about summary refs log tree commit diff
path: root/nixos/tests/uptermd.nix
blob: 429e3c9dd5ff34fe2877bacacf5a2a822729ef0b (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
import ./make-test-python.nix ({ pkgs, ...}:

let
  client = {pkgs, ...}:{
    environment.systemPackages = [ pkgs.upterm ];
  };
in
{
  name = "uptermd";
  meta = with pkgs.lib.maintainers; {
    maintainers = [ fleaz ];
  };

  nodes = {
    server = {config, ...}: {
      services.uptermd = {
        enable = true;
        openFirewall = true;
        port = 1337;
      };
    };
    client1 = client;
    client2 = client;
  };


  testScript = ''
    start_all()

    server.wait_for_unit("uptermd.service")
    server.wait_for_unit("network-online.target")

    # wait for upterm port to be reachable
    client1.wait_until_succeeds("nc -z -v server 1337")

    # Add SSH hostkeys from the server to both clients
    # uptermd needs an '@cert-authority entry so we need to modify the known_hosts file
    client1.execute("mkdir -p ~/.ssh && ssh -o StrictHostKeyChecking=no -p 1337 server ls")
    client1.execute("echo @cert-authority $(cat ~/.ssh/known_hosts) > ~/.ssh/known_hosts")
    client2.execute("mkdir -p ~/.ssh && ssh -o StrictHostKeyChecking=no -p 1337 server ls")
    client2.execute("echo @cert-authority $(cat ~/.ssh/known_hosts) > ~/.ssh/known_hosts")

    client1.wait_for_unit("multi-user.target")
    client1.wait_until_succeeds("pgrep -f 'agetty.*tty1'")
    client1.wait_until_tty_matches("1", "login: ")
    client1.send_chars("root\n")
    client1.wait_until_succeeds("pgrep -u root bash")

    client1.execute("ssh-keygen -t ed25519 -N \"\" -f /root/.ssh/id_ed25519")
    client1.send_chars("TERM=xterm upterm host --server ssh://server:1337 --force-command hostname -- bash > /tmp/session-details\n")
    client1.wait_for_file("/tmp/session-details")
    client1.send_key("q")

    # uptermd can't connect if we don't have a keypair
    client2.execute("ssh-keygen -t ed25519 -N \"\" -f /root/.ssh/id_ed25519")

    # Grep the ssh connect command from the output of 'upterm host'
    ssh_command = client1.succeed("grep 'SSH Session' /tmp/session-details | cut -d':' -f2-").strip()

    # Connect with client2. Because we used '--force-command hostname' we should get "client1" as the output
    output = client2.succeed(ssh_command)

    assert output.strip() == "client1"
  '';
})