Testing with Nix | 95 Members | |
| 24 Servers |
| Sender | Message | Time |
|---|---|---|
| 16 Oct 2023 | ||
Maybe a new arg to wait_for_unit | 06:11:39 | |
| failState successState | 06:12:13 | |
| Weird. I just tried this:
Couldn't get it to fail when the configuration was bad. | 06:15:40 | |
| Btw it's possible to add env vars to the systemd-run env
| 06:17:55 | |
| * Btw it's possible to add env vars to the systemd-run env
| 06:18:27 | |
In reply to @vengmark2:matrix.orgAll the outputted thing should be in the output | 06:20:24 | |
| did it print the expected output but just didn't fail | 06:20:34 | |
OIC, ${serverName}.wait_for_unit(service_name) doesn't wait long enough, so the next line just never talks to ssh-audit. | 06:22:36 | |
I think I might still need the sleep(5) then. | 06:23:00 | |
| hm yeah it just waits for active | 06:23:19 | |
Because there's just no way to check that the port is open without shutting down ssh-audit. | 06:23:28 | |
| Yay, it worked! This is something I've been hoping to be able to do for years. Thank you, Artturin ! | 07:05:48 | |
| l0b0: That tests looks like it could be added to nixpkgs | 07:45:32 | |
| and added to the package | 07:46:15 | |
| * and added to the package's passthru.tests | 07:46:22 | |
| hmm well there's your ssh-server.nix and ssh-client.nix | 07:47:28 | |
| well if you can think of a way im sure it would be useful | 07:47:48 | |
| Not exactly sure what it's testing | 07:48:10 | |
It's checking that my configuration conforms to best practices as recommended by ssh-audit. I'm no SSH/security expert, but at least some of the recommendations make sense. | 07:49:19 | |
| It might be useful as a demo for what could be considered a secure configuration (at least by some segment of users) "right now", rather than just using the OpenSSH defaults like NixOS does. | 07:50:41 | |