aboutsummaryrefslogtreecommitdiff
path: root/test/example_config/wg1
diff options
context:
space:
mode:
authorflu0r1ne <flu0r1ne@flu0r1ne.net>2024-06-05 13:35:20 -0700
committerflu0r1ne <flu0r1ne@flu0r1ne.net>2024-06-05 13:35:20 -0700
commit23a37100f121edd0c1291c4a78901662eae5d58b (patch)
tree1b16a2f5b53746b0bef8f5f7f92729f128d2baaa /test/example_config/wg1
parent24ac246d85115396489f970d2396acdbad93431b (diff)
downloadwg2nd-0.2.1.tar.xz
wg2nd-0.2.1.zip
Integration tests and "\r\n" DOS-style line feedsHEADv0.2.1main
- Parse \r\n line feeds - Add simple integration tests to ensure regressions do not occur - Add test "wg1" for \r\n parsing
Diffstat (limited to 'test/example_config/wg1')
-rw-r--r--test/example_config/wg1/nftables.conf33
-rw-r--r--test/example_config/wg1/wg1.conf9
-rw-r--r--test/example_config/wg1/wg1.netdev16
-rw-r--r--test/example_config/wg1/wg1.network33
4 files changed, 91 insertions, 0 deletions
diff --git a/test/example_config/wg1/nftables.conf b/test/example_config/wg1/nftables.conf
new file mode 100644
index 0000000..048178a
--- /dev/null
+++ b/test/example_config/wg1/nftables.conf
@@ -0,0 +1,33 @@
+table ip wg1 {
+ chain preraw {
+ type filter hook prerouting priority raw; policy accept;
+ iifname != "wg1" ip daddr 10.55.127.342 fib saddr type != local drop;
+ }
+
+ chain premangle {
+ type filter hook prerouting priority mangle; policy accept;
+ meta l4proto udp meta mark set ct mark;
+ }
+
+ chain postmangle {
+ type filter hook postrouting priority mangle; policy accept;
+ meta l4proto udp meta mark 0x25db0647 ct mark set meta mark;
+ }
+}
+
+table ip6 wg1 {
+ chain preraw {
+ type filter hook prerouting priority raw; policy accept;
+ iifname != "wg1" ip6 daddr ab00:aaaa:aaa:aa02::5:abcd fib saddr type != local drop;
+ }
+
+ chain premangle {
+ type filter hook prerouting priority mangle; policy accept;
+ meta l4proto udp meta mark set ct mark;
+ }
+
+ chain postmangle {
+ type filter hook postrouting priority mangle; policy accept;
+ meta l4proto udp meta mark 0x25db0647 ct mark set meta mark;
+ }
+}
diff --git a/test/example_config/wg1/wg1.conf b/test/example_config/wg1/wg1.conf
new file mode 100644
index 0000000..209bc1f
--- /dev/null
+++ b/test/example_config/wg1/wg1.conf
@@ -0,0 +1,9 @@
+[Interface]
+PrivateKey = 0OCS+dV5wsDje6qUAEDQzPmTNWOLE9HE8kfGU1wJUE0=
+Address = 10.55.127.342/32, ab00:aaaa:aaa:aa02::5:abcd/128
+DNS = 10.64.0.1
+
+[Peer]
+PublicKey = WBSnuq6Vswxz5G5zz9pUt60ZSA+JfZ1iTXdg0RJGjks=
+AllowedIPs = 0.0.0.0/0,::0/0
+Endpoint = 128.45.210.64:51821
diff --git a/test/example_config/wg1/wg1.netdev b/test/example_config/wg1/wg1.netdev
new file mode 100644
index 0000000..c8cf14b
--- /dev/null
+++ b/test/example_config/wg1/wg1.netdev
@@ -0,0 +1,16 @@
+# Autogenerated by wg2nd
+[NetDev]
+Name = wg1
+Kind = wireguard
+Description = wg1 - wireguard tunnel
+
+[WireGuard]
+PrivateKeyFile = /etc/systemd/network/7MQMU4C7JODRWLDIICKQPWRARIMU5IFM54B2BGXAF42WYVL2RYQA====.privkey
+FirewallMark = 0x25db0647
+
+[WireGuardPeer]
+PublicKey = WBSnuq6Vswxz5G5zz9pUt60ZSA+JfZ1iTXdg0RJGjks=
+Endpoint = 128.45.210.64:51821
+AllowedIPs = 0.0.0.0/0
+AllowedIPs = ::0/0
+
diff --git a/test/example_config/wg1/wg1.network b/test/example_config/wg1/wg1.network
new file mode 100644
index 0000000..3a50f29
--- /dev/null
+++ b/test/example_config/wg1/wg1.network
@@ -0,0 +1,33 @@
+# Autogenerated by wg2nd
+[Match]
+Name = wg1
+
+[Link]
+ActivationPolicy = manual
+
+[Network]
+Address = 10.55.127.342/32
+Address = ab00:aaaa:aaa:aa02::5:abcd/128
+DNS = 10.64.0.1
+Domains = ~.
+
+[Route]
+Destination = 0.0.0.0/0
+Table = 635110983
+
+[Route]
+Destination = ::0/0
+Table = 635110983
+
+[RoutingPolicyRule]
+SuppressPrefixLength = 0
+Family = both
+Priority = 32764
+
+[RoutingPolicyRule]
+FirewallMark = 0x25db0647
+InvertRule = true
+Table = 635110983
+Family = both
+Priority = 32765
+