Merge pull request #268146 from nevivurn/feat/openvpn-2.6.8

openvpn: 2.5.8 -> 2.6.8
This commit is contained in:
ajs124 2023-12-21 14:53:07 +01:00 committed by GitHub
commit d644f3882d
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
3 changed files with 26 additions and 16 deletions

View File

@ -407,7 +407,7 @@ in {
incus = pkgs.recurseIntoAttrs (handleTest ./incus { inherit handleTestOn; });
influxdb = handleTest ./influxdb.nix {};
influxdb2 = handleTest ./influxdb2.nix {};
initrd-network-openvpn = handleTest ./initrd-network-openvpn {};
initrd-network-openvpn = handleTestOn [ "x86_64-linux" "i686-linux" ] ./initrd-network-openvpn {};
initrd-network-ssh = handleTest ./initrd-network-ssh {};
initrd-luks-empty-passphrase = handleTest ./initrd-luks-empty-passphrase.nix {};
initrdNetwork = handleTest ./initrd-network.nix {};
@ -831,7 +831,7 @@ in {
systemd-initrd-vconsole = handleTest ./systemd-initrd-vconsole.nix {};
systemd-initrd-networkd = handleTest ./systemd-initrd-networkd.nix {};
systemd-initrd-networkd-ssh = handleTest ./systemd-initrd-networkd-ssh.nix {};
systemd-initrd-networkd-openvpn = handleTest ./initrd-network-openvpn { systemdStage1 = true; };
systemd-initrd-networkd-openvpn = handleTestOn [ "x86_64-linux" "i686-linux" ] ./initrd-network-openvpn { systemdStage1 = true; };
systemd-initrd-vlan = handleTest ./systemd-initrd-vlan.nix {};
systemd-journal = handleTest ./systemd-journal.nix {};
systemd-machinectl = handleTest ./systemd-machinectl.nix {};

View File

@ -59,18 +59,19 @@ import ../make-test-python.nix ({ lib, ...}:
# This command does not fork to keep the VM in the state where
# only the initramfs is loaded
preLVMCommands =
''
/bin/nc -p 1234 -lke /bin/echo TESTVALUE
'';
preLVMCommands = lib.mkIf (!systemdStage1)
''
/bin/nc -p 1234 -lke /bin/echo TESTVALUE
'';
network = {
enable = true;
# Work around udhcpc only getting a lease on eth0
postCommands = ''
/bin/ip addr add 192.168.1.2/24 dev eth1
'';
postCommands = lib.mkIf (!systemdStage1)
''
/bin/ip addr add 192.168.1.2/24 dev eth1
'';
# Example configuration for OpenVPN
# This is the main reason for this test

View File

@ -3,6 +3,9 @@
, fetchurl
, pkg-config
, iproute2
, libcap_ng
, libnl
, lz4
, lzo
, openssl
, pam
@ -11,12 +14,13 @@
, update-systemd-resolved
, pkcs11Support ? false
, pkcs11helper
, nixosTests
}:
let
inherit (lib) versionOlder optional optionals optionalString;
generic = { version, sha256, extraBuildInputs ? [] }:
generic = { version, sha256, extraBuildInputs ? [ ] }:
let
withIpRoute = stdenv.isLinux && (versionOlder version "2.5.4");
in
@ -32,8 +36,8 @@ let
nativeBuildInputs = [ pkg-config ];
buildInputs = [ lzo ]
++ optional stdenv.isLinux pam
buildInputs = [ lz4 lzo ]
++ optionals stdenv.isLinux [ libcap_ng libnl pam ]
++ optional withIpRoute iproute2
++ optional useSystemd systemd
++ optional pkcs11Support pkcs11helper
@ -72,9 +76,14 @@ let
in
{
openvpn = generic {
version = "2.5.8";
sha256 = "1cixqm4gn2d1v8qkbww75j30fzvxz13gc7whcmz54i0x4fvibwx6";
openvpn = (generic {
version = "2.6.8";
sha256 = "sha256-Xt4VZcim2IAQD38jUxen7p7qg9UFLbVUfxOp52r3gF0=";
extraBuildInputs = [ openssl ];
};
}).overrideAttrs
(_: {
passthru.tests = {
inherit (nixosTests) initrd-network-openvpn systemd-initrd-networkd-openvpn;
};
});
}