ipsec: infra for selecting backends
[vpp.git] / test / test_ipsec_api.py
1 import unittest
2
3 from framework import VppTestCase, VppTestRunner
4 from template_ipsec import TemplateIpsec
5
6
7 class IpsecApiTestCase(VppTestCase):
8     """ IPSec API tests """
9
10     @classmethod
11     def setUpClass(cls):
12         super(IpsecApiTestCase, cls).setUpClass()
13         cls.create_pg_interfaces([0])
14         cls.pg0.config_ip4()
15         cls.pg0.admin_up()
16
17     def test_backend_dump(self):
18         """ backend dump """
19         d = self.vapi.ipsec_backend_dump()
20         self.assert_equal(len(d), 2, "number of ipsec backends in dump")
21         self.assert_equal(d[0].protocol, TemplateIpsec.vpp_ah_protocol,
22                           "ipsec protocol in dump entry")
23         self.assert_equal(d[0].index, 0, "index in dump entry")
24         self.assert_equal(d[0].active, 1, "active flag in dump entry")
25         self.assert_equal(d[1].protocol, TemplateIpsec.vpp_esp_protocol,
26                           "ipsec protocol in dump entry")
27         self.assert_equal(d[1].index, 0, "index in dump entry")
28         self.assert_equal(d[1].active, 1, "active flag in dump entry")
29
30     def test_select_valid_backend(self):
31         """ select valid backend """
32         self.vapi.ipsec_select_backend(TemplateIpsec.vpp_ah_protocol, 0)
33         self.vapi.ipsec_select_backend(TemplateIpsec.vpp_esp_protocol, 0)
34
35     def test_select_invalid_backend(self):
36         """ select invalid backend """
37         with self.vapi.assert_negative_api_retval():
38             self.vapi.ipsec_select_backend(TemplateIpsec.vpp_ah_protocol, 200)
39         with self.vapi.assert_negative_api_retval():
40             self.vapi.ipsec_select_backend(TemplateIpsec.vpp_esp_protocol, 200)
41
42     def test_select_backend_in_use(self):
43         """ attempt to change backend while sad configured """
44         params = TemplateIpsec.ipv4_params
45         addr_type = params.addr_type
46         is_ipv6 = params.is_ipv6
47         scapy_tun_sa_id = params.scapy_tun_sa_id
48         scapy_tun_spi = params.scapy_tun_spi
49         auth_algo_vpp_id = params.auth_algo_vpp_id
50         auth_key = params.auth_key
51         crypt_algo_vpp_id = params.crypt_algo_vpp_id
52         crypt_key = params.crypt_key
53
54         self.vapi.ipsec_sad_add_del_entry(scapy_tun_sa_id, scapy_tun_spi,
55                                           auth_algo_vpp_id, auth_key,
56                                           crypt_algo_vpp_id, crypt_key,
57                                           TemplateIpsec.vpp_ah_protocol,
58                                           self.pg0.local_addr_n[addr_type],
59                                           self.pg0.remote_addr_n[addr_type],
60                                           is_tunnel=1, is_tunnel_ipv6=is_ipv6)
61         with self.vapi.assert_negative_api_retval():
62             self.vapi.ipsec_select_backend(
63                 protocol=TemplateIpsec.vpp_ah_protocol, index=0)
64
65         self.vapi.ipsec_sad_add_del_entry(scapy_tun_sa_id, scapy_tun_spi,
66                                           auth_algo_vpp_id, auth_key,
67                                           crypt_algo_vpp_id, crypt_key,
68                                           TemplateIpsec.vpp_ah_protocol,
69                                           self.pg0.local_addr_n[addr_type],
70                                           self.pg0.remote_addr_n[addr_type],
71                                           is_tunnel=1, is_tunnel_ipv6=is_ipv6,
72                                           is_add=0)
73         self.vapi.ipsec_select_backend(
74             protocol=TemplateIpsec.vpp_ah_protocol, index=0)
75
76
77 if __name__ == '__main__':
78     unittest.main(testRunner=VppTestRunner)