From 28ee30d0d9e8f6ff95137e3d71713f03261dcf55 Mon Sep 17 00:00:00 2001 From: Rory& Date: Sat, 20 Jan 2024 19:19:07 +0100 Subject: [PATCH] draupnir: add tests --- nixos/tests/all-tests.nix | 1 + nixos/tests/matrix/draupnir.nix | 176 +++++++++++++++++++++++++++ pkgs/by-name/dr/draupnir/package.nix | 7 +- 3 files changed, 181 insertions(+), 3 deletions(-) create mode 100644 nixos/tests/matrix/draupnir.nix diff --git a/nixos/tests/all-tests.nix b/nixos/tests/all-tests.nix index 523035ae2a0adea..26b98419ad6ecd0 100644 --- a/nixos/tests/all-tests.nix +++ b/nixos/tests/all-tests.nix @@ -255,6 +255,7 @@ in { dolibarr = handleTest ./dolibarr.nix {}; domination = handleTest ./domination.nix {}; dovecot = handleTest ./dovecot.nix {}; + draupnir = handleTest ./matrix/draupnir.nix {}; drbd = handleTest ./drbd.nix {}; dublin-traceroute = handleTest ./dublin-traceroute.nix {}; earlyoom = handleTestOn ["x86_64-linux"] ./earlyoom.nix {}; diff --git a/nixos/tests/matrix/draupnir.nix b/nixos/tests/matrix/draupnir.nix new file mode 100644 index 000000000000000..8e1881cb5d35a3c --- /dev/null +++ b/nixos/tests/matrix/draupnir.nix @@ -0,0 +1,176 @@ +import ../make-test-python.nix ( + { pkgs, ... }: + let + # Set up SSL certs for Synapse to be happy. + runWithOpenSSL = file: cmd: pkgs.runCommand file + { + buildInputs = [ pkgs.openssl ]; + } + cmd; + + ca_key = runWithOpenSSL "ca-key.pem" "openssl genrsa -out $out 2048"; + ca_pem = runWithOpenSSL "ca.pem" '' + openssl req \ + -x509 -new -nodes -key ${ca_key} \ + -days 10000 -out $out -subj "/CN=snakeoil-ca" + ''; + key = runWithOpenSSL "matrix_key.pem" "openssl genrsa -out $out 2048"; + csr = runWithOpenSSL "matrix.csr" '' + openssl req \ + -new -key ${key} \ + -out $out -subj "/CN=localhost" \ + ''; + cert = runWithOpenSSL "matrix_cert.pem" '' + openssl x509 \ + -req -in ${csr} \ + -CA ${ca_pem} -CAkey ${ca_key} \ + -CAcreateserial -out $out \ + -days 365 + ''; + in + { + name = "draupnir"; + meta = with pkgs.lib; { + maintainers = [ maintainers.Rory ]; + }; + + nodes = { + homeserver = { pkgs, ... }: { + services.matrix-synapse = { + enable = true; + settings = { + database.name = "sqlite3"; + tls_certificate_path = "${cert}"; + tls_private_key_path = "${key}"; + enable_registration = true; + enable_registration_without_verification = true; + registration_shared_secret = "supersecret-registration"; + + listeners = [ { + # The default but tls=false + bind_addresses = [ + "0.0.0.0" + ]; + port = 8448; + resources = [ { + compress = true; + names = [ "client" ]; + } { + compress = false; + names = [ "federation" ]; + } ]; + tls = false; + type = "http"; + x_forwarded = false; + } ]; + }; + }; + + networking.firewall.allowedTCPPorts = [ 8448 ]; + + environment.systemPackages = [ + (pkgs.writeShellScriptBin "register_draupnir_user" '' + exec ${pkgs.matrix-synapse}/bin/register_new_matrix_user \ + -u draupnir \ + -p draupnir-password \ + --admin \ + --shared-secret supersecret-registration \ + http://localhost:8448 + '' + ) + (pkgs.writeShellScriptBin "register_moderator_user" '' + exec ${pkgs.matrix-synapse}/bin/register_new_matrix_user \ + -u moderator \ + -p moderator-password \ + --no-admin \ + --shared-secret supersecret-registration \ + http://localhost:8448 + '' + ) + ]; + }; + + draupnir = { pkgs, ... }: { + services.draupnir = { + enable = true; + homeserverUrl = "http://homeserver:8448"; + pantalaimon = { + enable = true; + username = "draupnir"; + passwordFile = pkgs.writeText "password.txt" "draupnir-password"; + # otherwise draupnir tries to connect to ::1, which is not listened by pantalaimon + options.listenAddress = "127.0.0.1"; + }; + managementRoom = "#moderators:homeserver"; + }; + }; + + client = { pkgs, ... }: { + environment.systemPackages = [ + (pkgs.writers.writePython3Bin "create_management_room_and_invite_draupnir" + { libraries = with pkgs.python3Packages; [ + matrix-nio + ] ++ matrix-nio.optional-dependencies.e2e; + } '' + import asyncio + + from nio import ( + AsyncClient, + EnableEncryptionBuilder + ) + + + async def main() -> None: + client = AsyncClient("http://homeserver:8448", "moderator") + + await client.login("moderator-password") + + room = await client.room_create( + name="Moderators", + alias="moderators", + initial_state=[EnableEncryptionBuilder().as_dict()], + ) + + await client.join(room.room_id) + await client.room_invite(room.room_id, "@draupnir:homeserver") + + asyncio.run(main()) + '' + ) + ]; + }; + }; + + testScript = '' + with subtest("start homeserver"): + homeserver.start() + + homeserver.wait_for_unit("matrix-synapse.service") + homeserver.wait_until_succeeds("curl --fail -L http://localhost:8448/") + + with subtest("register users"): + # register draupnir user + homeserver.succeed("register_draupnir_user") + # register moderator user + homeserver.succeed("register_moderator_user") + + with subtest("start draupnir"): + draupnir.start() + + # wait for pantalaimon to be ready + draupnir.wait_for_unit("pantalaimon-draupnir.service") + draupnir.wait_for_unit("draupnir.service") + + draupnir.wait_until_succeeds("curl --fail -L http://localhost:8009/") + + with subtest("ensure draupnir can be invited to the management room"): + client.start() + + client.wait_until_succeeds("curl --fail -L http://homeserver:8448/") + + client.succeed("create_management_room_and_invite_draupnir") + + draupnir.wait_for_console_text("Startup complete. Now monitoring rooms") + ''; + } +) diff --git a/pkgs/by-name/dr/draupnir/package.nix b/pkgs/by-name/dr/draupnir/package.nix index 261164527f8077b..f912aea53bf3eb9 100644 --- a/pkgs/by-name/dr/draupnir/package.nix +++ b/pkgs/by-name/dr/draupnir/package.nix @@ -6,6 +6,7 @@ , matrix-sdk-crypto-nodejs , mkYarnPackage , fetchYarnDeps +, nixosTests }: # docs: https://github.com/NixOS/nixpkgs/blob/master/doc/languages-frameworks/javascript.section.md#yarn2nix-javascript-yarn2nix @@ -66,9 +67,9 @@ mkYarnPackage rec { distPhase = "true"; passthru = { - #tests = { - # inherit (nixosTests) draupnir; - #}; + tests = { + inherit (nixosTests) draupnir; + }; updateScript = ./update.sh; };