blob: 389a077721ff002762a9f62da95dd956bdcaddea [file] [log] [blame]
#!/usr/bin/env python
"""
Created on 26-Oct-2012
author:: Anil Kumar ( anilkumar.s@paxterrasolutions.com )
TestON is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 2 of the License, or
( at your option ) any later version.
TestON is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with TestON. If not, see <http://www.gnu.org/licenses/>.
MininetCliDriver is the basic driver which will handle the Mininet functions
"""
import traceback
import pexpect
import re
import sys
sys.path.append( "../" )
from drivers.common.cli.emulatordriver import Emulator
class RemoteMininetDriver( Emulator ):
"""
RemoteMininetCliDriver is the basic driver which will handle the Mininet
functions. The main different between this and the MininetCliDriver is that
this one does not build the mininet. It assumes that there is already a
mininet running on the target.
"""
def __init__( self ):
super( Emulator, self ).__init__()
self.handle = self
self.wrapped = sys.modules[ __name__ ]
self.flag = 0
def connect( self, **connectargs ):
""",user_name, ip_address, pwd,options ):
Here the main is the TestON instance after creating all the log
handles."""
for key in connectargs:
vars( self )[ key ] = connectargs[ key ]
self.name = self.options[ 'name' ]
self.handle = super(
RemoteMininetDriver,
self ).connect(
user_name=self.user_name,
ip_address=self.ip_address,
port=None,
pwd=self.pwd )
self.sshHandle = self.handle
# Copying the readme file to process the
if self.handle:
return main.TRUE
else:
main.log.error(
"Connection failed to the host " +
self.user_name +
"@" +
self.ip_address )
main.log.error( "Failed to connect to the Mininet" )
return main.FALSE
def checkForLoss( self, pingList ):
"""
Returns main.FALSE for 0% packet loss and
Returns main.ERROR if "found multiple mininet" is found and
Returns main.TRUE else
"""
self.handle.sendline( "" )
self.handle.expect( "\$" )
self.handle.sendline( "" )
self.handle.expect( "\$" )
self.handle.sendline( "cat " + pingList )
self.handle.expect( pingList )
self.handle.expect( "\$" )
outputs = self.handle.before + self.handle.after
if re.search( " 0% packet loss", outputs ):
return main.FALSE
elif re.search( "found multiple mininet", outputs ):
return main.ERROR
else:
main.log.error( "Error, unexpected output in the ping file" )
main.log.warn( outputs )
return main.TRUE
def pingLong( self, **pingParams ):
"""
Starts a continuous ping on the mininet host outputing
to a file in the /tmp dir.
"""
self.handle.sendline( "" )
self.handle.expect( "\$" )
args = utilities.parse_args(
[ "SRC", "TARGET", "PINGTIME" ], **pingParams )
precmd = "sudo rm /tmp/ping." + args[ "SRC" ]
self.execute( cmd=precmd, prompt="(.*)", timeout=10 )
command = "sudo mininet/util/m " + args[ "SRC" ] + " ping " +\
args[ "TARGET" ] + " -i .2 -w " + str( args[ 'PINGTIME' ] ) +\
" -D > /tmp/ping." + args[ "SRC" ] + " &"
main.log.info( command )
self.execute( cmd=command, prompt="(.*)", timeout=10 )
self.handle.sendline( "" )
self.handle.expect( "\$" )
return main.TRUE
def pingstatus( self, **pingParams ):
"""
Tails the respective ping output file and check that
there is a moving "64 bytes"
"""
self.handle.sendline( "" )
self.handle.expect( "\$" )
args = utilities.parse_args( [ "SRC" ], **pingParams )
self.handle.sendline( "tail /tmp/ping." + args[ "SRC" ] )
self.handle.expect( "tail" )
self.handle.expect( "\$" )
result = self.handle.before + self.handle.after
self.handle.sendline( "" )
self.handle.expect( "\$" )
if re.search( 'Unreachable', result ):
main.log.info( "Unreachable found in ping logs..." )
return main.FALSE
elif re.search( '64\sbytes', result ):
main.log.info( "Pings look good" )
return main.TRUE
else:
main.log.info( "No, or faulty ping data..." )
return main.FALSE
def pingKill( self, testONUser, testONIP ):
"""
Kills all continuous ping processes.
Then copies all the ping files to the TestStation.
"""
self.handle.sendline( "" )
self.handle.expect( "\$" )
command = "sudo kill -SIGINT `pgrep ping`"
main.log.info( command )
self.execute( cmd=command, prompt="(.*)", timeout=10 )
main.log.info( "Transferring ping files to TestStation" )
command = "scp /tmp/ping.* " + \
str( testONUser ) + "@" + str( testONIP ) + ":/tmp/"
self.execute( cmd=command, prompt="100%", timeout=20 )
# Make sure the output is cleared
self.handle.sendline( "" )
self.handle.expect( "\$" )
self.handle.sendline( "" )
self.handle.expect( "\$" )
self.handle.sendline( "" )
i = self.handle.expect( [ "password", "\$" ] )
if i == 0:
main.log.error( "Error, sudo asking for password" )
main.log.error( self.handle.before )
return main.FALSE
else:
return main.TRUE
def pingLongKill( self ):
self.handle.sendline( "" )
self.handle.expect( "\$" )
command = "sudo kill -SIGING `pgrep ping`"
main.log.info( command )
self.execute( cmd=command, prompt="(.*)", timeout=10 )
self.handle.sendline( "" )
self.handle.expect( "\$" )
return main.TRUE
def pingHostOptical( self, **pingParams ):
"""
This function is only for Packey Optical related ping
Use the next pingHost() function for all normal scenarios )
Ping from one mininet host to another
Currently the only supported Params: SRC and TARGET
"""
args = utilities.parse_args( [ "SRC", "TARGET" ], **pingParams )
command = args[ "SRC" ] + " ping " + \
args[ "TARGET" ] + " -c 1 -i 1 -W 8"
try:
main.log.warn( "Sending: " + command )
self.handle.sendline( command )
i = self.handle.expect( [ command, pexpect.TIMEOUT ] )
if i == 1:
main.log.error(
self.name +
": timeout when waiting for response from mininet" )
main.log.error( "response: " + str( self.handle.before ) )
i = self.handle.expect( [ "mininet>", pexpect.TIMEOUT ] )
if i == 1:
main.log.error(
self.name +
": timeout when waiting for response from mininet" )
main.log.error( "response: " + str( self.handle.before ) )
response = self.handle.before
except pexpect.EOF:
main.log.error( self.name + ": EOF exception found" )
main.log.error( self.name + ": " + self.handle.before )
main.cleanup()
main.exit()
main.log.info( self.name + ": Ping Response: " + response )
if re.search( ',\s0\%\spacket\sloss', response ):
main.log.info( self.name + ": no packets lost, host is reachable" )
main.lastResult = main.TRUE
return main.TRUE
else:
main.log.error(
self.name +
": PACKET LOST, HOST IS NOT REACHABLE" )
main.lastResult = main.FALSE
return main.FALSE
def pingHost( self, **pingParams ):
"""
Pings between two hosts on remote mininet
"""
self.handle.sendline( "" )
self.handle.expect( "\$" )
args = utilities.parse_args( [ "SRC", "TARGET" ], **pingParams )
command = "mininet/util/m " + \
args[ "SRC" ] + " ping " + args[ "TARGET" ] + " -c 4 -W 1 -i .2"
main.log.info( command )
response = self.execute( cmd=command, prompt="rtt", timeout=10 )
if utilities.assert_matches(
expect=',\s0\%\spacket\sloss',
actual=response,
onpass="No Packet loss",
onfail="Host is not reachable" ):
main.log.info( "NO PACKET LOSS, HOST IS REACHABLE" )
main.lastResult = main.TRUE
return main.TRUE
else:
main.log.error( "PACKET LOST, HOST IS NOT REACHABLE" )
main.lastResult = main.FALSE
return main.FALSE
def checknum( self, num ):
"""
Verifies the correct number of switches are running
"""
if self.handle:
self.handle.sendline( "" )
self.handle.expect( "\$" )
self.handle.sendline( 'ifconfig -a | grep "sw.. " | wc -l' )
self.handle.expect( "wc" )
self.handle.expect( "\$" )
response = self.handle.before
self.handle.sendline(
'ps -ef | grep "bash -ms mininet:sw" | grep -v color | wc -l' )
self.handle.expect( "color" )
self.handle.expect( "\$" )
response2 = self.handle.before
if re.search( num, response ):
if re.search( num, response2 ):
return main.TRUE
else:
return main.FALSE
else:
return main.FALSE
else:
main.log.error( "Connection failed to the host" )
def startTcpdump(
self,
filename,
intf="eth0",
port="port 6633",
user="admin" ):
"""
Runs tpdump on an intferface and saves the file
intf can be specified, or the default eth0 is used
"""
try:
self.handle.sendline( "" )
self.handle.sendline(
"sudo tcpdump -n -i " +
intf +
" " +
port +
" -w " +
filename.strip() +
" -Z " +
user +
" &" )
self.handle.sendline( "" )
self.handle.sendline( "" )
i = self.handle.expect( [ 'No\ssuch\device', 'listening\son',
pexpect.TIMEOUT, "\$" ], timeout=10 )
main.log.warn( self.handle.before + self.handle.after )
if i == 0:
main.log.error( self.name + ": tcpdump - No such device exists.\
tcpdump attempted on: " + intf )
return main.FALSE
elif i == 1:
main.log.info( self.name + ": tcpdump started on " + intf )
return main.TRUE
elif i == 2:
main.log.error( self.name + ": tcpdump command timed out!\
Check interface name, given interface was: " + intf )
return main.FALSE
elif i == 3:
main.log.info( self.name + ": " + self.handle.before )
return main.TRUE
else:
main.log.error( self.name + ": tcpdump - unexpected response" )
return main.FALSE
except pexpect.EOF:
main.log.error( self.name + ": EOF exception found" )
main.log.error( self.name + ": " + self.handle.before )
main.cleanup()
main.exit()
except:
main.log.info(
self.name + ":" * 60 )
main.log.error( traceback.print_exc() )
main.log.info( ":" * 80 )
main.cleanup()
main.exit()
def stopTcpdump( self ):
"pkills tcpdump"
try:
self.handle.sendline( "sudo pkill tcpdump" )
self.handle.sendline( "" )
self.handle.expect( "\$" )
except pexpect.EOF:
main.log.error( self.name + ": EOF exception found" )
main.log.error( self.name + ": " + self.handle.before )
main.cleanup()
main.exit()
except:
main.log.info(
self.name + ":" * 60 )
main.log.error( traceback.print_exc() )
main.log.info( ":" * 80 )
main.cleanup()
main.exit()
def runOpticalMnScript( self ):
"""
This function is only meant for Packet Optical.
It runs the python script "optical.py" to create the
packet layer( mn ) topology
"""
try:
self.handle.sendline( "" )
self.handle.expect( "\$" )
self.handle.sendline( "cd ~" )
self.handle.expect( "\$" )
self.handle.sendline( "sudo python optical.py" )
self.handle.expect( ">" )
return main.TRUE
except pexpect.EOF:
main.log.error( self.name + ": EOF exception found" )
main.log.error( self.name + ": " + self.handle.before )
return main.FALSE
def disconnect( self ):
"""
Called at the end of the test to disconnect the handle.
"""
if self.handle:
# Close the ssh connection
self.handle.sendline( "" )
self.handle.expect( "\$" )
self.handle.sendline( "exit" )
self.handle.expect( "closed" )
else:
main.log.error( "Connection failed to the host" )
return main.TRUE
def getFlowTable( self, protoVersion, sw ):
"""
TODO document usage
TODO add option to look at cookies. ignoreing them for now
print "get_flowTable(" + str( protoVersion ) +" " + str( sw ) +")"
NOTE: Use format to force consistent flow table output across
versions"""
self.handle.sendline( "cd" )
self.handle.expect( [ "\$", pexpect.EOF, pexpect.TIMEOUT ] )
if protoVersion == 1.0:
command = "sudo ovs-ofctl dump-flows " + sw + \
" -F OpenFlow10-table_id | awk '{OFS=\",\" ; print $1 $3 $6 \
$7 $8}' | cut -d ',' -f 2- | sort -n -k1 -r"
self.handle.sendline( command )
self.handle.expect( [ "k1 -r", pexpect.EOF, pexpect.TIMEOUT ] )
self.handle.expect(
[ "OFPST_FLOW", pexpect.EOF, pexpect.TIMEOUT ] )
response = self.handle.before
# print "response=", response
return response
elif protoVersion == 1.3:
command = "sudo ovs-ofctl dump-flows " + sw + \
" -O OpenFlow13 | awk '{OFS=\",\" ; print $1 $3 $6 $7}'\
| cut -d ',' -f 2- | sort -n -k1 -r"
self.handle.sendline( command )
self.handle.expect( [ "k1 -r", pexpect.EOF, pexpect.TIMEOUT ] )
self.handle.expect(
[ "OFPST_FLOW", pexpect.EOF, pexpect.TIMEOUT ] )
response = self.handle.before
# print "response=", response
return response
else:
main.log.error(
"Unknown protoVersion in get_flowTable(). given: (" +
str(
type( protoVersion ) ) +
") '" +
str( protoVersion ) +
"'" )
def flowComp( self, flow1, flow2 ):
if flow1 == flow2:
return main.TRUE
else:
main.log.info( "Flow tables do not match, printing tables:" )
main.log.info( "Flow Table 1:" )
main.log.info( flow1 )
main.log.info( "Flow Table 2:" )
main.log.info( flow2 )
return main.FALSE
def setIpTablesOUTPUT( self, dstIp, dstPort, action='add',
packetType='tcp', rule='DROP' ):
"""
Description:
add or remove iptables rule to DROP ( default )
packets from specific IP and PORT
Usage:
* specify action ( 'add' or 'remove' )
when removing, pass in the same argument as you would add. It will
delete that specific rule.
* specify the destination ip to block with dstIp
* specify destination port to block to dstPort
* optional packet type to block ( default tcp )
* optional iptables rule ( default DROP )
WARNING:
* This function uses root privilege iptables command which may result
in unwanted network errors. USE WITH CAUTION
"""
import re
import time
# NOTE*********
# The strict checking methods of this driver function is intentional
# to discourage any misuse or error of iptables, which can cause
# severe network errors
# *************
# NOTE: Sleep needed to give some time
# for rule to be added and registered
# to the instance
time.sleep( 5 )
actionType = action.lower()
if actionType != 'add' and actionType != 'remove':
main.log.error(
"Invalid action type. 'add' or 'remove' table rule" )
if rule != 'DROP' and rule != 'ACCEPT' and rule != 'LOG':
# NOTE: Currently only supports rules DROP, ACCEPT, and LOG
main.log.error(
"Invalid rule. 'DROP' or 'ACCEPT' or 'LOG' only." )
return
return
else:
# If there is no existing rule in the iptables, we will see an
# 'iptables:'... message. We expect to see this message.
# Otherwise, if there IS an existing rule, we will get the prompt
# back, hence why we expect $ for remove type. We want to remove
# an already existing rule
if actionType == 'add':
# NOTE: "iptables:" expect is a result of
# return from the command
# iptables -C ...
# Any changes by the iptables command return string
# will result in failure of the function. ( deemed unlikely
# at the time of writing this function )
# Check for existing rules on current input
self.handle.sendline( "" )
self.handle.expect( "\$" )
self.handle.sendline(
"sudo iptables -C OUTPUT -p " +
str( packetType ) +
" -d " +
str( dstIp ) +
" --dport " +
str( dstPort ) +
" -j " +
str( rule ) )
i = self.handle.expect( [ "iptables:", "\$" ] )
print i
print self.handle.before
print "after: "
print self.handle.after
elif actionType == 'remove':
# Check for existing rules on current input
self.handle.sendline( "" )
self.handle.expect( "\$" )
self.handle.sendline(
"sudo iptables -C OUTPUT -p " +
str( packetType ) +
" -d " +
str( dstIp ) +
" --dport " +
str( dstPort ) +
" -j " +
str( rule ) )
self.handle.expect( "\$" )
print "before: "
print self.handle.before
actualString = self.handle.after
expectString = "iptables:"
print "Actual String:"
print actualString
if re.search( expectString, actualString ):
matchResult = main.TRUE
else:
matchResult = main.FALSE
# If matchResult is main.TRUE, it means there is no matching rule.
# If tables does not exist and expected prompt is returned,
# go ahead and add iptables rule
if matchResult == main.TRUE:
# Ensure action type is add
if actionType == 'add':
# -A is the 'append' action of iptables
actionAdd = '-A'
try:
self.handle.sendline( "" )
self.handle.sendline(
"sudo iptables " +
actionAdd +
" OUTPUT -p " +
str( packetType ) +
" -d " +
str( dstIp ) +
" --dport " +
str( dstPort ) +
" -j " +
str( rule ) )
infoString = "Rules added to " + str( self.name )
infoString += "iptable rule added to block IP: " + \
str( dstIp )
infoString += "Port: " + \
str( dstPort ) + " Rule: " + str( rule )
main.log.info( infoString )
self.handle.expect(
[ "\$", pexpect.EOF, pexpect.TIMEOUT ] )
except pexpect.TIMEOUT:
main.log.error(
self.name +
": Timeout exception in setIpTables function" )
except:
main.log.error( traceback.print_exc() )
main.cleanup()
main.exit()
else:
main.log.error(
"Given rule already exists, but attempted to add it" )
# If matchResult is 0, it means there IS a matching rule provided
elif matchResult == main.FALSE:
# Ensure action type is remove
if actionType == 'remove':
# -D is the 'delete' rule of iptables
actionRemove = '-D'
try:
self.handle.sendline( "" )
# Delete a specific rule specified into the function
self.handle.sendline(
"sudo iptables " +
actionRemove +
" OUTPUT -p " +
str( packetType ) +
" -d " +
str( dstIp ) +
" --dport " +
str( dstPort ) +
" -j " +
str( rule ) )
infoString = "Rules removed from " + str( self.name )
infoString += " iptables rule removed \
from blocking IP: " + \
str( dstIp )
infoString += " Port: " + \
str( dstPort ) + " Rule: " + str( rule )
main.log.info( infoString )
self.handle.expect(
[ "\$", pexpect.EOF, pexpect.TIMEOUT ] )
except pexpect.TIMEOUT:
main.log.error(
self.name +
": Timeout exception in setIpTables function" )
except:
main.log.error( traceback.print_exc() )
main.cleanup()
main.exit()
else:
main.log.error(
"Given rule does not exist,\
but attempted to remove it" )
else:
# NOTE: If a bad usage of this function occurs, exit the entire
# test
main.log.error( "Bad rule given for iptables. Exiting..." )
main.cleanup()
main.exit()
if __name__ != "__main__":
import sys
sys.modules[ __name__ ] = RemoteMininetDriver()