2023-09-29 16:31:05 +00:00
|
|
|
import subprocess
|
|
|
|
from pathlib import Path
|
|
|
|
|
|
|
|
import pytest
|
|
|
|
from cli import Cli
|
2023-10-16 13:03:53 +00:00
|
|
|
from fixtures_flakes import FlakeForTest
|
2023-09-29 16:31:05 +00:00
|
|
|
|
|
|
|
from clan_cli.machines.facts import machine_get_fact
|
|
|
|
from clan_cli.nix import nix_shell
|
|
|
|
from clan_cli.ssh import HostGroup
|
|
|
|
|
|
|
|
|
|
|
|
@pytest.mark.impure
|
|
|
|
def test_upload_secret(
|
|
|
|
monkeypatch: pytest.MonkeyPatch,
|
2023-10-16 13:03:53 +00:00
|
|
|
test_flake_with_core_and_pass: FlakeForTest,
|
2023-10-23 20:31:12 +00:00
|
|
|
temporary_home: Path,
|
2023-09-29 16:31:05 +00:00
|
|
|
host_group: HostGroup,
|
|
|
|
) -> None:
|
2023-10-14 12:57:36 +00:00
|
|
|
monkeypatch.chdir(test_flake_with_core_and_pass.path)
|
2023-10-23 20:31:12 +00:00
|
|
|
gnupghome = temporary_home / "gpg"
|
2023-10-04 17:56:18 +00:00
|
|
|
gnupghome.mkdir(mode=0o700)
|
2023-09-29 16:31:05 +00:00
|
|
|
monkeypatch.setenv("GNUPGHOME", str(gnupghome))
|
2023-10-23 20:31:12 +00:00
|
|
|
monkeypatch.setenv("PASSWORD_STORE_DIR", str(temporary_home / "pass"))
|
|
|
|
gpg_key_spec = temporary_home / "gpg_key_spec"
|
2023-09-29 16:31:05 +00:00
|
|
|
gpg_key_spec.write_text(
|
|
|
|
"""
|
|
|
|
Key-Type: 1
|
|
|
|
Key-Length: 1024
|
|
|
|
Name-Real: Root Superuser
|
|
|
|
Name-Email: test@local
|
|
|
|
Expire-Date: 0
|
|
|
|
%no-protection
|
|
|
|
"""
|
|
|
|
)
|
|
|
|
cli = Cli()
|
|
|
|
subprocess.run(
|
2023-12-08 14:00:11 +00:00
|
|
|
nix_shell(
|
|
|
|
["nixpkgs#gnupg"], ["gpg", "--batch", "--gen-key", str(gpg_key_spec)]
|
|
|
|
),
|
2023-09-29 16:31:05 +00:00
|
|
|
check=True,
|
|
|
|
)
|
2023-12-08 14:00:11 +00:00
|
|
|
subprocess.run(
|
|
|
|
nix_shell(["nixpkgs#pass"], ["pass", "init", "test@local"]), check=True
|
|
|
|
)
|
2024-03-23 04:05:31 +00:00
|
|
|
cli.run(["facts", "generate", "vm1"])
|
2023-10-14 12:57:36 +00:00
|
|
|
network_id = machine_get_fact(
|
2023-11-15 13:28:40 +00:00
|
|
|
test_flake_with_core_and_pass.path, "vm1", "zerotier-network-id"
|
2023-10-14 12:57:36 +00:00
|
|
|
)
|
2023-09-29 16:31:05 +00:00
|
|
|
assert len(network_id) == 16
|
|
|
|
identity_secret = (
|
2023-10-23 20:31:12 +00:00
|
|
|
temporary_home / "pass" / "machines" / "vm1" / "zerotier-identity-secret.gpg"
|
2023-09-29 16:31:05 +00:00
|
|
|
)
|
|
|
|
secret1_mtime = identity_secret.lstat().st_mtime_ns
|
|
|
|
|
|
|
|
# test idempotency
|
2024-03-23 04:05:31 +00:00
|
|
|
cli.run(["facts", "generate", "vm1"])
|
2023-09-29 16:31:05 +00:00
|
|
|
assert identity_secret.lstat().st_mtime_ns == secret1_mtime
|
2023-10-14 12:57:36 +00:00
|
|
|
flake = test_flake_with_core_and_pass.path.joinpath("flake.nix")
|
2023-09-29 16:31:05 +00:00
|
|
|
host = host_group.hosts[0]
|
|
|
|
addr = f"{host.user}@{host.host}:{host.port}?StrictHostKeyChecking=no&UserKnownHostsFile=/dev/null&IdentityFile={host.key}"
|
2024-02-02 04:32:48 +00:00
|
|
|
new_text = flake.read_text().replace("__CLAN_TARGET_ADDRESS__", addr)
|
2023-09-29 16:31:05 +00:00
|
|
|
flake.write_text(new_text)
|
2024-03-23 04:05:31 +00:00
|
|
|
cli.run(["facts", "upload", "vm1"])
|
2023-09-29 16:31:05 +00:00
|
|
|
zerotier_identity_secret = (
|
2023-10-14 12:57:36 +00:00
|
|
|
test_flake_with_core_and_pass.path / "secrets" / "zerotier-identity-secret"
|
2023-09-29 16:31:05 +00:00
|
|
|
)
|
|
|
|
assert zerotier_identity_secret.exists()
|