summaryrefslogtreecommitdiff
path: root/smoketest/scripts/cli/test_nat64.py
blob: b5723ac7eb0908dc43632725d3cf69e422e1f108 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
#!/usr/bin/env python3
#
# Copyright (C) 2023 VyOS maintainers and contributors
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2 or later as
# published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program.  If not, see <http://www.gnu.org/licenses/>.

import json
import os
import unittest

from base_vyostest_shim import VyOSUnitTestSHIM
from vyos.configsession import ConfigSessionError
from vyos.utils.process import cmd
from vyos.utils.dict import dict_search

base_path = ['nat64']
src_path = base_path + ['source']

jool_nat64_config = '/run/jool/instance-100.json'


class TestNAT64(VyOSUnitTestSHIM.TestCase):
    @classmethod
    def setUpClass(cls):
        super(TestNAT64, cls).setUpClass()

        # ensure we can also run this test on a live system - so lets clean
        # out the current configuration :)
        cls.cli_delete(cls, base_path)

    def tearDown(self):
        self.cli_delete(base_path)
        self.cli_commit()
        self.assertFalse(os.path.exists(jool_nat64_config))

    def test_snat64(self):
        rule = '100'
        translation_rule = '10'
        prefix_v6 = '64:ff9b::/96'
        pool = '192.0.2.10'
        pool_port = '1-65535'

        self.cli_set(src_path + ['rule', rule, 'source', 'prefix', prefix_v6])
        self.cli_set(
            src_path
            + ['rule', rule, 'translation', 'pool', translation_rule, 'address', pool]
        )
        self.cli_set(
            src_path
            + ['rule', rule, 'translation', 'pool', translation_rule, 'port', pool_port]
        )
        self.cli_commit()

        # Load the JSON file
        with open(f'/run/jool/instance-{rule}.json', 'r') as json_file:
            config_data = json.load(json_file)

        # Assertions based on the content of the JSON file
        self.assertEqual(config_data['instance'], f'instance-{rule}')
        self.assertEqual(config_data['framework'], 'netfilter')
        self.assertEqual(config_data['global']['pool6'], prefix_v6)
        self.assertTrue(config_data['global']['manually-enabled'])

        # Check the pool4 entries
        pool4_entries = config_data.get('pool4', [])
        self.assertIsInstance(pool4_entries, list)
        self.assertGreater(len(pool4_entries), 0)

        for entry in pool4_entries:
            self.assertIn('protocol', entry)
            self.assertIn('prefix', entry)
            self.assertIn('port range', entry)

            protocol = entry['protocol']
            prefix = entry['prefix']
            port_range = entry['port range']

            if protocol == 'ICMP':
                self.assertEqual(prefix, pool)
                self.assertEqual(port_range, pool_port)
            elif protocol == 'UDP':
                self.assertEqual(prefix, pool)
                self.assertEqual(port_range, pool_port)
            elif protocol == 'TCP':
                self.assertEqual(prefix, pool)
                self.assertEqual(port_range, pool_port)
            else:
                self.fail(f'Unexpected protocol: {protocol}')


if __name__ == '__main__':
    unittest.main(verbosity=2)