aboutsummaryrefslogtreecommitdiff
path: root/nixpkgs/nixos/tests/dnscrypt-wrapper/default.nix
diff options
context:
space:
mode:
Diffstat (limited to 'nixpkgs/nixos/tests/dnscrypt-wrapper/default.nix')
-rw-r--r--nixpkgs/nixos/tests/dnscrypt-wrapper/default.nix71
1 files changed, 71 insertions, 0 deletions
diff --git a/nixpkgs/nixos/tests/dnscrypt-wrapper/default.nix b/nixpkgs/nixos/tests/dnscrypt-wrapper/default.nix
new file mode 100644
index 00000000000..1dc925f4de7
--- /dev/null
+++ b/nixpkgs/nixos/tests/dnscrypt-wrapper/default.nix
@@ -0,0 +1,71 @@
+import ../make-test-python.nix ({ pkgs, ... }: {
+ name = "dnscrypt-wrapper";
+ meta = with pkgs.stdenv.lib.maintainers; {
+ maintainers = [ rnhmjoj ];
+ };
+
+ nodes = {
+ server = { lib, ... }:
+ { services.dnscrypt-wrapper = with builtins;
+ { enable = true;
+ address = "192.168.1.1";
+ keys.expiration = 5; # days
+ keys.checkInterval = 2; # min
+ # The keypair was generated by the command:
+ # dnscrypt-wrapper --gen-provider-keypair \
+ # --provider-name=2.dnscrypt-cert.server \
+ # --ext-address=192.168.1.1:5353
+ providerKey.public = toFile "public.key" (readFile ./public.key);
+ providerKey.secret = toFile "secret.key" (readFile ./secret.key);
+ };
+ services.tinydns.enable = true;
+ services.tinydns.data = ''
+ ..:192.168.1.1:a
+ +it.works:1.2.3.4
+ '';
+ networking.firewall.allowedUDPPorts = [ 5353 ];
+ networking.firewall.allowedTCPPorts = [ 5353 ];
+ networking.interfaces.eth1.ipv4.addresses = lib.mkForce
+ [ { address = "192.168.1.1"; prefixLength = 24; } ];
+ };
+
+ client = { lib, ... }:
+ { services.dnscrypt-proxy2.enable = true;
+ services.dnscrypt-proxy2.settings = {
+ server_names = [ "server" ];
+ static.server.stamp = "sdns://AQAAAAAAAAAAEDE5Mi4xNjguMS4xOjUzNTMgFEHYOv0SCKSuqR5CDYa7-58cCBuXO2_5uTSVU9wNQF0WMi5kbnNjcnlwdC1jZXJ0LnNlcnZlcg";
+ };
+ networking.nameservers = [ "127.0.0.1" ];
+ networking.interfaces.eth1.ipv4.addresses = lib.mkForce
+ [ { address = "192.168.1.2"; prefixLength = 24; } ];
+ };
+
+ };
+
+ testScript = ''
+ start_all()
+
+ with subtest("The server can generate the ephemeral keypair"):
+ server.wait_for_unit("dnscrypt-wrapper")
+ server.wait_for_file("/var/lib/dnscrypt-wrapper/2.dnscrypt-cert.server.key")
+ server.wait_for_file("/var/lib/dnscrypt-wrapper/2.dnscrypt-cert.server.crt")
+
+ with subtest("The client can connect to the server"):
+ server.wait_for_unit("tinydns")
+ client.wait_for_unit("dnscrypt-proxy2")
+ assert "1.2.3.4" in client.succeed(
+ "host it.works"
+ ), "The IP address of 'it.works' does not match 1.2.3.4"
+
+ with subtest("The server rotates the ephemeral keys"):
+ # advance time by a little less than 5 days
+ server.succeed("date -s \"$(date --date '4 days 6 hours')\"")
+ client.succeed("date -s \"$(date --date '4 days 6 hours')\"")
+ server.wait_for_file("/var/lib/dnscrypt-wrapper/oldkeys")
+
+ with subtest("The client can still connect to the server"):
+ server.wait_for_unit("dnscrypt-wrapper")
+ client.succeed("host it.works")
+ '';
+})
+