|
| 1 | +class DVSAcl(object): |
| 2 | + def __init__(self, adb, cdb, sdb, cntrdb): |
| 3 | + self.asic_db = adb |
| 4 | + self.config_db = cdb |
| 5 | + self.state_db = sdb |
| 6 | + self.counters_db = cntrdb |
| 7 | + |
| 8 | + def create_acl_table(self, table_name, table_type, ports, stage=None): |
| 9 | + table_attrs = { |
| 10 | + "policy_desc": "DVS acl table test", |
| 11 | + "type": table_type, |
| 12 | + "ports": ",".join(ports) |
| 13 | + } |
| 14 | + |
| 15 | + if stage: |
| 16 | + table_attrs["stage"] = stage |
| 17 | + |
| 18 | + self.config_db.create_entry("ACL_TABLE", table_name, table_attrs) |
| 19 | + |
| 20 | + def update_acl_table(self, acl_table_name, ports): |
| 21 | + table_attrs = { |
| 22 | + "ports": ",".join(ports) |
| 23 | + } |
| 24 | + self.config_db.update_entry("ACL_TABLE", acl_table_name, table_attrs) |
| 25 | + |
| 26 | + def remove_acl_table(self, table_name): |
| 27 | + self.config_db.delete_entry("ACL_TABLE", table_name) |
| 28 | + |
| 29 | + def get_acl_table_group_ids(self, expt): |
| 30 | + acl_table_groups = self.asic_db.wait_for_n_keys("ASIC_STATE:SAI_OBJECT_TYPE_ACL_TABLE_GROUP", expt) |
| 31 | + return acl_table_groups |
| 32 | + |
| 33 | + def get_acl_table_ids(self, expt=1): |
| 34 | + num_keys = len(self.asic_db.default_acl_tables) + expt |
| 35 | + keys = self.asic_db.wait_for_n_keys("ASIC_STATE:SAI_OBJECT_TYPE_ACL_TABLE", num_keys) |
| 36 | + for k in self.asic_db.default_acl_tables: |
| 37 | + assert k in keys |
| 38 | + |
| 39 | + acl_tables = [k for k in keys if k not in self.asic_db.default_acl_tables] |
| 40 | + |
| 41 | + return acl_tables |
| 42 | + |
| 43 | + def get_acl_table_id(self): |
| 44 | + acl_tables = self.get_acl_table_ids() |
| 45 | + return acl_tables[0] |
| 46 | + |
| 47 | + def verify_acl_table_count(self, expt): |
| 48 | + num_keys = len(self.asic_db.default_acl_tables) + expt |
| 49 | + keys = self.asic_db.wait_for_n_keys("ASIC_STATE:SAI_OBJECT_TYPE_ACL_TABLE", num_keys) |
| 50 | + for k in self.asic_db.default_acl_tables: |
| 51 | + assert k in keys |
| 52 | + |
| 53 | + acl_tables = [k for k in keys if k not in self.asic_db.default_acl_tables] |
| 54 | + |
| 55 | + assert len(acl_tables) == expt |
| 56 | + |
| 57 | + def verify_acl_group_num(self, expt): |
| 58 | + acl_table_groups = self.get_acl_table_group_ids(expt) |
| 59 | + |
| 60 | + for group in acl_table_groups: |
| 61 | + fvs = self.asic_db.wait_for_entry("ASIC_STATE:SAI_OBJECT_TYPE_ACL_TABLE_GROUP", group) |
| 62 | + for k, v in fvs.items(): |
| 63 | + if k == "SAI_ACL_TABLE_GROUP_ATTR_ACL_STAGE": |
| 64 | + assert v == "SAI_ACL_STAGE_INGRESS" |
| 65 | + elif k == "SAI_ACL_TABLE_GROUP_ATTR_ACL_BIND_POINT_TYPE_LIST": |
| 66 | + assert v == "1:SAI_ACL_BIND_POINT_TYPE_PORT" |
| 67 | + elif k == "SAI_ACL_TABLE_GROUP_ATTR_TYPE": |
| 68 | + assert v == "SAI_ACL_TABLE_GROUP_TYPE_PARALLEL" |
| 69 | + else: |
| 70 | + assert False |
| 71 | + |
| 72 | + def verify_acl_table_group_member(self, acl_table_group_id, acl_table_id): |
| 73 | + self.asic_db.wait_for_entry("ASIC_STATE:SAI_OBJECT_TYPE_ACL_TABLE_GROUP", acl_table_group_id) |
| 74 | + self.asic_db.wait_for_entry("ASIC_STATE:SAI_OBJECT_TYPE_ACL_TABLE", acl_table_id) |
| 75 | + members = self.asic_db.get_keys("ASIC_STATE:SAI_OBJECT_TYPE_ACL_TABLE_GROUP_MEMBER") |
| 76 | + for m in members: |
| 77 | + fvs = self.asic_db.wait_for_entry("ASIC_STATE:SAI_OBJECT_TYPE_ACL_TABLE_GROUP_MEMBER", m) |
| 78 | + fvs = dict(fvs) |
| 79 | + if (fvs.pop("SAI_ACL_TABLE_GROUP_MEMBER_ATTR_ACL_TABLE_GROUP_ID") == acl_table_group_id and |
| 80 | + fvs.pop("SAI_ACL_TABLE_GROUP_MEMBER_ATTR_ACL_TABLE_ID") == acl_table_id) : |
| 81 | + return True |
| 82 | + assert False |
| 83 | + |
| 84 | + def verify_acl_group_member(self, acl_group_ids, acl_table_id): |
| 85 | + members = self.asic_db.wait_for_n_keys("ASIC_STATE:SAI_OBJECT_TYPE_ACL_TABLE_GROUP_MEMBER", len(acl_group_ids)) |
| 86 | + |
| 87 | + member_groups = [] |
| 88 | + for member in members: |
| 89 | + fvs = self.asic_db.wait_for_entry("ASIC_STATE:SAI_OBJECT_TYPE_ACL_TABLE_GROUP_MEMBER", member) |
| 90 | + for k, v in fvs.items(): |
| 91 | + if k == "SAI_ACL_TABLE_GROUP_MEMBER_ATTR_ACL_TABLE_GROUP_ID": |
| 92 | + assert v in acl_group_ids |
| 93 | + member_groups.append(v) |
| 94 | + elif k == "SAI_ACL_TABLE_GROUP_MEMBER_ATTR_ACL_TABLE_ID": |
| 95 | + assert v == acl_table_id |
| 96 | + elif k == "SAI_ACL_TABLE_GROUP_MEMBER_ATTR_PRIORITY": |
| 97 | + assert True |
| 98 | + else: |
| 99 | + assert False |
| 100 | + |
| 101 | + assert set(member_groups) == set(acl_group_ids) |
| 102 | + |
| 103 | + def verify_acl_table_ports_binding(self, ports, acl_table_id): |
| 104 | + for p in ports: |
| 105 | + # TBD: Introduce new API in dvs_databse.py to read by field |
| 106 | + fvs = self.counters_db.get_entry("COUNTERS_PORT_NAME_MAP", "") |
| 107 | + fvs = dict(fvs) |
| 108 | + port_oid = fvs.pop(p) |
| 109 | + #port_oid = self.counters_db.hget_entry("COUNTERS_PORT_NAME_MAP", "", p) |
| 110 | + fvs = self.asic_db.wait_for_entry("ASIC_STATE:SAI_OBJECT_TYPE_PORT", port_oid) |
| 111 | + fvs = dict(fvs) |
| 112 | + acl_table_group_id = fvs.pop("SAI_PORT_ATTR_INGRESS_ACL") |
| 113 | + self.verify_acl_table_group_member(acl_table_group_id, acl_table_id) |
| 114 | + |
| 115 | + def verify_acl_port_binding(self, bind_ports): |
| 116 | + acl_table_groups = self.asic_db.wait_for_n_keys("ASIC_STATE:SAI_OBJECT_TYPE_ACL_TABLE_GROUP", len(bind_ports)) |
| 117 | + |
| 118 | + port_groups = [] |
| 119 | + for port in [self.asic_db.port_name_map[p] for p in bind_ports]: |
| 120 | + fvs = self.asic_db.wait_for_entry("ASIC_STATE:SAI_OBJECT_TYPE_PORT", port) |
| 121 | + acl_table_group = fvs.pop("SAI_PORT_ATTR_INGRESS_ACL", None) |
| 122 | + assert acl_table_group in acl_table_groups |
| 123 | + port_groups.append(acl_table_group) |
| 124 | + |
| 125 | + assert len(port_groups) == len(bind_ports) |
| 126 | + assert set(port_groups) == set(acl_table_groups) |
| 127 | + |
| 128 | + def create_acl_rule(self, table_name, rule_name, qualifiers, action="FORWARD", priority="2020"): |
| 129 | + fvs = { |
| 130 | + "priority": priority, |
| 131 | + "PACKET_ACTION": action |
| 132 | + } |
| 133 | + |
| 134 | + for k, v in qualifiers.items(): |
| 135 | + fvs[k] = v |
| 136 | + |
| 137 | + self.config_db.create_entry("ACL_RULE", "{}|{}".format(table_name, rule_name), fvs) |
| 138 | + |
| 139 | + def remove_acl_rule(self, table_name, rule_name): |
| 140 | + self.config_db.delete_entry("ACL_RULE", "{}|{}".format(table_name, rule_name)) |
| 141 | + |
| 142 | + def get_acl_rule_id(self): |
| 143 | + num_keys = len(self.asic_db.default_acl_entries) + 1 |
| 144 | + keys = self.asic_db.wait_for_n_keys("ASIC_STATE:SAI_OBJECT_TYPE_ACL_ENTRY", num_keys) |
| 145 | + |
| 146 | + acl_entries = [k for k in keys if k not in self.asic_db.default_acl_entries] |
| 147 | + return acl_entries[0] |
| 148 | + |
| 149 | + def verify_no_acl_rules(self): |
| 150 | + num_keys = len(self.asic_db.default_acl_entries) |
| 151 | + keys = self.asic_db.wait_for_n_keys("ASIC_STATE:SAI_OBJECT_TYPE_ACL_ENTRY", num_keys) |
| 152 | + assert set(keys) == set(self.asic_db.default_acl_entries) |
| 153 | + |
| 154 | + def verify_acl_rule(self, qualifiers, action="FORWARD", priority="2020"): |
| 155 | + acl_rule_id = self.get_acl_rule_id() |
| 156 | + |
| 157 | + fvs = self.asic_db.wait_for_entry("ASIC_STATE:SAI_OBJECT_TYPE_ACL_ENTRY", acl_rule_id) |
| 158 | + self._check_acl_entry(fvs, qualifiers, action, priority) |
| 159 | + |
| 160 | + def verify_acl_rule_set(self, priorities, in_actions, expected): |
| 161 | + num_keys = len(self.asic_db.default_acl_entries) + len(priorities) |
| 162 | + keys = self.asic_db.wait_for_n_keys("ASIC_STATE:SAI_OBJECT_TYPE_ACL_ENTRY", num_keys) |
| 163 | + |
| 164 | + acl_entries = [k for k in keys if k not in self.asic_db.default_acl_entries] |
| 165 | + for entry in acl_entries: |
| 166 | + rule = self.asic_db.wait_for_entry("ASIC_STATE:SAI_OBJECT_TYPE_ACL_ENTRY", entry) |
| 167 | + priority = rule.get("SAI_ACL_ENTRY_ATTR_PRIORITY", None) |
| 168 | + assert priority in priorities |
| 169 | + self._check_acl_entry(rule, expected[priority], |
| 170 | + action=in_actions[priority], priority=priority) |
| 171 | + |
| 172 | + def _check_acl_entry(self, entry, qualifiers, action, priority): |
| 173 | + acl_table_id = self.get_acl_table_id() |
| 174 | + |
| 175 | + for k, v in entry.items(): |
| 176 | + if k == "SAI_ACL_ENTRY_ATTR_TABLE_ID": |
| 177 | + assert v == acl_table_id |
| 178 | + elif k == "SAI_ACL_ENTRY_ATTR_ADMIN_STATE": |
| 179 | + assert v == "true" |
| 180 | + elif k == "SAI_ACL_ENTRY_ATTR_PRIORITY": |
| 181 | + assert v == priority |
| 182 | + elif k == "SAI_ACL_ENTRY_ATTR_ACTION_COUNTER": |
| 183 | + assert True |
| 184 | + elif k == "SAI_ACL_ENTRY_ATTR_ACTION_PACKET_ACTION": |
| 185 | + if action == "FORWARD": |
| 186 | + assert v == "SAI_PACKET_ACTION_FORWARD" |
| 187 | + elif action == "DROP": |
| 188 | + assert v == "SAI_PACKET_ACTION_DROP" |
| 189 | + else: |
| 190 | + assert False |
| 191 | + elif k == "SAI_ACL_ENTRY_ATTR_ACTION_REDIRECT": |
| 192 | + if "REDIRECT" not in action: |
| 193 | + assert False |
| 194 | + elif k in qualifiers: |
| 195 | + assert qualifiers[k](v) |
| 196 | + else: |
| 197 | + assert False |
| 198 | + |
| 199 | + def get_simple_qualifier_comparator(self, expected_qualifier): |
| 200 | + def _match_qualifier(sai_qualifier): |
| 201 | + return expected_qualifier == sai_qualifier |
| 202 | + |
| 203 | + return _match_qualifier |
| 204 | + |
| 205 | + def get_port_list_comparator(self, expected_ports): |
| 206 | + def _match_port_list(sai_port_list): |
| 207 | + if not sai_port_list.startswith("{}:".format(len(expected_ports))): |
| 208 | + return False |
| 209 | + for port in expected_ports: |
| 210 | + if self.asic_db.port_name_map[port] not in sai_port_list: |
| 211 | + return False |
| 212 | + |
| 213 | + return True |
| 214 | + |
| 215 | + return _match_port_list |
| 216 | + |
| 217 | + def get_acl_range_comparator(self, expected_type, expected_ports): |
| 218 | + def _match_acl_range(sai_acl_range): |
| 219 | + range_id = sai_acl_range.split(":", 1)[1] |
| 220 | + fvs = self.asic_db.wait_for_entry("ASIC_STATE:SAI_OBJECT_TYPE_ACL_RANGE", range_id) |
| 221 | + for k, v in fvs.items(): |
| 222 | + if k == "SAI_ACL_RANGE_ATTR_TYPE" and v == expected_type: |
| 223 | + continue |
| 224 | + elif k == "SAI_ACL_RANGE_ATTR_LIMIT" and v == expected_ports: |
| 225 | + continue |
| 226 | + else: |
| 227 | + return False |
| 228 | + |
| 229 | + return True |
| 230 | + |
| 231 | + return _match_acl_range |
0 commit comments