2019-10-31 13:31:07 -05:00
|
|
|
#!/usr/bin/env python3
|
2016-10-03 19:44:57 +02:00
|
|
|
|
2020-04-03 12:18:40 -04:00
|
|
|
import socket
|
2019-12-13 23:39:35 +00:00
|
|
|
from socket import inet_pton, inet_ntop
|
VPP-1508 python3 tests: xrange
xrange is not supported. Use six.range.
py27 runtests: commands[5] | stestr --test-path ./test run --slowest test_ip4 test_ip6
==============================================================================
IPv4 disabled
==============================================================================
==============================================================================
ICMP Echo Test Case
==============================================================================
{0} test.test_ip4.TestIPDisabled.test_ip_disabled [5.256819s] ... ok
07:24:41,902 Couldn't stat : /tmp/vpp-unittest-TestICMPEcho-hU4IsB/stats.sock
{1} test.test_ip4.TestICMPEcho.test_icmp_echo [0.367035s] ... ok
==============================================================================
IPv4 Deaggregate Routes
==============================================================================
==============================================================================
IPv4 Input Exceptions
==============================================================================
07:24:47,314 Couldn't stat : /tmp/vpp-unittest-TestIPDeag-eE1VgC/stats.sock
{1} test.test_ip4.TestIPDeag.test_ip_deag [5.895646s] ... ok
{0} test.test_ip4.TestIPInput.test_ip_input [5.819001s] ... ok
==============================================================================
IPv4 longest Prefix Match
... output truncated ...
==============================
Failed 4 tests - output below:
==============================
test.test_ip4.TestIPv4FibCrud.test_3_add_new_routes
---------------------------------------------------
Captured traceback:
~~~~~~~~~~~~~~~~~~
Traceback (most recent call last):
File "/vpp/test/test_ip4.py", line 509, in test_3_add_new_routes
self.deleted_routes.remove(x)
ValueError: list.remove(x): x not in list
test.test_ip4.TestIPv4FibCrud.test_2_del_routes
-----------------------------------------------
Captured traceback:
~~~~~~~~~~~~~~~~~~
Traceback (most recent call last):
File "/vpp/test/test_ip4.py", line 478, in test_2_del_routes
self.configured_routes.remove(x)
ValueError: list.remove(x): x not in list
test.test_ip4_vrf_multi_instance.TestIp4VrfMultiInst.test_ip4_vrf_03
--------------------------------------------------------------------
Captured traceback:
~~~~~~~~~~~~~~~~~~
Traceback (most recent call last):
File "/vpp/test/test_ip4_vrf_multi_instance.py", line 465, in test_ip4_vrf_03
self.create_vrf_and_assign_interfaces(1)
File "/vpp/test/test_ip4_vrf_multi_instance.py", line 189, in create_vrf_and_assign_interfaces
pg_if.set_table_ip4(vrf_id)
File "/vpp/test/vpp_interface.py", line 322, in set_table_ip4
self.sw_if_index, 0, self.ip4_table_id)
File "/vpp/test/vpp_papi_provider.py", line 264, in sw_interface_set_table
'vrf_id': table_id})
File "/vpp/test/vpp_papi_provider.py", line 196, in api
raise UnexpectedApiReturnValueError(msg)
test.vpp_papi_provider.UnexpectedApiReturnValueError: API call failed, expected 0 return value instead of -114 in sw_interface_set_table_reply(_0=91, context=1007, retval=-114)
test.test_ip4_vrf_multi_instance.TestIp4VrfMultiInst.test_ip4_vrf_02
--------------------------------------------------------------------
Captured traceback:
~~~~~~~~~~~~~~~~~~
Traceback (most recent call last):
File "/vpp/test/test_ip4_vrf_multi_instance.py", line 445, in test_ip4_vrf_02
self.reset_vrf_and_remove_from_vrf_list(1)
File "/vpp/test/test_ip4_vrf_multi_instance.py", line 208, in reset_vrf_and_remove_from_vrf_list
self.vapi.reset_fib(vrf_id, is_ipv6=0)
File "/vpp/test/vpp_papi_provider.py", line 1137, in reset_fib
'is_ipv6': is_ipv6,
File "/vpp/test/vpp_papi_provider.py", line 196, in api
raise UnexpectedApiReturnValueError(msg)
test.vpp_papi_provider.UnexpectedApiReturnValueError: API call failed, expected 0 return value instead of -3 in reset_fib_reply(_0=259, context=1198, retval=-3)
======
Totals
======
Ran: 57 tests in 266.0000 sec.
- Passed: 53
- Skipped: 0
- Expected Fail: 0
- Unexpected Success: 0
- Failed: 4
Sum of execute time for each test: 157.3925 sec.
==============
Worker Balance
==============
- Worker 0 (29 tests) => 0:03:52.608995
- Worker 1 (28 tests) => 0:04:08.615473
Test id Runtime (s)
--------------------------------------------- -----------
test.test_ip_mcast.TestIPMcast.test_ip6_mcast 8.535
test.test_ip4.TestIPPunt.test_ip_punt 8.082
test.test_ip6.TestIP6Punt.test_ip_punt 6.582
test.test_ip6.TestIPDeag.test_ip_deag 6.175
test.test_ip6.TestIPv6.test_ns 6.171
test.test_ip4.TestIPDeag.test_ip_deag 5.896
test.test_ip6.TestIPv6.test_fib 5.846
test.test_ip4.TestIPInput.test_ip_input 5.819
test.test_ip6.TestIPv6.test_rs 5.737
test.test_ip4.TestIPv4.test_fib 5.267
ERROR: InvocationError for command '/vpp/.tox/py27/bin/stestr --test-path ./test run --slowest test_ip4 test_ip6' (exited with code 1)
______________________________________________________ summary ______________________________________________________
ERROR: py27: commands failed
Change-Id: Id9f6ecb4897386f790d82ab908963e4971a3aac8
Signed-off-by: Paul Vinciguerra <pvinci@vinciconsulting.com>
2018-11-25 11:21:50 -08:00
|
|
|
import unittest
|
|
|
|
|
2018-11-23 09:00:27 -08:00
|
|
|
from parameterized import parameterized
|
VPP-1508 python3 tests: xrange
xrange is not supported. Use six.range.
py27 runtests: commands[5] | stestr --test-path ./test run --slowest test_ip4 test_ip6
==============================================================================
IPv4 disabled
==============================================================================
==============================================================================
ICMP Echo Test Case
==============================================================================
{0} test.test_ip4.TestIPDisabled.test_ip_disabled [5.256819s] ... ok
07:24:41,902 Couldn't stat : /tmp/vpp-unittest-TestICMPEcho-hU4IsB/stats.sock
{1} test.test_ip4.TestICMPEcho.test_icmp_echo [0.367035s] ... ok
==============================================================================
IPv4 Deaggregate Routes
==============================================================================
==============================================================================
IPv4 Input Exceptions
==============================================================================
07:24:47,314 Couldn't stat : /tmp/vpp-unittest-TestIPDeag-eE1VgC/stats.sock
{1} test.test_ip4.TestIPDeag.test_ip_deag [5.895646s] ... ok
{0} test.test_ip4.TestIPInput.test_ip_input [5.819001s] ... ok
==============================================================================
IPv4 longest Prefix Match
... output truncated ...
==============================
Failed 4 tests - output below:
==============================
test.test_ip4.TestIPv4FibCrud.test_3_add_new_routes
---------------------------------------------------
Captured traceback:
~~~~~~~~~~~~~~~~~~
Traceback (most recent call last):
File "/vpp/test/test_ip4.py", line 509, in test_3_add_new_routes
self.deleted_routes.remove(x)
ValueError: list.remove(x): x not in list
test.test_ip4.TestIPv4FibCrud.test_2_del_routes
-----------------------------------------------
Captured traceback:
~~~~~~~~~~~~~~~~~~
Traceback (most recent call last):
File "/vpp/test/test_ip4.py", line 478, in test_2_del_routes
self.configured_routes.remove(x)
ValueError: list.remove(x): x not in list
test.test_ip4_vrf_multi_instance.TestIp4VrfMultiInst.test_ip4_vrf_03
--------------------------------------------------------------------
Captured traceback:
~~~~~~~~~~~~~~~~~~
Traceback (most recent call last):
File "/vpp/test/test_ip4_vrf_multi_instance.py", line 465, in test_ip4_vrf_03
self.create_vrf_and_assign_interfaces(1)
File "/vpp/test/test_ip4_vrf_multi_instance.py", line 189, in create_vrf_and_assign_interfaces
pg_if.set_table_ip4(vrf_id)
File "/vpp/test/vpp_interface.py", line 322, in set_table_ip4
self.sw_if_index, 0, self.ip4_table_id)
File "/vpp/test/vpp_papi_provider.py", line 264, in sw_interface_set_table
'vrf_id': table_id})
File "/vpp/test/vpp_papi_provider.py", line 196, in api
raise UnexpectedApiReturnValueError(msg)
test.vpp_papi_provider.UnexpectedApiReturnValueError: API call failed, expected 0 return value instead of -114 in sw_interface_set_table_reply(_0=91, context=1007, retval=-114)
test.test_ip4_vrf_multi_instance.TestIp4VrfMultiInst.test_ip4_vrf_02
--------------------------------------------------------------------
Captured traceback:
~~~~~~~~~~~~~~~~~~
Traceback (most recent call last):
File "/vpp/test/test_ip4_vrf_multi_instance.py", line 445, in test_ip4_vrf_02
self.reset_vrf_and_remove_from_vrf_list(1)
File "/vpp/test/test_ip4_vrf_multi_instance.py", line 208, in reset_vrf_and_remove_from_vrf_list
self.vapi.reset_fib(vrf_id, is_ipv6=0)
File "/vpp/test/vpp_papi_provider.py", line 1137, in reset_fib
'is_ipv6': is_ipv6,
File "/vpp/test/vpp_papi_provider.py", line 196, in api
raise UnexpectedApiReturnValueError(msg)
test.vpp_papi_provider.UnexpectedApiReturnValueError: API call failed, expected 0 return value instead of -3 in reset_fib_reply(_0=259, context=1198, retval=-3)
======
Totals
======
Ran: 57 tests in 266.0000 sec.
- Passed: 53
- Skipped: 0
- Expected Fail: 0
- Unexpected Success: 0
- Failed: 4
Sum of execute time for each test: 157.3925 sec.
==============
Worker Balance
==============
- Worker 0 (29 tests) => 0:03:52.608995
- Worker 1 (28 tests) => 0:04:08.615473
Test id Runtime (s)
--------------------------------------------- -----------
test.test_ip_mcast.TestIPMcast.test_ip6_mcast 8.535
test.test_ip4.TestIPPunt.test_ip_punt 8.082
test.test_ip6.TestIP6Punt.test_ip_punt 6.582
test.test_ip6.TestIPDeag.test_ip_deag 6.175
test.test_ip6.TestIPv6.test_ns 6.171
test.test_ip4.TestIPDeag.test_ip_deag 5.896
test.test_ip6.TestIPv6.test_fib 5.846
test.test_ip4.TestIPInput.test_ip_input 5.819
test.test_ip6.TestIPv6.test_rs 5.737
test.test_ip4.TestIPv4.test_fib 5.267
ERROR: InvocationError for command '/vpp/.tox/py27/bin/stestr --test-path ./test run --slowest test_ip4 test_ip6' (exited with code 1)
______________________________________________________ summary ______________________________________________________
ERROR: py27: commands failed
Change-Id: Id9f6ecb4897386f790d82ab908963e4971a3aac8
Signed-off-by: Paul Vinciguerra <pvinci@vinciconsulting.com>
2018-11-25 11:21:50 -08:00
|
|
|
import scapy.layers.inet6 as inet6
|
2021-05-20 16:28:12 +00:00
|
|
|
from scapy.layers.inet import UDP, IP
|
VPP-1508 python3 tests: xrange
xrange is not supported. Use six.range.
py27 runtests: commands[5] | stestr --test-path ./test run --slowest test_ip4 test_ip6
==============================================================================
IPv4 disabled
==============================================================================
==============================================================================
ICMP Echo Test Case
==============================================================================
{0} test.test_ip4.TestIPDisabled.test_ip_disabled [5.256819s] ... ok
07:24:41,902 Couldn't stat : /tmp/vpp-unittest-TestICMPEcho-hU4IsB/stats.sock
{1} test.test_ip4.TestICMPEcho.test_icmp_echo [0.367035s] ... ok
==============================================================================
IPv4 Deaggregate Routes
==============================================================================
==============================================================================
IPv4 Input Exceptions
==============================================================================
07:24:47,314 Couldn't stat : /tmp/vpp-unittest-TestIPDeag-eE1VgC/stats.sock
{1} test.test_ip4.TestIPDeag.test_ip_deag [5.895646s] ... ok
{0} test.test_ip4.TestIPInput.test_ip_input [5.819001s] ... ok
==============================================================================
IPv4 longest Prefix Match
... output truncated ...
==============================
Failed 4 tests - output below:
==============================
test.test_ip4.TestIPv4FibCrud.test_3_add_new_routes
---------------------------------------------------
Captured traceback:
~~~~~~~~~~~~~~~~~~
Traceback (most recent call last):
File "/vpp/test/test_ip4.py", line 509, in test_3_add_new_routes
self.deleted_routes.remove(x)
ValueError: list.remove(x): x not in list
test.test_ip4.TestIPv4FibCrud.test_2_del_routes
-----------------------------------------------
Captured traceback:
~~~~~~~~~~~~~~~~~~
Traceback (most recent call last):
File "/vpp/test/test_ip4.py", line 478, in test_2_del_routes
self.configured_routes.remove(x)
ValueError: list.remove(x): x not in list
test.test_ip4_vrf_multi_instance.TestIp4VrfMultiInst.test_ip4_vrf_03
--------------------------------------------------------------------
Captured traceback:
~~~~~~~~~~~~~~~~~~
Traceback (most recent call last):
File "/vpp/test/test_ip4_vrf_multi_instance.py", line 465, in test_ip4_vrf_03
self.create_vrf_and_assign_interfaces(1)
File "/vpp/test/test_ip4_vrf_multi_instance.py", line 189, in create_vrf_and_assign_interfaces
pg_if.set_table_ip4(vrf_id)
File "/vpp/test/vpp_interface.py", line 322, in set_table_ip4
self.sw_if_index, 0, self.ip4_table_id)
File "/vpp/test/vpp_papi_provider.py", line 264, in sw_interface_set_table
'vrf_id': table_id})
File "/vpp/test/vpp_papi_provider.py", line 196, in api
raise UnexpectedApiReturnValueError(msg)
test.vpp_papi_provider.UnexpectedApiReturnValueError: API call failed, expected 0 return value instead of -114 in sw_interface_set_table_reply(_0=91, context=1007, retval=-114)
test.test_ip4_vrf_multi_instance.TestIp4VrfMultiInst.test_ip4_vrf_02
--------------------------------------------------------------------
Captured traceback:
~~~~~~~~~~~~~~~~~~
Traceback (most recent call last):
File "/vpp/test/test_ip4_vrf_multi_instance.py", line 445, in test_ip4_vrf_02
self.reset_vrf_and_remove_from_vrf_list(1)
File "/vpp/test/test_ip4_vrf_multi_instance.py", line 208, in reset_vrf_and_remove_from_vrf_list
self.vapi.reset_fib(vrf_id, is_ipv6=0)
File "/vpp/test/vpp_papi_provider.py", line 1137, in reset_fib
'is_ipv6': is_ipv6,
File "/vpp/test/vpp_papi_provider.py", line 196, in api
raise UnexpectedApiReturnValueError(msg)
test.vpp_papi_provider.UnexpectedApiReturnValueError: API call failed, expected 0 return value instead of -3 in reset_fib_reply(_0=259, context=1198, retval=-3)
======
Totals
======
Ran: 57 tests in 266.0000 sec.
- Passed: 53
- Skipped: 0
- Expected Fail: 0
- Unexpected Success: 0
- Failed: 4
Sum of execute time for each test: 157.3925 sec.
==============
Worker Balance
==============
- Worker 0 (29 tests) => 0:03:52.608995
- Worker 1 (28 tests) => 0:04:08.615473
Test id Runtime (s)
--------------------------------------------- -----------
test.test_ip_mcast.TestIPMcast.test_ip6_mcast 8.535
test.test_ip4.TestIPPunt.test_ip_punt 8.082
test.test_ip6.TestIP6Punt.test_ip_punt 6.582
test.test_ip6.TestIPDeag.test_ip_deag 6.175
test.test_ip6.TestIPv6.test_ns 6.171
test.test_ip4.TestIPDeag.test_ip_deag 5.896
test.test_ip6.TestIPv6.test_fib 5.846
test.test_ip4.TestIPInput.test_ip_input 5.819
test.test_ip6.TestIPv6.test_rs 5.737
test.test_ip4.TestIPv4.test_fib 5.267
ERROR: InvocationError for command '/vpp/.tox/py27/bin/stestr --test-path ./test run --slowest test_ip4 test_ip6' (exited with code 1)
______________________________________________________ summary ______________________________________________________
ERROR: py27: commands failed
Change-Id: Id9f6ecb4897386f790d82ab908963e4971a3aac8
Signed-off-by: Paul Vinciguerra <pvinci@vinciconsulting.com>
2018-11-25 11:21:50 -08:00
|
|
|
from scapy.contrib.mpls import MPLS
|
2022-04-26 19:02:15 +02:00
|
|
|
from scapy.layers.inet6 import (
|
|
|
|
IPv6,
|
|
|
|
ICMPv6ND_NS,
|
|
|
|
ICMPv6ND_RS,
|
|
|
|
ICMPv6ND_RA,
|
|
|
|
ICMPv6NDOptMTU,
|
|
|
|
ICMPv6NDOptSrcLLAddr,
|
|
|
|
ICMPv6NDOptPrefixInfo,
|
|
|
|
ICMPv6ND_NA,
|
|
|
|
ICMPv6NDOptDstLLAddr,
|
|
|
|
ICMPv6DestUnreach,
|
|
|
|
icmp6types,
|
|
|
|
ICMPv6TimeExceeded,
|
|
|
|
ICMPv6EchoRequest,
|
|
|
|
ICMPv6EchoReply,
|
|
|
|
IPv6ExtHdrHopByHop,
|
|
|
|
ICMPv6MLReport2,
|
|
|
|
)
|
2021-05-20 16:28:12 +00:00
|
|
|
from scapy.layers.l2 import Ether, Dot1Q, GRE
|
VPP-1508 python3 tests: xrange
xrange is not supported. Use six.range.
py27 runtests: commands[5] | stestr --test-path ./test run --slowest test_ip4 test_ip6
==============================================================================
IPv4 disabled
==============================================================================
==============================================================================
ICMP Echo Test Case
==============================================================================
{0} test.test_ip4.TestIPDisabled.test_ip_disabled [5.256819s] ... ok
07:24:41,902 Couldn't stat : /tmp/vpp-unittest-TestICMPEcho-hU4IsB/stats.sock
{1} test.test_ip4.TestICMPEcho.test_icmp_echo [0.367035s] ... ok
==============================================================================
IPv4 Deaggregate Routes
==============================================================================
==============================================================================
IPv4 Input Exceptions
==============================================================================
07:24:47,314 Couldn't stat : /tmp/vpp-unittest-TestIPDeag-eE1VgC/stats.sock
{1} test.test_ip4.TestIPDeag.test_ip_deag [5.895646s] ... ok
{0} test.test_ip4.TestIPInput.test_ip_input [5.819001s] ... ok
==============================================================================
IPv4 longest Prefix Match
... output truncated ...
==============================
Failed 4 tests - output below:
==============================
test.test_ip4.TestIPv4FibCrud.test_3_add_new_routes
---------------------------------------------------
Captured traceback:
~~~~~~~~~~~~~~~~~~
Traceback (most recent call last):
File "/vpp/test/test_ip4.py", line 509, in test_3_add_new_routes
self.deleted_routes.remove(x)
ValueError: list.remove(x): x not in list
test.test_ip4.TestIPv4FibCrud.test_2_del_routes
-----------------------------------------------
Captured traceback:
~~~~~~~~~~~~~~~~~~
Traceback (most recent call last):
File "/vpp/test/test_ip4.py", line 478, in test_2_del_routes
self.configured_routes.remove(x)
ValueError: list.remove(x): x not in list
test.test_ip4_vrf_multi_instance.TestIp4VrfMultiInst.test_ip4_vrf_03
--------------------------------------------------------------------
Captured traceback:
~~~~~~~~~~~~~~~~~~
Traceback (most recent call last):
File "/vpp/test/test_ip4_vrf_multi_instance.py", line 465, in test_ip4_vrf_03
self.create_vrf_and_assign_interfaces(1)
File "/vpp/test/test_ip4_vrf_multi_instance.py", line 189, in create_vrf_and_assign_interfaces
pg_if.set_table_ip4(vrf_id)
File "/vpp/test/vpp_interface.py", line 322, in set_table_ip4
self.sw_if_index, 0, self.ip4_table_id)
File "/vpp/test/vpp_papi_provider.py", line 264, in sw_interface_set_table
'vrf_id': table_id})
File "/vpp/test/vpp_papi_provider.py", line 196, in api
raise UnexpectedApiReturnValueError(msg)
test.vpp_papi_provider.UnexpectedApiReturnValueError: API call failed, expected 0 return value instead of -114 in sw_interface_set_table_reply(_0=91, context=1007, retval=-114)
test.test_ip4_vrf_multi_instance.TestIp4VrfMultiInst.test_ip4_vrf_02
--------------------------------------------------------------------
Captured traceback:
~~~~~~~~~~~~~~~~~~
Traceback (most recent call last):
File "/vpp/test/test_ip4_vrf_multi_instance.py", line 445, in test_ip4_vrf_02
self.reset_vrf_and_remove_from_vrf_list(1)
File "/vpp/test/test_ip4_vrf_multi_instance.py", line 208, in reset_vrf_and_remove_from_vrf_list
self.vapi.reset_fib(vrf_id, is_ipv6=0)
File "/vpp/test/vpp_papi_provider.py", line 1137, in reset_fib
'is_ipv6': is_ipv6,
File "/vpp/test/vpp_papi_provider.py", line 196, in api
raise UnexpectedApiReturnValueError(msg)
test.vpp_papi_provider.UnexpectedApiReturnValueError: API call failed, expected 0 return value instead of -3 in reset_fib_reply(_0=259, context=1198, retval=-3)
======
Totals
======
Ran: 57 tests in 266.0000 sec.
- Passed: 53
- Skipped: 0
- Expected Fail: 0
- Unexpected Success: 0
- Failed: 4
Sum of execute time for each test: 157.3925 sec.
==============
Worker Balance
==============
- Worker 0 (29 tests) => 0:03:52.608995
- Worker 1 (28 tests) => 0:04:08.615473
Test id Runtime (s)
--------------------------------------------- -----------
test.test_ip_mcast.TestIPMcast.test_ip6_mcast 8.535
test.test_ip4.TestIPPunt.test_ip_punt 8.082
test.test_ip6.TestIP6Punt.test_ip_punt 6.582
test.test_ip6.TestIPDeag.test_ip_deag 6.175
test.test_ip6.TestIPv6.test_ns 6.171
test.test_ip4.TestIPDeag.test_ip_deag 5.896
test.test_ip6.TestIPv6.test_fib 5.846
test.test_ip4.TestIPInput.test_ip_input 5.819
test.test_ip6.TestIPv6.test_rs 5.737
test.test_ip4.TestIPv4.test_fib 5.267
ERROR: InvocationError for command '/vpp/.tox/py27/bin/stestr --test-path ./test run --slowest test_ip4 test_ip6' (exited with code 1)
______________________________________________________ summary ______________________________________________________
ERROR: py27: commands failed
Change-Id: Id9f6ecb4897386f790d82ab908963e4971a3aac8
Signed-off-by: Paul Vinciguerra <pvinci@vinciconsulting.com>
2018-11-25 11:21:50 -08:00
|
|
|
from scapy.packet import Raw
|
2022-04-26 19:02:15 +02:00
|
|
|
from scapy.utils6 import (
|
|
|
|
in6_getnsma,
|
|
|
|
in6_getnsmac,
|
|
|
|
in6_ptop,
|
|
|
|
in6_islladdr,
|
|
|
|
)
|
2016-10-11 11:47:09 +02:00
|
|
|
|
2023-08-31 00:47:44 -04:00
|
|
|
from framework import VppTestCase
|
|
|
|
from asfframework import VppTestRunner, tag_run_solo
|
2019-02-28 15:34:00 -08:00
|
|
|
from util import ppp, ip6_normalize, mk_ll_addr
|
2020-10-20 07:20:17 +00:00
|
|
|
from vpp_papi import VppEnum
|
2023-08-31 00:47:44 -04:00
|
|
|
from vpp_ip import VppIpPuntPolicer, VppIpPuntRedirect, VppIpPathMtu
|
2022-04-26 19:02:15 +02:00
|
|
|
from vpp_ip_route import (
|
|
|
|
VppIpRoute,
|
|
|
|
VppRoutePath,
|
|
|
|
find_route,
|
|
|
|
VppIpMRoute,
|
|
|
|
VppMRoutePath,
|
|
|
|
VppMplsIpBind,
|
|
|
|
VppMplsRoute,
|
|
|
|
VppMplsTable,
|
|
|
|
VppIpTable,
|
|
|
|
FibPathType,
|
|
|
|
FibPathProto,
|
|
|
|
VppIpInterfaceAddress,
|
|
|
|
find_route_in_dump,
|
|
|
|
find_mroute_in_dump,
|
|
|
|
VppIp6LinkLocalAddress,
|
|
|
|
VppIpRouteV2,
|
|
|
|
)
|
2017-03-08 05:17:22 -08:00
|
|
|
from vpp_neighbor import find_nbr, VppNeighbor
|
2020-12-21 08:29:34 +00:00
|
|
|
from vpp_ipip_tun_interface import VppIpIpTunInterface
|
VPP-1508 python3 tests: xrange
xrange is not supported. Use six.range.
py27 runtests: commands[5] | stestr --test-path ./test run --slowest test_ip4 test_ip6
==============================================================================
IPv4 disabled
==============================================================================
==============================================================================
ICMP Echo Test Case
==============================================================================
{0} test.test_ip4.TestIPDisabled.test_ip_disabled [5.256819s] ... ok
07:24:41,902 Couldn't stat : /tmp/vpp-unittest-TestICMPEcho-hU4IsB/stats.sock
{1} test.test_ip4.TestICMPEcho.test_icmp_echo [0.367035s] ... ok
==============================================================================
IPv4 Deaggregate Routes
==============================================================================
==============================================================================
IPv4 Input Exceptions
==============================================================================
07:24:47,314 Couldn't stat : /tmp/vpp-unittest-TestIPDeag-eE1VgC/stats.sock
{1} test.test_ip4.TestIPDeag.test_ip_deag [5.895646s] ... ok
{0} test.test_ip4.TestIPInput.test_ip_input [5.819001s] ... ok
==============================================================================
IPv4 longest Prefix Match
... output truncated ...
==============================
Failed 4 tests - output below:
==============================
test.test_ip4.TestIPv4FibCrud.test_3_add_new_routes
---------------------------------------------------
Captured traceback:
~~~~~~~~~~~~~~~~~~
Traceback (most recent call last):
File "/vpp/test/test_ip4.py", line 509, in test_3_add_new_routes
self.deleted_routes.remove(x)
ValueError: list.remove(x): x not in list
test.test_ip4.TestIPv4FibCrud.test_2_del_routes
-----------------------------------------------
Captured traceback:
~~~~~~~~~~~~~~~~~~
Traceback (most recent call last):
File "/vpp/test/test_ip4.py", line 478, in test_2_del_routes
self.configured_routes.remove(x)
ValueError: list.remove(x): x not in list
test.test_ip4_vrf_multi_instance.TestIp4VrfMultiInst.test_ip4_vrf_03
--------------------------------------------------------------------
Captured traceback:
~~~~~~~~~~~~~~~~~~
Traceback (most recent call last):
File "/vpp/test/test_ip4_vrf_multi_instance.py", line 465, in test_ip4_vrf_03
self.create_vrf_and_assign_interfaces(1)
File "/vpp/test/test_ip4_vrf_multi_instance.py", line 189, in create_vrf_and_assign_interfaces
pg_if.set_table_ip4(vrf_id)
File "/vpp/test/vpp_interface.py", line 322, in set_table_ip4
self.sw_if_index, 0, self.ip4_table_id)
File "/vpp/test/vpp_papi_provider.py", line 264, in sw_interface_set_table
'vrf_id': table_id})
File "/vpp/test/vpp_papi_provider.py", line 196, in api
raise UnexpectedApiReturnValueError(msg)
test.vpp_papi_provider.UnexpectedApiReturnValueError: API call failed, expected 0 return value instead of -114 in sw_interface_set_table_reply(_0=91, context=1007, retval=-114)
test.test_ip4_vrf_multi_instance.TestIp4VrfMultiInst.test_ip4_vrf_02
--------------------------------------------------------------------
Captured traceback:
~~~~~~~~~~~~~~~~~~
Traceback (most recent call last):
File "/vpp/test/test_ip4_vrf_multi_instance.py", line 445, in test_ip4_vrf_02
self.reset_vrf_and_remove_from_vrf_list(1)
File "/vpp/test/test_ip4_vrf_multi_instance.py", line 208, in reset_vrf_and_remove_from_vrf_list
self.vapi.reset_fib(vrf_id, is_ipv6=0)
File "/vpp/test/vpp_papi_provider.py", line 1137, in reset_fib
'is_ipv6': is_ipv6,
File "/vpp/test/vpp_papi_provider.py", line 196, in api
raise UnexpectedApiReturnValueError(msg)
test.vpp_papi_provider.UnexpectedApiReturnValueError: API call failed, expected 0 return value instead of -3 in reset_fib_reply(_0=259, context=1198, retval=-3)
======
Totals
======
Ran: 57 tests in 266.0000 sec.
- Passed: 53
- Skipped: 0
- Expected Fail: 0
- Unexpected Success: 0
- Failed: 4
Sum of execute time for each test: 157.3925 sec.
==============
Worker Balance
==============
- Worker 0 (29 tests) => 0:03:52.608995
- Worker 1 (28 tests) => 0:04:08.615473
Test id Runtime (s)
--------------------------------------------- -----------
test.test_ip_mcast.TestIPMcast.test_ip6_mcast 8.535
test.test_ip4.TestIPPunt.test_ip_punt 8.082
test.test_ip6.TestIP6Punt.test_ip_punt 6.582
test.test_ip6.TestIPDeag.test_ip_deag 6.175
test.test_ip6.TestIPv6.test_ns 6.171
test.test_ip4.TestIPDeag.test_ip_deag 5.896
test.test_ip6.TestIPv6.test_fib 5.846
test.test_ip4.TestIPInput.test_ip_input 5.819
test.test_ip6.TestIPv6.test_rs 5.737
test.test_ip4.TestIPv4.test_fib 5.267
ERROR: InvocationError for command '/vpp/.tox/py27/bin/stestr --test-path ./test run --slowest test_ip4 test_ip6' (exited with code 1)
______________________________________________________ summary ______________________________________________________
ERROR: py27: commands failed
Change-Id: Id9f6ecb4897386f790d82ab908963e4971a3aac8
Signed-off-by: Paul Vinciguerra <pvinci@vinciconsulting.com>
2018-11-25 11:21:50 -08:00
|
|
|
from vpp_pg_interface import is_ipv6_misc
|
|
|
|
from vpp_sub_interface import VppSubInterface, VppDot1QSubint
|
2021-01-19 16:58:34 +00:00
|
|
|
from vpp_policer import VppPolicer, PolicerAction
|
2019-11-11 08:32:34 +00:00
|
|
|
from ipaddress import IPv6Network, IPv6Address
|
2021-05-20 16:28:12 +00:00
|
|
|
from vpp_gre_interface import VppGreInterface
|
|
|
|
from vpp_teib import VppTeib
|
2024-03-11 10:38:46 +00:00
|
|
|
from config import config
|
2017-01-09 01:00:45 -08:00
|
|
|
|
2018-01-15 10:39:21 +01:00
|
|
|
AF_INET6 = socket.AF_INET6
|
|
|
|
|
2018-11-25 16:09:26 -08:00
|
|
|
try:
|
|
|
|
text_type = unicode
|
|
|
|
except NameError:
|
|
|
|
text_type = str
|
|
|
|
|
2019-05-14 13:25:49 -04:00
|
|
|
NUM_PKTS = 67
|
|
|
|
|
2018-01-15 10:39:21 +01:00
|
|
|
|
2017-02-18 00:03:54 -08:00
|
|
|
class TestIPv6ND(VppTestCase):
|
|
|
|
def validate_ra(self, intf, rx, dst_ip=None):
|
|
|
|
if not dst_ip:
|
|
|
|
dst_ip = intf.remote_ip6
|
|
|
|
|
|
|
|
# unicasted packets must come to the unicast mac
|
|
|
|
self.assertEqual(rx[Ether].dst, intf.remote_mac)
|
|
|
|
|
|
|
|
# and from the router's MAC
|
|
|
|
self.assertEqual(rx[Ether].src, intf.local_mac)
|
|
|
|
|
|
|
|
# the rx'd RA should be addressed to the sender's source
|
|
|
|
self.assertTrue(rx.haslayer(ICMPv6ND_RA))
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertEqual(in6_ptop(rx[IPv6].dst), in6_ptop(dst_ip))
|
2017-02-18 00:03:54 -08:00
|
|
|
|
|
|
|
# and come from the router's link local
|
|
|
|
self.assertTrue(in6_islladdr(rx[IPv6].src))
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertEqual(in6_ptop(rx[IPv6].src), in6_ptop(mk_ll_addr(intf.local_mac)))
|
2017-02-18 00:03:54 -08:00
|
|
|
|
|
|
|
def validate_na(self, intf, rx, dst_ip=None, tgt_ip=None):
|
|
|
|
if not dst_ip:
|
|
|
|
dst_ip = intf.remote_ip6
|
|
|
|
if not tgt_ip:
|
|
|
|
dst_ip = intf.local_ip6
|
|
|
|
|
|
|
|
# unicasted packets must come to the unicast mac
|
|
|
|
self.assertEqual(rx[Ether].dst, intf.remote_mac)
|
|
|
|
|
|
|
|
# and from the router's MAC
|
|
|
|
self.assertEqual(rx[Ether].src, intf.local_mac)
|
|
|
|
|
|
|
|
# the rx'd NA should be addressed to the sender's source
|
|
|
|
self.assertTrue(rx.haslayer(ICMPv6ND_NA))
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertEqual(in6_ptop(rx[IPv6].dst), in6_ptop(dst_ip))
|
2017-02-18 00:03:54 -08:00
|
|
|
|
|
|
|
# and come from the target address
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertEqual(in6_ptop(rx[IPv6].src), in6_ptop(tgt_ip))
|
2017-02-18 00:03:54 -08:00
|
|
|
|
|
|
|
# Dest link-layer options should have the router's MAC
|
|
|
|
dll = rx[ICMPv6NDOptDstLLAddr]
|
|
|
|
self.assertEqual(dll.lladdr, intf.local_mac)
|
|
|
|
|
2017-05-26 02:59:16 -07:00
|
|
|
def validate_ns(self, intf, rx, tgt_ip):
|
|
|
|
nsma = in6_getnsma(inet_pton(AF_INET6, tgt_ip))
|
|
|
|
dst_ip = inet_ntop(AF_INET6, nsma)
|
|
|
|
|
|
|
|
# NS is broadcast
|
2018-04-25 06:34:31 -07:00
|
|
|
self.assertEqual(rx[Ether].dst, in6_getnsmac(nsma))
|
2017-05-26 02:59:16 -07:00
|
|
|
|
|
|
|
# and from the router's MAC
|
|
|
|
self.assertEqual(rx[Ether].src, intf.local_mac)
|
|
|
|
|
|
|
|
# the rx'd NS should be addressed to an mcast address
|
|
|
|
# derived from the target address
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertEqual(in6_ptop(rx[IPv6].dst), in6_ptop(dst_ip))
|
2017-05-26 02:59:16 -07:00
|
|
|
|
|
|
|
# expect the tgt IP in the NS header
|
|
|
|
ns = rx[ICMPv6ND_NS]
|
|
|
|
self.assertEqual(in6_ptop(ns.tgt), in6_ptop(tgt_ip))
|
|
|
|
|
|
|
|
# packet is from the router's local address
|
2023-10-13 09:19:45 +02:00
|
|
|
self.assertEqual(in6_ptop(rx[IPv6].src), intf.local_ip6_ll)
|
2017-05-26 02:59:16 -07:00
|
|
|
|
|
|
|
# Src link-layer options should have the router's MAC
|
|
|
|
sll = rx[ICMPv6NDOptSrcLLAddr]
|
|
|
|
self.assertEqual(sll.lladdr, intf.local_mac)
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
def send_and_expect_ra(
|
|
|
|
self, intf, pkts, remark, dst_ip=None, filter_out_fn=is_ipv6_misc
|
|
|
|
):
|
2017-02-18 00:03:54 -08:00
|
|
|
intf.add_stream(pkts)
|
|
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
|
|
self.pg_start()
|
|
|
|
rx = intf.get_capture(1, filter_out_fn=filter_out_fn)
|
|
|
|
|
|
|
|
self.assertEqual(len(rx), 1)
|
|
|
|
rx = rx[0]
|
|
|
|
self.validate_ra(intf, rx, dst_ip)
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
def send_and_expect_na(
|
|
|
|
self, intf, pkts, remark, dst_ip=None, tgt_ip=None, filter_out_fn=is_ipv6_misc
|
|
|
|
):
|
2017-04-19 05:24:40 -07:00
|
|
|
intf.add_stream(pkts)
|
|
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
|
|
self.pg_start()
|
|
|
|
rx = intf.get_capture(1, filter_out_fn=filter_out_fn)
|
|
|
|
|
|
|
|
self.assertEqual(len(rx), 1)
|
|
|
|
rx = rx[0]
|
|
|
|
self.validate_na(intf, rx, dst_ip, tgt_ip)
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
def send_and_expect_ns(
|
|
|
|
self, tx_intf, rx_intf, pkts, tgt_ip, filter_out_fn=is_ipv6_misc
|
|
|
|
):
|
2019-09-30 10:53:31 +00:00
|
|
|
self.vapi.cli("clear trace")
|
2017-05-26 02:59:16 -07:00
|
|
|
tx_intf.add_stream(pkts)
|
|
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
|
|
self.pg_start()
|
|
|
|
rx = rx_intf.get_capture(1, filter_out_fn=filter_out_fn)
|
|
|
|
|
|
|
|
self.assertEqual(len(rx), 1)
|
|
|
|
rx = rx[0]
|
|
|
|
self.validate_ns(rx_intf, rx, tgt_ip)
|
|
|
|
|
|
|
|
def verify_ip(self, rx, smac, dmac, sip, dip):
|
|
|
|
ether = rx[Ether]
|
|
|
|
self.assertEqual(ether.dst, dmac)
|
|
|
|
self.assertEqual(ether.src, smac)
|
|
|
|
|
|
|
|
ip = rx[IPv6]
|
|
|
|
self.assertEqual(ip.src, sip)
|
|
|
|
self.assertEqual(ip.dst, dip)
|
|
|
|
|
2021-07-16 14:00:16 +00:00
|
|
|
def get_ip6_nd_rx_requests(self, itf):
|
|
|
|
"""Get IP6 ND RX request stats for and interface"""
|
|
|
|
return self.statistics["/net/ip6-nd/rx/requests"][:, itf.sw_if_index].sum()
|
|
|
|
|
|
|
|
def get_ip6_nd_tx_requests(self, itf):
|
|
|
|
"""Get IP6 ND TX request stats for and interface"""
|
|
|
|
return self.statistics["/net/ip6-nd/tx/requests"][:, itf.sw_if_index].sum()
|
|
|
|
|
|
|
|
def get_ip6_nd_rx_replies(self, itf):
|
|
|
|
"""Get IP6 ND RX replies stats for and interface"""
|
|
|
|
return self.statistics["/net/ip6-nd/rx/replies"][:, itf.sw_if_index].sum()
|
|
|
|
|
|
|
|
def get_ip6_nd_tx_replies(self, itf):
|
|
|
|
"""Get IP6 ND TX replies stats for and interface"""
|
|
|
|
return self.statistics["/net/ip6-nd/tx/replies"][:, itf.sw_if_index].sum()
|
|
|
|
|
2017-02-18 00:03:54 -08:00
|
|
|
|
2021-01-14 10:19:08 +00:00
|
|
|
@tag_run_solo
|
2017-02-18 00:03:54 -08:00
|
|
|
class TestIPv6(TestIPv6ND):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IPv6 Test Case"""
|
2016-10-03 19:44:57 +02:00
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def setUpClass(cls):
|
|
|
|
super(TestIPv6, cls).setUpClass()
|
|
|
|
|
2019-03-12 19:23:27 -07:00
|
|
|
@classmethod
|
|
|
|
def tearDownClass(cls):
|
|
|
|
super(TestIPv6, cls).tearDownClass()
|
|
|
|
|
2016-10-11 11:47:09 +02:00
|
|
|
def setUp(self):
|
2016-11-11 11:38:55 +01:00
|
|
|
"""
|
|
|
|
Perform test setup before test case.
|
|
|
|
|
|
|
|
**Config:**
|
|
|
|
- create 3 pg interfaces
|
|
|
|
- untagged pg0 interface
|
|
|
|
- Dot1Q subinterface on pg1
|
|
|
|
- Dot1AD subinterface on pg2
|
|
|
|
- setup interfaces:
|
|
|
|
- put it into UP state
|
|
|
|
- set IPv6 addresses
|
|
|
|
- resolve neighbor address using NDP
|
|
|
|
- configure 200 fib entries
|
|
|
|
|
|
|
|
:ivar list interfaces: pg interfaces and subinterfaces.
|
|
|
|
:ivar dict flows: IPv4 packet flows in test.
|
|
|
|
|
|
|
|
*TODO:* Create AD sub interface
|
|
|
|
"""
|
2016-10-11 11:47:09 +02:00
|
|
|
super(TestIPv6, self).setUp()
|
2016-10-03 19:44:57 +02:00
|
|
|
|
2016-10-11 11:47:09 +02:00
|
|
|
# create 3 pg interfaces
|
|
|
|
self.create_pg_interfaces(range(3))
|
2016-10-03 19:44:57 +02:00
|
|
|
|
2016-10-11 11:47:09 +02:00
|
|
|
# create 2 subinterfaces for p1 and pg2
|
|
|
|
self.sub_interfaces = [
|
|
|
|
VppDot1QSubint(self, self.pg1, 100),
|
2024-04-03 12:31:42 -04:00
|
|
|
VppDot1QSubint(self, self.pg2, 200),
|
2016-10-11 11:47:09 +02:00
|
|
|
# TODO: VppDot1ADSubint(self, self.pg2, 200, 300, 400)
|
2016-11-11 11:38:55 +01:00
|
|
|
]
|
2016-10-03 19:44:57 +02:00
|
|
|
|
2016-10-11 11:47:09 +02:00
|
|
|
# packet flows mapping pg0 -> pg1.sub, pg2.sub, etc.
|
|
|
|
self.flows = dict()
|
|
|
|
self.flows[self.pg0] = [self.pg1.sub_if, self.pg2.sub_if]
|
|
|
|
self.flows[self.pg1.sub_if] = [self.pg0, self.pg2.sub_if]
|
|
|
|
self.flows[self.pg2.sub_if] = [self.pg0, self.pg1.sub_if]
|
2016-10-03 19:44:57 +02:00
|
|
|
|
2016-10-11 11:47:09 +02:00
|
|
|
# packet sizes
|
2018-06-26 12:24:03 +02:00
|
|
|
self.pg_if_packet_sizes = [64, 1500, 9020]
|
2016-10-03 19:44:57 +02:00
|
|
|
|
2016-10-11 11:47:09 +02:00
|
|
|
self.interfaces = list(self.pg_interfaces)
|
|
|
|
self.interfaces.extend(self.sub_interfaces)
|
2016-10-03 19:44:57 +02:00
|
|
|
|
2016-10-11 11:47:09 +02:00
|
|
|
# setup all interfaces
|
|
|
|
for i in self.interfaces:
|
|
|
|
i.admin_up()
|
|
|
|
i.config_ip6()
|
|
|
|
i.resolve_ndp()
|
2016-10-03 19:44:57 +02:00
|
|
|
|
2016-10-11 11:47:09 +02:00
|
|
|
def tearDown(self):
|
2016-11-11 11:38:55 +01:00
|
|
|
"""Run standard test teardown and log ``show ip6 neighbors``."""
|
fib: fix dpo-receive address in ip6-ll fibs
Need to fill frp_addr for local path, it's used by dpo-receive.
If not, address output can be invalid:
$ sudo vppctl sh ip6-ll fe80::dcad:ff:fe00:3/128
IP6-link-local:loop3, fib_index:2, locks:[IPv6-nd:1, ]
fe80::dcad:ff:fe00:3/128 fib:2 index:55 locks:2
IPv6-nd refs:1 entry-flags:connected,import,local, src-flags:added,contributing,active,
path-list:[72] locks:2 flags:shared,local, uPRF-list:58 len:0 itfs:[]
path:[82] pl-index:72 ip6 weight=1 pref=0 receive: oper-flags:resolved, cfg-flags:local,glean,
[@0]: dpo-receive: 8000:100:fe80::dcad:ff on loop3
forwarding: unicast-ip6-chain
[@0]: dpo-load-balance: [proto:ip6 index:57 buckets:1 uRPF:58 to:[0:0]]
[0] [@2]: dpo-receive: 8000:100:fe80::dcad:ff on loop3
Type: fix
Change-Id: Ib9874c5eac74af789e721098d512a1058cb8e404
Signed-off-by: Vladislav Grishenko <themiron@yandex-team.ru>
2022-05-16 01:44:43 +05:00
|
|
|
for i in reversed(self.interfaces):
|
2017-01-09 01:00:45 -08:00
|
|
|
i.unconfig_ip6()
|
|
|
|
i.admin_down()
|
2017-08-14 10:35:44 -07:00
|
|
|
for i in self.sub_interfaces:
|
2017-01-09 01:00:45 -08:00
|
|
|
i.remove_vpp_config()
|
|
|
|
|
2016-10-11 11:47:09 +02:00
|
|
|
super(TestIPv6, self).tearDown()
|
|
|
|
if not self.vpp_dead:
|
2016-11-11 11:38:55 +01:00
|
|
|
self.logger.info(self.vapi.cli("show ip6 neighbors"))
|
2016-10-11 11:47:09 +02:00
|
|
|
# info(self.vapi.cli("show ip6 fib")) # many entries
|
|
|
|
|
2018-06-26 12:24:03 +02:00
|
|
|
def modify_packet(self, src_if, packet_size, pkt):
|
|
|
|
"""Add load, set destination IP and extend packet to required packet
|
|
|
|
size for defined interface.
|
|
|
|
|
|
|
|
:param VppInterface src_if: Interface to create packet for.
|
|
|
|
:param int packet_size: Required packet size.
|
|
|
|
:param Scapy pkt: Packet to be modified.
|
|
|
|
"""
|
2019-10-11 21:28:56 +00:00
|
|
|
dst_if_idx = int(packet_size / 10 % 2)
|
2018-06-26 12:24:03 +02:00
|
|
|
dst_if = self.flows[src_if][dst_if_idx]
|
|
|
|
info = self.create_packet_info(src_if, dst_if)
|
|
|
|
payload = self.info_to_payload(info)
|
2018-11-24 22:19:12 -08:00
|
|
|
p = pkt / Raw(payload)
|
2018-06-26 12:24:03 +02:00
|
|
|
p[IPv6].dst = dst_if.remote_ip6
|
|
|
|
info.data = p.copy()
|
|
|
|
if isinstance(src_if, VppSubInterface):
|
|
|
|
p = src_if.add_dot1_layer(p)
|
|
|
|
self.extend_packet(p, packet_size)
|
|
|
|
|
|
|
|
return p
|
|
|
|
|
|
|
|
def create_stream(self, src_if):
|
2016-11-11 11:38:55 +01:00
|
|
|
"""Create input packet stream for defined interface.
|
|
|
|
|
|
|
|
:param VppInterface src_if: Interface to create packet stream for.
|
|
|
|
"""
|
2018-06-26 12:24:03 +02:00
|
|
|
hdr_ext = 4 if isinstance(src_if, VppSubInterface) else 0
|
2022-04-26 19:02:15 +02:00
|
|
|
pkt_tmpl = (
|
|
|
|
Ether(dst=src_if.local_mac, src=src_if.remote_mac)
|
|
|
|
/ IPv6(src=src_if.remote_ip6)
|
|
|
|
/ inet6.UDP(sport=1234, dport=1234)
|
|
|
|
)
|
|
|
|
|
|
|
|
pkts = [
|
|
|
|
self.modify_packet(src_if, i, pkt_tmpl)
|
2024-08-20 15:15:22 -04:00
|
|
|
for i in range(self.pg_if_packet_sizes[0], self.pg_if_packet_sizes[1], 10)
|
2022-04-26 19:02:15 +02:00
|
|
|
]
|
|
|
|
pkts_b = [
|
|
|
|
self.modify_packet(src_if, i, pkt_tmpl)
|
2024-08-20 15:15:22 -04:00
|
|
|
for i in range(
|
2022-04-26 19:02:15 +02:00
|
|
|
self.pg_if_packet_sizes[1] + hdr_ext,
|
|
|
|
self.pg_if_packet_sizes[2] + hdr_ext,
|
|
|
|
50,
|
|
|
|
)
|
|
|
|
]
|
2018-06-26 12:24:03 +02:00
|
|
|
pkts.extend(pkts_b)
|
|
|
|
|
2016-10-03 19:44:57 +02:00
|
|
|
return pkts
|
|
|
|
|
2016-10-11 11:47:09 +02:00
|
|
|
def verify_capture(self, dst_if, capture):
|
2016-11-11 11:38:55 +01:00
|
|
|
"""Verify captured input packet stream for defined interface.
|
|
|
|
|
|
|
|
:param VppInterface dst_if: Interface to verify captured packet stream
|
|
|
|
for.
|
|
|
|
:param list capture: Captured packet stream.
|
|
|
|
"""
|
|
|
|
self.logger.info("Verifying capture on interface %s" % dst_if.name)
|
2016-10-11 11:47:09 +02:00
|
|
|
last_info = dict()
|
2016-10-03 19:44:57 +02:00
|
|
|
for i in self.interfaces:
|
2016-10-11 11:47:09 +02:00
|
|
|
last_info[i.sw_if_index] = None
|
|
|
|
is_sub_if = False
|
|
|
|
dst_sw_if_index = dst_if.sw_if_index
|
2022-04-26 19:02:15 +02:00
|
|
|
if hasattr(dst_if, "parent"):
|
2016-10-11 11:47:09 +02:00
|
|
|
is_sub_if = True
|
2016-10-03 19:44:57 +02:00
|
|
|
for packet in capture:
|
2016-10-11 11:47:09 +02:00
|
|
|
if is_sub_if:
|
|
|
|
# Check VLAN tags and Ethernet header
|
|
|
|
packet = dst_if.remove_dot1_layer(packet)
|
2016-10-03 19:44:57 +02:00
|
|
|
self.assertTrue(Dot1Q not in packet)
|
|
|
|
try:
|
|
|
|
ip = packet[IPv6]
|
2018-11-24 22:19:12 -08:00
|
|
|
udp = packet[inet6.UDP]
|
2019-03-06 11:58:06 -08:00
|
|
|
payload_info = self.payload_to_info(packet[Raw])
|
2016-10-03 19:44:57 +02:00
|
|
|
packet_index = payload_info.index
|
2016-10-11 11:47:09 +02:00
|
|
|
self.assertEqual(payload_info.dst, dst_sw_if_index)
|
2017-01-04 12:58:53 +01:00
|
|
|
self.logger.debug(
|
2022-04-26 19:02:15 +02:00
|
|
|
"Got packet on port %s: src=%u (id=%u)"
|
|
|
|
% (dst_if.name, payload_info.src, packet_index)
|
|
|
|
)
|
2016-10-11 11:47:09 +02:00
|
|
|
next_info = self.get_next_packet_info_for_interface2(
|
2022-04-26 19:02:15 +02:00
|
|
|
payload_info.src, dst_sw_if_index, last_info[payload_info.src]
|
|
|
|
)
|
2016-10-11 11:47:09 +02:00
|
|
|
last_info[payload_info.src] = next_info
|
2016-10-03 19:44:57 +02:00
|
|
|
self.assertTrue(next_info is not None)
|
|
|
|
self.assertEqual(packet_index, next_info.index)
|
|
|
|
saved_packet = next_info.data
|
|
|
|
# Check standard fields
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertEqual(ip.src, saved_packet[IPv6].src)
|
|
|
|
self.assertEqual(ip.dst, saved_packet[IPv6].dst)
|
|
|
|
self.assertEqual(udp.sport, saved_packet[inet6.UDP].sport)
|
|
|
|
self.assertEqual(udp.dport, saved_packet[inet6.UDP].dport)
|
2016-10-03 19:44:57 +02:00
|
|
|
except:
|
2016-11-18 07:38:42 +01:00
|
|
|
self.logger.error(ppp("Unexpected or invalid packet:", packet))
|
2016-10-03 19:44:57 +02:00
|
|
|
raise
|
|
|
|
for i in self.interfaces:
|
2016-10-11 11:47:09 +02:00
|
|
|
remaining_packet = self.get_next_packet_info_for_interface2(
|
2022-04-26 19:02:15 +02:00
|
|
|
i.sw_if_index, dst_sw_if_index, last_info[i.sw_if_index]
|
|
|
|
)
|
|
|
|
self.assertTrue(
|
|
|
|
remaining_packet is None,
|
|
|
|
"Interface %s: Packet expected from interface %s "
|
|
|
|
"didn't arrive" % (dst_if.name, i.name),
|
|
|
|
)
|
2016-10-03 19:44:57 +02:00
|
|
|
|
2019-06-17 12:23:15 +00:00
|
|
|
def test_next_header_anomaly(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IPv6 next header anomaly test
|
2019-06-17 12:23:15 +00:00
|
|
|
|
|
|
|
Test scenario:
|
|
|
|
- ipv6 next header field = Fragment Header (44)
|
|
|
|
- next header is ICMPv6 Echo Request
|
|
|
|
- wait for reassembly
|
|
|
|
"""
|
2022-04-26 19:02:15 +02:00
|
|
|
pkt = (
|
|
|
|
Ether(src=self.pg0.local_mac, dst=self.pg0.remote_mac)
|
|
|
|
/ IPv6(src=self.pg0.remote_ip6, dst=self.pg0.local_ip6, nh=44)
|
|
|
|
/ ICMPv6EchoRequest()
|
|
|
|
)
|
2019-06-17 12:23:15 +00:00
|
|
|
|
|
|
|
self.pg0.add_stream(pkt)
|
|
|
|
self.pg_start()
|
|
|
|
|
|
|
|
# wait for reassembly
|
|
|
|
self.sleep(10)
|
|
|
|
|
2016-10-03 19:44:57 +02:00
|
|
|
def test_fib(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IPv6 FIB test
|
2016-11-11 11:38:55 +01:00
|
|
|
|
|
|
|
Test scenario:
|
|
|
|
- Create IPv6 stream for pg0 interface
|
|
|
|
- Create IPv6 tagged streams for pg1's and pg2's subinterface.
|
|
|
|
- Send and verify received packets on each interface.
|
|
|
|
"""
|
2016-10-03 19:44:57 +02:00
|
|
|
|
2018-06-26 12:24:03 +02:00
|
|
|
pkts = self.create_stream(self.pg0)
|
2016-10-11 11:47:09 +02:00
|
|
|
self.pg0.add_stream(pkts)
|
|
|
|
|
|
|
|
for i in self.sub_interfaces:
|
2018-06-26 12:24:03 +02:00
|
|
|
pkts = self.create_stream(i)
|
2016-10-11 11:47:09 +02:00
|
|
|
i.parent.add_stream(pkts)
|
2016-10-03 19:44:57 +02:00
|
|
|
|
2016-10-11 11:47:09 +02:00
|
|
|
self.pg_enable_capture(self.pg_interfaces)
|
2016-10-03 19:44:57 +02:00
|
|
|
self.pg_start()
|
|
|
|
|
2016-10-11 11:47:09 +02:00
|
|
|
pkts = self.pg0.get_capture()
|
|
|
|
self.verify_capture(self.pg0, pkts)
|
|
|
|
|
|
|
|
for i in self.sub_interfaces:
|
|
|
|
pkts = i.parent.get_capture()
|
|
|
|
self.verify_capture(i, pkts)
|
2016-10-03 19:44:57 +02:00
|
|
|
|
2017-01-09 01:00:45 -08:00
|
|
|
def test_ns(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IPv6 Neighbour Solicitation Exceptions
|
2017-01-09 01:00:45 -08:00
|
|
|
|
2017-01-04 12:58:53 +01:00
|
|
|
Test scenario:
|
2017-01-09 01:00:45 -08:00
|
|
|
- Send an NS Sourced from an address not covered by the link sub-net
|
|
|
|
- Send an NS to an mcast address the router has not joined
|
|
|
|
- Send NS for a target address the router does not onn.
|
|
|
|
"""
|
|
|
|
|
2021-07-16 14:00:16 +00:00
|
|
|
n_rx_req_pg0 = self.get_ip6_nd_rx_requests(self.pg0)
|
|
|
|
n_tx_rep_pg0 = self.get_ip6_nd_tx_replies(self.pg0)
|
|
|
|
|
2017-01-09 01:00:45 -08:00
|
|
|
#
|
|
|
|
# An NS from a non link source address
|
|
|
|
#
|
2017-02-18 00:03:54 -08:00
|
|
|
nsma = in6_getnsma(inet_pton(AF_INET6, self.pg0.local_ip6))
|
|
|
|
d = inet_ntop(AF_INET6, nsma)
|
2017-01-09 01:00:45 -08:00
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
p = (
|
|
|
|
Ether(dst=in6_getnsmac(nsma))
|
|
|
|
/ IPv6(dst=d, src="2002::2")
|
|
|
|
/ ICMPv6ND_NS(tgt=self.pg0.local_ip6)
|
|
|
|
/ ICMPv6NDOptSrcLLAddr(lladdr=self.pg0.remote_mac)
|
|
|
|
)
|
2017-01-09 01:00:45 -08:00
|
|
|
pkts = [p]
|
|
|
|
|
2017-01-04 12:58:53 +01:00
|
|
|
self.send_and_assert_no_replies(
|
2022-04-26 19:02:15 +02:00
|
|
|
self.pg0, pkts, "No response to NS source by address not on sub-net"
|
|
|
|
)
|
2021-07-16 14:00:16 +00:00
|
|
|
self.assert_equal(self.get_ip6_nd_rx_requests(self.pg0), n_rx_req_pg0 + 1)
|
2017-01-09 01:00:45 -08:00
|
|
|
|
|
|
|
#
|
2017-01-04 12:58:53 +01:00
|
|
|
# An NS for sent to a solicited mcast group the router is
|
|
|
|
# not a member of FAILS
|
2017-01-09 01:00:45 -08:00
|
|
|
#
|
|
|
|
if 0:
|
2017-02-18 00:03:54 -08:00
|
|
|
nsma = in6_getnsma(inet_pton(AF_INET6, "fd::ffff"))
|
|
|
|
d = inet_ntop(AF_INET6, nsma)
|
2017-01-09 01:00:45 -08:00
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
p = (
|
|
|
|
Ether(dst=in6_getnsmac(nsma))
|
|
|
|
/ IPv6(dst=d, src=self.pg0.remote_ip6)
|
|
|
|
/ ICMPv6ND_NS(tgt=self.pg0.local_ip6)
|
|
|
|
/ ICMPv6NDOptSrcLLAddr(lladdr=self.pg0.remote_mac)
|
|
|
|
)
|
2017-01-09 01:00:45 -08:00
|
|
|
pkts = [p]
|
|
|
|
|
2017-01-04 12:58:53 +01:00
|
|
|
self.send_and_assert_no_replies(
|
2022-04-26 19:02:15 +02:00
|
|
|
self.pg0, pkts, "No response to NS sent to unjoined mcast address"
|
|
|
|
)
|
2017-01-09 01:00:45 -08:00
|
|
|
|
|
|
|
#
|
|
|
|
# An NS whose target address is one the router does not own
|
|
|
|
#
|
2017-02-18 00:03:54 -08:00
|
|
|
nsma = in6_getnsma(inet_pton(AF_INET6, self.pg0.local_ip6))
|
|
|
|
d = inet_ntop(AF_INET6, nsma)
|
2017-01-09 01:00:45 -08:00
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
p = (
|
|
|
|
Ether(dst=in6_getnsmac(nsma))
|
|
|
|
/ IPv6(dst=d, src=self.pg0.remote_ip6)
|
|
|
|
/ ICMPv6ND_NS(tgt="fd::ffff")
|
|
|
|
/ ICMPv6NDOptSrcLLAddr(lladdr=self.pg0.remote_mac)
|
|
|
|
)
|
2017-01-09 01:00:45 -08:00
|
|
|
pkts = [p]
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
self.send_and_assert_no_replies(
|
|
|
|
self.pg0, pkts, "No response to NS for unknown target"
|
|
|
|
)
|
2021-07-16 14:00:16 +00:00
|
|
|
self.assert_equal(self.get_ip6_nd_rx_requests(self.pg0), n_rx_req_pg0 + 2)
|
2017-01-09 01:00:45 -08:00
|
|
|
|
2017-03-08 05:17:22 -08:00
|
|
|
#
|
|
|
|
# A neighbor entry that has no associated FIB-entry
|
|
|
|
#
|
|
|
|
self.pg0.generate_remote_hosts(4)
|
2022-04-26 19:02:15 +02:00
|
|
|
nd_entry = VppNeighbor(
|
|
|
|
self,
|
|
|
|
self.pg0.sw_if_index,
|
|
|
|
self.pg0.remote_hosts[2].mac,
|
|
|
|
self.pg0.remote_hosts[2].ip6,
|
|
|
|
is_no_fib_entry=1,
|
|
|
|
)
|
2017-03-08 05:17:22 -08:00
|
|
|
nd_entry.add_vpp_config()
|
|
|
|
|
|
|
|
#
|
|
|
|
# check we have the neighbor, but no route
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertTrue(
|
|
|
|
find_nbr(self, self.pg0.sw_if_index, self.pg0._remote_hosts[2].ip6)
|
|
|
|
)
|
|
|
|
self.assertFalse(find_route(self, self.pg0._remote_hosts[2].ip6, 128))
|
2017-03-08 05:17:22 -08:00
|
|
|
|
2017-04-19 05:24:40 -07:00
|
|
|
#
|
|
|
|
# send an NS from a link local address to the interface's global
|
|
|
|
# address
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
p = (
|
|
|
|
Ether(dst=in6_getnsmac(nsma), src=self.pg0.remote_mac)
|
|
|
|
/ IPv6(dst=d, src=self.pg0._remote_hosts[2].ip6_ll)
|
|
|
|
/ ICMPv6ND_NS(tgt=self.pg0.local_ip6)
|
|
|
|
/ ICMPv6NDOptSrcLLAddr(lladdr=self.pg0.remote_mac)
|
|
|
|
)
|
2017-04-19 05:24:40 -07:00
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
self.send_and_expect_na(
|
|
|
|
self.pg0,
|
|
|
|
p,
|
|
|
|
"NS from link-local",
|
|
|
|
dst_ip=self.pg0._remote_hosts[2].ip6_ll,
|
|
|
|
tgt_ip=self.pg0.local_ip6,
|
|
|
|
)
|
2021-07-16 14:00:16 +00:00
|
|
|
self.assert_equal(self.get_ip6_nd_rx_requests(self.pg0), n_rx_req_pg0 + 3)
|
|
|
|
self.assert_equal(self.get_ip6_nd_tx_replies(self.pg0), n_tx_rep_pg0 + 1)
|
2017-04-19 05:24:40 -07:00
|
|
|
|
|
|
|
#
|
|
|
|
# we should have learned an ND entry for the peer's link-local
|
|
|
|
# but not inserted a route to it in the FIB
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertTrue(
|
|
|
|
find_nbr(self, self.pg0.sw_if_index, self.pg0._remote_hosts[2].ip6_ll)
|
|
|
|
)
|
|
|
|
self.assertFalse(find_route(self, self.pg0._remote_hosts[2].ip6_ll, 128))
|
2017-04-19 05:24:40 -07:00
|
|
|
|
|
|
|
#
|
|
|
|
# An NS to the router's own Link-local
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
p = (
|
|
|
|
Ether(dst=in6_getnsmac(nsma), src=self.pg0.remote_mac)
|
|
|
|
/ IPv6(dst=d, src=self.pg0._remote_hosts[3].ip6_ll)
|
|
|
|
/ ICMPv6ND_NS(tgt=self.pg0.local_ip6_ll)
|
|
|
|
/ ICMPv6NDOptSrcLLAddr(lladdr=self.pg0.remote_mac)
|
|
|
|
)
|
2017-04-19 05:24:40 -07:00
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
self.send_and_expect_na(
|
|
|
|
self.pg0,
|
|
|
|
p,
|
|
|
|
"NS to/from link-local",
|
|
|
|
dst_ip=self.pg0._remote_hosts[3].ip6_ll,
|
|
|
|
tgt_ip=self.pg0.local_ip6_ll,
|
|
|
|
)
|
2017-04-19 05:24:40 -07:00
|
|
|
|
2021-04-02 07:34:39 +00:00
|
|
|
#
|
|
|
|
# do not respond to a NS for the peer's address
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
p = (
|
|
|
|
Ether(dst=in6_getnsmac(nsma), src=self.pg0.remote_mac)
|
|
|
|
/ IPv6(dst=d, src=self.pg0._remote_hosts[3].ip6_ll)
|
|
|
|
/ ICMPv6ND_NS(tgt=self.pg0._remote_hosts[3].ip6_ll)
|
|
|
|
/ ICMPv6NDOptSrcLLAddr(lladdr=self.pg0.remote_mac)
|
|
|
|
)
|
2021-04-02 07:34:39 +00:00
|
|
|
|
|
|
|
self.send_and_assert_no_replies(self.pg0, p)
|
|
|
|
|
2017-04-19 05:24:40 -07:00
|
|
|
#
|
|
|
|
# we should have learned an ND entry for the peer's link-local
|
|
|
|
# but not inserted a route to it in the FIB
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertTrue(
|
|
|
|
find_nbr(self, self.pg0.sw_if_index, self.pg0._remote_hosts[3].ip6_ll)
|
|
|
|
)
|
|
|
|
self.assertFalse(find_route(self, self.pg0._remote_hosts[3].ip6_ll, 128))
|
2017-04-19 05:24:40 -07:00
|
|
|
|
2021-07-16 14:00:16 +00:00
|
|
|
def test_nd_incomplete(self):
|
|
|
|
"""IP6-ND Incomplete"""
|
|
|
|
self.pg1.generate_remote_hosts(3)
|
|
|
|
|
|
|
|
p0 = (
|
|
|
|
Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
|
|
|
|
/ IPv6(src=self.pg0.remote_ip6, dst=self.pg1.remote_hosts[1].ip6)
|
|
|
|
/ UDP(sport=1234, dport=1234)
|
|
|
|
/ Raw()
|
|
|
|
)
|
|
|
|
|
|
|
|
#
|
|
|
|
# a packet to an unresolved destination generates an ND request
|
|
|
|
#
|
|
|
|
n_tx_req_pg1 = self.get_ip6_nd_tx_requests(self.pg1)
|
|
|
|
self.send_and_expect_ns(self.pg0, self.pg1, p0, self.pg1.remote_hosts[1].ip6)
|
|
|
|
self.assert_equal(self.get_ip6_nd_tx_requests(self.pg1), n_tx_req_pg1 + 1)
|
|
|
|
|
|
|
|
#
|
|
|
|
# a reply to the request
|
|
|
|
#
|
|
|
|
self.assert_equal(self.get_ip6_nd_rx_replies(self.pg1), 0)
|
|
|
|
na = (
|
|
|
|
Ether(dst=self.pg1.local_mac, src=self.pg1.remote_mac)
|
|
|
|
/ IPv6(dst=self.pg1.local_ip6, src=self.pg1.remote_hosts[1].ip6)
|
|
|
|
/ ICMPv6ND_NA(tgt=self.pg1.remote_hosts[1].ip6)
|
|
|
|
/ ICMPv6NDOptSrcLLAddr(lladdr=self.pg1.remote_hosts[1].mac)
|
|
|
|
)
|
|
|
|
self.send_and_assert_no_replies(self.pg1, [na])
|
|
|
|
self.assert_equal(self.get_ip6_nd_rx_replies(self.pg1), 1)
|
|
|
|
|
2017-05-26 02:59:16 -07:00
|
|
|
def test_ns_duplicates(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""ND Duplicates"""
|
2017-05-26 02:59:16 -07:00
|
|
|
|
|
|
|
#
|
|
|
|
# Generate some hosts on the LAN
|
|
|
|
#
|
|
|
|
self.pg1.generate_remote_hosts(3)
|
|
|
|
|
|
|
|
#
|
|
|
|
# Add host 1 on pg1 and pg2
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
ns_pg1 = VppNeighbor(
|
|
|
|
self,
|
|
|
|
self.pg1.sw_if_index,
|
|
|
|
self.pg1.remote_hosts[1].mac,
|
|
|
|
self.pg1.remote_hosts[1].ip6,
|
|
|
|
)
|
2017-05-26 02:59:16 -07:00
|
|
|
ns_pg1.add_vpp_config()
|
2022-04-26 19:02:15 +02:00
|
|
|
ns_pg2 = VppNeighbor(
|
|
|
|
self,
|
|
|
|
self.pg2.sw_if_index,
|
|
|
|
self.pg2.remote_mac,
|
|
|
|
self.pg1.remote_hosts[1].ip6,
|
|
|
|
)
|
2017-05-26 02:59:16 -07:00
|
|
|
ns_pg2.add_vpp_config()
|
|
|
|
|
|
|
|
#
|
|
|
|
# IP packet destined for pg1 remote host arrives on pg1 again.
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
p = (
|
|
|
|
Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
|
|
|
|
/ IPv6(src=self.pg0.remote_ip6, dst=self.pg1.remote_hosts[1].ip6)
|
|
|
|
/ inet6.UDP(sport=1234, dport=1234)
|
|
|
|
/ Raw()
|
|
|
|
)
|
2017-05-26 02:59:16 -07:00
|
|
|
|
|
|
|
self.pg0.add_stream(p)
|
|
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
|
|
self.pg_start()
|
|
|
|
|
|
|
|
rx1 = self.pg1.get_capture(1)
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
self.verify_ip(
|
|
|
|
rx1[0],
|
|
|
|
self.pg1.local_mac,
|
|
|
|
self.pg1.remote_hosts[1].mac,
|
|
|
|
self.pg0.remote_ip6,
|
|
|
|
self.pg1.remote_hosts[1].ip6,
|
|
|
|
)
|
2017-05-26 02:59:16 -07:00
|
|
|
|
|
|
|
#
|
|
|
|
# remove the duplicate on pg1
|
2019-03-27 11:25:48 -07:00
|
|
|
# packet stream should generate NSs out of pg1
|
2017-05-26 02:59:16 -07:00
|
|
|
#
|
|
|
|
ns_pg1.remove_vpp_config()
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
self.send_and_expect_ns(self.pg0, self.pg1, p, self.pg1.remote_hosts[1].ip6)
|
2017-05-26 02:59:16 -07:00
|
|
|
|
|
|
|
#
|
|
|
|
# Add it back
|
|
|
|
#
|
|
|
|
ns_pg1.add_vpp_config()
|
|
|
|
|
|
|
|
self.pg0.add_stream(p)
|
|
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
|
|
self.pg_start()
|
|
|
|
|
|
|
|
rx1 = self.pg1.get_capture(1)
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
self.verify_ip(
|
|
|
|
rx1[0],
|
|
|
|
self.pg1.local_mac,
|
|
|
|
self.pg1.remote_hosts[1].mac,
|
|
|
|
self.pg0.remote_ip6,
|
|
|
|
self.pg1.remote_hosts[1].ip6,
|
|
|
|
)
|
2017-05-26 02:59:16 -07:00
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
def validate_ra(self, intf, rx, dst_ip=None, src_ip=None, mtu=9000, pi_opt=None):
|
IP Multicast FIB (mfib)
- IPv[46] mfib tables with support for (*,G/m), (*,G) and (S,G) exact and longest prefix match
- Replication represented via a new replicate DPO.
- RPF configuration and data-plane checking
- data-plane signals sent to listening control planes.
The functions of multicast forwarding entries differ from their unicast conterparts, so we introduce a new mfib_table_t and mfib_entry_t objects. However, we re-use the fib_path_list to resolve and build the entry's output list. the fib_path_list provides the service to construct a replicate DPO for multicast.
'make tests' is added to with two new suites; TEST=mfib, this is invocation of the CLI command 'test mfib' which deals with many path add/remove, flag set/unset scenarios, TEST=ip-mcast, data-plane forwarding tests.
Updated applications to use the new MIFB functions;
- IPv6 NS/RA.
- DHCPv6
unit tests for these are undated accordingly.
Change-Id: I49ec37b01f1b170335a5697541c8fd30e6d3a961
Signed-off-by: Neale Ranns <nranns@cisco.com>
2016-11-22 17:07:28 +00:00
|
|
|
if not dst_ip:
|
|
|
|
dst_ip = intf.remote_ip6
|
2019-09-30 10:53:31 +00:00
|
|
|
if not src_ip:
|
|
|
|
src_ip = mk_ll_addr(intf.local_mac)
|
2017-01-09 01:00:45 -08:00
|
|
|
|
2017-02-03 06:14:49 -08:00
|
|
|
# unicasted packets must come to the unicast mac
|
IP Multicast FIB (mfib)
- IPv[46] mfib tables with support for (*,G/m), (*,G) and (S,G) exact and longest prefix match
- Replication represented via a new replicate DPO.
- RPF configuration and data-plane checking
- data-plane signals sent to listening control planes.
The functions of multicast forwarding entries differ from their unicast conterparts, so we introduce a new mfib_table_t and mfib_entry_t objects. However, we re-use the fib_path_list to resolve and build the entry's output list. the fib_path_list provides the service to construct a replicate DPO for multicast.
'make tests' is added to with two new suites; TEST=mfib, this is invocation of the CLI command 'test mfib' which deals with many path add/remove, flag set/unset scenarios, TEST=ip-mcast, data-plane forwarding tests.
Updated applications to use the new MIFB functions;
- IPv6 NS/RA.
- DHCPv6
unit tests for these are undated accordingly.
Change-Id: I49ec37b01f1b170335a5697541c8fd30e6d3a961
Signed-off-by: Neale Ranns <nranns@cisco.com>
2016-11-22 17:07:28 +00:00
|
|
|
self.assertEqual(rx[Ether].dst, intf.remote_mac)
|
|
|
|
|
|
|
|
# and from the router's MAC
|
|
|
|
self.assertEqual(rx[Ether].src, intf.local_mac)
|
2017-01-09 01:00:45 -08:00
|
|
|
|
|
|
|
# the rx'd RA should be addressed to the sender's source
|
|
|
|
self.assertTrue(rx.haslayer(ICMPv6ND_RA))
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertEqual(in6_ptop(rx[IPv6].dst), in6_ptop(dst_ip))
|
2017-01-09 01:00:45 -08:00
|
|
|
|
|
|
|
# and come from the router's link local
|
|
|
|
self.assertTrue(in6_islladdr(rx[IPv6].src))
|
2019-09-30 10:53:31 +00:00
|
|
|
self.assertEqual(in6_ptop(rx[IPv6].src), in6_ptop(src_ip))
|
2017-01-09 01:00:45 -08:00
|
|
|
|
2017-02-18 08:16:41 -08:00
|
|
|
# it should contain the links MTU
|
|
|
|
ra = rx[ICMPv6ND_RA]
|
|
|
|
self.assertEqual(ra[ICMPv6NDOptMTU].mtu, mtu)
|
|
|
|
|
|
|
|
# it should contain the source's link layer address option
|
|
|
|
sll = ra[ICMPv6NDOptSrcLLAddr]
|
|
|
|
self.assertEqual(sll.lladdr, intf.local_mac)
|
|
|
|
|
|
|
|
if not pi_opt:
|
|
|
|
# the RA should not contain prefix information
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertFalse(ra.haslayer(ICMPv6NDOptPrefixInfo))
|
2017-02-18 08:16:41 -08:00
|
|
|
else:
|
|
|
|
raos = rx.getlayer(ICMPv6NDOptPrefixInfo, 1)
|
|
|
|
|
|
|
|
# the options are nested in the scapy packet in way that i cannot
|
|
|
|
# decipher how to decode. this 1st layer of option always returns
|
|
|
|
# nested classes, so a direct obj1=obj2 comparison always fails.
|
2019-06-06 14:07:55 -04:00
|
|
|
# however, the getlayer(.., 2) does give one instance.
|
2019-03-27 11:25:48 -07:00
|
|
|
# so we cheat here and construct a new opt instance for comparison
|
2018-11-24 22:19:12 -08:00
|
|
|
rd = ICMPv6NDOptPrefixInfo(
|
2022-04-26 19:02:15 +02:00
|
|
|
prefixlen=raos.prefixlen, prefix=raos.prefix, L=raos.L, A=raos.A
|
|
|
|
)
|
2017-02-18 08:16:41 -08:00
|
|
|
if type(pi_opt) is list:
|
|
|
|
for ii in range(len(pi_opt)):
|
|
|
|
self.assertEqual(pi_opt[ii], rd)
|
2022-04-26 19:02:15 +02:00
|
|
|
rd = rx.getlayer(ICMPv6NDOptPrefixInfo, ii + 2)
|
2017-02-18 08:16:41 -08:00
|
|
|
else:
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertEqual(
|
|
|
|
pi_opt,
|
|
|
|
raos,
|
|
|
|
"Expected: %s, received: %s"
|
|
|
|
% (pi_opt.show(dump=True), raos.show(dump=True)),
|
|
|
|
)
|
|
|
|
|
|
|
|
def send_and_expect_ra(
|
|
|
|
self,
|
|
|
|
intf,
|
|
|
|
pkts,
|
|
|
|
remark,
|
|
|
|
dst_ip=None,
|
|
|
|
filter_out_fn=is_ipv6_misc,
|
|
|
|
opt=None,
|
|
|
|
src_ip=None,
|
|
|
|
):
|
2019-09-30 10:53:31 +00:00
|
|
|
self.vapi.cli("clear trace")
|
IP Multicast FIB (mfib)
- IPv[46] mfib tables with support for (*,G/m), (*,G) and (S,G) exact and longest prefix match
- Replication represented via a new replicate DPO.
- RPF configuration and data-plane checking
- data-plane signals sent to listening control planes.
The functions of multicast forwarding entries differ from their unicast conterparts, so we introduce a new mfib_table_t and mfib_entry_t objects. However, we re-use the fib_path_list to resolve and build the entry's output list. the fib_path_list provides the service to construct a replicate DPO for multicast.
'make tests' is added to with two new suites; TEST=mfib, this is invocation of the CLI command 'test mfib' which deals with many path add/remove, flag set/unset scenarios, TEST=ip-mcast, data-plane forwarding tests.
Updated applications to use the new MIFB functions;
- IPv6 NS/RA.
- DHCPv6
unit tests for these are undated accordingly.
Change-Id: I49ec37b01f1b170335a5697541c8fd30e6d3a961
Signed-off-by: Neale Ranns <nranns@cisco.com>
2016-11-22 17:07:28 +00:00
|
|
|
intf.add_stream(pkts)
|
|
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
|
|
self.pg_start()
|
|
|
|
rx = intf.get_capture(1, filter_out_fn=filter_out_fn)
|
|
|
|
|
|
|
|
self.assertEqual(len(rx), 1)
|
|
|
|
rx = rx[0]
|
2019-09-30 10:53:31 +00:00
|
|
|
self.validate_ra(intf, rx, dst_ip, src_ip=src_ip, pi_opt=opt)
|
IP Multicast FIB (mfib)
- IPv[46] mfib tables with support for (*,G/m), (*,G) and (S,G) exact and longest prefix match
- Replication represented via a new replicate DPO.
- RPF configuration and data-plane checking
- data-plane signals sent to listening control planes.
The functions of multicast forwarding entries differ from their unicast conterparts, so we introduce a new mfib_table_t and mfib_entry_t objects. However, we re-use the fib_path_list to resolve and build the entry's output list. the fib_path_list provides the service to construct a replicate DPO for multicast.
'make tests' is added to with two new suites; TEST=mfib, this is invocation of the CLI command 'test mfib' which deals with many path add/remove, flag set/unset scenarios, TEST=ip-mcast, data-plane forwarding tests.
Updated applications to use the new MIFB functions;
- IPv6 NS/RA.
- DHCPv6
unit tests for these are undated accordingly.
Change-Id: I49ec37b01f1b170335a5697541c8fd30e6d3a961
Signed-off-by: Neale Ranns <nranns@cisco.com>
2016-11-22 17:07:28 +00:00
|
|
|
|
2023-02-02 14:22:56 +00:00
|
|
|
def test_ip6_ra_dump(self):
|
|
|
|
"""IPv6 RA dump"""
|
|
|
|
|
|
|
|
# Dump IPv6 RA for all interfaces
|
|
|
|
ip6_ra_dump = self.vapi.sw_interface_ip6nd_ra_dump(sw_if_index=0xFFFFFFFF)
|
|
|
|
self.assertEqual(len(ip6_ra_dump), len(self.interfaces))
|
|
|
|
|
|
|
|
for ip6_ra in ip6_ra_dump:
|
|
|
|
self.assertFalse(ip6_ra.send_radv)
|
|
|
|
self.assertEqual(ip6_ra.n_prefixes, 0)
|
|
|
|
self.assertEqual(len(ip6_ra.prefixes), 0)
|
|
|
|
self.assertEqual(ip6_ra.last_radv_time, 0.0)
|
|
|
|
self.assertEqual(ip6_ra.last_multicast_time, 0.0)
|
|
|
|
self.assertEqual(ip6_ra.next_multicast_time, 0.0)
|
|
|
|
self.assertEqual(ip6_ra.n_advertisements_sent, 0)
|
|
|
|
self.assertEqual(ip6_ra.n_solicitations_rcvd, 0)
|
|
|
|
self.assertEqual(ip6_ra.n_solicitations_dropped, 0)
|
|
|
|
|
|
|
|
# Enable sending IPv6 RA for an interface
|
|
|
|
self.pg0.ip6_ra_config(no=1, suppress=1)
|
|
|
|
|
|
|
|
# Add IPv6 RA prefixes for the interface
|
|
|
|
pfx0 = IPv6Network(
|
|
|
|
"%s/%s" % (self.pg0.local_ip6, self.pg0.local_ip6_prefix_len), strict=False
|
|
|
|
)
|
|
|
|
pfx1 = IPv6Network("fafa::/96")
|
|
|
|
self.pg0.ip6_ra_prefix(pfx0, off_link=0, no_autoconfig=0)
|
|
|
|
self.pg0.ip6_ra_prefix(pfx1, off_link=1, no_autoconfig=1)
|
|
|
|
|
|
|
|
# Wait for multicast IPv6 RA
|
|
|
|
self.sleep(1)
|
|
|
|
|
|
|
|
# Dump IPv6 RA for the interface
|
|
|
|
ip6_ra_dump = self.vapi.sw_interface_ip6nd_ra_dump(
|
|
|
|
sw_if_index=self.pg0.sw_if_index
|
|
|
|
)
|
|
|
|
self.assertEqual(len(ip6_ra_dump), 1)
|
|
|
|
ip6_ra = ip6_ra_dump[0]
|
|
|
|
|
|
|
|
self.assertEqual(ip6_ra.sw_if_index, self.pg0.sw_if_index)
|
|
|
|
self.assertTrue(ip6_ra.send_radv)
|
|
|
|
self.assertEqual(ip6_ra.n_prefixes, 2)
|
|
|
|
self.assertEqual(len(ip6_ra.prefixes), 2)
|
|
|
|
self.assertEqual(ip6_ra.last_radv_time, 0.0)
|
|
|
|
self.assertGreater(ip6_ra.last_multicast_time, 0.0)
|
|
|
|
self.assertGreater(ip6_ra.next_multicast_time, 0.0)
|
|
|
|
self.assertGreater(ip6_ra.n_advertisements_sent, 0)
|
|
|
|
self.assertEqual(ip6_ra.n_solicitations_rcvd, 0)
|
|
|
|
self.assertEqual(ip6_ra.n_solicitations_dropped, 0)
|
|
|
|
|
|
|
|
self.assertEqual(ip6_ra.prefixes[0].prefix, pfx0)
|
|
|
|
self.assertTrue(ip6_ra.prefixes[0].onlink_flag)
|
|
|
|
self.assertTrue(ip6_ra.prefixes[0].autonomous_flag)
|
|
|
|
self.assertFalse(ip6_ra.prefixes[0].no_advertise)
|
|
|
|
|
|
|
|
self.assertEqual(ip6_ra.prefixes[1].prefix, pfx1)
|
|
|
|
self.assertFalse(ip6_ra.prefixes[1].onlink_flag)
|
|
|
|
self.assertFalse(ip6_ra.prefixes[1].autonomous_flag)
|
|
|
|
self.assertFalse(ip6_ra.prefixes[1].no_advertise)
|
|
|
|
|
|
|
|
# Reset sending IPv6 RA for the interface
|
|
|
|
self.pg0.ip6_ra_config(suppress=1)
|
|
|
|
|
|
|
|
# Remove IPv6 RA prefixes for the interface
|
|
|
|
self.pg0.ip6_ra_prefix(pfx0, is_no=1)
|
|
|
|
self.pg0.ip6_ra_prefix(pfx1, is_no=1)
|
|
|
|
|
|
|
|
# Dump IPv6 RA for the interface
|
|
|
|
ip6_ra_dump = self.vapi.sw_interface_ip6nd_ra_dump(
|
|
|
|
sw_if_index=self.pg0.sw_if_index
|
|
|
|
)
|
|
|
|
self.assertEqual(len(ip6_ra_dump), 1)
|
|
|
|
ip6_ra = ip6_ra_dump[0]
|
|
|
|
|
|
|
|
self.assertEqual(ip6_ra.sw_if_index, self.pg0.sw_if_index)
|
|
|
|
self.assertFalse(ip6_ra.send_radv)
|
|
|
|
self.assertEqual(ip6_ra.n_prefixes, 0)
|
|
|
|
self.assertEqual(len(ip6_ra.prefixes), 0)
|
|
|
|
|
2017-01-09 01:00:45 -08:00
|
|
|
def test_rs(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IPv6 Router Solicitation Exceptions
|
2017-01-09 01:00:45 -08:00
|
|
|
|
2017-01-04 12:58:53 +01:00
|
|
|
Test scenario:
|
2017-01-09 01:00:45 -08:00
|
|
|
"""
|
|
|
|
|
2022-03-05 15:51:54 +00:00
|
|
|
self.pg0.ip6_ra_config(no=1, suppress=1)
|
|
|
|
|
2017-01-09 01:00:45 -08:00
|
|
|
#
|
2017-01-04 12:58:53 +01:00
|
|
|
# Before we begin change the IPv6 RA responses to use the unicast
|
|
|
|
# address - that way we will not confuse them with the periodic
|
|
|
|
# RAs which go to the mcast address
|
IP Multicast FIB (mfib)
- IPv[46] mfib tables with support for (*,G/m), (*,G) and (S,G) exact and longest prefix match
- Replication represented via a new replicate DPO.
- RPF configuration and data-plane checking
- data-plane signals sent to listening control planes.
The functions of multicast forwarding entries differ from their unicast conterparts, so we introduce a new mfib_table_t and mfib_entry_t objects. However, we re-use the fib_path_list to resolve and build the entry's output list. the fib_path_list provides the service to construct a replicate DPO for multicast.
'make tests' is added to with two new suites; TEST=mfib, this is invocation of the CLI command 'test mfib' which deals with many path add/remove, flag set/unset scenarios, TEST=ip-mcast, data-plane forwarding tests.
Updated applications to use the new MIFB functions;
- IPv6 NS/RA.
- DHCPv6
unit tests for these are undated accordingly.
Change-Id: I49ec37b01f1b170335a5697541c8fd30e6d3a961
Signed-off-by: Neale Ranns <nranns@cisco.com>
2016-11-22 17:07:28 +00:00
|
|
|
# Sit and wait for the first periodic RA.
|
|
|
|
#
|
|
|
|
# TODO
|
2017-01-09 01:00:45 -08:00
|
|
|
#
|
|
|
|
self.pg0.ip6_ra_config(send_unicast=1)
|
|
|
|
|
|
|
|
#
|
|
|
|
# An RS from a link source address
|
|
|
|
# - expect an RA in return
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
p = (
|
|
|
|
Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
|
|
|
|
/ IPv6(dst=self.pg0.local_ip6, src=self.pg0.remote_ip6)
|
|
|
|
/ ICMPv6ND_RS()
|
|
|
|
)
|
2017-01-09 01:00:45 -08:00
|
|
|
pkts = [p]
|
|
|
|
self.send_and_expect_ra(self.pg0, pkts, "Genuine RS")
|
|
|
|
|
|
|
|
#
|
|
|
|
# For the next RS sent the RA should be rate limited
|
|
|
|
#
|
|
|
|
self.send_and_assert_no_replies(self.pg0, pkts, "RA rate limited")
|
|
|
|
|
|
|
|
#
|
2019-03-27 11:25:48 -07:00
|
|
|
# When we reconfigure the IPv6 RA config,
|
|
|
|
# we reset the RA rate limiting,
|
2017-01-04 12:58:53 +01:00
|
|
|
# so we need to do this before each test below so as not to drop
|
|
|
|
# packets for rate limiting reasons. Test this works here.
|
2017-01-09 01:00:45 -08:00
|
|
|
#
|
|
|
|
self.pg0.ip6_ra_config(send_unicast=1)
|
|
|
|
self.send_and_expect_ra(self.pg0, pkts, "Rate limit reset RS")
|
|
|
|
|
|
|
|
#
|
|
|
|
# An RS sent from a non-link local source
|
|
|
|
#
|
|
|
|
self.pg0.ip6_ra_config(send_unicast=1)
|
2022-04-26 19:02:15 +02:00
|
|
|
p = (
|
|
|
|
Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
|
|
|
|
/ IPv6(dst=self.pg0.local_ip6, src="2002::ffff")
|
|
|
|
/ ICMPv6ND_RS()
|
|
|
|
)
|
2017-01-09 01:00:45 -08:00
|
|
|
pkts = [p]
|
2022-04-26 19:02:15 +02:00
|
|
|
self.send_and_assert_no_replies(self.pg0, pkts, "RS from non-link source")
|
2017-01-09 01:00:45 -08:00
|
|
|
|
|
|
|
#
|
|
|
|
# Source an RS from a link local address
|
|
|
|
#
|
|
|
|
self.pg0.ip6_ra_config(send_unicast=1)
|
|
|
|
ll = mk_ll_addr(self.pg0.remote_mac)
|
2022-04-26 19:02:15 +02:00
|
|
|
p = (
|
|
|
|
Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
|
|
|
|
/ IPv6(dst=self.pg0.local_ip6, src=ll)
|
|
|
|
/ ICMPv6ND_RS()
|
|
|
|
)
|
2017-01-09 01:00:45 -08:00
|
|
|
pkts = [p]
|
2022-04-26 19:02:15 +02:00
|
|
|
self.send_and_expect_ra(self.pg0, pkts, "RS sourced from link-local", dst_ip=ll)
|
IP Multicast FIB (mfib)
- IPv[46] mfib tables with support for (*,G/m), (*,G) and (S,G) exact and longest prefix match
- Replication represented via a new replicate DPO.
- RPF configuration and data-plane checking
- data-plane signals sent to listening control planes.
The functions of multicast forwarding entries differ from their unicast conterparts, so we introduce a new mfib_table_t and mfib_entry_t objects. However, we re-use the fib_path_list to resolve and build the entry's output list. the fib_path_list provides the service to construct a replicate DPO for multicast.
'make tests' is added to with two new suites; TEST=mfib, this is invocation of the CLI command 'test mfib' which deals with many path add/remove, flag set/unset scenarios, TEST=ip-mcast, data-plane forwarding tests.
Updated applications to use the new MIFB functions;
- IPv6 NS/RA.
- DHCPv6
unit tests for these are undated accordingly.
Change-Id: I49ec37b01f1b170335a5697541c8fd30e6d3a961
Signed-off-by: Neale Ranns <nranns@cisco.com>
2016-11-22 17:07:28 +00:00
|
|
|
|
2021-08-06 09:58:09 +02:00
|
|
|
#
|
|
|
|
# Source an RS from a link local address
|
|
|
|
# Ensure suppress also applies to solicited RS
|
|
|
|
#
|
|
|
|
self.pg0.ip6_ra_config(send_unicast=1, suppress=1)
|
|
|
|
ll = mk_ll_addr(self.pg0.remote_mac)
|
2022-04-26 19:02:15 +02:00
|
|
|
p = (
|
|
|
|
Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
|
|
|
|
/ IPv6(dst=self.pg0.local_ip6, src=ll)
|
|
|
|
/ ICMPv6ND_RS()
|
|
|
|
)
|
2021-08-06 09:58:09 +02:00
|
|
|
pkts = [p]
|
2022-04-26 19:02:15 +02:00
|
|
|
self.send_and_assert_no_replies(self.pg0, pkts, "Suppressed RS from link-local")
|
2021-08-06 09:58:09 +02:00
|
|
|
|
IP Multicast FIB (mfib)
- IPv[46] mfib tables with support for (*,G/m), (*,G) and (S,G) exact and longest prefix match
- Replication represented via a new replicate DPO.
- RPF configuration and data-plane checking
- data-plane signals sent to listening control planes.
The functions of multicast forwarding entries differ from their unicast conterparts, so we introduce a new mfib_table_t and mfib_entry_t objects. However, we re-use the fib_path_list to resolve and build the entry's output list. the fib_path_list provides the service to construct a replicate DPO for multicast.
'make tests' is added to with two new suites; TEST=mfib, this is invocation of the CLI command 'test mfib' which deals with many path add/remove, flag set/unset scenarios, TEST=ip-mcast, data-plane forwarding tests.
Updated applications to use the new MIFB functions;
- IPv6 NS/RA.
- DHCPv6
unit tests for these are undated accordingly.
Change-Id: I49ec37b01f1b170335a5697541c8fd30e6d3a961
Signed-off-by: Neale Ranns <nranns@cisco.com>
2016-11-22 17:07:28 +00:00
|
|
|
#
|
|
|
|
# Send the RS multicast
|
|
|
|
#
|
2021-08-06 09:58:09 +02:00
|
|
|
self.pg0.ip6_ra_config(no=1, suppress=1) # Reset suppress flag to zero
|
IP Multicast FIB (mfib)
- IPv[46] mfib tables with support for (*,G/m), (*,G) and (S,G) exact and longest prefix match
- Replication represented via a new replicate DPO.
- RPF configuration and data-plane checking
- data-plane signals sent to listening control planes.
The functions of multicast forwarding entries differ from their unicast conterparts, so we introduce a new mfib_table_t and mfib_entry_t objects. However, we re-use the fib_path_list to resolve and build the entry's output list. the fib_path_list provides the service to construct a replicate DPO for multicast.
'make tests' is added to with two new suites; TEST=mfib, this is invocation of the CLI command 'test mfib' which deals with many path add/remove, flag set/unset scenarios, TEST=ip-mcast, data-plane forwarding tests.
Updated applications to use the new MIFB functions;
- IPv6 NS/RA.
- DHCPv6
unit tests for these are undated accordingly.
Change-Id: I49ec37b01f1b170335a5697541c8fd30e6d3a961
Signed-off-by: Neale Ranns <nranns@cisco.com>
2016-11-22 17:07:28 +00:00
|
|
|
self.pg0.ip6_ra_config(send_unicast=1)
|
2017-02-18 00:03:54 -08:00
|
|
|
dmac = in6_getnsmac(inet_pton(AF_INET6, "ff02::2"))
|
IP Multicast FIB (mfib)
- IPv[46] mfib tables with support for (*,G/m), (*,G) and (S,G) exact and longest prefix match
- Replication represented via a new replicate DPO.
- RPF configuration and data-plane checking
- data-plane signals sent to listening control planes.
The functions of multicast forwarding entries differ from their unicast conterparts, so we introduce a new mfib_table_t and mfib_entry_t objects. However, we re-use the fib_path_list to resolve and build the entry's output list. the fib_path_list provides the service to construct a replicate DPO for multicast.
'make tests' is added to with two new suites; TEST=mfib, this is invocation of the CLI command 'test mfib' which deals with many path add/remove, flag set/unset scenarios, TEST=ip-mcast, data-plane forwarding tests.
Updated applications to use the new MIFB functions;
- IPv6 NS/RA.
- DHCPv6
unit tests for these are undated accordingly.
Change-Id: I49ec37b01f1b170335a5697541c8fd30e6d3a961
Signed-off-by: Neale Ranns <nranns@cisco.com>
2016-11-22 17:07:28 +00:00
|
|
|
ll = mk_ll_addr(self.pg0.remote_mac)
|
2022-04-26 19:02:15 +02:00
|
|
|
p = (
|
|
|
|
Ether(dst=dmac, src=self.pg0.remote_mac)
|
|
|
|
/ IPv6(dst="ff02::2", src=ll)
|
|
|
|
/ ICMPv6ND_RS()
|
|
|
|
)
|
IP Multicast FIB (mfib)
- IPv[46] mfib tables with support for (*,G/m), (*,G) and (S,G) exact and longest prefix match
- Replication represented via a new replicate DPO.
- RPF configuration and data-plane checking
- data-plane signals sent to listening control planes.
The functions of multicast forwarding entries differ from their unicast conterparts, so we introduce a new mfib_table_t and mfib_entry_t objects. However, we re-use the fib_path_list to resolve and build the entry's output list. the fib_path_list provides the service to construct a replicate DPO for multicast.
'make tests' is added to with two new suites; TEST=mfib, this is invocation of the CLI command 'test mfib' which deals with many path add/remove, flag set/unset scenarios, TEST=ip-mcast, data-plane forwarding tests.
Updated applications to use the new MIFB functions;
- IPv6 NS/RA.
- DHCPv6
unit tests for these are undated accordingly.
Change-Id: I49ec37b01f1b170335a5697541c8fd30e6d3a961
Signed-off-by: Neale Ranns <nranns@cisco.com>
2016-11-22 17:07:28 +00:00
|
|
|
pkts = [p]
|
2022-04-26 19:02:15 +02:00
|
|
|
self.send_and_expect_ra(self.pg0, pkts, "RS sourced from link-local", dst_ip=ll)
|
2017-01-09 01:00:45 -08:00
|
|
|
|
|
|
|
#
|
2017-01-04 12:58:53 +01:00
|
|
|
# Source from the unspecified address ::. This happens when the RS
|
|
|
|
# is sent before the host has a configured address/sub-net,
|
|
|
|
# i.e. auto-config. Since the sender has no IP address, the reply
|
|
|
|
# comes back mcast - so the capture needs to not filter this.
|
|
|
|
# If we happen to pick up the periodic RA at this point then so be it,
|
|
|
|
# it's not an error.
|
2017-01-09 01:00:45 -08:00
|
|
|
#
|
2022-03-05 15:51:54 +00:00
|
|
|
self.pg0.ip6_ra_config(send_unicast=1)
|
2022-04-26 19:02:15 +02:00
|
|
|
p = (
|
|
|
|
Ether(dst=dmac, src=self.pg0.remote_mac)
|
|
|
|
/ IPv6(dst="ff02::2", src="::")
|
|
|
|
/ ICMPv6ND_RS()
|
|
|
|
)
|
2017-01-09 01:00:45 -08:00
|
|
|
pkts = [p]
|
2022-04-26 19:02:15 +02:00
|
|
|
self.send_and_expect_ra(
|
|
|
|
self.pg0,
|
|
|
|
pkts,
|
|
|
|
"RS sourced from unspecified",
|
|
|
|
dst_ip="ff02::1",
|
|
|
|
filter_out_fn=None,
|
|
|
|
)
|
2017-01-09 01:00:45 -08:00
|
|
|
|
2017-02-18 08:16:41 -08:00
|
|
|
#
|
|
|
|
# Configure The RA to announce the links prefix
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
self.pg0.ip6_ra_prefix(
|
|
|
|
"%s/%s" % (self.pg0.local_ip6, self.pg0.local_ip6_prefix_len)
|
|
|
|
)
|
2017-02-18 08:16:41 -08:00
|
|
|
|
|
|
|
#
|
|
|
|
# RAs should now contain the prefix information option
|
|
|
|
#
|
2018-11-24 22:19:12 -08:00
|
|
|
opt = ICMPv6NDOptPrefixInfo(
|
2022-04-26 19:02:15 +02:00
|
|
|
prefixlen=self.pg0.local_ip6_prefix_len, prefix=self.pg0.local_ip6, L=1, A=1
|
|
|
|
)
|
2017-02-18 08:16:41 -08:00
|
|
|
|
|
|
|
self.pg0.ip6_ra_config(send_unicast=1)
|
|
|
|
ll = mk_ll_addr(self.pg0.remote_mac)
|
2022-04-26 19:02:15 +02:00
|
|
|
p = (
|
|
|
|
Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
|
|
|
|
/ IPv6(dst=self.pg0.local_ip6, src=ll)
|
|
|
|
/ ICMPv6ND_RS()
|
|
|
|
)
|
|
|
|
self.send_and_expect_ra(self.pg0, p, "RA with prefix-info", dst_ip=ll, opt=opt)
|
2017-02-18 08:16:41 -08:00
|
|
|
|
|
|
|
#
|
|
|
|
# Change the prefix info to not off-link
|
|
|
|
# L-flag is clear
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
self.pg0.ip6_ra_prefix(
|
|
|
|
"%s/%s" % (self.pg0.local_ip6, self.pg0.local_ip6_prefix_len), off_link=1
|
|
|
|
)
|
2017-02-18 08:16:41 -08:00
|
|
|
|
2018-11-24 22:19:12 -08:00
|
|
|
opt = ICMPv6NDOptPrefixInfo(
|
2022-04-26 19:02:15 +02:00
|
|
|
prefixlen=self.pg0.local_ip6_prefix_len, prefix=self.pg0.local_ip6, L=0, A=1
|
|
|
|
)
|
2017-02-18 08:16:41 -08:00
|
|
|
|
|
|
|
self.pg0.ip6_ra_config(send_unicast=1)
|
2022-04-26 19:02:15 +02:00
|
|
|
self.send_and_expect_ra(
|
|
|
|
self.pg0, p, "RA with Prefix info with L-flag=0", dst_ip=ll, opt=opt
|
|
|
|
)
|
2017-02-18 08:16:41 -08:00
|
|
|
|
|
|
|
#
|
|
|
|
# Change the prefix info to not off-link, no-autoconfig
|
|
|
|
# L and A flag are clear in the advert
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
self.pg0.ip6_ra_prefix(
|
|
|
|
"%s/%s" % (self.pg0.local_ip6, self.pg0.local_ip6_prefix_len),
|
|
|
|
off_link=1,
|
|
|
|
no_autoconfig=1,
|
|
|
|
)
|
2017-02-18 08:16:41 -08:00
|
|
|
|
2018-11-24 22:19:12 -08:00
|
|
|
opt = ICMPv6NDOptPrefixInfo(
|
2022-04-26 19:02:15 +02:00
|
|
|
prefixlen=self.pg0.local_ip6_prefix_len, prefix=self.pg0.local_ip6, L=0, A=0
|
|
|
|
)
|
2017-02-18 08:16:41 -08:00
|
|
|
|
|
|
|
self.pg0.ip6_ra_config(send_unicast=1)
|
2022-04-26 19:02:15 +02:00
|
|
|
self.send_and_expect_ra(
|
|
|
|
self.pg0, p, "RA with Prefix info with A & L-flag=0", dst_ip=ll, opt=opt
|
|
|
|
)
|
2017-02-18 08:16:41 -08:00
|
|
|
|
|
|
|
#
|
|
|
|
# Change the flag settings back to the defaults
|
|
|
|
# L and A flag are set in the advert
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
self.pg0.ip6_ra_prefix(
|
|
|
|
"%s/%s" % (self.pg0.local_ip6, self.pg0.local_ip6_prefix_len)
|
|
|
|
)
|
2017-02-18 08:16:41 -08:00
|
|
|
|
2018-11-24 22:19:12 -08:00
|
|
|
opt = ICMPv6NDOptPrefixInfo(
|
2022-04-26 19:02:15 +02:00
|
|
|
prefixlen=self.pg0.local_ip6_prefix_len, prefix=self.pg0.local_ip6, L=1, A=1
|
|
|
|
)
|
2017-02-18 08:16:41 -08:00
|
|
|
|
|
|
|
self.pg0.ip6_ra_config(send_unicast=1)
|
2022-04-26 19:02:15 +02:00
|
|
|
self.send_and_expect_ra(self.pg0, p, "RA with Prefix info", dst_ip=ll, opt=opt)
|
2017-02-18 08:16:41 -08:00
|
|
|
|
|
|
|
#
|
|
|
|
# Change the prefix info to not off-link, no-autoconfig
|
|
|
|
# L and A flag are clear in the advert
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
self.pg0.ip6_ra_prefix(
|
|
|
|
"%s/%s" % (self.pg0.local_ip6, self.pg0.local_ip6_prefix_len),
|
|
|
|
off_link=1,
|
|
|
|
no_autoconfig=1,
|
|
|
|
)
|
2017-02-18 08:16:41 -08:00
|
|
|
|
2018-11-24 22:19:12 -08:00
|
|
|
opt = ICMPv6NDOptPrefixInfo(
|
2022-04-26 19:02:15 +02:00
|
|
|
prefixlen=self.pg0.local_ip6_prefix_len, prefix=self.pg0.local_ip6, L=0, A=0
|
|
|
|
)
|
2017-02-18 08:16:41 -08:00
|
|
|
|
|
|
|
self.pg0.ip6_ra_config(send_unicast=1)
|
2022-04-26 19:02:15 +02:00
|
|
|
self.send_and_expect_ra(
|
|
|
|
self.pg0, p, "RA with Prefix info with A & L-flag=0", dst_ip=ll, opt=opt
|
|
|
|
)
|
2017-02-18 08:16:41 -08:00
|
|
|
|
|
|
|
#
|
2019-03-27 11:25:48 -07:00
|
|
|
# Use the reset to defaults option to revert to defaults
|
2017-02-18 08:16:41 -08:00
|
|
|
# L and A flag are clear in the advert
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
self.pg0.ip6_ra_prefix(
|
|
|
|
"%s/%s" % (self.pg0.local_ip6, self.pg0.local_ip6_prefix_len), use_default=1
|
|
|
|
)
|
2017-02-18 08:16:41 -08:00
|
|
|
|
2018-11-24 22:19:12 -08:00
|
|
|
opt = ICMPv6NDOptPrefixInfo(
|
2022-04-26 19:02:15 +02:00
|
|
|
prefixlen=self.pg0.local_ip6_prefix_len, prefix=self.pg0.local_ip6, L=1, A=1
|
|
|
|
)
|
2017-02-18 08:16:41 -08:00
|
|
|
|
|
|
|
self.pg0.ip6_ra_config(send_unicast=1)
|
2022-04-26 19:02:15 +02:00
|
|
|
self.send_and_expect_ra(
|
|
|
|
self.pg0, p, "RA with Prefix reverted to defaults", dst_ip=ll, opt=opt
|
|
|
|
)
|
2017-02-18 08:16:41 -08:00
|
|
|
|
|
|
|
#
|
|
|
|
# Advertise Another prefix. With no L-flag/A-flag
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
self.pg0.ip6_ra_prefix(
|
|
|
|
"%s/%s" % (self.pg1.local_ip6, self.pg1.local_ip6_prefix_len),
|
|
|
|
off_link=1,
|
|
|
|
no_autoconfig=1,
|
|
|
|
)
|
2017-02-18 08:16:41 -08:00
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
opt = [
|
|
|
|
ICMPv6NDOptPrefixInfo(
|
|
|
|
prefixlen=self.pg0.local_ip6_prefix_len,
|
|
|
|
prefix=self.pg0.local_ip6,
|
|
|
|
L=1,
|
|
|
|
A=1,
|
|
|
|
),
|
2018-11-24 22:19:12 -08:00
|
|
|
ICMPv6NDOptPrefixInfo(
|
|
|
|
prefixlen=self.pg1.local_ip6_prefix_len,
|
|
|
|
prefix=self.pg1.local_ip6,
|
|
|
|
L=0,
|
2022-04-26 19:02:15 +02:00
|
|
|
A=0,
|
|
|
|
),
|
|
|
|
]
|
2017-02-18 08:16:41 -08:00
|
|
|
|
|
|
|
self.pg0.ip6_ra_config(send_unicast=1)
|
|
|
|
ll = mk_ll_addr(self.pg0.remote_mac)
|
2022-04-26 19:02:15 +02:00
|
|
|
p = (
|
|
|
|
Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
|
|
|
|
/ IPv6(dst=self.pg0.local_ip6, src=ll)
|
|
|
|
/ ICMPv6ND_RS()
|
|
|
|
)
|
|
|
|
self.send_and_expect_ra(
|
|
|
|
self.pg0, p, "RA with multiple Prefix infos", dst_ip=ll, opt=opt
|
|
|
|
)
|
2017-02-18 08:16:41 -08:00
|
|
|
|
|
|
|
#
|
2019-03-27 11:25:48 -07:00
|
|
|
# Remove the first prefix-info - expect the second is still in the
|
2017-02-18 08:16:41 -08:00
|
|
|
# advert
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
self.pg0.ip6_ra_prefix(
|
|
|
|
"%s/%s" % (self.pg0.local_ip6, self.pg0.local_ip6_prefix_len), is_no=1
|
|
|
|
)
|
2017-02-18 08:16:41 -08:00
|
|
|
|
2018-11-24 22:19:12 -08:00
|
|
|
opt = ICMPv6NDOptPrefixInfo(
|
2022-04-26 19:02:15 +02:00
|
|
|
prefixlen=self.pg1.local_ip6_prefix_len, prefix=self.pg1.local_ip6, L=0, A=0
|
|
|
|
)
|
2017-02-18 08:16:41 -08:00
|
|
|
|
|
|
|
self.pg0.ip6_ra_config(send_unicast=1)
|
2022-04-26 19:02:15 +02:00
|
|
|
self.send_and_expect_ra(
|
|
|
|
self.pg0, p, "RA with Prefix reverted to defaults", dst_ip=ll, opt=opt
|
|
|
|
)
|
2017-02-18 08:16:41 -08:00
|
|
|
|
|
|
|
#
|
2019-03-27 11:25:48 -07:00
|
|
|
# Remove the second prefix-info - expect no prefix-info in the adverts
|
2017-02-18 08:16:41 -08:00
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
self.pg0.ip6_ra_prefix(
|
|
|
|
"%s/%s" % (self.pg1.local_ip6, self.pg1.local_ip6_prefix_len), is_no=1
|
|
|
|
)
|
2017-02-18 08:16:41 -08:00
|
|
|
|
2019-09-30 10:53:31 +00:00
|
|
|
#
|
|
|
|
# change the link's link local, so we know that works too.
|
|
|
|
#
|
|
|
|
self.vapi.sw_interface_ip6_set_link_local_address(
|
2022-04-26 19:02:15 +02:00
|
|
|
sw_if_index=self.pg0.sw_if_index, ip="fe80::88"
|
|
|
|
)
|
2019-09-30 10:53:31 +00:00
|
|
|
|
2017-02-18 08:16:41 -08:00
|
|
|
self.pg0.ip6_ra_config(send_unicast=1)
|
2022-04-26 19:02:15 +02:00
|
|
|
self.send_and_expect_ra(
|
|
|
|
self.pg0,
|
|
|
|
p,
|
|
|
|
"RA with Prefix reverted to defaults",
|
|
|
|
dst_ip=ll,
|
|
|
|
src_ip="fe80::88",
|
|
|
|
)
|
2017-02-18 08:16:41 -08:00
|
|
|
|
2017-01-09 01:00:45 -08:00
|
|
|
#
|
2017-02-03 06:14:49 -08:00
|
|
|
# Reset the periodic advertisements back to default values
|
2017-01-09 01:00:45 -08:00
|
|
|
#
|
2022-03-05 15:51:54 +00:00
|
|
|
self.pg0.ip6_ra_config(suppress=1)
|
|
|
|
self.pg0.ip6_ra_config(no=1, send_unicast=1)
|
2016-10-03 19:44:57 +02:00
|
|
|
|
2020-02-07 09:45:07 +00:00
|
|
|
def test_mld(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""MLD Report"""
|
2020-02-07 09:45:07 +00:00
|
|
|
#
|
|
|
|
# test one MLD is sent after applying an IPv6 Address on an interface
|
|
|
|
#
|
|
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
|
|
self.pg_start()
|
|
|
|
|
|
|
|
subitf = VppDot1QSubint(self, self.pg1, 99)
|
fib: fix dpo-receive address in ip6-ll fibs
Need to fill frp_addr for local path, it's used by dpo-receive.
If not, address output can be invalid:
$ sudo vppctl sh ip6-ll fe80::dcad:ff:fe00:3/128
IP6-link-local:loop3, fib_index:2, locks:[IPv6-nd:1, ]
fe80::dcad:ff:fe00:3/128 fib:2 index:55 locks:2
IPv6-nd refs:1 entry-flags:connected,import,local, src-flags:added,contributing,active,
path-list:[72] locks:2 flags:shared,local, uPRF-list:58 len:0 itfs:[]
path:[82] pl-index:72 ip6 weight=1 pref=0 receive: oper-flags:resolved, cfg-flags:local,glean,
[@0]: dpo-receive: 8000:100:fe80::dcad:ff on loop3
forwarding: unicast-ip6-chain
[@0]: dpo-load-balance: [proto:ip6 index:57 buckets:1 uRPF:58 to:[0:0]]
[0] [@2]: dpo-receive: 8000:100:fe80::dcad:ff on loop3
Type: fix
Change-Id: Ib9874c5eac74af789e721098d512a1058cb8e404
Signed-off-by: Vladislav Grishenko <themiron@yandex-team.ru>
2022-05-16 01:44:43 +05:00
|
|
|
self.interfaces.append(subitf)
|
|
|
|
self.sub_interfaces.append(subitf)
|
2020-02-07 09:45:07 +00:00
|
|
|
|
|
|
|
subitf.admin_up()
|
|
|
|
subitf.config_ip6()
|
|
|
|
|
2020-03-17 14:25:10 +00:00
|
|
|
rxs = self.pg1._get_capture(timeout=4, filter_out_fn=None)
|
2020-02-07 09:45:07 +00:00
|
|
|
|
|
|
|
#
|
|
|
|
# hunt for the MLD on vlan 99
|
|
|
|
#
|
|
|
|
for rx in rxs:
|
|
|
|
# make sure ipv6 packets with hop by hop options have
|
|
|
|
# correct checksums
|
|
|
|
self.assert_packet_checksums_valid(rx)
|
2022-04-26 19:02:15 +02:00
|
|
|
if (
|
|
|
|
rx.haslayer(IPv6ExtHdrHopByHop)
|
|
|
|
and rx.haslayer(Dot1Q)
|
|
|
|
and rx[Dot1Q].vlan == 99
|
|
|
|
):
|
2020-02-07 09:45:07 +00:00
|
|
|
mld = rx[ICMPv6MLReport2]
|
|
|
|
|
|
|
|
self.assertEqual(mld.records_number, 4)
|
|
|
|
|
2017-02-18 00:03:54 -08:00
|
|
|
|
2020-05-04 10:28:03 -04:00
|
|
|
class TestIPv6RouteLookup(VppTestCase):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IPv6 Route Lookup Test Case"""
|
|
|
|
|
2020-05-04 10:28:03 -04:00
|
|
|
routes = []
|
|
|
|
|
|
|
|
def route_lookup(self, prefix, exact):
|
2022-04-26 19:02:15 +02:00
|
|
|
return self.vapi.api(
|
|
|
|
self.vapi.papi.ip_route_lookup,
|
|
|
|
{
|
|
|
|
"table_id": 0,
|
|
|
|
"exact": exact,
|
|
|
|
"prefix": prefix,
|
|
|
|
},
|
|
|
|
)
|
2020-05-04 10:28:03 -04:00
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def setUpClass(cls):
|
|
|
|
super(TestIPv6RouteLookup, cls).setUpClass()
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def tearDownClass(cls):
|
|
|
|
super(TestIPv6RouteLookup, cls).tearDownClass()
|
|
|
|
|
|
|
|
def setUp(self):
|
|
|
|
super(TestIPv6RouteLookup, self).setUp()
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
drop_nh = VppRoutePath("::1", 0xFFFFFFFF, type=FibPathType.FIB_PATH_TYPE_DROP)
|
2020-05-04 10:28:03 -04:00
|
|
|
|
|
|
|
# Add 3 routes
|
|
|
|
r = VppIpRoute(self, "2001:1111::", 32, [drop_nh])
|
|
|
|
r.add_vpp_config()
|
|
|
|
self.routes.append(r)
|
|
|
|
|
|
|
|
r = VppIpRoute(self, "2001:1111:2222::", 48, [drop_nh])
|
|
|
|
r.add_vpp_config()
|
|
|
|
self.routes.append(r)
|
|
|
|
|
|
|
|
r = VppIpRoute(self, "2001:1111:2222::1", 128, [drop_nh])
|
|
|
|
r.add_vpp_config()
|
|
|
|
self.routes.append(r)
|
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
# Remove the routes we added
|
|
|
|
for r in self.routes:
|
|
|
|
r.remove_vpp_config()
|
|
|
|
|
|
|
|
super(TestIPv6RouteLookup, self).tearDown()
|
|
|
|
|
|
|
|
def test_exact_match(self):
|
|
|
|
# Verify we find the host route
|
|
|
|
prefix = "2001:1111:2222::1/128"
|
|
|
|
result = self.route_lookup(prefix, True)
|
2022-04-26 19:02:15 +02:00
|
|
|
assert prefix == str(result.route.prefix)
|
2020-05-04 10:28:03 -04:00
|
|
|
|
|
|
|
# Verify we find a middle prefix route
|
|
|
|
prefix = "2001:1111:2222::/48"
|
|
|
|
result = self.route_lookup(prefix, True)
|
2022-04-26 19:02:15 +02:00
|
|
|
assert prefix == str(result.route.prefix)
|
2020-05-04 10:28:03 -04:00
|
|
|
|
|
|
|
# Verify we do not find an available LPM.
|
|
|
|
with self.vapi.assert_negative_api_retval():
|
|
|
|
self.route_lookup("2001::2/128", True)
|
|
|
|
|
|
|
|
def test_longest_prefix_match(self):
|
|
|
|
# verify we find lpm
|
|
|
|
lpm_prefix = "2001:1111:2222::/48"
|
|
|
|
result = self.route_lookup("2001:1111:2222::2/128", False)
|
2022-04-26 19:02:15 +02:00
|
|
|
assert lpm_prefix == str(result.route.prefix)
|
2020-05-04 10:28:03 -04:00
|
|
|
|
|
|
|
# Verify we find the exact when not requested
|
|
|
|
result = self.route_lookup(lpm_prefix, False)
|
2022-04-26 19:02:15 +02:00
|
|
|
assert lpm_prefix == str(result.route.prefix)
|
2020-05-04 10:28:03 -04:00
|
|
|
|
|
|
|
# Can't seem to delete the default route so no negative LPM test.
|
|
|
|
|
|
|
|
|
2019-08-07 11:46:30 -05:00
|
|
|
class TestIPv6IfAddrRoute(VppTestCase):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IPv6 Interface Addr Route Test Case"""
|
2019-08-07 11:46:30 -05:00
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def setUpClass(cls):
|
|
|
|
super(TestIPv6IfAddrRoute, cls).setUpClass()
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def tearDownClass(cls):
|
|
|
|
super(TestIPv6IfAddrRoute, cls).tearDownClass()
|
|
|
|
|
|
|
|
def setUp(self):
|
|
|
|
super(TestIPv6IfAddrRoute, self).setUp()
|
|
|
|
|
|
|
|
# create 1 pg interface
|
|
|
|
self.create_pg_interfaces(range(1))
|
|
|
|
|
|
|
|
for i in self.pg_interfaces:
|
|
|
|
i.admin_up()
|
|
|
|
i.config_ip6()
|
|
|
|
i.resolve_ndp()
|
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
super(TestIPv6IfAddrRoute, self).tearDown()
|
|
|
|
for i in self.pg_interfaces:
|
|
|
|
i.unconfig_ip6()
|
|
|
|
i.admin_down()
|
|
|
|
|
|
|
|
def test_ipv6_ifaddrs_same_prefix(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IPv6 Interface Addresses Same Prefix test
|
2019-08-07 11:46:30 -05:00
|
|
|
|
|
|
|
Test scenario:
|
|
|
|
|
|
|
|
- Verify no route in FIB for prefix 2001:10::/64
|
|
|
|
- Configure IPv4 address 2001:10::10/64 on an interface
|
|
|
|
- Verify route in FIB for prefix 2001:10::/64
|
|
|
|
- Configure IPv4 address 2001:10::20/64 on an interface
|
|
|
|
- Delete 2001:10::10/64 from interface
|
|
|
|
- Verify route in FIB for prefix 2001:10::/64
|
|
|
|
- Delete 2001:10::20/64 from interface
|
|
|
|
- Verify no route in FIB for prefix 2001:10::/64
|
|
|
|
"""
|
|
|
|
|
|
|
|
addr1 = "2001:10::10"
|
|
|
|
addr2 = "2001:10::20"
|
|
|
|
|
2019-11-11 08:32:34 +00:00
|
|
|
if_addr1 = VppIpInterfaceAddress(self, self.pg0, addr1, 64)
|
|
|
|
if_addr2 = VppIpInterfaceAddress(self, self.pg0, addr2, 64)
|
|
|
|
self.assertFalse(if_addr1.query_vpp_config())
|
2019-08-07 11:46:30 -05:00
|
|
|
self.assertFalse(find_route(self, addr1, 128))
|
|
|
|
self.assertFalse(find_route(self, addr2, 128))
|
|
|
|
|
|
|
|
# configure first address, verify route present
|
|
|
|
if_addr1.add_vpp_config()
|
2019-11-11 08:32:34 +00:00
|
|
|
self.assertTrue(if_addr1.query_vpp_config())
|
2019-08-07 11:46:30 -05:00
|
|
|
self.assertTrue(find_route(self, addr1, 128))
|
|
|
|
self.assertFalse(find_route(self, addr2, 128))
|
|
|
|
|
|
|
|
# configure second address, delete first, verify route not removed
|
|
|
|
if_addr2.add_vpp_config()
|
|
|
|
if_addr1.remove_vpp_config()
|
2019-11-11 08:32:34 +00:00
|
|
|
self.assertFalse(if_addr1.query_vpp_config())
|
|
|
|
self.assertTrue(if_addr2.query_vpp_config())
|
2019-08-07 11:46:30 -05:00
|
|
|
self.assertFalse(find_route(self, addr1, 128))
|
|
|
|
self.assertTrue(find_route(self, addr2, 128))
|
|
|
|
|
|
|
|
# delete second address, verify route removed
|
|
|
|
if_addr2.remove_vpp_config()
|
2019-11-11 08:32:34 +00:00
|
|
|
self.assertFalse(if_addr1.query_vpp_config())
|
2019-08-07 11:46:30 -05:00
|
|
|
self.assertFalse(find_route(self, addr1, 128))
|
|
|
|
self.assertFalse(find_route(self, addr2, 128))
|
|
|
|
|
2020-05-14 10:51:53 +08:00
|
|
|
def test_ipv6_ifaddr_del(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""Delete an interface address that does not exist"""
|
2020-05-14 10:51:53 +08:00
|
|
|
|
|
|
|
loopbacks = self.create_loopback_interfaces(1)
|
|
|
|
lo = self.lo_interfaces[0]
|
|
|
|
|
|
|
|
lo.config_ip6()
|
|
|
|
lo.admin_up()
|
|
|
|
|
|
|
|
#
|
|
|
|
# try and remove pg0's subnet from lo
|
|
|
|
#
|
|
|
|
with self.vapi.assert_negative_api_retval():
|
|
|
|
self.vapi.sw_interface_add_del_address(
|
2022-04-26 19:02:15 +02:00
|
|
|
sw_if_index=lo.sw_if_index, prefix=self.pg0.local_ip6_prefix, is_add=0
|
|
|
|
)
|
2020-05-14 10:51:53 +08:00
|
|
|
|
2019-08-07 11:46:30 -05:00
|
|
|
|
2024-03-11 10:38:46 +00:00
|
|
|
@unittest.skipIf(
|
|
|
|
"ping" in config.excluded_plugins, "Exclude tests requiring Ping plugin"
|
|
|
|
)
|
2018-06-26 12:24:03 +02:00
|
|
|
class TestICMPv6Echo(VppTestCase):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""ICMPv6 Echo Test Case"""
|
2018-06-26 12:24:03 +02:00
|
|
|
|
2019-03-12 19:23:27 -07:00
|
|
|
@classmethod
|
|
|
|
def setUpClass(cls):
|
|
|
|
super(TestICMPv6Echo, cls).setUpClass()
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def tearDownClass(cls):
|
|
|
|
super(TestICMPv6Echo, cls).tearDownClass()
|
|
|
|
|
2018-06-26 12:24:03 +02:00
|
|
|
def setUp(self):
|
|
|
|
super(TestICMPv6Echo, self).setUp()
|
|
|
|
|
|
|
|
# create 1 pg interface
|
|
|
|
self.create_pg_interfaces(range(1))
|
|
|
|
|
|
|
|
for i in self.pg_interfaces:
|
|
|
|
i.admin_up()
|
|
|
|
i.config_ip6()
|
2021-01-18 19:25:38 +01:00
|
|
|
i.resolve_ndp(link_layer=True)
|
2018-06-26 12:24:03 +02:00
|
|
|
i.resolve_ndp()
|
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
super(TestICMPv6Echo, self).tearDown()
|
|
|
|
for i in self.pg_interfaces:
|
|
|
|
i.unconfig_ip6()
|
|
|
|
i.admin_down()
|
|
|
|
|
|
|
|
def test_icmpv6_echo(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""VPP replies to ICMPv6 Echo Request
|
2018-06-26 12:24:03 +02:00
|
|
|
|
|
|
|
Test scenario:
|
|
|
|
|
|
|
|
- Receive ICMPv6 Echo Request message on pg0 interface.
|
|
|
|
- Check outgoing ICMPv6 Echo Reply message on pg0 interface.
|
|
|
|
"""
|
|
|
|
|
2021-01-18 19:25:38 +01:00
|
|
|
# test both with global and local ipv6 addresses
|
|
|
|
dsts = (self.pg0.local_ip6, self.pg0.local_ip6_ll)
|
2022-04-26 19:02:15 +02:00
|
|
|
id = 0xB
|
2021-01-18 19:25:38 +01:00
|
|
|
seq = 5
|
2022-04-26 19:02:15 +02:00
|
|
|
data = b"\x0a" * 18
|
2021-01-18 19:25:38 +01:00
|
|
|
p = list()
|
|
|
|
for dst in dsts:
|
2022-04-26 19:02:15 +02:00
|
|
|
p.append(
|
|
|
|
(
|
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
/ IPv6(src=self.pg0.remote_ip6, dst=dst)
|
|
|
|
/ ICMPv6EchoRequest(id=id, seq=seq, data=data)
|
|
|
|
)
|
|
|
|
)
|
2021-01-18 19:25:38 +01:00
|
|
|
|
|
|
|
self.pg0.add_stream(p)
|
2018-06-26 12:24:03 +02:00
|
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
|
|
self.pg_start()
|
2021-01-18 19:25:38 +01:00
|
|
|
rxs = self.pg0.get_capture(len(dsts))
|
|
|
|
|
|
|
|
for rx, dst in zip(rxs, dsts):
|
|
|
|
ether = rx[Ether]
|
|
|
|
ipv6 = rx[IPv6]
|
|
|
|
icmpv6 = rx[ICMPv6EchoReply]
|
|
|
|
self.assertEqual(ether.src, self.pg0.local_mac)
|
|
|
|
self.assertEqual(ether.dst, self.pg0.remote_mac)
|
|
|
|
self.assertEqual(ipv6.src, dst)
|
|
|
|
self.assertEqual(ipv6.dst, self.pg0.remote_ip6)
|
|
|
|
self.assertEqual(icmp6types[icmpv6.type], "Echo Reply")
|
|
|
|
self.assertEqual(icmpv6.id, id)
|
|
|
|
self.assertEqual(icmpv6.seq, seq)
|
|
|
|
self.assertEqual(icmpv6.data, data)
|
2018-06-26 12:24:03 +02:00
|
|
|
|
|
|
|
|
2018-01-15 10:39:21 +01:00
|
|
|
class TestIPv6RD(TestIPv6ND):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IPv6 Router Discovery Test Case"""
|
2018-01-15 10:39:21 +01:00
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def setUpClass(cls):
|
|
|
|
super(TestIPv6RD, cls).setUpClass()
|
|
|
|
|
2019-03-12 19:23:27 -07:00
|
|
|
@classmethod
|
|
|
|
def tearDownClass(cls):
|
|
|
|
super(TestIPv6RD, cls).tearDownClass()
|
|
|
|
|
2018-01-15 10:39:21 +01:00
|
|
|
def setUp(self):
|
|
|
|
super(TestIPv6RD, self).setUp()
|
|
|
|
|
|
|
|
# create 2 pg interfaces
|
|
|
|
self.create_pg_interfaces(range(2))
|
|
|
|
|
|
|
|
self.interfaces = list(self.pg_interfaces)
|
|
|
|
|
|
|
|
# setup all interfaces
|
|
|
|
for i in self.interfaces:
|
|
|
|
i.admin_up()
|
|
|
|
i.config_ip6()
|
|
|
|
|
|
|
|
def tearDown(self):
|
2017-08-14 10:35:44 -07:00
|
|
|
for i in self.interfaces:
|
|
|
|
i.unconfig_ip6()
|
|
|
|
i.admin_down()
|
2018-01-15 10:39:21 +01:00
|
|
|
super(TestIPv6RD, self).tearDown()
|
|
|
|
|
|
|
|
def test_rd_send_router_solicitation(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""Verify router solicitation packets"""
|
2018-01-15 10:39:21 +01:00
|
|
|
|
|
|
|
count = 2
|
|
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
|
|
self.pg_start()
|
2022-04-26 19:02:15 +02:00
|
|
|
self.vapi.ip6nd_send_router_solicitation(self.pg1.sw_if_index, mrc=count)
|
2018-01-15 10:39:21 +01:00
|
|
|
rx_list = self.pg1.get_capture(count, timeout=3)
|
|
|
|
self.assertEqual(len(rx_list), count)
|
|
|
|
for packet in rx_list:
|
2018-11-24 22:19:12 -08:00
|
|
|
self.assertEqual(packet.haslayer(IPv6), 1)
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertEqual(packet[IPv6].haslayer(ICMPv6ND_RS), 1)
|
2018-01-15 10:39:21 +01:00
|
|
|
dst = ip6_normalize(packet[IPv6].dst)
|
|
|
|
dst2 = ip6_normalize("ff02::2")
|
|
|
|
self.assert_equal(dst, dst2)
|
|
|
|
src = ip6_normalize(packet[IPv6].src)
|
|
|
|
src2 = ip6_normalize(self.pg1.local_ip6_ll)
|
|
|
|
self.assert_equal(src, src2)
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertTrue(bool(packet[ICMPv6ND_RS].haslayer(ICMPv6NDOptSrcLLAddr)))
|
|
|
|
self.assert_equal(packet[ICMPv6NDOptSrcLLAddr].lladdr, self.pg1.local_mac)
|
2018-01-15 10:39:21 +01:00
|
|
|
|
|
|
|
def verify_prefix_info(self, reported_prefix, prefix_option):
|
2018-08-10 05:30:06 -07:00
|
|
|
prefix = IPv6Network(
|
2022-04-26 19:02:15 +02:00
|
|
|
text_type(
|
|
|
|
prefix_option.getfieldval("prefix")
|
|
|
|
+ "/"
|
|
|
|
+ text_type(prefix_option.getfieldval("prefixlen"))
|
|
|
|
),
|
|
|
|
strict=False,
|
|
|
|
)
|
|
|
|
self.assert_equal(
|
|
|
|
reported_prefix.prefix.network_address, prefix.network_address
|
|
|
|
)
|
2018-01-15 10:39:21 +01:00
|
|
|
L = prefix_option.getfieldval("L")
|
|
|
|
A = prefix_option.getfieldval("A")
|
|
|
|
option_flags = (L << 7) | (A << 6)
|
|
|
|
self.assert_equal(reported_prefix.flags, option_flags)
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assert_equal(
|
|
|
|
reported_prefix.valid_time, prefix_option.getfieldval("validlifetime")
|
|
|
|
)
|
|
|
|
self.assert_equal(
|
|
|
|
reported_prefix.preferred_time,
|
|
|
|
prefix_option.getfieldval("preferredlifetime"),
|
|
|
|
)
|
2018-01-15 10:39:21 +01:00
|
|
|
|
|
|
|
def test_rd_receive_router_advertisement(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""Verify events triggered by received RA packets"""
|
2018-01-15 10:39:21 +01:00
|
|
|
|
2019-09-30 10:53:31 +00:00
|
|
|
self.vapi.want_ip6_ra_events(enable=1)
|
2018-01-15 10:39:21 +01:00
|
|
|
|
|
|
|
prefix_info_1 = ICMPv6NDOptPrefixInfo(
|
|
|
|
prefix="1::2",
|
|
|
|
prefixlen=50,
|
|
|
|
validlifetime=200,
|
|
|
|
preferredlifetime=500,
|
|
|
|
L=1,
|
|
|
|
A=1,
|
|
|
|
)
|
|
|
|
|
|
|
|
prefix_info_2 = ICMPv6NDOptPrefixInfo(
|
|
|
|
prefix="7::4",
|
|
|
|
prefixlen=20,
|
|
|
|
validlifetime=70,
|
|
|
|
preferredlifetime=1000,
|
|
|
|
L=1,
|
|
|
|
A=0,
|
|
|
|
)
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
p = (
|
|
|
|
Ether(dst=self.pg1.local_mac, src=self.pg1.remote_mac)
|
|
|
|
/ IPv6(dst=self.pg1.local_ip6_ll, src=mk_ll_addr(self.pg1.remote_mac))
|
|
|
|
/ ICMPv6ND_RA()
|
|
|
|
/ prefix_info_1
|
|
|
|
/ prefix_info_2
|
|
|
|
)
|
2018-01-15 10:39:21 +01:00
|
|
|
self.pg1.add_stream([p])
|
|
|
|
self.pg_start()
|
|
|
|
|
|
|
|
ev = self.vapi.wait_for_event(10, "ip6_ra_event")
|
|
|
|
|
|
|
|
self.assert_equal(ev.current_hop_limit, 0)
|
|
|
|
self.assert_equal(ev.flags, 8)
|
|
|
|
self.assert_equal(ev.router_lifetime_in_sec, 1800)
|
|
|
|
self.assert_equal(ev.neighbor_reachable_time_in_msec, 0)
|
|
|
|
self.assert_equal(
|
2022-04-26 19:02:15 +02:00
|
|
|
ev.time_in_msec_between_retransmitted_neighbor_solicitations, 0
|
|
|
|
)
|
2018-01-15 10:39:21 +01:00
|
|
|
|
|
|
|
self.assert_equal(ev.n_prefixes, 2)
|
|
|
|
|
|
|
|
self.verify_prefix_info(ev.prefixes[0], prefix_info_1)
|
|
|
|
self.verify_prefix_info(ev.prefixes[1], prefix_info_2)
|
|
|
|
|
|
|
|
|
2018-02-01 15:18:49 +01:00
|
|
|
class TestIPv6RDControlPlane(TestIPv6ND):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IPv6 Router Discovery Control Plane Test Case"""
|
2018-02-01 15:18:49 +01:00
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def setUpClass(cls):
|
|
|
|
super(TestIPv6RDControlPlane, cls).setUpClass()
|
|
|
|
|
2019-03-12 19:23:27 -07:00
|
|
|
@classmethod
|
|
|
|
def tearDownClass(cls):
|
|
|
|
super(TestIPv6RDControlPlane, cls).tearDownClass()
|
|
|
|
|
2018-02-01 15:18:49 +01:00
|
|
|
def setUp(self):
|
|
|
|
super(TestIPv6RDControlPlane, self).setUp()
|
|
|
|
|
|
|
|
# create 1 pg interface
|
|
|
|
self.create_pg_interfaces(range(1))
|
|
|
|
|
|
|
|
self.interfaces = list(self.pg_interfaces)
|
|
|
|
|
|
|
|
# setup all interfaces
|
|
|
|
for i in self.interfaces:
|
|
|
|
i.admin_up()
|
|
|
|
i.config_ip6()
|
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
super(TestIPv6RDControlPlane, self).tearDown()
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def create_ra_packet(pg, routerlifetime=None):
|
|
|
|
src_ip = pg.remote_ip6_ll
|
|
|
|
dst_ip = pg.local_ip6
|
|
|
|
if routerlifetime is not None:
|
|
|
|
ra = ICMPv6ND_RA(routerlifetime=routerlifetime)
|
|
|
|
else:
|
|
|
|
ra = ICMPv6ND_RA()
|
2022-04-26 19:02:15 +02:00
|
|
|
p = (
|
|
|
|
Ether(dst=pg.local_mac, src=pg.remote_mac)
|
|
|
|
/ IPv6(dst=dst_ip, src=src_ip)
|
|
|
|
/ ra
|
|
|
|
)
|
2018-02-01 15:18:49 +01:00
|
|
|
return p
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def get_default_routes(fib):
|
|
|
|
list = []
|
|
|
|
for entry in fib:
|
2018-05-01 05:17:55 -07:00
|
|
|
if entry.route.prefix.prefixlen == 0:
|
|
|
|
for path in entry.route.paths:
|
2018-02-01 15:18:49 +01:00
|
|
|
if path.sw_if_index != 0xFFFFFFFF:
|
2018-05-01 05:17:55 -07:00
|
|
|
defaut_route = {}
|
2022-04-26 19:02:15 +02:00
|
|
|
defaut_route["sw_if_index"] = path.sw_if_index
|
|
|
|
defaut_route["next_hop"] = path.nh.address.ip6
|
2018-05-01 05:17:55 -07:00
|
|
|
list.append(defaut_route)
|
2018-02-01 15:18:49 +01:00
|
|
|
return list
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def get_interface_addresses(fib, pg):
|
|
|
|
list = []
|
|
|
|
for entry in fib:
|
2018-05-01 05:17:55 -07:00
|
|
|
if entry.route.prefix.prefixlen == 128:
|
|
|
|
path = entry.route.paths[0]
|
2018-02-01 15:18:49 +01:00
|
|
|
if path.sw_if_index == pg.sw_if_index:
|
2018-05-01 05:17:55 -07:00
|
|
|
list.append(str(entry.route.prefix.network_address))
|
2018-02-01 15:18:49 +01:00
|
|
|
return list
|
|
|
|
|
2019-09-30 10:53:31 +00:00
|
|
|
def wait_for_no_default_route(self, n_tries=50, s_time=1):
|
2022-04-26 19:02:15 +02:00
|
|
|
while n_tries:
|
2019-09-30 10:53:31 +00:00
|
|
|
fib = self.vapi.ip_route_dump(0, True)
|
|
|
|
default_routes = self.get_default_routes(fib)
|
2020-02-04 13:28:13 +01:00
|
|
|
if 0 == len(default_routes):
|
2019-09-30 10:53:31 +00:00
|
|
|
return True
|
|
|
|
n_tries = n_tries - 1
|
|
|
|
self.sleep(s_time)
|
|
|
|
|
|
|
|
return False
|
|
|
|
|
2018-02-01 15:18:49 +01:00
|
|
|
def test_all(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""Test handling of SLAAC addresses and default routes"""
|
2018-02-01 15:18:49 +01:00
|
|
|
|
2018-05-01 05:17:55 -07:00
|
|
|
fib = self.vapi.ip_route_dump(0, True)
|
2018-02-01 15:18:49 +01:00
|
|
|
default_routes = self.get_default_routes(fib)
|
|
|
|
initial_addresses = set(self.get_interface_addresses(fib, self.pg0))
|
|
|
|
self.assertEqual(default_routes, [])
|
2018-05-01 05:17:55 -07:00
|
|
|
router_address = IPv6Address(text_type(self.pg0.remote_ip6_ll))
|
2018-02-01 15:18:49 +01:00
|
|
|
|
|
|
|
self.vapi.ip6_nd_address_autoconfig(self.pg0.sw_if_index, 1, 1)
|
|
|
|
|
|
|
|
self.sleep(0.1)
|
|
|
|
|
|
|
|
# send RA
|
2022-04-26 19:02:15 +02:00
|
|
|
packet = (
|
|
|
|
self.create_ra_packet(self.pg0)
|
|
|
|
/ ICMPv6NDOptPrefixInfo(
|
|
|
|
prefix="1::",
|
|
|
|
prefixlen=64,
|
|
|
|
validlifetime=2,
|
|
|
|
preferredlifetime=2,
|
|
|
|
L=1,
|
|
|
|
A=1,
|
|
|
|
)
|
|
|
|
/ ICMPv6NDOptPrefixInfo(
|
|
|
|
prefix="7::",
|
|
|
|
prefixlen=20,
|
|
|
|
validlifetime=1500,
|
|
|
|
preferredlifetime=1000,
|
|
|
|
L=1,
|
|
|
|
A=0,
|
|
|
|
)
|
|
|
|
)
|
2018-02-01 15:18:49 +01:00
|
|
|
self.pg0.add_stream([packet])
|
|
|
|
self.pg_start()
|
|
|
|
|
2019-10-13 18:56:03 +00:00
|
|
|
self.sleep_on_vpp_time(0.1)
|
2018-02-01 15:18:49 +01:00
|
|
|
|
2018-05-01 05:17:55 -07:00
|
|
|
fib = self.vapi.ip_route_dump(0, True)
|
2018-02-01 15:18:49 +01:00
|
|
|
|
|
|
|
# check FIB for new address
|
|
|
|
addresses = set(self.get_interface_addresses(fib, self.pg0))
|
|
|
|
new_addresses = addresses.difference(initial_addresses)
|
|
|
|
self.assertEqual(len(new_addresses), 1)
|
2022-04-26 19:02:15 +02:00
|
|
|
prefix = IPv6Network(
|
|
|
|
text_type("%s/%d" % (list(new_addresses)[0], 20)), strict=False
|
|
|
|
)
|
|
|
|
self.assertEqual(prefix, IPv6Network(text_type("1::/20")))
|
2018-02-01 15:18:49 +01:00
|
|
|
|
|
|
|
# check FIB for new default route
|
|
|
|
default_routes = self.get_default_routes(fib)
|
|
|
|
self.assertEqual(len(default_routes), 1)
|
|
|
|
dr = default_routes[0]
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertEqual(dr["sw_if_index"], self.pg0.sw_if_index)
|
|
|
|
self.assertEqual(dr["next_hop"], router_address)
|
2018-02-01 15:18:49 +01:00
|
|
|
|
|
|
|
# send RA to delete default route
|
|
|
|
packet = self.create_ra_packet(self.pg0, routerlifetime=0)
|
|
|
|
self.pg0.add_stream([packet])
|
|
|
|
self.pg_start()
|
|
|
|
|
2019-10-13 18:56:03 +00:00
|
|
|
self.sleep_on_vpp_time(0.1)
|
2018-02-01 15:18:49 +01:00
|
|
|
|
|
|
|
# check that default route is deleted
|
2018-05-01 05:17:55 -07:00
|
|
|
fib = self.vapi.ip_route_dump(0, True)
|
2018-02-01 15:18:49 +01:00
|
|
|
default_routes = self.get_default_routes(fib)
|
|
|
|
self.assertEqual(len(default_routes), 0)
|
|
|
|
|
2019-10-13 18:56:03 +00:00
|
|
|
self.sleep_on_vpp_time(0.1)
|
2018-02-01 15:18:49 +01:00
|
|
|
|
|
|
|
# send RA
|
|
|
|
packet = self.create_ra_packet(self.pg0)
|
|
|
|
self.pg0.add_stream([packet])
|
|
|
|
self.pg_start()
|
|
|
|
|
2019-10-13 18:56:03 +00:00
|
|
|
self.sleep_on_vpp_time(0.1)
|
2018-02-01 15:18:49 +01:00
|
|
|
|
|
|
|
# check FIB for new default route
|
2018-05-01 05:17:55 -07:00
|
|
|
fib = self.vapi.ip_route_dump(0, True)
|
2018-02-01 15:18:49 +01:00
|
|
|
default_routes = self.get_default_routes(fib)
|
|
|
|
self.assertEqual(len(default_routes), 1)
|
|
|
|
dr = default_routes[0]
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertEqual(dr["sw_if_index"], self.pg0.sw_if_index)
|
|
|
|
self.assertEqual(dr["next_hop"], router_address)
|
2018-02-01 15:18:49 +01:00
|
|
|
|
|
|
|
# send RA, updating router lifetime to 1s
|
|
|
|
packet = self.create_ra_packet(self.pg0, 1)
|
|
|
|
self.pg0.add_stream([packet])
|
|
|
|
self.pg_start()
|
|
|
|
|
2019-10-13 18:56:03 +00:00
|
|
|
self.sleep_on_vpp_time(0.1)
|
2018-02-01 15:18:49 +01:00
|
|
|
|
|
|
|
# check that default route still exists
|
2018-05-01 05:17:55 -07:00
|
|
|
fib = self.vapi.ip_route_dump(0, True)
|
2018-02-01 15:18:49 +01:00
|
|
|
default_routes = self.get_default_routes(fib)
|
|
|
|
self.assertEqual(len(default_routes), 1)
|
|
|
|
dr = default_routes[0]
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertEqual(dr["sw_if_index"], self.pg0.sw_if_index)
|
|
|
|
self.assertEqual(dr["next_hop"], router_address)
|
2018-02-01 15:18:49 +01:00
|
|
|
|
2019-10-13 18:56:03 +00:00
|
|
|
self.sleep_on_vpp_time(1)
|
2018-02-01 15:18:49 +01:00
|
|
|
|
|
|
|
# check that default route is deleted
|
2019-09-30 10:53:31 +00:00
|
|
|
self.assertTrue(self.wait_for_no_default_route())
|
2018-02-01 15:18:49 +01:00
|
|
|
|
|
|
|
# check FIB still contains the SLAAC address
|
|
|
|
addresses = set(self.get_interface_addresses(fib, self.pg0))
|
|
|
|
new_addresses = addresses.difference(initial_addresses)
|
2019-05-14 13:25:49 -04:00
|
|
|
|
2018-02-01 15:18:49 +01:00
|
|
|
self.assertEqual(len(new_addresses), 1)
|
2022-04-26 19:02:15 +02:00
|
|
|
prefix = IPv6Network(
|
|
|
|
text_type("%s/%d" % (list(new_addresses)[0], 20)), strict=False
|
|
|
|
)
|
|
|
|
self.assertEqual(prefix, IPv6Network(text_type("1::/20")))
|
2018-02-01 15:18:49 +01:00
|
|
|
|
2019-10-13 18:56:03 +00:00
|
|
|
self.sleep_on_vpp_time(1)
|
2018-02-01 15:18:49 +01:00
|
|
|
|
|
|
|
# check that SLAAC address is deleted
|
2018-05-01 05:17:55 -07:00
|
|
|
fib = self.vapi.ip_route_dump(0, True)
|
2018-02-01 15:18:49 +01:00
|
|
|
addresses = set(self.get_interface_addresses(fib, self.pg0))
|
|
|
|
new_addresses = addresses.difference(initial_addresses)
|
|
|
|
self.assertEqual(len(new_addresses), 0)
|
|
|
|
|
|
|
|
|
2017-02-18 00:03:54 -08:00
|
|
|
class IPv6NDProxyTest(TestIPv6ND):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IPv6 ND ProxyTest Case"""
|
2017-02-18 00:03:54 -08:00
|
|
|
|
2019-03-12 19:23:27 -07:00
|
|
|
@classmethod
|
|
|
|
def setUpClass(cls):
|
|
|
|
super(IPv6NDProxyTest, cls).setUpClass()
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def tearDownClass(cls):
|
|
|
|
super(IPv6NDProxyTest, cls).tearDownClass()
|
|
|
|
|
2017-02-18 00:03:54 -08:00
|
|
|
def setUp(self):
|
|
|
|
super(IPv6NDProxyTest, self).setUp()
|
|
|
|
|
|
|
|
# create 3 pg interfaces
|
|
|
|
self.create_pg_interfaces(range(3))
|
|
|
|
|
|
|
|
# pg0 is the master interface, with the configured subnet
|
|
|
|
self.pg0.admin_up()
|
|
|
|
self.pg0.config_ip6()
|
|
|
|
self.pg0.resolve_ndp()
|
|
|
|
|
|
|
|
self.pg1.ip6_enable()
|
|
|
|
self.pg2.ip6_enable()
|
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
super(IPv6NDProxyTest, self).tearDown()
|
|
|
|
|
|
|
|
def test_nd_proxy(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IPv6 Proxy ND"""
|
2017-02-18 00:03:54 -08:00
|
|
|
|
|
|
|
#
|
|
|
|
# Generate some hosts in the subnet that we are proxying
|
|
|
|
#
|
|
|
|
self.pg0.generate_remote_hosts(8)
|
|
|
|
|
|
|
|
nsma = in6_getnsma(inet_pton(AF_INET6, self.pg0.local_ip6))
|
|
|
|
d = inet_ntop(AF_INET6, nsma)
|
|
|
|
|
|
|
|
#
|
|
|
|
# Send an NS for one of those remote hosts on one of the proxy links
|
|
|
|
# expect no response since it's from an address that is not
|
|
|
|
# on the link that has the prefix configured
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
ns_pg1 = (
|
|
|
|
Ether(dst=in6_getnsmac(nsma), src=self.pg1.remote_mac)
|
|
|
|
/ IPv6(dst=d, src=self.pg0._remote_hosts[2].ip6)
|
|
|
|
/ ICMPv6ND_NS(tgt=self.pg0.local_ip6)
|
|
|
|
/ ICMPv6NDOptSrcLLAddr(lladdr=self.pg0._remote_hosts[2].mac)
|
|
|
|
)
|
2017-02-18 00:03:54 -08:00
|
|
|
|
|
|
|
self.send_and_assert_no_replies(self.pg1, ns_pg1, "Off link NS")
|
|
|
|
|
|
|
|
#
|
|
|
|
# Add proxy support for the host
|
|
|
|
#
|
2019-03-04 23:55:43 +01:00
|
|
|
self.vapi.ip6nd_proxy_add_del(
|
2022-04-26 19:02:15 +02:00
|
|
|
is_add=1,
|
|
|
|
ip=inet_pton(AF_INET6, self.pg0._remote_hosts[2].ip6),
|
|
|
|
sw_if_index=self.pg1.sw_if_index,
|
|
|
|
)
|
2017-02-18 00:03:54 -08:00
|
|
|
|
|
|
|
#
|
|
|
|
# try that NS again. this time we expect an NA back
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
self.send_and_expect_na(
|
|
|
|
self.pg1,
|
|
|
|
ns_pg1,
|
|
|
|
"NS to proxy entry",
|
|
|
|
dst_ip=self.pg0._remote_hosts[2].ip6,
|
|
|
|
tgt_ip=self.pg0.local_ip6,
|
|
|
|
)
|
2017-02-18 00:03:54 -08:00
|
|
|
|
|
|
|
#
|
|
|
|
# ... and that we have an entry in the ND cache
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertTrue(
|
|
|
|
find_nbr(self, self.pg1.sw_if_index, self.pg0._remote_hosts[2].ip6)
|
|
|
|
)
|
2017-02-18 00:03:54 -08:00
|
|
|
|
|
|
|
#
|
|
|
|
# ... and we can route traffic to it
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
t = (
|
|
|
|
Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
|
|
|
|
/ IPv6(dst=self.pg0._remote_hosts[2].ip6, src=self.pg0.remote_ip6)
|
|
|
|
/ inet6.UDP(sport=10000, dport=20000)
|
|
|
|
/ Raw(b"\xa5" * 100)
|
|
|
|
)
|
2017-02-18 00:03:54 -08:00
|
|
|
|
|
|
|
self.pg0.add_stream(t)
|
|
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
|
|
self.pg_start()
|
|
|
|
rx = self.pg1.get_capture(1)
|
|
|
|
rx = rx[0]
|
|
|
|
|
|
|
|
self.assertEqual(rx[Ether].dst, self.pg0._remote_hosts[2].mac)
|
|
|
|
self.assertEqual(rx[Ether].src, self.pg1.local_mac)
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertEqual(rx[IPv6].src, t[IPv6].src)
|
|
|
|
self.assertEqual(rx[IPv6].dst, t[IPv6].dst)
|
2017-02-18 00:03:54 -08:00
|
|
|
|
|
|
|
#
|
|
|
|
# Test we proxy for the host on the main interface
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
ns_pg0 = (
|
|
|
|
Ether(dst=in6_getnsmac(nsma), src=self.pg0.remote_mac)
|
|
|
|
/ IPv6(dst=d, src=self.pg0.remote_ip6)
|
|
|
|
/ ICMPv6ND_NS(tgt=self.pg0._remote_hosts[2].ip6)
|
|
|
|
/ ICMPv6NDOptSrcLLAddr(lladdr=self.pg0.remote_mac)
|
|
|
|
)
|
2017-02-18 00:03:54 -08:00
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
self.send_and_expect_na(
|
|
|
|
self.pg0,
|
|
|
|
ns_pg0,
|
|
|
|
"NS to proxy entry on main",
|
|
|
|
tgt_ip=self.pg0._remote_hosts[2].ip6,
|
|
|
|
dst_ip=self.pg0.remote_ip6,
|
|
|
|
)
|
2017-02-18 00:03:54 -08:00
|
|
|
|
|
|
|
#
|
|
|
|
# Setup and resolve proxy for another host on another interface
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
ns_pg2 = (
|
|
|
|
Ether(dst=in6_getnsmac(nsma), src=self.pg2.remote_mac)
|
|
|
|
/ IPv6(dst=d, src=self.pg0._remote_hosts[3].ip6)
|
|
|
|
/ ICMPv6ND_NS(tgt=self.pg0.local_ip6)
|
|
|
|
/ ICMPv6NDOptSrcLLAddr(lladdr=self.pg0._remote_hosts[2].mac)
|
|
|
|
)
|
2017-02-18 00:03:54 -08:00
|
|
|
|
2019-03-04 23:55:43 +01:00
|
|
|
self.vapi.ip6nd_proxy_add_del(
|
2022-04-26 19:02:15 +02:00
|
|
|
is_add=1,
|
|
|
|
ip=inet_pton(AF_INET6, self.pg0._remote_hosts[3].ip6),
|
|
|
|
sw_if_index=self.pg2.sw_if_index,
|
|
|
|
)
|
2017-02-18 00:03:54 -08:00
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
self.send_and_expect_na(
|
|
|
|
self.pg2,
|
|
|
|
ns_pg2,
|
|
|
|
"NS to proxy entry other interface",
|
|
|
|
dst_ip=self.pg0._remote_hosts[3].ip6,
|
|
|
|
tgt_ip=self.pg0.local_ip6,
|
|
|
|
)
|
2017-02-18 00:03:54 -08:00
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertTrue(
|
|
|
|
find_nbr(self, self.pg2.sw_if_index, self.pg0._remote_hosts[3].ip6)
|
|
|
|
)
|
2017-02-18 00:03:54 -08:00
|
|
|
|
|
|
|
#
|
|
|
|
# hosts can communicate. pg2->pg1
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
t2 = (
|
|
|
|
Ether(dst=self.pg2.local_mac, src=self.pg0.remote_hosts[3].mac)
|
|
|
|
/ IPv6(dst=self.pg0._remote_hosts[2].ip6, src=self.pg0._remote_hosts[3].ip6)
|
|
|
|
/ inet6.UDP(sport=10000, dport=20000)
|
|
|
|
/ Raw(b"\xa5" * 100)
|
|
|
|
)
|
2017-02-18 00:03:54 -08:00
|
|
|
|
|
|
|
self.pg2.add_stream(t2)
|
|
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
|
|
self.pg_start()
|
|
|
|
rx = self.pg1.get_capture(1)
|
|
|
|
rx = rx[0]
|
|
|
|
|
|
|
|
self.assertEqual(rx[Ether].dst, self.pg0._remote_hosts[2].mac)
|
|
|
|
self.assertEqual(rx[Ether].src, self.pg1.local_mac)
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertEqual(rx[IPv6].src, t2[IPv6].src)
|
|
|
|
self.assertEqual(rx[IPv6].dst, t2[IPv6].dst)
|
2017-02-18 00:03:54 -08:00
|
|
|
|
|
|
|
#
|
|
|
|
# remove the proxy configs
|
|
|
|
#
|
2019-03-04 23:55:43 +01:00
|
|
|
self.vapi.ip6nd_proxy_add_del(
|
2019-03-05 16:58:24 +01:00
|
|
|
ip=inet_pton(AF_INET6, self.pg0._remote_hosts[2].ip6),
|
2022-04-26 19:02:15 +02:00
|
|
|
sw_if_index=self.pg1.sw_if_index,
|
|
|
|
is_add=0,
|
|
|
|
)
|
2019-03-04 23:55:43 +01:00
|
|
|
self.vapi.ip6nd_proxy_add_del(
|
2019-03-05 16:58:24 +01:00
|
|
|
ip=inet_pton(AF_INET6, self.pg0._remote_hosts[3].ip6),
|
2022-04-26 19:02:15 +02:00
|
|
|
sw_if_index=self.pg2.sw_if_index,
|
|
|
|
is_add=0,
|
|
|
|
)
|
2017-02-18 00:03:54 -08:00
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertFalse(
|
|
|
|
find_nbr(self, self.pg2.sw_if_index, self.pg0._remote_hosts[3].ip6)
|
|
|
|
)
|
|
|
|
self.assertFalse(
|
|
|
|
find_nbr(self, self.pg1.sw_if_index, self.pg0._remote_hosts[2].ip6)
|
|
|
|
)
|
2017-02-18 00:03:54 -08:00
|
|
|
|
|
|
|
#
|
|
|
|
# no longer proxy-ing...
|
|
|
|
#
|
|
|
|
self.send_and_assert_no_replies(self.pg0, ns_pg0, "Proxy unconfigured")
|
|
|
|
self.send_and_assert_no_replies(self.pg1, ns_pg1, "Proxy unconfigured")
|
|
|
|
self.send_and_assert_no_replies(self.pg2, ns_pg2, "Proxy unconfigured")
|
|
|
|
|
|
|
|
#
|
|
|
|
# no longer forwarding. traffic generates NS out of the glean/main
|
|
|
|
# interface
|
|
|
|
#
|
|
|
|
self.pg2.add_stream(t2)
|
|
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
|
|
self.pg_start()
|
|
|
|
|
|
|
|
rx = self.pg0.get_capture(1)
|
|
|
|
|
|
|
|
self.assertTrue(rx[0].haslayer(ICMPv6ND_NS))
|
|
|
|
|
|
|
|
|
2022-02-25 05:51:10 +00:00
|
|
|
class TestIP6Null(VppTestCase):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IPv6 routes via NULL"""
|
2017-02-21 17:30:26 -08:00
|
|
|
|
2019-03-12 19:23:27 -07:00
|
|
|
@classmethod
|
|
|
|
def setUpClass(cls):
|
2022-02-25 05:51:10 +00:00
|
|
|
super(TestIP6Null, cls).setUpClass()
|
2019-03-12 19:23:27 -07:00
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def tearDownClass(cls):
|
2022-02-25 05:51:10 +00:00
|
|
|
super(TestIP6Null, cls).tearDownClass()
|
2019-03-12 19:23:27 -07:00
|
|
|
|
2017-02-21 17:30:26 -08:00
|
|
|
def setUp(self):
|
2022-02-25 05:51:10 +00:00
|
|
|
super(TestIP6Null, self).setUp()
|
2017-02-21 17:30:26 -08:00
|
|
|
|
|
|
|
# create 2 pg interfaces
|
|
|
|
self.create_pg_interfaces(range(1))
|
|
|
|
|
|
|
|
for i in self.pg_interfaces:
|
|
|
|
i.admin_up()
|
|
|
|
i.config_ip6()
|
|
|
|
i.resolve_ndp()
|
|
|
|
|
|
|
|
def tearDown(self):
|
2022-02-25 05:51:10 +00:00
|
|
|
super(TestIP6Null, self).tearDown()
|
2017-02-21 17:30:26 -08:00
|
|
|
for i in self.pg_interfaces:
|
|
|
|
i.unconfig_ip6()
|
|
|
|
i.admin_down()
|
|
|
|
|
|
|
|
def test_ip_null(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IP NULL route"""
|
2017-02-21 17:30:26 -08:00
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
p = (
|
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
/ IPv6(src=self.pg0.remote_ip6, dst="2001::1")
|
|
|
|
/ inet6.UDP(sport=1234, dport=1234)
|
|
|
|
/ Raw(b"\xa5" * 100)
|
|
|
|
)
|
2017-02-21 17:30:26 -08:00
|
|
|
|
|
|
|
#
|
|
|
|
# A route via IP NULL that will reply with ICMP unreachables
|
|
|
|
#
|
2018-05-01 05:17:55 -07:00
|
|
|
ip_unreach = VppIpRoute(
|
2022-04-26 19:02:15 +02:00
|
|
|
self,
|
|
|
|
"2001::",
|
|
|
|
64,
|
|
|
|
[
|
|
|
|
VppRoutePath(
|
|
|
|
"::", 0xFFFFFFFF, type=FibPathType.FIB_PATH_TYPE_ICMP_UNREACH
|
|
|
|
)
|
|
|
|
],
|
|
|
|
)
|
2017-02-21 17:30:26 -08:00
|
|
|
ip_unreach.add_vpp_config()
|
|
|
|
|
|
|
|
self.pg0.add_stream(p)
|
|
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
|
|
self.pg_start()
|
|
|
|
|
|
|
|
rx = self.pg0.get_capture(1)
|
|
|
|
rx = rx[0]
|
|
|
|
icmp = rx[ICMPv6DestUnreach]
|
|
|
|
|
|
|
|
# 0 = "No route to destination"
|
|
|
|
self.assertEqual(icmp.code, 0)
|
|
|
|
|
|
|
|
# ICMP is rate limited. pause a bit
|
|
|
|
self.sleep(1)
|
|
|
|
|
|
|
|
#
|
|
|
|
# A route via IP NULL that will reply with ICMP prohibited
|
|
|
|
#
|
2018-05-01 05:17:55 -07:00
|
|
|
ip_prohibit = VppIpRoute(
|
2022-04-26 19:02:15 +02:00
|
|
|
self,
|
|
|
|
"2001::1",
|
|
|
|
128,
|
|
|
|
[
|
|
|
|
VppRoutePath(
|
|
|
|
"::", 0xFFFFFFFF, type=FibPathType.FIB_PATH_TYPE_ICMP_PROHIBIT
|
|
|
|
)
|
|
|
|
],
|
|
|
|
)
|
2017-02-21 17:30:26 -08:00
|
|
|
ip_prohibit.add_vpp_config()
|
|
|
|
|
|
|
|
self.pg0.add_stream(p)
|
|
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
|
|
self.pg_start()
|
|
|
|
|
|
|
|
rx = self.pg0.get_capture(1)
|
|
|
|
rx = rx[0]
|
|
|
|
icmp = rx[ICMPv6DestUnreach]
|
|
|
|
|
|
|
|
# 1 = "Communication with destination administratively prohibited"
|
|
|
|
self.assertEqual(icmp.code, 1)
|
|
|
|
|
|
|
|
|
2022-02-25 05:51:10 +00:00
|
|
|
class TestIP6Disabled(VppTestCase):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IPv6 disabled"""
|
2017-03-16 15:49:09 -04:00
|
|
|
|
2019-03-12 19:23:27 -07:00
|
|
|
@classmethod
|
|
|
|
def setUpClass(cls):
|
2022-02-25 05:51:10 +00:00
|
|
|
super(TestIP6Disabled, cls).setUpClass()
|
2019-03-12 19:23:27 -07:00
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def tearDownClass(cls):
|
2022-02-25 05:51:10 +00:00
|
|
|
super(TestIP6Disabled, cls).tearDownClass()
|
2019-03-12 19:23:27 -07:00
|
|
|
|
2017-03-16 15:49:09 -04:00
|
|
|
def setUp(self):
|
2022-02-25 05:51:10 +00:00
|
|
|
super(TestIP6Disabled, self).setUp()
|
2017-03-16 15:49:09 -04:00
|
|
|
|
|
|
|
# create 2 pg interfaces
|
|
|
|
self.create_pg_interfaces(range(2))
|
|
|
|
|
2019-03-27 11:25:48 -07:00
|
|
|
# PG0 is IP enabled
|
2017-03-16 15:49:09 -04:00
|
|
|
self.pg0.admin_up()
|
|
|
|
self.pg0.config_ip6()
|
|
|
|
self.pg0.resolve_ndp()
|
|
|
|
|
|
|
|
# PG 1 is not IP enabled
|
|
|
|
self.pg1.admin_up()
|
|
|
|
|
|
|
|
def tearDown(self):
|
2022-02-25 05:51:10 +00:00
|
|
|
super(TestIP6Disabled, self).tearDown()
|
2017-03-16 15:49:09 -04:00
|
|
|
for i in self.pg_interfaces:
|
|
|
|
i.unconfig_ip4()
|
|
|
|
i.admin_down()
|
|
|
|
|
|
|
|
def test_ip_disabled(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IP Disabled"""
|
2017-03-16 15:49:09 -04:00
|
|
|
|
2020-10-20 07:20:17 +00:00
|
|
|
MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t
|
|
|
|
MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t
|
2017-03-16 15:49:09 -04:00
|
|
|
#
|
|
|
|
# An (S,G).
|
|
|
|
# one accepting interface, pg0, 2 forwarding interfaces
|
|
|
|
#
|
|
|
|
route_ff_01 = VppIpMRoute(
|
|
|
|
self,
|
|
|
|
"::",
|
2022-04-26 19:02:15 +02:00
|
|
|
"ffef::1",
|
|
|
|
128,
|
2020-10-20 07:20:17 +00:00
|
|
|
MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE,
|
2022-04-26 19:02:15 +02:00
|
|
|
[
|
|
|
|
VppMRoutePath(
|
|
|
|
self.pg1.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT
|
|
|
|
),
|
|
|
|
VppMRoutePath(
|
|
|
|
self.pg0.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD
|
|
|
|
),
|
|
|
|
],
|
|
|
|
)
|
2017-03-16 15:49:09 -04:00
|
|
|
route_ff_01.add_vpp_config()
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
pu = (
|
|
|
|
Ether(src=self.pg1.remote_mac, dst=self.pg1.local_mac)
|
|
|
|
/ IPv6(src="2001::1", dst=self.pg0.remote_ip6)
|
|
|
|
/ inet6.UDP(sport=1234, dport=1234)
|
|
|
|
/ Raw(b"\xa5" * 100)
|
|
|
|
)
|
|
|
|
pm = (
|
|
|
|
Ether(src=self.pg1.remote_mac, dst=self.pg1.local_mac)
|
|
|
|
/ IPv6(src="2001::1", dst="ffef::1")
|
|
|
|
/ inet6.UDP(sport=1234, dport=1234)
|
|
|
|
/ Raw(b"\xa5" * 100)
|
|
|
|
)
|
2017-03-16 15:49:09 -04:00
|
|
|
|
|
|
|
#
|
|
|
|
# PG1 does not forward IP traffic
|
|
|
|
#
|
|
|
|
self.send_and_assert_no_replies(self.pg1, pu, "IPv6 disabled")
|
|
|
|
self.send_and_assert_no_replies(self.pg1, pm, "IPv6 disabled")
|
|
|
|
|
|
|
|
#
|
|
|
|
# IP enable PG1
|
|
|
|
#
|
|
|
|
self.pg1.config_ip6()
|
|
|
|
|
|
|
|
#
|
|
|
|
# Now we get packets through
|
|
|
|
#
|
|
|
|
self.pg1.add_stream(pu)
|
|
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
|
|
self.pg_start()
|
|
|
|
rx = self.pg0.get_capture(1)
|
|
|
|
|
|
|
|
self.pg1.add_stream(pm)
|
|
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
|
|
self.pg_start()
|
|
|
|
rx = self.pg0.get_capture(1)
|
|
|
|
|
|
|
|
#
|
|
|
|
# Disable PG1
|
|
|
|
#
|
|
|
|
self.pg1.unconfig_ip6()
|
|
|
|
|
|
|
|
#
|
|
|
|
# PG1 does not forward IP traffic
|
|
|
|
#
|
|
|
|
self.send_and_assert_no_replies(self.pg1, pu, "IPv6 disabled")
|
|
|
|
self.send_and_assert_no_replies(self.pg1, pm, "IPv6 disabled")
|
|
|
|
|
|
|
|
|
2017-04-21 01:07:59 -07:00
|
|
|
class TestIP6LoadBalance(VppTestCase):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IPv6 Load-Balancing"""
|
2017-04-21 01:07:59 -07:00
|
|
|
|
2019-03-12 19:23:27 -07:00
|
|
|
@classmethod
|
|
|
|
def setUpClass(cls):
|
|
|
|
super(TestIP6LoadBalance, cls).setUpClass()
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def tearDownClass(cls):
|
|
|
|
super(TestIP6LoadBalance, cls).tearDownClass()
|
|
|
|
|
2017-04-21 01:07:59 -07:00
|
|
|
def setUp(self):
|
|
|
|
super(TestIP6LoadBalance, self).setUp()
|
|
|
|
|
|
|
|
self.create_pg_interfaces(range(5))
|
|
|
|
|
2017-09-10 04:39:11 -07:00
|
|
|
mpls_tbl = VppMplsTable(self, 0)
|
|
|
|
mpls_tbl.add_vpp_config()
|
|
|
|
|
2017-04-21 01:07:59 -07:00
|
|
|
for i in self.pg_interfaces:
|
|
|
|
i.admin_up()
|
|
|
|
i.config_ip6()
|
|
|
|
i.resolve_ndp()
|
2017-05-25 12:38:58 -07:00
|
|
|
i.enable_mpls()
|
2017-04-21 01:07:59 -07:00
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
for i in self.pg_interfaces:
|
|
|
|
i.unconfig_ip6()
|
|
|
|
i.admin_down()
|
2017-05-25 12:38:58 -07:00
|
|
|
i.disable_mpls()
|
2017-09-10 04:39:11 -07:00
|
|
|
super(TestIP6LoadBalance, self).tearDown()
|
2017-04-21 01:07:59 -07:00
|
|
|
|
|
|
|
def test_ip6_load_balance(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IPv6 Load-Balancing"""
|
2017-04-21 01:07:59 -07:00
|
|
|
|
|
|
|
#
|
|
|
|
# An array of packets that differ only in the destination port
|
2017-05-25 12:38:58 -07:00
|
|
|
# - IP only
|
|
|
|
# - MPLS EOS
|
|
|
|
# - MPLS non-EOS
|
|
|
|
# - MPLS non-EOS with an entropy label
|
2017-04-21 01:07:59 -07:00
|
|
|
#
|
2017-05-25 12:38:58 -07:00
|
|
|
port_ip_pkts = []
|
|
|
|
port_mpls_pkts = []
|
|
|
|
port_mpls_neos_pkts = []
|
|
|
|
port_ent_pkts = []
|
2017-04-21 01:07:59 -07:00
|
|
|
|
|
|
|
#
|
|
|
|
# An array of packets that differ only in the source address
|
|
|
|
#
|
2017-05-25 12:38:58 -07:00
|
|
|
src_ip_pkts = []
|
|
|
|
src_mpls_pkts = []
|
2017-04-21 01:07:59 -07:00
|
|
|
|
2019-05-14 13:25:49 -04:00
|
|
|
for ii in range(NUM_PKTS):
|
2018-11-24 22:19:12 -08:00
|
|
|
port_ip_hdr = (
|
2022-04-26 19:02:15 +02:00
|
|
|
IPv6(dst="3000::1", src="3000:1::1")
|
|
|
|
/ inet6.UDP(sport=1234, dport=1234 + ii)
|
|
|
|
/ Raw(b"\xa5" * 100)
|
|
|
|
)
|
|
|
|
port_ip_pkts.append(
|
|
|
|
(Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) / port_ip_hdr)
|
|
|
|
)
|
|
|
|
port_mpls_pkts.append(
|
|
|
|
(
|
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
/ MPLS(label=66, ttl=2)
|
|
|
|
/ port_ip_hdr
|
|
|
|
)
|
|
|
|
)
|
|
|
|
port_mpls_neos_pkts.append(
|
|
|
|
(
|
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
/ MPLS(label=67, ttl=2)
|
|
|
|
/ MPLS(label=77, ttl=2)
|
|
|
|
/ port_ip_hdr
|
|
|
|
)
|
|
|
|
)
|
|
|
|
port_ent_pkts.append(
|
|
|
|
(
|
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
/ MPLS(label=67, ttl=2)
|
|
|
|
/ MPLS(label=14, ttl=2)
|
|
|
|
/ MPLS(label=999, ttl=2)
|
|
|
|
/ port_ip_hdr
|
|
|
|
)
|
|
|
|
)
|
2018-11-24 22:19:12 -08:00
|
|
|
src_ip_hdr = (
|
2022-04-26 19:02:15 +02:00
|
|
|
IPv6(dst="3000::1", src="3000:1::%d" % ii)
|
|
|
|
/ inet6.UDP(sport=1234, dport=1234)
|
|
|
|
/ Raw(b"\xa5" * 100)
|
|
|
|
)
|
|
|
|
src_ip_pkts.append(
|
|
|
|
(Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) / src_ip_hdr)
|
|
|
|
)
|
|
|
|
src_mpls_pkts.append(
|
|
|
|
(
|
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
/ MPLS(label=66, ttl=2)
|
|
|
|
/ src_ip_hdr
|
|
|
|
)
|
|
|
|
)
|
2017-05-25 12:38:58 -07:00
|
|
|
|
|
|
|
#
|
2019-03-27 11:25:48 -07:00
|
|
|
# A route for the IP packets
|
2017-05-25 12:38:58 -07:00
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
route_3000_1 = VppIpRoute(
|
|
|
|
self,
|
|
|
|
"3000::1",
|
|
|
|
128,
|
|
|
|
[
|
|
|
|
VppRoutePath(self.pg1.remote_ip6, self.pg1.sw_if_index),
|
|
|
|
VppRoutePath(self.pg2.remote_ip6, self.pg2.sw_if_index),
|
|
|
|
],
|
|
|
|
)
|
2017-04-21 01:07:59 -07:00
|
|
|
route_3000_1.add_vpp_config()
|
|
|
|
|
2017-05-25 12:38:58 -07:00
|
|
|
#
|
|
|
|
# a local-label for the EOS packets
|
|
|
|
#
|
|
|
|
binding = VppMplsIpBind(self, 66, "3000::1", 128, is_ip6=1)
|
|
|
|
binding.add_vpp_config()
|
|
|
|
|
|
|
|
#
|
|
|
|
# An MPLS route for the non-EOS packets
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
route_67 = VppMplsRoute(
|
|
|
|
self,
|
|
|
|
67,
|
|
|
|
0,
|
|
|
|
[
|
|
|
|
VppRoutePath(self.pg1.remote_ip6, self.pg1.sw_if_index, labels=[67]),
|
|
|
|
VppRoutePath(self.pg2.remote_ip6, self.pg2.sw_if_index, labels=[67]),
|
|
|
|
],
|
|
|
|
)
|
2017-05-25 12:38:58 -07:00
|
|
|
route_67.add_vpp_config()
|
|
|
|
|
2017-04-21 01:07:59 -07:00
|
|
|
#
|
|
|
|
# inject the packet on pg0 - expect load-balancing across the 2 paths
|
|
|
|
# - since the default hash config is to use IP src,dst and port
|
|
|
|
# src,dst
|
|
|
|
# We are not going to ensure equal amounts of packets across each link,
|
|
|
|
# since the hash algorithm is statistical and therefore this can never
|
2019-03-27 11:25:48 -07:00
|
|
|
# be guaranteed. But with 64 different packets we do expect some
|
2017-04-21 01:07:59 -07:00
|
|
|
# balancing. So instead just ensure there is traffic on each link.
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
rx = self.send_and_expect_load_balancing(
|
|
|
|
self.pg0, port_ip_pkts, [self.pg1, self.pg2]
|
|
|
|
)
|
2021-01-22 16:12:38 +00:00
|
|
|
n_ip_pg0 = len(rx[0])
|
2022-04-26 19:02:15 +02:00
|
|
|
self.send_and_expect_load_balancing(self.pg0, src_ip_pkts, [self.pg1, self.pg2])
|
|
|
|
self.send_and_expect_load_balancing(
|
|
|
|
self.pg0, port_mpls_pkts, [self.pg1, self.pg2]
|
|
|
|
)
|
|
|
|
self.send_and_expect_load_balancing(
|
|
|
|
self.pg0, src_mpls_pkts, [self.pg1, self.pg2]
|
|
|
|
)
|
|
|
|
rx = self.send_and_expect_load_balancing(
|
|
|
|
self.pg0, port_mpls_neos_pkts, [self.pg1, self.pg2]
|
|
|
|
)
|
2021-01-22 16:12:38 +00:00
|
|
|
n_mpls_pg0 = len(rx[0])
|
|
|
|
|
|
|
|
#
|
|
|
|
# change the router ID and expect the distribution changes
|
|
|
|
#
|
|
|
|
self.vapi.set_ip_flow_hash_router_id(router_id=0x11111111)
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
rx = self.send_and_expect_load_balancing(
|
|
|
|
self.pg0, port_ip_pkts, [self.pg1, self.pg2]
|
|
|
|
)
|
2021-01-22 16:12:38 +00:00
|
|
|
self.assertNotEqual(n_ip_pg0, len(rx[0]))
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
rx = self.send_and_expect_load_balancing(
|
|
|
|
self.pg0, src_mpls_pkts, [self.pg1, self.pg2]
|
|
|
|
)
|
2021-01-22 16:12:38 +00:00
|
|
|
self.assertNotEqual(n_mpls_pg0, len(rx[0]))
|
2017-05-25 12:38:58 -07:00
|
|
|
|
|
|
|
#
|
|
|
|
# The packets with Entropy label in should not load-balance,
|
2019-03-27 11:25:48 -07:00
|
|
|
# since the Entropy value is fixed.
|
2017-05-25 12:38:58 -07:00
|
|
|
#
|
2022-02-17 09:22:16 +00:00
|
|
|
self.send_and_expect_only(self.pg0, port_ent_pkts, self.pg1)
|
2017-04-21 01:07:59 -07:00
|
|
|
|
|
|
|
#
|
|
|
|
# change the flow hash config so it's only IP src,dst
|
|
|
|
# - now only the stream with differing source address will
|
|
|
|
# load-balance
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
self.vapi.set_ip_flow_hash(
|
|
|
|
vrf_id=0, src=1, dst=1, proto=1, sport=0, dport=0, is_ipv6=1
|
|
|
|
)
|
2017-04-21 01:07:59 -07:00
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
self.send_and_expect_load_balancing(self.pg0, src_ip_pkts, [self.pg1, self.pg2])
|
|
|
|
self.send_and_expect_load_balancing(
|
|
|
|
self.pg0, src_mpls_pkts, [self.pg1, self.pg2]
|
|
|
|
)
|
2022-02-17 09:22:16 +00:00
|
|
|
self.send_and_expect_only(self.pg0, port_ip_pkts, self.pg2)
|
2017-04-21 01:07:59 -07:00
|
|
|
|
|
|
|
#
|
|
|
|
# change the flow hash config back to defaults
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
self.vapi.set_ip_flow_hash(
|
|
|
|
vrf_id=0, src=1, dst=1, sport=1, dport=1, proto=1, is_ipv6=1
|
|
|
|
)
|
2017-04-21 01:07:59 -07:00
|
|
|
|
|
|
|
#
|
|
|
|
# Recursive prefixes
|
|
|
|
# - testing that 2 stages of load-balancing occurs and there is no
|
|
|
|
# polarisation (i.e. only 2 of 4 paths are used)
|
|
|
|
#
|
|
|
|
port_pkts = []
|
|
|
|
src_pkts = []
|
|
|
|
|
|
|
|
for ii in range(257):
|
2022-04-26 19:02:15 +02:00
|
|
|
port_pkts.append(
|
|
|
|
(
|
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
/ IPv6(dst="4000::1", src="4000:1::1")
|
|
|
|
/ inet6.UDP(sport=1234, dport=1234 + ii)
|
|
|
|
/ Raw(b"\xa5" * 100)
|
|
|
|
)
|
|
|
|
)
|
|
|
|
src_pkts.append(
|
|
|
|
(
|
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
/ IPv6(dst="4000::1", src="4000:1::%d" % ii)
|
|
|
|
/ inet6.UDP(sport=1234, dport=1234)
|
|
|
|
/ Raw(b"\xa5" * 100)
|
|
|
|
)
|
|
|
|
)
|
|
|
|
|
|
|
|
route_3000_2 = VppIpRoute(
|
|
|
|
self,
|
|
|
|
"3000::2",
|
|
|
|
128,
|
|
|
|
[
|
|
|
|
VppRoutePath(self.pg3.remote_ip6, self.pg3.sw_if_index),
|
|
|
|
VppRoutePath(self.pg4.remote_ip6, self.pg4.sw_if_index),
|
|
|
|
],
|
|
|
|
)
|
2017-04-21 01:07:59 -07:00
|
|
|
route_3000_2.add_vpp_config()
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
route_4000_1 = VppIpRoute(
|
|
|
|
self,
|
|
|
|
"4000::1",
|
|
|
|
128,
|
|
|
|
[VppRoutePath("3000::1", 0xFFFFFFFF), VppRoutePath("3000::2", 0xFFFFFFFF)],
|
|
|
|
)
|
2017-04-21 01:07:59 -07:00
|
|
|
route_4000_1.add_vpp_config()
|
|
|
|
|
|
|
|
#
|
|
|
|
# inject the packet on pg0 - expect load-balancing across all 4 paths
|
|
|
|
#
|
|
|
|
self.vapi.cli("clear trace")
|
2022-04-26 19:02:15 +02:00
|
|
|
self.send_and_expect_load_balancing(
|
|
|
|
self.pg0, port_pkts, [self.pg1, self.pg2, self.pg3, self.pg4]
|
|
|
|
)
|
|
|
|
self.send_and_expect_load_balancing(
|
|
|
|
self.pg0, src_pkts, [self.pg1, self.pg2, self.pg3, self.pg4]
|
|
|
|
)
|
2017-04-21 01:07:59 -07:00
|
|
|
|
2017-07-31 02:56:03 -07:00
|
|
|
#
|
|
|
|
# Recursive prefixes
|
|
|
|
# - testing that 2 stages of load-balancing no choices
|
|
|
|
#
|
|
|
|
port_pkts = []
|
|
|
|
|
|
|
|
for ii in range(257):
|
2022-04-26 19:02:15 +02:00
|
|
|
port_pkts.append(
|
|
|
|
(
|
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
/ IPv6(dst="6000::1", src="6000:1::1")
|
|
|
|
/ inet6.UDP(sport=1234, dport=1234 + ii)
|
|
|
|
/ Raw(b"\xa5" * 100)
|
|
|
|
)
|
|
|
|
)
|
|
|
|
|
|
|
|
route_5000_2 = VppIpRoute(
|
|
|
|
self,
|
|
|
|
"5000::2",
|
|
|
|
128,
|
|
|
|
[VppRoutePath(self.pg3.remote_ip6, self.pg3.sw_if_index)],
|
|
|
|
)
|
2017-07-31 02:56:03 -07:00
|
|
|
route_5000_2.add_vpp_config()
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
route_6000_1 = VppIpRoute(
|
|
|
|
self, "6000::1", 128, [VppRoutePath("5000::2", 0xFFFFFFFF)]
|
|
|
|
)
|
2017-07-31 02:56:03 -07:00
|
|
|
route_6000_1.add_vpp_config()
|
|
|
|
|
|
|
|
#
|
|
|
|
# inject the packet on pg0 - expect load-balancing across all 4 paths
|
|
|
|
#
|
|
|
|
self.vapi.cli("clear trace")
|
2022-02-17 09:22:16 +00:00
|
|
|
self.send_and_expect_only(self.pg0, port_pkts, self.pg3)
|
2017-07-31 02:56:03 -07:00
|
|
|
|
2017-04-21 01:07:59 -07:00
|
|
|
|
2021-01-19 16:58:14 +00:00
|
|
|
class IP6PuntSetup(object):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""Setup for IPv6 Punt Police/Redirect"""
|
2017-07-31 02:30:50 -07:00
|
|
|
|
2021-01-19 16:58:14 +00:00
|
|
|
def punt_setup(self):
|
2018-11-27 09:59:44 +01:00
|
|
|
self.create_pg_interfaces(range(4))
|
2017-07-31 02:30:50 -07:00
|
|
|
|
|
|
|
for i in self.pg_interfaces:
|
|
|
|
i.admin_up()
|
|
|
|
i.config_ip6()
|
|
|
|
i.resolve_ndp()
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
self.pkt = (
|
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
/ IPv6(src=self.pg0.remote_ip6, dst=self.pg0.local_ip6)
|
|
|
|
/ inet6.TCP(sport=1234, dport=1234)
|
|
|
|
/ Raw(b"\xa5" * 100)
|
|
|
|
)
|
2021-01-19 16:58:14 +00:00
|
|
|
|
|
|
|
def punt_teardown(self):
|
2017-07-31 02:30:50 -07:00
|
|
|
for i in self.pg_interfaces:
|
|
|
|
i.unconfig_ip6()
|
|
|
|
i.admin_down()
|
|
|
|
|
2021-01-19 16:58:14 +00:00
|
|
|
|
|
|
|
class TestIP6Punt(IP6PuntSetup, VppTestCase):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IPv6 Punt Police/Redirect"""
|
2021-01-19 16:58:14 +00:00
|
|
|
|
|
|
|
def setUp(self):
|
|
|
|
super(TestIP6Punt, self).setUp()
|
|
|
|
super(TestIP6Punt, self).punt_setup()
|
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
super(TestIP6Punt, self).punt_teardown()
|
|
|
|
super(TestIP6Punt, self).tearDown()
|
|
|
|
|
2017-07-31 02:30:50 -07:00
|
|
|
def test_ip_punt(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IP6 punt police and redirect"""
|
2017-07-31 02:30:50 -07:00
|
|
|
|
2021-01-19 16:58:14 +00:00
|
|
|
pkts = self.pkt * 1025
|
2017-07-31 02:30:50 -07:00
|
|
|
|
|
|
|
#
|
|
|
|
# Configure a punt redirect via pg1.
|
|
|
|
#
|
2018-12-11 13:04:01 +01:00
|
|
|
nh_addr = self.pg1.remote_ip6
|
2022-04-26 19:02:15 +02:00
|
|
|
ip_punt_redirect = VppIpPuntRedirect(
|
|
|
|
self, self.pg0.sw_if_index, self.pg1.sw_if_index, nh_addr
|
|
|
|
)
|
2020-12-01 11:23:44 +01:00
|
|
|
ip_punt_redirect.add_vpp_config()
|
2017-07-31 02:30:50 -07:00
|
|
|
|
|
|
|
self.send_and_expect(self.pg0, pkts, self.pg1)
|
|
|
|
|
|
|
|
#
|
|
|
|
# add a policer
|
|
|
|
#
|
2020-03-02 13:16:53 +01:00
|
|
|
policer = VppPolicer(self, "ip6-punt", 400, 0, 10, 0, rate_type=1)
|
|
|
|
policer.add_vpp_config()
|
2022-04-26 19:02:15 +02:00
|
|
|
ip_punt_policer = VppIpPuntPolicer(self, policer.policer_index, is_ip6=True)
|
2020-12-01 11:23:44 +01:00
|
|
|
ip_punt_policer.add_vpp_config()
|
2017-07-31 02:30:50 -07:00
|
|
|
|
|
|
|
self.vapi.cli("clear trace")
|
|
|
|
self.pg0.add_stream(pkts)
|
|
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
|
|
self.pg_start()
|
|
|
|
|
|
|
|
#
|
2019-03-27 11:25:48 -07:00
|
|
|
# the number of packet received should be greater than 0,
|
2017-07-31 02:30:50 -07:00
|
|
|
# but not equal to the number sent, since some were policed
|
|
|
|
#
|
|
|
|
rx = self.pg1._get_capture(1)
|
2021-01-27 14:45:22 +00:00
|
|
|
stats = policer.get_stats()
|
|
|
|
|
|
|
|
# Single rate policer - expect conform, violate but no exceed
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertGreater(stats["conform_packets"], 0)
|
|
|
|
self.assertEqual(stats["exceed_packets"], 0)
|
|
|
|
self.assertGreater(stats["violate_packets"], 0)
|
2021-01-27 14:45:22 +00:00
|
|
|
|
2018-11-24 23:19:53 -08:00
|
|
|
self.assertGreater(len(rx), 0)
|
|
|
|
self.assertLess(len(rx), len(pkts))
|
2017-07-31 02:30:50 -07:00
|
|
|
|
|
|
|
#
|
2019-02-20 09:01:14 -08:00
|
|
|
# remove the policer. back to full rx
|
2017-07-31 02:30:50 -07:00
|
|
|
#
|
2020-12-01 11:23:44 +01:00
|
|
|
ip_punt_policer.remove_vpp_config()
|
2020-03-02 13:16:53 +01:00
|
|
|
policer.remove_vpp_config()
|
2017-07-31 02:30:50 -07:00
|
|
|
self.send_and_expect(self.pg0, pkts, self.pg1)
|
|
|
|
|
|
|
|
#
|
|
|
|
# remove the redirect. expect full drop.
|
|
|
|
#
|
2020-12-01 11:23:44 +01:00
|
|
|
ip_punt_redirect.remove_vpp_config()
|
2022-04-26 19:02:15 +02:00
|
|
|
self.send_and_assert_no_replies(self.pg0, pkts, "IP no punt config")
|
2017-07-31 02:30:50 -07:00
|
|
|
|
|
|
|
#
|
|
|
|
# Add a redirect that is not input port selective
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
ip_punt_redirect = VppIpPuntRedirect(
|
|
|
|
self, 0xFFFFFFFF, self.pg1.sw_if_index, nh_addr
|
|
|
|
)
|
2020-12-01 11:23:44 +01:00
|
|
|
ip_punt_redirect.add_vpp_config()
|
2017-07-31 02:30:50 -07:00
|
|
|
self.send_and_expect(self.pg0, pkts, self.pg1)
|
2020-12-01 11:23:44 +01:00
|
|
|
ip_punt_redirect.remove_vpp_config()
|
2018-11-27 09:59:44 +01:00
|
|
|
|
|
|
|
def test_ip_punt_dump(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IP6 punt redirect dump"""
|
2018-11-27 09:59:44 +01:00
|
|
|
|
|
|
|
#
|
|
|
|
# Configure a punt redirects
|
|
|
|
#
|
2020-12-01 11:23:44 +01:00
|
|
|
nh_address = self.pg3.remote_ip6
|
2022-04-26 19:02:15 +02:00
|
|
|
ipr_03 = VppIpPuntRedirect(
|
|
|
|
self, self.pg0.sw_if_index, self.pg3.sw_if_index, nh_address
|
|
|
|
)
|
|
|
|
ipr_13 = VppIpPuntRedirect(
|
|
|
|
self, self.pg1.sw_if_index, self.pg3.sw_if_index, nh_address
|
|
|
|
)
|
|
|
|
ipr_23 = VppIpPuntRedirect(
|
|
|
|
self, self.pg2.sw_if_index, self.pg3.sw_if_index, "0::0"
|
|
|
|
)
|
2020-12-01 11:23:44 +01:00
|
|
|
ipr_03.add_vpp_config()
|
|
|
|
ipr_13.add_vpp_config()
|
|
|
|
ipr_23.add_vpp_config()
|
2018-11-27 09:59:44 +01:00
|
|
|
|
|
|
|
#
|
|
|
|
# Dump pg0 punt redirects
|
|
|
|
#
|
2020-12-01 11:23:44 +01:00
|
|
|
self.assertTrue(ipr_03.query_vpp_config())
|
|
|
|
self.assertTrue(ipr_13.query_vpp_config())
|
|
|
|
self.assertTrue(ipr_23.query_vpp_config())
|
2018-11-27 09:59:44 +01:00
|
|
|
|
|
|
|
#
|
|
|
|
# Dump punt redirects for all interfaces
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
punts = self.vapi.ip_punt_redirect_dump(0xFFFFFFFF, is_ipv6=1)
|
2018-11-27 09:59:44 +01:00
|
|
|
self.assertEqual(len(punts), 3)
|
|
|
|
for p in punts:
|
|
|
|
self.assertEqual(p.punt.tx_sw_if_index, self.pg3.sw_if_index)
|
2018-12-11 13:04:01 +01:00
|
|
|
self.assertNotEqual(punts[1].punt.nh, self.pg3.remote_ip6)
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertEqual(str(punts[2].punt.nh), "::")
|
2017-07-31 02:30:50 -07:00
|
|
|
|
2017-10-21 09:37:55 -07:00
|
|
|
|
2021-01-19 16:58:34 +00:00
|
|
|
class TestIP6PuntHandoff(IP6PuntSetup, VppTestCase):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IPv6 Punt Police/Redirect"""
|
|
|
|
|
2021-03-15 16:58:10 +01:00
|
|
|
vpp_worker_count = 2
|
2021-01-19 16:58:34 +00:00
|
|
|
|
|
|
|
def setUp(self):
|
|
|
|
super(TestIP6PuntHandoff, self).setUp()
|
|
|
|
super(TestIP6PuntHandoff, self).punt_setup()
|
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
super(TestIP6PuntHandoff, self).punt_teardown()
|
|
|
|
super(TestIP6PuntHandoff, self).tearDown()
|
|
|
|
|
|
|
|
def test_ip_punt(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IP6 punt policer thread handoff"""
|
2021-01-19 16:58:34 +00:00
|
|
|
pkts = self.pkt * NUM_PKTS
|
|
|
|
|
|
|
|
#
|
|
|
|
# Configure a punt redirect via pg1.
|
|
|
|
#
|
|
|
|
nh_addr = self.pg1.remote_ip6
|
2022-04-26 19:02:15 +02:00
|
|
|
ip_punt_redirect = VppIpPuntRedirect(
|
|
|
|
self, self.pg0.sw_if_index, self.pg1.sw_if_index, nh_addr
|
|
|
|
)
|
2021-01-19 16:58:34 +00:00
|
|
|
ip_punt_redirect.add_vpp_config()
|
|
|
|
|
|
|
|
action_tx = PolicerAction(
|
2022-04-26 19:02:15 +02:00
|
|
|
VppEnum.vl_api_sse2_qos_action_type_t.SSE2_QOS_ACTION_API_TRANSMIT, 0
|
|
|
|
)
|
2021-01-19 16:58:34 +00:00
|
|
|
#
|
|
|
|
# This policer drops no packets, we are just
|
|
|
|
# testing that they get to the right thread.
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
policer = VppPolicer(
|
|
|
|
self,
|
|
|
|
"ip6-punt",
|
|
|
|
400,
|
|
|
|
0,
|
|
|
|
10,
|
|
|
|
0,
|
|
|
|
1,
|
|
|
|
0,
|
|
|
|
0,
|
|
|
|
False,
|
|
|
|
action_tx,
|
|
|
|
action_tx,
|
|
|
|
action_tx,
|
|
|
|
)
|
2021-01-19 16:58:34 +00:00
|
|
|
policer.add_vpp_config()
|
2022-04-26 19:02:15 +02:00
|
|
|
ip_punt_policer = VppIpPuntPolicer(self, policer.policer_index, is_ip6=True)
|
2021-01-19 16:58:34 +00:00
|
|
|
ip_punt_policer.add_vpp_config()
|
|
|
|
|
|
|
|
for worker in [0, 1]:
|
|
|
|
self.send_and_expect(self.pg0, pkts, self.pg1, worker=worker)
|
|
|
|
if worker == 0:
|
|
|
|
self.logger.debug(self.vapi.cli("show trace max 100"))
|
|
|
|
|
2021-01-27 14:45:22 +00:00
|
|
|
# Combined stats, all threads
|
|
|
|
stats = policer.get_stats()
|
|
|
|
|
|
|
|
# Single rate policer - expect conform, violate but no exceed
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertGreater(stats["conform_packets"], 0)
|
|
|
|
self.assertEqual(stats["exceed_packets"], 0)
|
|
|
|
self.assertGreater(stats["violate_packets"], 0)
|
2021-01-27 14:45:22 +00:00
|
|
|
|
|
|
|
# Worker 0, should have done all the policing
|
|
|
|
stats0 = policer.get_stats(worker=0)
|
|
|
|
self.assertEqual(stats, stats0)
|
|
|
|
|
|
|
|
# Worker 1, should have handed everything off
|
|
|
|
stats1 = policer.get_stats(worker=1)
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertEqual(stats1["conform_packets"], 0)
|
|
|
|
self.assertEqual(stats1["exceed_packets"], 0)
|
|
|
|
self.assertEqual(stats1["violate_packets"], 0)
|
2021-01-27 14:45:22 +00:00
|
|
|
|
2021-02-10 13:56:06 +00:00
|
|
|
# Bind the policer to worker 1 and repeat
|
|
|
|
policer.bind_vpp_config(1, True)
|
|
|
|
for worker in [0, 1]:
|
|
|
|
self.send_and_expect(self.pg0, pkts, self.pg1, worker=worker)
|
|
|
|
self.logger.debug(self.vapi.cli("show trace max 100"))
|
|
|
|
|
|
|
|
# The 2 workers should now have policed the same amount
|
|
|
|
stats = policer.get_stats()
|
|
|
|
stats0 = policer.get_stats(worker=0)
|
|
|
|
stats1 = policer.get_stats(worker=1)
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertGreater(stats0["conform_packets"], 0)
|
|
|
|
self.assertEqual(stats0["exceed_packets"], 0)
|
|
|
|
self.assertGreater(stats0["violate_packets"], 0)
|
2021-02-10 13:56:06 +00:00
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertGreater(stats1["conform_packets"], 0)
|
|
|
|
self.assertEqual(stats1["exceed_packets"], 0)
|
|
|
|
self.assertGreater(stats1["violate_packets"], 0)
|
2021-02-10 13:56:06 +00:00
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertEqual(
|
|
|
|
stats0["conform_packets"] + stats1["conform_packets"],
|
|
|
|
stats["conform_packets"],
|
|
|
|
)
|
2021-02-10 13:56:06 +00:00
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertEqual(
|
|
|
|
stats0["violate_packets"] + stats1["violate_packets"],
|
|
|
|
stats["violate_packets"],
|
|
|
|
)
|
2021-02-10 13:56:06 +00:00
|
|
|
|
|
|
|
# Unbind the policer and repeat
|
|
|
|
policer.bind_vpp_config(1, False)
|
|
|
|
for worker in [0, 1]:
|
|
|
|
self.send_and_expect(self.pg0, pkts, self.pg1, worker=worker)
|
|
|
|
self.logger.debug(self.vapi.cli("show trace max 100"))
|
|
|
|
|
|
|
|
# The policer should auto-bind to worker 0 when packets arrive
|
|
|
|
stats = policer.get_stats()
|
|
|
|
stats0new = policer.get_stats(worker=0)
|
|
|
|
stats1new = policer.get_stats(worker=1)
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertGreater(stats0new["conform_packets"], stats0["conform_packets"])
|
|
|
|
self.assertEqual(stats0new["exceed_packets"], 0)
|
|
|
|
self.assertGreater(stats0new["violate_packets"], stats0["violate_packets"])
|
2021-02-10 13:56:06 +00:00
|
|
|
|
|
|
|
self.assertEqual(stats1, stats1new)
|
|
|
|
|
2021-01-19 16:58:34 +00:00
|
|
|
#
|
|
|
|
# Clean up
|
|
|
|
#
|
|
|
|
ip_punt_policer.remove_vpp_config()
|
|
|
|
policer.remove_vpp_config()
|
|
|
|
ip_punt_redirect.remove_vpp_config()
|
|
|
|
|
|
|
|
|
2022-02-25 05:51:10 +00:00
|
|
|
class TestIP6Deag(VppTestCase):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IPv6 Deaggregate Routes"""
|
2018-08-01 12:53:17 -07:00
|
|
|
|
2019-03-12 19:23:27 -07:00
|
|
|
@classmethod
|
|
|
|
def setUpClass(cls):
|
2022-02-25 05:51:10 +00:00
|
|
|
super(TestIP6Deag, cls).setUpClass()
|
2019-03-12 19:23:27 -07:00
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def tearDownClass(cls):
|
2022-02-25 05:51:10 +00:00
|
|
|
super(TestIP6Deag, cls).tearDownClass()
|
2019-03-12 19:23:27 -07:00
|
|
|
|
2018-08-01 12:53:17 -07:00
|
|
|
def setUp(self):
|
2022-02-25 05:51:10 +00:00
|
|
|
super(TestIP6Deag, self).setUp()
|
2018-08-01 12:53:17 -07:00
|
|
|
|
|
|
|
self.create_pg_interfaces(range(3))
|
|
|
|
|
|
|
|
for i in self.pg_interfaces:
|
|
|
|
i.admin_up()
|
|
|
|
i.config_ip6()
|
|
|
|
i.resolve_ndp()
|
|
|
|
|
|
|
|
def tearDown(self):
|
2022-02-25 05:51:10 +00:00
|
|
|
super(TestIP6Deag, self).tearDown()
|
2018-08-01 12:53:17 -07:00
|
|
|
for i in self.pg_interfaces:
|
|
|
|
i.unconfig_ip6()
|
|
|
|
i.admin_down()
|
|
|
|
|
|
|
|
def test_ip_deag(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IP Deag Routes"""
|
2018-08-01 12:53:17 -07:00
|
|
|
|
|
|
|
#
|
|
|
|
# Create a table to be used for:
|
|
|
|
# 1 - another destination address lookup
|
|
|
|
# 2 - a source address lookup
|
|
|
|
#
|
|
|
|
table_dst = VppIpTable(self, 1, is_ip6=1)
|
|
|
|
table_src = VppIpTable(self, 2, is_ip6=1)
|
|
|
|
table_dst.add_vpp_config()
|
|
|
|
table_src.add_vpp_config()
|
|
|
|
|
|
|
|
#
|
|
|
|
# Add a route in the default table to point to a deag/
|
|
|
|
# second lookup in each of these tables
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
route_to_dst = VppIpRoute(
|
|
|
|
self, "1::1", 128, [VppRoutePath("::", 0xFFFFFFFF, nh_table_id=1)]
|
|
|
|
)
|
2018-05-01 05:17:55 -07:00
|
|
|
route_to_src = VppIpRoute(
|
2022-04-26 19:02:15 +02:00
|
|
|
self,
|
|
|
|
"1::2",
|
|
|
|
128,
|
|
|
|
[
|
|
|
|
VppRoutePath(
|
|
|
|
"::",
|
|
|
|
0xFFFFFFFF,
|
|
|
|
nh_table_id=2,
|
|
|
|
type=FibPathType.FIB_PATH_TYPE_SOURCE_LOOKUP,
|
|
|
|
)
|
|
|
|
],
|
|
|
|
)
|
2018-05-01 05:17:55 -07:00
|
|
|
|
2018-08-01 12:53:17 -07:00
|
|
|
route_to_dst.add_vpp_config()
|
|
|
|
route_to_src.add_vpp_config()
|
|
|
|
|
|
|
|
#
|
|
|
|
# packets to these destination are dropped, since they'll
|
|
|
|
# hit the respective default routes in the second table
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
p_dst = (
|
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
/ IPv6(src="5::5", dst="1::1")
|
|
|
|
/ inet6.TCP(sport=1234, dport=1234)
|
|
|
|
/ Raw(b"\xa5" * 100)
|
|
|
|
)
|
|
|
|
p_src = (
|
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
/ IPv6(src="2::2", dst="1::2")
|
|
|
|
/ inet6.TCP(sport=1234, dport=1234)
|
|
|
|
/ Raw(b"\xa5" * 100)
|
|
|
|
)
|
2018-08-01 12:53:17 -07:00
|
|
|
pkts_dst = p_dst * 257
|
|
|
|
pkts_src = p_src * 257
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
self.send_and_assert_no_replies(self.pg0, pkts_dst, "IP in dst table")
|
|
|
|
self.send_and_assert_no_replies(self.pg0, pkts_src, "IP in src table")
|
2018-08-01 12:53:17 -07:00
|
|
|
|
|
|
|
#
|
|
|
|
# add a route in the dst table to forward via pg1
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
route_in_dst = VppIpRoute(
|
|
|
|
self,
|
|
|
|
"1::1",
|
|
|
|
128,
|
|
|
|
[VppRoutePath(self.pg1.remote_ip6, self.pg1.sw_if_index)],
|
|
|
|
table_id=1,
|
|
|
|
)
|
2018-08-01 12:53:17 -07:00
|
|
|
route_in_dst.add_vpp_config()
|
|
|
|
|
|
|
|
self.send_and_expect(self.pg0, pkts_dst, self.pg1)
|
|
|
|
|
|
|
|
#
|
|
|
|
# add a route in the src table to forward via pg2
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
route_in_src = VppIpRoute(
|
|
|
|
self,
|
|
|
|
"2::2",
|
|
|
|
128,
|
|
|
|
[VppRoutePath(self.pg2.remote_ip6, self.pg2.sw_if_index)],
|
|
|
|
table_id=2,
|
|
|
|
)
|
2018-08-01 12:53:17 -07:00
|
|
|
route_in_src.add_vpp_config()
|
|
|
|
self.send_and_expect(self.pg0, pkts_src, self.pg2)
|
|
|
|
|
|
|
|
#
|
|
|
|
# loop in the lookup DP
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
route_loop = VppIpRoute(self, "3::3", 128, [VppRoutePath("::", 0xFFFFFFFF)])
|
2018-08-01 12:53:17 -07:00
|
|
|
route_loop.add_vpp_config()
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
p_l = (
|
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
/ IPv6(src="3::4", dst="3::3")
|
|
|
|
/ inet6.TCP(sport=1234, dport=1234)
|
|
|
|
/ Raw(b"\xa5" * 100)
|
|
|
|
)
|
2018-08-01 12:53:17 -07:00
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
self.send_and_assert_no_replies(self.pg0, p_l * 257, "IP lookup loop")
|
2018-08-01 12:53:17 -07:00
|
|
|
|
|
|
|
|
2017-10-21 09:37:55 -07:00
|
|
|
class TestIP6Input(VppTestCase):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IPv6 Input Exception Test Cases"""
|
2017-10-21 09:37:55 -07:00
|
|
|
|
2019-03-12 19:23:27 -07:00
|
|
|
@classmethod
|
|
|
|
def setUpClass(cls):
|
|
|
|
super(TestIP6Input, cls).setUpClass()
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def tearDownClass(cls):
|
|
|
|
super(TestIP6Input, cls).tearDownClass()
|
|
|
|
|
2017-10-21 09:37:55 -07:00
|
|
|
def setUp(self):
|
|
|
|
super(TestIP6Input, self).setUp()
|
|
|
|
|
|
|
|
self.create_pg_interfaces(range(2))
|
|
|
|
|
|
|
|
for i in self.pg_interfaces:
|
|
|
|
i.admin_up()
|
|
|
|
i.config_ip6()
|
|
|
|
i.resolve_ndp()
|
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
super(TestIP6Input, self).tearDown()
|
|
|
|
for i in self.pg_interfaces:
|
|
|
|
i.unconfig_ip6()
|
|
|
|
i.admin_down()
|
|
|
|
|
2018-11-23 09:00:27 -08:00
|
|
|
def test_ip_input_icmp_reply(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IP6 Input Exception - Return ICMP (3,0)"""
|
2017-10-21 09:37:55 -07:00
|
|
|
#
|
2018-11-23 09:00:27 -08:00
|
|
|
# hop limit - ICMP replies
|
2017-10-21 09:37:55 -07:00
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
p_version = (
|
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
/ IPv6(src=self.pg0.remote_ip6, dst=self.pg1.remote_ip6, hlim=1)
|
|
|
|
/ inet6.UDP(sport=1234, dport=1234)
|
|
|
|
/ Raw(b"\xa5" * 100)
|
|
|
|
)
|
2017-10-21 09:37:55 -07:00
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
rxs = self.send_and_expect_some(self.pg0, p_version * NUM_PKTS, self.pg0)
|
2018-11-23 09:00:27 -08:00
|
|
|
|
2022-02-17 09:08:47 +00:00
|
|
|
for rx in rxs:
|
|
|
|
icmp = rx[ICMPv6TimeExceeded]
|
|
|
|
# 0: "hop limit exceeded in transit",
|
|
|
|
self.assertEqual((icmp.type, icmp.code), (3, 0))
|
2018-11-23 09:00:27 -08:00
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
icmpv6_data = "\x0a" * 18
|
2018-11-23 09:00:27 -08:00
|
|
|
all_0s = "::"
|
|
|
|
all_1s = "FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF"
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
@parameterized.expand(
|
|
|
|
[
|
|
|
|
# Name, src, dst, l4proto, msg, timeout
|
|
|
|
(
|
|
|
|
"src='iface', dst='iface'",
|
|
|
|
None,
|
|
|
|
None,
|
|
|
|
inet6.UDP(sport=1234, dport=1234),
|
|
|
|
"funky version",
|
|
|
|
None,
|
|
|
|
),
|
|
|
|
(
|
|
|
|
"src='All 0's', dst='iface'",
|
|
|
|
all_0s,
|
|
|
|
None,
|
|
|
|
ICMPv6EchoRequest(id=0xB, seq=5, data=icmpv6_data),
|
|
|
|
None,
|
|
|
|
0.1,
|
|
|
|
),
|
|
|
|
(
|
|
|
|
"src='iface', dst='All 0's'",
|
|
|
|
None,
|
|
|
|
all_0s,
|
|
|
|
ICMPv6EchoRequest(id=0xB, seq=5, data=icmpv6_data),
|
|
|
|
None,
|
|
|
|
0.1,
|
|
|
|
),
|
|
|
|
(
|
|
|
|
"src='All 1's', dst='iface'",
|
|
|
|
all_1s,
|
|
|
|
None,
|
|
|
|
ICMPv6EchoRequest(id=0xB, seq=5, data=icmpv6_data),
|
|
|
|
None,
|
|
|
|
0.1,
|
|
|
|
),
|
|
|
|
(
|
|
|
|
"src='iface', dst='All 1's'",
|
|
|
|
None,
|
|
|
|
all_1s,
|
|
|
|
ICMPv6EchoRequest(id=0xB, seq=5, data=icmpv6_data),
|
|
|
|
None,
|
|
|
|
0.1,
|
|
|
|
),
|
|
|
|
(
|
|
|
|
"src='All 1's', dst='All 1's'",
|
|
|
|
all_1s,
|
|
|
|
all_1s,
|
|
|
|
ICMPv6EchoRequest(id=0xB, seq=5, data=icmpv6_data),
|
|
|
|
None,
|
|
|
|
0.1,
|
|
|
|
),
|
|
|
|
]
|
|
|
|
)
|
2018-11-23 09:00:27 -08:00
|
|
|
def test_ip_input_no_replies(self, name, src, dst, l4, msg, timeout):
|
2022-04-26 19:02:15 +02:00
|
|
|
self._testMethodDoc = "IPv6 Input Exception - %s" % name
|
|
|
|
|
|
|
|
p_version = (
|
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
/ IPv6(
|
|
|
|
src=src or self.pg0.remote_ip6,
|
|
|
|
dst=dst or self.pg1.remote_ip6,
|
|
|
|
version=3,
|
|
|
|
)
|
|
|
|
/ l4
|
|
|
|
/ Raw(b"\xa5" * 100)
|
|
|
|
)
|
2018-11-23 09:00:27 -08:00
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
self.send_and_assert_no_replies(
|
|
|
|
self.pg0, p_version * NUM_PKTS, remark=msg or "", timeout=timeout
|
|
|
|
)
|
2017-10-21 09:37:55 -07:00
|
|
|
|
2019-05-24 13:03:01 -04:00
|
|
|
def test_hop_by_hop(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""Hop-by-hop header test"""
|
|
|
|
|
|
|
|
p = (
|
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
/ IPv6(src=self.pg0.remote_ip6, dst=self.pg0.local_ip6)
|
|
|
|
/ IPv6ExtHdrHopByHop()
|
|
|
|
/ inet6.UDP(sport=1234, dport=1234)
|
|
|
|
/ Raw(b"\xa5" * 100)
|
|
|
|
)
|
2019-05-24 13:03:01 -04:00
|
|
|
|
|
|
|
self.pg0.add_stream(p)
|
|
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
|
|
self.pg_start()
|
2017-10-21 09:37:55 -07:00
|
|
|
|
2019-11-08 12:42:31 +00:00
|
|
|
|
2022-02-25 05:51:10 +00:00
|
|
|
class TestIP6Replace(VppTestCase):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IPv6 Table Replace"""
|
2019-11-08 12:42:31 +00:00
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def setUpClass(cls):
|
2022-02-25 05:51:10 +00:00
|
|
|
super(TestIP6Replace, cls).setUpClass()
|
2019-11-08 12:42:31 +00:00
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def tearDownClass(cls):
|
2022-02-25 05:51:10 +00:00
|
|
|
super(TestIP6Replace, cls).tearDownClass()
|
2019-11-08 12:42:31 +00:00
|
|
|
|
|
|
|
def setUp(self):
|
2022-02-25 05:51:10 +00:00
|
|
|
super(TestIP6Replace, self).setUp()
|
2019-11-08 12:42:31 +00:00
|
|
|
|
|
|
|
self.create_pg_interfaces(range(4))
|
|
|
|
|
|
|
|
table_id = 1
|
|
|
|
self.tables = []
|
|
|
|
|
|
|
|
for i in self.pg_interfaces:
|
|
|
|
i.admin_up()
|
|
|
|
i.config_ip6()
|
|
|
|
i.generate_remote_hosts(2)
|
2022-04-26 19:02:15 +02:00
|
|
|
self.tables.append(VppIpTable(self, table_id, True).add_vpp_config())
|
2019-11-08 12:42:31 +00:00
|
|
|
table_id += 1
|
|
|
|
|
|
|
|
def tearDown(self):
|
2022-02-25 05:51:10 +00:00
|
|
|
super(TestIP6Replace, self).tearDown()
|
2019-11-08 12:42:31 +00:00
|
|
|
for i in self.pg_interfaces:
|
|
|
|
i.admin_down()
|
2020-04-23 07:36:12 +00:00
|
|
|
i.unconfig_ip6()
|
2019-11-08 12:42:31 +00:00
|
|
|
|
|
|
|
def test_replace(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IP Table Replace"""
|
2019-11-08 12:42:31 +00:00
|
|
|
|
2020-10-20 07:20:17 +00:00
|
|
|
MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t
|
|
|
|
MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t
|
2019-11-08 12:42:31 +00:00
|
|
|
N_ROUTES = 20
|
|
|
|
links = [self.pg0, self.pg1, self.pg2, self.pg3]
|
|
|
|
routes = [[], [], [], []]
|
|
|
|
|
|
|
|
# the sizes of 'empty' tables
|
|
|
|
for t in self.tables:
|
|
|
|
self.assertEqual(len(t.dump()), 2)
|
|
|
|
self.assertEqual(len(t.mdump()), 5)
|
|
|
|
|
|
|
|
# load up the tables with some routes
|
|
|
|
for ii, t in enumerate(self.tables):
|
|
|
|
for jj in range(1, N_ROUTES):
|
|
|
|
uni = VppIpRoute(
|
2022-04-26 19:02:15 +02:00
|
|
|
self,
|
|
|
|
"2001::%d" % jj if jj != 0 else "2001::",
|
|
|
|
128,
|
|
|
|
[
|
|
|
|
VppRoutePath(
|
|
|
|
links[ii].remote_hosts[0].ip6, links[ii].sw_if_index
|
|
|
|
),
|
|
|
|
VppRoutePath(
|
|
|
|
links[ii].remote_hosts[1].ip6, links[ii].sw_if_index
|
|
|
|
),
|
|
|
|
],
|
|
|
|
table_id=t.table_id,
|
|
|
|
).add_vpp_config()
|
2019-11-08 12:42:31 +00:00
|
|
|
multi = VppIpMRoute(
|
2022-04-26 19:02:15 +02:00
|
|
|
self,
|
|
|
|
"::",
|
|
|
|
"ff:2001::%d" % jj,
|
|
|
|
128,
|
2020-10-20 07:20:17 +00:00
|
|
|
MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE,
|
2022-04-26 19:02:15 +02:00
|
|
|
[
|
|
|
|
VppMRoutePath(
|
|
|
|
self.pg0.sw_if_index,
|
|
|
|
MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT,
|
|
|
|
proto=FibPathProto.FIB_PATH_NH_PROTO_IP6,
|
|
|
|
),
|
|
|
|
VppMRoutePath(
|
|
|
|
self.pg1.sw_if_index,
|
|
|
|
MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD,
|
|
|
|
proto=FibPathProto.FIB_PATH_NH_PROTO_IP6,
|
|
|
|
),
|
|
|
|
VppMRoutePath(
|
|
|
|
self.pg2.sw_if_index,
|
|
|
|
MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD,
|
|
|
|
proto=FibPathProto.FIB_PATH_NH_PROTO_IP6,
|
|
|
|
),
|
|
|
|
VppMRoutePath(
|
|
|
|
self.pg3.sw_if_index,
|
|
|
|
MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD,
|
|
|
|
proto=FibPathProto.FIB_PATH_NH_PROTO_IP6,
|
|
|
|
),
|
|
|
|
],
|
|
|
|
table_id=t.table_id,
|
|
|
|
).add_vpp_config()
|
|
|
|
routes[ii].append({"uni": uni, "multi": multi})
|
2019-11-08 12:42:31 +00:00
|
|
|
|
|
|
|
#
|
|
|
|
# replace the tables a few times
|
|
|
|
#
|
|
|
|
for kk in range(3):
|
|
|
|
# replace each table
|
|
|
|
for t in self.tables:
|
|
|
|
t.replace_begin()
|
|
|
|
|
|
|
|
# all the routes are still there
|
|
|
|
for ii, t in enumerate(self.tables):
|
|
|
|
dump = t.dump()
|
|
|
|
mdump = t.mdump()
|
|
|
|
for r in routes[ii]:
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertTrue(find_route_in_dump(dump, r["uni"], t))
|
|
|
|
self.assertTrue(find_mroute_in_dump(mdump, r["multi"], t))
|
2019-11-08 12:42:31 +00:00
|
|
|
|
|
|
|
# redownload the even numbered routes
|
|
|
|
for ii, t in enumerate(self.tables):
|
|
|
|
for jj in range(0, N_ROUTES, 2):
|
2022-04-26 19:02:15 +02:00
|
|
|
routes[ii][jj]["uni"].add_vpp_config()
|
|
|
|
routes[ii][jj]["multi"].add_vpp_config()
|
2019-11-08 12:42:31 +00:00
|
|
|
|
|
|
|
# signal each table converged
|
|
|
|
for t in self.tables:
|
|
|
|
t.replace_end()
|
|
|
|
|
|
|
|
# we should find the even routes, but not the odd
|
|
|
|
for ii, t in enumerate(self.tables):
|
|
|
|
dump = t.dump()
|
|
|
|
mdump = t.mdump()
|
|
|
|
for jj in range(0, N_ROUTES, 2):
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertTrue(find_route_in_dump(dump, routes[ii][jj]["uni"], t))
|
|
|
|
self.assertTrue(
|
|
|
|
find_mroute_in_dump(mdump, routes[ii][jj]["multi"], t)
|
|
|
|
)
|
2019-11-08 12:42:31 +00:00
|
|
|
for jj in range(1, N_ROUTES - 1, 2):
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertFalse(find_route_in_dump(dump, routes[ii][jj]["uni"], t))
|
|
|
|
self.assertFalse(
|
|
|
|
find_mroute_in_dump(mdump, routes[ii][jj]["multi"], t)
|
|
|
|
)
|
2019-11-08 12:42:31 +00:00
|
|
|
|
|
|
|
# reload all the routes
|
|
|
|
for ii, t in enumerate(self.tables):
|
|
|
|
for r in routes[ii]:
|
2022-04-26 19:02:15 +02:00
|
|
|
r["uni"].add_vpp_config()
|
|
|
|
r["multi"].add_vpp_config()
|
2019-11-08 12:42:31 +00:00
|
|
|
|
|
|
|
# all the routes are still there
|
|
|
|
for ii, t in enumerate(self.tables):
|
|
|
|
dump = t.dump()
|
|
|
|
mdump = t.mdump()
|
|
|
|
for r in routes[ii]:
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertTrue(find_route_in_dump(dump, r["uni"], t))
|
|
|
|
self.assertTrue(find_mroute_in_dump(mdump, r["multi"], t))
|
2019-11-08 12:42:31 +00:00
|
|
|
|
|
|
|
#
|
|
|
|
# finally flush the tables for good measure
|
|
|
|
#
|
|
|
|
for t in self.tables:
|
|
|
|
t.flush()
|
|
|
|
self.assertEqual(len(t.dump()), 2)
|
|
|
|
self.assertEqual(len(t.mdump()), 5)
|
|
|
|
|
|
|
|
|
2022-02-25 05:51:10 +00:00
|
|
|
class TestIP6AddrReplace(VppTestCase):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IPv6 Interface Address Replace"""
|
2020-04-08 12:19:38 +00:00
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def setUpClass(cls):
|
2022-02-25 05:51:10 +00:00
|
|
|
super(TestIP6AddrReplace, cls).setUpClass()
|
2020-04-08 12:19:38 +00:00
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def tearDownClass(cls):
|
2022-02-25 05:51:10 +00:00
|
|
|
super(TestIP6AddrReplace, cls).tearDownClass()
|
2020-04-08 12:19:38 +00:00
|
|
|
|
|
|
|
def setUp(self):
|
2022-02-25 05:51:10 +00:00
|
|
|
super(TestIP6AddrReplace, self).setUp()
|
2020-04-08 12:19:38 +00:00
|
|
|
|
|
|
|
self.create_pg_interfaces(range(4))
|
|
|
|
|
|
|
|
for i in self.pg_interfaces:
|
|
|
|
i.admin_up()
|
|
|
|
|
|
|
|
def tearDown(self):
|
2022-02-25 05:51:10 +00:00
|
|
|
super(TestIP6AddrReplace, self).tearDown()
|
2020-04-08 12:19:38 +00:00
|
|
|
for i in self.pg_interfaces:
|
|
|
|
i.admin_down()
|
|
|
|
|
|
|
|
def get_n_pfxs(self, intf):
|
|
|
|
return len(self.vapi.ip_address_dump(intf.sw_if_index, True))
|
|
|
|
|
|
|
|
def test_replace(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IP interface address replace"""
|
2020-04-08 12:19:38 +00:00
|
|
|
|
|
|
|
intf_pfxs = [[], [], [], []]
|
|
|
|
|
|
|
|
# add prefixes to each of the interfaces
|
|
|
|
for i in range(len(self.pg_interfaces)):
|
|
|
|
intf = self.pg_interfaces[i]
|
|
|
|
|
|
|
|
# 2001:16:x::1/64
|
|
|
|
addr = "2001:16:%d::1" % intf.sw_if_index
|
|
|
|
a = VppIpInterfaceAddress(self, intf, addr, 64).add_vpp_config()
|
|
|
|
intf_pfxs[i].append(a)
|
|
|
|
|
|
|
|
# 2001:16:x::2/64 - a different address in the same subnet as above
|
|
|
|
addr = "2001:16:%d::2" % intf.sw_if_index
|
|
|
|
a = VppIpInterfaceAddress(self, intf, addr, 64).add_vpp_config()
|
|
|
|
intf_pfxs[i].append(a)
|
|
|
|
|
|
|
|
# 2001:15:x::2/64 - a different address and subnet
|
|
|
|
addr = "2001:15:%d::2" % intf.sw_if_index
|
|
|
|
a = VppIpInterfaceAddress(self, intf, addr, 64).add_vpp_config()
|
|
|
|
intf_pfxs[i].append(a)
|
|
|
|
|
|
|
|
# a dump should n_address in it
|
|
|
|
for intf in self.pg_interfaces:
|
|
|
|
self.assertEqual(self.get_n_pfxs(intf), 3)
|
|
|
|
|
|
|
|
#
|
|
|
|
# remove all the address thru a replace
|
|
|
|
#
|
|
|
|
self.vapi.sw_interface_address_replace_begin()
|
|
|
|
self.vapi.sw_interface_address_replace_end()
|
|
|
|
for intf in self.pg_interfaces:
|
|
|
|
self.assertEqual(self.get_n_pfxs(intf), 0)
|
|
|
|
|
|
|
|
#
|
|
|
|
# add all the interface addresses back
|
|
|
|
#
|
|
|
|
for p in intf_pfxs:
|
|
|
|
for v in p:
|
|
|
|
v.add_vpp_config()
|
|
|
|
for intf in self.pg_interfaces:
|
|
|
|
self.assertEqual(self.get_n_pfxs(intf), 3)
|
|
|
|
|
|
|
|
#
|
|
|
|
# replace again, but this time update/re-add the address on the first
|
|
|
|
# two interfaces
|
|
|
|
#
|
|
|
|
self.vapi.sw_interface_address_replace_begin()
|
|
|
|
|
|
|
|
for p in intf_pfxs[:2]:
|
|
|
|
for v in p:
|
|
|
|
v.add_vpp_config()
|
|
|
|
|
|
|
|
self.vapi.sw_interface_address_replace_end()
|
|
|
|
|
|
|
|
# on the first two the address still exist,
|
|
|
|
# on the other two they do not
|
|
|
|
for intf in self.pg_interfaces[:2]:
|
|
|
|
self.assertEqual(self.get_n_pfxs(intf), 3)
|
|
|
|
for p in intf_pfxs[:2]:
|
|
|
|
for v in p:
|
|
|
|
self.assertTrue(v.query_vpp_config())
|
|
|
|
for intf in self.pg_interfaces[2:]:
|
|
|
|
self.assertEqual(self.get_n_pfxs(intf), 0)
|
|
|
|
|
|
|
|
#
|
|
|
|
# add all the interface addresses back on the last two
|
|
|
|
#
|
|
|
|
for p in intf_pfxs[2:]:
|
|
|
|
for v in p:
|
|
|
|
v.add_vpp_config()
|
|
|
|
for intf in self.pg_interfaces:
|
|
|
|
self.assertEqual(self.get_n_pfxs(intf), 3)
|
|
|
|
|
|
|
|
#
|
|
|
|
# replace again, this time add different prefixes on all the interfaces
|
|
|
|
#
|
|
|
|
self.vapi.sw_interface_address_replace_begin()
|
|
|
|
|
|
|
|
pfxs = []
|
|
|
|
for intf in self.pg_interfaces:
|
|
|
|
# 2001:18:x::1/64
|
|
|
|
addr = "2001:18:%d::1" % intf.sw_if_index
|
2022-04-26 19:02:15 +02:00
|
|
|
pfxs.append(VppIpInterfaceAddress(self, intf, addr, 64).add_vpp_config())
|
2020-04-08 12:19:38 +00:00
|
|
|
|
|
|
|
self.vapi.sw_interface_address_replace_end()
|
|
|
|
|
|
|
|
# only .18 should exist on each interface
|
|
|
|
for intf in self.pg_interfaces:
|
|
|
|
self.assertEqual(self.get_n_pfxs(intf), 1)
|
|
|
|
for pfx in pfxs:
|
|
|
|
self.assertTrue(pfx.query_vpp_config())
|
|
|
|
|
|
|
|
#
|
|
|
|
# remove everything
|
|
|
|
#
|
|
|
|
self.vapi.sw_interface_address_replace_begin()
|
|
|
|
self.vapi.sw_interface_address_replace_end()
|
|
|
|
for intf in self.pg_interfaces:
|
|
|
|
self.assertEqual(self.get_n_pfxs(intf), 0)
|
|
|
|
|
|
|
|
#
|
|
|
|
# add prefixes to each interface. post-begin add the prefix from
|
|
|
|
# interface X onto interface Y. this would normally be an error
|
|
|
|
# since it would generate a 'duplicate address' warning. but in
|
|
|
|
# this case, since what is newly downloaded is sane, it's ok
|
|
|
|
#
|
|
|
|
for intf in self.pg_interfaces:
|
|
|
|
# 2001:18:x::1/64
|
|
|
|
addr = "2001:18:%d::1" % intf.sw_if_index
|
|
|
|
VppIpInterfaceAddress(self, intf, addr, 64).add_vpp_config()
|
|
|
|
|
|
|
|
self.vapi.sw_interface_address_replace_begin()
|
|
|
|
|
|
|
|
pfxs = []
|
|
|
|
for intf in self.pg_interfaces:
|
|
|
|
# 2001:18:x::1/64
|
|
|
|
addr = "2001:18:%d::1" % (intf.sw_if_index + 1)
|
2022-04-26 19:02:15 +02:00
|
|
|
pfxs.append(VppIpInterfaceAddress(self, intf, addr, 64).add_vpp_config())
|
2020-04-08 12:19:38 +00:00
|
|
|
|
|
|
|
self.vapi.sw_interface_address_replace_end()
|
|
|
|
|
|
|
|
self.logger.info(self.vapi.cli("sh int addr"))
|
|
|
|
|
|
|
|
for intf in self.pg_interfaces:
|
|
|
|
self.assertEqual(self.get_n_pfxs(intf), 1)
|
|
|
|
for pfx in pfxs:
|
|
|
|
self.assertTrue(pfx.query_vpp_config())
|
|
|
|
|
|
|
|
|
2024-03-11 10:38:46 +00:00
|
|
|
@unittest.skipIf(
|
|
|
|
"ping" in config.excluded_plugins, "Exclude tests requiring Ping plugin"
|
|
|
|
)
|
2020-04-23 07:36:12 +00:00
|
|
|
class TestIP6LinkLocal(VppTestCase):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IPv6 Link Local"""
|
2020-04-23 07:36:12 +00:00
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def setUpClass(cls):
|
|
|
|
super(TestIP6LinkLocal, cls).setUpClass()
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def tearDownClass(cls):
|
|
|
|
super(TestIP6LinkLocal, cls).tearDownClass()
|
|
|
|
|
|
|
|
def setUp(self):
|
|
|
|
super(TestIP6LinkLocal, self).setUp()
|
|
|
|
|
|
|
|
self.create_pg_interfaces(range(2))
|
|
|
|
|
|
|
|
for i in self.pg_interfaces:
|
|
|
|
i.admin_up()
|
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
super(TestIP6LinkLocal, self).tearDown()
|
|
|
|
for i in self.pg_interfaces:
|
|
|
|
i.admin_down()
|
|
|
|
|
|
|
|
def test_ip6_ll(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IPv6 Link Local"""
|
2020-04-23 07:36:12 +00:00
|
|
|
|
|
|
|
#
|
|
|
|
# two APIs to add a link local address.
|
|
|
|
# 1 - just like any other prefix
|
|
|
|
# 2 - with the special set LL API
|
|
|
|
#
|
|
|
|
|
|
|
|
#
|
|
|
|
# First with the API to set a 'normal' prefix
|
|
|
|
#
|
|
|
|
ll1 = "fe80:1::1"
|
|
|
|
ll2 = "fe80:2::2"
|
|
|
|
ll3 = "fe80:3::3"
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
VppNeighbor(
|
|
|
|
self, self.pg0.sw_if_index, self.pg0.remote_mac, ll2
|
|
|
|
).add_vpp_config()
|
2021-05-20 16:28:12 +00:00
|
|
|
|
2020-04-23 07:36:12 +00:00
|
|
|
VppIpInterfaceAddress(self, self.pg0, ll1, 128).add_vpp_config()
|
|
|
|
|
|
|
|
#
|
|
|
|
# should be able to ping the ll
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
p_echo_request_1 = (
|
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
/ IPv6(src=ll2, dst=ll1)
|
|
|
|
/ ICMPv6EchoRequest()
|
|
|
|
)
|
2020-04-23 07:36:12 +00:00
|
|
|
|
|
|
|
self.send_and_expect(self.pg0, [p_echo_request_1], self.pg0)
|
|
|
|
|
|
|
|
#
|
|
|
|
# change the link-local on pg0
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
v_ll3 = VppIpInterfaceAddress(self, self.pg0, ll3, 128).add_vpp_config()
|
2020-04-23 07:36:12 +00:00
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
p_echo_request_3 = (
|
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
/ IPv6(src=ll2, dst=ll3)
|
|
|
|
/ ICMPv6EchoRequest()
|
|
|
|
)
|
2020-04-23 07:36:12 +00:00
|
|
|
|
|
|
|
self.send_and_expect(self.pg0, [p_echo_request_3], self.pg0)
|
|
|
|
|
|
|
|
#
|
|
|
|
# set a normal v6 prefix on the link
|
|
|
|
#
|
|
|
|
self.pg0.config_ip6()
|
|
|
|
|
|
|
|
self.send_and_expect(self.pg0, [p_echo_request_3], self.pg0)
|
|
|
|
|
|
|
|
# the link-local cannot be removed
|
|
|
|
with self.vapi.assert_negative_api_retval():
|
|
|
|
v_ll3.remove_vpp_config()
|
|
|
|
|
|
|
|
#
|
|
|
|
# Use the specific link-local API on pg1
|
|
|
|
#
|
|
|
|
VppIp6LinkLocalAddress(self, self.pg1, ll1).add_vpp_config()
|
ethernet: check destination mac for L3 in ethernet-input node
When the NIC does not support mac filter, we rely on ethernet-input
node to do the destination mac check, ie, when the interface is in L3,
the mac address for the packet must be the mac address of the
interface where the packet arrives. This works fine in ethernet-input
node when all packets in the frame might have different interfaces, ie,
ETH_INPUT_FRAME_F_SINGLE_SW_IF_ID is not set in the frame. However,
when all packets are having the same interface,
ETH_INPUT_FRAME_F_SINGLE_SW_IF_ID is set, ethernet-input node goes
through the optimized routine eth_input_single_int -> eth_input_process_frame.
That is where dmac check has a bug when all packets in the frame are
either, ip4, ip6, or mpls without vlan tags. Because without vlan tags,
the code handles all packets in fast path and ignores dmac check.
With vlan tags, the code goes to slow path where dmac check is handled
properly.
The fix is to check if we have a bad dmac in the fast path and force the
code to go to slow path which will handle dmac check properly.
Also do a wholesale correction on all the testcases which do not use
the proper dmac when sending L3 packets.
Type: fix
Change-Id: I73153a805cecdc24c4eefcc781676de04737ae2c
Signed-off-by: Steven Luong <sluong@cisco.com>
2024-04-19 09:49:20 -07:00
|
|
|
p_echo_request_1.dst = self.pg1.local_mac
|
2020-04-23 07:36:12 +00:00
|
|
|
self.send_and_expect(self.pg1, [p_echo_request_1], self.pg1)
|
|
|
|
|
|
|
|
VppIp6LinkLocalAddress(self, self.pg1, ll3).add_vpp_config()
|
ethernet: check destination mac for L3 in ethernet-input node
When the NIC does not support mac filter, we rely on ethernet-input
node to do the destination mac check, ie, when the interface is in L3,
the mac address for the packet must be the mac address of the
interface where the packet arrives. This works fine in ethernet-input
node when all packets in the frame might have different interfaces, ie,
ETH_INPUT_FRAME_F_SINGLE_SW_IF_ID is not set in the frame. However,
when all packets are having the same interface,
ETH_INPUT_FRAME_F_SINGLE_SW_IF_ID is set, ethernet-input node goes
through the optimized routine eth_input_single_int -> eth_input_process_frame.
That is where dmac check has a bug when all packets in the frame are
either, ip4, ip6, or mpls without vlan tags. Because without vlan tags,
the code handles all packets in fast path and ignores dmac check.
With vlan tags, the code goes to slow path where dmac check is handled
properly.
The fix is to check if we have a bad dmac in the fast path and force the
code to go to slow path which will handle dmac check properly.
Also do a wholesale correction on all the testcases which do not use
the proper dmac when sending L3 packets.
Type: fix
Change-Id: I73153a805cecdc24c4eefcc781676de04737ae2c
Signed-off-by: Steven Luong <sluong@cisco.com>
2024-04-19 09:49:20 -07:00
|
|
|
p_echo_request_3.dst = self.pg1.local_mac
|
2020-04-23 07:36:12 +00:00
|
|
|
self.send_and_expect(self.pg1, [p_echo_request_3], self.pg1)
|
|
|
|
|
2024-03-11 10:38:46 +00:00
|
|
|
@unittest.skipIf(
|
|
|
|
"gre" in config.excluded_plugins, "Exclude tests requiring GRE plugin"
|
|
|
|
)
|
2021-05-20 16:28:12 +00:00
|
|
|
def test_ip6_ll_p2p(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IPv6 Link Local P2P (GRE)"""
|
2021-05-20 16:28:12 +00:00
|
|
|
|
|
|
|
self.pg0.config_ip4()
|
|
|
|
self.pg0.resolve_arp()
|
2022-04-26 19:02:15 +02:00
|
|
|
gre_if = VppGreInterface(
|
|
|
|
self, self.pg0.local_ip4, self.pg0.remote_ip4
|
|
|
|
).add_vpp_config()
|
2021-05-20 16:28:12 +00:00
|
|
|
gre_if.admin_up()
|
|
|
|
|
|
|
|
ll1 = "fe80:1::1"
|
|
|
|
ll2 = "fe80:2::2"
|
|
|
|
|
|
|
|
VppIpInterfaceAddress(self, gre_if, ll1, 128).add_vpp_config()
|
|
|
|
|
|
|
|
self.logger.info(self.vapi.cli("sh ip6-ll gre0 fe80:2::2"))
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
p_echo_request_1 = (
|
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
/ IP(src=self.pg0.remote_ip4, dst=self.pg0.local_ip4)
|
|
|
|
/ GRE()
|
|
|
|
/ IPv6(src=ll2, dst=ll1)
|
|
|
|
/ ICMPv6EchoRequest()
|
|
|
|
)
|
2021-05-20 16:28:12 +00:00
|
|
|
self.send_and_expect(self.pg0, [p_echo_request_1], self.pg0)
|
|
|
|
|
|
|
|
self.pg0.unconfig_ip4()
|
|
|
|
gre_if.remove_vpp_config()
|
|
|
|
|
2024-03-11 10:38:46 +00:00
|
|
|
@unittest.skipIf(
|
|
|
|
"gre" in config.excluded_plugins, "Exclude tests requiring GRE plugin"
|
|
|
|
)
|
2021-05-20 16:28:12 +00:00
|
|
|
def test_ip6_ll_p2mp(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IPv6 Link Local P2MP (GRE)"""
|
2021-05-20 16:28:12 +00:00
|
|
|
|
|
|
|
self.pg0.config_ip4()
|
|
|
|
self.pg0.resolve_arp()
|
|
|
|
|
|
|
|
gre_if = VppGreInterface(
|
|
|
|
self,
|
|
|
|
self.pg0.local_ip4,
|
|
|
|
"0.0.0.0",
|
2022-04-26 19:02:15 +02:00
|
|
|
mode=(VppEnum.vl_api_tunnel_mode_t.TUNNEL_API_MODE_MP),
|
|
|
|
).add_vpp_config()
|
2021-05-20 16:28:12 +00:00
|
|
|
gre_if.admin_up()
|
|
|
|
|
|
|
|
ll1 = "fe80:1::1"
|
|
|
|
ll2 = "fe80:2::2"
|
|
|
|
|
|
|
|
VppIpInterfaceAddress(self, gre_if, ll1, 128).add_vpp_config()
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
p_echo_request_1 = (
|
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
/ IP(src=self.pg0.remote_ip4, dst=self.pg0.local_ip4)
|
|
|
|
/ GRE()
|
|
|
|
/ IPv6(src=ll2, dst=ll1)
|
|
|
|
/ ICMPv6EchoRequest()
|
|
|
|
)
|
2021-05-20 16:28:12 +00:00
|
|
|
|
|
|
|
# no route back at this point
|
|
|
|
self.send_and_assert_no_replies(self.pg0, [p_echo_request_1])
|
|
|
|
|
|
|
|
# add teib entry for the peer
|
|
|
|
teib = VppTeib(self, gre_if, ll2, self.pg0.remote_ip4)
|
|
|
|
teib.add_vpp_config()
|
|
|
|
|
|
|
|
self.logger.info(self.vapi.cli("sh ip6-ll gre0 %s" % ll2))
|
|
|
|
self.send_and_expect(self.pg0, [p_echo_request_1], self.pg0)
|
|
|
|
|
|
|
|
# teardown
|
|
|
|
self.pg0.unconfig_ip4()
|
|
|
|
|
2020-04-23 07:36:12 +00:00
|
|
|
|
2020-12-21 08:29:34 +00:00
|
|
|
class TestIPv6PathMTU(VppTestCase):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IPv6 Path MTU"""
|
2020-12-21 08:29:34 +00:00
|
|
|
|
|
|
|
def setUp(self):
|
|
|
|
super(TestIPv6PathMTU, self).setUp()
|
|
|
|
|
|
|
|
self.create_pg_interfaces(range(2))
|
|
|
|
|
|
|
|
# setup all interfaces
|
|
|
|
for i in self.pg_interfaces:
|
|
|
|
i.admin_up()
|
|
|
|
i.config_ip6()
|
|
|
|
i.resolve_ndp()
|
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
super(TestIPv6PathMTU, self).tearDown()
|
|
|
|
for i in self.pg_interfaces:
|
|
|
|
i.unconfig_ip6()
|
|
|
|
i.admin_down()
|
|
|
|
|
|
|
|
def test_path_mtu_local(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""Path MTU for attached neighbour"""
|
2020-12-21 08:29:34 +00:00
|
|
|
|
|
|
|
self.vapi.cli("set log class ip level debug")
|
|
|
|
#
|
|
|
|
# The goal here is not test that fragmentation works correctly,
|
|
|
|
# that's done elsewhere, the intent is to ensure that the Path MTU
|
|
|
|
# settings are honoured.
|
|
|
|
#
|
|
|
|
|
|
|
|
#
|
|
|
|
# IPv6 will only frag locally generated packets, so use tunnelled
|
|
|
|
# packets post encap
|
|
|
|
#
|
|
|
|
tun = VppIpIpTunInterface(
|
2022-04-26 19:02:15 +02:00
|
|
|
self, self.pg1, self.pg1.local_ip6, self.pg1.remote_ip6
|
|
|
|
)
|
2020-12-21 08:29:34 +00:00
|
|
|
tun.add_vpp_config()
|
|
|
|
tun.admin_up()
|
|
|
|
tun.config_ip6()
|
|
|
|
|
|
|
|
# set the interface MTU to a reasonable value
|
2022-04-26 19:02:15 +02:00
|
|
|
self.vapi.sw_interface_set_mtu(self.pg1.sw_if_index, [2800, 0, 0, 0])
|
|
|
|
|
|
|
|
p_6k = (
|
|
|
|
Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
|
|
|
|
/ IPv6(src=self.pg0.remote_ip6, dst=tun.remote_ip6)
|
|
|
|
/ UDP(sport=1234, dport=5678)
|
|
|
|
/ Raw(b"0xa" * 2000)
|
|
|
|
)
|
|
|
|
p_2k = (
|
|
|
|
Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
|
|
|
|
/ IPv6(src=self.pg0.remote_ip6, dst=tun.remote_ip6)
|
|
|
|
/ UDP(sport=1234, dport=5678)
|
|
|
|
/ Raw(b"0xa" * 1000)
|
|
|
|
)
|
|
|
|
p_1k = (
|
|
|
|
Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
|
|
|
|
/ IPv6(src=self.pg0.remote_ip6, dst=tun.remote_ip6)
|
|
|
|
/ UDP(sport=1234, dport=5678)
|
|
|
|
/ Raw(b"0xa" * 600)
|
|
|
|
)
|
|
|
|
|
|
|
|
nbr = VppNeighbor(
|
|
|
|
self, self.pg1.sw_if_index, self.pg1.remote_mac, self.pg1.remote_ip6
|
|
|
|
).add_vpp_config()
|
2020-12-21 08:29:34 +00:00
|
|
|
|
|
|
|
# this is now the interface MTU frags
|
2022-03-04 11:45:41 +00:00
|
|
|
self.send_and_expect(self.pg0, [p_6k], self.pg1, n_rx=4)
|
2020-12-21 08:29:34 +00:00
|
|
|
self.send_and_expect(self.pg0, [p_2k], self.pg1, n_rx=2)
|
|
|
|
self.send_and_expect(self.pg0, [p_1k], self.pg1)
|
|
|
|
|
|
|
|
# drop the path MTU for this neighbour to below the interface MTU
|
|
|
|
# expect more frags
|
|
|
|
pmtu = VppIpPathMtu(self, self.pg1.remote_ip6, 1300).add_vpp_config()
|
|
|
|
|
|
|
|
# print/format the adj delegate and trackers
|
|
|
|
self.logger.info(self.vapi.cli("sh ip pmtu"))
|
|
|
|
self.logger.info(self.vapi.cli("sh adj 7"))
|
|
|
|
|
|
|
|
self.send_and_expect(self.pg0, [p_2k], self.pg1, n_rx=3)
|
|
|
|
self.send_and_expect(self.pg0, [p_1k], self.pg1, n_rx=2)
|
|
|
|
|
|
|
|
# increase the path MTU to more than the interface
|
|
|
|
# expect to use the interface MTU
|
|
|
|
pmtu.modify(8192)
|
|
|
|
|
|
|
|
self.send_and_expect(self.pg0, [p_2k], self.pg1, n_rx=2)
|
|
|
|
self.send_and_expect(self.pg0, [p_1k], self.pg1)
|
|
|
|
|
|
|
|
# go back to an MTU from the path
|
|
|
|
pmtu.modify(1300)
|
|
|
|
|
|
|
|
self.send_and_expect(self.pg0, [p_2k], self.pg1, n_rx=3)
|
|
|
|
self.send_and_expect(self.pg0, [p_1k], self.pg1, n_rx=2)
|
|
|
|
|
|
|
|
# raise the interface's MTU
|
|
|
|
# should still use that of the path
|
2022-04-26 19:02:15 +02:00
|
|
|
self.vapi.sw_interface_set_mtu(self.pg1.sw_if_index, [2000, 0, 0, 0])
|
2020-12-21 08:29:34 +00:00
|
|
|
self.send_and_expect(self.pg0, [p_2k], self.pg1, n_rx=3)
|
|
|
|
self.send_and_expect(self.pg0, [p_1k], self.pg1, n_rx=2)
|
|
|
|
|
|
|
|
# set path high and interface low
|
|
|
|
pmtu.modify(2000)
|
2022-04-26 19:02:15 +02:00
|
|
|
self.vapi.sw_interface_set_mtu(self.pg1.sw_if_index, [1300, 0, 0, 0])
|
2020-12-21 08:29:34 +00:00
|
|
|
self.send_and_expect(self.pg0, [p_2k], self.pg1, n_rx=3)
|
|
|
|
self.send_and_expect(self.pg0, [p_1k], self.pg1, n_rx=2)
|
|
|
|
|
|
|
|
# remove the path MTU
|
2022-04-26 19:02:15 +02:00
|
|
|
self.vapi.sw_interface_set_mtu(self.pg1.sw_if_index, [2800, 0, 0, 0])
|
2020-12-21 08:29:34 +00:00
|
|
|
pmtu.modify(0)
|
|
|
|
|
|
|
|
self.send_and_expect(self.pg0, [p_2k], self.pg1, n_rx=2)
|
|
|
|
self.send_and_expect(self.pg0, [p_1k], self.pg1)
|
|
|
|
|
|
|
|
def test_path_mtu_remote(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""Path MTU for remote neighbour"""
|
2020-12-21 08:29:34 +00:00
|
|
|
|
|
|
|
self.vapi.cli("set log class ip level debug")
|
|
|
|
#
|
|
|
|
# The goal here is not test that fragmentation works correctly,
|
|
|
|
# that's done elsewhere, the intent is to ensure that the Path MTU
|
|
|
|
# settings are honoured.
|
|
|
|
#
|
|
|
|
tun_dst = "2001::1"
|
|
|
|
|
|
|
|
route = VppIpRoute(
|
2022-04-26 19:02:15 +02:00
|
|
|
self, tun_dst, 64, [VppRoutePath(self.pg1.remote_ip6, self.pg1.sw_if_index)]
|
|
|
|
).add_vpp_config()
|
2020-12-21 08:29:34 +00:00
|
|
|
|
|
|
|
#
|
|
|
|
# IPv6 will only frag locally generated packets, so use tunnelled
|
|
|
|
# packets post encap
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
tun = VppIpIpTunInterface(self, self.pg1, self.pg1.local_ip6, tun_dst)
|
2020-12-21 08:29:34 +00:00
|
|
|
tun.add_vpp_config()
|
|
|
|
tun.admin_up()
|
|
|
|
tun.config_ip6()
|
|
|
|
|
|
|
|
# set the interface MTU to a reasonable value
|
2022-04-26 19:02:15 +02:00
|
|
|
self.vapi.sw_interface_set_mtu(self.pg1.sw_if_index, [2800, 0, 0, 0])
|
|
|
|
|
|
|
|
p_2k = (
|
|
|
|
Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
|
|
|
|
/ IPv6(src=self.pg0.remote_ip6, dst=tun.remote_ip6)
|
|
|
|
/ UDP(sport=1234, dport=5678)
|
|
|
|
/ Raw(b"0xa" * 1000)
|
|
|
|
)
|
|
|
|
p_1k = (
|
|
|
|
Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
|
|
|
|
/ IPv6(src=self.pg0.remote_ip6, dst=tun.remote_ip6)
|
|
|
|
/ UDP(sport=1234, dport=5678)
|
|
|
|
/ Raw(b"0xa" * 600)
|
|
|
|
)
|
|
|
|
|
|
|
|
nbr = VppNeighbor(
|
|
|
|
self, self.pg1.sw_if_index, self.pg1.remote_mac, self.pg1.remote_ip6
|
|
|
|
).add_vpp_config()
|
2020-12-21 08:29:34 +00:00
|
|
|
|
|
|
|
# this is now the interface MTU frags
|
|
|
|
self.send_and_expect(self.pg0, [p_2k], self.pg1, n_rx=2)
|
|
|
|
self.send_and_expect(self.pg0, [p_1k], self.pg1)
|
|
|
|
|
|
|
|
# drop the path MTU for this neighbour to below the interface MTU
|
|
|
|
# expect more frags
|
|
|
|
pmtu = VppIpPathMtu(self, tun_dst, 1300).add_vpp_config()
|
|
|
|
|
|
|
|
# print/format the fib entry/dpo
|
|
|
|
self.logger.info(self.vapi.cli("sh ip6 fib 2001::1"))
|
|
|
|
|
|
|
|
self.send_and_expect(self.pg0, [p_2k], self.pg1, n_rx=3)
|
|
|
|
self.send_and_expect(self.pg0, [p_1k], self.pg1, n_rx=2)
|
|
|
|
|
|
|
|
# increase the path MTU to more than the interface
|
|
|
|
# expect to use the interface MTU
|
|
|
|
pmtu.modify(8192)
|
|
|
|
|
|
|
|
self.send_and_expect(self.pg0, [p_2k], self.pg1, n_rx=2)
|
|
|
|
self.send_and_expect(self.pg0, [p_1k], self.pg1)
|
|
|
|
|
|
|
|
# go back to an MTU from the path
|
|
|
|
pmtu.modify(1300)
|
|
|
|
|
|
|
|
self.send_and_expect(self.pg0, [p_2k], self.pg1, n_rx=3)
|
|
|
|
self.send_and_expect(self.pg0, [p_1k], self.pg1, n_rx=2)
|
|
|
|
|
|
|
|
# raise the interface's MTU
|
|
|
|
# should still use that of the path
|
2022-04-26 19:02:15 +02:00
|
|
|
self.vapi.sw_interface_set_mtu(self.pg1.sw_if_index, [2000, 0, 0, 0])
|
2020-12-21 08:29:34 +00:00
|
|
|
self.send_and_expect(self.pg0, [p_2k], self.pg1, n_rx=3)
|
|
|
|
self.send_and_expect(self.pg0, [p_1k], self.pg1, n_rx=2)
|
|
|
|
|
|
|
|
# turn the tun_dst into an attached neighbour
|
2022-04-26 19:02:15 +02:00
|
|
|
route.modify([VppRoutePath("::", self.pg1.sw_if_index)])
|
|
|
|
nbr2 = VppNeighbor(
|
|
|
|
self, self.pg1.sw_if_index, self.pg1.remote_mac, tun_dst
|
|
|
|
).add_vpp_config()
|
2020-12-21 08:29:34 +00:00
|
|
|
|
|
|
|
self.send_and_expect(self.pg0, [p_2k], self.pg1, n_rx=3)
|
|
|
|
self.send_and_expect(self.pg0, [p_1k], self.pg1, n_rx=2)
|
|
|
|
|
|
|
|
# add back to not attached
|
|
|
|
nbr2.remove_vpp_config()
|
2022-04-26 19:02:15 +02:00
|
|
|
route.modify([VppRoutePath(self.pg1.remote_ip6, self.pg1.sw_if_index)])
|
2020-12-21 08:29:34 +00:00
|
|
|
|
|
|
|
# set path high and interface low
|
|
|
|
pmtu.modify(2000)
|
2022-04-26 19:02:15 +02:00
|
|
|
self.vapi.sw_interface_set_mtu(self.pg1.sw_if_index, [1300, 0, 0, 0])
|
2020-12-21 08:29:34 +00:00
|
|
|
self.send_and_expect(self.pg0, [p_2k], self.pg1, n_rx=3)
|
|
|
|
self.send_and_expect(self.pg0, [p_1k], self.pg1, n_rx=2)
|
|
|
|
|
|
|
|
# remove the path MTU
|
2022-04-26 19:02:15 +02:00
|
|
|
self.vapi.sw_interface_set_mtu(self.pg1.sw_if_index, [2800, 0, 0, 0])
|
2020-12-21 08:29:34 +00:00
|
|
|
pmtu.remove_vpp_config()
|
|
|
|
self.send_and_expect(self.pg0, [p_2k], self.pg1, n_rx=2)
|
|
|
|
self.send_and_expect(self.pg0, [p_1k], self.pg1)
|
|
|
|
|
|
|
|
|
2019-12-04 06:11:00 +00:00
|
|
|
class TestIPFibSource(VppTestCase):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IPv6 Table FibSource"""
|
2019-12-04 06:11:00 +00:00
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def setUpClass(cls):
|
|
|
|
super(TestIPFibSource, cls).setUpClass()
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def tearDownClass(cls):
|
|
|
|
super(TestIPFibSource, cls).tearDownClass()
|
|
|
|
|
|
|
|
def setUp(self):
|
|
|
|
super(TestIPFibSource, self).setUp()
|
|
|
|
|
|
|
|
self.create_pg_interfaces(range(2))
|
|
|
|
|
|
|
|
for i in self.pg_interfaces:
|
|
|
|
i.admin_up()
|
|
|
|
i.config_ip6()
|
|
|
|
i.resolve_arp()
|
|
|
|
i.generate_remote_hosts(2)
|
|
|
|
i.configure_ipv6_neighbors()
|
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
super(TestIPFibSource, self).tearDown()
|
|
|
|
for i in self.pg_interfaces:
|
|
|
|
i.admin_down()
|
|
|
|
i.unconfig_ip4()
|
|
|
|
|
|
|
|
def test_fib_source(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IP Table FibSource"""
|
2019-12-04 06:11:00 +00:00
|
|
|
|
|
|
|
routes = self.vapi.ip_route_v2_dump(0, True)
|
|
|
|
|
|
|
|
# 2 interfaces (4 routes) + 2 specials + 4 neighbours = 10 routes
|
|
|
|
self.assertEqual(len(routes), 10)
|
|
|
|
|
|
|
|
# dump all the sources in the FIB
|
|
|
|
sources = self.vapi.fib_source_dump()
|
|
|
|
for source in sources:
|
2022-04-26 19:02:15 +02:00
|
|
|
if source.src.name == "API":
|
2019-12-04 06:11:00 +00:00
|
|
|
api_source = source.src
|
2022-04-26 19:02:15 +02:00
|
|
|
if source.src.name == "interface":
|
2019-12-04 06:11:00 +00:00
|
|
|
intf_source = source.src
|
2022-04-26 19:02:15 +02:00
|
|
|
if source.src.name == "adjacency":
|
2019-12-04 06:11:00 +00:00
|
|
|
adj_source = source.src
|
2022-04-26 19:02:15 +02:00
|
|
|
if source.src.name == "special":
|
2019-12-04 06:11:00 +00:00
|
|
|
special_source = source.src
|
2022-04-26 19:02:15 +02:00
|
|
|
if source.src.name == "default-route":
|
2019-12-04 06:11:00 +00:00
|
|
|
dr_source = source.src
|
|
|
|
|
|
|
|
# dump the individual route types
|
|
|
|
routes = self.vapi.ip_route_v2_dump(0, True, src=adj_source.id)
|
|
|
|
self.assertEqual(len(routes), 4)
|
|
|
|
routes = self.vapi.ip_route_v2_dump(0, True, src=intf_source.id)
|
|
|
|
self.assertEqual(len(routes), 4)
|
|
|
|
routes = self.vapi.ip_route_v2_dump(0, True, src=special_source.id)
|
|
|
|
self.assertEqual(len(routes), 1)
|
|
|
|
routes = self.vapi.ip_route_v2_dump(0, True, src=dr_source.id)
|
|
|
|
self.assertEqual(len(routes), 1)
|
|
|
|
|
|
|
|
# add a new soure that'a better than the API
|
2022-04-26 19:02:15 +02:00
|
|
|
self.vapi.fib_source_add(
|
|
|
|
src={"name": "bgp", "priority": api_source.priority - 1}
|
|
|
|
)
|
2019-12-04 06:11:00 +00:00
|
|
|
|
|
|
|
# dump all the sources to check our new one is there
|
|
|
|
sources = self.vapi.fib_source_dump()
|
|
|
|
|
|
|
|
for source in sources:
|
2022-04-26 19:02:15 +02:00
|
|
|
if source.src.name == "bgp":
|
2019-12-04 06:11:00 +00:00
|
|
|
bgp_source = source.src
|
|
|
|
|
|
|
|
self.assertTrue(bgp_source)
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertEqual(bgp_source.priority, api_source.priority - 1)
|
2019-12-04 06:11:00 +00:00
|
|
|
|
|
|
|
# add a route with the default API source
|
|
|
|
r1 = VppIpRouteV2(
|
2022-04-26 19:02:15 +02:00
|
|
|
self,
|
|
|
|
"2001::1",
|
|
|
|
128,
|
|
|
|
[VppRoutePath(self.pg0.remote_ip6, self.pg0.sw_if_index)],
|
|
|
|
).add_vpp_config()
|
2019-12-04 06:11:00 +00:00
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
r2 = VppIpRouteV2(
|
|
|
|
self,
|
|
|
|
"2001::1",
|
|
|
|
128,
|
|
|
|
[VppRoutePath(self.pg1.remote_ip6, self.pg1.sw_if_index)],
|
|
|
|
src=bgp_source.id,
|
|
|
|
).add_vpp_config()
|
2019-12-04 06:11:00 +00:00
|
|
|
|
|
|
|
# ensure the BGP source takes priority
|
2022-04-26 19:02:15 +02:00
|
|
|
p = (
|
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
/ IPv6(src=self.pg0.remote_ip6, dst="2001::1")
|
|
|
|
/ inet6.UDP(sport=1234, dport=1234)
|
|
|
|
/ Raw(b"\xa5" * 100)
|
|
|
|
)
|
2019-12-04 06:11:00 +00:00
|
|
|
|
|
|
|
self.send_and_expect(self.pg0, [p], self.pg1)
|
|
|
|
|
|
|
|
r2.remove_vpp_config()
|
|
|
|
r1.remove_vpp_config()
|
|
|
|
|
|
|
|
self.assertFalse(find_route(self, "2001::1", 128))
|
|
|
|
|
|
|
|
|
2021-05-27 12:18:52 +00:00
|
|
|
class TestIPxAF(VppTestCase):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IP cross AF"""
|
2021-05-27 12:18:52 +00:00
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def setUpClass(cls):
|
|
|
|
super(TestIPxAF, cls).setUpClass()
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def tearDownClass(cls):
|
|
|
|
super(TestIPxAF, cls).tearDownClass()
|
|
|
|
|
|
|
|
def setUp(self):
|
|
|
|
super(TestIPxAF, self).setUp()
|
|
|
|
|
|
|
|
self.create_pg_interfaces(range(2))
|
|
|
|
|
|
|
|
for i in self.pg_interfaces:
|
|
|
|
i.admin_up()
|
|
|
|
i.config_ip6()
|
|
|
|
i.config_ip4()
|
|
|
|
i.resolve_arp()
|
|
|
|
i.resolve_ndp()
|
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
super(TestIPxAF, self).tearDown()
|
|
|
|
for i in self.pg_interfaces:
|
|
|
|
i.admin_down()
|
|
|
|
i.unconfig_ip4()
|
|
|
|
i.unconfig_ip6()
|
|
|
|
|
|
|
|
def test_x_af(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""Cross AF routing"""
|
2021-05-27 12:18:52 +00:00
|
|
|
|
|
|
|
N_PKTS = 63
|
|
|
|
# a v4 route via a v6 attached next-hop
|
|
|
|
VppIpRoute(
|
2022-04-26 19:02:15 +02:00
|
|
|
self,
|
|
|
|
"1.1.1.1",
|
|
|
|
32,
|
|
|
|
[VppRoutePath(self.pg1.remote_ip6, self.pg1.sw_if_index)],
|
|
|
|
).add_vpp_config()
|
|
|
|
|
|
|
|
p = (
|
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
/ IP(src=self.pg0.remote_ip4, dst="1.1.1.1")
|
|
|
|
/ UDP(sport=1234, dport=1234)
|
|
|
|
/ Raw(b"\xa5" * 100)
|
|
|
|
)
|
2021-05-27 12:18:52 +00:00
|
|
|
rxs = self.send_and_expect(self.pg0, p * N_PKTS, self.pg1)
|
|
|
|
|
|
|
|
for rx in rxs:
|
|
|
|
self.assertEqual(rx[IP].dst, "1.1.1.1")
|
|
|
|
|
|
|
|
# a v6 route via a v4 attached next-hop
|
|
|
|
VppIpRoute(
|
2022-04-26 19:02:15 +02:00
|
|
|
self,
|
|
|
|
"2001::1",
|
|
|
|
128,
|
|
|
|
[VppRoutePath(self.pg1.remote_ip4, self.pg1.sw_if_index)],
|
|
|
|
).add_vpp_config()
|
|
|
|
|
|
|
|
p = (
|
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
/ IPv6(src=self.pg0.remote_ip6, dst="2001::1")
|
|
|
|
/ UDP(sport=1234, dport=1234)
|
|
|
|
/ Raw(b"\xa5" * 100)
|
|
|
|
)
|
2021-05-27 12:18:52 +00:00
|
|
|
rxs = self.send_and_expect(self.pg0, p * N_PKTS, self.pg1)
|
|
|
|
|
|
|
|
for rx in rxs:
|
|
|
|
self.assertEqual(rx[IPv6].dst, "2001::1")
|
|
|
|
|
|
|
|
# a recursive v4 route via a v6 next-hop (from above)
|
|
|
|
VppIpRoute(
|
2022-04-26 19:02:15 +02:00
|
|
|
self, "2.2.2.2", 32, [VppRoutePath("2001::1", 0xFFFFFFFF)]
|
|
|
|
).add_vpp_config()
|
|
|
|
|
|
|
|
p = (
|
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
/ IP(src=self.pg0.remote_ip4, dst="2.2.2.2")
|
|
|
|
/ UDP(sport=1234, dport=1234)
|
|
|
|
/ Raw(b"\xa5" * 100)
|
|
|
|
)
|
2021-05-27 12:18:52 +00:00
|
|
|
rxs = self.send_and_expect(self.pg0, p * N_PKTS, self.pg1)
|
|
|
|
|
|
|
|
# a recursive v4 route via a v6 next-hop
|
|
|
|
VppIpRoute(
|
2022-04-26 19:02:15 +02:00
|
|
|
self, "2.2.2.3", 32, [VppRoutePath(self.pg1.remote_ip6, 0xFFFFFFFF)]
|
|
|
|
).add_vpp_config()
|
|
|
|
|
|
|
|
p = (
|
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
/ IP(src=self.pg0.remote_ip4, dst="2.2.2.3")
|
|
|
|
/ UDP(sport=1234, dport=1234)
|
|
|
|
/ Raw(b"\xa5" * 100)
|
|
|
|
)
|
2021-05-27 12:18:52 +00:00
|
|
|
rxs = self.send_and_expect(self.pg0, p * N_PKTS, self.pg1)
|
|
|
|
|
|
|
|
# a recursive v6 route via a v4 next-hop
|
|
|
|
VppIpRoute(
|
2022-04-26 19:02:15 +02:00
|
|
|
self, "3001::1", 128, [VppRoutePath(self.pg1.remote_ip4, 0xFFFFFFFF)]
|
|
|
|
).add_vpp_config()
|
|
|
|
|
|
|
|
p = (
|
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
/ IPv6(src=self.pg0.remote_ip6, dst="3001::1")
|
|
|
|
/ UDP(sport=1234, dport=1234)
|
|
|
|
/ Raw(b"\xa5" * 100)
|
|
|
|
)
|
2021-05-27 12:18:52 +00:00
|
|
|
rxs = self.send_and_expect(self.pg0, p * N_PKTS, self.pg1)
|
|
|
|
|
|
|
|
for rx in rxs:
|
|
|
|
self.assertEqual(rx[IPv6].dst, "3001::1")
|
|
|
|
|
|
|
|
VppIpRoute(
|
2022-04-26 19:02:15 +02:00
|
|
|
self, "3001::2", 128, [VppRoutePath("1.1.1.1", 0xFFFFFFFF)]
|
|
|
|
).add_vpp_config()
|
|
|
|
|
|
|
|
p = (
|
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
/ IPv6(src=self.pg0.remote_ip6, dst="3001::2")
|
|
|
|
/ UDP(sport=1234, dport=1234)
|
|
|
|
/ Raw(b"\xa5" * 100)
|
|
|
|
)
|
2021-05-27 12:18:52 +00:00
|
|
|
rxs = self.send_and_expect(self.pg0, p * N_PKTS, self.pg1)
|
|
|
|
|
|
|
|
for rx in rxs:
|
|
|
|
self.assertEqual(rx[IPv6].dst, "3001::2")
|
|
|
|
|
|
|
|
|
2021-10-04 12:03:20 +02:00
|
|
|
class TestIPv6Punt(VppTestCase):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IPv6 Punt Police/Redirect"""
|
2021-10-04 12:03:20 +02:00
|
|
|
|
|
|
|
def setUp(self):
|
|
|
|
super(TestIPv6Punt, self).setUp()
|
|
|
|
self.create_pg_interfaces(range(4))
|
|
|
|
|
|
|
|
for i in self.pg_interfaces:
|
|
|
|
i.admin_up()
|
|
|
|
i.config_ip6()
|
|
|
|
i.resolve_ndp()
|
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
super(TestIPv6Punt, self).tearDown()
|
|
|
|
for i in self.pg_interfaces:
|
|
|
|
i.unconfig_ip6()
|
|
|
|
i.admin_down()
|
|
|
|
|
|
|
|
def test_ip6_punt(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IPv6 punt police and redirect"""
|
2021-10-04 12:03:20 +02:00
|
|
|
|
|
|
|
# use UDP packet that have a port we need to explicitly
|
|
|
|
# register to get punted.
|
|
|
|
pt_l4 = VppEnum.vl_api_punt_type_t.PUNT_API_TYPE_L4
|
|
|
|
af_ip6 = VppEnum.vl_api_address_family_t.ADDRESS_IP6
|
|
|
|
udp_proto = VppEnum.vl_api_ip_proto_t.IP_API_PROTO_UDP
|
|
|
|
punt_udp = {
|
2022-04-26 19:02:15 +02:00
|
|
|
"type": pt_l4,
|
|
|
|
"punt": {
|
|
|
|
"l4": {
|
|
|
|
"af": af_ip6,
|
|
|
|
"protocol": udp_proto,
|
|
|
|
"port": 7654,
|
2021-10-04 12:03:20 +02:00
|
|
|
}
|
2022-04-26 19:02:15 +02:00
|
|
|
},
|
2021-10-04 12:03:20 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
self.vapi.set_punt(is_add=1, punt=punt_udp)
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
pkts = (
|
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
/ IPv6(src=self.pg0.remote_ip6, dst=self.pg0.local_ip6)
|
|
|
|
/ UDP(sport=1234, dport=7654)
|
|
|
|
/ Raw(b"\xa5" * 100)
|
|
|
|
) * 1025
|
2021-10-04 12:03:20 +02:00
|
|
|
|
|
|
|
#
|
|
|
|
# Configure a punt redirect via pg1.
|
|
|
|
#
|
|
|
|
nh_addr = self.pg1.remote_ip6
|
2022-04-26 19:02:15 +02:00
|
|
|
ip_punt_redirect = VppIpPuntRedirect(
|
|
|
|
self, self.pg0.sw_if_index, self.pg1.sw_if_index, nh_addr
|
|
|
|
)
|
2021-10-04 12:03:20 +02:00
|
|
|
ip_punt_redirect.add_vpp_config()
|
|
|
|
|
|
|
|
self.send_and_expect(self.pg0, pkts, self.pg1)
|
|
|
|
|
|
|
|
#
|
|
|
|
# add a policer
|
|
|
|
#
|
|
|
|
policer = VppPolicer(self, "ip6-punt", 400, 0, 10, 0, rate_type=1)
|
|
|
|
policer.add_vpp_config()
|
2022-04-26 19:02:15 +02:00
|
|
|
ip_punt_policer = VppIpPuntPolicer(self, policer.policer_index, is_ip6=True)
|
2021-10-04 12:03:20 +02:00
|
|
|
ip_punt_policer.add_vpp_config()
|
|
|
|
|
|
|
|
self.vapi.cli("clear trace")
|
|
|
|
self.pg0.add_stream(pkts)
|
|
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
|
|
self.pg_start()
|
|
|
|
|
|
|
|
#
|
|
|
|
# the number of packet received should be greater than 0,
|
|
|
|
# but not equal to the number sent, since some were policed
|
|
|
|
#
|
|
|
|
rx = self.pg1._get_capture(1)
|
|
|
|
|
|
|
|
stats = policer.get_stats()
|
|
|
|
|
|
|
|
# Single rate policer - expect conform, violate but no exceed
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertGreater(stats["conform_packets"], 0)
|
|
|
|
self.assertEqual(stats["exceed_packets"], 0)
|
|
|
|
self.assertGreater(stats["violate_packets"], 0)
|
2021-10-04 12:03:20 +02:00
|
|
|
|
|
|
|
self.assertGreater(len(rx), 0)
|
|
|
|
self.assertLess(len(rx), len(pkts))
|
|
|
|
|
|
|
|
#
|
|
|
|
# remove the policer. back to full rx
|
|
|
|
#
|
|
|
|
ip_punt_policer.remove_vpp_config()
|
|
|
|
policer.remove_vpp_config()
|
|
|
|
self.send_and_expect(self.pg0, pkts, self.pg1)
|
|
|
|
|
|
|
|
#
|
|
|
|
# remove the redirect. expect full drop.
|
|
|
|
#
|
|
|
|
ip_punt_redirect.remove_vpp_config()
|
2022-04-26 19:02:15 +02:00
|
|
|
self.send_and_assert_no_replies(self.pg0, pkts, "IP no punt config")
|
2021-10-04 12:03:20 +02:00
|
|
|
|
|
|
|
#
|
|
|
|
# Add a redirect that is not input port selective
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
ip_punt_redirect = VppIpPuntRedirect(
|
|
|
|
self, 0xFFFFFFFF, self.pg1.sw_if_index, nh_addr
|
|
|
|
)
|
2021-10-04 12:03:20 +02:00
|
|
|
ip_punt_redirect.add_vpp_config()
|
|
|
|
self.send_and_expect(self.pg0, pkts, self.pg1)
|
|
|
|
ip_punt_redirect.remove_vpp_config()
|
|
|
|
|
|
|
|
def test_ip6_punt_dump(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""IPv6 punt redirect dump"""
|
2021-10-04 12:03:20 +02:00
|
|
|
|
|
|
|
#
|
|
|
|
# Configure a punt redirects
|
|
|
|
#
|
|
|
|
nh_address = self.pg3.remote_ip6
|
2022-04-26 19:02:15 +02:00
|
|
|
ipr_03 = VppIpPuntRedirect(
|
|
|
|
self, self.pg0.sw_if_index, self.pg3.sw_if_index, nh_address
|
|
|
|
)
|
|
|
|
ipr_13 = VppIpPuntRedirect(
|
|
|
|
self, self.pg1.sw_if_index, self.pg3.sw_if_index, nh_address
|
|
|
|
)
|
|
|
|
ipr_23 = VppIpPuntRedirect(
|
|
|
|
self, self.pg2.sw_if_index, self.pg3.sw_if_index, "::"
|
|
|
|
)
|
2021-10-04 12:03:20 +02:00
|
|
|
ipr_03.add_vpp_config()
|
|
|
|
ipr_13.add_vpp_config()
|
|
|
|
ipr_23.add_vpp_config()
|
|
|
|
|
|
|
|
#
|
|
|
|
# Dump pg0 punt redirects
|
|
|
|
#
|
|
|
|
self.assertTrue(ipr_03.query_vpp_config())
|
|
|
|
self.assertTrue(ipr_13.query_vpp_config())
|
|
|
|
self.assertTrue(ipr_23.query_vpp_config())
|
|
|
|
|
|
|
|
#
|
|
|
|
# Dump punt redirects for all interfaces
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
punts = self.vapi.ip_punt_redirect_dump(sw_if_index=0xFFFFFFFF, is_ipv6=True)
|
2021-10-04 12:03:20 +02:00
|
|
|
self.assertEqual(len(punts), 3)
|
|
|
|
for p in punts:
|
|
|
|
self.assertEqual(p.punt.tx_sw_if_index, self.pg3.sw_if_index)
|
|
|
|
self.assertNotEqual(punts[1].punt.nh, self.pg3.remote_ip6)
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertEqual(str(punts[2].punt.nh), "::")
|
2021-10-04 12:03:20 +02:00
|
|
|
|
|
|
|
|
2024-02-20 11:58:01 +05:00
|
|
|
class TestIP6InterfaceRx(VppTestCase):
|
|
|
|
"""IPv6 Interface Receive"""
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def setUpClass(cls):
|
|
|
|
super(TestIP6InterfaceRx, cls).setUpClass()
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def tearDownClass(cls):
|
|
|
|
super(TestIP6InterfaceRx, cls).tearDownClass()
|
|
|
|
|
|
|
|
def setUp(self):
|
|
|
|
super(TestIP6InterfaceRx, self).setUp()
|
|
|
|
|
|
|
|
self.create_pg_interfaces(range(3))
|
|
|
|
|
|
|
|
table_id = 0
|
|
|
|
|
|
|
|
for i in self.pg_interfaces:
|
|
|
|
i.admin_up()
|
|
|
|
|
|
|
|
if table_id != 0:
|
|
|
|
table = VppIpTable(self, table_id, is_ip6=1)
|
|
|
|
table.add_vpp_config()
|
|
|
|
|
|
|
|
i.set_table_ip6(table_id)
|
|
|
|
i.config_ip6()
|
|
|
|
i.resolve_ndp()
|
|
|
|
table_id += 1
|
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
for i in self.pg_interfaces:
|
|
|
|
i.unconfig_ip6()
|
|
|
|
i.admin_down()
|
|
|
|
i.set_table_ip6(0)
|
|
|
|
|
|
|
|
super(TestIP6InterfaceRx, self).tearDown()
|
|
|
|
|
|
|
|
def test_interface_rx(self):
|
|
|
|
"""IPv6 Interface Receive"""
|
|
|
|
|
|
|
|
#
|
|
|
|
# add a route in the default table to receive ...
|
|
|
|
#
|
|
|
|
route_to_dst = VppIpRoute(
|
|
|
|
self,
|
|
|
|
"1::",
|
|
|
|
122,
|
|
|
|
[
|
|
|
|
VppRoutePath(
|
|
|
|
"::",
|
|
|
|
self.pg1.sw_if_index,
|
|
|
|
type=FibPathType.FIB_PATH_TYPE_INTERFACE_RX,
|
|
|
|
)
|
|
|
|
],
|
|
|
|
)
|
|
|
|
route_to_dst.add_vpp_config()
|
|
|
|
|
|
|
|
#
|
|
|
|
# packets to these destination are dropped, since they'll
|
|
|
|
# hit the respective default routes in table 1
|
|
|
|
#
|
|
|
|
p_dst = (
|
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
/ IPv6(src="5::5", dst="1::1")
|
|
|
|
/ inet6.TCP(sport=1234, dport=1234)
|
|
|
|
/ Raw(b"\xa5" * 100)
|
|
|
|
)
|
|
|
|
pkts_dst = p_dst * 10
|
|
|
|
|
|
|
|
self.send_and_assert_no_replies(self.pg0, pkts_dst, "IP in table 1")
|
|
|
|
|
|
|
|
#
|
|
|
|
# add a route in the dst table to forward via pg1
|
|
|
|
#
|
|
|
|
route_in_dst = VppIpRoute(
|
|
|
|
self,
|
|
|
|
"1::1",
|
|
|
|
128,
|
|
|
|
[VppRoutePath(self.pg1.remote_ip6, self.pg1.sw_if_index)],
|
|
|
|
table_id=1,
|
|
|
|
)
|
|
|
|
route_in_dst.add_vpp_config()
|
|
|
|
|
|
|
|
self.send_and_expect(self.pg0, pkts_dst, self.pg1)
|
|
|
|
|
|
|
|
#
|
|
|
|
# add a route in the default table to receive ...
|
|
|
|
#
|
|
|
|
route_to_dst = VppIpRoute(
|
|
|
|
self,
|
|
|
|
"1::",
|
|
|
|
122,
|
|
|
|
[
|
|
|
|
VppRoutePath(
|
|
|
|
"::",
|
|
|
|
self.pg2.sw_if_index,
|
|
|
|
type=FibPathType.FIB_PATH_TYPE_INTERFACE_RX,
|
|
|
|
)
|
|
|
|
],
|
|
|
|
table_id=1,
|
|
|
|
)
|
|
|
|
route_to_dst.add_vpp_config()
|
|
|
|
|
|
|
|
#
|
|
|
|
# packets to these destination are dropped, since they'll
|
|
|
|
# hit the respective default routes in table 2
|
|
|
|
#
|
|
|
|
p_dst = (
|
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
/ IPv6(src="6::6", dst="1::2")
|
|
|
|
/ inet6.TCP(sport=1234, dport=1234)
|
|
|
|
/ Raw(b"\xa5" * 100)
|
|
|
|
)
|
|
|
|
pkts_dst = p_dst * 10
|
|
|
|
|
|
|
|
self.send_and_assert_no_replies(self.pg0, pkts_dst, "IP in table 2")
|
|
|
|
|
|
|
|
#
|
|
|
|
# add a route in the table 2 to forward via pg2
|
|
|
|
#
|
|
|
|
route_in_dst = VppIpRoute(
|
|
|
|
self,
|
|
|
|
"1::2",
|
|
|
|
128,
|
|
|
|
[VppRoutePath(self.pg2.remote_ip6, self.pg2.sw_if_index)],
|
|
|
|
table_id=2,
|
|
|
|
)
|
|
|
|
route_in_dst.add_vpp_config()
|
|
|
|
|
|
|
|
self.send_and_expect(self.pg0, pkts_dst, self.pg2)
|
|
|
|
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
if __name__ == "__main__":
|
2016-10-11 11:47:09 +02:00
|
|
|
unittest.main(testRunner=VppTestRunner)
|