return f
+def expectedFailureIfFQPIEIsNotAvailable():
+ def f(func):
+ call('ip link add dummy98 type dummy', stderr=subprocess.DEVNULL)
+ rc = call('tc qdisc add dev dummy98 parent root fq_pie', stderr=subprocess.DEVNULL)
+ call('ip link del dummy98', stderr=subprocess.DEVNULL)
+ if rc == 0:
+ return func
+ else:
+ return unittest.expectedFailure(func)
+
+ return f
+
def setUpModule():
global running_units
links = [
'6rdtun99',
+ 'bareudp99',
'bond99',
'bridge99',
'dropin-test',
'vtitun98',
'vtitun99',
'vxcan99',
+ 'vxlan98',
'vxlan99',
'wg97',
'wg98',
'21-vlan.netdev',
'21-vlan.network',
'25-6rd-tunnel.netdev',
+ '25-bareudp.netdev',
'25-bond.netdev',
'25-bond-balanced-tlb.netdev',
'25-bridge.netdev',
'25-vti-tunnel-remote-any.netdev',
'25-vti-tunnel.netdev',
'25-vxcan.netdev',
+ '25-vxlan-independent.netdev',
'25-vxlan.netdev',
'25-wireguard-23-peers.netdev',
'25-wireguard-23-peers.network',
self.wait_operstate('bridge99', '(off|no-carrier)', setup_state='configuring')
self.wait_operstate('test1', 'degraded')
+ @expectedFailureIfModuleIsNotAvailable('bareudp')
+ def test_bareudp(self):
+ copy_unit_to_networkd_unit_path('25-bareudp.netdev', 'netdev-link-local-addressing-yes.network')
+ start_networkd()
+
+ self.wait_online(['bareudp99:degraded'])
+
+ output = check_output('ip -d link show bareudp99')
+ print(output)
+ self.assertRegex(output, 'dstport 1000 ')
+ self.assertRegex(output, 'ethertype ip ')
+
def test_bridge(self):
copy_unit_to_networkd_unit_path('25-bridge.netdev', '25-bridge-configure-without-carrier.network')
start_networkd()
def test_vxlan(self):
copy_unit_to_networkd_unit_path('25-vxlan.netdev', 'vxlan.network',
+ '25-vxlan-independent.netdev', 'netdev-link-local-addressing-yes.network',
'11-dummy.netdev', 'vxlan-test1.network')
start_networkd()
- self.wait_online(['test1:degraded', 'vxlan99:degraded'])
+ self.wait_online(['test1:degraded', 'vxlan99:degraded', 'vxlan98:degraded'])
output = check_output('ip -d link show vxlan99')
print(output)
self.assertRegex(output, 'Destination Port: 5555')
self.assertRegex(output, 'Underlying Device: test1')
+ output = check_output('ip -d link show vxlan98')
+ print(output)
+
def test_macsec(self):
copy_unit_to_networkd_unit_path('25-macsec.netdev', '25-macsec.network', '25-macsec.key',
'macsec.network', '12-dummy.netdev')
'25-qdisc-clsact-and-htb.network',
'25-qdisc-drr.network',
'25-qdisc-ets.network',
+ '25-qdisc-fq_pie.network',
'25-qdisc-hhf.network',
'25-qdisc-ingress-netem-compat.network',
'25-qdisc-pie.network',
'25-vrf.network',
'26-link-local-addressing-ipv6.network',
'routing-policy-rule-dummy98.network',
- 'routing-policy-rule-test1.network']
+ 'routing-policy-rule-test1.network',
+ 'routing-policy-rule-reconfigure.network',
+ ]
- routing_policy_rule_tables = ['7', '8', '9']
+ routing_policy_rule_tables = ['7', '8', '9', '1011']
routes = [['blackhole', '202.54.1.2'], ['unreachable', '202.54.1.3'], ['prohibit', '202.54.1.4']]
def setUp(self):
self.assertRegex(output, 'inet 10.1.2.4/16 brd 10.1.255.255 scope global secondary dummy98')
self.assertRegex(output, 'inet 10.2.2.4/16 brd 10.2.255.255 scope global dummy98')
+ # test for ENOBUFS issue #17012
+ for i in range(1,254):
+ self.assertRegex(output, f'inet 10.3.3.{i}/16 brd 10.3.255.255')
+
# invalid sections
self.assertNotRegex(output, '10.10.0.1/16')
self.assertNotRegex(output, '10.10.0.2/16')
self.assertRegex(output, 'inet6 2001:db8:0:f103::20 peer 2001:db8:0:f103::10/128 scope global')
self.assertRegex(output, 'inet6 fd[0-9a-f:]*1/64 scope global')
+ restart_networkd()
+ self.wait_online(['dummy98:routable'])
+
+ # test for ENOBUFS issue #17012
+ output = check_output('ip -4 address show dev dummy98')
+ for i in range(1,254):
+ self.assertRegex(output, f'inet 10.3.3.{i}/16 brd 10.3.255.255')
+
def test_address_preferred_lifetime_zero_ipv6(self):
copy_unit_to_networkd_unit_path('25-address-preferred-lifetime-zero.network', '12-dummy.netdev')
start_networkd(5)
self.assertRegex(output, 'iif test1')
self.assertRegex(output, 'lookup 8')
- output = check_output('ip -6 rule list iif test1 priority 101')
- print(output)
- self.assertRegex(output, '101:')
- self.assertRegex(output, 'from all')
- self.assertRegex(output, 'iif test1')
- self.assertRegex(output, 'lookup 9')
-
- run('ip rule delete iif test1 priority 111')
-
- output = check_output('ip rule list iif test1 priority 111')
- print(output)
- self.assertEqual(output, '')
-
- run(*networkctl_cmd, 'reconfigure', 'test1', env=env)
-
- self.wait_online(['test1:degraded'])
-
- output = check_output('ip rule list iif test1 priority 111')
- print(output)
- self.assertRegex(output, '111:')
- self.assertRegex(output, 'from 192.168.100.18')
- self.assertRegex(output, r'tos (0x08|throughput)\s')
- self.assertRegex(output, 'iif test1')
- self.assertRegex(output, 'oif test1')
- self.assertRegex(output, 'lookup 7')
-
def test_routing_policy_rule_issue_11280(self):
copy_unit_to_networkd_unit_path('routing-policy-rule-test1.network', '11-dummy.netdev',
'routing-policy-rule-dummy98.network', '12-dummy.netdev')
stop_networkd(remove_state_files=False)
+ def test_routing_policy_rule_reconfigure(self):
+ copy_unit_to_networkd_unit_path('routing-policy-rule-reconfigure.network', '11-dummy.netdev')
+ start_networkd()
+ self.wait_online(['test1:degraded'])
+
+ output = check_output('ip rule list table 1011')
+ print(output)
+ self.assertRegex(output, '10111: from all fwmark 0x3f3 lookup 1011')
+ self.assertRegex(output, '10112: from all oif test1 lookup 1011')
+ self.assertRegex(output, '10113: from all iif test1 lookup 1011')
+ self.assertRegex(output, '10114: from 192.168.8.254 lookup 1011')
+
+ run('ip rule delete priority 10111')
+ run('ip rule delete priority 10112')
+ run('ip rule delete priority 10113')
+ run('ip rule delete priority 10114')
+ run('ip rule delete priority 10115')
+
+ output = check_output('ip rule list table 1011')
+ print(output)
+ self.assertEqual(output, '')
+
+ run(*networkctl_cmd, 'reconfigure', 'test1', env=env)
+
+ self.wait_online(['test1:degraded'])
+
+ output = check_output('ip rule list table 1011')
+ print(output)
+ self.assertRegex(output, '10111: from all fwmark 0x3f3 lookup 1011')
+ self.assertRegex(output, '10112: from all oif test1 lookup 1011')
+ self.assertRegex(output, '10113: from all iif test1 lookup 1011')
+ self.assertRegex(output, '10114: from 192.168.8.254 lookup 1011')
+
@expectedFailureIfRoutingPolicyPortRangeIsNotAvailable()
def test_routing_policy_rule_port_range(self):
copy_unit_to_networkd_unit_path('25-fibrule-port-range.network', '11-dummy.netdev')
output = check_output('tc qdisc show dev dummy98')
print(output)
+
self.assertRegex(output, 'qdisc ets 3a: root')
self.assertRegex(output, 'bands 10 strict 3')
self.assertRegex(output, 'quanta 1 2 3 4 5')
self.assertRegex(output, 'priomap 3 4 5 6 7')
+ @expectedFailureIfFQPIEIsNotAvailable()
+ def test_qdisc_fq_pie(self):
+ copy_unit_to_networkd_unit_path('25-qdisc-fq_pie.network', '12-dummy.netdev')
+ start_networkd()
+ self.wait_online(['dummy98:routable'])
+
+ output = check_output('tc qdisc show dev dummy98')
+ print(output)
+
+ self.assertRegex(output, 'qdisc fq_pie 3a: root')
+ self.assertRegex(output, 'limit 200000p')
+
@expectedFailureIfNetdevsimWithSRIOVIsNotAvailable()
def test_sriov(self):
call('rmmod netdevsim', stderr=subprocess.DEVNULL)
'12-dummy.netdev',
'26-bridge.netdev',
'26-bridge-configure-without-carrier.network',
+ '26-bridge-mdb-master.network',
+ '26-bridge-mdb-slave.network',
'26-bridge-slave-interface-1.network',
'26-bridge-slave-interface-2.network',
'26-bridge-vlan-master.network',
self.assertRegex(output, f'{i}')
self.assertNotRegex(output, '4095')
+ def test_bridge_mdb(self):
+ copy_unit_to_networkd_unit_path('11-dummy.netdev', '26-bridge-mdb-slave.network',
+ '26-bridge.netdev', '26-bridge-mdb-master.network')
+ start_networkd()
+ self.wait_online(['test1:enslaved', 'bridge99:degraded'])
+
+ output = check_output('bridge mdb show dev bridge99')
+ print(output)
+ self.assertRegex(output, 'dev bridge99 port test1 grp ff02:aaaa:fee5::1:3 permanent *vid 4064')
+ self.assertRegex(output, 'dev bridge99 port test1 grp 224.0.1.1 permanent *vid 4065')
+
+ # Old kernel may not support bridge MDB entries on bridge master
+ if call('bridge mdb add dev bridge99 port bridge99 grp 224.0.1.3 temp vid 4068', stderr=subprocess.DEVNULL) == 0:
+ self.assertRegex(output, 'dev bridge99 port bridge99 grp ff02:aaaa:fee5::1:4 temp *vid 4066')
+ self.assertRegex(output, 'dev bridge99 port bridge99 grp 224.0.1.2 temp *vid 4067')
+
def test_bridge_property(self):
copy_unit_to_networkd_unit_path('11-dummy.netdev', '12-dummy.netdev', '26-bridge.netdev',
'26-bridge-slave-interface-1.network', '26-bridge-slave-interface-2.network',
'ipv6-prefix.network',
'ipv6-prefix-veth.network',
'ipv6-prefix-veth-token-static.network',
- 'ipv6-prefix-veth-token-static-explicit.network',
- 'ipv6-prefix-veth-token-static-multiple.network',
- 'ipv6-prefix-veth-token-prefixstable.network']
+ 'ipv6-prefix-veth-token-prefixstable.network',
+ 'ipv6-prefix-veth-token-prefixstable-without-address.network']
def setUp(self):
remove_links(self.links)
output = check_output(*networkctl_cmd, '-n', '0', 'status', 'veth99', env=env)
print(output)
self.assertRegex(output, '2002:da8:1:0:1a:2b:3c:4d')
+ self.assertRegex(output, '2002:da8:1:0:fa:de:ca:fe')
+ self.assertRegex(output, '2002:da8:2:0:1a:2b:3c:4d')
+ self.assertRegex(output, '2002:da8:2:0:fa:de:ca:fe')
- def test_ipv6_token_static_explicit(self):
- copy_unit_to_networkd_unit_path('25-veth.netdev', 'ipv6-prefix.network', 'ipv6-prefix-veth-token-static-explicit.network')
- start_networkd()
- self.wait_online(['veth99:routable', 'veth-peer:degraded'])
-
- output = check_output(*networkctl_cmd, '-n', '0', 'status', 'veth99', env=env)
- print(output)
- self.assertRegex(output, '2002:da8:1:0:1a:2b:3c:4d')
-
- def test_ipv6_token_static_multiple(self):
- copy_unit_to_networkd_unit_path('25-veth.netdev', 'ipv6-prefix.network', 'ipv6-prefix-veth-token-static-multiple.network')
+ def test_ipv6_token_prefixstable(self):
+ copy_unit_to_networkd_unit_path('25-veth.netdev', 'ipv6-prefix.network', 'ipv6-prefix-veth-token-prefixstable.network')
start_networkd()
self.wait_online(['veth99:routable', 'veth-peer:degraded'])
output = check_output(*networkctl_cmd, '-n', '0', 'status', 'veth99', env=env)
print(output)
- self.assertRegex(output, '2002:da8:1:0:1a:2b:3c:4d')
- self.assertRegex(output, '2002:da8:1:0:fa:de:ca:fe')
+ self.assertRegex(output, '2002:da8:1:0')
+ self.assertRegex(output, '2002:da8:2:0.*78:9abc') # EUI
- def test_ipv6_token_prefixstable(self):
- copy_unit_to_networkd_unit_path('25-veth.netdev', 'ipv6-prefix.network', 'ipv6-prefix-veth-token-prefixstable.network')
+ def test_ipv6_token_prefixstable_without_address(self):
+ copy_unit_to_networkd_unit_path('25-veth.netdev', 'ipv6-prefix.network', 'ipv6-prefix-veth-token-prefixstable-without-address.network')
start_networkd()
self.wait_online(['veth99:routable', 'veth-peer:degraded'])
output = check_output(*networkctl_cmd, '-n', '0', 'status', 'veth99', env=env)
print(output)
self.assertRegex(output, '2002:da8:1:0')
+ self.assertRegex(output, '2002:da8:2:0')
class NetworkdDHCPServerTests(unittest.TestCase, Utilities):
links = ['veth99']