castroflavio | bd48e30 | 2015-12-15 17:57:38 -0500 | [diff] [blame] | 1 | """ |
castroflavio | bd48e30 | 2015-12-15 17:57:38 -0500 | [diff] [blame] | 2 | """ |
| 3 | |
| 4 | from oftest import config |
| 5 | import logging |
| 6 | import oftest.base_tests as base_tests |
| 7 | import ofp |
| 8 | from oftest.testutils import * |
| 9 | from accton_util import * |
| 10 | |
| 11 | class Mtu4500(base_tests.SimpleDataPlane): |
| 12 | |
| 13 | def runTest(self): |
| 14 | ports = sorted(config["port_map"].keys()) |
| 15 | |
| 16 | delete_all_flows(self.controller) |
| 17 | delete_all_groups(self.controller) |
| 18 | |
| 19 | for port in ports: |
| 20 | add_one_l2_interface_group(self.controller, port, 1, True, False) |
| 21 | add_one_vlan_table_flow(self.controller, port, 1, flag=VLAN_TABLE_FLAG_ONLY_TAG) |
| 22 | group_id = encode_l2_interface_group_id(1, port) |
| 23 | add_bridge_flow(self.controller, [0x00, 0x12, 0x34, 0x56, 0x78, port], 1, group_id, True) |
| 24 | do_barrier(self.controller) |
| 25 | |
| 26 | for out_port in ports: |
| 27 | # change dest based on port number |
| 28 | mac_dst= '00:12:34:56:78:%02X' % out_port |
| 29 | for in_port in ports: |
| 30 | if in_port == out_port: |
| 31 | continue |
| 32 | # change source based on port number to avoid packet-ins from learning |
| 33 | mac_src= '00:12:34:56:78:%02X' % in_port |
| 34 | parsed_pkt = simple_tcp_packet(pktlen=4500,dl_vlan_enable=True, vlan_vid=1, eth_dst=mac_dst, eth_src=mac_src) |
| 35 | pkt = str(parsed_pkt) |
| 36 | self.dataplane.send(in_port, pkt) |
| 37 | |
| 38 | for ofport in ports: |
| 39 | if ofport in [out_port]: |
| 40 | verify_packet(self, pkt, ofport) |
| 41 | else: |
| 42 | verify_no_packet(self, pkt, ofport) |
| 43 | |
| 44 | verify_no_other_packets(self) |
| 45 | |
| 46 | class L3McastToVPN(base_tests.SimpleDataPlane): |
| 47 | """ |
| 48 | Mcast routing |
| 49 | """ |
| 50 | def runTest(self): |
| 51 | """ |
| 52 | port1 (vlan 1)-> port 2 (vlan 2) |
| 53 | """ |
| 54 | #delete_all_flows(self.controller) |
| 55 | #delete_all_groups(self.controller) |
| 56 | |
| 57 | if len(config["port_map"]) <3: |
| 58 | logging.info("Port count less than 2, can't run this case") |
| 59 | return |
| 60 | |
| 61 | vlan_id =1 |
| 62 | port2_out_vlan=2 |
| 63 | port3_out_vlan=3 |
| 64 | in_vlan=1 #macast group vid shall use input vlan diffe from l3 interface use output vlan |
| 65 | intf_src_mac=[0x00, 0x00, 0x00, 0xcc, 0xcc, 0xcc] |
| 66 | intf_src_mac_str=':'.join(['%02X' % x for x in intf_src_mac]) |
| 67 | dst_mac=[0x01, 0x00, 0x5e, 0x01, 0x01, 0x01] |
| 68 | dst_mac_str=':'.join(['%02X' % x for x in dst_mac]) |
| 69 | port1_mac=[0x00, 0x11, 0x11, 0x11, 0x11, 0x11] |
| 70 | port1_mac_str=':'.join(['%02X' % x for x in port1_mac]) |
| 71 | src_ip=0xc0a80101 |
| 72 | src_ip_str="192.168.1.1" |
| 73 | dst_ip=0xe0010101 |
| 74 | dst_ip_str="224.1.1.1" |
| 75 | |
| 76 | port1=config["port_map"].keys()[0] |
| 77 | port2=config["port_map"].keys()[1] |
| 78 | port3=config["port_map"].keys()[2] |
| 79 | |
| 80 | #add l2 interface group |
| 81 | for port in config["port_map"].keys(): |
| 82 | add_one_l2_interface_group(self.controller, port, vlan_id=vlan_id, is_tagged=False, send_barrier=False) |
| 83 | #add vlan flow table |
| 84 | add_one_vlan_table_flow(self.controller, port, vlan_id, flag=VLAN_TABLE_FLAG_ONLY_TAG) |
| 85 | vlan_id +=1 |
| 86 | |
| 87 | #add termination flow |
| 88 | add_termination_flow(self.controller, port1, 0x0800, [0x01, 0x00, 0x5e, 0x00, 0x00, 0x00], vlan_id) |
| 89 | |
| 90 | #add MPLS interface group |
| 91 | l2_gid = encode_l2_interface_group_id(port2_out_vlan, port2) |
| 92 | mpls_gid2, mpls_msg = add_mpls_intf_group(self.controller, l2_gid, dst_mac, intf_src_mac, port2_out_vlan, port2) |
| 93 | l2_gid3 = encode_l2_interface_group_id(port3_out_vlan, port3) |
| 94 | mpls_gid3, mpls_msg = add_mpls_intf_group(self.controller, l2_gid3, dst_mac, intf_src_mac, port3_out_vlan, port3) |
| 95 | #add L3VPN groups |
| 96 | mpls_label_gid2, mpls_label_msg = add_mpls_label_group(self.controller, subtype=OFDPA_MPLS_GROUP_SUBTYPE_L3_VPN_LABEL, |
| 97 | index=(0x20000+port2), ref_gid= mpls_gid2, push_mpls_header=True, set_mpls_label=port2, set_bos=1, cpy_ttl_outward=True) |
| 98 | mpls_label_gid3, mpls_label_msg = add_mpls_label_group(self.controller, subtype=OFDPA_MPLS_GROUP_SUBTYPE_L3_VPN_LABEL, |
| 99 | index=(0x10000+port3), ref_gid= mpls_gid3, push_mpls_header=True, set_mpls_label=port3, set_bos=1, cpy_ttl_outward=True) |
| 100 | |
| 101 | |
| 102 | |
| 103 | mcat_group_msg=add_l3_mcast_group(self.controller, in_vlan, 2, [0x92020022 , 0x92010023]) |
| 104 | add_mcast4_routing_flow(self.controller, in_vlan, src_ip, 0, dst_ip, mcat_group_msg.group_id) |
| 105 | |
| 106 | parsed_pkt = simple_tcp_packet(pktlen=100, dl_vlan_enable=True, vlan_vid=1, |
| 107 | eth_dst=dst_mac_str, |
| 108 | eth_src=port1_mac_str, |
| 109 | ip_ttl=64, |
| 110 | ip_src=src_ip_str, |
| 111 | ip_dst=dst_ip_str) |
| 112 | pkt=str(parsed_pkt) |
| 113 | self.dataplane.send(port1, pkt) |
| 114 | label = (in_vlan, 0, 1, 63) |
| 115 | parsed_pkt = mpls_packet(pktlen=100, |
| 116 | eth_dst=dst_mac_str, |
| 117 | eth_src=intf_src_mac_str, |
| 118 | ip_ttl=63, |
| 119 | ip_src=src_ip_str, label= [label], |
| 120 | ip_dst=dst_ip_str) |
| 121 | pkt=str(parsed_pkt) |
| 122 | verify_packet(self, pkt, port2) |
| 123 | verify_packet(self, pkt, port3) |
| 124 | verify_no_other_packets(self) |
| 125 | |
| 126 | |