]> git.ipfire.org Git - thirdparty/systemd.git/blame - test/test-network/systemd-networkd-tests.py
test-network: explicitly set sleep time
[thirdparty/systemd.git] / test / test-network / systemd-networkd-tests.py
CommitLineData
1f0e3109
SS
1#!/usr/bin/env python3
2# SPDX-License-Identifier: LGPL-2.1+
3# systemd-networkd tests
4
9c1ae484 5import argparse
1f0e3109 6import os
201bf07f 7import re
1f0e3109
SS
8import shutil
9import signal
a9bc5e37
YW
10import subprocess
11import sys
a9bc5e37
YW
12import time
13import unittest
1f0e3109
SS
14from shutil import copytree
15
d486a2d0 16network_unit_file_path='/run/systemd/network'
bad4969b 17networkd_runtime_directory='/run/systemd/netif'
d486a2d0 18networkd_ci_path='/run/networkd-ci'
1f0e3109
SS
19network_sysctl_ipv6_path='/proc/sys/net/ipv6/conf'
20network_sysctl_ipv4_path='/proc/sys/net/ipv4/conf'
21
d486a2d0
YW
22dnsmasq_pid_file='/run/networkd-ci/test-test-dnsmasq.pid'
23dnsmasq_log_file='/run/networkd-ci/test-dnsmasq-log-file'
1f0e3109 24
9c1ae484 25networkd_bin='/usr/lib/systemd/systemd-networkd'
5aa58329 26wait_online_bin='/usr/lib/systemd/systemd-networkd-wait-online'
9c1ae484
YW
27networkctl_bin='/usr/bin/networkctl'
28use_valgrind=False
29enable_debug=False
30env = {}
94c03122 31asan_options=None
fa4c6095 32lsan_options=None
94c03122 33ubsan_options=None
5aa58329 34
371810d1
ZJS
35def check_output(*command, **kwargs):
36 # This replaces both check_output and check_call (output can be ignored)
37 command = command[0].split() + list(command[1:])
38 return subprocess.check_output(command, universal_newlines=True, **kwargs).rstrip()
39
40def call(*command, **kwargs):
41 command = command[0].split() + list(command[1:])
42 return subprocess.call(command, universal_newlines=True, **kwargs)
43
44def run(*command, **kwargs):
45 command = command[0].split() + list(command[1:])
46 return subprocess.run(command, universal_newlines=True, **kwargs)
47
7a0a37b2 48def is_module_available(module_name):
371810d1
ZJS
49 lsmod_output = check_output('lsmod')
50 module_re = re.compile(rf'^{re.escape(module_name)}\b', re.MULTILINE)
51 return module_re.search(lsmod_output) or not call('modprobe', module_name)
7a0a37b2
EV
52
53def expectedFailureIfModuleIsNotAvailable(module_name):
54 def f(func):
55 if not is_module_available(module_name):
56 return unittest.expectedFailure(func)
57 return func
58
59 return f
60
7bea7f9b
SS
61def expectedFailureIfERSPANModuleIsNotAvailable():
62 def f(func):
371810d1 63 rc = call('ip link add dev erspan99 type erspan seq key 30 local 192.168.1.4 remote 192.168.1.1 erspan_ver 1 erspan 123')
7bea7f9b 64 if rc == 0:
371810d1 65 call('ip link del erspan99')
7bea7f9b
SS
66 return func
67 else:
68 return unittest.expectedFailure(func)
69
70 return f
71
d586a2c3
YW
72def expectedFailureIfRoutingPolicyPortRangeIsNotAvailable():
73 def f(func):
371810d1 74 rc = call('ip rule add from 192.168.100.19 sport 1123-1150 dport 3224-3290 table 7')
d586a2c3 75 if rc == 0:
371810d1 76 call('ip rule del from 192.168.100.19 sport 1123-1150 dport 3224-3290 table 7')
d586a2c3
YW
77 return func
78 else:
79 return unittest.expectedFailure(func)
80
81 return f
82
83def expectedFailureIfRoutingPolicyIPProtoIsNotAvailable():
84 def f(func):
371810d1 85 rc = call('ip rule add not from 192.168.100.19 ipproto tcp table 7')
d586a2c3 86 if rc == 0:
371810d1 87 call('ip rule del not from 192.168.100.19 ipproto tcp table 7')
d586a2c3
YW
88 return func
89 else:
90 return unittest.expectedFailure(func)
91
92 return f
93
1ca44d7d
YW
94def expectedFailureIfEthtoolDoesNotSupportDriver():
95 def f(func):
96 support = False
371810d1 97 rc = call('ip link add name dummy99 type dummy')
1ca44d7d 98 if rc == 0:
371810d1 99 ret = run('udevadm info -w10s /sys/class/net/dummy99', stdout=subprocess.PIPE, stderr=subprocess.STDOUT)
1ca44d7d
YW
100 if ret.returncode == 0 and 'E: ID_NET_DRIVER=dummy' in ret.stdout.rstrip():
101 support = True
371810d1 102 call('ip link del dummy99')
1ca44d7d
YW
103
104 if support:
105 return func
106 else:
107 return unittest.expectedFailure(func)
108
109 return f
110
1f0e3109 111def setUpModule():
1f0e3109
SS
112 os.makedirs(network_unit_file_path, exist_ok=True)
113 os.makedirs(networkd_ci_path, exist_ok=True)
114
115 shutil.rmtree(networkd_ci_path)
6aea9276 116 copytree(os.path.join(os.path.dirname(os.path.abspath(__file__)), 'conf'), networkd_ci_path)
1f0e3109 117
371810d1
ZJS
118 check_output('systemctl stop systemd-networkd.socket')
119 check_output('systemctl stop systemd-networkd.service')
c0bf6733 120
9c1ae484
YW
121 drop_in = [
122 '[Service]',
123 'Restart=no',
124 'ExecStart=',
125 ]
126 if use_valgrind:
127 drop_in += [
128 'ExecStart=!!valgrind --track-origins=yes --leak-check=full --show-leak-kinds=all ' + networkd_bin,
94c03122 129 'PrivateTmp=yes'
9c1ae484
YW
130 ]
131 else:
132 drop_in += ['ExecStart=!!' + networkd_bin]
133 if enable_debug:
134 drop_in += ['Environment=SYSTEMD_LOG_LEVEL=debug']
94c03122
YW
135 if asan_options:
136 drop_in += ['Environment=ASAN_OPTIONS="' + asan_options + '"']
fa4c6095
YW
137 if lsan_options:
138 drop_in += ['Environment=LSAN_OPTIONS="' + lsan_options + '"']
94c03122
YW
139 if ubsan_options:
140 drop_in += ['Environment=UBSAN_OPTIONS="' + ubsan_options + '"']
78690bb5
YW
141 if asan_options or lsan_options or ubsan_options:
142 drop_in += ['SystemCallFilter=']
fa4c6095 143 if use_valgrind or asan_options or lsan_options or ubsan_options:
94c03122 144 drop_in += ['MemoryDenyWriteExecute=no']
9c1ae484 145
9c1ae484
YW
146 os.makedirs('/run/systemd/system/systemd-networkd.service.d', exist_ok=True)
147 with open('/run/systemd/system/systemd-networkd.service.d/00-override.conf', mode='w') as f:
72917fcc 148 f.write('\n'.join(drop_in))
9c1ae484 149
371810d1
ZJS
150 check_output('systemctl daemon-reload')
151 print(check_output('systemctl cat systemd-networkd.service'))
9c1ae484 152
1f0e3109
SS
153def tearDownModule():
154 shutil.rmtree(networkd_ci_path)
d4fda2a5 155
371810d1 156 check_output('systemctl stop systemd-networkd.service')
d4fda2a5 157
9c1ae484 158 shutil.rmtree('/run/systemd/system/systemd-networkd.service.d')
371810d1 159 check_output('systemctl daemon-reload')
1f0e3109 160
371810d1
ZJS
161 check_output('systemctl start systemd-networkd.socket')
162 check_output('systemctl start systemd-networkd.service')
c0bf6733 163
ec38833c
ZJS
164def read_link_attr(link, dev, attribute):
165 with open(os.path.join(os.path.join(os.path.join('/sys/class/net/', link), dev), attribute)) as f:
166 return f.readline().strip()
167
168def read_bridge_port_attr(bridge, link, attribute):
169 path_bridge = os.path.join('/sys/devices/virtual/net', bridge)
170 path_port = 'lower_' + link + '/brport'
171 path = os.path.join(path_bridge, path_port)
172
173 with open(os.path.join(path, attribute)) as f:
174 return f.readline().strip()
175
176def link_exists(link):
177 return os.path.exists(os.path.join('/sys/class/net', link))
178
179def remove_links(links):
180 for link in links:
181 if link_exists(link):
182 call('ip link del dev', link)
183 time.sleep(1)
184
185def remove_fou_ports(ports):
186 for port in ports:
5239d7b3 187 call('ip fou del port', port, stdout=subprocess.DEVNULL, stderr=subprocess.DEVNULL)
ec38833c
ZJS
188
189def remove_routing_policy_rule_tables(tables):
190 for table in tables:
5239d7b3 191 call('ip rule del table', table, stdout=subprocess.DEVNULL, stderr=subprocess.DEVNULL)
ec38833c
ZJS
192
193def remove_routes(routes):
194 for route_type, addr in routes:
5239d7b3 195 call('ip route del', route_type, addr, stdout=subprocess.DEVNULL, stderr=subprocess.DEVNULL)
ec38833c
ZJS
196
197def l2tp_tunnel_remove(tunnel_ids):
198 output = check_output('ip l2tp show tunnel')
199 for tid in tunnel_ids:
200 words='Tunnel ' + tid + ', encap'
201 if words in output:
202 call('ip l2tp del tunnel tid', tid)
203 time.sleep(1)
204
205def read_ipv6_sysctl_attr(link, attribute):
206 with open(os.path.join(os.path.join(network_sysctl_ipv6_path, link), attribute)) as f:
207 return f.readline().strip()
208
209def read_ipv4_sysctl_attr(link, attribute):
210 with open(os.path.join(os.path.join(network_sysctl_ipv4_path, link), attribute)) as f:
211 return f.readline().strip()
212
213def copy_unit_to_networkd_unit_path(*units):
214 print()
215 for unit in units:
216 shutil.copy(os.path.join(networkd_ci_path, unit), network_unit_file_path)
217 if (os.path.exists(os.path.join(networkd_ci_path, unit + '.d'))):
218 copytree(os.path.join(networkd_ci_path, unit + '.d'), os.path.join(network_unit_file_path, unit + '.d'))
219
220def remove_unit_from_networkd_path(units):
221 for unit in units:
222 if (os.path.exists(os.path.join(network_unit_file_path, unit))):
223 os.remove(os.path.join(network_unit_file_path, unit))
224 if (os.path.exists(os.path.join(network_unit_file_path, unit + '.d'))):
225 shutil.rmtree(os.path.join(network_unit_file_path, unit + '.d'))
226
227def warn_about_firewalld():
228 rc = call('systemctl -q is-active firewalld.service')
229 if rc == 0:
230 print('\nWARNING: firewalld.service is active. The test may fail.')
231
232def start_dnsmasq(additional_options='', ipv4_range='192.168.5.10,192.168.5.200', ipv6_range='2600::10,2600::20', lease_time='1h'):
233 warn_about_firewalld()
234 dnsmasq_command = f'dnsmasq -8 /var/run/networkd-ci/test-dnsmasq-log-file --log-queries=extra --log-dhcp --pid-file=/var/run/networkd-ci/test-test-dnsmasq.pid --conf-file=/dev/null --interface=veth-peer --enable-ra --dhcp-range={ipv6_range},{lease_time} --dhcp-range={ipv4_range},{lease_time} -R --dhcp-leasefile=/var/run/networkd-ci/lease --dhcp-option=26,1492 --dhcp-option=option:router,192.168.5.1 --dhcp-option=33,192.168.5.4,192.168.5.5 --port=0 ' + additional_options
235 check_output(dnsmasq_command)
236
237def stop_dnsmasq(pid_file):
238 if os.path.exists(pid_file):
239 with open(pid_file, 'r') as f:
240 pid = f.read().rstrip(' \t\r\n\0')
241 os.kill(int(pid), signal.SIGTERM)
242
243 os.remove(pid_file)
244
245def search_words_in_dnsmasq_log(words, show_all=False):
246 if os.path.exists(dnsmasq_log_file):
247 with open (dnsmasq_log_file) as in_file:
248 contents = in_file.read()
249 if show_all:
250 print(contents)
251 for line in contents.splitlines():
252 if words in line:
253 in_file.close()
254 print("%s, %s" % (words, line))
255 return True
256 return False
257
258def remove_lease_file():
259 if os.path.exists(os.path.join(networkd_ci_path, 'lease')):
260 os.remove(os.path.join(networkd_ci_path, 'lease'))
261
262def remove_log_file():
263 if os.path.exists(dnsmasq_log_file):
264 os.remove(dnsmasq_log_file)
265
266def start_networkd(sleep_sec=5, remove_state_files=True):
267 if (remove_state_files and
268 os.path.exists(os.path.join(networkd_runtime_directory, 'state'))):
269 check_output('systemctl stop systemd-networkd')
270 os.remove(os.path.join(networkd_runtime_directory, 'state'))
271 check_output('systemctl start systemd-networkd')
272 else:
273 check_output('systemctl restart systemd-networkd')
274 if sleep_sec > 0:
275 time.sleep(sleep_sec)
276
277def wait_online(links_with_operstate, timeout='20s', bool_any=False):
278 args = wait_online_cmd + [f'--timeout={timeout}'] + [f'--interface={link}' for link in links_with_operstate]
279 if bool_any:
280 args += ['--any']
281 try:
282 check_output(*args, env=env)
283 except subprocess.CalledProcessError:
284 for link in links_with_operstate:
285 output = check_output(*networkctl_cmd, 'status', link.split(':')[0], env=env)
286 print(output)
287 raise
4d7ed14f 288
ec38833c
ZJS
289def get_operstate(link, show_status=True, setup_state='configured'):
290 output = check_output(*networkctl_cmd, 'status', link, env=env)
291 if show_status:
292 print(output)
293 for line in output.splitlines():
294 if 'State:' in line and (not setup_state or setup_state in line):
295 return line.split()[1]
296 return None
1f0e3109 297
ec38833c 298class Utilities():
e39cc445 299 def check_link_exists(self, link):
ec38833c 300 self.assertTrue(link_exists(link))
2be0b6fc
YW
301
302 def check_operstate(self, link, expected, show_status=True, setup_state='configured'):
ec38833c 303 self.assertRegex(get_operstate(link, show_status, setup_state), expected)
2be0b6fc 304
53c32c2b 305 def wait_address(self, link, address_regex, scope='global', ipv='', timeout_sec=100):
2629df47
YW
306 for i in range(timeout_sec):
307 if i > 0:
308 time.sleep(1)
371810d1 309 output = check_output(f'ip {ipv} address show dev {link} scope {scope}')
2629df47
YW
310 if re.search(address_regex, output):
311 break
312 else:
313 self.assertRegex(output, address_regex)
314
1ca44d7d
YW
315class NetworkctlTests(unittest.TestCase, Utilities):
316
317 links = [
318 'test1',
319 'veth99',
320 ]
321
322 units = [
323 '11-dummy.netdev',
6d5b4efe 324 '11-dummy-mtu.netdev',
1ca44d7d
YW
325 '11-dummy.network',
326 '25-veth.netdev',
327 'netdev-link-local-addressing-yes.network',
328 ]
329
330 def setUp(self):
ec38833c 331 remove_links(self.links)
1ca44d7d
YW
332
333 def tearDown(self):
ec38833c
ZJS
334 remove_links(self.links)
335 remove_unit_from_networkd_path(self.units)
1ca44d7d
YW
336
337 def test_glob(self):
ec38833c
ZJS
338 copy_unit_to_networkd_unit_path('11-dummy.netdev', '11-dummy.network')
339 start_networkd(0)
1ca44d7d 340
ec38833c 341 wait_online(['test1:degraded'])
1ca44d7d 342
371810d1 343 output = check_output(*networkctl_cmd, 'list', env=env)
1ca44d7d
YW
344 self.assertRegex(output, '1 lo ')
345 self.assertRegex(output, 'test1')
346
371810d1 347 output = check_output(*networkctl_cmd, 'list', 'test1', env=env)
1ca44d7d
YW
348 self.assertNotRegex(output, '1 lo ')
349 self.assertRegex(output, 'test1')
350
371810d1 351 output = check_output(*networkctl_cmd, 'list', 'te*', env=env)
1ca44d7d
YW
352 self.assertNotRegex(output, '1 lo ')
353 self.assertRegex(output, 'test1')
354
371810d1 355 output = check_output(*networkctl_cmd, 'status', 'te*', env=env)
1ca44d7d
YW
356 self.assertNotRegex(output, '1: lo ')
357 self.assertRegex(output, 'test1')
358
371810d1 359 output = check_output(*networkctl_cmd, 'status', 'tes[a-z][0-9]', env=env)
1ca44d7d
YW
360 self.assertNotRegex(output, '1: lo ')
361 self.assertRegex(output, 'test1')
362
6d5b4efe 363 def test_mtu(self):
ec38833c
ZJS
364 copy_unit_to_networkd_unit_path('11-dummy-mtu.netdev', '11-dummy.network')
365 start_networkd(0)
6d5b4efe 366
ec38833c 367 wait_online(['test1:degraded'])
6d5b4efe 368
371810d1 369 output = check_output(*networkctl_cmd, 'status', 'test1', env=env)
6d5b4efe
YW
370 self.assertRegex(output, 'MTU: 1600')
371
1ca44d7d
YW
372 @expectedFailureIfEthtoolDoesNotSupportDriver()
373 def test_udev_driver(self):
ec38833c
ZJS
374 copy_unit_to_networkd_unit_path('11-dummy.netdev', '11-dummy.network',
375 '25-veth.netdev', 'netdev-link-local-addressing-yes.network')
376 start_networkd(0)
1ca44d7d 377
ec38833c 378 wait_online(['test1:degraded', 'veth99:degraded', 'veth-peer:degraded'])
1ca44d7d 379
371810d1 380 output = check_output(*networkctl_cmd, 'status', 'test1', env=env)
1ca44d7d
YW
381 self.assertRegex(output, 'Driver: dummy')
382
371810d1 383 output = check_output(*networkctl_cmd, 'status', 'veth99', env=env)
1ca44d7d
YW
384 self.assertRegex(output, 'Driver: veth')
385
371810d1 386 output = check_output(*networkctl_cmd, 'status', 'veth-peer', env=env)
1ca44d7d 387 self.assertRegex(output, 'Driver: veth')
2be0b6fc 388
bee692fd 389 def test_delete_links(self):
ec38833c
ZJS
390 copy_unit_to_networkd_unit_path('11-dummy.netdev', '11-dummy.network',
391 '25-veth.netdev', 'netdev-link-local-addressing-yes.network')
392 start_networkd(0)
bee692fd 393
ec38833c 394 wait_online(['test1:degraded', 'veth99:degraded', 'veth-peer:degraded'])
bee692fd 395
371810d1 396 check_output(*networkctl_cmd, 'delete', 'test1', 'veth99')
ec38833c
ZJS
397 self.assertFalse(link_exists('test1'))
398 self.assertFalse(link_exists('veth99'))
399 self.assertFalse(link_exists('veth-peer'))
bee692fd 400
1f0e3109
SS
401class NetworkdNetDevTests(unittest.TestCase, Utilities):
402
09ea6724
YW
403 links =[
404 '6rdtun99',
405 'bond99',
406 'bridge99',
407 'dropin-test',
408 'dummy98',
6a97a864
YW
409 'erspan98',
410 'erspan99',
09ea6724 411 'geneve99',
4b6a6d1e 412 'gretap96',
6a97a864 413 'gretap98',
09ea6724 414 'gretap99',
4b6a6d1e 415 'gretun96',
6a97a864
YW
416 'gretun97',
417 'gretun98',
09ea6724 418 'gretun99',
6a97a864 419 'ip6gretap98',
09ea6724 420 'ip6gretap99',
6a97a864
YW
421 'ip6gretun97',
422 'ip6gretun98',
423 'ip6gretun99',
424 'ip6tnl97',
425 'ip6tnl98',
09ea6724 426 'ip6tnl99',
4b6a6d1e 427 'ipiptun96',
6a97a864
YW
428 'ipiptun97',
429 'ipiptun98',
09ea6724
YW
430 'ipiptun99',
431 'ipvlan99',
956c8fec 432 'ipvtap99',
09ea6724
YW
433 'isataptun99',
434 'macvlan99',
435 'macvtap99',
811f33d0 436 'nlmon99',
4b6a6d1e 437 'sittun96',
6a97a864
YW
438 'sittun97',
439 'sittun98',
09ea6724
YW
440 'sittun99',
441 'tap99',
442 'test1',
443 'tun99',
444 'vcan99',
445 'veth99',
446 'vlan99',
447 'vrf99',
6a97a864
YW
448 'vti6tun97',
449 'vti6tun98',
09ea6724 450 'vti6tun99',
6a97a864
YW
451 'vtitun97',
452 'vtitun98',
09ea6724 453 'vtitun99',
f63b14d3 454 'vxcan99',
09ea6724 455 'vxlan99',
da44fb8a 456 'wg98',
09ea6724
YW
457 'wg99']
458
459 units = [
460 '10-dropin-test.netdev',
461 '11-dummy.netdev',
03db80b2 462 '11-dummy.network',
09ea6724 463 '12-dummy.netdev',
753e0a24 464 '15-name-conflict-test.netdev',
09ea6724
YW
465 '21-macvlan.netdev',
466 '21-macvtap.netdev',
7f45d738 467 '21-vlan-test1.network',
09ea6724
YW
468 '21-vlan.netdev',
469 '21-vlan.network',
470 '25-6rd-tunnel.netdev',
471 '25-bond.netdev',
fde60a42 472 '25-bond-balanced-tlb.netdev',
09ea6724 473 '25-bridge.netdev',
03db80b2 474 '25-bridge.network',
6a97a864 475 '25-erspan-tunnel-local-any.netdev',
09ea6724 476 '25-erspan-tunnel.netdev',
4b6a6d1e
YW
477 '25-fou-gretap.netdev',
478 '25-fou-gre.netdev',
479 '25-fou-ipip.netdev',
480 '25-fou-ipproto-gre.netdev',
481 '25-fou-ipproto-ipip.netdev',
482 '25-fou-sit.netdev',
09ea6724 483 '25-geneve.netdev',
6a97a864 484 '25-gretap-tunnel-local-any.netdev',
09ea6724 485 '25-gretap-tunnel.netdev',
6a97a864
YW
486 '25-gre-tunnel-local-any.netdev',
487 '25-gre-tunnel-remote-any.netdev',
09ea6724 488 '25-gre-tunnel.netdev',
6a97a864
YW
489 '25-ip6gretap-tunnel-local-any.netdev',
490 '25-ip6gretap-tunnel.netdev',
491 '25-ip6gre-tunnel-local-any.netdev',
492 '25-ip6gre-tunnel-remote-any.netdev',
09ea6724 493 '25-ip6gre-tunnel.netdev',
6a97a864
YW
494 '25-ip6tnl-tunnel-remote-any.netdev',
495 '25-ip6tnl-tunnel-local-any.netdev',
09ea6724
YW
496 '25-ip6tnl-tunnel.netdev',
497 '25-ipip-tunnel-independent.netdev',
6a97a864
YW
498 '25-ipip-tunnel-local-any.netdev',
499 '25-ipip-tunnel-remote-any.netdev',
09ea6724
YW
500 '25-ipip-tunnel.netdev',
501 '25-ipvlan.netdev',
956c8fec 502 '25-ipvtap.netdev',
09ea6724 503 '25-isatap-tunnel.netdev',
02849d8b
YW
504 '25-macsec.key',
505 '25-macsec.netdev',
506 '25-macsec.network',
811f33d0 507 '25-nlmon.netdev',
6a97a864
YW
508 '25-sit-tunnel-local-any.netdev',
509 '25-sit-tunnel-remote-any.netdev',
09ea6724
YW
510 '25-sit-tunnel.netdev',
511 '25-tap.netdev',
512 '25-tun.netdev',
11309591
YW
513 '25-tunnel-local-any.network',
514 '25-tunnel-remote-any.network',
515 '25-tunnel.network',
09ea6724
YW
516 '25-vcan.netdev',
517 '25-veth.netdev',
518 '25-vrf.netdev',
6a97a864
YW
519 '25-vti6-tunnel-local-any.netdev',
520 '25-vti6-tunnel-remote-any.netdev',
09ea6724 521 '25-vti6-tunnel.netdev',
6a97a864
YW
522 '25-vti-tunnel-local-any.netdev',
523 '25-vti-tunnel-remote-any.netdev',
09ea6724 524 '25-vti-tunnel.netdev',
f63b14d3 525 '25-vxcan.netdev',
09ea6724 526 '25-vxlan.netdev',
da44fb8a
YW
527 '25-wireguard-23-peers.netdev',
528 '25-wireguard-23-peers.network',
9e5d79e7 529 '25-wireguard-preshared-key.txt',
39bcff3b 530 '25-wireguard-private-key.txt',
09ea6724 531 '25-wireguard.netdev',
5a0bd90b 532 '25-wireguard.network',
09ea6724 533 '6rd.network',
6730a1f3 534 'erspan.network',
09ea6724
YW
535 'gre.network',
536 'gretap.network',
537 'gretun.network',
538 'ip6gretap.network',
6a97a864 539 'ip6gretun.network',
09ea6724
YW
540 'ip6tnl.network',
541 'ipip.network',
542 'ipvlan.network',
956c8fec 543 'ipvtap.network',
09ea6724 544 'isatap.network',
02849d8b 545 'macsec.network',
09ea6724
YW
546 'macvlan.network',
547 'macvtap.network',
077f9abc 548 'netdev-link-local-addressing-yes.network',
09ea6724
YW
549 'sit.network',
550 'vti6.network',
551 'vti.network',
1c862fe0 552 'vxlan-test1.network',
09ea6724 553 'vxlan.network']
1f0e3109 554
def9fc0d
YW
555 fou_ports = [
556 '55555',
557 '55556']
558
1f0e3109 559 def setUp(self):
ec38833c
ZJS
560 remove_fou_ports(self.fou_ports)
561 remove_links(self.links)
1f0e3109
SS
562
563 def tearDown(self):
ec38833c
ZJS
564 remove_fou_ports(self.fou_ports)
565 remove_links(self.links)
566 remove_unit_from_networkd_path(self.units)
1f0e3109 567
1ca44d7d 568 def test_dropin_and_name_conflict(self):
ec38833c
ZJS
569 copy_unit_to_networkd_unit_path('10-dropin-test.netdev', '15-name-conflict-test.netdev')
570 start_networkd(0)
d80734f7 571
ec38833c 572 wait_online(['dropin-test:off'])
d80734f7 573
371810d1 574 output = check_output('ip link show dropin-test')
d80734f7
YW
575 print(output)
576 self.assertRegex(output, '00:50:56:c0:00:28')
577
03db80b2 578 def test_wait_online_any(self):
ec38833c
ZJS
579 copy_unit_to_networkd_unit_path('25-bridge.netdev', '25-bridge.network', '11-dummy.netdev', '11-dummy.network')
580 start_networkd(0)
03db80b2 581
ec38833c 582 wait_online(['bridge99', 'test1:degraded'], bool_any=True)
03db80b2 583
791c1140
YW
584 self.check_operstate('bridge99', '(?:off|no-carrier)', setup_state='configuring')
585 self.check_operstate('test1', 'degraded')
03db80b2 586
1f0e3109 587 def test_bridge(self):
ec38833c
ZJS
588 copy_unit_to_networkd_unit_path('25-bridge.netdev')
589 start_networkd(0)
1f0e3109 590
ec38833c 591 wait_online(['bridge99:off'])
1f0e3109 592
3d165124 593 tick = os.sysconf('SC_CLK_TCK')
ec38833c
ZJS
594 self.assertEqual(9, round(float(read_link_attr('bridge99', 'bridge', 'hello_time')) / tick))
595 self.assertEqual(9, round(float(read_link_attr('bridge99', 'bridge', 'max_age')) / tick))
596 self.assertEqual(9, round(float(read_link_attr('bridge99', 'bridge','forward_delay')) / tick))
597 self.assertEqual(9, round(float(read_link_attr('bridge99', 'bridge','ageing_time')) / tick))
598 self.assertEqual(9, int(read_link_attr('bridge99', 'bridge','priority')))
599 self.assertEqual(1, int(read_link_attr('bridge99', 'bridge','multicast_querier')))
600 self.assertEqual(1, int(read_link_attr('bridge99', 'bridge','multicast_snooping')))
601 self.assertEqual(1, int(read_link_attr('bridge99', 'bridge','stp_state')))
1f0e3109
SS
602
603 def test_bond(self):
ec38833c
ZJS
604 copy_unit_to_networkd_unit_path('25-bond.netdev', '25-bond-balanced-tlb.netdev')
605 start_networkd(0)
606
607 wait_online(['bond99:off', 'bond98:off'])
608
609 self.assertEqual('802.3ad 4', read_link_attr('bond99', 'bonding', 'mode'))
610 self.assertEqual('layer3+4 1', read_link_attr('bond99', 'bonding', 'xmit_hash_policy'))
611 self.assertEqual('1000', read_link_attr('bond99', 'bonding', 'miimon'))
612 self.assertEqual('fast 1', read_link_attr('bond99', 'bonding', 'lacp_rate'))
613 self.assertEqual('2000', read_link_attr('bond99', 'bonding', 'updelay'))
614 self.assertEqual('2000', read_link_attr('bond99', 'bonding', 'downdelay'))
615 self.assertEqual('4', read_link_attr('bond99', 'bonding', 'resend_igmp'))
616 self.assertEqual('1', read_link_attr('bond99', 'bonding', 'min_links'))
617 self.assertEqual('1218', read_link_attr('bond99', 'bonding', 'ad_actor_sys_prio'))
618 self.assertEqual('811', read_link_attr('bond99', 'bonding', 'ad_user_port_key'))
619 self.assertEqual('00:11:22:33:44:55', read_link_attr('bond99', 'bonding', 'ad_actor_system'))
620
621 self.assertEqual('balance-tlb 5', read_link_attr('bond98', 'bonding', 'mode'))
622 self.assertEqual('1', read_link_attr('bond98', 'bonding', 'tlb_dynamic_lb'))
fde60a42 623
1f0e3109 624 def test_vlan(self):
ec38833c
ZJS
625 copy_unit_to_networkd_unit_path('21-vlan.netdev', '11-dummy.netdev',
626 '21-vlan.network', '21-vlan-test1.network')
627 start_networkd(0)
1f0e3109 628
ec38833c 629 wait_online(['test1:degraded', 'vlan99:routable'])
1f0e3109 630
371810d1 631 output = check_output('ip -d link show test1')
72b7f1b9 632 print(output)
7d7be1b9 633 self.assertRegex(output, ' mtu 2000 ')
72b7f1b9 634
371810d1 635 output = check_output('ip -d link show vlan99')
14ecd604 636 print(output)
06895a1d
YW
637 self.assertRegex(output, ' mtu 2000 ')
638 self.assertRegex(output, 'REORDER_HDR')
639 self.assertRegex(output, 'LOOSE_BINDING')
640 self.assertRegex(output, 'GVRP')
641 self.assertRegex(output, 'MVRP')
642 self.assertRegex(output, ' id 99 ')
1f0e3109 643
371810d1 644 output = check_output('ip -4 address show dev test1')
7f45d738
YW
645 print(output)
646 self.assertRegex(output, 'inet 192.168.24.5/24 brd 192.168.24.255 scope global test1')
647 self.assertRegex(output, 'inet 192.168.25.5/24 brd 192.168.25.255 scope global test1')
648
371810d1 649 output = check_output('ip -4 address show dev vlan99')
7f45d738
YW
650 print(output)
651 self.assertRegex(output, 'inet 192.168.23.5/24 brd 192.168.23.255 scope global vlan99')
652
1f0e3109 653 def test_macvtap(self):
460feb61
YW
654 for mode in ['private', 'vepa', 'bridge', 'passthru']:
655 with self.subTest(mode=mode):
656 if mode != 'private':
657 self.tearDown()
ec38833c
ZJS
658 copy_unit_to_networkd_unit_path('21-macvtap.netdev', 'netdev-link-local-addressing-yes.network',
659 '11-dummy.netdev', 'macvtap.network')
460feb61
YW
660 with open(os.path.join(network_unit_file_path, '21-macvtap.netdev'), mode='a') as f:
661 f.write('[MACVTAP]\nMode=' + mode)
ec38833c 662 start_networkd(0)
1f0e3109 663
ec38833c 664 wait_online(['macvtap99:degraded', 'test1:degraded'])
460feb61 665
371810d1 666 output = check_output('ip -d link show macvtap99')
460feb61
YW
667 print(output)
668 self.assertRegex(output, 'macvtap mode ' + mode + ' ')
1f0e3109
SS
669
670 def test_macvlan(self):
dff9792b
YW
671 for mode in ['private', 'vepa', 'bridge', 'passthru']:
672 with self.subTest(mode=mode):
673 if mode != 'private':
674 self.tearDown()
ec38833c
ZJS
675 copy_unit_to_networkd_unit_path('21-macvlan.netdev', 'netdev-link-local-addressing-yes.network',
676 '11-dummy.netdev', 'macvlan.network')
dff9792b
YW
677 with open(os.path.join(network_unit_file_path, '21-macvlan.netdev'), mode='a') as f:
678 f.write('[MACVLAN]\nMode=' + mode)
ec38833c 679 start_networkd(0)
dff9792b 680
ec38833c 681 wait_online(['macvlan99:degraded', 'test1:degraded'])
dff9792b 682
371810d1 683 output = check_output('ip -d link show test1')
dff9792b
YW
684 print(output)
685 self.assertRegex(output, ' mtu 2000 ')
72b7f1b9 686
371810d1 687 output = check_output('ip -d link show macvlan99')
dff9792b
YW
688 print(output)
689 self.assertRegex(output, ' mtu 2000 ')
690 self.assertRegex(output, 'macvlan mode ' + mode + ' ')
72b7f1b9 691
7a0a37b2 692 @expectedFailureIfModuleIsNotAvailable('ipvlan')
1f0e3109 693 def test_ipvlan(self):
bc6dff6e
YW
694 for mode, flag in [['L2', 'private'], ['L3', 'vepa'], ['L3S', 'bridge']]:
695 with self.subTest(mode=mode, flag=flag):
696 if mode != 'L2':
697 self.tearDown()
ec38833c
ZJS
698 copy_unit_to_networkd_unit_path('25-ipvlan.netdev', 'netdev-link-local-addressing-yes.network',
699 '11-dummy.netdev', 'ipvlan.network')
bc6dff6e
YW
700 with open(os.path.join(network_unit_file_path, '25-ipvlan.netdev'), mode='a') as f:
701 f.write('[IPVLAN]\nMode=' + mode + '\nFlags=' + flag)
1f0e3109 702
ec38833c
ZJS
703 start_networkd(0)
704 wait_online(['ipvlan99:degraded', 'test1:degraded'])
bc6dff6e 705
371810d1 706 output = check_output('ip -d link show ipvlan99')
bc6dff6e
YW
707 print(output)
708 self.assertRegex(output, 'ipvlan *mode ' + mode.lower() + ' ' + flag)
1f0e3109 709
956c8fec
YW
710 @expectedFailureIfModuleIsNotAvailable('ipvtap')
711 def test_ipvtap(self):
40921f08
YW
712 for mode, flag in [['L2', 'private'], ['L3', 'vepa'], ['L3S', 'bridge']]:
713 with self.subTest(mode=mode, flag=flag):
714 if mode != 'L2':
715 self.tearDown()
ec38833c
ZJS
716 copy_unit_to_networkd_unit_path('25-ipvtap.netdev', 'netdev-link-local-addressing-yes.network',
717 '11-dummy.netdev', 'ipvtap.network')
40921f08
YW
718 with open(os.path.join(network_unit_file_path, '25-ipvtap.netdev'), mode='a') as f:
719 f.write('[IPVTAP]\nMode=' + mode + '\nFlags=' + flag)
720
ec38833c
ZJS
721 start_networkd(0)
722 wait_online(['ipvtap99:degraded', 'test1:degraded'])
956c8fec 723
371810d1 724 output = check_output('ip -d link show ipvtap99')
40921f08
YW
725 print(output)
726 self.assertRegex(output, 'ipvtap *mode ' + mode.lower() + ' ' + flag)
956c8fec 727
1f0e3109 728 def test_veth(self):
ec38833c
ZJS
729 copy_unit_to_networkd_unit_path('25-veth.netdev', 'netdev-link-local-addressing-yes.network')
730 start_networkd(0)
1f0e3109 731
ec38833c 732 wait_online(['veth99:degraded', 'veth-peer:degraded'])
671dacdf 733
371810d1 734 output = check_output('ip -d link show veth99')
671dacdf
YW
735 print(output)
736 self.assertRegex(output, 'link/ether 12:34:56:78:9a:bc')
371810d1 737 output = check_output('ip -d link show veth-peer')
671dacdf
YW
738 print(output)
739 self.assertRegex(output, 'link/ether 12:34:56:78:9a:bd')
1f0e3109 740
1f0e3109 741 def test_tun(self):
ec38833c
ZJS
742 copy_unit_to_networkd_unit_path('25-tun.netdev')
743 start_networkd(0)
1f0e3109 744
ec38833c 745 wait_online(['tun99:off'])
1f0e3109 746
371810d1 747 output = check_output('ip -d link show tun99')
2746d307
YW
748 print(output)
749 # Old ip command does not support IFF_ flags
750 self.assertRegex(output, 'tun (?:type tun pi on vnet_hdr on multi_queue|addrgenmode) ')
751
1f0e3109 752 def test_tap(self):
ec38833c
ZJS
753 copy_unit_to_networkd_unit_path('25-tap.netdev')
754 start_networkd(0)
1f0e3109 755
ec38833c 756 wait_online(['tap99:off'])
1f0e3109 757
371810d1 758 output = check_output('ip -d link show tap99')
2746d307
YW
759 print(output)
760 # Old ip command does not support IFF_ flags
761 self.assertRegex(output, 'tun (?:type tap pi on vnet_hdr on multi_queue|addrgenmode) ')
762
7a0a37b2 763 @expectedFailureIfModuleIsNotAvailable('vrf')
1f0e3109 764 def test_vrf(self):
ec38833c
ZJS
765 copy_unit_to_networkd_unit_path('25-vrf.netdev', 'netdev-link-local-addressing-yes.network')
766 start_networkd(0)
1f0e3109 767
ec38833c 768 wait_online(['vrf99:carrier'])
1f0e3109 769
7a0a37b2 770 @expectedFailureIfModuleIsNotAvailable('vcan')
1f0e3109 771 def test_vcan(self):
ec38833c
ZJS
772 copy_unit_to_networkd_unit_path('25-vcan.netdev', 'netdev-link-local-addressing-yes.network')
773 start_networkd(0)
1f0e3109 774
ec38833c 775 wait_online(['vcan99:carrier'])
1f0e3109 776
f63b14d3
YW
777 @expectedFailureIfModuleIsNotAvailable('vxcan')
778 def test_vxcan(self):
ec38833c
ZJS
779 copy_unit_to_networkd_unit_path('25-vxcan.netdev', 'netdev-link-local-addressing-yes.network')
780 start_networkd(0)
f63b14d3 781
ec38833c 782 wait_online(['vxcan99:carrier', 'vxcan-peer:carrier'])
f63b14d3 783
7a3bc5a8
EV
784 @expectedFailureIfModuleIsNotAvailable('wireguard')
785 def test_wireguard(self):
ec38833c
ZJS
786 copy_unit_to_networkd_unit_path('25-wireguard.netdev', '25-wireguard.network',
787 '25-wireguard-23-peers.netdev', '25-wireguard-23-peers.network',
788 '25-wireguard-preshared-key.txt', '25-wireguard-private-key.txt')
789 start_networkd(0)
790 wait_online(['wg99:carrier', 'wg98:routable'])
5a0bd90b 791
7a3bc5a8 792 if shutil.which('wg'):
371810d1 793 call('wg')
5a0bd90b 794
371810d1 795 output = check_output('wg show wg99 listen-port')
06895a1d 796 self.assertRegex(output, '51820')
371810d1 797 output = check_output('wg show wg99 fwmark')
06895a1d 798 self.assertRegex(output, '0x4d2')
371810d1 799 output = check_output('wg show wg99 allowed-ips')
88aaf89e
ZJS
800 self.assertRegex(output, r'RDf\+LSpeEre7YEIKaxg\+wbpsNV7du\+ktR99uBEtIiCA=\t192.168.26.0/24 fd31:bf08:57cb::/48')
801 self.assertRegex(output, r'lsDtM3AbjxNlauRKzHEPfgS1Zp7cp/VX5Use/P4PQSc=\tfdbc:bae2:7871:e1fe:793:8636::/96 fdbc:bae2:7871:500:e1fe:793:8636:dad1/128')
371810d1 802 output = check_output('wg show wg99 persistent-keepalive')
88aaf89e 803 self.assertRegex(output, r'RDf\+LSpeEre7YEIKaxg\+wbpsNV7du\+ktR99uBEtIiCA=\t20')
371810d1 804 output = check_output('wg show wg99 endpoints')
88aaf89e 805 self.assertRegex(output, r'RDf\+LSpeEre7YEIKaxg\+wbpsNV7du\+ktR99uBEtIiCA=\t192.168.27.3:51820')
371810d1 806 output = check_output('wg show wg99 private-key')
88aaf89e 807 self.assertRegex(output, r'EEGlnEPYJV//kbvvIqxKkQwOiS\+UENyPncC4bF46ong=')
371810d1 808 output = check_output('wg show wg99 preshared-keys')
88aaf89e
ZJS
809 self.assertRegex(output, r'RDf\+LSpeEre7YEIKaxg\+wbpsNV7du\+ktR99uBEtIiCA= IIWIV17wutHv7t4cR6pOT91z6NSz/T8Arh0yaywhw3M=')
810 self.assertRegex(output, r'lsDtM3AbjxNlauRKzHEPfgS1Zp7cp/VX5Use/P4PQSc= cPLOy1YUrEI0EMMIycPJmOo0aTu3RZnw8bL5meVD6m0=')
7a3bc5a8 811
371810d1 812 output = check_output('wg show wg98 private-key')
88aaf89e 813 self.assertRegex(output, r'CJQUtcS9emY2fLYqDlpSZiE/QJyHkPWr\+WHtZLZ90FU=')
da44fb8a 814
1f0e3109 815 def test_geneve(self):
ec38833c
ZJS
816 copy_unit_to_networkd_unit_path('25-geneve.netdev', 'netdev-link-local-addressing-yes.network')
817 start_networkd(0)
1f0e3109 818
ec38833c 819 wait_online(['geneve99:degraded'])
1f0e3109 820
371810d1 821 output = check_output('ip -d link show geneve99')
14ecd604 822 print(output)
06895a1d
YW
823 self.assertRegex(output, '192.168.22.1')
824 self.assertRegex(output, '6082')
825 self.assertRegex(output, 'udpcsum')
826 self.assertRegex(output, 'udp6zerocsumrx')
1f0e3109
SS
827
828 def test_ipip_tunnel(self):
ec38833c
ZJS
829 copy_unit_to_networkd_unit_path('12-dummy.netdev', 'ipip.network',
830 '25-ipip-tunnel.netdev', '25-tunnel.network',
831 '25-ipip-tunnel-local-any.netdev', '25-tunnel-local-any.network',
832 '25-ipip-tunnel-remote-any.netdev', '25-tunnel-remote-any.network')
833 start_networkd(0)
834 wait_online(['ipiptun99:routable', 'ipiptun98:routable', 'ipiptun97:routable', 'dummy98:degraded'])
6a97a864 835
371810d1 836 output = check_output('ip -d link show ipiptun99')
6a97a864
YW
837 print(output)
838 self.assertRegex(output, 'ipip (?:ipip |)remote 192.169.224.239 local 192.168.223.238 dev dummy98')
371810d1 839 output = check_output('ip -d link show ipiptun98')
6a97a864
YW
840 print(output)
841 self.assertRegex(output, 'ipip (?:ipip |)remote 192.169.224.239 local any dev dummy98')
371810d1 842 output = check_output('ip -d link show ipiptun97')
6a97a864
YW
843 print(output)
844 self.assertRegex(output, 'ipip (?:ipip |)remote any local 192.168.223.238 dev dummy98')
1f0e3109
SS
845
846 def test_gre_tunnel(self):
ec38833c
ZJS
847 copy_unit_to_networkd_unit_path('12-dummy.netdev', 'gretun.network',
848 '25-gre-tunnel.netdev', '25-tunnel.network',
849 '25-gre-tunnel-local-any.netdev', '25-tunnel-local-any.network',
850 '25-gre-tunnel-remote-any.netdev', '25-tunnel-remote-any.network')
851 start_networkd(0)
852 wait_online(['gretun99:routable', 'gretun98:routable', 'gretun97:routable', 'dummy98:degraded'])
6a97a864 853
371810d1 854 output = check_output('ip -d link show gretun99')
6a97a864
YW
855 print(output)
856 self.assertRegex(output, 'gre remote 10.65.223.239 local 10.65.223.238 dev dummy98')
38f4bb44
YW
857 self.assertRegex(output, 'ikey 1.2.3.103')
858 self.assertRegex(output, 'okey 1.2.4.103')
859 self.assertRegex(output, 'iseq')
860 self.assertRegex(output, 'oseq')
371810d1 861 output = check_output('ip -d link show gretun98')
6a97a864
YW
862 print(output)
863 self.assertRegex(output, 'gre remote 10.65.223.239 local any dev dummy98')
38f4bb44
YW
864 self.assertRegex(output, 'ikey 0.0.0.104')
865 self.assertRegex(output, 'okey 0.0.0.104')
866 self.assertNotRegex(output, 'iseq')
867 self.assertNotRegex(output, 'oseq')
371810d1 868 output = check_output('ip -d link show gretun97')
6a97a864
YW
869 print(output)
870 self.assertRegex(output, 'gre remote any local 10.65.223.238 dev dummy98')
38f4bb44
YW
871 self.assertRegex(output, 'ikey 0.0.0.105')
872 self.assertRegex(output, 'okey 0.0.0.105')
873 self.assertNotRegex(output, 'iseq')
874 self.assertNotRegex(output, 'oseq')
6a97a864
YW
875
876 def test_ip6gre_tunnel(self):
ec38833c
ZJS
877 copy_unit_to_networkd_unit_path('12-dummy.netdev', 'ip6gretun.network',
878 '25-ip6gre-tunnel.netdev', '25-tunnel.network',
879 '25-ip6gre-tunnel-local-any.netdev', '25-tunnel-local-any.network',
880 '25-ip6gre-tunnel-remote-any.netdev', '25-tunnel-remote-any.network')
01943d43 881 start_networkd(5)
6a97a864 882
17bcf0a0
YW
883 # Old kernels seem not to support IPv6LL address on ip6gre tunnel, So please do not use wait_online() here.
884
e39cc445
YW
885 self.check_link_exists('dummy98')
886 self.check_link_exists('ip6gretun99')
887 self.check_link_exists('ip6gretun98')
888 self.check_link_exists('ip6gretun97')
6a97a864 889
371810d1 890 output = check_output('ip -d link show ip6gretun99')
6a97a864
YW
891 print(output)
892 self.assertRegex(output, 'ip6gre remote 2001:473:fece:cafe::5179 local 2a00:ffde:4567:edde::4987 dev dummy98')
371810d1 893 output = check_output('ip -d link show ip6gretun98')
6a97a864
YW
894 print(output)
895 self.assertRegex(output, 'ip6gre remote 2001:473:fece:cafe::5179 local any dev dummy98')
371810d1 896 output = check_output('ip -d link show ip6gretun97')
6a97a864
YW
897 print(output)
898 self.assertRegex(output, 'ip6gre remote any local 2a00:ffde:4567:edde::4987 dev dummy98')
1f0e3109 899
11309591 900 def test_gretap_tunnel(self):
ec38833c
ZJS
901 copy_unit_to_networkd_unit_path('12-dummy.netdev', 'gretap.network',
902 '25-gretap-tunnel.netdev', '25-tunnel.network',
903 '25-gretap-tunnel-local-any.netdev', '25-tunnel-local-any.network')
904 start_networkd(0)
905 wait_online(['gretap99:routable', 'gretap98:routable', 'dummy98:degraded'])
6a97a864 906
371810d1 907 output = check_output('ip -d link show gretap99')
6a97a864
YW
908 print(output)
909 self.assertRegex(output, 'gretap remote 10.65.223.239 local 10.65.223.238 dev dummy98')
38f4bb44
YW
910 self.assertRegex(output, 'ikey 0.0.0.106')
911 self.assertRegex(output, 'okey 0.0.0.106')
912 self.assertRegex(output, 'iseq')
913 self.assertRegex(output, 'oseq')
371810d1 914 output = check_output('ip -d link show gretap98')
6a97a864
YW
915 print(output)
916 self.assertRegex(output, 'gretap remote 10.65.223.239 local any dev dummy98')
38f4bb44
YW
917 self.assertRegex(output, 'ikey 0.0.0.107')
918 self.assertRegex(output, 'okey 0.0.0.107')
919 self.assertRegex(output, 'iseq')
920 self.assertRegex(output, 'oseq')
1f0e3109
SS
921
922 def test_ip6gretap_tunnel(self):
ec38833c
ZJS
923 copy_unit_to_networkd_unit_path('12-dummy.netdev', 'ip6gretap.network',
924 '25-ip6gretap-tunnel.netdev', '25-tunnel.network',
925 '25-ip6gretap-tunnel-local-any.netdev', '25-tunnel-local-any.network')
926 start_networkd(0)
927 wait_online(['ip6gretap99:routable', 'ip6gretap98:routable', 'dummy98:degraded'])
6a97a864 928
371810d1 929 output = check_output('ip -d link show ip6gretap99')
6a97a864
YW
930 print(output)
931 self.assertRegex(output, 'ip6gretap remote 2001:473:fece:cafe::5179 local 2a00:ffde:4567:edde::4987 dev dummy98')
371810d1 932 output = check_output('ip -d link show ip6gretap98')
6a97a864
YW
933 print(output)
934 self.assertRegex(output, 'ip6gretap remote 2001:473:fece:cafe::5179 local any dev dummy98')
1f0e3109
SS
935
936 def test_vti_tunnel(self):
ec38833c
ZJS
937 copy_unit_to_networkd_unit_path('12-dummy.netdev', 'vti.network',
938 '25-vti-tunnel.netdev', '25-tunnel.network',
939 '25-vti-tunnel-local-any.netdev', '25-tunnel-local-any.network',
940 '25-vti-tunnel-remote-any.netdev', '25-tunnel-remote-any.network')
941 start_networkd(0)
942 wait_online(['vtitun99:routable', 'vtitun98:routable', 'vtitun97:routable', 'dummy98:degraded'])
6a97a864 943
371810d1 944 output = check_output('ip -d link show vtitun99')
6a97a864
YW
945 print(output)
946 self.assertRegex(output, 'vti remote 10.65.223.239 local 10.65.223.238 dev dummy98')
371810d1 947 output = check_output('ip -d link show vtitun98')
6a97a864
YW
948 print(output)
949 self.assertRegex(output, 'vti remote 10.65.223.239 local any dev dummy98')
371810d1 950 output = check_output('ip -d link show vtitun97')
6a97a864
YW
951 print(output)
952 self.assertRegex(output, 'vti remote any local 10.65.223.238 dev dummy98')
1f0e3109
SS
953
954 def test_vti6_tunnel(self):
ec38833c
ZJS
955 copy_unit_to_networkd_unit_path('12-dummy.netdev', 'vti6.network',
956 '25-vti6-tunnel.netdev', '25-tunnel.network',
957 '25-vti6-tunnel-local-any.netdev', '25-tunnel-local-any.network',
958 '25-vti6-tunnel-remote-any.netdev', '25-tunnel-remote-any.network')
959 start_networkd(0)
960 wait_online(['vti6tun99:routable', 'vti6tun98:routable', 'vti6tun97:routable', 'dummy98:degraded'])
6a97a864 961
371810d1 962 output = check_output('ip -d link show vti6tun99')
6a97a864
YW
963 print(output)
964 self.assertRegex(output, 'vti6 remote 2001:473:fece:cafe::5179 local 2a00:ffde:4567:edde::4987 dev dummy98')
371810d1 965 output = check_output('ip -d link show vti6tun98')
6a97a864
YW
966 print(output)
967 self.assertRegex(output, 'vti6 remote 2001:473:fece:cafe::5179 local (?:any|::) dev dummy98')
371810d1 968 output = check_output('ip -d link show vti6tun97')
6a97a864
YW
969 print(output)
970 self.assertRegex(output, 'vti6 remote (?:any|::) local 2a00:ffde:4567:edde::4987 dev dummy98')
1f0e3109
SS
971
972 def test_ip6tnl_tunnel(self):
ec38833c
ZJS
973 copy_unit_to_networkd_unit_path('12-dummy.netdev', 'ip6tnl.network',
974 '25-ip6tnl-tunnel.netdev', '25-tunnel.network',
975 '25-ip6tnl-tunnel-local-any.netdev', '25-tunnel-local-any.network',
976 '25-ip6tnl-tunnel-remote-any.netdev', '25-tunnel-remote-any.network')
977 start_networkd(0)
978 wait_online(['ip6tnl99:routable', 'ip6tnl98:routable', 'ip6tnl97:routable', 'dummy98:degraded'])
6a97a864 979
371810d1 980 output = check_output('ip -d link show ip6tnl99')
6a97a864
YW
981 print(output)
982 self.assertRegex(output, 'ip6tnl ip6ip6 remote 2001:473:fece:cafe::5179 local 2a00:ffde:4567:edde::4987 dev dummy98')
371810d1 983 output = check_output('ip -d link show ip6tnl98')
6a97a864
YW
984 print(output)
985 self.assertRegex(output, 'ip6tnl ip6ip6 remote 2001:473:fece:cafe::5179 local (?:any|::) dev dummy98')
371810d1 986 output = check_output('ip -d link show ip6tnl97')
6a97a864
YW
987 print(output)
988 self.assertRegex(output, 'ip6tnl ip6ip6 remote (?:any|::) local 2a00:ffde:4567:edde::4987 dev dummy98')
1f0e3109
SS
989
990 def test_sit_tunnel(self):
ec38833c
ZJS
991 copy_unit_to_networkd_unit_path('12-dummy.netdev', 'sit.network',
992 '25-sit-tunnel.netdev', '25-tunnel.network',
993 '25-sit-tunnel-local-any.netdev', '25-tunnel-local-any.network',
994 '25-sit-tunnel-remote-any.netdev', '25-tunnel-remote-any.network')
995 start_networkd(0)
996 wait_online(['sittun99:routable', 'sittun98:routable', 'sittun97:routable', 'dummy98:degraded'])
6a97a864 997
371810d1 998 output = check_output('ip -d link show sittun99')
6a97a864
YW
999 print(output)
1000 self.assertRegex(output, "sit (?:ip6ip |)remote 10.65.223.239 local 10.65.223.238 dev dummy98")
371810d1 1001 output = check_output('ip -d link show sittun98')
6a97a864
YW
1002 print(output)
1003 self.assertRegex(output, "sit (?:ip6ip |)remote 10.65.223.239 local any dev dummy98")
371810d1 1004 output = check_output('ip -d link show sittun97')
6a97a864
YW
1005 print(output)
1006 self.assertRegex(output, "sit (?:ip6ip |)remote any local 10.65.223.238 dev dummy98")
1f0e3109 1007
d0e728b6 1008 def test_isatap_tunnel(self):
ec38833c
ZJS
1009 copy_unit_to_networkd_unit_path('12-dummy.netdev', 'isatap.network',
1010 '25-isatap-tunnel.netdev', '25-tunnel.network')
1011 start_networkd(0)
1012 wait_online(['isataptun99:routable', 'dummy98:degraded'])
d0e728b6 1013
371810d1 1014 output = check_output('ip -d link show isataptun99')
14ecd604 1015 print(output)
d0e728b6
SS
1016 self.assertRegex(output, "isatap ")
1017
d29dc4f1 1018 def test_6rd_tunnel(self):
ec38833c
ZJS
1019 copy_unit_to_networkd_unit_path('12-dummy.netdev', '6rd.network',
1020 '25-6rd-tunnel.netdev', '25-tunnel.network')
1021 start_networkd(0)
1022 wait_online(['sittun99:routable', 'dummy98:degraded'])
d29dc4f1 1023
371810d1 1024 output = check_output('ip -d link show sittun99')
6a97a864
YW
1025 print(output)
1026 self.assertRegex(output, '6rd-prefix 2602::/24')
1027
7bea7f9b 1028 @expectedFailureIfERSPANModuleIsNotAvailable()
2266864b 1029 def test_erspan_tunnel(self):
ec38833c
ZJS
1030 copy_unit_to_networkd_unit_path('12-dummy.netdev', 'erspan.network',
1031 '25-erspan-tunnel.netdev', '25-tunnel.network',
1032 '25-erspan-tunnel-local-any.netdev', '25-tunnel-local-any.network')
1033 start_networkd(0)
1034 wait_online(['erspan99:routable', 'erspan98:routable', 'dummy98:degraded'])
2266864b 1035
371810d1 1036 output = check_output('ip -d link show erspan99')
6a97a864
YW
1037 print(output)
1038 self.assertRegex(output, 'erspan remote 172.16.1.100 local 172.16.1.200')
38f4bb44
YW
1039 self.assertRegex(output, 'ikey 0.0.0.101')
1040 self.assertRegex(output, 'okey 0.0.0.101')
1041 self.assertRegex(output, 'iseq')
1042 self.assertRegex(output, 'oseq')
371810d1 1043 output = check_output('ip -d link show erspan98')
2266864b 1044 print(output)
6a97a864
YW
1045 self.assertRegex(output, 'erspan remote 172.16.1.100 local any')
1046 self.assertRegex(output, '102')
38f4bb44
YW
1047 self.assertRegex(output, 'ikey 0.0.0.102')
1048 self.assertRegex(output, 'okey 0.0.0.102')
1049 self.assertRegex(output, 'iseq')
1050 self.assertRegex(output, 'oseq')
2266864b 1051
1f0e3109 1052 def test_tunnel_independent(self):
ec38833c
ZJS
1053 copy_unit_to_networkd_unit_path('25-ipip-tunnel-independent.netdev', 'netdev-link-local-addressing-yes.network')
1054 start_networkd(0)
e40a58b5 1055
ec38833c 1056 wait_online(['ipiptun99:carrier'])
1f0e3109 1057
4b6a6d1e
YW
1058 @expectedFailureIfModuleIsNotAvailable('fou')
1059 def test_fou(self):
1060 # The following redundant check is necessary for CentOS CI.
1061 # Maybe, error handling in lookup_id() in sd-netlink/generic-netlink.c needs to be updated.
1062 self.assertTrue(is_module_available('fou'))
1063
ec38833c
ZJS
1064 copy_unit_to_networkd_unit_path('25-fou-ipproto-ipip.netdev', '25-fou-ipproto-gre.netdev',
1065 '25-fou-ipip.netdev', '25-fou-sit.netdev',
1066 '25-fou-gre.netdev', '25-fou-gretap.netdev')
1067 start_networkd(0)
4b6a6d1e 1068
ec38833c 1069 wait_online(['ipiptun96:off', 'sittun96:off', 'gretun96:off', 'gretap96:off'])
4b6a6d1e 1070
371810d1 1071 output = check_output('ip fou show')
4b6a6d1e
YW
1072 print(output)
1073 self.assertRegex(output, 'port 55555 ipproto 4')
1074 self.assertRegex(output, 'port 55556 ipproto 47')
1075
371810d1 1076 output = check_output('ip -d link show ipiptun96')
4b6a6d1e
YW
1077 print(output)
1078 self.assertRegex(output, 'encap fou encap-sport auto encap-dport 55555')
371810d1 1079 output = check_output('ip -d link show sittun96')
4b6a6d1e
YW
1080 print(output)
1081 self.assertRegex(output, 'encap fou encap-sport auto encap-dport 55555')
371810d1 1082 output = check_output('ip -d link show gretun96')
4b6a6d1e
YW
1083 print(output)
1084 self.assertRegex(output, 'encap fou encap-sport 1001 encap-dport 55556')
371810d1 1085 output = check_output('ip -d link show gretap96')
4b6a6d1e
YW
1086 print(output)
1087 self.assertRegex(output, 'encap fou encap-sport auto encap-dport 55556')
1088
1f0e3109 1089 def test_vxlan(self):
ec38833c
ZJS
1090 copy_unit_to_networkd_unit_path('25-vxlan.netdev', 'vxlan.network',
1091 '11-dummy.netdev', 'vxlan-test1.network')
1092 start_networkd(0)
1f0e3109 1093
ec38833c 1094 wait_online(['test1:degraded', 'vxlan99:degraded'])
1f0e3109 1095
371810d1 1096 output = check_output('ip -d link show vxlan99')
14ecd604 1097 print(output)
1c862fe0 1098 self.assertRegex(output, '999')
1f0e3109
SS
1099 self.assertRegex(output, '5555')
1100 self.assertRegex(output, 'l2miss')
1101 self.assertRegex(output, 'l3miss')
1102 self.assertRegex(output, 'udpcsum')
1103 self.assertRegex(output, 'udp6zerocsumtx')
1104 self.assertRegex(output, 'udp6zerocsumrx')
1105 self.assertRegex(output, 'remcsumtx')
1106 self.assertRegex(output, 'remcsumrx')
1107 self.assertRegex(output, 'gbp')
1108
371810d1 1109 output = check_output('bridge fdb show dev vxlan99')
1c862fe0
YW
1110 print(output)
1111 self.assertRegex(output, '00:11:22:33:44:55 dst 10.0.0.5 self permanent')
1112 self.assertRegex(output, '00:11:22:33:44:66 dst 10.0.0.6 self permanent')
1113 self.assertRegex(output, '00:11:22:33:44:77 dst 10.0.0.7 self permanent')
1114
02849d8b 1115 def test_macsec(self):
ec38833c
ZJS
1116 copy_unit_to_networkd_unit_path('25-macsec.netdev', '25-macsec.network', '25-macsec.key',
1117 'macsec.network', '12-dummy.netdev')
1118 start_networkd(0)
02849d8b 1119
ec38833c 1120 wait_online(['dummy98:degraded', 'macsec99:routable'])
02849d8b 1121
371810d1 1122 output = check_output('ip -d link show macsec99')
02849d8b
YW
1123 print(output)
1124 self.assertRegex(output, 'macsec99@dummy98')
1125 self.assertRegex(output, 'macsec sci [0-9a-f]*000b')
1126 self.assertRegex(output, 'encrypt on')
1127
371810d1 1128 output = check_output('ip macsec show macsec99')
02849d8b
YW
1129 print(output)
1130 self.assertRegex(output, 'encrypt on')
1131 self.assertRegex(output, 'TXSC: [0-9a-f]*000b on SA 1')
1132 self.assertRegex(output, '0: PN [0-9]*, state on, key 01000000000000000000000000000000')
1133 self.assertRegex(output, '1: PN [0-9]*, state on, key 02030000000000000000000000000000')
1134 self.assertRegex(output, 'RXSC: c619528fe6a00100, state on')
1135 self.assertRegex(output, '0: PN [0-9]*, state on, key 02030405000000000000000000000000')
1136 self.assertRegex(output, '1: PN [0-9]*, state on, key 02030405060000000000000000000000')
1137 self.assertRegex(output, '2: PN [0-9]*, state off, key 02030405060700000000000000000000')
1138 self.assertRegex(output, '3: PN [0-9]*, state off, key 02030405060708000000000000000000')
1139 self.assertNotRegex(output, 'key 02030405067080900000000000000000')
1140 self.assertRegex(output, 'RXSC: 8c16456c83a90002, state on')
1141 self.assertRegex(output, '0: PN [0-9]*, state off, key 02030400000000000000000000000000')
1142
811f33d0 1143 def test_nlmon(self):
ec38833c
ZJS
1144 copy_unit_to_networkd_unit_path('25-nlmon.netdev', 'netdev-link-local-addressing-yes.network')
1145 start_networkd()
811f33d0 1146
ec38833c 1147 wait_online(['nlmon99:carrier'])
02849d8b 1148
cff83db9
YW
1149class NetworkdL2TPTests(unittest.TestCase, Utilities):
1150
1151 links =[
1152 'l2tp-ses1',
1153 'l2tp-ses2',
1154 'l2tp-ses3',
1155 'l2tp-ses4',
1156 'test1']
1157
1158 units = [
1159 '11-dummy.netdev',
1160 '25-l2tp-dummy.network',
1161 '25-l2tp-ip.netdev',
1162 '25-l2tp-udp.netdev']
1163
1164 l2tp_tunnel_ids = [ '10' ]
1165
1166 def setUp(self):
ec38833c
ZJS
1167 l2tp_tunnel_remove(self.l2tp_tunnel_ids)
1168 remove_links(self.links)
cff83db9
YW
1169
1170 def tearDown(self):
ec38833c
ZJS
1171 l2tp_tunnel_remove(self.l2tp_tunnel_ids)
1172 remove_links(self.links)
1173 remove_unit_from_networkd_path(self.units)
cff83db9
YW
1174
1175 @expectedFailureIfModuleIsNotAvailable('l2tp_eth')
1176 def test_l2tp_udp(self):
ec38833c
ZJS
1177 copy_unit_to_networkd_unit_path('11-dummy.netdev', '25-l2tp-dummy.network', '25-l2tp-udp.netdev')
1178 start_networkd(0)
cff83db9 1179
ec38833c 1180 wait_online(['test1:routable', 'l2tp-ses1:off', 'l2tp-ses2:off'])
cff83db9 1181
371810d1 1182 output = check_output('ip l2tp show tunnel tunnel_id 10')
cff83db9
YW
1183 print(output)
1184 self.assertRegex(output, "Tunnel 10, encap UDP")
1185 self.assertRegex(output, "From 192.168.30.100 to 192.168.30.101")
1186 self.assertRegex(output, "Peer tunnel 11")
1187 self.assertRegex(output, "UDP source / dest ports: 3000/4000")
1188 self.assertRegex(output, "UDP checksum: enabled")
1189
371810d1 1190 output = check_output('ip l2tp show session tid 10 session_id 15')
cff83db9
YW
1191 print(output)
1192 self.assertRegex(output, "Session 15 in tunnel 10")
1193 self.assertRegex(output, "Peer session 16, tunnel 11")
1194 self.assertRegex(output, "interface name: l2tp-ses1")
1195
371810d1 1196 output = check_output('ip l2tp show session tid 10 session_id 17')
cff83db9
YW
1197 print(output)
1198 self.assertRegex(output, "Session 17 in tunnel 10")
1199 self.assertRegex(output, "Peer session 18, tunnel 11")
1200 self.assertRegex(output, "interface name: l2tp-ses2")
1201
1202 @expectedFailureIfModuleIsNotAvailable('l2tp_ip')
1203 def test_l2tp_ip(self):
ec38833c
ZJS
1204 copy_unit_to_networkd_unit_path('11-dummy.netdev', '25-l2tp-dummy.network', '25-l2tp-ip.netdev')
1205 start_networkd(0)
cff83db9 1206
ec38833c 1207 wait_online(['test1:routable', 'l2tp-ses3:off', 'l2tp-ses4:off'])
cff83db9 1208
371810d1 1209 output = check_output('ip l2tp show tunnel tunnel_id 10')
cff83db9
YW
1210 print(output)
1211 self.assertRegex(output, "Tunnel 10, encap IP")
1212 self.assertRegex(output, "From 192.168.30.100 to 192.168.30.101")
1213 self.assertRegex(output, "Peer tunnel 12")
1214
371810d1 1215 output = check_output('ip l2tp show session tid 10 session_id 25')
cff83db9
YW
1216 print(output)
1217 self.assertRegex(output, "Session 25 in tunnel 10")
1218 self.assertRegex(output, "Peer session 26, tunnel 12")
1219 self.assertRegex(output, "interface name: l2tp-ses3")
1220
371810d1 1221 output = check_output('ip l2tp show session tid 10 session_id 27')
cff83db9
YW
1222 print(output)
1223 self.assertRegex(output, "Session 27 in tunnel 10")
1224 self.assertRegex(output, "Peer session 28, tunnel 12")
1225 self.assertRegex(output, "interface name: l2tp-ses4")
1226
be68c2c9 1227class NetworkdNetworkTests(unittest.TestCase, Utilities):
09ea6724
YW
1228 links = [
1229 'bond199',
1230 'dummy98',
cd65d067 1231 'dummy99',
09ea6724
YW
1232 'test1']
1233
1234 units = [
1235 '11-dummy.netdev',
1236 '12-dummy.netdev',
1237 '23-active-slave.network',
1e498853 1238 '24-keep-configuration-static.network',
fdcd1ec5 1239 '24-search-domain.network',
09ea6724 1240 '25-address-link-section.network',
b8102725
YW
1241 '25-address-preferred-lifetime-zero-ipv6.network',
1242 '25-address-static.network',
cd65d067 1243 '25-bind-carrier.network',
09ea6724
YW
1244 '25-bond-active-backup-slave.netdev',
1245 '25-fibrule-invert.network',
1246 '25-fibrule-port-range.network',
1247 '25-ipv6-address-label-section.network',
e4a71bf3 1248 '25-neighbor-section.network',
05514ae1
YW
1249 '25-link-local-addressing-no.network',
1250 '25-link-local-addressing-yes.network',
09ea6724 1251 '25-link-section-unmanaged.network',
20ca06a6 1252 '25-route-ipv6-src.network',
0ef830cf 1253 '25-route-static.network',
4da33154 1254 '25-sysctl-disable-ipv6.network',
09ea6724
YW
1255 '25-sysctl.network',
1256 'configure-without-carrier.network',
b677774d 1257 'routing-policy-rule-dummy98.network',
b8102725 1258 'routing-policy-rule-test1.network']
1f0e3109 1259
95c74b0a 1260 routing_policy_rule_tables = ['7', '8']
5f68a6a4 1261 routes = [['blackhole', '202.54.1.2'], ['unreachable', '202.54.1.3'], ['prohibit', '202.54.1.4']]
95c74b0a 1262
1f0e3109 1263 def setUp(self):
ec38833c
ZJS
1264 remove_routing_policy_rule_tables(self.routing_policy_rule_tables)
1265 remove_routes(self.routes)
1266 remove_links(self.links)
1f0e3109
SS
1267
1268 def tearDown(self):
ec38833c
ZJS
1269 remove_routing_policy_rule_tables(self.routing_policy_rule_tables)
1270 remove_routes(self.routes)
1271 remove_links(self.links)
1272 remove_unit_from_networkd_path(self.units)
1f0e3109 1273
b8102725 1274 def test_address_static(self):
ec38833c
ZJS
1275 copy_unit_to_networkd_unit_path('25-address-static.network', '12-dummy.netdev')
1276 start_networkd(0)
b8102725 1277
ec38833c 1278 wait_online(['dummy98:routable'])
b8102725 1279
371810d1 1280 output = check_output('ip -4 address show dev dummy98')
b8102725
YW
1281 print(output)
1282 self.assertRegex(output, 'inet 10.1.2.3/16 brd 10.1.255.255 scope global dummy98')
1283 self.assertRegex(output, 'inet 10.1.2.4/16 brd 10.1.255.255 scope global secondary dummy98')
1284 self.assertRegex(output, 'inet 10.2.2.4/16 brd 10.2.255.255 scope global dummy98')
1285
1286 # invalid sections
1287 self.assertNotRegex(output, '10.10.0.1/16')
1288 self.assertNotRegex(output, '10.10.0.2/16')
1289
371810d1 1290 output = check_output('ip -4 address show dev dummy98 label 32')
b8102725
YW
1291 self.assertRegex(output, 'inet 10.3.2.3/16 brd 10.3.255.255 scope global 32')
1292
371810d1 1293 output = check_output('ip -4 address show dev dummy98 label 33')
b8102725
YW
1294 self.assertRegex(output, 'inet 10.4.2.3 peer 10.4.2.4/16 scope global 33')
1295
371810d1 1296 output = check_output('ip -4 address show dev dummy98 label 34')
b8102725
YW
1297 self.assertRegex(output, 'inet 192.168.[0-9]*.1/24 brd 192.168.[0-9]*.255 scope global 34')
1298
371810d1 1299 output = check_output('ip -4 address show dev dummy98 label 35')
b8102725
YW
1300 self.assertRegex(output, 'inet 172.[0-9]*.0.1/16 brd 172.[0-9]*.255.255 scope global 35')
1301
371810d1 1302 output = check_output('ip -6 address show dev dummy98')
b8102725
YW
1303 print(output)
1304 self.assertRegex(output, 'inet6 2001:db8:0:f101::15/64 scope global')
1305 self.assertRegex(output, 'inet6 2001:db8:0:f101::16/64 scope global')
1306 self.assertRegex(output, 'inet6 2001:db8:0:f102::15/64 scope global')
1307 self.assertRegex(output, 'inet6 2001:db8:0:f102::16/64 scope global')
1308 self.assertRegex(output, 'inet6 2001:db8:0:f103::20 peer 2001:db8:0:f103::10/128 scope global')
1309 self.assertRegex(output, 'inet6 fd[0-9a-f:]*1/64 scope global')
1310
1311 def test_address_preferred_lifetime_zero_ipv6(self):
ec38833c 1312 copy_unit_to_networkd_unit_path('25-address-preferred-lifetime-zero-ipv6.network', '12-dummy.netdev')
01943d43 1313 start_networkd(5)
1f0e3109 1314
e39cc445 1315 self.check_link_exists('dummy98')
791c1140 1316 self.check_operstate('dummy98', 'routable', setup_state='configuring')
b8102725 1317
371810d1 1318 output = check_output('ip address show dummy98')
b8102725
YW
1319 print(output)
1320 self.assertRegex(output, 'inet 10.2.3.4/16 brd 10.2.255.255 scope link deprecated dummy98')
1321 self.assertRegex(output, 'inet6 2001:db8:0:f101::1/64 scope global')
1f0e3109
SS
1322
1323 def test_configure_without_carrier(self):
ec38833c
ZJS
1324 copy_unit_to_networkd_unit_path('configure-without-carrier.network', '11-dummy.netdev')
1325 start_networkd()
1f0e3109 1326
e39cc445 1327 self.check_link_exists('test1')
e40a58b5 1328
371810d1 1329 output = check_output(*networkctl_cmd, 'status', 'test1')
1f0e3109
SS
1330 print(output)
1331 self.assertRegex(output, '192.168.0.15')
1332 self.assertRegex(output, '192.168.0.1')
1333 self.assertRegex(output, 'routable')
1334
1f0e3109 1335 def test_routing_policy_rule(self):
ec38833c 1336 copy_unit_to_networkd_unit_path('routing-policy-rule-test1.network', '11-dummy.netdev')
703bc7a2 1337
ec38833c 1338 start_networkd()
1f0e3109 1339
e39cc445 1340 self.check_link_exists('test1')
e40a58b5 1341
371810d1 1342 output = check_output('ip rule')
1f0e3109
SS
1343 print(output)
1344 self.assertRegex(output, '111')
1345 self.assertRegex(output, 'from 192.168.100.18')
f7bdd562 1346 self.assertRegex(output, r'tos (?:0x08|throughput)\s')
1f0e3109
SS
1347 self.assertRegex(output, 'iif test1')
1348 self.assertRegex(output, 'oif test1')
1349 self.assertRegex(output, 'lookup 7')
1350
b677774d 1351 def test_routing_policy_rule_issue_11280(self):
ec38833c
ZJS
1352 copy_unit_to_networkd_unit_path('routing-policy-rule-test1.network', '11-dummy.netdev',
1353 'routing-policy-rule-dummy98.network', '12-dummy.netdev')
b677774d 1354
b677774d
YW
1355 for trial in range(3):
1356 # Remove state files only first time
ec38833c 1357 start_networkd(remove_state_files=(trial == 0))
b677774d 1358
e39cc445
YW
1359 self.check_link_exists('test1')
1360 self.check_link_exists('dummy98')
b677774d 1361
371810d1 1362 output = check_output('ip rule list table 7')
b677774d
YW
1363 print(output)
1364 self.assertRegex(output, '111: from 192.168.100.18 tos (?:0x08|throughput) iif test1 oif test1 lookup 7')
1365
371810d1 1366 output = check_output('ip rule list table 8')
b677774d
YW
1367 print(output)
1368 self.assertRegex(output, '112: from 192.168.101.18 tos (?:0x08|throughput) iif dummy98 oif dummy98 lookup 8')
1369
d586a2c3 1370 @expectedFailureIfRoutingPolicyPortRangeIsNotAvailable()
926062f0 1371 def test_routing_policy_rule_port_range(self):
ec38833c 1372 copy_unit_to_networkd_unit_path('25-fibrule-port-range.network', '11-dummy.netdev')
703bc7a2 1373
ec38833c 1374 start_networkd()
926062f0 1375
e39cc445 1376 self.check_link_exists('test1')
e40a58b5 1377
371810d1 1378 output = check_output('ip rule')
926062f0
SS
1379 print(output)
1380 self.assertRegex(output, '111')
1381 self.assertRegex(output, 'from 192.168.100.18')
1382 self.assertRegex(output, '1123-1150')
1383 self.assertRegex(output, '3224-3290')
1384 self.assertRegex(output, 'tcp')
1385 self.assertRegex(output, 'lookup 7')
1f0e3109 1386
d586a2c3 1387 @expectedFailureIfRoutingPolicyIPProtoIsNotAvailable()
efecf9cd 1388 def test_routing_policy_rule_invert(self):
ec38833c 1389 copy_unit_to_networkd_unit_path('25-fibrule-invert.network', '11-dummy.netdev')
703bc7a2 1390
ec38833c 1391 start_networkd()
efecf9cd 1392
e39cc445 1393 self.check_link_exists('test1')
e40a58b5 1394
371810d1 1395 output = check_output('ip rule')
efecf9cd 1396 print(output)
efecf9cd
SS
1397 self.assertRegex(output, '111')
1398 self.assertRegex(output, 'not.*?from.*?192.168.100.18')
1399 self.assertRegex(output, 'tcp')
1400 self.assertRegex(output, 'lookup 7')
1401
0ef830cf 1402 def test_route_static(self):
ec38833c
ZJS
1403 copy_unit_to_networkd_unit_path('25-route-static.network', '12-dummy.netdev')
1404 start_networkd(0)
0d34228f 1405
ec38833c 1406 wait_online(['dummy98:routable'])
0d34228f 1407
371810d1 1408 output = check_output('ip -6 route show dev dummy98')
0d34228f 1409 print(output)
0ef830cf
YW
1410 self.assertRegex(output, '2001:1234:5:8fff:ff:ff:ff:ff proto static')
1411 self.assertRegex(output, '2001:1234:5:8f63::1 proto kernel')
1f0e3109 1412
371810d1 1413 output = check_output('ip -6 route show dev dummy98 default')
0ef830cf 1414 self.assertRegex(output, 'default via 2001:1234:5:8fff:ff:ff:ff:ff proto static metric 1024 pref medium')
1f0e3109 1415
371810d1 1416 output = check_output('ip -4 route show dev dummy98')
1f0e3109 1417 print(output)
0ef830cf
YW
1418 self.assertRegex(output, '149.10.124.48/28 proto kernel scope link src 149.10.124.58')
1419 self.assertRegex(output, '149.10.124.64 proto static scope link')
2b00dff8 1420 self.assertRegex(output, '169.254.0.0/16 proto static scope link metric 2048')
0ef830cf
YW
1421 self.assertRegex(output, '192.168.1.1 proto static initcwnd 20')
1422 self.assertRegex(output, '192.168.1.2 proto static initrwnd 30')
1f0e3109 1423
371810d1 1424 output = check_output('ip -4 route show dev dummy98 default')
0ef830cf
YW
1425 self.assertRegex(output, 'default via 149.10.125.65 proto static onlink')
1426 self.assertRegex(output, 'default via 149.10.124.64 proto static')
6543b7fd 1427 self.assertRegex(output, 'default proto static')
1f0e3109 1428
371810d1 1429 output = check_output('ip route show type blackhole')
1f0e3109 1430 print(output)
0ef830cf 1431 self.assertRegex(output, 'blackhole 202.54.1.2 proto static')
f5050e48 1432
371810d1 1433 output = check_output('ip route show type unreachable')
f5050e48 1434 print(output)
0ef830cf 1435 self.assertRegex(output, 'unreachable 202.54.1.3 proto static')
f5050e48 1436
371810d1 1437 output = check_output('ip route show type prohibit')
f5050e48 1438 print(output)
0ef830cf 1439 self.assertRegex(output, 'prohibit 202.54.1.4 proto static')
f5050e48 1440
20ca06a6
DA
1441 def test_ip_route_ipv6_src_route(self):
1442 # a dummy device does not make the addresses go through tentative state, so we
1443 # reuse a bond from an earlier test, which does make the addresses go through
1444 # tentative state, and do our test on that
ec38833c
ZJS
1445 copy_unit_to_networkd_unit_path('23-active-slave.network', '25-route-ipv6-src.network', '25-bond-active-backup-slave.netdev', '12-dummy.netdev')
1446 start_networkd()
20ca06a6 1447
e39cc445
YW
1448 self.check_link_exists('dummy98')
1449 self.check_link_exists('bond199')
20ca06a6 1450
371810d1 1451 output = check_output('ip -6 route list dev bond199')
20ca06a6
DA
1452 print(output)
1453 self.assertRegex(output, 'abcd::/16')
1454 self.assertRegex(output, 'src')
1455 self.assertRegex(output, '2001:1234:56:8f63::2')
1456
1f0e3109 1457 def test_ip_link_mac_address(self):
ec38833c
ZJS
1458 copy_unit_to_networkd_unit_path('25-address-link-section.network', '12-dummy.netdev')
1459 start_networkd()
1f0e3109 1460
e39cc445 1461 self.check_link_exists('dummy98')
1f0e3109 1462
371810d1 1463 output = check_output('ip link show dummy98')
1f0e3109
SS
1464 print(output)
1465 self.assertRegex(output, '00:01:02:aa:bb:cc')
1466
1467 def test_ip_link_unmanaged(self):
ec38833c
ZJS
1468 copy_unit_to_networkd_unit_path('25-link-section-unmanaged.network', '12-dummy.netdev')
1469 start_networkd()
1f0e3109 1470
e39cc445 1471 self.check_link_exists('dummy98')
1f0e3109 1472
371810d1 1473 output = check_output(*networkctl_cmd, 'status', 'dummy98')
1f0e3109
SS
1474 print(output)
1475 self.assertRegex(output, 'unmanaged')
1476
1477 def test_ipv6_address_label(self):
ec38833c
ZJS
1478 copy_unit_to_networkd_unit_path('25-ipv6-address-label-section.network', '12-dummy.netdev')
1479 start_networkd()
1f0e3109 1480
e39cc445 1481 self.check_link_exists('dummy98')
1f0e3109 1482
371810d1 1483 output = check_output('ip addrlabel list')
1f0e3109
SS
1484 print(output)
1485 self.assertRegex(output, '2004:da8:1::/64')
1486
e4a71bf3 1487 def test_ipv6_neighbor(self):
ec38833c
ZJS
1488 copy_unit_to_networkd_unit_path('25-neighbor-section.network', '12-dummy.netdev')
1489 start_networkd()
e4a71bf3 1490
e39cc445 1491 self.check_link_exists('dummy98')
e4a71bf3 1492
371810d1 1493 output = check_output('ip neigh list')
e4a71bf3
WKI
1494 print(output)
1495 self.assertRegex(output, '192.168.10.1.*00:00:5e:00:02:65.*PERMANENT')
094b5479 1496 self.assertRegex(output, '2004:da8:1::1.*00:00:5e:00:02:66.*PERMANENT')
e4a71bf3 1497
05514ae1 1498 def test_link_local_addressing(self):
ec38833c
ZJS
1499 copy_unit_to_networkd_unit_path('25-link-local-addressing-yes.network', '11-dummy.netdev',
1500 '25-link-local-addressing-no.network', '12-dummy.netdev')
1501 start_networkd(0)
1502 wait_online(['test1:degraded', 'dummy98:carrier'])
05514ae1 1503
e39cc445
YW
1504 self.check_link_exists('test1')
1505 self.check_link_exists('dummy98')
05514ae1 1506
371810d1 1507 output = check_output('ip address show dev test1')
05514ae1
YW
1508 print(output)
1509 self.assertRegex(output, 'inet .* scope link')
1510 self.assertRegex(output, 'inet6 .* scope link')
1511
371810d1 1512 output = check_output('ip address show dev dummy98')
05514ae1
YW
1513 print(output)
1514 self.assertNotRegex(output, 'inet6* .* scope link')
1515
791c1140
YW
1516 self.check_operstate('test1', 'degraded')
1517 self.check_operstate('dummy98', 'carrier')
05514ae1
YW
1518
1519 '''
1520 Documentation/networking/ip-sysctl.txt
1521
1522 addr_gen_mode - INTEGER
1523 Defines how link-local and autoconf addresses are generated.
1524
1525 0: generate address based on EUI64 (default)
1526 1: do no generate a link-local address, use EUI64 for addresses generated
1527 from autoconf
1528 2: generate stable privacy addresses, using the secret from
1529 stable_secret (RFC7217)
1530 3: generate stable privacy addresses, using a random secret if unset
1531 '''
1532
1533 test1_addr_gen_mode = ''
1534 if os.path.exists(os.path.join(os.path.join(network_sysctl_ipv6_path, 'test1'), 'stable_secret')):
1535 with open(os.path.join(os.path.join(network_sysctl_ipv6_path, 'test1'), 'stable_secret')) as f:
1536 try:
1537 f.readline()
1538 except IOError:
1539 # if stable_secret is unset, then EIO is returned
1540 test1_addr_gen_mode = '0'
1541 else:
1542 test1_addr_gen_mode = '2'
1543 else:
1544 test1_addr_gen_mode = '0'
1545
1546 if os.path.exists(os.path.join(os.path.join(network_sysctl_ipv6_path, 'test1'), 'addr_gen_mode')):
ec38833c 1547 self.assertEqual(read_ipv6_sysctl_attr('test1', 'addr_gen_mode'), test1_addr_gen_mode)
05514ae1
YW
1548
1549 if os.path.exists(os.path.join(os.path.join(network_sysctl_ipv6_path, 'dummy98'), 'addr_gen_mode')):
ec38833c 1550 self.assertEqual(read_ipv6_sysctl_attr('dummy98', 'addr_gen_mode'), '1')
05514ae1 1551
1f0e3109 1552 def test_sysctl(self):
ec38833c
ZJS
1553 copy_unit_to_networkd_unit_path('25-sysctl.network', '12-dummy.netdev')
1554 start_networkd(0)
1555 wait_online(['dummy98:degraded'])
1556
1557 self.assertEqual(read_ipv6_sysctl_attr('dummy98', 'forwarding'), '1')
1558 self.assertEqual(read_ipv6_sysctl_attr('dummy98', 'use_tempaddr'), '2')
1559 self.assertEqual(read_ipv6_sysctl_attr('dummy98', 'dad_transmits'), '3')
1560 self.assertEqual(read_ipv6_sysctl_attr('dummy98', 'hop_limit'), '5')
1561 self.assertEqual(read_ipv6_sysctl_attr('dummy98', 'proxy_ndp'), '1')
1562 self.assertEqual(read_ipv4_sysctl_attr('dummy98', 'forwarding'),'1')
1563 self.assertEqual(read_ipv4_sysctl_attr('dummy98', 'proxy_arp'), '1')
1f0e3109 1564
4da33154 1565 def test_sysctl_disable_ipv6(self):
ec38833c 1566 copy_unit_to_networkd_unit_path('25-sysctl-disable-ipv6.network', '12-dummy.netdev')
4da33154
YW
1567
1568 print('## Disable ipv6')
cefd6b3d
ZJS
1569 check_output('sysctl net.ipv6.conf.all.disable_ipv6=1')
1570 check_output('sysctl net.ipv6.conf.default.disable_ipv6=1')
4da33154 1571
ec38833c
ZJS
1572 start_networkd(0)
1573 wait_online(['dummy98:routable'])
4da33154 1574
371810d1 1575 output = check_output('ip -4 address show dummy98')
4da33154
YW
1576 print(output)
1577 self.assertRegex(output, 'inet 10.2.3.4/16 brd 10.2.255.255 scope global dummy98')
371810d1 1578 output = check_output('ip -6 address show dummy98')
4da33154
YW
1579 print(output)
1580 self.assertEqual(output, '')
4933b97d
YW
1581 output = check_output('ip -4 route show dev dummy98')
1582 print(output)
1583 self.assertEqual(output, '10.2.0.0/16 proto kernel scope link src 10.2.3.4')
1584 output = check_output('ip -6 route show dev dummy98')
1585 print(output)
1586 self.assertEqual(output, '')
4da33154 1587
cefd6b3d 1588 check_output('ip link del dummy98')
4da33154
YW
1589
1590 print('## Enable ipv6')
cefd6b3d
ZJS
1591 check_output('sysctl net.ipv6.conf.all.disable_ipv6=0')
1592 check_output('sysctl net.ipv6.conf.default.disable_ipv6=0')
4da33154 1593
ec38833c
ZJS
1594 start_networkd(0)
1595 wait_online(['dummy98:routable'])
4da33154 1596
371810d1 1597 output = check_output('ip -4 address show dummy98')
4da33154
YW
1598 print(output)
1599 self.assertRegex(output, 'inet 10.2.3.4/16 brd 10.2.255.255 scope global dummy98')
371810d1 1600 output = check_output('ip -6 address show dummy98')
4da33154 1601 print(output)
4933b97d 1602 self.assertRegex(output, 'inet6 2607:5300:203:3906::/64 scope global')
4da33154 1603 self.assertRegex(output, 'inet6 .* scope link')
4933b97d
YW
1604 output = check_output('ip -4 route show dev dummy98')
1605 print(output)
1606 self.assertEqual(output, '10.2.0.0/16 proto kernel scope link src 10.2.3.4')
1607 output = check_output('ip -6 route show dev dummy98')
1608 print(output)
1609 self.assertRegex(output, 'default via 2607:5300:203:39ff:ff:ff:ff:ff proto static')
4da33154 1610
cd65d067 1611 def test_bind_carrier(self):
ec38833c
ZJS
1612 copy_unit_to_networkd_unit_path('25-bind-carrier.network', '11-dummy.netdev')
1613 start_networkd()
cd65d067 1614
e39cc445 1615 self.check_link_exists('test1')
cd65d067 1616
cefd6b3d
ZJS
1617 check_output('ip link add dummy98 type dummy')
1618 check_output('ip link set dummy98 up')
b117044c 1619 time.sleep(2)
371810d1 1620 output = check_output('ip address show test1')
cd65d067
YW
1621 print(output)
1622 self.assertRegex(output, 'UP,LOWER_UP')
1623 self.assertRegex(output, 'inet 192.168.10.30/24 brd 192.168.10.255 scope global test1')
791c1140 1624 self.check_operstate('test1', 'routable')
cd65d067 1625
cefd6b3d
ZJS
1626 check_output('ip link add dummy99 type dummy')
1627 check_output('ip link set dummy99 up')
b117044c 1628 time.sleep(2)
371810d1 1629 output = check_output('ip address show test1')
cd65d067
YW
1630 print(output)
1631 self.assertRegex(output, 'UP,LOWER_UP')
1632 self.assertRegex(output, 'inet 192.168.10.30/24 brd 192.168.10.255 scope global test1')
791c1140 1633 self.check_operstate('test1', 'routable')
cd65d067 1634
cefd6b3d 1635 check_output('ip link del dummy98')
b117044c 1636 time.sleep(2)
371810d1 1637 output = check_output('ip address show test1')
cd65d067
YW
1638 print(output)
1639 self.assertRegex(output, 'UP,LOWER_UP')
1640 self.assertRegex(output, 'inet 192.168.10.30/24 brd 192.168.10.255 scope global test1')
791c1140 1641 self.check_operstate('test1', 'routable')
cd65d067 1642
cefd6b3d 1643 check_output('ip link del dummy99')
b117044c 1644 time.sleep(2)
371810d1 1645 output = check_output('ip address show test1')
cd65d067
YW
1646 print(output)
1647 self.assertNotRegex(output, 'UP,LOWER_UP')
1648 self.assertRegex(output, 'DOWN')
1649 self.assertNotRegex(output, '192.168.10')
791c1140 1650 self.check_operstate('test1', 'off')
cd65d067 1651
cefd6b3d
ZJS
1652 check_output('ip link add dummy98 type dummy')
1653 check_output('ip link set dummy98 up')
b117044c 1654 time.sleep(2)
371810d1 1655 output = check_output('ip address show test1')
cd65d067
YW
1656 print(output)
1657 self.assertRegex(output, 'UP,LOWER_UP')
1658 self.assertRegex(output, 'inet 192.168.10.30/24 brd 192.168.10.255 scope global test1')
791c1140 1659 self.check_operstate('test1', 'routable')
cd65d067 1660
fdcd1ec5 1661 def test_domain(self):
ec38833c
ZJS
1662 copy_unit_to_networkd_unit_path('12-dummy.netdev', '24-search-domain.network')
1663 start_networkd(0)
1664 wait_online(['dummy98:routable'])
fdcd1ec5 1665
371810d1 1666 output = check_output(*networkctl_cmd, 'status', 'dummy98', env=env)
fdcd1ec5
YW
1667 print(output)
1668 self.assertRegex(output, 'Address: 192.168.42.100')
1669 self.assertRegex(output, 'DNS: 192.168.42.1')
1670 self.assertRegex(output, 'Search Domains: one')
1671
1e498853
YW
1672 def test_keep_configuration_static(self):
1673 check_output('systemctl stop systemd-networkd')
1674
1675 check_output('ip link add name dummy98 type dummy')
1676 check_output('ip address add 10.1.2.3/16 dev dummy98')
1677 check_output('ip address add 10.2.3.4/16 dev dummy98 valid_lft 600 preferred_lft 500')
1678 output = check_output('ip address show dummy98')
1679 print(output)
1680 self.assertRegex(output, 'inet 10.1.2.3/16 scope global dummy98')
1681 self.assertRegex(output, 'inet 10.2.3.4/16 scope global dynamic dummy98')
1682 output = check_output('ip route show dev dummy98')
1683 print(output)
1684
1685 copy_unit_to_networkd_unit_path('24-keep-configuration-static.network')
1686 start_networkd(0)
1687 wait_online(['dummy98:routable'])
1688
1689 output = check_output('ip address show dummy98')
1690 print(output)
1691 self.assertRegex(output, 'inet 10.1.2.3/16 scope global dummy98')
1692 self.assertNotRegex(output, 'inet 10.2.3.4/16 scope global dynamic dummy98')
1693
be68c2c9 1694class NetworkdBondTests(unittest.TestCase, Utilities):
c3a8853f 1695 links = [
c2990ec3 1696 'bond199',
c3a8853f 1697 'bond99',
cc3e488c
YW
1698 'dummy98',
1699 'test1']
c3a8853f
YW
1700
1701 units = [
cc3e488c
YW
1702 '11-dummy.netdev',
1703 '12-dummy.netdev',
c2990ec3
YW
1704 '23-active-slave.network',
1705 '23-bond199.network',
1706 '23-primary-slave.network',
1707 '23-test1-bond199.network',
1708 '25-bond-active-backup-slave.netdev',
c3a8853f 1709 '25-bond.netdev',
c3a8853f 1710 'bond99.network',
cc3e488c 1711 'bond-slave.network']
c3a8853f
YW
1712
1713 def setUp(self):
ec38833c 1714 remove_links(self.links)
c3a8853f
YW
1715
1716 def tearDown(self):
ec38833c
ZJS
1717 remove_links(self.links)
1718 remove_unit_from_networkd_path(self.units)
c3a8853f 1719
c2990ec3 1720 def test_bond_active_slave(self):
ec38833c
ZJS
1721 copy_unit_to_networkd_unit_path('23-active-slave.network', '23-bond199.network', '25-bond-active-backup-slave.netdev', '12-dummy.netdev')
1722 start_networkd()
c2990ec3 1723
e39cc445
YW
1724 self.check_link_exists('dummy98')
1725 self.check_link_exists('bond199')
c2990ec3 1726
371810d1 1727 output = check_output('ip -d link show bond199')
c2990ec3
YW
1728 print(output)
1729 self.assertRegex(output, 'active_slave dummy98')
1730
1731 def test_bond_primary_slave(self):
ec38833c
ZJS
1732 copy_unit_to_networkd_unit_path('23-primary-slave.network', '23-test1-bond199.network', '25-bond-active-backup-slave.netdev', '11-dummy.netdev')
1733 start_networkd()
c2990ec3 1734
e39cc445
YW
1735 self.check_link_exists('test1')
1736 self.check_link_exists('bond199')
c2990ec3 1737
371810d1 1738 output = check_output('ip -d link show bond199')
c2990ec3
YW
1739 print(output)
1740 self.assertRegex(output, 'primary test1')
1741
cc3e488c 1742 def test_bond_operstate(self):
ec38833c
ZJS
1743 copy_unit_to_networkd_unit_path('25-bond.netdev', '11-dummy.netdev', '12-dummy.netdev',
1744 'bond99.network','bond-slave.network')
1745 start_networkd()
c3a8853f 1746
e39cc445
YW
1747 self.check_link_exists('bond99')
1748 self.check_link_exists('dummy98')
1749 self.check_link_exists('test1')
c3a8853f 1750
371810d1 1751 output = check_output('ip -d link show dummy98')
c3a8853f 1752 print(output)
cc3e488c 1753 self.assertRegex(output, 'SLAVE,UP,LOWER_UP')
c3a8853f 1754
371810d1 1755 output = check_output('ip -d link show test1')
c3a8853f
YW
1756 print(output)
1757 self.assertRegex(output, 'SLAVE,UP,LOWER_UP')
1758
371810d1 1759 output = check_output('ip -d link show bond99')
c3a8853f
YW
1760 print(output)
1761 self.assertRegex(output, 'MASTER,UP,LOWER_UP')
1762
791c1140
YW
1763 self.check_operstate('dummy98', 'enslaved')
1764 self.check_operstate('test1', 'enslaved')
1765 self.check_operstate('bond99', 'routable')
c3a8853f 1766
cefd6b3d 1767 check_output('ip link set dummy98 down')
c3a8853f
YW
1768 time.sleep(2)
1769
791c1140
YW
1770 self.check_operstate('dummy98', 'off')
1771 self.check_operstate('test1', 'enslaved')
1772 self.check_operstate('bond99', 'degraded-carrier')
c3a8853f 1773
cefd6b3d 1774 check_output('ip link set dummy98 up')
c3a8853f
YW
1775 time.sleep(2)
1776
791c1140
YW
1777 self.check_operstate('dummy98', 'enslaved')
1778 self.check_operstate('test1', 'enslaved')
1779 self.check_operstate('bond99', 'routable')
c3a8853f 1780
cefd6b3d
ZJS
1781 check_output('ip link set dummy98 down')
1782 check_output('ip link set test1 down')
2700d2c7 1783 time.sleep(2)
cc3e488c 1784
791c1140
YW
1785 self.check_operstate('dummy98', 'off')
1786 self.check_operstate('test1', 'off')
2700d2c7 1787
2700d2c7
YW
1788 for trial in range(30):
1789 if trial > 0:
1790 time.sleep(1)
371810d1 1791 output = check_output('ip address show bond99')
2700d2c7 1792 print(output)
ec38833c 1793 if get_operstate('bond99') == 'no-carrier':
2700d2c7
YW
1794 break
1795 else:
1796 # Huh? Kernel does not recognize that all slave interfaces are down?
1797 # Let's confirm that networkd's operstate is consistent with ip's result.
1798 self.assertNotRegex(output, 'NO-CARRIER')
cc3e488c 1799
be68c2c9 1800class NetworkdBridgeTests(unittest.TestCase, Utilities):
09ea6724
YW
1801 links = [
1802 'bridge99',
1803 'dummy98',
1804 'test1']
1805
1806 units = [
1807 '11-dummy.netdev',
1808 '12-dummy.netdev',
1809 '26-bridge.netdev',
1810 '26-bridge-slave-interface-1.network',
1811 '26-bridge-slave-interface-2.network',
804b6cd2 1812 'bridge99-ignore-carrier-loss.network',
09ea6724 1813 'bridge99.network']
1f0e3109
SS
1814
1815 def setUp(self):
ec38833c 1816 remove_links(self.links)
1f0e3109
SS
1817
1818 def tearDown(self):
ec38833c
ZJS
1819 remove_links(self.links)
1820 remove_unit_from_networkd_path(self.units)
1f0e3109
SS
1821
1822 def test_bridge_property(self):
ec38833c
ZJS
1823 copy_unit_to_networkd_unit_path('11-dummy.netdev', '12-dummy.netdev', '26-bridge.netdev',
1824 '26-bridge-slave-interface-1.network', '26-bridge-slave-interface-2.network',
1825 'bridge99.network')
1826 start_networkd()
1f0e3109 1827
e39cc445
YW
1828 self.check_link_exists('dummy98')
1829 self.check_link_exists('test1')
1830 self.check_link_exists('bridge99')
1f0e3109 1831
371810d1 1832 output = check_output('ip -d link show test1')
1f0e3109
SS
1833 print(output)
1834 self.assertRegex(output, 'master')
1835 self.assertRegex(output, 'bridge')
1836
371810d1 1837 output = check_output('ip -d link show dummy98')
1f0e3109
SS
1838 print(output)
1839 self.assertRegex(output, 'master')
1840 self.assertRegex(output, 'bridge')
1841
371810d1 1842 output = check_output('ip addr show bridge99')
1f0e3109 1843 print(output)
2be6c5d2 1844 self.assertRegex(output, '192.168.0.15/24')
1f0e3109 1845
371810d1 1846 output = check_output('bridge -d link show dummy98')
1f0e3109 1847 print(output)
ec38833c
ZJS
1848 self.assertEqual(read_bridge_port_attr('bridge99', 'dummy98', 'hairpin_mode'), '1')
1849 self.assertEqual(read_bridge_port_attr('bridge99', 'dummy98', 'path_cost'), '400')
1850 self.assertEqual(read_bridge_port_attr('bridge99', 'dummy98', 'unicast_flood'), '1')
1851 self.assertEqual(read_bridge_port_attr('bridge99', 'dummy98', 'multicast_flood'), '0')
1852 self.assertEqual(read_bridge_port_attr('bridge99', 'dummy98', 'multicast_fast_leave'), '1')
7f15b714 1853 if (os.path.exists('/sys/devices/virtual/net/bridge99/lower_dummy98/brport/neigh_suppress')):
ec38833c
ZJS
1854 self.assertEqual(read_bridge_port_attr('bridge99', 'dummy98', 'neigh_suppress'), '1')
1855 self.assertEqual(read_bridge_port_attr('bridge99', 'dummy98', 'learning'), '0')
4d7ed14f
SS
1856
1857 # CONFIG_BRIDGE_IGMP_SNOOPING=y
1858 if (os.path.exists('/sys/devices/virtual/net/bridge00/lower_dummy98/brport/multicast_to_unicast')):
ec38833c 1859 self.assertEqual(read_bridge_port_attr('bridge99', 'dummy98', 'multicast_to_unicast'), '1')
1f0e3109 1860
791c1140
YW
1861 self.check_operstate('test1', 'enslaved')
1862 self.check_operstate('dummy98', 'enslaved')
1863 self.check_operstate('bridge99', 'routable')
2be6c5d2 1864
371810d1 1865 check_output('ip address add 192.168.0.16/24 dev bridge99')
804b6cd2
YW
1866 time.sleep(1)
1867
371810d1 1868 output = check_output('ip addr show bridge99')
2be6c5d2
YW
1869 print(output)
1870 self.assertRegex(output, '192.168.0.16/24')
1871
791c1140 1872 self.check_operstate('bridge99', 'routable')
2be6c5d2 1873
371810d1 1874 self.assertEqual(call('ip link del test1'), 0)
2be6c5d2
YW
1875 time.sleep(3)
1876
791c1140 1877 self.check_operstate('bridge99', 'degraded-carrier')
2be6c5d2 1878
cefd6b3d 1879 check_output('ip link del dummy98')
804b6cd2
YW
1880 time.sleep(3)
1881
791c1140 1882 self.check_operstate('bridge99', 'no-carrier')
2be6c5d2 1883
371810d1 1884 output = check_output('ip address show bridge99')
804b6cd2
YW
1885 print(output)
1886 self.assertRegex(output, 'NO-CARRIER')
1887 self.assertNotRegex(output, '192.168.0.15/24')
1888 self.assertNotRegex(output, '192.168.0.16/24')
1889
1890 def test_bridge_ignore_carrier_loss(self):
ec38833c
ZJS
1891 copy_unit_to_networkd_unit_path('11-dummy.netdev', '12-dummy.netdev', '26-bridge.netdev',
1892 '26-bridge-slave-interface-1.network', '26-bridge-slave-interface-2.network',
1893 'bridge99-ignore-carrier-loss.network')
371810d1 1894 call('ip rule del table 100')
703bc7a2 1895
ec38833c 1896 start_networkd()
804b6cd2 1897
e39cc445
YW
1898 self.check_link_exists('dummy98')
1899 self.check_link_exists('test1')
1900 self.check_link_exists('bridge99')
804b6cd2 1901
371810d1 1902 check_output('ip address add 192.168.0.16/24 dev bridge99')
804b6cd2
YW
1903 time.sleep(1)
1904
371810d1
ZJS
1905 check_output('ip link del test1')
1906 check_output('ip link del dummy98')
804b6cd2
YW
1907 time.sleep(3)
1908
371810d1 1909 output = check_output('ip address show bridge99')
804b6cd2
YW
1910 print(output)
1911 self.assertRegex(output, 'NO-CARRIER')
1912 self.assertRegex(output, 'inet 192.168.0.15/24 brd 192.168.0.255 scope global bridge99')
1913 self.assertRegex(output, 'inet 192.168.0.16/24 scope global secondary bridge99')
1914
371810d1 1915 call('ip rule del table 100')
6609924c
YW
1916
1917 def test_bridge_ignore_carrier_loss_frequent_loss_and_gain(self):
ec38833c
ZJS
1918 copy_unit_to_networkd_unit_path('26-bridge.netdev', '26-bridge-slave-interface-1.network',
1919 'bridge99-ignore-carrier-loss.network')
703bc7a2 1920
371810d1 1921 call('ip rule del table 100')
703bc7a2 1922
ec38833c 1923 start_networkd()
6609924c 1924
e39cc445 1925 self.check_link_exists('bridge99')
6609924c 1926
cefd6b3d
ZJS
1927 check_output('ip link add dummy98 type dummy')
1928 check_output('ip link set dummy98 up')
1929 check_output('ip link del dummy98')
6609924c 1930
cefd6b3d
ZJS
1931 check_output('ip link add dummy98 type dummy')
1932 check_output('ip link set dummy98 up')
1933 check_output('ip link del dummy98')
6609924c 1934
cefd6b3d
ZJS
1935 check_output('ip link add dummy98 type dummy')
1936 check_output('ip link set dummy98 up')
1937 check_output('ip link del dummy98')
6609924c 1938
cefd6b3d
ZJS
1939 check_output('ip link add dummy98 type dummy')
1940 check_output('ip link set dummy98 up')
6609924c 1941
be0e1ef9
YW
1942 for trial in range(30):
1943 if trial > 0:
1944 time.sleep(1)
ec38833c 1945 if get_operstate('bridge99') == 'routable' and get_operstate('dummy98') == 'enslaved':
be0e1ef9
YW
1946 break
1947 else:
1948 self.assertTrue(False)
6609924c 1949
371810d1 1950 output = check_output('ip address show bridge99')
6609924c
YW
1951 print(output)
1952 self.assertRegex(output, 'inet 192.168.0.15/24 brd 192.168.0.255 scope global bridge99')
1953
371810d1 1954 output = check_output('ip rule list table 100')
6609924c
YW
1955 print(output)
1956 self.assertEqual(output, '0: from all to 8.8.8.8 lookup 100')
1957
371810d1 1958 call('ip rule del table 100')
6609924c 1959
be68c2c9 1960class NetworkdLLDPTests(unittest.TestCase, Utilities):
1f0e3109
SS
1961 links = ['veth99']
1962
09ea6724
YW
1963 units = [
1964 '23-emit-lldp.network',
1965 '24-lldp.network',
1966 '25-veth.netdev']
1f0e3109
SS
1967
1968 def setUp(self):
ec38833c 1969 remove_links(self.links)
1f0e3109
SS
1970
1971 def tearDown(self):
ec38833c
ZJS
1972 remove_links(self.links)
1973 remove_unit_from_networkd_path(self.units)
1f0e3109
SS
1974
1975 def test_lldp(self):
ec38833c
ZJS
1976 copy_unit_to_networkd_unit_path('23-emit-lldp.network', '24-lldp.network', '25-veth.netdev')
1977 start_networkd(0)
1978 wait_online(['veth99:degraded', 'veth-peer:degraded'])
1f0e3109 1979
371810d1 1980 output = check_output(*networkctl_cmd, 'lldp', env=env)
1f0e3109
SS
1981 print(output)
1982 self.assertRegex(output, 'veth-peer')
1983 self.assertRegex(output, 'veth99')
1984
be68c2c9 1985class NetworkdRATests(unittest.TestCase, Utilities):
1f0e3109
SS
1986 links = ['veth99']
1987
09ea6724
YW
1988 units = [
1989 '25-veth.netdev',
1990 'ipv6-prefix.network',
1991 'ipv6-prefix-veth.network']
1f0e3109
SS
1992
1993 def setUp(self):
ec38833c 1994 remove_links(self.links)
1f0e3109
SS
1995
1996 def tearDown(self):
ec38833c
ZJS
1997 remove_links(self.links)
1998 remove_unit_from_networkd_path(self.units)
1f0e3109
SS
1999
2000 def test_ipv6_prefix_delegation(self):
ec38833c
ZJS
2001 warn_about_firewalld()
2002 copy_unit_to_networkd_unit_path('25-veth.netdev', 'ipv6-prefix.network', 'ipv6-prefix-veth.network')
2003 start_networkd(0)
2004 wait_online(['veth99:routable', 'veth-peer:degraded'])
1f0e3109 2005
371810d1 2006 output = check_output(*networkctl_cmd, 'status', 'veth99', env=env)
1f0e3109
SS
2007 print(output)
2008 self.assertRegex(output, '2002:da8:1:0')
2009
be68c2c9 2010class NetworkdDHCPServerTests(unittest.TestCase, Utilities):
fdcd1ec5 2011 links = ['veth99']
09ea6724
YW
2012
2013 units = [
09ea6724
YW
2014 '25-veth.netdev',
2015 'dhcp-client.network',
2016 'dhcp-client-timezone-router.network',
2017 'dhcp-server.network',
2018 'dhcp-server-timezone-router.network']
1f0e3109
SS
2019
2020 def setUp(self):
ec38833c 2021 remove_links(self.links)
1f0e3109
SS
2022
2023 def tearDown(self):
ec38833c
ZJS
2024 remove_links(self.links)
2025 remove_unit_from_networkd_path(self.units)
1f0e3109
SS
2026
2027 def test_dhcp_server(self):
ec38833c
ZJS
2028 warn_about_firewalld()
2029 copy_unit_to_networkd_unit_path('25-veth.netdev', 'dhcp-client.network', 'dhcp-server.network')
2030 start_networkd(0)
2031 wait_online(['veth99:routable', 'veth-peer:routable'])
1f0e3109 2032
371810d1 2033 output = check_output(*networkctl_cmd, 'status', 'veth99', env=env)
1f0e3109
SS
2034 print(output)
2035 self.assertRegex(output, '192.168.5.*')
2036 self.assertRegex(output, 'Gateway: 192.168.5.1')
2037 self.assertRegex(output, 'DNS: 192.168.5.1')
2038 self.assertRegex(output, 'NTP: 192.168.5.1')
2039
1f0e3109 2040 def test_emit_router_timezone(self):
ec38833c
ZJS
2041 warn_about_firewalld()
2042 copy_unit_to_networkd_unit_path('25-veth.netdev', 'dhcp-client-timezone-router.network', 'dhcp-server-timezone-router.network')
2043 start_networkd(0)
2044 wait_online(['veth99:routable', 'veth-peer:routable'])
1f0e3109 2045
371810d1 2046 output = check_output(*networkctl_cmd, 'status', 'veth99', env=env)
1f0e3109
SS
2047 print(output)
2048 self.assertRegex(output, 'Gateway: 192.168.5.*')
2049 self.assertRegex(output, '192.168.5.*')
2050 self.assertRegex(output, 'Europe/Berlin')
2051
be68c2c9 2052class NetworkdDHCPClientTests(unittest.TestCase, Utilities):
09ea6724 2053 links = [
18c613dc
YW
2054 'veth99',
2055 'vrf99']
09ea6724
YW
2056
2057 units = [
2058 '25-veth.netdev',
18c613dc
YW
2059 '25-vrf.netdev',
2060 '25-vrf.network',
09ea6724 2061 'dhcp-client-anonymize.network',
af3b1498 2062 'dhcp-client-gateway-onlink-implicit.network',
09ea6724
YW
2063 'dhcp-client-ipv4-dhcp-settings.network',
2064 'dhcp-client-ipv4-only-ipv6-disabled.network',
2065 'dhcp-client-ipv4-only.network',
2066 'dhcp-client-ipv6-only.network',
2067 'dhcp-client-ipv6-rapid-commit.network',
1e498853
YW
2068 'dhcp-client-keep-configuration-dhcp-on-stop.network',
2069 'dhcp-client-keep-configuration-dhcp.network',
09ea6724
YW
2070 'dhcp-client-listen-port.network',
2071 'dhcp-client-route-metric.network',
2072 'dhcp-client-route-table.network',
18c613dc 2073 'dhcp-client-vrf.network',
117a55c7
YW
2074 'dhcp-client-with-ipv4ll-fallback-with-dhcp-server.network',
2075 'dhcp-client-with-ipv4ll-fallback-without-dhcp-server.network',
3e9d5552 2076 'dhcp-client.network',
09ea6724 2077 'dhcp-server-veth-peer.network',
30d3b54e
YW
2078 'dhcp-v4-server-veth-peer.network',
2079 'static.network']
1f0e3109
SS
2080
2081 def setUp(self):
ec38833c
ZJS
2082 stop_dnsmasq(dnsmasq_pid_file)
2083 remove_links(self.links)
1f0e3109
SS
2084
2085 def tearDown(self):
ec38833c
ZJS
2086 stop_dnsmasq(dnsmasq_pid_file)
2087 remove_lease_file()
2088 remove_log_file()
2089 remove_links(self.links)
2090 remove_unit_from_networkd_path(self.units)
1f0e3109
SS
2091
2092 def test_dhcp_client_ipv6_only(self):
ec38833c 2093 copy_unit_to_networkd_unit_path('25-veth.netdev', 'dhcp-server-veth-peer.network', 'dhcp-client-ipv6-only.network')
1f0e3109 2094
ec38833c
ZJS
2095 start_networkd(0)
2096 wait_online(['veth-peer:carrier'])
2097 start_dnsmasq()
2098 wait_online(['veth99:routable', 'veth-peer:routable'])
1f0e3109 2099
371810d1 2100 output = check_output(*networkctl_cmd, 'status', 'veth99', env=env)
1f0e3109
SS
2101 print(output)
2102 self.assertRegex(output, '2600::')
2103 self.assertNotRegex(output, '192.168.5')
2104
3a956d38 2105 # Confirm that ipv6 token is not set in the kernel
371810d1 2106 output = check_output('ip token show dev veth99')
3a956d38
YW
2107 print(output)
2108 self.assertRegex(output, 'token :: dev veth99')
2109
1f0e3109 2110 def test_dhcp_client_ipv4_only(self):
ec38833c 2111 copy_unit_to_networkd_unit_path('25-veth.netdev', 'dhcp-server-veth-peer.network', 'dhcp-client-ipv4-only-ipv6-disabled.network')
1f0e3109 2112
ec38833c
ZJS
2113 start_networkd(0)
2114 wait_online(['veth-peer:carrier'])
2115 start_dnsmasq()
2116 wait_online(['veth99:routable', 'veth-peer:routable'])
1f0e3109 2117
371810d1 2118 output = check_output(*networkctl_cmd, 'status', 'veth99', env=env)
1f0e3109
SS
2119 print(output)
2120 self.assertNotRegex(output, '2600::')
2121 self.assertRegex(output, '192.168.5')
2122
2123 def test_dhcp_client_ipv4_ipv6(self):
ec38833c
ZJS
2124 copy_unit_to_networkd_unit_path('25-veth.netdev', 'dhcp-server-veth-peer.network', 'dhcp-client-ipv6-only.network',
2125 'dhcp-client-ipv4-only.network')
2126 start_networkd(0)
2127 wait_online(['veth-peer:carrier'])
2128 start_dnsmasq()
2129 wait_online(['veth99:routable', 'veth-peer:routable'])
2629df47
YW
2130
2131 # link become 'routable' when at least one protocol provide an valid address.
e16ffe79
YW
2132 self.wait_address('veth99', r'inet 192.168.5.[0-9]*/24 brd 192.168.5.255 scope global dynamic', ipv='-4')
2133 self.wait_address('veth99', r'inet6 2600::[0-9a-f]*/128 scope global (?:dynamic noprefixroute|noprefixroute dynamic)', ipv='-6')
1f0e3109 2134
371810d1 2135 output = check_output(*networkctl_cmd, 'status', 'veth99', env=env)
1f0e3109
SS
2136 print(output)
2137 self.assertRegex(output, '2600::')
2138 self.assertRegex(output, '192.168.5')
2139
2140 def test_dhcp_client_settings(self):
ec38833c 2141 copy_unit_to_networkd_unit_path('25-veth.netdev', 'dhcp-server-veth-peer.network', 'dhcp-client-ipv4-dhcp-settings.network')
1f0e3109 2142
ec38833c
ZJS
2143 start_networkd(0)
2144 wait_online(['veth-peer:carrier'])
2145 start_dnsmasq()
2146 wait_online(['veth99:routable', 'veth-peer:routable'])
1f0e3109 2147
0ae7a66d 2148 print('## ip address show dev veth99')
371810d1 2149 output = check_output('ip address show dev veth99')
1f0e3109
SS
2150 print(output)
2151 self.assertRegex(output, '12:34:56:78:9a:bc')
2152 self.assertRegex(output, '192.168.5')
2153 self.assertRegex(output, '1492')
2154
0ae7a66d
YW
2155 # issue #8726
2156 print('## ip route show table main dev veth99')
371810d1 2157 output = check_output('ip route show table main dev veth99')
1f0e3109 2158 print(output)
0ae7a66d 2159 self.assertNotRegex(output, 'proto dhcp')
1f0e3109 2160
0ae7a66d 2161 print('## ip route show table 211 dev veth99')
371810d1 2162 output = check_output('ip route show table 211 dev veth99')
0ae7a66d
YW
2163 print(output)
2164 self.assertRegex(output, 'default via 192.168.5.1 proto dhcp')
2165 self.assertRegex(output, '192.168.5.0/24 via 192.168.5.5 proto dhcp')
2166 self.assertRegex(output, '192.168.5.1 proto dhcp scope link')
2167
2168 print('## dnsmasq log')
ec38833c
ZJS
2169 self.assertTrue(search_words_in_dnsmasq_log('vendor class: SusantVendorTest', True))
2170 self.assertTrue(search_words_in_dnsmasq_log('DHCPDISCOVER(veth-peer) 12:34:56:78:9a:bc'))
2171 self.assertTrue(search_words_in_dnsmasq_log('client provides name: test-hostname'))
2172 self.assertTrue(search_words_in_dnsmasq_log('26:mtu'))
1f0e3109
SS
2173
2174 def test_dhcp6_client_settings_rapidcommit_true(self):
ec38833c
ZJS
2175 copy_unit_to_networkd_unit_path('25-veth.netdev', 'dhcp-server-veth-peer.network', 'dhcp-client-ipv6-only.network')
2176 start_networkd(0)
2177 wait_online(['veth-peer:carrier'])
2178 start_dnsmasq()
2179 wait_online(['veth99:routable', 'veth-peer:routable'])
1f0e3109 2180
371810d1 2181 output = check_output('ip address show dev veth99')
1f0e3109
SS
2182 print(output)
2183 self.assertRegex(output, '12:34:56:78:9a:bc')
ec38833c 2184 self.assertTrue(search_words_in_dnsmasq_log('14:rapid-commit', True))
1f0e3109
SS
2185
2186 def test_dhcp6_client_settings_rapidcommit_false(self):
ec38833c
ZJS
2187 copy_unit_to_networkd_unit_path('25-veth.netdev', 'dhcp-server-veth-peer.network', 'dhcp-client-ipv6-rapid-commit.network')
2188 start_networkd(0)
2189 wait_online(['veth-peer:carrier'])
2190 start_dnsmasq()
2191 wait_online(['veth99:routable', 'veth-peer:routable'])
1f0e3109 2192
371810d1 2193 output = check_output('ip address show dev veth99')
1f0e3109
SS
2194 print(output)
2195 self.assertRegex(output, '12:34:56:78:9a:bc')
ec38833c 2196 self.assertFalse(search_words_in_dnsmasq_log('14:rapid-commit', True))
1f0e3109
SS
2197
2198 def test_dhcp_client_settings_anonymize(self):
ec38833c
ZJS
2199 copy_unit_to_networkd_unit_path('25-veth.netdev', 'dhcp-server-veth-peer.network', 'dhcp-client-anonymize.network')
2200 start_networkd(0)
2201 wait_online(['veth-peer:carrier'])
2202 start_dnsmasq()
2203 wait_online(['veth99:routable', 'veth-peer:routable'])
e40a58b5 2204
ec38833c
ZJS
2205 self.assertFalse(search_words_in_dnsmasq_log('VendorClassIdentifier=SusantVendorTest', True))
2206 self.assertFalse(search_words_in_dnsmasq_log('test-hostname'))
2207 self.assertFalse(search_words_in_dnsmasq_log('26:mtu'))
1f0e3109
SS
2208
2209 def test_dhcp_client_listen_port(self):
ec38833c
ZJS
2210 copy_unit_to_networkd_unit_path('25-veth.netdev', 'dhcp-server-veth-peer.network', 'dhcp-client-listen-port.network')
2211 start_networkd(0)
2212 wait_online(['veth-peer:carrier'])
2213 start_dnsmasq('--dhcp-alternate-port=67,5555')
2214 wait_online(['veth99:routable', 'veth-peer:routable'])
2629df47
YW
2215
2216 # link become 'routable' when at least one protocol provide an valid address.
e16ffe79
YW
2217 self.wait_address('veth99', r'inet 192.168.5.[0-9]*/24 brd 192.168.5.255 scope global dynamic', ipv='-4')
2218 self.wait_address('veth99', r'inet6 2600::[0-9a-f]*/128 scope global (?:dynamic noprefixroute|noprefixroute dynamic)', ipv='-6')
1f0e3109 2219
371810d1 2220 output = check_output('ip -4 address show dev veth99')
b412fce8
YW
2221 print(output)
2222 self.assertRegex(output, '192.168.5.* dynamic')
1f0e3109
SS
2223
2224 def test_dhcp_route_table_id(self):
ec38833c
ZJS
2225 copy_unit_to_networkd_unit_path('25-veth.netdev', 'dhcp-v4-server-veth-peer.network', 'dhcp-client-route-table.network')
2226 start_networkd(0)
2227 wait_online(['veth-peer:carrier'])
2228 start_dnsmasq()
2229 wait_online(['veth99:routable', 'veth-peer:routable'])
e40a58b5 2230
371810d1 2231 output = check_output('ip route show table 12')
1f0e3109 2232 print(output)
1f0e3109
SS
2233 self.assertRegex(output, 'veth99 proto dhcp')
2234 self.assertRegex(output, '192.168.5.1')
2235
2236 def test_dhcp_route_metric(self):
ec38833c
ZJS
2237 copy_unit_to_networkd_unit_path('25-veth.netdev', 'dhcp-v4-server-veth-peer.network', 'dhcp-client-route-metric.network')
2238 start_networkd(0)
2239 wait_online(['veth-peer:carrier'])
2240 start_dnsmasq()
2241 wait_online(['veth99:routable', 'veth-peer:routable'])
e40a58b5 2242
371810d1 2243 output = check_output('ip route show dev veth99')
1f0e3109 2244 print(output)
1f0e3109
SS
2245 self.assertRegex(output, 'metric 24')
2246
1e498853
YW
2247 def test_dhcp_keep_configuration_dhcp(self):
2248 copy_unit_to_networkd_unit_path('25-veth.netdev', 'dhcp-v4-server-veth-peer.network', 'dhcp-client-keep-configuration-dhcp.network')
ec38833c
ZJS
2249 start_networkd(0)
2250 wait_online(['veth-peer:carrier'])
1e498853 2251 start_dnsmasq(lease_time='2m')
ec38833c 2252 wait_online(['veth99:routable', 'veth-peer:routable'])
e40a58b5 2253
1e498853
YW
2254 output = check_output('ip address show dev veth99 scope global')
2255 print(output)
2256 self.assertRegex(output, r'192.168.5.*')
2257
371810d1 2258 output = check_output(*networkctl_cmd, 'status', 'veth99', env=env)
1f0e3109 2259 print(output)
1e498853 2260 self.assertRegex(output, r'192.168.5.*')
e40a58b5 2261
5238e957 2262 # Stopping dnsmasq as networkd won't be allowed to renew the DHCP lease.
ec38833c 2263 stop_dnsmasq(dnsmasq_pid_file)
1f0e3109
SS
2264
2265 # Sleep for 120 sec as the dnsmasq minimum lease time can only be set to 120
1e498853 2266 print('Wait for the dynamic address to be expired')
1f0e3109
SS
2267 time.sleep(125)
2268
1e498853
YW
2269 print('The lease address should be kept after lease expired')
2270 output = check_output('ip address show dev veth99 scope global')
2271 print(output)
2272 self.assertRegex(output, r'192.168.5.*')
2273
371810d1 2274 output = check_output(*networkctl_cmd, 'status', 'veth99', env=env)
1f0e3109 2275 print(output)
1e498853
YW
2276 self.assertRegex(output, r'192.168.5.*')
2277
2278 check_output('systemctl stop systemd-networkd')
2279
2280 print('The lease address should be kept after networkd stopped')
2281 output = check_output('ip address show dev veth99 scope global')
2282 print(output)
2283 self.assertRegex(output, r'192.168.5.*')
2284
2285 output = check_output(*networkctl_cmd, 'status', 'veth99', env=env)
2286 print(output)
2287 self.assertRegex(output, r'192.168.5.*')
2288
2289 check_output('systemctl start systemd-networkd')
2290 wait_online(['veth-peer:routable'])
2291
2292 print('Still the lease address should be kept after networkd restarted')
2293 output = check_output('ip address show dev veth99 scope global')
2294 print(output)
2295 self.assertRegex(output, r'192.168.5.*')
2296
2297 output = check_output(*networkctl_cmd, 'status', 'veth99', env=env)
2298 print(output)
2299 self.assertRegex(output, r'192.168.5.*')
2300
2301 def test_dhcp_keep_configuration_dhcp_on_stop(self):
2302 copy_unit_to_networkd_unit_path('25-veth.netdev', 'dhcp-v4-server-veth-peer.network', 'dhcp-client-keep-configuration-dhcp-on-stop.network')
2303 start_networkd(0)
2304 wait_online(['veth-peer:carrier'])
2305 start_dnsmasq(lease_time='2m')
2306 wait_online(['veth99:routable', 'veth-peer:routable'])
2307
2308 output = check_output('ip address show dev veth99 scope global')
2309 print(output)
2310 self.assertRegex(output, r'192.168.5.*')
2311
2312 stop_dnsmasq(dnsmasq_pid_file)
2313 check_output('systemctl stop systemd-networkd')
2314
2315 output = check_output('ip address show dev veth99 scope global')
2316 print(output)
2317 self.assertRegex(output, r'192.168.5.*')
2318
2319 start_networkd(0)
2320 wait_online(['veth-peer:routable'])
2321
2322 output = check_output('ip address show dev veth99 scope global')
2323 print(output)
2324 self.assertNotRegex(output, r'192.168.5.*')
1f0e3109 2325
30d3b54e 2326 def test_dhcp_client_reuse_address_as_static(self):
ec38833c
ZJS
2327 copy_unit_to_networkd_unit_path('25-veth.netdev', 'dhcp-server-veth-peer.network', 'dhcp-client.network')
2328 start_networkd(0)
2329 wait_online(['veth-peer:carrier'])
2330 start_dnsmasq()
2331 wait_online(['veth99:routable', 'veth-peer:routable'])
2629df47
YW
2332
2333 # link become 'routable' when at least one protocol provide an valid address.
e16ffe79
YW
2334 self.wait_address('veth99', r'inet 192.168.5.[0-9]*/24 brd 192.168.5.255 scope global dynamic', ipv='-4')
2335 self.wait_address('veth99', r'inet6 2600::[0-9a-f]*/128 scope global (?:dynamic noprefixroute|noprefixroute dynamic)', ipv='-6')
30d3b54e 2336
371810d1 2337 output = check_output('ip address show dev veth99 scope global')
30d3b54e
YW
2338 print(output)
2339 self.assertRegex(output, '192.168.5')
2340 self.assertRegex(output, '2600::')
2341
2629df47
YW
2342 ipv4_address = re.search(r'192.168.5.[0-9]*/24', output)
2343 ipv6_address = re.search(r'2600::[0-9a-f:]*/128', output)
30d3b54e
YW
2344 static_network = '\n'.join(['[Match]', 'Name=veth99', '[Network]', 'IPv6AcceptRA=no', 'Address=' + ipv4_address.group(), 'Address=' + ipv6_address.group()])
2345 print(static_network)
2346
ec38833c 2347 remove_unit_from_networkd_path(['dhcp-client.network'])
30d3b54e
YW
2348
2349 with open(os.path.join(network_unit_file_path, 'static.network'), mode='w') as f:
2350 f.write(static_network)
2351
2629df47
YW
2352 # When networkd started, the links are already configured, so let's wait for 5 seconds
2353 # the links to be re-configured.
ec38833c
ZJS
2354 start_networkd(5)
2355 wait_online(['veth99:routable', 'veth-peer:routable'])
30d3b54e 2356
371810d1 2357 output = check_output('ip -4 address show dev veth99 scope global')
30d3b54e
YW
2358 print(output)
2359 self.assertRegex(output, '192.168.5')
2360 self.assertRegex(output, 'valid_lft forever preferred_lft forever')
2361
371810d1 2362 output = check_output('ip -6 address show dev veth99 scope global')
30d3b54e
YW
2363 print(output)
2364 self.assertRegex(output, '2600::')
2365 self.assertRegex(output, 'valid_lft forever preferred_lft forever')
2366
18c613dc
YW
2367 @expectedFailureIfModuleIsNotAvailable('vrf')
2368 def test_dhcp_client_vrf(self):
ec38833c
ZJS
2369 copy_unit_to_networkd_unit_path('25-veth.netdev', 'dhcp-server-veth-peer.network', 'dhcp-client-vrf.network',
2370 '25-vrf.netdev', '25-vrf.network')
2371 start_networkd(0)
2372 wait_online(['veth-peer:carrier'])
2373 start_dnsmasq()
2374 wait_online(['veth99:routable', 'veth-peer:routable', 'vrf99:carrier'])
2629df47
YW
2375
2376 # link become 'routable' when at least one protocol provide an valid address.
e16ffe79
YW
2377 self.wait_address('veth99', r'inet 192.168.5.[0-9]*/24 brd 192.168.5.255 scope global dynamic', ipv='-4')
2378 self.wait_address('veth99', r'inet6 2600::[0-9a-f]*/128 scope global (?:dynamic noprefixroute|noprefixroute dynamic)', ipv='-6')
18c613dc
YW
2379
2380 print('## ip -d link show dev vrf99')
371810d1 2381 output = check_output('ip -d link show dev vrf99')
18c613dc
YW
2382 print(output)
2383 self.assertRegex(output, 'vrf table 42')
2384
2385 print('## ip address show vrf vrf99')
371810d1 2386 output = check_output('ip address show vrf vrf99')
d90f4f7d
YW
2387 print(output)
2388 self.assertRegex(output, 'inet 169.254.[0-9]*.[0-9]*/16 brd 169.254.255.255 scope link veth99')
2389 self.assertRegex(output, 'inet 192.168.5.[0-9]*/24 brd 192.168.5.255 scope global dynamic veth99')
2390 self.assertRegex(output, 'inet6 2600::[0-9a-f]*/128 scope global (?:dynamic noprefixroute|noprefixroute dynamic)')
2391 self.assertRegex(output, 'inet6 .* scope link')
18c613dc
YW
2392
2393 print('## ip address show dev veth99')
371810d1 2394 output = check_output('ip address show dev veth99')
18c613dc 2395 print(output)
18c613dc
YW
2396 self.assertRegex(output, 'inet 169.254.[0-9]*.[0-9]*/16 brd 169.254.255.255 scope link veth99')
2397 self.assertRegex(output, 'inet 192.168.5.[0-9]*/24 brd 192.168.5.255 scope global dynamic veth99')
d90f4f7d 2398 self.assertRegex(output, 'inet6 2600::[0-9a-f]*/128 scope global (?:dynamic noprefixroute|noprefixroute dynamic)')
18c613dc
YW
2399 self.assertRegex(output, 'inet6 .* scope link')
2400
2401 print('## ip route show vrf vrf99')
371810d1 2402 output = check_output('ip route show vrf vrf99')
18c613dc
YW
2403 print(output)
2404 self.assertRegex(output, 'default via 192.168.5.1 dev veth99 proto dhcp src 192.168.5.')
2405 self.assertRegex(output, 'default dev veth99 proto static scope link')
2406 self.assertRegex(output, '169.254.0.0/16 dev veth99 proto kernel scope link src 169.254')
2407 self.assertRegex(output, '192.168.5.0/24 dev veth99 proto kernel scope link src 192.168.5')
2408 self.assertRegex(output, '192.168.5.0/24 via 192.168.5.5 dev veth99 proto dhcp')
2409 self.assertRegex(output, '192.168.5.1 dev veth99 proto dhcp scope link src 192.168.5')
2410
2411 print('## ip route show table main dev veth99')
371810d1 2412 output = check_output('ip route show table main dev veth99')
18c613dc
YW
2413 print(output)
2414 self.assertEqual(output, '')
2415
791c1140
YW
2416 self.check_operstate('vrf99', 'carrier')
2417 self.check_operstate('veth99', 'routable')
18c613dc 2418
af3b1498 2419 def test_dhcp_client_gateway_onlink_implicit(self):
ec38833c
ZJS
2420 copy_unit_to_networkd_unit_path('25-veth.netdev', 'dhcp-server-veth-peer.network',
2421 'dhcp-client-gateway-onlink-implicit.network')
2422 start_networkd(0)
2423 wait_online(['veth-peer:carrier'])
2424 start_dnsmasq()
2425 wait_online(['veth99:routable', 'veth-peer:routable'])
af3b1498 2426
371810d1 2427 output = check_output(*networkctl_cmd, 'status', 'veth99', env=env)
af3b1498
YW
2428 print(output)
2429 self.assertRegex(output, '192.168.5')
2430
371810d1 2431 output = check_output('ip route list dev veth99 10.0.0.0/8')
af3b1498
YW
2432 print(output)
2433 self.assertRegex(output, 'onlink')
371810d1 2434 output = check_output('ip route list dev veth99 192.168.100.0/24')
af3b1498
YW
2435 print(output)
2436 self.assertRegex(output, 'onlink')
2437
117a55c7 2438 def test_dhcp_client_with_ipv4ll_fallback_with_dhcp_server(self):
ec38833c
ZJS
2439 copy_unit_to_networkd_unit_path('25-veth.netdev', 'dhcp-server-veth-peer.network',
2440 'dhcp-client-with-ipv4ll-fallback-with-dhcp-server.network')
2441 start_networkd(0)
2442 wait_online(['veth-peer:carrier'])
2443 start_dnsmasq(lease_time='2m')
2444 wait_online(['veth99:routable', 'veth-peer:routable'])
63c598ed 2445
371810d1 2446 output = check_output('ip address show dev veth99')
63c598ed
YW
2447 print(output)
2448
371810d1 2449 output = check_output('ip -6 address show dev veth99 scope global dynamic')
63c598ed 2450 self.assertNotRegex(output, 'inet6 2600::[0-9a-f]*/128 scope global dynamic')
371810d1 2451 output = check_output('ip -6 address show dev veth99 scope link')
63c598ed 2452 self.assertRegex(output, 'inet6 .* scope link')
371810d1 2453 output = check_output('ip -4 address show dev veth99 scope global dynamic')
63c598ed 2454 self.assertRegex(output, 'inet 192.168.5.[0-9]*/24 brd 192.168.5.255 scope global dynamic veth99')
371810d1 2455 output = check_output('ip -4 address show dev veth99 scope link')
63c598ed
YW
2456 self.assertNotRegex(output, 'inet .* scope link')
2457
2458 print('Wait for the dynamic address to be expired')
2459 time.sleep(130)
2460
371810d1 2461 output = check_output('ip address show dev veth99')
63c598ed
YW
2462 print(output)
2463
371810d1 2464 output = check_output('ip -6 address show dev veth99 scope global dynamic')
63c598ed 2465 self.assertNotRegex(output, 'inet6 2600::[0-9a-f]*/128 scope global dynamic')
371810d1 2466 output = check_output('ip -6 address show dev veth99 scope link')
63c598ed 2467 self.assertRegex(output, 'inet6 .* scope link')
371810d1 2468 output = check_output('ip -4 address show dev veth99 scope global dynamic')
63c598ed 2469 self.assertRegex(output, 'inet 192.168.5.[0-9]*/24 brd 192.168.5.255 scope global dynamic veth99')
371810d1 2470 output = check_output('ip -4 address show dev veth99 scope link')
63c598ed
YW
2471 self.assertNotRegex(output, 'inet .* scope link')
2472
ec38833c 2473 search_words_in_dnsmasq_log('DHCPOFFER', show_all=True)
63c598ed 2474
117a55c7 2475 def test_dhcp_client_with_ipv4ll_fallback_without_dhcp_server(self):
ec38833c
ZJS
2476 copy_unit_to_networkd_unit_path('25-veth.netdev', 'dhcp-server-veth-peer.network',
2477 'dhcp-client-with-ipv4ll-fallback-without-dhcp-server.network')
2478 start_networkd(0)
2479 wait_online(['veth99:degraded', 'veth-peer:routable'])
117a55c7 2480
371810d1 2481 output = check_output('ip address show dev veth99')
117a55c7
YW
2482 print(output)
2483
371810d1 2484 output = check_output('ip -6 address show dev veth99 scope global dynamic')
117a55c7 2485 self.assertNotRegex(output, 'inet6 2600::[0-9a-f]*/128 scope global dynamic')
371810d1 2486 output = check_output('ip -6 address show dev veth99 scope link')
117a55c7 2487 self.assertRegex(output, 'inet6 .* scope link')
371810d1 2488 output = check_output('ip -4 address show dev veth99 scope global dynamic')
117a55c7 2489 self.assertNotRegex(output, 'inet 192.168.5.[0-9]*/24 brd 192.168.5.255 scope global dynamic veth99')
371810d1 2490 output = check_output('ip -4 address show dev veth99 scope link')
117a55c7
YW
2491 self.assertRegex(output, 'inet .* scope link')
2492
b6efd661 2493 def test_dhcp_client_route_remove_on_renew(self):
ec38833c
ZJS
2494 copy_unit_to_networkd_unit_path('25-veth.netdev', 'dhcp-server-veth-peer.network',
2495 'dhcp-client-ipv4-only-ipv6-disabled.network')
2496 start_networkd(0)
2497 wait_online(['veth-peer:carrier'])
2498 start_dnsmasq(ipv4_range='192.168.5.100,192.168.5.199', lease_time='2m')
2499 wait_online(['veth99:routable', 'veth-peer:routable'])
b6efd661
YW
2500
2501 # test for issue #12490
2502
371810d1 2503 output = check_output('ip -4 address show dev veth99 scope global dynamic')
b6efd661
YW
2504 print(output)
2505 self.assertRegex(output, 'inet 192.168.5.1[0-9]*/24 brd 192.168.5.255 scope global dynamic veth99')
2506 address1=None
2507 for line in output.splitlines():
2508 if 'brd 192.168.5.255 scope global dynamic veth99' in line:
2509 address1 = line.split()[1].split('/')[0]
2510 break
2511
371810d1 2512 output = check_output('ip -4 route show dev veth99')
b6efd661
YW
2513 print(output)
2514 self.assertRegex(output, f'default via 192.168.5.1 proto dhcp src {address1} metric 1024')
2515 self.assertRegex(output, f'192.168.5.1 proto dhcp scope link src {address1} metric 1024')
2516
ec38833c
ZJS
2517 stop_dnsmasq(dnsmasq_pid_file)
2518 start_dnsmasq(ipv4_range='192.168.5.200,192.168.5.250', lease_time='2m')
b6efd661
YW
2519
2520 print('Wait for the dynamic address to be expired')
2521 time.sleep(130)
2522
371810d1 2523 output = check_output('ip -4 address show dev veth99 scope global dynamic')
b6efd661
YW
2524 print(output)
2525 self.assertRegex(output, 'inet 192.168.5.2[0-9]*/24 brd 192.168.5.255 scope global dynamic veth99')
2526 address2=None
2527 for line in output.splitlines():
2528 if 'brd 192.168.5.255 scope global dynamic veth99' in line:
2529 address2 = line.split()[1].split('/')[0]
2530 break
2531
2532 self.assertNotEqual(address1, address2)
2533
371810d1 2534 output = check_output('ip -4 route show dev veth99')
b6efd661
YW
2535 print(output)
2536 self.assertNotRegex(output, f'default via 192.168.5.1 proto dhcp src {address1} metric 1024')
2537 self.assertNotRegex(output, f'192.168.5.1 proto dhcp scope link src {address1} metric 1024')
2538 self.assertRegex(output, f'default via 192.168.5.1 proto dhcp src {address2} metric 1024')
2539 self.assertRegex(output, f'192.168.5.1 proto dhcp scope link src {address2} metric 1024')
2540
1f0e3109 2541if __name__ == '__main__':
9c1ae484
YW
2542 parser = argparse.ArgumentParser()
2543 parser.add_argument('--build-dir', help='Path to build dir', dest='build_dir')
2544 parser.add_argument('--networkd', help='Path to systemd-networkd', dest='networkd_bin')
2545 parser.add_argument('--wait-online', help='Path to systemd-networkd-wait-online', dest='wait_online_bin')
2546 parser.add_argument('--networkctl', help='Path to networkctl', dest='networkctl_bin')
2547 parser.add_argument('--valgrind', help='Enable valgrind', dest='use_valgrind', type=bool, nargs='?', const=True, default=use_valgrind)
2548 parser.add_argument('--debug', help='Generate debugging logs', dest='enable_debug', type=bool, nargs='?', const=True, default=enable_debug)
94c03122 2549 parser.add_argument('--asan-options', help='ASAN options', dest='asan_options')
fa4c6095 2550 parser.add_argument('--lsan-options', help='LSAN options', dest='lsan_options')
94c03122 2551 parser.add_argument('--ubsan-options', help='UBSAN options', dest='ubsan_options')
9c1ae484
YW
2552 ns, args = parser.parse_known_args(namespace=unittest)
2553
2554 if ns.build_dir:
2555 if ns.networkd_bin or ns.wait_online_bin or ns.networkctl_bin:
2556 print('WARNING: --networkd, --wait-online, or --networkctl options are ignored when --build-dir is specified.')
2557 networkd_bin = os.path.join(ns.build_dir, 'systemd-networkd')
2558 wait_online_bin = os.path.join(ns.build_dir, 'systemd-networkd-wait-online')
2559 networkctl_bin = os.path.join(ns.build_dir, 'networkctl')
2560 else:
2561 if ns.networkd_bin:
2562 networkd_bin = ns.networkd_bin
2563 if ns.wait_online_bin:
2564 wait_online_bin = ns.wait_online_bin
2565 if ns.networkctl_bin:
2566 networkctl_bin = ns.networkctl_bin
2567
2568 use_valgrind = ns.use_valgrind
2569 enable_debug = ns.enable_debug
94c03122 2570 asan_options = ns.asan_options
fa4c6095 2571 lsan_options = ns.lsan_options
94c03122 2572 ubsan_options = ns.ubsan_options
9c1ae484
YW
2573
2574 if use_valgrind:
2575 networkctl_cmd = ['valgrind', '--track-origins=yes', '--leak-check=full', '--show-leak-kinds=all', networkctl_bin]
2576 wait_online_cmd = ['valgrind', '--track-origins=yes', '--leak-check=full', '--show-leak-kinds=all', wait_online_bin]
2577 else:
2578 networkctl_cmd = [networkctl_bin]
2579 wait_online_cmd = [wait_online_bin]
2580
2581 if enable_debug:
2582 env.update({ 'SYSTEMD_LOG_LEVEL' : 'debug' })
94c03122
YW
2583 if asan_options:
2584 env.update({ 'ASAN_OPTIONS' : asan_options })
fa4c6095
YW
2585 if lsan_options:
2586 env.update({ 'LSAN_OPTIONS' : lsan_options })
94c03122
YW
2587 if ubsan_options:
2588 env.update({ 'UBSAN_OPTIONS' : ubsan_options })
9c1ae484
YW
2589
2590 sys.argv[1:] = args
1f0e3109
SS
2591 unittest.main(testRunner=unittest.TextTestRunner(stream=sys.stdout,
2592 verbosity=3))