119 lines
3.5 KiB
Nix
119 lines
3.5 KiB
Nix
{
|
|
self,
|
|
pkgs,
|
|
lib,
|
|
config,
|
|
...
|
|
}:
|
|
let
|
|
realm-export = pkgs.writeTextFile {
|
|
name = "realm-export.json";
|
|
text = builtins.readFile ./support/keycloak-realm-export/realm-export.json;
|
|
};
|
|
in
|
|
{
|
|
name = "keycloak";
|
|
|
|
hostPkgs = pkgs;
|
|
|
|
node.pkgs = pkgs;
|
|
node.specialArgs = self.outputs.nixosConfigurations.nachtigall._module.specialArgs;
|
|
|
|
nodes = {
|
|
acme-server = {
|
|
imports = [
|
|
self.nixosModules.home-manager
|
|
self.nixosModules.core
|
|
./support/ca.nix
|
|
];
|
|
};
|
|
|
|
client = {
|
|
imports = [
|
|
self.nixosModules.home-manager
|
|
self.nixosModules.core
|
|
./support/client.nix
|
|
];
|
|
};
|
|
|
|
nachtigall = {
|
|
imports = [
|
|
self.inputs.agenix.nixosModules.default
|
|
self.nixosModules.home-manager
|
|
self.nixosModules.core
|
|
self.nixosModules.backups
|
|
self.nixosModules.nginx
|
|
self.nixosModules.keycloak
|
|
self.nixosModules.postgresql
|
|
./support/global.nix
|
|
];
|
|
|
|
systemd.tmpfiles.rules = [ "f /tmp/dbf 1777 root root 10d password" ];
|
|
|
|
virtualisation.memorySize = 4096;
|
|
|
|
pub-solar-os.auth = {
|
|
enable = true;
|
|
database-password-file = "/tmp/dbf";
|
|
};
|
|
services.keycloak.database.createLocally = true;
|
|
services.keycloak.extraStartupFlags = [
|
|
"--import-realm"
|
|
"--file=${realm-export}"
|
|
];
|
|
|
|
networking.interfaces.eth0.ipv4.addresses = [
|
|
{
|
|
address = "192.168.1.3";
|
|
prefixLength = 32;
|
|
}
|
|
];
|
|
};
|
|
};
|
|
|
|
testScript =
|
|
{ nodes, ... }:
|
|
let
|
|
user = nodes.client.users.users.${nodes.client.pub-solar-os.authentication.username};
|
|
#uid = toString user.uid;
|
|
bus = "DBUS_SESSION_BUS_ADDRESS=unix:path=/run/user/$(id -u ${user.name})/bus";
|
|
gdbus = "${bus} gdbus";
|
|
su = command: "su - ${user.name} -c '${command}'";
|
|
gseval = "call --session -d org.gnome.Shell -o /org/gnome/Shell -m org.gnome.Shell.Eval";
|
|
wmClass = su "${gdbus} ${gseval} global.display.focus_window.wm_class";
|
|
in
|
|
''
|
|
def puppeteer_run(cmd):
|
|
client.succeed(f'puppeteer-run \'{cmd}\' ')
|
|
|
|
start_all()
|
|
|
|
nachtigall.wait_for_unit("system.slice")
|
|
nachtigall.succeed("ping 127.0.0.1 -c 2")
|
|
nachtigall.wait_for_unit("nginx.service")
|
|
nachtigall.wait_for_unit("keycloak.service")
|
|
nachtigall.wait_until_succeeds("curl http://127.0.0.1:8080/")
|
|
nachtigall.wait_until_succeeds("curl https://auth.test.pub.solar/")
|
|
|
|
client.wait_for_unit("system.slice")
|
|
client.wait_for_file("/tmp/puppeteer.sock")
|
|
puppeteer_run('page.goto("https://auth.test.pub.solar")')
|
|
puppeteer_run('page.waitForNetworkIdle()')
|
|
client.screenshot("initial")
|
|
puppeteer_run('page.locator("::-p-text(Sign in)").click()')
|
|
puppeteer_run('page.waitForNetworkIdle()')
|
|
client.screenshot("sign-in")
|
|
puppeteer_run('page.locator("::-p-text(Register)").click()')
|
|
puppeteer_run('page.waitForNetworkIdle()')
|
|
client.screenshot("register")
|
|
puppeteer_run('page.locator("[name=username]").fill("test-user")')
|
|
puppeteer_run('page.locator("[name=email]").fill("test-user@test.pub.solar")')
|
|
puppeteer_run('page.locator("[name=password]").fill("Password1234")')
|
|
puppeteer_run('page.locator("[name=password-confirm]").fill("Password1234")')
|
|
client.screenshot("register-filled-in")
|
|
puppeteer_run('page.locator("button::-p-text(Register)").click()')
|
|
puppeteer_run('page.waitForNetworkIdle()')
|
|
client.screenshot("after-register")
|
|
'';
|
|
}
|