2019-05-08 11:28:02 +00:00
|
|
|
{
|
|
|
|
description = "A Nix-based continuous build system";
|
|
|
|
|
2020-10-20 10:21:06 +00:00
|
|
|
inputs.nixpkgs.follows = "nix/nixpkgs";
|
2019-09-24 17:58:10 +00:00
|
|
|
|
2019-09-17 15:25:59 +00:00
|
|
|
outputs = { self, nixpkgs, nix }:
|
2019-08-09 11:10:50 +00:00
|
|
|
let
|
2019-09-17 15:25:59 +00:00
|
|
|
|
2020-04-09 13:44:53 +00:00
|
|
|
version = "${builtins.readFile ./version}.${builtins.substring 0 8 self.lastModifiedDate}.${self.shortRev or "DIRTY"}";
|
2019-09-17 15:25:59 +00:00
|
|
|
|
|
|
|
pkgs = import nixpkgs {
|
|
|
|
system = "x86_64-linux";
|
2019-10-04 15:32:29 +00:00
|
|
|
overlays = [ self.overlay nix.overlay ];
|
2019-05-22 12:44:10 +00:00
|
|
|
};
|
2019-09-17 15:25:59 +00:00
|
|
|
|
|
|
|
# NixOS configuration used for VM tests.
|
|
|
|
hydraServer =
|
|
|
|
{ config, pkgs, ... }:
|
2019-09-24 17:58:10 +00:00
|
|
|
{ imports = [ self.nixosModules.hydraTest ];
|
2019-09-17 15:25:59 +00:00
|
|
|
|
|
|
|
virtualisation.memorySize = 1024;
|
|
|
|
virtualisation.writableStore = true;
|
|
|
|
|
|
|
|
environment.systemPackages = [ pkgs.perlPackages.LWP pkgs.perlPackages.JSON ];
|
|
|
|
|
|
|
|
nix = {
|
|
|
|
# Without this nix tries to fetch packages from the default
|
|
|
|
# cache.nixos.org which is not reachable from this sandboxed NixOS test.
|
|
|
|
binaryCaches = [];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2019-08-09 11:10:50 +00:00
|
|
|
in rec {
|
2019-05-08 11:28:02 +00:00
|
|
|
|
2019-09-17 15:25:59 +00:00
|
|
|
# A Nixpkgs overlay that provides a 'hydra' package.
|
|
|
|
overlay = final: prev: {
|
|
|
|
|
2020-09-09 11:30:43 +00:00
|
|
|
# Add LDAP dependencies that aren't currently found within nixpkgs.
|
|
|
|
perlPackages = prev.perlPackages // {
|
|
|
|
NetLDAPServer = prev.perlPackages.buildPerlPackage {
|
|
|
|
pname = "Net-LDAP-Server";
|
|
|
|
version = "0.43";
|
|
|
|
src = final.fetchurl {
|
|
|
|
url = "mirror://cpan/authors/id/A/AA/AAR/Net-LDAP-Server-0.43.tar.gz";
|
|
|
|
sha256 = "0qmh3cri3fpccmwz6bhwp78yskrb3qmalzvqn0a23hqbsfs4qv6x";
|
|
|
|
};
|
|
|
|
propagatedBuildInputs = with final.perlPackages; [ NetLDAP ConvertASN1 ];
|
|
|
|
meta = {
|
|
|
|
description = "LDAP server side protocol handling";
|
|
|
|
license = with final.stdenv.lib.licenses; [ artistic1 ];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
NetLDAPSID = prev.perlPackages.buildPerlPackage {
|
|
|
|
pname = "Net-LDAP-SID";
|
|
|
|
version = "0.0001";
|
|
|
|
src = final.fetchurl {
|
|
|
|
url = "mirror://cpan/authors/id/K/KA/KARMAN/Net-LDAP-SID-0.001.tar.gz";
|
|
|
|
sha256 = "1mnnpkmj8kpb7qw50sm8h4sd8py37ssy2xi5hhxzr5whcx0cvhm8";
|
|
|
|
};
|
|
|
|
meta = {
|
|
|
|
description= "Active Directory Security Identifier manipulation";
|
|
|
|
license = with final.stdenv.lib.licenses; [ artistic2 ];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
NetLDAPServerTest = prev.perlPackages.buildPerlPackage {
|
|
|
|
pname = "Net-LDAP-Server-Test";
|
|
|
|
version = "0.22";
|
|
|
|
src = final.fetchurl {
|
|
|
|
url = "mirror://cpan/authors/id/K/KA/KARMAN/Net-LDAP-Server-Test-0.22.tar.gz";
|
|
|
|
sha256 = "13idip7jky92v4adw60jn2gcc3zf339gsdqlnc9nnvqzbxxp285i";
|
|
|
|
};
|
|
|
|
propagatedBuildInputs = with final.perlPackages; [ NetLDAP NetLDAPServer TestMore DataDump NetLDAPSID ];
|
|
|
|
meta = {
|
|
|
|
description= "test Net::LDAP code";
|
|
|
|
license = with final.stdenv.lib.licenses; [ artistic1 ];
|
|
|
|
};
|
|
|
|
};
|
2019-09-17 15:25:59 +00:00
|
|
|
|
2020-09-09 11:30:43 +00:00
|
|
|
CatalystAuthenticationStoreLDAP = prev.perlPackages.buildPerlPackage {
|
|
|
|
pname = "Catalyst-Authentication-Store-LDAP";
|
|
|
|
version = "1.016";
|
|
|
|
src = final.fetchurl {
|
|
|
|
url = "mirror://cpan/authors/id/I/IL/ILMARI/Catalyst-Authentication-Store-LDAP-1.016.tar.gz";
|
|
|
|
sha256 = "0cm399vxqqf05cjgs1j5v3sk4qc6nmws5nfhf52qvpbwc4m82mq8";
|
|
|
|
};
|
|
|
|
propagatedBuildInputs = with final.perlPackages; [ NetLDAP CatalystPluginAuthentication ClassAccessorFast ];
|
|
|
|
buildInputs = with final.perlPackages; [ TestMore TestMockObject TestException NetLDAPServerTest ];
|
|
|
|
meta = {
|
|
|
|
description= "Authentication from an LDAP Directory";
|
|
|
|
license = with final.stdenv.lib.licenses; [ artistic1 ];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
hydra = with final; let
|
2019-09-17 15:25:59 +00:00
|
|
|
perlDeps = buildEnv {
|
|
|
|
name = "hydra-perl-deps";
|
2020-03-31 11:19:36 +00:00
|
|
|
paths = with perlPackages; lib.closePropagation
|
2019-09-17 15:25:59 +00:00
|
|
|
[ ModulePluggable
|
|
|
|
CatalystActionREST
|
|
|
|
CatalystAuthenticationStoreDBIxClass
|
2020-09-09 11:30:43 +00:00
|
|
|
CatalystAuthenticationStoreLDAP
|
2019-09-17 15:25:59 +00:00
|
|
|
CatalystDevel
|
|
|
|
CatalystDispatchTypeRegex
|
|
|
|
CatalystPluginAccessLog
|
|
|
|
CatalystPluginAuthorizationRoles
|
|
|
|
CatalystPluginCaptcha
|
|
|
|
CatalystPluginSessionStateCookie
|
|
|
|
CatalystPluginSessionStoreFastMmap
|
|
|
|
CatalystPluginStackTrace
|
|
|
|
CatalystPluginUnicodeEncoding
|
|
|
|
CatalystTraitForRequestProxyBase
|
|
|
|
CatalystViewDownload
|
|
|
|
CatalystViewJSON
|
|
|
|
CatalystViewTT
|
|
|
|
CatalystXScriptServerStarman
|
|
|
|
CatalystXRoleApplicator
|
|
|
|
CryptRandPasswd
|
|
|
|
DBDPg
|
2020-04-10 17:05:25 +00:00
|
|
|
DBDSQLite
|
2019-09-17 15:25:59 +00:00
|
|
|
DataDump
|
|
|
|
DateTime
|
|
|
|
DigestSHA1
|
|
|
|
EmailMIME
|
|
|
|
EmailSender
|
|
|
|
FileSlurp
|
|
|
|
IOCompress
|
|
|
|
IPCRun
|
|
|
|
JSON
|
|
|
|
JSONAny
|
|
|
|
JSONXS
|
|
|
|
LWP
|
|
|
|
LWPProtocolHttps
|
|
|
|
NetAmazonS3
|
2019-11-07 17:42:15 +00:00
|
|
|
NetPrometheus
|
2019-09-17 15:25:59 +00:00
|
|
|
NetStatsd
|
|
|
|
PadWalker
|
|
|
|
Readonly
|
|
|
|
SQLSplitStatement
|
|
|
|
SetScalar
|
|
|
|
Starman
|
|
|
|
SysHostnameLong
|
2019-09-24 17:03:18 +00:00
|
|
|
TermSizeAny
|
2019-09-17 15:25:59 +00:00
|
|
|
TestMore
|
|
|
|
TextDiff
|
|
|
|
TextTable
|
|
|
|
XMLSimple
|
2019-10-29 13:12:48 +00:00
|
|
|
YAML
|
2019-10-04 15:32:29 +00:00
|
|
|
final.nix.perl-bindings
|
2019-09-17 15:25:59 +00:00
|
|
|
git
|
|
|
|
];
|
|
|
|
};
|
|
|
|
|
|
|
|
in stdenv.mkDerivation {
|
|
|
|
|
|
|
|
name = "hydra-${version}";
|
|
|
|
|
|
|
|
src = self;
|
|
|
|
|
|
|
|
buildInputs =
|
2020-04-10 16:13:18 +00:00
|
|
|
[ makeWrapper autoconf automake libtool unzip nukeReferences pkgconfig libpqxx
|
2020-10-12 15:16:31 +00:00
|
|
|
gitAndTools.topGit mercurial darcs subversion breezy openssl bzip2 libxslt
|
2021-02-23 23:25:56 +00:00
|
|
|
final.nix perlDeps perl mdbook
|
2019-09-17 15:25:59 +00:00
|
|
|
boost
|
2020-05-27 15:34:14 +00:00
|
|
|
postgresql_11
|
2020-03-31 10:55:35 +00:00
|
|
|
(if lib.versionAtLeast lib.version "20.03pre"
|
|
|
|
then nlohmann_json
|
|
|
|
else nlohmann_json.override { multipleHeaders = true; })
|
2019-09-17 15:25:59 +00:00
|
|
|
];
|
|
|
|
|
2020-05-13 15:37:25 +00:00
|
|
|
checkInputs = [
|
2020-05-15 11:48:21 +00:00
|
|
|
foreman
|
2020-05-13 15:37:25 +00:00
|
|
|
];
|
|
|
|
|
2019-09-17 15:25:59 +00:00
|
|
|
hydraPath = lib.makeBinPath (
|
2020-04-10 16:13:18 +00:00
|
|
|
[ subversion openssh final.nix coreutils findutils pixz
|
2020-10-12 15:16:31 +00:00
|
|
|
gzip bzip2 lzma gnutar unzip git gitAndTools.topGit mercurial darcs gnused breezy
|
2019-09-17 15:25:59 +00:00
|
|
|
] ++ lib.optionals stdenv.isLinux [ rpm dpkg cdrkit ] );
|
|
|
|
|
|
|
|
shellHook = ''
|
2020-02-19 19:36:52 +00:00
|
|
|
PATH=$(pwd)/src/hydra-evaluator:$(pwd)/src/script:$(pwd)/src/hydra-eval-jobs:$(pwd)/src/hydra-queue-runner:$PATH
|
2019-09-17 15:25:59 +00:00
|
|
|
PERL5LIB=$(pwd)/src/lib:$PERL5LIB
|
2020-05-15 11:48:21 +00:00
|
|
|
export HYDRA_HOME="src/"
|
|
|
|
mkdir -p .hydra-data
|
|
|
|
export HYDRA_DATA="$(pwd)/.hydra-data"
|
|
|
|
export HYDRA_DBI='dbi:Pg:dbname=hydra;host=localhost;port=64444'
|
2019-09-17 15:25:59 +00:00
|
|
|
'';
|
|
|
|
|
|
|
|
preConfigure = "autoreconf -vfi";
|
|
|
|
|
|
|
|
NIX_LDFLAGS = [ "-lpthread" ];
|
|
|
|
|
|
|
|
enableParallelBuilding = true;
|
|
|
|
|
2020-03-04 14:39:21 +00:00
|
|
|
doCheck = true;
|
|
|
|
|
2019-09-17 15:25:59 +00:00
|
|
|
preCheck = ''
|
|
|
|
patchShebangs .
|
|
|
|
export LOGNAME=''${LOGNAME:-foo}
|
2020-10-12 15:16:31 +00:00
|
|
|
# set $HOME for bzr so it can create its trace file
|
|
|
|
export HOME=$(mktemp -d)
|
2019-09-17 15:25:59 +00:00
|
|
|
'';
|
|
|
|
|
|
|
|
postInstall = ''
|
|
|
|
mkdir -p $out/nix-support
|
|
|
|
|
|
|
|
for i in $out/bin/*; do
|
|
|
|
read -n 4 chars < $i
|
|
|
|
if [[ $chars =~ ELF ]]; then continue; fi
|
|
|
|
wrapProgram $i \
|
|
|
|
--prefix PERL5LIB ':' $out/libexec/hydra/lib:$PERL5LIB \
|
|
|
|
--prefix PATH ':' $out/bin:$hydraPath \
|
|
|
|
--set HYDRA_RELEASE ${version} \
|
|
|
|
--set HYDRA_HOME $out/libexec/hydra \
|
2019-10-04 15:32:29 +00:00
|
|
|
--set NIX_RELEASE ${final.nix.name or "unknown"}
|
2019-09-17 15:25:59 +00:00
|
|
|
done
|
|
|
|
'';
|
|
|
|
|
|
|
|
dontStrip = true;
|
|
|
|
|
|
|
|
meta.description = "Build of Hydra on ${system}";
|
2020-10-20 10:15:18 +00:00
|
|
|
passthru = { inherit perlDeps; inherit (final) nix; };
|
2019-09-17 15:25:59 +00:00
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
hydraJobs = {
|
|
|
|
|
2019-10-15 18:21:42 +00:00
|
|
|
build.x86_64-linux = packages.x86_64-linux.hydra;
|
2019-09-17 15:25:59 +00:00
|
|
|
|
|
|
|
manual =
|
|
|
|
pkgs.runCommand "hydra-manual-${version}" {}
|
|
|
|
''
|
|
|
|
mkdir -p $out/share
|
|
|
|
cp -prvd ${pkgs.hydra}/share/doc $out/share/
|
|
|
|
|
|
|
|
mkdir $out/nix-support
|
|
|
|
echo "doc manual $out/share/doc/hydra" >> $out/nix-support/hydra-build-products
|
|
|
|
'';
|
|
|
|
|
|
|
|
tests.install.x86_64-linux =
|
2020-05-11 19:36:32 +00:00
|
|
|
with import (nixpkgs + "/nixos/lib/testing-python.nix") { system = "x86_64-linux"; };
|
2019-09-17 15:25:59 +00:00
|
|
|
simpleTest {
|
|
|
|
machine = hydraServer;
|
|
|
|
testScript =
|
|
|
|
''
|
2020-05-11 19:36:32 +00:00
|
|
|
machine.wait_for_job("hydra-init")
|
|
|
|
machine.wait_for_job("hydra-server")
|
|
|
|
machine.wait_for_job("hydra-evaluator")
|
|
|
|
machine.wait_for_job("hydra-queue-runner")
|
|
|
|
machine.wait_for_open_port("3000")
|
|
|
|
machine.succeed("curl --fail http://localhost:3000/")
|
2019-09-17 15:25:59 +00:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
tests.api.x86_64-linux =
|
2020-05-11 19:36:32 +00:00
|
|
|
with import (nixpkgs + "/nixos/lib/testing-python.nix") { system = "x86_64-linux"; };
|
2019-09-17 15:25:59 +00:00
|
|
|
simpleTest {
|
2020-06-04 10:15:56 +00:00
|
|
|
machine = { pkgs, ... }: {
|
|
|
|
imports = [ hydraServer ];
|
|
|
|
# No caching for PathInput plugin, otherwise we get wrong values
|
|
|
|
# (as it has a 30s window where no changes to the file are considered).
|
|
|
|
services.hydra-dev.extraConfig = ''
|
|
|
|
path_input_cache_validity_seconds = 0
|
|
|
|
'';
|
|
|
|
};
|
2019-09-17 15:25:59 +00:00
|
|
|
testScript =
|
|
|
|
let dbi = "dbi:Pg:dbname=hydra;user=root;"; in
|
|
|
|
''
|
2020-05-11 19:36:32 +00:00
|
|
|
machine.wait_for_job("hydra-init")
|
2019-09-17 15:25:59 +00:00
|
|
|
|
|
|
|
# Create an admin account and some other state.
|
2020-05-11 19:36:32 +00:00
|
|
|
machine.succeed(
|
|
|
|
"""
|
|
|
|
su - hydra -c "hydra-create-user root --email-address 'alice@example.org' --password foobar --role admin"
|
|
|
|
mkdir /run/jobset /tmp/nix
|
|
|
|
chmod 755 /run/jobset /tmp/nix
|
|
|
|
cp ${./tests/api-test.nix} /run/jobset/default.nix
|
|
|
|
chmod 644 /run/jobset/default.nix
|
|
|
|
chown -R hydra /run/jobset /tmp/nix
|
|
|
|
"""
|
|
|
|
)
|
|
|
|
|
|
|
|
machine.succeed("systemctl stop hydra-evaluator hydra-queue-runner")
|
|
|
|
machine.wait_for_job("hydra-server")
|
|
|
|
machine.wait_for_open_port("3000")
|
2019-09-17 15:25:59 +00:00
|
|
|
|
|
|
|
# Run the API tests.
|
2020-05-11 19:36:32 +00:00
|
|
|
machine.succeed(
|
|
|
|
"su - hydra -c 'perl -I ${pkgs.hydra.perlDeps}/lib/perl5/site_perl ${./tests/api-test.pl}' >&2"
|
|
|
|
)
|
2019-09-17 15:25:59 +00:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
tests.notifications.x86_64-linux =
|
2020-05-11 19:36:32 +00:00
|
|
|
with import (nixpkgs + "/nixos/lib/testing-python.nix") { system = "x86_64-linux"; };
|
2019-09-17 15:25:59 +00:00
|
|
|
simpleTest {
|
|
|
|
machine = { pkgs, ... }: {
|
|
|
|
imports = [ hydraServer ];
|
|
|
|
services.hydra-dev.extraConfig = ''
|
|
|
|
<influxdb>
|
|
|
|
url = http://127.0.0.1:8086
|
|
|
|
db = hydra
|
|
|
|
</influxdb>
|
|
|
|
'';
|
|
|
|
services.influxdb.enable = true;
|
|
|
|
};
|
|
|
|
testScript = ''
|
2020-05-11 19:36:32 +00:00
|
|
|
machine.wait_for_job("hydra-init")
|
2019-09-17 15:25:59 +00:00
|
|
|
|
|
|
|
# Create an admin account and some other state.
|
2020-05-11 19:36:32 +00:00
|
|
|
machine.succeed(
|
|
|
|
"""
|
|
|
|
su - hydra -c "hydra-create-user root --email-address 'alice@example.org' --password foobar --role admin"
|
|
|
|
mkdir /run/jobset
|
|
|
|
chmod 755 /run/jobset
|
|
|
|
cp ${./tests/api-test.nix} /run/jobset/default.nix
|
|
|
|
chmod 644 /run/jobset/default.nix
|
|
|
|
chown -R hydra /run/jobset
|
|
|
|
"""
|
|
|
|
)
|
2019-09-17 15:25:59 +00:00
|
|
|
|
|
|
|
# Wait until InfluxDB can receive web requests
|
2020-05-11 19:36:32 +00:00
|
|
|
machine.wait_for_job("influxdb")
|
|
|
|
machine.wait_for_open_port("8086")
|
2019-09-17 15:25:59 +00:00
|
|
|
|
|
|
|
# Create an InfluxDB database where hydra will write to
|
2020-05-11 19:36:32 +00:00
|
|
|
machine.succeed(
|
|
|
|
"curl -XPOST 'http://127.0.0.1:8086/query' "
|
|
|
|
+ "--data-urlencode 'q=CREATE DATABASE hydra'"
|
|
|
|
)
|
2019-09-17 15:25:59 +00:00
|
|
|
|
|
|
|
# Wait until hydra-server can receive HTTP requests
|
2020-05-11 19:36:32 +00:00
|
|
|
machine.wait_for_job("hydra-server")
|
|
|
|
machine.wait_for_open_port("3000")
|
2019-09-17 15:25:59 +00:00
|
|
|
|
|
|
|
# Setup the project and jobset
|
2020-05-11 19:36:32 +00:00
|
|
|
machine.succeed(
|
|
|
|
"su - hydra -c 'perl -I ${pkgs.hydra.perlDeps}/lib/perl5/site_perl ${./tests/setup-notifications-jobset.pl}' >&2"
|
|
|
|
)
|
2019-09-17 15:25:59 +00:00
|
|
|
|
|
|
|
# Wait until hydra has build the job and
|
|
|
|
# the InfluxDBNotification plugin uploaded its notification to InfluxDB
|
2020-05-11 19:36:32 +00:00
|
|
|
machine.wait_until_succeeds(
|
|
|
|
"curl -s -H 'Accept: application/csv' "
|
|
|
|
+ "-G 'http://127.0.0.1:8086/query?db=hydra' "
|
|
|
|
+ "--data-urlencode 'q=SELECT * FROM hydra_build_status' | grep success"
|
|
|
|
)
|
2019-09-17 15:25:59 +00:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2020-09-09 16:26:46 +00:00
|
|
|
tests.ldap.x86_64-linux =
|
|
|
|
with import (nixpkgs + "/nixos/lib/testing-python.nix") { system = "x86_64-linux"; };
|
|
|
|
makeTest {
|
|
|
|
machine = { pkgs, ... }: {
|
|
|
|
imports = [ hydraServer ];
|
|
|
|
|
|
|
|
services.openldap = {
|
|
|
|
enable = true;
|
|
|
|
suffix = "dc=example";
|
|
|
|
rootdn = "cn=root,dc=example";
|
|
|
|
rootpw = "notapassword";
|
|
|
|
database = "bdb";
|
|
|
|
dataDir = "/var/lib/openldap";
|
2020-10-12 15:16:51 +00:00
|
|
|
extraConfig = ''
|
|
|
|
moduleload pw-sha2
|
|
|
|
'';
|
2020-09-09 16:26:46 +00:00
|
|
|
extraDatabaseConfig = ''
|
|
|
|
'';
|
|
|
|
|
2020-10-12 15:16:51 +00:00
|
|
|
# userPassword generated via `slappasswd -o module-load=pw-sha2 -h '{SSHA256}'`
|
|
|
|
# The admin user has the password `password and `user` has the password `foobar`.
|
2020-09-09 16:26:46 +00:00
|
|
|
declarativeContents = ''
|
|
|
|
dn: dc=example
|
|
|
|
dc: example
|
|
|
|
o: Root
|
|
|
|
objectClass: top
|
|
|
|
objectClass: dcObject
|
|
|
|
objectClass: organization
|
|
|
|
|
|
|
|
dn: ou=users,dc=example
|
|
|
|
ou: users
|
|
|
|
description: All users
|
|
|
|
objectClass: top
|
|
|
|
objectClass: organizationalUnit
|
|
|
|
|
2020-09-09 20:47:36 +00:00
|
|
|
dn: ou=groups,dc=example
|
|
|
|
ou: groups
|
|
|
|
description: All groups
|
|
|
|
objectClass: top
|
|
|
|
objectClass: organizationalUnit
|
|
|
|
|
|
|
|
dn: cn=hydra_admin,ou=groups,dc=example
|
|
|
|
cn: hydra_admin
|
|
|
|
description: Hydra Admin user group
|
|
|
|
objectClass: groupOfNames
|
|
|
|
member: cn=admin,ou=users,dc=example
|
|
|
|
|
2020-09-09 16:26:46 +00:00
|
|
|
dn: cn=user,ou=users,dc=example
|
|
|
|
objectClass: organizationalPerson
|
|
|
|
objectClass: inetOrgPerson
|
|
|
|
sn: user
|
|
|
|
cn: user
|
|
|
|
mail: user@example
|
2020-10-12 15:16:51 +00:00
|
|
|
userPassword: {SSHA256}B9rfUbNgv8nIGn1Hm5qbVQdv6AIQb012ORJwegqELB0DWCzoMCY+4A==
|
2020-09-09 20:47:36 +00:00
|
|
|
|
|
|
|
dn: cn=admin,ou=users,dc=example
|
|
|
|
objectClass: organizationalPerson
|
|
|
|
objectClass: inetOrgPerson
|
|
|
|
sn: admin
|
|
|
|
cn: admin
|
|
|
|
mail: admin@example
|
2020-10-12 15:16:51 +00:00
|
|
|
userPassword: {SSHA256}meKP7fSWhkzXFC1f8RWRb8V8ssmN/VQJp7xJrUFFcNUDuwP1PbitMg==
|
2020-09-09 16:26:46 +00:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
systemd.services.hdyra-server.environment.CATALYST_DEBUG = "1";
|
|
|
|
systemd.services.hydra-server.environment.HYDRA_LDAP_CONFIG = pkgs.writeText "config.yaml"
|
|
|
|
# example config based on https://metacpan.org/source/ILMARI/Catalyst-Authentication-Store-LDAP-1.016/README#L103
|
|
|
|
''
|
|
|
|
credential:
|
|
|
|
class: Password
|
|
|
|
password_field: password
|
|
|
|
password_type: self_check
|
|
|
|
store:
|
|
|
|
class: LDAP
|
|
|
|
ldap_server: localhost
|
|
|
|
ldap_server_options.timeout: 30
|
|
|
|
binddn: "cn=root,dc=example"
|
|
|
|
bindpw: notapassword
|
|
|
|
start_tls: 0
|
2020-09-12 17:54:32 +00:00
|
|
|
start_tls_options:
|
2020-09-09 16:26:46 +00:00
|
|
|
verify: none
|
|
|
|
user_basedn: "ou=users,dc=example"
|
|
|
|
user_filter: "(&(objectClass=inetOrgPerson)(cn=%s))"
|
|
|
|
user_scope: one
|
|
|
|
user_field: cn
|
|
|
|
user_search_options:
|
|
|
|
deref: always
|
2020-09-09 20:47:36 +00:00
|
|
|
use_roles: 1
|
|
|
|
role_basedn: "ou=groups,dc=example"
|
|
|
|
role_filter: "(&(objectClass=groupOfNames)(member=%s))"
|
2020-09-09 16:26:46 +00:00
|
|
|
role_scope: one
|
2020-09-09 20:47:36 +00:00
|
|
|
role_field: cn
|
2020-09-09 16:26:46 +00:00
|
|
|
role_value: dn
|
|
|
|
role_search_options:
|
|
|
|
deref: always
|
|
|
|
'';
|
|
|
|
networking.firewall.enable = false;
|
|
|
|
};
|
|
|
|
testScript = ''
|
2020-09-09 20:47:36 +00:00
|
|
|
import json
|
|
|
|
|
2020-09-09 16:26:46 +00:00
|
|
|
machine.wait_for_unit("openldap.service")
|
|
|
|
machine.wait_for_job("hydra-init")
|
|
|
|
machine.wait_for_open_port("3000")
|
2020-09-09 20:47:36 +00:00
|
|
|
response = machine.succeed(
|
2020-09-09 16:26:46 +00:00
|
|
|
"curl --fail http://localhost:3000/login -H 'Accept: application/json' -H 'Referer: http://localhost:3000' --data 'username=user&password=foobar'"
|
|
|
|
)
|
2020-09-09 20:47:36 +00:00
|
|
|
|
|
|
|
response_json = json.loads(response)
|
|
|
|
assert "user" == response_json["username"]
|
|
|
|
assert "user@example" == response_json["emailaddress"]
|
|
|
|
assert len(response_json["userroles"]) == 0
|
|
|
|
|
|
|
|
# logging on with wrong credentials shouldn't work
|
2020-09-09 16:26:46 +00:00
|
|
|
machine.fail(
|
|
|
|
"curl --fail http://localhost:3000/login -H 'Accept: application/json' -H 'Referer: http://localhost:3000' --data 'username=user&password=wrongpassword'"
|
|
|
|
)
|
2020-09-09 20:47:36 +00:00
|
|
|
|
|
|
|
# the admin user should get the admin role from his group membership in `hydra_admin`
|
|
|
|
response = machine.succeed(
|
|
|
|
"curl --fail http://localhost:3000/login -H 'Accept: application/json' -H 'Referer: http://localhost:3000' --data 'username=admin&password=password'"
|
|
|
|
)
|
|
|
|
|
|
|
|
response_json = json.loads(response)
|
|
|
|
assert "admin" == response_json["username"]
|
|
|
|
assert "admin@example" == response_json["emailaddress"]
|
|
|
|
assert "admin" in response_json["userroles"]
|
2020-09-09 16:26:46 +00:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2021-01-03 17:47:05 +00:00
|
|
|
tests.validate-openapi = pkgs.runCommand "validate-openapi"
|
|
|
|
{ buildInputs = [ pkgs.openapi-generator-cli ]; }
|
|
|
|
''
|
|
|
|
openapi-generator-cli validate -i ${./hydra-api.yaml}
|
|
|
|
touch $out
|
|
|
|
'';
|
|
|
|
|
2019-09-24 19:48:28 +00:00
|
|
|
container = nixosConfigurations.container.config.system.build.toplevel;
|
2019-08-09 11:10:50 +00:00
|
|
|
};
|
2019-06-03 10:29:42 +00:00
|
|
|
|
2019-10-15 18:21:42 +00:00
|
|
|
checks.x86_64-linux.build = hydraJobs.build.x86_64-linux;
|
|
|
|
checks.x86_64-linux.install = hydraJobs.tests.install.x86_64-linux;
|
2021-01-03 17:47:05 +00:00
|
|
|
checks.x86_64-linux.validate-openapi = hydraJobs.tests.validate-openapi;
|
2019-05-08 11:28:02 +00:00
|
|
|
|
2019-10-15 18:21:42 +00:00
|
|
|
packages.x86_64-linux.hydra = pkgs.hydra;
|
|
|
|
defaultPackage.x86_64-linux = pkgs.hydra;
|
2019-05-08 16:12:24 +00:00
|
|
|
|
2019-09-17 15:25:59 +00:00
|
|
|
nixosModules.hydra = {
|
|
|
|
imports = [ ./hydra-module.nix ];
|
2019-10-04 15:32:29 +00:00
|
|
|
nixpkgs.overlays = [ self.overlay nix.overlay ];
|
2019-09-24 17:58:10 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
nixosModules.hydraTest = {
|
|
|
|
imports = [ self.nixosModules.hydra ];
|
|
|
|
|
|
|
|
services.hydra-dev.enable = true;
|
|
|
|
services.hydra-dev.hydraURL = "http://hydra.example.org";
|
|
|
|
services.hydra-dev.notificationSender = "admin@hydra.example.org";
|
|
|
|
|
|
|
|
systemd.services.hydra-send-stats.enable = false;
|
|
|
|
|
|
|
|
services.postgresql.enable = true;
|
2020-05-27 15:34:14 +00:00
|
|
|
services.postgresql.package = pkgs.postgresql_11;
|
2019-09-24 17:58:10 +00:00
|
|
|
|
|
|
|
# The following is to work around the following error from hydra-server:
|
|
|
|
# [error] Caught exception in engine "Cannot determine local time zone"
|
|
|
|
time.timeZone = "UTC";
|
2019-10-04 19:31:27 +00:00
|
|
|
|
|
|
|
nix.extraOptions = ''
|
|
|
|
allowed-uris = https://github.com/
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
nixosModules.hydraProxy = {
|
|
|
|
services.httpd = {
|
|
|
|
enable = true;
|
|
|
|
adminAddr = "hydra-admin@example.org";
|
|
|
|
extraConfig = ''
|
|
|
|
<Proxy *>
|
|
|
|
Order deny,allow
|
|
|
|
Allow from all
|
|
|
|
</Proxy>
|
|
|
|
|
|
|
|
ProxyRequests Off
|
|
|
|
ProxyPreserveHost On
|
|
|
|
ProxyPass /apache-errors !
|
|
|
|
ErrorDocument 503 /apache-errors/503.html
|
|
|
|
ProxyPass / http://127.0.0.1:3000/ retry=5 disablereuse=on
|
|
|
|
ProxyPassReverse / http://127.0.0.1:3000/
|
|
|
|
'';
|
|
|
|
};
|
2019-09-24 17:58:10 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
nixosConfigurations.container = nixpkgs.lib.nixosSystem {
|
|
|
|
system = "x86_64-linux";
|
|
|
|
modules =
|
2019-11-07 17:46:32 +00:00
|
|
|
[ self.nixosModules.hydraTest
|
|
|
|
self.nixosModules.hydraProxy
|
|
|
|
{ system.configurationRevision = self.rev;
|
2019-09-24 17:58:10 +00:00
|
|
|
|
|
|
|
boot.isContainer = true;
|
|
|
|
networking.useDHCP = false;
|
|
|
|
networking.firewall.allowedTCPPorts = [ 80 ];
|
|
|
|
networking.hostName = "hydra";
|
|
|
|
|
|
|
|
services.hydra-dev.useSubstitutes = true;
|
|
|
|
}
|
|
|
|
];
|
2019-09-17 15:25:59 +00:00
|
|
|
};
|
2019-08-09 11:10:50 +00:00
|
|
|
|
|
|
|
};
|
2019-05-08 11:28:02 +00:00
|
|
|
}
|