mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-11-26 17:03:01 +00:00
51 lines
1.3 KiB
Nix
51 lines
1.3 KiB
Nix
# This test makes sure that lxd stops implicitly depending on iptables when
|
|
# user enabled nftables.
|
|
#
|
|
# It has been extracted from `lxd.nix` for clarity, and because switching from
|
|
# iptables to nftables requires a full reboot, which is a bit hard inside NixOS
|
|
# tests.
|
|
|
|
import ../make-test-python.nix ({ pkgs, lib, ...} : {
|
|
name = "lxd-nftables";
|
|
|
|
meta = {
|
|
maintainers = lib.teams.lxc.members;
|
|
};
|
|
|
|
nodes.machine = { lib, ... }: {
|
|
virtualisation = {
|
|
lxd.enable = true;
|
|
};
|
|
|
|
networking = {
|
|
firewall.enable = false;
|
|
nftables.enable = true;
|
|
nftables.tables."filter".family = "inet";
|
|
nftables.tables."filter".content = ''
|
|
chain incoming {
|
|
type filter hook input priority 0;
|
|
policy accept;
|
|
}
|
|
|
|
chain forward {
|
|
type filter hook forward priority 0;
|
|
policy accept;
|
|
}
|
|
|
|
chain output {
|
|
type filter hook output priority 0;
|
|
policy accept;
|
|
}
|
|
'';
|
|
};
|
|
};
|
|
|
|
testScript = ''
|
|
machine.wait_for_unit("network.target")
|
|
|
|
with subtest("When nftables are enabled, lxd doesn't depend on iptables anymore"):
|
|
machine.succeed("lsmod | grep nf_tables")
|
|
machine.fail("lsmod | grep ip_tables")
|
|
'';
|
|
})
|