summaryrefslogtreecommitdiffstats
path: root/src/vlib/defs.h
blob: ad58bc04681760fc8a806f040ef056ae2b4092b1 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
/*
 * Copyright (c) 2015 Cisco and/or its affiliates.
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at:
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
/*
 * defs.h: VLIB generic C definitions
 *
 * Copyright (c) 2008 Eliot Dresselhaus
 *
 * Permission is hereby granted, free of charge, to any person obtaining
 * a copy of this software and associated documentation files (the
 * "Software"), to deal in the Software without restriction, including
 * without limitation the rights to use, copy, modify, merge, publish,
 * distribute, sublicense, and/or sell copies of the Software, and to
 * permit persons to whom the Software is furnished to do so, subject to
 * the following conditions:
 *
 * The above copyright notice and this permission notice shall be
 * included in all copies or substantial portions of the Software.
 *
 *  THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
 *  EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
 *  MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
 *  NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
 *  LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
 *  OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
 *  WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
 */

#ifndef included_vlib_defs_h
#define included_vlib_defs_h

/* Receive or transmit. */
typedef enum
{
  VLIB_RX,
  VLIB_TX,
  VLIB_N_RX_TX = 2,		/* Used to size arrays. */
} vlib_rx_or_tx_t;

#define vlib_foreach_rx_tx(v) for (v = 0; v < VLIB_N_RX_TX; v++)

/* Read/write. */
typedef enum
{
  VLIB_READ,
  VLIB_WRITE,
} vlib_read_or_write_t;

/* Up/down. */
typedef enum
{
  VLIB_DOWN = 0,
  VLIB_UP = 1,
} vlib_up_or_down_t;

/* Enable/disable. */
typedef enum
{
  VLIB_DISABLE = 0,
  VLIB_ENABLE = 1,
} vlib_enable_or_disable_t;

#endif /* included_vlib_defs_h */

/*
 * fd.io coding-style-patch-verification: ON
 *
 * Local Variables:
 * eval: (c-set-style "gnu")
 * End:
 */
">cls.pg_interfaces) @classmethod def tearDownClass(cls): super(TestPNAT, cls).tearDownClass() def setUp(self): super(TestPNAT, self).setUp() for i in self.interfaces: i.admin_up() i.config_ip4() i.resolve_arp() def tearDown(self): super(TestPNAT, self).tearDown() if not self.vpp_dead: for i in self.pg_interfaces: i.unconfig_ip4() i.admin_down() def validate(self, rx, expected): self.assertEqual(rx, expected.__class__(expected)) def validate_bytes(self, rx, expected): self.assertEqual(rx, expected) def ping_check(self): """ Verify non matching traffic works. """ p_ether = Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) icmpecho = (IP(src=self.pg0.remote_ip4, dst=self.pg0.local_ip4) / ICMP()) reply = (IP(src=self.pg0.local_ip4, dst=self.pg0.remote_ip4) / ICMP(type='echo-reply')) rx = self.send_and_expect(self.pg0, p_ether/icmpecho * 1, self.pg0) for p in rx: reply[IP].id = p[IP].id self.validate(p[1], reply) def test_pnat(self): """ PNAT test """ PNAT_IP4_INPUT = VppEnum.vl_api_pnat_attachment_point_t.PNAT_IP4_INPUT PNAT_IP4_OUTPUT = \ VppEnum.vl_api_pnat_attachment_point_t.PNAT_IP4_OUTPUT tests = [ { 'input': PNAT_IP4_INPUT, 'sw_if_index': self.pg0.sw_if_index, 'match': {'mask': 0xa, 'dst': '10.10.10.10', 'proto': 17, 'dport': 6871}, 'rewrite': {'mask': 0x2, 'dst': self.pg1.remote_ip4}, 'send': (IP(src=self.pg0.remote_ip4, dst='10.10.10.10') / UDP(dport=6871)), 'reply': (IP(src=self.pg0.remote_ip4, dst=self.pg1.remote_ip4) / UDP(dport=6871)) }, { 'input': PNAT_IP4_OUTPUT, 'sw_if_index': self.pg1.sw_if_index, 'match': {'mask': 0x9, 'src': self.pg0.remote_ip4, 'proto': 17, 'dport': 6871}, 'rewrite': {'mask': 0x1, 'src': '11.11.11.11'}, 'send': (IP(src=self.pg0.remote_ip4, dst=self.pg1.remote_ip4) / UDP(dport=6871)), 'reply': (IP(src='11.11.11.11', dst=self.pg1.remote_ip4) / UDP(dport=6871)) }, { 'input': PNAT_IP4_INPUT, 'sw_if_index': self.pg0.sw_if_index, 'match': {'mask': 0xa, 'dst': '10.10.10.10', 'proto': 17, 'dport': 6871}, 'rewrite': {'mask': 0xa, 'dst': self.pg1.remote_ip4, 'dport': 5555}, 'send': (IP(src=self.pg0.remote_ip4, dst='10.10.10.10') / UDP(sport=65530, dport=6871)), 'reply': (IP(src=self.pg0.remote_ip4, dst=self.pg1.remote_ip4) / UDP(sport=65530, dport=5555)) }, { 'input': PNAT_IP4_INPUT, 'sw_if_index': self.pg0.sw_if_index, 'match': {'mask': 0xa, 'dst': self.pg1.remote_ip4, 'proto': 17, 'dport': 6871}, 'rewrite': {'mask': 0x8, 'dport': 5555}, 'send': (IP(src=self.pg0.remote_ip4, dst=self.pg1.remote_ip4) / UDP(dport=6871, chksum=0)), 'reply': (IP(src=self.pg0.remote_ip4, dst=self.pg1.remote_ip4) / UDP(dport=5555, chksum=0)) }, { 'input': PNAT_IP4_INPUT, 'sw_if_index': self.pg0.sw_if_index, 'match': {'mask': 0x2, 'dst': self.pg1.remote_ip4, 'proto': 1}, 'rewrite': {'mask': 0x1, 'src': '8.8.8.8'}, 'send': (IP(src=self.pg0.remote_ip4, dst=self.pg1.remote_ip4) / ICMP()), 'reply': IP(src='8.8.8.8', dst=self.pg1.remote_ip4)/ICMP(), }, ] p_ether = Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) for t in tests: rv = self.vapi.pnat_binding_add(match=t['match'], rewrite=t['rewrite']) self.vapi.pnat_binding_attach(sw_if_index=t['sw_if_index'], attachment=t['input'], binding_index=rv.binding_index) reply = t['reply'] reply[IP].ttl -= 1 rx = self.send_and_expect(self.pg0, p_ether/t['send']*1, self.pg1) for p in rx: # p.show2() self.validate(p[1], reply) self.ping_check() self.vapi.pnat_binding_detach(sw_if_index=t['sw_if_index'], attachment=t['input'], binding_index=rv.binding_index) self.vapi.pnat_binding_del(binding_index=rv.binding_index) def test_pnat_show(self): """ PNAT show tests """ PNAT_IP4_INPUT = VppEnum.vl_api_pnat_attachment_point_t.PNAT_IP4_INPUT PNAT_IP4_OUTPUT = \ VppEnum.vl_api_pnat_attachment_point_t.PNAT_IP4_OUTPUT tests = [ { 'input': PNAT_IP4_INPUT, 'sw_if_index': self.pg0.sw_if_index, 'match': {'mask': 0xa, 'dst': '10.10.10.10', 'proto': 17, 'dport': 6871}, 'rewrite': {'mask': 0x2, 'dst': self.pg1.remote_ip4}, 'send': (IP(src=self.pg0.remote_ip4, dst='10.10.10.10') / UDP(dport=6871)), 'reply': (IP(src=self.pg0.remote_ip4, dst=self.pg1.remote_ip4) / UDP(dport=6871)) }, { 'input': PNAT_IP4_OUTPUT, 'sw_if_index': self.pg1.sw_if_index, 'match': {'mask': 0x9, 'src': self.pg0.remote_ip4, 'proto': 17, 'dport': 6871}, 'rewrite': {'mask': 0x1, 'src': '11.11.11.11'}, 'send': (IP(src=self.pg0.remote_ip4, dst=self.pg1.remote_ip4) / UDP(dport=6871)), 'reply': (IP(src='11.11.11.11', dst=self.pg1.remote_ip4) / UDP(dport=6871)) }, ] binding_index = [] for t in tests: rv = self.vapi.pnat_binding_add(match=t['match'], rewrite=t['rewrite']) binding_index.append(rv.binding_index) self.vapi.pnat_binding_attach(sw_if_index=t['sw_if_index'], attachment=t['input'], binding_index=rv.binding_index) rv, l = self.vapi.pnat_bindings_get() self.assertEqual(len(l), len(tests)) rv, l = self.vapi.pnat_interfaces_get() self.assertEqual(len(l), 2) self.logger.info(self.vapi.cli("show pnat translations")) self.logger.info(self.vapi.cli("show pnat interfaces")) for i, t in enumerate(tests): self.vapi.pnat_binding_detach(sw_if_index=t['sw_if_index'], attachment=t['input'], binding_index=binding_index[i]) self.vapi.pnat_binding_del(binding_index=binding_index[i]) if __name__ == '__main__': unittest.main(testRunner=VppTestRunner)