425e511792
Automated changes by the [update-flake-lock](https://github.com/DeterminateSystems/update-flake-lock) GitHub Action. ``` Flake lock file updates: • Updated input 'nixpkgs': 'github:nixos/nixpkgs/b06025f1533a1e07b6db3e75151caa155d1c7eb3?narHash=sha256-qrxvLS888pNJFwJdK%2Bhf1wpRCSQcqA6W5%2BOx202NDa0%3D' (2024-03-19) → 'github:nixos/nixpkgs/5672bc9dbf9d88246ddab5ac454e82318d094bb8?narHash=sha256-NLznXB5AOnniUtZsyy/aPWOk8ussTuePp2acb9U%2BISA%3D' (2024-04-16) • Updated input 'sops-nix': 'github:Mic92/sops-nix/83b68a0e8c94b72cdd0a6e547a14ca7eb1c03616?narHash=sha256-RquCuzxfy4Nr8DPbdp3D/AsbYep21JgQzG8aMH9jJ4A%3D' (2024-03-17) → 'github:Mic92/sops-nix/cc535d07cbcdd562bcca418e475c7b1959cefa4b?narHash=sha256-APoDs2GtzVrsE%2BZ9w72qpHzEtEDfuinWcNTN7zhwLxg%3D' (2024-04-15) • Updated input 'sops-nix/nixpkgs': 'github:NixOS/nixpkgs/9af9c1c87ed3e3ed271934cb896e0cdd33dae212?narHash=sha256-huQT4Xs0y4EeFKn2BTBVYgEwJSv8SDlm82uWgMnCMmI%3D' (2024-03-15) → 'github:NixOS/nixpkgs/a0c9e3aee1000ac2bfb0e5b98c94c946a5d180a9?narHash=sha256-icE1IJE9fHcbDfJ0%2BqWoDdcBXUoZCcIJxME4lMHwvSM%3D' (2024-04-12) • Updated input 'sops-nix/nixpkgs-stable': 'github:NixOS/nixpkgs/6dc11d9859d6a18ab0c5e5829a5b8e4810658de3?narHash=sha256-y%2Bl3eH53UlENaYa1lmnCBHusZb1kxBEFd2/c7lDsGpw%3D' (2024-03-16) → 'github:NixOS/nixpkgs/c27f3b6d8e29346af16eecc0e9d54b1071eae27e?narHash=sha256-RifMwYuKu5v6x6O65msKDTqKkQ9crGwOB7yr20qMEuE%3D' (2024-04-13) ``` ### Running GitHub Actions on this PR GitHub Actions will not run workflows on pull requests which are opened by a GitHub Action. To run GitHub Actions workflows on this PR, run: ```sh git branch -D update_flake_lock_action git fetch origin git checkout update_flake_lock_action git commit --amend --no-edit git push origin update_flake_lock_action --force ``` --------- Co-authored-by: github-actions[bot] <github-actions[bot]@users.noreply.github.com>
94 lines
2.9 KiB
Nix
94 lines
2.9 KiB
Nix
{ pkgs, lib, ... }:
|
|
let
|
|
pkgs' = pkgs;
|
|
# TODO: Test login
|
|
commonTestScript = appname: { nodes, ... }:
|
|
let
|
|
shbapp = nodes.server.shb.arr.${appname};
|
|
hasSSL = !(isNull shbapp.ssl);
|
|
fqdn = if hasSSL then "https://${appname}.example.com" else "http://${appname}.example.com";
|
|
healthUrl = "/health";
|
|
loginUrl = "/UI/Login";
|
|
in
|
|
''
|
|
import json
|
|
import os
|
|
import pathlib
|
|
|
|
start_all()
|
|
server.wait_for_unit("${appname}.service")
|
|
server.wait_for_unit("nginx.service")
|
|
server.wait_for_open_port(${builtins.toString shbapp.settings.Port})
|
|
|
|
if ${if hasSSL then "True" else "False"}:
|
|
server.copy_from_vm("/etc/ssl/certs/ca-certificates.crt")
|
|
client.succeed("rm -r /etc/ssl/certs")
|
|
client.copy_from_host(str(pathlib.Path(os.environ.get("out", os.getcwd())) / "ca-certificates.crt"), "/etc/ssl/certs/ca-certificates.crt")
|
|
|
|
def curl(target, format, endpoint, succeed=True):
|
|
return json.loads(target.succeed(
|
|
"curl -X GET --fail-with-body --silent --show-error --output /dev/null --location"
|
|
+ " --connect-to ${appname}.example.com:443:server:443"
|
|
+ " --connect-to ${appname}.example.com:80:server:80"
|
|
+ " --cookie-jar /tmp/cookies"
|
|
# Uncomment for debugging:
|
|
# + " -v"
|
|
+ f" --write-out '{format}'"
|
|
+ " " + endpoint
|
|
))
|
|
|
|
with subtest("health"):
|
|
response = curl(client, """{"code":%{response_code}}""", "${fqdn}${healthUrl}")
|
|
|
|
if response['code'] != 200:
|
|
raise Exception(f"Code is {response['code']}")
|
|
|
|
with subtest("login"):
|
|
response = curl(client, """{"code":%{response_code}}""", "${fqdn}${loginUrl}")
|
|
|
|
if response['code'] != 200:
|
|
raise Exception(f"Code is {response['code']}")
|
|
'';
|
|
|
|
basic = appname: pkgs.testers.runNixOSTest {
|
|
name = "arr-${appname}-basic";
|
|
|
|
nodes.server = { config, pkgs, ... }: {
|
|
imports = [
|
|
{
|
|
options = {
|
|
shb.backup = lib.mkOption { type = lib.types.anything; };
|
|
};
|
|
}
|
|
../../modules/blocks/authelia.nix
|
|
../../modules/blocks/postgresql.nix
|
|
../../modules/blocks/nginx.nix
|
|
../../modules/services/arr.nix
|
|
(pkgs'.path + "/nixos/modules/profiles/headless.nix")
|
|
(pkgs'.path + "/nixos/modules/profiles/qemu-guest.nix")
|
|
];
|
|
|
|
shb.arr.${appname} = {
|
|
enable = true;
|
|
domain = "example.com";
|
|
subdomain = appname;
|
|
|
|
settings.APIKey.source = pkgs.writeText "APIKey" "01234567890123456789"; # Needs to be >=20 characters.
|
|
};
|
|
# Nginx port.
|
|
networking.firewall.allowedTCPPorts = [ 80 ];
|
|
};
|
|
|
|
nodes.client = {};
|
|
|
|
testScript = commonTestScript appname;
|
|
};
|
|
in
|
|
{
|
|
radarr_basic = basic "radarr";
|
|
sonarr_basic = basic "sonarr";
|
|
bazarr_basic = basic "bazarr";
|
|
readarr_basic = basic "readarr";
|
|
lidarr_basic = basic "lidarr";
|
|
jackett_basic = basic "jackett";
|
|
}
|