aboutsummaryrefslogtreecommitdiffstats
path: root/test/test_ip6_vrf_multi_instance.py
diff options
context:
space:
mode:
Diffstat (limited to 'test/test_ip6_vrf_multi_instance.py')
-rw-r--r--test/test_ip6_vrf_multi_instance.py446
1 files changed, 446 insertions, 0 deletions
diff --git a/test/test_ip6_vrf_multi_instance.py b/test/test_ip6_vrf_multi_instance.py
new file mode 100644
index 00000000..8dd228ae
--- /dev/null
+++ b/test/test_ip6_vrf_multi_instance.py
@@ -0,0 +1,446 @@
+#!/usr/bin/env python
+"""IP6 VRF Multi-instance Test Case HLD:
+
+**NOTES:**
+ - higher number of pg-ip6 interfaces causes problems => only 15 pg-ip6 \
+ interfaces in 5 VRFs are tested
+ - jumbo packets in configuration with 15 pg-ip6 interfaces leads to \
+ problems too
+
+**config 1**
+ - add 15 pg-ip6 interfaces
+ - configure 5 hosts per pg-ip6 interface
+ - configure 4 VRFs
+ - add 3 pg-ip6 interfaces per VRF
+
+**test 1**
+ - send IP6 packets between all pg-ip6 interfaces in all VRF groups
+
+**verify 1**
+ - check VRF data by parsing output of ip6_fib_dump API command
+ - all packets received correctly in case of pg-ip6 interfaces in VRF
+ - no packet received in case of pg-ip6 interfaces not in VRF
+
+**config 2**
+ - reset 2 VRFs
+
+**test 2**
+ - send IP6 packets between all pg-ip6 interfaces in all VRF groups
+
+**verify 2**
+ - check VRF data by parsing output of ip6_fib_dump API command
+ - all packets received correctly in case of pg-ip6 interfaces in VRF
+ - no packet received in case of pg-ip6 interfaces not in VRF
+
+**config 3**
+ - add 1 of reset VRFs and 1 new VRF
+
+**test 3**
+ - send IP6 packets between all pg-ip6 interfaces in all VRF groups
+
+**verify 3**
+ - check VRF data by parsing output of ip6_fib_dump API command
+ - all packets received correctly in case of pg-ip6 interfaces in VRF
+ - no packet received in case of pg-ip6 interfaces not in VRF
+
+**config 4**
+ - reset all VRFs (i.e. no VRF except VRF=0 created)
+
+**test 4**
+ - send IP6 packets between all pg-ip6 interfaces in all VRF groups
+
+**verify 4**
+ - check VRF data by parsing output of ip6_fib_dump API command
+ - all packets received correctly in case of pg-ip6 interfaces in VRF
+ - no packet received in case of pg-ip6 interfaces not in VRF
+"""
+
+import unittest
+import random
+import socket
+
+from scapy.packet import Raw
+from scapy.layers.l2 import Ether
+from scapy.layers.inet6 import UDP, IPv6, ICMPv6ND_NS, ICMPv6ND_RA, \
+ RouterAlert, IPv6ExtHdrHopByHop
+from scapy.utils6 import in6_ismaddr, in6_isllsnmaddr, in6_getAddrType
+from scapy.pton_ntop import inet_ntop
+from scapy.data import IPV6_ADDR_UNICAST
+
+from framework import VppTestCase, VppTestRunner
+from util import ppp
+
+# VRF status constants
+VRF_NOT_CONFIGURED = 0
+VRF_CONFIGURED = 1
+VRF_RESET = 2
+
+
+def is_ipv6_misc_ext(p):
+ """ Is packet one of uninteresting IPv6 broadcasts (extended to filter out
+ ICMPv6 Neighbor Discovery - Neighbor Advertisement packets too)? """
+ if p.haslayer(ICMPv6ND_RA):
+ if in6_ismaddr(p[IPv6].dst):
+ return True
+ if p.haslayer(ICMPv6ND_NS):
+ if in6_isllsnmaddr(p[IPv6].dst):
+ return True
+ if p.haslayer(IPv6ExtHdrHopByHop):
+ for o in p[IPv6ExtHdrHopByHop].options:
+ if isinstance(o, RouterAlert):
+ return True
+ return False
+
+
+class TestIP6VrfMultiInst(VppTestCase):
+ """ IP6 VRF Multi-instance Test Case """
+
+ @classmethod
+ def setUpClass(cls):
+ """
+ Perform standard class setup (defined by class method setUpClass in
+ class VppTestCase) before running the test case, set test case related
+ variables and configure VPP.
+ """
+ super(TestIP6VrfMultiInst, cls).setUpClass()
+
+ # Test variables
+ cls.hosts_per_pg = 5
+ cls.nr_of_vrfs = 5
+ cls.pg_ifs_per_vrf = 3
+
+ try:
+ # Create pg interfaces
+ cls.create_pg_interfaces(
+ range(cls.nr_of_vrfs * cls.pg_ifs_per_vrf))
+
+ # Packet flows mapping pg0 -> pg1, pg2 etc.
+ cls.flows = dict()
+ for i in range(len(cls.pg_interfaces)):
+ multiplicand = i / cls.pg_ifs_per_vrf
+ pg_list = [
+ cls.pg_interfaces[multiplicand * cls.pg_ifs_per_vrf + j]
+ for j in range(cls.pg_ifs_per_vrf)
+ if (multiplicand * cls.pg_ifs_per_vrf + j) != i]
+ cls.flows[cls.pg_interfaces[i]] = pg_list
+
+ # Packet sizes - jumbo packet (9018 bytes) skipped
+ cls.pg_if_packet_sizes = [64, 512, 1518]
+
+ # Set up all interfaces
+ for pg_if in cls.pg_interfaces:
+ pg_if.admin_up()
+ pg_if.generate_remote_hosts(cls.hosts_per_pg)
+
+ # Create list of VRFs
+ cls.vrf_list = list()
+
+ # Create list of reset VRFs
+ cls.vrf_reset_list = list()
+
+ # Create list of pg_interfaces in VRFs
+ cls.pg_in_vrf = list()
+
+ # Create list of pg_interfaces not in BDs
+ cls.pg_not_in_vrf = [pg_if for pg_if in cls.pg_interfaces]
+
+ # Create mapping of pg_interfaces to VRF IDs
+ cls.pg_if_by_vrf_id = dict()
+ for i in range(cls.nr_of_vrfs):
+ vrf_id = i + 1
+ pg_list = [
+ cls.pg_interfaces[i * cls.pg_ifs_per_vrf + j]
+ for j in range(cls.pg_ifs_per_vrf)]
+ cls.pg_if_by_vrf_id[vrf_id] = pg_list
+
+ except Exception:
+ super(TestIP6VrfMultiInst, cls).tearDownClass()
+ raise
+
+ def setUp(self):
+ """
+ Clear trace and packet infos before running each test.
+ """
+ super(TestIP6VrfMultiInst, self).setUp()
+ self.reset_packet_infos()
+
+ def tearDown(self):
+ """
+ Show various debug prints after each test.
+ """
+ super(TestIP6VrfMultiInst, self).tearDown()
+ if not self.vpp_dead:
+ self.logger.info(self.vapi.ppcli("show ip6 fib"))
+ self.logger.info(self.vapi.ppcli("show ip6 neighbors"))
+
+ def create_vrf_and_assign_interfaces(self, count, start=1):
+ """
+ Create required number of FIB tables / VRFs, put 3 l2-pg interfaces
+ to every FIB table / VRF.
+
+ :param int count: Number of FIB tables / VRFs to be created.
+ :param int start: Starting number of the FIB table / VRF ID. \
+ (Default value = 1)
+ """
+ for i in range(count):
+ vrf_id = i + start
+ pg_if = self.pg_if_by_vrf_id[vrf_id][0]
+ dest_addr = pg_if.remote_hosts[0].ip6n
+ dest_addr_len = 64
+ self.vapi.ip_table_add_del(vrf_id, is_add=1, is_ipv6=1)
+ self.vapi.ip_add_del_route(
+ dest_addr, dest_addr_len, pg_if.local_ip6n, is_ipv6=1,
+ table_id=vrf_id, is_multipath=1)
+ self.logger.info("IPv6 VRF ID %d created" % vrf_id)
+ if vrf_id not in self.vrf_list:
+ self.vrf_list.append(vrf_id)
+ if vrf_id in self.vrf_reset_list:
+ self.vrf_reset_list.remove(vrf_id)
+ for j in range(self.pg_ifs_per_vrf):
+ pg_if = self.pg_if_by_vrf_id[vrf_id][j]
+ pg_if.set_table_ip6(vrf_id)
+ self.logger.info("pg-interface %s added to IPv6 VRF ID %d"
+ % (pg_if.name, vrf_id))
+ if pg_if not in self.pg_in_vrf:
+ self.pg_in_vrf.append(pg_if)
+ if pg_if in self.pg_not_in_vrf:
+ self.pg_not_in_vrf.remove(pg_if)
+ pg_if.config_ip6()
+ pg_if.disable_ipv6_ra()
+ pg_if.configure_ipv6_neighbors()
+ self.logger.debug(self.vapi.ppcli("show ip6 fib"))
+ self.logger.debug(self.vapi.ppcli("show ip6 neighbors"))
+
+ def reset_vrf(self, vrf_id):
+ """
+ Reset required FIB table / VRF.
+
+ :param int vrf_id: The FIB table / VRF ID to be reset.
+ """
+ # self.vapi.reset_vrf(vrf_id, is_ipv6=1)
+ self.vapi.reset_fib(vrf_id, is_ipv6=1)
+ if vrf_id in self.vrf_list:
+ self.vrf_list.remove(vrf_id)
+ if vrf_id not in self.vrf_reset_list:
+ self.vrf_reset_list.append(vrf_id)
+ for j in range(self.pg_ifs_per_vrf):
+ pg_if = self.pg_if_by_vrf_id[vrf_id][j]
+ pg_if.unconfig_ip6()
+ if pg_if in self.pg_in_vrf:
+ self.pg_in_vrf.remove(pg_if)
+ if pg_if not in self.pg_not_in_vrf:
+ self.pg_not_in_vrf.append(pg_if)
+ self.logger.info("IPv6 VRF ID %d reset" % vrf_id)
+ self.logger.debug(self.vapi.ppcli("show ip6 fib"))
+ self.logger.debug(self.vapi.ppcli("show ip6 neighbors"))
+ self.vapi.ip_table_add_del(vrf_id, is_add=0, is_ipv6=1)
+
+ def create_stream(self, src_if, packet_sizes):
+ """
+ Create input packet stream for defined interface using hosts list.
+
+ :param object src_if: Interface to create packet stream for.
+ :param list packet_sizes: List of required packet sizes.
+ :return: Stream of packets.
+ """
+ pkts = []
+ src_hosts = src_if.remote_hosts
+ for dst_if in self.flows[src_if]:
+ for dst_host in dst_if.remote_hosts:
+ src_host = random.choice(src_hosts)
+ pkt_info = self.create_packet_info(src_if, dst_if)
+ payload = self.info_to_payload(pkt_info)
+ p = (Ether(dst=src_if.local_mac, src=src_host.mac) /
+ IPv6(src=src_host.ip6, dst=dst_host.ip6) /
+ UDP(sport=1234, dport=1234) /
+ Raw(payload))
+ pkt_info.data = p.copy()
+ size = random.choice(packet_sizes)
+ self.extend_packet(p, size)
+ pkts.append(p)
+ self.logger.debug("Input stream created for port %s. Length: %u pkt(s)"
+ % (src_if.name, len(pkts)))
+ return pkts
+
+ def verify_capture(self, pg_if, capture):
+ """
+ Verify captured input packet stream for defined interface.
+
+ :param object pg_if: Interface to verify captured packet stream for.
+ :param list capture: Captured packet stream.
+ """
+ last_info = dict()
+ for i in self.pg_interfaces:
+ last_info[i.sw_if_index] = None
+ dst_sw_if_index = pg_if.sw_if_index
+ for packet in capture:
+ try:
+ ip = packet[IPv6]
+ udp = packet[UDP]
+ payload_info = self.payload_to_info(str(packet[Raw]))
+ packet_index = payload_info.index
+ self.assertEqual(payload_info.dst, dst_sw_if_index)
+ self.logger.debug("Got packet on port %s: src=%u (id=%u)" %
+ (pg_if.name, payload_info.src, packet_index))
+ next_info = self.get_next_packet_info_for_interface2(
+ payload_info.src, dst_sw_if_index,
+ last_info[payload_info.src])
+ last_info[payload_info.src] = next_info
+ self.assertIsNotNone(next_info)
+ self.assertEqual(packet_index, next_info.index)
+ saved_packet = next_info.data
+ # Check standard fields
+ self.assertEqual(ip.src, saved_packet[IPv6].src)
+ self.assertEqual(ip.dst, saved_packet[IPv6].dst)
+ self.assertEqual(udp.sport, saved_packet[UDP].sport)
+ self.assertEqual(udp.dport, saved_packet[UDP].dport)
+ except:
+ self.logger.error(ppp("Unexpected or invalid packet:", packet))
+ raise
+ for i in self.pg_interfaces:
+ remaining_packet = self.get_next_packet_info_for_interface2(
+ i, dst_sw_if_index, last_info[i.sw_if_index])
+ self.assertIsNone(
+ remaining_packet,
+ "Port %u: Packet expected from source %u didn't arrive" %
+ (dst_sw_if_index, i.sw_if_index))
+
+ def verify_vrf(self, vrf_id):
+ """
+ Check if the FIB table / VRF ID is configured.
+
+ :param int vrf_id: The FIB table / VRF ID to be verified.
+ :return: 1 if the FIB table / VRF ID is configured, otherwise return 0.
+ """
+ ip6_fib_dump = self.vapi.ip6_fib_dump()
+ vrf_exist = False
+ vrf_count = 0
+ for ip6_fib_details in ip6_fib_dump:
+ if ip6_fib_details.table_id == vrf_id:
+ if not vrf_exist:
+ vrf_exist = True
+ addr = inet_ntop(socket.AF_INET6, ip6_fib_details.address)
+ addrtype = in6_getAddrType(addr)
+ vrf_count += 1 if addrtype == IPV6_ADDR_UNICAST else 0
+ if not vrf_exist and vrf_count == 0:
+ self.logger.info("IPv6 VRF ID %d is not configured" % vrf_id)
+ return VRF_NOT_CONFIGURED
+ elif vrf_exist and vrf_count == 0:
+ self.logger.info("IPv6 VRF ID %d has been reset" % vrf_id)
+ return VRF_RESET
+ else:
+ self.logger.info("IPv6 VRF ID %d is configured" % vrf_id)
+ return VRF_CONFIGURED
+
+ def run_verify_test(self):
+ """
+ Create packet streams for all configured l2-pg interfaces, send all \
+ prepared packet streams and verify that:
+ - all packets received correctly on all pg-l2 interfaces assigned
+ to bridge domains
+ - no packet received on all pg-l2 interfaces not assigned to bridge
+ domains
+
+ :raise RuntimeError: If no packet captured on l2-pg interface assigned
+ to the bridge domain or if any packet is captured on l2-pg
+ interface not assigned to the bridge domain.
+ """
+ # Test
+ # Create incoming packet streams for packet-generator interfaces
+ for pg_if in self.pg_interfaces:
+ pkts = self.create_stream(pg_if, self.pg_if_packet_sizes)
+ pg_if.add_stream(pkts)
+
+ # Enable packet capture and start packet sending
+ self.pg_enable_capture(self.pg_interfaces)
+ self.pg_start()
+
+ # Verify
+ # Verify outgoing packet streams per packet-generator interface
+ for pg_if in self.pg_interfaces:
+ if pg_if in self.pg_in_vrf:
+ capture = pg_if.get_capture(remark="interface is in VRF")
+ self.verify_capture(pg_if, capture)
+ elif pg_if in self.pg_not_in_vrf:
+ pg_if.assert_nothing_captured(remark="interface is not in VRF",
+ filter_out_fn=is_ipv6_misc_ext)
+ self.logger.debug("No capture for interface %s" % pg_if.name)
+ else:
+ raise Exception("Unknown interface: %s" % pg_if.name)
+
+ def test_ip6_vrf_01(self):
+ """ IP6 VRF Multi-instance test 1 - create 4 VRFs
+ """
+ # Config 1
+ # Create 4 VRFs
+ self.create_vrf_and_assign_interfaces(4)
+
+ # Verify 1
+ for vrf_id in self.vrf_list:
+ self.assertEqual(self.verify_vrf(vrf_id), VRF_CONFIGURED)
+
+ # Test 1
+ self.run_verify_test()
+
+ def test_ip6_vrf_02(self):
+ """ IP6 VRF Multi-instance test 2 - reset 2 VRFs
+ """
+ # Config 2
+ # Delete 2 VRFs
+ self.reset_vrf(1)
+ self.reset_vrf(2)
+
+ # Verify 2
+ for vrf_id in self.vrf_reset_list:
+ self.assertEqual(self.verify_vrf(vrf_id), VRF_RESET)
+ for vrf_id in self.vrf_list:
+ self.assertEqual(self.verify_vrf(vrf_id), VRF_CONFIGURED)
+
+ # Test 2
+ self.run_verify_test()
+
+ # Reset routes learned from ICMPv6 Neighbor Discovery
+ for vrf_id in self.vrf_reset_list:
+ self.reset_vrf(vrf_id)
+
+ def test_ip6_vrf_03(self):
+ """ IP6 VRF Multi-instance 3 - add 2 VRFs
+ """
+ # Config 3
+ # Add 1 of reset VRFs and 1 new VRF
+ self.create_vrf_and_assign_interfaces(1)
+ self.create_vrf_and_assign_interfaces(1, start=5)
+
+ # Verify 3
+ for vrf_id in self.vrf_reset_list:
+ self.assertEqual(self.verify_vrf(vrf_id), VRF_RESET)
+ for vrf_id in self.vrf_list:
+ self.assertEqual(self.verify_vrf(vrf_id), VRF_CONFIGURED)
+
+ # Test 3
+ self.run_verify_test()
+
+ # Reset routes learned from ICMPv6 Neighbor Discovery
+ for vrf_id in self.vrf_reset_list:
+ self.reset_vrf(vrf_id)
+
+ def test_ip6_vrf_04(self):
+ """ IP6 VRF Multi-instance test 4 - reset 4 VRFs
+ """
+ # Config 4
+ # Reset all VRFs (i.e. no VRF except VRF=0 created)
+ for i in range(len(self.vrf_list)):
+ self.reset_vrf(self.vrf_list[0])
+
+ # Verify 4
+ for vrf_id in self.vrf_reset_list:
+ self.assertEqual(self.verify_vrf(vrf_id), VRF_RESET)
+ for vrf_id in self.vrf_list:
+ self.assertEqual(self.verify_vrf(vrf_id), VRF_CONFIGURED)
+
+ # Test 4
+ self.run_verify_test()
+
+
+if __name__ == '__main__':
+ unittest.main(testRunner=VppTestRunner)