aboutsummaryrefslogtreecommitdiffstats
path: root/build
AgeCommit message (Expand)AuthorFilesLines
2019-11-25quic: update quicly to v0.0.6-vppMathiasRaoul3-2/+95
2019-11-22crypto-ipsecmb: bump to intel-ipsec-mb version 0.53Fan Zhang1-2/+3
2019-11-16quic: replace quicly patch with upstreamed fixDave Wallace1-10/+11
2019-11-14dpdk: Enable bnxt PMDAndy Gospodarek1-0/+1
2019-11-04quic: fix quicly rtt time skewDave Wallace1-0/+15
2019-11-01build: bump rdma-core version to 26.0Damjan Marion1-3/+2
2019-10-31build: bump nasm version to 2.14.02Damjan Marion2-28/+2
2019-10-31build: remove obsolete dpdk patchesDamjan Marion2-132/+0
2019-10-04quic: update quicly to v0.0.5MathiasRaoul3-4/+97
2019-09-30build: build-root/Makefile rm of install treeBurt Silverman1-0/+1
2019-08-21dpdk: bump DPDK version to 19.08Damjan Marion1-3/+2
2019-08-07rdma: add missing symbolsBenoît Ganne1-1/+4
2019-08-05rdma: bump rdma-core to 25.0Benoît Ganne1-2/+3
2019-07-22quic: move patch for quicly 0.0.3Aloys Augustin1-0/+0
2019-07-22quic: update quicly libraryAloys Augustin3-14/+2
2019-07-15quic: integrate vpp crypto api for quic packets encryptionMathias Raoul1-0/+33
2019-07-09quic: fix passive disconnect handling & refactorNathan Skrzypczak1-0/+12
2019-07-01build: vpp-ext-deps .rpm may not be installedDave Barach1-1/+1
2019-05-30dpdk: remove bonding codeDamjan Marion1-1/+1
2019-05-30dpdk: bump to 19.05Damjan Marion2-1/+4
2019-05-14QUIC multi thread updateAloys Augustin2-2/+2
2019-05-14Build packages for generic Arm architectureLijian.Zhang1-1/+8
2019-04-23Bump to intel-ipsec-mb version 0.52Damjan Marion1-10/+10
2019-04-17crypto-ipsecmb: enable GCMNeale Ranns1-1/+2
2019-04-10cmake: fix errors in external when building past point-releaseAndrew Yourtchenko1-1/+1
2019-04-09rdma-core: add debug build optionBenoît Ganne1-1/+8
2019-04-08rdma: fix DPDK MLX driver conflictBenoît Ganne2-3/+2
2019-04-05rdma: more batching, compile rdma-core in release modeBenoît Ganne1-1/+1
2019-04-05QUIC: Build cleanupDave Wallace1-6/+0
2019-04-03Fix problem building rdma-core.Thomas F Herbert2-2/+8
2019-04-03QUIC: Build system updateAloys Augustin3-1/+109
2019-04-02dpdk 19.02: fixed speed capability error issueChenmin Sun1-0/+101
2019-03-29revert quicly related build/external changesDamjan Marion4-134/+4
2019-03-29Integrate first QUIC protocol implementationNathan Skrzypczak4-4/+134
2019-03-28Add RDMA ibverb driver pluginBenoît Ganne5-51/+94
2019-03-22dpdk: add ENIC PMD patch to untag default vlanHyong Youb Kim1-0/+31
2019-03-01dpdk: update mlx[45] linking optionsMatthew Smith1-3/+2
2019-02-14make install-ext-deps broken.Paul Vinciguerra1-1/+1
2019-02-02dpdk: bump to dpdk 19.02Damjan Marion10-1233/+2
2018-12-12dpdk: net/bonding: fix buffer corruption in packetsIgor Mikhailov (imichail)1-0/+203
2018-11-29dpdk: bump to DPDK 18.11Damjan Marion1-2/+2
2018-11-05dpdk: enable gso when the tap PMD is enabledMatthew Smith1-1/+1
2018-10-26dpdk: fix mlx5 build on SUSEStephen Hemminger1-0/+39
2018-10-26dpdk: ENA PMD patch for failure on port restartMatthew Smith1-0/+359
2018-10-25Address "is already installed" Jenkins issueMarco Varlese1-1/+1
2018-10-24dpdk: disable unused rxtx callbacks in ethdevStephen Hemminger1-0/+1
2018-10-20dpdk: turn off unused DPDK componentsStephen Hemminger1-0/+17
2018-10-15dpdk: drop no longer used config optionsStephen Hemminger1-6/+0
2018-10-11Fix vpp-ext-deps package version in stable branchDamjan Marion1-1/+1
2018-10-01dpdk: updated makefile to enable QAT cryptodevRadu Nicolau1-0/+1
pkts = self.create_stream(self.pg0, self.pg1, self.pg_if_packet_sizes) self.pg0.add_stream(pkts) key = 'ip_src' self.create_classify_table(key, self.build_ip_mask(src_ip='ffffffff')) self.create_classify_session( self.acl_tbl_idx.get(key), self.build_ip_match(src_ip=self.pg0.remote_ip4)) self.input_acl_set_interface(self.pg0, self.acl_tbl_idx.get(key)) self.acl_active_table = key self.pg_enable_capture(self.pg_interfaces) self.pg_start() pkts = self.pg1.get_capture(len(pkts)) self.verify_capture(self.pg1, pkts) self.pg0.assert_nothing_captured(remark="packets forwarded") self.pg2.assert_nothing_captured(remark="packets forwarded") self.pg3.assert_nothing_captured(remark="packets forwarded") def test_iacl_dst_ip(self): """ Destination IP iACL test Test scenario for basic IP ACL with destination IP - Create IPv4 stream for pg0 -> pg1 interface. - Create iACL with destination IP address. - Send and verify received packets on pg1 interface. """ # Basic iACL testing with destination IP pkts = self.create_stream(self.pg0, self.pg1, self.pg_if_packet_sizes) self.pg0.add_stream(pkts) key = 'ip_dst' self.create_classify_table(key, self.build_ip_mask(dst_ip='ffffffff')) self.create_classify_session( self.acl_tbl_idx.get(key), self.build_ip_match(dst_ip=self.pg1.remote_ip4)) self.input_acl_set_interface(self.pg0, self.acl_tbl_idx.get(key)) self.acl_active_table = key self.pg_enable_capture(self.pg_interfaces) self.pg_start() pkts = self.pg1.get_capture(len(pkts)) self.verify_capture(self.pg1, pkts) self.pg0.assert_nothing_captured(remark="packets forwarded") self.pg2.assert_nothing_captured(remark="packets forwarded") self.pg3.assert_nothing_captured(remark="packets forwarded") def test_iacl_src_dst_ip(self): """ Source and destination IP iACL test Test scenario for basic IP ACL with source and destination IP - Create IPv4 stream for pg0 -> pg1 interface. - Create iACL with source and destination IP addresses. - Send and verify received packets on pg1 interface. """ # Basic iACL testing with source and destination IP pkts = self.create_stream(self.pg0, self.pg1, self.pg_if_packet_sizes) self.pg0.add_stream(pkts) key = 'ip' self.create_classify_table( key, self.build_ip_mask(src_ip='ffffffff', dst_ip='ffffffff')) self.create_classify_session( self.acl_tbl_idx.get(key), self.build_ip_match(src_ip=self.pg0.remote_ip4, dst_ip=self.pg1.remote_ip4)) self.input_acl_set_interface(self.pg0, self.acl_tbl_idx.get(key)) self.acl_active_table = key self.pg_enable_capture(self.pg_interfaces) self.pg_start() pkts = self.pg1.get_capture(len(pkts)) self.verify_capture(self.pg1, pkts) self.pg0.assert_nothing_captured(remark="packets forwarded") self.pg2.assert_nothing_captured(remark="packets forwarded") self.pg3.assert_nothing_captured(remark="packets forwarded") class TestClassifierUDP(TestClassifier): """ Classifier UDP proto Test Case """ @classmethod def setUpClass(cls): super(TestClassifierUDP, cls).setUpClass() @classmethod def tearDownClass(cls): super(TestClassifierUDP, cls).tearDownClass() def test_iacl_proto_udp(self): """ UDP protocol iACL test Test scenario for basic protocol ACL with UDP protocol - Create IPv4 stream for pg0 -> pg1 interface. - Create iACL with UDP IP protocol. - Send and verify received packets on pg1 interface. """ # Basic iACL testing with UDP protocol pkts = self.create_stream(self.pg0, self.pg1, self.pg_if_packet_sizes) self.pg0.add_stream(pkts) key = 'proto_udp' self.create_classify_table(key, self.build_ip_mask(proto='ff')) self.create_classify_session( self.acl_tbl_idx.get(key), self.build_ip_match(proto=socket.IPPROTO_UDP)) self.input_acl_set_interface( self.pg0, self.acl_tbl_idx.get(key)) self.acl_active_table = key self.pg_enable_capture(self.pg_interfaces) self.pg_start() pkts = self.pg1.get_capture(len(pkts)) self.verify_capture(self.pg1, pkts) self.pg0.assert_nothing_captured(remark="packets forwarded") self.pg2.assert_nothing_captured(remark="packets forwarded") self.pg3.assert_nothing_captured(remark="packets forwarded") def test_iacl_proto_udp_sport(self): """ UDP source port iACL test Test scenario for basic protocol ACL with UDP and sport - Create IPv4 stream for pg0 -> pg1 interface. - Create iACL with UDP IP protocol and defined sport. - Send and verify received packets on pg1 interface. """ # Basic iACL testing with UDP and sport sport = 38 pkts = self.create_stream(self.pg0, self.pg1, self.pg_if_packet_sizes, UDP(sport=sport, dport=5678)) self.pg0.add_stream(pkts) key = 'proto_udp_sport' self.create_classify_table( key, self.build_ip_mask(proto='ff', src_port='ffff')) self.create_classify_session( self.acl_tbl_idx.get(key), self.build_ip_match(proto=socket.IPPROTO_UDP, src_port=sport)) self.input_acl_set_interface( self.pg0, self.acl_tbl_idx.get(key)) self.acl_active_table = key self.pg_enable_capture(self.pg_interfaces) self.pg_start() pkts = self.pg1.get_capture(len(pkts)) self.verify_capture(self.pg1, pkts) self.pg0.assert_nothing_captured(remark="packets forwarded") self.pg2.assert_nothing_captured(remark="packets forwarded") self.pg3.assert_nothing_captured(remark="packets forwarded") def test_iacl_proto_udp_dport(self): """ UDP destination port iACL test Test scenario for basic protocol ACL with UDP and dport - Create IPv4 stream for pg0 -> pg1 interface. - Create iACL with UDP IP protocol and defined dport. - Send and verify received packets on pg1 interface. """ # Basic iACL testing with UDP and dport dport = 427 pkts = self.create_stream(self.pg0, self.pg1, self.pg_if_packet_sizes, UDP(sport=1234, dport=dport)) self.pg0.add_stream(pkts) key = 'proto_udp_dport' self.create_classify_table( key, self.build_ip_mask(proto='ff', dst_port='ffff')) self.create_classify_session( self.acl_tbl_idx.get(key), self.build_ip_match(proto=socket.IPPROTO_UDP, dst_port=dport)) self.input_acl_set_interface( self.pg0, self.acl_tbl_idx.get(key)) self.acl_active_table = key self.pg_enable_capture(self.pg_interfaces) self.pg_start() pkts = self.pg1.get_capture(len(pkts)) self.verify_capture(self.pg1, pkts) self.pg0.assert_nothing_captured(remark="packets forwarded") self.pg2.assert_nothing_captured(remark="packets forwarded") self.pg3.assert_nothing_captured(remark="packets forwarded") def test_iacl_proto_udp_sport_dport(self): """ UDP source and destination ports iACL test Test scenario for basic protocol ACL with UDP and sport and dport - Create IPv4 stream for pg0 -> pg1 interface. - Create iACL with UDP IP protocol and defined sport and dport. - Send and verify received packets on pg1 interface. """ # Basic iACL testing with UDP and sport and dport sport = 13720 dport = 9080 pkts = self.create_stream(self.pg0, self.pg1, self.pg_if_packet_sizes, UDP(sport=sport, dport=dport)) self.pg0.add_stream(pkts) key = 'proto_udp_ports' self.create_classify_table( key, self.build_ip_mask(proto='ff', src_port='ffff', dst_port='ffff')) self.create_classify_session( self.acl_tbl_idx.get(key), self.build_ip_match(proto=socket.IPPROTO_UDP, src_port=sport, dst_port=dport)) self.input_acl_set_interface( self.pg0, self.acl_tbl_idx.get(key)) self.acl_active_table = key self.pg_enable_capture(self.pg_interfaces) self.pg_start() pkts = self.pg1.get_capture(len(pkts)) self.verify_capture(self.pg1, pkts) self.pg0.assert_nothing_captured(remark="packets forwarded") self.pg2.assert_nothing_captured(remark="packets forwarded") self.pg3.assert_nothing_captured(remark="packets forwarded") class TestClassifierTCP(TestClassifier): """ Classifier TCP proto Test Case """ @classmethod def setUpClass(cls): super(TestClassifierTCP, cls).setUpClass() @classmethod def tearDownClass(cls): super(TestClassifierTCP, cls).tearDownClass() def test_iacl_proto_tcp(self): """ TCP protocol iACL test Test scenario for basic protocol ACL with TCP protocol - Create IPv4 stream for pg0 -> pg1 interface. - Create iACL with TCP IP protocol. - Send and verify received packets on pg1 interface. """ # Basic iACL testing with TCP protocol pkts = self.create_stream(self.pg0, self.pg1, self.pg_if_packet_sizes, TCP(sport=1234, dport=5678)) self.pg0.add_stream(pkts) key = 'proto_tcp' self.create_classify_table(key, self.build_ip_mask(proto='ff')) self.create_classify_session( self.acl_tbl_idx.get(key), self.build_ip_match(proto=socket.IPPROTO_TCP)) self.input_acl_set_interface( self.pg0, self.acl_tbl_idx.get(key)) self.acl_active_table = key self.pg_enable_capture(self.pg_interfaces) self.pg_start() pkts = self.pg1.get_capture(len(pkts)) self.verify_capture(self.pg1, pkts, TCP) self.pg0.assert_nothing_captured(remark="packets forwarded") self.pg2.assert_nothing_captured(remark="packets forwarded") self.pg3.assert_nothing_captured(remark="packets forwarded") def test_iacl_proto_tcp_sport(self): """ TCP source port iACL test Test scenario for basic protocol ACL with TCP and sport - Create IPv4 stream for pg0 -> pg1 interface. - Create iACL with TCP IP protocol and defined sport. - Send and verify received packets on pg1 interface. """ # Basic iACL testing with TCP and sport sport = 38 pkts = self.create_stream(self.pg0, self.pg1, self.pg_if_packet_sizes, TCP(sport=sport, dport=5678)) self.pg0.add_stream(pkts) key = 'proto_tcp_sport' self.create_classify_table( key, self.build_ip_mask(proto='ff', src_port='ffff')) self.create_classify_session( self.acl_tbl_idx.get(key), self.build_ip_match(proto=socket.IPPROTO_TCP, src_port=sport)) self.input_acl_set_interface( self.pg0, self.acl_tbl_idx.get(key)) self.acl_active_table = key self.pg_enable_capture(self.pg_interfaces) self.pg_start() pkts = self.pg1.get_capture(len(pkts)) self.verify_capture(self.pg1, pkts, TCP) self.pg0.assert_nothing_captured(remark="packets forwarded") self.pg2.assert_nothing_captured(remark="packets forwarded") self.pg3.assert_nothing_captured(remark="packets forwarded") def test_iacl_proto_tcp_dport(self): """ TCP destination port iACL test Test scenario for basic protocol ACL with TCP and dport - Create IPv4 stream for pg0 -> pg1 interface. - Create iACL with TCP IP protocol and defined dport. - Send and verify received packets on pg1 interface. """ # Basic iACL testing with TCP and dport dport = 427 pkts = self.create_stream(self.pg0, self.pg1, self.pg_if_packet_sizes, TCP(sport=1234, dport=dport)) self.pg0.add_stream(pkts) key = 'proto_tcp_sport' self.create_classify_table( key, self.build_ip_mask(proto='ff', dst_port='ffff')) self.create_classify_session( self.acl_tbl_idx.get(key), self.build_ip_match(proto=socket.IPPROTO_TCP, dst_port=dport)) self.input_acl_set_interface( self.pg0, self.acl_tbl_idx.get(key)) self.acl_active_table = key self.pg_enable_capture(self.pg_interfaces) self.pg_start() pkts = self.pg1.get_capture(len(pkts)) self.verify_capture(self.pg1, pkts, TCP) self.pg0.assert_nothing_captured(remark="packets forwarded") self.pg2.assert_nothing_captured(remark="packets forwarded") self.pg3.assert_nothing_captured(remark="packets forwarded") def test_iacl_proto_tcp_sport_dport(self): """ TCP source and destination ports iACL test Test scenario for basic protocol ACL with TCP and sport and dport - Create IPv4 stream for pg0 -> pg1 interface. - Create iACL with TCP IP protocol and defined sport and dport. - Send and verify received packets on pg1 interface. """ # Basic iACL testing with TCP and sport and dport sport = 13720 dport = 9080 pkts = self.create_stream(self.pg0, self.pg1, self.pg_if_packet_sizes, TCP(sport=sport, dport=dport)) self.pg0.add_stream(pkts) key = 'proto_tcp_ports' self.create_classify_table( key, self.build_ip_mask(proto='ff', src_port='ffff', dst_port='ffff')) self.create_classify_session( self.acl_tbl_idx.get(key), self.build_ip_match(proto=socket.IPPROTO_TCP, src_port=sport, dst_port=dport)) self.input_acl_set_interface( self.pg0, self.acl_tbl_idx.get(key)) self.acl_active_table = key self.pg_enable_capture(self.pg_interfaces) self.pg_start() pkts = self.pg1.get_capture(len(pkts)) self.verify_capture(self.pg1, pkts, TCP) self.pg0.assert_nothing_captured(remark="packets forwarded") self.pg2.assert_nothing_captured(remark="packets forwarded") self.pg3.assert_nothing_captured(remark="packets forwarded") class TestClassifierIPOut(TestClassifier): """ Classifier output IP Test Case """ @classmethod def setUpClass(cls): super(TestClassifierIPOut, cls).setUpClass() @classmethod def tearDownClass(cls): super(TestClassifierIPOut, cls).tearDownClass() def test_acl_ip_out(self): """ Output IP ACL test Test scenario for basic IP ACL with source IP - Create IPv4 stream for pg1 -> pg0 interface. - Create ACL with source IP address. - Send and verify received packets on pg0 interface. """ # Basic oACL testing with source IP pkts = self.create_stream(self.pg1, self.pg0, self.pg_if_packet_sizes) self.pg1.add_stream(pkts) key = 'ip_out' self.create_classify_table( key, self.build_ip_mask(src_ip='ffffffff'), data_offset=0) self.create_classify_session( self.acl_tbl_idx.get(key), self.build_ip_match(src_ip=self.pg1.remote_ip4)) self.output_acl_set_interface(self.pg0, self.acl_tbl_idx.get(key)) self.acl_active_table = key self.pg_enable_capture(self.pg_interfaces) self.pg_start() pkts = self.pg0.get_capture(len(pkts)) self.verify_capture(self.pg0, pkts) self.pg1.assert_nothing_captured(remark="packets forwarded") self.pg2.assert_nothing_captured(remark="packets forwarded") self.pg3.assert_nothing_captured(remark="packets forwarded") class TestClassifierMAC(TestClassifier): """ Classifier MAC Test Case """ @classmethod def setUpClass(cls): super(TestClassifierMAC, cls).setUpClass() @classmethod def tearDownClass(cls): super(TestClassifierMAC, cls).tearDownClass() def test_acl_mac(self): """ MAC ACL test Test scenario for basic MAC ACL with source MAC - Create IPv4 stream for pg0 -> pg2 interface. - Create ACL with source MAC address. - Send and verify received packets on pg2 interface. """ # Basic iACL testing with source MAC pkts = self.create_stream(self.pg0, self.pg2, self.pg_if_packet_sizes) self.pg0.add_stream(pkts) key = 'mac' self.create_classify_table( key, self.build_mac_mask(src_mac='ffffffffffff'), data_offset=-14) self.create_classify_session( self.acl_tbl_idx.get(key), self.build_mac_match(src_mac=self.pg0.remote_mac)) self.input_acl_set_interface(self.pg0, self.acl_tbl_idx.get(key)) self.acl_active_table = key self.pg_enable_capture(self.pg_interfaces) self.pg_start() pkts = self.pg2.get_capture(len(pkts)) self.verify_capture(self.pg2, pkts) self.pg0.assert_nothing_captured(remark="packets forwarded") self.pg1.assert_nothing_captured(remark="packets forwarded") self.pg3.assert_nothing_captured(remark="packets forwarded") class TestClassifierPBR(TestClassifier): """ Classifier PBR Test Case """ @classmethod def setUpClass(cls): super(TestClassifierPBR, cls).setUpClass() @classmethod def tearDownClass(cls): super(TestClassifierPBR, cls).tearDownClass() def test_acl_pbr(self): """ IP PBR test Test scenario for PBR with source IP - Create IPv4 stream for pg0 -> pg3 interface. - Configure PBR fib entry for packet forwarding. - Send and verify received packets on pg3 interface. """ # PBR testing with source IP pkts = self.create_stream(self.pg0, self.pg3, self.pg_if_packet_sizes) self.pg0.add_stream(pkts) key = 'pbr' self.create_classify_table(key, self.build_ip_mask(src_ip='ffffffff')) pbr_option = 1 # this will create the VRF/table in which we will insert the route self.create_classify_session( self.acl_tbl_idx.get(key), self.build_ip_match(src_ip=self.pg0.remote_ip4), pbr_option, self.pbr_vrfid) self.assertTrue(self.verify_vrf(self.pbr_vrfid)) r = VppIpRoute(self, self.pg3.local_ip4, 24, [VppRoutePath(self.pg3.remote_ip4, INVALID_INDEX)], table_id=self.pbr_vrfid) r.add_vpp_config() self.input_acl_set_interface(self.pg0, self.acl_tbl_idx.get(key)) self.pg_enable_capture(self.pg_interfaces) self.pg_start() pkts = self.pg3.get_capture(len(pkts)) self.verify_capture(self.pg3, pkts) self.input_acl_set_interface(self.pg0, self.acl_tbl_idx.get(key), 0) self.pg0.assert_nothing_captured(remark="packets forwarded") self.pg1.assert_nothing_captured(remark="packets forwarded") self.pg2.assert_nothing_captured(remark="packets forwarded") # remove the classify session and the route r.remove_vpp_config() self.create_classify_session( self.acl_tbl_idx.get(key), self.build_ip_match(src_ip=self.pg0.remote_ip4), pbr_option, self.pbr_vrfid, is_add=0) # and the table should be gone. self.assertFalse(self.verify_vrf(self.pbr_vrfid)) if __name__ == '__main__': unittest.main(testRunner=VppTestRunner)