123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656 |
- ;;; GNU Guix --- Functional package management for GNU
- ;;; Copyright © 2017 Thomas Danckaert <post@thomasdanckaert.be>
- ;;; Copyright © 2017, 2020 Marius Bakke <marius@gnu.org>
- ;;; Copyright © 2018 Chris Marusich <cmmarusich@gmail.com>
- ;;; Copyright © 2018 Arun Isaac <arunisaac@systemreboot.net>
- ;;; Copyright © 2021 Maxime Devos <maximedevos@telenet.be>
- ;;;
- ;;; This file is part of GNU Guix.
- ;;;
- ;;; GNU Guix is free software; you can redistribute it and/or modify it
- ;;; under the terms of the GNU General Public License as published by
- ;;; the Free Software Foundation; either version 3 of the License, or (at
- ;;; your option) any later version.
- ;;;
- ;;; GNU Guix is distributed in the hope that it will be useful, but
- ;;; WITHOUT ANY WARRANTY; without even the implied warranty of
- ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- ;;; GNU General Public License for more details.
- ;;;
- ;;; You should have received a copy of the GNU General Public License
- ;;; along with GNU Guix. If not, see <http://www.gnu.org/licenses/>.
- (define-module (gnu tests networking)
- #:use-module (gnu tests)
- #:use-module (gnu system)
- #:use-module (gnu system vm)
- #:use-module (gnu services)
- #:use-module (gnu services base)
- #:use-module (gnu services networking)
- #:use-module (guix gexp)
- #:use-module (guix store)
- #:use-module (guix monads)
- #:use-module (guix modules)
- #:use-module (gnu packages bash)
- #:use-module (gnu packages linux)
- #:use-module (gnu packages networking)
- #:use-module (gnu packages guile)
- #:use-module (gnu services shepherd)
- #:use-module (ice-9 match)
- #:export (%test-inetd %test-openvswitch %test-dhcpd %test-tor %test-iptables
- %test-ipfs))
- (define %inetd-os
- ;; Operating system with 2 inetd services.
- (simple-operating-system
- (service dhcp-client-service-type)
- (service inetd-service-type
- (inetd-configuration
- (entries (list
- (inetd-entry
- (name "echo")
- (socket-type 'stream)
- (protocol "tcp")
- (wait? #f)
- (user "root"))
- (inetd-entry
- (name "dict")
- (socket-type 'stream)
- (protocol "tcp")
- (wait? #f)
- (user "root")
- (program (file-append bash
- "/bin/bash"))
- (arguments
- (list "bash" (plain-file "my-dict.sh" "\
- while read line
- do
- if [[ $line =~ ^DEFINE\\ (.*)$ ]]
- then
- case ${BASH_REMATCH[1]} in
- Guix)
- echo GNU Guix is a package management tool for the GNU system.
- ;;
- G-expression)
- echo Like an S-expression but with a G.
- ;;
- *)
- echo NO DEFINITION FOUND
- ;;
- esac
- else
- echo ERROR
- fi
- done" ))))))))))
- (define* (run-inetd-test)
- "Run tests in %INETD-OS, where the inetd service provides an echo service on
- port 7, and a dict service on port 2628."
- (define os
- (marionette-operating-system %inetd-os))
- (define vm
- (virtual-machine
- (operating-system os)
- (port-forwardings `((8007 . 7)
- (8628 . 2628)))))
- (define test
- (with-imported-modules '((gnu build marionette))
- #~(begin
- (use-modules (ice-9 rdelim)
- (srfi srfi-64)
- (gnu build marionette))
- (define marionette
- (make-marionette (list #$vm)))
- (mkdir #$output)
- (chdir #$output)
- (test-begin "inetd")
- ;; Make sure the PID file is created.
- (test-assert "PID file"
- (marionette-eval
- '(file-exists? "/var/run/inetd.pid")
- marionette))
- ;; Test the echo service.
- (test-equal "echo response"
- "Hello, Guix!"
- (let ((echo (socket PF_INET SOCK_STREAM 0))
- (addr (make-socket-address AF_INET INADDR_LOOPBACK 8007)))
- (connect echo addr)
- (display "Hello, Guix!\n" echo)
- (let ((response (read-line echo)))
- (close echo)
- response)))
- ;; Test the dict service
- (test-equal "dict response"
- "GNU Guix is a package management tool for the GNU system."
- (let ((dict (socket PF_INET SOCK_STREAM 0))
- (addr (make-socket-address AF_INET INADDR_LOOPBACK 8628)))
- (connect dict addr)
- (display "DEFINE Guix\n" dict)
- (let ((response (read-line dict)))
- (close dict)
- response)))
- (test-end)
- (exit (= (test-runner-fail-count (test-runner-current)) 0)))))
- (gexp->derivation "inetd-test" test))
- (define %test-inetd
- (system-test
- (name "inetd")
- (description "Connect to a host with an INETD server.")
- (value (run-inetd-test))))
- ;;;
- ;;; Open vSwitch
- ;;;
- (define setup-openvswitch
- #~(let ((ovs-vsctl (lambda (str)
- (zero? (apply system*
- #$(file-append openvswitch "/bin/ovs-vsctl")
- (string-tokenize str)))))
- (add-native-port (lambda (if)
- (string-append "--may-exist add-port br0 " if
- " vlan_mode=native-untagged"
- " -- set Interface " if
- " type=internal"))))
- (and (ovs-vsctl "--may-exist add-br br0")
- ;; Connect eth0 as an "untagged" port (no VLANs).
- (ovs-vsctl "--may-exist add-port br0 eth0 vlan_mode=native-untagged")
- (ovs-vsctl (add-native-port "ovs0")))))
- (define openvswitch-configuration-service
- (simple-service 'openvswitch-configuration shepherd-root-service-type
- (list (shepherd-service
- (provision '(openvswitch-configuration))
- (requirement '(vswitchd))
- (start #~(lambda ()
- #$setup-openvswitch))
- (respawn? #f)))))
- (define %openvswitch-os
- (operating-system
- (inherit (simple-operating-system
- (static-networking-service "ovs0" "10.1.1.1"
- #:netmask "255.255.255.252"
- #:requirement '(openvswitch-configuration))
- (service openvswitch-service-type)
- openvswitch-configuration-service))
- ;; Ensure the interface name does not change depending on the driver.
- (kernel-arguments (cons "net.ifnames=0" %default-kernel-arguments))))
- (define (run-openvswitch-test)
- (define os
- (marionette-operating-system %openvswitch-os
- #:imported-modules '((gnu services herd))))
- (define test
- (with-imported-modules '((gnu build marionette))
- #~(begin
- (use-modules (gnu build marionette)
- (ice-9 popen)
- (ice-9 rdelim)
- (srfi srfi-64))
- (define marionette
- (make-marionette (list #$(virtual-machine os))))
- (mkdir #$output)
- (chdir #$output)
- (test-begin "openvswitch")
- ;; Make sure the bridge is created.
- (test-assert "br0 exists"
- (marionette-eval
- '(zero? (system* #$(file-append openvswitch "/bin/ovs-vsctl")
- "br-exists" "br0"))
- marionette))
- ;; Make sure eth0 is connected to the bridge.
- (test-equal "eth0 is connected to br0"
- "br0"
- (marionette-eval
- '(begin
- (use-modules (ice-9 popen) (ice-9 rdelim))
- (let* ((port (open-pipe*
- OPEN_READ
- (string-append #$openvswitch "/bin/ovs-vsctl")
- "port-to-br" "eth0"))
- (output (read-line port)))
- (close-pipe port)
- output))
- marionette))
- ;; Make sure the virtual interface got a static IP.
- (test-assert "networking has started on ovs0"
- (marionette-eval
- '(begin
- (use-modules (gnu services herd)
- (srfi srfi-1))
- (live-service-running
- (find (lambda (live)
- (memq 'networking-ovs0
- (live-service-provision live)))
- (current-services))))
- marionette))
- (test-end)
- (exit (= (test-runner-fail-count (test-runner-current)) 0)))))
- (gexp->derivation "openvswitch-test" test))
- (define %test-openvswitch
- (system-test
- (name "openvswitch")
- (description "Test a running OpenvSwitch configuration.")
- (value (run-openvswitch-test))))
- ;;;
- ;;; DHCP Daemon
- ;;;
- (define minimal-dhcpd-v4-config-file
- (plain-file "dhcpd.conf"
- "\
- default-lease-time 600;
- max-lease-time 7200;
- subnet 192.168.1.0 netmask 255.255.255.0 {
- range 192.168.1.100 192.168.1.200;
- option routers 192.168.1.1;
- option domain-name-servers 192.168.1.2, 192.168.1.3;
- option domain-name \"dummy.domain.name.abc123xyz\";
- }
- "))
- (define dhcpd-v4-configuration
- (dhcpd-configuration
- (config-file minimal-dhcpd-v4-config-file)
- (version "4")
- (interfaces '("ens3"))))
- (define %dhcpd-os
- (simple-operating-system
- (static-networking-service "ens3" "192.168.1.4"
- #:netmask "255.255.255.0"
- #:gateway "192.168.1.1"
- #:name-servers '("192.168.1.2" "192.168.1.3"))
- (service dhcpd-service-type dhcpd-v4-configuration)))
- (define (run-dhcpd-test)
- (define os
- (marionette-operating-system %dhcpd-os
- #:imported-modules '((gnu services herd))))
- (define test
- (with-imported-modules '((gnu build marionette))
- #~(begin
- (use-modules (gnu build marionette)
- (ice-9 popen)
- (ice-9 rdelim)
- (srfi srfi-64))
- (define marionette
- (make-marionette (list #$(virtual-machine os))))
- (mkdir #$output)
- (chdir #$output)
- (test-begin "dhcpd")
- (test-assert "pid file exists"
- (marionette-eval
- '(file-exists?
- #$(dhcpd-configuration-pid-file dhcpd-v4-configuration))
- marionette))
- (test-assert "lease file exists"
- (marionette-eval
- '(file-exists?
- #$(dhcpd-configuration-lease-file dhcpd-v4-configuration))
- marionette))
- (test-assert "run directory exists"
- (marionette-eval
- '(file-exists?
- #$(dhcpd-configuration-run-directory dhcpd-v4-configuration))
- marionette))
- (test-assert "dhcpd is alive"
- (marionette-eval
- '(begin
- (use-modules (gnu services herd)
- (srfi srfi-1))
- (live-service-running
- (find (lambda (live)
- (memq 'dhcpv4-daemon
- (live-service-provision live)))
- (current-services))))
- marionette))
- (test-end)
- (exit (= (test-runner-fail-count (test-runner-current)) 0)))))
- (gexp->derivation "dhcpd-test" test))
- (define %test-dhcpd
- (system-test
- (name "dhcpd")
- (description "Test a running DHCP daemon configuration.")
- (value (run-dhcpd-test))))
- ;;;
- ;;; Services related to Tor
- ;;;
- (define %tor-os
- (simple-operating-system
- (service tor-service-type)))
- (define %tor-os/unix-socks-socket
- (simple-operating-system
- (service tor-service-type
- (tor-configuration
- (socks-socket-type 'unix)))))
- (define (run-tor-test)
- (define os
- (marionette-operating-system %tor-os
- #:imported-modules '((gnu services herd))
- #:requirements '(tor)))
- (define os/unix-socks-socket
- (marionette-operating-system %tor-os/unix-socks-socket
- #:imported-modules '((gnu services herd))
- #:requirements '(tor)))
- (define test
- (with-imported-modules '((gnu build marionette))
- #~(begin
- (use-modules (gnu build marionette)
- (ice-9 popen)
- (ice-9 rdelim)
- (srfi srfi-64))
- (define marionette
- (make-marionette (list #$(virtual-machine os))))
- (define (tor-is-alive? marionette)
- (marionette-eval
- '(begin
- (use-modules (gnu services herd)
- (srfi srfi-1))
- (live-service-running
- (find (lambda (live)
- (memq 'tor
- (live-service-provision live)))
- (current-services))))
- marionette))
- (mkdir #$output)
- (chdir #$output)
- (test-begin "tor")
- ;; Test the usual Tor service.
- (test-assert "tor is alive"
- (tor-is-alive? marionette))
- (test-assert "tor is listening"
- (let ((default-port 9050))
- (wait-for-tcp-port default-port marionette)))
- ;; Don't run two VMs at once.
- (marionette-control "quit" marionette)
- ;; Test the Tor service using a SOCKS socket.
- (let* ((socket-directory "/tmp/more-sockets")
- (_ (mkdir socket-directory))
- (marionette/unix-socks-socket
- (make-marionette
- (list #$(virtual-machine os/unix-socks-socket))
- ;; We can't use the same socket directory as the first
- ;; marionette.
- #:socket-directory socket-directory)))
- (test-assert "tor is alive, even when using a SOCKS socket"
- (tor-is-alive? marionette/unix-socks-socket))
- (test-assert "tor is listening, even when using a SOCKS socket"
- (wait-for-unix-socket "/var/run/tor/socks-sock"
- marionette/unix-socks-socket)))
- (test-end)
- (exit (= (test-runner-fail-count (test-runner-current)) 0)))))
- (gexp->derivation "tor-test" test))
- (define %test-tor
- (system-test
- (name "tor")
- (description "Test a running Tor daemon configuration.")
- (value (run-tor-test))))
- (define* (run-iptables-test)
- "Run tests of 'iptables-service-type'."
- (define iptables-rules
- "*filter
- :INPUT ACCEPT
- :FORWARD ACCEPT
- :OUTPUT ACCEPT
- -A INPUT -p tcp -m tcp --dport 7 -j REJECT --reject-with icmp-port-unreachable
- COMMIT
- ")
- (define ip6tables-rules
- "*filter
- :INPUT ACCEPT
- :FORWARD ACCEPT
- :OUTPUT ACCEPT
- -A INPUT -p tcp -m tcp --dport 7 -j REJECT --reject-with icmp6-port-unreachable
- COMMIT
- ")
- (define inetd-echo-port 7)
- (define os
- (marionette-operating-system
- (simple-operating-system
- (service dhcp-client-service-type)
- (service inetd-service-type
- (inetd-configuration
- (entries (list
- (inetd-entry
- (name "echo")
- (socket-type 'stream)
- (protocol "tcp")
- (wait? #f)
- (user "root"))))))
- (service iptables-service-type
- (iptables-configuration
- (ipv4-rules (plain-file "iptables.rules" iptables-rules))
- (ipv6-rules (plain-file "ip6tables.rules" ip6tables-rules)))))
- #:imported-modules '((gnu services herd))
- #:requirements '(inetd iptables)))
- (define test
- (with-imported-modules '((gnu build marionette))
- #~(begin
- (use-modules (srfi srfi-64)
- (gnu build marionette))
- (define marionette
- (make-marionette (list #$(virtual-machine os))))
- (define (dump-iptables iptables-save marionette)
- (marionette-eval
- `(begin
- (use-modules (ice-9 popen)
- (ice-9 rdelim)
- (ice-9 regex))
- (call-with-output-string
- (lambda (out)
- (call-with-port
- (open-pipe* OPEN_READ ,iptables-save)
- (lambda (in)
- (let loop ((line (read-line in)))
- ;; iptables-save does not output rules in the exact
- ;; same format we loaded using iptables-restore. It
- ;; adds comments, packet counters, etc. We remove
- ;; these additions.
- (unless (eof-object? line)
- (cond
- ;; Remove comments
- ((string-match "^#" line) #t)
- ;; Remove packet counters
- ((string-match "^:([A-Z]*) ([A-Z]*) .*" line)
- => (lambda (match-record)
- (format out ":~a ~a~%"
- (match:substring match-record 1)
- (match:substring match-record 2))))
- ;; Pass other lines without modification
- (else (display line out)
- (newline out)))
- (loop (read-line in)))))))))
- marionette))
- (mkdir #$output)
- (chdir #$output)
- (test-begin "iptables")
- (test-equal "iptables-save dumps the same rules that were loaded"
- (dump-iptables #$(file-append iptables "/sbin/iptables-save")
- marionette)
- #$iptables-rules)
- (test-equal "ip6tables-save dumps the same rules that were loaded"
- (dump-iptables #$(file-append iptables "/sbin/ip6tables-save")
- marionette)
- #$ip6tables-rules)
- (test-error "iptables firewall blocks access to inetd echo service"
- 'misc-error
- (wait-for-tcp-port inetd-echo-port marionette #:timeout 5))
- ;; TODO: This test freezes up at the login prompt without any
- ;; relevant messages on the console. Perhaps it is waiting for some
- ;; timeout. Find and fix this issue.
- ;; (test-assert "inetd echo service is accessible after iptables firewall is stopped"
- ;; (begin
- ;; (marionette-eval
- ;; '(begin
- ;; (use-modules (gnu services herd))
- ;; (stop-service 'iptables))
- ;; marionette)
- ;; (wait-for-tcp-port inetd-echo-port marionette #:timeout 5)))
- (test-end)
- (exit (= (test-runner-fail-count (test-runner-current)) 0)))))
- (gexp->derivation "iptables" test))
- (define %test-iptables
- (system-test
- (name "iptables")
- (description "Test a running iptables daemon.")
- (value (run-iptables-test))))
- ;;;
- ;;; IPFS service
- ;;;
- (define %ipfs-os
- (simple-operating-system
- (service ipfs-service-type)))
- (define (run-ipfs-test)
- (define os
- (marionette-operating-system %ipfs-os
- #:imported-modules (source-module-closure
- '((gnu services herd)
- (guix ipfs)))
- #:extensions (list guile-json-4)
- #:requirements '(ipfs)))
- (define test
- (with-imported-modules '((gnu build marionette))
- #~(begin
- (use-modules (gnu build marionette)
- (rnrs bytevectors)
- (srfi srfi-64)
- (ice-9 binary-ports))
- (define marionette
- (make-marionette (list #$(virtual-machine os))))
- (define (ipfs-is-alive?)
- (marionette-eval
- '(begin
- (use-modules (gnu services herd)
- (srfi srfi-1))
- (live-service-running
- (find (lambda (live)
- (memq 'ipfs
- (live-service-provision live)))
- (current-services))))
- marionette))
- ;; The default API endpoint port 5001 is used,
- ;; so there is no need to parameterize %ipfs-base-url.
- (define (add-data data)
- (marionette-eval `(content-name (add-data ,data)) marionette))
- (define (read-contents object)
- (marionette-eval
- `(let* ((input (read-contents ,object))
- (all-input (get-bytevector-all input)))
- (close-port input)
- all-input)
- marionette))
- (marionette-eval '(use-modules (guix ipfs)) marionette)
- (mkdir #$output)
- (chdir #$output)
- (test-begin "ipfs")
- ;; Test the IPFS service.
- (test-assert "ipfs is alive" (ipfs-is-alive?))
- (test-assert "ipfs is listening on the gateway"
- (let ((default-port 8082))
- (wait-for-tcp-port default-port marionette)))
- (test-assert "ipfs is listening on the API endpoint"
- (let ((default-port 5001))
- (wait-for-tcp-port default-port marionette)))
- (define test-bv (string->utf8 "hello ipfs!"))
- (test-equal "can upload and download a file to/from ipfs"
- test-bv
- (read-contents (add-data test-bv)))
- (test-end)
- (exit (= (test-runner-fail-count (test-runner-current)) 0)))))
- (gexp->derivation "ipfs-test" test))
- (define %test-ipfs
- (system-test
- (name "ipfs")
- (description "Test a running IPFS daemon configuration.")
- (value (run-ipfs-test))))
|