nixos/h2o: move to runTest

Changed files
+272 -288
nixos
+1 -1
nixos/tests/all-tests.nix
···
guacamole-server = handleTest ./guacamole-server.nix {};
guix = handleTest ./guix {};
gvisor = handleTest ./gvisor.nix {};
-
h2o = discoverTests (import ./web-servers/h2o { inherit handleTestOn; });
hadoop = import ./hadoop { inherit handleTestOn; package=pkgs.hadoop; };
hadoop_3_3 = import ./hadoop { inherit handleTestOn; package=pkgs.hadoop_3_3; };
hadoop2 = import ./hadoop { inherit handleTestOn; package=pkgs.hadoop2; };
···
guacamole-server = handleTest ./guacamole-server.nix {};
guix = handleTest ./guix {};
gvisor = handleTest ./gvisor.nix {};
+
h2o = import ./web-servers/h2o { inherit recurseIntoAttrs runTest; };
hadoop = import ./hadoop { inherit handleTestOn; package=pkgs.hadoop; };
hadoop_3_3 = import ./hadoop { inherit handleTestOn; package=pkgs.hadoop_3_3; };
hadoop2 = import ./hadoop { inherit handleTestOn; package=pkgs.hadoop2; };
+112 -114
nixos/tests/web-servers/h2o/basic.nix
···
-
import ../../make-test-python.nix (
-
{ lib, pkgs, ... }:
-
# Tests basics such as TLS, creating a mime-type & serving Unicode characters.
-
let
-
domain = {
-
HTTP = "h2o.local";
-
TLS = "acme.test";
-
};
-
port = {
-
HTTP = 8080;
-
TLS = 8443;
-
};
-
sawatdi_chao_lok = "สวัสดีชาวโลก";
-
hello_world_txt = pkgs.writeTextFile {
-
name = "/hello_world.txt";
-
text = sawatdi_chao_lok;
-
};
-
hello_world_rst = pkgs.writeTextFile {
-
name = "/hello_world.rst";
-
text = # rst
-
''
-
====================
-
Thaiger Sprint 2025‼
-
====================
-
${sawatdi_chao_lok}
-
'';
-
};
-
in
-
{
-
name = "h2o-basic";
-
meta = {
-
maintainers = with lib.maintainers; [ toastal ];
-
};
-
nodes = {
-
server =
-
{ pkgs, ... }:
-
{
-
services.h2o = {
-
enable = true;
-
defaultHTTPListenPort = port.HTTP;
-
defaultTLSListenPort = port.TLS;
-
hosts = {
-
"${domain.HTTP}" = {
-
settings = {
-
paths = {
-
"/hello_world.txt" = {
-
"file.file" = "${hello_world_txt}";
-
};
};
};
};
-
"${domain.TLS}" = {
-
tls = {
-
policy = "force";
-
identity = [
-
{
-
key-file = ../../common/acme/server/acme.test.key.pem;
-
certificate-file = ../../common/acme/server/acme.test.cert.pem;
-
}
-
];
-
extraSettings = {
-
minimum-version = "TLSv1.3";
-
};
};
-
settings = {
-
paths = {
-
"/hello_world.rst" = {
-
"file.file" = "${hello_world_rst}";
-
};
};
};
};
};
-
settings = {
-
compress = "ON";
-
compress-minimum-size = 32;
-
"file.mime.addtypes" = {
-
"text/x-rst" = {
-
extensions = [ ".rst" ];
-
is_compressible = "YES";
-
};
};
-
ssl-offload = "kernel";
};
};
-
security.pki.certificates = [
-
(builtins.readFile ../../common/acme/server/ca.cert.pem)
-
];
-
networking = {
-
firewall.allowedTCPPorts = with port; [
-
HTTP
-
TLS
-
];
-
extraHosts = ''
-
127.0.0.1 ${domain.HTTP}
-
127.0.0.1 ${domain.TLS}
-
'';
-
};
};
-
};
-
testScript =
-
let
-
portStrHTTP = builtins.toString port.HTTP;
-
portStrTLS = builtins.toString port.TLS;
-
in
-
# python
-
''
-
server.wait_for_unit("h2o.service")
-
server.wait_for_open_port(${portStrHTTP})
-
server.wait_for_open_port(${portStrTLS})
-
http_hello_world_body = server.succeed("curl --fail-with-body 'http://${domain.HTTP}:${portStrHTTP}/hello_world.txt'")
-
assert "${sawatdi_chao_lok}" in http_hello_world_body
-
tls_hello_world_head = server.succeed("curl -v --head --compressed --http2 --tlsv1.3 --fail-with-body 'https://${domain.TLS}:${portStrTLS}/hello_world.rst'").lower()
-
assert "http/2 200" in tls_hello_world_head
-
assert "server: h2o" in tls_hello_world_head
-
assert "content-type: text/x-rst" in tls_hello_world_head
-
tls_hello_world_body = server.succeed("curl -v --http2 --tlsv1.3 --compressed --fail-with-body 'https://${domain.TLS}:${portStrTLS}/hello_world.rst'")
-
assert "${sawatdi_chao_lok}" in tls_hello_world_body
-
tls_hello_world_head_redirected = server.succeed("curl -v --head --fail-with-body 'http://${domain.TLS}:${builtins.toString port.HTTP}/hello_world.rst'").lower()
-
assert "redirected" in tls_hello_world_head_redirected
-
server.fail("curl --location --max-redirs 0 'http://${domain.TLS}:${portStrHTTP}/hello_world.rst'")
-
tls_hello_world_body_redirected = server.succeed("curl -v --location --fail-with-body 'http://${domain.TLS}:${portStrHTTP}/hello_world.rst'")
-
assert "${sawatdi_chao_lok}" in tls_hello_world_body_redirected
-
'';
-
}
-
)
···
+
{ hostPkgs, lib, ... }:
+
# Tests basics such as TLS, creating a mime-type & serving Unicode characters.
+
let
+
domain = {
+
HTTP = "h2o.local";
+
TLS = "acme.test";
+
};
+
port = {
+
HTTP = 8080;
+
TLS = 8443;
+
};
+
sawatdi_chao_lok = "สวัสดีชาวโลก";
+
hello_world_txt = hostPkgs.writeTextFile {
+
name = "/hello_world.txt";
+
text = sawatdi_chao_lok;
+
};
+
hello_world_rst = hostPkgs.writeTextFile {
+
name = "/hello_world.rst";
+
text = # rst
+
''
+
====================
+
Thaiger Sprint 2025‼
+
====================
+
${sawatdi_chao_lok}
+
'';
+
};
+
in
+
{
+
name = "h2o-basic";
+
meta = {
+
maintainers = with lib.maintainers; [ toastal ];
+
};
+
nodes = {
+
server =
+
{ pkgs, ... }:
+
{
+
services.h2o = {
+
enable = true;
+
defaultHTTPListenPort = port.HTTP;
+
defaultTLSListenPort = port.TLS;
+
hosts = {
+
"${domain.HTTP}" = {
+
settings = {
+
paths = {
+
"/hello_world.txt" = {
+
"file.file" = "${hello_world_txt}";
};
};
};
+
};
+
"${domain.TLS}" = {
+
tls = {
+
policy = "force";
+
identity = [
+
{
+
key-file = ../../common/acme/server/acme.test.key.pem;
+
certificate-file = ../../common/acme/server/acme.test.cert.pem;
+
}
+
];
+
extraSettings = {
+
minimum-version = "TLSv1.3";
};
+
};
+
settings = {
+
paths = {
+
"/hello_world.rst" = {
+
"file.file" = "${hello_world_rst}";
};
};
};
};
+
};
+
settings = {
+
compress = "ON";
+
compress-minimum-size = 32;
+
"file.mime.addtypes" = {
+
"text/x-rst" = {
+
extensions = [ ".rst" ];
+
is_compressible = "YES";
};
};
+
ssl-offload = "kernel";
};
+
};
+
security.pki.certificates = [
+
(builtins.readFile ../../common/acme/server/ca.cert.pem)
+
];
+
networking = {
+
firewall.allowedTCPPorts = with port; [
+
HTTP
+
TLS
+
];
+
extraHosts = ''
+
127.0.0.1 ${domain.HTTP}
+
127.0.0.1 ${domain.TLS}
+
'';
};
+
};
+
};
+
testScript =
+
let
+
portStrHTTP = builtins.toString port.HTTP;
+
portStrTLS = builtins.toString port.TLS;
+
in
+
# python
+
''
+
server.wait_for_unit("h2o.service")
+
server.wait_for_open_port(${portStrHTTP})
+
server.wait_for_open_port(${portStrTLS})
+
http_hello_world_body = server.succeed("curl --fail-with-body 'http://${domain.HTTP}:${portStrHTTP}/hello_world.txt'")
+
assert "${sawatdi_chao_lok}" in http_hello_world_body
+
tls_hello_world_head = server.succeed("curl -v --head --compressed --http2 --tlsv1.3 --fail-with-body 'https://${domain.TLS}:${portStrTLS}/hello_world.rst'").lower()
+
assert "http/2 200" in tls_hello_world_head
+
assert "server: h2o" in tls_hello_world_head
+
assert "content-type: text/x-rst" in tls_hello_world_head
+
tls_hello_world_body = server.succeed("curl -v --http2 --tlsv1.3 --compressed --fail-with-body 'https://${domain.TLS}:${portStrTLS}/hello_world.rst'")
+
assert "${sawatdi_chao_lok}" in tls_hello_world_body
+
tls_hello_world_head_redirected = server.succeed("curl -v --head --fail-with-body 'http://${domain.TLS}:${builtins.toString port.HTTP}/hello_world.rst'").lower()
+
assert "redirected" in tls_hello_world_head_redirected
+
server.fail("curl --location --max-redirs 0 'http://${domain.TLS}:${portStrHTTP}/hello_world.rst'")
+
tls_hello_world_body_redirected = server.succeed("curl -v --location --fail-with-body 'http://${domain.TLS}:${portStrHTTP}/hello_world.rst'")
+
assert "${sawatdi_chao_lok}" in tls_hello_world_body_redirected
+
'';
+
}
+5 -15
nixos/tests/web-servers/h2o/default.nix
···
-
{
-
system ? builtins.currentSystem,
-
handleTestOn,
-
}:
-
let
-
supportedSystems = [
-
"x86_64-linux"
-
"i686-linux"
-
"aarch64-linux"
-
];
-
in
-
{
-
basic = handleTestOn supportedSystems ./basic.nix { inherit system; };
-
mruby = handleTestOn supportedSystems ./mruby.nix { inherit system; };
-
tls-recommendations = handleTestOn supportedSystems ./tls-recommendations.nix { inherit system; };
}
···
+
{ recurseIntoAttrs, runTest }:
+
recurseIntoAttrs {
+
basic = runTest ./basic.nix;
+
mruby = runTest ./mruby.nix;
+
tls-recommendations = runTest ./tls-recommendations.nix;
}
+53 -55
nixos/tests/web-servers/h2o/mruby.nix
···
-
import ../../make-test-python.nix (
-
{ lib, pkgs, ... }:
-
let
-
domain = "h2o.local";
-
port = 8080;
-
sawatdi_chao_lok = "สวัสดีชาวโลก";
-
in
-
{
-
name = "h2o-mruby";
-
meta = {
-
maintainers = with lib.maintainers; [ toastal ];
-
};
-
nodes = {
-
server =
-
{ pkgs, ... }:
-
{
-
services.h2o = {
-
enable = true;
-
package = pkgs.h2o.override { withMruby = true; };
-
settings = {
-
listen = port;
-
hosts = {
-
"${domain}" = {
-
paths = {
-
"/hello_world" = {
-
"mruby.handler" = # ruby
-
''
-
Proc.new do |env|
-
[200, {'content-type' => 'text/plain'}, ["${sawatdi_chao_lok}"]]
-
end
-
'';
-
};
-
"/file_handler" = {
-
"mruby.handler-file" = ./file_handler.rb;
-
};
};
};
};
};
};
-
-
networking.extraHosts = ''
-
127.0.0.1 ${domain}
-
'';
};
-
};
-
testScript =
-
let
-
portStr = builtins.toString port;
-
in
-
# python
-
''
-
server.wait_for_unit("h2o.service")
-
server.wait_for_open_port(${portStr})
-
hello_world = server.succeed("curl --fail-with-body http://${domain}:${portStr}/hello_world")
-
assert "${sawatdi_chao_lok}" in hello_world
-
file_handler = server.succeed("curl --fail-with-body http://${domain}:${portStr}/file_handler")
-
assert "FILE_HANDLER" in file_handler
-
'';
-
}
-
)
···
+
{ lib, ... }:
+
let
+
domain = "h2o.local";
+
port = 8080;
+
sawatdi_chao_lok = "สวัสดีชาวโลก";
+
in
+
{
+
name = "h2o-mruby";
+
meta = {
+
maintainers = with lib.maintainers; [ toastal ];
+
};
+
nodes = {
+
server =
+
{ pkgs, ... }:
+
{
+
services.h2o = {
+
enable = true;
+
package = pkgs.h2o.override { withMruby = true; };
+
settings = {
+
listen = port;
+
hosts = {
+
"${domain}" = {
+
paths = {
+
"/hello_world" = {
+
"mruby.handler" = # ruby
+
''
+
Proc.new do |env|
+
[200, {'content-type' => 'text/plain'}, ["${sawatdi_chao_lok}"]]
+
end
+
'';
+
};
+
"/file_handler" = {
+
"mruby.handler-file" = ./file_handler.rb;
};
};
};
};
};
};
+
networking.extraHosts = ''
+
127.0.0.1 ${domain}
+
'';
+
};
+
};
+
+
testScript =
+
let
+
portStr = builtins.toString port;
+
in
+
# python
+
''
+
server.wait_for_unit("h2o.service")
+
server.wait_for_open_port(${portStr})
+
hello_world = server.succeed("curl --fail-with-body http://${domain}:${portStr}/hello_world")
+
assert "${sawatdi_chao_lok}" in hello_world
+
file_handler = server.succeed("curl --fail-with-body http://${domain}:${portStr}/file_handler")
+
assert "FILE_HANDLER" in file_handler
+
'';
+
}
+101 -103
nixos/tests/web-servers/h2o/tls-recommendations.nix
···
-
import ../../make-test-python.nix (
-
{ lib, pkgs, ... }:
-
let
-
domain = "acme.test";
-
port = 8443;
-
hello_txt =
-
name:
-
pkgs.writeTextFile {
-
name = "/hello_${name}.txt";
-
text = "Hello, ${name}!";
-
};
-
mkH2OServer =
-
recommendations:
-
{ pkgs, lib, ... }:
-
{
-
services.h2o = {
-
enable = true;
-
package = pkgs.h2o.override (
-
lib.optionalAttrs
-
(builtins.elem recommendations [
-
"intermediate"
-
"old"
-
])
-
{
-
openssl = pkgs.openssl_legacy;
-
}
-
);
-
defaultTLSRecommendations = "modern"; # prove overridden
-
hosts = {
-
"${domain}" = {
-
tls = {
-
inherit port recommendations;
-
policy = "force";
-
identity = [
-
{
-
key-file = ../../common/acme/server/acme.test.key.pem;
-
certificate-file = ../../common/acme/server/acme.test.cert.pem;
-
}
-
];
-
};
-
settings = {
-
paths."/"."file.file" = "${hello_txt recommendations}";
-
};
};
};
-
settings = {
-
ssl-offload = "kernel";
-
};
};
-
-
security.pki.certificates = [
-
(builtins.readFile ../../common/acme/server/ca.cert.pem)
-
];
-
-
networking = {
-
firewall.allowedTCPPorts = [ port ];
-
extraHosts = "127.0.0.1 ${domain}";
};
};
-
in
-
{
-
name = "h2o-tls-recommendations";
-
meta = {
-
maintainers = with lib.maintainers; [ toastal ];
-
};
-
nodes = {
-
server_modern = mkH2OServer "modern";
-
server_intermediate = mkH2OServer "intermediate";
-
server_old = mkH2OServer "old";
};
-
testScript =
-
let
-
portStr = builtins.toString port;
-
in
-
# python
-
''
-
curl_basic = "curl -v --tlsv1.3 --http2 'https://${domain}:${portStr}/'"
-
curl_head = "curl -v --head 'https://${domain}:${portStr}/'"
-
curl_max_tls1_2 ="curl -v --tlsv1.0 --tls-max 1.2 'https://${domain}:${portStr}/'"
-
curl_max_tls1_2_intermediate_cipher ="curl -v --tlsv1.0 --tls-max 1.2 --ciphers 'ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256' 'https://${domain}:${portStr}/'"
-
curl_max_tls1_2_old_cipher ="curl -v --tlsv1.0 --tls-max 1.2 --ciphers 'ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256' 'https://${domain}:${portStr}/'"
-
server_modern.wait_for_unit("h2o.service")
-
server_modern.wait_for_open_port(${portStr})
-
modern_response = server_modern.succeed(curl_basic)
-
assert "Hello, modern!" in modern_response
-
modern_head = server_modern.succeed(curl_head)
-
assert "strict-transport-security" in modern_head
-
server_modern.fail(curl_max_tls1_2)
-
server_intermediate.wait_for_unit("h2o.service")
-
server_intermediate.wait_for_open_port(${portStr})
-
intermediate_response = server_intermediate.succeed(curl_basic)
-
assert "Hello, intermediate!" in intermediate_response
-
intermediate_head = server_modern.succeed(curl_head)
-
assert "strict-transport-security" in intermediate_head
-
server_intermediate.succeed(curl_max_tls1_2)
-
server_intermediate.succeed(curl_max_tls1_2_intermediate_cipher)
-
server_intermediate.fail(curl_max_tls1_2_old_cipher)
-
server_old.wait_for_unit("h2o.service")
-
server_old.wait_for_open_port(${portStr})
-
old_response = server_old.succeed(curl_basic)
-
assert "Hello, old!" in old_response
-
old_head = server_modern.succeed(curl_head)
-
assert "strict-transport-security" in old_head
-
server_old.succeed(curl_max_tls1_2)
-
server_old.succeed(curl_max_tls1_2_intermediate_cipher)
-
server_old.succeed(curl_max_tls1_2_old_cipher)
-
'';
-
}
-
)
···
+
{ hostPkgs, lib, ... }:
+
let
+
domain = "acme.test";
+
port = 8443;
+
hello_txt =
+
name:
+
hostPkgs.writeTextFile {
+
name = "/hello_${name}.txt";
+
text = "Hello, ${name}!";
+
};
+
mkH2OServer =
+
recommendations:
+
{ pkgs, lib, ... }:
+
{
+
services.h2o = {
+
enable = true;
+
package = pkgs.h2o.override (
+
lib.optionalAttrs
+
(builtins.elem recommendations [
+
"intermediate"
+
"old"
+
])
+
{
+
openssl = pkgs.openssl_legacy;
+
}
+
);
+
defaultTLSRecommendations = "modern"; # prove overridden
+
hosts = {
+
"${domain}" = {
+
tls = {
+
inherit port recommendations;
+
policy = "force";
+
identity = [
+
{
+
key-file = ../../common/acme/server/acme.test.key.pem;
+
certificate-file = ../../common/acme/server/acme.test.cert.pem;
+
}
+
];
+
};
+
settings = {
+
paths."/"."file.file" = "${hello_txt recommendations}";
};
};
};
+
settings = {
+
ssl-offload = "kernel";
};
};
+
security.pki.certificates = [
+
(builtins.readFile ../../common/acme/server/ca.cert.pem)
+
];
+
networking = {
+
firewall.allowedTCPPorts = [ port ];
+
extraHosts = "127.0.0.1 ${domain}";
+
};
};
+
in
+
{
+
name = "h2o-tls-recommendations";
+
meta = {
+
maintainers = with lib.maintainers; [ toastal ];
+
};
+
nodes = {
+
server_modern = mkH2OServer "modern";
+
server_intermediate = mkH2OServer "intermediate";
+
server_old = mkH2OServer "old";
+
};
+
testScript =
+
let
+
portStr = builtins.toString port;
+
in
+
# python
+
''
+
curl_basic = "curl -v --tlsv1.3 --http2 'https://${domain}:${portStr}/'"
+
curl_head = "curl -v --head 'https://${domain}:${portStr}/'"
+
curl_max_tls1_2 ="curl -v --tlsv1.0 --tls-max 1.2 'https://${domain}:${portStr}/'"
+
curl_max_tls1_2_intermediate_cipher ="curl -v --tlsv1.0 --tls-max 1.2 --ciphers 'ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256' 'https://${domain}:${portStr}/'"
+
curl_max_tls1_2_old_cipher ="curl -v --tlsv1.0 --tls-max 1.2 --ciphers 'ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256' 'https://${domain}:${portStr}/'"
+
server_modern.wait_for_unit("h2o.service")
+
server_modern.wait_for_open_port(${portStr})
+
modern_response = server_modern.succeed(curl_basic)
+
assert "Hello, modern!" in modern_response
+
modern_head = server_modern.succeed(curl_head)
+
assert "strict-transport-security" in modern_head
+
server_modern.fail(curl_max_tls1_2)
+
+
server_intermediate.wait_for_unit("h2o.service")
+
server_intermediate.wait_for_open_port(${portStr})
+
intermediate_response = server_intermediate.succeed(curl_basic)
+
assert "Hello, intermediate!" in intermediate_response
+
intermediate_head = server_modern.succeed(curl_head)
+
assert "strict-transport-security" in intermediate_head
+
server_intermediate.succeed(curl_max_tls1_2)
+
server_intermediate.succeed(curl_max_tls1_2_intermediate_cipher)
+
server_intermediate.fail(curl_max_tls1_2_old_cipher)
+
+
server_old.wait_for_unit("h2o.service")
+
server_old.wait_for_open_port(${portStr})
+
old_response = server_old.succeed(curl_basic)
+
assert "Hello, old!" in old_response
+
old_head = server_modern.succeed(curl_head)
+
assert "strict-transport-security" in old_head
+
server_old.succeed(curl_max_tls1_2)
+
server_old.succeed(curl_max_tls1_2_intermediate_cipher)
+
server_old.succeed(curl_max_tls1_2_old_cipher)
+
'';
+
}