summary refs log tree commit diff
path: root/nixos/tests/wireguard
diff options
context:
space:
mode:
authorJana Traue <jana.traue@cyberus-technology.de>2019-10-27 12:35:15 +0100
committerJacek Galowicz <jacek.galowicz@cyberus-technology.de>2019-11-04 23:51:10 +0100
commitcdd4d4fadf0d2d0b8ce9c92fabf2a808d8a97e07 (patch)
tree9dc1a0a183c57509fbf604ed5d62f148062e08c9 /nixos/tests/wireguard
parentbaec88a119949d5a4875a9063c0a199901c0415f (diff)
downloadnixpkgs-cdd4d4fadf0d2d0b8ce9c92fabf2a808d8a97e07.tar
nixpkgs-cdd4d4fadf0d2d0b8ce9c92fabf2a808d8a97e07.tar.gz
nixpkgs-cdd4d4fadf0d2d0b8ce9c92fabf2a808d8a97e07.tar.bz2
nixpkgs-cdd4d4fadf0d2d0b8ce9c92fabf2a808d8a97e07.tar.lz
nixpkgs-cdd4d4fadf0d2d0b8ce9c92fabf2a808d8a97e07.tar.xz
nixpkgs-cdd4d4fadf0d2d0b8ce9c92fabf2a808d8a97e07.tar.zst
nixpkgs-cdd4d4fadf0d2d0b8ce9c92fabf2a808d8a97e07.zip
nixos/wireguard: convert generated test to python
Diffstat (limited to 'nixos/tests/wireguard')
-rw-r--r--nixos/tests/wireguard/generated.nix56
1 files changed, 30 insertions, 26 deletions
diff --git a/nixos/tests/wireguard/generated.nix b/nixos/tests/wireguard/generated.nix
index 897feafe3ff..a29afd2d466 100644
--- a/nixos/tests/wireguard/generated.nix
+++ b/nixos/tests/wireguard/generated.nix
@@ -1,4 +1,4 @@
-import ../make-test.nix ({ pkgs, ...} : {
+import ../make-test-python.nix ({ pkgs, ...} : {
   name = "wireguard-generated";
   meta = with pkgs.stdenv.lib.maintainers; {
     maintainers = [ ma27 grahamc ];
@@ -28,30 +28,34 @@ import ../make-test.nix ({ pkgs, ...} : {
   };
 
   testScript = ''
-    startAll;
-
-    $peer1->waitForUnit("wireguard-wg0.service");
-    $peer2->waitForUnit("wireguard-wg0.service");
-
-    my ($retcode, $peer1pubkey) = $peer1->execute("wg pubkey < /etc/wireguard/private");
-    $peer1pubkey =~ s/\s+$//;
-    if ($retcode != 0) {
-      die "Could not read public key from peer1";
-    }
-
-    my ($retcode, $peer2pubkey) = $peer2->execute("wg pubkey < /etc/wireguard/private");
-    $peer2pubkey =~ s/\s+$//;
-    if ($retcode != 0) {
-      die "Could not read public key from peer2";
-    }
-
-    $peer1->succeed("wg set wg0 peer $peer2pubkey allowed-ips 10.10.10.2/32 endpoint 192.168.1.2:12345 persistent-keepalive 1");
-    $peer1->succeed("ip route replace 10.10.10.2/32 dev wg0 table main");
-
-    $peer2->succeed("wg set wg0 peer $peer1pubkey allowed-ips 10.10.10.1/32 endpoint 192.168.1.1:12345 persistent-keepalive 1");
-    $peer2->succeed("ip route replace 10.10.10.1/32 dev wg0 table main");
-
-    $peer1->succeed("ping -c1 10.10.10.2");
-    $peer2->succeed("ping -c1 10.10.10.1");
+    start_all()
+
+    peer1.wait_for_unit("wireguard-wg0.service")
+    peer2.wait_for_unit("wireguard-wg0.service")
+
+    retcode, peer1pubkey = peer1.execute("wg pubkey < /etc/wireguard/private")
+    if retcode != 0:
+        raise Exception("Could not read public key from peer1")
+
+    retcode, peer2pubkey = peer2.execute("wg pubkey < /etc/wireguard/private")
+    if retcode != 0:
+        raise Exception("Could not read public key from peer2")
+
+    peer1.succeed(
+        "wg set wg0 peer {} allowed-ips 10.10.10.2/32 endpoint 192.168.1.2:12345 persistent-keepalive 1".format(
+            peer2pubkey.strip()
+        )
+    )
+    peer1.succeed("ip route replace 10.10.10.2/32 dev wg0 table main")
+
+    peer2.succeed(
+        "wg set wg0 peer {} allowed-ips 10.10.10.1/32 endpoint 192.168.1.1:12345 persistent-keepalive 1".format(
+            peer1pubkey.strip()
+        )
+    )
+    peer2.succeed("ip route replace 10.10.10.1/32 dev wg0 table main")
+
+    peer1.succeed("ping -c1 10.10.10.2")
+    peer2.succeed("ping -c1 10.10.10.1")
   '';
 })