blob: 73acfdf5346a4d46ae6d5a7dbafd74ae3eeb00e1 [file] [log] [blame]
Neale Rannsbc27d1b2018-02-05 01:13:38 -08001#!/usr/bin/env python
2
Paul Vinciguerraa279d9c2019-02-28 09:00:09 -08003from socket import AF_INET, AF_INET6
Neale Rannsbc27d1b2018-02-05 01:13:38 -08004import unittest
Neale Rannsbc27d1b2018-02-05 01:13:38 -08005
Neale Rannsbc27d1b2018-02-05 01:13:38 -08006from scapy.packet import Raw
Neale Rannsc29c0af2018-11-07 04:21:12 -08007from scapy.layers.l2 import Ether, ARP, Dot1Q
Neale Ranns36abbf12019-03-12 02:34:07 -07008from scapy.layers.inet import IP, UDP, ICMP
Neale Ranns25b04942018-04-04 09:34:50 -07009from scapy.layers.inet6 import IPv6, ICMPv6ND_NS, ICMPv6NDOptSrcLLAddr, \
Klement Sekerab9ef2732018-06-24 22:49:33 +020010 ICMPv6ND_NA
Neale Ranns25b04942018-04-04 09:34:50 -070011from scapy.utils6 import in6_getnsma, in6_getnsmac
Neale Ranns93cc3ee2018-10-10 07:22:51 -070012from scapy.layers.vxlan import VXLAN
Neale Ranns1c17e2e2018-12-20 12:03:59 -080013from scapy.data import ETH_P_IP, ETH_P_IPV6
Neale Ranns25b04942018-04-04 09:34:50 -070014from scapy.utils import inet_pton, inet_ntop
Paul Vinciguerraa279d9c2019-02-28 09:00:09 -080015
16from framework import VppTestCase, VppTestRunner
17from vpp_object import VppObject
18from vpp_interface import VppInterface
19from vpp_ip_route import VppIpRoute, VppRoutePath, VppIpTable, \
20 VppIpInterfaceAddress, VppIpInterfaceBind, find_route
21from vpp_l2 import VppBridgeDomain, VppBridgeDomainPort, \
Neale Ranns36abbf12019-03-12 02:34:07 -070022 VppBridgeDomainArpEntry, VppL2FibEntry, find_bridge_domain_port, VppL2Vtr
Paul Vinciguerra95c0ca42019-03-28 13:07:00 -070023from vpp_sub_interface import L2_VTR_OP, VppDot1QSubint
Paul Vinciguerraa279d9c2019-02-28 09:00:09 -080024from vpp_ip import VppIpAddress, VppIpPrefix
25from vpp_papi import VppEnum, MACAddress
Paul Vinciguerraa279d9c2019-02-28 09:00:09 -080026from vpp_vxlan_gbp_tunnel import find_vxlan_gbp_tunnel, INDEX_INVALID, \
27 VppVxlanGbpTunnel
Neale Ranns4dd4cf42019-03-27 05:06:47 -070028from vpp_neighbor import VppNeighbor
Neale Rannsbc27d1b2018-02-05 01:13:38 -080029
30
Neale Ranns93cc3ee2018-10-10 07:22:51 -070031def find_gbp_endpoint(test, sw_if_index=None, ip=None, mac=None):
32 if ip:
33 vip = VppIpAddress(ip)
34 if mac:
Ole Troan8006c6a2018-12-17 12:02:26 +010035 vmac = MACAddress(mac)
Neale Rannsc0a93142018-09-05 15:42:26 -070036
37 eps = test.vapi.gbp_endpoint_dump()
Neale Ranns93cc3ee2018-10-10 07:22:51 -070038
Neale Rannsc0a93142018-09-05 15:42:26 -070039 for ep in eps:
Neale Ranns93cc3ee2018-10-10 07:22:51 -070040 if sw_if_index:
41 if ep.endpoint.sw_if_index != sw_if_index:
42 continue
43 if ip:
44 for eip in ep.endpoint.ips:
45 if vip == eip:
46 return True
47 if mac:
Ole Troan8006c6a2018-12-17 12:02:26 +010048 if vmac.packed == ep.endpoint.mac:
Neale Rannsc0a93142018-09-05 15:42:26 -070049 return True
50 return False
51
52
Neale Ranns93cc3ee2018-10-10 07:22:51 -070053def find_gbp_vxlan(test, vni):
54 ts = test.vapi.gbp_vxlan_tunnel_dump()
55 for t in ts:
56 if t.tunnel.vni == vni:
57 return True
58 return False
59
60
Neale Rannsbc27d1b2018-02-05 01:13:38 -080061class VppGbpEndpoint(VppObject):
62 """
Mohsin Kazmi22b3b842018-04-17 19:35:42 +020063 GBP Endpoint
Neale Rannsbc27d1b2018-02-05 01:13:38 -080064 """
65
Neale Ranns25b04942018-04-04 09:34:50 -070066 @property
Neale Ranns93cc3ee2018-10-10 07:22:51 -070067 def mac(self):
Ole Troan8006c6a2018-12-17 12:02:26 +010068 return str(self.vmac)
Neale Ranns25b04942018-04-04 09:34:50 -070069
70 @property
Neale Rannsc0a93142018-09-05 15:42:26 -070071 def ip4(self):
72 return self._ip4
73
74 @property
75 def fip4(self):
76 return self._fip4
77
78 @property
79 def ip6(self):
80 return self._ip6
81
82 @property
83 def fip6(self):
84 return self._fip6
85
86 @property
87 def ips(self):
88 return [self.ip4, self.ip6]
89
90 @property
91 def fips(self):
92 return [self.fip4, self.fip6]
93
Neale Ranns93cc3ee2018-10-10 07:22:51 -070094 def __init__(self, test, itf, epg, recirc, ip4, fip4, ip6, fip6,
95 flags=0,
96 tun_src="0.0.0.0",
97 tun_dst="0.0.0.0",
98 mac=True):
Neale Rannsbc27d1b2018-02-05 01:13:38 -080099 self._test = test
Neale Ranns25b04942018-04-04 09:34:50 -0700100 self.itf = itf
Neale Rannsbc27d1b2018-02-05 01:13:38 -0800101 self.epg = epg
Neale Ranns25b04942018-04-04 09:34:50 -0700102 self.recirc = recirc
Neale Rannsc0a93142018-09-05 15:42:26 -0700103
104 self._ip4 = VppIpAddress(ip4)
105 self._fip4 = VppIpAddress(fip4)
106 self._ip6 = VppIpAddress(ip6)
107 self._fip6 = VppIpAddress(fip6)
108
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700109 if mac:
Ole Troan8006c6a2018-12-17 12:02:26 +0100110 self.vmac = MACAddress(self.itf.remote_mac)
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700111 else:
Ole Troan8006c6a2018-12-17 12:02:26 +0100112 self.vmac = MACAddress("00:00:00:00:00:00")
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700113
114 self.flags = flags
115 self.tun_src = VppIpAddress(tun_src)
116 self.tun_dst = VppIpAddress(tun_dst)
Neale Rannsbc27d1b2018-02-05 01:13:38 -0800117
118 def add_vpp_config(self):
Neale Rannsc0a93142018-09-05 15:42:26 -0700119 res = self._test.vapi.gbp_endpoint_add(
Neale Ranns25b04942018-04-04 09:34:50 -0700120 self.itf.sw_if_index,
Neale Rannsc0a93142018-09-05 15:42:26 -0700121 [self.ip4.encode(), self.ip6.encode()],
Ole Troan8006c6a2018-12-17 12:02:26 +0100122 self.vmac.packed,
Neale Ranns4ba67722019-02-28 11:11:39 +0000123 self.epg.sclass,
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700124 self.flags,
125 self.tun_src.encode(),
126 self.tun_dst.encode())
Neale Rannsc0a93142018-09-05 15:42:26 -0700127 self.handle = res.handle
Neale Rannsbc27d1b2018-02-05 01:13:38 -0800128 self._test.registry.register(self, self._test.logger)
129
130 def remove_vpp_config(self):
Neale Rannsc0a93142018-09-05 15:42:26 -0700131 self._test.vapi.gbp_endpoint_del(self.handle)
Neale Rannsbc27d1b2018-02-05 01:13:38 -0800132
Neale Rannsbc27d1b2018-02-05 01:13:38 -0800133 def object_id(self):
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700134 return "gbp-endpoint:[%d==%d:%s:%d]" % (self.handle,
135 self.itf.sw_if_index,
136 self.ip4.address,
Neale Ranns4ba67722019-02-28 11:11:39 +0000137 self.epg.sclass)
Neale Rannsbc27d1b2018-02-05 01:13:38 -0800138
139 def query_vpp_config(self):
Neale Rannsc0a93142018-09-05 15:42:26 -0700140 return find_gbp_endpoint(self._test,
141 self.itf.sw_if_index,
142 self.ip4.address)
Neale Ranns25b04942018-04-04 09:34:50 -0700143
144
145class VppGbpRecirc(VppObject):
146 """
Mohsin Kazmi22b3b842018-04-17 19:35:42 +0200147 GBP Recirculation Interface
Neale Ranns25b04942018-04-04 09:34:50 -0700148 """
149
150 def __init__(self, test, epg, recirc, is_ext=False):
151 self._test = test
152 self.recirc = recirc
153 self.epg = epg
154 self.is_ext = is_ext
155
156 def add_vpp_config(self):
157 self._test.vapi.gbp_recirc_add_del(
158 1,
159 self.recirc.sw_if_index,
Neale Ranns4ba67722019-02-28 11:11:39 +0000160 self.epg.sclass,
Neale Ranns25b04942018-04-04 09:34:50 -0700161 self.is_ext)
162 self._test.registry.register(self, self._test.logger)
163
164 def remove_vpp_config(self):
165 self._test.vapi.gbp_recirc_add_del(
166 0,
167 self.recirc.sw_if_index,
Neale Ranns4ba67722019-02-28 11:11:39 +0000168 self.epg.sclass,
Neale Ranns25b04942018-04-04 09:34:50 -0700169 self.is_ext)
170
Neale Ranns25b04942018-04-04 09:34:50 -0700171 def object_id(self):
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700172 return "gbp-recirc:[%d]" % (self.recirc.sw_if_index)
Neale Ranns25b04942018-04-04 09:34:50 -0700173
174 def query_vpp_config(self):
175 rs = self._test.vapi.gbp_recirc_dump()
176 for r in rs:
177 if r.recirc.sw_if_index == self.recirc.sw_if_index:
178 return True
179 return False
180
181
Neale Rannsb6a47952018-11-21 05:44:35 -0800182class VppGbpExtItf(VppObject):
183 """
184 GBP ExtItfulation Interface
185 """
186
187 def __init__(self, test, itf, bd, rd):
188 self._test = test
189 self.itf = itf
190 self.bd = bd
191 self.rd = rd
192
193 def add_vpp_config(self):
194 self._test.vapi.gbp_ext_itf_add_del(
195 1,
196 self.itf.sw_if_index,
197 self.bd.bd_id,
198 self.rd.rd_id)
199 self._test.registry.register(self, self._test.logger)
200
201 def remove_vpp_config(self):
202 self._test.vapi.gbp_ext_itf_add_del(
203 0,
204 self.itf.sw_if_index,
205 self.bd.bd_id,
206 self.rd.rd_id)
207
Neale Rannsb6a47952018-11-21 05:44:35 -0800208 def object_id(self):
209 return "gbp-ext-itf:[%d]" % (self.itf.sw_if_index)
210
211 def query_vpp_config(self):
212 rs = self._test.vapi.gbp_ext_itf_dump()
213 for r in rs:
214 if r.ext_itf.sw_if_index == self.itf.sw_if_index:
215 return True
216 return False
217
218
Neale Ranns25b04942018-04-04 09:34:50 -0700219class VppGbpSubnet(VppObject):
220 """
Mohsin Kazmi22b3b842018-04-17 19:35:42 +0200221 GBP Subnet
Neale Ranns25b04942018-04-04 09:34:50 -0700222 """
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700223 def __init__(self, test, rd, address, address_len,
Neale Ranns4dd4cf42019-03-27 05:06:47 -0700224 type, sw_if_index=None, sclass=None):
Neale Ranns25b04942018-04-04 09:34:50 -0700225 self._test = test
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700226 self.rd_id = rd.rd_id
Ole Troana26373b2018-10-22 14:11:45 +0200227 self.prefix = VppIpPrefix(address, address_len)
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700228 self.type = type
Neale Ranns25b04942018-04-04 09:34:50 -0700229 self.sw_if_index = sw_if_index
Neale Ranns4dd4cf42019-03-27 05:06:47 -0700230 self.sclass = sclass
Neale Ranns25b04942018-04-04 09:34:50 -0700231
232 def add_vpp_config(self):
233 self._test.vapi.gbp_subnet_add_del(
234 1,
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700235 self.rd_id,
Ole Troana26373b2018-10-22 14:11:45 +0200236 self.prefix.encode(),
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700237 self.type,
Neale Ranns25b04942018-04-04 09:34:50 -0700238 sw_if_index=self.sw_if_index if self.sw_if_index else 0xffffffff,
Neale Ranns4dd4cf42019-03-27 05:06:47 -0700239 sclass=self.sclass if self.sclass else 0xffff)
Neale Ranns25b04942018-04-04 09:34:50 -0700240 self._test.registry.register(self, self._test.logger)
241
242 def remove_vpp_config(self):
243 self._test.vapi.gbp_subnet_add_del(
244 0,
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700245 self.rd_id,
246 self.prefix.encode(),
247 self.type)
Neale Ranns25b04942018-04-04 09:34:50 -0700248
Neale Ranns25b04942018-04-04 09:34:50 -0700249 def object_id(self):
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700250 return "gbp-subnet:[%d-%s]" % (self.rd_id, self.prefix)
Neale Ranns25b04942018-04-04 09:34:50 -0700251
252 def query_vpp_config(self):
253 ss = self._test.vapi.gbp_subnet_dump()
254 for s in ss:
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700255 if s.subnet.rd_id == self.rd_id and \
256 s.subnet.type == self.type and \
Ole Troana26373b2018-10-22 14:11:45 +0200257 s.subnet.prefix == self.prefix:
Neale Rannsc0a93142018-09-05 15:42:26 -0700258 return True
Neale Ranns25b04942018-04-04 09:34:50 -0700259 return False
260
261
Neale Ranns32f6d8e2019-03-05 04:22:08 -0800262class VppGbpEndpointRetention(object):
263 def __init__(self, remote_ep_timeout=0xffffffff):
264 self.remote_ep_timeout = remote_ep_timeout
265
266 def encode(self):
267 return {'remote_ep_timeout': self.remote_ep_timeout}
268
269
Neale Ranns25b04942018-04-04 09:34:50 -0700270class VppGbpEndpointGroup(VppObject):
271 """
Mohsin Kazmi22b3b842018-04-17 19:35:42 +0200272 GBP Endpoint Group
Neale Ranns25b04942018-04-04 09:34:50 -0700273 """
274
Neale Ranns4ba67722019-02-28 11:11:39 +0000275 def __init__(self, test, vnid, sclass, rd, bd, uplink,
Neale Ranns32f6d8e2019-03-05 04:22:08 -0800276 bvi, bvi_ip4, bvi_ip6=None,
277 retention=VppGbpEndpointRetention()):
Neale Ranns25b04942018-04-04 09:34:50 -0700278 self._test = test
279 self.uplink = uplink
280 self.bvi = bvi
Neale Ranns4d5b9172018-10-24 02:57:49 -0700281 self.bvi_ip4 = VppIpAddress(bvi_ip4)
282 self.bvi_ip6 = VppIpAddress(bvi_ip6)
Neale Ranns4ba67722019-02-28 11:11:39 +0000283 self.vnid = vnid
Neale Ranns25b04942018-04-04 09:34:50 -0700284 self.bd = bd
285 self.rd = rd
Neale Ranns879d11c2019-01-21 23:34:18 -0800286 self.sclass = sclass
287 if 0 == self.sclass:
288 self.sclass = 0xffff
Neale Ranns32f6d8e2019-03-05 04:22:08 -0800289 self.retention = retention
Neale Ranns25b04942018-04-04 09:34:50 -0700290
291 def add_vpp_config(self):
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700292 self._test.vapi.gbp_endpoint_group_add(
Neale Ranns4ba67722019-02-28 11:11:39 +0000293 self.vnid,
Neale Ranns879d11c2019-01-21 23:34:18 -0800294 self.sclass,
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700295 self.bd.bd.bd_id,
296 self.rd.rd_id,
Neale Ranns32f6d8e2019-03-05 04:22:08 -0800297 self.uplink.sw_if_index if self.uplink else INDEX_INVALID,
298 self.retention.encode())
Neale Ranns25b04942018-04-04 09:34:50 -0700299 self._test.registry.register(self, self._test.logger)
300
301 def remove_vpp_config(self):
Neale Ranns4ba67722019-02-28 11:11:39 +0000302 self._test.vapi.gbp_endpoint_group_del(self.sclass)
Neale Ranns25b04942018-04-04 09:34:50 -0700303
Neale Ranns25b04942018-04-04 09:34:50 -0700304 def object_id(self):
Neale Ranns4ba67722019-02-28 11:11:39 +0000305 return "gbp-endpoint-group:[%d]" % (self.vnid)
Neale Ranns25b04942018-04-04 09:34:50 -0700306
307 def query_vpp_config(self):
308 epgs = self._test.vapi.gbp_endpoint_group_dump()
309 for epg in epgs:
Neale Ranns4ba67722019-02-28 11:11:39 +0000310 if epg.epg.vnid == self.vnid:
Neale Rannsbc27d1b2018-02-05 01:13:38 -0800311 return True
312 return False
313
314
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700315class VppGbpBridgeDomain(VppObject):
316 """
317 GBP Bridge Domain
318 """
319
Neale Ranns879d11c2019-01-21 23:34:18 -0800320 def __init__(self, test, bd, bvi, uu_fwd=None,
Mohsin Kazmi8ea109e2019-03-22 15:13:31 +0100321 bm_flood=None, learn=True, uu_drop=False, bm_drop=False):
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700322 self._test = test
323 self.bvi = bvi
Neale Ranns879d11c2019-01-21 23:34:18 -0800324 self.uu_fwd = uu_fwd
325 self.bm_flood = bm_flood
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700326 self.bd = bd
327
Neale Rannsc29c0af2018-11-07 04:21:12 -0800328 e = VppEnum.vl_api_gbp_bridge_domain_flags_t
329 if (learn):
330 self.learn = e.GBP_BD_API_FLAG_NONE
331 else:
332 self.learn = e.GBP_BD_API_FLAG_DO_NOT_LEARN
Mohsin Kazmi8ea109e2019-03-22 15:13:31 +0100333 if (uu_drop):
334 self.learn |= e.GBP_BD_API_FLAG_UU_FWD_DROP
335 if (bm_drop):
336 self.learn |= e.GBP_BD_API_FLAG_MCAST_DROP
Neale Rannsc29c0af2018-11-07 04:21:12 -0800337
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700338 def add_vpp_config(self):
339 self._test.vapi.gbp_bridge_domain_add(
340 self.bd.bd_id,
Neale Rannsc29c0af2018-11-07 04:21:12 -0800341 self.learn,
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700342 self.bvi.sw_if_index,
Neale Ranns879d11c2019-01-21 23:34:18 -0800343 self.uu_fwd.sw_if_index if self.uu_fwd else INDEX_INVALID,
344 self.bm_flood.sw_if_index if self.bm_flood else INDEX_INVALID)
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700345 self._test.registry.register(self, self._test.logger)
346
347 def remove_vpp_config(self):
348 self._test.vapi.gbp_bridge_domain_del(self.bd.bd_id)
349
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700350 def object_id(self):
351 return "gbp-bridge-domain:[%d]" % (self.bd.bd_id)
352
353 def query_vpp_config(self):
354 bds = self._test.vapi.gbp_bridge_domain_dump()
355 for bd in bds:
356 if bd.bd.bd_id == self.bd.bd_id:
357 return True
358 return False
359
360
361class VppGbpRouteDomain(VppObject):
362 """
363 GBP Route Domain
364 """
365
366 def __init__(self, test, rd_id, t4, t6, ip4_uu=None, ip6_uu=None):
367 self._test = test
368 self.rd_id = rd_id
369 self.t4 = t4
370 self.t6 = t6
371 self.ip4_uu = ip4_uu
372 self.ip6_uu = ip6_uu
373
374 def add_vpp_config(self):
375 self._test.vapi.gbp_route_domain_add(
376 self.rd_id,
377 self.t4.table_id,
378 self.t6.table_id,
379 self.ip4_uu.sw_if_index if self.ip4_uu else INDEX_INVALID,
380 self.ip6_uu.sw_if_index if self.ip6_uu else INDEX_INVALID)
381 self._test.registry.register(self, self._test.logger)
382
383 def remove_vpp_config(self):
384 self._test.vapi.gbp_route_domain_del(self.rd_id)
385
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700386 def object_id(self):
387 return "gbp-route-domain:[%d]" % (self.rd_id)
388
389 def query_vpp_config(self):
390 rds = self._test.vapi.gbp_route_domain_dump()
391 for rd in rds:
392 if rd.rd.rd_id == self.rd_id:
393 return True
394 return False
395
396
Neale Ranns13a08cc2018-11-07 09:25:54 -0800397class VppGbpContractNextHop():
398 def __init__(self, mac, bd, ip, rd):
399 self.mac = mac
400 self.ip = ip
401 self.bd = bd
402 self.rd = rd
403
404 def encode(self):
405 return {'ip': self.ip.encode(),
Ole Troan8006c6a2018-12-17 12:02:26 +0100406 'mac': self.mac.packed,
Neale Ranns13a08cc2018-11-07 09:25:54 -0800407 'bd_id': self.bd.bd.bd_id,
408 'rd_id': self.rd.rd_id}
409
410
411class VppGbpContractRule():
Mohsin Kazmid40c3e62018-11-21 10:46:57 +0100412 def __init__(self, action, hash_mode, nhs=[]):
Neale Ranns13a08cc2018-11-07 09:25:54 -0800413 self.action = action
Mohsin Kazmid40c3e62018-11-21 10:46:57 +0100414 self.hash_mode = hash_mode
Neale Ranns13a08cc2018-11-07 09:25:54 -0800415 self.nhs = nhs
Neale Ranns13a08cc2018-11-07 09:25:54 -0800416
417 def encode(self):
418 nhs = []
419 for nh in self.nhs:
420 nhs.append(nh.encode())
421 while len(nhs) < 8:
422 nhs.append({})
423 return {'action': self.action,
424 'nh_set': {
425 'hash_mode': self.hash_mode,
426 'n_nhs': len(self.nhs),
427 'nhs': nhs}}
428
429
Neale Rannsbc27d1b2018-02-05 01:13:38 -0800430class VppGbpContract(VppObject):
431 """
Mohsin Kazmi22b3b842018-04-17 19:35:42 +0200432 GBP Contract
Neale Rannsbc27d1b2018-02-05 01:13:38 -0800433 """
434
Neale Ranns4dd4cf42019-03-27 05:06:47 -0700435 def __init__(self, test, sclass, dclass, acl_index,
Neale Ranns1c17e2e2018-12-20 12:03:59 -0800436 rules, allowed_ethertypes):
Neale Rannsbc27d1b2018-02-05 01:13:38 -0800437 self._test = test
438 self.acl_index = acl_index
Neale Ranns4dd4cf42019-03-27 05:06:47 -0700439 self.sclass = sclass
440 self.dclass = dclass
Neale Ranns13a08cc2018-11-07 09:25:54 -0800441 self.rules = rules
Neale Ranns1c17e2e2018-12-20 12:03:59 -0800442 self.allowed_ethertypes = allowed_ethertypes
Neale Rannsfa0ac2c2019-03-12 04:34:53 -0700443 while (len(self.allowed_ethertypes) < 16):
444 self.allowed_ethertypes.append(0)
Neale Rannsbc27d1b2018-02-05 01:13:38 -0800445
446 def add_vpp_config(self):
Neale Ranns13a08cc2018-11-07 09:25:54 -0800447 rules = []
448 for r in self.rules:
449 rules.append(r.encode())
Neale Ranns796c84b2019-03-28 07:56:23 -0700450 r = self._test.vapi.gbp_contract_add_del(
Neale Rannsbc27d1b2018-02-05 01:13:38 -0800451 1,
Neale Ranns4dd4cf42019-03-27 05:06:47 -0700452 self.sclass,
453 self.dclass,
Neale Ranns13a08cc2018-11-07 09:25:54 -0800454 self.acl_index,
Neale Ranns1c17e2e2018-12-20 12:03:59 -0800455 rules,
456 self.allowed_ethertypes)
Neale Ranns796c84b2019-03-28 07:56:23 -0700457 self.stats_index = r.stats_index
Neale Rannsbc27d1b2018-02-05 01:13:38 -0800458 self._test.registry.register(self, self._test.logger)
459
460 def remove_vpp_config(self):
461 self._test.vapi.gbp_contract_add_del(
462 0,
Neale Ranns4dd4cf42019-03-27 05:06:47 -0700463 self.sclass,
464 self.dclass,
Neale Ranns13a08cc2018-11-07 09:25:54 -0800465 self.acl_index,
Neale Rannsfa0ac2c2019-03-12 04:34:53 -0700466 [],
467 self.allowed_ethertypes)
Neale Rannsbc27d1b2018-02-05 01:13:38 -0800468
Neale Rannsbc27d1b2018-02-05 01:13:38 -0800469 def object_id(self):
Neale Ranns4dd4cf42019-03-27 05:06:47 -0700470 return "gbp-contract:[%d:%s:%d]" % (self.sclass,
471 self.dclass,
Neale Rannsbc27d1b2018-02-05 01:13:38 -0800472 self.acl_index)
473
474 def query_vpp_config(self):
Neale Ranns25b04942018-04-04 09:34:50 -0700475 cs = self._test.vapi.gbp_contract_dump()
476 for c in cs:
Neale Ranns4dd4cf42019-03-27 05:06:47 -0700477 if c.contract.sclass == self.sclass \
478 and c.contract.dclass == self.dclass:
Neale Rannsbc27d1b2018-02-05 01:13:38 -0800479 return True
480 return False
481
Neale Ranns796c84b2019-03-28 07:56:23 -0700482 def get_drop_stats(self):
483 c = self._test.statistics.get_counter("/net/gbp/contract/drop")
484 return c[0][self.stats_index]
485
486 def get_permit_stats(self):
487 c = self._test.statistics.get_counter("/net/gbp/contract/permit")
488 return c[0][self.stats_index]
489
Neale Rannsbc27d1b2018-02-05 01:13:38 -0800490
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700491class VppGbpVxlanTunnel(VppInterface):
492 """
493 GBP VXLAN tunnel
494 """
495
Neale Ranns8da9fc62019-03-04 14:08:11 -0800496 def __init__(self, test, vni, bd_rd_id, mode, src):
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700497 super(VppGbpVxlanTunnel, self).__init__(test)
498 self._test = test
499 self.vni = vni
500 self.bd_rd_id = bd_rd_id
501 self.mode = mode
Neale Ranns8da9fc62019-03-04 14:08:11 -0800502 self.src = src
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700503
504 def add_vpp_config(self):
505 r = self._test.vapi.gbp_vxlan_tunnel_add(
506 self.vni,
507 self.bd_rd_id,
Neale Ranns8da9fc62019-03-04 14:08:11 -0800508 self.mode,
509 self.src)
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700510 self.set_sw_if_index(r.sw_if_index)
511 self._test.registry.register(self, self._test.logger)
512
513 def remove_vpp_config(self):
514 self._test.vapi.gbp_vxlan_tunnel_del(self.vni)
515
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700516 def object_id(self):
Neale Ranns8da9fc62019-03-04 14:08:11 -0800517 return "gbp-vxlan:%d" % (self.sw_if_index)
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700518
519 def query_vpp_config(self):
520 return find_gbp_vxlan(self._test, self.vni)
521
522
Mohsin Kazmi22b3b842018-04-17 19:35:42 +0200523class VppGbpAcl(VppObject):
524 """
525 GBP Acl
526 """
527
528 def __init__(self, test):
529 self._test = test
530 self.acl_index = 4294967295
531
532 def create_rule(self, is_ipv6=0, permit_deny=0, proto=-1,
Paul Vinciguerra22ab6f72019-03-07 17:55:33 -0800533 s_prefix=0, s_ip=b'\x00\x00\x00\x00', sport_from=0,
534 sport_to=65535, d_prefix=0, d_ip=b'\x00\x00\x00\x00',
Mohsin Kazmi22b3b842018-04-17 19:35:42 +0200535 dport_from=0, dport_to=65535):
536 if proto == -1 or proto == 0:
537 sport_to = 0
538 dport_to = sport_to
539 elif proto == 1 or proto == 58:
540 sport_to = 255
541 dport_to = sport_to
542 rule = ({'is_permit': permit_deny, 'is_ipv6': is_ipv6, 'proto': proto,
543 'srcport_or_icmptype_first': sport_from,
544 'srcport_or_icmptype_last': sport_to,
545 'src_ip_prefix_len': s_prefix,
546 'src_ip_addr': s_ip,
547 'dstport_or_icmpcode_first': dport_from,
548 'dstport_or_icmpcode_last': dport_to,
549 'dst_ip_prefix_len': d_prefix,
550 'dst_ip_addr': d_ip})
551 return rule
552
553 def add_vpp_config(self, rules):
554
555 reply = self._test.vapi.acl_add_replace(self.acl_index,
556 r=rules,
Paul Vinciguerra22ab6f72019-03-07 17:55:33 -0800557 tag=b'GBPTest')
Mohsin Kazmi22b3b842018-04-17 19:35:42 +0200558 self.acl_index = reply.acl_index
559 return self.acl_index
560
561 def remove_vpp_config(self):
562 self._test.vapi.acl_del(self.acl_index)
563
Mohsin Kazmi22b3b842018-04-17 19:35:42 +0200564 def object_id(self):
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700565 return "gbp-acl:[%d]" % (self.acl_index)
Mohsin Kazmi22b3b842018-04-17 19:35:42 +0200566
567 def query_vpp_config(self):
568 cs = self._test.vapi.acl_dump()
569 for c in cs:
570 if c.acl_index == self.acl_index:
571 return True
572 return False
573
574
Neale Rannsbc27d1b2018-02-05 01:13:38 -0800575class TestGBP(VppTestCase):
576 """ GBP Test Case """
577
Paul Vinciguerra7f9b7f92019-03-12 19:23:27 -0700578 @classmethod
579 def setUpClass(cls):
580 super(TestGBP, cls).setUpClass()
581
582 @classmethod
583 def tearDownClass(cls):
584 super(TestGBP, cls).tearDownClass()
585
Neale Rannsbc27d1b2018-02-05 01:13:38 -0800586 def setUp(self):
587 super(TestGBP, self).setUp()
588
Neale Ranns25b04942018-04-04 09:34:50 -0700589 self.create_pg_interfaces(range(9))
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700590 self.create_loopback_interfaces(8)
Neale Ranns25b04942018-04-04 09:34:50 -0700591
Ole Troan8006c6a2018-12-17 12:02:26 +0100592 self.router_mac = MACAddress("00:11:22:33:44:55")
Neale Rannsbc27d1b2018-02-05 01:13:38 -0800593
594 for i in self.pg_interfaces:
595 i.admin_up()
Neale Ranns25b04942018-04-04 09:34:50 -0700596 for i in self.lo_interfaces:
597 i.admin_up()
Neale Rannsbc27d1b2018-02-05 01:13:38 -0800598
599 def tearDown(self):
600 for i in self.pg_interfaces:
Neale Ranns25b04942018-04-04 09:34:50 -0700601 i.admin_down()
Neale Rannsbc27d1b2018-02-05 01:13:38 -0800602
603 super(TestGBP, self).tearDown()
604
Neale Ranns25b04942018-04-04 09:34:50 -0700605 def send_and_expect_bridged(self, src, tx, dst):
606 rx = self.send_and_expect(src, tx, dst)
Neale Rannsbc27d1b2018-02-05 01:13:38 -0800607
Neale Ranns25b04942018-04-04 09:34:50 -0700608 for r in rx:
609 self.assertEqual(r[Ether].src, tx[0][Ether].src)
610 self.assertEqual(r[Ether].dst, tx[0][Ether].dst)
611 self.assertEqual(r[IP].src, tx[0][IP].src)
612 self.assertEqual(r[IP].dst, tx[0][IP].dst)
613 return rx
Neale Rannsbc27d1b2018-02-05 01:13:38 -0800614
Neale Ranns25b04942018-04-04 09:34:50 -0700615 def send_and_expect_bridged6(self, src, tx, dst):
616 rx = self.send_and_expect(src, tx, dst)
Neale Rannsbc27d1b2018-02-05 01:13:38 -0800617
Neale Ranns25b04942018-04-04 09:34:50 -0700618 for r in rx:
619 self.assertEqual(r[Ether].src, tx[0][Ether].src)
620 self.assertEqual(r[Ether].dst, tx[0][Ether].dst)
621 self.assertEqual(r[IPv6].src, tx[0][IPv6].src)
622 self.assertEqual(r[IPv6].dst, tx[0][IPv6].dst)
623 return rx
624
625 def send_and_expect_routed(self, src, tx, dst, src_mac):
626 rx = self.send_and_expect(src, tx, dst)
627
628 for r in rx:
629 self.assertEqual(r[Ether].src, src_mac)
630 self.assertEqual(r[Ether].dst, dst.remote_mac)
631 self.assertEqual(r[IP].src, tx[0][IP].src)
632 self.assertEqual(r[IP].dst, tx[0][IP].dst)
633 return rx
634
635 def send_and_expect_natted(self, src, tx, dst, src_ip):
636 rx = self.send_and_expect(src, tx, dst)
637
638 for r in rx:
639 self.assertEqual(r[Ether].src, tx[0][Ether].src)
640 self.assertEqual(r[Ether].dst, tx[0][Ether].dst)
641 self.assertEqual(r[IP].src, src_ip)
642 self.assertEqual(r[IP].dst, tx[0][IP].dst)
643 return rx
644
Neale Ranns4a6d0232018-04-24 07:45:33 -0700645 def send_and_expect_natted6(self, src, tx, dst, src_ip):
646 rx = self.send_and_expect(src, tx, dst)
647
648 for r in rx:
649 self.assertEqual(r[Ether].src, tx[0][Ether].src)
650 self.assertEqual(r[Ether].dst, tx[0][Ether].dst)
651 self.assertEqual(r[IPv6].src, src_ip)
652 self.assertEqual(r[IPv6].dst, tx[0][IPv6].dst)
653 return rx
654
Neale Ranns25b04942018-04-04 09:34:50 -0700655 def send_and_expect_unnatted(self, src, tx, dst, dst_ip):
656 rx = self.send_and_expect(src, tx, dst)
657
658 for r in rx:
659 self.assertEqual(r[Ether].src, tx[0][Ether].src)
660 self.assertEqual(r[Ether].dst, tx[0][Ether].dst)
661 self.assertEqual(r[IP].dst, dst_ip)
662 self.assertEqual(r[IP].src, tx[0][IP].src)
663 return rx
664
Neale Ranns4a6d0232018-04-24 07:45:33 -0700665 def send_and_expect_unnatted6(self, src, tx, dst, dst_ip):
666 rx = self.send_and_expect(src, tx, dst)
667
668 for r in rx:
669 self.assertEqual(r[Ether].src, tx[0][Ether].src)
670 self.assertEqual(r[Ether].dst, tx[0][Ether].dst)
671 self.assertEqual(r[IPv6].dst, dst_ip)
672 self.assertEqual(r[IPv6].src, tx[0][IPv6].src)
673 return rx
674
Neale Ranns25b04942018-04-04 09:34:50 -0700675 def send_and_expect_double_natted(self, src, tx, dst, src_ip, dst_ip):
676 rx = self.send_and_expect(src, tx, dst)
677
678 for r in rx:
Ole Troan8006c6a2018-12-17 12:02:26 +0100679 self.assertEqual(r[Ether].src, str(self.router_mac))
Neale Ranns25b04942018-04-04 09:34:50 -0700680 self.assertEqual(r[Ether].dst, dst.remote_mac)
681 self.assertEqual(r[IP].dst, dst_ip)
682 self.assertEqual(r[IP].src, src_ip)
683 return rx
684
Neale Ranns4a6d0232018-04-24 07:45:33 -0700685 def send_and_expect_double_natted6(self, src, tx, dst, src_ip, dst_ip):
686 rx = self.send_and_expect(src, tx, dst)
687
688 for r in rx:
Ole Troan8006c6a2018-12-17 12:02:26 +0100689 self.assertEqual(r[Ether].src, str(self.router_mac))
Neale Ranns4a6d0232018-04-24 07:45:33 -0700690 self.assertEqual(r[Ether].dst, dst.remote_mac)
691 self.assertEqual(r[IPv6].dst, dst_ip)
692 self.assertEqual(r[IPv6].src, src_ip)
693 return rx
694
Neale Ranns25b04942018-04-04 09:34:50 -0700695 def test_gbp(self):
696 """ Group Based Policy """
697
Neale Rannsb6a47952018-11-21 05:44:35 -0800698 ep_flags = VppEnum.vl_api_gbp_endpoint_flags_t
699
Neale Rannsbc27d1b2018-02-05 01:13:38 -0800700 #
Neale Ranns25b04942018-04-04 09:34:50 -0700701 # Bridge Domains
702 #
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700703 bd1 = VppBridgeDomain(self, 1)
704 bd2 = VppBridgeDomain(self, 2)
705 bd20 = VppBridgeDomain(self, 20)
706
707 bd1.add_vpp_config()
708 bd2.add_vpp_config()
709 bd20.add_vpp_config()
710
711 gbd1 = VppGbpBridgeDomain(self, bd1, self.loop0)
712 gbd2 = VppGbpBridgeDomain(self, bd2, self.loop1)
713 gbd20 = VppGbpBridgeDomain(self, bd20, self.loop2)
714
715 gbd1.add_vpp_config()
716 gbd2.add_vpp_config()
717 gbd20.add_vpp_config()
718
719 #
720 # Route Domains
721 #
722 gt4 = VppIpTable(self, 0)
723 gt4.add_vpp_config()
724 gt6 = VppIpTable(self, 0, is_ip6=True)
725 gt6.add_vpp_config()
726 nt4 = VppIpTable(self, 20)
727 nt4.add_vpp_config()
728 nt6 = VppIpTable(self, 20, is_ip6=True)
729 nt6.add_vpp_config()
730
731 rd0 = VppGbpRouteDomain(self, 0, gt4, gt6, None, None)
732 rd20 = VppGbpRouteDomain(self, 20, nt4, nt6, None, None)
733
734 rd0.add_vpp_config()
735 rd20.add_vpp_config()
Neale Ranns25b04942018-04-04 09:34:50 -0700736
737 #
738 # 3 EPGs, 2 of which share a BD.
Neale Ranns25b04942018-04-04 09:34:50 -0700739 # 2 NAT EPGs, one for floating-IP subnets, the other for internet
740 #
Neale Ranns4ba67722019-02-28 11:11:39 +0000741 epgs = [VppGbpEndpointGroup(self, 220, 1220, rd0, gbd1,
742 self.pg4, self.loop0,
743 "10.0.0.128", "2001:10::128"),
744 VppGbpEndpointGroup(self, 221, 1221, rd0, gbd1,
745 self.pg5, self.loop0,
746 "10.0.1.128", "2001:10:1::128"),
747 VppGbpEndpointGroup(self, 222, 1222, rd0, gbd2,
748 self.pg6, self.loop1,
749 "10.0.2.128", "2001:10:2::128"),
750 VppGbpEndpointGroup(self, 333, 1333, rd20, gbd20,
751 self.pg7, self.loop2,
752 "11.0.0.128", "3001::128"),
753 VppGbpEndpointGroup(self, 444, 1444, rd20, gbd20,
754 self.pg8, self.loop2,
755 "11.0.0.129", "3001::129")]
756 recircs = [VppGbpRecirc(self, epgs[0], self.loop3),
757 VppGbpRecirc(self, epgs[1], self.loop4),
758 VppGbpRecirc(self, epgs[2], self.loop5),
759 VppGbpRecirc(self, epgs[3], self.loop6, is_ext=True),
760 VppGbpRecirc(self, epgs[4], self.loop7, is_ext=True)]
Neale Ranns25b04942018-04-04 09:34:50 -0700761
762 epg_nat = epgs[3]
763 recirc_nat = recircs[3]
764
765 #
766 # 4 end-points, 2 in the same subnet, 3 in the same BD
767 #
Neale Rannsc0a93142018-09-05 15:42:26 -0700768 eps = [VppGbpEndpoint(self, self.pg0,
769 epgs[0], recircs[0],
770 "10.0.0.1", "11.0.0.1",
771 "2001:10::1", "3001::1"),
772 VppGbpEndpoint(self, self.pg1,
773 epgs[0], recircs[0],
774 "10.0.0.2", "11.0.0.2",
775 "2001:10::2", "3001::2"),
776 VppGbpEndpoint(self, self.pg2,
777 epgs[1], recircs[1],
778 "10.0.1.1", "11.0.0.3",
779 "2001:10:1::1", "3001::3"),
780 VppGbpEndpoint(self, self.pg3,
781 epgs[2], recircs[2],
782 "10.0.2.1", "11.0.0.4",
783 "2001:10:2::1", "3001::4")]
Neale Ranns25b04942018-04-04 09:34:50 -0700784
785 #
786 # Config related to each of the EPGs
787 #
788 for epg in epgs:
789 # IP config on the BVI interfaces
790 if epg != epgs[1] and epg != epgs[4]:
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700791 VppIpInterfaceBind(self, epg.bvi, epg.rd.t4).add_vpp_config()
792 VppIpInterfaceBind(self, epg.bvi, epg.rd.t6).add_vpp_config()
793 self.vapi.sw_interface_set_mac_address(
794 epg.bvi.sw_if_index,
Ole Troan8006c6a2018-12-17 12:02:26 +0100795 self.router_mac.packed)
Neale Ranns25b04942018-04-04 09:34:50 -0700796
797 # The BVIs are NAT inside interfaces
798 self.vapi.nat44_interface_add_del_feature(epg.bvi.sw_if_index,
799 is_inside=1,
800 is_add=1)
Neale Ranns4a6d0232018-04-24 07:45:33 -0700801 self.vapi.nat66_add_del_interface(epg.bvi.sw_if_index,
802 is_inside=1,
803 is_add=1)
Neale Ranns25b04942018-04-04 09:34:50 -0700804
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700805 if_ip4 = VppIpInterfaceAddress(self, epg.bvi, epg.bvi_ip4, 32)
806 if_ip6 = VppIpInterfaceAddress(self, epg.bvi, epg.bvi_ip6, 128)
807 if_ip4.add_vpp_config()
808 if_ip6.add_vpp_config()
Neale Ranns25b04942018-04-04 09:34:50 -0700809
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700810 # EPG uplink interfaces in the RD
811 VppIpInterfaceBind(self, epg.uplink, epg.rd.t4).add_vpp_config()
812 VppIpInterfaceBind(self, epg.uplink, epg.rd.t6).add_vpp_config()
Neale Ranns25b04942018-04-04 09:34:50 -0700813
814 # add the BD ARP termination entry for BVI IP
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700815 epg.bd_arp_ip4 = VppBridgeDomainArpEntry(self, epg.bd.bd,
Ole Troan8006c6a2018-12-17 12:02:26 +0100816 str(self.router_mac),
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700817 epg.bvi_ip4)
818 epg.bd_arp_ip6 = VppBridgeDomainArpEntry(self, epg.bd.bd,
Ole Troan8006c6a2018-12-17 12:02:26 +0100819 str(self.router_mac),
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700820 epg.bvi_ip6)
821 epg.bd_arp_ip4.add_vpp_config()
822 epg.bd_arp_ip6.add_vpp_config()
Neale Ranns25b04942018-04-04 09:34:50 -0700823
824 # EPG in VPP
825 epg.add_vpp_config()
826
827 for recirc in recircs:
828 # EPG's ingress recirculation interface maps to its RD
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700829 VppIpInterfaceBind(self, recirc.recirc,
830 recirc.epg.rd.t4).add_vpp_config()
831 VppIpInterfaceBind(self, recirc.recirc,
832 recirc.epg.rd.t6).add_vpp_config()
Neale Ranns25b04942018-04-04 09:34:50 -0700833
Neale Ranns4a6d0232018-04-24 07:45:33 -0700834 self.vapi.nat44_interface_add_del_feature(
835 recirc.recirc.sw_if_index,
836 is_inside=0,
837 is_add=1)
838 self.vapi.nat66_add_del_interface(
839 recirc.recirc.sw_if_index,
840 is_inside=0,
841 is_add=1)
Neale Ranns25b04942018-04-04 09:34:50 -0700842
843 recirc.add_vpp_config()
844
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700845 for recirc in recircs:
846 self.assertTrue(find_bridge_domain_port(self,
847 recirc.epg.bd.bd.bd_id,
848 recirc.recirc.sw_if_index))
849
Neale Ranns25b04942018-04-04 09:34:50 -0700850 for ep in eps:
851 self.pg_enable_capture(self.pg_interfaces)
852 self.pg_start()
853 #
854 # routes to the endpoints. We need these since there are no
855 # adj-fibs due to the fact the the BVI address has /32 and
856 # the subnet is not attached.
857 #
Neale Rannsc0a93142018-09-05 15:42:26 -0700858 for (ip, fip) in zip(ep.ips, ep.fips):
Neale Rannsc0a93142018-09-05 15:42:26 -0700859 # Add static mappings for each EP from the 10/8 to 11/8 network
860 if ip.af == AF_INET:
861 self.vapi.nat44_add_del_static_mapping(ip.bytes,
862 fip.bytes,
863 vrf_id=0,
864 addr_only=1)
865 else:
866 self.vapi.nat66_add_del_static_mapping(ip.bytes,
867 fip.bytes,
868 vrf_id=0)
Neale Ranns25b04942018-04-04 09:34:50 -0700869
Neale Ranns25b04942018-04-04 09:34:50 -0700870 # VPP EP create ...
871 ep.add_vpp_config()
872
Neale Rannsc0a93142018-09-05 15:42:26 -0700873 self.logger.info(self.vapi.cli("sh gbp endpoint"))
Neale Ranns25b04942018-04-04 09:34:50 -0700874
Neale Rannsc0a93142018-09-05 15:42:26 -0700875 # ... results in a Gratuitous ARP/ND on the EPG's uplink
876 rx = ep.epg.uplink.get_capture(len(ep.ips), timeout=0.2)
877
878 for ii, ip in enumerate(ep.ips):
879 p = rx[ii]
880
881 if ip.is_ip6:
882 self.assertTrue(p.haslayer(ICMPv6ND_NA))
883 self.assertEqual(p[ICMPv6ND_NA].tgt, ip.address)
884 else:
885 self.assertTrue(p.haslayer(ARP))
886 self.assertEqual(p[ARP].psrc, ip.address)
887 self.assertEqual(p[ARP].pdst, ip.address)
Neale Ranns25b04942018-04-04 09:34:50 -0700888
889 # add the BD ARP termination entry for floating IP
Neale Rannsc0a93142018-09-05 15:42:26 -0700890 for fip in ep.fips:
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700891 ba = VppBridgeDomainArpEntry(self, epg_nat.bd.bd, ep.mac, fip)
892 ba.add_vpp_config()
Neale Ranns25b04942018-04-04 09:34:50 -0700893
Neale Rannsc0a93142018-09-05 15:42:26 -0700894 # floating IPs route via EPG recirc
895 r = VppIpRoute(self, fip.address, fip.length,
896 [VppRoutePath(fip.address,
897 ep.recirc.recirc.sw_if_index,
898 is_dvr=1,
899 proto=fip.dpo_proto)],
900 table_id=20,
901 is_ip6=fip.is_ip6)
902 r.add_vpp_config()
Neale Ranns25b04942018-04-04 09:34:50 -0700903
904 # L2 FIB entries in the NAT EPG BD to bridge the packets from
905 # the outside direct to the internal EPG
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700906 lf = VppL2FibEntry(self, epg_nat.bd.bd, ep.mac,
907 ep.recirc.recirc, bvi_mac=0)
908 lf.add_vpp_config()
Neale Ranns25b04942018-04-04 09:34:50 -0700909
910 #
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700911 # ARP packets for unknown IP are sent to the EPG uplink
Neale Ranns25b04942018-04-04 09:34:50 -0700912 #
913 pkt_arp = (Ether(dst="ff:ff:ff:ff:ff:ff",
914 src=self.pg0.remote_mac) /
915 ARP(op="who-has",
916 hwdst="ff:ff:ff:ff:ff:ff",
917 hwsrc=self.pg0.remote_mac,
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700918 pdst="10.0.0.88",
919 psrc="10.0.0.99"))
Neale Ranns25b04942018-04-04 09:34:50 -0700920
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700921 self.vapi.cli("clear trace")
922 self.pg0.add_stream(pkt_arp)
923
924 self.pg_enable_capture(self.pg_interfaces)
925 self.pg_start()
926
927 rxd = epgs[0].uplink.get_capture(1)
Neale Ranns25b04942018-04-04 09:34:50 -0700928
929 #
930 # ARP/ND packets get a response
931 #
932 pkt_arp = (Ether(dst="ff:ff:ff:ff:ff:ff",
933 src=self.pg0.remote_mac) /
934 ARP(op="who-has",
935 hwdst="ff:ff:ff:ff:ff:ff",
936 hwsrc=self.pg0.remote_mac,
Neale Ranns4d5b9172018-10-24 02:57:49 -0700937 pdst=epgs[0].bvi_ip4.address,
Neale Rannsc0a93142018-09-05 15:42:26 -0700938 psrc=eps[0].ip4.address))
Neale Ranns25b04942018-04-04 09:34:50 -0700939
940 self.send_and_expect(self.pg0, [pkt_arp], self.pg0)
941
Neale Rannsc0a93142018-09-05 15:42:26 -0700942 nsma = in6_getnsma(inet_pton(AF_INET6, eps[0].ip6.address))
Neale Ranns25b04942018-04-04 09:34:50 -0700943 d = inet_ntop(AF_INET6, nsma)
Neale Ranns93cc3ee2018-10-10 07:22:51 -0700944 pkt_nd = (Ether(dst=in6_getnsmac(nsma),
945 src=self.pg0.remote_mac) /
Neale Rannsc0a93142018-09-05 15:42:26 -0700946 IPv6(dst=d, src=eps[0].ip6.address) /
Neale Ranns4d5b9172018-10-24 02:57:49 -0700947 ICMPv6ND_NS(tgt=epgs[0].bvi_ip6.address) /
Neale Ranns25b04942018-04-04 09:34:50 -0700948 ICMPv6NDOptSrcLLAddr(lladdr=self.pg0.remote_mac))
949 self.send_and_expect(self.pg0, [pkt_nd], self.pg0)
950
951 #
952 # broadcast packets are flooded
953 #
954 pkt_bcast = (Ether(dst="ff:ff:ff:ff:ff:ff",
955 src=self.pg0.remote_mac) /
Neale Rannsc0a93142018-09-05 15:42:26 -0700956 IP(src=eps[0].ip4.address, dst="232.1.1.1") /
Neale Ranns25b04942018-04-04 09:34:50 -0700957 UDP(sport=1234, dport=1234) /
958 Raw('\xa5' * 100))
959
960 self.vapi.cli("clear trace")
961 self.pg0.add_stream(pkt_bcast)
962
963 self.pg_enable_capture(self.pg_interfaces)
964 self.pg_start()
965
966 rxd = eps[1].itf.get_capture(1)
967 self.assertEqual(rxd[0][Ether].dst, pkt_bcast[Ether].dst)
968 rxd = epgs[0].uplink.get_capture(1)
969 self.assertEqual(rxd[0][Ether].dst, pkt_bcast[Ether].dst)
970
971 #
972 # packets to non-local L3 destinations dropped
973 #
974 pkt_intra_epg_220_ip4 = (Ether(src=self.pg0.remote_mac,
Ole Troan8006c6a2018-12-17 12:02:26 +0100975 dst=str(self.router_mac)) /
Neale Rannsc0a93142018-09-05 15:42:26 -0700976 IP(src=eps[0].ip4.address,
977 dst="10.0.0.99") /
Neale Ranns25b04942018-04-04 09:34:50 -0700978 UDP(sport=1234, dport=1234) /
979 Raw('\xa5' * 100))
980 pkt_inter_epg_222_ip4 = (Ether(src=self.pg0.remote_mac,
Ole Troan8006c6a2018-12-17 12:02:26 +0100981 dst=str(self.router_mac)) /
Neale Rannsc0a93142018-09-05 15:42:26 -0700982 IP(src=eps[0].ip4.address,
983 dst="10.0.1.99") /
Neale Ranns25b04942018-04-04 09:34:50 -0700984 UDP(sport=1234, dport=1234) /
985 Raw('\xa5' * 100))
986
987 self.send_and_assert_no_replies(self.pg0, pkt_intra_epg_220_ip4 * 65)
988
989 pkt_inter_epg_222_ip6 = (Ether(src=self.pg0.remote_mac,
Ole Troan8006c6a2018-12-17 12:02:26 +0100990 dst=str(self.router_mac)) /
Neale Rannsc0a93142018-09-05 15:42:26 -0700991 IPv6(src=eps[0].ip6.address,
992 dst="2001:10::99") /
Neale Ranns25b04942018-04-04 09:34:50 -0700993 UDP(sport=1234, dport=1234) /
994 Raw('\xa5' * 100))
995 self.send_and_assert_no_replies(self.pg0, pkt_inter_epg_222_ip6 * 65)
996
997 #
998 # Add the subnet routes
999 #
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001000 s41 = VppGbpSubnet(
1001 self, rd0, "10.0.0.0", 24,
1002 VppEnum.vl_api_gbp_subnet_type_t.GBP_API_SUBNET_STITCHED_INTERNAL)
1003 s42 = VppGbpSubnet(
1004 self, rd0, "10.0.1.0", 24,
1005 VppEnum.vl_api_gbp_subnet_type_t.GBP_API_SUBNET_STITCHED_INTERNAL)
1006 s43 = VppGbpSubnet(
1007 self, rd0, "10.0.2.0", 24,
1008 VppEnum.vl_api_gbp_subnet_type_t.GBP_API_SUBNET_STITCHED_INTERNAL)
1009 s61 = VppGbpSubnet(
1010 self, rd0, "2001:10::1", 64,
1011 VppEnum.vl_api_gbp_subnet_type_t.GBP_API_SUBNET_STITCHED_INTERNAL)
1012 s62 = VppGbpSubnet(
1013 self, rd0, "2001:10:1::1", 64,
1014 VppEnum.vl_api_gbp_subnet_type_t.GBP_API_SUBNET_STITCHED_INTERNAL)
1015 s63 = VppGbpSubnet(
1016 self, rd0, "2001:10:2::1", 64,
1017 VppEnum.vl_api_gbp_subnet_type_t.GBP_API_SUBNET_STITCHED_INTERNAL)
Neale Ranns25b04942018-04-04 09:34:50 -07001018 s41.add_vpp_config()
1019 s42.add_vpp_config()
1020 s43.add_vpp_config()
Neale Ranns25b04942018-04-04 09:34:50 -07001021 s61.add_vpp_config()
1022 s62.add_vpp_config()
1023 s63.add_vpp_config()
1024
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001025 self.send_and_expect_bridged(eps[0].itf,
Neale Ranns25b04942018-04-04 09:34:50 -07001026 pkt_intra_epg_220_ip4 * 65,
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001027 eps[0].epg.uplink)
1028 self.send_and_expect_bridged(eps[0].itf,
Neale Ranns25b04942018-04-04 09:34:50 -07001029 pkt_inter_epg_222_ip4 * 65,
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001030 eps[0].epg.uplink)
1031 self.send_and_expect_bridged6(eps[0].itf,
Neale Ranns25b04942018-04-04 09:34:50 -07001032 pkt_inter_epg_222_ip6 * 65,
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001033 eps[0].epg.uplink)
Neale Ranns25b04942018-04-04 09:34:50 -07001034
1035 self.logger.info(self.vapi.cli("sh ip fib 11.0.0.2"))
1036 self.logger.info(self.vapi.cli("sh gbp endpoint-group"))
1037 self.logger.info(self.vapi.cli("sh gbp endpoint"))
1038 self.logger.info(self.vapi.cli("sh gbp recirc"))
1039 self.logger.info(self.vapi.cli("sh int"))
1040 self.logger.info(self.vapi.cli("sh int addr"))
1041 self.logger.info(self.vapi.cli("sh int feat loop6"))
1042 self.logger.info(self.vapi.cli("sh vlib graph ip4-gbp-src-classify"))
1043 self.logger.info(self.vapi.cli("sh int feat loop3"))
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001044 self.logger.info(self.vapi.cli("sh int feat pg0"))
Neale Ranns25b04942018-04-04 09:34:50 -07001045
1046 #
1047 # Packet destined to unknown unicast is sent on the epg uplink ...
1048 #
1049 pkt_intra_epg_220_to_uplink = (Ether(src=self.pg0.remote_mac,
1050 dst="00:00:00:33:44:55") /
Neale Rannsc0a93142018-09-05 15:42:26 -07001051 IP(src=eps[0].ip4.address,
1052 dst="10.0.0.99") /
Neale Ranns25b04942018-04-04 09:34:50 -07001053 UDP(sport=1234, dport=1234) /
1054 Raw('\xa5' * 100))
1055
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001056 self.send_and_expect_bridged(eps[0].itf,
Neale Ranns25b04942018-04-04 09:34:50 -07001057 pkt_intra_epg_220_to_uplink * 65,
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001058 eps[0].epg.uplink)
Neale Ranns25b04942018-04-04 09:34:50 -07001059 # ... and nowhere else
1060 self.pg1.get_capture(0, timeout=0.1)
1061 self.pg1.assert_nothing_captured(remark="Flood onto other VMS")
1062
1063 pkt_intra_epg_221_to_uplink = (Ether(src=self.pg2.remote_mac,
1064 dst="00:00:00:33:44:66") /
Neale Rannsc0a93142018-09-05 15:42:26 -07001065 IP(src=eps[0].ip4.address,
1066 dst="10.0.0.99") /
Neale Ranns25b04942018-04-04 09:34:50 -07001067 UDP(sport=1234, dport=1234) /
1068 Raw('\xa5' * 100))
1069
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001070 self.send_and_expect_bridged(eps[2].itf,
Neale Ranns25b04942018-04-04 09:34:50 -07001071 pkt_intra_epg_221_to_uplink * 65,
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001072 eps[2].epg.uplink)
Neale Ranns25b04942018-04-04 09:34:50 -07001073
1074 #
1075 # Packets from the uplink are forwarded in the absence of a contract
1076 #
1077 pkt_intra_epg_220_from_uplink = (Ether(src="00:00:00:33:44:55",
1078 dst=self.pg0.remote_mac) /
Neale Rannsc0a93142018-09-05 15:42:26 -07001079 IP(src=eps[0].ip4.address,
1080 dst="10.0.0.99") /
Neale Ranns25b04942018-04-04 09:34:50 -07001081 UDP(sport=1234, dport=1234) /
1082 Raw('\xa5' * 100))
1083
1084 self.send_and_expect_bridged(self.pg4,
1085 pkt_intra_epg_220_from_uplink * 65,
1086 self.pg0)
1087
1088 #
1089 # in the absence of policy, endpoints in the same EPG
Neale Rannsbc27d1b2018-02-05 01:13:38 -08001090 # can communicate
1091 #
1092 pkt_intra_epg = (Ether(src=self.pg0.remote_mac,
Neale Ranns25b04942018-04-04 09:34:50 -07001093 dst=self.pg1.remote_mac) /
Neale Rannsc0a93142018-09-05 15:42:26 -07001094 IP(src=eps[0].ip4.address,
1095 dst=eps[1].ip4.address) /
Neale Rannsbc27d1b2018-02-05 01:13:38 -08001096 UDP(sport=1234, dport=1234) /
1097 Raw('\xa5' * 100))
1098
Neale Ranns25b04942018-04-04 09:34:50 -07001099 self.send_and_expect_bridged(self.pg0, pkt_intra_epg * 65, self.pg1)
Neale Rannsbc27d1b2018-02-05 01:13:38 -08001100
1101 #
Paul Vinciguerra8feeaff2019-03-27 11:25:48 -07001102 # in the absence of policy, endpoints in the different EPG
Neale Rannsbc27d1b2018-02-05 01:13:38 -08001103 # cannot communicate
1104 #
1105 pkt_inter_epg_220_to_221 = (Ether(src=self.pg0.remote_mac,
Neale Ranns25b04942018-04-04 09:34:50 -07001106 dst=self.pg2.remote_mac) /
Neale Rannsc0a93142018-09-05 15:42:26 -07001107 IP(src=eps[0].ip4.address,
1108 dst=eps[2].ip4.address) /
Neale Rannsbc27d1b2018-02-05 01:13:38 -08001109 UDP(sport=1234, dport=1234) /
1110 Raw('\xa5' * 100))
1111 pkt_inter_epg_221_to_220 = (Ether(src=self.pg2.remote_mac,
Neale Ranns25b04942018-04-04 09:34:50 -07001112 dst=self.pg0.remote_mac) /
Neale Rannsc0a93142018-09-05 15:42:26 -07001113 IP(src=eps[2].ip4.address,
1114 dst=eps[0].ip4.address) /
Neale Ranns25b04942018-04-04 09:34:50 -07001115 UDP(sport=1234, dport=1234) /
1116 Raw('\xa5' * 100))
1117 pkt_inter_epg_220_to_222 = (Ether(src=self.pg0.remote_mac,
Ole Troan8006c6a2018-12-17 12:02:26 +01001118 dst=str(self.router_mac)) /
Neale Rannsc0a93142018-09-05 15:42:26 -07001119 IP(src=eps[0].ip4.address,
1120 dst=eps[3].ip4.address) /
Neale Rannsbc27d1b2018-02-05 01:13:38 -08001121 UDP(sport=1234, dport=1234) /
1122 Raw('\xa5' * 100))
1123
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001124 self.send_and_assert_no_replies(eps[0].itf,
Neale Rannsbc27d1b2018-02-05 01:13:38 -08001125 pkt_inter_epg_220_to_221 * 65)
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001126 self.send_and_assert_no_replies(eps[0].itf,
Neale Ranns25b04942018-04-04 09:34:50 -07001127 pkt_inter_epg_220_to_222 * 65)
Neale Rannsbc27d1b2018-02-05 01:13:38 -08001128
1129 #
1130 # A uni-directional contract from EPG 220 -> 221
1131 #
Mohsin Kazmi22b3b842018-04-17 19:35:42 +02001132 acl = VppGbpAcl(self)
1133 rule = acl.create_rule(permit_deny=1, proto=17)
1134 rule2 = acl.create_rule(is_ipv6=1, permit_deny=1, proto=17)
1135 acl_index = acl.add_vpp_config([rule, rule2])
Neale Ranns13a08cc2018-11-07 09:25:54 -08001136 c1 = VppGbpContract(
Neale Ranns4dd4cf42019-03-27 05:06:47 -07001137 self, epgs[0].sclass, epgs[1].sclass, acl_index,
Neale Ranns13a08cc2018-11-07 09:25:54 -08001138 [VppGbpContractRule(
1139 VppEnum.vl_api_gbp_rule_action_t.GBP_API_RULE_PERMIT,
1140 []),
1141 VppGbpContractRule(
1142 VppEnum.vl_api_gbp_rule_action_t.GBP_API_RULE_PERMIT,
Neale Ranns1c17e2e2018-12-20 12:03:59 -08001143 [])],
1144 [ETH_P_IP, ETH_P_IPV6])
Neale Rannsbc27d1b2018-02-05 01:13:38 -08001145 c1.add_vpp_config()
1146
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001147 self.send_and_expect_bridged(eps[0].itf,
Neale Ranns25b04942018-04-04 09:34:50 -07001148 pkt_inter_epg_220_to_221 * 65,
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001149 eps[2].itf)
1150 self.send_and_assert_no_replies(eps[0].itf,
Neale Ranns25b04942018-04-04 09:34:50 -07001151 pkt_inter_epg_220_to_222 * 65)
Neale Rannsbc27d1b2018-02-05 01:13:38 -08001152
1153 #
1154 # contract for the return direction
1155 #
Neale Ranns13a08cc2018-11-07 09:25:54 -08001156 c2 = VppGbpContract(
Neale Ranns4dd4cf42019-03-27 05:06:47 -07001157 self, epgs[1].sclass, epgs[0].sclass, acl_index,
Neale Ranns13a08cc2018-11-07 09:25:54 -08001158 [VppGbpContractRule(
1159 VppEnum.vl_api_gbp_rule_action_t.GBP_API_RULE_PERMIT,
1160 []),
1161 VppGbpContractRule(
1162 VppEnum.vl_api_gbp_rule_action_t.GBP_API_RULE_PERMIT,
Neale Ranns1c17e2e2018-12-20 12:03:59 -08001163 [])],
1164 [ETH_P_IP, ETH_P_IPV6])
Neale Rannsbc27d1b2018-02-05 01:13:38 -08001165 c2.add_vpp_config()
1166
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001167 self.send_and_expect_bridged(eps[0].itf,
Neale Ranns25b04942018-04-04 09:34:50 -07001168 pkt_inter_epg_220_to_221 * 65,
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001169 eps[2].itf)
1170 self.send_and_expect_bridged(eps[2].itf,
Neale Ranns25b04942018-04-04 09:34:50 -07001171 pkt_inter_epg_221_to_220 * 65,
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001172 eps[0].itf)
Neale Rannsbc27d1b2018-02-05 01:13:38 -08001173
Neale Ranns796c84b2019-03-28 07:56:23 -07001174 ds = c2.get_drop_stats()
1175 self.assertEqual(ds['packets'], 0)
1176 ps = c2.get_permit_stats()
1177 self.assertEqual(ps['packets'], 65)
1178
Neale Rannsbc27d1b2018-02-05 01:13:38 -08001179 #
Neale Ranns1c17e2e2018-12-20 12:03:59 -08001180 # the contract does not allow non-IP
1181 #
1182 pkt_non_ip_inter_epg_220_to_221 = (Ether(src=self.pg0.remote_mac,
1183 dst=self.pg2.remote_mac) /
1184 ARP())
1185 self.send_and_assert_no_replies(eps[0].itf,
1186 pkt_non_ip_inter_epg_220_to_221 * 17)
1187
1188 #
Neale Rannsbc27d1b2018-02-05 01:13:38 -08001189 # check that inter group is still disabled for the groups
1190 # not in the contract.
1191 #
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001192 self.send_and_assert_no_replies(eps[0].itf,
Neale Rannsbc27d1b2018-02-05 01:13:38 -08001193 pkt_inter_epg_220_to_222 * 65)
1194
Neale Ranns25b04942018-04-04 09:34:50 -07001195 #
1196 # A uni-directional contract from EPG 220 -> 222 'L3 routed'
1197 #
Neale Ranns13a08cc2018-11-07 09:25:54 -08001198 c3 = VppGbpContract(
Neale Ranns4dd4cf42019-03-27 05:06:47 -07001199 self, epgs[0].sclass, epgs[2].sclass, acl_index,
Neale Ranns13a08cc2018-11-07 09:25:54 -08001200 [VppGbpContractRule(
1201 VppEnum.vl_api_gbp_rule_action_t.GBP_API_RULE_PERMIT,
1202 []),
1203 VppGbpContractRule(
1204 VppEnum.vl_api_gbp_rule_action_t.GBP_API_RULE_PERMIT,
Neale Ranns1c17e2e2018-12-20 12:03:59 -08001205 [])],
1206 [ETH_P_IP, ETH_P_IPV6])
Neale Ranns25b04942018-04-04 09:34:50 -07001207 c3.add_vpp_config()
1208
Neale Rannsbc27d1b2018-02-05 01:13:38 -08001209 self.logger.info(self.vapi.cli("sh gbp contract"))
1210
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001211 self.send_and_expect_routed(eps[0].itf,
Neale Ranns25b04942018-04-04 09:34:50 -07001212 pkt_inter_epg_220_to_222 * 65,
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001213 eps[3].itf,
Ole Troan8006c6a2018-12-17 12:02:26 +01001214 str(self.router_mac))
Neale Ranns25b04942018-04-04 09:34:50 -07001215
Neale Rannsbc27d1b2018-02-05 01:13:38 -08001216 #
1217 # remove both contracts, traffic stops in both directions
1218 #
1219 c2.remove_vpp_config()
1220 c1.remove_vpp_config()
Neale Ranns25b04942018-04-04 09:34:50 -07001221 c3.remove_vpp_config()
Mohsin Kazmi22b3b842018-04-17 19:35:42 +02001222 acl.remove_vpp_config()
Neale Rannsbc27d1b2018-02-05 01:13:38 -08001223
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001224 self.send_and_assert_no_replies(eps[2].itf,
Neale Rannsbc27d1b2018-02-05 01:13:38 -08001225 pkt_inter_epg_221_to_220 * 65)
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001226 self.send_and_assert_no_replies(eps[0].itf,
Neale Rannsbc27d1b2018-02-05 01:13:38 -08001227 pkt_inter_epg_220_to_221 * 65)
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001228 self.send_and_expect_bridged(eps[0].itf,
1229 pkt_intra_epg * 65,
1230 eps[1].itf)
Neale Rannsbc27d1b2018-02-05 01:13:38 -08001231
1232 #
Neale Ranns25b04942018-04-04 09:34:50 -07001233 # EPs to the outside world
Neale Rannsbc27d1b2018-02-05 01:13:38 -08001234 #
Neale Rannsbc27d1b2018-02-05 01:13:38 -08001235
Neale Ranns25b04942018-04-04 09:34:50 -07001236 # in the EP's RD an external subnet via the NAT EPG's recirc
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001237 se1 = VppGbpSubnet(
1238 self, rd0, "0.0.0.0", 0,
1239 VppEnum.vl_api_gbp_subnet_type_t.GBP_API_SUBNET_STITCHED_EXTERNAL,
1240 sw_if_index=recirc_nat.recirc.sw_if_index,
Neale Ranns4dd4cf42019-03-27 05:06:47 -07001241 sclass=epg_nat.sclass)
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001242 se2 = VppGbpSubnet(
1243 self, rd0, "11.0.0.0", 8,
1244 VppEnum.vl_api_gbp_subnet_type_t.GBP_API_SUBNET_STITCHED_EXTERNAL,
1245 sw_if_index=recirc_nat.recirc.sw_if_index,
Neale Ranns4dd4cf42019-03-27 05:06:47 -07001246 sclass=epg_nat.sclass)
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001247 se16 = VppGbpSubnet(
1248 self, rd0, "::", 0,
1249 VppEnum.vl_api_gbp_subnet_type_t.GBP_API_SUBNET_STITCHED_EXTERNAL,
1250 sw_if_index=recirc_nat.recirc.sw_if_index,
Neale Ranns4dd4cf42019-03-27 05:06:47 -07001251 sclass=epg_nat.sclass)
Neale Ranns25b04942018-04-04 09:34:50 -07001252 # in the NAT RD an external subnet via the NAT EPG's uplink
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001253 se3 = VppGbpSubnet(
1254 self, rd20, "0.0.0.0", 0,
1255 VppEnum.vl_api_gbp_subnet_type_t.GBP_API_SUBNET_STITCHED_EXTERNAL,
1256 sw_if_index=epg_nat.uplink.sw_if_index,
Neale Ranns4dd4cf42019-03-27 05:06:47 -07001257 sclass=epg_nat.sclass)
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001258 se36 = VppGbpSubnet(
1259 self, rd20, "::", 0,
1260 VppEnum.vl_api_gbp_subnet_type_t.GBP_API_SUBNET_STITCHED_EXTERNAL,
1261 sw_if_index=epg_nat.uplink.sw_if_index,
Neale Ranns4dd4cf42019-03-27 05:06:47 -07001262 sclass=epg_nat.sclass)
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001263 se4 = VppGbpSubnet(
1264 self, rd20, "11.0.0.0", 8,
1265 VppEnum.vl_api_gbp_subnet_type_t.GBP_API_SUBNET_STITCHED_EXTERNAL,
1266 sw_if_index=epg_nat.uplink.sw_if_index,
Neale Ranns4dd4cf42019-03-27 05:06:47 -07001267 sclass=epg_nat.sclass)
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001268 se1.add_vpp_config()
1269 se2.add_vpp_config()
1270 se16.add_vpp_config()
Neale Ranns25b04942018-04-04 09:34:50 -07001271 se3.add_vpp_config()
Neale Ranns4a6d0232018-04-24 07:45:33 -07001272 se36.add_vpp_config()
Neale Ranns25b04942018-04-04 09:34:50 -07001273 se4.add_vpp_config()
Neale Rannsbc27d1b2018-02-05 01:13:38 -08001274
Neale Ranns25b04942018-04-04 09:34:50 -07001275 self.logger.info(self.vapi.cli("sh ip fib 0.0.0.0/0"))
1276 self.logger.info(self.vapi.cli("sh ip fib 11.0.0.1"))
Neale Ranns4a6d0232018-04-24 07:45:33 -07001277 self.logger.info(self.vapi.cli("sh ip6 fib ::/0"))
1278 self.logger.info(self.vapi.cli("sh ip6 fib %s" %
Neale Rannsc0a93142018-09-05 15:42:26 -07001279 eps[0].fip6))
Neale Ranns25b04942018-04-04 09:34:50 -07001280
Neale Ranns4a6d0232018-04-24 07:45:33 -07001281 #
Paul Vinciguerra8feeaff2019-03-27 11:25:48 -07001282 # From an EP to an outside address: IN2OUT
Neale Ranns4a6d0232018-04-24 07:45:33 -07001283 #
Neale Ranns25b04942018-04-04 09:34:50 -07001284 pkt_inter_epg_220_to_global = (Ether(src=self.pg0.remote_mac,
Ole Troan8006c6a2018-12-17 12:02:26 +01001285 dst=str(self.router_mac)) /
Neale Rannsc0a93142018-09-05 15:42:26 -07001286 IP(src=eps[0].ip4.address,
1287 dst="1.1.1.1") /
Neale Ranns25b04942018-04-04 09:34:50 -07001288 UDP(sport=1234, dport=1234) /
1289 Raw('\xa5' * 100))
1290
1291 # no policy yet
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001292 self.send_and_assert_no_replies(eps[0].itf,
Neale Ranns25b04942018-04-04 09:34:50 -07001293 pkt_inter_epg_220_to_global * 65)
1294
Mohsin Kazmi22b3b842018-04-17 19:35:42 +02001295 acl2 = VppGbpAcl(self)
1296 rule = acl2.create_rule(permit_deny=1, proto=17, sport_from=1234,
1297 sport_to=1234, dport_from=1234, dport_to=1234)
1298 rule2 = acl2.create_rule(is_ipv6=1, permit_deny=1, proto=17,
1299 sport_from=1234, sport_to=1234,
1300 dport_from=1234, dport_to=1234)
1301
1302 acl_index2 = acl2.add_vpp_config([rule, rule2])
Neale Ranns13a08cc2018-11-07 09:25:54 -08001303 c4 = VppGbpContract(
Neale Ranns4dd4cf42019-03-27 05:06:47 -07001304 self, epgs[0].sclass, epgs[3].sclass, acl_index2,
Neale Ranns13a08cc2018-11-07 09:25:54 -08001305 [VppGbpContractRule(
1306 VppEnum.vl_api_gbp_rule_action_t.GBP_API_RULE_PERMIT,
1307 []),
1308 VppGbpContractRule(
1309 VppEnum.vl_api_gbp_rule_action_t.GBP_API_RULE_PERMIT,
Neale Ranns1c17e2e2018-12-20 12:03:59 -08001310 [])],
1311 [ETH_P_IP, ETH_P_IPV6])
Neale Ranns25b04942018-04-04 09:34:50 -07001312 c4.add_vpp_config()
1313
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001314 self.send_and_expect_natted(eps[0].itf,
Neale Ranns25b04942018-04-04 09:34:50 -07001315 pkt_inter_epg_220_to_global * 65,
1316 self.pg7,
Neale Rannsc0a93142018-09-05 15:42:26 -07001317 eps[0].fip4.address)
Neale Ranns25b04942018-04-04 09:34:50 -07001318
Neale Ranns4a6d0232018-04-24 07:45:33 -07001319 pkt_inter_epg_220_to_global = (Ether(src=self.pg0.remote_mac,
Ole Troan8006c6a2018-12-17 12:02:26 +01001320 dst=str(self.router_mac)) /
Neale Rannsc0a93142018-09-05 15:42:26 -07001321 IPv6(src=eps[0].ip6.address,
1322 dst="6001::1") /
Neale Ranns4a6d0232018-04-24 07:45:33 -07001323 UDP(sport=1234, dport=1234) /
1324 Raw('\xa5' * 100))
1325
1326 self.send_and_expect_natted6(self.pg0,
1327 pkt_inter_epg_220_to_global * 65,
1328 self.pg7,
Neale Rannsc0a93142018-09-05 15:42:26 -07001329 eps[0].fip6.address)
Neale Ranns4a6d0232018-04-24 07:45:33 -07001330
1331 #
1332 # From a global address to an EP: OUT2IN
1333 #
Ole Troan8006c6a2018-12-17 12:02:26 +01001334 pkt_inter_epg_220_from_global = (Ether(src=str(self.router_mac),
Neale Ranns25b04942018-04-04 09:34:50 -07001335 dst=self.pg0.remote_mac) /
Neale Rannsc0a93142018-09-05 15:42:26 -07001336 IP(dst=eps[0].fip4.address,
Neale Ranns25b04942018-04-04 09:34:50 -07001337 src="1.1.1.1") /
1338 UDP(sport=1234, dport=1234) /
1339 Raw('\xa5' * 100))
1340
1341 self.send_and_assert_no_replies(self.pg7,
1342 pkt_inter_epg_220_from_global * 65)
1343
Neale Ranns13a08cc2018-11-07 09:25:54 -08001344 c5 = VppGbpContract(
Neale Ranns4dd4cf42019-03-27 05:06:47 -07001345 self, epgs[3].sclass, epgs[0].sclass, acl_index2,
Neale Ranns13a08cc2018-11-07 09:25:54 -08001346 [VppGbpContractRule(
1347 VppEnum.vl_api_gbp_rule_action_t.GBP_API_RULE_PERMIT,
1348 []),
1349 VppGbpContractRule(
1350 VppEnum.vl_api_gbp_rule_action_t.GBP_API_RULE_PERMIT,
Neale Ranns1c17e2e2018-12-20 12:03:59 -08001351 [])],
1352 [ETH_P_IP, ETH_P_IPV6])
Neale Ranns25b04942018-04-04 09:34:50 -07001353 c5.add_vpp_config()
1354
1355 self.send_and_expect_unnatted(self.pg7,
1356 pkt_inter_epg_220_from_global * 65,
Neale Ranns4a6d0232018-04-24 07:45:33 -07001357 eps[0].itf,
Neale Rannsc0a93142018-09-05 15:42:26 -07001358 eps[0].ip4.address)
Neale Ranns25b04942018-04-04 09:34:50 -07001359
Ole Troan8006c6a2018-12-17 12:02:26 +01001360 pkt_inter_epg_220_from_global = (Ether(src=str(self.router_mac),
Neale Ranns4a6d0232018-04-24 07:45:33 -07001361 dst=self.pg0.remote_mac) /
Neale Rannsc0a93142018-09-05 15:42:26 -07001362 IPv6(dst=eps[0].fip6.address,
Neale Ranns4a6d0232018-04-24 07:45:33 -07001363 src="6001::1") /
1364 UDP(sport=1234, dport=1234) /
1365 Raw('\xa5' * 100))
1366
1367 self.send_and_expect_unnatted6(self.pg7,
1368 pkt_inter_epg_220_from_global * 65,
Neale Rannsc0a93142018-09-05 15:42:26 -07001369 eps[0].itf,
1370 eps[0].ip6.address)
Neale Ranns4a6d0232018-04-24 07:45:33 -07001371
1372 #
1373 # From a local VM to another local VM using resp. public addresses:
1374 # IN2OUT2IN
1375 #
Neale Ranns25b04942018-04-04 09:34:50 -07001376 pkt_intra_epg_220_global = (Ether(src=self.pg0.remote_mac,
Ole Troan8006c6a2018-12-17 12:02:26 +01001377 dst=str(self.router_mac)) /
Neale Rannsc0a93142018-09-05 15:42:26 -07001378 IP(src=eps[0].ip4.address,
1379 dst=eps[1].fip4.address) /
Neale Rannsbc27d1b2018-02-05 01:13:38 -08001380 UDP(sport=1234, dport=1234) /
1381 Raw('\xa5' * 100))
1382
Neale Ranns4a6d0232018-04-24 07:45:33 -07001383 self.send_and_expect_double_natted(eps[0].itf,
Neale Ranns25b04942018-04-04 09:34:50 -07001384 pkt_intra_epg_220_global * 65,
Neale Ranns4a6d0232018-04-24 07:45:33 -07001385 eps[1].itf,
Neale Rannsc0a93142018-09-05 15:42:26 -07001386 eps[0].fip4.address,
1387 eps[1].ip4.address)
Neale Ranns4a6d0232018-04-24 07:45:33 -07001388
Neale Rannsc0a93142018-09-05 15:42:26 -07001389 pkt_intra_epg_220_global = (Ether(src=self.pg0.remote_mac,
Ole Troan8006c6a2018-12-17 12:02:26 +01001390 dst=str(self.router_mac)) /
Neale Rannsc0a93142018-09-05 15:42:26 -07001391 IPv6(src=eps[0].ip6.address,
1392 dst=eps[1].fip6.address) /
Neale Ranns4a6d0232018-04-24 07:45:33 -07001393 UDP(sport=1234, dport=1234) /
1394 Raw('\xa5' * 100))
1395
Neale Rannsc0a93142018-09-05 15:42:26 -07001396 self.send_and_expect_double_natted6(eps[0].itf,
Neale Ranns4a6d0232018-04-24 07:45:33 -07001397 pkt_intra_epg_220_global * 65,
Neale Rannsc0a93142018-09-05 15:42:26 -07001398 eps[1].itf,
1399 eps[0].fip6.address,
1400 eps[1].ip6.address)
Neale Rannsbc27d1b2018-02-05 01:13:38 -08001401
1402 #
Neale Ranns25b04942018-04-04 09:34:50 -07001403 # cleanup
Neale Rannsbc27d1b2018-02-05 01:13:38 -08001404 #
Neale Ranns25b04942018-04-04 09:34:50 -07001405 for ep in eps:
1406 # del static mappings for each EP from the 10/8 to 11/8 network
Neale Rannsc0a93142018-09-05 15:42:26 -07001407 self.vapi.nat44_add_del_static_mapping(ep.ip4.bytes,
1408 ep.fip4.bytes,
1409 vrf_id=0,
1410 addr_only=1,
1411 is_add=0)
1412 self.vapi.nat66_add_del_static_mapping(ep.ip6.bytes,
1413 ep.fip6.bytes,
1414 vrf_id=0,
1415 is_add=0)
Neale Rannsbc27d1b2018-02-05 01:13:38 -08001416
Neale Ranns25b04942018-04-04 09:34:50 -07001417 for epg in epgs:
1418 # IP config on the BVI interfaces
Neale Ranns25b04942018-04-04 09:34:50 -07001419 if epg != epgs[0] and epg != epgs[3]:
Neale Ranns25b04942018-04-04 09:34:50 -07001420 self.vapi.nat44_interface_add_del_feature(epg.bvi.sw_if_index,
1421 is_inside=1,
1422 is_add=0)
Neale Ranns4a6d0232018-04-24 07:45:33 -07001423 self.vapi.nat66_add_del_interface(epg.bvi.sw_if_index,
1424 is_inside=1,
1425 is_add=0)
Neale Rannsbc27d1b2018-02-05 01:13:38 -08001426
Neale Ranns25b04942018-04-04 09:34:50 -07001427 for recirc in recircs:
Neale Ranns4a6d0232018-04-24 07:45:33 -07001428 self.vapi.nat44_interface_add_del_feature(
1429 recirc.recirc.sw_if_index,
1430 is_inside=0,
1431 is_add=0)
1432 self.vapi.nat66_add_del_interface(
1433 recirc.recirc.sw_if_index,
1434 is_inside=0,
1435 is_add=0)
Neale Rannsbc27d1b2018-02-05 01:13:38 -08001436
Neale Ranns774356a2018-11-29 12:02:16 +00001437 def wait_for_ep_timeout(self, sw_if_index=None, ip=None, mac=None,
1438 n_tries=100, s_time=1):
1439 while (n_tries):
1440 if not find_gbp_endpoint(self, sw_if_index, ip, mac):
1441 return True
1442 n_tries = n_tries - 1
1443 self.sleep(s_time)
1444 self.assertFalse(find_gbp_endpoint(self, sw_if_index, ip, mac))
1445 return False
1446
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001447 def test_gbp_learn_l2(self):
1448 """ GBP L2 Endpoint Learning """
1449
Neale Ranns796c84b2019-03-28 07:56:23 -07001450 self.vapi.cli("clear errors")
1451
Neale Rannsb6a47952018-11-21 05:44:35 -08001452 ep_flags = VppEnum.vl_api_gbp_endpoint_flags_t
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001453 learnt = [{'mac': '00:00:11:11:11:01',
1454 'ip': '10.0.0.1',
1455 'ip6': '2001:10::2'},
1456 {'mac': '00:00:11:11:11:02',
1457 'ip': '10.0.0.2',
1458 'ip6': '2001:10::3'}]
1459
1460 #
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001461 # IP tables
1462 #
1463 gt4 = VppIpTable(self, 1)
1464 gt4.add_vpp_config()
1465 gt6 = VppIpTable(self, 1, is_ip6=True)
1466 gt6.add_vpp_config()
1467
1468 rd1 = VppGbpRouteDomain(self, 1, gt4, gt6)
1469 rd1.add_vpp_config()
1470
1471 #
1472 # Pg2 hosts the vxlan tunnel, hosts on pg2 to act as TEPs
1473 # Pg3 hosts the IP4 UU-flood VXLAN tunnel
1474 # Pg4 hosts the IP6 UU-flood VXLAN tunnel
1475 #
1476 self.pg2.config_ip4()
1477 self.pg2.resolve_arp()
1478 self.pg2.generate_remote_hosts(4)
1479 self.pg2.configure_ipv4_neighbors()
1480 self.pg3.config_ip4()
1481 self.pg3.resolve_arp()
1482 self.pg4.config_ip4()
1483 self.pg4.resolve_arp()
1484
1485 #
Neale Ranns879d11c2019-01-21 23:34:18 -08001486 # Add a mcast destination VXLAN-GBP tunnel for B&M traffic
1487 #
1488 tun_bm = VppVxlanGbpTunnel(self, self.pg4.local_ip4,
1489 "239.1.1.1", 88,
1490 mcast_itf=self.pg4)
1491 tun_bm.add_vpp_config()
1492
1493 #
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001494 # a GBP bridge domain with a BVI and a UU-flood interface
1495 #
1496 bd1 = VppBridgeDomain(self, 1)
1497 bd1.add_vpp_config()
Neale Ranns879d11c2019-01-21 23:34:18 -08001498 gbd1 = VppGbpBridgeDomain(self, bd1, self.loop0, self.pg3, tun_bm)
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001499 gbd1.add_vpp_config()
1500
1501 self.logger.info(self.vapi.cli("sh bridge 1 detail"))
1502 self.logger.info(self.vapi.cli("sh gbp bridge"))
1503
1504 # ... and has a /32 applied
1505 ip_addr = VppIpInterfaceAddress(self, gbd1.bvi, "10.0.0.128", 32)
1506 ip_addr.add_vpp_config()
1507
1508 #
1509 # The Endpoint-group in which we are learning endpoints
1510 #
Neale Ranns879d11c2019-01-21 23:34:18 -08001511 epg_220 = VppGbpEndpointGroup(self, 220, 112, rd1, gbd1,
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001512 None, self.loop0,
1513 "10.0.0.128",
Neale Ranns32f6d8e2019-03-05 04:22:08 -08001514 "2001:10::128",
1515 VppGbpEndpointRetention(2))
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001516 epg_220.add_vpp_config()
Neale Ranns879d11c2019-01-21 23:34:18 -08001517 epg_330 = VppGbpEndpointGroup(self, 330, 113, rd1, gbd1,
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001518 None, self.loop1,
1519 "10.0.1.128",
Neale Ranns32f6d8e2019-03-05 04:22:08 -08001520 "2001:11::128",
1521 VppGbpEndpointRetention(2))
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001522 epg_330.add_vpp_config()
1523
1524 #
1525 # The VXLAN GBP tunnel is a bridge-port and has L2 endpoint
Paul Vinciguerra8feeaff2019-03-27 11:25:48 -07001526 # learning enabled
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001527 #
1528 vx_tun_l2_1 = VppGbpVxlanTunnel(
1529 self, 99, bd1.bd_id,
Neale Ranns8da9fc62019-03-04 14:08:11 -08001530 VppEnum.vl_api_gbp_vxlan_tunnel_mode_t.GBP_VXLAN_TUNNEL_MODE_L2,
1531 self.pg2.local_ip4)
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001532 vx_tun_l2_1.add_vpp_config()
1533
1534 #
1535 # A static endpoint that the learnt endpoints are trying to
1536 # talk to
1537 #
1538 ep = VppGbpEndpoint(self, self.pg0,
1539 epg_220, None,
1540 "10.0.0.127", "11.0.0.127",
1541 "2001:10::1", "3001::1")
1542 ep.add_vpp_config()
1543
1544 self.assertTrue(find_route(self, ep.ip4.address, 32, table_id=1))
1545
Paul Vinciguerra8feeaff2019-03-27 11:25:48 -07001546 # a packet with an sclass from an unknown EPG
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001547 p = (Ether(src=self.pg2.remote_mac,
1548 dst=self.pg2.local_mac) /
1549 IP(src=self.pg2.remote_hosts[0].ip4,
1550 dst=self.pg2.local_ip4) /
1551 UDP(sport=1234, dport=48879) /
1552 VXLAN(vni=99, gpid=88, flags=0x88) /
1553 Ether(src=learnt[0]["mac"], dst=ep.mac) /
1554 IP(src=learnt[0]["ip"], dst=ep.ip4.address) /
1555 UDP(sport=1234, dport=1234) /
1556 Raw('\xa5' * 100))
1557
1558 self.send_and_assert_no_replies(self.pg2, p)
1559
Neale Ranns796c84b2019-03-28 07:56:23 -07001560 self.logger.info(self.vapi.cli("sh error"))
1561 # self.assert_packet_counter_equal(
1562 # '/err/gbp-policy-port/drop-no-contract', 1)
1563
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001564 #
1565 # we should not have learnt a new tunnel endpoint, since
1566 # the EPG was not learnt.
1567 #
1568 self.assertEqual(INDEX_INVALID,
1569 find_vxlan_gbp_tunnel(self,
1570 self.pg2.local_ip4,
1571 self.pg2.remote_hosts[0].ip4,
1572 99))
1573
Paul Vinciguerra7f9b7f92019-03-12 19:23:27 -07001574 # epg is not learnt, because the EPG is unknown
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001575 self.assertEqual(len(self.vapi.gbp_endpoint_dump()), 1)
1576
Neale Ranns8da9fc62019-03-04 14:08:11 -08001577 #
1578 # Learn new EPs from IP packets
1579 #
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001580 for ii, l in enumerate(learnt):
Paul Vinciguerra8feeaff2019-03-27 11:25:48 -07001581 # a packet with an sclass from a known EPG
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001582 # arriving on an unknown TEP
1583 p = (Ether(src=self.pg2.remote_mac,
1584 dst=self.pg2.local_mac) /
1585 IP(src=self.pg2.remote_hosts[1].ip4,
1586 dst=self.pg2.local_ip4) /
1587 UDP(sport=1234, dport=48879) /
Neale Ranns879d11c2019-01-21 23:34:18 -08001588 VXLAN(vni=99, gpid=112, flags=0x88) /
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001589 Ether(src=l['mac'], dst=ep.mac) /
1590 IP(src=l['ip'], dst=ep.ip4.address) /
1591 UDP(sport=1234, dport=1234) /
1592 Raw('\xa5' * 100))
1593
1594 rx = self.send_and_expect(self.pg2, [p], self.pg0)
1595
1596 # the new TEP
1597 tep1_sw_if_index = find_vxlan_gbp_tunnel(
1598 self,
1599 self.pg2.local_ip4,
1600 self.pg2.remote_hosts[1].ip4,
1601 99)
1602 self.assertNotEqual(INDEX_INVALID, tep1_sw_if_index)
1603
1604 #
1605 # the EP is learnt via the learnt TEP
1606 # both from its MAC and its IP
1607 #
1608 self.assertTrue(find_gbp_endpoint(self,
1609 vx_tun_l2_1.sw_if_index,
1610 mac=l['mac']))
1611 self.assertTrue(find_gbp_endpoint(self,
1612 vx_tun_l2_1.sw_if_index,
1613 ip=l['ip']))
1614
Neale Ranns796c84b2019-03-28 07:56:23 -07001615 # self.assert_packet_counter_equal(
1616 # '/err/gbp-policy-port/allow-intra-sclass', 2)
1617
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001618 self.logger.info(self.vapi.cli("show gbp endpoint"))
1619 self.logger.info(self.vapi.cli("show gbp vxlan"))
Neale Ranns8da9fc62019-03-04 14:08:11 -08001620 self.logger.info(self.vapi.cli("show ip mfib"))
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001621
1622 #
1623 # If we sleep for the threshold time, the learnt endpoints should
1624 # age out
1625 #
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001626 for l in learnt:
Neale Ranns774356a2018-11-29 12:02:16 +00001627 self.wait_for_ep_timeout(vx_tun_l2_1.sw_if_index,
1628 mac=l['mac'])
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001629
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001630 #
Neale Ranns8da9fc62019-03-04 14:08:11 -08001631 # Learn new EPs from GARP packets received on the BD's mcast tunnel
1632 #
1633 for ii, l in enumerate(learnt):
Paul Vinciguerra8feeaff2019-03-27 11:25:48 -07001634 # a packet with an sclass from a known EPG
Neale Ranns8da9fc62019-03-04 14:08:11 -08001635 # arriving on an unknown TEP
1636 p = (Ether(src=self.pg2.remote_mac,
1637 dst=self.pg2.local_mac) /
1638 IP(src=self.pg2.remote_hosts[1].ip4,
1639 dst="239.1.1.1") /
1640 UDP(sport=1234, dport=48879) /
1641 VXLAN(vni=88, gpid=112, flags=0x88) /
1642 Ether(src=l['mac'], dst="ff:ff:ff:ff:ff:ff") /
1643 ARP(op="who-has",
1644 psrc=l['ip'], pdst=l['ip'],
1645 hwsrc=l['mac'], hwdst="ff:ff:ff:ff:ff:ff"))
1646
1647 rx = self.send_and_expect(self.pg4, [p], self.pg0)
1648
1649 # the new TEP
1650 tep1_sw_if_index = find_vxlan_gbp_tunnel(
1651 self,
1652 self.pg2.local_ip4,
1653 self.pg2.remote_hosts[1].ip4,
1654 99)
1655 self.assertNotEqual(INDEX_INVALID, tep1_sw_if_index)
1656
1657 #
1658 # the EP is learnt via the learnt TEP
1659 # both from its MAC and its IP
1660 #
1661 self.assertTrue(find_gbp_endpoint(self,
1662 vx_tun_l2_1.sw_if_index,
1663 mac=l['mac']))
1664 self.assertTrue(find_gbp_endpoint(self,
1665 vx_tun_l2_1.sw_if_index,
1666 ip=l['ip']))
1667
1668 #
1669 # wait for the learnt endpoints to age out
1670 #
1671 for l in learnt:
1672 self.wait_for_ep_timeout(vx_tun_l2_1.sw_if_index,
1673 mac=l['mac'])
1674
1675 #
1676 # Learn new EPs from L2 packets
1677 #
1678 for ii, l in enumerate(learnt):
Paul Vinciguerra8feeaff2019-03-27 11:25:48 -07001679 # a packet with an sclass from a known EPG
Neale Ranns8da9fc62019-03-04 14:08:11 -08001680 # arriving on an unknown TEP
1681 p = (Ether(src=self.pg2.remote_mac,
1682 dst=self.pg2.local_mac) /
1683 IP(src=self.pg2.remote_hosts[1].ip4,
1684 dst=self.pg2.local_ip4) /
1685 UDP(sport=1234, dport=48879) /
1686 VXLAN(vni=99, gpid=112, flags=0x88) /
1687 Ether(src=l['mac'], dst=ep.mac) /
1688 Raw('\xa5' * 100))
1689
1690 rx = self.send_and_expect(self.pg2, [p], self.pg0)
1691
1692 # the new TEP
1693 tep1_sw_if_index = find_vxlan_gbp_tunnel(
1694 self,
1695 self.pg2.local_ip4,
1696 self.pg2.remote_hosts[1].ip4,
1697 99)
1698 self.assertNotEqual(INDEX_INVALID, tep1_sw_if_index)
1699
1700 #
1701 # the EP is learnt via the learnt TEP
1702 # both from its MAC and its IP
1703 #
1704 self.assertTrue(find_gbp_endpoint(self,
1705 vx_tun_l2_1.sw_if_index,
1706 mac=l['mac']))
1707
1708 self.logger.info(self.vapi.cli("show gbp endpoint"))
1709 self.logger.info(self.vapi.cli("show gbp vxlan"))
1710 self.logger.info(self.vapi.cli("show vxlan-gbp tunnel"))
1711
1712 #
1713 # wait for the learnt endpoints to age out
1714 #
1715 for l in learnt:
1716 self.wait_for_ep_timeout(vx_tun_l2_1.sw_if_index,
1717 mac=l['mac'])
1718
1719 #
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001720 # repeat. the do not learn bit is set so the EPs are not learnt
1721 #
1722 for l in learnt:
Paul Vinciguerra8feeaff2019-03-27 11:25:48 -07001723 # a packet with an sclass from a known EPG
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001724 p = (Ether(src=self.pg2.remote_mac,
1725 dst=self.pg2.local_mac) /
1726 IP(src=self.pg2.remote_hosts[1].ip4,
1727 dst=self.pg2.local_ip4) /
1728 UDP(sport=1234, dport=48879) /
Neale Ranns879d11c2019-01-21 23:34:18 -08001729 VXLAN(vni=99, gpid=112, flags=0x88, gpflags="D") /
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001730 Ether(src=l['mac'], dst=ep.mac) /
1731 IP(src=l['ip'], dst=ep.ip4.address) /
1732 UDP(sport=1234, dport=1234) /
1733 Raw('\xa5' * 100))
1734
1735 rx = self.send_and_expect(self.pg2, p*65, self.pg0)
1736
1737 for l in learnt:
1738 self.assertFalse(find_gbp_endpoint(self,
1739 vx_tun_l2_1.sw_if_index,
1740 mac=l['mac']))
1741
1742 #
1743 # repeat
1744 #
1745 for l in learnt:
Paul Vinciguerra8feeaff2019-03-27 11:25:48 -07001746 # a packet with an sclass from a known EPG
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001747 p = (Ether(src=self.pg2.remote_mac,
1748 dst=self.pg2.local_mac) /
1749 IP(src=self.pg2.remote_hosts[1].ip4,
1750 dst=self.pg2.local_ip4) /
1751 UDP(sport=1234, dport=48879) /
Neale Ranns879d11c2019-01-21 23:34:18 -08001752 VXLAN(vni=99, gpid=112, flags=0x88) /
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001753 Ether(src=l['mac'], dst=ep.mac) /
1754 IP(src=l['ip'], dst=ep.ip4.address) /
1755 UDP(sport=1234, dport=1234) /
1756 Raw('\xa5' * 100))
1757
1758 rx = self.send_and_expect(self.pg2, p*65, self.pg0)
1759
1760 self.assertTrue(find_gbp_endpoint(self,
1761 vx_tun_l2_1.sw_if_index,
1762 mac=l['mac']))
1763
1764 #
1765 # Static EP replies to dynamics
1766 #
1767 self.logger.info(self.vapi.cli("sh l2fib bd_id 1"))
1768 for l in learnt:
1769 p = (Ether(src=ep.mac, dst=l['mac']) /
1770 IP(dst=l['ip'], src=ep.ip4.address) /
1771 UDP(sport=1234, dport=1234) /
1772 Raw('\xa5' * 100))
1773
1774 rxs = self.send_and_expect(self.pg0, p * 17, self.pg2)
1775
1776 for rx in rxs:
1777 self.assertEqual(rx[IP].src, self.pg2.local_ip4)
1778 self.assertEqual(rx[IP].dst, self.pg2.remote_hosts[1].ip4)
1779 self.assertEqual(rx[UDP].dport, 48879)
1780 # the UDP source port is a random value for hashing
Neale Ranns879d11c2019-01-21 23:34:18 -08001781 self.assertEqual(rx[VXLAN].gpid, 112)
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001782 self.assertEqual(rx[VXLAN].vni, 99)
1783 self.assertTrue(rx[VXLAN].flags.G)
1784 self.assertTrue(rx[VXLAN].flags.Instance)
1785 self.assertTrue(rx[VXLAN].gpflags.A)
1786 self.assertFalse(rx[VXLAN].gpflags.D)
1787
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001788 for l in learnt:
Neale Ranns774356a2018-11-29 12:02:16 +00001789 self.wait_for_ep_timeout(vx_tun_l2_1.sw_if_index,
1790 mac=l['mac'])
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001791
1792 #
1793 # repeat in the other EPG
1794 # there's no contract between 220 and 330, but the A-bit is set
1795 # so the packet is cleared for delivery
1796 #
1797 for l in learnt:
Paul Vinciguerra8feeaff2019-03-27 11:25:48 -07001798 # a packet with an sclass from a known EPG
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001799 p = (Ether(src=self.pg2.remote_mac,
1800 dst=self.pg2.local_mac) /
1801 IP(src=self.pg2.remote_hosts[1].ip4,
1802 dst=self.pg2.local_ip4) /
1803 UDP(sport=1234, dport=48879) /
Neale Ranns879d11c2019-01-21 23:34:18 -08001804 VXLAN(vni=99, gpid=113, flags=0x88, gpflags='A') /
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001805 Ether(src=l['mac'], dst=ep.mac) /
1806 IP(src=l['ip'], dst=ep.ip4.address) /
1807 UDP(sport=1234, dport=1234) /
1808 Raw('\xa5' * 100))
1809
1810 rx = self.send_and_expect(self.pg2, p*65, self.pg0)
1811
1812 self.assertTrue(find_gbp_endpoint(self,
1813 vx_tun_l2_1.sw_if_index,
1814 mac=l['mac']))
1815
1816 #
1817 # static EP cannot reach the learnt EPs since there is no contract
Neale Ranns13a08cc2018-11-07 09:25:54 -08001818 # only test 1 EP as the others could timeout
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001819 #
Neale Ranns13a08cc2018-11-07 09:25:54 -08001820 p = (Ether(src=ep.mac, dst=l['mac']) /
1821 IP(dst=learnt[0]['ip'], src=ep.ip4.address) /
1822 UDP(sport=1234, dport=1234) /
1823 Raw('\xa5' * 100))
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001824
Neale Ranns13a08cc2018-11-07 09:25:54 -08001825 self.send_and_assert_no_replies(self.pg0, [p])
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001826
1827 #
1828 # refresh the entries after the check for no replies above
1829 #
1830 for l in learnt:
Paul Vinciguerra8feeaff2019-03-27 11:25:48 -07001831 # a packet with an sclass from a known EPG
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001832 p = (Ether(src=self.pg2.remote_mac,
1833 dst=self.pg2.local_mac) /
1834 IP(src=self.pg2.remote_hosts[1].ip4,
1835 dst=self.pg2.local_ip4) /
1836 UDP(sport=1234, dport=48879) /
Neale Ranns879d11c2019-01-21 23:34:18 -08001837 VXLAN(vni=99, gpid=113, flags=0x88, gpflags='A') /
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001838 Ether(src=l['mac'], dst=ep.mac) /
1839 IP(src=l['ip'], dst=ep.ip4.address) /
1840 UDP(sport=1234, dport=1234) /
1841 Raw('\xa5' * 100))
1842
1843 rx = self.send_and_expect(self.pg2, p*65, self.pg0)
1844
1845 self.assertTrue(find_gbp_endpoint(self,
1846 vx_tun_l2_1.sw_if_index,
1847 mac=l['mac']))
1848
1849 #
1850 # Add the contract so they can talk
1851 #
1852 acl = VppGbpAcl(self)
1853 rule = acl.create_rule(permit_deny=1, proto=17)
1854 rule2 = acl.create_rule(is_ipv6=1, permit_deny=1, proto=17)
1855 acl_index = acl.add_vpp_config([rule, rule2])
Neale Ranns13a08cc2018-11-07 09:25:54 -08001856 c1 = VppGbpContract(
Neale Ranns4dd4cf42019-03-27 05:06:47 -07001857 self, epg_220.sclass, epg_330.sclass, acl_index,
Neale Ranns13a08cc2018-11-07 09:25:54 -08001858 [VppGbpContractRule(
1859 VppEnum.vl_api_gbp_rule_action_t.GBP_API_RULE_PERMIT,
1860 []),
1861 VppGbpContractRule(
1862 VppEnum.vl_api_gbp_rule_action_t.GBP_API_RULE_PERMIT,
Neale Ranns1c17e2e2018-12-20 12:03:59 -08001863 [])],
1864 [ETH_P_IP, ETH_P_IPV6])
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001865 c1.add_vpp_config()
1866
1867 for l in learnt:
1868 p = (Ether(src=ep.mac, dst=l['mac']) /
1869 IP(dst=l['ip'], src=ep.ip4.address) /
1870 UDP(sport=1234, dport=1234) /
1871 Raw('\xa5' * 100))
1872
1873 self.send_and_expect(self.pg0, [p], self.pg2)
1874
1875 #
1876 # send UU packets from the local EP
1877 #
1878 self.logger.info(self.vapi.cli("sh bridge 1 detail"))
1879 self.logger.info(self.vapi.cli("sh gbp bridge"))
1880 p_uu = (Ether(src=ep.mac, dst="00:11:11:11:11:11") /
1881 IP(dst="10.0.0.133", src=ep.ip4.address) /
1882 UDP(sport=1234, dport=1234) /
1883 Raw('\xa5' * 100))
Neale Ranns879d11c2019-01-21 23:34:18 -08001884 rxs = self.send_and_expect(ep.itf, [p_uu], gbd1.uu_fwd)
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001885
1886 self.logger.info(self.vapi.cli("sh bridge 1 detail"))
1887
1888 p_bm = (Ether(src=ep.mac, dst="ff:ff:ff:ff:ff:ff") /
1889 IP(dst="10.0.0.133", src=ep.ip4.address) /
1890 UDP(sport=1234, dport=1234) /
1891 Raw('\xa5' * 100))
1892 rxs = self.send_and_expect_only(ep.itf, [p_bm], tun_bm.mcast_itf)
1893
Neale Ranns879d11c2019-01-21 23:34:18 -08001894 for rx in rxs:
1895 self.assertEqual(rx[IP].src, self.pg4.local_ip4)
1896 self.assertEqual(rx[IP].dst, "239.1.1.1")
1897 self.assertEqual(rx[UDP].dport, 48879)
1898 # the UDP source port is a random value for hashing
1899 self.assertEqual(rx[VXLAN].gpid, 112)
1900 self.assertEqual(rx[VXLAN].vni, 88)
1901 self.assertTrue(rx[VXLAN].flags.G)
1902 self.assertTrue(rx[VXLAN].flags.Instance)
1903 self.assertFalse(rx[VXLAN].gpflags.A)
1904 self.assertFalse(rx[VXLAN].gpflags.D)
1905
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001906 #
1907 # Check v6 Endpoints
1908 #
1909 for l in learnt:
Paul Vinciguerra8feeaff2019-03-27 11:25:48 -07001910 # a packet with an sclass from a known EPG
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001911 p = (Ether(src=self.pg2.remote_mac,
1912 dst=self.pg2.local_mac) /
1913 IP(src=self.pg2.remote_hosts[1].ip4,
1914 dst=self.pg2.local_ip4) /
1915 UDP(sport=1234, dport=48879) /
Neale Ranns879d11c2019-01-21 23:34:18 -08001916 VXLAN(vni=99, gpid=113, flags=0x88, gpflags='A') /
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001917 Ether(src=l['mac'], dst=ep.mac) /
1918 IPv6(src=l['ip6'], dst=ep.ip6.address) /
1919 UDP(sport=1234, dport=1234) /
1920 Raw('\xa5' * 100))
1921
1922 rx = self.send_and_expect(self.pg2, p*65, self.pg0)
1923
1924 self.assertTrue(find_gbp_endpoint(self,
1925 vx_tun_l2_1.sw_if_index,
1926 mac=l['mac']))
1927
1928 #
1929 # L3 Endpoint Learning
1930 # - configured on the bridge's BVI
1931 #
1932
1933 #
1934 # clean up
1935 #
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001936 for l in learnt:
Neale Ranns774356a2018-11-29 12:02:16 +00001937 self.wait_for_ep_timeout(vx_tun_l2_1.sw_if_index,
1938 mac=l['mac'])
Neale Ranns93cc3ee2018-10-10 07:22:51 -07001939 self.pg2.unconfig_ip4()
1940 self.pg3.unconfig_ip4()
1941 self.pg4.unconfig_ip4()
1942
1943 self.logger.info(self.vapi.cli("sh int"))
1944 self.logger.info(self.vapi.cli("sh gbp vxlan"))
1945
Mohsin Kazmi7363d472019-04-04 13:22:15 +02001946 def test_gbp_bd_flags(self):
1947 """ GBP BD FLAGS """
1948
1949 #
1950 # IP tables
1951 #
1952 gt4 = VppIpTable(self, 1)
1953 gt4.add_vpp_config()
1954 gt6 = VppIpTable(self, 1, is_ip6=True)
1955 gt6.add_vpp_config()
1956
1957 rd1 = VppGbpRouteDomain(self, 1, gt4, gt6)
1958 rd1.add_vpp_config()
1959
1960 #
1961 # Pg3 hosts the IP4 UU-flood VXLAN tunnel
1962 # Pg4 hosts the IP6 UU-flood VXLAN tunnel
1963 #
1964 self.pg3.config_ip4()
1965 self.pg3.resolve_arp()
1966 self.pg4.config_ip4()
1967 self.pg4.resolve_arp()
1968
1969 #
1970 # Add a mcast destination VXLAN-GBP tunnel for B&M traffic
1971 #
1972 tun_bm = VppVxlanGbpTunnel(self, self.pg4.local_ip4,
1973 "239.1.1.1", 88,
1974 mcast_itf=self.pg4)
1975 tun_bm.add_vpp_config()
1976
1977 #
1978 # a GBP bridge domain with a BVI and a UU-flood interface
1979 #
1980 bd1 = VppBridgeDomain(self, 1)
1981 bd1.add_vpp_config()
1982
1983 gbd1 = VppGbpBridgeDomain(self, bd1, self.loop0, self.pg3, tun_bm,
1984 uu_drop=True, bm_drop=True)
1985 gbd1.add_vpp_config()
1986
1987 self.logger.info(self.vapi.cli("sh bridge 1 detail"))
1988 self.logger.info(self.vapi.cli("sh gbp bridge"))
1989
1990 # ... and has a /32 applied
1991 ip_addr = VppIpInterfaceAddress(self, gbd1.bvi, "10.0.0.128", 32)
1992 ip_addr.add_vpp_config()
1993
1994 #
1995 # The Endpoint-group
1996 #
1997 epg_220 = VppGbpEndpointGroup(self, 220, 112, rd1, gbd1,
1998 None, self.loop0,
1999 "10.0.0.128",
2000 "2001:10::128",
2001 VppGbpEndpointRetention(2))
2002 epg_220.add_vpp_config()
2003
2004 ep = VppGbpEndpoint(self, self.pg0,
2005 epg_220, None,
2006 "10.0.0.127", "11.0.0.127",
2007 "2001:10::1", "3001::1")
2008 ep.add_vpp_config()
2009 #
2010 # send UU/BM packet from the local EP with UU drop and BM drop enabled
2011 # in bd
2012 #
2013 self.logger.info(self.vapi.cli("sh bridge 1 detail"))
2014 self.logger.info(self.vapi.cli("sh gbp bridge"))
2015 p_uu = (Ether(src=ep.mac, dst="00:11:11:11:11:11") /
2016 IP(dst="10.0.0.133", src=ep.ip4.address) /
2017 UDP(sport=1234, dport=1234) /
2018 Raw('\xa5' * 100))
2019 self.send_and_assert_no_replies(ep.itf, [p_uu])
2020
2021 p_bm = (Ether(src=ep.mac, dst="ff:ff:ff:ff:ff:ff") /
2022 IP(dst="10.0.0.133", src=ep.ip4.address) /
2023 UDP(sport=1234, dport=1234) /
2024 Raw('\xa5' * 100))
2025 self.send_and_assert_no_replies(ep.itf, [p_bm])
2026
2027 self.pg3.unconfig_ip4()
2028 self.pg4.unconfig_ip4()
2029
2030 self.logger.info(self.vapi.cli("sh int"))
2031
Neale Rannsc29c0af2018-11-07 04:21:12 -08002032 def test_gbp_learn_vlan_l2(self):
2033 """ GBP L2 Endpoint w/ VLANs"""
2034
Neale Rannsb6a47952018-11-21 05:44:35 -08002035 ep_flags = VppEnum.vl_api_gbp_endpoint_flags_t
Neale Rannsc29c0af2018-11-07 04:21:12 -08002036 learnt = [{'mac': '00:00:11:11:11:01',
2037 'ip': '10.0.0.1',
2038 'ip6': '2001:10::2'},
2039 {'mac': '00:00:11:11:11:02',
2040 'ip': '10.0.0.2',
2041 'ip6': '2001:10::3'}]
2042
2043 #
Neale Rannsc29c0af2018-11-07 04:21:12 -08002044 # IP tables
2045 #
2046 gt4 = VppIpTable(self, 1)
2047 gt4.add_vpp_config()
2048 gt6 = VppIpTable(self, 1, is_ip6=True)
2049 gt6.add_vpp_config()
2050
2051 rd1 = VppGbpRouteDomain(self, 1, gt4, gt6)
2052 rd1.add_vpp_config()
2053
2054 #
2055 # Pg2 hosts the vxlan tunnel, hosts on pg2 to act as TEPs
2056 #
2057 self.pg2.config_ip4()
2058 self.pg2.resolve_arp()
2059 self.pg2.generate_remote_hosts(4)
2060 self.pg2.configure_ipv4_neighbors()
2061 self.pg3.config_ip4()
2062 self.pg3.resolve_arp()
2063
2064 #
2065 # The EP will be on a vlan sub-interface
2066 #
2067 vlan_11 = VppDot1QSubint(self, self.pg0, 11)
2068 vlan_11.admin_up()
Ole Troana5b2eec2019-03-11 19:23:25 +01002069 self.vapi.l2_interface_vlan_tag_rewrite(
2070 sw_if_index=vlan_11.sw_if_index, vtr_op=L2_VTR_OP.L2_POP_1,
2071 push_dot1q=11)
Neale Rannsc29c0af2018-11-07 04:21:12 -08002072
2073 bd_uu_fwd = VppVxlanGbpTunnel(self, self.pg3.local_ip4,
2074 self.pg3.remote_ip4, 116)
2075 bd_uu_fwd.add_vpp_config()
2076
2077 #
2078 # a GBP bridge domain with a BVI and a UU-flood interface
2079 # The BD is marked as do not learn, so no endpoints are ever
2080 # learnt in this BD.
2081 #
2082 bd1 = VppBridgeDomain(self, 1)
2083 bd1.add_vpp_config()
2084 gbd1 = VppGbpBridgeDomain(self, bd1, self.loop0, bd_uu_fwd,
2085 learn=False)
2086 gbd1.add_vpp_config()
2087
2088 self.logger.info(self.vapi.cli("sh bridge 1 detail"))
2089 self.logger.info(self.vapi.cli("sh gbp bridge"))
2090
2091 # ... and has a /32 applied
2092 ip_addr = VppIpInterfaceAddress(self, gbd1.bvi, "10.0.0.128", 32)
2093 ip_addr.add_vpp_config()
2094
2095 #
2096 # The Endpoint-group in which we are learning endpoints
2097 #
Neale Ranns879d11c2019-01-21 23:34:18 -08002098 epg_220 = VppGbpEndpointGroup(self, 220, 441, rd1, gbd1,
Neale Rannsc29c0af2018-11-07 04:21:12 -08002099 None, self.loop0,
2100 "10.0.0.128",
Neale Ranns32f6d8e2019-03-05 04:22:08 -08002101 "2001:10::128",
2102 VppGbpEndpointRetention(2))
Neale Rannsc29c0af2018-11-07 04:21:12 -08002103 epg_220.add_vpp_config()
2104
2105 #
2106 # The VXLAN GBP tunnel is a bridge-port and has L2 endpoint
Paul Vinciguerra8feeaff2019-03-27 11:25:48 -07002107 # learning enabled
Neale Rannsc29c0af2018-11-07 04:21:12 -08002108 #
2109 vx_tun_l2_1 = VppGbpVxlanTunnel(
2110 self, 99, bd1.bd_id,
Neale Ranns8da9fc62019-03-04 14:08:11 -08002111 VppEnum.vl_api_gbp_vxlan_tunnel_mode_t.GBP_VXLAN_TUNNEL_MODE_L2,
2112 self.pg2.local_ip4)
Neale Rannsc29c0af2018-11-07 04:21:12 -08002113 vx_tun_l2_1.add_vpp_config()
2114
2115 #
2116 # A static endpoint that the learnt endpoints are trying to
2117 # talk to
2118 #
2119 ep = VppGbpEndpoint(self, vlan_11,
2120 epg_220, None,
2121 "10.0.0.127", "11.0.0.127",
2122 "2001:10::1", "3001::1")
2123 ep.add_vpp_config()
2124
2125 self.assertTrue(find_route(self, ep.ip4.address, 32, table_id=1))
2126
2127 #
2128 # Send to the static EP
2129 #
2130 for ii, l in enumerate(learnt):
Paul Vinciguerra8feeaff2019-03-27 11:25:48 -07002131 # a packet with an sclass from a known EPG
Neale Rannsc29c0af2018-11-07 04:21:12 -08002132 # arriving on an unknown TEP
2133 p = (Ether(src=self.pg2.remote_mac,
2134 dst=self.pg2.local_mac) /
2135 IP(src=self.pg2.remote_hosts[1].ip4,
2136 dst=self.pg2.local_ip4) /
2137 UDP(sport=1234, dport=48879) /
Neale Ranns879d11c2019-01-21 23:34:18 -08002138 VXLAN(vni=99, gpid=441, flags=0x88) /
Neale Rannsc29c0af2018-11-07 04:21:12 -08002139 Ether(src=l['mac'], dst=ep.mac) /
2140 IP(src=l['ip'], dst=ep.ip4.address) /
2141 UDP(sport=1234, dport=1234) /
2142 Raw('\xa5' * 100))
2143
2144 rxs = self.send_and_expect(self.pg2, [p], self.pg0)
2145
2146 #
2147 # packet to EP has the EP's vlan tag
2148 #
2149 for rx in rxs:
2150 self.assertEqual(rx[Dot1Q].vlan, 11)
2151
2152 #
2153 # the EP is not learnt since the BD setting prevents it
2154 # also no TEP too
2155 #
2156 self.assertFalse(find_gbp_endpoint(self,
2157 vx_tun_l2_1.sw_if_index,
2158 mac=l['mac']))
2159 self.assertEqual(INDEX_INVALID,
2160 find_vxlan_gbp_tunnel(
2161 self,
2162 self.pg2.local_ip4,
2163 self.pg2.remote_hosts[1].ip4,
2164 99))
2165
2166 self.assertEqual(len(self.vapi.gbp_endpoint_dump()), 1)
2167
2168 #
2169 # static to remotes
2170 # we didn't learn the remotes so they are sent to the UU-fwd
2171 #
2172 for l in learnt:
2173 p = (Ether(src=ep.mac, dst=l['mac']) /
2174 Dot1Q(vlan=11) /
2175 IP(dst=l['ip'], src=ep.ip4.address) /
2176 UDP(sport=1234, dport=1234) /
2177 Raw('\xa5' * 100))
2178
2179 rxs = self.send_and_expect(self.pg0, p * 17, self.pg3)
2180
2181 for rx in rxs:
2182 self.assertEqual(rx[IP].src, self.pg3.local_ip4)
2183 self.assertEqual(rx[IP].dst, self.pg3.remote_ip4)
2184 self.assertEqual(rx[UDP].dport, 48879)
2185 # the UDP source port is a random value for hashing
Neale Ranns879d11c2019-01-21 23:34:18 -08002186 self.assertEqual(rx[VXLAN].gpid, 441)
Neale Rannsc29c0af2018-11-07 04:21:12 -08002187 self.assertEqual(rx[VXLAN].vni, 116)
2188 self.assertTrue(rx[VXLAN].flags.G)
2189 self.assertTrue(rx[VXLAN].flags.Instance)
2190 self.assertFalse(rx[VXLAN].gpflags.A)
2191 self.assertFalse(rx[VXLAN].gpflags.D)
2192
2193 self.pg2.unconfig_ip4()
2194 self.pg3.unconfig_ip4()
2195
Neale Ranns93cc3ee2018-10-10 07:22:51 -07002196 def test_gbp_learn_l3(self):
2197 """ GBP L3 Endpoint Learning """
2198
Neale Ranns13a08cc2018-11-07 09:25:54 -08002199 self.vapi.cli("set logging class gbp debug")
2200
Neale Rannsb6a47952018-11-21 05:44:35 -08002201 ep_flags = VppEnum.vl_api_gbp_endpoint_flags_t
Neale Ranns93cc3ee2018-10-10 07:22:51 -07002202 routed_dst_mac = "00:0c:0c:0c:0c:0c"
2203 routed_src_mac = "00:22:bd:f8:19:ff"
2204
2205 learnt = [{'mac': '00:00:11:11:11:02',
2206 'ip': '10.0.1.2',
2207 'ip6': '2001:10::2'},
2208 {'mac': '00:00:11:11:11:03',
2209 'ip': '10.0.1.3',
2210 'ip6': '2001:10::3'}]
2211
2212 #
Neale Ranns93cc3ee2018-10-10 07:22:51 -07002213 # IP tables
2214 #
2215 t4 = VppIpTable(self, 1)
2216 t4.add_vpp_config()
2217 t6 = VppIpTable(self, 1, True)
2218 t6.add_vpp_config()
2219
2220 tun_ip4_uu = VppVxlanGbpTunnel(self, self.pg4.local_ip4,
2221 self.pg4.remote_ip4, 114)
2222 tun_ip6_uu = VppVxlanGbpTunnel(self, self.pg4.local_ip4,
2223 self.pg4.remote_ip4, 116)
2224 tun_ip4_uu.add_vpp_config()
2225 tun_ip6_uu.add_vpp_config()
2226
2227 rd1 = VppGbpRouteDomain(self, 2, t4, t6, tun_ip4_uu, tun_ip6_uu)
2228 rd1.add_vpp_config()
2229
Ole Troan8006c6a2018-12-17 12:02:26 +01002230 self.loop0.set_mac(self.router_mac)
Neale Ranns93cc3ee2018-10-10 07:22:51 -07002231
2232 #
2233 # Bind the BVI to the RD
2234 #
2235 VppIpInterfaceBind(self, self.loop0, t4).add_vpp_config()
2236 VppIpInterfaceBind(self, self.loop0, t6).add_vpp_config()
2237
2238 #
2239 # Pg2 hosts the vxlan tunnel
2240 # hosts on pg2 to act as TEPs
2241 # pg3 is BD uu-fwd
2242 # pg4 is RD uu-fwd
2243 #
2244 self.pg2.config_ip4()
2245 self.pg2.resolve_arp()
2246 self.pg2.generate_remote_hosts(4)
2247 self.pg2.configure_ipv4_neighbors()
2248 self.pg3.config_ip4()
2249 self.pg3.resolve_arp()
2250 self.pg4.config_ip4()
2251 self.pg4.resolve_arp()
2252
2253 #
2254 # a GBP bridge domain with a BVI and a UU-flood interface
2255 #
2256 bd1 = VppBridgeDomain(self, 1)
2257 bd1.add_vpp_config()
2258 gbd1 = VppGbpBridgeDomain(self, bd1, self.loop0, self.pg3)
2259 gbd1.add_vpp_config()
2260
2261 self.logger.info(self.vapi.cli("sh bridge 1 detail"))
2262 self.logger.info(self.vapi.cli("sh gbp bridge"))
2263 self.logger.info(self.vapi.cli("sh gbp route"))
Neale Ranns93cc3ee2018-10-10 07:22:51 -07002264
2265 # ... and has a /32 and /128 applied
2266 ip4_addr = VppIpInterfaceAddress(self, gbd1.bvi, "10.0.0.128", 32)
2267 ip4_addr.add_vpp_config()
2268 ip6_addr = VppIpInterfaceAddress(self, gbd1.bvi, "2001:10::128", 128)
2269 ip6_addr.add_vpp_config()
2270
2271 #
2272 # The Endpoint-group in which we are learning endpoints
2273 #
Neale Ranns879d11c2019-01-21 23:34:18 -08002274 epg_220 = VppGbpEndpointGroup(self, 220, 441, rd1, gbd1,
Neale Ranns93cc3ee2018-10-10 07:22:51 -07002275 None, self.loop0,
2276 "10.0.0.128",
Neale Ranns32f6d8e2019-03-05 04:22:08 -08002277 "2001:10::128",
2278 VppGbpEndpointRetention(2))
Neale Ranns93cc3ee2018-10-10 07:22:51 -07002279 epg_220.add_vpp_config()
2280
2281 #
2282 # The VXLAN GBP tunnel is a bridge-port and has L2 endpoint
Paul Vinciguerra8feeaff2019-03-27 11:25:48 -07002283 # learning enabled
Neale Ranns93cc3ee2018-10-10 07:22:51 -07002284 #
2285 vx_tun_l3 = VppGbpVxlanTunnel(
2286 self, 101, rd1.rd_id,
Neale Ranns8da9fc62019-03-04 14:08:11 -08002287 VppEnum.vl_api_gbp_vxlan_tunnel_mode_t.GBP_VXLAN_TUNNEL_MODE_L3,
2288 self.pg2.local_ip4)
Neale Ranns93cc3ee2018-10-10 07:22:51 -07002289 vx_tun_l3.add_vpp_config()
2290
2291 #
2292 # A static endpoint that the learnt endpoints are trying to
2293 # talk to
2294 #
2295 ep = VppGbpEndpoint(self, self.pg0,
2296 epg_220, None,
2297 "10.0.0.127", "11.0.0.127",
2298 "2001:10::1", "3001::1")
2299 ep.add_vpp_config()
2300
2301 #
2302 # learn some remote IPv4 EPs
2303 #
2304 for ii, l in enumerate(learnt):
Paul Vinciguerra8feeaff2019-03-27 11:25:48 -07002305 # a packet with an sclass from a known EPG
Neale Ranns93cc3ee2018-10-10 07:22:51 -07002306 # arriving on an unknown TEP
2307 p = (Ether(src=self.pg2.remote_mac,
2308 dst=self.pg2.local_mac) /
2309 IP(src=self.pg2.remote_hosts[1].ip4,
2310 dst=self.pg2.local_ip4) /
2311 UDP(sport=1234, dport=48879) /
Neale Ranns879d11c2019-01-21 23:34:18 -08002312 VXLAN(vni=101, gpid=441, flags=0x88) /
Neale Ranns93cc3ee2018-10-10 07:22:51 -07002313 Ether(src=l['mac'], dst="00:00:00:11:11:11") /
2314 IP(src=l['ip'], dst=ep.ip4.address) /
2315 UDP(sport=1234, dport=1234) /
2316 Raw('\xa5' * 100))
2317
2318 rx = self.send_and_expect(self.pg2, [p], self.pg0)
2319
2320 # the new TEP
2321 tep1_sw_if_index = find_vxlan_gbp_tunnel(
2322 self,
2323 self.pg2.local_ip4,
2324 self.pg2.remote_hosts[1].ip4,
2325 vx_tun_l3.vni)
2326 self.assertNotEqual(INDEX_INVALID, tep1_sw_if_index)
2327
2328 # endpoint learnt via the parent GBP-vxlan interface
2329 self.assertTrue(find_gbp_endpoint(self,
2330 vx_tun_l3._sw_if_index,
2331 ip=l['ip']))
2332
2333 #
2334 # Static IPv4 EP replies to learnt
2335 #
2336 for l in learnt:
2337 p = (Ether(src=ep.mac, dst=self.loop0.local_mac) /
2338 IP(dst=l['ip'], src=ep.ip4.address) /
2339 UDP(sport=1234, dport=1234) /
2340 Raw('\xa5' * 100))
2341
2342 rxs = self.send_and_expect(self.pg0, p*1, self.pg2)
2343
2344 for rx in rxs:
2345 self.assertEqual(rx[IP].src, self.pg2.local_ip4)
2346 self.assertEqual(rx[IP].dst, self.pg2.remote_hosts[1].ip4)
2347 self.assertEqual(rx[UDP].dport, 48879)
2348 # the UDP source port is a random value for hashing
Neale Ranns879d11c2019-01-21 23:34:18 -08002349 self.assertEqual(rx[VXLAN].gpid, 441)
Neale Ranns93cc3ee2018-10-10 07:22:51 -07002350 self.assertEqual(rx[VXLAN].vni, 101)
2351 self.assertTrue(rx[VXLAN].flags.G)
2352 self.assertTrue(rx[VXLAN].flags.Instance)
2353 self.assertTrue(rx[VXLAN].gpflags.A)
2354 self.assertFalse(rx[VXLAN].gpflags.D)
2355
2356 inner = rx[VXLAN].payload
2357
2358 self.assertEqual(inner[Ether].src, routed_src_mac)
2359 self.assertEqual(inner[Ether].dst, routed_dst_mac)
2360 self.assertEqual(inner[IP].src, ep.ip4.address)
2361 self.assertEqual(inner[IP].dst, l['ip'])
2362
Neale Ranns93cc3ee2018-10-10 07:22:51 -07002363 for l in learnt:
2364 self.assertFalse(find_gbp_endpoint(self,
2365 tep1_sw_if_index,
2366 ip=l['ip']))
2367
2368 #
2369 # learn some remote IPv6 EPs
2370 #
2371 for ii, l in enumerate(learnt):
Paul Vinciguerra8feeaff2019-03-27 11:25:48 -07002372 # a packet with an sclass from a known EPG
Neale Ranns93cc3ee2018-10-10 07:22:51 -07002373 # arriving on an unknown TEP
2374 p = (Ether(src=self.pg2.remote_mac,
2375 dst=self.pg2.local_mac) /
2376 IP(src=self.pg2.remote_hosts[1].ip4,
2377 dst=self.pg2.local_ip4) /
2378 UDP(sport=1234, dport=48879) /
Neale Ranns879d11c2019-01-21 23:34:18 -08002379 VXLAN(vni=101, gpid=441, flags=0x88) /
Neale Ranns93cc3ee2018-10-10 07:22:51 -07002380 Ether(src=l['mac'], dst="00:00:00:11:11:11") /
2381 IPv6(src=l['ip6'], dst=ep.ip6.address) /
2382 UDP(sport=1234, dport=1234) /
2383 Raw('\xa5' * 100))
2384
2385 rx = self.send_and_expect(self.pg2, [p], self.pg0)
2386
2387 # the new TEP
2388 tep1_sw_if_index = find_vxlan_gbp_tunnel(
2389 self,
2390 self.pg2.local_ip4,
2391 self.pg2.remote_hosts[1].ip4,
2392 vx_tun_l3.vni)
2393 self.assertNotEqual(INDEX_INVALID, tep1_sw_if_index)
2394
2395 self.logger.info(self.vapi.cli("show gbp bridge"))
2396 self.logger.info(self.vapi.cli("show vxlan-gbp tunnel"))
2397 self.logger.info(self.vapi.cli("show gbp vxlan"))
2398 self.logger.info(self.vapi.cli("show int addr"))
2399
2400 # endpoint learnt via the TEP
2401 self.assertTrue(find_gbp_endpoint(self, ip=l['ip6']))
2402
2403 self.logger.info(self.vapi.cli("show gbp endpoint"))
2404 self.logger.info(self.vapi.cli("show ip fib index 1 %s" % l['ip']))
2405
2406 #
2407 # Static EP replies to learnt
2408 #
2409 for l in learnt:
2410 p = (Ether(src=ep.mac, dst=self.loop0.local_mac) /
2411 IPv6(dst=l['ip6'], src=ep.ip6.address) /
2412 UDP(sport=1234, dport=1234) /
2413 Raw('\xa5' * 100))
2414
2415 rxs = self.send_and_expect(self.pg0, p*65, self.pg2)
2416
2417 for rx in rxs:
2418 self.assertEqual(rx[IP].src, self.pg2.local_ip4)
2419 self.assertEqual(rx[IP].dst, self.pg2.remote_hosts[1].ip4)
2420 self.assertEqual(rx[UDP].dport, 48879)
2421 # the UDP source port is a random value for hashing
Neale Ranns879d11c2019-01-21 23:34:18 -08002422 self.assertEqual(rx[VXLAN].gpid, 441)
Neale Ranns93cc3ee2018-10-10 07:22:51 -07002423 self.assertEqual(rx[VXLAN].vni, 101)
2424 self.assertTrue(rx[VXLAN].flags.G)
2425 self.assertTrue(rx[VXLAN].flags.Instance)
2426 self.assertTrue(rx[VXLAN].gpflags.A)
2427 self.assertFalse(rx[VXLAN].gpflags.D)
2428
2429 inner = rx[VXLAN].payload
2430
2431 self.assertEqual(inner[Ether].src, routed_src_mac)
2432 self.assertEqual(inner[Ether].dst, routed_dst_mac)
2433 self.assertEqual(inner[IPv6].src, ep.ip6.address)
2434 self.assertEqual(inner[IPv6].dst, l['ip6'])
2435
2436 self.logger.info(self.vapi.cli("sh gbp endpoint"))
Neale Ranns93cc3ee2018-10-10 07:22:51 -07002437 for l in learnt:
Neale Ranns774356a2018-11-29 12:02:16 +00002438 self.wait_for_ep_timeout(ip=l['ip'])
Neale Ranns93cc3ee2018-10-10 07:22:51 -07002439
2440 #
2441 # Static sends to unknown EP with no route
2442 #
2443 p = (Ether(src=ep.mac, dst=self.loop0.local_mac) /
2444 IP(dst="10.0.0.99", src=ep.ip4.address) /
2445 UDP(sport=1234, dport=1234) /
2446 Raw('\xa5' * 100))
2447
2448 self.send_and_assert_no_replies(self.pg0, [p])
2449
2450 #
2451 # Add a route to static EP's v4 and v6 subnet
Neale Rannsb6a47952018-11-21 05:44:35 -08002452 # packets should be sent on the v4/v6 uu=fwd interface resp.
Neale Ranns93cc3ee2018-10-10 07:22:51 -07002453 #
2454 se_10_24 = VppGbpSubnet(
2455 self, rd1, "10.0.0.0", 24,
2456 VppEnum.vl_api_gbp_subnet_type_t.GBP_API_SUBNET_TRANSPORT)
2457 se_10_24.add_vpp_config()
2458
2459 p = (Ether(src=ep.mac, dst=self.loop0.local_mac) /
2460 IP(dst="10.0.0.99", src=ep.ip4.address) /
2461 UDP(sport=1234, dport=1234) /
2462 Raw('\xa5' * 100))
2463
2464 rxs = self.send_and_expect(self.pg0, [p], self.pg4)
2465 for rx in rxs:
2466 self.assertEqual(rx[IP].src, self.pg4.local_ip4)
2467 self.assertEqual(rx[IP].dst, self.pg4.remote_ip4)
2468 self.assertEqual(rx[UDP].dport, 48879)
2469 # the UDP source port is a random value for hashing
Neale Ranns879d11c2019-01-21 23:34:18 -08002470 self.assertEqual(rx[VXLAN].gpid, 441)
Neale Ranns93cc3ee2018-10-10 07:22:51 -07002471 self.assertEqual(rx[VXLAN].vni, 114)
2472 self.assertTrue(rx[VXLAN].flags.G)
2473 self.assertTrue(rx[VXLAN].flags.Instance)
2474 # policy is not applied to packets sent to the uu-fwd interfaces
2475 self.assertFalse(rx[VXLAN].gpflags.A)
2476 self.assertFalse(rx[VXLAN].gpflags.D)
2477
2478 #
2479 # learn some remote IPv4 EPs
2480 #
2481 for ii, l in enumerate(learnt):
Paul Vinciguerra8feeaff2019-03-27 11:25:48 -07002482 # a packet with an sclass from a known EPG
Neale Ranns93cc3ee2018-10-10 07:22:51 -07002483 # arriving on an unknown TEP
2484 p = (Ether(src=self.pg2.remote_mac,
2485 dst=self.pg2.local_mac) /
Neale Ranns879d11c2019-01-21 23:34:18 -08002486 IP(src=self.pg2.remote_hosts[2].ip4,
Neale Ranns93cc3ee2018-10-10 07:22:51 -07002487 dst=self.pg2.local_ip4) /
2488 UDP(sport=1234, dport=48879) /
Neale Ranns879d11c2019-01-21 23:34:18 -08002489 VXLAN(vni=101, gpid=441, flags=0x88) /
Neale Ranns93cc3ee2018-10-10 07:22:51 -07002490 Ether(src=l['mac'], dst="00:00:00:11:11:11") /
2491 IP(src=l['ip'], dst=ep.ip4.address) /
2492 UDP(sport=1234, dport=1234) /
2493 Raw('\xa5' * 100))
2494
2495 rx = self.send_and_expect(self.pg2, [p], self.pg0)
2496
2497 # the new TEP
2498 tep1_sw_if_index = find_vxlan_gbp_tunnel(
2499 self,
2500 self.pg2.local_ip4,
Neale Ranns879d11c2019-01-21 23:34:18 -08002501 self.pg2.remote_hosts[2].ip4,
Neale Ranns93cc3ee2018-10-10 07:22:51 -07002502 vx_tun_l3.vni)
2503 self.assertNotEqual(INDEX_INVALID, tep1_sw_if_index)
2504
2505 # endpoint learnt via the parent GBP-vxlan interface
2506 self.assertTrue(find_gbp_endpoint(self,
2507 vx_tun_l3._sw_if_index,
2508 ip=l['ip']))
2509
2510 #
2511 # Add a remote endpoint from the API
2512 #
2513 rep_88 = VppGbpEndpoint(self, vx_tun_l3,
2514 epg_220, None,
2515 "10.0.0.88", "11.0.0.88",
2516 "2001:10::88", "3001::88",
Neale Rannsb6a47952018-11-21 05:44:35 -08002517 ep_flags.GBP_API_ENDPOINT_FLAG_REMOTE,
Neale Ranns93cc3ee2018-10-10 07:22:51 -07002518 self.pg2.local_ip4,
2519 self.pg2.remote_hosts[1].ip4,
2520 mac=None)
2521 rep_88.add_vpp_config()
2522
2523 #
2524 # Add a remote endpoint from the API that matches an existing one
2525 #
2526 rep_2 = VppGbpEndpoint(self, vx_tun_l3,
2527 epg_220, None,
2528 learnt[0]['ip'], "11.0.0.101",
2529 learnt[0]['ip6'], "3001::101",
Neale Rannsb6a47952018-11-21 05:44:35 -08002530 ep_flags.GBP_API_ENDPOINT_FLAG_REMOTE,
Neale Ranns93cc3ee2018-10-10 07:22:51 -07002531 self.pg2.local_ip4,
2532 self.pg2.remote_hosts[1].ip4,
2533 mac=None)
2534 rep_2.add_vpp_config()
2535
2536 #
Paul Vinciguerra8feeaff2019-03-27 11:25:48 -07002537 # Add a route to the learned EP's v4 subnet
Neale Ranns93cc3ee2018-10-10 07:22:51 -07002538 # packets should be send on the v4/v6 uu=fwd interface resp.
2539 #
2540 se_10_1_24 = VppGbpSubnet(
2541 self, rd1, "10.0.1.0", 24,
2542 VppEnum.vl_api_gbp_subnet_type_t.GBP_API_SUBNET_TRANSPORT)
2543 se_10_1_24.add_vpp_config()
2544
2545 self.logger.info(self.vapi.cli("show gbp endpoint"))
2546
2547 ips = ["10.0.0.88", learnt[0]['ip']]
2548 for ip in ips:
2549 p = (Ether(src=ep.mac, dst=self.loop0.local_mac) /
2550 IP(dst=ip, src=ep.ip4.address) /
2551 UDP(sport=1234, dport=1234) /
2552 Raw('\xa5' * 100))
2553
2554 rxs = self.send_and_expect(self.pg0, p*65, self.pg2)
2555
2556 for rx in rxs:
2557 self.assertEqual(rx[IP].src, self.pg2.local_ip4)
2558 self.assertEqual(rx[IP].dst, self.pg2.remote_hosts[1].ip4)
2559 self.assertEqual(rx[UDP].dport, 48879)
2560 # the UDP source port is a random value for hashing
Neale Ranns879d11c2019-01-21 23:34:18 -08002561 self.assertEqual(rx[VXLAN].gpid, 441)
Neale Ranns93cc3ee2018-10-10 07:22:51 -07002562 self.assertEqual(rx[VXLAN].vni, 101)
2563 self.assertTrue(rx[VXLAN].flags.G)
2564 self.assertTrue(rx[VXLAN].flags.Instance)
2565 self.assertTrue(rx[VXLAN].gpflags.A)
2566 self.assertFalse(rx[VXLAN].gpflags.D)
2567
2568 inner = rx[VXLAN].payload
2569
2570 self.assertEqual(inner[Ether].src, routed_src_mac)
2571 self.assertEqual(inner[Ether].dst, routed_dst_mac)
2572 self.assertEqual(inner[IP].src, ep.ip4.address)
2573 self.assertEqual(inner[IP].dst, ip)
2574
2575 #
Neale Ranns13a08cc2018-11-07 09:25:54 -08002576 # remove the API remote EPs, only API sourced is gone, the DP
2577 # learnt one remains
Neale Ranns93cc3ee2018-10-10 07:22:51 -07002578 #
2579 rep_88.remove_vpp_config()
2580 rep_2.remove_vpp_config()
2581
Neale Ranns00a469d2018-12-20 06:12:19 -08002582 self.assertTrue(find_gbp_endpoint(self, ip=rep_2.ip4.address))
2583
2584 p = (Ether(src=ep.mac, dst=self.loop0.local_mac) /
2585 IP(src=ep.ip4.address, dst=rep_2.ip4.address) /
2586 UDP(sport=1234, dport=1234) /
2587 Raw('\xa5' * 100))
2588 rxs = self.send_and_expect(self.pg0, [p], self.pg2)
Neale Ranns93cc3ee2018-10-10 07:22:51 -07002589
Neale Ranns13a08cc2018-11-07 09:25:54 -08002590 self.assertFalse(find_gbp_endpoint(self, ip=rep_88.ip4.address))
Neale Ranns93cc3ee2018-10-10 07:22:51 -07002591
Neale Ranns13a08cc2018-11-07 09:25:54 -08002592 p = (Ether(src=ep.mac, dst=self.loop0.local_mac) /
2593 IP(src=ep.ip4.address, dst=rep_88.ip4.address) /
2594 UDP(sport=1234, dport=1234) /
2595 Raw('\xa5' * 100))
2596 rxs = self.send_and_expect(self.pg0, [p], self.pg4)
Neale Ranns93cc3ee2018-10-10 07:22:51 -07002597
Neale Ranns13a08cc2018-11-07 09:25:54 -08002598 #
Paul Vinciguerra8feeaff2019-03-27 11:25:48 -07002599 # to appease the testcase we cannot have the registered EP still
Neale Ranns13a08cc2018-11-07 09:25:54 -08002600 # present (because it's DP learnt) when the TC ends so wait until
2601 # it is removed
2602 #
Neale Ranns00a469d2018-12-20 06:12:19 -08002603 self.wait_for_ep_timeout(ip=rep_88.ip4.address)
2604 self.wait_for_ep_timeout(ip=rep_2.ip4.address)
Neale Ranns93cc3ee2018-10-10 07:22:51 -07002605
2606 #
2607 # shutdown with learnt endpoint present
2608 #
Neale Ranns13a08cc2018-11-07 09:25:54 -08002609 p = (Ether(src=self.pg2.remote_mac,
2610 dst=self.pg2.local_mac) /
2611 IP(src=self.pg2.remote_hosts[1].ip4,
2612 dst=self.pg2.local_ip4) /
2613 UDP(sport=1234, dport=48879) /
Neale Ranns879d11c2019-01-21 23:34:18 -08002614 VXLAN(vni=101, gpid=441, flags=0x88) /
Neale Ranns13a08cc2018-11-07 09:25:54 -08002615 Ether(src=l['mac'], dst="00:00:00:11:11:11") /
2616 IP(src=learnt[1]['ip'], dst=ep.ip4.address) /
2617 UDP(sport=1234, dport=1234) /
2618 Raw('\xa5' * 100))
2619
2620 rx = self.send_and_expect(self.pg2, [p], self.pg0)
2621
2622 # endpoint learnt via the parent GBP-vxlan interface
2623 self.assertTrue(find_gbp_endpoint(self,
2624 vx_tun_l3._sw_if_index,
2625 ip=l['ip']))
Neale Ranns93cc3ee2018-10-10 07:22:51 -07002626
2627 #
2628 # TODO
2629 # remote endpoint becomes local
2630 #
2631 self.pg2.unconfig_ip4()
2632 self.pg3.unconfig_ip4()
2633 self.pg4.unconfig_ip4()
2634
Neale Ranns13a08cc2018-11-07 09:25:54 -08002635 def test_gbp_redirect(self):
2636 """ GBP Endpoint Redirect """
2637
2638 self.vapi.cli("set logging class gbp debug")
2639
Neale Rannsb6a47952018-11-21 05:44:35 -08002640 ep_flags = VppEnum.vl_api_gbp_endpoint_flags_t
Neale Ranns13a08cc2018-11-07 09:25:54 -08002641 routed_dst_mac = "00:0c:0c:0c:0c:0c"
2642 routed_src_mac = "00:22:bd:f8:19:ff"
2643
2644 learnt = [{'mac': '00:00:11:11:11:02',
2645 'ip': '10.0.1.2',
2646 'ip6': '2001:10::2'},
2647 {'mac': '00:00:11:11:11:03',
2648 'ip': '10.0.1.3',
2649 'ip6': '2001:10::3'}]
2650
2651 #
Neale Ranns13a08cc2018-11-07 09:25:54 -08002652 # IP tables
2653 #
2654 t4 = VppIpTable(self, 1)
2655 t4.add_vpp_config()
2656 t6 = VppIpTable(self, 1, True)
2657 t6.add_vpp_config()
2658
2659 rd1 = VppGbpRouteDomain(self, 2, t4, t6)
2660 rd1.add_vpp_config()
2661
Ole Troan8006c6a2018-12-17 12:02:26 +01002662 self.loop0.set_mac(self.router_mac)
Neale Ranns13a08cc2018-11-07 09:25:54 -08002663
2664 #
2665 # Bind the BVI to the RD
2666 #
2667 VppIpInterfaceBind(self, self.loop0, t4).add_vpp_config()
2668 VppIpInterfaceBind(self, self.loop0, t6).add_vpp_config()
2669
2670 #
2671 # Pg7 hosts a BD's UU-fwd
2672 #
2673 self.pg7.config_ip4()
2674 self.pg7.resolve_arp()
2675
2676 #
2677 # a GBP bridge domains for the EPs
2678 #
2679 bd1 = VppBridgeDomain(self, 1)
2680 bd1.add_vpp_config()
2681 gbd1 = VppGbpBridgeDomain(self, bd1, self.loop0)
2682 gbd1.add_vpp_config()
2683
2684 bd2 = VppBridgeDomain(self, 2)
2685 bd2.add_vpp_config()
2686 gbd2 = VppGbpBridgeDomain(self, bd2, self.loop1)
2687 gbd2.add_vpp_config()
2688
2689 # ... and has a /32 and /128 applied
2690 ip4_addr = VppIpInterfaceAddress(self, gbd1.bvi, "10.0.0.128", 32)
2691 ip4_addr.add_vpp_config()
2692 ip6_addr = VppIpInterfaceAddress(self, gbd1.bvi, "2001:10::128", 128)
2693 ip6_addr.add_vpp_config()
2694 ip4_addr = VppIpInterfaceAddress(self, gbd2.bvi, "10.0.1.128", 32)
2695 ip4_addr.add_vpp_config()
2696 ip6_addr = VppIpInterfaceAddress(self, gbd2.bvi, "2001:11::128", 128)
2697 ip6_addr.add_vpp_config()
2698
2699 #
2700 # The Endpoint-groups in which we are learning endpoints
2701 #
Neale Ranns879d11c2019-01-21 23:34:18 -08002702 epg_220 = VppGbpEndpointGroup(self, 220, 440, rd1, gbd1,
Neale Ranns13a08cc2018-11-07 09:25:54 -08002703 None, gbd1.bvi,
2704 "10.0.0.128",
Neale Ranns32f6d8e2019-03-05 04:22:08 -08002705 "2001:10::128",
2706 VppGbpEndpointRetention(2))
Neale Ranns13a08cc2018-11-07 09:25:54 -08002707 epg_220.add_vpp_config()
Neale Ranns879d11c2019-01-21 23:34:18 -08002708 epg_221 = VppGbpEndpointGroup(self, 221, 441, rd1, gbd2,
Neale Ranns13a08cc2018-11-07 09:25:54 -08002709 None, gbd2.bvi,
2710 "10.0.1.128",
Neale Ranns32f6d8e2019-03-05 04:22:08 -08002711 "2001:11::128",
2712 VppGbpEndpointRetention(2))
Neale Ranns13a08cc2018-11-07 09:25:54 -08002713 epg_221.add_vpp_config()
Neale Ranns879d11c2019-01-21 23:34:18 -08002714 epg_222 = VppGbpEndpointGroup(self, 222, 442, rd1, gbd1,
Neale Ranns13a08cc2018-11-07 09:25:54 -08002715 None, gbd1.bvi,
2716 "10.0.2.128",
Neale Ranns32f6d8e2019-03-05 04:22:08 -08002717 "2001:12::128",
2718 VppGbpEndpointRetention(2))
Neale Ranns13a08cc2018-11-07 09:25:54 -08002719 epg_222.add_vpp_config()
2720
2721 #
2722 # a GBP bridge domains for the SEPs
2723 #
2724 bd_uu1 = VppVxlanGbpTunnel(self, self.pg7.local_ip4,
2725 self.pg7.remote_ip4, 116)
2726 bd_uu1.add_vpp_config()
2727 bd_uu2 = VppVxlanGbpTunnel(self, self.pg7.local_ip4,
2728 self.pg7.remote_ip4, 117)
2729 bd_uu2.add_vpp_config()
2730
2731 bd3 = VppBridgeDomain(self, 3)
2732 bd3.add_vpp_config()
2733 gbd3 = VppGbpBridgeDomain(self, bd3, self.loop2, bd_uu1, learn=False)
2734 gbd3.add_vpp_config()
2735 bd4 = VppBridgeDomain(self, 4)
2736 bd4.add_vpp_config()
2737 gbd4 = VppGbpBridgeDomain(self, bd4, self.loop3, bd_uu2, learn=False)
2738 gbd4.add_vpp_config()
2739
2740 #
2741 # EPGs in which the service endpoints exist
2742 #
Neale Ranns879d11c2019-01-21 23:34:18 -08002743 epg_320 = VppGbpEndpointGroup(self, 320, 550, rd1, gbd3,
Neale Ranns13a08cc2018-11-07 09:25:54 -08002744 None, gbd1.bvi,
2745 "12.0.0.128",
Neale Ranns32f6d8e2019-03-05 04:22:08 -08002746 "4001:10::128",
2747 VppGbpEndpointRetention(2))
Neale Ranns13a08cc2018-11-07 09:25:54 -08002748 epg_320.add_vpp_config()
Neale Ranns879d11c2019-01-21 23:34:18 -08002749 epg_321 = VppGbpEndpointGroup(self, 321, 551, rd1, gbd4,
Neale Ranns13a08cc2018-11-07 09:25:54 -08002750 None, gbd2.bvi,
2751 "12.0.1.128",
Neale Ranns32f6d8e2019-03-05 04:22:08 -08002752 "4001:11::128",
2753 VppGbpEndpointRetention(2))
Neale Ranns13a08cc2018-11-07 09:25:54 -08002754 epg_321.add_vpp_config()
2755
2756 #
2757 # three local endpoints
2758 #
2759 ep1 = VppGbpEndpoint(self, self.pg0,
2760 epg_220, None,
2761 "10.0.0.1", "11.0.0.1",
2762 "2001:10::1", "3001:10::1")
2763 ep1.add_vpp_config()
2764 ep2 = VppGbpEndpoint(self, self.pg1,
2765 epg_221, None,
2766 "10.0.1.1", "11.0.1.1",
2767 "2001:11::1", "3001:11::1")
2768 ep2.add_vpp_config()
2769 ep3 = VppGbpEndpoint(self, self.pg2,
2770 epg_222, None,
2771 "10.0.2.2", "11.0.2.2",
2772 "2001:12::1", "3001:12::1")
2773 ep3.add_vpp_config()
2774
2775 #
2776 # service endpoints
2777 #
2778 sep1 = VppGbpEndpoint(self, self.pg3,
2779 epg_320, None,
2780 "12.0.0.1", "13.0.0.1",
2781 "4001:10::1", "5001:10::1")
2782 sep1.add_vpp_config()
2783 sep2 = VppGbpEndpoint(self, self.pg4,
2784 epg_320, None,
2785 "12.0.0.2", "13.0.0.2",
2786 "4001:10::2", "5001:10::2")
2787 sep2.add_vpp_config()
2788 sep3 = VppGbpEndpoint(self, self.pg5,
2789 epg_321, None,
2790 "12.0.1.1", "13.0.1.1",
2791 "4001:11::1", "5001:11::1")
2792 sep3.add_vpp_config()
2793 # this EP is not installed immediately
2794 sep4 = VppGbpEndpoint(self, self.pg6,
2795 epg_321, None,
2796 "12.0.1.2", "13.0.1.2",
2797 "4001:11::2", "5001:11::2")
2798
2799 #
2800 # an L2 switch packet between local EPs in different EPGs
2801 # different dest ports on each so the are LB hashed differently
2802 #
2803 p4 = [(Ether(src=ep1.mac, dst=ep3.mac) /
2804 IP(src=ep1.ip4.address, dst=ep3.ip4.address) /
2805 UDP(sport=1234, dport=1234) /
2806 Raw('\xa5' * 100)),
Mohsin Kazmid40c3e62018-11-21 10:46:57 +01002807 (Ether(src=ep3.mac, dst=ep1.mac) /
2808 IP(src=ep3.ip4.address, dst=ep1.ip4.address) /
2809 UDP(sport=1234, dport=1234) /
Neale Ranns13a08cc2018-11-07 09:25:54 -08002810 Raw('\xa5' * 100))]
2811 p6 = [(Ether(src=ep1.mac, dst=ep3.mac) /
2812 IPv6(src=ep1.ip6.address, dst=ep3.ip6.address) /
2813 UDP(sport=1234, dport=1234) /
2814 Raw('\xa5' * 100)),
Mohsin Kazmid40c3e62018-11-21 10:46:57 +01002815 (Ether(src=ep3.mac, dst=ep1.mac) /
2816 IPv6(src=ep3.ip6.address, dst=ep1.ip6.address) /
Neale Ranns13a08cc2018-11-07 09:25:54 -08002817 UDP(sport=1234, dport=1230) /
2818 Raw('\xa5' * 100))]
2819
2820 # should be dropped since no contract yet
2821 self.send_and_assert_no_replies(self.pg0, [p4[0]])
2822 self.send_and_assert_no_replies(self.pg0, [p6[0]])
2823
2824 #
2825 # Add a contract with a rule to load-balance redirect via SEP1 and SEP2
2826 # one of the next-hops is via an EP that is not known
2827 #
2828 acl = VppGbpAcl(self)
2829 rule4 = acl.create_rule(permit_deny=1, proto=17)
2830 rule6 = acl.create_rule(is_ipv6=1, permit_deny=1, proto=17)
2831 acl_index = acl.add_vpp_config([rule4, rule6])
2832
Mohsin Kazmid40c3e62018-11-21 10:46:57 +01002833 #
2834 # test the src-ip hash mode
2835 #
Neale Ranns13a08cc2018-11-07 09:25:54 -08002836 c1 = VppGbpContract(
Neale Ranns4dd4cf42019-03-27 05:06:47 -07002837 self, epg_220.sclass, epg_222.sclass, acl_index,
Neale Ranns13a08cc2018-11-07 09:25:54 -08002838 [VppGbpContractRule(
2839 VppEnum.vl_api_gbp_rule_action_t.GBP_API_RULE_REDIRECT,
Mohsin Kazmid40c3e62018-11-21 10:46:57 +01002840 VppEnum.vl_api_gbp_hash_mode_t.GBP_API_HASH_MODE_SRC_IP,
Neale Ranns13a08cc2018-11-07 09:25:54 -08002841 [VppGbpContractNextHop(sep1.vmac, sep1.epg.bd,
2842 sep1.ip4, sep1.epg.rd),
2843 VppGbpContractNextHop(sep2.vmac, sep2.epg.bd,
2844 sep2.ip4, sep2.epg.rd)]),
2845 VppGbpContractRule(
2846 VppEnum.vl_api_gbp_rule_action_t.GBP_API_RULE_REDIRECT,
Mohsin Kazmid40c3e62018-11-21 10:46:57 +01002847 VppEnum.vl_api_gbp_hash_mode_t.GBP_API_HASH_MODE_SRC_IP,
Neale Ranns13a08cc2018-11-07 09:25:54 -08002848 [VppGbpContractNextHop(sep3.vmac, sep3.epg.bd,
2849 sep3.ip6, sep3.epg.rd),
2850 VppGbpContractNextHop(sep4.vmac, sep4.epg.bd,
Neale Ranns1c17e2e2018-12-20 12:03:59 -08002851 sep4.ip6, sep4.epg.rd)])],
2852 [ETH_P_IP, ETH_P_IPV6])
Neale Ranns13a08cc2018-11-07 09:25:54 -08002853 c1.add_vpp_config()
2854
Mohsin Kazmid40c3e62018-11-21 10:46:57 +01002855 c2 = VppGbpContract(
Neale Ranns4dd4cf42019-03-27 05:06:47 -07002856 self, epg_222.sclass, epg_220.sclass, acl_index,
Mohsin Kazmid40c3e62018-11-21 10:46:57 +01002857 [VppGbpContractRule(
2858 VppEnum.vl_api_gbp_rule_action_t.GBP_API_RULE_REDIRECT,
2859 VppEnum.vl_api_gbp_hash_mode_t.GBP_API_HASH_MODE_SRC_IP,
2860 [VppGbpContractNextHop(sep1.vmac, sep1.epg.bd,
2861 sep1.ip4, sep1.epg.rd),
2862 VppGbpContractNextHop(sep2.vmac, sep2.epg.bd,
2863 sep2.ip4, sep2.epg.rd)]),
2864 VppGbpContractRule(
2865 VppEnum.vl_api_gbp_rule_action_t.GBP_API_RULE_REDIRECT,
2866 VppEnum.vl_api_gbp_hash_mode_t.GBP_API_HASH_MODE_SRC_IP,
2867 [VppGbpContractNextHop(sep3.vmac, sep3.epg.bd,
2868 sep3.ip6, sep3.epg.rd),
2869 VppGbpContractNextHop(sep4.vmac, sep4.epg.bd,
Neale Ranns1c17e2e2018-12-20 12:03:59 -08002870 sep4.ip6, sep4.epg.rd)])],
2871 [ETH_P_IP, ETH_P_IPV6])
Mohsin Kazmid40c3e62018-11-21 10:46:57 +01002872 c2.add_vpp_config()
2873
Neale Ranns13a08cc2018-11-07 09:25:54 -08002874 #
2875 # send again with the contract preset, now packets arrive
2876 # at SEP1 or SEP2 depending on the hashing
2877 #
Mohsin Kazmid40c3e62018-11-21 10:46:57 +01002878 rxs = self.send_and_expect(self.pg0, p4[0] * 17, sep1.itf)
Neale Ranns13a08cc2018-11-07 09:25:54 -08002879
2880 for rx in rxs:
2881 self.assertEqual(rx[Ether].src, routed_src_mac)
2882 self.assertEqual(rx[Ether].dst, sep1.mac)
2883 self.assertEqual(rx[IP].src, ep1.ip4.address)
2884 self.assertEqual(rx[IP].dst, ep3.ip4.address)
2885
Mohsin Kazmid40c3e62018-11-21 10:46:57 +01002886 rxs = self.send_and_expect(self.pg2, p4[1] * 17, sep2.itf)
2887
2888 for rx in rxs:
2889 self.assertEqual(rx[Ether].src, routed_src_mac)
2890 self.assertEqual(rx[Ether].dst, sep2.mac)
2891 self.assertEqual(rx[IP].src, ep3.ip4.address)
2892 self.assertEqual(rx[IP].dst, ep1.ip4.address)
2893
Neale Ranns13a08cc2018-11-07 09:25:54 -08002894 rxs = self.send_and_expect(self.pg0, p6[0] * 17, self.pg7)
2895
2896 for rx in rxs:
2897 self.assertEqual(rx[Ether].src, self.pg7.local_mac)
2898 self.assertEqual(rx[Ether].dst, self.pg7.remote_mac)
2899 self.assertEqual(rx[IP].src, self.pg7.local_ip4)
2900 self.assertEqual(rx[IP].dst, self.pg7.remote_ip4)
2901 self.assertEqual(rx[VXLAN].vni, 117)
2902 self.assertTrue(rx[VXLAN].flags.G)
2903 self.assertTrue(rx[VXLAN].flags.Instance)
2904 # redirect policy has been applied
2905 self.assertTrue(rx[VXLAN].gpflags.A)
2906 self.assertFalse(rx[VXLAN].gpflags.D)
2907
2908 inner = rx[VXLAN].payload
2909
2910 self.assertEqual(inner[Ether].src, routed_src_mac)
2911 self.assertEqual(inner[Ether].dst, sep4.mac)
2912 self.assertEqual(inner[IPv6].src, ep1.ip6.address)
2913 self.assertEqual(inner[IPv6].dst, ep3.ip6.address)
2914
Mohsin Kazmid40c3e62018-11-21 10:46:57 +01002915 rxs = self.send_and_expect(self.pg2, p6[1] * 17, sep3.itf)
Neale Ranns13a08cc2018-11-07 09:25:54 -08002916
2917 for rx in rxs:
2918 self.assertEqual(rx[Ether].src, routed_src_mac)
2919 self.assertEqual(rx[Ether].dst, sep3.mac)
Mohsin Kazmid40c3e62018-11-21 10:46:57 +01002920 self.assertEqual(rx[IPv6].src, ep3.ip6.address)
2921 self.assertEqual(rx[IPv6].dst, ep1.ip6.address)
Neale Ranns13a08cc2018-11-07 09:25:54 -08002922
2923 #
2924 # programme the unknown EP
2925 #
2926 sep4.add_vpp_config()
2927
2928 rxs = self.send_and_expect(self.pg0, p6[0] * 17, sep4.itf)
2929
2930 for rx in rxs:
2931 self.assertEqual(rx[Ether].src, routed_src_mac)
2932 self.assertEqual(rx[Ether].dst, sep4.mac)
2933 self.assertEqual(rx[IPv6].src, ep1.ip6.address)
2934 self.assertEqual(rx[IPv6].dst, ep3.ip6.address)
2935
2936 #
2937 # and revert back to unprogrammed
2938 #
2939 sep4.remove_vpp_config()
2940
2941 rxs = self.send_and_expect(self.pg0, p6[0] * 17, self.pg7)
2942
2943 for rx in rxs:
2944 self.assertEqual(rx[Ether].src, self.pg7.local_mac)
2945 self.assertEqual(rx[Ether].dst, self.pg7.remote_mac)
2946 self.assertEqual(rx[IP].src, self.pg7.local_ip4)
2947 self.assertEqual(rx[IP].dst, self.pg7.remote_ip4)
2948 self.assertEqual(rx[VXLAN].vni, 117)
2949 self.assertTrue(rx[VXLAN].flags.G)
2950 self.assertTrue(rx[VXLAN].flags.Instance)
2951 # redirect policy has been applied
2952 self.assertTrue(rx[VXLAN].gpflags.A)
2953 self.assertFalse(rx[VXLAN].gpflags.D)
2954
2955 inner = rx[VXLAN].payload
2956
2957 self.assertEqual(inner[Ether].src, routed_src_mac)
2958 self.assertEqual(inner[Ether].dst, sep4.mac)
2959 self.assertEqual(inner[IPv6].src, ep1.ip6.address)
2960 self.assertEqual(inner[IPv6].dst, ep3.ip6.address)
2961
Mohsin Kazmid40c3e62018-11-21 10:46:57 +01002962 c1.remove_vpp_config()
2963 c2.remove_vpp_config()
2964
2965 #
2966 # test the symmetric hash mode
2967 #
2968 c1 = VppGbpContract(
Neale Ranns4dd4cf42019-03-27 05:06:47 -07002969 self, epg_220.sclass, epg_222.sclass, acl_index,
Mohsin Kazmid40c3e62018-11-21 10:46:57 +01002970 [VppGbpContractRule(
2971 VppEnum.vl_api_gbp_rule_action_t.GBP_API_RULE_REDIRECT,
2972 VppEnum.vl_api_gbp_hash_mode_t.GBP_API_HASH_MODE_SYMMETRIC,
2973 [VppGbpContractNextHop(sep1.vmac, sep1.epg.bd,
2974 sep1.ip4, sep1.epg.rd),
2975 VppGbpContractNextHop(sep2.vmac, sep2.epg.bd,
2976 sep2.ip4, sep2.epg.rd)]),
2977 VppGbpContractRule(
2978 VppEnum.vl_api_gbp_rule_action_t.GBP_API_RULE_REDIRECT,
2979 VppEnum.vl_api_gbp_hash_mode_t.GBP_API_HASH_MODE_SYMMETRIC,
2980 [VppGbpContractNextHop(sep3.vmac, sep3.epg.bd,
2981 sep3.ip6, sep3.epg.rd),
2982 VppGbpContractNextHop(sep4.vmac, sep4.epg.bd,
Neale Ranns1c17e2e2018-12-20 12:03:59 -08002983 sep4.ip6, sep4.epg.rd)])],
2984 [ETH_P_IP, ETH_P_IPV6])
Mohsin Kazmid40c3e62018-11-21 10:46:57 +01002985 c1.add_vpp_config()
2986
2987 c2 = VppGbpContract(
Neale Ranns4dd4cf42019-03-27 05:06:47 -07002988 self, epg_222.sclass, epg_220.sclass, acl_index,
Mohsin Kazmid40c3e62018-11-21 10:46:57 +01002989 [VppGbpContractRule(
2990 VppEnum.vl_api_gbp_rule_action_t.GBP_API_RULE_REDIRECT,
2991 VppEnum.vl_api_gbp_hash_mode_t.GBP_API_HASH_MODE_SYMMETRIC,
2992 [VppGbpContractNextHop(sep1.vmac, sep1.epg.bd,
2993 sep1.ip4, sep1.epg.rd),
2994 VppGbpContractNextHop(sep2.vmac, sep2.epg.bd,
2995 sep2.ip4, sep2.epg.rd)]),
2996 VppGbpContractRule(
2997 VppEnum.vl_api_gbp_rule_action_t.GBP_API_RULE_REDIRECT,
2998 VppEnum.vl_api_gbp_hash_mode_t.GBP_API_HASH_MODE_SYMMETRIC,
2999 [VppGbpContractNextHop(sep3.vmac, sep3.epg.bd,
3000 sep3.ip6, sep3.epg.rd),
3001 VppGbpContractNextHop(sep4.vmac, sep4.epg.bd,
Neale Ranns1c17e2e2018-12-20 12:03:59 -08003002 sep4.ip6, sep4.epg.rd)])],
3003 [ETH_P_IP, ETH_P_IPV6])
Mohsin Kazmid40c3e62018-11-21 10:46:57 +01003004 c2.add_vpp_config()
3005
3006 #
3007 # send again with the contract preset, now packets arrive
3008 # at SEP1 for both directions
3009 #
3010 rxs = self.send_and_expect(self.pg0, p4[0] * 17, sep1.itf)
3011
3012 for rx in rxs:
3013 self.assertEqual(rx[Ether].src, routed_src_mac)
3014 self.assertEqual(rx[Ether].dst, sep1.mac)
3015 self.assertEqual(rx[IP].src, ep1.ip4.address)
3016 self.assertEqual(rx[IP].dst, ep3.ip4.address)
3017
3018 rxs = self.send_and_expect(self.pg2, p4[1] * 17, sep1.itf)
3019
3020 for rx in rxs:
3021 self.assertEqual(rx[Ether].src, routed_src_mac)
3022 self.assertEqual(rx[Ether].dst, sep1.mac)
3023 self.assertEqual(rx[IP].src, ep3.ip4.address)
3024 self.assertEqual(rx[IP].dst, ep1.ip4.address)
3025
Neale Ranns13a08cc2018-11-07 09:25:54 -08003026 #
3027 # programme the unknown EP for the L3 tests
3028 #
3029 sep4.add_vpp_config()
3030
3031 #
3032 # an L3 switch packet between local EPs in different EPGs
3033 # different dest ports on each so the are LB hashed differently
3034 #
Ole Troan8006c6a2018-12-17 12:02:26 +01003035 p4 = [(Ether(src=ep1.mac, dst=str(self.router_mac)) /
Neale Ranns13a08cc2018-11-07 09:25:54 -08003036 IP(src=ep1.ip4.address, dst=ep2.ip4.address) /
3037 UDP(sport=1234, dport=1234) /
3038 Raw('\xa5' * 100)),
Ole Troan8006c6a2018-12-17 12:02:26 +01003039 (Ether(src=ep2.mac, dst=str(self.router_mac)) /
Mohsin Kazmid40c3e62018-11-21 10:46:57 +01003040 IP(src=ep2.ip4.address, dst=ep1.ip4.address) /
3041 UDP(sport=1234, dport=1234) /
Neale Ranns13a08cc2018-11-07 09:25:54 -08003042 Raw('\xa5' * 100))]
Ole Troan8006c6a2018-12-17 12:02:26 +01003043 p6 = [(Ether(src=ep1.mac, dst=str(self.router_mac)) /
Neale Ranns13a08cc2018-11-07 09:25:54 -08003044 IPv6(src=ep1.ip6.address, dst=ep2.ip6.address) /
3045 UDP(sport=1234, dport=1234) /
3046 Raw('\xa5' * 100)),
Ole Troan8006c6a2018-12-17 12:02:26 +01003047 (Ether(src=ep2.mac, dst=str(self.router_mac)) /
Mohsin Kazmid40c3e62018-11-21 10:46:57 +01003048 IPv6(src=ep2.ip6.address, dst=ep1.ip6.address) /
3049 UDP(sport=1234, dport=1234) /
Neale Ranns13a08cc2018-11-07 09:25:54 -08003050 Raw('\xa5' * 100))]
3051
Mohsin Kazmid40c3e62018-11-21 10:46:57 +01003052 c3 = VppGbpContract(
Neale Ranns4dd4cf42019-03-27 05:06:47 -07003053 self, epg_220.sclass, epg_221.sclass, acl_index,
Neale Ranns1c17e2e2018-12-20 12:03:59 -08003054 [VppGbpContractRule(
3055 VppEnum.vl_api_gbp_rule_action_t.GBP_API_RULE_REDIRECT,
3056 VppEnum.vl_api_gbp_hash_mode_t.GBP_API_HASH_MODE_SYMMETRIC,
3057 [VppGbpContractNextHop(sep1.vmac, sep1.epg.bd,
3058 sep1.ip4, sep1.epg.rd),
3059 VppGbpContractNextHop(sep2.vmac, sep2.epg.bd,
3060 sep2.ip4, sep2.epg.rd)]),
3061 VppGbpContractRule(
Neale Ranns13a08cc2018-11-07 09:25:54 -08003062 VppEnum.vl_api_gbp_rule_action_t.GBP_API_RULE_REDIRECT,
Mohsin Kazmid40c3e62018-11-21 10:46:57 +01003063 VppEnum.vl_api_gbp_hash_mode_t.GBP_API_HASH_MODE_SYMMETRIC,
Neale Ranns1c17e2e2018-12-20 12:03:59 -08003064 [VppGbpContractNextHop(sep3.vmac, sep3.epg.bd,
3065 sep3.ip6, sep3.epg.rd),
3066 VppGbpContractNextHop(sep4.vmac, sep4.epg.bd,
3067 sep4.ip6, sep4.epg.rd)])],
3068 [ETH_P_IP, ETH_P_IPV6])
Mohsin Kazmid40c3e62018-11-21 10:46:57 +01003069 c3.add_vpp_config()
Neale Ranns13a08cc2018-11-07 09:25:54 -08003070
Mohsin Kazmid40c3e62018-11-21 10:46:57 +01003071 rxs = self.send_and_expect(self.pg0, p4[0] * 17, sep1.itf)
Neale Ranns13a08cc2018-11-07 09:25:54 -08003072
3073 for rx in rxs:
3074 self.assertEqual(rx[Ether].src, routed_src_mac)
Mohsin Kazmid40c3e62018-11-21 10:46:57 +01003075 self.assertEqual(rx[Ether].dst, sep1.mac)
Neale Ranns13a08cc2018-11-07 09:25:54 -08003076 self.assertEqual(rx[IP].src, ep1.ip4.address)
3077 self.assertEqual(rx[IP].dst, ep2.ip4.address)
3078
3079 #
3080 # learn a remote EP in EPG 221
3081 #
3082 vx_tun_l3 = VppGbpVxlanTunnel(
3083 self, 444, rd1.rd_id,
Neale Ranns8da9fc62019-03-04 14:08:11 -08003084 VppEnum.vl_api_gbp_vxlan_tunnel_mode_t.GBP_VXLAN_TUNNEL_MODE_L3,
3085 self.pg2.local_ip4)
Neale Ranns13a08cc2018-11-07 09:25:54 -08003086 vx_tun_l3.add_vpp_config()
3087
Mohsin Kazmid40c3e62018-11-21 10:46:57 +01003088 c4 = VppGbpContract(
Neale Ranns4dd4cf42019-03-27 05:06:47 -07003089 self, epg_221.sclass, epg_220.sclass, acl_index,
Neale Ranns13a08cc2018-11-07 09:25:54 -08003090 [VppGbpContractRule(
3091 VppEnum.vl_api_gbp_rule_action_t.GBP_API_RULE_PERMIT,
3092 []),
3093 VppGbpContractRule(
3094 VppEnum.vl_api_gbp_rule_action_t.GBP_API_RULE_PERMIT,
Neale Ranns1c17e2e2018-12-20 12:03:59 -08003095 [])],
3096 [ETH_P_IP, ETH_P_IPV6])
Mohsin Kazmid40c3e62018-11-21 10:46:57 +01003097 c4.add_vpp_config()
Neale Ranns13a08cc2018-11-07 09:25:54 -08003098
3099 p = (Ether(src=self.pg7.remote_mac,
3100 dst=self.pg7.local_mac) /
3101 IP(src=self.pg7.remote_ip4,
3102 dst=self.pg7.local_ip4) /
3103 UDP(sport=1234, dport=48879) /
Neale Ranns879d11c2019-01-21 23:34:18 -08003104 VXLAN(vni=444, gpid=441, flags=0x88) /
Ole Troan8006c6a2018-12-17 12:02:26 +01003105 Ether(src="00:22:22:22:22:33", dst=str(self.router_mac)) /
Neale Ranns13a08cc2018-11-07 09:25:54 -08003106 IP(src="10.0.0.88", dst=ep1.ip4.address) /
3107 UDP(sport=1234, dport=1234) /
3108 Raw('\xa5' * 100))
3109
3110 rx = self.send_and_expect(self.pg7, [p], self.pg0)
3111
3112 # endpoint learnt via the parent GBP-vxlan interface
3113 self.assertTrue(find_gbp_endpoint(self,
3114 vx_tun_l3._sw_if_index,
3115 ip="10.0.0.88"))
3116
3117 p = (Ether(src=self.pg7.remote_mac,
3118 dst=self.pg7.local_mac) /
3119 IP(src=self.pg7.remote_ip4,
3120 dst=self.pg7.local_ip4) /
3121 UDP(sport=1234, dport=48879) /
Neale Ranns879d11c2019-01-21 23:34:18 -08003122 VXLAN(vni=444, gpid=441, flags=0x88) /
Ole Troan8006c6a2018-12-17 12:02:26 +01003123 Ether(src="00:22:22:22:22:33", dst=str(self.router_mac)) /
Neale Ranns13a08cc2018-11-07 09:25:54 -08003124 IPv6(src="2001:10::88", dst=ep1.ip6.address) /
3125 UDP(sport=1234, dport=1234) /
3126 Raw('\xa5' * 100))
3127
3128 rx = self.send_and_expect(self.pg7, [p], self.pg0)
3129
3130 # endpoint learnt via the parent GBP-vxlan interface
3131 self.assertTrue(find_gbp_endpoint(self,
3132 vx_tun_l3._sw_if_index,
3133 ip="2001:10::88"))
3134
3135 #
3136 # L3 switch from local to remote EP
3137 #
Ole Troan8006c6a2018-12-17 12:02:26 +01003138 p4 = [(Ether(src=ep1.mac, dst=str(self.router_mac)) /
Neale Ranns13a08cc2018-11-07 09:25:54 -08003139 IP(src=ep1.ip4.address, dst="10.0.0.88") /
3140 UDP(sport=1234, dport=1234) /
Neale Ranns13a08cc2018-11-07 09:25:54 -08003141 Raw('\xa5' * 100))]
Ole Troan8006c6a2018-12-17 12:02:26 +01003142 p6 = [(Ether(src=ep1.mac, dst=str(self.router_mac)) /
Neale Ranns13a08cc2018-11-07 09:25:54 -08003143 IPv6(src=ep1.ip6.address, dst="2001:10::88") /
3144 UDP(sport=1234, dport=1234) /
Neale Ranns13a08cc2018-11-07 09:25:54 -08003145 Raw('\xa5' * 100))]
3146
Mohsin Kazmid40c3e62018-11-21 10:46:57 +01003147 rxs = self.send_and_expect(self.pg0, p4[0] * 17, sep1.itf)
Neale Ranns13a08cc2018-11-07 09:25:54 -08003148
3149 for rx in rxs:
3150 self.assertEqual(rx[Ether].src, routed_src_mac)
3151 self.assertEqual(rx[Ether].dst, sep1.mac)
3152 self.assertEqual(rx[IP].src, ep1.ip4.address)
3153 self.assertEqual(rx[IP].dst, "10.0.0.88")
3154
3155 rxs = self.send_and_expect(self.pg0, p6[0] * 17, sep4.itf)
3156
3157 for rx in rxs:
3158 self.assertEqual(rx[Ether].src, routed_src_mac)
3159 self.assertEqual(rx[Ether].dst, sep4.mac)
3160 self.assertEqual(rx[IPv6].src, ep1.ip6.address)
3161 self.assertEqual(rx[IPv6].dst, "2001:10::88")
3162
Mohsin Kazmid40c3e62018-11-21 10:46:57 +01003163 #
3164 # test the dst-ip hash mode
3165 #
3166 c5 = VppGbpContract(
Neale Ranns4dd4cf42019-03-27 05:06:47 -07003167 self, epg_220.sclass, epg_221.sclass, acl_index,
Mohsin Kazmid40c3e62018-11-21 10:46:57 +01003168 [VppGbpContractRule(
3169 VppEnum.vl_api_gbp_rule_action_t.GBP_API_RULE_REDIRECT,
3170 VppEnum.vl_api_gbp_hash_mode_t.GBP_API_HASH_MODE_DST_IP,
3171 [VppGbpContractNextHop(sep1.vmac, sep1.epg.bd,
3172 sep1.ip4, sep1.epg.rd),
3173 VppGbpContractNextHop(sep2.vmac, sep2.epg.bd,
3174 sep2.ip4, sep2.epg.rd)]),
3175 VppGbpContractRule(
3176 VppEnum.vl_api_gbp_rule_action_t.GBP_API_RULE_REDIRECT,
3177 VppEnum.vl_api_gbp_hash_mode_t.GBP_API_HASH_MODE_DST_IP,
3178 [VppGbpContractNextHop(sep3.vmac, sep3.epg.bd,
3179 sep3.ip6, sep3.epg.rd),
3180 VppGbpContractNextHop(sep4.vmac, sep4.epg.bd,
Neale Ranns1c17e2e2018-12-20 12:03:59 -08003181 sep4.ip6, sep4.epg.rd)])],
3182 [ETH_P_IP, ETH_P_IPV6])
Mohsin Kazmid40c3e62018-11-21 10:46:57 +01003183 c5.add_vpp_config()
3184
3185 rxs = self.send_and_expect(self.pg0, p4[0] * 17, sep1.itf)
3186
3187 for rx in rxs:
3188 self.assertEqual(rx[Ether].src, routed_src_mac)
3189 self.assertEqual(rx[Ether].dst, sep1.mac)
3190 self.assertEqual(rx[IP].src, ep1.ip4.address)
3191 self.assertEqual(rx[IP].dst, "10.0.0.88")
3192
3193 rxs = self.send_and_expect(self.pg0, p6[0] * 17, sep3.itf)
Neale Ranns13a08cc2018-11-07 09:25:54 -08003194
3195 for rx in rxs:
3196 self.assertEqual(rx[Ether].src, routed_src_mac)
3197 self.assertEqual(rx[Ether].dst, sep3.mac)
3198 self.assertEqual(rx[IPv6].src, ep1.ip6.address)
3199 self.assertEqual(rx[IPv6].dst, "2001:10::88")
3200
Neale Rannsb6a47952018-11-21 05:44:35 -08003201 #
3202 # cleanup
3203 #
3204 self.pg7.unconfig_ip4()
3205
3206 def test_gbp_l3_out(self):
3207 """ GBP L3 Out """
3208
3209 ep_flags = VppEnum.vl_api_gbp_endpoint_flags_t
3210 self.vapi.cli("set logging class gbp debug")
3211
3212 routed_dst_mac = "00:0c:0c:0c:0c:0c"
3213 routed_src_mac = "00:22:bd:f8:19:ff"
3214
3215 #
3216 # IP tables
3217 #
3218 t4 = VppIpTable(self, 1)
3219 t4.add_vpp_config()
3220 t6 = VppIpTable(self, 1, True)
3221 t6.add_vpp_config()
3222
3223 rd1 = VppGbpRouteDomain(self, 2, t4, t6)
3224 rd1.add_vpp_config()
3225
Ole Troan8006c6a2018-12-17 12:02:26 +01003226 self.loop0.set_mac(self.router_mac)
Neale Rannsb6a47952018-11-21 05:44:35 -08003227
3228 #
3229 # Bind the BVI to the RD
3230 #
3231 VppIpInterfaceBind(self, self.loop0, t4).add_vpp_config()
3232 VppIpInterfaceBind(self, self.loop0, t6).add_vpp_config()
3233
3234 #
3235 # Pg7 hosts a BD's BUM
3236 # Pg1 some other l3 interface
3237 #
3238 self.pg7.config_ip4()
3239 self.pg7.resolve_arp()
3240
3241 #
Neale Ranns879d11c2019-01-21 23:34:18 -08003242 # a multicast vxlan-gbp tunnel for broadcast in the BD
3243 #
3244 tun_bm = VppVxlanGbpTunnel(self, self.pg7.local_ip4,
3245 "239.1.1.1", 88,
3246 mcast_itf=self.pg7)
3247 tun_bm.add_vpp_config()
3248
3249 #
Neale Rannsb6a47952018-11-21 05:44:35 -08003250 # a GBP external bridge domains for the EPs
3251 #
3252 bd1 = VppBridgeDomain(self, 1)
3253 bd1.add_vpp_config()
Neale Ranns879d11c2019-01-21 23:34:18 -08003254 gbd1 = VppGbpBridgeDomain(self, bd1, self.loop0, None, tun_bm)
Neale Rannsb6a47952018-11-21 05:44:35 -08003255 gbd1.add_vpp_config()
3256
3257 #
3258 # The Endpoint-groups in which the external endpoints exist
3259 #
Neale Ranns879d11c2019-01-21 23:34:18 -08003260 epg_220 = VppGbpEndpointGroup(self, 220, 113, rd1, gbd1,
Neale Rannsb6a47952018-11-21 05:44:35 -08003261 None, gbd1.bvi,
3262 "10.0.0.128",
Neale Ranns32f6d8e2019-03-05 04:22:08 -08003263 "2001:10::128",
3264 VppGbpEndpointRetention(2))
Neale Rannsb6a47952018-11-21 05:44:35 -08003265 epg_220.add_vpp_config()
3266
3267 # the BVIs have the subnets applied ...
3268 ip4_addr = VppIpInterfaceAddress(self, gbd1.bvi, "10.0.0.128", 24)
3269 ip4_addr.add_vpp_config()
3270 ip6_addr = VppIpInterfaceAddress(self, gbd1.bvi, "2001:10::128", 64)
3271 ip6_addr.add_vpp_config()
3272
3273 # ... which are L3-out subnets
3274 l3o_1 = VppGbpSubnet(
3275 self, rd1, "10.0.0.0", 24,
3276 VppEnum.vl_api_gbp_subnet_type_t.GBP_API_SUBNET_L3_OUT,
Neale Ranns4dd4cf42019-03-27 05:06:47 -07003277 sclass=113)
Neale Rannsb6a47952018-11-21 05:44:35 -08003278 l3o_1.add_vpp_config()
3279
3280 #
3281 # an external interface attached to the outside world and the
3282 # external BD
3283 #
3284 vlan_100 = VppDot1QSubint(self, self.pg0, 100)
3285 vlan_100.admin_up()
Neale Ranns36abbf12019-03-12 02:34:07 -07003286 VppL2Vtr(self, vlan_100, L2_VTR_OP.L2_POP_1).add_vpp_config()
3287 vlan_101 = VppDot1QSubint(self, self.pg0, 101)
3288 vlan_101.admin_up()
3289 VppL2Vtr(self, vlan_101, L2_VTR_OP.L2_POP_1).add_vpp_config()
3290
3291 ext_itf = VppGbpExtItf(self, self.loop0, bd1, rd1)
Neale Rannsb6a47952018-11-21 05:44:35 -08003292 ext_itf.add_vpp_config()
3293
3294 #
Neale Ranns879d11c2019-01-21 23:34:18 -08003295 # an unicast vxlan-gbp for inter-RD traffic
Neale Rannsb6a47952018-11-21 05:44:35 -08003296 #
3297 vx_tun_l3 = VppGbpVxlanTunnel(
3298 self, 444, rd1.rd_id,
Neale Ranns8da9fc62019-03-04 14:08:11 -08003299 VppEnum.vl_api_gbp_vxlan_tunnel_mode_t.GBP_VXLAN_TUNNEL_MODE_L3,
3300 self.pg2.local_ip4)
Neale Rannsb6a47952018-11-21 05:44:35 -08003301 vx_tun_l3.add_vpp_config()
3302
3303 #
Neale Ranns36abbf12019-03-12 02:34:07 -07003304 # External Endpoints
3305 #
3306 eep1 = VppGbpEndpoint(self, vlan_100,
3307 epg_220, None,
3308 "10.0.0.1", "11.0.0.1",
3309 "2001:10::1", "3001::1",
3310 ep_flags.GBP_API_ENDPOINT_FLAG_EXTERNAL)
3311 eep1.add_vpp_config()
3312 eep2 = VppGbpEndpoint(self, vlan_101,
3313 epg_220, None,
3314 "10.0.0.2", "11.0.0.2",
3315 "2001:10::2", "3001::2",
3316 ep_flags.GBP_API_ENDPOINT_FLAG_EXTERNAL)
3317 eep2.add_vpp_config()
3318
3319 #
Neale Ranns4dd4cf42019-03-27 05:06:47 -07003320 # A remote external endpoint
Neale Ranns36abbf12019-03-12 02:34:07 -07003321 #
3322 rep = VppGbpEndpoint(self, vx_tun_l3,
3323 epg_220, None,
3324 "10.0.0.101", "11.0.0.101",
3325 "2001:10::101", "3001::101",
3326 ep_flags.GBP_API_ENDPOINT_FLAG_REMOTE,
3327 self.pg7.local_ip4,
3328 self.pg7.remote_ip4,
3329 mac=None)
3330 rep.add_vpp_config()
3331
3332 #
Paul Vinciguerra8feeaff2019-03-27 11:25:48 -07003333 # ARP packet from External EPs are accepted and replied to
Neale Ranns4c2bff02019-03-14 02:52:27 -07003334 #
3335 p_arp = (Ether(src=eep1.mac, dst="ff:ff:ff:ff:ff:ff") /
3336 Dot1Q(vlan=100) /
3337 ARP(op="who-has",
3338 psrc=eep1.ip4.address, pdst="10.0.0.128",
3339 hwsrc=eep1.mac, hwdst="ff:ff:ff:ff:ff:ff"))
3340 rxs = self.send_and_expect(self.pg0, p_arp * 1, self.pg0)
3341
3342 #
Paul Vinciguerraa7427ec2019-03-10 10:04:23 -07003343 # packets destined to unknown addresses in the BVI's subnet
Neale Rannsb6a47952018-11-21 05:44:35 -08003344 # are ARP'd for
3345 #
Neale Ranns36abbf12019-03-12 02:34:07 -07003346 p4 = (Ether(src=eep1.mac, dst=str(self.router_mac)) /
Neale Rannsb6a47952018-11-21 05:44:35 -08003347 Dot1Q(vlan=100) /
3348 IP(src="10.0.0.1", dst="10.0.0.88") /
3349 UDP(sport=1234, dport=1234) /
3350 Raw('\xa5' * 100))
Neale Ranns36abbf12019-03-12 02:34:07 -07003351 p6 = (Ether(src=eep1.mac, dst=str(self.router_mac)) /
Neale Rannsb6a47952018-11-21 05:44:35 -08003352 Dot1Q(vlan=100) /
3353 IPv6(src="2001:10::1", dst="2001:10::88") /
3354 UDP(sport=1234, dport=1234) /
3355 Raw('\xa5' * 100))
3356
3357 rxs = self.send_and_expect(self.pg0, p4 * 1, self.pg7)
3358
3359 for rx in rxs:
3360 self.assertEqual(rx[Ether].src, self.pg7.local_mac)
3361 # self.assertEqual(rx[Ether].dst, self.pg7.remote_mac)
3362 self.assertEqual(rx[IP].src, self.pg7.local_ip4)
3363 self.assertEqual(rx[IP].dst, "239.1.1.1")
3364 self.assertEqual(rx[VXLAN].vni, 88)
3365 self.assertTrue(rx[VXLAN].flags.G)
3366 self.assertTrue(rx[VXLAN].flags.Instance)
Neale Ranns45db8852019-01-09 00:04:04 -08003367 # policy was applied to the original IP packet
Neale Ranns879d11c2019-01-21 23:34:18 -08003368 self.assertEqual(rx[VXLAN].gpid, 113)
Neale Ranns45db8852019-01-09 00:04:04 -08003369 self.assertTrue(rx[VXLAN].gpflags.A)
Neale Rannsb6a47952018-11-21 05:44:35 -08003370 self.assertFalse(rx[VXLAN].gpflags.D)
3371
3372 inner = rx[VXLAN].payload
3373
3374 self.assertTrue(inner.haslayer(ARP))
3375
3376 #
Neale Rannsb6a47952018-11-21 05:44:35 -08003377 # remote to external
3378 #
3379 p = (Ether(src=self.pg7.remote_mac,
3380 dst=self.pg7.local_mac) /
3381 IP(src=self.pg7.remote_ip4,
3382 dst=self.pg7.local_ip4) /
3383 UDP(sport=1234, dport=48879) /
Neale Ranns879d11c2019-01-21 23:34:18 -08003384 VXLAN(vni=444, gpid=113, flags=0x88) /
Ole Troan8006c6a2018-12-17 12:02:26 +01003385 Ether(src=self.pg0.remote_mac, dst=str(self.router_mac)) /
Neale Rannsb6a47952018-11-21 05:44:35 -08003386 IP(src="10.0.0.101", dst="10.0.0.1") /
3387 UDP(sport=1234, dport=1234) /
3388 Raw('\xa5' * 100))
3389
3390 rxs = self.send_and_expect(self.pg7, p * 1, self.pg0)
3391
3392 #
Neale Ranns36abbf12019-03-12 02:34:07 -07003393 # local EP pings router
3394 #
3395 p = (Ether(src=eep1.mac, dst=str(self.router_mac)) /
3396 Dot1Q(vlan=100) /
3397 IP(src=eep1.ip4.address, dst="10.0.0.128") /
3398 ICMP(type='echo-request'))
3399
3400 rxs = self.send_and_expect(self.pg0, p * 1, self.pg0)
3401
3402 for rx in rxs:
3403 self.assertEqual(rx[Ether].src, str(self.router_mac))
3404 self.assertEqual(rx[Ether].dst, eep1.mac)
3405 self.assertEqual(rx[Dot1Q].vlan, 100)
3406
3407 #
3408 # local EP pings other local EP
3409 #
3410 p = (Ether(src=eep1.mac, dst=eep2.mac) /
3411 Dot1Q(vlan=100) /
3412 IP(src=eep1.ip4.address, dst=eep2.ip4.address) /
3413 ICMP(type='echo-request'))
3414
3415 rxs = self.send_and_expect(self.pg0, p * 1, self.pg0)
3416
3417 for rx in rxs:
3418 self.assertEqual(rx[Ether].src, eep1.mac)
3419 self.assertEqual(rx[Ether].dst, eep2.mac)
3420 self.assertEqual(rx[Dot1Q].vlan, 101)
3421
3422 #
Neale Ranns4dd4cf42019-03-27 05:06:47 -07003423 # A subnet reachable through the external EP1
Neale Rannsb6a47952018-11-21 05:44:35 -08003424 #
3425 ip_220 = VppIpRoute(self, "10.220.0.0", 24,
Neale Ranns36abbf12019-03-12 02:34:07 -07003426 [VppRoutePath(eep1.ip4.address,
3427 eep1.epg.bvi.sw_if_index)],
Neale Rannsb6a47952018-11-21 05:44:35 -08003428 table_id=t4.table_id)
3429 ip_220.add_vpp_config()
3430
3431 l3o_220 = VppGbpSubnet(
3432 self, rd1, "10.220.0.0", 24,
3433 VppEnum.vl_api_gbp_subnet_type_t.GBP_API_SUBNET_L3_OUT,
Neale Ranns4dd4cf42019-03-27 05:06:47 -07003434 sclass=4220)
Neale Rannsb6a47952018-11-21 05:44:35 -08003435 l3o_220.add_vpp_config()
3436
Neale Ranns4dd4cf42019-03-27 05:06:47 -07003437 #
3438 # A subnet reachable through the external EP2
3439 #
3440 ip_221 = VppIpRoute(self, "10.221.0.0", 24,
3441 [VppRoutePath(eep2.ip4.address,
3442 eep2.epg.bvi.sw_if_index)],
3443 table_id=t4.table_id)
3444 ip_221.add_vpp_config()
3445
3446 l3o_221 = VppGbpSubnet(
3447 self, rd1, "10.221.0.0", 24,
3448 VppEnum.vl_api_gbp_subnet_type_t.GBP_API_SUBNET_L3_OUT,
3449 sclass=4221)
3450 l3o_221.add_vpp_config()
3451
3452 #
3453 # ping between hosts in remote subnets
3454 # dropped without a contract
3455 #
3456 p = (Ether(src=eep1.mac, dst=str(self.router_mac)) /
3457 Dot1Q(vlan=100) /
3458 IP(src="10.220.0.1", dst="10.221.0.1") /
3459 ICMP(type='echo-request'))
3460
3461 rxs = self.send_and_assert_no_replies(self.pg0, p * 1)
3462
3463 #
3464 # contract for the external nets to communicate
3465 #
3466 acl = VppGbpAcl(self)
3467 rule4 = acl.create_rule(permit_deny=1, proto=17)
3468 rule6 = acl.create_rule(is_ipv6=1, permit_deny=1, proto=17)
3469 acl_index = acl.add_vpp_config([rule4, rule6])
3470
3471 c1 = VppGbpContract(
3472 self, 4220, 4221, acl_index,
3473 [VppGbpContractRule(
3474 VppEnum.vl_api_gbp_rule_action_t.GBP_API_RULE_PERMIT,
3475 []),
3476 VppGbpContractRule(
3477 VppEnum.vl_api_gbp_rule_action_t.GBP_API_RULE_PERMIT,
3478 [])],
3479 [ETH_P_IP, ETH_P_IPV6])
3480 c1.add_vpp_config()
3481
3482 #
3483 # Contracts allowing ext-net 200 to talk with external EPs
3484 #
3485 c2 = VppGbpContract(
3486 self, 4220, 113, acl_index,
3487 [VppGbpContractRule(
3488 VppEnum.vl_api_gbp_rule_action_t.GBP_API_RULE_PERMIT,
3489 []),
3490 VppGbpContractRule(
3491 VppEnum.vl_api_gbp_rule_action_t.GBP_API_RULE_PERMIT,
3492 [])],
3493 [ETH_P_IP, ETH_P_IPV6])
3494 c2.add_vpp_config()
3495 c3 = VppGbpContract(
3496 self, 113, 4220, acl_index,
3497 [VppGbpContractRule(
3498 VppEnum.vl_api_gbp_rule_action_t.GBP_API_RULE_PERMIT,
3499 []),
3500 VppGbpContractRule(
3501 VppEnum.vl_api_gbp_rule_action_t.GBP_API_RULE_PERMIT,
3502 [])],
3503 [ETH_P_IP, ETH_P_IPV6])
3504 c3.add_vpp_config()
3505
3506 #
3507 # ping between hosts in remote subnets
3508 #
3509 p = (Ether(src=eep1.mac, dst=str(self.router_mac)) /
3510 Dot1Q(vlan=100) /
3511 IP(src="10.220.0.1", dst="10.221.0.1") /
3512 UDP(sport=1234, dport=1234) /
3513 Raw('\xa5' * 100))
3514
3515 rxs = self.send_and_expect(self.pg0, p * 1, self.pg0)
3516
3517 for rx in rxs:
3518 self.assertEqual(rx[Ether].src, str(self.router_mac))
3519 self.assertEqual(rx[Ether].dst, eep2.mac)
3520 self.assertEqual(rx[Dot1Q].vlan, 101)
3521
3522 # we did not learn these external hosts
3523 self.assertFalse(find_gbp_endpoint(self, ip="10.220.0.1"))
3524 self.assertFalse(find_gbp_endpoint(self, ip="10.221.0.1"))
3525
3526 #
3527 # from remote external EP to local external EP
3528 #
Neale Rannsb6a47952018-11-21 05:44:35 -08003529 p = (Ether(src=self.pg7.remote_mac,
3530 dst=self.pg7.local_mac) /
3531 IP(src=self.pg7.remote_ip4,
3532 dst=self.pg7.local_ip4) /
3533 UDP(sport=1234, dport=48879) /
Neale Ranns879d11c2019-01-21 23:34:18 -08003534 VXLAN(vni=444, gpid=113, flags=0x88) /
Ole Troan8006c6a2018-12-17 12:02:26 +01003535 Ether(src=self.pg0.remote_mac, dst=str(self.router_mac)) /
Neale Rannsb6a47952018-11-21 05:44:35 -08003536 IP(src="10.0.0.101", dst="10.220.0.1") /
3537 UDP(sport=1234, dport=1234) /
3538 Raw('\xa5' * 100))
3539
3540 rxs = self.send_and_expect(self.pg7, p * 1, self.pg0)
3541
3542 #
Neale Ranns4dd4cf42019-03-27 05:06:47 -07003543 # ping from an external host to the remote external EP
Neale Ranns36abbf12019-03-12 02:34:07 -07003544 #
3545 p = (Ether(src=eep1.mac, dst=str(self.router_mac)) /
3546 Dot1Q(vlan=100) /
Neale Ranns4dd4cf42019-03-27 05:06:47 -07003547 IP(src="10.220.0.1", dst=rep.ip4.address) /
3548 UDP(sport=1234, dport=1234) /
3549 Raw('\xa5' * 100))
Neale Ranns36abbf12019-03-12 02:34:07 -07003550
Neale Ranns4dd4cf42019-03-27 05:06:47 -07003551 rxs = self.send_and_expect(self.pg0, p * 1, self.pg7)
Neale Ranns36abbf12019-03-12 02:34:07 -07003552
3553 for rx in rxs:
Neale Ranns4dd4cf42019-03-27 05:06:47 -07003554 self.assertEqual(rx[Ether].src, self.pg7.local_mac)
3555 # self.assertEqual(rx[Ether].dst, self.pg7.remote_mac)
3556 self.assertEqual(rx[IP].src, self.pg7.local_ip4)
3557 self.assertEqual(rx[IP].dst, self.pg7.remote_ip4)
3558 self.assertEqual(rx[VXLAN].vni, 444)
3559 self.assertTrue(rx[VXLAN].flags.G)
3560 self.assertTrue(rx[VXLAN].flags.Instance)
3561 # the sclass of the ext-net the packet came from
3562 self.assertEqual(rx[VXLAN].gpid, 4220)
3563 # policy was applied to the original IP packet
3564 self.assertTrue(rx[VXLAN].gpflags.A)
3565 # since it's an external host the reciever should not learn it
3566 self.assertTrue(rx[VXLAN].gpflags.D)
3567 inner = rx[VXLAN].payload
3568 self.assertEqual(inner[IP].src, "10.220.0.1")
3569 self.assertEqual(inner[IP].dst, rep.ip4.address)
3570
3571 #
3572 # An external subnet reachable via the remote external EP
3573 #
3574
3575 #
3576 # first the VXLAN-GBP tunnel over which it is reached
3577 #
3578 vx_tun_r = VppVxlanGbpTunnel(
3579 self, self.pg7.local_ip4,
3580 self.pg7.remote_ip4, 445,
3581 mode=(VppEnum.vl_api_vxlan_gbp_api_tunnel_mode_t.
3582 VXLAN_GBP_API_TUNNEL_MODE_L3))
3583 vx_tun_r.add_vpp_config()
3584 VppIpInterfaceBind(self, vx_tun_r, t4).add_vpp_config()
3585
3586 self.logger.info(self.vapi.cli("sh vxlan-gbp tunnel"))
3587
3588 #
3589 # then the special adj to resolve through on that tunnel
3590 #
3591 n1 = VppNeighbor(self,
3592 vx_tun_r.sw_if_index,
3593 "00:0c:0c:0c:0c:0c",
3594 self.pg7.remote_ip4)
3595 n1.add_vpp_config()
3596
3597 #
3598 # the route via the adj above
3599 #
3600 ip_222 = VppIpRoute(self, "10.222.0.0", 24,
3601 [VppRoutePath(self.pg7.remote_ip4,
3602 vx_tun_r.sw_if_index)],
3603 table_id=t4.table_id)
3604 ip_222.add_vpp_config()
3605
3606 l3o_222 = VppGbpSubnet(
3607 self, rd1, "10.222.0.0", 24,
3608 VppEnum.vl_api_gbp_subnet_type_t.GBP_API_SUBNET_L3_OUT,
3609 sclass=4222)
3610 l3o_222.add_vpp_config()
3611
3612 #
3613 # ping between hosts in local and remote external subnets
3614 # dropped without a contract
3615 #
3616 p = (Ether(src=eep1.mac, dst=str(self.router_mac)) /
3617 Dot1Q(vlan=100) /
3618 IP(src="10.220.0.1", dst="10.222.0.1") /
3619 UDP(sport=1234, dport=1234) /
3620 Raw('\xa5' * 100))
3621
3622 rxs = self.send_and_assert_no_replies(self.pg0, p * 1)
3623
3624 #
3625 # Add contracts ext-nets for 220 -> 222
3626 #
3627 c4 = VppGbpContract(
3628 self, 4220, 4222, acl_index,
3629 [VppGbpContractRule(
3630 VppEnum.vl_api_gbp_rule_action_t.GBP_API_RULE_PERMIT,
3631 []),
3632 VppGbpContractRule(
3633 VppEnum.vl_api_gbp_rule_action_t.GBP_API_RULE_PERMIT,
3634 [])],
3635 [ETH_P_IP, ETH_P_IPV6])
3636 c4.add_vpp_config()
3637
3638 #
3639 # ping from host in local to remote external subnets
3640 #
3641 p = (Ether(src=eep1.mac, dst=str(self.router_mac)) /
3642 Dot1Q(vlan=100) /
3643 IP(src="10.220.0.1", dst="10.222.0.1") /
3644 UDP(sport=1234, dport=1234) /
3645 Raw('\xa5' * 100))
3646
3647 rxs = self.send_and_expect(self.pg0, p * 3, self.pg7)
3648
3649 for rx in rxs:
3650 self.assertEqual(rx[Ether].src, self.pg7.local_mac)
3651 self.assertEqual(rx[Ether].dst, self.pg7.remote_mac)
3652 self.assertEqual(rx[IP].src, self.pg7.local_ip4)
3653 self.assertEqual(rx[IP].dst, self.pg7.remote_ip4)
3654 self.assertEqual(rx[VXLAN].vni, 445)
3655 self.assertTrue(rx[VXLAN].flags.G)
3656 self.assertTrue(rx[VXLAN].flags.Instance)
3657 # the sclass of the ext-net the packet came from
3658 self.assertEqual(rx[VXLAN].gpid, 4220)
3659 # policy was applied to the original IP packet
3660 self.assertTrue(rx[VXLAN].gpflags.A)
3661 # since it's an external host the reciever should not learn it
3662 self.assertTrue(rx[VXLAN].gpflags.D)
3663 inner = rx[VXLAN].payload
3664 self.assertEqual(inner[Ether].dst, "00:0c:0c:0c:0c:0c")
3665 self.assertEqual(inner[IP].src, "10.220.0.1")
3666 self.assertEqual(inner[IP].dst, "10.222.0.1")
3667
3668 #
3669 # ping from host in remote to local external subnets
3670 # there's no contract for this, but the A bit is set.
3671 #
3672 p = (Ether(src=self.pg7.remote_mac, dst=self.pg7.local_mac) /
3673 IP(src=self.pg7.remote_ip4, dst=self.pg7.local_ip4) /
3674 UDP(sport=1234, dport=48879) /
3675 VXLAN(vni=445, gpid=4222, flags=0x88, gpflags='A') /
3676 Ether(src=self.pg0.remote_mac, dst=str(self.router_mac)) /
3677 IP(src="10.222.0.1", dst="10.220.0.1") /
3678 UDP(sport=1234, dport=1234) /
3679 Raw('\xa5' * 100))
3680
3681 rxs = self.send_and_expect(self.pg7, p * 3, self.pg0)
3682 self.assertFalse(find_gbp_endpoint(self, ip="10.222.0.1"))
Neale Ranns36abbf12019-03-12 02:34:07 -07003683
3684 #
Neale Ranns2b600182019-03-29 05:08:27 -07003685 # ping from host in remote to remote external subnets
3686 # this is dropped by reflection check.
3687 #
3688 p = (Ether(src=self.pg7.remote_mac, dst=self.pg7.local_mac) /
3689 IP(src=self.pg7.remote_ip4, dst=self.pg7.local_ip4) /
3690 UDP(sport=1234, dport=48879) /
3691 VXLAN(vni=445, gpid=4222, flags=0x88, gpflags='A') /
3692 Ether(src=self.pg0.remote_mac, dst=str(self.router_mac)) /
3693 IP(src="10.222.0.1", dst="10.222.0.2") /
3694 UDP(sport=1234, dport=1234) /
3695 Raw('\xa5' * 100))
3696
3697 rxs = self.send_and_assert_no_replies(self.pg7, p * 3)
3698
3699 #
Neale Rannsb6a47952018-11-21 05:44:35 -08003700 # cleanup
3701 #
3702 self.pg7.unconfig_ip4()
Neale Ranns36abbf12019-03-12 02:34:07 -07003703 vlan_100.set_vtr(L2_VTR_OP.L2_DISABLED)
Neale Rannsb6a47952018-11-21 05:44:35 -08003704
Neale Rannsbc27d1b2018-02-05 01:13:38 -08003705
3706if __name__ == '__main__':
3707 unittest.main(testRunner=VppTestRunner)