1
0
mirror of https://github.com/osrg/gobgp.git synced 2024-05-11 05:55:10 +00:00
Files
osrg-gobgp/pkg/server/server_test.go
FUJITA Tomonori c593d7c8b3 switch to Go API v2 for protobuf
seems that sticking to Go API v1 for protobuf is headache for projects
using GoBGP.

This breaks the compatibility so bumps up the major version to 3.

Signed-off-by: FUJITA Tomonori <fujita.tomonori@gmail.com>
2021-12-08 07:22:50 +00:00

1598 lines
43 KiB
Go

// Copyright (C) 2016 Nippon Telegraph and Telephone Corporation.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
// implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package server
import (
"context"
"fmt"
"net"
"runtime"
"strconv"
"testing"
"time"
log "github.com/sirupsen/logrus"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
apb "google.golang.org/protobuf/types/known/anypb"
api "github.com/osrg/gobgp/v3/api"
"github.com/osrg/gobgp/v3/internal/pkg/apiutil"
"github.com/osrg/gobgp/v3/internal/pkg/config"
"github.com/osrg/gobgp/v3/internal/pkg/table"
"github.com/osrg/gobgp/v3/pkg/packet/bgp"
)
func TestStop(t *testing.T) {
assert := assert.New(t)
s := NewBgpServer()
go s.Serve()
err := s.StartBgp(context.Background(), &api.StartBgpRequest{
Global: &api.Global{
As: 1,
RouterId: "1.1.1.1",
ListenPort: -1,
},
})
assert.Nil(err)
s.StopBgp(context.Background(), &api.StopBgpRequest{})
s = NewBgpServer()
go s.Serve()
err = s.StartBgp(context.Background(), &api.StartBgpRequest{
Global: &api.Global{
As: 1,
RouterId: "1.1.1.1",
ListenPort: -1,
},
})
assert.Nil(err)
p := &api.Peer{
Conf: &api.PeerConf{
NeighborAddress: "2.2.2.2",
PeerAs: 1,
},
RouteServer: &api.RouteServer{
RouteServerClient: true,
},
}
err = s.AddPeer(context.Background(), &api.AddPeerRequest{Peer: p})
assert.Nil(err)
err = s.AddPeer(context.Background(), &api.AddPeerRequest{})
assert.Error(err)
s.StopBgp(context.Background(), &api.StopBgpRequest{})
}
func TestModPolicyAssign(t *testing.T) {
assert := assert.New(t)
s := NewBgpServer()
go s.Serve()
err := s.StartBgp(context.Background(), &api.StartBgpRequest{
Global: &api.Global{
As: 1,
RouterId: "1.1.1.1",
ListenPort: -1,
},
})
assert.Nil(err)
defer s.StopBgp(context.Background(), &api.StopBgpRequest{})
err = s.AddPolicy(context.Background(), &api.AddPolicyRequest{Policy: table.NewAPIPolicyFromTableStruct(&table.Policy{Name: "p1"})})
assert.Nil(err)
err = s.AddPolicy(context.Background(), &api.AddPolicyRequest{Policy: table.NewAPIPolicyFromTableStruct(&table.Policy{Name: "p2"})})
assert.Nil(err)
err = s.AddPolicy(context.Background(), &api.AddPolicyRequest{Policy: table.NewAPIPolicyFromTableStruct(&table.Policy{Name: "p3"})})
assert.Nil(err)
f := func(l []*config.PolicyDefinition) *api.PolicyAssignment {
pl := make([]*api.Policy, 0, len(l))
for _, d := range l {
pl = append(pl, table.ToPolicyApi(d))
}
return &api.PolicyAssignment{
Policies: pl,
}
}
r := f([]*config.PolicyDefinition{{Name: "p1"}, {Name: "p2"}, {Name: "p3"}})
r.Direction = api.PolicyDirection_IMPORT
r.DefaultAction = api.RouteAction_ACCEPT
r.Name = table.GLOBAL_RIB_NAME
err = s.AddPolicyAssignment(context.Background(), &api.AddPolicyAssignmentRequest{Assignment: r})
assert.Nil(err)
r.Direction = api.PolicyDirection_EXPORT
err = s.AddPolicyAssignment(context.Background(), &api.AddPolicyAssignmentRequest{Assignment: r})
assert.Nil(err)
var ps []*api.PolicyAssignment
err = s.ListPolicyAssignment(context.Background(), &api.ListPolicyAssignmentRequest{
Name: table.GLOBAL_RIB_NAME,
Direction: api.PolicyDirection_IMPORT}, func(p *api.PolicyAssignment) { ps = append(ps, p) })
assert.Nil(err)
assert.Equal(len(ps[0].Policies), 3)
r = f([]*config.PolicyDefinition{{Name: "p1"}})
r.Direction = api.PolicyDirection_IMPORT
r.DefaultAction = api.RouteAction_ACCEPT
r.Name = table.GLOBAL_RIB_NAME
err = s.DeletePolicyAssignment(context.Background(), &api.DeletePolicyAssignmentRequest{Assignment: r})
assert.Nil(err)
ps = []*api.PolicyAssignment{}
s.ListPolicyAssignment(context.Background(), &api.ListPolicyAssignmentRequest{
Name: table.GLOBAL_RIB_NAME,
Direction: api.PolicyDirection_IMPORT}, func(p *api.PolicyAssignment) { ps = append(ps, p) })
assert.Equal(len(ps[0].Policies), 2)
ps = []*api.PolicyAssignment{}
s.ListPolicyAssignment(context.Background(), &api.ListPolicyAssignmentRequest{
Name: table.GLOBAL_RIB_NAME,
}, func(p *api.PolicyAssignment) { ps = append(ps, p) })
assert.Equal(len(ps), 2)
}
func TestListPolicyAssignment(t *testing.T) {
assert := assert.New(t)
s := NewBgpServer()
go s.Serve()
err := s.StartBgp(context.Background(), &api.StartBgpRequest{
Global: &api.Global{
As: 1,
RouterId: "1.1.1.1",
ListenPort: -1,
},
})
assert.Nil(err)
defer s.StopBgp(context.Background(), &api.StopBgpRequest{})
for i := 1; i < 4; i++ {
addr := "127.0.0." + strconv.Itoa(i)
p := &api.Peer{
Conf: &api.PeerConf{
NeighborAddress: addr,
PeerAs: uint32(i + 1),
},
RouteServer: &api.RouteServer{
RouteServerClient: true,
},
}
err = s.AddPeer(context.Background(), &api.AddPeerRequest{Peer: p})
assert.Nil(err)
err = s.AddPolicy(context.Background(),
&api.AddPolicyRequest{Policy: table.NewAPIPolicyFromTableStruct(&table.Policy{Name: fmt.Sprintf("p%d", i)})})
assert.Nil(err)
pa := &api.PolicyAssignment{
Direction: api.PolicyDirection_IMPORT,
DefaultAction: api.RouteAction_ACCEPT,
Name: addr,
Policies: []*api.Policy{{Name: fmt.Sprintf("p%d", i)}},
}
err = s.AddPolicyAssignment(context.Background(), &api.AddPolicyAssignmentRequest{Assignment: pa})
assert.Nil(err)
}
ps := []*api.PolicyAssignment{}
err = s.ListPolicyAssignment(context.Background(), &api.ListPolicyAssignmentRequest{
Name: table.GLOBAL_RIB_NAME,
}, func(p *api.PolicyAssignment) { ps = append(ps, p) })
assert.Nil(err)
assert.Equal(2, len(ps))
ps = []*api.PolicyAssignment{}
err = s.ListPolicyAssignment(context.Background(), &api.ListPolicyAssignmentRequest{}, func(p *api.PolicyAssignment) { ps = append(ps, p) })
assert.Nil(err)
assert.Equal(8, len(ps))
ps = []*api.PolicyAssignment{}
err = s.ListPolicyAssignment(context.Background(), &api.ListPolicyAssignmentRequest{
Direction: api.PolicyDirection_EXPORT,
}, func(p *api.PolicyAssignment) { ps = append(ps, p) })
assert.Nil(err)
assert.Equal(4, len(ps))
}
func TestListPathEnableFiltered(test *testing.T) {
assert := assert.New(test)
s := NewBgpServer()
go s.Serve()
err := s.StartBgp(context.Background(), &api.StartBgpRequest{
Global: &api.Global{
As: 1,
RouterId: "1.1.1.1",
ListenPort: 10179,
},
})
assert.Nil(err)
defer s.StopBgp(context.Background(), &api.StopBgpRequest{})
peer1 := &api.Peer{
Conf: &api.PeerConf{
NeighborAddress: "127.0.0.1",
PeerAs: 2,
},
Transport: &api.Transport{
PassiveMode: true,
},
}
err = s.AddPeer(context.Background(), &api.AddPeerRequest{Peer: peer1})
assert.Nil(err)
d1 := &api.DefinedSet{
DefinedType: api.DefinedType_PREFIX,
Name: "d1",
Prefixes: []*api.Prefix{
{
IpPrefix: "10.1.0.0/24",
MaskLengthMax: 24,
MaskLengthMin: 24,
},
},
}
s1 := &api.Statement{
Name: "s1",
Conditions: &api.Conditions{
PrefixSet: &api.MatchSet{
Name: "d1",
},
},
Actions: &api.Actions{
RouteAction: api.RouteAction_REJECT,
},
}
err = s.AddDefinedSet(context.Background(), &api.AddDefinedSetRequest{DefinedSet: d1})
assert.Nil(err)
p1 := &api.Policy{
Name: "p1",
Statements: []*api.Statement{s1},
}
err = s.AddPolicy(context.Background(), &api.AddPolicyRequest{Policy: p1})
assert.Nil(err)
err = s.AddPolicyAssignment(context.Background(), &api.AddPolicyAssignmentRequest{
Assignment: &api.PolicyAssignment{
Name: table.GLOBAL_RIB_NAME,
Direction: api.PolicyDirection_IMPORT,
Policies: []*api.Policy{p1},
DefaultAction: api.RouteAction_ACCEPT,
},
})
assert.Nil(err)
t := NewBgpServer()
go t.Serve()
err = t.StartBgp(context.Background(), &api.StartBgpRequest{
Global: &api.Global{
As: 2,
RouterId: "2.2.2.2",
ListenPort: -1,
},
})
assert.Nil(err)
defer t.StopBgp(context.Background(), &api.StopBgpRequest{})
family := &api.Family{
Afi: api.Family_AFI_IP,
Safi: api.Family_SAFI_UNICAST,
}
nlri1, _ := apb.New(&api.IPAddressPrefix{
Prefix: "10.1.0.0",
PrefixLen: 24,
})
a1, _ := apb.New(&api.OriginAttribute{
Origin: 0,
})
a2, _ := apb.New(&api.NextHopAttribute{
NextHop: "10.0.0.1",
})
attrs := []*apb.Any{a1, a2}
t.AddPath(context.Background(), &api.AddPathRequest{
TableType: api.TableType_GLOBAL,
Path: &api.Path{
Family: family,
Nlri: nlri1,
Pattrs: attrs,
},
})
nlri2, _ := apb.New(&api.IPAddressPrefix{
Prefix: "10.2.0.0",
PrefixLen: 24,
})
t.AddPath(context.Background(), &api.AddPathRequest{
TableType: api.TableType_GLOBAL,
Path: &api.Path{
Family: family,
Nlri: nlri2,
Pattrs: attrs,
},
})
peer2 := &api.Peer{
Conf: &api.PeerConf{
NeighborAddress: "127.0.0.1",
PeerAs: 1,
},
Transport: &api.Transport{
RemotePort: 10179,
},
Timers: &api.Timers{
Config: &api.TimersConfig{
ConnectRetry: 1,
IdleHoldTimeAfterReset: 1,
},
},
}
ch := make(chan struct{})
go s.MonitorPeer(context.Background(), &api.MonitorPeerRequest{}, func(peer *api.Peer) {
if peer.State.SessionState == api.PeerState_ESTABLISHED {
close(ch)
}
})
err = t.AddPeer(context.Background(), &api.AddPeerRequest{Peer: peer2})
assert.Nil(err)
<-ch
for {
count := 0
s.ListPath(context.Background(), &api.ListPathRequest{TableType: api.TableType_ADJ_IN, Family: family, Name: "127.0.0.1"}, func(d *api.Destination) {
count++
})
if count == 2 {
break
}
}
count := 0
s.ListPath(context.Background(), &api.ListPathRequest{TableType: api.TableType_GLOBAL, Family: family}, func(d *api.Destination) {
count++
})
assert.Equal(1, count)
filtered := 0
s.ListPath(context.Background(), &api.ListPathRequest{TableType: api.TableType_ADJ_IN, Family: family, Name: "127.0.0.1", EnableFiltered: true}, func(d *api.Destination) {
if d.Paths[0].Filtered {
filtered++
}
})
assert.Equal(1, filtered)
d2 := &api.DefinedSet{
DefinedType: api.DefinedType_PREFIX,
Name: "d2",
Prefixes: []*api.Prefix{
{
IpPrefix: "10.3.0.0/24",
MaskLengthMax: 24,
MaskLengthMin: 24,
},
},
}
s2 := &api.Statement{
Name: "s2",
Conditions: &api.Conditions{
PrefixSet: &api.MatchSet{
Name: "d2",
},
},
Actions: &api.Actions{
RouteAction: api.RouteAction_REJECT,
},
}
err = s.AddDefinedSet(context.Background(), &api.AddDefinedSetRequest{DefinedSet: d2})
assert.Nil(err)
p2 := &api.Policy{
Name: "p2",
Statements: []*api.Statement{s2},
}
err = s.AddPolicy(context.Background(), &api.AddPolicyRequest{Policy: p2})
assert.Nil(err)
err = s.AddPolicyAssignment(context.Background(), &api.AddPolicyAssignmentRequest{
Assignment: &api.PolicyAssignment{
Name: table.GLOBAL_RIB_NAME,
Direction: api.PolicyDirection_EXPORT,
Policies: []*api.Policy{p2},
DefaultAction: api.RouteAction_ACCEPT,
},
})
assert.Nil(err)
nlri3, _ := apb.New(&api.IPAddressPrefix{
Prefix: "10.3.0.0",
PrefixLen: 24,
})
s.AddPath(context.Background(), &api.AddPathRequest{
TableType: api.TableType_GLOBAL,
Path: &api.Path{
Family: family,
Nlri: nlri3,
Pattrs: attrs,
},
})
nlri4, _ := apb.New(&api.IPAddressPrefix{
Prefix: "10.4.0.0",
PrefixLen: 24,
})
s.AddPath(context.Background(), &api.AddPathRequest{
TableType: api.TableType_GLOBAL,
Path: &api.Path{
Family: family,
Nlri: nlri4,
Pattrs: attrs,
},
})
count = 0
s.ListPath(context.Background(), &api.ListPathRequest{TableType: api.TableType_GLOBAL, Family: family}, func(d *api.Destination) {
count++
})
assert.Equal(3, count)
count = 0
filtered = 0
s.ListPath(context.Background(), &api.ListPathRequest{TableType: api.TableType_ADJ_OUT, Family: family, Name: "127.0.0.1", EnableFiltered: true}, func(d *api.Destination) {
count++
if d.Paths[0].Filtered {
filtered++
}
})
assert.Equal(2, count)
assert.Equal(1, filtered)
}
func TestMonitor(test *testing.T) {
assert := assert.New(test)
s := NewBgpServer()
go s.Serve()
err := s.StartBgp(context.Background(), &api.StartBgpRequest{
Global: &api.Global{
As: 1,
RouterId: "1.1.1.1",
ListenPort: 10179,
},
})
assert.Nil(err)
defer s.StopBgp(context.Background(), &api.StopBgpRequest{})
// Vrf1 111:111 and vrf2 import 111:111 and 222:222
addVrf(test, s, "vrf1", "111:111", []string{"111:111"}, []string{"111:111"}, 1)
addVrf(test, s, "vrf2", "222:222", []string{"111:111", "222:222"}, []string{"222:222"}, 2)
p1 := &api.Peer{
Conf: &api.PeerConf{
NeighborAddress: "127.0.0.1",
PeerAs: 2,
},
Transport: &api.Transport{
PassiveMode: true,
},
}
err = s.AddPeer(context.Background(), &api.AddPeerRequest{Peer: p1})
assert.Nil(err)
t := NewBgpServer()
go t.Serve()
err = t.StartBgp(context.Background(), &api.StartBgpRequest{
Global: &api.Global{
As: 2,
RouterId: "2.2.2.2",
ListenPort: -1,
},
})
assert.Nil(err)
defer t.StopBgp(context.Background(), &api.StopBgpRequest{})
p2 := &api.Peer{
Conf: &api.PeerConf{
NeighborAddress: "127.0.0.1",
PeerAs: 1,
},
Transport: &api.Transport{
RemotePort: 10179,
},
Timers: &api.Timers{
Config: &api.TimersConfig{
ConnectRetry: 1,
IdleHoldTimeAfterReset: 1,
},
},
}
ch := make(chan struct{})
go t.MonitorPeer(context.Background(), &api.MonitorPeerRequest{}, func(peer *api.Peer) {
if peer.State.SessionState == api.PeerState_ESTABLISHED {
close(ch)
}
})
err = t.AddPeer(context.Background(), &api.AddPeerRequest{Peer: p2})
assert.Nil(err)
<-ch
// Test WatchBestPath.
w := s.watch(watchBestPath(false))
// Advertises a route.
attrs := []bgp.PathAttributeInterface{
bgp.NewPathAttributeOrigin(0),
bgp.NewPathAttributeNextHop("10.0.0.1"),
}
if err := t.addPathList("", []*table.Path{table.NewPath(nil, bgp.NewIPAddrPrefix(24, "10.0.0.0"), false, attrs, time.Now(), false)}); err != nil {
log.Fatal(err)
}
ev := <-w.Event()
b := ev.(*watchEventBestPath)
assert.Equal(1, len(b.PathList))
assert.Equal("10.0.0.0/24", b.PathList[0].GetNlri().String())
assert.False(b.PathList[0].IsWithdraw)
assert.Equal(1, len(b.Vrf))
assert.True(b.Vrf[0])
// Withdraws the previous route.
// NOTE: Withdraw should not require any path attribute.
if err := t.addPathList("", []*table.Path{table.NewPath(nil, bgp.NewIPAddrPrefix(24, "10.0.0.0"), true, nil, time.Now(), false)}); err != nil {
log.Fatal(err)
}
ev = <-w.Event()
b = ev.(*watchEventBestPath)
assert.Equal(1, len(b.PathList))
assert.Equal("10.0.0.0/24", b.PathList[0].GetNlri().String())
assert.True(b.PathList[0].IsWithdraw)
assert.Equal(1, len(b.Vrf))
assert.True(b.Vrf[0])
// Stops the watcher still having an item.
w.Stop()
// Prepares an initial route to test WatchUpdate with "current" flag.
if err := t.addPathList("", []*table.Path{table.NewPath(nil, bgp.NewIPAddrPrefix(24, "10.1.0.0"), false, attrs, time.Now(), false)}); err != nil {
log.Fatal(err)
}
for {
// Waits for the initial route will be advertised.
rib, _, err := s.getRib("", bgp.RF_IPv4_UC, nil)
if err != nil {
log.Fatal(err)
}
if len(rib.GetKnownPathList("", 0)) > 0 {
break
}
time.Sleep(100 * time.Millisecond)
}
// Test WatchUpdate with "current" flag.
w = s.watch(watchUpdate(true, ""))
// Test the initial route.
ev = <-w.Event()
u := ev.(*watchEventUpdate)
assert.Equal(1, len(u.PathList))
assert.Equal("10.1.0.0/24", u.PathList[0].GetNlri().String())
assert.False(u.PathList[0].IsWithdraw)
ev = <-w.Event()
u = ev.(*watchEventUpdate)
assert.Equal(len(u.PathList), 0) // End of RIB
// Advertises an additional route.
if err := t.addPathList("", []*table.Path{table.NewPath(nil, bgp.NewIPAddrPrefix(24, "10.2.0.0"), false, attrs, time.Now(), false)}); err != nil {
log.Fatal(err)
}
ev = <-w.Event()
u = ev.(*watchEventUpdate)
assert.Equal(1, len(u.PathList))
assert.Equal("10.2.0.0/24", u.PathList[0].GetNlri().String())
assert.False(u.PathList[0].IsWithdraw)
// Withdraws the previous route.
// NOTE: Withdraw should not require any path attribute.
if err := t.addPathList("", []*table.Path{table.NewPath(nil, bgp.NewIPAddrPrefix(24, "10.2.0.0"), true, nil, time.Now(), false)}); err != nil {
log.Fatal(err)
}
ev = <-w.Event()
u = ev.(*watchEventUpdate)
assert.Equal(1, len(u.PathList))
assert.Equal("10.2.0.0/24", u.PathList[0].GetNlri().String())
assert.True(u.PathList[0].IsWithdraw)
// Test bestpath events with vrf and rt import
w.Stop()
w = s.watch(watchBestPath(false))
attrs = []bgp.PathAttributeInterface{
bgp.NewPathAttributeOrigin(0),
bgp.NewPathAttributeNextHop("10.0.0.1"),
}
if err := s.addPathList("vrf1", []*table.Path{table.NewPath(nil, bgp.NewIPAddrPrefix(24, "10.0.0.0"), false, attrs, time.Now(), false)}); err != nil {
log.Fatal(err)
}
ev = <-w.Event()
b = ev.(*watchEventBestPath)
assert.Equal(1, len(b.PathList))
assert.Equal("111:111:10.0.0.0/24", b.PathList[0].GetNlri().String())
assert.False(b.PathList[0].IsWithdraw)
assert.Equal(2, len(b.Vrf))
assert.True(b.Vrf[1])
assert.True(b.Vrf[2])
// Withdraw the route
if err := s.addPathList("vrf1", []*table.Path{table.NewPath(nil, bgp.NewIPAddrPrefix(24, "10.0.0.0"), true, attrs, time.Now(), false)}); err != nil {
log.Fatal(err)
}
ev = <-w.Event()
b = ev.(*watchEventBestPath)
assert.Equal(1, len(b.PathList))
assert.Equal("111:111:10.0.0.0/24", b.PathList[0].GetNlri().String())
assert.True(b.PathList[0].IsWithdraw)
assert.Equal(2, len(b.Vrf))
assert.True(b.Vrf[1])
assert.True(b.Vrf[2])
w.Stop()
}
func TestNumGoroutineWithAddDeleteNeighbor(t *testing.T) {
assert := assert.New(t)
s := NewBgpServer()
go s.Serve()
err := s.StartBgp(context.Background(), &api.StartBgpRequest{
Global: &api.Global{
As: 1,
RouterId: "1.1.1.1",
ListenPort: -1,
},
})
assert.Nil(err)
defer s.StopBgp(context.Background(), &api.StopBgpRequest{})
// wait a few seconds to avoid taking effect from other test cases.
time.Sleep(time.Second * 5)
num := runtime.NumGoroutine()
p := &api.Peer{
Conf: &api.PeerConf{
NeighborAddress: "127.0.0.1",
PeerAs: 2,
},
Transport: &api.Transport{
PassiveMode: true,
},
}
err = s.AddPeer(context.Background(), &api.AddPeerRequest{Peer: p})
assert.Nil(err)
err = s.DeletePeer(context.Background(), &api.DeletePeerRequest{Address: "127.0.0.1"})
assert.Nil(err)
// wait goroutines to finish (e.g. internal goroutine for
// InfiniteChannel)
time.Sleep(time.Second * 5)
for i := 0; i < 5; i++ {
if num == runtime.NumGoroutine() {
return
}
}
assert.Equal(num, runtime.NumGoroutine())
}
func newPeerandInfo(myAs, as uint32, address string, rib *table.TableManager) (*peer, *table.PeerInfo) {
nConf := &config.Neighbor{Config: config.NeighborConfig{PeerAs: as, NeighborAddress: address}}
gConf := &config.Global{Config: config.GlobalConfig{As: myAs}}
config.SetDefaultNeighborConfigValues(nConf, nil, gConf)
policy := table.NewRoutingPolicy()
policy.Reset(&config.RoutingPolicy{}, nil)
p := newPeer(
&config.Global{Config: config.GlobalConfig{As: myAs}},
nConf,
rib,
policy)
p.fsm.peerInfo.ID = net.ParseIP(address)
for _, f := range rib.GetRFlist() {
p.fsm.rfMap[f] = bgp.BGP_ADD_PATH_NONE
}
return p, &table.PeerInfo{AS: as, Address: net.ParseIP(address), ID: net.ParseIP(address)}
}
func process(rib *table.TableManager, l []*table.Path) (*table.Path, *table.Path) {
dsts := make([]*table.Update, 0)
for _, path := range l {
dsts = append(dsts, rib.Update(path)...)
}
news, olds, _ := dstsToPaths(table.GLOBAL_RIB_NAME, 0, dsts)
if len(news) != 1 {
panic("can't handle multiple paths")
}
return news[0], olds[0]
}
func TestFilterpathWitheBGP(t *testing.T) {
as := uint32(65000)
p1As := uint32(65001)
p2As := uint32(65002)
rib := table.NewTableManager([]bgp.RouteFamily{bgp.RF_IPv4_UC})
p1, pi1 := newPeerandInfo(as, p1As, "192.168.0.1", rib)
p2, pi2 := newPeerandInfo(as, p2As, "192.168.0.2", rib)
nlri := bgp.NewIPAddrPrefix(24, "10.10.10.0")
pa1 := []bgp.PathAttributeInterface{bgp.NewPathAttributeAsPath([]bgp.AsPathParamInterface{bgp.NewAs4PathParam(2, []uint32{p1As})}), bgp.NewPathAttributeLocalPref(200)}
pa2 := []bgp.PathAttributeInterface{bgp.NewPathAttributeAsPath([]bgp.AsPathParamInterface{bgp.NewAs4PathParam(2, []uint32{p2As})})}
path1 := table.NewPath(pi1, nlri, false, pa1, time.Now(), false)
path2 := table.NewPath(pi2, nlri, false, pa2, time.Now(), false)
rib.Update(path2)
d := rib.Update(path1)
new, old, _ := d[0].GetChanges(table.GLOBAL_RIB_NAME, 0, false)
assert.Equal(t, new, path1)
filterpath(p1, new, old)
filterpath(p2, new, old)
new, old = process(rib, []*table.Path{path1.Clone(true)})
assert.Equal(t, new, path2)
// p1 and p2 advertized the same prefix and p1's was best. Then p1 withdraw it, so p2 must get withdawal.
path := filterpath(p2, new, old)
assert.NotNil(t, path)
assert.True(t, path.IsWithdraw)
// p1 should get the new best (from p2)
assert.Equal(t, filterpath(p1, new, old), path2)
new, old = process(rib, []*table.Path{path2.Clone(true)})
assert.True(t, new.IsWithdraw)
// p2 withdraw so p1 should get withdrawal.
path = filterpath(p1, new, old)
assert.True(t, path.IsWithdraw)
// p2 withdraw so p2 should get nothing.
path = filterpath(p2, new, old)
assert.Nil(t, path)
}
func TestFilterpathWithiBGP(t *testing.T) {
as := uint32(65000)
rib := table.NewTableManager([]bgp.RouteFamily{bgp.RF_IPv4_UC})
p1, pi1 := newPeerandInfo(as, as, "192.168.0.1", rib)
//p2, pi2 := newPeerandInfo(as, as, "192.168.0.2", rib)
p2, _ := newPeerandInfo(as, as, "192.168.0.2", rib)
nlri := bgp.NewIPAddrPrefix(24, "10.10.10.0")
pa1 := []bgp.PathAttributeInterface{bgp.NewPathAttributeAsPath([]bgp.AsPathParamInterface{bgp.NewAs4PathParam(2, []uint32{as})}), bgp.NewPathAttributeLocalPref(200)}
//pa2 := []bgp.PathAttributeInterface{bgp.NewPathAttributeAsPath([]bgp.AsPathParamInterface{bgp.NewAs4PathParam(2, []uint32{as})})}
path1 := table.NewPath(pi1, nlri, false, pa1, time.Now(), false)
//path2 := table.NewPath(pi2, nlri, false, pa2, time.Now(), false)
new, old := process(rib, []*table.Path{path1})
assert.Equal(t, new, path1)
path := filterpath(p1, new, old)
assert.Nil(t, path)
path = filterpath(p2, new, old)
assert.Nil(t, path)
new, old = process(rib, []*table.Path{path1.Clone(true)})
path = filterpath(p1, new, old)
assert.Nil(t, path)
path = filterpath(p2, new, old)
assert.Nil(t, path)
}
func TestFilterpathWithRejectPolicy(t *testing.T) {
rib1 := table.NewTableManager([]bgp.RouteFamily{bgp.RF_IPv4_UC})
_, pi1 := newPeerandInfo(1, 2, "192.168.0.1", rib1)
rib2 := table.NewTableManager([]bgp.RouteFamily{bgp.RF_IPv4_UC})
p2, _ := newPeerandInfo(1, 3, "192.168.0.2", rib2)
comSet1 := config.CommunitySet{
CommunitySetName: "comset1",
CommunityList: []string{"100:100"},
}
s, _ := table.NewCommunitySet(comSet1)
p2.policy.AddDefinedSet(s)
statement := config.Statement{
Name: "stmt1",
Conditions: config.Conditions{
BgpConditions: config.BgpConditions{
MatchCommunitySet: config.MatchCommunitySet{
CommunitySet: "comset1",
},
},
},
Actions: config.Actions{
RouteDisposition: config.ROUTE_DISPOSITION_REJECT_ROUTE,
},
}
policy := config.PolicyDefinition{
Name: "policy1",
Statements: []config.Statement{statement},
}
p, _ := table.NewPolicy(policy)
p2.policy.AddPolicy(p, false)
policies := []*config.PolicyDefinition{
{
Name: "policy1",
},
}
p2.policy.AddPolicyAssignment(p2.TableID(), table.POLICY_DIRECTION_EXPORT, policies, table.ROUTE_TYPE_ACCEPT)
for _, addCommunity := range []bool{false, true, false, true} {
nlri := bgp.NewIPAddrPrefix(24, "10.10.10.0")
pa1 := []bgp.PathAttributeInterface{bgp.NewPathAttributeAsPath([]bgp.AsPathParamInterface{bgp.NewAs4PathParam(2, []uint32{1})}), bgp.NewPathAttributeLocalPref(200)}
if addCommunity {
pa1 = append(pa1, bgp.NewPathAttributeCommunities([]uint32{100<<16 | 100}))
}
path1 := table.NewPath(pi1, nlri, false, pa1, time.Now(), false)
new, old := process(rib2, []*table.Path{path1})
assert.Equal(t, new, path1)
s := NewBgpServer()
path2 := s.filterpath(p2, new, old)
if addCommunity {
assert.True(t, path2.IsWithdraw)
} else {
assert.False(t, path2.IsWithdraw)
}
}
}
func TestPeerGroup(test *testing.T) {
assert := assert.New(test)
log.SetLevel(log.DebugLevel)
s := NewBgpServer()
go s.Serve()
err := s.StartBgp(context.Background(), &api.StartBgpRequest{
Global: &api.Global{
As: 1,
RouterId: "1.1.1.1",
ListenPort: 10179,
},
})
assert.Nil(err)
defer s.StopBgp(context.Background(), &api.StopBgpRequest{})
g := &config.PeerGroup{
Config: config.PeerGroupConfig{
PeerAs: 2,
PeerGroupName: "g",
},
}
err = s.addPeerGroup(g)
assert.Nil(err)
n := &config.Neighbor{
Config: config.NeighborConfig{
NeighborAddress: "127.0.0.1",
PeerGroup: "g",
},
Transport: config.Transport{
Config: config.TransportConfig{
PassiveMode: true,
},
},
}
configured := map[string]interface{}{
"config": map[string]interface{}{
"neigbor-address": "127.0.0.1",
"peer-group": "g",
},
"transport": map[string]interface{}{
"config": map[string]interface{}{
"passive-mode": true,
},
},
}
config.RegisterConfiguredFields("127.0.0.1", configured)
err = s.AddPeer(context.Background(), &api.AddPeerRequest{Peer: config.NewPeerFromConfigStruct(n)})
assert.Nil(err)
t := NewBgpServer()
go t.Serve()
err = t.StartBgp(context.Background(), &api.StartBgpRequest{
Global: &api.Global{
As: 2,
RouterId: "2.2.2.2",
ListenPort: -1,
},
})
assert.Nil(err)
defer t.StopBgp(context.Background(), &api.StopBgpRequest{})
m := &config.Neighbor{
Config: config.NeighborConfig{
NeighborAddress: "127.0.0.1",
PeerAs: 1,
},
Transport: config.Transport{
Config: config.TransportConfig{
RemotePort: 10179,
},
},
Timers: config.Timers{
Config: config.TimersConfig{
ConnectRetry: 1,
IdleHoldTimeAfterReset: 1,
},
},
}
ch := make(chan struct{})
go t.MonitorPeer(context.Background(), &api.MonitorPeerRequest{}, func(peer *api.Peer) {
if peer.State.SessionState == api.PeerState_ESTABLISHED {
close(ch)
}
})
err = t.AddPeer(context.Background(), &api.AddPeerRequest{Peer: config.NewPeerFromConfigStruct(m)})
assert.Nil(err)
<-ch
}
func TestDynamicNeighbor(t *testing.T) {
assert := assert.New(t)
log.SetLevel(log.DebugLevel)
s1 := NewBgpServer()
go s1.Serve()
err := s1.StartBgp(context.Background(), &api.StartBgpRequest{
Global: &api.Global{
As: 1,
RouterId: "1.1.1.1",
ListenPort: 10179,
},
})
assert.Nil(err)
defer s1.StopBgp(context.Background(), &api.StopBgpRequest{})
g := &config.PeerGroup{
Config: config.PeerGroupConfig{
PeerAs: 2,
PeerGroupName: "g",
},
}
err = s1.addPeerGroup(g)
assert.Nil(err)
d := &api.AddDynamicNeighborRequest{
DynamicNeighbor: &api.DynamicNeighbor{
Prefix: "127.0.0.0/24",
PeerGroup: "g",
},
}
err = s1.AddDynamicNeighbor(context.Background(), d)
assert.Nil(err)
s2 := NewBgpServer()
go s2.Serve()
err = s2.StartBgp(context.Background(), &api.StartBgpRequest{
Global: &api.Global{
As: 2,
RouterId: "2.2.2.2",
ListenPort: -1,
},
})
assert.Nil(err)
defer s2.StopBgp(context.Background(), &api.StopBgpRequest{})
m := &config.Neighbor{
Config: config.NeighborConfig{
NeighborAddress: "127.0.0.1",
PeerAs: 1,
},
Transport: config.Transport{
Config: config.TransportConfig{
RemotePort: 10179,
},
},
Timers: config.Timers{
Config: config.TimersConfig{
ConnectRetry: 1,
IdleHoldTimeAfterReset: 1,
},
},
}
ch := make(chan struct{})
go s2.MonitorPeer(context.Background(), &api.MonitorPeerRequest{}, func(peer *api.Peer) {
if peer.State.SessionState == api.PeerState_ESTABLISHED {
close(ch)
}
})
err = s2.AddPeer(context.Background(), &api.AddPeerRequest{Peer: config.NewPeerFromConfigStruct(m)})
assert.Nil(err)
<-ch
}
func TestGracefulRestartTimerExpired(t *testing.T) {
assert := assert.New(t)
s1 := NewBgpServer()
go s1.Serve()
err := s1.StartBgp(context.Background(), &api.StartBgpRequest{
Global: &api.Global{
As: 1,
RouterId: "1.1.1.1",
ListenPort: 10179,
},
})
assert.Nil(err)
defer s1.StopBgp(context.Background(), &api.StopBgpRequest{})
p1 := &api.Peer{
Conf: &api.PeerConf{
NeighborAddress: "127.0.0.1",
PeerAs: 2,
},
Transport: &api.Transport{
PassiveMode: true,
},
GracefulRestart: &api.GracefulRestart{
Enabled: true,
RestartTime: minConnectRetryInterval,
},
}
err = s1.AddPeer(context.Background(), &api.AddPeerRequest{Peer: p1})
assert.Nil(err)
s2 := NewBgpServer()
go s2.Serve()
err = s2.StartBgp(context.Background(), &api.StartBgpRequest{
Global: &api.Global{
As: 2,
RouterId: "2.2.2.2",
ListenPort: -1,
},
})
require.NoError(t, err)
defer s2.StopBgp(context.Background(), &api.StopBgpRequest{})
p2 := &api.Peer{
Conf: &api.PeerConf{
NeighborAddress: "127.0.0.1",
PeerAs: 1,
},
Transport: &api.Transport{
RemotePort: 10179,
},
GracefulRestart: &api.GracefulRestart{
Enabled: true,
RestartTime: 1,
},
Timers: &api.Timers{
Config: &api.TimersConfig{
ConnectRetry: 1,
IdleHoldTimeAfterReset: 1,
},
},
}
ch := make(chan struct{})
go s2.MonitorPeer(context.Background(), &api.MonitorPeerRequest{}, func(peer *api.Peer) {
if peer.State.SessionState == api.PeerState_ESTABLISHED {
close(ch)
}
})
err = s2.AddPeer(context.Background(), &api.AddPeerRequest{Peer: p2})
assert.Nil(err)
<-ch
// Force TCP session disconnected in order to cause Graceful Restart at s1
// side.
for _, n := range s2.neighborMap {
n.fsm.conn.Close()
}
s2.StopBgp(context.Background(), &api.StopBgpRequest{})
time.Sleep(5 * time.Second)
// Create dummy session which does NOT send BGP OPEN message in order to
// cause Graceful Restart timer expired.
var conn net.Conn
conn, err = net.Dial("tcp", "127.0.0.1:10179")
require.NoError(t, err)
defer conn.Close()
// this seems to take around 22 seconds... need to address this whole thing
ctx, cancel := context.WithTimeout(context.Background(), 30*time.Second)
defer cancel()
done := make(chan struct{})
// Waiting for Graceful Restart timer expired and moving on to IDLE state.
for {
s1.ListPeer(context.Background(), &api.ListPeerRequest{}, func(peer *api.Peer) {
if peer.State.SessionState == api.PeerState_IDLE {
close(done)
}
})
select {
case <-done:
return
case <-ctx.Done():
t.Fatalf("failed to enter IDLE state in the deadline")
return
}
}
}
func TestFamiliesForSoftreset(t *testing.T) {
f := func(f bgp.RouteFamily) config.AfiSafi {
return config.AfiSafi{
State: config.AfiSafiState{
Family: f,
},
}
}
peer := &peer{
fsm: &fsm{
pConf: &config.Neighbor{
AfiSafis: []config.AfiSafi{f(bgp.RF_RTC_UC), f(bgp.RF_IPv4_UC), f(bgp.RF_IPv6_UC)},
},
},
}
families := familiesForSoftreset(peer, bgp.RF_IPv4_UC)
assert.Equal(t, len(families), 1)
assert.Equal(t, families[0], bgp.RF_IPv4_UC)
families = familiesForSoftreset(peer, bgp.RF_RTC_UC)
assert.Equal(t, len(families), 1)
assert.Equal(t, families[0], bgp.RF_RTC_UC)
families = familiesForSoftreset(peer, bgp.RouteFamily(0))
assert.Equal(t, len(families), 2)
assert.NotContains(t, families, bgp.RF_RTC_UC)
}
func runNewServer(as uint32, routerID string, listenPort int32) *BgpServer {
s := NewBgpServer()
go s.Serve()
if err := s.StartBgp(context.Background(), &api.StartBgpRequest{
Global: &api.Global{
As: as,
RouterId: routerID,
ListenPort: listenPort,
},
}); err != nil {
log.Fatalf("Failed to start server %s: %s", s.bgpConfig.Global.Config.RouterId, err)
}
return s
}
func peerServers(t *testing.T, ctx context.Context, servers []*BgpServer, families []config.AfiSafiType) error {
for i, server := range servers {
for j, peer := range servers {
if i == j {
continue
}
neighborConfig := &config.Neighbor{
Config: config.NeighborConfig{
NeighborAddress: "127.0.0.1",
PeerAs: peer.bgpConfig.Global.Config.As,
},
AfiSafis: config.AfiSafis{},
Transport: config.Transport{
Config: config.TransportConfig{
RemotePort: uint16(peer.bgpConfig.Global.Config.Port),
},
},
Timers: config.Timers{
Config: config.TimersConfig{
ConnectRetry: 1,
IdleHoldTimeAfterReset: 1,
},
},
}
// first server to get neighbor config is passive to hopefully make handshake faster
if j > i {
neighborConfig.Transport.Config.PassiveMode = true
}
for _, family := range families {
neighborConfig.AfiSafis = append(neighborConfig.AfiSafis, config.AfiSafi{
Config: config.AfiSafiConfig{
AfiSafiName: family,
Enabled: true,
},
})
}
if err := server.AddPeer(ctx, &api.AddPeerRequest{Peer: config.NewPeerFromConfigStruct(neighborConfig)}); err != nil {
t.Fatal(err)
}
}
}
return nil
}
func parseRDRT(rdStr string) (bgp.RouteDistinguisherInterface, bgp.ExtendedCommunityInterface, error) {
rd, err := bgp.ParseRouteDistinguisher(rdStr)
if err != nil {
return nil, nil, err
}
rt, err := bgp.ParseExtendedCommunity(bgp.EC_SUBTYPE_ROUTE_TARGET, rdStr)
if err != nil {
return nil, nil, err
}
return rd, rt, nil
}
func addVrf(t *testing.T, s *BgpServer, vrfName, rdStr string, importRtsStr []string, exportRtsStr []string, id uint32) {
rd, _, err := parseRDRT(rdStr)
if err != nil {
t.Fatal(err)
}
importRts := make([]bgp.ExtendedCommunityInterface, 0, len(importRtsStr))
for _, importRtStr := range importRtsStr {
_, rt, err := parseRDRT(importRtStr)
if err != nil {
t.Fatal(err)
}
importRts = append(importRts, rt)
}
exportRts := make([]bgp.ExtendedCommunityInterface, 0, len(exportRtsStr))
for _, exportRtStr := range exportRtsStr {
_, rt, err := parseRDRT(exportRtStr)
if err != nil {
t.Fatal(err)
}
exportRts = append(exportRts, rt)
}
req := &api.AddVrfRequest{
Vrf: &api.Vrf{
Name: vrfName,
ImportRt: apiutil.MarshalRTs(importRts),
ExportRt: apiutil.MarshalRTs(exportRts),
Rd: apiutil.MarshalRD(rd),
Id: id,
},
}
if err = s.AddVrf(context.Background(), req); err != nil {
t.Fatal(err)
}
}
func TestDoNotReactToDuplicateRTCMemberships(t *testing.T) {
ctx := context.Background()
log.SetLevel(log.DebugLevel)
s1 := runNewServer(1, "1.1.1.1", 10179)
s2 := runNewServer(1, "2.2.2.2", 20179)
addVrf(t, s1, "vrf1", "111:111", []string{"111:111"}, []string{"111:111"}, 1)
addVrf(t, s2, "vrf1", "111:111", []string{"111:111"}, []string{"111:111"}, 1)
if err := peerServers(t, ctx, []*BgpServer{s1, s2}, []config.AfiSafiType{config.AFI_SAFI_TYPE_L3VPN_IPV4_UNICAST, config.AFI_SAFI_TYPE_RTC}); err != nil {
t.Fatal(err)
}
watcher := s1.watch(watchUpdate(true, ""))
// Add route to vrf1 on s2
attrs := []bgp.PathAttributeInterface{
bgp.NewPathAttributeOrigin(0),
bgp.NewPathAttributeNextHop("2.2.2.2"),
}
prefix := bgp.NewIPAddrPrefix(24, "10.30.2.0")
path := apiutil.NewPath(prefix, false, attrs, time.Now())
if _, err := s2.AddPath(ctx, &api.AddPathRequest{
TableType: api.TableType_VRF,
VrfId: "vrf1",
Path: path,
}); err != nil {
t.Fatal(err)
}
// s1 should receive this route from s2
t1 := time.NewTimer(time.Duration(30 * time.Second))
for found := false; !found; {
select {
case ev := <-watcher.Event():
switch msg := ev.(type) {
case *watchEventUpdate:
for _, path := range msg.PathList {
log.Infof("tester received path: %s", path.String())
if vpnPath, ok := path.GetNlri().(*bgp.LabeledVPNIPAddrPrefix); ok {
if vpnPath.Prefix.Equal(prefix.Prefix) {
log.Infof("tester found expected prefix: %s", vpnPath.Prefix)
found = true
} else {
log.Infof("unknown prefix %s != %s", vpnPath.Prefix, prefix.Prefix)
}
}
}
}
case <-t1.C:
t.Fatalf("timeout while waiting for update path event")
}
}
t1.Stop()
// fabricate duplicated rtc message from s1
// s2 should not send vpn route again
_, rt, err := parseRDRT("111:111")
if err != nil {
t.Fatal(err)
}
rtcNLRI := bgp.NewRouteTargetMembershipNLRI(1, rt)
rtcPath := table.NewPath(&table.PeerInfo{
AS: 1,
Address: net.ParseIP("127.0.0.1"),
LocalID: net.ParseIP("2.2.2.2"),
ID: net.ParseIP("1.1.1.1"),
}, rtcNLRI, false, []bgp.PathAttributeInterface{
bgp.NewPathAttributeOrigin(0),
bgp.NewPathAttributeNextHop("1.1.1.1"),
}, time.Now(), false)
s1Peer := s2.neighborMap["127.0.0.1"]
s2.propagateUpdate(s1Peer, []*table.Path{rtcPath})
t2 := time.NewTimer(time.Duration(2 * time.Second))
for done := false; !done; {
select {
case ev := <-watcher.Event():
switch msg := ev.(type) {
case *watchEventUpdate:
for _, path := range msg.PathList {
log.Infof("tester received path: %s", path.String())
if vpnPath, ok := path.GetNlri().(*bgp.LabeledVPNIPAddrPrefix); ok {
t.Fatalf("vpn prefix %s was unexpectedly received", vpnPath.Prefix)
}
}
}
case <-t2.C:
log.Infof("await update done")
done = true
}
}
s1.StopBgp(context.Background(), &api.StopBgpRequest{})
s2.StopBgp(context.Background(), &api.StopBgpRequest{})
}
func TestAddDeletePath(t *testing.T) {
ctx := context.Background()
s := runNewServer(1, "1.1.1.1", 10179)
nlri, _ := apb.New(&api.IPAddressPrefix{
Prefix: "10.0.0.0",
PrefixLen: 24,
})
a1, _ := apb.New(&api.OriginAttribute{
Origin: 0,
})
a2, _ := apb.New(&api.NextHopAttribute{
NextHop: "10.0.0.1",
})
attrs := []*apb.Any{a1, a2}
family := &api.Family{
Afi: api.Family_AFI_IP,
Safi: api.Family_SAFI_UNICAST,
}
listRib := func() []*api.Destination {
l := make([]*api.Destination, 0)
s.ListPath(ctx, &api.ListPathRequest{TableType: api.TableType_GLOBAL, Family: family}, func(d *api.Destination) { l = append(l, d) })
return l
}
var err error
// DeletePath(AddPath()) without PeerInfo
getPath := func() *api.Path {
return &api.Path{
Family: family,
Nlri: nlri,
Pattrs: attrs,
}
}
p1 := getPath()
_, err = s.AddPath(ctx, &api.AddPathRequest{
TableType: api.TableType_GLOBAL,
Path: p1,
})
assert.Nil(t, err)
assert.Equal(t, len(listRib()), 1)
err = s.DeletePath(ctx, &api.DeletePathRequest{
TableType: api.TableType_GLOBAL,
Path: p1,
})
assert.Nil(t, err)
assert.Equal(t, len(listRib()), 0)
// DeletePath(ListPath()) without PeerInfo
_, err = s.AddPath(ctx, &api.AddPathRequest{
TableType: api.TableType_GLOBAL,
Path: p1,
})
assert.Nil(t, err)
l := listRib()
assert.Equal(t, len(l), 1)
err = s.DeletePath(ctx, &api.DeletePathRequest{
TableType: api.TableType_GLOBAL,
Path: l[0].Paths[0],
})
assert.Nil(t, err)
assert.Equal(t, len(listRib()), 0)
p2 := getPath()
p2.SourceAsn = 1
p2.SourceId = "1.1.1.1"
// DeletePath(AddPath()) with PeerInfo
_, err = s.AddPath(ctx, &api.AddPathRequest{
TableType: api.TableType_GLOBAL,
Path: p2,
})
assert.Nil(t, err)
assert.Equal(t, len(listRib()), 1)
err = s.DeletePath(ctx, &api.DeletePathRequest{
TableType: api.TableType_GLOBAL,
Path: p2,
})
assert.Nil(t, err)
assert.Equal(t, len(listRib()), 0)
// DeletePath(ListPath()) with PeerInfo
_, err = s.AddPath(ctx, &api.AddPathRequest{
TableType: api.TableType_GLOBAL,
Path: p2,
})
assert.Nil(t, err)
l = listRib()
assert.Equal(t, len(l), 1)
err = s.DeletePath(ctx, &api.DeletePathRequest{
TableType: api.TableType_GLOBAL,
Path: l[0].Paths[0],
})
assert.Nil(t, err)
assert.Equal(t, len(listRib()), 0)
// DeletePath(AddPath()) with different PeerInfo
_, err = s.AddPath(ctx, &api.AddPathRequest{
TableType: api.TableType_GLOBAL,
Path: p2,
})
assert.Nil(t, err)
assert.Equal(t, len(listRib()), 1)
p3 := getPath()
p3.SourceAsn = 2
p3.SourceId = "1.1.1.2"
err = s.DeletePath(ctx, &api.DeletePathRequest{
TableType: api.TableType_GLOBAL,
Path: p3,
})
assert.Nil(t, err)
assert.Equal(t, len(listRib()), 1)
// DeletePath(AddPath()) with uuid
r, err := s.AddPath(ctx, &api.AddPathRequest{
TableType: api.TableType_GLOBAL,
Path: p2,
})
assert.Nil(t, err)
assert.Equal(t, len(listRib()), 1)
err = s.DeletePath(ctx, &api.DeletePathRequest{
TableType: api.TableType_GLOBAL,
Uuid: r.Uuid,
})
assert.Nil(t, err)
assert.Equal(t, len(listRib()), 0)
assert.Equal(t, len(s.uuidMap), 0)
r, err = s.AddPath(ctx, &api.AddPathRequest{
TableType: api.TableType_GLOBAL,
Path: p2,
})
assert.Nil(t, err)
assert.Equal(t, len(listRib()), 1)
assert.Equal(t, len(s.uuidMap), 1)
u := r.Uuid
asPath, _ := apb.New(&api.AsPathAttribute{
Segments: []*api.AsSegment{
{
Type: 1, // SET
Numbers: []uint32{100, 200, 300},
},
},
})
p2.Pattrs = append(p2.Pattrs, asPath)
r, err = s.AddPath(ctx, &api.AddPathRequest{
TableType: api.TableType_GLOBAL,
Path: p2,
})
assert.Nil(t, err)
assert.Equal(t, len(listRib()), 1)
assert.Equal(t, len(s.uuidMap), 1)
assert.NotEqual(t, u, r.Uuid)
s.StopBgp(context.Background(), &api.StopBgpRequest{})
}
func TestDeleteNonExistingVrf(t *testing.T) {
log.SetLevel(log.DebugLevel)
s := runNewServer(1, "1.1.1.1", 10179)
addVrf(t, s, "vrf1", "111:111", []string{"111:111"}, []string{"111:111"}, 1)
req := &api.DeleteVrfRequest{Name: "Invalidvrf"}
if err := s.DeleteVrf(context.Background(), req); err == nil {
t.Fatal("Did not raise error for invalid vrf deletion.", err)
}
s.StopBgp(context.Background(), &api.StopBgpRequest{})
}
func TestDeleteVrf(t *testing.T) {
log.SetLevel(log.DebugLevel)
s := runNewServer(1, "1.1.1.1", 10179)
addVrf(t, s, "vrf1", "111:111", []string{"111:111"}, []string{"111:111"}, 1)
req := &api.DeleteVrfRequest{Name: "vrf1"}
if err := s.DeleteVrf(context.Background(), req); err != nil {
t.Fatal("Vrf delete failed", err)
}
s.StopBgp(context.Background(), &api.StopBgpRequest{})
}
func TestAddBogusPath(t *testing.T) {
ctx := context.Background()
s := runNewServer(1, "1.1.1.1", 10179)
nlri, _ := apb.New(&api.IPAddressPrefix{})
a, _ := apb.New(&api.MpReachNLRIAttribute{})
_, err := s.AddPath(ctx, &api.AddPathRequest{
Path: &api.Path{
Family: &api.Family{Afi: api.Family_AFI_IP, Safi: api.Family_SAFI_UNICAST},
Nlri: nlri,
Pattrs: []*apb.Any{a},
},
})
assert.NotNil(t, err)
nlri, _ = apb.New(&api.IPAddressPrefix{})
a, _ = apb.New(&api.MpReachNLRIAttribute{
Family: &api.Family{Afi: api.Family_AFI_IP, Safi: api.Family_SAFI_FLOW_SPEC_UNICAST},
})
_, err = s.AddPath(ctx, &api.AddPathRequest{
Path: &api.Path{
Family: &api.Family{Afi: api.Family_AFI_IP, Safi: api.Family_SAFI_UNICAST},
Nlri: nlri,
Pattrs: []*apb.Any{a},
},
})
assert.NotNil(t, err)
}