nixpkgs/nixos/tests/strongswan-swanctl.nix

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

149 lines
4.5 KiB
Nix
Raw Normal View History

# This strongswan-swanctl test is based on:
# https://www.strongswan.org/testing/testresults/swanctl/rw-psk-ipv4/index.html
# https://github.com/strongswan/strongswan/tree/master/testing/tests/swanctl/rw-psk-ipv4
#
# The roadwarrior carol sets up a connection to gateway moon. The authentication
# is based on pre-shared keys and IPv4 addresses. Upon the successful
# establishment of the IPsec tunnels, the specified updown script automatically
# inserts iptables-based firewall rules that let pass the tunneled traffic. In
# order to test both tunnel and firewall, carol pings the client alice behind
# the gateway moon.
#
# alice moon carol
# eth1------vlan_0------eth1 eth2------vlan_1------eth1
# 192.168.0.1 192.168.0.3 192.168.1.3 192.168.1.2
#
# See the NixOS manual for how to run this test:
# https://nixos.org/nixos/manual/index.html#sec-running-nixos-tests-interactively
import ./make-test-python.nix ({ pkgs, ...} :
let
allowESP = "iptables --insert INPUT --protocol ESP --jump ACCEPT";
# Shared VPN settings:
vlan0 = "192.168.0.0/24";
2018-02-28 11:44:00 +01:00
carolIp = "192.168.1.2";
moonIp = "192.168.1.3";
version = 2;
secret = "0sFpZAZqEN6Ti9sqt4ZP5EWcqx";
esp_proposals = [ "aes128gcm128-x25519" ];
proposals = [ "aes128-sha256-x25519" ];
in {
name = "strongswan-swanctl";
meta.maintainers = with pkgs.lib.maintainers; [ basvandijk ];
nodes = {
alice = { ... } : {
virtualisation.vlans = [ 0 ];
networking = {
dhcpcd.enable = false;
2018-02-28 11:44:00 +01:00
defaultGateway = "192.168.0.3";
};
};
moon = { config, ...} :
2018-02-28 11:44:00 +01:00
let strongswan = config.services.strongswan-swanctl.package;
in {
virtualisation.vlans = [ 0 1 ];
networking = {
dhcpcd.enable = false;
firewall = {
allowedUDPPorts = [ 4500 500 ];
extraCommands = allowESP;
};
nat = {
enable = true;
internalIPs = [ vlan0 ];
internalInterfaces = [ "eth1" ];
externalIP = moonIp;
externalInterface = "eth2";
};
};
environment.systemPackages = [ strongswan ];
services.strongswan-swanctl = {
enable = true;
swanctl = {
connections = {
2019-08-13 23:52:01 +02:00
rw = {
local_addrs = [ moonIp ];
2019-08-13 23:52:01 +02:00
local.main = {
auth = "psk";
};
2019-08-13 23:52:01 +02:00
remote.main = {
auth = "psk";
};
children = {
2019-08-13 23:52:01 +02:00
net = {
local_ts = [ vlan0 ];
updown = "${strongswan}/libexec/ipsec/_updown iptables";
inherit esp_proposals;
};
};
inherit version;
inherit proposals;
};
};
secrets = {
2019-08-13 23:52:01 +02:00
ike.carol = {
id.main = carolIp;
inherit secret;
};
};
};
};
};
carol = { config, ...} :
2018-02-28 11:44:00 +01:00
let strongswan = config.services.strongswan-swanctl.package;
in {
virtualisation.vlans = [ 1 ];
networking = {
dhcpcd.enable = false;
firewall.extraCommands = allowESP;
};
environment.systemPackages = [ strongswan ];
services.strongswan-swanctl = {
enable = true;
swanctl = {
connections = {
2019-08-13 23:52:01 +02:00
home = {
local_addrs = [ carolIp ];
remote_addrs = [ moonIp ];
2019-08-13 23:52:01 +02:00
local.main = {
auth = "psk";
id = carolIp;
};
2019-08-13 23:52:01 +02:00
remote.main = {
auth = "psk";
id = moonIp;
};
children = {
2019-08-13 23:52:01 +02:00
home = {
remote_ts = [ vlan0 ];
start_action = "trap";
updown = "${strongswan}/libexec/ipsec/_updown iptables";
inherit esp_proposals;
};
};
inherit version;
inherit proposals;
};
};
secrets = {
2019-08-13 23:52:01 +02:00
ike.moon = {
id.main = moonIp;
inherit secret;
};
};
};
};
};
};
testScript = ''
start_all()
carol.wait_until_succeeds("ping -c 1 alice")
'';
})