mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-12-15 02:03:01 +00:00
9f7b0d8f0c
The original implementation did a simple string-comparison against the output of `ip route`. This is problematic because * if the details in the string-output change, the test breaks. This is less likely with JSON because the relevant values (i.e. destination, interface etc) aren't supposed to be changed. * this is causing issues with formatters[1][2]. [1] #161703 [2] #154818
233 lines
6.9 KiB
Nix
233 lines
6.9 KiB
Nix
import ./make-test-python.nix ({ pkgs, lib, ... }: let
|
|
inherit (import ./ssh-keys.nix pkgs) snakeOilPrivateKey snakeOilPublicKey;
|
|
in {
|
|
name = "systemd-networkd-vrf";
|
|
meta.maintainers = with lib.maintainers; [ ma27 ];
|
|
|
|
nodes = {
|
|
client = { pkgs, ... }: {
|
|
virtualisation.vlans = [ 1 2 ];
|
|
|
|
networking = {
|
|
useDHCP = false;
|
|
useNetworkd = true;
|
|
firewall.checkReversePath = "loose";
|
|
};
|
|
|
|
systemd.network = {
|
|
enable = true;
|
|
|
|
netdevs."10-vrf1" = {
|
|
netdevConfig = {
|
|
Kind = "vrf";
|
|
Name = "vrf1";
|
|
MTUBytes = "1300";
|
|
};
|
|
vrfConfig.Table = 23;
|
|
};
|
|
netdevs."10-vrf2" = {
|
|
netdevConfig = {
|
|
Kind = "vrf";
|
|
Name = "vrf2";
|
|
MTUBytes = "1300";
|
|
};
|
|
vrfConfig.Table = 42;
|
|
};
|
|
|
|
networks."10-vrf1" = {
|
|
matchConfig.Name = "vrf1";
|
|
networkConfig.IPForward = "yes";
|
|
routes = [
|
|
{ routeConfig = { Destination = "192.168.1.2"; Metric = 100; }; }
|
|
];
|
|
};
|
|
networks."10-vrf2" = {
|
|
matchConfig.Name = "vrf2";
|
|
networkConfig.IPForward = "yes";
|
|
routes = [
|
|
{ routeConfig = { Destination = "192.168.2.3"; Metric = 100; }; }
|
|
];
|
|
};
|
|
|
|
networks."10-eth1" = {
|
|
matchConfig.Name = "eth1";
|
|
linkConfig.RequiredForOnline = "no";
|
|
networkConfig = {
|
|
VRF = "vrf1";
|
|
Address = "192.168.1.1";
|
|
IPForward = "yes";
|
|
};
|
|
};
|
|
networks."10-eth2" = {
|
|
matchConfig.Name = "eth2";
|
|
linkConfig.RequiredForOnline = "no";
|
|
networkConfig = {
|
|
VRF = "vrf2";
|
|
Address = "192.168.2.1";
|
|
IPForward = "yes";
|
|
};
|
|
};
|
|
};
|
|
};
|
|
|
|
node1 = { pkgs, ... }: {
|
|
virtualisation.vlans = [ 1 ];
|
|
networking = {
|
|
useDHCP = false;
|
|
useNetworkd = true;
|
|
};
|
|
|
|
services.openssh.enable = true;
|
|
users.users.root.openssh.authorizedKeys.keys = [ snakeOilPublicKey ];
|
|
|
|
systemd.network = {
|
|
enable = true;
|
|
|
|
networks."10-eth1" = {
|
|
matchConfig.Name = "eth1";
|
|
linkConfig.RequiredForOnline = "no";
|
|
networkConfig = {
|
|
Address = "192.168.1.2";
|
|
IPForward = "yes";
|
|
};
|
|
};
|
|
};
|
|
};
|
|
|
|
node2 = { pkgs, ... }: {
|
|
virtualisation.vlans = [ 2 ];
|
|
networking = {
|
|
useDHCP = false;
|
|
useNetworkd = true;
|
|
};
|
|
|
|
systemd.network = {
|
|
enable = true;
|
|
|
|
networks."10-eth2" = {
|
|
matchConfig.Name = "eth2";
|
|
linkConfig.RequiredForOnline = "no";
|
|
networkConfig = {
|
|
Address = "192.168.2.3";
|
|
IPForward = "yes";
|
|
};
|
|
};
|
|
};
|
|
};
|
|
|
|
node3 = { pkgs, ... }: {
|
|
virtualisation.vlans = [ 2 ];
|
|
networking = {
|
|
useDHCP = false;
|
|
useNetworkd = true;
|
|
};
|
|
|
|
systemd.network = {
|
|
enable = true;
|
|
|
|
networks."10-eth2" = {
|
|
matchConfig.Name = "eth2";
|
|
linkConfig.RequiredForOnline = "no";
|
|
networkConfig = {
|
|
Address = "192.168.2.4";
|
|
IPForward = "yes";
|
|
};
|
|
};
|
|
};
|
|
};
|
|
};
|
|
|
|
testScript = ''
|
|
import json
|
|
|
|
def compare(raw_json, to_compare):
|
|
data = json.loads(raw_json)
|
|
assert len(raw_json) >= len(to_compare)
|
|
for i, row in enumerate(to_compare):
|
|
actual = data[i]
|
|
assert len(row.keys()) > 0
|
|
for key, value in row.items():
|
|
assert value == actual[key], f"""
|
|
In entry {i}, value {key}: got: {actual[key]}, expected {value}
|
|
"""
|
|
|
|
|
|
start_all()
|
|
|
|
client.wait_for_unit("network.target")
|
|
node1.wait_for_unit("network.target")
|
|
node2.wait_for_unit("network.target")
|
|
node3.wait_for_unit("network.target")
|
|
|
|
client_ipv4_table = """
|
|
192.168.1.2 dev vrf1 proto static metric 100\x20
|
|
192.168.2.3 dev vrf2 proto static metric 100
|
|
""".strip()
|
|
vrf1_table = """
|
|
192.168.1.0/24 dev eth1 proto kernel scope link src 192.168.1.1\x20
|
|
local 192.168.1.1 dev eth1 proto kernel scope host src 192.168.1.1\x20
|
|
broadcast 192.168.1.255 dev eth1 proto kernel scope link src 192.168.1.1
|
|
""".strip()
|
|
vrf2_table = """
|
|
192.168.2.0/24 dev eth2 proto kernel scope link src 192.168.2.1\x20
|
|
local 192.168.2.1 dev eth2 proto kernel scope host src 192.168.2.1\x20
|
|
broadcast 192.168.2.255 dev eth2 proto kernel scope link src 192.168.2.1
|
|
""".strip()
|
|
# editorconfig-checker-enable
|
|
|
|
# Check that networkd properly configures the main routing table
|
|
# and the routing tables for the VRF.
|
|
with subtest("check vrf routing tables"):
|
|
compare(
|
|
client.succeed("ip --json -4 route list"),
|
|
[
|
|
{"dst": "192.168.1.2", "dev": "vrf1", "metric": 100},
|
|
{"dst": "192.168.2.3", "dev": "vrf2", "metric": 100}
|
|
]
|
|
)
|
|
compare(
|
|
client.succeed("ip --json -4 route list table 23"),
|
|
[
|
|
{"dst": "192.168.1.0/24", "dev": "eth1", "prefsrc": "192.168.1.1"},
|
|
{"type": "local", "dst": "192.168.1.1", "dev": "eth1", "prefsrc": "192.168.1.1"},
|
|
{"type": "broadcast", "dev": "eth1", "prefsrc": "192.168.1.1", "dst": "192.168.1.255"}
|
|
]
|
|
)
|
|
compare(
|
|
client.succeed("ip --json -4 route list table 42"),
|
|
[
|
|
{"dst": "192.168.2.0/24", "dev": "eth2", "prefsrc": "192.168.2.1"},
|
|
{"type": "local", "dst": "192.168.2.1", "dev": "eth2", "prefsrc": "192.168.2.1"},
|
|
{"type": "broadcast", "dev": "eth2", "prefsrc": "192.168.2.1", "dst": "192.168.2.255"}
|
|
]
|
|
)
|
|
|
|
# Ensure that other nodes are reachable via ICMP through the VRF.
|
|
with subtest("icmp through vrf works"):
|
|
client.succeed("ping -c5 192.168.1.2")
|
|
client.succeed("ping -c5 192.168.2.3")
|
|
|
|
# Test whether TCP through a VRF IP is possible.
|
|
with subtest("tcp traffic through vrf works"):
|
|
node1.wait_for_open_port(22)
|
|
client.succeed(
|
|
"cat ${snakeOilPrivateKey} > privkey.snakeoil"
|
|
)
|
|
client.succeed("chmod 600 privkey.snakeoil")
|
|
client.succeed(
|
|
"ulimit -l 2048; ip vrf exec vrf1 ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no -i privkey.snakeoil root@192.168.1.2 true"
|
|
)
|
|
|
|
# Only configured routes through the VRF from the main routing table should
|
|
# work. Additional IPs are only reachable when binding to the vrf interface.
|
|
with subtest("only routes from main routing table work by default"):
|
|
client.fail("ping -c5 192.168.2.4")
|
|
client.succeed("ping -I vrf2 -c5 192.168.2.4")
|
|
|
|
client.shutdown()
|
|
node1.shutdown()
|
|
node2.shutdown()
|
|
node3.shutdown()
|
|
'';
|
|
})
|