clan-core/pkgs/clan-cli/tests/test_secrets_password_store.py

69 lines
2.2 KiB
Python
Raw Normal View History

2023-09-29 16:31:05 +00:00
import subprocess
from pathlib import Path
import pytest
from cli import Cli
from fixtures_flakes import FlakeForTest
2023-09-29 16:31:05 +00:00
from clan_cli.machines.facts import machine_get_fact
from clan_cli.nix import nix_shell
from clan_cli.ssh import HostGroup
@pytest.mark.impure
def test_upload_secret(
monkeypatch: pytest.MonkeyPatch,
test_flake_with_core_and_pass: FlakeForTest,
2023-10-23 20:31:12 +00:00
temporary_home: Path,
2023-09-29 16:31:05 +00:00
host_group: HostGroup,
) -> None:
monkeypatch.chdir(test_flake_with_core_and_pass.path)
2023-10-23 20:31:12 +00:00
gnupghome = temporary_home / "gpg"
gnupghome.mkdir(mode=0o700)
2023-09-29 16:31:05 +00:00
monkeypatch.setenv("GNUPGHOME", str(gnupghome))
2023-10-23 20:31:12 +00:00
monkeypatch.setenv("PASSWORD_STORE_DIR", str(temporary_home / "pass"))
gpg_key_spec = temporary_home / "gpg_key_spec"
2023-09-29 16:31:05 +00:00
gpg_key_spec.write_text(
"""
Key-Type: 1
Key-Length: 1024
Name-Real: Root Superuser
Name-Email: test@local
Expire-Date: 0
%no-protection
"""
)
cli = Cli()
subprocess.run(
nix_shell(
["nixpkgs#gnupg"], ["gpg", "--batch", "--gen-key", str(gpg_key_spec)]
),
2023-09-29 16:31:05 +00:00
check=True,
)
subprocess.run(
nix_shell(["nixpkgs#pass"], ["pass", "init", "test@local"]), check=True
)
cli.run(["facts", "generate", "vm1"])
network_id = machine_get_fact(
2023-11-15 13:28:40 +00:00
test_flake_with_core_and_pass.path, "vm1", "zerotier-network-id"
)
2023-09-29 16:31:05 +00:00
assert len(network_id) == 16
identity_secret = (
2023-10-23 20:31:12 +00:00
temporary_home / "pass" / "machines" / "vm1" / "zerotier-identity-secret.gpg"
2023-09-29 16:31:05 +00:00
)
secret1_mtime = identity_secret.lstat().st_mtime_ns
# test idempotency
cli.run(["facts", "generate", "vm1"])
2023-09-29 16:31:05 +00:00
assert identity_secret.lstat().st_mtime_ns == secret1_mtime
flake = test_flake_with_core_and_pass.path.joinpath("flake.nix")
2023-09-29 16:31:05 +00:00
host = host_group.hosts[0]
addr = f"{host.user}@{host.host}:{host.port}?StrictHostKeyChecking=no&UserKnownHostsFile=/dev/null&IdentityFile={host.key}"
new_text = flake.read_text().replace("__CLAN_TARGET_ADDRESS__", addr)
2023-09-29 16:31:05 +00:00
flake.write_text(new_text)
cli.run(["facts", "upload", "vm1"])
2023-09-29 16:31:05 +00:00
zerotier_identity_secret = (
test_flake_with_core_and_pass.path / "secrets" / "zerotier-identity-secret"
2023-09-29 16:31:05 +00:00
)
assert zerotier_identity_secret.exists()