mirror of
https://github.com/NixOS/nixpkgs.git
synced 2025-06-12 12:45:27 +03:00

Format all Nix files using the officially approved formatter, making the CI check introduced in the previous commit succeed: nix-build ci -A fmt.check This is the next step of the of the [implementation](https://github.com/NixOS/nixfmt/issues/153) of the accepted [RFC 166](https://github.com/NixOS/rfcs/pull/166). This commit will lead to merge conflicts for a number of PRs, up to an estimated ~1100 (~33%) among the PRs with activity in the past 2 months, but that should be lower than what it would be without the previous [partial treewide format](https://github.com/NixOS/nixpkgs/pull/322537). Merge conflicts caused by this commit can now automatically be resolved while rebasing using the [auto-rebase script](8616af08d9/maintainers/scripts/auto-rebase
). If you run into any problems regarding any of this, please reach out to the [formatting team](https://nixos.org/community/teams/formatting/) by pinging @NixOS/nix-formatting. (branch-equivalent to commit374e6bcc40
)
59 lines
1.4 KiB
Nix
59 lines
1.4 KiB
Nix
import ./make-test-python.nix (
|
|
{ pkgs, ... }:
|
|
{
|
|
name = "nginx-sso";
|
|
meta = {
|
|
maintainers = with pkgs.lib.maintainers; [ ambroisie ];
|
|
};
|
|
|
|
nodes.machine = {
|
|
services.nginx.sso = {
|
|
enable = true;
|
|
configuration = {
|
|
listen = {
|
|
addr = "127.0.0.1";
|
|
port = 8080;
|
|
};
|
|
|
|
providers.token.tokens = {
|
|
myuser = "MyToken";
|
|
};
|
|
|
|
acl = {
|
|
rule_sets = [
|
|
{
|
|
rules = [
|
|
{
|
|
field = "x-application";
|
|
equals = "MyApp";
|
|
}
|
|
];
|
|
allow = [ "myuser" ];
|
|
}
|
|
];
|
|
};
|
|
};
|
|
};
|
|
};
|
|
|
|
testScript = ''
|
|
start_all()
|
|
|
|
machine.wait_for_unit("nginx-sso.service")
|
|
machine.wait_for_open_port(8080)
|
|
|
|
with subtest("No valid user -> 401"):
|
|
machine.fail("curl -sSf http://localhost:8080/auth")
|
|
|
|
with subtest("Valid user but no matching ACL -> 403"):
|
|
machine.fail(
|
|
"curl -sSf -H 'Authorization: Token MyToken' http://localhost:8080/auth"
|
|
)
|
|
|
|
with subtest("Valid user and matching ACL -> 200"):
|
|
machine.succeed(
|
|
"curl -sSf -H 'Authorization: Token MyToken' -H 'X-Application: MyApp' http://localhost:8080/auth"
|
|
)
|
|
'';
|
|
}
|
|
)
|