| # NB NB NB NB NB NB NB NB NB NB NB |
| # |
| # NOTE: The API binary wrappers in this file are in the process of being |
| # deprecated. DO NOT ADD NEW WRAPPERS HERE. Call the functions using |
| # named arguments directly instead. |
| # |
| |
| import os |
| import time |
| from collections import deque |
| import queue |
| from six import moves, iteritems |
| from vpp_papi import VPPApiClient, mac_pton |
| from hook import Hook |
| from vpp_ip_route import MPLS_IETF_MAX_LABEL, MPLS_LABEL_INVALID |
| |
| # |
| # Dictionary keyed on message name to override default values for |
| # named parameters |
| # |
| defaultmapping = { |
| |
| 'acl_interface_add_del': {'is_add': 1, 'is_input': 1}, |
| 'bd_ip_mac_add_del': {'is_add': 1, }, |
| 'bfd_udp_add': {'is_authenticated': False, 'bfd_key_id': None, |
| 'conf_key_id': None}, |
| 'bfd_udp_auth_activate': {'bfd_key_id': None, 'conf_key_id': None, |
| 'is_delayed': False}, |
| 'bier_disp_entry_add_del': {'next_hop_rpf_id': -1, 'next_hop_is_ip4': 1, |
| 'is_add': 1, }, |
| 'bier_disp_table_add_del': {'is_add': 1, }, |
| 'bier_imp_add': {'is_add': 1, }, |
| 'bier_route_add_del': {'is_add': 1, }, |
| 'bier_table_add_del': {'is_add': 1, }, |
| 'bridge_domain_add_del': {'flood': 1, 'uu_flood': 1, 'forward': 1, |
| 'learn': 1, 'is_add': 1, }, |
| 'bvi_delete': {}, |
| 'gbp_subnet_add_del': {'sw_if_index': 4294967295, 'epg_id': 65535, }, |
| 'geneve_add_del_tunnel': {'mcast_sw_if_index': 4294967295, 'is_add': 1, |
| 'decap_next_index': 4294967295, }, |
| 'input_acl_set_interface': {'ip4_table_index': 4294967295, |
| 'ip6_table_index': 4294967295, |
| 'l2_table_index': 4294967295, }, |
| 'ip6_add_del_address_using_prefix': {'is_add': 1, }, |
| 'ip6nd_send_router_solicitation': {'irt': 1, 'mrt': 120, }, |
| 'ip_add_del_route': {'next_hop_sw_if_index': 4294967295, |
| 'next_hop_weight': 1, 'next_hop_via_label': 1048576, |
| 'classify_table_index': 4294967295, 'is_add': 1, }, |
| 'ip_mroute_add_del': {'is_add': 1, }, |
| 'ip_neighbor_add_del': {'is_add': 1, }, |
| 'ipsec_interface_add_del_spd': {'is_add': 1, }, |
| 'ipsec_spd_add_del': {'is_add': 1, }, |
| 'ipsec_spd_dump': {'sa_id': 4294967295, }, |
| 'ipsec_spd_entry_add_del': {'local_port_stop': 65535, |
| 'remote_port_stop': 65535, 'priority': 100, |
| 'is_outbound': 1, |
| 'is_add': 1, }, |
| 'ipsec_tunnel_if_add_del': {'is_add': 1, 'anti_replay': 1, }, |
| 'l2_emulation': {'enable': 1, }, |
| 'l2fib_add_del': {'is_add': 1, }, |
| 'lisp_add_del_adjacency': {'is_add': 1, }, |
| 'lisp_add_del_local_eid': {'is_add': 1, }, |
| 'lisp_add_del_locator': {'priority': 1, 'weight': 1, 'is_add': 1, }, |
| 'lisp_add_del_locator_set': {'is_add': 1, }, |
| 'lisp_add_del_remote_mapping': {'is_add': 1, }, |
| 'macip_acl_interface_add_del': {'is_add': 1, }, |
| 'mpls_ip_bind_unbind': {'is_ip4': 1, 'is_bind': 1, }, |
| 'mpls_route_add_del': {'mr_next_hop_sw_if_index': 4294967295, |
| 'mr_next_hop_weight': 1, |
| 'mr_next_hop_via_label': 1048576, |
| 'mr_is_add': 1, |
| 'mr_classify_table_index': 4294967295, }, |
| 'mpls_table_add_del': {'is_add': 1, }, |
| 'mpls_tunnel_add_del': {'next_hop_sw_if_index': 4294967295, |
| 'next_hop_weight': 1, |
| 'next_hop_via_label': 1048576, |
| 'is_add': 1, }, |
| 'output_acl_set_interface': {'ip4_table_index': 4294967295, |
| 'ip6_table_index': 4294967295, |
| 'l2_table_index': 4294967295, }, |
| 'pppoe_add_del_session': {'is_add': 1, }, |
| 'policer_add_del': {'is_add': 1, 'conform_action': {'type': 1}, }, |
| 'set_ipfix_exporter': {'collector_port': 4739, }, |
| 'sr_policy_add': {'weight': 1, 'is_encap': 1, }, |
| 'sw_interface_add_del_address': {'is_add': 1, }, |
| 'sw_interface_ip6nd_ra_prefix': {'val_lifetime': 4294967295, |
| 'pref_lifetime': 4294967295, }, |
| 'sw_interface_set_ip_directed_broadcast': {'enable': 1, }, |
| 'sw_interface_set_l2_bridge': {'enable': 1, }, |
| 'sw_interface_set_mpls_enable': {'enable': 1, }, |
| 'sw_interface_set_mtu': {'mtu': [0, 0, 0, 0], }, |
| 'sw_interface_set_unnumbered': {'is_add': 1, }, |
| 'sw_interface_span_enable_disable': {'state': 1, }, |
| 'vxlan_add_del_tunnel': {'mcast_sw_if_index': 4294967295, 'is_add': 1, |
| 'decap_next_index': 4294967295, |
| 'instance': 4294967295, }, |
| 'vxlan_gpe_add_del_tunnel': {'mcast_sw_if_index': 4294967295, 'is_add': 1, |
| 'protocol': 3, }, |
| 'want_bfd_events': {'enable_disable': 1, }, |
| 'want_igmp_events': {'enable': 1, }, |
| 'want_interface_events': {'enable_disable': 1, }, |
| 'want_l2_macs_events': {'enable_disable': 1, 'pid': os.getpid(), }, |
| 'want_l2_macs_events2': {'enable_disable': 1, 'pid': os.getpid(), }, |
| } |
| |
| |
| def as_fn_signature(d): |
| return ", ".join(f"{k}={v}" for k, v in d.items()) |
| |
| |
| class CliFailedCommandError(Exception): |
| """ cli command failed.""" |
| |
| |
| class CliSyntaxError(Exception): |
| """ cli command had a syntax error.""" |
| |
| |
| class UnexpectedApiReturnValueError(Exception): |
| """ exception raised when the API return value is unexpected """ |
| pass |
| |
| |
| class VppPapiProvider(object): |
| """VPP-api provider using vpp-papi |
| |
| @property hook: hook object providing before and after api/cli hooks |
| """ |
| |
| _zero, _negative = range(2) |
| |
| def __init__(self, name, test_class, read_timeout): |
| self.hook = Hook(test_class) |
| self.name = name |
| self.test_class = test_class |
| self._expect_api_retval = self._zero |
| self._expect_stack = [] |
| |
| # install_dir is a class attribute. We need to set it before |
| # calling the constructor. |
| VPPApiClient.apidir = os.getenv('VPP_INSTALL_PATH') |
| |
| self.vpp = VPPApiClient(logger=test_class.logger, |
| read_timeout=read_timeout, |
| use_socket=True, |
| server_address=test_class.api_sock) |
| self._events = queue.Queue() |
| |
| def __enter__(self): |
| return self |
| |
| def assert_negative_api_retval(self): |
| """ Expect API failure - used with with, e.g.: |
| with self.vapi.assert_negative_api_retval(): |
| self.vapi.<api call expected to fail> |
| """ |
| self._expect_stack.append(self._expect_api_retval) |
| self._expect_api_retval = self._negative |
| return self |
| |
| def assert_zero_api_retval(self): |
| """ Expect API success - used with with, e.g.: |
| with self.vapi.assert_negative_api_retval(): |
| self.vapi.<api call expected to succeed> |
| |
| note: this is useful only inside another with block |
| as success is the default expected value |
| """ |
| self._expect_stack.append(self._expect_api_retval) |
| self._expect_api_retval = self._zero |
| return self |
| |
| def __exit__(self, exc_type, exc_value, traceback): |
| self._expect_api_retval = self._expect_stack.pop() |
| |
| def register_hook(self, hook): |
| """Replace hook registration with new hook |
| |
| :param hook: |
| |
| """ |
| self.hook = hook |
| |
| def collect_events(self): |
| """ Collect all events from the internal queue and clear the queue. """ |
| result = [] |
| while True: |
| try: |
| e = self._events.get(block=False) |
| result.append(e) |
| except queue.Empty: |
| return result |
| return result |
| |
| def wait_for_event(self, timeout, name=None): |
| """ Wait for and return next event. """ |
| if name: |
| self.test_class.logger.debug("Expecting event '%s' within %ss", |
| name, timeout) |
| else: |
| self.test_class.logger.debug("Expecting event within %ss", |
| timeout) |
| try: |
| e = self._events.get(timeout=timeout) |
| except queue.Empty: |
| raise Exception("Event did not occur within timeout") |
| msgname = type(e).__name__ |
| if name and msgname != name: |
| raise Exception("Unexpected event received: %s, expected: %s" |
| % msgname) |
| self.test_class.logger.debug("Returning event %s:%s" % (name, e)) |
| return e |
| |
| def __call__(self, name, event): |
| """ Enqueue event in the internal event queue. """ |
| self.test_class.logger.debug("New event: %s: %s" % (name, event)) |
| self._events.put(event) |
| |
| def factory(self, name, apifn): |
| def f(*a, **ka): |
| fields = apifn._func.msg.fields |
| |
| # add positional and kw arguments |
| d = ka |
| for i, o in enumerate(fields[3:]): |
| try: |
| d[o] = a[i] |
| except BaseException: |
| break |
| |
| # Default override |
| if name in defaultmapping: |
| for k, v in iteritems(defaultmapping[name]): |
| if k in d: |
| continue |
| d[k] = v |
| return self.api(apifn, d) |
| |
| return f |
| |
| def __getattribute__(self, name): |
| try: |
| method = super(VppPapiProvider, self).__getattribute__(name) |
| except AttributeError: |
| method = self.factory(name, getattr(self.papi, name)) |
| # lazily load the method so we don't need to call factory |
| # again for this name. |
| setattr(self, name, method) |
| return method |
| |
| def connect(self): |
| """Connect the API to VPP""" |
| # This might be called before VPP is prepared to listen to the socket |
| retries = 0 |
| while not os.path.exists(self.test_class.api_sock): |
| time.sleep(0.5) |
| retries += 1 |
| if retries > 120: |
| break |
| self.vpp.connect(self.name[:63]) |
| self.papi = self.vpp.api |
| self.vpp.register_event_callback(self) |
| |
| def disconnect(self): |
| """Disconnect the API from VPP""" |
| self.vpp.disconnect() |
| |
| def api(self, api_fn, api_args, expected_retval=0): |
| """ Call API function and check it's return value. |
| Call the appropriate hooks before and after the API call |
| |
| :param api_fn: API function to call |
| :param api_args: tuple of API function arguments |
| :param expected_retval: Expected return value (Default value = 0) |
| :returns: reply from the API |
| |
| """ |
| self.hook.before_api(api_fn.__name__, api_args) |
| reply = api_fn(**api_args) |
| if self._expect_api_retval == self._negative: |
| if hasattr(reply, 'retval') and reply.retval >= 0: |
| msg = "%s(%s) passed unexpectedly: expected negative " \ |
| "return value instead of %d in %s" % \ |
| (api_fn.__name__, as_fn_signature(api_args), |
| reply.retval, |
| moves.reprlib.repr(reply)) |
| self.test_class.logger.info(msg) |
| raise UnexpectedApiReturnValueError(msg) |
| elif self._expect_api_retval == self._zero: |
| if hasattr(reply, 'retval') and reply.retval != expected_retval: |
| msg = "%s(%s) failed, expected %d return value instead " \ |
| "of %d in %s" % (api_fn.__name__, |
| as_fn_signature(api_args), |
| expected_retval, reply.retval, |
| repr(reply)) |
| self.test_class.logger.info(msg) |
| raise UnexpectedApiReturnValueError(msg) |
| else: |
| raise Exception("Internal error, unexpected value for " |
| "self._expect_api_retval %s" % |
| self._expect_api_retval) |
| self.hook.after_api(api_fn.__name__, api_args) |
| return reply |
| |
| def cli_return_response(self, cli): |
| """ Execute a CLI, calling the before/after hooks appropriately. |
| Return the reply without examining it |
| |
| :param cli: CLI to execute |
| :returns: response object |
| |
| """ |
| self.hook.before_cli(cli) |
| cli += '\n' |
| r = self.papi.cli_inband(cmd=cli) |
| self.hook.after_cli(cli) |
| return r |
| |
| def cli(self, cli): |
| """ Execute a CLI, calling the before/after hooks appropriately. |
| |
| :param cli: CLI to execute |
| :returns: CLI output |
| |
| """ |
| r = self.cli_return_response(cli) |
| if r.retval == -156: |
| raise CliSyntaxError(r.reply) |
| if r.retval != 0: |
| raise CliFailedCommandError(r.reply) |
| if hasattr(r, 'reply'): |
| return r.reply |
| |
| def ppcli(self, cli): |
| """ Helper method to print CLI command in case of info logging level. |
| |
| :param cli: CLI to execute |
| :returns: CLI output |
| """ |
| return cli + "\n" + self.cli(cli) |
| |
| def ip6nd_send_router_solicitation(self, sw_if_index, irt=1, mrt=120, |
| mrc=0, mrd=0): |
| return self.api(self.papi.ip6nd_send_router_solicitation, |
| {'irt': irt, |
| 'mrt': mrt, |
| 'mrc': mrc, |
| 'mrd': mrd, |
| 'sw_if_index': sw_if_index}) |
| |
| def want_interface_events(self, enable_disable=1): |
| return self.api(self.papi.want_interface_events, |
| {'enable_disable': enable_disable, |
| 'pid': os.getpid(), }) |
| |
| def sw_interface_set_mac_address(self, sw_if_index, mac): |
| return self.api(self.papi.sw_interface_set_mac_address, |
| {'sw_if_index': sw_if_index, |
| 'mac_address': mac}) |
| |
| def p2p_ethernet_add(self, sw_if_index, remote_mac, subif_id): |
| """Create p2p ethernet subinterface |
| |
| :param sw_if_index: main (parent) interface |
| :param remote_mac: client (remote) mac address |
| |
| """ |
| return self.api( |
| self.papi.p2p_ethernet_add, |
| {'parent_if_index': sw_if_index, |
| 'remote_mac': remote_mac, |
| 'subif_id': subif_id}) |
| |
| def p2p_ethernet_del(self, sw_if_index, remote_mac): |
| """Delete p2p ethernet subinterface |
| |
| :param sw_if_index: main (parent) interface |
| :param remote_mac: client (remote) mac address |
| |
| """ |
| return self.api( |
| self.papi.p2p_ethernet_del, |
| {'parent_if_index': sw_if_index, |
| 'remote_mac': remote_mac}) |
| |
| def create_vlan_subif(self, sw_if_index, vlan): |
| """ |
| |
| :param vlan: |
| :param sw_if_index: |
| |
| """ |
| return self.api(self.papi.create_vlan_subif, |
| {'sw_if_index': sw_if_index, |
| 'vlan_id': vlan}) |
| |
| def create_loopback(self, mac=''): |
| """ |
| |
| :param mac: (Optional) |
| """ |
| return self.api(self.papi.create_loopback, |
| {'mac_address': mac}) |
| |
| def ip_route_dump(self, table_id, is_ip6=False): |
| return self.api(self.papi.ip_route_dump, |
| {'table': { |
| 'table_id': table_id, |
| 'is_ip6': is_ip6 |
| }}) |
| |
| def ip_route_v2_dump(self, table_id, is_ip6=False, src=0): |
| return self.api(self.papi.ip_route_v2_dump, |
| { |
| 'src': src, |
| 'table': { |
| 'table_id': table_id, |
| 'is_ip6': is_ip6 |
| } |
| }) |
| |
| def ip_neighbor_add_del(self, |
| sw_if_index, |
| mac_address, |
| ip_address, |
| is_add=1, |
| flags=0): |
| """ Add neighbor MAC to IPv4 or IPv6 address. |
| |
| :param sw_if_index: |
| :param mac_address: |
| :param dst_address: |
| :param is_add: (Default value = 1) |
| :param flags: (Default value = 0/NONE) |
| """ |
| return self.api( |
| self.papi.ip_neighbor_add_del, |
| { |
| 'is_add': is_add, |
| 'neighbor': { |
| 'sw_if_index': sw_if_index, |
| 'flags': flags, |
| 'mac_address': mac_address, |
| 'ip_address': ip_address |
| } |
| } |
| ) |
| |
| def udp_encap_add(self, |
| src_ip, |
| dst_ip, |
| src_port, |
| dst_port, |
| table_id=0): |
| """ Add a GRE tunnel |
| :param src_ip: |
| :param dst_ip: |
| :param src_port: |
| :param dst_port: |
| :param outer_fib_id: (Default value = 0) |
| """ |
| |
| return self.api( |
| self.papi.udp_encap_add, |
| { |
| 'udp_encap': { |
| 'src_ip': src_ip, |
| 'dst_ip': dst_ip, |
| 'src_port': src_port, |
| 'dst_port': dst_port, |
| 'table_id': table_id |
| } |
| }) |
| |
| def udp_encap_del(self, id): |
| return self.api(self.papi.udp_encap_del, {'id': id}) |
| |
| def udp_encap_dump(self): |
| return self.api(self.papi.udp_encap_dump, {}) |
| |
| def want_udp_encap_stats(self, enable=1): |
| return self.api(self.papi.want_udp_encap_stats, |
| {'enable': enable, |
| 'pid': os.getpid()}) |
| |
| def mpls_route_dump(self, table_id): |
| return self.api(self.papi.mpls_route_dump, |
| {'table': { |
| 'mt_table_id': table_id |
| }}) |
| |
| def mpls_table_dump(self): |
| return self.api(self.papi.mpls_table_dump, {}) |
| |
| def mpls_table_add_del( |
| self, |
| table_id, |
| is_add=1): |
| """ |
| |
| :param table_id |
| :param is_add: (Default value = 1) |
| |
| """ |
| |
| return self.api( |
| self.papi.mpls_table_add_del, |
| {'mt_table': |
| { |
| 'mt_table_id': table_id, |
| }, |
| 'mt_is_add': is_add}) |
| |
| def mpls_route_add_del(self, |
| table_id, |
| label, |
| eos, |
| eos_proto, |
| is_multicast, |
| paths, |
| is_add, |
| is_multipath): |
| """ MPLS Route add/del """ |
| return self.api( |
| self.papi.mpls_route_add_del, |
| {'mr_route': |
| { |
| 'mr_table_id': table_id, |
| 'mr_label': label, |
| 'mr_eos': eos, |
| 'mr_eos_proto': eos_proto, |
| 'mr_is_multicast': is_multicast, |
| 'mr_n_paths': len(paths), |
| 'mr_paths': paths, |
| }, |
| 'mr_is_add': is_add, |
| 'mr_is_multipath': is_multipath}) |
| |
| def mpls_ip_bind_unbind( |
| self, |
| label, |
| prefix, |
| table_id=0, |
| ip_table_id=0, |
| is_bind=1): |
| """ |
| """ |
| return self.api( |
| self.papi.mpls_ip_bind_unbind, |
| {'mb_mpls_table_id': table_id, |
| 'mb_label': label, |
| 'mb_ip_table_id': ip_table_id, |
| 'mb_is_bind': is_bind, |
| 'mb_prefix': prefix}) |
| |
| def mpls_tunnel_add_del( |
| self, |
| tun_sw_if_index, |
| paths, |
| is_add=1, |
| l2_only=0, |
| is_multicast=0): |
| """ |
| """ |
| return self.api( |
| self.papi.mpls_tunnel_add_del, |
| {'mt_is_add': is_add, |
| 'mt_tunnel': |
| { |
| 'mt_sw_if_index': tun_sw_if_index, |
| 'mt_l2_only': l2_only, |
| 'mt_is_multicast': is_multicast, |
| 'mt_n_paths': len(paths), |
| 'mt_paths': paths, |
| }}) |
| |
| def input_acl_set_interface( |
| self, |
| is_add, |
| sw_if_index, |
| ip4_table_index=0xFFFFFFFF, |
| ip6_table_index=0xFFFFFFFF, |
| l2_table_index=0xFFFFFFFF): |
| """ |
| :param is_add: |
| :param sw_if_index: |
| :param ip4_table_index: (Default value = 0xFFFFFFFF) |
| :param ip6_table_index: (Default value = 0xFFFFFFFF) |
| :param l2_table_index: (Default value = 0xFFFFFFFF) |
| """ |
| |
| return self.api( |
| self.papi.input_acl_set_interface, |
| {'sw_if_index': sw_if_index, |
| 'ip4_table_index': ip4_table_index, |
| 'ip6_table_index': ip6_table_index, |
| 'l2_table_index': l2_table_index, |
| 'is_add': is_add}) |
| |
| def output_acl_set_interface( |
| self, |
| is_add, |
| sw_if_index, |
| ip4_table_index=0xFFFFFFFF, |
| ip6_table_index=0xFFFFFFFF, |
| l2_table_index=0xFFFFFFFF): |
| """ |
| :param is_add: |
| :param sw_if_index: |
| :param ip4_table_index: (Default value = 0xFFFFFFFF) |
| :param ip6_table_index: (Default value = 0xFFFFFFFF) |
| :param l2_table_index: (Default value = 0xFFFFFFFF) |
| """ |
| |
| return self.api( |
| self.papi.output_acl_set_interface, |
| {'sw_if_index': sw_if_index, |
| 'ip4_table_index': ip4_table_index, |
| 'ip6_table_index': ip6_table_index, |
| 'l2_table_index': l2_table_index, |
| 'is_add': is_add}) |
| |
| def set_ipfix_exporter( |
| self, |
| collector_address, |
| src_address, |
| path_mtu, |
| template_interval, |
| vrf_id=0, |
| collector_port=4739, |
| udp_checksum=0): |
| return self.api( |
| self.papi.set_ipfix_exporter, |
| { |
| 'collector_address': collector_address, |
| 'collector_port': collector_port, |
| 'src_address': src_address, |
| 'vrf_id': vrf_id, |
| 'path_mtu': path_mtu, |
| 'template_interval': template_interval, |
| 'udp_checksum': udp_checksum, |
| }) |
| |
| def mfib_signal_dump(self): |
| return self.api(self.papi.mfib_signal_dump, {}) |
| |
| def ip_mroute_dump(self, table_id, is_ip6=False): |
| return self.api(self.papi.ip_mroute_dump, |
| {'table': { |
| 'table_id': table_id, |
| 'is_ip6': is_ip6 |
| }}) |
| |
| def vxlan_gpe_add_del_tunnel( |
| self, |
| src_addr, |
| dst_addr, |
| mcast_sw_if_index=0xFFFFFFFF, |
| is_add=1, |
| is_ipv6=0, |
| encap_vrf_id=0, |
| decap_vrf_id=0, |
| protocol=3, |
| vni=0): |
| """ |
| |
| :param local: |
| :param remote: |
| :param is_add: (Default value = 1) |
| :param is_ipv6: (Default value = 0) |
| :param encap_vrf_id: (Default value = 0) |
| :param decap_vrf_id: (Default value = 0) |
| :param mcast_sw_if_index: (Default value = 0xFFFFFFFF) |
| :param protocol: (Default value = 3) |
| :param vni: (Default value = 0) |
| |
| """ |
| return self.api(self.papi.vxlan_gpe_add_del_tunnel, |
| {'is_add': is_add, |
| 'is_ipv6': is_ipv6, |
| 'local': src_addr, |
| 'remote': dst_addr, |
| 'mcast_sw_if_index': mcast_sw_if_index, |
| 'encap_vrf_id': encap_vrf_id, |
| 'decap_vrf_id': decap_vrf_id, |
| 'protocol': protocol, |
| 'vni': vni}) |
| |
| def vxlan_gbp_tunnel_dump(self, sw_if_index=0xffffffff): |
| return self.api(self.papi.vxlan_gbp_tunnel_dump, |
| {'sw_if_index': sw_if_index}) |
| |
| def pppoe_add_del_session( |
| self, |
| client_ip, |
| client_mac, |
| session_id=0, |
| is_add=1, |
| decap_vrf_id=0): |
| """ |
| |
| :param is_add: (Default value = 1) |
| :param is_ipv6: (Default value = 0) |
| :param client_ip: |
| :param session_id: (Default value = 0) |
| :param client_mac: |
| :param decap_vrf_id: (Default value = 0) |
| |
| """ |
| return self.api(self.papi.pppoe_add_del_session, |
| {'is_add': is_add, |
| 'session_id': session_id, |
| 'client_ip': client_ip, |
| 'decap_vrf_id': decap_vrf_id, |
| 'client_mac': client_mac}) |
| |
| def sr_mpls_policy_add(self, bsid, weight, type, segments): |
| return self.api(self.papi.sr_mpls_policy_add, |
| {'bsid': bsid, |
| 'weight': weight, |
| 'is_spray': type, |
| 'n_segments': len(segments), |
| 'segments': segments}) |
| |
| def sr_mpls_policy_del(self, bsid): |
| return self.api(self.papi.sr_mpls_policy_del, |
| {'bsid': bsid}) |
| |
| def bier_table_add_del(self, |
| bti, |
| mpls_label, |
| is_add=1): |
| """ BIER Table add/del """ |
| return self.api( |
| self.papi.bier_table_add_del, |
| {'bt_tbl_id': {"bt_set": bti.set_id, |
| "bt_sub_domain": bti.sub_domain_id, |
| "bt_hdr_len_id": bti.hdr_len_id}, |
| 'bt_label': mpls_label, |
| 'bt_is_add': is_add}) |
| |
| def bier_table_dump(self): |
| return self.api(self.papi.bier_table_dump, {}) |
| |
| def bier_route_add_del(self, |
| bti, |
| bp, |
| paths, |
| is_add=1, |
| is_replace=0): |
| """ BIER Route add/del """ |
| return self.api( |
| self.papi.bier_route_add_del, |
| { |
| 'br_route': { |
| 'br_tbl_id': {"bt_set": bti.set_id, |
| "bt_sub_domain": bti.sub_domain_id, |
| "bt_hdr_len_id": bti.hdr_len_id}, |
| 'br_bp': bp, |
| 'br_n_paths': len(paths), |
| 'br_paths': paths, |
| }, |
| 'br_is_add': is_add, |
| 'br_is_replace': is_replace |
| }) |
| |
| def bier_route_dump(self, bti): |
| return self.api( |
| self.papi.bier_route_dump, |
| {'br_tbl_id': {"bt_set": bti.set_id, |
| "bt_sub_domain": bti.sub_domain_id, |
| "bt_hdr_len_id": bti.hdr_len_id}}) |
| |
| def bier_imp_add(self, |
| bti, |
| src, |
| ibytes, |
| is_add=1): |
| """ BIER Imposition Add """ |
| return self.api( |
| self.papi.bier_imp_add, |
| {'bi_tbl_id': {"bt_set": bti.set_id, |
| "bt_sub_domain": bti.sub_domain_id, |
| "bt_hdr_len_id": bti.hdr_len_id}, |
| 'bi_src': src, |
| 'bi_n_bytes': len(ibytes), |
| 'bi_bytes': ibytes}) |
| |
| def bier_imp_del(self, bi_index): |
| """ BIER Imposition del """ |
| return self.api( |
| self.papi.bier_imp_del, |
| {'bi_index': bi_index}) |
| |
| def bier_imp_dump(self): |
| return self.api(self.papi.bier_imp_dump, {}) |
| |
| def bier_disp_table_add_del(self, |
| bdti, |
| is_add=1): |
| """ BIER Disposition Table add/del """ |
| return self.api( |
| self.papi.bier_disp_table_add_del, |
| {'bdt_tbl_id': bdti, |
| 'bdt_is_add': is_add}) |
| |
| def bier_disp_table_dump(self): |
| return self.api(self.papi.bier_disp_table_dump, {}) |
| |
| def bier_disp_entry_add_del(self, |
| bdti, |
| bp, |
| payload_proto, |
| next_hop_afi, |
| next_hop, |
| next_hop_tbl_id=0, |
| next_hop_rpf_id=~0, |
| next_hop_is_ip4=1, |
| is_add=1): |
| """ BIER Route add/del """ |
| lstack = [] |
| while (len(lstack) < 16): |
| lstack.append({}) |
| return self.api( |
| self.papi.bier_disp_entry_add_del, |
| {'bde_tbl_id': bdti, |
| 'bde_bp': bp, |
| 'bde_payload_proto': payload_proto, |
| 'bde_n_paths': 1, |
| 'bde_paths': [{'table_id': next_hop_tbl_id, |
| 'rpf_id': next_hop_rpf_id, |
| 'n_labels': 0, |
| 'label_stack': lstack}], |
| 'bde_is_add': is_add}) |
| |
| def bier_disp_entry_dump(self, bdti): |
| return self.api( |
| self.papi.bier_disp_entry_dump, |
| {'bde_tbl_id': bdti}) |
| |
| def ipsec_spd_add_del(self, spd_id, is_add=1): |
| """ SPD add/del - Wrapper to add or del ipsec SPD |
| Sample CLI : 'ipsec spd add 1' |
| |
| :param spd_id - SPD ID to be created in the vpp . mandatory |
| :param is_add - create (1) or delete(0) SPD (Default 1 - add) . |
| optional |
| :returns: reply from the API |
| """ |
| return self.api( |
| self.papi.ipsec_spd_add_del, { |
| 'spd_id': spd_id, 'is_add': is_add}) |
| |
| def ipsec_spds_dump(self): |
| return self.api(self.papi.ipsec_spds_dump, {}) |
| |
| def ipsec_interface_add_del_spd(self, spd_id, sw_if_index, is_add=1): |
| """ IPSEC interface SPD add/del - \ |
| Wrapper to associate/disassociate SPD to interface in VPP |
| Sample CLI : 'set interface ipsec spd GigabitEthernet0/6/0 1' |
| |
| :param spd_id - SPD ID to associate with the interface . mandatory |
| :param sw_if_index - Interface Index which needs to ipsec \ |
| association mandatory |
| :param is_add - add(1) or del(0) association with interface \ |
| (Default 1 - add) . optional |
| :returns: reply from the API |
| """ |
| return self.api( |
| self.papi.ipsec_interface_add_del_spd, |
| {'spd_id': spd_id, 'sw_if_index': sw_if_index, 'is_add': is_add}) |
| |
| def ipsec_spd_interface_dump(self, spd_index=None): |
| return self.api(self.papi.ipsec_spd_interface_dump, |
| {'spd_index': spd_index if spd_index else 0, |
| 'spd_index_valid': 1 if spd_index else 0}) |
| |
| def ipsec_spd_entry_add_del(self, |
| spd_id, |
| sa_id, |
| local_address_start, |
| local_address_stop, |
| remote_address_start, |
| remote_address_stop, |
| local_port_start=0, |
| local_port_stop=65535, |
| remote_port_start=0, |
| remote_port_stop=65535, |
| protocol=0, |
| policy=0, |
| priority=100, |
| is_outbound=1, |
| is_add=1, |
| is_ipv6=0, |
| is_ip_any=0): |
| """ IPSEC policy SPD add/del - |
| Wrapper to configure ipsec SPD policy entries in VPP |
| :param spd_id: SPD ID for the policy |
| :param local_address_start: local-ip-range start address |
| :param local_address_stop : local-ip-range stop address |
| :param remote_address_start: remote-ip-range start address |
| :param remote_address_stop : remote-ip-range stop address |
| :param local_port_start: (Default value = 0) |
| :param local_port_stop: (Default value = 65535) |
| :param remote_port_start: (Default value = 0) |
| :param remote_port_stop: (Default value = 65535) |
| :param protocol: Any(0), AH(51) & ESP(50) protocol (Default value = 0) |
| :param sa_id: Security Association ID for mapping it to SPD |
| :param policy: bypass(0), discard(1), resolve(2) or protect(3) action |
| (Default value = 0) |
| :param priority: value for the spd action (Default value = 100) |
| :param is_outbound: flag for inbound(0) or outbound(1) |
| (Default value = 1) |
| :param is_add: (Default value = 1) |
| """ |
| return self.api( |
| self.papi.ipsec_spd_entry_add_del, |
| { |
| 'is_add': is_add, |
| 'entry': |
| { |
| 'spd_id': spd_id, |
| 'sa_id': sa_id, |
| 'local_address_start': local_address_start, |
| 'local_address_stop': local_address_stop, |
| 'remote_address_start': remote_address_start, |
| 'remote_address_stop': remote_address_stop, |
| 'local_port_start': local_port_start, |
| 'local_port_stop': local_port_stop, |
| 'remote_port_start': remote_port_start, |
| 'remote_port_stop': remote_port_stop, |
| 'protocol': protocol, |
| 'policy': policy, |
| 'priority': priority, |
| 'is_outbound': is_outbound, |
| } |
| }) |
| |
| def ipsec_spd_dump(self, spd_id, sa_id=0xffffffff): |
| return self.api(self.papi.ipsec_spd_dump, |
| {'spd_id': spd_id, |
| 'sa_id': sa_id}) |
| |
| def ipsec_tunnel_if_add_del(self, local_ip, remote_ip, local_spi, |
| remote_spi, crypto_alg, local_crypto_key, |
| remote_crypto_key, integ_alg, local_integ_key, |
| remote_integ_key, is_add=1, esn=0, salt=0, |
| anti_replay=1, renumber=0, |
| udp_encap=0, show_instance=0xffffffff): |
| return self.api( |
| self.papi.ipsec_tunnel_if_add_del, |
| { |
| 'local_ip': local_ip, |
| 'remote_ip': remote_ip, |
| 'local_spi': local_spi, |
| 'remote_spi': remote_spi, |
| 'crypto_alg': crypto_alg, |
| 'local_crypto_key_len': len(local_crypto_key), |
| 'local_crypto_key': local_crypto_key, |
| 'remote_crypto_key_len': len(remote_crypto_key), |
| 'remote_crypto_key': remote_crypto_key, |
| 'integ_alg': integ_alg, |
| 'local_integ_key_len': len(local_integ_key), |
| 'local_integ_key': local_integ_key, |
| 'remote_integ_key_len': len(remote_integ_key), |
| 'remote_integ_key': remote_integ_key, |
| 'is_add': is_add, |
| 'esn': esn, |
| 'anti_replay': anti_replay, |
| 'renumber': renumber, |
| 'show_instance': show_instance, |
| 'udp_encap': udp_encap, |
| 'salt': salt |
| }) |
| |
| def ipsec_select_backend(self, protocol, index): |
| return self.api(self.papi.ipsec_select_backend, |
| {'protocol': protocol, 'index': index}) |
| |
| def ipsec_backend_dump(self): |
| return self.api(self.papi.ipsec_backend_dump, {}) |
| |
| def punt_socket_register(self, reg, pathname, |
| header_version=1): |
| """ Register punt socket """ |
| return self.api(self.papi.punt_socket_register, |
| {'header_version': header_version, |
| 'punt': reg, |
| 'pathname': pathname}) |
| |
| def punt_socket_deregister(self, reg): |
| """ Unregister punt socket """ |
| return self.api(self.papi.punt_socket_deregister, |
| {'punt': reg}) |
| |
| def gbp_endpoint_add(self, sw_if_index, ips, mac, sclass, flags, |
| tun_src, tun_dst): |
| """ GBP endpoint Add """ |
| return self.api(self.papi.gbp_endpoint_add, |
| {'endpoint': { |
| 'sw_if_index': sw_if_index, |
| 'ips': ips, |
| 'n_ips': len(ips), |
| 'mac': mac, |
| 'sclass': sclass, |
| 'flags': flags, |
| 'tun': { |
| 'src': tun_src, |
| 'dst': tun_dst, |
| }}}) |
| |
| def gbp_endpoint_del(self, handle): |
| """ GBP endpoint Del """ |
| return self.api(self.papi.gbp_endpoint_del, |
| {'handle': handle}) |
| |
| def gbp_endpoint_dump(self): |
| """ GBP endpoint Dump """ |
| return self.api(self.papi.gbp_endpoint_dump, {}) |
| |
| def gbp_endpoint_group_add(self, vnid, sclass, bd, |
| rd, uplink_sw_if_index, |
| retention): |
| """ GBP endpoint group Add """ |
| return self.api(self.papi.gbp_endpoint_group_add, |
| {'epg': |
| { |
| 'uplink_sw_if_index': uplink_sw_if_index, |
| 'bd_id': bd, |
| 'rd_id': rd, |
| 'vnid': vnid, |
| 'sclass': sclass, |
| 'retention': retention |
| }}) |
| |
| def gbp_endpoint_group_del(self, sclass): |
| """ GBP endpoint group Del """ |
| return self.api(self.papi.gbp_endpoint_group_del, |
| {'sclass': sclass}) |
| |
| def gbp_bridge_domain_add(self, bd_id, rd_id, flags, |
| bvi_sw_if_index, |
| uu_fwd_sw_if_index, |
| bm_flood_sw_if_index): |
| """ GBP bridge-domain Add """ |
| return self.api(self.papi.gbp_bridge_domain_add, |
| {'bd': |
| { |
| 'flags': flags, |
| 'bvi_sw_if_index': bvi_sw_if_index, |
| 'uu_fwd_sw_if_index': uu_fwd_sw_if_index, |
| 'bm_flood_sw_if_index': bm_flood_sw_if_index, |
| 'bd_id': bd_id, |
| 'rd_id': rd_id |
| }}) |
| |
| def gbp_bridge_domain_del(self, bd_id): |
| """ GBP bridge-domain Del """ |
| return self.api(self.papi.gbp_bridge_domain_del, |
| {'bd_id': bd_id}) |
| |
| def gbp_route_domain_add(self, rd_id, |
| scope, |
| ip4_table_id, |
| ip6_table_id, |
| ip4_uu_sw_if_index, |
| ip6_uu_sw_if_index): |
| """ GBP route-domain Add """ |
| return self.api(self.papi.gbp_route_domain_add, |
| {'rd': |
| { |
| 'scope': scope, |
| 'ip4_table_id': ip4_table_id, |
| 'ip6_table_id': ip6_table_id, |
| 'ip4_uu_sw_if_index': ip4_uu_sw_if_index, |
| 'ip6_uu_sw_if_index': ip6_uu_sw_if_index, |
| 'rd_id': rd_id |
| }}) |
| |
| def gbp_route_domain_del(self, rd_id): |
| """ GBP route-domain Del """ |
| return self.api(self.papi.gbp_route_domain_del, |
| {'rd_id': rd_id}) |
| |
| def gbp_recirc_add_del(self, is_add, sw_if_index, sclass, is_ext): |
| """ GBP recirc Add/Del """ |
| return self.api(self.papi.gbp_recirc_add_del, |
| {'is_add': is_add, |
| 'recirc': { |
| 'is_ext': is_ext, |
| 'sw_if_index': sw_if_index, |
| 'sclass': sclass}}) |
| |
| def gbp_recirc_dump(self): |
| """ GBP recirc Dump """ |
| return self.api(self.papi.gbp_recirc_dump, {}) |
| |
| def gbp_ext_itf_add_del(self, is_add, sw_if_index, bd_id, rd_id, flags): |
| """ GBP recirc Add/Del """ |
| return self.api(self.papi.gbp_ext_itf_add_del, |
| {'is_add': is_add, |
| 'ext_itf': { |
| 'sw_if_index': sw_if_index, |
| 'bd_id': bd_id, |
| 'rd_id': rd_id, |
| 'flags': flags}}) |
| |
| def gbp_ext_itf_dump(self): |
| """ GBP recirc Dump """ |
| return self.api(self.papi.gbp_ext_itf_dump, {}) |
| |
| def gbp_subnet_add_del(self, is_add, rd_id, |
| prefix, type, |
| sw_if_index=0xffffffff, |
| sclass=0xffff): |
| """ GBP Subnet Add/Del """ |
| return self.api(self.papi.gbp_subnet_add_del, |
| {'is_add': is_add, |
| 'subnet': { |
| 'type': type, |
| 'sw_if_index': sw_if_index, |
| 'sclass': sclass, |
| 'prefix': prefix, |
| 'rd_id': rd_id}}) |
| |
| def gbp_subnet_dump(self): |
| """ GBP Subnet Dump """ |
| return self.api(self.papi.gbp_subnet_dump, {}) |
| |
| def gbp_contract_dump(self): |
| """ GBP contract Dump """ |
| return self.api(self.papi.gbp_contract_dump, {}) |
| |
| def gbp_vxlan_tunnel_add(self, vni, bd_rd_id, mode, src): |
| """ GBP VXLAN tunnel add """ |
| return self.api(self.papi.gbp_vxlan_tunnel_add, |
| { |
| 'tunnel': { |
| 'vni': vni, |
| 'mode': mode, |
| 'bd_rd_id': bd_rd_id, |
| 'src': src |
| } |
| }) |
| |
| def gbp_vxlan_tunnel_del(self, vni): |
| """ GBP VXLAN tunnel del """ |
| return self.api(self.papi.gbp_vxlan_tunnel_del, |
| { |
| 'vni': vni, |
| }) |
| |
| def gbp_vxlan_tunnel_dump(self): |
| """ GBP VXLAN tunnel add/del """ |
| return self.api(self.papi.gbp_vxlan_tunnel_dump, {}) |
| |
| def igmp_enable_disable(self, sw_if_index, enable, host): |
| """ Enable/disable IGMP on a given interface """ |
| return self.api(self.papi.igmp_enable_disable, |
| {'enable': enable, |
| 'mode': host, |
| 'sw_if_index': sw_if_index}) |
| |
| def igmp_proxy_device_add_del(self, vrf_id, sw_if_index, add): |
| """ Add/del IGMP proxy device """ |
| return self.api(self.papi.igmp_proxy_device_add_del, |
| {'vrf_id': vrf_id, 'sw_if_index': sw_if_index, |
| 'add': add}) |
| |
| def igmp_proxy_device_add_del_interface(self, vrf_id, sw_if_index, add): |
| """ Add/del interface to/from IGMP proxy device """ |
| return self.api(self.papi.igmp_proxy_device_add_del_interface, |
| {'vrf_id': vrf_id, 'sw_if_index': sw_if_index, |
| 'add': add}) |
| |
| def igmp_listen(self, filter, sw_if_index, saddrs, gaddr): |
| """ Listen for new (S,G) on specified interface |
| |
| :param enable: add/del |
| :param sw_if_index: interface sw index |
| :param saddr: source ip4 addr |
| :param gaddr: group ip4 addr |
| """ |
| return self.api(self.papi.igmp_listen, |
| { |
| 'group': |
| { |
| 'filter': filter, |
| 'sw_if_index': sw_if_index, |
| 'n_srcs': len(saddrs), |
| 'saddrs': saddrs, |
| 'gaddr': gaddr |
| } |
| }) |
| |
| def igmp_clear_interface(self, sw_if_index): |
| """ Remove all (S,G)s from specified interface |
| doesn't send IGMP report! |
| """ |
| return self.api( |
| self.papi.igmp_clear_interface, { |
| 'sw_if_index': sw_if_index}) |
| |
| def want_igmp_events(self, enable=1): |
| return self.api(self.papi.want_igmp_events, {'enable': enable, |
| 'pid': os.getpid()}) |