mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-09-29 15:43:00 +00:00
openssh: test that startWhenNeeded works
This commit is contained in:
parent
8ed4c8b73b
commit
bf659128a0
@ -35,6 +35,18 @@ in {
|
|||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
|
server_lazy =
|
||||||
|
{ config, pkgs, ... }:
|
||||||
|
|
||||||
|
{
|
||||||
|
services.openssh = { enable = true; startWhenNeeded = true; };
|
||||||
|
security.pam.services.sshd.limits =
|
||||||
|
[ { domain = "*"; item = "memlock"; type = "-"; value = 1024; } ];
|
||||||
|
users.extraUsers.root.openssh.authorizedKeys.keys = [
|
||||||
|
snakeOilPublicKey
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
client =
|
client =
|
||||||
{ config, pkgs, ... }: { };
|
{ config, pkgs, ... }: { };
|
||||||
|
|
||||||
@ -50,6 +62,8 @@ in {
|
|||||||
subtest "manual-authkey", sub {
|
subtest "manual-authkey", sub {
|
||||||
$server->succeed("mkdir -m 700 /root/.ssh");
|
$server->succeed("mkdir -m 700 /root/.ssh");
|
||||||
$server->copyFileFromHost("key.pub", "/root/.ssh/authorized_keys");
|
$server->copyFileFromHost("key.pub", "/root/.ssh/authorized_keys");
|
||||||
|
$server_lazy->succeed("mkdir -m 700 /root/.ssh");
|
||||||
|
$server_lazy->copyFileFromHost("key.pub", "/root/.ssh/authorized_keys");
|
||||||
|
|
||||||
$client->succeed("mkdir -m 700 /root/.ssh");
|
$client->succeed("mkdir -m 700 /root/.ssh");
|
||||||
$client->copyFileFromHost("key", "/root/.ssh/id_ed25519");
|
$client->copyFileFromHost("key", "/root/.ssh/id_ed25519");
|
||||||
@ -58,6 +72,10 @@ in {
|
|||||||
$client->waitForUnit("network.target");
|
$client->waitForUnit("network.target");
|
||||||
$client->succeed("ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no server 'echo hello world' >&2");
|
$client->succeed("ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no server 'echo hello world' >&2");
|
||||||
$client->succeed("ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no server 'ulimit -l' | grep 1024");
|
$client->succeed("ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no server 'ulimit -l' | grep 1024");
|
||||||
|
|
||||||
|
$client->succeed("ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no server_lazy 'echo hello world' >&2");
|
||||||
|
$client->succeed("ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no server_lazy 'ulimit -l' | grep 1024");
|
||||||
|
|
||||||
};
|
};
|
||||||
|
|
||||||
subtest "configured-authkey", sub {
|
subtest "configured-authkey", sub {
|
||||||
@ -66,6 +84,11 @@ in {
|
|||||||
$client->succeed("ssh -o UserKnownHostsFile=/dev/null" .
|
$client->succeed("ssh -o UserKnownHostsFile=/dev/null" .
|
||||||
" -o StrictHostKeyChecking=no -i privkey.snakeoil" .
|
" -o StrictHostKeyChecking=no -i privkey.snakeoil" .
|
||||||
" server true");
|
" server true");
|
||||||
|
|
||||||
|
$client->succeed("ssh -o UserKnownHostsFile=/dev/null" .
|
||||||
|
" -o StrictHostKeyChecking=no -i privkey.snakeoil" .
|
||||||
|
" server_lazy true");
|
||||||
|
|
||||||
};
|
};
|
||||||
'';
|
'';
|
||||||
})
|
})
|
||||||
|
Loading…
Reference in New Issue
Block a user