python: Honor zero probe interval in reconnect.py
[sliver-openvswitch.git] / tests / learn.at
1 AT_BANNER([learning action])
2
3 AT_SETUP([learning action - parsing and formatting])
4 AT_DATA([flows.txt], [[
5 actions=learn()
6 actions=learn(NXM_OF_VLAN_TCI[0..11], NXM_OF_ETH_DST[]=NXM_OF_ETH_SRC[], output:NXM_OF_IN_PORT[], load:10->NXM_NX_REG0[5..10])
7 actions=learn(table=1,idle_timeout=10, hard_timeout=20, fin_idle_timeout=5, fin_hard_timeout=10, priority=10, cookie=0xfedcba9876543210, in_port=99,NXM_OF_ETH_DST[]=NXM_OF_ETH_SRC[],load:NXM_OF_IN_PORT[]->NXM_NX_REG1[16..31])
8 ]])
9 AT_CHECK([ovs-ofctl parse-flows flows.txt], [0],
10 [[OFPT_FLOW_MOD (xid=0x1): ADD actions=learn(table=1)
11 OFPT_FLOW_MOD (xid=0x2): ADD actions=learn(table=1,NXM_OF_VLAN_TCI[0..11],NXM_OF_ETH_DST[]=NXM_OF_ETH_SRC[],output:NXM_OF_IN_PORT[],load:0x000a->NXM_NX_REG0[5..10])
12 OFPT_FLOW_MOD (xid=0x3): ADD actions=learn(table=1,idle_timeout=10,hard_timeout=20,fin_idle_timeout=5,fin_hard_timeout=10,priority=10,cookie=0xfedcba9876543210,in_port=99,NXM_OF_ETH_DST[]=NXM_OF_ETH_SRC[],load:NXM_OF_IN_PORT[]->NXM_NX_REG1[16..31])
13 ]])
14 AT_CLEANUP
15
16 AT_SETUP([learning action - examples])
17 AT_DATA([flows.txt], [[
18 # These are the examples from nicira-ext.h.
19 actions=learn(in_port=99,NXM_OF_ETH_DST[]=NXM_OF_ETH_SRC[], load:NXM_OF_IN_PORT[]->NXM_NX_REG1[16..31])
20 actions=learn(NXM_OF_VLAN_TCI[0..11], NXM_OF_ETH_DST[]=NXM_OF_ETH_SRC[],output:NXM_OF_IN_PORT[])
21 table=0 actions=learn(table=1,hard_timeout=10, NXM_OF_VLAN_TCI[0..11],output:NXM_OF_IN_PORT[]), resubmit(,1)
22 table=1 priority=0 actions=flood
23 ]])
24 AT_CHECK([ovs-ofctl parse-flows flows.txt], [0],
25 [[OFPT_FLOW_MOD (xid=0x1): ADD actions=learn(table=1,in_port=99,NXM_OF_ETH_DST[]=NXM_OF_ETH_SRC[],load:NXM_OF_IN_PORT[]->NXM_NX_REG1[16..31])
26 OFPT_FLOW_MOD (xid=0x2): ADD actions=learn(table=1,NXM_OF_VLAN_TCI[0..11],NXM_OF_ETH_DST[]=NXM_OF_ETH_SRC[],output:NXM_OF_IN_PORT[])
27 NXT_FLOW_MOD_TABLE_ID (xid=0x3): enable
28 OFPT_FLOW_MOD (xid=0x4): ADD actions=learn(table=1,hard_timeout=10,NXM_OF_VLAN_TCI[0..11],output:NXM_OF_IN_PORT[]),resubmit(,1)
29 OFPT_FLOW_MOD (xid=0x5): ADD table:1 priority=0 actions=FLOOD
30 ]])
31 AT_CLEANUP
32
33 AT_SETUP([learning action - satisfied prerequisites])
34 AT_DATA([flows.txt],
35 [[actions=learn(eth_type=0x800,load:5->NXM_OF_IP_DST[])
36 ip,actions=learn(load:NXM_OF_IP_DST[]->NXM_NX_REG1[])
37 ip,actions=learn(eth_type=0x800,NXM_OF_IP_DST[])
38 ]])
39 AT_CHECK([ovs-ofctl parse-flows flows.txt], [0],
40 [[OFPT_FLOW_MOD (xid=0x1): ADD actions=learn(table=1,eth_type=0x800,load:0x00000005->NXM_OF_IP_DST[])
41 OFPT_FLOW_MOD (xid=0x2): ADD ip actions=learn(table=1,load:NXM_OF_IP_DST[]->NXM_NX_REG1[])
42 OFPT_FLOW_MOD (xid=0x3): ADD ip actions=learn(table=1,eth_type=0x800,NXM_OF_IP_DST[])
43 ]])
44 AT_CLEANUP
45
46 AT_SETUP([learning action - invalid prerequisites])
47 AT_CHECK([[ovs-ofctl parse-flow 'actions=learn(load:5->NXM_OF_IP_DST[])']],
48   [1], [],
49   [[ovs-ofctl: load:5->NXM_OF_IP_DST[]: cannot specify destination field ip_dst because prerequisites are not satisfied
50 ]])
51 AT_CHECK([[ovs-ofctl parse-flow 'actions=learn(load:NXM_OF_IP_DST[]->NXM_NX_REG1[])']],
52   [1], [],
53   [[ovs-ofctl: load:NXM_OF_IP_DST[]->NXM_NX_REG1[]: cannot specify source field ip_dst because prerequisites are not satisfied
54 ]])
55 AT_CLEANUP
56
57 AT_SETUP([learning action - standard VLAN+MAC learning])
58 OVS_VSWITCHD_START(
59   [add-port br0 eth0 -- set Interface eth0 type=dummy -- \
60    add-port br0 eth1 -- set Interface eth1 type=dummy -- \
61    add-port br0 eth2 -- set Interface eth2 type=dummy])
62 # Set up flow table for VLAN+MAC learning.
63 AT_DATA([flows.txt], [[
64 table=0 actions=learn(table=1, hard_timeout=60, NXM_OF_VLAN_TCI[0..11], NXM_OF_ETH_DST[]=NXM_OF_ETH_SRC[], output:NXM_OF_IN_PORT[]), resubmit(,1)
65 table=1 priority=0 actions=flood
66 ]])
67 AT_CHECK([ovs-ofctl add-flows br0 flows.txt])
68
69 # Trace an ARP packet arriving on port 3, to create a MAC learning entry.
70 AT_CHECK([ovs-appctl ofproto/trace br0 'in_port(3),eth(src=50:54:00:00:00:05,dst=ff:ff:ff:ff:ff:ff),eth_type(0x0806),arp(sip=192.168.0.1,tip=192.168.0.2,op=1,sha=50:54:00:00:00:05,tha=00:00:00:00:00:00)' -generate], [0], [stdout])
71 AT_CHECK([tail -1 stdout], [0], [Datapath actions: 2,0,1
72 ])
73
74 # Check for the MAC learning entry.
75 AT_CHECK([ovs-ofctl dump-flows br0 table=1 | ofctl_strip | sort], [0], [dnl
76  table=1, hard_timeout=60,vlan_tci=0x0000/0x0fff,dl_dst=50:54:00:00:00:05 actions=output:3
77  table=1, priority=0 actions=FLOOD
78 NXST_FLOW reply:
79 ])
80
81 # Trace a packet arrival destined for the learned MAC.
82 # (This will also learn a MAC.)
83 AT_CHECK([ovs-appctl ofproto/trace br0 'in_port(1),eth(src=50:54:00:00:00:06,dst=50:54:00:00:00:05),eth_type(0x0806),arp(sip=192.168.0.2,tip=192.168.0.1,op=2,sha=50:54:00:00:00:06,tha=50:54:00:00:00:05)' -generate], [0], [stdout])
84 AT_CHECK([tail -1 stdout], [0], [Datapath actions: 3
85 ])
86
87 # Check for both MAC learning entries.
88 AT_CHECK([ovs-ofctl dump-flows br0 table=1 | ofctl_strip |sort], [0], [dnl
89  table=1, hard_timeout=60,vlan_tci=0x0000/0x0fff,dl_dst=50:54:00:00:00:05 actions=output:3
90  table=1, hard_timeout=60,vlan_tci=0x0000/0x0fff,dl_dst=50:54:00:00:00:06 actions=output:1
91  table=1, priority=0 actions=FLOOD
92 NXST_FLOW reply:
93 ])
94
95 # Trace a packet arrival that updates the first learned MAC entry.
96 AT_CHECK([ovs-appctl ofproto/trace br0 'in_port(2),eth(src=50:54:00:00:00:05,dst=ff:ff:ff:ff:ff:ff),eth_type(0x0806),arp(sip=192.168.0.1,tip=192.168.0.2,op=1,sha=50:54:00:00:00:05,tha=00:00:00:00:00:00)' -generate], [0], [stdout])
97 AT_CHECK([tail -1 stdout], [0], [Datapath actions: 3,0,1
98 ])
99
100 # Check that the MAC learning entry was updated.
101 AT_CHECK([ovs-ofctl dump-flows br0 table=1 | ofctl_strip | sort], [0], [dnl
102  table=1, hard_timeout=60,vlan_tci=0x0000/0x0fff,dl_dst=50:54:00:00:00:05 actions=output:2
103  table=1, hard_timeout=60,vlan_tci=0x0000/0x0fff,dl_dst=50:54:00:00:00:06 actions=output:1
104  table=1, priority=0 actions=FLOOD
105 NXST_FLOW reply:
106 ])
107 OVS_VSWITCHD_STOP
108 AT_CLEANUP
109
110 AT_SETUP([learning action - TCPv4 port learning])
111 OVS_VSWITCHD_START(
112   [add-port br0 eth0 -- set Interface eth0 type=dummy -- \
113    add-port br0 eth1 -- set Interface eth1 type=dummy -- \
114    add-port br0 eth2 -- set Interface eth2 type=dummy])
115 # Set up flow table for TCPv4 port learning.
116 AT_CHECK([[ovs-ofctl add-flow br0 'table=0 tcp actions=learn(table=1, hard_timeout=60, eth_type=0x800, nw_proto=6, NXM_OF_IP_SRC[]=NXM_OF_IP_DST[], NXM_OF_IP_DST[]=NXM_OF_IP_SRC[], NXM_OF_TCP_SRC[]=NXM_OF_TCP_DST[], NXM_OF_TCP_DST[]=NXM_OF_TCP_SRC[]), flood']])
117
118 # Trace a TCPv4 packet arriving on port 3.
119 AT_CHECK([ovs-appctl ofproto/trace br0 'in_port(3),eth(src=50:54:00:00:00:05,dst=50:54:00:00:00:06),eth_type(0x0800),ipv4(src=192.168.0.2,dst=192.168.0.1,proto=6,tos=0,ttl=64,frag=no),tcp(src=40000,dst=80)' -generate], [0], [stdout])
120 AT_CHECK([tail -1 stdout], [0], [Datapath actions: 2,0,1
121 ])
122
123 # Check for the learning entry.
124 AT_CHECK([ovs-ofctl dump-flows br0 table=1 | ofctl_strip | sort], [0], [dnl
125  table=1, hard_timeout=60,tcp,nw_src=192.168.0.1,nw_dst=192.168.0.2,tp_src=80,tp_dst=40000 actions=drop
126 NXST_FLOW reply:
127 ])
128 OVS_VSWITCHD_STOP
129 AT_CLEANUP
130
131 AT_SETUP([learning action - TCPv6 port learning])
132 OVS_VSWITCHD_START(
133   [add-port br0 eth0 -- set Interface eth0 type=dummy -- \
134    add-port br0 eth1 -- set Interface eth1 type=dummy -- \
135    add-port br0 eth2 -- set Interface eth2 type=dummy])
136 # Set up flow table for TCPv6 port learning.
137 # Also add a 128-bit-wide "load" action and a 128-bit literal match to check
138 # that they work.
139 AT_CHECK([[ovs-ofctl add-flow br0 'table=0 tcp6 actions=learn(table=1, hard_timeout=60, eth_type=0x86dd, nw_proto=6, NXM_NX_IPV6_SRC[]=NXM_NX_IPV6_DST[], ipv6_dst=2001:0db8:85a3:0000:0000:8a2e:0370:7334, NXM_OF_TCP_SRC[]=NXM_OF_TCP_DST[], NXM_OF_TCP_DST[]=NXM_OF_TCP_SRC[], load(0x20010db885a308d313198a2e03707348->NXM_NX_IPV6_DST[])), flood']])
140
141 # Trace a TCPv6 packet arriving on port 3.
142 AT_CHECK([ovs-appctl ofproto/trace br0 'in_port(3),eth(src=50:54:00:00:00:05,dst=50:54:00:00:00:06),eth_type(0x86dd),ipv6(src=fec0::2,dst=fec0::1,label=0,proto=6,tclass=0,hlimit=255,frag=no),tcp(src=40000,dst=80)' -generate], [0], [stdout])
143 AT_CHECK([tail -1 stdout], [0], [Datapath actions: 2,0,1
144 ])
145
146 # Check for the learning entry.
147 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
148  table=1, hard_timeout=60,tcp6,ipv6_src=fec0::1,ipv6_dst=2001:db8:85a3::8a2e:370:7334,tp_src=80,tp_dst=40000 actions=load:0x13198a2e03707348->NXM_NX_IPV6_DST[[0..63]],load:0x20010db885a308d3->NXM_NX_IPV6_DST[[64..127]]
149  tcp6 actions=learn(table=1,hard_timeout=60,eth_type=0x86dd,nw_proto=6,NXM_NX_IPV6_SRC[[]]=NXM_NX_IPV6_DST[[]],ipv6_dst=2001:db8:85a3::8a2e:370:7334,NXM_OF_TCP_SRC[[]]=NXM_OF_TCP_DST[[]],NXM_OF_TCP_DST[[]]=NXM_OF_TCP_SRC[[]],load:0x20010db885a308d313198a2e03707348->NXM_NX_IPV6_DST[[]]),FLOOD
150 NXST_FLOW reply:
151 ])
152 OVS_VSWITCHD_STOP
153 AT_CLEANUP
154
155 AT_SETUP([learning action - fin_timeout feature])
156 # This is a totally artificial use of the "learn" action.  The only purpose
157 # is to check that specifying fin_idle_timeout or fin_hard_timeout causes
158 # a corresponding fin_timeout action to end up in the learned flows.
159 OVS_VSWITCHD_START
160 AT_CHECK([[ovs-ofctl add-flow br0 'actions=learn(fin_hard_timeout=10, fin_idle_timeout=5, NXM_OF_ETH_DST[]=NXM_OF_ETH_SRC[], output:NXM_OF_IN_PORT[])']])
161 AT_CHECK([ovs-appctl ofproto/trace br0 'in_port(1),eth(src=50:54:00:00:00:05,dst=ff:ff:ff:ff:ff:ff),eth_type(0x0806),arp(sip=192.168.0.1,tip=192.168.0.2,op=1,sha=50:54:00:00:00:05,tha=00:00:00:00:00:00)' -generate], [0], [ignore])
162 AT_CHECK([ovs-ofctl dump-flows br0 table=1 | ofctl_strip], [0],
163 [NXST_FLOW reply:
164  table=1, dl_dst=50:54:00:00:00:05 actions=fin_timeout(idle_timeout=5,hard_timeout=10),output:1
165 ])
166 OVS_VSWITCHD_STOP
167 AT_CLEANUP