xref: /netbsd/tests/net/mpls/t_mpls_fw64.sh (revision 80ba37c3)
1# $NetBSD: t_mpls_fw64.sh,v 1.5 2020/04/01 01:49:26 christos Exp $
2#
3# Copyright (c) 2015 The NetBSD Foundation, Inc.
4# All rights reserved.
5#
6# Redistribution and use in source and binary forms, with or without
7# modification, are permitted provided that the following conditions
8# are met:
9# 1. Redistributions of source code must retain the above copyright
10#    notice, this list of conditions and the following disclaimer.
11# 2. Redistributions in binary form must reproduce the above copyright
12#    notice, this list of conditions and the following disclaimer in the
13#    documentation and/or other materials provided with the distribution.
14#
15# THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
16# ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
17# TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
18# PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
19# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
20# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
21# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
22# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
23# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
24# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
25# POSSIBILITY OF SUCH DAMAGE.
26#
27
28# Test MPLS encap/decap and forwarding using INET6 as encapsulated protocol
29# Setup four routers connected like this: R1---R2---R3---R4--
30# Goal is to be able to ping from R1 the outermost interface of R4
31# Disable net.inet[6].ip[6].forwarding, enable net.mpls.forwarding
32# Use IPv6 between R1-R2-R3 and IPv4 between R3-R4
33# As we use IPv4 on last link we should use only expl.null there
34# because implicit null will assume IPv4 (as the next-hop)
35# But we can use impl null on R2-R1 link because stack will correctly
36# guess IPv6 (from next-hop)
37# Add route on R1 in order to encapsulate into MPLS the IP6 packets with
38#     destination equal to R4 right hand side interface
39# Add MPLS routes on R2 in order to forward frames belonging to that FEC to R3
40# Add MPLS expl.null route on R3 for that FEC, pointing to R4
41# Do the same for the reverse direction (R4 to R1)
42# ping6 from R1 to R4 right hand side interface
43
44
45configservers()
46{
47
48	# Setup the first server
49	export RUMP_SERVER=${RUMP_SERVER1}
50	atf_check -s exit:0 rump.ifconfig shmif0 create
51	atf_check -s exit:0 rump.ifconfig shmif0 linkstr ./shdom1
52	atf_check -s exit:0 rump.ifconfig shmif0 inet6 fd00:1234::1/64 alias
53	atf_check -s exit:0 rump.ifconfig mpls0 create up
54	atf_check -s exit:0 rump.sysctl -q -w net.mpls.accept=1
55	atf_check -s exit:0 rump.sysctl -q -w net.inet6.ip6.forwarding=0
56	atf_check -s exit:0 rump.route -q add -inet6 fd00:1234:0:3::/64 \
57	    -ifa fd00:1234::1 \
58	    -ifp mpls0 -tag 25 -inet6 fd00:1234::2
59
60	# Setup the second server
61	export RUMP_SERVER=${RUMP_SERVER2}
62	atf_check -s exit:0 rump.ifconfig shmif0 create
63	atf_check -s exit:0 rump.ifconfig shmif0 linkstr ./shdom1
64	atf_check -s exit:0 rump.ifconfig shmif0 inet6 fd00:1234::2/64 alias
65	atf_check -s exit:0 rump.ifconfig shmif1 create
66	atf_check -s exit:0 rump.ifconfig shmif1 linkstr ./shdom2
67	atf_check -s exit:0 rump.ifconfig shmif1 inet6 fd00:1234:0:1::1/64 alias
68	atf_check -s exit:0 rump.ifconfig mpls0 create up
69	atf_check -s exit:0 rump.sysctl -q -w net.mpls.accept=1
70	atf_check -s exit:0 rump.sysctl -q -w net.mpls.forwarding=1
71	atf_check -s exit:0 rump.sysctl -q -w net.inet6.ip6.forwarding=0
72	atf_check -s exit:0 rump.route -q add -mpls 25 -tag 30 \
73	    -inet6 fd00:1234:0:1::2
74	atf_check -s exit:0 rump.route -q add -mpls 27 -tag ${1} -inet6 \
75	    fd00:1234::1
76
77	# Setup the third server
78	export RUMP_SERVER=${RUMP_SERVER3}
79	atf_check -s exit:0 rump.ifconfig shmif0 create
80	atf_check -s exit:0 rump.ifconfig shmif0 linkstr ./shdom2
81	atf_check -s exit:0 rump.ifconfig shmif0 inet6 fd00:1234:0:1::2/64 alias
82	atf_check -s exit:0 rump.ifconfig shmif1 create
83	atf_check -s exit:0 rump.ifconfig shmif1 linkstr ./shdom3
84	atf_check -s exit:0 rump.ifconfig shmif1 inet 10.0.3.1/24
85	atf_check -s exit:0 rump.ifconfig mpls0 create up
86	atf_check -s exit:0 rump.sysctl -q -w net.mpls.accept=1
87	atf_check -s exit:0 rump.sysctl -q -w net.mpls.forwarding=1
88	atf_check -s exit:0 rump.sysctl -q -w net.inet6.ip6.forwarding=0
89	atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.forwarding=0
90	atf_check -s exit:0 rump.route -q add -mpls 30 -tag 2 \
91	    -inet 10.0.3.2
92	atf_check -s exit:0 rump.route -q add -mpls 26 -tag 27 \
93	    -inet6 fd00:1234:0:1::1
94
95	# Setup the fourth server
96	export RUMP_SERVER=${RUMP_SERVER4}
97	atf_check -s exit:0 rump.ifconfig shmif0 create
98	atf_check -s exit:0 rump.ifconfig shmif0 linkstr ./shdom3
99	atf_check -s exit:0 rump.ifconfig shmif0 inet 10.0.3.2
100	atf_check -s exit:0 rump.ifconfig shmif1 create
101	atf_check -s exit:0 rump.ifconfig shmif1 linkstr ./shdom4
102	atf_check -s exit:0 rump.ifconfig shmif1 inet6 fd00:1234:0:3::1/64 alias
103	atf_check -s exit:0 rump.ifconfig mpls0 create up
104	atf_check -s exit:0 rump.sysctl -q -w net.mpls.accept=1
105	atf_check -s exit:0 rump.sysctl -q -w net.inet6.ip6.forwarding=0
106	atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.forwarding=0
107	atf_check -s exit:0 rump.route -q add -inet6 fd00:1234::/64 \
108	    -ifa fd00:1234:0:3::1 \
109	    -ifp mpls0 -tag 26 -inet 10.0.3.1
110
111	unset RUMP_SERVER
112}
113
114doping()
115{
116
117	export RUMP_SERVER=${RUMP_SERVER1}
118	atf_check -s exit:0 \
119	    -o match:" bytes from fd00:1234::2, icmp_seq=" \
120	    rump.ping6 -n -o -X 2 fd00:1234::2
121	export RUMP_SERVER=${RUMP_SERVER2}
122	atf_check -s exit:0 \
123	    -o match:" bytes from fd00:1234:0:1::2, icmp_seq=" \
124	    rump.ping6 -n -o -X 2 fd00:1234:0:1::2
125	export RUMP_SERVER=${RUMP_SERVER3}
126	atf_check -s exit:0 \
127	    -o match:" bytes from 10.0.3.2: icmp_seq" \
128	    rump.ping -n -o -w 2 10.0.3.2
129	export RUMP_SERVER=${RUMP_SERVER1}
130	atf_check -s exit:0 \
131	    -o match:" bytes from fd00:1234:0:3::1, icmp_seq=" \
132	    rump.ping6 -n -o -X 2 fd00:1234:0:3::1
133	unset RUMP_SERVER
134}
135
136do_check_route()
137{
138
139	export RUMP_SERVER=${RUMP_SERVER1}
140	atf_check -s exit:0 \
141	    -o match:"^fd00:1234:0:3::/64.+fd00:1234::2.+25.+mpls0" \
142	    rump.netstat -nrT
143	unset RUMP_SERVER
144}
145
146atf_test_case mplsfw64_impl cleanup
147mplsfw64_impl_head()
148{
149
150	atf_set "descr" "IP6/MPLS test using impl. NULL labels in mixed env."
151	atf_set "require.progs" "rump_server"
152}
153
154mplsfw64_impl_body()
155{
156
157	dostart
158	configservers 3
159	do_check_route
160	doping
161}
162
163mplsfw64_impl_cleanup()
164{
165
166	docleanup
167}
168
169
170atf_test_case mplsfw64_expl cleanup
171mplsfw64_expl_head()
172{
173
174	atf_set "descr" "IP6/MPLS test using explicit NULL labels in mixed env."
175	atf_set "require.progs" "rump_server"
176}
177
178mplsfw64_expl_body()
179{
180
181	dostart
182	configservers 2
183	do_check_route
184	doping
185}
186
187mplsfw64_expl_cleanup()
188{
189
190	docleanup
191}
192
193
194atf_init_test_cases()
195{
196
197	atf_add_test_case mplsfw64_impl
198	atf_add_test_case mplsfw64_expl
199}
200