Merge pull request #305845 from abathur/resholve_0.10.5
[NixPkgs.git] / nixos / tests / nixos-rebuild-target-host.nix
blobbf80b2fa660622c7d8b097eb1c82c629ee6e3751
1 import ./make-test-python.nix ({ pkgs, ... }: {
2   name = "nixos-rebuild-target-host";
4   nodes = {
5     deployer = { lib, ... }: let
6       inherit (import ./ssh-keys.nix pkgs) snakeOilPrivateKey snakeOilPublicKey;
7     in {
8       imports = [ ../modules/profiles/installation-device.nix ];
10       nix.settings = {
11         substituters = lib.mkForce [ ];
12         hashed-mirrors = null;
13         connect-timeout = 1;
14       };
16       environment.systemPackages = [ pkgs.passh ];
18       system.includeBuildDependencies = true;
20       virtualisation = {
21         cores = 2;
22         memorySize = 2048;
23       };
25       system.build.privateKey = snakeOilPrivateKey;
26       system.build.publicKey = snakeOilPublicKey;
27     };
29     target = { nodes, lib, ... }: let
30       targetConfig = {
31         documentation.enable = false;
32         services.openssh.enable = true;
34         users.users.root.openssh.authorizedKeys.keys = [ nodes.deployer.system.build.publicKey ];
35         users.users.alice.openssh.authorizedKeys.keys = [ nodes.deployer.system.build.publicKey ];
36         users.users.bob.openssh.authorizedKeys.keys = [ nodes.deployer.system.build.publicKey ];
38         users.users.alice.extraGroups = [ "wheel" ];
39         users.users.bob.extraGroups = [ "wheel" ];
41         # Disable sudo for root to ensure sudo isn't called without `--use-remote-sudo`
42         security.sudo.extraRules = lib.mkForce [
43           { groups = [ "wheel" ]; commands = [ { command = "ALL"; } ]; }
44           { users = [ "alice" ]; commands = [ { command = "ALL"; options = [ "NOPASSWD" ]; } ]; }
45         ];
47         nix.settings.trusted-users = [ "@wheel" ];
48       };
49     in {
50       imports = [ ./common/user-account.nix ];
52       config = lib.mkMerge [
53         targetConfig
54         {
55           system.build = {
56             inherit targetConfig;
57           };
59           networking.hostName = "target";
60         }
61       ];
62     };
63   };
65   testScript = { nodes, ... }:
66     let
67       sshConfig = builtins.toFile "ssh.conf" ''
68         UserKnownHostsFile=/dev/null
69         StrictHostKeyChecking=no
70       '';
72       targetConfigJSON = pkgs.writeText "target-configuration.json"
73         (builtins.toJSON nodes.target.system.build.targetConfig);
75       targetNetworkJSON = pkgs.writeText "target-network.json"
76         (builtins.toJSON nodes.target.system.build.networkConfig);
78       configFile = hostname: pkgs.writeText "configuration.nix" ''
79         { lib, modulesPath, ... }: {
80           imports = [
81             (modulesPath + "/virtualisation/qemu-vm.nix")
82             (modulesPath + "/testing/test-instrumentation.nix")
83             (modulesPath + "/../tests/common/user-account.nix")
84             (lib.modules.importJSON ./target-configuration.json)
85             (lib.modules.importJSON ./target-network.json)
86             ./hardware-configuration.nix
87           ];
89           boot.loader.grub = {
90             enable = true;
91             device = "/dev/vda";
92             forceInstall = true;
93           };
95           # this will be asserted
96           networking.hostName = "${hostname}";
97         }
98       '';
99     in
100     ''
101       start_all()
102       target.wait_for_open_port(22)
104       deployer.wait_until_succeeds("ping -c1 target")
105       deployer.succeed("install -Dm 600 ${nodes.deployer.system.build.privateKey} ~root/.ssh/id_ecdsa")
106       deployer.succeed("install ${sshConfig} ~root/.ssh/config")
108       target.succeed("nixos-generate-config")
109       deployer.succeed("scp alice@target:/etc/nixos/hardware-configuration.nix /root/hardware-configuration.nix")
111       deployer.copy_from_host("${configFile "config-1-deployed"}", "/root/configuration-1.nix")
112       deployer.copy_from_host("${configFile "config-2-deployed"}", "/root/configuration-2.nix")
113       deployer.copy_from_host("${configFile "config-3-deployed"}", "/root/configuration-3.nix")
114       deployer.copy_from_host("${targetNetworkJSON}", "/root/target-network.json")
115       deployer.copy_from_host("${targetConfigJSON}", "/root/target-configuration.json")
117       # Ensure sudo is disabled for root
118       target.fail("sudo true")
120       # This test also ensures that sudo is not called without --use-remote-sudo
121       with subtest("Deploy to root@target"):
122         deployer.succeed("nixos-rebuild switch -I nixos-config=/root/configuration-1.nix --target-host root@target &>/dev/console")
123         target_hostname = deployer.succeed("ssh alice@target cat /etc/hostname").rstrip()
124         assert target_hostname == "config-1-deployed", f"{target_hostname=}"
126       with subtest("Deploy to alice@target with passwordless sudo"):
127         deployer.succeed("nixos-rebuild switch -I nixos-config=/root/configuration-2.nix --target-host alice@target --use-remote-sudo &>/dev/console")
128         target_hostname = deployer.succeed("ssh alice@target cat /etc/hostname").rstrip()
129         assert target_hostname == "config-2-deployed", f"{target_hostname=}"
131       with subtest("Deploy to bob@target with password based sudo"):
132         deployer.succeed("passh -c 3 -C -p ${nodes.target.users.users.bob.password} -P \"\[sudo\] password\" nixos-rebuild switch -I nixos-config=/root/configuration-3.nix --target-host bob@target --use-remote-sudo &>/dev/console")
133         target_hostname = deployer.succeed("ssh alice@target cat /etc/hostname").rstrip()
134         assert target_hostname == "config-3-deployed", f"{target_hostname=}"
136       with subtest("Deploy works with very long TMPDIR"):
137         tmp_dir = "/var/folder/veryveryveryveryverylongpathnamethatdoesnotworkwithcontrolpath"
138         deployer.succeed(f"mkdir -p {tmp_dir}")
139         deployer.succeed(f"TMPDIR={tmp_dir} nixos-rebuild switch -I nixos-config=/root/configuration-1.nix --target-host root@target &>/dev/console")
140     '';