2019-10-31 13:31:07 -05:00
|
|
|
#!/usr/bin/env python3
|
2017-04-12 19:21:16 +08:00
|
|
|
|
2020-05-02 22:34:40 -04:00
|
|
|
from util import ip4_range
|
2017-04-12 19:21:16 +08:00
|
|
|
import unittest
|
2023-08-31 00:47:44 -04:00
|
|
|
from framework import VppTestCase
|
|
|
|
from asfframework import VppTestRunner, tag_fixme_vpp_workers
|
2017-04-12 19:21:16 +08:00
|
|
|
from template_bd import BridgeDomain
|
2024-03-11 10:38:46 +00:00
|
|
|
from config import config
|
2017-04-12 19:21:16 +08:00
|
|
|
|
2019-12-13 23:39:35 +00:00
|
|
|
from scapy.layers.l2 import Ether
|
2017-04-12 19:21:16 +08:00
|
|
|
from scapy.layers.inet import IP, UDP
|
2019-05-23 13:01:41 +02:00
|
|
|
from scapy.layers.inet6 import IPv6
|
2017-04-12 19:21:16 +08:00
|
|
|
from scapy.contrib.gtp import GTP_U_Header
|
2020-05-02 22:34:40 -04:00
|
|
|
|
|
|
|
import util
|
2018-05-01 05:17:55 -07:00
|
|
|
from vpp_ip_route import VppIpRoute, VppRoutePath
|
|
|
|
from vpp_ip import INVALID_INDEX
|
2017-04-12 19:21:16 +08:00
|
|
|
|
|
|
|
|
2021-01-29 13:17:19 +00:00
|
|
|
@tag_fixme_vpp_workers
|
2024-03-11 10:38:46 +00:00
|
|
|
@unittest.skipIf("gtpu" in config.excluded_plugins, "Exclude GTPU plugin tests")
|
2019-05-23 13:01:41 +02:00
|
|
|
class TestGtpuUDP(VppTestCase):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""GTPU UDP ports Test Case"""
|
2019-05-23 13:01:41 +02:00
|
|
|
|
|
|
|
def setUp(self):
|
2019-06-06 18:01:07 -04:00
|
|
|
super(TestGtpuUDP, self).setUp()
|
2019-05-23 13:01:41 +02:00
|
|
|
|
|
|
|
self.dport = 2152
|
|
|
|
|
|
|
|
self.ip4_err = 0
|
|
|
|
self.ip6_err = 0
|
|
|
|
|
|
|
|
self.create_pg_interfaces(range(1))
|
|
|
|
for pg in self.pg_interfaces:
|
|
|
|
pg.admin_up()
|
|
|
|
self.pg0.config_ip4()
|
|
|
|
self.pg0.config_ip6()
|
|
|
|
|
|
|
|
def _check_udp_port_ip4(self, enabled=True):
|
2022-04-26 19:02:15 +02:00
|
|
|
pkt = (
|
ethernet: check destination mac for L3 in ethernet-input node
When the NIC does not support mac filter, we rely on ethernet-input
node to do the destination mac check, ie, when the interface is in L3,
the mac address for the packet must be the mac address of the
interface where the packet arrives. This works fine in ethernet-input
node when all packets in the frame might have different interfaces, ie,
ETH_INPUT_FRAME_F_SINGLE_SW_IF_ID is not set in the frame. However,
when all packets are having the same interface,
ETH_INPUT_FRAME_F_SINGLE_SW_IF_ID is set, ethernet-input node goes
through the optimized routine eth_input_single_int -> eth_input_process_frame.
That is where dmac check has a bug when all packets in the frame are
either, ip4, ip6, or mpls without vlan tags. Because without vlan tags,
the code handles all packets in fast path and ignores dmac check.
With vlan tags, the code goes to slow path where dmac check is handled
properly.
The fix is to check if we have a bad dmac in the fast path and force the
code to go to slow path which will handle dmac check properly.
Also do a wholesale correction on all the testcases which do not use
the proper dmac when sending L3 packets.
Type: fix
Change-Id: I73153a805cecdc24c4eefcc781676de04737ae2c
Signed-off-by: Steven Luong <sluong@cisco.com>
2024-04-19 09:49:20 -07:00
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
2022-04-26 19:02:15 +02:00
|
|
|
/ IP(src=self.pg0.remote_ip4, dst=self.pg0.local_ip4)
|
|
|
|
/ UDP(sport=self.dport, dport=self.dport, chksum=0)
|
|
|
|
)
|
2019-05-23 13:01:41 +02:00
|
|
|
|
|
|
|
self.pg0.add_stream(pkt)
|
|
|
|
self.pg_start()
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
err = self.statistics.get_counter("/err/ip4-udp-lookup/no_listener")[0]
|
2019-05-23 13:01:41 +02:00
|
|
|
|
|
|
|
if enabled:
|
|
|
|
self.assertEqual(err, self.ip4_err)
|
|
|
|
else:
|
|
|
|
self.assertEqual(err, self.ip4_err + 1)
|
|
|
|
|
|
|
|
self.ip4_err = err
|
|
|
|
|
|
|
|
def _check_udp_port_ip6(self, enabled=True):
|
2022-04-26 19:02:15 +02:00
|
|
|
pkt = (
|
ethernet: check destination mac for L3 in ethernet-input node
When the NIC does not support mac filter, we rely on ethernet-input
node to do the destination mac check, ie, when the interface is in L3,
the mac address for the packet must be the mac address of the
interface where the packet arrives. This works fine in ethernet-input
node when all packets in the frame might have different interfaces, ie,
ETH_INPUT_FRAME_F_SINGLE_SW_IF_ID is not set in the frame. However,
when all packets are having the same interface,
ETH_INPUT_FRAME_F_SINGLE_SW_IF_ID is set, ethernet-input node goes
through the optimized routine eth_input_single_int -> eth_input_process_frame.
That is where dmac check has a bug when all packets in the frame are
either, ip4, ip6, or mpls without vlan tags. Because without vlan tags,
the code handles all packets in fast path and ignores dmac check.
With vlan tags, the code goes to slow path where dmac check is handled
properly.
The fix is to check if we have a bad dmac in the fast path and force the
code to go to slow path which will handle dmac check properly.
Also do a wholesale correction on all the testcases which do not use
the proper dmac when sending L3 packets.
Type: fix
Change-Id: I73153a805cecdc24c4eefcc781676de04737ae2c
Signed-off-by: Steven Luong <sluong@cisco.com>
2024-04-19 09:49:20 -07:00
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
2022-04-26 19:02:15 +02:00
|
|
|
/ IPv6(src=self.pg0.remote_ip6, dst=self.pg0.local_ip6)
|
|
|
|
/ UDP(sport=self.dport, dport=self.dport, chksum=0)
|
|
|
|
)
|
2019-05-23 13:01:41 +02:00
|
|
|
|
|
|
|
self.pg0.add_stream(pkt)
|
|
|
|
self.pg_start()
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
err = self.statistics.get_counter("/err/ip6-udp-lookup/no_listener")[0]
|
2019-05-23 13:01:41 +02:00
|
|
|
|
|
|
|
if enabled:
|
|
|
|
self.assertEqual(err, self.ip6_err)
|
|
|
|
else:
|
|
|
|
self.assertEqual(err, self.ip6_err + 1)
|
|
|
|
|
|
|
|
self.ip6_err = err
|
|
|
|
|
|
|
|
def test_udp_port(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""test UDP ports
|
2019-05-23 13:01:41 +02:00
|
|
|
Check if there are no udp listeners before gtpu is enabled
|
|
|
|
"""
|
|
|
|
# UDP ports should be disabled unless a tunnel is configured
|
|
|
|
self._check_udp_port_ip4(False)
|
|
|
|
self._check_udp_port_ip6(False)
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
r = self.vapi.gtpu_add_del_tunnel(
|
|
|
|
is_add=True,
|
|
|
|
mcast_sw_if_index=0xFFFFFFFF,
|
|
|
|
decap_next_index=0xFFFFFFFF,
|
|
|
|
src_address=self.pg0.local_ip4,
|
|
|
|
dst_address=self.pg0.remote_ip4,
|
|
|
|
)
|
2019-05-23 13:01:41 +02:00
|
|
|
|
|
|
|
# UDP port 2152 enabled for ip4
|
|
|
|
self._check_udp_port_ip4()
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
r = self.vapi.gtpu_add_del_tunnel(
|
|
|
|
is_add=True,
|
|
|
|
mcast_sw_if_index=0xFFFFFFFF,
|
|
|
|
decap_next_index=0xFFFFFFFF,
|
|
|
|
src_address=self.pg0.local_ip6,
|
|
|
|
dst_address=self.pg0.remote_ip6,
|
|
|
|
)
|
2019-05-23 13:01:41 +02:00
|
|
|
|
|
|
|
# UDP port 2152 enabled for ip6
|
|
|
|
self._check_udp_port_ip6()
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
r = self.vapi.gtpu_add_del_tunnel(
|
|
|
|
is_add=False,
|
|
|
|
mcast_sw_if_index=0xFFFFFFFF,
|
|
|
|
decap_next_index=0xFFFFFFFF,
|
|
|
|
src_address=self.pg0.local_ip4,
|
|
|
|
dst_address=self.pg0.remote_ip4,
|
|
|
|
)
|
2019-05-23 13:01:41 +02:00
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
r = self.vapi.gtpu_add_del_tunnel(
|
|
|
|
is_add=False,
|
|
|
|
mcast_sw_if_index=0xFFFFFFFF,
|
|
|
|
decap_next_index=0xFFFFFFFF,
|
|
|
|
src_address=self.pg0.local_ip6,
|
|
|
|
dst_address=self.pg0.remote_ip6,
|
|
|
|
)
|
2019-05-23 13:01:41 +02:00
|
|
|
|
|
|
|
|
2024-03-11 10:38:46 +00:00
|
|
|
@unittest.skipIf("gtpu" in config.excluded_plugins, "Exclude GTPU plugin tests")
|
2017-04-12 19:21:16 +08:00
|
|
|
class TestGtpu(BridgeDomain, VppTestCase):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""GTPU Test Case"""
|
2017-04-12 19:21:16 +08:00
|
|
|
|
|
|
|
def __init__(self, *args):
|
|
|
|
BridgeDomain.__init__(self)
|
|
|
|
VppTestCase.__init__(self, *args)
|
|
|
|
|
|
|
|
def encapsulate(self, pkt, vni):
|
|
|
|
"""
|
|
|
|
Encapsulate the original payload frame by adding GTPU header with its
|
|
|
|
UDP, IP and Ethernet fields
|
|
|
|
"""
|
2022-04-26 19:02:15 +02:00
|
|
|
return (
|
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
/ IP(src=self.pg0.remote_ip4, dst=self.pg0.local_ip4)
|
|
|
|
/ UDP(sport=self.dport, dport=self.dport, chksum=0)
|
|
|
|
/ GTP_U_Header(teid=vni, gtp_type=self.gtp_type, length=150)
|
|
|
|
/ pkt
|
|
|
|
)
|
2017-04-12 19:21:16 +08:00
|
|
|
|
2018-06-18 13:01:59 +03:00
|
|
|
def ip_range(self, start, end):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""range of remote ip's"""
|
2018-06-18 13:01:59 +03:00
|
|
|
return ip4_range(self.pg0.remote_ip4, start, end)
|
|
|
|
|
2017-04-12 19:21:16 +08:00
|
|
|
def encap_mcast(self, pkt, src_ip, src_mac, vni):
|
|
|
|
"""
|
|
|
|
Encapsulate the original payload frame by adding GTPU header with its
|
|
|
|
UDP, IP and Ethernet fields
|
|
|
|
"""
|
2022-04-26 19:02:15 +02:00
|
|
|
return (
|
|
|
|
Ether(src=src_mac, dst=self.mcast_mac)
|
|
|
|
/ IP(src=src_ip, dst=self.mcast_ip4)
|
|
|
|
/ UDP(sport=self.dport, dport=self.dport, chksum=0)
|
|
|
|
/ GTP_U_Header(teid=vni, gtp_type=self.gtp_type, length=150)
|
|
|
|
/ pkt
|
|
|
|
)
|
2017-04-12 19:21:16 +08:00
|
|
|
|
|
|
|
def decapsulate(self, pkt):
|
|
|
|
"""
|
|
|
|
Decapsulate the original payload frame by removing GTPU header
|
|
|
|
"""
|
|
|
|
return pkt[GTP_U_Header].payload
|
|
|
|
|
|
|
|
# Method for checking GTPU encapsulation.
|
|
|
|
#
|
|
|
|
def check_encapsulation(self, pkt, vni, local_only=False, mcast_pkt=False):
|
|
|
|
# Verify source MAC is VPP_MAC and destination MAC is MY_MAC resolved
|
|
|
|
# by VPP using ARP.
|
|
|
|
self.assertEqual(pkt[Ether].src, self.pg0.local_mac)
|
|
|
|
if not local_only:
|
|
|
|
if not mcast_pkt:
|
|
|
|
self.assertEqual(pkt[Ether].dst, self.pg0.remote_mac)
|
|
|
|
else:
|
|
|
|
self.assertEqual(pkt[Ether].dst, type(self).mcast_mac)
|
|
|
|
# Verify GTPU tunnel source IP is VPP_IP and destination IP is MY_IP.
|
|
|
|
self.assertEqual(pkt[IP].src, self.pg0.local_ip4)
|
|
|
|
if not local_only:
|
|
|
|
if not mcast_pkt:
|
|
|
|
self.assertEqual(pkt[IP].dst, self.pg0.remote_ip4)
|
|
|
|
else:
|
|
|
|
self.assertEqual(pkt[IP].dst, type(self).mcast_ip4)
|
|
|
|
# Verify UDP destination port is GTPU 2152, source UDP port could be
|
|
|
|
# arbitrary.
|
|
|
|
self.assertEqual(pkt[UDP].dport, type(self).dport)
|
2018-02-25 12:27:18 -08:00
|
|
|
# Verify teid
|
|
|
|
self.assertEqual(pkt[GTP_U_Header].teid, vni)
|
2017-04-12 19:21:16 +08:00
|
|
|
|
|
|
|
def test_encap(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""Encapsulation test
|
2017-04-12 19:21:16 +08:00
|
|
|
Send frames from pg1
|
|
|
|
Verify receipt of encapsulated frames on pg0
|
|
|
|
"""
|
|
|
|
self.pg1.add_stream([self.frame_reply])
|
|
|
|
|
|
|
|
self.pg0.enable_capture()
|
|
|
|
|
|
|
|
self.pg_start()
|
|
|
|
|
2019-03-27 11:25:48 -07:00
|
|
|
# Pick first received frame and check if it's correctly encapsulated.
|
2017-04-12 19:21:16 +08:00
|
|
|
out = self.pg0.get_capture(1)
|
|
|
|
pkt = out[0]
|
2020-04-03 07:46:28 +00:00
|
|
|
self.check_encapsulation(pkt, self.single_tunnel_vni)
|
2017-04-12 19:21:16 +08:00
|
|
|
|
|
|
|
# payload = self.decapsulate(pkt)
|
|
|
|
# self.assert_eq_pkts(payload, self.frame_reply)
|
|
|
|
|
|
|
|
def test_ucast_flood(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""Unicast flood test
|
2017-04-12 19:21:16 +08:00
|
|
|
Send frames from pg3
|
|
|
|
Verify receipt of encapsulated frames on pg0
|
|
|
|
"""
|
|
|
|
self.pg3.add_stream([self.frame_reply])
|
|
|
|
|
|
|
|
self.pg0.enable_capture()
|
|
|
|
|
|
|
|
self.pg_start()
|
|
|
|
|
2019-03-27 11:25:48 -07:00
|
|
|
# Get packet from each tunnel and assert it's correctly encapsulated.
|
2017-04-12 19:21:16 +08:00
|
|
|
out = self.pg0.get_capture(self.n_ucast_tunnels)
|
|
|
|
for pkt in out:
|
|
|
|
self.check_encapsulation(pkt, self.ucast_flood_bd, True)
|
|
|
|
# payload = self.decapsulate(pkt)
|
|
|
|
# self.assert_eq_pkts(payload, self.frame_reply)
|
|
|
|
|
|
|
|
def test_mcast_flood(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""Multicast flood test
|
2017-04-12 19:21:16 +08:00
|
|
|
Send frames from pg2
|
|
|
|
Verify receipt of encapsulated frames on pg0
|
|
|
|
"""
|
|
|
|
self.pg2.add_stream([self.frame_reply])
|
|
|
|
|
|
|
|
self.pg0.enable_capture()
|
|
|
|
|
|
|
|
self.pg_start()
|
|
|
|
|
2019-03-27 11:25:48 -07:00
|
|
|
# Pick first received frame and check if it's correctly encapsulated.
|
2017-04-12 19:21:16 +08:00
|
|
|
out = self.pg0.get_capture(1)
|
|
|
|
pkt = out[0]
|
2022-04-26 19:02:15 +02:00
|
|
|
self.check_encapsulation(
|
|
|
|
pkt, self.mcast_flood_bd, local_only=False, mcast_pkt=True
|
|
|
|
)
|
2017-04-12 19:21:16 +08:00
|
|
|
|
|
|
|
# payload = self.decapsulate(pkt)
|
|
|
|
# self.assert_eq_pkts(payload, self.frame_reply)
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def create_gtpu_flood_test_bd(cls, teid, n_ucast_tunnels):
|
|
|
|
# Create 10 ucast gtpu tunnels under bd
|
|
|
|
ip_range_start = 10
|
|
|
|
ip_range_end = ip_range_start + n_ucast_tunnels
|
2018-05-01 05:17:55 -07:00
|
|
|
next_hop_address = cls.pg0.remote_ip4
|
2022-04-26 19:02:15 +02:00
|
|
|
for dest_ip4 in ip4_range(next_hop_address, ip_range_start, ip_range_end):
|
2020-05-02 22:34:40 -04:00
|
|
|
# add host route so dest_ip4 will not be resolved
|
2022-04-26 19:02:15 +02:00
|
|
|
rip = VppIpRoute(
|
|
|
|
cls,
|
|
|
|
dest_ip4,
|
|
|
|
32,
|
|
|
|
[VppRoutePath(next_hop_address, INVALID_INDEX)],
|
|
|
|
register=False,
|
|
|
|
)
|
2018-05-01 05:17:55 -07:00
|
|
|
rip.add_vpp_config()
|
2017-04-12 19:21:16 +08:00
|
|
|
r = cls.vapi.gtpu_add_del_tunnel(
|
2019-12-08 14:14:37 +01:00
|
|
|
is_add=True,
|
|
|
|
mcast_sw_if_index=0xFFFFFFFF,
|
|
|
|
decap_next_index=0xFFFFFFFF,
|
|
|
|
src_address=cls.pg0.local_ip4,
|
|
|
|
dst_address=dest_ip4,
|
2022-04-26 19:02:15 +02:00
|
|
|
teid=teid,
|
|
|
|
)
|
|
|
|
cls.vapi.sw_interface_set_l2_bridge(
|
|
|
|
rx_sw_if_index=r.sw_if_index, bd_id=teid
|
|
|
|
)
|
2017-04-12 19:21:16 +08:00
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def add_del_shared_mcast_dst_load(cls, is_add):
|
|
|
|
"""
|
|
|
|
add or del tunnels sharing the same mcast dst
|
|
|
|
to test gtpu ref_count mechanism
|
|
|
|
"""
|
|
|
|
n_shared_dst_tunnels = 20
|
|
|
|
teid_start = 1000
|
|
|
|
teid_end = teid_start + n_shared_dst_tunnels
|
|
|
|
for teid in range(teid_start, teid_end):
|
|
|
|
r = cls.vapi.gtpu_add_del_tunnel(
|
2019-12-08 14:14:37 +01:00
|
|
|
decap_next_index=0xFFFFFFFF,
|
|
|
|
src_address=cls.pg0.local_ip4,
|
|
|
|
dst_address=cls.mcast_ip4,
|
2017-04-12 19:21:16 +08:00
|
|
|
mcast_sw_if_index=1,
|
|
|
|
teid=teid,
|
2022-04-26 19:02:15 +02:00
|
|
|
is_add=is_add,
|
|
|
|
)
|
|
|
|
if r.sw_if_index == 0xFFFFFFFF:
|
2019-03-12 17:41:27 -07:00
|
|
|
raise ValueError("bad sw_if_index: ~0")
|
2017-04-12 19:21:16 +08:00
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def add_shared_mcast_dst_load(cls):
|
|
|
|
cls.add_del_shared_mcast_dst_load(is_add=1)
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def del_shared_mcast_dst_load(cls):
|
|
|
|
cls.add_del_shared_mcast_dst_load(is_add=0)
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def add_del_mcast_tunnels_load(cls, is_add):
|
|
|
|
"""
|
|
|
|
add or del tunnels to test gtpu stability
|
|
|
|
"""
|
|
|
|
n_distinct_dst_tunnels = 20
|
|
|
|
ip_range_start = 10
|
|
|
|
ip_range_end = ip_range_start + n_distinct_dst_tunnels
|
2022-04-26 19:02:15 +02:00
|
|
|
for dest_ip4 in ip4_range(cls.mcast_ip4, ip_range_start, ip_range_end):
|
|
|
|
teid = int(dest_ip4.split(".")[3])
|
2017-04-12 19:21:16 +08:00
|
|
|
cls.vapi.gtpu_add_del_tunnel(
|
2019-12-08 14:14:37 +01:00
|
|
|
decap_next_index=0xFFFFFFFF,
|
|
|
|
src_address=cls.pg0.local_ip4,
|
|
|
|
dst_address=dest_ip4,
|
2017-04-12 19:21:16 +08:00
|
|
|
mcast_sw_if_index=1,
|
|
|
|
teid=teid,
|
2022-04-26 19:02:15 +02:00
|
|
|
is_add=is_add,
|
|
|
|
)
|
2017-04-12 19:21:16 +08:00
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def add_mcast_tunnels_load(cls):
|
|
|
|
cls.add_del_mcast_tunnels_load(is_add=1)
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def del_mcast_tunnels_load(cls):
|
|
|
|
cls.add_del_mcast_tunnels_load(is_add=0)
|
|
|
|
|
|
|
|
# Class method to start the GTPU test case.
|
|
|
|
# Overrides setUpClass method in VppTestCase class.
|
|
|
|
# Python try..except statement is used to ensure that the tear down of
|
|
|
|
# the class will be executed even if exception is raised.
|
|
|
|
# @param cls The class pointer.
|
|
|
|
@classmethod
|
|
|
|
def setUpClass(cls):
|
|
|
|
super(TestGtpu, cls).setUpClass()
|
|
|
|
|
|
|
|
try:
|
|
|
|
cls.dport = 2152
|
2022-04-26 19:02:15 +02:00
|
|
|
cls.gtp_type = 0xFF
|
2017-04-12 19:21:16 +08:00
|
|
|
|
|
|
|
# Create 2 pg interfaces.
|
|
|
|
cls.create_pg_interfaces(range(4))
|
|
|
|
for pg in cls.pg_interfaces:
|
|
|
|
pg.admin_up()
|
|
|
|
|
|
|
|
# Configure IPv4 addresses on VPP pg0.
|
|
|
|
cls.pg0.config_ip4()
|
|
|
|
|
|
|
|
# Resolve MAC address for VPP's IP address on pg0.
|
|
|
|
cls.pg0.resolve_arp()
|
|
|
|
|
|
|
|
# Our Multicast address
|
2022-04-26 19:02:15 +02:00
|
|
|
cls.mcast_ip4 = "239.1.1.1"
|
2020-05-02 22:34:40 -04:00
|
|
|
cls.mcast_mac = util.mcast_ip_to_mac(cls.mcast_ip4)
|
2017-04-12 19:21:16 +08:00
|
|
|
|
|
|
|
# Create GTPU VTEP on VPP pg0, and put gtpu_tunnel0 and pg1
|
|
|
|
# into BD.
|
|
|
|
cls.single_tunnel_bd = 11
|
2020-04-03 07:46:28 +00:00
|
|
|
cls.single_tunnel_vni = 11
|
2017-04-12 19:21:16 +08:00
|
|
|
r = cls.vapi.gtpu_add_del_tunnel(
|
2019-12-08 14:14:37 +01:00
|
|
|
is_add=True,
|
|
|
|
mcast_sw_if_index=0xFFFFFFFF,
|
|
|
|
decap_next_index=0xFFFFFFFF,
|
|
|
|
src_address=cls.pg0.local_ip4,
|
|
|
|
dst_address=cls.pg0.remote_ip4,
|
2022-04-26 19:02:15 +02:00
|
|
|
teid=cls.single_tunnel_vni,
|
|
|
|
)
|
2019-03-11 19:23:25 +01:00
|
|
|
cls.vapi.sw_interface_set_l2_bridge(
|
2022-04-26 19:02:15 +02:00
|
|
|
rx_sw_if_index=r.sw_if_index, bd_id=cls.single_tunnel_bd
|
|
|
|
)
|
|
|
|
cls.vapi.sw_interface_set_l2_bridge(
|
|
|
|
rx_sw_if_index=cls.pg1.sw_if_index, bd_id=cls.single_tunnel_bd
|
|
|
|
)
|
2017-04-12 19:21:16 +08:00
|
|
|
|
|
|
|
# Setup teid 2 to test multicast flooding
|
|
|
|
cls.n_ucast_tunnels = 10
|
|
|
|
cls.mcast_flood_bd = 12
|
2022-04-26 19:02:15 +02:00
|
|
|
cls.create_gtpu_flood_test_bd(cls.mcast_flood_bd, cls.n_ucast_tunnels)
|
2017-04-12 19:21:16 +08:00
|
|
|
r = cls.vapi.gtpu_add_del_tunnel(
|
2019-12-08 14:14:37 +01:00
|
|
|
is_add=True,
|
|
|
|
src_address=cls.pg0.local_ip4,
|
|
|
|
dst_address=cls.mcast_ip4,
|
2017-04-12 19:21:16 +08:00
|
|
|
mcast_sw_if_index=1,
|
2019-12-08 14:14:37 +01:00
|
|
|
decap_next_index=0xFFFFFFFF,
|
2022-04-26 19:02:15 +02:00
|
|
|
teid=cls.mcast_flood_bd,
|
|
|
|
)
|
|
|
|
cls.vapi.sw_interface_set_l2_bridge(
|
|
|
|
rx_sw_if_index=r.sw_if_index, bd_id=cls.mcast_flood_bd
|
|
|
|
)
|
2019-03-11 19:23:25 +01:00
|
|
|
cls.vapi.sw_interface_set_l2_bridge(
|
2022-04-26 19:02:15 +02:00
|
|
|
rx_sw_if_index=cls.pg2.sw_if_index, bd_id=cls.mcast_flood_bd
|
|
|
|
)
|
2017-04-12 19:21:16 +08:00
|
|
|
|
|
|
|
# Add and delete mcast tunnels to check stability
|
|
|
|
cls.add_shared_mcast_dst_load()
|
|
|
|
cls.add_mcast_tunnels_load()
|
|
|
|
cls.del_shared_mcast_dst_load()
|
|
|
|
cls.del_mcast_tunnels_load()
|
|
|
|
|
|
|
|
# Setup teid 3 to test unicast flooding
|
|
|
|
cls.ucast_flood_bd = 13
|
2022-04-26 19:02:15 +02:00
|
|
|
cls.create_gtpu_flood_test_bd(cls.ucast_flood_bd, cls.n_ucast_tunnels)
|
2019-03-11 19:23:25 +01:00
|
|
|
cls.vapi.sw_interface_set_l2_bridge(
|
2022-04-26 19:02:15 +02:00
|
|
|
rx_sw_if_index=cls.pg3.sw_if_index, bd_id=cls.ucast_flood_bd
|
|
|
|
)
|
2017-04-12 19:21:16 +08:00
|
|
|
except Exception:
|
|
|
|
super(TestGtpu, cls).tearDownClass()
|
|
|
|
raise
|
|
|
|
|
2019-03-12 19:23:27 -07:00
|
|
|
@classmethod
|
|
|
|
def tearDownClass(cls):
|
|
|
|
super(TestGtpu, cls).tearDownClass()
|
|
|
|
|
2017-04-12 19:21:16 +08:00
|
|
|
# Method to define VPP actions before tear down of the test case.
|
|
|
|
# Overrides tearDown method in VppTestCase class.
|
|
|
|
# @param self The object pointer.
|
|
|
|
def tearDown(self):
|
|
|
|
super(TestGtpu, self).tearDown()
|
2019-03-13 09:23:05 -07:00
|
|
|
|
|
|
|
def show_commands_at_teardown(self):
|
|
|
|
self.logger.info(self.vapi.cli("show bridge-domain 11 detail"))
|
|
|
|
self.logger.info(self.vapi.cli("show bridge-domain 12 detail"))
|
|
|
|
self.logger.info(self.vapi.cli("show bridge-domain 13 detail"))
|
|
|
|
self.logger.info(self.vapi.cli("show int"))
|
|
|
|
self.logger.info(self.vapi.cli("show gtpu tunnel"))
|
|
|
|
self.logger.info(self.vapi.cli("show trace"))
|
2017-04-12 19:21:16 +08:00
|
|
|
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
if __name__ == "__main__":
|
2017-04-12 19:21:16 +08:00
|
|
|
unittest.main(testRunner=VppTestRunner)
|