I/S and example of applicative testing of DF apps
Change-Id: Icdd299ab1a542d8ab37d55db30a045f10e274b6e
This commit is contained in:
parent
4dd7012a25
commit
750bffc522
668
dragonflow/tests/common/app_testing_objects.py
Normal file
668
dragonflow/tests/common/app_testing_objects.py
Normal file
@ -0,0 +1,668 @@
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
import collections
|
||||
import fcntl
|
||||
import os
|
||||
import pytun
|
||||
import scapy.all as scapy
|
||||
import socket
|
||||
import threading
|
||||
import time
|
||||
|
||||
from oslo_log import log
|
||||
|
||||
from neutron.agent.common import utils
|
||||
|
||||
from dragonflow._i18n import _LI
|
||||
from dragonflow.common.utils import DFDaemon
|
||||
from dragonflow.tests.fullstack import test_objects as objects
|
||||
|
||||
LOG = log.getLogger(__name__)
|
||||
|
||||
|
||||
# NOTE(oanson) This function also exists in nova. However, to save the time it
|
||||
# takes to install nova in the tests, for this one function, I copied it here.
|
||||
def create_tap_dev(dev, mac_address=None):
|
||||
"""Create a tap with name dev and MAC address mac_address on the
|
||||
operating system.
|
||||
:param dev: The name of the tap device to create
|
||||
:type dev: String
|
||||
:param mac_address: The MAC address of the device, format xx:xx:xx:xx:xx:xx
|
||||
:type mac_address: String
|
||||
"""
|
||||
try:
|
||||
# First, try with 'ip'
|
||||
utils.execute(['ip', 'tuntap', 'add', dev, 'mode', 'tap'],
|
||||
run_as_root=True, check_exit_code=[0, 2, 254])
|
||||
except Exception as e:
|
||||
print e
|
||||
# Second option: tunctl
|
||||
utils.execute(['tunctl', '-b', '-t', dev], run_as_root=True)
|
||||
if mac_address:
|
||||
utils.execute(['ip', 'link', 'set', dev, 'address', mac_address],
|
||||
run_as_root=True, check_exit_code=[0, 2, 254])
|
||||
utils.execute(['ip', 'link', 'set', dev, 'up'], run_as_root=True,
|
||||
check_exit_code=[0, 2, 254])
|
||||
|
||||
|
||||
class Topology(object):
|
||||
"""Create and contain all the topology information. This includes routers,
|
||||
subnets, and ports.
|
||||
"""
|
||||
def __init__(self, neutron, nb_api):
|
||||
"""Create a network. That's our playing field."""
|
||||
self._is_closed = False
|
||||
self.neutron = neutron
|
||||
self.nb_api = nb_api
|
||||
self.network = objects.NetworkTestObj(neutron, nb_api)
|
||||
self.subnets = []
|
||||
self.routers = []
|
||||
self.network.create()
|
||||
|
||||
def delete(self):
|
||||
"""Delete this topology. Also deletes all contained routers, subnets
|
||||
and ports.
|
||||
"""
|
||||
for router in self.routers:
|
||||
router.delete()
|
||||
self.routers = []
|
||||
for subnet in self.subnets:
|
||||
subnet.delete()
|
||||
self.subnets = []
|
||||
self.network.close()
|
||||
|
||||
def close(self):
|
||||
if not self._is_closed:
|
||||
self._is_closed = True
|
||||
self.delete()
|
||||
|
||||
def create_subnet(self, cidr='192.168.0.0/24'):
|
||||
"""Create a subnet in this topology, with the given subnet address
|
||||
range.
|
||||
:param cidr: The subnet's address range, in form <IP>/<mask len>
|
||||
:type cidr: String
|
||||
"""
|
||||
subnet_id = len(self.subnets)
|
||||
subnet = Subnet(self, subnet_id, cidr)
|
||||
self.subnets.append(subnet)
|
||||
return subnet
|
||||
|
||||
def create_router(self, subnet_ids):
|
||||
"""Create a router in this topology, connected to the given subnets.
|
||||
:param subnet_ids: List of subnet ids to which the router is connected
|
||||
:type subnet_ids: List
|
||||
"""
|
||||
router_id = len(self.routers)
|
||||
router = Router(self, router_id, subnet_ids)
|
||||
self.routers.append(router)
|
||||
return router
|
||||
|
||||
|
||||
class Subnet(object):
|
||||
"""Represent a single subnet."""
|
||||
def __init__(self, topology, subnet_id, cidr):
|
||||
"""Create the subnet under the given topology, with the given ID, and
|
||||
the given address range.
|
||||
:param topology: The topology to which the subnet belongs
|
||||
:type topology: Topology
|
||||
:param subnet_id: The subnet's ID in the topology. Created by topology
|
||||
:type subnet_id: Number (Opaque)
|
||||
:param cidr: The address range for this subnet. Format IP/MaskLen
|
||||
:type cidr: String
|
||||
"""
|
||||
self.topology = topology
|
||||
self.subnet_id = subnet_id
|
||||
self.ports = []
|
||||
self.subnet = objects.SubnetTestObj(
|
||||
self.topology.neutron,
|
||||
self.topology.nb_api,
|
||||
self.topology.network.network_id
|
||||
)
|
||||
self.subnet.create(subnet={
|
||||
'cidr': cidr,
|
||||
'ip_version': 4,
|
||||
'network_id': topology.network.network_id
|
||||
})
|
||||
|
||||
def delete(self):
|
||||
"""Delete this subnet, and all attached ports."""
|
||||
for port in self.ports:
|
||||
port.delete()
|
||||
self.ports = []
|
||||
self.subnet.close()
|
||||
|
||||
def create_port(self):
|
||||
"""Create a port attached to this subnet."""
|
||||
port_id = len(self.ports)
|
||||
port = Port(self, port_id)
|
||||
self.ports.append(port)
|
||||
return port
|
||||
|
||||
|
||||
class Port(object):
|
||||
"""Represent a single port. Also contains access to the underlying tap
|
||||
device
|
||||
"""
|
||||
def __init__(self, subnet, port_id):
|
||||
"""Create a single port in the given subnet, with the given port_id
|
||||
:param subnet: The subnet on which this port is created
|
||||
:type subnet: Subnet
|
||||
:param port_id: The ID of this port. Created internally by subnet
|
||||
:type port_id: Number (Opaque)
|
||||
"""
|
||||
self.subnet = subnet
|
||||
self.port_id = port_id
|
||||
network_id = self.subnet.topology.network.network_id
|
||||
self.port = objects.PortTestObj(
|
||||
self.subnet.topology.neutron,
|
||||
self.subnet.topology.nb_api,
|
||||
network_id,
|
||||
)
|
||||
self.port.create({
|
||||
'admin_state_up': True,
|
||||
'fixed_ips': [{
|
||||
'subnet_id': self.subnet.subnet.subnet_id,
|
||||
}],
|
||||
'network_id': network_id,
|
||||
'binding:host_id': socket.gethostname(),
|
||||
})
|
||||
self.tap = LogicalPortTap(self.port)
|
||||
|
||||
def delete(self):
|
||||
"""Delete this port. Delete the underlying tap device."""
|
||||
self.tap.delete()
|
||||
self.port.close()
|
||||
|
||||
@property
|
||||
def name(self):
|
||||
"""Return the name of this port, i.e. the name of the underlying tap
|
||||
device.
|
||||
"""
|
||||
return self.port.get_logical_port().get_id()
|
||||
|
||||
|
||||
class LogicalPortTap(object):
|
||||
"""Represent a tap device on the operating system."""
|
||||
def __init__(self, port):
|
||||
"""Create a tap device represented by the given port.
|
||||
:param port: The configuration info of this tap device
|
||||
:type port: Port
|
||||
"""
|
||||
self.port = port
|
||||
self.lport = self.port.get_logical_port()
|
||||
self.tap = self._create_tap_device()
|
||||
self.is_blocking = True
|
||||
|
||||
def _create_tap_device(self):
|
||||
flags = pytun.IFF_TAP | pytun.IFF_NO_PI
|
||||
name = self._get_tap_interface_name()
|
||||
create_tap_dev(name, self.lport.get_mac())
|
||||
tap = pytun.TunTapDevice(flags=flags, name=name)
|
||||
self._connect_tap_device_to_vswitch('br-int', tap.name)
|
||||
tap.up()
|
||||
return tap
|
||||
|
||||
def _get_tap_interface_name(self):
|
||||
lport_name = self.lport.get_id()
|
||||
lport_name_prefix = lport_name[:11]
|
||||
return 'tap{}'.format(lport_name_prefix)
|
||||
|
||||
def _connect_tap_device_to_vswitch(self, vswitch_name, tap_name):
|
||||
"""Connect the tap device to the given vswitch, and add it to the
|
||||
ovsdb.
|
||||
:param vswitch_name: The name of the vswitch to connect the device
|
||||
:type vswitch_name: String
|
||||
:param tap_name: The name of the device to connect
|
||||
:type tap_name: String
|
||||
"""
|
||||
full_args = ['ovs-vsctl', 'add-port', vswitch_name, tap_name]
|
||||
utils.execute(full_args, run_as_root=True, process_input=None)
|
||||
full_args = ['ovs-vsctl', 'set', 'interface', tap_name,
|
||||
'external_ids:iface-id={}'.format(self.lport.get_id())]
|
||||
utils.execute(full_args, run_as_root=True, process_input=None)
|
||||
|
||||
def _disconnect_tap_device_to_vswitch(self, vswitch_name, tap_name):
|
||||
full_args = ['ovs-vsctl', 'del-port', vswitch_name, tap_name]
|
||||
utils.execute(full_args, run_as_root=True, process_input=None)
|
||||
|
||||
def delete(self):
|
||||
self._disconnect_tap_device_to_vswitch('br-int', self.tap.name)
|
||||
LOG.info(_LI('Closing tap interface {} ({})').format(
|
||||
self.tap.name,
|
||||
self.tap.fileno(),
|
||||
))
|
||||
self.tap.close()
|
||||
|
||||
def _packet_raw_data_to_hex(self, buf):
|
||||
return buf.encode('hex')
|
||||
|
||||
def send(self, buf):
|
||||
"""Send a packet out via the tap device.
|
||||
:param buf: Raw packet data to send
|
||||
:type buf: String (decoded)
|
||||
"""
|
||||
LOG.info(_LI('send: via {}: {}').format(
|
||||
self.tap.name,
|
||||
self._packet_raw_data_to_hex(buf)))
|
||||
if self.is_blocking:
|
||||
return self.tap.write(buf)
|
||||
else:
|
||||
fd = self.tap.fileno()
|
||||
return os.write(fd, buf)
|
||||
|
||||
def read(self):
|
||||
"""Read data from the tap device. This method may block if no data is
|
||||
ready (i.e. no packet in buffer).
|
||||
Return the read buffer, which is a String (encoded).
|
||||
"""
|
||||
if self.is_blocking:
|
||||
buf = self.tap.read(self.tap.mtu)
|
||||
else:
|
||||
fd = self.tap.fileno()
|
||||
buf = os.read(fd, self.tap.mtu)
|
||||
LOG.info(_LI('receive: via {}: {}').format(
|
||||
self.tap.name,
|
||||
self._packet_raw_data_to_hex(buf)))
|
||||
return buf
|
||||
|
||||
def set_blocking(self, is_blocking):
|
||||
"""Set the device to be blocking or non-blocking.
|
||||
:param is_blocking: Set the blocking state to is_blocking
|
||||
:type is_blocking: Boolean
|
||||
"""
|
||||
tap = self.tap
|
||||
fd = tap.fileno()
|
||||
flags = fcntl.fcntl(fd, fcntl.F_GETFL)
|
||||
if not is_blocking:
|
||||
flags |= os.O_NONBLOCK
|
||||
else:
|
||||
flags &= ~os.O_NONBLOCK
|
||||
fcntl.fcntl(fd, fcntl.F_SETFL, flags)
|
||||
self.is_blocking = is_blocking
|
||||
|
||||
|
||||
class Router(object):
|
||||
"""Represent a router in the topology."""
|
||||
def __init__(self, topology, router_id, subnet_ids):
|
||||
"""Create a router in the topology. Add router interfaces for each
|
||||
subnet.
|
||||
:param topology: The topology to which the router belongs
|
||||
:type topology: Topology
|
||||
:param router_id: The ID of the router. Created in Topology.
|
||||
:type router_id: Number (opaque)
|
||||
:param subnet_ids: List of subnets to which the router is connected
|
||||
:type subnet_ids: List
|
||||
"""
|
||||
self.topology = topology
|
||||
self.router_id = router_id
|
||||
self.subnet_ids = subnet_ids
|
||||
self.router = objects.RouterTestObj(
|
||||
self.topology.neutron,
|
||||
self.topology.nb_api,
|
||||
)
|
||||
self.router.create(router={
|
||||
'admin_state_up': True
|
||||
})
|
||||
for subnet_id in self.subnet_ids:
|
||||
subnet = self.topology.subnets[subnet_id]
|
||||
subnet_uuid = subnet.subnet.subnet_id
|
||||
self.router.add_interface(subnet_id=subnet_uuid)
|
||||
|
||||
def delete(self):
|
||||
"""Delete this router."""
|
||||
self.router.close()
|
||||
|
||||
|
||||
class Policy(object):
|
||||
"""Represent a policy, i.e. the expected packets on each port in the
|
||||
topology, and the actions to take in each case.
|
||||
"""
|
||||
def __init__(self, initial_actions, port_policies, unknown_port_action):
|
||||
"""Create a policy.
|
||||
:param initial_actions: Take these actions when policy is started
|
||||
:type initial_actions: List of Action
|
||||
:param port_policies: The policy for each port in the topology
|
||||
:type port_policies: dict (subnet_id, port_id) -> PortPolicy
|
||||
:param unknown_port_action: Take this action for packets on ports not
|
||||
in port_policies
|
||||
:type unknown_port_action: Action
|
||||
"""
|
||||
self.initial_actions = initial_actions
|
||||
self.port_policies = port_policies
|
||||
self.unknown_port_action = unknown_port_action
|
||||
self.threads = []
|
||||
self.topology = None # Set on start
|
||||
self.exceptions = collections.deque()
|
||||
|
||||
def handle_packet(self, port_thread, buf):
|
||||
"""Event handler for a packet received on a port. Test the received
|
||||
packet against the policy.
|
||||
:param port_thread: Receiving port
|
||||
:type port_thread: PortThread
|
||||
:param buf: Packet data
|
||||
:type buf: String (encoded)
|
||||
"""
|
||||
port = port_thread.port
|
||||
port_id = port.port_id
|
||||
subnet = port.subnet
|
||||
subnet_id = subnet.subnet_id
|
||||
try:
|
||||
port_policy = self.port_policies[(subnet_id, port_id)]
|
||||
try:
|
||||
port_policy.handle_packet(self, port_thread, buf)
|
||||
except Exception as e:
|
||||
self.add_exception(e)
|
||||
except KeyError:
|
||||
try:
|
||||
self.unknown_port_action(self, None, port_thread, buf)
|
||||
except Exception as e:
|
||||
self.add_exception(e)
|
||||
|
||||
def start(self, topology):
|
||||
"""Start the policy on the given topology. Start threads listening on
|
||||
the ports. Execute the initial actions.
|
||||
:param topology: The topology on which to run the policy
|
||||
:type topology: Topology
|
||||
"""
|
||||
if self.topology:
|
||||
raise Exception('Policy already started')
|
||||
self.topology = topology
|
||||
# Start a thread for each port, listening on the LogicalPortTap
|
||||
for subnet in topology.subnets:
|
||||
for port in subnet.ports:
|
||||
thread = PortThread(self.handle_packet, port)
|
||||
thread.start()
|
||||
self.threads.append(thread)
|
||||
# Call the initial_actions
|
||||
for action in self.initial_actions:
|
||||
action(self, None, None, None)
|
||||
|
||||
def wait(self, timeout=None):
|
||||
"""Wait for all the threads listening on devices to finish. Threads are
|
||||
generally stopped via actions, and this command waits for the
|
||||
simulation to end.
|
||||
:param timeout: After this many seconds, throw an exception
|
||||
:type timeout: Number
|
||||
"""
|
||||
if timeout is not None:
|
||||
entry_time = time.time()
|
||||
for thread in self.threads:
|
||||
thread.wait(timeout)
|
||||
if timeout is not None:
|
||||
timeout -= time.time() - entry_time
|
||||
if timeout <= 0:
|
||||
raise Exception('Timeout')
|
||||
|
||||
def stop(self):
|
||||
"""Stop all threads. Prepare for a new simulation."""
|
||||
for thread in self.threads:
|
||||
thread.stop()
|
||||
self.topology = None
|
||||
|
||||
def close(self):
|
||||
if self.topology:
|
||||
self.stop()
|
||||
|
||||
def add_exception(self, exception):
|
||||
"""Exception handler. Record this exception to be read later by the
|
||||
caller
|
||||
:param exception: The exception to record
|
||||
:type exception: Exception
|
||||
"""
|
||||
|
||||
self.exceptions.append(exception)
|
||||
self.stop()
|
||||
|
||||
|
||||
class PortPolicy(object):
|
||||
"""A policy for a specific port. The rules to apply for an incoming packet,
|
||||
and the relevant actions to take
|
||||
"""
|
||||
def __init__(self, rules, default_action):
|
||||
"""Create a policy for a port.
|
||||
:param rules: The rules against which to test incoming packets
|
||||
:type rules: List of PortPolicyRule
|
||||
:param default_action: The action to take for a packet not matching any
|
||||
rules.
|
||||
:type default_action: Action
|
||||
"""
|
||||
self.rules = rules
|
||||
self.default_action = default_action
|
||||
|
||||
def handle_packet(self, policy, port_thread, buf):
|
||||
"""Packet handler. Run the packet through the rules. Apply the relevant
|
||||
actions.
|
||||
:param port_thread: Receiving port
|
||||
:type port_thread: PortThread
|
||||
:param buf: Packet data
|
||||
:type buf: String (encoded)
|
||||
"""
|
||||
for rule in self.rules:
|
||||
if rule.apply_rule(policy, port_thread, buf):
|
||||
return
|
||||
self.default_action(policy, None, port_thread, buf)
|
||||
|
||||
|
||||
class PortPolicyRule(object):
|
||||
"""Represent a single policy rule. i.e. packet match parameters, and the
|
||||
actions to take if the packet matches.
|
||||
"""
|
||||
def __init__(self, packet_filter, actions):
|
||||
"""Create the rule.
|
||||
:param packet_filter: The packet match parametrer
|
||||
:type packet_filter: Filter
|
||||
:param actions: The actions to take if the packet matches
|
||||
:type actions: List of Action
|
||||
"""
|
||||
self.packet_filter = packet_filter
|
||||
self.actions = actions
|
||||
self.disabled = False
|
||||
|
||||
def match_packet(self, buf):
|
||||
"""Check if the given packet matches this rule
|
||||
:param buf: Raw packet data to send
|
||||
:type buf: String (decoded)
|
||||
"""
|
||||
return self.packet_filter(buf)
|
||||
|
||||
def apply_rule(self, policy, port_thread, buf):
|
||||
"""Check if the given packet matches this rule, and execute the
|
||||
relevant actions if it does.
|
||||
:param policy: The currently running policy
|
||||
:type policy: Policy
|
||||
:param port_thread: Receiving port
|
||||
:type port_thread: PortThread
|
||||
:param buf: Raw packet data to send
|
||||
:type buf: String (decoded)
|
||||
"""
|
||||
if self.disabled:
|
||||
return False
|
||||
if not self.match_packet(buf):
|
||||
return False
|
||||
for action in self.actions:
|
||||
action(policy, self, port_thread, buf)
|
||||
return True
|
||||
|
||||
|
||||
class Filter(object):
|
||||
"""Base class of packet filters, i.e. match parameters."""
|
||||
def __call__(self, buf):
|
||||
"""Test if the packet matches this filter. Return True if it does, and
|
||||
False otherwise.
|
||||
:param buf: Packet data
|
||||
:type buf: String (encoded)
|
||||
"""
|
||||
raise Exception('Filter not implemented')
|
||||
|
||||
|
||||
class ScapyIPv6Filter(object):
|
||||
"""Use scapy to parse the packet and test if it's IPv6."""
|
||||
def __call__(self, buf):
|
||||
pkt = scapy.Ether(buf)
|
||||
if pkt[0].type != 0x86dd: # IPv6 protocol
|
||||
return False
|
||||
return True
|
||||
|
||||
|
||||
class ScapyARPReplyFilter(object):
|
||||
"""Use scapy to parse the packet and test if it's an ARP reply."""
|
||||
def __call__(self, buf):
|
||||
pkt = scapy.Ether(buf)
|
||||
if pkt[0].type != 0x806: # ARP protocol
|
||||
return False
|
||||
if pkt[1].op != 2: # ARP reply
|
||||
return False
|
||||
return True
|
||||
|
||||
|
||||
class Action(object):
|
||||
"""Base class of actions to execute. Actions are executed on matched
|
||||
packets in policy rules (PortPolicyRule).
|
||||
"""
|
||||
def __call__(self, policy, rule, port_thread, buf):
|
||||
"""Execute this action.
|
||||
:param policy: The currently running policy
|
||||
:type policy: Policy
|
||||
:param rule: The rule on which this packet matched
|
||||
:type rule: PortPolicyRule
|
||||
:param port_thread: Receiving port
|
||||
:type port_thread: PortThread
|
||||
:param buf: Raw packet data to send
|
||||
:type buf: String (decoded)
|
||||
"""
|
||||
raise Exception('Action not implemented')
|
||||
|
||||
|
||||
class LogAction(Action):
|
||||
"""Action to log the received packet."""
|
||||
def __call__(self, policy, rule, port_thread, buf):
|
||||
pkt = scapy.Ether(buf)
|
||||
LOG.info(_LI('LogAction: Got packet: {}').format(pkt.summary()))
|
||||
|
||||
|
||||
class SendAction(Action):
|
||||
"""Action to send a packet, possibly as a response."""
|
||||
def __init__(self, subnet_id, port_id, packet):
|
||||
"""Create an action to send a packet.
|
||||
:param subnet_id: The subnet ID
|
||||
:type subnet_id: Number (opaque)
|
||||
:param port_id: The port ID. With subnet_id, represent a unique port
|
||||
in the topology, through which to send the packet.
|
||||
:type port_id: Number (opaque)
|
||||
:param packet: A method that constructs the response from the
|
||||
packet's raw data, or a string of a predefined packet.
|
||||
:type packet: (Lambda String -> String), or String (encoded).
|
||||
"""
|
||||
self.subnet_id = subnet_id
|
||||
self.port_id = port_id
|
||||
self.packet = packet
|
||||
|
||||
def __call__(self, policy, rule, port_thread, buf):
|
||||
interface_object = self._get_interface_object(policy.topology)
|
||||
packet = self.packet
|
||||
if not isinstance(packet, str):
|
||||
# TODO(oanson) pass more info to the packet generator
|
||||
packet = packet(buf)
|
||||
interface_object.send(packet)
|
||||
|
||||
def _get_interface_object(self, topology):
|
||||
subnet = topology.subnets[self.subnet_id]
|
||||
port = subnet.ports[self.port_id]
|
||||
return port.tap
|
||||
|
||||
|
||||
class RaiseAction(Action):
|
||||
"""Action to raise an exception."""
|
||||
def __init__(self, message):
|
||||
self.message = message
|
||||
|
||||
def __call__(self, policy, rule, port_thread, buf):
|
||||
pkt = scapy.Ether(buf)
|
||||
raise Exception("Packet raised exception: {}".format(pkt.summary()))
|
||||
|
||||
|
||||
class DisableRuleAction(Action):
|
||||
"""Action to disable the rule on which the packet matched."""
|
||||
def __call__(self, policy, rule, port_thread, buf):
|
||||
rule.disabled = True
|
||||
|
||||
|
||||
class StopThreadAction(Action):
|
||||
"""Action to disable the thread watching the port on which the packet was
|
||||
received.
|
||||
"""
|
||||
def __call__(self, policy, rule, port_thread, buf):
|
||||
port_thread.stop()
|
||||
|
||||
|
||||
class StopSimulationAction(Action):
|
||||
"""Action to stop the simulation (i.e. the policy)."""
|
||||
def __call__(self, policy, rule, port_thread, buf):
|
||||
policy.stop()
|
||||
|
||||
|
||||
class IgnoreAction(Action):
|
||||
"""A NOP action."""
|
||||
def __call__(self, policy, rule, port_thread, buf):
|
||||
pass
|
||||
|
||||
|
||||
class PortThread(object):
|
||||
"""A thread object watching the tap device."""
|
||||
def __init__(self, packet_handler, port):
|
||||
"""Create a thread to watch the tap device.
|
||||
:param port: The tap device to watch
|
||||
:type port: Port
|
||||
:param packet_handler: A method to handle a received packet
|
||||
:type packet_handler: Function(PortThread, String)
|
||||
"""
|
||||
self.packet_handler = packet_handler
|
||||
self.port = port
|
||||
self.daemon = DFDaemon(is_not_light=True)
|
||||
self.is_working = False
|
||||
self.thread_id = None
|
||||
|
||||
def start(self):
|
||||
self.is_working = True
|
||||
self.daemon.daemonize(self.run)
|
||||
|
||||
def stop(self):
|
||||
self.is_working = False
|
||||
if self.thread_id != threading.current_thread().ident:
|
||||
self.daemon.stop()
|
||||
|
||||
def wait(self, timeout=None):
|
||||
self.daemon.wait(timeout)
|
||||
|
||||
def run(self):
|
||||
"""Continuously read from the tap device, and send received data to the
|
||||
packet handler.
|
||||
"""
|
||||
self.thread_id = threading.current_thread().ident
|
||||
tap = self.port.tap
|
||||
tap.set_blocking(False)
|
||||
while self.is_working:
|
||||
try:
|
||||
buf = tap.read()
|
||||
self.packet_handler(self, buf)
|
||||
except Exception as e:
|
||||
LOG.info(_LI('Reading from {}/{} failed: {}').format(
|
||||
tap.tap.name,
|
||||
self.port.name,
|
||||
e))
|
||||
break
|
||||
try:
|
||||
tap.set_blocking(True)
|
||||
except Exception as e:
|
||||
pass # ignore - reset blocking as best effort only
|
||||
self.stop()
|
146
dragonflow/tests/fullstack/test_apps.py
Normal file
146
dragonflow/tests/fullstack/test_apps.py
Normal file
@ -0,0 +1,146 @@
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
import scapy.all as scapy
|
||||
import sys
|
||||
|
||||
import time
|
||||
|
||||
from dragonflow._i18n import _LI
|
||||
from dragonflow.tests.common import app_testing_objects
|
||||
from dragonflow.tests.fullstack import test_base
|
||||
|
||||
from neutron.agent.common import utils
|
||||
|
||||
from oslo_log import log
|
||||
|
||||
LOG = log.getLogger(__name__)
|
||||
|
||||
|
||||
class TestApps(test_base.DFTestBase):
|
||||
def test_infrastructure(self):
|
||||
try:
|
||||
topology = app_testing_objects.Topology(self.neutron, self.nb_api)
|
||||
subnet1 = topology.create_subnet(cidr='192.168.10.0/24')
|
||||
subnet2 = topology.create_subnet(cidr='192.168.11.0/24')
|
||||
port1 = subnet1.create_port()
|
||||
port2 = subnet2.create_port()
|
||||
topology.create_router([subnet1.subnet_id, subnet2.subnet_id])
|
||||
LOG.info(_LI('Port1 name: {}').format(port1.tap.tap.name))
|
||||
LOG.info(_LI('Port2 name: {}').format(port2.tap.tap.name))
|
||||
self._print_command(['ifconfig', '-a'])
|
||||
self._print_command(['ovs-vsctl', 'show'], True)
|
||||
self._print_command(['ovs-ofctl', 'show', 'br-int'], True)
|
||||
self._print_command(['ovs-ofctl', 'dump-flows', 'br-int'], True)
|
||||
self._print_command(['ovsdb-client', 'dump', 'Open_vSwitch'], True)
|
||||
except Exception as e:
|
||||
traceback = sys.exc_info()[2]
|
||||
try:
|
||||
topology.close()
|
||||
except Exception:
|
||||
pass # Ignore
|
||||
# Just calling raise may raise an exception from topology.close()
|
||||
raise e, None, traceback
|
||||
topology.close()
|
||||
|
||||
def _print_command(self, full_args, run_as_root=False):
|
||||
LOG.info(_LI('{}').format(utils.execute(
|
||||
full_args,
|
||||
run_as_root=run_as_root,
|
||||
process_input=None,
|
||||
)))
|
||||
|
||||
|
||||
class TestArpResponder(test_base.DFTestBase):
|
||||
|
||||
def setUp(self):
|
||||
super(TestArpResponder, self).setUp()
|
||||
self.topology = None
|
||||
self.policy = None
|
||||
try:
|
||||
self.topology = app_testing_objects.Topology(
|
||||
self.neutron,
|
||||
self.nb_api)
|
||||
subnet1 = self.topology.create_subnet(cidr='192.168.10.0/24')
|
||||
port1 = subnet1.create_port()
|
||||
port2 = subnet1.create_port()
|
||||
time.sleep(5) # We need to wait for the tap devices to set up
|
||||
# Create policy
|
||||
arp_packet = scapy.Ether(
|
||||
src=port1.port.get_logical_port().get_mac(),
|
||||
dst="ff:ff:ff:ff:ff:ff",
|
||||
) / scapy.ARP(
|
||||
pdst=port2.port.get_logical_port().get_ip(),
|
||||
)
|
||||
send_arp_request = app_testing_objects.SendAction(
|
||||
subnet1.subnet_id,
|
||||
port1.port_id,
|
||||
str(arp_packet),
|
||||
)
|
||||
ignore_action = app_testing_objects.IgnoreAction()
|
||||
log_action = app_testing_objects.LogAction()
|
||||
key1 = (subnet1.subnet_id, port1.port_id)
|
||||
port_policies = {
|
||||
key1: app_testing_objects.PortPolicy(
|
||||
rules=[
|
||||
app_testing_objects.PortPolicyRule(
|
||||
# Detect arp replies
|
||||
app_testing_objects.ScapyARPReplyFilter(),
|
||||
actions=[
|
||||
log_action,
|
||||
app_testing_objects.StopSimulationAction()
|
||||
]
|
||||
),
|
||||
app_testing_objects.PortPolicyRule(
|
||||
# Ignore IPv6 packets
|
||||
app_testing_objects.ScapyIPv6Filter(),
|
||||
actions=[
|
||||
ignore_action
|
||||
]
|
||||
),
|
||||
],
|
||||
default_action=app_testing_objects.RaiseAction(
|
||||
"Unexpected packet"
|
||||
)
|
||||
),
|
||||
}
|
||||
self.policy = app_testing_objects.Policy(
|
||||
initial_actions=[send_arp_request],
|
||||
port_policies=port_policies,
|
||||
unknown_port_action=ignore_action
|
||||
)
|
||||
except Exception:
|
||||
if self.topology:
|
||||
self.topology.close()
|
||||
raise
|
||||
self.store(self.topology)
|
||||
self.store(self.policy)
|
||||
|
||||
def tearDown(self):
|
||||
super(TestArpResponder, self).tearDown()
|
||||
self.policy.close()
|
||||
self.topology.close()
|
||||
|
||||
def test_simple_response(self):
|
||||
"""
|
||||
2 ports on 1 subnet. 1 port asks for MAC of other.
|
||||
Policy:
|
||||
port1:
|
||||
Send ARP request
|
||||
Receive ARP response
|
||||
port2:
|
||||
Do nothing
|
||||
"""
|
||||
self.policy.start(self.topology)
|
||||
self.policy.wait(30)
|
||||
if len(self.policy.exceptions) > 0:
|
||||
raise self.policy.exceptions[0]
|
@ -41,4 +41,6 @@ fi
|
||||
|
||||
pip install -U $*
|
||||
pip install python-etcd
|
||||
pip install python-pytun
|
||||
pip install scapy
|
||||
exit $?
|
||||
|
Loading…
Reference in New Issue
Block a user