CSIT-171 CSIT-172 Policer tests initial commit
[csit.git] / resources / traffic_scripts / policer.py
diff --git a/resources/traffic_scripts/policer.py b/resources/traffic_scripts/policer.py
new file mode 100755 (executable)
index 0000000..ee9fa29
--- /dev/null
@@ -0,0 +1,125 @@
+#!/usr/bin/env python
+
+# Copyright (c) 2016 Cisco and/or its affiliates.
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at:
+#
+#     http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+
+"""Traffic script for IPsec verification."""
+
+import sys
+import logging
+
+# pylint: disable=no-name-in-module
+# pylint: disable=import-error
+logging.getLogger("scapy.runtime").setLevel(logging.ERROR)
+from scapy.all import Ether, IP, IPv6, TCP
+from ipaddress import ip_address
+
+from resources.libraries.python.TrafficScriptArg import TrafficScriptArg
+from resources.libraries.python.PacketVerifier import RxQueue, TxQueue
+
+
+def check_ipv4(pkt_recv, dscp):
+    """Check received IPv4 IPsec packet.
+
+    :param pkt_recv: Received packet to verify.
+    :param dscp: DSCP value to check.
+    :type pkt_recv: scapy.Ether
+    :type dscp: int
+    :raises RuntimeError: If received packet is invalid.
+    """
+    if not pkt_recv.haslayer(IP):
+        raise RuntimeError(
+            'Not an IPv4 packet received: {0}'.format(pkt_recv.__repr__()))
+
+    rx_dscp = pkt_recv['IP'].tos >> 2
+    if rx_dscp != dscp:
+        raise RuntimeError(
+            'Invalid DSCP {0} should be {1}'.format(rx_dscp, dscp))
+
+    if not pkt_recv.haslayer(TCP):
+        raise RuntimeError(
+            'Not a TCP packet received: {0}'.format(pkt_recv.__repr__()))
+
+
+def check_ipv6(pkt_recv, dscp):
+    """Check received IPv6 IPsec packet.
+
+    :param pkt_recv: Received packet to verify.
+    :param dscp: DSCP value to check.
+    :type pkt_recv: scapy.Ether
+    :type dscp: int
+    :raises RuntimeError: If received packet is invalid.
+    """
+    if not pkt_recv.haslayer(IPv6):
+        raise RuntimeError(
+            'Not an IPv6 packet received: {0}'.format(pkt_recv.__repr__()))
+
+    rx_dscp = pkt_recv['IPv6'].tc >> 2
+    if rx_dscp != dscp:
+        raise RuntimeError(
+            'Invalid DSCP {0} should be {1}'.format(rx_dscp, dscp))
+
+    if not pkt_recv.haslayer(TCP):
+        raise RuntimeError(
+            'Not a TCP packet received: {0}'.format(pkt_recv.__repr__()))
+
+
+# pylint: disable=too-many-locals
+# pylint: disable=too-many-statements
+def main():
+    """Send and receive TCP packet."""
+    args = TrafficScriptArg(['src_mac', 'dst_mac', 'src_ip', 'dst_ip', 'dscp'])
+
+    rxq = RxQueue(args.get_arg('rx_if'))
+    txq = TxQueue(args.get_arg('tx_if'))
+
+    src_mac = args.get_arg('src_mac')
+    dst_mac = args.get_arg('dst_mac')
+    src_ip = args.get_arg('src_ip')
+    dst_ip = args.get_arg('dst_ip')
+    dscp = int(args.get_arg('dscp'))
+
+    if 6 == ip_address(unicode(src_ip)).version:
+        is_ipv4 = False
+    else:
+        is_ipv4 = True
+
+    sent_packets = []
+
+    if is_ipv4:
+        ip_pkt = IP(src=src_ip, dst=dst_ip) / \
+                 TCP()
+    else:
+        ip_pkt = IPv6(src=src_ip, dst=dst_ip) / \
+                 TCP()
+
+    pkt_send = Ether(src=src_mac, dst=dst_mac) / \
+               ip_pkt
+
+    sent_packets.append(pkt_send)
+    txq.send(pkt_send)
+
+    pkt_recv = rxq.recv(2, sent_packets)
+
+    if pkt_recv is None:
+        raise RuntimeError('Rx timeout')
+
+    if is_ipv4:
+        check_ipv4(pkt_recv, dscp)
+    else:
+        check_ipv6(pkt_recv, dscp)
+
+    sys.exit(0)
+
+if __name__ == "__main__":
+    main()