summaryrefslogtreecommitdiffstats
path: root/test (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Merge pull request #12478 from yuwata/wireguard-fwmarkYu Watanabe2019-05-071-0/+1
|\ | | | | network: rename WireGuard.FwMark -> FirewallMark
| * network: rename WireGuard.FwMark -> FirewallMarkYu Watanabe2019-05-041-0/+1
| | | | | | | | For the consistency with FirewallMark= in [RoutingPolicyRule] section.
* | test-network: add a test for LinkLocalAddressing=fallbackYu Watanabe2019-05-042-2/+46
|/
* test-network: add tests for BridgeFDB.Destination=Yu Watanabe2019-05-033-6/+32
|
* networkd: Add support to configure destination address for bridge FDBSusant Sahani2019-05-031-0/+1
| | | | | | | | | | | | | | | | | | | | | | Closes #5145. Example conf: ``` [Match] Name=vxlan1309 [BridgeFDB] MACAddress=00:00:00:00:00:00 Destination=10.0.0.2 [BridgeFDB] MACAddress=00:00:00:00:00:00 Destination=10.0.0.4 [BridgeFDB] MACAddress=00:00:00:00:00:00 Destination=10.0.0.5 ```
* codespell: fix spelling errorsBen Boeckel2019-04-297-8/+8
|
* test-network: fix invalid assertionsYu Watanabe2019-04-251-23/+23
|
* test: don't timeout while waiting for other test unitsFrantisek Sumsal2019-04-151-1/+1
| | | | | | | | The main testsuite service timeouts sporadically when waiting for other testsuite-* units. As the test timeout is handled by the "test executor" (test.sh), let's disable it for the service. This should (hopefully) fix the test flakiness.
* service: handle abort stops with dedicated timeoutJan Klötzke2019-04-121-0/+2
| | | | | | | | | | | | | | | | | When shooting down a service with SIGABRT the user might want to have a much longer stop timeout than on regular stops/shutdowns. Especially in the face of short stop timeouts the time might not be sufficient to write huge core dumps before the service is killed. This commit adds a dedicated (Default)TimeoutAbortSec= timer that is used when stopping a service via SIGABRT. In all other cases the existing TimeoutStopSec= is used. The timer value is unset by default to skip the special handling and use TimeoutStopSec= for state 'stop-watchdog' to keep the old behaviour. If the service is in state 'stop-watchdog' and the service should be stopped explicitly we still go to 'stop-sigterm' and re-apply the usual TimeoutStopSec= timeout.
* cgroup: Implement default propagation of MemoryLow with DefaultMemoryLowChris Down2019-04-1211-0/+75
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | In cgroup v2 we have protection tunables -- currently MemoryLow and MemoryMin (there will be more in future for other resources, too). The design of these protection tunables requires not only intermediate cgroups to propagate protections, but also the units at the leaf of that resource's operation to accept it (by setting MemoryLow or MemoryMin). This makes sense from an low-level API design perspective, but it's a good idea to also have a higher-level abstraction that can, by default, propagate these resources to children recursively. In this patch, this happens by having descendants set memory.low to N if their ancestor has DefaultMemoryLow=N -- assuming they don't set a separate MemoryLow value. Any affected unit can opt out of this propagation by manually setting `MemoryLow` to some value in its unit configuration. A unit can also stop further propagation by setting `DefaultMemoryLow=` with no argument. This removes further propagation in the subtree, but has no effect on the unit itself (for that, use `MemoryLow=0`). Our use case in production is simplifying the configuration of machines which heavily rely on memory protection tunables, but currently require tweaking a huge number of unit files to make that a reality. This directive makes that significantly less fragile, and decreases the risk of misconfiguration. After this patch is merged, I will implement DefaultMemoryMin= using the same principles.
* Merge pull request #12222 from yuwata/macsecLennart Poettering2019-04-127-0/+139
|\ | | | | network: introduce MACsec
| * test-network: add tests for MACsecYu Watanabe2019-04-125-0/+117
| |
| * network: add MACsecTransmitAssociation.UseForEncoding= settingYu Watanabe2019-04-121-0/+1
| |
| * network: add MACsec*Association.Activate= settingYu Watanabe2019-04-121-0/+2
| |
| * network: add MACsec*Association.KeyFile= settingYu Watanabe2019-04-121-0/+2
| |
| * network: Introduce MACsecSusant Sahani2019-04-122-0/+17
| | | | | | | | | | | | | | | | | | | | | | | | Media Access Control Security (MACsec) is an 802.1AE IEEE industry-standard security technology that provides secure communication for all traffic on Ethernet links. MACsec provides point-to-point security on Ethernet links between directly connected nodes and is capable of identifying and preventing most security threats, including denial of service, intrusion, man-in-the-middle, masquerading, passive wiretapping, and playback attacks. Closes #5754
* | scripts: use 4 space indentationZbigniew Jędrzejewski-Szmek2019-04-1251-477/+398
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | We had all kinds of indentation: 2 sp, 3 sp, 4 sp, 8 sp, and mixed. 4 sp was the most common, in particular the majority of scripts under test/ used that. Let's standarize on 4 sp, because many commandlines are long and there's a lot of nesting, and with 8sp indentation less stuff fits. 4 sp also seems to be the default indentation, so this will make it less likely that people will mess up if they don't load the editor config. (I think people often use vi, and vi has no support to load project-wide configuration automatically. We distribute a .vimrc file, but it is not loaded by default, and even the instructions in it seem to discourage its use for security reasons.) Also remove the few vim config lines that were left. We should either have them on all files, or none. Also remove some strange stuff like '#!/bin/env bash', yikes.
* | test: filter out messages when stripping binariesZbigniew Jędrzejewski-Szmek2019-04-121-1/+4
|/ | | | We would get an error for every script, which is just noise.
* Merge pull request #12037 from poettering/oom-stateLennart Poettering2019-04-113-0/+92
|\ | | | | add cgroupv2 oom killer event handling to service management
| * test: add test case for new OOM logicLennart Poettering2019-04-093-0/+92
| |
* | Merge pull request #12279 from keszybz/sd-bus-long-signaturesLennart Poettering2019-04-111-0/+0
|\ \ | | | | | | sd-bus: properly handle messages with overlong signatures
| * | bus-message: validate signature in gvariant messagesZbigniew Jędrzejewski-Szmek2019-04-111-0/+0
| | | | | | | | | | | | | | | | | | We would accept a message with 40k signature and spend a lot of time iterating over the nested arrays. Let's just reject it early, as we do for !gvariant messages.
* | | test: make directory for drop-in configYu Watanabe2019-04-111-0/+1
|/ / | | | | | | Follow-up for a2fbac5875776e9e327f30cf2a8b3070a4c1552a.
* | Merge pull request #12270 from yuwata/test-set-longer-timeoutZbigniew Jędrzejewski-Szmek2019-04-112-2/+8
|\ \ | | | | | | test: set longer timeout
| * | test: set longer watchdog timeout for timedatedYu Watanabe2019-04-101-0/+6
| | |
| * | test: set longer timeout for 'udevadm control'Yu Watanabe2019-04-101-2/+2
| |/
* / network: fix use-of-uninitialized-value or null dereferenceYu Watanabe2019-04-102-0/+10
|/ | | | | | This fixes a bug introduced by 6ef5c881dd5568f08dc35013e24f7d857f36b207. Fixes oss-fuzz#14157 and oss-fuzz#14158.
* Merge pull request #12223 from yuwata/network-wireguard-preshared-key-fileZbigniew Jędrzejewski-Szmek2019-04-095-2/+10
|\ | | | | network: add PresharedKeyFile= setting and make reading key file failure fatal
| * test-network: add tests for WireGuardPeer.PresharedKey= and PresharedKeyFile=Yu Watanabe2019-04-093-1/+9
| |
| * network: add WireGuardPeer.PresharedKeyFile= settingYu Watanabe2019-04-091-0/+1
| |
| * network: make reading PrivateKeyFile= failure always fatalYu Watanabe2019-04-091-1/+0
| | | | | | | | This also refactor wireguard_read_key_file().
* | calendarspec: fix possible integer overflowYu Watanabe2019-04-071-0/+1
|/ | | | | Fixes oss-fuzz#14108. https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14108
* test: use newer verb to set log levelsZbigniew Jędrzejewski-Szmek2019-04-035-14/+14
|
* core: expose SUID/SGID restriction as new unit setting RestrictSUIDSGID=Lennart Poettering2019-04-021-0/+1
|
* Merge pull request #12013 from yuwata/fix-switchroot-11997Zbigniew Jędrzejewski-Szmek2019-04-023-0/+62
|\ | | | | core: on switching root do not emit device state change based on enumeration results
| * test: add a testcase for device plugged -> dead -> plugged bugYu Watanabe2019-03-153-0/+62
| |
* | test: add tests for new .timer unitsLennart Poettering2019-04-023-0/+87
| |
* | Merge pull request #12160 from yuwata/wait-online-allow-configuringYu Watanabe2019-04-013-3/+32
|\ \ | | | | | | wait-online: add --any option
| * | test-network: add tests for --any option of wait-onlineYu Watanabe2019-04-013-1/+31
| | |
| * | test-network: fix timeout argument for wait_online()Yu Watanabe2019-04-011-2/+1
| | |
* | | test-network: add tests for FooOverUDP tunnelsYu Watanabe2019-04-017-0/+113
| | |
* | | test-network: add more tests for SerializeTunneledPackets=, Key=, and friendsYu Watanabe2019-04-016-1/+39
| | |
* | | test: set longer StartLimitIntervalSec= and fewer StartLimitBurst=Yu Watanabe2019-04-011-0/+2
| | | | | | | | | | | | | | | Some test environment may be in heavy load. In that case, rate limit never hit, and the test fails...
* | | test-network: add test for NetDev.Name= conflictYu Watanabe2019-04-012-1/+8
| | |
* | | test-network: add test for drop-in [WireGuardPeer] sectionYu Watanabe2019-04-013-14/+17
|/ / | | | | | | | | This also merges the two wireguard tests, and use wait_online() to speed up the test.
* | Merge pull request #12147 from yuwata/network-gre-key-12144Yu Watanabe2019-03-314-3/+10
|\ \ | | | | | | network: make GRE and GRETAP support Key= or friends
| * | test-network: test stacked erspan tunnelsYu Watanabe2019-03-304-3/+10
| | |
* | | test-network: merge tests for [Route] sectionYu Watanabe2019-03-298-159/+72
| | |
* | | test-network: use wait_online() in test_sysctl_disable_ipv6()Yu Watanabe2019-03-291-2/+4
| | |
* | | test-network: use wait_online() in test_sysctl()Yu Watanabe2019-03-292-1/+3
| | | | | | | | | | | | This also disables IPv6AcceptRA= to speed up the test.