2020-09-16 02:00:22 +02:00
|
|
|
#!/usr/bin/python3
|
|
|
|
|
|
|
|
import unittest
|
|
|
|
import sys
|
|
|
|
|
|
|
|
sys.path.append('../util')
|
|
|
|
import iwd
|
|
|
|
from iwd import IWD
|
|
|
|
from iwd import PSKAgent
|
|
|
|
from iwd import NetworkType
|
2020-09-17 23:32:28 +02:00
|
|
|
from hostapd import HostapdCLI
|
2020-09-16 02:00:22 +02:00
|
|
|
import testutil
|
|
|
|
from config import ctx
|
2022-06-16 02:02:24 +02:00
|
|
|
import os
|
2022-06-16 02:02:27 +02:00
|
|
|
import socket
|
2020-09-16 02:00:22 +02:00
|
|
|
|
|
|
|
class Test(unittest.TestCase):
|
|
|
|
|
|
|
|
def test_connection_success(self):
|
2022-03-30 22:23:14 +02:00
|
|
|
def check_addr(device):
|
|
|
|
try:
|
2022-06-16 02:02:24 +02:00
|
|
|
# DHCPv6 addresses always have a prefix length of 128 bits, the actual
|
|
|
|
# subnet's prefix length is in the route.
|
|
|
|
testutil.test_ip_address_match(device.name, '3ffe:501:ffff:100::1', 128, 112)
|
2022-03-30 22:23:14 +02:00
|
|
|
except:
|
|
|
|
return False
|
|
|
|
|
|
|
|
return True
|
|
|
|
|
2020-12-10 22:22:10 +01:00
|
|
|
wd = IWD(True)
|
2020-09-16 02:00:22 +02:00
|
|
|
|
|
|
|
psk_agent = PSKAgent("secret123")
|
|
|
|
wd.register_psk_agent(psk_agent)
|
|
|
|
|
|
|
|
devices = wd.list_devices(1)
|
|
|
|
device = devices[0]
|
|
|
|
|
|
|
|
ordered_network = device.get_ordered_network('ssidTKIP')
|
|
|
|
|
|
|
|
self.assertEqual(ordered_network.type, NetworkType.psk)
|
|
|
|
|
|
|
|
condition = 'not obj.connected'
|
|
|
|
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
|
|
|
|
|
|
|
ordered_network.network_object.connect()
|
|
|
|
|
|
|
|
condition = 'obj.state == DeviceState.connected'
|
|
|
|
wd.wait_for_object_condition(device, condition)
|
|
|
|
|
|
|
|
testutil.test_iface_operstate()
|
|
|
|
testutil.test_ifaces_connected()
|
|
|
|
|
2022-06-16 02:02:24 +02:00
|
|
|
testutil.test_ip_address_match(device.name, '192.168.1.10', 17, 24)
|
2022-03-30 22:23:14 +02:00
|
|
|
ctx.non_block_wait(check_addr, 10, device,
|
|
|
|
exception=Exception("IPv6 address was not set"))
|
2021-11-08 12:28:37 +01:00
|
|
|
|
2022-06-16 02:02:27 +02:00
|
|
|
ifname = str(device.name)
|
|
|
|
router_ll_addr = [addr for addr, _, _ in testutil.get_addrs6(self.hapd.ifname) if addr[0:2] == b'\xfe\x80'][0]
|
|
|
|
# Since we're in an isolated VM with freshly created interfaces we know any routes
|
|
|
|
# will have been created by IWD and don't have to allow for pre-existing routes
|
|
|
|
# in the table.
|
|
|
|
# Flags: 1=RTF_UP, 2=RTF_GATEWAY
|
|
|
|
expected_routes4 = {
|
|
|
|
testutil.RouteInfo(gw=socket.inet_pton(socket.AF_INET, '192.168.1.1'),
|
|
|
|
flags=3, ifname=ifname),
|
|
|
|
testutil.RouteInfo(dst=socket.inet_pton(socket.AF_INET, '192.168.0.0'), plen=17,
|
|
|
|
flags=1, ifname=ifname)
|
|
|
|
}
|
|
|
|
expected_routes6 = {
|
|
|
|
# Default router
|
|
|
|
testutil.RouteInfo(gw=router_ll_addr, flags=3, ifname=ifname),
|
|
|
|
# On-link prefix
|
|
|
|
testutil.RouteInfo(dst=socket.inet_pton(socket.AF_INET6, '3ffe:501:ffff:100::'), plen=72,
|
|
|
|
flags=1, ifname=ifname),
|
2022-06-16 02:02:31 +02:00
|
|
|
# Router for an off-link prefix, medium preference
|
|
|
|
testutil.RouteInfo(dst=socket.inet_pton(socket.AF_INET6, '3ffe:501:ffff:300::'), plen=64,
|
|
|
|
gw=router_ll_addr, flags=3, ifname=ifname),
|
|
|
|
# Router for an off-link prefix, high preference
|
|
|
|
testutil.RouteInfo(dst=socket.inet_pton(socket.AF_INET6, '3ffe:501:ffff:400::'), plen=65,
|
|
|
|
gw=router_ll_addr, flags=3, ifname=ifname),
|
|
|
|
# Router for an off-link prefix, low preference
|
|
|
|
testutil.RouteInfo(dst=socket.inet_pton(socket.AF_INET6, '3ffe:501:ffff:500::'), plen=66,
|
|
|
|
gw=router_ll_addr, flags=3, ifname=ifname)
|
2022-06-16 02:02:27 +02:00
|
|
|
}
|
|
|
|
self.maxDiff = None
|
|
|
|
self.assertEqual(expected_routes4, set(testutil.get_routes4(ifname)))
|
|
|
|
self.assertEqual(expected_routes6, set(testutil.get_routes6(ifname)))
|
|
|
|
|
2022-06-16 02:02:28 +02:00
|
|
|
rclog = open('/tmp/resolvconf.log', 'r')
|
|
|
|
entries = rclog.readlines()
|
|
|
|
rclog.close()
|
2022-06-23 01:02:19 +02:00
|
|
|
expected_rclog = ['-a %s.dns\n' % ifname, 'nameserver 192.168.1.2\n', 'nameserver 3ffe:501:ffff:100::2\n']
|
2022-06-16 02:02:28 +02:00
|
|
|
# Every real resolvconf -a run overwrites the previous settings. Check the last three lines
|
|
|
|
# of our log since we care about the end result here.
|
|
|
|
self.assertEqual(expected_rclog, entries[-3:])
|
|
|
|
|
2020-09-16 02:00:22 +02:00
|
|
|
device.disconnect()
|
|
|
|
|
|
|
|
condition = 'not obj.connected'
|
|
|
|
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
|
|
|
|
|
|
|
wd.unregister_psk_agent(psk_agent)
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def setUpClass(cls):
|
2021-11-08 12:28:37 +01:00
|
|
|
def remove_lease4():
|
2021-08-13 22:26:09 +02:00
|
|
|
try:
|
|
|
|
os.remove('/tmp/dhcpd.leases')
|
|
|
|
os.remove('/tmp/dhcpd.leases~')
|
|
|
|
except:
|
|
|
|
pass
|
2021-11-08 12:28:37 +01:00
|
|
|
def remove_lease6():
|
|
|
|
try:
|
|
|
|
os.remove('/tmp/dhcpd6.leases')
|
|
|
|
os.remove('/tmp/dhcpd6.leases~')
|
|
|
|
except:
|
|
|
|
pass
|
2021-08-13 22:26:09 +02:00
|
|
|
|
2020-09-17 23:32:28 +02:00
|
|
|
hapd = HostapdCLI()
|
2022-06-16 02:02:27 +02:00
|
|
|
cls.hapd = hapd
|
2020-09-16 02:00:22 +02:00
|
|
|
# TODO: This could be moved into test-runner itself if other tests ever
|
|
|
|
# require this functionality (p2p, FILS, etc.). Since its simple
|
|
|
|
# enough it can stay here for now.
|
2022-06-16 02:02:24 +02:00
|
|
|
ctx.start_process(['ip', 'addr','add', '192.168.1.1/255.255.128.0',
|
2022-03-30 22:23:14 +02:00
|
|
|
'dev', hapd.ifname,]).wait()
|
2021-08-26 00:17:26 +02:00
|
|
|
ctx.start_process(['touch', '/tmp/dhcpd.leases']).wait()
|
2020-12-10 22:22:10 +01:00
|
|
|
cls.dhcpd_pid = ctx.start_process(['dhcpd', '-f', '-cf', '/tmp/dhcpd.conf',
|
|
|
|
'-lf', '/tmp/dhcpd.leases',
|
2021-11-08 12:28:37 +01:00
|
|
|
hapd.ifname], cleanup=remove_lease4)
|
|
|
|
|
2022-06-16 02:02:24 +02:00
|
|
|
ctx.start_process(['ip', 'addr', 'add', '3ffe:501:ffff:100::1/72',
|
2022-03-30 22:23:14 +02:00
|
|
|
'dev', hapd.ifname]).wait()
|
2021-11-08 12:28:37 +01:00
|
|
|
ctx.start_process(['touch', '/tmp/dhcpd6.leases']).wait()
|
|
|
|
cls.dhcpd6_pid = ctx.start_process(['dhcpd', '-6', '-f', '-cf', '/tmp/dhcpd-v6.conf',
|
|
|
|
'-lf', '/tmp/dhcpd6.leases',
|
|
|
|
hapd.ifname], cleanup=remove_lease6)
|
|
|
|
ctx.start_process(['sysctl', 'net.ipv6.conf.' + hapd.ifname + '.forwarding=1']).wait()
|
2022-06-16 02:02:27 +02:00
|
|
|
# Send out Router Advertisements telling clients to use DHCPv6.
|
|
|
|
# Note trying to send the RAs from the router's global IPv6 address by adding a
|
|
|
|
# "AdvRASrcAddress { 3ffe:501:ffff:100::1; };" line will fail because the client
|
|
|
|
# and the router interfaces are in the same namespace and Linux won't allow routes
|
|
|
|
# with a non-link-local gateway address that is present on another interface in the
|
|
|
|
# same namespace.
|
2021-11-08 12:28:37 +01:00
|
|
|
config = open('/tmp/radvd.conf', 'w')
|
2022-06-16 02:02:27 +02:00
|
|
|
config.write('interface ' + hapd.ifname + ''' {
|
|
|
|
AdvSendAdvert on;
|
|
|
|
AdvManagedFlag on;
|
|
|
|
prefix 3ffe:501:ffff:100::/72 { AdvAutonomous off; };
|
2022-06-16 02:02:31 +02:00
|
|
|
route 3ffe:501:ffff:300::/64 {};
|
|
|
|
route 3ffe:501:ffff:400::/65 { AdvRoutePreference low; };
|
|
|
|
route 3ffe:501:ffff:500::/66 { AdvRoutePreference high; };
|
2022-06-16 02:02:27 +02:00
|
|
|
};''')
|
2021-11-08 12:28:37 +01:00
|
|
|
config.close()
|
2021-11-10 16:17:17 +01:00
|
|
|
cls.radvd_pid = ctx.start_process(['radvd', '-n', '-d5', '-p', '/tmp/radvd.pid', '-C', '/tmp/radvd.conf'])
|
2020-09-16 02:00:22 +02:00
|
|
|
|
2022-06-16 02:02:28 +02:00
|
|
|
cls.orig_path = os.environ['PATH']
|
|
|
|
os.environ['PATH'] = '/tmp/test-bin:' + os.environ['PATH']
|
|
|
|
IWD.copy_to_storage('resolvconf', '/tmp/test-bin')
|
|
|
|
|
2020-09-16 02:00:22 +02:00
|
|
|
@classmethod
|
|
|
|
def tearDownClass(cls):
|
|
|
|
IWD.clear_storage()
|
2021-02-25 23:00:53 +01:00
|
|
|
ctx.stop_process(cls.dhcpd_pid)
|
|
|
|
cls.dhcpd_pid = None
|
2021-11-08 12:28:37 +01:00
|
|
|
ctx.stop_process(cls.dhcpd6_pid)
|
|
|
|
cls.dhcpd6_pid = None
|
|
|
|
ctx.stop_process(cls.radvd_pid)
|
|
|
|
cls.radvd_pid = None
|
2022-06-16 02:02:28 +02:00
|
|
|
os.system('rm -rf /tmp/radvd.conf /tmp/resolvconf.log /tmp/test-bin')
|
|
|
|
os.environ['PATH'] = cls.orig_path
|
2020-09-16 02:00:22 +02:00
|
|
|
|
|
|
|
if __name__ == '__main__':
|
|
|
|
unittest.main(exit=True)
|