aboutsummaryrefslogtreecommitdiffstats
path: root/src
diff options
context:
space:
mode:
authorJuraj Sloboda <jsloboda@cisco.com>2017-04-03 08:43:58 +0200
committerFlorin Coras <florin.coras@gmail.com>2017-04-11 20:38:20 +0000
commit7a1bde061a919af42645e3bc09206b98fbfde9d9 (patch)
treec552d142eabbcce376928fb8ab67345083d2ccd5 /src
parent9f171f5e20d4f30316626987a3dc66c9730e6d73 (diff)
Add ICMP support for deterministic NAT
Change-Id: I9a6bcb7d173a2c13d89784e7ff8a6e42dcee201f Signed-off-by: Juraj Sloboda <jsloboda@cisco.com>
Diffstat (limited to 'src')
-rw-r--r--src/plugins/snat/in2out.c214
-rw-r--r--src/plugins/snat/out2in.c205
-rw-r--r--src/plugins/snat/snat.c2
-rw-r--r--src/plugins/snat/snat.h19
4 files changed, 414 insertions, 26 deletions
diff --git a/src/plugins/snat/in2out.c b/src/plugins/snat/in2out.c
index f5443762336..89054a01b64 100644
--- a/src/plugins/snat/in2out.c
+++ b/src/plugins/snat/in2out.c
@@ -472,11 +472,12 @@ snat_in2out_error_t icmp_get_key(ip4_header_t *ip0,
* @param[out] p_value address and port after NAT translation
* @param[out] p_dont_translate if packet should not be translated
* @param d optional parameter
+ * @param e optional parameter
*/
u32 icmp_match_in2out_slow(snat_main_t *sm, vlib_node_runtime_t *node,
u32 thread_index, vlib_buffer_t *b0, u8 *p_proto,
snat_session_key_t *p_value,
- u8 *p_dont_translate, void *d)
+ u8 *p_dont_translate, void *d, void *e)
{
ip4_header_t *ip0;
icmp46_header_t *icmp0;
@@ -559,11 +560,12 @@ out:
* @param[out] p_value address and port after NAT translation
* @param[out] p_dont_translate if packet should not be translated
* @param d optional parameter
+ * @param e optional parameter
*/
u32 icmp_match_in2out_fast(snat_main_t *sm, vlib_node_runtime_t *node,
u32 thread_index, vlib_buffer_t *b0, u8 *p_proto,
snat_session_key_t *p_value,
- u8 *p_dont_translate, void *d)
+ u8 *p_dont_translate, void *d, void *e)
{
ip4_header_t *ip0;
icmp46_header_t *icmp0;
@@ -637,7 +639,8 @@ static inline u32 icmp_in2out (snat_main_t *sm,
vlib_node_runtime_t * node,
u32 next0,
u32 thread_index,
- void *d)
+ void *d,
+ void *e)
{
snat_session_key_t sm0;
u8 protocol;
@@ -655,7 +658,7 @@ static inline u32 icmp_in2out (snat_main_t *sm,
echo0 = (icmp_echo_header_t *)(icmp0+1);
next0_tmp = sm->icmp_match_in2out_cb(sm, node, thread_index, b0,
- &protocol, &sm0, &dont_translate, d);
+ &protocol, &sm0, &dont_translate, d, e);
if (next0_tmp != ~0)
next0 = next0_tmp;
if (next0 == SNAT_IN2OUT_NEXT_DROP || dont_translate)
@@ -864,7 +867,7 @@ static inline u32 icmp_in2out_slow_path (snat_main_t *sm,
snat_session_t ** p_s0)
{
next0 = icmp_in2out(sm, b0, ip0, icmp0, sw_if_index0, rx_fib_index0, node,
- next0, thread_index, p_s0);
+ next0, thread_index, p_s0, 0);
snat_session_t * s0 = *p_s0;
if (PREDICT_TRUE(next0 != SNAT_IN2OUT_NEXT_DROP && s0))
{
@@ -1508,6 +1511,7 @@ snat_det_in2out_node_fn (vlib_main_t * vm,
u32 pkts_processed = 0;
snat_main_t * sm = &snat_main;
u32 now = (u32) vlib_time_now (vm);
+ u32 thread_index = os_get_cpu_number ();
from = vlib_frame_vector_args (frame);
n_left_from = frame->n_vectors;
@@ -1537,6 +1541,8 @@ snat_det_in2out_node_fn (vlib_main_t * vm,
snat_det_out_key_t key0, key1;
snat_det_map_t * dm0, * dm1;
snat_det_session_t * ses0 = 0, * ses1 = 0;
+ u32 rx_fib_index0, rx_fib_index1;
+ icmp46_header_t * icmp0, * icmp1;
/* Prefetch next iteration. */
{
@@ -1582,6 +1588,19 @@ snat_det_in2out_node_fn (vlib_main_t * vm,
goto trace0;
}
+ proto0 = ip_proto_to_snat_proto (ip0->protocol);
+
+ if (PREDICT_FALSE(proto0 == SNAT_PROTOCOL_ICMP))
+ {
+ rx_fib_index0 = ip4_fib_table_get_index_for_sw_if_index(sw_if_index0);
+ icmp0 = (icmp46_header_t *) udp0;
+
+ next0 = icmp_in2out(sm, b0, ip0, icmp0, sw_if_index0,
+ rx_fib_index0, node, next0, thread_index,
+ &ses0, &dm0);
+ goto trace0;
+ }
+
dm0 = snat_det_map_by_user(sm, &ip0->src_address);
if (PREDICT_FALSE(!dm0))
{
@@ -1619,7 +1638,6 @@ snat_det_in2out_node_fn (vlib_main_t * vm,
}
new_port0 = ses0->out.out_port;
- proto0 = ip_proto_to_snat_proto (ip0->protocol);
old_addr0.as_u32 = ip0->src_address.as_u32;
ip0->src_address.as_u32 = new_addr0.as_u32;
@@ -1714,6 +1732,19 @@ snat_det_in2out_node_fn (vlib_main_t * vm,
goto trace1;
}
+ proto1 = ip_proto_to_snat_proto (ip1->protocol);
+
+ if (PREDICT_FALSE(proto1 == SNAT_PROTOCOL_ICMP))
+ {
+ rx_fib_index1 = ip4_fib_table_get_index_for_sw_if_index(sw_if_index1);
+ icmp1 = (icmp46_header_t *) udp1;
+
+ next1 = icmp_in2out(sm, b1, ip1, icmp1, sw_if_index1,
+ rx_fib_index1, node, next1, thread_index,
+ &ses1, &dm1);
+ goto trace1;
+ }
+
dm1 = snat_det_map_by_user(sm, &ip1->src_address);
if (PREDICT_FALSE(!dm1))
{
@@ -1751,7 +1782,6 @@ snat_det_in2out_node_fn (vlib_main_t * vm,
}
new_port1 = ses1->out.out_port;
- proto1 = ip_proto_to_snat_proto (ip1->protocol);
old_addr1.as_u32 = ip1->src_address.as_u32;
ip1->src_address.as_u32 = new_addr1.as_u32;
@@ -1852,6 +1882,8 @@ snat_det_in2out_node_fn (vlib_main_t * vm,
snat_det_out_key_t key0;
snat_det_map_t * dm0;
snat_det_session_t * ses0 = 0;
+ u32 rx_fib_index0;
+ icmp46_header_t * icmp0;
/* speculatively enqueue b0 to the current next frame */
bi0 = from[0];
@@ -1880,6 +1912,19 @@ snat_det_in2out_node_fn (vlib_main_t * vm,
goto trace00;
}
+ proto0 = ip_proto_to_snat_proto (ip0->protocol);
+
+ if (PREDICT_FALSE(proto0 == SNAT_PROTOCOL_ICMP))
+ {
+ rx_fib_index0 = ip4_fib_table_get_index_for_sw_if_index(sw_if_index0);
+ icmp0 = (icmp46_header_t *) udp0;
+
+ next0 = icmp_in2out(sm, b0, ip0, icmp0, sw_if_index0,
+ rx_fib_index0, node, next0, thread_index,
+ &ses0, &dm0);
+ goto trace00;
+ }
+
dm0 = snat_det_map_by_user(sm, &ip0->src_address);
if (PREDICT_FALSE(!dm0))
{
@@ -1917,7 +1962,6 @@ snat_det_in2out_node_fn (vlib_main_t * vm,
}
new_port0 = ses0->out.out_port;
- proto0 = ip_proto_to_snat_proto (ip0->protocol);
old_addr0.as_u32 = ip0->src_address.as_u32;
ip0->src_address.as_u32 = new_addr0.as_u32;
@@ -2035,6 +2079,158 @@ VLIB_REGISTER_NODE (snat_det_in2out_node) = {
VLIB_NODE_FUNCTION_MULTIARCH (snat_det_in2out_node, snat_det_in2out_node_fn);
+/**
+ * Get address and port values to be used for packet SNAT translation
+ * and create session if needed
+ *
+ * @param[in,out] sm SNAT main
+ * @param[in,out] node SNAT node runtime
+ * @param[in] thread_index thread index
+ * @param[in,out] b0 buffer containing packet to be translated
+ * @param[out] p_proto protocol used for matching
+ * @param[out] p_value address and port after NAT translation
+ * @param[out] p_dont_translate if packet should not be translated
+ * @param d optional parameter
+ * @param e optional parameter
+ */
+u32 icmp_match_in2out_det(snat_main_t *sm, vlib_node_runtime_t *node,
+ u32 thread_index, vlib_buffer_t *b0, u8 *p_proto,
+ snat_session_key_t *p_value,
+ u8 *p_dont_translate, void *d, void *e)
+{
+ ip4_header_t *ip0;
+ icmp46_header_t *icmp0;
+ u32 sw_if_index0;
+ u32 rx_fib_index0;
+ u8 protocol;
+ snat_det_out_key_t key0;
+ u8 dont_translate = 0;
+ u32 next0 = ~0;
+ icmp_echo_header_t *echo0, *inner_echo0 = 0;
+ ip4_header_t *inner_ip0;
+ void *l4_header = 0;
+ icmp46_header_t *inner_icmp0;
+ snat_det_map_t * dm0 = 0;
+ ip4_address_t new_addr0;
+ u16 lo_port0, i0;
+ snat_det_session_t * ses0 = 0;
+ ip4_address_t in_addr;
+ u16 in_port;
+
+ ip0 = vlib_buffer_get_current (b0);
+ icmp0 = (icmp46_header_t *) ip4_next_header (ip0);
+ echo0 = (icmp_echo_header_t *)(icmp0+1);
+ sw_if_index0 = vnet_buffer(b0)->sw_if_index[VLIB_RX];
+ rx_fib_index0 = ip4_fib_table_get_index_for_sw_if_index (sw_if_index0);
+
+ if (!icmp_is_error_message (icmp0))
+ {
+ protocol = SNAT_PROTOCOL_ICMP;
+ in_addr = ip0->src_address;
+ in_port = echo0->identifier;
+ }
+ else
+ {
+ inner_ip0 = (ip4_header_t *)(echo0+1);
+ l4_header = ip4_next_header (inner_ip0);
+ protocol = ip_proto_to_snat_proto (inner_ip0->protocol);
+ in_addr = inner_ip0->dst_address;
+ switch (protocol)
+ {
+ case SNAT_PROTOCOL_ICMP:
+ inner_icmp0 = (icmp46_header_t*)l4_header;
+ inner_echo0 = (icmp_echo_header_t *)(inner_icmp0+1);
+ in_port = inner_echo0->identifier;
+ break;
+ case SNAT_PROTOCOL_UDP:
+ case SNAT_PROTOCOL_TCP:
+ in_port = ((tcp_udp_header_t*)l4_header)->dst_port;
+ break;
+ default:
+ b0->error = node->errors[SNAT_IN2OUT_ERROR_UNSUPPORTED_PROTOCOL];
+ next0 = SNAT_IN2OUT_NEXT_DROP;
+ goto out;
+ }
+ }
+
+ dm0 = snat_det_map_by_user(sm, &in_addr);
+ if (PREDICT_FALSE(!dm0))
+ {
+ clib_warning("no match for internal host %U",
+ format_ip4_address, &in_addr);
+ if (PREDICT_FALSE(snat_not_translate_fast(sm, node, sw_if_index0, ip0,
+ IP_PROTOCOL_ICMP, rx_fib_index0)))
+ {
+ dont_translate = 1;
+ goto out;
+ }
+ next0 = SNAT_IN2OUT_NEXT_DROP;
+ b0->error = node->errors[SNAT_IN2OUT_ERROR_NO_TRANSLATION];
+ goto out;
+ }
+
+ snat_det_forward(dm0, &in_addr, &new_addr0, &lo_port0);
+
+ ses0 = snat_det_find_ses_by_in(dm0, &in_addr, in_port);
+ if (PREDICT_FALSE(!ses0))
+ {
+ if (PREDICT_FALSE(snat_not_translate_fast(sm, node, sw_if_index0, ip0,
+ IP_PROTOCOL_ICMP, rx_fib_index0)))
+ {
+ dont_translate = 1;
+ goto out;
+ }
+ if (icmp0->type != ICMP4_echo_request)
+ {
+ b0->error = node->errors[SNAT_IN2OUT_ERROR_BAD_ICMP_TYPE];
+ next0 = SNAT_IN2OUT_NEXT_DROP;
+ goto out;
+ }
+ key0.ext_host_addr = ip0->dst_address;
+ key0.ext_host_port = 0;
+ for (i0 = 0; i0 < dm0->ports_per_host; i0++)
+ {
+ key0.out_port = clib_host_to_net_u16 (lo_port0 +
+ ((i0 + clib_net_to_host_u16 (echo0->identifier)) % dm0->ports_per_host));
+
+ if (snat_det_get_ses_by_out (dm0, &in_addr, key0.as_u64))
+ continue;
+
+ ses0 = snat_det_ses_create(dm0, &in_addr, echo0->identifier, &key0);
+ break;
+ }
+ if (PREDICT_FALSE(!ses0))
+ {
+ next0 = SNAT_IN2OUT_NEXT_DROP;
+ b0->error = node->errors[SNAT_IN2OUT_ERROR_OUT_OF_PORTS];
+ goto out;
+ }
+ }
+
+ if (PREDICT_FALSE(icmp0->type != ICMP4_echo_request &&
+ !icmp_is_error_message (icmp0)))
+ {
+ b0->error = node->errors[SNAT_IN2OUT_ERROR_BAD_ICMP_TYPE];
+ next0 = SNAT_IN2OUT_NEXT_DROP;
+ goto out;
+ }
+
+out:
+ *p_proto = protocol;
+ if (ses0)
+ {
+ p_value->addr = new_addr0;
+ p_value->fib_index = sm->outside_fib_index;
+ p_value->port = ses0->out.out_port;
+ }
+ *p_dont_translate = dont_translate;
+ if (d)
+ *(snat_det_session_t**)d = ses0;
+ if (e)
+ *(snat_det_map_t**)e = dm0;
+ return next0;
+}
+
/**********************/
/*** worker handoff ***/
/**********************/
@@ -2276,7 +2472,7 @@ snat_in2out_fast_static_map_fn (vlib_main_t * vm,
if (PREDICT_FALSE (proto0 == SNAT_PROTOCOL_ICMP))
{
next0 = icmp_in2out(sm, b0, ip0, icmp0, sw_if_index0,
- rx_fib_index0, node, next0, ~0, 0);
+ rx_fib_index0, node, next0, ~0, 0, 0);
goto trace0;
}
diff --git a/src/plugins/snat/out2in.c b/src/plugins/snat/out2in.c
index 447605bab48..f9f8defa90f 100644
--- a/src/plugins/snat/out2in.c
+++ b/src/plugins/snat/out2in.c
@@ -283,11 +283,12 @@ snat_out2in_error_t icmp_get_key(ip4_header_t *ip0,
* @param[out] p_value address and port after NAT translation
* @param[out] p_dont_translate if packet should not be translated
* @param d optional parameter
+ * @param e optional parameter
*/
u32 icmp_match_out2in_slow(snat_main_t *sm, vlib_node_runtime_t *node,
u32 thread_index, vlib_buffer_t *b0, u8 *p_proto,
snat_session_key_t *p_value,
- u8 *p_dont_translate, void *d)
+ u8 *p_dont_translate, void *d, void *e)
{
ip4_header_t *ip0;
icmp46_header_t *icmp0;
@@ -384,11 +385,12 @@ out:
* @param[out] p_value address and port after NAT translation
* @param[out] p_dont_translate if packet should not be translated
* @param d optional parameter
+ * @param e optional parameter
*/
u32 icmp_match_out2in_fast(snat_main_t *sm, vlib_node_runtime_t *node,
u32 thread_index, vlib_buffer_t *b0, u8 *p_proto,
snat_session_key_t *p_value,
- u8 *p_dont_translate, void *d)
+ u8 *p_dont_translate, void *d, void *e)
{
ip4_header_t *ip0;
icmp46_header_t *icmp0;
@@ -455,7 +457,8 @@ static inline u32 icmp_out2in (snat_main_t *sm,
vlib_node_runtime_t * node,
u32 next0,
u32 thread_index,
- void *d)
+ void *d,
+ void *e)
{
snat_session_key_t sm0;
u8 protocol;
@@ -473,7 +476,7 @@ static inline u32 icmp_out2in (snat_main_t *sm,
echo0 = (icmp_echo_header_t *)(icmp0+1);
next0_tmp = sm->icmp_match_out2in_cb(sm, node, thread_index, b0,
- &protocol, &sm0, &dont_translate, d);
+ &protocol, &sm0, &dont_translate, d, e);
if (next0_tmp != ~0)
next0 = next0_tmp;
if (next0 == SNAT_OUT2IN_NEXT_DROP || dont_translate)
@@ -580,7 +583,7 @@ static inline u32 icmp_out2in_slow_path (snat_main_t *sm,
snat_session_t ** p_s0)
{
next0 = icmp_out2in(sm, b0, ip0, icmp0, sw_if_index0, rx_fib_index0, node,
- next0, thread_index, p_s0);
+ next0, thread_index, p_s0, 0);
snat_session_t * s0 = *p_s0;
if (PREDICT_TRUE(next0 != SNAT_OUT2IN_NEXT_DROP && s0))
{
@@ -1160,6 +1163,7 @@ snat_det_out2in_node_fn (vlib_main_t * vm,
snat_out2in_next_t next_index;
u32 pkts_processed = 0;
snat_main_t * sm = &snat_main;
+ u32 thread_index = os_get_cpu_number ();
from = vlib_frame_vector_args (frame);
n_left_from = frame->n_vectors;
@@ -1189,6 +1193,8 @@ snat_det_out2in_node_fn (vlib_main_t * vm,
snat_det_out_key_t key0, key1;
snat_det_map_t * dm0, * dm1;
snat_det_session_t * ses0 = 0, * ses1 = 0;
+ u32 rx_fib_index0, rx_fib_index1;
+ icmp46_header_t * icmp0, * icmp1;
/* Prefetch next iteration. */
{
@@ -1231,6 +1237,19 @@ snat_det_out2in_node_fn (vlib_main_t * vm,
goto trace0;
}
+ proto0 = ip_proto_to_snat_proto (ip0->protocol);
+
+ if (PREDICT_FALSE(proto0 == SNAT_PROTOCOL_ICMP))
+ {
+ rx_fib_index0 = ip4_fib_table_get_index_for_sw_if_index(sw_if_index0);
+ icmp0 = (icmp46_header_t *) udp0;
+
+ next0 = icmp_out2in(sm, b0, ip0, icmp0, sw_if_index0,
+ rx_fib_index0, node, next0, thread_index,
+ &ses0, &dm0);
+ goto trace0;
+ }
+
key0.ext_host_addr = ip0->src_address;
key0.ext_host_port = tcp0->src;
key0.out_port = tcp0->dst;
@@ -1263,8 +1282,6 @@ snat_det_out2in_node_fn (vlib_main_t * vm,
}
new_port0 = ses0->in_port;
- proto0 = ip_proto_to_snat_proto (ip0->protocol);
-
old_addr0 = ip0->dst_address;
ip0->dst_address = new_addr0;
vnet_buffer(b0)->sw_if_index[VLIB_TX] = sm->inside_fib_index;
@@ -1336,6 +1353,19 @@ snat_det_out2in_node_fn (vlib_main_t * vm,
goto trace1;
}
+ proto1 = ip_proto_to_snat_proto (ip1->protocol);
+
+ if (PREDICT_FALSE(proto1 == SNAT_PROTOCOL_ICMP))
+ {
+ rx_fib_index1 = ip4_fib_table_get_index_for_sw_if_index(sw_if_index1);
+ icmp1 = (icmp46_header_t *) udp1;
+
+ next1 = icmp_out2in(sm, b1, ip1, icmp1, sw_if_index1,
+ rx_fib_index1, node, next1, thread_index,
+ &ses1, &dm1);
+ goto trace1;
+ }
+
key1.ext_host_addr = ip1->src_address;
key1.ext_host_port = tcp1->src;
key1.out_port = tcp1->dst;
@@ -1368,8 +1398,6 @@ snat_det_out2in_node_fn (vlib_main_t * vm,
}
new_port1 = ses1->in_port;
- proto1 = ip_proto_to_snat_proto (ip1->protocol);
-
old_addr1 = ip1->dst_address;
ip1->dst_address = new_addr1;
vnet_buffer(b1)->sw_if_index[VLIB_TX] = sm->inside_fib_index;
@@ -1445,6 +1473,8 @@ snat_det_out2in_node_fn (vlib_main_t * vm,
snat_det_out_key_t key0;
snat_det_map_t * dm0;
snat_det_session_t * ses0 = 0;
+ u32 rx_fib_index0;
+ icmp46_header_t * icmp0;
/* speculatively enqueue b0 to the current next frame */
bi0 = from[0];
@@ -1472,6 +1502,19 @@ snat_det_out2in_node_fn (vlib_main_t * vm,
goto trace00;
}
+ proto0 = ip_proto_to_snat_proto (ip0->protocol);
+
+ if (PREDICT_FALSE(proto0 == SNAT_PROTOCOL_ICMP))
+ {
+ rx_fib_index0 = ip4_fib_table_get_index_for_sw_if_index(sw_if_index0);
+ icmp0 = (icmp46_header_t *) udp0;
+
+ next0 = icmp_out2in(sm, b0, ip0, icmp0, sw_if_index0,
+ rx_fib_index0, node, next0, thread_index,
+ &ses0, &dm0);
+ goto trace00;
+ }
+
key0.ext_host_addr = ip0->src_address;
key0.ext_host_port = tcp0->src;
key0.out_port = tcp0->dst;
@@ -1504,8 +1547,6 @@ snat_det_out2in_node_fn (vlib_main_t * vm,
}
new_port0 = ses0->in_port;
- proto0 = ip_proto_to_snat_proto (ip0->protocol);
-
old_addr0 = ip0->dst_address;
ip0->dst_address = new_addr0;
vnet_buffer(b0)->sw_if_index[VLIB_TX] = sm->inside_fib_index;
@@ -1597,6 +1638,146 @@ VLIB_REGISTER_NODE (snat_det_out2in_node) = {
};
VLIB_NODE_FUNCTION_MULTIARCH (snat_det_out2in_node, snat_det_out2in_node_fn);
+/**
+ * Get address and port values to be used for packet SNAT translation
+ * and create session if needed
+ *
+ * @param[in,out] sm SNAT main
+ * @param[in,out] node SNAT node runtime
+ * @param[in] thread_index thread index
+ * @param[in,out] b0 buffer containing packet to be translated
+ * @param[out] p_proto protocol used for matching
+ * @param[out] p_value address and port after NAT translation
+ * @param[out] p_dont_translate if packet should not be translated
+ * @param d optional parameter
+ * @param e optional parameter
+ */
+u32 icmp_match_out2in_det(snat_main_t *sm, vlib_node_runtime_t *node,
+ u32 thread_index, vlib_buffer_t *b0, u8 *p_proto,
+ snat_session_key_t *p_value,
+ u8 *p_dont_translate, void *d, void *e)
+{
+ ip4_header_t *ip0;
+ icmp46_header_t *icmp0;
+ u32 sw_if_index0;
+ u8 protocol;
+ snat_det_out_key_t key0;
+ u8 dont_translate = 0;
+ u32 next0 = ~0;
+ icmp_echo_header_t *echo0, *inner_echo0 = 0;
+ ip4_header_t *inner_ip0;
+ void *l4_header = 0;
+ icmp46_header_t *inner_icmp0;
+ snat_det_map_t * dm0 = 0;
+ ip4_address_t new_addr0 = {{0}};
+ snat_det_session_t * ses0 = 0;
+ ip4_address_t out_addr;
+
+ ip0 = vlib_buffer_get_current (b0);
+ icmp0 = (icmp46_header_t *) ip4_next_header (ip0);
+ echo0 = (icmp_echo_header_t *)(icmp0+1);
+ sw_if_index0 = vnet_buffer(b0)->sw_if_index[VLIB_RX];
+
+ if (!icmp_is_error_message (icmp0))
+ {
+ protocol = SNAT_PROTOCOL_ICMP;
+ key0.ext_host_addr = ip0->src_address;
+ key0.ext_host_port = 0;
+ key0.out_port = echo0->identifier;
+ out_addr = ip0->dst_address;
+ }
+ else
+ {
+ inner_ip0 = (ip4_header_t *)(echo0+1);
+ l4_header = ip4_next_header (inner_ip0);
+ protocol = ip_proto_to_snat_proto (inner_ip0->protocol);
+ key0.ext_host_addr = inner_ip0->dst_address;
+ out_addr = inner_ip0->src_address;
+ switch (protocol)
+ {
+ case SNAT_PROTOCOL_ICMP:
+ inner_icmp0 = (icmp46_header_t*)l4_header;
+ inner_echo0 = (icmp_echo_header_t *)(inner_icmp0+1);
+ key0.ext_host_port = 0;
+ key0.out_port = inner_echo0->identifier;
+ break;
+ case SNAT_PROTOCOL_UDP:
+ case SNAT_PROTOCOL_TCP:
+ key0.ext_host_port = ((tcp_udp_header_t*)l4_header)->dst_port;
+ key0.out_port = ((tcp_udp_header_t*)l4_header)->src_port;
+ break;
+ default:
+ b0->error = node->errors[SNAT_OUT2IN_ERROR_UNSUPPORTED_PROTOCOL];
+ next0 = SNAT_OUT2IN_NEXT_DROP;
+ goto out;
+ }
+ }
+
+ dm0 = snat_det_map_by_out(sm, &out_addr);
+ if (PREDICT_FALSE(!dm0))
+ {
+ /* Don't NAT packet aimed at the intfc address */
+ if (PREDICT_FALSE(is_interface_addr(sm, node, sw_if_index0,
+ ip0->dst_address.as_u32)))
+ {
+ dont_translate = 1;
+ goto out;
+ }
+ clib_warning("unknown dst address: %U",
+ format_ip4_address, &ip0->dst_address);
+ goto out;
+ }
+
+ snat_det_reverse(dm0, &ip0->dst_address,
+ clib_net_to_host_u16(key0.out_port), &new_addr0);
+
+ ses0 = snat_det_get_ses_by_out (dm0, &new_addr0, key0.as_u64);
+ if (PREDICT_FALSE(!ses0))
+ {
+ /* Don't NAT packet aimed at the intfc address */
+ if (PREDICT_FALSE(is_interface_addr(sm, node, sw_if_index0,
+ ip0->dst_address.as_u32)))
+ {
+ dont_translate = 1;
+ goto out;
+ }
+ clib_warning("no match src %U:%d dst %U:%d for user %U",
+ format_ip4_address, &key0.ext_host_addr,
+ clib_net_to_host_u16 (key0.ext_host_port),
+ format_ip4_address, &out_addr,
+ clib_net_to_host_u16 (key0.out_port),
+ format_ip4_address, &new_addr0);
+ b0->error = node->errors[SNAT_OUT2IN_ERROR_NO_TRANSLATION];
+ next0 = SNAT_OUT2IN_NEXT_DROP;
+ goto out;
+ }
+
+ if (PREDICT_FALSE(icmp0->type != ICMP4_echo_reply &&
+ !icmp_is_error_message (icmp0)))
+ {
+ b0->error = node->errors[SNAT_OUT2IN_ERROR_BAD_ICMP_TYPE];
+ next0 = SNAT_OUT2IN_NEXT_DROP;
+ goto out;
+ }
+
+ goto out;
+
+out:
+ *p_proto = protocol;
+ if (ses0)
+ {
+ p_value->addr = new_addr0;
+ p_value->fib_index = sm->inside_fib_index;
+ p_value->port = ses0->in_port;
+ }
+ *p_dont_translate = dont_translate;
+ if (d)
+ *(snat_det_session_t**)d = ses0;
+ if (e)
+ *(snat_det_map_t**)e = dm0;
+ return next0;
+}
+
/**********************/
/*** worker handoff ***/
/**********************/
@@ -1836,7 +2017,7 @@ snat_out2in_fast_node_fn (vlib_main_t * vm,
if (PREDICT_FALSE (proto0 == SNAT_PROTOCOL_ICMP))
{
next0 = icmp_out2in(sm, b0, ip0, icmp0, sw_if_index0,
- rx_fib_index0, node, next0, ~0, 0);
+ rx_fib_index0, node, next0, ~0, 0, 0);
goto trace00;
}
diff --git a/src/plugins/snat/snat.c b/src/plugins/snat/snat.c
index 70b6a6e285e..65d26b3cda2 100644
--- a/src/plugins/snat/snat.c
+++ b/src/plugins/snat/snat.c
@@ -2549,6 +2549,8 @@ snat_config (vlib_main_t * vm, unformat_input_t * input)
{
sm->in2out_node_index = snat_det_in2out_node.index;
sm->out2in_node_index = snat_det_out2in_node.index;
+ sm->icmp_match_in2out_cb = icmp_match_in2out_det;
+ sm->icmp_match_out2in_cb = icmp_match_out2in_det;
}
else
{
diff --git a/src/plugins/snat/snat.h b/src/plugins/snat/snat.h
index 92b2f7eae80..49b6e374968 100644
--- a/src/plugins/snat/snat.h
+++ b/src/plugins/snat/snat.h
@@ -226,7 +226,8 @@ typedef u32 snat_icmp_match_function_t (struct snat_main_s *sm,
u8 *p_proto,
snat_session_key_t *p_value,
u8 *p_dont_translate,
- void *d);
+ void *d,
+ void *e);
typedef u32 (snat_get_worker_function_t) (ip4_header_t * ip, u32 rx_fib_index);
@@ -404,19 +405,27 @@ typedef struct {
u32 icmp_match_in2out_fast(snat_main_t *sm, vlib_node_runtime_t *node,
u32 thread_index, vlib_buffer_t *b0, u8 *p_proto,
snat_session_key_t *p_value,
- u8 *p_dont_translate, void *d);
+ u8 *p_dont_translate, void *d, void *e);
u32 icmp_match_in2out_slow(snat_main_t *sm, vlib_node_runtime_t *node,
u32 thread_index, vlib_buffer_t *b0, u8 *p_proto,
snat_session_key_t *p_value,
- u8 *p_dont_translate, void *d);
+ u8 *p_dont_translate, void *d, void *e);
+u32 icmp_match_in2out_det(snat_main_t *sm, vlib_node_runtime_t *node,
+ u32 thread_index, vlib_buffer_t *b0, u8 *p_proto,
+ snat_session_key_t *p_value,
+ u8 *p_dont_translate, void *d, void *e);
u32 icmp_match_out2in_fast(snat_main_t *sm, vlib_node_runtime_t *node,
u32 thread_index, vlib_buffer_t *b0, u8 *p_proto,
snat_session_key_t *p_value,
- u8 *p_dont_translate, void *d);
+ u8 *p_dont_translate, void *d, void *e);
u32 icmp_match_out2in_slow(snat_main_t *sm, vlib_node_runtime_t *node,
u32 thread_index, vlib_buffer_t *b0, u8 *p_proto,
snat_session_key_t *p_value,
- u8 *p_dont_translate, void *d);
+ u8 *p_dont_translate, void *d, void *e);
+u32 icmp_match_out2in_det(snat_main_t *sm, vlib_node_runtime_t *node,
+ u32 thread_index, vlib_buffer_t *b0, u8 *p_proto,
+ snat_session_key_t *p_value,
+ u8 *p_dont_translate, void *d, void *e);
static_always_inline u8
icmp_is_error_message (icmp46_header_t * icmp)
">| | Set Interface State | ${dut} | ${dut_if} | up | | Add Interface To L2 BD | ${dut} | ${dut_if} | ${bd_id} | ${shg} | Initialize L2 bridge domain on node | | [Documentation] | | ... | Setup L2 bridge domain topology by adding two interfaces on DUT into | | ... | separate bridge domains that are created automatically starting with | | ... | index 1. Learning is enabled. Interfaces are brought up. | | | | ... | *Arguments:* | | ... | - dut - DUT node. Type: string | | ... | - count - Number of bridge domains interfaces. Type: integer | | | | ... | *Example:* | | | | ... | \| Initialize L2 bridge domain on node \| DUT1 \| 1 \| | | | | [Arguments] | ${dut} | ${count}=${1} | | | | FOR | ${id} | IN RANGE | 1 | ${count} + 1 | | | Add Interface To L2 BD | | | ... | ${nodes['${dut}']} | ${${dut}_${int}1_${id}}[0] | ${id} | | | Add Interface To L2 BD | | | ... | ${nodes['${dut}']} | ${${dut}_${int}2_${id}}[0] | ${id} | | END | Initialize L2 bridge domain | | [Documentation] | | ... | Setup L2 bridge domain topology by adding two interfaces on each DUT | | ... | into separate bridge domains that are created automatically starting | | ... | with index 1. Learning is enabled. Interfaces are brought up. | | | | ... | *Arguments:* | | ... | - count - Number of bridge domains. Type: integer | | | | ... | *Example:* | | | | ... | \| Initialize L2 bridge domain \| 1 \| | | | | [Arguments] | ${count}=${1} | | | | FOR | ${dut} | IN | @{duts} | | | Initialize L2 bridge domain on node | ${dut} | count=${count} | | END | Initialize L2 bridge domains with Vhost-User on node | | [Documentation] | | ... | Create pairs of Vhost-User interfaces for defined number of VMs on | | ... | defined VPP node. Add each Vhost-User interface into L2 bridge | | ... | domains with learning enabled with physical inteface or Vhost-User | | ... | interface of another VM. | | | | ... | *Arguments:* | | ... | - dut - DUT node. Type: string | | ... | - nf_chain - NF chain. Type: integer | | ... | - nf_nodes - Number of NFs nodes per chain. Type: integer | | ... | - virtio_feature_mask - Enabled Virtio features (Optional). | | ... | Type: integer | | | | ... | *Note:* | | ... | Socket paths for VM are defined in following format: | | ... | - /var/run/vpp/sock-\${VM_ID}-1 | | ... | - /var/run/vpp/sock-\${VM_ID}-2 | | | | ... | *Example:* | | | | ... | \| Initialize L2 bridge domains with Vhost-User on node \| DUT1 \ | | ... | \| 1 \| 1 \| | | | | [Arguments] | ${dut} | ${nf_chain}=${1} | ${nf_nodes}=${1} | | ... | ${virtio_feature_mask}=${None} | | | | ${bd_id1}= | Evaluate | ${nf_nodes} * (${nf_chain} - 1) + ${nf_chain} | | ${bd_id2}= | Evaluate | ${nf_nodes} * ${nf_chain} + ${nf_chain} | | Add interface to bridge domain | | ... | ${nodes['${dut}']} | ${${dut}_${int}1_${nf_chain}}[0] | | ... | ${bd_id1} | | Add interface to bridge domain | | ... | ${nodes['${dut}']} | ${${dut}_${int}2_${nf_chain}}[0] | | ... | ${bd_id2} | | FOR | ${nf_node} | IN RANGE | 1 | ${nf_nodes} + 1 | | | ${qemu_id}= | Evaluate | (${nf_chain} - ${1}) * ${nf_nodes} + ${nf_node} | | | Configure vhost interfaces | | | ... | ${nodes['${dut}']} | | | ... | /var/run/vpp/sock-${qemu_id}-1 | /var/run/vpp/sock-${qemu_id}-2 | | | ... | ${dut}-vhost-${qemu_id}-if1 | ${dut}-vhost-${qemu_id}-if2 | | | ... | virtio_feature_mask=${virtio_feature_mask} | | | ${bd_id1}= | Evaluate | ${qemu_id} + (${nf_chain} - 1) | | | ${bd_id2}= | Evaluate | ${bd_id1} + 1 | | | Add interface to bridge domain | | | ... | ${nodes['${dut}']} | ${${dut}-vhost-${qemu_id}-if1} | ${bd_id1} | | | Add interface to bridge domain | | | ... | ${nodes['${dut}']} | ${${dut}-vhost-${qemu_id}-if2} | ${bd_id2} | | END | Initialize L2 bridge domains with Vhost-User | | [Documentation] | | ... | Create pairs of Vhost-User interfaces for defined number of VNF nodes | | ... | on all defined VPP nodes. Add each Vhost-User interface into L2 bridge | | ... | domains with learning enabled with physical inteface or Vhost-User | | ... | interface of another VM. | | | | ... | *Arguments:* | | ... | - nf_chain - NF chain. Type: integer | | ... | - nf_nodes - Number of NFs nodes per chain. Type: integer | | ... | - virtio_feature_mask - Enabled Virtio features (Optional). | | ... | Type: integer | | | | ... | *Example:* | | | | ... | \| Initialize L2 bridge domains with Vhost-User \| 1 \| 1 \| | | | | [Arguments] | ${nf_chain}=${1} | ${nf_nodes}=${1} | | ... | ${virtio_feature_mask}=${None} | | | | FOR | ${dut} | IN | @{duts} | | | Initialize L2 bridge domains with Vhost-User on node | | | ... | ${dut} | nf_chain=${nf_chain} | nf_nodes=${nf_nodes} | | | ... | virtio_feature_mask=${virtio_feature_mask} | | END | Initialize L2 bridge domains for multiple chains with Vhost-User | | [Documentation] | | ... | Create pairs of Vhost-User interfaces for defined number of NF chains | | ... | with defined number of VNF nodes on all defined VPP nodes. Add each | | ... | Vhost-User interface into L2 bridge domains with learning enabled | | ... | with physical inteface or Vhost-User interface of another VM. | | ... | Put all interfaces in path up. | | | | ... | *Arguments:* | | ... | - nf_chains - Number of chains of NFs. Type: integer | | ... | - nf_nodes - Number of NFs nodes per chain. Type: integer | | ... | - start - Id of first chain, allows to add chains during test. | | ... | Type: integer | | ... | - virtio_feature_mask - Enabled Virtio features (Optional). | | ... | Type: integer | | | | ... | *Example:* | | | | ... | \| Initialize L2 bridge domains for multiple chains with Vhost-User \ | | ... | \| 3 \| 1 \| 2 \| | | | | [Arguments] | ${nf_chains}=${1} | ${nf_nodes}=${1} | ${start}=${1} | | ... | ${virtio_feature_mask}=${None} | | | | Set interfaces in path up | | FOR | ${nf_chain} | IN RANGE | ${start} | ${nf_chains} + 1 | | | Initialize L2 bridge domains with Vhost-User | | | ... | nf_chain=${nf_chain} | nf_nodes=${nf_nodes} | | | ... | virtio_feature_mask=${virtio_feature_mask} | | END | Initialize L2 bridge domain with VXLANoIPv4 in 3-node circular topology | | [Documentation] | | ... | Setup L2 bridge domain topology with VXLANoIPv4 by connecting | | ... | physical and vxlan interfaces on each DUT. All interfaces are brought | | ... | up. IPv4 addresses with prefix /24 are configured on interfaces | | ... | between DUTs. VXLAN sub-interfaces has same IPv4 address as | | ... | interfaces. | | | | Set interfaces in path up | | VPP Interface Set IP Address | | ... | ${dut1} | ${DUT1_${int}2}[0] | 172.16.0.1 | 24 | | VPP Interface Set IP Address | | ... | ${dut2} | ${DUT2_${int}1}[0] | 172.16.0.2 | 24 | | VPP Add IP Neighbor | | ... | ${dut1} | ${DUT1_${int}2}[0] | 172.16.0.2 | | ... | ${DUT2_${int}1_mac}[0] | | VPP Add IP Neighbor | | ... | ${dut2} | ${DUT2_${int}1}[0] | 172.16.0.1 | | ... | ${DUT1_${int}2_mac}[0] | | ${dut1s_vxlan}= | Create VXLAN interface | | ... | ${dut1} | 24 | 172.16.0.1 | 172.16.0.2 | | ${dut2s_vxlan}= | Create VXLAN interface | | ... | ${dut2} | 24 | 172.16.0.2 | 172.16.0.1 | | VPP Add L2 Bridge Domain | | ... | ${dut1} | ${1} | ${DUT1_${int}1}[0] | ${dut1s_vxlan} | | Set Interface State | | ... | ${dut1} | ${dut1s_vxlan} | up | | VPP Add L2 Bridge Domain | | ... | ${dut2} | ${1} | ${DUT2_${int}2}[0] | ${dut2s_vxlan} | | Set Interface State | | ... | ${dut2} | ${dut2s_vxlan} | up | Initialize L2 bridge domain with VLAN and VXLANoIPv4 in 3-node circular topology | | [Documentation] | | ... | Setup L2 bridge domain topology with VLAN and VXLANoIPv4 by connecting | | ... | pairs of VLAN sub-interface and VXLAN interface to separate L2 bridge | | ... | domain on each DUT. All interfaces are brought up. IPv4 addresses | | ... | with prefix /32 are configured on interfaces between DUTs. VXLAN | | ... | sub-interfaces has same IPv4 address as interfaces. | | | | ... | *Arguments:* | | ... | - vxlan_count - VXLAN count. Type: integer | | | | ... | *Example:* | | | | ... | \| Initialize L2 bridge domain with VLAN and VXLANoIPv4 in 3-node \ | | ... | \| circular topology \| ${1} \| | | | | [Arguments] | ${vxlan_count}=${1} | | | | Set interfaces in path up | | | | ${bd_id_start}= | Set Variable | ${1} | | ${vni_start} = | Set Variable | ${20} | | | | ${ip_step} = | Set Variable | ${2} | | ${dut1_ip_start}= | Set Variable | 172.16.0.1 | | ${dut2_ip_start}= | Set Variable | 172.16.0.2 | | | | Vpp create multiple VXLAN IPv4 tunnels | | ... | node=${dut1} | | ... | node_vxlan_if=${DUT1_${int}2}[0] | | ... | node_vlan_if=${DUT1_${int}1}[0] | | ... | op_node=${dut2} | | ... | op_node_if=${DUT2_${int}1}[0] | | ... | n_tunnels=${vxlan_count} | | ... | vni_start=${vni_start} | | ... | src_ip_start=${dut1_ip_start} | | ... | dst_ip_start=${dut2_ip_start} | | ... | ip_step=${ip_step} | | ... | bd_id_start=${bd_id_start} | | Vpp create multiple VXLAN IPv4 tunnels | | ... | node=${dut2} | | ... | node_vxlan_if=${DUT2_${int}1}[0] | | ... | node_vlan_if=${DUT2_${int}2}[0] | | ... | op_node=${dut1} | | ... | op_node_if=${DUT1_${int}2}[0] | | ... | n_tunnels=${vxlan_count} | | ... | vni_start=${vni_start} | | ... | src_ip_start=${dut2_ip_start} | | ... | dst_ip_start=${dut1_ip_start} | | ... | ip_step=${ip_step} | | ... | bd_id_start=${bd_id_start} | Initialize L2 bridge domains with Vhost-User and VXLANoIPv4 in 3-node circular topology | | [Documentation] | | ... | Create two Vhost-User interfaces on all defined VPP nodes. Add each | | ... | Vhost-User interface into L2 bridge domains with learning enabled | | ... | with physical inteface. | | ... | Setup VXLANoIPv4 between DUTs by connecting physical and vxlan | | ... | interfaces on each DUT. All interfaces are brought up. | | ... | IPv4 addresses with prefix /24 are configured on interfaces between | | ... | DUTs. VXLAN sub-interfaces has same IPv4 address as interfaces. | | | | ... | *Arguments:* | | ... | - bd_id1 - Bridge domain ID. Type: integer | | ... | - bd_id2 - Bridge domain ID. Type: integer | | ... | - virtio_feature_mask - Enabled Virtio features (Optional). | | ... | Type: integer | | | | ... | *Example:* | | | | ... | \| L2 bridge domains with Vhost-User and VXLANoIPv4 initialized in a\ | | ... | 3-node circular topology \| 1 \| 2 \| | | | | [Arguments] | ${bd_id1} | ${bd_id2} | ${virtio_feature_mask}=${None} | | | | VPP Interface Set IP Address | | ... | ${dut1} | ${DUT1_${int}2}[0] | 172.16.0.1 | 24 | | VPP Interface Set IP Address | | ... | ${dut2} | ${DUT2_${int}1}[0] | 172.16.0.2 | 24 | | Set interfaces in path up | | ${dut1s_vxlan}= | Create VXLAN interface | | ... | ${dut1} | 24 | 172.16.0.1 | 172.16.0.2 | | ${dut2s_vxlan}= | Create VXLAN interface | | ... | ${dut2} | 24 | 172.16.0.2 | 172.16.0.1 | | Configure vhost interfaces | ${dut1} | | ... | /var/run/vpp/sock-1-${bd_id1} | /var/run/vpp/sock-1-${bd_id2} | | ... | virtio_feature_mask=${virtio_feature_mask} | | Add interface to bridge domain | | ... | ${dut1} | ${DUT1_${int}1}[0] | ${bd_id1} | | Add interface to bridge domain | | ... | ${dut1} | ${vhost_if1} | ${bd_id1} | | Add interface to bridge domain | | ... | ${dut1} | ${vhost_if2} | ${bd_id2} | | Add interface to bridge domain | | ... | ${dut1} | ${dut1s_vxlan} | ${bd_id2} | | Configure vhost interfaces | ${dut2} | | ... | /var/run/vpp/sock-1-${bd_id1} | /var/run/vpp/sock-1-${bd_id2} | | ... | virtio_feature_mask=${virtio_feature_mask} | | Add interface to bridge domain | | ... | ${dut2} | ${dut2s_vxlan} | ${bd_id1} | | Add interface to bridge domain | | ... | ${dut2} | ${vhost_if1} | ${bd_id1} | | Add interface to bridge domain | | ... | ${dut2} | ${vhost_if2} | ${bd_id2} | | Add interface to bridge domain | | ... | ${dut2} | ${DUT2_${int}2}[0] | ${bd_id2} | Initialize L2 bridge domains with VLAN dot1q sub-interfaces in circular topology | | [Documentation] | | ... | Setup L2 bridge domain topology with learning enabled with VLAN by | | ... | connecting physical and vlan interfaces on each DUT. In case of 3-node | | ... | topology create VLAN sub-interfaces between DUTs. In case of 2-node | | ... | topology create VLAN sub-interface on dut1-if2 interface. All | | ... | interfaces are brought up. | | | | ... | *Arguments:* | | ... | - bd_id1 - Bridge domain ID. Type: integer | | ... | - bd_id2 - Bridge domain ID. Type: integer | | ... | - subid - ID of the sub-interface to be created. Type: string | | ... | - tag_rewrite - Method of tag rewrite. Type: string | | | | ... | _NOTE:_ This KW uses following test case variables: | | ... | - dut1 - DUT1 node. | | ... | - dut2 - DUT2 node. | | ... | - dut1_if2 - DUT1 interface towards DUT2. | | ... | - dut2_if1 - DUT2 interface towards DUT1. | | | | ... | *Example:* | | | | ... | \| Initialize L2 bridge domains with VLAN dot1q sub-interfaces | | ... | in a 3-node circular topology \| 1 \| 2 \| 10 \| pop-1 \| | | | | [Arguments] | ${bd_id1} | ${bd_id2} | ${subid} | ${tag_rewrite} | | | | ${dut2_status} | ${value}= | Run Keyword And Ignore Error | | ... | Variable Should Exist | ${dut2} | | | | Set interfaces in path up | | | | Run Keyword If | '${dut2_status}' == 'PASS' | | ... | Initialize VLAN dot1q sub-interfaces in circular topology | | ... | ${dut1} | ${DUT1_${int}2}[0] | | ... | ${dut2} | ${DUT2_${int}1}[0] | SUB_ID=${subid} | | ... | ELSE | Initialize VLAN dot1q sub-interfaces in circular topology | | ... | ${dut1} | ${DUT1_${int}2}[0] | SUB_ID=${subid} | | Run Keyword If | '${dut2_status}' == 'PASS' | | ... | Configure L2 tag rewrite method on interfaces | | ... | ${dut1} | ${subif_index_1} | | ... | ${dut2} | ${subif_index_2} | TAG_REWRITE_METHOD=${tag_rewrite} | | ... | ELSE | Configure L2 tag rewrite method on interfaces | | ... | ${dut1} | ${subif_index_1} | TAG_REWRITE_METHOD=${tag_rewrite} | | Add interface to bridge domain | | ... | ${dut1} | ${DUT1_${int}1}[0] | ${bd_id1} | | Add interface to bridge domain | | ... | ${dut1} | ${subif_index_1} | ${bd_id1} | | Run Keyword If | '${dut2_status}' == 'PASS' | | ... | Add interface to bridge domain | | ... | ${dut2} | ${subif_index_2} | ${bd_id2} | | Run Keyword If | '${dut2_status}' == 'PASS' | | ... | Add interface to bridge domain | | ... | ${dut2} | ${DUT2_${int}2}[0] | ${bd_id2} | Initialize L2 bridge domains with Vhost-User and VLAN in circular topology | | [Documentation] | | ... | Create two Vhost-User interfaces on all defined VPP nodes. Add each | | ... | Vhost-User interface into L2 bridge domains with learning enabled | | ... | with physical inteface. In case of 3-node topology create VLAN | | ... | sub-interfaces between DUTs. In case of 2-node topology create VLAN | | ... | sub-interface on dut1-if2 interface. All interfaces are brought up. | | | | ... | *Arguments:* | | ... | - bd_id1 - Bridge domain ID. Type: integer | | ... | - bd_id2 - Bridge domain ID. Type: integer | | ... | - subid - ID of the sub-interface to be created. Type: string | | ... | - tag_rewrite - Method of tag rewrite. Type: string | | ... | - virtio_feature_mask - Enabled Virtio features (Optional). | | ... | Type: integer | | | | ... | *Example:* | | | | ... | \| L2 bridge domains with Vhost-User and VLAN initialized in circular\ | | ... | topology \| 1 \| 2 \| 10 \| pop-1 \| | | | | [Arguments] | ${bd_id1} | ${bd_id2} | ${subid} | ${tag_rewrite} | | ... | ${virtio_feature_mask}=${None} | | | | ${dut2_status} | ${value}= | Run Keyword And Ignore Error | | ... | Variable Should Exist | ${dut2} | | | | Set interfaces in path up | | | | Run Keyword If | '${dut2_status}' == 'PASS' | | ... | Initialize VLAN dot1q sub-interfaces in circular topology | | ... | ${dut1} | ${DUT1_${int}2}[0] | | ... | ${dut2} | ${DUT2_${int}1}[0] | SUB_ID=${subid} | | ... | ELSE | Initialize VLAN dot1q sub-interfaces in circular topology | | ... | ${dut1} | ${DUT1_${int}2}[0] | SUB_ID=${subid} | | Run Keyword If | '${dut2_status}' == 'PASS' | | ... | Configure L2 tag rewrite method on interfaces | | ... | ${dut1} | ${subif_index_1} | | ... | ${dut2} | ${subif_index_2} | TAG_REWRITE_METHOD=${tag_rewrite} | | ... | ELSE | Configure L2 tag rewrite method on interfaces | | ... | ${dut1} | ${subif_index_1} | TAG_REWRITE_METHOD=${tag_rewrite} | | Configure vhost interfaces | ${dut1} | | ... | /var/run/vpp/sock-1-${bd_id1} | /var/run/vpp/sock-1-${bd_id2} | | ... | virtio_feature_mask=${virtio_feature_mask} | | Add interface to bridge domain | | ... | ${dut1} | ${DUT1_${int}1}[0] | ${bd_id1} | | Add interface to bridge domain | | ... | ${dut1} | ${vhost_if1} | ${bd_id1} | | Add interface to bridge domain | | ... | ${dut1} | ${vhost_if2} | ${bd_id2} | | Add interface to bridge domain | | ... | ${dut1} | ${subif_index_1} | ${bd_id2} | | Run Keyword If | '${dut2_status}' == 'PASS' | | ... | Configure vhost interfaces | ${dut2} | | ... | /var/run/vpp/sock-1-${bd_id1} | /var/run/vpp/sock-1-${bd_id2} | | ... | virtio_feature_mask=${virtio_feature_mask} | | Run Keyword If | '${dut2_status}' == 'PASS' | | ... | Add interface to bridge domain | ${dut2} | ${subif_index_2} | | ... | ${bd_id1} | | Run Keyword If | '${dut2_status}' == 'PASS' | | ... | Add interface to bridge domain | ${dut2} | ${vhost_if1} | ${bd_id1} | | Run Keyword If | '${dut2_status}' == 'PASS' | | ... | Add interface to bridge domain | ${dut2} | ${vhost_if2} | ${bd_id2} | | Run Keyword If | '${dut2_status}' == 'PASS' | | ... | Add interface to bridge domain | ${dut2} | ${DUT2_${int}2}[0] | | ... | ${bd_id2} | Initialize L2 bridge domains with Vhost-User and VLAN with VPP link bonding in a 3-node circular topology | | [Documentation] | | ... | Create two Vhost-User interfaces on all defined VPP nodes. Create one | | ... | link bonding (BondEthernet) interface on both VPP nodes. Add one | | ... | physical interface towards next DUT as a member of BondEthernet | | ... | interface. Setup VLAN on BondEthernet interfaces between DUTs. Add one | | ... | Vhost-User interface into L2 bridge domains with learning enabled with | | ... | physical interface towards TG and other Vhost-User interface into L2 | | ... | bridge domains with learning enabled with VLAN sub-interface. All | | ... | interfaces are brought up. | | | | ... | *Arguments:* | | ... | - bd_id1 - Bridge domain ID. Type: integer | | ... | - bd_id2 - Bridge domain ID. Type: integer | | ... | - subid - ID of the sub-interface to be created. Type: string | | ... | - tag_rewrite - Method of tag rewrite. Type: string | | ... | - bond_mode - Link bonding mode. Type: string | | ... | - lb_mode - Load balance mode. Type: string | | ... | - virtio_feature_mask - Enabled Virtio features (Optional). | | ... | Type: integer | | | | ... | *Example:* | | | | ... | \| Initialize L2 bridge domains with Vhost-User and VLAN with VPP\ | | ... | link bonding in a 3-node circular topology \| 1 \| 2 \ | | ... | \| 10 \| pop-1 \| xor \| l34 \| | | | | [Arguments] | ${bd_id1} | ${bd_id2} | ${subid} | ${tag_rewrite} | | ... | ${bond_mode} | ${lb_mode} | ${virtio_feature_mask}=${None} | | | | Set interfaces in path up | | ${dut1_eth_bond_if1}= | VPP Create Bond Interface | | ... | ${dut1} | ${bond_mode} | ${lb_mode} | | Set Interface State | ${dut1} | ${dut1_eth_bond_if1} | up | | VPP Set interface MTU | ${dut1} | ${dut1_eth_bond_if1} | | FOR | ${pf} | IN RANGE | 1 | ${nic_pfs} + 1 | | | ${_even}= | Evaluate | ${pf} % 2 | | | Run Keyword Unless | ${even} | | | ... | VPP Add Bond Member | | | ... | ${dut1} | ${DUT1_${int}${pf}}[0] | ${dut1_eth_bond_if1} | | END | | ${dut2_eth_bond_if1}= | VPP Create Bond Interface | | ... | ${dut2} | ${bond_mode} | ${lb_mode} | | Set Interface State | ${dut2} | ${dut2_eth_bond_if1} | up | | VPP Set interface MTU | ${dut2} | ${dut2_eth_bond_if1} | | FOR | ${pf} | IN RANGE | 1 | ${nic_pfs} + 1 | | | ${_even}= | Evaluate | ${pf} % 2 | | | Run Keyword If | ${even} | | | ... | VPP Add Bond Member | | | ... | ${dut2} | ${DUT2_${int}${pf}}[0] | ${dut2_eth_bond_if1} | | END | | VPP Show Bond Data On All Nodes | ${nodes} | verbose=${TRUE} | | Initialize VLAN dot1q sub-interfaces in circular topology | | ... | ${dut1} | ${dut1_eth_bond_if1} | | ... | ${dut2} | ${dut2_eth_bond_if1} | ${subid} | | Configure L2 tag rewrite method on interfaces | | ... | ${dut1} | ${subif_index_1} | | ... | ${dut2} | ${subif_index_2} | ${tag_rewrite} | | Configure vhost interfaces | ${dut1} | | ... | /var/run/vpp/sock-1-${bd_id1} | /var/run/vpp/sock-1-${bd_id2} | | ... | virtio_feature_mask=${virtio_feature_mask} | | Add interface to bridge domain | | ... | ${dut1} | ${DUT1_${int}1}[0] | ${bd_id1} | | Add interface to bridge domain | | ... | ${dut1} | ${vhost_if1} | ${bd_id1} | | Add interface to bridge domain | | ... | ${dut1} | ${vhost_if2} | ${bd_id2} | | Add interface to bridge domain | | ... | ${dut1} | ${subif_index_1} | ${bd_id2} | | Configure vhost interfaces | ${dut2} | | ... | /var/run/vpp/sock-1-${bd_id1} | /var/run/vpp/sock-1-${bd_id2} | | ... | virtio_feature_mask=${virtio_feature_mask} | | Add interface to bridge domain | | ... | ${dut2} | ${subif_index_2} | ${bd_id1} | | Add interface to bridge domain | | ... | ${dut2} | ${vhost_if1} | ${bd_id1} | | Add interface to bridge domain | | ... | ${dut2} | ${vhost_if2} | ${bd_id2} | | Add interface to bridge domain | | ... | ${dut2} | ${DUT2_${int}2}[0] | ${bd_id2} | Initialize L2 Bridge Domain with memif pairs on DUT node | | [Documentation] | | ... | Create pairs of Memif interfaces on DUT node. Put each Memif interface | | ... | to separate L2 bridge domain with one physical or memif interface | | ... | to create a chain accross DUT node. | | | | ... | *Arguments:* | | ... | - dut - DUT node. Type: dictionary | | ... | - nf_chain - NF chain. Type: integer | | ... | - nf_nodes - Number of NFs nodes per chain. Type: integer | | ... | - auto_scale - Whether to use same amount of RXQs for memif interface | | ... | in containers as vswitch, otherwise use single RXQ. Type: boolean | | | | ... | *Note:* | | ... | Socket paths for Memif are defined in following format: | | ... | - /tmp/memif-\${dut}_CNF\${nf_id}-\${sid} | | | | ... | *Example:* | | | | ... | \| Initialize L2 Bridge Domain with memif pairs on DUT node \ | | ... | \| ${dut} \| 1 \| 1 \| | | | | [Arguments] | ${dut} | ${nf_chain}=${1} | ${nf_nodes}=${1} | | ... | ${auto_scale}=${True} | | | | ${rxq}= | Run Keyword If | ${auto_scale} == ${True} | | ... | Set Variable | ${rxq_count_int} | | ... | ELSE | Set Variable | ${1} | | ${bd_id1}= | Evaluate | ${nf_nodes} * (${nf_chain} - 1) + ${nf_chain} | | ${bd_id2}= | Evaluate | ${nf_nodes} * ${nf_chain} + ${nf_chain} | | Add interface to bridge domain | | ... | ${nodes['${dut}']} | ${${dut}_${int}1_${nf_chain}}[0] | | ... | ${bd_id1} | | Add interface to bridge domain | | ... | ${nodes['${dut}']} | ${${dut}_${int}2_${nf_chain}}[0] | | ... | ${bd_id2} | | FOR | ${nf_node} | IN RANGE | 1 | ${nf_nodes}+1 | | | ${nf_id}= | Evaluate | (${nf_chain} - ${1}) * ${nf_nodes} + ${nf_node} | | | ${sock1}= | Set Variable | memif-${dut}_CNF | | | ${sock2}= | Set Variable | memif-${dut}_CNF | | | ${bd_id1}= | Evaluate | ${nf_id} + (${nf_chain} - 1) | | | ${bd_id2}= | Evaluate | ${bd_id1} + 1 | | | Set up memif interfaces on DUT node | ${nodes['${dut}']} | | | ... | ${sock1} | ${sock2} | ${nf_id} | ${dut}-memif-${nf_id}-if1 | | | ... | ${dut}-memif-${nf_id}-if2 | ${rxq} | ${rxq} | | | Add interface to bridge domain | | | ... | ${nodes['${dut}']} | ${${dut}-memif-${nf_id}-if1} | ${bd_id1} | | | Add interface to bridge domain | | | ... | ${nodes['${dut}']} | ${${dut}-memif-${nf_id}-if2} | ${bd_id2} | | END | Initialize L2 Bridge Domain with memif pairs | | [Documentation] | | ... | Create pairs of Memif interfaces on all defined VPP nodes. Put each | | ... | Memif interface to separate L2 bridge domain with one physical or | | ... | virtual interface to create a chain accross DUT node. | | | | ... | This keyword does not wait for memifs to go up. | | ... | Use the "for multiple chains" keyword for that functionality. | | | | ... | *Arguments:* | | ... | - nf_chain - NF chain. Type: integer | | ... | - nf_nodes - Number of NFs nodes per chain. Type: integer | | ... | - auto_scale - Whether to use same amount of RXQs for memif interface | | ... | in containers as vswitch, otherwise use single RXQ. Type: boolean | | | | ... | *Example:* | | | | ... | \| Initialize L2 Bridge Domain with memif pairs \| 1 \| 1 \| | | | | [Arguments] | ${nf_chain}=${1} | ${nf_nodes}=${1} | ${auto_scale}=${True} | | | | FOR | ${dut} | IN | @{duts} | | | Initialize L2 Bridge Domain with memif pairs on DUT node | ${dut} | | | ... | nf_chain=${nf_chain} | nf_nodes=${nf_nodes} | | | ... | auto_scale=${auto_scale} | | END | Initialize L2 Bridge Domain for multiple chains with memif pairs | | [Documentation] | | ... | Create pairs of Memif interfaces for defined number of NF chains | | ... | with defined number of NF nodes on all defined VPP nodes. Add each | | ... | Memif interface into L2 bridge domains with learning enabled | | ... | with physical inteface or Memif interface of another NF. | | | | ... | *Arguments:* | | ... | - nf_chains - Number of chains of NFs. Type: integer | | ... | - nf_nodes - Number of NFs nodes per chain. Type: integer | | ... | - auto_scale - Whether to use same amount of RXQs for memif interface | | ... | in containers as vswitch, otherwise use single RXQ. Type: boolean | | | | ... | *Example:* | | | | ... | \| Initialize L2 Bridge Domain for multiple chains with memif pairs \ | | ... | \| 1 \| 1 \| | | | | [Arguments] | ${nf_chains}=${1} | ${nf_nodes}=${1} | ${auto_scale}=${True} | | | | FOR | ${nf_chain} | IN RANGE | 1 | ${nf_chains}+1 | | | Initialize L2 Bridge Domain with memif pairs | nf_chain=${nf_chain} | | | ... | nf_nodes=${nf_nodes} | auto_scale=${auto_scale} | | END | | Set interfaces in path up | | Show Memif on all DUTs | ${nodes} | | VPP round robin RX placement on all DUTs | ${nodes} | prefix=memif | Initialize L2 Bridge Domain for pipeline with memif pairs | | [Documentation] | | ... | Create pairs of Memif interfaces on all defined VPP nodes. Put each | | ... | Memif interface to separate L2 bridge domain with one physical or | | ... | virtual interface to create a service pipeline on DUT node. | | | | ... | *Arguments:* | | ... | - nf_chain - NF pipe. Type: integer | | ... | - nf_nodes - Number of NFs nodes per pipeline. Type: integer | | ... | - auto_scale - Whether to use same amount of RXQs for memif interface | | ... | in containers as vswitch, otherwise use single RXQ. Type: boolean | | | | ... | *Example:* | | | | ... | \| Initialize L2 Bridge Domain for pipeline with memif pairs \ | | ... | \| 1 \| 1 \| | | | | [Arguments] | ${nf_chain}=${1} | ${nf_nodes}=${1} | ${auto_scale}=${True} | | | | ${rxq}= | Run Keyword If | ${auto_scale} == ${True} | | ... | Set Variable | ${rxq_count_int} | | ... | ELSE | Set Variable | ${1} | | ${bd_id1}= | Evaluate | ${nf_nodes} * (${nf_chain} - 1) + ${nf_chain} | | ${bd_id2}= | Evaluate | ${nf_nodes} * ${nf_chain} + ${nf_chain} | | FOR | ${dut} | IN | @{duts} | | | Add interface to bridge domain | | | ... | ${nodes['${dut}']} | ${${dut}_${int}1_${nf_chain}}[0] | | | ... | ${bd_id1} | | | Add interface to bridge domain | | | ... | ${nodes['${dut}']} | ${${dut}_${int}2_${nf_chain}}[0] | | | ... | ${bd_id2} | | | ${nf_id_frst}= | Evaluate | (${nf_chain}-${1}) * ${nf_nodes} + ${1} | | | ${nf_id_last}= | Evaluate | (${nf_chain}-${1}) * ${nf_nodes} + ${nf_nodes} | | | ${sid_frst}= | Evaluate | ${nf_id_frst} * ${2} - ${1} | | | ${sid_last}= | Evaluate | ${nf_id_last} * ${2} | | | Set up single memif interface on DUT node | ${nodes['${dut}']} | | | ... | memif-${dut}_CNF | mid=${nf_id_frst} | sid=${sid_frst} | | | ... | memif_if=${dut}-memif-${nf_id_frst}-if1 | | | ... | rxq=${rxq} | txq=${rxq} | | | Set up single memif interface on DUT node | ${nodes['${dut}']} | | | ... | memif-${dut}_CNF | mid=${nf_id_last} | sid=${sid_last} | | | ... | memif_if=${dut}-memif-${nf_id_last}-if2 | | | ... | rxq=${rxq} | txq=${rxq} | | | Add interface to bridge domain | | | ... | ${nodes['${dut}']} | ${${dut}-memif-${nf_id_frst}-if1} | ${bd_id1} | | | Add interface to bridge domain | | | ... | ${nodes['${dut}']} | ${${dut}-memif-${nf_id_last}-if2} | ${bd_id2} | | END | Initialize L2 Bridge Domain for multiple pipelines with memif pairs | | [Documentation] | | ... | Create pairs of Memif interfaces for defined number of NF pipelines | | ... | with defined number of NF nodes on all defined VPP nodes. Add each | | ... | Memif interface into L2 bridge domains with learning enabled | | ... | with physical inteface or Memif interface of another NF. | | | | ... | *Arguments:* | | ... | - nf_chains - Number of pipelines of NFs. Type: integer | | ... | - nf_nodes - Number of NFs nodes per pipeline. Type: integer | | ... | - auto_scale - Whether to use same amount of RXQs for memif interface | | ... | in containers as vswitch, otherwise use single RXQ. Type: boolean | | | | ... | *Example:* | | | | ... | \| Initialize L2 Bridge Domain for multiple pipelines with memif \ | | ... | pairs \| 1 \| 1 \| | | | | [Arguments] | ${nf_chains}=${1} | ${nf_nodes}=${1} | ${auto_scale}=${True} | | | | FOR | ${nf_chain} | IN RANGE | 1 | ${nf_chains}+1 | | | Initialize L2 Bridge Domain for pipeline with memif pairs | | | ... | nf_chain=${nf_chain} | nf_nodes=${nf_nodes} | | | ... | auto_scale=${auto_scale} | | END | | Set interfaces in path up | | Show Memif on all DUTs | ${nodes} | | VPP round robin RX placement on all DUTs | ${nodes} | prefix=memif | Initialize L2 Bridge Domain with memif pairs and VLAN in circular topology | | [Documentation] | | ... | Create pairs of Memif interfaces on all defined VPP nodes. Put each | | ... | Memif interface to separate L2 bridge domain with one physical or | | ... | virtual interface to create a chain accross DUT node. In case of | | ... | 3-node topology create VLAN sub-interfaces between DUTs. In case of | | ... | 2-node topology create VLAN sub-interface on dut1-if2 interface. All | | ... | interfaces are brought up. | | | | ... | *Arguments:* | | ... | - bd_id1 - Bridge domain ID. Type: integer | | ... | - bd_id2 - Bridge domain ID. Type: integer | | ... | - subid - ID of the sub-interface to be created. Type: string | | ... | - tag_rewrite - Method of tag rewrite. Type: string | | | | ... | *Example:* | | | | ... | \| Initialize L2 Bridge Domain with memif pairs and VLAN in circular\ | | ... | topology \| 1 \| 2 \| 10 \| pop-1 \| | | | | [Arguments] | ${bd_id1} | ${bd_id2} | ${subid} | ${tag_rewrite} | | | | ${dut2_status} | ${value}= | Run Keyword And Ignore Error | | ... | Variable Should Exist | ${dut2} | | | | Set interfaces in path up | | | | Run Keyword If | '${dut2_status}' == 'PASS' | | ... | Initialize VLAN dot1q sub-interfaces in circular topology | | ... | ${dut1} | ${DUT1_${int}2}[0] | | ... | ${dut2} | ${DUT2_${int}1}[0] | SUB_ID=${subid} | | ... | ELSE | Initialize VLAN dot1q sub-interfaces in circular topology | | ... | ${dut1} | ${DUT1_${int}2}[0] | SUB_ID=${subid} | | Run Keyword If | '${dut2_status}' == 'PASS' | | ... | Configure L2 tag rewrite method on interfaces | | ... | ${dut1} | ${subif_index_1} | | ... | ${dut2} | ${subif_index_2} | TAG_REWRITE_METHOD=${tag_rewrite} | | ... | ELSE | Configure L2 tag rewrite method on interfaces | | ... | ${dut1} | ${subif_index_1} | TAG_REWRITE_METHOD=${tag_rewrite} | | | | ${number}= | Set Variable | ${1} | | ${sock1}= | Set Variable | memif-DUT1_CNF | | ${sock2}= | Set Variable | memif-DUT1_CNF | | ${memif_if1_name}= | Set Variable | DUT1-memif-${number}-if1 | | ${memif_if2_name}= | Set Variable | DUT1-memif-${number}-if2 | | Set up memif interfaces on DUT node | ${dut1} | ${sock1} | ${sock2} | | ... | ${number} | ${memif_if1_name} | ${memif_if2_name} | ${rxq_count_int} | | ... | ${rxq_count_int} | | Add interface to bridge domain | | ... | ${dut1} | ${DUT1_${int}1}[0] | ${bd_id1} | | Add interface to bridge domain | | ... | ${dut1} | ${${memif_if1_name}} | ${bd_id1} | | Add interface to bridge domain | | ... | ${dut1} | ${${memif_if2_name}} | ${bd_id2} | | Add interface to bridge domain | | ... | ${dut1} | ${subif_index_1} | ${bd_id2} | | ${sock1}= | Run Keyword If | '${dut2_status}' == 'PASS' | | ... | Set Variable | memif-DUT2_CNF | | ${sock2}= | Run Keyword If | '${dut2_status}' == 'PASS' | | ... | Set Variable | memif-DUT2_CNF | | ${memif_if1_name}= | Run Keyword If | '${dut2_status}' == 'PASS' | | ... | Set Variable | DUT2-memif-${number}-if1 | | ${memif_if2_name}= | Run Keyword If | '${dut2_status}' == 'PASS' | | ... | Set Variable | DUT2-memif-${number}-if2 | | Run Keyword If | '${dut2_status}' == 'PASS' | | ... | Set up memif interfaces on DUT node | ${dut2} | ${sock1} | ${sock2} | | ... | ${number} | ${memif_if1_name} | ${memif_if2_name} | ${rxq_count_int} | | ... | ${rxq_count_int} | | Run Keyword If | '${dut2_status}' == 'PASS' | | ... | Add interface to bridge domain | | ... | ${dut2} | ${subif_index_2} | ${bd_id1} | | Run Keyword If | '${dut2_status}' == 'PASS' | | ... | Add interface to bridge domain | | ... | ${dut2} | ${${memif_if1_name}} | ${bd_id1} | | Run Keyword If | '${dut2_status}' == 'PASS' | | ... | Add interface to bridge domain | | ... | ${dut2} | ${${memif_if2_name}} | ${bd_id2} | | Run Keyword If | '${dut2_status}' == 'PASS' | | ... | Add interface to bridge domain | | ... | ${dut2} | ${DUT2_${int}2}[0] | ${bd_id2} | | | | Set interfaces in path up | | Show Memif on all DUTs | ${nodes} | | VPP round robin RX placement on all DUTs | ${nodes} | prefix=memif | Initialize L2 Bridge Domain for single memif | | [Documentation] | | ... | Create single Memif interface on all defined VPP nodes. Put Memif | | ... | interface to separate L2 bridge domain with one physical interface. | | | | ... | *Arguments:* | | ... | - number - Memif ID. Type: integer | | | | ... | *Note:* | | ... | Socket paths for Memif are defined in following format: | | ... | - /tmp/memif-DUT1_CNF\${number}-\${sid} | | | | ... | KW uses test variable ${rxq_count_int} set by KW Add worker threads | | ... | and rxqueues to all DUTs | | | | ... | *Example:* | | | | ... | \| Initialize L2 Bridge Domain for single memif \| 1 \| | | | | [Arguments] | ${number}=${1} | | | | FOR | ${dut} | IN | @{duts} | | | ${sock}= | Set Variable | memif-${dut}_CNF | | | ${sid}= | Evaluate | (${number} * ${2}) - ${1} | | | Set up single memif interface on DUT node | ${nodes['${dut}']} | ${sock} | | | ... | mid=${number} | sid=${sid} | memif_if=${dut}-memif-${number}-if1 | | | ... | rxq=${rxq_count_int} | txq=${rxq_count_int} | | | Add interface to bridge domain | | | ... | ${nodes['${dut}']} | ${${dut}_${int}1}[]0 | ${number} | | | Add interface to bridge domain | ${nodes['${dut}']} | | | ... | ${${dut}-memif-${number}-if1} | ${number} | | END | | Set single interfaces in path up | | Show Memif on all DUTs | ${nodes} | Initialize L2 bridge domain with MACIP ACLs in circular topology | | [Documentation] | | ... | Setup L2BD topology by adding two interfaces on DUT1 into bridge | | ... | domain that is created automatically with index 1. Learning is | | ... | enabled. Interfaces are brought up. Apply required MACIP ACL rules to | | ... | DUT1 interfaces. | | | | Set interfaces in path up | | | | VPP Add L2 Bridge Domain | | ... | ${dut1} | ${1} | ${DUT1_${int}1}[0] | ${DUT1_${int}2}[0] | | Configure MACIP ACLs | | ... | ${dut1} | ${DUT1_${int}1}[0] | ${DUT1_${int}2}[0] | | | | Run Keyword If | ${duts_count} == 2 | | ... | Configure L2XC | ${dut2} | ${DUT2_${int}1}[0] | ${DUT2_${int}2}[0] | Initialize L2 bridge domain with IPv4 ACLs in circular topology | | [Documentation] | | ... | Setup L2BD topology by adding two interfaces on DUT1 into bridge | | ... | domain that is created automatically with index 1. Learning is | | ... | enabled. Interfaces are brought up. Apply required ACL rules to DUT1 | | ... | interfaces. | | | | Set interfaces in path up | | | | VPP Add L2 Bridge Domain | | ... | ${dut1} | ${1} | ${DUT1_${int}1}[0] | ${DUT1_${int}2}[0] | | Configure IPv4 ACLs | | ... | ${dut1} | ${DUT1_${int}1}[0] | ${DUT1_${int}2}[0] | | | | Run Keyword If | ${duts_count} == 2 | | ... | Configure L2XC | ${dut2} | ${DUT2_${int}1}[0] | ${DUT2_${int}2}[0]