]> git.ipfire.org Git - thirdparty/systemd.git/blob - test/test-network/systemd-networkd-tests.py
Merge pull request #30284 from YHNdnzj/fstab-wantedby-defaultdeps
[thirdparty/systemd.git] / test / test-network / systemd-networkd-tests.py
1 #!/usr/bin/env python3
2 # SPDX-License-Identifier: LGPL-2.1-or-later
3 # systemd-networkd tests
4
5 # These tests can be executed in the systemd mkosi image when booted in QEMU. After booting the QEMU VM,
6 # simply run this file which can be found in the VM at /usr/lib/systemd/tests/testdata/test-network/systemd-networkd-tests.py.
7
8 import argparse
9 import datetime
10 import errno
11 import itertools
12 import json
13 import os
14 import pathlib
15 import re
16 import shutil
17 import signal
18 import socket
19 import subprocess
20 import sys
21 import time
22 import unittest
23
24 import psutil
25
26 network_unit_dir = '/run/systemd/network'
27 networkd_conf_dropin_dir = '/run/systemd/networkd.conf.d'
28 networkd_ci_temp_dir = '/run/networkd-ci'
29 udev_rules_dir = '/run/udev/rules.d'
30
31 dnsmasq_pid_file = '/run/networkd-ci/test-dnsmasq.pid'
32 dnsmasq_log_file = '/run/networkd-ci/test-dnsmasq.log'
33 dnsmasq_lease_file = '/run/networkd-ci/test-dnsmasq.lease'
34
35 isc_dhcpd_pid_file = '/run/networkd-ci/test-isc-dhcpd.pid'
36 isc_dhcpd_lease_file = '/run/networkd-ci/test-isc-dhcpd.lease'
37
38 radvd_pid_file = '/run/networkd-ci/test-radvd.pid'
39
40 systemd_lib_paths = ['/usr/lib/systemd', '/lib/systemd']
41 which_paths = ':'.join(systemd_lib_paths + os.getenv('PATH', os.defpath).lstrip(':').split(':'))
42 systemd_source_dir = None
43
44 networkd_bin = shutil.which('systemd-networkd', path=which_paths)
45 resolved_bin = shutil.which('systemd-resolved', path=which_paths)
46 timesyncd_bin = shutil.which('systemd-timesyncd', path=which_paths)
47 udevd_bin = shutil.which('systemd-udevd', path=which_paths)
48 wait_online_bin = shutil.which('systemd-networkd-wait-online', path=which_paths)
49 networkctl_bin = shutil.which('networkctl', path=which_paths)
50 resolvectl_bin = shutil.which('resolvectl', path=which_paths)
51 timedatectl_bin = shutil.which('timedatectl', path=which_paths)
52 udevadm_bin = shutil.which('udevadm', path=which_paths)
53 systemd_udev_rules_build_dir = None
54
55 use_valgrind = False
56 valgrind_cmd = ''
57 enable_debug = True
58 env = {}
59 wait_online_env = {}
60 asan_options = None
61 lsan_options = None
62 ubsan_options = None
63 with_coverage = False
64
65 active_units = []
66 protected_links = {
67 'erspan0',
68 'gre0',
69 'gretap0',
70 'ifb0',
71 'ifb1',
72 'ip6_vti0',
73 'ip6gre0',
74 'ip6tnl0',
75 'ip_vti0',
76 'lo',
77 'sit0',
78 'tunl0',
79 }
80 saved_routes = None
81 saved_ipv4_rules = None
82 saved_ipv6_rules = None
83 saved_timezone = None
84
85 def rm_f(path):
86 if os.path.exists(path):
87 os.remove(path)
88
89 def rm_rf(path):
90 shutil.rmtree(path, ignore_errors=True)
91
92 def cp(src, dst):
93 shutil.copy(src, dst)
94
95 def cp_r(src, dst):
96 shutil.copytree(src, dst, copy_function=shutil.copy)
97
98 def mkdir_p(path):
99 os.makedirs(path, exist_ok=True)
100
101 def touch(path):
102 pathlib.Path(path).touch()
103
104 # pylint: disable=R1710
105 def check_output(*command, **kwargs):
106 # This checks the result and returns stdout (and stderr) on success.
107 command = command[0].split() + list(command[1:])
108 ret = subprocess.run(command, check=False, universal_newlines=True, stdout=subprocess.PIPE, stderr=subprocess.STDOUT, **kwargs)
109 if ret.returncode == 0:
110 return ret.stdout.rstrip()
111 # When returncode != 0, print stdout and stderr, then trigger CalledProcessError.
112 print(ret.stdout)
113 ret.check_returncode()
114
115 def call(*command, **kwargs):
116 # This returns returncode. stdout and stderr are merged and shown in console
117 command = command[0].split() + list(command[1:])
118 return subprocess.run(command, check=False, universal_newlines=True, stderr=subprocess.STDOUT, **kwargs).returncode
119
120 def call_check(*command, **kwargs):
121 # Same as call() above, but it triggers CalledProcessError if rc != 0
122 command = command[0].split() + list(command[1:])
123 return subprocess.run(command, check=False, universal_newlines=True, stderr=subprocess.STDOUT, **kwargs).check_returncode()
124
125 def call_quiet(*command, **kwargs):
126 command = command[0].split() + list(command[1:])
127 return subprocess.run(command, check=False, universal_newlines=True, stdout=subprocess.DEVNULL, stderr=subprocess.DEVNULL, **kwargs).returncode
128
129 def run(*command, **kwargs):
130 # This returns CompletedProcess instance.
131 command = command[0].split() + list(command[1:])
132 return subprocess.run(command, check=False, universal_newlines=True, stdout=subprocess.PIPE, stderr=subprocess.PIPE, **kwargs)
133
134 def check_json(string):
135 try:
136 json.loads(string)
137 except json.JSONDecodeError:
138 print(f"String is not a valid JSON: '{string}'")
139 raise
140
141 def is_module_available(*module_names):
142 for module_name in module_names:
143 lsmod_output = check_output('lsmod')
144 module_re = re.compile(rf'^{re.escape(module_name)}\b', re.MULTILINE)
145 if not module_re.search(lsmod_output) and call_quiet('modprobe', module_name) != 0:
146 return False
147 return True
148
149 def expectedFailureIfModuleIsNotAvailable(*module_names):
150 def f(func):
151 return func if is_module_available(*module_names) else unittest.expectedFailure(func)
152
153 return f
154
155 def expectedFailureIfERSPANv0IsNotSupported():
156 # erspan version 0 is supported since f989d546a2d5a9f001f6f8be49d98c10ab9b1897 (v5.8)
157 def f(func):
158 rc = call_quiet('ip link add dev erspan99 type erspan seq key 30 local 192.168.1.4 remote 192.168.1.1 erspan_ver 0')
159 remove_link('erspan99')
160 return func if rc == 0 else unittest.expectedFailure(func)
161
162 return f
163
164 def expectedFailureIfERSPANv2IsNotSupported():
165 # erspan version 2 is supported since f551c91de262ba36b20c3ac19538afb4f4507441 (v4.16)
166 def f(func):
167 rc = call_quiet('ip link add dev erspan99 type erspan seq key 30 local 192.168.1.4 remote 192.168.1.1 erspan_ver 2')
168 remove_link('erspan99')
169 return func if rc == 0 else unittest.expectedFailure(func)
170
171 return f
172
173 def expectedFailureIfRoutingPolicyPortRangeIsNotAvailable():
174 def f(func):
175 rc = call_quiet('ip rule add from 192.168.100.19 sport 1123-1150 dport 3224-3290 table 7')
176 call_quiet('ip rule del from 192.168.100.19 sport 1123-1150 dport 3224-3290 table 7')
177 return func if rc == 0 else unittest.expectedFailure(func)
178
179 return f
180
181 def expectedFailureIfRoutingPolicyIPProtoIsNotAvailable():
182 def f(func):
183 rc = call_quiet('ip rule add not from 192.168.100.19 ipproto tcp table 7')
184 call_quiet('ip rule del not from 192.168.100.19 ipproto tcp table 7')
185 return func if rc == 0 else unittest.expectedFailure(func)
186
187 return f
188
189 def expectedFailureIfRoutingPolicyUIDRangeIsNotAvailable():
190 def f(func):
191 supported = False
192 if call_quiet('ip rule add from 192.168.100.19 table 7 uidrange 200-300') == 0:
193 ret = run('ip rule list from 192.168.100.19 table 7')
194 supported = ret.returncode == 0 and 'uidrange 200-300' in ret.stdout
195 call_quiet('ip rule del from 192.168.100.19 table 7 uidrange 200-300')
196 return func if supported else unittest.expectedFailure(func)
197
198 return f
199
200 def expectedFailureIfNexthopIsNotAvailable():
201 def f(func):
202 rc = call_quiet('ip nexthop list')
203 return func if rc == 0 else unittest.expectedFailure(func)
204
205 return f
206
207 def expectedFailureIfRTA_VIAIsNotSupported():
208 def f(func):
209 call_quiet('ip link add dummy98 type dummy')
210 call_quiet('ip link set up dev dummy98')
211 call_quiet('ip route add 2001:1234:5:8fff:ff:ff:ff:fe/128 dev dummy98')
212 rc = call_quiet('ip route add 10.10.10.10 via inet6 2001:1234:5:8fff:ff:ff:ff:fe dev dummy98')
213 remove_link('dummy98')
214 return func if rc == 0 else unittest.expectedFailure(func)
215
216 return f
217
218 def expectedFailureIfAlternativeNameIsNotAvailable():
219 def f(func):
220 call_quiet('ip link add dummy98 type dummy')
221 supported = \
222 call_quiet('ip link prop add dev dummy98 altname hogehogehogehogehoge') == 0 and \
223 call_quiet('ip link show dev hogehogehogehogehoge') == 0
224 remove_link('dummy98')
225 return func if supported else unittest.expectedFailure(func)
226
227 return f
228
229 def expectedFailureIfNetdevsimWithSRIOVIsNotAvailable():
230 def f(func):
231 def finalize(func, supported):
232 call_quiet('rmmod netdevsim')
233 return func if supported else unittest.expectedFailure(func)
234
235 call_quiet('rmmod netdevsim')
236 if call_quiet('modprobe netdevsim') != 0:
237 return finalize(func, False)
238
239 try:
240 with open('/sys/bus/netdevsim/new_device', mode='w', encoding='utf-8') as f:
241 f.write('99 1')
242 except OSError:
243 return finalize(func, False)
244
245 return finalize(func, os.path.exists('/sys/bus/netdevsim/devices/netdevsim99/sriov_numvfs'))
246
247 return f
248
249 # pylint: disable=C0415
250 def compare_kernel_version(min_kernel_version):
251 try:
252 import platform
253 from packaging import version
254 except ImportError:
255 print('Failed to import either platform or packaging module, assuming the comparison failed')
256 return False
257
258 # Get only the actual kernel version without any build/distro/arch stuff
259 # e.g. '5.18.5-200.fc36.x86_64' -> '5.18.5'
260 kver = platform.release().split('-')[0]
261 # Get also rid of '+'
262 kver = kver.split('+')[0]
263
264 return version.parse(kver) >= version.parse(min_kernel_version)
265
266 def udev_reload():
267 check_output(*udevadm_cmd, 'control', '--reload')
268
269 def copy_network_unit(*units, copy_dropins=True):
270 """
271 Copy networkd unit files into the testbed.
272
273 Any networkd unit file type can be specified, as well as drop-in files.
274
275 By default, all drop-ins for a specified unit file are copied in;
276 to avoid that specify dropins=False.
277
278 When a drop-in file is specified, its unit file is also copied in automatically.
279 """
280 has_link = False
281 mkdir_p(network_unit_dir)
282 for unit in units:
283 if copy_dropins and os.path.exists(os.path.join(networkd_ci_temp_dir, unit + '.d')):
284 cp_r(os.path.join(networkd_ci_temp_dir, unit + '.d'), os.path.join(network_unit_dir, unit + '.d'))
285
286 if unit.endswith('.conf'):
287 dropin = unit
288 unit = os.path.dirname(dropin).rstrip('.d')
289 dropindir = os.path.join(network_unit_dir, unit + '.d')
290 mkdir_p(dropindir)
291 cp(os.path.join(networkd_ci_temp_dir, dropin), dropindir)
292
293 cp(os.path.join(networkd_ci_temp_dir, unit), network_unit_dir)
294
295 if unit.endswith('.link'):
296 has_link = True
297
298 if has_link:
299 udev_reload()
300
301 def remove_network_unit(*units):
302 """
303 Remove previously copied unit files from the testbed.
304
305 Drop-ins will be removed automatically.
306 """
307 has_link = False
308 for unit in units:
309 rm_f(os.path.join(network_unit_dir, unit))
310 rm_rf(os.path.join(network_unit_dir, unit + '.d'))
311
312 if unit.endswith('.link') or unit.endswith('.link.d'):
313 has_link = True
314
315 if has_link:
316 udev_reload()
317
318 def clear_network_units():
319 has_link = False
320 if os.path.exists(network_unit_dir):
321 units = os.listdir(network_unit_dir)
322 for unit in units:
323 if unit.endswith('.link') or unit.endswith('.link.d'):
324 has_link = True
325
326 rm_rf(network_unit_dir)
327
328 if has_link:
329 udev_reload()
330
331 def copy_networkd_conf_dropin(*dropins):
332 """Copy networkd.conf dropin files into the testbed."""
333 mkdir_p(networkd_conf_dropin_dir)
334 for dropin in dropins:
335 cp(os.path.join(networkd_ci_temp_dir, dropin), networkd_conf_dropin_dir)
336
337 def remove_networkd_conf_dropin(*dropins):
338 """Remove previously copied networkd.conf dropin files from the testbed."""
339 for dropin in dropins:
340 rm_f(os.path.join(networkd_conf_dropin_dir, dropin))
341
342 def clear_networkd_conf_dropins():
343 rm_rf(networkd_conf_dropin_dir)
344
345 def setup_systemd_udev_rules():
346 if not systemd_udev_rules_build_dir:
347 return
348
349 mkdir_p(udev_rules_dir)
350
351 for path in [systemd_udev_rules_build_dir, os.path.join(systemd_source_dir, "rules.d")]:
352 print(f"Copying udev rules from {path} to {udev_rules_dir}")
353
354 for rule in os.listdir(path):
355 if not rule.endswith(".rules"):
356 continue
357 cp(os.path.join(path, rule), udev_rules_dir)
358
359 def copy_udev_rule(*rules):
360 """Copy udev rules"""
361 mkdir_p(udev_rules_dir)
362 for rule in rules:
363 cp(os.path.join(networkd_ci_temp_dir, rule), udev_rules_dir)
364
365 def remove_udev_rule(*rules):
366 """Remove previously copied udev rules"""
367 for rule in rules:
368 rm_f(os.path.join(udev_rules_dir, rule))
369
370 def clear_udev_rules():
371 rm_rf(udev_rules_dir)
372
373 def save_active_units():
374 for u in ['systemd-networkd.socket', 'systemd-networkd.service',
375 'systemd-resolved.service', 'systemd-timesyncd.service',
376 'firewalld.service']:
377 if call(f'systemctl is-active --quiet {u}') == 0:
378 call(f'systemctl stop {u}')
379 active_units.append(u)
380
381 def restore_active_units():
382 if 'systemd-networkd.socket' in active_units:
383 call('systemctl stop systemd-networkd.socket systemd-networkd.service')
384 for u in active_units:
385 call(f'systemctl restart {u}')
386
387 def create_unit_dropin(unit, contents):
388 mkdir_p(f'/run/systemd/system/{unit}.d')
389 with open(f'/run/systemd/system/{unit}.d/00-override.conf', mode='w', encoding='utf-8') as f:
390 f.write('\n'.join(contents))
391
392 def create_service_dropin(service, command, additional_settings=None):
393 drop_in = [
394 '[Service]',
395 'ExecStart=',
396 f'ExecStart=!!{valgrind_cmd}{command}',
397 ]
398 if enable_debug:
399 drop_in += ['Environment=SYSTEMD_LOG_LEVEL=debug']
400 if asan_options:
401 drop_in += [f'Environment=ASAN_OPTIONS="{asan_options}"']
402 if lsan_options:
403 drop_in += [f'Environment=LSAN_OPTIONS="{lsan_options}"']
404 if ubsan_options:
405 drop_in += [f'Environment=UBSAN_OPTIONS="{ubsan_options}"']
406 if asan_options or lsan_options or ubsan_options:
407 drop_in += ['SystemCallFilter=']
408 if use_valgrind or asan_options or lsan_options or ubsan_options:
409 drop_in += ['MemoryDenyWriteExecute=no']
410 if use_valgrind:
411 drop_in += [
412 'Environment=SYSTEMD_MEMPOOL=0',
413 'PrivateTmp=yes',
414 ]
415 if with_coverage:
416 drop_in += [
417 'ProtectSystem=no',
418 'ProtectHome=no',
419 ]
420 if additional_settings:
421 drop_in += additional_settings
422
423 create_unit_dropin(f'{service}.service', drop_in)
424
425 def link_exists(link):
426 return call_quiet(f'ip link show {link}') == 0
427
428 def link_resolve(link):
429 return check_output(f'ip link show {link}').split(':')[1].strip()
430
431 def remove_link(*links, protect=False):
432 for link in links:
433 if protect and link in protected_links:
434 continue
435 if link_exists(link):
436 call(f'ip link del dev {link}')
437
438 def save_existing_links():
439 links = os.listdir('/sys/class/net')
440 for link in links:
441 if link_exists(link):
442 protected_links.add(link)
443
444 print('### The following links will be protected:')
445 print(', '.join(sorted(list(protected_links))))
446
447 def flush_links():
448 links = os.listdir('/sys/class/net')
449 remove_link(*links, protect=True)
450
451 def flush_nexthops():
452 # Currently, the 'ip nexthop' command does not have 'save' and 'restore'.
453 # Hence, we cannot restore nexthops in a simple way.
454 # Let's assume there is no nexthop used in the system
455 call_quiet('ip nexthop flush')
456
457 def save_routes():
458 # pylint: disable=global-statement
459 global saved_routes
460 saved_routes = check_output('ip route show table all')
461 print('### The following routes will be protected:')
462 print(saved_routes)
463
464 def flush_routes():
465 have = False
466 output = check_output('ip route show table all')
467 for line in output.splitlines():
468 if line in saved_routes:
469 continue
470 if 'proto kernel' in line:
471 continue
472 if ' dev ' in line and not ' dev lo ' in line:
473 continue
474 if not have:
475 have = True
476 print('### Removing routes that did not exist when the test started.')
477 print(f'# {line}')
478 call(f'ip route del {line}')
479
480 def save_routing_policy_rules():
481 # pylint: disable=global-statement
482 global saved_ipv4_rules, saved_ipv6_rules
483 def save(ipv):
484 output = check_output(f'ip -{ipv} rule show')
485 print(f'### The following IPv{ipv} routing policy rules will be protected:')
486 print(output)
487 return output
488
489 saved_ipv4_rules = save(4)
490 saved_ipv6_rules = save(6)
491
492 def flush_routing_policy_rules():
493 def flush(ipv, saved_rules):
494 have = False
495 output = check_output(f'ip -{ipv} rule show')
496 for line in output.splitlines():
497 if line in saved_rules:
498 continue
499 if not have:
500 have = True
501 print(f'### Removing IPv{ipv} routing policy rules that did not exist when the test started.')
502 print(f'# {line}')
503 words = line.replace('lookup [l3mdev-table]', 'l3mdev').split()
504 priority = words[0].rstrip(':')
505 call(f'ip -{ipv} rule del priority {priority} ' + ' '.join(words[1:]))
506
507 flush(4, saved_ipv4_rules)
508 flush(6, saved_ipv6_rules)
509
510 def flush_fou_ports():
511 ret = run('ip fou show')
512 if ret.returncode != 0:
513 return # fou may not be supported
514 for line in ret.stdout.splitlines():
515 port = line.split()[1]
516 call(f'ip fou del port {port}')
517
518 def flush_l2tp_tunnels():
519 tids = []
520 ret = run('ip l2tp show tunnel')
521 if ret.returncode != 0:
522 return # l2tp may not be supported
523 for line in ret.stdout.splitlines():
524 words = line.split()
525 if words[0] == 'Tunnel':
526 tid = words[1].rstrip(',')
527 call(f'ip l2tp del tunnel tunnel_id {tid}')
528 tids.append(tid)
529
530 # Removing L2TP tunnel is asynchronous and slightly takes a time.
531 for tid in tids:
532 for _ in range(50):
533 r = run(f'ip l2tp show tunnel tunnel_id {tid}')
534 if r.returncode != 0 or len(r.stdout.rstrip()) == 0:
535 break
536 time.sleep(.2)
537 else:
538 print(f'Cannot remove L2TP tunnel {tid}, ignoring.')
539
540 def save_timezone():
541 # pylint: disable=global-statement
542 global saved_timezone
543 r = run(*timedatectl_cmd, 'show', '--value', '--property', 'Timezone', env=env)
544 if r.returncode == 0:
545 saved_timezone = r.stdout.rstrip()
546 print(f'### Saved timezone: {saved_timezone}')
547
548 def restore_timezone():
549 if saved_timezone:
550 call(*timedatectl_cmd, 'set-timezone', f'{saved_timezone}', env=env)
551
552 def read_link_attr(*args):
553 with open(os.path.join('/sys/class/net', *args), encoding='utf-8') as f:
554 return f.readline().strip()
555
556 def read_manager_state_file():
557 with open('/run/systemd/netif/state', encoding='utf-8') as f:
558 return f.read()
559
560 def read_link_state_file(link):
561 ifindex = read_link_attr(link, 'ifindex')
562 path = os.path.join('/run/systemd/netif/links', ifindex)
563 with open(path, encoding='utf-8') as f:
564 return f.read()
565
566 def read_ip_sysctl_attr(link, attribute, ipv):
567 with open(os.path.join('/proc/sys/net', ipv, 'conf', link, attribute), encoding='utf-8') as f:
568 return f.readline().strip()
569
570 def read_ipv6_sysctl_attr(link, attribute):
571 return read_ip_sysctl_attr(link, attribute, 'ipv6')
572
573 def read_ipv4_sysctl_attr(link, attribute):
574 return read_ip_sysctl_attr(link, attribute, 'ipv4')
575
576 def stop_by_pid_file(pid_file):
577 if not os.path.exists(pid_file):
578 return
579 with open(pid_file, 'r', encoding='utf-8') as f:
580 pid = f.read().rstrip(' \t\r\n\0')
581 os.kill(int(pid), signal.SIGTERM)
582 for _ in range(25):
583 try:
584 os.kill(int(pid), 0)
585 print(f"PID {pid} is still alive, waiting...")
586 time.sleep(.2)
587 except OSError as e:
588 if e.errno == errno.ESRCH:
589 break
590 print(f"Unexpected exception when waiting for {pid} to die: {e.errno}")
591 rm_f(pid_file)
592
593 def start_dnsmasq(*additional_options, interface='veth-peer', ra_mode=None, ipv4_range='192.168.5.10,192.168.5.200', ipv4_router='192.168.5.1', ipv6_range='2600::10,2600::20'):
594 if ra_mode:
595 ra_mode = f',{ra_mode}'
596 else:
597 ra_mode = ''
598
599 command = (
600 'dnsmasq',
601 f'--log-facility={dnsmasq_log_file}',
602 '--log-queries=extra',
603 '--log-dhcp',
604 f'--pid-file={dnsmasq_pid_file}',
605 '--conf-file=/dev/null',
606 '--bind-interfaces',
607 f'--interface={interface}',
608 f'--dhcp-leasefile={dnsmasq_lease_file}',
609 '--enable-ra',
610 f'--dhcp-range={ipv6_range}{ra_mode},2m',
611 f'--dhcp-range={ipv4_range},2m',
612 '--dhcp-option=option:mtu,1492',
613 f'--dhcp-option=option:router,{ipv4_router}',
614 '--port=0',
615 '--no-resolv',
616 ) + additional_options
617 check_output(*command)
618
619 def stop_dnsmasq():
620 stop_by_pid_file(dnsmasq_pid_file)
621 rm_f(dnsmasq_lease_file)
622 rm_f(dnsmasq_log_file)
623
624 def read_dnsmasq_log_file():
625 with open(dnsmasq_log_file, encoding='utf-8') as f:
626 return f.read()
627
628 def start_isc_dhcpd(conf_file, ipv, interface='veth-peer'):
629 conf_file_path = os.path.join(networkd_ci_temp_dir, conf_file)
630 isc_dhcpd_command = f'dhcpd {ipv} -cf {conf_file_path} -lf {isc_dhcpd_lease_file} -pf {isc_dhcpd_pid_file} {interface}'
631 touch(isc_dhcpd_lease_file)
632 check_output(isc_dhcpd_command)
633
634 def stop_isc_dhcpd():
635 stop_by_pid_file(isc_dhcpd_pid_file)
636 rm_f(isc_dhcpd_lease_file)
637
638 def get_dbus_link_path(link):
639 out = subprocess.check_output(['busctl', 'call', 'org.freedesktop.network1',
640 '/org/freedesktop/network1', 'org.freedesktop.network1.Manager',
641 'GetLinkByName', 's', link])
642
643 assert out.startswith(b'io ')
644 out = out.strip()
645 assert out.endswith(b'"')
646 out = out.decode()
647 return out[:-1].split('"')[1]
648
649 def get_dhcp_client_state(link, family):
650 link_path = get_dbus_link_path(link)
651
652 out = subprocess.check_output(['busctl', 'get-property', 'org.freedesktop.network1',
653 link_path, f'org.freedesktop.network1.DHCPv{family}Client', 'State'])
654 assert out.startswith(b's "')
655 out = out.strip()
656 assert out.endswith(b'"')
657 return out[3:-1].decode()
658
659 def get_dhcp4_client_state(link):
660 return get_dhcp_client_state(link, '4')
661
662 def get_dhcp6_client_state(link):
663 return get_dhcp_client_state(link, '6')
664
665 def get_link_description(link):
666 link_path = get_dbus_link_path(link)
667
668 out = subprocess.check_output(['busctl', 'call', 'org.freedesktop.network1',
669 link_path, 'org.freedesktop.network1.Link', 'Describe'])
670 assert out.startswith(b's "')
671 out = out.strip()
672 assert out.endswith(b'"')
673 json_raw = out[2:].decode()
674 check_json(json_raw)
675 description = json.loads(json_raw) # Convert from escaped sequences to json
676 check_json(description)
677 return json.loads(description) # Now parse the json
678
679 def start_radvd(*additional_options, config_file):
680 config_file_path = os.path.join(networkd_ci_temp_dir, 'radvd', config_file)
681 command = (
682 'radvd',
683 f'--pidfile={radvd_pid_file}',
684 f'--config={config_file_path}',
685 '--logmethod=stderr',
686 ) + additional_options
687 check_output(*command)
688
689 def stop_radvd():
690 stop_by_pid_file(radvd_pid_file)
691
692 def radvd_check_config(config_file):
693 if not shutil.which('radvd'):
694 print('radvd is not installed, assuming the config check failed')
695 return False
696
697 # Note: can't use networkd_ci_temp_dir here, as this command may run before that dir is
698 # set up (one instance is @unittest.skipX())
699 config_file_path = os.path.join(os.path.dirname(os.path.abspath(__file__)), 'conf/radvd', config_file)
700 return call(f'radvd --config={config_file_path} --configtest') == 0
701
702 def networkd_invocation_id():
703 return check_output('systemctl show --value -p InvocationID systemd-networkd.service')
704
705 def read_networkd_log(invocation_id=None, since=None):
706 if not invocation_id:
707 invocation_id = networkd_invocation_id()
708 command = [
709 'journalctl',
710 f'_SYSTEMD_INVOCATION_ID={invocation_id}',
711 ]
712 if since:
713 command.append(f'--since={since}')
714 return check_output(*command)
715
716 def stop_networkd(show_logs=True):
717 if show_logs:
718 invocation_id = networkd_invocation_id()
719 check_output('systemctl stop systemd-networkd.socket')
720 check_output('systemctl stop systemd-networkd.service')
721 if show_logs:
722 print(read_networkd_log(invocation_id))
723 # Check if networkd exits cleanly.
724 assert call_quiet('systemctl is-failed -q systemd-networkd.service') == 1
725
726 def start_networkd():
727 check_output('systemctl start systemd-networkd')
728
729 def restart_networkd(show_logs=True):
730 if show_logs:
731 invocation_id = networkd_invocation_id()
732 check_output('systemctl restart systemd-networkd.service')
733 if show_logs:
734 print(read_networkd_log(invocation_id))
735
736 def networkd_pid():
737 return int(check_output('systemctl show --value -p MainPID systemd-networkd.service'))
738
739 def networkctl_reconfigure(*links):
740 check_output(*networkctl_cmd, 'reconfigure', *links, env=env)
741
742 def networkctl_reload(sleep_time=1):
743 check_output(*networkctl_cmd, 'reload', env=env)
744 # 'networkctl reload' asynchronously reconfigure links.
745 # Hence, we need to wait for a short time for link to be in configuring state.
746 if sleep_time > 0:
747 time.sleep(sleep_time)
748
749 def setup_common():
750 print()
751
752 def tear_down_common():
753 # 1. stop DHCP/RA servers
754 stop_dnsmasq()
755 stop_isc_dhcpd()
756 stop_radvd()
757
758 # 2. remove modules
759 call_quiet('rmmod netdevsim')
760 call_quiet('rmmod sch_teql')
761
762 # 3. remove network namespace
763 call_quiet('ip netns del ns99')
764
765 # 4. remove links
766 flush_l2tp_tunnels()
767 flush_links()
768
769 # 5. stop networkd
770 stop_networkd()
771
772 # 6. remove configs
773 clear_network_units()
774 clear_networkd_conf_dropins()
775
776 # 7. flush settings
777 flush_fou_ports()
778 flush_nexthops()
779 flush_routing_policy_rules()
780 flush_routes()
781
782 def setUpModule():
783 rm_rf(networkd_ci_temp_dir)
784 cp_r(os.path.join(os.path.dirname(os.path.abspath(__file__)), 'conf'), networkd_ci_temp_dir)
785
786 clear_network_units()
787 clear_networkd_conf_dropins()
788 clear_udev_rules()
789
790 setup_systemd_udev_rules()
791 copy_udev_rule('00-debug-net.rules')
792
793 # Save current state
794 save_active_units()
795 save_existing_links()
796 save_routes()
797 save_routing_policy_rules()
798 save_timezone()
799
800 create_service_dropin('systemd-networkd', networkd_bin,
801 ['[Service]',
802 'Restart=no',
803 'Environment=SYSTEMD_NETWORK_TEST_MODE=yes',
804 '[Unit]',
805 'StartLimitIntervalSec=0'])
806 create_service_dropin('systemd-resolved', resolved_bin)
807 create_service_dropin('systemd-timesyncd', timesyncd_bin)
808
809 # TODO: also run udevd with sanitizers, valgrind, or coverage
810 #create_service_dropin('systemd-udevd', udevd_bin,
811 # f'{udevadm_bin} control --reload --timeout 0')
812 create_unit_dropin(
813 'systemd-udevd.service',
814 [
815 '[Service]',
816 'ExecStart=',
817 f'ExecStart=!!@{udevd_bin} systemd-udevd',
818 ]
819 )
820 create_unit_dropin(
821 'systemd-networkd.socket',
822 [
823 '[Unit]',
824 'StartLimitIntervalSec=0',
825 ]
826 )
827
828 check_output('systemctl daemon-reload')
829 print(check_output('systemctl cat systemd-networkd.service'))
830 print(check_output('systemctl cat systemd-resolved.service'))
831 print(check_output('systemctl cat systemd-timesyncd.service'))
832 print(check_output('systemctl cat systemd-udevd.service'))
833 check_output('systemctl restart systemd-resolved.service')
834 check_output('systemctl restart systemd-timesyncd.service')
835 check_output('systemctl restart systemd-udevd.service')
836
837 def tearDownModule():
838 rm_rf(networkd_ci_temp_dir)
839 clear_udev_rules()
840 clear_network_units()
841 clear_networkd_conf_dropins()
842
843 restore_timezone()
844
845 rm_rf('/run/systemd/system/systemd-networkd.service.d')
846 rm_rf('/run/systemd/system/systemd-networkd.socket.d')
847 rm_rf('/run/systemd/system/systemd-resolved.service.d')
848 rm_rf('/run/systemd/system/systemd-timesyncd.service.d')
849 rm_rf('/run/systemd/system/systemd-udevd.service.d')
850 check_output('systemctl daemon-reload')
851 check_output('systemctl restart systemd-udevd.service')
852 restore_active_units()
853
854 class Utilities():
855 # pylint: disable=no-member
856
857 def check_link_exists(self, link, expected=True):
858 if expected:
859 self.assertTrue(link_exists(link))
860 else:
861 self.assertFalse(link_exists(link))
862
863 def check_link_attr(self, *args):
864 self.assertEqual(read_link_attr(*args[:-1]), args[-1])
865
866 def check_bridge_port_attr(self, master, port, attribute, expected, allow_enoent=False):
867 path = os.path.join('/sys/devices/virtual/net', master, 'lower_' + port, 'brport', attribute)
868 if allow_enoent and not os.path.exists(path):
869 return
870 with open(path, encoding='utf-8') as f:
871 self.assertEqual(f.readline().strip(), expected)
872
873 def check_ipv4_sysctl_attr(self, link, attribute, expected):
874 self.assertEqual(read_ipv4_sysctl_attr(link, attribute), expected)
875
876 def check_ipv6_sysctl_attr(self, link, attribute, expected):
877 self.assertEqual(read_ipv6_sysctl_attr(link, attribute), expected)
878
879 def wait_links(self, *links, timeout=20, fail_assert=True):
880 def links_exist(*links):
881 for link in links:
882 if not link_exists(link):
883 return False
884 return True
885
886 for iteration in range(timeout + 1):
887 if iteration > 0:
888 time.sleep(1)
889
890 if links_exist(*links):
891 return True
892 if fail_assert:
893 self.fail('Timed out waiting for all links to be created: ' + ', '.join(list(links)))
894 return False
895
896 def wait_activated(self, link, state='down', timeout=20, fail_assert=True):
897 # wait for the interface is activated.
898 invocation_id = check_output('systemctl show systemd-networkd -p InvocationID --value')
899 needle = f'{link}: Bringing link {state}'
900 flag = state.upper()
901 for iteration in range(timeout + 1):
902 if iteration != 0:
903 time.sleep(1)
904 if not link_exists(link):
905 continue
906 output = check_output('journalctl _SYSTEMD_INVOCATION_ID=' + invocation_id)
907 if needle in output and flag in check_output(f'ip link show {link}'):
908 return True
909 if fail_assert:
910 self.fail(f'Timed out waiting for {link} activated.')
911 return False
912
913 def wait_operstate(self, link, operstate='degraded', setup_state='configured', setup_timeout=5, fail_assert=True):
914 """Wait for the link to reach the specified operstate and/or setup state.
915
916 Specify None or '' for either operstate or setup_state to ignore that state.
917 This will recheck until the state conditions are met or the timeout expires.
918
919 If the link successfully matches the requested state, this returns True.
920 If this times out waiting for the link to match, the behavior depends on the
921 'fail_assert' parameter; if True, this causes a test assertion failure,
922 otherwise this returns False. The default is to cause assertion failure.
923
924 Note that this function matches on *exactly* the given operstate and setup_state.
925 To wait for a link to reach *or exceed* a given operstate, use wait_online().
926 """
927 if not operstate:
928 operstate = r'\S+'
929 if not setup_state:
930 setup_state = r'\S+'
931
932 for secs in range(setup_timeout + 1):
933 if secs != 0:
934 time.sleep(1)
935 if not link_exists(link):
936 continue
937 output = check_output(*networkctl_cmd, '-n', '0', 'status', link, env=env)
938 if re.search(rf'(?m)^\s*State:\s+{operstate}\s+\({setup_state}\)\s*$', output):
939 return True
940
941 if fail_assert:
942 self.fail(f'Timed out waiting for {link} to reach state {operstate}/{setup_state}')
943 return False
944
945 def wait_online(self, links_with_operstate, timeout='20s', bool_any=False, ipv4=False, ipv6=False, setup_state='configured', setup_timeout=5):
946 """Wait for the links to reach the specified operstate and/or setup state.
947
948 This is similar to wait_operstate() but can be used for multiple links,
949 and it also calls systemd-networkd-wait-online to wait for the given operstate.
950 The operstate should be specified in the link name, like 'eth0:degraded'.
951 If just a link name is provided, wait-online's default operstate to wait for is degraded.
952
953 The 'timeout' parameter controls the systemd-networkd-wait-online timeout, and the
954 'setup_timeout' controls the per-link timeout waiting for the setup_state.
955
956 Set 'bool_any' to True to wait for any (instead of all) of the given links.
957 If this is set, no setup_state checks are done.
958
959 Set 'ipv4' or 'ipv6' to True to wait for IPv4 address or IPv6 address, respectively, of each of the given links.
960 This is applied only for the operational state 'degraded' or above.
961
962 Note that this function waits for the links to reach *or exceed* the given operstate.
963 However, the setup_state, if specified, must be matched *exactly*.
964
965 This returns if the links reached the requested operstate/setup_state; otherwise it
966 raises CalledProcessError or fails test assertion.
967 """
968 args = wait_online_cmd + [f'--timeout={timeout}'] + [f'--interface={link}' for link in links_with_operstate] + [f'--ignore={link}' for link in protected_links]
969 if bool_any:
970 args += ['--any']
971 if ipv4:
972 args += ['--ipv4']
973 if ipv6:
974 args += ['--ipv6']
975 try:
976 check_output(*args, env=wait_online_env)
977 except subprocess.CalledProcessError:
978 # show detailed status on failure
979 for link in links_with_operstate:
980 name = link.split(':')[0]
981 if link_exists(name):
982 call(*networkctl_cmd, '-n', '0', 'status', name, env=env)
983 raise
984 if not bool_any and setup_state:
985 for link in links_with_operstate:
986 self.wait_operstate(link.split(':')[0], None, setup_state, setup_timeout)
987
988 def wait_address(self, link, address_regex, scope='global', ipv='', timeout_sec=100):
989 for i in range(timeout_sec):
990 if i > 0:
991 time.sleep(1)
992 output = check_output(f'ip {ipv} address show dev {link} scope {scope}')
993 if re.search(address_regex, output) and 'tentative' not in output:
994 break
995
996 self.assertRegex(output, address_regex)
997
998 def wait_address_dropped(self, link, address_regex, scope='global', ipv='', timeout_sec=100):
999 for i in range(timeout_sec):
1000 if i > 0:
1001 time.sleep(1)
1002 output = check_output(f'ip {ipv} address show dev {link} scope {scope}')
1003 if not re.search(address_regex, output):
1004 break
1005
1006 self.assertNotRegex(output, address_regex)
1007
1008 def wait_route(self, link, route_regex, table='main', ipv='', timeout_sec=100):
1009 for i in range(timeout_sec):
1010 if i > 0:
1011 time.sleep(1)
1012 output = check_output(f'ip {ipv} route show dev {link} table {table}')
1013 if re.search(route_regex, output):
1014 break
1015
1016 self.assertRegex(output, route_regex)
1017
1018 def check_netlabel(self, interface, address, label='system_u:object_r:root_t:s0'):
1019 if not shutil.which('selinuxenabled'):
1020 print('## Checking NetLabel skipped: selinuxenabled command not found.')
1021 elif call_quiet('selinuxenabled') != 0:
1022 print('## Checking NetLabel skipped: SELinux disabled.')
1023 elif not shutil.which('netlabelctl'): # not packaged by all distros
1024 print('## Checking NetLabel skipped: netlabelctl command not found.')
1025 else:
1026 output = check_output('netlabelctl unlbl list')
1027 print(output)
1028 self.assertRegex(output, f'interface:{interface},address:{address},label:"{label}"')
1029
1030 def setup_nftset(self, filter_name, filter_type, flags=''):
1031 if not shutil.which('nft'):
1032 print('## Setting up NFT sets skipped: nft command not found.')
1033 else:
1034 if call(f'nft add table inet sd_test') != 0:
1035 print('## Setting up NFT table failed.')
1036 self.fail()
1037 if call(f'nft add set inet sd_test {filter_name} {{ type {filter_type}; {flags} }}') != 0:
1038 print('## Setting up NFT sets failed.')
1039 self.fail()
1040
1041 def teardown_nftset(self, *filters):
1042 if not shutil.which('nft'):
1043 print('## Tearing down NFT sets skipped: nft command not found.')
1044 else:
1045 for filter_name in filters:
1046 if call(f'nft delete set inet sd_test {filter_name}') != 0:
1047 print('## Tearing down NFT sets failed.')
1048 self.fail()
1049 if call(f'nft delete table inet sd_test') != 0:
1050 print('## Tearing down NFT table failed.')
1051 self.fail()
1052
1053 def check_nftset(self, filter_name, contents):
1054 if not shutil.which('nft'):
1055 print('## Checking NFT sets skipped: nft command not found.')
1056 else:
1057 output = check_output(f'nft list set inet sd_test {filter_name}')
1058 print(output)
1059 self.assertRegex(output, r'.*elements = { [^}]*' + contents + r'[^}]* }.*')
1060
1061 class NetworkctlTests(unittest.TestCase, Utilities):
1062
1063 def setUp(self):
1064 setup_common()
1065
1066 def tearDown(self):
1067 tear_down_common()
1068
1069 @expectedFailureIfAlternativeNameIsNotAvailable()
1070 def test_altname(self):
1071 copy_network_unit('26-netdev-link-local-addressing-yes.network', '12-dummy.netdev', '12-dummy.link')
1072 start_networkd()
1073 self.wait_online(['dummy98:degraded'])
1074
1075 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'dummy98', env=env)
1076 self.assertRegex(output, 'hogehogehogehogehogehoge')
1077
1078 @expectedFailureIfAlternativeNameIsNotAvailable()
1079 def test_rename_to_altname(self):
1080 copy_network_unit('26-netdev-link-local-addressing-yes.network',
1081 '12-dummy.netdev', '12-dummy-rename-to-altname.link')
1082 start_networkd()
1083 self.wait_online(['dummyalt:degraded'])
1084
1085 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'dummyalt', env=env)
1086 self.assertIn('hogehogehogehogehogehoge', output)
1087 self.assertNotIn('dummy98', output)
1088
1089 def test_reconfigure(self):
1090 copy_network_unit('25-address-static.network', '12-dummy.netdev')
1091 start_networkd()
1092 self.wait_online(['dummy98:routable'])
1093
1094 output = check_output('ip -4 address show dev dummy98')
1095 print(output)
1096 self.assertIn('inet 10.1.2.3/16 brd 10.1.255.255 scope global dummy98', output)
1097 self.assertIn('inet 10.1.2.4/16 brd 10.1.255.255 scope global secondary dummy98', output)
1098 self.assertIn('inet 10.2.2.4/16 brd 10.2.255.255 scope global dummy98', output)
1099
1100 check_output('ip address del 10.1.2.3/16 dev dummy98')
1101 check_output('ip address del 10.1.2.4/16 dev dummy98')
1102 check_output('ip address del 10.2.2.4/16 dev dummy98')
1103
1104 networkctl_reconfigure('dummy98')
1105 self.wait_online(['dummy98:routable'])
1106
1107 output = check_output('ip -4 address show dev dummy98')
1108 print(output)
1109 self.assertIn('inet 10.1.2.3/16 brd 10.1.255.255 scope global dummy98', output)
1110 self.assertIn('inet 10.1.2.4/16 brd 10.1.255.255 scope global secondary dummy98', output)
1111 self.assertIn('inet 10.2.2.4/16 brd 10.2.255.255 scope global dummy98', output)
1112
1113 remove_network_unit('25-address-static.network')
1114
1115 networkctl_reload()
1116 self.wait_operstate('dummy98', 'degraded', setup_state='unmanaged')
1117
1118 output = check_output('ip -4 address show dev dummy98')
1119 print(output)
1120 self.assertNotIn('inet 10.1.2.3/16 brd 10.1.255.255 scope global dummy98', output)
1121 self.assertNotIn('inet 10.1.2.4/16 brd 10.1.255.255 scope global secondary dummy98', output)
1122 self.assertNotIn('inet 10.2.2.4/16 brd 10.2.255.255 scope global dummy98', output)
1123
1124 copy_network_unit('25-address-static.network')
1125 networkctl_reload()
1126 self.wait_online(['dummy98:routable'])
1127
1128 output = check_output('ip -4 address show dev dummy98')
1129 print(output)
1130 self.assertIn('inet 10.1.2.3/16 brd 10.1.255.255 scope global dummy98', output)
1131 self.assertIn('inet 10.1.2.4/16 brd 10.1.255.255 scope global secondary dummy98', output)
1132 self.assertIn('inet 10.2.2.4/16 brd 10.2.255.255 scope global dummy98', output)
1133
1134 def test_renew(self):
1135 def check():
1136 self.wait_online(['veth99:routable', 'veth-peer:routable'])
1137 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'veth99', env=env)
1138 print(output)
1139 self.assertRegex(output, r'Address: 192.168.5.[0-9]* \(DHCP4 via 192.168.5.1\)')
1140 self.assertIn('Gateway: 192.168.5.3', output)
1141 self.assertRegex(output, 'DNS: 192.168.5.1\n *192.168.5.10')
1142 self.assertRegex(output, 'NTP: 192.168.5.1\n *192.168.5.11')
1143
1144 copy_network_unit('25-veth.netdev', '25-dhcp-client.network', '25-dhcp-server.network')
1145 start_networkd()
1146 check()
1147 output = check_output(*networkctl_cmd, '--lines=0', '--stats', '--all', '--full', '--json=short', 'status')
1148 check_json(output)
1149
1150 for verb in ['renew', 'forcerenew']:
1151 call_check(*networkctl_cmd, verb, 'veth99')
1152 check()
1153 call_check(*networkctl_cmd, verb, 'veth99', 'veth99', 'veth99')
1154 check()
1155
1156 def test_up_down(self):
1157 copy_network_unit('25-address-static.network', '12-dummy.netdev')
1158 start_networkd()
1159 self.wait_online(['dummy98:routable'])
1160
1161 call_check(*networkctl_cmd, 'down', 'dummy98')
1162 self.wait_online(['dummy98:off'])
1163 call_check(*networkctl_cmd, 'up', 'dummy98')
1164 self.wait_online(['dummy98:routable'])
1165 call_check(*networkctl_cmd, 'down', 'dummy98', 'dummy98', 'dummy98')
1166 self.wait_online(['dummy98:off'])
1167 call_check(*networkctl_cmd, 'up', 'dummy98', 'dummy98', 'dummy98')
1168 self.wait_online(['dummy98:routable'])
1169
1170 def test_reload(self):
1171 start_networkd()
1172
1173 copy_network_unit('11-dummy.netdev')
1174 networkctl_reload()
1175 self.wait_operstate('test1', 'off', setup_state='unmanaged')
1176
1177 copy_network_unit('11-dummy.network')
1178 networkctl_reload()
1179 self.wait_online(['test1:degraded'])
1180
1181 remove_network_unit('11-dummy.network')
1182 networkctl_reload()
1183 self.wait_operstate('test1', 'degraded', setup_state='unmanaged')
1184
1185 remove_network_unit('11-dummy.netdev')
1186 networkctl_reload()
1187 self.wait_operstate('test1', 'degraded', setup_state='unmanaged')
1188
1189 copy_network_unit('11-dummy.netdev', '11-dummy.network')
1190 networkctl_reload()
1191 self.wait_operstate('test1', 'degraded')
1192
1193 def test_glob(self):
1194 copy_network_unit('11-dummy.netdev', '11-dummy.network')
1195 start_networkd()
1196
1197 self.wait_online(['test1:degraded'])
1198
1199 output = check_output(*networkctl_cmd, 'list', env=env)
1200 self.assertRegex(output, '1 lo ')
1201 self.assertRegex(output, 'test1')
1202
1203 output = check_output(*networkctl_cmd, 'list', 'test1', env=env)
1204 self.assertNotRegex(output, '1 lo ')
1205 self.assertRegex(output, 'test1')
1206
1207 output = check_output(*networkctl_cmd, 'list', 'te*', env=env)
1208 self.assertNotRegex(output, '1 lo ')
1209 self.assertRegex(output, 'test1')
1210
1211 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'te*', env=env)
1212 self.assertNotRegex(output, '1: lo ')
1213 self.assertRegex(output, 'test1')
1214
1215 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'tes[a-z][0-9]', env=env)
1216 self.assertNotRegex(output, '1: lo ')
1217 self.assertRegex(output, 'test1')
1218
1219 def test_mtu(self):
1220 copy_network_unit('11-dummy-mtu.netdev', '11-dummy.network')
1221 start_networkd()
1222
1223 self.wait_online(['test1:degraded'])
1224
1225 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'test1', env=env)
1226 self.assertRegex(output, 'MTU: 1600')
1227
1228 def test_type(self):
1229 copy_network_unit('11-dummy.netdev', '11-dummy.network')
1230 start_networkd()
1231 self.wait_online(['test1:degraded'])
1232
1233 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'test1', env=env)
1234 print(output)
1235 self.assertRegex(output, 'Type: ether')
1236
1237 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'lo', env=env)
1238 print(output)
1239 self.assertRegex(output, 'Type: loopback')
1240
1241 def test_unit_file(self):
1242 copy_network_unit('11-test-unit-file.netdev', '11-test-unit-file.network', '11-test-unit-file.link')
1243 start_networkd()
1244 self.wait_online(['test1:degraded'])
1245
1246 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'test1', env=env)
1247 print(output)
1248 self.assertIn('Link File: /run/systemd/network/11-test-unit-file.link', output)
1249 self.assertIn('/run/systemd/network/11-test-unit-file.link.d/dropin.conf', output)
1250 self.assertIn('Network File: /run/systemd/network/11-test-unit-file.network', output)
1251 self.assertIn('/run/systemd/network/11-test-unit-file.network.d/dropin.conf', output)
1252
1253 output = read_networkd_log()
1254 self.assertIn('test1: Configuring with /run/systemd/network/11-test-unit-file.network (dropins: /run/systemd/network/11-test-unit-file.network.d/dropin.conf).', output)
1255
1256 # This test may be run on the system that has older udevd than 70f32a260b5ebb68c19ecadf5d69b3844896ba55 (v249).
1257 # In that case, the udev DB for the loopback network interface may already have ID_NET_LINK_FILE property.
1258 # Let's reprocess the interface and drop the property.
1259 check_output(*udevadm_cmd, 'trigger', '--settle', '--action=add', '/sys/class/net/lo')
1260 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'lo', env=env)
1261 print(output)
1262 self.assertIn('Link File: n/a', output)
1263 self.assertIn('Network File: n/a', output)
1264
1265 def test_delete_links(self):
1266 copy_network_unit('11-dummy.netdev', '11-dummy.network',
1267 '25-veth.netdev', '26-netdev-link-local-addressing-yes.network')
1268 start_networkd()
1269
1270 self.wait_online(['test1:degraded', 'veth99:degraded', 'veth-peer:degraded'])
1271
1272 check_output(*networkctl_cmd, 'delete', 'test1', 'veth99', env=env)
1273 self.check_link_exists('test1', expected=False)
1274 self.check_link_exists('veth99', expected=False)
1275 self.check_link_exists('veth-peer', expected=False)
1276
1277 def test_label(self):
1278 call_check(*networkctl_cmd, 'label')
1279
1280 class NetworkdMatchTests(unittest.TestCase, Utilities):
1281
1282 def setUp(self):
1283 setup_common()
1284
1285 def tearDown(self):
1286 tear_down_common()
1287
1288 @expectedFailureIfAlternativeNameIsNotAvailable()
1289 def test_match(self):
1290 copy_network_unit('12-dummy-mac.netdev',
1291 '12-dummy-match-mac-01.network',
1292 '12-dummy-match-mac-02.network',
1293 '12-dummy-match-renamed.network',
1294 '12-dummy-match-altname.network',
1295 '12-dummy-altname.link')
1296 start_networkd()
1297
1298 self.wait_online(['dummy98:routable'])
1299 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'dummy98', env=env)
1300 self.assertIn('Network File: /run/systemd/network/12-dummy-match-mac-01.network', output)
1301 output = check_output('ip -4 address show dev dummy98')
1302 self.assertIn('10.0.0.1/16', output)
1303
1304 check_output('ip link set dev dummy98 down')
1305 check_output('ip link set dev dummy98 address 12:34:56:78:9a:02')
1306
1307 self.wait_address('dummy98', '10.0.0.2/16', ipv='-4', timeout_sec=10)
1308 self.wait_online(['dummy98:routable'])
1309 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'dummy98', env=env)
1310 self.assertIn('Network File: /run/systemd/network/12-dummy-match-mac-02.network', output)
1311
1312 check_output('ip link set dev dummy98 down')
1313 check_output('ip link set dev dummy98 name dummy98-1')
1314
1315 self.wait_address('dummy98-1', '10.0.1.2/16', ipv='-4', timeout_sec=10)
1316 self.wait_online(['dummy98-1:routable'])
1317 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'dummy98-1', env=env)
1318 self.assertIn('Network File: /run/systemd/network/12-dummy-match-renamed.network', output)
1319
1320 check_output('ip link set dev dummy98-1 down')
1321 check_output('ip link set dev dummy98-1 name dummy98-2')
1322 check_output(*udevadm_cmd, 'trigger', '--action=add', '/sys/class/net/dummy98-2')
1323
1324 self.wait_address('dummy98-2', '10.0.2.2/16', ipv='-4', timeout_sec=10)
1325 self.wait_online(['dummy98-2:routable'])
1326 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'dummy98-2', env=env)
1327 self.assertIn('Network File: /run/systemd/network/12-dummy-match-altname.network', output)
1328
1329 def test_match_udev_property(self):
1330 copy_network_unit('12-dummy.netdev', '13-not-match-udev-property.network', '14-match-udev-property.network')
1331 start_networkd()
1332 self.wait_online(['dummy98:routable'])
1333
1334 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'dummy98', env=env)
1335 print(output)
1336 self.assertRegex(output, 'Network File: /run/systemd/network/14-match-udev-property')
1337
1338 class WaitOnlineTests(unittest.TestCase, Utilities):
1339
1340 def setUp(self):
1341 setup_common()
1342
1343 def tearDown(self):
1344 tear_down_common()
1345
1346 def test_wait_online_any(self):
1347 copy_network_unit('25-bridge.netdev', '25-bridge.network', '11-dummy.netdev', '11-dummy.network')
1348 start_networkd()
1349
1350 self.wait_online(['bridge99', 'test1:degraded'], bool_any=True)
1351
1352 self.wait_operstate('bridge99', '(off|no-carrier)', setup_state='configuring')
1353 self.wait_operstate('test1', 'degraded')
1354
1355 class NetworkdNetDevTests(unittest.TestCase, Utilities):
1356
1357 def setUp(self):
1358 setup_common()
1359
1360 def tearDown(self):
1361 tear_down_common()
1362
1363 def test_dropin_and_name_conflict(self):
1364 copy_network_unit('10-dropin-test.netdev', '15-name-conflict-test.netdev')
1365 start_networkd()
1366
1367 self.wait_online(['dropin-test:off'], setup_state='unmanaged')
1368
1369 output = check_output('ip link show dropin-test')
1370 print(output)
1371 self.assertRegex(output, '00:50:56:c0:00:28')
1372
1373 @expectedFailureIfModuleIsNotAvailable('bareudp')
1374 def test_bareudp(self):
1375 copy_network_unit('25-bareudp.netdev', '26-netdev-link-local-addressing-yes.network')
1376 start_networkd()
1377
1378 self.wait_online(['bareudp99:degraded'])
1379
1380 output = check_output('ip -d link show bareudp99')
1381 print(output)
1382 self.assertRegex(output, 'dstport 1000 ')
1383 self.assertRegex(output, 'ethertype ip ')
1384
1385 @expectedFailureIfModuleIsNotAvailable('batman-adv')
1386 def test_batadv(self):
1387 copy_network_unit('25-batadv.netdev', '26-netdev-link-local-addressing-yes.network')
1388 start_networkd()
1389
1390 self.wait_online(['batadv99:degraded'])
1391
1392 output = check_output('ip -d link show batadv99')
1393 print(output)
1394 self.assertRegex(output, 'batadv')
1395
1396 def test_bridge(self):
1397 copy_network_unit('25-bridge.netdev', '25-bridge-configure-without-carrier.network')
1398 start_networkd()
1399
1400 self.wait_online(['bridge99:no-carrier'])
1401
1402 tick = os.sysconf('SC_CLK_TCK')
1403 self.assertEqual(9, round(float(read_link_attr('bridge99', 'bridge', 'hello_time')) / tick))
1404 self.assertEqual(9, round(float(read_link_attr('bridge99', 'bridge', 'max_age')) / tick))
1405 self.assertEqual(9, round(float(read_link_attr('bridge99', 'bridge', 'forward_delay')) / tick))
1406 self.assertEqual(9, round(float(read_link_attr('bridge99', 'bridge', 'ageing_time')) / tick))
1407 self.assertEqual(9, int(read_link_attr('bridge99', 'bridge', 'priority')))
1408 self.assertEqual(1, int(read_link_attr('bridge99', 'bridge', 'multicast_querier')))
1409 self.assertEqual(1, int(read_link_attr('bridge99', 'bridge', 'multicast_snooping')))
1410 self.assertEqual(1, int(read_link_attr('bridge99', 'bridge', 'stp_state')))
1411 self.assertEqual(3, int(read_link_attr('bridge99', 'bridge', 'multicast_igmp_version')))
1412
1413 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'bridge99', env=env)
1414 print(output)
1415 self.assertRegex(output, 'Priority: 9')
1416 self.assertRegex(output, 'STP: yes')
1417 self.assertRegex(output, 'Multicast IGMP Version: 3')
1418
1419 output = check_output('ip -d link show bridge99')
1420 print(output)
1421 self.assertIn('vlan_filtering 1 ', output)
1422 self.assertIn('vlan_protocol 802.1ad ', output)
1423 self.assertIn('vlan_default_pvid 9 ', output)
1424
1425 def test_bond(self):
1426 copy_network_unit('25-bond.netdev', '25-bond-balanced-tlb.netdev')
1427 start_networkd()
1428
1429 self.wait_online(['bond99:off', 'bond98:off'], setup_state='unmanaged')
1430
1431 self.check_link_attr('bond99', 'bonding', 'mode', '802.3ad 4')
1432 self.check_link_attr('bond99', 'bonding', 'xmit_hash_policy', 'layer3+4 1')
1433 self.check_link_attr('bond99', 'bonding', 'miimon', '1000')
1434 self.check_link_attr('bond99', 'bonding', 'lacp_rate', 'fast 1')
1435 self.check_link_attr('bond99', 'bonding', 'updelay', '2000')
1436 self.check_link_attr('bond99', 'bonding', 'downdelay', '2000')
1437 self.check_link_attr('bond99', 'bonding', 'resend_igmp', '4')
1438 self.check_link_attr('bond99', 'bonding', 'min_links', '1')
1439 self.check_link_attr('bond99', 'bonding', 'ad_actor_sys_prio', '1218')
1440 self.check_link_attr('bond99', 'bonding', 'ad_user_port_key', '811')
1441 self.check_link_attr('bond99', 'bonding', 'ad_actor_system', '00:11:22:33:44:55')
1442
1443 self.check_link_attr('bond98', 'bonding', 'mode', 'balance-tlb 5')
1444 self.check_link_attr('bond98', 'bonding', 'tlb_dynamic_lb', '1')
1445
1446 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'bond99', env=env)
1447 print(output)
1448 self.assertIn('Mode: 802.3ad', output)
1449 self.assertIn('Miimon: 1s', output)
1450 self.assertIn('Updelay: 2s', output)
1451 self.assertIn('Downdelay: 2s', output)
1452
1453 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'bond98', env=env)
1454 print(output)
1455 self.assertIn('Mode: balance-tlb', output)
1456
1457 def test_vlan(self):
1458 copy_network_unit('21-vlan.netdev', '11-dummy.netdev',
1459 '21-vlan.network', '21-vlan-test1.network')
1460 start_networkd()
1461
1462 self.wait_online(['test1:degraded', 'vlan99:routable'])
1463
1464 output = check_output('ip -d link show test1')
1465 print(output)
1466 self.assertRegex(output, ' mtu 2000 ')
1467
1468 output = check_output('ip -d link show vlan99')
1469 print(output)
1470 self.assertIn(' mtu 2000 ', output)
1471 self.assertIn('REORDER_HDR', output)
1472 self.assertIn('LOOSE_BINDING', output)
1473 self.assertIn('GVRP', output)
1474 self.assertIn('MVRP', output)
1475 self.assertIn(' id 99 ', output)
1476 self.assertIn('ingress-qos-map { 4:100 7:13 }', output)
1477 self.assertIn('egress-qos-map { 0:1 1:3 6:6 7:7 10:3 }', output)
1478
1479 output = check_output('ip -4 address show dev test1')
1480 print(output)
1481 self.assertRegex(output, 'inet 192.168.24.5/24 brd 192.168.24.255 scope global test1')
1482 self.assertRegex(output, 'inet 192.168.25.5/24 brd 192.168.25.255 scope global test1')
1483
1484 output = check_output('ip -4 address show dev vlan99')
1485 print(output)
1486 self.assertRegex(output, 'inet 192.168.23.5/24 brd 192.168.23.255 scope global vlan99')
1487
1488 def test_vlan_on_bond(self):
1489 # For issue #24377 (https://github.com/systemd/systemd/issues/24377),
1490 # which is fixed by b05e52000b4eee764b383cc3031da0a3739e996e (PR#24020).
1491
1492 copy_network_unit('21-bond-802.3ad.netdev', '21-bond-802.3ad.network',
1493 '21-vlan-on-bond.netdev', '21-vlan-on-bond.network')
1494 start_networkd()
1495 self.wait_online(['bond99:off'])
1496 self.wait_operstate('vlan99', operstate='off', setup_state='configuring', setup_timeout=10)
1497
1498 # The commit b05e52000b4eee764b383cc3031da0a3739e996e adds ", ignoring". To make it easily confirmed
1499 # that the issue is fixed by the commit, let's allow to match both string.
1500 log_re = re.compile('vlan99: Could not bring up interface(, ignoring|): Network is down$', re.MULTILINE)
1501 for i in range(20):
1502 if i > 0:
1503 time.sleep(0.5)
1504 if log_re.search(read_networkd_log()):
1505 break
1506 else:
1507 self.fail()
1508
1509 copy_network_unit('11-dummy.netdev', '12-dummy.netdev', '21-dummy-bond-slave.network')
1510 networkctl_reload()
1511 self.wait_online(['test1:enslaved', 'dummy98:enslaved', 'bond99:carrier', 'vlan99:routable'])
1512
1513 def test_macvtap(self):
1514 first = True
1515 for mode in ['private', 'vepa', 'bridge', 'passthru']:
1516 if first:
1517 first = False
1518 else:
1519 self.tearDown()
1520
1521 print(f'### test_macvtap(mode={mode})')
1522 with self.subTest(mode=mode):
1523 copy_network_unit('21-macvtap.netdev', '26-netdev-link-local-addressing-yes.network',
1524 '11-dummy.netdev', '25-macvtap.network')
1525 with open(os.path.join(network_unit_dir, '21-macvtap.netdev'), mode='a', encoding='utf-8') as f:
1526 f.write('[MACVTAP]\nMode=' + mode)
1527 start_networkd()
1528
1529 self.wait_online(['macvtap99:degraded',
1530 'test1:carrier' if mode == 'passthru' else 'test1:degraded'])
1531
1532 output = check_output('ip -d link show macvtap99')
1533 print(output)
1534 self.assertRegex(output, 'macvtap mode ' + mode + ' ')
1535
1536 def test_macvlan(self):
1537 first = True
1538 for mode in ['private', 'vepa', 'bridge', 'passthru']:
1539 if first:
1540 first = False
1541 else:
1542 self.tearDown()
1543
1544 print(f'### test_macvlan(mode={mode})')
1545 with self.subTest(mode=mode):
1546 copy_network_unit('21-macvlan.netdev', '26-netdev-link-local-addressing-yes.network',
1547 '11-dummy.netdev', '25-macvlan.network')
1548 with open(os.path.join(network_unit_dir, '21-macvlan.netdev'), mode='a', encoding='utf-8') as f:
1549 f.write('[MACVLAN]\nMode=' + mode)
1550 start_networkd()
1551
1552 self.wait_online(['macvlan99:degraded',
1553 'test1:carrier' if mode == 'passthru' else 'test1:degraded'])
1554
1555 output = check_output('ip -d link show test1')
1556 print(output)
1557 self.assertRegex(output, ' mtu 2000 ')
1558
1559 output = check_output('ip -d link show macvlan99')
1560 print(output)
1561 self.assertRegex(output, ' mtu 2000 ')
1562 self.assertRegex(output, 'macvlan mode ' + mode + ' ')
1563
1564 remove_link('test1')
1565 time.sleep(1)
1566
1567 check_output("ip link add test1 type dummy")
1568 self.wait_online(['macvlan99:degraded',
1569 'test1:carrier' if mode == 'passthru' else 'test1:degraded'])
1570
1571 output = check_output('ip -d link show test1')
1572 print(output)
1573 self.assertRegex(output, ' mtu 2000 ')
1574
1575 output = check_output('ip -d link show macvlan99')
1576 print(output)
1577 self.assertRegex(output, ' mtu 2000 ')
1578 self.assertRegex(output, 'macvlan mode ' + mode + ' ')
1579
1580 @expectedFailureIfModuleIsNotAvailable('ipvlan')
1581 def test_ipvlan(self):
1582 first = True
1583 for mode, flag in [['L2', 'private'], ['L3', 'vepa'], ['L3S', 'bridge']]:
1584 if first:
1585 first = False
1586 else:
1587 self.tearDown()
1588
1589 print(f'### test_ipvlan(mode={mode}, flag={flag})')
1590 with self.subTest(mode=mode, flag=flag):
1591 copy_network_unit('25-ipvlan.netdev', '26-netdev-link-local-addressing-yes.network',
1592 '11-dummy.netdev', '25-ipvlan.network')
1593 with open(os.path.join(network_unit_dir, '25-ipvlan.netdev'), mode='a', encoding='utf-8') as f:
1594 f.write('[IPVLAN]\nMode=' + mode + '\nFlags=' + flag)
1595
1596 start_networkd()
1597 self.wait_online(['ipvlan99:degraded', 'test1:degraded'])
1598
1599 output = check_output('ip -d link show ipvlan99')
1600 print(output)
1601 self.assertRegex(output, 'ipvlan *mode ' + mode.lower() + ' ' + flag)
1602
1603 @expectedFailureIfModuleIsNotAvailable('ipvtap')
1604 def test_ipvtap(self):
1605 first = True
1606 for mode, flag in [['L2', 'private'], ['L3', 'vepa'], ['L3S', 'bridge']]:
1607 if first:
1608 first = False
1609 else:
1610 self.tearDown()
1611
1612 print(f'### test_ipvtap(mode={mode}, flag={flag})')
1613 with self.subTest(mode=mode, flag=flag):
1614 copy_network_unit('25-ipvtap.netdev', '26-netdev-link-local-addressing-yes.network',
1615 '11-dummy.netdev', '25-ipvtap.network')
1616 with open(os.path.join(network_unit_dir, '25-ipvtap.netdev'), mode='a', encoding='utf-8') as f:
1617 f.write('[IPVTAP]\nMode=' + mode + '\nFlags=' + flag)
1618
1619 start_networkd()
1620 self.wait_online(['ipvtap99:degraded', 'test1:degraded'])
1621
1622 output = check_output('ip -d link show ipvtap99')
1623 print(output)
1624 self.assertRegex(output, 'ipvtap *mode ' + mode.lower() + ' ' + flag)
1625
1626 def test_veth(self):
1627 copy_network_unit('25-veth.netdev', '26-netdev-link-local-addressing-yes.network',
1628 '25-veth-mtu.netdev')
1629 start_networkd()
1630
1631 self.wait_online(['veth99:degraded', 'veth-peer:degraded', 'veth-mtu:degraded', 'veth-mtu-peer:degraded'])
1632
1633 output = check_output('ip -d link show veth99')
1634 print(output)
1635 self.assertRegex(output, 'link/ether 12:34:56:78:9a:bc')
1636 output = check_output('ip -d link show veth-peer')
1637 print(output)
1638 self.assertRegex(output, 'link/ether 12:34:56:78:9a:bd')
1639
1640 output = check_output('ip -d link show veth-mtu')
1641 print(output)
1642 self.assertRegex(output, 'link/ether 12:34:56:78:9a:be')
1643 self.assertRegex(output, 'mtu 1800')
1644 output = check_output('ip -d link show veth-mtu-peer')
1645 print(output)
1646 self.assertRegex(output, 'link/ether 12:34:56:78:9a:bf')
1647 self.assertRegex(output, 'mtu 1800')
1648
1649 def test_tuntap(self):
1650 copy_network_unit('25-tun.netdev', '25-tap.netdev', '26-netdev-link-local-addressing-yes.network')
1651 start_networkd()
1652
1653 self.wait_online(['testtun99:degraded', 'testtap99:degraded'])
1654
1655 pid = networkd_pid()
1656 name = psutil.Process(pid).name()[:15]
1657
1658 output = check_output('ip -d tuntap show')
1659 print(output)
1660 self.assertRegex(output, fr'(?m)testtap99: tap pi (multi_queue |)vnet_hdr persist filter *(0x100|)\n\tAttached to processes:{name}\({pid}\)systemd\(1\)$')
1661 self.assertRegex(output, fr'(?m)testtun99: tun pi (multi_queue |)vnet_hdr persist filter *(0x100|)\n\tAttached to processes:{name}\({pid}\)systemd\(1\)$')
1662
1663 output = check_output('ip -d link show testtun99')
1664 print(output)
1665 # Old ip command does not support IFF_ flags
1666 self.assertRegex(output, 'tun (type tun pi on vnet_hdr on multi_queue|addrgenmode) ')
1667 self.assertIn('UP,LOWER_UP', output)
1668
1669 output = check_output('ip -d link show testtap99')
1670 print(output)
1671 self.assertRegex(output, 'tun (type tap pi on vnet_hdr on multi_queue|addrgenmode) ')
1672 self.assertIn('UP,LOWER_UP', output)
1673
1674 remove_network_unit('26-netdev-link-local-addressing-yes.network')
1675
1676 restart_networkd()
1677 self.wait_online(['testtun99:degraded', 'testtap99:degraded'], setup_state='unmanaged')
1678
1679 pid = networkd_pid()
1680 name = psutil.Process(pid).name()[:15]
1681
1682 output = check_output('ip -d tuntap show')
1683 print(output)
1684 self.assertRegex(output, fr'(?m)testtap99: tap pi (multi_queue |)vnet_hdr persist filter *(0x100|)\n\tAttached to processes:{name}\({pid}\)systemd\(1\)$')
1685 self.assertRegex(output, fr'(?m)testtun99: tun pi (multi_queue |)vnet_hdr persist filter *(0x100|)\n\tAttached to processes:{name}\({pid}\)systemd\(1\)$')
1686
1687 output = check_output('ip -d link show testtun99')
1688 print(output)
1689 self.assertRegex(output, 'tun (type tun pi on vnet_hdr on multi_queue|addrgenmode) ')
1690 self.assertIn('UP,LOWER_UP', output)
1691
1692 output = check_output('ip -d link show testtap99')
1693 print(output)
1694 self.assertRegex(output, 'tun (type tap pi on vnet_hdr on multi_queue|addrgenmode) ')
1695 self.assertIn('UP,LOWER_UP', output)
1696
1697 clear_network_units()
1698 restart_networkd()
1699 self.wait_online(['testtun99:off', 'testtap99:off'], setup_state='unmanaged')
1700
1701 output = check_output('ip -d tuntap show')
1702 print(output)
1703 self.assertRegex(output, r'(?m)testtap99: tap pi (multi_queue |)vnet_hdr persist filter *(0x100|)\n\tAttached to processes:$')
1704 self.assertRegex(output, r'(?m)testtun99: tun pi (multi_queue |)vnet_hdr persist filter *(0x100|)\n\tAttached to processes:$')
1705
1706 for i in range(10):
1707 if i != 0:
1708 time.sleep(1)
1709 output = check_output('ip -d link show testtun99')
1710 print(output)
1711 self.assertRegex(output, 'tun (type tun pi on vnet_hdr on multi_queue|addrgenmode) ')
1712 if 'NO-CARRIER' in output:
1713 break
1714 else:
1715 self.fail()
1716
1717 for i in range(10):
1718 if i != 0:
1719 time.sleep(1)
1720 output = check_output('ip -d link show testtap99')
1721 print(output)
1722 self.assertRegex(output, 'tun (type tap pi on vnet_hdr on multi_queue|addrgenmode) ')
1723 if 'NO-CARRIER' in output:
1724 break
1725 else:
1726 self.fail()
1727
1728 @expectedFailureIfModuleIsNotAvailable('vrf')
1729 def test_vrf(self):
1730 copy_network_unit('25-vrf.netdev', '26-netdev-link-local-addressing-yes.network')
1731 start_networkd()
1732
1733 self.wait_online(['vrf99:carrier'])
1734
1735 @expectedFailureIfModuleIsNotAvailable('vcan')
1736 def test_vcan(self):
1737 copy_network_unit('25-vcan.netdev', '26-netdev-link-local-addressing-yes.network',
1738 '25-vcan98.netdev', '25-vcan98.network')
1739 start_networkd()
1740
1741 self.wait_online(['vcan99:carrier', 'vcan98:carrier'])
1742
1743 # https://github.com/systemd/systemd/issues/30140
1744 output = check_output('ip -d link show vcan99')
1745 print(output)
1746 self.assertIn('mtu 16 ', output)
1747
1748 output = check_output('ip -d link show vcan98')
1749 print(output)
1750 self.assertIn('mtu 16 ', output)
1751
1752 @expectedFailureIfModuleIsNotAvailable('vxcan')
1753 def test_vxcan(self):
1754 copy_network_unit('25-vxcan.netdev', '26-netdev-link-local-addressing-yes.network')
1755 start_networkd()
1756
1757 self.wait_online(['vxcan99:carrier', 'vxcan-peer:carrier'])
1758
1759 @expectedFailureIfModuleIsNotAvailable('wireguard')
1760 def test_wireguard(self):
1761 copy_network_unit('25-wireguard.netdev', '25-wireguard.network',
1762 '25-wireguard-23-peers.netdev', '25-wireguard-23-peers.network',
1763 '25-wireguard-preshared-key.txt', '25-wireguard-private-key.txt',
1764 '25-wireguard-no-peer.netdev', '25-wireguard-no-peer.network')
1765 start_networkd()
1766 self.wait_online(['wg99:routable', 'wg98:routable', 'wg97:carrier'])
1767
1768 output = check_output('ip -4 address show dev wg99')
1769 print(output)
1770 self.assertIn('inet 192.168.124.1/24 scope global wg99', output)
1771
1772 output = check_output('ip -4 address show dev wg99')
1773 print(output)
1774 self.assertIn('inet 169.254.11.1/24 scope link wg99', output)
1775
1776 output = check_output('ip -6 address show dev wg99')
1777 print(output)
1778 self.assertIn('inet6 fe80::1/64 scope link', output)
1779
1780 output = check_output('ip -4 address show dev wg98')
1781 print(output)
1782 self.assertIn('inet 192.168.123.123/24 scope global wg98', output)
1783
1784 output = check_output('ip -6 address show dev wg98')
1785 print(output)
1786 self.assertIn('inet6 fd8d:4d6d:3ccb:500::1/64 scope global', output)
1787
1788 output = check_output('ip -4 route show dev wg99 table 1234')
1789 print(output)
1790 self.assertIn('192.168.26.0/24 proto static metric 123', output)
1791
1792 output = check_output('ip -6 route show dev wg99 table 1234')
1793 print(output)
1794 self.assertIn('fd31:bf08:57cb::/48 proto static metric 123 pref medium', output)
1795
1796 output = check_output('ip -6 route show dev wg98 table 1234')
1797 print(output)
1798 self.assertIn('fd8d:4d6d:3ccb:500:c79:2339:edce:ece1 proto static metric 123 pref medium', output)
1799 self.assertIn('fd8d:4d6d:3ccb:500:1dbf:ca8a:32d3:dd81 proto static metric 123 pref medium', output)
1800 self.assertIn('fd8d:4d6d:3ccb:500:1e54:1415:35d0:a47c proto static metric 123 pref medium', output)
1801 self.assertIn('fd8d:4d6d:3ccb:500:270d:b5dd:4a3f:8909 proto static metric 123 pref medium', output)
1802 self.assertIn('fd8d:4d6d:3ccb:500:5660:679d:3532:94d8 proto static metric 123 pref medium', output)
1803 self.assertIn('fd8d:4d6d:3ccb:500:6825:573f:30f3:9472 proto static metric 123 pref medium', output)
1804 self.assertIn('fd8d:4d6d:3ccb:500:6f2e:6888:c6fd:dfb9 proto static metric 123 pref medium', output)
1805 self.assertIn('fd8d:4d6d:3ccb:500:8d4d:bab:7280:a09a proto static metric 123 pref medium', output)
1806 self.assertIn('fd8d:4d6d:3ccb:500:900c:d437:ec27:8822 proto static metric 123 pref medium', output)
1807 self.assertIn('fd8d:4d6d:3ccb:500:9742:9931:5217:18d5 proto static metric 123 pref medium', output)
1808 self.assertIn('fd8d:4d6d:3ccb:500:9c11:d820:2e96:9be0 proto static metric 123 pref medium', output)
1809 self.assertIn('fd8d:4d6d:3ccb:500:a072:80da:de4f:add1 proto static metric 123 pref medium', output)
1810 self.assertIn('fd8d:4d6d:3ccb:500:a3f3:df38:19b0:721 proto static metric 123 pref medium', output)
1811 self.assertIn('fd8d:4d6d:3ccb:500:a94b:cd6a:a32d:90e6 proto static metric 123 pref medium', output)
1812 self.assertIn('fd8d:4d6d:3ccb:500:b39c:9cdc:755a:ead3 proto static metric 123 pref medium', output)
1813 self.assertIn('fd8d:4d6d:3ccb:500:b684:4f81:2e3e:132e proto static metric 123 pref medium', output)
1814 self.assertIn('fd8d:4d6d:3ccb:500:bad5:495d:8e9c:3427 proto static metric 123 pref medium', output)
1815 self.assertIn('fd8d:4d6d:3ccb:500:bfe5:c3c3:5d77:fcb proto static metric 123 pref medium', output)
1816 self.assertIn('fd8d:4d6d:3ccb:500:c624:6bf7:4c09:3b59 proto static metric 123 pref medium', output)
1817 self.assertIn('fd8d:4d6d:3ccb:500:d4f9:5dc:9296:a1a proto static metric 123 pref medium', output)
1818 self.assertIn('fd8d:4d6d:3ccb:500:dcdd:d33b:90c9:6088 proto static metric 123 pref medium', output)
1819 self.assertIn('fd8d:4d6d:3ccb:500:e2e1:ae15:103f:f376 proto static metric 123 pref medium', output)
1820 self.assertIn('fd8d:4d6d:3ccb:500:f349:c4f0:10c1:6b4 proto static metric 123 pref medium', output)
1821 self.assertIn('fd8d:4d6d:3ccb:c79:2339:edce::/96 proto static metric 123 pref medium', output)
1822 self.assertIn('fd8d:4d6d:3ccb:1dbf:ca8a:32d3::/96 proto static metric 123 pref medium', output)
1823 self.assertIn('fd8d:4d6d:3ccb:1e54:1415:35d0::/96 proto static metric 123 pref medium', output)
1824 self.assertIn('fd8d:4d6d:3ccb:270d:b5dd:4a3f::/96 proto static metric 123 pref medium', output)
1825 self.assertIn('fd8d:4d6d:3ccb:5660:679d:3532::/96 proto static metric 123 pref medium', output)
1826 self.assertIn('fd8d:4d6d:3ccb:6825:573f:30f3::/96 proto static metric 123 pref medium', output)
1827 self.assertIn('fd8d:4d6d:3ccb:6f2e:6888:c6fd::/96 proto static metric 123 pref medium', output)
1828 self.assertIn('fd8d:4d6d:3ccb:8d4d:bab:7280::/96 proto static metric 123 pref medium', output)
1829 self.assertIn('fd8d:4d6d:3ccb:900c:d437:ec27::/96 proto static metric 123 pref medium', output)
1830 self.assertIn('fd8d:4d6d:3ccb:9742:9931:5217::/96 proto static metric 123 pref medium', output)
1831 self.assertIn('fd8d:4d6d:3ccb:9c11:d820:2e96::/96 proto static metric 123 pref medium', output)
1832 self.assertIn('fd8d:4d6d:3ccb:a072:80da:de4f::/96 proto static metric 123 pref medium', output)
1833 self.assertIn('fd8d:4d6d:3ccb:a3f3:df38:19b0::/96 proto static metric 123 pref medium', output)
1834 self.assertIn('fd8d:4d6d:3ccb:a94b:cd6a:a32d::/96 proto static metric 123 pref medium', output)
1835 self.assertIn('fd8d:4d6d:3ccb:b39c:9cdc:755a::/96 proto static metric 123 pref medium', output)
1836 self.assertIn('fd8d:4d6d:3ccb:b684:4f81:2e3e::/96 proto static metric 123 pref medium', output)
1837 self.assertIn('fd8d:4d6d:3ccb:bad5:495d:8e9c::/96 proto static metric 123 pref medium', output)
1838 self.assertIn('fd8d:4d6d:3ccb:bfe5:c3c3:5d77::/96 proto static metric 123 pref medium', output)
1839 self.assertIn('fd8d:4d6d:3ccb:c624:6bf7:4c09::/96 proto static metric 123 pref medium', output)
1840 self.assertIn('fd8d:4d6d:3ccb:d4f9:5dc:9296::/96 proto static metric 123 pref medium', output)
1841 self.assertIn('fd8d:4d6d:3ccb:dcdd:d33b:90c9::/96 proto static metric 123 pref medium', output)
1842 self.assertIn('fd8d:4d6d:3ccb:e2e1:ae15:103f::/96 proto static metric 123 pref medium', output)
1843 self.assertIn('fd8d:4d6d:3ccb:f349:c4f0:10c1::/96 proto static metric 123 pref medium', output)
1844
1845 if shutil.which('wg'):
1846 call('wg')
1847
1848 output = check_output('wg show wg99 listen-port')
1849 self.assertEqual(output, '51820')
1850 output = check_output('wg show wg99 fwmark')
1851 self.assertEqual(output, '0x4d2')
1852 output = check_output('wg show wg99 private-key')
1853 self.assertEqual(output, 'EEGlnEPYJV//kbvvIqxKkQwOiS+UENyPncC4bF46ong=')
1854 output = check_output('wg show wg99 allowed-ips')
1855 self.assertIn('9uioxkGzjvGjkse3V35I9AhorWfIjBcrf3UPMS0bw2c=\t192.168.124.3/32', output)
1856 self.assertIn('TTiCUpCxS7zDn/ax4p5W6Evg41r8hOrnWQw2Sq6Nh10=\t192.168.124.2/32', output)
1857 self.assertIn('lsDtM3AbjxNlauRKzHEPfgS1Zp7cp/VX5Use/P4PQSc=\tfdbc:bae2:7871:e1fe:793:8636::/96 fdbc:bae2:7871:500:e1fe:793:8636:dad1/128', output)
1858 self.assertIn('RDf+LSpeEre7YEIKaxg+wbpsNV7du+ktR99uBEtIiCA=\t192.168.26.0/24 fd31:bf08:57cb::/48', output)
1859 output = check_output('wg show wg99 persistent-keepalive')
1860 self.assertIn('9uioxkGzjvGjkse3V35I9AhorWfIjBcrf3UPMS0bw2c=\toff', output)
1861 self.assertIn('TTiCUpCxS7zDn/ax4p5W6Evg41r8hOrnWQw2Sq6Nh10=\toff', output)
1862 self.assertIn('lsDtM3AbjxNlauRKzHEPfgS1Zp7cp/VX5Use/P4PQSc=\toff', output)
1863 self.assertIn('RDf+LSpeEre7YEIKaxg+wbpsNV7du+ktR99uBEtIiCA=\t20', output)
1864 output = check_output('wg show wg99 endpoints')
1865 self.assertIn('9uioxkGzjvGjkse3V35I9AhorWfIjBcrf3UPMS0bw2c=\t(none)', output)
1866 self.assertIn('TTiCUpCxS7zDn/ax4p5W6Evg41r8hOrnWQw2Sq6Nh10=\t(none)', output)
1867 self.assertIn('lsDtM3AbjxNlauRKzHEPfgS1Zp7cp/VX5Use/P4PQSc=\t(none)', output)
1868 self.assertIn('RDf+LSpeEre7YEIKaxg+wbpsNV7du+ktR99uBEtIiCA=\t192.168.27.3:51820', output)
1869 output = check_output('wg show wg99 preshared-keys')
1870 self.assertIn('9uioxkGzjvGjkse3V35I9AhorWfIjBcrf3UPMS0bw2c=\t6Fsg8XN0DE6aPQgAX4r2oazEYJOGqyHUz3QRH/jCB+I=', output)
1871 self.assertIn('TTiCUpCxS7zDn/ax4p5W6Evg41r8hOrnWQw2Sq6Nh10=\tit7nd33chCT/tKT2ZZWfYyp43Zs+6oif72hexnSNMqA=', output)
1872 self.assertIn('lsDtM3AbjxNlauRKzHEPfgS1Zp7cp/VX5Use/P4PQSc=\tcPLOy1YUrEI0EMMIycPJmOo0aTu3RZnw8bL5meVD6m0=', output)
1873 self.assertIn('RDf+LSpeEre7YEIKaxg+wbpsNV7du+ktR99uBEtIiCA=\tIIWIV17wutHv7t4cR6pOT91z6NSz/T8Arh0yaywhw3M=', output)
1874
1875 output = check_output('wg show wg98 private-key')
1876 self.assertEqual(output, 'CJQUtcS9emY2fLYqDlpSZiE/QJyHkPWr+WHtZLZ90FU=')
1877
1878 output = check_output('wg show wg97 listen-port')
1879 self.assertEqual(output, '51821')
1880 output = check_output('wg show wg97 fwmark')
1881 self.assertEqual(output, '0x4d3')
1882
1883 def test_geneve(self):
1884 copy_network_unit('25-geneve.netdev', '26-netdev-link-local-addressing-yes.network')
1885 start_networkd()
1886
1887 self.wait_online(['geneve99:degraded'])
1888
1889 output = check_output('ip -d link show geneve99')
1890 print(output)
1891 self.assertRegex(output, '192.168.22.1')
1892 self.assertRegex(output, '6082')
1893 self.assertRegex(output, 'udpcsum')
1894 self.assertRegex(output, 'udp6zerocsumrx')
1895
1896 def test_ipip_tunnel(self):
1897 copy_network_unit('12-dummy.netdev', '25-ipip.network',
1898 '25-ipip-tunnel.netdev', '25-tunnel.network',
1899 '25-ipip-tunnel-local-any.netdev', '25-tunnel-local-any.network',
1900 '25-ipip-tunnel-remote-any.netdev', '25-tunnel-remote-any.network',
1901 '25-ipip-tunnel-any-any.netdev', '25-tunnel-any-any.network')
1902 start_networkd()
1903 self.wait_online(['ipiptun99:routable', 'ipiptun98:routable', 'ipiptun97:routable', 'ipiptun96:routable', 'dummy98:degraded'])
1904
1905 output = check_output('ip -d link show ipiptun99')
1906 print(output)
1907 self.assertRegex(output, 'ipip (ipip )?remote 192.169.224.239 local 192.168.223.238 dev dummy98')
1908 output = check_output('ip -d link show ipiptun98')
1909 print(output)
1910 self.assertRegex(output, 'ipip (ipip )?remote 192.169.224.239 local any dev dummy98')
1911 output = check_output('ip -d link show ipiptun97')
1912 print(output)
1913 self.assertRegex(output, 'ipip (ipip )?remote any local 192.168.223.238 dev dummy98')
1914 output = check_output('ip -d link show ipiptun96')
1915 print(output)
1916 self.assertRegex(output, 'ipip (ipip )?remote any local any dev dummy98')
1917
1918 def test_gre_tunnel(self):
1919 copy_network_unit('12-dummy.netdev', '25-gretun.network',
1920 '25-gre-tunnel.netdev', '25-tunnel.network',
1921 '25-gre-tunnel-local-any.netdev', '25-tunnel-local-any.network',
1922 '25-gre-tunnel-remote-any.netdev', '25-tunnel-remote-any.network',
1923 '25-gre-tunnel-any-any.netdev', '25-tunnel-any-any.network')
1924 start_networkd()
1925 self.wait_online(['gretun99:routable', 'gretun98:routable', 'gretun97:routable', 'gretun96:routable', 'dummy98:degraded'])
1926
1927 output = check_output('ip -d link show gretun99')
1928 print(output)
1929 self.assertRegex(output, 'gre remote 10.65.223.239 local 10.65.223.238 dev dummy98')
1930 self.assertRegex(output, 'ikey 1.2.3.103')
1931 self.assertRegex(output, 'okey 1.2.4.103')
1932 self.assertRegex(output, 'iseq')
1933 self.assertRegex(output, 'oseq')
1934 output = check_output('ip -d link show gretun98')
1935 print(output)
1936 self.assertRegex(output, 'gre remote 10.65.223.239 local any dev dummy98')
1937 self.assertRegex(output, 'ikey 0.0.0.104')
1938 self.assertRegex(output, 'okey 0.0.0.104')
1939 self.assertNotRegex(output, 'iseq')
1940 self.assertNotRegex(output, 'oseq')
1941 output = check_output('ip -d link show gretun97')
1942 print(output)
1943 self.assertRegex(output, 'gre remote any local 10.65.223.238 dev dummy98')
1944 self.assertRegex(output, 'ikey 0.0.0.105')
1945 self.assertRegex(output, 'okey 0.0.0.105')
1946 self.assertNotRegex(output, 'iseq')
1947 self.assertNotRegex(output, 'oseq')
1948 output = check_output('ip -d link show gretun96')
1949 print(output)
1950 self.assertRegex(output, 'gre remote any local any dev dummy98')
1951 self.assertRegex(output, 'ikey 0.0.0.106')
1952 self.assertRegex(output, 'okey 0.0.0.106')
1953 self.assertNotRegex(output, 'iseq')
1954 self.assertNotRegex(output, 'oseq')
1955
1956 def test_ip6gre_tunnel(self):
1957 copy_network_unit('12-dummy.netdev', '25-ip6gretun.network',
1958 '25-ip6gre-tunnel.netdev', '25-tunnel.network',
1959 '25-ip6gre-tunnel-local-any.netdev', '25-tunnel-local-any.network',
1960 '25-ip6gre-tunnel-remote-any.netdev', '25-tunnel-remote-any.network',
1961 '25-ip6gre-tunnel-any-any.netdev', '25-tunnel-any-any.network')
1962 start_networkd()
1963
1964 # Old kernels seem not to support IPv6LL address on ip6gre tunnel, So please do not use wait_online() here.
1965
1966 self.wait_links('dummy98', 'ip6gretun99', 'ip6gretun98', 'ip6gretun97', 'ip6gretun96')
1967
1968 output = check_output('ip -d link show ip6gretun99')
1969 print(output)
1970 self.assertRegex(output, 'ip6gre remote 2001:473:fece:cafe::5179 local 2a00:ffde:4567:edde::4987 dev dummy98')
1971 output = check_output('ip -d link show ip6gretun98')
1972 print(output)
1973 self.assertRegex(output, 'ip6gre remote 2001:473:fece:cafe::5179 local any dev dummy98')
1974 output = check_output('ip -d link show ip6gretun97')
1975 print(output)
1976 self.assertRegex(output, 'ip6gre remote any local 2a00:ffde:4567:edde::4987 dev dummy98')
1977 output = check_output('ip -d link show ip6gretun96')
1978 print(output)
1979 self.assertRegex(output, 'ip6gre remote any local any dev dummy98')
1980
1981 def test_gretap_tunnel(self):
1982 copy_network_unit('12-dummy.netdev', '25-gretap.network',
1983 '25-gretap-tunnel.netdev', '25-tunnel.network',
1984 '25-gretap-tunnel-local-any.netdev', '25-tunnel-local-any.network')
1985 start_networkd()
1986 self.wait_online(['gretap99:routable', 'gretap98:routable', 'dummy98:degraded'])
1987
1988 output = check_output('ip -d link show gretap99')
1989 print(output)
1990 self.assertRegex(output, 'gretap remote 10.65.223.239 local 10.65.223.238 dev dummy98')
1991 self.assertRegex(output, 'ikey 0.0.0.106')
1992 self.assertRegex(output, 'okey 0.0.0.106')
1993 self.assertRegex(output, 'iseq')
1994 self.assertRegex(output, 'oseq')
1995 self.assertIn('nopmtudisc', output)
1996 self.assertIn('ignore-df', output)
1997 output = check_output('ip -d link show gretap98')
1998 print(output)
1999 self.assertRegex(output, 'gretap remote 10.65.223.239 local any dev dummy98')
2000 self.assertRegex(output, 'ikey 0.0.0.107')
2001 self.assertRegex(output, 'okey 0.0.0.107')
2002 self.assertRegex(output, 'iseq')
2003 self.assertRegex(output, 'oseq')
2004
2005 def test_ip6gretap_tunnel(self):
2006 copy_network_unit('12-dummy.netdev', '25-ip6gretap.network',
2007 '25-ip6gretap-tunnel.netdev', '25-tunnel.network',
2008 '25-ip6gretap-tunnel-local-any.netdev', '25-tunnel-local-any.network')
2009 start_networkd()
2010 self.wait_online(['ip6gretap99:routable', 'ip6gretap98:routable', 'dummy98:degraded'])
2011
2012 output = check_output('ip -d link show ip6gretap99')
2013 print(output)
2014 self.assertRegex(output, 'ip6gretap remote 2001:473:fece:cafe::5179 local 2a00:ffde:4567:edde::4987 dev dummy98')
2015 output = check_output('ip -d link show ip6gretap98')
2016 print(output)
2017 self.assertRegex(output, 'ip6gretap remote 2001:473:fece:cafe::5179 local any dev dummy98')
2018
2019 def test_vti_tunnel(self):
2020 copy_network_unit('12-dummy.netdev', '25-vti.network',
2021 '25-vti-tunnel.netdev', '25-tunnel.network',
2022 '25-vti-tunnel-local-any.netdev', '25-tunnel-local-any.network',
2023 '25-vti-tunnel-remote-any.netdev', '25-tunnel-remote-any.network',
2024 '25-vti-tunnel-any-any.netdev', '25-tunnel-any-any.network')
2025 start_networkd()
2026 self.wait_online(['vtitun99:routable', 'vtitun98:routable', 'vtitun97:routable', 'vtitun96:routable', 'dummy98:degraded'])
2027
2028 output = check_output('ip -d link show vtitun99')
2029 print(output)
2030 self.assertRegex(output, 'vti remote 10.65.223.239 local 10.65.223.238 dev dummy98')
2031 output = check_output('ip -d link show vtitun98')
2032 print(output)
2033 self.assertRegex(output, 'vti remote 10.65.223.239 local any dev dummy98')
2034 output = check_output('ip -d link show vtitun97')
2035 print(output)
2036 self.assertRegex(output, 'vti remote any local 10.65.223.238 dev dummy98')
2037 output = check_output('ip -d link show vtitun96')
2038 print(output)
2039 self.assertRegex(output, 'vti remote any local any dev dummy98')
2040
2041 def test_vti6_tunnel(self):
2042 copy_network_unit('12-dummy.netdev', '25-vti6.network',
2043 '25-vti6-tunnel.netdev', '25-tunnel.network',
2044 '25-vti6-tunnel-local-any.netdev', '25-tunnel-local-any.network',
2045 '25-vti6-tunnel-remote-any.netdev', '25-tunnel-remote-any.network')
2046 start_networkd()
2047 self.wait_online(['vti6tun99:routable', 'vti6tun98:routable', 'vti6tun97:routable', 'dummy98:degraded'])
2048
2049 output = check_output('ip -d link show vti6tun99')
2050 print(output)
2051 self.assertRegex(output, 'vti6 remote 2001:473:fece:cafe::5179 local 2a00:ffde:4567:edde::4987 dev dummy98')
2052 output = check_output('ip -d link show vti6tun98')
2053 print(output)
2054 self.assertRegex(output, 'vti6 remote 2001:473:fece:cafe::5179 local (any|::) dev dummy98')
2055 output = check_output('ip -d link show vti6tun97')
2056 print(output)
2057 self.assertRegex(output, 'vti6 remote (any|::) local 2a00:ffde:4567:edde::4987 dev dummy98')
2058
2059 def test_ip6tnl_tunnel(self):
2060 copy_network_unit('12-dummy.netdev', '25-ip6tnl.network',
2061 '25-ip6tnl-tunnel.netdev', '25-tunnel.network',
2062 '25-ip6tnl-tunnel-local-any.netdev', '25-tunnel-local-any.network',
2063 '25-ip6tnl-tunnel-remote-any.netdev', '25-tunnel-remote-any.network',
2064 '25-veth.netdev', '25-ip6tnl-slaac.network', '25-ipv6-prefix.network',
2065 '25-ip6tnl-tunnel-local-slaac.netdev', '25-ip6tnl-tunnel-local-slaac.network',
2066 '25-ip6tnl-tunnel-external.netdev', '26-netdev-link-local-addressing-yes.network')
2067 start_networkd()
2068 self.wait_online(['ip6tnl99:routable', 'ip6tnl98:routable', 'ip6tnl97:routable',
2069 'ip6tnl-slaac:degraded', 'ip6tnl-external:degraded',
2070 'dummy98:degraded', 'veth99:routable', 'veth-peer:degraded'])
2071
2072 output = check_output('ip -d link show ip6tnl99')
2073 print(output)
2074 self.assertIn('ip6tnl ip6ip6 remote 2001:473:fece:cafe::5179 local 2a00:ffde:4567:edde::4987 dev dummy98', output)
2075 output = check_output('ip -d link show ip6tnl98')
2076 print(output)
2077 self.assertRegex(output, 'ip6tnl ip6ip6 remote 2001:473:fece:cafe::5179 local (any|::) dev dummy98')
2078 output = check_output('ip -d link show ip6tnl97')
2079 print(output)
2080 self.assertRegex(output, 'ip6tnl ip6ip6 remote (any|::) local 2a00:ffde:4567:edde::4987 dev dummy98')
2081 output = check_output('ip -d link show ip6tnl-external')
2082 print(output)
2083 self.assertIn('ip6tnl-external@NONE:', output)
2084 self.assertIn('ip6tnl external ', output)
2085 output = check_output('ip -d link show ip6tnl-slaac')
2086 print(output)
2087 self.assertIn('ip6tnl ip6ip6 remote 2001:473:fece:cafe::5179 local 2002:da8:1:0:1034:56ff:fe78:9abc dev veth99', output)
2088
2089 output = check_output('ip -6 address show veth99')
2090 print(output)
2091 self.assertIn('inet6 2002:da8:1:0:1034:56ff:fe78:9abc/64 scope global dynamic', output)
2092
2093 output = check_output('ip -4 route show default')
2094 print(output)
2095 self.assertIn('default dev ip6tnl-slaac proto static', output)
2096
2097 def test_sit_tunnel(self):
2098 copy_network_unit('12-dummy.netdev', '25-sit.network',
2099 '25-sit-tunnel.netdev', '25-tunnel.network',
2100 '25-sit-tunnel-local-any.netdev', '25-tunnel-local-any.network',
2101 '25-sit-tunnel-remote-any.netdev', '25-tunnel-remote-any.network',
2102 '25-sit-tunnel-any-any.netdev', '25-tunnel-any-any.network')
2103 start_networkd()
2104 self.wait_online(['sittun99:routable', 'sittun98:routable', 'sittun97:routable', 'sittun96:routable', 'dummy98:degraded'])
2105
2106 output = check_output('ip -d link show sittun99')
2107 print(output)
2108 self.assertRegex(output, "sit (ip6ip )?remote 10.65.223.239 local 10.65.223.238 dev dummy98")
2109 output = check_output('ip -d link show sittun98')
2110 print(output)
2111 self.assertRegex(output, "sit (ip6ip )?remote 10.65.223.239 local any dev dummy98")
2112 output = check_output('ip -d link show sittun97')
2113 print(output)
2114 self.assertRegex(output, "sit (ip6ip )?remote any local 10.65.223.238 dev dummy98")
2115 output = check_output('ip -d link show sittun96')
2116 print(output)
2117 self.assertRegex(output, "sit (ip6ip )?remote any local any dev dummy98")
2118
2119 def test_isatap_tunnel(self):
2120 copy_network_unit('12-dummy.netdev', '25-isatap.network',
2121 '25-isatap-tunnel.netdev', '25-tunnel.network')
2122 start_networkd()
2123 self.wait_online(['isataptun99:routable', 'dummy98:degraded'])
2124
2125 output = check_output('ip -d link show isataptun99')
2126 print(output)
2127 self.assertRegex(output, "isatap ")
2128
2129 def test_6rd_tunnel(self):
2130 copy_network_unit('12-dummy.netdev', '25-6rd.network',
2131 '25-6rd-tunnel.netdev', '25-tunnel.network')
2132 start_networkd()
2133 self.wait_online(['sittun99:routable', 'dummy98:degraded'])
2134
2135 output = check_output('ip -d link show sittun99')
2136 print(output)
2137 self.assertRegex(output, '6rd-prefix 2602::/24')
2138
2139 @expectedFailureIfERSPANv0IsNotSupported()
2140 def test_erspan_tunnel_v0(self):
2141 copy_network_unit('12-dummy.netdev', '25-erspan.network',
2142 '25-erspan0-tunnel.netdev', '25-tunnel.network',
2143 '25-erspan0-tunnel-local-any.netdev', '25-tunnel-local-any.network')
2144 start_networkd()
2145 self.wait_online(['erspan99:routable', 'erspan98:routable', 'dummy98:degraded'])
2146
2147 output = check_output('ip -d link show erspan99')
2148 print(output)
2149 self.assertIn('erspan remote 172.16.1.100 local 172.16.1.200', output)
2150 self.assertIn('erspan_ver 0', output)
2151 self.assertNotIn('erspan_index 123', output)
2152 self.assertNotIn('erspan_dir ingress', output)
2153 self.assertNotIn('erspan_hwid 1f', output)
2154 self.assertIn('ikey 0.0.0.101', output)
2155 self.assertIn('iseq', output)
2156 self.assertIn('nopmtudisc', output)
2157 self.assertIn('ignore-df', output)
2158 output = check_output('ip -d link show erspan98')
2159 print(output)
2160 self.assertIn('erspan remote 172.16.1.100 local any', output)
2161 self.assertIn('erspan_ver 0', output)
2162 self.assertNotIn('erspan_index 124', output)
2163 self.assertNotIn('erspan_dir egress', output)
2164 self.assertNotIn('erspan_hwid 2f', output)
2165 self.assertIn('ikey 0.0.0.102', output)
2166 self.assertIn('iseq', output)
2167
2168 def test_erspan_tunnel_v1(self):
2169 copy_network_unit('12-dummy.netdev', '25-erspan.network',
2170 '25-erspan1-tunnel.netdev', '25-tunnel.network',
2171 '25-erspan1-tunnel-local-any.netdev', '25-tunnel-local-any.network')
2172 start_networkd()
2173 self.wait_online(['erspan99:routable', 'erspan98:routable', 'dummy98:degraded'])
2174
2175 output = check_output('ip -d link show erspan99')
2176 print(output)
2177 self.assertIn('erspan remote 172.16.1.100 local 172.16.1.200', output)
2178 self.assertIn('erspan_ver 1', output)
2179 self.assertIn('erspan_index 123', output)
2180 self.assertNotIn('erspan_dir ingress', output)
2181 self.assertNotIn('erspan_hwid 1f', output)
2182 self.assertIn('ikey 0.0.0.101', output)
2183 self.assertIn('okey 0.0.0.101', output)
2184 self.assertIn('iseq', output)
2185 self.assertIn('oseq', output)
2186 output = check_output('ip -d link show erspan98')
2187 print(output)
2188 self.assertIn('erspan remote 172.16.1.100 local any', output)
2189 self.assertIn('erspan_ver 1', output)
2190 self.assertIn('erspan_index 124', output)
2191 self.assertNotIn('erspan_dir egress', output)
2192 self.assertNotIn('erspan_hwid 2f', output)
2193 self.assertIn('ikey 0.0.0.102', output)
2194 self.assertIn('okey 0.0.0.102', output)
2195 self.assertIn('iseq', output)
2196 self.assertIn('oseq', output)
2197
2198 @expectedFailureIfERSPANv2IsNotSupported()
2199 def test_erspan_tunnel_v2(self):
2200 copy_network_unit('12-dummy.netdev', '25-erspan.network',
2201 '25-erspan2-tunnel.netdev', '25-tunnel.network',
2202 '25-erspan2-tunnel-local-any.netdev', '25-tunnel-local-any.network')
2203 start_networkd()
2204 self.wait_online(['erspan99:routable', 'erspan98:routable', 'dummy98:degraded'])
2205
2206 output = check_output('ip -d link show erspan99')
2207 print(output)
2208 self.assertIn('erspan remote 172.16.1.100 local 172.16.1.200', output)
2209 self.assertIn('erspan_ver 2', output)
2210 self.assertNotIn('erspan_index 123', output)
2211 self.assertIn('erspan_dir ingress', output)
2212 self.assertIn('erspan_hwid 0x1f', output)
2213 self.assertIn('ikey 0.0.0.101', output)
2214 self.assertIn('okey 0.0.0.101', output)
2215 self.assertIn('iseq', output)
2216 self.assertIn('oseq', output)
2217 output = check_output('ip -d link show erspan98')
2218 print(output)
2219 self.assertIn('erspan remote 172.16.1.100 local any', output)
2220 self.assertIn('erspan_ver 2', output)
2221 self.assertNotIn('erspan_index 124', output)
2222 self.assertIn('erspan_dir egress', output)
2223 self.assertIn('erspan_hwid 0x2f', output)
2224 self.assertIn('ikey 0.0.0.102', output)
2225 self.assertIn('okey 0.0.0.102', output)
2226 self.assertIn('iseq', output)
2227 self.assertIn('oseq', output)
2228
2229 def test_tunnel_independent(self):
2230 copy_network_unit('25-ipip-tunnel-independent.netdev', '26-netdev-link-local-addressing-yes.network')
2231 start_networkd()
2232
2233 self.wait_online(['ipiptun99:carrier'])
2234
2235 def test_tunnel_independent_loopback(self):
2236 copy_network_unit('25-ipip-tunnel-independent-loopback.netdev', '26-netdev-link-local-addressing-yes.network')
2237 start_networkd()
2238
2239 self.wait_online(['ipiptun99:carrier'])
2240
2241 @expectedFailureIfModuleIsNotAvailable('xfrm_interface')
2242 def test_xfrm(self):
2243 copy_network_unit('12-dummy.netdev', '25-xfrm.network',
2244 '25-xfrm.netdev', '25-xfrm-independent.netdev',
2245 '26-netdev-link-local-addressing-yes.network')
2246 start_networkd()
2247
2248 self.wait_online(['dummy98:degraded', 'xfrm98:degraded', 'xfrm99:degraded'])
2249
2250 output = check_output('ip -d link show dev xfrm98')
2251 print(output)
2252 self.assertIn('xfrm98@dummy98:', output)
2253 self.assertIn('xfrm if_id 0x98 ', output)
2254
2255 output = check_output('ip -d link show dev xfrm99')
2256 print(output)
2257 self.assertIn('xfrm99@lo:', output)
2258 self.assertIn('xfrm if_id 0x99 ', output)
2259
2260 @expectedFailureIfModuleIsNotAvailable('fou')
2261 def test_fou(self):
2262 # The following redundant check is necessary for CentOS CI.
2263 # Maybe, error handling in lookup_id() in sd-netlink/generic-netlink.c needs to be updated.
2264 self.assertTrue(is_module_available('fou'))
2265
2266 copy_network_unit('25-fou-ipproto-ipip.netdev', '25-fou-ipproto-gre.netdev',
2267 '25-fou-ipip.netdev', '25-fou-sit.netdev',
2268 '25-fou-gre.netdev', '25-fou-gretap.netdev')
2269 start_networkd()
2270
2271 self.wait_online(['ipiptun96:off', 'sittun96:off', 'gretun96:off', 'gretap96:off'], setup_state='unmanaged')
2272
2273 output = check_output('ip fou show')
2274 print(output)
2275 self.assertRegex(output, 'port 55555 ipproto 4')
2276 self.assertRegex(output, 'port 55556 ipproto 47')
2277
2278 output = check_output('ip -d link show ipiptun96')
2279 print(output)
2280 self.assertRegex(output, 'encap fou encap-sport auto encap-dport 55555')
2281 output = check_output('ip -d link show sittun96')
2282 print(output)
2283 self.assertRegex(output, 'encap fou encap-sport auto encap-dport 55555')
2284 output = check_output('ip -d link show gretun96')
2285 print(output)
2286 self.assertRegex(output, 'encap fou encap-sport 1001 encap-dport 55556')
2287 output = check_output('ip -d link show gretap96')
2288 print(output)
2289 self.assertRegex(output, 'encap fou encap-sport auto encap-dport 55556')
2290
2291 def test_vxlan(self):
2292 copy_network_unit('11-dummy.netdev', '25-vxlan-test1.network',
2293 '25-vxlan.netdev', '25-vxlan.network',
2294 '25-vxlan-ipv6.netdev', '25-vxlan-ipv6.network',
2295 '25-vxlan-independent.netdev', '26-netdev-link-local-addressing-yes.network',
2296 '25-veth.netdev', '25-vxlan-veth99.network', '25-ipv6-prefix.network',
2297 '25-vxlan-local-slaac.netdev', '25-vxlan-local-slaac.network')
2298 start_networkd()
2299
2300 self.wait_online(['test1:degraded', 'veth99:routable', 'veth-peer:degraded',
2301 'vxlan99:degraded', 'vxlan98:degraded', 'vxlan97:degraded', 'vxlan-slaac:degraded'])
2302
2303 output = check_output('ip -d -d link show vxlan99')
2304 print(output)
2305 self.assertIn('999', output)
2306 self.assertIn('5555', output)
2307 self.assertIn('l2miss', output)
2308 self.assertIn('l3miss', output)
2309 self.assertIn('gbp', output)
2310 # Since [0] some of the options use slightly different names and some
2311 # options with default values are shown only if the -d(etails) setting
2312 # is repeated
2313 # [0] https://git.kernel.org/pub/scm/network/iproute2/iproute2.git/commit/?id=1215e9d3862387353d8672296cb4c6c16e8cbb72
2314 self.assertRegex(output, '(udpcsum|udp_csum)')
2315 self.assertRegex(output, '(udp6zerocsumtx|udp_zero_csum6_tx)')
2316 self.assertRegex(output, '(udp6zerocsumrx|udp_zero_csum6_rx)')
2317 self.assertRegex(output, '(remcsumtx|remcsum_tx)')
2318 self.assertRegex(output, '(remcsumrx|remcsum_rx)')
2319
2320 output = check_output('bridge fdb show dev vxlan99')
2321 print(output)
2322 self.assertIn('00:11:22:33:44:55 dst 10.0.0.5 self permanent', output)
2323 self.assertIn('00:11:22:33:44:66 dst 10.0.0.6 self permanent', output)
2324 self.assertIn('00:11:22:33:44:77 dst 10.0.0.7 via test1 self permanent', output)
2325
2326 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'vxlan99', env=env)
2327 print(output)
2328 self.assertIn('VNI: 999', output)
2329 self.assertIn('Destination Port: 5555', output)
2330 self.assertIn('Underlying Device: test1', output)
2331
2332 output = check_output('bridge fdb show dev vxlan97')
2333 print(output)
2334 self.assertIn('00:00:00:00:00:00 dst fe80::23b:d2ff:fe95:967f via test1 self permanent', output)
2335 self.assertIn('00:00:00:00:00:00 dst fe80::27c:16ff:fec0:6c74 via test1 self permanent', output)
2336 self.assertIn('00:00:00:00:00:00 dst fe80::2a2:e4ff:fef9:2269 via test1 self permanent', output)
2337
2338 output = check_output('ip -d link show vxlan-slaac')
2339 print(output)
2340 self.assertIn('vxlan id 4831584 local 2002:da8:1:0:1034:56ff:fe78:9abc dev veth99', output)
2341
2342 output = check_output('ip -6 address show veth99')
2343 print(output)
2344 self.assertIn('inet6 2002:da8:1:0:1034:56ff:fe78:9abc/64 scope global dynamic', output)
2345
2346 @unittest.skipUnless(compare_kernel_version("6"), reason="Causes kernel panic on unpatched kernels: https://bugzilla.kernel.org/show_bug.cgi?id=208315")
2347 def test_macsec(self):
2348 copy_network_unit('25-macsec.netdev', '25-macsec.network', '25-macsec.key',
2349 '26-macsec.network', '12-dummy.netdev')
2350 start_networkd()
2351
2352 self.wait_online(['dummy98:degraded', 'macsec99:routable'])
2353
2354 output = check_output('ip -d link show macsec99')
2355 print(output)
2356 self.assertRegex(output, 'macsec99@dummy98')
2357 self.assertRegex(output, 'macsec sci [0-9a-f]*000b')
2358 self.assertRegex(output, 'encrypt on')
2359
2360 output = check_output('ip macsec show macsec99')
2361 print(output)
2362 self.assertRegex(output, 'encrypt on')
2363 self.assertRegex(output, 'TXSC: [0-9a-f]*000b on SA 1')
2364 self.assertRegex(output, '0: PN [0-9]*, state on, key 01000000000000000000000000000000')
2365 self.assertRegex(output, '1: PN [0-9]*, state on, key 02030000000000000000000000000000')
2366 self.assertRegex(output, 'RXSC: c619528fe6a00100, state on')
2367 self.assertRegex(output, '0: PN [0-9]*, state on, key 02030405000000000000000000000000')
2368 self.assertRegex(output, '1: PN [0-9]*, state on, key 02030405060000000000000000000000')
2369 self.assertRegex(output, '2: PN [0-9]*, state off, key 02030405060700000000000000000000')
2370 self.assertRegex(output, '3: PN [0-9]*, state off, key 02030405060708000000000000000000')
2371 self.assertNotRegex(output, 'key 02030405067080900000000000000000')
2372 self.assertRegex(output, 'RXSC: 8c16456c83a90002, state on')
2373 self.assertRegex(output, '0: PN [0-9]*, state off, key 02030400000000000000000000000000')
2374
2375 def test_nlmon(self):
2376 copy_network_unit('25-nlmon.netdev', '26-netdev-link-local-addressing-yes.network')
2377 start_networkd()
2378
2379 self.wait_online(['nlmon99:carrier'])
2380
2381 @expectedFailureIfModuleIsNotAvailable('ifb')
2382 def test_ifb(self):
2383 copy_network_unit('25-ifb.netdev', '26-netdev-link-local-addressing-yes.network')
2384 start_networkd()
2385
2386 self.wait_online(['ifb99:degraded'])
2387
2388 class NetworkdL2TPTests(unittest.TestCase, Utilities):
2389
2390 def setUp(self):
2391 setup_common()
2392
2393 def tearDown(self):
2394 tear_down_common()
2395
2396 @expectedFailureIfModuleIsNotAvailable('l2tp_eth', 'l2tp_netlink')
2397 def test_l2tp_udp(self):
2398 copy_network_unit('11-dummy.netdev', '25-l2tp-dummy.network',
2399 '25-l2tp-udp.netdev', '25-l2tp.network')
2400 start_networkd()
2401
2402 self.wait_online(['test1:routable', 'l2tp-ses1:degraded', 'l2tp-ses2:degraded'])
2403
2404 output = check_output('ip l2tp show tunnel tunnel_id 10')
2405 print(output)
2406 self.assertRegex(output, "Tunnel 10, encap UDP")
2407 self.assertRegex(output, "From 192.168.30.100 to 192.168.30.101")
2408 self.assertRegex(output, "Peer tunnel 11")
2409 self.assertRegex(output, "UDP source / dest ports: 3000/4000")
2410 self.assertRegex(output, "UDP checksum: enabled")
2411
2412 output = check_output('ip l2tp show session tid 10 session_id 15')
2413 print(output)
2414 self.assertRegex(output, "Session 15 in tunnel 10")
2415 self.assertRegex(output, "Peer session 16, tunnel 11")
2416 self.assertRegex(output, "interface name: l2tp-ses1")
2417
2418 output = check_output('ip l2tp show session tid 10 session_id 17')
2419 print(output)
2420 self.assertRegex(output, "Session 17 in tunnel 10")
2421 self.assertRegex(output, "Peer session 18, tunnel 11")
2422 self.assertRegex(output, "interface name: l2tp-ses2")
2423
2424 @expectedFailureIfModuleIsNotAvailable('l2tp_eth', 'l2tp_ip', 'l2tp_netlink')
2425 def test_l2tp_ip(self):
2426 copy_network_unit('11-dummy.netdev', '25-l2tp-dummy.network',
2427 '25-l2tp-ip.netdev', '25-l2tp.network')
2428 start_networkd()
2429
2430 self.wait_online(['test1:routable', 'l2tp-ses3:degraded', 'l2tp-ses4:degraded'])
2431
2432 output = check_output('ip l2tp show tunnel tunnel_id 10')
2433 print(output)
2434 self.assertRegex(output, "Tunnel 10, encap IP")
2435 self.assertRegex(output, "From 192.168.30.100 to 192.168.30.101")
2436 self.assertRegex(output, "Peer tunnel 12")
2437
2438 output = check_output('ip l2tp show session tid 10 session_id 25')
2439 print(output)
2440 self.assertRegex(output, "Session 25 in tunnel 10")
2441 self.assertRegex(output, "Peer session 26, tunnel 12")
2442 self.assertRegex(output, "interface name: l2tp-ses3")
2443
2444 output = check_output('ip l2tp show session tid 10 session_id 27')
2445 print(output)
2446 self.assertRegex(output, "Session 27 in tunnel 10")
2447 self.assertRegex(output, "Peer session 28, tunnel 12")
2448 self.assertRegex(output, "interface name: l2tp-ses4")
2449
2450 class NetworkdNetworkTests(unittest.TestCase, Utilities):
2451
2452 def setUp(self):
2453 setup_common()
2454
2455 def tearDown(self):
2456 tear_down_common()
2457
2458 def verify_address_static(
2459 self,
2460 label1: str,
2461 label2: str,
2462 label3: str,
2463 broadcast1: str,
2464 broadcast2: str,
2465 broadcast3: str,
2466 peer1: str,
2467 peer2: str,
2468 peer3: str,
2469 peer4: str,
2470 peer5: str,
2471 peer6: str,
2472 scope1: str,
2473 scope2: str,
2474 deprecated1: str,
2475 deprecated2: str,
2476 deprecated3: str,
2477 deprecated4: str,
2478 route_metric: int,
2479 flag1: str,
2480 flag2: str,
2481 flag3: str,
2482 flag4: str,
2483 ip4_null_16: str,
2484 ip4_null_24: str,
2485 ip6_null_73: str,
2486 ip6_null_74: str,
2487 ):
2488 output = check_output('ip address show dev dummy98')
2489 print(output)
2490
2491 # simple settings
2492 self.assertIn('inet 10.1.2.3/16 brd 10.1.255.255 scope global dummy98', output)
2493 self.assertIn('inet 10.1.2.4/16 brd 10.1.255.255 scope global secondary dummy98', output)
2494 self.assertIn('inet 10.2.2.4/16 brd 10.2.255.255 scope global dummy98', output)
2495 self.assertIn('inet6 2001:db8:0:f101::15/64 scope global', output)
2496 self.assertIn('inet6 2001:db8:0:f101::16/64 scope global', output)
2497 self.assertIn('inet6 2001:db8:0:f102::15/64 scope global', output)
2498
2499 # label
2500 self.assertIn(f'inet 10.3.1.1/24 brd 10.3.1.255 scope global {label1}', output)
2501 self.assertIn(f'inet 10.3.2.1/24 brd 10.3.2.255 scope global {label2}', output)
2502 self.assertIn(f'inet 10.3.3.1/24 brd 10.3.3.255 scope global {label3}', output)
2503
2504 # broadcast
2505 self.assertIn(f'inet 10.4.1.1/24{broadcast1} scope global dummy98', output)
2506 self.assertIn(f'inet 10.4.2.1/24{broadcast2} scope global dummy98', output)
2507 self.assertIn(f'inet 10.4.3.1/24{broadcast3} scope global dummy98', output)
2508
2509 # peer
2510 self.assertIn(f'inet 10.5.1.1{peer1} scope global dummy98', output)
2511 self.assertIn(f'inet 10.5.2.1{peer2} scope global dummy98', output)
2512 self.assertIn(f'inet 10.5.3.1{peer3} scope global dummy98', output)
2513 self.assertIn(f'inet6 2001:db8:0:f103::1{peer4} scope global', output)
2514 self.assertIn(f'inet6 2001:db8:0:f103::2{peer5} scope global', output)
2515 self.assertIn(f'inet6 2001:db8:0:f103::3{peer6} scope global', output)
2516
2517 # scope
2518 self.assertIn(f'inet 10.6.1.1/24 brd 10.6.1.255 scope {scope1} dummy98', output)
2519 self.assertIn(f'inet 10.6.2.1/24 brd 10.6.2.255 scope {scope2} dummy98', output)
2520
2521 # lifetime
2522 self.assertIn(f'inet 10.7.1.1/24 brd 10.7.1.255 scope global{deprecated1} dummy98', output)
2523 self.assertIn(f'inet 10.7.2.1/24 brd 10.7.2.255 scope global{deprecated2} dummy98', output)
2524 self.assertIn(f'inet6 2001:db8:0:f104::1/64 scope global{deprecated3}', output)
2525 self.assertIn(f'inet6 2001:db8:0:f104::2/64 scope global{deprecated4}', output)
2526
2527 # route metric
2528 self.assertRegex(output, rf'inet 10.8.1.1/24 (metric {route_metric} |)brd 10.8.1.255 scope global dummy98')
2529 self.assertRegex(output, rf'inet6 2001:db8:0:f105::1/64 (metric {route_metric} |)scope global')
2530
2531 output_route = check_output('ip -4 route show dev dummy98 10.8.1.0/24')
2532 print(output_route)
2533 self.assertIn(f'10.8.1.0/24 proto kernel scope link src 10.8.1.1 metric {route_metric}', output_route)
2534
2535 output_route = check_output('ip -6 route show dev dummy98 2001:db8:0:f105::/64')
2536 print(output_route)
2537 self.assertIn(f'2001:db8:0:f105::/64 proto kernel metric {route_metric}', output_route)
2538
2539 # flags
2540 self.assertIn(f'inet 10.9.1.1/24 brd 10.9.1.255 scope global{flag1} dummy98', output)
2541 self.assertIn(f'inet 10.9.2.1/24 brd 10.9.2.255 scope global{flag2} dummy98', output)
2542 self.assertIn(f'inet6 2001:db8:0:f106::1/64 scope global{flag3}', output)
2543 self.assertIn(f'inet6 2001:db8:0:f106::2/64 scope global{flag4}', output)
2544
2545 # null address
2546 self.assertTrue(ip4_null_16.endswith('.0.1'))
2547 prefix16 = ip4_null_16[:-len('.0.1')]
2548 self.assertTrue(ip4_null_24.endswith('.1'))
2549 prefix24 = ip4_null_24[:-len('.1')]
2550 self.assertIn(f'inet {ip4_null_16}/16 brd {prefix16}.255.255 scope global subnet16', output)
2551 self.assertIn(f'inet {ip4_null_24}/24 brd {prefix24}.255 scope global subnet24', output)
2552 self.assertIn(f'inet6 {ip6_null_73}/73 scope global', output)
2553 self.assertIn(f'inet6 {ip6_null_74}/74 scope global', output)
2554
2555 # invalid sections
2556 self.assertNotIn('10.4.4.1', output)
2557 self.assertNotIn('10.5.4.1', output)
2558 self.assertNotIn('10.5.5.1', output)
2559 self.assertNotIn('10.8.2.1', output)
2560 self.assertNotIn('10.9.3.1', output)
2561 self.assertNotIn('2001:db8:0:f101::2', output)
2562 self.assertNotIn('2001:db8:0:f103::4', output)
2563
2564 # netlabel
2565 self.check_netlabel('dummy98', r'10\.10\.1\.0/24')
2566
2567 output = check_output(*networkctl_cmd, '--json=short', 'status', env=env)
2568 check_json(output)
2569
2570 def test_address_static(self):
2571 copy_network_unit('25-address-static.network', '12-dummy.netdev', copy_dropins=False)
2572 self.setup_nftset('addr4', 'ipv4_addr')
2573 self.setup_nftset('network4', 'ipv4_addr', 'flags interval;')
2574 self.setup_nftset('ifindex', 'iface_index')
2575 start_networkd()
2576
2577 self.wait_online(['dummy98:routable'])
2578
2579 ip4_null_16 = None
2580 ip4_null_24 = None
2581 output = check_output('ip -4 --json address show dev dummy98')
2582 for i in json.loads(output)[0]['addr_info']:
2583 if i['label'] == 'subnet16':
2584 ip4_null_16 = i['local']
2585 elif i['label'] == 'subnet24':
2586 ip4_null_24 = i['local']
2587 self.assertTrue(ip4_null_16.endswith('.0.1'))
2588 self.assertTrue(ip4_null_24.endswith('.1'))
2589
2590 ip6_null_73 = None
2591 ip6_null_74 = None
2592 output = check_output('ip -6 --json address show dev dummy98')
2593 for i in json.loads(output)[0]['addr_info']:
2594 if i['prefixlen'] == 73:
2595 ip6_null_73 = i['local']
2596 elif i['prefixlen'] == 74:
2597 ip6_null_74 = i['local']
2598 self.assertTrue(ip6_null_73.endswith(':1'))
2599 self.assertTrue(ip6_null_74.endswith(':1'))
2600
2601 self.verify_address_static(
2602 label1='label1',
2603 label2='label2',
2604 label3='dummy98',
2605 broadcast1='',
2606 broadcast2=' brd 10.4.2.255',
2607 broadcast3=' brd 10.4.3.63',
2608 peer1=' peer 10.5.1.101/24',
2609 peer2=' peer 10.5.2.101/24',
2610 peer3='/24 brd 10.5.3.255',
2611 peer4=' peer 2001:db8:0:f103::101/128',
2612 peer5=' peer 2001:db8:0:f103::102/128',
2613 peer6='/128',
2614 scope1='global',
2615 scope2='link',
2616 deprecated1='',
2617 deprecated2=' deprecated',
2618 deprecated3='',
2619 deprecated4=' deprecated',
2620 route_metric=128,
2621 flag1=' noprefixroute',
2622 flag2='',
2623 flag3=' noprefixroute',
2624 flag4=' home mngtmpaddr',
2625 ip4_null_16=ip4_null_16,
2626 ip4_null_24=ip4_null_24,
2627 ip6_null_73=ip6_null_73,
2628 ip6_null_74=ip6_null_74,
2629 )
2630 # nft set
2631 self.check_nftset('addr4', r'10\.10\.1\.1')
2632 self.check_nftset('network4', r'10\.10\.1\.0/24')
2633 self.check_nftset('ifindex', 'dummy98')
2634
2635 self.teardown_nftset('addr4', 'network4', 'ifindex')
2636
2637 copy_network_unit('25-address-static.network.d/10-override.conf')
2638 networkctl_reload()
2639 self.wait_online(['dummy98:routable'])
2640 self.verify_address_static(
2641 label1='new-label1',
2642 label2='dummy98',
2643 label3='new-label3',
2644 broadcast1=' brd 10.4.1.255',
2645 broadcast2='',
2646 broadcast3=' brd 10.4.3.31',
2647 peer1=' peer 10.5.1.102/24',
2648 peer2='/24 brd 10.5.2.255',
2649 peer3=' peer 10.5.3.102/24',
2650 peer4=' peer 2001:db8:0:f103::201/128',
2651 peer5='/128',
2652 peer6=' peer 2001:db8:0:f103::203/128',
2653 scope1='link',
2654 scope2='global',
2655 deprecated1=' deprecated',
2656 deprecated2='',
2657 deprecated3=' deprecated',
2658 deprecated4='',
2659 route_metric=256,
2660 flag1='',
2661 flag2=' noprefixroute',
2662 flag3=' home mngtmpaddr',
2663 flag4=' noprefixroute',
2664 ip4_null_16=ip4_null_16,
2665 ip4_null_24=ip4_null_24,
2666 ip6_null_73=ip6_null_73,
2667 ip6_null_74=ip6_null_74,
2668 )
2669
2670 networkctl_reconfigure('dummy98')
2671 self.wait_online(['dummy98:routable'])
2672 self.verify_address_static(
2673 label1='new-label1',
2674 label2='dummy98',
2675 label3='new-label3',
2676 broadcast1=' brd 10.4.1.255',
2677 broadcast2='',
2678 broadcast3=' brd 10.4.3.31',
2679 peer1=' peer 10.5.1.102/24',
2680 peer2='/24 brd 10.5.2.255',
2681 peer3=' peer 10.5.3.102/24',
2682 peer4=' peer 2001:db8:0:f103::201/128',
2683 peer5='/128',
2684 peer6=' peer 2001:db8:0:f103::203/128',
2685 scope1='link',
2686 scope2='global',
2687 deprecated1=' deprecated',
2688 deprecated2='',
2689 deprecated3=' deprecated',
2690 deprecated4='',
2691 route_metric=256,
2692 flag1='',
2693 flag2=' noprefixroute',
2694 flag3=' home mngtmpaddr',
2695 flag4=' noprefixroute',
2696 ip4_null_16=ip4_null_16,
2697 ip4_null_24=ip4_null_24,
2698 ip6_null_73=ip6_null_73,
2699 ip6_null_74=ip6_null_74,
2700 )
2701
2702 # Tests for #20891.
2703 # 1. set preferred lifetime forever to drop the deprecated flag for testing #20891.
2704 check_output('ip address change 10.7.1.1/24 dev dummy98 preferred_lft forever')
2705 check_output('ip address change 2001:db8:0:f104::1/64 dev dummy98 preferred_lft forever')
2706 output = check_output('ip address show dev dummy98')
2707 print(output)
2708 self.assertNotRegex(output, '10.7.1.1/24 .* deprecated')
2709 self.assertNotRegex(output, '2001:db8:0:f104::1/64 .* deprecated')
2710
2711 # 2. reconfigure the interface, and check the deprecated flag is set again
2712 networkctl_reconfigure('dummy98')
2713 self.wait_online(['dummy98:routable'])
2714 self.verify_address_static(
2715 label1='new-label1',
2716 label2='dummy98',
2717 label3='new-label3',
2718 broadcast1=' brd 10.4.1.255',
2719 broadcast2='',
2720 broadcast3=' brd 10.4.3.31',
2721 peer1=' peer 10.5.1.102/24',
2722 peer2='/24 brd 10.5.2.255',
2723 peer3=' peer 10.5.3.102/24',
2724 peer4=' peer 2001:db8:0:f103::201/128',
2725 peer5='/128',
2726 peer6=' peer 2001:db8:0:f103::203/128',
2727 scope1='link',
2728 scope2='global',
2729 deprecated1=' deprecated',
2730 deprecated2='',
2731 deprecated3=' deprecated',
2732 deprecated4='',
2733 route_metric=256,
2734 flag1='',
2735 flag2=' noprefixroute',
2736 flag3=' home mngtmpaddr',
2737 flag4=' noprefixroute',
2738 ip4_null_16=ip4_null_16,
2739 ip4_null_24=ip4_null_24,
2740 ip6_null_73=ip6_null_73,
2741 ip6_null_74=ip6_null_74,
2742 )
2743
2744 # test for ENOBUFS issue #17012 (with reload)
2745 copy_network_unit('25-address-static.network.d/10-many-address.conf')
2746 networkctl_reload()
2747 self.wait_online(['dummy98:routable'])
2748 output = check_output('ip -4 address show dev dummy98')
2749 for i in range(1, 254):
2750 self.assertIn(f'inet 10.3.3.{i}/16 brd 10.3.255.255', output)
2751
2752 # (with reconfigure)
2753 networkctl_reconfigure('dummy98')
2754 self.wait_online(['dummy98:routable'])
2755 output = check_output('ip -4 address show dev dummy98')
2756 for i in range(1, 254):
2757 self.assertIn(f'inet 10.3.3.{i}/16 brd 10.3.255.255', output)
2758
2759 def test_address_ipv4acd(self):
2760 check_output('ip netns add ns99')
2761 check_output('ip link add veth99 type veth peer veth-peer')
2762 check_output('ip link set veth-peer netns ns99')
2763 check_output('ip link set veth99 up')
2764 check_output('ip netns exec ns99 ip link set veth-peer up')
2765 check_output('ip netns exec ns99 ip address add 192.168.100.10/24 dev veth-peer')
2766
2767 copy_network_unit('25-address-ipv4acd-veth99.network', copy_dropins=False)
2768 start_networkd()
2769 self.wait_online(['veth99:routable'])
2770
2771 output = check_output('ip -4 address show dev veth99')
2772 print(output)
2773 self.assertNotIn('192.168.100.10/24', output)
2774 self.assertIn('192.168.100.11/24', output)
2775
2776 copy_network_unit('25-address-ipv4acd-veth99.network.d/conflict-address.conf')
2777 networkctl_reload()
2778 self.wait_operstate('veth99', operstate='routable', setup_state='configuring', setup_timeout=10)
2779
2780 output = check_output('ip -4 address show dev veth99')
2781 print(output)
2782 self.assertNotIn('192.168.100.10/24', output)
2783 self.assertIn('192.168.100.11/24', output)
2784
2785 def test_address_peer_ipv4(self):
2786 # test for issue #17304
2787 copy_network_unit('25-address-peer-ipv4.network', '12-dummy.netdev')
2788
2789 for trial in range(2):
2790 if trial == 0:
2791 start_networkd()
2792 else:
2793 restart_networkd()
2794
2795 self.wait_online(['dummy98:routable'])
2796
2797 output = check_output('ip -4 address show dev dummy98')
2798 self.assertIn('inet 100.64.0.1 peer 100.64.0.2/32 scope global', output)
2799
2800 @expectedFailureIfModuleIsNotAvailable('vrf')
2801 def test_prefix_route(self):
2802 copy_network_unit('25-prefix-route-with-vrf.network', '12-dummy.netdev',
2803 '25-prefix-route-without-vrf.network', '11-dummy.netdev',
2804 '25-vrf.netdev', '25-vrf.network')
2805 for trial in range(2):
2806 if trial == 0:
2807 start_networkd()
2808 else:
2809 restart_networkd()
2810
2811 self.wait_online(['dummy98:routable', 'test1:routable', 'vrf99:carrier'])
2812
2813 output = check_output('ip route show table 42 dev dummy98')
2814 print('### ip route show table 42 dev dummy98')
2815 print(output)
2816 self.assertRegex(output, 'local 10.20.22.1 proto kernel scope host src 10.20.22.1')
2817 self.assertRegex(output, '10.20.33.0/24 proto kernel scope link src 10.20.33.1')
2818 self.assertRegex(output, 'local 10.20.33.1 proto kernel scope host src 10.20.33.1')
2819 self.assertRegex(output, 'broadcast 10.20.33.255 proto kernel scope link src 10.20.33.1')
2820 self.assertRegex(output, 'local 10.20.44.1 proto kernel scope host src 10.20.44.1')
2821 self.assertRegex(output, 'local 10.20.55.1 proto kernel scope host src 10.20.55.1')
2822 self.assertRegex(output, 'broadcast 10.20.55.255 proto kernel scope link src 10.20.55.1')
2823 output = check_output('ip -6 route show table 42 dev dummy98')
2824 print('### ip -6 route show table 42 dev dummy98')
2825 print(output)
2826 if trial == 0:
2827 # Kernel's bug?
2828 self.assertRegex(output, 'local fdde:11:22::1 proto kernel metric 0 pref medium')
2829 #self.assertRegex(output, 'fdde:11:22::1 proto kernel metric 256 pref medium')
2830 self.assertRegex(output, 'local fdde:11:33::1 proto kernel metric 0 pref medium')
2831 self.assertRegex(output, 'fdde:11:33::/64 proto kernel metric 256 pref medium')
2832 self.assertRegex(output, 'local fdde:11:44::1 proto kernel metric 0 pref medium')
2833 self.assertRegex(output, 'local fdde:11:55::1 proto kernel metric 0 pref medium')
2834 self.assertRegex(output, 'fe80::/64 proto kernel metric 256 pref medium')
2835 self.assertRegex(output, 'ff00::/8 (proto kernel )?metric 256 (linkdown )?pref medium')
2836
2837 print()
2838
2839 output = check_output('ip route show dev test1')
2840 print('### ip route show dev test1')
2841 print(output)
2842 self.assertRegex(output, '10.21.33.0/24 proto kernel scope link src 10.21.33.1')
2843 output = check_output('ip route show table local dev test1')
2844 print('### ip route show table local dev test1')
2845 print(output)
2846 self.assertRegex(output, 'local 10.21.22.1 proto kernel scope host src 10.21.22.1')
2847 self.assertRegex(output, 'local 10.21.33.1 proto kernel scope host src 10.21.33.1')
2848 self.assertRegex(output, 'broadcast 10.21.33.255 proto kernel scope link src 10.21.33.1')
2849 self.assertRegex(output, 'local 10.21.44.1 proto kernel scope host src 10.21.44.1')
2850 self.assertRegex(output, 'local 10.21.55.1 proto kernel scope host src 10.21.55.1')
2851 self.assertRegex(output, 'broadcast 10.21.55.255 proto kernel scope link src 10.21.55.1')
2852 output = check_output('ip -6 route show dev test1')
2853 print('### ip -6 route show dev test1')
2854 print(output)
2855 self.assertRegex(output, 'fdde:12:22::1 proto kernel metric 256 pref medium')
2856 self.assertRegex(output, 'fdde:12:33::/64 proto kernel metric 256 pref medium')
2857 self.assertRegex(output, 'fe80::/64 proto kernel metric 256 pref medium')
2858 output = check_output('ip -6 route show table local dev test1')
2859 print('### ip -6 route show table local dev test1')
2860 print(output)
2861 self.assertRegex(output, 'local fdde:12:22::1 proto kernel metric 0 pref medium')
2862 self.assertRegex(output, 'local fdde:12:33::1 proto kernel metric 0 pref medium')
2863 self.assertRegex(output, 'local fdde:12:44::1 proto kernel metric 0 pref medium')
2864 self.assertRegex(output, 'local fdde:12:55::1 proto kernel metric 0 pref medium')
2865 self.assertRegex(output, 'ff00::/8 (proto kernel )?metric 256 (linkdown )?pref medium')
2866
2867 def test_configure_without_carrier(self):
2868 copy_network_unit('11-dummy.netdev')
2869 start_networkd()
2870 self.wait_operstate('test1', 'off', '')
2871 check_output('ip link set dev test1 up carrier off')
2872
2873 copy_network_unit('25-test1.network.d/configure-without-carrier.conf', copy_dropins=False)
2874 restart_networkd()
2875 self.wait_online(['test1:no-carrier'])
2876
2877 carrier_map = {'on': '1', 'off': '0'}
2878 routable_map = {'on': 'routable', 'off': 'no-carrier'}
2879 for carrier in ['off', 'on', 'off']:
2880 with self.subTest(carrier=carrier):
2881 if carrier_map[carrier] != read_link_attr('test1', 'carrier'):
2882 check_output(f'ip link set dev test1 carrier {carrier}')
2883 self.wait_online([f'test1:{routable_map[carrier]}:{routable_map[carrier]}'])
2884
2885 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'test1', env=env)
2886 print(output)
2887 self.assertRegex(output, '192.168.0.15')
2888 self.assertRegex(output, '192.168.0.1')
2889 self.assertRegex(output, routable_map[carrier])
2890
2891 def test_configure_without_carrier_yes_ignore_carrier_loss_no(self):
2892 copy_network_unit('11-dummy.netdev')
2893 start_networkd()
2894 self.wait_operstate('test1', 'off', '')
2895 check_output('ip link set dev test1 up carrier off')
2896
2897 copy_network_unit('25-test1.network')
2898 restart_networkd()
2899 self.wait_online(['test1:no-carrier'])
2900
2901 carrier_map = {'on': '1', 'off': '0'}
2902 routable_map = {'on': 'routable', 'off': 'no-carrier'}
2903 for (carrier, have_config) in [('off', True), ('on', True), ('off', False)]:
2904 with self.subTest(carrier=carrier, have_config=have_config):
2905 if carrier_map[carrier] != read_link_attr('test1', 'carrier'):
2906 check_output(f'ip link set dev test1 carrier {carrier}')
2907 self.wait_online([f'test1:{routable_map[carrier]}:{routable_map[carrier]}'])
2908
2909 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'test1', env=env)
2910 print(output)
2911 if have_config:
2912 self.assertRegex(output, '192.168.0.15')
2913 self.assertRegex(output, '192.168.0.1')
2914 else:
2915 self.assertNotRegex(output, '192.168.0.15')
2916 self.assertNotRegex(output, '192.168.0.1')
2917 self.assertRegex(output, routable_map[carrier])
2918
2919 def test_routing_policy_rule(self):
2920 copy_network_unit('25-routing-policy-rule-test1.network', '11-dummy.netdev')
2921 start_networkd()
2922 self.wait_online(['test1:degraded'])
2923
2924 output = check_output('ip rule list iif test1 priority 111')
2925 print(output)
2926 self.assertRegex(output, '111:')
2927 self.assertRegex(output, 'from 192.168.100.18')
2928 self.assertRegex(output, r'tos (0x08|throughput)\s')
2929 self.assertRegex(output, 'iif test1')
2930 self.assertRegex(output, 'oif test1')
2931 self.assertRegex(output, 'lookup 7')
2932
2933 output = check_output('ip rule list iif test1 priority 101')
2934 print(output)
2935 self.assertRegex(output, '101:')
2936 self.assertRegex(output, 'from all')
2937 self.assertRegex(output, 'iif test1')
2938 self.assertRegex(output, 'lookup 9')
2939
2940 output = check_output('ip -6 rule list iif test1 priority 100')
2941 print(output)
2942 self.assertRegex(output, '100:')
2943 self.assertRegex(output, 'from all')
2944 self.assertRegex(output, 'iif test1')
2945 self.assertRegex(output, 'lookup 8')
2946
2947 output = check_output('ip rule list iif test1 priority 102')
2948 print(output)
2949 self.assertRegex(output, '102:')
2950 self.assertRegex(output, 'from 0.0.0.0/8')
2951 self.assertRegex(output, 'iif test1')
2952 self.assertRegex(output, 'lookup 10')
2953
2954 output = check_output(*networkctl_cmd, '--json=short', 'status', env=env)
2955 check_json(output)
2956
2957 def test_routing_policy_rule_issue_11280(self):
2958 copy_network_unit('25-routing-policy-rule-test1.network', '11-dummy.netdev',
2959 '25-routing-policy-rule-dummy98.network', '12-dummy.netdev')
2960
2961 for trial in range(3):
2962 restart_networkd(show_logs=(trial > 0))
2963 self.wait_online(['test1:degraded', 'dummy98:degraded'])
2964
2965 output = check_output('ip rule list table 7')
2966 print(output)
2967 self.assertRegex(output, '111: from 192.168.100.18 tos (0x08|throughput) iif test1 oif test1 lookup 7')
2968
2969 output = check_output('ip rule list table 8')
2970 print(output)
2971 self.assertRegex(output, '112: from 192.168.101.18 tos (0x08|throughput) iif dummy98 oif dummy98 lookup 8')
2972
2973 def test_routing_policy_rule_reconfigure(self):
2974 copy_network_unit('25-routing-policy-rule-reconfigure2.network', '11-dummy.netdev')
2975 start_networkd()
2976 self.wait_online(['test1:degraded'])
2977
2978 output = check_output('ip rule list table 1011')
2979 print(output)
2980 self.assertIn('10111: from all fwmark 0x3f3 lookup 1011', output)
2981 self.assertIn('10112: from all oif test1 lookup 1011', output)
2982 self.assertIn('10113: from all iif test1 lookup 1011', output)
2983 self.assertIn('10114: from 192.168.8.254 lookup 1011', output)
2984
2985 output = check_output('ip -6 rule list table 1011')
2986 print(output)
2987 self.assertIn('10112: from all oif test1 lookup 1011', output)
2988
2989 copy_network_unit('25-routing-policy-rule-reconfigure1.network', '11-dummy.netdev')
2990 networkctl_reload()
2991 self.wait_online(['test1:degraded'])
2992
2993 output = check_output('ip rule list table 1011')
2994 print(output)
2995 self.assertIn('10111: from all fwmark 0x3f3 lookup 1011', output)
2996 self.assertIn('10112: from all oif test1 lookup 1011', output)
2997 self.assertIn('10113: from all iif test1 lookup 1011', output)
2998 self.assertIn('10114: from 192.168.8.254 lookup 1011', output)
2999
3000 output = check_output('ip -6 rule list table 1011')
3001 print(output)
3002 self.assertNotIn('10112: from all oif test1 lookup 1011', output)
3003 self.assertIn('10113: from all iif test1 lookup 1011', output)
3004
3005 call('ip rule delete priority 10111')
3006 call('ip rule delete priority 10112')
3007 call('ip rule delete priority 10113')
3008 call('ip rule delete priority 10114')
3009 call('ip -6 rule delete priority 10113')
3010
3011 output = check_output('ip rule list table 1011')
3012 print(output)
3013 self.assertEqual(output, '')
3014
3015 output = check_output('ip -6 rule list table 1011')
3016 print(output)
3017 self.assertEqual(output, '')
3018
3019 networkctl_reconfigure('test1')
3020 self.wait_online(['test1:degraded'])
3021
3022 output = check_output('ip rule list table 1011')
3023 print(output)
3024 self.assertIn('10111: from all fwmark 0x3f3 lookup 1011', output)
3025 self.assertIn('10112: from all oif test1 lookup 1011', output)
3026 self.assertIn('10113: from all iif test1 lookup 1011', output)
3027 self.assertIn('10114: from 192.168.8.254 lookup 1011', output)
3028
3029 output = check_output('ip -6 rule list table 1011')
3030 print(output)
3031 self.assertIn('10113: from all iif test1 lookup 1011', output)
3032
3033 @expectedFailureIfRoutingPolicyPortRangeIsNotAvailable()
3034 def test_routing_policy_rule_port_range(self):
3035 copy_network_unit('25-fibrule-port-range.network', '11-dummy.netdev')
3036 start_networkd()
3037 self.wait_online(['test1:degraded'])
3038
3039 output = check_output('ip rule')
3040 print(output)
3041 self.assertRegex(output, '111')
3042 self.assertRegex(output, 'from 192.168.100.18')
3043 self.assertRegex(output, '1123-1150')
3044 self.assertRegex(output, '3224-3290')
3045 self.assertRegex(output, 'tcp')
3046 self.assertRegex(output, 'lookup 7')
3047
3048 @expectedFailureIfRoutingPolicyIPProtoIsNotAvailable()
3049 def test_routing_policy_rule_invert(self):
3050 copy_network_unit('25-fibrule-invert.network', '11-dummy.netdev')
3051 start_networkd()
3052 self.wait_online(['test1:degraded'])
3053
3054 output = check_output('ip rule')
3055 print(output)
3056 self.assertRegex(output, '111')
3057 self.assertRegex(output, 'not.*?from.*?192.168.100.18')
3058 self.assertRegex(output, 'tcp')
3059 self.assertRegex(output, 'lookup 7')
3060
3061 @expectedFailureIfRoutingPolicyUIDRangeIsNotAvailable()
3062 def test_routing_policy_rule_uidrange(self):
3063 copy_network_unit('25-fibrule-uidrange.network', '11-dummy.netdev')
3064 start_networkd()
3065 self.wait_online(['test1:degraded'])
3066
3067 output = check_output('ip rule')
3068 print(output)
3069 self.assertRegex(output, '111')
3070 self.assertRegex(output, 'from 192.168.100.18')
3071 self.assertRegex(output, 'lookup 7')
3072 self.assertRegex(output, 'uidrange 100-200')
3073
3074 def _test_route_static(self, manage_foreign_routes):
3075 if not manage_foreign_routes:
3076 copy_networkd_conf_dropin('networkd-manage-foreign-routes-no.conf')
3077
3078 copy_network_unit('25-route-static.network', '12-dummy.netdev',
3079 '25-route-static-test1.network', '11-dummy.netdev')
3080 start_networkd()
3081 self.wait_online(['dummy98:routable'])
3082
3083 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'dummy98', env=env)
3084 print(output)
3085
3086 print('### ip -6 route show dev dummy98')
3087 output = check_output('ip -6 route show dev dummy98')
3088 print(output)
3089 self.assertIn('2001:1234:5:8fff:ff:ff:ff:ff proto static', output)
3090 self.assertIn('2001:1234:5:8f63::1 proto kernel', output)
3091 self.assertIn('2001:1234:5:afff:ff:ff:ff:ff via fe80:0:222:4dff:ff:ff:ff:ff proto static', output)
3092
3093 print('### ip -6 route show default')
3094 output = check_output('ip -6 route show default')
3095 print(output)
3096 self.assertIn('default', output)
3097 self.assertIn('via 2001:1234:5:8fff:ff:ff:ff:ff', output)
3098
3099 print('### ip -4 route show dev dummy98')
3100 output = check_output('ip -4 route show dev dummy98')
3101 print(output)
3102 self.assertIn('149.10.124.48/28 proto kernel scope link src 149.10.124.58', output)
3103 self.assertIn('149.10.124.64 proto static scope link', output)
3104 self.assertIn('169.254.0.0/16 proto static scope link metric 2048', output)
3105 self.assertIn('192.168.1.1 proto static scope link initcwnd 20', output)
3106 self.assertIn('192.168.1.2 proto static scope link initrwnd 30', output)
3107 self.assertIn('192.168.1.3 proto static scope link advmss 30', output)
3108 self.assertIn('192.168.1.4 proto static scope link hoplimit 122', output)
3109 self.assertIn('multicast 149.10.123.4 proto static', output)
3110
3111 print('### ip -4 route show dev dummy98 default')
3112 output = check_output('ip -4 route show dev dummy98 default')
3113 print(output)
3114 self.assertIn('default via 149.10.125.65 proto static onlink', output)
3115 self.assertIn('default via 149.10.124.64 proto static', output)
3116 self.assertIn('default proto static', output)
3117 self.assertIn('default via 1.1.8.104 proto static', output)
3118
3119 print('### ip -4 route show table local dev dummy98')
3120 output = check_output('ip -4 route show table local dev dummy98')
3121 print(output)
3122 self.assertIn('local 149.10.123.1 proto static scope host', output)
3123 self.assertIn('anycast 149.10.123.2 proto static scope link', output)
3124 self.assertIn('broadcast 149.10.123.3 proto static scope link', output)
3125
3126 print('### ip -4 route show type blackhole')
3127 output = check_output('ip -4 route show type blackhole')
3128 print(output)
3129 self.assertIn('blackhole 202.54.1.2 proto static', output)
3130
3131 print('### ip -4 route show type unreachable')
3132 output = check_output('ip -4 route show type unreachable')
3133 print(output)
3134 self.assertIn('unreachable 202.54.1.3 proto static', output)
3135
3136 print('### ip -4 route show type prohibit')
3137 output = check_output('ip -4 route show type prohibit')
3138 print(output)
3139 self.assertIn('prohibit 202.54.1.4 proto static', output)
3140
3141 print('### ip -6 route show type blackhole')
3142 output = check_output('ip -6 route show type blackhole')
3143 print(output)
3144 self.assertIn('blackhole 2001:1234:5678::2 dev lo proto static', output)
3145
3146 print('### ip -6 route show type unreachable')
3147 output = check_output('ip -6 route show type unreachable')
3148 print(output)
3149 self.assertIn('unreachable 2001:1234:5678::3 dev lo proto static', output)
3150
3151 print('### ip -6 route show type prohibit')
3152 output = check_output('ip -6 route show type prohibit')
3153 print(output)
3154 self.assertIn('prohibit 2001:1234:5678::4 dev lo proto static', output)
3155
3156 print('### ip route show 192.168.10.1')
3157 output = check_output('ip route show 192.168.10.1')
3158 print(output)
3159 self.assertIn('192.168.10.1 proto static', output)
3160 self.assertIn('nexthop via 149.10.123.59 dev test1 weight 20', output)
3161 self.assertIn('nexthop via 149.10.123.60 dev test1 weight 30', output)
3162 self.assertIn('nexthop via 149.10.124.59 dev dummy98 weight 10', output)
3163 self.assertIn('nexthop via 149.10.124.60 dev dummy98 weight 5', output)
3164
3165 print('### ip route show 192.168.10.2')
3166 output = check_output('ip route show 192.168.10.2')
3167 print(output)
3168 # old ip command does not show IPv6 gateways...
3169 self.assertIn('192.168.10.2 proto static', output)
3170 self.assertIn('nexthop', output)
3171 self.assertIn('dev test1 weight 20', output)
3172 self.assertIn('dev test1 weight 30', output)
3173 self.assertIn('dev dummy98 weight 10', output)
3174 self.assertIn('dev dummy98 weight 5', output)
3175
3176 print('### ip -6 route show 2001:1234:5:7fff:ff:ff:ff:ff')
3177 output = check_output('ip -6 route show 2001:1234:5:7fff:ff:ff:ff:ff')
3178 print(output)
3179 # old ip command does not show 'nexthop' keyword and weight...
3180 self.assertIn('2001:1234:5:7fff:ff:ff:ff:ff', output)
3181 self.assertIn('via 2001:1234:5:6fff:ff:ff:ff:ff dev test1', output)
3182 self.assertIn('via 2001:1234:5:7fff:ff:ff:ff:ff dev test1', output)
3183 self.assertIn('via 2001:1234:5:8fff:ff:ff:ff:ff dev dummy98', output)
3184 self.assertIn('via 2001:1234:5:9fff:ff:ff:ff:ff dev dummy98', output)
3185
3186 output = check_output(*networkctl_cmd, '--json=short', 'status', env=env)
3187 check_json(output)
3188
3189 copy_network_unit('25-address-static.network')
3190 networkctl_reload()
3191 self.wait_online(['dummy98:routable'])
3192
3193 # check all routes managed by Manager are removed
3194 print('### ip -4 route show type blackhole')
3195 output = check_output('ip -4 route show type blackhole')
3196 print(output)
3197 self.assertEqual(output, '')
3198
3199 print('### ip -4 route show type unreachable')
3200 output = check_output('ip -4 route show type unreachable')
3201 print(output)
3202 self.assertEqual(output, '')
3203
3204 print('### ip -4 route show type prohibit')
3205 output = check_output('ip -4 route show type prohibit')
3206 print(output)
3207 self.assertEqual(output, '')
3208
3209 print('### ip -6 route show type blackhole')
3210 output = check_output('ip -6 route show type blackhole')
3211 print(output)
3212 self.assertEqual(output, '')
3213
3214 print('### ip -6 route show type unreachable')
3215 output = check_output('ip -6 route show type unreachable')
3216 print(output)
3217 self.assertEqual(output, '')
3218
3219 print('### ip -6 route show type prohibit')
3220 output = check_output('ip -6 route show type prohibit')
3221 print(output)
3222 self.assertEqual(output, '')
3223
3224 remove_network_unit('25-address-static.network')
3225 networkctl_reload()
3226 self.wait_online(['dummy98:routable'])
3227
3228 # check all routes managed by Manager are reconfigured
3229 print('### ip -4 route show type blackhole')
3230 output = check_output('ip -4 route show type blackhole')
3231 print(output)
3232 self.assertIn('blackhole 202.54.1.2 proto static', output)
3233
3234 print('### ip -4 route show type unreachable')
3235 output = check_output('ip -4 route show type unreachable')
3236 print(output)
3237 self.assertIn('unreachable 202.54.1.3 proto static', output)
3238
3239 print('### ip -4 route show type prohibit')
3240 output = check_output('ip -4 route show type prohibit')
3241 print(output)
3242 self.assertIn('prohibit 202.54.1.4 proto static', output)
3243
3244 print('### ip -6 route show type blackhole')
3245 output = check_output('ip -6 route show type blackhole')
3246 print(output)
3247 self.assertIn('blackhole 2001:1234:5678::2 dev lo proto static', output)
3248
3249 print('### ip -6 route show type unreachable')
3250 output = check_output('ip -6 route show type unreachable')
3251 print(output)
3252 self.assertIn('unreachable 2001:1234:5678::3 dev lo proto static', output)
3253
3254 print('### ip -6 route show type prohibit')
3255 output = check_output('ip -6 route show type prohibit')
3256 print(output)
3257 self.assertIn('prohibit 2001:1234:5678::4 dev lo proto static', output)
3258
3259 remove_link('dummy98')
3260 time.sleep(2)
3261
3262 # check all routes managed by Manager are removed
3263 print('### ip -4 route show type blackhole')
3264 output = check_output('ip -4 route show type blackhole')
3265 print(output)
3266 self.assertEqual(output, '')
3267
3268 print('### ip -4 route show type unreachable')
3269 output = check_output('ip -4 route show type unreachable')
3270 print(output)
3271 self.assertEqual(output, '')
3272
3273 print('### ip -4 route show type prohibit')
3274 output = check_output('ip -4 route show type prohibit')
3275 print(output)
3276 self.assertEqual(output, '')
3277
3278 print('### ip -6 route show type blackhole')
3279 output = check_output('ip -6 route show type blackhole')
3280 print(output)
3281 self.assertEqual(output, '')
3282
3283 print('### ip -6 route show type unreachable')
3284 output = check_output('ip -6 route show type unreachable')
3285 print(output)
3286 self.assertEqual(output, '')
3287
3288 print('### ip -6 route show type prohibit')
3289 output = check_output('ip -6 route show type prohibit')
3290 print(output)
3291 self.assertEqual(output, '')
3292
3293 def test_route_static(self):
3294 first = True
3295 for manage_foreign_routes in [True, False]:
3296 if first:
3297 first = False
3298 else:
3299 self.tearDown()
3300
3301 print(f'### test_route_static(manage_foreign_routes={manage_foreign_routes})')
3302 with self.subTest(manage_foreign_routes=manage_foreign_routes):
3303 self._test_route_static(manage_foreign_routes)
3304
3305 @expectedFailureIfRTA_VIAIsNotSupported()
3306 def test_route_via_ipv6(self):
3307 copy_network_unit('25-route-via-ipv6.network', '12-dummy.netdev')
3308 start_networkd()
3309 self.wait_online(['dummy98:routable'])
3310
3311 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'dummy98', env=env)
3312 print(output)
3313
3314 print('### ip -6 route show dev dummy98')
3315 output = check_output('ip -6 route show dev dummy98')
3316 print(output)
3317 self.assertRegex(output, '2001:1234:5:8fff:ff:ff:ff:ff proto static')
3318 self.assertRegex(output, '2001:1234:5:8f63::1 proto kernel')
3319
3320 print('### ip -4 route show dev dummy98')
3321 output = check_output('ip -4 route show dev dummy98')
3322 print(output)
3323 self.assertRegex(output, '149.10.124.48/28 proto kernel scope link src 149.10.124.58')
3324 self.assertRegex(output, '149.10.124.66 via inet6 2001:1234:5:8fff:ff:ff:ff:ff proto static')
3325
3326 @expectedFailureIfModuleIsNotAvailable('tcp_dctcp')
3327 def test_route_congctl(self):
3328 copy_network_unit('25-route-congctl.network', '12-dummy.netdev')
3329 start_networkd()
3330 self.wait_online(['dummy98:routable'])
3331
3332 print('### ip -6 route show dev dummy98 2001:1234:5:8fff:ff:ff:ff:ff')
3333 output = check_output('ip -6 route show dev dummy98 2001:1234:5:8fff:ff:ff:ff:ff')
3334 print(output)
3335 self.assertIn('2001:1234:5:8fff:ff:ff:ff:ff proto static', output)
3336 self.assertIn('congctl dctcp', output)
3337
3338 print('### ip -4 route show dev dummy98 149.10.124.66')
3339 output = check_output('ip -4 route show dev dummy98 149.10.124.66')
3340 print(output)
3341 self.assertIn('149.10.124.66 proto static', output)
3342 self.assertIn('congctl dctcp', output)
3343 self.assertIn('rto_min 300s', output)
3344
3345 @expectedFailureIfModuleIsNotAvailable('vrf')
3346 def test_route_vrf(self):
3347 copy_network_unit('25-route-vrf.network', '12-dummy.netdev',
3348 '25-vrf.netdev', '25-vrf.network')
3349 start_networkd()
3350 self.wait_online(['dummy98:routable', 'vrf99:carrier'])
3351
3352 output = check_output('ip route show vrf vrf99')
3353 print(output)
3354 self.assertRegex(output, 'default via 192.168.100.1')
3355
3356 output = check_output('ip route show')
3357 print(output)
3358 self.assertNotRegex(output, 'default via 192.168.100.1')
3359
3360 def test_gateway_reconfigure(self):
3361 copy_network_unit('25-gateway-static.network', '12-dummy.netdev')
3362 start_networkd()
3363 self.wait_online(['dummy98:routable'])
3364 print('### ip -4 route show dev dummy98 default')
3365 output = check_output('ip -4 route show dev dummy98 default')
3366 print(output)
3367 self.assertIn('default via 149.10.124.59 proto static', output)
3368 self.assertNotIn('149.10.124.60', output)
3369
3370 remove_network_unit('25-gateway-static.network')
3371 copy_network_unit('25-gateway-next-static.network')
3372 networkctl_reload()
3373 self.wait_online(['dummy98:routable'])
3374 print('### ip -4 route show dev dummy98 default')
3375 output = check_output('ip -4 route show dev dummy98 default')
3376 print(output)
3377 self.assertNotIn('149.10.124.59', output)
3378 self.assertIn('default via 149.10.124.60 proto static', output)
3379
3380 def test_ip_route_ipv6_src_route(self):
3381 # a dummy device does not make the addresses go through tentative state, so we
3382 # reuse a bond from an earlier test, which does make the addresses go through
3383 # tentative state, and do our test on that
3384 copy_network_unit('23-active-slave.network', '25-route-ipv6-src.network', '25-bond-active-backup-slave.netdev', '12-dummy.netdev')
3385 start_networkd()
3386 self.wait_online(['dummy98:enslaved', 'bond199:routable'])
3387
3388 output = check_output('ip -6 route list dev bond199')
3389 print(output)
3390 self.assertIn('abcd::/16 via 2001:1234:56:8f63::1:1 proto static src 2001:1234:56:8f63::2', output)
3391
3392 def test_route_preferred_source_with_existing_address(self):
3393 # See issue #28009.
3394 copy_network_unit('25-route-preferred-source.network', '12-dummy.netdev')
3395 start_networkd()
3396
3397 for i in range(3):
3398 if i != 0:
3399 networkctl_reconfigure('dummy98')
3400
3401 self.wait_online(['dummy98:routable'])
3402
3403 output = check_output('ip -6 route list dev dummy98')
3404 print(output)
3405 self.assertIn('abcd::/16 via 2001:1234:56:8f63::1:1 proto static src 2001:1234:56:8f63::1', output)
3406
3407 def test_ip_link_mac_address(self):
3408 copy_network_unit('25-address-link-section.network', '12-dummy.netdev')
3409 start_networkd()
3410 self.wait_online(['dummy98:degraded'])
3411
3412 output = check_output('ip link show dummy98')
3413 print(output)
3414 self.assertRegex(output, '00:01:02:aa:bb:cc')
3415
3416 def test_ip_link_unmanaged(self):
3417 copy_network_unit('25-link-section-unmanaged.network', '12-dummy.netdev')
3418 start_networkd()
3419
3420 self.wait_operstate('dummy98', 'off', setup_state='unmanaged')
3421
3422 def test_ipv6_address_label(self):
3423 copy_network_unit('25-ipv6-address-label-section.network', '12-dummy.netdev')
3424 start_networkd()
3425 self.wait_online(['dummy98:degraded'])
3426
3427 output = check_output('ip addrlabel list')
3428 print(output)
3429 self.assertRegex(output, '2004:da8:1::/64')
3430
3431 def test_ipv6_proxy_ndp(self):
3432 copy_network_unit('25-ipv6-proxy-ndp.network', '12-dummy.netdev')
3433 start_networkd()
3434
3435 self.wait_online(['dummy98:routable'])
3436
3437 output = check_output('ip neighbor show proxy dev dummy98')
3438 print(output)
3439 for i in range(1, 5):
3440 self.assertRegex(output, f'2607:5300:203:5215:{i}::1 *proxy')
3441
3442 def test_neighbor_section(self):
3443 copy_network_unit('25-neighbor-section.network', '12-dummy.netdev', copy_dropins=False)
3444 start_networkd()
3445 self.wait_online(['dummy98:degraded'])
3446
3447 print('### ip neigh list dev dummy98')
3448 output = check_output('ip neigh list dev dummy98')
3449 print(output)
3450 self.assertIn('192.168.10.1 lladdr 00:00:5e:00:02:65 PERMANENT', output)
3451 self.assertIn('2004:da8:1::1 lladdr 00:00:5e:00:02:66 PERMANENT', output)
3452 self.assertNotIn('2004:da8:1:0::2', output)
3453 self.assertNotIn('192.168.10.2', output)
3454 self.assertNotIn('00:00:5e:00:02:67', output)
3455
3456 output = check_output(*networkctl_cmd, '--json=short', 'status', env=env)
3457 check_json(output)
3458
3459 copy_network_unit('25-neighbor-section.network.d/override.conf')
3460 networkctl_reload()
3461 self.wait_online(['dummy98:degraded'])
3462
3463 print('### ip neigh list dev dummy98 (after reloading)')
3464 output = check_output('ip neigh list dev dummy98')
3465 print(output)
3466 self.assertIn('192.168.10.1 lladdr 00:00:5e:00:03:65 PERMANENT', output)
3467 self.assertIn('2004:da8:1::1 lladdr 00:00:5e:00:03:66 PERMANENT', output)
3468 self.assertNotIn('2004:da8:1:0::2', output)
3469 self.assertNotIn('192.168.10.2', output)
3470 self.assertNotIn('00:00:5e:00:02', output)
3471
3472 def test_neighbor_reconfigure(self):
3473 copy_network_unit('25-neighbor-section.network', '12-dummy.netdev', copy_dropins=False)
3474 start_networkd()
3475 self.wait_online(['dummy98:degraded'])
3476
3477 print('### ip neigh list dev dummy98')
3478 output = check_output('ip neigh list dev dummy98')
3479 print(output)
3480 self.assertIn('192.168.10.1 lladdr 00:00:5e:00:02:65 PERMANENT', output)
3481 self.assertIn('2004:da8:1::1 lladdr 00:00:5e:00:02:66 PERMANENT', output)
3482
3483 remove_network_unit('25-neighbor-section.network')
3484 copy_network_unit('25-neighbor-next.network')
3485 networkctl_reload()
3486 self.wait_online(['dummy98:degraded'])
3487 print('### ip neigh list dev dummy98')
3488 output = check_output('ip neigh list dev dummy98')
3489 print(output)
3490 self.assertNotIn('00:00:5e:00:02:65', output)
3491 self.assertIn('192.168.10.1 lladdr 00:00:5e:00:02:66 PERMANENT', output)
3492 self.assertNotIn('2004:da8:1::1', output)
3493
3494 def test_neighbor_gre(self):
3495 copy_network_unit('25-neighbor-ip.network', '25-neighbor-ipv6.network', '25-neighbor-ip-dummy.network',
3496 '12-dummy.netdev', '25-gre-tunnel-remote-any.netdev', '25-ip6gre-tunnel-remote-any.netdev')
3497 start_networkd()
3498 self.wait_online(['dummy98:degraded', 'gretun97:routable', 'ip6gretun97:routable'], timeout='40s')
3499
3500 output = check_output('ip neigh list dev gretun97')
3501 print(output)
3502 self.assertIn('10.0.0.22 lladdr 10.65.223.239 PERMANENT', output)
3503 self.assertNotIn('10.0.0.23', output)
3504
3505 output = check_output('ip neigh list dev ip6gretun97')
3506 print(output)
3507 self.assertRegex(output, '2001:db8:0:f102::17 lladdr 2a:?00:ff:?de:45:?67:ed:?de:[0:]*:49:?88 PERMANENT')
3508 self.assertNotIn('2001:db8:0:f102::18', output)
3509
3510 output = check_output(*networkctl_cmd, '--json=short', 'status', env=env)
3511 check_json(output)
3512
3513 def test_link_local_addressing(self):
3514 copy_network_unit('25-link-local-addressing-yes.network', '11-dummy.netdev',
3515 '25-link-local-addressing-no.network', '12-dummy.netdev')
3516 start_networkd()
3517 self.wait_online(['test1:degraded', 'dummy98:carrier'])
3518
3519 output = check_output('ip address show dev test1')
3520 print(output)
3521 self.assertRegex(output, 'inet .* scope link')
3522 self.assertRegex(output, 'inet6 .* scope link')
3523
3524 output = check_output('ip address show dev dummy98')
3525 print(output)
3526 self.assertNotRegex(output, 'inet6* .* scope link')
3527
3528 # Documentation/networking/ip-sysctl.txt
3529 #
3530 # addr_gen_mode - INTEGER
3531 # Defines how link-local and autoconf addresses are generated.
3532 #
3533 # 0: generate address based on EUI64 (default)
3534 # 1: do no generate a link-local address, use EUI64 for addresses generated
3535 # from autoconf
3536 # 2: generate stable privacy addresses, using the secret from
3537 # stable_secret (RFC7217)
3538 # 3: generate stable privacy addresses, using a random secret if unset
3539
3540 self.check_ipv6_sysctl_attr('test1', 'stable_secret', '0123:4567:89ab:cdef:0123:4567:89ab:cdef')
3541 self.check_ipv6_sysctl_attr('test1', 'addr_gen_mode', '2')
3542 self.check_ipv6_sysctl_attr('dummy98', 'addr_gen_mode', '1')
3543
3544 def test_link_local_addressing_ipv6ll(self):
3545 copy_network_unit('26-link-local-addressing-ipv6.network', '12-dummy.netdev')
3546 start_networkd()
3547 self.wait_online(['dummy98:degraded'])
3548
3549 # An IPv6LL address exists by default.
3550 output = check_output('ip address show dev dummy98')
3551 print(output)
3552 self.assertRegex(output, 'inet6 .* scope link')
3553
3554 copy_network_unit('25-link-local-addressing-no.network')
3555 networkctl_reload()
3556 self.wait_online(['dummy98:carrier'])
3557
3558 # Check if the IPv6LL address is removed.
3559 output = check_output('ip address show dev dummy98')
3560 print(output)
3561 self.assertNotRegex(output, 'inet6 .* scope link')
3562
3563 remove_network_unit('25-link-local-addressing-no.network')
3564 networkctl_reload()
3565 self.wait_online(['dummy98:degraded'])
3566
3567 # Check if a new IPv6LL address is assigned.
3568 output = check_output('ip address show dev dummy98')
3569 print(output)
3570 self.assertRegex(output, 'inet6 .* scope link')
3571
3572 @unittest.skip("Re-enable once https://github.com/systemd/systemd/issues/30056 is resolved")
3573 def test_sysctl(self):
3574 copy_networkd_conf_dropin('25-global-ipv6-privacy-extensions.conf')
3575 copy_network_unit('25-sysctl.network', '12-dummy.netdev', copy_dropins=False)
3576 start_networkd()
3577 self.wait_online(['dummy98:degraded'])
3578
3579 self.check_ipv6_sysctl_attr('dummy98', 'forwarding', '1')
3580 self.check_ipv6_sysctl_attr('dummy98', 'use_tempaddr', '1')
3581 self.check_ipv6_sysctl_attr('dummy98', 'dad_transmits', '3')
3582 self.check_ipv6_sysctl_attr('dummy98', 'hop_limit', '5')
3583 self.check_ipv6_sysctl_attr('dummy98', 'proxy_ndp', '1')
3584 self.check_ipv4_sysctl_attr('dummy98', 'forwarding', '1')
3585 self.check_ipv4_sysctl_attr('dummy98', 'proxy_arp', '1')
3586 self.check_ipv4_sysctl_attr('dummy98', 'accept_local', '1')
3587 self.check_ipv4_sysctl_attr('dummy98', 'rp_filter', '0')
3588
3589 copy_network_unit('25-sysctl.network.d/25-ipv6-privacy-extensions.conf')
3590 networkctl_reload()
3591 self.wait_online(['dummy98:degraded'])
3592
3593 self.check_ipv6_sysctl_attr('dummy98', 'use_tempaddr', '2')
3594
3595 def test_sysctl_disable_ipv6(self):
3596 copy_network_unit('25-sysctl-disable-ipv6.network', '12-dummy.netdev')
3597
3598 print('## Disable ipv6')
3599 check_output('sysctl net.ipv6.conf.all.disable_ipv6=1')
3600 check_output('sysctl net.ipv6.conf.default.disable_ipv6=1')
3601
3602 start_networkd()
3603 self.wait_online(['dummy98:routable'])
3604
3605 output = check_output('ip -4 address show dummy98')
3606 print(output)
3607 self.assertRegex(output, 'inet 10.2.3.4/16 brd 10.2.255.255 scope global dummy98')
3608 output = check_output('ip -6 address show dummy98')
3609 print(output)
3610 self.assertRegex(output, 'inet6 2607:5300:203:3906::/64 scope global')
3611 self.assertRegex(output, 'inet6 .* scope link')
3612 output = check_output('ip -4 route show dev dummy98')
3613 print(output)
3614 self.assertRegex(output, '10.2.0.0/16 proto kernel scope link src 10.2.3.4')
3615 output = check_output('ip -6 route show default')
3616 print(output)
3617 self.assertRegex(output, 'default')
3618 self.assertRegex(output, 'via 2607:5300:203:39ff:ff:ff:ff:ff')
3619
3620 remove_link('dummy98')
3621
3622 print('## Enable ipv6')
3623 check_output('sysctl net.ipv6.conf.all.disable_ipv6=0')
3624 check_output('sysctl net.ipv6.conf.default.disable_ipv6=0')
3625
3626 restart_networkd()
3627 self.wait_online(['dummy98:routable'])
3628
3629 output = check_output('ip -4 address show dummy98')
3630 print(output)
3631 self.assertRegex(output, 'inet 10.2.3.4/16 brd 10.2.255.255 scope global dummy98')
3632 output = check_output('ip -6 address show dummy98')
3633 print(output)
3634 self.assertRegex(output, 'inet6 2607:5300:203:3906::/64 scope global')
3635 self.assertRegex(output, 'inet6 .* scope link')
3636 output = check_output('ip -4 route show dev dummy98')
3637 print(output)
3638 self.assertRegex(output, '10.2.0.0/16 proto kernel scope link src 10.2.3.4')
3639 output = check_output('ip -6 route show default')
3640 print(output)
3641 self.assertRegex(output, 'via 2607:5300:203:39ff:ff:ff:ff:ff')
3642
3643 def test_bind_carrier(self):
3644 copy_network_unit('25-bind-carrier.network', '11-dummy.netdev')
3645 start_networkd()
3646
3647 # no bound interface.
3648 self.wait_operstate('test1', 'off', setup_state='configuring')
3649 output = check_output('ip address show test1')
3650 print(output)
3651 self.assertNotIn('UP,LOWER_UP', output)
3652 self.assertIn('DOWN', output)
3653 self.assertNotIn('192.168.10', output)
3654
3655 # add one bound interface. The interface will be up.
3656 check_output('ip link add dummy98 type dummy')
3657 check_output('ip link set dummy98 up')
3658 self.wait_online(['test1:routable'])
3659 output = check_output('ip address show test1')
3660 print(output)
3661 self.assertIn('UP,LOWER_UP', output)
3662 self.assertIn('inet 192.168.10.30/24 brd 192.168.10.255 scope global test1', output)
3663
3664 # add another bound interface. The interface is still up.
3665 check_output('ip link add dummy99 type dummy')
3666 check_output('ip link set dummy99 up')
3667 self.wait_operstate('dummy99', 'degraded', setup_state='unmanaged')
3668 output = check_output('ip address show test1')
3669 print(output)
3670 self.assertIn('UP,LOWER_UP', output)
3671 self.assertIn('inet 192.168.10.30/24 brd 192.168.10.255 scope global test1', output)
3672
3673 # remove one of the bound interfaces. The interface is still up
3674 remove_link('dummy98')
3675 output = check_output('ip address show test1')
3676 print(output)
3677 self.assertIn('UP,LOWER_UP', output)
3678 self.assertIn('inet 192.168.10.30/24 brd 192.168.10.255 scope global test1', output)
3679
3680 # bring down the remaining bound interface. The interface will be down.
3681 check_output('ip link set dummy99 down')
3682 self.wait_operstate('test1', 'off')
3683 self.wait_address_dropped('test1', r'192.168.10', ipv='-4', timeout_sec=10)
3684 output = check_output('ip address show test1')
3685 print(output)
3686 self.assertNotIn('UP,LOWER_UP', output)
3687 self.assertIn('DOWN', output)
3688 self.assertNotIn('192.168.10', output)
3689
3690 # bring up the bound interface. The interface will be up.
3691 check_output('ip link set dummy99 up')
3692 self.wait_online(['test1:routable'])
3693 output = check_output('ip address show test1')
3694 print(output)
3695 self.assertIn('UP,LOWER_UP', output)
3696 self.assertIn('inet 192.168.10.30/24 brd 192.168.10.255 scope global test1', output)
3697
3698 # remove the remaining bound interface. The interface will be down.
3699 remove_link('dummy99')
3700 self.wait_operstate('test1', 'off')
3701 self.wait_address_dropped('test1', r'192.168.10', ipv='-4', timeout_sec=10)
3702 output = check_output('ip address show test1')
3703 print(output)
3704 self.assertNotIn('UP,LOWER_UP', output)
3705 self.assertIn('DOWN', output)
3706 self.assertNotIn('192.168.10', output)
3707
3708 # re-add one bound interface. The interface will be up.
3709 check_output('ip link add dummy98 type dummy')
3710 check_output('ip link set dummy98 up')
3711 self.wait_online(['test1:routable'])
3712 output = check_output('ip address show test1')
3713 print(output)
3714 self.assertIn('UP,LOWER_UP', output)
3715 self.assertIn('inet 192.168.10.30/24 brd 192.168.10.255 scope global test1', output)
3716
3717 def _test_activation_policy(self, interface, test):
3718 conffile = '25-activation-policy.network'
3719 if test:
3720 conffile = f'{conffile}.d/{test}.conf'
3721 if interface == 'vlan99':
3722 copy_network_unit('21-vlan.netdev', '21-vlan-test1.network')
3723 copy_network_unit('11-dummy.netdev', conffile, copy_dropins=False)
3724 start_networkd()
3725
3726 always = test.startswith('always')
3727 initial_up = test != 'manual' and not test.endswith('down') # note: default is up
3728 expect_up = initial_up
3729 next_up = not expect_up
3730
3731 if test.endswith('down'):
3732 self.wait_activated(interface)
3733
3734 for iteration in range(4):
3735 with self.subTest(iteration=iteration, expect_up=expect_up):
3736 operstate = 'routable' if expect_up else 'off'
3737 setup_state = 'configured' if expect_up else ('configuring' if iteration == 0 else None)
3738 self.wait_operstate(interface, operstate, setup_state=setup_state, setup_timeout=20)
3739
3740 if expect_up:
3741 self.assertIn('UP', check_output(f'ip link show {interface}'))
3742 self.assertIn('192.168.10.30/24', check_output(f'ip address show {interface}'))
3743 self.assertIn('default via 192.168.10.1', check_output(f'ip route show dev {interface}'))
3744 else:
3745 self.assertIn('DOWN', check_output(f'ip link show {interface}'))
3746
3747 if next_up:
3748 check_output(f'ip link set dev {interface} up')
3749 else:
3750 check_output(f'ip link set dev {interface} down')
3751 expect_up = initial_up if always else next_up
3752 next_up = not next_up
3753 if always:
3754 time.sleep(1)
3755
3756 def test_activation_policy(self):
3757 first = True
3758 for interface in ['test1', 'vlan99']:
3759 for test in ['up', 'always-up', 'manual', 'always-down', 'down', '']:
3760 if first:
3761 first = False
3762 else:
3763 self.tearDown()
3764
3765 print(f'### test_activation_policy(interface={interface}, test={test})')
3766 with self.subTest(interface=interface, test=test):
3767 self._test_activation_policy(interface, test)
3768
3769 def _test_activation_policy_required_for_online(self, policy, required):
3770 conffile = '25-activation-policy.network'
3771 units = ['11-dummy.netdev', '12-dummy.netdev', '12-dummy.network', conffile]
3772 if policy:
3773 units += [f'{conffile}.d/{policy}.conf']
3774 if required:
3775 units += [f'{conffile}.d/required-{required}.conf']
3776 copy_network_unit(*units, copy_dropins=False)
3777 start_networkd()
3778
3779 if policy.endswith('down'):
3780 self.wait_activated('test1')
3781
3782 if policy.endswith('down') or policy == 'manual':
3783 self.wait_operstate('test1', 'off', setup_state='configuring')
3784 else:
3785 self.wait_online(['test1'])
3786
3787 if policy == 'always-down':
3788 # if always-down, required for online is forced to no
3789 expected = False
3790 elif required:
3791 # otherwise if required for online is specified, it should match that
3792 expected = required == 'yes'
3793 elif policy:
3794 # otherwise if only policy specified, required for online defaults to
3795 # true if policy is up, always-up, or bound
3796 expected = policy.endswith('up') or policy == 'bound'
3797 else:
3798 # default is true, if neither are specified
3799 expected = True
3800
3801 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'test1', env=env)
3802 print(output)
3803
3804 yesno = 'yes' if expected else 'no'
3805 self.assertRegex(output, f'Required For Online: {yesno}')
3806
3807 def test_activation_policy_required_for_online(self):
3808 first = True
3809 for policy in ['up', 'always-up', 'manual', 'always-down', 'down', 'bound', '']:
3810 for required in ['yes', 'no', '']:
3811 if first:
3812 first = False
3813 else:
3814 self.tearDown()
3815
3816 print(f'### test_activation_policy_required_for_online(policy={policy}, required={required})')
3817 with self.subTest(policy=policy, required=required):
3818 self._test_activation_policy_required_for_online(policy, required)
3819
3820 def test_domain(self):
3821 copy_network_unit('12-dummy.netdev', '24-search-domain.network')
3822 start_networkd()
3823 self.wait_online(['dummy98:routable'])
3824
3825 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'dummy98', env=env)
3826 print(output)
3827 self.assertRegex(output, 'Address: 192.168.42.100')
3828 self.assertRegex(output, 'DNS: 192.168.42.1')
3829 self.assertRegex(output, 'Search Domains: one')
3830
3831 def test_keep_configuration_static(self):
3832 check_output('ip link add name dummy98 type dummy')
3833 check_output('ip address add 10.1.2.3/16 dev dummy98')
3834 check_output('ip address add 10.2.3.4/16 dev dummy98 valid_lft 600 preferred_lft 500')
3835 output = check_output('ip address show dummy98')
3836 print(output)
3837 self.assertRegex(output, 'inet 10.1.2.3/16 scope global dummy98')
3838 self.assertRegex(output, 'inet 10.2.3.4/16 scope global dynamic dummy98')
3839 output = check_output('ip route show dev dummy98')
3840 print(output)
3841
3842 copy_network_unit('24-keep-configuration-static.network')
3843 start_networkd()
3844 self.wait_online(['dummy98:routable'])
3845
3846 output = check_output('ip address show dummy98')
3847 print(output)
3848 self.assertRegex(output, 'inet 10.1.2.3/16 scope global dummy98')
3849 self.assertNotRegex(output, 'inet 10.2.3.4/16 scope global dynamic dummy98')
3850
3851 def check_nexthop(self, manage_foreign_nexthops):
3852 self.wait_online(['veth99:routable', 'veth-peer:routable', 'dummy98:routable'])
3853
3854 output = check_output('ip nexthop list dev veth99')
3855 print(output)
3856 self.assertIn('id 1 via 192.168.5.1 dev veth99', output)
3857 self.assertIn('id 2 via 2001:1234:5:8f63::2 dev veth99', output)
3858 self.assertIn('id 3 dev veth99', output)
3859 self.assertIn('id 4 dev veth99', output)
3860 self.assertRegex(output, 'id 5 via 192.168.10.1 dev veth99 .*onlink')
3861 self.assertIn('id 8 via fe80:0:222:4dff:ff:ff:ff:ff dev veth99', output)
3862 if manage_foreign_nexthops:
3863 self.assertRegex(output, r'id [0-9]* via 192.168.5.2 dev veth99')
3864
3865 output = check_output('ip nexthop list dev dummy98')
3866 print(output)
3867 self.assertIn('id 20 via 192.168.20.1 dev dummy98', output)
3868 if manage_foreign_nexthops:
3869 self.assertNotIn('id 42 via 192.168.20.2 dev dummy98', output)
3870 else:
3871 self.assertIn('id 42 via 192.168.20.2 dev dummy98', output)
3872
3873 # kernel manages blackhole nexthops on lo
3874 output = check_output('ip nexthop list dev lo')
3875 print(output)
3876 self.assertIn('id 6 blackhole', output)
3877 self.assertIn('id 7 blackhole', output)
3878
3879 # group nexthops are shown with -0 option
3880 output = check_output('ip -0 nexthop list id 21')
3881 print(output)
3882 self.assertRegex(output, r'id 21 group (1,3/20|20/1,3)')
3883
3884 output = check_output('ip route show dev veth99 10.10.10.10')
3885 print(output)
3886 self.assertEqual('10.10.10.10 nhid 1 via 192.168.5.1 proto static', output)
3887
3888 output = check_output('ip route show dev veth99 10.10.10.11')
3889 print(output)
3890 self.assertEqual('10.10.10.11 nhid 2 via inet6 2001:1234:5:8f63::2 proto static', output)
3891
3892 output = check_output('ip route show dev veth99 10.10.10.12')
3893 print(output)
3894 self.assertEqual('10.10.10.12 nhid 5 via 192.168.10.1 proto static onlink', output)
3895
3896 output = check_output('ip -6 route show dev veth99 2001:1234:5:8f62::1')
3897 print(output)
3898 self.assertEqual('2001:1234:5:8f62::1 nhid 2 via 2001:1234:5:8f63::2 proto static metric 1024 pref medium', output)
3899
3900 output = check_output('ip route show 10.10.10.13')
3901 print(output)
3902 self.assertEqual('blackhole 10.10.10.13 nhid 6 dev lo proto static', output)
3903
3904 output = check_output('ip -6 route show 2001:1234:5:8f62::2')
3905 print(output)
3906 self.assertEqual('blackhole 2001:1234:5:8f62::2 nhid 7 dev lo proto static metric 1024 pref medium', output)
3907
3908 output = check_output('ip route show 10.10.10.14')
3909 print(output)
3910 self.assertIn('10.10.10.14 nhid 21 proto static', output)
3911 self.assertIn('nexthop via 192.168.20.1 dev dummy98 weight 1', output)
3912 self.assertIn('nexthop via 192.168.5.1 dev veth99 weight 3', output)
3913
3914 output = check_output(*networkctl_cmd, '--json=short', 'status', env=env)
3915 check_json(output)
3916
3917 def _test_nexthop(self, manage_foreign_nexthops):
3918 if not manage_foreign_nexthops:
3919 copy_networkd_conf_dropin('networkd-manage-foreign-nexthops-no.conf')
3920
3921 check_output('ip link add dummy98 type dummy')
3922 check_output('ip link set dummy98 up')
3923 check_output('ip address add 192.168.20.20/24 dev dummy98')
3924 check_output('ip nexthop add id 42 via 192.168.20.2 dev dummy98')
3925
3926 copy_network_unit('25-nexthop.network', '25-veth.netdev', '25-veth-peer.network',
3927 '12-dummy.netdev', '25-nexthop-dummy.network')
3928 start_networkd()
3929
3930 self.check_nexthop(manage_foreign_nexthops)
3931
3932 remove_network_unit('25-nexthop.network')
3933 copy_network_unit('25-nexthop-nothing.network')
3934 networkctl_reload()
3935 self.wait_online(['veth99:routable', 'veth-peer:routable'])
3936
3937 output = check_output('ip nexthop list dev veth99')
3938 print(output)
3939 self.assertEqual(output, '')
3940 output = check_output('ip nexthop list dev lo')
3941 print(output)
3942 self.assertEqual(output, '')
3943
3944 remove_network_unit('25-nexthop-nothing.network')
3945 copy_network_unit('25-nexthop.network')
3946 networkctl_reconfigure('dummy98')
3947 networkctl_reload()
3948
3949 self.check_nexthop(manage_foreign_nexthops)
3950
3951 remove_link('veth99')
3952 time.sleep(2)
3953
3954 output = check_output('ip nexthop list dev lo')
3955 print(output)
3956 self.assertEqual(output, '')
3957
3958 @expectedFailureIfNexthopIsNotAvailable()
3959 def test_nexthop(self):
3960 first = True
3961 for manage_foreign_nexthops in [True, False]:
3962 if first:
3963 first = False
3964 else:
3965 self.tearDown()
3966
3967 print(f'### test_nexthop(manage_foreign_nexthops={manage_foreign_nexthops})')
3968 with self.subTest(manage_foreign_nexthops=manage_foreign_nexthops):
3969 self._test_nexthop(manage_foreign_nexthops)
3970
3971 class NetworkdTCTests(unittest.TestCase, Utilities):
3972
3973 def setUp(self):
3974 setup_common()
3975
3976 def tearDown(self):
3977 tear_down_common()
3978
3979 @expectedFailureIfModuleIsNotAvailable('sch_cake')
3980 def test_qdisc_cake(self):
3981 copy_network_unit('25-qdisc-cake.network', '12-dummy.netdev')
3982 start_networkd()
3983 self.wait_online(['dummy98:routable'])
3984
3985 output = check_output('tc qdisc show dev dummy98')
3986 print(output)
3987 self.assertIn('qdisc cake 3a: root', output)
3988 self.assertIn('bandwidth 500Mbit', output)
3989 self.assertIn('autorate-ingress', output)
3990 self.assertIn('diffserv8', output)
3991 self.assertIn('dual-dsthost', output)
3992 self.assertIn(' nat', output)
3993 self.assertIn(' wash', output)
3994 self.assertIn(' split-gso', output)
3995 self.assertIn(' raw', output)
3996 self.assertIn(' atm', output)
3997 self.assertIn('overhead 128', output)
3998 self.assertIn('mpu 20', output)
3999 self.assertIn('fwmark 0xff00', output)
4000 self.assertIn('rtt 1s', output)
4001 self.assertIn('ack-filter-aggressive', output)
4002
4003 @expectedFailureIfModuleIsNotAvailable('sch_codel')
4004 def test_qdisc_codel(self):
4005 copy_network_unit('25-qdisc-codel.network', '12-dummy.netdev')
4006 start_networkd()
4007 self.wait_online(['dummy98:routable'])
4008
4009 output = check_output('tc qdisc show dev dummy98')
4010 print(output)
4011 self.assertRegex(output, 'qdisc codel 33: root')
4012 self.assertRegex(output, 'limit 2000p target 10(.0)?ms ce_threshold 100(.0)?ms interval 50(.0)?ms ecn')
4013
4014 @expectedFailureIfModuleIsNotAvailable('sch_drr')
4015 def test_qdisc_drr(self):
4016 copy_network_unit('25-qdisc-drr.network', '12-dummy.netdev')
4017 start_networkd()
4018 self.wait_online(['dummy98:routable'])
4019
4020 output = check_output('tc qdisc show dev dummy98')
4021 print(output)
4022 self.assertRegex(output, 'qdisc drr 2: root')
4023 output = check_output('tc class show dev dummy98')
4024 print(output)
4025 self.assertRegex(output, 'class drr 2:30 root quantum 2000b')
4026
4027 @expectedFailureIfModuleIsNotAvailable('sch_ets')
4028 def test_qdisc_ets(self):
4029 copy_network_unit('25-qdisc-ets.network', '12-dummy.netdev')
4030 start_networkd()
4031 self.wait_online(['dummy98:routable'])
4032
4033 output = check_output('tc qdisc show dev dummy98')
4034 print(output)
4035
4036 self.assertRegex(output, 'qdisc ets 3a: root')
4037 self.assertRegex(output, 'bands 10 strict 3')
4038 self.assertRegex(output, 'quanta 1 2 3 4 5')
4039 self.assertRegex(output, 'priomap 3 4 5 6 7')
4040
4041 @expectedFailureIfModuleIsNotAvailable('sch_fq')
4042 def test_qdisc_fq(self):
4043 copy_network_unit('25-qdisc-fq.network', '12-dummy.netdev')
4044 start_networkd()
4045 self.wait_online(['dummy98:routable'])
4046
4047 output = check_output('tc qdisc show dev dummy98')
4048 print(output)
4049 self.assertRegex(output, 'qdisc fq 32: root')
4050 self.assertRegex(output, 'limit 1000p flow_limit 200p buckets 512 orphan_mask 511')
4051 self.assertRegex(output, 'quantum 1500')
4052 self.assertRegex(output, 'initial_quantum 13000')
4053 self.assertRegex(output, 'maxrate 1Mbit')
4054
4055 @expectedFailureIfModuleIsNotAvailable('sch_fq_codel')
4056 def test_qdisc_fq_codel(self):
4057 copy_network_unit('25-qdisc-fq_codel.network', '12-dummy.netdev')
4058 start_networkd()
4059 self.wait_online(['dummy98:routable'])
4060
4061 output = check_output('tc qdisc show dev dummy98')
4062 print(output)
4063 self.assertRegex(output, 'qdisc fq_codel 34: root')
4064 self.assertRegex(output, 'limit 20480p flows 2048 quantum 1400 target 10(.0)?ms ce_threshold 100(.0)?ms interval 200(.0)?ms memory_limit 64Mb ecn')
4065
4066 @expectedFailureIfModuleIsNotAvailable('sch_fq_pie')
4067 def test_qdisc_fq_pie(self):
4068 copy_network_unit('25-qdisc-fq_pie.network', '12-dummy.netdev')
4069 start_networkd()
4070 self.wait_online(['dummy98:routable'])
4071
4072 output = check_output('tc qdisc show dev dummy98')
4073 print(output)
4074
4075 self.assertRegex(output, 'qdisc fq_pie 3a: root')
4076 self.assertRegex(output, 'limit 200000p')
4077
4078 @expectedFailureIfModuleIsNotAvailable('sch_gred')
4079 def test_qdisc_gred(self):
4080 copy_network_unit('25-qdisc-gred.network', '12-dummy.netdev')
4081 start_networkd()
4082 self.wait_online(['dummy98:routable'])
4083
4084 output = check_output('tc qdisc show dev dummy98')
4085 print(output)
4086 self.assertRegex(output, 'qdisc gred 38: root')
4087 self.assertRegex(output, 'vqs 12 default 10 grio')
4088
4089 @expectedFailureIfModuleIsNotAvailable('sch_hhf')
4090 def test_qdisc_hhf(self):
4091 copy_network_unit('25-qdisc-hhf.network', '12-dummy.netdev')
4092 start_networkd()
4093 self.wait_online(['dummy98:routable'])
4094
4095 output = check_output('tc qdisc show dev dummy98')
4096 print(output)
4097 self.assertRegex(output, 'qdisc hhf 3a: root')
4098 self.assertRegex(output, 'limit 1022p')
4099
4100 @expectedFailureIfModuleIsNotAvailable('sch_htb')
4101 def test_qdisc_htb_fifo(self):
4102 copy_network_unit('25-qdisc-htb-fifo.network', '12-dummy.netdev')
4103 start_networkd()
4104 self.wait_online(['dummy98:routable'])
4105
4106 output = check_output('tc qdisc show dev dummy98')
4107 print(output)
4108 self.assertRegex(output, 'qdisc htb 2: root')
4109 self.assertRegex(output, r'default (0x30|30)')
4110
4111 self.assertRegex(output, 'qdisc pfifo 37: parent 2:37')
4112 self.assertRegex(output, 'limit 100000p')
4113
4114 self.assertRegex(output, 'qdisc bfifo 3a: parent 2:3a')
4115 self.assertRegex(output, 'limit 1000000')
4116
4117 self.assertRegex(output, 'qdisc pfifo_head_drop 3b: parent 2:3b')
4118 self.assertRegex(output, 'limit 1023p')
4119
4120 self.assertRegex(output, 'qdisc pfifo_fast 3c: parent 2:3c')
4121
4122 output = check_output('tc -d class show dev dummy98')
4123 print(output)
4124 # Here (:|prio) is a workaround for a bug in iproute2 v6.2.0 caused by
4125 # https://github.com/shemminger/iproute2/commit/010a8388aea11e767ba3a2506728b9ad9760df0e
4126 # which is fixed in v6.3.0 by
4127 # https://github.com/shemminger/iproute2/commit/4e0e56e0ef05387f7f5d8ab41fe6ec6a1897b26d
4128 self.assertRegex(output, 'class htb 2:37 root leaf 37(:|prio) ')
4129 self.assertRegex(output, 'class htb 2:3a root leaf 3a(:|prio) ')
4130 self.assertRegex(output, 'class htb 2:3b root leaf 3b(:|prio) ')
4131 self.assertRegex(output, 'class htb 2:3c root leaf 3c(:|prio) ')
4132 self.assertRegex(output, 'prio 1 quantum 4000 rate 1Mbit overhead 100 ceil 500Kbit')
4133 self.assertRegex(output, 'burst 123456')
4134 self.assertRegex(output, 'cburst 123457')
4135
4136 @expectedFailureIfModuleIsNotAvailable('sch_ingress')
4137 def test_qdisc_ingress(self):
4138 copy_network_unit('25-qdisc-clsact.network', '12-dummy.netdev',
4139 '25-qdisc-ingress.network', '11-dummy.netdev')
4140 start_networkd()
4141 self.wait_online(['dummy98:routable', 'test1:routable'])
4142
4143 output = check_output('tc qdisc show dev dummy98')
4144 print(output)
4145 self.assertRegex(output, 'qdisc clsact')
4146
4147 output = check_output('tc qdisc show dev test1')
4148 print(output)
4149 self.assertRegex(output, 'qdisc ingress')
4150
4151 @expectedFailureIfModuleIsNotAvailable('sch_netem')
4152 def test_qdisc_netem(self):
4153 copy_network_unit('25-qdisc-netem.network', '12-dummy.netdev',
4154 '25-qdisc-netem-compat.network', '11-dummy.netdev')
4155 start_networkd()
4156 self.wait_online(['dummy98:routable', 'test1:routable'])
4157
4158 output = check_output('tc qdisc show dev dummy98')
4159 print(output)
4160 self.assertRegex(output, 'qdisc netem 30: root')
4161 self.assertRegex(output, 'limit 100 delay 50(.0)?ms 10(.0)?ms loss 20%')
4162
4163 output = check_output('tc qdisc show dev test1')
4164 print(output)
4165 self.assertRegex(output, 'qdisc netem [0-9a-f]*: root')
4166 self.assertRegex(output, 'limit 100 delay 50(.0)?ms 10(.0)?ms loss 20%')
4167
4168 @expectedFailureIfModuleIsNotAvailable('sch_pie')
4169 def test_qdisc_pie(self):
4170 copy_network_unit('25-qdisc-pie.network', '12-dummy.netdev')
4171 start_networkd()
4172 self.wait_online(['dummy98:routable'])
4173
4174 output = check_output('tc qdisc show dev dummy98')
4175 print(output)
4176 self.assertRegex(output, 'qdisc pie 3a: root')
4177 self.assertRegex(output, 'limit 200000')
4178
4179 @expectedFailureIfModuleIsNotAvailable('sch_qfq')
4180 def test_qdisc_qfq(self):
4181 copy_network_unit('25-qdisc-qfq.network', '12-dummy.netdev')
4182 start_networkd()
4183 self.wait_online(['dummy98:routable'])
4184
4185 output = check_output('tc qdisc show dev dummy98')
4186 print(output)
4187 self.assertRegex(output, 'qdisc qfq 2: root')
4188 output = check_output('tc class show dev dummy98')
4189 print(output)
4190 self.assertRegex(output, 'class qfq 2:30 root weight 2 maxpkt 16000')
4191 self.assertRegex(output, 'class qfq 2:31 root weight 10 maxpkt 8000')
4192
4193 @expectedFailureIfModuleIsNotAvailable('sch_sfb')
4194 def test_qdisc_sfb(self):
4195 copy_network_unit('25-qdisc-sfb.network', '12-dummy.netdev')
4196 start_networkd()
4197 self.wait_online(['dummy98:routable'])
4198
4199 output = check_output('tc qdisc show dev dummy98')
4200 print(output)
4201 self.assertRegex(output, 'qdisc sfb 39: root')
4202 self.assertRegex(output, 'limit 200000')
4203
4204 @expectedFailureIfModuleIsNotAvailable('sch_sfq')
4205 def test_qdisc_sfq(self):
4206 copy_network_unit('25-qdisc-sfq.network', '12-dummy.netdev')
4207 start_networkd()
4208 self.wait_online(['dummy98:routable'])
4209
4210 output = check_output('tc qdisc show dev dummy98')
4211 print(output)
4212 self.assertRegex(output, 'qdisc sfq 36: root')
4213 self.assertRegex(output, 'perturb 5sec')
4214
4215 @expectedFailureIfModuleIsNotAvailable('sch_tbf')
4216 def test_qdisc_tbf(self):
4217 copy_network_unit('25-qdisc-tbf.network', '12-dummy.netdev')
4218 start_networkd()
4219 self.wait_online(['dummy98:routable'])
4220
4221 output = check_output('tc qdisc show dev dummy98')
4222 print(output)
4223 self.assertRegex(output, 'qdisc tbf 35: root')
4224 self.assertRegex(output, 'rate 1Gbit burst 5000b peakrate 100Gbit minburst 987500b lat 70(.0)?ms')
4225
4226 @expectedFailureIfModuleIsNotAvailable('sch_teql')
4227 def test_qdisc_teql(self):
4228 call_quiet('rmmod sch_teql')
4229
4230 copy_network_unit('25-qdisc-teql.network', '12-dummy.netdev')
4231 start_networkd()
4232 self.wait_links('dummy98')
4233 check_output('modprobe sch_teql max_equalizers=2')
4234 self.wait_online(['dummy98:routable'])
4235
4236 output = check_output('tc qdisc show dev dummy98')
4237 print(output)
4238 self.assertRegex(output, 'qdisc teql1 31: root')
4239
4240 class NetworkdStateFileTests(unittest.TestCase, Utilities):
4241
4242 def setUp(self):
4243 setup_common()
4244
4245 def tearDown(self):
4246 tear_down_common()
4247
4248 def test_state_file(self):
4249 copy_network_unit('12-dummy.netdev', '25-state-file-tests.network')
4250 start_networkd()
4251 self.wait_online(['dummy98:routable'])
4252
4253 # make link state file updated
4254 check_output(*resolvectl_cmd, 'revert', 'dummy98', env=env)
4255
4256 output = check_output(*networkctl_cmd, '--json=short', 'status', env=env)
4257 check_json(output)
4258
4259 output = read_link_state_file('dummy98')
4260 print(output)
4261 self.assertIn('IPV4_ADDRESS_STATE=routable', output)
4262 self.assertIn('IPV6_ADDRESS_STATE=routable', output)
4263 self.assertIn('ADMIN_STATE=configured', output)
4264 self.assertIn('OPER_STATE=routable', output)
4265 self.assertIn('REQUIRED_FOR_ONLINE=yes', output)
4266 self.assertIn('REQUIRED_OPER_STATE_FOR_ONLINE=routable', output)
4267 self.assertIn('REQUIRED_FAMILY_FOR_ONLINE=both', output)
4268 self.assertIn('ACTIVATION_POLICY=up', output)
4269 self.assertIn('NETWORK_FILE=/run/systemd/network/25-state-file-tests.network', output)
4270 self.assertIn('DNS=10.10.10.10#aaa.com 10.10.10.11:1111#bbb.com [1111:2222::3333]:1234#ccc.com', output)
4271 self.assertIn('NTP=0.fedora.pool.ntp.org 1.fedora.pool.ntp.org', output)
4272 self.assertIn('DOMAINS=hogehoge', output)
4273 self.assertIn('ROUTE_DOMAINS=foofoo', output)
4274 self.assertIn('LLMNR=no', output)
4275 self.assertIn('MDNS=yes', output)
4276 self.assertIn('DNSSEC=no', output)
4277
4278 check_output(*resolvectl_cmd, 'dns', 'dummy98', '10.10.10.12#ccc.com', '10.10.10.13', '1111:2222::3333', env=env)
4279 check_output(*resolvectl_cmd, 'domain', 'dummy98', 'hogehogehoge', '~foofoofoo', env=env)
4280 check_output(*resolvectl_cmd, 'llmnr', 'dummy98', 'yes', env=env)
4281 check_output(*resolvectl_cmd, 'mdns', 'dummy98', 'no', env=env)
4282 check_output(*resolvectl_cmd, 'dnssec', 'dummy98', 'yes', env=env)
4283 check_output(*timedatectl_cmd, 'ntp-servers', 'dummy98', '2.fedora.pool.ntp.org', '3.fedora.pool.ntp.org', env=env)
4284
4285 output = check_output(*networkctl_cmd, '--json=short', 'status', env=env)
4286 check_json(output)
4287
4288 output = read_link_state_file('dummy98')
4289 print(output)
4290 self.assertIn('DNS=10.10.10.12#ccc.com 10.10.10.13 1111:2222::3333', output)
4291 self.assertIn('NTP=2.fedora.pool.ntp.org 3.fedora.pool.ntp.org', output)
4292 self.assertIn('DOMAINS=hogehogehoge', output)
4293 self.assertIn('ROUTE_DOMAINS=foofoofoo', output)
4294 self.assertIn('LLMNR=yes', output)
4295 self.assertIn('MDNS=no', output)
4296 self.assertIn('DNSSEC=yes', output)
4297
4298 check_output(*timedatectl_cmd, 'revert', 'dummy98', env=env)
4299
4300 output = check_output(*networkctl_cmd, '--json=short', 'status', env=env)
4301 check_json(output)
4302
4303 output = read_link_state_file('dummy98')
4304 print(output)
4305 self.assertIn('DNS=10.10.10.12#ccc.com 10.10.10.13 1111:2222::3333', output)
4306 self.assertIn('NTP=0.fedora.pool.ntp.org 1.fedora.pool.ntp.org', output)
4307 self.assertIn('DOMAINS=hogehogehoge', output)
4308 self.assertIn('ROUTE_DOMAINS=foofoofoo', output)
4309 self.assertIn('LLMNR=yes', output)
4310 self.assertIn('MDNS=no', output)
4311 self.assertIn('DNSSEC=yes', output)
4312
4313 check_output(*resolvectl_cmd, 'revert', 'dummy98', env=env)
4314
4315 output = check_output(*networkctl_cmd, '--json=short', 'status', env=env)
4316 check_json(output)
4317
4318 output = read_link_state_file('dummy98')
4319 print(output)
4320 self.assertIn('DNS=10.10.10.10#aaa.com 10.10.10.11:1111#bbb.com [1111:2222::3333]:1234#ccc.com', output)
4321 self.assertIn('NTP=0.fedora.pool.ntp.org 1.fedora.pool.ntp.org', output)
4322 self.assertIn('DOMAINS=hogehoge', output)
4323 self.assertIn('ROUTE_DOMAINS=foofoo', output)
4324 self.assertIn('LLMNR=no', output)
4325 self.assertIn('MDNS=yes', output)
4326 self.assertIn('DNSSEC=no', output)
4327
4328 def test_address_state(self):
4329 copy_network_unit('12-dummy.netdev', '12-dummy-no-address.network')
4330 start_networkd()
4331
4332 self.wait_online(['dummy98:degraded'])
4333
4334 output = read_link_state_file('dummy98')
4335 self.assertIn('IPV4_ADDRESS_STATE=off', output)
4336 self.assertIn('IPV6_ADDRESS_STATE=degraded', output)
4337
4338 # with a routable IPv4 address
4339 check_output('ip address add 10.1.2.3/16 dev dummy98')
4340 self.wait_online(['dummy98:routable'], ipv4=True)
4341 self.wait_online(['dummy98:routable'])
4342
4343 output = read_link_state_file('dummy98')
4344 self.assertIn('IPV4_ADDRESS_STATE=routable', output)
4345 self.assertIn('IPV6_ADDRESS_STATE=degraded', output)
4346
4347 check_output('ip address del 10.1.2.3/16 dev dummy98')
4348
4349 # with a routable IPv6 address
4350 check_output('ip address add 2002:da8:1:0:1034:56ff:fe78:9abc/64 dev dummy98')
4351 self.wait_online(['dummy98:routable'], ipv6=True)
4352 self.wait_online(['dummy98:routable'])
4353
4354 output = read_link_state_file('dummy98')
4355 self.assertIn('IPV4_ADDRESS_STATE=off', output)
4356 self.assertIn('IPV6_ADDRESS_STATE=routable', output)
4357
4358 class NetworkdBondTests(unittest.TestCase, Utilities):
4359
4360 def setUp(self):
4361 setup_common()
4362
4363 def tearDown(self):
4364 tear_down_common()
4365
4366 def test_bond_keep_master(self):
4367 check_output('ip link add bond199 type bond mode active-backup')
4368 check_output('ip link add dummy98 type dummy')
4369 check_output('ip link set dummy98 master bond199')
4370
4371 copy_network_unit('23-keep-master.network')
4372 start_networkd()
4373 self.wait_online(['dummy98:enslaved'])
4374
4375 output = check_output('ip -d link show bond199')
4376 print(output)
4377 self.assertRegex(output, 'active_slave dummy98')
4378
4379 output = check_output('ip -d link show dummy98')
4380 print(output)
4381 self.assertRegex(output, 'master bond199')
4382
4383 def test_bond_active_slave(self):
4384 copy_network_unit('23-active-slave.network', '23-bond199.network', '25-bond-active-backup-slave.netdev', '12-dummy.netdev')
4385 start_networkd()
4386 self.wait_online(['dummy98:enslaved', 'bond199:degraded'])
4387
4388 output = check_output('ip -d link show bond199')
4389 print(output)
4390 self.assertIn('active_slave dummy98', output)
4391
4392 def test_bond_primary_slave(self):
4393 copy_network_unit('23-primary-slave.network', '23-bond199.network', '25-bond-active-backup-slave.netdev', '12-dummy.netdev')
4394 start_networkd()
4395 self.wait_online(['dummy98:enslaved', 'bond199:degraded'])
4396
4397 output = check_output('ip -d link show bond199')
4398 print(output)
4399 self.assertIn('primary dummy98', output)
4400
4401 # for issue #25627
4402 mkdir_p(os.path.join(network_unit_dir, '23-bond199.network.d'))
4403 for mac in ['00:11:22:33:44:55', '00:11:22:33:44:56']:
4404 with open(os.path.join(network_unit_dir, '23-bond199.network.d/mac.conf'), mode='w', encoding='utf-8') as f:
4405 f.write(f'[Link]\nMACAddress={mac}\n')
4406
4407 networkctl_reload()
4408 self.wait_online(['dummy98:enslaved', 'bond199:degraded'])
4409
4410 output = check_output('ip -d link show bond199')
4411 print(output)
4412 self.assertIn(f'link/ether {mac}', output)
4413
4414 def test_bond_operstate(self):
4415 copy_network_unit('25-bond.netdev', '11-dummy.netdev', '12-dummy.netdev',
4416 '25-bond99.network', '25-bond-slave.network')
4417 start_networkd()
4418 self.wait_online(['dummy98:enslaved', 'test1:enslaved', 'bond99:routable'])
4419
4420 output = check_output('ip -d link show dummy98')
4421 print(output)
4422 self.assertRegex(output, 'SLAVE,UP,LOWER_UP')
4423
4424 output = check_output('ip -d link show test1')
4425 print(output)
4426 self.assertRegex(output, 'SLAVE,UP,LOWER_UP')
4427
4428 output = check_output('ip -d link show bond99')
4429 print(output)
4430 self.assertRegex(output, 'MASTER,UP,LOWER_UP')
4431
4432 self.wait_operstate('dummy98', 'enslaved')
4433 self.wait_operstate('test1', 'enslaved')
4434 self.wait_operstate('bond99', 'routable')
4435
4436 check_output('ip link set dummy98 down')
4437
4438 self.wait_operstate('dummy98', 'off')
4439 self.wait_operstate('test1', 'enslaved')
4440 self.wait_operstate('bond99', 'routable')
4441
4442 check_output('ip link set dummy98 up')
4443
4444 self.wait_operstate('dummy98', 'enslaved')
4445 self.wait_operstate('test1', 'enslaved')
4446 self.wait_operstate('bond99', 'routable')
4447
4448 check_output('ip link set dummy98 down')
4449 check_output('ip link set test1 down')
4450
4451 self.wait_operstate('dummy98', 'off')
4452 self.wait_operstate('test1', 'off')
4453
4454 if not self.wait_operstate('bond99', 'no-carrier', setup_timeout=30, fail_assert=False):
4455 # Huh? Kernel does not recognize that all slave interfaces are down?
4456 # Let's confirm that networkd's operstate is consistent with ip's result.
4457 self.assertNotRegex(output, 'NO-CARRIER')
4458
4459 class NetworkdBridgeTests(unittest.TestCase, Utilities):
4460
4461 def setUp(self):
4462 setup_common()
4463
4464 def tearDown(self):
4465 tear_down_common()
4466
4467 def test_bridge_vlan(self):
4468 copy_network_unit('11-dummy.netdev', '26-bridge-vlan-slave.network',
4469 '26-bridge.netdev', '26-bridge-vlan-master.network',
4470 copy_dropins=False)
4471 start_networkd()
4472 self.wait_online(['test1:enslaved', 'bridge99:degraded'])
4473
4474 output = check_output('bridge vlan show dev test1')
4475 print(output)
4476 # check if the default VID is removed
4477 self.assertNotIn('1 Egress Untagged', output)
4478 for i in range(1000, 3000):
4479 if i == 1010:
4480 self.assertIn(f'{i} PVID', output)
4481 elif i in range(1012, 1016) or i in range(1103, 1109):
4482 self.assertIn(f'{i} Egress Untagged', output)
4483 elif i in range(1008, 1014) or i in range(1100, 1111):
4484 self.assertIn(f'{i}', output)
4485 else:
4486 self.assertNotIn(f'{i}', output)
4487
4488 output = check_output('bridge vlan show dev bridge99')
4489 print(output)
4490 # check if the default VID is removed
4491 self.assertNotIn('1 Egress Untagged', output)
4492 for i in range(1000, 3000):
4493 if i == 1020:
4494 self.assertIn(f'{i} PVID', output)
4495 elif i in range(1022, 1026) or i in range(1203, 1209):
4496 self.assertIn(f'{i} Egress Untagged', output)
4497 elif i in range(1018, 1024) or i in range(1200, 1211):
4498 self.assertIn(f'{i}', output)
4499 else:
4500 self.assertNotIn(f'{i}', output)
4501
4502 # Change vlan IDs
4503 copy_network_unit('26-bridge-vlan-slave.network.d/10-override.conf',
4504 '26-bridge-vlan-master.network.d/10-override.conf')
4505 networkctl_reload()
4506 self.wait_online(['test1:enslaved', 'bridge99:degraded'])
4507
4508 output = check_output('bridge vlan show dev test1')
4509 print(output)
4510 for i in range(1000, 3000):
4511 if i == 2010:
4512 self.assertIn(f'{i} PVID', output)
4513 elif i in range(2012, 2016) or i in range(2103, 2109):
4514 self.assertIn(f'{i} Egress Untagged', output)
4515 elif i in range(2008, 2014) or i in range(2100, 2111):
4516 self.assertIn(f'{i}', output)
4517 else:
4518 self.assertNotIn(f'{i}', output)
4519
4520 output = check_output('bridge vlan show dev bridge99')
4521 print(output)
4522 for i in range(1000, 3000):
4523 if i == 2020:
4524 self.assertIn(f'{i} PVID', output)
4525 elif i in range(2022, 2026) or i in range(2203, 2209):
4526 self.assertIn(f'{i} Egress Untagged', output)
4527 elif i in range(2018, 2024) or i in range(2200, 2211):
4528 self.assertIn(f'{i}', output)
4529 else:
4530 self.assertNotIn(f'{i}', output)
4531
4532 # Remove several vlan IDs
4533 copy_network_unit('26-bridge-vlan-slave.network.d/20-override.conf',
4534 '26-bridge-vlan-master.network.d/20-override.conf')
4535 networkctl_reload()
4536 self.wait_online(['test1:enslaved', 'bridge99:degraded'])
4537
4538 output = check_output('bridge vlan show dev test1')
4539 print(output)
4540 for i in range(1000, 3000):
4541 if i == 2010:
4542 self.assertIn(f'{i} PVID', output)
4543 elif i in range(2012, 2016):
4544 self.assertIn(f'{i} Egress Untagged', output)
4545 elif i in range(2008, 2014):
4546 self.assertIn(f'{i}', output)
4547 else:
4548 self.assertNotIn(f'{i}', output)
4549
4550 output = check_output('bridge vlan show dev bridge99')
4551 print(output)
4552 for i in range(1000, 3000):
4553 if i == 2020:
4554 self.assertIn(f'{i} PVID', output)
4555 elif i in range(2022, 2026):
4556 self.assertIn(f'{i} Egress Untagged', output)
4557 elif i in range(2018, 2024):
4558 self.assertIn(f'{i}', output)
4559 else:
4560 self.assertNotIn(f'{i}', output)
4561
4562 # Remove all vlan IDs
4563 copy_network_unit('26-bridge-vlan-slave.network.d/30-override.conf',
4564 '26-bridge-vlan-master.network.d/30-override.conf')
4565 networkctl_reload()
4566 self.wait_online(['test1:enslaved', 'bridge99:degraded'])
4567
4568 output = check_output('bridge vlan show dev test1')
4569 print(output)
4570 self.assertNotIn('PVID', output)
4571 for i in range(1000, 3000):
4572 self.assertNotIn(f'{i}', output)
4573
4574 output = check_output('bridge vlan show dev bridge99')
4575 print(output)
4576 self.assertNotIn('PVID', output)
4577 for i in range(1000, 3000):
4578 self.assertNotIn(f'{i}', output)
4579
4580 def test_bridge_vlan_issue_20373(self):
4581 copy_network_unit('11-dummy.netdev', '26-bridge-vlan-slave-issue-20373.network',
4582 '26-bridge-issue-20373.netdev', '26-bridge-vlan-master-issue-20373.network',
4583 '21-vlan.netdev', '21-vlan.network')
4584 start_networkd()
4585 self.wait_online(['test1:enslaved', 'bridge99:degraded', 'vlan99:routable'])
4586
4587 output = check_output('bridge vlan show dev test1')
4588 print(output)
4589 self.assertIn('100 PVID Egress Untagged', output)
4590 self.assertIn('560', output)
4591 self.assertIn('600', output)
4592
4593 output = check_output('bridge vlan show dev bridge99')
4594 print(output)
4595 self.assertIn('1 PVID Egress Untagged', output)
4596 self.assertIn('100', output)
4597 self.assertIn('600', output)
4598
4599 def test_bridge_mdb(self):
4600 copy_network_unit('11-dummy.netdev', '26-bridge-mdb-slave.network',
4601 '26-bridge.netdev', '26-bridge-mdb-master.network')
4602 start_networkd()
4603 self.wait_online(['test1:enslaved', 'bridge99:degraded'])
4604
4605 output = check_output('bridge mdb show dev bridge99')
4606 print(output)
4607 self.assertRegex(output, 'dev bridge99 port test1 grp ff02:aaaa:fee5::1:3 permanent *vid 4064')
4608 self.assertRegex(output, 'dev bridge99 port test1 grp 224.0.1.1 permanent *vid 4065')
4609
4610 # Old kernel may not support bridge MDB entries on bridge master
4611 if call_quiet('bridge mdb add dev bridge99 port bridge99 grp 224.0.1.3 temp vid 4068') == 0:
4612 self.assertRegex(output, 'dev bridge99 port bridge99 grp ff02:aaaa:fee5::1:4 temp *vid 4066')
4613 self.assertRegex(output, 'dev bridge99 port bridge99 grp 224.0.1.2 temp *vid 4067')
4614
4615 def test_bridge_keep_master(self):
4616 check_output('ip link add bridge99 type bridge')
4617 check_output('ip link set bridge99 up')
4618 check_output('ip link add dummy98 type dummy')
4619 check_output('ip link set dummy98 master bridge99')
4620
4621 copy_network_unit('23-keep-master.network')
4622 start_networkd()
4623 self.wait_online(['dummy98:enslaved'])
4624
4625 output = check_output('ip -d link show dummy98')
4626 print(output)
4627 self.assertRegex(output, 'master bridge99')
4628 self.assertRegex(output, 'bridge')
4629
4630 output = check_output('bridge -d link show dummy98')
4631 print(output)
4632 self.check_bridge_port_attr('bridge99', 'dummy98', 'path_cost', '400')
4633 self.check_bridge_port_attr('bridge99', 'dummy98', 'hairpin_mode', '1')
4634 self.check_bridge_port_attr('bridge99', 'dummy98', 'multicast_fast_leave', '1')
4635 self.check_bridge_port_attr('bridge99', 'dummy98', 'unicast_flood', '1')
4636 self.check_bridge_port_attr('bridge99', 'dummy98', 'multicast_flood', '0')
4637 # CONFIG_BRIDGE_IGMP_SNOOPING=y
4638 self.check_bridge_port_attr('bridge99', 'dummy98', 'multicast_to_unicast', '1', allow_enoent=True)
4639 self.check_bridge_port_attr('bridge99', 'dummy98', 'neigh_suppress', '1', allow_enoent=True)
4640 self.check_bridge_port_attr('bridge99', 'dummy98', 'learning', '0')
4641 self.check_bridge_port_attr('bridge99', 'dummy98', 'priority', '23')
4642 self.check_bridge_port_attr('bridge99', 'dummy98', 'bpdu_guard', '0')
4643 self.check_bridge_port_attr('bridge99', 'dummy98', 'root_block', '0')
4644
4645 def test_bridge_property(self):
4646 copy_network_unit('11-dummy.netdev', '12-dummy.netdev', '26-bridge.netdev',
4647 '26-bridge-slave-interface-1.network', '26-bridge-slave-interface-2.network',
4648 '25-bridge99.network')
4649 start_networkd()
4650 self.wait_online(['dummy98:enslaved', 'test1:enslaved', 'bridge99:routable'])
4651
4652 output = check_output('ip -d link show bridge99')
4653 print(output)
4654 self.assertIn('mtu 9000 ', output)
4655
4656 output = check_output('ip -d link show test1')
4657 print(output)
4658 self.assertIn('master bridge99 ', output)
4659 self.assertIn('bridge_slave', output)
4660 self.assertIn('mtu 9000 ', output)
4661
4662 output = check_output('ip -d link show dummy98')
4663 print(output)
4664 self.assertIn('master bridge99 ', output)
4665 self.assertIn('bridge_slave', output)
4666 self.assertIn('mtu 9000 ', output)
4667
4668 output = check_output('ip addr show bridge99')
4669 print(output)
4670 self.assertIn('192.168.0.15/24', output)
4671
4672 output = check_output('bridge -d link show dummy98')
4673 print(output)
4674 self.check_bridge_port_attr('bridge99', 'dummy98', 'path_cost', '400')
4675 self.check_bridge_port_attr('bridge99', 'dummy98', 'hairpin_mode', '1')
4676 self.check_bridge_port_attr('bridge99', 'dummy98', 'isolated', '1')
4677 self.check_bridge_port_attr('bridge99', 'dummy98', 'multicast_fast_leave', '1')
4678 self.check_bridge_port_attr('bridge99', 'dummy98', 'unicast_flood', '1')
4679 self.check_bridge_port_attr('bridge99', 'dummy98', 'multicast_flood', '0')
4680 # CONFIG_BRIDGE_IGMP_SNOOPING=y
4681 self.check_bridge_port_attr('bridge99', 'dummy98', 'multicast_to_unicast', '1', allow_enoent=True)
4682 self.check_bridge_port_attr('bridge99', 'dummy98', 'neigh_suppress', '1', allow_enoent=True)
4683 self.check_bridge_port_attr('bridge99', 'dummy98', 'learning', '0')
4684 self.check_bridge_port_attr('bridge99', 'dummy98', 'priority', '23')
4685 self.check_bridge_port_attr('bridge99', 'dummy98', 'bpdu_guard', '0')
4686 self.check_bridge_port_attr('bridge99', 'dummy98', 'root_block', '0')
4687
4688 output = check_output('bridge -d link show test1')
4689 print(output)
4690 self.check_bridge_port_attr('bridge99', 'test1', 'priority', '0')
4691
4692 check_output('ip address add 192.168.0.16/24 dev bridge99')
4693 output = check_output('ip addr show bridge99')
4694 print(output)
4695 self.assertIn('192.168.0.16/24', output)
4696
4697 # for issue #6088
4698 print('### ip -6 route list table all dev bridge99')
4699 output = check_output('ip -6 route list table all dev bridge99')
4700 print(output)
4701 self.assertRegex(output, 'ff00::/8 table local (proto kernel )?metric 256 (linkdown )?pref medium')
4702
4703 remove_link('test1')
4704 self.wait_operstate('bridge99', 'routable')
4705
4706 output = check_output('ip -d link show bridge99')
4707 print(output)
4708 self.assertIn('mtu 9000 ', output)
4709
4710 output = check_output('ip -d link show dummy98')
4711 print(output)
4712 self.assertIn('master bridge99 ', output)
4713 self.assertIn('bridge_slave', output)
4714 self.assertIn('mtu 9000 ', output)
4715
4716 remove_link('dummy98')
4717 self.wait_operstate('bridge99', 'no-carrier')
4718
4719 output = check_output('ip -d link show bridge99')
4720 print(output)
4721 # When no carrier, the kernel may reset the MTU
4722 self.assertIn('NO-CARRIER', output)
4723
4724 output = check_output('ip address show bridge99')
4725 print(output)
4726 self.assertNotIn('192.168.0.15/24', output)
4727 self.assertIn('192.168.0.16/24', output) # foreign address is kept
4728
4729 print('### ip -6 route list table all dev bridge99')
4730 output = check_output('ip -6 route list table all dev bridge99')
4731 print(output)
4732 self.assertRegex(output, 'ff00::/8 table local (proto kernel )?metric 256 (linkdown )?pref medium')
4733
4734 check_output('ip link add dummy98 type dummy')
4735 self.wait_online(['dummy98:enslaved', 'bridge99:routable'])
4736
4737 output = check_output('ip -d link show bridge99')
4738 print(output)
4739 self.assertIn('mtu 9000 ', output)
4740
4741 output = check_output('ip -d link show dummy98')
4742 print(output)
4743 self.assertIn('master bridge99 ', output)
4744 self.assertIn('bridge_slave', output)
4745 self.assertIn('mtu 9000 ', output)
4746
4747 def test_bridge_configure_without_carrier(self):
4748 copy_network_unit('26-bridge.netdev', '26-bridge-configure-without-carrier.network',
4749 '11-dummy.netdev')
4750 start_networkd()
4751
4752 # With ConfigureWithoutCarrier=yes, the bridge should remain configured for all these situations
4753 for test in ['no-slave', 'add-slave', 'slave-up', 'slave-no-carrier', 'slave-carrier', 'slave-down']:
4754 with self.subTest(test=test):
4755 if test == 'no-slave':
4756 # bridge has no slaves; it's up but *might* not have carrier
4757 self.wait_operstate('bridge99', operstate=r'(no-carrier|routable)', setup_state=None, setup_timeout=30)
4758 # due to a bug in the kernel, newly-created bridges are brought up
4759 # *with* carrier, unless they have had any setting changed; e.g.
4760 # their mac set, priority set, etc. Then, they will lose carrier
4761 # as soon as a (down) slave interface is added, and regain carrier
4762 # again once the slave interface is brought up.
4763 #self.check_link_attr('bridge99', 'carrier', '0')
4764 elif test == 'add-slave':
4765 # add slave to bridge, but leave it down; bridge is definitely no-carrier
4766 self.check_link_attr('test1', 'operstate', 'down')
4767 check_output('ip link set dev test1 master bridge99')
4768 self.wait_operstate('bridge99', operstate='no-carrier', setup_state=None)
4769 self.check_link_attr('bridge99', 'carrier', '0')
4770 elif test == 'slave-up':
4771 # bring up slave, which will have carrier; bridge gains carrier
4772 check_output('ip link set dev test1 up')
4773 self.wait_online(['bridge99:routable'])
4774 self.check_link_attr('bridge99', 'carrier', '1')
4775 elif test == 'slave-no-carrier':
4776 # drop slave carrier; bridge loses carrier
4777 check_output('ip link set dev test1 carrier off')
4778 self.wait_online(['bridge99:no-carrier:no-carrier'])
4779 self.check_link_attr('bridge99', 'carrier', '0')
4780 elif test == 'slave-carrier':
4781 # restore slave carrier; bridge gains carrier
4782 check_output('ip link set dev test1 carrier on')
4783 self.wait_online(['bridge99:routable'])
4784 self.check_link_attr('bridge99', 'carrier', '1')
4785 elif test == 'slave-down':
4786 # bring down slave; bridge loses carrier
4787 check_output('ip link set dev test1 down')
4788 self.wait_online(['bridge99:no-carrier:no-carrier'])
4789 self.check_link_attr('bridge99', 'carrier', '0')
4790
4791 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'bridge99', env=env)
4792 self.assertRegex(output, '10.1.2.3')
4793 self.assertRegex(output, '10.1.2.1')
4794
4795 def test_bridge_ignore_carrier_loss(self):
4796 copy_network_unit('11-dummy.netdev', '12-dummy.netdev', '26-bridge.netdev',
4797 '26-bridge-slave-interface-1.network', '26-bridge-slave-interface-2.network',
4798 '25-bridge99-ignore-carrier-loss.network')
4799 start_networkd()
4800 self.wait_online(['dummy98:enslaved', 'test1:enslaved', 'bridge99:routable'])
4801
4802 check_output('ip address add 192.168.0.16/24 dev bridge99')
4803 remove_link('test1', 'dummy98')
4804 time.sleep(3)
4805
4806 output = check_output('ip address show bridge99')
4807 print(output)
4808 self.assertRegex(output, 'NO-CARRIER')
4809 self.assertRegex(output, 'inet 192.168.0.15/24 brd 192.168.0.255 scope global bridge99')
4810 self.assertRegex(output, 'inet 192.168.0.16/24 scope global secondary bridge99')
4811
4812 def test_bridge_ignore_carrier_loss_frequent_loss_and_gain(self):
4813 copy_network_unit('26-bridge.netdev', '26-bridge-slave-interface-1.network',
4814 '25-bridge99-ignore-carrier-loss.network')
4815 start_networkd()
4816 self.wait_online(['bridge99:no-carrier'])
4817
4818 for trial in range(4):
4819 check_output('ip link add dummy98 type dummy')
4820 check_output('ip link set dummy98 up')
4821 if trial < 3:
4822 remove_link('dummy98')
4823
4824 self.wait_online(['bridge99:routable', 'dummy98:enslaved'])
4825
4826 output = check_output('ip address show bridge99')
4827 print(output)
4828 self.assertRegex(output, 'inet 192.168.0.15/24 brd 192.168.0.255 scope global bridge99')
4829
4830 output = check_output('ip rule list table 100')
4831 print(output)
4832 self.assertIn('from all to 8.8.8.8 lookup 100', output)
4833
4834 class NetworkdSRIOVTests(unittest.TestCase, Utilities):
4835
4836 def setUp(self):
4837 setup_common()
4838
4839 def tearDown(self):
4840 tear_down_common()
4841
4842 @expectedFailureIfNetdevsimWithSRIOVIsNotAvailable()
4843 def test_sriov(self):
4844 copy_network_unit('25-default.link', '25-sriov.network')
4845
4846 call('modprobe netdevsim')
4847
4848 with open('/sys/bus/netdevsim/new_device', mode='w', encoding='utf-8') as f:
4849 f.write('99 1')
4850
4851 with open('/sys/bus/netdevsim/devices/netdevsim99/sriov_numvfs', mode='w', encoding='utf-8') as f:
4852 f.write('3')
4853
4854 start_networkd()
4855 self.wait_online(['eni99np1:routable'])
4856
4857 output = check_output('ip link show dev eni99np1')
4858 print(output)
4859 self.assertRegex(output,
4860 'vf 0 .*00:11:22:33:44:55.*vlan 5, qos 1, vlan protocol 802.1ad, spoof checking on, link-state enable, trust on, query_rss on\n *'
4861 'vf 1 .*00:11:22:33:44:56.*vlan 6, qos 2, spoof checking off, link-state disable, trust off, query_rss off\n *'
4862 'vf 2 .*00:11:22:33:44:57.*vlan 7, qos 3, spoof checking off, link-state auto, trust off, query_rss off'
4863 )
4864
4865 @expectedFailureIfNetdevsimWithSRIOVIsNotAvailable()
4866 def test_sriov_udev(self):
4867 copy_network_unit('25-sriov.link', '25-sriov-udev.network')
4868
4869 call('modprobe netdevsim')
4870
4871 with open('/sys/bus/netdevsim/new_device', mode='w', encoding='utf-8') as f:
4872 f.write('99 1')
4873
4874 start_networkd()
4875 self.wait_online(['eni99np1:routable'])
4876
4877 # the name eni99np1 may be an alternative name.
4878 ifname = link_resolve('eni99np1')
4879
4880 output = check_output('ip link show dev eni99np1')
4881 print(output)
4882 self.assertRegex(output,
4883 'vf 0 .*00:11:22:33:44:55.*vlan 5, qos 1, vlan protocol 802.1ad, spoof checking on, link-state enable, trust on, query_rss on\n *'
4884 'vf 1 .*00:11:22:33:44:56.*vlan 6, qos 2, spoof checking off, link-state disable, trust off, query_rss off\n *'
4885 'vf 2 .*00:11:22:33:44:57.*vlan 7, qos 3, spoof checking off, link-state auto, trust off, query_rss off'
4886 )
4887 self.assertNotIn('vf 3', output)
4888 self.assertNotIn('vf 4', output)
4889
4890 with open(os.path.join(network_unit_dir, '25-sriov.link'), mode='a', encoding='utf-8') as f:
4891 f.write('[Link]\nSR-IOVVirtualFunctions=4\n')
4892
4893 udev_reload()
4894 check_output(*udevadm_cmd, 'trigger', '--action=add', '--settle', f'/sys/devices/netdevsim99/net/{ifname}')
4895
4896 output = check_output('ip link show dev eni99np1')
4897 print(output)
4898 self.assertRegex(output,
4899 'vf 0 .*00:11:22:33:44:55.*vlan 5, qos 1, vlan protocol 802.1ad, spoof checking on, link-state enable, trust on, query_rss on\n *'
4900 'vf 1 .*00:11:22:33:44:56.*vlan 6, qos 2, spoof checking off, link-state disable, trust off, query_rss off\n *'
4901 'vf 2 .*00:11:22:33:44:57.*vlan 7, qos 3, spoof checking off, link-state auto, trust off, query_rss off\n *'
4902 'vf 3'
4903 )
4904 self.assertNotIn('vf 4', output)
4905
4906 with open(os.path.join(network_unit_dir, '25-sriov.link'), mode='a', encoding='utf-8') as f:
4907 f.write('[Link]\nSR-IOVVirtualFunctions=\n')
4908
4909 udev_reload()
4910 check_output(*udevadm_cmd, 'trigger', '--action=add', '--settle', f'/sys/devices/netdevsim99/net/{ifname}')
4911
4912 output = check_output('ip link show dev eni99np1')
4913 print(output)
4914 self.assertRegex(output,
4915 'vf 0 .*00:11:22:33:44:55.*vlan 5, qos 1, vlan protocol 802.1ad, spoof checking on, link-state enable, trust on, query_rss on\n *'
4916 'vf 1 .*00:11:22:33:44:56.*vlan 6, qos 2, spoof checking off, link-state disable, trust off, query_rss off\n *'
4917 'vf 2 .*00:11:22:33:44:57.*vlan 7, qos 3, spoof checking off, link-state auto, trust off, query_rss off\n *'
4918 'vf 3'
4919 )
4920 self.assertNotIn('vf 4', output)
4921
4922 with open(os.path.join(network_unit_dir, '25-sriov.link'), mode='a', encoding='utf-8') as f:
4923 f.write('[Link]\nSR-IOVVirtualFunctions=2\n')
4924
4925 udev_reload()
4926 check_output(*udevadm_cmd, 'trigger', '--action=add', '--settle', f'/sys/devices/netdevsim99/net/{ifname}')
4927
4928 output = check_output('ip link show dev eni99np1')
4929 print(output)
4930 self.assertRegex(output,
4931 'vf 0 .*00:11:22:33:44:55.*vlan 5, qos 1, vlan protocol 802.1ad, spoof checking on, link-state enable, trust on, query_rss on\n *'
4932 'vf 1 .*00:11:22:33:44:56.*vlan 6, qos 2, spoof checking off, link-state disable, trust off, query_rss off'
4933 )
4934 self.assertNotIn('vf 2', output)
4935 self.assertNotIn('vf 3', output)
4936 self.assertNotIn('vf 4', output)
4937
4938 with open(os.path.join(network_unit_dir, '25-sriov.link'), mode='a', encoding='utf-8') as f:
4939 f.write('[Link]\nSR-IOVVirtualFunctions=\n')
4940
4941 udev_reload()
4942 check_output(*udevadm_cmd, 'trigger', '--action=add', '--settle', f'/sys/devices/netdevsim99/net/{ifname}')
4943
4944 output = check_output('ip link show dev eni99np1')
4945 print(output)
4946 self.assertRegex(output,
4947 'vf 0 .*00:11:22:33:44:55.*vlan 5, qos 1, vlan protocol 802.1ad, spoof checking on, link-state enable, trust on, query_rss on\n *'
4948 'vf 1 .*00:11:22:33:44:56.*vlan 6, qos 2, spoof checking off, link-state disable, trust off, query_rss off\n *'
4949 'vf 2 .*00:11:22:33:44:57.*vlan 7, qos 3, spoof checking off, link-state auto, trust off, query_rss off'
4950 )
4951 self.assertNotIn('vf 3', output)
4952 self.assertNotIn('vf 4', output)
4953
4954 class NetworkdLLDPTests(unittest.TestCase, Utilities):
4955
4956 def setUp(self):
4957 setup_common()
4958
4959 def tearDown(self):
4960 tear_down_common()
4961
4962 def test_lldp(self):
4963 copy_network_unit('23-emit-lldp.network', '24-lldp.network', '25-veth.netdev')
4964 start_networkd()
4965 self.wait_online(['veth99:degraded', 'veth-peer:degraded'])
4966
4967 for trial in range(10):
4968 if trial > 0:
4969 time.sleep(1)
4970
4971 output = check_output(*networkctl_cmd, 'lldp', env=env)
4972 print(output)
4973 if re.search(r'veth99 .* veth-peer', output):
4974 break
4975 else:
4976 self.fail()
4977
4978 class NetworkdRATests(unittest.TestCase, Utilities):
4979
4980 def setUp(self):
4981 setup_common()
4982
4983 def tearDown(self):
4984 tear_down_common()
4985
4986 def test_ipv6_prefix_delegation(self):
4987 copy_network_unit('25-veth.netdev', '25-ipv6-prefix.network', '25-ipv6-prefix-veth.network')
4988 self.setup_nftset('addr6', 'ipv6_addr')
4989 self.setup_nftset('network6', 'ipv6_addr', 'flags interval;')
4990 self.setup_nftset('ifindex', 'iface_index')
4991 start_networkd()
4992 self.wait_online(['veth99:routable', 'veth-peer:degraded'])
4993
4994 output = check_output(*resolvectl_cmd, 'dns', 'veth99', env=env)
4995 print(output)
4996 self.assertRegex(output, 'fe80::')
4997 self.assertRegex(output, '2002:da8:1::1')
4998
4999 output = check_output(*resolvectl_cmd, 'domain', 'veth99', env=env)
5000 print(output)
5001 self.assertIn('hogehoge.test', output)
5002
5003 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'veth99', env=env)
5004 print(output)
5005 self.assertRegex(output, '2002:da8:1:0')
5006
5007 self.check_netlabel('veth99', '2002:da8:1::/64')
5008 self.check_netlabel('veth99', '2002:da8:2::/64')
5009
5010 self.check_nftset('addr6', '2002:da8:1:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*')
5011 self.check_nftset('addr6', '2002:da8:2:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*')
5012 self.check_nftset('network6', '2002:da8:1::/64')
5013 self.check_nftset('network6', '2002:da8:2::/64')
5014 self.check_nftset('ifindex', 'veth99')
5015
5016 self.teardown_nftset('addr6', 'network6', 'ifindex')
5017
5018 def test_ipv6_token_static(self):
5019 copy_network_unit('25-veth.netdev', '25-ipv6-prefix.network', '25-ipv6-prefix-veth-token-static.network')
5020 start_networkd()
5021 self.wait_online(['veth99:routable', 'veth-peer:degraded'])
5022
5023 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'veth99', env=env)
5024 print(output)
5025 self.assertRegex(output, '2002:da8:1:0:1a:2b:3c:4d')
5026 self.assertRegex(output, '2002:da8:1:0:fa:de:ca:fe')
5027 self.assertRegex(output, '2002:da8:2:0:1a:2b:3c:4d')
5028 self.assertRegex(output, '2002:da8:2:0:fa:de:ca:fe')
5029
5030 def test_ipv6_token_prefixstable(self):
5031 copy_network_unit('25-veth.netdev', '25-ipv6-prefix.network', '25-ipv6-prefix-veth-token-prefixstable.network')
5032 start_networkd()
5033 self.wait_online(['veth99:routable', 'veth-peer:degraded'])
5034
5035 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'veth99', env=env)
5036 print(output)
5037 self.assertIn('2002:da8:1:0:b47e:7975:fc7a:7d6e', output)
5038 self.assertIn('2002:da8:2:0:1034:56ff:fe78:9abc', output) # EUI64
5039
5040 def test_ipv6_token_prefixstable_without_address(self):
5041 copy_network_unit('25-veth.netdev', '25-ipv6-prefix.network', '25-ipv6-prefix-veth-token-prefixstable-without-address.network')
5042 start_networkd()
5043 self.wait_online(['veth99:routable', 'veth-peer:degraded'])
5044
5045 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'veth99', env=env)
5046 print(output)
5047 self.assertIn('2002:da8:1:0:b47e:7975:fc7a:7d6e', output)
5048 self.assertIn('2002:da8:2:0:f689:561a:8eda:7443', output)
5049
5050 def test_router_preference(self):
5051 copy_network_unit('25-veth-client.netdev',
5052 '25-veth-router-high.netdev',
5053 '25-veth-router-low.netdev',
5054 '26-bridge.netdev',
5055 '25-veth-bridge.network',
5056 '25-veth-client.network',
5057 '25-veth-router-high.network',
5058 '25-veth-router-low.network',
5059 '25-bridge99.network')
5060 start_networkd()
5061 self.wait_online(['client-p:enslaved',
5062 'router-high:degraded', 'router-high-p:enslaved',
5063 'router-low:degraded', 'router-low-p:enslaved',
5064 'bridge99:routable'])
5065
5066 networkctl_reconfigure('client')
5067 self.wait_online(['client:routable'])
5068
5069 self.wait_address('client', '2002:da8:1:99:1034:56ff:fe78:9a00/64', ipv='-6', timeout_sec=10)
5070 self.wait_address('client', '2002:da8:1:98:1034:56ff:fe78:9a00/64', ipv='-6', timeout_sec=10)
5071 self.wait_route('client', 'default via fe80::1034:56ff:fe78:9a99 proto ra metric 512', ipv='-6', timeout_sec=10)
5072 self.wait_route('client', 'default via fe80::1034:56ff:fe78:9a98 proto ra metric 2048', ipv='-6', timeout_sec=10)
5073
5074 output = check_output('ip -6 route show dev client default via fe80::1034:56ff:fe78:9a99')
5075 print(output)
5076 self.assertIn('pref high', output)
5077 output = check_output('ip -6 route show dev client default via fe80::1034:56ff:fe78:9a98')
5078 print(output)
5079 self.assertIn('pref low', output)
5080
5081 with open(os.path.join(network_unit_dir, '25-veth-client.network'), mode='a', encoding='utf-8') as f:
5082 f.write('\n[Link]\nMACAddress=12:34:56:78:9a:01\n[IPv6AcceptRA]\nRouteMetric=100:200:300\n')
5083
5084 networkctl_reload()
5085 self.wait_online(['client:routable'])
5086
5087 self.wait_address('client', '2002:da8:1:99:1034:56ff:fe78:9a01/64', ipv='-6', timeout_sec=10)
5088 self.wait_address('client', '2002:da8:1:98:1034:56ff:fe78:9a01/64', ipv='-6', timeout_sec=10)
5089 self.wait_route('client', 'default via fe80::1034:56ff:fe78:9a99 proto ra metric 100', ipv='-6', timeout_sec=10)
5090 self.wait_route('client', 'default via fe80::1034:56ff:fe78:9a98 proto ra metric 300', ipv='-6', timeout_sec=10)
5091
5092 output = check_output('ip -6 route show dev client default via fe80::1034:56ff:fe78:9a99')
5093 print(output)
5094 self.assertIn('pref high', output)
5095 output = check_output('ip -6 route show dev client default via fe80::1034:56ff:fe78:9a98')
5096 print(output)
5097 self.assertIn('pref low', output)
5098
5099 @unittest.skipUnless(radvd_check_config('captive-portal.conf'), "Installed radvd doesn't support captive portals")
5100 def test_captive_portal(self):
5101 copy_network_unit('25-veth-client.netdev',
5102 '25-veth-router-captive.netdev',
5103 '26-bridge.netdev',
5104 '25-veth-client-captive.network',
5105 '25-veth-router-captive.network',
5106 '25-veth-bridge-captive.network',
5107 '25-bridge99.network')
5108 start_networkd()
5109 self.wait_online(['bridge99:routable', 'client-p:enslaved',
5110 'router-captive:degraded', 'router-captivep:enslaved'])
5111
5112 start_radvd(config_file='captive-portal.conf')
5113 networkctl_reconfigure('client')
5114 self.wait_online(['client:routable'])
5115
5116 self.wait_address('client', '2002:da8:1:99:1034:56ff:fe78:9a00/64', ipv='-6', timeout_sec=10)
5117 output = check_output(*networkctl_cmd, 'status', 'client', env=env)
5118 print(output)
5119 self.assertIn('Captive Portal: http://systemd.io', output)
5120
5121 @unittest.skipUnless(radvd_check_config('captive-portal.conf'), "Installed radvd doesn't support captive portals")
5122 def test_invalid_captive_portal(self):
5123 def radvd_write_config(captive_portal_uri):
5124 with open(os.path.join(networkd_ci_temp_dir, 'radvd/bogus-captive-portal.conf'), mode='w', encoding='utf-8') as f:
5125 f.write(f'interface router-captive {{ AdvSendAdvert on; AdvCaptivePortalAPI "{captive_portal_uri}"; prefix 2002:da8:1:99::/64 {{ AdvOnLink on; AdvAutonomous on; }}; }};')
5126
5127 captive_portal_uris = [
5128 "42ěščěškd ěšč ě s",
5129 " ",
5130 "🤔",
5131 ]
5132
5133 copy_network_unit('25-veth-client.netdev',
5134 '25-veth-router-captive.netdev',
5135 '26-bridge.netdev',
5136 '25-veth-client-captive.network',
5137 '25-veth-router-captive.network',
5138 '25-veth-bridge-captive.network',
5139 '25-bridge99.network')
5140 start_networkd()
5141 self.wait_online(['bridge99:routable', 'client-p:enslaved',
5142 'router-captive:degraded', 'router-captivep:enslaved'])
5143
5144 for uri in captive_portal_uris:
5145 print(f"Captive portal: {uri}")
5146 radvd_write_config(uri)
5147 stop_radvd()
5148 start_radvd(config_file='bogus-captive-portal.conf')
5149 networkctl_reconfigure('client')
5150 self.wait_online(['client:routable'])
5151
5152 self.wait_address('client', '2002:da8:1:99:1034:56ff:fe78:9a00/64', ipv='-6', timeout_sec=10)
5153 output = check_output(*networkctl_cmd, 'status', 'client', env=env)
5154 print(output)
5155 self.assertNotIn('Captive Portal:', output)
5156
5157 class NetworkdDHCPServerTests(unittest.TestCase, Utilities):
5158
5159 def setUp(self):
5160 setup_common()
5161
5162 def tearDown(self):
5163 tear_down_common()
5164
5165 def test_dhcp_server(self):
5166 copy_network_unit('25-veth.netdev', '25-dhcp-client.network', '25-dhcp-server.network')
5167 start_networkd()
5168 self.wait_online(['veth99:routable', 'veth-peer:routable'])
5169
5170 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'veth99', env=env)
5171 print(output)
5172 self.assertRegex(output, r'Address: 192.168.5.[0-9]* \(DHCP4 via 192.168.5.1\)')
5173 self.assertIn('Gateway: 192.168.5.3', output)
5174 self.assertRegex(output, 'DNS: 192.168.5.1\n *192.168.5.10')
5175 self.assertRegex(output, 'NTP: 192.168.5.1\n *192.168.5.11')
5176
5177 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'veth-peer', env=env)
5178 self.assertRegex(output, "Offered DHCP leases: 192.168.5.[0-9]*")
5179
5180 def test_dhcp_server_null_server_address(self):
5181 copy_network_unit('25-veth.netdev', '25-dhcp-client.network', '25-dhcp-server-null-server-address.network')
5182 start_networkd()
5183 self.wait_online(['veth99:routable', 'veth-peer:routable'])
5184
5185 output = check_output('ip --json address show dev veth-peer')
5186 server_address = json.loads(output)[0]['addr_info'][0]['local']
5187 print(server_address)
5188
5189 output = check_output('ip --json address show dev veth99')
5190 client_address = json.loads(output)[0]['addr_info'][0]['local']
5191 print(client_address)
5192
5193 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'veth99', env=env)
5194 print(output)
5195 self.assertRegex(output, rf'Address: {client_address} \(DHCP4 via {server_address}\)')
5196 self.assertIn(f'Gateway: {server_address}', output)
5197 self.assertIn(f'DNS: {server_address}', output)
5198 self.assertIn(f'NTP: {server_address}', output)
5199
5200 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'veth-peer', env=env)
5201 self.assertIn(f'Offered DHCP leases: {client_address}', output)
5202
5203 def test_dhcp_server_with_uplink(self):
5204 copy_network_unit('25-veth.netdev', '25-dhcp-client.network', '25-dhcp-server-downstream.network',
5205 '12-dummy.netdev', '25-dhcp-server-uplink.network')
5206 start_networkd()
5207 self.wait_online(['veth99:routable', 'veth-peer:routable'])
5208
5209 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'veth99', env=env)
5210 print(output)
5211 self.assertRegex(output, r'Address: 192.168.5.[0-9]* \(DHCP4 via 192.168.5.1\)')
5212 self.assertIn('Gateway: 192.168.5.3', output)
5213 self.assertIn('DNS: 192.168.5.1', output)
5214 self.assertIn('NTP: 192.168.5.1', output)
5215
5216 def test_emit_router_timezone(self):
5217 copy_network_unit('25-veth.netdev', '25-dhcp-client-timezone-router.network', '25-dhcp-server-timezone-router.network')
5218 start_networkd()
5219 self.wait_online(['veth99:routable', 'veth-peer:routable'])
5220
5221 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'veth99', env=env)
5222 print(output)
5223 self.assertRegex(output, r'Address: 192.168.5.[0-9]* \(DHCP4 via 192.168.5.1\)')
5224 self.assertIn('Gateway: 192.168.5.1', output)
5225 self.assertIn('Time Zone: Europe/Berlin', output)
5226
5227 def test_dhcp_server_static_lease(self):
5228 copy_network_unit('25-veth.netdev', '25-dhcp-client-static-lease.network', '25-dhcp-server-static-lease.network')
5229 start_networkd()
5230 self.wait_online(['veth99:routable', 'veth-peer:routable'])
5231
5232 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'veth99', env=env)
5233 print(output)
5234 self.assertIn('Address: 10.1.1.200 (DHCP4 via 10.1.1.1)', output)
5235 self.assertIn('DHCP4 Client ID: 12:34:56:78:9a:bc', output)
5236
5237 def test_dhcp_server_static_lease_default_client_id(self):
5238 copy_network_unit('25-veth.netdev', '25-dhcp-client.network', '25-dhcp-server-static-lease.network')
5239 start_networkd()
5240 self.wait_online(['veth99:routable', 'veth-peer:routable'])
5241
5242 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'veth99', env=env)
5243 print(output)
5244 self.assertIn('Address: 10.1.1.200 (DHCP4 via 10.1.1.1)', output)
5245 self.assertRegex(output, 'DHCP4 Client ID: IAID:[0-9a-z]*/DUID')
5246
5247 class NetworkdDHCPServerRelayAgentTests(unittest.TestCase, Utilities):
5248
5249 def setUp(self):
5250 setup_common()
5251
5252 def tearDown(self):
5253 tear_down_common()
5254
5255 def test_relay_agent(self):
5256 copy_network_unit('25-agent-veth-client.netdev',
5257 '25-agent-veth-server.netdev',
5258 '25-agent-client.network',
5259 '25-agent-server.network',
5260 '25-agent-client-peer.network',
5261 '25-agent-server-peer.network')
5262 start_networkd()
5263
5264 self.wait_online(['client:routable'])
5265
5266 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'client', env=env)
5267 print(output)
5268 self.assertRegex(output, r'Address: 192.168.5.150 \(DHCP4 via 192.168.5.1\)')
5269
5270 class NetworkdDHCPClientTests(unittest.TestCase, Utilities):
5271
5272 def setUp(self):
5273 setup_common()
5274
5275 def tearDown(self):
5276 tear_down_common()
5277
5278 def test_dhcp_client_ipv6_only(self):
5279 copy_network_unit('25-veth.netdev', '25-dhcp-server-veth-peer.network', '25-dhcp-client-ipv6-only.network')
5280
5281 start_networkd()
5282 self.wait_online(['veth-peer:carrier'])
5283
5284 # information request mode
5285 # The name ipv6-only option may not be supported by older dnsmasq
5286 # start_dnsmasq('--dhcp-option=option:ipv6-only,300')
5287 start_dnsmasq('--dhcp-option=108,00:00:02:00',
5288 '--dhcp-option=option6:dns-server,[2600::ee]',
5289 '--dhcp-option=option6:ntp-server,[2600::ff]',
5290 ra_mode='ra-stateless')
5291 self.wait_online(['veth99:routable', 'veth-peer:routable'])
5292
5293 # DHCPv6 REPLY for INFORMATION-REQUEST may be received after the link entered configured state.
5294 # Let's wait for the expected DNS server being listed in the state file.
5295 for _ in range(100):
5296 output = read_link_state_file('veth99')
5297 if 'DNS=2600::ee' in output:
5298 break
5299 time.sleep(.2)
5300
5301 # Check link state file
5302 print('## link state file')
5303 output = read_link_state_file('veth99')
5304 print(output)
5305 self.assertIn('DNS=2600::ee', output)
5306 self.assertIn('NTP=2600::ff', output)
5307
5308 # Check manager state file
5309 print('## manager state file')
5310 output = read_manager_state_file()
5311 print(output)
5312 self.assertRegex(output, 'DNS=.*2600::ee')
5313 self.assertRegex(output, 'NTP=.*2600::ff')
5314
5315 print('## dnsmasq log')
5316 output = read_dnsmasq_log_file()
5317 print(output)
5318 self.assertIn('DHCPINFORMATION-REQUEST(veth-peer)', output)
5319 self.assertNotIn('DHCPSOLICIT(veth-peer)', output)
5320 self.assertNotIn('DHCPADVERTISE(veth-peer)', output)
5321 self.assertNotIn('DHCPREQUEST(veth-peer)', output)
5322 self.assertNotIn('DHCPREPLY(veth-peer)', output)
5323
5324 # Check json format
5325 output = check_output(*networkctl_cmd, '--json=short', 'status', 'veth99', env=env)
5326 check_json(output)
5327
5328 # solicit mode
5329 stop_dnsmasq()
5330 start_dnsmasq('--dhcp-option=108,00:00:02:00',
5331 '--dhcp-option=option6:dns-server,[2600::ee]',
5332 '--dhcp-option=option6:ntp-server,[2600::ff]')
5333 networkctl_reconfigure('veth99')
5334 self.wait_online(['veth99:routable', 'veth-peer:routable'])
5335
5336 # checking address
5337 output = check_output('ip address show dev veth99 scope global')
5338 print(output)
5339 self.assertRegex(output, r'inet6 2600::[0-9a-f:]*/128 scope global dynamic noprefixroute')
5340 self.assertNotIn('192.168.5', output)
5341
5342 # checking semi-static route
5343 output = check_output('ip -6 route list dev veth99 2001:1234:5:9fff:ff:ff:ff:ff')
5344 print(output)
5345 self.assertRegex(output, 'via fe80::1034:56ff:fe78:9abd')
5346
5347 # Confirm that ipv6 token is not set in the kernel
5348 output = check_output('ip token show dev veth99')
5349 print(output)
5350 self.assertRegex(output, 'token :: dev veth99')
5351
5352 # Make manager and link state file updated
5353 check_output(*resolvectl_cmd, 'revert', 'veth99', env=env)
5354
5355 # Check link state file
5356 print('## link state file')
5357 output = read_link_state_file('veth99')
5358 print(output)
5359 self.assertIn('DNS=2600::ee', output)
5360 self.assertIn('NTP=2600::ff', output)
5361
5362 # Check manager state file
5363 print('## manager state file')
5364 output = read_manager_state_file()
5365 print(output)
5366 self.assertRegex(output, 'DNS=.*2600::ee')
5367 self.assertRegex(output, 'NTP=.*2600::ff')
5368
5369 print('## dnsmasq log')
5370 output = read_dnsmasq_log_file()
5371 print(output)
5372 self.assertNotIn('DHCPINFORMATION-REQUEST(veth-peer)', output)
5373 self.assertIn('DHCPSOLICIT(veth-peer)', output)
5374 self.assertNotIn('DHCPADVERTISE(veth-peer)', output)
5375 self.assertNotIn('DHCPREQUEST(veth-peer)', output)
5376 self.assertIn('DHCPREPLY(veth-peer)', output)
5377 self.assertIn('sent size: 0 option: 14 rapid-commit', output)
5378
5379 # Check json format
5380 output = check_output(*networkctl_cmd, '--json=short', 'status', 'veth99', env=env)
5381 check_json(output)
5382
5383 # Testing without rapid commit support
5384 with open(os.path.join(network_unit_dir, '25-dhcp-client-ipv6-only.network'), mode='a', encoding='utf-8') as f:
5385 f.write('\n[DHCPv6]\nRapidCommit=no\n')
5386
5387 stop_dnsmasq()
5388 start_dnsmasq('--dhcp-option=108,00:00:02:00',
5389 '--dhcp-option=option6:dns-server,[2600::ee]',
5390 '--dhcp-option=option6:ntp-server,[2600::ff]')
5391
5392 networkctl_reload()
5393 self.wait_online(['veth99:routable', 'veth-peer:routable'])
5394
5395 # checking address
5396 output = check_output('ip address show dev veth99 scope global')
5397 print(output)
5398 self.assertRegex(output, r'inet6 2600::[0-9a-f:]*/128 scope global dynamic noprefixroute')
5399 self.assertNotIn('192.168.5', output)
5400
5401 # checking semi-static route
5402 output = check_output('ip -6 route list dev veth99 2001:1234:5:9fff:ff:ff:ff:ff')
5403 print(output)
5404 self.assertRegex(output, 'via fe80::1034:56ff:fe78:9abd')
5405
5406 # Make manager and link state file updated
5407 check_output(*resolvectl_cmd, 'revert', 'veth99', env=env)
5408
5409 # Check link state file
5410 print('## link state file')
5411 output = read_link_state_file('veth99')
5412 print(output)
5413 self.assertIn('DNS=2600::ee', output)
5414 self.assertIn('NTP=2600::ff', output)
5415
5416 # Check manager state file
5417 print('## manager state file')
5418 output = read_manager_state_file()
5419 print(output)
5420 self.assertRegex(output, 'DNS=.*2600::ee')
5421 self.assertRegex(output, 'NTP=.*2600::ff')
5422
5423 print('## dnsmasq log')
5424 output = read_dnsmasq_log_file()
5425 print(output)
5426 self.assertNotIn('DHCPINFORMATION-REQUEST(veth-peer)', output)
5427 self.assertIn('DHCPSOLICIT(veth-peer)', output)
5428 self.assertIn('DHCPADVERTISE(veth-peer)', output)
5429 self.assertIn('DHCPREQUEST(veth-peer)', output)
5430 self.assertIn('DHCPREPLY(veth-peer)', output)
5431 self.assertNotIn('rapid-commit', output)
5432
5433 # Check json format
5434 output = check_output(*networkctl_cmd, '--json=short', 'status', 'veth99', env=env)
5435 check_json(output)
5436
5437 def test_dhcp_client_ipv6_dbus_status(self):
5438 copy_network_unit('25-veth.netdev', '25-dhcp-server-veth-peer.network', '25-dhcp-client-ipv6-only.network')
5439 start_networkd()
5440 self.wait_online(['veth-peer:carrier'])
5441
5442 # Note that at this point the DHCPv6 client has not been started because no RA (with managed
5443 # bit set) has yet been received and the configuration does not include WithoutRA=true
5444 state = get_dhcp6_client_state('veth99')
5445 print(f"DHCPv6 client state = {state}")
5446 self.assertEqual(state, 'stopped')
5447
5448 state = get_dhcp4_client_state('veth99')
5449 print(f"DHCPv4 client state = {state}")
5450 self.assertEqual(state, 'selecting')
5451
5452 start_dnsmasq('--dhcp-option=108,00:00:02:00')
5453 self.wait_online(['veth99:routable', 'veth-peer:routable'])
5454
5455 state = get_dhcp6_client_state('veth99')
5456 print(f"DHCPv6 client state = {state}")
5457 self.assertEqual(state, 'bound')
5458
5459 # DHCPv4 client will stop after an DHCPOFFER message received, so we need to wait for a while.
5460 for _ in range(100):
5461 state = get_dhcp4_client_state('veth99')
5462 if state == 'stopped':
5463 break
5464 time.sleep(.2)
5465
5466 print(f"DHCPv4 client state = {state}")
5467 self.assertEqual(state, 'stopped')
5468
5469 # restart dnsmasq to clear log
5470 stop_dnsmasq()
5471 start_dnsmasq('--dhcp-option=108,00:00:02:00')
5472
5473 # Test renew command
5474 # See https://github.com/systemd/systemd/pull/29472#issuecomment-1759092138
5475 check_output(*networkctl_cmd, 'renew', 'veth99', env=env)
5476
5477 for _ in range(100):
5478 state = get_dhcp4_client_state('veth99')
5479 if state == 'stopped':
5480 break
5481 time.sleep(.2)
5482
5483 print(f"DHCPv4 client state = {state}")
5484 self.assertEqual(state, 'stopped')
5485
5486 print('## dnsmasq log')
5487 output = read_dnsmasq_log_file()
5488 print(output)
5489 self.assertIn('DHCPDISCOVER(veth-peer) 12:34:56:78:9a:bc', output)
5490 self.assertIn('DHCPOFFER(veth-peer)', output)
5491 self.assertNotIn('DHCPREQUEST(veth-peer)', output)
5492 self.assertNotIn('DHCPACK(veth-peer)', output)
5493
5494 def test_dhcp_client_ipv6_only_with_custom_client_identifier(self):
5495 copy_network_unit('25-veth.netdev', '25-dhcp-server-veth-peer.network', '25-dhcp-client-ipv6-only-custom-client-identifier.network')
5496
5497 start_networkd()
5498 self.wait_online(['veth-peer:carrier'])
5499 start_dnsmasq()
5500 self.wait_online(['veth99:routable', 'veth-peer:routable'])
5501
5502 # checking address
5503 output = check_output('ip address show dev veth99 scope global')
5504 print(output)
5505 self.assertRegex(output, r'inet6 2600::[0-9a-f:]*/128 scope global dynamic noprefixroute')
5506 self.assertNotIn('192.168.5', output)
5507
5508 print('## dnsmasq log')
5509 output = read_dnsmasq_log_file()
5510 print(output)
5511 self.assertIn('DHCPSOLICIT(veth-peer) 00:42:00:00:ab:11:f9:2a:c2:77:29:f9:5c:00', output)
5512 self.assertNotIn('DHCPADVERTISE(veth-peer)', output)
5513 self.assertNotIn('DHCPREQUEST(veth-peer)', output)
5514 self.assertIn('DHCPREPLY(veth-peer)', output)
5515 self.assertIn('sent size: 0 option: 14 rapid-commit', output)
5516
5517 def test_dhcp_client_ipv4_only(self):
5518 copy_network_unit('25-veth.netdev', '25-dhcp-server-veth-peer.network', '25-dhcp-client-ipv4-only.network')
5519
5520 self.setup_nftset('addr4', 'ipv4_addr')
5521 self.setup_nftset('network4', 'ipv4_addr', 'flags interval;')
5522 self.setup_nftset('ifindex', 'iface_index')
5523
5524 start_networkd()
5525 self.wait_online(['veth-peer:carrier'])
5526 start_dnsmasq('--dhcp-option=option:dns-server,192.168.5.6,192.168.5.7',
5527 '--dhcp-option=option:sip-server,192.168.5.21,192.168.5.22',
5528 '--dhcp-option=option:domain-search,example.com',
5529 '--dhcp-alternate-port=67,5555',
5530 ipv4_range='192.168.5.110,192.168.5.119')
5531 self.wait_online(['veth99:routable', 'veth-peer:routable'])
5532 self.wait_address('veth99', r'inet 192.168.5.11[0-9]*/24', ipv='-4')
5533
5534 print('## ip address show dev veth99 scope global')
5535 output = check_output('ip address show dev veth99 scope global')
5536 print(output)
5537 self.assertIn('mtu 1492', output)
5538 self.assertIn('inet 192.168.5.250/24 brd 192.168.5.255 scope global veth99', output)
5539 self.assertRegex(output, r'inet 192.168.5.11[0-9]/24 metric 24 brd 192.168.5.255 scope global secondary dynamic noprefixroute test-label')
5540 self.assertNotIn('2600::', output)
5541
5542 output = check_output('ip -4 --json address show dev veth99')
5543 for i in json.loads(output)[0]['addr_info']:
5544 if i['label'] == 'test-label':
5545 address1 = i['local']
5546 break
5547 else:
5548 self.assertFalse(True)
5549
5550 self.assertRegex(address1, r'^192.168.5.11[0-9]$')
5551
5552 print('## ip route show table main dev veth99')
5553 output = check_output('ip route show table main dev veth99')
5554 print(output)
5555 # no DHCP routes assigned to the main table
5556 self.assertNotIn('proto dhcp', output)
5557 # static routes
5558 self.assertIn('192.168.5.0/24 proto kernel scope link src 192.168.5.250', output)
5559 self.assertIn('192.168.5.0/24 proto static scope link', output)
5560 self.assertIn('192.168.6.0/24 proto static scope link', output)
5561 self.assertIn('192.168.7.0/24 proto static scope link', output)
5562
5563 print('## ip route show table 211 dev veth99')
5564 output = check_output('ip route show table 211 dev veth99')
5565 print(output)
5566 self.assertRegex(output, f'default via 192.168.5.1 proto dhcp src {address1} metric 24')
5567 self.assertRegex(output, f'192.168.5.0/24 proto dhcp scope link src {address1} metric 24')
5568 self.assertRegex(output, f'192.168.5.1 proto dhcp scope link src {address1} metric 24')
5569 self.assertRegex(output, f'192.168.5.6 proto dhcp scope link src {address1} metric 24')
5570 self.assertRegex(output, f'192.168.5.7 proto dhcp scope link src {address1} metric 24')
5571 self.assertIn('10.0.0.0/8 via 192.168.5.1 proto dhcp', output)
5572
5573 print('## link state file')
5574 output = read_link_state_file('veth99')
5575 print(output)
5576 # checking DNS server, SIP server, and Domains
5577 self.assertIn('DNS=192.168.5.6 192.168.5.7', output)
5578 self.assertIn('SIP=192.168.5.21 192.168.5.22', output)
5579 self.assertIn('DOMAINS=example.com', output)
5580
5581 print('## json')
5582 output = check_output(*networkctl_cmd, '--json=short', 'status', 'veth99', env=env)
5583 j = json.loads(output)
5584
5585 self.assertEqual(len(j['DNS']), 2)
5586 for i in j['DNS']:
5587 print(i)
5588 self.assertEqual(i['Family'], 2)
5589 a = socket.inet_ntop(socket.AF_INET, bytearray(i['Address']))
5590 self.assertRegex(a, '^192.168.5.[67]$')
5591 self.assertEqual(i['ConfigSource'], 'DHCPv4')
5592 a = socket.inet_ntop(socket.AF_INET, bytearray(i['ConfigProvider']))
5593 self.assertEqual('192.168.5.1', a)
5594
5595 self.assertEqual(len(j['SIP']), 2)
5596 for i in j['SIP']:
5597 print(i)
5598 self.assertEqual(i['Family'], 2)
5599 a = socket.inet_ntop(socket.AF_INET, bytearray(i['Address']))
5600 self.assertRegex(a, '^192.168.5.2[12]$')
5601 self.assertEqual(i['ConfigSource'], 'DHCPv4')
5602 a = socket.inet_ntop(socket.AF_INET, bytearray(i['ConfigProvider']))
5603 self.assertEqual('192.168.5.1', a)
5604
5605 print('## dnsmasq log')
5606 output = read_dnsmasq_log_file()
5607 print(output)
5608 self.assertIn('vendor class: FooBarVendorTest', output)
5609 self.assertIn('DHCPDISCOVER(veth-peer) 192.168.5.110 12:34:56:78:9a:bc', output)
5610 self.assertIn('client provides name: test-hostname', output)
5611 self.assertIn('26:mtu', output)
5612
5613 # change address range, DNS servers, and Domains
5614 stop_dnsmasq()
5615 start_dnsmasq('--dhcp-option=option:dns-server,192.168.5.1,192.168.5.7,192.168.5.8',
5616 '--dhcp-option=option:sip-server,192.168.5.23,192.168.5.24',
5617 '--dhcp-option=option:domain-search,foo.example.com',
5618 '--dhcp-alternate-port=67,5555',
5619 ipv4_range='192.168.5.120,192.168.5.129',)
5620
5621 # Sleep for 120 sec as the dnsmasq minimum lease time can only be set to 120
5622 print('Wait for the DHCP lease to be expired')
5623 self.wait_address_dropped('veth99', f'inet {address1}/24', ipv='-4', timeout_sec=120)
5624 self.wait_address('veth99', r'inet 192.168.5.12[0-9]*/24', ipv='-4')
5625
5626 self.wait_online(['veth99:routable', 'veth-peer:routable'])
5627
5628 print('## ip address show dev veth99 scope global')
5629 output = check_output('ip address show dev veth99 scope global')
5630 print(output)
5631 self.assertIn('mtu 1492', output)
5632 self.assertIn('inet 192.168.5.250/24 brd 192.168.5.255 scope global veth99', output)
5633 self.assertNotIn(f'{address1}', output)
5634 self.assertRegex(output, r'inet 192.168.5.12[0-9]/24 metric 24 brd 192.168.5.255 scope global secondary dynamic noprefixroute test-label')
5635 self.assertNotIn('2600::', output)
5636
5637 output = check_output('ip -4 --json address show dev veth99')
5638 for i in json.loads(output)[0]['addr_info']:
5639 if i['label'] == 'test-label':
5640 address2 = i['local']
5641 break
5642 else:
5643 self.assertFalse(True)
5644
5645 self.assertRegex(address2, r'^192.168.5.12[0-9]$')
5646
5647 print('## ip route show table main dev veth99')
5648 output = check_output('ip route show table main dev veth99')
5649 print(output)
5650 # no DHCP routes assigned to the main table
5651 self.assertNotIn('proto dhcp', output)
5652 # static routes
5653 self.assertIn('192.168.5.0/24 proto kernel scope link src 192.168.5.250', output)
5654 self.assertIn('192.168.5.0/24 proto static scope link', output)
5655 self.assertIn('192.168.6.0/24 proto static scope link', output)
5656 self.assertIn('192.168.7.0/24 proto static scope link', output)
5657
5658 print('## ip route show table 211 dev veth99')
5659 output = check_output('ip route show table 211 dev veth99')
5660 print(output)
5661 self.assertRegex(output, f'default via 192.168.5.1 proto dhcp src {address2} metric 24')
5662 self.assertRegex(output, f'192.168.5.0/24 proto dhcp scope link src {address2} metric 24')
5663 self.assertRegex(output, f'192.168.5.1 proto dhcp scope link src {address2} metric 24')
5664 self.assertNotIn('192.168.5.6', output)
5665 self.assertRegex(output, f'192.168.5.7 proto dhcp scope link src {address2} metric 24')
5666 self.assertRegex(output, f'192.168.5.8 proto dhcp scope link src {address2} metric 24')
5667 self.assertIn('10.0.0.0/8 via 192.168.5.1 proto dhcp', output)
5668
5669 print('## link state file')
5670 output = read_link_state_file('veth99')
5671 print(output)
5672 # checking DNS server, SIP server, and Domains
5673 self.assertIn('DNS=192.168.5.1 192.168.5.7 192.168.5.8', output)
5674 self.assertIn('SIP=192.168.5.23 192.168.5.24', output)
5675 self.assertIn('DOMAINS=foo.example.com', output)
5676
5677 print('## json')
5678 output = check_output(*networkctl_cmd, '--json=short', 'status', 'veth99', env=env)
5679 j = json.loads(output)
5680
5681 self.assertEqual(len(j['DNS']), 3)
5682 for i in j['DNS']:
5683 print(i)
5684 self.assertEqual(i['Family'], 2)
5685 a = socket.inet_ntop(socket.AF_INET, bytearray(i['Address']))
5686 self.assertRegex(a, '^192.168.5.[178]$')
5687 self.assertEqual(i['ConfigSource'], 'DHCPv4')
5688 a = socket.inet_ntop(socket.AF_INET, bytearray(i['ConfigProvider']))
5689 self.assertEqual('192.168.5.1', a)
5690
5691 self.assertEqual(len(j['SIP']), 2)
5692 for i in j['SIP']:
5693 print(i)
5694 self.assertEqual(i['Family'], 2)
5695 a = socket.inet_ntop(socket.AF_INET, bytearray(i['Address']))
5696 self.assertRegex(a, '^192.168.5.2[34]$')
5697 self.assertEqual(i['ConfigSource'], 'DHCPv4')
5698 a = socket.inet_ntop(socket.AF_INET, bytearray(i['ConfigProvider']))
5699 self.assertEqual('192.168.5.1', a)
5700
5701 print('## dnsmasq log')
5702 output = read_dnsmasq_log_file()
5703 print(output)
5704 self.assertIn('vendor class: FooBarVendorTest', output)
5705 self.assertIn(f'DHCPDISCOVER(veth-peer) {address1} 12:34:56:78:9a:bc', output)
5706 self.assertIn('client provides name: test-hostname', output)
5707 self.assertIn('26:mtu', output)
5708
5709 self.check_netlabel('veth99', r'192\.168\.5\.0/24')
5710
5711 self.check_nftset('addr4', r'192\.168\.5\.1')
5712 self.check_nftset('network4', r'192\.168\.5\.0/24')
5713 self.check_nftset('ifindex', 'veth99')
5714
5715 self.teardown_nftset('addr4', 'network4', 'ifindex')
5716
5717 def test_dhcp_client_ipv4_dbus_status(self):
5718 copy_network_unit('25-veth.netdev', '25-dhcp-server-veth-peer.network', '25-dhcp-client-ipv4-only.network')
5719 start_networkd()
5720 self.wait_online(['veth-peer:carrier'])
5721
5722 state = get_dhcp4_client_state('veth99')
5723 print(f"State = {state}")
5724 self.assertEqual(state, 'rebooting')
5725
5726 start_dnsmasq('--dhcp-option=option:dns-server,192.168.5.6,192.168.5.7',
5727 '--dhcp-option=option:domain-search,example.com',
5728 '--dhcp-alternate-port=67,5555',
5729 ipv4_range='192.168.5.110,192.168.5.119')
5730 self.wait_online(['veth99:routable', 'veth-peer:routable'])
5731 self.wait_address('veth99', r'inet 192.168.5.11[0-9]*/24', ipv='-4')
5732
5733 state = get_dhcp4_client_state('veth99')
5734 print(f"State = {state}")
5735 self.assertEqual(state, 'bound')
5736
5737 def test_dhcp_client_allow_list(self):
5738 copy_network_unit('25-veth.netdev', '25-dhcp-server-veth-peer.network', '25-dhcp-client-allow-list.network', copy_dropins=False)
5739
5740 start_networkd()
5741 self.wait_online(['veth-peer:carrier'])
5742 since = datetime.datetime.now()
5743 start_dnsmasq()
5744
5745 expect = 'veth99: DHCPv4 server IP address 192.168.5.1 not found in allow-list, ignoring offer.'
5746 for _ in range(20):
5747 if expect in read_networkd_log(since=since):
5748 break
5749 time.sleep(0.5)
5750 else:
5751 self.fail()
5752
5753 copy_network_unit('25-dhcp-client-allow-list.network.d/00-allow-list.conf')
5754 since = datetime.datetime.now()
5755 networkctl_reload()
5756
5757 expect = 'veth99: DHCPv4 server IP address 192.168.5.1 not found in allow-list, ignoring offer.'
5758 for _ in range(20):
5759 if expect in read_networkd_log(since=since):
5760 break
5761 time.sleep(0.5)
5762 else:
5763 self.fail()
5764
5765 copy_network_unit('25-dhcp-client-allow-list.network.d/10-deny-list.conf')
5766 since = datetime.datetime.now()
5767 networkctl_reload()
5768
5769 expect = 'veth99: DHCPv4 server IP address 192.168.5.1 found in deny-list, ignoring offer.'
5770 for _ in range(20):
5771 if expect in read_networkd_log(since=since):
5772 break
5773 time.sleep(0.5)
5774 else:
5775 self.fail()
5776
5777 @unittest.skipUnless("--dhcp-rapid-commit" in run("dnsmasq --help").stdout, reason="dnsmasq is missing dhcp-rapid-commit support")
5778 def test_dhcp_client_rapid_commit(self):
5779 copy_network_unit('25-veth.netdev', '25-dhcp-server-veth-peer.network', '25-dhcp-client.network')
5780 start_networkd()
5781 self.wait_online(['veth-peer:carrier'])
5782
5783 start_dnsmasq('--dhcp-rapid-commit')
5784 self.wait_online(['veth99:routable', 'veth-peer:routable'])
5785 self.wait_address('veth99', r'inet 192.168.5.[0-9]*/24', ipv='-4')
5786
5787 state = get_dhcp4_client_state('veth99')
5788 print(f"DHCPv4 client state = {state}")
5789 self.assertEqual(state, 'bound')
5790
5791 output = read_dnsmasq_log_file()
5792 self.assertIn('DHCPDISCOVER(veth-peer)', output)
5793 self.assertNotIn('DHCPOFFER(veth-peer)', output)
5794 self.assertNotIn('DHCPREQUEST(veth-peer)', output)
5795 self.assertIn('DHCPACK(veth-peer)', output)
5796
5797 def test_dhcp_client_ipv6_only_mode_without_ipv6_connectivity(self):
5798 copy_network_unit('25-veth.netdev',
5799 '25-dhcp-server-ipv6-only-mode.network',
5800 '25-dhcp-client-ipv6-only-mode.network')
5801 start_networkd()
5802 self.wait_online(['veth99:routable', 'veth-peer:routable'], timeout='40s')
5803 self.wait_address('veth99', r'inet 192.168.5.[0-9]*/24', ipv='-4')
5804
5805 state = get_dhcp4_client_state('veth99')
5806 print(f"State = {state}")
5807 self.assertEqual(state, 'bound')
5808
5809 def test_dhcp_client_ipv4_use_routes_gateway(self):
5810 first = True
5811 for (routes, gateway, dns_and_ntp_routes, classless) in itertools.product([True, False], repeat=4):
5812 if first:
5813 first = False
5814 else:
5815 self.tearDown()
5816
5817 print(f'### test_dhcp_client_ipv4_use_routes_gateway(routes={routes}, gateway={gateway}, dns_and_ntp_routes={dns_and_ntp_routes}, classless={classless})')
5818 with self.subTest(routes=routes, gateway=gateway, dns_and_ntp_routes=dns_and_ntp_routes, classless=classless):
5819 self._test_dhcp_client_ipv4_use_routes_gateway(routes, gateway, dns_and_ntp_routes, classless)
5820
5821 def _test_dhcp_client_ipv4_use_routes_gateway(self, use_routes, use_gateway, dns_and_ntp_routes, classless):
5822 testunit = '25-dhcp-client-ipv4-use-routes-use-gateway.network'
5823 testunits = ['25-veth.netdev', '25-dhcp-server-veth-peer.network', testunit]
5824 testunits.append(f'{testunit}.d/use-routes-{use_routes}.conf')
5825 testunits.append(f'{testunit}.d/use-gateway-{use_gateway}.conf')
5826 testunits.append(f'{testunit}.d/use-dns-and-ntp-routes-{dns_and_ntp_routes}.conf')
5827 copy_network_unit(*testunits, copy_dropins=False)
5828
5829 start_networkd()
5830 self.wait_online(['veth-peer:carrier'])
5831 additional_options = [
5832 '--dhcp-option=option:dns-server,192.168.5.10,8.8.8.8',
5833 '--dhcp-option=option:ntp-server,192.168.5.11,9.9.9.9',
5834 '--dhcp-option=option:static-route,192.168.6.100,192.168.5.2,8.8.8.8,192.168.5.3'
5835 ]
5836 if classless:
5837 additional_options += [
5838 '--dhcp-option=option:classless-static-route,0.0.0.0/0,192.168.5.4,8.0.0.0/8,192.168.5.5,192.168.5.64/26,192.168.5.5'
5839 ]
5840 start_dnsmasq(*additional_options)
5841 self.wait_online(['veth99:routable', 'veth-peer:routable'])
5842
5843 output = check_output('ip -4 route show dev veth99')
5844 print(output)
5845
5846 # Check UseRoutes=
5847 if use_routes:
5848 if classless:
5849 self.assertRegex(output, r'default via 192.168.5.4 proto dhcp src 192.168.5.[0-9]* metric 1024')
5850 self.assertRegex(output, r'8.0.0.0/8 via 192.168.5.5 proto dhcp src 192.168.5.[0-9]* metric 1024')
5851 self.assertRegex(output, r'192.168.5.64/26 via 192.168.5.5 proto dhcp src 192.168.5.[0-9]* metric 1024')
5852 self.assertRegex(output, r'192.168.5.4 proto dhcp scope link src 192.168.5.[0-9]* metric 1024')
5853 self.assertRegex(output, r'192.168.5.5 proto dhcp scope link src 192.168.5.[0-9]* metric 1024')
5854 else:
5855 self.assertRegex(output, r'192.168.6.0/24 via 192.168.5.2 proto dhcp src 192.168.5.[0-9]* metric 1024')
5856 self.assertRegex(output, r'8.0.0.0/8 via 192.168.5.3 proto dhcp src 192.168.5.[0-9]* metric 1024')
5857 self.assertRegex(output, r'192.168.5.2 proto dhcp scope link src 192.168.5.[0-9]* metric 1024')
5858 self.assertRegex(output, r'192.168.5.3 proto dhcp scope link src 192.168.5.[0-9]* metric 1024')
5859 else:
5860 self.assertNotRegex(output, r'default via 192.168.5.4 proto dhcp src 192.168.5.[0-9]* metric 1024')
5861 self.assertNotRegex(output, r'8.0.0.0/8 via 192.168.5.5 proto dhcp src 192.168.5.[0-9]* metric 1024')
5862 self.assertNotRegex(output, r'192.168.5.4 proto dhcp scope link src 192.168.5.[0-9]* metric 1024')
5863 self.assertNotRegex(output, r'192.168.5.5 proto dhcp scope link src 192.168.5.[0-9]* metric 1024')
5864 self.assertNotRegex(output, r'192.168.6.0/24 via 192.168.5.2 proto dhcp src 192.168.5.[0-9]* metric 1024')
5865 self.assertNotRegex(output, r'8.0.0.0/8 via 192.168.5.3 proto dhcp src 192.168.5.[0-9]* metric 1024')
5866 self.assertNotRegex(output, r'192.168.5.2 proto dhcp scope link src 192.168.5.[0-9]* metric 1024')
5867 self.assertNotRegex(output, r'192.168.5.3 proto dhcp scope link src 192.168.5.[0-9]* metric 1024')
5868
5869 # Check UseGateway=
5870 if use_gateway and (not classless or not use_routes):
5871 self.assertRegex(output, r'default via 192.168.5.1 proto dhcp src 192.168.5.[0-9]* metric 1024')
5872 else:
5873 self.assertNotRegex(output, r'default via 192.168.5.1 proto dhcp src 192.168.5.[0-9]* metric 1024')
5874
5875 # Check route to gateway
5876 if (use_gateway or dns_and_ntp_routes) and (not classless or not use_routes):
5877 self.assertRegex(output, r'192.168.5.1 proto dhcp scope link src 192.168.5.[0-9]* metric 1024')
5878 else:
5879 self.assertNotRegex(output, r'192.168.5.1 proto dhcp scope link src 192.168.5.[0-9]* metric 1024')
5880
5881 # Check RoutesToDNS= and RoutesToNTP=
5882 if dns_and_ntp_routes:
5883 self.assertRegex(output, r'192.168.5.10 proto dhcp scope link src 192.168.5.[0-9]* metric 1024')
5884 self.assertRegex(output, r'192.168.5.11 proto dhcp scope link src 192.168.5.[0-9]* metric 1024')
5885 if use_routes:
5886 if classless:
5887 self.assertRegex(output, r'8.8.8.8 via 192.168.5.5 proto dhcp src 192.168.5.[0-9]* metric 1024')
5888 self.assertRegex(output, r'9.9.9.9 via 192.168.5.4 proto dhcp src 192.168.5.[0-9]* metric 1024')
5889 else:
5890 self.assertRegex(output, r'8.8.8.8 via 192.168.5.3 proto dhcp src 192.168.5.[0-9]* metric 1024')
5891 self.assertRegex(output, r'9.9.9.9 via 192.168.5.1 proto dhcp src 192.168.5.[0-9]* metric 1024')
5892 else:
5893 self.assertRegex(output, r'8.8.8.8 via 192.168.5.1 proto dhcp src 192.168.5.[0-9]* metric 1024')
5894 self.assertRegex(output, r'9.9.9.9 via 192.168.5.1 proto dhcp src 192.168.5.[0-9]* metric 1024')
5895 else:
5896 self.assertNotRegex(output, r'192.168.5.10 proto dhcp scope link src 192.168.5.[0-9]* metric 1024')
5897 self.assertNotRegex(output, r'192.168.5.11 proto dhcp scope link src 192.168.5.[0-9]* metric 1024')
5898 self.assertNotRegex(output, r'8.8.8.8 via 192.168.5.[0-9]* proto dhcp src 192.168.5.[0-9]* metric 1024')
5899 self.assertNotRegex(output, r'9.9.9.9 via 192.168.5.[0-9]* proto dhcp src 192.168.5.[0-9]* metric 1024')
5900
5901 output = check_output(*networkctl_cmd, '--json=short', 'status', env=env)
5902 check_json(output)
5903
5904 def test_dhcp_client_settings_anonymize(self):
5905 copy_network_unit('25-veth.netdev', '25-dhcp-server-veth-peer.network', '25-dhcp-client-anonymize.network')
5906 start_networkd()
5907 self.wait_online(['veth-peer:carrier'])
5908 start_dnsmasq()
5909 self.wait_online(['veth99:routable', 'veth-peer:routable'])
5910
5911 print('## dnsmasq log')
5912 output = read_dnsmasq_log_file()
5913 print(output)
5914 self.assertNotIn('VendorClassIdentifier=SusantVendorTest', output)
5915 self.assertNotIn('test-hostname', output)
5916 self.assertNotIn('26:mtu', output)
5917
5918 def test_dhcp_keep_configuration_dhcp(self):
5919 copy_network_unit('25-veth.netdev',
5920 '25-dhcp-server-veth-peer.network',
5921 '25-dhcp-client-keep-configuration-dhcp.network')
5922 start_networkd()
5923 self.wait_online(['veth-peer:carrier'])
5924 start_dnsmasq()
5925 self.wait_online(['veth99:routable', 'veth-peer:routable'])
5926
5927 output = check_output('ip address show dev veth99 scope global')
5928 print(output)
5929 self.assertRegex(output, r'inet 192.168.5.[0-9]*/24 metric 1024 brd 192.168.5.255 scope global veth99\n *'
5930 'valid_lft forever preferred_lft forever')
5931
5932 # Stopping dnsmasq as networkd won't be allowed to renew the DHCP lease.
5933 stop_dnsmasq()
5934
5935 # Sleep for 120 sec as the dnsmasq minimum lease time can only be set to 120
5936 print('Wait for the DHCP lease to be expired')
5937 time.sleep(120)
5938
5939 # The lease address should be kept after the lease expired
5940 output = check_output('ip address show dev veth99 scope global')
5941 print(output)
5942 self.assertRegex(output, r'inet 192.168.5.[0-9]*/24 metric 1024 brd 192.168.5.255 scope global veth99\n *'
5943 'valid_lft forever preferred_lft forever')
5944
5945 stop_networkd()
5946
5947 # The lease address should be kept after networkd stopped
5948 output = check_output('ip address show dev veth99 scope global')
5949 print(output)
5950 self.assertRegex(output, r'inet 192.168.5.[0-9]*/24 metric 1024 brd 192.168.5.255 scope global veth99\n *'
5951 'valid_lft forever preferred_lft forever')
5952
5953 with open(os.path.join(network_unit_dir, '25-dhcp-client-keep-configuration-dhcp.network'), mode='a', encoding='utf-8') as f:
5954 f.write('[Network]\nDHCP=no\n')
5955
5956 start_networkd()
5957 self.wait_online(['veth99:routable', 'veth-peer:routable'])
5958
5959 # Still the lease address should be kept after networkd restarted
5960 output = check_output('ip address show dev veth99 scope global')
5961 print(output)
5962 self.assertRegex(output, r'inet 192.168.5.[0-9]*/24 metric 1024 brd 192.168.5.255 scope global veth99\n *'
5963 'valid_lft forever preferred_lft forever')
5964
5965 def test_dhcp_keep_configuration_dhcp_on_stop(self):
5966 copy_network_unit('25-veth.netdev',
5967 '25-dhcp-server-veth-peer.network',
5968 '25-dhcp-client-keep-configuration-dhcp-on-stop.network')
5969 start_networkd()
5970 self.wait_online(['veth-peer:carrier'])
5971 start_dnsmasq()
5972 self.wait_online(['veth99:routable', 'veth-peer:routable'])
5973
5974 output = check_output('ip address show dev veth99 scope global')
5975 print(output)
5976 self.assertRegex(output, r'inet 192.168.5.[0-9]*/24 metric 1024 brd 192.168.5.255 scope global dynamic veth99')
5977
5978 stop_dnsmasq()
5979 stop_networkd()
5980
5981 output = check_output('ip address show dev veth99 scope global')
5982 print(output)
5983 self.assertRegex(output, r'inet 192.168.5.[0-9]*/24 metric 1024 brd 192.168.5.255 scope global dynamic veth99')
5984
5985 start_networkd()
5986 self.wait_online(['veth-peer:routable'])
5987
5988 output = check_output('ip address show dev veth99 scope global')
5989 print(output)
5990 self.assertNotIn('192.168.5.', output)
5991
5992 def test_dhcp_client_reuse_address_as_static(self):
5993 copy_network_unit('25-veth.netdev', '25-dhcp-server-veth-peer.network', '25-dhcp-client.network')
5994 start_networkd()
5995 self.wait_online(['veth-peer:carrier'])
5996 start_dnsmasq()
5997 self.wait_online(['veth99:routable', 'veth-peer:routable'])
5998
5999 # link become 'routable' when at least one protocol provide an valid address.
6000 self.wait_address('veth99', r'inet 192.168.5.[0-9]*/24 metric 1024 brd 192.168.5.255 scope global dynamic', ipv='-4')
6001 self.wait_address('veth99', r'inet6 2600::[0-9a-f]*/128 scope global (dynamic noprefixroute|noprefixroute dynamic)', ipv='-6')
6002
6003 output = check_output('ip address show dev veth99 scope global')
6004 ipv4_address = re.search(r'192.168.5.[0-9]*/24', output).group()
6005 ipv6_address = re.search(r'2600::[0-9a-f:]*/128', output).group()
6006 static_network = '\n'.join(['[Match]', 'Name=veth99', '[Network]', 'IPv6AcceptRA=no', 'Address=' + ipv4_address, 'Address=' + ipv6_address])
6007 print(static_network)
6008
6009 remove_network_unit('25-dhcp-client.network')
6010
6011 with open(os.path.join(network_unit_dir, '25-static.network'), mode='w', encoding='utf-8') as f:
6012 f.write(static_network)
6013
6014 restart_networkd()
6015 self.wait_online(['veth99:routable'])
6016
6017 output = check_output('ip -4 address show dev veth99 scope global')
6018 print(output)
6019 self.assertRegex(output, f'inet {ipv4_address} brd 192.168.5.255 scope global veth99\n *'
6020 'valid_lft forever preferred_lft forever')
6021
6022 output = check_output('ip -6 address show dev veth99 scope global')
6023 print(output)
6024 self.assertRegex(output, f'inet6 {ipv6_address} scope global *\n *'
6025 'valid_lft forever preferred_lft forever')
6026
6027 @expectedFailureIfModuleIsNotAvailable('vrf')
6028 def test_dhcp_client_vrf(self):
6029 copy_network_unit('25-veth.netdev', '25-dhcp-server-veth-peer.network', '25-dhcp-client-vrf.network',
6030 '25-vrf.netdev', '25-vrf.network')
6031 start_networkd()
6032 self.wait_online(['veth-peer:carrier'])
6033 start_dnsmasq()
6034 self.wait_online(['veth99:routable', 'veth-peer:routable', 'vrf99:carrier'])
6035
6036 # link become 'routable' when at least one protocol provide an valid address.
6037 self.wait_address('veth99', r'inet 192.168.5.[0-9]*/24 metric 1024 brd 192.168.5.255 scope global dynamic', ipv='-4')
6038 self.wait_address('veth99', r'inet6 2600::[0-9a-f]*/128 scope global (dynamic noprefixroute|noprefixroute dynamic)', ipv='-6')
6039
6040 print('## ip -d link show dev vrf99')
6041 output = check_output('ip -d link show dev vrf99')
6042 print(output)
6043 self.assertRegex(output, 'vrf table 42')
6044
6045 print('## ip address show vrf vrf99')
6046 output = check_output('ip address show vrf vrf99')
6047 print(output)
6048 self.assertRegex(output, 'inet 192.168.5.[0-9]*/24 metric 1024 brd 192.168.5.255 scope global dynamic veth99')
6049 self.assertRegex(output, 'inet6 2600::[0-9a-f]*/128 scope global (dynamic noprefixroute|noprefixroute dynamic)')
6050 self.assertRegex(output, 'inet6 .* scope link')
6051
6052 print('## ip address show dev veth99')
6053 output = check_output('ip address show dev veth99')
6054 print(output)
6055 self.assertRegex(output, 'inet 192.168.5.[0-9]*/24 metric 1024 brd 192.168.5.255 scope global dynamic veth99')
6056 self.assertRegex(output, 'inet6 2600::[0-9a-f]*/128 scope global (dynamic noprefixroute|noprefixroute dynamic)')
6057 self.assertRegex(output, 'inet6 .* scope link')
6058
6059 print('## ip route show vrf vrf99')
6060 output = check_output('ip route show vrf vrf99')
6061 print(output)
6062 self.assertRegex(output, 'default via 192.168.5.1 dev veth99 proto dhcp src 192.168.5.')
6063 self.assertRegex(output, '192.168.5.0/24 dev veth99 proto kernel scope link src 192.168.5')
6064 self.assertRegex(output, '192.168.5.1 dev veth99 proto dhcp scope link src 192.168.5')
6065
6066 print('## ip route show table main dev veth99')
6067 output = check_output('ip route show table main dev veth99')
6068 print(output)
6069 self.assertEqual(output, '')
6070
6071 def test_dhcp_client_gateway_onlink_implicit(self):
6072 copy_network_unit('25-veth.netdev', '25-dhcp-server-veth-peer.network',
6073 '25-dhcp-client-gateway-onlink-implicit.network')
6074 start_networkd()
6075 self.wait_online(['veth-peer:carrier'])
6076 start_dnsmasq()
6077 self.wait_online(['veth99:routable', 'veth-peer:routable'])
6078
6079 output = check_output(*networkctl_cmd, '-n', '0', 'status', 'veth99', env=env)
6080 print(output)
6081 self.assertRegex(output, '192.168.5')
6082
6083 output = check_output('ip route list dev veth99 10.0.0.0/8')
6084 print(output)
6085 self.assertRegex(output, 'onlink')
6086 output = check_output('ip route list dev veth99 192.168.100.0/24')
6087 print(output)
6088 self.assertRegex(output, 'onlink')
6089
6090 def test_dhcp_client_with_ipv4ll(self):
6091 copy_network_unit('25-veth.netdev', '25-dhcp-server-veth-peer.network',
6092 '25-dhcp-client-with-ipv4ll.network')
6093 start_networkd()
6094 # we need to increase timeout above default, as this will need to wait for
6095 # systemd-networkd to get the dhcpv4 transient failure event
6096 self.wait_online(['veth99:degraded', 'veth-peer:routable'], timeout='60s')
6097
6098 output = check_output('ip -4 address show dev veth99')
6099 print(output)
6100 self.assertNotIn('192.168.5.', output)
6101 self.assertIn('inet 169.254.133.11/16 metric 2048 brd 169.254.255.255 scope link', output)
6102
6103 start_dnsmasq()
6104 print('Wait for a DHCP lease to be acquired and the IPv4LL address to be dropped')
6105 self.wait_address('veth99', r'inet 192\.168\.5\.\d+/24 metric 1024 brd 192\.168\.5\.255 scope global dynamic', ipv='-4')
6106 self.wait_address_dropped('veth99', r'inet 169\.254\.\d+\.\d+/16 metric 2048 brd 169\.254\.255\.255 scope link', scope='link', ipv='-4')
6107 self.wait_online(['veth99:routable'])
6108
6109 output = check_output('ip -4 address show dev veth99')
6110 print(output)
6111 self.assertRegex(output, r'inet 192\.168\.5\.\d+/24 metric 1024 brd 192\.168\.5\.255 scope global dynamic veth99')
6112 self.assertNotIn('169.254.', output)
6113 self.assertNotIn('scope link', output)
6114
6115 stop_dnsmasq()
6116 print('Wait for the DHCP lease to be expired and an IPv4LL address to be acquired')
6117 self.wait_address_dropped('veth99', r'inet 192\.168\.5\.\d+/24 metric 1024 brd 192\.168\.5\.255 scope global dynamic', ipv='-4', timeout_sec=130)
6118 self.wait_address('veth99', r'inet 169\.254\.133\.11/16 metric 2048 brd 169\.254\.255\.255 scope link', scope='link', ipv='-4')
6119
6120 output = check_output('ip -4 address show dev veth99')
6121 print(output)
6122 self.assertNotIn('192.168.5.', output)
6123 self.assertIn('inet 169.254.133.11/16 metric 2048 brd 169.254.255.255 scope link', output)
6124
6125 def test_dhcp_client_use_dns(self):
6126 def check(self, ipv4, ipv6):
6127 os.makedirs(os.path.join(network_unit_dir, '25-dhcp-client.network.d'), exist_ok=True)
6128 with open(os.path.join(network_unit_dir, '25-dhcp-client.network.d/override.conf'), mode='w', encoding='utf-8') as f:
6129 f.write('[DHCPv4]\nUseDNS=')
6130 f.write('yes' if ipv4 else 'no')
6131 f.write('\n[DHCPv6]\nUseDNS=')
6132 f.write('yes' if ipv6 else 'no')
6133 f.write('\n[IPv6AcceptRA]\nUseDNS=no')
6134
6135 networkctl_reload()
6136 self.wait_online(['veth99:routable'])
6137
6138 # link becomes 'routable' when at least one protocol provide an valid address. Hence, we need to explicitly wait for both addresses.
6139 self.wait_address('veth99', r'inet 192.168.5.[0-9]*/24 metric 1024 brd 192.168.5.255 scope global dynamic', ipv='-4')
6140 self.wait_address('veth99', r'inet6 2600::[0-9a-f]*/128 scope global (dynamic noprefixroute|noprefixroute dynamic)', ipv='-6')
6141
6142 # make resolved re-read the link state file
6143 check_output(*resolvectl_cmd, 'revert', 'veth99', env=env)
6144
6145 output = check_output(*resolvectl_cmd, 'dns', 'veth99', env=env)
6146 print(output)
6147 if ipv4:
6148 self.assertIn('192.168.5.1', output)
6149 else:
6150 self.assertNotIn('192.168.5.1', output)
6151 if ipv6:
6152 self.assertIn('2600::1', output)
6153 else:
6154 self.assertNotIn('2600::1', output)
6155
6156 output = check_output(*networkctl_cmd, '--json=short', 'status', env=env)
6157 check_json(output)
6158
6159 copy_network_unit('25-veth.netdev', '25-dhcp-server-veth-peer.network', '25-dhcp-client.network', copy_dropins=False)
6160
6161 start_networkd()
6162 self.wait_online(['veth-peer:carrier'])
6163 start_dnsmasq('--dhcp-option=option:dns-server,192.168.5.1',
6164 '--dhcp-option=option6:dns-server,[2600::1]')
6165
6166 check(self, True, True)
6167 check(self, True, False)
6168 check(self, False, True)
6169 check(self, False, False)
6170
6171 def test_dhcp_client_use_captive_portal(self):
6172 def check(self, ipv4, ipv6):
6173 os.makedirs(os.path.join(network_unit_dir, '25-dhcp-client.network.d'), exist_ok=True)
6174 with open(os.path.join(network_unit_dir, '25-dhcp-client.network.d/override.conf'), mode='w', encoding='utf-8') as f:
6175 f.write('[DHCPv4]\nUseCaptivePortal=')
6176 f.write('yes' if ipv4 else 'no')
6177 f.write('\n[DHCPv6]\nUseCaptivePortal=')
6178 f.write('yes' if ipv6 else 'no')
6179 f.write('\n[IPv6AcceptRA]\nUseCaptivePortal=no')
6180
6181 networkctl_reload()
6182 self.wait_online(['veth99:routable'])
6183
6184 # link becomes 'routable' when at least one protocol provide an valid address. Hence, we need to explicitly wait for both addresses.
6185 self.wait_address('veth99', r'inet 192.168.5.[0-9]*/24 metric 1024 brd 192.168.5.255 scope global dynamic', ipv='-4')
6186 self.wait_address('veth99', r'inet6 2600::[0-9a-f]*/128 scope global (dynamic noprefixroute|noprefixroute dynamic)', ipv='-6')
6187
6188 output = check_output(*networkctl_cmd, 'status', 'veth99', env=env)
6189 print(output)
6190 if ipv4 or ipv6:
6191 self.assertIn('Captive Portal: http://systemd.io', output)
6192 else:
6193 self.assertNotIn('Captive Portal: http://systemd.io', output)
6194
6195 output = check_output(*networkctl_cmd, '--json=short', 'status', env=env)
6196 check_json(output)
6197
6198 copy_network_unit('25-veth.netdev', '25-dhcp-server-veth-peer.network', '25-dhcp-client.network', copy_dropins=False)
6199
6200 start_networkd()
6201 self.wait_online(['veth-peer:carrier'])
6202 start_dnsmasq('--dhcp-option=114,http://systemd.io',
6203 '--dhcp-option=option6:103,http://systemd.io')
6204
6205 check(self, True, True)
6206 check(self, True, False)
6207 check(self, False, True)
6208 check(self, False, False)
6209
6210 def test_dhcp_client_reject_captive_portal(self):
6211 def check(self, ipv4, ipv6):
6212 os.makedirs(os.path.join(network_unit_dir, '25-dhcp-client.network.d'), exist_ok=True)
6213 with open(os.path.join(network_unit_dir, '25-dhcp-client.network.d/override.conf'), mode='w', encoding='utf-8') as f:
6214 f.write('[DHCPv4]\nUseCaptivePortal=')
6215 f.write('yes' if ipv4 else 'no')
6216 f.write('\n[DHCPv6]\nUseCaptivePortal=')
6217 f.write('yes' if ipv6 else 'no')
6218 f.write('\n[IPv6AcceptRA]\nUseCaptivePortal=no')
6219
6220 networkctl_reload()
6221 self.wait_online(['veth99:routable'])
6222
6223 # link becomes 'routable' when at least one protocol provide an valid address. Hence, we need to explicitly wait for both addresses.
6224 self.wait_address('veth99', r'inet 192.168.5.[0-9]*/24 metric 1024 brd 192.168.5.255 scope global dynamic', ipv='-4')
6225 self.wait_address('veth99', r'inet6 2600::[0-9a-f]*/128 scope global (dynamic noprefixroute|noprefixroute dynamic)', ipv='-6')
6226
6227 output = check_output(*networkctl_cmd, 'status', 'veth99', env=env)
6228 print(output)
6229 self.assertNotIn('Captive Portal: ', output)
6230 self.assertNotIn('invalid/url', output)
6231
6232 output = check_output(*networkctl_cmd, '--json=short', 'status', env=env)
6233 check_json(output)
6234
6235 copy_network_unit('25-veth.netdev', '25-dhcp-server-veth-peer.network', '25-dhcp-client.network', copy_dropins=False)
6236
6237 start_networkd()
6238 self.wait_online(['veth-peer:carrier'])
6239 masq = lambda bs: ':'.join(f'{b:02x}' for b in bs)
6240 start_dnsmasq('--dhcp-option=114,' + masq(b'http://\x00invalid/url'),
6241 '--dhcp-option=option6:103,' + masq(b'http://\x00/invalid/url'))
6242
6243 check(self, True, True)
6244 check(self, True, False)
6245 check(self, False, True)
6246 check(self, False, False)
6247
6248 class NetworkdDHCPPDTests(unittest.TestCase, Utilities):
6249
6250 def setUp(self):
6251 setup_common()
6252
6253 def tearDown(self):
6254 tear_down_common()
6255
6256 def test_dhcp6pd(self):
6257 def get_dhcp6_prefix(link):
6258 description = get_link_description(link)
6259
6260 self.assertIn('DHCPv6Client', description.keys())
6261 self.assertIn('Prefixes', description['DHCPv6Client'])
6262
6263 prefixInfo = description['DHCPv6Client']['Prefixes']
6264
6265 return prefixInfo
6266
6267 copy_network_unit('25-veth.netdev', '25-dhcp6pd-server.network', '25-dhcp6pd-upstream.network',
6268 '25-veth-downstream-veth97.netdev', '25-dhcp-pd-downstream-veth97.network', '25-dhcp-pd-downstream-veth97-peer.network',
6269 '25-veth-downstream-veth98.netdev', '25-dhcp-pd-downstream-veth98.network', '25-dhcp-pd-downstream-veth98-peer.network',
6270 '11-dummy.netdev', '25-dhcp-pd-downstream-test1.network',
6271 '25-dhcp-pd-downstream-dummy97.network',
6272 '12-dummy.netdev', '25-dhcp-pd-downstream-dummy98.network',
6273 '13-dummy.netdev', '25-dhcp-pd-downstream-dummy99.network',
6274 copy_dropins=False)
6275
6276 self.setup_nftset('addr6', 'ipv6_addr')
6277 self.setup_nftset('network6', 'ipv6_addr', 'flags interval;')
6278 self.setup_nftset('ifindex', 'iface_index')
6279
6280 start_networkd()
6281 self.wait_online(['veth-peer:routable'])
6282 start_isc_dhcpd(conf_file='isc-dhcpd-dhcp6pd.conf', ipv='-6')
6283 self.wait_online(['veth99:degraded'])
6284
6285 # First, test UseAddress=no and Assign=no (issue #29979).
6286 # Note, due to the bug #29701, this test must be done at first.
6287 print('### ip -6 address show dev veth99 scope global')
6288 output = check_output('ip -6 address show dev veth99 scope global')
6289 print(output)
6290 self.assertNotIn('inet6 3ffe:501:ffff', output)
6291
6292 # Check DBus assigned prefix information to veth99
6293 prefixInfo = get_dhcp6_prefix('veth99')
6294
6295 self.assertEqual(len(prefixInfo), 1)
6296 prefixInfo = prefixInfo[0]
6297
6298 self.assertIn('Prefix', prefixInfo.keys())
6299 self.assertIn('PrefixLength', prefixInfo.keys())
6300 self.assertIn('PreferredLifetimeUSec', prefixInfo.keys())
6301 self.assertIn('ValidLifetimeUSec', prefixInfo.keys())
6302
6303 self.assertEqual(prefixInfo['Prefix'][0:6], [63, 254, 5, 1, 255, 255])
6304 self.assertEqual(prefixInfo['PrefixLength'], 56)
6305 self.assertGreater(prefixInfo['PreferredLifetimeUSec'], 0)
6306 self.assertGreater(prefixInfo['ValidLifetimeUSec'], 0)
6307
6308 copy_network_unit('25-dhcp6pd-upstream.network.d/with-address.conf')
6309 networkctl_reload()
6310 self.wait_online(['veth99:routable', 'test1:routable', 'dummy98:routable', 'dummy99:degraded',
6311 'veth97:routable', 'veth97-peer:routable', 'veth98:routable', 'veth98-peer:routable'])
6312
6313 print('### ip -6 address show dev veth-peer scope global')
6314 output = check_output('ip -6 address show dev veth-peer scope global')
6315 print(output)
6316 self.assertIn('inet6 3ffe:501:ffff:100::1/64 scope global', output)
6317
6318 # Link Subnet IDs
6319 # test1: 0x00
6320 # dummy97: 0x01 (The link will appear later)
6321 # dummy98: 0x00
6322 # dummy99: auto -> 0x02 (No address assignment)
6323 # veth97: 0x08
6324 # veth98: 0x09
6325 # veth99: 0x10
6326
6327 print('### ip -6 address show dev veth99 scope global')
6328 output = check_output('ip -6 address show dev veth99 scope global')
6329 print(output)
6330 # IA_NA
6331 self.assertRegex(output, 'inet6 3ffe:501:ffff:100::[0-9]*/128 scope global (dynamic noprefixroute|noprefixroute dynamic)')
6332 # address in IA_PD (Token=static)
6333 self.assertRegex(output, 'inet6 3ffe:501:ffff:[2-9a-f]10:1a:2b:3c:4d/64 (metric 256 |)scope global dynamic')
6334 # address in IA_PD (Token=eui64)
6335 self.assertRegex(output, 'inet6 3ffe:501:ffff:[2-9a-f]10:1034:56ff:fe78:9abc/64 (metric 256 |)scope global dynamic')
6336 # address in IA_PD (temporary)
6337 # Note that the temporary addresses may appear after the link enters configured state
6338 self.wait_address('veth99', 'inet6 3ffe:501:ffff:[2-9a-f]10:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*/64 (metric 256 |)scope global temporary dynamic', ipv='-6')
6339
6340 print('### ip -6 address show dev test1 scope global')
6341 output = check_output('ip -6 address show dev test1 scope global')
6342 print(output)
6343 # address in IA_PD (Token=static)
6344 self.assertRegex(output, 'inet6 3ffe:501:ffff:[2-9a-f]00:1a:2b:3c:4d/64 (metric 256 |)scope global dynamic mngtmpaddr')
6345 # address in IA_PD (temporary)
6346 self.wait_address('test1', 'inet6 3ffe:501:ffff:[2-9a-f]00:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*/64 (metric 256 |)scope global temporary dynamic', ipv='-6')
6347
6348 print('### ip -6 address show dev dummy98 scope global')
6349 output = check_output('ip -6 address show dev dummy98 scope global')
6350 print(output)
6351 # address in IA_PD (Token=static)
6352 self.assertRegex(output, 'inet6 3ffe:501:ffff:[2-9a-f]00:1a:2b:3c:4d/64 (metric 256 |)scope global dynamic mngtmpaddr')
6353 # address in IA_PD (temporary)
6354 self.wait_address('dummy98', 'inet6 3ffe:501:ffff:[2-9a-f]00:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*/64 (metric 256 |)scope global temporary dynamic', ipv='-6')
6355
6356 print('### ip -6 address show dev dummy99 scope global')
6357 output = check_output('ip -6 address show dev dummy99 scope global')
6358 print(output)
6359 # Assign=no
6360 self.assertNotRegex(output, 'inet6 3ffe:501:ffff:[2-9a-f]02')
6361
6362 print('### ip -6 address show dev veth97 scope global')
6363 output = check_output('ip -6 address show dev veth97 scope global')
6364 print(output)
6365 # address in IA_PD (Token=static)
6366 self.assertRegex(output, 'inet6 3ffe:501:ffff:[2-9a-f]08:1a:2b:3c:4d/64 (metric 256 |)scope global dynamic mngtmpaddr')
6367 # address in IA_PD (Token=eui64)
6368 self.assertRegex(output, 'inet6 3ffe:501:ffff:[2-9a-f]08:1034:56ff:fe78:9ace/64 (metric 256 |)scope global dynamic mngtmpaddr')
6369 # address in IA_PD (temporary)
6370 self.wait_address('veth97', 'inet6 3ffe:501:ffff:[2-9a-f]08:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*/64 (metric 256 |)scope global temporary dynamic', ipv='-6')
6371
6372 print('### ip -6 address show dev veth97-peer scope global')
6373 output = check_output('ip -6 address show dev veth97-peer scope global')
6374 print(output)
6375 # NDisc address (Token=static)
6376 self.assertRegex(output, 'inet6 3ffe:501:ffff:[2-9a-f]08:1a:2b:3c:4e/64 (metric 256 |)scope global dynamic mngtmpaddr')
6377 # NDisc address (Token=eui64)
6378 self.assertRegex(output, 'inet6 3ffe:501:ffff:[2-9a-f]08:1034:56ff:fe78:9acf/64 (metric 256 |)scope global dynamic mngtmpaddr')
6379 # NDisc address (temporary)
6380 self.wait_address('veth97-peer', 'inet6 3ffe:501:ffff:[2-9a-f]08:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*/64 (metric 256 |)scope global temporary dynamic', ipv='-6')
6381
6382 print('### ip -6 address show dev veth98 scope global')
6383 output = check_output('ip -6 address show dev veth98 scope global')
6384 print(output)
6385 # address in IA_PD (Token=static)
6386 self.assertRegex(output, 'inet6 3ffe:501:ffff:[2-9a-f]09:1a:2b:3c:4d/64 (metric 256 |)scope global dynamic mngtmpaddr')
6387 # address in IA_PD (Token=eui64)
6388 self.assertRegex(output, 'inet6 3ffe:501:ffff:[2-9a-f]09:1034:56ff:fe78:9abe/64 (metric 256 |)scope global dynamic mngtmpaddr')
6389 # address in IA_PD (temporary)
6390 self.wait_address('veth98', 'inet6 3ffe:501:ffff:[2-9a-f]09:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*/64 (metric 256 |)scope global temporary dynamic', ipv='-6')
6391
6392 print('### ip -6 address show dev veth98-peer scope global')
6393 output = check_output('ip -6 address show dev veth98-peer scope global')
6394 print(output)
6395 # NDisc address (Token=static)
6396 self.assertRegex(output, 'inet6 3ffe:501:ffff:[2-9a-f]09:1a:2b:3c:4e/64 (metric 256 |)scope global dynamic mngtmpaddr')
6397 # NDisc address (Token=eui64)
6398 self.assertRegex(output, 'inet6 3ffe:501:ffff:[2-9a-f]09:1034:56ff:fe78:9abf/64 (metric 256 |)scope global dynamic mngtmpaddr')
6399 # NDisc address (temporary)
6400 self.wait_address('veth98-peer', 'inet6 3ffe:501:ffff:[2-9a-f]09:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*/64 (metric 256 |)scope global temporary dynamic', ipv='-6')
6401
6402 print('### ip -6 route show type unreachable')
6403 output = check_output('ip -6 route show type unreachable')
6404 print(output)
6405 self.assertRegex(output, 'unreachable 3ffe:501:ffff:[2-9a-f]00::/56 dev lo proto dhcp')
6406
6407 print('### ip -6 route show dev veth99')
6408 output = check_output('ip -6 route show dev veth99')
6409 print(output)
6410 self.assertRegex(output, '3ffe:501:ffff:[2-9a-f]10::/64 proto kernel metric [0-9]* expires')
6411
6412 print('### ip -6 route show dev test1')
6413 output = check_output('ip -6 route show dev test1')
6414 print(output)
6415 self.assertRegex(output, '3ffe:501:ffff:[2-9a-f]00::/64 proto kernel metric [0-9]* expires')
6416
6417 print('### ip -6 route show dev dummy98')
6418 output = check_output('ip -6 route show dev dummy98')
6419 print(output)
6420 self.assertRegex(output, '3ffe:501:ffff:[2-9a-f]00::/64 proto kernel metric [0-9]* expires')
6421
6422 print('### ip -6 route show dev dummy99')
6423 output = check_output('ip -6 route show dev dummy99')
6424 print(output)
6425 self.assertRegex(output, '3ffe:501:ffff:[2-9a-f]02::/64 proto dhcp metric [0-9]* expires')
6426
6427 print('### ip -6 route show dev veth97')
6428 output = check_output('ip -6 route show dev veth97')
6429 print(output)
6430 self.assertRegex(output, '3ffe:501:ffff:[2-9a-f]08::/64 proto kernel metric [0-9]* expires')
6431
6432 print('### ip -6 route show dev veth97-peer')
6433 output = check_output('ip -6 route show dev veth97-peer')
6434 print(output)
6435 self.assertRegex(output, '3ffe:501:ffff:[2-9a-f]08::/64 proto ra metric [0-9]* expires')
6436
6437 print('### ip -6 route show dev veth98')
6438 output = check_output('ip -6 route show dev veth98')
6439 print(output)
6440 self.assertRegex(output, '3ffe:501:ffff:[2-9a-f]09::/64 proto kernel metric [0-9]* expires')
6441
6442 print('### ip -6 route show dev veth98-peer')
6443 output = check_output('ip -6 route show dev veth98-peer')
6444 print(output)
6445 self.assertRegex(output, '3ffe:501:ffff:[2-9a-f]09::/64 proto ra metric [0-9]* expires')
6446
6447 # Test case for a downstream which appears later
6448 check_output('ip link add dummy97 type dummy')
6449 self.wait_online(['dummy97:routable'])
6450
6451 print('### ip -6 address show dev dummy97 scope global')
6452 output = check_output('ip -6 address show dev dummy97 scope global')
6453 print(output)
6454 # address in IA_PD (Token=static)
6455 self.assertRegex(output, 'inet6 3ffe:501:ffff:[2-9a-f]01:1a:2b:3c:4d/64 (metric 256 |)scope global dynamic mngtmpaddr')
6456 # address in IA_PD (temporary)
6457 self.wait_address('dummy97', 'inet6 3ffe:501:ffff:[2-9a-f]01:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*/64 (metric 256 |)scope global temporary dynamic', ipv='-6')
6458
6459 print('### ip -6 route show dev dummy97')
6460 output = check_output('ip -6 route show dev dummy97')
6461 print(output)
6462 self.assertRegex(output, '3ffe:501:ffff:[2-9a-f]01::/64 proto kernel metric [0-9]* expires')
6463
6464 # Test case for reconfigure
6465 networkctl_reconfigure('dummy98', 'dummy99')
6466 self.wait_online(['dummy98:routable', 'dummy99:degraded'])
6467
6468 print('### ip -6 address show dev dummy98 scope global')
6469 output = check_output('ip -6 address show dev dummy98 scope global')
6470 print(output)
6471 # address in IA_PD (Token=static)
6472 self.assertRegex(output, 'inet6 3ffe:501:ffff:[2-9a-f]00:1a:2b:3c:4d/64 (metric 256 |)scope global dynamic mngtmpaddr')
6473 # address in IA_PD (temporary)
6474 self.wait_address('dummy98', 'inet6 3ffe:501:ffff:[2-9a-f]00:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*/64 (metric 256 |)scope global temporary dynamic', ipv='-6')
6475
6476 print('### ip -6 address show dev dummy99 scope global')
6477 output = check_output('ip -6 address show dev dummy99 scope global')
6478 print(output)
6479 # Assign=no
6480 self.assertNotRegex(output, 'inet6 3ffe:501:ffff:[2-9a-f]02')
6481
6482 print('### ip -6 route show dev dummy98')
6483 output = check_output('ip -6 route show dev dummy98')
6484 print(output)
6485 self.assertRegex(output, '3ffe:501:ffff:[2-9a-f]00::/64 proto kernel metric [0-9]* expires')
6486
6487 print('### ip -6 route show dev dummy99')
6488 output = check_output('ip -6 route show dev dummy99')
6489 print(output)
6490 self.assertRegex(output, '3ffe:501:ffff:[2-9a-f]02::/64 proto dhcp metric [0-9]* expires')
6491
6492 self.check_netlabel('dummy98', '3ffe:501:ffff:[2-9a-f]00::/64')
6493
6494 self.check_nftset('addr6', '3ffe:501:ffff:[2-9a-f]00:1a:2b:3c:4d')
6495 self.check_nftset('addr6', '3ffe:501:ffff:[2-9a-f]00:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*')
6496 self.check_nftset('network6', '3ffe:501:ffff:[2-9a-f]00::/64')
6497 self.check_nftset('ifindex', 'dummy98')
6498
6499 self.teardown_nftset('addr6', 'network6', 'ifindex')
6500
6501 def verify_dhcp4_6rd(self, tunnel_name):
6502 print('### ip -4 address show dev veth-peer scope global')
6503 output = check_output('ip -4 address show dev veth-peer scope global')
6504 print(output)
6505 self.assertIn('inet 10.0.0.1/8 brd 10.255.255.255 scope global veth-peer', output)
6506
6507 # Link Subnet IDs
6508 # test1: 0x00
6509 # dummy97: 0x01 (The link will appear later)
6510 # dummy98: 0x00
6511 # dummy99: auto -> 0x0[23] (No address assignment)
6512 # 6rd-XXX: auto -> 0x0[23]
6513 # veth97: 0x08
6514 # veth98: 0x09
6515 # veth99: 0x10
6516
6517 print('### ip -4 address show dev veth99 scope global')
6518 output = check_output('ip -4 address show dev veth99 scope global')
6519 print(output)
6520 self.assertRegex(output, 'inet 10.100.100.[0-9]*/8 (metric 1024 |)brd 10.255.255.255 scope global dynamic veth99')
6521
6522 print('### ip -6 address show dev veth99 scope global')
6523 output = check_output('ip -6 address show dev veth99 scope global')
6524 print(output)
6525 # address in IA_PD (Token=static)
6526 self.assertRegex(output, 'inet6 2001:db8:6464:[0-9a-f]+10:1a:2b:3c:4d/64 (metric 256 |)scope global dynamic mngtmpaddr')
6527 # address in IA_PD (Token=eui64)
6528 self.assertRegex(output, 'inet6 2001:db8:6464:[0-9a-f]+10:1034:56ff:fe78:9abc/64 (metric 256 |)scope global dynamic mngtmpaddr')
6529 # address in IA_PD (temporary)
6530 # Note that the temporary addresses may appear after the link enters configured state
6531 self.wait_address('veth99', 'inet6 2001:db8:6464:[0-9a-f]+10:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*/64 (metric 256 |)scope global temporary dynamic', ipv='-6')
6532
6533 print('### ip -6 address show dev test1 scope global')
6534 output = check_output('ip -6 address show dev test1 scope global')
6535 print(output)
6536 # address in IA_PD (Token=static)
6537 self.assertRegex(output, 'inet6 2001:db8:6464:[0-9a-f]+00:1a:2b:3c:4d/64 (metric 256 |)scope global dynamic mngtmpaddr')
6538 # address in IA_PD (temporary)
6539 self.wait_address('test1', 'inet6 2001:db8:6464:[0-9a-f]+00:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*/64 (metric 256 |)scope global temporary dynamic', ipv='-6')
6540
6541 print('### ip -6 address show dev dummy98 scope global')
6542 output = check_output('ip -6 address show dev dummy98 scope global')
6543 print(output)
6544 # address in IA_PD (Token=static)
6545 self.assertRegex(output, 'inet6 2001:db8:6464:[0-9a-f]+00:1a:2b:3c:4d/64 (metric 256 |)scope global dynamic mngtmpaddr')
6546 # address in IA_PD (temporary)
6547 self.wait_address('dummy98', 'inet6 2001:db8:6464:[0-9a-f]+00:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*/64 (metric 256 |)scope global temporary dynamic', ipv='-6')
6548
6549 print('### ip -6 address show dev dummy99 scope global')
6550 output = check_output('ip -6 address show dev dummy99 scope global')
6551 print(output)
6552 # Assign=no
6553 self.assertNotRegex(output, 'inet6 2001:db8:6464:[0-9a-f]+0[23]')
6554
6555 print('### ip -6 address show dev veth97 scope global')
6556 output = check_output('ip -6 address show dev veth97 scope global')
6557 print(output)
6558 # address in IA_PD (Token=static)
6559 self.assertRegex(output, 'inet6 2001:db8:6464:[0-9a-f]+08:1a:2b:3c:4d/64 (metric 256 |)scope global dynamic mngtmpaddr')
6560 # address in IA_PD (Token=eui64)
6561 self.assertRegex(output, 'inet6 2001:db8:6464:[0-9a-f]+08:1034:56ff:fe78:9ace/64 (metric 256 |)scope global dynamic mngtmpaddr')
6562 # address in IA_PD (temporary)
6563 self.wait_address('veth97', 'inet6 2001:db8:6464:[0-9a-f]+08:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*/64 (metric 256 |)scope global temporary dynamic', ipv='-6')
6564
6565 print('### ip -6 address show dev veth97-peer scope global')
6566 output = check_output('ip -6 address show dev veth97-peer scope global')
6567 print(output)
6568 # NDisc address (Token=static)
6569 self.assertRegex(output, 'inet6 2001:db8:6464:[0-9a-f]+08:1a:2b:3c:4e/64 (metric 256 |)scope global dynamic mngtmpaddr')
6570 # NDisc address (Token=eui64)
6571 self.assertRegex(output, 'inet6 2001:db8:6464:[0-9a-f]+08:1034:56ff:fe78:9acf/64 (metric 256 |)scope global dynamic mngtmpaddr')
6572 # NDisc address (temporary)
6573 self.wait_address('veth97-peer', 'inet6 2001:db8:6464:[0-9a-f]+08:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*/64 (metric 256 |)scope global temporary dynamic', ipv='-6')
6574
6575 print('### ip -6 address show dev veth98 scope global')
6576 output = check_output('ip -6 address show dev veth98 scope global')
6577 print(output)
6578 # address in IA_PD (Token=static)
6579 self.assertRegex(output, 'inet6 2001:db8:6464:[0-9a-f]+09:1a:2b:3c:4d/64 (metric 256 |)scope global dynamic mngtmpaddr')
6580 # address in IA_PD (Token=eui64)
6581 self.assertRegex(output, 'inet6 2001:db8:6464:[0-9a-f]+09:1034:56ff:fe78:9abe/64 (metric 256 |)scope global dynamic mngtmpaddr')
6582 # address in IA_PD (temporary)
6583 self.wait_address('veth98', 'inet6 2001:db8:6464:[0-9a-f]+09:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*/64 (metric 256 |)scope global temporary dynamic', ipv='-6')
6584
6585 print('### ip -6 address show dev veth98-peer scope global')
6586 output = check_output('ip -6 address show dev veth98-peer scope global')
6587 print(output)
6588 # NDisc address (Token=static)
6589 self.assertRegex(output, 'inet6 2001:db8:6464:[0-9a-f]+09:1a:2b:3c:4e/64 (metric 256 |)scope global dynamic mngtmpaddr')
6590 # NDisc address (Token=eui64)
6591 self.assertRegex(output, 'inet6 2001:db8:6464:[0-9a-f]+09:1034:56ff:fe78:9abf/64 (metric 256 |)scope global dynamic mngtmpaddr')
6592 # NDisc address (temporary)
6593 self.wait_address('veth98-peer', 'inet6 2001:db8:6464:[0-9a-f]+09:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*/64 (metric 256 |)scope global temporary dynamic', ipv='-6')
6594
6595 print('### ip -6 route show type unreachable')
6596 output = check_output('ip -6 route show type unreachable')
6597 print(output)
6598 self.assertRegex(output, 'unreachable 2001:db8:6464:[0-9a-f]+00::/56 dev lo proto dhcp')
6599
6600 print('### ip -6 route show dev veth99')
6601 output = check_output('ip -6 route show dev veth99')
6602 print(output)
6603 self.assertRegex(output, '2001:db8:6464:[0-9a-f]+10::/64 proto kernel metric [0-9]* expires')
6604
6605 print('### ip -6 route show dev test1')
6606 output = check_output('ip -6 route show dev test1')
6607 print(output)
6608 self.assertRegex(output, '2001:db8:6464:[0-9a-f]+00::/64 proto kernel metric [0-9]* expires')
6609
6610 print('### ip -6 route show dev dummy98')
6611 output = check_output('ip -6 route show dev dummy98')
6612 print(output)
6613 self.assertRegex(output, '2001:db8:6464:[0-9a-f]+00::/64 proto kernel metric [0-9]* expires')
6614
6615 print('### ip -6 route show dev dummy99')
6616 output = check_output('ip -6 route show dev dummy99')
6617 print(output)
6618 self.assertRegex(output, '2001:db8:6464:[0-9a-f]+0[23]::/64 proto dhcp metric [0-9]* expires')
6619
6620 print('### ip -6 route show dev veth97')
6621 output = check_output('ip -6 route show dev veth97')
6622 print(output)
6623 self.assertRegex(output, '2001:db8:6464:[0-9a-f]+08::/64 proto kernel metric [0-9]* expires')
6624
6625 print('### ip -6 route show dev veth97-peer')
6626 output = check_output('ip -6 route show dev veth97-peer')
6627 print(output)
6628 self.assertRegex(output, '2001:db8:6464:[0-9a-f]+08::/64 proto ra metric [0-9]* expires')
6629
6630 print('### ip -6 route show dev veth98')
6631 output = check_output('ip -6 route show dev veth98')
6632 print(output)
6633 self.assertRegex(output, '2001:db8:6464:[0-9a-f]+09::/64 proto kernel metric [0-9]* expires')
6634
6635 print('### ip -6 route show dev veth98-peer')
6636 output = check_output('ip -6 route show dev veth98-peer')
6637 print(output)
6638 self.assertRegex(output, '2001:db8:6464:[0-9a-f]+09::/64 proto ra metric [0-9]* expires')
6639
6640 print('### ip -6 address show dev dummy97 scope global')
6641 output = check_output('ip -6 address show dev dummy97 scope global')
6642 print(output)
6643 # address in IA_PD (Token=static)
6644 self.assertRegex(output, 'inet6 2001:db8:6464:[0-9a-f]+01:1a:2b:3c:4d/64 (metric 256 |)scope global dynamic mngtmpaddr')
6645 # address in IA_PD (temporary)
6646 self.wait_address('dummy97', 'inet6 2001:db8:6464:[0-9a-f]+01:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*/64 (metric 256 |)scope global temporary dynamic', ipv='-6')
6647
6648 print('### ip -6 route show dev dummy97')
6649 output = check_output('ip -6 route show dev dummy97')
6650 print(output)
6651 self.assertRegex(output, '2001:db8:6464:[0-9a-f]+01::/64 proto kernel metric [0-9]* expires')
6652
6653 print(f'### ip -d link show dev {tunnel_name}')
6654 output = check_output(f'ip -d link show dev {tunnel_name}')
6655 print(output)
6656 self.assertIn('link/sit 10.100.100.', output)
6657 self.assertIn('local 10.100.100.', output)
6658 self.assertIn('ttl 64', output)
6659 self.assertIn('6rd-prefix 2001:db8::/32', output)
6660 self.assertIn('6rd-relay_prefix 10.0.0.0/8', output)
6661
6662 print(f'### ip -6 address show dev {tunnel_name}')
6663 output = check_output(f'ip -6 address show dev {tunnel_name}')
6664 print(output)
6665 self.assertRegex(output, 'inet6 2001:db8:6464:[0-9a-f]+0[23]:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*:[0-9a-f]*/64 (metric 256 |)scope global dynamic')
6666 self.assertRegex(output, 'inet6 ::10.100.100.[0-9]+/96 scope global')
6667
6668 print(f'### ip -6 route show dev {tunnel_name}')
6669 output = check_output(f'ip -6 route show dev {tunnel_name}')
6670 print(output)
6671 self.assertRegex(output, '2001:db8:6464:[0-9a-f]+0[23]::/64 proto kernel metric [0-9]* expires')
6672 self.assertRegex(output, '::/96 proto kernel metric [0-9]*')
6673
6674 print('### ip -6 route show default')
6675 output = check_output('ip -6 route show default')
6676 print(output)
6677 self.assertIn('default', output)
6678 self.assertIn(f'via ::10.0.0.1 dev {tunnel_name}', output)
6679
6680 def test_dhcp4_6rd(self):
6681 def get_dhcp_6rd_prefix(link):
6682 description = get_link_description(link)
6683
6684 self.assertIn('DHCPv4Client', description.keys())
6685 self.assertIn('6rdPrefix', description['DHCPv4Client'].keys())
6686
6687 prefixInfo = description['DHCPv4Client']['6rdPrefix']
6688 self.assertIn('Prefix', prefixInfo.keys())
6689 self.assertIn('PrefixLength', prefixInfo.keys())
6690 self.assertIn('IPv4MaskLength', prefixInfo.keys())
6691 self.assertIn('BorderRouters', prefixInfo.keys())
6692
6693 return prefixInfo
6694
6695 copy_network_unit('25-veth.netdev', '25-dhcp4-6rd-server.network', '25-dhcp4-6rd-upstream.network',
6696 '25-veth-downstream-veth97.netdev', '25-dhcp-pd-downstream-veth97.network', '25-dhcp-pd-downstream-veth97-peer.network',
6697 '25-veth-downstream-veth98.netdev', '25-dhcp-pd-downstream-veth98.network', '25-dhcp-pd-downstream-veth98-peer.network',
6698 '11-dummy.netdev', '25-dhcp-pd-downstream-test1.network',
6699 '25-dhcp-pd-downstream-dummy97.network',
6700 '12-dummy.netdev', '25-dhcp-pd-downstream-dummy98.network',
6701 '13-dummy.netdev', '25-dhcp-pd-downstream-dummy99.network',
6702 '80-6rd-tunnel.network')
6703
6704 start_networkd()
6705 self.wait_online(['veth-peer:routable'])
6706
6707 # ipv4masklen: 8
6708 # 6rd-prefix: 2001:db8::/32
6709 # br-addresss: 10.0.0.1
6710
6711 start_dnsmasq('--dhcp-option=212,08:20:20:01:0d:b8:00:00:00:00:00:00:00:00:00:00:00:00:0a:00:00:01',
6712 ipv4_range='10.100.100.100,10.100.100.200',
6713 ipv4_router='10.0.0.1')
6714 self.wait_online(['veth99:routable', 'test1:routable', 'dummy98:routable', 'dummy99:degraded',
6715 'veth97:routable', 'veth97-peer:routable', 'veth98:routable', 'veth98-peer:routable'])
6716
6717 # Check the DBus interface for assigned prefix information
6718 prefixInfo = get_dhcp_6rd_prefix('veth99')
6719
6720 self.assertEqual(prefixInfo['Prefix'], [32,1,13,184,0,0,0,0,0,0,0,0,0,0,0,0]) # 2001:db8::
6721 self.assertEqual(prefixInfo['PrefixLength'], 32)
6722 self.assertEqual(prefixInfo['IPv4MaskLength'], 8)
6723 self.assertEqual(prefixInfo['BorderRouters'], [[10,0,0,1]])
6724
6725 # Test case for a downstream which appears later
6726 check_output('ip link add dummy97 type dummy')
6727 self.wait_online(['dummy97:routable'])
6728
6729 # Find tunnel name
6730 tunnel_name = None
6731 for name in os.listdir('/sys/class/net/'):
6732 if name.startswith('6rd-'):
6733 tunnel_name = name
6734 break
6735
6736 self.wait_online([f'{tunnel_name}:routable'])
6737
6738 self.verify_dhcp4_6rd(tunnel_name)
6739
6740 # Test case for reconfigure
6741 networkctl_reconfigure('dummy98', 'dummy99')
6742 self.wait_online(['dummy98:routable', 'dummy99:degraded'])
6743
6744 self.verify_dhcp4_6rd(tunnel_name)
6745
6746 print('Wait for the DHCP lease to be renewed/rebind')
6747 time.sleep(120)
6748
6749 self.wait_online(['veth99:routable', 'test1:routable', 'dummy97:routable', 'dummy98:routable', 'dummy99:degraded',
6750 'veth97:routable', 'veth97-peer:routable', 'veth98:routable', 'veth98-peer:routable'])
6751
6752 self.verify_dhcp4_6rd(tunnel_name)
6753
6754 class NetworkdIPv6PrefixTests(unittest.TestCase, Utilities):
6755
6756 def setUp(self):
6757 setup_common()
6758
6759 def tearDown(self):
6760 tear_down_common()
6761
6762 def test_ipv6_route_prefix(self):
6763 copy_network_unit('25-veth.netdev', '25-ipv6ra-prefix-client.network', '25-ipv6ra-prefix.network',
6764 '12-dummy.netdev', '25-ipv6ra-uplink.network')
6765
6766 start_networkd()
6767 self.wait_online(['veth99:routable', 'veth-peer:routable', 'dummy98:routable'])
6768
6769 output = check_output('ip address show dev veth-peer')
6770 print(output)
6771 self.assertIn('inet6 2001:db8:0:1:', output)
6772 self.assertNotIn('inet6 2001:db8:0:2:', output)
6773 self.assertNotIn('inet6 2001:db8:0:3:', output)
6774
6775 output = check_output('ip -6 route show dev veth-peer')
6776 print(output)
6777 self.assertIn('2001:db8:0:1::/64 proto ra', output)
6778 self.assertNotIn('2001:db8:0:2::/64 proto ra', output)
6779 self.assertNotIn('2001:db8:0:3::/64 proto ra', output)
6780 self.assertIn('2001:db0:fff::/64 via ', output)
6781 self.assertNotIn('2001:db1:fff::/64 via ', output)
6782 self.assertNotIn('2001:db2:fff::/64 via ', output)
6783
6784 output = check_output('ip address show dev veth99')
6785 print(output)
6786 self.assertNotIn('inet6 2001:db8:0:1:', output)
6787 self.assertIn('inet6 2001:db8:0:2:1a:2b:3c:4d', output)
6788 self.assertIn('inet6 2001:db8:0:2:fa:de:ca:fe', output)
6789 self.assertNotIn('inet6 2001:db8:0:3:', output)
6790
6791 output = check_output(*resolvectl_cmd, 'dns', 'veth-peer', env=env)
6792 print(output)
6793 self.assertRegex(output, '2001:db8:1:1::2')
6794
6795 output = check_output(*resolvectl_cmd, 'domain', 'veth-peer', env=env)
6796 print(output)
6797 self.assertIn('example.com', output)
6798
6799 output = check_output(*networkctl_cmd, '--json=short', 'status', env=env)
6800 check_json(output)
6801
6802 output = check_output(*networkctl_cmd, '--json=short', 'status', 'veth-peer', env=env)
6803 check_json(output)
6804
6805 # PREF64 or NAT64
6806 pref64 = json.loads(output)['NDisc']['PREF64'][0]
6807
6808 prefix = socket.inet_ntop(socket.AF_INET6, bytearray(pref64['Prefix']))
6809 self.assertEqual(prefix, '64:ff9b::')
6810
6811 prefix_length = pref64['PrefixLength']
6812 self.assertEqual(prefix_length, 96)
6813
6814 def test_ipv6_route_prefix_deny_list(self):
6815 copy_network_unit('25-veth.netdev', '25-ipv6ra-prefix-client-deny-list.network', '25-ipv6ra-prefix.network',
6816 '12-dummy.netdev', '25-ipv6ra-uplink.network')
6817
6818 start_networkd()
6819 self.wait_online(['veth99:routable', 'veth-peer:routable', 'dummy98:routable'])
6820
6821 output = check_output('ip address show dev veth-peer')
6822 print(output)
6823 self.assertIn('inet6 2001:db8:0:1:', output)
6824 self.assertNotIn('inet6 2001:db8:0:2:', output)
6825
6826 output = check_output('ip -6 route show dev veth-peer')
6827 print(output)
6828 self.assertIn('2001:db8:0:1::/64 proto ra', output)
6829 self.assertNotIn('2001:db8:0:2::/64 proto ra', output)
6830 self.assertIn('2001:db0:fff::/64 via ', output)
6831 self.assertNotIn('2001:db1:fff::/64 via ', output)
6832
6833 output = check_output('ip address show dev veth99')
6834 print(output)
6835 self.assertNotIn('inet6 2001:db8:0:1:', output)
6836 self.assertIn('inet6 2001:db8:0:2:', output)
6837
6838 output = check_output(*resolvectl_cmd, 'dns', 'veth-peer', env=env)
6839 print(output)
6840 self.assertRegex(output, '2001:db8:1:1::2')
6841
6842 output = check_output(*resolvectl_cmd, 'domain', 'veth-peer', env=env)
6843 print(output)
6844 self.assertIn('example.com', output)
6845
6846 class NetworkdMTUTests(unittest.TestCase, Utilities):
6847
6848 def setUp(self):
6849 setup_common()
6850
6851 def tearDown(self):
6852 tear_down_common()
6853
6854 def check_mtu(self, mtu, ipv6_mtu=None, reset=True):
6855 if not ipv6_mtu:
6856 ipv6_mtu = mtu
6857
6858 # test normal start
6859 start_networkd()
6860 self.wait_online(['dummy98:routable'])
6861 self.check_link_attr('dummy98', 'mtu', mtu)
6862 self.check_ipv6_sysctl_attr('dummy98', 'mtu', ipv6_mtu)
6863
6864 # test normal restart
6865 restart_networkd()
6866 self.wait_online(['dummy98:routable'])
6867 self.check_link_attr('dummy98', 'mtu', mtu)
6868 self.check_ipv6_sysctl_attr('dummy98', 'mtu', ipv6_mtu)
6869
6870 if reset:
6871 self.reset_check_mtu(mtu, ipv6_mtu)
6872
6873 def reset_check_mtu(self, mtu, ipv6_mtu=None):
6874 ''' test setting mtu/ipv6_mtu with interface already up '''
6875 stop_networkd()
6876
6877 # note - changing the device mtu resets the ipv6 mtu
6878 check_output('ip link set up mtu 1501 dev dummy98')
6879 check_output('ip link set up mtu 1500 dev dummy98')
6880 self.check_link_attr('dummy98', 'mtu', '1500')
6881 self.check_ipv6_sysctl_attr('dummy98', 'mtu', '1500')
6882
6883 self.check_mtu(mtu, ipv6_mtu, reset=False)
6884
6885 def test_mtu_network(self):
6886 copy_network_unit('12-dummy.netdev', '12-dummy.network.d/mtu.conf')
6887 self.check_mtu('1600')
6888
6889 def test_mtu_netdev(self):
6890 copy_network_unit('12-dummy-mtu.netdev', '12-dummy.network', copy_dropins=False)
6891 # note - MTU set by .netdev happens ONLY at device creation!
6892 self.check_mtu('1600', reset=False)
6893
6894 def test_mtu_link(self):
6895 copy_network_unit('12-dummy.netdev', '12-dummy-mtu.link', '12-dummy.network', copy_dropins=False)
6896 # note - MTU set by .link happens ONLY at udev processing of device 'add' uevent!
6897 self.check_mtu('1600', reset=False)
6898
6899 def test_ipv6_mtu(self):
6900 ''' set ipv6 mtu without setting device mtu '''
6901 copy_network_unit('12-dummy.netdev', '12-dummy.network.d/ipv6-mtu-1400.conf')
6902 self.check_mtu('1500', '1400')
6903
6904 def test_ipv6_mtu_toolarge(self):
6905 ''' try set ipv6 mtu over device mtu (it shouldn't work) '''
6906 copy_network_unit('12-dummy.netdev', '12-dummy.network.d/ipv6-mtu-1550.conf')
6907 self.check_mtu('1500', '1500')
6908
6909 def test_mtu_network_ipv6_mtu(self):
6910 ''' set ipv6 mtu and set device mtu via network file '''
6911 copy_network_unit('12-dummy.netdev', '12-dummy.network.d/mtu.conf', '12-dummy.network.d/ipv6-mtu-1550.conf')
6912 self.check_mtu('1600', '1550')
6913
6914 def test_mtu_netdev_ipv6_mtu(self):
6915 ''' set ipv6 mtu and set device mtu via netdev file '''
6916 copy_network_unit('12-dummy-mtu.netdev', '12-dummy.network.d/ipv6-mtu-1550.conf')
6917 self.check_mtu('1600', '1550', reset=False)
6918
6919 def test_mtu_link_ipv6_mtu(self):
6920 ''' set ipv6 mtu and set device mtu via link file '''
6921 copy_network_unit('12-dummy.netdev', '12-dummy-mtu.link', '12-dummy.network.d/ipv6-mtu-1550.conf')
6922 self.check_mtu('1600', '1550', reset=False)
6923
6924
6925 if __name__ == '__main__':
6926 parser = argparse.ArgumentParser()
6927 parser.add_argument('--build-dir', help='Path to build dir', dest='build_dir')
6928 parser.add_argument('--source-dir', help='Path to source dir/git tree', dest='source_dir')
6929 parser.add_argument('--networkd', help='Path to systemd-networkd', dest='networkd_bin')
6930 parser.add_argument('--resolved', help='Path to systemd-resolved', dest='resolved_bin')
6931 parser.add_argument('--timesyncd', help='Path to systemd-timesyncd', dest='timesyncd_bin')
6932 parser.add_argument('--udevd', help='Path to systemd-udevd', dest='udevd_bin')
6933 parser.add_argument('--wait-online', help='Path to systemd-networkd-wait-online', dest='wait_online_bin')
6934 parser.add_argument('--networkctl', help='Path to networkctl', dest='networkctl_bin')
6935 parser.add_argument('--resolvectl', help='Path to resolvectl', dest='resolvectl_bin')
6936 parser.add_argument('--timedatectl', help='Path to timedatectl', dest='timedatectl_bin')
6937 parser.add_argument('--udevadm', help='Path to udevadm', dest='udevadm_bin')
6938 parser.add_argument('--valgrind', help='Enable valgrind', dest='use_valgrind', type=bool, nargs='?', const=True, default=use_valgrind)
6939 parser.add_argument('--debug', help='Generate debugging logs', dest='enable_debug', type=bool, nargs='?', const=True, default=enable_debug)
6940 parser.add_argument('--asan-options', help='ASAN options', dest='asan_options')
6941 parser.add_argument('--lsan-options', help='LSAN options', dest='lsan_options')
6942 parser.add_argument('--ubsan-options', help='UBSAN options', dest='ubsan_options')
6943 parser.add_argument('--with-coverage', help='Loosen certain sandbox restrictions to make gcov happy', dest='with_coverage', type=bool, nargs='?', const=True, default=with_coverage)
6944 ns, unknown_args = parser.parse_known_args(namespace=unittest)
6945
6946 if ns.build_dir:
6947 if ns.networkd_bin or ns.resolved_bin or ns.timesyncd_bin or ns.udevd_bin or \
6948 ns.wait_online_bin or ns.networkctl_bin or ns.resolvectl_bin or ns.timedatectl_bin or ns.udevadm_bin:
6949 print('WARNING: --networkd, --resolved, --timesyncd, --udevd, --wait-online, --networkctl, --resolvectl, --timedatectl, or --udevadm options are ignored when --build-dir is specified.')
6950 networkd_bin = os.path.join(ns.build_dir, 'systemd-networkd')
6951 resolved_bin = os.path.join(ns.build_dir, 'systemd-resolved')
6952 timesyncd_bin = os.path.join(ns.build_dir, 'systemd-timesyncd')
6953 udevd_bin = os.path.join(ns.build_dir, 'udevadm')
6954 wait_online_bin = os.path.join(ns.build_dir, 'systemd-networkd-wait-online')
6955 networkctl_bin = os.path.join(ns.build_dir, 'networkctl')
6956 resolvectl_bin = os.path.join(ns.build_dir, 'resolvectl')
6957 timedatectl_bin = os.path.join(ns.build_dir, 'timedatectl')
6958 udevadm_bin = os.path.join(ns.build_dir, 'udevadm')
6959 systemd_udev_rules_build_dir = os.path.join(ns.build_dir, 'rules.d')
6960 else:
6961 if ns.networkd_bin:
6962 networkd_bin = ns.networkd_bin
6963 if ns.resolved_bin:
6964 resolved_bin = ns.resolved_bin
6965 if ns.timesyncd_bin:
6966 timesyncd_bin = ns.timesyncd_bin
6967 if ns.udevd_bin:
6968 udevd_bin = ns.udevd_bin
6969 if ns.wait_online_bin:
6970 wait_online_bin = ns.wait_online_bin
6971 if ns.networkctl_bin:
6972 networkctl_bin = ns.networkctl_bin
6973 if ns.resolvectl_bin:
6974 resolvectl_bin = ns.resolvectl_bin
6975 if ns.timedatectl_bin:
6976 timedatectl_bin = ns.timedatectl_bin
6977 if ns.udevadm_bin:
6978 udevadm_bin = ns.udevadm_bin
6979
6980 if ns.source_dir:
6981 systemd_source_dir = ns.source_dir
6982 else:
6983 systemd_source_dir = os.path.normpath(os.path.join(os.path.dirname(os.path.abspath(__file__)), "../../"))
6984 if not os.path.exists(os.path.join(systemd_source_dir, "meson_options.txt")):
6985 raise RuntimeError(f"{systemd_source_dir} doesn't appear to be a systemd source tree")
6986
6987 use_valgrind = ns.use_valgrind
6988 enable_debug = ns.enable_debug
6989 asan_options = ns.asan_options
6990 lsan_options = ns.lsan_options
6991 ubsan_options = ns.ubsan_options
6992 with_coverage = ns.with_coverage
6993
6994 if use_valgrind:
6995 # Do not forget the trailing space.
6996 valgrind_cmd = 'valgrind --track-origins=yes --leak-check=full --show-leak-kinds=all '
6997
6998 networkctl_cmd = valgrind_cmd.split() + [networkctl_bin]
6999 resolvectl_cmd = valgrind_cmd.split() + [resolvectl_bin]
7000 timedatectl_cmd = valgrind_cmd.split() + [timedatectl_bin]
7001 udevadm_cmd = valgrind_cmd.split() + [udevadm_bin]
7002 wait_online_cmd = valgrind_cmd.split() + [wait_online_bin]
7003
7004 if asan_options:
7005 env.update({'ASAN_OPTIONS': asan_options})
7006 if lsan_options:
7007 env.update({'LSAN_OPTIONS': lsan_options})
7008 if ubsan_options:
7009 env.update({'UBSAN_OPTIONS': ubsan_options})
7010 if use_valgrind:
7011 env.update({'SYSTEMD_MEMPOOL': '0'})
7012
7013 wait_online_env = env.copy()
7014 if enable_debug:
7015 wait_online_env.update({'SYSTEMD_LOG_LEVEL': 'debug'})
7016
7017 sys.argv[1:] = unknown_args
7018 unittest.main(verbosity=3)