2019-12-04 17:19:12 -05:00
|
|
|
#!/usr/bin/env python3
|
|
|
|
|
|
|
|
|
|
import unittest
|
|
|
|
|
|
2021-05-31 16:08:53 +02:00
|
|
|
from framework import VppTestCase, VppTestRunner
|
2019-12-04 17:19:12 -05:00
|
|
|
from vpp_ip_route import VppIpTable, VppIpRoute, VppRoutePath
|
|
|
|
|
|
2019-12-17 18:02:54 -05:00
|
|
|
from scapy.contrib.geneve import GENEVE
|
2019-12-10 12:48:26 +01:00
|
|
|
from scapy.packet import Raw
|
|
|
|
|
from scapy.layers.l2 import Ether
|
|
|
|
|
from scapy.layers.inet import IP, UDP
|
|
|
|
|
from scapy.layers.vxlan import VXLAN
|
|
|
|
|
from scapy.compat import raw
|
2021-02-26 13:47:41 +01:00
|
|
|
from scapy.utils import rdpcap
|
2019-12-10 12:48:26 +01:00
|
|
|
|
2019-12-04 17:19:12 -05:00
|
|
|
|
|
|
|
|
class TestTracefilter(VppTestCase):
|
|
|
|
|
""" Packet Tracer Filter Test """
|
|
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
|
def setUpClass(cls):
|
|
|
|
|
super(TestTracefilter, cls).setUpClass()
|
|
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
|
def tearDownClass(cls):
|
|
|
|
|
super(TestTracefilter, cls).tearDownClass()
|
|
|
|
|
|
|
|
|
|
def setUp(self):
|
|
|
|
|
super(TestTracefilter, self).setUp()
|
2021-02-19 16:39:13 +01:00
|
|
|
self.create_pg_interfaces(range(2))
|
|
|
|
|
self.pg0.generate_remote_hosts(11)
|
2019-12-10 12:48:26 +01:00
|
|
|
for i in self.pg_interfaces:
|
|
|
|
|
i.admin_up()
|
|
|
|
|
i.config_ip4()
|
2021-02-19 16:39:13 +01:00
|
|
|
i.resolve_arp()
|
2019-12-04 17:19:12 -05:00
|
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
|
super(TestTracefilter, self).tearDown()
|
2019-12-10 12:48:26 +01:00
|
|
|
for i in self.pg_interfaces:
|
|
|
|
|
i.unconfig()
|
|
|
|
|
i.admin_down()
|
|
|
|
|
|
|
|
|
|
def cli(self, cmd):
|
|
|
|
|
r = self.vapi.cli_return_response(cmd)
|
|
|
|
|
if r.retval != 0:
|
2021-02-19 16:39:13 +01:00
|
|
|
s = "reply '%s'" % r.reply if hasattr(
|
|
|
|
|
r, "reply") else "retval '%s'" % r.retval
|
|
|
|
|
raise RuntimeError("cli command '%s' FAIL with %s" % (cmd, s))
|
2019-12-10 12:48:26 +01:00
|
|
|
return r
|
|
|
|
|
|
|
|
|
|
# check number of hits for classifier
|
|
|
|
|
def assert_hits(self, n):
|
2021-02-26 13:47:41 +01:00
|
|
|
r = self.cli("show classify table verbose")
|
2019-12-10 12:48:26 +01:00
|
|
|
self.assertTrue(r.reply.find("hits %i" % n) != -1)
|
2019-12-04 17:19:12 -05:00
|
|
|
|
2021-02-26 13:47:41 +01:00
|
|
|
def add_trace_filter(self, mask, match):
|
|
|
|
|
self.cli("classify filter trace mask %s match %s" % (mask, match))
|
|
|
|
|
self.cli("clear trace")
|
|
|
|
|
self.cli("trace add pg-input 1000 filter")
|
2021-02-19 16:39:13 +01:00
|
|
|
|
2021-02-26 13:47:41 +01:00
|
|
|
def del_trace_filters(self):
|
2021-02-19 16:39:13 +01:00
|
|
|
self.cli("classify filter trace del")
|
|
|
|
|
r = self.cli("show classify filter")
|
|
|
|
|
s = "packet tracer: first table none"
|
|
|
|
|
self.assertTrue(r.reply.find(s) != -1)
|
|
|
|
|
|
2021-02-26 13:47:41 +01:00
|
|
|
def del_pcap_filters(self):
|
|
|
|
|
self.cli("classify filter pcap del")
|
|
|
|
|
r = self.cli("show classify filter")
|
|
|
|
|
s = "pcap rx/tx/drop: first table none"
|
|
|
|
|
self.assertTrue(r.reply.find(s) != -1)
|
|
|
|
|
|
2021-02-19 16:39:13 +01:00
|
|
|
def test_basic(self):
|
2019-12-04 17:19:12 -05:00
|
|
|
""" Packet Tracer Filter Test """
|
2021-02-26 13:47:41 +01:00
|
|
|
self.add_trace_filter(
|
2021-02-19 16:39:13 +01:00
|
|
|
"l3 ip4 src",
|
|
|
|
|
"l3 ip4 src %s" %
|
|
|
|
|
self.pg0.remote_hosts[5].ip4)
|
2021-02-26 13:47:41 +01:00
|
|
|
self.add_trace_filter(
|
2021-02-19 16:39:13 +01:00
|
|
|
"l3 ip4 proto l4 src_port",
|
|
|
|
|
"l3 ip4 proto 17 l4 src_port 2345")
|
|
|
|
|
# the packet we are trying to match
|
|
|
|
|
p = list()
|
|
|
|
|
for i in range(100):
|
|
|
|
|
src = self.pg0.remote_hosts[i % len(self.pg0.remote_hosts)].ip4
|
|
|
|
|
p.append((Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) /
|
|
|
|
|
IP(src=src, dst=self.pg1.remote_ip4) /
|
|
|
|
|
UDP(sport=1234, dport=2345) / Raw('\xa5' * 100)))
|
|
|
|
|
for i in range(17):
|
|
|
|
|
p.append((Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) /
|
|
|
|
|
IP(src=self.pg0.remote_hosts[0].ip4,
|
|
|
|
|
dst=self.pg1.remote_ip4) /
|
|
|
|
|
UDP(sport=2345, dport=1234) / Raw('\xa5' * 100)))
|
|
|
|
|
|
|
|
|
|
self.send_and_expect(self.pg0, p, self.pg1, trace=False)
|
|
|
|
|
|
|
|
|
|
# Check for 9 and 17 classifier hits, which is the right answer
|
2019-12-10 12:48:26 +01:00
|
|
|
self.assert_hits(9)
|
2021-02-19 16:39:13 +01:00
|
|
|
self.assert_hits(17)
|
2019-12-10 12:48:26 +01:00
|
|
|
|
2021-02-26 13:47:41 +01:00
|
|
|
self.del_trace_filters()
|
2019-12-10 12:48:26 +01:00
|
|
|
|
|
|
|
|
# install a classify rule, inject traffic and check for hits
|
|
|
|
|
def assert_classify(self, mask, match, packets, n=None):
|
2021-02-26 13:47:41 +01:00
|
|
|
self.add_trace_filter("hex %s" % mask, "hex %s" % match)
|
2021-02-19 16:39:13 +01:00
|
|
|
self.send_and_expect(self.pg0, packets, self.pg1, trace=False)
|
2019-12-10 12:48:26 +01:00
|
|
|
self.assert_hits(n if n is not None else len(packets))
|
2021-02-26 13:47:41 +01:00
|
|
|
self.del_trace_filters()
|
2019-12-10 12:48:26 +01:00
|
|
|
|
|
|
|
|
def test_encap(self):
|
|
|
|
|
""" Packet Tracer Filter Test with encap """
|
|
|
|
|
|
|
|
|
|
# the packet we are trying to match
|
|
|
|
|
p = (Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) /
|
2021-02-19 16:39:13 +01:00
|
|
|
IP(src=self.pg0.remote_ip4, dst=self.pg1.remote_ip4) /
|
2019-12-10 12:48:26 +01:00
|
|
|
UDP() /
|
|
|
|
|
VXLAN() /
|
|
|
|
|
Ether() /
|
|
|
|
|
IP() /
|
|
|
|
|
UDP() /
|
|
|
|
|
GENEVE(vni=1234) /
|
|
|
|
|
Ether() /
|
|
|
|
|
IP(src='192.168.4.167') /
|
|
|
|
|
UDP() /
|
|
|
|
|
Raw('\xa5' * 100))
|
|
|
|
|
|
|
|
|
|
#
|
|
|
|
|
# compute filter mask & value
|
|
|
|
|
# we compute it by XOR'ing a template packet with a modified packet
|
|
|
|
|
# we need to set checksums to 0 to make sure scapy will not recompute
|
|
|
|
|
# them
|
|
|
|
|
#
|
|
|
|
|
tmpl = (Ether() /
|
|
|
|
|
IP(chksum=0) /
|
|
|
|
|
UDP(chksum=0) /
|
|
|
|
|
VXLAN() /
|
|
|
|
|
Ether() /
|
|
|
|
|
IP(chksum=0) /
|
|
|
|
|
UDP(chksum=0) /
|
|
|
|
|
GENEVE(vni=0) /
|
|
|
|
|
Ether() /
|
|
|
|
|
IP(src='0.0.0.0', chksum=0))
|
|
|
|
|
ori = raw(tmpl)
|
|
|
|
|
|
|
|
|
|
# the mask
|
|
|
|
|
tmpl[GENEVE].vni = 0xffffff
|
|
|
|
|
user = tmpl[GENEVE].payload
|
|
|
|
|
user[IP].src = '255.255.255.255'
|
|
|
|
|
new = raw(tmpl)
|
|
|
|
|
mask = "".join(("{:02x}".format(o ^ n) for o, n in zip(ori, new)))
|
|
|
|
|
|
|
|
|
|
# this does not match (wrong vni)
|
|
|
|
|
tmpl[GENEVE].vni = 1
|
|
|
|
|
user = tmpl[GENEVE].payload
|
|
|
|
|
user[IP].src = '192.168.4.167'
|
|
|
|
|
new = raw(tmpl)
|
|
|
|
|
match = "".join(("{:02x}".format(o ^ n) for o, n in zip(ori, new)))
|
|
|
|
|
self.assert_classify(mask, match, [p] * 11, 0)
|
|
|
|
|
|
|
|
|
|
# this must match
|
|
|
|
|
tmpl[GENEVE].vni = 1234
|
|
|
|
|
new = raw(tmpl)
|
|
|
|
|
match = "".join(("{:02x}".format(o ^ n) for o, n in zip(ori, new)))
|
|
|
|
|
self.assert_classify(mask, match, [p] * 17)
|
|
|
|
|
|
2021-02-26 13:47:41 +01:00
|
|
|
def test_pcap(self):
|
|
|
|
|
""" Packet Capture Filter Test """
|
|
|
|
|
self.cli(
|
|
|
|
|
"classify filter pcap mask l3 ip4 src match l3 ip4 src %s" %
|
|
|
|
|
self.pg0.remote_hosts[5].ip4)
|
|
|
|
|
self.cli(
|
|
|
|
|
"classify filter pcap "
|
|
|
|
|
"mask l3 ip4 proto l4 src_port "
|
|
|
|
|
"match l3 ip4 proto 17 l4 src_port 2345")
|
|
|
|
|
self.cli(
|
|
|
|
|
"pcap trace rx tx max 1000 intfc pg0 "
|
2021-03-03 17:37:25 +01:00
|
|
|
"file vpp_test_trace_filter_test_pcap.pcap filter")
|
2021-02-26 13:47:41 +01:00
|
|
|
# the packet we are trying to match
|
|
|
|
|
p = list()
|
|
|
|
|
for i in range(100):
|
|
|
|
|
src = self.pg0.remote_hosts[i % len(self.pg0.remote_hosts)].ip4
|
|
|
|
|
p.append((Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) /
|
|
|
|
|
IP(src=src, dst=self.pg1.remote_ip4) /
|
|
|
|
|
UDP(sport=1234, dport=2345) / Raw('\xa5' * 100)))
|
|
|
|
|
for i in range(17):
|
|
|
|
|
p.append((Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) /
|
|
|
|
|
IP(src=self.pg0.remote_hosts[0].ip4,
|
|
|
|
|
dst=self.pg1.remote_ip4) /
|
|
|
|
|
UDP(sport=2345, dport=1234) / Raw('\xa5' * 100)))
|
|
|
|
|
|
|
|
|
|
self.send_and_expect(self.pg0, p, self.pg1, trace=False)
|
|
|
|
|
|
|
|
|
|
# Check for 9 and 17 classifier hits, which is the right answer
|
|
|
|
|
self.assert_hits(9)
|
|
|
|
|
self.assert_hits(17)
|
|
|
|
|
|
|
|
|
|
self.cli("pcap trace rx tx off")
|
|
|
|
|
self.del_pcap_filters()
|
|
|
|
|
|
|
|
|
|
# check captured pcap
|
2021-03-03 17:37:25 +01:00
|
|
|
pcap = rdpcap("/tmp/vpp_test_trace_filter_test_pcap.pcap")
|
2021-02-26 13:47:41 +01:00
|
|
|
self.assertEqual(len(pcap), 9 + 17)
|
|
|
|
|
p_ = str(p[5])
|
|
|
|
|
for i in range(9):
|
|
|
|
|
self.assertEqual(str(pcap[i]), p_)
|
|
|
|
|
p_ = str(p[100])
|
|
|
|
|
for i in range(9, 9 + 17):
|
|
|
|
|
self.assertEqual(str(pcap[i]), p_)
|
|
|
|
|
|
2021-03-03 17:37:25 +01:00
|
|
|
def test_pcap_drop(self):
|
|
|
|
|
""" Drop Packet Capture Filter Test """
|
|
|
|
|
self.cli(
|
|
|
|
|
"pcap trace drop max 1000 "
|
2021-10-06 12:48:34 +00:00
|
|
|
"error {ip4-udp-lookup}.{no_listener} "
|
2021-03-03 17:37:25 +01:00
|
|
|
"file vpp_test_trace_filter_test_pcap_drop.pcap")
|
|
|
|
|
# the packet we are trying to match
|
|
|
|
|
p = list()
|
|
|
|
|
for i in range(17):
|
|
|
|
|
# this packet should be forwarded
|
|
|
|
|
p.append((Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) /
|
|
|
|
|
IP(src=self.pg0.remote_hosts[0].ip4,
|
|
|
|
|
dst=self.pg1.remote_ip4) /
|
|
|
|
|
UDP(sport=2345, dport=1234) / Raw('\xa5' * 100)))
|
|
|
|
|
# this packet should be captured (no listener)
|
|
|
|
|
p.append((Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) /
|
|
|
|
|
IP(src=self.pg0.remote_hosts[0].ip4,
|
|
|
|
|
dst=self.pg0.local_ip4) /
|
|
|
|
|
UDP(sport=2345, dport=1234) / Raw('\xa5' * 100)))
|
|
|
|
|
# this packet will be blackholed but not captured
|
|
|
|
|
p.append((Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) /
|
|
|
|
|
IP(src=self.pg0.remote_hosts[0].ip4, dst="0.0.0.0") /
|
|
|
|
|
UDP(sport=2345, dport=1234) / Raw('\xa5' * 100)))
|
|
|
|
|
|
|
|
|
|
self.send_and_expect(self.pg0, p, self.pg1, n_rx=17, trace=False)
|
|
|
|
|
|
|
|
|
|
self.cli("pcap trace drop off")
|
|
|
|
|
|
|
|
|
|
# check captured pcap
|
|
|
|
|
pcap = rdpcap("/tmp/vpp_test_trace_filter_test_pcap_drop.pcap")
|
|
|
|
|
self.assertEqual(len(pcap), 17)
|
|
|
|
|
|
2019-12-04 17:19:12 -05:00
|
|
|
|
|
|
|
|
if __name__ == '__main__':
|
|
|
|
|
unittest.main(testRunner=VppTestRunner)
|