diff options
author | Christian Poessinger <christian@poessinger.com> | 2020-02-29 09:38:19 +0100 |
---|---|---|
committer | Christian Poessinger <christian@poessinger.com> | 2020-02-29 09:38:19 +0100 |
commit | 300452f724c7dcd1aec1a5afc132319347c14939 (patch) | |
tree | 7a746449ded229abc444ccb0c7d0e7289444ac1d | |
parent | dae341a019335e22ea31b3e12934be08d9c00b8a (diff) | |
download | vyos-1x-300452f724c7dcd1aec1a5afc132319347c14939.tar.gz vyos-1x-300452f724c7dcd1aec1a5afc132319347c14939.zip |
interfaces: wireguard: add initial test
WireGuard interface can not be easily inherit the BasicInterfaceTest class
as every operation on WireGuard interfaces require IP addresses assigned
to the interface - I do not now if this is really a requirement or just
a to restrict validate() on the WireGuard interface.
Nevertheless this helps to see if changes on e.g. ifconfig.py breaks this
interface.
-rw-r--r-- | scripts/cli/test_interfaces_wireguard.py | 65 |
1 files changed, 65 insertions, 0 deletions
diff --git a/scripts/cli/test_interfaces_wireguard.py b/scripts/cli/test_interfaces_wireguard.py new file mode 100644 index 000000000..ff1ff5d7e --- /dev/null +++ b/scripts/cli/test_interfaces_wireguard.py @@ -0,0 +1,65 @@ +#!/usr/bin/env python3 +# +# Copyright (C) 2020 VyOS maintainers and contributors +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License version 2 or later as +# published by the Free Software Foundation. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program. If not, see <http://www.gnu.org/licenses/>. + +import os +import unittest + +from vyos.configsession import ConfigSession, ConfigSessionError +from base_interfaces_test import BasicInterfaceTest + +# Generate WireGuard default keypair +if not os.path.isdir('/config/auth/wireguard/default'): + os.system('/usr/libexec/vyos/op_mode/wireguard.py --genkey') + +base_path = ['interfaces', 'wireguard'] + +class WireGuardInterfaceTest(unittest.TestCase): + def setUp(self): + self.session = ConfigSession(os.getpid()) + self._test_addr = ['192.0.2.1/26', '192.0.2.255/31', '192.0.2.64/32', + '2001:db8:1::ffff/64', '2001:db8:101::1/112'] + self._interfaces = ['wg0', 'wg1'] + + def tearDown(self): + self.session.delete(base_path) + self.session.commit() + del self.session + + def test_peer_setup(self): + """ + Create WireGuard interfaces with associated peers + """ + for intf in self._interfaces: + peer = 'foo-' + intf + psk = 'u2xdA70hkz0S1CG0dZlOh0aq2orwFXRIVrKo4DCvHgM=' + pubkey = 'n6ZZL7ph/QJUJSUUTyu19c77my1dRCDHkMzFQUO9Z3A=' + + for addr in self._test_addr: + self.session.set(base_path + [intf, 'address', addr]) + + self.session.set(base_path + [intf, 'peer', peer, 'endpoint', '127.0.0.1:1337']) + + # Allow different prefixes to traverse the tunnel + allowed_ips = ['0.0.0.0/0'] + for ip in allowed_ips: + self.session.set(base_path + [intf, 'peer', peer, 'allowed-ips', ip]) + + self.session.set(base_path + [intf, 'peer', peer, 'preshared-key', psk]) + self.session.set(base_path + [intf, 'peer', peer, 'pubkey', pubkey]) + self.session.commit() + +if __name__ == '__main__': + unittest.main() |