mirror of
https://github.com/NixOS/nixpkgs.git
synced 2025-07-13 21:50:33 +03:00
nixos-rebuild: add --target-host
test
This commit is contained in:
parent
5f64a12a72
commit
b09de27cd6
3 changed files with 138 additions and 0 deletions
|
@ -601,6 +601,7 @@ in {
|
||||||
nixos-generate-config = handleTest ./nixos-generate-config.nix {};
|
nixos-generate-config = handleTest ./nixos-generate-config.nix {};
|
||||||
nixos-rebuild-install-bootloader = handleTestOn ["x86_64-linux"] ./nixos-rebuild-install-bootloader.nix {};
|
nixos-rebuild-install-bootloader = handleTestOn ["x86_64-linux"] ./nixos-rebuild-install-bootloader.nix {};
|
||||||
nixos-rebuild-specialisations = handleTestOn ["x86_64-linux"] ./nixos-rebuild-specialisations.nix {};
|
nixos-rebuild-specialisations = handleTestOn ["x86_64-linux"] ./nixos-rebuild-specialisations.nix {};
|
||||||
|
nixos-rebuild-target-host = handleTest ./nixos-rebuild-target-host.nix {};
|
||||||
nixpkgs = pkgs.callPackage ../modules/misc/nixpkgs/test.nix { inherit evalMinimalConfig; };
|
nixpkgs = pkgs.callPackage ../modules/misc/nixpkgs/test.nix { inherit evalMinimalConfig; };
|
||||||
node-red = handleTest ./node-red.nix {};
|
node-red = handleTest ./node-red.nix {};
|
||||||
nomad = handleTest ./nomad.nix {};
|
nomad = handleTest ./nomad.nix {};
|
||||||
|
|
136
nixos/tests/nixos-rebuild-target-host.nix
Normal file
136
nixos/tests/nixos-rebuild-target-host.nix
Normal file
|
@ -0,0 +1,136 @@
|
||||||
|
import ./make-test-python.nix ({ pkgs, ... }: {
|
||||||
|
name = "nixos-rebuild-target-host";
|
||||||
|
|
||||||
|
nodes = {
|
||||||
|
deployer = { lib, ... }: let
|
||||||
|
inherit (import ./ssh-keys.nix pkgs) snakeOilPrivateKey snakeOilPublicKey;
|
||||||
|
in {
|
||||||
|
imports = [ ../modules/profiles/installation-device.nix ];
|
||||||
|
|
||||||
|
nix.settings = {
|
||||||
|
substituters = lib.mkForce [ ];
|
||||||
|
hashed-mirrors = null;
|
||||||
|
connect-timeout = 1;
|
||||||
|
};
|
||||||
|
|
||||||
|
environment.systemPackages = [ pkgs.passh ];
|
||||||
|
|
||||||
|
system.includeBuildDependencies = true;
|
||||||
|
|
||||||
|
virtualisation = {
|
||||||
|
cores = 2;
|
||||||
|
memorySize = 2048;
|
||||||
|
};
|
||||||
|
|
||||||
|
system.build.privateKey = snakeOilPrivateKey;
|
||||||
|
system.build.publicKey = snakeOilPublicKey;
|
||||||
|
};
|
||||||
|
|
||||||
|
target = { nodes, lib, ... }: let
|
||||||
|
targetConfig = {
|
||||||
|
documentation.enable = false;
|
||||||
|
services.openssh.enable = true;
|
||||||
|
|
||||||
|
users.users.root.openssh.authorizedKeys.keys = [ nodes.deployer.system.build.publicKey ];
|
||||||
|
users.users.alice.openssh.authorizedKeys.keys = [ nodes.deployer.system.build.publicKey ];
|
||||||
|
users.users.bob.openssh.authorizedKeys.keys = [ nodes.deployer.system.build.publicKey ];
|
||||||
|
|
||||||
|
users.users.alice.extraGroups = [ "wheel" ];
|
||||||
|
users.users.bob.extraGroups = [ "wheel" ];
|
||||||
|
|
||||||
|
# Disable sudo for root to ensure sudo isn't called without `--use-remote-sudo`
|
||||||
|
security.sudo.extraRules = lib.mkForce [
|
||||||
|
{ groups = [ "wheel" ]; commands = [ { command = "ALL"; } ]; }
|
||||||
|
{ users = [ "alice" ]; commands = [ { command = "ALL"; options = [ "NOPASSWD" ]; } ]; }
|
||||||
|
];
|
||||||
|
|
||||||
|
nix.settings.trusted-users = [ "@wheel" ];
|
||||||
|
};
|
||||||
|
in {
|
||||||
|
imports = [ ./common/user-account.nix ];
|
||||||
|
|
||||||
|
config = lib.mkMerge [
|
||||||
|
targetConfig
|
||||||
|
{
|
||||||
|
system.build = {
|
||||||
|
inherit targetConfig;
|
||||||
|
};
|
||||||
|
|
||||||
|
networking.hostName = "target";
|
||||||
|
}
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
testScript = { nodes, ... }:
|
||||||
|
let
|
||||||
|
sshConfig = builtins.toFile "ssh.conf" ''
|
||||||
|
UserKnownHostsFile=/dev/null
|
||||||
|
StrictHostKeyChecking=no
|
||||||
|
'';
|
||||||
|
|
||||||
|
targetConfigJSON = pkgs.writeText "target-configuration.json"
|
||||||
|
(builtins.toJSON nodes.target.system.build.targetConfig);
|
||||||
|
|
||||||
|
targetNetworkJSON = pkgs.writeText "target-network.json"
|
||||||
|
(builtins.toJSON nodes.target.system.build.networkConfig);
|
||||||
|
|
||||||
|
configFile = hostname: pkgs.writeText "configuration.nix" ''
|
||||||
|
{ lib, modulesPath, ... }: {
|
||||||
|
imports = [
|
||||||
|
(modulesPath + "/virtualisation/qemu-vm.nix")
|
||||||
|
(modulesPath + "/testing/test-instrumentation.nix")
|
||||||
|
(modulesPath + "/../tests/common/user-account.nix")
|
||||||
|
(lib.modules.importJSON ./target-configuration.json)
|
||||||
|
(lib.modules.importJSON ./target-network.json)
|
||||||
|
./hardware-configuration.nix
|
||||||
|
];
|
||||||
|
|
||||||
|
boot.loader.grub = {
|
||||||
|
enable = true;
|
||||||
|
device = "/dev/vda";
|
||||||
|
forceInstall = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
# this will be asserted
|
||||||
|
networking.hostName = "${hostname}";
|
||||||
|
}
|
||||||
|
'';
|
||||||
|
in
|
||||||
|
''
|
||||||
|
start_all()
|
||||||
|
target.wait_for_open_port(22)
|
||||||
|
|
||||||
|
deployer.wait_until_succeeds("ping -c1 target")
|
||||||
|
deployer.succeed("install -Dm 600 ${nodes.deployer.system.build.privateKey} ~root/.ssh/id_ecdsa")
|
||||||
|
deployer.succeed("install ${sshConfig} ~root/.ssh/config")
|
||||||
|
|
||||||
|
target.succeed("nixos-generate-config")
|
||||||
|
deployer.succeed("scp alice@target:/etc/nixos/hardware-configuration.nix /root/hardware-configuration.nix")
|
||||||
|
|
||||||
|
deployer.copy_from_host("${configFile "config-1-deployed"}", "/root/configuration-1.nix")
|
||||||
|
deployer.copy_from_host("${configFile "config-2-deployed"}", "/root/configuration-2.nix")
|
||||||
|
deployer.copy_from_host("${configFile "config-3-deployed"}", "/root/configuration-3.nix")
|
||||||
|
deployer.copy_from_host("${targetNetworkJSON}", "/root/target-network.json")
|
||||||
|
deployer.copy_from_host("${targetConfigJSON}", "/root/target-configuration.json")
|
||||||
|
|
||||||
|
# Ensure sudo is disabled for root
|
||||||
|
target.fail("sudo true")
|
||||||
|
|
||||||
|
# This test also ensures that sudo is not called without --use-remote-sudo
|
||||||
|
with subtest("Deploy to root@target"):
|
||||||
|
deployer.succeed("nixos-rebuild switch -I nixos-config=/root/configuration-1.nix --target-host root@target &>/dev/console")
|
||||||
|
target_hostname = deployer.succeed("ssh alice@target cat /etc/hostname").rstrip()
|
||||||
|
assert target_hostname == "config-1-deployed", f"{target_hostname=}"
|
||||||
|
|
||||||
|
with subtest("Deploy to alice@target with passwordless sudo"):
|
||||||
|
deployer.succeed("nixos-rebuild switch -I nixos-config=/root/configuration-2.nix --target-host alice@target --use-remote-sudo &>/dev/console")
|
||||||
|
target_hostname = deployer.succeed("ssh alice@target cat /etc/hostname").rstrip()
|
||||||
|
assert target_hostname == "config-2-deployed", f"{target_hostname=}"
|
||||||
|
|
||||||
|
with subtest("Deploy to bob@target with password based sudo"):
|
||||||
|
deployer.succeed("passh -c 3 -C -p ${nodes.target.users.users.bob.password} -P \"\[sudo\] password\" nixos-rebuild switch -I nixos-config=/root/configuration-3.nix --target-host bob@target --use-remote-sudo &>/dev/console")
|
||||||
|
target_hostname = deployer.succeed("ssh alice@target cat /etc/hostname").rstrip()
|
||||||
|
assert target_hostname == "config-3-deployed", f"{target_hostname=}"
|
||||||
|
'';
|
||||||
|
})
|
|
@ -38,6 +38,7 @@ substituteAll {
|
||||||
install-bootloader = nixosTests.nixos-rebuild-install-bootloader;
|
install-bootloader = nixosTests.nixos-rebuild-install-bootloader;
|
||||||
simple-installer = nixosTests.installer.simple;
|
simple-installer = nixosTests.installer.simple;
|
||||||
specialisations = nixosTests.nixos-rebuild-specialisations;
|
specialisations = nixosTests.nixos-rebuild-specialisations;
|
||||||
|
target-host = nixosTests.nixos-rebuild-target-host;
|
||||||
};
|
};
|
||||||
|
|
||||||
meta = {
|
meta = {
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue