t_rfc4182.sh revision 1.6 1 1.6 christos # $NetBSD: t_rfc4182.sh,v 1.6 2020/04/01 01:49:26 christos Exp $
2 1.1 kefren #
3 1.1 kefren # Copyright (c) 2013 The NetBSD Foundation, Inc.
4 1.1 kefren # All rights reserved.
5 1.1 kefren #
6 1.1 kefren # Redistribution and use in source and binary forms, with or without
7 1.1 kefren # modification, are permitted provided that the following conditions
8 1.1 kefren # are met:
9 1.1 kefren # 1. Redistributions of source code must retain the above copyright
10 1.1 kefren # notice, this list of conditions and the following disclaimer.
11 1.1 kefren # 2. Redistributions in binary form must reproduce the above copyright
12 1.1 kefren # notice, this list of conditions and the following disclaimer in the
13 1.1 kefren # documentation and/or other materials provided with the distribution.
14 1.1 kefren #
15 1.1 kefren # THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
16 1.1 kefren # ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
17 1.1 kefren # TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
18 1.1 kefren # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
19 1.1 kefren # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
20 1.1 kefren # CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
21 1.1 kefren # SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
22 1.1 kefren # INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
23 1.1 kefren # CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
24 1.1 kefren # ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
25 1.1 kefren # POSSIBILITY OF SUCH DAMAGE.
26 1.1 kefren #
27 1.1 kefren
28 1.1 kefren # TEST RFC 4182
29 1.1 kefren # Setup four routers connected like this: R1---R2---R3---R4--
30 1.1 kefren # Goal is to be able to ping from R1 the outermost interface of R4
31 1.1 kefren # Disable net.inet.ip.forwarding, enable net.mpls.forwarding
32 1.1 kefren # Add route on R1 in order to encapsulate into MPLS the IP packets with
33 1.1 kefren # destination equal to R4 right hand side interface. Use two labels here:
34 1.1 kefren # 25 and IPv6 Explicit NULL
35 1.1 kefren # Add a double tagged MPLS route on R2 in order to forward frames belonging to
36 1.1 kefren # that FEC to R3, with IPv4 NULL being the most outermost one
37 1.1 kefren # Add MPLS "POP" route on R3 for that FEC, pointing to R4
38 1.1 kefren # Do the same for the reverse direction (R4 to R1)
39 1.1 kefren # ping from R1 to R4 right hand side interface
40 1.1 kefren
41 1.1 kefren
42 1.1 kefren atf_test_case rfc4182 cleanup
43 1.1 kefren rfc4182_head()
44 1.1 kefren {
45 1.1 kefren
46 1.1 kefren atf_set "descr" "RFC 4182 conformance test"
47 1.1 kefren atf_set "require.progs" "rump_server"
48 1.1 kefren }
49 1.1 kefren
50 1.1 kefren configservers()
51 1.1 kefren {
52 1.1 kefren
53 1.1 kefren # Setup the first server
54 1.1 kefren export RUMP_SERVER=${RUMP_SERVER1}
55 1.1 kefren atf_check -s exit:0 rump.ifconfig shmif0 create
56 1.2 kefren atf_check -s exit:0 rump.ifconfig shmif0 linkstr ./shdom1
57 1.1 kefren atf_check -s exit:0 rump.ifconfig shmif0 10.0.1.1/24
58 1.1 kefren atf_check -s exit:0 rump.ifconfig mpls0 create up
59 1.1 kefren atf_check -s exit:0 rump.sysctl -q -w net.mpls.accept=1
60 1.1 kefren atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.forwarding=0
61 1.1 kefren atf_check -s exit:0 rump.route -q add 10.0.4.0/24 -ifa 10.0.1.1 \
62 1.1 kefren -ifp mpls0 -tag 25,2 -inet 10.0.1.2
63 1.1 kefren
64 1.1 kefren # Setup the second server
65 1.1 kefren export RUMP_SERVER=${RUMP_SERVER2}
66 1.1 kefren atf_check -s exit:0 rump.ifconfig shmif0 create
67 1.2 kefren atf_check -s exit:0 rump.ifconfig shmif0 linkstr ./shdom1
68 1.1 kefren atf_check -s exit:0 rump.ifconfig shmif0 10.0.1.2/24
69 1.1 kefren atf_check -s exit:0 rump.ifconfig shmif1 create
70 1.2 kefren atf_check -s exit:0 rump.ifconfig shmif1 linkstr ./shdom2
71 1.1 kefren atf_check -s exit:0 rump.ifconfig shmif1 10.0.2.1/24
72 1.1 kefren atf_check -s exit:0 rump.ifconfig mpls0 create up
73 1.1 kefren atf_check -s exit:0 rump.sysctl -q -w net.mpls.accept=1
74 1.1 kefren atf_check -s exit:0 rump.sysctl -q -w net.mpls.forwarding=1
75 1.1 kefren atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.forwarding=0
76 1.1 kefren atf_check -s exit:0 rump.route -q add -mpls 25 -tag 30,0 -inet 10.0.2.2
77 1.1 kefren atf_check -s exit:0 rump.route -q add -mpls 27 -tag 3 -inet 10.0.1.1
78 1.1 kefren
79 1.1 kefren # Setup the third server
80 1.1 kefren export RUMP_SERVER=${RUMP_SERVER3}
81 1.1 kefren atf_check -s exit:0 rump.ifconfig shmif0 create
82 1.2 kefren atf_check -s exit:0 rump.ifconfig shmif0 linkstr ./shdom2
83 1.1 kefren atf_check -s exit:0 rump.ifconfig shmif0 10.0.2.2/24
84 1.1 kefren atf_check -s exit:0 rump.ifconfig shmif1 create
85 1.2 kefren atf_check -s exit:0 rump.ifconfig shmif1 linkstr ./shdom3
86 1.1 kefren atf_check -s exit:0 rump.ifconfig shmif1 10.0.3.1/24
87 1.1 kefren atf_check -s exit:0 rump.ifconfig mpls0 create up
88 1.1 kefren atf_check -s exit:0 rump.sysctl -q -w net.mpls.accept=1
89 1.1 kefren atf_check -s exit:0 rump.sysctl -q -w net.mpls.forwarding=1
90 1.1 kefren atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.forwarding=0
91 1.1 kefren atf_check -s exit:0 rump.route -q add -mpls 30 -tag 3 -inet 10.0.3.2
92 1.1 kefren atf_check -s exit:0 rump.route -q add -mpls 26 -tag 27,0 -inet 10.0.2.1
93 1.1 kefren
94 1.1 kefren # Setup the fourth server
95 1.1 kefren export RUMP_SERVER=${RUMP_SERVER4}
96 1.1 kefren atf_check -s exit:0 rump.ifconfig shmif0 create
97 1.2 kefren atf_check -s exit:0 rump.ifconfig shmif0 linkstr ./shdom3
98 1.1 kefren atf_check -s exit:0 rump.ifconfig shmif0 10.0.3.2/24
99 1.1 kefren atf_check -s exit:0 rump.ifconfig shmif1 create
100 1.2 kefren atf_check -s exit:0 rump.ifconfig shmif1 linkstr ./shdom4
101 1.1 kefren atf_check -s exit:0 rump.ifconfig shmif1 10.0.4.1/24
102 1.1 kefren atf_check -s exit:0 rump.ifconfig mpls0 create up
103 1.1 kefren atf_check -s exit:0 rump.sysctl -q -w net.mpls.accept=1
104 1.1 kefren atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.forwarding=0
105 1.1 kefren atf_check -s exit:0 rump.route -q add 10.0.1.0/24 -ifa 10.0.3.2 \
106 1.1 kefren -ifp mpls0 -tag 26 -inet 10.0.3.1
107 1.1 kefren
108 1.1 kefren unset RUMP_SERVER
109 1.1 kefren }
110 1.1 kefren
111 1.1 kefren doping()
112 1.1 kefren {
113 1.1 kefren
114 1.1 kefren export RUMP_SERVER=${RUMP_SERVER1}
115 1.1 kefren atf_check -s exit:0 -o match:"64 bytes from 10.0.4.1: icmp_seq=" \
116 1.1 kefren rump.ping -n -o -w 5 10.0.4.1
117 1.1 kefren unset RUMP_SERVER
118 1.1 kefren }
119 1.1 kefren
120 1.1 kefren rfc4182_body()
121 1.1 kefren {
122 1.1 kefren
123 1.6 christos dostart
124 1.1 kefren configservers
125 1.1 kefren doping
126 1.1 kefren }
127 1.1 kefren
128 1.1 kefren rfc4182_cleanup()
129 1.1 kefren {
130 1.1 kefren
131 1.1 kefren docleanup
132 1.1 kefren }
133 1.1 kefren
134 1.1 kefren atf_init_test_cases()
135 1.1 kefren {
136 1.1 kefren
137 1.1 kefren atf_add_test_case rfc4182
138 1.1 kefren }
139