2019-11-05 00:33:17 +01:00
|
|
|
import ./make-test-python.nix ({ pkgs, ... }:
|
2014-06-27 08:34:59 +02:00
|
|
|
|
2018-02-28 22:55:00 +01:00
|
|
|
let inherit (import ./ssh-keys.nix pkgs)
|
|
|
|
snakeOilPrivateKey snakeOilPublicKey;
|
2014-06-27 08:34:59 +02:00
|
|
|
in {
|
2014-06-28 16:04:49 +02:00
|
|
|
name = "openssh";
|
2021-01-10 20:08:30 +01:00
|
|
|
meta = with pkgs.lib.maintainers; {
|
2019-02-22 16:14:13 +01:00
|
|
|
maintainers = [ aszlig eelco ];
|
2015-07-12 12:09:40 +02:00
|
|
|
};
|
2010-03-18 14:07:56 +01:00
|
|
|
|
|
|
|
nodes = {
|
2011-09-14 20:20:50 +02:00
|
|
|
|
|
|
|
server =
|
2018-07-20 22:56:59 +02:00
|
|
|
{ ... }:
|
2011-09-14 20:20:50 +02:00
|
|
|
|
2010-03-18 14:07:56 +01:00
|
|
|
{
|
|
|
|
services.openssh.enable = true;
|
2013-10-17 15:37:08 +02:00
|
|
|
security.pam.services.sshd.limits =
|
|
|
|
[ { domain = "*"; item = "memlock"; type = "-"; value = 1024; } ];
|
2018-06-30 01:55:42 +02:00
|
|
|
users.users.root.openssh.authorizedKeys.keys = [
|
2014-06-27 08:34:59 +02:00
|
|
|
snakeOilPublicKey
|
|
|
|
];
|
2010-05-27 12:05:17 +02:00
|
|
|
};
|
2011-09-14 20:20:50 +02:00
|
|
|
|
2016-12-29 15:49:43 +01:00
|
|
|
server_lazy =
|
2018-07-20 22:56:59 +02:00
|
|
|
{ ... }:
|
2016-12-29 15:49:43 +01:00
|
|
|
|
|
|
|
{
|
|
|
|
services.openssh = { enable = true; startWhenNeeded = true; };
|
|
|
|
security.pam.services.sshd.limits =
|
|
|
|
[ { domain = "*"; item = "memlock"; type = "-"; value = 1024; } ];
|
2018-06-30 01:55:42 +02:00
|
|
|
users.users.root.openssh.authorizedKeys.keys = [
|
2016-12-29 15:49:43 +01:00
|
|
|
snakeOilPublicKey
|
|
|
|
];
|
|
|
|
};
|
|
|
|
|
2019-02-25 00:48:01 +01:00
|
|
|
server_localhost_only =
|
|
|
|
{ ... }:
|
|
|
|
|
|
|
|
{
|
|
|
|
services.openssh = {
|
|
|
|
enable = true; listenAddresses = [ { addr = "127.0.0.1"; port = 22; } ];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
server_localhost_only_lazy =
|
|
|
|
{ ... }:
|
|
|
|
|
|
|
|
{
|
|
|
|
services.openssh = {
|
|
|
|
enable = true; startWhenNeeded = true; listenAddresses = [ { addr = "127.0.0.1"; port = 22; } ];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2011-09-14 20:20:50 +02:00
|
|
|
client =
|
2018-07-20 22:56:59 +02:00
|
|
|
{ ... }: { };
|
2011-09-14 20:20:50 +02:00
|
|
|
|
2010-03-18 14:07:56 +01:00
|
|
|
};
|
2011-09-14 20:20:50 +02:00
|
|
|
|
2011-01-12 18:36:15 +01:00
|
|
|
testScript = ''
|
2019-11-05 00:33:17 +01:00
|
|
|
start_all()
|
|
|
|
|
|
|
|
server.wait_for_unit("sshd")
|
|
|
|
|
|
|
|
with subtest("manual-authkey"):
|
|
|
|
client.succeed("mkdir -m 700 /root/.ssh")
|
|
|
|
client.succeed(
|
|
|
|
'${pkgs.openssh}/bin/ssh-keygen -t ed25519 -f /root/.ssh/id_ed25519 -N ""'
|
|
|
|
)
|
|
|
|
public_key = client.succeed(
|
|
|
|
"${pkgs.openssh}/bin/ssh-keygen -y -f /root/.ssh/id_ed25519"
|
|
|
|
)
|
|
|
|
public_key = public_key.strip()
|
|
|
|
client.succeed("chmod 600 /root/.ssh/id_ed25519")
|
|
|
|
|
|
|
|
server.succeed("mkdir -m 700 /root/.ssh")
|
|
|
|
server.succeed("echo '{}' > /root/.ssh/authorized_keys".format(public_key))
|
|
|
|
server_lazy.succeed("mkdir -m 700 /root/.ssh")
|
|
|
|
server_lazy.succeed("echo '{}' > /root/.ssh/authorized_keys".format(public_key))
|
|
|
|
|
|
|
|
client.wait_for_unit("network.target")
|
|
|
|
client.succeed(
|
2022-05-04 06:58:52 +02:00
|
|
|
"ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no server 'echo hello world' >&2",
|
|
|
|
timeout=30
|
2019-11-05 00:33:17 +01:00
|
|
|
)
|
|
|
|
client.succeed(
|
2022-05-04 06:58:52 +02:00
|
|
|
"ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no server 'ulimit -l' | grep 1024",
|
|
|
|
timeout=30
|
2019-11-05 00:33:17 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
client.succeed(
|
2022-05-04 06:58:52 +02:00
|
|
|
"ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no server_lazy 'echo hello world' >&2",
|
|
|
|
timeout=30
|
2019-11-05 00:33:17 +01:00
|
|
|
)
|
|
|
|
client.succeed(
|
2022-05-04 06:58:52 +02:00
|
|
|
"ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no server_lazy 'ulimit -l' | grep 1024",
|
|
|
|
timeout=30
|
2019-11-05 00:33:17 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
with subtest("configured-authkey"):
|
|
|
|
client.succeed(
|
|
|
|
"cat ${snakeOilPrivateKey} > privkey.snakeoil"
|
|
|
|
)
|
|
|
|
client.succeed("chmod 600 privkey.snakeoil")
|
|
|
|
client.succeed(
|
2022-05-04 06:58:52 +02:00
|
|
|
"ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no -i privkey.snakeoil server true",
|
|
|
|
timeout=30
|
2019-11-05 00:33:17 +01:00
|
|
|
)
|
|
|
|
client.succeed(
|
2022-05-04 06:58:52 +02:00
|
|
|
"ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no -i privkey.snakeoil server_lazy true",
|
|
|
|
timeout=30
|
2019-11-05 00:33:17 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
with subtest("localhost-only"):
|
|
|
|
server_localhost_only.succeed("ss -nlt | grep '127.0.0.1:22'")
|
|
|
|
server_localhost_only_lazy.succeed("ss -nlt | grep '127.0.0.1:22'")
|
2010-03-18 14:07:56 +01:00
|
|
|
'';
|
2014-04-14 14:02:44 +02:00
|
|
|
})
|