2022-01-25 17:38:37 +03:00
|
|
|
args@{ nixpkgs ? <nixpkgs>, ... }:
|
2021-05-10 00:22:48 +03:00
|
|
|
|
2022-01-25 17:38:37 +03:00
|
|
|
with (import "${nixpkgs}/lib");
|
2022-01-18 22:25:06 +03:00
|
|
|
|
2022-01-25 17:38:37 +03:00
|
|
|
import "${nixpkgs}/nixos/tests/make-test-python.nix"
|
2022-01-18 22:25:06 +03:00
|
|
|
(
|
|
|
|
let
|
|
|
|
sshdConf = {
|
|
|
|
enable = true;
|
|
|
|
hostKeys = [{ type = "ed25519"; path = "/etc/ssh/ssh_host_ed25519_key"; }];
|
|
|
|
};
|
2022-06-12 15:31:28 +03:00
|
|
|
|
|
|
|
testService = name: {
|
|
|
|
systemd.services.${name} = {
|
|
|
|
wantedBy = [ "multi-user.target" ];
|
|
|
|
reload = "touch /tmp/${name}-reloaded";
|
|
|
|
# restarting a serivice stops it
|
|
|
|
preStop = "touch /tmp/${name}-stopped";
|
|
|
|
serviceConfig = {
|
|
|
|
Type = "oneshot";
|
|
|
|
RemainAfterExit = true;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
testSecret = name: {
|
|
|
|
imports = map testService [ "${name}-reloadUnit" "${name}-restartUnit" ];
|
|
|
|
age.secrets.${name} = {
|
|
|
|
file = ../example/secret1.age;
|
|
|
|
onChange = "touch /tmp/${name}-onChange-executed";
|
|
|
|
reloadUnits = [ "${name}-reloadUnit.service" ];
|
|
|
|
restartUnits = [ "${name}-restartUnit.service" ];
|
|
|
|
};
|
|
|
|
};
|
2022-01-18 22:25:06 +03:00
|
|
|
in
|
|
|
|
rec {
|
|
|
|
name = "agenix-integration";
|
2021-05-10 00:22:48 +03:00
|
|
|
|
2022-01-18 22:25:06 +03:00
|
|
|
nodes.system1 = { config, ... }: {
|
|
|
|
imports = [
|
|
|
|
../modules/age.nix
|
|
|
|
./install_ssh_host_keys.nix
|
|
|
|
];
|
2021-05-10 00:22:48 +03:00
|
|
|
|
2022-01-18 22:25:06 +03:00
|
|
|
services.openssh = sshdConf;
|
2021-05-10 00:22:48 +03:00
|
|
|
|
2022-01-18 22:25:06 +03:00
|
|
|
age.secrets.passwordfile-user1.file = ../example/passwordfile-user1.age;
|
2022-01-18 22:22:15 +03:00
|
|
|
|
2022-01-18 22:25:06 +03:00
|
|
|
users = {
|
|
|
|
mutableUsers = false;
|
2021-05-10 00:22:48 +03:00
|
|
|
|
2022-01-18 22:25:06 +03:00
|
|
|
users = {
|
|
|
|
user1 = {
|
|
|
|
isNormalUser = true;
|
|
|
|
passwordFile = config.age.secrets.passwordfile-user1.path;
|
|
|
|
};
|
|
|
|
};
|
2021-05-10 00:22:48 +03:00
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2022-06-07 21:42:18 +03:00
|
|
|
nodes.system2 = { pkgs, ... }: {
|
2022-01-18 22:25:06 +03:00
|
|
|
imports = [
|
|
|
|
../modules/age.nix
|
|
|
|
./install_ssh_host_keys.nix
|
2022-06-12 15:31:28 +03:00
|
|
|
]
|
|
|
|
++ map testSecret [
|
|
|
|
"noChange"
|
|
|
|
"fileChange"
|
|
|
|
"secretChange"
|
|
|
|
"secretChangeWeirdPath"
|
|
|
|
"pathChange"
|
|
|
|
"pathChangeNoSymlink"
|
|
|
|
"modeChange"
|
|
|
|
"symlinkOn"
|
|
|
|
"symlinkOff"
|
|
|
|
]
|
|
|
|
# add these services so they get started before the secret is added
|
|
|
|
++ (testSecret "secretAdded").imports;
|
|
|
|
|
|
|
|
|
|
|
|
age.secrets.secretChangeWeirdPath.path = "/tmp/secretChangeWeirdPath";
|
|
|
|
age.secrets.pathChangeNoSymlink.symlink = false;
|
|
|
|
age.secrets.symlinkOn.symlink = false;
|
2022-01-18 22:25:06 +03:00
|
|
|
|
|
|
|
services.openssh = sshdConf;
|
|
|
|
};
|
|
|
|
|
2022-06-07 21:42:18 +03:00
|
|
|
nodes.system2After = { lib, ... }: {
|
2022-06-12 15:31:28 +03:00
|
|
|
imports = [
|
|
|
|
nodes.system2
|
|
|
|
# services have already been added
|
|
|
|
(builtins.removeAttrs (testSecret "secretAdded") [ "imports" ])
|
|
|
|
];
|
|
|
|
age.secrets.fileChange.file = lib.mkForce ../example/secret1-copy.age;
|
|
|
|
age.secrets.secretChange.file = lib.mkForce ../example/passwordfile-user1.age;
|
|
|
|
age.secrets.secretChangeWeirdPath.file = lib.mkForce ../example/passwordfile-user1.age;
|
|
|
|
age.secrets.pathChange.path = lib.mkForce "/tmp/pathChange";
|
|
|
|
age.secrets.pathChangeNoSymlink.path = lib.mkForce "/tmp/pathChangeNoSymlink";
|
|
|
|
age.secrets.modeChange.mode = lib.mkForce "0777";
|
|
|
|
age.secrets.symlinkOn.symlink = lib.mkForce true;
|
|
|
|
age.secrets.symlinkOff.symlink = lib.mkForce false;
|
2022-01-18 22:25:06 +03:00
|
|
|
};
|
|
|
|
|
|
|
|
testScript =
|
|
|
|
let
|
|
|
|
user = "user1";
|
|
|
|
password = "password1234";
|
|
|
|
in
|
|
|
|
{ nodes, ... }:
|
|
|
|
''
|
|
|
|
system1.start()
|
|
|
|
system2.start()
|
|
|
|
|
|
|
|
system1.wait_for_unit("multi-user.target")
|
|
|
|
system1.wait_until_succeeds("pgrep -f 'agetty.*tty1'")
|
|
|
|
system1.sleep(2)
|
|
|
|
system1.send_key("alt-f2")
|
|
|
|
system1.wait_until_succeeds("[ $(fgconsole) = 2 ]")
|
|
|
|
system1.wait_for_unit("getty@tty2.service")
|
|
|
|
system1.wait_until_succeeds("pgrep -f 'agetty.*tty2'")
|
|
|
|
system1.wait_until_tty_matches(2, "login: ")
|
|
|
|
system1.send_chars("${user}\n")
|
|
|
|
system1.wait_until_tty_matches(2, "login: ${user}")
|
|
|
|
system1.wait_until_succeeds("pgrep login")
|
|
|
|
system1.sleep(2)
|
|
|
|
system1.send_chars("${password}\n")
|
|
|
|
system1.send_chars("whoami > /tmp/1\n")
|
|
|
|
system1.wait_for_file("/tmp/1")
|
|
|
|
assert "${user}" in system1.succeed("cat /tmp/1")
|
|
|
|
|
2022-06-07 21:42:18 +03:00
|
|
|
# test changing secret
|
2022-01-18 22:25:06 +03:00
|
|
|
system2.wait_for_unit("multi-user.target")
|
2022-06-12 15:31:28 +03:00
|
|
|
# for these secrets the content doesn't change at all
|
|
|
|
system2_noChange_secrets = [
|
|
|
|
"noChange",
|
|
|
|
"fileChange",
|
|
|
|
"symlinkOn",
|
|
|
|
"symlinkOff",
|
|
|
|
]
|
|
|
|
system2_change_secrets = [
|
|
|
|
"secretChange",
|
|
|
|
"secretChangeWeirdPath",
|
|
|
|
"pathChange",
|
|
|
|
"pathChangeNoSymlink",
|
|
|
|
"modeChange",
|
|
|
|
"secretAdded",
|
|
|
|
]
|
|
|
|
system2_secrets = system2_noChange_secrets + system2_change_secrets
|
|
|
|
system2.wait_for_unit("multi-user.target")
|
|
|
|
for secret in system2_secrets:
|
|
|
|
system2.wait_for_unit(secret + "-reloadUnit")
|
|
|
|
system2.wait_for_unit(secret + "-restartUnit")
|
|
|
|
|
|
|
|
def test_not_changed(secret):
|
|
|
|
system2.fail("test -f /tmp/" + secret + "-reloadUnit-reloaded")
|
|
|
|
system2.fail("test -f /tmp/" + secret + "-reloadUnit-restarted")
|
|
|
|
system2.fail("test -f /tmp/" + secret + "-restartUnit-reloaded")
|
|
|
|
system2.fail("test -f /tmp/" + secret + "-restartUnit-restarted")
|
|
|
|
system2.fail("test -f /tmp/" + secret + "-onChange-executed")
|
|
|
|
def test_changed(secret):
|
|
|
|
system2.wait_for_file("/tmp/" + secret + "-onChange-executed")
|
|
|
|
system2.wait_for_file("/tmp/" + secret + "-reloadUnit-reloaded")
|
|
|
|
system2.wait_for_file("/tmp/" + secret + "-restartUnit-stopped")
|
|
|
|
system2.fail("test -f /tmp/" + secret + "-reloadUnit-restarted")
|
|
|
|
system2.fail("test -f /tmp/" + secret + "-restartUnit-reloaded")
|
|
|
|
|
|
|
|
# nothing should happen at startup
|
|
|
|
for secret in system2_secrets:
|
|
|
|
test_not_changed(secret)
|
|
|
|
|
|
|
|
# apply changes
|
2022-06-07 21:42:18 +03:00
|
|
|
system2.succeed(
|
2022-01-25 17:38:37 +03:00
|
|
|
"${nodes.system2After.config.system.build.toplevel}/bin/switch-to-configuration test"
|
|
|
|
)
|
2022-06-12 15:31:28 +03:00
|
|
|
for secret in system2_noChange_secrets:
|
|
|
|
test_not_changed(secret)
|
|
|
|
for secret in system2_change_secrets:
|
|
|
|
test_changed(secret)
|
2022-01-18 22:25:06 +03:00
|
|
|
'';
|
|
|
|
}
|
|
|
|
)
|
2022-01-18 22:22:15 +03:00
|
|
|
args
|