forked from mirrors/nixpkgs
nixos/tests/uptermd: init
This commit is contained in:
parent
18ffb9690c
commit
cd7e4a1b32
|
@ -574,6 +574,7 @@ in
|
|||
unifi = handleTest ./unifi.nix {};
|
||||
unit-php = handleTest ./web-servers/unit-php.nix {};
|
||||
upnp = handleTest ./upnp.nix {};
|
||||
uptermd = handleTest ./uptermd.nix {};
|
||||
usbguard = handleTest ./usbguard.nix {};
|
||||
user-activation-scripts = handleTest ./user-activation-scripts.nix {};
|
||||
uwsgi = handleTest ./uwsgi.nix {};
|
||||
|
|
62
nixos/tests/uptermd.nix
Normal file
62
nixos/tests/uptermd.nix
Normal file
|
@ -0,0 +1,62 @@
|
|||
import ./make-test-python.nix ({ pkgs, ...}:
|
||||
|
||||
let
|
||||
client = {pkgs, ...}:{
|
||||
environment.systemPackages = [ pkgs.upterm ];
|
||||
};
|
||||
in
|
||||
{
|
||||
name = "uptermd";
|
||||
meta = with pkgs.lib.maintainers; {
|
||||
maintainers = [ fleaz ];
|
||||
};
|
||||
|
||||
nodes = {
|
||||
server = {config, ...}: {
|
||||
services.uptermd = {
|
||||
enable = true;
|
||||
openFirewall = true;
|
||||
port = 1337;
|
||||
};
|
||||
};
|
||||
client1 = client;
|
||||
client2 = client;
|
||||
};
|
||||
|
||||
|
||||
testScript = ''
|
||||
start_all()
|
||||
|
||||
server.wait_for_unit("uptermd.service")
|
||||
server.wait_for_unit("network-online.target")
|
||||
|
||||
# Add SSH hostkeys from the server to both clients
|
||||
# uptermd needs an '@cert-authority entry so we need to modify the known_hosts file
|
||||
client1.execute("sleep 3; mkdir -p ~/.ssh && ssh -o StrictHostKeyChecking=no -p 1337 server ls")
|
||||
client1.execute("echo @cert-authority $(cat ~/.ssh/known_hosts) > ~/.ssh/known_hosts")
|
||||
client2.execute("sleep 3; mkdir -p ~/.ssh && ssh -o StrictHostKeyChecking=no -p 1337 server ls")
|
||||
client2.execute("echo @cert-authority $(cat ~/.ssh/known_hosts) > ~/.ssh/known_hosts")
|
||||
|
||||
client1.wait_for_unit("multi-user.target")
|
||||
client1.wait_until_succeeds("pgrep -f 'agetty.*tty1'")
|
||||
client1.wait_until_tty_matches(1, "login: ")
|
||||
client1.send_chars("root\n")
|
||||
client1.wait_until_succeeds("pgrep -u root bash")
|
||||
|
||||
client1.execute("ssh-keygen -t ed25519 -N \"\" -f /root/.ssh/id_ed25519")
|
||||
client1.send_chars("TERM=xterm upterm host --server ssh://server:1337 --force-command hostname -- bash > /tmp/session-details\n")
|
||||
client1.wait_for_file("/tmp/session-details")
|
||||
client1.send_key("q")
|
||||
|
||||
# uptermd can't connect if we don't have a keypair
|
||||
client2.execute("ssh-keygen -t ed25519 -N \"\" -f /root/.ssh/id_ed25519")
|
||||
|
||||
# Grep the ssh connect command from the output of 'upterm host'
|
||||
ssh_command = client1.succeed("grep 'SSH Session' /tmp/session-details | cut -d':' -f2-").strip()
|
||||
|
||||
# Connect with client2. Because we used '--force-command hostname' we should get "client1" as the output
|
||||
output = client2.succeed(ssh_command)
|
||||
|
||||
assert output.strip() == "client1"
|
||||
'';
|
||||
})
|
|
@ -2,6 +2,7 @@
|
|||
, buildGo118Module
|
||||
, fetchFromGitHub
|
||||
, installShellFiles
|
||||
, nixosTests
|
||||
}:
|
||||
|
||||
buildGo118Module rec {
|
||||
|
@ -29,6 +30,8 @@ buildGo118Module rec {
|
|||
|
||||
doCheck = true;
|
||||
|
||||
passthru.tests = { inherit (nixosTests) uptermd; };
|
||||
|
||||
__darwinAllowLocalNetworking = true;
|
||||
|
||||
meta = with lib; {
|
||||
|
|
Loading…
Reference in a new issue