2024-09-23 13:09:44 +00:00
|
|
|
# Test whether builtin:fetchurl properly performs TLS certificate
|
|
|
|
# checks on HTTPS servers.
|
|
|
|
|
|
|
|
{ lib, config, pkgs, ... }:
|
|
|
|
|
|
|
|
let
|
|
|
|
|
|
|
|
makeTlsCert = name: pkgs.runCommand name {
|
|
|
|
nativeBuildInputs = with pkgs; [ openssl ];
|
|
|
|
} ''
|
|
|
|
mkdir -p $out
|
|
|
|
openssl req -x509 \
|
|
|
|
-subj '/CN=${name}/' -days 49710 \
|
|
|
|
-addext 'subjectAltName = DNS:${name}' \
|
|
|
|
-keyout "$out/key.pem" -newkey ed25519 \
|
|
|
|
-out "$out/cert.pem" -noenc
|
|
|
|
'';
|
|
|
|
|
|
|
|
goodCert = makeTlsCert "good";
|
|
|
|
badCert = makeTlsCert "bad";
|
|
|
|
|
|
|
|
in
|
|
|
|
|
|
|
|
{
|
|
|
|
name = "fetchurl";
|
|
|
|
|
|
|
|
nodes = {
|
|
|
|
machine = { lib, pkgs, ... }: {
|
|
|
|
services.nginx = {
|
|
|
|
enable = true;
|
|
|
|
|
|
|
|
virtualHosts."good" = {
|
|
|
|
addSSL = true;
|
|
|
|
sslCertificate = "${goodCert}/cert.pem";
|
|
|
|
sslCertificateKey = "${goodCert}/key.pem";
|
|
|
|
root = pkgs.runCommand "nginx-root" {} ''
|
|
|
|
mkdir "$out"
|
|
|
|
echo 'hello world' > "$out/index.html"
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
virtualHosts."bad" = {
|
|
|
|
addSSL = true;
|
|
|
|
sslCertificate = "${badCert}/cert.pem";
|
|
|
|
sslCertificateKey = "${badCert}/key.pem";
|
|
|
|
root = pkgs.runCommand "nginx-root" {} ''
|
|
|
|
mkdir "$out"
|
|
|
|
echo 'foobar' > "$out/index.html"
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
security.pki.certificateFiles = [ "${goodCert}/cert.pem" ];
|
|
|
|
|
|
|
|
networking.hosts."127.0.0.1" = [ "good" "bad" ];
|
|
|
|
|
|
|
|
virtualisation.writableStore = true;
|
|
|
|
|
|
|
|
nix.settings.experimental-features = "nix-command";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
testScript = { nodes, ... }: ''
|
|
|
|
machine.wait_for_unit("nginx")
|
|
|
|
machine.wait_for_open_port(443)
|
|
|
|
|
|
|
|
out = machine.succeed("curl https://good/index.html")
|
|
|
|
assert out == "hello world\n"
|
|
|
|
|
2024-09-26 15:12:24 +00:00
|
|
|
out = machine.succeed("cat ${badCert}/cert.pem > /tmp/cafile.pem; curl --cacert /tmp/cafile.pem https://bad/index.html")
|
|
|
|
assert out == "foobar\n"
|
|
|
|
|
2024-09-23 13:09:44 +00:00
|
|
|
# Fetching from a server with a trusted cert should work.
|
|
|
|
machine.succeed("nix build --no-substitute --expr 'import <nix/fetchurl.nix> { url = \"https://good/index.html\"; hash = \"sha256-qUiQTy8PR5uPgZdpSzAYSw0u0cHNKh7A+4XSmaGSpEc=\"; }'")
|
|
|
|
|
|
|
|
# Fetching from a server with an untrusted cert should fail.
|
|
|
|
err = machine.fail("nix build --no-substitute --expr 'import <nix/fetchurl.nix> { url = \"https://bad/index.html\"; hash = \"sha256-rsBwZF/lPuOzdjBZN2E08FjMM3JHyXit0Xi2zN+wAZ8=\"; }' 2>&1")
|
|
|
|
print(err)
|
2024-11-21 22:58:12 +00:00
|
|
|
assert "SSL peer certificate or SSH remote key was not OK" in err
|
2024-09-26 15:12:24 +00:00
|
|
|
|
|
|
|
# Fetching from a server with a trusted cert should work via environment variable override.
|
|
|
|
machine.succeed("NIX_SSL_CERT_FILE=/tmp/cafile.pem nix build --no-substitute --expr 'import <nix/fetchurl.nix> { url = \"https://bad/index.html\"; hash = \"sha256-rsBwZF/lPuOzdjBZN2E08FjMM3JHyXit0Xi2zN+wAZ8=\"; }'")
|
2024-09-23 13:09:44 +00:00
|
|
|
'';
|
|
|
|
}
|