nixos/cloud-init: actually test ssh'ing, also, with cloud-init-created user
This commit is contained in:
parent
3ca2fd5520
commit
00347e9537
|
@ -7,6 +7,9 @@ with import ../lib/testing-python.nix { inherit system pkgs; };
|
||||||
with pkgs.lib;
|
with pkgs.lib;
|
||||||
|
|
||||||
let
|
let
|
||||||
|
inherit (import ./ssh-keys.nix pkgs)
|
||||||
|
snakeOilPrivateKey snakeOilPublicKey;
|
||||||
|
|
||||||
metadataDrive = pkgs.stdenv.mkDerivation {
|
metadataDrive = pkgs.stdenv.mkDerivation {
|
||||||
name = "metadata";
|
name = "metadata";
|
||||||
buildCommand = ''
|
buildCommand = ''
|
||||||
|
@ -18,14 +21,19 @@ let
|
||||||
- content: |
|
- content: |
|
||||||
cloudinit
|
cloudinit
|
||||||
path: /tmp/cloudinit-write-file
|
path: /tmp/cloudinit-write-file
|
||||||
|
|
||||||
|
users:
|
||||||
|
- default
|
||||||
|
- name: nixos
|
||||||
|
ssh_authorized_keys:
|
||||||
|
- "${snakeOilPublicKey}"
|
||||||
EOF
|
EOF
|
||||||
|
|
||||||
cat << EOF > $out/iso/meta-data
|
cat << EOF > $out/iso/meta-data
|
||||||
instance-id: iid-local01
|
instance-id: iid-local01
|
||||||
local-hostname: "test"
|
local-hostname: "test"
|
||||||
public-keys:
|
public-keys:
|
||||||
ec2-keypair.us-east-1:
|
- "${snakeOilPublicKey}"
|
||||||
- ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIB5L7Xuh49VS5VQheFE7VDmXKH0BOnB1R0avAE91QgOB root@test
|
|
||||||
EOF
|
EOF
|
||||||
${pkgs.cdrkit}/bin/genisoimage -volid cidata -joliet -rock -o $out/metadata.iso $out/iso
|
${pkgs.cdrkit}/bin/genisoimage -volid cidata -joliet -rock -o $out/metadata.iso $out/iso
|
||||||
'';
|
'';
|
||||||
|
@ -35,17 +43,32 @@ in makeTest {
|
||||||
meta = with pkgs.stdenv.lib.maintainers; {
|
meta = with pkgs.stdenv.lib.maintainers; {
|
||||||
maintainers = [ lewo ];
|
maintainers = [ lewo ];
|
||||||
};
|
};
|
||||||
machine =
|
machine = { ... }:
|
||||||
{ ... }:
|
|
||||||
{
|
{
|
||||||
virtualisation.qemu.options = [ "-cdrom" "${metadataDrive}/metadata.iso" ];
|
virtualisation.qemu.options = [ "-cdrom" "${metadataDrive}/metadata.iso" ];
|
||||||
services.cloud-init.enable = true;
|
services.cloud-init.enable = true;
|
||||||
|
services.openssh.enable = true;
|
||||||
|
|
||||||
};
|
};
|
||||||
testScript = ''
|
testScript = ''
|
||||||
machine.start()
|
|
||||||
machine.wait_for_unit("cloud-init.service")
|
machine.wait_for_unit("cloud-init.service")
|
||||||
machine.succeed("cat /tmp/cloudinit-write-file | grep -q 'cloudinit'")
|
machine.succeed("cat /tmp/cloudinit-write-file | grep -q 'cloudinit'")
|
||||||
|
|
||||||
machine.wait_until_succeeds("cat /root/.ssh/authorized_keys | grep -q root@test")
|
# install snakeoil ssh key and provision .ssh/config file
|
||||||
|
machine.succeed("mkdir -p ~/.ssh")
|
||||||
|
machine.succeed(
|
||||||
|
"cat ${snakeOilPrivateKey} > ~/.ssh/id_snakeoil"
|
||||||
|
)
|
||||||
|
machine.succeed("chmod 600 ~/.ssh/id_snakeoil")
|
||||||
|
|
||||||
|
machine.wait_for_unit("sshd.service")
|
||||||
|
|
||||||
|
# we should be able to log in as the root user, as well as the created nixos user
|
||||||
|
machine.succeed(
|
||||||
|
"ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no -o IdentityFile=~/.ssh/id_snakeoil root@localhost 'true'"
|
||||||
|
)
|
||||||
|
machine.succeed(
|
||||||
|
"ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no -o IdentityFile=~/.ssh/id_snakeoil nixos@localhost 'true'"
|
||||||
|
)
|
||||||
'';
|
'';
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue