summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorChristian Poessinger <christian@poessinger.com>2020-02-29 09:38:19 +0100
committerChristian Poessinger <christian@poessinger.com>2020-02-29 09:38:19 +0100
commit300452f724c7dcd1aec1a5afc132319347c14939 (patch)
tree7a746449ded229abc444ccb0c7d0e7289444ac1d
parentdae341a019335e22ea31b3e12934be08d9c00b8a (diff)
downloadvyos-1x-300452f724c7dcd1aec1a5afc132319347c14939.tar.gz
vyos-1x-300452f724c7dcd1aec1a5afc132319347c14939.zip
interfaces: wireguard: add initial test
WireGuard interface can not be easily inherit the BasicInterfaceTest class as every operation on WireGuard interfaces require IP addresses assigned to the interface - I do not now if this is really a requirement or just a to restrict validate() on the WireGuard interface. Nevertheless this helps to see if changes on e.g. ifconfig.py breaks this interface.
-rw-r--r--scripts/cli/test_interfaces_wireguard.py65
1 files changed, 65 insertions, 0 deletions
diff --git a/scripts/cli/test_interfaces_wireguard.py b/scripts/cli/test_interfaces_wireguard.py
new file mode 100644
index 000000000..ff1ff5d7e
--- /dev/null
+++ b/scripts/cli/test_interfaces_wireguard.py
@@ -0,0 +1,65 @@
+#!/usr/bin/env python3
+#
+# Copyright (C) 2020 VyOS maintainers and contributors
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2 or later as
+# published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program. If not, see <http://www.gnu.org/licenses/>.
+
+import os
+import unittest
+
+from vyos.configsession import ConfigSession, ConfigSessionError
+from base_interfaces_test import BasicInterfaceTest
+
+# Generate WireGuard default keypair
+if not os.path.isdir('/config/auth/wireguard/default'):
+ os.system('/usr/libexec/vyos/op_mode/wireguard.py --genkey')
+
+base_path = ['interfaces', 'wireguard']
+
+class WireGuardInterfaceTest(unittest.TestCase):
+ def setUp(self):
+ self.session = ConfigSession(os.getpid())
+ self._test_addr = ['192.0.2.1/26', '192.0.2.255/31', '192.0.2.64/32',
+ '2001:db8:1::ffff/64', '2001:db8:101::1/112']
+ self._interfaces = ['wg0', 'wg1']
+
+ def tearDown(self):
+ self.session.delete(base_path)
+ self.session.commit()
+ del self.session
+
+ def test_peer_setup(self):
+ """
+ Create WireGuard interfaces with associated peers
+ """
+ for intf in self._interfaces:
+ peer = 'foo-' + intf
+ psk = 'u2xdA70hkz0S1CG0dZlOh0aq2orwFXRIVrKo4DCvHgM='
+ pubkey = 'n6ZZL7ph/QJUJSUUTyu19c77my1dRCDHkMzFQUO9Z3A='
+
+ for addr in self._test_addr:
+ self.session.set(base_path + [intf, 'address', addr])
+
+ self.session.set(base_path + [intf, 'peer', peer, 'endpoint', '127.0.0.1:1337'])
+
+ # Allow different prefixes to traverse the tunnel
+ allowed_ips = ['0.0.0.0/0']
+ for ip in allowed_ips:
+ self.session.set(base_path + [intf, 'peer', peer, 'allowed-ips', ip])
+
+ self.session.set(base_path + [intf, 'peer', peer, 'preshared-key', psk])
+ self.session.set(base_path + [intf, 'peer', peer, 'pubkey', pubkey])
+ self.session.commit()
+
+if __name__ == '__main__':
+ unittest.main()