Skip to content

Commit

Permalink
multi-asic support for test_cacl_application.py (#3070)
Browse files Browse the repository at this point in the history
Enhanced test_cacl_application.py for multi-asic platforms. Also it adds new test case to cover all multi-asic specific changes
as done in PR's:-
sonic-net/sonic-buildimage#5022
sonic-net/sonic-buildimage#5420
sonic-net/sonic-buildimage#5364
sonic-net/sonic-buildimage#6765

Also fix some of API in common/devices.py and bug in config_facts
  • Loading branch information
abdosi committed Mar 2, 2021
1 parent 724e05f commit b38562a
Show file tree
Hide file tree
Showing 3 changed files with 155 additions and 32 deletions.
2 changes: 1 addition & 1 deletion ansible/library/config_facts.py
Original file line number Diff line number Diff line change
Expand Up @@ -74,7 +74,7 @@ def create_maps(config):
for idx, val in enumerate(port_name_list_sorted):
port_index_map[val] = idx

port_name_to_alias_map = { name : v['alias'] for name, v in config["PORT"].iteritems()}
port_name_to_alias_map = { name : v['alias'] if 'alias' in v else '' for name, v in config["PORT"].iteritems()}

# Create inverse mapping between port name and alias
port_alias_to_name_map = {v: k for k, v in port_name_to_alias_map.iteritems()}
Expand Down
165 changes: 144 additions & 21 deletions tests/cacl/test_cacl_application.py
Original file line number Diff line number Diff line change
@@ -1,4 +1,5 @@
import ipaddress
import json

import pytest

Expand All @@ -11,21 +12,42 @@
pytest.mark.topology('any')
]

@pytest.fixture(scope="module")
def docker_network(duthost):

output = duthost.command("docker inspect bridge")

docker_containers_info = json.loads(output['stdout'])[0]['Containers']
ipam_info = json.loads(output['stdout'])[0]['IPAM']

docker_network = {}
docker_network['bridge'] = {'IPv4Address' : ipam_info['Config'][0]['Gateway'],
'IPv6Address' : ipam_info['Config'][1]['Gateway'] }

docker_network['container'] = {}
for k,v in docker_containers_info.items():
docker_network['container'][v['Name']] = {'IPv4Address' : v['IPv4Address'].split('/')[0], 'IPv6Address' : v['IPv6Address'].split('/')[0]}

return docker_network


# To specify a port range instead of a single port, use iptables format:
# separate start and end ports with a colon, e.g., "1000:2000"
ACL_SERVICES = {
"NTP": {
"ip_protocols": ["udp"],
"dst_ports": ["123"]
"dst_ports": ["123"],
"multi_asic_ns_to_host_fwd": False
},
"SNMP": {
"ip_protocols": ["tcp", "udp"],
"dst_ports": ["161"]
"dst_ports": ["161"],
"multi_asic_ns_to_host_fwd": True
},
"SSH": {
"ip_protocols": ["tcp"],
"dst_ports": ["22"]
"dst_ports": ["22"],
"multi_asic_ns_to_host_fwd": True
}
}

Expand Down Expand Up @@ -129,7 +151,7 @@ def get_cacl_tables_and_rules(duthost):
return cacl_tables


def generate_and_append_block_ip2me_traffic_rules(duthost, iptables_rules, ip6tables_rules):
def generate_and_append_block_ip2me_traffic_rules(duthost, iptables_rules, ip6tables_rules, asic_index):
INTERFACE_TABLE_NAME_LIST = [
"LOOPBACK_INTERFACE",
"MGMT_INTERFACE",
Expand All @@ -139,8 +161,8 @@ def generate_and_append_block_ip2me_traffic_rules(duthost, iptables_rules, ip6ta
]

# Gather device configuration facts
cfg_facts = duthost.config_facts(host=duthost.hostname, source="persistent")["ansible_facts"]

namespace = duthost.get_namespace_from_asic_id(asic_index)
cfg_facts = duthost.config_facts(host=duthost.hostname, source="persistent", namespace=namespace)["ansible_facts"]
# Add iptables/ip6tables rules to drop all packets destined for peer-to-peer interface IP addresses
for iface_table_name in INTERFACE_TABLE_NAME_LIST:
if iface_table_name in cfg_facts:
Expand All @@ -161,7 +183,7 @@ def generate_and_append_block_ip2me_traffic_rules(duthost, iptables_rules, ip6ta
pytest.fail("Unrecognized IP address type on interface '{}': {}".format(iface_name, ip_ntwrk))


def generate_expected_rules(duthost):
def generate_expected_rules(duthost, docker_network, asic_index):
iptables_rules = []
ip6tables_rules = []

Expand All @@ -177,6 +199,26 @@ def generate_expected_rules(duthost):
iptables_rules.append("-A INPUT -s 127.0.0.1/32 -i lo -j ACCEPT")
ip6tables_rules.append("-A INPUT -s ::1/128 -i lo -j ACCEPT")

if asic_index is None:
# Allow Communication among docker containers
for k, v in docker_network['container'].items():
iptables_rules.append("-A INPUT -s {}/32 -d {}/32 -j ACCEPT".format(docker_network['bridge']['IPv4Address'], docker_network['bridge']['IPv4Address']))
iptables_rules.append("-A INPUT -s {}/32 -d {}/32 -j ACCEPT".format(v['IPv4Address'], docker_network['bridge']['IPv4Address']))
ip6tables_rules.append("-A INPUT -s {}/128 -d {}/128 -j ACCEPT".format(docker_network['bridge']['IPv6Address'], docker_network['bridge']['IPv6Address']))
ip6tables_rules.append("-A INPUT -s {}/128 -d {}/128 -j ACCEPT".format(v['IPv6Address'], docker_network['bridge']['IPv6Address']))

else:
iptables_rules.append("-A INPUT -s {}/32 -d {}/32 -j ACCEPT".format(docker_network['container']['database' + str(asic_index)]['IPv4Address'],
docker_network['container']['database' + str(asic_index)]['IPv4Address']))
iptables_rules.append("-A INPUT -s {}/32 -d {}/32 -j ACCEPT".format(docker_network['bridge']['IPv4Address'],
docker_network['container']['database' + str(asic_index)]['IPv4Address']))
ip6tables_rules.append("-A INPUT -s {}/128 -d {}/128 -j ACCEPT".format(docker_network['container']['database' + str(asic_index)]['IPv6Address'],
docker_network['container']['database' + str(asic_index)]['IPv6Address']))
ip6tables_rules.append("-A INPUT -s {}/128 -d {}/128 -j ACCEPT".format(docker_network['bridge']['IPv6Address'],
docker_network['container']['database' + str(asic_index)]['IPv6Address']))



# Allow all incoming packets from established connections or new connections
# which are related to established connections
iptables_rules.append("-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT")
Expand Down Expand Up @@ -299,7 +341,7 @@ def generate_expected_rules(duthost):
rules_applied_from_config += 1

# Append rules which block "ip2me" traffic on p2p interfaces
generate_and_append_block_ip2me_traffic_rules(duthost, iptables_rules, ip6tables_rules)
generate_and_append_block_ip2me_traffic_rules(duthost, iptables_rules, ip6tables_rules, asic_index)

# Allow all packets with a TTL/hop limit of 0 or 1
iptables_rules.append("-A INPUT -m ttl --ttl-lt 2 -j ACCEPT")
Expand All @@ -313,19 +355,55 @@ def generate_expected_rules(duthost):

return iptables_rules, ip6tables_rules

def generate_nat_expected_rules(duthost, docker_network, asic_index):
iptables_natrules = []
ip6tables_natrules = []

def test_cacl_application(duthosts, rand_one_dut_hostname, localhost, creds):
"""
Test case to ensure caclmgrd is applying control plane ACLs properly
This is done by generating our own set of expected iptables and ip6tables
rules based on the DuT's configuration and comparing them against the
actual iptables/ip6tables rules on the DuT.
"""
duthost = duthosts[rand_one_dut_hostname]
expected_iptables_rules, expected_ip6tables_rules = generate_expected_rules(duthost)

stdout = duthost.shell("sudo iptables -S")["stdout"]
# Default policies
iptables_natrules.append("-P PREROUTING ACCEPT")
iptables_natrules.append("-P INPUT ACCEPT")
iptables_natrules.append("-P OUTPUT ACCEPT")
iptables_natrules.append("-P POSTROUTING ACCEPT")
ip6tables_natrules.append("-P PREROUTING ACCEPT")
ip6tables_natrules.append("-P INPUT ACCEPT")
ip6tables_natrules.append("-P OUTPUT ACCEPT")
ip6tables_natrules.append("-P POSTROUTING ACCEPT")


for acl_service in ACL_SERVICES:
if ACL_SERVICES[acl_service]["multi_asic_ns_to_host_fwd"]:
for ip_protocol in ACL_SERVICES[acl_service]["ip_protocols"]:
for dst_port in ACL_SERVICES[acl_service]["dst_ports"]:
# IPv4 rules
iptables_natrules.append(
"-A PREROUTING -p {} -m {} --dport {} -j DNAT --to-destination {}".format
(ip_protocol, ip_protocol, dst_port,
docker_network['bridge']['IPv4Address']))

iptables_natrules.append(
"-A POSTROUTING -p {} -m {} --dport {} -j SNAT --to-source {}".format
(ip_protocol, ip_protocol, dst_port,
docker_network['container']['database' + str(asic_index)]['IPv4Address']))

# IPv6 rules
ip6tables_natrules.append(
"-A PREROUTING -p {} -m {} --dport {} -j DNAT --to-destination {}".format
(ip_protocol, ip_protocol, dst_port,
docker_network['bridge']['IPv6Address']))

ip6tables_natrules.append(
"-A POSTROUTING -p {} -m {} --dport {} -j SNAT --to-source {}".format
(ip_protocol,ip_protocol, dst_port,
docker_network['container']['database' + str(asic_index)]['IPv6Address']))

return iptables_natrules, ip6tables_natrules


def verify_cacl(duthost, localhost, creds, docker_network, asic_index = None):
expected_iptables_rules, expected_ip6tables_rules = generate_expected_rules(duthost, docker_network, asic_index)


stdout = duthost.get_asic(asic_index).command("iptables -S")["stdout"]
actual_iptables_rules = stdout.strip().split("\n")

# Ensure all expected iptables rules are present on the DuT
Expand All @@ -344,7 +422,7 @@ def test_cacl_application(duthosts, rand_one_dut_hostname, localhost, creds):
#for i in range(len(expected_iptables_rules)):
# pytest_assert(actual_iptables_rules[i] == expected_iptables_rules[i], "iptables rules not in expected order")

stdout = duthost.shell("sudo ip6tables -S")["stdout"]
stdout = duthost.get_asic(asic_index).command("ip6tables -S")["stdout"]
actual_ip6tables_rules = stdout.strip().split("\n")

# Ensure all expected ip6tables rules are present on the DuT
Expand All @@ -362,3 +440,48 @@ def test_cacl_application(duthosts, rand_one_dut_hostname, localhost, creds):
# Ensure the ip6tables rules are applied in the correct order
#for i in range(len(expected_ip6tables_rules)):
# pytest_assert(actual_ip6tables_rules[i] == expected_ip6tables_rules[i], "ip6tables rules not in expected order")

def verify_nat_cacl(duthost, localhost, creds, docker_network, asic_index):
expected_iptables_rules, expected_ip6tables_rules = generate_nat_expected_rules(duthost, docker_network, asic_index)

stdout = duthost.get_asic(asic_index).command("iptables -t nat -S")["stdout"]
actual_iptables_rules = stdout.strip().split("\n")

# Ensure all expected iptables rules are present on the DuT
missing_iptables_rules = set(expected_iptables_rules) - set(actual_iptables_rules)
pytest_assert(len(missing_iptables_rules) == 0, "Missing expected iptables nat rules: {}".format(repr(missing_iptables_rules)))

# Ensure there are no unexpected iptables rules present on the DuT
unexpected_iptables_rules = set(actual_iptables_rules) - set(expected_iptables_rules)
pytest_assert(len(unexpected_iptables_rules) == 0, "Unexpected iptables nat rules: {}".format(repr(unexpected_iptables_rules)))

stdout = duthost.get_asic(asic_index).command("ip6tables -t nat -S")["stdout"]
actual_ip6tables_rules = stdout.strip().split("\n")

# Ensure all expected ip6tables rules are present on the DuT
missing_ip6tables_rules = set(expected_ip6tables_rules) - set(actual_ip6tables_rules)
pytest_assert(len(missing_ip6tables_rules) == 0, "Missing expected ip6tables nat rules: {}".format(repr(missing_ip6tables_rules)))

# Ensure there are no unexpected ip6tables rules present on the DuT
unexpected_ip6tables_rules = set(actual_ip6tables_rules) - set(expected_ip6tables_rules)
pytest_assert(len(unexpected_ip6tables_rules) == 0, "Unexpected ip6tables nat rules: {}".format(repr(unexpected_ip6tables_rules)))

def test_cacl_application(duthosts, rand_one_dut_hostname, localhost, creds, docker_network):
"""
Test case to ensure caclmgrd is applying control plane ACLs properly
This is done by generating our own set of expected iptables and ip6tables
rules based on the DuT's configuration and comparing them against the
actual iptables/ip6tables rules on the DuT.
"""
duthost = duthosts[rand_one_dut_hostname]
verify_cacl(duthost, localhost, creds, docker_network)

def test_multiasic_cacl_application(duthosts, rand_one_dut_hostname, localhost, creds,docker_network, enum_frontend_asic_index):

if enum_frontend_asic_index is None:
pytest.skip("Not Multi-asic platform. Skipping !!")

duthost = duthosts[rand_one_dut_hostname]
verify_cacl(duthost, localhost, creds, docker_network, enum_frontend_asic_index)
verify_nat_cacl(duthost, localhost, creds, docker_network, enum_frontend_asic_index)
20 changes: 10 additions & 10 deletions tests/common/devices.py
Original file line number Diff line number Diff line change
Expand Up @@ -2156,21 +2156,21 @@ def create_ssh_tunnel_sai_rpc(self):
).format(ns_docker_if_ipv4)
)

def command(self, *args, **kwargs):
def command(self, cmdstr):
"""
Prepend 'ip netns' option for commands meant for this ASIC
Args:
*args and **kwargs
cmdstr
Returns:
Output from the ansible command module
"""
if not self.sonichost.is_multi_asic:
return self.sonichost.command(*args, **kwargs)
if not self.sonichost.is_multi_asic or self.namespace == DEFAULT_NAMESPACE:
return self.sonichost.command(cmdstr)

cmdstr = "sudo ip netns exec {} ".format(self.namespace) + cmdstr

ns_arg_list = ["ip", "netns", "exec", self.namespace]
kwargs["argv"] = ns_arg_list + kwargs["argv"]
return self.sonichost.command(*args, **kwargs)
return self.sonichost.command(cmdstr)

def run_redis_cmd(self, argv=[]):
"""
Expand Down Expand Up @@ -2326,7 +2326,7 @@ def get_asic_namespace_list(self):
return [asic.namespace for asic in self.asics]

def get_asic_id_from_namespace(self, namespace):
if self.sonichost.facts['num_asic'] == 1:
if self.sonichost.facts['num_asic'] == 1 or namespace == DEFAULT_NAMESPACE:
return DEFAULT_ASIC_ID

for asic in self.asics:
Expand All @@ -2337,7 +2337,7 @@ def get_asic_id_from_namespace(self, namespace):
raise ValueError("Invalid namespace '{}' passed as input".format(namespace))

def get_namespace_from_asic_id(self, asic_id):
if self.sonichost.facts['num_asic'] == 1:
if self.sonichost.facts['num_asic'] == 1 or asic_id == DEFAULT_ASIC_ID:
return DEFAULT_NAMESPACE

for asic in self.asics:
Expand Down Expand Up @@ -2384,7 +2384,7 @@ def __getattr__(self, attr):

def get_asic(self, asic_id):
if asic_id == DEFAULT_ASIC_ID:
return self.asics[0]
return self.sonichost
return self.asics[asic_id]

def stop_service(self, service):
Expand Down

0 comments on commit b38562a

Please sign in to comment.