3944aa051c
One of the main problems of the Nextcloud module is that it's currently not possible to alter e.g. database configuration after the initial setup as it's written by their imperative installer to a file. After some research[1] it turned out that it's possible to override all values with an additional config file. The documentation has been slightly updated to remain up-to-date, but the warnings should remain there as the imperative configuration is still used and may cause unwanted side-effects. Also simplified the postgresql test which uses `ensure{Databases,Users}` to configure the database. Fixes #49783 [1] https://github.com/NixOS/nixpkgs/issues/49783#issuecomment-483063922
130 lines
4.1 KiB
Nix
130 lines
4.1 KiB
Nix
import ../make-test.nix ({ pkgs, ...}: let
|
|
adminpass = "hunter2";
|
|
adminuser = "custom-admin-username";
|
|
in {
|
|
name = "nextcloud-with-postgresql-and-redis";
|
|
meta = with pkgs.stdenv.lib.maintainers; {
|
|
maintainers = [ eqyiel ];
|
|
};
|
|
|
|
nodes = {
|
|
# The only thing the client needs to do is download a file.
|
|
client = { ... }: {};
|
|
|
|
nextcloud = { config, pkgs, ... }: {
|
|
networking.firewall.allowedTCPPorts = [ 80 ];
|
|
|
|
services.nextcloud = {
|
|
enable = true;
|
|
hostName = "nextcloud";
|
|
nginx.enable = true;
|
|
caching = {
|
|
apcu = false;
|
|
redis = true;
|
|
memcached = false;
|
|
};
|
|
config = {
|
|
dbtype = "pgsql";
|
|
dbname = "nextcloud";
|
|
dbuser = "nextcloud";
|
|
dbhost = "/run/postgresql";
|
|
inherit adminuser;
|
|
adminpassFile = toString (pkgs.writeText "admin-pass-file" ''
|
|
${adminpass}
|
|
'');
|
|
};
|
|
};
|
|
|
|
services.redis = {
|
|
unixSocket = "/var/run/redis/redis.sock";
|
|
enable = true;
|
|
extraConfig = ''
|
|
unixsocketperm 770
|
|
'';
|
|
};
|
|
|
|
systemd.services.redis = {
|
|
preStart = ''
|
|
mkdir -p /var/run/redis
|
|
chown ${config.services.redis.user}:${config.services.nginx.group} /var/run/redis
|
|
'';
|
|
serviceConfig.PermissionsStartOnly = true;
|
|
};
|
|
|
|
systemd.services."nextcloud-setup"= {
|
|
requires = ["postgresql.service"];
|
|
after = [
|
|
"postgresql.service"
|
|
"chown-redis-socket.service"
|
|
];
|
|
};
|
|
|
|
# At the time of writing, redis creates its socket with the "nobody"
|
|
# group. I figure this is slightly less bad than making the socket world
|
|
# readable.
|
|
systemd.services."chown-redis-socket" = {
|
|
enable = true;
|
|
script = ''
|
|
until ${pkgs.redis}/bin/redis-cli ping; do
|
|
echo "waiting for redis..."
|
|
sleep 1
|
|
done
|
|
chown ${config.services.redis.user}:${config.services.nginx.group} /var/run/redis/redis.sock
|
|
'';
|
|
after = [ "redis.service" ];
|
|
requires = [ "redis.service" ];
|
|
wantedBy = [ "redis.service" ];
|
|
serviceConfig = {
|
|
Type = "oneshot";
|
|
};
|
|
};
|
|
|
|
services.postgresql = {
|
|
enable = true;
|
|
ensureDatabases = [ "nextcloud" ];
|
|
ensureUsers = [
|
|
{ name = "nextcloud";
|
|
ensurePermissions."DATABASE nextcloud" = "ALL PRIVILEGES";
|
|
}
|
|
];
|
|
};
|
|
};
|
|
};
|
|
|
|
testScript = let
|
|
configureRedis = pkgs.writeScript "configure-redis" ''
|
|
#!${pkgs.stdenv.shell}
|
|
nextcloud-occ config:system:set redis 'host' --value '/var/run/redis/redis.sock' --type string
|
|
nextcloud-occ config:system:set redis 'port' --value 0 --type integer
|
|
nextcloud-occ config:system:set memcache.local --value '\OC\Memcache\Redis' --type string
|
|
nextcloud-occ config:system:set memcache.locking --value '\OC\Memcache\Redis' --type string
|
|
'';
|
|
withRcloneEnv = pkgs.writeScript "with-rclone-env" ''
|
|
#!${pkgs.stdenv.shell}
|
|
export RCLONE_CONFIG_NEXTCLOUD_TYPE=webdav
|
|
export RCLONE_CONFIG_NEXTCLOUD_URL="http://nextcloud/remote.php/webdav/"
|
|
export RCLONE_CONFIG_NEXTCLOUD_VENDOR="nextcloud"
|
|
export RCLONE_CONFIG_NEXTCLOUD_USER="${adminuser}"
|
|
export RCLONE_CONFIG_NEXTCLOUD_PASS="$(${pkgs.rclone}/bin/rclone obscure ${adminpass})"
|
|
"''${@}"
|
|
'';
|
|
copySharedFile = pkgs.writeScript "copy-shared-file" ''
|
|
#!${pkgs.stdenv.shell}
|
|
echo 'hi' | ${pkgs.rclone}/bin/rclone rcat nextcloud:test-shared-file
|
|
'';
|
|
|
|
diffSharedFile = pkgs.writeScript "diff-shared-file" ''
|
|
#!${pkgs.stdenv.shell}
|
|
diff <(echo 'hi') <(${pkgs.rclone}/bin/rclone cat nextcloud:test-shared-file)
|
|
'';
|
|
in ''
|
|
startAll();
|
|
$nextcloud->waitForUnit("multi-user.target");
|
|
$nextcloud->succeed("${configureRedis}");
|
|
$nextcloud->succeed("curl -sSf http://nextcloud/login");
|
|
$nextcloud->succeed("${withRcloneEnv} ${copySharedFile}");
|
|
$client->waitForUnit("multi-user.target");
|
|
$client->succeed("${withRcloneEnv} ${diffSharedFile}");
|
|
'';
|
|
})
|