2022-03-17 16:57:23 +00:00
|
|
|
import ./make-test-python.nix ({ pkgs, ...}:
|
|
|
|
|
|
|
|
let
|
|
|
|
client = {pkgs, ...}:{
|
|
|
|
environment.systemPackages = [ pkgs.upterm ];
|
|
|
|
};
|
|
|
|
in
|
|
|
|
{
|
|
|
|
name = "uptermd";
|
|
|
|
meta = with pkgs.lib.maintainers; {
|
|
|
|
maintainers = [ fleaz ];
|
|
|
|
};
|
|
|
|
|
|
|
|
nodes = {
|
|
|
|
server = {config, ...}: {
|
|
|
|
services.uptermd = {
|
|
|
|
enable = true;
|
|
|
|
openFirewall = true;
|
|
|
|
port = 1337;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
client1 = client;
|
|
|
|
client2 = client;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
testScript = ''
|
|
|
|
start_all()
|
|
|
|
|
|
|
|
server.wait_for_unit("uptermd.service")
|
2023-10-03 08:26:18 +01:00
|
|
|
server.systemctl("start network-online.target")
|
2022-03-17 16:57:23 +00:00
|
|
|
server.wait_for_unit("network-online.target")
|
|
|
|
|
2022-05-15 08:52:39 +01:00
|
|
|
# wait for upterm port to be reachable
|
|
|
|
client1.wait_until_succeeds("nc -z -v server 1337")
|
|
|
|
|
2022-03-17 16:57:23 +00:00
|
|
|
# Add SSH hostkeys from the server to both clients
|
|
|
|
# uptermd needs an '@cert-authority entry so we need to modify the known_hosts file
|
2022-05-15 08:52:39 +01:00
|
|
|
client1.execute("mkdir -p ~/.ssh && ssh -o StrictHostKeyChecking=no -p 1337 server ls")
|
2022-03-17 16:57:23 +00:00
|
|
|
client1.execute("echo @cert-authority $(cat ~/.ssh/known_hosts) > ~/.ssh/known_hosts")
|
2022-05-15 08:52:39 +01:00
|
|
|
client2.execute("mkdir -p ~/.ssh && ssh -o StrictHostKeyChecking=no -p 1337 server ls")
|
2022-03-17 16:57:23 +00:00
|
|
|
client2.execute("echo @cert-authority $(cat ~/.ssh/known_hosts) > ~/.ssh/known_hosts")
|
|
|
|
|
|
|
|
client1.wait_for_unit("multi-user.target")
|
|
|
|
client1.wait_until_succeeds("pgrep -f 'agetty.*tty1'")
|
2022-06-04 05:22:03 +01:00
|
|
|
client1.wait_until_tty_matches("1", "login: ")
|
2022-03-17 16:57:23 +00:00
|
|
|
client1.send_chars("root\n")
|
|
|
|
client1.wait_until_succeeds("pgrep -u root bash")
|
|
|
|
|
|
|
|
client1.execute("ssh-keygen -t ed25519 -N \"\" -f /root/.ssh/id_ed25519")
|
|
|
|
client1.send_chars("TERM=xterm upterm host --server ssh://server:1337 --force-command hostname -- bash > /tmp/session-details\n")
|
|
|
|
client1.wait_for_file("/tmp/session-details")
|
|
|
|
client1.send_key("q")
|
|
|
|
|
|
|
|
# uptermd can't connect if we don't have a keypair
|
|
|
|
client2.execute("ssh-keygen -t ed25519 -N \"\" -f /root/.ssh/id_ed25519")
|
|
|
|
|
|
|
|
# Grep the ssh connect command from the output of 'upterm host'
|
|
|
|
ssh_command = client1.succeed("grep 'SSH Session' /tmp/session-details | cut -d':' -f2-").strip()
|
|
|
|
|
|
|
|
# Connect with client2. Because we used '--force-command hostname' we should get "client1" as the output
|
|
|
|
output = client2.succeed(ssh_command)
|
|
|
|
|
|
|
|
assert output.strip() == "client1"
|
|
|
|
'';
|
|
|
|
})
|