diff options
author | Susant Sahani <susant@redhat.com> | 2014-03-25 14:13:30 +0530 |
---|---|---|
committer | Tom Gundersen <teg@jklm.no> | 2014-03-25 14:44:33 +0100 |
commit | 9a6704a81fb5431f7b32dea267a837b1c2b86801 (patch) | |
tree | 464e289c1c713d0764f4602c2452351578b13ded /src/test | |
parent | 41ca2c206bb70168f662200784ded59d1af22044 (diff) |
sd-rtnl: add support for tunnel attributes
Added support for tunneling netlink attrributes (ipip, gre, sit).
These works with kernel module ipip, gre and sit . The test cases are
moved to a separate file and manual test as well because they require
respective kernel modules as well.
Diffstat (limited to 'src/test')
-rw-r--r-- | src/test/test-rtnl-manual.c | 154 |
1 files changed, 154 insertions, 0 deletions
diff --git a/src/test/test-rtnl-manual.c b/src/test/test-rtnl-manual.c new file mode 100644 index 0000000000..e76fb81a66 --- /dev/null +++ b/src/test/test-rtnl-manual.c @@ -0,0 +1,154 @@ +/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/ + +/*** + This file is part of systemd. + + Copyright 2014 Susant Sahani + + systemd is free software; you can redistribute it and/or modify it + under the terms of the GNU Lesser General Public License as published by + the Free Software Foundation; either version 2.1 of the License, or + (at your option) any later version. + + systemd is distributed in the hope that it will be useful, but + WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + Lesser General Public License for more details. + + You should have received a copy of the GNU Lesser General Public License + along with systemd; If not, see <http://www.gnu.org/licenses/>. +***/ + +#include <netinet/ether.h> +#include <arpa/inet.h> +#include <net/if.h> +#include <linux/ip.h> +#include <linux/if_tunnel.h> +#include <libkmod.h> + +#include "util.h" +#include "macro.h" +#include "sd-rtnl.h" +#include "socket-util.h" +#include "rtnl-util.h" +#include "event-util.h" +#include "rtnl-internal.h" + +static int load_module(const char *mod_name) { + struct kmod_ctx *ctx; + struct kmod_list *list = NULL, *l; + int r; + + ctx = kmod_new(NULL, NULL); + if (!ctx) { + kmod_unref(ctx); + return -ENOMEM; + } + + r = kmod_module_new_from_lookup(ctx, mod_name, &list); + if (r < 0) + return -1; + + kmod_list_foreach(l, list) { + struct kmod_module *mod = kmod_module_get_module(l); + + r = kmod_module_probe_insert_module(mod, 0, NULL, NULL, NULL, NULL); + if (r >= 0) + r = 0; + else + r = -1; + + kmod_module_unref(mod); + } + + kmod_module_unref_list(list); + kmod_unref(ctx); + + return r; +} + +static int test_tunnel_configure(sd_rtnl *rtnl) { + int r; + sd_rtnl_message *m, *n; + struct in_addr local, remote; + + /* skip test if module cannot be loaded */ + r = load_module("ipip"); + if(r < 0) + return EXIT_TEST_SKIP; + + if(getuid() != 0) + return EXIT_TEST_SKIP; + + /* IPIP tunnel */ + assert_se(sd_rtnl_message_new_link(rtnl, &m, RTM_NEWLINK, 0) >= 0); + assert_se(m); + + assert_se(sd_rtnl_message_append_string(m, IFLA_IFNAME, "eth0") >= 0); + assert_se(sd_rtnl_message_append_u32(m, IFLA_MTU, 1234)>= 0); + + assert_se(sd_rtnl_message_open_container(m, IFLA_LINKINFO) >= 0); + assert_se(sd_rtnl_message_append_string(m, IFLA_INFO_KIND, "ipip") >= 0); + + assert_se(sd_rtnl_message_open_container(m, IFLA_INFO_DATA) >= 0); + + inet_pton(AF_INET, "192.168.21.1", &local.s_addr); + assert_se(sd_rtnl_message_append_u32(m, IFLA_IPTUN_LOCAL, local.s_addr) >= 0); + + inet_pton(AF_INET, "192.168.21.2", &remote.s_addr); + assert_se(sd_rtnl_message_append_u32(m, IFLA_IPTUN_REMOTE, remote.s_addr) >= 0); + + assert_se(sd_rtnl_message_close_container(m) >= 0); + assert_se(sd_rtnl_message_close_container(m) >= 0); + + assert_se(sd_rtnl_call(rtnl, m, -1, 0) == 1); + + assert_se((m = sd_rtnl_message_unref(m)) == NULL); + + r = load_module("sit"); + if(r < 0) + return EXIT_TEST_SKIP; + + /* sit */ + assert_se(sd_rtnl_message_new_link(rtnl, &n, RTM_NEWLINK, 0) >= 0); + assert_se(n); + + assert_se(sd_rtnl_message_append_string(n, IFLA_IFNAME, "eth1") >= 0); + assert_se(sd_rtnl_message_append_u32(n, IFLA_MTU, 1234)>= 0); + + assert_se(sd_rtnl_message_open_container(n, IFLA_LINKINFO) >= 0); + assert_se(sd_rtnl_message_append_string(n, IFLA_INFO_KIND, "sit") >= 0); + + assert_se(sd_rtnl_message_open_container(n, IFLA_INFO_DATA) >= 0); + + assert_se(sd_rtnl_message_append_u8(n, IFLA_IPTUN_PROTO, IPPROTO_IPIP) >= 0); + + inet_pton(AF_INET, "192.168.21.3", &local.s_addr); + assert_se(sd_rtnl_message_append_u32(n, IFLA_IPTUN_LOCAL, local.s_addr) >= 0); + + inet_pton(AF_INET, "192.168.21.4", &remote.s_addr); + assert_se(sd_rtnl_message_append_u32(n, IFLA_IPTUN_REMOTE, remote.s_addr) >= 0); + + assert_se(sd_rtnl_message_close_container(n) >= 0); + assert_se(sd_rtnl_message_close_container(n) >= 0); + + assert_se(sd_rtnl_call(rtnl, n, -1, 0) == 1); + + assert_se((m = sd_rtnl_message_unref(n)) == NULL); + + return EXIT_SUCCESS; +} + +int main(int argc, char *argv[]) { + sd_rtnl *rtnl; + int r; + + assert_se(sd_rtnl_open(&rtnl, 0) >= 0); + assert_se(rtnl); + + r = test_tunnel_configure(rtnl); + + assert_se((rtnl = sd_rtnl_unref(rtnl)) == NULL); + + return r; +} |