From c9844276b8a6a6b3aae3d603bb4b33ea0e434740 Mon Sep 17 00:00:00 2001 From: Fabian Hauser Date: Mon, 24 Mar 2025 14:17:53 +0200 Subject: [PATCH] Implement nixos-modules/static-page test --- .gitignore | 1 + checks/README.md | 18 ++++++++ checks/default.nix | 4 ++ checks/nixos-modules/default.nix | 9 ++++ checks/nixos-modules/static-page/default.nix | 45 +++++++++++++++++++ checks/nixos-modules/static-page/test.py | 46 ++++++++++++++++++++ nixos-modules/static-page/default-pages.nix | 4 +- nixos-modules/static-page/default.nix | 1 - 8 files changed, 124 insertions(+), 4 deletions(-) create mode 100644 checks/README.md create mode 100644 checks/nixos-modules/default.nix create mode 100644 checks/nixos-modules/static-page/default.nix create mode 100644 checks/nixos-modules/static-page/test.py diff --git a/.gitignore b/.gitignore index 9e92574..900f5b8 100644 --- a/.gitignore +++ b/.gitignore @@ -5,3 +5,4 @@ result* /.direnv /book /.sops.yaml +/.nixos-test-history diff --git a/checks/README.md b/checks/README.md new file mode 100644 index 0000000..9cd9539 --- /dev/null +++ b/checks/README.md @@ -0,0 +1,18 @@ +# Tests + +## Module Tests + +We test our nixos modules with [NixOS tests](https://nixos.org/manual/nixos/stable/index.html#sec-nixos-tests). +Running nixos tests requires QEMU virtualisation, so make sure you have KVM virtualisation support enabled. + +Run all: `nix build .#checks.x86_64-linux.nixos-modules` +Run single test: `nix build .#checks.x86_64-linux.nixos-modules.entries.vm-test-run-testNameAsInDerivationName` + +### Run Test Interactively + +See [upstream documentation](https://nixos.org/manual/nixos/stable/#sec-running-nixos-tests-interactively) for more details. + +```bash +nix build .#checks.x86_64-linux.nixos-modules.entries.vm-test-run-testNameAsInDerivationName.driverInteractive +./result/bin/nixos-test-driver +``` diff --git a/checks/default.nix b/checks/default.nix index ae33fc0..bf629ba 100644 --- a/checks/default.nix +++ b/checks/default.nix @@ -16,6 +16,10 @@ mkdir $out ''; + nixos-modules = pkgs.callPackage ./nixos-modules { + inherit (self.lib) loadSubmodulesFrom; + }; + #TODO(#29): Integration/System tests # Import deploy-rs tests diff --git a/checks/nixos-modules/default.nix b/checks/nixos-modules/default.nix new file mode 100644 index 0000000..8ddddcf --- /dev/null +++ b/checks/nixos-modules/default.nix @@ -0,0 +1,9 @@ +{ + linkFarmFromDrvs, + callPackage, + loadSubmodulesFrom, +}: +let + tests = map (test: callPackage test { }) (loadSubmodulesFrom ./.); +in +linkFarmFromDrvs "nixos-modules" tests diff --git a/checks/nixos-modules/static-page/default.nix b/checks/nixos-modules/static-page/default.nix new file mode 100644 index 0000000..1d90105 --- /dev/null +++ b/checks/nixos-modules/static-page/default.nix @@ -0,0 +1,45 @@ +{ + testers, + curl, + lib, + gnugrep, + ... +}: +testers.runNixOSTest { + name = "static-page"; + + nodes.webserver = + { ... }: + { + # Service under test + imports = [ ../../../nixos-modules/static-page ]; + qois.static-page = { + enable = true; + pages = lib.mkForce { + "localhost" = { + domainAliases = [ "example.com" ]; + }; + }; + }; + + # Test environment + environment.systemPackages = [ + curl + gnugrep + ]; + # Disable TLS services + services.nginx.virtualHosts = + let + tlsOff = { + forceSSL = lib.mkForce false; + enableACME = lib.mkForce false; + }; + in + { + "localhost" = tlsOff; + "example.com" = tlsOff; + }; + }; + + testScript = lib.readFile ./test.py; +} diff --git a/checks/nixos-modules/static-page/test.py b/checks/nixos-modules/static-page/test.py new file mode 100644 index 0000000..d084c5e --- /dev/null +++ b/checks/nixos-modules/static-page/test.py @@ -0,0 +1,46 @@ +webserver.wait_for_unit("nginx") +webserver.wait_for_open_port(80) + +# Preparations +webserverRoot = "/var/lib/nginx-localhost/root" +indexContent = "It works!" +webserver.succeed(f"mkdir {webserverRoot}") +webserver.succeed(f"echo '{indexContent}' > {webserverRoot}/index.html") +webserver.succeed(f"chown -R nginx-localhost\: {webserverRoot}") + +# Helpers + + +def expect_http_code(node, code, url): + http_code = node.succeed( + f"curl -s --no-location -o /dev/null -w '%{{http_code}}' '{url}'") + assert http_code == code, \ + f"expected {code} but got following response:\n{http_code}" + + +def expect_http_location(node, location, url): + redirect_url = node.succeed( + f"curl -s --no-location -o /dev/null -w '%{{redirect_url}}' '{url}'") + assert redirect_url == location, \ + f"expected redirect to {location} but got:\n{redirect_url}" + + +def expect_http_content(node, expectedContent, url): + content = node.succeed(f"curl --no-location --silent '{url}'") + assert content.strip() == expectedContent.strip(), \ + f"expected:\n{expectedContent}\n at { + url} but got following content:\n'{content}'" + + +# Tests +with subtest("website is successfully served on localhost"): + expect_http_code(webserver, "200", "http://localhost/index.html") + expect_http_content(webserver, indexContent, "http://localhost/index.html") + +with subtest("example.com is a hosts alias and redirects to localhost"): + webserver.succeed("grep example.com /etc/hosts") + + url = "http://example.com/index.html" + expect_http_code(webserver, "301", url) + expect_http_location( + webserver, "http://localhost/index.html", url) diff --git a/nixos-modules/static-page/default-pages.nix b/nixos-modules/static-page/default-pages.nix index 765d092..5a8b718 100644 --- a/nixos-modules/static-page/default-pages.nix +++ b/nixos-modules/static-page/default-pages.nix @@ -1,12 +1,10 @@ { - config, - pkgs, lib, ... }: { - qois.static-page.pages = { + qois.static-page.pages = lib.mkDefault { "fabianhauser.ch" = { domainAliases = [ "www.fabianhauser.ch" diff --git a/nixos-modules/static-page/default.nix b/nixos-modules/static-page/default.nix index 8ee20a0..25859b1 100644 --- a/nixos-modules/static-page/default.nix +++ b/nixos-modules/static-page/default.nix @@ -1,6 +1,5 @@ { config, - pkgs, lib, ... }: