2014-06-27 10:34:59 +04:00
|
|
|
import ./make-test.nix ({ pkgs, ... }:
|
|
|
|
|
2018-03-01 00:55:00 +03:00
|
|
|
let inherit (import ./ssh-keys.nix pkgs)
|
|
|
|
snakeOilPrivateKey snakeOilPublicKey;
|
2014-06-27 10:34:59 +04:00
|
|
|
in {
|
2014-06-28 18:04:49 +04:00
|
|
|
name = "openssh";
|
2015-07-12 13:09:40 +03:00
|
|
|
meta = with pkgs.stdenv.lib.maintainers; {
|
2019-02-22 18:14:13 +03:00
|
|
|
maintainers = [ aszlig eelco ];
|
2015-07-12 13:09:40 +03:00
|
|
|
};
|
2010-03-18 16:07:56 +03:00
|
|
|
|
|
|
|
nodes = {
|
2011-09-14 22:20:50 +04:00
|
|
|
|
|
|
|
server =
|
2018-07-20 23:56:59 +03:00
|
|
|
{ ... }:
|
2011-09-14 22:20:50 +04:00
|
|
|
|
2010-03-18 16:07:56 +03:00
|
|
|
{
|
|
|
|
services.openssh.enable = true;
|
2013-10-17 17:37:08 +04:00
|
|
|
security.pam.services.sshd.limits =
|
|
|
|
[ { domain = "*"; item = "memlock"; type = "-"; value = 1024; } ];
|
2018-06-30 02:55:42 +03:00
|
|
|
users.users.root.openssh.authorizedKeys.keys = [
|
2014-06-27 10:34:59 +04:00
|
|
|
snakeOilPublicKey
|
|
|
|
];
|
2010-05-27 14:05:17 +04:00
|
|
|
};
|
2011-09-14 22:20:50 +04:00
|
|
|
|
2016-12-29 17:49:43 +03:00
|
|
|
server_lazy =
|
2018-07-20 23:56:59 +03:00
|
|
|
{ ... }:
|
2016-12-29 17:49:43 +03:00
|
|
|
|
|
|
|
{
|
|
|
|
services.openssh = { enable = true; startWhenNeeded = true; };
|
|
|
|
security.pam.services.sshd.limits =
|
|
|
|
[ { domain = "*"; item = "memlock"; type = "-"; value = 1024; } ];
|
2018-06-30 02:55:42 +03:00
|
|
|
users.users.root.openssh.authorizedKeys.keys = [
|
2016-12-29 17:49:43 +03:00
|
|
|
snakeOilPublicKey
|
|
|
|
];
|
|
|
|
};
|
|
|
|
|
2019-02-25 02:48:01 +03:00
|
|
|
server_localhost_only =
|
|
|
|
{ ... }:
|
|
|
|
|
|
|
|
{
|
|
|
|
services.openssh = {
|
|
|
|
enable = true; listenAddresses = [ { addr = "127.0.0.1"; port = 22; } ];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
server_localhost_only_lazy =
|
|
|
|
{ ... }:
|
|
|
|
|
|
|
|
{
|
|
|
|
services.openssh = {
|
|
|
|
enable = true; startWhenNeeded = true; listenAddresses = [ { addr = "127.0.0.1"; port = 22; } ];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2011-09-14 22:20:50 +04:00
|
|
|
client =
|
2018-07-20 23:56:59 +03:00
|
|
|
{ ... }: { };
|
2011-09-14 22:20:50 +04:00
|
|
|
|
2010-03-18 16:07:56 +03:00
|
|
|
};
|
2011-09-14 22:20:50 +04:00
|
|
|
|
2011-01-12 20:36:15 +03:00
|
|
|
testScript = ''
|
|
|
|
startAll;
|
2011-09-14 22:20:50 +04:00
|
|
|
|
2015-08-12 21:16:26 +03:00
|
|
|
my $key=`${pkgs.openssh}/bin/ssh-keygen -t ed25519 -f key -N ""`;
|
2011-01-12 20:36:15 +03:00
|
|
|
|
2012-10-24 20:22:53 +04:00
|
|
|
$server->waitForUnit("sshd");
|
2011-09-14 22:20:50 +04:00
|
|
|
|
2014-06-27 10:34:59 +04:00
|
|
|
subtest "manual-authkey", sub {
|
|
|
|
$server->succeed("mkdir -m 700 /root/.ssh");
|
|
|
|
$server->copyFileFromHost("key.pub", "/root/.ssh/authorized_keys");
|
2016-12-29 17:49:43 +03:00
|
|
|
$server_lazy->succeed("mkdir -m 700 /root/.ssh");
|
|
|
|
$server_lazy->copyFileFromHost("key.pub", "/root/.ssh/authorized_keys");
|
2014-06-27 10:34:59 +04:00
|
|
|
|
|
|
|
$client->succeed("mkdir -m 700 /root/.ssh");
|
2015-08-12 21:16:26 +03:00
|
|
|
$client->copyFileFromHost("key", "/root/.ssh/id_ed25519");
|
|
|
|
$client->succeed("chmod 600 /root/.ssh/id_ed25519");
|
2011-09-14 22:20:50 +04:00
|
|
|
|
2014-06-27 10:34:59 +04:00
|
|
|
$client->waitForUnit("network.target");
|
|
|
|
$client->succeed("ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no server 'echo hello world' >&2");
|
|
|
|
$client->succeed("ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no server 'ulimit -l' | grep 1024");
|
2016-12-29 17:49:43 +03:00
|
|
|
|
|
|
|
$client->succeed("ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no server_lazy 'echo hello world' >&2");
|
|
|
|
$client->succeed("ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no server_lazy 'ulimit -l' | grep 1024");
|
|
|
|
|
2014-06-27 10:34:59 +04:00
|
|
|
};
|
2011-09-14 22:20:50 +04:00
|
|
|
|
2014-06-27 10:34:59 +04:00
|
|
|
subtest "configured-authkey", sub {
|
|
|
|
$client->succeed("cat ${snakeOilPrivateKey} > privkey.snakeoil");
|
|
|
|
$client->succeed("chmod 600 privkey.snakeoil");
|
|
|
|
$client->succeed("ssh -o UserKnownHostsFile=/dev/null" .
|
|
|
|
" -o StrictHostKeyChecking=no -i privkey.snakeoil" .
|
|
|
|
" server true");
|
2016-12-29 17:49:43 +03:00
|
|
|
|
|
|
|
$client->succeed("ssh -o UserKnownHostsFile=/dev/null" .
|
|
|
|
" -o StrictHostKeyChecking=no -i privkey.snakeoil" .
|
|
|
|
" server_lazy true");
|
|
|
|
|
2014-06-27 10:34:59 +04:00
|
|
|
};
|
2019-02-25 02:48:01 +03:00
|
|
|
|
|
|
|
subtest "localhost-only", sub {
|
|
|
|
$server_localhost_only->succeed("ss -nlt | grep '127.0.0.1:22'");
|
|
|
|
$server_localhost_only_lazy->succeed("ss -nlt | grep '127.0.0.1:22'");
|
|
|
|
}
|
2010-03-18 16:07:56 +03:00
|
|
|
'';
|
2014-04-14 16:02:44 +04:00
|
|
|
})
|