Adding ONOS Segment Routing CLI files to new repo
diff --git a/cli/vnsw.py b/cli/vnsw.py
new file mode 100755
index 0000000..33a0948
--- /dev/null
+++ b/cli/vnsw.py
@@ -0,0 +1,239 @@
+#
+# Copyright (c) 2012,2013 Big Switch Networks, Inc.
+#
+# Licensed under the Eclipse Public License, Version 1.0 (the
+# "License"); you may not use this file except in compliance with the
+# License. You may obtain a copy of the License at
+#
+#      http://www.eclipse.org/legal/epl-v10.html
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
+# implied. See the License for the specific language governing
+# permissions and limitations under the License.
+#
+
+import re
+import utif
+
+#
+# VNSW -- any functions used to support vns
+#
+
+def init_vnsw(bs, modi):
+    global sdnsh, mi
+    sdnsh = bs
+    mi = modi
+
+
+MAC_RE = re.compile(r'^(([A-Fa-f\d]){2}:?){5}[A-Fa-f\d]{2}$')
+DIGITS_RE = re.compile(r'^\d+$')
+
+
+#
+# --------------------------------------------------------------------------------
+
+def create_default_vns():
+    """
+    In some situations, for example, when a blank cassandra db/store
+    is having a running-config pushed.
+    """
+    (error, created) = sdnsh.find_or_create_row('vns-definition', 'default')
+    if error:
+        return False
+
+    return True
+
+
+#
+# --------------------------------------------------------------------------------
+
+def associate_foreign_key_for_vns_interface(create_dict):
+    """
+    Association of the foreign key 'rule' for vns-interfaces requires some
+    substantial work, along with additional validation
+    """
+
+    # determine the best candidate for the current rule
+    if not 'interface' in create_dict or not 'vns' in create_dict:
+        return create_dict
+    rule = None
+    items = create_dict['interface'].split('/')
+    mac = None
+    port = None
+    if len(items) == 1:
+        if items[0].startswith('Eth'):
+            rule = items[0][3:]
+        elif items[0].startswith('VEth'):
+            rule = items[0][4:]
+        else:
+            rule = items[0]
+    elif len(items) == 2 and MAC_RE.match(items[1]):
+        mac = items[1]
+        if items[0].startswith('VEth'):
+            rule = items[0][4:]
+        else:
+            rule = items[0]
+    elif len(items) == 2 and DIGITS_RE.match(items[1]):
+        port = items[1]
+        if items[0].startswith('Eth'):
+            rule = items[0][3:]
+        else:
+            rule = items[0]
+    else:
+        # Assume this is some abstract port name
+        port = items[1]
+        rule = items[0]
+
+    if not rule:
+        return create_dict
+
+    if rule and rule == 'default':
+        if not create_default_vns():
+            return
+
+    # try to look up the particular rule
+    rule_id = sdnsh.unique_key_from_non_unique([create_dict['vns'],
+                                               rule])
+    if_obj_type = 'vns-interface-rule'
+    if_key = mi.pk(if_obj_type)
+    try:
+        row = sdnsh.get_table_from_store(if_obj_type,
+                                        if_key,
+                                        rule_id)
+        errors = None
+    except Exception, e:
+        errors = sdnsh.rest_error_to_dict(e)
+        print sdnsh.rest_error_dict_to_message(errors)
+
+    if errors:
+        return create_dict
+
+    #
+    # validate the rule referenced matches the expected
+    # 'id' created here.
+    #
+    if len(row) == 0:
+        return create_dict
+    if_rule = row[0]
+
+    #
+    # Perform various validations to ensure the created interface
+    # would makes sense to sdnplatform
+    rule_is_number = False
+    if DIGITS_RE.match(if_rule['id'].split('|')[1]):
+        rule_is_number = True
+
+    if mac and 'mac' in if_rule and mac != if_rule['mac']:
+        sdnsh.warning('mac %s doesn\'t match mac for interface rule %s' %
+            (mac, if_rule['mac']))
+        return create_dict
+    #
+    # If the rule is a mac rule, and the associated rule is a number,
+    # make sure the 'Eth' vs 'VEth' lines up with the kind of rule
+    #
+    if ('mac' or 'ip-subnet' in if_rule or 'tags' in if_rule) and rule_is_number:
+        if not items[0].startswith('VEth'):
+            sdnsh.warning('interface name %s ought to start with VEth' %
+                items[0])
+            return create_dict
+    if ('switch' in if_rule or 'vlans' in if_rule) and rule_is_number:
+        if not items[0].startswith('Eth'):
+            sdnsh.warning('interface name %s must ought to start with Eth' %
+                items[0])
+            return create_dict
+    #
+    #
+    if ('switch' in if_rule and 'ports' in if_rule) and port:
+        if not sdnsh.switch_port_match(port, if_rule['ports']):
+            sdnsh.warning('port name %s does not match interface-rule ports %s' %
+                (port, if_rule['ports']))
+            return create_dict
+    #
+    # associate the rule_id with the interface
+    create_dict['rule'] = rule_id
+    return create_dict
+
+
+#
+# --------------------------------------------------------------------------------
+
+def port_ntoa(op, port):
+    """
+    Pass in the op and the port number, and return a string for the pair,
+    Both parameters are strings.  (note the leading space)
+    """
+    if not op in ['eq', 'neq']:
+        return ''
+    return '%s %s ' % (op, port)
+
+
+#
+# --------------------------------------------------------------------------------
+
+def vns_acl_entry_to_text(acl):
+    """
+    Return a short string for a specific acl entry.  Used for both short acl display
+    formats (vns-access-list-entry within a vns subconfig mode), and for show running config
+    """
+    if acl['type'] in ['tcp', 'udp']:
+        if not acl.get('src-ip') or not acl.get('src-ip-mask'):
+            return '[broken src ip or mask (a) ]'
+        if not acl.get('dst-ip') or not acl.get('dst-ip-mask'):
+            return '[broken src ip or mask (b) ]'
+        return "%s%s%s%s" % (utif.ip_and_neg_mask(acl['src-ip'],
+                                                  acl['src-ip-mask']),
+                             port_ntoa(acl.get('src-tp-port-op', ''),
+                                       acl.get('src-tp-port', '')),
+                             utif.ip_and_neg_mask(acl['dst-ip'],
+                                                  acl['dst-ip-mask']),
+                             port_ntoa(acl.get('dst-tp-port-op', ''),
+                                       acl.get('dst-tp-port', '')))
+    elif acl['type'] == 'ip' or DIGITS_RE.match(acl['type']):
+        if not acl.get('src-ip') or not acl.get('src-ip-mask'):
+            return '[broken src ip or mask (c)]'
+        if not acl.get('dst-ip') or not acl.get('dst-ip-mask'):
+            return '[broken src ip or mask (d)]'
+        return "%s%s" % (utif.ip_and_neg_mask(acl['src-ip'],
+                                              acl['src-ip-mask']),
+                         utif.ip_and_neg_mask(acl['dst-ip'],
+                                              acl['dst-ip-mask']))
+    elif acl['type'] == 'icmp':
+        if not acl.get('src-ip') or not acl.get('src-ip-mask'):
+            return '[broken src ip or mask (e)]'
+        if not acl.get('dst-ip') or not acl.get('dst-ip-mask'):
+            return '[broken src ip or mask (f)]'
+        return "%s%s%s" % (utif.ip_and_neg_mask(acl['src-ip'],
+                                                acl['src-ip-mask']),
+                           utif.ip_and_neg_mask(acl['dst-ip'],
+                                                acl['dst-ip-mask']),
+                                                 acl.get('icmp-type', ""))
+    elif acl['type'] == 'mac':
+        if 'vlan' in acl and acl['vlan'] != None and acl['vlan'] != '':
+            if 'ether-type' in acl and\
+               acl['ether-type'] != None and acl['ether-type'] != '':
+                return "%s %s %s vlan %s" % (acl.get('src-mac', 'any'),
+                                             acl.get('dst-mac', 'any'),
+                                             acl.get('ether-type'),
+                                             acl['vlan'])
+            else:
+                return "%s %s vlan %s" % (acl.get('src-mac', 'any'),
+                                          acl.get('dst-mac', 'any'),
+                                          acl['vlan'])
+        else:
+            return "%s %s %s" % (acl.get('src-mac', 'any'),
+                                 acl.get('dst-mac', 'any'),
+                                 acl.get('ether-type', ''))
+    else:
+        return '[unrecognized acl format]'
+
+
+#
+# --------------------------------------------------------------------------------
+            
+def vns_acl_entries_to_brief(entries):
+    for acl in entries:
+        acl['acl-text'] = vns_acl_entry_to_text(acl)
+
+