1
0
Fork 1
mirror of https://github.com/NixOS/nixpkgs.git synced 2024-11-22 05:31:22 +00:00
nixpkgs/nixos/tests/iodine.nix

65 lines
1.7 KiB
Nix
Raw Normal View History

2020-02-02 12:00:00 +00:00
import ./make-test-python.nix (
{ pkgs, ... }: let
domain = "whatever.example.com";
2020-04-13 05:20:00 +01:00
password = "false;foo;exit;withspecialcharacters";
2020-02-02 12:00:00 +00:00
in
{
name = "iodine";
nodes = {
server =
{ ... }:
{
networking.firewall = {
allowedUDPPorts = [ 53 ];
trustedInterfaces = [ "dns0" ];
};
boot.kernel.sysctl = {
"net.ipv4.ip_forward" = 1;
"net.ipv6.ip_forward" = 1;
};
services.iodine.server = {
enable = true;
ip = "10.53.53.1/24";
2020-04-13 05:20:00 +01:00
passwordFile = "${builtins.toFile "password" password}";
2020-02-02 12:00:00 +00:00
inherit domain;
};
# test resource: accessible only via tunnel
services.openssh = {
enable = true;
openFirewall = false;
};
};
client =
{ ... }: {
services.iodine.clients.testClient = {
# test that ProtectHome is "read-only"
passwordFile = "/root/pw";
relay = "server";
server = domain;
};
systemd.tmpfiles.rules = [
2020-04-13 05:20:00 +01:00
"f /root/pw 0666 root root - ${password}"
2020-02-02 12:00:00 +00:00
];
environment.systemPackages = [
pkgs.nagiosPluginsOfficial
];
};
};
testScript = ''
start_all()
server.wait_for_unit("sshd")
server.wait_for_unit("iodined")
client.wait_for_unit("iodine-testClient")
client.succeed("check_ssh -H 10.53.53.1")
'';
}
)