdminPassword = "ldapAdminPassword";
in in
{ {
basic = pkgs.nixosTest { basic = pkgs.testers.runNixOSTest {
name = "authelia-basic"; name = "authelia-basic";
nodes.machine = { config, pkgs, ... }: { nodes.machine = { config, pkgs, ... }: {
imports = [ imports = [
(pkgs'.path + "/nixos/modules/profiles/minimal.nix")
(pkgs'.path + "/nixos/modules/profiles/headless.nix") (pkgs'.path + "/nixos/modules/profiles/headless.nix")
(pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix") (pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix")
{ {

View file

@ -40,12 +40,11 @@ let
''; '';
in in
{ {
basic = pkgs.nixosTest { basic = pkgs.testers.runNixOSTest {
name = "grocy-basic"; name = "grocy-basic";
nodes.server = { config, pkgs, ... }: { nodes.server = { config, pkgs, ... }: {
imports = [ imports = [
(pkgs'.path + "/nixos/modules/profiles/minimal.nix")
(pkgs'.path + "/nixos/modules/profiles/headless.nix") (pkgs'.path + "/nixos/modules/profiles/headless.nix")
(pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix") (pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix")
{ {
@ -70,12 +69,11 @@ in
testScript = commonTestScript; testScript = commonTestScript;
}; };
cert = pkgs.nixosTest { cert = pkgs.testers.runNixOSTest {
name = "grocy-cert"; name = "grocy-cert";
nodes.server = { config, pkgs, ... }: { nodes.server = { config, pkgs, ... }: {
imports = [ imports = [
(pkgs'.path + "/nixos/modules/profiles/minimal.nix")
(pkgs'.path + "/nixos/modules/profiles/headless.nix") (pkgs'.path + "/nixos/modules/profiles/headless.nix")
(pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix") (pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix")
{ {

View file

@ -40,12 +40,11 @@ let
''; '';
in in
{ {
basic = pkgs.nixosTest { basic = pkgs.testers.runNixOSTest {
name = "jellyfin-basic"; name = "jellyfin-basic";
nodes.server = { config, pkgs, ... }: { nodes.server = { config, pkgs, ... }: {
imports = [ imports = [
(pkgs'.path + "/nixos/modules/profiles/minimal.nix")
(pkgs'.path + "/nixos/modules/profiles/headless.nix") (pkgs'.path + "/nixos/modules/profiles/headless.nix")
(pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix") (pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix")
{ {
@ -71,12 +70,11 @@ in
testScript = commonTestScript; testScript = commonTestScript;
}; };
ldap = pkgs.nixosTest { ldap = pkgs.testers.runNixOSTest {
name = "jellyfin-ldap"; name = "jellyfin-ldap";
nodes.server = { config, pkgs, ... }: { nodes.server = { config, pkgs, ... }: {
imports = [ imports = [
(pkgs'.path + "/nixos/modules/profiles/minimal.nix")
(pkgs'.path + "/nixos/modules/profiles/headless.nix") (pkgs'.path + "/nixos/modules/profiles/headless.nix")
(pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix") (pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix")
{ {
@ -122,12 +120,11 @@ in
testScript = commonTestScript; testScript = commonTestScript;
}; };
cert = pkgs.nixosTest { cert = pkgs.testers.runNixOSTest {
name = "jellyfin_cert"; name = "jellyfin_cert";
nodes.server = { config, pkgs, ... }: { nodes.server = { config, pkgs, ... }: {
imports = [ imports = [
(pkgs'.path + "/nixos/modules/profiles/minimal.nix")
(pkgs'.path + "/nixos/modules/profiles/headless.nix") (pkgs'.path + "/nixos/modules/profiles/headless.nix")
(pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix") (pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix")
{ {
@ -175,12 +172,11 @@ in
testScript = commonTestScript; testScript = commonTestScript;
}; };
sso = pkgs.nixosTest { sso = pkgs.testers.runNixOSTest {
name = "jellyfin_sso"; name = "jellyfin_sso";
nodes.server = { config, pkgs, ... }: { nodes.server = { config, pkgs, ... }: {
imports = [ imports = [
(pkgs'.path + "/nixos/modules/profiles/minimal.nix")
(pkgs'.path + "/nixos/modules/profiles/headless.nix") (pkgs'.path + "/nixos/modules/profiles/headless.nix")
(pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix") (pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix")
{ {

View file

@ -3,12 +3,11 @@ let
pkgs' = pkgs; pkgs' = pkgs;
in in
{ {
auth = pkgs.nixosTest { auth = pkgs.testers.runNixOSTest {
name = "ldap-auth"; name = "ldap-auth";
nodes.server = { config, pkgs, ... }: { nodes.server = { config, pkgs, ... }: {
imports = [ imports = [
(pkgs'.path + "/nixos/modules/profiles/minimal.nix")
(pkgs'.path + "/nixos/modules/profiles/headless.nix") (pkgs'.path + "/nixos/modules/profiles/headless.nix")
(pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix") (pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix")
{ {

View file

@ -42,12 +42,11 @@ in
generator = lib.generators.toJSON {}; generator = lib.generators.toJSON {};
}; };
in in
pkgs.nixosTest { pkgs.testers.runNixOSTest {
name = "lib-template"; name = "lib-template";
nodes.machine = { config, pkgs, ... }: nodes.machine = { config, pkgs, ... }:
{ {
imports = [ imports = [
(pkgs'.path + "/nixos/modules/profiles/minimal.nix")
(pkgs'.path + "/nixos/modules/profiles/headless.nix") (pkgs'.path + "/nixos/modules/profiles/headless.nix")
(pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix") (pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix")
{ {

View file

@ -4,12 +4,11 @@ let
in in
{ {
# This test, although simple, makes sure all provisioning went fine. # This test, although simple, makes sure all provisioning went fine.
auth = pkgs.nixosTest { auth = pkgs.testers.runNixOSTest {
name = "monitoring-basic"; name = "monitoring-basic";
nodes.machine = { config, pkgs, ... }: { nodes.machine = { config, pkgs, ... }: {
imports = [ imports = [
(pkgs'.path + "/nixos/modules/profiles/minimal.nix")
(pkgs'.path + "/nixos/modules/profiles/headless.nix") (pkgs'.path + "/nixos/modules/profiles/headless.nix")
(pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix") (pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix")
{ {

View file

@ -125,12 +125,11 @@ let
''; '';
in in
{ {
basic = pkgs.nixosTest { basic = pkgs.testers.runNixOSTest {
name = "nextcloud-basic"; name = "nextcloud-basic";
nodes.server = { config, pkgs, ... }: { nodes.server = { config, pkgs, ... }: {
imports = [ imports = [
(pkgs'.path + "/nixos/modules/profiles/minimal.nix")
(pkgs'.path + "/nixos/modules/profiles/headless.nix") (pkgs'.path + "/nixos/modules/profiles/headless.nix")
(pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix") (pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix")
{ {
@ -168,12 +167,11 @@ in
testScript = commonTestScript; testScript = commonTestScript;
}; };
cert = pkgs.nixosTest { cert = pkgs.testers.runNixOSTest {
name = "nextcloud-cert"; name = "nextcloud-cert";
nodes.server = { config, pkgs, ... }: { nodes.server = { config, pkgs, ... }: {
imports = [ imports = [
(pkgs'.path + "/nixos/modules/profiles/minimal.nix")
(pkgs'.path + "/nixos/modules/profiles/headless.nix") (pkgs'.path + "/nixos/modules/profiles/headless.nix")
(pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix") (pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix")
{ {

View file

@ -3,12 +3,11 @@ let
pkgs' = pkgs; pkgs' = pkgs;
in in
{ {
peerWithoutUser = pkgs.nixosTest { peerWithoutUser = pkgs.testers.runNixOSTest {
name = "postgresql-peerWithoutUser"; name = "postgresql-peerWithoutUser";
nodes.machine = { config, pkgs, ... }: { nodes.machine = { config, pkgs, ... }: {
imports = [ imports = [
(pkgs'.path + "/nixos/modules/profiles/minimal.nix")
(pkgs'.path + "/nixos/modules/profiles/headless.nix") (pkgs'.path + "/nixos/modules/profiles/headless.nix")
(pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix") (pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix")
../../modules/blocks/postgresql.nix ../../modules/blocks/postgresql.nix
@ -41,12 +40,11 @@ in
''; '';
}; };
peerAuth = pkgs.nixosTest { peerAuth = pkgs.testers.runNixOSTest {
name = "postgresql-peerAuth"; name = "postgresql-peerAuth";
nodes.machine = { config, pkgs, ... }: { nodes.machine = { config, pkgs, ... }: {
imports = [ imports = [
(pkgs'.path + "/nixos/modules/profiles/minimal.nix")
(pkgs'.path + "/nixos/modules/profiles/headless.nix") (pkgs'.path + "/nixos/modules/profiles/headless.nix")
(pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix") (pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix")
../../modules/blocks/postgresql.nix ../../modules/blocks/postgresql.nix
@ -92,12 +90,11 @@ in
''; '';
}; };
tcpIPWithoutPasswordAuth = pkgs.nixosTest { tcpIPWithoutPasswordAuth = pkgs.testers.runNixOSTest {
name = "postgresql-tcpIpWithoutPasswordAuth"; name = "postgresql-tcpIpWithoutPasswordAuth";
nodes.machine = { config, pkgs, ... }: { nodes.machine = { config, pkgs, ... }: {
imports = [ imports = [
(pkgs'.path + "/nixos/modules/profiles/minimal.nix")
(pkgs'.path + "/nixos/modules/profiles/headless.nix") (pkgs'.path + "/nixos/modules/profiles/headless.nix")
(pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix") (pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix")
../../modules/blocks/postgresql.nix ../../modules/blocks/postgresql.nix
@ -131,12 +128,11 @@ in
''; '';
}; };
tcpIPPasswordAuth = pkgs.nixosTest { tcpIPPasswordAuth = pkgs.testers.runNixOSTest {
name = "postgresql-tcpIPPasswordAuth"; name = "postgresql-tcpIPPasswordAuth";
nodes.machine = { config, pkgs, ... }: { nodes.machine = { config, pkgs, ... }: {
imports = [ imports = [
(pkgs'.path + "/nixos/modules/profiles/minimal.nix")
(pkgs'.path + "/nixos/modules/profiles/headless.nix") (pkgs'.path + "/nixos/modules/profiles/headless.nix")
(pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix") (pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix")
../../modules/blocks/postgresql.nix ../../modules/blocks/postgresql.nix

View file

@ -3,12 +3,11 @@ let
pkgs' = pkgs; pkgs' = pkgs;
in in
{ {
test = pkgs.nixosTest { test = pkgs.testers.runNixOSTest {
name = "ssl-test"; name = "ssl-test";
nodes.server = { config, pkgs, ... }: { nodes.server = { config, pkgs, ... }: {
imports = [ imports = [
(pkgs'.path + "/nixos/modules/profiles/minimal.nix")
(pkgs'.path + "/nixos/modules/profiles/headless.nix") (pkgs'.path + "/nixos/modules/profiles/headless.nix")
(pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix") (pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix")
../../modules/blocks/ssl.nix ../../modules/blocks/ssl.nix