nixos/tests: fix discrepancy between nix-build and nix build

+1 -1
nixos/tests/all-tests.nix
···
keymap = handleTest ./keymap.nix {};
knot = handleTest ./knot.nix {};
komga = handleTest ./komga.nix {};
-
krb5 = discoverTests (import ./krb5 {});
+
krb5 = discoverTests (import ./krb5);
ksm = handleTest ./ksm.nix {};
kthxbye = handleTest ./kthxbye.nix {};
kubernetes = handleTestOn ["x86_64-linux"] ./kubernetes {};
+1 -1
nixos/tests/freetube.nix
···
'';
});
in
-
builtins.mapAttrs (k: v: mkTest k v { }) tests
+
builtins.mapAttrs (k: v: mkTest k v) tests
+17 -15
nixos/tests/keycloak.nix
···
certs = import ./common/acme/server/snakeoil-certs.nix;
frontendUrl = "https://${certs.domain}";
-
keycloakTest = import ./make-test-python.nix (
-
{ pkgs, databaseType, ... }:
+
keycloakTest = databaseType: import ./make-test-python.nix (
+
{ pkgs, ... }:
let
initialAdminPassword = "h4Iho\"JFn't2>iQIR9";
adminPasswordFile = pkgs.writeText "admin-password" "${initialAdminPassword}";
···
enabled = true;
realm = "test-realm";
clients = [ client ];
-
users = [(
-
user // {
-
enabled = true;
-
credentials = [{
-
type = "password";
-
temporary = false;
-
value = password;
-
}];
-
}
-
)];
+
users = [
+
(
+
user // {
+
enabled = true;
+
credentials = [{
+
type = "password";
+
temporary = false;
+
value = password;
+
}];
+
}
+
)
+
];
};
realmDataJson = pkgs.writeText "realm-data.json" (builtins.toJSON realm);
···
);
in
{
-
postgres = keycloakTest { databaseType = "postgresql"; };
-
mariadb = keycloakTest { databaseType = "mariadb"; };
-
mysql = keycloakTest { databaseType = "mysql"; };
+
postgres = keycloakTest "postgresql";
+
mariadb = keycloakTest "mariadb";
+
mysql = keycloakTest "mysql";
}
+1 -2
nixos/tests/krb5/default.nix
···
-
{ system ? builtins.currentSystem }:
{
-
example-config = import ./example-config.nix { inherit system; };
+
example-config = import ./example-config.nix;
}
+14 -16
nixos/tests/opensearch.nix
···
let
-
opensearchTest =
+
opensearchTest = extraSettings:
import ./make-test-python.nix (
-
{ pkgs, lib, extraSettings ? {} }: {
+
{ pkgs, lib, ... }: {
name = "opensearch";
meta.maintainers = with pkgs.lib.maintainers; [ shyim ];
···
{
opensearch = opensearchTest {};
opensearchCustomPathAndUser = opensearchTest {
-
extraSettings = {
-
services.opensearch.dataDir = "/var/opensearch_test";
-
services.opensearch.user = "open_search";
-
services.opensearch.group = "open_search";
-
systemd.tmpfiles.rules = [
-
"d /var/opensearch_test 0700 open_search open_search -"
-
];
-
users = {
-
groups.open_search = {};
-
users.open_search = {
-
description = "OpenSearch daemon user";
-
group = "open_search";
-
isSystemUser = true;
-
};
+
services.opensearch.dataDir = "/var/opensearch_test";
+
services.opensearch.user = "open_search";
+
services.opensearch.group = "open_search";
+
systemd.tmpfiles.rules = [
+
"d /var/opensearch_test 0700 open_search open_search -"
+
];
+
users = {
+
groups.open_search = { };
+
users.open_search = {
+
description = "OpenSearch daemon user";
+
group = "open_search";
+
isSystemUser = true;
};
};
};
+1 -1
nixos/tests/vscodium.nix
···
});
in
-
builtins.mapAttrs (k: v: mkTest k v { }) tests
+
builtins.mapAttrs (k: v: mkTest k v) tests