3
0
Fork 0
forked from mirrors/nixpkgs
nixpkgs/nixos/tests/firewall.nix

48 lines
1.3 KiB
Nix
Raw Normal View History

# Test the firewall module.
import ./make-test.nix {
nodes =
{ walled =
{ config, pkgs, nodes, ... }:
{ networking.firewall.enable = true;
networking.firewall.logRefusedPackets = true;
services.httpd.enable = true;
services.httpd.adminAddr = "foo@example.org";
};
attacker =
{ config, pkgs, ... }:
{ services.httpd.enable = true;
services.httpd.adminAddr = "foo@example.org";
networking.firewall.enable = false;
};
};
testScript =
{ nodes, ... }:
''
startAll;
$walled->waitForUnit("firewall");
$walled->waitForUnit("httpd");
$attacker->waitForUnit("network.target");
# Local connections should still work.
$walled->succeed("curl -v http://localhost/ >&2");
# Connections to the firewalled machine should fail.
$attacker->fail("curl --fail --connect-timeout 2 http://walled/ >&2");
$attacker->fail("ping -c 1 walled >&2");
# Outgoing connections/pings should still work.
$walled->succeed("curl -v http://attacker/ >&2");
$walled->succeed("ping -c 1 attacker >&2");
# If we stop the firewall, then connections should succeed.
2012-10-24 17:11:21 +01:00
$walled->stopJob("firewall");
$attacker->succeed("curl -v http://walled/ >&2");
'';
}