2018-11-08 13:00:02 +01:00
|
|
|
import unittest
|
|
|
|
|
|
|
|
from framework import VppTestCase, VppTestRunner
|
2019-01-09 21:22:20 -08:00
|
|
|
from template_ipsec import TemplateIpsec, IPsecIPv4Params
|
|
|
|
from vpp_papi import VppEnum
|
2018-11-08 13:00:02 +01:00
|
|
|
|
2023-03-20 14:13:56 +00:00
|
|
|
from vpp_ipsec import VppIpsecSA
|
|
|
|
|
2018-11-08 13:00:02 +01:00
|
|
|
|
|
|
|
class IpsecApiTestCase(VppTestCase):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IPSec API tests"""
|
2018-11-08 13:00:02 +01:00
|
|
|
|
2023-03-20 14:13:56 +00:00
|
|
|
vpp_worker_count = 2
|
|
|
|
|
2019-03-12 19:23:27 -07:00
|
|
|
@classmethod
|
|
|
|
def setUpClass(cls):
|
|
|
|
super(IpsecApiTestCase, cls).setUpClass()
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def tearDownClass(cls):
|
|
|
|
super(IpsecApiTestCase, cls).tearDownClass()
|
|
|
|
|
2019-01-23 08:16:17 -08:00
|
|
|
def setUp(self):
|
|
|
|
super(IpsecApiTestCase, self).setUp()
|
|
|
|
self.create_pg_interfaces([0])
|
|
|
|
self.pg0.config_ip4()
|
|
|
|
self.pg0.admin_up()
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
self.vpp_esp_protocol = VppEnum.vl_api_ipsec_proto_t.IPSEC_API_PROTO_ESP
|
|
|
|
self.vpp_ah_protocol = VppEnum.vl_api_ipsec_proto_t.IPSEC_API_PROTO_AH
|
2019-01-23 08:16:17 -08:00
|
|
|
self.ipv4_params = IPsecIPv4Params()
|
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
self.pg0.unconfig_ip4()
|
|
|
|
self.pg0.admin_down()
|
|
|
|
super(IpsecApiTestCase, self).tearDown()
|
2018-11-08 13:00:02 +01:00
|
|
|
|
|
|
|
def test_backend_dump(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""backend dump"""
|
2018-11-08 13:00:02 +01:00
|
|
|
d = self.vapi.ipsec_backend_dump()
|
|
|
|
self.assert_equal(len(d), 2, "number of ipsec backends in dump")
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assert_equal(
|
|
|
|
d[0].protocol, self.vpp_ah_protocol, "ipsec protocol in dump entry"
|
|
|
|
)
|
2018-11-08 13:00:02 +01:00
|
|
|
self.assert_equal(d[0].index, 0, "index in dump entry")
|
|
|
|
self.assert_equal(d[0].active, 1, "active flag in dump entry")
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assert_equal(
|
|
|
|
d[1].protocol, self.vpp_esp_protocol, "ipsec protocol in dump entry"
|
|
|
|
)
|
2018-11-08 13:00:02 +01:00
|
|
|
self.assert_equal(d[1].index, 0, "index in dump entry")
|
|
|
|
self.assert_equal(d[1].active, 1, "active flag in dump entry")
|
|
|
|
|
|
|
|
def test_select_valid_backend(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""select valid backend"""
|
2019-01-23 08:16:17 -08:00
|
|
|
self.vapi.ipsec_select_backend(self.vpp_ah_protocol, 0)
|
|
|
|
self.vapi.ipsec_select_backend(self.vpp_esp_protocol, 0)
|
2018-11-08 13:00:02 +01:00
|
|
|
|
|
|
|
def test_select_invalid_backend(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""select invalid backend"""
|
2018-11-08 13:00:02 +01:00
|
|
|
with self.vapi.assert_negative_api_retval():
|
2019-01-23 08:16:17 -08:00
|
|
|
self.vapi.ipsec_select_backend(self.vpp_ah_protocol, 200)
|
2018-11-08 13:00:02 +01:00
|
|
|
with self.vapi.assert_negative_api_retval():
|
2019-01-23 08:16:17 -08:00
|
|
|
self.vapi.ipsec_select_backend(self.vpp_esp_protocol, 200)
|
2018-11-08 13:00:02 +01:00
|
|
|
|
|
|
|
def test_select_backend_in_use(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""attempt to change backend while sad configured"""
|
2019-01-23 08:16:17 -08:00
|
|
|
params = self.ipv4_params
|
2018-11-08 13:00:02 +01:00
|
|
|
addr_type = params.addr_type
|
|
|
|
is_ipv6 = params.is_ipv6
|
|
|
|
scapy_tun_sa_id = params.scapy_tun_sa_id
|
|
|
|
scapy_tun_spi = params.scapy_tun_spi
|
|
|
|
auth_algo_vpp_id = params.auth_algo_vpp_id
|
|
|
|
auth_key = params.auth_key
|
|
|
|
crypt_algo_vpp_id = params.crypt_algo_vpp_id
|
|
|
|
crypt_key = params.crypt_key
|
|
|
|
|
2020-04-01 09:45:23 +00:00
|
|
|
self.vapi.ipsec_sad_entry_add_del(
|
|
|
|
is_add=1,
|
|
|
|
entry={
|
2022-04-26 19:02:15 +02:00
|
|
|
"sad_id": scapy_tun_sa_id,
|
|
|
|
"spi": scapy_tun_spi,
|
|
|
|
"integrity_algorithm": auth_algo_vpp_id,
|
|
|
|
"integrity_key": {
|
|
|
|
"data": auth_key,
|
|
|
|
"length": len(auth_key),
|
2020-04-01 09:45:23 +00:00
|
|
|
},
|
2022-04-26 19:02:15 +02:00
|
|
|
"crypto_algorithm": crypt_algo_vpp_id,
|
|
|
|
"crypto_key": {
|
|
|
|
"data": crypt_key,
|
|
|
|
"length": len(crypt_key),
|
2020-04-01 09:45:23 +00:00
|
|
|
},
|
2022-04-26 19:02:15 +02:00
|
|
|
"protocol": self.vpp_ah_protocol,
|
|
|
|
"tunnel_src": self.pg0.local_addr[addr_type],
|
|
|
|
"tunnel_dst": self.pg0.remote_addr[addr_type],
|
|
|
|
},
|
|
|
|
)
|
2018-11-08 13:00:02 +01:00
|
|
|
with self.vapi.assert_negative_api_retval():
|
2022-04-26 19:02:15 +02:00
|
|
|
self.vapi.ipsec_select_backend(protocol=self.vpp_ah_protocol, index=0)
|
2018-11-08 13:00:02 +01:00
|
|
|
|
2020-04-01 09:45:23 +00:00
|
|
|
self.vapi.ipsec_sad_entry_add_del(
|
|
|
|
is_add=0,
|
|
|
|
entry={
|
2022-04-26 19:02:15 +02:00
|
|
|
"sad_id": scapy_tun_sa_id,
|
|
|
|
"spi": scapy_tun_spi,
|
|
|
|
"integrity_algorithm": auth_algo_vpp_id,
|
|
|
|
"integrity_key": {
|
|
|
|
"data": auth_key,
|
|
|
|
"length": len(auth_key),
|
2020-04-01 09:45:23 +00:00
|
|
|
},
|
2022-04-26 19:02:15 +02:00
|
|
|
"crypto_algorithm": crypt_algo_vpp_id,
|
|
|
|
"crypto_key": {
|
|
|
|
"data": crypt_key,
|
|
|
|
"length": len(crypt_key),
|
2020-04-01 09:45:23 +00:00
|
|
|
},
|
2022-04-26 19:02:15 +02:00
|
|
|
"protocol": self.vpp_ah_protocol,
|
|
|
|
"tunnel_src": self.pg0.local_addr[addr_type],
|
|
|
|
"tunnel_dst": self.pg0.remote_addr[addr_type],
|
|
|
|
},
|
|
|
|
)
|
|
|
|
self.vapi.ipsec_select_backend(protocol=self.vpp_ah_protocol, index=0)
|
2018-11-08 13:00:02 +01:00
|
|
|
|
2023-03-20 14:13:56 +00:00
|
|
|
def __check_sa_binding(self, sa_id, thread_index):
|
|
|
|
found_sa = False
|
|
|
|
sa_dumps = self.vapi.ipsec_sa_v4_dump()
|
|
|
|
for dump in sa_dumps:
|
|
|
|
if dump.entry.sad_id == sa_id:
|
|
|
|
self.assertEqual(dump.thread_index, thread_index)
|
|
|
|
found_sa = True
|
|
|
|
break
|
|
|
|
|
|
|
|
if not found_sa:
|
|
|
|
self.fail("SA not found in VPP")
|
|
|
|
|
|
|
|
def test_sa_worker_bind(self):
|
|
|
|
"""Bind an SA to a worker"""
|
|
|
|
sa = VppIpsecSA(
|
|
|
|
self,
|
|
|
|
self.ipv4_params.scapy_tun_sa_id,
|
|
|
|
self.ipv4_params.scapy_tun_spi,
|
|
|
|
self.ipv4_params.auth_algo_vpp_id,
|
|
|
|
self.ipv4_params.auth_key,
|
|
|
|
self.ipv4_params.crypt_algo_vpp_id,
|
|
|
|
self.ipv4_params.crypt_key,
|
|
|
|
VppEnum.vl_api_ipsec_proto_t.IPSEC_API_PROTO_ESP,
|
|
|
|
)
|
|
|
|
sa.add_vpp_config()
|
|
|
|
|
|
|
|
self.__check_sa_binding(sa.id, 0xFFFF)
|
|
|
|
|
|
|
|
self.vapi.ipsec_sad_bind(sa_id=sa.id, worker=1)
|
|
|
|
|
|
|
|
self.__check_sa_binding(sa.id, 2)
|
|
|
|
|
|
|
|
sa.remove_vpp_config()
|
|
|
|
|
2018-11-08 13:00:02 +01:00
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
if __name__ == "__main__":
|
2018-11-08 13:00:02 +01:00
|
|
|
unittest.main(testRunner=VppTestRunner)
|