2024-08-24 14:21:48 +00:00
|
|
|
{
|
|
|
|
self,
|
|
|
|
pkgs,
|
|
|
|
lib,
|
|
|
|
config,
|
|
|
|
...
|
2024-08-25 00:41:29 +00:00
|
|
|
}:
|
|
|
|
let
|
2024-08-26 20:49:46 +00:00
|
|
|
realm-export = pkgs.writeTextFile {
|
|
|
|
name = "realm-export.json";
|
|
|
|
text = builtins.readFile ./support/keycloak-realm-export/realm-export.json;
|
|
|
|
};
|
2024-08-25 00:41:29 +00:00
|
|
|
in
|
|
|
|
{
|
2024-08-24 14:21:48 +00:00
|
|
|
name = "keycloak";
|
|
|
|
|
|
|
|
hostPkgs = pkgs;
|
|
|
|
|
|
|
|
node.pkgs = pkgs;
|
|
|
|
node.specialArgs = self.outputs.nixosConfigurations.nachtigall._module.specialArgs;
|
|
|
|
|
|
|
|
nodes = {
|
|
|
|
acme-server = {
|
|
|
|
imports = [
|
|
|
|
self.nixosModules.home-manager
|
|
|
|
self.nixosModules.core
|
|
|
|
./support/ca.nix
|
|
|
|
];
|
|
|
|
};
|
|
|
|
|
|
|
|
client = {
|
|
|
|
imports = [
|
|
|
|
self.nixosModules.home-manager
|
|
|
|
self.nixosModules.core
|
|
|
|
./support/client.nix
|
|
|
|
];
|
|
|
|
};
|
|
|
|
|
|
|
|
nachtigall = {
|
|
|
|
imports = [
|
|
|
|
self.inputs.agenix.nixosModules.default
|
|
|
|
self.nixosModules.home-manager
|
|
|
|
self.nixosModules.core
|
|
|
|
self.nixosModules.backups
|
|
|
|
self.nixosModules.nginx
|
|
|
|
self.nixosModules.keycloak
|
|
|
|
self.nixosModules.postgresql
|
|
|
|
./support/global.nix
|
|
|
|
];
|
|
|
|
|
2024-08-25 00:41:29 +00:00
|
|
|
systemd.tmpfiles.rules = [ "f /tmp/dbf 1777 root root 10d password" ];
|
2024-08-24 14:21:48 +00:00
|
|
|
|
2024-08-25 00:28:02 +00:00
|
|
|
virtualisation.memorySize = 4096;
|
|
|
|
|
2024-08-24 14:21:48 +00:00
|
|
|
pub-solar-os.auth = {
|
|
|
|
enable = true;
|
|
|
|
database-password-file = "/tmp/dbf";
|
|
|
|
};
|
2024-08-25 00:28:02 +00:00
|
|
|
services.keycloak.database.createLocally = true;
|
2024-08-26 20:49:46 +00:00
|
|
|
services.keycloak.extraStartupFlags = [
|
|
|
|
"--import-realm"
|
|
|
|
"--file=${realm-export}"
|
|
|
|
];
|
2024-08-24 14:21:48 +00:00
|
|
|
|
|
|
|
networking.interfaces.eth0.ipv4.addresses = [
|
|
|
|
{
|
|
|
|
address = "192.168.1.3";
|
|
|
|
prefixLength = 32;
|
|
|
|
}
|
|
|
|
];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2024-08-25 00:41:29 +00:00
|
|
|
testScript =
|
2024-08-27 11:37:28 +00:00
|
|
|
{ ... }: ''
|
2024-08-26 20:49:46 +00:00
|
|
|
def puppeteer_run(cmd):
|
|
|
|
client.succeed(f'puppeteer-run \'{cmd}\' ')
|
|
|
|
|
2024-08-25 00:41:29 +00:00
|
|
|
start_all()
|
2024-08-24 14:21:48 +00:00
|
|
|
|
2024-08-25 00:41:29 +00:00
|
|
|
nachtigall.wait_for_unit("system.slice")
|
|
|
|
nachtigall.succeed("ping 127.0.0.1 -c 2")
|
|
|
|
nachtigall.wait_for_unit("nginx.service")
|
|
|
|
nachtigall.wait_for_unit("keycloak.service")
|
|
|
|
nachtigall.wait_until_succeeds("curl http://127.0.0.1:8080/")
|
|
|
|
nachtigall.wait_until_succeeds("curl https://auth.test.pub.solar/")
|
2024-08-24 14:21:48 +00:00
|
|
|
|
2024-08-25 00:41:29 +00:00
|
|
|
client.wait_for_unit("system.slice")
|
2024-08-26 17:00:57 +00:00
|
|
|
client.wait_for_file("/tmp/puppeteer.sock")
|
2024-08-26 20:49:46 +00:00
|
|
|
puppeteer_run('page.goto("https://auth.test.pub.solar")')
|
|
|
|
puppeteer_run('page.waitForNetworkIdle()')
|
|
|
|
client.screenshot("initial")
|
|
|
|
puppeteer_run('page.locator("::-p-text(Sign in)").click()')
|
|
|
|
puppeteer_run('page.waitForNetworkIdle()')
|
|
|
|
client.screenshot("sign-in")
|
|
|
|
puppeteer_run('page.locator("::-p-text(Register)").click()')
|
|
|
|
puppeteer_run('page.waitForNetworkIdle()')
|
|
|
|
client.screenshot("register")
|
|
|
|
puppeteer_run('page.locator("[name=username]").fill("test-user")')
|
|
|
|
puppeteer_run('page.locator("[name=email]").fill("test-user@test.pub.solar")')
|
|
|
|
puppeteer_run('page.locator("[name=password]").fill("Password1234")')
|
|
|
|
puppeteer_run('page.locator("[name=password-confirm]").fill("Password1234")')
|
|
|
|
client.screenshot("register-filled-in")
|
|
|
|
puppeteer_run('page.locator("button::-p-text(Register)").click()')
|
|
|
|
puppeteer_run('page.waitForNetworkIdle()')
|
|
|
|
client.screenshot("after-register")
|
2024-08-25 00:41:29 +00:00
|
|
|
'';
|
2024-08-24 14:21:48 +00:00
|
|
|
}
|