2 # SPDX-License-Identifier: ISC
6 # Part of NetDEF Topology Tests
8 # Copyright (c) 2020 by Volta Networks
12 test_bgp_auth.py: Test BGP Md5 Authentication
16 | +------| R1 |------+ |
22 | R2 |------------| R3 |
27 setup is 3 routers with 3 links between each each link in a different vrf
28 Default, blue and red respectively
29 Tests check various fiddling with passwords and checking that the peer
30 establishment is as expected and passwords are not leaked across sockets
33 # pylint: disable=C0413
39 from time
import sleep
42 from lib
import common_config
, topotest
43 from lib
.common_config
import (
44 save_initial_config_on_routers
,
45 reset_with_new_configs
,
48 from bgp_auth_common
import (
49 check_all_peers_established
,
50 check_vrf_peer_remove_passwords
,
51 check_vrf_peer_change_passwords
,
53 from lib
.topogen
import Topogen
, TopoRouter
, get_topogen
55 pytestmark
= [pytest
.mark
.bgpd
, pytest
.mark
.ospfd
]
57 CWD
= os
.path
.dirname(os
.path
.realpath(__file__
))
65 tgen
.add_link(tgen
.gears
["R1"], tgen
.gears
["R2"])
66 tgen
.add_link(tgen
.gears
["R1"], tgen
.gears
["R3"])
67 tgen
.add_link(tgen
.gears
["R2"], tgen
.gears
["R3"])
68 tgen
.add_link(tgen
.gears
["R1"], tgen
.gears
["R2"])
69 tgen
.add_link(tgen
.gears
["R1"], tgen
.gears
["R3"])
70 tgen
.add_link(tgen
.gears
["R2"], tgen
.gears
["R3"])
71 tgen
.add_link(tgen
.gears
["R1"], tgen
.gears
["R2"])
72 tgen
.add_link(tgen
.gears
["R1"], tgen
.gears
["R3"])
73 tgen
.add_link(tgen
.gears
["R2"], tgen
.gears
["R3"])
76 def setup_module(mod
):
77 "Sets up the pytest environment"
78 # This function initiates the topology build with Topogen...
79 tgen
= Topogen(build_topo
, mod
.__name
__)
80 # ... and here it calls Mininet initialization functions.
88 r1
.cmd_raises("ip link add blue type vrf table 1001")
89 r1
.cmd_raises("ip link set up dev blue")
90 r2
.cmd_raises("ip link add blue type vrf table 1001")
91 r2
.cmd_raises("ip link set up dev blue")
92 r3
.cmd_raises("ip link add blue type vrf table 1001")
93 r3
.cmd_raises("ip link set up dev blue")
95 r1
.cmd_raises("ip link add lo1 type dummy")
96 r1
.cmd_raises("ip link set lo1 master blue")
97 r1
.cmd_raises("ip link set up dev lo1")
98 r2
.cmd_raises("ip link add lo1 type dummy")
99 r2
.cmd_raises("ip link set up dev lo1")
100 r2
.cmd_raises("ip link set lo1 master blue")
101 r3
.cmd_raises("ip link add lo1 type dummy")
102 r3
.cmd_raises("ip link set up dev lo1")
103 r3
.cmd_raises("ip link set lo1 master blue")
105 r1
.cmd_raises("ip link set R1-eth2 master blue")
106 r1
.cmd_raises("ip link set R1-eth3 master blue")
107 r2
.cmd_raises("ip link set R2-eth2 master blue")
108 r2
.cmd_raises("ip link set R2-eth3 master blue")
109 r3
.cmd_raises("ip link set R3-eth2 master blue")
110 r3
.cmd_raises("ip link set R3-eth3 master blue")
112 r1
.cmd_raises("ip link set up dev R1-eth2")
113 r1
.cmd_raises("ip link set up dev R1-eth3")
114 r2
.cmd_raises("ip link set up dev R2-eth2")
115 r2
.cmd_raises("ip link set up dev R2-eth3")
116 r3
.cmd_raises("ip link set up dev R3-eth2")
117 r3
.cmd_raises("ip link set up dev R3-eth3")
120 r1
.cmd_raises("ip link add red type vrf table 1002")
121 r1
.cmd_raises("ip link set up dev red")
122 r2
.cmd_raises("ip link add red type vrf table 1002")
123 r2
.cmd_raises("ip link set up dev red")
124 r3
.cmd_raises("ip link add red type vrf table 1002")
125 r3
.cmd_raises("ip link set up dev red")
127 r1
.cmd_raises("ip link add lo2 type dummy")
128 r1
.cmd_raises("ip link set lo2 master red")
129 r1
.cmd_raises("ip link set up dev lo2")
130 r2
.cmd_raises("ip link add lo2 type dummy")
131 r2
.cmd_raises("ip link set up dev lo2")
132 r2
.cmd_raises("ip link set lo2 master red")
133 r3
.cmd_raises("ip link add lo2 type dummy")
134 r3
.cmd_raises("ip link set up dev lo2")
135 r3
.cmd_raises("ip link set lo2 master red")
137 r1
.cmd_raises("ip link set R1-eth4 master red")
138 r1
.cmd_raises("ip link set R1-eth5 master red")
139 r2
.cmd_raises("ip link set R2-eth4 master red")
140 r2
.cmd_raises("ip link set R2-eth5 master red")
141 r3
.cmd_raises("ip link set R3-eth4 master red")
142 r3
.cmd_raises("ip link set R3-eth5 master red")
144 r1
.cmd_raises("ip link set up dev R1-eth4")
145 r1
.cmd_raises("ip link set up dev R1-eth5")
146 r2
.cmd_raises("ip link set up dev R2-eth4")
147 r2
.cmd_raises("ip link set up dev R2-eth5")
148 r3
.cmd_raises("ip link set up dev R3-eth4")
149 r3
.cmd_raises("ip link set up dev R3-eth5")
151 r1
.cmd_raises("sysctl -w net.ipv4.tcp_l3mdev_accept=1")
152 r2
.cmd_raises("sysctl -w net.ipv4.tcp_l3mdev_accept=1")
153 r3
.cmd_raises("sysctl -w net.ipv4.tcp_l3mdev_accept=1")
155 # This is a sample of configuration loading.
156 router_list
= tgen
.routers()
158 # For all registered routers, load the zebra configuration file
159 for rname
, router
in router_list
.items():
160 router
.load_config(TopoRouter
.RD_ZEBRA
, "zebra.conf")
161 router
.load_config(TopoRouter
.RD_OSPF
)
162 router
.load_config(TopoRouter
.RD_BGP
)
164 # After copying the configurations, this function loads configured daemons.
167 # Save the initial router config. reset_config_on_routers will return to this config.
168 save_initial_config_on_routers(tgen
)
171 def teardown_module(mod
):
172 "Teardown the pytest environment"
175 # This function tears down the whole topology.
179 def test_default_peer_established(tgen
):
180 "default vrf 3 peers same password"
182 reset_with_new_configs(tgen
, "bgpd.conf", "ospfd.conf")
183 check_all_peers_established()
186 def test_default_peer_remove_passwords(tgen
):
187 "selectively remove passwords checking state"
189 reset_with_new_configs(tgen
, "bgpd.conf", "ospfd.conf")
190 check_vrf_peer_remove_passwords()
193 def test_default_peer_change_passwords(tgen
):
194 "selectively change passwords checking state"
196 reset_with_new_configs(tgen
, "bgpd.conf", "ospfd.conf")
197 check_vrf_peer_change_passwords()
200 def test_default_prefix_peer_established(tgen
):
201 "default vrf 3 peers same password with prefix config"
203 # only supported in kernel > 5.3
204 if topotest
.version_cmp(platform
.release(), "5.3") < 0:
207 reset_with_new_configs(tgen
, "bgpd_prefix.conf", "ospfd.conf")
208 check_all_peers_established()
211 def test_prefix_peer_remove_passwords(tgen
):
212 "selectively remove passwords checking state with prefix config"
214 # only supported in kernel > 5.3
215 if topotest
.version_cmp(platform
.release(), "5.3") < 0:
218 reset_with_new_configs(tgen
, "bgpd_prefix.conf", "ospfd.conf")
219 check_vrf_peer_remove_passwords(prefix
="yes")
222 def test_memory_leak(tgen
):
223 "Run the memory leak test and report results."
224 if not tgen
.is_memleak_enabled():
225 pytest
.skip("Memory leak test/report is disabled")
227 tgen
.report_memory_leaks()
230 if __name__
== "__main__":
231 args
= ["-s"] + sys
.argv
[1:]
232 sys
.exit(pytest
.main(args
))