Compare commits
1 commit
a072ba0dd7
...
a76519ac01
Author | SHA1 | Date | |
---|---|---|---|
|
a76519ac01 |
2 changed files with 8 additions and 5 deletions
|
@ -7,24 +7,25 @@
|
|||
{ pkgs, lib, ... }:
|
||||
let
|
||||
inherit (pkgs) curl gnugrep;
|
||||
inherit (lib) mkForce genAttrs const;
|
||||
inherit (lib) mkForce;
|
||||
cloud-domain = "cloud.example.com";
|
||||
in
|
||||
{
|
||||
qois.cloud = {
|
||||
enable = true;
|
||||
domain = "cloud.example.com";
|
||||
domain = cloud-domain;
|
||||
package = pkgs.nextcloud31;
|
||||
adminpassFile = (pkgs.writeText "nextcloud-test-adminpass-file" "super secret password").outPath;
|
||||
adminpassFile = "${pkgs.writeText "adminpass" "insecure"}"; # Don't try this at home!
|
||||
};
|
||||
|
||||
qois.postgresql.package = pkgs.postgresql;
|
||||
sops.secrets = mkForce { };
|
||||
|
||||
# Disable TLS services
|
||||
services.nginx.virtualHosts = genAttrs [ "cloud.example.com" ] (const {
|
||||
services.nginx.virtualHosts."${cloud-domain}" = {
|
||||
forceSSL = mkForce false;
|
||||
enableACME = mkForce false;
|
||||
});
|
||||
};
|
||||
|
||||
# Test environment
|
||||
environment.systemPackages = [
|
||||
|
|
|
@ -1,6 +1,8 @@
|
|||
def test(subtest, webserver):
|
||||
webserver.wait_for_unit("nginx")
|
||||
webserver.wait_for_open_port(80)
|
||||
webserver.wait_for_unit("nextcloud-setup.service")
|
||||
webserver.wait_for_unit("phpfpm-nextcloud.service")
|
||||
|
||||
# Helpers
|
||||
def curl_variable_test(node, variable, expected, url):
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue