X-Git-Url: https://gerrit.fd.io/r/gitweb?a=blobdiff_plain;f=test%2Ftest_trace_filter.py;h=3c1f778a0f7c73ce561e3d30ced712e84ec8dc68;hb=d9b0c6fbf7aa5bd9af84264105b39c82028a4a29;hp=fa0d74812f5ad790add69a4b3d126f254794933b;hpb=f90348bcb4afd0af2611cefc43b17ef3042b511c;p=vpp.git diff --git a/test/test_trace_filter.py b/test/test_trace_filter.py index fa0d74812f5..3c1f778a0f7 100644 --- a/test/test_trace_filter.py +++ b/test/test_trace_filter.py @@ -15,7 +15,7 @@ from scapy.utils import rdpcap class TestTracefilter(VppTestCase): - """ Packet Tracer Filter Test """ + """Packet Tracer Filter Test""" @classmethod def setUpClass(cls): @@ -43,8 +43,11 @@ class TestTracefilter(VppTestCase): def cli(self, cmd): r = self.vapi.cli_return_response(cmd) if r.retval != 0: - s = "reply '%s'" % r.reply if hasattr( - r, "reply") else "retval '%s'" % r.retval + s = ( + "reply '%s'" % r.reply + if hasattr(r, "reply") + else "retval '%s'" % r.retval + ) raise RuntimeError("cli command '%s' FAIL with %s" % (cmd, s)) return r @@ -71,26 +74,34 @@ class TestTracefilter(VppTestCase): self.assertTrue(r.reply.find(s) != -1) def test_basic(self): - """ Packet Tracer Filter Test """ + """Packet Tracer Filter Test""" self.add_trace_filter( - "l3 ip4 src", - "l3 ip4 src %s" % - self.pg0.remote_hosts[5].ip4) + "l3 ip4 src", "l3 ip4 src %s" % self.pg0.remote_hosts[5].ip4 + ) self.add_trace_filter( - "l3 ip4 proto l4 src_port", - "l3 ip4 proto 17 l4 src_port 2345") + "l3 ip4 proto l4 src_port", "l3 ip4 proto 17 l4 src_port 2345" + ) # the packet we are trying to match p = list() for i in range(100): src = self.pg0.remote_hosts[i % len(self.pg0.remote_hosts)].ip4 - p.append((Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) / - IP(src=src, dst=self.pg1.remote_ip4) / - UDP(sport=1234, dport=2345) / Raw('\xa5' * 100))) + p.append( + ( + Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) + / IP(src=src, dst=self.pg1.remote_ip4) + / UDP(sport=1234, dport=2345) + / Raw("\xa5" * 100) + ) + ) for i in range(17): - p.append((Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) / - IP(src=self.pg0.remote_hosts[0].ip4, - dst=self.pg1.remote_ip4) / - UDP(sport=2345, dport=1234) / Raw('\xa5' * 100))) + p.append( + ( + Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) + / IP(src=self.pg0.remote_hosts[0].ip4, dst=self.pg1.remote_ip4) + / UDP(sport=2345, dport=1234) + / Raw("\xa5" * 100) + ) + ) self.send_and_expect(self.pg0, p, self.pg1, trace=False) @@ -108,21 +119,23 @@ class TestTracefilter(VppTestCase): self.del_trace_filters() def test_encap(self): - """ Packet Tracer Filter Test with encap """ + """Packet Tracer Filter Test with encap""" # the packet we are trying to match - p = (Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) / - IP(src=self.pg0.remote_ip4, dst=self.pg1.remote_ip4) / - UDP() / - VXLAN() / - Ether() / - IP() / - UDP() / - GENEVE(vni=1234) / - Ether() / - IP(src='192.168.4.167') / - UDP() / - Raw('\xa5' * 100)) + p = ( + Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) + / IP(src=self.pg0.remote_ip4, dst=self.pg1.remote_ip4) + / UDP() + / VXLAN() + / Ether() + / IP() + / UDP() + / GENEVE(vni=1234) + / Ether() + / IP(src="192.168.4.167") + / UDP() + / Raw("\xa5" * 100) + ) # # compute filter mask & value @@ -130,29 +143,31 @@ class TestTracefilter(VppTestCase): # we need to set checksums to 0 to make sure scapy will not recompute # them # - tmpl = (Ether() / - IP(chksum=0) / - UDP(chksum=0) / - VXLAN() / - Ether() / - IP(chksum=0) / - UDP(chksum=0) / - GENEVE(vni=0) / - Ether() / - IP(src='0.0.0.0', chksum=0)) + tmpl = ( + Ether() + / IP(chksum=0) + / UDP(chksum=0) + / VXLAN() + / Ether() + / IP(chksum=0) + / UDP(chksum=0) + / GENEVE(vni=0) + / Ether() + / IP(src="0.0.0.0", chksum=0) + ) ori = raw(tmpl) # the mask - tmpl[GENEVE].vni = 0xffffff + tmpl[GENEVE].vni = 0xFFFFFF user = tmpl[GENEVE].payload - user[IP].src = '255.255.255.255' + user[IP].src = "255.255.255.255" new = raw(tmpl) mask = "".join(("{:02x}".format(o ^ n) for o, n in zip(ori, new))) # this does not match (wrong vni) tmpl[GENEVE].vni = 1 user = tmpl[GENEVE].payload - user[IP].src = '192.168.4.167' + user[IP].src = "192.168.4.167" new = raw(tmpl) match = "".join(("{:02x}".format(o ^ n) for o, n in zip(ori, new))) self.assert_classify(mask, match, [p] * 11, 0) @@ -164,29 +179,41 @@ class TestTracefilter(VppTestCase): self.assert_classify(mask, match, [p] * 17) def test_pcap(self): - """ Packet Capture Filter Test """ + """Packet Capture Filter Test""" self.cli( - "classify filter pcap mask l3 ip4 src match l3 ip4 src %s" % - self.pg0.remote_hosts[5].ip4) + "classify filter pcap mask l3 ip4 src match l3 ip4 src %s" + % self.pg0.remote_hosts[5].ip4 + ) self.cli( "classify filter pcap " "mask l3 ip4 proto l4 src_port " - "match l3 ip4 proto 17 l4 src_port 2345") + "match l3 ip4 proto 17 l4 src_port 2345" + ) self.cli( "pcap trace rx tx max 1000 intfc pg0 " - "file vpp_test_trace_filter_test_pcap.pcap filter") + "file vpp_test_trace_filter_test_pcap.pcap filter" + ) # the packet we are trying to match p = list() for i in range(100): src = self.pg0.remote_hosts[i % len(self.pg0.remote_hosts)].ip4 - p.append((Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) / - IP(src=src, dst=self.pg1.remote_ip4) / - UDP(sport=1234, dport=2345) / Raw('\xa5' * 100))) + p.append( + ( + Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) + / IP(src=src, dst=self.pg1.remote_ip4) + / UDP(sport=1234, dport=2345) + / Raw("\xa5" * 100) + ) + ) for i in range(17): - p.append((Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) / - IP(src=self.pg0.remote_hosts[0].ip4, - dst=self.pg1.remote_ip4) / - UDP(sport=2345, dport=1234) / Raw('\xa5' * 100))) + p.append( + ( + Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) + / IP(src=self.pg0.remote_hosts[0].ip4, dst=self.pg1.remote_ip4) + / UDP(sport=2345, dport=1234) + / Raw("\xa5" * 100) + ) + ) self.send_and_expect(self.pg0, p, self.pg1, trace=False) @@ -208,28 +235,42 @@ class TestTracefilter(VppTestCase): self.assertEqual(str(pcap[i]), p_) def test_pcap_drop(self): - """ Drop Packet Capture Filter Test """ + """Drop Packet Capture Filter Test""" self.cli( "pcap trace drop max 1000 " "error {ip4-udp-lookup}.{no_listener} " - "file vpp_test_trace_filter_test_pcap_drop.pcap") + "file vpp_test_trace_filter_test_pcap_drop.pcap" + ) # the packet we are trying to match p = list() for i in range(17): # this packet should be forwarded - p.append((Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) / - IP(src=self.pg0.remote_hosts[0].ip4, - dst=self.pg1.remote_ip4) / - UDP(sport=2345, dport=1234) / Raw('\xa5' * 100))) + p.append( + ( + Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) + / IP(src=self.pg0.remote_hosts[0].ip4, dst=self.pg1.remote_ip4) + / UDP(sport=2345, dport=1234) + / Raw("\xa5" * 100) + ) + ) # this packet should be captured (no listener) - p.append((Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) / - IP(src=self.pg0.remote_hosts[0].ip4, - dst=self.pg0.local_ip4) / - UDP(sport=2345, dport=1234) / Raw('\xa5' * 100))) + p.append( + ( + Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) + / IP(src=self.pg0.remote_hosts[0].ip4, dst=self.pg0.local_ip4) + / UDP(sport=2345, dport=1234) + / Raw("\xa5" * 100) + ) + ) # this packet will be blackholed but not captured - p.append((Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) / - IP(src=self.pg0.remote_hosts[0].ip4, dst="0.0.0.0") / - UDP(sport=2345, dport=1234) / Raw('\xa5' * 100))) + p.append( + ( + Ether(src=self.pg0.remote_mac, dst=self.pg0.local_mac) + / IP(src=self.pg0.remote_hosts[0].ip4, dst="0.0.0.0") + / UDP(sport=2345, dport=1234) + / Raw("\xa5" * 100) + ) + ) self.send_and_expect(self.pg0, p, self.pg1, n_rx=17, trace=False) @@ -240,5 +281,5 @@ class TestTracefilter(VppTestCase): self.assertEqual(len(pcap), 17) -if __name__ == '__main__': +if __name__ == "__main__": unittest.main(testRunner=VppTestRunner)