nixpkgs/nixos/tests/harmonia.nix

41 lines
1.3 KiB
Nix
Raw Normal View History

{ pkgs, lib, ... }:
2023-05-07 18:34:09 +02:00
{
name = "harmonia";
2023-05-07 18:34:09 +02:00
nodes = {
harmonia = {
services.harmonia = {
enable = true;
signKeyPath = pkgs.writeText "cache-key" "cache.example.com-1:9FhO0w+7HjZrhvmzT1VlAZw4OSAlFGTgC24Seg3tmPl4gZBdwZClzTTHr9cVzJpwsRSYLTu7hEAQe3ljy92CWg==";
settings.priority = 35;
2023-05-07 18:34:09 +02:00
};
networking.firewall.allowedTCPPorts = [ 5000 ];
system.extraDependencies = [ pkgs.emptyFile ];
# check that extra-allowed-users is effective for harmonia
nix.settings.allowed-users = [];
2023-05-07 18:34:09 +02:00
};
client01 = {
2023-05-07 18:34:09 +02:00
nix.settings = {
substituters = lib.mkForce [ "http://harmonia:5000" ];
trusted-public-keys = lib.mkForce [ "cache.example.com-1:eIGQXcGQpc00x6/XFcyacLEUmC07u4RAEHt5Y8vdglo=" ];
};
};
};
testScript = { nodes, ... }: ''
2023-05-07 18:34:09 +02:00
start_all()
harmonia.wait_for_unit("harmonia.service")
client01.wait_until_succeeds("curl -f http://harmonia:5000/nix-cache-info | grep '${toString nodes.harmonia.services.harmonia.settings.priority}' >&2")
client01.succeed("curl -f http://harmonia:5000/version | grep '${nodes.harmonia.services.harmonia.package.version}' >&2")
2023-05-07 18:34:09 +02:00
client01.succeed("cat /etc/nix/nix.conf >&2")
client01.succeed("nix-store --realise ${pkgs.emptyFile} --store /root/other-store")
2023-05-07 18:34:09 +02:00
'';
}