clan-core/pkgs/clan-cli/tests/test_secrets_password_store.py

106 lines
3.6 KiB
Python
Raw Normal View History

2023-09-29 16:31:05 +00:00
import subprocess
from pathlib import Path
import pytest
from cli import Cli
from fixtures_flakes import FlakeForTest
from validator import is_valid_ssh_key
2023-09-29 16:31:05 +00:00
from clan_cli.facts.secret_modules.password_store import SecretStore
2023-09-29 16:31:05 +00:00
from clan_cli.machines.facts import machine_get_fact
from clan_cli.machines.machines import Machine
2023-09-29 16:31:05 +00:00
from clan_cli.nix import nix_shell
from clan_cli.ssh import HostGroup
@pytest.mark.impure
def test_upload_secret(
monkeypatch: pytest.MonkeyPatch,
test_flake_with_core_and_pass: FlakeForTest,
2023-10-23 20:31:12 +00:00
temporary_home: Path,
2023-09-29 16:31:05 +00:00
host_group: HostGroup,
) -> None:
monkeypatch.chdir(test_flake_with_core_and_pass.path)
2023-10-23 20:31:12 +00:00
gnupghome = temporary_home / "gpg"
gnupghome.mkdir(mode=0o700)
2023-09-29 16:31:05 +00:00
monkeypatch.setenv("GNUPGHOME", str(gnupghome))
2023-10-23 20:31:12 +00:00
monkeypatch.setenv("PASSWORD_STORE_DIR", str(temporary_home / "pass"))
gpg_key_spec = temporary_home / "gpg_key_spec"
2023-09-29 16:31:05 +00:00
gpg_key_spec.write_text(
"""
Key-Type: 1
Key-Length: 1024
Name-Real: Root Superuser
Name-Email: test@local
Expire-Date: 0
%no-protection
"""
)
cli = Cli()
subprocess.run(
nix_shell(
["nixpkgs#gnupg"], ["gpg", "--batch", "--gen-key", str(gpg_key_spec)]
),
2023-09-29 16:31:05 +00:00
check=True,
)
subprocess.run(
nix_shell(["nixpkgs#pass"], ["pass", "init", "test@local"]), check=True
)
cli.run(["facts", "generate", "vm1"])
store = SecretStore(Machine(name="vm1", flake=test_flake_with_core_and_pass.path))
network_id = machine_get_fact(
2023-11-15 13:28:40 +00:00
test_flake_with_core_and_pass.path, "vm1", "zerotier-network-id"
)
2023-09-29 16:31:05 +00:00
assert len(network_id) == 16
identity_secret = (
2023-10-23 20:31:12 +00:00
temporary_home / "pass" / "machines" / "vm1" / "zerotier-identity-secret.gpg"
2023-09-29 16:31:05 +00:00
)
secret1_mtime = identity_secret.lstat().st_mtime_ns
# test idempotency
cli.run(["facts", "generate", "vm1"])
2023-09-29 16:31:05 +00:00
assert identity_secret.lstat().st_mtime_ns == secret1_mtime
flake = test_flake_with_core_and_pass.path.joinpath("flake.nix")
2023-09-29 16:31:05 +00:00
host = host_group.hosts[0]
addr = f"{host.user}@{host.host}:{host.port}?StrictHostKeyChecking=no&UserKnownHostsFile=/dev/null&IdentityFile={host.key}"
new_text = flake.read_text().replace("__CLAN_TARGET_ADDRESS__", addr)
2023-09-29 16:31:05 +00:00
flake.write_text(new_text)
cli.run(["facts", "upload", "vm1"])
2023-09-29 16:31:05 +00:00
zerotier_identity_secret = (
test_flake_with_core_and_pass.path / "secrets" / "zerotier-identity-secret"
2023-09-29 16:31:05 +00:00
)
assert zerotier_identity_secret.exists()
assert store.exists("", "zerotier-identity-secret")
assert store.exists("", "password")
assert store.exists("", "password-hash")
assert store.exists("", "user-password")
assert store.exists("", "user-password-hash")
assert store.exists("", "ssh.id_ed25519")
assert store.exists("", "zerotier-identity-secret")
# Assert that the ssh key is valid
ssh_secret = store.get("", "ssh.id_ed25519").decode()
ssh_pub = machine_get_fact(
test_flake_with_core_and_pass.path, "vm1", "ssh.id_ed25519.pub"
)
assert is_valid_ssh_key(ssh_secret, ssh_pub)
# Assert that root-password is valid
pwd_secret = store.get("", "password").decode()
assert pwd_secret.isprintable()
assert pwd_secret.isascii()
pwd_hash = store.get("", "password-hash").decode()
assert pwd_hash.isprintable()
assert pwd_hash.isascii()
# Assert that user-password is valid
pwd_secret = store.get("", "user-password").decode()
assert pwd_secret.isprintable()
assert pwd_secret.isascii()
pwd_hash = store.get("", "user-password-hash").decode()
assert pwd_hash.isprintable()
assert pwd_hash.isascii()