blob: e96602bf121912aa7a656a3b7bb3b19d9460e64e [file] [log] [blame]
Thomas Vachuska4f1a60c2014-10-28 13:39:07 -07001/*
Ray Milkey34c95902015-04-15 09:47:53 -07002 * Copyright 2014-2015 Open Networking Laboratory
Thomas Vachuska4f1a60c2014-10-28 13:39:07 -07003 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
Brian O'Connorabafb502014-12-02 22:26:20 -080016package org.onosproject.net.proxyarp.impl;
Jonathan Hart704ca142014-10-09 09:34:39 -070017
Aaron Kruglikovd8123832015-07-06 14:20:25 -070018import com.google.common.collect.Lists;
Thomas Vachuska27bee092015-06-23 19:03:10 -070019import com.google.common.collect.Sets;
Jonathan Hart704ca142014-10-09 09:34:39 -070020import org.junit.Before;
21import org.junit.Test;
Jonathan Hart3cfce8e2015-01-14 16:43:27 -080022import org.onlab.packet.ARP;
23import org.onlab.packet.Ethernet;
24import org.onlab.packet.Ip4Address;
25import org.onlab.packet.Ip4Prefix;
26import org.onlab.packet.MacAddress;
27import org.onlab.packet.VlanId;
Brian O'Connorabafb502014-12-02 22:26:20 -080028import org.onosproject.net.ConnectPoint;
29import org.onosproject.net.DefaultHost;
30import org.onosproject.net.Device;
31import org.onosproject.net.DeviceId;
32import org.onosproject.net.Host;
33import org.onosproject.net.HostId;
34import org.onosproject.net.HostLocation;
35import org.onosproject.net.Link;
36import org.onosproject.net.Port;
37import org.onosproject.net.PortNumber;
38import org.onosproject.net.device.DeviceListener;
39import org.onosproject.net.device.DeviceService;
Aaron Kruglikovd8123832015-07-06 14:20:25 -070040import org.onosproject.net.edgeservice.impl.EdgeManager;
Thomas Vachuskab2c47a72015-08-05 14:22:54 -070041import org.onosproject.net.flow.DefaultTrafficTreatment;
42import org.onosproject.net.flow.TrafficTreatment;
Brian O'Connorabafb502014-12-02 22:26:20 -080043import org.onosproject.net.flow.instructions.Instruction;
44import org.onosproject.net.flow.instructions.Instructions.OutputInstruction;
45import org.onosproject.net.host.HostService;
46import org.onosproject.net.host.InterfaceIpAddress;
47import org.onosproject.net.host.PortAddresses;
48import org.onosproject.net.link.LinkListener;
49import org.onosproject.net.link.LinkService;
Thomas Vachuskab2c47a72015-08-05 14:22:54 -070050import org.onosproject.net.packet.DefaultOutboundPacket;
Brian O'Connorabafb502014-12-02 22:26:20 -080051import org.onosproject.net.packet.OutboundPacket;
Thomas Vachuska27bee092015-06-23 19:03:10 -070052import org.onosproject.net.packet.PacketServiceAdapter;
Brian O'Connorabafb502014-12-02 22:26:20 -080053import org.onosproject.net.provider.ProviderId;
Thomas Vachuskab2c47a72015-08-05 14:22:54 -070054import org.onosproject.net.proxyarp.ProxyArpStore;
55import org.onosproject.net.proxyarp.ProxyArpStoreDelegate;
Jonathan Hart704ca142014-10-09 09:34:39 -070056
Thomas Vachuskab2c47a72015-08-05 14:22:54 -070057import java.nio.ByteBuffer;
Thomas Vachuska27bee092015-06-23 19:03:10 -070058import java.util.ArrayList;
59import java.util.Collections;
60import java.util.Comparator;
61import java.util.List;
62import java.util.Set;
63
Thomas Vachuskab2c47a72015-08-05 14:22:54 -070064import static org.easymock.EasyMock.*;
65import static org.junit.Assert.*;
Jonathan Hart704ca142014-10-09 09:34:39 -070066
67/**
68 * Tests for the {@link ProxyArpManager} class.
69 */
70public class ProxyArpManagerTest {
71
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -070072 private static final int NUM_DEVICES = 6;
Jonathan Hart704ca142014-10-09 09:34:39 -070073 private static final int NUM_PORTS_PER_DEVICE = 3;
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -070074 private static final int NUM_ADDRESS_PORTS = NUM_DEVICES / 2;
75 private static final int NUM_FLOOD_PORTS = 3;
Jonathan Hart704ca142014-10-09 09:34:39 -070076
Pavlin Radoslavov5b5dc482014-11-05 14:48:08 -080077 private static final Ip4Address IP1 = Ip4Address.valueOf("192.168.1.1");
78 private static final Ip4Address IP2 = Ip4Address.valueOf("192.168.1.2");
Jonathan Hart704ca142014-10-09 09:34:39 -070079
80 private static final ProviderId PID = new ProviderId("of", "foo");
81
82 private static final VlanId VLAN1 = VlanId.vlanId((short) 1);
83 private static final VlanId VLAN2 = VlanId.vlanId((short) 2);
84 private static final MacAddress MAC1 = MacAddress.valueOf("00:00:11:00:00:01");
85 private static final MacAddress MAC2 = MacAddress.valueOf("00:00:22:00:00:02");
86 private static final HostId HID1 = HostId.hostId(MAC1, VLAN1);
87 private static final HostId HID2 = HostId.hostId(MAC2, VLAN1);
88
89 private static final DeviceId DID1 = getDeviceId(1);
90 private static final DeviceId DID2 = getDeviceId(2);
91 private static final PortNumber P1 = PortNumber.portNumber(1);
92 private static final HostLocation LOC1 = new HostLocation(DID1, P1, 123L);
93 private static final HostLocation LOC2 = new HostLocation(DID2, P1, 123L);
Yuta HIGUCHI3e848a82014-11-02 20:19:42 -080094 private static final byte[] ZERO_MAC_ADDRESS = MacAddress.ZERO.toBytes();
Jonathan Hart704ca142014-10-09 09:34:39 -070095
Aaron Kruglikovd8123832015-07-06 14:20:25 -070096 //Return values used for various functions of the TestPacketService inner class.
97 private boolean isEdgePointReturn;
98 private List<ConnectPoint> getEdgePointsNoArg;
99
100
Jonathan Hart704ca142014-10-09 09:34:39 -0700101 private ProxyArpManager proxyArp;
102
103 private TestPacketService packetService;
Jonathan Hart704ca142014-10-09 09:34:39 -0700104 private DeviceService deviceService;
105 private LinkService linkService;
106 private HostService hostService;
107
108 @Before
109 public void setUp() throws Exception {
110 proxyArp = new ProxyArpManager();
111 packetService = new TestPacketService();
112 proxyArp.packetService = packetService;
Thomas Vachuskab2c47a72015-08-05 14:22:54 -0700113 proxyArp.store = new TestProxyArpStoreAdapter();
Jonathan Hart704ca142014-10-09 09:34:39 -0700114
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700115 proxyArp.edgeService = new TestEdgePortService();
116
Jonathan Hart704ca142014-10-09 09:34:39 -0700117 // Create a host service mock here. Must be replayed by tests once the
118 // expectations have been set up
119 hostService = createMock(HostService.class);
120 proxyArp.hostService = hostService;
121
122 createTopology();
123 proxyArp.deviceService = deviceService;
124 proxyArp.linkService = linkService;
125
126 proxyArp.activate();
127 }
128
129 /**
130 * Creates a fake topology to feed into the ARP module.
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700131 * <p>
Jonathan Hart704ca142014-10-09 09:34:39 -0700132 * The default topology is a unidirectional ring topology. Each switch has
133 * 3 ports. Ports 2 and 3 have the links to neighbor switches, and port 1
134 * is free (edge port).
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700135 * The first half of the switches have IP addresses configured on their
136 * free ports (port 1). The second half of the switches have no IP
137 * addresses configured.
Jonathan Hart704ca142014-10-09 09:34:39 -0700138 */
139 private void createTopology() {
140 deviceService = createMock(DeviceService.class);
141 linkService = createMock(LinkService.class);
142
143 deviceService.addListener(anyObject(DeviceListener.class));
144 linkService.addListener(anyObject(LinkListener.class));
145
146 createDevices(NUM_DEVICES, NUM_PORTS_PER_DEVICE);
147 createLinks(NUM_DEVICES);
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700148 addAddressBindings();
Jonathan Hart704ca142014-10-09 09:34:39 -0700149 }
150
151 /**
152 * Creates the devices for the fake topology.
153 */
154 private void createDevices(int numDevices, int numPorts) {
155 List<Device> devices = new ArrayList<>();
156
157 for (int i = 1; i <= numDevices; i++) {
158 DeviceId devId = getDeviceId(i);
159 Device device = createMock(Device.class);
160 expect(device.id()).andReturn(devId).anyTimes();
161 replay(device);
162
163 devices.add(device);
164
165 List<Port> ports = new ArrayList<>();
166 for (int j = 1; j <= numPorts; j++) {
167 Port port = createMock(Port.class);
168 expect(port.number()).andReturn(PortNumber.portNumber(j)).anyTimes();
169 replay(port);
170 ports.add(port);
171 }
172
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700173 expect(deviceService.getPorts(devId)).andReturn(ports).anyTimes();
174 expect(deviceService.getDevice(devId)).andReturn(device).anyTimes();
Jonathan Hart704ca142014-10-09 09:34:39 -0700175 }
176
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700177 expect(deviceService.getDevices()).andReturn(devices).anyTimes();
Jonathan Hart704ca142014-10-09 09:34:39 -0700178 replay(deviceService);
179 }
180
181 /**
182 * Creates the links for the fake topology.
183 * NB: Only unidirectional links are created, as for this purpose all we
184 * need is to occupy the ports with some link.
185 */
186 private void createLinks(int numDevices) {
187 List<Link> links = new ArrayList<Link>();
188
189 for (int i = 1; i <= numDevices; i++) {
190 ConnectPoint src = new ConnectPoint(
191 getDeviceId(i),
192 PortNumber.portNumber(2));
193 ConnectPoint dst = new ConnectPoint(
194 getDeviceId((i + 1 > numDevices) ? 1 : i + 1),
195 PortNumber.portNumber(3));
196
197 Link link = createMock(Link.class);
198 expect(link.src()).andReturn(src).anyTimes();
199 expect(link.dst()).andReturn(dst).anyTimes();
200 replay(link);
201
202 links.add(link);
203 }
204
205 expect(linkService.getLinks()).andReturn(links).anyTimes();
206 replay(linkService);
207 }
208
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700209 private void addAddressBindings() {
210 Set<PortAddresses> addresses = Sets.newHashSet();
211
212 for (int i = 1; i <= NUM_ADDRESS_PORTS; i++) {
213 ConnectPoint cp = new ConnectPoint(getDeviceId(i), P1);
Pavlin Radoslavov5b5dc482014-11-05 14:48:08 -0800214 Ip4Prefix prefix1 =
Thomas Vachuska27bee092015-06-23 19:03:10 -0700215 Ip4Prefix.valueOf("10.0." + (2 * i - 1) + ".0/24");
Pavlin Radoslavov5b5dc482014-11-05 14:48:08 -0800216 Ip4Address addr1 =
Thomas Vachuska27bee092015-06-23 19:03:10 -0700217 Ip4Address.valueOf("10.0." + (2 * i - 1) + ".1");
Pavlin Radoslavov5b5dc482014-11-05 14:48:08 -0800218 Ip4Prefix prefix2 = Ip4Prefix.valueOf("10.0." + (2 * i) + ".0/24");
219 Ip4Address addr2 = Ip4Address.valueOf("10.0." + (2 * i) + ".1");
Pavlin Radoslavov76b0ae22014-10-27 15:33:19 -0700220 InterfaceIpAddress ia1 = new InterfaceIpAddress(addr1, prefix1);
221 InterfaceIpAddress ia2 = new InterfaceIpAddress(addr2, prefix2);
Jonathan Harta887ba82014-11-03 15:20:52 -0800222 PortAddresses pa1 =
Thomas Vachuska27bee092015-06-23 19:03:10 -0700223 new PortAddresses(cp, Sets.newHashSet(ia1),
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700224 MacAddress.valueOf(2 * i - 1),
225 VlanId.vlanId((short) 1));
Jonathan Harta887ba82014-11-03 15:20:52 -0800226 PortAddresses pa2 =
227 new PortAddresses(cp, Sets.newHashSet(ia2),
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700228 MacAddress.valueOf(2 * i),
229 VlanId.NONE);
Jonathan Harta887ba82014-11-03 15:20:52 -0800230
231 addresses.add(pa1);
232 addresses.add(pa2);
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700233
234 expect(hostService.getAddressBindingsForPort(cp))
Jonathan Harta887ba82014-11-03 15:20:52 -0800235 .andReturn(Sets.newHashSet(pa1, pa2)).anyTimes();
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700236 }
237
238 expect(hostService.getAddressBindings()).andReturn(addresses).anyTimes();
239
240 for (int i = 1; i <= NUM_FLOOD_PORTS; i++) {
241 ConnectPoint cp = new ConnectPoint(getDeviceId(i + NUM_ADDRESS_PORTS),
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700242 P1);
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700243 expect(hostService.getAddressBindingsForPort(cp))
Jonathan Harta887ba82014-11-03 15:20:52 -0800244 .andReturn(Collections.<PortAddresses>emptySet()).anyTimes();
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700245 }
246 }
247
Jonathan Hart704ca142014-10-09 09:34:39 -0700248 /**
Jonathan Hart7d1496b2015-03-10 22:00:48 -0700249 * Tests {@link ProxyArpManager#isKnown(org.onlab.packet.IpAddress)} in the
250 * case where the IP address is not known.
Jonathan Hart704ca142014-10-09 09:34:39 -0700251 * Verifies the method returns false.
252 */
253 @Test
254 public void testNotKnown() {
255 expect(hostService.getHostsByIp(IP1)).andReturn(Collections.<Host>emptySet());
256 replay(hostService);
257
Jonathan Hartf84591d2015-01-16 14:33:43 -0800258 assertFalse(proxyArp.isKnown(IP1));
Jonathan Hart704ca142014-10-09 09:34:39 -0700259 }
260
261 /**
Jonathan Hart7d1496b2015-03-10 22:00:48 -0700262 * Tests {@link ProxyArpManager#isKnown(org.onlab.packet.IpAddress)} in the
263 * case where the IP address is known.
Jonathan Hart704ca142014-10-09 09:34:39 -0700264 * Verifies the method returns true.
265 */
266 @Test
267 public void testKnown() {
268 Host host1 = createMock(Host.class);
269 Host host2 = createMock(Host.class);
270
271 expect(hostService.getHostsByIp(IP1))
272 .andReturn(Sets.newHashSet(host1, host2));
273 replay(hostService);
274
Jonathan Hartf84591d2015-01-16 14:33:43 -0800275 assertTrue(proxyArp.isKnown(IP1));
Jonathan Hart704ca142014-10-09 09:34:39 -0700276 }
277
278 /**
Jonathan Hart6cd2f352015-01-13 17:44:45 -0800279 * Tests {@link ProxyArpManager#reply(Ethernet, ConnectPoint)} in the case where the
Jonathan Hart704ca142014-10-09 09:34:39 -0700280 * destination host is known.
281 * Verifies the correct ARP reply is sent out the correct port.
282 */
283 @Test
284 public void testReplyKnown() {
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700285 //Set the return value of isEdgePoint from the edgemanager.
286 isEdgePointReturn = true;
287
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700288 Host replyer = new DefaultHost(PID, HID1, MAC1, VLAN1, getLocation(4),
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700289 Collections.singleton(IP1));
Jonathan Hart704ca142014-10-09 09:34:39 -0700290
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700291 Host requestor = new DefaultHost(PID, HID2, MAC2, VLAN1, getLocation(5),
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700292 Collections.singleton(IP2));
Jonathan Hart704ca142014-10-09 09:34:39 -0700293
Pavlin Radoslavov33f228a2014-10-27 19:33:16 -0700294 expect(hostService.getHostsByIp(IP1))
Thomas Vachuska27bee092015-06-23 19:03:10 -0700295 .andReturn(Collections.singleton(replyer));
Jonathan Hart704ca142014-10-09 09:34:39 -0700296 expect(hostService.getHost(HID2)).andReturn(requestor);
297
298 replay(hostService);
299
300 Ethernet arpRequest = buildArp(ARP.OP_REQUEST, MAC2, null, IP2, IP1);
301
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700302 proxyArp.reply(arpRequest, getLocation(5));
Jonathan Hart704ca142014-10-09 09:34:39 -0700303
304 assertEquals(1, packetService.packets.size());
305 Ethernet arpReply = buildArp(ARP.OP_REPLY, MAC1, MAC2, IP1, IP2);
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700306 verifyPacketOut(arpReply, getLocation(5), packetService.packets.get(0));
Jonathan Hart704ca142014-10-09 09:34:39 -0700307 }
308
309 /**
Jonathan Hart6cd2f352015-01-13 17:44:45 -0800310 * Tests {@link ProxyArpManager#reply(Ethernet, ConnectPoint)} in the case where the
Jonathan Hart704ca142014-10-09 09:34:39 -0700311 * destination host is not known.
312 * Verifies the ARP request is flooded out the correct edge ports.
313 */
314 @Test
315 public void testReplyUnknown() {
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700316 isEdgePointReturn = true;
317
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700318 Host requestor = new DefaultHost(PID, HID2, MAC2, VLAN1, getLocation(5),
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700319 Collections.singleton(IP2));
Jonathan Hart704ca142014-10-09 09:34:39 -0700320
Pavlin Radoslavov33f228a2014-10-27 19:33:16 -0700321 expect(hostService.getHostsByIp(IP1))
Jonathan Hart704ca142014-10-09 09:34:39 -0700322 .andReturn(Collections.<Host>emptySet());
323 expect(hostService.getHost(HID2)).andReturn(requestor);
324
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700325
Jonathan Hart704ca142014-10-09 09:34:39 -0700326 replay(hostService);
327
328 Ethernet arpRequest = buildArp(ARP.OP_REQUEST, MAC2, null, IP2, IP1);
329
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700330 //Setup the set of edge ports to be used in the reply method
331 getEdgePointsNoArg = Lists.newLinkedList();
332 getEdgePointsNoArg.add(new ConnectPoint(DeviceId.deviceId("5"), PortNumber.portNumber(1)));
333 getEdgePointsNoArg.add(new ConnectPoint(DeviceId.deviceId("4"), PortNumber.portNumber(1)));
334
Jonathan Hartf84591d2015-01-16 14:33:43 -0800335 proxyArp.reply(arpRequest, getLocation(6));
Jonathan Hart704ca142014-10-09 09:34:39 -0700336
337 verifyFlood(arpRequest);
338 }
339
340 /**
Jonathan Hart6cd2f352015-01-13 17:44:45 -0800341 * Tests {@link ProxyArpManager#reply(Ethernet, ConnectPoint)} in the case where the
Jonathan Hart704ca142014-10-09 09:34:39 -0700342 * destination host is known for that IP address, but is not on the same
343 * VLAN as the source host.
344 * Verifies the ARP request is flooded out the correct edge ports.
345 */
346 @Test
347 public void testReplyDifferentVlan() {
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700348
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700349 Host replyer = new DefaultHost(PID, HID1, MAC1, VLAN2, getLocation(4),
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700350 Collections.singleton(IP1));
Jonathan Hart704ca142014-10-09 09:34:39 -0700351
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700352 Host requestor = new DefaultHost(PID, HID2, MAC2, VLAN1, getLocation(5),
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700353 Collections.singleton(IP2));
Jonathan Hart704ca142014-10-09 09:34:39 -0700354
Pavlin Radoslavov33f228a2014-10-27 19:33:16 -0700355 expect(hostService.getHostsByIp(IP1))
Jonathan Hart704ca142014-10-09 09:34:39 -0700356 .andReturn(Collections.singleton(replyer));
357 expect(hostService.getHost(HID2)).andReturn(requestor);
358
359 replay(hostService);
360
361 Ethernet arpRequest = buildArp(ARP.OP_REQUEST, MAC2, null, IP2, IP1);
362
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700363 //Setup for flood test
364 getEdgePointsNoArg = Lists.newLinkedList();
365 getEdgePointsNoArg.add(new ConnectPoint(DeviceId.deviceId("5"), PortNumber.portNumber(1)));
366 getEdgePointsNoArg.add(new ConnectPoint(DeviceId.deviceId("4"), PortNumber.portNumber(1)));
Jonathan Hartf84591d2015-01-16 14:33:43 -0800367 proxyArp.reply(arpRequest, getLocation(6));
Jonathan Hart704ca142014-10-09 09:34:39 -0700368
369 verifyFlood(arpRequest);
370 }
371
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700372 @Test
373 public void testReplyToRequestForUs() {
Pavlin Radoslavov5b5dc482014-11-05 14:48:08 -0800374 Ip4Address theirIp = Ip4Address.valueOf("10.0.1.254");
375 Ip4Address ourFirstIp = Ip4Address.valueOf("10.0.1.1");
376 Ip4Address ourSecondIp = Ip4Address.valueOf("10.0.2.1");
Jonathan Harta887ba82014-11-03 15:20:52 -0800377 MacAddress firstMac = MacAddress.valueOf(1L);
378 MacAddress secondMac = MacAddress.valueOf(2L);
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700379
380 Host requestor = new DefaultHost(PID, HID2, MAC2, VLAN1, LOC1,
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700381 Collections.singleton(theirIp));
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700382
383 expect(hostService.getHost(HID2)).andReturn(requestor);
384 replay(hostService);
385
386 Ethernet arpRequest = buildArp(ARP.OP_REQUEST, MAC2, null, theirIp, ourFirstIp);
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700387 isEdgePointReturn = true;
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700388 proxyArp.reply(arpRequest, LOC1);
389
390 assertEquals(1, packetService.packets.size());
Jonathan Harta887ba82014-11-03 15:20:52 -0800391 Ethernet arpReply = buildArp(ARP.OP_REPLY, firstMac, MAC2, ourFirstIp, theirIp);
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700392 verifyPacketOut(arpReply, LOC1, packetService.packets.get(0));
393
394 // Test a request for the second address on that port
395 packetService.packets.clear();
396 arpRequest = buildArp(ARP.OP_REQUEST, MAC2, null, theirIp, ourSecondIp);
397
398 proxyArp.reply(arpRequest, LOC1);
399
400 assertEquals(1, packetService.packets.size());
Jonathan Harta887ba82014-11-03 15:20:52 -0800401 arpReply = buildArp(ARP.OP_REPLY, secondMac, MAC2, ourSecondIp, theirIp);
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700402 verifyPacketOut(arpReply, LOC1, packetService.packets.get(0));
403 }
404
405 @Test
406 public void testReplyExternalPortBadRequest() {
407 replay(hostService); // no further host service expectations
408
Pavlin Radoslavov5b5dc482014-11-05 14:48:08 -0800409 Ip4Address theirIp = Ip4Address.valueOf("10.0.1.254");
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700410
411 // Request for a valid external IP address but coming in the wrong port
412 Ethernet arpRequest = buildArp(ARP.OP_REQUEST, MAC1, null, theirIp,
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700413 Ip4Address.valueOf("10.0.3.1"));
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700414 proxyArp.reply(arpRequest, LOC1);
415 assertEquals(0, packetService.packets.size());
416
417 // Request for a valid internal IP address but coming in an external port
418 packetService.packets.clear();
419 arpRequest = buildArp(ARP.OP_REQUEST, MAC1, null, theirIp, IP1);
420 proxyArp.reply(arpRequest, LOC1);
421 assertEquals(0, packetService.packets.size());
422 }
423
424 @Test
425 public void testReplyToRequestFromUs() {
Pavlin Radoslavov5b5dc482014-11-05 14:48:08 -0800426 Ip4Address ourIp = Ip4Address.valueOf("10.0.1.1");
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700427 MacAddress ourMac = MacAddress.valueOf(1L);
Pavlin Radoslavov5b5dc482014-11-05 14:48:08 -0800428 Ip4Address theirIp = Ip4Address.valueOf("10.0.1.100");
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700429
Jonathan Hart7d1496b2015-03-10 22:00:48 -0700430 expect(hostService.getHostsByIp(theirIp)).andReturn(Collections.emptySet());
431 expect(hostService.getHost(HostId.hostId(ourMac, VLAN1))).andReturn(null);
432 replay(hostService);
433
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700434 // This is a request from something inside our network (like a BGP
435 // daemon) to an external host.
436 Ethernet arpRequest = buildArp(ARP.OP_REQUEST, ourMac, null, ourIp, theirIp);
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700437 //Ensure the packet is allowed through (it is not to an internal port)
438 isEdgePointReturn = true;
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700439
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700440 proxyArp.reply(arpRequest, getLocation(5));
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700441 assertEquals(1, packetService.packets.size());
442 verifyPacketOut(arpRequest, getLocation(1), packetService.packets.get(0));
443
444 // The same request from a random external port should fail
445 packetService.packets.clear();
446 proxyArp.reply(arpRequest, getLocation(2));
447 assertEquals(0, packetService.packets.size());
448 }
449
Jonathan Hart704ca142014-10-09 09:34:39 -0700450 /**
Jonathan Hart6cd2f352015-01-13 17:44:45 -0800451 * Tests {@link ProxyArpManager#forward(Ethernet, ConnectPoint)} in the case where the
Jonathan Hart704ca142014-10-09 09:34:39 -0700452 * destination host is known.
453 * Verifies the correct ARP request is sent out the correct port.
454 */
455 @Test
456 public void testForwardToHost() {
457 Host host1 = new DefaultHost(PID, HID1, MAC1, VLAN1, LOC1,
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700458 Collections.singleton(IP1));
Thomas Vachuskab2c47a72015-08-05 14:22:54 -0700459 Host host2 = new DefaultHost(PID, HID2, MAC2, VLAN1, LOC2,
460 Collections.singleton(IP2));
Jonathan Hart704ca142014-10-09 09:34:39 -0700461
462 expect(hostService.getHost(HID1)).andReturn(host1);
Thomas Vachuskab2c47a72015-08-05 14:22:54 -0700463 expect(hostService.getHost(HID2)).andReturn(host2);
Jonathan Hart704ca142014-10-09 09:34:39 -0700464 replay(hostService);
465
466 Ethernet arpRequest = buildArp(ARP.OP_REPLY, MAC2, MAC1, IP2, IP1);
467
Jonathan Hartf84591d2015-01-16 14:33:43 -0800468 proxyArp.forward(arpRequest, LOC2);
Jonathan Hart704ca142014-10-09 09:34:39 -0700469
470 assertEquals(1, packetService.packets.size());
471 OutboundPacket packet = packetService.packets.get(0);
472
473 verifyPacketOut(arpRequest, LOC1, packet);
474 }
475
476 /**
Jonathan Hart6cd2f352015-01-13 17:44:45 -0800477 * Tests {@link ProxyArpManager#forward(Ethernet, ConnectPoint)} in the case where the
Jonathan Hart704ca142014-10-09 09:34:39 -0700478 * destination host is not known.
479 * Verifies the correct ARP request is flooded out the correct edge ports.
480 */
481 @Test
482 public void testForwardFlood() {
483 expect(hostService.getHost(HID1)).andReturn(null);
484 replay(hostService);
485
486 Ethernet arpRequest = buildArp(ARP.OP_REPLY, MAC2, MAC1, IP2, IP1);
487
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700488 //populate the list of edges when so that when forward hits flood in the manager it contains the values
489 //that should continue on
490 getEdgePointsNoArg = Lists.newLinkedList();
491 getEdgePointsNoArg.add(new ConnectPoint(DeviceId.deviceId("3"), PortNumber.portNumber(1)));
492 getEdgePointsNoArg.add(new ConnectPoint(DeviceId.deviceId("5"), PortNumber.portNumber(1)));
493 getEdgePointsNoArg.add(new ConnectPoint(DeviceId.deviceId("4"), PortNumber.portNumber(1)));
494
Jonathan Hartf84591d2015-01-16 14:33:43 -0800495 proxyArp.forward(arpRequest, getLocation(6));
Jonathan Hart704ca142014-10-09 09:34:39 -0700496
497 verifyFlood(arpRequest);
498 }
499
500 /**
Jonathan Hartf84591d2015-01-16 14:33:43 -0800501 * Verifies that the given packet was flooded out all available edge ports,
502 * except for the input port.
Jonathan Hart704ca142014-10-09 09:34:39 -0700503 *
504 * @param packet the packet that was expected to be flooded
505 */
506 private void verifyFlood(Ethernet packet) {
Jonathan Hartf84591d2015-01-16 14:33:43 -0800507 // There should be 1 less than NUM_FLOOD_PORTS; the inPort should be excluded.
508 assertEquals(NUM_FLOOD_PORTS - 1, packetService.packets.size());
Jonathan Hart704ca142014-10-09 09:34:39 -0700509
510 Collections.sort(packetService.packets,
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700511 new Comparator<OutboundPacket>() {
512 @Override
513 public int compare(OutboundPacket o1, OutboundPacket o2) {
514 return o1.sendThrough().uri().compareTo(o2.sendThrough().uri());
515 }
516 });
Jonathan Hart704ca142014-10-09 09:34:39 -0700517
Jonathan Hartf84591d2015-01-16 14:33:43 -0800518
519 for (int i = 0; i < NUM_FLOOD_PORTS - 1; i++) {
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700520 ConnectPoint cp = new ConnectPoint(getDeviceId(NUM_ADDRESS_PORTS + i + 1),
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700521 PortNumber.portNumber(1));
Jonathan Hart704ca142014-10-09 09:34:39 -0700522
523 OutboundPacket outboundPacket = packetService.packets.get(i);
524 verifyPacketOut(packet, cp, outboundPacket);
525 }
526 }
527
528 /**
529 * Verifies the given packet was sent out the given port.
530 *
531 * @param expected the packet that was expected to be sent
Thomas Vachuska27bee092015-06-23 19:03:10 -0700532 * @param outPort the port the packet was expected to be sent out
533 * @param actual the actual OutboundPacket to verify
Jonathan Hart704ca142014-10-09 09:34:39 -0700534 */
535 private void verifyPacketOut(Ethernet expected, ConnectPoint outPort,
Thomas Vachuska27bee092015-06-23 19:03:10 -0700536 OutboundPacket actual) {
Yuta HIGUCHI3e848a82014-11-02 20:19:42 -0800537 assertArrayEquals(expected.serialize(), actual.data().array());
Ray Milkey42507352015-03-20 15:16:10 -0700538 assertEquals(1, actual.treatment().immediate().size());
Jonathan Hart704ca142014-10-09 09:34:39 -0700539 assertEquals(outPort.deviceId(), actual.sendThrough());
Ray Milkey42507352015-03-20 15:16:10 -0700540 Instruction instruction = actual.treatment().immediate().get(0);
Jonathan Hart704ca142014-10-09 09:34:39 -0700541 assertTrue(instruction instanceof OutputInstruction);
542 assertEquals(outPort.port(), ((OutputInstruction) instruction).port());
543 }
544
545 /**
546 * Returns the device ID of the ith device.
547 *
548 * @param i device to get the ID of
549 * @return the device ID
550 */
551 private static DeviceId getDeviceId(int i) {
552 return DeviceId.deviceId("" + i);
553 }
554
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700555 private static HostLocation getLocation(int i) {
556 return new HostLocation(new ConnectPoint(getDeviceId(i), P1), 123L);
557 }
558
Jonathan Hart704ca142014-10-09 09:34:39 -0700559 /**
560 * Builds an ARP packet with the given parameters.
561 *
562 * @param opcode opcode of the ARP packet
563 * @param srcMac source MAC address
564 * @param dstMac destination MAC address, or null if this is a request
Thomas Vachuska27bee092015-06-23 19:03:10 -0700565 * @param srcIp source IP address
566 * @param dstIp destination IP address
Jonathan Hart704ca142014-10-09 09:34:39 -0700567 * @return the ARP packet
568 */
569 private Ethernet buildArp(short opcode, MacAddress srcMac, MacAddress dstMac,
Thomas Vachuska27bee092015-06-23 19:03:10 -0700570 Ip4Address srcIp, Ip4Address dstIp) {
Jonathan Hart704ca142014-10-09 09:34:39 -0700571 Ethernet eth = new Ethernet();
572
573 if (dstMac == null) {
Yuta HIGUCHI3e848a82014-11-02 20:19:42 -0800574 eth.setDestinationMACAddress(MacAddress.BROADCAST);
Jonathan Hart704ca142014-10-09 09:34:39 -0700575 } else {
Yuta HIGUCHI3e848a82014-11-02 20:19:42 -0800576 eth.setDestinationMACAddress(dstMac);
Jonathan Hart704ca142014-10-09 09:34:39 -0700577 }
578
Yuta HIGUCHI3e848a82014-11-02 20:19:42 -0800579 eth.setSourceMACAddress(srcMac);
Jonathan Hart704ca142014-10-09 09:34:39 -0700580 eth.setEtherType(Ethernet.TYPE_ARP);
581 eth.setVlanID(VLAN1.toShort());
582
583 ARP arp = new ARP();
584 arp.setOpCode(opcode);
585 arp.setProtocolType(ARP.PROTO_TYPE_IP);
586 arp.setHardwareType(ARP.HW_TYPE_ETHERNET);
587
Pavlin Radoslavov5b5dc482014-11-05 14:48:08 -0800588 arp.setProtocolAddressLength((byte) Ip4Address.BYTE_LENGTH);
Jonathan Hart704ca142014-10-09 09:34:39 -0700589 arp.setHardwareAddressLength((byte) Ethernet.DATALAYER_ADDRESS_LENGTH);
Yuta HIGUCHI3e848a82014-11-02 20:19:42 -0800590 arp.setSenderHardwareAddress(srcMac.toBytes());
Jonathan Hart704ca142014-10-09 09:34:39 -0700591
592 if (dstMac == null) {
Yuta HIGUCHI3e848a82014-11-02 20:19:42 -0800593 arp.setTargetHardwareAddress(ZERO_MAC_ADDRESS);
Jonathan Hart704ca142014-10-09 09:34:39 -0700594 } else {
Yuta HIGUCHI3e848a82014-11-02 20:19:42 -0800595 arp.setTargetHardwareAddress(dstMac.toBytes());
Jonathan Hart704ca142014-10-09 09:34:39 -0700596 }
597
598 arp.setSenderProtocolAddress(srcIp.toOctets());
599 arp.setTargetProtocolAddress(dstIp.toOctets());
600
601 eth.setPayload(arp);
602 return eth;
603 }
604
605 /**
606 * Test PacketService implementation that simply stores OutboundPackets
607 * passed to {@link #emit(OutboundPacket)} for later verification.
608 */
Thomas Vachuska27bee092015-06-23 19:03:10 -0700609 class TestPacketService extends PacketServiceAdapter {
Jonathan Hart704ca142014-10-09 09:34:39 -0700610
611 List<OutboundPacket> packets = new ArrayList<>();
612
613 @Override
Jonathan Hart704ca142014-10-09 09:34:39 -0700614 public void emit(OutboundPacket packet) {
615 packets.add(packet);
616 }
Jonathan Hart3cfce8e2015-01-14 16:43:27 -0800617
Jonathan Hart704ca142014-10-09 09:34:39 -0700618 }
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700619
620 class TestEdgePortService extends EdgeManager {
621
622 @Override
623 public boolean isEdgePoint(ConnectPoint connectPoint) {
624 return isEdgePointReturn;
625 }
626
627 @Override
628 public Iterable<ConnectPoint> getEdgePoints() {
629 return getEdgePointsNoArg;
630 }
631 }
Thomas Vachuskab2c47a72015-08-05 14:22:54 -0700632
633 private class TestProxyArpStoreAdapter implements ProxyArpStore {
634 @Override
635 public void forward(ConnectPoint outPort, Host subject, ByteBuffer packet) {
636 TrafficTreatment tt = DefaultTrafficTreatment.builder().setOutput(outPort.port()).build();
637 packetService.emit(new DefaultOutboundPacket(outPort.deviceId(), tt, packet));
638 }
639
640 @Override
641 public void setDelegate(ProxyArpStoreDelegate delegate) {
642 }
643 }
Jonathan Hart704ca142014-10-09 09:34:39 -0700644}