blob: 9c62c87e16d810c1a640c8ff19ae7fb102c7c51f [file] [log] [blame]
Klement Sekerab4d30532018-11-08 13:00:02 +01001import unittest
2
3from framework import VppTestCase, VppTestRunner
Neale Ranns17dcec02019-01-09 21:22:20 -08004from template_ipsec import TemplateIpsec, IPsecIPv4Params
5from vpp_papi import VppEnum
Klement Sekerab4d30532018-11-08 13:00:02 +01006
7
8class IpsecApiTestCase(VppTestCase):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +02009 """IPSec API tests"""
Klement Sekerab4d30532018-11-08 13:00:02 +010010
Paul Vinciguerra7f9b7f92019-03-12 19:23:27 -070011 @classmethod
12 def setUpClass(cls):
13 super(IpsecApiTestCase, cls).setUpClass()
14
15 @classmethod
16 def tearDownClass(cls):
17 super(IpsecApiTestCase, cls).tearDownClass()
18
Neale Ranns8e4a89b2019-01-23 08:16:17 -080019 def setUp(self):
20 super(IpsecApiTestCase, self).setUp()
21 self.create_pg_interfaces([0])
22 self.pg0.config_ip4()
23 self.pg0.admin_up()
24
Klement Sekerad9b0c6f2022-04-26 19:02:15 +020025 self.vpp_esp_protocol = VppEnum.vl_api_ipsec_proto_t.IPSEC_API_PROTO_ESP
26 self.vpp_ah_protocol = VppEnum.vl_api_ipsec_proto_t.IPSEC_API_PROTO_AH
Neale Ranns8e4a89b2019-01-23 08:16:17 -080027 self.ipv4_params = IPsecIPv4Params()
28
29 def tearDown(self):
30 self.pg0.unconfig_ip4()
31 self.pg0.admin_down()
32 super(IpsecApiTestCase, self).tearDown()
Klement Sekerab4d30532018-11-08 13:00:02 +010033
34 def test_backend_dump(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +020035 """backend dump"""
Klement Sekerab4d30532018-11-08 13:00:02 +010036 d = self.vapi.ipsec_backend_dump()
37 self.assert_equal(len(d), 2, "number of ipsec backends in dump")
Klement Sekerad9b0c6f2022-04-26 19:02:15 +020038 self.assert_equal(
39 d[0].protocol, self.vpp_ah_protocol, "ipsec protocol in dump entry"
40 )
Klement Sekerab4d30532018-11-08 13:00:02 +010041 self.assert_equal(d[0].index, 0, "index in dump entry")
42 self.assert_equal(d[0].active, 1, "active flag in dump entry")
Klement Sekerad9b0c6f2022-04-26 19:02:15 +020043 self.assert_equal(
44 d[1].protocol, self.vpp_esp_protocol, "ipsec protocol in dump entry"
45 )
Klement Sekerab4d30532018-11-08 13:00:02 +010046 self.assert_equal(d[1].index, 0, "index in dump entry")
47 self.assert_equal(d[1].active, 1, "active flag in dump entry")
48
49 def test_select_valid_backend(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +020050 """select valid backend"""
Neale Ranns8e4a89b2019-01-23 08:16:17 -080051 self.vapi.ipsec_select_backend(self.vpp_ah_protocol, 0)
52 self.vapi.ipsec_select_backend(self.vpp_esp_protocol, 0)
Klement Sekerab4d30532018-11-08 13:00:02 +010053
54 def test_select_invalid_backend(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +020055 """select invalid backend"""
Klement Sekerab4d30532018-11-08 13:00:02 +010056 with self.vapi.assert_negative_api_retval():
Neale Ranns8e4a89b2019-01-23 08:16:17 -080057 self.vapi.ipsec_select_backend(self.vpp_ah_protocol, 200)
Klement Sekerab4d30532018-11-08 13:00:02 +010058 with self.vapi.assert_negative_api_retval():
Neale Ranns8e4a89b2019-01-23 08:16:17 -080059 self.vapi.ipsec_select_backend(self.vpp_esp_protocol, 200)
Klement Sekerab4d30532018-11-08 13:00:02 +010060
61 def test_select_backend_in_use(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +020062 """attempt to change backend while sad configured"""
Neale Ranns8e4a89b2019-01-23 08:16:17 -080063 params = self.ipv4_params
Klement Sekerab4d30532018-11-08 13:00:02 +010064 addr_type = params.addr_type
65 is_ipv6 = params.is_ipv6
66 scapy_tun_sa_id = params.scapy_tun_sa_id
67 scapy_tun_spi = params.scapy_tun_spi
68 auth_algo_vpp_id = params.auth_algo_vpp_id
69 auth_key = params.auth_key
70 crypt_algo_vpp_id = params.crypt_algo_vpp_id
71 crypt_key = params.crypt_key
72
Neale Rannsabc56602020-04-01 09:45:23 +000073 self.vapi.ipsec_sad_entry_add_del(
74 is_add=1,
75 entry={
Klement Sekerad9b0c6f2022-04-26 19:02:15 +020076 "sad_id": scapy_tun_sa_id,
77 "spi": scapy_tun_spi,
78 "integrity_algorithm": auth_algo_vpp_id,
79 "integrity_key": {
80 "data": auth_key,
81 "length": len(auth_key),
Neale Rannsabc56602020-04-01 09:45:23 +000082 },
Klement Sekerad9b0c6f2022-04-26 19:02:15 +020083 "crypto_algorithm": crypt_algo_vpp_id,
84 "crypto_key": {
85 "data": crypt_key,
86 "length": len(crypt_key),
Neale Rannsabc56602020-04-01 09:45:23 +000087 },
Klement Sekerad9b0c6f2022-04-26 19:02:15 +020088 "protocol": self.vpp_ah_protocol,
89 "tunnel_src": self.pg0.local_addr[addr_type],
90 "tunnel_dst": self.pg0.remote_addr[addr_type],
91 },
92 )
Klement Sekerab4d30532018-11-08 13:00:02 +010093 with self.vapi.assert_negative_api_retval():
Klement Sekerad9b0c6f2022-04-26 19:02:15 +020094 self.vapi.ipsec_select_backend(protocol=self.vpp_ah_protocol, index=0)
Klement Sekerab4d30532018-11-08 13:00:02 +010095
Neale Rannsabc56602020-04-01 09:45:23 +000096 self.vapi.ipsec_sad_entry_add_del(
97 is_add=0,
98 entry={
Klement Sekerad9b0c6f2022-04-26 19:02:15 +020099 "sad_id": scapy_tun_sa_id,
100 "spi": scapy_tun_spi,
101 "integrity_algorithm": auth_algo_vpp_id,
102 "integrity_key": {
103 "data": auth_key,
104 "length": len(auth_key),
Neale Rannsabc56602020-04-01 09:45:23 +0000105 },
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200106 "crypto_algorithm": crypt_algo_vpp_id,
107 "crypto_key": {
108 "data": crypt_key,
109 "length": len(crypt_key),
Neale Rannsabc56602020-04-01 09:45:23 +0000110 },
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200111 "protocol": self.vpp_ah_protocol,
112 "tunnel_src": self.pg0.local_addr[addr_type],
113 "tunnel_dst": self.pg0.remote_addr[addr_type],
114 },
115 )
116 self.vapi.ipsec_select_backend(protocol=self.vpp_ah_protocol, index=0)
Klement Sekerab4d30532018-11-08 13:00:02 +0100117
118
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200119if __name__ == "__main__":
Klement Sekerab4d30532018-11-08 13:00:02 +0100120 unittest.main(testRunner=VppTestRunner)