2019-11-27 09:50:26 +00:00
|
|
|
import ../make-test-python.nix ({ pkgs, ...}: let
|
2018-06-29 18:17:54 +01:00
|
|
|
adminpass = "hunter2";
|
|
|
|
adminuser = "custom-admin-username";
|
|
|
|
in {
|
|
|
|
name = "nextcloud-with-postgresql-and-redis";
|
|
|
|
meta = with pkgs.stdenv.lib.maintainers; {
|
|
|
|
maintainers = [ eqyiel ];
|
|
|
|
};
|
|
|
|
|
|
|
|
nodes = {
|
|
|
|
# The only thing the client needs to do is download a file.
|
|
|
|
client = { ... }: {};
|
|
|
|
|
|
|
|
nextcloud = { config, pkgs, ... }: {
|
|
|
|
networking.firewall.allowedTCPPorts = [ 80 ];
|
|
|
|
|
|
|
|
services.nextcloud = {
|
|
|
|
enable = true;
|
|
|
|
hostName = "nextcloud";
|
|
|
|
caching = {
|
|
|
|
apcu = false;
|
|
|
|
redis = true;
|
|
|
|
memcached = false;
|
|
|
|
};
|
|
|
|
config = {
|
|
|
|
dbtype = "pgsql";
|
|
|
|
dbname = "nextcloud";
|
|
|
|
dbuser = "nextcloud";
|
2019-10-13 13:32:14 +01:00
|
|
|
dbhost = "/run/postgresql";
|
2018-06-29 18:17:54 +01:00
|
|
|
inherit adminuser;
|
|
|
|
adminpassFile = toString (pkgs.writeText "admin-pass-file" ''
|
|
|
|
${adminpass}
|
|
|
|
'');
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
services.redis = {
|
|
|
|
enable = true;
|
|
|
|
};
|
|
|
|
|
2019-08-13 22:52:01 +01:00
|
|
|
systemd.services.nextcloud-setup= {
|
2018-06-29 18:17:54 +01:00
|
|
|
requires = ["postgresql.service"];
|
|
|
|
after = [
|
|
|
|
"postgresql.service"
|
|
|
|
];
|
|
|
|
};
|
|
|
|
|
|
|
|
services.postgresql = {
|
|
|
|
enable = true;
|
2019-06-28 16:54:11 +01:00
|
|
|
ensureDatabases = [ "nextcloud" ];
|
|
|
|
ensureUsers = [
|
|
|
|
{ name = "nextcloud";
|
|
|
|
ensurePermissions."DATABASE nextcloud" = "ALL PRIVILEGES";
|
|
|
|
}
|
|
|
|
];
|
2018-06-29 18:17:54 +01:00
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
testScript = let
|
|
|
|
configureRedis = pkgs.writeScript "configure-redis" ''
|
2020-04-07 07:25:48 +01:00
|
|
|
#!${pkgs.runtimeShell}
|
2019-10-13 13:32:14 +01:00
|
|
|
nextcloud-occ config:system:set redis 'host' --value 'localhost' --type string
|
|
|
|
nextcloud-occ config:system:set redis 'port' --value 6379 --type integer
|
2018-06-29 18:17:54 +01:00
|
|
|
nextcloud-occ config:system:set memcache.local --value '\OC\Memcache\Redis' --type string
|
|
|
|
nextcloud-occ config:system:set memcache.locking --value '\OC\Memcache\Redis' --type string
|
|
|
|
'';
|
|
|
|
withRcloneEnv = pkgs.writeScript "with-rclone-env" ''
|
2020-04-07 07:25:48 +01:00
|
|
|
#!${pkgs.runtimeShell}
|
2018-06-29 18:17:54 +01:00
|
|
|
export RCLONE_CONFIG_NEXTCLOUD_TYPE=webdav
|
|
|
|
export RCLONE_CONFIG_NEXTCLOUD_URL="http://nextcloud/remote.php/webdav/"
|
|
|
|
export RCLONE_CONFIG_NEXTCLOUD_VENDOR="nextcloud"
|
|
|
|
export RCLONE_CONFIG_NEXTCLOUD_USER="${adminuser}"
|
|
|
|
export RCLONE_CONFIG_NEXTCLOUD_PASS="$(${pkgs.rclone}/bin/rclone obscure ${adminpass})"
|
|
|
|
"''${@}"
|
|
|
|
'';
|
|
|
|
copySharedFile = pkgs.writeScript "copy-shared-file" ''
|
2020-04-07 07:25:48 +01:00
|
|
|
#!${pkgs.runtimeShell}
|
2018-06-29 18:17:54 +01:00
|
|
|
echo 'hi' | ${pkgs.rclone}/bin/rclone rcat nextcloud:test-shared-file
|
|
|
|
'';
|
|
|
|
|
|
|
|
diffSharedFile = pkgs.writeScript "diff-shared-file" ''
|
2020-04-07 07:25:48 +01:00
|
|
|
#!${pkgs.runtimeShell}
|
2018-06-29 18:17:54 +01:00
|
|
|
diff <(echo 'hi') <(${pkgs.rclone}/bin/rclone cat nextcloud:test-shared-file)
|
|
|
|
'';
|
|
|
|
in ''
|
2019-11-27 09:50:26 +00:00
|
|
|
start_all()
|
|
|
|
nextcloud.wait_for_unit("multi-user.target")
|
|
|
|
nextcloud.succeed("${configureRedis}")
|
|
|
|
nextcloud.succeed("curl -sSf http://nextcloud/login")
|
|
|
|
nextcloud.succeed(
|
|
|
|
"${withRcloneEnv} ${copySharedFile}"
|
|
|
|
)
|
|
|
|
client.wait_for_unit("multi-user.target")
|
|
|
|
client.succeed(
|
|
|
|
"${withRcloneEnv} ${diffSharedFile}"
|
|
|
|
)
|
2018-06-29 18:17:54 +01:00
|
|
|
'';
|
|
|
|
})
|