import socket import unittest import ipaddress from util import ppp from framework import VppTestRunner from template_ipsec import IPSecIPv4Fwd from template_ipsec import IPSecIPv6Fwd from test_ipsec_esp import TemplateIpsecEsp def debug_signal_handler(signal, frame): import pdb pdb.set_trace() import signal signal.signal(signal.SIGINT, debug_signal_handler) class SpdFastPathInbound(IPSecIPv4Fwd): # In test cases derived from this class, packets in IPv4 FWD path # are configured to go through IPSec inbound SPD policy lookup. # Note that order in which the rules are applied is # PROTECT, BYPASS, DISCARD. Therefore BYPASS rules take # precedence over DISCARD. # # Override setUpConstants to enable inbound fast path in config @classmethod def setUpConstants(cls): super(SpdFastPathInbound, cls).setUpConstants() cls.vpp_cmdline.extend(["ipsec", "{", "ipv4-inbound-spd-fast-path on", "}"]) cls.logger.info("VPP modified cmdline is %s" % " ".join(cls.vpp_cmdline)) class SpdFastPathInboundProtect(TemplateIpsecEsp): @classmethod def setUpConstants(cls): super(SpdFastPathInboundProtect, cls).setUpConstants() cls.vpp_cmdline.extend(["ipsec", "{", "ipv4-inbound-spd-fast-path on", "}"]) cls.logger.info("VPP modified cmdline is %s" % " ".join(cls.vpp_cmdline)) @classmethod def setUpClass(cls): super(SpdFastPathInboundProtect, cls).setUpClass() @classmethod def tearDownClass(cls): super(SpdFastPathInboundProtect, cls).tearDownClass() def setUp(self): super(SpdFastPathInboundProtect, self).setUp() def tearDown(self): self.unconfig_network() super(SpdFastPathInboundProtect, self).tearDown() class SpdFastPathIPv6Inbound(IPSecIPv6Fwd): # In test cases derived from this class, packets in IPvr6 FWD path # are configured to go through IPSec inbound SPD policy lookup. # Note that order in which the rules are applied is # PROTECT, BYPASS, DISCARD. Therefore BYPASS rules take # precedence over DISCARDi. # Override setUpConstants to enable inbound fast path in config @classmethod def setUpConstants(cls): super(SpdFastPathIPv6Inbound, cls).setUpConstants() cls.vpp_cmdline.extend(["ipsec", "{", "ipv6-inbound-spd-fast-path on", "}"]) cls.logger.info("VPP modified cmdline is %s" % " ".join(cls.vpp_cmdline)) class SpdFastPathIPv6InboundProtect(TemplateIpsecEsp): @classmethod def setUpConstants(cls): super(SpdFastPathIPv6InboundProtect, cls).setUpConstants() cls.vpp_cmdline.extend(["ipsec", "{", "ipv6-inbound-spd-fast-path on", "}"]) cls.logger.info("VPP modified cmdline is %s" % " ".join(cls.vpp_cmdline)) @classmethod def setUpClass(cls): super(SpdFastPathIPv6InboundProtect, cls).setUpClass() @classmethod def tearDownClass(cls): super(SpdFastPathIPv6InboundProtect, cls).tearDownClass() def setUp(self): super(SpdFastPathIPv6InboundProtect, self).setUp() def tearDown(self): self.unconfig_network() super(SpdFastPathIPv6InboundProtect, self).tearDown() class IPSec4SpdTestCaseBypass(SpdFastPathInbound): """ IPSec/IPv4 inbound: Policy mode test case with fast path \ (add bypass)""" def test_ipsec_spd_inbound_bypass(self): # In this test case, packets in IPv4 FWD path are configured # to go through IPSec inbound SPD policy lookup. # # 2 inbound SPD rules (1 HIGH and 1 LOW) are added. # - High priority rule action is set to DISCARD. # - Low priority rule action is set to BYPASS. # # Since BYPASS rules take precedence over DISCARD # (the order being PROTECT, BYPASS, DISCARD) we expect the # BYPASS rule to match and traffic to be correctly forwarded. self.create_interfaces(2) pkt_count = 5 self.spd_create_and_intf_add(1, [self.pg1, self.pg0]) # create input rules # bypass rule should take precedence over discard rule, # even though it's lower priority, because for input policies # matching PROTECT policies precedes matching BYPASS policies # which preceeds matching for DISCARD policies. # Any hit stops the process. policy_0 = self.spd_add_rem_policy( # inbound, priority 10 1, self.pg1, self.pg0, socket.IPPROTO_UDP, is_out=0, priority=10, policy_type="bypass", ip_range=True, local_ip_start=self.pg1.remote_ip4, local_ip_stop=self.pg1.remote_ip4, remote_ip_start=self.pg0.remote_ip4, remote_ip_stop=self.pg0.remote_ip4, ) policy_1 = self.spd_add_rem_policy( # inbound, priority 15 1, self.pg1, self.pg0, socket.IPPROTO_UDP, is_out=0, priority=15, policy_type="discard", ip_range=True, local_ip_start=self.pg1.remote_ip4, local_ip_stop=self.pg1.remote_ip4, remote_ip_start=self.pg0.remote_ip4, remote_ip_stop=self.pg0.remote_ip4, ) # create output rule so we can capture forwarded packets policy_2 = self.spd_add_rem_policy( # outbound, priority 10 1, self.pg0, self.pg1, socket.IPPROTO_UDP, is_out=1, priority=10, policy_type="bypass", ) # create the packet stream packets = self.create_stream(self.pg0, self.pg1, pkt_count) # add the stream to the source interface self.pg0.add_stream(packets) self.pg1.enable_capture() self.pg_start() # check capture on pg1 capture = self.pg1.get_capture() for packet in capture: try: self.logger.debug(ppp("SPD Add - Got packet:", packet)) except Exception: self.logger.error(ppp("Unexpected or invalid packet:", packet)) raise self.logger.debug("SPD: Num packets: %s", len(capture.res)) # verify captured packets self.verify_capture(self.pg0, self.pg1, capture) # verify all policies matched the expected number of times self.verify_policy_match(pkt_count, policy_0) self.verify_policy_match(0, policy_1) self.verify_policy_match(pkt_count, policy_2) class IPSec4SpdTestCaseDiscard(SpdFastPathInbound): """ IPSec/IPv4 inbound: Policy mode test case with fast path \ (add discard)""" def test_ipsec_spd_inbound_discard(self): # In this test case, packets in IPv4 FWD path are configured # to go through IPSec inbound SPD policy lookup. # # Rule action is set to DISCARD. self.create_interfaces(2) pkt_count = 5 self.spd_create_and_intf_add(1, [self.pg1, self.pg0]) # create input rules # bypass rule should take precedence over discard rule, # even though it's lower priority policy_0 = self.spd_add_rem_policy( # inbound, priority 10 1, self.pg1, self.pg0, socket.IPPROTO_UDP, is_out=0, priority=10, policy_type="discard", ) # create output rule so we can capture forwarded packets policy_1 = self.spd_add_rem_policy( # outbound, priority 10 1, self.pg1, self.pg0, socket.IPPROTO_UDP, is_out=1, priority=10,
/*
* Copyright (c) 2018 Cisco and/or its affiliates.
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at:
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#ifndef __GBP_EXT_ITF_H__
#define __GBP_EXT_ITF_H__
#include <gbp/gbp.h>
enum
{
GBP_EXT_ITF_F_NONE = 0,
GBP_EXT_ITF_F_ANON = 1 << 0,
};
/**
* An external interface maps directly to an oflex L3ExternalInterface.
* The special characteristics of an external interface is the way the source
* EPG is determined for input packets which, like a recirc interface, is via
* a LPM.
*/
typedef struct gpb_ext_itf_t_
{
/**
* The interface
*/
u32 gx_itf;
/**
* The BD this external interface is a member of
*/
index_t gx_bd;
/**
* The RD this external interface is a member of
*/
index_t gx_rd;
/**
* cached FIB indices from the RD
*/
u32 gx_fib_index[DPO_PROTO_NUM];
/**
* The associated flags
*/
u32 gx_flags;
} gbp_ext_itf_t;
extern int gbp_ext_itf_add (u32 sw_if_index, u32 bd_id, u32 rd_id, u32 flags);
extern int gbp_ext_itf_delete (u32 sw_if_index);
extern u8 *format_gbp_ext_itf (u8 * s, va_list * args);
typedef walk_rc_t (*gbp_ext_itf_cb_t) (gbp_ext_itf_t * gbpe, void *ctx);
extern void gbp_ext_itf_walk (gbp_ext_itf_cb_t bgpe, void *ctx);
/**
* Exposed types for the data-plane
*/
extern gbp_ext_itf_t *gbp_ext_itf_pool;
extern index_t *gbp_ext_itf_db;
always_inline gbp_ext_itf_t *
gbp_ext_itf_get (u32 sw_if_index)
{
return (pool_elt_at_index (gbp_ext_itf_pool, gbp_ext_itf_db[sw_if_index]));
}
#endif
/*
* fd.io coding-style-patch-verification: ON
*
* Local Variables:
* eval: (c-set-style "gnu")
* End:
*/