2016-09-29 14:43:44 +02:00
|
|
|
#!/usr/bin/env python
|
|
|
|
|
|
|
|
import unittest
|
|
|
|
import time
|
|
|
|
from random import randint
|
|
|
|
from bfd import *
|
|
|
|
from framework import *
|
|
|
|
from util import ppp
|
|
|
|
|
2016-12-19 09:05:21 +01:00
|
|
|
us_in_sec = 1000000
|
|
|
|
|
2016-09-29 14:43:44 +02:00
|
|
|
|
2016-12-08 10:16:41 +01:00
|
|
|
class BFDAPITestCase(VppTestCase):
|
|
|
|
"""Bidirectional Forwarding Detection (BFD) - API"""
|
2016-09-29 14:43:44 +02:00
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def setUpClass(cls):
|
2016-12-08 10:16:41 +01:00
|
|
|
super(BFDAPITestCase, cls).setUpClass()
|
2016-09-29 14:43:44 +02:00
|
|
|
|
|
|
|
try:
|
2017-01-11 08:16:53 +01:00
|
|
|
cls.create_pg_interfaces(range(2))
|
|
|
|
for i in cls.pg_interfaces:
|
|
|
|
i.config_ip4()
|
|
|
|
i.resolve_arp()
|
2016-09-29 14:43:44 +02:00
|
|
|
|
|
|
|
except Exception:
|
2016-12-08 10:16:41 +01:00
|
|
|
super(BFDAPITestCase, cls).tearDownClass()
|
2016-09-29 14:43:44 +02:00
|
|
|
raise
|
|
|
|
|
|
|
|
def test_add_bfd(self):
|
|
|
|
""" create a BFD session """
|
|
|
|
session = VppBFDUDPSession(self, self.pg0, self.pg0.remote_ip4)
|
|
|
|
session.add_vpp_config()
|
|
|
|
self.logger.debug("Session state is %s" % str(session.state))
|
|
|
|
session.remove_vpp_config()
|
|
|
|
session = VppBFDUDPSession(self, self.pg0, self.pg0.remote_ip4)
|
|
|
|
session.add_vpp_config()
|
|
|
|
self.logger.debug("Session state is %s" % str(session.state))
|
|
|
|
session.remove_vpp_config()
|
|
|
|
|
|
|
|
def test_double_add(self):
|
|
|
|
""" create the same BFD session twice (negative case) """
|
|
|
|
session = VppBFDUDPSession(self, self.pg0, self.pg0.remote_ip4)
|
|
|
|
session.add_vpp_config()
|
2017-01-25 08:00:40 +01:00
|
|
|
|
|
|
|
with self.vapi.expect_negative_api_retval():
|
2016-09-29 14:43:44 +02:00
|
|
|
session.add_vpp_config()
|
2017-01-25 08:00:40 +01:00
|
|
|
|
2016-09-29 14:43:44 +02:00
|
|
|
session.remove_vpp_config()
|
|
|
|
|
2017-01-11 08:16:53 +01:00
|
|
|
def test_add_two(self):
|
|
|
|
""" create two BFD sessions """
|
|
|
|
session1 = VppBFDUDPSession(self, self.pg0, self.pg0.remote_ip4)
|
|
|
|
session1.add_vpp_config()
|
|
|
|
session2 = VppBFDUDPSession(self, self.pg1, self.pg1.remote_ip4)
|
|
|
|
session2.add_vpp_config()
|
|
|
|
self.assertNotEqual(session1.bs_index, session2.bs_index,
|
|
|
|
"Different BFD sessions share bs_index (%s)" %
|
|
|
|
session1.bs_index)
|
|
|
|
|
2016-09-29 14:43:44 +02:00
|
|
|
|
|
|
|
class BFDTestSession(object):
|
2016-12-19 09:05:21 +01:00
|
|
|
""" BFD session as seen from test framework side """
|
2016-09-29 14:43:44 +02:00
|
|
|
|
2017-01-02 08:22:23 +01:00
|
|
|
def __init__(self, test, interface, af, detect_mult=3):
|
2016-09-29 14:43:44 +02:00
|
|
|
self.test = test
|
2017-01-02 08:22:23 +01:00
|
|
|
self.af = af
|
2016-09-29 14:43:44 +02:00
|
|
|
self.interface = interface
|
2017-01-02 08:22:23 +01:00
|
|
|
self.udp_sport = 50000
|
2016-09-29 14:43:44 +02:00
|
|
|
self.bfd_values = {
|
|
|
|
'my_discriminator': 0,
|
2016-12-08 10:16:41 +01:00
|
|
|
'desired_min_tx_interval': 100000,
|
2016-09-29 14:43:44 +02:00
|
|
|
'detect_mult': detect_mult,
|
|
|
|
'diag': BFDDiagCode.no_diagnostic,
|
|
|
|
}
|
|
|
|
|
|
|
|
def update(self, **kwargs):
|
|
|
|
self.bfd_values.update(kwargs)
|
|
|
|
|
|
|
|
def create_packet(self):
|
2017-01-02 08:22:23 +01:00
|
|
|
if self.af == AF_INET6:
|
|
|
|
packet = (Ether(src=self.interface.remote_mac,
|
|
|
|
dst=self.interface.local_mac) /
|
|
|
|
IPv6(src=self.interface.remote_ip6,
|
|
|
|
dst=self.interface.local_ip6,
|
|
|
|
hlim=255) /
|
|
|
|
UDP(sport=self.udp_sport, dport=BFD.udp_dport) /
|
|
|
|
BFD())
|
|
|
|
else:
|
|
|
|
packet = (Ether(src=self.interface.remote_mac,
|
|
|
|
dst=self.interface.local_mac) /
|
|
|
|
IP(src=self.interface.remote_ip4,
|
|
|
|
dst=self.interface.local_ip4,
|
|
|
|
ttl=255) /
|
|
|
|
UDP(sport=self.udp_sport, dport=BFD.udp_dport) /
|
|
|
|
BFD())
|
2016-12-19 09:05:21 +01:00
|
|
|
self.test.logger.debug("BFD: Creating packet")
|
2016-09-29 14:43:44 +02:00
|
|
|
for name, value in self.bfd_values.iteritems():
|
2016-12-19 09:05:21 +01:00
|
|
|
self.test.logger.debug("BFD: setting packet.%s=%s", name, value)
|
2016-09-29 14:43:44 +02:00
|
|
|
packet[BFD].setfieldval(name, value)
|
|
|
|
return packet
|
|
|
|
|
|
|
|
def send_packet(self):
|
|
|
|
p = self.create_packet()
|
|
|
|
self.test.logger.debug(ppp("Sending packet:", p))
|
|
|
|
self.test.pg0.add_stream([p])
|
2016-12-12 08:36:58 +01:00
|
|
|
self.test.pg_start()
|
2016-09-29 14:43:44 +02:00
|
|
|
|
|
|
|
def verify_packet(self, packet):
|
|
|
|
""" Verify correctness of BFD layer. """
|
|
|
|
bfd = packet[BFD]
|
|
|
|
self.test.assert_equal(bfd.version, 1, "BFD version")
|
|
|
|
self.test.assert_equal(bfd.your_discriminator,
|
|
|
|
self.bfd_values['my_discriminator'],
|
|
|
|
"BFD - your discriminator")
|
|
|
|
|
|
|
|
|
2017-01-02 08:22:23 +01:00
|
|
|
class BFDCommonCode:
|
|
|
|
"""Common code used by both IPv4 and IPv6 Test Cases"""
|
2016-09-29 14:43:44 +02:00
|
|
|
|
|
|
|
def tearDown(self):
|
2016-12-08 10:16:41 +01:00
|
|
|
self.vapi.collect_events() # clear the event queue
|
2016-09-29 14:43:44 +02:00
|
|
|
if not self.vpp_dead:
|
2016-12-19 09:05:21 +01:00
|
|
|
self.vapi.want_bfd_events(enable_disable=0)
|
2016-09-29 14:43:44 +02:00
|
|
|
self.vpp_session.remove_vpp_config()
|
2017-01-02 08:22:23 +01:00
|
|
|
|
|
|
|
def bfd_session_up(self):
|
|
|
|
self.pg_enable_capture([self.pg0])
|
|
|
|
self.logger.info("BFD: Waiting for slow hello")
|
|
|
|
p, timeout = self.wait_for_bfd_packet(2)
|
|
|
|
self.logger.info("BFD: Sending Init")
|
|
|
|
self.test_session.update(my_discriminator=randint(0, 40000000),
|
|
|
|
your_discriminator=p[BFD].my_discriminator,
|
|
|
|
state=BFDState.init,
|
|
|
|
required_min_rx_interval=100000)
|
|
|
|
self.test_session.send_packet()
|
|
|
|
self.logger.info("BFD: Waiting for event")
|
|
|
|
e = self.vapi.wait_for_event(1, "bfd_udp_session_details")
|
|
|
|
self.verify_event(e, expected_state=BFDState.up)
|
|
|
|
self.logger.info("BFD: Session is Up")
|
|
|
|
self.test_session.update(state=BFDState.up)
|
|
|
|
|
|
|
|
def verify_ip(self, packet):
|
|
|
|
""" Verify correctness of IP layer. """
|
|
|
|
if self.vpp_session.af == AF_INET6:
|
|
|
|
ip = packet[IPv6]
|
|
|
|
local_ip = self.pg0.local_ip6
|
|
|
|
remote_ip = self.pg0.remote_ip6
|
|
|
|
self.assert_equal(ip.hlim, 255, "IPv6 hop limit")
|
|
|
|
else:
|
|
|
|
ip = packet[IP]
|
|
|
|
local_ip = self.pg0.local_ip4
|
|
|
|
remote_ip = self.pg0.remote_ip4
|
|
|
|
self.assert_equal(ip.ttl, 255, "IPv4 TTL")
|
|
|
|
self.assert_equal(ip.src, local_ip, "IP source address")
|
|
|
|
self.assert_equal(ip.dst, remote_ip, "IP destination address")
|
|
|
|
|
|
|
|
def verify_udp(self, packet):
|
|
|
|
""" Verify correctness of UDP layer. """
|
|
|
|
udp = packet[UDP]
|
|
|
|
self.assert_equal(udp.dport, BFD.udp_dport, "UDP destination port")
|
|
|
|
self.assert_in_range(udp.sport, BFD.udp_sport_min, BFD.udp_sport_max,
|
|
|
|
"UDP source port")
|
2016-09-29 14:43:44 +02:00
|
|
|
|
|
|
|
def verify_event(self, event, expected_state):
|
|
|
|
""" Verify correctness of event values. """
|
|
|
|
e = event
|
2016-12-08 10:16:41 +01:00
|
|
|
self.logger.debug("BFD: Event: %s" % repr(e))
|
2016-09-29 14:43:44 +02:00
|
|
|
self.assert_equal(e.bs_index, self.vpp_session.bs_index,
|
|
|
|
"BFD session index")
|
2017-01-11 08:16:53 +01:00
|
|
|
self.assert_equal(
|
|
|
|
e.sw_if_index,
|
|
|
|
self.vpp_session.interface.sw_if_index,
|
|
|
|
"BFD interface index")
|
2016-09-29 14:43:44 +02:00
|
|
|
is_ipv6 = 0
|
|
|
|
if self.vpp_session.af == AF_INET6:
|
|
|
|
is_ipv6 = 1
|
|
|
|
self.assert_equal(e.is_ipv6, is_ipv6, "is_ipv6")
|
|
|
|
if self.vpp_session.af == AF_INET:
|
|
|
|
self.assert_equal(e.local_addr[:4], self.vpp_session.local_addr_n,
|
|
|
|
"Local IPv4 address")
|
|
|
|
self.assert_equal(e.peer_addr[:4], self.vpp_session.peer_addr_n,
|
|
|
|
"Peer IPv4 address")
|
|
|
|
else:
|
|
|
|
self.assert_equal(e.local_addr, self.vpp_session.local_addr_n,
|
|
|
|
"Local IPv6 address")
|
|
|
|
self.assert_equal(e.peer_addr, self.vpp_session.peer_addr_n,
|
|
|
|
"Peer IPv6 address")
|
|
|
|
self.assert_equal(e.state, expected_state, BFDState)
|
|
|
|
|
|
|
|
def wait_for_bfd_packet(self, timeout=1):
|
2016-12-19 09:05:21 +01:00
|
|
|
""" wait for BFD packet
|
|
|
|
|
|
|
|
:param timeout: how long to wait max
|
|
|
|
|
|
|
|
:returns: tuple (packet, time spent waiting for packet)
|
|
|
|
"""
|
2016-12-08 10:16:41 +01:00
|
|
|
self.logger.info("BFD: Waiting for BFD packet")
|
2016-12-19 09:05:21 +01:00
|
|
|
before = time.time()
|
2016-09-29 14:43:44 +02:00
|
|
|
p = self.pg0.wait_for_packet(timeout=timeout)
|
2016-12-19 09:05:21 +01:00
|
|
|
after = time.time()
|
2017-01-02 08:22:23 +01:00
|
|
|
self.logger.debug(ppp("Got packet:", p))
|
2016-09-29 14:43:44 +02:00
|
|
|
bfd = p[BFD]
|
|
|
|
if bfd is None:
|
|
|
|
raise Exception(ppp("Unexpected or invalid BFD packet:", p))
|
|
|
|
if bfd.payload:
|
|
|
|
raise Exception(ppp("Unexpected payload in BFD packet:", bfd))
|
2017-01-02 08:22:23 +01:00
|
|
|
self.verify_ip(p)
|
|
|
|
self.verify_udp(p)
|
2016-09-29 14:43:44 +02:00
|
|
|
self.test_session.verify_packet(p)
|
2016-12-19 09:05:21 +01:00
|
|
|
return p, after - before
|
|
|
|
|
|
|
|
def test_session_up(self):
|
|
|
|
""" bring BFD session up """
|
|
|
|
self.bfd_session_up()
|
2016-09-29 14:43:44 +02:00
|
|
|
|
2017-01-02 08:22:23 +01:00
|
|
|
def test_hold_up(self):
|
|
|
|
""" hold BFD session up """
|
|
|
|
self.bfd_session_up()
|
|
|
|
for i in range(5):
|
|
|
|
self.wait_for_bfd_packet()
|
|
|
|
self.test_session.send_packet()
|
|
|
|
|
|
|
|
|
|
|
|
class BFD4TestCase(VppTestCase, BFDCommonCode):
|
|
|
|
"""Bidirectional Forwarding Detection (BFD)"""
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def setUpClass(cls):
|
|
|
|
super(BFD4TestCase, cls).setUpClass()
|
|
|
|
try:
|
|
|
|
cls.create_pg_interfaces([0])
|
|
|
|
cls.pg0.config_ip4()
|
|
|
|
cls.pg0.generate_remote_hosts()
|
|
|
|
cls.pg0.configure_ipv4_neighbors()
|
|
|
|
cls.pg0.admin_up()
|
|
|
|
cls.pg0.resolve_arp()
|
|
|
|
|
|
|
|
except Exception:
|
|
|
|
super(BFD4TestCase, cls).tearDownClass()
|
|
|
|
raise
|
|
|
|
|
|
|
|
def setUp(self):
|
|
|
|
super(BFD4TestCase, self).setUp()
|
|
|
|
self.vapi.want_bfd_events()
|
|
|
|
try:
|
|
|
|
self.vpp_session = VppBFDUDPSession(self, self.pg0,
|
|
|
|
self.pg0.remote_ip4)
|
|
|
|
self.vpp_session.add_vpp_config()
|
|
|
|
self.vpp_session.admin_up()
|
|
|
|
self.test_session = BFDTestSession(self, self.pg0, AF_INET)
|
|
|
|
except:
|
|
|
|
self.vapi.want_bfd_events(enable_disable=0)
|
|
|
|
raise
|
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
BFDCommonCode.tearDown(self)
|
|
|
|
super(BFD4TestCase, self).tearDown()
|
|
|
|
|
2016-09-29 14:43:44 +02:00
|
|
|
def test_slow_timer(self):
|
2016-12-08 10:16:41 +01:00
|
|
|
""" verify slow periodic control frames while session down """
|
2016-09-29 14:43:44 +02:00
|
|
|
self.pg_enable_capture([self.pg0])
|
2016-12-08 10:16:41 +01:00
|
|
|
expected_packets = 3
|
|
|
|
self.logger.info("BFD: Waiting for %d BFD packets" % expected_packets)
|
2016-12-21 08:50:14 +01:00
|
|
|
self.wait_for_bfd_packet(2)
|
2016-09-29 14:43:44 +02:00
|
|
|
for i in range(expected_packets):
|
|
|
|
before = time.time()
|
2016-12-21 08:50:14 +01:00
|
|
|
self.wait_for_bfd_packet(2)
|
2016-09-29 14:43:44 +02:00
|
|
|
after = time.time()
|
2016-12-08 10:16:41 +01:00
|
|
|
# spec says the range should be <0.75, 1>, allow extra 0.05 margin
|
|
|
|
# to work around timing issues
|
2016-09-29 14:43:44 +02:00
|
|
|
self.assert_in_range(
|
2016-12-08 10:16:41 +01:00
|
|
|
after - before, 0.70, 1.05, "time between slow packets")
|
2016-09-29 14:43:44 +02:00
|
|
|
before = after
|
|
|
|
|
|
|
|
def test_zero_remote_min_rx(self):
|
2016-12-08 10:16:41 +01:00
|
|
|
""" no packets when zero BFD RemoteMinRxInterval """
|
2016-09-29 14:43:44 +02:00
|
|
|
self.pg_enable_capture([self.pg0])
|
2016-12-19 09:05:21 +01:00
|
|
|
p, timeout = self.wait_for_bfd_packet(2)
|
2016-09-29 14:43:44 +02:00
|
|
|
self.test_session.update(my_discriminator=randint(0, 40000000),
|
|
|
|
your_discriminator=p[BFD].my_discriminator,
|
|
|
|
state=BFDState.init,
|
|
|
|
required_min_rx_interval=0)
|
|
|
|
self.test_session.send_packet()
|
|
|
|
e = self.vapi.wait_for_event(1, "bfd_udp_session_details")
|
|
|
|
self.verify_event(e, expected_state=BFDState.up)
|
|
|
|
|
|
|
|
try:
|
|
|
|
p = self.pg0.wait_for_packet(timeout=1)
|
|
|
|
except:
|
|
|
|
return
|
|
|
|
raise Exception(ppp("Received unexpected BFD packet:", p))
|
|
|
|
|
|
|
|
def test_conn_down(self):
|
2016-12-08 10:16:41 +01:00
|
|
|
""" verify session goes down after inactivity """
|
|
|
|
self.bfd_session_up()
|
2016-09-29 14:43:44 +02:00
|
|
|
self.wait_for_bfd_packet()
|
2016-12-08 10:16:41 +01:00
|
|
|
self.assert_equal(len(self.vapi.collect_events()), 0,
|
|
|
|
"number of bfd events")
|
2016-09-29 14:43:44 +02:00
|
|
|
self.wait_for_bfd_packet()
|
2016-12-08 10:16:41 +01:00
|
|
|
self.assert_equal(len(self.vapi.collect_events()), 0,
|
|
|
|
"number of bfd events")
|
2016-09-29 14:43:44 +02:00
|
|
|
e = self.vapi.wait_for_event(1, "bfd_udp_session_details")
|
|
|
|
self.verify_event(e, expected_state=BFDState.down)
|
|
|
|
|
|
|
|
def test_large_required_min_rx(self):
|
2016-12-08 05:19:14 +01:00
|
|
|
""" large remote RequiredMinRxInterval """
|
2016-12-08 10:16:41 +01:00
|
|
|
self.bfd_session_up()
|
2016-12-08 05:19:14 +01:00
|
|
|
interval = 3000000
|
2016-09-29 14:43:44 +02:00
|
|
|
self.test_session.update(required_min_rx_interval=interval)
|
|
|
|
self.test_session.send_packet()
|
|
|
|
now = time.time()
|
2016-12-08 05:19:14 +01:00
|
|
|
count = 0
|
2016-12-19 09:05:21 +01:00
|
|
|
while time.time() < now + interval / us_in_sec:
|
2016-09-29 14:43:44 +02:00
|
|
|
try:
|
|
|
|
p = self.wait_for_bfd_packet()
|
|
|
|
if count > 1:
|
|
|
|
self.logger.error(ppp("Received unexpected packet:", p))
|
|
|
|
count += 1
|
|
|
|
except:
|
|
|
|
pass
|
2016-12-13 08:14:07 +01:00
|
|
|
self.assert_in_range(count, 0, 1, "number of packets received")
|
2016-09-29 14:43:44 +02:00
|
|
|
|
2016-12-19 09:05:21 +01:00
|
|
|
def test_immediate_remote_min_rx_reduce(self):
|
|
|
|
""" immediately honor remote min rx reduction """
|
|
|
|
self.vpp_session.remove_vpp_config()
|
2017-01-11 08:16:53 +01:00
|
|
|
self.vpp_session = VppBFDUDPSession(
|
|
|
|
self, self.pg0, self.pg0.remote_ip4, desired_min_tx=10000)
|
2016-12-19 09:05:21 +01:00
|
|
|
self.vpp_session.add_vpp_config()
|
|
|
|
self.test_session.update(desired_min_tx_interval=1000000,
|
|
|
|
required_min_rx_interval=1000000)
|
|
|
|
self.bfd_session_up()
|
|
|
|
self.wait_for_bfd_packet()
|
|
|
|
interval = 100000
|
|
|
|
self.test_session.update(required_min_rx_interval=interval)
|
|
|
|
self.test_session.send_packet()
|
|
|
|
p, ttp = self.wait_for_bfd_packet()
|
|
|
|
# allow extra 10% to work around timing issues, first packet is special
|
|
|
|
self.assert_in_range(ttp, 0, 1.10 * interval / us_in_sec,
|
|
|
|
"time between BFD packets")
|
|
|
|
p, ttp = self.wait_for_bfd_packet()
|
|
|
|
self.assert_in_range(ttp, .9 * .75 * interval / us_in_sec,
|
|
|
|
1.10 * interval / us_in_sec,
|
|
|
|
"time between BFD packets")
|
|
|
|
p, ttp = self.wait_for_bfd_packet()
|
|
|
|
self.assert_in_range(ttp, .9 * .75 * interval / us_in_sec,
|
|
|
|
1.10 * interval / us_in_sec,
|
|
|
|
"time between BFD packets")
|
2016-09-29 14:43:44 +02:00
|
|
|
|
2017-01-02 08:22:23 +01:00
|
|
|
|
|
|
|
class BFD6TestCase(VppTestCase, BFDCommonCode):
|
|
|
|
"""Bidirectional Forwarding Detection (BFD) (IPv6) """
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def setUpClass(cls):
|
|
|
|
super(BFD6TestCase, cls).setUpClass()
|
|
|
|
try:
|
|
|
|
cls.create_pg_interfaces([0])
|
|
|
|
cls.pg0.config_ip6()
|
|
|
|
cls.pg0.configure_ipv6_neighbors()
|
|
|
|
cls.pg0.admin_up()
|
|
|
|
cls.pg0.resolve_ndp()
|
|
|
|
|
|
|
|
except Exception:
|
|
|
|
super(BFD6TestCase, cls).tearDownClass()
|
|
|
|
raise
|
|
|
|
|
|
|
|
def setUp(self):
|
|
|
|
super(BFD6TestCase, self).setUp()
|
|
|
|
self.vapi.want_bfd_events()
|
|
|
|
try:
|
|
|
|
self.vpp_session = VppBFDUDPSession(self, self.pg0,
|
|
|
|
self.pg0.remote_ip6,
|
|
|
|
af=AF_INET6)
|
|
|
|
self.vpp_session.add_vpp_config()
|
|
|
|
self.vpp_session.admin_up()
|
|
|
|
self.test_session = BFDTestSession(self, self.pg0, AF_INET6)
|
|
|
|
self.logger.debug(self.vapi.cli("show adj nbr"))
|
|
|
|
except:
|
|
|
|
self.vapi.want_bfd_events(enable_disable=0)
|
|
|
|
raise
|
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
BFDCommonCode.tearDown(self)
|
|
|
|
super(BFD6TestCase, self).tearDown()
|
|
|
|
|
2016-09-29 14:43:44 +02:00
|
|
|
if __name__ == '__main__':
|
|
|
|
unittest.main(testRunner=VppTestRunner)
|