blob: 669fb0db1bf66cc5412ccca199cbad8a6354b392 [file] [log] [blame]
adminbae64d82013-08-01 10:50:15 -07001#!/usr/bin/env python
2'''
3Created on 26-Oct-2012
4
5@author: Anil Kumar (anilkumar.s@paxterrasolutions.com)
6
7
8 TestON is free software: you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation, either version 2 of the License, or
11 (at your option) any later version.
12
13 TestON is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
17
18 You should have received a copy of the GNU General Public License
19 along with TestON. If not, see <http://www.gnu.org/licenses/>.
20
21
22MininetCliDriver is the basic driver which will handle the Mininet functions
23'''
admin2a9548d2014-06-17 14:08:07 -070024import traceback
adminbae64d82013-08-01 10:50:15 -070025import pexpect
26import struct
27import fcntl
28import os
29import signal
30import re
31import sys
32import core.teston
33sys.path.append("../")
Jon Hall1ccf82c2014-10-15 14:55:16 -040034from math import pow
adminbae64d82013-08-01 10:50:15 -070035from drivers.common.cli.emulatordriver import Emulator
36from drivers.common.clidriver import CLI
37
38class MininetCliDriver(Emulator):
39 '''
Jon Hall41f40e82014-04-08 16:43:17 -070040 MininetCliDriver is the basic driver which will handle the Mininet functions
adminbae64d82013-08-01 10:50:15 -070041 '''
42 def __init__(self):
43 super(Emulator, self).__init__()
44 self.handle = self
45 self.wrapped = sys.modules[__name__]
46 self.flag = 0
47
48 def connect(self, **connectargs):
Jon Hall41f40e82014-04-08 16:43:17 -070049 '''
50 Here the main is the TestON instance after creating all the log handles.
51 '''
adminbae64d82013-08-01 10:50:15 -070052 for key in connectargs:
53 vars(self)[key] = connectargs[key]
54
55 self.name = self.options['name']
56 self.handle = super(MininetCliDriver, self).connect(user_name = self.user_name, ip_address = self.ip_address,port = None, pwd = self.pwd)
57
58 self.ssh_handle = self.handle
59
adminbae64d82013-08-01 10:50:15 -070060 if self.handle :
Jon Hallf2942ce2014-04-10 16:00:16 -070061 main.log.info(self.name+": Clearing any residual state or processes")
adminbae64d82013-08-01 10:50:15 -070062 self.handle.sendline("sudo mn -c")
adminf939f8b2014-04-03 17:22:56 -070063 i=self.handle.expect(['password\sfor\s','Cleanup\scomplete',pexpect.EOF,pexpect.TIMEOUT],120)
adminbae64d82013-08-01 10:50:15 -070064 if i==0:
Jon Hallf2942ce2014-04-10 16:00:16 -070065 main.log.info(self.name+": Sending sudo password")
adminf939f8b2014-04-03 17:22:56 -070066 self.handle.sendline(self.pwd)
67 i=self.handle.expect(['%s:'%(self.user),'\$',pexpect.EOF,pexpect.TIMEOUT],120)
adminbae64d82013-08-01 10:50:15 -070068 if i==1:
Jon Hallf2942ce2014-04-10 16:00:16 -070069 main.log.info(self.name+": Clean")
adminbae64d82013-08-01 10:50:15 -070070 elif i==2:
Jon Hallf2942ce2014-04-10 16:00:16 -070071 main.log.error(self.name+": Connection terminated")
adminbae64d82013-08-01 10:50:15 -070072 elif i==3: #timeout
Jon Hallf2942ce2014-04-10 16:00:16 -070073 main.log.error(self.name+": Something while cleaning MN took too long... " )
adminbae64d82013-08-01 10:50:15 -070074
Jon Hallf2942ce2014-04-10 16:00:16 -070075 main.log.info(self.name+": building fresh mininet")
adminbeea0032014-01-23 14:54:13 -080076 #### for reactive/PARP enabled tests
shahshreyaf4d4d0c2014-10-10 12:11:10 -070077 cmdString = "sudo mn " + self.options['arg1'] + " " + self.options['arg2'] + " --mac --controller " + self.options['controller'] + " " + self.options['arg3']
Jon Hall1ccf82c2014-10-15 14:55:16 -040078
79 argList = self.options['arg1'].split(",")
80 global topoArgList
81 topoArgList = argList[0].split(" ")
82 argList = map(int, argList[1:])
83 topoArgList = topoArgList[1:] + argList
84
85 #### for proactive flow with static ARP entries
shahshreyaf4d4d0c2014-10-10 12:11:10 -070086 #cmdString = "sudo mn " + self.options['arg1'] + " " + self.options['arg2'] + " --mac --arp --controller " + self.options['controller'] + " " + self.options['arg3']
adminbae64d82013-08-01 10:50:15 -070087 self.handle.sendline(cmdString)
Jon Hall333fa8c2014-04-11 11:24:58 -070088 self.handle.expect(["sudo mn",pexpect.EOF,pexpect.TIMEOUT])
adminbae64d82013-08-01 10:50:15 -070089 while 1:
90 i=self.handle.expect(['mininet>','\*\*\*','Exception',pexpect.EOF,pexpect.TIMEOUT],300)
91 if i==0:
Jon Hallf2942ce2014-04-10 16:00:16 -070092 main.log.info(self.name+": mininet built")
adminbae64d82013-08-01 10:50:15 -070093 return main.TRUE
94 if i==1:
Jon Hall333fa8c2014-04-11 11:24:58 -070095 self.handle.expect(["\n",pexpect.EOF,pexpect.TIMEOUT])
adminbae64d82013-08-01 10:50:15 -070096 main.log.info(self.handle.before)
97 elif i==2:
Jon Hallf2942ce2014-04-10 16:00:16 -070098 main.log.error(self.name+": Launching mininet failed...")
adminbae64d82013-08-01 10:50:15 -070099 return main.FALSE
100 elif i==3:
Jon Hallf2942ce2014-04-10 16:00:16 -0700101 main.log.error(self.name+": Connection timeout")
adminbae64d82013-08-01 10:50:15 -0700102 return main.FALSE
103 elif i==4: #timeout
Jon Hallf2942ce2014-04-10 16:00:16 -0700104 main.log.error(self.name+": Something took too long... " )
adminbae64d82013-08-01 10:50:15 -0700105 return main.FALSE
adminbae64d82013-08-01 10:50:15 -0700106 #if utilities.assert_matches(expect=patterns,actual=resultCommand,onpass="Network is being launched",onfail="Network launching is being failed "):
107 return main.TRUE
Jon Hallf2942ce2014-04-10 16:00:16 -0700108 else:#if no handle
109 main.log.error(self.name+": Connection failed to the host "+self.user_name+"@"+self.ip_address)
110 main.log.error(self.name+": Failed to connect to the Mininet")
adminbae64d82013-08-01 10:50:15 -0700111 return main.FALSE
Jon Hall1ccf82c2014-10-15 14:55:16 -0400112
113 def num_switches_n_links(self,topoType,depth,fanout):
114 if topoType == 'tree':
115 if fanout is None: #In tree topology, if fanout arg is not given, by default it is 2
116 fanout = 2
117 k = 0
Jon Hall38481722014-11-04 16:50:05 -0500118 count = 0
Jon Hall1ccf82c2014-10-15 14:55:16 -0400119 while(k <= depth-1):
Jon Hall38481722014-11-04 16:50:05 -0500120 count = count + pow(fanout,k)
Jon Hall1ccf82c2014-10-15 14:55:16 -0400121 k = k+1
Jon Hall38481722014-11-04 16:50:05 -0500122 num_switches = count
Jon Hall1ccf82c2014-10-15 14:55:16 -0400123 while(k <= depth-2):
124 '''depth-2 gives you only core links and not considering edge links as seen by ONOS
125 If all the links including edge links are required, do depth-1
126 '''
Jon Hall38481722014-11-04 16:50:05 -0500127 count = count + pow(fanout,k)
Jon Hall1ccf82c2014-10-15 14:55:16 -0400128 k = k+1
Jon Hall38481722014-11-04 16:50:05 -0500129 num_links = count * fanout
Jon Hall1ccf82c2014-10-15 14:55:16 -0400130 #print "num_switches for %s(%d,%d) = %d and links=%d" %(topoType,depth,fanout,num_switches,num_links)
131
132 elif topoType =='linear':
133 if fanout is None: #In linear topology, if fanout or num_hosts_per_sw is not given, by default it is 1
134 fanout = 1
135 num_switches = depth
136 num_hosts_per_sw = fanout
137 total_num_hosts = num_switches * num_hosts_per_sw
138 num_links = total_num_hosts + (num_switches - 1)
139 print "num_switches for %s(%d,%d) = %d and links=%d" %(topoType,depth,fanout,num_switches,num_links)
140 topoDict = {}
141 topoDict = {"num_switches":int(num_switches), "num_corelinks":int(num_links)}
142 return topoDict
143
144
145 def calculate_sw_and_links(self):
146 topoDict = self.num_switches_n_links(*topoArgList)
147 return topoDict
148
adminbae64d82013-08-01 10:50:15 -0700149 def pingall(self):
150 '''
Jon Hall41f40e82014-04-08 16:43:17 -0700151 Verifies the reachability of the hosts using pingall command.
adminbae64d82013-08-01 10:50:15 -0700152 '''
153 if self.handle :
Jon Hallf2942ce2014-04-10 16:00:16 -0700154 main.log.info(self.name+": Checking reachabilty to the hosts using pingall")
Jon Hall6094a362014-04-11 14:46:56 -0700155 try:
Jon Hallefa4fa12014-04-14 11:40:21 -0700156 response = self.execute(cmd="pingall",prompt="mininet>",timeout=120)
Jon Hall77f53ce2014-10-13 18:02:06 -0400157 print "response: " + str(response)
Jon Hall6094a362014-04-11 14:46:56 -0700158 except pexpect.EOF:
159 main.log.error(self.name + ": EOF exception found")
160 main.log.error(self.name + ": " + self.handle.before)
161 main.cleanup()
162 main.exit()
Jon Hallf4c8d012014-10-09 19:35:08 -0400163 pattern = 'Results\:\s0\%\sdropped\s'
andrew@onlab.us59e8f692014-10-09 21:41:48 -0400164 #FIXME:Pending Mininet Pull Request #408
Jon Hallf4c8d012014-10-09 19:35:08 -0400165 #pattern = 'Results\:\s0\.00\%\sdropped\s'
Jon Hallf2942ce2014-04-10 16:00:16 -0700166 #if utilities.assert_matches(expect=pattern,actual=response,onpass="All hosts are reaching",onfail="Unable to reach all the hosts"):
167 if re.search(pattern,response):
168 main.log.info(self.name+": All hosts are reachable")
adminbae64d82013-08-01 10:50:15 -0700169 return main.TRUE
170 else:
Jon Hallf2942ce2014-04-10 16:00:16 -0700171 main.log.error(self.name+": Unable to reach all the hosts")
adminbae64d82013-08-01 10:50:15 -0700172 return main.FALSE
173 else :
Jon Hallf2942ce2014-04-10 16:00:16 -0700174 main.log.error(self.name+": Connection failed to the host")
adminbae64d82013-08-01 10:50:15 -0700175 return main.FALSE
adminaeedddd2013-08-02 15:14:15 -0700176
177 def fpingHost(self,**pingParams):
178 '''
179 Uses the fping package for faster pinging...
180 *requires fping to be installed on machine running mininet
181 '''
182 args = utilities.parse_args(["SRC","TARGET"],**pingParams)
admin530b4c92013-08-14 16:54:35 -0700183 command = args["SRC"] + " fping -i 100 -t 20 -C 1 -q "+args["TARGET"]
adminaeedddd2013-08-02 15:14:15 -0700184 self.handle.sendline(command)
Jon Hall333fa8c2014-04-11 11:24:58 -0700185 self.handle.expect([args["TARGET"],pexpect.EOF,pexpect.TIMEOUT])
186 self.handle.expect(["mininet",pexpect.EOF,pexpect.TIMEOUT])
adminaeedddd2013-08-02 15:14:15 -0700187 response = self.handle.before
188 if re.search(":\s-" ,response):
Jon Hallf2942ce2014-04-10 16:00:16 -0700189 main.log.info(self.name+": Ping fail")
adminaeedddd2013-08-02 15:14:15 -0700190 return main.FALSE
admin530b4c92013-08-14 16:54:35 -0700191 elif re.search(":\s\d{1,2}\.\d\d", response):
Jon Hallf2942ce2014-04-10 16:00:16 -0700192 main.log.info(self.name+": Ping good!")
adminaeedddd2013-08-02 15:14:15 -0700193 return main.TRUE
Jon Hallf2942ce2014-04-10 16:00:16 -0700194 main.log.info(self.name+": Install fping on mininet machine... ")
195 main.log.info(self.name+": \n---\n"+response)
adminaeedddd2013-08-02 15:14:15 -0700196 return main.FALSE
adminbae64d82013-08-01 10:50:15 -0700197
198 def pingHost(self,**pingParams):
Jon Hallf2942ce2014-04-10 16:00:16 -0700199 '''
200 Ping from one mininet host to another
201 Currently the only supported Params: SRC and TARGET
202 '''
adminbae64d82013-08-01 10:50:15 -0700203 args = utilities.parse_args(["SRC","TARGET"],**pingParams)
204 #command = args["SRC"] + " ping -" + args["CONTROLLER"] + " " +args ["TARGET"]
Jon Hall0819fd92014-05-23 12:08:13 -0700205 command = args["SRC"] + " ping "+args ["TARGET"]+" -c 1 -i 1 -W 8"
Jon Hall6094a362014-04-11 14:46:56 -0700206 try:
Jon Hall6e18c7b2014-04-23 16:26:33 -0700207 main.log.warn("Sending: " + command)
208 #response = self.execute(cmd=command,prompt="mininet",timeout=10 )
209 self.handle.sendline(command)
210 i = self.handle.expect([command,pexpect.TIMEOUT])
211 if i == 1:
212 main.log.error(self.name + ": timeout when waiting for response from mininet")
213 main.log.error("response: " + str(self.handle.before))
214 i = self.handle.expect(["mininet>",pexpect.TIMEOUT])
215 if i == 1:
216 main.log.error(self.name + ": timeout when waiting for response from mininet")
217 main.log.error("response: " + str(self.handle.before))
218 response = self.handle.before
Jon Hall6094a362014-04-11 14:46:56 -0700219 except pexpect.EOF:
220 main.log.error(self.name + ": EOF exception found")
221 main.log.error(self.name + ": " + self.handle.before)
222 main.cleanup()
223 main.exit()
Jon Hallf2942ce2014-04-10 16:00:16 -0700224 main.log.info(self.name+": Ping Response: "+ response )
225 #if utilities.assert_matches(expect=',\s0\%\spacket\sloss',actual=response,onpass="No Packet loss",onfail="Host is not reachable"):
226 if re.search(',\s0\%\spacket\sloss',response):
Jon Hall6e18c7b2014-04-23 16:26:33 -0700227 main.log.info(self.name+": no packets lost, host is reachable")
adminbae64d82013-08-01 10:50:15 -0700228 main.last_result = main.TRUE
229 return main.TRUE
230 else :
Jon Hallf2942ce2014-04-10 16:00:16 -0700231 main.log.error(self.name+": PACKET LOST, HOST IS NOT REACHABLE")
adminbae64d82013-08-01 10:50:15 -0700232 main.last_result = main.FALSE
233 return main.FALSE
adminbae64d82013-08-01 10:50:15 -0700234
235 def checkIP(self,host):
236 '''
Jon Hall41f40e82014-04-08 16:43:17 -0700237 Verifies the host's ip configured or not.
adminbae64d82013-08-01 10:50:15 -0700238 '''
239 if self.handle :
Jon Hall6094a362014-04-11 14:46:56 -0700240 try:
241 response = self.execute(cmd=host+" ifconfig",prompt="mininet>",timeout=10)
242 except pexpect.EOF:
243 main.log.error(self.name + ": EOF exception found")
244 main.log.error(self.name + ": " + self.handle.before)
245 main.cleanup()
246 main.exit()
adminbae64d82013-08-01 10:50:15 -0700247
248 pattern = "inet\s(addr|Mask):([0-1]{1}[0-9]{1,2}|2[0-4][0-9]|25[0-5]|[0-9]{1,2}).([0-1]{1}[0-9]{1,2}|2[0-4][0-9]|25[0-5]|[0-9]{1,2}).([0-1]{1}[0-9]{1,2}|2[0-4][0-9]|25[0-5]|[0-9]{1,2}).([0-1]{1}[0-9]{1,2}|2[0-4][0-9]|25[0-5]|[0-9]{1,2})"
admin2a9548d2014-06-17 14:08:07 -0700249 #pattern = "inet addr:10.0.0.6"
Jon Hallf2942ce2014-04-10 16:00:16 -0700250 #if utilities.assert_matches(expect=pattern,actual=response,onpass="Host Ip configured properly",onfail="Host IP not found") :
251 if re.search(pattern,response):
252 main.log.info(self.name+": Host Ip configured properly")
adminbae64d82013-08-01 10:50:15 -0700253 return main.TRUE
254 else:
Jon Hallf2942ce2014-04-10 16:00:16 -0700255 main.log.error(self.name+": Host IP not found")
adminbae64d82013-08-01 10:50:15 -0700256 return main.FALSE
257 else :
Jon Hallf2942ce2014-04-10 16:00:16 -0700258 main.log.error(self.name+": Connection failed to the host")
adminbae64d82013-08-01 10:50:15 -0700259
260 def verifySSH(self,**connectargs):
Jon Hall6094a362014-04-11 14:46:56 -0700261 try:
262 response = self.execute(cmd="h1 /usr/sbin/sshd -D&",prompt="mininet>",timeout=10)
263 response = self.execute(cmd="h4 /usr/sbin/sshd -D&",prompt="mininet>",timeout=10)
264 for key in connectargs:
265 vars(self)[key] = connectargs[key]
266 response = self.execute(cmd="xterm h1 h4 ",prompt="mininet>",timeout=10)
267 except pexpect.EOF:
268 main.log.error(self.name + ": EOF exception found")
269 main.log.error(self.name + ": " + self.handle.before)
270 main.cleanup()
271 main.exit()
adminbae64d82013-08-01 10:50:15 -0700272 import time
273 time.sleep(20)
274 if self.flag == 0:
275 self.flag = 1
276 return main.FALSE
277 else :
278 return main.TRUE
279
280 def getMacAddress(self,host):
281 '''
Jon Hall41f40e82014-04-08 16:43:17 -0700282 Verifies the host's ip configured or not.
adminbae64d82013-08-01 10:50:15 -0700283 '''
284 if self.handle :
Jon Hall6094a362014-04-11 14:46:56 -0700285 try:
286 response = self.execute(cmd=host+" ifconfig",prompt="mininet>",timeout=10)
287 except pexpect.EOF:
288 main.log.error(self.name + ": EOF exception found")
289 main.log.error(self.name + ": " + self.handle.before)
290 main.cleanup()
291 main.exit()
adminbae64d82013-08-01 10:50:15 -0700292
Ahmed El-Hassanyf720e202014-04-04 16:11:36 -0700293 pattern = r'HWaddr\s([0-9A-F]{2}[:-]){5}([0-9A-F]{2})'
294 mac_address_search = re.search(pattern, response, re.I)
295 mac_address = mac_address_search.group().split(" ")[1]
Jon Hallf2942ce2014-04-10 16:00:16 -0700296 main.log.info(self.name+": Mac-Address of Host "+ host + " is " + mac_address)
Ahmed El-Hassanyf720e202014-04-04 16:11:36 -0700297 return mac_address
adminbae64d82013-08-01 10:50:15 -0700298 else :
Jon Hallf2942ce2014-04-10 16:00:16 -0700299 main.log.error(self.name+": Connection failed to the host")
Ahmed El-Hassanyfd329182014-04-10 11:38:16 -0700300
301 def getInterfaceMACAddress(self,host, interface):
302 '''
303 Return the IP address of the interface on the given host
304 '''
305 if self.handle :
Jon Hall6094a362014-04-11 14:46:56 -0700306 try:
307 response = self.execute(cmd=host+" ifconfig " + interface,
Ahmed El-Hassanyfd329182014-04-10 11:38:16 -0700308 prompt="mininet>",timeout=10)
Jon Hall6094a362014-04-11 14:46:56 -0700309 except pexpect.EOF:
310 main.log.error(self.name + ": EOF exception found")
311 main.log.error(self.name + ": " + self.handle.before)
312 main.cleanup()
313 main.exit()
Ahmed El-Hassanyfd329182014-04-10 11:38:16 -0700314
315 pattern = r'HWaddr\s([0-9A-F]{2}[:-]){5}([0-9A-F]{2})'
316 mac_address_search = re.search(pattern, response, re.I)
317 if mac_address_search is None:
318 main.log.info("No mac address found in %s" % response)
319 return main.FALSE
320 mac_address = mac_address_search.group().split(" ")[1]
321 main.log.info("Mac-Address of "+ host + ":"+ interface + " is " + mac_address)
322 return mac_address
323 else:
324 main.log.error("Connection failed to the host")
325
adminbae64d82013-08-01 10:50:15 -0700326 def getIPAddress(self,host):
327 '''
Jon Hall41f40e82014-04-08 16:43:17 -0700328 Verifies the host's ip configured or not.
adminbae64d82013-08-01 10:50:15 -0700329 '''
330 if self.handle :
Jon Hall6094a362014-04-11 14:46:56 -0700331 try:
332 response = self.execute(cmd=host+" ifconfig",prompt="mininet>",timeout=10)
333 except pexpect.EOF:
334 main.log.error(self.name + ": EOF exception found")
335 main.log.error(self.name + ": " + self.handle.before)
336 main.cleanup()
337 main.exit()
adminbae64d82013-08-01 10:50:15 -0700338
339 pattern = "inet\saddr:(\d+\.\d+\.\d+\.\d+)"
340 ip_address_search = re.search(pattern, response)
Jon Hallf2942ce2014-04-10 16:00:16 -0700341 main.log.info(self.name+": IP-Address of Host "+host +" is "+ip_address_search.group(1))
adminbae64d82013-08-01 10:50:15 -0700342 return ip_address_search.group(1)
343 else :
Jon Hallf2942ce2014-04-10 16:00:16 -0700344 main.log.error(self.name+": Connection failed to the host")
adminbae64d82013-08-01 10:50:15 -0700345
Ahmed El-Hassanyfd329182014-04-10 11:38:16 -0700346 def getSwitchDPID(self,switch):
347 '''
348 return the datapath ID of the switch
349 '''
350 if self.handle :
351 cmd = "py %s.dpid" % switch
Jon Hall6094a362014-04-11 14:46:56 -0700352 try:
353 response = self.execute(cmd=cmd,prompt="mininet>",timeout=10)
354 except pexpect.EOF:
355 main.log.error(self.name + ": EOF exception found")
356 main.log.error(self.name + ": " + self.handle.before)
357 main.cleanup()
358 main.exit()
Ahmed El-Hassanyfd329182014-04-10 11:38:16 -0700359 pattern = r'^(?P<dpid>\d)+'
360 result = re.search(pattern, response, re.MULTILINE)
361 if result is None:
362 main.log.info("Couldn't find DPID for switch '', found: %s" % (switch, response))
363 return main.FALSE
Jon Hallc1a1d242014-07-21 16:03:33 -0700364 return str(result.group(0))
Ahmed El-Hassanyfd329182014-04-10 11:38:16 -0700365 else:
366 main.log.error("Connection failed to the host")
367
admin2580a0e2014-07-29 11:24:34 -0700368 def getDPID(self, switch):
369 if self.handle:
370 self.handle.sendline("")
371 self.expect("mininet>")
372 cmd = "py %s.dpid" %switch
373 try:
374 response = self.execute(cmd=cmd,prompt="mininet>",timeout=10)
375 self.handle.expect("mininet>")
376 response = self.handle.before
377 return response
378 except pexpect.EOF:
379 main.log.error(self.name + ": EOF exception found")
380 main.log.error(self.name + ": " + self.handle.before)
381 main.cleanup()
382 main.exit()
383
384
Ahmed El-Hassanyfd329182014-04-10 11:38:16 -0700385 def getInterfaces(self, node):
386 '''
387 return information dict about interfaces connected to the node
388 '''
389 if self.handle :
Jon Hall38481722014-11-04 16:50:05 -0500390 cmd = 'py "\\n".join(["name=%s,mac=%s,ip=%s,enabled=%s" % (i.name, i.MAC(), i.IP(), i.isUp())'
Ahmed El-Hassanyfd329182014-04-10 11:38:16 -0700391 cmd += ' for i in %s.intfs.values()])' % node
Jon Hall6094a362014-04-11 14:46:56 -0700392 try:
393 response = self.execute(cmd=cmd,prompt="mininet>",timeout=10)
394 except pexpect.EOF:
395 main.log.error(self.name + ": EOF exception found")
396 main.log.error(self.name + ": " + self.handle.before)
397 main.cleanup()
398 main.exit()
Ahmed El-Hassanyfd329182014-04-10 11:38:16 -0700399 return response
400 else:
401 main.log.error("Connection failed to the node")
402
adminbae64d82013-08-01 10:50:15 -0700403 def dump(self):
Jon Hallf2942ce2014-04-10 16:00:16 -0700404 main.log.info(self.name+": Dump node info")
Jon Hall6094a362014-04-11 14:46:56 -0700405 try:
406 response = self.execute(cmd = 'dump',prompt = 'mininet>',timeout = 10)
407 except pexpect.EOF:
408 main.log.error(self.name + ": EOF exception found")
409 main.log.error(self.name + ": " + self.handle.before)
410 main.cleanup()
411 main.exit()
Ahmed El-Hassanyd1f71702014-04-04 16:12:45 -0700412 return response
adminbae64d82013-08-01 10:50:15 -0700413
414 def intfs(self):
Jon Hallf2942ce2014-04-10 16:00:16 -0700415 main.log.info(self.name+": List interfaces")
Jon Hall6094a362014-04-11 14:46:56 -0700416 try:
417 response = self.execute(cmd = 'intfs',prompt = 'mininet>',timeout = 10)
418 except pexpect.EOF:
419 main.log.error(self.name + ": EOF exception found")
420 main.log.error(self.name + ": " + self.handle.before)
421 main.cleanup()
422 main.exit()
Jon Hall668ed802014-04-08 17:17:59 -0700423 return response
adminbae64d82013-08-01 10:50:15 -0700424
425 def net(self):
Jon Hallf2942ce2014-04-10 16:00:16 -0700426 main.log.info(self.name+": List network connections")
Jon Hall6094a362014-04-11 14:46:56 -0700427 try:
428 response = self.execute(cmd = 'net',prompt = 'mininet>',timeout = 10)
429 except pexpect.EOF:
430 main.log.error(self.name + ": EOF exception found")
431 main.log.error(self.name + ": " + self.handle.before)
432 main.cleanup()
433 main.exit()
Jon Hall668ed802014-04-08 17:17:59 -0700434 return response
adminbae64d82013-08-01 10:50:15 -0700435
436 def iperf(self):
Jon Hallf2942ce2014-04-10 16:00:16 -0700437 main.log.info(self.name+": Simple iperf TCP test between two (optionally specified) hosts")
Jon Hall6094a362014-04-11 14:46:56 -0700438 try:
439 response = self.execute(cmd = 'iperf',prompt = 'mininet>',timeout = 10)
440 except pexpect.EOF:
441 main.log.error(self.name + ": EOF exception found")
442 main.log.error(self.name + ": " + self.handle.before)
443 main.cleanup()
444 main.exit()
Jon Hall668ed802014-04-08 17:17:59 -0700445 return response
adminbae64d82013-08-01 10:50:15 -0700446
447 def iperfudp(self):
Jon Hallf2942ce2014-04-10 16:00:16 -0700448 main.log.info(self.name+": Simple iperf TCP test between two (optionally specified) hosts")
Jon Hall6094a362014-04-11 14:46:56 -0700449 try:
450 response = self.execute(cmd = 'iperfudp',prompt = 'mininet>',timeout = 10)
451 except pexpect.EOF:
452 main.log.error(self.name + ": EOF exception found")
453 main.log.error(self.name + ": " + self.handle.before)
454 main.cleanup()
455 main.exit()
Jon Hall668ed802014-04-08 17:17:59 -0700456 return response
adminbae64d82013-08-01 10:50:15 -0700457
458 def nodes(self):
Jon Hallf2942ce2014-04-10 16:00:16 -0700459 main.log.info(self.name+": List all nodes.")
Jon Hall6094a362014-04-11 14:46:56 -0700460 try:
461 response = self.execute(cmd = 'nodes',prompt = 'mininet>',timeout = 10)
462 except pexpect.EOF:
463 main.log.error(self.name + ": EOF exception found")
464 main.log.error(self.name + ": " + self.handle.before)
465 main.cleanup()
466 main.exit()
Jon Hall668ed802014-04-08 17:17:59 -0700467 return response
adminbae64d82013-08-01 10:50:15 -0700468
469 def pingpair(self):
Jon Hallf2942ce2014-04-10 16:00:16 -0700470 main.log.info(self.name+": Ping between first two hosts")
Jon Hall6094a362014-04-11 14:46:56 -0700471 try:
472 response = self.execute(cmd = 'pingpair',prompt = 'mininet>',timeout = 20)
473 except pexpect.EOF:
474 main.log.error(self.name + ": EOF exception found")
475 main.log.error(self.name + ": " + self.handle.before)
476 main.cleanup()
477 main.exit()
adminbae64d82013-08-01 10:50:15 -0700478
Jon Hallf2942ce2014-04-10 16:00:16 -0700479 #if utilities.assert_matches(expect='0% packet loss',actual=response,onpass="No Packet loss",onfail="Hosts not reachable"):
480 if re.search(',\s0\%\spacket\sloss',response):
481 main.log.info(self.name+": Ping between two hosts SUCCESSFUL")
adminbae64d82013-08-01 10:50:15 -0700482 main.last_result = main.TRUE
483 return main.TRUE
484 else :
Jon Hallf2942ce2014-04-10 16:00:16 -0700485 main.log.error(self.name+": PACKET LOST, HOSTS NOT REACHABLE")
adminbae64d82013-08-01 10:50:15 -0700486 main.last_result = main.FALSE
487 return main.FALSE
488
489 def link(self,**linkargs):
490 '''
491 Bring link(s) between two nodes up or down
492 '''
adminbae64d82013-08-01 10:50:15 -0700493 args = utilities.parse_args(["END1","END2","OPTION"],**linkargs)
494 end1 = args["END1"] if args["END1"] != None else ""
495 end2 = args["END2"] if args["END2"] != None else ""
496 option = args["OPTION"] if args["OPTION"] != None else ""
Jon Hall38481722014-11-04 16:50:05 -0500497 main.log.info("Bring link between '"+ end1 +"' and '" + end2 + "' '" + option + "'")
adminbae64d82013-08-01 10:50:15 -0700498 command = "link "+str(end1) + " " + str(end2)+ " " + str(option)
Jon Hall6094a362014-04-11 14:46:56 -0700499 try:
Jon Halle80ef8c2014-04-29 15:29:13 -0700500 #response = self.execute(cmd=command,prompt="mininet>",timeout=10)
501 self.handle.sendline(command)
502 self.handle.expect("mininet>")
Jon Hall6094a362014-04-11 14:46:56 -0700503 except pexpect.EOF:
504 main.log.error(self.name + ": EOF exception found")
505 main.log.error(self.name + ": " + self.handle.before)
506 main.cleanup()
507 main.exit()
adminbae64d82013-08-01 10:50:15 -0700508 return main.TRUE
509
510
admin530b4c92013-08-14 16:54:35 -0700511 def yank(self,**yankargs):
adminaeedddd2013-08-02 15:14:15 -0700512 '''
admin530b4c92013-08-14 16:54:35 -0700513 yank a mininet switch interface to a host
adminaeedddd2013-08-02 15:14:15 -0700514 '''
admin530b4c92013-08-14 16:54:35 -0700515 main.log.info('Yank the switch interface attached to a host')
516 args = utilities.parse_args(["SW","INTF"],**yankargs)
adminaeedddd2013-08-02 15:14:15 -0700517 sw = args["SW"] if args["SW"] !=None else ""
518 intf = args["INTF"] if args["INTF"] != None else ""
519 command = "py "+ str(sw) + '.detach("' + str(intf) + '")'
Jon Hall6094a362014-04-11 14:46:56 -0700520 try:
521 response = self.execute(cmd=command,prompt="mininet>",timeout=10)
522 except pexpect.EOF:
523 main.log.error(self.name + ": EOF exception found")
524 main.log.error(self.name + ": " + self.handle.before)
525 main.cleanup()
526 main.exit()
adminaeedddd2013-08-02 15:14:15 -0700527 return main.TRUE
528
529 def plug(self, **plugargs):
530 '''
531 plug the yanked mininet switch interface to a switch
532 '''
533 main.log.info('Plug the switch interface attached to a switch')
admin530b4c92013-08-14 16:54:35 -0700534 args = utilities.parse_args(["SW","INTF"],**plugargs)
adminaeedddd2013-08-02 15:14:15 -0700535 sw = args["SW"] if args["SW"] !=None else ""
536 intf = args["INTF"] if args["INTF"] != None else ""
537 command = "py "+ str(sw) + '.attach("' + str(intf) + '")'
Jon Hall6094a362014-04-11 14:46:56 -0700538 try:
539 response = self.execute(cmd=command,prompt="mininet>",timeout=10)
540 except pexpect.EOF:
541 main.log.error(self.name + ": EOF exception found")
542 main.log.error(self.name + ": " + self.handle.before)
543 main.cleanup()
544 main.exit()
adminaeedddd2013-08-02 15:14:15 -0700545 return main.TRUE
546
547
548
adminbae64d82013-08-01 10:50:15 -0700549 def dpctl(self,**dpctlargs):
550 '''
Jon Hall41f40e82014-04-08 16:43:17 -0700551 Run dpctl command on all switches.
adminbae64d82013-08-01 10:50:15 -0700552 '''
553 main.log.info('Run dpctl command on all switches')
554 args = utilities.parse_args(["CMD","ARGS"],**dpctlargs)
555 cmd = args["CMD"] if args["CMD"] != None else ""
556 cmdargs = args["ARGS"] if args["ARGS"] != None else ""
557 command = "dpctl "+cmd + " " + str(cmdargs)
Jon Hall6094a362014-04-11 14:46:56 -0700558 try:
559 response = self.execute(cmd=command,prompt="mininet>",timeout=10)
560 except pexpect.EOF:
561 main.log.error(self.name + ": EOF exception found")
562 main.log.error(self.name + ": " + self.handle.before)
563 main.cleanup()
564 main.exit()
adminbae64d82013-08-01 10:50:15 -0700565 return main.TRUE
566
567
568 def get_version(self):
569 file_input = path+'/lib/Mininet/INSTALL'
570 version = super(Mininet, self).get_version()
571 pattern = 'Mininet\s\w\.\w\.\w\w*'
572 for line in open(file_input,'r').readlines():
573 result = re.match(pattern, line)
574 if result:
575 version = result.group(0)
576 return version
577
admin2a9548d2014-06-17 14:08:07 -0700578 def get_sw_controller_sanity(self, sw):
579 command = "sh ovs-vsctl get-controller "+str(sw)
580 try:
581 response = self.execute(cmd=command,prompt="mininet>",timeout=10)
582 if response:
583 return main.TRUE
584 else:
585 return main.FALSE
586 except pexpect.EOF:
587 main.log.error(self.name + ": EOF exception found")
588 main.log.error(self.name + ": " + self.handle.before)
589 main.cleanup()
590 main.exit()
591 else:
592 main.log.info(response)
593
adminbae64d82013-08-01 10:50:15 -0700594 def get_sw_controller(self,sw):
595 command = "sh ovs-vsctl get-controller "+str(sw)
Jon Hall6094a362014-04-11 14:46:56 -0700596 try:
597 response = self.execute(cmd=command,prompt="mininet>",timeout=10)
admin2a9548d2014-06-17 14:08:07 -0700598 print(response)
599 if response:
admindc1c5072014-06-24 15:57:19 -0700600 print("**********************")
admin2a9548d2014-06-17 14:08:07 -0700601 return response
602 else:
603 return main.FALSE
Jon Hall6094a362014-04-11 14:46:56 -0700604 except pexpect.EOF:
605 main.log.error(self.name + ": EOF exception found")
606 main.log.error(self.name + ": " + self.handle.before)
607 main.cleanup()
608 main.exit()
609 else:
610 main.log.info(response)
adminbae64d82013-08-01 10:50:15 -0700611
612 def assign_sw_controller(self,**kwargs):
Jon Hallf89c8552014-04-02 13:14:06 -0700613 '''
614 count is only needed if there is more than 1 controller
615 '''
616 args = utilities.parse_args(["COUNT"],**kwargs)
617 count = args["COUNT"] if args!={} else 1
618
619 argstring = "SW"
620 for j in range(count):
621 argstring = argstring + ",IP" + str(j+1) + ",PORT" + str(j+1)
622 args = utilities.parse_args(argstring.split(","),**kwargs)
623
adminbae64d82013-08-01 10:50:15 -0700624 sw = args["SW"] if args["SW"] != None else ""
admin530b4c92013-08-14 16:54:35 -0700625 ptcpA = int(args["PORT1"])+int(sw) if args["PORT1"] != None else ""
Jon Hallf89c8552014-04-02 13:14:06 -0700626 ptcpB = "ptcp:"+str(ptcpA) if ptcpA != "" else ""
627
628 command = "sh ovs-vsctl set-controller s" + str(sw) + " " + ptcpB + " "
629 for j in range(count):
630 i=j+1
631 args = utilities.parse_args(["IP"+str(i),"PORT"+str(i)],**kwargs)
632 ip = args["IP"+str(i)] if args["IP"+str(i)] != None else ""
633 port = args["PORT" + str(i)] if args["PORT" + str(i)] != None else ""
634 tcp = "tcp:" + str(ip) + ":" + str(port) + " " if ip != "" else ""
635 command = command + tcp
Jon Hall6094a362014-04-11 14:46:56 -0700636 try:
637 self.execute(cmd=command,prompt="mininet>",timeout=5)
638 except pexpect.EOF:
639 main.log.error(self.name + ": EOF exception found")
640 main.log.error(self.name + ": " + self.handle.before)
641 main.cleanup()
642 main.exit()
643 except:
644 main.log.info(self.name + ":::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::")
645 main.log.error( traceback.print_exc() )
646 main.log.info(":::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::")
647 main.cleanup()
648 main.exit()
adminbae64d82013-08-01 10:50:15 -0700649
Jon Hall0819fd92014-05-23 12:08:13 -0700650 def delete_sw_controller(self,sw):
651 '''
652 Removes the controller target from sw
653 '''
654
655 command = "sh ovs-vsctl del-controller "+str(sw)
656 try:
657 response = self.execute(cmd=command,prompt="mininet>",timeout=10)
658 except pexpect.EOF:
659 main.log.error(self.name + ": EOF exception found")
660 main.log.error(self.name + ": " + self.handle.before)
661 main.cleanup()
662 main.exit()
663 else:
664 main.log.info(response)
665
666
adminbae64d82013-08-01 10:50:15 -0700667 def disconnect(self):
Jon Hallf2942ce2014-04-10 16:00:16 -0700668 main.log.info(self.name+": Disconnecting mininet...")
adminbae64d82013-08-01 10:50:15 -0700669 response = ''
670 if self.handle:
Jon Hall6094a362014-04-11 14:46:56 -0700671 try:
672 response = self.execute(cmd="exit",prompt="(.*)",timeout=120)
673 response = self.execute(cmd="exit",prompt="(.*)",timeout=120)
Jon Halle80ef8c2014-04-29 15:29:13 -0700674 self.handle.sendline("sudo mn -c")
Jon Hall6094a362014-04-11 14:46:56 -0700675 except pexpect.EOF:
676 main.log.error(self.name + ": EOF exception found")
677 main.log.error(self.name + ": " + self.handle.before)
678 main.cleanup()
679 main.exit()
adminbae64d82013-08-01 10:50:15 -0700680 else :
Jon Hallf2942ce2014-04-10 16:00:16 -0700681 main.log.error(self.name+": Connection failed to the host")
adminbae64d82013-08-01 10:50:15 -0700682 response = main.FALSE
683 return response
admin07529932013-11-22 14:58:28 -0800684
685 def arping(self, src, dest, destmac):
686 self.handle.sendline('')
Jon Hall333fa8c2014-04-11 11:24:58 -0700687 self.handle.expect(["mininet",pexpect.EOF,pexpect.TIMEOUT])
admin07529932013-11-22 14:58:28 -0800688
689 self.handle.sendline(src + ' arping ' + dest)
690 try:
Jon Hall333fa8c2014-04-11 11:24:58 -0700691 self.handle.expect([destmac,pexpect.EOF,pexpect.TIMEOUT])
Jon Hallf2942ce2014-04-10 16:00:16 -0700692 main.log.info(self.name+": ARP successful")
Jon Hall333fa8c2014-04-11 11:24:58 -0700693 self.handle.expect(["mininet",pexpect.EOF,pexpect.TIMEOUT])
admin07529932013-11-22 14:58:28 -0800694 return main.TRUE
695 except:
Jon Hallf2942ce2014-04-10 16:00:16 -0700696 main.log.warn(self.name+": ARP FAILURE")
Jon Hall333fa8c2014-04-11 11:24:58 -0700697 self.handle.expect(["mininet",pexpect.EOF,pexpect.TIMEOUT])
admin07529932013-11-22 14:58:28 -0800698 return main.FALSE
699
700 def decToHex(num):
701 return hex(num).split('x')[1]
admin2a9548d2014-06-17 14:08:07 -0700702
703 def getSwitchFlowCount(self, switch):
704 '''
705 return the Flow Count of the switch
706 '''
707 if self.handle:
708 cmd = "sh ovs-ofctl dump-aggregate %s" % switch
709 try:
710 response = self.execute(cmd=cmd, prompt="mininet>", timeout=10)
711 except pexpect.EOF:
712 main.log.error(self.name + ": EOF exception found")
713 main.log.error(self.name + " " + self.handle.before)
714 main.cleanup()
715 main.exit()
716 pattern = "flow_count=(\d+)"
717 result = re.search(pattern, response, re.MULTILINE)
718 if result is None:
admin2a9548d2014-06-17 14:08:07 -0700719 main.log.info("Couldn't find flows on switch '', found: %s" % (switch, response))
720 return main.FALSE
721 return result.group(1)
722 else:
723 main.log.error("Connection failed to the Mininet host")
724
Ahmed El-Hassanyb6545eb2014-08-01 11:32:10 -0700725 def check_flows(self, sw, dump_format=None):
726 if dump_format:
727 command = "sh ovs-ofctl -F " + dump_format + " dump-flows " + str(sw)
728 else:
729 command = "sh ovs-ofctl dump-flows "+str(sw)
admin2a9548d2014-06-17 14:08:07 -0700730 try:
731 response=self.execute(cmd=command,prompt="mininet>",timeout=10)
732 return response
733 except pexpect.EOF:
734 main.log.error(self.name + ": EOF exception found")
735 main.log.error(self.name + ": " + self.handle.before)
736 main.cleanup()
737 main.exit()
738 else:
739 main.log.info(response)
740
741 def start_tcpdump(self, filename, intf = "eth0", port = "port 6633"):
742 '''
743 Runs tpdump on an intferface and saves the file
744 intf can be specified, or the default eth0 is used
745 '''
746 try:
747 self.handle.sendline("")
748 self.handle.expect("mininet>")
749 self.handle.sendline("sh sudo tcpdump -n -i "+ intf + " " + port + " -w " + filename.strip() + " &")
750 self.handle.sendline("")
751 self.handle.sendline("")
752 i=self.handle.expect(['No\ssuch\device','listening\son',pexpect.TIMEOUT,"mininet>"],timeout=10)
753 main.log.warn(self.handle.before + self.handle.after)
754 if i == 0:
755 main.log.error(self.name + ": tcpdump - No such device exists. tcpdump attempted on: " + intf)
756 return main.FALSE
757 elif i == 1:
758 main.log.info(self.name + ": tcpdump started on " + intf)
759 return main.TRUE
760 elif i == 2:
761 main.log.error(self.name + ": tcpdump command timed out! Check interface name, given interface was: " + intf)
762 return main.FALSE
763 elif i ==3:
764 main.log.info(self.name +": " + self.handle.before)
765 return main.TRUE
766 else:
767 main.log.error(self.name + ": tcpdump - unexpected response")
768 return main.FALSE
769 except pexpect.EOF:
770 main.log.error(self.name + ": EOF exception found")
771 main.log.error(self.name + ": " + self.handle.before)
772 main.cleanup()
773 main.exit()
774 except:
775 main.log.info(self.name + ":::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::")
776 main.log.error( traceback.print_exc() )
777 main.log.info(":::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::")
778 main.cleanup()
779 main.exit()
780
781 def stop_tcpdump(self):
782 "pkills tcpdump"
783 try:
784 self.handle.sendline("sh sudo pkill tcpdump")
785 self.handle.sendline("")
786 self.handle.sendline("")
787 self.handle.expect("mininet>")
788 except pexpect.EOF:
789 main.log.error(self.name + ": EOF exception found")
790 main.log.error(self.name + ": " + self.handle.before)
791 main.cleanup()
792 main.exit()
793 except:
794 main.log.info(self.name + ":::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::")
795 main.log.error( traceback.print_exc() )
796 main.log.info(":::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::")
797 main.cleanup()
798 main.exit()
799
Jon Hall3d87d502014-10-17 18:37:42 -0400800 def compare_switches(self, topo, switches_json):
801 '''
802 Compare mn and onos switches
803 topo: sts TestONTopology object
804 switches_json: parsed json object from the onos devices api
805
806 This uses the sts TestONTopology object
807
808 '''
809 import json
Jon Hall42db6dc2014-10-24 19:03:48 -0400810 #main.log.debug("Switches_json string: ", switches_json)
Jon Hall3d87d502014-10-17 18:37:42 -0400811 output = {"switches":[]}
812 for switch in topo.graph.switches: #iterate through the MN topology and pull out switches and and port info
Jon Hall3d87d502014-10-17 18:37:42 -0400813 ports = []
814 for port in switch.ports.values():
Jon Hall3d87d502014-10-17 18:37:42 -0400815 ports.append({'of_port': port.port_no, 'mac': str(port.hw_addr).replace('\'',''), 'name': port.name})
816 output['switches'].append({"name": switch.name, "dpid": str(switch.dpid).zfill(16), "ports": ports })
Jon Hall3d87d502014-10-17 18:37:42 -0400817
Jon Hall42db6dc2014-10-24 19:03:48 -0400818 #print "mn"
Jon Hall3d87d502014-10-17 18:37:42 -0400819 #print json.dumps(output, sort_keys=True,indent=4,separators=(',', ': '))
Jon Hall42db6dc2014-10-24 19:03:48 -0400820 #print "onos"
821 #print json.dumps(switches_json, sort_keys=True,indent=4,separators=(',', ': '))
Jon Hall3d87d502014-10-17 18:37:42 -0400822
823
824 # created sorted list of dpid's in MN and ONOS for comparison
825 mnDPIDs=[]
826 for switch in output['switches']:
827 mnDPIDs.append(switch['dpid'])
828 mnDPIDs.sort()
Jon Hall38481722014-11-04 16:50:05 -0500829 #print "List of Mininet switch DPID's"
Jon Hall3d87d502014-10-17 18:37:42 -0400830 #print mnDPIDs
831 if switches_json == "":#if rest call fails
Jon Hall42db6dc2014-10-24 19:03:48 -0400832 main.log.error(self.name + ".compare_switches(): Empty JSON object given from ONOS")
Jon Hall3d87d502014-10-17 18:37:42 -0400833 return main.FALSE
834 onos=switches_json
835 onosDPIDs=[]
836 for switch in onos:
Jon Hall38481722014-11-04 16:50:05 -0500837 if switch['available'] == True:
838 onosDPIDs.append(switch['id'].replace(":",'').replace("of",''))
839 #else:
840 #print "Switch is unavailable:"
841 #print switch
Jon Hall3d87d502014-10-17 18:37:42 -0400842 onosDPIDs.sort()
Jon Hall38481722014-11-04 16:50:05 -0500843 #print "List of ONOS switch DPID's"
Jon Hall3d87d502014-10-17 18:37:42 -0400844 #print onosDPIDs
845
846 if mnDPIDs!=onosDPIDs:
847 switch_results = main.FALSE
848 main.log.report( "Switches in MN but not in ONOS:")
849 main.log.report( str([switch for switch in mnDPIDs if switch not in onosDPIDs]))
850 main.log.report( "Switches in ONOS but not in MN:")
851 main.log.report( str([switch for switch in onosDPIDs if switch not in mnDPIDs]))
852 else:#list of dpid's match in onos and mn
853 #main.log.report("DEBUG: The dpid's of the switches in Mininet and ONOS match")
854 switch_results = main.TRUE
855 return switch_results
856
857
858
Jon Hall72cf1dc2014-10-20 21:04:50 -0400859 def compare_ports(self, topo, ports_json):
860 '''
861 Compare mn and onos ports
862 topo: sts TestONTopology object
863 ports_json: parsed json object from the onos ports api
864
865 Dependencies:
866 1. This uses the sts TestONTopology object
867 2. numpy - "sudo pip install numpy"
868
869 '''
Jon Hall1c9e8732014-10-27 19:29:27 -0400870 #FIXME: this does not look for extra ports in ONOS, only checks that ONOS has what is in MN
Jon Hall72cf1dc2014-10-20 21:04:50 -0400871 import json
872 from numpy import uint64
873 port_results = main.TRUE
874 output = {"switches":[]}
875 for switch in topo.graph.switches: #iterate through the MN topology and pull out switches and and port info
Jon Hall72cf1dc2014-10-20 21:04:50 -0400876 ports = []
877 for port in switch.ports.values():
878 #print port.hw_addr.toStr(separator = '')
Jon Hall38481722014-11-04 16:50:05 -0500879 ports.append({
880 'of_port': port.port_no,
881 'mac': str(port.hw_addr).replace('\'',''),
882 'name': port.name,
883 'enabled':port.enabled })
884 output['switches'].append({
885 "name": switch.name,
886 "dpid": str(switch.dpid).zfill(16),
887 "ports": ports })
Jon Hall72cf1dc2014-10-20 21:04:50 -0400888
889
890 ################ports#############
891 for switch in output['switches']:
892 mn_ports = []
893 onos_ports = []
894 for port in switch['ports']:
Jon Hall38481722014-11-04 16:50:05 -0500895 if port['enabled'] == True:
896 mn_ports.append(port['of_port'])
Jon Hall72cf1dc2014-10-20 21:04:50 -0400897 for onos_switch in ports_json:
Jon Hall38481722014-11-04 16:50:05 -0500898 #print "Iterating through a new switch as seen by ONOS"
899 #print onos_switch
900 if onos_switch['device']['available'] == True:
901 if onos_switch['device']['id'].replace(':','').replace("of", '') == switch['dpid']:
902 for port in onos_switch['ports']:
903 if port['isEnabled']:
904 #print "Iterating through available ports on the switch"
905 #print port
906 onos_ports.append(int(port['port']))
Jon Hall72cf1dc2014-10-20 21:04:50 -0400907 mn_ports.sort(key=float)
908 onos_ports.sort(key=float)
909 #print "\nPorts for Switch %s:" % (switch['name'])
910 #print "\tmn_ports[] = ", mn_ports
911 #print "\tonos_ports[] = ", onos_ports
912
Jon Hall38481722014-11-04 16:50:05 -0500913 #NOTE:For OF1.3, the OFP_local port number is 0xfffffffe or 4294967294 instead of 0xfffe or 65534 in OF1.0,
914 # ONOS topology sees the correct port number, however MN topology as read from line 151 of
915 # https://github.com/ucb-sts/sts/blob/topology_refactoring2/sts/entities/teston_entities.py
916 # is 0xfffe which doesn't work correctly with OF1.3 switches.
Jon Hall72cf1dc2014-10-20 21:04:50 -0400917
Jon Hall38481722014-11-04 16:50:05 -0500918 #NOTE: ONOS is abstracting port numbers to 64bit unsigned number(long). So we will be converting the
919 # OF reserved ports to these numbers
920
921
Jon Hall72cf1dc2014-10-20 21:04:50 -0400922 #TODO: handle other reserved port numbers besides LOCAL
923 for mn_port,onos_port in zip(mn_ports,onos_ports):
Jon Hall38481722014-11-04 16:50:05 -0500924 #print "mn == onos port?"
925 #print mn_port, onos_port
926 if mn_port == onos_port or (mn_port == 65534 and onos_port == long(uint64(-2))):
Jon Hall72cf1dc2014-10-20 21:04:50 -0400927 continue
928 #don't set results to true here as this is just one of many checks and it might override a failure
929 else: #the ports of this switch don't match
930 port_results = main.FALSE
931 break
932 if port_results == main.FALSE:
933 main.log.report("The list of ports for switch %s(%s) does not match:" % (switch['name'], switch['dpid']) )
934 main.log.report("mn_ports[] = " + str(mn_ports))
935 main.log.report("onos_ports[] = " + str(onos_ports))
936 return port_results
937
938
939
940
941 def compare_links(self, topo, links_json):
942 '''
943 Compare mn and onos links
944 topo: sts TestONTopology object
945 links_json: parsed json object from the onos links api
946
947 This uses the sts TestONTopology object
948
949 '''
Jon Hall1c9e8732014-10-27 19:29:27 -0400950 #FIXME: this does not look for extra links in ONOS, only checks that ONOS has what is in MN
Jon Hall72cf1dc2014-10-20 21:04:50 -0400951 import json
952 link_results = main.TRUE
953 output = {"switches":[]}
954 onos = links_json
955 for switch in topo.graph.switches: #iterate through the MN topology and pull out switches and and port info
Jon Hall38481722014-11-04 16:50:05 -0500956 # print "Iterating though switches as seen by Mininet"
957 # print switch
Jon Hall72cf1dc2014-10-20 21:04:50 -0400958 ports = []
959 for port in switch.ports.values():
960 #print port.hw_addr.toStr(separator = '')
961 ports.append({'of_port': port.port_no, 'mac': str(port.hw_addr).replace('\'',''), 'name': port.name})
962 output['switches'].append({"name": switch.name, "dpid": str(switch.dpid).zfill(16), "ports": ports })
963 #######Links########
964
Jon Hall38481722014-11-04 16:50:05 -0500965 mn_links = [link for link in topo.patch_panel.network_links if (link.port1.enabled and link.port2.enabled)]
966 #print "mn_links:"
967 #print mn_links
968 if 2*len(mn_links) == len(onos):
Jon Hall72cf1dc2014-10-20 21:04:50 -0400969 link_results = main.TRUE
970 else:
971 link_results = main.FALSE
Jon Hall38481722014-11-04 16:50:05 -0500972 main.log.report("Mininet has %i bidirectional links and ONOS has %i unidirectional links" % (len(mn_links), len(onos) ))
Jon Hall72cf1dc2014-10-20 21:04:50 -0400973
974
975 # iterate through MN links and check if an ONOS link exists in both directions
976 # NOTE: Will currently only show mn links as down if they are cut through STS.
977 # We can either do everything through STS or wait for up_network_links
978 # and down_network_links to be fully implemented.
Jon Hall38481722014-11-04 16:50:05 -0500979 for link in mn_links:
Jon Hall72cf1dc2014-10-20 21:04:50 -0400980 #print "Link: %s" % link
981 #TODO: Find a more efficient search method
982 node1 = None
983 port1 = None
984 node2 = None
985 port2 = None
986 first_dir = main.FALSE
987 second_dir = main.FALSE
988 for switch in output['switches']:
989 #print "Switch: %s" % switch['name']
990 if switch['name'] == link.node1.name:
991 node1 = switch['dpid']
992 for port in switch['ports']:
993 if str(port['name']) == str(link.port1):
994 port1 = port['of_port']
995 if node1 is not None and node2 is not None:
996 break
997 if switch['name'] == link.node2.name:
998 node2 = switch['dpid']
999 for port in switch['ports']:
1000 if str(port['name']) == str(link.port2):
1001 port2 = port['of_port']
1002 if node1 is not None and node2 is not None:
1003 break
1004
1005
1006 for onos_link in onos:
1007 onos_node1 = onos_link['src']['device'].replace(":",'').replace("of", '')
1008 onos_node2 = onos_link['dst']['device'].replace(":",'').replace("of", '')
1009 onos_port1 = onos_link['src']['port']
1010 onos_port2 = onos_link['dst']['port']
1011
1012 #print "Checking ONOS for link %s/%s -> %s/%s and" % (node1, port1, node2, port2)
1013 #print "Checking ONOS for link %s/%s -> %s/%s" % (node2, port2, node1, port1)
1014 # check onos link from node1 to node2
1015 if str(onos_node1) == str(node1) and str(onos_node2) == str(node2):
1016 if int(onos_port1) == int(port1) and int(onos_port2) == int(port2):
1017 first_dir = main.TRUE
1018 else:
1019 main.log.report('The port numbers do not match for ' +str(link) +\
1020 ' between ONOS and MN. When cheking ONOS for link '+\
1021 '%s/%s -> %s/%s' % (node1, port1, node2, port2)+\
1022 ' ONOS has the values %s/%s -> %s/%s' %\
1023 (onos_node1, onos_port1, onos_node2, onos_port2))
1024
1025 # check onos link from node2 to node1
1026 elif ( str(onos_node1) == str(node2) and str(onos_node2) == str(node1) ):
1027 if ( int(onos_port1) == int(port2) and int(onos_port2) == int(port1) ):
1028 second_dir = main.TRUE
1029 else:
1030 main.log.report('The port numbers do not match for ' +str(link) +\
1031 ' between ONOS and MN. When cheking ONOS for link '+\
1032 '%s/%s -> %s/%s' % (node2, port2, node1, port1)+\
1033 ' ONOS has the values %s/%s -> %s/%s' %\
1034 (onos_node2, onos_port2, onos_node1, onos_port1))
1035 else:#this is not the link you're looking for
1036 pass
1037 if not first_dir:
1038 main.log.report('ONOS does not have the link %s/%s -> %s/%s' % (node1, port1, node2, port2))
1039 if not second_dir:
1040 main.log.report('ONOS does not have the link %s/%s -> %s/%s' % (node2, port2, node1, port1))
1041 link_results = link_results and first_dir and second_dir
Jon Hall62df9242014-10-22 12:20:17 -04001042 return link_results
Jon Hall72cf1dc2014-10-20 21:04:50 -04001043
1044
andrewonlab3f0a4af2014-10-17 12:25:14 -04001045 def get_hosts(self):
1046 '''
1047 Returns a list of all hosts
1048 Don't ask questions just use it
1049 '''
1050 self.handle.sendline("")
1051 self.handle.expect("mininet>")
1052
1053 self.handle.sendline("py [ host.name for host in net.hosts ]")
1054 self.handle.expect("mininet>")
admin2a9548d2014-06-17 14:08:07 -07001055
andrewonlab3f0a4af2014-10-17 12:25:14 -04001056 handle_py = self.handle.before
1057 handle_py = handle_py.split("]\r\n",1)[1]
1058 handle_py = handle_py.rstrip()
admin2a9548d2014-06-17 14:08:07 -07001059
andrewonlab3f0a4af2014-10-17 12:25:14 -04001060 self.handle.sendline("")
1061 self.handle.expect("mininet>")
admin2a9548d2014-06-17 14:08:07 -07001062
andrewonlab3f0a4af2014-10-17 12:25:14 -04001063 host_str = handle_py.replace("]", "")
1064 host_str = host_str.replace("'", "")
1065 host_str = host_str.replace("[", "")
1066 host_list = host_str.split(",")
1067
1068 return host_list
adminbae64d82013-08-01 10:50:15 -07001069
Jon Hall38481722014-11-04 16:50:05 -05001070
1071 def update(self):
1072 '''
1073 updates the port address and status information for each port in mn
1074 '''
1075 #TODO: Add error checking. currently the mininet command has no output
1076 main.log.info("Updateing MN port information")
1077 self.handle.sendline("")
1078 self.handle.expect("mininet>")
1079
1080 self.handle.sendline("update")
1081 self.handle.expect("mininet>")
1082
1083 self.handle.sendline("")
1084 self.handle.expect("mininet>")
1085
1086 return main.TRUE
1087
1088
1089
adminbae64d82013-08-01 10:50:15 -07001090if __name__ != "__main__":
1091 import sys
1092 sys.modules[__name__] = MininetCliDriver()
admin2a9548d2014-06-17 14:08:07 -07001093