···
1
-
import ../make-test.nix ({ pkgs, ...} : {
1
+
import ../make-test-python.nix ({ pkgs, ...} : {
name = "wireguard-generated";
meta = with pkgs.stdenv.lib.maintainers; {
maintainers = [ ma27 grahamc ];
···
33
-
$peer1->waitForUnit("wireguard-wg0.service");
34
-
$peer2->waitForUnit("wireguard-wg0.service");
33
+
peer1.wait_for_unit("wireguard-wg0.service")
34
+
peer2.wait_for_unit("wireguard-wg0.service")
36
-
my ($retcode, $peer1pubkey) = $peer1->execute("wg pubkey < /etc/wireguard/private");
37
-
$peer1pubkey =~ s/\s+$//;
38
-
if ($retcode != 0) {
39
-
die "Could not read public key from peer1";
36
+
retcode, peer1pubkey = peer1.execute("wg pubkey < /etc/wireguard/private")
38
+
raise Exception("Could not read public key from peer1")
42
-
my ($retcode, $peer2pubkey) = $peer2->execute("wg pubkey < /etc/wireguard/private");
43
-
$peer2pubkey =~ s/\s+$//;
44
-
if ($retcode != 0) {
45
-
die "Could not read public key from peer2";
40
+
retcode, peer2pubkey = peer2.execute("wg pubkey < /etc/wireguard/private")
42
+
raise Exception("Could not read public key from peer2")
48
-
$peer1->succeed("wg set wg0 peer $peer2pubkey allowed-ips 10.10.10.2/32 endpoint 192.168.1.2:12345 persistent-keepalive 1");
49
-
$peer1->succeed("ip route replace 10.10.10.2/32 dev wg0 table main");
45
+
"wg set wg0 peer {} allowed-ips 10.10.10.2/32 endpoint 192.168.1.2:12345 persistent-keepalive 1".format(
49
+
peer1.succeed("ip route replace 10.10.10.2/32 dev wg0 table main")
51
-
$peer2->succeed("wg set wg0 peer $peer1pubkey allowed-ips 10.10.10.1/32 endpoint 192.168.1.1:12345 persistent-keepalive 1");
52
-
$peer2->succeed("ip route replace 10.10.10.1/32 dev wg0 table main");
52
+
"wg set wg0 peer {} allowed-ips 10.10.10.1/32 endpoint 192.168.1.1:12345 persistent-keepalive 1".format(
56
+
peer2.succeed("ip route replace 10.10.10.1/32 dev wg0 table main")
54
-
$peer1->succeed("ping -c1 10.10.10.2");
55
-
$peer2->succeed("ping -c1 10.10.10.1");
58
+
peer1.succeed("ping -c1 10.10.10.2")
59
+
peer2.succeed("ping -c1 10.10.10.1")