import unittest from framework import VppTestCase, VppTestRunner from template_ipsec import TemplateIpsec, IPsecIPv4Params from vpp_papi import VppEnum class IpsecApiTestCase(VppTestCase): """IPSec API tests""" @classmethod def setUpClass(cls): super(IpsecApiTestCase, cls).setUpClass() @classmethod def tearDownClass(cls): super(IpsecApiTestCase, cls).tearDownClass() def setUp(self): super(IpsecApiTestCase, self).setUp() self.create_pg_interfaces([0]) self.pg0.config_ip4() self.pg0.admin_up() self.vpp_esp_protocol = VppEnum.vl_api_ipsec_proto_t.IPSEC_API_PROTO_ESP self.vpp_ah_protocol = VppEnum.vl_api_ipsec_proto_t.IPSEC_API_PROTO_AH self.ipv4_params = IPsecIPv4Params() def tearDown(self): self.pg0.unconfig_ip4() self.pg0.admin_down() super(IpsecApiTestCase, self).tearDown() def test_backend_dump(self): """backend dump""" d = self.vapi.ipsec_backend_dump() self.assert_equal(len(d), 2, "number of ipsec backends in dump") self.assert_equal( d[0].protocol, self.vpp_ah_protocol, "ipsec protocol in dump entry" ) self.assert_equal(d[0].index, 0, "index in dump entry") self.assert_equal(d[0].active, 1, "active flag in dump entry") self.assert_equal( d[1].protocol, self.vpp_esp_protocol, "ipsec protocol in dump entry" ) self.assert_equal(d[1].index, 0, "index in dump entry") self.assert_equal(d[1].active, 1, "active flag in dump entry") def test_select_valid_backend(self): """select valid backend""" self.vapi.ipsec_select_backend(self.vpp_ah_protocol, 0) self.vapi.ipsec_select_backend(self.vpp_esp_protocol, 0) def test_select_invalid_backend(self): """select invalid backend""" with self.vapi.assert_negative_api_retval(): self.vapi.ipsec_select_backend(self.vpp_ah_protocol, 200) with self.vapi.assert_negative_api_retval(): self.vapi.ipsec_select_backend(self.vpp_esp_protocol, 200) def test_select_backend_in_use(self): """attempt to change backend while sad configured""" params = self.ipv4_params addr_type = params.addr_type is_ipv6 = params.is_ipv6 scapy_tun_sa_id = params.scapy_tun_sa_id scapy_tun_spi = params.scapy_tun_spi auth_algo_vpp_id = params.auth_algo_vpp_id auth_key = params.auth_key crypt_algo_vpp_id = params.crypt_algo_vpp_id crypt_key = params.crypt_key self.vapi.ipsec_sad_entry_add_del( is_add=1, entry={ "sad_id": scapy_tun_sa_id, "spi": scapy_tun_spi, "integrity_algorithm": auth_algo_vpp_id, "integrity_key": { "data": auth_key, "length": len(auth_key), }, "crypto_algorithm": crypt_algo_vpp_id, "crypto_key": { "data": crypt_key, "length": len(crypt_key), }, "protocol": self.vpp_ah_protocol, "tunnel_src": self.pg0.local_addr[addr_type], "tunnel_dst": self.pg0.remote_addr[addr_type], }, ) with self.vapi.assert_negative_api_retval(): self.vapi.ipsec_select_backend(protocol=self.vpp_ah_protocol, index=0) self.vapi.ipsec_sad_entry_add_del( is_add=0, entry={ "sad_id": scapy_tun_sa_id, "spi": scapy_tun_spi, "integrity_algorithm": auth_algo_vpp_id, "integrity_key": { "data": auth_key, "length": len(auth_key), }, "crypto_algorithm": crypt_algo_vpp_id, "crypto_key": { "data": crypt_key, "length": len(crypt_key), }, "protocol": self.vpp_ah_protocol, "tunnel_src": self.pg0.local_addr[addr_type], "tunnel_dst": self.pg0.remote_addr[addr_type], }, ) self.vapi.ipsec_select_backend(protocol=self.vpp_ah_protocol, index=0) if __name__ == "__main__": unittest.main(testRunner=VppTestRunner)