110 lines
4.1 KiB
C
110 lines
4.1 KiB
C
/***
|
|
SPDX-License-Identifier: LGPL-2.1+
|
|
|
|
This file is part of systemd.
|
|
|
|
Copyright 2017 Zbigniew Jędrzejewski-Szmek
|
|
|
|
systemd is free software; you can redistribute it and/or modify it
|
|
under the terms of the GNU Lesser General Public License as published by
|
|
the Free Software Foundation; either version 2.1 of the License, or
|
|
(at your option) any later version.
|
|
|
|
systemd is distributed in the hope that it will be useful, but
|
|
WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
Lesser General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Lesser General Public License
|
|
along with systemd; If not, see <http://www.gnu.org/licenses/>.
|
|
***/
|
|
|
|
#include "fd-util.h"
|
|
#include "fileio.h"
|
|
#include "log.h"
|
|
#include "macro.h"
|
|
#include "network-internal.h"
|
|
#include "networkd-manager.h"
|
|
#include "string-util.h"
|
|
|
|
static void test_rule_serialization(const char *title, const char *ruleset, const char *expected) {
|
|
char pattern[] = "/tmp/systemd-test-routing-policy-rule.XXXXXX",
|
|
pattern2[] = "/tmp/systemd-test-routing-policy-rule.XXXXXX",
|
|
pattern3[] = "/tmp/systemd-test-routing-policy-rule.XXXXXX";
|
|
const char *cmd;
|
|
int fd, fd2, fd3;
|
|
_cleanup_fclose_ FILE *f = NULL, *f2 = NULL, *f3 = NULL;
|
|
Set *rules = NULL;
|
|
_cleanup_free_ char *buf = NULL;
|
|
size_t buf_size;
|
|
|
|
log_info("========== %s ==========", title);
|
|
log_info("put:\n%s\n", ruleset);
|
|
|
|
fd = mkostemp_safe(pattern);
|
|
assert_se(fd >= 0);
|
|
assert_se(f = fdopen(fd, "a+e"));
|
|
assert_se(write_string_stream(f, ruleset, 0) == 0);
|
|
|
|
assert_se(routing_policy_load_rules(pattern, &rules) == 0);
|
|
|
|
fd2 = mkostemp_safe(pattern2);
|
|
assert_se(fd2 >= 0);
|
|
assert_se(f2 = fdopen(fd2, "a+e"));
|
|
|
|
assert_se(routing_policy_serialize_rules(rules, f2) == 0);
|
|
assert_se(fflush_and_check(f2) == 0);
|
|
|
|
assert_se(read_full_file(pattern2, &buf, &buf_size) == 0);
|
|
|
|
log_info("got:\n%s", buf);
|
|
|
|
fd3 = mkostemp_safe(pattern3);
|
|
assert_se(fd3 >= 0);
|
|
assert_se(f3 = fdopen(fd3, "we"));
|
|
assert_se(write_string_stream(f3, expected ?: ruleset, 0) == 0);
|
|
|
|
cmd = strjoina("diff -u ", pattern3, " ", pattern2);
|
|
log_info("$ %s", cmd);
|
|
assert_se(system(cmd) == 0);
|
|
|
|
set_free_with_destructor(rules, routing_policy_rule_free);
|
|
}
|
|
|
|
int main(int argc, char **argv) {
|
|
_cleanup_free_ char *p = NULL;
|
|
|
|
log_set_max_level(LOG_DEBUG);
|
|
log_parse_environment();
|
|
log_open();
|
|
|
|
test_rule_serialization("basic parsing",
|
|
"RULE=from=1.2.3.4/32 to=2.3.4.5/32 tos=5 fwmark=1/2 table=10", NULL);
|
|
|
|
test_rule_serialization("ignored values",
|
|
"RULE=something=to=ignore from=1.2.3.4/32 from=1.2.3.4/32"
|
|
" \t to=2.3.4.5/24 to=2.3.4.5/32 tos=5 fwmark=2 fwmark=1 table=10 table=20",
|
|
"RULE=from=1.2.3.4/32"
|
|
" to=2.3.4.5/32 tos=5 fwmark=1/0 table=20");
|
|
|
|
test_rule_serialization("ipv6",
|
|
"RULE=from=1::2/64 to=2::3/64 table=6", NULL);
|
|
|
|
assert_se(asprintf(&p, "RULE=from=1::2/64 to=2::3/64 table=%d", RT_TABLE_MAIN) >= 0);
|
|
test_rule_serialization("default table",
|
|
"RULE=from=1::2/64 to=2::3/64", p);
|
|
|
|
test_rule_serialization("incoming interface",
|
|
"RULE=from=1::2/64 to=2::3/64 table=1 iif=lo",
|
|
"RULE=from=1::2/64 to=2::3/64 iif=lo table=1");
|
|
|
|
test_rule_serialization("outgoing interface",
|
|
"RULE=from=1::2/64 to=2::3/64 oif=eth0 table=1", NULL);
|
|
|
|
test_rule_serialization("freeing interface names",
|
|
"RULE=from=1::2/64 to=2::3/64 iif=e0 iif=e1 oif=e0 oif=e1 table=1",
|
|
"RULE=from=1::2/64 to=2::3/64 iif=e1 oif=e1 table=1");
|
|
|
|
return 0;
|
|
}
|