X-Git-Url: https://gerrit.fd.io/r/gitweb?a=blobdiff_plain;f=test%2Ftest_ip_mcast.py;h=b060e97ff9d14893b4949378e4c13bfdcc62e550;hb=543cd57ea2fa2191804e0e1893fa2c34a37f0088;hp=9b668e42fcac5a7755be9d8d7934ea2a7a041300;hpb=9bea8fb0b0b6377fbead21f4ff6bceb50080329e;p=vpp.git diff --git a/test/test_ip_mcast.py b/test/test_ip_mcast.py index 9b668e42fca..b060e97ff9d 100644 --- a/test/test_ip_mcast.py +++ b/test/test_ip_mcast.py @@ -1,70 +1,119 @@ -#!/usr/bin/env python +#!/usr/bin/env python3 import unittest +from framework import tag_fixme_vpp_workers from framework import VppTestCase, VppTestRunner -from vpp_sub_interface import VppSubInterface, VppDot1QSubint, VppDot1ADSubint -from vpp_ip_route import IpMRoute, MRoutePath, MFibSignal +from vpp_ip import DpoProto +from vpp_ip_route import ( + VppIpMRoute, + VppMRoutePath, + VppMFibSignal, + VppIpTable, + FibPathProto, + FibPathType, +) +from vpp_gre_interface import VppGreInterface +from vpp_papi import VppEnum from scapy.packet import Raw -from scapy.layers.l2 import Ether -from scapy.layers.inet import IP, UDP, getmacbyip +from scapy.layers.l2 import Ether, GRE +from scapy.layers.inet import IP, UDP, getmacbyip, ICMP from scapy.layers.inet6 import IPv6, getmacbyip6 -from util import ppp +# +# The number of packets sent is set to 91 so that when we replicate more than 3 +# times, which we do for some entries, we will generate more than 256 packets +# to the next node in the VLIB graph. Thus we are testing the code's +# correctness handling this over-flow. +# It's also an odd number so we hit any single loops. +# +N_PKTS_IN_STREAM = 91 -class MRouteItfFlags: - MFIB_ITF_FLAG_NONE = 0 - MFIB_ITF_FLAG_NEGATE_SIGNAL = 1 - MFIB_ITF_FLAG_ACCEPT = 2 - MFIB_ITF_FLAG_FORWARD = 4 - MFIB_ITF_FLAG_SIGNAL_PRESENT = 8 - MFIB_ITF_FLAG_INTERNAL_COPY = 16 +class TestMFIB(VppTestCase): + """MFIB Test Case""" -class MRouteEntryFlags: - MFIB_ENTRY_FLAG_NONE = 0 - MFIB_ENTRY_FLAG_SIGNAL = 1 - MFIB_ENTRY_FLAG_DROP = 2 - MFIB_ENTRY_FLAG_CONNECTED = 4 - MFIB_ENTRY_FLAG_INHERIT_ACCEPT = 8 + @classmethod + def setUpClass(cls): + super(TestMFIB, cls).setUpClass() -# -# The number of packets sent is set to 90 so that when we replicate more than 3 -# times, which we do for some entries, we will generate more than 256 packets -# to the next node in the VLIB graph. Thus we are testing the code's correctness -# handling this over-flow -# -N_PKTS_IN_STREAM = 90 + @classmethod + def tearDownClass(cls): + super(TestMFIB, cls).tearDownClass() + def setUp(self): + super(TestMFIB, self).setUp() + def test_mfib(self): + """MFIB Unit Tests""" + error = self.vapi.cli("test mfib") + + if error: + self.logger.critical(error) + self.assertNotIn("Failed", error) + + +@tag_fixme_vpp_workers class TestIPMcast(VppTestCase): - """ IP Multicast Test Case """ + """IP Multicast Test Case""" + + @classmethod + def setUpClass(cls): + super(TestIPMcast, cls).setUpClass() + + @classmethod + def tearDownClass(cls): + super(TestIPMcast, cls).tearDownClass() def setUp(self): super(TestIPMcast, self).setUp() - # create 4 pg interfaces - self.create_pg_interfaces(range(4)) + # create 8 pg interfaces + self.create_pg_interfaces(range(9)) # setup interfaces - for i in self.pg_interfaces: + for i in self.pg_interfaces[:8]: i.admin_up() i.config_ip4() i.config_ip6() i.resolve_arp() i.resolve_ndp() - def create_stream_ip4(self, src_if, src_ip, dst_ip): + # one more in a vrf + tbl4 = VppIpTable(self, 10) + tbl4.add_vpp_config() + self.pg8.set_table_ip4(10) + self.pg8.config_ip4() + + tbl6 = VppIpTable(self, 10, is_ip6=1) + tbl6.add_vpp_config() + self.pg8.set_table_ip6(10) + self.pg8.config_ip6() + + def tearDown(self): + for i in self.pg_interfaces: + i.unconfig_ip4() + i.unconfig_ip6() + i.admin_down() + + self.pg8.set_table_ip4(0) + self.pg8.set_table_ip6(0) + super(TestIPMcast, self).tearDown() + + def create_stream_ip4(self, src_if, src_ip, dst_ip, payload_size=0): pkts = [] + # default to small packet sizes + p = ( + Ether(dst=getmacbyip(dst_ip), src=src_if.remote_mac) + / IP(src=src_ip, dst=dst_ip) + / UDP(sport=1234, dport=1234) + ) + if not payload_size: + payload_size = 64 - len(p) + p = p / Raw(b"\xa5" * payload_size) + for i in range(0, N_PKTS_IN_STREAM): - info = self.create_packet_info(src_if, src_if) - payload = self.info_to_payload(info) - p = (Ether(dst=src_if.local_mac, src=src_if.remote_mac) / - IP(src=src_ip, dst=dst_ip) / - UDP(sport=1234, dport=1234) / - Raw(payload)) - info.data = p.copy() pkts.append(p) return pkts @@ -73,24 +122,26 @@ class TestIPMcast(VppTestCase): for i in range(0, N_PKTS_IN_STREAM): info = self.create_packet_info(src_if, src_if) payload = self.info_to_payload(info) - p = (Ether(dst=src_if.local_mac, src=src_if.remote_mac) / - IPv6(src=src_ip, dst=dst_ip) / - UDP(sport=1234, dport=1234) / - Raw(payload)) + p = ( + Ether(dst=getmacbyip6(dst_ip), src=src_if.remote_mac) + / IPv6(src=src_ip, dst=dst_ip) + / UDP(sport=1234, dport=1234) + / Raw(payload) + ) info.data = p.copy() pkts.append(p) return pkts def verify_filter(self, capture, sent): if not len(capture) == len(sent): - # filter out any IPv6 RAs from the captur + # filter out any IPv6 RAs from the capture for p in capture: - if (p.haslayer(IPv6)): + if p.haslayer(IPv6): capture.remove(p) return capture - def verify_capture_ip4(self, src_if, sent): - rxd = self.pg1.get_capture(N_PKTS_IN_STREAM) + def verify_capture_ip4(self, rx_if, sent, dst_mac=None): + rxd = rx_if.get_capture(len(sent)) try: capture = self.verify_filter(rxd, sent) @@ -101,15 +152,17 @@ class TestIPMcast(VppTestCase): tx = sent[i] rx = capture[i] - # the rx'd packet has the MPLS label popped eth = rx[Ether] self.assertEqual(eth.type, 0x800) tx_ip = tx[IP] rx_ip = rx[IP] + if dst_mac is None: + dst_mac = getmacbyip(rx_ip.dst) + # check the MAC address on the RX'd packet is correctly formed - self.assertEqual(eth.dst, getmacbyip(rx_ip.dst)) + self.assertEqual(eth.dst, dst_mac) self.assertEqual(rx_ip.src, tx_ip.src) self.assertEqual(rx_ip.dst, tx_ip.dst) @@ -119,8 +172,8 @@ class TestIPMcast(VppTestCase): except: raise - def verify_capture_ip6(self, src_if, sent): - capture = self.pg1.get_capture(N_PKTS_IN_STREAM) + def verify_capture_ip6(self, rx_if, sent): + capture = rx_if.get_capture(len(sent)) self.assertEqual(len(capture), len(sent)) @@ -128,7 +181,6 @@ class TestIPMcast(VppTestCase): tx = sent[i] rx = capture[i] - # the rx'd packet has the MPLS label popped eth = rx[Ether] self.assertEqual(eth.type, 0x86DD) @@ -144,12 +196,23 @@ class TestIPMcast(VppTestCase): self.assertEqual(rx_ip.hlim + 1, tx_ip.hlim) def test_ip_mcast(self): - """ IP Multicast Replication """ + """IP Multicast Replication""" + + MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t + MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t # # a stream that matches the default route. gets dropped. # self.vapi.cli("clear trace") + self.vapi.cli("packet mac-filter pg0 on") + self.vapi.cli("packet mac-filter pg1 on") + self.vapi.cli("packet mac-filter pg2 on") + self.vapi.cli("packet mac-filter pg4 on") + self.vapi.cli("packet mac-filter pg5 on") + self.vapi.cli("packet mac-filter pg6 on") + self.vapi.cli("packet mac-filter pg7 on") + tx = self.create_stream_ip4(self.pg0, "1.1.1.1", "232.1.1.1") self.pg0.add_stream(tx) @@ -157,61 +220,129 @@ class TestIPMcast(VppTestCase): self.pg_start() self.pg0.assert_nothing_captured( - remark="IP multicast packets forwarded on default route") + remark="IP multicast packets forwarded on default route" + ) + count = self.statistics.get_err_counter("/err/ip4-input/rpf_failure") + self.assertEqual(count, len(tx)) # # A (*,G). - # one accepting interface, pg0, 3 forwarding interfaces + # one accepting interface, pg0, 7 forwarding interfaces + # many forwarding interfaces test the case where the replicate DPO + # needs to use extra cache lines for the buckets. # - route_232_1_1_1 = IpMRoute( + route_232_1_1_1 = VppIpMRoute( self, "0.0.0.0", - "232.1.1.1", 32, - MRouteEntryFlags.MFIB_ENTRY_FLAG_NONE, - [MRoutePath(self.pg0.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_ACCEPT), - MRoutePath(self.pg1.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_FORWARD), - MRoutePath(self.pg2.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_FORWARD), - MRoutePath(self.pg3.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_FORWARD)]) + "232.1.1.1", + 32, + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, + [ + VppMRoutePath( + self.pg0.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT + ), + VppMRoutePath( + self.pg1.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD + ), + VppMRoutePath( + self.pg2.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD + ), + VppMRoutePath( + self.pg3.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD + ), + VppMRoutePath( + self.pg4.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD + ), + VppMRoutePath( + self.pg5.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD + ), + VppMRoutePath( + self.pg6.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD + ), + VppMRoutePath( + self.pg7.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD + ), + ], + ) route_232_1_1_1.add_vpp_config() # # An (S,G). # one accepting interface, pg0, 2 forwarding interfaces # - route_1_1_1_1_232_1_1_1 = IpMRoute( + route_1_1_1_1_232_1_1_1 = VppIpMRoute( self, "1.1.1.1", - "232.1.1.1", 64, - MRouteEntryFlags.MFIB_ENTRY_FLAG_NONE, - [MRoutePath(self.pg0.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_ACCEPT), - MRoutePath(self.pg1.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_FORWARD), - MRoutePath(self.pg2.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_FORWARD)]) + "232.1.1.1", + 27, # any grp-len is ok when src is set + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, + [ + VppMRoutePath( + self.pg0.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT + ), + VppMRoutePath( + self.pg1.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD + ), + VppMRoutePath( + self.pg2.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD + ), + ], + ) route_1_1_1_1_232_1_1_1.add_vpp_config() + # + # An (S,G). + # one accepting interface, pg0, 2 forwarding interfaces + # that use unicast next-hops + # + route_1_1_1_1_232_1_1_2 = VppIpMRoute( + self, + "1.1.1.1", + "232.1.1.2", + 64, + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, + [ + VppMRoutePath( + self.pg0.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT + ), + VppMRoutePath( + self.pg1.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, + nh=self.pg1.remote_ip4, + ), + VppMRoutePath( + self.pg2.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, + nh=self.pg2.remote_ip4, + ), + ], + ) + route_1_1_1_1_232_1_1_2.add_vpp_config() + # # An (*,G/m). # one accepting interface, pg0, 1 forwarding interfaces # - route_232 = IpMRoute( + route_232 = VppIpMRoute( self, "0.0.0.0", - "232.0.0.0", 8, - MRouteEntryFlags.MFIB_ENTRY_FLAG_NONE, - [MRoutePath(self.pg0.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_ACCEPT), - MRoutePath(self.pg1.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_FORWARD)]) + "232.0.0.0", + 8, + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, + [ + VppMRoutePath( + self.pg0.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT + ), + VppMRoutePath( + self.pg1.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD + ), + ], + ) route_232.add_vpp_config() # # a stream that matches the route for (1.1.1.1,232.1.1.1) + # small packets # self.vapi.cli("clear trace") tx = self.create_stream_ip4(self.pg0, "1.1.1.1", "232.1.1.1") @@ -220,15 +351,54 @@ class TestIPMcast(VppTestCase): self.pg_enable_capture(self.pg_interfaces) self.pg_start() - # We expect replications on Pg1, 2, + self.assertEqual(route_1_1_1_1_232_1_1_1.get_stats()["packets"], len(tx)) + + # We expect replications on Pg1->7 self.verify_capture_ip4(self.pg1, tx) self.verify_capture_ip4(self.pg2, tx) # no replications on Pg0 - self.pg0.assert_nothing_captured( - remark="IP multicast packets forwarded on PG0") - self.pg3.assert_nothing_captured( - remark="IP multicast packets forwarded on PG3") + self.pg0.assert_nothing_captured(remark="IP multicast packets forwarded on PG0") + self.pg3.assert_nothing_captured(remark="IP multicast packets forwarded on PG3") + + # + # a stream that matches the route for (1.1.1.1,232.1.1.1) + # large packets + # + self.vapi.cli("clear trace") + tx = self.create_stream_ip4(self.pg0, "1.1.1.1", "232.1.1.1", payload_size=1024) + self.pg0.add_stream(tx) + + self.pg_enable_capture(self.pg_interfaces) + self.pg_start() + + # We expect replications on Pg1->7 + self.verify_capture_ip4(self.pg1, tx) + self.verify_capture_ip4(self.pg2, tx) + + self.assertEqual(route_1_1_1_1_232_1_1_1.get_stats()["packets"], 2 * len(tx)) + + # no replications on Pg0 + self.pg0.assert_nothing_captured(remark="IP multicast packets forwarded on PG0") + self.pg3.assert_nothing_captured(remark="IP multicast packets forwarded on PG3") + + # + # a stream to the unicast next-hops + # + self.vapi.cli("clear trace") + tx = self.create_stream_ip4(self.pg0, "1.1.1.1", "232.1.1.2") + self.pg0.add_stream(tx) + + self.pg_enable_capture(self.pg_interfaces) + self.pg_start() + + # We expect replications on Pg1->7 + self.verify_capture_ip4(self.pg1, tx, dst_mac=self.pg1.remote_mac) + self.verify_capture_ip4(self.pg2, tx, dst_mac=self.pg2.remote_mac) + + # no replications on Pg0 nor pg3 + self.pg0.assert_nothing_captured(remark="IP multicast packets forwarded on PG0") + self.pg3.assert_nothing_captured(remark="IP multicast packets forwarded on PG3") # # a stream that matches the route for (*,232.0.0.0/8) @@ -244,14 +414,12 @@ class TestIPMcast(VppTestCase): # We expect replications on Pg1 only self.verify_capture_ip4(self.pg1, tx) + self.assertEqual(route_232.get_stats()["packets"], len(tx)) # no replications on Pg0, Pg2 not Pg3 - self.pg0.assert_nothing_captured( - remark="IP multicast packets forwarded on PG0") - self.pg2.assert_nothing_captured( - remark="IP multicast packets forwarded on PG2") - self.pg3.assert_nothing_captured( - remark="IP multicast packets forwarded on PG3") + self.pg0.assert_nothing_captured(remark="IP multicast packets forwarded on PG0") + self.pg2.assert_nothing_captured(remark="IP multicast packets forwarded on PG2") + self.pg3.assert_nothing_captured(remark="IP multicast packets forwarded on PG3") # # a stream that matches the route for (*,232.1.1.1) @@ -263,22 +431,39 @@ class TestIPMcast(VppTestCase): self.pg_enable_capture(self.pg_interfaces) self.pg_start() - # We expect replications on Pg1, 2, 3. + # We expect replications on Pg1->7 self.verify_capture_ip4(self.pg1, tx) self.verify_capture_ip4(self.pg2, tx) self.verify_capture_ip4(self.pg3, tx) + self.verify_capture_ip4(self.pg4, tx) + self.verify_capture_ip4(self.pg5, tx) + self.verify_capture_ip4(self.pg6, tx) + self.verify_capture_ip4(self.pg7, tx) # no replications on Pg0 - self.pg0.assert_nothing_captured( - remark="IP multicast packets forwarded on PG0") + self.pg0.assert_nothing_captured(remark="IP multicast packets forwarded on PG0") - route_232_1_1_1.remove_vpp_config() - route_1_1_1_1_232_1_1_1.remove_vpp_config() - route_232.remove_vpp_config() + self.vapi.cli("packet mac-filter pg0 off") + self.vapi.cli("packet mac-filter pg1 off") + self.vapi.cli("packet mac-filter pg2 off") + self.vapi.cli("packet mac-filter pg4 off") + self.vapi.cli("packet mac-filter pg5 off") + self.vapi.cli("packet mac-filter pg6 off") + self.vapi.cli("packet mac-filter pg7 off") def test_ip6_mcast(self): - """ IPv6 Multicast Replication """ - + """IPv6 Multicast Replication""" + + MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t + MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t + + self.vapi.cli("packet mac-filter pg0 on") + self.vapi.cli("packet mac-filter pg1 on") + self.vapi.cli("packet mac-filter pg2 on") + self.vapi.cli("packet mac-filter pg4 on") + self.vapi.cli("packet mac-filter pg5 on") + self.vapi.cli("packet mac-filter pg6 on") + self.vapi.cli("packet mac-filter pg7 on") # # a stream that matches the default route. gets dropped. # @@ -290,64 +475,112 @@ class TestIPMcast(VppTestCase): self.pg_start() self.pg0.assert_nothing_captured( - remark="IPv6 multicast packets forwarded on default route") + remark="IPv6 multicast packets forwarded on default route" + ) # # A (*,G). # one accepting interface, pg0, 3 forwarding interfaces # - route_ff01_1 = IpMRoute( + route_ff01_1 = VppIpMRoute( self, "::", - "ff01::1", 128, - MRouteEntryFlags.MFIB_ENTRY_FLAG_NONE, - [MRoutePath(self.pg0.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_ACCEPT), - MRoutePath(self.pg1.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_FORWARD), - MRoutePath(self.pg2.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_FORWARD), - MRoutePath(self.pg3.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_FORWARD)], - is_ip6=1) + "ff01::1", + 128, + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, + [ + VppMRoutePath( + self.pg0.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT, + proto=FibPathProto.FIB_PATH_NH_PROTO_IP6, + ), + VppMRoutePath( + self.pg1.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, + proto=FibPathProto.FIB_PATH_NH_PROTO_IP6, + ), + VppMRoutePath( + self.pg2.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, + proto=FibPathProto.FIB_PATH_NH_PROTO_IP6, + ), + VppMRoutePath( + self.pg3.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, + proto=FibPathProto.FIB_PATH_NH_PROTO_IP6, + ), + ], + ) route_ff01_1.add_vpp_config() # # An (S,G). # one accepting interface, pg0, 2 forwarding interfaces # - route_2001_ff01_1 = IpMRoute( + route_2001_ff01_1 = VppIpMRoute( self, "2001::1", - "ff01::1", 256, - MRouteEntryFlags.MFIB_ENTRY_FLAG_NONE, - [MRoutePath(self.pg0.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_ACCEPT), - MRoutePath(self.pg1.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_FORWARD), - MRoutePath(self.pg2.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_FORWARD)], - is_ip6=1) + "ff01::1", + 0, # any grp-len is ok when src is set + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, + [ + VppMRoutePath( + self.pg0.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT, + proto=FibPathProto.FIB_PATH_NH_PROTO_IP6, + ), + VppMRoutePath( + self.pg1.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, + proto=FibPathProto.FIB_PATH_NH_PROTO_IP6, + ), + VppMRoutePath( + self.pg2.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, + proto=FibPathProto.FIB_PATH_NH_PROTO_IP6, + ), + ], + ) route_2001_ff01_1.add_vpp_config() # # An (*,G/m). # one accepting interface, pg0, 1 forwarding interface # - route_ff01 = IpMRoute( + route_ff01 = VppIpMRoute( self, "::", - "ff01::", 16, - MRouteEntryFlags.MFIB_ENTRY_FLAG_NONE, - [MRoutePath(self.pg0.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_ACCEPT), - MRoutePath(self.pg1.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_FORWARD)], - is_ip6=1) + "ff01::", + 16, + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, + [ + VppMRoutePath( + self.pg0.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT, + proto=FibPathProto.FIB_PATH_NH_PROTO_IP6, + ), + VppMRoutePath( + self.pg1.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, + proto=FibPathProto.FIB_PATH_NH_PROTO_IP6, + ), + ], + ) route_ff01.add_vpp_config() # # a stream that matches the route for (*, ff01::/16) + # sent on the non-accepting interface + # + self.vapi.cli("clear trace") + tx = self.create_stream_ip6(self.pg1, "2002::1", "ff01:2::255") + self.send_and_assert_no_replies(self.pg1, tx, "RPF miss") + count = self.statistics.get_err_counter("/err/ip6-input/rpf_failure") + self.assertEqual(count, 2 * len(tx)) + + # + # a stream that matches the route for (*, ff01::/16) + # sent on the accepting interface # self.vapi.cli("clear trace") tx = self.create_stream_ip6(self.pg0, "2002::1", "ff01:2::255") @@ -360,12 +593,26 @@ class TestIPMcast(VppTestCase): self.verify_capture_ip6(self.pg1, tx) # no replications on Pg0, Pg3 - self.pg0.assert_nothing_captured( - remark="IP multicast packets forwarded on PG0") - self.pg2.assert_nothing_captured( - remark="IP multicast packets forwarded on PG2") - self.pg3.assert_nothing_captured( - remark="IP multicast packets forwarded on PG3") + self.pg0.assert_nothing_captured(remark="IP multicast packets forwarded on PG0") + self.pg2.assert_nothing_captured(remark="IP multicast packets forwarded on PG2") + self.pg3.assert_nothing_captured(remark="IP multicast packets forwarded on PG3") + + # + # Bounce the interface and it should still work + # + self.pg1.admin_down() + self.pg0.add_stream(tx) + self.pg_enable_capture(self.pg_interfaces) + self.pg_start() + self.pg1.assert_nothing_captured( + remark="IP multicast packets forwarded on down PG1" + ) + + self.pg1.admin_up() + self.pg0.add_stream(tx) + self.pg_enable_capture(self.pg_interfaces) + self.pg_start() + self.verify_capture_ip6(self.pg1, tx) # # a stream that matches the route for (*,ff01::1) @@ -384,7 +631,8 @@ class TestIPMcast(VppTestCase): # no replications on Pg0 self.pg0.assert_nothing_captured( - remark="IPv6 multicast packets forwarded on PG0") + remark="IPv6 multicast packets forwarded on PG0" + ) # # a stream that matches the route for (2001::1, ff00::1) @@ -401,20 +649,20 @@ class TestIPMcast(VppTestCase): self.verify_capture_ip6(self.pg2, tx) # no replications on Pg0, Pg3 - self.pg0.assert_nothing_captured( - remark="IP multicast packets forwarded on PG0") - self.pg3.assert_nothing_captured( - remark="IP multicast packets forwarded on PG3") + self.pg0.assert_nothing_captured(remark="IP multicast packets forwarded on PG0") + self.pg3.assert_nothing_captured(remark="IP multicast packets forwarded on PG3") - route_ff01.remove_vpp_config() - route_ff01_1.remove_vpp_config() - route_2001_ff01_1.remove_vpp_config() + self.vapi.cli("packet mac-filter pg0 off") + self.vapi.cli("packet mac-filter pg1 off") + self.vapi.cli("packet mac-filter pg2 off") + self.vapi.cli("packet mac-filter pg4 off") + self.vapi.cli("packet mac-filter pg5 off") + self.vapi.cli("packet mac-filter pg6 off") + self.vapi.cli("packet mac-filter pg7 off") def _mcast_connected_send_stream(self, dst_ip): self.vapi.cli("clear trace") - tx = self.create_stream_ip4(self.pg0, - self.pg0.remote_ip4, - dst_ip) + tx = self.create_stream_ip4(self.pg0, self.pg0.remote_ip4, dst_ip) self.pg0.add_stream(tx) self.pg_enable_capture(self.pg_interfaces) @@ -426,25 +674,35 @@ class TestIPMcast(VppTestCase): return tx def test_ip_mcast_connected(self): - """ IP Multicast Connected Source check """ + """IP Multicast Connected Source check""" + + MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t + MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t # # A (*,G). # one accepting interface, pg0, 1 forwarding interfaces # - route_232_1_1_1 = IpMRoute( + route_232_1_1_1 = VppIpMRoute( self, "0.0.0.0", - "232.1.1.1", 32, - MRouteEntryFlags.MFIB_ENTRY_FLAG_NONE, - [MRoutePath(self.pg0.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_ACCEPT), - MRoutePath(self.pg1.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_FORWARD)]) + "232.1.1.1", + 32, + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, + [ + VppMRoutePath( + self.pg0.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT + ), + VppMRoutePath( + self.pg1.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD + ), + ], + ) route_232_1_1_1.add_vpp_config() route_232_1_1_1.update_entry_flags( - MRouteEntryFlags.MFIB_ENTRY_FLAG_CONNECTED) + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_CONNECTED + ) # # Now the (*,G) is present, send from connected source @@ -454,10 +712,9 @@ class TestIPMcast(VppTestCase): # # Constrct a representation of the signal we expect on pg0 # - signal_232_1_1_1_itf_0 = MFibSignal(self, - route_232_1_1_1, - self.pg0.sw_if_index, - tx[0]) + signal_232_1_1_1_itf_0 = VppMFibSignal( + self, route_232_1_1_1, self.pg0.sw_if_index, tx[0] + ) # # read the only expected signal @@ -482,27 +739,33 @@ class TestIPMcast(VppTestCase): # A Second entry with connected check # one accepting interface, pg0, 1 forwarding interfaces # - route_232_1_1_2 = IpMRoute( + route_232_1_1_2 = VppIpMRoute( self, "0.0.0.0", - "232.1.1.2", 32, - MRouteEntryFlags.MFIB_ENTRY_FLAG_NONE, - [MRoutePath(self.pg0.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_ACCEPT), - MRoutePath(self.pg1.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_FORWARD)]) + "232.1.1.2", + 32, + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, + [ + VppMRoutePath( + self.pg0.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT + ), + VppMRoutePath( + self.pg1.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD + ), + ], + ) route_232_1_1_2.add_vpp_config() route_232_1_1_2.update_entry_flags( - MRouteEntryFlags.MFIB_ENTRY_FLAG_CONNECTED) + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_CONNECTED + ) # # Send traffic to both entries. One read should net us two signals # - signal_232_1_1_2_itf_0 = MFibSignal(self, - route_232_1_1_2, - self.pg0.sw_if_index, - tx[0]) + signal_232_1_1_2_itf_0 = VppMFibSignal( + self, route_232_1_1_2, self.pg0.sw_if_index, tx[0] + ) tx = self._mcast_connected_send_stream("232.1.1.1") tx2 = self._mcast_connected_send_stream("232.1.1.2") @@ -516,29 +779,38 @@ class TestIPMcast(VppTestCase): signal_232_1_1_1_itf_0.compare(signals[1]) signal_232_1_1_2_itf_0.compare(signals[0]) - route_232_1_1_1.remove_vpp_config() - route_232_1_1_2.remove_vpp_config() + route_232_1_1_1.update_entry_flags(MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE) + route_232_1_1_2.update_entry_flags(MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE) def test_ip_mcast_signal(self): - """ IP Multicast Signal """ + """IP Multicast Signal""" + + MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t + MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t # # A (*,G). # one accepting interface, pg0, 1 forwarding interfaces # - route_232_1_1_1 = IpMRoute( + route_232_1_1_1 = VppIpMRoute( self, "0.0.0.0", - "232.1.1.1", 32, - MRouteEntryFlags.MFIB_ENTRY_FLAG_NONE, - [MRoutePath(self.pg0.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_ACCEPT), - MRoutePath(self.pg1.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_FORWARD)]) + "232.1.1.1", + 32, + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, + [ + VppMRoutePath( + self.pg0.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT + ), + VppMRoutePath( + self.pg1.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD + ), + ], + ) route_232_1_1_1.add_vpp_config() - route_232_1_1_1.update_entry_flags( - MRouteEntryFlags.MFIB_ENTRY_FLAG_SIGNAL) + + route_232_1_1_1.update_entry_flags(MRouteEntryFlags.MFIB_API_ENTRY_FLAG_SIGNAL) # # Now the (*,G) is present, send from connected source @@ -548,10 +820,9 @@ class TestIPMcast(VppTestCase): # # Constrct a representation of the signal we expect on pg0 # - signal_232_1_1_1_itf_0 = MFibSignal(self, - route_232_1_1_1, - self.pg0.sw_if_index, - tx[0]) + signal_232_1_1_1_itf_0 = VppMFibSignal( + self, route_232_1_1_1, self.pg0.sw_if_index, tx[0] + ) # # read the only expected signal @@ -578,9 +849,13 @@ class TestIPMcast(VppTestCase): # route_232_1_1_1.update_path_flags( self.pg0.sw_if_index, - (MRouteItfFlags.MFIB_ITF_FLAG_ACCEPT | - MRouteItfFlags.MFIB_ITF_FLAG_NEGATE_SIGNAL)) + ( + MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT + | MRouteItfFlags.MFIB_API_ITF_FLAG_NEGATE_SIGNAL + ), + ) + self.vapi.cli("clear trace") tx = self._mcast_connected_send_stream("232.1.1.1") signals = self.vapi.mfib_signal_dump() @@ -590,8 +865,7 @@ class TestIPMcast(VppTestCase): # Clear the SIGNAL flag on the entry and the signals should # come back since the interface is still NEGATE-SIGNAL # - route_232_1_1_1.update_entry_flags( - MRouteEntryFlags.MFIB_ENTRY_FLAG_NONE) + route_232_1_1_1.update_entry_flags(MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE) tx = self._mcast_connected_send_stream("232.1.1.1") @@ -603,18 +877,369 @@ class TestIPMcast(VppTestCase): # Lastly remove the NEGATE-SIGNAL from the interface and the # signals should stop # - route_232_1_1_1.update_path_flags(self.pg0.sw_if_index, - MRouteItfFlags.MFIB_ITF_FLAG_ACCEPT) + route_232_1_1_1.update_path_flags( + self.pg0.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT + ) tx = self._mcast_connected_send_stream("232.1.1.1") signals = self.vapi.mfib_signal_dump() self.assertEqual(0, len(signals)) + def test_ip_mcast_vrf(self): + """IP Multicast Replication in non-default table""" + + MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t + MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t + # - # Cleanup + # An (S,G). + # one accepting interface, pg0, 2 forwarding interfaces # - route_232_1_1_1.remove_vpp_config() + route_1_1_1_1_232_1_1_1 = VppIpMRoute( + self, + "1.1.1.1", + "232.1.1.1", + 64, + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, + [ + VppMRoutePath( + self.pg8.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT + ), + VppMRoutePath( + self.pg1.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD + ), + VppMRoutePath( + self.pg2.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD + ), + ], + table_id=10, + ) + route_1_1_1_1_232_1_1_1.add_vpp_config() + + # + # a stream that matches the route for (1.1.1.1,232.1.1.1) + # small packets + # + self.vapi.cli("clear trace") + tx = self.create_stream_ip4(self.pg8, "1.1.1.1", "232.1.1.1") + self.pg8.add_stream(tx) + + self.pg_enable_capture(self.pg_interfaces) + self.pg_start() + + # We expect replications on Pg1 & 2 + self.verify_capture_ip4(self.pg1, tx) + self.verify_capture_ip4(self.pg2, tx) + + # + # An (S,G). for for-us + # + route_0_0_0_0_224_0_0_5 = VppIpMRoute( + self, + "0.0.0.0", + "224.0.0.5", + 32, + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, + [ + VppMRoutePath( + self.pg8.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT + ), + VppMRoutePath( + 0xFFFFFFFF, + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, + type=FibPathType.FIB_PATH_TYPE_LOCAL, + ), + ], + table_id=10, + ) + route_0_0_0_0_224_0_0_5.add_vpp_config() + + # + # a stream that matches the route for (0.0.0.0, 224.0.0.5) + # small packets + # + self.vapi.cli("clear trace") + self.pg8.resolve_arp() + + # + # send a ping to mcast address from peer on pg8 + # expect a response + # + icmp_id = 0xB + icmp_seq = 5 + icmp_load = b"\x0a" * 18 + tx = ( + Ether(dst=getmacbyip("224.0.0.5"), src=self.pg8.remote_mac) + / IP(src=self.pg8.remote_ip4, dst="224.0.0.5") + / ICMP(id=icmp_id, seq=icmp_seq) + / Raw(load=icmp_load) + ) * 2 + + self.send_and_expect(self.pg8, tx, self.pg8) + + def test_ip_mcast_gre(self): + """IP Multicast Replication over GRE""" + + MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t + MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t + + gre_if_1 = VppGreInterface( + self, self.pg1.local_ip4, self.pg1.remote_ip4 + ).add_vpp_config() + gre_if_2 = VppGreInterface( + self, self.pg2.local_ip4, self.pg2.remote_ip4 + ).add_vpp_config() + gre_if_3 = VppGreInterface( + self, self.pg3.local_ip4, self.pg3.remote_ip4 + ).add_vpp_config() + + gre_if_1.admin_up() + gre_if_1.config_ip4() + gre_if_2.admin_up() + gre_if_2.config_ip4() + gre_if_3.admin_up() + gre_if_3.config_ip4() + + # + # An (S,G). + # one accepting interface, pg0, 2 forwarding interfaces + # + route_1_1_1_1_232_1_1_1 = VppIpMRoute( + self, + "1.1.1.1", + "232.2.2.2", + 64, + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, + [ + VppMRoutePath( + gre_if_1.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT + ), + VppMRoutePath( + gre_if_2.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD + ), + VppMRoutePath( + gre_if_3.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD + ), + ], + ) + route_1_1_1_1_232_1_1_1.add_vpp_config() + + # + # a stream that matches the route for (1.1.1.1,232.2.2.2) + # small packets + # + tx = ( + Ether(dst=self.pg1.local_mac, src=self.pg1.remote_mac) + / IP(src=self.pg1.remote_ip4, dst=self.pg1.local_ip4) + / GRE() + / IP(src="1.1.1.1", dst="232.2.2.2") + / UDP(sport=1234, dport=1234) + / Raw(b"\a5" * 64) + ) * 63 + + self.vapi.cli("clear trace") + self.pg1.add_stream(tx) + + self.pg_enable_capture(self.pg_interfaces) + self.pg_start() + + # We expect replications on Pg2 & 3 + # check the encap headers are as expected based on the egress tunnel + rxs = self.pg2.get_capture(len(tx)) + for rx in rxs: + self.assertEqual(rx[IP].src, gre_if_2.t_src) + self.assertEqual(rx[IP].dst, gre_if_2.t_dst) + self.assert_packet_checksums_valid(rx) + + rxs = self.pg3.get_capture(len(tx)) + for rx in rxs: + self.assertEqual(rx[IP].src, gre_if_3.t_src) + self.assertEqual(rx[IP].dst, gre_if_3.t_dst) + self.assert_packet_checksums_valid(rx) + + def test_ip6_mcast_gre(self): + """IP6 Multicast Replication over GRE""" + + MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t + MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t + + gre_if_1 = VppGreInterface( + self, self.pg1.local_ip4, self.pg1.remote_ip4 + ).add_vpp_config() + gre_if_2 = VppGreInterface( + self, self.pg2.local_ip4, self.pg2.remote_ip4 + ).add_vpp_config() + gre_if_3 = VppGreInterface( + self, self.pg3.local_ip4, self.pg3.remote_ip4 + ).add_vpp_config() + + gre_if_1.admin_up() + gre_if_1.config_ip6() + gre_if_2.admin_up() + gre_if_2.config_ip6() + gre_if_3.admin_up() + gre_if_3.config_ip6() + + # + # An (S,G). + # one accepting interface, pg0, 2 forwarding interfaces + # + route_1_1_FF_1 = VppIpMRoute( + self, + "1::1", + "FF00::1", + 256, + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, + [ + VppMRoutePath( + gre_if_1.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT + ), + VppMRoutePath( + gre_if_2.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD + ), + VppMRoutePath( + gre_if_3.sw_if_index, MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD + ), + ], + ) + route_1_1_FF_1.add_vpp_config() + + # + # a stream that matches the route for (1::1, FF::1) + # small packets + # + tx = ( + Ether(dst=self.pg1.local_mac, src=self.pg1.remote_mac) + / IP(src=self.pg1.remote_ip4, dst=self.pg1.local_ip4) + / GRE() + / IPv6(src="1::1", dst="FF00::1") + / UDP(sport=1234, dport=1234) + / Raw(b"\a5" * 64) + ) * 63 + + self.vapi.cli("clear trace") + self.pg1.add_stream(tx) + + self.pg_enable_capture(self.pg_interfaces) + self.pg_start() + + # We expect replications on Pg2 & 3 + # check the encap headers are as expected based on the egress tunnel + rxs = self.pg2.get_capture(len(tx)) + for rx in rxs: + self.assertEqual(rx[IP].src, gre_if_2.t_src) + self.assertEqual(rx[IP].dst, gre_if_2.t_dst) + self.assert_packet_checksums_valid(rx) + + rxs = self.pg3.get_capture(len(tx)) + for rx in rxs: + self.assertEqual(rx[IP].src, gre_if_3.t_src) + self.assertEqual(rx[IP].dst, gre_if_3.t_dst) + self.assert_packet_checksums_valid(rx) + + def test_ip6_mcast_vrf(self): + """IPv6 Multicast Replication in non-default table""" + + MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t + MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t + + # + # An (S,G). + # one accepting interface, pg0, 2 forwarding interfaces + # + route_2001_ff01_1 = VppIpMRoute( + self, + "2001::1", + "ff01::1", + 256, + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, + [ + VppMRoutePath( + self.pg8.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT, + proto=FibPathProto.FIB_PATH_NH_PROTO_IP6, + ), + VppMRoutePath( + self.pg1.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, + proto=FibPathProto.FIB_PATH_NH_PROTO_IP6, + ), + VppMRoutePath( + self.pg2.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, + proto=FibPathProto.FIB_PATH_NH_PROTO_IP6, + ), + ], + table_id=10, + ) + route_2001_ff01_1.add_vpp_config() + + # + # a stream that matches the route for (2001::1, ff00::1) + # + self.vapi.cli("clear trace") + tx = self.create_stream_ip6(self.pg8, "2001::1", "ff01::1") + self.pg8.add_stream(tx) + + self.pg_enable_capture(self.pg_interfaces) + self.pg_start() + + # We expect replications on Pg1, 2, + self.verify_capture_ip6(self.pg1, tx) + self.verify_capture_ip6(self.pg2, tx) + + def test_bidir(self): + """IP Multicast Bi-directional""" + + MRouteItfFlags = VppEnum.vl_api_mfib_itf_flags_t + MRouteEntryFlags = VppEnum.vl_api_mfib_entry_flags_t + + # + # A (*,G). The set of accepting interfaces matching the forwarding + # + route_232_1_1_1 = VppIpMRoute( + self, + "0.0.0.0", + "232.1.1.1", + 32, + MRouteEntryFlags.MFIB_API_ENTRY_FLAG_NONE, + [ + VppMRoutePath( + self.pg0.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT + | MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, + ), + VppMRoutePath( + self.pg1.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT + | MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, + ), + VppMRoutePath( + self.pg2.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT + | MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, + ), + VppMRoutePath( + self.pg3.sw_if_index, + MRouteItfFlags.MFIB_API_ITF_FLAG_ACCEPT + | MRouteItfFlags.MFIB_API_ITF_FLAG_FORWARD, + ), + ], + ) + route_232_1_1_1.add_vpp_config() + + tx = self.create_stream_ip4(self.pg0, "1.1.1.1", "232.1.1.1") + self.pg0.add_stream(tx) + + self.pg_enable_capture(self.pg_interfaces) + self.pg_start() + + # We expect replications on Pg1, 2, 3, but not on pg0 + self.verify_capture_ip4(self.pg1, tx) + self.verify_capture_ip4(self.pg2, tx) + self.verify_capture_ip4(self.pg3, tx) + self.pg0.assert_nothing_captured(remark="IP multicast packets forwarded on PG0") -if __name__ == '__main__': +if __name__ == "__main__": unittest.main(testRunner=VppTestRunner)