aboutsummaryrefslogtreecommitdiff
path: root/nixpkgs/nixos/tests/lxd-nftables.nix
diff options
context:
space:
mode:
Diffstat (limited to 'nixpkgs/nixos/tests/lxd-nftables.nix')
-rw-r--r--nixpkgs/nixos/tests/lxd-nftables.nix51
1 files changed, 51 insertions, 0 deletions
diff --git a/nixpkgs/nixos/tests/lxd-nftables.nix b/nixpkgs/nixos/tests/lxd-nftables.nix
new file mode 100644
index 00000000000..4ca02067a0a
--- /dev/null
+++ b/nixpkgs/nixos/tests/lxd-nftables.nix
@@ -0,0 +1,51 @@
+# This test makes sure that lxd stops implicitly depending on iptables when
+# user enabled nftables.
+#
+# It has been extracted from `lxd.nix` for clarity, and because switching from
+# iptables to nftables requires a full reboot, which is a bit hard inside NixOS
+# tests.
+
+import ./make-test-python.nix ({ pkgs, ...} : {
+ name = "lxd-nftables";
+
+ meta = with pkgs.stdenv.lib.maintainers; {
+ maintainers = [ patryk27 ];
+ };
+
+ machine = { lib, ... }: {
+ virtualisation = {
+ lxd.enable = true;
+ };
+
+ networking = {
+ firewall.enable = false;
+ nftables.enable = true;
+ nftables.ruleset = ''
+ table inet filter {
+ chain incoming {
+ type filter hook input priority 0;
+ policy accept;
+ }
+
+ chain forward {
+ type filter hook forward priority 0;
+ policy accept;
+ }
+
+ chain output {
+ type filter hook output priority 0;
+ policy accept;
+ }
+ }
+ '';
+ };
+ };
+
+ testScript = ''
+ machine.wait_for_unit("network.target")
+
+ with subtest("When nftables are enabled, lxd doesn't depend on iptables anymore"):
+ machine.succeed("lsmod | grep nf_tables")
+ machine.fail("lsmod | grep ip_tables")
+ '';
+})