 25bef2d8f9
			
		
	
	
		25bef2d8f9
		
	
	
	
	
		
			
			The library does not depend on stdenv, that `stdenv` exposes `lib` is an artifact of the ancient origins of nixpkgs.
		
			
				
	
	
		
			65 lines
		
	
	
		
			1.9 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
			
		
		
	
	
			65 lines
		
	
	
		
			1.9 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
| { kernelPackages ? null }:
 | |
| import ../make-test-python.nix ({ pkgs, lib, ... } : {
 | |
|   name = "wireguard-generated";
 | |
|   meta = with pkgs.lib.maintainers; {
 | |
|     maintainers = [ ma27 grahamc ];
 | |
|   };
 | |
| 
 | |
|   nodes = {
 | |
|     peer1 = {
 | |
|       boot = lib.mkIf (kernelPackages != null) { inherit kernelPackages; };
 | |
|       networking.firewall.allowedUDPPorts = [ 12345 ];
 | |
|       networking.wireguard.interfaces.wg0 = {
 | |
|         ips = [ "10.10.10.1/24" ];
 | |
|         listenPort = 12345;
 | |
|         privateKeyFile = "/etc/wireguard/private";
 | |
|         generatePrivateKeyFile = true;
 | |
| 
 | |
|       };
 | |
|     };
 | |
| 
 | |
|     peer2 = {
 | |
|       boot = lib.mkIf (kernelPackages != null) { inherit kernelPackages; };
 | |
|       networking.firewall.allowedUDPPorts = [ 12345 ];
 | |
|       networking.wireguard.interfaces.wg0 = {
 | |
|         ips = [ "10.10.10.2/24" ];
 | |
|         listenPort = 12345;
 | |
|         privateKeyFile = "/etc/wireguard/private";
 | |
|         generatePrivateKeyFile = true;
 | |
|       };
 | |
|     };
 | |
|   };
 | |
| 
 | |
|   testScript = ''
 | |
|     start_all()
 | |
| 
 | |
|     peer1.wait_for_unit("wireguard-wg0.service")
 | |
|     peer2.wait_for_unit("wireguard-wg0.service")
 | |
| 
 | |
|     retcode, peer1pubkey = peer1.execute("wg pubkey < /etc/wireguard/private")
 | |
|     if retcode != 0:
 | |
|         raise Exception("Could not read public key from peer1")
 | |
| 
 | |
|     retcode, peer2pubkey = peer2.execute("wg pubkey < /etc/wireguard/private")
 | |
|     if retcode != 0:
 | |
|         raise Exception("Could not read public key from peer2")
 | |
| 
 | |
|     peer1.succeed(
 | |
|         "wg set wg0 peer {} allowed-ips 10.10.10.2/32 endpoint 192.168.1.2:12345 persistent-keepalive 1".format(
 | |
|             peer2pubkey.strip()
 | |
|         )
 | |
|     )
 | |
|     peer1.succeed("ip route replace 10.10.10.2/32 dev wg0 table main")
 | |
| 
 | |
|     peer2.succeed(
 | |
|         "wg set wg0 peer {} allowed-ips 10.10.10.1/32 endpoint 192.168.1.1:12345 persistent-keepalive 1".format(
 | |
|             peer1pubkey.strip()
 | |
|         )
 | |
|     )
 | |
|     peer2.succeed("ip route replace 10.10.10.1/32 dev wg0 table main")
 | |
| 
 | |
|     peer1.succeed("ping -c1 10.10.10.2")
 | |
|     peer2.succeed("ping -c1 10.10.10.1")
 | |
|   '';
 | |
| })
 |