aboutsummaryrefslogtreecommitdiffstats
path: root/test/test_ipsec_spd_flow_cache_input.py
diff options
context:
space:
mode:
authorPratikshya Prasai <pratikshyaprasai2112@gmail.com>2022-08-18 11:09:38 -0400
committerDave Wallace <dwallacelf@gmail.com>2022-11-09 21:22:33 -0500
commit657bdf781ae876c945ca034e52cf25cccb09f71e (patch)
tree9ae70d0cb644ea9f609509ba4e83c84f687a264e /test/test_ipsec_spd_flow_cache_input.py
parent4dbd641136db81ba969a5a1c0374ec9c24525526 (diff)
tests: initial asf framework refactoring for 'make test'
Type: refactor Change-Id: I41455b759a5d302ad5c4247c13634c471e7d49a8 Signed-off-by: Pratikshya Prasai <pratikshyaprasai2112@gmail.com> Signed-off-by: Saima Yunus <yunus.saima.234@gmail.com> Signed-off-by: Dave Wallace <dwallacelf@gmail.com>
Diffstat (limited to 'test/test_ipsec_spd_flow_cache_input.py')
-rw-r--r--test/test_ipsec_spd_flow_cache_input.py866
1 files changed, 0 insertions, 866 deletions
diff --git a/test/test_ipsec_spd_flow_cache_input.py b/test/test_ipsec_spd_flow_cache_input.py
deleted file mode 100644
index e8c560211bc..00000000000
--- a/test/test_ipsec_spd_flow_cache_input.py
+++ /dev/null
@@ -1,866 +0,0 @@
-from os import remove
-import socket
-import unittest
-
-from util import ppp
-from framework import VppTestRunner
-from template_ipsec import SpdFlowCacheTemplate
-
-
-class SpdFlowCacheInbound(SpdFlowCacheTemplate):
- # Override setUpConstants to enable inbound flow cache in config
- @classmethod
- def setUpConstants(cls):
- super(SpdFlowCacheInbound, cls).setUpConstants()
- cls.vpp_cmdline.extend(["ipsec", "{", "ipv4-inbound-spd-flow-cache on", "}"])
- cls.logger.info("VPP modified cmdline is %s" % " ".join(cls.vpp_cmdline))
-
-
-class IPSec4SpdTestCaseBypass(SpdFlowCacheInbound):
- """ IPSec/IPv4 inbound: Policy mode test case with flow cache \
- (add bypass)"""
-
- def test_ipsec_spd_inbound_bypass(self):
- # In this test case, packets in IPv4 FWD path are configured
- # to go through IPSec inbound SPD policy lookup.
- #
- # 2 inbound SPD rules (1 HIGH and 1 LOW) are added.
- # - High priority rule action is set to DISCARD.
- # - Low priority rule action is set to BYPASS.
- #
- # Since BYPASS rules take precedence over DISCARD
- # (the order being PROTECT, BYPASS, DISCARD) we expect the
- # BYPASS rule to match and traffic to be correctly forwarded.
- self.create_interfaces(2)
- pkt_count = 5
-
- self.spd_create_and_intf_add(1, [self.pg1, self.pg0])
-
- # create input rules
- # bypass rule should take precedence over discard rule,
- # even though it's lower priority
- policy_0 = self.spd_add_rem_policy( # inbound, priority 10
- 1,
- self.pg1,
- self.pg0,
- socket.IPPROTO_UDP,
- is_out=0,
- priority=10,
- policy_type="bypass",
- )
- policy_1 = self.spd_add_rem_policy( # inbound, priority 15
- 1,
- self.pg1,
- self.pg0,
- socket.IPPROTO_UDP,
- is_out=0,
- priority=15,
- policy_type="discard",
- )
-
- # create output rule so we can capture forwarded packets
- policy_2 = self.spd_add_rem_policy( # outbound, priority 10
- 1,
- self.pg0,
- self.pg1,
- socket.IPPROTO_UDP,
- is_out=1,
- priority=10,
- policy_type="bypass",
- )
-
- # check flow cache is empty before sending traffic
- self.verify_num_inbound_flow_cache_entries(0)
- # create the packet stream
- packets = self.create_stream(self.pg0, self.pg1, pkt_count)
- # add the stream to the source interface
- self.pg0.add_stream(packets)
- self.pg1.enable_capture()
- self.pg_start()
-
- # check capture on pg1
- capture = self.pg1.get_capture()
- for packet in capture:
- try:
- self.logger.debug(ppp("SPD Add - Got packet:", packet))
- except Exception:
- self.logger.error(ppp("Unexpected or invalid packet:", packet))
- raise
- self.logger.debug("SPD: Num packets: %s", len(capture.res))
-
- # verify captured packets
- self.verify_capture(self.pg0, self.pg1, capture)
- # verify all policies matched the expected number of times
- self.verify_policy_match(pkt_count, policy_0)
- self.verify_policy_match(0, policy_1)
- self.verify_policy_match(pkt_count, policy_2)
- # check input policy has been cached
- self.verify_num_inbound_flow_cache_entries(1)
-
-
-class IPSec4SpdTestCaseDiscard(SpdFlowCacheInbound):
- """ IPSec/IPv4 inbound: Policy mode test case with flow cache \
- (add discard)"""
-
- def test_ipsec_spd_inbound_discard(self):
- # In this test case, packets in IPv4 FWD path are configured
- # to go through IPSec inbound SPD policy lookup.
- # 1 DISCARD rule is added, so all traffic should be dropped.
- self.create_interfaces(2)
- pkt_count = 5
-
- self.spd_create_and_intf_add(1, [self.pg1, self.pg0])
-
- # create input rule
- policy_0 = self.spd_add_rem_policy( # inbound, priority 10
- 1,
- self.pg1,
- self.pg0,
- socket.IPPROTO_UDP,
- is_out=0,
- priority=10,
- policy_type="discard",
- )
-
- # create output rule so we can capture forwarded packets
- policy_1 = self.spd_add_rem_policy( # outbound, priority 10
- 1,
- self.pg0,
- self.pg1,
- socket.IPPROTO_UDP,
- is_out=1,
- priority=10,
- policy_type="bypass",
- )
-
- # check flow cache is empty before sending traffic
- self.verify_num_inbound_flow_cache_entries(0)
- # create the packet stream
- packets = self.create_stream(self.pg0, self.pg1, pkt_count)
- # add the stream to the source interface
- self.pg0.add_stream(packets)
- self.pg1.enable_capture()
- self.pg_start()
- # inbound discard rule should have dropped traffic
- self.pg1.assert_nothing_captured()
- # verify all policies matched the expected number of times
- self.verify_policy_match(pkt_count, policy_0)
- self.verify_policy_match(0, policy_1)
- # only inbound discard rule should have been cached
- self.verify_num_inbound_flow_cache_entries(1)
-
-
-class IPSec4SpdTestCaseRemoveInbound(SpdFlowCacheInbound):
- """ IPSec/IPv4 inbound: Policy mode test case with flow cache \
- (remove bypass)"""
-
- def test_ipsec_spd_inbound_remove(self):
- # In this test case, packets in IPv4 FWD path are configured
- # to go through IPSec inbound SPD policy lookup.
- #
- # 2 inbound SPD rules (1 HIGH and 1 LOW) are added.
- # - High priority rule action is set to DISCARD.
- # - Low priority rule action is set to BYPASS.
- #
- # Since BYPASS rules take precedence over DISCARD
- # (the order being PROTECT, BYPASS, DISCARD) we expect the
- # BYPASS rule to match and traffic to be correctly forwarded.
- #
- # The BYPASS rules is then removed, and we check that all traffic
- # is now correctly dropped.
- self.create_interfaces(2)
- pkt_count = 5
-
- self.spd_create_and_intf_add(1, [self.pg1, self.pg0])
-
- # create input rules
- # bypass rule should take precedence over discard rule,
- # even though it's lower priority
- policy_0 = self.spd_add_rem_policy( # inbound, priority 10
- 1,
- self.pg1,
- self.pg0,
- socket.IPPROTO_UDP,
- is_out=0,
- priority=10,
- policy_type="bypass",
- )
- policy_1 = self.spd_add_rem_policy( # inbound, priority 15
- 1,
- self.pg1,
- self.pg0,
- socket.IPPROTO_UDP,
- is_out=0,
- priority=15,
- policy_type="discard",
- )
-
- # create output rule so we can capture forwarded packets
- policy_2 = self.spd_add_rem_policy( # outbound, priority 10
- 1,
- self.pg0,
- self.pg1,
- socket.IPPROTO_UDP,
- is_out=1,
- priority=10,
- policy_type="bypass",
- )
-
- # check flow cache is empty before sending traffic
- self.verify_num_inbound_flow_cache_entries(0)
- # create the packet stream
- packets = self.create_stream(self.pg0, self.pg1, pkt_count)
- # add the stream to the source interface
- self.pg0.add_stream(packets)
- self.pg1.enable_capture()
- self.pg_start()
-
- # check capture on pg1
- capture = self.pg1.get_capture()
- for packet in capture:
- try:
- self.logger.debug(ppp("SPD Add - Got packet:", packet))
- except Exception:
- self.logger.error(ppp("Unexpected or invalid packet:", packet))
- raise
- self.logger.debug("SPD: Num packets: %s", len(capture.res))
-
- # verify captured packets
- self.verify_capture(self.pg0, self.pg1, capture)
- # verify all policies matched the expected number of times
- self.verify_policy_match(pkt_count, policy_0)
- self.verify_policy_match(0, policy_1)
- self.verify_policy_match(pkt_count, policy_2)
- # check input policy has been cached
- self.verify_num_inbound_flow_cache_entries(1)
-
- # remove the input bypass rule
- self.spd_add_rem_policy( # inbound, priority 10
- 1,
- self.pg1,
- self.pg0,
- socket.IPPROTO_UDP,
- is_out=0,
- priority=10,
- policy_type="bypass",
- remove=True,
- )
- # verify flow cache counter has been reset by rule removal
- self.verify_num_inbound_flow_cache_entries(0)
-
- # resend the same packets
- self.pg0.add_stream(packets)
- self.pg1.enable_capture() # flush the old capture
- self.pg_start()
-
- # inbound discard rule should have dropped traffic
- self.pg1.assert_nothing_captured()
- # verify all policies matched the expected number of times
- self.verify_policy_match(pkt_count, policy_0)
- self.verify_policy_match(pkt_count, policy_1)
- self.verify_policy_match(pkt_count, policy_2)
- # by removing the bypass rule, we should have reset the flow cache
- # we only expect the discard rule to now be in the flow cache
- self.verify_num_inbound_flow_cache_entries(1)
-
-
-class IPSec4SpdTestCaseReaddInbound(SpdFlowCacheInbound):
- """ IPSec/IPv4 inbound: Policy mode test case with flow cache \
- (add, remove, re-add bypass)"""
-
- def test_ipsec_spd_inbound_readd(self):
- # In this test case, packets in IPv4 FWD path are configured
- # to go through IPSec inbound SPD policy lookup.
- #
- # 2 inbound SPD rules (1 HIGH and 1 LOW) are added.
- # - High priority rule action is set to DISCARD.
- # - Low priority rule action is set to BYPASS.
- #
- # Since BYPASS rules take precedence over DISCARD
- # (the order being PROTECT, BYPASS, DISCARD) we expect the
- # BYPASS rule to match and traffic to be correctly forwarded.
- #
- # The BYPASS rules is then removed, and we check that all traffic
- # is now correctly dropped.
- #
- # The BYPASS rule is then readded, checking traffic is not forwarded
- # correctly again
- self.create_interfaces(2)
- pkt_count = 5
-
- self.spd_create_and_intf_add(1, [self.pg1, self.pg0])
-
- # create input rules
- # bypass rule should take precedence over discard rule,
- # even though it's lower priority
- policy_0 = self.spd_add_rem_policy( # inbound, priority 10
- 1,
- self.pg1,
- self.pg0,
- socket.IPPROTO_UDP,
- is_out=0,
- priority=10,
- policy_type="bypass",
- )
- policy_1 = self.spd_add_rem_policy( # inbound, priority 15
- 1,
- self.pg1,
- self.pg0,
- socket.IPPROTO_UDP,
- is_out=0,
- priority=15,
- policy_type="discard",
- )
-
- # create output rule so we can capture forwarded packets
- policy_2 = self.spd_add_rem_policy( # outbound, priority 10
- 1,
- self.pg0,
- self.pg1,
- socket.IPPROTO_UDP,
- is_out=1,
- priority=10,
- policy_type="bypass",
- )
-
- # check flow cache is empty before sending traffic
- self.verify_num_inbound_flow_cache_entries(0)
- # create the packet stream
- packets = self.create_stream(self.pg0, self.pg1, pkt_count)
- # add the stream to the source interface
- self.pg0.add_stream(packets)
- self.pg1.enable_capture()
- self.pg_start()
-
- # check capture on pg1
- capture = self.pg1.get_capture()
- for packet in capture:
- try:
- self.logger.debug(ppp("SPD Add - Got packet:", packet))
- except Exception:
- self.logger.error(ppp("Unexpected or invalid packet:", packet))
- raise
- self.logger.debug("SPD: Num packets: %s", len(capture.res))
-
- # verify captured packets
- self.verify_capture(self.pg0, self.pg1, capture)
- # verify all policies matched the expected number of times
- self.verify_policy_match(pkt_count, policy_0)
- self.verify_policy_match(0, policy_1)
- self.verify_policy_match(pkt_count, policy_2)
- # check input policy has been cached
- self.verify_num_inbound_flow_cache_entries(1)
-
- # remove the input bypass rule
- self.spd_add_rem_policy( # inbound, priority 10
- 1,
- self.pg1,
- self.pg0,
- socket.IPPROTO_UDP,
- is_out=0,
- priority=10,
- policy_type="bypass",
- remove=True,
- )
- # verify flow cache counter has been reset by rule removal
- self.verify_num_inbound_flow_cache_entries(0)
-
- # resend the same packets
- self.pg0.add_stream(packets)
- self.pg1.enable_capture() # flush the old capture
- self.pg_start()
-
- # inbound discard rule should have dropped traffic
- self.pg1.assert_nothing_captured()
- # verify all policies matched the expected number of times
- self.verify_policy_match(pkt_count, policy_0)
- self.verify_policy_match(pkt_count, policy_1)
- self.verify_policy_match(pkt_count, policy_2)
- # by removing the bypass rule, flow cache was reset
- # we only expect the discard rule to now be in the flow cache
- self.verify_num_inbound_flow_cache_entries(1)
-
- # readd the input bypass rule
- policy_0 = self.spd_add_rem_policy( # inbound, priority 10
- 1,
- self.pg1,
- self.pg0,
- socket.IPPROTO_UDP,
- is_out=0,
- priority=10,
- policy_type="bypass",
- )
- # verify flow cache counter has been reset by rule addition
- self.verify_num_inbound_flow_cache_entries(0)
-
- # resend the same packets
- self.pg0.add_stream(packets)
- self.pg1.enable_capture() # flush the old capture
- self.pg_start()
-
- # check capture on pg1
- capture = self.pg1.get_capture()
- for packet in capture:
- try:
- self.logger.debug(ppp("SPD Add - Got packet:", packet))
- except Exception:
- self.logger.error(ppp("Unexpected or invalid packet:", packet))
- raise
-
- # verify captured packets
- self.verify_capture(self.pg0, self.pg1, capture)
- # verify all policies matched the expected number of times
- self.verify_policy_match(pkt_count, policy_0)
- self.verify_policy_match(pkt_count, policy_1)
- self.verify_policy_match(pkt_count * 2, policy_2)
- # by readding the bypass rule, we reset the flow cache
- # we only expect the bypass rule to now be in the flow cache
- self.verify_num_inbound_flow_cache_entries(1)
-
-
-class IPSec4SpdTestCaseMultipleInbound(SpdFlowCacheInbound):
- """ IPSec/IPv4 inbound: Policy mode test case with flow cache \
- (multiple interfaces, multiple rules)"""
-
- def test_ipsec_spd_inbound_multiple(self):
- # In this test case, packets in IPv4 FWD path are configured to go
- # through IPSec outbound SPD policy lookup.
- #
- # Multiples rules on multiple interfaces are tested at the same time.
- # 3x interfaces are configured, binding the same SPD to each.
- # Each interface has 1 SPD rule- 2x BYPASS and 1x DISCARD
- #
- # Traffic should be forwarded with destinations pg1 & pg2
- # and dropped to pg0.
- self.create_interfaces(3)
- pkt_count = 5
- # bind SPD to all interfaces
- self.spd_create_and_intf_add(1, self.pg_interfaces)
- # add input rules on all interfaces
- # pg0 -> pg1
- policy_0 = self.spd_add_rem_policy( # inbound, priority 10
- 1,
- self.pg1,
- self.pg0,
- socket.IPPROTO_UDP,
- is_out=0,
- priority=10,
- policy_type="bypass",
- )
- # pg1 -> pg2
- policy_1 = self.spd_add_rem_policy( # inbound, priority 10
- 1,
- self.pg2,
- self.pg1,
- socket.IPPROTO_UDP,
- is_out=0,
- priority=10,
- policy_type="bypass",
- )
- # pg2 -> pg0
- policy_2 = self.spd_add_rem_policy( # inbound, priority 10
- 1,
- self.pg0,
- self.pg2,
- socket.IPPROTO_UDP,
- is_out=0,
- priority=10,
- policy_type="discard",
- )
-
- # create output rules covering the the full ip range
- # 0.0.0.0 -> 255.255.255.255, so we can capture forwarded packets
- policy_3 = self.spd_add_rem_policy( # outbound, priority 10
- 1,
- self.pg0,
- self.pg0,
- socket.IPPROTO_UDP,
- is_out=1,
- priority=10,
- policy_type="bypass",
- all_ips=True,
- )
-
- # check flow cache is empty (0 active elements) before sending traffic
- self.verify_num_inbound_flow_cache_entries(0)
-
- # create the packet streams
- packets0 = self.create_stream(self.pg0, self.pg1, pkt_count)
- packets1 = self.create_stream(self.pg1, self.pg2, pkt_count)
- packets2 = self.create_stream(self.pg2, self.pg0, pkt_count)
- # add the streams to the source interfaces
- self.pg0.add_stream(packets0)
- self.pg1.add_stream(packets1)
- self.pg2.add_stream(packets2)
- # enable capture on all interfaces
- for pg in self.pg_interfaces:
- pg.enable_capture()
- # start the packet generator
- self.pg_start()
-
- # get captures from ifs
- if_caps = []
- for pg in [self.pg1, self.pg2]: # we are expecting captures on pg1/pg2
- if_caps.append(pg.get_capture())
- for packet in if_caps[-1]:
- try:
- self.logger.debug(ppp("SPD Add - Got packet:", packet))
- except Exception:
- self.logger.error(ppp("Unexpected or invalid packet:", packet))
- raise
-
- # verify captures that matched BYPASS rules
- self.verify_capture(self.pg0, self.pg1, if_caps[0])
- self.verify_capture(self.pg1, self.pg2, if_caps[1])
- # verify that traffic to pg0 matched DISCARD rule and was dropped
- self.pg0.assert_nothing_captured()
- # verify all policies matched the expected number of times
- self.verify_policy_match(pkt_count, policy_0)
- self.verify_policy_match(pkt_count, policy_1)
- self.verify_policy_match(pkt_count, policy_2)
- # check flow/policy match was cached for: 3x input policies
- self.verify_num_inbound_flow_cache_entries(3)
-
-
-class IPSec4SpdTestCaseOverwriteStaleInbound(SpdFlowCacheInbound):
- """ IPSec/IPv4 inbound: Policy mode test case with flow cache \
- (overwrite stale entries)"""
-
- def test_ipsec_spd_inbound_overwrite(self):
- # The operation of the flow cache is setup so that the entire cache
- # is invalidated when adding or removing an SPD policy rule.
- # For performance, old cache entries are not zero'd, but remain
- # in the table as "stale" entries. If a flow matches a stale entry,
- # and the epoch count does NOT match the current count, the entry
- # is overwritten.
- # In this test, 3 active rules are created and matched to enter
- # them into the flow cache.
- # A single entry is removed to invalidate the entire cache.
- # We then readd the rule and test that overwriting of the previous
- # stale entries occurs as expected, and that the flow cache entry
- # counter is updated correctly.
- self.create_interfaces(3)
- pkt_count = 5
- # bind SPD to all interfaces
- self.spd_create_and_intf_add(1, self.pg_interfaces)
- # add input rules on all interfaces
- # pg0 -> pg1
- policy_0 = self.spd_add_rem_policy( # inbound
- 1,
- self.pg1,
- self.pg0,
- socket.IPPROTO_UDP,
- is_out=0,
- priority=10,
- policy_type="bypass",
- )
- # pg1 -> pg2
- policy_1 = self.spd_add_rem_policy( # inbound
- 1,
- self.pg2,
- self.pg1,
- socket.IPPROTO_UDP,
- is_out=0,
- priority=10,
- policy_type="bypass",
- )
- # pg2 -> pg0
- policy_2 = self.spd_add_rem_policy( # inbound
- 1,
- self.pg0,
- self.pg2,
- socket.IPPROTO_UDP,
- is_out=0,
- priority=10,
- policy_type="discard",
- )
-
- # create output rules covering the the full ip range
- # 0.0.0.0 -> 255.255.255.255, so we can capture forwarded packets
- policy_3 = self.spd_add_rem_policy( # outbound
- 1,
- self.pg0,
- self.pg0,
- socket.IPPROTO_UDP,
- is_out=1,
- priority=10,
- policy_type="bypass",
- all_ips=True,
- )
-
- # check flow cache is empty (0 active elements) before sending traffic
- self.verify_num_inbound_flow_cache_entries(0)
-
- # create the packet streams
- packets0 = self.create_stream(self.pg0, self.pg1, pkt_count)
- packets1 = self.create_stream(self.pg1, self.pg2, pkt_count)
- packets2 = self.create_stream(self.pg2, self.pg0, pkt_count)
- # add the streams to the source interfaces
- self.pg0.add_stream(packets0)
- self.pg1.add_stream(packets1)
- self.pg2.add_stream(packets2)
- # enable capture on all interfaces
- for pg in self.pg_interfaces:
- pg.enable_capture()
- # start the packet generator
- self.pg_start()
-
- # get captures from ifs
- if_caps = []
- for pg in [self.pg1, self.pg2]: # we are expecting captures on pg1/pg2
- if_caps.append(pg.get_capture())
- for packet in if_caps[-1]:
- try:
- self.logger.debug(ppp("SPD Add - Got packet:", packet))
- except Exception:
- self.logger.error(ppp("Unexpected or invalid packet:", packet))
- raise
-
- # verify captures that matched BYPASS rules
- self.verify_capture(self.pg0, self.pg1, if_caps[0])
- self.verify_capture(self.pg1, self.pg2, if_caps[1])
- # verify that traffic to pg0 matched DISCARD rule and was dropped
- self.pg0.assert_nothing_captured()
- # verify all policies matched the expected number of times
- self.verify_policy_match(pkt_count, policy_0)
- self.verify_policy_match(pkt_count, policy_1)
- self.verify_policy_match(pkt_count, policy_2)
- # check flow/policy match was cached for: 3x input policies
- self.verify_num_inbound_flow_cache_entries(3)
-
- # adding an outbound policy should not invalidate output flow cache
- self.spd_add_rem_policy( # outbound
- 1,
- self.pg0,
- self.pg0,
- socket.IPPROTO_UDP,
- is_out=1,
- priority=1,
- policy_type="bypass",
- all_ips=True,
- )
- # check inbound flow cache counter has not been reset
- self.verify_num_inbound_flow_cache_entries(3)
-
- # remove + readd bypass policy - flow cache counter will be reset,
- # and there will be 3x stale entries in flow cache
- self.spd_add_rem_policy( # inbound, priority 10
- 1,
- self.pg1,
- self.pg0,
- socket.IPPROTO_UDP,
- is_out=0,
- priority=10,
- policy_type="bypass",
- remove=True,
- )
- # readd policy
- policy_0 = self.spd_add_rem_policy( # inbound, priority 10
- 1,
- self.pg1,
- self.pg0,
- socket.IPPROTO_UDP,
- is_out=0,
- priority=10,
- policy_type="bypass",
- )
- # check counter was reset
- self.verify_num_inbound_flow_cache_entries(0)
-
- # resend the same packets
- self.pg0.add_stream(packets0)
- self.pg1.add_stream(packets1)
- self.pg2.add_stream(packets2)
- for pg in self.pg_interfaces:
- pg.enable_capture() # flush previous captures
- self.pg_start()
-
- # get captures from ifs
- if_caps = []
- for pg in [self.pg1, self.pg2]: # we are expecting captures on pg1/pg2
- if_caps.append(pg.get_capture())
- for packet in if_caps[-1]:
- try:
- self.logger.debug(ppp("SPD Add - Got packet:", packet))
- except Exception:
- self.logger.error(ppp("Unexpected or invalid packet:", packet))
- raise
-
- # verify captures that matched BYPASS rules
- self.verify_capture(self.pg0, self.pg1, if_caps[0])
- self.verify_capture(self.pg1, self.pg2, if_caps[1])
- # verify that traffic to pg0 matched DISCARD rule and was dropped
- self.pg0.assert_nothing_captured()
- # verify all policies matched the expected number of times
- self.verify_policy_match(pkt_count, policy_0)
- self.verify_policy_match(pkt_count * 2, policy_1)
- self.verify_policy_match(pkt_count * 2, policy_2)
- # we are overwriting 3x stale entries - check flow cache counter
- # is correct
- self.verify_num_inbound_flow_cache_entries(3)
-
-
-class IPSec4SpdTestCaseCollisionInbound(SpdFlowCacheInbound):
- """ IPSec/IPv4 inbound: Policy mode test case with flow cache \
- (hash collision)"""
-
- # Override class setup to restrict hash table size to 16 buckets.
- # This forces using only the lower 4 bits of the hash as a key,
- # making hash collisions easy to find.
- @classmethod
- def setUpConstants(cls):
- super(SpdFlowCacheInbound, cls).setUpConstants()
- cls.vpp_cmdline.extend(
- [
- "ipsec",
- "{",
- "ipv4-inbound-spd-flow-cache on",
- "ipv4-inbound-spd-hash-buckets 16",
- "}",
- ]
- )
- cls.logger.info("VPP modified cmdline is %s" % " ".join(cls.vpp_cmdline))
-
- def test_ipsec_spd_inbound_collision(self):
- # The flow cache operation is setup to overwrite an entry
- # if a hash collision occurs.
- # In this test, 2 packets are configured that result in a
- # hash with the same lower 4 bits.
- # After the first packet is received, there should be one
- # active entry in the flow cache.
- # After the second packet with the same lower 4 bit hash
- # is received, this should overwrite the same entry.
- # Therefore there will still be a total of one (1) entry,
- # in the flow cache with two matching policies.
- # crc32_supported() method is used to check cpu for crc32
- # intrinsic support for hashing.
- # If crc32 is not supported, we fall back to clib_xxhash()
- self.create_interfaces(4)
- pkt_count = 5
- # bind SPD to all interfaces
- self.spd_create_and_intf_add(1, self.pg_interfaces)
-
- # create output rules covering the the full ip range
- # 0.0.0.0 -> 255.255.255.255, so we can capture forwarded packets
- policy_0 = self.spd_add_rem_policy( # outbound
- 1,
- self.pg0,
- self.pg0,
- socket.IPPROTO_UDP,
- is_out=1,
- priority=10,
- policy_type="bypass",
- all_ips=True,
- )
-
- capture_intfs = []
- if self.crc32_supported(): # create crc32 collision on last 4 bits
- hashed_with_crc32 = True
- # add matching rules
- policy_1 = self.spd_add_rem_policy( # inbound, priority 10
- 1,
- self.pg1,
- self.pg2,
- socket.IPPROTO_UDP,
- is_out=0,
- priority=10,
- policy_type="bypass",
- )
- policy_2 = self.spd_add_rem_policy( # inbound, priority 10
- 1,
- self.pg3,
- self.pg0,
- socket.IPPROTO_UDP,
- is_out=0,
- priority=10,
- policy_type="bypass",
- )
-
- # we expect to get captures on pg1 + pg3
- capture_intfs.append(self.pg1)
- capture_intfs.append(self.pg3)
-
- # check flow cache is empty before sending traffic
- self.verify_num_inbound_flow_cache_entries(0)
-
- # create the packet streams
- # packet hashes to:
- # ad727628
- packets1 = self.create_stream(self.pg2, self.pg1, pkt_count, 1, 1)
- # b5512898
- packets2 = self.create_stream(self.pg0, self.pg3, pkt_count, 1, 1)
- # add the streams to the source interfaces
- self.pg2.add_stream(packets1)
- self.pg0.add_stream(packets2)
- else: # create xxhash collision on last 4 bits
- hashed_with_crc32 = False
- # add matching rules
- policy_1 = self.spd_add_rem_policy( # inbound, priority 10
- 1,
- self.pg1,
- self.pg2,
- socket.IPPROTO_UDP,
- is_out=0,
- priority=10,
- policy_type="bypass",
- )
- policy_2 = self.spd_add_rem_policy( # inbound, priority 10
- 1,
- self.pg2,
- self.pg3,
- socket.IPPROTO_UDP,
- is_out=0,
- priority=10,
- policy_type="bypass",
- )
-
- capture_intfs.append(self.pg1)
- capture_intfs.append(self.pg2)
-
- # check flow cache is empty before sending traffic
- self.verify_num_inbound_flow_cache_entries(0)
-
- # create the packet streams
- # 2f8f90f557eef12c
- packets1 = self.create_stream(self.pg2, self.pg1, pkt_count, 1, 1)
- # 6b7f9987719ffc1c
- packets2 = self.create_stream(self.pg3, self.pg2, pkt_count, 1, 1)
- # add the streams to the source interfaces
- self.pg2.add_stream(packets1)
- self.pg3.add_stream(packets2)
-
- # enable capture on interfaces we expect capture on & send pkts
- for pg in capture_intfs:
- pg.enable_capture()
- self.pg_start()
-
- # get captures
- if_caps = []
- for pg in capture_intfs:
- if_caps.append(pg.get_capture())
- for packet in if_caps[-1]:
- try:
- self.logger.debug(ppp("SPD Add - Got packet:", packet))
- except Exception:
- self.logger.error(ppp("Unexpected or invalid packet:", packet))
- raise
-
- # verify captures that matched BYPASS rule
- if hashed_with_crc32:
- self.verify_capture(self.pg2, self.pg1, if_caps[0])
- self.verify_capture(self.pg0, self.pg3, if_caps[1])
- else: # hashed with xxhash
- self.verify_capture(self.pg2, self.pg1, if_caps[0])
- self.verify_capture(self.pg3, self.pg2, if_caps[1])
-
- # verify all policies matched the expected number of times
- self.verify_policy_match(pkt_count, policy_1)
- self.verify_policy_match(pkt_count, policy_2)
- self.verify_policy_match(pkt_count * 2, policy_0) # output policy
- # we have matched 2 policies, but due to the hash collision
- # one active entry is expected
- self.verify_num_inbound_flow_cache_entries(1)
-
-
-if __name__ == "__main__":
- unittest.main(testRunner=VppTestRunner)