+ self.vapi.cli("clear trace")
+ tx = self.create_stream_ip4(self.pg8, "1.1.1.1", "232.1.1.1")
+ self.pg8.add_stream(tx)
+
+ self.pg_enable_capture(self.pg_interfaces)
+ self.pg_start()
+
+ # We expect replications on Pg1 & 2
+ self.verify_capture_ip4(self.pg1, tx)
+ self.verify_capture_ip4(self.pg2, tx)
+
+ #
+ # An (S,G). for for-us
+ #
+ route_0_0_0_0_224_0_0_5 = VppIpMRoute(
+ self,
+ "0.0.0.0",
+ "224.0.0.5",
+ 32,
+ MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE,
+ [
+ VppMRoutePath(
+ self.pg8.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT
+ ),
+ VppMRoutePath(
+ 0xFFFFFFFF,
+ MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD,
+ type=FibPathType.FIB_PATH_TYPE_LOCAL,
+ ),
+ ],
+ table_id=10,
+ )
+ route_0_0_0_0_224_0_0_5.add_vpp_config()
+
+ #
+ # a stream that matches the route for (0.0.0.0, 224.0.0.5)
+ # small packets
+ #
+ self.vapi.cli("clear trace")
+ self.pg8.resolve_arp()
+
+ #
+ # send a ping to mcast address from peer on pg8
+ # expect a response
+ #
+ icmp_id = 0xB
+ icmp_seq = 5
+ icmp_load = b"\x0a" * 18
+ tx = (
+ Ether(dst=getmacbyip("224.0.0.5"), src=self.pg8.remote_mac)
+ / IP(src=self.pg8.remote_ip4, dst="224.0.0.5")
+ / ICMP(id=icmp_id, seq=icmp_seq)
+ / Raw(load=icmp_load)
+ ) * 2
+
+ self.send_and_expect(self.pg8, tx, self.pg8)
+
+ def test_ip_mcast_gre(self):
+ """IP Multicast Replication over GRE"""
+
+ MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t
+ MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t
+
+ gre_if_1 = VppGreInterface(
+ self, self.pg1.local_ip4, self.pg1.remote_ip4
+ ).add_vpp_config()
+ gre_if_2 = VppGreInterface(
+ self, self.pg2.local_ip4, self.pg2.remote_ip4
+ ).add_vpp_config()
+ gre_if_3 = VppGreInterface(
+ self, self.pg3.local_ip4, self.pg3.remote_ip4
+ ).add_vpp_config()
+
+ gre_if_1.admin_up()
+ gre_if_1.config_ip4()
+ gre_if_2.admin_up()
+ gre_if_2.config_ip4()
+ gre_if_3.admin_up()
+ gre_if_3.config_ip4()
+
+ #
+ # An (S,G).
+ # one accepting interface, pg0, 2 forwarding interfaces
+ #
+ route_1_1_1_1_232_1_1_1 = VppIpMRoute(
+ self,
+ "1.1.1.1",
+ "232.2.2.2",
+ 64,
+ MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE,
+ [
+ VppMRoutePath(
+ gre_if_1.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT
+ ),
+ VppMRoutePath(
+ gre_if_2.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD
+ ),
+ VppMRoutePath(
+ gre_if_3.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD
+ ),
+ ],
+ )
+ route_1_1_1_1_232_1_1_1.add_vpp_config()
+
+ #
+ # a stream that matches the route for (1.1.1.1,232.2.2.2)
+ # small packets
+ #
+ tx = (
+ Ether(dst=self.pg1.local_mac, src=self.pg1.remote_mac)
+ / IP(src=self.pg1.remote_ip4, dst=self.pg1.local_ip4)
+ / GRE()
+ / IP(src="1.1.1.1", dst="232.2.2.2")
+ / UDP(sport=1234, dport=1234)
+ / Raw(b"\a5" * 64)
+ ) * 63
+
+ self.vapi.cli("clear trace")
+ self.pg1.add_stream(tx)
+
+ self.pg_enable_capture(self.pg_interfaces)
+ self.pg_start()
+
+ # We expect replications on Pg2 & 3
+ # check the encap headers are as expected based on the egress tunnel
+ rxs = self.pg2.get_capture(len(tx))
+ for rx in rxs:
+ self.assertEqual(rx[IP].src, gre_if_2.t_src)
+ self.assertEqual(rx[IP].dst, gre_if_2.t_dst)
+ self.assert_packet_checksums_valid(rx)
+
+ rxs = self.pg3.get_capture(len(tx))
+ for rx in rxs:
+ self.assertEqual(rx[IP].src, gre_if_3.t_src)
+ self.assertEqual(rx[IP].dst, gre_if_3.t_dst)
+ self.assert_packet_checksums_valid(rx)
+
+ def test_ip6_mcast_gre(self):
+ """IP6 Multicast Replication over GRE"""
+
+ MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t
+ MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t
+
+ gre_if_1 = VppGreInterface(
+ self, self.pg1.local_ip4, self.pg1.remote_ip4
+ ).add_vpp_config()
+ gre_if_2 = VppGreInterface(
+ self, self.pg2.local_ip4, self.pg2.remote_ip4
+ ).add_vpp_config()
+ gre_if_3 = VppGreInterface(
+ self, self.pg3.local_ip4, self.pg3.remote_ip4
+ ).add_vpp_config()
+
+ gre_if_1.admin_up()
+ gre_if_1.config_ip6()
+ gre_if_2.admin_up()
+ gre_if_2.config_ip6()
+ gre_if_3.admin_up()
+ gre_if_3.config_ip6()
+
+ #
+ # An (S,G).
+ # one accepting interface, pg0, 2 forwarding interfaces
+ #
+ route_1_1_FF_1 = VppIpMRoute(
+ self,
+ "1::1",
+ "FF00::1",
+ 256,
+ MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE,
+ [
+ VppMRoutePath(
+ gre_if_1.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT
+ ),
+ VppMRoutePath(
+ gre_if_2.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD
+ ),
+ VppMRoutePath(
+ gre_if_3.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD
+ ),
+ ],
+ )
+ route_1_1_FF_1.add_vpp_config()
+
+ #
+ # a stream that matches the route for (1::1, FF::1)
+ # small packets
+ #
+ tx = (
+ Ether(dst=self.pg1.local_mac, src=self.pg1.remote_mac)
+ / IP(src=self.pg1.remote_ip4, dst=self.pg1.local_ip4)
+ / GRE()
+ / IPv6(src="1::1", dst="FF00::1")
+ / UDP(sport=1234, dport=1234)
+ / Raw(b"\a5" * 64)
+ ) * 63
+
+ self.vapi.cli("clear trace")
+ self.pg1.add_stream(tx)
+
+ self.pg_enable_capture(self.pg_interfaces)
+ self.pg_start()
+
+ # We expect replications on Pg2 & 3
+ # check the encap headers are as expected based on the egress tunnel
+ rxs = self.pg2.get_capture(len(tx))
+ for rx in rxs:
+ self.assertEqual(rx[IP].src, gre_if_2.t_src)
+ self.assertEqual(rx[IP].dst, gre_if_2.t_dst)
+ self.assert_packet_checksums_valid(rx)
+
+ rxs = self.pg3.get_capture(len(tx))
+ for rx in rxs:
+ self.assertEqual(rx[IP].src, gre_if_3.t_src)
+ self.assertEqual(rx[IP].dst, gre_if_3.t_dst)
+ self.assert_packet_checksums_valid(rx)
+
+ def test_ip6_mcast_vrf(self):
+ """IPv6 Multicast Replication in non-default table"""
+
+ MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t
+ MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t
+
+ #
+ # An (S,G).
+ # one accepting interface, pg0, 2 forwarding interfaces
+ #
+ route_2001_ff01_1 = VppIpMRoute(
+ self,
+ "2001::1",
+ "ff01::1",
+ 256,
+ MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE,
+ [
+ VppMRoutePath(
+ self.pg8.sw_if_index,
+ MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT,
+ proto=FibPathProto.FIB_PATH_NH_PROTO_IP6,
+ ),
+ VppMRoutePath(
+ self.pg1.sw_if_index,
+ MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD,
+ proto=FibPathProto.FIB_PATH_NH_PROTO_IP6,
+ ),
+ VppMRoutePath(
+ self.pg2.sw_if_index,
+ MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD,
+ proto=FibPathProto.FIB_PATH_NH_PROTO_IP6,
+ ),
+ ],
+ table_id=10,
+ )
+ route_2001_ff01_1.add_vpp_config()
+
+ #
+ # a stream that matches the route for (2001::1, ff00::1)
+ #
+ self.vapi.cli("clear trace")
+ tx = self.create_stream_ip6(self.pg8, "2001::1", "ff01::1")
+ self.pg8.add_stream(tx)
+
+ self.pg_enable_capture(self.pg_interfaces)
+ self.pg_start()
+
+ # We expect replications on Pg1, 2,
+ self.verify_capture_ip6(self.pg1, tx)
+ self.verify_capture_ip6(self.pg2, tx)
+
+ def test_bidir(self):
+ """IP Multicast Bi-directional"""
+
+ MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t
+ MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t
+
+ #
+ # A (*,G). The set of accepting interfaces matching the forwarding
+ #
+ route_232_1_1_1 = VppIpMRoute(
+ self,
+ "0.0.0.0",
+ "232.1.1.1",
+ 32,
+ MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE,
+ [
+ VppMRoutePath(
+ self.pg0.sw_if_index,
+ MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT
+ | MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD,
+ ),
+ VppMRoutePath(
+ self.pg1.sw_if_index,
+ MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT
+ | MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD,
+ ),
+ VppMRoutePath(
+ self.pg2.sw_if_index,
+ MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT
+ | MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD,
+ ),
+ VppMRoutePath(
+ self.pg3.sw_if_index,
+ MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT
+ | MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD,
+ ),
+ ],
+ )
+ route_232_1_1_1.add_vpp_config()
+
+ tx = self.create_stream_ip4(self.pg0, "1.1.1.1", "232.1.1.1")
+ self.pg0.add_stream(tx)
+
+ self.pg_enable_capture(self.pg_interfaces)
+ self.pg_start()
+
+ # We expect replications on Pg1, 2, 3, but not on pg0
+ self.verify_capture_ip4(self.pg1, tx)
+ self.verify_capture_ip4(self.pg2, tx)
+ self.verify_capture_ip4(self.pg3, tx)
+ self.pg0.assert_nothing_captured(remark="IP multicast packets forwarded on PG0")