Skip to content

Commit

Permalink
Merge pull request #172 from boinkor-net/strict-shellcheck-nixos-tests
Browse files Browse the repository at this point in the history
Strict shellchecks in tests
  • Loading branch information
antifuchs authored Oct 29, 2024
2 parents af34ed5 + fa4f6df commit a1687f7
Show file tree
Hide file tree
Showing 5 changed files with 9 additions and 5 deletions.
6 changes: 3 additions & 3 deletions flake.lock

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

1 change: 1 addition & 0 deletions nixos/tests/cmdline/basic.nix
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@ in
helper {
testConfig = {
services.tsnsrv.services.basic.toURL = "http://127.0.0.1:3000";
systemd.services.tsnsrv-basic.enableStrictShellChecks = true;
};
testScript = ''
machine.wait_for_unit("tsnsrv-basic")
Expand Down
1 change: 1 addition & 0 deletions nixos/tests/cmdline/with-custom-certs.nix
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,7 @@ in
certificateFile = "/tmp/cert.pem";
certificateKey = "/tmp/key.pem";
};
systemd.services.tsnsrv-custom.enableStrictShellChecks = true;
};
testScript = ''
machine.wait_for_unit("tsnsrv-custom")
Expand Down
2 changes: 2 additions & 0 deletions nixos/tests/e2e/oci.nix
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,7 @@ in
address = "[::]";
settings = {
ip_prefixes = ["100.64.0.0/10"];
dns.magic_dns = false;
derp.server = {
enabled = true;
region_id = 999;
Expand Down Expand Up @@ -84,6 +85,7 @@ in
};
};
};
systemd.services.podman-web-server-tsnsrv.enableStrictShellChecks = true;
networking.firewall.trustedInterfaces = ["podman0"];

# Delay starting the container machinery until we have an authkey:
Expand Down
4 changes: 2 additions & 2 deletions nixos/tests/e2e/systemd.nix
Original file line number Diff line number Diff line change
Expand Up @@ -12,8 +12,6 @@ in
defaults.services.tsnsrv.enable = true;
defaults.services.tsnsrv.defaults.tsnetVerbose = true;

# defaults.services.tsnsrv.defaults.package = config.packages.tsnsrvCmdLineValidator;

nodes.machine = {
config,
pkgs,
Expand Down Expand Up @@ -43,6 +41,7 @@ in
enable = true;
settings = {
ip_prefixes = ["100.64.0.0/10"];
dns.magic_dns = false;
derp.server = {
enabled = true;
region_id = 999;
Expand Down Expand Up @@ -81,6 +80,7 @@ in
};

systemd.services.tsnsrv-basic = {
enableStrictShellChecks = true;
wants = ["[email protected]"];
after = ["[email protected]"];
unitConfig.Requires = ["[email protected]"];
Expand Down

0 comments on commit a1687f7

Please sign in to comment.