Improve support for CPqD and parameterize tests
Changes:
- Made device_type a test_params so it can be controller from the
command line and can be used to switch between device-specific
behavior. The current device types are:
pmc:
To work with the PMC OLT.
On this device when the inner VLAN tag is popped, the device actually
emits a frame with VLAN tag 0 and PCP 0. Or, put it another way,
the way to emit a frame with a zero VLAN tag and zero PCP is to pop
the vlan header. Weird.
cpqd:
User-space switch which cannot receive zero-tagged vlans
due to kernel limitations.
On this device when a frame arrives with a VLAN tag 0 and PCP 0,
the kernel removes the VLAN header before the frame is passed to the
user-space switch. Wireshark/tcpdump still shows the header, but
not the app. This is addressed in the tests with not expecting
a VLAN header in such cases.
normal:
This is intended for "per-the-books" openflow switches
that do exactly what the flow rules say
- Adjusted some of the test-cases to support the 3 device types
- IGMP packet generator using scapy.
This is still work in progress, but this is a fairly accurate IGMP
pkt generator using scapy. The membership query is considered complete,
but the fields for the memberhip reports still need to be added.
There is a simple self-test at the end of the lib which can be executed
by just running 'python IGMP.py'
- Added verbage to README.md how to run on CPqD
- Added command line option -u to olt-topo to bring up mininet with
user-space reference switch CPqD
- Fixed mixed tab/space use in olt.py
Conflicts:
olt.py
Change-Id: I23553c228c20614c5e97e097fad4c578817d62c3
diff --git a/IGMP.py b/IGMP.py
new file mode 100644
index 0000000..a747d09
--- /dev/null
+++ b/IGMP.py
@@ -0,0 +1,210 @@
+from socket import *
+from struct import *
+from scapy.all import *
+from itertools import *
+
+IGMP_TYPE_MEMBERSHIP_QUERY = 0x11
+IGMP_TYPE_V3_MEMBERSHIP_REPORT = 0x22
+IGMP_TYPE_V1_MEMBERSHIP_REPORT = 0x12
+IGMP_TYPE_V2_MEMBERSHIP_REPORT = 0x16
+IGMP_TYPE_V2_LEAVE_GROUP = 0x17
+
+IGMP_V3_GR_TYPE_INCLUDE = 0x01
+IGMP_V3_GR_TYPE_EXCLUDE = 0x02
+IGMP_V3_GR_TYPE_CHANGE_TO_INCLUDE = 0x03
+IGMP_V3_GR_TYPE_CHANGE_TO_EXCLUDE = 0x04
+IGMP_V3_GR_TYPE_ALLOW_NEW = 0x05
+IGMP_V3_GR_TYPE_BLOCK_OLD = 0x06
+
+"""
+IGMPV3_ALL_ROUTERS = '224.0.0.22'
+IGMPv3 = 3
+IP_SRC = '1.2.3.4'
+ETHERTYPE_IP = 0x0800
+IGMP_DST_MAC = "01:00:5e:00:01:01"
+IGMP_SRC_MAC = "5a:e1:ac:ec:4d:a1"
+"""
+
+class IGMPv3(Packet):
+
+ name = "IGMPv3"
+
+ igmp_v3_types = {
+ IGMP_TYPE_MEMBERSHIP_QUERY: "Membership Query",
+ IGMP_TYPE_V3_MEMBERSHIP_REPORT: " Version 3 Mebership Report",
+ IGMP_TYPE_V2_MEMBERSHIP_REPORT: " Version 2 Mebership Report",
+ IGMP_TYPE_V1_MEMBERSHIP_REPORT: " Version 1 Mebership Report",
+ IGMP_TYPE_V2_LEAVE_GROUP: "Version 2 Leave Group"
+ }
+
+ fields_desc = [
+ ByteEnumField("type", IGMP_TYPE_MEMBERSHIP_QUERY, igmp_v3_types),
+ ByteField("max_resp_code", 0),
+ XShortField("checksum", None),
+ #IPField("group_address", "0.0.0.0"),
+
+ # membership query fields
+ ConditionalField(IPField("gaddr", "0.0.0.0"), lambda pkt: pkt.type == IGMP_TYPE_MEMBERSHIP_QUERY),
+ ConditionalField(BitField("resv", 0, 4), lambda pkt: pkt.type == IGMP_TYPE_MEMBERSHIP_QUERY),
+ ConditionalField(BitField("s", 0, 1), lambda pkt: pkt.type == IGMP_TYPE_MEMBERSHIP_QUERY),
+ ConditionalField(BitField("qrv", 0, 3), lambda pkt: pkt.type == IGMP_TYPE_MEMBERSHIP_QUERY),
+ ConditionalField(ByteField("qqic", 0), lambda pkt: pkt.type == IGMP_TYPE_MEMBERSHIP_QUERY),
+ ConditionalField(FieldLenField("numsrc", None, count_of="srcs"), lambda pkt: pkt.type == IGMP_TYPE_MEMBERSHIP_QUERY),
+ ConditionalField(FieldListField("srcs", None, IPField("src", "0.0.0.0"), "numsrc"), lambda pkt: pkt.type == IGMP_TYPE_MEMBERSHIP_QUERY)
+
+ # membership report fields
+ # TODO
+
+ ]
+
+ def post_build(self, pkt, payload):
+
+ pkt += payload
+
+ if self.type in [IGMP_TYPE_V3_MEMBERSHIP_REPORT,]: # max_resp_code field is reserved (0)
+ mrc = 0
+ else:
+ mrc = self.encode_float(self.max_resp_code)
+ pkt = pkt[:1] + chr(mrc) + pkt[2:]
+
+ if self.checksum is None:
+ chksum = checksum(pkt)
+ pkt = pkt[:2] + chr(chksum >> 8) + chr(chksum & 0xff) + pkt[4:]
+
+ return pkt
+
+ def encode_float(self, value):
+ """Encode max response time value per RFC 3376."""
+ if value < 128:
+ return value
+ if value > 31743:
+ return 255
+ exp = 0
+ value >>= 3
+ while value > 31:
+ exp += 1
+ value >>= 1
+ return 0x80 | (exp << 4) | (value & 0xf)
+
+
+ def decode_float(self, code):
+ if code < 128:
+ return code
+ mant = code & 0xf
+ exp = (code >> 4) & 0x7
+ return (mant | 0x10) << (exp + 3)
+
+ @staticmethod
+ def is_valid_mcaddr(ip):
+ byte1 = atol(ip) >> 24 & 0xff
+ return (byte1 & 0xf0) == 0xe0
+
+ @staticmethod
+ def fixup(pkt):
+ """Fixes up the underlying IP() and Ether() headers."""
+ assert pkt.haslayer(IGMPv3), "This packet is not an IGMPv4 packet; cannot fix it up"
+
+ igmp = pkt.getlayer(IGMPv3)
+
+ if pkt.haslayer(IP):
+ ip = pkt.getlayer(IP)
+ ip.ttl = 1
+ ip.proto = 2
+ ip.tos = 0xc0
+ ip.options = [IPOption_Router_Alert()]
+
+ if igmp.type == IGMP_TYPE_MEMBERSHIP_QUERY:
+ if igmp.gaddr == "0.0.0.0":
+ ip.dst = "224.0.0.1"
+ else:
+ assert IGMPv3.is_valid_mcaddr(igmp.gaddr), "IGMP membership query with invalid mcast address"
+ ip.dst = igmp.gaddr
+
+ elif igmp.type == IGMP_TYPE_V2_LEAVE_GROUP and IGMPv3.is_valid_mcaddr(igmp.gaddr):
+ ip.dst = "224.0.0.2"
+
+ elif (igmp.type in (IGMP_TYPE_V1_MEMBERSHIP_REPORT, IGMP_TYPE_V2_MEMBERSHIP_REPORT) and
+ IGMPv3.is_valid_mcaddr(igmp.gaddr)):
+ ip.dst = igmp.gaddr
+
+ # We do not need to fixup the ether layer, it is done by scapy
+ #
+ # if pkt.haslayer(Ether):
+ # eth = pkt.getlayer(Ether)
+ # ip_long = atol(ip.dst)
+ # ether.dst = '01:00:5e:%02x:%02x:%02x' % ( (ip_long >> 16) & 0x7f, (ip_long >> 8) & 0xff, ip_long & 0xff )
+
+
+ return pkt
+
+
+class IGMPv3gr(Packet):
+
+ name = "IGMPv3gr"
+
+ igmp_v3_gr_types = {
+ IGMP_V3_GR_TYPE_INCLUDE: "Include Mode",
+ IGMP_V3_GR_TYPE_EXCLUDE: "Exclude Mode",
+ IGMP_V3_GR_TYPE_CHANGE_TO_INCLUDE: "Change to Include Mode",
+ IGMP_V3_GR_TYPE_CHANGE_TO_EXCLUDE: "Change to Exclude Mode",
+ IGMP_V3_GR_TYPE_ALLOW_NEW: "Allow New Sources",
+ IGMP_V3_GR_TYPE_BLOCK_OLD: "Block Old Sources"
+ }
+
+ fields_desc = [
+ ByteEnumField("rtype", IGMP_V3_GR_TYPE_INCLUDE, igmp_v3_gr_types),
+ ByteField("aux_data_len", 0),
+ FieldLenField("numsrc", None, "sources"),
+ IPField("mcast_addr", "0.0.0.0"),
+ FieldListField("sources", None, IPField("src", "0.0.0.0"), "numsrc")
+ ]
+
+ def post_build(self, pkt, payload):
+ pkt += payload
+ if self.aux_data_len != 0:
+ print "WARNING: Auxiliary Data Length must be zero (0)"
+ return pkt
+
+
+bind_layers(IP, IGMPv3, frag=0, proto=2, ttl=1, tos=0xc0)
+bind_layers(IGMPv3, IGMPv3gr, frag=0, proto=2)
+bind_layers(IGMPv3gr, IGMPv3gr, frag=0, proto=2)
+
+
+if __name__ == "__main__":
+
+ print "test float encoding"
+ from math import log
+ max_expected_error = 1.0 / (2<<3) # four bit precision
+ p = IGMPv3()
+ for v in range(0, 31745):
+ c = p.encode_float(v)
+ d = p.decode_float(c)
+ rel_err = float(v-d)/v if v!=0 else 0.0
+ assert rel_err <= max_expected_error
+
+ print "construct membership query - general query"
+ mq = IGMPv3(type=IGMP_TYPE_MEMBERSHIP_QUERY, max_resp_code=120)
+ hexdump(str(mq))
+
+ print "construct membership query - group-specific query"
+ mq = IGMPv3(type=IGMP_TYPE_MEMBERSHIP_QUERY, max_resp_code=120, gaddr="224.0.0.1")
+ hexdump(str(mq))
+
+ print "construct membership query - group-and-source-specific query"
+ mq = IGMPv3(type=IGMP_TYPE_MEMBERSHIP_QUERY, max_resp_code=120, gaddr="224.0.0.1")
+ mq.srcs = ['1.2.3.4', '5.6.7.8']
+ hexdump(str(mq))
+
+ print "fixup"
+ mq = IGMPv3(type=IGMP_TYPE_MEMBERSHIP_QUERY)
+ mq.srcs = ['1.2.3.4', '5.6.7.8']
+ pkt = Ether() / IP() / mq
+ print "before fixup:"
+ hexdump(str(pkt))
+
+ print "after fixup:"
+ IGMPv3.fixup(pkt)
+ hexdump(str(pkt))
+
+ print "all ok"
diff --git a/README.md b/README.md
index fa736c3..2d94053 100644
--- a/README.md
+++ b/README.md
@@ -40,7 +40,7 @@
First install Mininet and its dependencies.
Then start the switch:
-
+
sudo olt-oftest/olt-topo.py
Now you can run the tests on the OVS switch using:
@@ -48,3 +48,30 @@
sudo ./oftest/oft --test-dir=olt-oftest/ -i 1@h1-eth0 -i 129@h129-eth0 --port 6633 -V 1.3
---
+
+# Running on CPqD soft-switch
+
+The above script can be used to start a mininet topology using the CPqD reference soft switch. CPqD can be installed with
+the Mininet installer using the following mode of the install script:
+
+ git clone git://github.com/mininet/mininet
+ ./mininet/utils/install.sh -n3fxw
+
+For further information on how to install CPqD, please refer to, e.g., https://github.com/CPqD/ofsoftswitch13/wiki/OpenFlow-1.3-Tutorial
+
+Once CPqD and mininet are installed, start the topology using:
+
+ sudo ./olt-oftest/olt-topo.py -u
+
+Now you can run the tests on the switch using:
+
+ sudo ./oftest/oft --test-dir=olt-oftest/ -i 1@h1-eth0 -i 2@h2-eth0 -i 3@h129-eth0 --port 6633 -V 1.3 \
+ -t "onu_port=1;onu_port2=2;olt_port=3;device_type='cpqd'"
+
+Please note that as of this writing, the following tests known to fail:
+
+ olt.TestGroupForwarding ... FAIL
+ olt.TestGroupModForwarding ... FAIL
+ olt.TestMeter ... FAIL
+ olt.TestCyclingDoubleVlan ... FAIL
+
diff --git a/olt-topo.py b/olt-topo.py
index 581084c..118e464 100755
--- a/olt-topo.py
+++ b/olt-topo.py
@@ -1,12 +1,17 @@
#!/usr/bin/python
+import sys
+
from mininet.topo import Topo
-from mininet.node import RemoteController
+from mininet.node import RemoteController, UserSwitch
from mininet.net import Mininet
from mininet.util import irange
from mininet.cli import CLI
from mininet.log import setLogLevel
+from optparse import OptionParser
+
+
class OltTopo( Topo ):
"Single switch with OLT port 129 and configurable number of ONU ports"
@@ -22,10 +27,23 @@
self.addLink( olt_port, switch, port2=129 )
if __name__ == '__main__':
- setLogLevel('debug')
- topo = OltTopo(k=2)
- net = Mininet( topo=topo, controller=RemoteController )
+ parser = OptionParser()
+ parser.add_option("-u", "--user-switch", dest="user_switch", action="store_true",
+ default=False, help="use given user mode switch (CPqD) or mininet")
+ (options, args) = parser.parse_args()
+
+ kargs = {}
+
+ if options.user_switch:
+ kargs['switch'] = UserSwitch
+
+ setLogLevel('debug')
+
+ topo = OltTopo()
+ topo.build(k=2)
+
+ net = Mininet( topo=topo, controller=RemoteController, **kargs )
net.start()
diff --git a/olt.py b/olt.py
index 82b520f..71aadb6 100644
--- a/olt.py
+++ b/olt.py
@@ -1,6 +1,7 @@
'''
OFTests for functionality needed from the OLT.
'''
+
import logging
from __builtin__ import xrange
from oftest import config
@@ -13,9 +14,16 @@
from oftest.testutils import *
-onu_port = test_param_get("onu_port", 130)
-onu_port2 = test_param_get("onu_port2", 130)
-olt_port = test_param_get("olt_port", 258)
+from IGMP import IGMPv3
+
+# These parameters can be altered from the command line using the -t or --test-params= options.
+# Example: -t 'onu_port=129;olt_port=288;device_type=pmc'
+#
+onu_port = test_param_get("onu_port", 130)
+onu_port2 = test_param_get("onu_port2", 131)
+olt_port = test_param_get("olt_port", 258)
+device_type = test_param_get("device_type", "normal") # options: "normal", "pmc", "cpqd"
+logging.info("device_type: %s" % device_type)
def double_vlan_udp_packet(pktlen=100,
@@ -70,9 +78,9 @@
scapy.UDP(sport=udp_sport, dport=udp_dport)
else:
if not ip_options:
- pkt = scapy.Ether(dst=eth_dst, src=eth_src) / \
- scapy.IP(src=ip_src, dst=ip_dst, tos=ip_tos, ttl=ip_ttl, ihl=ip_ihl) / \
- scapy.UDP(sport=udp_sport, dport=udp_dport)
+ pkt = scapy.Ether(dst=eth_dst, src=eth_src)/ \
+ scapy.IP(src=ip_src, dst=ip_dst, tos=ip_tos, ttl=ip_ttl, ihl=ip_ihl)/ \
+ scapy.UDP(sport=udp_sport, dport=udp_dport)
else:
pkt = scapy.Ether(dst=eth_dst, src=eth_src) / \
@@ -83,7 +91,6 @@
return pkt
-
def testPacketIn(self, match, parsed_pkt):
delete_all_flows(self.controller)
@@ -116,13 +123,10 @@
def buildIgmp(payload):
- ether = scapy.Ether(src="00:01:02:03:04:05")
- ip = scapy.IP(src="1.2.3.4")
- payload.igmpize(ip, ether)
- pkt = ether / ip / payload
+ pkt = pkt = IGMPv3.fixup(scapy.Ether() / scapy.IP() / payload)
if len(pkt) < 60:
pad_len = 60 - len(pkt)
- pad = scapy.PAD()
+ pad = scapy.scapy.layers.l2.Padding()
pad.load = '\x00' * pad_len
pkt = pkt / pad
return pkt
@@ -142,8 +146,19 @@
testPacketIn(self, match, pkt)
+class ARPPacketIn(base_tests.SimpleDataPlane):
+ """Verify packet-ins are sent for ARP packets """
+ def runTest(self):
+ logging.info("Running ARP Packet In test")
+ match = ofp.match()
+ match.oxm_list.append(ofp.oxm.eth_type(0x0806))
+
+ # Use ethertype 0x0806
+ pkt = simple_eth_packet(eth_type=0x0806)
+
+ testPacketIn(self, match, pkt)
class IGMPPacketIn(base_tests.SimpleDataPlane):
@@ -156,7 +171,7 @@
match.oxm_list.append(ofp.oxm.eth_type(0x800))
match.oxm_list.append(ofp.oxm.ip_proto(2))
- pkt = scapy.Ether(dst='01:00:5E:7F:FF:FF', src='00:00:00:00:00:01') / \
+ pkt = scapy.Ether(dst='01:00:5E:7F:FF:FF', src='00:00:00:00:00:01')/ \
scapy.IP(src='10.0.0.1', dst='10.0.0.2', ttl=60, tos=0, id=0, proto=2)
pkt = pkt / ("0" * (100 - len(pkt)))
@@ -170,26 +185,26 @@
def runTest(self):
logging.info("Running IGMP query packet out")
- igmp = scapy.IGMP(type=0x11, gaddr="224.0.0.1")
+ igmp = IGMPv3() # by default this is a query
pkt = buildIgmp(igmp)
- msg = ofp.message.packet_out()
- msg.in_port = ofp.OFPP_CONTROLLER
- msg.buffer_id = 0xffffffff
- msg.data = str(pkt)
- msg.actions = [ofp.action.output(
- port=onu_port,
- max_len=ofp.OFPCML_NO_BUFFER)]
- time.sleep(1)
+ msg = ofp.message.packet_out(
+ in_port=ofp.OFPP_CONTROLLER,
+ actions=[ofp.action.output(port=onu_port)],
+ buffer_id=ofp.OFP_NO_BUFFER,
+ data=str(pkt))
self.controller.message_send(msg)
+ rv = self.controller.message_send(msg)
+ self.assertTrue(rv == 0, "Error sending put message")
verify_no_errors(self.controller)
verify_packet(self, pkt, onu_port)
class TestMeter(base_tests.SimpleDataPlane):
+
def runTest(self):
logging.info("Running Meter tests")
dropMeterBand = ofp.meter_band.drop(rate=640)
@@ -211,9 +226,8 @@
match=match,
instructions=[
ofp.instruction.apply_actions(
- actions=[ofp.action.output(port=olt_port)]
- ),
- ofp.instruction.meter(meter_id=1)
+ actions=[ofp.action.output(port=olt_port)]),
+ ofp.instruction.meter(meter_id = 1)
],
buffer_id=ofp.OFP_NO_BUFFER,
priority=1000)
@@ -232,9 +246,8 @@
match=match,
instructions=[
ofp.instruction.apply_actions(
- actions=[ofp.action.output(port=onu_port)]
- ),
- ofp.instruction.meter(meter_id=1)
+ actions=[ofp.action.output(port=onu_port)]),
+ ofp.instruction.meter(meter_id = 1)
],
buffer_id=ofp.OFP_NO_BUFFER,
priority=1000)
@@ -292,25 +305,35 @@
# PUSH
match = ofp.match()
match.oxm_list.append(ofp.oxm.in_port(onu_port))
- match.oxm_list.append(ofp.oxm.vlan_vid_masked(value=ofp.OFPVID_PRESENT, value_mask=ofp.OFPVID_PRESENT))
- match.oxm_list.append(ofp.oxm.vlan_pcp(value=0))
+ if device_type == "cpqd":
+ match.oxm_list.append(ofp.oxm.vlan_vid(value=ofp.OFPVID_NONE))
+ actions = [
+ ofp.action.push_vlan(ethertype=0x8100),
+ ofp.action.set_field(ofp.oxm.vlan_vid(ofp.OFPVID_PRESENT | vlan_id)),
+ ofp.action.set_field(ofp.oxm.vlan_pcp(0)),
+ ofp.action.output(port=olt_port)
+ ]
+ else: # pmc, normal
+ match.oxm_list.append(ofp.oxm.vlan_vid_masked(value=ofp.OFPVID_PRESENT, value_mask=ofp.OFPVID_PRESENT))
+ match.oxm_list.append(ofp.oxm.vlan_pcp(value = 0))
+ actions = [
+ ofp.action.set_field(ofp.oxm.vlan_vid(ofp.OFPVID_PRESENT | vlan_id)),
+ ofp.action.set_field(ofp.oxm.vlan_pcp(0)),
+ ofp.action.output(port=olt_port)
+ ]
request = ofp.message.flow_add(
table_id=test_param_get("table", 0),
cookie=42,
match=match,
- instructions=[
- ofp.instruction.apply_actions(
- actions=[
- ofp.action.push_vlan(ethertype=0x8100),
- ofp.action.set_field(ofp.oxm.vlan_vid(ofp.OFPVID_PRESENT | vlan_id)),
- ofp.action.set_field(ofp.oxm.vlan_pcp(0)),
- ofp.action.output(port=olt_port)])],
+ instructions=[ofp.instruction.apply_actions(actions=actions)],
buffer_id=ofp.OFP_NO_BUFFER,
priority=1000)
logging.info("Inserting flow tagging upstream")
self.controller.message_send(request)
+ do_barrier(self.controller)
+ verify_no_errors(self.controller)
# POP
match = ofp.match()
@@ -332,6 +355,8 @@
logging.info("Inserting flow tagging downstream")
self.controller.message_send(request)
do_barrier(self.controller)
+ verify_no_errors(self.controller)
+
time.sleep(5)
inPkt = simple_udp_packet(dl_vlan_enable=True, vlan_vid=0, vlan_pcp=0)
@@ -348,7 +373,10 @@
inPkt = simple_udp_packet(pktlen=104, dl_vlan_enable=True,
vlan_vid=vlan_id, vlan_pcp=0, dl_vlan_cfi=0)
- outPkt = simple_udp_packet(pktlen=104, dl_vlan_enable=True, vlan_vid=0, vlan_pcp=0)
+ if device_type == 'pmc':
+ outPkt = simple_udp_packet(pktlen=104, dl_vlan_enable=True, vlan_vid=0, vlan_pcp=0)
+ else: # "normal", "cpqd""
+ outPkt = simple_udp_packet(pktlen=100)
# Send tagged packet in the OLT port and expect untagged packet out the OLT port
self.dataplane.send(olt_port, str(inPkt))
@@ -385,6 +413,7 @@
class TestGroupAdd(base_tests.SimpleDataPlane):
+
def runTest(self):
logging.info("Running Group tests")
delete_all_flows(self.controller)
@@ -420,6 +449,7 @@
class TestGroupMod(base_tests.SimpleDataPlane):
+
def runTest(self):
logging.info("Running Group tests")
delete_all_flows(self.controller)
@@ -471,6 +501,7 @@
class TestDuplicateGroup(base_tests.SimpleDataPlane):
+
def runTest(self):
logging.info("Running Group tests")
delete_all_flows(self.controller)
@@ -506,6 +537,7 @@
class TestGroupAndFlow(base_tests.SimpleDataPlane):
+
def runTest(self):
logging.info("Running Group tests")
delete_all_flows(self.controller)
@@ -554,7 +586,7 @@
do_barrier(self.controller)
verify_no_errors(self.controller)
- # Add the group and flow back, test it we can first remove group and then remove the flow.
+ # Add the group and flow back, test it we can first remove group and then remove the flow.
'''group_add = createAllGroupAdd(test_group_id, ports=[onu_port])
self.controller.message_send(group_add)
@@ -571,6 +603,7 @@
class TestGroupForwarding(base_tests.SimpleDataPlane):
+
def runTest(self):
logging.info("Running Group datapath forwarding tests")
delete_all_flows(self.controller)
@@ -615,7 +648,7 @@
verify_packet(self, outPkt, onu_port)
- # Now put 2 ONU ports in the group and test that the input packet is
+ # Now put 2 ONU ports in the group and test that the input packet is
# duplicated out both ports
group_mod = createAllGroupMod(test_group_id, ports=[onu_port, onu_port2])
self.controller.message_send(group_mod)
@@ -641,6 +674,7 @@
class TestGroupModForwarding(base_tests.SimpleDataPlane):
+
def runTest(self):
logging.info("Running datapath forwarding tests for group mod")
delete_all_flows(self.controller)
@@ -696,7 +730,7 @@
verify_no_packet(self, outPkt, onu_port)
verify_packet(self, outPkt, onu_port2)
- # Now remove all ports in the group and test that the input packet is no longer forwarded to any port
+ # Now remove all ports in the group and test that the input packet is no longer forwarded to any port
group_mod = createAllGroupMod(test_group_id, ports=[])
self.controller.message_send(group_mod)
do_barrier(self.controller)
@@ -707,6 +741,7 @@
class TransparentVlanTest(base_tests.SimpleDataPlane):
+
def runTest(self):
logging.info("Running transparent vlan tests")
delete_all_flows(self.controller)
@@ -754,9 +789,11 @@
time.sleep(2)
inPkt = simple_udp_packet(dl_vlan_enable=True, vlan_vid=vlan_id, vlan_pcp=0)
+
# upstream
self.dataplane.send(onu_port, str(inPkt))
verify_packet(self, inPkt, olt_port)
+
# downstream
self.dataplane.send(olt_port, str(inPkt))
verify_packet(self, inPkt, onu_port)
@@ -803,20 +840,21 @@
class DoubleVlanTest(base_tests.SimpleDataPlane):
+
def runTest(self):
logging.info("Running double vlan tests")
delete_all_flows(self.controller)
c_vlan_id = 100
s_vlan_id = 102
- # upstream flow rule
- installDoubleTaggingRule(s_vlan_id, c_vlan_id, self.controller)
+
+ installDoubleTaggingRules(s_vlan_id, c_vlan_id, self.controller)
# It takes some time for flows to propagate down to the data plane
time.sleep(10)
- testPacketFlow(self, c_vlan_id, s_vlan_id)
- time.sleep(2)
+ # Test packet flows
+ testPacketFlow(self, c_vlan_id, s_vlan_id)
# clean up the test
delete_all_flows(self.controller)
@@ -874,8 +912,9 @@
def testPacketFlow(test, c_vlan_id, s_vlan_id):
- incorrectTagPkt = simple_udp_packet(pktlen=100, dl_vlan_enable=True, vlan_vid=100, vlan_pcp=0)
- untaggedPkt = simple_udp_packet(pktlen=100, dl_vlan_enable=True, vlan_vid=0, vlan_pcp=0)
+ incorrectTagPkt = simple_udp_packet(pktlen=100, dl_vlan_enable=True, vlan_vid=100, vlan_pcp=1)
+ zeroTaggedPkt = simple_udp_packet(pktlen=100, dl_vlan_enable=True, vlan_vid=0, vlan_pcp=0)
+ untaggedPkt = simple_udp_packet(pktlen=96)
upstreamDoubleTaggedPkt = double_vlan_udp_packet(pktlen=104, dl_vlan_enable=True,
c_vlan_vid=c_vlan_id,
@@ -884,32 +923,48 @@
logging.info("Testing s-tag %d, c-tag %d" % (s_vlan_id, c_vlan_id))
- test.dataplane.send(onu_port, str(untaggedPkt))
- verify_packet(test, upstreamDoubleTaggedPkt, olt_port)
+ # test upstream untagged packet got double tag at OLT
+ self.dataplane.send(onu_port, str(zeroTaggedPkt))
+ verify_packet(self, upstreamDoubleTaggedPkt, olt_port)
# test downstream doubletagged packet got untagged at ONU
- test.dataplane.send(olt_port, str(upstreamDoubleTaggedPkt))
- verify_packet(test, untaggedPkt, onu_port)
+ self.dataplane.send(olt_port, str(upstreamDoubleTaggedPkt))
+ if device_type == "pmc":
+ verify_packet(self, zeroTaggedPkt, onu_port)
+ else:
+ verify_packet(self, untaggedPkt, onu_port)
# test upstream doubletagged packet got dropped
- test.dataplane.send(onu_port, str(upstreamDoubleTaggedPkt))
- verify_no_packet(test, upstreamDoubleTaggedPkt, olt_port)
+ self.dataplane.send(onu_port, str(upstreamDoubleTaggedPkt))
+ verify_no_packet(self, upstreamDoubleTaggedPkt, olt_port)
# test downstream untagged packet got dropped at ONU
- test.dataplane.send(olt_port, str(untaggedPkt))
- verify_no_packet(test, untaggedPkt, onu_port)
+ self.dataplane.send(olt_port, str(untaggedPkt))
+ verify_no_packet(self, untaggedPkt, onu_port)
# test upstream icorrectly tagged packet; should get dropped
- test.dataplane.send(onu_port, str(incorrectTagPkt))
- verify_no_packet(test, upstreamDoubleTaggedPkt, olt_port)
+ self.dataplane.send(onu_port, str(incorrectTagPkt))
+ verify_no_packet(self, upstreamDoubleTaggedPkt, olt_port)
-def installDoubleTaggingRule(s_vlan_id, c_vlan_id, controller, cookie = 42):
+def installDoubleTaggingRules(s_vlan_id, c_vlan_id, controller, cookie=42):
+
# upstream flow rule
match = ofp.match()
match.oxm_list.append(ofp.oxm.in_port(onu_port))
- match.oxm_list.append(ofp.oxm.vlan_vid(value=ofp.OFPVID_PRESENT))
- match.oxm_list.append(ofp.oxm.vlan_pcp(value=0))
+ if device_type == "cpqd":
+ match.oxm_list.append(ofp.oxm.vlan_vid(value=ofp.OFPVID_NONE))
+ actions = [
+ ofp.action.push_vlan(ethertype=0x8100),
+ ofp.action.set_field(ofp.oxm.vlan_vid(ofp.OFPVID_PRESENT | c_vlan_id)),
+ ofp.action.set_field(ofp.oxm.vlan_pcp(0))
+ ]
+ else: # "pmc", "normal"
+ match.oxm_list.append(ofp.oxm.vlan_vid(value=ofp.OFPVID_PRESENT))
+ match.oxm_list.append(ofp.oxm.vlan_pcp(value=0))
+ actions = [
+ ofp.action.set_field(ofp.oxm.vlan_vid(ofp.OFPVID_PRESENT | c_vlan_id))
+ ]
cookie += 1
# push inner vlan (c-vlan) for upstream
@@ -918,9 +973,7 @@
cookie=cookie,
match=match,
instructions=[
- ofp.instruction.apply_actions(
- actions=[
- ofp.action.set_field(ofp.oxm.vlan_vid(ofp.OFPVID_PRESENT | c_vlan_id))]),
+ ofp.instruction.apply_actions(actions=action),
ofp.instruction.goto_table(1)],
buffer_id=ofp.OFP_NO_BUFFER,
priority=1000)
@@ -999,6 +1052,3 @@
controller.message_send(request)
do_barrier(controller)
verify_no_errors(controller)
-
-
-