Add IPsec tunnel, aka xfrm state, tests with ICMP flags enabled.
IPv4 and IPv6, unreachable tests over xfrm/IPsec tunnels,
xfrm SA with "flag icmp" set.

Signed-off-by: Antony Antony <antony.ant...@secunet.com>
---
v2->v3: fix the IFS whitespace. It got mangled
---
 tools/testing/selftests/net/Makefile      |   1 +
 tools/testing/selftests/net/xfrm_state.sh | 624 ++++++++++++++++++++++
 2 files changed, 625 insertions(+)
 create mode 100755 tools/testing/selftests/net/xfrm_state.sh

diff --git a/tools/testing/selftests/net/Makefile 
b/tools/testing/selftests/net/Makefile
index 5befca249452..7d96b3e411b7 100644
--- a/tools/testing/selftests/net/Makefile
+++ b/tools/testing/selftests/net/Makefile
@@ -53,6 +53,7 @@ TEST_PROGS += bind_bhash.sh
 TEST_PROGS += ip_local_port_range.sh
 TEST_PROGS += rps_default_mask.sh
 TEST_PROGS += big_tcp.sh
+TEST_PROGS += xfrm_state.sh
 TEST_PROGS_EXTENDED := toeplitz_client.sh toeplitz.sh
 TEST_GEN_FILES =  socket nettest
 TEST_GEN_FILES += psock_fanout psock_tpacket msg_zerocopy reuseport_addr_any
diff --git a/tools/testing/selftests/net/xfrm_state.sh 
b/tools/testing/selftests/net/xfrm_state.sh
new file mode 100755
index 000000000000..26eac013abcf
--- /dev/null
+++ b/tools/testing/selftests/net/xfrm_state.sh
@@ -0,0 +1,624 @@
+#!/bin/bash -u
+# SPDX-License-Identifier: GPL-2.0
+#
+# Checks for xfrm/ESP/IPsec tunnel.
+# - The unreachable tests are for icmp error handling.
+#   As specified in IETF RFC 4301 section 6.
+#
+# See "test=" below for the implemented tests.
+#
+# Network topology default
+# 10.1.c.d or IPv6 fc00:c::d/64
+#   1.1   1.2   2.1   2.2   3.1   3.2   4.1   4.2   5.1   5.2  6.1  6.2
+#  eth0  eth1  eth0  eth1  eth0  eth1  eth0  eth1  eth0  eth1 eth0  eth1
+# a -------- r1 -------- s1 -------- r2 -------- s2 -------- r3 -------- b
+# a, b = Alice and Bob hosts without IPsec.
+# r1, r2, r3 routers without IPsec
+# s1, s2, IPsec gateways/routers that setup tunnel(s).
+#
+# Network topology: x for IPsec gateway that generate ICMP response.
+# 10.1.c.d or IPv6 fc00:c::d/64
+#   1.1   1.2   2.1   2.2   3.1   3.2   4.1   4.2   5.1   5.2
+#  eth0  eth1  eth0  eth1  eth0  eth1  eth0  eth1  eth0  eth1
+# a -------- r1 -------- s1 -------- r2 -------- s2 -------- b
+#
+
+source lib.sh
+
+PAUSE_ON_FAIL=no
+VERBOSE=${VERBOSE:-0}
+TRACING=0
+
+#               Name                          Description
+tests="
+       unreachable_ipv4                IPv4 unreachable from router r3
+       unreachable_ipv4                IPv6 unreachable from router r3
+       unreachable_gw_ipv4             IPv4 unreachable from IPsec gateway s2
+       unreachable_gw_ipv6             IPv6 unreachable from IPsec gateway s2
+       mtu_ipv4_r2                     IPv4 MTU exceeded from ESP router r2
+       mtu_ipv6_r2                     IPv6 MTU exceeded from ESP router r2
+       mtu_ipv4_r3                     IPv4 MTU exceeded router r3
+       mtu_ipv6_r3                     IPv6 MTU exceeded router r3"
+
+ns_set="a r1 s1 r2 s2 r3 b" # Network topology default
+imax=7 # number of namespaces in the test
+
+prefix4="10.1"
+prefix6="fc00"
+
+run_cmd() {
+       cmd="$*"
+
+       if [ "$VERBOSE" -gt 0 ]; then
+               printf "    COMMAND: $cmd\n"
+       fi
+
+       out="$($cmd 2>&1)"
+       rc=$?
+       if [ "$VERBOSE" -gt 1 -a -n "$out" ]; then
+               echo "    $out"
+               echo
+       fi
+       return $rc
+}
+
+run_test() {
+       (
+       tname="$1"
+       tdesc="$2"
+
+
+       unset IFS
+
+       fail="yes"
+
+       # Since cleanup() relies on variables modified by this sub shell, it
+       # has to run in this context.
+       trap cleanup EXIT
+
+       if [ "$VERBOSE" -gt 0 ]; then
+               printf 
"\n#####################################################################\n\n"
+       fi
+
+       # if errexit was not set, set it and unset after test eval
+       errexit=0
+       if [[ $- =~ "e" ]]; then
+               errexit=1
+       else
+               set -e
+       fi
+
+       eval test_${tname}
+       ret=$?
+       fail="no"
+       [ $errexit -eq 0 ] && set +e # hack until exception is fixed
+
+       if [ $ret -eq 0 ]; then
+               printf "TEST: %-60s [ PASS ]\n" "${tdesc}"
+       elif [ $ret -eq 1 ]; then
+               printf "TEST: %-60s [FAIL]\n" "${tdesc}"
+               if [ "$VERBOSE" -eq 0 -o -n "${out}" -o -n "${out}" ]; then
+                       echo 
"#####################################################################"
+                       [ -n "${cmd}" ] && echo -e "${cmd}"
+                       [ -n "${out}" ] && echo -e "${out}"
+                       echo 
"#####################################################################"
+               fi
+               if [ "${PAUSE_ON_FAIL}" = "yes" ]; then
+                       echo
+                       echo "Pausing. Hit enter to continue"
+                       read a
+               fi
+               err_flush
+               exit 1
+       elif [ $ret -eq $ksft_skip ]; then
+               printf "TEST: %-60s [SKIP]\n" "${tdesc}"
+               err_flush
+       fi
+
+       return $ret
+       )
+       ret=$?
+       case $ret in
+               0)
+                       all_skipped=false
+                       [ $exitcode -eq $ksft_skip ] && exitcode=0
+               ;;
+               $ksft_skip)
+                       [ $all_skipped = true ] && exitcode=$ksft_skip
+               ;;
+               *)
+                       all_skipped=false
+                       exitcode=1
+               ;;
+       esac
+
+       return $ret
+}
+
+# Find the auto-generated name for this namespace
+nsname() {
+       eval echo ns_$1
+}
+
+nscmd() {
+       eval echo "ip netns exec $1"
+}
+
+setup_namespace() {
+       setup_ns NS_A
+       ns_a="ip netns exec ${NS_A}"
+}
+
+setup_namespaces() {
+       local namespaces="";
+
+       NS_R1=""
+       NS_R2=""
+       NS_R3=""
+       for ns in ${ns_set}; do
+               n=$(nsname ${ns})
+               n=$(echo $n | tr '[:lower:]' '[:upper:]')
+               namespaces="$namespaces ${n}"
+       done
+
+       setup_ns $namespaces
+
+       ns_active= #ordered list of namespaces for this test.
+
+       [ -n NS_A ] && ns_a="ip netns exec ${NS_A}" && ns_active="${ns_active} 
$NS_A"
+       [ -n NS_R1 ] && ns_r1="ip netns exec ${NS_R1}" && 
ns_active="${ns_active} $NS_R1"
+       [ -n NS_S1 ] && ns_s1="ip netns exec ${NS_S1}" && 
ns_active="${ns_active} $NS_S1"
+       [ -n NS_R2 ] && ns_r2="ip netns exec ${NS_R2}" && 
ns_active="${ns_active} $NS_R2"
+       [ -n NS_S2 ] && ns_s2="ip netns exec ${NS_S2}" && 
ns_active="${ns_active} $NS_S2"
+       [ -n NS_R3 ] && ns_r3="ip netns exec ${NS_R3}" && 
ns_active="${ns_active} $NS_R3"
+       [ -n NS_B ] && ns_b="ip netns exec ${NS_B}" && ns_active="${ns_active} 
$NS_B"
+}
+
+setup_addr_add() {
+       local ns_cmd=$(nscmd $1)
+       local ip0="$2"
+       local ip1="$3"
+
+       if [ -n "${ip0}" ]; then
+               run_cmd ${ns_cmd} ip addr add ${ip0} dev eth0
+               run_cmd ${ns_cmd} ip link set up eth0
+       fi
+       if [ -n "${ip1}" ]; then
+               run_cmd ${ns_cmd} ip addr add ${ip1} dev eth1
+               run_cmd ${ns_cmd} ip link set up eth1
+       fi
+       run_cmd ${ns_cmd} sysctl -q net/ipv4/ip_forward=1
+       run_cmd ${ns_cmd} sysctl -q net/ipv6/conf/all/forwarding=1
+
+       # Disable DAD, so that we don't have to wait to use the
+       # configured IPv6 addresses
+       run_cmd ${ns_cmd} sysctl -q net/ipv6/conf/default/accept_dad=0
+}
+
+route_add() {
+       local ns_cmd=$(nscmd $1)
+       local nhf=$2
+       local nhr=$3
+       local i=$4
+
+       if [ -n "${nhf}" ]; then
+               # add forward routes
+               for j in $(seq $((i + 1)) $imax); do
+                       local route="${prefix}${s}${j}${S}0/${prefix_len}"
+                       run_cmd ${ns_cmd} ip route replace "${route} via ${nhf}"
+               done
+       fi
+
+       if [ -n "${nhr}" ]; then
+               # add reverse routes
+               for j in $(seq 1 $((i - 2))); do
+                       local route="${prefix}${s}${j}${S}0/${prefix_len}"
+                       run_cmd ${ns_cmd} ip route replace "${route} via ${nhr}"
+               done
+       fi
+}
+
+veth_add() {
+       local ns_cmd=$(nscmd $1)
+       local tn="veth${2}1"
+       local ln=${3:-eth0}
+       run_cmd ${ns_cmd} ip link add ${ln} type veth peer name ${tn}
+}
+
+setup_nft_add_icmp_filter() {
+       local ns_cmd=${ns_r2}
+
+       run_cmd ${ns_cmd} nft add table inet filter
+       run_cmd ${ns_cmd} nft add chain inet filter FORWARD \
+               { type filter hook forward priority filter\; policy drop \; }
+       run_cmd ${ns_cmd} nft add rule inet filter FORWARD counter ip protocol \
+               icmp counter log drop
+       run_cmd ${ns_cmd} nft add rule inet filter FORWARD counter ip protocol 
esp \
+               counter log accept
+}
+
+setup_nft_add_icmpv6_filter() {
+       local ns_cmd=${ns_r2}
+
+       run_cmd ${ns_cmd} nft add table inet filter
+       run_cmd ${ns_cmd} nft add chain inet filter FORWARD { type filter \
+               hook forward priority filter\; policy drop \; }
+       run_cmd ${ns_cmd} nft add rule inet filter FORWARD ip6 nexthdr \
+               ipv6-icmp icmpv6 type echo-request counter log drop
+       run_cmd ${ns_cmd} nft add rule inet filter FORWARD ip6 nexthdr esp \
+               counter log accept
+       run_cmd ${ns_cmd} nft add rule inet filter FORWARD ip6 nexthdr \
+               ipv6-icmp icmpv6 type {nd-neighbor-solicit,nd-neighbor-advert,\
+               nd-router-solicit,nd-router-advert} counter log accept
+}
+
+veth_mv() {
+       local ns=$1
+       local nsp=$2
+       local rn=${4:-eth1}
+       local tn="veth${3}1"
+
+       run_cmd "$(nscmd ${nsp})" ip link set ${tn} netns ${ns}
+       run_cmd "$(nscmd ${ns})" ip link set ${tn} name ${rn}
+}
+
+vm_set() {
+       s1_src=${src}
+       s1_dst=${dst}
+       s1_src_net=${src_net}
+       s1_dst_net=${dst_net}
+}
+
+setup_vm_set_v4() {
+       src="10.1.3.1"
+       dst="10.1.4.2"
+       src_net="10.1.1.0/24"
+       dst_net="10.1.6.0/24"
+
+       prefix=${prefix4}
+       prefix_len=24
+       s="."
+       S="."
+
+       vm_set
+}
+
+setup_vm_set_v4x() {
+       ns_set="a r1 s1 r2 s2 b" # Network topology: x
+       imax=6
+       prefix=${prefix4}
+       s="."
+       S="."
+       src="10.1.3.1"
+       dst="10.1.4.2"
+       src_net="10.1.1.0/24"
+       dst_net="10.1.5.0/24"
+       prefix_len=24
+
+       vm_set
+}
+
+setup_vm_set_v6() {
+       imax=7
+       prefix=${prefix6}
+       s=":"
+       S="::"
+       src="fc00:3::1"
+       dst="fc00:4::2"
+       src_net="fc00:1::0/64"
+       dst_net="fc00:6::0/64"
+       prefix_len=64
+
+       vm_set
+}
+
+setup_vm_set_v6x() {
+       ns_set="a r1 s1 r2 s2 b" # Network topology: x
+       imax=6
+       prefix=${prefix6}
+       s=":"
+       S="::"
+       src="fc00:3::1"
+       dst="fc00:4::2"
+       src_net="fc00:1::0/64"
+       dst_net="fc00:5::0/64"
+       prefix_len=64
+
+       vm_set
+}
+
+setup_veths() {
+       i=1
+       for ns in ${ns_active}; do
+               [ ${i} = ${imax} ] && continue
+               veth_add ${ns} ${i}
+               i=$((i + 1))
+       done
+
+       j=1
+       for ns in ${ns_active}; do
+               if [ ${j} -eq 1 ]; then
+                       p=${ns};
+                       pj=${j}
+                       j=$((j + 1))
+                       continue
+               fi
+               veth_mv ${ns} "${p}" ${pj}
+               p=${ns}
+               pj=${j}
+               j=$((j + 1))
+       done
+}
+
+setup_routes() {
+       ip1=""
+       i=1
+       for ns in ${ns_active}; do
+               # 10.1.C.1/24
+               ip0="${prefix}${s}${i}${S}1/${prefix_len}"
+               [ "${ns}" = b ] && ip0=""
+               setup_addr_add ${ns} "${ip0}" "${ip1}"
+               # 10.1.C.2/24
+               ip1="${prefix}${s}${i}${S}2/${prefix_len}"
+               i=$((i + 1))
+       done
+
+       i=1
+       nhr=""
+       for ns in ${ns_active}; do
+               nhf="${prefix}${s}${i}${S}2"
+               [ "${ns}" = b ] && nhf=""
+               route_add ${ns} "${nhf}" "${nhr}" ${i}
+               nhr="${prefix}${s}${i}${S}1"
+               i=$((i + 1))
+       done
+}
+
+setup_xfrm() {
+
+       run_cmd ${ns_s1} ip xfrm policy add src ${s1_src_net} dst ${s1_dst_net} 
dir out \
+               tmpl src ${s1_src} dst ${s1_dst} proto esp reqid 1 mode tunnel
+
+       # no "input" policies. we are only doing forwarding.
+       # run_cmd ${ns_s1} ip xfrm policy add src ${s1_dst_net} dst 
${s1_src_net} dir in \
+       #       flag icmp tmpl src ${s1_dst} dst ${s1_src} proto esp reqid 2 
mode tunnel
+
+       run_cmd ${ns_s1} ip xfrm policy add src ${s1_dst_net} dst ${s1_src_net} 
dir fwd \
+               flag icmp tmpl src ${s1_dst} dst ${s1_src} proto esp reqid 2 
mode tunnel
+
+       run_cmd ${ns_s1} ip xfrm state add src ${s1_src} dst ${s1_dst} proto 
esp spi 1 \
+               reqid 1 mode tunnel aead 'rfc4106(gcm(aes))' \
+               0x1111111111111111111111111111111111111111 96 \
+               sel src ${s1_src_net} dst ${s1_dst_net}
+
+       run_cmd ${ns_s1} ip xfrm state add src ${s1_dst} dst ${s1_src} proto 
esp spi 2 \
+               reqid 2 flag icmp replay-window 8 mode tunnel aead 
'rfc4106(gcm(aes))' \
+               0x2222222222222222222222222222222222222222 96 \
+               sel src ${s1_dst_net} dst ${s1_src_net}
+
+       run_cmd ${ns_s2} ip xfrm policy add src ${s1_dst_net} dst ${s1_src_net} 
dir out \
+               flag icmp tmpl src ${s1_dst} dst ${s1_src} proto esp reqid 2 
mode tunnel
+
+       run_cmd ${ns_s2} ip xfrm policy add src ${s1_src_net} dst ${s1_dst_net} 
dir fwd \
+               tmpl src ${s1_src} dst ${s1_dst} proto esp reqid 1 mode tunnel
+
+       run_cmd ${ns_s2} ip xfrm state add src ${s1_dst} dst ${s1_src} proto 
esp spi 2 \
+               reqid 2 mode tunnel aead 'rfc4106(gcm(aes))' \
+               0x2222222222222222222222222222222222222222 96 \
+               sel src ${s1_dst_net} dst ${s1_src_net}
+
+       run_cmd ${ns_s2} ip xfrm state add src ${s1_src} dst ${s1_dst} proto 
esp spi 1 \
+               reqid 1 flag icmp replay-window 8 mode tunnel aead 
'rfc4106(gcm(aes))' \
+               0x1111111111111111111111111111111111111111 96 \
+               sel src ${s1_src_net} dst ${s1_dst_net}
+}
+
+setup() {
+       [ "$(id -u)" -ne 0 ] && echo "  need to run as root" && return 
$ksft_skip
+
+       for arg do
+               eval setup_${arg} || { echo "  ${arg} not supported"; return 1; 
}
+       done
+}
+
+trace() {
+       [ $TRACING -eq 0 ] && return
+
+       for arg do
+               [ "${ns_cmd}" = "" ] && ns_cmd="${arg}" && continue
+               ns_cmd=
+       done
+       sleep 1
+}
+
+cleanup() {
+       if [ "${fail}" = "yes" -a -n "${desc}" ]; then
+               printf "TEST: %-60s [ FAIL ]\n" "${desc}"
+               [ -n "${cmd}" ] && echo -e "${cmd}\n"
+               [ -n "${out}" ] && echo -e "${out}\n"
+       fi
+
+       cleanup_all_ns
+}
+
+mtu() {
+       ns_cmd="${1}"
+       dev="${2}"
+       mtu="${3}"
+
+       ${ns_cmd} ip link set dev ${dev} mtu ${mtu}
+}
+
+mtu_parse() {
+       input="${1}"
+
+       next=0
+       for i in ${input}; do
+               [ ${next} -eq 1 -a "${i}" = "lock" ] && next=2 && continue
+               [ ${next} -eq 1 ] && echo "${i}" && return
+               [ ${next} -eq 2 ] && echo "lock ${i}" && return
+               [ "${i}" = "mtu" ] && next=1
+       done
+}
+
+link_get() {
+       ns_cmd="${1}"
+       name="${2}"
+
+       ${ns_cmd} ip link show dev "${name}"
+}
+
+link_get_mtu() {
+       ns_cmd="${1}"
+       name="${2}"
+
+       mtu_parse "$(link_get "${ns_cmd}" ${name})"
+}
+
+test_unreachable_ipv6() {
+       setup vm_set_v6 namespaces veths routes xfrm nft_add_icmpv6_filter || 
return $ksft_skip
+       run_cmd ${ns_a} ping -W 5 -w 4 -c 1 fc00:6::2
+       run_cmd ${ns_a} ping -W 5 -w 4 -c 1 fc00:6::3 || true
+       rc=0
+       echo -e "$out" | grep -q -E 'From fc00:5::2 icmp_seq.* Destination' || 
rc=1
+       return ${rc}
+}
+
+test_unreachable_gw_ipv6() {
+       setup vm_set_v6x namespaces veths routes xfrm nft_add_icmpv6_filter || 
return $ksft_skip
+       run_cmd ${ns_a} ping -W 5 -w 4 -c 1 fc00:5::2
+       run_cmd ${ns_a} ping -W 5 -w 4 -c 1 fc00:5::3 || true
+       rc=0
+       echo -e "$out" | grep -q -E 'From fc00:4::2 icmp_seq.* Destination' || 
rc=1
+       return ${rc}
+}
+
+test_unreachable_gw_ipv4() {
+       setup vm_set_v4x namespaces veths routes xfrm nft_add_icmp_filter || 
return $ksft_skip
+       run_cmd ${ns_a} ping -W 5 -w 4 -c 1 10.1.5.2
+       run_cmd ${ns_a} ping -W 5 -w 4 -c 1 10.1.5.3 || true
+       rc=0
+       echo -e "$out" | grep -q -E 'From 10.1.4.2 icmp_seq.* Destination' || 
rc=1
+       return ${rc}
+}
+
+test_unreachable_ipv4() {
+       setup vm_set_v4 namespaces veths routes xfrm nft_add_icmp_filter || 
return $ksft_skip
+       run_cmd ${ns_a} ping -W 5 -w 4 -c 1 10.1.6.2
+       run_cmd ${ns_a} ping -W 5 -w 4 -c 1 10.1.6.3 || true
+       rc=0
+       echo -e "$out" | grep -q -E 'From 10.1.5.2 icmp_seq.* Destination' || 
rc=1
+       return ${rc}
+}
+
+test_mtu_ipv4_r2() {
+       setup vm_set_v4 namespaces veths routes xfrm nft_add_icmp_filter || 
return $ksft_skip
+       run_cmd ${ns_a} ping -W 5 -w 4 -c 1 10.1.6.2
+       run_cmd ${ns_r2} ip route replace 10.1.3.0/24 dev eth1 src 10.1.3.2 mtu 
1300
+       run_cmd ${ns_r2} ip route replace 10.1.4.0/24 dev eth0 src 10.1.4.1 mtu 
1300
+       run_cmd ${ns_a} ping -M do -s 1300 -W 5 -w 4 -c 1 10.1.6.2 || true
+       rc=0
+       # note the error should be s1 not from r2
+       echo -e "$out" | grep -q -E "From 10.1.2.2 icmp_seq=.* Frag needed and 
DF set" || rc=1
+       return ${rc}
+}
+
+test_mtu_ipv6_r2() {
+       setup vm_set_v6 namespaces veths routes xfrm nft_add_icmpv6_filter || 
return $ksft_skip
+       run_cmd ${ns_a} ping -W 5 -w 4 -c 1 fc00:6::2
+       run_cmd ${ns_r2} ip -6 route replace fc00:3::/64 dev eth1 metric 256 
src fc00:3::2 mtu 1300
+       run_cmd ${ns_r2} ip -6 route replace fc00:4::/64 dev eth0 metric 256 
src fc00:4::1 mtu 1300
+       run_cmd ${ns_a} ping -M do -s 1300 -W 5 -w 4 -c 1 fc00:6::2 || true
+       rc=0
+       # note the error should be s1 not from r2
+       echo -e "$out" | grep -q -E "From fc00:2::2 icmp_seq=.* Packet too big: 
mtu=1230" || rc=1
+       return ${rc}
+}
+
+test_mtu_ipv4_r3() {
+       setup vm_set_v4 namespaces veths routes xfrm nft_add_icmp_filter || 
return $ksft_skip
+       run_cmd ${ns_a} ping -W 5 -w 4 -c 1 10.1.6.2
+       run_cmd ${ns_r3} ip route replace 10.1.6.0/24 dev eth0 src 10.1.6.1 mtu 
1300
+       run_cmd ${ns_a} ping -M do -s 1350 -W 5 -w 4 -c 1 10.1.6.2 || true
+       rc=0
+       echo -e "$out" | grep -q -E "From 10.1.5.2 icmp_seq=.* Frag needed and 
DF set \(mtu = 1300\)" || rc=1
+       return ${rc}
+}
+
+test_mtu_ipv6_r3() {
+       setup vm_set_v6 namespaces veths routes xfrm nft_add_icmpv6_filter || 
return $ksft_skip
+       run_cmd ${ns_a} ping -W 5 -w 4 -c 1 fc00:6::2
+       run_cmd ${ns_r3} ip -6 route replace fc00:6::/64 dev eth1 metric 256 
src fc00:6::1 mtu 1300
+       run_cmd ${ns_a} ping -M do -s 1300 -W 5 -w 4 -c 1 fc00:6::2 || true
+       rc=0
+       # note the error should be s1 not from r2
+       echo -e "$out" | grep -q -E "From fc00:5::2 icmp_seq=.* Packet too big: 
mtu=1300" || rc=1
+       return ${rc}
+}
+
+################################################################################
+#
+usage() {
+       echo
+       echo "$0 [OPTIONS] [TEST]..."
+       echo "If no TEST argument is given, all tests will be run."
+       echo
+       echo -e "\t-p Pause on fail"
+       echo -e "\t-v Verbose output. Show commands; -vv Show output also"
+       echo "Available tests${tests}"
+       exit 1
+}
+
+################################################################################
+#
+exitcode=0
+desc=0
+all_skipped=true
+out=
+cmd=
+
+while getopts :pv o
+do
+       case $o in
+       p) PAUSE_ON_FAIL=yes;;
+       v) VERBOSE=$(( VERBOSE + 1 ));;
+       *) usage;;
+       esac
+done
+shift $(($OPTIND-1))
+
+IFS="  
+"
+
+for arg do
+       # Check first that all requested tests are available before running any
+       command -v > /dev/null "test_${arg}" || { echo "=== Test ${arg} not 
found"; usage; }
+done
+
+trap cleanup EXIT
+
+name=""
+desc=""
+fail="no"
+
+# end cleanup
+cleanup
+
+for t in ${tests}; do
+       [ "${name}" = "" ] && name="${t}" && continue
+       [ "${desc}" = "" ] && desc="${t}"
+
+       run_this=1
+       for arg do
+               [ "${arg}" != "${arg#--*}" ] && continue
+               [ "${arg}" = "${name}" ] && run_this=1 && break
+               run_this=0
+       done
+       if [ $run_this -eq 1 ]; then
+               run_test "${name}" "${desc}"
+       fi
+       name=""
+       desc=""
+done
+
+exit ${exitcode}
-- 
2.30.2


Reply via email to