summaryrefslogtreecommitdiffstats
path: root/src/plugins
AgeCommit message (Expand)AuthorFilesLines
2020-10-08interface: shorten vnet_hw_if_rx_modeDamjan Marion5-10/+10
2020-10-08nat: use proper type for countersKlement Sekera1-2/+2
2020-10-07misc: Purge unused pg includesNeale Ranns41-41/+0
2020-10-07nat: move nat64 to a subfeatureFilip Varga21-2636/+3607
2020-10-07nat: det44 plugin fix style and api cleanupFilip Varga3-18/+22
2020-10-06feature: Add packet trace APIJon Loeliger9-4/+1036
2020-10-05ikev2: support ipv6 traffic selectors & overlayFilip Tehlar11-380/+695
2020-10-02lldp: set interface MAC address when enabledKlement Sekera3-10/+28
2020-10-02memif: map shared memory with clib_mem_vm_map_shared(...)Damjan Marion1-10/+25
2020-10-02nat: add dummy nat_ha_resync() to avoid missing symbol errorsDamjan Marion1-0/+7
2020-10-02ikev2: fix leaking pending INIT requestsFilip Tehlar1-0/+16
2020-10-02dpdk: split PCI blacklist rte_eal args from startup.confVladimir Ratnikov1-2/+3
2020-10-02ikev2: fix cli memory leakBenoît Ganne1-30/+40
2020-09-30ikev2: fix issue when decrypting packet with no keysFilip Tehlar1-1/+1
2020-10-01ikev2: refactor ikev2 nodeFilip Tehlar1-407/+359
2020-09-30ikev2: better packet parsing functionsFilip Tehlar7-274/+596
2020-09-30ikev2: show IKE SA command improvementsFilip Tehlar1-95/+169
2020-09-30avf: check duplicate pci address upon create interfaceSteven Luong1-0/+13
2020-09-30wireguard: fix udp-port registrationArtem Glazychev2-3/+10
2020-09-29hsa: fix coverity warningFlorin Coras1-3/+4
2020-09-29ikev2: fix false positive NAT detectionFilip Tehlar1-18/+13
2020-09-29vcl svm: provide apps access to fifo chunksFlorin Coras2-7/+21
2020-09-29wireguard: fix license headersArtem Glazychev13-2/+25
2020-09-29wireguard: fix indentsArtem Glazychev1-21/+35
2020-09-29wireguard: readme fixArtem Glazychev1-36/+17
2020-09-29dpdk: fix compileFan Zhang2-51/+15
2020-09-29avf: validate queue size configSteven Luong3-13/+52
2020-09-28ikev2: fix memory leaksBenoît Ganne2-3/+21
2020-09-28quic: Fix protip #47 / unformat (input_line)Nathan Skrzypczak1-19/+41
2020-09-27cnat: fix cnat_translation_cli_add_delDave Barach1-12/+24
2020-09-27cnat: fix session scanner restart pointDave Barach1-1/+1
2020-09-25cnat: Add DHCP supportNathan Skrzypczak11-109/+716
2020-09-25cnat: Introduce parametric source policyNathan Skrzypczak13-244/+445
2020-09-25cnat: Add support for SNat ICMPNathan Skrzypczak7-143/+461
2020-09-25cnat: Ip ICMP error supportNathan Skrzypczak6-165/+557
2020-09-24wireguard: coverity fixArtem Glazychev1-1/+1
2020-09-24session tcp udp tls quic: improve cli formattingFlorin Coras1-1/+2
2020-09-23lldp: fix format string for hw->nameVladimir Isaev1-3/+3
2020-09-23cnat: Disable default scanner processNathan Skrzypczak8-24/+120
2020-09-23wireguard: add handoff nodeArtem Glazychev18-448/+889
2020-09-22lisp: Move to pluginNeale Ranns56-9/+33296
2020-09-21geneve: Move to pluginNeale Ranns11-0/+4613
2020-09-21misc: Move l2tp to pluginNeale Ranns12-0/+2372
2020-09-21lldp: Move to pluginNeale Ranns15-0/+2549
2020-09-21vrrp: set up multicast for both address familiesMatthew Smith1-2/+14
2020-09-21acl: remove custom ACL-plugin heapAndrew Yourtchenko7-232/+17
2020-09-21dpdk: hugepage availibility check using new apiDamjan Marion1-11/+9
2020-09-17vppinfra: support main heap with different page sizesDamjan Marion1-1/+1
2020-09-16avf: wrong argument passed to avf_log_errSteven Luong1-1/+1
2020-09-16vmxnet3: gso fixesSteven Luong4-13/+29
d_is_auth_used(pkt) and pkt.auth_type in \ (BFDAuthType.keyed_sha1, BFDAuthType.meticulous_keyed_sha1) def bfd_is_md5_used(pkt): """ is md5 authentication used? """ return bfd_is_auth_used(pkt) and pkt.auth_type in \ (BFDAuthType.keyed_md5, BFDAuthType.meticulous_keyed_md5) def bfd_is_md5_or_sha1_used(pkt): """ is md5 or sha1 used? """ return bfd_is_md5_used(pkt) or bfd_is_sha1_used(pkt) class BFD(Packet): """ BFD protocol layer for scapy """ udp_dport = 3784 #: BFD destination port per RFC 5881 udp_dport_echo = 3785 # : BFD destination port for ECHO per RFC 5881 udp_sport_min = 49152 #: BFD source port min value per RFC 5881 udp_sport_max = 65535 #: BFD source port max value per RFC 5881 bfd_pkt_len = 24 # : length of BFD pkt without authentication section sha1_auth_len = 28 # : length of authentication section if SHA1 used name = "BFD" fields_desc = [ BitField("version", 1, 3), BitEnumField("diag", 0, 5, BFDDiagCode.desc_dict), BitEnumField("state", 0, 2, BFDState.desc_dict), FlagsField("flags", 0, 6, ['M', 'D', 'A', 'C', 'F', 'P']), XByteField("detect_mult", 0), BitField("length", bfd_pkt_len, 8), BitField("my_discriminator", 0, 32), BitField("your_discriminator", 0, 32), BitField("desired_min_tx_interval", 0, 32), BitField("required_min_rx_interval", 0, 32), BitField("required_min_echo_rx_interval", 0, 32), ConditionalField( BitEnumField("auth_type", 0, 8, BFDAuthType.desc_dict), bfd_is_auth_used), ConditionalField(BitField("auth_len", 0, 8), bfd_is_auth_used), ConditionalField(BitField("auth_key_id", 0, 8), bfd_is_auth_used), ConditionalField(BitField("auth_reserved", 0, 8), bfd_is_md5_or_sha1_used), ConditionalField( BitField("auth_seq_num", 0, 32), bfd_is_md5_or_sha1_used), ConditionalField(StrField("auth_key_hash", "0" * 16), bfd_is_md5_used), ConditionalField( StrField("auth_key_hash", "0" * 20), bfd_is_sha1_used), ] def mysummary(self): return self.sprintf("BFD(my_disc=%BFD.my_discriminator%," "your_disc=%BFD.your_discriminator%)") # glue the BFD packet class to scapy parser bind_layers(UDP, BFD, dport=BFD.udp_dport) class BFD_vpp_echo(Packet): """ BFD echo packet as used by VPP (non-rfc, as rfc doesn't define one) """ udp_dport = 3785 #: BFD echo destination port per RFC 5881 name = "BFD_VPP_ECHO" fields_desc = [ BitField("discriminator", 0, 32), BitField("expire_time_clocks", 0, 64), BitField("checksum", 0, 64) ] def mysummary(self): return self.sprintf( "BFD_VPP_ECHO(disc=%BFD_VPP_ECHO.discriminator%," "expire_time_clocks=%BFD_VPP_ECHO.expire_time_clocks%)") # glue the BFD echo packet class to scapy parser bind_layers(UDP, BFD_vpp_echo, dport=BFD_vpp_echo.udp_dport) class VppBFDAuthKey(VppObject): """ Represents BFD authentication key in VPP """ def __init__(self, test, conf_key_id, auth_type, key): self._test = test self._key = key self._auth_type = auth_type test.assertIn(auth_type, BFDAuthType.desc_dict) self._conf_key_id = conf_key_id @property def test(self): """ Test which created this key """ return self._test @property def auth_type(self): """ Authentication type for this key """ return self._auth_type @property def key(self): """ key data """ return self._key @key.setter def key(self, value): self._key = value @property def conf_key_id(self): """ configuration key ID """ return self._conf_key_id def add_vpp_config(self): self.test.vapi.bfd_auth_set_key( conf_key_id=self._conf_key_id, auth_type=self._auth_type, key=self._key, key_len=len(self._key)) self._test.registry.register(self, self.test.logger) def get_bfd_auth_keys_dump_entry(self): """ get the entry in the auth keys dump corresponding to this key """ result = self.test.vapi.bfd_auth_keys_dump() for k in result: if k.conf_key_id == self._conf_key_id: return k return None def query_vpp_config(self): return self.get_bfd_auth_keys_dump_entry() is not None def remove_vpp_config(self): self.test.vapi.bfd_auth_del_key(conf_key_id=self._conf_key_id) def object_id(self): return "bfd-auth-key-%s" % self._conf_key_id class VppBFDUDPSession(VppObject): """ Represents BFD UDP session in VPP """ def __init__(self, test, interface, peer_addr, local_addr=None, af=AF_INET, desired_min_tx=300000, required_min_rx=300000, detect_mult=3, sha1_key=None, bfd_key_id=None, is_tunnel=False): self._test = test self._interface = interface self._af = af if local_addr: self._local_addr = local_addr else: self._local_addr = None self._peer_addr = peer_addr self._desired_min_tx = desired_min_tx self._required_min_rx = required_min_rx self._detect_mult = detect_mult self._sha1_key = sha1_key if bfd_key_id is not None: self._bfd_key_id = bfd_key_id else: self._bfd_key_id = randint(0, 255) self._is_tunnel = is_tunnel @property def test(self): """ Test which created this session """ return self._test @property def interface(self): """ Interface on which this session lives """ return self._interface @property def af(self): """ Address family - AF_INET or AF_INET6 """ return self._af @property def local_addr(self): """ BFD session local address (VPP address) """ if self._local_addr is None: if self.af == AF_INET: return self._interface.local_ip4 elif self.af == AF_INET6: return self._interface.local_ip6 else: raise Exception("Unexpected af '%s'" % self.af) return self._local_addr @property def peer_addr(self): """ BFD session peer address """ return self._peer_addr def get_bfd_udp_session_dump_entry(self): """ get the namedtuple entry from bfd udp session dump """ result = self.test.vapi.bfd_udp_session_dump() for s in result: self.test.logger.debug("session entry: %s" % str(s)) if s.sw_if_index == self.interface.sw_if_index: if self.af == AF_INET \ and self.interface.local_ip4 == str(s.local_addr) \ and self.interface.remote_ip4 == str(s.peer_addr): return s if self.af == AF_INET6 \ and self.interface.local_ip6 == str(s.local_addr) \ and self.interface.remote_ip6 == str(s.peer_addr): return s return None @property def state(self): """ BFD session state """ session = self.get_bfd_udp_session_dump_entry() if session is None: raise Exception("Could not find BFD session in VPP response") return session.state @property def desired_min_tx(self): """ desired minimum tx interval """ return self._desired_min_tx @property def required_min_rx(self): """ required minimum rx interval """ return self._required_min_rx @property def detect_mult(self): """ detect multiplier """ return self._detect_mult @property def sha1_key(self): """ sha1 key """ return self._sha1_key @property def bfd_key_id(self): """ bfd key id in use """ return self._bfd_key_id @property def is_tunnel(self): return self._is_tunnel def activate_auth(self, key, bfd_key_id=None, delayed=False): """ activate authentication for this session """ self._bfd_key_id = bfd_key_id if bfd_key_id else randint(0, 255) self._sha1_key = key conf_key_id = self._sha1_key.conf_key_id is_delayed = 1 if delayed else 0 self.test.vapi.bfd_udp_auth_activate( sw_if_index=self._interface.sw_if_index, local_addr=self.local_addr, peer_addr=self.peer_addr, bfd_key_id=self._bfd_key_id, conf_key_id=conf_key_id, is_delayed=is_delayed) def deactivate_auth(self, delayed=False): """ deactivate authentication """ self._bfd_key_id = None self._sha1_key = None is_delayed = 1 if delayed else 0 self.test.vapi.bfd_udp_auth_deactivate( sw_if_index=self._interface.sw_if_index, local_addr=self.local_addr, peer_addr=self.peer_addr, is_delayed=is_delayed) def modify_parameters(self, detect_mult=None, desired_min_tx=None, required_min_rx=None): """ modify session parameters """ if detect_mult: self._detect_mult = detect_mult if desired_min_tx: self._desired_min_tx = desired_min_tx if required_min_rx: self._required_min_rx = required_min_rx self.test.vapi.bfd_udp_mod(sw_if_index=self._interface.sw_if_index, desired_min_tx=self.desired_min_tx, required_min_rx=self.required_min_rx, detect_mult=self.detect_mult, local_addr=self.local_addr, peer_addr=self.peer_addr) def add_vpp_config(self): bfd_key_id = self._bfd_key_id if self._sha1_key else None conf_key_id = self._sha1_key.conf_key_id if self._sha1_key else None is_authenticated = True if self._sha1_key else False self.test.vapi.bfd_udp_add(sw_if_index=self._interface.sw_if_index, desired_min_tx=self.desired_min_tx, required_min_rx=self.required_min_rx, detect_mult=self.detect_mult, local_addr=self.local_addr, peer_addr=self.peer_addr, bfd_key_id=bfd_key_id, conf_key_id=conf_key_id, is_authenticated=is_authenticated) self._test.registry.register(self, self.test.logger) def query_vpp_config(self): session = self.get_bfd_udp_session_dump_entry() return session is not None def remove_vpp_config(self): self.test.vapi.bfd_udp_del(self._interface.sw_if_index, local_addr=self.local_addr, peer_addr=self.peer_addr) def object_id(self): return "bfd-udp-%s-%s-%s-%s" % (self._interface.sw_if_index, self.local_addr, self.peer_addr, self.af) def admin_up(self): """ set bfd session admin-up """ self.test.vapi.bfd_udp_session_set_flags( flags=VppEnum.vl_api_if_status_flags_t.IF_STATUS_API_FLAG_ADMIN_UP, sw_if_index=self._interface.sw_if_index, local_addr=self.local_addr, peer_addr=self.peer_addr) def admin_down(self): """ set bfd session admin-down """ self.test.vapi.bfd_udp_session_set_flags( flags=0, sw_if_index=self._interface.sw_if_index, local_addr=self.local_addr, peer_addr=self.peer_addr)