2020-01-02 12:22:48 +00:00
|
|
|
import ./make-test-python.nix ({ pkgs, ...} : {
|
2019-10-10 11:56:05 +00:00
|
|
|
name = "3proxy";
|
2021-01-10 19:08:30 +00:00
|
|
|
meta = with pkgs.lib.maintainers; {
|
2019-10-10 11:56:05 +00:00
|
|
|
maintainers = [ misuzu ];
|
|
|
|
};
|
|
|
|
|
|
|
|
nodes = {
|
|
|
|
peer0 = { lib, ... }: {
|
|
|
|
networking.useDHCP = false;
|
|
|
|
networking.interfaces.eth1 = {
|
|
|
|
ipv4.addresses = [
|
|
|
|
{
|
|
|
|
address = "192.168.0.1";
|
|
|
|
prefixLength = 24;
|
|
|
|
}
|
|
|
|
{
|
|
|
|
address = "216.58.211.111";
|
|
|
|
prefixLength = 24;
|
|
|
|
}
|
|
|
|
];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
peer1 = { lib, ... }: {
|
|
|
|
networking.useDHCP = false;
|
|
|
|
networking.interfaces.eth1 = {
|
|
|
|
ipv4.addresses = [
|
|
|
|
{
|
|
|
|
address = "192.168.0.2";
|
|
|
|
prefixLength = 24;
|
|
|
|
}
|
|
|
|
{
|
|
|
|
address = "216.58.211.112";
|
|
|
|
prefixLength = 24;
|
|
|
|
}
|
|
|
|
];
|
|
|
|
};
|
|
|
|
# test that binding to [::] is working when ipv6 is disabled
|
|
|
|
networking.enableIPv6 = false;
|
|
|
|
services._3proxy = {
|
|
|
|
enable = true;
|
|
|
|
services = [
|
|
|
|
{
|
|
|
|
type = "admin";
|
|
|
|
bindPort = 9999;
|
|
|
|
auth = [ "none" ];
|
|
|
|
}
|
|
|
|
{
|
|
|
|
type = "proxy";
|
|
|
|
bindPort = 3128;
|
|
|
|
auth = [ "none" ];
|
|
|
|
}
|
|
|
|
];
|
|
|
|
};
|
|
|
|
networking.firewall.allowedTCPPorts = [ 3128 9999 ];
|
|
|
|
};
|
|
|
|
|
|
|
|
peer2 = { lib, ... }: {
|
|
|
|
networking.useDHCP = false;
|
|
|
|
networking.interfaces.eth1 = {
|
|
|
|
ipv4.addresses = [
|
|
|
|
{
|
|
|
|
address = "192.168.0.3";
|
|
|
|
prefixLength = 24;
|
|
|
|
}
|
|
|
|
{
|
|
|
|
address = "216.58.211.113";
|
|
|
|
prefixLength = 24;
|
|
|
|
}
|
|
|
|
];
|
|
|
|
};
|
|
|
|
services._3proxy = {
|
|
|
|
enable = true;
|
|
|
|
services = [
|
|
|
|
{
|
|
|
|
type = "admin";
|
|
|
|
bindPort = 9999;
|
|
|
|
auth = [ "none" ];
|
|
|
|
}
|
|
|
|
{
|
|
|
|
type = "proxy";
|
|
|
|
bindPort = 3128;
|
|
|
|
auth = [ "iponly" ];
|
|
|
|
acl = [
|
|
|
|
{
|
|
|
|
rule = "allow";
|
|
|
|
}
|
|
|
|
];
|
|
|
|
}
|
|
|
|
];
|
|
|
|
};
|
|
|
|
networking.firewall.allowedTCPPorts = [ 3128 9999 ];
|
|
|
|
};
|
|
|
|
|
|
|
|
peer3 = { lib, ... }: {
|
|
|
|
networking.useDHCP = false;
|
|
|
|
networking.interfaces.eth1 = {
|
|
|
|
ipv4.addresses = [
|
|
|
|
{
|
|
|
|
address = "192.168.0.4";
|
|
|
|
prefixLength = 24;
|
|
|
|
}
|
|
|
|
{
|
|
|
|
address = "216.58.211.114";
|
|
|
|
prefixLength = 24;
|
|
|
|
}
|
|
|
|
];
|
|
|
|
};
|
|
|
|
services._3proxy = {
|
|
|
|
enable = true;
|
|
|
|
usersFile = pkgs.writeText "3proxy.passwd" ''
|
|
|
|
admin:CR:$1$.GUV4Wvk$WnEVQtaqutD9.beO5ar1W/
|
|
|
|
'';
|
|
|
|
services = [
|
|
|
|
{
|
|
|
|
type = "admin";
|
|
|
|
bindPort = 9999;
|
|
|
|
auth = [ "none" ];
|
|
|
|
}
|
|
|
|
{
|
|
|
|
type = "proxy";
|
|
|
|
bindPort = 3128;
|
|
|
|
auth = [ "strong" ];
|
|
|
|
acl = [
|
|
|
|
{
|
|
|
|
rule = "allow";
|
|
|
|
}
|
|
|
|
];
|
|
|
|
}
|
|
|
|
];
|
|
|
|
};
|
|
|
|
networking.firewall.allowedTCPPorts = [ 3128 9999 ];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
testScript = ''
|
2020-08-18 13:53:30 +00:00
|
|
|
start_all()
|
|
|
|
|
|
|
|
peer0.wait_for_unit("network-online.target")
|
|
|
|
|
2020-01-02 12:22:48 +00:00
|
|
|
peer1.wait_for_unit("3proxy.service")
|
2022-06-11 12:22:53 +00:00
|
|
|
peer1.wait_for_open_port(9999)
|
2019-10-10 11:56:05 +00:00
|
|
|
|
|
|
|
# test none auth
|
2020-01-02 12:22:48 +00:00
|
|
|
peer0.succeed(
|
|
|
|
"${pkgs.wget}/bin/wget -e use_proxy=yes -e http_proxy=http://192.168.0.2:3128 -S -O /dev/null http://216.58.211.112:9999"
|
|
|
|
)
|
|
|
|
peer0.succeed(
|
|
|
|
"${pkgs.wget}/bin/wget -e use_proxy=yes -e http_proxy=http://192.168.0.2:3128 -S -O /dev/null http://192.168.0.2:9999"
|
|
|
|
)
|
|
|
|
peer0.succeed(
|
|
|
|
"${pkgs.wget}/bin/wget -e use_proxy=yes -e http_proxy=http://192.168.0.2:3128 -S -O /dev/null http://127.0.0.1:9999"
|
|
|
|
)
|
2019-10-10 11:56:05 +00:00
|
|
|
|
2020-01-02 12:22:48 +00:00
|
|
|
peer2.wait_for_unit("3proxy.service")
|
2022-06-11 12:22:53 +00:00
|
|
|
peer2.wait_for_open_port(9999)
|
2019-10-10 11:56:05 +00:00
|
|
|
|
|
|
|
# test iponly auth
|
2020-01-02 12:22:48 +00:00
|
|
|
peer0.succeed(
|
|
|
|
"${pkgs.wget}/bin/wget -e use_proxy=yes -e http_proxy=http://192.168.0.3:3128 -S -O /dev/null http://216.58.211.113:9999"
|
|
|
|
)
|
|
|
|
peer0.fail(
|
|
|
|
"${pkgs.wget}/bin/wget -e use_proxy=yes -e http_proxy=http://192.168.0.3:3128 -S -O /dev/null http://192.168.0.3:9999"
|
|
|
|
)
|
|
|
|
peer0.fail(
|
|
|
|
"${pkgs.wget}/bin/wget -e use_proxy=yes -e http_proxy=http://192.168.0.3:3128 -S -O /dev/null http://127.0.0.1:9999"
|
|
|
|
)
|
2019-10-10 11:56:05 +00:00
|
|
|
|
2020-01-02 12:22:48 +00:00
|
|
|
peer3.wait_for_unit("3proxy.service")
|
2022-06-11 12:22:53 +00:00
|
|
|
peer3.wait_for_open_port(9999)
|
2019-10-10 11:56:05 +00:00
|
|
|
|
|
|
|
# test strong auth
|
2020-01-02 12:22:48 +00:00
|
|
|
peer0.succeed(
|
|
|
|
"${pkgs.wget}/bin/wget -e use_proxy=yes -e http_proxy=http://admin:bigsecret\@192.168.0.4:3128 -S -O /dev/null http://216.58.211.114:9999"
|
|
|
|
)
|
|
|
|
peer0.fail(
|
|
|
|
"${pkgs.wget}/bin/wget -e use_proxy=yes -e http_proxy=http://admin:bigsecret\@192.168.0.4:3128 -S -O /dev/null http://192.168.0.4:9999"
|
|
|
|
)
|
|
|
|
peer0.fail(
|
|
|
|
"${pkgs.wget}/bin/wget -e use_proxy=yes -e http_proxy=http://192.168.0.4:3128 -S -O /dev/null http://216.58.211.114:9999"
|
|
|
|
)
|
|
|
|
peer0.fail(
|
|
|
|
"${pkgs.wget}/bin/wget -e use_proxy=yes -e http_proxy=http://192.168.0.4:3128 -S -O /dev/null http://192.168.0.4:9999"
|
|
|
|
)
|
|
|
|
peer0.fail(
|
|
|
|
"${pkgs.wget}/bin/wget -e use_proxy=yes -e http_proxy=http://192.168.0.4:3128 -S -O /dev/null http://127.0.0.1:9999"
|
|
|
|
)
|
2019-10-10 11:56:05 +00:00
|
|
|
'';
|
|
|
|
})
|