2022-08-03 12:36:11 +02:00
|
|
|
import ./make-test-python.nix ({ lib, ... }: {
|
|
|
|
name = "systemd-initrd-network-ssh";
|
|
|
|
meta.maintainers = [ lib.maintainers.elvishjerricco ];
|
|
|
|
|
|
|
|
nodes = with lib; {
|
|
|
|
server = { config, pkgs, ... }: {
|
|
|
|
environment.systemPackages = [pkgs.cryptsetup];
|
|
|
|
boot.loader.systemd-boot.enable = true;
|
|
|
|
boot.loader.timeout = 0;
|
|
|
|
virtualisation = {
|
|
|
|
emptyDiskImages = [ 4096 ];
|
|
|
|
useBootLoader = true;
|
2023-05-25 19:07:40 +02:00
|
|
|
# Booting off the encrypted disk requires an available init script from the Nix store
|
|
|
|
mountHostNixStore = true;
|
2022-08-03 12:36:11 +02:00
|
|
|
useEFIBoot = true;
|
|
|
|
};
|
|
|
|
|
|
|
|
specialisation.encrypted-root.configuration = {
|
|
|
|
virtualisation.bootDevice = "/dev/mapper/root";
|
|
|
|
boot.initrd.luks.devices = lib.mkVMOverride {
|
|
|
|
root.device = "/dev/vdc";
|
|
|
|
};
|
|
|
|
boot.initrd.systemd.enable = true;
|
|
|
|
boot.initrd.network = {
|
|
|
|
enable = true;
|
|
|
|
ssh = {
|
|
|
|
enable = true;
|
|
|
|
authorizedKeys = [ (readFile ./initrd-network-ssh/id_ed25519.pub) ];
|
|
|
|
port = 22;
|
|
|
|
# Terrible hack so it works with useBootLoader
|
|
|
|
hostKeys = [ { outPath = "${./initrd-network-ssh/ssh_host_ed25519_key}"; } ];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
client = { config, ... }: {
|
|
|
|
environment.etc = {
|
|
|
|
knownHosts = {
|
|
|
|
text = concatStrings [
|
|
|
|
"server,"
|
|
|
|
"${
|
|
|
|
toString (head (splitString " " (toString
|
|
|
|
(elemAt (splitString "\n" config.networking.extraHosts) 2))))
|
|
|
|
} "
|
|
|
|
"${readFile ./initrd-network-ssh/ssh_host_ed25519_key.pub}"
|
|
|
|
];
|
|
|
|
};
|
|
|
|
sshKey = {
|
|
|
|
source = ./initrd-network-ssh/id_ed25519;
|
|
|
|
mode = "0600";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
testScript = ''
|
|
|
|
start_all()
|
|
|
|
|
|
|
|
def ssh_is_up(_) -> bool:
|
|
|
|
status, _ = client.execute("nc -z server 22")
|
|
|
|
return status == 0
|
|
|
|
|
|
|
|
server.wait_for_unit("multi-user.target")
|
|
|
|
server.succeed(
|
|
|
|
"echo somepass | cryptsetup luksFormat --type=luks2 /dev/vdc",
|
|
|
|
"bootctl set-default nixos-generation-1-specialisation-encrypted-root.conf",
|
|
|
|
"sync",
|
|
|
|
)
|
|
|
|
server.shutdown()
|
|
|
|
server.start()
|
|
|
|
|
|
|
|
client.wait_for_unit("network.target")
|
|
|
|
with client.nested("waiting for SSH server to come up"):
|
|
|
|
retry(ssh_is_up)
|
|
|
|
|
|
|
|
client.succeed(
|
|
|
|
"echo somepass | ssh -i /etc/sshKey -o UserKnownHostsFile=/etc/knownHosts server 'systemd-tty-ask-password-agent' & exit"
|
|
|
|
)
|
|
|
|
|
|
|
|
server.wait_for_unit("multi-user.target")
|
|
|
|
server.succeed("mount | grep '/dev/mapper/root on /'")
|
|
|
|
'';
|
|
|
|
})
|