nixos/tests: rename IP addresses/routes options

rnhmjoj e239c1e5 c1bed05e

+1 -1
nixos/modules/virtualisation/virtualbox-host.nix
···
'';
};
-
networking.interfaces.vboxnet0.ip4 = [ { address = "192.168.56.1"; prefixLength = 24; } ];
# Make sure NetworkManager won't assume this interface being up
# means we have internet access.
networking.networkmanager.unmanaged = ["vboxnet0"];
···
'';
};
+
networking.interfaces.vboxnet0.ipv4.addresses = { address = "192.168.56.1"; prefixLength = 24; };
# Make sure NetworkManager won't assume this interface being up
# means we have internet access.
networking.networkmanager.unmanaged = ["vboxnet0"];
+3 -3
nixos/tests/bittorrent.nix
···
miniupnpdConf = nodes: pkgs.writeText "miniupnpd.conf"
''
ext_ifname=eth1
-
listening_ip=${(pkgs.lib.head nodes.router.config.networking.interfaces.eth2.ip4).address}/24
allow 1024-65535 192.168.2.0/24 1024-65535
'';
···
{ environment.systemPackages = [ pkgs.transmission ];
virtualisation.vlans = [ 2 ];
networking.defaultGateway =
-
(pkgs.lib.head nodes.router.config.networking.interfaces.eth2.ip4).address;
networking.firewall.enable = false;
};
···
# Create the torrent.
$tracker->succeed("mkdir /tmp/data");
$tracker->succeed("cp ${file} /tmp/data/test.tar.bz2");
-
$tracker->succeed("transmission-create /tmp/data/test.tar.bz2 -p -t http://${(pkgs.lib.head nodes.tracker.config.networking.interfaces.eth1.ip4).address}:6969/announce -o /tmp/test.torrent");
$tracker->succeed("chmod 644 /tmp/test.torrent");
# Start the tracker. !!! use a less crappy tracker
···
miniupnpdConf = nodes: pkgs.writeText "miniupnpd.conf"
''
ext_ifname=eth1
+
listening_ip=${(pkgs.lib.head nodes.router.config.networking.interfaces.eth2.ipv4.addresses).address}/24
allow 1024-65535 192.168.2.0/24 1024-65535
'';
···
{ environment.systemPackages = [ pkgs.transmission ];
virtualisation.vlans = [ 2 ];
networking.defaultGateway =
+
(pkgs.lib.head nodes.router.config.networking.interfaces.eth2.ipv4.addresses).address;
networking.firewall.enable = false;
};
···
# Create the torrent.
$tracker->succeed("mkdir /tmp/data");
$tracker->succeed("cp ${file} /tmp/data/test.tar.bz2");
+
$tracker->succeed("transmission-create /tmp/data/test.tar.bz2 -p -t http://${(pkgs.lib.head nodes.tracker.config.networking.interfaces.eth1.ipv4.addresses).address}:6969/announce -o /tmp/test.torrent");
$tracker->succeed("chmod 644 /tmp/test.torrent");
# Start the tracker. !!! use a less crappy tracker
+6 -3
nixos/tests/cjdns.nix
···
# the sequence of address assignment less stochastic.
networking.useDHCP = false;
-
networking.interfaces.eth1.prefixLength = 24;
# CJDNS output is incompatible with the XML log.
systemd.services.cjdns.serviceConfig.StandardOutput = "null";
#networking.firewall.enable = true;
···
{ imports = [ basicConfig ];
-
networking.interfaces.eth1.ipAddress = "192.168.0.2";
services.cjdns =
{ UDPInterface =
···
CJDNS_ADMIN_PASSWORD=FOOBAR
'';
-
networking.interfaces.eth1.ipAddress = "192.168.0.1";
services.cjdns =
{ authorizedPasswords = [ carolPassword ];
···
# the sequence of address assignment less stochastic.
networking.useDHCP = false;
# CJDNS output is incompatible with the XML log.
systemd.services.cjdns.serviceConfig.StandardOutput = "null";
#networking.firewall.enable = true;
···
{ imports = [ basicConfig ];
+
networking.interfaces.eth1.ipv4.addresses = [
+
{ address = "192.168.0.2"; prefixLength = 24; }
+
];
services.cjdns =
{ UDPInterface =
···
CJDNS_ADMIN_PASSWORD=FOOBAR
'';
+
networking.interfaces.eth1.ipv4.addresses = [
+
{ address = "192.168.0.1"; prefixLength = 24; }
+
];
services.cjdns =
{ authorizedPasswords = [ carolPassword ];
+2 -2
nixos/tests/containers-bridge.nix
···
};
networking.interfaces = {
br0 = {
-
ip4 = [{ address = hostIp; prefixLength = 24; }];
-
ip6 = [{ address = hostIp6; prefixLength = 7; }];
};
};
···
};
networking.interfaces = {
br0 = {
+
ipv4.addresses = [{ address = hostIp; prefixLength = 24; }];
+
ipv6.addresses = [{ address = hostIp6; prefixLength = 7; }];
};
};
+3 -3
nixos/tests/containers-extra_veth.nix
···
};
networking.interfaces = {
br0 = {
-
ip4 = [{ address = "192.168.0.1"; prefixLength = 24; }];
-
ip6 = [{ address = "fc00::1"; prefixLength = 7; }];
};
br1 = {
-
ip4 = [{ address = "192.168.1.1"; prefixLength = 24; }];
};
};
···
};
networking.interfaces = {
br0 = {
+
ipv4.addresses = [{ address = "192.168.0.1"; prefixLength = 24; }];
+
ipv6.addresses = [{ address = "fc00::1"; prefixLength = 7; }];
};
br1 = {
+
ipv4.addresses = [{ address = "192.168.1.1"; prefixLength = 24; }];
};
};
+3 -3
nixos/tests/containers-hosts.nix
···
virtualisation.vlans = [];
networking.bridges.br0.interfaces = [];
-
networking.interfaces.br0 = {
-
ip4 = [ { address = "10.11.0.254"; prefixLength = 24; } ];
-
};
# Force /etc/hosts to be the only source for host name resolution
environment.etc."nsswitch.conf".text = lib.mkForce ''
···
virtualisation.vlans = [];
networking.bridges.br0.interfaces = [];
+
networking.interfaces.br0.ipv4.addresses = [
+
{ address = "10.11.0.254"; prefixLength = 24; }
+
];
# Force /etc/hosts to be the only source for host name resolution
environment.etc."nsswitch.conf".text = lib.mkForce ''
+4 -4
nixos/tests/containers-macvlans.nix
···
interface = "eth1";
mode = "bridge";
};
-
networking.interfaces.eth1.ip4 = lib.mkForce [];
networking.interfaces.mv-eth1-host = {
-
ip4 = [ { address = "192.168.1.1"; prefixLength = 24; } ];
};
containers.test1 = {
···
config = {
networking.interfaces.mv-eth1 = {
-
ip4 = [ { address = containerIp1; prefixLength = 24; } ];
};
};
};
···
config = {
networking.interfaces.mv-eth1 = {
-
ip4 = [ { address = containerIp2; prefixLength = 24; } ];
};
};
};
···
interface = "eth1";
mode = "bridge";
};
+
networking.interfaces.eth1.ipv4.addresses = lib.mkForce [];
networking.interfaces.mv-eth1-host = {
+
ipv4.addresses = [ { address = "192.168.1.1"; prefixLength = 24; } ];
};
containers.test1 = {
···
config = {
networking.interfaces.mv-eth1 = {
+
ipv4.addresses = [ { address = containerIp1; prefixLength = 24; } ];
};
};
};
···
config = {
networking.interfaces.mv-eth1 = {
+
ipv4.addresses = [ { address = containerIp2; prefixLength = 24; } ];
};
};
};
+12 -12
nixos/tests/containers-physical_interfaces.nix
···
interfaces = [ "eth1" ];
config = {
-
networking.interfaces.eth1 = {
-
ip4 = [ { address = "10.10.0.1"; prefixLength = 24; } ];
-
};
networking.firewall.enable = false;
};
};
···
config = {
networking.bridges.br0.interfaces = [ "eth1" ];
-
networking.interfaces.br0 = {
-
ip4 = [ { address = "10.10.0.2"; prefixLength = 24; } ];
-
};
networking.firewall.enable = false;
};
};
···
interfaces = [ "eth1" ];
mode = "active-backup";
};
-
networking.interfaces.bond0 = {
-
ip4 = [ { address = "10.10.0.3"; prefixLength = 24; } ];
-
};
networking.firewall.enable = false;
};
};
···
mode = "active-backup";
};
networking.bridges.br0.interfaces = [ "bond0" ];
-
networking.interfaces.br0 = {
-
ip4 = [ { address = "10.10.0.4"; prefixLength = 24; } ];
-
};
networking.firewall.enable = false;
};
};
···
interfaces = [ "eth1" ];
config = {
+
networking.interfaces.eth1.ipv4.addresses = [
+
{ address = "10.10.0.1"; prefixLength = 24; }
+
];
networking.firewall.enable = false;
};
};
···
config = {
networking.bridges.br0.interfaces = [ "eth1" ];
+
networking.interfaces.br0.ipv4.addresses = [
+
{ address = "10.10.0.2"; prefixLength = 24; }
+
];
networking.firewall.enable = false;
};
};
···
interfaces = [ "eth1" ];
mode = "active-backup";
};
+
networking.interfaces.bond0.ipv4.addresses = [
+
{ address = "10.10.0.3"; prefixLength = 24; }
+
];
networking.firewall.enable = false;
};
};
···
mode = "active-backup";
};
networking.bridges.br0.interfaces = [ "bond0" ];
+
networking.interfaces.br0.ipv4.addresses = [
+
{ address = "10.10.0.4"; prefixLength = 24; }
+
];
networking.firewall.enable = false;
};
};
+1 -1
nixos/tests/containers-reloadable.nix
···
# prevent make-test.nix to change IP
networking.interfaces = {
-
eth1.ip4 = lib.mkOverride 0 [ ];
};
};
in {
···
# prevent make-test.nix to change IP
networking.interfaces = {
+
eth1.ipv4.addresses = lib.mkOverride 0 [ ];
};
};
in {
+7 -7
nixos/tests/containers-restart_networking.nix
···
config = {
networking.firewall.enable = false;
networking.firewall.allowPing = true;
-
networking.interfaces.eth0.ip4 = [
{ address = "192.168.1.122"; prefixLength = 24; }
];
};
···
rstp = false;
};
networking.interfaces = {
-
eth1.ip4 = lib.mkOverride 0 [ ];
-
br0.ip4 = [{ address = "192.168.1.1"; prefixLength = 24; }];
};
};
···
rstp = false;
};
networking.interfaces = {
-
eth1.ip4 = lib.mkOverride 0 [ ];
-
br0.ip4 = [{ address = "192.168.1.2"; prefixLength = 24; }];
};
};
client_eth1_rstp = { lib, pkgs, ... }: client_base // {
···
rstp = true;
};
networking.interfaces = {
-
eth1.ip4 = lib.mkOverride 0 [ ];
-
br0.ip4 = [{ address = "192.168.1.2"; prefixLength = 24; }];
};
};
};
···
config = {
networking.firewall.enable = false;
networking.firewall.allowPing = true;
+
networking.interfaces.eth0.ipv4.addresses = [
{ address = "192.168.1.122"; prefixLength = 24; }
];
};
···
rstp = false;
};
networking.interfaces = {
+
eth1.ipv4.addresses = lib.mkOverride 0 [ ];
+
br0.ipv4.addresses = [ { address = "192.168.1.1"; prefixLength = 24; } ];
};
};
···
rstp = false;
};
networking.interfaces = {
+
eth1.ipv4.addresses = lib.mkOverride 0 [ ];
+
br0.ipv4.addresses = [ { address = "192.168.1.2"; prefixLength = 24; } ];
};
};
client_eth1_rstp = { lib, pkgs, ... }: client_base // {
···
rstp = true;
};
networking.interfaces = {
+
eth1.ipv4.addresses = lib.mkOverride 0 [ ];
+
br0.ipv4.addresses = [ { address = "192.168.1.2"; prefixLength = 24; } ];
};
};
};
+4 -4
nixos/tests/ferm.nix
···
with pkgs.lib;
{
networking = {
-
interfaces.eth1.ip6 = mkOverride 0 [ { address = "fd00::2"; prefixLength = 64; } ];
-
interfaces.eth1.ip4 = mkOverride 0 [ { address = "192.168.1.2"; prefixLength = 24; } ];
};
};
server =
···
with pkgs.lib;
{
networking = {
-
interfaces.eth1.ip6 = mkOverride 0 [ { address = "fd00::1"; prefixLength = 64; } ];
-
interfaces.eth1.ip4 = mkOverride 0 [ { address = "192.168.1.1"; prefixLength = 24; } ];
};
services = {
···
with pkgs.lib;
{
networking = {
+
interfaces.eth1.ipv6.addresses = mkOverride 0 [ { address = "fd00::2"; prefixLength = 64; } ];
+
interfaces.eth1.ipv4.addresses = mkOverride 0 [ { address = "192.168.1.2"; prefixLength = 24; } ];
};
};
server =
···
with pkgs.lib;
{
networking = {
+
interfaces.eth1.ipv6.addresses = mkOverride 0 [ { address = "fd00::1"; prefixLength = 64; } ];
+
interfaces.eth1.ipv4.addresses = mkOverride 0 [ { address = "192.168.1.1"; prefixLength = 24; } ];
};
services = {
+1 -3
nixos/tests/initrd-network-ssh/default.nix
···
{ config, pkgs, ... }:
{
boot.kernelParams = [
-
"ip=${
-
(head config.networking.interfaces.eth1.ip4).address
-
}:::255.255.255.0::eth1:none"
];
boot.initrd.network = {
enable = true;
···
{ config, pkgs, ... }:
{
boot.kernelParams = [
+
"ip=${config.networking.primaryIPAddress}:::255.255.255.0::eth1:none"
];
boot.initrd.network = {
enable = true;
+1 -1
nixos/tests/nat.nix
···
{ virtualisation.vlans = [ 1 ];
networking.firewall.allowPing = true;
networking.defaultGateway =
-
(pkgs.lib.head nodes.router.config.networking.interfaces.eth2.ip4).address;
}
(lib.optionalAttrs withConntrackHelpers {
networking.firewall.connectionTrackingModules = [ "ftp" ];
···
{ virtualisation.vlans = [ 1 ];
networking.firewall.allowPing = true;
networking.defaultGateway =
+
(pkgs.lib.head nodes.router.config.networking.interfaces.eth2.ipv4.addresses).address;
}
(lib.optionalAttrs withConntrackHelpers {
networking.firewall.connectionTrackingModules = [ "ftp" ];
+11 -11
nixos/tests/networking.nix
···
firewall.allowedUDPPorts = [ 547 ];
interfaces = mkOverride 0 (listToAttrs (flip map vlanIfs (n:
nameValuePair "eth${toString n}" {
-
ipv4.addresses = [ { address = "192.168.${toString n}.1"; prefixLength = 24;} ];
-
ipv6.addresses = [ { address = "fd00:1234:5678:${toString n}::1"; prefixLength = 64;} ];
})));
};
services.dhcpd4 = {
···
name = "Virtual";
machine = {
networking.interfaces."tap0" = {
-
ip4 = [ { address = "192.168.1.1"; prefixLength = 24; } ];
-
ip6 = [ { address = "2001:1470:fffd:2096::"; prefixLength = 64; } ];
virtual = true;
};
networking.interfaces."tun0" = {
-
ip4 = [ { address = "192.168.1.2"; prefixLength = 24; } ];
-
ip6 = [ { address = "2001:1470:fffd:2097::"; prefixLength = 64; } ];
virtual = true;
};
};
···
boot.kernel.sysctl."net.ipv6.conf.all.forwarding" = true;
networking = {
useNetworkd = networkd;
-
interfaces.eth1 = {
-
ipv6Address = "fd00:1234:5678:1::1";
-
ipv6PrefixLength = 64;
};
};
services.radvd = {
···
useDHCP = true;
interfaces.eth1 = {
preferTempAddress = true;
-
ip4 = mkOverride 0 [ ];
-
ip6 = mkOverride 0 [ ];
};
};
};
···
firewall.allowedUDPPorts = [ 547 ];
interfaces = mkOverride 0 (listToAttrs (flip map vlanIfs (n:
nameValuePair "eth${toString n}" {
+
ipv4.addresses = [ { address = "192.168.${toString n}.1"; prefixLength = 24; } ];
+
ipv6.addresses = [ { address = "fd00:1234:5678:${toString n}::1"; prefixLength = 64; } ];
})));
};
services.dhcpd4 = {
···
name = "Virtual";
machine = {
networking.interfaces."tap0" = {
+
ipv4.addresses = [ { address = "192.168.1.1"; prefixLength = 24; } ];
+
ipv6.addresses = [ { address = "2001:1470:fffd:2096::"; prefixLength = 64; } ];
virtual = true;
};
networking.interfaces."tun0" = {
+
ipv4.addresses = [ { address = "192.168.1.2"; prefixLength = 24; } ];
+
ipv6.addresses = [ { address = "2001:1470:fffd:2097::"; prefixLength = 64; } ];
virtual = true;
};
};
···
boot.kernel.sysctl."net.ipv6.conf.all.forwarding" = true;
networking = {
useNetworkd = networkd;
+
interfaces.eth1.ipv6.addresses = singleton {
+
address = "fd00:1234:5678:1::1";
+
prefixLength = 64;
};
};
services.radvd = {
···
useDHCP = true;
interfaces.eth1 = {
preferTempAddress = true;
+
ipv4.addresses = mkOverride 0 [ ];
+
ipv6.addresses = mkOverride 0 [ ];
};
};
};
+14 -8
nixos/tests/nsd.nix
···
clientv4 = { lib, nodes, ... }: {
imports = [ common ];
networking.nameservers = lib.mkForce [
-
nodes.server.config.networking.interfaces.eth1.ipAddress
];
-
networking.interfaces.eth1.ipAddress = "192.168.0.2";
-
networking.interfaces.eth1.prefixLength = 24;
};
clientv6 = { lib, nodes, ... }: {
imports = [ common ];
networking.nameservers = lib.mkForce [
-
nodes.server.config.networking.interfaces.eth1.ipv6Address
];
-
networking.interfaces.eth1.ipv6Address = "dead:beef::2";
};
server = { lib, ... }: {
imports = [ common ];
-
networking.interfaces.eth1.ipAddress = "192.168.0.1";
-
networking.interfaces.eth1.prefixLength = 24;
-
networking.interfaces.eth1.ipv6Address = "dead:beef::1";
services.nsd.enable = true;
services.nsd.interfaces = lib.mkForce [];
services.nsd.zones."example.com.".data = ''
···
clientv4 = { lib, nodes, ... }: {
imports = [ common ];
networking.nameservers = lib.mkForce [
+
(lib.head nodes.server.config.networking.interfaces.eth1.ipv4.addresses).address
];
+
networking.interfaces.eth1.ipv4.addresses = [
+
{ address = "192.168.0.2"; prefixLength = 24; }
+
];
};
clientv6 = { lib, nodes, ... }: {
imports = [ common ];
networking.nameservers = lib.mkForce [
+
(lib.head nodes.server.config.networking.interfaces.eth1.ipv6.addresses).address
];
+
networking.interfaces.eth1.ipv4.addresses = [
+
{ address = "dead:beef::2"; prefixLength = 24; }
+
];
};
server = { lib, ... }: {
imports = [ common ];
+
networking.interfaces.eth1.ipv4.addresses = [
+
{ address = "192.168.0.1"; prefixLength = 24; }
+
];
+
networking.interfaces.eth1.ipv6.addresses = [
+
{ address = "dead:beef::1"; prefixLength = 64; }
+
];
services.nsd.enable = true;
services.nsd.interfaces = lib.mkForce [];
services.nsd.zones."example.com.".data = ''
+1 -1
nixos/tests/quagga.nix
···
import ./make-test.nix ({ pkgs, ... }:
let
-
ifAddr = node: iface: (pkgs.lib.head node.config.networking.interfaces.${iface}.ip4).address;
ospfConf = ''
interface eth2
···
import ./make-test.nix ({ pkgs, ... }:
let
+
ifAddr = node: iface: (pkgs.lib.head node.config.networking.interfaces.${iface}.ipv4.addresses).address;
ospfConf = ''
interface eth2