Skip to main content

The P4 Testing Framework

Project description

PTF Packet Testing Framework


Introduction

PTF is a Python based dataplane test framework. It is based on unittest, which is included in the standard Python distribution.

This document is meant to provide an introduction to the framework, discuss the basics of running tests and to provide examples of how to add tests.

Most of the code was taken from the OFTest framework. However, PTF focuses on the dataplane and is independent of OpenFlow. We also added several new features.


Contributing

Before you start pushing new changes to this repository, you should notice that the entire src/ code is automatically formatted with Black. Our GitHub Action pipeline will verify that code is correctly formatted and fail if not.

Two separate targets in makefile were prepared to make our work easier. If you want to run a check, type make format-check, but if you want to reformat your code, please use make format.

Black is listed in the requirements-dev.txt. To install it locally, you can use make set-dev or pip install -r requirements-dev.txt. More information about Black, you find at Black's GitHub Page


Longer Start

Dependencies

The following software is required to run PTF:

  • Python 3.x
  • Scapy 2.4.5 (unless you provide another packet manipulation module)
  • pypcap (optional - VLAN tests will fail without this)
  • tcpdump (optional - Scapy will complain if it's missing)

Root/sudo privilege is required on the host, in order to run ptf.

The default packet manipulator tool for ptf is Scapy. To install it use:

pip install scapy==2.4.5

To enable VLAN tests, you need to install pypcap:

pip install pypcap

For developer purpose, you should install requirements-dev.txt with:

pip install -r requirements-dev.txt

The tcpdump is optional, but to install it use:

# on CentOS
yum install tcpdump

# on Debian base
apt-get install tcpdump

Run PTF

Once you have written tests and your switch is running, you can run 'ptf'. Use --help to see command line switches.

For example:

sudo ./ptf --test-dir mytests/ --pypath $PWD \
	 --interface 0@veth1 --interface 1@veth3 --interface 2@veth5 \
	 --interface 3@veth7 --interface 4@veth9 --interface 5@veth11 \
	 --interface 6@veth13 --interface 7@veth15 --interface 8@veth17

This will run all the tests included in the mytests directory. The --pypath option can be used to easily add directories to the Python PATH. This is useful if you use a Python interface to configure your data plane (as part of your tests). The --interface option (or -i) can be used to specify the interfaces on which to inject packets (along with the corresponding port number).

Install PTF

PTF can be installed with pip:

# Install the latest version
pip install ptf
# Install specific version
pip install ptf==0.9.1

You can also install a local copy of PTF with pip install ..


Writing tests for your switch

Take a look at the example directory. This is not a working example as it is (the switch is not included), but it will show you how to write tests. This directory contains the following:

  • run_client.sh: a wrapper around ptf
  • switch_sai_thrift: empty directory, this is where the Python bindings to program the switch's control plane would be copied
  • mytests/sai_base_test.py: a wrapper Python class around PTF's BaseTest class. It is the base class for all the tests we added to mytests/switch.py
  • mytests/switch.py: some example tests

Running the example

If you want to run the example, you will need to obtain p4factory. For the following, I will assume that you cloned the repository and installed the dependencies. I will assume that environment variable P4FACTORY contains the path to the cloned repository.

First, you need to create the required veths:

cd $P4FACTORY/tools/
sudo ./veth_setup.sh

The next step is to compile the target switch and to run it:

cd $P4FACTORY/targets/switch/
make bm-switchsai
sudo ./behavioral-model

Finally, you can run the example tests:

cd <ptf-dir>/example/
sudo ../ptf --test-dir mytests/ \
	 --pypath $P4FACTORY/targets/switch/tests/pd_thrift/
	 --interface 0@veth1 --interface 1@veth3 --interface 2@veth5 \
	 --interface 3@veth7 --interface 4@veth9 --interface 5@veth11 \
	 --interface 6@veth13 --interface 7@veth15 --interface 8@veth17

New features

We added the following features to the base OFTest framework:

Filters

They can be used to discard some of the packets received from the switch. Take a look at sai_base_test.py for an example. You will see the following code testutils.add_filter(testutils.not_ipv6_filter) which tells PTF to discard received IPv6 packets. You can add your own filters (they have to be callable Python objects which take a Scapy packet as input).

Ternary matching

A PTF test -just like an OFTest test- matches the received packets against expected packets. This is an exact match. However, sometimes one does not care about all the fields in the packets. PTF introduces the Mask class which lets you specified some field you do not care about when performing the match. For example:

import mask
m = mask.Mask(expected_pkt)
m.set_do_not_care_scapy(IP, 'ttl')
verify_packets(<test>, m, <port list>)

Test timeout

A timeout for test cases can be specified using the --test-case-timeout command line option. This timeout must be expressed in seconds. A timeout of 0 is the same as no timeout (the default). If the timeout expires before the test is done executing, an exception will be raised and the test counts as an error. A timeout can also be specified for each individual test case, using the @testtimeout decorator, which needs to be imported from ptf.testutils. This timeout takes precedence over the global timeout passed on the command line.

Pluggable packet manipulation module

By default, ptf uses Scapy as the packet manipulation module, but it can also operate on a different one.

Such module must define/implement the same symbols, as defined in Scapy implementation of packet. Most of them are just names of most common frame headers (Ether, IP, TCP, UDP, ...).

The default implementation can be found in file /src/ptf/packet_scapy.py. It can be used as a reference when implementing your own version.

To use another packet manipulation module, one needs to provide it as argument -pmm or --packet-manipulation-module when running the ptf binary.

sudo ./ptf <other parameters> -pmm foo.packet_foo 

Please make sure that this module is loaded into the runtime before running any tests.

Sharding

You can achieve parallelization by splitting tests into N groups and running them with separate PTF processes. Each PTF instance will run disjoint subset of all selected tests.

For example to run specific set of tests across 3 PTF instances:

$ ssh mynode0 sudo ./ptf --test-dir mytests --num-shards 3 --shard-id 0 all ^other &
$ ssh mynode1 sudo ./ptf --test-dir mytests --num-shards 3 --shard-id 1 all ^other &
$ ssh mynode2 sudo ./ptf --test-dir mytests --num-shards 3 --shard-id 2 all ^other &

Configuring PTF

Platforms

The "platform" is a configuration file (written in Python) that tells PTF how to send packets to and receive packets from the dataplane of the switch.

eth

The default platform, eth, uses Linux Ethernet interfaces and is configured with the -i option (or --interface). Pass the option as -i ofport@interface, for example -i 1@eth1. If no -i options are given the the default configuration uses vEths.

remote

Another common platform, remote, provides support for testing of switches on a different host. This can be useful for cases where interfaces are not available on one host (i.e. they're not bound to a Linux interface driver) or where PTF cannot run on the same host (unsupported OS, missing software, etc.).

This can be enable by modifying the platforms/remote.py file to point to 4 NICs on the host running PTF, like so:

remote_port_map = {
    (0, 23) : "eth2", # port 23 of device 0 is connected to physical port on the server eth2
    (0, 24) : "eth3", # port 24 of device 0 is connected to physical port on the server eth3
    (0, 25) : "eth4",
    (0, 26) : "eth5"
}

nn

We introduce a new platform, nn, which uses [nanomsg] (http://nanomsg.org/) to send and receive packet to the switch. We support IPC and TCP nanomsg sockets. When using this platform, you need to make sure that the Python package [nnpy] (https://github.com/nanomsg/nnpy) is installed. With nn, do not use --interface, instead use --device-socket. For each device, you need to provide a list of enabled ports and a nanomsg socket address. For example:

--device-socket 0-{1,2,5-8}@ipc:///tmp/bmv2_packets_1.ipc

This command will enable ports 1, 2, 5, 6, 7, 8 on device 0. Packets for device 0 will be captured and send on IPC socket ipc:///tmp/bmv2_packets_1.ipc.

Passing Parameters to Tests

There is a facility for passing test-specific parameters into tests that works as follows. On the command line, give the parameter

--test-params="key1=17;key2=True"

You can then access these parameters in your tests' Pyhton code using the following code:

import ptf.testutils as testutils
# Returns a dictionary which includes all your parameters
test_params = testutils.test_params_get()
# Returns the value of the parameter "param", or None if not found
param_value = testutils.test_param_get("param")

Take a look at sai_base_test.py for an example.

Grouping Tests together

It is very easy to create groups of tests, using the provided group Python decorator. Simply decorate your test with @group(<name of group>).

Take a look at switch.py for an example.

One given test can belong to several groups. You can choose to run only the tests belonging to a given group using a command like this one:

sudo ./ptf --test-dir mytests/ --pypath $PWD <name of group>

We also provide a convenient disabled decorator for tests.

Support for multidevice tests

The original OFTest was meant to unit test a single OF-compliant switch. With PTF, we tried to add support for testing a network of several devices. If you do not intend to use this multi-device feature, you do not need to worry about it, it should not impact you. If you want to leverage this feature, here is what you need to do:

  • when adding interfaces, instead of writing <port_number>@<interface_name>, you need to write <device_number>-<port_number>@<interface_name>
  • when sending a packet, the port number becomes a tuple (device, port): send_packet(self, (<device_number>, <port_number>), pkt)
  • the verify_* functions where also updated to include device information. For example: verify_packets(self, pkt, device_number=<device_number>, ports=<port_list>). For more information, you can take a look at these functions in src/ptf/dataplane.py.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

ptf-0.10.0.tar.gz (209.6 kB view details)

Uploaded Source

Built Distribution

ptf-0.10.0-py3-none-any.whl (59.5 kB view details)

Uploaded Python 3

File details

Details for the file ptf-0.10.0.tar.gz.

File metadata

  • Download URL: ptf-0.10.0.tar.gz
  • Upload date:
  • Size: 209.6 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.1 CPython/3.11.4

File hashes

Hashes for ptf-0.10.0.tar.gz
Algorithm Hash digest
SHA256 b149860196690a8f7ad5464d62c6ecc36ec53b18e3a5af845251f02c23a2f55c
MD5 528fdae5291f1c95815ccbf626f115a2
BLAKE2b-256 6efc33fab02c0e8836f570fdc62796173a9f9017cb35da740037be71e9ed1af8

See more details on using hashes here.

File details

Details for the file ptf-0.10.0-py3-none-any.whl.

File metadata

  • Download URL: ptf-0.10.0-py3-none-any.whl
  • Upload date:
  • Size: 59.5 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.1 CPython/3.11.4

File hashes

Hashes for ptf-0.10.0-py3-none-any.whl
Algorithm Hash digest
SHA256 0c8f626e6d3a19efbb3da918849fa5e5a4e13315752e876822f2675bbf60edd6
MD5 53766458e08998749e2c39164e051ada
BLAKE2b-256 96ddc405056362da86494af91aed03cde223612699ccfd0216a0464776f9163a

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page