diff options
author | Ole Troan <ot@cisco.com> | 2018-02-12 18:14:39 +0100 |
---|---|---|
committer | Neale Ranns <nranns@cisco.com> | 2018-03-01 14:37:11 +0000 |
commit | 6ee4051139409eb53cd41b2b73dac838e8c4e8a0 (patch) | |
tree | c7c8e5ac17cfb31c84684a877e7da027c191e64e /test | |
parent | 62bab658e7ca782c8d35dacacfa5906ddbcaf437 (diff) |
6RD: Rewritten 6RD RFC5969 support.
Change-Id: Ic30fbcb2630f39e45345d7215babf5d7ed4b33a0
Signed-off-by: Ole Troan <ot@cisco.com>
Diffstat (limited to 'test')
-rw-r--r-- | test/Makefile | 2 | ||||
-rw-r--r-- | test/test_sixrd.py | 289 | ||||
-rw-r--r-- | test/vpp_papi_provider.py | 19 |
3 files changed, 309 insertions, 1 deletions
diff --git a/test/Makefile b/test/Makefile index 712dab07bde..b8826f6a88f 100644 --- a/test/Makefile +++ b/test/Makefile @@ -54,7 +54,7 @@ PYTHON_EXTRA_DEPENDS= endif PYTHON_VENV_PATH=$(VPP_PYTHON_PREFIX)/virtualenv -PYTHON_DEPENDS=$(PYTHON_EXTRA_DEPENDS) faulthandler six scapy==2.3.3 pexpect pycrypto subprocess32 cffi git+https://github.com/klement/py-lispnetworking@setup +PYTHON_DEPENDS=$(PYTHON_EXTRA_DEPENDS) faulthandler six scapy==2.3.3 pexpect pycrypto subprocess32 cffi git+https://github.com/klement/py-lispnetworking@setup py2-ipaddress SCAPY_SOURCE=$(shell find $(PYTHON_VENV_PATH) -name site-packages) BUILD_COV_DIR=$(BR)/test-cov diff --git a/test/test_sixrd.py b/test/test_sixrd.py new file mode 100644 index 00000000000..32ebdf4cca0 --- /dev/null +++ b/test/test_sixrd.py @@ -0,0 +1,289 @@ +# +# 6RD RFC5969 functional tests +# + +import unittest +from scapy.layers.inet import IP, UDP, ICMP +from scapy.layers.inet6 import IPv6 +from scapy.layers.l2 import Ether, GRE +from scapy.packet import Raw + +from framework import VppTestCase +from vpp_ip_route import VppIpRoute, VppRoutePath, DpoProto +from util import ppp +from ipaddress import * + +""" Test6rd is a subclass of VPPTestCase classes. + +6RD tests. + +""" + + +class Test6RD(VppTestCase): + """ 6RD Test Case """ + + @classmethod + def setUpClass(cls): + super(Test6RD, cls).setUpClass() + try: + cls.create_pg_interfaces(range(2)) + cls.interfaces = list(cls.pg_interfaces) + except Exception: + super(Test6RD, cls).tearDownClass() + raise + + def setUp(cls): + super(Test6RD, cls).setUp() + try: + for i in cls.interfaces: + i.admin_up() + i.config_ip4() + i.config_ip6() + i.disable_ipv6_ra() + i.resolve_arp() + i.resolve_ndp() + except Exception: + super(Test6RD, cls).tearDown() + raise + + def tearDown(self): + super(Test6RD, self).tearDown() + if not self.vpp_dead: + self.vapi.cli("show hardware") + for i in self.pg_interfaces: + i.unconfig_ip4() + i.unconfig_ip6() + i.admin_down() + if type(self.tunnel_index) is list: + for sw_if_index in self.tunnel_index: + self.vapi.sixrd_del_tunnel(sw_if_index) + else: + self.vapi.sixrd_del_tunnel(self.tunnel_index) + self.vapi.cli("show error") + + def validate_6in4(self, rx, expected): + if IP not in rx: + self.fail() + if IPv6 not in rx: + self.fail() + + self.assertEqual(rx[IP].src, expected[IP].src) + self.assertEqual(rx[IP].dst, expected[IP].dst) + self.assertEqual(rx[IP].proto, expected[IP].proto) + self.assertEqual(rx[IPv6].src, expected[IPv6].src) + self.assertEqual(rx[IPv6].dst, expected[IPv6].dst) + + def validate_4in6(self, rx, expected): + if IPv6 not in rx: + self.fail() + if IP in rx: + self.fail() + + self.assertTrue(rx[IPv6].src == expected[IPv6].src) + self.assertTrue(rx[IPv6].dst == expected[IPv6].dst) + self.assertTrue(rx[IPv6].nh == expected[IPv6].nh) + + def payload(self, len): + return 'x' * len + + def test_6rd_ip6_to_ip4(self): + """ ip6 -> ip4 (encap) 6rd test """ + p_ether = Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) + p_ip6 = IPv6(src="1::1", dst="2002:AC10:0202::1", nh='UDP') + + rv = self.vapi.sixrd_add_tunnel( + 0, str(ip_address('2002::').packed), 16, + str(ip_address('0.0.0.0').packed), 0, + str(ip_address(self.pg0.local_ip4).packed), 0, True) + + self.assertEqual(rv.retval, 0) + self.tunnel_index = rv.sw_if_index + self.vapi.cli("show ip6 fib") + p_payload = UDP(sport=1234, dport=1234) + p = (p_ether / p_ip6 / p_payload) + + p_reply = (IP(src=self.pg0.local_ip4, dst=self.pg1.remote_ip4, + proto='ipv6') / p_ip6) + + rx = self.send_and_expect(self.pg0, p*10, self.pg1) + for p in rx: + self.validate_6in4(p, p_reply) + + # MTU tests (default is 1480) + plen = 1481 - 40 - 8 + p_ip6 = IPv6(src="1::1", dst="2002:AC10:0202::1") + p_payload = UDP(sport=1234, dport=1234) / Raw(self.payload(plen)) + p = (p_ether / p_ip6 / p_payload) + + p_reply = (IP(src=self.pg0.local_ip4, dst=self.pg1.remote_ip4, + proto='ipv6') / p_ip6) + + rx = self.send_and_assert_no_replies(self.pg0, p*10) + + def test_6rd_ip4_to_ip6(self): + """ ip4 -> ip6 (decap) 6rd test """ + + rv = self.vapi.sixrd_add_tunnel( + 0, str(ip_address('2002::').packed), + 16, str(ip_address('0.0.0.0').packed), + 0, str(ip_address(self.pg0.local_ip4).packed), 0, True) + self.assertEqual(rv.retval, 0) + self.tunnel_index = rv.sw_if_index + self.vapi.cli("show ip6 fib") + p_ip6 = (IPv6(src="2002:AC10:0202::1", dst=self.pg1.remote_ip6) / + UDP(sport=1234, dport=1234)) + + p = (Ether(src=self.pg0.remote_mac, + dst=self.pg0.local_mac) / + IP(src=self.pg1.remote_ip4, dst=self.pg0.local_ip4) / + p_ip6) + + p_reply = p_ip6 + + rx = self.send_and_expect(self.pg0, p*10, self.pg1) + for p in rx: + self.validate_4in6(p, p_reply) + + def test_6rd_ip4_to_ip6_multiple(self): + """ ip4 -> ip6 (decap) 6rd test """ + + self.tunnel_index = [] + rv = self.vapi.sixrd_add_tunnel( + 0, str(ip_address('2002::').packed), + 16, str(ip_address('0.0.0.0').packed), + 0, str(ip_address(self.pg0.local_ip4).packed), 0, True) + self.assertEqual(rv.retval, 0) + self.tunnel_index.append(rv.sw_if_index) + rv = self.vapi.sixrd_add_tunnel( + 0, str(ip_address('2003::').packed), + 16, str(ip_address('0.0.0.0').packed), + 0, str(ip_address(self.pg1.local_ip4).packed), 0, True) + self.assertEqual(rv.retval, 0) + + self.tunnel_index.append(rv.sw_if_index) + + self.vapi.cli("show ip6 fib") + p_ether = Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) + p_ip4 = IP(src=self.pg1.remote_ip4, dst=self.pg0.local_ip4) + p_ip6_1 = (IPv6(src="2002:AC10:0202::1", dst=self.pg1.remote_ip6) / + UDP(sport=1234, dport=1234)) + p_ip6_2 = (IPv6(src="2003:AC10:0202::1", dst=self.pg1.remote_ip6) / + UDP(sport=1234, dport=1234)) + + p = (p_ether / p_ip4 / p_ip6_1) + rx = self.send_and_expect(self.pg0, p*10, self.pg1) + for p in rx: + self.validate_4in6(p, p_ip6_1) + + p = (p_ether / p_ip4 / p_ip6_2) + rx = self.send_and_expect(self.pg0, p*10, self.pg1) + for p in rx: + self.validate_4in6(p, p_ip6_2) + + def test_6rd_ip4_to_ip6_suffix(self): + """ ip4 -> ip6 (decap) 6rd test """ + + rv = self.vapi.sixrd_add_tunnel( + 0, str(ip_address('2002::').packed), 16, + str(ip_address('172.0.0.0').packed), 8, + str(ip_address(self.pg0.local_ip4).packed), 0, True) + self.assertEqual(rv.retval, 0) + + self.tunnel_index = rv.sw_if_index + + self.vapi.cli("show ip6 fib") + p_ether = Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) + p_ip4 = IP(src=self.pg1.remote_ip4, dst=self.pg0.local_ip4) + p_ip6 = (IPv6(src="2002:1002:0200::1", dst=self.pg1.remote_ip6) / + UDP(sport=1234, dport=1234)) + + p = (p_ether / p_ip4 / p_ip6) + rx = self.send_and_expect(self.pg0, p*10, self.pg1) + for p in rx: + self.validate_4in6(p, p_ip6) + + def test_6rd_ip4_to_ip6_sec_check(self): + """ ip4 -> ip6 (decap) security check 6rd test """ + + rv = self.vapi.sixrd_add_tunnel( + 0, str(ip_address('2002::').packed), + 16, str(ip_address('0.0.0.0').packed), + 0, str(ip_address(self.pg0.local_ip4).packed), 0, True) + self.assertEqual(rv.retval, 0) + self.tunnel_index = rv.sw_if_index + self.vapi.cli("show ip6 fib") + p_ip6 = (IPv6(src="2002:AC10:0202::1", dst=self.pg1.remote_ip6) / + UDP(sport=1234, dport=1234)) + p_ip6_fail = (IPv6(src="2002:DEAD:0202::1", dst=self.pg1.remote_ip6) / + UDP(sport=1234, dport=1234)) + + p = (Ether(src=self.pg0.remote_mac, + dst=self.pg0.local_mac) / + IP(src=self.pg1.remote_ip4, dst=self.pg0.local_ip4) / + p_ip6) + + p_reply = p_ip6 + + rx = self.send_and_expect(self.pg0, p*10, self.pg1) + for p in rx: + self.validate_4in6(p, p_reply) + + p = (Ether(src=self.pg0.remote_mac, + dst=self.pg0.local_mac) / + IP(src=self.pg1.remote_ip4, dst=self.pg0.local_ip4) / + p_ip6_fail) + rx = self.send_and_assert_no_replies(self.pg0, p*10) + + def test_6rd_bgp_tunnel(self): + """ 6rd BGP tunnel """ + + rv = self.vapi.sixrd_add_tunnel( + 0, str(ip_address('2002::').packed), + 16, str(ip_address('0.0.0.0').packed), + 0, str(ip_address(self.pg0.local_ip4).packed), 0, False) + self.assertEqual(rv.retval, 0) + self.tunnel_index = rv.sw_if_index + + default_route = VppIpRoute( + self, "DEAD::", 16, [VppRoutePath("2002:0808:0808::", + self.tunnel_index, + proto=DpoProto.DPO_PROTO_IP6)], + is_ip6=1) + default_route.add_vpp_config() + + ip4_route = VppIpRoute(self, "8.0.0.0", 8, + [VppRoutePath(self.pg1.remote_ip4, 0xFFFFFFFF)]) + ip4_route.add_vpp_config() + + # Via recursive route 6 -> 4 + p = (Ether(src=self.pg0.remote_mac, + dst=self.pg0.local_mac) / + IPv6(src="1::1", dst="DEAD:BEEF::1") / + UDP(sport=1234, dport=1234)) + + p_reply = (IP(src=self.pg0.local_ip4, dst="8.8.8.8", + proto='ipv6') / + IPv6(src='1::1', dst='DEAD:BEEF::1', nh='UDP')) + + rx = self.send_and_expect(self.pg0, p*10, self.pg1) + for p in rx: + self.validate_6in4(p, p_reply) + + # Via recursive route 4 -> 6 (Security check must be disabled) + p_ip6 = (IPv6(src="DEAD:BEEF::1", dst=self.pg1.remote_ip6) / + UDP(sport=1234, dport=1234)) + p = (Ether(src=self.pg0.remote_mac, + dst=self.pg0.local_mac) / + IP(src="8.8.8.8", dst=self.pg0.local_ip4) / + p_ip6) + + p_reply = p_ip6 + + rx = self.send_and_expect(self.pg0, p*10, self.pg1) + for p in rx: + self.validate_4in6(p, p_reply) + + +if __name__ == '__main__': + unittest.main(testRunner=VppTestRunner) diff --git a/test/vpp_papi_provider.py b/test/vpp_papi_provider.py index 8e53333b624..99e320bfe60 100644 --- a/test/vpp_papi_provider.py +++ b/test/vpp_papi_provider.py @@ -3210,3 +3210,22 @@ class VppPapiProvider(object): def gbp_contract_dump(self): """ GBP contract Dump """ return self.api(self.papi.gbp_contract_dump, {}) + + def sixrd_add_tunnel(self, fib_index, ip6_prefix, ip6_prefix_len, + ip4_prefix, ip4_prefix_len, ip4_src, mtu, + security_check): + """ 6RD tunnel Add """ + return self.api(self.papi.sixrd_add_tunnel, + {'fib_index': fib_index, + 'ip6_prefix': ip6_prefix, + 'ip6_prefix_len': ip6_prefix_len, + 'ip4_prefix': ip4_prefix, + 'ip4_prefix_len': ip4_prefix_len, + 'ip4_src': ip4_src, + 'mtu': mtu, + 'security_check': security_check}) + + def sixrd_del_tunnel(self, sw_if_index): + """ 6RD tunnel Delete """ + return self.api(self.papi.sixrd_del_tunnel, + {'sw_if_index': sw_if_index}) |