mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-12-23 14:13:35 +00:00
e83bd25aec
Nginx fails to start, because it can't read the certificate file. This happens because PrivateTmp is set for the service, which makes the system wide /tmp inaccessible.
156 lines
4.8 KiB
Nix
156 lines
4.8 KiB
Nix
{ system ? builtins.currentSystem,
|
|
config ? {},
|
|
pkgs ? import ../.. { inherit system config; }
|
|
}:
|
|
|
|
with import ../lib/testing-python.nix { inherit system pkgs; };
|
|
let
|
|
mkSpec = { host, service ? null, action }: {
|
|
inherit action;
|
|
authority = {
|
|
file = {
|
|
group = "nginx";
|
|
owner = "nginx";
|
|
path = "/var/ssl/${host}-ca.pem";
|
|
};
|
|
label = "www_ca";
|
|
profile = "three-month";
|
|
remote = "localhost:8888";
|
|
};
|
|
certificate = {
|
|
group = "nginx";
|
|
owner = "nginx";
|
|
path = "/var/ssl/${host}-cert.pem";
|
|
};
|
|
private_key = {
|
|
group = "nginx";
|
|
mode = "0600";
|
|
owner = "nginx";
|
|
path = "/var/ssl/${host}-key.pem";
|
|
};
|
|
request = {
|
|
CN = host;
|
|
hosts = [ host "www.${host}" ];
|
|
key = {
|
|
algo = "rsa";
|
|
size = 2048;
|
|
};
|
|
names = [
|
|
{
|
|
C = "US";
|
|
L = "San Francisco";
|
|
O = "Example, LLC";
|
|
ST = "CA";
|
|
}
|
|
];
|
|
};
|
|
inherit service;
|
|
};
|
|
|
|
mkCertmgrTest = { svcManager, specs, testScript }: makeTest {
|
|
name = "certmgr-" + svcManager;
|
|
nodes = {
|
|
machine = { config, lib, pkgs, ... }: {
|
|
networking.firewall.allowedTCPPorts = with config.services; [ cfssl.port certmgr.metricsPort ];
|
|
networking.extraHosts = "127.0.0.1 imp.example.org decl.example.org";
|
|
|
|
services.cfssl.enable = true;
|
|
systemd.services.cfssl.after = [ "cfssl-init.service" "networking.target" ];
|
|
|
|
systemd.tmpfiles.rules = [ "d /var/ssl 777 root root" ];
|
|
|
|
systemd.services.cfssl-init = {
|
|
description = "Initialize the cfssl CA";
|
|
wantedBy = [ "multi-user.target" ];
|
|
serviceConfig = {
|
|
User = "cfssl";
|
|
Type = "oneshot";
|
|
WorkingDirectory = config.services.cfssl.dataDir;
|
|
};
|
|
script = ''
|
|
${pkgs.cfssl}/bin/cfssl genkey -initca ${pkgs.writeText "ca.json" (builtins.toJSON {
|
|
hosts = [ "ca.example.com" ];
|
|
key = {
|
|
algo = "rsa"; size = 4096; };
|
|
names = [
|
|
{
|
|
C = "US";
|
|
L = "San Francisco";
|
|
O = "Internet Widgets, LLC";
|
|
OU = "Certificate Authority";
|
|
ST = "California";
|
|
}
|
|
];
|
|
})} | ${pkgs.cfssl}/bin/cfssljson -bare ca
|
|
'';
|
|
};
|
|
|
|
services.nginx = {
|
|
enable = true;
|
|
virtualHosts = lib.mkMerge (map (host: {
|
|
${host} = {
|
|
sslCertificate = "/var/ssl/${host}-cert.pem";
|
|
sslCertificateKey = "/var/ssl/${host}-key.pem";
|
|
extraConfig = ''
|
|
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
|
|
'';
|
|
onlySSL = true;
|
|
serverName = host;
|
|
root = pkgs.writeTextDir "index.html" "It works!";
|
|
};
|
|
}) [ "imp.example.org" "decl.example.org" ]);
|
|
};
|
|
|
|
systemd.services.nginx.wantedBy = lib.mkForce [];
|
|
|
|
systemd.services.certmgr.after = [ "cfssl.service" ];
|
|
services.certmgr = {
|
|
enable = true;
|
|
inherit svcManager;
|
|
inherit specs;
|
|
};
|
|
|
|
};
|
|
};
|
|
inherit testScript;
|
|
};
|
|
in
|
|
{
|
|
systemd = mkCertmgrTest {
|
|
svcManager = "systemd";
|
|
specs = {
|
|
decl = mkSpec { host = "decl.example.org"; service = "nginx"; action ="restart"; };
|
|
imp = toString (pkgs.writeText "test.json" (builtins.toJSON (
|
|
mkSpec { host = "imp.example.org"; service = "nginx"; action = "restart"; }
|
|
)));
|
|
};
|
|
testScript = ''
|
|
machine.wait_for_unit("cfssl.service")
|
|
machine.wait_until_succeeds("ls /var/ssl/decl.example.org-ca.pem")
|
|
machine.wait_until_succeeds("ls /var/ssl/decl.example.org-key.pem")
|
|
machine.wait_until_succeeds("ls /var/ssl/decl.example.org-cert.pem")
|
|
machine.wait_until_succeeds("ls /var/ssl/imp.example.org-ca.pem")
|
|
machine.wait_until_succeeds("ls /var/ssl/imp.example.org-key.pem")
|
|
machine.wait_until_succeeds("ls /var/ssl/imp.example.org-cert.pem")
|
|
machine.wait_for_unit("nginx.service")
|
|
assert 1 < int(machine.succeed('journalctl -u nginx | grep "Starting Nginx" | wc -l'))
|
|
machine.succeed("curl --cacert /var/ssl/imp.example.org-ca.pem https://imp.example.org")
|
|
machine.succeed(
|
|
"curl --cacert /var/ssl/decl.example.org-ca.pem https://decl.example.org"
|
|
)
|
|
'';
|
|
};
|
|
|
|
command = mkCertmgrTest {
|
|
svcManager = "command";
|
|
specs = {
|
|
test = mkSpec { host = "command.example.org"; action = "touch /tmp/command.executed"; };
|
|
};
|
|
testScript = ''
|
|
machine.wait_for_unit("cfssl.service")
|
|
machine.wait_until_succeeds("stat /tmp/command.executed")
|
|
'';
|
|
};
|
|
|
|
}
|