diff options
author | Eyal Bari <ebari@cisco.com> | 2018-06-18 13:01:59 +0300 |
---|---|---|
committer | John Lo <loj@cisco.com> | 2018-06-21 19:21:36 +0000 |
commit | cef1e2a8b49306fc1347d97b6d74255923292edf (patch) | |
tree | dfe6899ef00c6fa78ec7c9b00951dbf2d8f32623 | |
parent | e513f98f5baa120c37d0ccb796ab06b424f3e473 (diff) |
test:vxlan over ipv6 tests
Change-Id: Id910db0e3a07ecc6f469e2f0d1e97f39ba48cc60
Signed-off-by: Eyal Bari <ebari@cisco.com>
-rw-r--r-- | test/template_bd.py | 8 | ||||
-rw-r--r-- | test/test_geneve.py | 6 | ||||
-rw-r--r-- | test/test_gtpu.py | 6 | ||||
-rw-r--r-- | test/test_vxlan.py | 6 | ||||
-rw-r--r-- | test/test_vxlan6.py | 187 | ||||
-rw-r--r-- | test/test_vxlan_gpe.py | 6 |
6 files changed, 213 insertions, 6 deletions
diff --git a/test/template_bd.py b/test/template_bd.py index 080b2e6bcc5..291f4684db9 100644 --- a/test/template_bd.py +++ b/test/template_bd.py @@ -29,6 +29,11 @@ class BridgeDomain(object): Raw('\xa5' * 100)) @abstractmethod + def ip_range(self, start, end): + """ range of remote ip's """ + pass + + @abstractmethod def encap_mcast(self, pkt, src_ip, src_mac, vni): """ Encapsulate mcast packet """ pass @@ -148,8 +153,7 @@ class BridgeDomain(object): ip_range_end = 30 mcast_stream = [ self.encap_mcast(self.frame_request, ip, mac, self.mcast_flood_bd) - for ip in ip4_range(self.pg0.remote_ip4, - ip_range_start, ip_range_end)] + for ip in self.ip_range(ip_range_start, ip_range_end)] self.pg0.add_stream(mcast_stream) self.pg2.enable_capture() self.pg_start() diff --git a/test/test_geneve.py b/test/test_geneve.py index a670bc40864..d77bfbfcff1 100644 --- a/test/test_geneve.py +++ b/test/test_geneve.py @@ -1,7 +1,7 @@ #!/usr/bin/env python import socket -from util import ip4n_range +from util import ip4n_range, ip4_range import unittest from framework import VppTestCase, VppTestRunner from template_bd import BridgeDomain @@ -31,6 +31,10 @@ class TestGeneve(BridgeDomain, VppTestCase): GENEVE(vni=vni) / pkt) + def ip_range(self, start, end): + """ range of remote ip's """ + return ip4_range(self.pg0.remote_ip4, start, end) + def encap_mcast(self, pkt, src_ip, src_mac, vni): """ Encapsulate the original payload frame by adding GENEVE header with its diff --git a/test/test_gtpu.py b/test/test_gtpu.py index b0c0a7459dc..ed4e6897713 100644 --- a/test/test_gtpu.py +++ b/test/test_gtpu.py @@ -1,7 +1,7 @@ #!/usr/bin/env python import socket -from util import ip4n_range +from util import ip4n_range, ip4_range import unittest from framework import VppTestCase, VppTestRunner from template_bd import BridgeDomain @@ -30,6 +30,10 @@ class TestGtpu(BridgeDomain, VppTestCase): GTP_U_Header(teid=vni, gtp_type=self.gtp_type, length=150) / pkt) + def ip_range(self, start, end): + """ range of remote ip's """ + return ip4_range(self.pg0.remote_ip4, start, end) + def encap_mcast(self, pkt, src_ip, src_mac, vni): """ Encapsulate the original payload frame by adding GTPU header with its diff --git a/test/test_vxlan.py b/test/test_vxlan.py index 99d5d13f0fb..1411dd6c026 100644 --- a/test/test_vxlan.py +++ b/test/test_vxlan.py @@ -1,7 +1,7 @@ #!/usr/bin/env python import socket -from util import ip4n_range +from util import ip4n_range, ip4_range import unittest from framework import VppTestCase, VppTestRunner from template_bd import BridgeDomain @@ -30,6 +30,10 @@ class TestVxlan(BridgeDomain, VppTestCase): VXLAN(vni=vni, flags=self.flags) / pkt) + def ip_range(self, start, end): + """ range of remote ip's """ + return ip4_range(self.pg0.remote_ip4, start, end) + def encap_mcast(self, pkt, src_ip, src_mac, vni): """ Encapsulate the original payload frame by adding VXLAN header with its diff --git a/test/test_vxlan6.py b/test/test_vxlan6.py new file mode 100644 index 00000000000..0457f9b627d --- /dev/null +++ b/test/test_vxlan6.py @@ -0,0 +1,187 @@ +#!/usr/bin/env python + +import socket +import unittest +from framework import VppTestCase, VppTestRunner +from template_bd import BridgeDomain + +from scapy.layers.l2 import Ether +from scapy.layers.inet6 import IPv6, UDP +from scapy.layers.vxlan import VXLAN +from scapy.utils import atol + + +class TestVxlan(BridgeDomain, VppTestCase): + """ VXLAN Test Case """ + + def __init__(self, *args): + BridgeDomain.__init__(self) + VppTestCase.__init__(self, *args) + + def encapsulate(self, pkt, vni): + """ + Encapsulate the original payload frame by adding VXLAN header with its + UDP, IP and Ethernet fields + """ + return (Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) / + IPv6(src=self.pg0.remote_ip6, dst=self.pg0.local_ip6) / + UDP(sport=self.dport, dport=self.dport, chksum=0) / + VXLAN(vni=vni, flags=self.flags) / + pkt) + + @classmethod + def ip_range(cls, s, e): + """ range of remote ip's """ + tmp = cls.pg0.remote_ip6.rsplit(':', 1)[0] + return ("%s:%x" % (tmp, i) for i in range(s, e)) + + def encap_mcast(self, pkt, src_ip, src_mac, vni): + """ + Encapsulate the original payload frame by adding VXLAN header with its + UDP, IP and Ethernet fields + """ + return (Ether(src=src_mac, dst=self.mcast_mac) / + IPv6(src=src_ip, dst=self.mcast_ip6) / + UDP(sport=self.dport, dport=self.dport, chksum=0) / + VXLAN(vni=vni, flags=self.flags) / + pkt) + + def decapsulate(self, pkt): + """ + Decapsulate the original payload frame by removing VXLAN header + """ + # check if is set I flag + self.assertEqual(pkt[VXLAN].flags, int('0x8', 16)) + return pkt[VXLAN].payload + + # Method for checking VXLAN encapsulation. + # + def check_encapsulation(self, pkt, vni, local_only=False, mcast_pkt=False): + # TODO: add error messages + # Verify source MAC is VPP_MAC and destination MAC is MY_MAC resolved + # by VPP using ARP. + self.assertEqual(pkt[Ether].src, self.pg0.local_mac) + if not local_only: + if not mcast_pkt: + self.assertEqual(pkt[Ether].dst, self.pg0.remote_mac) + else: + self.assertEqual(pkt[Ether].dst, type(self).mcast_mac) + # Verify VXLAN tunnel source IP is VPP_IP and destination IP is MY_IP. + self.assertEqual(pkt[IPv6].src, self.pg0.local_ip6) + if not local_only: + if not mcast_pkt: + self.assertEqual(pkt[IPv6].dst, self.pg0.remote_ip6) + else: + self.assertEqual(pkt[IPv6].dst, type(self).mcast_ip6) + # Verify UDP destination port is VXLAN 4789, source UDP port could be + # arbitrary. + self.assertEqual(pkt[UDP].dport, type(self).dport) + # TODO: checksum check + # Verify VNI + self.assertEqual(pkt[VXLAN].vni, vni) + + @classmethod + def create_vxlan_flood_test_bd(cls, vni, n_ucast_tunnels): + # Create 10 ucast vxlan tunnels under bd + start = 10 + end = start + n_ucast_tunnels + next_hop = cls.pg0.remote_ip6n + for dest_ip6 in cls.ip_range(start, end): + dest_ip6n = socket.inet_pton(socket.AF_INET6, dest_ip6) + # add host route so dest ip will not be resolved + cls.vapi.ip_add_del_route(dest_ip6n, 128, next_hop, is_ipv6=1) + r = cls.vapi.vxlan_add_del_tunnel( + is_ipv6=1, + src_addr=cls.pg0.local_ip6n, + dst_addr=dest_ip6n, + vni=vni) + cls.vapi.sw_interface_set_l2_bridge(r.sw_if_index, bd_id=vni) + + @classmethod + def add_mcast_tunnels_load(cls): + cls.add_del_mcast_tunnels_load(is_add=1) + + @classmethod + def del_mcast_tunnels_load(cls): + cls.add_del_mcast_tunnels_load(is_add=0) + + # Class method to start the VXLAN test case. + # Overrides setUpClass method in VppTestCase class. + # Python try..except statement is used to ensure that the tear down of + # the class will be executed even if exception is raised. + # @param cls The class pointer. + @classmethod + def setUpClass(cls): + super(TestVxlan, cls).setUpClass() + + try: + cls.dport = 4789 + cls.flags = 0x8 + + # Create 2 pg interfaces. + cls.create_pg_interfaces(range(4)) + for pg in cls.pg_interfaces: + pg.admin_up() + + # Configure IPv4 addresses on VPP pg0. + cls.pg0.config_ip6() + + # Resolve MAC address for VPP's IP address on pg0. + cls.pg0.resolve_ndp() + + cls.mcast_ip6 = 'ff0e::1' + cls.mcast_ip6n = socket.inet_pton(socket.AF_INET6, cls.mcast_ip6) + cls.mcast_mac = "33:33:00:00:00:%02x" % (1) + + # Create VXLAN VTEP on VPP pg0, and put vxlan_tunnel0 and pg1 + # into BD. + cls.single_tunnel_bd = 1 + r = cls.vapi.vxlan_add_del_tunnel( + is_ipv6=1, + src_addr=cls.pg0.local_ip6n, + dst_addr=cls.pg0.remote_ip6n, + vni=cls.single_tunnel_bd) + cls.vapi.sw_interface_set_l2_bridge(r.sw_if_index, + bd_id=cls.single_tunnel_bd) + cls.vapi.sw_interface_set_l2_bridge(cls.pg1.sw_if_index, + bd_id=cls.single_tunnel_bd) + + # Setup vni 2 to test multicast flooding + cls.n_ucast_tunnels = 10 + cls.mcast_flood_bd = 2 + cls.create_vxlan_flood_test_bd(cls.mcast_flood_bd, + cls.n_ucast_tunnels) + r = cls.vapi.vxlan_add_del_tunnel( + mcast_sw_if_index=1, + src_addr=cls.pg0.local_ip6n, + dst_addr=cls.mcast_ip6n, + vni=cls.mcast_flood_bd, is_ipv6=1) + cls.vapi.sw_interface_set_l2_bridge(r.sw_if_index, + bd_id=cls.mcast_flood_bd) + cls.vapi.sw_interface_set_l2_bridge(cls.pg2.sw_if_index, + bd_id=cls.mcast_flood_bd) + + # Setup vni 3 to test unicast flooding + cls.ucast_flood_bd = 3 + cls.create_vxlan_flood_test_bd(cls.ucast_flood_bd, + cls.n_ucast_tunnels) + cls.vapi.sw_interface_set_l2_bridge(cls.pg3.sw_if_index, + bd_id=cls.ucast_flood_bd) + except Exception: + super(TestVxlan, cls).tearDownClass() + raise + + # Method to define VPP actions before tear down of the test case. + # Overrides tearDown method in VppTestCase class. + # @param self The object pointer. + def tearDown(self): + super(TestVxlan, self).tearDown() + if not self.vpp_dead: + self.logger.info(self.vapi.cli("show bridge-domain 1 detail")) + self.logger.info(self.vapi.cli("show bridge-domain 2 detail")) + self.logger.info(self.vapi.cli("show bridge-domain 3 detail")) + self.logger.info(self.vapi.cli("show vxlan tunnel")) + + +if __name__ == '__main__': + unittest.main(testRunner=VppTestRunner) diff --git a/test/test_vxlan_gpe.py b/test/test_vxlan_gpe.py index 61d86fe07dc..cf24652a257 100644 --- a/test/test_vxlan_gpe.py +++ b/test/test_vxlan_gpe.py @@ -1,7 +1,7 @@ #!/usr/bin/env python import socket -from util import ip4n_range +from util import ip4n_range, ip4_range import unittest from framework import VppTestCase, VppTestRunner, running_extended_tests from template_bd import BridgeDomain @@ -31,6 +31,10 @@ class TestVxlanGpe(BridgeDomain, VppTestCase): VXLAN(vni=vni, flags=self.flags) / pkt) + def ip_range(self, start, end): + """ range of remote ip's """ + return ip4_range(self.pg0.remote_ip4, start, end) + def encap_mcast(self, pkt, src_ip, src_mac, vni): """ Encapsulate the original payload frame by adding VXLAN-GPE header |