blob: 3e806a736dddbdcd11175d8daca57c1bd903dc45 [file] [log] [blame]
Thomas Vachuska4f1a60c2014-10-28 13:39:07 -07001/*
Ray Milkey34c95902015-04-15 09:47:53 -07002 * Copyright 2014-2015 Open Networking Laboratory
Thomas Vachuska4f1a60c2014-10-28 13:39:07 -07003 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
Brian O'Connorabafb502014-12-02 22:26:20 -080016package org.onosproject.net.proxyarp.impl;
Jonathan Hart704ca142014-10-09 09:34:39 -070017
Aaron Kruglikovd8123832015-07-06 14:20:25 -070018import com.google.common.collect.Lists;
Thomas Vachuska27bee092015-06-23 19:03:10 -070019import com.google.common.collect.Sets;
Jonathan Hart704ca142014-10-09 09:34:39 -070020import org.junit.Before;
21import org.junit.Test;
Jonathan Hart3cfce8e2015-01-14 16:43:27 -080022import org.onlab.packet.ARP;
23import org.onlab.packet.Ethernet;
Charles Chanad3b5502015-10-23 16:24:20 -070024import org.onlab.packet.ICMP6;
25import org.onlab.packet.IPacket;
26import org.onlab.packet.IPv6;
Jonathan Hart3cfce8e2015-01-14 16:43:27 -080027import org.onlab.packet.Ip4Address;
28import org.onlab.packet.Ip4Prefix;
Charles Chanad3b5502015-10-23 16:24:20 -070029import org.onlab.packet.Ip6Address;
30import org.onlab.packet.Ip6Prefix;
Jonathan Hart4cb39882015-08-12 23:50:55 -040031import org.onlab.packet.IpPrefix;
Jonathan Hart3cfce8e2015-01-14 16:43:27 -080032import org.onlab.packet.MacAddress;
33import org.onlab.packet.VlanId;
Charles Chanad3b5502015-10-23 16:24:20 -070034import org.onlab.packet.ndp.NeighborAdvertisement;
35import org.onlab.packet.ndp.NeighborDiscoveryOptions;
36import org.onlab.packet.ndp.NeighborSolicitation;
Jonathan Hart4cb39882015-08-12 23:50:55 -040037import org.onosproject.incubator.net.intf.Interface;
38import org.onosproject.incubator.net.intf.InterfaceService;
Brian O'Connorabafb502014-12-02 22:26:20 -080039import org.onosproject.net.ConnectPoint;
40import org.onosproject.net.DefaultHost;
41import org.onosproject.net.Device;
42import org.onosproject.net.DeviceId;
43import org.onosproject.net.Host;
44import org.onosproject.net.HostId;
45import org.onosproject.net.HostLocation;
46import org.onosproject.net.Link;
47import org.onosproject.net.Port;
48import org.onosproject.net.PortNumber;
49import org.onosproject.net.device.DeviceListener;
50import org.onosproject.net.device.DeviceService;
Aaron Kruglikovd8123832015-07-06 14:20:25 -070051import org.onosproject.net.edgeservice.impl.EdgeManager;
Thomas Vachuskab2c47a72015-08-05 14:22:54 -070052import org.onosproject.net.flow.DefaultTrafficTreatment;
53import org.onosproject.net.flow.TrafficTreatment;
Brian O'Connorabafb502014-12-02 22:26:20 -080054import org.onosproject.net.flow.instructions.Instruction;
55import org.onosproject.net.flow.instructions.Instructions.OutputInstruction;
56import org.onosproject.net.host.HostService;
57import org.onosproject.net.host.InterfaceIpAddress;
Brian O'Connorabafb502014-12-02 22:26:20 -080058import org.onosproject.net.link.LinkListener;
59import org.onosproject.net.link.LinkService;
Thomas Vachuskab2c47a72015-08-05 14:22:54 -070060import org.onosproject.net.packet.DefaultOutboundPacket;
Brian O'Connorabafb502014-12-02 22:26:20 -080061import org.onosproject.net.packet.OutboundPacket;
Thomas Vachuska27bee092015-06-23 19:03:10 -070062import org.onosproject.net.packet.PacketServiceAdapter;
Brian O'Connorabafb502014-12-02 22:26:20 -080063import org.onosproject.net.provider.ProviderId;
Thomas Vachuskab2c47a72015-08-05 14:22:54 -070064import org.onosproject.net.proxyarp.ProxyArpStore;
65import org.onosproject.net.proxyarp.ProxyArpStoreDelegate;
Jonathan Hart704ca142014-10-09 09:34:39 -070066
Thomas Vachuskab2c47a72015-08-05 14:22:54 -070067import java.nio.ByteBuffer;
Thomas Vachuska27bee092015-06-23 19:03:10 -070068import java.util.ArrayList;
69import java.util.Collections;
Thomas Vachuska27bee092015-06-23 19:03:10 -070070import java.util.List;
71import java.util.Set;
72
Jonathan Hart4cb39882015-08-12 23:50:55 -040073import static org.easymock.EasyMock.anyObject;
74import static org.easymock.EasyMock.createMock;
75import static org.easymock.EasyMock.expect;
76import static org.easymock.EasyMock.replay;
Charles Chanad3b5502015-10-23 16:24:20 -070077import static org.hamcrest.Matchers.anyOf;
78import static org.hamcrest.Matchers.is;
Jonathan Hart4cb39882015-08-12 23:50:55 -040079import static org.junit.Assert.assertArrayEquals;
80import static org.junit.Assert.assertEquals;
81import static org.junit.Assert.assertFalse;
Charles Chanad3b5502015-10-23 16:24:20 -070082import static org.junit.Assert.assertNotNull;
83import static org.junit.Assert.assertThat;
Jonathan Hart4cb39882015-08-12 23:50:55 -040084import static org.junit.Assert.assertTrue;
Jonathan Hart704ca142014-10-09 09:34:39 -070085
86/**
87 * Tests for the {@link ProxyArpManager} class.
88 */
89public class ProxyArpManagerTest {
90
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -070091 private static final int NUM_DEVICES = 6;
Jonathan Hart704ca142014-10-09 09:34:39 -070092 private static final int NUM_PORTS_PER_DEVICE = 3;
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -070093 private static final int NUM_ADDRESS_PORTS = NUM_DEVICES / 2;
94 private static final int NUM_FLOOD_PORTS = 3;
Jonathan Hart704ca142014-10-09 09:34:39 -070095
Pavlin Radoslavov5b5dc482014-11-05 14:48:08 -080096 private static final Ip4Address IP1 = Ip4Address.valueOf("192.168.1.1");
97 private static final Ip4Address IP2 = Ip4Address.valueOf("192.168.1.2");
Charles Chanad3b5502015-10-23 16:24:20 -070098 private static final Ip6Address IP3 = Ip6Address.valueOf("1000::1");
99 private static final Ip6Address IP4 = Ip6Address.valueOf("1000::2");
Jonathan Hart704ca142014-10-09 09:34:39 -0700100
101 private static final ProviderId PID = new ProviderId("of", "foo");
102
103 private static final VlanId VLAN1 = VlanId.vlanId((short) 1);
104 private static final VlanId VLAN2 = VlanId.vlanId((short) 2);
105 private static final MacAddress MAC1 = MacAddress.valueOf("00:00:11:00:00:01");
106 private static final MacAddress MAC2 = MacAddress.valueOf("00:00:22:00:00:02");
Charles Chanad3b5502015-10-23 16:24:20 -0700107 private static final MacAddress MAC3 = MacAddress.valueOf("00:00:33:00:00:03");
108 private static final MacAddress MAC4 = MacAddress.valueOf("00:00:44:00:00:04");
109 private static final MacAddress SOLICITED_MAC3 = MacAddress.valueOf("33:33:FF:00:00:01");
Jonathan Hart704ca142014-10-09 09:34:39 -0700110 private static final HostId HID1 = HostId.hostId(MAC1, VLAN1);
111 private static final HostId HID2 = HostId.hostId(MAC2, VLAN1);
Charles Chanad3b5502015-10-23 16:24:20 -0700112 private static final HostId HID3 = HostId.hostId(MAC3, VLAN1);
113 private static final HostId HID4 = HostId.hostId(MAC4, VLAN1);
114 private static final HostId SOLICITED_HID3 = HostId.hostId(SOLICITED_MAC3, VLAN1);
Jonathan Hart704ca142014-10-09 09:34:39 -0700115
116 private static final DeviceId DID1 = getDeviceId(1);
117 private static final DeviceId DID2 = getDeviceId(2);
118 private static final PortNumber P1 = PortNumber.portNumber(1);
119 private static final HostLocation LOC1 = new HostLocation(DID1, P1, 123L);
120 private static final HostLocation LOC2 = new HostLocation(DID2, P1, 123L);
Yuta HIGUCHI3e848a82014-11-02 20:19:42 -0800121 private static final byte[] ZERO_MAC_ADDRESS = MacAddress.ZERO.toBytes();
Jonathan Hart704ca142014-10-09 09:34:39 -0700122
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700123 //Return values used for various functions of the TestPacketService inner class.
124 private boolean isEdgePointReturn;
125 private List<ConnectPoint> getEdgePointsNoArg;
126
127
Jonathan Hart704ca142014-10-09 09:34:39 -0700128 private ProxyArpManager proxyArp;
129
130 private TestPacketService packetService;
Jonathan Hart704ca142014-10-09 09:34:39 -0700131 private DeviceService deviceService;
132 private LinkService linkService;
133 private HostService hostService;
Jonathan Hart4cb39882015-08-12 23:50:55 -0400134 private InterfaceService interfaceService;
Jonathan Hart704ca142014-10-09 09:34:39 -0700135
136 @Before
137 public void setUp() throws Exception {
138 proxyArp = new ProxyArpManager();
139 packetService = new TestPacketService();
140 proxyArp.packetService = packetService;
Thomas Vachuskab2c47a72015-08-05 14:22:54 -0700141 proxyArp.store = new TestProxyArpStoreAdapter();
Jonathan Hart704ca142014-10-09 09:34:39 -0700142
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700143 proxyArp.edgeService = new TestEdgePortService();
144
Jonathan Hart704ca142014-10-09 09:34:39 -0700145 // Create a host service mock here. Must be replayed by tests once the
146 // expectations have been set up
147 hostService = createMock(HostService.class);
148 proxyArp.hostService = hostService;
149
Jonathan Hart4cb39882015-08-12 23:50:55 -0400150 interfaceService = createMock(InterfaceService.class);
151 proxyArp.interfaceService = interfaceService;
152
Jonathan Hart704ca142014-10-09 09:34:39 -0700153 createTopology();
154 proxyArp.deviceService = deviceService;
155 proxyArp.linkService = linkService;
156
157 proxyArp.activate();
158 }
159
160 /**
161 * Creates a fake topology to feed into the ARP module.
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700162 * <p>
Jonathan Hart704ca142014-10-09 09:34:39 -0700163 * The default topology is a unidirectional ring topology. Each switch has
164 * 3 ports. Ports 2 and 3 have the links to neighbor switches, and port 1
165 * is free (edge port).
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700166 * The first half of the switches have IP addresses configured on their
167 * free ports (port 1). The second half of the switches have no IP
168 * addresses configured.
Jonathan Hart704ca142014-10-09 09:34:39 -0700169 */
170 private void createTopology() {
171 deviceService = createMock(DeviceService.class);
172 linkService = createMock(LinkService.class);
173
174 deviceService.addListener(anyObject(DeviceListener.class));
175 linkService.addListener(anyObject(LinkListener.class));
176
177 createDevices(NUM_DEVICES, NUM_PORTS_PER_DEVICE);
178 createLinks(NUM_DEVICES);
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700179 addAddressBindings();
Jonathan Hart704ca142014-10-09 09:34:39 -0700180 }
181
182 /**
183 * Creates the devices for the fake topology.
184 */
185 private void createDevices(int numDevices, int numPorts) {
186 List<Device> devices = new ArrayList<>();
187
188 for (int i = 1; i <= numDevices; i++) {
189 DeviceId devId = getDeviceId(i);
190 Device device = createMock(Device.class);
191 expect(device.id()).andReturn(devId).anyTimes();
192 replay(device);
193
194 devices.add(device);
195
196 List<Port> ports = new ArrayList<>();
197 for (int j = 1; j <= numPorts; j++) {
198 Port port = createMock(Port.class);
199 expect(port.number()).andReturn(PortNumber.portNumber(j)).anyTimes();
200 replay(port);
201 ports.add(port);
202 }
203
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700204 expect(deviceService.getPorts(devId)).andReturn(ports).anyTimes();
205 expect(deviceService.getDevice(devId)).andReturn(device).anyTimes();
Jonathan Hart704ca142014-10-09 09:34:39 -0700206 }
207
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700208 expect(deviceService.getDevices()).andReturn(devices).anyTimes();
Jonathan Hart704ca142014-10-09 09:34:39 -0700209 replay(deviceService);
210 }
211
212 /**
213 * Creates the links for the fake topology.
214 * NB: Only unidirectional links are created, as for this purpose all we
215 * need is to occupy the ports with some link.
216 */
217 private void createLinks(int numDevices) {
Sho SHIMIZUd88db6f2015-09-09 14:22:06 -0700218 List<Link> links = new ArrayList<>();
Jonathan Hart704ca142014-10-09 09:34:39 -0700219
220 for (int i = 1; i <= numDevices; i++) {
221 ConnectPoint src = new ConnectPoint(
222 getDeviceId(i),
223 PortNumber.portNumber(2));
224 ConnectPoint dst = new ConnectPoint(
225 getDeviceId((i + 1 > numDevices) ? 1 : i + 1),
226 PortNumber.portNumber(3));
227
228 Link link = createMock(Link.class);
229 expect(link.src()).andReturn(src).anyTimes();
230 expect(link.dst()).andReturn(dst).anyTimes();
231 replay(link);
232
233 links.add(link);
234 }
235
236 expect(linkService.getLinks()).andReturn(links).anyTimes();
237 replay(linkService);
238 }
239
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700240 private void addAddressBindings() {
Jonathan Hart4cb39882015-08-12 23:50:55 -0400241 Set<Interface> interfaces = Sets.newHashSet();
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700242
243 for (int i = 1; i <= NUM_ADDRESS_PORTS; i++) {
244 ConnectPoint cp = new ConnectPoint(getDeviceId(i), P1);
Charles Chanad3b5502015-10-23 16:24:20 -0700245
246 // Interface address for IPv4
247 Ip4Prefix prefix1 = Ip4Prefix.valueOf("10.0." + (2 * i - 1) + ".0/24");
248 Ip4Address addr1 = Ip4Address.valueOf("10.0." + (2 * i - 1) + ".1");
Pavlin Radoslavov5b5dc482014-11-05 14:48:08 -0800249 Ip4Prefix prefix2 = Ip4Prefix.valueOf("10.0." + (2 * i) + ".0/24");
250 Ip4Address addr2 = Ip4Address.valueOf("10.0." + (2 * i) + ".1");
Pavlin Radoslavov76b0ae22014-10-27 15:33:19 -0700251 InterfaceIpAddress ia1 = new InterfaceIpAddress(addr1, prefix1);
252 InterfaceIpAddress ia2 = new InterfaceIpAddress(addr2, prefix2);
Charles Chanad3b5502015-10-23 16:24:20 -0700253
254 // Interface address for IPv6
255 Ip6Prefix prefix3 = Ip6Prefix.valueOf((2 * i - 1) + "000::0/64");
256 Ip6Address addr3 = Ip6Address.valueOf((2 * i - 1) + "000::1");
257 Ip6Prefix prefix4 = Ip6Prefix.valueOf((2 * i) + "000::0/64");
258 Ip6Address addr4 = Ip6Address.valueOf((2 * i) + "000::1");
259 InterfaceIpAddress ia3 = new InterfaceIpAddress(addr3, prefix3);
260 InterfaceIpAddress ia4 = new InterfaceIpAddress(addr4, prefix4);
261
262 Interface intf1 = new Interface(cp, Sets.newHashSet(ia1, ia3),
Jonathan Hart4cb39882015-08-12 23:50:55 -0400263 MacAddress.valueOf(2 * i - 1),
264 VlanId.vlanId((short) 1));
Charles Chanad3b5502015-10-23 16:24:20 -0700265 Interface intf2 = new Interface(cp, Sets.newHashSet(ia2, ia4),
Jonathan Hart4cb39882015-08-12 23:50:55 -0400266 MacAddress.valueOf(2 * i),
267 VlanId.NONE);
Jonathan Hart4cb39882015-08-12 23:50:55 -0400268 interfaces.add(intf1);
269 interfaces.add(intf2);
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700270
Jonathan Hart4cb39882015-08-12 23:50:55 -0400271 expect(interfaceService.getInterfacesByPort(cp))
272 .andReturn(Sets.newHashSet(intf1, intf2)).anyTimes();
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700273 }
274
Jonathan Hart4cb39882015-08-12 23:50:55 -0400275 expect(interfaceService.getInterfaces()).andReturn(interfaces).anyTimes();
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700276
277 for (int i = 1; i <= NUM_FLOOD_PORTS; i++) {
278 ConnectPoint cp = new ConnectPoint(getDeviceId(i + NUM_ADDRESS_PORTS),
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700279 P1);
Jonathan Hart4cb39882015-08-12 23:50:55 -0400280
281 expect(interfaceService.getInterfacesByPort(cp))
282 .andReturn(Collections.emptySet()).anyTimes();
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700283 }
284 }
285
Jonathan Hart704ca142014-10-09 09:34:39 -0700286 /**
Jonathan Hart7d1496b2015-03-10 22:00:48 -0700287 * Tests {@link ProxyArpManager#isKnown(org.onlab.packet.IpAddress)} in the
288 * case where the IP address is not known.
Jonathan Hart704ca142014-10-09 09:34:39 -0700289 * Verifies the method returns false.
290 */
291 @Test
292 public void testNotKnown() {
293 expect(hostService.getHostsByIp(IP1)).andReturn(Collections.<Host>emptySet());
294 replay(hostService);
Jonathan Hart4cb39882015-08-12 23:50:55 -0400295 replay(interfaceService);
Jonathan Hart704ca142014-10-09 09:34:39 -0700296
Jonathan Hartf84591d2015-01-16 14:33:43 -0800297 assertFalse(proxyArp.isKnown(IP1));
Jonathan Hart704ca142014-10-09 09:34:39 -0700298 }
299
300 /**
Jonathan Hart7d1496b2015-03-10 22:00:48 -0700301 * Tests {@link ProxyArpManager#isKnown(org.onlab.packet.IpAddress)} in the
302 * case where the IP address is known.
Jonathan Hart704ca142014-10-09 09:34:39 -0700303 * Verifies the method returns true.
304 */
305 @Test
306 public void testKnown() {
307 Host host1 = createMock(Host.class);
308 Host host2 = createMock(Host.class);
309
310 expect(hostService.getHostsByIp(IP1))
311 .andReturn(Sets.newHashSet(host1, host2));
312 replay(hostService);
Jonathan Hart4cb39882015-08-12 23:50:55 -0400313 replay(interfaceService);
Jonathan Hart704ca142014-10-09 09:34:39 -0700314
Jonathan Hartf84591d2015-01-16 14:33:43 -0800315 assertTrue(proxyArp.isKnown(IP1));
Jonathan Hart704ca142014-10-09 09:34:39 -0700316 }
317
318 /**
Jonathan Hart6cd2f352015-01-13 17:44:45 -0800319 * Tests {@link ProxyArpManager#reply(Ethernet, ConnectPoint)} in the case where the
Jonathan Hart704ca142014-10-09 09:34:39 -0700320 * destination host is known.
321 * Verifies the correct ARP reply is sent out the correct port.
322 */
323 @Test
324 public void testReplyKnown() {
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700325 //Set the return value of isEdgePoint from the edgemanager.
326 isEdgePointReturn = true;
327
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700328 Host replyer = new DefaultHost(PID, HID1, MAC1, VLAN1, getLocation(4),
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700329 Collections.singleton(IP1));
Jonathan Hart704ca142014-10-09 09:34:39 -0700330
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700331 Host requestor = new DefaultHost(PID, HID2, MAC2, VLAN1, getLocation(5),
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700332 Collections.singleton(IP2));
Jonathan Hart704ca142014-10-09 09:34:39 -0700333
Pavlin Radoslavov33f228a2014-10-27 19:33:16 -0700334 expect(hostService.getHostsByIp(IP1))
Thomas Vachuska27bee092015-06-23 19:03:10 -0700335 .andReturn(Collections.singleton(replyer));
Jonathan Hart704ca142014-10-09 09:34:39 -0700336 expect(hostService.getHost(HID2)).andReturn(requestor);
337
338 replay(hostService);
Jonathan Hart4cb39882015-08-12 23:50:55 -0400339 replay(interfaceService);
Jonathan Hart704ca142014-10-09 09:34:39 -0700340
341 Ethernet arpRequest = buildArp(ARP.OP_REQUEST, MAC2, null, IP2, IP1);
342
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700343 proxyArp.reply(arpRequest, getLocation(5));
Jonathan Hart704ca142014-10-09 09:34:39 -0700344
345 assertEquals(1, packetService.packets.size());
346 Ethernet arpReply = buildArp(ARP.OP_REPLY, MAC1, MAC2, IP1, IP2);
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700347 verifyPacketOut(arpReply, getLocation(5), packetService.packets.get(0));
Jonathan Hart704ca142014-10-09 09:34:39 -0700348 }
349
350 /**
Jonathan Hart6cd2f352015-01-13 17:44:45 -0800351 * Tests {@link ProxyArpManager#reply(Ethernet, ConnectPoint)} in the case where the
Charles Chanad3b5502015-10-23 16:24:20 -0700352 * destination host is known.
353 * Verifies the correct NDP reply is sent out the correct port.
354 */
355 @Test
356 public void testReplyKnownIpv6() {
357 //Set the return value of isEdgePoint from the edgemanager.
358 isEdgePointReturn = true;
359
360 Host replyer = new DefaultHost(PID, HID3, MAC3, VLAN1, getLocation(4),
361 Collections.singleton(IP3));
362
363 Host requestor = new DefaultHost(PID, HID4, MAC4, VLAN1, getLocation(5),
364 Collections.singleton(IP4));
365
366 expect(hostService.getHostsByIp(IP3))
367 .andReturn(Collections.singleton(replyer));
368 expect(hostService.getHost(HID4)).andReturn(requestor);
369
370 replay(hostService);
371 replay(interfaceService);
372
373 Ethernet ndpRequest = buildNDP(ICMP6.NEIGHBOR_SOLICITATION,
374 MAC4, SOLICITED_MAC3,
375 IP4, IP3);
376
377 proxyArp.reply(ndpRequest, getLocation(5));
378
379 assertEquals(1, packetService.packets.size());
380 Ethernet ndpReply = buildNDP(ICMP6.NEIGHBOR_ADVERTISEMENT,
381 MAC3, MAC4, IP3, IP4);
382 verifyPacketOut(ndpReply, getLocation(5), packetService.packets.get(0));
383 }
384
385 /**
386 * Tests {@link ProxyArpManager#reply(Ethernet, ConnectPoint)} in the case where the
Jonathan Hart704ca142014-10-09 09:34:39 -0700387 * destination host is not known.
388 * Verifies the ARP request is flooded out the correct edge ports.
389 */
390 @Test
391 public void testReplyUnknown() {
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700392 isEdgePointReturn = true;
393
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700394 Host requestor = new DefaultHost(PID, HID2, MAC2, VLAN1, getLocation(5),
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700395 Collections.singleton(IP2));
Jonathan Hart704ca142014-10-09 09:34:39 -0700396
Pavlin Radoslavov33f228a2014-10-27 19:33:16 -0700397 expect(hostService.getHostsByIp(IP1))
Jonathan Hart4cb39882015-08-12 23:50:55 -0400398 .andReturn(Collections.emptySet());
399 expect(interfaceService.getInterfacesByIp(IP2))
400 .andReturn(Collections.emptySet());
Jonathan Hart704ca142014-10-09 09:34:39 -0700401 expect(hostService.getHost(HID2)).andReturn(requestor);
402
403 replay(hostService);
Jonathan Hart4cb39882015-08-12 23:50:55 -0400404 replay(interfaceService);
Jonathan Hart704ca142014-10-09 09:34:39 -0700405
406 Ethernet arpRequest = buildArp(ARP.OP_REQUEST, MAC2, null, IP2, IP1);
407
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700408 //Setup the set of edge ports to be used in the reply method
409 getEdgePointsNoArg = Lists.newLinkedList();
410 getEdgePointsNoArg.add(new ConnectPoint(DeviceId.deviceId("5"), PortNumber.portNumber(1)));
411 getEdgePointsNoArg.add(new ConnectPoint(DeviceId.deviceId("4"), PortNumber.portNumber(1)));
412
Jonathan Hartf84591d2015-01-16 14:33:43 -0800413 proxyArp.reply(arpRequest, getLocation(6));
Jonathan Hart704ca142014-10-09 09:34:39 -0700414
415 verifyFlood(arpRequest);
416 }
417
418 /**
Jonathan Hart6cd2f352015-01-13 17:44:45 -0800419 * Tests {@link ProxyArpManager#reply(Ethernet, ConnectPoint)} in the case where the
Charles Chanad3b5502015-10-23 16:24:20 -0700420 * destination host is not known.
421 * Verifies the NDP request is flooded out the correct edge ports.
422 */
423 @Test
424 public void testReplyUnknownIpv6() {
425 isEdgePointReturn = true;
426
427 Host requestor = new DefaultHost(PID, HID4, MAC4, VLAN1, getLocation(5),
428 Collections.singleton(IP4));
429
430 expect(hostService.getHostsByIp(IP3))
431 .andReturn(Collections.emptySet());
432 expect(interfaceService.getInterfacesByIp(IP4))
433 .andReturn(Collections.emptySet());
434 expect(hostService.getHost(HID4)).andReturn(requestor);
435
436 replay(hostService);
437 replay(interfaceService);
438
439 Ethernet ndpRequest = buildNDP(ICMP6.NEIGHBOR_SOLICITATION,
440 MAC4, SOLICITED_MAC3,
441 IP4, IP3);
442
443 //Setup the set of edge ports to be used in the reply method
444 getEdgePointsNoArg = Lists.newLinkedList();
445 getEdgePointsNoArg.add(new ConnectPoint(DeviceId.deviceId("5"), PortNumber.portNumber(1)));
446 getEdgePointsNoArg.add(new ConnectPoint(DeviceId.deviceId("4"), PortNumber.portNumber(1)));
447
448 proxyArp.reply(ndpRequest, getLocation(6));
449
450 verifyFlood(ndpRequest);
451 }
452
453 /**
454 * Tests {@link ProxyArpManager#reply(Ethernet, ConnectPoint)} in the case where the
Jonathan Hart704ca142014-10-09 09:34:39 -0700455 * destination host is known for that IP address, but is not on the same
456 * VLAN as the source host.
457 * Verifies the ARP request is flooded out the correct edge ports.
458 */
459 @Test
460 public void testReplyDifferentVlan() {
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700461
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700462 Host replyer = new DefaultHost(PID, HID1, MAC1, VLAN2, getLocation(4),
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700463 Collections.singleton(IP1));
Jonathan Hart704ca142014-10-09 09:34:39 -0700464
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700465 Host requestor = new DefaultHost(PID, HID2, MAC2, VLAN1, getLocation(5),
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700466 Collections.singleton(IP2));
Jonathan Hart704ca142014-10-09 09:34:39 -0700467
Pavlin Radoslavov33f228a2014-10-27 19:33:16 -0700468 expect(hostService.getHostsByIp(IP1))
Jonathan Hart704ca142014-10-09 09:34:39 -0700469 .andReturn(Collections.singleton(replyer));
Jonathan Hart4cb39882015-08-12 23:50:55 -0400470 expect(interfaceService.getInterfacesByIp(IP2))
471 .andReturn(Collections.emptySet());
Jonathan Hart704ca142014-10-09 09:34:39 -0700472 expect(hostService.getHost(HID2)).andReturn(requestor);
473
474 replay(hostService);
Jonathan Hart4cb39882015-08-12 23:50:55 -0400475 replay(interfaceService);
Jonathan Hart704ca142014-10-09 09:34:39 -0700476
477 Ethernet arpRequest = buildArp(ARP.OP_REQUEST, MAC2, null, IP2, IP1);
478
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700479 //Setup for flood test
480 getEdgePointsNoArg = Lists.newLinkedList();
481 getEdgePointsNoArg.add(new ConnectPoint(DeviceId.deviceId("5"), PortNumber.portNumber(1)));
482 getEdgePointsNoArg.add(new ConnectPoint(DeviceId.deviceId("4"), PortNumber.portNumber(1)));
Jonathan Hartf84591d2015-01-16 14:33:43 -0800483 proxyArp.reply(arpRequest, getLocation(6));
Jonathan Hart704ca142014-10-09 09:34:39 -0700484
485 verifyFlood(arpRequest);
486 }
487
Charles Chanad3b5502015-10-23 16:24:20 -0700488 /**
489 * Tests {@link ProxyArpManager#reply(Ethernet, ConnectPoint)} in the case where the
490 * destination host is known for that IP address, but is not on the same
491 * VLAN as the source host.
492 * Verifies the NDP request is flooded out the correct edge ports.
493 */
494 @Test
495 public void testReplyDifferentVlanIpv6() {
496
497 Host replyer = new DefaultHost(PID, HID3, MAC3, VLAN2, getLocation(4),
498 Collections.singleton(IP3));
499
500 Host requestor = new DefaultHost(PID, HID4, MAC4, VLAN1, getLocation(5),
501 Collections.singleton(IP4));
502
503 expect(hostService.getHostsByIp(IP3))
504 .andReturn(Collections.singleton(replyer));
505 expect(interfaceService.getInterfacesByIp(IP4))
506 .andReturn(Collections.emptySet());
507 expect(hostService.getHost(HID4)).andReturn(requestor);
508
509 replay(hostService);
510 replay(interfaceService);
511
512 Ethernet ndpRequest = buildNDP(ICMP6.NEIGHBOR_SOLICITATION,
513 MAC4, SOLICITED_MAC3,
514 IP4, IP3);
515
516 //Setup for flood test
517 getEdgePointsNoArg = Lists.newLinkedList();
518 getEdgePointsNoArg.add(new ConnectPoint(DeviceId.deviceId("5"), PortNumber.portNumber(1)));
519 getEdgePointsNoArg.add(new ConnectPoint(DeviceId.deviceId("4"), PortNumber.portNumber(1)));
520 proxyArp.reply(ndpRequest, getLocation(6));
521
522 verifyFlood(ndpRequest);
523 }
524
525 /**
526 * Test ARP request from external network to an internal host.
527 */
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700528 @Test
529 public void testReplyToRequestForUs() {
Pavlin Radoslavov5b5dc482014-11-05 14:48:08 -0800530 Ip4Address theirIp = Ip4Address.valueOf("10.0.1.254");
531 Ip4Address ourFirstIp = Ip4Address.valueOf("10.0.1.1");
532 Ip4Address ourSecondIp = Ip4Address.valueOf("10.0.2.1");
Jonathan Harta887ba82014-11-03 15:20:52 -0800533 MacAddress firstMac = MacAddress.valueOf(1L);
534 MacAddress secondMac = MacAddress.valueOf(2L);
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700535
536 Host requestor = new DefaultHost(PID, HID2, MAC2, VLAN1, LOC1,
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700537 Collections.singleton(theirIp));
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700538
539 expect(hostService.getHost(HID2)).andReturn(requestor);
540 replay(hostService);
Jonathan Hart4cb39882015-08-12 23:50:55 -0400541 replay(interfaceService);
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700542
543 Ethernet arpRequest = buildArp(ARP.OP_REQUEST, MAC2, null, theirIp, ourFirstIp);
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700544 isEdgePointReturn = true;
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700545 proxyArp.reply(arpRequest, LOC1);
546
547 assertEquals(1, packetService.packets.size());
Jonathan Harta887ba82014-11-03 15:20:52 -0800548 Ethernet arpReply = buildArp(ARP.OP_REPLY, firstMac, MAC2, ourFirstIp, theirIp);
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700549 verifyPacketOut(arpReply, LOC1, packetService.packets.get(0));
550
551 // Test a request for the second address on that port
552 packetService.packets.clear();
553 arpRequest = buildArp(ARP.OP_REQUEST, MAC2, null, theirIp, ourSecondIp);
554
555 proxyArp.reply(arpRequest, LOC1);
556
557 assertEquals(1, packetService.packets.size());
Jonathan Harta887ba82014-11-03 15:20:52 -0800558 arpReply = buildArp(ARP.OP_REPLY, secondMac, MAC2, ourSecondIp, theirIp);
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700559 verifyPacketOut(arpReply, LOC1, packetService.packets.get(0));
560 }
561
Charles Chanad3b5502015-10-23 16:24:20 -0700562 /**
563 * Test NDP request from external network to an internal host.
564 */
565 @Test
566 public void testReplyToRequestForUsIpv6() {
567 Ip6Address theirIp = Ip6Address.valueOf("1000::ffff");
568 Ip6Address ourFirstIp = Ip6Address.valueOf("1000::1");
569 Ip6Address ourSecondIp = Ip6Address.valueOf("2000::1");
570 MacAddress firstMac = MacAddress.valueOf(1L);
571 MacAddress secondMac = MacAddress.valueOf(2L);
572
573 Host requestor = new DefaultHost(PID, HID2, MAC2, VLAN1, LOC1,
574 Collections.singleton(theirIp));
575
576 expect(hostService.getHost(HID2)).andReturn(requestor);
577 expect(hostService.getHostsByIp(ourFirstIp))
578 .andReturn(Collections.singleton(requestor));
579 replay(hostService);
580 replay(interfaceService);
581
582 Ethernet ndpRequest = buildNDP(ICMP6.NEIGHBOR_SOLICITATION,
583 MAC2,
584 MacAddress.valueOf("33:33:ff:00:00:01"),
585 theirIp,
586 ourFirstIp);
587 isEdgePointReturn = true;
588 proxyArp.reply(ndpRequest, LOC1);
589 assertEquals(1, packetService.packets.size());
590
591 Ethernet ndpReply = buildNDP(ICMP6.NEIGHBOR_ADVERTISEMENT,
592 firstMac,
593 MAC2,
594 ourFirstIp,
595 theirIp);
596 verifyPacketOut(ndpReply, LOC1, packetService.packets.get(0));
597
598 // Test a request for the second address on that port
599 packetService.packets.clear();
600 ndpRequest = buildNDP(ICMP6.NEIGHBOR_SOLICITATION,
601 MAC2,
602 MacAddress.valueOf("33:33:ff:00:00:01"),
603 theirIp,
604 ourSecondIp);
605 proxyArp.reply(ndpRequest, LOC1);
606 assertEquals(1, packetService.packets.size());
607
608 ndpReply = buildNDP(ICMP6.NEIGHBOR_ADVERTISEMENT,
609 secondMac,
610 MAC2,
611 ourSecondIp,
612 theirIp);
613 verifyPacketOut(ndpReply, LOC1, packetService.packets.get(0));
614 }
615
616 /**
617 * Request for a valid external IPv4 address but coming in the wrong port.
618 */
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700619 @Test
620 public void testReplyExternalPortBadRequest() {
621 replay(hostService); // no further host service expectations
Jonathan Hart4cb39882015-08-12 23:50:55 -0400622 replay(interfaceService);
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700623
Pavlin Radoslavov5b5dc482014-11-05 14:48:08 -0800624 Ip4Address theirIp = Ip4Address.valueOf("10.0.1.254");
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700625
626 // Request for a valid external IP address but coming in the wrong port
627 Ethernet arpRequest = buildArp(ARP.OP_REQUEST, MAC1, null, theirIp,
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700628 Ip4Address.valueOf("10.0.3.1"));
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700629 proxyArp.reply(arpRequest, LOC1);
630 assertEquals(0, packetService.packets.size());
631
632 // Request for a valid internal IP address but coming in an external port
633 packetService.packets.clear();
634 arpRequest = buildArp(ARP.OP_REQUEST, MAC1, null, theirIp, IP1);
635 proxyArp.reply(arpRequest, LOC1);
636 assertEquals(0, packetService.packets.size());
637 }
638
Charles Chanad3b5502015-10-23 16:24:20 -0700639 /**
640 * Request for a valid external IPv6 address but coming in the wrong port.
641 */
642 @Test
643 public void testReplyExternalPortBadRequestIpv6() {
644 replay(hostService); // no further host service expectations
645 replay(interfaceService);
646
647 Ip6Address theirIp = Ip6Address.valueOf("1000::ffff");
648
649 Ethernet ndpRequest = buildNDP(ICMP6.NEIGHBOR_SOLICITATION,
650 MAC1,
651 MacAddress.valueOf("33:33:ff:00:00:01"),
652 theirIp,
653 Ip6Address.valueOf("3000::1"));
654 proxyArp.reply(ndpRequest, LOC1);
655 assertEquals(0, packetService.packets.size());
656
657 // Request for a valid internal IP address but coming in an external port
658 packetService.packets.clear();
659 ndpRequest = buildNDP(ICMP6.NEIGHBOR_SOLICITATION,
660 MAC1,
661 MacAddress.valueOf("33:33:ff:00:00:01"),
662 theirIp,
663 IP3);
664 proxyArp.reply(ndpRequest, LOC1);
665 assertEquals(0, packetService.packets.size());
666 }
667
668 /**
669 * Test ARP request from internal network to an external host.
670 */
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700671 @Test
672 public void testReplyToRequestFromUs() {
Pavlin Radoslavov5b5dc482014-11-05 14:48:08 -0800673 Ip4Address ourIp = Ip4Address.valueOf("10.0.1.1");
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700674 MacAddress ourMac = MacAddress.valueOf(1L);
Pavlin Radoslavov5b5dc482014-11-05 14:48:08 -0800675 Ip4Address theirIp = Ip4Address.valueOf("10.0.1.100");
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700676
Jonathan Hart7d1496b2015-03-10 22:00:48 -0700677 expect(hostService.getHostsByIp(theirIp)).andReturn(Collections.emptySet());
Jonathan Hart4cb39882015-08-12 23:50:55 -0400678 expect(interfaceService.getInterfacesByIp(ourIp))
679 .andReturn(Collections.singleton(new Interface(getLocation(1),
680 Collections.singleton(new InterfaceIpAddress(ourIp, IpPrefix.valueOf("10.0.1.1/24"))),
681 ourMac, VLAN1)));
Jonathan Hart7d1496b2015-03-10 22:00:48 -0700682 expect(hostService.getHost(HostId.hostId(ourMac, VLAN1))).andReturn(null);
683 replay(hostService);
Jonathan Hart4cb39882015-08-12 23:50:55 -0400684 replay(interfaceService);
Jonathan Hart7d1496b2015-03-10 22:00:48 -0700685
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700686 // This is a request from something inside our network (like a BGP
687 // daemon) to an external host.
688 Ethernet arpRequest = buildArp(ARP.OP_REQUEST, ourMac, null, ourIp, theirIp);
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700689 //Ensure the packet is allowed through (it is not to an internal port)
690 isEdgePointReturn = true;
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700691
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700692 proxyArp.reply(arpRequest, getLocation(5));
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700693 assertEquals(1, packetService.packets.size());
694 verifyPacketOut(arpRequest, getLocation(1), packetService.packets.get(0));
695
696 // The same request from a random external port should fail
697 packetService.packets.clear();
698 proxyArp.reply(arpRequest, getLocation(2));
699 assertEquals(0, packetService.packets.size());
700 }
701
Jonathan Hart704ca142014-10-09 09:34:39 -0700702 /**
Charles Chanad3b5502015-10-23 16:24:20 -0700703 * Test NDP request from internal network to an external host.
704 */
705 @Test
706 public void testReplyToRequestFromUsIpv6() {
707 Ip6Address ourIp = Ip6Address.valueOf("1000::1");
708 MacAddress ourMac = MacAddress.valueOf(1L);
709 Ip6Address theirIp = Ip6Address.valueOf("1000::100");
710
711 expect(hostService.getHostsByIp(theirIp)).andReturn(Collections.emptySet());
712 expect(interfaceService.getInterfacesByIp(ourIp))
713 .andReturn(Collections.singleton(new Interface(getLocation(1),
714 Collections.singleton(new InterfaceIpAddress(
715 ourIp,
716 IpPrefix.valueOf("1000::1/64"))),
717 ourMac,
718 VLAN1)));
719 expect(hostService.getHost(HostId.hostId(ourMac, VLAN1))).andReturn(null);
720 replay(hostService);
721 replay(interfaceService);
722
723 // This is a request from something inside our network (like a BGP
724 // daemon) to an external host.
725 Ethernet ndpRequest = buildNDP(ICMP6.NEIGHBOR_SOLICITATION,
726 ourMac,
727 MacAddress.valueOf("33:33:ff:00:00:01"),
728 ourIp,
729 theirIp);
730
731 //Ensure the packet is allowed through (it is not to an internal port)
732 isEdgePointReturn = true;
733
734 proxyArp.reply(ndpRequest, getLocation(5));
735 assertEquals(1, packetService.packets.size());
736 verifyPacketOut(ndpRequest, getLocation(1), packetService.packets.get(0));
737
738 // The same request from a random external port should fail
739 packetService.packets.clear();
740 proxyArp.reply(ndpRequest, getLocation(2));
741 assertEquals(0, packetService.packets.size());
742 }
743
744 /**
Jonathan Hart6cd2f352015-01-13 17:44:45 -0800745 * Tests {@link ProxyArpManager#forward(Ethernet, ConnectPoint)} in the case where the
Jonathan Hart704ca142014-10-09 09:34:39 -0700746 * destination host is known.
747 * Verifies the correct ARP request is sent out the correct port.
748 */
749 @Test
750 public void testForwardToHost() {
751 Host host1 = new DefaultHost(PID, HID1, MAC1, VLAN1, LOC1,
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700752 Collections.singleton(IP1));
Thomas Vachuskab2c47a72015-08-05 14:22:54 -0700753 Host host2 = new DefaultHost(PID, HID2, MAC2, VLAN1, LOC2,
754 Collections.singleton(IP2));
Jonathan Hart704ca142014-10-09 09:34:39 -0700755
756 expect(hostService.getHost(HID1)).andReturn(host1);
Thomas Vachuskab2c47a72015-08-05 14:22:54 -0700757 expect(hostService.getHost(HID2)).andReturn(host2);
Jonathan Hart704ca142014-10-09 09:34:39 -0700758 replay(hostService);
Jonathan Hart4cb39882015-08-12 23:50:55 -0400759 replay(interfaceService);
Jonathan Hart704ca142014-10-09 09:34:39 -0700760
761 Ethernet arpRequest = buildArp(ARP.OP_REPLY, MAC2, MAC1, IP2, IP1);
762
Jonathan Hartf84591d2015-01-16 14:33:43 -0800763 proxyArp.forward(arpRequest, LOC2);
Jonathan Hart704ca142014-10-09 09:34:39 -0700764
765 assertEquals(1, packetService.packets.size());
766 OutboundPacket packet = packetService.packets.get(0);
767
768 verifyPacketOut(arpRequest, LOC1, packet);
769 }
770
771 /**
Jonathan Hart6cd2f352015-01-13 17:44:45 -0800772 * Tests {@link ProxyArpManager#forward(Ethernet, ConnectPoint)} in the case where the
Charles Chanad3b5502015-10-23 16:24:20 -0700773 * destination host is known.
774 * Verifies the correct ARP request is sent out the correct port.
775 */
776 @Test
777 public void testForwardToHostIpv6() {
778 Host host1 = new DefaultHost(PID, HID3, MAC3, VLAN1, LOC1,
779 Collections.singleton(IP3));
780 Host host2 = new DefaultHost(PID, HID4, MAC4, VLAN1, LOC2,
781 Collections.singleton(IP4));
782
783 expect(hostService.getHost(SOLICITED_HID3)).andReturn(host1);
784 expect(hostService.getHost(HID4)).andReturn(host2);
785 replay(hostService);
786 replay(interfaceService);
787
788 Ethernet ndpRequest = buildNDP(ICMP6.NEIGHBOR_SOLICITATION,
789 MAC4, SOLICITED_MAC3,
790 IP4, IP3);
791
792 proxyArp.forward(ndpRequest, LOC2);
793
794 assertEquals(1, packetService.packets.size());
795 OutboundPacket packet = packetService.packets.get(0);
796
797 verifyPacketOut(ndpRequest, LOC1, packet);
798 }
799
800 /**
801 * Tests {@link ProxyArpManager#forward(Ethernet, ConnectPoint)} in the case where the
Jonathan Hart704ca142014-10-09 09:34:39 -0700802 * destination host is not known.
803 * Verifies the correct ARP request is flooded out the correct edge ports.
804 */
805 @Test
806 public void testForwardFlood() {
807 expect(hostService.getHost(HID1)).andReturn(null);
808 replay(hostService);
Jonathan Hart4cb39882015-08-12 23:50:55 -0400809 replay(interfaceService);
Jonathan Hart704ca142014-10-09 09:34:39 -0700810
811 Ethernet arpRequest = buildArp(ARP.OP_REPLY, MAC2, MAC1, IP2, IP1);
812
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700813 //populate the list of edges when so that when forward hits flood in the manager it contains the values
814 //that should continue on
815 getEdgePointsNoArg = Lists.newLinkedList();
816 getEdgePointsNoArg.add(new ConnectPoint(DeviceId.deviceId("3"), PortNumber.portNumber(1)));
817 getEdgePointsNoArg.add(new ConnectPoint(DeviceId.deviceId("5"), PortNumber.portNumber(1)));
818 getEdgePointsNoArg.add(new ConnectPoint(DeviceId.deviceId("4"), PortNumber.portNumber(1)));
819
Jonathan Hartf84591d2015-01-16 14:33:43 -0800820 proxyArp.forward(arpRequest, getLocation(6));
Jonathan Hart704ca142014-10-09 09:34:39 -0700821
822 verifyFlood(arpRequest);
823 }
824
825 /**
Charles Chanad3b5502015-10-23 16:24:20 -0700826 * Tests {@link ProxyArpManager#forward(Ethernet, ConnectPoint)} in the case where the
827 * destination host is not known.
828 * Verifies the correct NDP request is flooded out the correct edge ports.
829 */
830 @Test
831 public void testForwardFloodIpv6() {
832 expect(hostService.getHost(SOLICITED_HID3)).andReturn(null);
833 replay(hostService);
834 replay(interfaceService);
835
836 Ethernet ndpRequest = buildNDP(ICMP6.NEIGHBOR_SOLICITATION,
837 MAC4, SOLICITED_MAC3,
838 IP4, IP3);
839
840 //populate the list of edges when so that when forward hits flood in the manager it contains the values
841 //that should continue on
842 getEdgePointsNoArg = Lists.newLinkedList();
843 getEdgePointsNoArg.add(new ConnectPoint(DeviceId.deviceId("3"), PortNumber.portNumber(1)));
844 getEdgePointsNoArg.add(new ConnectPoint(DeviceId.deviceId("5"), PortNumber.portNumber(1)));
845 getEdgePointsNoArg.add(new ConnectPoint(DeviceId.deviceId("4"), PortNumber.portNumber(1)));
846
847 proxyArp.forward(ndpRequest, getLocation(6));
848
849 verifyFlood(ndpRequest);
850 }
851
852 /**
Jonathan Hartf84591d2015-01-16 14:33:43 -0800853 * Verifies that the given packet was flooded out all available edge ports,
854 * except for the input port.
Jonathan Hart704ca142014-10-09 09:34:39 -0700855 *
856 * @param packet the packet that was expected to be flooded
857 */
858 private void verifyFlood(Ethernet packet) {
Jonathan Hartf84591d2015-01-16 14:33:43 -0800859 // There should be 1 less than NUM_FLOOD_PORTS; the inPort should be excluded.
860 assertEquals(NUM_FLOOD_PORTS - 1, packetService.packets.size());
Jonathan Hart704ca142014-10-09 09:34:39 -0700861
862 Collections.sort(packetService.packets,
Jonathan Hart4cb39882015-08-12 23:50:55 -0400863 (o1, o2) -> o1.sendThrough().uri().compareTo(o2.sendThrough().uri()));
Jonathan Hart704ca142014-10-09 09:34:39 -0700864
Jonathan Hartf84591d2015-01-16 14:33:43 -0800865
866 for (int i = 0; i < NUM_FLOOD_PORTS - 1; i++) {
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700867 ConnectPoint cp = new ConnectPoint(getDeviceId(NUM_ADDRESS_PORTS + i + 1),
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700868 PortNumber.portNumber(1));
Jonathan Hart704ca142014-10-09 09:34:39 -0700869
870 OutboundPacket outboundPacket = packetService.packets.get(i);
871 verifyPacketOut(packet, cp, outboundPacket);
872 }
873 }
874
875 /**
876 * Verifies the given packet was sent out the given port.
877 *
878 * @param expected the packet that was expected to be sent
Thomas Vachuska27bee092015-06-23 19:03:10 -0700879 * @param outPort the port the packet was expected to be sent out
880 * @param actual the actual OutboundPacket to verify
Jonathan Hart704ca142014-10-09 09:34:39 -0700881 */
882 private void verifyPacketOut(Ethernet expected, ConnectPoint outPort,
Thomas Vachuska27bee092015-06-23 19:03:10 -0700883 OutboundPacket actual) {
Yuta HIGUCHI3e848a82014-11-02 20:19:42 -0800884 assertArrayEquals(expected.serialize(), actual.data().array());
Ray Milkey42507352015-03-20 15:16:10 -0700885 assertEquals(1, actual.treatment().immediate().size());
Jonathan Hart704ca142014-10-09 09:34:39 -0700886 assertEquals(outPort.deviceId(), actual.sendThrough());
Ray Milkey42507352015-03-20 15:16:10 -0700887 Instruction instruction = actual.treatment().immediate().get(0);
Jonathan Hart704ca142014-10-09 09:34:39 -0700888 assertTrue(instruction instanceof OutputInstruction);
889 assertEquals(outPort.port(), ((OutputInstruction) instruction).port());
890 }
891
892 /**
893 * Returns the device ID of the ith device.
894 *
895 * @param i device to get the ID of
896 * @return the device ID
897 */
898 private static DeviceId getDeviceId(int i) {
899 return DeviceId.deviceId("" + i);
900 }
901
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700902 private static HostLocation getLocation(int i) {
903 return new HostLocation(new ConnectPoint(getDeviceId(i), P1), 123L);
904 }
905
Jonathan Hart704ca142014-10-09 09:34:39 -0700906 /**
907 * Builds an ARP packet with the given parameters.
908 *
909 * @param opcode opcode of the ARP packet
910 * @param srcMac source MAC address
911 * @param dstMac destination MAC address, or null if this is a request
Thomas Vachuska27bee092015-06-23 19:03:10 -0700912 * @param srcIp source IP address
913 * @param dstIp destination IP address
Jonathan Hart704ca142014-10-09 09:34:39 -0700914 * @return the ARP packet
915 */
916 private Ethernet buildArp(short opcode, MacAddress srcMac, MacAddress dstMac,
Thomas Vachuska27bee092015-06-23 19:03:10 -0700917 Ip4Address srcIp, Ip4Address dstIp) {
Jonathan Hart704ca142014-10-09 09:34:39 -0700918 Ethernet eth = new Ethernet();
919
920 if (dstMac == null) {
Yuta HIGUCHI3e848a82014-11-02 20:19:42 -0800921 eth.setDestinationMACAddress(MacAddress.BROADCAST);
Jonathan Hart704ca142014-10-09 09:34:39 -0700922 } else {
Yuta HIGUCHI3e848a82014-11-02 20:19:42 -0800923 eth.setDestinationMACAddress(dstMac);
Jonathan Hart704ca142014-10-09 09:34:39 -0700924 }
925
Yuta HIGUCHI3e848a82014-11-02 20:19:42 -0800926 eth.setSourceMACAddress(srcMac);
Jonathan Hart704ca142014-10-09 09:34:39 -0700927 eth.setEtherType(Ethernet.TYPE_ARP);
928 eth.setVlanID(VLAN1.toShort());
929
930 ARP arp = new ARP();
931 arp.setOpCode(opcode);
932 arp.setProtocolType(ARP.PROTO_TYPE_IP);
933 arp.setHardwareType(ARP.HW_TYPE_ETHERNET);
934
Pavlin Radoslavov5b5dc482014-11-05 14:48:08 -0800935 arp.setProtocolAddressLength((byte) Ip4Address.BYTE_LENGTH);
Jonathan Hart704ca142014-10-09 09:34:39 -0700936 arp.setHardwareAddressLength((byte) Ethernet.DATALAYER_ADDRESS_LENGTH);
Yuta HIGUCHI3e848a82014-11-02 20:19:42 -0800937 arp.setSenderHardwareAddress(srcMac.toBytes());
Jonathan Hart704ca142014-10-09 09:34:39 -0700938
939 if (dstMac == null) {
Yuta HIGUCHI3e848a82014-11-02 20:19:42 -0800940 arp.setTargetHardwareAddress(ZERO_MAC_ADDRESS);
Jonathan Hart704ca142014-10-09 09:34:39 -0700941 } else {
Yuta HIGUCHI3e848a82014-11-02 20:19:42 -0800942 arp.setTargetHardwareAddress(dstMac.toBytes());
Jonathan Hart704ca142014-10-09 09:34:39 -0700943 }
944
945 arp.setSenderProtocolAddress(srcIp.toOctets());
946 arp.setTargetProtocolAddress(dstIp.toOctets());
947
948 eth.setPayload(arp);
949 return eth;
950 }
951
952 /**
Charles Chanad3b5502015-10-23 16:24:20 -0700953 * Builds an NDP packet with the given parameters.
954 *
955 * @param type NeighborSolicitation or NeighborAdvertisement
956 * @param srcMac source MAC address
957 * @param dstMac destination MAC address, or null if this is a request
958 * @param srcIp source IP address
959 * @param dstIp destination IP address
960 * @return the NDP packet
961 */
962 private Ethernet buildNDP(byte type, MacAddress srcMac, MacAddress dstMac,
963 Ip6Address srcIp, Ip6Address dstIp) {
964 assertThat(type, anyOf(
965 is(ICMP6.NEIGHBOR_SOLICITATION),
966 is(ICMP6.NEIGHBOR_ADVERTISEMENT)
967 ));
968 assertNotNull(srcMac);
969 assertNotNull(dstMac);
970 assertNotNull(srcIp);
971 assertNotNull(dstIp);
972
973 IPacket ndp;
974 if (type == ICMP6.NEIGHBOR_SOLICITATION) {
975 ndp = new NeighborSolicitation().setTargetAddress(dstIp.toOctets());
976 } else {
977 ndp = new NeighborAdvertisement()
978 .setSolicitedFlag((byte) 1)
979 .setOverrideFlag((byte) 1)
980 .setTargetAddress(srcIp.toOctets())
981 .addOption(NeighborDiscoveryOptions.TYPE_TARGET_LL_ADDRESS,
982 srcMac.toBytes());
983 }
984
985 ICMP6 icmp6 = new ICMP6();
986 icmp6.setIcmpType(type);
987 icmp6.setIcmpCode((byte) 0);
988 icmp6.setPayload(ndp);
989
990 IPv6 ipv6 = new IPv6();
991 ipv6.setDestinationAddress(dstIp.toOctets());
992 ipv6.setSourceAddress(srcIp.toOctets());
993 ipv6.setNextHeader(IPv6.PROTOCOL_ICMP6);
994 ipv6.setHopLimit((byte) 255);
995 ipv6.setPayload(icmp6);
996
997 Ethernet eth = new Ethernet();
998 eth.setDestinationMACAddress(dstMac);
999 eth.setSourceMACAddress(srcMac);
1000 eth.setEtherType(Ethernet.TYPE_IPV6);
1001 eth.setVlanID(VLAN1.toShort());
1002 eth.setPayload(ipv6);
1003
1004 return eth;
1005 }
1006
1007 /**
Jonathan Hart704ca142014-10-09 09:34:39 -07001008 * Test PacketService implementation that simply stores OutboundPackets
1009 * passed to {@link #emit(OutboundPacket)} for later verification.
1010 */
Thomas Vachuska27bee092015-06-23 19:03:10 -07001011 class TestPacketService extends PacketServiceAdapter {
Jonathan Hart704ca142014-10-09 09:34:39 -07001012
1013 List<OutboundPacket> packets = new ArrayList<>();
1014
1015 @Override
Jonathan Hart704ca142014-10-09 09:34:39 -07001016 public void emit(OutboundPacket packet) {
1017 packets.add(packet);
1018 }
Jonathan Hart3cfce8e2015-01-14 16:43:27 -08001019
Jonathan Hart704ca142014-10-09 09:34:39 -07001020 }
Aaron Kruglikovd8123832015-07-06 14:20:25 -07001021
1022 class TestEdgePortService extends EdgeManager {
1023
1024 @Override
1025 public boolean isEdgePoint(ConnectPoint connectPoint) {
1026 return isEdgePointReturn;
1027 }
1028
1029 @Override
1030 public Iterable<ConnectPoint> getEdgePoints() {
1031 return getEdgePointsNoArg;
1032 }
1033 }
Thomas Vachuskab2c47a72015-08-05 14:22:54 -07001034
1035 private class TestProxyArpStoreAdapter implements ProxyArpStore {
1036 @Override
1037 public void forward(ConnectPoint outPort, Host subject, ByteBuffer packet) {
1038 TrafficTreatment tt = DefaultTrafficTreatment.builder().setOutput(outPort.port()).build();
1039 packetService.emit(new DefaultOutboundPacket(outPort.deviceId(), tt, packet));
1040 }
1041
1042 @Override
1043 public void setDelegate(ProxyArpStoreDelegate delegate) {
1044 }
1045 }
Jonathan Hart704ca142014-10-09 09:34:39 -07001046}