xref: /netbsd-src/tests/net/mpls/t_mpls_fw.sh (revision 0dd6d756c69e73d6119172bd2cbe60474ddebcad)
1# $NetBSD: t_mpls_fw.sh,v 1.7 2020/04/01 01:49:26 christos Exp $
2#
3# Copyright (c) 2013 The NetBSD Foundation, Inc.
4# All rights reserved.
5#
6# Redistribution and use in source and binary forms, with or without
7# modification, are permitted provided that the following conditions
8# are met:
9# 1. Redistributions of source code must retain the above copyright
10#    notice, this list of conditions and the following disclaimer.
11# 2. Redistributions in binary form must reproduce the above copyright
12#    notice, this list of conditions and the following disclaimer in the
13#    documentation and/or other materials provided with the distribution.
14#
15# THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
16# ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
17# TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
18# PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
19# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
20# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
21# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
22# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
23# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
24# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
25# POSSIBILITY OF SUCH DAMAGE.
26#
27
28# TEST MPLS encap/decap and forwarding using INET as encapsulated protocol
29# Setup four routers connected like this: R1---R2---R3---R4--
30# Goal is to be able to ping from R1 the outermost interface of R4
31# Disable net.inet.ip.forwarding, enable net.mpls.forwarding
32# Add route on R1 in order to encapsulate into MPLS the IP packets with
33#     destination equal to R4 right hand side interface
34# Add MPLS routes on R2 in order to forward frames belonging to that FEC to R3
35# Add MPLS "POP" route on R3 for that FEC, pointing to R4
36# Do the same for the reverse direction (R4 to R1)
37# ping from R1 to R4 right hand side interface
38
39atf_test_case mplsfw4 cleanup
40mplsfw4_head()
41{
42
43	atf_set "descr" "IP/MPLS forwarding test using PHP"
44	atf_set "require.progs" "rump_server"
45}
46
47configservers()
48{
49
50	# Setup the first server
51	export RUMP_SERVER=${RUMP_SERVER1}
52	atf_check -s exit:0 rump.ifconfig shmif0 create
53	atf_check -s exit:0 rump.ifconfig shmif0 linkstr ./shdom1
54	atf_check -s exit:0 rump.ifconfig shmif0 10.0.1.1/24
55	atf_check -s exit:0 rump.ifconfig mpls0 create up
56	atf_check -s exit:0 rump.sysctl -q -w net.mpls.accept=1
57	atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.forwarding=0
58	atf_check -s exit:0 rump.route -q add 10.0.4.0/24 -ifa 10.0.1.1 \
59	    -ifp mpls0 -tag 25 -inet 10.0.1.2
60
61	# Setup the second server
62	export RUMP_SERVER=${RUMP_SERVER2}
63	atf_check -s exit:0 rump.ifconfig shmif0 create
64	atf_check -s exit:0 rump.ifconfig shmif0 linkstr ./shdom1
65	atf_check -s exit:0 rump.ifconfig shmif0 10.0.1.2/24
66	atf_check -s exit:0 rump.ifconfig shmif1 create
67	atf_check -s exit:0 rump.ifconfig shmif1 linkstr ./shdom2
68	atf_check -s exit:0 rump.ifconfig shmif1 10.0.2.1/24
69	atf_check -s exit:0 rump.ifconfig mpls0 create up
70	atf_check -s exit:0 rump.sysctl -q -w net.mpls.accept=1
71	atf_check -s exit:0 rump.sysctl -q -w net.mpls.forwarding=1
72	atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.forwarding=0
73	atf_check -s exit:0 rump.route -q add -mpls 25 -tag 30 -inet 10.0.2.2
74	atf_check -s exit:0 rump.route -q add -mpls 27 -tag ${1} -inet 10.0.1.1
75
76	# Setup the third server
77	export RUMP_SERVER=${RUMP_SERVER3}
78	atf_check -s exit:0 rump.ifconfig shmif0 create
79	atf_check -s exit:0 rump.ifconfig shmif0 linkstr ./shdom2
80	atf_check -s exit:0 rump.ifconfig shmif0 10.0.2.2/24
81	atf_check -s exit:0 rump.ifconfig shmif1 create
82	atf_check -s exit:0 rump.ifconfig shmif1 linkstr ./shdom3
83	atf_check -s exit:0 rump.ifconfig shmif1 10.0.3.1/24
84	atf_check -s exit:0 rump.ifconfig mpls0 create up
85	atf_check -s exit:0 rump.sysctl -q -w net.mpls.accept=1
86	atf_check -s exit:0 rump.sysctl -q -w net.mpls.forwarding=1
87	atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.forwarding=0
88	atf_check -s exit:0 rump.route -q add -mpls 30 -tag ${1} -inet 10.0.3.2
89	atf_check -s exit:0 rump.route -q add -mpls 26 -tag 27 -inet 10.0.2.1
90
91	# Setup the fourth server
92	export RUMP_SERVER=${RUMP_SERVER4}
93	atf_check -s exit:0 rump.ifconfig shmif0 create
94	atf_check -s exit:0 rump.ifconfig shmif0 linkstr ./shdom3
95	atf_check -s exit:0 rump.ifconfig shmif0 10.0.3.2/24
96	atf_check -s exit:0 rump.ifconfig shmif1 create
97	atf_check -s exit:0 rump.ifconfig shmif1 linkstr ./shdom4
98	atf_check -s exit:0 rump.ifconfig shmif1 10.0.4.1/24
99	atf_check -s exit:0 rump.ifconfig mpls0 create up
100	atf_check -s exit:0 rump.sysctl -q -w net.mpls.accept=1
101	atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.forwarding=0
102	atf_check -s exit:0 rump.route -q add 10.0.1.0/24 -ifa 10.0.3.2 \
103	    -ifp mpls0 -tag 26 -inet 10.0.3.1
104
105	unset RUMP_SERVER
106}
107
108doping()
109{
110
111	export RUMP_SERVER=${RUMP_SERVER1}
112	atf_check -s exit:0 -o match:"64 bytes from 10.0.4.1: icmp_seq=" \
113	    rump.ping -n -o -w 5 10.0.4.1
114	unset RUMP_SERVER
115}
116
117mplsfw4_body()
118{
119
120	dostart
121	configservers 3
122	doping
123}
124
125mplsfw4_cleanup()
126{
127
128	docleanup
129}
130
131
132atf_test_case mplsfw4_expl cleanup
133mplsfw4_expl_head()
134{
135
136	atf_set "descr" "IP/MPLS forwarding test using explicit NULL labels"
137	atf_set "require.progs" "rump_server"
138}
139
140mplsfw4_expl_body()
141{
142
143	dostart
144	configservers 0
145	doping
146}
147
148mplsfw4_expl_cleanup()
149{
150
151	docleanup
152}
153
154
155atf_init_test_cases()
156{
157
158	atf_add_test_case mplsfw4
159	atf_add_test_case mplsfw4_expl
160}
161