| #!/usr/bin/env python3 |
| |
| import unittest |
| |
| from framework import tag_fixme_vpp_workers |
| from framework import VppTestCase, VppTestRunner |
| from vpp_ip import DpoProto |
| from vpp_ip_route import ( |
| VppIpMRoute, |
| VppMRoutePath, |
| VppMFibSignal, |
| VppIpTable, |
| FibPathProto, |
| FibPathType, |
| ) |
| from vpp_gre_interface import VppGreInterface |
| from vpp_papi import VppEnum |
| |
| from scapy.packet import Raw |
| from scapy.layers.l2 import Ether, GRE |
| from scapy.layers.inet import IP, UDP, getmacbyip, ICMP |
| from scapy.layers.inet6 import IPv6, getmacbyip6 |
| |
| # |
| # The number of packets sent is set to 91 so that when we replicate more than 3 |
| # times, which we do for some entries, we will generate more than 256 packets |
| # to the next node in the VLIB graph. Thus we are testing the code's |
| # correctness handling this over-flow. |
| # It's also an odd number so we hit any single loops. |
| # |
| N_PKTS_IN_STREAM = 91 |
| |
| |
| class TestMFIB(VppTestCase): |
| """MFIB Test Case""" |
| |
| @classmethod |
| def setUpClass(cls): |
| super(TestMFIB, cls).setUpClass() |
| |
| @classmethod |
| def tearDownClass(cls): |
| super(TestMFIB, cls).tearDownClass() |
| |
| def setUp(self): |
| super(TestMFIB, self).setUp() |
| |
| def test_mfib(self): |
| """MFIB Unit Tests""" |
| error = self.vapi.cli("test mfib") |
| |
| if error: |
| self.logger.critical(error) |
| self.assertNotIn("Failed", error) |
| |
| |
| @tag_fixme_vpp_workers |
| class TestIPMcast(VppTestCase): |
| """IP Multicast Test Case""" |
| |
| @classmethod |
| def setUpClass(cls): |
| super(TestIPMcast, cls).setUpClass() |
| |
| @classmethod |
| def tearDownClass(cls): |
| super(TestIPMcast, cls).tearDownClass() |
| |
| def setUp(self): |
| super(TestIPMcast, self).setUp() |
| |
| # create 8 pg interfaces |
| self.create_pg_interfaces(range(9)) |
| |
| # setup interfaces |
| for i in self.pg_interfaces[:8]: |
| i.admin_up() |
| i.config_ip4() |
| i.config_ip6() |
| i.resolve_arp() |
| i.resolve_ndp() |
| |
| # one more in a vrf |
| tbl4 = VppIpTable(self, 10) |
| tbl4.add_vpp_config() |
| self.pg8.set_table_ip4(10) |
| self.pg8.config_ip4() |
| |
| tbl6 = VppIpTable(self, 10, is_ip6=1) |
| tbl6.add_vpp_config() |
| self.pg8.set_table_ip6(10) |
| self.pg8.config_ip6() |
| |
| def tearDown(self): |
| for i in self.pg_interfaces: |
| i.unconfig_ip4() |
| i.unconfig_ip6() |
| i.admin_down() |
| |
| self.pg8.set_table_ip4(0) |
| self.pg8.set_table_ip6(0) |
| super(TestIPMcast, self).tearDown() |
| |
| def create_stream_ip4(self, src_if, src_ip, dst_ip, payload_size=0): |
| pkts = [] |
| # default to small packet sizes |
| p = ( |
| Ether(dst=getmacbyip(dst_ip), src=src_if.remote_mac) |
| / IP(src=src_ip, dst=dst_ip) |
| / UDP(sport=1234, dport=1234) |
| ) |
| if not payload_size: |
| payload_size = 64 - len(p) |
| p = p / Raw(b"\xa5" * payload_size) |
| |
| for i in range(0, N_PKTS_IN_STREAM): |
| pkts.append(p) |
| return pkts |
| |
| def create_stream_ip6(self, src_if, src_ip, dst_ip): |
| pkts = [] |
| for i in range(0, N_PKTS_IN_STREAM): |
| info = self.create_packet_info(src_if, src_if) |
| payload = self.info_to_payload(info) |
| p = ( |
| Ether(dst=getmacbyip6(dst_ip), src=src_if.remote_mac) |
| / IPv6(src=src_ip, dst=dst_ip) |
| / UDP(sport=1234, dport=1234) |
| / Raw(payload) |
| ) |
| info.data = p.copy() |
| pkts.append(p) |
| return pkts |
| |
| def verify_filter(self, capture, sent): |
| if not len(capture) == len(sent): |
| # filter out any IPv6 RAs from the capture |
| for p in capture: |
| if p.haslayer(IPv6): |
| capture.remove(p) |
| return capture |
| |
| def verify_capture_ip4(self, rx_if, sent, dst_mac=None): |
| rxd = rx_if.get_capture(len(sent)) |
| |
| try: |
| capture = self.verify_filter(rxd, sent) |
| |
| self.assertEqual(len(capture), len(sent)) |
| |
| for i in range(len(capture)): |
| tx = sent[i] |
| rx = capture[i] |
| |
| eth = rx[Ether] |
| self.assertEqual(eth.type, 0x800) |
| |
| tx_ip = tx[IP] |
| rx_ip = rx[IP] |
| |
| if dst_mac is None: |
| dst_mac = getmacbyip(rx_ip.dst) |
| |
| # check the MAC address on the RX'd packet is correctly formed |
| self.assertEqual(eth.dst, dst_mac) |
| |
| self.assertEqual(rx_ip.src, tx_ip.src) |
| self.assertEqual(rx_ip.dst, tx_ip.dst) |
| # IP processing post pop has decremented the TTL |
| self.assertEqual(rx_ip.ttl + 1, tx_ip.ttl) |
| |
| except: |
| raise |
| |
| def verify_capture_ip6(self, rx_if, sent): |
| capture = rx_if.get_capture(len(sent)) |
| |
| self.assertEqual(len(capture), len(sent)) |
| |
| for i in range(len(capture)): |
| tx = sent[i] |
| rx = capture[i] |
| |
| eth = rx[Ether] |
| self.assertEqual(eth.type, 0x86DD) |
| |
| tx_ip = tx[IPv6] |
| rx_ip = rx[IPv6] |
| |
| # check the MAC address on the RX'd packet is correctly formed |
| self.assertEqual(eth.dst, getmacbyip6(rx_ip.dst)) |
| |
| self.assertEqual(rx_ip.src, tx_ip.src) |
| self.assertEqual(rx_ip.dst, tx_ip.dst) |
| # IP processing post pop has decremented the TTL |
| self.assertEqual(rx_ip.hlim + 1, tx_ip.hlim) |
| |
| def test_ip_mcast(self): |
| """IP Multicast Replication""" |
| |
| MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t |
| MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t |
| |
| # |
| # a stream that matches the default route. gets dropped. |
| # |
| self.vapi.cli("clear trace") |
| self.vapi.cli("packet mac-filter pg0 on") |
| self.vapi.cli("packet mac-filter pg1 on") |
| self.vapi.cli("packet mac-filter pg2 on") |
| self.vapi.cli("packet mac-filter pg4 on") |
| self.vapi.cli("packet mac-filter pg5 on") |
| self.vapi.cli("packet mac-filter pg6 on") |
| self.vapi.cli("packet mac-filter pg7 on") |
| |
| tx = self.create_stream_ip4(self.pg0, "1.1.1.1", "232.1.1.1") |
| self.pg0.add_stream(tx) |
| |
| self.pg_enable_capture(self.pg_interfaces) |
| self.pg_start() |
| |
| self.pg0.assert_nothing_captured( |
| remark="IP multicast packets forwarded on default route" |
| ) |
| count = self.statistics.get_err_counter( |
| "/err/ip4-input/Multicast RPF check failed" |
| ) |
| self.assertEqual(count, len(tx)) |
| |
| # |
| # A (*,G). |
| # one accepting interface, pg0, 7 forwarding interfaces |
| # many forwarding interfaces test the case where the replicate DPO |
| # needs to use extra cache lines for the buckets. |
| # |
| route_232_1_1_1 = VppIpMRoute( |
| self, |
| "0.0.0.0", |
| "232.1.1.1", |
| 32, |
| MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, |
| [ |
| VppMRoutePath( |
| self.pg0.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT |
| ), |
| VppMRoutePath( |
| self.pg1.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD |
| ), |
| VppMRoutePath( |
| self.pg2.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD |
| ), |
| VppMRoutePath( |
| self.pg3.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD |
| ), |
| VppMRoutePath( |
| self.pg4.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD |
| ), |
| VppMRoutePath( |
| self.pg5.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD |
| ), |
| VppMRoutePath( |
| self.pg6.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD |
| ), |
| VppMRoutePath( |
| self.pg7.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD |
| ), |
| ], |
| ) |
| route_232_1_1_1.add_vpp_config() |
| |
| # |
| # An (S,G). |
| # one accepting interface, pg0, 2 forwarding interfaces |
| # |
| route_1_1_1_1_232_1_1_1 = VppIpMRoute( |
| self, |
| "1.1.1.1", |
| "232.1.1.1", |
| 27, # any grp-len is ok when src is set |
| MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, |
| [ |
| VppMRoutePath( |
| self.pg0.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT |
| ), |
| VppMRoutePath( |
| self.pg1.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD |
| ), |
| VppMRoutePath( |
| self.pg2.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD |
| ), |
| ], |
| ) |
| route_1_1_1_1_232_1_1_1.add_vpp_config() |
| |
| # |
| # An (S,G). |
| # one accepting interface, pg0, 2 forwarding interfaces |
| # that use unicast next-hops |
| # |
| route_1_1_1_1_232_1_1_2 = VppIpMRoute( |
| self, |
| "1.1.1.1", |
| "232.1.1.2", |
| 64, |
| MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, |
| [ |
| VppMRoutePath( |
| self.pg0.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT |
| ), |
| VppMRoutePath( |
| self.pg1.sw_if_index, |
| MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, |
| nh=self.pg1.remote_ip4, |
| ), |
| VppMRoutePath( |
| self.pg2.sw_if_index, |
| MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, |
| nh=self.pg2.remote_ip4, |
| ), |
| ], |
| ) |
| route_1_1_1_1_232_1_1_2.add_vpp_config() |
| |
| # |
| # An (*,G/m). |
| # one accepting interface, pg0, 1 forwarding interfaces |
| # |
| route_232 = VppIpMRoute( |
| self, |
| "0.0.0.0", |
| "232.0.0.0", |
| 8, |
| MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, |
| [ |
| VppMRoutePath( |
| self.pg0.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT |
| ), |
| VppMRoutePath( |
| self.pg1.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD |
| ), |
| ], |
| ) |
| route_232.add_vpp_config() |
| |
| # |
| # a stream that matches the route for (1.1.1.1,232.1.1.1) |
| # small packets |
| # |
| self.vapi.cli("clear trace") |
| tx = self.create_stream_ip4(self.pg0, "1.1.1.1", "232.1.1.1") |
| self.pg0.add_stream(tx) |
| |
| self.pg_enable_capture(self.pg_interfaces) |
| self.pg_start() |
| |
| self.assertEqual(route_1_1_1_1_232_1_1_1.get_stats()["packets"], len(tx)) |
| |
| # We expect replications on Pg1->7 |
| self.verify_capture_ip4(self.pg1, tx) |
| self.verify_capture_ip4(self.pg2, tx) |
| |
| # no replications on Pg0 |
| self.pg0.assert_nothing_captured(remark="IP multicast packets forwarded on PG0") |
| self.pg3.assert_nothing_captured(remark="IP multicast packets forwarded on PG3") |
| |
| # |
| # a stream that matches the route for (1.1.1.1,232.1.1.1) |
| # large packets |
| # |
| self.vapi.cli("clear trace") |
| tx = self.create_stream_ip4(self.pg0, "1.1.1.1", "232.1.1.1", payload_size=1024) |
| self.pg0.add_stream(tx) |
| |
| self.pg_enable_capture(self.pg_interfaces) |
| self.pg_start() |
| |
| # We expect replications on Pg1->7 |
| self.verify_capture_ip4(self.pg1, tx) |
| self.verify_capture_ip4(self.pg2, tx) |
| |
| self.assertEqual(route_1_1_1_1_232_1_1_1.get_stats()["packets"], 2 * len(tx)) |
| |
| # no replications on Pg0 |
| self.pg0.assert_nothing_captured(remark="IP multicast packets forwarded on PG0") |
| self.pg3.assert_nothing_captured(remark="IP multicast packets forwarded on PG3") |
| |
| # |
| # a stream to the unicast next-hops |
| # |
| self.vapi.cli("clear trace") |
| tx = self.create_stream_ip4(self.pg0, "1.1.1.1", "232.1.1.2") |
| self.pg0.add_stream(tx) |
| |
| self.pg_enable_capture(self.pg_interfaces) |
| self.pg_start() |
| |
| # We expect replications on Pg1->7 |
| self.verify_capture_ip4(self.pg1, tx, dst_mac=self.pg1.remote_mac) |
| self.verify_capture_ip4(self.pg2, tx, dst_mac=self.pg2.remote_mac) |
| |
| # no replications on Pg0 nor pg3 |
| self.pg0.assert_nothing_captured(remark="IP multicast packets forwarded on PG0") |
| self.pg3.assert_nothing_captured(remark="IP multicast packets forwarded on PG3") |
| |
| # |
| # a stream that matches the route for (*,232.0.0.0/8) |
| # Send packets with the 9th bit set so we test the correct clearing |
| # of that bit in the mac rewrite |
| # |
| self.vapi.cli("clear trace") |
| tx = self.create_stream_ip4(self.pg0, "1.1.1.1", "232.255.255.255") |
| self.pg0.add_stream(tx) |
| |
| self.pg_enable_capture(self.pg_interfaces) |
| self.pg_start() |
| |
| # We expect replications on Pg1 only |
| self.verify_capture_ip4(self.pg1, tx) |
| self.assertEqual(route_232.get_stats()["packets"], len(tx)) |
| |
| # no replications on Pg0, Pg2 not Pg3 |
| self.pg0.assert_nothing_captured(remark="IP multicast packets forwarded on PG0") |
| self.pg2.assert_nothing_captured(remark="IP multicast packets forwarded on PG2") |
| self.pg3.assert_nothing_captured(remark="IP multicast packets forwarded on PG3") |
| |
| # |
| # a stream that matches the route for (*,232.1.1.1) |
| # |
| self.vapi.cli("clear trace") |
| tx = self.create_stream_ip4(self.pg0, "1.1.1.2", "232.1.1.1") |
| self.pg0.add_stream(tx) |
| |
| self.pg_enable_capture(self.pg_interfaces) |
| self.pg_start() |
| |
| # We expect replications on Pg1->7 |
| self.verify_capture_ip4(self.pg1, tx) |
| self.verify_capture_ip4(self.pg2, tx) |
| self.verify_capture_ip4(self.pg3, tx) |
| self.verify_capture_ip4(self.pg4, tx) |
| self.verify_capture_ip4(self.pg5, tx) |
| self.verify_capture_ip4(self.pg6, tx) |
| self.verify_capture_ip4(self.pg7, tx) |
| |
| # no replications on Pg0 |
| self.pg0.assert_nothing_captured(remark="IP multicast packets forwarded on PG0") |
| |
| self.vapi.cli("packet mac-filter pg0 off") |
| self.vapi.cli("packet mac-filter pg1 off") |
| self.vapi.cli("packet mac-filter pg2 off") |
| self.vapi.cli("packet mac-filter pg4 off") |
| self.vapi.cli("packet mac-filter pg5 off") |
| self.vapi.cli("packet mac-filter pg6 off") |
| self.vapi.cli("packet mac-filter pg7 off") |
| |
| def test_ip6_mcast(self): |
| """IPv6 Multicast Replication""" |
| |
| MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t |
| MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t |
| |
| self.vapi.cli("packet mac-filter pg0 on") |
| self.vapi.cli("packet mac-filter pg1 on") |
| self.vapi.cli("packet mac-filter pg2 on") |
| self.vapi.cli("packet mac-filter pg4 on") |
| self.vapi.cli("packet mac-filter pg5 on") |
| self.vapi.cli("packet mac-filter pg6 on") |
| self.vapi.cli("packet mac-filter pg7 on") |
| # |
| # a stream that matches the default route. gets dropped. |
| # |
| self.vapi.cli("clear trace") |
| tx = self.create_stream_ip6(self.pg0, "2001::1", "ff01::1") |
| self.pg0.add_stream(tx) |
| |
| self.pg_enable_capture(self.pg_interfaces) |
| self.pg_start() |
| |
| self.pg0.assert_nothing_captured( |
| remark="IPv6 multicast packets forwarded on default route" |
| ) |
| |
| # |
| # A (*,G). |
| # one accepting interface, pg0, 3 forwarding interfaces |
| # |
| route_ff01_1 = VppIpMRoute( |
| self, |
| "::", |
| "ff01::1", |
| 128, |
| MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, |
| [ |
| VppMRoutePath( |
| self.pg0.sw_if_index, |
| MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT, |
| proto=FibPathProto.FIB_PATH_NH_PROTO_IP6, |
| ), |
| VppMRoutePath( |
| self.pg1.sw_if_index, |
| MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, |
| proto=FibPathProto.FIB_PATH_NH_PROTO_IP6, |
| ), |
| VppMRoutePath( |
| self.pg2.sw_if_index, |
| MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, |
| proto=FibPathProto.FIB_PATH_NH_PROTO_IP6, |
| ), |
| VppMRoutePath( |
| self.pg3.sw_if_index, |
| MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, |
| proto=FibPathProto.FIB_PATH_NH_PROTO_IP6, |
| ), |
| ], |
| ) |
| route_ff01_1.add_vpp_config() |
| |
| # |
| # An (S,G). |
| # one accepting interface, pg0, 2 forwarding interfaces |
| # |
| route_2001_ff01_1 = VppIpMRoute( |
| self, |
| "2001::1", |
| "ff01::1", |
| 0, # any grp-len is ok when src is set |
| MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, |
| [ |
| VppMRoutePath( |
| self.pg0.sw_if_index, |
| MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT, |
| proto=FibPathProto.FIB_PATH_NH_PROTO_IP6, |
| ), |
| VppMRoutePath( |
| self.pg1.sw_if_index, |
| MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, |
| proto=FibPathProto.FIB_PATH_NH_PROTO_IP6, |
| ), |
| VppMRoutePath( |
| self.pg2.sw_if_index, |
| MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, |
| proto=FibPathProto.FIB_PATH_NH_PROTO_IP6, |
| ), |
| ], |
| ) |
| route_2001_ff01_1.add_vpp_config() |
| |
| # |
| # An (*,G/m). |
| # one accepting interface, pg0, 1 forwarding interface |
| # |
| route_ff01 = VppIpMRoute( |
| self, |
| "::", |
| "ff01::", |
| 16, |
| MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, |
| [ |
| VppMRoutePath( |
| self.pg0.sw_if_index, |
| MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT, |
| proto=FibPathProto.FIB_PATH_NH_PROTO_IP6, |
| ), |
| VppMRoutePath( |
| self.pg1.sw_if_index, |
| MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, |
| proto=FibPathProto.FIB_PATH_NH_PROTO_IP6, |
| ), |
| ], |
| ) |
| route_ff01.add_vpp_config() |
| |
| # |
| # a stream that matches the route for (*, ff01::/16) |
| # sent on the non-accepting interface |
| # |
| self.vapi.cli("clear trace") |
| tx = self.create_stream_ip6(self.pg1, "2002::1", "ff01:2::255") |
| self.send_and_assert_no_replies(self.pg1, tx, "RPF miss") |
| count = self.statistics.get_err_counter( |
| "/err/ip6-input/Multicast RPF check failed" |
| ) |
| self.assertEqual(count, 2 * len(tx)) |
| |
| # |
| # a stream that matches the route for (*, ff01::/16) |
| # sent on the accepting interface |
| # |
| self.vapi.cli("clear trace") |
| tx = self.create_stream_ip6(self.pg0, "2002::1", "ff01:2::255") |
| self.pg0.add_stream(tx) |
| |
| self.pg_enable_capture(self.pg_interfaces) |
| self.pg_start() |
| |
| # We expect replications on Pg1 |
| self.verify_capture_ip6(self.pg1, tx) |
| |
| # no replications on Pg0, Pg3 |
| self.pg0.assert_nothing_captured(remark="IP multicast packets forwarded on PG0") |
| self.pg2.assert_nothing_captured(remark="IP multicast packets forwarded on PG2") |
| self.pg3.assert_nothing_captured(remark="IP multicast packets forwarded on PG3") |
| |
| # |
| # Bounce the interface and it should still work |
| # |
| self.pg1.admin_down() |
| self.pg0.add_stream(tx) |
| self.pg_enable_capture(self.pg_interfaces) |
| self.pg_start() |
| self.pg1.assert_nothing_captured( |
| remark="IP multicast packets forwarded on down PG1" |
| ) |
| |
| self.pg1.admin_up() |
| self.pg0.add_stream(tx) |
| self.pg_enable_capture(self.pg_interfaces) |
| self.pg_start() |
| self.verify_capture_ip6(self.pg1, tx) |
| |
| # |
| # a stream that matches the route for (*,ff01::1) |
| # |
| self.vapi.cli("clear trace") |
| tx = self.create_stream_ip6(self.pg0, "2002::2", "ff01::1") |
| self.pg0.add_stream(tx) |
| |
| self.pg_enable_capture(self.pg_interfaces) |
| self.pg_start() |
| |
| # We expect replications on Pg1, 2, 3. |
| self.verify_capture_ip6(self.pg1, tx) |
| self.verify_capture_ip6(self.pg2, tx) |
| self.verify_capture_ip6(self.pg3, tx) |
| |
| # no replications on Pg0 |
| self.pg0.assert_nothing_captured( |
| remark="IPv6 multicast packets forwarded on PG0" |
| ) |
| |
| # |
| # a stream that matches the route for (2001::1, ff00::1) |
| # |
| self.vapi.cli("clear trace") |
| tx = self.create_stream_ip6(self.pg0, "2001::1", "ff01::1") |
| self.pg0.add_stream(tx) |
| |
| self.pg_enable_capture(self.pg_interfaces) |
| self.pg_start() |
| |
| # We expect replications on Pg1, 2, |
| self.verify_capture_ip6(self.pg1, tx) |
| self.verify_capture_ip6(self.pg2, tx) |
| |
| # no replications on Pg0, Pg3 |
| self.pg0.assert_nothing_captured(remark="IP multicast packets forwarded on PG0") |
| self.pg3.assert_nothing_captured(remark="IP multicast packets forwarded on PG3") |
| |
| self.vapi.cli("packet mac-filter pg0 off") |
| self.vapi.cli("packet mac-filter pg1 off") |
| self.vapi.cli("packet mac-filter pg2 off") |
| self.vapi.cli("packet mac-filter pg4 off") |
| self.vapi.cli("packet mac-filter pg5 off") |
| self.vapi.cli("packet mac-filter pg6 off") |
| self.vapi.cli("packet mac-filter pg7 off") |
| |
| def _mcast_connected_send_stream(self, dst_ip): |
| self.vapi.cli("clear trace") |
| tx = self.create_stream_ip4(self.pg0, self.pg0.remote_ip4, dst_ip) |
| self.pg0.add_stream(tx) |
| |
| self.pg_enable_capture(self.pg_interfaces) |
| self.pg_start() |
| |
| # We expect replications on Pg1. |
| self.verify_capture_ip4(self.pg1, tx) |
| |
| return tx |
| |
| def test_ip_mcast_connected(self): |
| """IP Multicast Connected Source check""" |
| |
| MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t |
| MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t |
| |
| # |
| # A (*,G). |
| # one accepting interface, pg0, 1 forwarding interfaces |
| # |
| route_232_1_1_1 = VppIpMRoute( |
| self, |
| "0.0.0.0", |
| "232.1.1.1", |
| 32, |
| MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, |
| [ |
| VppMRoutePath( |
| self.pg0.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT |
| ), |
| VppMRoutePath( |
| self.pg1.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD |
| ), |
| ], |
| ) |
| |
| route_232_1_1_1.add_vpp_config() |
| route_232_1_1_1.update_entry_flags( |
| MRouteEntryFlags.MFIB_API_ENTRY_FLAG_CONNECTED |
| ) |
| |
| # |
| # Now the (*,G) is present, send from connected source |
| # |
| tx = self._mcast_connected_send_stream("232.1.1.1") |
| |
| # |
| # Constrct a representation of the signal we expect on pg0 |
| # |
| signal_232_1_1_1_itf_0 = VppMFibSignal( |
| self, route_232_1_1_1, self.pg0.sw_if_index, tx[0] |
| ) |
| |
| # |
| # read the only expected signal |
| # |
| signals = self.vapi.mfib_signal_dump() |
| |
| self.assertEqual(1, len(signals)) |
| |
| signal_232_1_1_1_itf_0.compare(signals[0]) |
| |
| # |
| # reading the signal allows for the generation of another |
| # so send more packets and expect the next signal |
| # |
| tx = self._mcast_connected_send_stream("232.1.1.1") |
| |
| signals = self.vapi.mfib_signal_dump() |
| self.assertEqual(1, len(signals)) |
| signal_232_1_1_1_itf_0.compare(signals[0]) |
| |
| # |
| # A Second entry with connected check |
| # one accepting interface, pg0, 1 forwarding interfaces |
| # |
| route_232_1_1_2 = VppIpMRoute( |
| self, |
| "0.0.0.0", |
| "232.1.1.2", |
| 32, |
| MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, |
| [ |
| VppMRoutePath( |
| self.pg0.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT |
| ), |
| VppMRoutePath( |
| self.pg1.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD |
| ), |
| ], |
| ) |
| |
| route_232_1_1_2.add_vpp_config() |
| route_232_1_1_2.update_entry_flags( |
| MRouteEntryFlags.MFIB_API_ENTRY_FLAG_CONNECTED |
| ) |
| |
| # |
| # Send traffic to both entries. One read should net us two signals |
| # |
| signal_232_1_1_2_itf_0 = VppMFibSignal( |
| self, route_232_1_1_2, self.pg0.sw_if_index, tx[0] |
| ) |
| tx = self._mcast_connected_send_stream("232.1.1.1") |
| tx2 = self._mcast_connected_send_stream("232.1.1.2") |
| |
| # |
| # read the only expected signal |
| # |
| signals = self.vapi.mfib_signal_dump() |
| |
| self.assertEqual(2, len(signals)) |
| |
| signal_232_1_1_1_itf_0.compare(signals[1]) |
| signal_232_1_1_2_itf_0.compare(signals[0]) |
| |
| route_232_1_1_1.update_entry_flags(MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE) |
| route_232_1_1_2.update_entry_flags(MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE) |
| |
| def test_ip_mcast_signal(self): |
| """IP Multicast Signal""" |
| |
| MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t |
| MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t |
| |
| # |
| # A (*,G). |
| # one accepting interface, pg0, 1 forwarding interfaces |
| # |
| route_232_1_1_1 = VppIpMRoute( |
| self, |
| "0.0.0.0", |
| "232.1.1.1", |
| 32, |
| MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, |
| [ |
| VppMRoutePath( |
| self.pg0.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT |
| ), |
| VppMRoutePath( |
| self.pg1.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD |
| ), |
| ], |
| ) |
| |
| route_232_1_1_1.add_vpp_config() |
| |
| route_232_1_1_1.update_entry_flags(MRouteEntryFlags.MFIB_API_ENTRY_FLAG_SIGNAL) |
| |
| # |
| # Now the (*,G) is present, send from connected source |
| # |
| tx = self._mcast_connected_send_stream("232.1.1.1") |
| |
| # |
| # Constrct a representation of the signal we expect on pg0 |
| # |
| signal_232_1_1_1_itf_0 = VppMFibSignal( |
| self, route_232_1_1_1, self.pg0.sw_if_index, tx[0] |
| ) |
| |
| # |
| # read the only expected signal |
| # |
| signals = self.vapi.mfib_signal_dump() |
| |
| self.assertEqual(1, len(signals)) |
| |
| signal_232_1_1_1_itf_0.compare(signals[0]) |
| |
| # |
| # reading the signal allows for the generation of another |
| # so send more packets and expect the next signal |
| # |
| tx = self._mcast_connected_send_stream("232.1.1.1") |
| |
| signals = self.vapi.mfib_signal_dump() |
| self.assertEqual(1, len(signals)) |
| signal_232_1_1_1_itf_0.compare(signals[0]) |
| |
| # |
| # Set the negate-signal on the accepting interval - the signals |
| # should stop |
| # |
| route_232_1_1_1.update_path_flags( |
| self.pg0.sw_if_index, |
| ( |
| MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT |
| | MRouteItfFlags.MFIB_API_ITF_FLAG_NEGATE_SIGNAL |
| ), |
| ) |
| |
| self.vapi.cli("clear trace") |
| tx = self._mcast_connected_send_stream("232.1.1.1") |
| |
| signals = self.vapi.mfib_signal_dump() |
| self.assertEqual(0, len(signals)) |
| |
| # |
| # Clear the SIGNAL flag on the entry and the signals should |
| # come back since the interface is still NEGATE-SIGNAL |
| # |
| route_232_1_1_1.update_entry_flags(MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE) |
| |
| tx = self._mcast_connected_send_stream("232.1.1.1") |
| |
| signals = self.vapi.mfib_signal_dump() |
| self.assertEqual(1, len(signals)) |
| signal_232_1_1_1_itf_0.compare(signals[0]) |
| |
| # |
| # Lastly remove the NEGATE-SIGNAL from the interface and the |
| # signals should stop |
| # |
| route_232_1_1_1.update_path_flags( |
| self.pg0.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT |
| ) |
| |
| tx = self._mcast_connected_send_stream("232.1.1.1") |
| signals = self.vapi.mfib_signal_dump() |
| self.assertEqual(0, len(signals)) |
| |
| def test_ip_mcast_vrf(self): |
| """IP Multicast Replication in non-default table""" |
| |
| MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t |
| MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t |
| |
| # |
| # An (S,G). |
| # one accepting interface, pg0, 2 forwarding interfaces |
| # |
| route_1_1_1_1_232_1_1_1 = VppIpMRoute( |
| self, |
| "1.1.1.1", |
| "232.1.1.1", |
| 64, |
| MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, |
| [ |
| VppMRoutePath( |
| self.pg8.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT |
| ), |
| VppMRoutePath( |
| self.pg1.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD |
| ), |
| VppMRoutePath( |
| self.pg2.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD |
| ), |
| ], |
| table_id=10, |
| ) |
| route_1_1_1_1_232_1_1_1.add_vpp_config() |
| |
| # |
| # a stream that matches the route for (1.1.1.1,232.1.1.1) |
| # small packets |
| # |
| self.vapi.cli("clear trace") |
| tx = self.create_stream_ip4(self.pg8, "1.1.1.1", "232.1.1.1") |
| self.pg8.add_stream(tx) |
| |
| self.pg_enable_capture(self.pg_interfaces) |
| self.pg_start() |
| |
| # We expect replications on Pg1 & 2 |
| self.verify_capture_ip4(self.pg1, tx) |
| self.verify_capture_ip4(self.pg2, tx) |
| |
| # |
| # An (S,G). for for-us |
| # |
| route_0_0_0_0_224_0_0_5 = VppIpMRoute( |
| self, |
| "0.0.0.0", |
| "224.0.0.5", |
| 32, |
| MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, |
| [ |
| VppMRoutePath( |
| self.pg8.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT |
| ), |
| VppMRoutePath( |
| 0xFFFFFFFF, |
| MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, |
| type=FibPathType.FIB_PATH_TYPE_LOCAL, |
| ), |
| ], |
| table_id=10, |
| ) |
| route_0_0_0_0_224_0_0_5.add_vpp_config() |
| |
| # |
| # a stream that matches the route for (0.0.0.0, 224.0.0.5) |
| # small packets |
| # |
| self.vapi.cli("clear trace") |
| self.pg8.resolve_arp() |
| |
| # |
| # send a ping to mcast address from peer on pg8 |
| # expect a response |
| # |
| icmp_id = 0xB |
| icmp_seq = 5 |
| icmp_load = b"\x0a" * 18 |
| tx = ( |
| Ether(dst=getmacbyip("224.0.0.5"), src=self.pg8.remote_mac) |
| / IP(src=self.pg8.remote_ip4, dst="224.0.0.5") |
| / ICMP(id=icmp_id, seq=icmp_seq) |
| / Raw(load=icmp_load) |
| ) * 2 |
| |
| self.send_and_expect(self.pg8, tx, self.pg8) |
| |
| def test_ip_mcast_gre(self): |
| """IP Multicast Replication over GRE""" |
| |
| MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t |
| MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t |
| |
| gre_if_1 = VppGreInterface( |
| self, self.pg1.local_ip4, self.pg1.remote_ip4 |
| ).add_vpp_config() |
| gre_if_2 = VppGreInterface( |
| self, self.pg2.local_ip4, self.pg2.remote_ip4 |
| ).add_vpp_config() |
| gre_if_3 = VppGreInterface( |
| self, self.pg3.local_ip4, self.pg3.remote_ip4 |
| ).add_vpp_config() |
| |
| gre_if_1.admin_up() |
| gre_if_1.config_ip4() |
| gre_if_2.admin_up() |
| gre_if_2.config_ip4() |
| gre_if_3.admin_up() |
| gre_if_3.config_ip4() |
| |
| # |
| # An (S,G). |
| # one accepting interface, pg0, 2 forwarding interfaces |
| # |
| route_1_1_1_1_232_1_1_1 = VppIpMRoute( |
| self, |
| "1.1.1.1", |
| "232.2.2.2", |
| 64, |
| MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, |
| [ |
| VppMRoutePath( |
| gre_if_1.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT |
| ), |
| VppMRoutePath( |
| gre_if_2.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD |
| ), |
| VppMRoutePath( |
| gre_if_3.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD |
| ), |
| ], |
| ) |
| route_1_1_1_1_232_1_1_1.add_vpp_config() |
| |
| # |
| # a stream that matches the route for (1.1.1.1,232.2.2.2) |
| # small packets |
| # |
| tx = ( |
| Ether(dst=self.pg1.local_mac, src=self.pg1.remote_mac) |
| / IP(src=self.pg1.remote_ip4, dst=self.pg1.local_ip4) |
| / GRE() |
| / IP(src="1.1.1.1", dst="232.2.2.2") |
| / UDP(sport=1234, dport=1234) |
| / Raw(b"\a5" * 64) |
| ) * 63 |
| |
| self.vapi.cli("clear trace") |
| self.pg1.add_stream(tx) |
| |
| self.pg_enable_capture(self.pg_interfaces) |
| self.pg_start() |
| |
| # We expect replications on Pg2 & 3 |
| # check the encap headers are as expected based on the egress tunnel |
| rxs = self.pg2.get_capture(len(tx)) |
| for rx in rxs: |
| self.assertEqual(rx[IP].src, gre_if_2.t_src) |
| self.assertEqual(rx[IP].dst, gre_if_2.t_dst) |
| self.assert_packet_checksums_valid(rx) |
| |
| rxs = self.pg3.get_capture(len(tx)) |
| for rx in rxs: |
| self.assertEqual(rx[IP].src, gre_if_3.t_src) |
| self.assertEqual(rx[IP].dst, gre_if_3.t_dst) |
| self.assert_packet_checksums_valid(rx) |
| |
| def test_ip6_mcast_gre(self): |
| """IP6 Multicast Replication over GRE""" |
| |
| MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t |
| MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t |
| |
| gre_if_1 = VppGreInterface( |
| self, self.pg1.local_ip4, self.pg1.remote_ip4 |
| ).add_vpp_config() |
| gre_if_2 = VppGreInterface( |
| self, self.pg2.local_ip4, self.pg2.remote_ip4 |
| ).add_vpp_config() |
| gre_if_3 = VppGreInterface( |
| self, self.pg3.local_ip4, self.pg3.remote_ip4 |
| ).add_vpp_config() |
| |
| gre_if_1.admin_up() |
| gre_if_1.config_ip6() |
| gre_if_2.admin_up() |
| gre_if_2.config_ip6() |
| gre_if_3.admin_up() |
| gre_if_3.config_ip6() |
| |
| # |
| # An (S,G). |
| # one accepting interface, pg0, 2 forwarding interfaces |
| # |
| route_1_1_FF_1 = VppIpMRoute( |
| self, |
| "1::1", |
| "FF00::1", |
| 256, |
| MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, |
| [ |
| VppMRoutePath( |
| gre_if_1.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT |
| ), |
| VppMRoutePath( |
| gre_if_2.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD |
| ), |
| VppMRoutePath( |
| gre_if_3.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD |
| ), |
| ], |
| ) |
| route_1_1_FF_1.add_vpp_config() |
| |
| # |
| # a stream that matches the route for (1::1, FF::1) |
| # small packets |
| # |
| tx = ( |
| Ether(dst=self.pg1.local_mac, src=self.pg1.remote_mac) |
| / IP(src=self.pg1.remote_ip4, dst=self.pg1.local_ip4) |
| / GRE() |
| / IPv6(src="1::1", dst="FF00::1") |
| / UDP(sport=1234, dport=1234) |
| / Raw(b"\a5" * 64) |
| ) * 63 |
| |
| self.vapi.cli("clear trace") |
| self.pg1.add_stream(tx) |
| |
| self.pg_enable_capture(self.pg_interfaces) |
| self.pg_start() |
| |
| # We expect replications on Pg2 & 3 |
| # check the encap headers are as expected based on the egress tunnel |
| rxs = self.pg2.get_capture(len(tx)) |
| for rx in rxs: |
| self.assertEqual(rx[IP].src, gre_if_2.t_src) |
| self.assertEqual(rx[IP].dst, gre_if_2.t_dst) |
| self.assert_packet_checksums_valid(rx) |
| |
| rxs = self.pg3.get_capture(len(tx)) |
| for rx in rxs: |
| self.assertEqual(rx[IP].src, gre_if_3.t_src) |
| self.assertEqual(rx[IP].dst, gre_if_3.t_dst) |
| self.assert_packet_checksums_valid(rx) |
| |
| def test_ip6_mcast_vrf(self): |
| """IPv6 Multicast Replication in non-default table""" |
| |
| MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t |
| MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t |
| |
| # |
| # An (S,G). |
| # one accepting interface, pg0, 2 forwarding interfaces |
| # |
| route_2001_ff01_1 = VppIpMRoute( |
| self, |
| "2001::1", |
| "ff01::1", |
| 256, |
| MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, |
| [ |
| VppMRoutePath( |
| self.pg8.sw_if_index, |
| MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT, |
| proto=FibPathProto.FIB_PATH_NH_PROTO_IP6, |
| ), |
| VppMRoutePath( |
| self.pg1.sw_if_index, |
| MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, |
| proto=FibPathProto.FIB_PATH_NH_PROTO_IP6, |
| ), |
| VppMRoutePath( |
| self.pg2.sw_if_index, |
| MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, |
| proto=FibPathProto.FIB_PATH_NH_PROTO_IP6, |
| ), |
| ], |
| table_id=10, |
| ) |
| route_2001_ff01_1.add_vpp_config() |
| |
| # |
| # a stream that matches the route for (2001::1, ff00::1) |
| # |
| self.vapi.cli("clear trace") |
| tx = self.create_stream_ip6(self.pg8, "2001::1", "ff01::1") |
| self.pg8.add_stream(tx) |
| |
| self.pg_enable_capture(self.pg_interfaces) |
| self.pg_start() |
| |
| # We expect replications on Pg1, 2, |
| self.verify_capture_ip6(self.pg1, tx) |
| self.verify_capture_ip6(self.pg2, tx) |
| |
| def test_bidir(self): |
| """IP Multicast Bi-directional""" |
| |
| MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t |
| MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t |
| |
| # |
| # A (*,G). The set of accepting interfaces matching the forwarding |
| # |
| route_232_1_1_1 = VppIpMRoute( |
| self, |
| "0.0.0.0", |
| "232.1.1.1", |
| 32, |
| MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, |
| [ |
| VppMRoutePath( |
| self.pg0.sw_if_index, |
| MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT |
| | MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, |
| ), |
| VppMRoutePath( |
| self.pg1.sw_if_index, |
| MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT |
| | MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, |
| ), |
| VppMRoutePath( |
| self.pg2.sw_if_index, |
| MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT |
| | MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, |
| ), |
| VppMRoutePath( |
| self.pg3.sw_if_index, |
| MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT |
| | MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, |
| ), |
| ], |
| ) |
| route_232_1_1_1.add_vpp_config() |
| |
| tx = self.create_stream_ip4(self.pg0, "1.1.1.1", "232.1.1.1") |
| self.pg0.add_stream(tx) |
| |
| self.pg_enable_capture(self.pg_interfaces) |
| self.pg_start() |
| |
| # We expect replications on Pg1, 2, 3, but not on pg0 |
| self.verify_capture_ip4(self.pg1, tx) |
| self.verify_capture_ip4(self.pg2, tx) |
| self.verify_capture_ip4(self.pg3, tx) |
| self.pg0.assert_nothing_captured(remark="IP multicast packets forwarded on PG0") |
| |
| |
| if __name__ == "__main__": |
| unittest.main(testRunner=VppTestRunner) |