1# This test runs podman as a backend for the Docker CLI.
2import ../make-test-python.nix (
3 { pkgs, lib, ... }:
4
5 let
6 gen-ca = pkgs.writeScript "gen-ca" ''
7 # Create CA
8 PATH="${pkgs.openssl}/bin:$PATH"
9 openssl genrsa -out ca-key.pem 4096
10 openssl req -new -x509 -days 365 -key ca-key.pem -sha256 -subj '/C=NL/ST=Zuid-Holland/L=The Hague/O=Stevige Balken en Planken B.V./OU=OpSec/CN=Certificate Authority' -out ca.pem
11
12 # Create service
13 openssl genrsa -out podman-key.pem 4096
14 openssl req -subj '/CN=podman' -sha256 -new -key podman-key.pem -out service.csr
15 echo subjectAltName = DNS:podman,IP:127.0.0.1 >> extfile.cnf
16 echo extendedKeyUsage = serverAuth >> extfile.cnf
17 openssl x509 -req -days 365 -sha256 -in service.csr -CA ca.pem -CAkey ca-key.pem -CAcreateserial -out podman-cert.pem -extfile extfile.cnf
18
19 # Create client
20 openssl genrsa -out client-key.pem 4096
21 openssl req -subj '/CN=client' -new -key client-key.pem -out client.csr
22 echo extendedKeyUsage = clientAuth > extfile-client.cnf
23 openssl x509 -req -days 365 -sha256 -in client.csr -CA ca.pem -CAkey ca-key.pem -CAcreateserial -out client-cert.pem -extfile extfile-client.cnf
24
25 # Create CA 2
26 PATH="${pkgs.openssl}/bin:$PATH"
27 openssl genrsa -out ca-2-key.pem 4096
28 openssl req -new -x509 -days 365 -key ca-2-key.pem -sha256 -subj '/C=NL/ST=Zuid-Holland/L=The Hague/O=Stevige Balken en Planken B.V./OU=OpSec/CN=Certificate Authority' -out ca-2.pem
29
30 # Create client signed by CA 2
31 openssl genrsa -out client-2-key.pem 4096
32 openssl req -subj '/CN=client' -new -key client-2-key.pem -out client-2.csr
33 echo extendedKeyUsage = clientAuth > extfile-client.cnf
34 openssl x509 -req -days 365 -sha256 -in client-2.csr -CA ca-2.pem -CAkey ca-2-key.pem -CAcreateserial -out client-2-cert.pem -extfile extfile-client.cnf
35
36 '';
37 in
38 {
39 name = "podman-tls-ghostunnel";
40 meta = {
41 maintainers = lib.teams.podman.members ++ [ lib.maintainers.roberth ];
42 };
43
44 nodes = {
45 podman =
46 { pkgs, ... }:
47 {
48 virtualisation.podman.enable = true;
49 virtualisation.podman.dockerSocket.enable = true;
50 virtualisation.podman.networkSocket = {
51 enable = true;
52 openFirewall = true;
53 server = "ghostunnel";
54 tls.cert = "/root/podman-cert.pem";
55 tls.key = "/root/podman-key.pem";
56 tls.cacert = "/root/ca.pem";
57 };
58
59 environment.systemPackages = [
60 pkgs.docker-client
61 ];
62
63 users.users.alice = {
64 isNormalUser = true;
65 home = "/home/alice";
66 description = "Alice Foobar";
67 extraGroups = [ "podman" ];
68 };
69
70 };
71
72 client =
73 { ... }:
74 {
75 environment.systemPackages = [
76 # Installs the docker _client_ only
77 # Normally, you'd want `virtualisation.docker.enable = true;`.
78 pkgs.docker-client
79 ];
80 environment.variables.DOCKER_HOST = "podman:2376";
81 environment.variables.DOCKER_TLS_VERIFY = "1";
82 };
83 };
84
85 testScript = ''
86 import shlex
87
88
89 def su_cmd(user, cmd):
90 cmd = shlex.quote(cmd)
91 return f"su {user} -l -c {cmd}"
92
93 def cmd(command):
94 print(f"+{command}")
95 r = os.system(command)
96 if r != 0:
97 raise Exception(f"Command {command} failed with exit code {r}")
98
99 start_all()
100 cmd("${gen-ca}")
101
102 podman.copy_from_host("ca.pem", "/root/ca.pem")
103 podman.copy_from_host("podman-cert.pem", "/root/podman-cert.pem")
104 podman.copy_from_host("podman-key.pem", "/root/podman-key.pem")
105
106 client.copy_from_host("ca.pem", "/root/.docker/ca.pem")
107 # client.copy_from_host("podman-cert.pem", "/root/podman-cert.pem")
108 client.copy_from_host("client-cert.pem", "/root/.docker/cert.pem")
109 client.copy_from_host("client-key.pem", "/root/.docker/key.pem")
110
111 # TODO (ghostunnel): add file watchers so the restart isn't necessary
112 podman.succeed("systemctl reset-failed && systemctl restart ghostunnel-server-podman-socket.service")
113
114 podman.wait_for_unit("sockets.target")
115 podman.wait_for_unit("ghostunnel-server-podman-socket.service")
116
117 with subtest("Root docker cli also works"):
118 podman.succeed("docker version")
119
120 with subtest("A podman member can also still use the docker cli"):
121 podman.succeed(su_cmd("alice", "docker version"))
122
123 with subtest("Run container remotely via docker cli"):
124 client.succeed("docker version")
125
126 # via socket would be nicer
127 podman.succeed("tar cv --files-from /dev/null | podman import - scratchimg")
128
129 client.succeed(
130 "docker run -d --name=sleeping -v /nix/store:/nix/store -v /run/current-system/sw/bin:/bin localhost/scratchimg /bin/sleep 10"
131 )
132 client.succeed("docker ps | grep sleeping")
133 podman.succeed("docker ps | grep sleeping")
134 client.succeed("docker stop sleeping")
135 client.succeed("docker rm sleeping")
136
137 with subtest("Clients without cert will be denied"):
138 client.succeed("rm /root/.docker/{cert,key}.pem")
139 client.fail("docker version")
140
141 with subtest("Clients with wrong cert will be denied"):
142 client.copy_from_host("client-2-cert.pem", "/root/.docker/cert.pem")
143 client.copy_from_host("client-2-key.pem", "/root/.docker/key.pem")
144 client.fail("docker version")
145
146 '';
147 }
148)