mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-11-15 14:26:33 +01:00
03e7a22654
I no longer contribute to this test nor do I plan to do so in the future. My contributions moved to nixosTests.forgejo, after we (nixpkgs) decided to split the gitea and forgejo nixpkgs modules.
165 lines
6.5 KiB
Nix
165 lines
6.5 KiB
Nix
{ system ? builtins.currentSystem,
|
|
config ? {},
|
|
giteaPackage ? pkgs.gitea,
|
|
pkgs ? import ../.. { inherit system config; }
|
|
}:
|
|
|
|
with import ../lib/testing-python.nix { inherit system pkgs; };
|
|
with pkgs.lib;
|
|
|
|
let
|
|
## gpg --faked-system-time='20230301T010000!' --quick-generate-key snakeoil ed25519 sign
|
|
signingPrivateKey = ''
|
|
-----BEGIN PGP PRIVATE KEY BLOCK-----
|
|
|
|
lFgEY/6jkBYJKwYBBAHaRw8BAQdADXiZRV8RJUyC9g0LH04wLMaJL9WTc+szbMi7
|
|
5fw4yP8AAQCl8EwGfzSLm/P6fCBfA3I9znFb3MEHGCCJhJ6VtKYyRw7ktAhzbmFr
|
|
ZW9pbIiUBBMWCgA8FiEE+wUM6VW/NLtAdSixTWQt6LZ4x50FAmP+o5ACGwMFCQPC
|
|
ZwAECwkIBwQVCgkIBRYCAwEAAh4FAheAAAoJEE1kLei2eMedFTgBAKQs1oGFZrCI
|
|
TZP42hmBTKxGAI1wg7VSdDEWTZxut/2JAQDGgo2sa4VHMfj0aqYGxrIwfP2B7JHO
|
|
GCqGCRf9O/hzBA==
|
|
=9Uy3
|
|
-----END PGP PRIVATE KEY BLOCK-----
|
|
'';
|
|
signingPrivateKeyId = "4D642DE8B678C79D";
|
|
|
|
supportedDbTypes = [ "mysql" "postgres" "sqlite3" ];
|
|
makeGiteaTest = type: nameValuePair type (makeTest {
|
|
name = "${giteaPackage.pname}-${type}";
|
|
meta.maintainers = with maintainers; [ aanderse kolaente ma27 ];
|
|
|
|
nodes = {
|
|
server = { config, pkgs, ... }: {
|
|
virtualisation.memorySize = 2047;
|
|
services.gitea = {
|
|
enable = true;
|
|
database = { inherit type; };
|
|
package = giteaPackage;
|
|
metricsTokenFile = (pkgs.writeText "metrics_secret" "fakesecret").outPath;
|
|
settings.service.DISABLE_REGISTRATION = true;
|
|
settings."repository.signing".SIGNING_KEY = signingPrivateKeyId;
|
|
settings.actions.ENABLED = true;
|
|
settings.metrics.ENABLED = true;
|
|
};
|
|
environment.systemPackages = [ giteaPackage pkgs.gnupg pkgs.jq ];
|
|
services.openssh.enable = true;
|
|
|
|
specialisation.runner = {
|
|
inheritParentConfig = true;
|
|
|
|
configuration.services.gitea-actions-runner.instances."test" = {
|
|
enable = true;
|
|
name = "ci";
|
|
url = "http://localhost:3000";
|
|
labels = [
|
|
# don't require docker/podman
|
|
"native:host"
|
|
];
|
|
tokenFile = "/var/lib/gitea/runner_token";
|
|
};
|
|
};
|
|
};
|
|
client1 = { config, pkgs, ... }: {
|
|
environment.systemPackages = [ pkgs.git ];
|
|
};
|
|
client2 = { config, pkgs, ... }: {
|
|
environment.systemPackages = [ pkgs.git ];
|
|
};
|
|
};
|
|
|
|
testScript = { nodes, ... }: let
|
|
inherit (import ./ssh-keys.nix pkgs) snakeOilPrivateKey snakeOilPublicKey;
|
|
serverSystem = nodes.server.system.build.toplevel;
|
|
in ''
|
|
GIT_SSH_COMMAND = "ssh -i $HOME/.ssh/privk -o StrictHostKeyChecking=no"
|
|
REPO = "gitea@server:test/repo"
|
|
PRIVK = "${snakeOilPrivateKey}"
|
|
|
|
start_all()
|
|
|
|
client1.succeed("mkdir /tmp/repo")
|
|
client1.succeed("mkdir -p $HOME/.ssh")
|
|
client1.succeed(f"cat {PRIVK} > $HOME/.ssh/privk")
|
|
client1.succeed("chmod 0400 $HOME/.ssh/privk")
|
|
client1.succeed("git -C /tmp/repo init")
|
|
client1.succeed("echo hello world > /tmp/repo/testfile")
|
|
client1.succeed("git -C /tmp/repo add .")
|
|
client1.succeed("git config --global user.email test@localhost")
|
|
client1.succeed("git config --global user.name test")
|
|
client1.succeed("git -C /tmp/repo commit -m 'Initial import'")
|
|
client1.succeed(f"git -C /tmp/repo remote add origin {REPO}")
|
|
|
|
server.wait_for_unit("gitea.service")
|
|
server.wait_for_open_port(3000)
|
|
server.wait_for_open_port(22)
|
|
server.succeed("curl --fail http://localhost:3000/")
|
|
|
|
server.succeed(
|
|
"su -l gitea -c 'gpg --homedir /var/lib/gitea/data/home/.gnupg "
|
|
+ "--import ${toString (pkgs.writeText "gitea.key" signingPrivateKey)}'"
|
|
)
|
|
|
|
assert "BEGIN PGP PUBLIC KEY BLOCK" in server.succeed("curl http://localhost:3000/api/v1/signing-key.gpg")
|
|
|
|
server.succeed(
|
|
"curl --fail http://localhost:3000/user/sign_up | grep 'Registration is disabled. "
|
|
+ "Please contact your site administrator.'"
|
|
)
|
|
server.succeed(
|
|
"su -l gitea -c 'GITEA_WORK_DIR=/var/lib/gitea gitea admin user create "
|
|
+ "--username test --password totallysafe --email test@localhost'"
|
|
)
|
|
|
|
api_token = server.succeed(
|
|
"curl --fail -X POST http://test:totallysafe@localhost:3000/api/v1/users/test/tokens "
|
|
+ "-H 'Accept: application/json' -H 'Content-Type: application/json' -d "
|
|
+ "'{\"name\":\"token\",\"scopes\":[\"all\"]}' | jq '.sha1' | xargs echo -n"
|
|
)
|
|
|
|
server.succeed(
|
|
"curl --fail -X POST http://localhost:3000/api/v1/user/repos "
|
|
+ "-H 'Accept: application/json' -H 'Content-Type: application/json' "
|
|
+ f"-H 'Authorization: token {api_token}'"
|
|
+ ' -d \'{"auto_init":false, "description":"string", "license":"mit", "name":"repo", "private":false}\'''
|
|
)
|
|
|
|
server.succeed(
|
|
"curl --fail -X POST http://localhost:3000/api/v1/user/keys "
|
|
+ "-H 'Accept: application/json' -H 'Content-Type: application/json' "
|
|
+ f"-H 'Authorization: token {api_token}'"
|
|
+ ' -d \'{"key":"${snakeOilPublicKey}","read_only":true,"title":"SSH"}\'''
|
|
)
|
|
|
|
client1.succeed(
|
|
f"GIT_SSH_COMMAND='{GIT_SSH_COMMAND}' git -C /tmp/repo push origin master"
|
|
)
|
|
|
|
client2.succeed("mkdir -p $HOME/.ssh")
|
|
client2.succeed(f"cat {PRIVK} > $HOME/.ssh/privk")
|
|
client2.succeed("chmod 0400 $HOME/.ssh/privk")
|
|
client2.succeed(f"GIT_SSH_COMMAND='{GIT_SSH_COMMAND}' git clone {REPO}")
|
|
client2.succeed('test "$(cat repo/testfile | xargs echo -n)" = "hello world"')
|
|
|
|
server.wait_until_succeeds(
|
|
'test "$(curl http://localhost:3000/api/v1/repos/test/repo/commits '
|
|
+ '-H "Accept: application/json" | jq length)" = "1"'
|
|
)
|
|
|
|
with subtest("Testing metrics endpoint"):
|
|
server.succeed('curl '
|
|
+ '-H "Authorization: Bearer fakesecret" '
|
|
+ 'http://localhost:3000/metrics '
|
|
+ '| grep gitea_accesses')
|
|
|
|
with subtest("Testing runner registration"):
|
|
server.succeed(
|
|
"su -l gitea -c 'GITEA_WORK_DIR=/var/lib/gitea gitea actions generate-runner-token' | sed 's/^/TOKEN=/' | tee /var/lib/gitea/runner_token"
|
|
)
|
|
server.succeed("${serverSystem}/specialisation/runner/bin/switch-to-configuration test")
|
|
server.wait_for_unit("gitea-runner-test.service")
|
|
server.succeed("journalctl -o cat -u gitea-runner-test.service | grep -q 'Runner registered successfully'")
|
|
'';
|
|
});
|
|
in
|
|
|
|
listToAttrs (map makeGiteaTest supportedDbTypes)
|