nixos/tests/dnscrypt-wrapper: init

rnhmjoj cb8975f5 743eea4c

Changed files
+74
nixos
+1
nixos/tests/all-tests.nix
···
deluge = handleTest ./deluge.nix {};
dhparams = handleTest ./dhparams.nix {};
dnscrypt-proxy2 = handleTestOn ["x86_64-linux"] ./dnscrypt-proxy2.nix {};
+
dnscrypt-wrapper = handleTestOn ["x86_64-linux"] ./dnscrypt-wrapper {};
doas = handleTest ./doas.nix {};
docker = handleTestOn ["x86_64-linux"] ./docker.nix {};
oci-containers = handleTestOn ["x86_64-linux"] ./oci-containers.nix {};
+71
nixos/tests/dnscrypt-wrapper/default.nix
···
+
import ../make-test-python.nix ({ pkgs, ... }: {
+
name = "dnscrypt-wrapper";
+
meta = with pkgs.stdenv.lib.maintainers; {
+
maintainers = [ rnhmjoj ];
+
};
+
+
nodes = {
+
server = { lib, ... }:
+
{ services.dnscrypt-wrapper = with builtins;
+
{ enable = true;
+
address = "192.168.1.1";
+
keys.expiration = 5; # days
+
keys.checkInterval = 2; # min
+
# The keypair was generated by the command:
+
# dnscrypt-wrapper --gen-provider-keypair \
+
# --provider-name=2.dnscrypt-cert.server \
+
# --ext-address=192.168.1.1:5353
+
providerKey.public = toFile "public.key" (readFile ./public.key);
+
providerKey.secret = toFile "secret.key" (readFile ./secret.key);
+
};
+
services.tinydns.enable = true;
+
services.tinydns.data = ''
+
..:192.168.1.1:a
+
+it.works:1.2.3.4
+
'';
+
networking.firewall.allowedUDPPorts = [ 5353 ];
+
networking.firewall.allowedTCPPorts = [ 5353 ];
+
networking.interfaces.eth1.ipv4.addresses = lib.mkForce
+
[ { address = "192.168.1.1"; prefixLength = 24; } ];
+
};
+
+
client = { lib, ... }:
+
{ services.dnscrypt-proxy2.enable = true;
+
services.dnscrypt-proxy2.settings = {
+
server_names = [ "server" ];
+
static.server.stamp = "sdns://AQAAAAAAAAAAEDE5Mi4xNjguMS4xOjUzNTMgFEHYOv0SCKSuqR5CDYa7-58cCBuXO2_5uTSVU9wNQF0WMi5kbnNjcnlwdC1jZXJ0LnNlcnZlcg";
+
};
+
networking.nameservers = [ "127.0.0.1" ];
+
networking.interfaces.eth1.ipv4.addresses = lib.mkForce
+
[ { address = "192.168.1.2"; prefixLength = 24; } ];
+
};
+
+
};
+
+
testScript = ''
+
start_all()
+
+
with subtest("The server can generate the ephemeral keypair"):
+
server.wait_for_unit("dnscrypt-wrapper")
+
server.wait_for_file("/var/lib/dnscrypt-wrapper/2.dnscrypt-cert.server.key")
+
server.wait_for_file("/var/lib/dnscrypt-wrapper/2.dnscrypt-cert.server.crt")
+
+
with subtest("The client can connect to the server"):
+
server.wait_for_unit("tinydns")
+
client.wait_for_unit("dnscrypt-proxy2")
+
assert "1.2.3.4" in client.succeed(
+
"host it.works"
+
), "The IP address of 'it.works' does not match 1.2.3.4"
+
+
with subtest("The server rotates the ephemeral keys"):
+
# advance time by a little less than 5 days
+
server.succeed("date -s \"$(date --date '4 days 6 hours')\"")
+
client.succeed("date -s \"$(date --date '4 days 6 hours')\"")
+
server.wait_for_file("/var/lib/dnscrypt-wrapper/oldkeys")
+
+
with subtest("The client can still connect to the server"):
+
server.wait_for_unit("dnscrypt-wrapper")
+
client.succeed("host it.works")
+
'';
+
})
+
+1
nixos/tests/dnscrypt-wrapper/public.key
···
+
A�:����B �����;o��4�S� @]
+1
nixos/tests/dnscrypt-wrapper/secret.key
···
+
G�>Ʃ���>���(����J���=�����l�A�:����B �����;o��4�S� @]