diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-05-06 02:25:50 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-05-06 02:25:50 +0000 |
commit | 19f4f86bfed21c5326ed2acebe1163f3a83e832b (patch) | |
tree | d59b9989ce55ed23693e80974d94c856f1c2c8b1 /test/test-network | |
parent | Initial commit. (diff) | |
download | systemd-upstream.tar.xz systemd-upstream.zip |
Adding upstream version 241.upstream/241upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to '')
103 files changed, 2335 insertions, 0 deletions
diff --git a/test/test-network/conf/10-dropin-test.netdev b/test/test-network/conf/10-dropin-test.netdev new file mode 100644 index 0000000..d85ea5b --- /dev/null +++ b/test/test-network/conf/10-dropin-test.netdev @@ -0,0 +1,4 @@ +[NetDev] +Name=hoge +Kind=dummy +MACAddress=00:50:56:c0:00:18 diff --git a/test/test-network/conf/10-dropin-test.netdev.d/mac.conf b/test/test-network/conf/10-dropin-test.netdev.d/mac.conf new file mode 100644 index 0000000..0b3f765 --- /dev/null +++ b/test/test-network/conf/10-dropin-test.netdev.d/mac.conf @@ -0,0 +1,2 @@ +[NetDev] +MACAddress=00:50:56:c0:00:28 diff --git a/test/test-network/conf/10-dropin-test.netdev.d/name.conf b/test/test-network/conf/10-dropin-test.netdev.d/name.conf new file mode 100644 index 0000000..9905932 --- /dev/null +++ b/test/test-network/conf/10-dropin-test.netdev.d/name.conf @@ -0,0 +1,2 @@ +[NetDev] +Name=dropin-test diff --git a/test/test-network/conf/11-dummy.netdev b/test/test-network/conf/11-dummy.netdev new file mode 100644 index 0000000..6797eb4 --- /dev/null +++ b/test/test-network/conf/11-dummy.netdev @@ -0,0 +1,3 @@ +[NetDev] +Name=test1 +Kind=dummy diff --git a/test/test-network/conf/12-dummy.netdev b/test/test-network/conf/12-dummy.netdev new file mode 100644 index 0000000..a7fdc0f --- /dev/null +++ b/test/test-network/conf/12-dummy.netdev @@ -0,0 +1,3 @@ +[NetDev] +Name=dummy98 +Kind=dummy diff --git a/test/test-network/conf/21-macvlan.netdev b/test/test-network/conf/21-macvlan.netdev new file mode 100644 index 0000000..e9a3c5b --- /dev/null +++ b/test/test-network/conf/21-macvlan.netdev @@ -0,0 +1,3 @@ +[NetDev] +Name=macvlan99 +Kind=macvlan diff --git a/test/test-network/conf/21-macvtap.netdev b/test/test-network/conf/21-macvtap.netdev new file mode 100644 index 0000000..2c23aac --- /dev/null +++ b/test/test-network/conf/21-macvtap.netdev @@ -0,0 +1,3 @@ +[NetDev] +Name=macvtap99 +Kind=macvtap diff --git a/test/test-network/conf/21-vlan.netdev b/test/test-network/conf/21-vlan.netdev new file mode 100644 index 0000000..af39404 --- /dev/null +++ b/test/test-network/conf/21-vlan.netdev @@ -0,0 +1,3 @@ +[NetDev] +Name=vlan99 +Kind=vlan diff --git a/test/test-network/conf/21-vlan.netdev.d/override.conf b/test/test-network/conf/21-vlan.netdev.d/override.conf new file mode 100644 index 0000000..cd61be5 --- /dev/null +++ b/test/test-network/conf/21-vlan.netdev.d/override.conf @@ -0,0 +1,6 @@ +[VLAN] +Id=99 +GVRP=true +MVRP=true +LooseBinding=true +ReorderHeader=true diff --git a/test/test-network/conf/21-vlan.network b/test/test-network/conf/21-vlan.network new file mode 100644 index 0000000..afe1deb --- /dev/null +++ b/test/test-network/conf/21-vlan.network @@ -0,0 +1,2 @@ +[Match] +Name=test1 diff --git a/test/test-network/conf/21-vlan.network.d/override.conf b/test/test-network/conf/21-vlan.network.d/override.conf new file mode 100644 index 0000000..363fc90 --- /dev/null +++ b/test/test-network/conf/21-vlan.network.d/override.conf @@ -0,0 +1,2 @@ +[Network] +VLAN=vlan99 diff --git a/test/test-network/conf/23-active-slave.network b/test/test-network/conf/23-active-slave.network new file mode 100644 index 0000000..59a6596 --- /dev/null +++ b/test/test-network/conf/23-active-slave.network @@ -0,0 +1,6 @@ +[Match] +Name=dummy98 + +[Network] +Bond=bond199 +ActiveSlave=true diff --git a/test/test-network/conf/23-bond199.network b/test/test-network/conf/23-bond199.network new file mode 100644 index 0000000..31e5d12 --- /dev/null +++ b/test/test-network/conf/23-bond199.network @@ -0,0 +1,2 @@ +[Match] +Name=bond199 diff --git a/test/test-network/conf/23-emit-lldp.network b/test/test-network/conf/23-emit-lldp.network new file mode 100644 index 0000000..de35045 --- /dev/null +++ b/test/test-network/conf/23-emit-lldp.network @@ -0,0 +1,5 @@ +[Match] +Name=veth-peer + +[Network] +EmitLLDP=yes diff --git a/test/test-network/conf/23-primary-slave.network b/test/test-network/conf/23-primary-slave.network new file mode 100644 index 0000000..380ae26 --- /dev/null +++ b/test/test-network/conf/23-primary-slave.network @@ -0,0 +1,6 @@ +[Match] +Name=dummy98 + +[Network] +Bond=bond199 +PrimarySlave=true diff --git a/test/test-network/conf/23-test1-bond199.network b/test/test-network/conf/23-test1-bond199.network new file mode 100644 index 0000000..6e7c28d --- /dev/null +++ b/test/test-network/conf/23-test1-bond199.network @@ -0,0 +1,6 @@ +[Match] +Name=test1 + +[Network] +Bond=bond199 +PrimarySlave=true diff --git a/test/test-network/conf/24-lldp.network b/test/test-network/conf/24-lldp.network new file mode 100644 index 0000000..fbdfb1b --- /dev/null +++ b/test/test-network/conf/24-lldp.network @@ -0,0 +1,5 @@ +[Match] +Name=veth99 + +[Network] +LLDP=yes diff --git a/test/test-network/conf/24-search-domain.network b/test/test-network/conf/24-search-domain.network new file mode 100644 index 0000000..124af43 --- /dev/null +++ b/test/test-network/conf/24-search-domain.network @@ -0,0 +1,7 @@ +[Match] +Name=dummy98 + +[Network] +Address=192.168.42.100/24 +DNS=192.168.42.1 +Domains= one two three four five six seven eight nine ten diff --git a/test/test-network/conf/25-6rd-tunnel.netdev b/test/test-network/conf/25-6rd-tunnel.netdev new file mode 100644 index 0000000..756becc --- /dev/null +++ b/test/test-network/conf/25-6rd-tunnel.netdev @@ -0,0 +1,7 @@ +[NetDev] +Name=sittun99 +Kind=sit + +[Tunnel] +Local=10.65.223.238 +IPv6RapidDeploymentPrefix=2602::/24 diff --git a/test/test-network/conf/25-address-link-section.network b/test/test-network/conf/25-address-link-section.network new file mode 100644 index 0000000..759e83c --- /dev/null +++ b/test/test-network/conf/25-address-link-section.network @@ -0,0 +1,5 @@ +[Match] +Name=dummy98 + +[Link] +MACAddress=00:01:02:aa:bb:cc diff --git a/test/test-network/conf/25-address-section-miscellaneous.network b/test/test-network/conf/25-address-section-miscellaneous.network new file mode 100644 index 0000000..3a37d03 --- /dev/null +++ b/test/test-network/conf/25-address-section-miscellaneous.network @@ -0,0 +1,10 @@ +[Match] +Name=dummy98 + +[Address] +Address=10.2.3.4/16 +PreferredLifetime=0 +Scope=link + +[Address] +Address=2001:0db8:0:f101::1/64 diff --git a/test/test-network/conf/25-address-section.network b/test/test-network/conf/25-address-section.network new file mode 100644 index 0000000..3904953 --- /dev/null +++ b/test/test-network/conf/25-address-section.network @@ -0,0 +1,18 @@ +[Match] +Name=dummy98 + +[Network] +IPv6AcceptRA=no + +[Address] +Address=10.2.3.4/16 +Peer=10.2.3.5/16 +Label=32 + +[Address] +Address=10.6.7.8/16 +Label=33 + +[Address] +Address=2001:db8::20 +Peer=2001:db8::10/128 diff --git a/test/test-network/conf/25-bond-active-backup-slave.netdev b/test/test-network/conf/25-bond-active-backup-slave.netdev new file mode 100644 index 0000000..1bbbf75 --- /dev/null +++ b/test/test-network/conf/25-bond-active-backup-slave.netdev @@ -0,0 +1,6 @@ +[NetDev] +Name=bond199 +Kind=bond + +[Bond] +Mode=active-backup diff --git a/test/test-network/conf/25-bond-balanced-tlb.netdev b/test/test-network/conf/25-bond-balanced-tlb.netdev new file mode 100644 index 0000000..439ddf2 --- /dev/null +++ b/test/test-network/conf/25-bond-balanced-tlb.netdev @@ -0,0 +1,7 @@ +[NetDev] +Name=bond99 +Kind=bond + +[Bond] +Mode=balance-tlb +DynamicTransmitLoadBalancing=true diff --git a/test/test-network/conf/25-bond.netdev b/test/test-network/conf/25-bond.netdev new file mode 100644 index 0000000..4e4885c --- /dev/null +++ b/test/test-network/conf/25-bond.netdev @@ -0,0 +1,18 @@ +[NetDev] +Name=bond99 +Kind=bond + +[Bond] +Mode=802.3ad +TransmitHashPolicy=layer3+4 +MIIMonitorSec=1s +LACPTransmitRate=fast +UpDelaySec=2s +DownDelaySec=2s +ResendIGMP=4 +MinLinks=1 +AdActorSystemPriority=1218 +AdUserPortKey=811 +AdActorSystem=00:11:22:33:44:55 +# feed the sanitizer +AdActorSystem=00:11:22:33:44:55 diff --git a/test/test-network/conf/25-bridge.netdev b/test/test-network/conf/25-bridge.netdev new file mode 100644 index 0000000..e23abd5 --- /dev/null +++ b/test/test-network/conf/25-bridge.netdev @@ -0,0 +1,13 @@ +[NetDev] +Name=bridge99 +Kind=bridge + +[Bridge] +HelloTimeSec=9 +MaxAgeSec=9 +ForwardDelaySec=9 +AgeingTimeSec=9 +Priority=9 +MulticastQuerier= true +MulticastSnooping=true +STP=true diff --git a/test/test-network/conf/25-erspan-tunnel.netdev b/test/test-network/conf/25-erspan-tunnel.netdev new file mode 100644 index 0000000..746b7ac --- /dev/null +++ b/test/test-network/conf/25-erspan-tunnel.netdev @@ -0,0 +1,11 @@ +[NetDev] +Name=erspan-test +Kind=erspan + +[Tunnel] +Independent=true +ERSPANIndex=123 +Local = 172.16.1.200 +Remote = 172.16.1.100 +Key=101 +SerializeTunneledPackets=true diff --git a/test/test-network/conf/25-fibrule-invert.network b/test/test-network/conf/25-fibrule-invert.network new file mode 100644 index 0000000..bcca0c2 --- /dev/null +++ b/test/test-network/conf/25-fibrule-invert.network @@ -0,0 +1,10 @@ +[Match] +Name=test1 + +[RoutingPolicyRule] +TypeOfService=0x08 +Table=7 +From= 192.168.100.18 +Priority=111 +IPProtocol = tcp +InvertRule=true diff --git a/test/test-network/conf/25-fibrule-port-range.network b/test/test-network/conf/25-fibrule-port-range.network new file mode 100644 index 0000000..36646ec --- /dev/null +++ b/test/test-network/conf/25-fibrule-port-range.network @@ -0,0 +1,11 @@ +[Match] +Name=test1 + +[RoutingPolicyRule] +TypeOfService=0x08 +Table=7 +From= 192.168.100.18 +Priority=111 +SourcePort = 1123-1150 +DestinationPort = 3224-3290 +IPProtocol = tcp diff --git a/test/test-network/conf/25-geneve.netdev b/test/test-network/conf/25-geneve.netdev new file mode 100644 index 0000000..279d713 --- /dev/null +++ b/test/test-network/conf/25-geneve.netdev @@ -0,0 +1,12 @@ +[NetDev] +Name=geneve99 +Kind=geneve + +[GENEVE] +Id=99 +Remote=192.168.22.1 +TTL=1 +UDPChecksum=true +UDP6ZeroChecksumTx=true +UDP6ZeroChecksumRx=true +DestinationPort=6082 diff --git a/test/test-network/conf/25-gre-tunnel.netdev b/test/test-network/conf/25-gre-tunnel.netdev new file mode 100644 index 0000000..94d9320 --- /dev/null +++ b/test/test-network/conf/25-gre-tunnel.netdev @@ -0,0 +1,7 @@ +[NetDev] +Name=gretun99 +Kind=gre + +[Tunnel] +Local=10.65.223.238 +Remote=10.65.223.239 diff --git a/test/test-network/conf/25-gretap-tunnel.netdev b/test/test-network/conf/25-gretap-tunnel.netdev new file mode 100644 index 0000000..769e765 --- /dev/null +++ b/test/test-network/conf/25-gretap-tunnel.netdev @@ -0,0 +1,7 @@ +[NetDev] +Name=gretap99 +Kind=gretap + +[Tunnel] +Local=10.65.223.238 +Remote=10.65.223.239 diff --git a/test/test-network/conf/25-ip6gre-tunnel.netdev b/test/test-network/conf/25-ip6gre-tunnel.netdev new file mode 100644 index 0000000..b16e0b4 --- /dev/null +++ b/test/test-network/conf/25-ip6gre-tunnel.netdev @@ -0,0 +1,7 @@ +[NetDev] +Name=ip6gretap99 +Kind=ip6gretap + +[Tunnel] +Local=2a00:ffde:4567:edde::4987 +Remote=2001:473:fece:cafe::5179 diff --git a/test/test-network/conf/25-ip6tnl-tunnel.netdev b/test/test-network/conf/25-ip6tnl-tunnel.netdev new file mode 100644 index 0000000..713e685 --- /dev/null +++ b/test/test-network/conf/25-ip6tnl-tunnel.netdev @@ -0,0 +1,8 @@ +[NetDev] +Name=ip6tnl99 +Kind=ip6tnl + +[Tunnel] +Mode=ip6ip6 +Local=2a00:ffde:4567:edde::4987 +Remote=2001:473:fece:cafe::5179 diff --git a/test/test-network/conf/25-ipip-tunnel-independent.netdev b/test/test-network/conf/25-ipip-tunnel-independent.netdev new file mode 100644 index 0000000..36ff8d9 --- /dev/null +++ b/test/test-network/conf/25-ipip-tunnel-independent.netdev @@ -0,0 +1,9 @@ +[NetDev] +Name=ipiptun99 +Kind=ipip +MTUBytes=1480 + +[Tunnel] +Local=192.168.223.238 +Remote=192.169.224.239 +Independent=true diff --git a/test/test-network/conf/25-ipip-tunnel.netdev b/test/test-network/conf/25-ipip-tunnel.netdev new file mode 100644 index 0000000..159ac72 --- /dev/null +++ b/test/test-network/conf/25-ipip-tunnel.netdev @@ -0,0 +1,8 @@ +[NetDev] +Name=ipiptun99 +Kind=ipip +MTUBytes=1480 + +[Tunnel] +Local=192.168.223.238 +Remote=192.169.224.239 diff --git a/test/test-network/conf/25-ipv6-address-label-section.network b/test/test-network/conf/25-ipv6-address-label-section.network new file mode 100644 index 0000000..945b7dc --- /dev/null +++ b/test/test-network/conf/25-ipv6-address-label-section.network @@ -0,0 +1,6 @@ +[Match] +Name=dummy98 + +[IPv6AddressLabel] +Label=4444 +Prefix=2004:da8:1:0::/64 diff --git a/test/test-network/conf/25-ipvlan.netdev b/test/test-network/conf/25-ipvlan.netdev new file mode 100644 index 0000000..9921b78 --- /dev/null +++ b/test/test-network/conf/25-ipvlan.netdev @@ -0,0 +1,6 @@ +[NetDev] +Name=ipvlan99 +Kind=ipvlan + +[IPVLAN] +Mode=L2 diff --git a/test/test-network/conf/25-isatap-tunnel.netdev b/test/test-network/conf/25-isatap-tunnel.netdev new file mode 100644 index 0000000..3aa882a --- /dev/null +++ b/test/test-network/conf/25-isatap-tunnel.netdev @@ -0,0 +1,8 @@ +[NetDev] +Name=isataptun99 +Kind=sit + +[Tunnel] +Local=10.65.223.238 +Remote=10.65.223.239 +ISATAP=true diff --git a/test/test-network/conf/25-link-local-addressing-no.network b/test/test-network/conf/25-link-local-addressing-no.network new file mode 100644 index 0000000..8320414 --- /dev/null +++ b/test/test-network/conf/25-link-local-addressing-no.network @@ -0,0 +1,5 @@ +[Match] +Name=dummy98 + +[Network] +LinkLocalAddressing=no diff --git a/test/test-network/conf/25-link-local-addressing-yes.network b/test/test-network/conf/25-link-local-addressing-yes.network new file mode 100644 index 0000000..dcf2f2f --- /dev/null +++ b/test/test-network/conf/25-link-local-addressing-yes.network @@ -0,0 +1,5 @@ +[Match] +Name=test1 + +[Network] +LinkLocalAddressing=yes diff --git a/test/test-network/conf/25-link-section-unmanaged.network b/test/test-network/conf/25-link-section-unmanaged.network new file mode 100644 index 0000000..4fe4916 --- /dev/null +++ b/test/test-network/conf/25-link-section-unmanaged.network @@ -0,0 +1,6 @@ +[Match] +Name=dummy98 + +[Link] +MACAddress=00:01:02:aa:bb:cc +Unmanaged=true diff --git a/test/test-network/conf/25-neighbor-section.network b/test/test-network/conf/25-neighbor-section.network new file mode 100644 index 0000000..d90802f --- /dev/null +++ b/test/test-network/conf/25-neighbor-section.network @@ -0,0 +1,10 @@ +[Match] +Name=dummy98 + +[Neighbor] +Address=192.168.10.1 +MACAddress=00:00:5e:00:02:65 + +[Neighbor] +Address=2004:da8:1:0::1 +MACAddress=00:00:5e:00:02:66 diff --git a/test/test-network/conf/25-route-gateway-on-link.network b/test/test-network/conf/25-route-gateway-on-link.network new file mode 100644 index 0000000..aa64c25 --- /dev/null +++ b/test/test-network/conf/25-route-gateway-on-link.network @@ -0,0 +1,13 @@ +[Match] +Name=dummy98 + +[Address] +Address=149.10.124.58/28 + +[Route] +Destination=149.10.124.64 +Scope=link + +[Route] +Gateway=149.10.125.65 +GatewayOnlink=true diff --git a/test/test-network/conf/25-route-gateway.network b/test/test-network/conf/25-route-gateway.network new file mode 100644 index 0000000..29d07f1 --- /dev/null +++ b/test/test-network/conf/25-route-gateway.network @@ -0,0 +1,14 @@ +# test for issue #5430 + +[Match] +Name=dummy98 + +[Address] +Address=149.10.124.58/28 + +[Route] +Destination=149.10.124.64 +Scope=link + +[Route] +Gateway=149.10.124.64 diff --git a/test/test-network/conf/25-route-ipv6-src.network b/test/test-network/conf/25-route-ipv6-src.network new file mode 100644 index 0000000..4e551c0 --- /dev/null +++ b/test/test-network/conf/25-route-ipv6-src.network @@ -0,0 +1,16 @@ +# This test cannot use a dummy interface: IPv6 addresses +# are added without having to go through tentative state + +[Match] +Name=bond199 + +[Network] +LinkLocalAddressing=ipv6 +Address=2001:1234:56:8f63::1/64 +Address=2001:1234:56:8f63::2/64 +IPv6AcceptRA=no + +[Route] +Destination=abcd::/16 +Gateway=2001:1234:56:8f63::1:1 +PreferredSource=2001:1234:56:8f63::2 diff --git a/test/test-network/conf/25-route-reverse-order.network b/test/test-network/conf/25-route-reverse-order.network new file mode 100644 index 0000000..d1b47ad --- /dev/null +++ b/test/test-network/conf/25-route-reverse-order.network @@ -0,0 +1,15 @@ +[Match] +Name=dummy98 + +[Network] +LinkLocalAddressing=ipv6 +Address=2001:1234:5:8f63::1/128 +IPv6AcceptRA=no + +[Route] +Destination=2001:1234:5:8fff:ff:ff:ff:ff/128 +Scope=link + +[Route] +Destination=::/0 +Gateway=2001:1234:5:8fff:ff:ff:ff:ff diff --git a/test/test-network/conf/25-route-section.network b/test/test-network/conf/25-route-section.network new file mode 100644 index 0000000..c9c7a72 --- /dev/null +++ b/test/test-network/conf/25-route-section.network @@ -0,0 +1,8 @@ +[Match] +Name=dummy98 + +[Network] +Address=192.168.0.15/24 + +[Route] +Gateway=192.168.0.1 diff --git a/test/test-network/conf/25-route-tcp-window-settings.network b/test/test-network/conf/25-route-tcp-window-settings.network new file mode 100644 index 0000000..e77a721 --- /dev/null +++ b/test/test-network/conf/25-route-tcp-window-settings.network @@ -0,0 +1,10 @@ +[Match] +Name=test1 + +[Route] +Destination=192.168.1.1 +InitialCongestionWindow=20 + +[Route] +Destination=192.168.1.2 +InitialAdvertisedReceiveWindow=30 diff --git a/test/test-network/conf/25-route-type.network b/test/test-network/conf/25-route-type.network new file mode 100644 index 0000000..9a10413 --- /dev/null +++ b/test/test-network/conf/25-route-type.network @@ -0,0 +1,14 @@ +[Match] +Name=dummy98 + +[Route] +Type=blackhole +Destination=202.54.1.2 + +[Route] +Type=unreachable +Destination=202.54.1.3 + +[Route] +Type=prohibit +Destination=202.54.1.4 diff --git a/test/test-network/conf/25-sit-tunnel.netdev b/test/test-network/conf/25-sit-tunnel.netdev new file mode 100644 index 0000000..406d74b --- /dev/null +++ b/test/test-network/conf/25-sit-tunnel.netdev @@ -0,0 +1,7 @@ +[NetDev] +Name=sittun99 +Kind=sit + +[Tunnel] +Local=10.65.223.238 +Remote=10.65.223.239 diff --git a/test/test-network/conf/25-sysctl.network b/test/test-network/conf/25-sysctl.network new file mode 100644 index 0000000..2452fb7 --- /dev/null +++ b/test/test-network/conf/25-sysctl.network @@ -0,0 +1,10 @@ +[Match] +Name=dummy98 + +[Network] +IPForward=true +IPv6PrivacyExtensions=true +IPv6DuplicateAddressDetection=3 +IPv6HopLimit=5 +IPv4ProxyARP=true +IPv6ProxyNDP=true diff --git a/test/test-network/conf/25-tap.netdev b/test/test-network/conf/25-tap.netdev new file mode 100644 index 0000000..bf5e7fe --- /dev/null +++ b/test/test-network/conf/25-tap.netdev @@ -0,0 +1,7 @@ +[NetDev] +Name=tap99 +Kind=tap + +[Tap] +MultiQueue=true +PacketInfo=true diff --git a/test/test-network/conf/25-tun.netdev b/test/test-network/conf/25-tun.netdev new file mode 100644 index 0000000..380ab21 --- /dev/null +++ b/test/test-network/conf/25-tun.netdev @@ -0,0 +1,7 @@ +[NetDev] +Name=tun99 +Kind=tun + +[Tun] +MultiQueue=true +PacketInfo=true diff --git a/test/test-network/conf/25-vcan.netdev b/test/test-network/conf/25-vcan.netdev new file mode 100644 index 0000000..ff19795 --- /dev/null +++ b/test/test-network/conf/25-vcan.netdev @@ -0,0 +1,3 @@ +[NetDev] +Name=vcan99 +Kind=vcan diff --git a/test/test-network/conf/25-veth.netdev b/test/test-network/conf/25-veth.netdev new file mode 100644 index 0000000..9ae4ad5 --- /dev/null +++ b/test/test-network/conf/25-veth.netdev @@ -0,0 +1,8 @@ +[NetDev] +Name=veth99 +Kind=veth +MACAddress=12:34:56:78:9a:bc + +[Peer] +Name=veth-peer +MACAddress=12:34:56:78:9a:bd diff --git a/test/test-network/conf/25-vrf.netdev b/test/test-network/conf/25-vrf.netdev new file mode 100644 index 0000000..bf949ec --- /dev/null +++ b/test/test-network/conf/25-vrf.netdev @@ -0,0 +1,6 @@ +[NetDev] +Name=vrf99 +Kind=vrf + +[VRF] +TableId=42 diff --git a/test/test-network/conf/25-vti-tunnel.netdev b/test/test-network/conf/25-vti-tunnel.netdev new file mode 100644 index 0000000..cec6259 --- /dev/null +++ b/test/test-network/conf/25-vti-tunnel.netdev @@ -0,0 +1,7 @@ +[NetDev] +Name=vtitun99 +Kind=vti + +[Tunnel] +Local=10.65.223.238 +Remote=10.65.223.239 diff --git a/test/test-network/conf/25-vti6-tunnel.netdev b/test/test-network/conf/25-vti6-tunnel.netdev new file mode 100644 index 0000000..d150c9c --- /dev/null +++ b/test/test-network/conf/25-vti6-tunnel.netdev @@ -0,0 +1,7 @@ +[NetDev] +Name=vti6tun99 +Kind=vti6 + +[Tunnel] +Local=2a00:ffde:4567:edde::4987 +Remote=2001:473:fece:cafe::5179 diff --git a/test/test-network/conf/25-vxlan.netdev b/test/test-network/conf/25-vxlan.netdev new file mode 100644 index 0000000..819a583 --- /dev/null +++ b/test/test-network/conf/25-vxlan.netdev @@ -0,0 +1,16 @@ +[NetDev] +Name=vxlan99 +Kind=vxlan + +[VXLAN] +Id=999 +L2MissNotification=true +L3MissNotification=true +RouteShortCircuit=true +UDPChecksum=true +UDP6ZeroChecksumTx=true +UDP6ZeroChecksumRx=true +RemoteChecksumTx=true +RemoteChecksumRx=true +GroupPolicyExtension=true +DestinationPort=5555 diff --git a/test/test-network/conf/25-wireguard-23-peers.netdev b/test/test-network/conf/25-wireguard-23-peers.netdev new file mode 100644 index 0000000..7f77dc1 --- /dev/null +++ b/test/test-network/conf/25-wireguard-23-peers.netdev @@ -0,0 +1,148 @@ +[NetDev] +Name=wg98 +Kind=wireguard +Description=For issue #11404 +# Generated by the script https://launchpadlibrarian.net/405947185/systemd-wg + +[WireGuard] +# 51820 is common port for Wireguard, 4500 is IPSec/UDP +ListenPort=4500 +PrivateKey=CJQUtcS9emY2fLYqDlpSZiE/QJyHkPWr+WHtZLZ90FU= + +# peer 1 +[WireGuardPeer] +PublicKey=TxVmU/YJ2R3G3cbGKUiIx02y6CgcKlElVGAkzrwJuXg= +AllowedIPs=fd8d:4d6d:3ccb:0500:0c79:2339:edce:ece1/128 +AllowedIPs=fd8d:4d6d:3ccb:0c79:2339:edce::/96 + +# peer 2 +[WireGuardPeer] +PublicKey=coGr5lLn1RsCeh1RWBXn1GvcDqKSQ82HSeN0GrUugHg= +AllowedIPs=fd8d:4d6d:3ccb:0500:a072:80da:de4f:add1/128 +AllowedIPs=fd8d:4d6d:3ccb:a072:80da:de4f::/96 + +# peer 3 +[WireGuardPeer] +PublicKey=PeiULTZjyfjqg/OOqnzKtLSWnrU+ipinqMsMw0hY+1w= +AllowedIPs=fd8d:4d6d:3ccb:0500:f349:c4f0:10c1:06b4/128 +AllowedIPs=fd8d:4d6d:3ccb:f349:c4f0:10c1::/96 + +# peer 4 +[WireGuardPeer] +PublicKey=PjdC8+BmQPdgheY7gle9s3gvM7r07L6A+gMBe5bOZXk= +AllowedIPs=fd8d:4d6d:3ccb:0500:b684:4f81:2e3e:132e/128 +AllowedIPs=fd8d:4d6d:3ccb:b684:4f81:2e3e::/96 + +# peer 5 +[WireGuardPeer] +PublicKey=1MGQurlRaQIAgdH/sd0qDNamDKAepMy/+pzZUx9oEDI= +AllowedIPs=fd8d:4d6d:3ccb:0500:c624:6bf7:4c09:3b59/128 +AllowedIPs=fd8d:4d6d:3ccb:c624:6bf7:4c09::/96 + +# peer 6 +[WireGuardPeer] +PublicKey=+FgzhoGfPIzNBvtIZfBwNtWls2FSGt/6Kve3M9Z1ZlE= +AllowedIPs=fd8d:4d6d:3ccb:0500:9c11:d820:2e96:9be0/128 +AllowedIPs=fd8d:4d6d:3ccb:9c11:d820:2e96::/96 + +# peer 7 +[WireGuardPeer] +PublicKey=Kb2ozFhzg9huKmV4miLlWgh05ToP+xVqd2N0e7Ebmyc= +AllowedIPs=fd8d:4d6d:3ccb:0500:bad5:495d:8e9c:3427/128 +AllowedIPs=fd8d:4d6d:3ccb:bad5:495d:8e9c::/96 + +# peer 8 +[WireGuardPeer] +PublicKey=p2kY786d4vFO/PpstaQrn7UPuakoHRABUHmcDKzXVi4= +AllowedIPs=fd8d:4d6d:3ccb:0500:1e54:1415:35d0:a47c/128 +AllowedIPs=fd8d:4d6d:3ccb:1e54:1415:35d0::/96 + +# peer 9 +[WireGuardPeer] +PublicKey=FNiQqmeizNXTmd9jEU/gvNkuEs1MoWovNp8IpPkoqz4= +AllowedIPs=fd8d:4d6d:3ccb:0500:1dbf:ca8a:32d3:dd81/128 +AllowedIPs=fd8d:4d6d:3ccb:1dbf:ca8a:32d3::/96 + +# peer 10 +[WireGuardPeer] +PublicKey=wAwyAuLSQTO7lwQnUQHTumrMgkwigIExGR26AthWTU8= +AllowedIPs=fd8d:4d6d:3ccb:0500:dcdd:d33b:90c9:6088/128 +AllowedIPs=fd8d:4d6d:3ccb:dcdd:d33b:90c9::/96 + +# peer 11 +[WireGuardPeer] +PublicKey=8gRYdXRyhgjiMSbqk3sj5kzXGsQqkZ4defvK2ONqHA0= +AllowedIPs=fd8d:4d6d:3ccb:0500:6f2e:6888:c6fd:dfb9/128 +AllowedIPs=fd8d:4d6d:3ccb:6f2e:6888:c6fd::/96 + +# peer 12 +[WireGuardPeer] +PublicKey=4Bj9Dalwnq2Trf5Bl7iJCpSOaxC83YEbxgrgBl0ljQk= +AllowedIPs=fd8d:4d6d:3ccb:0500:d4f9:05dc:9296:0a1a/128 +AllowedIPs=fd8d:4d6d:3ccb:d4f9:05dc:9296::/96 + +# peer 13 +[WireGuardPeer] +PublicKey=BOTxUDlPSIzYucVmML4IYcTIaX0TiqC7DOnfLUI7RRg= +AllowedIPs=fd8d:4d6d:3ccb:0500:b39c:9cdc:755a:ead3/128 +AllowedIPs=fd8d:4d6d:3ccb:b39c:9cdc:755a::/96 + +# peer 14 +[WireGuardPeer] +PublicKey=PiqEvBzow5vElGD2uOtRtZG6G60tM82kmjbyJP02mFQ= +AllowedIPs=fd8d:4d6d:3ccb:0500:bfe5:c3c3:5d77:0fcb/128 +AllowedIPs=fd8d:4d6d:3ccb:bfe5:c3c3:5d77::/96 + +# peer 15 +[WireGuardPeer] +PublicKey=Eor9QBsIoUG6C3ZKsKdqm4Vkt0n2N7qpSh2LzphQeho= +AllowedIPs=fd8d:4d6d:3ccb:0500:900c:d437:ec27:8822/128 +AllowedIPs=fd8d:4d6d:3ccb:900c:d437:ec27::/96 + +# peer 16 +[WireGuardPeer] +PublicKey=acXPW0Ar+TiTOqKuUDpop9AVLuPNdzqf0l+V8k5t7CM= +AllowedIPs=fd8d:4d6d:3ccb:0500:270d:b5dd:4a3f:8909/128 +AllowedIPs=fd8d:4d6d:3ccb:270d:b5dd:4a3f::/96 + +# peer 17 +[WireGuardPeer] +PublicKey=+0g/5jzbitHyfhB4gbJnWrhSMsSjCcOE2rftWTDEW3E= +AllowedIPs=fd8d:4d6d:3ccb:0500:e2e1:ae15:103f:f376/128 +AllowedIPs=fd8d:4d6d:3ccb:e2e1:ae15:103f::/96 + +# peer 18 +[WireGuardPeer] +PublicKey=FC7mjuWpkM8bjM3vaLPbba2HwHGbTSDK9QsLEZvUZ2I= +AllowedIPs=fd8d:4d6d:3ccb:0500:5660:679d:3532:94d8/128 +AllowedIPs=fd8d:4d6d:3ccb:5660:679d:3532::/96 + +# peer 19 +[WireGuardPeer] +PublicKey=fRdm/tbE2jGuLd6zMxSQYMP6pPfMmXYW84TUPJCPjHM= +AllowedIPs=fd8d:4d6d:3ccb:0500:6825:573f:30f3:9472/128 +AllowedIPs=fd8d:4d6d:3ccb:6825:573f:30f3::/96 + +# peer 20 +[WireGuardPeer] +PublicKey=xm540z0UwfTF5f0YwfjmCX0eGdHY8bOb/4ovVA2SgCI= +AllowedIPs=fd8d:4d6d:3ccb:0500:a94b:cd6a:a32d:90e6/128 +AllowedIPs=fd8d:4d6d:3ccb:a94b:cd6a:a32d::/96 + +# peer 21 +[WireGuardPeer] +PublicKey=5X5+9IiRBjaadazEKNO+CozpomiKPMIBQT7uJ4SnbVs= +AllowedIPs=fd8d:4d6d:3ccb:0500:8d4d:0bab:7280:a09a/128 +AllowedIPs=fd8d:4d6d:3ccb:8d4d:0bab:7280::/96 + +# peer 22 +[WireGuardPeer] +PublicKey=d61T4K0wmS4Z3lK9M8/Z48IXzldLCOCm7a6Mx1r/A3I= +AllowedIPs=fd8d:4d6d:3ccb:0500:a3f3:df38:19b0:0721/128 +AllowedIPs=fd8d:4d6d:3ccb:a3f3:df38:19b0::/96 + +# peer 23 +[WireGuardPeer] +PublicKey=Nt7N3hXfpMWsIsx9me4ID77okka+0Oe5eqnFDp00IFI= +AllowedIPs=fd8d:4d6d:3ccb:0500:9742:9931:5217:18d5/128 +AllowedIPs=fd8d:4d6d:3ccb:9742:9931:5217::/96 diff --git a/test/test-network/conf/25-wireguard-23-peers.network b/test/test-network/conf/25-wireguard-23-peers.network new file mode 100644 index 0000000..4dc87f8 --- /dev/null +++ b/test/test-network/conf/25-wireguard-23-peers.network @@ -0,0 +1,97 @@ +[Match] +Name=wg98 + +[Network] +Address=fd8d:4d6d:3ccb:0500::1/64 + +# nat64 via 1 +[Route] +Destination = fd8d:4d6d:3ccb:0c79:2339:edce::/96 + +# nat64 via 2 +[Route] +Destination = fd8d:4d6d:3ccb:a072:80da:de4f::/96 + +# nat64 via 3 +[Route] +Destination = fd8d:4d6d:3ccb:f349:c4f0:10c1::/96 + +# nat64 via 4 +[Route] +Destination = fd8d:4d6d:3ccb:b684:4f81:2e3e::/96 + +# nat64 via 5 +[Route] +Destination = fd8d:4d6d:3ccb:c624:6bf7:4c09::/96 + +# nat64 via 6 +[Route] +Destination = fd8d:4d6d:3ccb:9c11:d820:2e96::/96 + +# nat64 via 7 +[Route] +Destination = fd8d:4d6d:3ccb:bad5:495d:8e9c::/96 + +# nat64 via 8 +[Route] +Destination = fd8d:4d6d:3ccb:1e54:1415:35d0::/96 + +# nat64 via 9 +[Route] +Destination = fd8d:4d6d:3ccb:1dbf:ca8a:32d3::/96 + +# nat64 via 10 +[Route] +Destination = fd8d:4d6d:3ccb:dcdd:d33b:90c9::/96 + +# nat64 via 11 +[Route] +Destination = fd8d:4d6d:3ccb:6f2e:6888:c6fd::/96 + +# nat64 via 12 +[Route] +Destination = fd8d:4d6d:3ccb:d4f9:05dc:9296::/96 + +# nat64 via 13 +[Route] +Destination = fd8d:4d6d:3ccb:b39c:9cdc:755a::/96 + +# nat64 via 14 +[Route] +Destination = fd8d:4d6d:3ccb:bfe5:c3c3:5d77::/96 + +# nat64 via 15 +[Route] +Destination = fd8d:4d6d:3ccb:900c:d437:ec27::/96 + +# nat64 via 16 +[Route] +Destination = fd8d:4d6d:3ccb:270d:b5dd:4a3f::/96 + +# nat64 via 17 +[Route] +Destination = fd8d:4d6d:3ccb:e2e1:ae15:103f::/96 + +# nat64 via 18 +[Route] +Destination = fd8d:4d6d:3ccb:5660:679d:3532::/96 + +# nat64 via 19 +[Route] +Destination = fd8d:4d6d:3ccb:6825:573f:30f3::/96 + +# nat64 via 20 +[Route] +Destination = fd8d:4d6d:3ccb:a94b:cd6a:a32d::/96 + +# nat64 via 21 +[Route] +Destination = fd8d:4d6d:3ccb:8d4d:0bab:7280::/96 + +# nat64 via 22 +[Route] +Destination = fd8d:4d6d:3ccb:a3f3:df38:19b0::/96 + +# nat64 via 23 +[Route] +Destination = fd8d:4d6d:3ccb:9742:9931:5217::/96 diff --git a/test/test-network/conf/25-wireguard.netdev b/test/test-network/conf/25-wireguard.netdev new file mode 100644 index 0000000..4866c31 --- /dev/null +++ b/test/test-network/conf/25-wireguard.netdev @@ -0,0 +1,16 @@ +[NetDev] +Name=wg99 +Kind=wireguard + +[WireGuard] +PrivateKey=EEGlnEPYJV//kbvvIqxKkQwOiS+UENyPncC4bF46ong= +ListenPort=51820 +FwMark=1234 + +[WireGuardPeer] +PublicKey=RDf+LSpeEre7YEIKaxg+wbpsNV7du+ktR99uBEtIiCA= +AllowedIPs=fd31:bf08:57cb::/48,192.168.26.0/24 +#Endpoint=wireguard.example.com:51820 +Endpoint=192.168.27.3:51820 +PresharedKey=IIWIV17wutHv7t4cR6pOT91z6NSz/T8Arh0yaywhw3M= +PersistentKeepalive=20 diff --git a/test/test-network/conf/26-bridge-slave-interface-1.network b/test/test-network/conf/26-bridge-slave-interface-1.network new file mode 100644 index 0000000..81b372f --- /dev/null +++ b/test/test-network/conf/26-bridge-slave-interface-1.network @@ -0,0 +1,12 @@ +[Match] +Name=dummy98 + +[Network] +Bridge=bridge99 + +[Bridge] +Cost=400 +HairPin = true +FastLeave = true +UnicastFlood = true +MulticastToUnicast = true diff --git a/test/test-network/conf/26-bridge-slave-interface-2.network b/test/test-network/conf/26-bridge-slave-interface-2.network new file mode 100644 index 0000000..45ec2de --- /dev/null +++ b/test/test-network/conf/26-bridge-slave-interface-2.network @@ -0,0 +1,5 @@ +[Match] +Name=test1 + +[Network] +Bridge=bridge99 diff --git a/test/test-network/conf/26-bridge.netdev b/test/test-network/conf/26-bridge.netdev new file mode 100644 index 0000000..9b31e06 --- /dev/null +++ b/test/test-network/conf/26-bridge.netdev @@ -0,0 +1,3 @@ +[NetDev] +Name=bridge99 +Kind=bridge diff --git a/test/test-network/conf/6rd.network b/test/test-network/conf/6rd.network new file mode 100644 index 0000000..84e5af0 --- /dev/null +++ b/test/test-network/conf/6rd.network @@ -0,0 +1,5 @@ +[Match] +Name=dummy98 + +[Network] +Tunnel=sittun99 diff --git a/test/test-network/conf/bridge99.network b/test/test-network/conf/bridge99.network new file mode 100644 index 0000000..39e48ce --- /dev/null +++ b/test/test-network/conf/bridge99.network @@ -0,0 +1,6 @@ +[Match] +Name=bridge99 + +[Network] +Address=192.168.0.15/24 +Gateway=192.168.0.1 diff --git a/test/test-network/conf/configure-without-carrier.network b/test/test-network/conf/configure-without-carrier.network new file mode 100644 index 0000000..5bd9d7e --- /dev/null +++ b/test/test-network/conf/configure-without-carrier.network @@ -0,0 +1,7 @@ +[Match] +Name=test1 + +[Network] +Address=192.168.0.15/24 +Gateway=192.168.0.1 +ConfigureWithoutCarrier=true diff --git a/test/test-network/conf/dhcp-client-anonymize.network b/test/test-network/conf/dhcp-client-anonymize.network new file mode 100644 index 0000000..a910cba --- /dev/null +++ b/test/test-network/conf/dhcp-client-anonymize.network @@ -0,0 +1,16 @@ +[Match] +Name=veth99 + +[Network] +DHCP=ipv4 +IPv6AcceptRA=false + +[DHCP] +Anonymize=true +UseMTU=true +UseRoutes=true +SendHostname=true +UseHostname=true +Hostname=test-hostname +ClientIdentifier=mac +VendorClassIdentifier=SusantVendorTest diff --git a/test/test-network/conf/dhcp-client-critical-connection.network b/test/test-network/conf/dhcp-client-critical-connection.network new file mode 100644 index 0000000..0e65dec --- /dev/null +++ b/test/test-network/conf/dhcp-client-critical-connection.network @@ -0,0 +1,9 @@ +[Match] +Name=veth99 + +[Network] +DHCP=ipv4 +IPv6AcceptRA=false + +[DHCP] +CriticalConnection=true diff --git a/test/test-network/conf/dhcp-client-ipv4-dhcp-settings.network b/test/test-network/conf/dhcp-client-ipv4-dhcp-settings.network new file mode 100644 index 0000000..5c4ca22 --- /dev/null +++ b/test/test-network/conf/dhcp-client-ipv4-dhcp-settings.network @@ -0,0 +1,15 @@ +[Match] +Name=veth99 + +[Network] +DHCP=ipv4 +IPv6AcceptRA=false + +[DHCP] +UseMTU=true +UseRoutes=true +SendHostname=true +UseHostname=true +Hostname=test-hostname +ClientIdentifier=mac +VendorClassIdentifier=SusantVendorTest diff --git a/test/test-network/conf/dhcp-client-ipv4-only-ipv6-disabled.network b/test/test-network/conf/dhcp-client-ipv4-only-ipv6-disabled.network new file mode 100644 index 0000000..c980bf9 --- /dev/null +++ b/test/test-network/conf/dhcp-client-ipv4-only-ipv6-disabled.network @@ -0,0 +1,6 @@ +[Match] +Name=veth99 + +[Network] +DHCP=ipv4 +IPv6AcceptRA=false diff --git a/test/test-network/conf/dhcp-client-ipv4-only.network b/test/test-network/conf/dhcp-client-ipv4-only.network new file mode 100644 index 0000000..9bc019a --- /dev/null +++ b/test/test-network/conf/dhcp-client-ipv4-only.network @@ -0,0 +1,5 @@ +[Match] +Name=veth99 + +[Network] +DHCP=ipv4 diff --git a/test/test-network/conf/dhcp-client-ipv6-only.network b/test/test-network/conf/dhcp-client-ipv6-only.network new file mode 100644 index 0000000..1f70c3b --- /dev/null +++ b/test/test-network/conf/dhcp-client-ipv6-only.network @@ -0,0 +1,5 @@ +[Match] +Name=veth99 + +[Network] +DHCP=ipv6 diff --git a/test/test-network/conf/dhcp-client-ipv6-rapid-commit.network b/test/test-network/conf/dhcp-client-ipv6-rapid-commit.network new file mode 100644 index 0000000..52fa587 --- /dev/null +++ b/test/test-network/conf/dhcp-client-ipv6-rapid-commit.network @@ -0,0 +1,8 @@ +[Match] +Name=veth99 + +[Network] +DHCP=ipv6 + +[DHCP] +RapidCommit=false diff --git a/test/test-network/conf/dhcp-client-listen-port.network b/test/test-network/conf/dhcp-client-listen-port.network new file mode 100644 index 0000000..73ac364 --- /dev/null +++ b/test/test-network/conf/dhcp-client-listen-port.network @@ -0,0 +1,8 @@ +[Match] +Name=veth99 + +[Network] +DHCP=yes + +[DHCP] +ListenPort=5555 diff --git a/test/test-network/conf/dhcp-client-route-metric.network b/test/test-network/conf/dhcp-client-route-metric.network new file mode 100644 index 0000000..aa04aae --- /dev/null +++ b/test/test-network/conf/dhcp-client-route-metric.network @@ -0,0 +1,10 @@ +[Match] +Name=veth99 + +[Network] +DHCP=ipv4 +IPv6AcceptRA=false + +[DHCP] +UseRoutes=true +RouteMetric=24 diff --git a/test/test-network/conf/dhcp-client-route-table.network b/test/test-network/conf/dhcp-client-route-table.network new file mode 100644 index 0000000..75f16aa --- /dev/null +++ b/test/test-network/conf/dhcp-client-route-table.network @@ -0,0 +1,10 @@ +[Match] +Name=veth99 + +[Network] +DHCP=ipv4 +IPv6AcceptRA=false + +[DHCP] +UseRoutes=true +RouteTable=12 diff --git a/test/test-network/conf/dhcp-client-timezone-router.network b/test/test-network/conf/dhcp-client-timezone-router.network new file mode 100644 index 0000000..23e0464 --- /dev/null +++ b/test/test-network/conf/dhcp-client-timezone-router.network @@ -0,0 +1,10 @@ +[Match] +Name=veth99 + +[Network] +IPv6AcceptRA=false +DHCP=ipv4 + +[DHCP] +UseRoutes=true +UseTimezone=true diff --git a/test/test-network/conf/dhcp-client.network b/test/test-network/conf/dhcp-client.network new file mode 100644 index 0000000..5629bc4 --- /dev/null +++ b/test/test-network/conf/dhcp-client.network @@ -0,0 +1,5 @@ +[Match] +Name=veth99 + +[Network] +DHCP=yes diff --git a/test/test-network/conf/dhcp-server-timezone-router.network b/test/test-network/conf/dhcp-server-timezone-router.network new file mode 100644 index 0000000..3ebbf05 --- /dev/null +++ b/test/test-network/conf/dhcp-server-timezone-router.network @@ -0,0 +1,13 @@ +[Match] +Name=veth-peer + +[Network] +IPv6AcceptRA=false +Address=192.168.5.1/24 +DHCPServer=yes + +[DHCPServer] +PoolOffset=10 +PoolSize=50 +EmitRouter=yes +Timezone=Europe/Berlin diff --git a/test/test-network/conf/dhcp-server-veth-peer.network b/test/test-network/conf/dhcp-server-veth-peer.network new file mode 100644 index 0000000..33d8be3 --- /dev/null +++ b/test/test-network/conf/dhcp-server-veth-peer.network @@ -0,0 +1,6 @@ +[Match] +Name=veth-peer + +[Network] +Address=2600::1/0 +Address=192.168.5.1/24 diff --git a/test/test-network/conf/dhcp-server.network b/test/test-network/conf/dhcp-server.network new file mode 100644 index 0000000..9e49691 --- /dev/null +++ b/test/test-network/conf/dhcp-server.network @@ -0,0 +1,12 @@ +[Match] +Name=veth-peer + +[Network] +Address=192.168.5.1/24 +DHCPServer=yes + +[DHCPServer] +PoolOffset=10 +PoolSize=50 +DNS=192.168.5.1 +NTP=192.168.5.1 diff --git a/test/test-network/conf/dhcp-v4-server-veth-peer.network b/test/test-network/conf/dhcp-v4-server-veth-peer.network new file mode 100644 index 0000000..3dfc529 --- /dev/null +++ b/test/test-network/conf/dhcp-v4-server-veth-peer.network @@ -0,0 +1,6 @@ +[Match] +Name=veth-peer + +[Network] +Address=192.168.0.1/24 +Address=192.168.5.1/24 diff --git a/test/test-network/conf/gretap.network b/test/test-network/conf/gretap.network new file mode 100644 index 0000000..88b9250 --- /dev/null +++ b/test/test-network/conf/gretap.network @@ -0,0 +1,5 @@ +[Match] +Name=dummy98 + +[Network] +Tunnel=gretap99 diff --git a/test/test-network/conf/gretun.network b/test/test-network/conf/gretun.network new file mode 100644 index 0000000..376074c --- /dev/null +++ b/test/test-network/conf/gretun.network @@ -0,0 +1,5 @@ +[Match] +Name=dummy98 + +[Network] +Tunnel=gretun99 diff --git a/test/test-network/conf/ip6gretap.network b/test/test-network/conf/ip6gretap.network new file mode 100644 index 0000000..cad0bae --- /dev/null +++ b/test/test-network/conf/ip6gretap.network @@ -0,0 +1,5 @@ +[Match] +Name=dummy98 + +[Network] +Tunnel=ip6gretap99 diff --git a/test/test-network/conf/ip6tnl.network b/test/test-network/conf/ip6tnl.network new file mode 100644 index 0000000..41e3448 --- /dev/null +++ b/test/test-network/conf/ip6tnl.network @@ -0,0 +1,5 @@ +[Match] +Name=dummy98 + +[Network] +Tunnel=ip6tnl99 diff --git a/test/test-network/conf/ipip.network b/test/test-network/conf/ipip.network new file mode 100644 index 0000000..4ce6714 --- /dev/null +++ b/test/test-network/conf/ipip.network @@ -0,0 +1,5 @@ +[Match] +Name=dummy98 + +[Network] +Tunnel=ipiptun99 diff --git a/test/test-network/conf/ipv6-prefix-veth.network b/test/test-network/conf/ipv6-prefix-veth.network new file mode 100644 index 0000000..3d2acec --- /dev/null +++ b/test/test-network/conf/ipv6-prefix-veth.network @@ -0,0 +1,5 @@ +[Match] +Name=veth99 + +[Network] +IPv6AcceptRA=true diff --git a/test/test-network/conf/ipv6-prefix.network b/test/test-network/conf/ipv6-prefix.network new file mode 100644 index 0000000..c1932a8 --- /dev/null +++ b/test/test-network/conf/ipv6-prefix.network @@ -0,0 +1,10 @@ +[Match] +Name=veth-peer + +[Network] +IPv6PrefixDelegation=yes + +[IPv6Prefix] +Prefix=2002:da8:1:0::/64 +PreferredLifetimeSec=1000s +ValidLifetimeSec=2100s diff --git a/test/test-network/conf/ipvlan.network b/test/test-network/conf/ipvlan.network new file mode 100644 index 0000000..d053220 --- /dev/null +++ b/test/test-network/conf/ipvlan.network @@ -0,0 +1,5 @@ +[Match] +Name=test1 + +[Network] +IPVLAN=ipvlan99 diff --git a/test/test-network/conf/isatap.network b/test/test-network/conf/isatap.network new file mode 100644 index 0000000..e8d03ed --- /dev/null +++ b/test/test-network/conf/isatap.network @@ -0,0 +1,5 @@ +[Match] +Name=dummy98 + +[Network] +Tunnel=isataptun99 diff --git a/test/test-network/conf/macvlan.network b/test/test-network/conf/macvlan.network new file mode 100644 index 0000000..a41c1f9 --- /dev/null +++ b/test/test-network/conf/macvlan.network @@ -0,0 +1,5 @@ +[Match] +Name=test1 + +[Network] +MACVLAN=macvlan99 diff --git a/test/test-network/conf/macvtap.network b/test/test-network/conf/macvtap.network new file mode 100644 index 0000000..6ee99ab --- /dev/null +++ b/test/test-network/conf/macvtap.network @@ -0,0 +1,5 @@ +[Match] +Name=test1 + +[Network] +MACVTAP=macvtap99 diff --git a/test/test-network/conf/routing-policy-rule.network b/test/test-network/conf/routing-policy-rule.network new file mode 100644 index 0000000..46b87c5 --- /dev/null +++ b/test/test-network/conf/routing-policy-rule.network @@ -0,0 +1,10 @@ +[Match] +Name=test1 + +[RoutingPolicyRule] +TypeOfService=0x08 +Table=7 +From= 192.168.100.18 +Priority=111 +IncomingInterface=test1 +OutgoingInterface=test1 diff --git a/test/test-network/conf/sit.network b/test/test-network/conf/sit.network new file mode 100644 index 0000000..84e5af0 --- /dev/null +++ b/test/test-network/conf/sit.network @@ -0,0 +1,5 @@ +[Match] +Name=dummy98 + +[Network] +Tunnel=sittun99 diff --git a/test/test-network/conf/test-static.network b/test/test-network/conf/test-static.network new file mode 100644 index 0000000..636c55c --- /dev/null +++ b/test/test-network/conf/test-static.network @@ -0,0 +1,6 @@ +[Match] +Name=dummy98 + +[Network] +Address=192.168.0.15/24 +Gateway=192.168.0.1 diff --git a/test/test-network/conf/vti.network b/test/test-network/conf/vti.network new file mode 100644 index 0000000..7fbad6a --- /dev/null +++ b/test/test-network/conf/vti.network @@ -0,0 +1,5 @@ +[Match] +Name=dummy98 + +[Network] +Tunnel=vtitun99 diff --git a/test/test-network/conf/vti6.network b/test/test-network/conf/vti6.network new file mode 100644 index 0000000..49a9d11 --- /dev/null +++ b/test/test-network/conf/vti6.network @@ -0,0 +1,5 @@ +[Match] +Name=dummy98 + +[Network] +Tunnel=vti6tun99 diff --git a/test/test-network/conf/vxlan.network b/test/test-network/conf/vxlan.network new file mode 100644 index 0000000..80b4055 --- /dev/null +++ b/test/test-network/conf/vxlan.network @@ -0,0 +1,5 @@ +[Match] +Name=test1 + +[Network] +VXLAN=vxlan99 diff --git a/test/test-network/systemd-networkd-tests.py b/test/test-network/systemd-networkd-tests.py new file mode 100755 index 0000000..1fc7094 --- /dev/null +++ b/test/test-network/systemd-networkd-tests.py @@ -0,0 +1,1338 @@ +#!/usr/bin/env python3 +# SPDX-License-Identifier: LGPL-2.1+ +# systemd-networkd tests + +import os +import re +import shutil +import signal +import socket +import subprocess +import sys +import time +import unittest +from shutil import copytree + +network_unit_file_path='/run/systemd/network' +networkd_runtime_directory='/run/systemd/netif' +networkd_ci_path='/run/networkd-ci' +network_sysctl_ipv6_path='/proc/sys/net/ipv6/conf' +network_sysctl_ipv4_path='/proc/sys/net/ipv4/conf' + +dnsmasq_pid_file='/run/networkd-ci/test-test-dnsmasq.pid' +dnsmasq_log_file='/run/networkd-ci/test-dnsmasq-log-file' + +def is_module_available(module_name): + lsmod_output = subprocess.check_output('lsmod', universal_newlines=True) + module_re = re.compile(r'^{0}\b'.format(re.escape(module_name)), re.MULTILINE) + return module_re.search(lsmod_output) or not subprocess.call(["modprobe", module_name]) + +def expectedFailureIfModuleIsNotAvailable(module_name): + def f(func): + if not is_module_available(module_name): + return unittest.expectedFailure(func) + return func + + return f + +def expectedFailureIfERSPANModuleIsNotAvailable(): + def f(func): + rc = subprocess.call(['ip', 'link', 'add', 'dev', 'erspan99', 'type', 'erspan', 'seq', 'key', '30', 'local', '192.168.1.4', 'remote', '192.168.1.1', 'erspan_ver', '1', 'erspan', '123']) + if rc == 0: + subprocess.call(['ip', 'link', 'del', 'erspan99']) + return func + else: + return unittest.expectedFailure(func) + + return f + +def expectedFailureIfRoutingPolicyPortRangeIsNotAvailable(): + def f(func): + rc = subprocess.call(['ip', 'rule', 'add', 'from', '192.168.100.19', 'sport', '1123-1150', 'dport', '3224-3290', 'table', '7']) + if rc == 0: + subprocess.call(['ip', 'rule', 'del', 'from', '192.168.100.19', 'sport', '1123-1150', 'dport', '3224-3290', 'table', '7']) + return func + else: + return unittest.expectedFailure(func) + + return f + +def expectedFailureIfRoutingPolicyIPProtoIsNotAvailable(): + def f(func): + rc = subprocess.call(['ip', 'rule', 'add', 'not', 'from', '192.168.100.19', 'ipproto', 'tcp', 'table', '7']) + if rc == 0: + subprocess.call(['ip', 'rule', 'del', 'not', 'from', '192.168.100.19', 'ipproto', 'tcp', 'table', '7']) + return func + else: + return unittest.expectedFailure(func) + + return f + +def setUpModule(): + + os.makedirs(network_unit_file_path, exist_ok=True) + os.makedirs(networkd_ci_path, exist_ok=True) + + shutil.rmtree(networkd_ci_path) + copytree(os.path.join(os.path.dirname(os.path.abspath(__file__)), 'conf'), networkd_ci_path) + + subprocess.check_call('systemctl stop systemd-networkd.socket', shell=True) + +def tearDownModule(): + shutil.rmtree(networkd_ci_path) + + subprocess.check_call('systemctl stop systemd-networkd.service', shell=True) + subprocess.check_call('systemctl start systemd-networkd.socket', shell=True) + subprocess.check_call('systemctl start systemd-networkd.service', shell=True) + +class Utilities(): + dhcp_server_data = [] + + def read_link_attr(self, link, dev, attribute): + with open(os.path.join(os.path.join(os.path.join('/sys/class/net/', link), dev), attribute)) as f: + return f.readline().strip() + + def read_bridge_port_attr(self, bridge, link, attribute): + + path_bridge = os.path.join('/sys/devices/virtual/net', bridge) + path_port = 'lower_' + link + '/brport' + path = os.path.join(path_bridge, path_port) + + with open(os.path.join(path, attribute)) as f: + return f.readline().strip() + + def link_exits(self, link): + return os.path.exists(os.path.join('/sys/class/net', link)) + + def link_remove(self, links): + for link in links: + if os.path.exists(os.path.join('/sys/class/net', link)): + subprocess.call(['ip', 'link', 'del', 'dev', link]) + time.sleep(1) + + def read_ipv6_sysctl_attr(self, link, attribute): + with open(os.path.join(os.path.join(network_sysctl_ipv6_path, link), attribute)) as f: + return f.readline().strip() + + def read_ipv4_sysctl_attr(self, link, attribute): + with open(os.path.join(os.path.join(network_sysctl_ipv4_path, link), attribute)) as f: + return f.readline().strip() + + def copy_unit_to_networkd_unit_path(self, *units): + for unit in units: + shutil.copy(os.path.join(networkd_ci_path, unit), network_unit_file_path) + if (os.path.exists(os.path.join(networkd_ci_path, unit + '.d'))): + copytree(os.path.join(networkd_ci_path, unit + '.d'), os.path.join(network_unit_file_path, unit + '.d')) + + def remove_unit_from_networkd_path(self, units): + for unit in units: + if (os.path.exists(os.path.join(network_unit_file_path, unit))): + os.remove(os.path.join(network_unit_file_path, unit)) + if (os.path.exists(os.path.join(network_unit_file_path, unit + '.d'))): + shutil.rmtree(os.path.join(network_unit_file_path, unit + '.d')) + + def start_dnsmasq(self, additional_options=''): + dnsmasq_command = 'dnsmasq -8 /var/run/networkd-ci/test-dnsmasq-log-file --log-queries=extra --log-dhcp --pid-file=/var/run/networkd-ci/test-test-dnsmasq.pid --conf-file=/dev/null --interface=veth-peer --enable-ra --dhcp-range=2600::10,2600::20 --dhcp-range=192.168.5.10,192.168.5.200 -R --dhcp-leasefile=/var/run/networkd-ci/lease --dhcp-option=26,1492 --dhcp-option=option:router,192.168.5.1 --dhcp-option=33,192.168.5.4,192.168.5.5 --port=0 ' + additional_options + subprocess.check_call(dnsmasq_command, shell=True) + + time.sleep(10) + + def stop_dnsmasq(self, pid_file): + if os.path.exists(pid_file): + with open(pid_file, 'r') as f: + pid = f.read().rstrip(' \t\r\n\0') + os.kill(int(pid), signal.SIGTERM) + + os.remove(pid_file) + + def search_words_in_dnsmasq_log(self, words, show_all=False): + if os.path.exists(dnsmasq_log_file): + with open (dnsmasq_log_file) as in_file: + contents = in_file.read() + if show_all: + print(contents) + for line in contents.split('\n'): + if words in line: + in_file.close() + print("%s, %s" % (words, line)) + return True + return False + + def remove_lease_file(self): + if os.path.exists(os.path.join(networkd_ci_path, 'lease')): + os.remove(os.path.join(networkd_ci_path, 'lease')) + + def remove_log_file(self): + if os.path.exists(dnsmasq_log_file): + os.remove(dnsmasq_log_file) + + def start_networkd(self): + if (os.path.exists(os.path.join(networkd_runtime_directory, 'state'))): + subprocess.check_call('systemctl stop systemd-networkd', shell=True) + os.remove(os.path.join(networkd_runtime_directory, 'state')) + subprocess.check_call('systemctl start systemd-networkd', shell=True) + else: + subprocess.check_call('systemctl restart systemd-networkd', shell=True) + time.sleep(5) + print() + +class NetworkdNetDevTests(unittest.TestCase, Utilities): + + links =[ + '6rdtun99', + 'bond99', + 'bridge99', + 'dropin-test', + 'dummy98', + 'erspan-test', + 'geneve99', + 'gretap99', + 'gretun99', + 'ip6gretap99', + 'ip6tnl99', + 'ipiptun99', + 'ipvlan99', + 'isataptun99', + 'macvlan99', + 'macvtap99', + 'sittun99', + 'tap99', + 'test1', + 'tun99', + 'vcan99', + 'veth99', + 'vlan99', + 'vrf99', + 'vti6tun99', + 'vtitun99', + 'vxlan99', + 'wg98', + 'wg99'] + + units = [ + '10-dropin-test.netdev', + '11-dummy.netdev', + '12-dummy.netdev', + '21-macvlan.netdev', + '21-macvtap.netdev', + '21-vlan.netdev', + '21-vlan.network', + '25-6rd-tunnel.netdev', + '25-bond.netdev', + '25-bond-balanced-tlb.netdev', + '25-bridge.netdev', + '25-erspan-tunnel.netdev', + '25-geneve.netdev', + '25-gretap-tunnel.netdev', + '25-gre-tunnel.netdev', + '25-ip6gre-tunnel.netdev', + '25-ip6tnl-tunnel.netdev', + '25-ipip-tunnel-independent.netdev', + '25-ipip-tunnel.netdev', + '25-ipvlan.netdev', + '25-isatap-tunnel.netdev', + '25-sit-tunnel.netdev', + '25-tap.netdev', + '25-tun.netdev', + '25-vcan.netdev', + '25-veth.netdev', + '25-vrf.netdev', + '25-vti6-tunnel.netdev', + '25-vti-tunnel.netdev', + '25-vxlan.netdev', + '25-wireguard-23-peers.netdev', + '25-wireguard-23-peers.network', + '25-wireguard.netdev', + '6rd.network', + 'gre.network', + 'gretap.network', + 'gretun.network', + 'ip6gretap.network', + 'ip6tnl.network', + 'ipip.network', + 'ipvlan.network', + 'isatap.network', + 'macvlan.network', + 'macvtap.network', + 'sit.network', + 'vti6.network', + 'vti.network', + 'vxlan.network'] + + def setUp(self): + self.link_remove(self.links) + + def tearDown(self): + self.link_remove(self.links) + self.remove_unit_from_networkd_path(self.units) + + def test_dropin(self): + self.copy_unit_to_networkd_unit_path('10-dropin-test.netdev') + self.start_networkd() + + self.assertTrue(self.link_exits('dropin-test')) + + output = subprocess.check_output(['ip', 'link', 'show', 'dropin-test']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, '00:50:56:c0:00:28') + + def test_bridge(self): + self.copy_unit_to_networkd_unit_path('25-bridge.netdev') + self.start_networkd() + + self.assertTrue(self.link_exits('bridge99')) + + self.assertEqual('900', self.read_link_attr('bridge99', 'bridge', 'hello_time')) + self.assertEqual('900', self.read_link_attr('bridge99', 'bridge', 'max_age')) + self.assertEqual('900', self.read_link_attr('bridge99', 'bridge','forward_delay')) + self.assertEqual('900', self.read_link_attr('bridge99', 'bridge','ageing_time')) + self.assertEqual('9', self.read_link_attr('bridge99', 'bridge','priority')) + self.assertEqual('1', self.read_link_attr('bridge99', 'bridge','multicast_querier')) + self.assertEqual('1', self.read_link_attr('bridge99', 'bridge','multicast_snooping')) + self.assertEqual('1', self.read_link_attr('bridge99', 'bridge','stp_state')) + + def test_bond(self): + self.copy_unit_to_networkd_unit_path('25-bond.netdev') + self.start_networkd() + + self.assertTrue(self.link_exits('bond99')) + + self.assertEqual('802.3ad 4', self.read_link_attr('bond99', 'bonding', 'mode')) + self.assertEqual('layer3+4 1', self.read_link_attr('bond99', 'bonding', 'xmit_hash_policy')) + self.assertEqual('1000', self.read_link_attr('bond99', 'bonding', 'miimon')) + self.assertEqual('fast 1', self.read_link_attr('bond99', 'bonding', 'lacp_rate')) + self.assertEqual('2000', self.read_link_attr('bond99', 'bonding', 'updelay')) + self.assertEqual('2000', self.read_link_attr('bond99', 'bonding', 'downdelay')) + self.assertEqual('4', self.read_link_attr('bond99', 'bonding', 'resend_igmp')) + self.assertEqual('1', self.read_link_attr('bond99', 'bonding', 'min_links')) + self.assertEqual('1218', self.read_link_attr('bond99', 'bonding', 'ad_actor_sys_prio')) + self.assertEqual('811', self.read_link_attr('bond99', 'bonding', 'ad_user_port_key')) + self.assertEqual('00:11:22:33:44:55', self.read_link_attr('bond99', 'bonding', 'ad_actor_system')) + + def test_bond_balanced_tlb(self): + self.copy_unit_to_networkd_unit_path('25-bond-balanced-tlb.netdev') + self.start_networkd() + + self.assertTrue(self.link_exits('bond99')) + + self.assertEqual('balance-tlb 5', self.read_link_attr('bond99', 'bonding', 'mode')) + self.assertEqual('1', self.read_link_attr('bond99', 'bonding', 'tlb_dynamic_lb')) + + def test_vlan(self): + self.copy_unit_to_networkd_unit_path('21-vlan.netdev', '11-dummy.netdev', '21-vlan.network') + self.start_networkd() + + self.assertTrue(self.link_exits('vlan99')) + + output = subprocess.check_output(['ip', '-d', 'link', 'show', 'vlan99']).rstrip().decode('utf-8') + print(output) + self.assertTrue(output, 'REORDER_HDR') + self.assertTrue(output, 'LOOSE_BINDING') + self.assertTrue(output, 'GVRP') + self.assertTrue(output, 'MVRP') + self.assertTrue(output, '99') + + def test_macvtap(self): + self.copy_unit_to_networkd_unit_path('21-macvtap.netdev', '11-dummy.netdev', 'macvtap.network') + self.start_networkd() + + self.assertTrue(self.link_exits('macvtap99')) + + def test_macvlan(self): + self.copy_unit_to_networkd_unit_path('21-macvlan.netdev', '11-dummy.netdev', 'macvlan.network') + self.start_networkd() + + self.assertTrue(self.link_exits('macvlan99')) + + @expectedFailureIfModuleIsNotAvailable('ipvlan') + def test_ipvlan(self): + self.copy_unit_to_networkd_unit_path('25-ipvlan.netdev', '11-dummy.netdev', 'ipvlan.network') + self.start_networkd() + + self.assertTrue(self.link_exits('ipvlan99')) + + def test_veth(self): + self.copy_unit_to_networkd_unit_path('25-veth.netdev') + self.start_networkd() + + self.assertTrue(self.link_exits('veth99')) + + def test_dummy(self): + self.copy_unit_to_networkd_unit_path('11-dummy.netdev') + self.start_networkd() + + self.assertTrue(self.link_exits('test1')) + + def test_tun(self): + self.copy_unit_to_networkd_unit_path('25-tun.netdev') + self.start_networkd() + + self.assertTrue(self.link_exits('tun99')) + + def test_tap(self): + self.copy_unit_to_networkd_unit_path('25-tap.netdev') + self.start_networkd() + + self.assertTrue(self.link_exits('tap99')) + + @expectedFailureIfModuleIsNotAvailable('vrf') + def test_vrf(self): + self.copy_unit_to_networkd_unit_path('25-vrf.netdev') + self.start_networkd() + + self.assertTrue(self.link_exits('vrf99')) + + @expectedFailureIfModuleIsNotAvailable('vcan') + def test_vcan(self): + self.copy_unit_to_networkd_unit_path('25-vcan.netdev') + self.start_networkd() + + self.assertTrue(self.link_exits('vcan99')) + + @expectedFailureIfModuleIsNotAvailable('wireguard') + def test_wireguard(self): + self.copy_unit_to_networkd_unit_path('25-wireguard.netdev') + self.start_networkd() + + if shutil.which('wg'): + subprocess.call('wg') + output = subprocess.check_output(['wg', 'show', 'wg99', 'listen-port']).rstrip().decode('utf-8') + self.assertTrue(output, '51820') + output = subprocess.check_output(['wg', 'show', 'wg99', 'fwmark']).rstrip().decode('utf-8') + self.assertTrue(output, '0x4d2') + output = subprocess.check_output(['wg', 'show', 'wg99', 'allowed-ips']).rstrip().decode('utf-8') + self.assertTrue(output, 'RDf+LSpeEre7YEIKaxg+wbpsNV7du+ktR99uBEtIiCA=\t192.168.26.0/24 fd31:bf08:57cb::/48') + output = subprocess.check_output(['wg', 'show', 'wg99', 'persistent-keepalive']).rstrip().decode('utf-8') + self.assertTrue(output, 'RDf+LSpeEre7YEIKaxg+wbpsNV7du+ktR99uBEtIiCA=\t20') + output = subprocess.check_output(['wg', 'show', 'wg99', 'endpoints']).rstrip().decode('utf-8') + self.assertTrue(output, 'RDf+LSpeEre7YEIKaxg+wbpsNV7du+ktR99uBEtIiCA=\t192.168.27.3:51820') + + self.assertTrue(self.link_exits('wg99')) + + @expectedFailureIfModuleIsNotAvailable('wireguard') + def test_wireguard_23_peers(self): + self.copy_unit_to_networkd_unit_path('25-wireguard-23-peers.netdev', '25-wireguard-23-peers.network') + self.start_networkd() + + if shutil.which('wg'): + subprocess.call('wg') + + self.assertTrue(self.link_exits('wg98')) + + def test_geneve(self): + self.copy_unit_to_networkd_unit_path('25-geneve.netdev') + self.start_networkd() + + self.assertTrue(self.link_exits('geneve99')) + + output = subprocess.check_output(['ip', '-d', 'link', 'show', 'geneve99']).rstrip().decode('utf-8') + print(output) + self.assertTrue(output, '192.168.22.1') + self.assertTrue(output, '6082') + self.assertTrue(output, 'udpcsum') + self.assertTrue(output, 'udp6zerocsumrx') + + def test_ipip_tunnel(self): + self.copy_unit_to_networkd_unit_path('12-dummy.netdev', '25-ipip-tunnel.netdev', 'ipip.network') + self.start_networkd() + + self.assertTrue(self.link_exits('dummy98')) + self.assertTrue(self.link_exits('ipiptun99')) + + def test_gre_tunnel(self): + self.copy_unit_to_networkd_unit_path('12-dummy.netdev', '25-gre-tunnel.netdev', 'gretun.network') + self.start_networkd() + + self.assertTrue(self.link_exits('dummy98')) + self.assertTrue(self.link_exits('gretun99')) + + def test_gretap_tunnel(self): + self.copy_unit_to_networkd_unit_path('12-dummy.netdev', '25-gretap-tunnel.netdev', 'gretap.network') + self.start_networkd() + + self.assertTrue(self.link_exits('dummy98')) + self.assertTrue(self.link_exits('gretap99')) + + def test_ip6gretap_tunnel(self): + self.copy_unit_to_networkd_unit_path('12-dummy.netdev', '25-ip6gre-tunnel.netdev', 'ip6gretap.network') + self.start_networkd() + + self.assertTrue(self.link_exits('dummy98')) + self.assertTrue(self.link_exits('ip6gretap99')) + + def test_vti_tunnel(self): + self.copy_unit_to_networkd_unit_path('12-dummy.netdev', '25-vti-tunnel.netdev', 'vti.network') + self.start_networkd() + + self.assertTrue(self.link_exits('dummy98')) + self.assertTrue(self.link_exits('vtitun99')) + + def test_vti6_tunnel(self): + self.copy_unit_to_networkd_unit_path('12-dummy.netdev', '25-vti6-tunnel.netdev', 'vti6.network') + self.start_networkd() + + self.assertTrue(self.link_exits('dummy98')) + self.assertTrue(self.link_exits('vti6tun99')) + + def test_ip6tnl_tunnel(self): + self.copy_unit_to_networkd_unit_path('12-dummy.netdev', '25-ip6tnl-tunnel.netdev', 'ip6tnl.network') + self.start_networkd() + + self.assertTrue(self.link_exits('dummy98')) + self.assertTrue(self.link_exits('ip6tnl99')) + + def test_sit_tunnel(self): + self.copy_unit_to_networkd_unit_path('12-dummy.netdev', '25-sit-tunnel.netdev', 'sit.network') + self.start_networkd() + + self.assertTrue(self.link_exits('dummy98')) + self.assertTrue(self.link_exits('sittun99')) + + def test_isatap_tunnel(self): + self.copy_unit_to_networkd_unit_path('12-dummy.netdev', '25-isatap-tunnel.netdev', 'isatap.network') + self.start_networkd() + + self.assertTrue(self.link_exits('dummy98')) + self.assertTrue(self.link_exits('isataptun99')) + + output = subprocess.check_output(['ip', '-d', 'link', 'show', 'isataptun99']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, "isatap ") + + def test_6rd_tunnel(self): + self.copy_unit_to_networkd_unit_path('12-dummy.netdev', '25-6rd-tunnel.netdev', '6rd.network') + self.start_networkd() + + self.assertTrue(self.link_exits('dummy98')) + self.assertTrue(self.link_exits('sittun99')) + + @expectedFailureIfERSPANModuleIsNotAvailable() + def test_erspan_tunnel(self): + self.copy_unit_to_networkd_unit_path('25-erspan-tunnel.netdev') + self.start_networkd() + + self.assertTrue(self.link_exits('erspan-test')) + + output = subprocess.check_output(['ip', '-d', 'link', 'show', 'erspan-test']).rstrip().decode('utf-8') + print(output) + self.assertTrue(output, '172.16.1.200') + self.assertTrue(output, '172.16.1.100') + self.assertTrue(output, '101') + + def test_tunnel_independent(self): + self.copy_unit_to_networkd_unit_path('25-ipip-tunnel-independent.netdev') + self.start_networkd() + + self.assertTrue(self.link_exits('ipiptun99')) + + def test_vxlan(self): + self.copy_unit_to_networkd_unit_path('25-vxlan.netdev', 'vxlan.network','11-dummy.netdev') + self.start_networkd() + + self.assertTrue(self.link_exits('vxlan99')) + + output = subprocess.check_output(['ip', '-d', 'link', 'show', 'vxlan99']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, "999") + self.assertRegex(output, '5555') + self.assertRegex(output, 'l2miss') + self.assertRegex(output, 'l3miss') + self.assertRegex(output, 'udpcsum') + self.assertRegex(output, 'udp6zerocsumtx') + self.assertRegex(output, 'udp6zerocsumrx') + self.assertRegex(output, 'remcsumtx') + self.assertRegex(output, 'remcsumrx') + self.assertRegex(output, 'gbp') + +class NetworkdNetWorkTests(unittest.TestCase, Utilities): + links = [ + 'bond199', + 'dummy98', + 'test1'] + + units = [ + '11-dummy.netdev', + '12-dummy.netdev', + '23-active-slave.network', + '23-bond199.network', + '23-primary-slave.network', + '23-test1-bond199.network', + '25-address-link-section.network', + '25-address-section-miscellaneous.network', + '25-address-section.network', + '25-bond-active-backup-slave.netdev', + '25-fibrule-invert.network', + '25-fibrule-port-range.network', + '25-ipv6-address-label-section.network', + '25-neighbor-section.network', + '25-link-local-addressing-no.network', + '25-link-local-addressing-yes.network', + '25-link-section-unmanaged.network', + '25-route-gateway.network', + '25-route-gateway-on-link.network', + '25-route-ipv6-src.network', + '25-route-reverse-order.network', + '25-route-section.network', + '25-route-tcp-window-settings.network', + '25-route-type.network', + '25-sysctl.network', + 'configure-without-carrier.network', + 'routing-policy-rule.network', + 'test-static.network'] + + def setUp(self): + self.link_remove(self.links) + + def tearDown(self): + self.link_remove(self.links) + self.remove_unit_from_networkd_path(self.units) + + def test_static_address(self): + self.copy_unit_to_networkd_unit_path('12-dummy.netdev', 'test-static.network') + self.start_networkd() + + self.assertTrue(self.link_exits('dummy98')) + + output = subprocess.check_output(['networkctl', 'status', 'dummy98']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, '192.168.0.15') + self.assertRegex(output, '192.168.0.1') + self.assertRegex(output, 'routable') + + def test_configure_without_carrier(self): + self.copy_unit_to_networkd_unit_path('configure-without-carrier.network', '11-dummy.netdev') + self.start_networkd() + + self.assertTrue(self.link_exits('test1')) + + output = subprocess.check_output(['networkctl', 'status', 'test1']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, '192.168.0.15') + self.assertRegex(output, '192.168.0.1') + self.assertRegex(output, 'routable') + + def test_bond_active_slave(self): + self.copy_unit_to_networkd_unit_path('23-active-slave.network', '23-bond199.network', '25-bond-active-backup-slave.netdev', '12-dummy.netdev') + self.start_networkd() + + self.assertTrue(self.link_exits('dummy98')) + self.assertTrue(self.link_exits('bond199')) + + output = subprocess.check_output(['ip', '-d', 'link', 'show', 'bond199']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, 'active_slave dummy98') + + def test_bond_primary_slave(self): + self.copy_unit_to_networkd_unit_path('23-primary-slave.network', '23-test1-bond199.network', '25-bond-active-backup-slave.netdev', '11-dummy.netdev') + self.start_networkd() + + self.assertTrue(self.link_exits('test1')) + self.assertTrue(self.link_exits('bond199')) + + output = subprocess.check_output(['ip', '-d', 'link', 'show', 'bond199']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, 'primary test1') + + def test_routing_policy_rule(self): + self.copy_unit_to_networkd_unit_path('routing-policy-rule.network', '11-dummy.netdev') + self.start_networkd() + + self.assertTrue(self.link_exits('test1')) + + output = subprocess.check_output(['ip', 'rule']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, '111') + self.assertRegex(output, 'from 192.168.100.18') + self.assertRegex(output, r'tos (?:0x08|throughput)\s') + self.assertRegex(output, 'iif test1') + self.assertRegex(output, 'oif test1') + self.assertRegex(output, 'lookup 7') + + subprocess.call(['ip', 'rule', 'del', 'table', '7']) + + @expectedFailureIfRoutingPolicyPortRangeIsNotAvailable() + def test_routing_policy_rule_port_range(self): + self.copy_unit_to_networkd_unit_path('25-fibrule-port-range.network', '11-dummy.netdev') + self.start_networkd() + + self.assertTrue(self.link_exits('test1')) + + output = subprocess.check_output(['ip', 'rule']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, '111') + self.assertRegex(output, 'from 192.168.100.18') + self.assertRegex(output, '1123-1150') + self.assertRegex(output, '3224-3290') + self.assertRegex(output, 'tcp') + self.assertRegex(output, 'lookup 7') + + subprocess.call(['ip', 'rule', 'del', 'table', '7']) + + @expectedFailureIfRoutingPolicyIPProtoIsNotAvailable() + def test_routing_policy_rule_invert(self): + self.copy_unit_to_networkd_unit_path('25-fibrule-invert.network', '11-dummy.netdev') + self.start_networkd() + + self.assertTrue(self.link_exits('test1')) + + output = subprocess.check_output(['ip', 'rule']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, '111') + self.assertRegex(output, 'not.*?from.*?192.168.100.18') + self.assertRegex(output, 'tcp') + self.assertRegex(output, 'lookup 7') + + subprocess.call(['ip', 'rule', 'del', 'table', '7']) + + def test_address_peer(self): + self.copy_unit_to_networkd_unit_path('25-address-section.network', '12-dummy.netdev') + self.start_networkd() + + self.assertTrue(self.link_exits('dummy98')) + + output = subprocess.check_output(['ip', 'address', 'show', 'dummy98']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, 'inet 10.2.3.4 peer 10.2.3.5/16 scope global 32') + self.assertRegex(output, 'inet 10.6.7.8/16 brd 10.6.255.255 scope global 33') + self.assertRegex(output, 'inet6 2001:db8::20 peer 2001:db8::10/128 scope global') + + output = subprocess.check_output(['networkctl', 'status', 'dummy98']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, 'State: routable \(configured\)') + + def test_address_preferred_lifetime_zero_ipv6(self): + self.copy_unit_to_networkd_unit_path('25-address-section-miscellaneous.network', '12-dummy.netdev') + self.start_networkd() + + self.assertTrue(self.link_exits('dummy98')) + + output = subprocess.check_output(['ip', 'address', 'show', 'dummy98']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, 'inet 10.2.3.4/16 brd 10.2.255.255 scope link deprecated dummy98') + self.assertRegex(output, 'inet6 2001:db8:0:f101::1/64 scope global') + + def test_ip_route(self): + self.copy_unit_to_networkd_unit_path('25-route-section.network', '12-dummy.netdev') + self.start_networkd() + + self.assertTrue(self.link_exits('dummy98')) + + output = subprocess.check_output(['ip', 'route', 'list', 'dev', 'dummy98']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, '192.168.0.1') + self.assertRegex(output, 'static') + self.assertRegex(output, '192.168.0.0/24') + + def test_ip_route_reverse(self): + self.copy_unit_to_networkd_unit_path('25-route-reverse-order.network', '12-dummy.netdev') + self.start_networkd() + + self.assertTrue(self.link_exits('dummy98')) + + output = subprocess.check_output(['ip', '-6', 'route', 'show', 'dev', 'dummy98']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, '2001:1234:5:8fff:ff:ff:ff:ff') + self.assertRegex(output, '2001:1234:5:8f63::1') + + def test_ip_route_blackhole_unreachable_prohibit(self): + self.copy_unit_to_networkd_unit_path('25-route-type.network', '12-dummy.netdev') + self.start_networkd() + + self.assertTrue(self.link_exits('dummy98')) + + output = subprocess.check_output(['ip', 'route', 'list']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, 'blackhole') + self.assertRegex(output, 'unreachable') + self.assertRegex(output, 'prohibit') + + subprocess.call(['ip', 'route', 'del', 'blackhole', '202.54.1.2']) + subprocess.call(['ip', 'route', 'del', 'unreachable', '202.54.1.3']) + subprocess.call(['ip', 'route', 'del', 'prohibit', '202.54.1.4']) + + def test_ip_route_tcp_window(self): + self.copy_unit_to_networkd_unit_path('25-route-tcp-window-settings.network', '11-dummy.netdev') + self.start_networkd() + + self.assertTrue(self.link_exits('test1')) + + output = subprocess.check_output(['ip', 'route', 'list']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, 'initcwnd 20') + self.assertRegex(output, 'initrwnd 30') + + def test_ip_route_gateway(self): + self.copy_unit_to_networkd_unit_path('25-route-gateway.network', '12-dummy.netdev') + self.start_networkd() + + self.assertTrue(self.link_exits('dummy98')) + + output = subprocess.check_output(['ip', 'route', 'list', 'dev', 'dummy98', 'default']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, 'default') + self.assertRegex(output, 'via') + self.assertRegex(output, '149.10.124.64') + self.assertRegex(output, 'proto') + self.assertRegex(output, 'static') + + output = subprocess.check_output(['ip', 'route', 'list', 'dev', 'dummy98', 'src', '149.10.124.58']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, '149.10.124.48/28') + self.assertRegex(output, 'proto') + self.assertRegex(output, 'kernel') + self.assertRegex(output, 'scope') + self.assertRegex(output, 'link') + + def test_ip_route_gateway_on_link(self): + self.copy_unit_to_networkd_unit_path('25-route-gateway-on-link.network', '12-dummy.netdev') + self.start_networkd() + + self.assertTrue(self.link_exits('dummy98')) + + output = subprocess.check_output(['ip', 'route', 'list', 'dev', 'dummy98', 'default']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, 'default') + self.assertRegex(output, 'via') + self.assertRegex(output, '149.10.125.65') + self.assertRegex(output, 'proto') + self.assertRegex(output, 'static') + self.assertRegex(output, 'onlink') + + output = subprocess.check_output(['ip', 'route', 'list', 'dev', 'dummy98', 'src', '149.10.124.58']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, '149.10.124.48/28') + self.assertRegex(output, 'proto') + self.assertRegex(output, 'kernel') + self.assertRegex(output, 'scope') + self.assertRegex(output, 'link') + + def test_ip_route_ipv6_src_route(self): + # a dummy device does not make the addresses go through tentative state, so we + # reuse a bond from an earlier test, which does make the addresses go through + # tentative state, and do our test on that + self.copy_unit_to_networkd_unit_path('23-active-slave.network', '25-route-ipv6-src.network', '25-bond-active-backup-slave.netdev', '12-dummy.netdev') + self.start_networkd() + + self.assertTrue(self.link_exits('dummy98')) + self.assertTrue(self.link_exits('bond199')) + + output = subprocess.check_output(['ip', '-6', 'route', 'list', 'dev', 'bond199']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, 'abcd::/16') + self.assertRegex(output, 'src') + self.assertRegex(output, '2001:1234:56:8f63::2') + + def test_ip_link_mac_address(self): + self.copy_unit_to_networkd_unit_path('25-address-link-section.network', '12-dummy.netdev') + self.start_networkd() + + self.assertTrue(self.link_exits('dummy98')) + + output = subprocess.check_output(['ip', 'link', 'show', 'dummy98']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, '00:01:02:aa:bb:cc') + + def test_ip_link_unmanaged(self): + self.copy_unit_to_networkd_unit_path('25-link-section-unmanaged.network', '12-dummy.netdev') + self.start_networkd() + + self.assertTrue(self.link_exits('dummy98')) + + output = subprocess.check_output(['networkctl', 'status', 'dummy98']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, 'unmanaged') + + def test_ipv6_address_label(self): + self.copy_unit_to_networkd_unit_path('25-ipv6-address-label-section.network', '12-dummy.netdev') + self.start_networkd() + + self.assertTrue(self.link_exits('dummy98')) + + output = subprocess.check_output(['ip', 'addrlabel', 'list']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, '2004:da8:1::/64') + + def test_ipv6_neighbor(self): + self.copy_unit_to_networkd_unit_path('25-neighbor-section.network', '12-dummy.netdev') + self.start_networkd() + + self.assertTrue(self.link_exits('dummy98')) + + output = subprocess.check_output(['ip', 'neigh', 'list']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, '192.168.10.1.*00:00:5e:00:02:65.*PERMANENT') + self.assertRegex(output, '2004:da8:1::1.*00:00:5e:00:02:66.*PERMANENT') + + def test_link_local_addressing(self): + self.copy_unit_to_networkd_unit_path('25-link-local-addressing-yes.network', '11-dummy.netdev', + '25-link-local-addressing-no.network', '12-dummy.netdev') + self.start_networkd() + + self.assertTrue(self.link_exits('test1')) + self.assertTrue(self.link_exits('dummy98')) + + time.sleep(10) + + output = subprocess.check_output(['ip', 'address', 'show', 'dev', 'test1']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, 'inet .* scope link') + self.assertRegex(output, 'inet6 .* scope link') + + output = subprocess.check_output(['ip', 'address', 'show', 'dev', 'dummy98']).rstrip().decode('utf-8') + print(output) + self.assertNotRegex(output, 'inet6* .* scope link') + + output = subprocess.check_output(['networkctl', 'status', 'test1']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, 'State: degraded \(configured\)') + + output = subprocess.check_output(['networkctl', 'status', 'dummy98']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, 'State: carrier \(configured\)') + + ''' + Documentation/networking/ip-sysctl.txt + + addr_gen_mode - INTEGER + Defines how link-local and autoconf addresses are generated. + + 0: generate address based on EUI64 (default) + 1: do no generate a link-local address, use EUI64 for addresses generated + from autoconf + 2: generate stable privacy addresses, using the secret from + stable_secret (RFC7217) + 3: generate stable privacy addresses, using a random secret if unset + ''' + + test1_addr_gen_mode = '' + if os.path.exists(os.path.join(os.path.join(network_sysctl_ipv6_path, 'test1'), 'stable_secret')): + with open(os.path.join(os.path.join(network_sysctl_ipv6_path, 'test1'), 'stable_secret')) as f: + try: + f.readline() + except IOError: + # if stable_secret is unset, then EIO is returned + test1_addr_gen_mode = '0' + else: + test1_addr_gen_mode = '2' + else: + test1_addr_gen_mode = '0' + + if os.path.exists(os.path.join(os.path.join(network_sysctl_ipv6_path, 'test1'), 'addr_gen_mode')): + self.assertEqual(self.read_ipv6_sysctl_attr('test1', 'addr_gen_mode'), '0') + + if os.path.exists(os.path.join(os.path.join(network_sysctl_ipv6_path, 'dummy98'), 'addr_gen_mode')): + self.assertEqual(self.read_ipv6_sysctl_attr('dummy98', 'addr_gen_mode'), '1') + + def test_sysctl(self): + self.copy_unit_to_networkd_unit_path('25-sysctl.network', '12-dummy.netdev') + self.start_networkd() + + self.assertTrue(self.link_exits('dummy98')) + + self.assertEqual(self.read_ipv6_sysctl_attr('dummy98', 'forwarding'), '1') + self.assertEqual(self.read_ipv6_sysctl_attr('dummy98', 'use_tempaddr'), '2') + self.assertEqual(self.read_ipv6_sysctl_attr('dummy98', 'dad_transmits'), '3') + self.assertEqual(self.read_ipv6_sysctl_attr('dummy98', 'hop_limit'), '5') + self.assertEqual(self.read_ipv6_sysctl_attr('dummy98', 'proxy_ndp'), '1') + self.assertEqual(self.read_ipv4_sysctl_attr('dummy98', 'forwarding'),'1') + self.assertEqual(self.read_ipv4_sysctl_attr('dummy98', 'proxy_arp'), '1') + +class NetworkdNetWorkBridgeTests(unittest.TestCase, Utilities): + links = [ + 'bridge99', + 'dummy98', + 'test1'] + + units = [ + '11-dummy.netdev', + '12-dummy.netdev', + '26-bridge.netdev', + '26-bridge-slave-interface-1.network', + '26-bridge-slave-interface-2.network', + 'bridge99.network'] + + def setUp(self): + self.link_remove(self.links) + + def tearDown(self): + self.link_remove(self.links) + self.remove_unit_from_networkd_path(self.units) + + def test_bridge_property(self): + self.copy_unit_to_networkd_unit_path('11-dummy.netdev', '12-dummy.netdev', '26-bridge.netdev', + '26-bridge-slave-interface-1.network', '26-bridge-slave-interface-2.network', + 'bridge99.network') + self.start_networkd() + + self.assertTrue(self.link_exits('dummy98')) + self.assertTrue(self.link_exits('test1')) + self.assertTrue(self.link_exits('bridge99')) + + output = subprocess.check_output(['ip', '-d', 'link', 'show', 'test1']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, 'master') + self.assertRegex(output, 'bridge') + + output = subprocess.check_output(['ip', '-d', 'link', 'show', 'dummy98']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, 'master') + self.assertRegex(output, 'bridge') + + output = subprocess.check_output(['ip', 'addr', 'show', 'bridge99']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, '192.168.0.15') + self.assertRegex(output, '192.168.0.1') + + output = subprocess.check_output(['bridge', '-d', 'link', 'show', 'dummy98']).rstrip().decode('utf-8') + print(output) + self.assertEqual(self.read_bridge_port_attr('bridge99', 'dummy98', 'hairpin_mode'), '1') + self.assertEqual(self.read_bridge_port_attr('bridge99', 'dummy98', 'path_cost'), '400') + self.assertEqual(self.read_bridge_port_attr('bridge99', 'dummy98', 'unicast_flood'), '1') + self.assertEqual(self.read_bridge_port_attr('bridge99', 'dummy98', 'multicast_fast_leave'), '1') + + # CONFIG_BRIDGE_IGMP_SNOOPING=y + if (os.path.exists('/sys/devices/virtual/net/bridge00/lower_dummy98/brport/multicast_to_unicast')): + self.assertEqual(self.read_bridge_port_attr('bridge99', 'dummy98', 'multicast_to_unicast'), '1') + +class NetworkdNetWorkLLDPTests(unittest.TestCase, Utilities): + links = ['veth99'] + + units = [ + '23-emit-lldp.network', + '24-lldp.network', + '25-veth.netdev'] + + def setUp(self): + self.link_remove(self.links) + + def tearDown(self): + self.link_remove(self.links) + self.remove_unit_from_networkd_path(self.units) + + def test_lldp(self): + self.copy_unit_to_networkd_unit_path('23-emit-lldp.network', '24-lldp.network', '25-veth.netdev') + self.start_networkd() + + self.assertTrue(self.link_exits('veth99')) + + output = subprocess.check_output(['networkctl', 'lldp']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, 'veth-peer') + self.assertRegex(output, 'veth99') + +class NetworkdNetworkRATests(unittest.TestCase, Utilities): + links = ['veth99'] + + units = [ + '25-veth.netdev', + 'ipv6-prefix.network', + 'ipv6-prefix-veth.network'] + + def setUp(self): + self.link_remove(self.links) + + def tearDown(self): + self.link_remove(self.links) + self.remove_unit_from_networkd_path(self.units) + + def test_ipv6_prefix_delegation(self): + self.copy_unit_to_networkd_unit_path('25-veth.netdev', 'ipv6-prefix.network', 'ipv6-prefix-veth.network') + self.start_networkd() + + self.assertTrue(self.link_exits('veth99')) + + output = subprocess.check_output(['networkctl', 'status', 'veth99']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, '2002:da8:1:0') + +class NetworkdNetworkDHCPServerTests(unittest.TestCase, Utilities): + links = [ + 'dummy98', + 'veth99'] + + units = [ + '12-dummy.netdev', + '24-search-domain.network', + '25-veth.netdev', + 'dhcp-client.network', + 'dhcp-client-timezone-router.network', + 'dhcp-server.network', + 'dhcp-server-timezone-router.network'] + + def setUp(self): + self.link_remove(self.links) + + def tearDown(self): + self.link_remove(self.links) + self.remove_unit_from_networkd_path(self.units) + + def test_dhcp_server(self): + self.copy_unit_to_networkd_unit_path('25-veth.netdev', 'dhcp-client.network', 'dhcp-server.network') + self.start_networkd() + + self.assertTrue(self.link_exits('veth99')) + + output = subprocess.check_output(['networkctl', 'status', 'veth99']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, '192.168.5.*') + self.assertRegex(output, 'Gateway: 192.168.5.1') + self.assertRegex(output, 'DNS: 192.168.5.1') + self.assertRegex(output, 'NTP: 192.168.5.1') + + def test_domain(self): + self.copy_unit_to_networkd_unit_path('12-dummy.netdev', '24-search-domain.network') + self.start_networkd() + + self.assertTrue(self.link_exits('dummy98')) + + output = subprocess.check_output(['networkctl', 'status', 'dummy98']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, 'Address: 192.168.42.100') + self.assertRegex(output, 'DNS: 192.168.42.1') + self.assertRegex(output, 'Search Domains: one') + + def test_emit_router_timezone(self): + self.copy_unit_to_networkd_unit_path('25-veth.netdev', 'dhcp-client-timezone-router.network', 'dhcp-server-timezone-router.network') + self.start_networkd() + + self.assertTrue(self.link_exits('veth99')) + + output = subprocess.check_output(['networkctl', 'status', 'veth99']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, 'Gateway: 192.168.5.*') + self.assertRegex(output, '192.168.5.*') + self.assertRegex(output, 'Europe/Berlin') + +class NetworkdNetworkDHCPClientTests(unittest.TestCase, Utilities): + links = [ + 'dummy98', + 'veth99'] + + units = [ + '25-veth.netdev', + 'dhcp-client-anonymize.network', + 'dhcp-client-critical-connection.network', + 'dhcp-client-ipv4-dhcp-settings.network', + 'dhcp-client-ipv4-only-ipv6-disabled.network', + 'dhcp-client-ipv4-only.network', + 'dhcp-client-ipv6-only.network', + 'dhcp-client-ipv6-rapid-commit.network', + 'dhcp-client-listen-port.network', + 'dhcp-client-route-metric.network', + 'dhcp-client-route-table.network', + 'dhcp-client.network', + 'dhcp-server-veth-peer.network', + 'dhcp-v4-server-veth-peer.network', + 'static.network'] + + def setUp(self): + self.link_remove(self.links) + self.stop_dnsmasq(dnsmasq_pid_file) + + def tearDown(self): + self.link_remove(self.links) + self.remove_unit_from_networkd_path(self.units) + self.stop_dnsmasq(dnsmasq_pid_file) + self.remove_lease_file() + self.remove_log_file() + + def test_dhcp_client_ipv6_only(self): + self.copy_unit_to_networkd_unit_path('25-veth.netdev', 'dhcp-server-veth-peer.network', 'dhcp-client-ipv6-only.network') + self.start_networkd() + + self.assertTrue(self.link_exits('veth99')) + + self.start_dnsmasq() + + output = subprocess.check_output(['networkctl', 'status', 'veth99']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, '2600::') + self.assertNotRegex(output, '192.168.5') + + def test_dhcp_client_ipv4_only(self): + self.copy_unit_to_networkd_unit_path('25-veth.netdev', 'dhcp-server-veth-peer.network', 'dhcp-client-ipv4-only-ipv6-disabled.network') + self.start_networkd() + + self.assertTrue(self.link_exits('veth99')) + + self.start_dnsmasq() + + output = subprocess.check_output(['networkctl', 'status', 'veth99']).rstrip().decode('utf-8') + print(output) + self.assertNotRegex(output, '2600::') + self.assertRegex(output, '192.168.5') + + def test_dhcp_client_ipv4_ipv6(self): + self.copy_unit_to_networkd_unit_path('25-veth.netdev', 'dhcp-server-veth-peer.network', 'dhcp-client-ipv6-only.network', + 'dhcp-client-ipv4-only.network') + self.start_networkd() + + self.assertTrue(self.link_exits('veth99')) + + self.start_dnsmasq() + + output = subprocess.check_output(['networkctl', 'status', 'veth99']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, '2600::') + self.assertRegex(output, '192.168.5') + + def test_dhcp_client_settings(self): + self.copy_unit_to_networkd_unit_path('25-veth.netdev', 'dhcp-server-veth-peer.network', 'dhcp-client-ipv4-dhcp-settings.network') + self.start_networkd() + + self.assertTrue(self.link_exits('veth99')) + + self.start_dnsmasq() + + output = subprocess.check_output(['ip', 'address', 'show', 'dev', 'veth99']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, '12:34:56:78:9a:bc') + self.assertRegex(output, '192.168.5') + self.assertRegex(output, '1492') + + output = subprocess.check_output(['ip', 'route']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, 'default.*dev veth99 proto dhcp') + + self.assertTrue(self.search_words_in_dnsmasq_log('vendor class: SusantVendorTest', True)) + self.assertTrue(self.search_words_in_dnsmasq_log('DHCPDISCOVER(veth-peer) 12:34:56:78:9a:bc')) + self.assertTrue(self.search_words_in_dnsmasq_log('client provides name: test-hostname')) + self.assertTrue(self.search_words_in_dnsmasq_log('26:mtu')) + + def test_dhcp6_client_settings_rapidcommit_true(self): + self.copy_unit_to_networkd_unit_path('25-veth.netdev', 'dhcp-server-veth-peer.network', 'dhcp-client-ipv6-only.network') + self.start_networkd() + + self.assertTrue(self.link_exits('veth99')) + + self.start_dnsmasq() + + output = subprocess.check_output(['ip', 'address', 'show', 'dev', 'veth99']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, '12:34:56:78:9a:bc') + self.assertTrue(self.search_words_in_dnsmasq_log('14:rapid-commit', True)) + + def test_dhcp6_client_settings_rapidcommit_false(self): + self.copy_unit_to_networkd_unit_path('25-veth.netdev', 'dhcp-server-veth-peer.network', 'dhcp-client-ipv6-rapid-commit.network') + self.start_networkd() + + self.assertTrue(self.link_exits('veth99')) + + self.start_dnsmasq() + + output = subprocess.check_output(['ip', 'address', 'show', 'dev', 'veth99']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, '12:34:56:78:9a:bc') + self.assertFalse(self.search_words_in_dnsmasq_log('14:rapid-commit', True)) + + def test_dhcp_client_settings_anonymize(self): + self.copy_unit_to_networkd_unit_path('25-veth.netdev', 'dhcp-server-veth-peer.network', 'dhcp-client-anonymize.network') + self.start_networkd() + + self.assertTrue(self.link_exits('veth99')) + + self.start_dnsmasq() + + self.assertFalse(self.search_words_in_dnsmasq_log('VendorClassIdentifier=SusantVendorTest', True)) + self.assertFalse(self.search_words_in_dnsmasq_log('test-hostname')) + self.assertFalse(self.search_words_in_dnsmasq_log('26:mtu')) + + def test_dhcp_client_listen_port(self): + self.copy_unit_to_networkd_unit_path('25-veth.netdev', 'dhcp-server-veth-peer.network', 'dhcp-client-listen-port.network') + self.start_networkd() + + self.assertTrue(self.link_exits('veth99')) + + self.start_dnsmasq('--dhcp-alternate-port=67,5555') + + output = subprocess.check_output(['ip', '-4', 'address', 'show', 'dev', 'veth99']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, '192.168.5.* dynamic') + + def test_dhcp_route_table_id(self): + self.copy_unit_to_networkd_unit_path('25-veth.netdev', 'dhcp-v4-server-veth-peer.network', 'dhcp-client-route-table.network') + self.start_networkd() + + self.assertTrue(self.link_exits('veth99')) + + self.start_dnsmasq() + + output = subprocess.check_output(['ip', 'route', 'show', 'table', '12']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, 'veth99 proto dhcp') + self.assertRegex(output, '192.168.5.1') + + def test_dhcp_route_metric(self): + self.copy_unit_to_networkd_unit_path('25-veth.netdev', 'dhcp-v4-server-veth-peer.network', 'dhcp-client-route-metric.network') + self.start_networkd() + + self.assertTrue(self.link_exits('veth99')) + + self.start_dnsmasq() + + output = subprocess.check_output(['ip', 'route', 'show', 'dev', 'veth99']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, 'metric 24') + + def test_dhcp_route_criticalconnection_true(self): + self.copy_unit_to_networkd_unit_path('25-veth.netdev', 'dhcp-v4-server-veth-peer.network', 'dhcp-client-critical-connection.network') + self.start_networkd() + + self.assertTrue(self.link_exits('veth99')) + + self.start_dnsmasq() + + output = subprocess.check_output(['networkctl', 'status', 'veth99']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, '192.168.5.*') + + # Stoping dnsmasq as networkd won't be allowed to renew the DHCP lease. + self.stop_dnsmasq(dnsmasq_pid_file) + + # Sleep for 120 sec as the dnsmasq minimum lease time can only be set to 120 + time.sleep(125) + + output = subprocess.check_output(['networkctl', 'status', 'veth99']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, '192.168.5.*') + + def test_dhcp_client_reuse_address_as_static(self): + self.copy_unit_to_networkd_unit_path('25-veth.netdev', 'dhcp-server-veth-peer.network', 'dhcp-client.network') + self.start_networkd() + + self.assertTrue(self.link_exits('veth99')) + + self.start_dnsmasq() + + output = subprocess.check_output(['ip', 'address', 'show', 'dev', 'veth99', 'scope', 'global']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, '192.168.5') + self.assertRegex(output, '2600::') + + ipv4_address = re.search('192\.168\.5\.[0-9]*/24', output) + ipv6_address = re.search('2600::[0-9a-f:]*/128', output) + static_network = '\n'.join(['[Match]', 'Name=veth99', '[Network]', 'IPv6AcceptRA=no', 'Address=' + ipv4_address.group(), 'Address=' + ipv6_address.group()]) + print(static_network) + + self.remove_unit_from_networkd_path(['dhcp-client.network']) + + with open(os.path.join(network_unit_file_path, 'static.network'), mode='w') as f: + f.write(static_network) + + self.start_networkd() + + self.assertTrue(self.link_exits('veth99')) + + output = subprocess.check_output(['ip', '-4', 'address', 'show', 'dev', 'veth99', 'scope', 'global']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, '192.168.5') + self.assertRegex(output, 'valid_lft forever preferred_lft forever') + + output = subprocess.check_output(['ip', '-6', 'address', 'show', 'dev', 'veth99', 'scope', 'global']).rstrip().decode('utf-8') + print(output) + self.assertRegex(output, '2600::') + self.assertRegex(output, 'valid_lft forever preferred_lft forever') + +if __name__ == '__main__': + unittest.main(testRunner=unittest.TextTestRunner(stream=sys.stdout, + verbosity=3)) |