blob: 4a1c446297ab5db6bc371382a163f90c7519868a [file] [log] [blame]
Thomas Vachuska4f1a60c2014-10-28 13:39:07 -07001/*
Ray Milkey34c95902015-04-15 09:47:53 -07002 * Copyright 2014-2015 Open Networking Laboratory
Thomas Vachuska4f1a60c2014-10-28 13:39:07 -07003 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
Brian O'Connorabafb502014-12-02 22:26:20 -080016package org.onosproject.net.proxyarp.impl;
Jonathan Hart704ca142014-10-09 09:34:39 -070017
Aaron Kruglikovd8123832015-07-06 14:20:25 -070018import com.google.common.collect.Lists;
Thomas Vachuska27bee092015-06-23 19:03:10 -070019import com.google.common.collect.Sets;
Jonathan Hart704ca142014-10-09 09:34:39 -070020import org.junit.Before;
21import org.junit.Test;
Jonathan Hart3cfce8e2015-01-14 16:43:27 -080022import org.onlab.packet.ARP;
23import org.onlab.packet.Ethernet;
24import org.onlab.packet.Ip4Address;
25import org.onlab.packet.Ip4Prefix;
26import org.onlab.packet.MacAddress;
27import org.onlab.packet.VlanId;
Brian O'Connorabafb502014-12-02 22:26:20 -080028import org.onosproject.net.ConnectPoint;
29import org.onosproject.net.DefaultHost;
30import org.onosproject.net.Device;
31import org.onosproject.net.DeviceId;
32import org.onosproject.net.Host;
33import org.onosproject.net.HostId;
34import org.onosproject.net.HostLocation;
35import org.onosproject.net.Link;
36import org.onosproject.net.Port;
37import org.onosproject.net.PortNumber;
38import org.onosproject.net.device.DeviceListener;
39import org.onosproject.net.device.DeviceService;
Aaron Kruglikovd8123832015-07-06 14:20:25 -070040import org.onosproject.net.edgeservice.impl.EdgeManager;
Brian O'Connorabafb502014-12-02 22:26:20 -080041import org.onosproject.net.flow.instructions.Instruction;
42import org.onosproject.net.flow.instructions.Instructions.OutputInstruction;
43import org.onosproject.net.host.HostService;
44import org.onosproject.net.host.InterfaceIpAddress;
45import org.onosproject.net.host.PortAddresses;
46import org.onosproject.net.link.LinkListener;
47import org.onosproject.net.link.LinkService;
48import org.onosproject.net.packet.OutboundPacket;
Thomas Vachuska27bee092015-06-23 19:03:10 -070049import org.onosproject.net.packet.PacketServiceAdapter;
Brian O'Connorabafb502014-12-02 22:26:20 -080050import org.onosproject.net.provider.ProviderId;
Jonathan Hart704ca142014-10-09 09:34:39 -070051
Thomas Vachuska27bee092015-06-23 19:03:10 -070052import java.util.ArrayList;
53import java.util.Collections;
54import java.util.Comparator;
55import java.util.List;
56import java.util.Set;
57
Aaron Kruglikovd8123832015-07-06 14:20:25 -070058import static org.easymock.EasyMock.anyObject;
59import static org.easymock.EasyMock.createMock;
60import static org.easymock.EasyMock.expect;
61import static org.easymock.EasyMock.replay;
62import static org.junit.Assert.assertArrayEquals;
63import static org.junit.Assert.assertEquals;
64import static org.junit.Assert.assertFalse;
65import static org.junit.Assert.assertTrue;
Jonathan Hart704ca142014-10-09 09:34:39 -070066
67/**
68 * Tests for the {@link ProxyArpManager} class.
69 */
70public class ProxyArpManagerTest {
71
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -070072 private static final int NUM_DEVICES = 6;
Jonathan Hart704ca142014-10-09 09:34:39 -070073 private static final int NUM_PORTS_PER_DEVICE = 3;
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -070074 private static final int NUM_ADDRESS_PORTS = NUM_DEVICES / 2;
75 private static final int NUM_FLOOD_PORTS = 3;
Jonathan Hart704ca142014-10-09 09:34:39 -070076
Pavlin Radoslavov5b5dc482014-11-05 14:48:08 -080077 private static final Ip4Address IP1 = Ip4Address.valueOf("192.168.1.1");
78 private static final Ip4Address IP2 = Ip4Address.valueOf("192.168.1.2");
Jonathan Hart704ca142014-10-09 09:34:39 -070079
80 private static final ProviderId PID = new ProviderId("of", "foo");
81
82 private static final VlanId VLAN1 = VlanId.vlanId((short) 1);
83 private static final VlanId VLAN2 = VlanId.vlanId((short) 2);
84 private static final MacAddress MAC1 = MacAddress.valueOf("00:00:11:00:00:01");
85 private static final MacAddress MAC2 = MacAddress.valueOf("00:00:22:00:00:02");
86 private static final HostId HID1 = HostId.hostId(MAC1, VLAN1);
87 private static final HostId HID2 = HostId.hostId(MAC2, VLAN1);
88
89 private static final DeviceId DID1 = getDeviceId(1);
90 private static final DeviceId DID2 = getDeviceId(2);
91 private static final PortNumber P1 = PortNumber.portNumber(1);
92 private static final HostLocation LOC1 = new HostLocation(DID1, P1, 123L);
93 private static final HostLocation LOC2 = new HostLocation(DID2, P1, 123L);
Yuta HIGUCHI3e848a82014-11-02 20:19:42 -080094 private static final byte[] ZERO_MAC_ADDRESS = MacAddress.ZERO.toBytes();
Jonathan Hart704ca142014-10-09 09:34:39 -070095
Aaron Kruglikovd8123832015-07-06 14:20:25 -070096 //Return values used for various functions of the TestPacketService inner class.
97 private boolean isEdgePointReturn;
98 private List<ConnectPoint> getEdgePointsNoArg;
99
100
Jonathan Hart704ca142014-10-09 09:34:39 -0700101 private ProxyArpManager proxyArp;
102
103 private TestPacketService packetService;
Jonathan Hart704ca142014-10-09 09:34:39 -0700104 private DeviceService deviceService;
105 private LinkService linkService;
106 private HostService hostService;
107
108 @Before
109 public void setUp() throws Exception {
110 proxyArp = new ProxyArpManager();
111 packetService = new TestPacketService();
112 proxyArp.packetService = packetService;
113
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700114 proxyArp.edgeService = new TestEdgePortService();
115
Jonathan Hart704ca142014-10-09 09:34:39 -0700116 // Create a host service mock here. Must be replayed by tests once the
117 // expectations have been set up
118 hostService = createMock(HostService.class);
119 proxyArp.hostService = hostService;
120
121 createTopology();
122 proxyArp.deviceService = deviceService;
123 proxyArp.linkService = linkService;
124
125 proxyArp.activate();
126 }
127
128 /**
129 * Creates a fake topology to feed into the ARP module.
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700130 * <p>
Jonathan Hart704ca142014-10-09 09:34:39 -0700131 * The default topology is a unidirectional ring topology. Each switch has
132 * 3 ports. Ports 2 and 3 have the links to neighbor switches, and port 1
133 * is free (edge port).
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700134 * The first half of the switches have IP addresses configured on their
135 * free ports (port 1). The second half of the switches have no IP
136 * addresses configured.
Jonathan Hart704ca142014-10-09 09:34:39 -0700137 */
138 private void createTopology() {
139 deviceService = createMock(DeviceService.class);
140 linkService = createMock(LinkService.class);
141
142 deviceService.addListener(anyObject(DeviceListener.class));
143 linkService.addListener(anyObject(LinkListener.class));
144
145 createDevices(NUM_DEVICES, NUM_PORTS_PER_DEVICE);
146 createLinks(NUM_DEVICES);
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700147 addAddressBindings();
Jonathan Hart704ca142014-10-09 09:34:39 -0700148 }
149
150 /**
151 * Creates the devices for the fake topology.
152 */
153 private void createDevices(int numDevices, int numPorts) {
154 List<Device> devices = new ArrayList<>();
155
156 for (int i = 1; i <= numDevices; i++) {
157 DeviceId devId = getDeviceId(i);
158 Device device = createMock(Device.class);
159 expect(device.id()).andReturn(devId).anyTimes();
160 replay(device);
161
162 devices.add(device);
163
164 List<Port> ports = new ArrayList<>();
165 for (int j = 1; j <= numPorts; j++) {
166 Port port = createMock(Port.class);
167 expect(port.number()).andReturn(PortNumber.portNumber(j)).anyTimes();
168 replay(port);
169 ports.add(port);
170 }
171
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700172 expect(deviceService.getPorts(devId)).andReturn(ports).anyTimes();
173 expect(deviceService.getDevice(devId)).andReturn(device).anyTimes();
Jonathan Hart704ca142014-10-09 09:34:39 -0700174 }
175
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700176 expect(deviceService.getDevices()).andReturn(devices).anyTimes();
Jonathan Hart704ca142014-10-09 09:34:39 -0700177 replay(deviceService);
178 }
179
180 /**
181 * Creates the links for the fake topology.
182 * NB: Only unidirectional links are created, as for this purpose all we
183 * need is to occupy the ports with some link.
184 */
185 private void createLinks(int numDevices) {
186 List<Link> links = new ArrayList<Link>();
187
188 for (int i = 1; i <= numDevices; i++) {
189 ConnectPoint src = new ConnectPoint(
190 getDeviceId(i),
191 PortNumber.portNumber(2));
192 ConnectPoint dst = new ConnectPoint(
193 getDeviceId((i + 1 > numDevices) ? 1 : i + 1),
194 PortNumber.portNumber(3));
195
196 Link link = createMock(Link.class);
197 expect(link.src()).andReturn(src).anyTimes();
198 expect(link.dst()).andReturn(dst).anyTimes();
199 replay(link);
200
201 links.add(link);
202 }
203
204 expect(linkService.getLinks()).andReturn(links).anyTimes();
205 replay(linkService);
206 }
207
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700208 private void addAddressBindings() {
209 Set<PortAddresses> addresses = Sets.newHashSet();
210
211 for (int i = 1; i <= NUM_ADDRESS_PORTS; i++) {
212 ConnectPoint cp = new ConnectPoint(getDeviceId(i), P1);
Pavlin Radoslavov5b5dc482014-11-05 14:48:08 -0800213 Ip4Prefix prefix1 =
Thomas Vachuska27bee092015-06-23 19:03:10 -0700214 Ip4Prefix.valueOf("10.0." + (2 * i - 1) + ".0/24");
Pavlin Radoslavov5b5dc482014-11-05 14:48:08 -0800215 Ip4Address addr1 =
Thomas Vachuska27bee092015-06-23 19:03:10 -0700216 Ip4Address.valueOf("10.0." + (2 * i - 1) + ".1");
Pavlin Radoslavov5b5dc482014-11-05 14:48:08 -0800217 Ip4Prefix prefix2 = Ip4Prefix.valueOf("10.0." + (2 * i) + ".0/24");
218 Ip4Address addr2 = Ip4Address.valueOf("10.0." + (2 * i) + ".1");
Pavlin Radoslavov76b0ae22014-10-27 15:33:19 -0700219 InterfaceIpAddress ia1 = new InterfaceIpAddress(addr1, prefix1);
220 InterfaceIpAddress ia2 = new InterfaceIpAddress(addr2, prefix2);
Jonathan Harta887ba82014-11-03 15:20:52 -0800221 PortAddresses pa1 =
Thomas Vachuska27bee092015-06-23 19:03:10 -0700222 new PortAddresses(cp, Sets.newHashSet(ia1),
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700223 MacAddress.valueOf(2 * i - 1),
224 VlanId.vlanId((short) 1));
Jonathan Harta887ba82014-11-03 15:20:52 -0800225 PortAddresses pa2 =
226 new PortAddresses(cp, Sets.newHashSet(ia2),
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700227 MacAddress.valueOf(2 * i),
228 VlanId.NONE);
Jonathan Harta887ba82014-11-03 15:20:52 -0800229
230 addresses.add(pa1);
231 addresses.add(pa2);
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700232
233 expect(hostService.getAddressBindingsForPort(cp))
Jonathan Harta887ba82014-11-03 15:20:52 -0800234 .andReturn(Sets.newHashSet(pa1, pa2)).anyTimes();
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700235 }
236
237 expect(hostService.getAddressBindings()).andReturn(addresses).anyTimes();
238
239 for (int i = 1; i <= NUM_FLOOD_PORTS; i++) {
240 ConnectPoint cp = new ConnectPoint(getDeviceId(i + NUM_ADDRESS_PORTS),
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700241 P1);
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700242 expect(hostService.getAddressBindingsForPort(cp))
Jonathan Harta887ba82014-11-03 15:20:52 -0800243 .andReturn(Collections.<PortAddresses>emptySet()).anyTimes();
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700244 }
245 }
246
Jonathan Hart704ca142014-10-09 09:34:39 -0700247 /**
Jonathan Hart7d1496b2015-03-10 22:00:48 -0700248 * Tests {@link ProxyArpManager#isKnown(org.onlab.packet.IpAddress)} in the
249 * case where the IP address is not known.
Jonathan Hart704ca142014-10-09 09:34:39 -0700250 * Verifies the method returns false.
251 */
252 @Test
253 public void testNotKnown() {
254 expect(hostService.getHostsByIp(IP1)).andReturn(Collections.<Host>emptySet());
255 replay(hostService);
256
Jonathan Hartf84591d2015-01-16 14:33:43 -0800257 assertFalse(proxyArp.isKnown(IP1));
Jonathan Hart704ca142014-10-09 09:34:39 -0700258 }
259
260 /**
Jonathan Hart7d1496b2015-03-10 22:00:48 -0700261 * Tests {@link ProxyArpManager#isKnown(org.onlab.packet.IpAddress)} in the
262 * case where the IP address is known.
Jonathan Hart704ca142014-10-09 09:34:39 -0700263 * Verifies the method returns true.
264 */
265 @Test
266 public void testKnown() {
267 Host host1 = createMock(Host.class);
268 Host host2 = createMock(Host.class);
269
270 expect(hostService.getHostsByIp(IP1))
271 .andReturn(Sets.newHashSet(host1, host2));
272 replay(hostService);
273
Jonathan Hartf84591d2015-01-16 14:33:43 -0800274 assertTrue(proxyArp.isKnown(IP1));
Jonathan Hart704ca142014-10-09 09:34:39 -0700275 }
276
277 /**
Jonathan Hart6cd2f352015-01-13 17:44:45 -0800278 * Tests {@link ProxyArpManager#reply(Ethernet, ConnectPoint)} in the case where the
Jonathan Hart704ca142014-10-09 09:34:39 -0700279 * destination host is known.
280 * Verifies the correct ARP reply is sent out the correct port.
281 */
282 @Test
283 public void testReplyKnown() {
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700284 //Set the return value of isEdgePoint from the edgemanager.
285 isEdgePointReturn = true;
286
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700287 Host replyer = new DefaultHost(PID, HID1, MAC1, VLAN1, getLocation(4),
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700288 Collections.singleton(IP1));
Jonathan Hart704ca142014-10-09 09:34:39 -0700289
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700290 Host requestor = new DefaultHost(PID, HID2, MAC2, VLAN1, getLocation(5),
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700291 Collections.singleton(IP2));
Jonathan Hart704ca142014-10-09 09:34:39 -0700292
Pavlin Radoslavov33f228a2014-10-27 19:33:16 -0700293 expect(hostService.getHostsByIp(IP1))
Thomas Vachuska27bee092015-06-23 19:03:10 -0700294 .andReturn(Collections.singleton(replyer));
Jonathan Hart704ca142014-10-09 09:34:39 -0700295 expect(hostService.getHost(HID2)).andReturn(requestor);
296
297 replay(hostService);
298
299 Ethernet arpRequest = buildArp(ARP.OP_REQUEST, MAC2, null, IP2, IP1);
300
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700301 proxyArp.reply(arpRequest, getLocation(5));
Jonathan Hart704ca142014-10-09 09:34:39 -0700302
303 assertEquals(1, packetService.packets.size());
304 Ethernet arpReply = buildArp(ARP.OP_REPLY, MAC1, MAC2, IP1, IP2);
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700305 verifyPacketOut(arpReply, getLocation(5), packetService.packets.get(0));
Jonathan Hart704ca142014-10-09 09:34:39 -0700306 }
307
308 /**
Jonathan Hart6cd2f352015-01-13 17:44:45 -0800309 * Tests {@link ProxyArpManager#reply(Ethernet, ConnectPoint)} in the case where the
Jonathan Hart704ca142014-10-09 09:34:39 -0700310 * destination host is not known.
311 * Verifies the ARP request is flooded out the correct edge ports.
312 */
313 @Test
314 public void testReplyUnknown() {
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700315 isEdgePointReturn = true;
316
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700317 Host requestor = new DefaultHost(PID, HID2, MAC2, VLAN1, getLocation(5),
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700318 Collections.singleton(IP2));
Jonathan Hart704ca142014-10-09 09:34:39 -0700319
Pavlin Radoslavov33f228a2014-10-27 19:33:16 -0700320 expect(hostService.getHostsByIp(IP1))
Jonathan Hart704ca142014-10-09 09:34:39 -0700321 .andReturn(Collections.<Host>emptySet());
322 expect(hostService.getHost(HID2)).andReturn(requestor);
323
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700324
Jonathan Hart704ca142014-10-09 09:34:39 -0700325 replay(hostService);
326
327 Ethernet arpRequest = buildArp(ARP.OP_REQUEST, MAC2, null, IP2, IP1);
328
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700329 //Setup the set of edge ports to be used in the reply method
330 getEdgePointsNoArg = Lists.newLinkedList();
331 getEdgePointsNoArg.add(new ConnectPoint(DeviceId.deviceId("5"), PortNumber.portNumber(1)));
332 getEdgePointsNoArg.add(new ConnectPoint(DeviceId.deviceId("4"), PortNumber.portNumber(1)));
333
Jonathan Hartf84591d2015-01-16 14:33:43 -0800334 proxyArp.reply(arpRequest, getLocation(6));
Jonathan Hart704ca142014-10-09 09:34:39 -0700335
336 verifyFlood(arpRequest);
337 }
338
339 /**
Jonathan Hart6cd2f352015-01-13 17:44:45 -0800340 * Tests {@link ProxyArpManager#reply(Ethernet, ConnectPoint)} in the case where the
Jonathan Hart704ca142014-10-09 09:34:39 -0700341 * destination host is known for that IP address, but is not on the same
342 * VLAN as the source host.
343 * Verifies the ARP request is flooded out the correct edge ports.
344 */
345 @Test
346 public void testReplyDifferentVlan() {
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700347
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700348 Host replyer = new DefaultHost(PID, HID1, MAC1, VLAN2, getLocation(4),
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700349 Collections.singleton(IP1));
Jonathan Hart704ca142014-10-09 09:34:39 -0700350
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700351 Host requestor = new DefaultHost(PID, HID2, MAC2, VLAN1, getLocation(5),
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700352 Collections.singleton(IP2));
Jonathan Hart704ca142014-10-09 09:34:39 -0700353
Pavlin Radoslavov33f228a2014-10-27 19:33:16 -0700354 expect(hostService.getHostsByIp(IP1))
Jonathan Hart704ca142014-10-09 09:34:39 -0700355 .andReturn(Collections.singleton(replyer));
356 expect(hostService.getHost(HID2)).andReturn(requestor);
357
358 replay(hostService);
359
360 Ethernet arpRequest = buildArp(ARP.OP_REQUEST, MAC2, null, IP2, IP1);
361
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700362 //Setup for flood test
363 getEdgePointsNoArg = Lists.newLinkedList();
364 getEdgePointsNoArg.add(new ConnectPoint(DeviceId.deviceId("5"), PortNumber.portNumber(1)));
365 getEdgePointsNoArg.add(new ConnectPoint(DeviceId.deviceId("4"), PortNumber.portNumber(1)));
Jonathan Hartf84591d2015-01-16 14:33:43 -0800366 proxyArp.reply(arpRequest, getLocation(6));
Jonathan Hart704ca142014-10-09 09:34:39 -0700367
368 verifyFlood(arpRequest);
369 }
370
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700371 @Test
372 public void testReplyToRequestForUs() {
Pavlin Radoslavov5b5dc482014-11-05 14:48:08 -0800373 Ip4Address theirIp = Ip4Address.valueOf("10.0.1.254");
374 Ip4Address ourFirstIp = Ip4Address.valueOf("10.0.1.1");
375 Ip4Address ourSecondIp = Ip4Address.valueOf("10.0.2.1");
Jonathan Harta887ba82014-11-03 15:20:52 -0800376 MacAddress firstMac = MacAddress.valueOf(1L);
377 MacAddress secondMac = MacAddress.valueOf(2L);
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700378
379 Host requestor = new DefaultHost(PID, HID2, MAC2, VLAN1, LOC1,
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700380 Collections.singleton(theirIp));
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700381
382 expect(hostService.getHost(HID2)).andReturn(requestor);
383 replay(hostService);
384
385 Ethernet arpRequest = buildArp(ARP.OP_REQUEST, MAC2, null, theirIp, ourFirstIp);
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700386 isEdgePointReturn = true;
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700387 proxyArp.reply(arpRequest, LOC1);
388
389 assertEquals(1, packetService.packets.size());
Jonathan Harta887ba82014-11-03 15:20:52 -0800390 Ethernet arpReply = buildArp(ARP.OP_REPLY, firstMac, MAC2, ourFirstIp, theirIp);
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700391 verifyPacketOut(arpReply, LOC1, packetService.packets.get(0));
392
393 // Test a request for the second address on that port
394 packetService.packets.clear();
395 arpRequest = buildArp(ARP.OP_REQUEST, MAC2, null, theirIp, ourSecondIp);
396
397 proxyArp.reply(arpRequest, LOC1);
398
399 assertEquals(1, packetService.packets.size());
Jonathan Harta887ba82014-11-03 15:20:52 -0800400 arpReply = buildArp(ARP.OP_REPLY, secondMac, MAC2, ourSecondIp, theirIp);
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700401 verifyPacketOut(arpReply, LOC1, packetService.packets.get(0));
402 }
403
404 @Test
405 public void testReplyExternalPortBadRequest() {
406 replay(hostService); // no further host service expectations
407
Pavlin Radoslavov5b5dc482014-11-05 14:48:08 -0800408 Ip4Address theirIp = Ip4Address.valueOf("10.0.1.254");
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700409
410 // Request for a valid external IP address but coming in the wrong port
411 Ethernet arpRequest = buildArp(ARP.OP_REQUEST, MAC1, null, theirIp,
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700412 Ip4Address.valueOf("10.0.3.1"));
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700413 proxyArp.reply(arpRequest, LOC1);
414 assertEquals(0, packetService.packets.size());
415
416 // Request for a valid internal IP address but coming in an external port
417 packetService.packets.clear();
418 arpRequest = buildArp(ARP.OP_REQUEST, MAC1, null, theirIp, IP1);
419 proxyArp.reply(arpRequest, LOC1);
420 assertEquals(0, packetService.packets.size());
421 }
422
423 @Test
424 public void testReplyToRequestFromUs() {
Pavlin Radoslavov5b5dc482014-11-05 14:48:08 -0800425 Ip4Address ourIp = Ip4Address.valueOf("10.0.1.1");
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700426 MacAddress ourMac = MacAddress.valueOf(1L);
Pavlin Radoslavov5b5dc482014-11-05 14:48:08 -0800427 Ip4Address theirIp = Ip4Address.valueOf("10.0.1.100");
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700428
Jonathan Hart7d1496b2015-03-10 22:00:48 -0700429 expect(hostService.getHostsByIp(theirIp)).andReturn(Collections.emptySet());
430 expect(hostService.getHost(HostId.hostId(ourMac, VLAN1))).andReturn(null);
431 replay(hostService);
432
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700433 // This is a request from something inside our network (like a BGP
434 // daemon) to an external host.
435 Ethernet arpRequest = buildArp(ARP.OP_REQUEST, ourMac, null, ourIp, theirIp);
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700436 //Ensure the packet is allowed through (it is not to an internal port)
437 isEdgePointReturn = true;
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700438
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700439 proxyArp.reply(arpRequest, getLocation(5));
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700440 assertEquals(1, packetService.packets.size());
441 verifyPacketOut(arpRequest, getLocation(1), packetService.packets.get(0));
442
443 // The same request from a random external port should fail
444 packetService.packets.clear();
445 proxyArp.reply(arpRequest, getLocation(2));
446 assertEquals(0, packetService.packets.size());
447 }
448
Jonathan Hart704ca142014-10-09 09:34:39 -0700449 /**
Jonathan Hart6cd2f352015-01-13 17:44:45 -0800450 * Tests {@link ProxyArpManager#forward(Ethernet, ConnectPoint)} in the case where the
Jonathan Hart704ca142014-10-09 09:34:39 -0700451 * destination host is known.
452 * Verifies the correct ARP request is sent out the correct port.
453 */
454 @Test
455 public void testForwardToHost() {
456 Host host1 = new DefaultHost(PID, HID1, MAC1, VLAN1, LOC1,
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700457 Collections.singleton(IP1));
Jonathan Hart704ca142014-10-09 09:34:39 -0700458
459 expect(hostService.getHost(HID1)).andReturn(host1);
460 replay(hostService);
461
462 Ethernet arpRequest = buildArp(ARP.OP_REPLY, MAC2, MAC1, IP2, IP1);
463
Jonathan Hartf84591d2015-01-16 14:33:43 -0800464 proxyArp.forward(arpRequest, LOC2);
Jonathan Hart704ca142014-10-09 09:34:39 -0700465
466 assertEquals(1, packetService.packets.size());
467 OutboundPacket packet = packetService.packets.get(0);
468
469 verifyPacketOut(arpRequest, LOC1, packet);
470 }
471
472 /**
Jonathan Hart6cd2f352015-01-13 17:44:45 -0800473 * Tests {@link ProxyArpManager#forward(Ethernet, ConnectPoint)} in the case where the
Jonathan Hart704ca142014-10-09 09:34:39 -0700474 * destination host is not known.
475 * Verifies the correct ARP request is flooded out the correct edge ports.
476 */
477 @Test
478 public void testForwardFlood() {
479 expect(hostService.getHost(HID1)).andReturn(null);
480 replay(hostService);
481
482 Ethernet arpRequest = buildArp(ARP.OP_REPLY, MAC2, MAC1, IP2, IP1);
483
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700484 //populate the list of edges when so that when forward hits flood in the manager it contains the values
485 //that should continue on
486 getEdgePointsNoArg = Lists.newLinkedList();
487 getEdgePointsNoArg.add(new ConnectPoint(DeviceId.deviceId("3"), PortNumber.portNumber(1)));
488 getEdgePointsNoArg.add(new ConnectPoint(DeviceId.deviceId("5"), PortNumber.portNumber(1)));
489 getEdgePointsNoArg.add(new ConnectPoint(DeviceId.deviceId("4"), PortNumber.portNumber(1)));
490
Jonathan Hartf84591d2015-01-16 14:33:43 -0800491 proxyArp.forward(arpRequest, getLocation(6));
Jonathan Hart704ca142014-10-09 09:34:39 -0700492
493 verifyFlood(arpRequest);
494 }
495
496 /**
Jonathan Hartf84591d2015-01-16 14:33:43 -0800497 * Verifies that the given packet was flooded out all available edge ports,
498 * except for the input port.
Jonathan Hart704ca142014-10-09 09:34:39 -0700499 *
500 * @param packet the packet that was expected to be flooded
501 */
502 private void verifyFlood(Ethernet packet) {
Jonathan Hartf84591d2015-01-16 14:33:43 -0800503 // There should be 1 less than NUM_FLOOD_PORTS; the inPort should be excluded.
504 assertEquals(NUM_FLOOD_PORTS - 1, packetService.packets.size());
Jonathan Hart704ca142014-10-09 09:34:39 -0700505
506 Collections.sort(packetService.packets,
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700507 new Comparator<OutboundPacket>() {
508 @Override
509 public int compare(OutboundPacket o1, OutboundPacket o2) {
510 return o1.sendThrough().uri().compareTo(o2.sendThrough().uri());
511 }
512 });
Jonathan Hart704ca142014-10-09 09:34:39 -0700513
Jonathan Hartf84591d2015-01-16 14:33:43 -0800514
515 for (int i = 0; i < NUM_FLOOD_PORTS - 1; i++) {
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700516 ConnectPoint cp = new ConnectPoint(getDeviceId(NUM_ADDRESS_PORTS + i + 1),
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700517 PortNumber.portNumber(1));
Jonathan Hart704ca142014-10-09 09:34:39 -0700518
519 OutboundPacket outboundPacket = packetService.packets.get(i);
520 verifyPacketOut(packet, cp, outboundPacket);
521 }
522 }
523
524 /**
525 * Verifies the given packet was sent out the given port.
526 *
527 * @param expected the packet that was expected to be sent
Thomas Vachuska27bee092015-06-23 19:03:10 -0700528 * @param outPort the port the packet was expected to be sent out
529 * @param actual the actual OutboundPacket to verify
Jonathan Hart704ca142014-10-09 09:34:39 -0700530 */
531 private void verifyPacketOut(Ethernet expected, ConnectPoint outPort,
Thomas Vachuska27bee092015-06-23 19:03:10 -0700532 OutboundPacket actual) {
Yuta HIGUCHI3e848a82014-11-02 20:19:42 -0800533 assertArrayEquals(expected.serialize(), actual.data().array());
Ray Milkey42507352015-03-20 15:16:10 -0700534 assertEquals(1, actual.treatment().immediate().size());
Jonathan Hart704ca142014-10-09 09:34:39 -0700535 assertEquals(outPort.deviceId(), actual.sendThrough());
Ray Milkey42507352015-03-20 15:16:10 -0700536 Instruction instruction = actual.treatment().immediate().get(0);
Jonathan Hart704ca142014-10-09 09:34:39 -0700537 assertTrue(instruction instanceof OutputInstruction);
538 assertEquals(outPort.port(), ((OutputInstruction) instruction).port());
539 }
540
541 /**
542 * Returns the device ID of the ith device.
543 *
544 * @param i device to get the ID of
545 * @return the device ID
546 */
547 private static DeviceId getDeviceId(int i) {
548 return DeviceId.deviceId("" + i);
549 }
550
Jonathan Hartdbdbdbb2014-10-06 18:35:30 -0700551 private static HostLocation getLocation(int i) {
552 return new HostLocation(new ConnectPoint(getDeviceId(i), P1), 123L);
553 }
554
Jonathan Hart704ca142014-10-09 09:34:39 -0700555 /**
556 * Builds an ARP packet with the given parameters.
557 *
558 * @param opcode opcode of the ARP packet
559 * @param srcMac source MAC address
560 * @param dstMac destination MAC address, or null if this is a request
Thomas Vachuska27bee092015-06-23 19:03:10 -0700561 * @param srcIp source IP address
562 * @param dstIp destination IP address
Jonathan Hart704ca142014-10-09 09:34:39 -0700563 * @return the ARP packet
564 */
565 private Ethernet buildArp(short opcode, MacAddress srcMac, MacAddress dstMac,
Thomas Vachuska27bee092015-06-23 19:03:10 -0700566 Ip4Address srcIp, Ip4Address dstIp) {
Jonathan Hart704ca142014-10-09 09:34:39 -0700567 Ethernet eth = new Ethernet();
568
569 if (dstMac == null) {
Yuta HIGUCHI3e848a82014-11-02 20:19:42 -0800570 eth.setDestinationMACAddress(MacAddress.BROADCAST);
Jonathan Hart704ca142014-10-09 09:34:39 -0700571 } else {
Yuta HIGUCHI3e848a82014-11-02 20:19:42 -0800572 eth.setDestinationMACAddress(dstMac);
Jonathan Hart704ca142014-10-09 09:34:39 -0700573 }
574
Yuta HIGUCHI3e848a82014-11-02 20:19:42 -0800575 eth.setSourceMACAddress(srcMac);
Jonathan Hart704ca142014-10-09 09:34:39 -0700576 eth.setEtherType(Ethernet.TYPE_ARP);
577 eth.setVlanID(VLAN1.toShort());
578
579 ARP arp = new ARP();
580 arp.setOpCode(opcode);
581 arp.setProtocolType(ARP.PROTO_TYPE_IP);
582 arp.setHardwareType(ARP.HW_TYPE_ETHERNET);
583
Pavlin Radoslavov5b5dc482014-11-05 14:48:08 -0800584 arp.setProtocolAddressLength((byte) Ip4Address.BYTE_LENGTH);
Jonathan Hart704ca142014-10-09 09:34:39 -0700585 arp.setHardwareAddressLength((byte) Ethernet.DATALAYER_ADDRESS_LENGTH);
Yuta HIGUCHI3e848a82014-11-02 20:19:42 -0800586 arp.setSenderHardwareAddress(srcMac.toBytes());
Jonathan Hart704ca142014-10-09 09:34:39 -0700587
588 if (dstMac == null) {
Yuta HIGUCHI3e848a82014-11-02 20:19:42 -0800589 arp.setTargetHardwareAddress(ZERO_MAC_ADDRESS);
Jonathan Hart704ca142014-10-09 09:34:39 -0700590 } else {
Yuta HIGUCHI3e848a82014-11-02 20:19:42 -0800591 arp.setTargetHardwareAddress(dstMac.toBytes());
Jonathan Hart704ca142014-10-09 09:34:39 -0700592 }
593
594 arp.setSenderProtocolAddress(srcIp.toOctets());
595 arp.setTargetProtocolAddress(dstIp.toOctets());
596
597 eth.setPayload(arp);
598 return eth;
599 }
600
601 /**
602 * Test PacketService implementation that simply stores OutboundPackets
603 * passed to {@link #emit(OutboundPacket)} for later verification.
604 */
Thomas Vachuska27bee092015-06-23 19:03:10 -0700605 class TestPacketService extends PacketServiceAdapter {
Jonathan Hart704ca142014-10-09 09:34:39 -0700606
607 List<OutboundPacket> packets = new ArrayList<>();
608
609 @Override
Jonathan Hart704ca142014-10-09 09:34:39 -0700610 public void emit(OutboundPacket packet) {
611 packets.add(packet);
612 }
Jonathan Hart3cfce8e2015-01-14 16:43:27 -0800613
Jonathan Hart704ca142014-10-09 09:34:39 -0700614 }
Aaron Kruglikovd8123832015-07-06 14:20:25 -0700615
616 class TestEdgePortService extends EdgeManager {
617
618 @Override
619 public boolean isEdgePoint(ConnectPoint connectPoint) {
620 return isEdgePointReturn;
621 }
622
623 @Override
624 public Iterable<ConnectPoint> getEdgePoints() {
625 return getEdgePointsNoArg;
626 }
627 }
Jonathan Hart704ca142014-10-09 09:34:39 -0700628}