mirror of
https://github.com/NixOS/nixpkgs.git
synced 2025-06-09 19:13:26 +03:00

This patch fixes a failure in the Selenium UI testing script by waiting for an element to be clickable. This allows the Angular to render properly.
256 lines
9.2 KiB
Nix
256 lines
9.2 KiB
Nix
# These tests will:
|
|
# * Set up a vaultwarden server
|
|
# * Have Firefox use the web vault to create an account, log in, and save a password to the vault
|
|
# * Have the bw cli log in and read that password from the vault
|
|
#
|
|
# Note that Firefox must be on the same machine as the server for WebCrypto APIs to be available (or HTTPS must be configured)
|
|
#
|
|
# The same tests should work without modification on the official bitwarden server, if we ever package that.
|
|
|
|
let
|
|
makeVaultwardenTest =
|
|
name:
|
|
{
|
|
backend ? name,
|
|
withClient ? true,
|
|
testScript ? null,
|
|
}:
|
|
import ./make-test-python.nix (
|
|
{ lib, pkgs, ... }:
|
|
let
|
|
dbPassword = "please_dont_hack";
|
|
userEmail = "meow@example.com";
|
|
userPassword = "also_super_secret_ZJWpBKZi668QGt"; # Must be complex to avoid interstitial warning on the signup page
|
|
storedPassword = "seeeecret";
|
|
|
|
testRunner =
|
|
pkgs.writers.writePython3Bin "test-runner"
|
|
{
|
|
libraries = [ pkgs.python3Packages.selenium ];
|
|
flakeIgnore = [ "E501" ];
|
|
}
|
|
''
|
|
|
|
from selenium.webdriver.common.by import By
|
|
from selenium.webdriver import Firefox
|
|
from selenium.webdriver.firefox.options import Options
|
|
from selenium.webdriver.support.ui import WebDriverWait
|
|
from selenium.webdriver.support import expected_conditions as EC
|
|
from selenium.common.exceptions import ElementClickInterceptedException
|
|
|
|
|
|
def click_when_unobstructed(mark):
|
|
while True:
|
|
try:
|
|
wait.until(EC.element_to_be_clickable(mark)).click()
|
|
break
|
|
except ElementClickInterceptedException:
|
|
continue
|
|
|
|
|
|
options = Options()
|
|
options.add_argument('--headless')
|
|
driver = Firefox(options=options)
|
|
|
|
driver.implicitly_wait(20)
|
|
driver.get('http://localhost:8080/#/register')
|
|
|
|
wait = WebDriverWait(driver, 10)
|
|
|
|
wait.until(EC.title_contains("Vaultwarden Web"))
|
|
|
|
driver.find_element(By.CSS_SELECTOR, 'input#register-form_input_email').send_keys(
|
|
'${userEmail}'
|
|
)
|
|
driver.find_element(By.CSS_SELECTOR, 'input#register-form_input_name').send_keys(
|
|
'A Cat'
|
|
)
|
|
driver.find_element(By.CSS_SELECTOR, 'input#register-form_input_master-password').send_keys(
|
|
'${userPassword}'
|
|
)
|
|
driver.find_element(By.CSS_SELECTOR, 'input#register-form_input_confirm-master-password').send_keys(
|
|
'${userPassword}'
|
|
)
|
|
if driver.find_element(By.CSS_SELECTOR, 'input#checkForBreaches').is_selected():
|
|
driver.find_element(By.CSS_SELECTOR, 'input#checkForBreaches').click()
|
|
|
|
driver.find_element(By.XPATH, "//button[contains(., 'Create account')]").click()
|
|
|
|
wait.until_not(EC.title_contains("Create account"))
|
|
|
|
driver.find_element(By.XPATH, "//button[contains(., 'Continue')]").click()
|
|
|
|
driver.find_element(By.XPATH, '//input[@type="password"]').send_keys(
|
|
'${userPassword}'
|
|
)
|
|
driver.find_element(By.XPATH, "//button[contains(., 'Log in with master password')]").click()
|
|
|
|
click_when_unobstructed((By.CSS_SELECTOR, 'button#newItemDropdown'))
|
|
driver.find_element(By.XPATH, "//button[contains(., 'Item')]").click()
|
|
|
|
driver.find_element(By.CSS_SELECTOR, 'input#name').send_keys(
|
|
'secrets'
|
|
)
|
|
driver.find_element(By.CSS_SELECTOR, 'input#loginPassword').send_keys(
|
|
'${storedPassword}'
|
|
)
|
|
|
|
driver.find_element(By.XPATH, "//button[contains(., 'Save')]").click()
|
|
'';
|
|
in
|
|
{
|
|
inherit name;
|
|
|
|
meta = {
|
|
maintainers = with pkgs.lib.maintainers; [
|
|
dotlambda
|
|
SuperSandro2000
|
|
];
|
|
};
|
|
|
|
nodes =
|
|
{
|
|
server =
|
|
{ pkgs, ... }:
|
|
lib.mkMerge [
|
|
{
|
|
mysql = {
|
|
services.mysql = {
|
|
enable = true;
|
|
initialScript = pkgs.writeText "mysql-init.sql" ''
|
|
CREATE DATABASE bitwarden;
|
|
CREATE USER 'bitwardenuser'@'localhost' IDENTIFIED BY '${dbPassword}';
|
|
GRANT ALL ON `bitwarden`.* TO 'bitwardenuser'@'localhost';
|
|
FLUSH PRIVILEGES;
|
|
'';
|
|
package = pkgs.mariadb;
|
|
};
|
|
|
|
services.vaultwarden.config.databaseUrl = "mysql://bitwardenuser:${dbPassword}@localhost/bitwarden";
|
|
|
|
systemd.services.vaultwarden.after = [ "mysql.service" ];
|
|
};
|
|
|
|
postgresql = {
|
|
services.postgresql = {
|
|
enable = true;
|
|
ensureDatabases = [ "vaultwarden" ];
|
|
ensureUsers = [
|
|
{
|
|
name = "vaultwarden";
|
|
ensureDBOwnership = true;
|
|
}
|
|
];
|
|
};
|
|
|
|
services.vaultwarden.config.databaseUrl = "postgresql:///vaultwarden?host=/run/postgresql";
|
|
|
|
systemd.services.vaultwarden.after = [ "postgresql.service" ];
|
|
};
|
|
|
|
sqlite = {
|
|
services.vaultwarden.backupDir = "/srv/backups/vaultwarden";
|
|
|
|
environment.systemPackages = [ pkgs.sqlite ];
|
|
};
|
|
}
|
|
.${backend}
|
|
|
|
{
|
|
services.vaultwarden = {
|
|
enable = true;
|
|
dbBackend = backend;
|
|
config = {
|
|
rocketAddress = "::";
|
|
rocketPort = 8080;
|
|
};
|
|
};
|
|
|
|
networking.firewall.allowedTCPPorts = [ 8080 ];
|
|
|
|
environment.systemPackages = [
|
|
pkgs.firefox-unwrapped
|
|
pkgs.geckodriver
|
|
testRunner
|
|
];
|
|
}
|
|
];
|
|
}
|
|
// lib.optionalAttrs withClient {
|
|
client =
|
|
{ pkgs, ... }:
|
|
{
|
|
environment.systemPackages = [ pkgs.bitwarden-cli ];
|
|
};
|
|
};
|
|
|
|
testScript =
|
|
if testScript != null then
|
|
testScript
|
|
else
|
|
''
|
|
import json
|
|
|
|
start_all()
|
|
server.wait_for_unit("vaultwarden.service")
|
|
server.wait_for_open_port(8080)
|
|
|
|
with subtest("configure the cli"):
|
|
client.succeed("bw --nointeraction config server http://server:8080")
|
|
|
|
with subtest("can't login to nonexistent account"):
|
|
client.fail(
|
|
"bw --nointeraction --raw login ${userEmail} ${userPassword}"
|
|
)
|
|
|
|
with subtest("use the web interface to sign up, log in, and save a password"):
|
|
server.succeed("PYTHONUNBUFFERED=1 systemd-cat -t test-runner test-runner")
|
|
|
|
with subtest("log in with the cli"):
|
|
key = client.succeed(
|
|
"bw --nointeraction --raw login ${userEmail} ${userPassword}"
|
|
).strip()
|
|
|
|
with subtest("sync with the cli"):
|
|
client.succeed(f"bw --nointeraction --raw --session {key} sync -f")
|
|
|
|
with subtest("get the password with the cli"):
|
|
output = json.loads(client.succeed(f"bw --nointeraction --raw --session {key} list items"))
|
|
|
|
assert output[0]['login']['password'] == "${storedPassword}"
|
|
|
|
with subtest("Check systemd unit hardening"):
|
|
server.log(server.succeed("systemd-analyze security vaultwarden.service | grep -v ✓"))
|
|
'';
|
|
}
|
|
);
|
|
in
|
|
builtins.mapAttrs (k: v: makeVaultwardenTest k v) {
|
|
mysql = { };
|
|
postgresql = { };
|
|
sqlite = { };
|
|
sqlite-backup = {
|
|
backend = "sqlite";
|
|
withClient = false;
|
|
|
|
testScript = ''
|
|
start_all()
|
|
server.wait_for_unit("vaultwarden.service")
|
|
server.wait_for_open_port(8080)
|
|
|
|
with subtest("Set up vaultwarden"):
|
|
server.succeed("PYTHONUNBUFFERED=1 test-runner | systemd-cat -t test-runner")
|
|
|
|
with subtest("Run the backup script"):
|
|
server.start_job("backup-vaultwarden.service")
|
|
|
|
with subtest("Check that backup exists"):
|
|
server.succeed('[ -d "/srv/backups/vaultwarden" ]')
|
|
server.succeed('[ -f "/srv/backups/vaultwarden/db.sqlite3" ]')
|
|
server.succeed('[ -d "/srv/backups/vaultwarden/attachments" ]')
|
|
server.succeed('[ -f "/srv/backups/vaultwarden/rsa_key.pem" ]')
|
|
# Ensure only the db backed up with the backup command exists and not the other db files.
|
|
server.succeed('[ ! -f "/srv/backups/vaultwarden/db.sqlite3-shm" ]')
|
|
'';
|
|
};
|
|
}
|