mirror of
https://github.com/ilyakooo0/nixpkgs.git
synced 2024-12-29 06:45:54 +03:00
nixos/tests/matrix-synapse: generate ca and certificates
This commit is contained in:
parent
eb753318b3
commit
4a5f1bb9bc
@ -1,4 +1,32 @@
|
|||||||
import ./make-test.nix ({ pkgs, ... } : {
|
import ./make-test.nix ({ pkgs, ... } : let
|
||||||
|
|
||||||
|
|
||||||
|
runWithOpenSSL = file: cmd: pkgs.runCommand file {
|
||||||
|
buildInputs = [ pkgs.openssl ];
|
||||||
|
} cmd;
|
||||||
|
|
||||||
|
|
||||||
|
ca_key = runWithOpenSSL "ca-key.pem" "openssl genrsa -out $out 2048";
|
||||||
|
ca_pem = runWithOpenSSL "ca.pem" ''
|
||||||
|
openssl req \
|
||||||
|
-x509 -new -nodes -key ${ca_key} \
|
||||||
|
-days 10000 -out $out -subj "/CN=snakeoil-ca"
|
||||||
|
'';
|
||||||
|
key = runWithOpenSSL "matrix_key.pem" "openssl genrsa -out $out 2048";
|
||||||
|
csr = runWithOpenSSL "matrix.csr" ''
|
||||||
|
openssl req \
|
||||||
|
-new -key ${key} \
|
||||||
|
-out $out -subj "/CN=localhost" \
|
||||||
|
'';
|
||||||
|
cert = runWithOpenSSL "matrix_cert.pem" ''
|
||||||
|
openssl x509 \
|
||||||
|
-req -in ${csr} \
|
||||||
|
-CA ${ca_pem} -CAkey ${ca_key} \
|
||||||
|
-CAcreateserial -out $out \
|
||||||
|
-days 365
|
||||||
|
'';
|
||||||
|
|
||||||
|
in {
|
||||||
|
|
||||||
name = "matrix-synapse";
|
name = "matrix-synapse";
|
||||||
meta = with pkgs.stdenv.lib.maintainers; {
|
meta = with pkgs.stdenv.lib.maintainers; {
|
||||||
@ -8,23 +36,31 @@ import ./make-test.nix ({ pkgs, ... } : {
|
|||||||
nodes = {
|
nodes = {
|
||||||
# Since 0.33.0, matrix-synapse doesn't allow underscores in server names
|
# Since 0.33.0, matrix-synapse doesn't allow underscores in server names
|
||||||
serverpostgres = args: {
|
serverpostgres = args: {
|
||||||
services.matrix-synapse.enable = true;
|
services.matrix-synapse = {
|
||||||
services.matrix-synapse.database_type = "psycopg2";
|
enable = true;
|
||||||
|
database_type = "psycopg2";
|
||||||
|
tls_certificate_path = "${cert}";
|
||||||
|
tls_private_key_path = "${key}";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
serversqlite = args: {
|
serversqlite = args: {
|
||||||
services.matrix-synapse.enable = true;
|
services.matrix-synapse = {
|
||||||
services.matrix-synapse.database_type = "sqlite3";
|
enable = true;
|
||||||
|
database_type = "sqlite3";
|
||||||
|
tls_certificate_path = "${cert}";
|
||||||
|
tls_private_key_path = "${key}";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
testScript = ''
|
testScript = ''
|
||||||
startAll;
|
startAll;
|
||||||
$serverpostgres->waitForUnit("matrix-synapse.service");
|
$serverpostgres->waitForUnit("matrix-synapse.service");
|
||||||
$serverpostgres->waitUntilSucceeds("curl -Lk https://localhost:8448/");
|
$serverpostgres->waitUntilSucceeds("curl -L --cacert ${ca_pem} https://localhost:8448/");
|
||||||
$serverpostgres->requireActiveUnit("postgresql.service");
|
$serverpostgres->requireActiveUnit("postgresql.service");
|
||||||
$serversqlite->waitForUnit("matrix-synapse.service");
|
$serversqlite->waitForUnit("matrix-synapse.service");
|
||||||
$serversqlite->waitUntilSucceeds("curl -Lk https://localhost:8448/");
|
$serversqlite->waitUntilSucceeds("curl -L --cacert ${ca_pem} https://localhost:8448/");
|
||||||
$serversqlite->mustSucceed("[ -e /var/lib/matrix-synapse/homeserver.db ]");
|
$serversqlite->mustSucceed("[ -e /var/lib/matrix-synapse/homeserver.db ]");
|
||||||
'';
|
'';
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user