/* SPDX-License-Identifier: LGPL-2.1-or-later */ #include "fd-util.h" #include "fileio.h" #include "networkd-routing-policy-rule.h" #include "string-util.h" #include "tests.h" #include "tmpfile-util.h" static void test_rule_serialization(const char *title, const char *ruleset, const char *expected) { char pattern[] = "/tmp/systemd-test-routing-policy-rule.XXXXXX", pattern2[] = "/tmp/systemd-test-routing-policy-rule.XXXXXX", pattern3[] = "/tmp/systemd-test-routing-policy-rule.XXXXXX"; const char *cmd; int fd, fd2, fd3; _cleanup_fclose_ FILE *f = NULL, *f2 = NULL, *f3 = NULL; Set *rules = NULL; _cleanup_free_ char *buf = NULL; size_t buf_size; log_info("========== %s ==========", title); log_info("put:\n%s\n", ruleset); fd = mkostemp_safe(pattern); assert_se(fd >= 0); assert_se(f = fdopen(fd, "a+")); assert_se(write_string_stream(f, ruleset, 0) == 0); assert_se(routing_policy_load_rules(pattern, &rules) == 0); fd2 = mkostemp_safe(pattern2); assert_se(fd2 >= 0); assert_se(f2 = fdopen(fd2, "a+")); assert_se(routing_policy_serialize_rules(rules, f2) == 0); assert_se(fflush_and_check(f2) == 0); assert_se(read_full_file(pattern2, &buf, &buf_size) == 0); log_info("got:\n%s", buf); fd3 = mkostemp_safe(pattern3); assert_se(fd3 >= 0); assert_se(f3 = fdopen(fd3, "w")); assert_se(write_string_stream(f3, expected ?: ruleset, 0) == 0); cmd = strjoina("diff -u ", pattern3, " ", pattern2); log_info("$ %s", cmd); assert_se(system(cmd) == 0); set_free(rules); } int main(int argc, char **argv) { _cleanup_free_ char *p = NULL; test_setup_logging(LOG_DEBUG); test_rule_serialization("basic parsing", "RULE=family=AF_INET from=1.2.3.4/32 to=2.3.4.5/32 tos=5 type=1 priority=10 fwmark=1/2 invert_rule=yes table=10", NULL); test_rule_serialization("ignored values", "RULE=something=to=ignore from=1.2.3.4/32 from=1.2.3.4/32" " \t to=2.3.4.5/24 to=2.3.4.5/32 tos=5 type=1 fwmark=2 fwmark=1 table=10 table=20", "RULE=family=AF_INET from=1.2.3.4/32 to=2.3.4.5/32 tos=5 type=1 fwmark=1 invert_rule=no table=20"); test_rule_serialization("ipv6", "RULE=family=AF_INET6 from=1::2/64 to=2::3/64 type=1 invert_rule=yes table=6", NULL); assert_se(asprintf(&p, "RULE=family=AF_INET6 from=1::2/64 to=2::3/64 type=1 invert_rule=no table=%d", RT_TABLE_MAIN) >= 0); test_rule_serialization("default table", "RULE=from=1::2/64 to=2::3/64", p); test_rule_serialization("incoming interface", "RULE=from=1::2/64 to=2::3/64 table=1 iif=lo", "RULE=family=AF_INET6 from=1::2/64 to=2::3/64 type=1 iif=lo invert_rule=no table=1"); test_rule_serialization("outgoing interface", "RULE=family=AF_INET6 from=1::2/64 to=2::3/64 type=1 oif=eth0 invert_rule=no table=1", NULL); test_rule_serialization("freeing interface names", "RULE=from=1::2/64 to=2::3/64 family=AF_INET6 type=1 iif=e0 iif=e1 oif=e0 oif=e1 table=1", "RULE=family=AF_INET6 from=1::2/64 to=2::3/64 type=1 iif=e1 oif=e1 invert_rule=no table=1"); test_rule_serialization("ignoring invalid family", "RULE=from=1::2/64 to=2::3/64 family=AF_UNSEPC family=AF_INET table=1", "RULE=family=AF_INET6 from=1::2/64 to=2::3/64 type=1 invert_rule=no table=1"); return 0; }