1import ./make-test-python.nix ({ pkgs, ... }:
2 let
3 certs = import ./common/acme/server/snakeoil-certs.nix;
4 serverDomain = certs.domain;
5
6 testCredentials = {
7 password = "Password1_cZPEwpCWvrReripJmAZdmVIZd8HHoHcl";
8 };
9 in
10 {
11 name = "kanidm";
12 meta.maintainers = with pkgs.lib.maintainers; [ erictapen Flakebi ];
13
14 nodes.server = { config, pkgs, lib, ... }: {
15 services.kanidm = {
16 enableServer = true;
17 serverSettings = {
18 origin = "https://${serverDomain}";
19 domain = serverDomain;
20 bindaddress = "[::]:443";
21 ldapbindaddress = "[::1]:636";
22 tls_chain = certs."${serverDomain}".cert;
23 tls_key = certs."${serverDomain}".key;
24 };
25 };
26
27 security.pki.certificateFiles = [ certs.ca.cert ];
28
29 networking.hosts."::1" = [ serverDomain ];
30 networking.firewall.allowedTCPPorts = [ 443 ];
31
32 users.users.kanidm.shell = pkgs.bashInteractive;
33
34 environment.systemPackages = with pkgs; [ kanidm openldap ripgrep ];
35 };
36
37 nodes.client = { pkgs, nodes, ... }: {
38 services.kanidm = {
39 enableClient = true;
40 clientSettings = {
41 uri = "https://${serverDomain}";
42 verify_ca = true;
43 verify_hostnames = true;
44 };
45 enablePam = true;
46 unixSettings = {
47 pam_allowed_login_groups = [ "shell" ];
48 };
49 };
50
51 networking.hosts."${nodes.server.networking.primaryIPAddress}" = [ serverDomain ];
52
53 security.pki.certificateFiles = [ certs.ca.cert ];
54 };
55
56 testScript = { nodes, ... }:
57 let
58 ldapBaseDN = builtins.concatStringsSep "," (map (s: "dc=" + s) (pkgs.lib.splitString "." serverDomain));
59
60 # We need access to the config file in the test script.
61 filteredConfig = pkgs.lib.converge
62 (pkgs.lib.filterAttrsRecursive (_: v: v != null))
63 nodes.server.services.kanidm.serverSettings;
64 serverConfigFile = (pkgs.formats.toml { }).generate "server.toml" filteredConfig;
65
66 in
67 ''
68 start_all()
69 server.wait_for_unit("kanidm.service")
70 client.systemctl("start network-online.target")
71 client.wait_for_unit("network-online.target")
72
73 with subtest("Test HTTP interface"):
74 server.wait_until_succeeds("curl -Lsf https://${serverDomain} | grep Kanidm")
75
76 with subtest("Test LDAP interface"):
77 server.succeed("ldapsearch -H ldaps://${serverDomain}:636 -b '${ldapBaseDN}' -x '(name=test)'")
78
79 with subtest("Recover idm_admin account"):
80 idm_admin_password = server.succeed("su - kanidm -c 'kanidmd recover-account -c ${serverConfigFile} idm_admin 2>&1 | rg -o \'[A-Za-z0-9]{48}\' '").strip().removeprefix("'").removesuffix("'")
81
82 with subtest("Test CLI login"):
83 client.wait_until_tty_matches("1", "login: ")
84 client.send_chars("root\n")
85 client.send_chars("kanidm login -D idm_admin\n")
86 client.wait_until_tty_matches("1", "Enter password: ")
87 client.send_chars(f"{idm_admin_password}\n")
88 client.wait_until_tty_matches("1", "Login Success for idm_admin")
89
90 with subtest("Test unixd connection"):
91 client.wait_for_unit("kanidm-unixd.service")
92 client.wait_for_file("/run/kanidm-unixd/sock")
93 client.wait_until_succeeds("kanidm-unix status | grep working!")
94
95 with subtest("Test user creation"):
96 client.wait_for_unit("getty@tty1.service")
97 client.wait_until_succeeds("pgrep -f 'agetty.*tty1'")
98 client.succeed("kanidm person create testuser TestUser")
99 client.succeed("kanidm person posix set --shell \"$SHELL\" testuser")
100 client.send_chars("kanidm person posix set-password testuser\n")
101 client.wait_until_tty_matches("1", "Enter new")
102 client.send_chars("${testCredentials.password}\n")
103 client.wait_until_tty_matches("1", "Retype")
104 client.send_chars("${testCredentials.password}\n")
105 output = client.succeed("getent passwd testuser")
106 assert "TestUser" in output
107 client.succeed("kanidm group create shell")
108 client.succeed("kanidm group posix set shell")
109 client.succeed("kanidm group add-members shell testuser")
110
111 with subtest("Test user login"):
112 client.send_key("alt-f2")
113 client.wait_until_succeeds("[ $(fgconsole) = 2 ]")
114 client.wait_for_unit("getty@tty2.service")
115 client.wait_until_succeeds("pgrep -f 'agetty.*tty2'")
116 client.wait_until_tty_matches("2", "login: ")
117 client.send_chars("testuser\n")
118 client.wait_until_tty_matches("2", "login: testuser")
119 client.wait_until_succeeds("pgrep login")
120 client.wait_until_tty_matches("2", "Password: ")
121 client.send_chars("${testCredentials.password}\n")
122 client.wait_until_succeeds("systemctl is-active user@$(id -u testuser).service")
123 client.send_chars("touch done\n")
124 client.wait_for_file("/home/testuser@${serverDomain}/done")
125 '';
126 })