aboutsummaryrefslogtreecommitdiff
path: root/test/example_config
diff options
context:
space:
mode:
Diffstat (limited to 'test/example_config')
-rw-r--r--test/example_config/wg0/nftables.conf33
-rw-r--r--test/example_config/wg0/wg0.conf9
-rw-r--r--test/example_config/wg0/wg0.netdev16
-rw-r--r--test/example_config/wg0/wg0.network33
-rw-r--r--test/example_config/wg1/nftables.conf33
-rw-r--r--test/example_config/wg1/wg1.conf9
-rw-r--r--test/example_config/wg1/wg1.netdev16
-rw-r--r--test/example_config/wg1/wg1.network33
8 files changed, 182 insertions, 0 deletions
diff --git a/test/example_config/wg0/nftables.conf b/test/example_config/wg0/nftables.conf
new file mode 100644
index 0000000..2b9762d
--- /dev/null
+++ b/test/example_config/wg0/nftables.conf
@@ -0,0 +1,33 @@
+table ip wg0 {
+ chain preraw {
+ type filter hook prerouting priority raw; policy accept;
+ iifname != "wg0" ip daddr 10.55.127.342 fib saddr type != local drop;
+ }
+
+ chain premangle {
+ type filter hook prerouting priority mangle; policy accept;
+ meta l4proto udp meta mark set ct mark;
+ }
+
+ chain postmangle {
+ type filter hook postrouting priority mangle; policy accept;
+ meta l4proto udp meta mark 0xa22a61a9 ct mark set meta mark;
+ }
+}
+
+table ip6 wg0 {
+ chain preraw {
+ type filter hook prerouting priority raw; policy accept;
+ iifname != "wg0" ip6 daddr ab00:aaaa:aaa:aa02::5:abcd fib saddr type != local drop;
+ }
+
+ chain premangle {
+ type filter hook prerouting priority mangle; policy accept;
+ meta l4proto udp meta mark set ct mark;
+ }
+
+ chain postmangle {
+ type filter hook postrouting priority mangle; policy accept;
+ meta l4proto udp meta mark 0xa22a61a9 ct mark set meta mark;
+ }
+}
diff --git a/test/example_config/wg0/wg0.conf b/test/example_config/wg0/wg0.conf
new file mode 100644
index 0000000..18460ee
--- /dev/null
+++ b/test/example_config/wg0/wg0.conf
@@ -0,0 +1,9 @@
+[Interface]
+PrivateKey = 0OCS+dV5wsDje6qUAEDQzPmTNWOLE9HE8kfGU1wJUE0=
+Address = 10.55.127.342/32, ab00:aaaa:aaa:aa02::5:abcd/128
+DNS = 10.64.0.1
+
+[Peer]
+PublicKey = WBSnuq6Vswxz5G5zz9pUt60ZSA+JfZ1iTXdg0RJGjks=
+AllowedIPs = 0.0.0.0/0,::0/0
+Endpoint = 128.45.210.64:51821
diff --git a/test/example_config/wg0/wg0.netdev b/test/example_config/wg0/wg0.netdev
new file mode 100644
index 0000000..4bfea5d
--- /dev/null
+++ b/test/example_config/wg0/wg0.netdev
@@ -0,0 +1,16 @@
+# Autogenerated by wg2nd
+[NetDev]
+Name = wg0
+Kind = wireguard
+Description = wg0 - wireguard tunnel
+
+[WireGuard]
+PrivateKeyFile = /etc/systemd/network/7MQMU4C7JODRWLDIICKQPWRARIMU5IFM54B2BGXAF42WYVL2RYQA====.privkey
+FirewallMark = 0xa22a61a9
+
+[WireGuardPeer]
+PublicKey = WBSnuq6Vswxz5G5zz9pUt60ZSA+JfZ1iTXdg0RJGjks=
+Endpoint = 128.45.210.64:51821
+AllowedIPs = 0.0.0.0/0
+AllowedIPs = ::0/0
+
diff --git a/test/example_config/wg0/wg0.network b/test/example_config/wg0/wg0.network
new file mode 100644
index 0000000..3cbb147
--- /dev/null
+++ b/test/example_config/wg0/wg0.network
@@ -0,0 +1,33 @@
+# Autogenerated by wg2nd
+[Match]
+Name = wg0
+
+[Link]
+ActivationPolicy = manual
+
+[Network]
+Address = 10.55.127.342/32
+Address = ab00:aaaa:aaa:aa02::5:abcd/128
+DNS = 10.64.0.1
+Domains = ~.
+
+[Route]
+Destination = 0.0.0.0/0
+Table = 2720686505
+
+[Route]
+Destination = ::0/0
+Table = 2720686505
+
+[RoutingPolicyRule]
+SuppressPrefixLength = 0
+Family = both
+Priority = 32764
+
+[RoutingPolicyRule]
+FirewallMark = 0xa22a61a9
+InvertRule = true
+Table = 2720686505
+Family = both
+Priority = 32765
+
diff --git a/test/example_config/wg1/nftables.conf b/test/example_config/wg1/nftables.conf
new file mode 100644
index 0000000..048178a
--- /dev/null
+++ b/test/example_config/wg1/nftables.conf
@@ -0,0 +1,33 @@
+table ip wg1 {
+ chain preraw {
+ type filter hook prerouting priority raw; policy accept;
+ iifname != "wg1" ip daddr 10.55.127.342 fib saddr type != local drop;
+ }
+
+ chain premangle {
+ type filter hook prerouting priority mangle; policy accept;
+ meta l4proto udp meta mark set ct mark;
+ }
+
+ chain postmangle {
+ type filter hook postrouting priority mangle; policy accept;
+ meta l4proto udp meta mark 0x25db0647 ct mark set meta mark;
+ }
+}
+
+table ip6 wg1 {
+ chain preraw {
+ type filter hook prerouting priority raw; policy accept;
+ iifname != "wg1" ip6 daddr ab00:aaaa:aaa:aa02::5:abcd fib saddr type != local drop;
+ }
+
+ chain premangle {
+ type filter hook prerouting priority mangle; policy accept;
+ meta l4proto udp meta mark set ct mark;
+ }
+
+ chain postmangle {
+ type filter hook postrouting priority mangle; policy accept;
+ meta l4proto udp meta mark 0x25db0647 ct mark set meta mark;
+ }
+}
diff --git a/test/example_config/wg1/wg1.conf b/test/example_config/wg1/wg1.conf
new file mode 100644
index 0000000..209bc1f
--- /dev/null
+++ b/test/example_config/wg1/wg1.conf
@@ -0,0 +1,9 @@
+[Interface]
+PrivateKey = 0OCS+dV5wsDje6qUAEDQzPmTNWOLE9HE8kfGU1wJUE0=
+Address = 10.55.127.342/32, ab00:aaaa:aaa:aa02::5:abcd/128
+DNS = 10.64.0.1
+
+[Peer]
+PublicKey = WBSnuq6Vswxz5G5zz9pUt60ZSA+JfZ1iTXdg0RJGjks=
+AllowedIPs = 0.0.0.0/0,::0/0
+Endpoint = 128.45.210.64:51821
diff --git a/test/example_config/wg1/wg1.netdev b/test/example_config/wg1/wg1.netdev
new file mode 100644
index 0000000..c8cf14b
--- /dev/null
+++ b/test/example_config/wg1/wg1.netdev
@@ -0,0 +1,16 @@
+# Autogenerated by wg2nd
+[NetDev]
+Name = wg1
+Kind = wireguard
+Description = wg1 - wireguard tunnel
+
+[WireGuard]
+PrivateKeyFile = /etc/systemd/network/7MQMU4C7JODRWLDIICKQPWRARIMU5IFM54B2BGXAF42WYVL2RYQA====.privkey
+FirewallMark = 0x25db0647
+
+[WireGuardPeer]
+PublicKey = WBSnuq6Vswxz5G5zz9pUt60ZSA+JfZ1iTXdg0RJGjks=
+Endpoint = 128.45.210.64:51821
+AllowedIPs = 0.0.0.0/0
+AllowedIPs = ::0/0
+
diff --git a/test/example_config/wg1/wg1.network b/test/example_config/wg1/wg1.network
new file mode 100644
index 0000000..3a50f29
--- /dev/null
+++ b/test/example_config/wg1/wg1.network
@@ -0,0 +1,33 @@
+# Autogenerated by wg2nd
+[Match]
+Name = wg1
+
+[Link]
+ActivationPolicy = manual
+
+[Network]
+Address = 10.55.127.342/32
+Address = ab00:aaaa:aaa:aa02::5:abcd/128
+DNS = 10.64.0.1
+Domains = ~.
+
+[Route]
+Destination = 0.0.0.0/0
+Table = 635110983
+
+[Route]
+Destination = ::0/0
+Table = 635110983
+
+[RoutingPolicyRule]
+SuppressPrefixLength = 0
+Family = both
+Priority = 32764
+
+[RoutingPolicyRule]
+FirewallMark = 0x25db0647
+InvertRule = true
+Table = 635110983
+Family = both
+Priority = 32765
+