34fa0ce8f7
Check and skip VPP_EXCLUDED_PLUGINS tests for most of plugins. Type: improvement Signed-off-by: Dmitry Valter <d-valter@yandex-team.com> Change-Id: I23fd3666729251c639aa8da72a676058e3f5bb4e
286 lines
8.8 KiB
Python
286 lines
8.8 KiB
Python
#!/usr/bin/env python3
|
|
import unittest
|
|
|
|
from framework import VppTestCase
|
|
from asfframework import VppTestRunner
|
|
from vpp_ip_route import VppIpRoute, VppRoutePath, FibPathType
|
|
from vpp_l2 import L2_PORT_TYPE
|
|
from vpp_sub_interface import L2_VTR_OP, VppDot1QSubint
|
|
from vpp_acl import AclRule, VppAcl, VppAclInterface
|
|
|
|
from scapy.packet import Raw
|
|
from scapy.layers.l2 import Ether, Dot1Q
|
|
from scapy.layers.inet import IP, UDP
|
|
from socket import AF_INET
|
|
from ipaddress import IPv4Network
|
|
from config import config
|
|
|
|
NUM_PKTS = 67
|
|
|
|
|
|
@unittest.skipIf("acl" in config.excluded_plugins, "Exclude tests requiring ACL plugin")
|
|
class TestDVR(VppTestCase):
|
|
"""Distributed Virtual Router"""
|
|
|
|
@classmethod
|
|
def setUpClass(cls):
|
|
super(TestDVR, cls).setUpClass()
|
|
|
|
@classmethod
|
|
def tearDownClass(cls):
|
|
super(TestDVR, cls).tearDownClass()
|
|
|
|
def setUp(self):
|
|
super(TestDVR, self).setUp()
|
|
|
|
self.create_pg_interfaces(range(4))
|
|
self.create_loopback_interfaces(1)
|
|
|
|
for i in self.pg_interfaces:
|
|
i.admin_up()
|
|
|
|
self.loop0.config_ip4()
|
|
|
|
def tearDown(self):
|
|
for i in self.pg_interfaces:
|
|
i.admin_down()
|
|
self.loop0.unconfig_ip4()
|
|
|
|
super(TestDVR, self).tearDown()
|
|
|
|
def assert_same_mac_addr(self, tx, rx):
|
|
t_eth = tx[Ether]
|
|
for p in rx:
|
|
r_eth = p[Ether]
|
|
self.assertEqual(t_eth.src, r_eth.src)
|
|
self.assertEqual(t_eth.dst, r_eth.dst)
|
|
|
|
def assert_has_vlan_tag(self, tag, rx):
|
|
for p in rx:
|
|
r_1q = p[Dot1Q]
|
|
self.assertEqual(tag, r_1q.vlan)
|
|
|
|
def assert_has_no_tag(self, rx):
|
|
for p in rx:
|
|
self.assertFalse(p.haslayer(Dot1Q))
|
|
|
|
def test_dvr(self):
|
|
"""Distributed Virtual Router"""
|
|
|
|
#
|
|
# A packet destined to an IP address that is L2 bridged via
|
|
# a non-tag interface
|
|
#
|
|
ip_non_tag_bridged = "10.10.10.10"
|
|
ip_tag_bridged = "10.10.10.11"
|
|
any_src_addr = "1.1.1.1"
|
|
|
|
pkt_no_tag = (
|
|
Ether(src=self.pg0.remote_mac, dst=self.loop0.local_mac)
|
|
/ IP(src=any_src_addr, dst=ip_non_tag_bridged)
|
|
/ UDP(sport=1234, dport=1234)
|
|
/ Raw(b"\xa5" * 100)
|
|
)
|
|
pkt_tag = (
|
|
Ether(src=self.pg0.remote_mac, dst=self.loop0.local_mac)
|
|
/ IP(src=any_src_addr, dst=ip_tag_bridged)
|
|
/ UDP(sport=1234, dport=1234)
|
|
/ Raw(b"\xa5" * 100)
|
|
)
|
|
|
|
#
|
|
# Two sub-interfaces so we can test VLAN tag push/pop
|
|
#
|
|
sub_if_on_pg2 = VppDot1QSubint(self, self.pg2, 92)
|
|
sub_if_on_pg3 = VppDot1QSubint(self, self.pg3, 93)
|
|
sub_if_on_pg2.admin_up()
|
|
sub_if_on_pg3.admin_up()
|
|
|
|
#
|
|
# Put all the interfaces into a new bridge domain
|
|
#
|
|
self.vapi.sw_interface_set_l2_bridge(
|
|
rx_sw_if_index=self.pg0.sw_if_index, bd_id=1
|
|
)
|
|
self.vapi.sw_interface_set_l2_bridge(
|
|
rx_sw_if_index=self.pg1.sw_if_index, bd_id=1
|
|
)
|
|
self.vapi.sw_interface_set_l2_bridge(
|
|
rx_sw_if_index=sub_if_on_pg2.sw_if_index, bd_id=1
|
|
)
|
|
self.vapi.sw_interface_set_l2_bridge(
|
|
rx_sw_if_index=sub_if_on_pg3.sw_if_index, bd_id=1
|
|
)
|
|
self.vapi.sw_interface_set_l2_bridge(
|
|
rx_sw_if_index=self.loop0.sw_if_index, bd_id=1, port_type=L2_PORT_TYPE.BVI
|
|
)
|
|
|
|
self.vapi.l2_interface_vlan_tag_rewrite(
|
|
sw_if_index=sub_if_on_pg2.sw_if_index,
|
|
vtr_op=L2_VTR_OP.L2_POP_1,
|
|
push_dot1q=92,
|
|
)
|
|
self.vapi.l2_interface_vlan_tag_rewrite(
|
|
sw_if_index=sub_if_on_pg3.sw_if_index,
|
|
vtr_op=L2_VTR_OP.L2_POP_1,
|
|
push_dot1q=93,
|
|
)
|
|
|
|
#
|
|
# Add routes to bridge the traffic via a tagged an nontagged interface
|
|
#
|
|
route_no_tag = VppIpRoute(
|
|
self,
|
|
ip_non_tag_bridged,
|
|
32,
|
|
[
|
|
VppRoutePath(
|
|
"0.0.0.0", self.pg1.sw_if_index, type=FibPathType.FIB_PATH_TYPE_DVR
|
|
)
|
|
],
|
|
)
|
|
route_no_tag.add_vpp_config()
|
|
|
|
#
|
|
# Inject the packet that arrives and leaves on a non-tagged interface
|
|
# Since it's 'bridged' expect that the MAC headed is unchanged.
|
|
#
|
|
rx = self.send_and_expect(self.pg0, pkt_no_tag * NUM_PKTS, self.pg1)
|
|
self.assert_same_mac_addr(pkt_no_tag, rx)
|
|
self.assert_has_no_tag(rx)
|
|
|
|
#
|
|
# Add routes to bridge the traffic via a tagged interface
|
|
#
|
|
route_with_tag = VppIpRoute(
|
|
self,
|
|
ip_tag_bridged,
|
|
32,
|
|
[
|
|
VppRoutePath(
|
|
"0.0.0.0",
|
|
sub_if_on_pg3.sw_if_index,
|
|
type=FibPathType.FIB_PATH_TYPE_DVR,
|
|
)
|
|
],
|
|
)
|
|
route_with_tag.add_vpp_config()
|
|
|
|
#
|
|
# Inject the packet that arrives non-tag and leaves on a tagged
|
|
# interface
|
|
#
|
|
rx = self.send_and_expect(self.pg0, pkt_tag * NUM_PKTS, self.pg3)
|
|
self.assert_same_mac_addr(pkt_tag, rx)
|
|
self.assert_has_vlan_tag(93, rx)
|
|
|
|
#
|
|
# Tag to tag
|
|
#
|
|
pkt_tag_to_tag = (
|
|
Ether(src=self.pg2.remote_mac, dst=self.loop0.local_mac)
|
|
/ Dot1Q(vlan=92)
|
|
/ IP(src=any_src_addr, dst=ip_tag_bridged)
|
|
/ UDP(sport=1234, dport=1234)
|
|
/ Raw(b"\xa5" * 100)
|
|
)
|
|
|
|
rx = self.send_and_expect(self.pg2, pkt_tag_to_tag * NUM_PKTS, self.pg3)
|
|
self.assert_same_mac_addr(pkt_tag_to_tag, rx)
|
|
self.assert_has_vlan_tag(93, rx)
|
|
|
|
#
|
|
# Tag to non-Tag
|
|
#
|
|
pkt_tag_to_non_tag = (
|
|
Ether(src=self.pg2.remote_mac, dst=self.loop0.local_mac)
|
|
/ Dot1Q(vlan=92)
|
|
/ IP(src=any_src_addr, dst=ip_non_tag_bridged)
|
|
/ UDP(sport=1234, dport=1234)
|
|
/ Raw(b"\xa5" * 100)
|
|
)
|
|
|
|
rx = self.send_and_expect(self.pg2, pkt_tag_to_non_tag * NUM_PKTS, self.pg1)
|
|
self.assert_same_mac_addr(pkt_tag_to_tag, rx)
|
|
self.assert_has_no_tag(rx)
|
|
|
|
#
|
|
# Add an output L3 ACL that will block the traffic
|
|
#
|
|
rule_1 = AclRule(
|
|
is_permit=0,
|
|
proto=17,
|
|
ports=1234,
|
|
src_prefix=IPv4Network((any_src_addr, 32)),
|
|
dst_prefix=IPv4Network((ip_non_tag_bridged, 32)),
|
|
)
|
|
acl = VppAcl(self, rules=[rule_1])
|
|
acl.add_vpp_config()
|
|
|
|
#
|
|
# Apply the ACL on the output interface
|
|
#
|
|
acl_if1 = VppAclInterface(
|
|
self, sw_if_index=self.pg1.sw_if_index, n_input=0, acls=[acl]
|
|
)
|
|
acl_if1.add_vpp_config()
|
|
|
|
#
|
|
# Send packet's that should match the ACL and be dropped
|
|
#
|
|
rx = self.send_and_assert_no_replies(self.pg2, pkt_tag_to_non_tag * NUM_PKTS)
|
|
|
|
#
|
|
# cleanup
|
|
#
|
|
acl_if1.remove_vpp_config()
|
|
acl.remove_vpp_config()
|
|
|
|
self.vapi.sw_interface_set_l2_bridge(
|
|
rx_sw_if_index=self.pg0.sw_if_index, bd_id=1, enable=0
|
|
)
|
|
self.vapi.sw_interface_set_l2_bridge(
|
|
rx_sw_if_index=self.pg1.sw_if_index, bd_id=1, enable=0
|
|
)
|
|
self.vapi.sw_interface_set_l2_bridge(
|
|
rx_sw_if_index=sub_if_on_pg2.sw_if_index, bd_id=1, enable=0
|
|
)
|
|
self.vapi.sw_interface_set_l2_bridge(
|
|
rx_sw_if_index=sub_if_on_pg3.sw_if_index, bd_id=1, enable=0
|
|
)
|
|
self.vapi.sw_interface_set_l2_bridge(
|
|
rx_sw_if_index=self.loop0.sw_if_index,
|
|
bd_id=1,
|
|
port_type=L2_PORT_TYPE.BVI,
|
|
enable=0,
|
|
)
|
|
|
|
#
|
|
# Do a FIB dump to make sure the paths are correctly reported as DVR
|
|
#
|
|
routes = self.vapi.ip_route_dump(0)
|
|
|
|
for r in routes:
|
|
if ip_tag_bridged == str(r.route.prefix.network_address):
|
|
self.assertEqual(
|
|
r.route.paths[0].sw_if_index, sub_if_on_pg3.sw_if_index
|
|
)
|
|
self.assertEqual(r.route.paths[0].type, FibPathType.FIB_PATH_TYPE_DVR)
|
|
if ip_non_tag_bridged == str(r.route.prefix.network_address):
|
|
self.assertEqual(r.route.paths[0].sw_if_index, self.pg1.sw_if_index)
|
|
self.assertEqual(r.route.paths[0].type, FibPathType.FIB_PATH_TYPE_DVR)
|
|
|
|
#
|
|
# the explicit route delete is require so it happens before
|
|
# the sbu-interface delete. subinterface delete is required
|
|
# because that object type does not use the object registry
|
|
#
|
|
route_no_tag.remove_vpp_config()
|
|
route_with_tag.remove_vpp_config()
|
|
sub_if_on_pg3.remove_vpp_config()
|
|
sub_if_on_pg2.remove_vpp_config()
|
|
|
|
|
|
if __name__ == "__main__":
|
|
unittest.main(testRunner=VppTestRunner)
|