2019-03-05 16:58:24 +01:00
|
|
|
# NB NB NB NB NB NB NB NB NB NB NB
|
|
|
|
#
|
|
|
|
# NOTE: The API binary wrappers in this file are in the process of being
|
|
|
|
# deprecated. DO NOT ADD NEW WRAPPERS HERE. Call the functions using
|
|
|
|
# named arguments directly instead.
|
|
|
|
#
|
|
|
|
|
2018-11-25 12:47:04 -08:00
|
|
|
import os
|
2016-09-29 14:43:44 +02:00
|
|
|
import time
|
2016-12-08 10:16:41 +01:00
|
|
|
from collections import deque
|
2021-03-03 10:40:05 +01:00
|
|
|
import queue
|
2019-02-28 20:20:47 +01:00
|
|
|
from six import moves, iteritems
|
2019-03-17 17:34:46 -07:00
|
|
|
from vpp_papi import VPPApiClient, mac_pton
|
2018-11-25 12:47:04 -08:00
|
|
|
from hook import Hook
|
2019-03-17 08:42:58 -07:00
|
|
|
from vpp_ip_route import MPLS_IETF_MAX_LABEL, MPLS_LABEL_INVALID
|
2016-10-11 11:47:09 +02:00
|
|
|
|
2019-02-28 20:20:47 +01:00
|
|
|
#
|
|
|
|
# Dictionary keyed on message name to override default values for
|
|
|
|
# named parameters
|
|
|
|
#
|
2019-03-05 16:58:24 +01:00
|
|
|
defaultmapping = {
|
2020-04-28 01:12:04 -04:00
|
|
|
|
2019-03-05 16:58:24 +01:00
|
|
|
'acl_interface_add_del': {'is_add': 1, 'is_input': 1},
|
|
|
|
'bd_ip_mac_add_del': {'is_add': 1, },
|
2019-09-02 13:28:52 +02:00
|
|
|
'bfd_udp_add': {'is_authenticated': False, 'bfd_key_id': None,
|
|
|
|
'conf_key_id': None},
|
|
|
|
'bfd_udp_auth_activate': {'bfd_key_id': None, 'conf_key_id': None,
|
|
|
|
'is_delayed': False},
|
2019-03-05 16:58:24 +01:00
|
|
|
'bier_disp_entry_add_del': {'next_hop_rpf_id': -1, 'next_hop_is_ip4': 1,
|
|
|
|
'is_add': 1, },
|
|
|
|
'bier_disp_table_add_del': {'is_add': 1, },
|
|
|
|
'bier_imp_add': {'is_add': 1, },
|
|
|
|
'bier_route_add_del': {'is_add': 1, },
|
|
|
|
'bier_table_add_del': {'is_add': 1, },
|
|
|
|
'bridge_domain_add_del': {'flood': 1, 'uu_flood': 1, 'forward': 1,
|
|
|
|
'learn': 1, 'is_add': 1, },
|
2019-04-30 20:44:25 -07:00
|
|
|
'bvi_delete': {},
|
2019-03-05 16:58:24 +01:00
|
|
|
'geneve_add_del_tunnel': {'mcast_sw_if_index': 4294967295, 'is_add': 1,
|
|
|
|
'decap_next_index': 4294967295, },
|
|
|
|
'input_acl_set_interface': {'ip4_table_index': 4294967295,
|
|
|
|
'ip6_table_index': 4294967295,
|
|
|
|
'l2_table_index': 4294967295, },
|
|
|
|
'ip6_add_del_address_using_prefix': {'is_add': 1, },
|
|
|
|
'ip6nd_send_router_solicitation': {'irt': 1, 'mrt': 120, },
|
|
|
|
'ip_add_del_route': {'next_hop_sw_if_index': 4294967295,
|
|
|
|
'next_hop_weight': 1, 'next_hop_via_label': 1048576,
|
|
|
|
'classify_table_index': 4294967295, 'is_add': 1, },
|
|
|
|
'ip_mroute_add_del': {'is_add': 1, },
|
|
|
|
'ip_neighbor_add_del': {'is_add': 1, },
|
|
|
|
'ipsec_interface_add_del_spd': {'is_add': 1, },
|
|
|
|
'ipsec_spd_add_del': {'is_add': 1, },
|
|
|
|
'ipsec_spd_dump': {'sa_id': 4294967295, },
|
|
|
|
'ipsec_spd_entry_add_del': {'local_port_stop': 65535,
|
|
|
|
'remote_port_stop': 65535, 'priority': 100,
|
|
|
|
'is_outbound': 1,
|
|
|
|
'is_add': 1, },
|
|
|
|
'ipsec_tunnel_if_add_del': {'is_add': 1, 'anti_replay': 1, },
|
|
|
|
'l2_emulation': {'enable': 1, },
|
|
|
|
'l2fib_add_del': {'is_add': 1, },
|
|
|
|
'lisp_add_del_adjacency': {'is_add': 1, },
|
|
|
|
'lisp_add_del_local_eid': {'is_add': 1, },
|
|
|
|
'lisp_add_del_locator': {'priority': 1, 'weight': 1, 'is_add': 1, },
|
|
|
|
'lisp_add_del_locator_set': {'is_add': 1, },
|
|
|
|
'lisp_add_del_remote_mapping': {'is_add': 1, },
|
|
|
|
'macip_acl_interface_add_del': {'is_add': 1, },
|
|
|
|
'mpls_ip_bind_unbind': {'is_ip4': 1, 'is_bind': 1, },
|
2019-03-11 19:23:25 +01:00
|
|
|
'mpls_route_add_del': {'mr_next_hop_sw_if_index': 4294967295,
|
|
|
|
'mr_next_hop_weight': 1,
|
|
|
|
'mr_next_hop_via_label': 1048576,
|
|
|
|
'mr_is_add': 1,
|
|
|
|
'mr_classify_table_index': 4294967295, },
|
2019-03-05 16:58:24 +01:00
|
|
|
'mpls_table_add_del': {'is_add': 1, },
|
|
|
|
'mpls_tunnel_add_del': {'next_hop_sw_if_index': 4294967295,
|
|
|
|
'next_hop_weight': 1,
|
|
|
|
'next_hop_via_label': 1048576,
|
|
|
|
'is_add': 1, },
|
|
|
|
'output_acl_set_interface': {'ip4_table_index': 4294967295,
|
|
|
|
'ip6_table_index': 4294967295,
|
|
|
|
'l2_table_index': 4294967295, },
|
|
|
|
'pppoe_add_del_session': {'is_add': 1, },
|
2020-03-02 13:16:53 +01:00
|
|
|
'policer_add_del': {'is_add': 1, 'conform_action': {'type': 1}, },
|
2019-03-05 16:58:24 +01:00
|
|
|
'set_ipfix_exporter': {'collector_port': 4739, },
|
|
|
|
'sr_policy_add': {'weight': 1, 'is_encap': 1, },
|
|
|
|
'sw_interface_add_del_address': {'is_add': 1, },
|
|
|
|
'sw_interface_ip6nd_ra_prefix': {'val_lifetime': 4294967295,
|
|
|
|
'pref_lifetime': 4294967295, },
|
|
|
|
'sw_interface_set_ip_directed_broadcast': {'enable': 1, },
|
|
|
|
'sw_interface_set_l2_bridge': {'enable': 1, },
|
|
|
|
'sw_interface_set_mpls_enable': {'enable': 1, },
|
|
|
|
'sw_interface_set_mtu': {'mtu': [0, 0, 0, 0], },
|
|
|
|
'sw_interface_set_unnumbered': {'is_add': 1, },
|
|
|
|
'sw_interface_span_enable_disable': {'state': 1, },
|
|
|
|
'vxlan_add_del_tunnel': {'mcast_sw_if_index': 4294967295, 'is_add': 1,
|
|
|
|
'decap_next_index': 4294967295,
|
|
|
|
'instance': 4294967295, },
|
|
|
|
'want_bfd_events': {'enable_disable': 1, },
|
|
|
|
'want_igmp_events': {'enable': 1, },
|
|
|
|
'want_interface_events': {'enable_disable': 1, },
|
2019-10-24 13:52:42 +02:00
|
|
|
'want_l2_macs_events': {'enable_disable': 1, 'pid': os.getpid(), },
|
2021-01-07 12:44:17 +01:00
|
|
|
'want_l2_macs_events2': {'enable_disable': 1, 'pid': os.getpid(), },
|
2019-03-05 16:58:24 +01:00
|
|
|
}
|
2019-02-28 20:20:47 +01:00
|
|
|
|
2018-11-19 04:25:32 -08:00
|
|
|
|
tests: improve vpp_papi_provider exception output
saves time debugging tests by replacing 'API call' with
the actual function signature:
vpp_papi_provider.UnexpectedApiReturnValueError: API call failed, expected 0 return value instead of -2 in vxlan_add_del_tunnel_reply(_0=247, context=5052, retval=-2, sw_if_index=4294967295)
vpp_papi_provider.UnexpectedApiReturnValueError: vxlan_add_del_tunnel(is_add=0, src_address=172.16.1.1, dst_address=239.1.1.209, vni=209, sw_if_index=26, mcast_sw_if_index=1, encap_vrf_id=None, instance=None, decap_next_index=None) failed, expected 0 return value instead of -2 in vxlan_add_del_tunnel_reply(_0=247, context=5052, retval=-2, sw_if_index=4294967295)
Type: test
Change-Id: Ie3b6a5fdb4e1d427d60c51f7a7bf815af0bb3de6
Signed-off-by: Paul Vinciguerra <pvinci@vinciconsulting.com>
2020-05-02 10:40:33 -04:00
|
|
|
def as_fn_signature(d):
|
|
|
|
return ", ".join(f"{k}={v}" for k, v in d.items())
|
|
|
|
|
|
|
|
|
2019-05-10 20:41:08 -04:00
|
|
|
class CliFailedCommandError(Exception):
|
|
|
|
""" cli command failed."""
|
|
|
|
|
|
|
|
|
|
|
|
class CliSyntaxError(Exception):
|
|
|
|
""" cli command had a syntax error."""
|
|
|
|
|
|
|
|
|
2017-02-23 09:26:30 +01:00
|
|
|
class UnexpectedApiReturnValueError(Exception):
|
|
|
|
""" exception raised when the API return value is unexpected """
|
|
|
|
pass
|
|
|
|
|
|
|
|
|
2016-10-11 11:47:09 +02:00
|
|
|
class VppPapiProvider(object):
|
|
|
|
"""VPP-api provider using vpp-papi
|
|
|
|
|
|
|
|
@property hook: hook object providing before and after api/cli hooks
|
|
|
|
"""
|
|
|
|
|
2017-01-25 08:00:40 +01:00
|
|
|
_zero, _negative = range(2)
|
|
|
|
|
2021-03-03 10:40:05 +01:00
|
|
|
def __init__(self, name, test_class, read_timeout):
|
2019-01-08 20:37:40 -08:00
|
|
|
self.hook = Hook(test_class)
|
2016-10-11 11:47:09 +02:00
|
|
|
self.name = name
|
2016-11-18 07:38:42 +01:00
|
|
|
self.test_class = test_class
|
2017-01-25 08:00:40 +01:00
|
|
|
self._expect_api_retval = self._zero
|
|
|
|
self._expect_stack = []
|
2016-12-05 10:27:09 +01:00
|
|
|
|
2019-03-17 17:34:46 -07:00
|
|
|
# install_dir is a class attribute. We need to set it before
|
|
|
|
# calling the constructor.
|
|
|
|
VPPApiClient.apidir = os.getenv('VPP_INSTALL_PATH')
|
2019-01-13 10:26:05 -08:00
|
|
|
|
2019-03-17 17:34:46 -07:00
|
|
|
self.vpp = VPPApiClient(logger=test_class.logger,
|
|
|
|
read_timeout=read_timeout,
|
2021-03-03 10:40:05 +01:00
|
|
|
use_socket=True,
|
2021-03-16 12:52:12 +01:00
|
|
|
server_address=test_class.get_api_sock_path())
|
2021-03-03 10:40:05 +01:00
|
|
|
self._events = queue.Queue()
|
2016-10-11 11:47:09 +02:00
|
|
|
|
2017-01-25 08:00:40 +01:00
|
|
|
def __enter__(self):
|
|
|
|
return self
|
|
|
|
|
2018-11-08 11:52:04 +01:00
|
|
|
def assert_negative_api_retval(self):
|
2021-08-12 18:36:02 -04:00
|
|
|
""" Expect API failure - used with with, e.g.::
|
|
|
|
|
|
|
|
with self.vapi.assert_negative_api_retval():
|
|
|
|
self.vapi.<api call expected to fail>
|
|
|
|
|
|
|
|
..
|
2018-11-08 11:52:04 +01:00
|
|
|
"""
|
2017-01-25 08:00:40 +01:00
|
|
|
self._expect_stack.append(self._expect_api_retval)
|
|
|
|
self._expect_api_retval = self._negative
|
|
|
|
return self
|
|
|
|
|
2018-11-08 11:52:04 +01:00
|
|
|
def assert_zero_api_retval(self):
|
2021-08-12 18:36:02 -04:00
|
|
|
""" Expect API success - used with with, e.g.::
|
2018-11-08 11:52:04 +01:00
|
|
|
|
2021-08-12 18:36:02 -04:00
|
|
|
with self.vapi.assert_negative_api_retval():
|
|
|
|
self.vapi.<api call expected to succeed>
|
|
|
|
|
|
|
|
:note: this is useful only inside another with block
|
|
|
|
as success is the default expected value
|
2018-11-08 11:52:04 +01:00
|
|
|
"""
|
2017-01-25 08:00:40 +01:00
|
|
|
self._expect_stack.append(self._expect_api_retval)
|
|
|
|
self._expect_api_retval = self._zero
|
|
|
|
return self
|
|
|
|
|
|
|
|
def __exit__(self, exc_type, exc_value, traceback):
|
|
|
|
self._expect_api_retval = self._expect_stack.pop()
|
|
|
|
|
2016-10-11 11:47:09 +02:00
|
|
|
def register_hook(self, hook):
|
|
|
|
"""Replace hook registration with new hook
|
|
|
|
|
|
|
|
:param hook:
|
|
|
|
|
|
|
|
"""
|
|
|
|
self.hook = hook
|
|
|
|
|
2016-09-29 14:43:44 +02:00
|
|
|
def collect_events(self):
|
2016-12-08 10:16:41 +01:00
|
|
|
""" Collect all events from the internal queue and clear the queue. """
|
2021-03-03 10:40:05 +01:00
|
|
|
result = []
|
|
|
|
while True:
|
|
|
|
try:
|
|
|
|
e = self._events.get(block=False)
|
|
|
|
result.append(e)
|
|
|
|
except queue.Empty:
|
|
|
|
return result
|
|
|
|
return result
|
2016-09-29 14:43:44 +02:00
|
|
|
|
|
|
|
def wait_for_event(self, timeout, name=None):
|
2016-12-08 10:16:41 +01:00
|
|
|
""" Wait for and return next event. """
|
2017-02-14 02:55:31 +01:00
|
|
|
if name:
|
|
|
|
self.test_class.logger.debug("Expecting event '%s' within %ss",
|
|
|
|
name, timeout)
|
2017-09-13 12:29:08 +03:00
|
|
|
else:
|
|
|
|
self.test_class.logger.debug("Expecting event within %ss",
|
|
|
|
timeout)
|
2021-03-03 10:40:05 +01:00
|
|
|
try:
|
|
|
|
e = self._events.get(timeout=timeout)
|
|
|
|
except queue.Empty:
|
|
|
|
raise Exception("Event did not occur within timeout")
|
|
|
|
msgname = type(e).__name__
|
|
|
|
if name and msgname != name:
|
|
|
|
raise Exception("Unexpected event received: %s, expected: %s"
|
|
|
|
% msgname)
|
|
|
|
self.test_class.logger.debug("Returning event %s:%s" % (name, e))
|
|
|
|
return e
|
2016-09-29 14:43:44 +02:00
|
|
|
|
|
|
|
def __call__(self, name, event):
|
2016-12-08 10:16:41 +01:00
|
|
|
""" Enqueue event in the internal event queue. """
|
|
|
|
self.test_class.logger.debug("New event: %s: %s" % (name, event))
|
2021-03-03 10:40:05 +01:00
|
|
|
self._events.put(event)
|
2016-09-29 14:43:44 +02:00
|
|
|
|
2019-02-28 20:20:47 +01:00
|
|
|
def factory(self, name, apifn):
|
|
|
|
def f(*a, **ka):
|
|
|
|
fields = apifn._func.msg.fields
|
|
|
|
|
|
|
|
# add positional and kw arguments
|
|
|
|
d = ka
|
|
|
|
for i, o in enumerate(fields[3:]):
|
|
|
|
try:
|
|
|
|
d[o] = a[i]
|
2019-09-02 13:28:52 +02:00
|
|
|
except BaseException:
|
2019-02-28 20:20:47 +01:00
|
|
|
break
|
|
|
|
|
|
|
|
# Default override
|
|
|
|
if name in defaultmapping:
|
|
|
|
for k, v in iteritems(defaultmapping[name]):
|
|
|
|
if k in d:
|
|
|
|
continue
|
|
|
|
d[k] = v
|
|
|
|
return self.api(apifn, d)
|
2019-03-05 16:58:24 +01:00
|
|
|
|
2019-02-28 20:20:47 +01:00
|
|
|
return f
|
|
|
|
|
2019-03-05 04:30:04 -08:00
|
|
|
def __getattribute__(self, name):
|
2019-02-28 20:20:47 +01:00
|
|
|
try:
|
2019-03-05 04:30:04 -08:00
|
|
|
method = super(VppPapiProvider, self).__getattribute__(name)
|
|
|
|
except AttributeError:
|
|
|
|
method = self.factory(name, getattr(self.papi, name))
|
|
|
|
# lazily load the method so we don't need to call factory
|
|
|
|
# again for this name.
|
|
|
|
setattr(self, name, method)
|
|
|
|
return method
|
2019-02-28 20:20:47 +01:00
|
|
|
|
2016-10-11 11:47:09 +02:00
|
|
|
def connect(self):
|
|
|
|
"""Connect the API to VPP"""
|
2021-03-03 10:40:05 +01:00
|
|
|
# This might be called before VPP is prepared to listen to the socket
|
|
|
|
retries = 0
|
2021-03-16 12:52:12 +01:00
|
|
|
while not os.path.exists(self.test_class.get_api_sock_path()):
|
2021-03-03 10:40:05 +01:00
|
|
|
time.sleep(0.5)
|
|
|
|
retries += 1
|
|
|
|
if retries > 120:
|
|
|
|
break
|
|
|
|
self.vpp.connect(self.name[:63])
|
2017-03-01 09:53:19 +01:00
|
|
|
self.papi = self.vpp.api
|
|
|
|
self.vpp.register_event_callback(self)
|
2016-10-11 11:47:09 +02:00
|
|
|
|
|
|
|
def disconnect(self):
|
|
|
|
"""Disconnect the API from VPP"""
|
2017-03-01 09:53:19 +01:00
|
|
|
self.vpp.disconnect()
|
2016-10-11 11:47:09 +02:00
|
|
|
|
|
|
|
def api(self, api_fn, api_args, expected_retval=0):
|
2016-12-08 10:16:41 +01:00
|
|
|
""" Call API function and check it's return value.
|
2016-10-11 11:47:09 +02:00
|
|
|
Call the appropriate hooks before and after the API call
|
|
|
|
|
|
|
|
:param api_fn: API function to call
|
|
|
|
:param api_args: tuple of API function arguments
|
|
|
|
:param expected_retval: Expected return value (Default value = 0)
|
|
|
|
:returns: reply from the API
|
|
|
|
|
|
|
|
"""
|
|
|
|
self.hook.before_api(api_fn.__name__, api_args)
|
2016-12-05 10:27:09 +01:00
|
|
|
reply = api_fn(**api_args)
|
2017-01-25 08:00:40 +01:00
|
|
|
if self._expect_api_retval == self._negative:
|
|
|
|
if hasattr(reply, 'retval') and reply.retval >= 0:
|
tests: improve vpp_papi_provider exception output
saves time debugging tests by replacing 'API call' with
the actual function signature:
vpp_papi_provider.UnexpectedApiReturnValueError: API call failed, expected 0 return value instead of -2 in vxlan_add_del_tunnel_reply(_0=247, context=5052, retval=-2, sw_if_index=4294967295)
vpp_papi_provider.UnexpectedApiReturnValueError: vxlan_add_del_tunnel(is_add=0, src_address=172.16.1.1, dst_address=239.1.1.209, vni=209, sw_if_index=26, mcast_sw_if_index=1, encap_vrf_id=None, instance=None, decap_next_index=None) failed, expected 0 return value instead of -2 in vxlan_add_del_tunnel_reply(_0=247, context=5052, retval=-2, sw_if_index=4294967295)
Type: test
Change-Id: Ie3b6a5fdb4e1d427d60c51f7a7bf815af0bb3de6
Signed-off-by: Paul Vinciguerra <pvinci@vinciconsulting.com>
2020-05-02 10:40:33 -04:00
|
|
|
msg = "%s(%s) passed unexpectedly: expected negative " \
|
2019-03-05 16:58:24 +01:00
|
|
|
"return value instead of %d in %s" % \
|
tests: improve vpp_papi_provider exception output
saves time debugging tests by replacing 'API call' with
the actual function signature:
vpp_papi_provider.UnexpectedApiReturnValueError: API call failed, expected 0 return value instead of -2 in vxlan_add_del_tunnel_reply(_0=247, context=5052, retval=-2, sw_if_index=4294967295)
vpp_papi_provider.UnexpectedApiReturnValueError: vxlan_add_del_tunnel(is_add=0, src_address=172.16.1.1, dst_address=239.1.1.209, vni=209, sw_if_index=26, mcast_sw_if_index=1, encap_vrf_id=None, instance=None, decap_next_index=None) failed, expected 0 return value instead of -2 in vxlan_add_del_tunnel_reply(_0=247, context=5052, retval=-2, sw_if_index=4294967295)
Type: test
Change-Id: Ie3b6a5fdb4e1d427d60c51f7a7bf815af0bb3de6
Signed-off-by: Paul Vinciguerra <pvinci@vinciconsulting.com>
2020-05-02 10:40:33 -04:00
|
|
|
(api_fn.__name__, as_fn_signature(api_args),
|
|
|
|
reply.retval,
|
|
|
|
moves.reprlib.repr(reply))
|
2017-01-25 08:00:40 +01:00
|
|
|
self.test_class.logger.info(msg)
|
2017-02-23 09:26:30 +01:00
|
|
|
raise UnexpectedApiReturnValueError(msg)
|
2017-01-25 08:00:40 +01:00
|
|
|
elif self._expect_api_retval == self._zero:
|
|
|
|
if hasattr(reply, 'retval') and reply.retval != expected_retval:
|
tests: improve vpp_papi_provider exception output
saves time debugging tests by replacing 'API call' with
the actual function signature:
vpp_papi_provider.UnexpectedApiReturnValueError: API call failed, expected 0 return value instead of -2 in vxlan_add_del_tunnel_reply(_0=247, context=5052, retval=-2, sw_if_index=4294967295)
vpp_papi_provider.UnexpectedApiReturnValueError: vxlan_add_del_tunnel(is_add=0, src_address=172.16.1.1, dst_address=239.1.1.209, vni=209, sw_if_index=26, mcast_sw_if_index=1, encap_vrf_id=None, instance=None, decap_next_index=None) failed, expected 0 return value instead of -2 in vxlan_add_del_tunnel_reply(_0=247, context=5052, retval=-2, sw_if_index=4294967295)
Type: test
Change-Id: Ie3b6a5fdb4e1d427d60c51f7a7bf815af0bb3de6
Signed-off-by: Paul Vinciguerra <pvinci@vinciconsulting.com>
2020-05-02 10:40:33 -04:00
|
|
|
msg = "%s(%s) failed, expected %d return value instead " \
|
|
|
|
"of %d in %s" % (api_fn.__name__,
|
|
|
|
as_fn_signature(api_args),
|
|
|
|
expected_retval, reply.retval,
|
2019-06-15 20:31:31 -04:00
|
|
|
repr(reply))
|
2017-01-25 08:00:40 +01:00
|
|
|
self.test_class.logger.info(msg)
|
2017-02-23 09:26:30 +01:00
|
|
|
raise UnexpectedApiReturnValueError(msg)
|
2017-01-25 08:00:40 +01:00
|
|
|
else:
|
|
|
|
raise Exception("Internal error, unexpected value for "
|
|
|
|
"self._expect_api_retval %s" %
|
|
|
|
self._expect_api_retval)
|
2016-10-11 11:47:09 +02:00
|
|
|
self.hook.after_api(api_fn.__name__, api_args)
|
|
|
|
return reply
|
|
|
|
|
2019-10-09 17:28:04 -04:00
|
|
|
def cli_return_response(self, cli):
|
2016-12-08 10:16:41 +01:00
|
|
|
""" Execute a CLI, calling the before/after hooks appropriately.
|
2019-10-09 17:28:04 -04:00
|
|
|
Return the reply without examining it
|
2016-10-11 11:47:09 +02:00
|
|
|
|
|
|
|
:param cli: CLI to execute
|
2019-10-09 17:28:04 -04:00
|
|
|
:returns: response object
|
2016-10-11 11:47:09 +02:00
|
|
|
|
|
|
|
"""
|
|
|
|
self.hook.before_cli(cli)
|
|
|
|
cli += '\n'
|
2018-11-28 11:36:05 +01:00
|
|
|
r = self.papi.cli_inband(cmd=cli)
|
2016-10-11 11:47:09 +02:00
|
|
|
self.hook.after_cli(cli)
|
2019-10-09 17:28:04 -04:00
|
|
|
return r
|
|
|
|
|
|
|
|
def cli(self, cli):
|
|
|
|
""" Execute a CLI, calling the before/after hooks appropriately.
|
|
|
|
|
|
|
|
:param cli: CLI to execute
|
|
|
|
:returns: CLI output
|
|
|
|
|
|
|
|
"""
|
|
|
|
r = self.cli_return_response(cli)
|
2019-05-10 20:41:08 -04:00
|
|
|
if r.retval == -156:
|
|
|
|
raise CliSyntaxError(r.reply)
|
|
|
|
if r.retval != 0:
|
|
|
|
raise CliFailedCommandError(r.reply)
|
2016-10-26 15:44:27 +02:00
|
|
|
if hasattr(r, 'reply'):
|
2018-11-28 11:36:05 +01:00
|
|
|
return r.reply
|
2016-10-11 11:47:09 +02:00
|
|
|
|
2016-10-26 15:44:27 +02:00
|
|
|
def ppcli(self, cli):
|
2016-12-08 10:16:41 +01:00
|
|
|
""" Helper method to print CLI command in case of info logging level.
|
2016-10-26 15:44:27 +02:00
|
|
|
|
|
|
|
:param cli: CLI to execute
|
|
|
|
:returns: CLI output
|
|
|
|
"""
|
2019-10-15 19:31:55 +02:00
|
|
|
return cli + "\n" + self.cli(cli)
|
2016-10-26 15:44:27 +02:00
|
|
|
|
2018-01-15 10:39:21 +01:00
|
|
|
def ip6nd_send_router_solicitation(self, sw_if_index, irt=1, mrt=120,
|
|
|
|
mrc=0, mrd=0):
|
|
|
|
return self.api(self.papi.ip6nd_send_router_solicitation,
|
|
|
|
{'irt': irt,
|
|
|
|
'mrt': mrt,
|
|
|
|
'mrc': mrc,
|
|
|
|
'mrd': mrd,
|
|
|
|
'sw_if_index': sw_if_index})
|
|
|
|
|
2018-10-04 15:15:16 +02:00
|
|
|
def want_interface_events(self, enable_disable=1):
|
|
|
|
return self.api(self.papi.want_interface_events,
|
|
|
|
{'enable_disable': enable_disable,
|
|
|
|
'pid': os.getpid(), })
|
|
|
|
|
2018-02-16 02:44:05 -08:00
|
|
|
def sw_interface_set_mac_address(self, sw_if_index, mac):
|
|
|
|
return self.api(self.papi.sw_interface_set_mac_address,
|
|
|
|
{'sw_if_index': sw_if_index,
|
|
|
|
'mac_address': mac})
|
|
|
|
|
2019-03-04 23:55:43 +01:00
|
|
|
def p2p_ethernet_add(self, sw_if_index, remote_mac, subif_id):
|
2017-06-20 14:00:26 +02:00
|
|
|
"""Create p2p ethernet subinterface
|
|
|
|
|
|
|
|
:param sw_if_index: main (parent) interface
|
|
|
|
:param remote_mac: client (remote) mac address
|
|
|
|
|
|
|
|
"""
|
|
|
|
return self.api(
|
|
|
|
self.papi.p2p_ethernet_add,
|
|
|
|
{'parent_if_index': sw_if_index,
|
|
|
|
'remote_mac': remote_mac,
|
|
|
|
'subif_id': subif_id})
|
|
|
|
|
2019-03-04 23:55:43 +01:00
|
|
|
def p2p_ethernet_del(self, sw_if_index, remote_mac):
|
2017-06-20 14:00:26 +02:00
|
|
|
"""Delete p2p ethernet subinterface
|
|
|
|
|
|
|
|
:param sw_if_index: main (parent) interface
|
|
|
|
:param remote_mac: client (remote) mac address
|
|
|
|
|
|
|
|
"""
|
|
|
|
return self.api(
|
|
|
|
self.papi.p2p_ethernet_del,
|
|
|
|
{'parent_if_index': sw_if_index,
|
|
|
|
'remote_mac': remote_mac})
|
|
|
|
|
2016-10-11 11:47:09 +02:00
|
|
|
def create_vlan_subif(self, sw_if_index, vlan):
|
|
|
|
"""
|
|
|
|
|
|
|
|
:param vlan:
|
|
|
|
:param sw_if_index:
|
|
|
|
|
|
|
|
"""
|
2016-12-05 10:27:09 +01:00
|
|
|
return self.api(self.papi.create_vlan_subif,
|
2016-09-29 14:43:44 +02:00
|
|
|
{'sw_if_index': sw_if_index,
|
|
|
|
'vlan_id': vlan})
|
2016-10-11 11:47:09 +02:00
|
|
|
|
2016-11-04 11:11:44 +01:00
|
|
|
def create_loopback(self, mac=''):
|
|
|
|
"""
|
|
|
|
|
|
|
|
:param mac: (Optional)
|
|
|
|
"""
|
2016-12-05 10:27:09 +01:00
|
|
|
return self.api(self.papi.create_loopback,
|
2016-09-29 14:43:44 +02:00
|
|
|
{'mac_address': mac})
|
2016-11-04 11:11:44 +01:00
|
|
|
|
2018-05-01 05:17:55 -07:00
|
|
|
def ip_route_dump(self, table_id, is_ip6=False):
|
|
|
|
return self.api(self.papi.ip_route_dump,
|
|
|
|
{'table': {
|
|
|
|
'table_id': table_id,
|
|
|
|
'is_ip6': is_ip6
|
|
|
|
}})
|
|
|
|
|
2019-12-04 06:11:00 +00:00
|
|
|
def ip_route_v2_dump(self, table_id, is_ip6=False, src=0):
|
|
|
|
return self.api(self.papi.ip_route_v2_dump,
|
|
|
|
{
|
|
|
|
'src': src,
|
|
|
|
'table': {
|
|
|
|
'table_id': table_id,
|
|
|
|
'is_ip6': is_ip6
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
2016-11-04 11:11:44 +01:00
|
|
|
def ip_neighbor_add_del(self,
|
|
|
|
sw_if_index,
|
|
|
|
mac_address,
|
2018-08-10 05:30:06 -07:00
|
|
|
ip_address,
|
2016-11-04 11:11:44 +01:00
|
|
|
is_add=1,
|
2018-08-10 05:30:06 -07:00
|
|
|
flags=0):
|
2016-11-04 11:11:44 +01:00
|
|
|
""" Add neighbor MAC to IPv4 or IPv6 address.
|
|
|
|
|
|
|
|
:param sw_if_index:
|
|
|
|
:param mac_address:
|
|
|
|
:param dst_address:
|
|
|
|
:param is_add: (Default value = 1)
|
2018-08-10 05:30:06 -07:00
|
|
|
:param flags: (Default value = 0/NONE)
|
2016-11-04 11:11:44 +01:00
|
|
|
"""
|
|
|
|
return self.api(
|
2016-12-05 10:27:09 +01:00
|
|
|
self.papi.ip_neighbor_add_del,
|
2018-08-10 05:30:06 -07:00
|
|
|
{
|
|
|
|
'is_add': is_add,
|
|
|
|
'neighbor': {
|
|
|
|
'sw_if_index': sw_if_index,
|
|
|
|
'flags': flags,
|
|
|
|
'mac_address': mac_address,
|
|
|
|
'ip_address': ip_address
|
|
|
|
}
|
|
|
|
}
|
2016-11-04 11:11:44 +01:00
|
|
|
)
|
2016-12-08 13:10:03 +01:00
|
|
|
|
2018-08-08 01:06:40 -07:00
|
|
|
def udp_encap_add(self,
|
|
|
|
src_ip,
|
|
|
|
dst_ip,
|
|
|
|
src_port,
|
|
|
|
dst_port,
|
|
|
|
table_id=0):
|
2017-11-05 16:26:46 -08:00
|
|
|
""" Add a GRE tunnel
|
|
|
|
:param src_ip:
|
|
|
|
:param dst_ip:
|
|
|
|
:param src_port:
|
|
|
|
:param dst_port:
|
|
|
|
:param outer_fib_id: (Default value = 0)
|
|
|
|
"""
|
|
|
|
|
|
|
|
return self.api(
|
2018-08-08 01:06:40 -07:00
|
|
|
self.papi.udp_encap_add,
|
|
|
|
{
|
|
|
|
'udp_encap': {
|
|
|
|
'src_ip': src_ip,
|
|
|
|
'dst_ip': dst_ip,
|
|
|
|
'src_port': src_port,
|
|
|
|
'dst_port': dst_port,
|
|
|
|
'table_id': table_id
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
2018-05-01 05:17:55 -07:00
|
|
|
def udp_encap_del(self, id):
|
|
|
|
return self.api(self.papi.udp_encap_del, {'id': id})
|
|
|
|
|
|
|
|
def udp_encap_dump(self):
|
|
|
|
return self.api(self.papi.udp_encap_dump, {})
|
|
|
|
|
|
|
|
def want_udp_encap_stats(self, enable=1):
|
|
|
|
return self.api(self.papi.want_udp_encap_stats,
|
|
|
|
{'enable': enable,
|
|
|
|
'pid': os.getpid()})
|
|
|
|
|
|
|
|
def mpls_route_dump(self, table_id):
|
|
|
|
return self.api(self.papi.mpls_route_dump,
|
|
|
|
{'table': {
|
|
|
|
'mt_table_id': table_id
|
|
|
|
}})
|
|
|
|
|
|
|
|
def mpls_table_dump(self):
|
|
|
|
return self.api(self.papi.mpls_table_dump, {})
|
|
|
|
|
2017-09-10 04:39:11 -07:00
|
|
|
def mpls_table_add_del(
|
|
|
|
self,
|
|
|
|
table_id,
|
|
|
|
is_add=1):
|
|
|
|
"""
|
|
|
|
|
|
|
|
:param table_id
|
|
|
|
:param is_add: (Default value = 1)
|
|
|
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
return self.api(
|
|
|
|
self.papi.mpls_table_add_del,
|
2018-05-01 05:17:55 -07:00
|
|
|
{'mt_table':
|
|
|
|
{
|
|
|
|
'mt_table_id': table_id,
|
|
|
|
},
|
2017-09-10 04:39:11 -07:00
|
|
|
'mt_is_add': is_add})
|
|
|
|
|
2018-05-01 05:17:55 -07:00
|
|
|
def mpls_route_add_del(self,
|
|
|
|
table_id,
|
|
|
|
label,
|
|
|
|
eos,
|
|
|
|
eos_proto,
|
|
|
|
is_multicast,
|
|
|
|
paths,
|
|
|
|
is_add,
|
|
|
|
is_multipath):
|
|
|
|
""" MPLS Route add/del """
|
|
|
|
return self.api(
|
|
|
|
self.papi.mpls_route_add_del,
|
|
|
|
{'mr_route':
|
|
|
|
{
|
|
|
|
'mr_table_id': table_id,
|
|
|
|
'mr_label': label,
|
|
|
|
'mr_eos': eos,
|
|
|
|
'mr_eos_proto': eos_proto,
|
|
|
|
'mr_is_multicast': is_multicast,
|
|
|
|
'mr_n_paths': len(paths),
|
|
|
|
'mr_paths': paths,
|
|
|
|
},
|
|
|
|
'mr_is_add': is_add,
|
|
|
|
'mr_is_multipath': is_multipath})
|
|
|
|
|
2016-11-02 14:20:04 +00:00
|
|
|
def mpls_ip_bind_unbind(
|
|
|
|
self,
|
|
|
|
label,
|
2018-05-01 05:17:55 -07:00
|
|
|
prefix,
|
2016-11-02 14:20:04 +00:00
|
|
|
table_id=0,
|
|
|
|
ip_table_id=0,
|
|
|
|
is_bind=1):
|
|
|
|
"""
|
|
|
|
"""
|
|
|
|
return self.api(
|
2016-12-05 10:27:09 +01:00
|
|
|
self.papi.mpls_ip_bind_unbind,
|
2016-09-29 14:43:44 +02:00
|
|
|
{'mb_mpls_table_id': table_id,
|
|
|
|
'mb_label': label,
|
|
|
|
'mb_ip_table_id': ip_table_id,
|
|
|
|
'mb_is_bind': is_bind,
|
2018-05-01 05:17:55 -07:00
|
|
|
'mb_prefix': prefix})
|
2016-11-02 14:20:04 +00:00
|
|
|
|
|
|
|
def mpls_tunnel_add_del(
|
|
|
|
self,
|
|
|
|
tun_sw_if_index,
|
2018-05-01 05:17:55 -07:00
|
|
|
paths,
|
2016-11-02 14:20:04 +00:00
|
|
|
is_add=1,
|
2017-03-01 15:12:11 -08:00
|
|
|
l2_only=0,
|
|
|
|
is_multicast=0):
|
2016-11-02 14:20:04 +00:00
|
|
|
"""
|
|
|
|
"""
|
|
|
|
return self.api(
|
2016-12-05 10:27:09 +01:00
|
|
|
self.papi.mpls_tunnel_add_del,
|
2018-05-01 05:17:55 -07:00
|
|
|
{'mt_is_add': is_add,
|
|
|
|
'mt_tunnel':
|
|
|
|
{
|
|
|
|
'mt_sw_if_index': tun_sw_if_index,
|
|
|
|
'mt_l2_only': l2_only,
|
|
|
|
'mt_is_multicast': is_multicast,
|
|
|
|
'mt_n_paths': len(paths),
|
|
|
|
'mt_paths': paths,
|
|
|
|
}})
|
2016-12-07 03:38:19 -08:00
|
|
|
|
2016-12-19 09:24:50 -08:00
|
|
|
def input_acl_set_interface(
|
|
|
|
self,
|
|
|
|
is_add,
|
|
|
|
sw_if_index,
|
|
|
|
ip4_table_index=0xFFFFFFFF,
|
|
|
|
ip6_table_index=0xFFFFFFFF,
|
|
|
|
l2_table_index=0xFFFFFFFF):
|
|
|
|
"""
|
|
|
|
:param is_add:
|
|
|
|
:param sw_if_index:
|
|
|
|
:param ip4_table_index: (Default value = 0xFFFFFFFF)
|
|
|
|
:param ip6_table_index: (Default value = 0xFFFFFFFF)
|
|
|
|
:param l2_table_index: (Default value = 0xFFFFFFFF)
|
|
|
|
"""
|
|
|
|
|
|
|
|
return self.api(
|
|
|
|
self.papi.input_acl_set_interface,
|
2017-01-02 07:46:14 +01:00
|
|
|
{'sw_if_index': sw_if_index,
|
|
|
|
'ip4_table_index': ip4_table_index,
|
|
|
|
'ip6_table_index': ip6_table_index,
|
|
|
|
'l2_table_index': l2_table_index,
|
|
|
|
'is_add': is_add})
|
|
|
|
|
2018-02-07 11:37:02 +01:00
|
|
|
def output_acl_set_interface(
|
|
|
|
self,
|
|
|
|
is_add,
|
|
|
|
sw_if_index,
|
|
|
|
ip4_table_index=0xFFFFFFFF,
|
|
|
|
ip6_table_index=0xFFFFFFFF,
|
|
|
|
l2_table_index=0xFFFFFFFF):
|
|
|
|
"""
|
|
|
|
:param is_add:
|
|
|
|
:param sw_if_index:
|
|
|
|
:param ip4_table_index: (Default value = 0xFFFFFFFF)
|
|
|
|
:param ip6_table_index: (Default value = 0xFFFFFFFF)
|
|
|
|
:param l2_table_index: (Default value = 0xFFFFFFFF)
|
|
|
|
"""
|
|
|
|
|
|
|
|
return self.api(
|
|
|
|
self.papi.output_acl_set_interface,
|
|
|
|
{'sw_if_index': sw_if_index,
|
|
|
|
'ip4_table_index': ip4_table_index,
|
|
|
|
'ip6_table_index': ip6_table_index,
|
|
|
|
'l2_table_index': l2_table_index,
|
|
|
|
'is_add': is_add})
|
|
|
|
|
2017-01-02 07:46:14 +01:00
|
|
|
def set_ipfix_exporter(
|
|
|
|
self,
|
|
|
|
collector_address,
|
|
|
|
src_address,
|
|
|
|
path_mtu,
|
|
|
|
template_interval,
|
|
|
|
vrf_id=0,
|
|
|
|
collector_port=4739,
|
|
|
|
udp_checksum=0):
|
|
|
|
return self.api(
|
|
|
|
self.papi.set_ipfix_exporter,
|
|
|
|
{
|
|
|
|
'collector_address': collector_address,
|
|
|
|
'collector_port': collector_port,
|
|
|
|
'src_address': src_address,
|
|
|
|
'vrf_id': vrf_id,
|
|
|
|
'path_mtu': path_mtu,
|
|
|
|
'template_interval': template_interval,
|
|
|
|
'udp_checksum': udp_checksum,
|
|
|
|
})
|
2017-01-13 07:57:46 -08:00
|
|
|
|
2018-05-01 05:17:55 -07:00
|
|
|
def mfib_signal_dump(self):
|
|
|
|
return self.api(self.papi.mfib_signal_dump, {})
|
|
|
|
|
|
|
|
def ip_mroute_dump(self, table_id, is_ip6=False):
|
|
|
|
return self.api(self.papi.ip_mroute_dump,
|
|
|
|
{'table': {
|
|
|
|
'table_id': table_id,
|
|
|
|
'is_ip6': is_ip6
|
|
|
|
}})
|
IP Multicast FIB (mfib)
- IPv[46] mfib tables with support for (*,G/m), (*,G) and (S,G) exact and longest prefix match
- Replication represented via a new replicate DPO.
- RPF configuration and data-plane checking
- data-plane signals sent to listening control planes.
The functions of multicast forwarding entries differ from their unicast conterparts, so we introduce a new mfib_table_t and mfib_entry_t objects. However, we re-use the fib_path_list to resolve and build the entry's output list. the fib_path_list provides the service to construct a replicate DPO for multicast.
'make tests' is added to with two new suites; TEST=mfib, this is invocation of the CLI command 'test mfib' which deals with many path add/remove, flag set/unset scenarios, TEST=ip-mcast, data-plane forwarding tests.
Updated applications to use the new MIFB functions;
- IPv6 NS/RA.
- DHCPv6
unit tests for these are undated accordingly.
Change-Id: I49ec37b01f1b170335a5697541c8fd30e6d3a961
Signed-off-by: Neale Ranns <nranns@cisco.com>
2016-11-22 17:07:28 +00:00
|
|
|
|
2017-07-04 20:11:57 +08:00
|
|
|
def pppoe_add_del_session(
|
|
|
|
self,
|
|
|
|
client_ip,
|
|
|
|
client_mac,
|
|
|
|
session_id=0,
|
|
|
|
is_add=1,
|
|
|
|
decap_vrf_id=0):
|
|
|
|
"""
|
|
|
|
|
|
|
|
:param is_add: (Default value = 1)
|
|
|
|
:param is_ipv6: (Default value = 0)
|
|
|
|
:param client_ip:
|
|
|
|
:param session_id: (Default value = 0)
|
|
|
|
:param client_mac:
|
|
|
|
:param decap_vrf_id: (Default value = 0)
|
|
|
|
|
|
|
|
"""
|
|
|
|
return self.api(self.papi.pppoe_add_del_session,
|
|
|
|
{'is_add': is_add,
|
|
|
|
'session_id': session_id,
|
|
|
|
'client_ip': client_ip,
|
|
|
|
'decap_vrf_id': decap_vrf_id,
|
|
|
|
'client_mac': client_mac})
|
2017-06-22 13:00:20 +02:00
|
|
|
|
2018-08-30 06:12:27 -07:00
|
|
|
def sr_mpls_policy_add(self, bsid, weight, type, segments):
|
|
|
|
return self.api(self.papi.sr_mpls_policy_add,
|
|
|
|
{'bsid': bsid,
|
|
|
|
'weight': weight,
|
2020-01-31 10:17:29 +01:00
|
|
|
'is_spray': type,
|
2018-08-30 06:12:27 -07:00
|
|
|
'n_segments': len(segments),
|
|
|
|
'segments': segments})
|
|
|
|
|
|
|
|
def sr_mpls_policy_del(self, bsid):
|
|
|
|
return self.api(self.papi.sr_mpls_policy_del,
|
|
|
|
{'bsid': bsid})
|
|
|
|
|
2017-10-21 10:53:20 -07:00
|
|
|
def bier_table_add_del(self,
|
|
|
|
bti,
|
|
|
|
mpls_label,
|
|
|
|
is_add=1):
|
|
|
|
""" BIER Table add/del """
|
|
|
|
return self.api(
|
|
|
|
self.papi.bier_table_add_del,
|
|
|
|
{'bt_tbl_id': {"bt_set": bti.set_id,
|
|
|
|
"bt_sub_domain": bti.sub_domain_id,
|
|
|
|
"bt_hdr_len_id": bti.hdr_len_id},
|
|
|
|
'bt_label': mpls_label,
|
|
|
|
'bt_is_add': is_add})
|
|
|
|
|
|
|
|
def bier_table_dump(self):
|
|
|
|
return self.api(self.papi.bier_table_dump, {})
|
|
|
|
|
|
|
|
def bier_route_add_del(self,
|
|
|
|
bti,
|
|
|
|
bp,
|
2017-12-05 13:24:04 -08:00
|
|
|
paths,
|
2018-09-13 08:45:12 -07:00
|
|
|
is_add=1,
|
|
|
|
is_replace=0):
|
2017-10-21 10:53:20 -07:00
|
|
|
""" BIER Route add/del """
|
|
|
|
return self.api(
|
|
|
|
self.papi.bier_route_add_del,
|
2018-05-01 05:17:55 -07:00
|
|
|
{
|
|
|
|
'br_route': {
|
|
|
|
'br_tbl_id': {"bt_set": bti.set_id,
|
|
|
|
"bt_sub_domain": bti.sub_domain_id,
|
|
|
|
"bt_hdr_len_id": bti.hdr_len_id},
|
|
|
|
'br_bp': bp,
|
|
|
|
'br_n_paths': len(paths),
|
|
|
|
'br_paths': paths,
|
|
|
|
},
|
|
|
|
'br_is_add': is_add,
|
|
|
|
'br_is_replace': is_replace
|
|
|
|
})
|
2017-10-21 10:53:20 -07:00
|
|
|
|
|
|
|
def bier_route_dump(self, bti):
|
|
|
|
return self.api(
|
|
|
|
self.papi.bier_route_dump,
|
|
|
|
{'br_tbl_id': {"bt_set": bti.set_id,
|
|
|
|
"bt_sub_domain": bti.sub_domain_id,
|
|
|
|
"bt_hdr_len_id": bti.hdr_len_id}})
|
|
|
|
|
|
|
|
def bier_imp_add(self,
|
|
|
|
bti,
|
|
|
|
src,
|
|
|
|
ibytes,
|
|
|
|
is_add=1):
|
|
|
|
""" BIER Imposition Add """
|
|
|
|
return self.api(
|
|
|
|
self.papi.bier_imp_add,
|
|
|
|
{'bi_tbl_id': {"bt_set": bti.set_id,
|
|
|
|
"bt_sub_domain": bti.sub_domain_id,
|
|
|
|
"bt_hdr_len_id": bti.hdr_len_id},
|
|
|
|
'bi_src': src,
|
|
|
|
'bi_n_bytes': len(ibytes),
|
|
|
|
'bi_bytes': ibytes})
|
|
|
|
|
|
|
|
def bier_imp_del(self, bi_index):
|
|
|
|
""" BIER Imposition del """
|
|
|
|
return self.api(
|
|
|
|
self.papi.bier_imp_del,
|
|
|
|
{'bi_index': bi_index})
|
|
|
|
|
|
|
|
def bier_imp_dump(self):
|
|
|
|
return self.api(self.papi.bier_imp_dump, {})
|
|
|
|
|
|
|
|
def bier_disp_table_add_del(self,
|
|
|
|
bdti,
|
|
|
|
is_add=1):
|
|
|
|
""" BIER Disposition Table add/del """
|
|
|
|
return self.api(
|
|
|
|
self.papi.bier_disp_table_add_del,
|
|
|
|
{'bdt_tbl_id': bdti,
|
|
|
|
'bdt_is_add': is_add})
|
|
|
|
|
|
|
|
def bier_disp_table_dump(self):
|
|
|
|
return self.api(self.papi.bier_disp_table_dump, {})
|
|
|
|
|
|
|
|
def bier_disp_entry_add_del(self,
|
|
|
|
bdti,
|
|
|
|
bp,
|
|
|
|
payload_proto,
|
2018-01-31 11:35:41 -08:00
|
|
|
next_hop_afi,
|
2017-10-21 10:53:20 -07:00
|
|
|
next_hop,
|
|
|
|
next_hop_tbl_id=0,
|
|
|
|
next_hop_rpf_id=~0,
|
|
|
|
next_hop_is_ip4=1,
|
|
|
|
is_add=1):
|
|
|
|
""" BIER Route add/del """
|
2018-02-23 05:29:09 -08:00
|
|
|
lstack = []
|
|
|
|
while (len(lstack) < 16):
|
|
|
|
lstack.append({})
|
2017-10-21 10:53:20 -07:00
|
|
|
return self.api(
|
|
|
|
self.papi.bier_disp_entry_add_del,
|
|
|
|
{'bde_tbl_id': bdti,
|
|
|
|
'bde_bp': bp,
|
|
|
|
'bde_payload_proto': payload_proto,
|
|
|
|
'bde_n_paths': 1,
|
2019-07-11 19:09:30 -04:00
|
|
|
'bde_paths': [{'table_id': next_hop_tbl_id,
|
2017-10-21 10:53:20 -07:00
|
|
|
'rpf_id': next_hop_rpf_id,
|
|
|
|
'n_labels': 0,
|
2018-02-23 05:29:09 -08:00
|
|
|
'label_stack': lstack}],
|
2017-10-21 10:53:20 -07:00
|
|
|
'bde_is_add': is_add})
|
|
|
|
|
|
|
|
def bier_disp_entry_dump(self, bdti):
|
|
|
|
return self.api(
|
|
|
|
self.papi.bier_disp_entry_dump,
|
|
|
|
{'bde_tbl_id': bdti})
|
2017-10-02 11:41:24 +02:00
|
|
|
|
2017-12-11 07:11:51 -08:00
|
|
|
def ipsec_spd_add_del(self, spd_id, is_add=1):
|
|
|
|
""" SPD add/del - Wrapper to add or del ipsec SPD
|
|
|
|
Sample CLI : 'ipsec spd add 1'
|
|
|
|
|
|
|
|
:param spd_id - SPD ID to be created in the vpp . mandatory
|
|
|
|
:param is_add - create (1) or delete(0) SPD (Default 1 - add) .
|
2021-08-12 18:36:02 -04:00
|
|
|
optional
|
2017-12-11 07:11:51 -08:00
|
|
|
:returns: reply from the API
|
|
|
|
"""
|
|
|
|
return self.api(
|
|
|
|
self.papi.ipsec_spd_add_del, {
|
|
|
|
'spd_id': spd_id, 'is_add': is_add})
|
|
|
|
|
2019-01-24 04:52:25 -08:00
|
|
|
def ipsec_spds_dump(self):
|
|
|
|
return self.api(self.papi.ipsec_spds_dump, {})
|
|
|
|
|
2017-12-11 07:11:51 -08:00
|
|
|
def ipsec_interface_add_del_spd(self, spd_id, sw_if_index, is_add=1):
|
|
|
|
""" IPSEC interface SPD add/del - \
|
|
|
|
Wrapper to associate/disassociate SPD to interface in VPP
|
|
|
|
Sample CLI : 'set interface ipsec spd GigabitEthernet0/6/0 1'
|
|
|
|
|
|
|
|
:param spd_id - SPD ID to associate with the interface . mandatory
|
|
|
|
:param sw_if_index - Interface Index which needs to ipsec \
|
|
|
|
association mandatory
|
|
|
|
:param is_add - add(1) or del(0) association with interface \
|
|
|
|
(Default 1 - add) . optional
|
|
|
|
:returns: reply from the API
|
|
|
|
"""
|
|
|
|
return self.api(
|
2018-04-17 18:04:57 +02:00
|
|
|
self.papi.ipsec_interface_add_del_spd,
|
|
|
|
{'spd_id': spd_id, 'sw_if_index': sw_if_index, 'is_add': is_add})
|
2017-12-11 07:11:51 -08:00
|
|
|
|
2019-01-24 04:52:25 -08:00
|
|
|
def ipsec_spd_interface_dump(self, spd_index=None):
|
|
|
|
return self.api(self.papi.ipsec_spd_interface_dump,
|
|
|
|
{'spd_index': spd_index if spd_index else 0,
|
|
|
|
'spd_index_valid': 1 if spd_index else 0})
|
|
|
|
|
2019-01-09 21:22:20 -08:00
|
|
|
def ipsec_spd_entry_add_del(self,
|
2017-12-11 07:11:51 -08:00
|
|
|
spd_id,
|
2018-06-24 22:49:55 +02:00
|
|
|
sa_id,
|
2017-12-11 07:11:51 -08:00
|
|
|
local_address_start,
|
|
|
|
local_address_stop,
|
|
|
|
remote_address_start,
|
|
|
|
remote_address_stop,
|
|
|
|
local_port_start=0,
|
|
|
|
local_port_stop=65535,
|
|
|
|
remote_port_start=0,
|
|
|
|
remote_port_stop=65535,
|
|
|
|
protocol=0,
|
|
|
|
policy=0,
|
|
|
|
priority=100,
|
|
|
|
is_outbound=1,
|
|
|
|
is_add=1,
|
2018-09-26 11:19:00 +02:00
|
|
|
is_ipv6=0,
|
2017-12-11 07:11:51 -08:00
|
|
|
is_ip_any=0):
|
|
|
|
""" IPSEC policy SPD add/del -
|
|
|
|
Wrapper to configure ipsec SPD policy entries in VPP
|
2021-08-12 18:36:02 -04:00
|
|
|
|
2018-06-24 22:49:55 +02:00
|
|
|
:param spd_id: SPD ID for the policy
|
|
|
|
:param local_address_start: local-ip-range start address
|
2021-08-12 18:36:02 -04:00
|
|
|
:param local_address_stop: local-ip-range stop address
|
2018-06-24 22:49:55 +02:00
|
|
|
:param remote_address_start: remote-ip-range start address
|
2021-08-12 18:36:02 -04:00
|
|
|
:param remote_address_stop: remote-ip-range stop address
|
2018-06-24 22:49:55 +02:00
|
|
|
:param local_port_start: (Default value = 0)
|
|
|
|
:param local_port_stop: (Default value = 65535)
|
|
|
|
:param remote_port_start: (Default value = 0)
|
|
|
|
:param remote_port_stop: (Default value = 65535)
|
|
|
|
:param protocol: Any(0), AH(51) & ESP(50) protocol (Default value = 0)
|
|
|
|
:param sa_id: Security Association ID for mapping it to SPD
|
|
|
|
:param policy: bypass(0), discard(1), resolve(2) or protect(3) action
|
2021-08-12 18:36:02 -04:00
|
|
|
(Default value = 0)
|
2018-06-24 22:49:55 +02:00
|
|
|
:param priority: value for the spd action (Default value = 100)
|
|
|
|
:param is_outbound: flag for inbound(0) or outbound(1)
|
2021-08-12 18:36:02 -04:00
|
|
|
(Default value = 1)
|
2018-06-24 22:49:55 +02:00
|
|
|
:param is_add: (Default value = 1)
|
2017-12-11 07:11:51 -08:00
|
|
|
"""
|
|
|
|
return self.api(
|
2019-01-09 21:22:20 -08:00
|
|
|
self.papi.ipsec_spd_entry_add_del,
|
|
|
|
{
|
|
|
|
'is_add': is_add,
|
|
|
|
'entry':
|
2019-03-05 16:58:24 +01:00
|
|
|
{
|
|
|
|
'spd_id': spd_id,
|
|
|
|
'sa_id': sa_id,
|
|
|
|
'local_address_start': local_address_start,
|
|
|
|
'local_address_stop': local_address_stop,
|
|
|
|
'remote_address_start': remote_address_start,
|
|
|
|
'remote_address_stop': remote_address_stop,
|
|
|
|
'local_port_start': local_port_start,
|
|
|
|
'local_port_stop': local_port_stop,
|
|
|
|
'remote_port_start': remote_port_start,
|
|
|
|
'remote_port_stop': remote_port_stop,
|
|
|
|
'protocol': protocol,
|
|
|
|
'policy': policy,
|
|
|
|
'priority': priority,
|
|
|
|
'is_outbound': is_outbound,
|
|
|
|
}
|
2019-01-09 21:22:20 -08:00
|
|
|
})
|
2017-12-14 11:30:48 -08:00
|
|
|
|
2019-01-24 04:52:25 -08:00
|
|
|
def ipsec_spd_dump(self, spd_id, sa_id=0xffffffff):
|
|
|
|
return self.api(self.papi.ipsec_spd_dump,
|
|
|
|
{'spd_id': spd_id,
|
|
|
|
'sa_id': sa_id})
|
|
|
|
|
2018-06-24 22:49:55 +02:00
|
|
|
def ipsec_tunnel_if_add_del(self, local_ip, remote_ip, local_spi,
|
|
|
|
remote_spi, crypto_alg, local_crypto_key,
|
|
|
|
remote_crypto_key, integ_alg, local_integ_key,
|
2019-04-16 02:41:34 +00:00
|
|
|
remote_integ_key, is_add=1, esn=0, salt=0,
|
2019-06-14 01:13:25 -07:00
|
|
|
anti_replay=1, renumber=0,
|
2019-09-26 16:20:19 +00:00
|
|
|
udp_encap=0, show_instance=0xffffffff):
|
2018-06-24 22:49:55 +02:00
|
|
|
return self.api(
|
|
|
|
self.papi.ipsec_tunnel_if_add_del,
|
2019-03-20 07:21:58 -04:00
|
|
|
{
|
|
|
|
'local_ip': local_ip,
|
|
|
|
'remote_ip': remote_ip,
|
|
|
|
'local_spi': local_spi,
|
|
|
|
'remote_spi': remote_spi,
|
|
|
|
'crypto_alg': crypto_alg,
|
|
|
|
'local_crypto_key_len': len(local_crypto_key),
|
|
|
|
'local_crypto_key': local_crypto_key,
|
|
|
|
'remote_crypto_key_len': len(remote_crypto_key),
|
|
|
|
'remote_crypto_key': remote_crypto_key,
|
|
|
|
'integ_alg': integ_alg,
|
|
|
|
'local_integ_key_len': len(local_integ_key),
|
|
|
|
'local_integ_key': local_integ_key,
|
|
|
|
'remote_integ_key_len': len(remote_integ_key),
|
|
|
|
'remote_integ_key': remote_integ_key,
|
|
|
|
'is_add': is_add,
|
|
|
|
'esn': esn,
|
|
|
|
'anti_replay': anti_replay,
|
|
|
|
'renumber': renumber,
|
2019-04-16 02:41:34 +00:00
|
|
|
'show_instance': show_instance,
|
2019-06-14 01:13:25 -07:00
|
|
|
'udp_encap': udp_encap,
|
2019-04-16 02:41:34 +00:00
|
|
|
'salt': salt
|
2019-03-20 07:21:58 -04:00
|
|
|
})
|
2018-06-24 22:49:55 +02:00
|
|
|
|
2018-11-08 13:00:02 +01:00
|
|
|
def ipsec_select_backend(self, protocol, index):
|
|
|
|
return self.api(self.papi.ipsec_select_backend,
|
|
|
|
{'protocol': protocol, 'index': index})
|
|
|
|
|
|
|
|
def ipsec_backend_dump(self):
|
|
|
|
return self.api(self.papi.ipsec_backend_dump, {})
|
|
|
|
|
2019-05-15 02:13:37 -07:00
|
|
|
def punt_socket_register(self, reg, pathname,
|
|
|
|
header_version=1):
|
2018-11-28 07:42:11 +01:00
|
|
|
""" Register punt socket """
|
2017-09-20 08:26:30 +02:00
|
|
|
return self.api(self.papi.punt_socket_register,
|
2018-11-28 07:42:11 +01:00
|
|
|
{'header_version': header_version,
|
2019-05-15 02:13:37 -07:00
|
|
|
'punt': reg,
|
2018-11-28 07:42:11 +01:00
|
|
|
'pathname': pathname})
|
|
|
|
|
2019-05-15 02:13:37 -07:00
|
|
|
def punt_socket_deregister(self, reg):
|
2018-11-28 07:42:11 +01:00
|
|
|
""" Unregister punt socket """
|
|
|
|
return self.api(self.papi.punt_socket_deregister,
|
2019-05-15 02:13:37 -07:00
|
|
|
{'punt': reg})
|
2017-09-20 08:26:30 +02:00
|
|
|
|
2018-06-07 23:48:20 -07:00
|
|
|
def igmp_enable_disable(self, sw_if_index, enable, host):
|
|
|
|
""" Enable/disable IGMP on a given interface """
|
|
|
|
return self.api(self.papi.igmp_enable_disable,
|
|
|
|
{'enable': enable,
|
|
|
|
'mode': host,
|
|
|
|
'sw_if_index': sw_if_index})
|
|
|
|
|
2018-10-04 11:05:35 +02:00
|
|
|
def igmp_proxy_device_add_del(self, vrf_id, sw_if_index, add):
|
|
|
|
""" Add/del IGMP proxy device """
|
|
|
|
return self.api(self.papi.igmp_proxy_device_add_del,
|
|
|
|
{'vrf_id': vrf_id, 'sw_if_index': sw_if_index,
|
|
|
|
'add': add})
|
|
|
|
|
|
|
|
def igmp_proxy_device_add_del_interface(self, vrf_id, sw_if_index, add):
|
|
|
|
""" Add/del interface to/from IGMP proxy device """
|
|
|
|
return self.api(self.papi.igmp_proxy_device_add_del_interface,
|
|
|
|
{'vrf_id': vrf_id, 'sw_if_index': sw_if_index,
|
|
|
|
'add': add})
|
|
|
|
|
2018-06-07 23:48:20 -07:00
|
|
|
def igmp_listen(self, filter, sw_if_index, saddrs, gaddr):
|
2017-12-08 16:28:42 +01:00
|
|
|
""" Listen for new (S,G) on specified interface
|
|
|
|
|
2021-08-12 18:36:02 -04:00
|
|
|
:param enable: add/delas
|
2017-12-08 16:28:42 +01:00
|
|
|
:param sw_if_index: interface sw index
|
|
|
|
:param saddr: source ip4 addr
|
|
|
|
:param gaddr: group ip4 addr
|
|
|
|
"""
|
|
|
|
return self.api(self.papi.igmp_listen,
|
2018-06-07 23:48:20 -07:00
|
|
|
{
|
|
|
|
'group':
|
2019-03-05 16:58:24 +01:00
|
|
|
{
|
|
|
|
'filter': filter,
|
|
|
|
'sw_if_index': sw_if_index,
|
|
|
|
'n_srcs': len(saddrs),
|
|
|
|
'saddrs': saddrs,
|
|
|
|
'gaddr': gaddr
|
|
|
|
}
|
2018-06-07 23:48:20 -07:00
|
|
|
})
|
2017-12-08 16:28:42 +01:00
|
|
|
|
|
|
|
def igmp_clear_interface(self, sw_if_index):
|
|
|
|
""" Remove all (S,G)s from specified interface
|
|
|
|
doesn't send IGMP report!
|
|
|
|
"""
|
|
|
|
return self.api(
|
|
|
|
self.papi.igmp_clear_interface, {
|
|
|
|
'sw_if_index': sw_if_index})
|
|
|
|
|
|
|
|
def want_igmp_events(self, enable=1):
|
|
|
|
return self.api(self.papi.want_igmp_events, {'enable': enable,
|
|
|
|
'pid': os.getpid()})
|