clan-core/checks/borgbackup/default.nix

52 lines
1.6 KiB
Nix
Raw Normal View History

2024-03-17 18:48:49 +00:00
(import ../lib/test-base.nix) (
{ ... }:
{
name = "borgbackup";
2024-03-17 18:48:49 +00:00
nodes.machine =
{ self, pkgs, ... }:
{
2024-03-17 18:48:49 +00:00
imports = [
self.clanModules.borgbackup
self.nixosModules.clanCore
{
services.openssh.enable = true;
services.borgbackup.repos.testrepo = {
authorizedKeys = [ (builtins.readFile ../lib/ssh/pubkey) ];
};
2024-03-17 18:48:49 +00:00
}
{
clanCore.machineName = "machine";
clanCore.clanDir = ./.;
clanCore.state.testState.folders = [ "/etc/state" ];
environment.etc.state.text = "hello world";
systemd.tmpfiles.settings."vmsecrets" = {
"/etc/secrets/borgbackup.ssh" = {
C.argument = "${../lib/ssh/privkey}";
z = {
mode = "0400";
user = "root";
};
};
"/etc/secrets/borgbackup.repokey" = {
C.argument = builtins.toString (pkgs.writeText "repokey" "repokey12345");
z = {
mode = "0400";
user = "root";
};
};
2024-02-22 13:50:07 +00:00
};
clanCore.facts.secretStore = "vm";
2024-02-22 13:50:07 +00:00
2024-03-17 18:48:49 +00:00
clan.borgbackup.destinations.test.repo = "borg@localhost:.";
}
];
};
testScript = ''
start_all()
machine.systemctl("start --wait borgbackup-job-test.service")
assert "machine-test" in machine.succeed("BORG_UNKNOWN_UNENCRYPTED_REPO_ACCESS_IS_OK=yes /run/current-system/sw/bin/borg-job-test list")
'';
}
)