at 17.09-beta 3.2 kB view raw
1import ./make-test.nix ({ pkgs, ... }: 2 3let 4 snakeOilPrivateKey = pkgs.writeText "privkey.snakeoil" '' 5 -----BEGIN EC PRIVATE KEY----- 6 MHcCAQEEIHQf/khLvYrQ8IOika5yqtWvI0oquHlpRLTZiJy5dRJmoAoGCCqGSM49 7 AwEHoUQDQgAEKF0DYGbBwbj06tA3fd/+yP44cvmwmHBWXZCKbS+RQlAKvLXMWkpN 8 r1lwMyJZoSGgBHoUahoYjTh9/sJL7XLJtA== 9 -----END EC PRIVATE KEY----- 10 ''; 11 12 snakeOilPublicKey = pkgs.lib.concatStrings [ 13 "ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHA" 14 "yNTYAAABBBChdA2BmwcG49OrQN33f/sj+OHL5sJhwVl2Qim0vkUJQCry1zFpKTa" 15 "9ZcDMiWaEhoAR6FGoaGI04ff7CS+1yybQ= sakeoil" 16 ]; 17 18in { 19 name = "openssh"; 20 meta = with pkgs.stdenv.lib.maintainers; { 21 maintainers = [ aszlig eelco chaoflow ]; 22 }; 23 24 nodes = { 25 26 server = 27 { config, pkgs, ... }: 28 29 { 30 services.openssh.enable = true; 31 security.pam.services.sshd.limits = 32 [ { domain = "*"; item = "memlock"; type = "-"; value = 1024; } ]; 33 users.extraUsers.root.openssh.authorizedKeys.keys = [ 34 snakeOilPublicKey 35 ]; 36 }; 37 38 server_lazy = 39 { config, pkgs, ... }: 40 41 { 42 services.openssh = { enable = true; startWhenNeeded = true; }; 43 security.pam.services.sshd.limits = 44 [ { domain = "*"; item = "memlock"; type = "-"; value = 1024; } ]; 45 users.extraUsers.root.openssh.authorizedKeys.keys = [ 46 snakeOilPublicKey 47 ]; 48 }; 49 50 client = 51 { config, pkgs, ... }: { }; 52 53 }; 54 55 testScript = '' 56 startAll; 57 58 my $key=`${pkgs.openssh}/bin/ssh-keygen -t ed25519 -f key -N ""`; 59 60 $server->waitForUnit("sshd"); 61 62 subtest "manual-authkey", sub { 63 $server->succeed("mkdir -m 700 /root/.ssh"); 64 $server->copyFileFromHost("key.pub", "/root/.ssh/authorized_keys"); 65 $server_lazy->succeed("mkdir -m 700 /root/.ssh"); 66 $server_lazy->copyFileFromHost("key.pub", "/root/.ssh/authorized_keys"); 67 68 $client->succeed("mkdir -m 700 /root/.ssh"); 69 $client->copyFileFromHost("key", "/root/.ssh/id_ed25519"); 70 $client->succeed("chmod 600 /root/.ssh/id_ed25519"); 71 72 $client->waitForUnit("network.target"); 73 $client->succeed("ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no server 'echo hello world' >&2"); 74 $client->succeed("ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no server 'ulimit -l' | grep 1024"); 75 76 $client->succeed("ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no server_lazy 'echo hello world' >&2"); 77 $client->succeed("ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no server_lazy 'ulimit -l' | grep 1024"); 78 79 }; 80 81 subtest "configured-authkey", sub { 82 $client->succeed("cat ${snakeOilPrivateKey} > privkey.snakeoil"); 83 $client->succeed("chmod 600 privkey.snakeoil"); 84 $client->succeed("ssh -o UserKnownHostsFile=/dev/null" . 85 " -o StrictHostKeyChecking=no -i privkey.snakeoil" . 86 " server true"); 87 88 $client->succeed("ssh -o UserKnownHostsFile=/dev/null" . 89 " -o StrictHostKeyChecking=no -i privkey.snakeoil" . 90 " server_lazy true"); 91 92 }; 93 ''; 94})