about summary refs log tree commit diff
path: root/nixos/tests/xmpp/prosody-mysql.nix
blob: 40f3e308a04eaab6381565eeb7c156f2e7fda129 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
let
  cert = pkgs: pkgs.runCommand "selfSignedCerts" { buildInputs = [ pkgs.openssl ]; } ''
    openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -nodes -subj '/CN=example.com/CN=uploads.example.com/CN=conference.example.com' -days 36500
    mkdir -p $out
    cp key.pem cert.pem $out
  '';
  createUsers = pkgs: pkgs.writeScriptBin "create-prosody-users" ''
    #!${pkgs.bash}/bin/bash
    set -e

    # Creates and set password for the 2 xmpp test users.
    #
    # Doing that in a bash script instead of doing that in the test
    # script allow us to easily provision the users when running that
    # test interactively.

    prosodyctl register cthon98 example.com nothunter2
    prosodyctl register azurediamond example.com hunter2
  '';
  delUsers = pkgs: pkgs.writeScriptBin "delete-prosody-users" ''
    #!${pkgs.bash}/bin/bash
    set -e

    # Deletes the test users.
    #
    # Doing that in a bash script instead of doing that in the test
    # script allow us to easily provision the users when running that
    # test interactively.

    prosodyctl deluser cthon98@example.com
    prosodyctl deluser azurediamond@example.com
  '';
in import ../make-test-python.nix {
  name = "prosody-mysql";
  nodes = {
    client = { nodes, pkgs, config, ... }: {
      security.pki.certificateFiles = [ "${cert pkgs}/cert.pem" ];
      console.keyMap = "fr-bepo";
      networking.extraHosts = ''
        ${nodes.server.config.networking.primaryIPAddress} example.com
        ${nodes.server.config.networking.primaryIPAddress} conference.example.com
        ${nodes.server.config.networking.primaryIPAddress} uploads.example.com
      '';
      environment.systemPackages = [
        (pkgs.callPackage ./xmpp-sendmessage.nix { connectTo = nodes.server.config.networking.primaryIPAddress; })
      ];
    };
    server = { config, pkgs, ... }: {
      nixpkgs.overlays = [
        (self: super: {
          prosody = super.prosody.override {
            withExtraLuaPackages = p: [ p.luadbi-mysql ];
          };
        })
      ];
      security.pki.certificateFiles = [ "${cert pkgs}/cert.pem" ];
      console.keyMap = "fr-bepo";
      networking.extraHosts = ''
        ${config.networking.primaryIPAddress} example.com
        ${config.networking.primaryIPAddress} conference.example.com
        ${config.networking.primaryIPAddress} uploads.example.com
      '';
      networking.firewall.enable = false;
      environment.systemPackages = [
        (createUsers pkgs)
        (delUsers pkgs)
      ];
      services.prosody = {
        enable = true;
        ssl.cert = "${cert pkgs}/cert.pem";
        ssl.key = "${cert pkgs}/key.pem";
        virtualHosts.example = {
          domain = "example.com";
          enabled = true;
          ssl.cert = "${cert pkgs}/cert.pem";
          ssl.key = "${cert pkgs}/key.pem";
        };
        muc = [
          {
            domain = "conference.example.com";
          }
        ];
        uploadHttp = {
          domain = "uploads.example.com";
        };
        extraConfig = ''
          storage = "sql"
          sql = {
            driver = "MySQL";
            database = "prosody";
            host = "mysql";
            port = 3306;
            username = "prosody";
            password = "password123";
          };
        '';
      };
    };
    mysql = { config, pkgs, ... }: {
      networking.firewall.enable = false;
      services.mysql = {
        enable = true;
        initialScript = pkgs.writeText "mysql_init.sql" ''
          CREATE DATABASE prosody;
          CREATE USER 'prosody'@'server' IDENTIFIED BY 'password123';
          GRANT ALL PRIVILEGES ON prosody.* TO 'prosody'@'server';
          FLUSH PRIVILEGES;
        '';
        package = pkgs.mariadb;
      };
    };
  };

  testScript = { nodes, ... }: ''
    # Check with mysql storage
    mysql.wait_for_unit("mysql.service")
    server.wait_for_unit("prosody.service")
    server.succeed('prosodyctl status | grep "Prosody is running"')

    server.succeed("create-prosody-users")
    client.succeed("send-message")
    server.succeed("delete-prosody-users")
  '';
}