2015-11-17 20:30:50 +03:00
#!/usr/bin/env python3
2020-11-09 07:23:58 +03:00
# SPDX-License-Identifier: LGPL-2.1-or-later
2015-11-17 20:30:50 +03:00
#
# networkd integration test
# This uses temporary configuration in /run and temporary veth devices, and
# does not write anything on disk or change any system configuration;
# but it assumes (and checks at the beginning) that networkd is not currently
# running.
2016-04-26 13:16:43 +03:00
#
2022-05-04 13:29:31 +03:00
# This can be run on a normal installation, in qemu, systemd-nspawn (with
2016-04-26 13:16:43 +03:00
# --private-network), LXD (with "--config raw.lxc=lxc.aa_profile=unconfined"),
# or LXC system containers. You need at least the "ip" tool from the iproute
# package; it is recommended to install dnsmasq too to get full test coverage.
#
2015-11-17 20:30:50 +03:00
# ATTENTION: This uses the *installed* networkd, not the one from the built
# source tree.
#
2018-06-12 18:15:23 +03:00
# © 2015 Canonical Ltd.
2015-11-17 20:30:50 +03:00
# Author: Martin Pitt <martin.pitt@ubuntu.com>
2016-11-04 02:27:55 +03:00
import errno
2015-11-17 20:30:50 +03:00
import os
2018-02-05 09:28:53 +03:00
import shutil
import socket
import subprocess
2015-11-17 20:30:50 +03:00
import sys
2018-02-05 09:28:53 +03:00
import tempfile
2015-11-17 20:30:50 +03:00
import time
import unittest
2016-11-04 02:27:55 +03:00
HAVE_DNSMASQ = shutil . which ( ' dnsmasq ' ) is not None
2019-02-28 01:15:31 +03:00
IS_CONTAINER = subprocess . call ( [ ' systemd-detect-virt ' , ' --quiet ' , ' --container ' ] ) == 0
2016-11-04 02:27:55 +03:00
NETWORK_UNITDIR = ' /run/systemd/network '
NETWORKD_WAIT_ONLINE = shutil . which ( ' systemd-networkd-wait-online ' ,
path = ' /usr/lib/systemd:/lib/systemd ' )
2015-11-17 20:30:50 +03:00
2016-06-30 16:44:22 +03:00
RESOLV_CONF = ' /run/systemd/resolve/resolv.conf '
2018-07-08 18:32:32 +03:00
tmpmounts = [ ]
running_units = [ ]
stopped_units = [ ]
2015-11-17 20:30:50 +03:00
2016-11-04 02:27:55 +03:00
def setUpModule ( ) :
2018-07-08 18:32:32 +03:00
global tmpmounts
2016-11-04 02:27:55 +03:00
""" Initialize the environment, and perform sanity checks on it. """
if NETWORKD_WAIT_ONLINE is None :
raise OSError ( errno . ENOENT , ' systemd-networkd-wait-online not found ' )
2018-07-08 18:32:32 +03:00
# Do not run any tests if the system is using networkd already and it's not virtualized
if ( subprocess . call ( [ ' systemctl ' , ' is-active ' , ' --quiet ' , ' systemd-networkd.service ' ] ) == 0 and
subprocess . call ( [ ' systemd-detect-virt ' , ' --quiet ' ] ) != 0 ) :
raise unittest . SkipTest ( ' not virtualized and networkd is already active ' )
2018-12-05 22:52:03 +03:00
2018-07-08 18:32:32 +03:00
# Ensure we don't mess with an existing networkd config
for u in [ ' systemd-networkd.socket ' , ' systemd-networkd ' , ' systemd-resolved ' ] :
if subprocess . call ( [ ' systemctl ' , ' is-active ' , ' --quiet ' , u ] ) == 0 :
subprocess . call ( [ ' systemctl ' , ' stop ' , u ] )
running_units . append ( u )
else :
stopped_units . append ( u )
2018-12-05 22:52:03 +03:00
# create static systemd-network user for networkd-test-router.service (it
# needs to do some stuff as root and can't start as user; but networkd
# still insists on the user)
2019-07-30 15:27:44 +03:00
if subprocess . call ( [ ' getent ' , ' passwd ' , ' systemd-network ' ] ) != 0 :
subprocess . call ( [ ' useradd ' , ' --system ' , ' --no-create-home ' , ' systemd-network ' ] )
2018-12-05 22:52:03 +03:00
2018-07-08 18:32:32 +03:00
for d in [ ' /etc/systemd/network ' , ' /run/systemd/network ' ,
' /run/systemd/netif ' , ' /run/systemd/resolve ' ] :
if os . path . isdir ( d ) :
subprocess . check_call ( [ " mount " , " -t " , " tmpfs " , " none " , d ] )
tmpmounts . append ( d )
if os . path . isdir ( ' /run/systemd/resolve ' ) :
os . chmod ( ' /run/systemd/resolve ' , 0o755 )
2018-09-19 11:04:33 +03:00
shutil . chown ( ' /run/systemd/resolve ' , ' systemd-resolve ' , ' systemd-resolve ' )
2018-12-05 22:52:03 +03:00
if os . path . isdir ( ' /run/systemd/netif ' ) :
os . chmod ( ' /run/systemd/netif ' , 0o755 )
shutil . chown ( ' /run/systemd/netif ' , ' systemd-network ' , ' systemd-network ' )
2016-11-04 02:27:55 +03:00
# Avoid "Failed to open /dev/tty" errors in containers.
os . environ [ ' SYSTEMD_LOG_TARGET ' ] = ' journal '
# Ensure the unit directory exists so tests can dump files into it.
os . makedirs ( NETWORK_UNITDIR , exist_ok = True )
2023-11-08 19:58:30 +03:00
# mask all default .network files
if os . path . exists ( ' /usr/lib/systemd/network ' ) :
for unit in os . listdir ( ' /usr/lib/systemd/network ' ) :
if unit . endswith ( ' .network ' ) :
os . symlink ( ' /dev/null ' , os . path . join ( NETWORK_UNITDIR , unit ) )
2016-11-04 02:27:55 +03:00
2018-07-08 18:32:32 +03:00
def tearDownModule ( ) :
global tmpmounts
for d in tmpmounts :
networkd-test: lazy umount tmp directories
In Semaphore CI, for some reason, /run/systemd/resolve is busy so the umount
fails at the end of the test run:
Verify link states with Unmanaged= settings, cold-plug. ... umount: /run/systemd/resolve: target is busy.14:57
ok14:57
ERROR14:57
======================================================================14:57
ERROR: tearDownModule (__main__)14:57
----------------------------------------------------------------------14:57
Traceback (most recent call last):14:57
File /tmp/autopkgtest-lxc.6islza9t/downtmp/build.A9b/src/test/networkd-test.py, line 94, in tearDownModule14:57
subprocess.check_call([umount, d])14:57
File /usr/lib/python3.9/subprocess.py, line 373, in check_call14:57
raise CalledProcessError(retcode, cmd)14:57
subprocess.CalledProcessError: Command '['umount', '/run/systemd/resolve']' returned non-zero exit status 32.14:57
----------------------------------------------------------------------14:58
Ran 35 tests in 138.868s14:58
FAILED (errors=1, skipped=2)
Use lazy umount to avoid erroring out.
2022-04-09 01:52:38 +03:00
subprocess . check_call ( [ " umount " , " --lazy " , d ] )
2018-07-08 18:32:32 +03:00
for u in stopped_units :
subprocess . call ( [ " systemctl " , " stop " , u ] )
for u in running_units :
subprocess . call ( [ " systemctl " , " restart " , u ] )
2016-11-04 02:27:55 +03:00
class NetworkdTestingUtilities :
""" Provide a set of utility functions to facilitate networkd tests.
This class must be inherited along with unittest . TestCase to define
some required methods .
"""
2016-12-07 21:12:10 +03:00
def add_veth_pair ( self , veth , peer , veth_options = ( ) , peer_options = ( ) ) :
""" Add a veth interface pair, and queue them to be removed. """
subprocess . check_call ( [ ' ip ' , ' link ' , ' add ' , ' name ' , veth ] +
list ( veth_options ) +
[ ' type ' , ' veth ' , ' peer ' , ' name ' , peer ] +
list ( peer_options ) )
self . addCleanup ( subprocess . call , [ ' ip ' , ' link ' , ' del ' , ' dev ' , peer ] )
2018-12-05 22:53:51 +03:00
def write_config ( self , path , contents ) :
""" " Write a configuration file, and queue it to be removed. """
with open ( path , ' w ' ) as f :
f . write ( contents )
self . addCleanup ( os . remove , path )
2016-11-04 02:27:55 +03:00
def write_network ( self , unit_name , contents ) :
""" Write a network unit file, and queue it to be removed. """
2018-12-05 22:53:51 +03:00
self . write_config ( os . path . join ( NETWORK_UNITDIR , unit_name ) , contents )
2016-11-04 02:27:55 +03:00
def write_network_dropin ( self , unit_name , dropin_name , contents ) :
""" Write a network unit drop-in, and queue it to be removed. """
2018-02-05 09:28:53 +03:00
dropin_dir = os . path . join ( NETWORK_UNITDIR , " {} .d " . format ( unit_name ) )
dropin_path = os . path . join ( dropin_dir , " {} .conf " . format ( dropin_name ) )
2016-11-04 02:27:55 +03:00
os . makedirs ( dropin_dir , exist_ok = True )
2017-04-12 00:17:31 +03:00
self . addCleanup ( os . rmdir , dropin_dir )
2016-11-04 02:27:55 +03:00
with open ( dropin_path , ' w ' ) as dropin :
dropin . write ( contents )
self . addCleanup ( os . remove , dropin_path )
2017-04-12 00:17:31 +03:00
def read_attr ( self , link , attribute ) :
""" Read a link attributed from the sysfs. """
2022-03-18 01:53:03 +03:00
# Note we don't want to check if interface `link' is managed, we
2017-04-12 00:17:31 +03:00
# want to evaluate link variable and pass the value of the link to
# assert_link_states e.g. eth0=managed.
self . assert_link_states ( * * { link : ' managed ' } )
with open ( os . path . join ( ' /sys/class/net ' , link , attribute ) ) as f :
return f . readline ( ) . strip ( )
2016-09-28 01:18:14 +03:00
def assert_link_states ( self , * * kwargs ) :
""" Match networkctl link states to the given ones.
Each keyword argument should be the name of a network interface
with its expected value of the " SETUP " column in output from
networkctl . The interfaces have five seconds to come online
before the check is performed . Every specified interface must
be present in the output , and any other interfaces found in the
output are ignored .
A special interface state " managed " is supported , which matches
any value in the " SETUP " column other than " unmanaged " .
"""
if not kwargs :
return
interfaces = set ( kwargs )
# Wait for the requested interfaces, but don't fail for them.
subprocess . call ( [ NETWORKD_WAIT_ONLINE , ' --timeout=5 ' ] +
2018-02-05 09:28:53 +03:00
[ ' --interface= {} ' . format ( iface ) for iface in kwargs ] )
2016-09-28 01:18:14 +03:00
# Validate each link state found in the networkctl output.
out = subprocess . check_output ( [ ' networkctl ' , ' --no-legend ' ] ) . rstrip ( )
for line in out . decode ( ' utf-8 ' ) . split ( ' \n ' ) :
fields = line . split ( )
if len ( fields ) > = 5 and fields [ 1 ] in kwargs :
iface = fields [ 1 ]
expected = kwargs [ iface ]
actual = fields [ - 1 ]
if ( actual != expected and
not ( expected == ' managed ' and actual != ' unmanaged ' ) ) :
2018-02-05 09:28:53 +03:00
self . fail ( " Link {} expects state {} , found {} " . format ( iface , expected , actual ) )
2016-09-28 01:18:14 +03:00
interfaces . remove ( iface )
# Ensure that all requested interfaces have been covered.
if interfaces :
2018-02-05 09:28:53 +03:00
self . fail ( " Missing links in status output: {} " . format ( interfaces ) )
2016-09-28 01:18:14 +03:00
2016-11-04 02:27:55 +03:00
2017-04-12 00:17:31 +03:00
class BridgeTest ( NetworkdTestingUtilities , unittest . TestCase ) :
""" Provide common methods for testing networkd against servers. """
2024-11-12 13:43:57 +03:00
def wait_online ( self ) :
try :
subprocess . check_call ( [ NETWORKD_WAIT_ONLINE , ' --interface ' , ' port1 ' , ' --interface ' , ' port2 ' , ' --timeout=10 ' ] )
except ( AssertionError , subprocess . CalledProcessError ) :
# show networkd status, journal, and DHCP server log on failure
print ( ' ---- interface status ---- ' )
sys . stdout . flush ( )
subprocess . call ( [ ' ip ' , ' a ' , ' show ' , ' dev ' , ' mybridge ' ] )
subprocess . call ( [ ' ip ' , ' a ' , ' show ' , ' dev ' , ' port1 ' ] )
subprocess . call ( [ ' ip ' , ' a ' , ' show ' , ' dev ' , ' port2 ' ] )
print ( ' ---- networkctl status ---- ' )
sys . stdout . flush ( )
rc = subprocess . call ( [ ' networkctl ' , ' -n ' , ' 0 ' , ' status ' , ' mybridge ' , ' port1 ' , ' port2 ' ] )
if rc != 0 :
print ( f " ' networkctl status ' exited with an unexpected code { rc } " )
print ( ' ---- journal ---- ' )
subprocess . check_output ( [ ' journalctl ' , ' --sync ' ] )
sys . stdout . flush ( )
subprocess . call ( [ ' journalctl ' , ' -b ' , ' --no-pager ' , ' --quiet ' , ' -I ' , ' -u ' , ' systemd-networkd.service ' ] )
raise
2017-04-12 00:17:31 +03:00
def setUp ( self ) :
2023-11-08 17:34:01 +03:00
self . write_network ( ' 50-port1.netdev ' , ''' \
2017-04-12 00:17:31 +03:00
[ NetDev ]
Name = port1
Kind = dummy
2020-12-09 12:35:10 +03:00
MACAddress = 12 : 34 : 56 : 78 : 9 a : bc
''' )
2023-11-08 17:34:01 +03:00
self . write_network ( ' 50-port2.netdev ' , ''' \
2017-04-12 00:17:31 +03:00
[ NetDev ]
Name = port2
Kind = dummy
2020-12-09 12:35:10 +03:00
MACAddress = 12 : 34 : 56 : 78 : 9 a : bd
''' )
2023-11-08 17:34:01 +03:00
self . write_network ( ' 50-mybridge.netdev ' , ''' \
2017-04-12 00:17:31 +03:00
[ NetDev ]
Name = mybridge
2020-12-09 12:35:10 +03:00
Kind = bridge
''' )
2023-11-08 17:34:01 +03:00
self . write_network ( ' 50-port1.network ' , ''' \
2017-04-12 00:17:31 +03:00
[ Match ]
Name = port1
[ Network ]
2020-12-09 12:35:10 +03:00
Bridge = mybridge
''' )
2023-11-08 17:34:01 +03:00
self . write_network ( ' 50-port2.network ' , ''' \
2017-04-12 00:17:31 +03:00
[ Match ]
Name = port2
[ Network ]
2020-12-09 12:35:10 +03:00
Bridge = mybridge
''' )
2023-11-08 17:34:01 +03:00
self . write_network ( ' 50-mybridge.network ' , ''' \
2017-04-12 00:17:31 +03:00
[ Match ]
Name = mybridge
[ Network ]
2024-11-25 10:15:44 +03:00
IPv6AcceptRA = no
2017-04-12 00:17:31 +03:00
DNS = 192.168 .250 .1
Address = 192.168 .250 .33 / 24
2020-12-09 12:35:10 +03:00
Gateway = 192.168 .250 .1
''' )
2018-07-08 20:49:21 +03:00
subprocess . call ( [ ' systemctl ' , ' reset-failed ' , ' systemd-networkd ' , ' systemd-resolved ' ] )
2017-04-12 00:17:31 +03:00
subprocess . check_call ( [ ' systemctl ' , ' start ' , ' systemd-networkd ' ] )
2024-11-12 13:43:57 +03:00
self . wait_online ( )
2017-04-12 00:17:31 +03:00
def tearDown ( self ) :
2020-08-28 18:21:27 +03:00
subprocess . check_call ( [ ' systemctl ' , ' stop ' , ' systemd-networkd.socket ' ] )
subprocess . check_call ( [ ' systemctl ' , ' stop ' , ' systemd-networkd.service ' ] )
2017-04-12 00:17:31 +03:00
subprocess . check_call ( [ ' ip ' , ' link ' , ' del ' , ' mybridge ' ] )
subprocess . check_call ( [ ' ip ' , ' link ' , ' del ' , ' port1 ' ] )
subprocess . check_call ( [ ' ip ' , ' link ' , ' del ' , ' port2 ' ] )
def test_bridge_init ( self ) :
self . assert_link_states (
port1 = ' managed ' ,
port2 = ' managed ' ,
mybridge = ' managed ' )
def test_bridge_port_priority ( self ) :
self . assertEqual ( self . read_attr ( ' port1 ' , ' brport/priority ' ) , ' 32 ' )
2023-11-08 17:34:01 +03:00
self . write_network_dropin ( ' 50-port1.network ' , ' priority ' , ''' \
2017-04-12 00:17:31 +03:00
[ Bridge ]
Priority = 28
''' )
2021-05-25 02:41:25 +03:00
subprocess . check_call ( [ ' ip ' , ' link ' , ' set ' , ' dev ' , ' port1 ' , ' down ' ] )
2017-04-12 00:17:31 +03:00
subprocess . check_call ( [ ' systemctl ' , ' restart ' , ' systemd-networkd ' ] )
2024-11-12 13:43:57 +03:00
self . wait_online ( )
2017-04-12 00:17:31 +03:00
self . assertEqual ( self . read_attr ( ' port1 ' , ' brport/priority ' ) , ' 28 ' )
def test_bridge_port_priority_set_zero ( self ) :
""" It should be possible to set the bridge port priority to 0 """
self . assertEqual ( self . read_attr ( ' port2 ' , ' brport/priority ' ) , ' 32 ' )
2023-11-08 17:34:01 +03:00
self . write_network_dropin ( ' 50-port2.network ' , ' priority ' , ''' \
2017-04-12 00:17:31 +03:00
[ Bridge ]
Priority = 0
''' )
2021-05-25 02:41:25 +03:00
subprocess . check_call ( [ ' ip ' , ' link ' , ' set ' , ' dev ' , ' port2 ' , ' down ' ] )
2017-04-12 00:17:31 +03:00
subprocess . check_call ( [ ' systemctl ' , ' restart ' , ' systemd-networkd ' ] )
2024-11-12 13:43:57 +03:00
self . wait_online ( )
2017-04-12 00:17:31 +03:00
self . assertEqual ( self . read_attr ( ' port2 ' , ' brport/priority ' ) , ' 0 ' )
2018-04-29 07:02:22 +03:00
def test_bridge_port_property ( self ) :
""" Test the " [Bridge] " section keys """
self . assertEqual ( self . read_attr ( ' port2 ' , ' brport/priority ' ) , ' 32 ' )
2023-11-08 17:34:01 +03:00
self . write_network_dropin ( ' 50-port2.network ' , ' property ' , ''' \
2018-04-29 07:02:22 +03:00
[ Bridge ]
UnicastFlood = true
HairPin = true
2021-05-04 01:48:26 +03:00
Isolated = true
2018-04-29 07:02:22 +03:00
UseBPDU = true
FastLeave = true
AllowPortToBeRoot = true
Cost = 555
Priority = 23
''' )
2021-05-25 02:41:25 +03:00
subprocess . check_call ( [ ' ip ' , ' link ' , ' set ' , ' dev ' , ' port2 ' , ' down ' ] )
2018-04-29 07:02:22 +03:00
subprocess . check_call ( [ ' systemctl ' , ' restart ' , ' systemd-networkd ' ] )
2024-11-12 13:43:57 +03:00
self . wait_online ( )
2018-04-29 07:02:22 +03:00
self . assertEqual ( self . read_attr ( ' port2 ' , ' brport/priority ' ) , ' 23 ' )
self . assertEqual ( self . read_attr ( ' port2 ' , ' brport/hairpin_mode ' ) , ' 1 ' )
2021-05-04 01:48:26 +03:00
self . assertEqual ( self . read_attr ( ' port2 ' , ' brport/isolated ' ) , ' 1 ' )
2018-04-29 07:02:22 +03:00
self . assertEqual ( self . read_attr ( ' port2 ' , ' brport/path_cost ' ) , ' 555 ' )
self . assertEqual ( self . read_attr ( ' port2 ' , ' brport/multicast_fast_leave ' ) , ' 1 ' )
self . assertEqual ( self . read_attr ( ' port2 ' , ' brport/unicast_flood ' ) , ' 1 ' )
2022-08-12 23:08:38 +03:00
self . assertEqual ( self . read_attr ( ' port2 ' , ' brport/bpdu_guard ' ) , ' 0 ' )
self . assertEqual ( self . read_attr ( ' port2 ' , ' brport/root_block ' ) , ' 0 ' )
2018-04-29 07:02:22 +03:00
2016-11-04 02:27:55 +03:00
class ClientTestBase ( NetworkdTestingUtilities ) :
""" Provide common methods for testing networkd against servers. """
2016-11-28 14:35:49 +03:00
@classmethod
def setUpClass ( klass ) :
klass . orig_log_level = subprocess . check_output (
[ ' systemctl ' , ' show ' , ' --value ' , ' --property ' , ' LogLevel ' ] ,
universal_newlines = True ) . strip ( )
2019-04-03 09:19:08 +03:00
subprocess . check_call ( [ ' systemd-analyze ' , ' log-level ' , ' debug ' ] )
2016-11-28 14:35:49 +03:00
@classmethod
def tearDownClass ( klass ) :
2019-04-03 09:19:08 +03:00
subprocess . check_call ( [ ' systemd-analyze ' , ' log-level ' , klass . orig_log_level ] )
2016-11-28 14:35:49 +03:00
2015-11-17 20:30:50 +03:00
def setUp ( self ) :
self . iface = ' test_eth42 '
self . if_router = ' router_eth42 '
self . workdir_obj = tempfile . TemporaryDirectory ( )
self . workdir = self . workdir_obj . name
2023-11-08 17:34:01 +03:00
self . config = ' 50-test_eth42.network '
2015-11-17 20:30:50 +03:00
# get current journal cursor
2016-11-28 14:35:49 +03:00
subprocess . check_output ( [ ' journalctl ' , ' --sync ' ] )
2015-11-17 20:30:50 +03:00
out = subprocess . check_output ( [ ' journalctl ' , ' -b ' , ' --quiet ' ,
' --no-pager ' , ' -n0 ' , ' --show-cursor ' ] ,
universal_newlines = True )
self . assertTrue ( out . startswith ( ' -- cursor: ' ) )
self . journal_cursor = out . split ( ) [ - 1 ]
2018-07-08 20:49:21 +03:00
subprocess . call ( [ ' systemctl ' , ' reset-failed ' , ' systemd-networkd ' , ' systemd-resolved ' ] )
2018-07-02 23:26:31 +03:00
2015-11-17 20:30:50 +03:00
def tearDown ( self ) :
self . shutdown_iface ( )
2020-08-28 18:21:27 +03:00
subprocess . call ( [ ' systemctl ' , ' stop ' , ' systemd-networkd.socket ' ] )
subprocess . call ( [ ' systemctl ' , ' stop ' , ' systemd-networkd.service ' ] )
2016-11-20 12:08:23 +03:00
subprocess . call ( [ ' ip ' , ' link ' , ' del ' , ' dummy0 ' ] ,
stderr = subprocess . DEVNULL )
2015-11-17 20:30:50 +03:00
def show_journal ( self , unit ) :
''' Show journal of given unit since start of the test '''
2018-02-05 09:28:53 +03:00
print ( ' ---- {} ---- ' . format ( unit ) )
2016-11-28 14:35:49 +03:00
subprocess . check_output ( [ ' journalctl ' , ' --sync ' ] )
2015-11-17 20:30:50 +03:00
sys . stdout . flush ( )
subprocess . call ( [ ' journalctl ' , ' -b ' , ' --no-pager ' , ' --quiet ' ,
' --cursor ' , self . journal_cursor , ' -u ' , unit ] )
2023-06-15 22:56:18 +03:00
def show_ifaces ( self ) :
''' Show network interfaces '''
print ( ' --- networkctl --- ' )
sys . stdout . flush ( )
subprocess . call ( [ ' networkctl ' , ' status ' , ' -n ' , ' 0 ' , ' -a ' ] )
def show_resolvectl ( self ) :
''' Show resolved settings '''
print ( ' --- resolvectl --- ' )
sys . stdout . flush ( )
subprocess . call ( [ ' resolvectl ' ] )
2015-11-17 20:30:50 +03:00
def create_iface ( self , ipv6 = False ) :
''' Create test interface with DHCP server behind it '''
raise NotImplementedError ( ' must be implemented by a subclass ' )
def shutdown_iface ( self ) :
''' Remove test interface and stop DHCP server '''
raise NotImplementedError ( ' must be implemented by a subclass ' )
def print_server_log ( self ) :
''' Print DHCP server log for debugging failures '''
raise NotImplementedError ( ' must be implemented by a subclass ' )
2019-02-27 01:03:35 +03:00
def start_unit ( self , unit ) :
2017-02-10 05:30:44 +03:00
try :
2019-02-27 01:03:35 +03:00
subprocess . check_call ( [ ' systemctl ' , ' start ' , unit ] )
2017-02-10 05:30:44 +03:00
except subprocess . CalledProcessError :
2019-02-27 01:03:35 +03:00
self . show_journal ( unit )
2017-02-10 05:30:44 +03:00
raise
2019-02-27 01:03:35 +03:00
def do_test ( self , coldplug = True , ipv6 = False , extra_opts = ' ' ,
online_timeout = 10 , dhcp_mode = ' yes ' ) :
self . start_unit ( ' systemd-resolved ' )
2016-11-04 02:27:55 +03:00
self . write_network ( self . config , ''' \
2016-09-14 13:52:40 +03:00
[ Match ]
2020-12-09 12:35:10 +03:00
Name = { iface }
2015-11-17 20:30:50 +03:00
[ Network ]
2020-12-09 12:35:10 +03:00
DHCP = { dhcp_mode }
{ extra_opts }
''' .format(iface=self.iface, dhcp_mode=dhcp_mode, extra_opts=extra_opts))
2015-11-17 20:30:50 +03:00
if coldplug :
# create interface first, then start networkd
self . create_iface ( ipv6 = ipv6 )
2019-02-27 01:03:35 +03:00
self . start_unit ( ' systemd-networkd ' )
2016-11-18 18:17:01 +03:00
elif coldplug is not None :
2015-11-17 20:30:50 +03:00
# start networkd first, then create interface
2019-02-27 01:03:35 +03:00
self . start_unit ( ' systemd-networkd ' )
2015-11-17 20:30:50 +03:00
self . create_iface ( ipv6 = ipv6 )
2016-11-18 18:17:01 +03:00
else :
# "None" means test sets up interface by itself
2019-02-27 01:03:35 +03:00
self . start_unit ( ' systemd-networkd ' )
2015-11-17 20:30:50 +03:00
try :
2016-11-04 02:27:55 +03:00
subprocess . check_call ( [ NETWORKD_WAIT_ONLINE , ' --interface ' ,
2015-11-17 20:30:50 +03:00
self . iface , ' --timeout= %i ' % online_timeout ] )
if ipv6 :
# check iface state and IP 6 address; FIXME: we need to wait a bit
# longer, as the iface is "configured" already with IPv4 *or*
# IPv6, but we want to wait for both
2016-12-02 01:30:31 +03:00
for _ in range ( 10 ) :
2015-11-17 20:30:50 +03:00
out = subprocess . check_output ( [ ' ip ' , ' a ' , ' show ' , ' dev ' , self . iface ] )
2020-07-12 03:28:53 +03:00
if b ' state UP ' in out and b ' inet6 2600 ' in out and b ' inet 192.168 ' in out and b ' tentative ' not in out :
2015-11-17 20:30:50 +03:00
break
time . sleep ( 1 )
else :
self . fail ( ' timed out waiting for IPv6 configuration ' )
self . assertRegex ( out , b ' inet6 2600::.* scope global .*dynamic ' )
self . assertRegex ( out , b ' inet6 fe80::.* scope link ' )
else :
# should have link-local address on IPv6 only
out = subprocess . check_output ( [ ' ip ' , ' -6 ' , ' a ' , ' show ' , ' dev ' , self . iface ] )
2016-12-02 02:29:54 +03:00
self . assertRegex ( out , br ' inet6 fe80::.* scope link ' )
2015-11-17 20:30:50 +03:00
self . assertNotIn ( b ' scope global ' , out )
# should have IPv4 address
out = subprocess . check_output ( [ ' ip ' , ' -4 ' , ' a ' , ' show ' , ' dev ' , self . iface ] )
self . assertIn ( b ' state UP ' , out )
2016-12-02 02:29:54 +03:00
self . assertRegex ( out , br ' inet 192.168.5. \ d+/.* scope global dynamic ' )
2015-11-17 20:30:50 +03:00
# check networkctl state
out = subprocess . check_output ( [ ' networkctl ' ] )
2018-02-05 09:28:53 +03:00
self . assertRegex ( out , ( r ' {} \ s+ether \ s+[a-z-]+ \ s+unmanaged ' . format ( self . if_router ) ) . encode ( ) )
self . assertRegex ( out , ( r ' {} \ s+ether \ s+routable \ s+configured ' . format ( self . iface ) ) . encode ( ) )
2015-11-17 20:30:50 +03:00
2020-01-07 05:32:04 +03:00
out = subprocess . check_output ( [ ' networkctl ' , ' -n ' , ' 0 ' , ' status ' , self . iface ] )
2016-12-02 02:29:54 +03:00
self . assertRegex ( out , br ' Type: \ s+ether ' )
self . assertRegex ( out , br ' State: \ s+routable.*configured ' )
2021-04-23 15:19:56 +03:00
self . assertRegex ( out , br ' Online state: \ s+online ' )
2016-12-02 02:29:54 +03:00
self . assertRegex ( out , br ' Address: \ s+192.168.5. \ d+ ' )
2015-11-17 20:30:50 +03:00
if ipv6 :
2016-12-02 02:29:54 +03:00
self . assertRegex ( out , br ' 2600:: ' )
2015-11-17 20:30:50 +03:00
else :
2016-12-02 02:29:54 +03:00
self . assertNotIn ( br ' 2600:: ' , out )
self . assertRegex ( out , br ' fe80:: ' )
self . assertRegex ( out , br ' Gateway: \ s+192.168.5.1 ' )
self . assertRegex ( out , br ' DNS: \ s+192.168.5.1 ' )
2015-11-17 20:30:50 +03:00
except ( AssertionError , subprocess . CalledProcessError ) :
# show networkd status, journal, and DHCP server log on failure
2016-11-04 02:27:55 +03:00
with open ( os . path . join ( NETWORK_UNITDIR , self . config ) ) as f :
2018-02-05 09:28:53 +03:00
print ( ' \n ---- {} ---- \n {} ' . format ( self . config , f . read ( ) ) )
2015-11-17 20:30:50 +03:00
print ( ' ---- interface status ---- ' )
sys . stdout . flush ( )
subprocess . call ( [ ' ip ' , ' a ' , ' show ' , ' dev ' , self . iface ] )
2018-02-05 09:28:53 +03:00
print ( ' ---- networkctl status {} ---- ' . format ( self . iface ) )
2015-11-17 20:30:50 +03:00
sys . stdout . flush ( )
2020-01-07 05:32:04 +03:00
rc = subprocess . call ( [ ' networkctl ' , ' -n ' , ' 0 ' , ' status ' , self . iface ] )
2019-07-30 21:27:34 +03:00
if rc != 0 :
print ( " ' networkctl status ' exited with an unexpected code {} " . format ( rc ) )
2015-11-17 20:30:50 +03:00
self . show_journal ( ' systemd-networkd.service ' )
self . print_server_log ( )
raise
2016-06-30 16:44:22 +03:00
for timeout in range ( 50 ) :
with open ( RESOLV_CONF ) as f :
contents = f . read ( )
if ' nameserver 192.168.5.1 \n ' in contents :
break
time . sleep ( 0.1 )
else :
self . fail ( ' nameserver 192.168.5.1 not found in ' + RESOLV_CONF )
2015-11-17 20:30:50 +03:00
2016-11-18 18:17:01 +03:00
if coldplug is False :
2015-11-17 20:30:50 +03:00
# check post-down.d hook
self . shutdown_iface ( )
def test_coldplug_dhcp_yes_ip4 ( self ) :
# we have a 12s timeout on RA, so we need to wait longer
self . do_test ( coldplug = True , ipv6 = False , online_timeout = 15 )
def test_coldplug_dhcp_yes_ip4_no_ra ( self ) :
# with disabling RA explicitly things should be fast
self . do_test ( coldplug = True , ipv6 = False ,
2023-06-16 00:54:04 +03:00
extra_opts = ' IPv6AcceptRA=no ' )
2015-11-17 20:30:50 +03:00
def test_coldplug_dhcp_ip4_only ( self ) :
# we have a 12s timeout on RA, so we need to wait longer
self . do_test ( coldplug = True , ipv6 = False , dhcp_mode = ' ipv4 ' ,
online_timeout = 15 )
def test_coldplug_dhcp_ip4_only_no_ra ( self ) :
# with disabling RA explicitly things should be fast
self . do_test ( coldplug = True , ipv6 = False , dhcp_mode = ' ipv4 ' ,
2023-06-16 00:54:04 +03:00
extra_opts = ' IPv6AcceptRA=no ' )
2015-11-17 20:30:50 +03:00
def test_coldplug_dhcp_ip6 ( self ) :
self . do_test ( coldplug = True , ipv6 = True )
def test_hotplug_dhcp_ip4 ( self ) :
# With IPv4 only we have a 12s timeout on RA, so we need to wait longer
self . do_test ( coldplug = False , ipv6 = False , online_timeout = 15 )
def test_hotplug_dhcp_ip6 ( self ) :
self . do_test ( coldplug = False , ipv6 = True )
2016-06-28 19:18:27 +03:00
def test_route_only_dns ( self ) :
2023-11-08 17:34:01 +03:00
self . write_network ( ' 50-myvpn.netdev ' , ''' \
2016-09-14 13:52:40 +03:00
[ NetDev ]
2016-06-28 19:18:27 +03:00
Name = dummy0
Kind = dummy
2020-12-09 12:35:10 +03:00
MACAddress = 12 : 34 : 56 : 78 : 9 a : bc
''' )
2023-11-08 17:34:01 +03:00
self . write_network ( ' 50-myvpn.network ' , ''' \
2016-09-14 13:52:40 +03:00
[ Match ]
2016-06-28 19:18:27 +03:00
Name = dummy0
[ Network ]
2024-11-25 10:15:44 +03:00
IPv6AcceptRA = no
2019-02-27 01:05:05 +03:00
Address = 192.168 .42 .100 / 24
2016-06-28 19:18:27 +03:00
DNS = 192.168 .42 .1
2020-12-09 12:35:10 +03:00
Domains = ~ company
''' )
2016-06-28 19:18:27 +03:00
2019-02-28 01:15:31 +03:00
try :
self . do_test ( coldplug = True , ipv6 = False ,
2023-06-16 00:54:04 +03:00
extra_opts = ' IPv6AcceptRA=no ' )
2019-02-28 01:15:31 +03:00
except subprocess . CalledProcessError as e :
# networkd often fails to start in LXC: https://github.com/systemd/systemd/issues/11848
if IS_CONTAINER and e . cmd == [ ' systemctl ' , ' start ' , ' systemd-networkd ' ] :
raise unittest . SkipTest ( ' https://github.com/systemd/systemd/issues/11848 ' )
else :
raise
2016-06-28 19:18:27 +03:00
2016-06-30 16:44:22 +03:00
with open ( RESOLV_CONF ) as f :
contents = f . read ( )
2016-06-28 19:18:27 +03:00
# ~company is not a search domain, only a routing domain
self . assertNotRegex ( contents , ' search.*company ' )
2016-06-30 16:44:22 +03:00
# our global server should appear
self . assertIn ( ' nameserver 192.168.5.1 \n ' , contents )
2016-09-30 10:30:08 +03:00
# should not have domain-restricted server as global server
self . assertNotIn ( ' nameserver 192.168.42.1 \n ' , contents )
def test_route_only_dns_all_domains ( self ) :
2023-11-08 17:34:01 +03:00
self . write_network ( ' 50-myvpn.netdev ' , ''' [NetDev]
2016-09-30 10:30:08 +03:00
Name = dummy0
Kind = dummy
2020-12-09 12:35:10 +03:00
MACAddress = 12 : 34 : 56 : 78 : 9 a : bc
''' )
2023-11-08 17:34:01 +03:00
self . write_network ( ' 50-myvpn.network ' , ''' [Match]
2016-09-30 10:30:08 +03:00
Name = dummy0
[ Network ]
2024-11-25 10:15:44 +03:00
IPv6AcceptRA = no
2019-02-27 01:05:05 +03:00
Address = 192.168 .42 .100 / 24
2016-09-30 10:30:08 +03:00
DNS = 192.168 .42 .1
2020-12-09 12:35:10 +03:00
Domains = ~ company ~ .
''' )
2016-09-30 10:30:08 +03:00
2019-02-28 01:15:31 +03:00
try :
self . do_test ( coldplug = True , ipv6 = False ,
2023-06-16 00:54:04 +03:00
extra_opts = ' IPv6AcceptRA=no ' )
2019-02-28 01:15:31 +03:00
except subprocess . CalledProcessError as e :
# networkd often fails to start in LXC: https://github.com/systemd/systemd/issues/11848
if IS_CONTAINER and e . cmd == [ ' systemctl ' , ' start ' , ' systemd-networkd ' ] :
raise unittest . SkipTest ( ' https://github.com/systemd/systemd/issues/11848 ' )
else :
raise
2016-09-30 10:30:08 +03:00
with open ( RESOLV_CONF ) as f :
contents = f . read ( )
# ~company is not a search domain, only a routing domain
self . assertNotRegex ( contents , ' search.*company ' )
# our global server should appear
self . assertIn ( ' nameserver 192.168.5.1 \n ' , contents )
# should have company server as global server due to ~.
self . assertIn ( ' nameserver 192.168.42.1 \n ' , contents )
2016-06-28 19:18:27 +03:00
2015-11-17 20:30:50 +03:00
2016-11-04 02:27:55 +03:00
@unittest.skipUnless ( HAVE_DNSMASQ , ' dnsmasq not installed ' )
2015-11-17 20:30:50 +03:00
class DnsmasqClientTest ( ClientTestBase , unittest . TestCase ) :
''' Test networkd client against dnsmasq '''
def setUp ( self ) :
super ( ) . setUp ( )
self . dnsmasq = None
2016-11-18 18:17:01 +03:00
self . iface_mac = ' de:ad:be:ef:47:11 '
2015-11-17 20:30:50 +03:00
2016-09-30 10:30:08 +03:00
def create_iface ( self , ipv6 = False , dnsmasq_opts = None ) :
2015-11-17 20:30:50 +03:00
''' Create test interface with DHCP server behind it '''
# add veth pair
2016-11-18 18:17:01 +03:00
subprocess . check_call ( [ ' ip ' , ' link ' , ' add ' , ' name ' , self . iface ,
' address ' , self . iface_mac ,
' type ' , ' veth ' , ' peer ' , ' name ' , self . if_router ] )
2015-11-17 20:30:50 +03:00
# give our router an IP
subprocess . check_call ( [ ' ip ' , ' a ' , ' flush ' , ' dev ' , self . if_router ] )
subprocess . check_call ( [ ' ip ' , ' a ' , ' add ' , ' 192.168.5.1/24 ' , ' dev ' , self . if_router ] )
if ipv6 :
subprocess . check_call ( [ ' ip ' , ' a ' , ' add ' , ' 2600::1/64 ' , ' dev ' , self . if_router ] )
subprocess . check_call ( [ ' ip ' , ' link ' , ' set ' , self . if_router , ' up ' ] )
# add DHCP server
self . dnsmasq_log = os . path . join ( self . workdir , ' dnsmasq.log ' )
lease_file = os . path . join ( self . workdir , ' dnsmasq.leases ' )
if ipv6 :
extra_opts = [ ' --enable-ra ' , ' --dhcp-range=2600::10,2600::20 ' ]
else :
extra_opts = [ ]
2016-09-30 10:30:08 +03:00
if dnsmasq_opts :
extra_opts + = dnsmasq_opts
2015-11-17 20:30:50 +03:00
self . dnsmasq = subprocess . Popen (
2023-06-15 22:56:18 +03:00
[ ' dnsmasq ' , ' --keep-in-foreground ' , ' --log-queries=extra ' , ' --log-dhcp ' ,
2015-11-17 20:30:50 +03:00
' --log-facility= ' + self . dnsmasq_log , ' --conf-file=/dev/null ' ,
' --dhcp-leasefile= ' + lease_file , ' --bind-interfaces ' ,
' --interface= ' + self . if_router , ' --except-interface=lo ' ,
' --dhcp-range=192.168.5.10,192.168.5.200 ' ] + extra_opts )
def shutdown_iface ( self ) :
''' Remove test interface and stop DHCP server '''
if self . if_router :
subprocess . check_call ( [ ' ip ' , ' link ' , ' del ' , ' dev ' , self . if_router ] )
self . if_router = None
if self . dnsmasq :
self . dnsmasq . kill ( )
self . dnsmasq . wait ( )
self . dnsmasq = None
2023-06-15 22:56:18 +03:00
def print_server_log ( self , log_file = None ) :
2015-11-17 20:30:50 +03:00
''' Print DHCP server log for debugging failures '''
2023-06-15 22:56:18 +03:00
path = log_file if log_file else self . dnsmasq_log
with open ( path ) as f :
sys . stdout . write ( ' \n \n ---- {} ---- \n {} \n ------ \n \n ' . format ( os . path . basename ( path ) , f . read ( ) ) )
2015-11-17 20:30:50 +03:00
2016-09-30 10:30:08 +03:00
def test_resolved_domain_restricted_dns ( self ) :
''' resolved: domain-restricted DNS servers '''
2020-11-16 23:06:56 +03:00
# enable DNSSEC in allow downgrade mode, and turn off stuff we don't want to test to make looking at logs easier
conf = ' /run/systemd/resolved.conf.d/test-enable-dnssec.conf '
2019-02-21 14:24:16 +03:00
os . makedirs ( os . path . dirname ( conf ) , exist_ok = True )
with open ( conf , ' w ' ) as f :
2023-06-16 03:29:46 +03:00
f . write ( ' [Resolve] \n DNSSEC=allow-downgrade \n LLMNR=no \n MulticastDNS=no \n DNSOverTLS=no \n DNS= \n ' )
2019-02-21 14:24:16 +03:00
self . addCleanup ( os . remove , conf )
2016-09-30 10:30:08 +03:00
# create interface for generic connections; this will map all DNS names
# to 192.168.42.1
self . create_iface ( dnsmasq_opts = [ ' --address=/#/192.168.42.1 ' ] )
2023-11-08 17:34:01 +03:00
self . write_network ( ' 50-general.network ' , ''' \
2016-09-30 10:30:08 +03:00
[ Match ]
2018-02-05 09:28:53 +03:00
Name = { }
2016-09-30 10:30:08 +03:00
[ Network ]
DHCP = ipv4
2023-06-16 00:54:04 +03:00
IPv6AcceptRA = no
2021-10-01 02:00:28 +03:00
DNSSECNegativeTrustAnchors = search . example . com
2020-12-09 12:35:10 +03:00
''' .format(self.iface))
2016-09-30 10:30:08 +03:00
# create second device/dnsmasq for a .company/.lab VPN interface
# static IPs for simplicity
2016-12-07 21:12:10 +03:00
self . add_veth_pair ( ' testvpnclient ' , ' testvpnrouter ' )
2016-09-30 10:30:08 +03:00
subprocess . check_call ( [ ' ip ' , ' a ' , ' flush ' , ' dev ' , ' testvpnrouter ' ] )
subprocess . check_call ( [ ' ip ' , ' a ' , ' add ' , ' 10.241.3.1/24 ' , ' dev ' , ' testvpnrouter ' ] )
subprocess . check_call ( [ ' ip ' , ' link ' , ' set ' , ' testvpnrouter ' , ' up ' ] )
vpn_dnsmasq_log = os . path . join ( self . workdir , ' dnsmasq-vpn.log ' )
vpn_dnsmasq = subprocess . Popen (
2023-06-15 22:56:18 +03:00
[ ' dnsmasq ' , ' --keep-in-foreground ' , ' --log-queries=extra ' ,
2016-09-30 10:30:08 +03:00
' --log-facility= ' + vpn_dnsmasq_log , ' --conf-file=/dev/null ' ,
' --dhcp-leasefile=/dev/null ' , ' --bind-interfaces ' ,
' --interface=testvpnrouter ' , ' --except-interface=lo ' ,
' --address=/math.lab/10.241.3.3 ' , ' --address=/cantina.company/10.241.4.4 ' ] )
self . addCleanup ( vpn_dnsmasq . wait )
self . addCleanup ( vpn_dnsmasq . kill )
2023-11-08 17:34:01 +03:00
self . write_network ( ' 50-vpn.network ' , ''' \
2016-09-30 10:30:08 +03:00
[ Match ]
Name = testvpnclient
[ Network ]
2023-06-16 00:54:04 +03:00
IPv6AcceptRA = no
2016-09-30 10:30:08 +03:00
Address = 10.241 .3 .2 / 24
DNS = 10.241 .3 .1
2020-11-16 23:06:56 +03:00
Domains = ~ company ~ lab
DNSSECNegativeTrustAnchors = company lab
2020-12-09 12:35:10 +03:00
''' )
2016-09-30 10:30:08 +03:00
2019-02-27 01:03:35 +03:00
self . start_unit ( ' systemd-networkd ' )
2016-11-04 02:27:55 +03:00
subprocess . check_call ( [ NETWORKD_WAIT_ONLINE , ' --interface ' , self . iface ,
2016-09-30 10:30:08 +03:00
' --interface=testvpnclient ' , ' --timeout=20 ' ] )
# ensure we start fresh with every test
subprocess . check_call ( [ ' systemctl ' , ' restart ' , ' systemd-resolved ' ] )
2023-06-15 22:56:18 +03:00
subprocess . check_call ( [ ' systemctl ' , ' service-log-level ' , ' systemd-resolved ' , ' debug ' ] )
2016-09-30 10:30:08 +03:00
2023-06-15 22:56:18 +03:00
try :
# test vpnclient specific domains; these should *not* be answered by
# the general DNS
2023-06-15 23:55:58 +03:00
out = subprocess . check_output ( [ ' resolvectl ' , ' query ' , ' -4 ' , ' math.lab ' ] )
2023-06-15 22:56:18 +03:00
self . assertIn ( b ' math.lab: 10.241.3.3 ' , out )
2023-06-15 23:55:58 +03:00
out = subprocess . check_output ( [ ' resolvectl ' , ' query ' , ' -4 ' , ' kettle.cantina.company ' ] )
2023-06-15 22:56:18 +03:00
self . assertIn ( b ' kettle.cantina.company: 10.241.4.4 ' , out )
# test general domains
2023-06-15 23:55:58 +03:00
out = subprocess . check_output ( [ ' resolvectl ' , ' query ' , ' -4 ' , ' search.example.com ' ] )
2023-06-15 22:56:18 +03:00
self . assertIn ( b ' search.example.com: 192.168.42.1 ' , out )
with open ( self . dnsmasq_log ) as f :
general_log = f . read ( )
with open ( vpn_dnsmasq_log ) as f :
vpn_log = f . read ( )
# VPN domains should only be sent to VPN DNS
self . assertRegex ( vpn_log , ' query.*math.lab ' )
self . assertRegex ( vpn_log , ' query.*cantina.company ' )
self . assertNotIn ( ' .lab ' , general_log )
self . assertNotIn ( ' .company ' , general_log )
# general domains should not be sent to the VPN DNS
self . assertRegex ( general_log , ' query.*search.example.com ' )
self . assertNotIn ( ' search.example.com ' , vpn_log )
2016-09-30 10:30:08 +03:00
2023-06-15 22:56:18 +03:00
except ( AssertionError , subprocess . CalledProcessError ) :
self . show_journal ( ' systemd-resolved.service ' )
self . print_server_log ( )
self . print_server_log ( vpn_dnsmasq_log )
self . show_ifaces ( )
self . show_resolvectl ( )
raise
2016-09-30 10:30:08 +03:00
2016-12-22 09:58:02 +03:00
def test_resolved_etc_hosts ( self ) :
''' resolved queries to /etc/hosts '''
2020-11-16 23:06:56 +03:00
# enabled DNSSEC in allow-downgrade mode
conf = ' /run/systemd/resolved.conf.d/test-enable-dnssec.conf '
2016-12-22 09:58:02 +03:00
os . makedirs ( os . path . dirname ( conf ) , exist_ok = True )
with open ( conf , ' w ' ) as f :
2023-06-16 03:29:46 +03:00
f . write ( ' [Resolve] \n DNSSEC=allow-downgrade \n LLMNR=no \n MulticastDNS=no \n DNSOverTLS=no \n DNS= \n ' )
2016-12-22 09:58:02 +03:00
self . addCleanup ( os . remove , conf )
2020-11-16 23:06:56 +03:00
# Add example.com to NTA list for this test
negative = ' /run/dnssec-trust-anchors.d/example.com.negative '
os . makedirs ( os . path . dirname ( negative ) , exist_ok = True )
with open ( negative , ' w ' ) as f :
f . write ( ' example.com \n 16.172.in-addr.arpa \n ' )
self . addCleanup ( os . remove , negative )
2019-02-21 14:26:44 +03:00
# create /etc/hosts bind mount which resolves my.example.com for IPv4
2016-12-22 09:58:02 +03:00
hosts = os . path . join ( self . workdir , ' hosts ' )
with open ( hosts , ' w ' ) as f :
2019-02-21 14:26:44 +03:00
f . write ( ' 172.16.99.99 my.example.com \n ' )
2016-12-22 09:58:02 +03:00
subprocess . check_call ( [ ' mount ' , ' --bind ' , hosts , ' /etc/hosts ' ] )
self . addCleanup ( subprocess . call , [ ' umount ' , ' /etc/hosts ' ] )
2020-11-16 23:06:56 +03:00
subprocess . check_call ( [ ' systemctl ' , ' restart ' , ' systemd-resolved.service ' ] )
2023-06-15 22:56:18 +03:00
subprocess . check_call ( [ ' systemctl ' , ' service-log-level ' , ' systemd-resolved.service ' , ' debug ' ] )
2016-12-22 09:58:02 +03:00
# note: different IPv4 address here, so that it's easy to tell apart
# what resolved the query
2019-02-21 14:26:44 +03:00
self . create_iface ( dnsmasq_opts = [ ' --host-record=my.example.com,172.16.99.1,2600::99:99 ' ,
' --host-record=other.example.com,172.16.0.42,2600::42 ' ,
' --mx-host=example.com,mail.example.com ' ] ,
2016-12-22 09:58:02 +03:00
ipv6 = True )
self . do_test ( coldplug = None , ipv6 = True )
try :
# family specific queries
2019-02-21 14:26:44 +03:00
out = subprocess . check_output ( [ ' resolvectl ' , ' query ' , ' -4 ' , ' my.example.com ' ] )
self . assertIn ( b ' my.example.com: 172.16.99.99 ' , out )
2016-12-22 09:58:02 +03:00
# we don't expect an IPv6 answer; if /etc/hosts has any IP address,
# it's considered a sufficient source
2019-02-21 14:26:44 +03:00
self . assertNotEqual ( subprocess . call ( [ ' resolvectl ' , ' query ' , ' -6 ' , ' my.example.com ' ] ) , 0 )
2016-12-22 09:58:02 +03:00
# "any family" query; IPv4 should come from /etc/hosts
2019-02-21 14:26:44 +03:00
out = subprocess . check_output ( [ ' resolvectl ' , ' query ' , ' my.example.com ' ] )
self . assertIn ( b ' my.example.com: 172.16.99.99 ' , out )
2016-12-22 09:58:02 +03:00
# IP → name lookup; again, takes the /etc/hosts one
2018-10-23 01:29:03 +03:00
out = subprocess . check_output ( [ ' resolvectl ' , ' query ' , ' 172.16.99.99 ' ] )
2019-02-21 14:26:44 +03:00
self . assertIn ( b ' 172.16.99.99: my.example.com ' , out )
2016-12-22 09:58:02 +03:00
# non-address RRs should fall back to DNS
2019-02-21 14:26:44 +03:00
out = subprocess . check_output ( [ ' resolvectl ' , ' query ' , ' --type=MX ' , ' example.com ' ] )
self . assertIn ( b ' example.com IN MX 1 mail.example.com ' , out )
2016-12-22 09:58:02 +03:00
# other domains query DNS
2019-02-21 14:26:44 +03:00
out = subprocess . check_output ( [ ' resolvectl ' , ' query ' , ' other.example.com ' ] )
2016-12-22 09:58:02 +03:00
self . assertIn ( b ' 172.16.0.42 ' , out )
2018-10-23 01:29:03 +03:00
out = subprocess . check_output ( [ ' resolvectl ' , ' query ' , ' 172.16.0.42 ' ] )
2019-02-21 14:26:44 +03:00
self . assertIn ( b ' 172.16.0.42: other.example.com ' , out )
2016-12-22 09:58:02 +03:00
except ( AssertionError , subprocess . CalledProcessError ) :
self . show_journal ( ' systemd-resolved.service ' )
self . print_server_log ( )
2023-06-15 22:56:18 +03:00
self . show_ifaces ( )
self . show_resolvectl ( )
2016-12-22 09:58:02 +03:00
raise
2016-11-18 18:17:01 +03:00
def test_transient_hostname ( self ) :
''' networkd sets transient hostname from DHCP '''
2016-11-21 14:53:24 +03:00
orig_hostname = socket . gethostname ( )
self . addCleanup ( socket . sethostname , orig_hostname )
# temporarily move /etc/hostname away; restart hostnamed to pick it up
if os . path . exists ( ' /etc/hostname ' ) :
subprocess . check_call ( [ ' mount ' , ' --bind ' , ' /dev/null ' , ' /etc/hostname ' ] )
self . addCleanup ( subprocess . call , [ ' umount ' , ' /etc/hostname ' ] )
subprocess . check_call ( [ ' systemctl ' , ' stop ' , ' systemd-hostnamed.service ' ] )
2018-12-05 23:59:38 +03:00
self . addCleanup ( subprocess . call , [ ' systemctl ' , ' stop ' , ' systemd-hostnamed.service ' ] )
2016-11-21 14:53:24 +03:00
2018-02-05 09:28:53 +03:00
self . create_iface ( dnsmasq_opts = [ ' --dhcp-host= {} ,192.168.5.210,testgreen ' . format ( self . iface_mac ) ] )
2023-06-16 00:54:04 +03:00
self . do_test ( coldplug = None , extra_opts = ' IPv6AcceptRA=no ' , dhcp_mode = ' ipv4 ' )
2016-11-18 18:17:01 +03:00
2016-11-28 14:35:49 +03:00
try :
# should have received the fixed IP above
out = subprocess . check_output ( [ ' ip ' , ' -4 ' , ' a ' , ' show ' , ' dev ' , self . iface ] )
self . assertRegex ( out , b ' inet 192.168.5.210/24 .* scope global dynamic ' )
2016-11-30 10:02:49 +03:00
# should have set transient hostname in hostnamed; this is
# sometimes a bit lagging (issue #4753), so retry a few times
for retry in range ( 1 , 6 ) :
out = subprocess . check_output ( [ ' hostnamectl ' ] )
if b ' testgreen ' in out :
break
time . sleep ( 5 )
sys . stdout . write ( ' [retry %i ] ' % retry )
sys . stdout . flush ( )
else :
2018-02-05 09:28:53 +03:00
self . fail ( ' Transient hostname not found in hostnamectl: \n {} ' . format ( out . decode ( ) ) )
2016-11-28 14:35:49 +03:00
# and also applied to the system
self . assertEqual ( socket . gethostname ( ) , ' testgreen ' )
except AssertionError :
self . show_journal ( ' systemd-networkd.service ' )
self . show_journal ( ' systemd-hostnamed.service ' )
self . print_server_log ( )
raise
2016-11-21 14:53:24 +03:00
def test_transient_hostname_with_static ( self ) :
''' transient hostname is not applied if static hostname exists '''
orig_hostname = socket . gethostname ( )
self . addCleanup ( socket . sethostname , orig_hostname )
2018-12-06 00:00:42 +03:00
2016-11-21 14:53:24 +03:00
if not os . path . exists ( ' /etc/hostname ' ) :
2018-12-06 00:00:42 +03:00
self . write_config ( ' /etc/hostname ' , " foobarqux " )
else :
self . write_config ( ' /run/hostname.tmp ' , " foobarqux " )
subprocess . check_call ( [ ' mount ' , ' --bind ' , ' /run/hostname.tmp ' , ' /etc/hostname ' ] )
self . addCleanup ( subprocess . call , [ ' umount ' , ' /etc/hostname ' ] )
socket . sethostname ( " foobarqux " ) ;
2016-11-21 14:53:24 +03:00
subprocess . check_call ( [ ' systemctl ' , ' stop ' , ' systemd-hostnamed.service ' ] )
2018-12-05 23:59:38 +03:00
self . addCleanup ( subprocess . call , [ ' systemctl ' , ' stop ' , ' systemd-hostnamed.service ' ] )
2016-11-21 14:53:24 +03:00
2018-02-05 09:28:53 +03:00
self . create_iface ( dnsmasq_opts = [ ' --dhcp-host= {} ,192.168.5.210,testgreen ' . format ( self . iface_mac ) ] )
2023-06-16 00:54:04 +03:00
self . do_test ( coldplug = None , extra_opts = ' IPv6AcceptRA=no ' , dhcp_mode = ' ipv4 ' )
2016-11-21 14:53:24 +03:00
2016-11-28 14:35:49 +03:00
try :
# should have received the fixed IP above
out = subprocess . check_output ( [ ' ip ' , ' -4 ' , ' a ' , ' show ' , ' dev ' , self . iface ] )
self . assertRegex ( out , b ' inet 192.168.5.210/24 .* scope global dynamic ' )
# static hostname wins over transient one, thus *not* applied
2018-12-06 00:00:42 +03:00
self . assertEqual ( socket . gethostname ( ) , " foobarqux " )
2016-11-28 14:35:49 +03:00
except AssertionError :
self . show_journal ( ' systemd-networkd.service ' )
self . show_journal ( ' systemd-hostnamed.service ' )
self . print_server_log ( )
raise
2016-11-18 18:17:01 +03:00
2015-11-17 20:30:50 +03:00
class NetworkdClientTest ( ClientTestBase , unittest . TestCase ) :
''' Test networkd client against networkd server '''
def setUp ( self ) :
super ( ) . setUp ( )
self . dnsmasq = None
2016-11-22 10:05:18 +03:00
def create_iface ( self , ipv6 = False , dhcpserver_opts = None ) :
2015-11-17 20:30:50 +03:00
''' Create test interface with DHCP server behind it '''
# run "router-side" networkd in own mount namespace to shield it from
# "client-side" configuration and networkd
( fd , script ) = tempfile . mkstemp ( prefix = ' networkd-router.sh ' )
self . addCleanup ( os . remove , script )
with os . fdopen ( fd , ' w+ ' ) as f :
2016-09-14 13:52:40 +03:00
f . write ( ''' \
2017-12-24 09:53:20 +03:00
#!/bin/sh
set - eu
2015-11-17 20:30:50 +03:00
mkdir - p / run / systemd / network
mkdir - p / run / systemd / netif
2024-03-01 06:09:00 +03:00
mkdir - p / var / lib / systemd / network
2015-11-17 20:30:50 +03:00
mount - t tmpfs none / run / systemd / network
mount - t tmpfs none / run / systemd / netif
2024-03-01 06:09:00 +03:00
mount - t tmpfs none / var / lib / systemd / network
2015-11-17 20:30:50 +03:00
[ ! - e / run / dbus ] | | mount - t tmpfs none / run / dbus
# create router/client veth pair
2023-11-08 17:34:01 +03:00
cat << EOF > / run / systemd / network / 50 - test . netdev
2015-11-17 20:30:50 +03:00
[ NetDev ]
2020-12-09 12:35:10 +03:00
Name = { ifr }
2015-11-17 20:30:50 +03:00
Kind = veth
[ Peer ]
2020-12-09 12:35:10 +03:00
Name = { ifc }
2015-11-17 20:30:50 +03:00
EOF
2023-11-08 17:34:01 +03:00
cat << EOF > / run / systemd / network / 50 - test . network
2015-11-17 20:30:50 +03:00
[ Match ]
2020-12-09 12:35:10 +03:00
Name = { ifr }
2015-11-17 20:30:50 +03:00
[ Network ]
2024-11-25 10:15:44 +03:00
IPv6AcceptRA = no
2015-11-17 20:30:50 +03:00
Address = 192.168 .5 .1 / 24
2020-12-09 12:35:10 +03:00
{ addr6 }
2015-11-17 20:30:50 +03:00
DHCPServer = yes
[ DHCPServer ]
PoolOffset = 10
PoolSize = 50
DNS = 192.168 .5 .1
2020-12-09 12:35:10 +03:00
{ dhopts }
2015-11-17 20:30:50 +03:00
EOF
2024-03-01 06:09:00 +03:00
# For the networkd instance invoked below cannot support varlink connection.
# Hence, 'networkctl persistent-storage yes' cannot be used.
2024-03-15 18:38:06 +03:00
export SYSTEMD_NETWORK_PERSISTENT_STORAGE_READY = 1
2024-03-01 06:09:00 +03:00
2015-11-17 20:30:50 +03:00
# run networkd as in systemd-networkd.service
2020-12-09 12:35:10 +03:00
exec $ ( systemctl cat systemd - networkd . service | sed - n ' /^ExecStart=/ {{ s/^.*=//; s/^[@+-]//; s/^!*//; p}} ' )
''' .format(ifr=self.if_router,
ifc = self . iface ,
addr6 = ( ' Address=2600::1/64 ' if ipv6 else ' ' ) ,
dhopts = ( dhcpserver_opts or ' ' ) ) )
2015-11-17 20:30:50 +03:00
os . fchmod ( fd , 0o755 )
subprocess . check_call ( [ ' systemd-run ' , ' --unit=networkd-test-router.service ' ,
' -p ' , ' InaccessibleDirectories=-/etc/systemd/network ' ,
' -p ' , ' InaccessibleDirectories=-/run/systemd/network ' ,
' -p ' , ' InaccessibleDirectories=-/run/systemd/netif ' ,
2024-03-01 06:09:00 +03:00
' -p ' , ' InaccessibleDirectories=-/var/lib/systemd/network ' ,
2015-11-17 20:30:50 +03:00
' --service-type=notify ' , script ] )
# wait until devices got created
2016-12-02 01:30:31 +03:00
for _ in range ( 50 ) :
2024-11-22 21:32:34 +03:00
if subprocess . run ( [ ' ip ' , ' link ' , ' show ' , ' dev ' , self . if_router ] ,
stdout = subprocess . DEVNULL , stderr = subprocess . DEVNULL ) . returncode == 0 :
2015-11-17 20:30:50 +03:00
break
time . sleep ( 0.1 )
2024-11-22 21:32:34 +03:00
else :
subprocess . call ( [ ' ip ' , ' link ' , ' show ' , ' dev ' , self . if_router ] )
self . fail ( ' Timed out waiting for {ifr} created. ' . format ( ifr = self . if_router ) )
2015-11-17 20:30:50 +03:00
def shutdown_iface ( self ) :
''' Remove test interface and stop DHCP server '''
if self . if_router :
subprocess . check_call ( [ ' systemctl ' , ' stop ' , ' networkd-test-router.service ' ] )
# ensure failed transient unit does not stay around
subprocess . call ( [ ' systemctl ' , ' reset-failed ' , ' networkd-test-router.service ' ] )
subprocess . call ( [ ' ip ' , ' link ' , ' del ' , ' dev ' , self . if_router ] )
self . if_router = None
def print_server_log ( self ) :
''' Print DHCP server log for debugging failures '''
self . show_journal ( ' networkd-test-router.service ' )
@unittest.skip ( ' networkd does not have DHCPv6 server support ' )
def test_hotplug_dhcp_ip6 ( self ) :
pass
@unittest.skip ( ' networkd does not have DHCPv6 server support ' )
def test_coldplug_dhcp_ip6 ( self ) :
pass
2016-06-03 12:15:44 +03:00
def test_search_domains ( self ) :
# we don't use this interface for this test
self . if_router = None
2023-11-08 17:34:01 +03:00
self . write_network ( ' 50-test.netdev ' , ''' \
2016-09-14 13:52:40 +03:00
[ NetDev ]
2016-06-03 12:15:44 +03:00
Name = dummy0
Kind = dummy
2020-12-09 12:35:10 +03:00
MACAddress = 12 : 34 : 56 : 78 : 9 a : bc
''' )
2023-11-08 17:34:01 +03:00
self . write_network ( ' 50-test.network ' , ''' \
2016-09-14 13:52:40 +03:00
[ Match ]
2016-06-03 12:15:44 +03:00
Name = dummy0
[ Network ]
2024-11-25 10:15:44 +03:00
IPv6AcceptRA = no
2019-02-27 01:05:05 +03:00
Address = 192.168 .42 .100 / 24
2016-06-03 12:15:44 +03:00
DNS = 192.168 .42 .1
2020-12-09 12:35:10 +03:00
Domains = one two three four five six seven eight nine ten
''' )
2016-06-03 12:15:44 +03:00
2019-02-27 01:03:35 +03:00
self . start_unit ( ' systemd-networkd ' )
2016-06-03 12:15:44 +03:00
2016-06-30 16:44:22 +03:00
for timeout in range ( 50 ) :
with open ( RESOLV_CONF ) as f :
contents = f . read ( )
if ' one ' in contents :
break
time . sleep ( 0.1 )
2020-08-07 14:47:09 +03:00
self . assertRegex ( contents , ' search .*one two three four five six seven eight nine ten ' )
2016-06-03 12:15:44 +03:00
2016-07-09 17:55:26 +03:00
def test_dropin ( self ) :
# we don't use this interface for this test
self . if_router = None
2023-11-08 17:34:01 +03:00
self . write_network ( ' 50-test.netdev ' , ''' \
2016-07-09 17:55:26 +03:00
[ NetDev ]
Name = dummy0
Kind = dummy
2020-12-09 12:35:10 +03:00
MACAddress = 12 : 34 : 56 : 78 : 9 a : bc
''' )
2023-11-08 17:34:01 +03:00
self . write_network ( ' 50-test.network ' , ''' \
2016-07-09 17:55:26 +03:00
[ Match ]
Name = dummy0
[ Network ]
2024-11-25 10:15:44 +03:00
IPv6AcceptRA = no
2019-02-27 01:05:05 +03:00
Address = 192.168 .42 .100 / 24
2020-12-09 12:35:10 +03:00
DNS = 192.168 .42 .1
''' )
2023-11-08 17:34:01 +03:00
self . write_network_dropin ( ' 50-test.network ' , ' dns ' , ''' \
2016-07-09 17:55:26 +03:00
[ Network ]
2020-12-09 12:35:10 +03:00
DNS = 127.0 .0 .1
''' )
2016-07-09 17:55:26 +03:00
2019-02-27 01:03:35 +03:00
self . start_unit ( ' systemd-resolved ' )
self . start_unit ( ' systemd-networkd ' )
2016-07-09 17:55:26 +03:00
2024-05-31 04:56:30 +03:00
subprocess . check_call ( [ NETWORKD_WAIT_ONLINE , ' --interface ' , ' dummy0 ' , ' --timeout=10 ' ] )
out = subprocess . check_output ( [ ' networkctl ' , ' status ' , ' dummy0 ' ] )
2024-09-07 21:12:04 +03:00
self . assertIn ( b ' 50-test.netdev ' , out )
2024-05-31 04:56:30 +03:00
self . assertIn ( b ' 50-test.network.d/dns.conf ' , out )
for _ in range ( 50 ) :
2016-07-09 17:55:26 +03:00
with open ( RESOLV_CONF ) as f :
contents = f . read ( )
2024-05-31 04:56:30 +03:00
if ' nameserver 127.0.0.1 \n ' in contents and ' nameserver 192.168.42.1 \n ' in contents :
2016-07-09 17:55:26 +03:00
break
time . sleep ( 0.1 )
2024-05-31 04:56:30 +03:00
else :
self . fail ( f ' Expected DNS servers not found in resolv.conf: { contents } ' )
2022-11-30 18:13:23 +03:00
2016-11-22 10:05:18 +03:00
def test_dhcp_timezone ( self ) :
''' networkd sets time zone from DHCP '''
def get_tz ( ) :
out = subprocess . check_output ( [ ' busctl ' , ' get-property ' , ' org.freedesktop.timedate1 ' ,
' /org/freedesktop/timedate1 ' , ' org.freedesktop.timedate1 ' , ' Timezone ' ] )
assert out . startswith ( b ' s " ' )
out = out . strip ( )
assert out . endswith ( b ' " ' )
return out [ 3 : - 1 ] . decode ( )
orig_timezone = get_tz ( )
self . addCleanup ( subprocess . call , [ ' timedatectl ' , ' set-timezone ' , orig_timezone ] )
self . create_iface ( dhcpserver_opts = ' EmitTimezone=yes \n Timezone=Pacific/Honolulu ' )
self . do_test ( coldplug = None , extra_opts = ' IPv6AcceptRA=false \n [DHCP] \n UseTimezone=true ' , dhcp_mode = ' ipv4 ' )
2024-05-24 19:32:21 +03:00
# Should have applied the received timezone. This is asynchronous, so we need to wait for a while:
for _ in range ( 20 ) :
tz = get_tz ( )
if tz == ' Pacific/Honolulu ' :
break
time . sleep ( 0.5 )
else :
2016-11-22 10:05:18 +03:00
self . show_journal ( ' systemd-networkd.service ' )
2024-05-24 19:32:21 +03:00
self . show_journal ( ' systemd-timedated.service ' )
self . fail ( f ' Timezone: { tz } , expected: Pacific/Honolulu ' )
2016-11-22 10:05:18 +03:00
2016-12-07 21:12:10 +03:00
class MatchClientTest ( unittest . TestCase , NetworkdTestingUtilities ) :
""" Test [Match] sections in .network files.
Be aware that matching the test host ' s interfaces will wipe their
configuration , so as a precaution , all network files should have a
restrictive [ Match ] section to only ever interfere with the
temporary veth interfaces created here .
"""
def tearDown ( self ) :
""" Stop networkd. """
2020-08-28 18:21:27 +03:00
subprocess . call ( [ ' systemctl ' , ' stop ' , ' systemd-networkd.socket ' ] )
subprocess . call ( [ ' systemctl ' , ' stop ' , ' systemd-networkd.service ' ] )
2016-12-07 21:12:10 +03:00
def test_basic_matching ( self ) :
""" Verify the Name= line works throughout this class. """
self . add_veth_pair ( ' test_if1 ' , ' fake_if2 ' )
2024-11-25 10:15:44 +03:00
self . write_network ( ' 50-test.network ' , ''' \
[ Match ]
Name = test_ *
[ Network ]
IPv6AcceptRA = no
''' )
2016-12-07 21:12:10 +03:00
subprocess . check_call ( [ ' systemctl ' , ' start ' , ' systemd-networkd ' ] )
self . assert_link_states ( test_if1 = ' managed ' , fake_if2 = ' unmanaged ' )
def test_inverted_matching ( self ) :
""" Verify that a ' ! ' -prefixed value inverts the match. """
# Use a MAC address as the interfaces' common matching attribute
# to avoid depending on udev, to support testing in containers.
mac = ' 00:01:02:03:98:99 '
self . add_veth_pair ( ' test_veth ' , ' test_peer ' ,
[ ' addr ' , mac ] , [ ' addr ' , mac ] )
2024-11-25 10:15:44 +03:00
self . write_network ( ' 50-no-veth.network ' , ''' \
2016-12-07 21:12:10 +03:00
[ Match ]
2018-02-05 09:28:53 +03:00
MACAddress = { }
2016-12-07 21:12:10 +03:00
Name = ! nonexistent * peer *
2024-11-25 10:15:44 +03:00
[ Network ]
IPv6AcceptRA = no
''' .format(mac))
2016-12-07 21:12:10 +03:00
subprocess . check_call ( [ ' systemctl ' , ' start ' , ' systemd-networkd ' ] )
self . assert_link_states ( test_veth = ' managed ' , test_peer = ' unmanaged ' )
2016-09-28 01:18:14 +03:00
class UnmanagedClientTest ( unittest . TestCase , NetworkdTestingUtilities ) :
""" Test if networkd manages the correct interfaces. """
def setUp ( self ) :
""" Write .network files to match the named veth devices. """
# Define the veth+peer pairs to be created.
# Their pairing doesn't actually matter, only their names do.
self . veths = {
' m1def ' : ' m0unm ' ,
' m1man ' : ' m1unm ' ,
}
# Define the contents of .network files to be read in order.
self . configs = (
" [Match] \n Name=m1def \n " ,
" [Match] \n Name=m1unm \n [Link] \n Unmanaged=yes \n " ,
" [Match] \n Name=m1* \n [Link] \n Unmanaged=no \n " ,
)
# Write out the .network files to be cleaned up automatically.
for i , config in enumerate ( self . configs ) :
self . write_network ( " %02d -test.network " % i , config )
def tearDown ( self ) :
""" Stop networkd. """
2020-08-28 18:21:27 +03:00
subprocess . call ( [ ' systemctl ' , ' stop ' , ' systemd-networkd.socket ' ] )
subprocess . call ( [ ' systemctl ' , ' stop ' , ' systemd-networkd.service ' ] )
2016-09-28 01:18:14 +03:00
def create_iface ( self ) :
""" Create temporary veth pairs for interface matching. """
for veth , peer in self . veths . items ( ) :
2016-12-07 21:12:10 +03:00
self . add_veth_pair ( veth , peer )
2016-09-28 01:18:14 +03:00
def test_unmanaged_setting ( self ) :
""" Verify link states with Unmanaged= settings, hot-plug. """
subprocess . check_call ( [ ' systemctl ' , ' start ' , ' systemd-networkd ' ] )
self . create_iface ( )
self . assert_link_states ( m1def = ' managed ' ,
m1man = ' managed ' ,
m1unm = ' unmanaged ' ,
m0unm = ' unmanaged ' )
def test_unmanaged_setting_coldplug ( self ) :
""" Verify link states with Unmanaged= settings, cold-plug. """
self . create_iface ( )
subprocess . check_call ( [ ' systemctl ' , ' start ' , ' systemd-networkd ' ] )
self . assert_link_states ( m1def = ' managed ' ,
m1man = ' managed ' ,
m1unm = ' unmanaged ' ,
m0unm = ' unmanaged ' )
def test_catchall_config ( self ) :
""" Verify link states with a catch-all config, hot-plug. """
# Don't actually catch ALL interfaces. It messes up the host.
2023-11-08 17:34:01 +03:00
self . write_network ( ' 50-all.network ' , " [Match] \n Name=m[01]??? \n " )
2016-09-28 01:18:14 +03:00
subprocess . check_call ( [ ' systemctl ' , ' start ' , ' systemd-networkd ' ] )
self . create_iface ( )
self . assert_link_states ( m1def = ' managed ' ,
m1man = ' managed ' ,
m1unm = ' unmanaged ' ,
m0unm = ' managed ' )
def test_catchall_config_coldplug ( self ) :
""" Verify link states with a catch-all config, cold-plug. """
# Don't actually catch ALL interfaces. It messes up the host.
2023-11-08 17:34:01 +03:00
self . write_network ( ' 50-all.network ' , " [Match] \n Name=m[01]??? \n " )
2016-09-28 01:18:14 +03:00
self . create_iface ( )
subprocess . check_call ( [ ' systemctl ' , ' start ' , ' systemd-networkd ' ] )
self . assert_link_states ( m1def = ' managed ' ,
m1man = ' managed ' ,
m1unm = ' unmanaged ' ,
m0unm = ' managed ' )
2015-11-17 20:30:50 +03:00
if __name__ == ' __main__ ' :
unittest . main ( testRunner = unittest . TextTestRunner ( stream = sys . stdout ,
verbosity = 2 ) )