2018-01-08 14:09:33 +00:00
|
|
|
import ./make-test.nix ({ pkgs, ... }: {
|
|
|
|
name = "dnscrypt-proxy";
|
|
|
|
meta = with pkgs.stdenv.lib.maintainers; {
|
|
|
|
maintainers = [ joachifm ];
|
|
|
|
};
|
|
|
|
|
|
|
|
nodes = {
|
|
|
|
# A client running the recommended setup: DNSCrypt proxy as a forwarder
|
|
|
|
# for a caching DNS client.
|
|
|
|
client =
|
2018-07-20 21:56:59 +01:00
|
|
|
{ ... }:
|
2018-01-08 14:09:33 +00:00
|
|
|
let localProxyPort = 43; in
|
|
|
|
{
|
|
|
|
security.apparmor.enable = true;
|
|
|
|
|
|
|
|
services.dnscrypt-proxy.enable = true;
|
|
|
|
services.dnscrypt-proxy.localPort = localProxyPort;
|
|
|
|
services.dnscrypt-proxy.extraArgs = [ "-X libdcplugin_example.so" ];
|
|
|
|
|
|
|
|
services.dnsmasq.enable = true;
|
|
|
|
services.dnsmasq.servers = [ "127.0.0.1#${toString localProxyPort}" ];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
testScript = ''
|
|
|
|
$client->waitForUnit("dnsmasq");
|
|
|
|
|
|
|
|
# The daemon is socket activated; sending a single ping should activate it.
|
2018-05-20 01:24:12 +01:00
|
|
|
$client->fail("systemctl is-active dnscrypt-proxy");
|
2018-01-08 14:09:33 +00:00
|
|
|
$client->execute("${pkgs.iputils}/bin/ping -c1 example.com");
|
2018-05-20 01:24:12 +01:00
|
|
|
$client->waitUntilSucceeds("systemctl is-active dnscrypt-proxy");
|
2018-01-08 14:09:33 +00:00
|
|
|
'';
|
|
|
|
})
|