vpp/test/test_ipsec_api.py
Dave Wallace 8800f732f8 tests: refactor asf framework code
- Make framework.py classes a subset of asfframework.py classes
- Remove all packet related code from asfframework.py
- Add test class and test case set up debug output to log
- Repatriate packet tests from asf to test directory
- Remove non-packet related code from framework.py and
  inherit them from asfframework.py classes
- Clean up unused import variables
- Re-enable BFD tests on Ubuntu 22.04 and fix
  intermittent test failures in echo_looped_back
  testcases (where # control packets verified but
  not guaranteed to be received during test)
- Re-enable Wireguard tests on Ubuntu 22.04 and fix
  intermittent test failures in handshake ratelimiting
  testcases and event testcase
- Run Wiregard testcase suites solo
- Improve debug output in log.txt
- Increase VCL/LDP post sleep timeout to allow iperf server
  to finish cleanly.
- Fix pcap history files to be sorted by suite and testcase
  and ensure order/timestamp is correct based on creation
  in the testcase.
- Decode pcap files for each suite and testcase for all
  errors or if configured via comandline option / env var
- Improve vpp corefile detection to allow complete corefile
  generation
- Disable vm vpp interfaces testcases on debian11
- Clean up failed unittest dir when retrying failed testcases
  and unify testname directory and failed linknames into
  framwork functions

Type: test

Change-Id: I0764f79ea5bb639d278bf635ed2408d4d5220e1e
Signed-off-by: Dave Wallace <dwallacelf@gmail.com>
2023-11-03 05:06:43 +00:00

160 lines
5.4 KiB
Python

import unittest
from framework import VppTestCase
from asfframework import VppTestRunner
from template_ipsec import IPsecIPv4Params
from vpp_papi import VppEnum
from vpp_ipsec import VppIpsecSA
class IpsecApiTestCase(VppTestCase):
"""IPSec API tests"""
vpp_worker_count = 2
@classmethod
def setUpClass(cls):
super(IpsecApiTestCase, cls).setUpClass()
@classmethod
def tearDownClass(cls):
super(IpsecApiTestCase, cls).tearDownClass()
def setUp(self):
super(IpsecApiTestCase, self).setUp()
self.create_pg_interfaces([0])
self.pg0.config_ip4()
self.pg0.admin_up()
self.vpp_esp_protocol = VppEnum.vl_api_ipsec_proto_t.IPSEC_API_PROTO_ESP
self.vpp_ah_protocol = VppEnum.vl_api_ipsec_proto_t.IPSEC_API_PROTO_AH
self.ipv4_params = IPsecIPv4Params()
def tearDown(self):
self.pg0.unconfig_ip4()
self.pg0.admin_down()
super(IpsecApiTestCase, self).tearDown()
def test_backend_dump(self):
"""backend dump"""
d = self.vapi.ipsec_backend_dump()
self.assert_equal(len(d), 2, "number of ipsec backends in dump")
self.assert_equal(
d[0].protocol, self.vpp_ah_protocol, "ipsec protocol in dump entry"
)
self.assert_equal(d[0].index, 0, "index in dump entry")
self.assert_equal(d[0].active, 1, "active flag in dump entry")
self.assert_equal(
d[1].protocol, self.vpp_esp_protocol, "ipsec protocol in dump entry"
)
self.assert_equal(d[1].index, 0, "index in dump entry")
self.assert_equal(d[1].active, 1, "active flag in dump entry")
def test_select_valid_backend(self):
"""select valid backend"""
self.vapi.ipsec_select_backend(self.vpp_ah_protocol, 0)
self.vapi.ipsec_select_backend(self.vpp_esp_protocol, 0)
def test_select_invalid_backend(self):
"""select invalid backend"""
with self.vapi.assert_negative_api_retval():
self.vapi.ipsec_select_backend(self.vpp_ah_protocol, 200)
with self.vapi.assert_negative_api_retval():
self.vapi.ipsec_select_backend(self.vpp_esp_protocol, 200)
def test_select_backend_in_use(self):
"""attempt to change backend while sad configured"""
params = self.ipv4_params
addr_type = params.addr_type
is_ipv6 = params.is_ipv6
scapy_tun_sa_id = params.scapy_tun_sa_id
scapy_tun_spi = params.scapy_tun_spi
auth_algo_vpp_id = params.auth_algo_vpp_id
auth_key = params.auth_key
crypt_algo_vpp_id = params.crypt_algo_vpp_id
crypt_key = params.crypt_key
self.vapi.ipsec_sad_entry_add_del(
is_add=1,
entry={
"sad_id": scapy_tun_sa_id,
"spi": scapy_tun_spi,
"integrity_algorithm": auth_algo_vpp_id,
"integrity_key": {
"data": auth_key,
"length": len(auth_key),
},
"crypto_algorithm": crypt_algo_vpp_id,
"crypto_key": {
"data": crypt_key,
"length": len(crypt_key),
},
"protocol": self.vpp_ah_protocol,
"tunnel_src": self.pg0.local_addr[addr_type],
"tunnel_dst": self.pg0.remote_addr[addr_type],
},
)
with self.vapi.assert_negative_api_retval():
self.vapi.ipsec_select_backend(protocol=self.vpp_ah_protocol, index=0)
self.vapi.ipsec_sad_entry_add_del(
is_add=0,
entry={
"sad_id": scapy_tun_sa_id,
"spi": scapy_tun_spi,
"integrity_algorithm": auth_algo_vpp_id,
"integrity_key": {
"data": auth_key,
"length": len(auth_key),
},
"crypto_algorithm": crypt_algo_vpp_id,
"crypto_key": {
"data": crypt_key,
"length": len(crypt_key),
},
"protocol": self.vpp_ah_protocol,
"tunnel_src": self.pg0.local_addr[addr_type],
"tunnel_dst": self.pg0.remote_addr[addr_type],
},
)
self.vapi.ipsec_select_backend(protocol=self.vpp_ah_protocol, index=0)
def __check_sa_binding(self, sa_id, thread_index):
found_sa = False
sa_dumps = self.vapi.ipsec_sa_v5_dump()
for dump in sa_dumps:
if dump.entry.sad_id == sa_id:
self.assertEqual(dump.thread_index, thread_index)
found_sa = True
break
if not found_sa:
self.fail("SA not found in VPP")
def test_sa_worker_bind(self):
"""Bind an SA to a worker"""
sa = VppIpsecSA(
self,
self.ipv4_params.scapy_tun_sa_id,
self.ipv4_params.scapy_tun_spi,
self.ipv4_params.auth_algo_vpp_id,
self.ipv4_params.auth_key,
self.ipv4_params.crypt_algo_vpp_id,
self.ipv4_params.crypt_key,
VppEnum.vl_api_ipsec_proto_t.IPSEC_API_PROTO_ESP,
)
sa.add_vpp_config()
self.__check_sa_binding(sa.id, 0xFFFF)
self.vapi.ipsec_sad_bind(sa_id=sa.id, worker=1)
self.__check_sa_binding(sa.id, 2)
sa.remove_vpp_config()
if __name__ == "__main__":
unittest.main(testRunner=VppTestRunner)