X-Git-Url: https://gerrit.fd.io/r/gitweb?a=blobdiff_plain;f=test%2Ftest_ip_mcast.py;h=20079aa27d5011f84aa4ec230340afe4d49b637e;hb=17a67218587d40541ff522c6a86f354720481fbb;hp=276555d6267c82bca464e3939297eb7e4720294e;hpb=c2aad53aa5430137ac5a76a8746f11604277835a;p=vpp.git diff --git a/test/test_ip_mcast.py b/test/test_ip_mcast.py index 276555d6267..20079aa27d5 100644 --- a/test/test_ip_mcast.py +++ b/test/test_ip_mcast.py @@ -1,30 +1,41 @@ -#!/usr/bin/env python +#!/usr/bin/env python3 import unittest +from framework import tag_fixme_vpp_workers from framework import VppTestCase, VppTestRunner -from vpp_sub_interface import VppSubInterface, VppDot1QSubint, VppDot1ADSubint +from vpp_ip import DpoProto from vpp_ip_route import VppIpMRoute, VppMRoutePath, VppMFibSignal, \ - MRouteItfFlags, MRouteEntryFlags + VppIpTable, FibPathProto, FibPathType +from vpp_gre_interface import VppGreInterface +from vpp_papi import VppEnum from scapy.packet import Raw -from scapy.layers.l2 import Ether +from scapy.layers.l2 import Ether, GRE from scapy.layers.inet import IP, UDP, getmacbyip, ICMP from scapy.layers.inet6 import IPv6, getmacbyip6 -from util import ppp # -# The number of packets sent is set to 90 so that when we replicate more than 3 +# The number of packets sent is set to 91 so that when we replicate more than 3 # times, which we do for some entries, we will generate more than 256 packets # to the next node in the VLIB graph. Thus we are testing the code's -# correctness handling this over-flow +# correctness handling this over-flow. +# It's also an odd number so we hit any single loops. # -N_PKTS_IN_STREAM = 90 +N_PKTS_IN_STREAM = 91 class TestMFIB(VppTestCase): """ MFIB Test Case """ + @classmethod + def setUpClass(cls): + super(TestMFIB, cls).setUpClass() + + @classmethod + def tearDownClass(cls): + super(TestMFIB, cls).tearDownClass() + def setUp(self): super(TestMFIB, self).setUp() @@ -34,35 +45,65 @@ class TestMFIB(VppTestCase): if error: self.logger.critical(error) - self.assertEqual(error.find("Failed"), -1) + self.assertNotIn("Failed", error) +@tag_fixme_vpp_workers class TestIPMcast(VppTestCase): """ IP Multicast Test Case """ + @classmethod + def setUpClass(cls): + super(TestIPMcast, cls).setUpClass() + + @classmethod + def tearDownClass(cls): + super(TestIPMcast, cls).tearDownClass() + def setUp(self): super(TestIPMcast, self).setUp() # create 8 pg interfaces - self.create_pg_interfaces(range(8)) + self.create_pg_interfaces(range(9)) # setup interfaces - for i in self.pg_interfaces: + for i in self.pg_interfaces[:8]: i.admin_up() i.config_ip4() i.config_ip6() i.resolve_arp() i.resolve_ndp() + # one more in a vrf + tbl4 = VppIpTable(self, 10) + tbl4.add_vpp_config() + self.pg8.set_table_ip4(10) + self.pg8.config_ip4() + + tbl6 = VppIpTable(self, 10, is_ip6=1) + tbl6.add_vpp_config() + self.pg8.set_table_ip6(10) + self.pg8.config_ip6() + + def tearDown(self): + for i in self.pg_interfaces: + i.unconfig_ip4() + i.unconfig_ip6() + i.admin_down() + + self.pg8.set_table_ip4(0) + self.pg8.set_table_ip6(0) + super(TestIPMcast, self).tearDown() + def create_stream_ip4(self, src_if, src_ip, dst_ip, payload_size=0): pkts = [] # default to small packet sizes - p = (Ether(dst=src_if.local_mac, src=src_if.remote_mac) / + p = (Ether(dst=getmacbyip(dst_ip), src=src_if.remote_mac) / IP(src=src_ip, dst=dst_ip) / UDP(sport=1234, dport=1234)) if not payload_size: payload_size = 64 - len(p) - p = p / Raw('\xa5' * payload_size) + p = p / Raw(b'\xa5' * payload_size) for i in range(0, N_PKTS_IN_STREAM): pkts.append(p) @@ -73,7 +114,7 @@ class TestIPMcast(VppTestCase): for i in range(0, N_PKTS_IN_STREAM): info = self.create_packet_info(src_if, src_if) payload = self.info_to_payload(info) - p = (Ether(dst=src_if.local_mac, src=src_if.remote_mac) / + p = (Ether(dst=getmacbyip6(dst_ip), src=src_if.remote_mac) / IPv6(src=src_ip, dst=dst_ip) / UDP(sport=1234, dport=1234) / Raw(payload)) @@ -83,13 +124,13 @@ class TestIPMcast(VppTestCase): def verify_filter(self, capture, sent): if not len(capture) == len(sent): - # filter out any IPv6 RAs from the captur + # filter out any IPv6 RAs from the capture for p in capture: if (p.haslayer(IPv6)): capture.remove(p) return capture - def verify_capture_ip4(self, rx_if, sent): + def verify_capture_ip4(self, rx_if, sent, dst_mac=None): rxd = rx_if.get_capture(len(sent)) try: @@ -107,8 +148,11 @@ class TestIPMcast(VppTestCase): tx_ip = tx[IP] rx_ip = rx[IP] + if dst_mac is None: + dst_mac = getmacbyip(rx_ip.dst) + # check the MAC address on the RX'd packet is correctly formed - self.assertEqual(eth.dst, getmacbyip(rx_ip.dst)) + self.assertEqual(eth.dst, dst_mac) self.assertEqual(rx_ip.src, tx_ip.src) self.assertEqual(rx_ip.dst, tx_ip.dst) @@ -144,10 +188,21 @@ class TestIPMcast(VppTestCase): def test_ip_mcast(self): """ IP Multicast Replication """ + MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t + MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t + # # a stream that matches the default route. gets dropped. # self.vapi.cli("clear trace") + self.vapi.cli("packet mac-filter pg0 on") + self.vapi.cli("packet mac-filter pg1 on") + self.vapi.cli("packet mac-filter pg2 on") + self.vapi.cli("packet mac-filter pg4 on") + self.vapi.cli("packet mac-filter pg5 on") + self.vapi.cli("packet mac-filter pg6 on") + self.vapi.cli("packet mac-filter pg7 on") + tx = self.create_stream_ip4(self.pg0, "1.1.1.1", "232.1.1.1") self.pg0.add_stream(tx) @@ -160,30 +215,30 @@ class TestIPMcast(VppTestCase): # # A (*,G). # one accepting interface, pg0, 7 forwarding interfaces - # many forwarding interfaces test the case where the replicare DPO + # many forwarding interfaces test the case where the replicate DPO # needs to use extra cache lines for the buckets. # route_232_1_1_1 = VppIpMRoute( self, "0.0.0.0", "232.1.1.1", 32, - MRouteEntryFlags.MFIB_ENTRY_FLAG_NONE, + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, [VppMRoutePath(self.pg0.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_ACCEPT), + MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT), VppMRoutePath(self.pg1.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_FORWARD), + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD), VppMRoutePath(self.pg2.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_FORWARD), + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD), VppMRoutePath(self.pg3.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_FORWARD), + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD), VppMRoutePath(self.pg4.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_FORWARD), + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD), VppMRoutePath(self.pg5.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_FORWARD), + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD), VppMRoutePath(self.pg6.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_FORWARD), + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD), VppMRoutePath(self.pg7.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_FORWARD)]) + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD)]) route_232_1_1_1.add_vpp_config() # @@ -193,16 +248,36 @@ class TestIPMcast(VppTestCase): route_1_1_1_1_232_1_1_1 = VppIpMRoute( self, "1.1.1.1", - "232.1.1.1", 64, - MRouteEntryFlags.MFIB_ENTRY_FLAG_NONE, + "232.1.1.1", 27, # any grp-len is ok when src is set + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, [VppMRoutePath(self.pg0.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_ACCEPT), + MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT), VppMRoutePath(self.pg1.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_FORWARD), + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD), VppMRoutePath(self.pg2.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_FORWARD)]) + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD)]) route_1_1_1_1_232_1_1_1.add_vpp_config() + # + # An (S,G). + # one accepting interface, pg0, 2 forwarding interfaces + # that use unicast next-hops + # + route_1_1_1_1_232_1_1_2 = VppIpMRoute( + self, + "1.1.1.1", + "232.1.1.2", 64, + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, + [VppMRoutePath(self.pg0.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT), + VppMRoutePath(self.pg1.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, + nh=self.pg1.remote_ip4), + VppMRoutePath(self.pg2.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, + nh=self.pg2.remote_ip4)]) + route_1_1_1_1_232_1_1_2.add_vpp_config() + # # An (*,G/m). # one accepting interface, pg0, 1 forwarding interfaces @@ -211,11 +286,11 @@ class TestIPMcast(VppTestCase): self, "0.0.0.0", "232.0.0.0", 8, - MRouteEntryFlags.MFIB_ENTRY_FLAG_NONE, + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, [VppMRoutePath(self.pg0.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_ACCEPT), + MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT), VppMRoutePath(self.pg1.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_FORWARD)]) + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD)]) route_232.add_vpp_config() # @@ -229,6 +304,9 @@ class TestIPMcast(VppTestCase): self.pg_enable_capture(self.pg_interfaces) self.pg_start() + self.assertEqual(route_1_1_1_1_232_1_1_1.get_stats()['packets'], + len(tx)) + # We expect replications on Pg1->7 self.verify_capture_ip4(self.pg1, tx) self.verify_capture_ip4(self.pg2, tx) @@ -255,12 +333,35 @@ class TestIPMcast(VppTestCase): self.verify_capture_ip4(self.pg1, tx) self.verify_capture_ip4(self.pg2, tx) + self.assertEqual(route_1_1_1_1_232_1_1_1.get_stats()['packets'], + 2*len(tx)) + # no replications on Pg0 self.pg0.assert_nothing_captured( remark="IP multicast packets forwarded on PG0") self.pg3.assert_nothing_captured( remark="IP multicast packets forwarded on PG3") + # + # a stream to the unicast next-hops + # + self.vapi.cli("clear trace") + tx = self.create_stream_ip4(self.pg0, "1.1.1.1", "232.1.1.2") + self.pg0.add_stream(tx) + + self.pg_enable_capture(self.pg_interfaces) + self.pg_start() + + # We expect replications on Pg1->7 + self.verify_capture_ip4(self.pg1, tx, dst_mac=self.pg1.remote_mac) + self.verify_capture_ip4(self.pg2, tx, dst_mac=self.pg2.remote_mac) + + # no replications on Pg0 nor pg3 + self.pg0.assert_nothing_captured( + remark="IP multicast packets forwarded on PG0") + self.pg3.assert_nothing_captured( + remark="IP multicast packets forwarded on PG3") + # # a stream that matches the route for (*,232.0.0.0/8) # Send packets with the 9th bit set so we test the correct clearing @@ -275,6 +376,7 @@ class TestIPMcast(VppTestCase): # We expect replications on Pg1 only self.verify_capture_ip4(self.pg1, tx) + self.assertEqual(route_232.get_stats()['packets'], len(tx)) # no replications on Pg0, Pg2 not Pg3 self.pg0.assert_nothing_captured( @@ -294,7 +396,7 @@ class TestIPMcast(VppTestCase): self.pg_enable_capture(self.pg_interfaces) self.pg_start() - # We expect replications on Pg1, 2, 3. + # We expect replications on Pg1->7 self.verify_capture_ip4(self.pg1, tx) self.verify_capture_ip4(self.pg2, tx) self.verify_capture_ip4(self.pg3, tx) @@ -303,13 +405,31 @@ class TestIPMcast(VppTestCase): self.verify_capture_ip4(self.pg6, tx) self.verify_capture_ip4(self.pg7, tx) - route_232_1_1_1.remove_vpp_config() - route_1_1_1_1_232_1_1_1.remove_vpp_config() - route_232.remove_vpp_config() + # no replications on Pg0 + self.pg0.assert_nothing_captured( + remark="IP multicast packets forwarded on PG0") + + self.vapi.cli("packet mac-filter pg0 off") + self.vapi.cli("packet mac-filter pg1 off") + self.vapi.cli("packet mac-filter pg2 off") + self.vapi.cli("packet mac-filter pg4 off") + self.vapi.cli("packet mac-filter pg5 off") + self.vapi.cli("packet mac-filter pg6 off") + self.vapi.cli("packet mac-filter pg7 off") def test_ip6_mcast(self): """ IPv6 Multicast Replication """ + MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t + MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t + + self.vapi.cli("packet mac-filter pg0 on") + self.vapi.cli("packet mac-filter pg1 on") + self.vapi.cli("packet mac-filter pg2 on") + self.vapi.cli("packet mac-filter pg4 on") + self.vapi.cli("packet mac-filter pg5 on") + self.vapi.cli("packet mac-filter pg6 on") + self.vapi.cli("packet mac-filter pg7 on") # # a stream that matches the default route. gets dropped. # @@ -331,16 +451,19 @@ class TestIPMcast(VppTestCase): self, "::", "ff01::1", 128, - MRouteEntryFlags.MFIB_ENTRY_FLAG_NONE, + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, [VppMRoutePath(self.pg0.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_ACCEPT), + MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT, + proto=FibPathProto.FIB_PATH_NH_PROTO_IP6), VppMRoutePath(self.pg1.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_FORWARD), + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, + proto=FibPathProto.FIB_PATH_NH_PROTO_IP6), VppMRoutePath(self.pg2.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_FORWARD), + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, + proto=FibPathProto.FIB_PATH_NH_PROTO_IP6), VppMRoutePath(self.pg3.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_FORWARD)], - is_ip6=1) + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, + proto=FibPathProto.FIB_PATH_NH_PROTO_IP6)]) route_ff01_1.add_vpp_config() # @@ -350,15 +473,17 @@ class TestIPMcast(VppTestCase): route_2001_ff01_1 = VppIpMRoute( self, "2001::1", - "ff01::1", 256, - MRouteEntryFlags.MFIB_ENTRY_FLAG_NONE, + "ff01::1", 0, # any grp-len is ok when src is set + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, [VppMRoutePath(self.pg0.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_ACCEPT), + MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT, + proto=FibPathProto.FIB_PATH_NH_PROTO_IP6), VppMRoutePath(self.pg1.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_FORWARD), + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, + proto=FibPathProto.FIB_PATH_NH_PROTO_IP6), VppMRoutePath(self.pg2.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_FORWARD)], - is_ip6=1) + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, + proto=FibPathProto.FIB_PATH_NH_PROTO_IP6)]) route_2001_ff01_1.add_vpp_config() # @@ -369,16 +494,26 @@ class TestIPMcast(VppTestCase): self, "::", "ff01::", 16, - MRouteEntryFlags.MFIB_ENTRY_FLAG_NONE, + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, [VppMRoutePath(self.pg0.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_ACCEPT), + MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT, + proto=FibPathProto.FIB_PATH_NH_PROTO_IP6), VppMRoutePath(self.pg1.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_FORWARD)], - is_ip6=1) + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, + proto=FibPathProto.FIB_PATH_NH_PROTO_IP6)]) route_ff01.add_vpp_config() # # a stream that matches the route for (*, ff01::/16) + # sent on the non-accepting interface + # + self.vapi.cli("clear trace") + tx = self.create_stream_ip6(self.pg1, "2002::1", "ff01:2::255") + self.send_and_assert_no_replies(self.pg1, tx, "RPF miss") + + # + # a stream that matches the route for (*, ff01::/16) + # sent on the accepting interface # self.vapi.cli("clear trace") tx = self.create_stream_ip6(self.pg0, "2002::1", "ff01:2::255") @@ -453,9 +588,13 @@ class TestIPMcast(VppTestCase): self.pg3.assert_nothing_captured( remark="IP multicast packets forwarded on PG3") - route_ff01.remove_vpp_config() - route_ff01_1.remove_vpp_config() - route_2001_ff01_1.remove_vpp_config() + self.vapi.cli("packet mac-filter pg0 off") + self.vapi.cli("packet mac-filter pg1 off") + self.vapi.cli("packet mac-filter pg2 off") + self.vapi.cli("packet mac-filter pg4 off") + self.vapi.cli("packet mac-filter pg5 off") + self.vapi.cli("packet mac-filter pg6 off") + self.vapi.cli("packet mac-filter pg7 off") def _mcast_connected_send_stream(self, dst_ip): self.vapi.cli("clear trace") @@ -475,6 +614,9 @@ class TestIPMcast(VppTestCase): def test_ip_mcast_connected(self): """ IP Multicast Connected Source check """ + MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t + MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t + # # A (*,G). # one accepting interface, pg0, 1 forwarding interfaces @@ -483,15 +625,15 @@ class TestIPMcast(VppTestCase): self, "0.0.0.0", "232.1.1.1", 32, - MRouteEntryFlags.MFIB_ENTRY_FLAG_NONE, + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, [VppMRoutePath(self.pg0.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_ACCEPT), + MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT), VppMRoutePath(self.pg1.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_FORWARD)]) + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD)]) route_232_1_1_1.add_vpp_config() route_232_1_1_1.update_entry_flags( - MRouteEntryFlags.MFIB_ENTRY_FLAG_CONNECTED) + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_CONNECTED) # # Now the (*,G) is present, send from connected source @@ -533,15 +675,15 @@ class TestIPMcast(VppTestCase): self, "0.0.0.0", "232.1.1.2", 32, - MRouteEntryFlags.MFIB_ENTRY_FLAG_NONE, + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, [VppMRoutePath(self.pg0.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_ACCEPT), + MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT), VppMRoutePath(self.pg1.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_FORWARD)]) + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD)]) route_232_1_1_2.add_vpp_config() route_232_1_1_2.update_entry_flags( - MRouteEntryFlags.MFIB_ENTRY_FLAG_CONNECTED) + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_CONNECTED) # # Send traffic to both entries. One read should net us two signals @@ -563,12 +705,17 @@ class TestIPMcast(VppTestCase): signal_232_1_1_1_itf_0.compare(signals[1]) signal_232_1_1_2_itf_0.compare(signals[0]) - route_232_1_1_1.remove_vpp_config() - route_232_1_1_2.remove_vpp_config() + route_232_1_1_1.update_entry_flags( + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE) + route_232_1_1_2.update_entry_flags( + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE) def test_ip_mcast_signal(self): """ IP Multicast Signal """ + MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t + MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t + # # A (*,G). # one accepting interface, pg0, 1 forwarding interfaces @@ -577,15 +724,16 @@ class TestIPMcast(VppTestCase): self, "0.0.0.0", "232.1.1.1", 32, - MRouteEntryFlags.MFIB_ENTRY_FLAG_NONE, + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, [VppMRoutePath(self.pg0.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_ACCEPT), + MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT), VppMRoutePath(self.pg1.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_FORWARD)]) + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD)]) route_232_1_1_1.add_vpp_config() + route_232_1_1_1.update_entry_flags( - MRouteEntryFlags.MFIB_ENTRY_FLAG_SIGNAL) + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_SIGNAL) # # Now the (*,G) is present, send from connected source @@ -625,8 +773,8 @@ class TestIPMcast(VppTestCase): # route_232_1_1_1.update_path_flags( self.pg0.sw_if_index, - (MRouteItfFlags.MFIB_ITF_FLAG_ACCEPT | - MRouteItfFlags.MFIB_ITF_FLAG_NEGATE_SIGNAL)) + (MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT | + MRouteItfFlags.MFIB_API_ITF_FLAG_NEGATE_SIGNAL)) self.vapi.cli("clear trace") tx = self._mcast_connected_send_stream("232.1.1.1") @@ -639,7 +787,7 @@ class TestIPMcast(VppTestCase): # come back since the interface is still NEGATE-SIGNAL # route_232_1_1_1.update_entry_flags( - MRouteEntryFlags.MFIB_ENTRY_FLAG_NONE) + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE) tx = self._mcast_connected_send_stream("232.1.1.1") @@ -651,17 +799,323 @@ class TestIPMcast(VppTestCase): # Lastly remove the NEGATE-SIGNAL from the interface and the # signals should stop # - route_232_1_1_1.update_path_flags(self.pg0.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_ACCEPT) + route_232_1_1_1.update_path_flags( + self.pg0.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT) tx = self._mcast_connected_send_stream("232.1.1.1") signals = self.vapi.mfib_signal_dump() self.assertEqual(0, len(signals)) + def test_ip_mcast_vrf(self): + """ IP Multicast Replication in non-default table""" + + MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t + MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t + # - # Cleanup + # An (S,G). + # one accepting interface, pg0, 2 forwarding interfaces + # + route_1_1_1_1_232_1_1_1 = VppIpMRoute( + self, + "1.1.1.1", + "232.1.1.1", 64, + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, + [VppMRoutePath(self.pg8.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT), + VppMRoutePath(self.pg1.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD), + VppMRoutePath(self.pg2.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD)], + table_id=10) + route_1_1_1_1_232_1_1_1.add_vpp_config() + # - route_232_1_1_1.remove_vpp_config() + # a stream that matches the route for (1.1.1.1,232.1.1.1) + # small packets + # + self.vapi.cli("clear trace") + tx = self.create_stream_ip4(self.pg8, "1.1.1.1", "232.1.1.1") + self.pg8.add_stream(tx) + + self.pg_enable_capture(self.pg_interfaces) + self.pg_start() + + # We expect replications on Pg1 & 2 + self.verify_capture_ip4(self.pg1, tx) + self.verify_capture_ip4(self.pg2, tx) + + # + # An (S,G). for for-us + # + route_0_0_0_0_224_0_0_5 = VppIpMRoute( + self, + "0.0.0.0", + "224.0.0.5", 32, + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, + [VppMRoutePath(self.pg8.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT), + VppMRoutePath(0xffffffff, + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, + type=FibPathType.FIB_PATH_TYPE_LOCAL)], + table_id=10) + route_0_0_0_0_224_0_0_5.add_vpp_config() + + # + # a stream that matches the route for (0.0.0.0, 224.0.0.5) + # small packets + # + self.vapi.cli("clear trace") + self.pg8.resolve_arp() + + # + # send a ping to mcast address from peer on pg8 + # expect a response + # + icmp_id = 0xb + icmp_seq = 5 + icmp_load = b'\x0a' * 18 + tx = (Ether(dst=getmacbyip("224.0.0.5"), src=self.pg8.remote_mac) / + IP(src=self.pg8.remote_ip4, dst="224.0.0.5") / + ICMP(id=icmp_id, seq=icmp_seq) / + Raw(load=icmp_load)) * 2 + + self.send_and_expect(self.pg8, tx, self.pg8) + + def test_ip_mcast_gre(self): + """ IP Multicast Replication over GRE""" + + MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t + MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t + + gre_if_1 = VppGreInterface( + self, + self.pg1.local_ip4, + self.pg1.remote_ip4).add_vpp_config() + gre_if_2 = VppGreInterface( + self, + self.pg2.local_ip4, + self.pg2.remote_ip4).add_vpp_config() + gre_if_3 = VppGreInterface( + self, + self.pg3.local_ip4, + self.pg3.remote_ip4).add_vpp_config() + + gre_if_1.admin_up() + gre_if_1.config_ip4() + gre_if_2.admin_up() + gre_if_2.config_ip4() + gre_if_3.admin_up() + gre_if_3.config_ip4() + + # + # An (S,G). + # one accepting interface, pg0, 2 forwarding interfaces + # + route_1_1_1_1_232_1_1_1 = VppIpMRoute( + self, + "1.1.1.1", + "232.2.2.2", 64, + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, + [VppMRoutePath(gre_if_1.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT), + VppMRoutePath(gre_if_2.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD), + VppMRoutePath(gre_if_3.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD)]) + route_1_1_1_1_232_1_1_1.add_vpp_config() + + # + # a stream that matches the route for (1.1.1.1,232.2.2.2) + # small packets + # + tx = (Ether(dst=self.pg1.local_mac, + src=self.pg1.remote_mac) / + IP(src=self.pg1.remote_ip4, + dst=self.pg1.local_ip4) / + GRE() / + IP(src="1.1.1.1", dst="232.2.2.2") / + UDP(sport=1234, dport=1234) / + Raw(b'\a5' * 64)) * 63 + + self.vapi.cli("clear trace") + self.pg1.add_stream(tx) + + self.pg_enable_capture(self.pg_interfaces) + self.pg_start() + + # We expect replications on Pg2 & 3 + # check the encap headers are as expected based on the egress tunnel + rxs = self.pg2.get_capture(len(tx)) + for rx in rxs: + self.assertEqual(rx[IP].src, gre_if_2.t_src) + self.assertEqual(rx[IP].dst, gre_if_2.t_dst) + self.assert_packet_checksums_valid(rx) + + rxs = self.pg3.get_capture(len(tx)) + for rx in rxs: + self.assertEqual(rx[IP].src, gre_if_3.t_src) + self.assertEqual(rx[IP].dst, gre_if_3.t_dst) + self.assert_packet_checksums_valid(rx) + + def test_ip6_mcast_gre(self): + """ IP6 Multicast Replication over GRE""" + + MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t + MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t + + gre_if_1 = VppGreInterface( + self, + self.pg1.local_ip4, + self.pg1.remote_ip4).add_vpp_config() + gre_if_2 = VppGreInterface( + self, + self.pg2.local_ip4, + self.pg2.remote_ip4).add_vpp_config() + gre_if_3 = VppGreInterface( + self, + self.pg3.local_ip4, + self.pg3.remote_ip4).add_vpp_config() + + gre_if_1.admin_up() + gre_if_1.config_ip6() + gre_if_2.admin_up() + gre_if_2.config_ip6() + gre_if_3.admin_up() + gre_if_3.config_ip6() + + # + # An (S,G). + # one accepting interface, pg0, 2 forwarding interfaces + # + route_1_1_FF_1 = VppIpMRoute( + self, + "1::1", + "FF00::1", 256, + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, + [VppMRoutePath(gre_if_1.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT), + VppMRoutePath(gre_if_2.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD), + VppMRoutePath(gre_if_3.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD)]) + route_1_1_FF_1.add_vpp_config() + + # + # a stream that matches the route for (1::1, FF::1) + # small packets + # + tx = (Ether(dst=self.pg1.local_mac, + src=self.pg1.remote_mac) / + IP(src=self.pg1.remote_ip4, + dst=self.pg1.local_ip4) / + GRE() / + IPv6(src="1::1", dst="FF00::1") / + UDP(sport=1234, dport=1234) / + Raw(b'\a5' * 64)) * 63 + + self.vapi.cli("clear trace") + self.pg1.add_stream(tx) + + self.pg_enable_capture(self.pg_interfaces) + self.pg_start() + + # We expect replications on Pg2 & 3 + # check the encap headers are as expected based on the egress tunnel + rxs = self.pg2.get_capture(len(tx)) + for rx in rxs: + self.assertEqual(rx[IP].src, gre_if_2.t_src) + self.assertEqual(rx[IP].dst, gre_if_2.t_dst) + self.assert_packet_checksums_valid(rx) + + rxs = self.pg3.get_capture(len(tx)) + for rx in rxs: + self.assertEqual(rx[IP].src, gre_if_3.t_src) + self.assertEqual(rx[IP].dst, gre_if_3.t_dst) + self.assert_packet_checksums_valid(rx) + + def test_ip6_mcast_vrf(self): + """ IPv6 Multicast Replication in non-default table""" + + MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t + MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t + + # + # An (S,G). + # one accepting interface, pg0, 2 forwarding interfaces + # + route_2001_ff01_1 = VppIpMRoute( + self, + "2001::1", + "ff01::1", 256, + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, + [VppMRoutePath(self.pg8.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT, + proto=FibPathProto.FIB_PATH_NH_PROTO_IP6), + VppMRoutePath(self.pg1.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, + proto=FibPathProto.FIB_PATH_NH_PROTO_IP6), + VppMRoutePath(self.pg2.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, + proto=FibPathProto.FIB_PATH_NH_PROTO_IP6)], + table_id=10) + route_2001_ff01_1.add_vpp_config() + + # + # a stream that matches the route for (2001::1, ff00::1) + # + self.vapi.cli("clear trace") + tx = self.create_stream_ip6(self.pg8, "2001::1", "ff01::1") + self.pg8.add_stream(tx) + + self.pg_enable_capture(self.pg_interfaces) + self.pg_start() + + # We expect replications on Pg1, 2, + self.verify_capture_ip6(self.pg1, tx) + self.verify_capture_ip6(self.pg2, tx) + + def test_bidir(self): + """ IP Multicast Bi-directional """ + + MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t + MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t + + # + # A (*,G). The set of accepting interfaces matching the forwarding + # + route_232_1_1_1 = VppIpMRoute( + self, + "0.0.0.0", + "232.1.1.1", 32, + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, + [VppMRoutePath(self.pg0.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT | + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD), + VppMRoutePath(self.pg1.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT | + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD), + VppMRoutePath(self.pg2.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT | + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD), + VppMRoutePath(self.pg3.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT | + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD)]) + route_232_1_1_1.add_vpp_config() + + tx = self.create_stream_ip4(self.pg0, "1.1.1.1", "232.1.1.1") + self.pg0.add_stream(tx) + + self.pg_enable_capture(self.pg_interfaces) + self.pg_start() + + # We expect replications on Pg1, 2, 3, but not on pg0 + self.verify_capture_ip4(self.pg1, tx) + self.verify_capture_ip4(self.pg2, tx) + self.verify_capture_ip4(self.pg3, tx) + self.pg0.assert_nothing_captured( + remark="IP multicast packets forwarded on PG0") if __name__ == '__main__':