ipsec: infra for selecting backends
[vpp.git] / test / test_ipsec_api.py
diff --git a/test/test_ipsec_api.py b/test/test_ipsec_api.py
new file mode 100644 (file)
index 0000000..fed996e
--- /dev/null
@@ -0,0 +1,78 @@
+import unittest
+
+from framework import VppTestCase, VppTestRunner
+from template_ipsec import TemplateIpsec
+
+
+class IpsecApiTestCase(VppTestCase):
+    """ IPSec API tests """
+
+    @classmethod
+    def setUpClass(cls):
+        super(IpsecApiTestCase, cls).setUpClass()
+        cls.create_pg_interfaces([0])
+        cls.pg0.config_ip4()
+        cls.pg0.admin_up()
+
+    def test_backend_dump(self):
+        """ backend dump """
+        d = self.vapi.ipsec_backend_dump()
+        self.assert_equal(len(d), 2, "number of ipsec backends in dump")
+        self.assert_equal(d[0].protocol, TemplateIpsec.vpp_ah_protocol,
+                          "ipsec protocol in dump entry")
+        self.assert_equal(d[0].index, 0, "index in dump entry")
+        self.assert_equal(d[0].active, 1, "active flag in dump entry")
+        self.assert_equal(d[1].protocol, TemplateIpsec.vpp_esp_protocol,
+                          "ipsec protocol in dump entry")
+        self.assert_equal(d[1].index, 0, "index in dump entry")
+        self.assert_equal(d[1].active, 1, "active flag in dump entry")
+
+    def test_select_valid_backend(self):
+        """ select valid backend """
+        self.vapi.ipsec_select_backend(TemplateIpsec.vpp_ah_protocol, 0)
+        self.vapi.ipsec_select_backend(TemplateIpsec.vpp_esp_protocol, 0)
+
+    def test_select_invalid_backend(self):
+        """ select invalid backend """
+        with self.vapi.assert_negative_api_retval():
+            self.vapi.ipsec_select_backend(TemplateIpsec.vpp_ah_protocol, 200)
+        with self.vapi.assert_negative_api_retval():
+            self.vapi.ipsec_select_backend(TemplateIpsec.vpp_esp_protocol, 200)
+
+    def test_select_backend_in_use(self):
+        """ attempt to change backend while sad configured """
+        params = TemplateIpsec.ipv4_params
+        addr_type = params.addr_type
+        is_ipv6 = params.is_ipv6
+        scapy_tun_sa_id = params.scapy_tun_sa_id
+        scapy_tun_spi = params.scapy_tun_spi
+        auth_algo_vpp_id = params.auth_algo_vpp_id
+        auth_key = params.auth_key
+        crypt_algo_vpp_id = params.crypt_algo_vpp_id
+        crypt_key = params.crypt_key
+
+        self.vapi.ipsec_sad_add_del_entry(scapy_tun_sa_id, scapy_tun_spi,
+                                          auth_algo_vpp_id, auth_key,
+                                          crypt_algo_vpp_id, crypt_key,
+                                          TemplateIpsec.vpp_ah_protocol,
+                                          self.pg0.local_addr_n[addr_type],
+                                          self.pg0.remote_addr_n[addr_type],
+                                          is_tunnel=1, is_tunnel_ipv6=is_ipv6)
+        with self.vapi.assert_negative_api_retval():
+            self.vapi.ipsec_select_backend(
+                protocol=TemplateIpsec.vpp_ah_protocol, index=0)
+
+        self.vapi.ipsec_sad_add_del_entry(scapy_tun_sa_id, scapy_tun_spi,
+                                          auth_algo_vpp_id, auth_key,
+                                          crypt_algo_vpp_id, crypt_key,
+                                          TemplateIpsec.vpp_ah_protocol,
+                                          self.pg0.local_addr_n[addr_type],
+                                          self.pg0.remote_addr_n[addr_type],
+                                          is_tunnel=1, is_tunnel_ipv6=is_ipv6,
+                                          is_add=0)
+        self.vapi.ipsec_select_backend(
+            protocol=TemplateIpsec.vpp_ah_protocol, index=0)
+
+
+if __name__ == '__main__':
+    unittest.main(testRunner=VppTestRunner)