2019-10-31 13:31:07 -05:00
|
|
|
#!/usr/bin/env python3
|
2016-10-03 19:44:57 +02:00
|
|
|
|
2016-12-20 18:36:46 +02:00
|
|
|
import socket
|
2020-05-02 22:34:40 -04:00
|
|
|
from util import ip4_range, reassemble4
|
2016-10-03 19:44:57 +02:00
|
|
|
import unittest
|
2023-08-31 00:47:44 -04:00
|
|
|
from framework import VppTestCase
|
|
|
|
from asfframework import VppTestRunner
|
2016-10-03 19:44:57 +02:00
|
|
|
from template_bd import BridgeDomain
|
|
|
|
|
2019-12-13 23:39:35 +00:00
|
|
|
from scapy.layers.l2 import Ether
|
2022-02-21 17:51:29 +07:00
|
|
|
from scapy.layers.l2 import ARP
|
2020-12-01 02:39:21 +07:00
|
|
|
from scapy.packet import Raw, bind_layers
|
2016-10-03 19:44:57 +02:00
|
|
|
from scapy.layers.inet import IP, UDP
|
2024-01-24 20:33:12 +05:00
|
|
|
from scapy.layers.inet6 import IPv6
|
2016-12-09 15:05:46 +01:00
|
|
|
from scapy.layers.vxlan import VXLAN
|
2024-01-24 20:33:12 +05:00
|
|
|
from scapy.contrib.mpls import MPLS
|
2020-05-02 22:34:40 -04:00
|
|
|
|
|
|
|
import util
|
2018-05-01 05:17:55 -07:00
|
|
|
from vpp_ip_route import VppIpRoute, VppRoutePath
|
2020-03-02 13:55:31 +01:00
|
|
|
from vpp_vxlan_tunnel import VppVxlanTunnel
|
2018-05-01 05:17:55 -07:00
|
|
|
from vpp_ip import INVALID_INDEX
|
2022-02-21 17:51:29 +07:00
|
|
|
from vpp_neighbor import VppNeighbor
|
2024-03-11 10:38:46 +00:00
|
|
|
from config import config
|
2016-10-03 19:44:57 +02:00
|
|
|
|
|
|
|
|
2024-03-11 10:38:46 +00:00
|
|
|
@unittest.skipIf("vxlan" in config.excluded_plugins, "Exclude VXLAN plugin tests")
|
2016-10-11 11:47:09 +02:00
|
|
|
class TestVxlan(BridgeDomain, VppTestCase):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""VXLAN Test Case"""
|
2016-10-03 19:44:57 +02:00
|
|
|
|
|
|
|
def __init__(self, *args):
|
|
|
|
BridgeDomain.__init__(self)
|
|
|
|
VppTestCase.__init__(self, *args)
|
|
|
|
|
2016-12-20 18:36:46 +02:00
|
|
|
def encapsulate(self, pkt, vni):
|
2016-10-11 11:47:09 +02:00
|
|
|
"""
|
|
|
|
Encapsulate the original payload frame by adding VXLAN header with its
|
|
|
|
UDP, IP and Ethernet fields
|
|
|
|
"""
|
2022-04-26 19:02:15 +02:00
|
|
|
return (
|
|
|
|
Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
|
|
|
|
/ IP(src=self.pg0.remote_ip4, dst=self.pg0.local_ip4)
|
|
|
|
/ UDP(sport=self.dport, dport=self.dport, chksum=0)
|
|
|
|
/ VXLAN(vni=vni, flags=self.flags)
|
|
|
|
/ pkt
|
|
|
|
)
|
2016-12-20 18:36:46 +02:00
|
|
|
|
2018-06-18 13:01:59 +03:00
|
|
|
def ip_range(self, start, end):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""range of remote ip's"""
|
2018-06-18 13:01:59 +03:00
|
|
|
return ip4_range(self.pg0.remote_ip4, start, end)
|
|
|
|
|
2016-12-20 18:36:46 +02:00
|
|
|
def encap_mcast(self, pkt, src_ip, src_mac, vni):
|
|
|
|
"""
|
|
|
|
Encapsulate the original payload frame by adding VXLAN header with its
|
|
|
|
UDP, IP and Ethernet fields
|
|
|
|
"""
|
2022-04-26 19:02:15 +02:00
|
|
|
return (
|
|
|
|
Ether(src=src_mac, dst=self.mcast_mac)
|
|
|
|
/ IP(src=src_ip, dst=self.mcast_ip4)
|
|
|
|
/ UDP(sport=self.dport, dport=self.dport, chksum=0)
|
|
|
|
/ VXLAN(vni=vni, flags=self.flags)
|
|
|
|
/ pkt
|
|
|
|
)
|
2016-10-03 19:44:57 +02:00
|
|
|
|
|
|
|
def decapsulate(self, pkt):
|
2016-10-11 11:47:09 +02:00
|
|
|
"""
|
|
|
|
Decapsulate the original payload frame by removing VXLAN header
|
|
|
|
"""
|
2016-12-09 15:05:46 +01:00
|
|
|
# check if is set I flag
|
2022-04-26 19:02:15 +02:00
|
|
|
self.assertEqual(pkt[VXLAN].flags, int("0x8", 16))
|
2016-10-03 19:44:57 +02:00
|
|
|
return pkt[VXLAN].payload
|
|
|
|
|
2016-10-11 11:47:09 +02:00
|
|
|
# Method for checking VXLAN encapsulation.
|
2016-10-03 19:44:57 +02:00
|
|
|
#
|
2017-03-23 09:53:51 +02:00
|
|
|
def check_encapsulation(self, pkt, vni, local_only=False, mcast_pkt=False):
|
2016-10-03 19:44:57 +02:00
|
|
|
# TODO: add error messages
|
2016-10-11 11:47:09 +02:00
|
|
|
# Verify source MAC is VPP_MAC and destination MAC is MY_MAC resolved
|
2016-10-03 19:44:57 +02:00
|
|
|
# by VPP using ARP.
|
2016-10-11 11:47:09 +02:00
|
|
|
self.assertEqual(pkt[Ether].src, self.pg0.local_mac)
|
2016-12-20 18:36:46 +02:00
|
|
|
if not local_only:
|
2017-03-23 09:53:51 +02:00
|
|
|
if not mcast_pkt:
|
|
|
|
self.assertEqual(pkt[Ether].dst, self.pg0.remote_mac)
|
|
|
|
else:
|
|
|
|
self.assertEqual(pkt[Ether].dst, type(self).mcast_mac)
|
2016-10-11 11:47:09 +02:00
|
|
|
# Verify VXLAN tunnel source IP is VPP_IP and destination IP is MY_IP.
|
|
|
|
self.assertEqual(pkt[IP].src, self.pg0.local_ip4)
|
2016-12-20 18:36:46 +02:00
|
|
|
if not local_only:
|
2017-03-23 09:53:51 +02:00
|
|
|
if not mcast_pkt:
|
|
|
|
self.assertEqual(pkt[IP].dst, self.pg0.remote_ip4)
|
|
|
|
else:
|
|
|
|
self.assertEqual(pkt[IP].dst, type(self).mcast_ip4)
|
2016-10-11 11:47:09 +02:00
|
|
|
# Verify UDP destination port is VXLAN 4789, source UDP port could be
|
2016-10-03 19:44:57 +02:00
|
|
|
# arbitrary.
|
2020-12-01 02:39:21 +07:00
|
|
|
self.assertEqual(pkt[UDP].dport, self.dport)
|
2020-05-21 16:34:17 +03:00
|
|
|
# Verify UDP checksum
|
|
|
|
self.assert_udp_checksum_valid(pkt)
|
2016-12-20 18:36:46 +02:00
|
|
|
# Verify VNI
|
|
|
|
self.assertEqual(pkt[VXLAN].vni, vni)
|
|
|
|
|
|
|
|
@classmethod
|
2020-12-01 02:39:21 +07:00
|
|
|
def create_vxlan_flood_test_bd(cls, vni, n_ucast_tunnels, port):
|
2016-12-20 18:36:46 +02:00
|
|
|
# Create 10 ucast vxlan tunnels under bd
|
|
|
|
ip_range_start = 10
|
2017-01-11 13:39:54 +02:00
|
|
|
ip_range_end = ip_range_start + n_ucast_tunnels
|
2018-05-01 05:17:55 -07:00
|
|
|
next_hop_address = cls.pg0.remote_ip4
|
2022-04-26 19:02:15 +02:00
|
|
|
for dest_ip4 in ip4_range(next_hop_address, ip_range_start, ip_range_end):
|
2020-05-02 22:34:40 -04:00
|
|
|
# add host route so dest_ip4 will not be resolved
|
2022-04-26 19:02:15 +02:00
|
|
|
rip = VppIpRoute(
|
|
|
|
cls,
|
|
|
|
dest_ip4,
|
|
|
|
32,
|
|
|
|
[VppRoutePath(next_hop_address, INVALID_INDEX)],
|
|
|
|
register=False,
|
|
|
|
)
|
2018-05-01 05:17:55 -07:00
|
|
|
rip.add_vpp_config()
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
r = VppVxlanTunnel(
|
|
|
|
cls,
|
|
|
|
src=cls.pg0.local_ip4,
|
|
|
|
src_port=port,
|
|
|
|
dst_port=port,
|
|
|
|
dst=dest_ip4,
|
|
|
|
vni=vni,
|
|
|
|
)
|
2020-03-02 13:55:31 +01:00
|
|
|
r.add_vpp_config()
|
2018-05-01 05:17:55 -07:00
|
|
|
cls.vapi.sw_interface_set_l2_bridge(r.sw_if_index, bd_id=vni)
|
2016-12-20 18:36:46 +02:00
|
|
|
|
|
|
|
@classmethod
|
2020-12-01 02:39:21 +07:00
|
|
|
def add_del_shared_mcast_dst_load(cls, port, is_add):
|
2017-01-16 12:02:46 +02:00
|
|
|
"""
|
|
|
|
add or del tunnels sharing the same mcast dst
|
|
|
|
to test vxlan ref_count mechanism
|
|
|
|
"""
|
2017-11-17 09:18:53 +01:00
|
|
|
n_shared_dst_tunnels = 20
|
2017-01-16 12:02:46 +02:00
|
|
|
vni_start = 10000
|
|
|
|
vni_end = vni_start + n_shared_dst_tunnels
|
|
|
|
for vni in range(vni_start, vni_end):
|
2022-04-26 19:02:15 +02:00
|
|
|
r = VppVxlanTunnel(
|
|
|
|
cls,
|
|
|
|
src=cls.pg0.local_ip4,
|
|
|
|
src_port=port,
|
|
|
|
dst_port=port,
|
|
|
|
dst=cls.mcast_ip4,
|
|
|
|
mcast_sw_if_index=1,
|
|
|
|
vni=vni,
|
|
|
|
)
|
2020-03-02 13:55:31 +01:00
|
|
|
if is_add:
|
|
|
|
r.add_vpp_config()
|
2022-04-26 19:02:15 +02:00
|
|
|
if r.sw_if_index == 0xFFFFFFFF:
|
2020-03-02 13:55:31 +01:00
|
|
|
raise ValueError("bad sw_if_index: ~0")
|
|
|
|
else:
|
|
|
|
r.remove_vpp_config()
|
2017-01-16 12:02:46 +02:00
|
|
|
|
|
|
|
@classmethod
|
2020-12-01 02:39:21 +07:00
|
|
|
def add_shared_mcast_dst_load(cls, port):
|
|
|
|
cls.add_del_shared_mcast_dst_load(port=port, is_add=1)
|
2017-01-16 12:02:46 +02:00
|
|
|
|
|
|
|
@classmethod
|
2020-12-01 02:39:21 +07:00
|
|
|
def del_shared_mcast_dst_load(cls, port):
|
|
|
|
cls.add_del_shared_mcast_dst_load(port=port, is_add=0)
|
2017-01-16 12:02:46 +02:00
|
|
|
|
|
|
|
@classmethod
|
2020-12-01 02:39:21 +07:00
|
|
|
def add_del_mcast_tunnels_load(cls, port, is_add):
|
2017-01-16 12:02:46 +02:00
|
|
|
"""
|
|
|
|
add or del tunnels to test vxlan stability
|
|
|
|
"""
|
|
|
|
n_distinct_dst_tunnels = 200
|
2016-12-20 18:36:46 +02:00
|
|
|
ip_range_start = 10
|
2017-01-16 12:02:46 +02:00
|
|
|
ip_range_end = ip_range_start + n_distinct_dst_tunnels
|
2022-04-26 19:02:15 +02:00
|
|
|
for dest_ip4 in ip4_range(cls.mcast_ip4, ip_range_start, ip_range_end):
|
2020-03-02 13:55:31 +01:00
|
|
|
vni = bytearray(socket.inet_pton(socket.AF_INET, dest_ip4))[3]
|
2022-04-26 19:02:15 +02:00
|
|
|
r = VppVxlanTunnel(
|
|
|
|
cls,
|
|
|
|
src=cls.pg0.local_ip4,
|
|
|
|
src_port=port,
|
|
|
|
dst_port=port,
|
|
|
|
dst=dest_ip4,
|
|
|
|
mcast_sw_if_index=1,
|
|
|
|
vni=vni,
|
|
|
|
)
|
2020-03-02 13:55:31 +01:00
|
|
|
if is_add:
|
|
|
|
r.add_vpp_config()
|
|
|
|
else:
|
|
|
|
r.remove_vpp_config()
|
2016-12-20 18:36:46 +02:00
|
|
|
|
|
|
|
@classmethod
|
2020-12-01 02:39:21 +07:00
|
|
|
def add_mcast_tunnels_load(cls, port):
|
|
|
|
cls.add_del_mcast_tunnels_load(port=port, is_add=1)
|
2016-12-20 18:36:46 +02:00
|
|
|
|
|
|
|
@classmethod
|
2020-12-01 02:39:21 +07:00
|
|
|
def del_mcast_tunnels_load(cls, port):
|
|
|
|
cls.add_del_mcast_tunnels_load(port=port, is_add=0)
|
2016-10-03 19:44:57 +02:00
|
|
|
|
2016-10-11 11:47:09 +02:00
|
|
|
# Class method to start the VXLAN test case.
|
2016-10-03 19:44:57 +02:00
|
|
|
# Overrides setUpClass method in VppTestCase class.
|
|
|
|
# Python try..except statement is used to ensure that the tear down of
|
|
|
|
# the class will be executed even if exception is raised.
|
|
|
|
# @param cls The class pointer.
|
|
|
|
@classmethod
|
|
|
|
def setUpClass(cls):
|
|
|
|
super(TestVxlan, cls).setUpClass()
|
2016-10-11 11:47:09 +02:00
|
|
|
|
2016-10-03 19:44:57 +02:00
|
|
|
try:
|
2016-12-09 15:05:46 +01:00
|
|
|
cls.flags = 0x8
|
2016-10-11 11:47:09 +02:00
|
|
|
|
|
|
|
# Create 2 pg interfaces.
|
2016-12-20 18:36:46 +02:00
|
|
|
cls.create_pg_interfaces(range(4))
|
|
|
|
for pg in cls.pg_interfaces:
|
|
|
|
pg.admin_up()
|
2016-10-11 11:47:09 +02:00
|
|
|
|
|
|
|
# Configure IPv4 addresses on VPP pg0.
|
|
|
|
cls.pg0.config_ip4()
|
|
|
|
|
|
|
|
# Resolve MAC address for VPP's IP address on pg0.
|
|
|
|
cls.pg0.resolve_arp()
|
|
|
|
|
2016-12-20 18:36:46 +02:00
|
|
|
# Our Multicast address
|
2022-04-26 19:02:15 +02:00
|
|
|
cls.mcast_ip4 = "239.1.1.1"
|
2020-05-02 22:34:40 -04:00
|
|
|
cls.mcast_mac = util.mcast_ip_to_mac(cls.mcast_ip4)
|
2016-10-11 11:47:09 +02:00
|
|
|
except Exception:
|
2020-05-02 22:34:40 -04:00
|
|
|
cls.tearDownClass()
|
2016-10-03 19:44:57 +02:00
|
|
|
raise
|
|
|
|
|
2019-03-12 19:23:27 -07:00
|
|
|
@classmethod
|
|
|
|
def tearDownClass(cls):
|
|
|
|
super(TestVxlan, cls).tearDownClass()
|
|
|
|
|
2020-03-02 13:55:31 +01:00
|
|
|
def setUp(self):
|
|
|
|
super(TestVxlan, self).setUp()
|
2020-12-01 02:39:21 +07:00
|
|
|
|
|
|
|
def createVxLANInterfaces(self, port=4789):
|
2020-03-02 13:55:31 +01:00
|
|
|
# Create VXLAN VTEP on VPP pg0, and put vxlan_tunnel0 and pg1
|
|
|
|
# into BD.
|
2020-12-01 02:39:21 +07:00
|
|
|
self.dport = port
|
|
|
|
|
2020-04-03 07:46:28 +00:00
|
|
|
self.single_tunnel_vni = 0x12345
|
2020-03-02 13:55:31 +01:00
|
|
|
self.single_tunnel_bd = 1
|
2022-04-26 19:02:15 +02:00
|
|
|
r = VppVxlanTunnel(
|
|
|
|
self,
|
|
|
|
src=self.pg0.local_ip4,
|
|
|
|
dst=self.pg0.remote_ip4,
|
|
|
|
src_port=self.dport,
|
|
|
|
dst_port=self.dport,
|
|
|
|
vni=self.single_tunnel_vni,
|
|
|
|
)
|
2020-03-02 13:55:31 +01:00
|
|
|
r.add_vpp_config()
|
|
|
|
self.vapi.sw_interface_set_l2_bridge(
|
2022-04-26 19:02:15 +02:00
|
|
|
rx_sw_if_index=r.sw_if_index, bd_id=self.single_tunnel_bd
|
|
|
|
)
|
|
|
|
self.vapi.sw_interface_set_l2_bridge(
|
|
|
|
rx_sw_if_index=self.pg1.sw_if_index, bd_id=self.single_tunnel_bd
|
|
|
|
)
|
2020-03-02 13:55:31 +01:00
|
|
|
|
|
|
|
# Setup vni 2 to test multicast flooding
|
|
|
|
self.n_ucast_tunnels = 10
|
|
|
|
self.mcast_flood_bd = 2
|
2022-04-26 19:02:15 +02:00
|
|
|
self.create_vxlan_flood_test_bd(
|
|
|
|
self.mcast_flood_bd, self.n_ucast_tunnels, self.dport
|
|
|
|
)
|
|
|
|
r = VppVxlanTunnel(
|
|
|
|
self,
|
|
|
|
src=self.pg0.local_ip4,
|
|
|
|
dst=self.mcast_ip4,
|
|
|
|
src_port=self.dport,
|
|
|
|
dst_port=self.dport,
|
|
|
|
mcast_sw_if_index=1,
|
|
|
|
vni=self.mcast_flood_bd,
|
|
|
|
)
|
2020-03-02 13:55:31 +01:00
|
|
|
r.add_vpp_config()
|
|
|
|
self.vapi.sw_interface_set_l2_bridge(
|
2022-04-26 19:02:15 +02:00
|
|
|
rx_sw_if_index=r.sw_if_index, bd_id=self.mcast_flood_bd
|
|
|
|
)
|
|
|
|
self.vapi.sw_interface_set_l2_bridge(
|
|
|
|
rx_sw_if_index=self.pg2.sw_if_index, bd_id=self.mcast_flood_bd
|
|
|
|
)
|
2020-03-02 13:55:31 +01:00
|
|
|
|
|
|
|
# Add and delete mcast tunnels to check stability
|
2020-12-01 02:39:21 +07:00
|
|
|
self.add_shared_mcast_dst_load(self.dport)
|
|
|
|
self.add_mcast_tunnels_load(self.dport)
|
|
|
|
self.del_shared_mcast_dst_load(self.dport)
|
|
|
|
self.del_mcast_tunnels_load(self.dport)
|
2020-03-02 13:55:31 +01:00
|
|
|
|
|
|
|
# Setup vni 3 to test unicast flooding
|
|
|
|
self.ucast_flood_bd = 3
|
2022-04-26 19:02:15 +02:00
|
|
|
self.create_vxlan_flood_test_bd(
|
|
|
|
self.ucast_flood_bd, self.n_ucast_tunnels, self.dport
|
|
|
|
)
|
2020-03-02 13:55:31 +01:00
|
|
|
self.vapi.sw_interface_set_l2_bridge(
|
2022-04-26 19:02:15 +02:00
|
|
|
rx_sw_if_index=self.pg3.sw_if_index, bd_id=self.ucast_flood_bd
|
|
|
|
)
|
2020-03-02 13:55:31 +01:00
|
|
|
|
2020-12-01 02:39:21 +07:00
|
|
|
# Set scapy listen custom port for VxLAN
|
|
|
|
bind_layers(UDP, VXLAN, dport=self.dport)
|
2018-08-16 22:08:49 +02:00
|
|
|
|
2024-01-24 20:33:12 +05:00
|
|
|
def encap_packets(self):
|
|
|
|
def encap_frames(frame, n=10):
|
|
|
|
frames = []
|
|
|
|
|
|
|
|
# Provide IP flow hash difference.
|
|
|
|
for i in range(n):
|
|
|
|
p = frame.copy()
|
|
|
|
p[UDP].dport += i
|
|
|
|
frames.append(p)
|
|
|
|
|
|
|
|
self.pg1.add_stream(frames)
|
|
|
|
|
|
|
|
self.pg0.enable_capture()
|
|
|
|
self.pg_start()
|
|
|
|
|
|
|
|
# Pick received frames and check if they're correctly encapsulated.
|
|
|
|
out = self.pg0.get_capture(n)
|
|
|
|
sports = set()
|
|
|
|
for i in range(n):
|
|
|
|
pkt = out[i]
|
|
|
|
self.check_encapsulation(pkt, self.single_tunnel_vni)
|
|
|
|
|
|
|
|
payload = self.decapsulate(pkt)
|
|
|
|
self.assert_eq_pkts(payload, frames[i])
|
|
|
|
|
|
|
|
sports.add(pkt[UDP].sport)
|
|
|
|
|
|
|
|
# Check src port randomization presence, not concerned with the
|
|
|
|
# src ports split ratio, just as long as there are more then one.
|
|
|
|
self.assertGreaterEqual(len(sports), min(n, 2))
|
|
|
|
|
|
|
|
frame_ip4 = (
|
|
|
|
Ether(src="00:00:00:00:00:02", dst="00:00:00:00:00:01")
|
|
|
|
/ IP(src="4.3.2.1", dst="1.2.3.4")
|
|
|
|
/ UDP(sport=20000, dport=10000)
|
|
|
|
/ Raw("\xa5" * 100)
|
|
|
|
)
|
|
|
|
encap_frames(frame_ip4)
|
|
|
|
|
|
|
|
frame_ip6 = (
|
|
|
|
Ether(src="00:00:00:00:00:02", dst="00:00:00:00:00:01")
|
|
|
|
/ IPv6(src="2001:db8::4321", dst="2001:db8::1234")
|
|
|
|
/ UDP(sport=20000, dport=10000)
|
|
|
|
/ Raw("\xa5" * 100)
|
|
|
|
)
|
|
|
|
encap_frames(frame_ip6)
|
|
|
|
|
|
|
|
frame_mpls4 = (
|
|
|
|
Ether(src="00:00:00:00:00:02", dst="00:00:00:00:00:01")
|
|
|
|
/ MPLS(label=44, ttl=64)
|
|
|
|
/ IP(src="4.3.2.1", dst="1.2.3.4")
|
|
|
|
/ UDP(sport=20000, dport=10000)
|
|
|
|
/ Raw("\xa5" * 100)
|
|
|
|
)
|
|
|
|
encap_frames(frame_mpls4)
|
|
|
|
|
|
|
|
frame_mpls6 = (
|
|
|
|
Ether(src="00:00:00:00:00:02", dst="00:00:00:00:00:01")
|
|
|
|
/ MPLS(label=44, ttl=64)
|
|
|
|
/ IPv6(src="2001:db8::4321", dst="2001:db8::1234")
|
|
|
|
/ UDP(sport=20000, dport=10000)
|
|
|
|
/ Raw("\xa5" * 100)
|
|
|
|
)
|
|
|
|
encap_frames(frame_mpls6)
|
|
|
|
|
2020-12-01 02:39:21 +07:00
|
|
|
def encap_big_packet(self):
|
2018-08-16 22:08:49 +02:00
|
|
|
self.vapi.sw_interface_set_mtu(self.pg0.sw_if_index, [1500, 0, 0, 0])
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
frame = (
|
|
|
|
Ether(src="00:00:00:00:00:02", dst="00:00:00:00:00:01")
|
|
|
|
/ IP(src="4.3.2.1", dst="1.2.3.4")
|
|
|
|
/ UDP(sport=20000, dport=10000)
|
|
|
|
/ Raw(b"\xa5" * 1450)
|
|
|
|
)
|
2018-08-16 22:08:49 +02:00
|
|
|
|
|
|
|
self.pg1.add_stream([frame])
|
|
|
|
|
|
|
|
self.pg0.enable_capture()
|
|
|
|
|
|
|
|
self.pg_start()
|
|
|
|
|
|
|
|
# Pick first received frame and check if it's correctly encapsulated.
|
|
|
|
out = self.pg0.get_capture(2)
|
|
|
|
ether = out[0]
|
2018-12-06 17:35:12 +01:00
|
|
|
pkt = reassemble4(out)
|
2018-08-16 22:08:49 +02:00
|
|
|
pkt = ether / pkt
|
2020-04-03 07:46:28 +00:00
|
|
|
self.check_encapsulation(pkt, self.single_tunnel_vni)
|
2018-08-16 22:08:49 +02:00
|
|
|
|
|
|
|
payload = self.decapsulate(pkt)
|
|
|
|
# TODO: Scapy bug?
|
|
|
|
# self.assert_eq_pkts(payload, frame)
|
|
|
|
|
2020-12-01 02:39:21 +07:00
|
|
|
"""
|
|
|
|
Tests with default port (4789)
|
|
|
|
"""
|
2022-04-26 19:02:15 +02:00
|
|
|
|
2020-12-01 02:39:21 +07:00
|
|
|
def test_decap(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""Decapsulation test
|
2020-12-01 02:39:21 +07:00
|
|
|
from BridgeDoman
|
|
|
|
"""
|
|
|
|
self.createVxLANInterfaces()
|
|
|
|
super(TestVxlan, self).test_decap()
|
|
|
|
|
|
|
|
def test_encap(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""Encapsulation test
|
2020-12-01 02:39:21 +07:00
|
|
|
from BridgeDoman
|
|
|
|
"""
|
|
|
|
self.createVxLANInterfaces()
|
2024-01-24 20:33:12 +05:00
|
|
|
self.encap_packets()
|
2020-12-01 02:39:21 +07:00
|
|
|
|
|
|
|
def test_encap_big_packet(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""Encapsulation test send big frame from pg1
|
2020-12-01 02:39:21 +07:00
|
|
|
Verify receipt of encapsulated frames on pg0
|
|
|
|
"""
|
|
|
|
self.createVxLANInterfaces()
|
|
|
|
self.encap_big_packet()
|
|
|
|
|
|
|
|
def test_ucast_flood(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""Unicast flood test
|
2020-12-01 02:39:21 +07:00
|
|
|
from BridgeDoman
|
|
|
|
"""
|
|
|
|
self.createVxLANInterfaces()
|
|
|
|
super(TestVxlan, self).test_ucast_flood()
|
|
|
|
|
|
|
|
def test_mcast_flood(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""Multicast flood test
|
2020-12-01 02:39:21 +07:00
|
|
|
from BridgeDoman
|
|
|
|
"""
|
|
|
|
self.createVxLANInterfaces()
|
|
|
|
super(TestVxlan, self).test_mcast_flood()
|
|
|
|
|
|
|
|
def test_mcast_rcv(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""Multicast receive test
|
2020-12-01 02:39:21 +07:00
|
|
|
from BridgeDoman
|
|
|
|
"""
|
|
|
|
self.createVxLANInterfaces()
|
|
|
|
super(TestVxlan, self).test_mcast_rcv()
|
|
|
|
|
|
|
|
"""
|
|
|
|
Tests with custom port
|
|
|
|
"""
|
2022-04-26 19:02:15 +02:00
|
|
|
|
2020-12-01 02:39:21 +07:00
|
|
|
def test_decap_custom_port(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""Decapsulation test custom port
|
2020-12-01 02:39:21 +07:00
|
|
|
from BridgeDoman
|
|
|
|
"""
|
|
|
|
self.createVxLANInterfaces(1111)
|
|
|
|
super(TestVxlan, self).test_decap()
|
|
|
|
|
|
|
|
def test_encap_custom_port(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""Encapsulation test custom port
|
2020-12-01 02:39:21 +07:00
|
|
|
from BridgeDoman
|
|
|
|
"""
|
|
|
|
self.createVxLANInterfaces(1111)
|
|
|
|
super(TestVxlan, self).test_encap()
|
|
|
|
|
|
|
|
def test_ucast_flood_custom_port(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""Unicast flood test custom port
|
2020-12-01 02:39:21 +07:00
|
|
|
from BridgeDoman
|
|
|
|
"""
|
|
|
|
self.createVxLANInterfaces(1111)
|
|
|
|
super(TestVxlan, self).test_ucast_flood()
|
|
|
|
|
|
|
|
def test_mcast_flood_custom_port(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""Multicast flood test custom port
|
2020-12-01 02:39:21 +07:00
|
|
|
from BridgeDoman
|
|
|
|
"""
|
|
|
|
self.createVxLANInterfaces(1111)
|
|
|
|
super(TestVxlan, self).test_mcast_flood()
|
|
|
|
|
|
|
|
def test_mcast_rcv_custom_port(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""Multicast receive test custom port
|
2020-12-01 02:39:21 +07:00
|
|
|
from BridgeDoman
|
|
|
|
"""
|
|
|
|
self.createVxLANInterfaces(1111)
|
|
|
|
super(TestVxlan, self).test_mcast_rcv()
|
|
|
|
|
2016-10-11 11:47:09 +02:00
|
|
|
# Method to define VPP actions before tear down of the test case.
|
2016-10-03 19:44:57 +02:00
|
|
|
# Overrides tearDown method in VppTestCase class.
|
|
|
|
# @param self The object pointer.
|
2020-12-01 02:39:21 +07:00
|
|
|
|
2016-10-03 19:44:57 +02:00
|
|
|
def tearDown(self):
|
|
|
|
super(TestVxlan, self).tearDown()
|
2019-03-13 09:23:05 -07:00
|
|
|
|
|
|
|
def show_commands_at_teardown(self):
|
|
|
|
self.logger.info(self.vapi.cli("show bridge-domain 1 detail"))
|
|
|
|
self.logger.info(self.vapi.cli("show bridge-domain 2 detail"))
|
|
|
|
self.logger.info(self.vapi.cli("show bridge-domain 3 detail"))
|
|
|
|
self.logger.info(self.vapi.cli("show vxlan tunnel"))
|
2016-10-03 19:44:57 +02:00
|
|
|
|
2016-12-09 15:05:46 +01:00
|
|
|
|
2024-03-11 10:38:46 +00:00
|
|
|
@unittest.skipIf("vxlan" in config.excluded_plugins, "Exclude VXLAN plugin tests")
|
2020-12-16 13:06:58 +00:00
|
|
|
class TestVxlan2(VppTestCase):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""VXLAN Test Case"""
|
|
|
|
|
2020-12-16 13:06:58 +00:00
|
|
|
def setUp(self):
|
|
|
|
super(TestVxlan2, self).setUp()
|
|
|
|
|
|
|
|
# Create 2 pg interfaces.
|
|
|
|
self.create_pg_interfaces(range(4))
|
|
|
|
for pg in self.pg_interfaces:
|
|
|
|
pg.admin_up()
|
|
|
|
|
|
|
|
# Configure IPv4 addresses on VPP pg0.
|
|
|
|
self.pg0.config_ip4()
|
|
|
|
self.pg0.resolve_arp()
|
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
super(TestVxlan2, self).tearDown()
|
|
|
|
|
|
|
|
def test_xconnect(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""VXLAN source address not local"""
|
2020-12-16 13:06:58 +00:00
|
|
|
|
|
|
|
#
|
|
|
|
# test the broken configuration of a VXLAN tunnel whose
|
|
|
|
# source address is not local ot the box. packets sent
|
|
|
|
# through the tunnel should be dropped
|
|
|
|
#
|
2022-04-26 19:02:15 +02:00
|
|
|
t = VppVxlanTunnel(self, src="10.0.0.5", dst=self.pg0.local_ip4, vni=1000)
|
2020-12-16 13:06:58 +00:00
|
|
|
t.add_vpp_config()
|
|
|
|
t.admin_up()
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
self.vapi.sw_interface_set_l2_xconnect(
|
|
|
|
t.sw_if_index, self.pg1.sw_if_index, enable=1
|
|
|
|
)
|
|
|
|
self.vapi.sw_interface_set_l2_xconnect(
|
|
|
|
self.pg1.sw_if_index, t.sw_if_index, enable=1
|
|
|
|
)
|
2020-12-16 13:06:58 +00:00
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
p = (
|
|
|
|
Ether(src="00:11:22:33:44:55", dst="00:00:00:11:22:33")
|
|
|
|
/ IP(src="4.3.2.1", dst="1.2.3.4")
|
|
|
|
/ UDP(sport=20000, dport=10000)
|
|
|
|
/ Raw(b"\xa5" * 1450)
|
|
|
|
)
|
2020-12-16 13:06:58 +00:00
|
|
|
|
|
|
|
rx = self.send_and_assert_no_replies(self.pg1, [p])
|
|
|
|
|
|
|
|
|
2024-03-11 10:38:46 +00:00
|
|
|
@unittest.skipIf("vxlan" in config.excluded_plugins, "Exclude VXLAN plugin tests")
|
2022-02-21 17:51:29 +07:00
|
|
|
class TestVxlanL2Mode(VppTestCase):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""VXLAN Test Case"""
|
|
|
|
|
2022-02-21 17:51:29 +07:00
|
|
|
def setUp(self):
|
|
|
|
super(TestVxlanL2Mode, self).setUp()
|
|
|
|
|
|
|
|
# Create 2 pg interfaces.
|
|
|
|
self.create_pg_interfaces(range(2))
|
|
|
|
for pg in self.pg_interfaces:
|
|
|
|
pg.admin_up()
|
|
|
|
|
|
|
|
# Configure IPv4 addresses on VPP pg0.
|
|
|
|
self.pg0.config_ip4()
|
|
|
|
self.pg0.resolve_arp()
|
|
|
|
|
|
|
|
# Configure IPv4 addresses on VPP pg1.
|
|
|
|
self.pg1.config_ip4()
|
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
super(TestVxlanL2Mode, self).tearDown()
|
|
|
|
|
|
|
|
def test_l2_mode(self):
|
2022-04-26 19:02:15 +02:00
|
|
|
"""VXLAN L2 mode"""
|
|
|
|
t = VppVxlanTunnel(
|
|
|
|
self, src=self.pg0.local_ip4, dst=self.pg0.remote_ip4, vni=1000, is_l3=False
|
|
|
|
)
|
2022-02-21 17:51:29 +07:00
|
|
|
t.add_vpp_config()
|
|
|
|
t.config_ip4()
|
|
|
|
t.admin_up()
|
|
|
|
|
|
|
|
dstIP = t.local_ip4[:-1] + "2"
|
|
|
|
|
|
|
|
# Create a packet to send
|
2022-04-26 19:02:15 +02:00
|
|
|
p = (
|
|
|
|
Ether(dst=self.pg1.local_mac, src=self.pg1.remote_mac)
|
|
|
|
/ IP(src=self.pg1.local_ip4, dst=dstIP)
|
|
|
|
/ UDP(sport=555, dport=556)
|
|
|
|
/ Raw(b"\x00" * 80)
|
|
|
|
)
|
2022-02-21 17:51:29 +07:00
|
|
|
|
|
|
|
# Expect ARP request
|
|
|
|
rx = self.send_and_expect(self.pg1, [p], self.pg0)
|
|
|
|
for p in rx:
|
|
|
|
self.assertEqual(p[Ether].dst, self.pg0.remote_mac)
|
|
|
|
self.assertEqual(p[Ether].src, self.pg0.local_mac)
|
|
|
|
self.assertEqual(p[ARP].op, 1)
|
|
|
|
self.assertEqual(p[ARP].pdst, dstIP)
|
|
|
|
|
|
|
|
# Resolve ARP
|
2022-04-26 19:02:15 +02:00
|
|
|
VppNeighbor(self, t.sw_if_index, self.pg1.remote_mac, dstIP).add_vpp_config()
|
2022-02-21 17:51:29 +07:00
|
|
|
|
|
|
|
# Send packets
|
|
|
|
NUM_PKTS = 128
|
ethernet: check destination mac for L3 in ethernet-input node
When the NIC does not support mac filter, we rely on ethernet-input
node to do the destination mac check, ie, when the interface is in L3,
the mac address for the packet must be the mac address of the
interface where the packet arrives. This works fine in ethernet-input
node when all packets in the frame might have different interfaces, ie,
ETH_INPUT_FRAME_F_SINGLE_SW_IF_ID is not set in the frame. However,
when all packets are having the same interface,
ETH_INPUT_FRAME_F_SINGLE_SW_IF_ID is set, ethernet-input node goes
through the optimized routine eth_input_single_int -> eth_input_process_frame.
That is where dmac check has a bug when all packets in the frame are
either, ip4, ip6, or mpls without vlan tags. Because without vlan tags,
the code handles all packets in fast path and ignores dmac check.
With vlan tags, the code goes to slow path where dmac check is handled
properly.
The fix is to check if we have a bad dmac in the fast path and force the
code to go to slow path which will handle dmac check properly.
Also do a wholesale correction on all the testcases which do not use
the proper dmac when sending L3 packets.
Type: fix
Change-Id: I73153a805cecdc24c4eefcc781676de04737ae2c
Signed-off-by: Steven Luong <sluong@cisco.com>
2024-04-19 09:49:20 -07:00
|
|
|
p.dst = self.pg1.local_mac
|
2022-02-21 17:51:29 +07:00
|
|
|
rx = self.send_and_expect(self.pg1, p * NUM_PKTS, self.pg0)
|
|
|
|
self.assertEqual(NUM_PKTS, len(rx))
|
|
|
|
|
|
|
|
|
2022-04-26 19:02:15 +02:00
|
|
|
if __name__ == "__main__":
|
2016-10-03 19:44:57 +02:00
|
|
|
unittest.main(testRunner=VppTestRunner)
|