at master 9.5 kB view raw
1{ pkgs, ... }: 2let 3 snakeOil = 4 pkgs.runCommand "snakeoil-certs" 5 { 6 outputs = [ 7 "out" 8 "cacert" 9 "cert" 10 "key" 11 "crl" 12 ]; 13 buildInputs = [ pkgs.gnutls.bin ]; 14 caTemplate = pkgs.writeText "snakeoil-ca.template" '' 15 cn = server 16 expiration_days = -1 17 cert_signing_key 18 ca 19 ''; 20 certTemplate = pkgs.writeText "snakeoil-cert.template" '' 21 cn = server 22 expiration_days = -1 23 tls_www_server 24 encryption_key 25 signing_key 26 ''; 27 crlTemplate = pkgs.writeText "snakeoil-crl.template" '' 28 expiration_days = -1 29 ''; 30 userCertTemplate = pkgs.writeText "snakeoil-user-cert.template" '' 31 organization = snakeoil 32 cn = server 33 expiration_days = -1 34 tls_www_client 35 encryption_key 36 signing_key 37 ''; 38 } 39 '' 40 certtool -p --bits 4096 --outfile ca.key 41 certtool -s --template "$caTemplate" --load-privkey ca.key \ 42 --outfile "$cacert" 43 certtool -p --bits 4096 --outfile "$key" 44 certtool -c --template "$certTemplate" \ 45 --load-ca-privkey ca.key \ 46 --load-ca-certificate "$cacert" \ 47 --load-privkey "$key" \ 48 --outfile "$cert" 49 certtool --generate-crl --template "$crlTemplate" \ 50 --load-ca-privkey ca.key \ 51 --load-ca-certificate "$cacert" \ 52 --outfile "$crl" 53 54 mkdir "$out" 55 56 # Stripping key information before the actual PEM-encoded values is solely 57 # to make test output a bit less verbose when copying the client key to the 58 # actual client. 59 certtool -p --bits 4096 | sed -n \ 60 -e '/^----* *BEGIN/,/^----* *END/p' > "$out/alice.key" 61 62 certtool -c --template "$userCertTemplate" \ 63 --load-privkey "$out/alice.key" \ 64 --load-ca-privkey ca.key \ 65 --load-ca-certificate "$cacert" \ 66 --outfile "$out/alice.cert" 67 ''; 68 69in 70{ 71 name = "taskserver"; 72 73 nodes = rec { 74 server = { 75 services.taskserver.enable = true; 76 services.taskserver.listenHost = "::"; 77 services.taskserver.openFirewall = true; 78 services.taskserver.fqdn = "server"; 79 services.taskserver.organisations = { 80 testOrganisation.users = [ 81 "alice" 82 "foo" 83 ]; 84 anotherOrganisation.users = [ "bob" ]; 85 }; 86 87 specialisation.manual_config.configuration = { 88 services.taskserver.pki.manual = { 89 ca.cert = snakeOil.cacert; 90 server.cert = snakeOil.cert; 91 server.key = snakeOil.key; 92 server.crl = snakeOil.crl; 93 }; 94 }; 95 }; 96 97 client1 = 98 { pkgs, ... }: 99 { 100 environment.systemPackages = [ 101 pkgs.taskwarrior2 102 pkgs.gnutls 103 ]; 104 users.users.alice.isNormalUser = true; 105 users.users.bob.isNormalUser = true; 106 users.users.foo.isNormalUser = true; 107 users.users.bar.isNormalUser = true; 108 }; 109 110 client2 = client1; 111 }; 112 113 testScript = 114 { nodes, ... }: 115 let 116 cfg = nodes.server.services.taskserver; 117 portStr = toString cfg.listenPort; 118 specialisations = "${nodes.server.system.build.toplevel}/specialisation"; 119 newServerSystem = "${specialisations}/manual_config"; 120 switchToNewServer = "${newServerSystem}/bin/switch-to-configuration test"; 121 in 122 '' 123 from shlex import quote 124 125 126 def su(user, cmd): 127 return f"su - {user} -c {quote(cmd)}" 128 129 130 def no_extra_init(client, org, user): 131 pass 132 133 134 def setup_clients_for(org, user, extra_init=no_extra_init): 135 for client in [client1, client2]: 136 with client.nested(f"initialize client for user {user}"): 137 client.succeed( 138 su(user, f"rm -rf /home/{user}/.task"), 139 su(user, "task rc.confirmation=no config confirmation no"), 140 ) 141 142 exportinfo = server.succeed(f"nixos-taskserver user export {org} {user}") 143 144 with client.nested("importing taskwarrior configuration"): 145 client.succeed(su(user, f"eval {quote(exportinfo)} >&2")) 146 147 extra_init(client, org, user) 148 149 client.succeed(su(user, "task config taskd.server server:${portStr} >&2")) 150 151 client.succeed(su(user, "task sync init >&2")) 152 153 154 def restart_server(): 155 server.systemctl("restart taskserver.service") 156 server.wait_for_open_port(${portStr}) 157 158 159 def re_add_imperative_user(): 160 with server.nested("(re-)add imperative user bar"): 161 server.execute("nixos-taskserver org remove imperativeOrg") 162 server.succeed( 163 "nixos-taskserver org add imperativeOrg", 164 "nixos-taskserver user add imperativeOrg bar", 165 ) 166 setup_clients_for("imperativeOrg", "bar") 167 168 169 def test_sync(user): 170 with subtest(f"sync for user {user}"): 171 client1.succeed(su(user, "task add foo >&2")) 172 client1.succeed(su(user, "task sync >&2")) 173 client2.fail(su(user, "task list >&2")) 174 client2.succeed(su(user, "task sync >&2")) 175 client2.succeed(su(user, "task list >&2")) 176 177 178 def check_client_cert(user): 179 # debug level 3 is a workaround for gnutls issue https://gitlab.com/gnutls/gnutls/-/issues/1040 180 cmd = ( 181 f"gnutls-cli -d 3" 182 f" --x509cafile=/home/{user}/.task/keys/ca.cert" 183 f" --x509keyfile=/home/{user}/.task/keys/private.key" 184 f" --x509certfile=/home/{user}/.task/keys/public.cert" 185 f" --port=${portStr} server < /dev/null" 186 ) 187 return su(user, cmd) 188 189 190 # Explicitly start the VMs so that we don't accidentally start newServer 191 server.start() 192 client1.start() 193 client2.start() 194 195 server.wait_for_unit("taskserver.service") 196 197 server.succeed( 198 "nixos-taskserver user list testOrganisation | grep -qxF alice", 199 "nixos-taskserver user list testOrganisation | grep -qxF foo", 200 "nixos-taskserver user list anotherOrganisation | grep -qxF bob", 201 ) 202 203 server.wait_for_open_port(${portStr}) 204 205 client1.wait_for_unit("multi-user.target") 206 client2.wait_for_unit("multi-user.target") 207 208 setup_clients_for("testOrganisation", "alice") 209 setup_clients_for("testOrganisation", "foo") 210 setup_clients_for("anotherOrganisation", "bob") 211 212 for user in ["alice", "bob", "foo"]: 213 test_sync(user) 214 215 server.fail("nixos-taskserver user add imperativeOrg bar") 216 re_add_imperative_user() 217 218 test_sync("bar") 219 220 with subtest("checking certificate revocation of user bar"): 221 client1.succeed(check_client_cert("bar")) 222 223 server.succeed("nixos-taskserver user remove imperativeOrg bar") 224 restart_server() 225 226 client1.fail(check_client_cert("bar")) 227 228 client1.succeed(su("bar", "task add destroy everything >&2")) 229 client1.fail(su("bar", "task sync >&2")) 230 231 re_add_imperative_user() 232 233 with subtest("checking certificate revocation of org imperativeOrg"): 234 client1.succeed(check_client_cert("bar")) 235 236 server.succeed("nixos-taskserver org remove imperativeOrg") 237 restart_server() 238 239 client1.fail(check_client_cert("bar")) 240 241 client1.succeed(su("bar", "task add destroy even more >&2")) 242 client1.fail(su("bar", "task sync >&2")) 243 244 re_add_imperative_user() 245 246 with subtest("check whether declarative config overrides user bar"): 247 restart_server() 248 test_sync("bar") 249 250 251 def init_manual_config(client, org, user): 252 cfgpath = f"/home/{user}/.task" 253 254 client.copy_from_host( 255 "${snakeOil.cacert}", 256 f"{cfgpath}/ca.cert", 257 ) 258 for file in ["alice.key", "alice.cert"]: 259 client.copy_from_host( 260 f"${snakeOil}/{file}", 261 f"{cfgpath}/{file}", 262 ) 263 264 for file in [f"{user}.key", f"{user}.cert"]: 265 client.copy_from_host( 266 f"${snakeOil}/{file}", 267 f"{cfgpath}/{file}", 268 ) 269 270 client.succeed( 271 su("alice", f"task config taskd.ca {cfgpath}/ca.cert"), 272 su("alice", f"task config taskd.key {cfgpath}/{user}.key"), 273 su(user, f"task config taskd.certificate {cfgpath}/{user}.cert"), 274 ) 275 276 277 with subtest("check manual configuration"): 278 # Remove the keys from automatic CA creation, to make sure the new 279 # generation doesn't use keys from before. 280 server.succeed("rm -rf ${cfg.dataDir}/keys/* >&2") 281 282 server.succeed( 283 "${switchToNewServer} >&2" 284 ) 285 server.wait_for_unit("taskserver.service") 286 server.wait_for_open_port(${portStr}) 287 288 server.succeed( 289 "nixos-taskserver org add manualOrg", 290 "nixos-taskserver user add manualOrg alice", 291 ) 292 293 setup_clients_for("manualOrg", "alice", init_manual_config) 294 295 test_sync("alice") 296 ''; 297}