34fa0ce8f7
Check and skip VPP_EXCLUDED_PLUGINS tests for most of plugins. Type: improvement Signed-off-by: Dmitry Valter <d-valter@yandex-team.com> Change-Id: I23fd3666729251c639aa8da72a676058e3f5bb4e
1255 lines
40 KiB
Python
1255 lines
40 KiB
Python
#!/usr/bin/env python3
|
|
|
|
import unittest
|
|
|
|
from framework import VppTestCase
|
|
from asfframework import VppTestRunner, tag_fixme_vpp_workers
|
|
from vpp_ip_route import (
|
|
VppIpMRoute,
|
|
VppMRoutePath,
|
|
VppMFibSignal,
|
|
VppIpTable,
|
|
FibPathProto,
|
|
FibPathType,
|
|
)
|
|
from vpp_gre_interface import VppGreInterface
|
|
from vpp_papi import VppEnum
|
|
from config import config
|
|
|
|
from scapy.packet import Raw
|
|
from scapy.layers.l2 import Ether, GRE
|
|
from scapy.layers.inet import IP, UDP, getmacbyip, ICMP
|
|
from scapy.layers.inet6 import IPv6, getmacbyip6
|
|
|
|
#
|
|
# The number of packets sent is set to 91 so that when we replicate more than 3
|
|
# times, which we do for some entries, we will generate more than 256 packets
|
|
# to the next node in the VLIB graph. Thus we are testing the code's
|
|
# correctness handling this over-flow.
|
|
# It's also an odd number so we hit any single loops.
|
|
#
|
|
N_PKTS_IN_STREAM = 91
|
|
|
|
|
|
class TestMFIB(VppTestCase):
|
|
"""MFIB Test Case"""
|
|
|
|
@classmethod
|
|
def setUpClass(cls):
|
|
super(TestMFIB, cls).setUpClass()
|
|
|
|
@classmethod
|
|
def tearDownClass(cls):
|
|
super(TestMFIB, cls).tearDownClass()
|
|
|
|
def setUp(self):
|
|
super(TestMFIB, self).setUp()
|
|
|
|
def test_mfib(self):
|
|
"""MFIB Unit Tests"""
|
|
error = self.vapi.cli("test mfib")
|
|
|
|
if error:
|
|
self.logger.critical(error)
|
|
self.assertNotIn("Failed", error)
|
|
|
|
|
|
@tag_fixme_vpp_workers
|
|
class TestIPMcast(VppTestCase):
|
|
"""IP Multicast Test Case"""
|
|
|
|
@classmethod
|
|
def setUpClass(cls):
|
|
super(TestIPMcast, cls).setUpClass()
|
|
|
|
@classmethod
|
|
def tearDownClass(cls):
|
|
super(TestIPMcast, cls).tearDownClass()
|
|
|
|
def setUp(self):
|
|
super(TestIPMcast, self).setUp()
|
|
|
|
# create 8 pg interfaces
|
|
self.create_pg_interfaces(range(9))
|
|
|
|
# setup interfaces
|
|
for i in self.pg_interfaces[:8]:
|
|
i.admin_up()
|
|
i.config_ip4()
|
|
i.config_ip6()
|
|
i.resolve_arp()
|
|
i.resolve_ndp()
|
|
|
|
# one more in a vrf
|
|
tbl4 = VppIpTable(self, 10)
|
|
tbl4.add_vpp_config()
|
|
self.pg8.set_table_ip4(10)
|
|
self.pg8.config_ip4()
|
|
|
|
tbl6 = VppIpTable(self, 10, is_ip6=1)
|
|
tbl6.add_vpp_config()
|
|
self.pg8.set_table_ip6(10)
|
|
self.pg8.config_ip6()
|
|
|
|
def tearDown(self):
|
|
for i in self.pg_interfaces:
|
|
i.unconfig_ip4()
|
|
i.unconfig_ip6()
|
|
i.admin_down()
|
|
|
|
self.pg8.set_table_ip4(0)
|
|
self.pg8.set_table_ip6(0)
|
|
super(TestIPMcast, self).tearDown()
|
|
|
|
def create_stream_ip4(self, src_if, src_ip, dst_ip, payload_size=0):
|
|
pkts = []
|
|
# default to small packet sizes
|
|
p = (
|
|
Ether(dst=getmacbyip(dst_ip), src=src_if.remote_mac)
|
|
/ IP(src=src_ip, dst=dst_ip)
|
|
/ UDP(sport=1234, dport=1234)
|
|
)
|
|
if not payload_size:
|
|
payload_size = 64 - len(p)
|
|
p = p / Raw(b"\xa5" * payload_size)
|
|
|
|
for i in range(0, N_PKTS_IN_STREAM):
|
|
pkts.append(p)
|
|
return pkts
|
|
|
|
def create_stream_ip6(self, src_if, src_ip, dst_ip):
|
|
pkts = []
|
|
for i in range(0, N_PKTS_IN_STREAM):
|
|
info = self.create_packet_info(src_if, src_if)
|
|
payload = self.info_to_payload(info)
|
|
p = (
|
|
Ether(dst=getmacbyip6(dst_ip), src=src_if.remote_mac)
|
|
/ IPv6(src=src_ip, dst=dst_ip)
|
|
/ UDP(sport=1234, dport=1234)
|
|
/ Raw(payload)
|
|
)
|
|
info.data = p.copy()
|
|
pkts.append(p)
|
|
return pkts
|
|
|
|
def verify_filter(self, capture, sent):
|
|
if not len(capture) == len(sent):
|
|
# filter out any IPv6 RAs from the capture
|
|
for p in capture:
|
|
if p.haslayer(IPv6):
|
|
capture.remove(p)
|
|
return capture
|
|
|
|
def verify_capture_ip4(self, rx_if, sent, dst_mac=None):
|
|
rxd = rx_if.get_capture(len(sent))
|
|
|
|
try:
|
|
capture = self.verify_filter(rxd, sent)
|
|
|
|
self.assertEqual(len(capture), len(sent))
|
|
|
|
for i in range(len(capture)):
|
|
tx = sent[i]
|
|
rx = capture[i]
|
|
|
|
eth = rx[Ether]
|
|
self.assertEqual(eth.type, 0x800)
|
|
|
|
tx_ip = tx[IP]
|
|
rx_ip = rx[IP]
|
|
|
|
if dst_mac is None:
|
|
dst_mac = getmacbyip(rx_ip.dst)
|
|
|
|
# check the MAC address on the RX'd packet is correctly formed
|
|
self.assertEqual(eth.dst, dst_mac)
|
|
|
|
self.assertEqual(rx_ip.src, tx_ip.src)
|
|
self.assertEqual(rx_ip.dst, tx_ip.dst)
|
|
# IP processing post pop has decremented the TTL
|
|
self.assertEqual(rx_ip.ttl + 1, tx_ip.ttl)
|
|
|
|
except:
|
|
raise
|
|
|
|
def verify_capture_ip6(self, rx_if, sent):
|
|
capture = rx_if.get_capture(len(sent))
|
|
|
|
self.assertEqual(len(capture), len(sent))
|
|
|
|
for i in range(len(capture)):
|
|
tx = sent[i]
|
|
rx = capture[i]
|
|
|
|
eth = rx[Ether]
|
|
self.assertEqual(eth.type, 0x86DD)
|
|
|
|
tx_ip = tx[IPv6]
|
|
rx_ip = rx[IPv6]
|
|
|
|
# check the MAC address on the RX'd packet is correctly formed
|
|
self.assertEqual(eth.dst, getmacbyip6(rx_ip.dst))
|
|
|
|
self.assertEqual(rx_ip.src, tx_ip.src)
|
|
self.assertEqual(rx_ip.dst, tx_ip.dst)
|
|
# IP processing post pop has decremented the TTL
|
|
self.assertEqual(rx_ip.hlim + 1, tx_ip.hlim)
|
|
|
|
def test_ip_mcast(self):
|
|
"""IP Multicast Replication"""
|
|
|
|
MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t
|
|
MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t
|
|
|
|
#
|
|
# a stream that matches the default route. gets dropped.
|
|
#
|
|
self.vapi.cli("clear trace")
|
|
self.vapi.cli("packet mac-filter pg0 on")
|
|
self.vapi.cli("packet mac-filter pg1 on")
|
|
self.vapi.cli("packet mac-filter pg2 on")
|
|
self.vapi.cli("packet mac-filter pg4 on")
|
|
self.vapi.cli("packet mac-filter pg5 on")
|
|
self.vapi.cli("packet mac-filter pg6 on")
|
|
self.vapi.cli("packet mac-filter pg7 on")
|
|
|
|
tx = self.create_stream_ip4(self.pg0, "1.1.1.1", "232.1.1.1")
|
|
self.pg0.add_stream(tx)
|
|
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
self.pg_start()
|
|
|
|
self.pg0.assert_nothing_captured(
|
|
remark="IP multicast packets forwarded on default route"
|
|
)
|
|
count = self.statistics.get_err_counter("/err/ip4-input/rpf_failure")
|
|
self.assertEqual(count, len(tx))
|
|
|
|
#
|
|
# A (*,G).
|
|
# one accepting interface, pg0, 7 forwarding interfaces
|
|
# many forwarding interfaces test the case where the replicate DPO
|
|
# needs to use extra cache lines for the buckets.
|
|
#
|
|
route_232_1_1_1 = VppIpMRoute(
|
|
self,
|
|
"0.0.0.0",
|
|
"232.1.1.1",
|
|
32,
|
|
MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE,
|
|
[
|
|
VppMRoutePath(
|
|
self.pg0.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT
|
|
),
|
|
VppMRoutePath(
|
|
self.pg1.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD
|
|
),
|
|
VppMRoutePath(
|
|
self.pg2.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD
|
|
),
|
|
VppMRoutePath(
|
|
self.pg3.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD
|
|
),
|
|
VppMRoutePath(
|
|
self.pg4.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD
|
|
),
|
|
VppMRoutePath(
|
|
self.pg5.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD
|
|
),
|
|
VppMRoutePath(
|
|
self.pg6.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD
|
|
),
|
|
VppMRoutePath(
|
|
self.pg7.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD
|
|
),
|
|
],
|
|
)
|
|
route_232_1_1_1.add_vpp_config()
|
|
|
|
#
|
|
# An (S,G).
|
|
# one accepting interface, pg0, 2 forwarding interfaces
|
|
#
|
|
route_1_1_1_1_232_1_1_1 = VppIpMRoute(
|
|
self,
|
|
"1.1.1.1",
|
|
"232.1.1.1",
|
|
27, # any grp-len is ok when src is set
|
|
MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE,
|
|
[
|
|
VppMRoutePath(
|
|
self.pg0.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT
|
|
),
|
|
VppMRoutePath(
|
|
self.pg1.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD
|
|
),
|
|
VppMRoutePath(
|
|
self.pg2.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD
|
|
),
|
|
],
|
|
)
|
|
route_1_1_1_1_232_1_1_1.add_vpp_config()
|
|
|
|
#
|
|
# An (S,G).
|
|
# one accepting interface, pg0, 2 forwarding interfaces
|
|
# that use unicast next-hops
|
|
#
|
|
route_1_1_1_1_232_1_1_2 = VppIpMRoute(
|
|
self,
|
|
"1.1.1.1",
|
|
"232.1.1.2",
|
|
64,
|
|
MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE,
|
|
[
|
|
VppMRoutePath(
|
|
self.pg0.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT
|
|
),
|
|
VppMRoutePath(
|
|
self.pg1.sw_if_index,
|
|
MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD,
|
|
nh=self.pg1.remote_ip4,
|
|
),
|
|
VppMRoutePath(
|
|
self.pg2.sw_if_index,
|
|
MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD,
|
|
nh=self.pg2.remote_ip4,
|
|
),
|
|
],
|
|
)
|
|
route_1_1_1_1_232_1_1_2.add_vpp_config()
|
|
|
|
#
|
|
# An (*,G/m).
|
|
# one accepting interface, pg0, 1 forwarding interfaces
|
|
#
|
|
route_232 = VppIpMRoute(
|
|
self,
|
|
"0.0.0.0",
|
|
"232.0.0.0",
|
|
8,
|
|
MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE,
|
|
[
|
|
VppMRoutePath(
|
|
self.pg0.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT
|
|
),
|
|
VppMRoutePath(
|
|
self.pg1.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD
|
|
),
|
|
],
|
|
)
|
|
route_232.add_vpp_config()
|
|
|
|
#
|
|
# a stream that matches the route for (1.1.1.1,232.1.1.1)
|
|
# small packets
|
|
#
|
|
self.vapi.cli("clear trace")
|
|
tx = self.create_stream_ip4(self.pg0, "1.1.1.1", "232.1.1.1")
|
|
self.pg0.add_stream(tx)
|
|
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
self.pg_start()
|
|
|
|
self.assertEqual(route_1_1_1_1_232_1_1_1.get_stats()["packets"], len(tx))
|
|
|
|
# We expect replications on Pg1->7
|
|
self.verify_capture_ip4(self.pg1, tx)
|
|
self.verify_capture_ip4(self.pg2, tx)
|
|
|
|
# no replications on Pg0
|
|
self.pg0.assert_nothing_captured(remark="IP multicast packets forwarded on PG0")
|
|
self.pg3.assert_nothing_captured(remark="IP multicast packets forwarded on PG3")
|
|
|
|
#
|
|
# a stream that matches the route for (1.1.1.1,232.1.1.1)
|
|
# large packets
|
|
#
|
|
self.vapi.cli("clear trace")
|
|
tx = self.create_stream_ip4(self.pg0, "1.1.1.1", "232.1.1.1", payload_size=1024)
|
|
self.pg0.add_stream(tx)
|
|
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
self.pg_start()
|
|
|
|
# We expect replications on Pg1->7
|
|
self.verify_capture_ip4(self.pg1, tx)
|
|
self.verify_capture_ip4(self.pg2, tx)
|
|
|
|
self.assertEqual(route_1_1_1_1_232_1_1_1.get_stats()["packets"], 2 * len(tx))
|
|
|
|
# no replications on Pg0
|
|
self.pg0.assert_nothing_captured(remark="IP multicast packets forwarded on PG0")
|
|
self.pg3.assert_nothing_captured(remark="IP multicast packets forwarded on PG3")
|
|
|
|
#
|
|
# a stream to the unicast next-hops
|
|
#
|
|
self.vapi.cli("clear trace")
|
|
tx = self.create_stream_ip4(self.pg0, "1.1.1.1", "232.1.1.2")
|
|
self.pg0.add_stream(tx)
|
|
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
self.pg_start()
|
|
|
|
# We expect replications on Pg1->7
|
|
self.verify_capture_ip4(self.pg1, tx, dst_mac=self.pg1.remote_mac)
|
|
self.verify_capture_ip4(self.pg2, tx, dst_mac=self.pg2.remote_mac)
|
|
|
|
# no replications on Pg0 nor pg3
|
|
self.pg0.assert_nothing_captured(remark="IP multicast packets forwarded on PG0")
|
|
self.pg3.assert_nothing_captured(remark="IP multicast packets forwarded on PG3")
|
|
|
|
#
|
|
# a stream that matches the route for (*,232.0.0.0/8)
|
|
# Send packets with the 9th bit set so we test the correct clearing
|
|
# of that bit in the mac rewrite
|
|
#
|
|
self.vapi.cli("clear trace")
|
|
tx = self.create_stream_ip4(self.pg0, "1.1.1.1", "232.255.255.255")
|
|
self.pg0.add_stream(tx)
|
|
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
self.pg_start()
|
|
|
|
# We expect replications on Pg1 only
|
|
self.verify_capture_ip4(self.pg1, tx)
|
|
self.assertEqual(route_232.get_stats()["packets"], len(tx))
|
|
|
|
# no replications on Pg0, Pg2 not Pg3
|
|
self.pg0.assert_nothing_captured(remark="IP multicast packets forwarded on PG0")
|
|
self.pg2.assert_nothing_captured(remark="IP multicast packets forwarded on PG2")
|
|
self.pg3.assert_nothing_captured(remark="IP multicast packets forwarded on PG3")
|
|
|
|
#
|
|
# a stream that matches the route for (*,232.1.1.1)
|
|
#
|
|
self.vapi.cli("clear trace")
|
|
tx = self.create_stream_ip4(self.pg0, "1.1.1.2", "232.1.1.1")
|
|
self.pg0.add_stream(tx)
|
|
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
self.pg_start()
|
|
|
|
# We expect replications on Pg1->7
|
|
self.verify_capture_ip4(self.pg1, tx)
|
|
self.verify_capture_ip4(self.pg2, tx)
|
|
self.verify_capture_ip4(self.pg3, tx)
|
|
self.verify_capture_ip4(self.pg4, tx)
|
|
self.verify_capture_ip4(self.pg5, tx)
|
|
self.verify_capture_ip4(self.pg6, tx)
|
|
self.verify_capture_ip4(self.pg7, tx)
|
|
|
|
# no replications on Pg0
|
|
self.pg0.assert_nothing_captured(remark="IP multicast packets forwarded on PG0")
|
|
|
|
self.vapi.cli("packet mac-filter pg0 off")
|
|
self.vapi.cli("packet mac-filter pg1 off")
|
|
self.vapi.cli("packet mac-filter pg2 off")
|
|
self.vapi.cli("packet mac-filter pg4 off")
|
|
self.vapi.cli("packet mac-filter pg5 off")
|
|
self.vapi.cli("packet mac-filter pg6 off")
|
|
self.vapi.cli("packet mac-filter pg7 off")
|
|
|
|
def test_ip6_mcast(self):
|
|
"""IPv6 Multicast Replication"""
|
|
|
|
MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t
|
|
MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t
|
|
|
|
self.vapi.cli("packet mac-filter pg0 on")
|
|
self.vapi.cli("packet mac-filter pg1 on")
|
|
self.vapi.cli("packet mac-filter pg2 on")
|
|
self.vapi.cli("packet mac-filter pg4 on")
|
|
self.vapi.cli("packet mac-filter pg5 on")
|
|
self.vapi.cli("packet mac-filter pg6 on")
|
|
self.vapi.cli("packet mac-filter pg7 on")
|
|
#
|
|
# a stream that matches the default route. gets dropped.
|
|
#
|
|
self.vapi.cli("clear trace")
|
|
tx = self.create_stream_ip6(self.pg0, "2001::1", "ff01::1")
|
|
self.pg0.add_stream(tx)
|
|
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
self.pg_start()
|
|
|
|
self.pg0.assert_nothing_captured(
|
|
remark="IPv6 multicast packets forwarded on default route"
|
|
)
|
|
|
|
#
|
|
# A (*,G).
|
|
# one accepting interface, pg0, 3 forwarding interfaces
|
|
#
|
|
route_ff01_1 = VppIpMRoute(
|
|
self,
|
|
"::",
|
|
"ff01::1",
|
|
128,
|
|
MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE,
|
|
[
|
|
VppMRoutePath(
|
|
self.pg0.sw_if_index,
|
|
MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT,
|
|
proto=FibPathProto.FIB_PATH_NH_PROTO_IP6,
|
|
),
|
|
VppMRoutePath(
|
|
self.pg1.sw_if_index,
|
|
MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD,
|
|
proto=FibPathProto.FIB_PATH_NH_PROTO_IP6,
|
|
),
|
|
VppMRoutePath(
|
|
self.pg2.sw_if_index,
|
|
MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD,
|
|
proto=FibPathProto.FIB_PATH_NH_PROTO_IP6,
|
|
),
|
|
VppMRoutePath(
|
|
self.pg3.sw_if_index,
|
|
MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD,
|
|
proto=FibPathProto.FIB_PATH_NH_PROTO_IP6,
|
|
),
|
|
],
|
|
)
|
|
route_ff01_1.add_vpp_config()
|
|
|
|
#
|
|
# An (S,G).
|
|
# one accepting interface, pg0, 2 forwarding interfaces
|
|
#
|
|
route_2001_ff01_1 = VppIpMRoute(
|
|
self,
|
|
"2001::1",
|
|
"ff01::1",
|
|
0, # any grp-len is ok when src is set
|
|
MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE,
|
|
[
|
|
VppMRoutePath(
|
|
self.pg0.sw_if_index,
|
|
MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT,
|
|
proto=FibPathProto.FIB_PATH_NH_PROTO_IP6,
|
|
),
|
|
VppMRoutePath(
|
|
self.pg1.sw_if_index,
|
|
MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD,
|
|
proto=FibPathProto.FIB_PATH_NH_PROTO_IP6,
|
|
),
|
|
VppMRoutePath(
|
|
self.pg2.sw_if_index,
|
|
MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD,
|
|
proto=FibPathProto.FIB_PATH_NH_PROTO_IP6,
|
|
),
|
|
],
|
|
)
|
|
route_2001_ff01_1.add_vpp_config()
|
|
|
|
#
|
|
# An (*,G/m).
|
|
# one accepting interface, pg0, 1 forwarding interface
|
|
#
|
|
route_ff01 = VppIpMRoute(
|
|
self,
|
|
"::",
|
|
"ff01::",
|
|
16,
|
|
MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE,
|
|
[
|
|
VppMRoutePath(
|
|
self.pg0.sw_if_index,
|
|
MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT,
|
|
proto=FibPathProto.FIB_PATH_NH_PROTO_IP6,
|
|
),
|
|
VppMRoutePath(
|
|
self.pg1.sw_if_index,
|
|
MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD,
|
|
proto=FibPathProto.FIB_PATH_NH_PROTO_IP6,
|
|
),
|
|
],
|
|
)
|
|
route_ff01.add_vpp_config()
|
|
|
|
#
|
|
# a stream that matches the route for (*, ff01::/16)
|
|
# sent on the non-accepting interface
|
|
#
|
|
self.vapi.cli("clear trace")
|
|
tx = self.create_stream_ip6(self.pg1, "2002::1", "ff01:2::255")
|
|
self.send_and_assert_no_replies(self.pg1, tx, "RPF miss")
|
|
count = self.statistics.get_err_counter("/err/ip6-input/rpf_failure")
|
|
self.assertEqual(count, 2 * len(tx))
|
|
|
|
#
|
|
# a stream that matches the route for (*, ff01::/16)
|
|
# sent on the accepting interface
|
|
#
|
|
self.vapi.cli("clear trace")
|
|
tx = self.create_stream_ip6(self.pg0, "2002::1", "ff01:2::255")
|
|
self.pg0.add_stream(tx)
|
|
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
self.pg_start()
|
|
|
|
# We expect replications on Pg1
|
|
self.verify_capture_ip6(self.pg1, tx)
|
|
|
|
# no replications on Pg0, Pg3
|
|
self.pg0.assert_nothing_captured(remark="IP multicast packets forwarded on PG0")
|
|
self.pg2.assert_nothing_captured(remark="IP multicast packets forwarded on PG2")
|
|
self.pg3.assert_nothing_captured(remark="IP multicast packets forwarded on PG3")
|
|
|
|
#
|
|
# Bounce the interface and it should still work
|
|
#
|
|
self.pg1.admin_down()
|
|
self.pg0.add_stream(tx)
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
self.pg_start()
|
|
self.pg1.assert_nothing_captured(
|
|
remark="IP multicast packets forwarded on down PG1"
|
|
)
|
|
|
|
self.pg1.admin_up()
|
|
self.pg0.add_stream(tx)
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
self.pg_start()
|
|
self.verify_capture_ip6(self.pg1, tx)
|
|
|
|
#
|
|
# a stream that matches the route for (*,ff01::1)
|
|
#
|
|
self.vapi.cli("clear trace")
|
|
tx = self.create_stream_ip6(self.pg0, "2002::2", "ff01::1")
|
|
self.pg0.add_stream(tx)
|
|
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
self.pg_start()
|
|
|
|
# We expect replications on Pg1, 2, 3.
|
|
self.verify_capture_ip6(self.pg1, tx)
|
|
self.verify_capture_ip6(self.pg2, tx)
|
|
self.verify_capture_ip6(self.pg3, tx)
|
|
|
|
# no replications on Pg0
|
|
self.pg0.assert_nothing_captured(
|
|
remark="IPv6 multicast packets forwarded on PG0"
|
|
)
|
|
|
|
#
|
|
# a stream that matches the route for (2001::1, ff00::1)
|
|
#
|
|
self.vapi.cli("clear trace")
|
|
tx = self.create_stream_ip6(self.pg0, "2001::1", "ff01::1")
|
|
self.pg0.add_stream(tx)
|
|
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
self.pg_start()
|
|
|
|
# We expect replications on Pg1, 2,
|
|
self.verify_capture_ip6(self.pg1, tx)
|
|
self.verify_capture_ip6(self.pg2, tx)
|
|
|
|
# no replications on Pg0, Pg3
|
|
self.pg0.assert_nothing_captured(remark="IP multicast packets forwarded on PG0")
|
|
self.pg3.assert_nothing_captured(remark="IP multicast packets forwarded on PG3")
|
|
|
|
self.vapi.cli("packet mac-filter pg0 off")
|
|
self.vapi.cli("packet mac-filter pg1 off")
|
|
self.vapi.cli("packet mac-filter pg2 off")
|
|
self.vapi.cli("packet mac-filter pg4 off")
|
|
self.vapi.cli("packet mac-filter pg5 off")
|
|
self.vapi.cli("packet mac-filter pg6 off")
|
|
self.vapi.cli("packet mac-filter pg7 off")
|
|
|
|
def _mcast_connected_send_stream(self, dst_ip):
|
|
self.vapi.cli("clear trace")
|
|
tx = self.create_stream_ip4(self.pg0, self.pg0.remote_ip4, dst_ip)
|
|
self.pg0.add_stream(tx)
|
|
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
self.pg_start()
|
|
|
|
# We expect replications on Pg1.
|
|
self.verify_capture_ip4(self.pg1, tx)
|
|
|
|
return tx
|
|
|
|
def test_ip_mcast_connected(self):
|
|
"""IP Multicast Connected Source check"""
|
|
|
|
MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t
|
|
MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t
|
|
|
|
#
|
|
# A (*,G).
|
|
# one accepting interface, pg0, 1 forwarding interfaces
|
|
#
|
|
route_232_1_1_1 = VppIpMRoute(
|
|
self,
|
|
"0.0.0.0",
|
|
"232.1.1.1",
|
|
32,
|
|
MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE,
|
|
[
|
|
VppMRoutePath(
|
|
self.pg0.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT
|
|
),
|
|
VppMRoutePath(
|
|
self.pg1.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD
|
|
),
|
|
],
|
|
)
|
|
|
|
route_232_1_1_1.add_vpp_config()
|
|
route_232_1_1_1.update_entry_flags(
|
|
MRouteEntryFlags.MFIB_API_ENTRY_FLAG_CONNECTED
|
|
)
|
|
|
|
#
|
|
# Now the (*,G) is present, send from connected source
|
|
#
|
|
tx = self._mcast_connected_send_stream("232.1.1.1")
|
|
|
|
#
|
|
# Constrct a representation of the signal we expect on pg0
|
|
#
|
|
signal_232_1_1_1_itf_0 = VppMFibSignal(
|
|
self, route_232_1_1_1, self.pg0.sw_if_index, tx[0]
|
|
)
|
|
|
|
#
|
|
# read the only expected signal
|
|
#
|
|
signals = self.vapi.mfib_signal_dump()
|
|
|
|
self.assertEqual(1, len(signals))
|
|
|
|
signal_232_1_1_1_itf_0.compare(signals[0])
|
|
|
|
#
|
|
# reading the signal allows for the generation of another
|
|
# so send more packets and expect the next signal
|
|
#
|
|
tx = self._mcast_connected_send_stream("232.1.1.1")
|
|
|
|
signals = self.vapi.mfib_signal_dump()
|
|
self.assertEqual(1, len(signals))
|
|
signal_232_1_1_1_itf_0.compare(signals[0])
|
|
|
|
#
|
|
# A Second entry with connected check
|
|
# one accepting interface, pg0, 1 forwarding interfaces
|
|
#
|
|
route_232_1_1_2 = VppIpMRoute(
|
|
self,
|
|
"0.0.0.0",
|
|
"232.1.1.2",
|
|
32,
|
|
MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE,
|
|
[
|
|
VppMRoutePath(
|
|
self.pg0.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT
|
|
),
|
|
VppMRoutePath(
|
|
self.pg1.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD
|
|
),
|
|
],
|
|
)
|
|
|
|
route_232_1_1_2.add_vpp_config()
|
|
route_232_1_1_2.update_entry_flags(
|
|
MRouteEntryFlags.MFIB_API_ENTRY_FLAG_CONNECTED
|
|
)
|
|
|
|
#
|
|
# Send traffic to both entries. One read should net us two signals
|
|
#
|
|
signal_232_1_1_2_itf_0 = VppMFibSignal(
|
|
self, route_232_1_1_2, self.pg0.sw_if_index, tx[0]
|
|
)
|
|
tx = self._mcast_connected_send_stream("232.1.1.1")
|
|
tx2 = self._mcast_connected_send_stream("232.1.1.2")
|
|
|
|
#
|
|
# read the only expected signal
|
|
#
|
|
signals = self.vapi.mfib_signal_dump()
|
|
|
|
self.assertEqual(2, len(signals))
|
|
|
|
signal_232_1_1_1_itf_0.compare(signals[1])
|
|
signal_232_1_1_2_itf_0.compare(signals[0])
|
|
|
|
route_232_1_1_1.update_entry_flags(MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE)
|
|
route_232_1_1_2.update_entry_flags(MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE)
|
|
|
|
def test_ip_mcast_signal(self):
|
|
"""IP Multicast Signal"""
|
|
|
|
MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t
|
|
MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t
|
|
|
|
#
|
|
# A (*,G).
|
|
# one accepting interface, pg0, 1 forwarding interfaces
|
|
#
|
|
route_232_1_1_1 = VppIpMRoute(
|
|
self,
|
|
"0.0.0.0",
|
|
"232.1.1.1",
|
|
32,
|
|
MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE,
|
|
[
|
|
VppMRoutePath(
|
|
self.pg0.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT
|
|
),
|
|
VppMRoutePath(
|
|
self.pg1.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD
|
|
),
|
|
],
|
|
)
|
|
|
|
route_232_1_1_1.add_vpp_config()
|
|
|
|
route_232_1_1_1.update_entry_flags(MRouteEntryFlags.MFIB_API_ENTRY_FLAG_SIGNAL)
|
|
|
|
#
|
|
# Now the (*,G) is present, send from connected source
|
|
#
|
|
tx = self._mcast_connected_send_stream("232.1.1.1")
|
|
|
|
#
|
|
# Constrct a representation of the signal we expect on pg0
|
|
#
|
|
signal_232_1_1_1_itf_0 = VppMFibSignal(
|
|
self, route_232_1_1_1, self.pg0.sw_if_index, tx[0]
|
|
)
|
|
|
|
#
|
|
# read the only expected signal
|
|
#
|
|
signals = self.vapi.mfib_signal_dump()
|
|
|
|
self.assertEqual(1, len(signals))
|
|
|
|
signal_232_1_1_1_itf_0.compare(signals[0])
|
|
|
|
#
|
|
# reading the signal allows for the generation of another
|
|
# so send more packets and expect the next signal
|
|
#
|
|
tx = self._mcast_connected_send_stream("232.1.1.1")
|
|
|
|
signals = self.vapi.mfib_signal_dump()
|
|
self.assertEqual(1, len(signals))
|
|
signal_232_1_1_1_itf_0.compare(signals[0])
|
|
|
|
#
|
|
# Set the negate-signal on the accepting interval - the signals
|
|
# should stop
|
|
#
|
|
route_232_1_1_1.update_path_flags(
|
|
self.pg0.sw_if_index,
|
|
(
|
|
MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT
|
|
| MRouteItfFlags.MFIB_API_ITF_FLAG_NEGATE_SIGNAL
|
|
),
|
|
)
|
|
|
|
self.vapi.cli("clear trace")
|
|
tx = self._mcast_connected_send_stream("232.1.1.1")
|
|
|
|
signals = self.vapi.mfib_signal_dump()
|
|
self.assertEqual(0, len(signals))
|
|
|
|
#
|
|
# Clear the SIGNAL flag on the entry and the signals should
|
|
# come back since the interface is still NEGATE-SIGNAL
|
|
#
|
|
route_232_1_1_1.update_entry_flags(MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE)
|
|
|
|
tx = self._mcast_connected_send_stream("232.1.1.1")
|
|
|
|
signals = self.vapi.mfib_signal_dump()
|
|
self.assertEqual(1, len(signals))
|
|
signal_232_1_1_1_itf_0.compare(signals[0])
|
|
|
|
#
|
|
# Lastly remove the NEGATE-SIGNAL from the interface and the
|
|
# signals should stop
|
|
#
|
|
route_232_1_1_1.update_path_flags(
|
|
self.pg0.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT
|
|
)
|
|
|
|
tx = self._mcast_connected_send_stream("232.1.1.1")
|
|
signals = self.vapi.mfib_signal_dump()
|
|
self.assertEqual(0, len(signals))
|
|
|
|
@unittest.skipIf(
|
|
"ping" in config.excluded_plugins, "Exclude tests requiring Ping plugin"
|
|
)
|
|
def test_ip_mcast_vrf(self):
|
|
"""IP Multicast Replication in non-default table"""
|
|
|
|
MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t
|
|
MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t
|
|
|
|
#
|
|
# An (S,G).
|
|
# one accepting interface, pg0, 2 forwarding interfaces
|
|
#
|
|
route_1_1_1_1_232_1_1_1 = VppIpMRoute(
|
|
self,
|
|
"1.1.1.1",
|
|
"232.1.1.1",
|
|
64,
|
|
MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE,
|
|
[
|
|
VppMRoutePath(
|
|
self.pg8.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT
|
|
),
|
|
VppMRoutePath(
|
|
self.pg1.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD
|
|
),
|
|
VppMRoutePath(
|
|
self.pg2.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD
|
|
),
|
|
],
|
|
table_id=10,
|
|
)
|
|
route_1_1_1_1_232_1_1_1.add_vpp_config()
|
|
|
|
#
|
|
# a stream that matches the route for (1.1.1.1,232.1.1.1)
|
|
# small packets
|
|
#
|
|
self.vapi.cli("clear trace")
|
|
tx = self.create_stream_ip4(self.pg8, "1.1.1.1", "232.1.1.1")
|
|
self.pg8.add_stream(tx)
|
|
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
self.pg_start()
|
|
|
|
# We expect replications on Pg1 & 2
|
|
self.verify_capture_ip4(self.pg1, tx)
|
|
self.verify_capture_ip4(self.pg2, tx)
|
|
|
|
#
|
|
# An (S,G). for for-us
|
|
#
|
|
route_0_0_0_0_224_0_0_5 = VppIpMRoute(
|
|
self,
|
|
"0.0.0.0",
|
|
"224.0.0.5",
|
|
32,
|
|
MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE,
|
|
[
|
|
VppMRoutePath(
|
|
self.pg8.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT
|
|
),
|
|
VppMRoutePath(
|
|
0xFFFFFFFF,
|
|
MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD,
|
|
type=FibPathType.FIB_PATH_TYPE_LOCAL,
|
|
),
|
|
],
|
|
table_id=10,
|
|
)
|
|
route_0_0_0_0_224_0_0_5.add_vpp_config()
|
|
|
|
#
|
|
# a stream that matches the route for (0.0.0.0, 224.0.0.5)
|
|
# small packets
|
|
#
|
|
self.vapi.cli("clear trace")
|
|
self.pg8.resolve_arp()
|
|
|
|
#
|
|
# send a ping to mcast address from peer on pg8
|
|
# expect a response
|
|
#
|
|
icmp_id = 0xB
|
|
icmp_seq = 5
|
|
icmp_load = b"\x0a" * 18
|
|
tx = (
|
|
Ether(dst=getmacbyip("224.0.0.5"), src=self.pg8.remote_mac)
|
|
/ IP(src=self.pg8.remote_ip4, dst="224.0.0.5")
|
|
/ ICMP(id=icmp_id, seq=icmp_seq)
|
|
/ Raw(load=icmp_load)
|
|
) * 2
|
|
|
|
self.send_and_expect(self.pg8, tx, self.pg8)
|
|
|
|
@unittest.skipIf(
|
|
"gre" in config.excluded_plugins, "Exclude tests requiring GRE plugin"
|
|
)
|
|
def test_ip_mcast_gre(self):
|
|
"""IP Multicast Replication over GRE"""
|
|
|
|
MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t
|
|
MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t
|
|
|
|
gre_if_1 = VppGreInterface(
|
|
self, self.pg1.local_ip4, self.pg1.remote_ip4
|
|
).add_vpp_config()
|
|
gre_if_2 = VppGreInterface(
|
|
self, self.pg2.local_ip4, self.pg2.remote_ip4
|
|
).add_vpp_config()
|
|
gre_if_3 = VppGreInterface(
|
|
self, self.pg3.local_ip4, self.pg3.remote_ip4
|
|
).add_vpp_config()
|
|
|
|
gre_if_1.admin_up()
|
|
gre_if_1.config_ip4()
|
|
gre_if_2.admin_up()
|
|
gre_if_2.config_ip4()
|
|
gre_if_3.admin_up()
|
|
gre_if_3.config_ip4()
|
|
|
|
#
|
|
# An (S,G).
|
|
# one accepting interface, pg0, 2 forwarding interfaces
|
|
#
|
|
route_1_1_1_1_232_1_1_1 = VppIpMRoute(
|
|
self,
|
|
"1.1.1.1",
|
|
"232.2.2.2",
|
|
64,
|
|
MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE,
|
|
[
|
|
VppMRoutePath(
|
|
gre_if_1.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT
|
|
),
|
|
VppMRoutePath(
|
|
gre_if_2.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD
|
|
),
|
|
VppMRoutePath(
|
|
gre_if_3.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD
|
|
),
|
|
],
|
|
)
|
|
route_1_1_1_1_232_1_1_1.add_vpp_config()
|
|
|
|
#
|
|
# a stream that matches the route for (1.1.1.1,232.2.2.2)
|
|
# small packets
|
|
#
|
|
tx = (
|
|
Ether(dst=self.pg1.local_mac, src=self.pg1.remote_mac)
|
|
/ IP(src=self.pg1.remote_ip4, dst=self.pg1.local_ip4)
|
|
/ GRE()
|
|
/ IP(src="1.1.1.1", dst="232.2.2.2")
|
|
/ UDP(sport=1234, dport=1234)
|
|
/ Raw(b"\a5" * 64)
|
|
) * 63
|
|
|
|
self.vapi.cli("clear trace")
|
|
self.pg1.add_stream(tx)
|
|
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
self.pg_start()
|
|
|
|
# We expect replications on Pg2 & 3
|
|
# check the encap headers are as expected based on the egress tunnel
|
|
rxs = self.pg2.get_capture(len(tx))
|
|
for rx in rxs:
|
|
self.assertEqual(rx[IP].src, gre_if_2.t_src)
|
|
self.assertEqual(rx[IP].dst, gre_if_2.t_dst)
|
|
self.assert_packet_checksums_valid(rx)
|
|
|
|
rxs = self.pg3.get_capture(len(tx))
|
|
for rx in rxs:
|
|
self.assertEqual(rx[IP].src, gre_if_3.t_src)
|
|
self.assertEqual(rx[IP].dst, gre_if_3.t_dst)
|
|
self.assert_packet_checksums_valid(rx)
|
|
|
|
@unittest.skipIf(
|
|
"gre" in config.excluded_plugins, "Exclude tests requiring GRE plugin"
|
|
)
|
|
def test_ip6_mcast_gre(self):
|
|
"""IP6 Multicast Replication over GRE"""
|
|
|
|
MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t
|
|
MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t
|
|
|
|
gre_if_1 = VppGreInterface(
|
|
self, self.pg1.local_ip4, self.pg1.remote_ip4
|
|
).add_vpp_config()
|
|
gre_if_2 = VppGreInterface(
|
|
self, self.pg2.local_ip4, self.pg2.remote_ip4
|
|
).add_vpp_config()
|
|
gre_if_3 = VppGreInterface(
|
|
self, self.pg3.local_ip4, self.pg3.remote_ip4
|
|
).add_vpp_config()
|
|
|
|
gre_if_1.admin_up()
|
|
gre_if_1.config_ip6()
|
|
gre_if_2.admin_up()
|
|
gre_if_2.config_ip6()
|
|
gre_if_3.admin_up()
|
|
gre_if_3.config_ip6()
|
|
|
|
#
|
|
# An (S,G).
|
|
# one accepting interface, pg0, 2 forwarding interfaces
|
|
#
|
|
route_1_1_FF_1 = VppIpMRoute(
|
|
self,
|
|
"1::1",
|
|
"FF00::1",
|
|
256,
|
|
MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE,
|
|
[
|
|
VppMRoutePath(
|
|
gre_if_1.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT
|
|
),
|
|
VppMRoutePath(
|
|
gre_if_2.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD
|
|
),
|
|
VppMRoutePath(
|
|
gre_if_3.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD
|
|
),
|
|
],
|
|
)
|
|
route_1_1_FF_1.add_vpp_config()
|
|
|
|
#
|
|
# a stream that matches the route for (1::1, FF::1)
|
|
# small packets
|
|
#
|
|
tx = (
|
|
Ether(dst=self.pg1.local_mac, src=self.pg1.remote_mac)
|
|
/ IP(src=self.pg1.remote_ip4, dst=self.pg1.local_ip4)
|
|
/ GRE()
|
|
/ IPv6(src="1::1", dst="FF00::1")
|
|
/ UDP(sport=1234, dport=1234)
|
|
/ Raw(b"\a5" * 64)
|
|
) * 63
|
|
|
|
self.vapi.cli("clear trace")
|
|
self.pg1.add_stream(tx)
|
|
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
self.pg_start()
|
|
|
|
# We expect replications on Pg2 & 3
|
|
# check the encap headers are as expected based on the egress tunnel
|
|
rxs = self.pg2.get_capture(len(tx))
|
|
for rx in rxs:
|
|
self.assertEqual(rx[IP].src, gre_if_2.t_src)
|
|
self.assertEqual(rx[IP].dst, gre_if_2.t_dst)
|
|
self.assert_packet_checksums_valid(rx)
|
|
|
|
rxs = self.pg3.get_capture(len(tx))
|
|
for rx in rxs:
|
|
self.assertEqual(rx[IP].src, gre_if_3.t_src)
|
|
self.assertEqual(rx[IP].dst, gre_if_3.t_dst)
|
|
self.assert_packet_checksums_valid(rx)
|
|
|
|
def test_ip6_mcast_vrf(self):
|
|
"""IPv6 Multicast Replication in non-default table"""
|
|
|
|
MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t
|
|
MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t
|
|
|
|
#
|
|
# An (S,G).
|
|
# one accepting interface, pg0, 2 forwarding interfaces
|
|
#
|
|
route_2001_ff01_1 = VppIpMRoute(
|
|
self,
|
|
"2001::1",
|
|
"ff01::1",
|
|
256,
|
|
MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE,
|
|
[
|
|
VppMRoutePath(
|
|
self.pg8.sw_if_index,
|
|
MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT,
|
|
proto=FibPathProto.FIB_PATH_NH_PROTO_IP6,
|
|
),
|
|
VppMRoutePath(
|
|
self.pg1.sw_if_index,
|
|
MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD,
|
|
proto=FibPathProto.FIB_PATH_NH_PROTO_IP6,
|
|
),
|
|
VppMRoutePath(
|
|
self.pg2.sw_if_index,
|
|
MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD,
|
|
proto=FibPathProto.FIB_PATH_NH_PROTO_IP6,
|
|
),
|
|
],
|
|
table_id=10,
|
|
)
|
|
route_2001_ff01_1.add_vpp_config()
|
|
|
|
#
|
|
# a stream that matches the route for (2001::1, ff00::1)
|
|
#
|
|
self.vapi.cli("clear trace")
|
|
tx = self.create_stream_ip6(self.pg8, "2001::1", "ff01::1")
|
|
self.pg8.add_stream(tx)
|
|
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
self.pg_start()
|
|
|
|
# We expect replications on Pg1, 2,
|
|
self.verify_capture_ip6(self.pg1, tx)
|
|
self.verify_capture_ip6(self.pg2, tx)
|
|
|
|
def test_bidir(self):
|
|
"""IP Multicast Bi-directional"""
|
|
|
|
MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t
|
|
MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t
|
|
|
|
#
|
|
# A (*,G). The set of accepting interfaces matching the forwarding
|
|
#
|
|
route_232_1_1_1 = VppIpMRoute(
|
|
self,
|
|
"0.0.0.0",
|
|
"232.1.1.1",
|
|
32,
|
|
MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE,
|
|
[
|
|
VppMRoutePath(
|
|
self.pg0.sw_if_index,
|
|
MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT
|
|
| MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD,
|
|
),
|
|
VppMRoutePath(
|
|
self.pg1.sw_if_index,
|
|
MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT
|
|
| MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD,
|
|
),
|
|
VppMRoutePath(
|
|
self.pg2.sw_if_index,
|
|
MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT
|
|
| MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD,
|
|
),
|
|
VppMRoutePath(
|
|
self.pg3.sw_if_index,
|
|
MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT
|
|
| MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD,
|
|
),
|
|
],
|
|
)
|
|
route_232_1_1_1.add_vpp_config()
|
|
|
|
tx = self.create_stream_ip4(self.pg0, "1.1.1.1", "232.1.1.1")
|
|
self.pg0.add_stream(tx)
|
|
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
self.pg_start()
|
|
|
|
# We expect replications on Pg1, 2, 3, but not on pg0
|
|
self.verify_capture_ip4(self.pg1, tx)
|
|
self.verify_capture_ip4(self.pg2, tx)
|
|
self.verify_capture_ip4(self.pg3, tx)
|
|
self.pg0.assert_nothing_captured(remark="IP multicast packets forwarded on PG0")
|
|
|
|
|
|
if __name__ == "__main__":
|
|
unittest.main(testRunner=VppTestRunner)
|