aboutsummaryrefslogtreecommitdiffstats
path: root/test
diff options
context:
space:
mode:
authorOle Troan <ot@cisco.com>2018-02-12 18:14:39 +0100
committerNeale Ranns <nranns@cisco.com>2018-03-01 14:37:11 +0000
commit6ee4051139409eb53cd41b2b73dac838e8c4e8a0 (patch)
treec7c8e5ac17cfb31c84684a877e7da027c191e64e /test
parent62bab658e7ca782c8d35dacacfa5906ddbcaf437 (diff)
6RD: Rewritten 6RD RFC5969 support.
Change-Id: Ic30fbcb2630f39e45345d7215babf5d7ed4b33a0 Signed-off-by: Ole Troan <ot@cisco.com>
Diffstat (limited to 'test')
-rw-r--r--test/Makefile2
-rw-r--r--test/test_sixrd.py289
-rw-r--r--test/vpp_papi_provider.py19
3 files changed, 309 insertions, 1 deletions
diff --git a/test/Makefile b/test/Makefile
index 712dab07bde..b8826f6a88f 100644
--- a/test/Makefile
+++ b/test/Makefile
@@ -54,7 +54,7 @@ PYTHON_EXTRA_DEPENDS=
endif
PYTHON_VENV_PATH=$(VPP_PYTHON_PREFIX)/virtualenv
-PYTHON_DEPENDS=$(PYTHON_EXTRA_DEPENDS) faulthandler six scapy==2.3.3 pexpect pycrypto subprocess32 cffi git+https://github.com/klement/py-lispnetworking@setup
+PYTHON_DEPENDS=$(PYTHON_EXTRA_DEPENDS) faulthandler six scapy==2.3.3 pexpect pycrypto subprocess32 cffi git+https://github.com/klement/py-lispnetworking@setup py2-ipaddress
SCAPY_SOURCE=$(shell find $(PYTHON_VENV_PATH) -name site-packages)
BUILD_COV_DIR=$(BR)/test-cov
diff --git a/test/test_sixrd.py b/test/test_sixrd.py
new file mode 100644
index 00000000000..32ebdf4cca0
--- /dev/null
+++ b/test/test_sixrd.py
@@ -0,0 +1,289 @@
+#
+# 6RD RFC5969 functional tests
+#
+
+import unittest
+from scapy.layers.inet import IP, UDP, ICMP
+from scapy.layers.inet6 import IPv6
+from scapy.layers.l2 import Ether, GRE
+from scapy.packet import Raw
+
+from framework import VppTestCase
+from vpp_ip_route import VppIpRoute, VppRoutePath, DpoProto
+from util import ppp
+from ipaddress import *
+
+""" Test6rd is a subclass of VPPTestCase classes.
+
+6RD tests.
+
+"""
+
+
+class Test6RD(VppTestCase):
+ """ 6RD Test Case """
+
+ @classmethod
+ def setUpClass(cls):
+ super(Test6RD, cls).setUpClass()
+ try:
+ cls.create_pg_interfaces(range(2))
+ cls.interfaces = list(cls.pg_interfaces)
+ except Exception:
+ super(Test6RD, cls).tearDownClass()
+ raise
+
+ def setUp(cls):
+ super(Test6RD, cls).setUp()
+ try:
+ for i in cls.interfaces:
+ i.admin_up()
+ i.config_ip4()
+ i.config_ip6()
+ i.disable_ipv6_ra()
+ i.resolve_arp()
+ i.resolve_ndp()
+ except Exception:
+ super(Test6RD, cls).tearDown()
+ raise
+
+ def tearDown(self):
+ super(Test6RD, self).tearDown()
+ if not self.vpp_dead:
+ self.vapi.cli("show hardware")
+ for i in self.pg_interfaces:
+ i.unconfig_ip4()
+ i.unconfig_ip6()
+ i.admin_down()
+ if type(self.tunnel_index) is list:
+ for sw_if_index in self.tunnel_index:
+ self.vapi.sixrd_del_tunnel(sw_if_index)
+ else:
+ self.vapi.sixrd_del_tunnel(self.tunnel_index)
+ self.vapi.cli("show error")
+
+ def validate_6in4(self, rx, expected):
+ if IP not in rx:
+ self.fail()
+ if IPv6 not in rx:
+ self.fail()
+
+ self.assertEqual(rx[IP].src, expected[IP].src)
+ self.assertEqual(rx[IP].dst, expected[IP].dst)
+ self.assertEqual(rx[IP].proto, expected[IP].proto)
+ self.assertEqual(rx[IPv6].src, expected[IPv6].src)
+ self.assertEqual(rx[IPv6].dst, expected[IPv6].dst)
+
+ def validate_4in6(self, rx, expected):
+ if IPv6 not in rx:
+ self.fail()
+ if IP in rx:
+ self.fail()
+
+ self.assertTrue(rx[IPv6].src == expected[IPv6].src)
+ self.assertTrue(rx[IPv6].dst == expected[IPv6].dst)
+ self.assertTrue(rx[IPv6].nh == expected[IPv6].nh)
+
+ def payload(self, len):
+ return 'x' * len
+
+ def test_6rd_ip6_to_ip4(self):
+ """ ip6 -> ip4 (encap) 6rd test """
+ p_ether = Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
+ p_ip6 = IPv6(src="1::1", dst="2002:AC10:0202::1", nh='UDP')
+
+ rv = self.vapi.sixrd_add_tunnel(
+ 0, str(ip_address('2002::').packed), 16,
+ str(ip_address('0.0.0.0').packed), 0,
+ str(ip_address(self.pg0.local_ip4).packed), 0, True)
+
+ self.assertEqual(rv.retval, 0)
+ self.tunnel_index = rv.sw_if_index
+ self.vapi.cli("show ip6 fib")
+ p_payload = UDP(sport=1234, dport=1234)
+ p = (p_ether / p_ip6 / p_payload)
+
+ p_reply = (IP(src=self.pg0.local_ip4, dst=self.pg1.remote_ip4,
+ proto='ipv6') / p_ip6)
+
+ rx = self.send_and_expect(self.pg0, p*10, self.pg1)
+ for p in rx:
+ self.validate_6in4(p, p_reply)
+
+ # MTU tests (default is 1480)
+ plen = 1481 - 40 - 8
+ p_ip6 = IPv6(src="1::1", dst="2002:AC10:0202::1")
+ p_payload = UDP(sport=1234, dport=1234) / Raw(self.payload(plen))
+ p = (p_ether / p_ip6 / p_payload)
+
+ p_reply = (IP(src=self.pg0.local_ip4, dst=self.pg1.remote_ip4,
+ proto='ipv6') / p_ip6)
+
+ rx = self.send_and_assert_no_replies(self.pg0, p*10)
+
+ def test_6rd_ip4_to_ip6(self):
+ """ ip4 -> ip6 (decap) 6rd test """
+
+ rv = self.vapi.sixrd_add_tunnel(
+ 0, str(ip_address('2002::').packed),
+ 16, str(ip_address('0.0.0.0').packed),
+ 0, str(ip_address(self.pg0.local_ip4).packed), 0, True)
+ self.assertEqual(rv.retval, 0)
+ self.tunnel_index = rv.sw_if_index
+ self.vapi.cli("show ip6 fib")
+ p_ip6 = (IPv6(src="2002:AC10:0202::1", dst=self.pg1.remote_ip6) /
+ UDP(sport=1234, dport=1234))
+
+ p = (Ether(src=self.pg0.remote_mac,
+ dst=self.pg0.local_mac) /
+ IP(src=self.pg1.remote_ip4, dst=self.pg0.local_ip4) /
+ p_ip6)
+
+ p_reply = p_ip6
+
+ rx = self.send_and_expect(self.pg0, p*10, self.pg1)
+ for p in rx:
+ self.validate_4in6(p, p_reply)
+
+ def test_6rd_ip4_to_ip6_multiple(self):
+ """ ip4 -> ip6 (decap) 6rd test """
+
+ self.tunnel_index = []
+ rv = self.vapi.sixrd_add_tunnel(
+ 0, str(ip_address('2002::').packed),
+ 16, str(ip_address('0.0.0.0').packed),
+ 0, str(ip_address(self.pg0.local_ip4).packed), 0, True)
+ self.assertEqual(rv.retval, 0)
+ self.tunnel_index.append(rv.sw_if_index)
+ rv = self.vapi.sixrd_add_tunnel(
+ 0, str(ip_address('2003::').packed),
+ 16, str(ip_address('0.0.0.0').packed),
+ 0, str(ip_address(self.pg1.local_ip4).packed), 0, True)
+ self.assertEqual(rv.retval, 0)
+
+ self.tunnel_index.append(rv.sw_if_index)
+
+ self.vapi.cli("show ip6 fib")
+ p_ether = Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
+ p_ip4 = IP(src=self.pg1.remote_ip4, dst=self.pg0.local_ip4)
+ p_ip6_1 = (IPv6(src="2002:AC10:0202::1", dst=self.pg1.remote_ip6) /
+ UDP(sport=1234, dport=1234))
+ p_ip6_2 = (IPv6(src="2003:AC10:0202::1", dst=self.pg1.remote_ip6) /
+ UDP(sport=1234, dport=1234))
+
+ p = (p_ether / p_ip4 / p_ip6_1)
+ rx = self.send_and_expect(self.pg0, p*10, self.pg1)
+ for p in rx:
+ self.validate_4in6(p, p_ip6_1)
+
+ p = (p_ether / p_ip4 / p_ip6_2)
+ rx = self.send_and_expect(self.pg0, p*10, self.pg1)
+ for p in rx:
+ self.validate_4in6(p, p_ip6_2)
+
+ def test_6rd_ip4_to_ip6_suffix(self):
+ """ ip4 -> ip6 (decap) 6rd test """
+
+ rv = self.vapi.sixrd_add_tunnel(
+ 0, str(ip_address('2002::').packed), 16,
+ str(ip_address('172.0.0.0').packed), 8,
+ str(ip_address(self.pg0.local_ip4).packed), 0, True)
+ self.assertEqual(rv.retval, 0)
+
+ self.tunnel_index = rv.sw_if_index
+
+ self.vapi.cli("show ip6 fib")
+ p_ether = Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
+ p_ip4 = IP(src=self.pg1.remote_ip4, dst=self.pg0.local_ip4)
+ p_ip6 = (IPv6(src="2002:1002:0200::1", dst=self.pg1.remote_ip6) /
+ UDP(sport=1234, dport=1234))
+
+ p = (p_ether / p_ip4 / p_ip6)
+ rx = self.send_and_expect(self.pg0, p*10, self.pg1)
+ for p in rx:
+ self.validate_4in6(p, p_ip6)
+
+ def test_6rd_ip4_to_ip6_sec_check(self):
+ """ ip4 -> ip6 (decap) security check 6rd test """
+
+ rv = self.vapi.sixrd_add_tunnel(
+ 0, str(ip_address('2002::').packed),
+ 16, str(ip_address('0.0.0.0').packed),
+ 0, str(ip_address(self.pg0.local_ip4).packed), 0, True)
+ self.assertEqual(rv.retval, 0)
+ self.tunnel_index = rv.sw_if_index
+ self.vapi.cli("show ip6 fib")
+ p_ip6 = (IPv6(src="2002:AC10:0202::1", dst=self.pg1.remote_ip6) /
+ UDP(sport=1234, dport=1234))
+ p_ip6_fail = (IPv6(src="2002:DEAD:0202::1", dst=self.pg1.remote_ip6) /
+ UDP(sport=1234, dport=1234))
+
+ p = (Ether(src=self.pg0.remote_mac,
+ dst=self.pg0.local_mac) /
+ IP(src=self.pg1.remote_ip4, dst=self.pg0.local_ip4) /
+ p_ip6)
+
+ p_reply = p_ip6
+
+ rx = self.send_and_expect(self.pg0, p*10, self.pg1)
+ for p in rx:
+ self.validate_4in6(p, p_reply)
+
+ p = (Ether(src=self.pg0.remote_mac,
+ dst=self.pg0.local_mac) /
+ IP(src=self.pg1.remote_ip4, dst=self.pg0.local_ip4) /
+ p_ip6_fail)
+ rx = self.send_and_assert_no_replies(self.pg0, p*10)
+
+ def test_6rd_bgp_tunnel(self):
+ """ 6rd BGP tunnel """
+
+ rv = self.vapi.sixrd_add_tunnel(
+ 0, str(ip_address('2002::').packed),
+ 16, str(ip_address('0.0.0.0').packed),
+ 0, str(ip_address(self.pg0.local_ip4).packed), 0, False)
+ self.assertEqual(rv.retval, 0)
+ self.tunnel_index = rv.sw_if_index
+
+ default_route = VppIpRoute(
+ self, "DEAD::", 16, [VppRoutePath("2002:0808:0808::",
+ self.tunnel_index,
+ proto=DpoProto.DPO_PROTO_IP6)],
+ is_ip6=1)
+ default_route.add_vpp_config()
+
+ ip4_route = VppIpRoute(self, "8.0.0.0", 8,
+ [VppRoutePath(self.pg1.remote_ip4, 0xFFFFFFFF)])
+ ip4_route.add_vpp_config()
+
+ # Via recursive route 6 -> 4
+ p = (Ether(src=self.pg0.remote_mac,
+ dst=self.pg0.local_mac) /
+ IPv6(src="1::1", dst="DEAD:BEEF::1") /
+ UDP(sport=1234, dport=1234))
+
+ p_reply = (IP(src=self.pg0.local_ip4, dst="8.8.8.8",
+ proto='ipv6') /
+ IPv6(src='1::1', dst='DEAD:BEEF::1', nh='UDP'))
+
+ rx = self.send_and_expect(self.pg0, p*10, self.pg1)
+ for p in rx:
+ self.validate_6in4(p, p_reply)
+
+ # Via recursive route 4 -> 6 (Security check must be disabled)
+ p_ip6 = (IPv6(src="DEAD:BEEF::1", dst=self.pg1.remote_ip6) /
+ UDP(sport=1234, dport=1234))
+ p = (Ether(src=self.pg0.remote_mac,
+ dst=self.pg0.local_mac) /
+ IP(src="8.8.8.8", dst=self.pg0.local_ip4) /
+ p_ip6)
+
+ p_reply = p_ip6
+
+ rx = self.send_and_expect(self.pg0, p*10, self.pg1)
+ for p in rx:
+ self.validate_4in6(p, p_reply)
+
+
+if __name__ == '__main__':
+ unittest.main(testRunner=VppTestRunner)
diff --git a/test/vpp_papi_provider.py b/test/vpp_papi_provider.py
index 8e53333b624..99e320bfe60 100644
--- a/test/vpp_papi_provider.py
+++ b/test/vpp_papi_provider.py
@@ -3210,3 +3210,22 @@ class VppPapiProvider(object):
def gbp_contract_dump(self):
""" GBP contract Dump """
return self.api(self.papi.gbp_contract_dump, {})
+
+ def sixrd_add_tunnel(self, fib_index, ip6_prefix, ip6_prefix_len,
+ ip4_prefix, ip4_prefix_len, ip4_src, mtu,
+ security_check):
+ """ 6RD tunnel Add """
+ return self.api(self.papi.sixrd_add_tunnel,
+ {'fib_index': fib_index,
+ 'ip6_prefix': ip6_prefix,
+ 'ip6_prefix_len': ip6_prefix_len,
+ 'ip4_prefix': ip4_prefix,
+ 'ip4_prefix_len': ip4_prefix_len,
+ 'ip4_src': ip4_src,
+ 'mtu': mtu,
+ 'security_check': security_check})
+
+ def sixrd_del_tunnel(self, sw_if_index):
+ """ 6RD tunnel Delete """
+ return self.api(self.papi.sixrd_del_tunnel,
+ {'sw_if_index': sw_if_index})