summary refs log tree commit diff
path: root/nixos/tests/wireguard
Commit message (Collapse)AuthorAge
* nixos/wireguard: fix mtu after switching netns.SEIAROTg2023-03-04
| | | | mtu is set after switching netns and thus the new netns should be used.
* nixos/wireguard: make publicKeys singleLineStrspennae2023-02-16
| | | | | | | | using readFile instead of fileContents (or using indented strings) can leave a trailing newline that causes build errors in systemd units and has previously caused runtime errors in wireguard scripts. use singleLineStr to strip a trailing newline if it exists, and to fail if more than one is present.
* nixos/wg-quick: add nftables testNaïm Favier2022-12-26
|
* nixos/wg-quick: improve usage with systemd-networkdNaïm Favier2022-06-21
| | | | | | | | | | | Use `networking.resolvconf.package` to allow DNS entries to be set using the system-wide resolver implementation instead of hardcoding systemd or openresolv. Extend the tests by adding DNS entries and making one of the peers use systemd-networkd (hence systemd-resolved). Also add a few `networkd`-specific settings.
* maintainers: xwvvvvwx -> d-xoDavid Terry2021-08-08
|
* iproute: deprecate aliasSandro Jäckel2021-04-04
|
* treewide: simplify pkgs.stdenv.lib -> pkgs.libDominik Xaver Hörl2021-01-10
| | | | | The library does not depend on stdenv, that `stdenv` exposes `lib` is an artifact of the ancient origins of nixpkgs.
* nixos/wireguard: test against multiple kernel versionsMaximilian Bosch2020-04-29
| | | | | | | | | | | | | | | | | | | | | | When testing WireGuard updates, I usually run the VM-tests with different kernels to make sure we're not introducing accidental regressions for e.g. older kernels. I figured that we should automate this process to ensure continuously that WireGuard works fine on several kernels. For now I decided to test the latest LTS version (5.4) and the latest kernel (currently 5.6). We can add more kernels in the future, however this seems to significantly slow down evaluation and time. The list can be customized by running a command like this: nix-build nixos/tests/wireguard --arg kernelVersionsToTest '["4.19"]' The `kernelPackages` argument in the tests is null by default to make sure that it's still possible to invoke the test-files directly. In that case the default kernel of NixOS (currently 5.4) is used.
* tests/wireguard: init wg-quickDavid Terry2019-12-30
| | | | | - Duplicate and adapt the existing default wireguard test for wg-quick - Pull common setup code out into a seperate file
* nixosTests.wireguard.namespaces: Port test to pythonChristian Kampka2019-12-16
|
* Merge pull request #71510 from asymmetric/wg-nsFranz Pletz2019-11-14
|\ | | | | Add namespace support to Wireguard module
| * wireguard: add creation and destination namespacesLorenzo Manacorda2019-11-09
| | | | | | | | | | The two new options make it possible to create the interface in one namespace and move it to a different one, as explained at https://www.wireguard.com/netns/.
* | nixos/wireguard: convert generated test to pythonJana Traue2019-11-04
| |
* | nixos/wireguard: convert default test to pythonJana Traue2019-11-04
|/
* wireguard: add generatePrivateKeyFile option + testGraham Christensen2019-04-24
| | | | | | Ideally, private keys never leave the host they're generated on - like SSH. Setting generatePrivateKeyFile to true causes the PK to be generate automatically.
* nixos/wireguard: add testMaximilian Bosch2019-03-18
After working on the last wireguard bump (#57534), we figured that it's probably a good idea to have a basic test which confirms that a simple VPN with wireguard still works. This test starts two peers with a `wg0` network interface and adds a v4 and a v6 route that goes through `wg0`.