Skip to content

Commit

Permalink
Merge pull request #578 from noironetworks/local-hpp-tests
Browse files Browse the repository at this point in the history
Add UT for local-hpp and fix couple issues
  • Loading branch information
mchalla authored Jul 25, 2024
2 parents c027360 + 43947a5 commit 02a67b9
Show file tree
Hide file tree
Showing 5 changed files with 1,083 additions and 2 deletions.
1 change: 1 addition & 0 deletions agent-ovs/Makefile.am
Original file line number Diff line number Diff line change
Expand Up @@ -520,6 +520,7 @@ if RENDERER_OVS
ovs/test/FlowManagerFixture.cpp \
ovs/test/IntFlowManager_test.cpp \
ovs/test/AccessFlowManager_test.cpp \
ovs/test/AccessFlowManager_LocalSG_test.cpp \
ovs/test/PacketInHandler_test.cpp \
ovs/test/AdvertManager_test.cpp \
ovs/test/PortMapper_test.cpp \
Expand Down
6 changes: 4 additions & 2 deletions agent-ovs/lib/PolicyManager.cpp
Original file line number Diff line number Diff line change
Expand Up @@ -1507,6 +1507,7 @@ static bool updatePolicyRules(PolicyManager &pMgr, OFFramework& framework,
using modelgbp::gbp::LocalSecGroupRuleToClassifierRSrc;
using modelgbp::gbp::LocalSecGroupRuleToActionRSrc;
using modelgbp::gbp::AllowDenyAction;
using modelgbp::gbp::LocalAllowDenyAction;
using modelgbp::gbp::RedirectAction;
using modelgbp::gbp::RedirectDestGroup;
using modelgbp::gbp::LogAction;
Expand Down Expand Up @@ -1573,7 +1574,8 @@ static bool updatePolicyRules(PolicyManager &pMgr, OFFramework& framework,
if (!r->isTargetSet()) {
continue;
}
if(r->getTargetClass().get() == AllowDenyAction::CLASS_ID) {
if(r->getTargetClass().get() == AllowDenyAction::CLASS_ID ||
r->getTargetClass().get() == LocalAllowDenyAction::CLASS_ID) {
optional<shared_ptr<Action> > act =
Action::resolve(framework, r->getTargetURI().get());
if (act) {
Expand Down Expand Up @@ -3390,7 +3392,7 @@ void PolicyManager::LocalSecGroupListener::objectUpdated(class_id_t classId,
pmanager.secGrpMap[uri].isLocal = true;
}

pmanager.taskQueue.dispatch("secgroup", [this]() {
pmanager.taskQueue.dispatch("localsecgroup", [this]() {
pmanager.updateSecGrps(true);
});
}
Expand Down
60 changes: 60 additions & 0 deletions agent-ovs/lib/include/opflexagent/test/ModbFixture.h
Original file line number Diff line number Diff line change
Expand Up @@ -90,12 +90,22 @@ class ModbFixture : public BaseFixture {
std::shared_ptr<modelgbp::gbpe::L24Classifier> classifier9;
std::shared_ptr<modelgbp::gbpe::L24Classifier> classifier10;

std::shared_ptr<modelgbp::gbpe::LocalL24Classifier> local_classifier0;
std::shared_ptr<modelgbp::gbpe::LocalL24Classifier> local_classifier1;
std::shared_ptr<modelgbp::gbpe::LocalL24Classifier> local_classifier2;
std::shared_ptr<modelgbp::gbpe::LocalL24Classifier> local_classifier5;
std::shared_ptr<modelgbp::gbpe::LocalL24Classifier> local_classifier6;
std::shared_ptr<modelgbp::gbpe::LocalL24Classifier> local_classifier7;
std::shared_ptr<modelgbp::gbpe::LocalL24Classifier> local_classifier8;
std::shared_ptr<modelgbp::gbpe::LocalL24Classifier> local_classifier9;

// order 10
std::shared_ptr<modelgbp::gbpe::L24Classifier> classifier11;
std::shared_ptr<modelgbp::gbpe::L24Classifier> classifier12;
std::shared_ptr<modelgbp::gbpe::L24Classifier> classifier13;
std::shared_ptr<modelgbp::gbpe::L24Classifier> classifier14;
std::shared_ptr<modelgbp::gbp::AllowDenyAction> action1;
std::shared_ptr<modelgbp::gbp::LocalAllowDenyAction> local_action1;
// order 20
std::shared_ptr<modelgbp::gbpe::L24Classifier> classifier15;
std::shared_ptr<modelgbp::gbpe::L24Classifier> classifier16;
Expand All @@ -109,6 +119,7 @@ class ModbFixture : public BaseFixture {
std::shared_ptr<modelgbp::gbpe::L24Classifier> classifier20;

std::shared_ptr<modelgbp::gbp::LogAction> action2;
std::shared_ptr<modelgbp::gbp::LocalLogAction> local_action2;

std::shared_ptr<modelgbp::gbp::AllowDenyAction> action3;
std::shared_ptr<modelgbp::gbp::LogAction> action4;
Expand Down Expand Up @@ -289,6 +300,55 @@ class ModbFixture : public BaseFixture {
using namespace modelgbp;
using namespace modelgbp::gbp;
using namespace modelgbp::gbpe;
Mutator mutator_local(framework, "policyelement");
/* blank classifier */
local_classifier0 = space->addGbpeLocalL24Classifier("classifier0");
local_classifier0->setOrder(10);


/* allow TCP to dst port 80 cons->prov */
local_classifier1 = space->addGbpeLocalL24Classifier("classifier1");
local_classifier1->setEtherT(l2::EtherTypeEnumT::CONST_IPV4)
.setProt(6 /* TCP */).setDFromPort(80);

/* allow ARP from prov->cons */
local_classifier2 = space->addGbpeLocalL24Classifier("classifier2");
local_classifier2->setEtherT(l2::EtherTypeEnumT::CONST_ARP);

/* allow bidirectional FCoE */
local_classifier5 = space->addGbpeLocalL24Classifier("classifier5");
local_classifier5->setOrder(20).setEtherT(l2::EtherTypeEnumT::CONST_FCOE);

/* allow SSH from port 22 with ACK+SYN */
local_classifier6 = space->addGbpeLocalL24Classifier("classifier6");
local_classifier6->setEtherT(l2::EtherTypeEnumT::CONST_IPV4)
.setProt(6 /* TCP */)
.setSFromPort(22)
.setTcpFlags(l4::TcpFlagsEnumT::CONST_ACK |
l4::TcpFlagsEnumT::CONST_SYN);

/* allow SSH from port 22 with EST */
local_classifier7 = space->addGbpeLocalL24Classifier("classifier7");
local_classifier7->setEtherT(l2::EtherTypeEnumT::CONST_IPV4)
.setProt(6 /* TCP */)
.setSFromPort(21)
.setTcpFlags(l4::TcpFlagsEnumT::CONST_ESTABLISHED);

/* allow TCPv6 to dst port 80 cons->prov */
local_classifier8 = space->addGbpeLocalL24Classifier("classifier8");
local_classifier8->setEtherT(l2::EtherTypeEnumT::CONST_IPV6)
.setProt(6 /* TCP */).setDFromPort(80);

/* Allow 22 reflexive */
local_classifier9 = space->addGbpeLocalL24Classifier("classifier9");
local_classifier9->setOrder(10)
.setEtherT(l2::EtherTypeEnumT::CONST_IPV4)
.setProt(6 /* TCP */)
.setDFromPort(22)
.setConnectionTracking(ConnTrackEnumT::CONST_REFLEXIVE);

local_action1 = space->addGbpLocalAllowDenyAction("action1");
mutator_local.commit();

Mutator mutator(framework, policyOwner);

Expand Down
Loading

0 comments on commit 02a67b9

Please sign in to comment.