summaryrefslogtreecommitdiffstats
path: root/test (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Merge pull request #11232 from yuwata/fix-9130-alternativeYu Watanabe2019-01-082-0/+18
|\ | | | | network: always check link is ready when address is updated
| * test: add a testcase for Address.Peer= in .network unitYu Watanabe2018-12-232-0/+18
| |
* | Merge pull request #11252 from evverx/use-asan-wrapper-on-travis-ciFrantisek Sumsal2019-01-062-3/+42
|\ \ | | | | | | travis: run PID1, journald and everything else under ASan+UBsan
| * | tests: introduce check_asan_reports and use it in check_result_{qemu|nspawn}Evgeny Vereshchagin2018-12-291-17/+26
| | |
| * | tests: look for ASan+UBSan reports in the journalEvgeny Vereshchagin2018-12-291-0/+9
| | |
| * | tests: double DefaultTimeoutStartSec when systemd is run under ASan+UBSanEvgeny Vereshchagin2018-12-291-0/+1
| | |
| * | tests: overwrite a hard-coded timeout in systemd-hwdb-update.serviceEvgeny Vereshchagin2018-12-291-0/+5
| | |
| * | tests: fail if asan has found issues in journaldEvgeny Vereshchagin2018-12-291-0/+7
| | |
| * | tests: reproduce https://github.com/systemd/systemd/issues/11251Evgeny Vereshchagin2018-12-292-1/+9
| | |
| * | test: don't run TEST-01-BASIC in unprivileged containers on Travis CIEvgeny Vereshchagin2018-12-241-1/+1
| | |
| * | tests: use systemd-journald to check whether everything has been built with ASanEvgeny Vereshchagin2018-12-241-1/+1
| |/
* | cgroup: s/cgroups? ?v?([0-9])/cgroup v\1/gIChris Down2019-01-031-1/+1
| | | | | | | | | | | | | | | | | | | | Nitpicky, but we've used a lot of random spacings and names in the past, but we're trying to be completely consistent on "cgroup vN" now. Generated by `fd -0 | xargs -0 -n1 sed -ri --follow-symlinks 's/cgroups? ?v?([0-9])/cgroup v\1/gI'`. I manually ignored places where it's not appropriate to replace (eg. "cgroup2" fstype and in src/shared/linux).
* | test-network: disable DNS function of dnsmasqYu Watanabe2019-01-021-1/+1
| |
* | test-network: drop unused variableYu Watanabe2019-01-021-1/+0
| |
* | test: fix neighbor addressYu Watanabe2019-01-021-1/+1
|/
* core: support %j in unit dependency resolutionPatrick Williams2018-12-222-0/+77
| | | | | | | | | | | | | | Commit 250e9fadbcc0ca90e697d7efb40855b054ed3b8f introduced support for %j/%J specifier in unit files. The function unit_name_printf is used in unit dependency resolution, such as Wants / After directives, but was missing support for the %j. Add to allow directives such as: [Unit] Wants=bar-%j.target Fixes: systemd/systemd#11217 Signed-off-by: Patrick Williams <patrick@stwcx.xyz>
* networkd: permit DNS "DefaultRoute" configuration in .network filesLennart Poettering2018-12-211-0/+1
|
* resolved: bind .local domains to mDNS with DNS_SCOPE_YES, similar LLMNRLennart Poettering2018-12-211-1/+1
| | | | | | | | | | | | | | | | | | | | | Previously, we'd return DNS_SCOPE_MAYBE for all domain lookups matching LLMNR or mDNS. Let's upgrade this to DNS_SCOPE_YES, to make the binding stronger. The effect of this is that even if "local" is defined as routing domain on some iface, we'll still lookup domains in local via mDNS — if mDNS is turned on. This should not be limiting, as people who don't want such lookups should turn off mDNS altogether, as it is useless if nothing is routed to it. This also has the nice benefit that mDNS/LLMR continue to work if people use "~." as routing domain on some interface. Similar for LLMNR and single label names. Similar also for the link local IPv4 and IPv6 reverse lookups. Fixes: #10125
* tests: explicitly enable user namespaces for TEST-13-NSPAWN-SMOKEFrantisek Sumsal2018-12-201-1/+6
|
* netdev bond: add support to configure tlb_dynamic_lbSusant Sahani2018-12-153-0/+18
| | | | | | Closes https://github.com/systemd/systemd/issues/11135 Add test for bond : tlb_dynamic_lb
* udev-test: check if permitted to create block device nodesAlexey Bogdanenko2018-12-111-0/+8
|
* Merge pull request #11099 from abogdanenko/udev-test-fix-missing-dirEvgeny Vereshchagin2018-12-111-1/+6
|\ | | | | udev-test: fix skip condition and missing directory test/run
| * udev-test: fix missing directory test/runAlexey Bogdanenko2018-12-091-0/+5
| | | | | | | | | | | | | | | | | | Fixes the following error: Failed to mount test /run: No such file or directory By the time command "./test-udev check" calls function "fake_filesystems", directory "test/run" must be present.
| * udev-test: fix test skip conditionAlexey Bogdanenko2018-12-091-1/+1
| | | | | | | | | | | | | | | | | | | | When there is a failure to setup the environment, the following happens: 1. Command "./test-udev check" exits with non-zero code. 2. Perl function "system" returns the code. 3. The code is evaluated as true by Perl. Then we stop the test.
* | Merge pull request #11084 from poettering/networkd-test-fixZbigniew Jędrzejewski-Szmek2018-12-114-12/+137
|\ \ | | | | | | unbreak networkd-test.py
| * | networkd-test: add mkosi snippet for building and running networkd-tets.py ↵Lennart Poettering2018-12-073-0/+106
| | | | | | | | | | | | | | | | | | | | | | | | in a network namespaced container This provides us with an easy command line to test this script. Because the test was so difficult to get running noone ever did, hence it broke badly quickly. Let's fix that.
| * | networkd-test: change test_transient_hostname_with_static to use an explicit ↵Lennart Poettering2018-12-071-2/+10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | static hostname Previously, the test would use the existing static hostname. However, this woud not work as expected in the static hostname was "localhost" because the transient hostname will override the static one in that case anyway, as the assumption hostnamed makes is that "localhost" is a non-initialized hostname. Hence when testing this, let's first set the static hostname to something specific first (that is not "localhost").
| * | networkd-test: restart hostnamed after reverting /etc/hostname tooLennart Poettering2018-12-071-0/+2
| | | | | | | | | | | | Otherwise hostnamed will not report the right data in the next test
| * | networkd-test: add write_config()Lennart Poettering2018-12-071-6/+10
| | | | | | | | | | | | | | | The call was removed in ec89276c2ab345b84c2dab4c35826de41aa6fd0f, but is still used. Not sure why noone noticed this.
| * | networkd-test: set right access modes for /run/systemd/netifLennart Poettering2018-12-071-5/+10
| |/ | | | | | | | | | | | | | | Otherwise networkd isn't happy. Let's also make addition of the "systemd-network" non-fatal. The user exists on many machines anyway, hence it shouldn't fail if it already exists.
* | Merge pull request #11105 from keszybz/path-parsingLennart Poettering2018-12-101-0/+0
|\ \ | | | | | | Some tightening of our path parsing code
| * | fuzz-unit-file: add one more test caseZbigniew Jędrzejewski-Szmek2018-12-101-0/+0
| |/ | | | | | | | | | | | | | | There seems to be no error per se. RequiresMountsFor=%s%s%s..%s%s%s is expanded to RequiresMountsFor=/bin/zsh/bin/zsh/bin/zsh/bin/zsh/..., which takes a bit of time, and then we iterate over this a few times, creating a hashmap with a hashmap for each prefix of the path, each with one item pointing back to the original unit. Takes about 0.8 s on my machine.
* / networkd: Static neighbor supportWilliam A. Kennington III2018-12-104-0/+31
|/ | | | | | | When using networkd we currently have no way of ensuring that static neighbor entries are set when our link comes up. This change adds a new section to the network definition that allows multiple static neighbors to be set on a link.
* test-network: make search_words_in_file() hit multi wordsYu Watanabe2018-12-061-14/+15
|
* test-network: delete rules before running next testYu Watanabe2018-12-061-0/+6
|
* test-network: add a line break after starting networkdYu Watanabe2018-12-061-0/+1
| | | | | This may be ugly. But otherwise, outputs of several check commands are shown without new line...
* test-network: check link before starting dnsmasqYu Watanabe2018-12-061-27/+18
|
* test-network: show command outputsYu Watanabe2018-12-061-0/+4
|
* test-network: sort imported modulesYu Watanabe2018-12-061-4/+4
|
* test-network: sort links and unitsYu Watanabe2018-12-061-44/+156
|
* test-network: fix typo in class nameYu Watanabe2018-12-061-1/+1
|
* Merge pull request #10988 from ssahani/IFLA_BRPORT_MCAST_TO_UCASTYu Watanabe2018-12-065-4/+22
|\ | | | | networkd: bridge add support to configure multicast_to_unicast
| * test-network: add test for bridge MulticastToUnicastSusant Sahani2018-12-062-4/+19
| |
| * networkd: bridge add support to configure multicast_to_unicastSusant Sahani2018-12-033-0/+3
| | | | | | | | closes #10649
* | test-network: Add test for invert RPDB ruleSusant Sahani2018-12-062-1/+24
| |
* | networkd: RPDB rule - add support to configure inverted rule.Susant Sahani2018-12-062-0/+2
| | | | | | | | Closes #10706
* | Merge pull request #11021 from ssahani/isatapYu Watanabe2018-12-054-2/+26
|\ \ | |/ |/| networkd: Add support to configure ISATAP tunnel
| * test-network: add test for ISATAPSusant Sahani2018-12-033-2/+25
| |
| * networkd: Add support to configure ISATAP tunnelSusant Sahani2018-12-031-0/+1
| | | | | | | | | | | | | | Let's just reuse the code of sit tunnel to create a ISATAP tunnel. Matter of turning a flag Please see https://elixir.bootlin.com/linux/v4.19.6/source/net/ipv6/sit.c#L208
* | cgroup: Add DisableControllers= directive to disable controller in subtreeChris Down2018-12-033-0/+16
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Some controllers (like the CPU controller) have a performance cost that is non-trivial on certain workloads. While this can be mitigated and improved to an extent, there will for some controllers always be some overheads associated with the benefits gained from the controller. Inside Facebook, the fix applied has been to disable the CPU controller forcibly with `cgroup_disable=cpu` on the kernel command line. This presents a problem: to disable or reenable the controller, a reboot is required, but this is quite cumbersome and slow to do for many thousands of machines, especially machines where disabling/enabling a stateful service on a machine is a matter of several minutes. Currently systemd provides some configuration knobs for these in the form of `[Default]CPUAccounting`, `[Default]MemoryAccounting`, and the like. The limitation of these is that Default*Accounting is overrideable by individual services, of which any one could decide to reenable a controller within the hierarchy at any point just by using a controller feature implicitly (eg. `CPUWeight`), even if the use of that CPU feature could just be opportunistic. Since many services are provided by the distribution, or by upstream teams at a particular organisation, it's not a sustainable solution to simply try to find and remove offending directives from these units. This commit presents a more direct solution -- a DisableControllers= directive that forcibly disallows a controller from being enabled within a subtree.