diff options
Diffstat (limited to 'test')
-rw-r--r-- | test/test_ip4.py | 181 | ||||
-rw-r--r-- | test/vpp_ip.py | 1 |
2 files changed, 182 insertions, 0 deletions
diff --git a/test/test_ip4.py b/test/test_ip4.py index fb9b8faa769..3a48274691a 100644 --- a/test/test_ip4.py +++ b/test/test_ip4.py @@ -7,6 +7,7 @@ import unittest import scapy.compat from scapy.contrib.mpls import MPLS from scapy.layers.inet import IP, UDP, TCP, ICMP, icmptypes, icmpcodes +from scapy.layers.inet6 import IPv6 from scapy.layers.l2 import Ether, Dot1Q, ARP from scapy.packet import Raw from six import moves @@ -1460,6 +1461,20 @@ class IPPuntSetup(object): self.vapi.set_punt(is_add=1, punt=punt_udp) + af_ip6 = VppEnum.vl_api_address_family_t.ADDRESS_IP6 + punt_udp = { + 'type': pt_l4, + 'punt': { + 'l4': { + 'af': af_ip6, + 'protocol': udp_proto, + 'port': 1236, + } + } + } + + self.vapi.set_punt(is_add=1, punt=punt_udp) + self.pkt = (Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) / IP(src=self.pg0.remote_ip4, dst=self.pg0.local_ip4) / @@ -1569,6 +1584,172 @@ class TestIPPunt(IPPuntSetup, VppTestCase): self.send_and_expect(self.pg0, pkts, self.pg1) ip_punt_redirect.remove_vpp_config() + def test_ip_punt_vrf(self): + """ IP punt/local with VRFs """ + + # use a punt redirect to test if for-us packets are accepted + pkts = self.pkt * 1025 + + vlans_pg0 = [VppDot1QSubint(self, self.pg0, v) + for v in range(100, 104)] + vlans_pg1 = [VppDot1QSubint(self, self.pg1, v) + for v in range(100, 104)] + tbl4 = [VppIpTable(self, v).add_vpp_config() + for v in range(100, 104)] + tbl6 = [VppIpTable(self, v, True).add_vpp_config() + for v in range(100, 104)] + + for v in vlans_pg0 + vlans_pg1: + v.admin_up() + v.set_table_ip4(v.vlan) + v.set_table_ip6(v.vlan) + v.config_ip4() + v.config_ip6() + v.resolve_arp() + v.resolve_ndp() + + [VppIpPuntRedirect + (self, + vlans_pg0[i].sw_if_index, + vlans_pg1[i].sw_if_index, + vlans_pg1[i].remote_ip4).add_vpp_config() + for i in range(4)] + [VppIpPuntRedirect + (self, + vlans_pg0[i].sw_if_index, + vlans_pg1[i].sw_if_index, + vlans_pg1[i].remote_ip6).add_vpp_config() + for i in range(4)] + + pkts = [(Ether(src=self.pg0.remote_mac, + dst=self.pg0.local_mac) / + Dot1Q(vlan=i.vlan) / + IP(src=i.remote_ip4, + dst=i.local_ip4) / + UDP(sport=1234, dport=1234) / + Raw(b'\xa5' * 100)) + for i in vlans_pg0] + + self.send_and_expect(self.pg0, pkts, self.pg1) + + # + # IPv4 + # + + # we reject packets for source addresses in the wrong vlan/VRF + pkts = [(Ether(src=self.pg0.remote_mac, + dst=self.pg0.local_mac) / + Dot1Q(vlan=i.vlan) / + IP(src="1.1.1.1", + dst=i.local_ip4) / + UDP(sport=1234, dport=1234) / + Raw(b'\xa5' * 100)) + for i in vlans_pg0] + # single and dual loop + self.send_and_assert_no_replies(self.pg0, [pkts[0]]) + self.send_and_assert_no_replies(self.pg0, pkts) + + self.assert_error_counter_equal( + "/err/ip4-local/ip4 source lookup miss", + len(pkts) + 1) + + # using the same source in different tables, should reject + # for the table that the source is not present in + # the first packet in the stream is drop + pkts = [(Ether(src=self.pg0.remote_mac, + dst=self.pg0.local_mac) / + Dot1Q(vlan=i.vlan) / + IP(src=vlans_pg0[0].remote_ip4, + dst=i.local_ip4) / + UDP(sport=1234, dport=1234) / + Raw(b'\xa5' * 100)) + for i in vlans_pg0] + # single loop accept and drop + # followed by both in the same frame/loop + self.send_and_expect(self.pg0, [pkts[0]], self.pg1) + self.send_and_assert_no_replies(self.pg0, [pkts[1]]) + self.send_and_expect(self.pg0, pkts * 4, self.pg1, n_rx=4) + + # using the same source in different tables, should reject + # for the table that the source is not present in + # the first packet in the stream is accept + pkts = [(Ether(src=self.pg0.remote_mac, + dst=self.pg0.local_mac) / + Dot1Q(vlan=i.vlan) / + IP(src=vlans_pg0[3].remote_ip4, + dst=i.local_ip4) / + UDP(sport=1234, dport=1234) / + Raw(b'\xa5' * 100)) + for i in vlans_pg0] + + # single loop accept and drop + # followed by both in the same frame/loop + self.send_and_expect(self.pg0, [pkts[3]], self.pg1) + self.send_and_assert_no_replies(self.pg0, [pkts[1]]) + self.send_and_expect(self.pg0, pkts * 4, self.pg1, n_rx=4) + + # + # IPv6 + # + + # we reject packets for source addresses in the wrong vlan/VRF + pkts = [(Ether(src=self.pg0.remote_mac, + dst=self.pg0.local_mac) / + Dot1Q(vlan=i.vlan) / + IPv6(src="1::1", + dst=i.local_ip6) / + UDP(sport=1236, dport=1236) / + Raw(b'\xa5' * 100)) + for i in vlans_pg0] + # single and dual loop + self.send_and_assert_no_replies(self.pg0, [pkts[0]]) + self.send_and_assert_no_replies(self.pg0, pkts) + + self.assert_error_counter_equal( + "/err/ip6-input/ip6 source lookup miss", + len(pkts) + 1) + + # using the same source in different tables, should reject + # for the table that the source is not present in + # the first packet in the stream is drop + pkts = [(Ether(src=self.pg0.remote_mac, + dst=self.pg0.local_mac) / + Dot1Q(vlan=i.vlan) / + IPv6(src=vlans_pg0[0].remote_ip6, + dst=i.local_ip6) / + UDP(sport=1236, dport=1236) / + Raw(b'\xa5' * 100)) + for i in vlans_pg0] + # single loop accept and drop + # followed by both in the same frame/loop + self.send_and_expect(self.pg0, [pkts[0]], self.pg1) + self.send_and_assert_no_replies(self.pg0, [pkts[1]]) + self.send_and_expect(self.pg0, pkts * 4, self.pg1, n_rx=4) + + # using the same source in different tables, should reject + # for the table that the source is not present in + # the first packet in the stream is accept + pkts = [(Ether(src=self.pg0.remote_mac, + dst=self.pg0.local_mac) / + Dot1Q(vlan=i.vlan) / + IPv6(src=vlans_pg0[3].remote_ip6, + dst=i.local_ip6) / + UDP(sport=1236, dport=1236) / + Raw(b'\xa5' * 100)) + for i in vlans_pg0] + + # single loop accept and drop + # followed by both in the same frame/loop + self.send_and_expect(self.pg0, [pkts[3]], self.pg1) + self.send_and_assert_no_replies(self.pg0, [pkts[1]]) + self.send_and_expect(self.pg0, pkts * 4, self.pg1, n_rx=4) + + for v in vlans_pg0 + vlans_pg1: + v.unconfig_ip4() + v.unconfig_ip6() + v.set_table_ip4(0) + v.set_table_ip6(0) + def test_ip_punt_dump(self): """ IP4 punt redirect dump""" diff --git a/test/vpp_ip.py b/test/vpp_ip.py index 81305b2dd9b..48b6b9d2da6 100644 --- a/test/vpp_ip.py +++ b/test/vpp_ip.py @@ -168,6 +168,7 @@ class VppIpPuntRedirect(VppObject): def add_vpp_config(self): self._test.vapi.ip_punt_redirect(punt=self.encode(), is_add=True) self._test.registry.register(self, self._test.logger) + return self def remove_vpp_config(self): self._test.vapi.ip_punt_redirect(punt=self.encode(), is_add=False) |