blob: 876664ddbdc5c3d5dec6a249d1332e2782c67963 [file] [log] [blame]
Renato Botelho do Coutoead1e532019-10-31 13:31:07 -05001#!/usr/bin/env python3
Damjan Marionf56b77a2016-10-03 19:44:57 +02002
Eyal Baric4aaee12016-12-20 18:36:46 +02003import socket
Paul Vinciguerra2f156312020-05-02 22:34:40 -04004from util import ip4_range, reassemble4
Damjan Marionf56b77a2016-10-03 19:44:57 +02005import unittest
Dave Wallace8800f732023-08-31 00:47:44 -04006from framework import VppTestCase
7from asfframework import VppTestRunner
Damjan Marionf56b77a2016-10-03 19:44:57 +02008from template_bd import BridgeDomain
9
snaramre5d4b8912019-12-13 23:39:35 +000010from scapy.layers.l2 import Ether
Artem Glazychev23e5f092022-02-21 17:51:29 +070011from scapy.layers.l2 import ARP
Artem Glazychev839dcc02020-12-01 02:39:21 +070012from scapy.packet import Raw, bind_layers
Damjan Marionf56b77a2016-10-03 19:44:57 +020013from scapy.layers.inet import IP, UDP
Matej Klottondeb69842016-12-09 15:05:46 +010014from scapy.layers.vxlan import VXLAN
Paul Vinciguerra2f156312020-05-02 22:34:40 -040015
16import util
Neale Ranns097fa662018-05-01 05:17:55 -070017from vpp_ip_route import VppIpRoute, VppRoutePath
Jakub Grajciar7c0eb562020-03-02 13:55:31 +010018from vpp_vxlan_tunnel import VppVxlanTunnel
Neale Ranns097fa662018-05-01 05:17:55 -070019from vpp_ip import INVALID_INDEX
Artem Glazychev23e5f092022-02-21 17:51:29 +070020from vpp_neighbor import VppNeighbor
Damjan Marionf56b77a2016-10-03 19:44:57 +020021
22
Klement Sekeraf62ae122016-10-11 11:47:09 +020023class TestVxlan(BridgeDomain, VppTestCase):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +020024 """VXLAN Test Case"""
Damjan Marionf56b77a2016-10-03 19:44:57 +020025
Damjan Marionf56b77a2016-10-03 19:44:57 +020026 def __init__(self, *args):
27 BridgeDomain.__init__(self)
Damjan Marionf56b77a2016-10-03 19:44:57 +020028 VppTestCase.__init__(self, *args)
29
Eyal Baric4aaee12016-12-20 18:36:46 +020030 def encapsulate(self, pkt, vni):
Klement Sekeraf62ae122016-10-11 11:47:09 +020031 """
32 Encapsulate the original payload frame by adding VXLAN header with its
33 UDP, IP and Ethernet fields
34 """
Klement Sekerad9b0c6f2022-04-26 19:02:15 +020035 return (
36 Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac)
37 / IP(src=self.pg0.remote_ip4, dst=self.pg0.local_ip4)
38 / UDP(sport=self.dport, dport=self.dport, chksum=0)
39 / VXLAN(vni=vni, flags=self.flags)
40 / pkt
41 )
Eyal Baric4aaee12016-12-20 18:36:46 +020042
Eyal Baricef1e2a2018-06-18 13:01:59 +030043 def ip_range(self, start, end):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +020044 """range of remote ip's"""
Eyal Baricef1e2a2018-06-18 13:01:59 +030045 return ip4_range(self.pg0.remote_ip4, start, end)
46
Eyal Baric4aaee12016-12-20 18:36:46 +020047 def encap_mcast(self, pkt, src_ip, src_mac, vni):
48 """
49 Encapsulate the original payload frame by adding VXLAN header with its
50 UDP, IP and Ethernet fields
51 """
Klement Sekerad9b0c6f2022-04-26 19:02:15 +020052 return (
53 Ether(src=src_mac, dst=self.mcast_mac)
54 / IP(src=src_ip, dst=self.mcast_ip4)
55 / UDP(sport=self.dport, dport=self.dport, chksum=0)
56 / VXLAN(vni=vni, flags=self.flags)
57 / pkt
58 )
Damjan Marionf56b77a2016-10-03 19:44:57 +020059
Damjan Marionf56b77a2016-10-03 19:44:57 +020060 def decapsulate(self, pkt):
Klement Sekeraf62ae122016-10-11 11:47:09 +020061 """
62 Decapsulate the original payload frame by removing VXLAN header
63 """
Matej Klottondeb69842016-12-09 15:05:46 +010064 # check if is set I flag
Klement Sekerad9b0c6f2022-04-26 19:02:15 +020065 self.assertEqual(pkt[VXLAN].flags, int("0x8", 16))
Damjan Marionf56b77a2016-10-03 19:44:57 +020066 return pkt[VXLAN].payload
67
Klement Sekeraf62ae122016-10-11 11:47:09 +020068 # Method for checking VXLAN encapsulation.
Damjan Marionf56b77a2016-10-03 19:44:57 +020069 #
Eyal Bari6ae5ee72017-03-23 09:53:51 +020070 def check_encapsulation(self, pkt, vni, local_only=False, mcast_pkt=False):
Damjan Marionf56b77a2016-10-03 19:44:57 +020071 # TODO: add error messages
Klement Sekeraf62ae122016-10-11 11:47:09 +020072 # Verify source MAC is VPP_MAC and destination MAC is MY_MAC resolved
Damjan Marionf56b77a2016-10-03 19:44:57 +020073 # by VPP using ARP.
Klement Sekeraf62ae122016-10-11 11:47:09 +020074 self.assertEqual(pkt[Ether].src, self.pg0.local_mac)
Eyal Baric4aaee12016-12-20 18:36:46 +020075 if not local_only:
Eyal Bari6ae5ee72017-03-23 09:53:51 +020076 if not mcast_pkt:
77 self.assertEqual(pkt[Ether].dst, self.pg0.remote_mac)
78 else:
79 self.assertEqual(pkt[Ether].dst, type(self).mcast_mac)
Klement Sekeraf62ae122016-10-11 11:47:09 +020080 # Verify VXLAN tunnel source IP is VPP_IP and destination IP is MY_IP.
81 self.assertEqual(pkt[IP].src, self.pg0.local_ip4)
Eyal Baric4aaee12016-12-20 18:36:46 +020082 if not local_only:
Eyal Bari6ae5ee72017-03-23 09:53:51 +020083 if not mcast_pkt:
84 self.assertEqual(pkt[IP].dst, self.pg0.remote_ip4)
85 else:
86 self.assertEqual(pkt[IP].dst, type(self).mcast_ip4)
Klement Sekeraf62ae122016-10-11 11:47:09 +020087 # Verify UDP destination port is VXLAN 4789, source UDP port could be
Damjan Marionf56b77a2016-10-03 19:44:57 +020088 # arbitrary.
Artem Glazychev839dcc02020-12-01 02:39:21 +070089 self.assertEqual(pkt[UDP].dport, self.dport)
Vladimir Isaev698eb872020-05-21 16:34:17 +030090 # Verify UDP checksum
91 self.assert_udp_checksum_valid(pkt)
Eyal Baric4aaee12016-12-20 18:36:46 +020092 # Verify VNI
93 self.assertEqual(pkt[VXLAN].vni, vni)
94
Eyal Baric4aaee12016-12-20 18:36:46 +020095 @classmethod
Artem Glazychev839dcc02020-12-01 02:39:21 +070096 def create_vxlan_flood_test_bd(cls, vni, n_ucast_tunnels, port):
Eyal Baric4aaee12016-12-20 18:36:46 +020097 # Create 10 ucast vxlan tunnels under bd
98 ip_range_start = 10
Eyal Barid81da8c2017-01-11 13:39:54 +020099 ip_range_end = ip_range_start + n_ucast_tunnels
Neale Ranns097fa662018-05-01 05:17:55 -0700100 next_hop_address = cls.pg0.remote_ip4
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200101 for dest_ip4 in ip4_range(next_hop_address, ip_range_start, ip_range_end):
Paul Vinciguerra2f156312020-05-02 22:34:40 -0400102 # add host route so dest_ip4 will not be resolved
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200103 rip = VppIpRoute(
104 cls,
105 dest_ip4,
106 32,
107 [VppRoutePath(next_hop_address, INVALID_INDEX)],
108 register=False,
109 )
Neale Ranns097fa662018-05-01 05:17:55 -0700110 rip.add_vpp_config()
Neale Ranns097fa662018-05-01 05:17:55 -0700111
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200112 r = VppVxlanTunnel(
113 cls,
114 src=cls.pg0.local_ip4,
115 src_port=port,
116 dst_port=port,
117 dst=dest_ip4,
118 vni=vni,
119 )
Jakub Grajciar7c0eb562020-03-02 13:55:31 +0100120 r.add_vpp_config()
Neale Ranns097fa662018-05-01 05:17:55 -0700121 cls.vapi.sw_interface_set_l2_bridge(r.sw_if_index, bd_id=vni)
Eyal Baric4aaee12016-12-20 18:36:46 +0200122
123 @classmethod
Artem Glazychev839dcc02020-12-01 02:39:21 +0700124 def add_del_shared_mcast_dst_load(cls, port, is_add):
Eyal Bari4bce2902017-01-16 12:02:46 +0200125 """
126 add or del tunnels sharing the same mcast dst
127 to test vxlan ref_count mechanism
128 """
Gabriel Ganne7e665d62017-11-17 09:18:53 +0100129 n_shared_dst_tunnels = 20
Eyal Bari4bce2902017-01-16 12:02:46 +0200130 vni_start = 10000
131 vni_end = vni_start + n_shared_dst_tunnels
132 for vni in range(vni_start, vni_end):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200133 r = VppVxlanTunnel(
134 cls,
135 src=cls.pg0.local_ip4,
136 src_port=port,
137 dst_port=port,
138 dst=cls.mcast_ip4,
139 mcast_sw_if_index=1,
140 vni=vni,
141 )
Jakub Grajciar7c0eb562020-03-02 13:55:31 +0100142 if is_add:
143 r.add_vpp_config()
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200144 if r.sw_if_index == 0xFFFFFFFF:
Jakub Grajciar7c0eb562020-03-02 13:55:31 +0100145 raise ValueError("bad sw_if_index: ~0")
146 else:
147 r.remove_vpp_config()
Eyal Bari4bce2902017-01-16 12:02:46 +0200148
149 @classmethod
Artem Glazychev839dcc02020-12-01 02:39:21 +0700150 def add_shared_mcast_dst_load(cls, port):
151 cls.add_del_shared_mcast_dst_load(port=port, is_add=1)
Eyal Bari4bce2902017-01-16 12:02:46 +0200152
153 @classmethod
Artem Glazychev839dcc02020-12-01 02:39:21 +0700154 def del_shared_mcast_dst_load(cls, port):
155 cls.add_del_shared_mcast_dst_load(port=port, is_add=0)
Eyal Bari4bce2902017-01-16 12:02:46 +0200156
157 @classmethod
Artem Glazychev839dcc02020-12-01 02:39:21 +0700158 def add_del_mcast_tunnels_load(cls, port, is_add):
Eyal Bari4bce2902017-01-16 12:02:46 +0200159 """
160 add or del tunnels to test vxlan stability
161 """
162 n_distinct_dst_tunnels = 200
Eyal Baric4aaee12016-12-20 18:36:46 +0200163 ip_range_start = 10
Eyal Bari4bce2902017-01-16 12:02:46 +0200164 ip_range_end = ip_range_start + n_distinct_dst_tunnels
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200165 for dest_ip4 in ip4_range(cls.mcast_ip4, ip_range_start, ip_range_end):
Jakub Grajciar7c0eb562020-03-02 13:55:31 +0100166 vni = bytearray(socket.inet_pton(socket.AF_INET, dest_ip4))[3]
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200167 r = VppVxlanTunnel(
168 cls,
169 src=cls.pg0.local_ip4,
170 src_port=port,
171 dst_port=port,
172 dst=dest_ip4,
173 mcast_sw_if_index=1,
174 vni=vni,
175 )
Jakub Grajciar7c0eb562020-03-02 13:55:31 +0100176 if is_add:
177 r.add_vpp_config()
178 else:
179 r.remove_vpp_config()
Eyal Baric4aaee12016-12-20 18:36:46 +0200180
181 @classmethod
Artem Glazychev839dcc02020-12-01 02:39:21 +0700182 def add_mcast_tunnels_load(cls, port):
183 cls.add_del_mcast_tunnels_load(port=port, is_add=1)
Eyal Baric4aaee12016-12-20 18:36:46 +0200184
185 @classmethod
Artem Glazychev839dcc02020-12-01 02:39:21 +0700186 def del_mcast_tunnels_load(cls, port):
187 cls.add_del_mcast_tunnels_load(port=port, is_add=0)
Damjan Marionf56b77a2016-10-03 19:44:57 +0200188
Klement Sekeraf62ae122016-10-11 11:47:09 +0200189 # Class method to start the VXLAN test case.
Damjan Marionf56b77a2016-10-03 19:44:57 +0200190 # Overrides setUpClass method in VppTestCase class.
191 # Python try..except statement is used to ensure that the tear down of
192 # the class will be executed even if exception is raised.
193 # @param cls The class pointer.
194 @classmethod
195 def setUpClass(cls):
196 super(TestVxlan, cls).setUpClass()
Damjan Marionf56b77a2016-10-03 19:44:57 +0200197
Klement Sekeraf62ae122016-10-11 11:47:09 +0200198 try:
Matej Klottondeb69842016-12-09 15:05:46 +0100199 cls.flags = 0x8
Klement Sekeraf62ae122016-10-11 11:47:09 +0200200
201 # Create 2 pg interfaces.
Eyal Baric4aaee12016-12-20 18:36:46 +0200202 cls.create_pg_interfaces(range(4))
203 for pg in cls.pg_interfaces:
204 pg.admin_up()
Klement Sekeraf62ae122016-10-11 11:47:09 +0200205
206 # Configure IPv4 addresses on VPP pg0.
207 cls.pg0.config_ip4()
208
209 # Resolve MAC address for VPP's IP address on pg0.
210 cls.pg0.resolve_arp()
211
Eyal Baric4aaee12016-12-20 18:36:46 +0200212 # Our Multicast address
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200213 cls.mcast_ip4 = "239.1.1.1"
Paul Vinciguerra2f156312020-05-02 22:34:40 -0400214 cls.mcast_mac = util.mcast_ip_to_mac(cls.mcast_ip4)
Klement Sekeraf62ae122016-10-11 11:47:09 +0200215 except Exception:
Paul Vinciguerra2f156312020-05-02 22:34:40 -0400216 cls.tearDownClass()
Damjan Marionf56b77a2016-10-03 19:44:57 +0200217 raise
218
Paul Vinciguerra7f9b7f92019-03-12 19:23:27 -0700219 @classmethod
220 def tearDownClass(cls):
221 super(TestVxlan, cls).tearDownClass()
222
Jakub Grajciar7c0eb562020-03-02 13:55:31 +0100223 def setUp(self):
224 super(TestVxlan, self).setUp()
Artem Glazychev839dcc02020-12-01 02:39:21 +0700225
226 def createVxLANInterfaces(self, port=4789):
Jakub Grajciar7c0eb562020-03-02 13:55:31 +0100227 # Create VXLAN VTEP on VPP pg0, and put vxlan_tunnel0 and pg1
228 # into BD.
Artem Glazychev839dcc02020-12-01 02:39:21 +0700229 self.dport = port
230
Neale Ranns91fd9102020-04-03 07:46:28 +0000231 self.single_tunnel_vni = 0x12345
Jakub Grajciar7c0eb562020-03-02 13:55:31 +0100232 self.single_tunnel_bd = 1
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200233 r = VppVxlanTunnel(
234 self,
235 src=self.pg0.local_ip4,
236 dst=self.pg0.remote_ip4,
237 src_port=self.dport,
238 dst_port=self.dport,
239 vni=self.single_tunnel_vni,
240 )
Jakub Grajciar7c0eb562020-03-02 13:55:31 +0100241 r.add_vpp_config()
Jakub Grajciar7c0eb562020-03-02 13:55:31 +0100242 self.vapi.sw_interface_set_l2_bridge(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200243 rx_sw_if_index=r.sw_if_index, bd_id=self.single_tunnel_bd
244 )
245 self.vapi.sw_interface_set_l2_bridge(
246 rx_sw_if_index=self.pg1.sw_if_index, bd_id=self.single_tunnel_bd
247 )
Jakub Grajciar7c0eb562020-03-02 13:55:31 +0100248
249 # Setup vni 2 to test multicast flooding
250 self.n_ucast_tunnels = 10
251 self.mcast_flood_bd = 2
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200252 self.create_vxlan_flood_test_bd(
253 self.mcast_flood_bd, self.n_ucast_tunnels, self.dport
254 )
255 r = VppVxlanTunnel(
256 self,
257 src=self.pg0.local_ip4,
258 dst=self.mcast_ip4,
259 src_port=self.dport,
260 dst_port=self.dport,
261 mcast_sw_if_index=1,
262 vni=self.mcast_flood_bd,
263 )
Jakub Grajciar7c0eb562020-03-02 13:55:31 +0100264 r.add_vpp_config()
Jakub Grajciar7c0eb562020-03-02 13:55:31 +0100265 self.vapi.sw_interface_set_l2_bridge(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200266 rx_sw_if_index=r.sw_if_index, bd_id=self.mcast_flood_bd
267 )
268 self.vapi.sw_interface_set_l2_bridge(
269 rx_sw_if_index=self.pg2.sw_if_index, bd_id=self.mcast_flood_bd
270 )
Jakub Grajciar7c0eb562020-03-02 13:55:31 +0100271
272 # Add and delete mcast tunnels to check stability
Artem Glazychev839dcc02020-12-01 02:39:21 +0700273 self.add_shared_mcast_dst_load(self.dport)
274 self.add_mcast_tunnels_load(self.dport)
275 self.del_shared_mcast_dst_load(self.dport)
276 self.del_mcast_tunnels_load(self.dport)
Jakub Grajciar7c0eb562020-03-02 13:55:31 +0100277
278 # Setup vni 3 to test unicast flooding
279 self.ucast_flood_bd = 3
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200280 self.create_vxlan_flood_test_bd(
281 self.ucast_flood_bd, self.n_ucast_tunnels, self.dport
282 )
Jakub Grajciar7c0eb562020-03-02 13:55:31 +0100283 self.vapi.sw_interface_set_l2_bridge(
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200284 rx_sw_if_index=self.pg3.sw_if_index, bd_id=self.ucast_flood_bd
285 )
Jakub Grajciar7c0eb562020-03-02 13:55:31 +0100286
Artem Glazychev839dcc02020-12-01 02:39:21 +0700287 # Set scapy listen custom port for VxLAN
288 bind_layers(UDP, VXLAN, dport=self.dport)
Jakub Grajciar7c0eb562020-03-02 13:55:31 +0100289
Artem Glazychev839dcc02020-12-01 02:39:21 +0700290 def encap_big_packet(self):
Ole Troanb3655e52018-08-16 22:08:49 +0200291 self.vapi.sw_interface_set_mtu(self.pg0.sw_if_index, [1500, 0, 0, 0])
292
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200293 frame = (
294 Ether(src="00:00:00:00:00:02", dst="00:00:00:00:00:01")
295 / IP(src="4.3.2.1", dst="1.2.3.4")
296 / UDP(sport=20000, dport=10000)
297 / Raw(b"\xa5" * 1450)
298 )
Ole Troanb3655e52018-08-16 22:08:49 +0200299
300 self.pg1.add_stream([frame])
301
302 self.pg0.enable_capture()
303
304 self.pg_start()
305
306 # Pick first received frame and check if it's correctly encapsulated.
307 out = self.pg0.get_capture(2)
308 ether = out[0]
Ole Troan7f991832018-12-06 17:35:12 +0100309 pkt = reassemble4(out)
Ole Troanb3655e52018-08-16 22:08:49 +0200310 pkt = ether / pkt
Neale Ranns91fd9102020-04-03 07:46:28 +0000311 self.check_encapsulation(pkt, self.single_tunnel_vni)
Ole Troanb3655e52018-08-16 22:08:49 +0200312
313 payload = self.decapsulate(pkt)
314 # TODO: Scapy bug?
315 # self.assert_eq_pkts(payload, frame)
316
Artem Glazychev839dcc02020-12-01 02:39:21 +0700317 """
318 Tests with default port (4789)
319 """
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200320
Artem Glazychev839dcc02020-12-01 02:39:21 +0700321 def test_decap(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200322 """Decapsulation test
Artem Glazychev839dcc02020-12-01 02:39:21 +0700323 from BridgeDoman
324 """
325 self.createVxLANInterfaces()
326 super(TestVxlan, self).test_decap()
327
328 def test_encap(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200329 """Encapsulation test
Artem Glazychev839dcc02020-12-01 02:39:21 +0700330 from BridgeDoman
331 """
332 self.createVxLANInterfaces()
333 super(TestVxlan, self).test_encap()
334
335 def test_encap_big_packet(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200336 """Encapsulation test send big frame from pg1
Artem Glazychev839dcc02020-12-01 02:39:21 +0700337 Verify receipt of encapsulated frames on pg0
338 """
339 self.createVxLANInterfaces()
340 self.encap_big_packet()
341
342 def test_ucast_flood(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200343 """Unicast flood test
Artem Glazychev839dcc02020-12-01 02:39:21 +0700344 from BridgeDoman
345 """
346 self.createVxLANInterfaces()
347 super(TestVxlan, self).test_ucast_flood()
348
349 def test_mcast_flood(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200350 """Multicast flood test
Artem Glazychev839dcc02020-12-01 02:39:21 +0700351 from BridgeDoman
352 """
353 self.createVxLANInterfaces()
354 super(TestVxlan, self).test_mcast_flood()
355
356 def test_mcast_rcv(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200357 """Multicast receive test
Artem Glazychev839dcc02020-12-01 02:39:21 +0700358 from BridgeDoman
359 """
360 self.createVxLANInterfaces()
361 super(TestVxlan, self).test_mcast_rcv()
362
363 """
364 Tests with custom port
365 """
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200366
Artem Glazychev839dcc02020-12-01 02:39:21 +0700367 def test_decap_custom_port(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200368 """Decapsulation test custom port
Artem Glazychev839dcc02020-12-01 02:39:21 +0700369 from BridgeDoman
370 """
371 self.createVxLANInterfaces(1111)
372 super(TestVxlan, self).test_decap()
373
374 def test_encap_custom_port(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200375 """Encapsulation test custom port
Artem Glazychev839dcc02020-12-01 02:39:21 +0700376 from BridgeDoman
377 """
378 self.createVxLANInterfaces(1111)
379 super(TestVxlan, self).test_encap()
380
381 def test_ucast_flood_custom_port(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200382 """Unicast flood test custom port
Artem Glazychev839dcc02020-12-01 02:39:21 +0700383 from BridgeDoman
384 """
385 self.createVxLANInterfaces(1111)
386 super(TestVxlan, self).test_ucast_flood()
387
388 def test_mcast_flood_custom_port(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200389 """Multicast flood test custom port
Artem Glazychev839dcc02020-12-01 02:39:21 +0700390 from BridgeDoman
391 """
392 self.createVxLANInterfaces(1111)
393 super(TestVxlan, self).test_mcast_flood()
394
395 def test_mcast_rcv_custom_port(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200396 """Multicast receive test custom port
Artem Glazychev839dcc02020-12-01 02:39:21 +0700397 from BridgeDoman
398 """
399 self.createVxLANInterfaces(1111)
400 super(TestVxlan, self).test_mcast_rcv()
401
Klement Sekeraf62ae122016-10-11 11:47:09 +0200402 # Method to define VPP actions before tear down of the test case.
Damjan Marionf56b77a2016-10-03 19:44:57 +0200403 # Overrides tearDown method in VppTestCase class.
404 # @param self The object pointer.
Artem Glazychev839dcc02020-12-01 02:39:21 +0700405
Damjan Marionf56b77a2016-10-03 19:44:57 +0200406 def tearDown(self):
407 super(TestVxlan, self).tearDown()
Paul Vinciguerra90cf21b2019-03-13 09:23:05 -0700408
409 def show_commands_at_teardown(self):
410 self.logger.info(self.vapi.cli("show bridge-domain 1 detail"))
411 self.logger.info(self.vapi.cli("show bridge-domain 2 detail"))
412 self.logger.info(self.vapi.cli("show bridge-domain 3 detail"))
413 self.logger.info(self.vapi.cli("show vxlan tunnel"))
Damjan Marionf56b77a2016-10-03 19:44:57 +0200414
Matej Klottondeb69842016-12-09 15:05:46 +0100415
Neale Ranns1b5ca982020-12-16 13:06:58 +0000416class TestVxlan2(VppTestCase):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200417 """VXLAN Test Case"""
418
Neale Ranns1b5ca982020-12-16 13:06:58 +0000419 def setUp(self):
420 super(TestVxlan2, self).setUp()
421
422 # Create 2 pg interfaces.
423 self.create_pg_interfaces(range(4))
424 for pg in self.pg_interfaces:
425 pg.admin_up()
426
427 # Configure IPv4 addresses on VPP pg0.
428 self.pg0.config_ip4()
429 self.pg0.resolve_arp()
430
431 def tearDown(self):
432 super(TestVxlan2, self).tearDown()
433
434 def test_xconnect(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200435 """VXLAN source address not local"""
Neale Ranns1b5ca982020-12-16 13:06:58 +0000436
437 #
438 # test the broken configuration of a VXLAN tunnel whose
439 # source address is not local ot the box. packets sent
440 # through the tunnel should be dropped
441 #
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200442 t = VppVxlanTunnel(self, src="10.0.0.5", dst=self.pg0.local_ip4, vni=1000)
Neale Ranns1b5ca982020-12-16 13:06:58 +0000443 t.add_vpp_config()
444 t.admin_up()
445
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200446 self.vapi.sw_interface_set_l2_xconnect(
447 t.sw_if_index, self.pg1.sw_if_index, enable=1
448 )
449 self.vapi.sw_interface_set_l2_xconnect(
450 self.pg1.sw_if_index, t.sw_if_index, enable=1
451 )
Neale Ranns1b5ca982020-12-16 13:06:58 +0000452
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200453 p = (
454 Ether(src="00:11:22:33:44:55", dst="00:00:00:11:22:33")
455 / IP(src="4.3.2.1", dst="1.2.3.4")
456 / UDP(sport=20000, dport=10000)
457 / Raw(b"\xa5" * 1450)
458 )
Neale Ranns1b5ca982020-12-16 13:06:58 +0000459
460 rx = self.send_and_assert_no_replies(self.pg1, [p])
461
462
Artem Glazychev23e5f092022-02-21 17:51:29 +0700463class TestVxlanL2Mode(VppTestCase):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200464 """VXLAN Test Case"""
465
Artem Glazychev23e5f092022-02-21 17:51:29 +0700466 def setUp(self):
467 super(TestVxlanL2Mode, self).setUp()
468
469 # Create 2 pg interfaces.
470 self.create_pg_interfaces(range(2))
471 for pg in self.pg_interfaces:
472 pg.admin_up()
473
474 # Configure IPv4 addresses on VPP pg0.
475 self.pg0.config_ip4()
476 self.pg0.resolve_arp()
477
478 # Configure IPv4 addresses on VPP pg1.
479 self.pg1.config_ip4()
480
481 def tearDown(self):
482 super(TestVxlanL2Mode, self).tearDown()
483
484 def test_l2_mode(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200485 """VXLAN L2 mode"""
486 t = VppVxlanTunnel(
487 self, src=self.pg0.local_ip4, dst=self.pg0.remote_ip4, vni=1000, is_l3=False
488 )
Artem Glazychev23e5f092022-02-21 17:51:29 +0700489 t.add_vpp_config()
490 t.config_ip4()
491 t.admin_up()
492
493 dstIP = t.local_ip4[:-1] + "2"
494
495 # Create a packet to send
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200496 p = (
497 Ether(dst=self.pg1.local_mac, src=self.pg1.remote_mac)
498 / IP(src=self.pg1.local_ip4, dst=dstIP)
499 / UDP(sport=555, dport=556)
500 / Raw(b"\x00" * 80)
501 )
Artem Glazychev23e5f092022-02-21 17:51:29 +0700502
503 # Expect ARP request
504 rx = self.send_and_expect(self.pg1, [p], self.pg0)
505 for p in rx:
506 self.assertEqual(p[Ether].dst, self.pg0.remote_mac)
507 self.assertEqual(p[Ether].src, self.pg0.local_mac)
508 self.assertEqual(p[ARP].op, 1)
509 self.assertEqual(p[ARP].pdst, dstIP)
510
511 # Resolve ARP
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200512 VppNeighbor(self, t.sw_if_index, self.pg1.remote_mac, dstIP).add_vpp_config()
Artem Glazychev23e5f092022-02-21 17:51:29 +0700513
514 # Send packets
515 NUM_PKTS = 128
516 rx = self.send_and_expect(self.pg1, p * NUM_PKTS, self.pg0)
517 self.assertEqual(NUM_PKTS, len(rx))
518
519
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200520if __name__ == "__main__":
Damjan Marionf56b77a2016-10-03 19:44:57 +0200521 unittest.main(testRunner=VppTestRunner)