xref: /spdk/test/unit/lib/iscsi/tgt_node.c/tgt_node_ut.c (revision 407e88fd2ab020d753e33014cf759353a9901b51)
1 /*-
2  *   BSD LICENSE
3  *
4  *   Copyright (c) Intel Corporation.
5  *   All rights reserved.
6  *
7  *   Redistribution and use in source and binary forms, with or without
8  *   modification, are permitted provided that the following conditions
9  *   are met:
10  *
11  *     * Redistributions of source code must retain the above copyright
12  *       notice, this list of conditions and the following disclaimer.
13  *     * Redistributions in binary form must reproduce the above copyright
14  *       notice, this list of conditions and the following disclaimer in
15  *       the documentation and/or other materials provided with the
16  *       distribution.
17  *     * Neither the name of Intel Corporation nor the names of its
18  *       contributors may be used to endorse or promote products derived
19  *       from this software without specific prior written permission.
20  *
21  *   THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
22  *   "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
23  *   LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
24  *   A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
25  *   OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
26  *   SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
27  *   LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
28  *   DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
29  *   THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
30  *   (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
31  *   OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
32  */
33 
34 #include "spdk/stdinc.h"
35 
36 #include "spdk/scsi.h"
37 
38 #include "CUnit/Basic.h"
39 #include "spdk_internal/mock.h"
40 
41 #include "../common.c"
42 #include "iscsi/tgt_node.c"
43 #include "scsi/scsi_internal.h"
44 #include "unit/lib/json_mock.c"
45 #include "common/lib/test_env.c"
46 
47 struct spdk_iscsi_globals g_spdk_iscsi;
48 
49 const char *config_file;
50 
51 DEFINE_STUB(spdk_scsi_dev_get_id,
52 	    int,
53 	    (const struct spdk_scsi_dev *dev),
54 	    0);
55 
56 DEFINE_STUB(spdk_scsi_lun_get_bdev_name,
57 	    const char *,
58 	    (const struct spdk_scsi_lun *lun),
59 	    NULL);
60 
61 DEFINE_STUB(spdk_scsi_lun_get_id,
62 	    int,
63 	    (const struct spdk_scsi_lun *lun),
64 	    0);
65 
66 DEFINE_STUB_V(spdk_iscsi_op_abort_task_set,
67 	      (struct spdk_iscsi_task *task,
68 	       uint8_t function));
69 
70 DEFINE_STUB(spdk_sock_is_ipv6, bool, (struct spdk_sock *sock), false);
71 
72 DEFINE_STUB(spdk_sock_is_ipv4, bool, (struct spdk_sock *sock), false);
73 
74 DEFINE_STUB(spdk_iscsi_portal_grp_find_by_tag,
75 	    struct spdk_iscsi_portal_grp *, (int tag), NULL);
76 
77 DEFINE_STUB(spdk_iscsi_init_grp_find_by_tag, struct spdk_iscsi_init_grp *,
78 	    (int tag), NULL);
79 
80 struct spdk_scsi_lun *
81 spdk_scsi_dev_get_lun(struct spdk_scsi_dev *dev, int lun_id)
82 {
83 	if (lun_id < 0 || lun_id >= SPDK_SCSI_DEV_MAX_LUN) {
84 		return NULL;
85 	}
86 
87 	return dev->lun[lun_id];
88 }
89 
90 int
91 spdk_scsi_dev_add_lun(struct spdk_scsi_dev *dev, const char *bdev_name, int lun_id,
92 		      void (*hotremove_cb)(const struct spdk_scsi_lun *, void *),
93 		      void *hotremove_ctx)
94 {
95 	if (bdev_name == NULL) {
96 		return -1;
97 	} else {
98 		return 0;
99 	}
100 }
101 
102 static void
103 add_lun_test_cases(void)
104 {
105 	struct spdk_iscsi_tgt_node tgtnode;
106 	int lun_id = 0;
107 	char *bdev_name = NULL;
108 	struct spdk_scsi_dev scsi_dev;
109 	int rc;
110 
111 	memset(&tgtnode, 0, sizeof(struct spdk_iscsi_tgt_node));
112 	memset(&scsi_dev, 0, sizeof(struct spdk_scsi_dev));
113 
114 	/* case 1 */
115 	tgtnode.num_active_conns = 1;
116 
117 	rc = spdk_iscsi_tgt_node_add_lun(&tgtnode, bdev_name, lun_id);
118 	CU_ASSERT(rc != 0);
119 
120 	/* case 2 */
121 	tgtnode.num_active_conns = 0;
122 	lun_id = -2;
123 
124 	rc = spdk_iscsi_tgt_node_add_lun(&tgtnode, bdev_name, lun_id);
125 	CU_ASSERT(rc != 0);
126 
127 	/* case 3 */
128 	lun_id = SPDK_SCSI_DEV_MAX_LUN;
129 
130 	rc = spdk_iscsi_tgt_node_add_lun(&tgtnode, bdev_name, lun_id);
131 	CU_ASSERT(rc != 0);
132 
133 	/* case 4 */
134 	lun_id = -1;
135 	tgtnode.dev = NULL;
136 
137 	rc = spdk_iscsi_tgt_node_add_lun(&tgtnode, bdev_name, lun_id);
138 	CU_ASSERT(rc != 0);
139 
140 	/* case 5 */
141 	tgtnode.dev = &scsi_dev;
142 
143 	rc = spdk_iscsi_tgt_node_add_lun(&tgtnode, bdev_name, lun_id);
144 	CU_ASSERT(rc != 0);
145 
146 	/* case 6 */
147 	bdev_name = "LUN0";
148 
149 	rc = spdk_iscsi_tgt_node_add_lun(&tgtnode, bdev_name, lun_id);
150 	CU_ASSERT(rc == 0);
151 }
152 
153 static void
154 config_file_fail_cases(void)
155 {
156 	struct spdk_conf *config;
157 	struct spdk_conf_section *sp;
158 	char section_name[64];
159 	int section_index;
160 	int rc;
161 
162 	config = spdk_conf_allocate();
163 
164 	rc = spdk_conf_read(config, config_file);
165 	CU_ASSERT(rc == 0);
166 
167 	section_index = 0;
168 	while (true) {
169 		snprintf(section_name, sizeof(section_name), "Failure%d", section_index);
170 		sp = spdk_conf_find_section(config, section_name);
171 		if (sp == NULL) {
172 			break;
173 		}
174 		rc = iscsi_parse_tgt_node(sp);
175 		CU_ASSERT(rc < 0);
176 		section_index++;
177 	}
178 
179 	spdk_conf_free(config);
180 }
181 
182 static void
183 allow_any_allowed(void)
184 {
185 	bool result;
186 	char *netmask;
187 	char *addr1, *addr2;
188 
189 	netmask = "ANY";
190 	addr1 = "2001:ad6:1234:5678:9abc::";
191 	addr2 = "192.168.2.1";
192 
193 	result = iscsi_netmask_allow_addr(netmask, addr1);
194 	CU_ASSERT(result == true);
195 
196 	result = iscsi_netmask_allow_addr(netmask, addr2);
197 	CU_ASSERT(result == true);
198 }
199 
200 static void
201 allow_ipv6_allowed(void)
202 {
203 	bool result;
204 	char *netmask;
205 	char *addr;
206 
207 	netmask = "[2001:ad6:1234::]/48";
208 	addr = "2001:ad6:1234:5678:9abc::";
209 
210 	result = iscsi_ipv6_netmask_allow_addr(netmask, addr);
211 	CU_ASSERT(result == true);
212 
213 	result = iscsi_netmask_allow_addr(netmask, addr);
214 	CU_ASSERT(result == true);
215 
216 	/* Netmask prefix bits == 128 (all bits must match) */
217 	netmask = "[2001:ad6:1234:5678:9abc::1]/128";
218 	addr = "2001:ad6:1234:5678:9abc::1";
219 	result = iscsi_ipv6_netmask_allow_addr(netmask, addr);
220 	CU_ASSERT(result == true);
221 }
222 
223 static void
224 allow_ipv6_denied(void)
225 {
226 	bool result;
227 	char *netmask;
228 	char *addr;
229 
230 	netmask = "[2001:ad6:1234::]/56";
231 	addr = "2001:ad6:1234:5678:9abc::";
232 
233 	result = iscsi_ipv6_netmask_allow_addr(netmask, addr);
234 	CU_ASSERT(result == false);
235 
236 	result = iscsi_netmask_allow_addr(netmask, addr);
237 	CU_ASSERT(result == false);
238 
239 	/* Netmask prefix bits == 128 (all bits must match) */
240 	netmask = "[2001:ad6:1234:5678:9abc::1]/128";
241 	addr = "2001:ad6:1234:5678:9abc::2";
242 	result = iscsi_ipv6_netmask_allow_addr(netmask, addr);
243 	CU_ASSERT(result == false);
244 }
245 
246 static void
247 allow_ipv6_invalid(void)
248 {
249 	bool result;
250 	char *netmask;
251 	char *addr;
252 
253 	/* Netmask prefix bits > 128 */
254 	netmask = "[2001:ad6:1234::]/129";
255 	addr = "2001:ad6:1234:5678:9abc::";
256 	result = iscsi_ipv6_netmask_allow_addr(netmask, addr);
257 	CU_ASSERT(result == false);
258 
259 	/* Netmask prefix bits == 0 */
260 	netmask = "[2001:ad6:1234::]/0";
261 	addr = "2001:ad6:1234:5678:9abc::";
262 	result = iscsi_ipv6_netmask_allow_addr(netmask, addr);
263 	CU_ASSERT(result == false);
264 
265 	/* Netmask prefix bits < 0 */
266 	netmask = "[2001:ad6:1234::]/-1";
267 	addr = "2001:ad6:1234:5678:9abc::";
268 	result = iscsi_ipv6_netmask_allow_addr(netmask, addr);
269 	CU_ASSERT(result == false);
270 }
271 
272 static void
273 allow_ipv4_allowed(void)
274 {
275 	bool result;
276 	char *netmask;
277 	char *addr;
278 
279 	netmask = "192.168.2.0/24";
280 	addr = "192.168.2.1";
281 
282 	result = iscsi_ipv4_netmask_allow_addr(netmask, addr);
283 	CU_ASSERT(result == true);
284 
285 	result = iscsi_netmask_allow_addr(netmask, addr);
286 	CU_ASSERT(result == true);
287 
288 	/* Netmask prefix == 32 (all bits must match) */
289 	netmask = "192.168.2.1/32";
290 	addr = "192.168.2.1";
291 	result = iscsi_ipv4_netmask_allow_addr(netmask, addr);
292 	CU_ASSERT(result == true);
293 }
294 
295 static void
296 allow_ipv4_denied(void)
297 {
298 	bool result;
299 	char *netmask;
300 	char *addr;
301 
302 	netmask = "192.168.2.0";
303 	addr  = "192.168.2.1";
304 
305 	result = iscsi_ipv4_netmask_allow_addr(netmask, addr);
306 	CU_ASSERT(result == false);
307 
308 	result = iscsi_netmask_allow_addr(netmask, addr);
309 	CU_ASSERT(result == false);
310 
311 	/* Netmask prefix == 32 (all bits must match) */
312 	netmask = "192.168.2.1/32";
313 	addr = "192.168.2.2";
314 	result = iscsi_ipv4_netmask_allow_addr(netmask, addr);
315 	CU_ASSERT(result == false);
316 }
317 
318 static void
319 allow_ipv4_invalid(void)
320 {
321 	bool result;
322 	char *netmask;
323 	char *addr;
324 
325 	/* Netmask prefix bits > 32 */
326 	netmask = "192.168.2.0/33";
327 	addr = "192.168.2.1";
328 	result = iscsi_ipv4_netmask_allow_addr(netmask, addr);
329 	CU_ASSERT(result == false);
330 
331 	/* Netmask prefix bits == 0 */
332 	netmask = "192.168.2.0/0";
333 	addr = "192.168.2.1";
334 	result = iscsi_ipv4_netmask_allow_addr(netmask, addr);
335 	CU_ASSERT(result == false);
336 
337 	/* Netmask prefix bits < 0 */
338 	netmask = "192.168.2.0/-1";
339 	addr = "192.168.2.1";
340 	result = iscsi_ipv4_netmask_allow_addr(netmask, addr);
341 	CU_ASSERT(result == false);
342 }
343 
344 static void
345 node_access_allowed(void)
346 {
347 	struct spdk_iscsi_tgt_node tgtnode;
348 	struct spdk_iscsi_portal_grp pg;
349 	struct spdk_iscsi_init_grp ig;
350 	struct spdk_iscsi_conn conn;
351 	struct spdk_iscsi_portal portal;
352 	struct spdk_iscsi_initiator_name iname;
353 	struct spdk_iscsi_initiator_netmask imask;
354 	struct spdk_scsi_dev scsi_dev;
355 	struct spdk_iscsi_pg_map *pg_map;
356 	char *iqn, *addr;
357 	bool result;
358 
359 	/* portal group initialization */
360 	memset(&pg, 0, sizeof(struct spdk_iscsi_portal_grp));
361 	pg.tag = 1;
362 
363 	/* initiator group initialization */
364 	memset(&ig, 0, sizeof(struct spdk_iscsi_init_grp));
365 	ig.tag = 1;
366 
367 	ig.ninitiators = 1;
368 	snprintf(iname.name, sizeof(iname.name), "iqn.2017-10.spdk.io:0001");
369 	TAILQ_INIT(&ig.initiator_head);
370 	TAILQ_INSERT_TAIL(&ig.initiator_head, &iname, tailq);
371 
372 	ig.nnetmasks = 1;
373 	snprintf(imask.mask, sizeof(imask.mask), "192.168.2.0/24");
374 	TAILQ_INIT(&ig.netmask_head);
375 	TAILQ_INSERT_TAIL(&ig.netmask_head, &imask, tailq);
376 
377 	/* target initialization */
378 	memset(&tgtnode, 0, sizeof(struct spdk_iscsi_tgt_node));
379 	snprintf(tgtnode.name, sizeof(tgtnode.name), "iqn.2017-10.spdk.io:0001");
380 	TAILQ_INIT(&tgtnode.pg_map_head);
381 
382 	memset(&scsi_dev, 0, sizeof(struct spdk_scsi_dev));
383 	snprintf(scsi_dev.name, sizeof(scsi_dev.name), "iqn.2017-10.spdk.io:0001");
384 	tgtnode.dev = &scsi_dev;
385 
386 	pg_map = iscsi_tgt_node_add_pg_map(&tgtnode, &pg);
387 	iscsi_pg_map_add_ig_map(pg_map, &ig);
388 
389 	/* portal initialization */
390 	memset(&portal, 0, sizeof(struct spdk_iscsi_portal));
391 	portal.group = &pg;
392 	snprintf(portal.host, sizeof(portal.host), "192.168.2.0");
393 	snprintf(portal.port, sizeof(portal.port), "3260");
394 
395 	/* input for UT */
396 	memset(&conn, 0, sizeof(struct spdk_iscsi_conn));
397 	conn.portal = &portal;
398 
399 	iqn = "iqn.2017-10.spdk.io:0001";
400 	addr = "192.168.2.1";
401 
402 	result = spdk_iscsi_tgt_node_access(&conn, &tgtnode, iqn, addr);
403 	CU_ASSERT(result == true);
404 
405 	iscsi_pg_map_delete_ig_map(pg_map, &ig);
406 	iscsi_tgt_node_delete_pg_map(&tgtnode, &pg);
407 }
408 
409 static void
410 node_access_denied_by_empty_netmask(void)
411 {
412 	struct spdk_iscsi_tgt_node tgtnode;
413 	struct spdk_iscsi_portal_grp pg;
414 	struct spdk_iscsi_init_grp ig;
415 	struct spdk_iscsi_conn conn;
416 	struct spdk_iscsi_portal portal;
417 	struct spdk_iscsi_initiator_name iname;
418 	struct spdk_scsi_dev scsi_dev;
419 	struct spdk_iscsi_pg_map *pg_map;
420 	char *iqn, *addr;
421 	bool result;
422 
423 	/* portal group initialization */
424 	memset(&pg, 0, sizeof(struct spdk_iscsi_portal_grp));
425 	pg.tag = 1;
426 
427 	/* initiator group initialization */
428 	memset(&ig, 0, sizeof(struct spdk_iscsi_init_grp));
429 	ig.tag = 1;
430 
431 	ig.ninitiators = 1;
432 	snprintf(iname.name, sizeof(iname.name), "iqn.2017-10.spdk.io:0001");
433 	TAILQ_INIT(&ig.initiator_head);
434 	TAILQ_INSERT_TAIL(&ig.initiator_head, &iname, tailq);
435 
436 	ig.nnetmasks = 0;
437 	TAILQ_INIT(&ig.netmask_head);
438 
439 	/* target initialization */
440 	memset(&tgtnode, 0, sizeof(struct spdk_iscsi_tgt_node));
441 	snprintf(tgtnode.name, sizeof(tgtnode.name), "iqn.2017-10.spdk.io:0001");
442 	TAILQ_INIT(&tgtnode.pg_map_head);
443 
444 	memset(&scsi_dev, 0, sizeof(struct spdk_scsi_dev));
445 	snprintf(scsi_dev.name, sizeof(scsi_dev.name), "iqn.2017-10.spdk.io:0001");
446 	tgtnode.dev = &scsi_dev;
447 
448 	pg_map = iscsi_tgt_node_add_pg_map(&tgtnode, &pg);
449 	iscsi_pg_map_add_ig_map(pg_map, &ig);
450 
451 	/* portal initialization */
452 	memset(&portal, 0, sizeof(struct spdk_iscsi_portal));
453 	portal.group = &pg;
454 	snprintf(portal.host, sizeof(portal.host), "192.168.2.0");
455 	snprintf(portal.port, sizeof(portal.port), "3260");
456 
457 	/* input for UT */
458 	memset(&conn, 0, sizeof(struct spdk_iscsi_conn));
459 	conn.portal = &portal;
460 
461 	iqn = "iqn.2017-10.spdk.io:0001";
462 	addr = "192.168.3.1";
463 
464 	result = spdk_iscsi_tgt_node_access(&conn, &tgtnode, iqn, addr);
465 	CU_ASSERT(result == false);
466 
467 	iscsi_pg_map_delete_ig_map(pg_map, &ig);
468 	iscsi_tgt_node_delete_pg_map(&tgtnode, &pg);
469 }
470 
471 #define IQN1	"iqn.2017-11.spdk.io:0001"
472 #define NO_IQN1	"!iqn.2017-11.spdk.io:0001"
473 #define IQN2	"iqn.2017-11.spdk.io:0002"
474 #define IP1	"192.168.2.0"
475 #define	IP2	"192.168.2.1"
476 
477 static void
478 node_access_multi_initiator_groups_cases(void)
479 {
480 	struct spdk_iscsi_tgt_node tgtnode;
481 	struct spdk_iscsi_conn conn;
482 	struct spdk_iscsi_portal_grp pg;
483 	struct spdk_iscsi_portal portal;
484 	struct spdk_iscsi_init_grp ig1, ig2;
485 	struct spdk_iscsi_initiator_name iname1 = {}, iname2 = {};
486 	struct spdk_iscsi_initiator_netmask imask1 = {}, imask2 = {};
487 	struct spdk_scsi_dev scsi_dev;
488 	struct spdk_iscsi_pg_map *pg_map;
489 	char *iqn, *addr;
490 	bool result;
491 
492 	/* target initialization */
493 	memset(&tgtnode, 0, sizeof(struct spdk_iscsi_tgt_node));
494 	snprintf(tgtnode.name, sizeof(tgtnode.name), IQN1);
495 	TAILQ_INIT(&tgtnode.pg_map_head);
496 
497 	memset(&scsi_dev, 0, sizeof(struct spdk_scsi_dev));
498 	snprintf(scsi_dev.name, sizeof(scsi_dev.name), IQN1);
499 	tgtnode.dev = &scsi_dev;
500 
501 	/* initiator group initialization */
502 	memset(&ig1, 0, sizeof(struct spdk_iscsi_init_grp));
503 	ig1.tag = 1;
504 	TAILQ_INIT(&ig1.initiator_head);
505 	TAILQ_INIT(&ig1.netmask_head);
506 
507 	ig1.ninitiators = 1;
508 	TAILQ_INSERT_TAIL(&ig1.initiator_head, &iname1, tailq);
509 
510 	ig1.nnetmasks = 1;
511 	TAILQ_INSERT_TAIL(&ig1.netmask_head, &imask1, tailq);
512 
513 	memset(&ig2, 0, sizeof(struct spdk_iscsi_init_grp));
514 	ig2.tag = 2;
515 	TAILQ_INIT(&ig2.initiator_head);
516 	TAILQ_INIT(&ig2.netmask_head);
517 
518 	ig2.ninitiators = 1;
519 	TAILQ_INSERT_TAIL(&ig2.initiator_head, &iname2, tailq);
520 
521 	ig2.nnetmasks = 1;
522 	TAILQ_INSERT_TAIL(&ig2.netmask_head, &imask2, tailq);
523 
524 	/* portal group initialization */
525 	memset(&pg, 0, sizeof(struct spdk_iscsi_portal_grp));
526 	pg.tag = 1;
527 
528 	pg_map = iscsi_tgt_node_add_pg_map(&tgtnode, &pg);
529 	iscsi_pg_map_add_ig_map(pg_map, &ig1);
530 	iscsi_pg_map_add_ig_map(pg_map, &ig2);
531 
532 	/* portal initialization */
533 	memset(&portal, 0, sizeof(struct spdk_iscsi_portal));
534 	portal.group = &pg;
535 	snprintf(portal.host, sizeof(portal.host), IP1);
536 	snprintf(portal.port, sizeof(portal.port), "3260");
537 
538 	/* connection initialization */
539 	memset(&conn, 0, sizeof(struct spdk_iscsi_conn));
540 	conn.portal = &portal;
541 
542 	iqn = IQN1;
543 	addr = IP1;
544 
545 	/*
546 	 * case 1:
547 	 * +-------------------------------------------+---------+
548 	 * | IG1                 | IG2                 |         |
549 	 * +-------------------------------------------+         |
550 	 * | name      | addr    | name      | addr    | result  |
551 	 * +-------------------------------------------+---------+
552 	 * +-------------------------------------------+---------+
553 	 * | denied    | -       | -         | -       | denied  |
554 	 * +-------------------------------------------+---------+
555 	 */
556 	snprintf(iname1.name, sizeof(iname1.name), NO_IQN1);
557 
558 	result = spdk_iscsi_tgt_node_access(&conn, &tgtnode, iqn, addr);
559 	CU_ASSERT(result == false);
560 
561 	/*
562 	 * case 2:
563 	 * +-------------------------------------------+---------+
564 	 * | IG1                 | IG2                 |         |
565 	 * +-------------------------------------------+         |
566 	 * | name      | addr    | name      | addr    | result  |
567 	 * +-------------------------------------------+---------+
568 	 * +-------------------------------------------+---------+
569 	 * | allowed   | allowed | -         | -       | allowed |
570 	 * +-------------------------------------------+---------+
571 	 */
572 	snprintf(iname1.name, sizeof(iname1.name), IQN1);
573 	snprintf(imask1.mask, sizeof(imask1.mask), IP1);
574 
575 	result = spdk_iscsi_tgt_node_access(&conn, &tgtnode, iqn, addr);
576 	CU_ASSERT(result == true);
577 
578 	/*
579 	 * case 3:
580 	 * +-------------------------------------------+---------+
581 	 * | IG1                 | IG2                 |         |
582 	 * +-------------------------------------------+         |
583 	 * | name      | addr    | name     | addr     | result  |
584 	 * +-------------------------------------------+---------+
585 	 * +-------------------------------------------+---------+
586 	 * | allowed   | denied  | denied   | -        | denied  |
587 	 * +-------------------------------------------+---------+
588 	 */
589 	snprintf(iname1.name, sizeof(iname1.name), IQN1);
590 	snprintf(imask1.mask, sizeof(imask1.mask), IP2);
591 	snprintf(iname2.name, sizeof(iname2.name), NO_IQN1);
592 
593 	result = spdk_iscsi_tgt_node_access(&conn, &tgtnode, iqn, addr);
594 	CU_ASSERT(result == false);
595 
596 	/*
597 	 * case 4:
598 	 * +-------------------------------------------+---------+
599 	 * | IG1                 | IG2                 |         |
600 	 * +-------------------------------------------+         |
601 	 * | name      | addr    | name      | addr    | result  |
602 	 * +-------------------------------------------+---------+
603 	 * +-------------------------------------------+---------+
604 	 * | allowed   | denied  | allowed   | allowed | allowed |
605 	 * +-------------------------------------------+---------+
606 	 */
607 	snprintf(iname1.name, sizeof(iname1.name), IQN1);
608 	snprintf(imask1.mask, sizeof(imask1.mask), IP2);
609 	snprintf(iname2.name, sizeof(iname2.name), IQN1);
610 	snprintf(imask2.mask, sizeof(imask2.mask), IP1);
611 
612 	result = spdk_iscsi_tgt_node_access(&conn, &tgtnode, iqn, addr);
613 	CU_ASSERT(result == true);
614 
615 	/*
616 	 * case 5:
617 	 * +---------------------------------------------+---------+
618 	 * | IG1                 | IG2                   |         |
619 	 * +---------------------------------------------+         |
620 	 * | name      | addr    | name        | addr    | result  |
621 	 * +---------------------------------------------+---------+
622 	 * +---------------------------------------------+---------+
623 	 * | allowed   | denied  | allowed     | denied  | denied  |
624 	 * +---------------------------------------------+---------+
625 	 */
626 	snprintf(iname1.name, sizeof(iname1.name), IQN1);
627 	snprintf(imask1.mask, sizeof(imask1.mask), IP2);
628 	snprintf(iname2.name, sizeof(iname2.name), IQN1);
629 	snprintf(imask2.mask, sizeof(imask2.mask), IP2);
630 
631 	result = spdk_iscsi_tgt_node_access(&conn, &tgtnode, iqn, addr);
632 	CU_ASSERT(result == false);
633 
634 	/*
635 	 * case 6:
636 	 * +---------------------------------------------+---------+
637 	 * | IG1                 | IG2                   |         |
638 	 * +---------------------------------------------+         |
639 	 * | name      | addr    | name        | addr    | result  |
640 	 * +---------------------------------------------+---------+
641 	 * +---------------------------------------------+---------+
642 	 * | allowed   | denied  | not found   | -       | denied  |
643 	 * +---------------------------------------------+---------+
644 	 */
645 	snprintf(iname1.name, sizeof(iname1.name), IQN1);
646 	snprintf(imask1.mask, sizeof(imask1.mask), IP2);
647 	snprintf(iname2.name, sizeof(iname2.name), IQN2);
648 
649 	result = spdk_iscsi_tgt_node_access(&conn, &tgtnode, iqn, addr);
650 	CU_ASSERT(result == false);
651 
652 	/*
653 	 * case 7:
654 	 * +---------------------------------------------+---------+
655 	 * | IG1                   | IG2                 |         |
656 	 * +---------------------------------------------+         |
657 	 * | name        | addr    | name      | addr    | result  |
658 	 * +---------------------------------------------+---------+
659 	 * +---------------------------------------------+---------+
660 	 * | not found   | -       | denied    | -       | denied  |
661 	 * +---------------------------------------------+---------+
662 	 */
663 	snprintf(iname1.name, sizeof(iname1.name), IQN2);
664 	snprintf(iname2.name, sizeof(iname2.name), NO_IQN1);
665 
666 	result = spdk_iscsi_tgt_node_access(&conn, &tgtnode, iqn, addr);
667 	CU_ASSERT(result == false);
668 
669 	/*
670 	 * case 8:
671 	 * +---------------------------------------------+---------+
672 	 * | IG1                   | IG2                 |         |
673 	 * +---------------------------------------------+         |
674 	 * | name        | addr    | name      | addr    | result  |
675 	 * +---------------------------------------------+---------+
676 	 * +---------------------------------------------+---------+
677 	 * | not found   | -       | allowed   | allowed | allowed |
678 	 * +---------------------------------------------+---------+
679 	 */
680 	snprintf(iname1.name, sizeof(iname1.name), IQN2);
681 	snprintf(iname2.name, sizeof(iname2.name), IQN1);
682 	snprintf(imask2.mask, sizeof(imask2.mask), IP1);
683 
684 	result = spdk_iscsi_tgt_node_access(&conn, &tgtnode, iqn, addr);
685 	CU_ASSERT(result == true);
686 
687 	/*
688 	 * case 9:
689 	 * +---------------------------------------------+---------+
690 	 * | IG1                   | IG2                 |         |
691 	 * +---------------------------------------------+         |
692 	 * | name        | addr    | name      | addr    | result  |
693 	 * +---------------------------------------------+---------+
694 	 * +---------------------------------------------+---------+
695 	 * | not found   | -       | allowed   | denied  | denied  |
696 	 * +---------------------------------------------+---------+
697 	 */
698 	snprintf(iname1.name, sizeof(iname1.name), IQN2);
699 	snprintf(iname2.name, sizeof(iname2.name), IQN1);
700 	snprintf(imask2.mask, sizeof(imask2.mask), IP2);
701 
702 	result = spdk_iscsi_tgt_node_access(&conn, &tgtnode, iqn, addr);
703 	CU_ASSERT(result == false);
704 
705 	/*
706 	 * case 10:
707 	 * +---------------------------------------------+---------+
708 	 * | IG1                   | IG2                 |         |
709 	 * +---------------------------------------------+         |
710 	 * | name        | addr    | name      | addr    | result  |
711 	 * +---------------------------------------------+---------+
712 	 * +---------------------------------------------+---------+
713 	 * | not found   | -       | not found | -       | denied  |
714 	 * +---------------------------------------------+---------+
715 	 */
716 	snprintf(iname1.name, sizeof(iname1.name), IQN2);
717 	snprintf(iname2.name, sizeof(iname2.name), IQN2);
718 
719 	result = spdk_iscsi_tgt_node_access(&conn, &tgtnode, iqn, addr);
720 	CU_ASSERT(result == false);
721 
722 	iscsi_pg_map_delete_ig_map(pg_map, &ig1);
723 	iscsi_pg_map_delete_ig_map(pg_map, &ig2);
724 	iscsi_tgt_node_delete_pg_map(&tgtnode, &pg);
725 }
726 
727 static void
728 allow_iscsi_name_multi_maps_case(void)
729 {
730 	struct spdk_iscsi_tgt_node tgtnode;
731 	struct spdk_iscsi_portal_grp pg1, pg2;
732 	struct spdk_iscsi_init_grp ig;
733 	struct spdk_iscsi_initiator_name iname = {};
734 	struct spdk_iscsi_pg_map *pg_map1, *pg_map2;
735 	struct spdk_scsi_dev scsi_dev;
736 	char *iqn;
737 	bool result;
738 
739 	/* target initialization */
740 	memset(&tgtnode, 0, sizeof(struct spdk_iscsi_tgt_node));
741 	TAILQ_INIT(&tgtnode.pg_map_head);
742 
743 	memset(&scsi_dev, 0, sizeof(struct spdk_scsi_dev));
744 	snprintf(scsi_dev.name, sizeof(scsi_dev.name), IQN1);
745 	tgtnode.dev = &scsi_dev;
746 
747 	/* initiator group initialization */
748 	memset(&ig, 0, sizeof(struct spdk_iscsi_init_grp));
749 	TAILQ_INIT(&ig.initiator_head);
750 
751 	ig.ninitiators = 1;
752 	TAILQ_INSERT_TAIL(&ig.initiator_head, &iname, tailq);
753 
754 	/* portal group initialization */
755 	memset(&pg1, 0, sizeof(struct spdk_iscsi_portal_grp));
756 	pg1.tag = 1;
757 	memset(&pg2, 0, sizeof(struct spdk_iscsi_portal_grp));
758 	pg2.tag = 1;
759 
760 	pg_map1 = iscsi_tgt_node_add_pg_map(&tgtnode, &pg1);
761 	pg_map2 = iscsi_tgt_node_add_pg_map(&tgtnode, &pg2);
762 	iscsi_pg_map_add_ig_map(pg_map1, &ig);
763 	iscsi_pg_map_add_ig_map(pg_map2, &ig);
764 
765 	/* test for IG1 <-> PG1, PG2 case */
766 	iqn = IQN1;
767 
768 	snprintf(iname.name, sizeof(iname.name), IQN1);
769 
770 	result = iscsi_tgt_node_allow_iscsi_name(&tgtnode, iqn);
771 	CU_ASSERT(result == true);
772 
773 	snprintf(iname.name, sizeof(iname.name), IQN2);
774 
775 	result = iscsi_tgt_node_allow_iscsi_name(&tgtnode, iqn);
776 	CU_ASSERT(result == false);
777 
778 	iscsi_pg_map_delete_ig_map(pg_map1, &ig);
779 	iscsi_pg_map_delete_ig_map(pg_map2, &ig);
780 	iscsi_tgt_node_delete_pg_map(&tgtnode, &pg1);
781 	iscsi_tgt_node_delete_pg_map(&tgtnode, &pg2);
782 }
783 
784 /*
785  * static bool
786  * spdk_iscsi_check_chap_params(bool disable_chap, bool require_chap,
787  *                              bool mutual_chap, int chap_group);
788  */
789 static void
790 chap_param_test_cases(void)
791 {
792 	/* Auto */
793 	CU_ASSERT(spdk_iscsi_check_chap_params(false, false, false, 0) == true);
794 
795 	/* None */
796 	CU_ASSERT(spdk_iscsi_check_chap_params(true, false, false, 0) == true);
797 
798 	/* CHAP */
799 	CU_ASSERT(spdk_iscsi_check_chap_params(false, true, false, 0) == true);
800 
801 	/* CHAP Mutual */
802 	CU_ASSERT(spdk_iscsi_check_chap_params(false, true, true, 0) == true);
803 
804 	/* Check mutual exclusiveness of disabled and required */
805 	CU_ASSERT(spdk_iscsi_check_chap_params(true, true, false, 0) == false);
806 
807 	/* Mutual requires Required */
808 	CU_ASSERT(spdk_iscsi_check_chap_params(false, false, true, 0) == false);
809 
810 	/* Remaining combinations */
811 	CU_ASSERT(spdk_iscsi_check_chap_params(true, false, true, 0) == false);
812 	CU_ASSERT(spdk_iscsi_check_chap_params(true, true, true, 0) == false);
813 
814 	/* Valid auth group ID */
815 	CU_ASSERT(spdk_iscsi_check_chap_params(false, false, false, 1) == true);
816 
817 	/* Invalid auth group ID */
818 	CU_ASSERT(spdk_iscsi_check_chap_params(false, false, false, -1) == false);
819 }
820 
821 int
822 main(int argc, char **argv)
823 {
824 	CU_pSuite	suite = NULL;
825 	unsigned int	num_failures;
826 
827 	if (argc < 2) {
828 		fprintf(stderr, "usage: %s <config file>\n", argv[0]);
829 		exit(1);
830 	}
831 
832 	if (CU_initialize_registry() != CUE_SUCCESS) {
833 		return CU_get_error();
834 	}
835 
836 	config_file = argv[1];
837 
838 	suite = CU_add_suite("iscsi_target_node_suite", NULL, NULL);
839 	if (suite == NULL) {
840 		CU_cleanup_registry();
841 		return CU_get_error();
842 	}
843 
844 	if (
845 		CU_add_test(suite, "add lun test cases", add_lun_test_cases) == NULL
846 		|| CU_add_test(suite, "config file fail cases", config_file_fail_cases) == NULL
847 		|| CU_add_test(suite, "allow any allowed case", allow_any_allowed) == NULL
848 		|| CU_add_test(suite, "allow ipv6 allowed case", allow_ipv6_allowed) == NULL
849 		|| CU_add_test(suite, "allow ipv6 denied case", allow_ipv6_denied) == NULL
850 		|| CU_add_test(suite, "allow ipv6 invalid case", allow_ipv6_invalid) == NULL
851 		|| CU_add_test(suite, "allow ipv4 allowed case", allow_ipv4_allowed) == NULL
852 		|| CU_add_test(suite, "allow ipv4 denied case", allow_ipv4_denied) == NULL
853 		|| CU_add_test(suite, "allow ipv4 invalid case", allow_ipv4_invalid) == NULL
854 		|| CU_add_test(suite, "node access allowed case", node_access_allowed) == NULL
855 		|| CU_add_test(suite, "node access denied case (empty netmask)",
856 			       node_access_denied_by_empty_netmask) == NULL
857 		|| CU_add_test(suite, "node access multiple initiator groups cases",
858 			       node_access_multi_initiator_groups_cases) == NULL
859 		|| CU_add_test(suite, "allow iscsi name case",
860 			       allow_iscsi_name_multi_maps_case) == NULL
861 		|| CU_add_test(suite, "chap param test cases", chap_param_test_cases) == NULL
862 	) {
863 		CU_cleanup_registry();
864 		return CU_get_error();
865 	}
866 
867 	CU_basic_set_mode(CU_BRM_VERBOSE);
868 	CU_basic_run_tests();
869 	num_failures = CU_get_number_of_failures();
870 	CU_cleanup_registry();
871 	return num_failures;
872 }
873