dnl an ovsdb-server on it for ovs-vsctl to connect to.
m4_define([OVS_VSCTL_SETUP],
[OVSDB_INIT([db])
- AT_CHECK([ovsdb-server --detach --no-chdir --pidfile="`pwd`"/pid --remote=punix:socket --unixctl="`pwd`"/unixctl db >/dev/null 2>&1], [0], [ignore], [ignore])])
+ AT_CHECK([ovsdb-server --detach --no-chdir --pidfile --remote=punix:db.sock db >/dev/null 2>&1], [0], [ignore], [ignore])
+ on_exit 'kill `cat ovsdb-server.pid`'])
dnl OVS_VSCTL_CLEANUP
dnl
dnl Kills off the database server.
-m4_define([OVS_VSCTL_CLEANUP], [OVSDB_SERVER_SHUTDOWN])
+m4_define([OVS_VSCTL_CLEANUP], [OVS_APP_EXIT_AND_WAIT_BY_TARGET([ovsdb-server], [ovsdb-server.pid])])
dnl RUN_OVS_VSCTL(COMMAND, ...)
dnl
dnl Executes each ovs-vsctl COMMAND.
m4_define([RUN_OVS_VSCTL],
- [m4_foreach([command], [$@], [ovs-vsctl --no-wait -vreconnect:emer --db=unix:socket command
+ [m4_foreach([command], [$@], [ovs-vsctl --no-wait -vreconnect:emer command
])])
m4_define([RUN_OVS_VSCTL_ONELINE],
- [m4_foreach([command], [$@], [ovs-vsctl --no-wait -vreconnect:emer --db=unix:socket --oneline -- command
+ [m4_foreach([command], [$@], [ovs-vsctl --no-wait -vreconnect:emer --oneline -- command
])])
dnl RUN_OVS_VSCTL_TOGETHER(COMMAND, ...)
dnl
dnl Executes each ovs-vsctl COMMAND in a single run of ovs-vsctl.
m4_define([RUN_OVS_VSCTL_TOGETHER],
- [ovs-vsctl --no-wait -vreconnect:emer --db=unix:socket --oneline dnl
+ [ovs-vsctl --no-wait -vreconnect:emer --oneline dnl
m4_foreach([command], [$@], [ -- command])])
dnl CHECK_BRIDGES([BRIDGE, PARENT, VLAN], ...)
dnl specified PARENT and is on the given VLAN.
m4_define([_CHECK_BRIDGE],
[AT_CHECK([RUN_OVS_VSCTL([br-to-parent $1])], [0], [$2
-], [], [OVS_VSCTL_CLEANUP])
+])
# Check br-to-vlan, without --oneline.
AT_CHECK([RUN_OVS_VSCTL([br-to-vlan $1])], [0], [$3
-], [], [OVS_VSCTL_CLEANUP])
+])
# Check br-to-vlan, with --oneline.
# (This particular test is interesting with --oneline because it returns
# an integer instead of a string and that can cause type mismatches inside
# python if not done carefully.)
AT_CHECK([RUN_OVS_VSCTL_ONELINE([br-to-vlan $1])], [0], [$3
-], [], [OVS_VSCTL_CLEANUP])
+])
# Check multiple queries in a single run.
AT_CHECK([RUN_OVS_VSCTL_TOGETHER([br-to-parent $1], [br-to-vlan $1])], [0],
[$2
$3
-], [], [OVS_VSCTL_CLEANUP])])
+])])
m4_define([CHECK_BRIDGES],
[dnl Check that the bridges appear on list-br, without --oneline.
AT_CHECK(
[RUN_OVS_VSCTL([list-br])],
[0],
[m4_foreach([brinfo], [$@], [m4_car(brinfo)
-])],
- [],
- [OVS_VSCTL_CLEANUP])
+])])
dnl Check that the bridges appear on list-br, with --oneline.
AT_CHECK(
[RUN_OVS_VSCTL_ONELINE([list-br])],
[0],
[m4_join([\n], m4_foreach([brinfo], [$@], [m4_car(brinfo),]))
-],
- [],
- [OVS_VSCTL_CLEANUP])
+])
dnl Check that each bridge exists according to br-exists and that
dnl a bridge that should not exist does not.
m4_foreach([brinfo], [$@],
- [AT_CHECK([RUN_OVS_VSCTL([br-exists m4_car(brinfo)])], [0], [],
- [], [OVS_VSCTL_CLEANUP])])
- AT_CHECK([RUN_OVS_VSCTL([br-exists nonexistent])], [2], [], [],
- [OVS_VSCTL_CLEANUP])
+ [AT_CHECK([RUN_OVS_VSCTL([br-exists m4_car(brinfo)])])])
+ AT_CHECK([RUN_OVS_VSCTL([br-exists nonexistent])], [2])
dnl Check that each bridge has the expected parent and VLAN.
m4_map([_CHECK_BRIDGE], [$@])])
[RUN_OVS_VSCTL([list-ports $1])],
[0],
[m4_foreach([port], m4_cdr($@), [port
-])],
- [],
- [OVS_VSCTL_CLEANUP])
+])])
dnl Check ports with --oneline.
AT_CHECK(
[RUN_OVS_VSCTL_ONELINE([list-ports $1])],
[0],
[m4_join([\n], m4_shift($@))
-],
- [],
- [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([RUN_OVS_VSCTL([port-to-br $1])], [1], [],
[ovs-vsctl: no port named $1
-],
- [OVS_VSCTL_CLEANUP])
+])
m4_foreach(
[port], m4_cdr($@),
[AT_CHECK([RUN_OVS_VSCTL([[port-to-br] port])], [0], [$1
-], [], [OVS_VSCTL_CLEANUP])])])
+])])])
dnl CHECK_IFACES(BRIDGE, IFACE[, IFACE...])
dnl
[RUN_OVS_VSCTL([list-ifaces $1])],
[0],
[m4_foreach([iface], m4_cdr($@), [iface
-])],
- [],
- [OVS_VSCTL_CLEANUP])
+])])
AT_CHECK([RUN_OVS_VSCTL([iface-to-br $1])], [1], [],
[ovs-vsctl: no interface named $1
-],
- [OVS_VSCTL_CLEANUP])
+])
m4_foreach(
[iface], m4_cdr($@),
[AT_CHECK([RUN_OVS_VSCTL([[iface-to-br] iface])], [0], [$1
-],
- [], [OVS_VSCTL_CLEANUP])])])
+])])])
dnl ----------------------------------------------------------------------
AT_BANNER([ovs-vsctl unit tests])
AT_SETUP([ovs-vsctl connection retry])
-OVS_RUNDIR=$PWD; export OVS_RUNDIR
-
dnl Without --retry, there should be no retry for active connections.
AT_CHECK([ovs-vsctl --db=unix:foo --timeout=10 -vreconnect:emer -- init],
[1], [], [stderr])
AT_SETUP([add-br a])
AT_KEYWORDS([ovs-vsctl])
OVS_VSCTL_SETUP
-AT_CHECK([RUN_OVS_VSCTL([add-br a])], [0], [], [], [OVS_VSCTL_CLEANUP])
+AT_CHECK([RUN_OVS_VSCTL([add-br a])])
CHECK_BRIDGES([a, a, 0])
CHECK_PORTS([a])
CHECK_IFACES([a])
AT_SETUP([add-br a, add-br a])
AT_KEYWORDS([ovs-vsctl])
OVS_VSCTL_SETUP
-AT_CHECK([RUN_OVS_VSCTL([add-br a])], [0], [], [], [OVS_VSCTL_CLEANUP])
+AT_CHECK([RUN_OVS_VSCTL([add-br a])], [0])
AT_CHECK([RUN_OVS_VSCTL([add-br a])], [1], [],
[ovs-vsctl: cannot create a bridge named a because a bridge named a already exists
-], [OVS_VSCTL_CLEANUP])
+])
+AT_CHECK([RUN_OVS_VSCTL([add-br ''])], [1], [],
+ [ovs-vsctl: bridge name must not be empty string
+])
OVS_VSCTL_CLEANUP
AT_CLEANUP
AT_SETUP([add-br a, add-br b])
AT_KEYWORDS([ovs-vsctl])
OVS_VSCTL_SETUP
-AT_CHECK([RUN_OVS_VSCTL([add-br a], [add-br b])], [0], [], [],
- [OVS_VSCTL_CLEANUP])
+AT_CHECK([RUN_OVS_VSCTL([add-br a], [add-br b])])
AT_CHECK([RUN_OVS_VSCTL([--may-exist add-br a b 9])], [1], [],
[ovs-vsctl: "--may-exist add-br a b 9" but a is not a VLAN bridge
-],
- [OVS_VSCTL_CLEANUP])
+])
CHECK_BRIDGES([a, a, 0], [b, b, 0])
CHECK_PORTS([a])
CHECK_IFACES([a])
AT_SETUP([add-br a, add-br b, del-br a])
AT_KEYWORDS([ovs-vsctl])
OVS_VSCTL_SETUP
-AT_CHECK([RUN_OVS_VSCTL([add-br a], [add-br b], [del-br a])], [0], [], [],
- [OVS_VSCTL_CLEANUP])
+AT_CHECK([RUN_OVS_VSCTL([add-br a], [add-br b], [del-br a])])
CHECK_BRIDGES([b, b, 0])
CHECK_PORTS([b])
CHECK_IFACES([b])
value
-], [], [OVS_VSCTL_CLEANUP])
+])
CHECK_BRIDGES([a, a, 0])
CHECK_PORTS([a])
CHECK_IFACES([a])
[add-br a],
[--if-exists del-br b],
[add-port a a1],
- [add-port a a2])], [0], [], [], [OVS_VSCTL_CLEANUP])
+ [add-port a a2])])
CHECK_BRIDGES([a, a, 0])
CHECK_PORTS([a], [a1], [a2])
CHECK_IFACES([a], [a1], [a2])
OVS_VSCTL_SETUP
AT_CHECK([RUN_OVS_VSCTL(
[add-br a],
- [add-port a a1])], [0], [], [], [OVS_VSCTL_CLEANUP])
+ [add-port a a1])])
AT_CHECK([RUN_OVS_VSCTL([add-port a a1])], [1], [],
[ovs-vsctl: cannot create a port named a1 because a port named a1 already exists on bridge a
-], [OVS_VSCTL_CLEANUP])
+])
+AT_CHECK([RUN_OVS_VSCTL([add-port a ''])], [1], [],
+ [ovs-vsctl: port name must not be empty string
+])
OVS_VSCTL_CLEANUP
AT_CLEANUP
-], [], [OVS_VSCTL_CLEANUP])
+])
CHECK_BRIDGES([b, b, 0])
CHECK_PORTS([b], [b1])
CHECK_IFACES([b], [b1])
OVS_VSCTL_SETUP
AT_CHECK([RUN_OVS_VSCTL(
[add-br a],
- [add-bond a bond0 a1 a2 a3])], [0], [], [], [OVS_VSCTL_CLEANUP])
-AT_CHECK([RUN_OVS_VSCTL([--may-exist add-bond a bond0 a3 a1 a2])], [0], [], [],
- [OVS_VSCTL_CLEANUP])
+ [add-bond a bond0 a1 a2 a3])])
+AT_CHECK([RUN_OVS_VSCTL([--may-exist add-bond a bond0 a3 a1 a2])])
AT_CHECK([RUN_OVS_VSCTL([--may-exist add-bond a bond0 a2 a1])], [1], [],
[ovs-vsctl: "--may-exist add-bond a bond0 a2 a1" but bond0 actually has interface(s) a1, a2, a3
-],
- [OVS_VSCTL_CLEANUP])
+])
+AT_CHECK([RUN_OVS_VSCTL([add-bond a '' x y z])], [1], [],
+ [ovs-vsctl: port name must not be empty string
+])
+AT_CHECK([RUN_OVS_VSCTL([add-bond a x '' y z])], [1], [],
+ [ovs-vsctl: interface name must not be empty string
+])
+CHECK_BRIDGES([a, a, 0])
+CHECK_PORTS([a], [bond0])
+CHECK_IFACES([a], [a1], [a2], [a3])
+OVS_VSCTL_CLEANUP
+AT_CLEANUP
+
+AT_SETUP([add-bond-iface and del-bond-iface])
+AT_KEYWORDS([ovs-vsctl])
+OVS_VSCTL_SETUP
+
+# Create 2-interface bond.
+AT_CHECK([RUN_OVS_VSCTL(
+ [add-br a],
+ [add-bond a bond0 a1 a2])])
+CHECK_BRIDGES([a, a, 0])
+CHECK_PORTS([a], [bond0])
+CHECK_IFACES([a], [a1], [a2])
+
+# Add interface a3 to bond.
+AT_CHECK([RUN_OVS_VSCTL([add-bond-iface bond0 a3])])
CHECK_BRIDGES([a, a, 0])
CHECK_PORTS([a], [bond0])
CHECK_IFACES([a], [a1], [a2], [a3])
+
+# Delete interface a2 from bond.
+AT_CHECK([RUN_OVS_VSCTL([del-bond-iface bond0 a2])])
+CHECK_BRIDGES([a, a, 0])
+CHECK_PORTS([a], [bond0])
+CHECK_IFACES([a], [a1], [a3])
+
+# Add interface a2 to bond.
+AT_CHECK([RUN_OVS_VSCTL([add-bond-iface bond0 a2])])
+CHECK_BRIDGES([a, a, 0])
+CHECK_PORTS([a], [bond0])
+CHECK_IFACES([a], [a1], [a2], [a3])
+
+# Delete interface a2 from bond.
+AT_CHECK([RUN_OVS_VSCTL([del-bond-iface a2])])
+CHECK_BRIDGES([a, a, 0])
+CHECK_PORTS([a], [bond0])
+CHECK_IFACES([a], [a1], [a3])
+
+AT_CHECK([RUN_OVS_VSCTL([--if-exists del-bond-iface bond0 a4])])
+AT_CHECK([RUN_OVS_VSCTL([del-bond-iface bond0 a4])], [1], [],
+ [ovs-vsctl: no interface named a4
+])
+AT_CHECK([RUN_OVS_VSCTL([del-bond-iface a4])], [1], [],
+ [ovs-vsctl: no interface named a4
+])
+AT_CHECK([RUN_OVS_VSCTL_TOGETHER([add-port a a4], [del-bond-iface bond0 a4])], [1], [],
+ [ovs-vsctl: port bond0 does not have an interface a4
+])
+AT_CHECK([RUN_OVS_VSCTL([--may-exist add-bond-iface bond0 a3])])
+AT_CHECK([RUN_OVS_VSCTL_TOGETHER([add-bond a bond1 b1 b2 b3], [--may-exist add-bond-iface bond1 a3])], [1], [],
+ [ovs-vsctl: "--may-exist add-bond-iface bond1 a3" but a3 is actually attached to port bond0
+])
+AT_CHECK([RUN_OVS_VSCTL([add-bond-iface bond0 a3])], [1], [],
+ [ovs-vsctl: cannot create an interface named a3 because an interface named a3 already exists on bridge a
+])
+AT_CHECK([RUN_OVS_VSCTL_TOGETHER([del-bond-iface a1], [del-bond-iface a3])], [1], [],
+ [ovs-vsctl: cannot delete last interface from port bond0
+])
+
OVS_VSCTL_CLEANUP
AT_CLEANUP
[get port a1 tag],
[--may-exist add-port b b1],
[del-port a a1])], [0], [9
-], [], [OVS_VSCTL_CLEANUP])
-AT_CHECK([RUN_OVS_VSCTL([--may-exist add-port b b1])], [0], [], [],
- [OVS_VSCTL_CLEANUP])
+])
+AT_CHECK([RUN_OVS_VSCTL([--may-exist add-port b b1])])
AT_CHECK([RUN_OVS_VSCTL([del-port a])], [1], [],
[ovs-vsctl: cannot delete port a because it is the local port for bridge a (deleting this port requires deleting the entire bridge)
-],
- [OVS_VSCTL_CLEANUP])
-AT_CHECK([RUN_OVS_VSCTL([--if-exists del-port a])], [0], [], [],
- [OVS_VSCTL_CLEANUP])
+])
+AT_CHECK([RUN_OVS_VSCTL([--if-exists del-port a])])
AT_CHECK([RUN_OVS_VSCTL([--may-exist add-port a b1])], [1], [],
[ovs-vsctl: "--may-exist add-port a b1" but b1 is actually attached to bridge b
-],
- [OVS_VSCTL_CLEANUP])
+])
CHECK_BRIDGES([a, a, 0], [b, b, 0])
CHECK_PORTS([a])
CHECK_IFACES([a])
9
-], [], [OVS_VSCTL_CLEANUP])
+])
CHECK_BRIDGES([a, a, 0])
CHECK_PORTS([a])
OVS_VSCTL_CLEANUP
key0=othervalue
-{"key1"="value1"}
-{"key2"="value2", "key3"="value3"}
-{"key4"="value4"}
-], [], [OVS_VSCTL_CLEANUP])
+{key1=value1}
+{key2=value2, key3=value3}
+{key4=value4}
+])
AT_CHECK([RUN_OVS_VSCTL_TOGETHER(
[br-get-external-id a],
[get port a1 external-ids],
[get interface a2 external-ids],
[get interface a3 external-ids])], [0],
[
-{"key1"="value1"}
-{"key2"="value2", "key3"="value3"}
-{"key4"="value4"}
-], [], [OVS_VSCTL_CLEANUP])
+{key1=value1}
+{key2=value2, key3=value3}
+{key4=value4}
+])
CHECK_BRIDGES([a, a, 0])
CHECK_PORTS([a], [a1], [bond0])
CHECK_IFACES([a], [a1], [a2], [a3])
[get-controller br0],
[set-controller br0 tcp:8.9.10.11 tcp:5.4.3.2],
+ [get-controller br0],
+
+ [--inactivity-probe=30000 set-controller br0 tcp:1.2.3.4],
[get-controller br0])], [0], [
tcp:5.4.3.2\ntcp:8.9.10.11
-], [], [OVS_VSCTL_CLEANUP])
+
+tcp:1.2.3.4
+])
+OVS_VSCTL_CLEANUP
+AT_CLEANUP
+
+
+AT_SETUP([fail-mode])
+AT_KEYWORDS([fail-mode ovs-vsctl])
+OVS_VSCTL_SETUP
+AT_CHECK([RUN_OVS_VSCTL_TOGETHER(
+ [add-br br0],
+
+ [get-fail-mode br0],
+ [set-fail-mode br0 secure],
+ [get-fail-mode br0],
+
+ [del-fail-mode br0],
+ [get-fail-mode br0],
+
+ [set-fail-mode br0 standalone],
+ [get-fail-mode br0])], [0], [
+
+
+secure
+
+
+
+standalone
+])
+OVS_VSCTL_CLEANUP
+AT_CLEANUP
+
+
+# check if emer-reset reset switch to known good state
+# test is implemented by creating switch entities and checks if after applying
+# emer-reset these entities are deleted
+AT_SETUP([emer-reset])
+AT_KEYWORDS([emer-reset ovs-vsctl])
+OVS_VSCTL_SETUP
+
+# define controllers, fail-mode, netflow, mirror
+AT_CHECK([RUN_OVS_VSCTL_TOGETHER(
+ [add-br br0],
+ [add-port br0 eth0],
+ [add-port br0 eth1],
+ [set-controller br0 tcp:4.5.6.7],
+ [set-fail-mode br0 secure],
+ [set bridge br0 netflow=@nf],
+ [--id=@nf create netflow targets=3.4.5.6],
+ [set bridge br0 mirrors=@m],
+ [--id=@eth0 get port eth0],
+ [--id=@eth1 get port eth1],
+ [--id=@m create mirror name=mymirror select-dst-port=@eth0 select-src-port=@eth0 output-port=@eth1],
+ [set bridge br0 sflow=@sf],
+ [--id=@sf create sflow targets=1.2.3.4],
+ [set bridge br0 datapath-type=dummy other-config:datapath-id=1234 other-config:hwaddr="00:12:34:56:78:bb"],
+ [set bridge br0 ipfix=@fix],
+ [--id=@fix create ipfix targets=1.2.3.4],
+ [set bridge br0 flood_vlans=1],
+ [set bridge br0 datapath_id=2 datapath_version="alpha"],
+ [list bridge > configured_bridge.txt]
+ )], [0], [stdout])
+
+AT_CHECK(
+ [uuidfilt configured_bridge.txt],
+ [0],[[
+
+
+
+
+
+<0>
+
+
+
+<1>
+
+<2>
+
+
+<3>
+
+
+_uuid : <4>
+auto_attach : []
+controller : [<5>]
+datapath_id : "2"
+datapath_type : dummy
+datapath_version : alpha
+external_ids : {}
+fail_mode : secure
+flood_vlans : [1]
+flow_tables : {}
+ipfix : <6>
+mcast_snooping_enable: false
+mirrors : [<7>]
+name : br0
+netflow : <8>
+other_config : {datapath-id="1234", hwaddr="00:12:34:56:78:bb"}
+ports : [<9>, <10>, <11>]
+protocols : []
+rstp_enable : false
+rstp_status : {}
+sflow : <12>
+status : {}
+stp_enable : false
+]])
+
+
+# execute emer-reset
+AT_CHECK([RUN_OVS_VSCTL_TOGETHER(
+ [emer-reset])], [0], [
+])
+
+# check if bridge was cleaned/reset
+AT_CHECK([RUN_OVS_VSCTL_TOGETHER(
+ [list bridge > cleaned_bridge.txt]
+ )], [0], [stdout])
+
+AT_CHECK(
+ [uuidfilt cleaned_bridge.txt],
+ [0],[[_uuid : <0>
+auto_attach : []
+controller : []
+datapath_id : "2"
+datapath_type : dummy
+datapath_version : alpha
+external_ids : {}
+fail_mode : []
+flood_vlans : []
+flow_tables : {}
+ipfix : []
+mcast_snooping_enable: false
+mirrors : []
+name : br0
+netflow : []
+other_config : {hwaddr="00:12:34:56:78:bb"}
+ports : [<1>, <2>, <3>]
+protocols : []
+rstp_enable : false
+rstp_status : {}
+sflow : []
+status : {}
+stp_enable : false
+]])
+
OVS_VSCTL_CLEANUP
AT_CLEANUP
+
+
dnl ----------------------------------------------------------------------
dnl OVS_VSCTL_SETUP_SIMPLE_FAKE_CONF([VLAN])
m4_define([OVS_VSCTL_SETUP_SIMPLE_FAKE_CONF],
[--may-exist add-port xenbr0 eth0],
[add-br xapi1 xenbr0 $1],
[--may-exist add-br xapi1 xenbr0 $1],
- [add-port xapi1 eth0.$1])],
- [0], [], [], [OVS_VSCTL_CLEANUP])])
+ [add-port xapi1 eth0.$1])])])
dnl OVS_VSCTL_FAKE_BRIDGE_TESTS([VLAN])
m4_define([OVS_VSCTL_FAKE_BRIDGE_TESTS], [
OVS_VSCTL_SETUP_SIMPLE_FAKE_CONF([$1])
AT_CHECK([RUN_OVS_VSCTL([--may-exist add-br xapi1])], [1], [],
[ovs-vsctl: "--may-exist add-br xapi1" but xapi1 is a VLAN bridge for VLAN $1
-], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([RUN_OVS_VSCTL([--may-exist add-br xapi1 xxx $1])], [1], [],
[ovs-vsctl: "--may-exist add-br xapi1 xxx $1" but xapi1 has the wrong parent xenbr0
-], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([RUN_OVS_VSCTL([--may-exist add-br xapi1 xenbr0 10])], [1], [],
[ovs-vsctl: "--may-exist add-br xapi1 xenbr0 10" but xapi1 is a VLAN bridge for the wrong VLAN $1
-], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([RUN_OVS_VSCTL([--may-exist add-br dup xenbr0 $1])], [1], [],
[ovs-vsctl: bridge xenbr0 already has a child VLAN bridge xapi1 on VLAN $1
-], [OVS_VSCTL_CLEANUP])
+])
CHECK_BRIDGES([xapi1, xenbr0, $1], [xenbr0, xenbr0, 0])
CHECK_PORTS([xenbr0], [eth0])
CHECK_IFACES([xenbr0], [eth0])
OVS_VSCTL_SETUP_SIMPLE_FAKE_CONF([$1])
AT_CHECK([RUN_OVS_VSCTL_ONELINE([-- list-br])], [0],
[xapi1\nxenbr0
-], [], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([RUN_OVS_VSCTL_ONELINE([-- --real list-br])], [0],
[xenbr0
-], [], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([RUN_OVS_VSCTL_ONELINE([-- --fake list-br])], [0],
[xapi1
-], [], [OVS_VSCTL_CLEANUP])
+])
OVS_VSCTL_CLEANUP
AT_CLEANUP
AT_KEYWORDS([ovs-vsctl fake-bridge])
OVS_VSCTL_SETUP
OVS_VSCTL_SETUP_SIMPLE_FAKE_CONF([$1])
-AT_CHECK([RUN_OVS_VSCTL([del-br xapi1])], [0], [], [], [OVS_VSCTL_CLEANUP])
+AT_CHECK([RUN_OVS_VSCTL([del-br xapi1])])
CHECK_BRIDGES([xenbr0, xenbr0, 0])
CHECK_PORTS([xenbr0], [eth0])
CHECK_IFACES([xenbr0], [eth0])
AT_KEYWORDS([ovs-vsctl fake-bridge])
OVS_VSCTL_SETUP
OVS_VSCTL_SETUP_SIMPLE_FAKE_CONF([$1])
-AT_CHECK([RUN_OVS_VSCTL([del-br xenbr0])], [0], [], [], [OVS_VSCTL_CLEANUP])
+AT_CHECK([RUN_OVS_VSCTL([del-br xenbr0])])
CHECK_BRIDGES
OVS_VSCTL_CLEANUP
AT_CLEANUP
value0
key1=value1
value1
-], [], [OVS_VSCTL_CLEANUP])
+])
CHECK_BRIDGES([xapi1, xenbr0, $1], [xenbr0, xenbr0, 0])
CHECK_PORTS([xenbr0], [eth0])
CHECK_IFACES([xenbr0], [eth0])
CHECK_IFACES([xapi1], [eth0.$1])
OVS_VSCTL_CLEANUP
AT_CLEANUP
+
+AT_SETUP([simple fake bridge + del-port from parent (VLAN $1)])
+AT_KEYWORDS([ovs-vsctl fake-bridge del-port])
+OVS_VSCTL_SETUP
+OVS_VSCTL_SETUP_SIMPLE_FAKE_CONF([$1])
+AT_CHECK([RUN_OVS_VSCTL([del-port xenbr0 eth0.$1])], [1], [],
+ [ovs-vsctl: bridge xenbr0 does not have a port eth0.$1 (although its child bridge xapi1 does)
+])
+CHECK_PORTS([xenbr0], [eth0])
+CHECK_IFACES([xenbr0], [eth0])
+CHECK_PORTS([xapi1], [eth0.$1])
+CHECK_IFACES([xapi1], [eth0.$1])
+AT_CHECK([RUN_OVS_VSCTL([del-port xapi1 eth0.$1])])
+CHECK_PORTS([xenbr0], [eth0])
+CHECK_IFACES([xenbr0], [eth0])
+OVS_VSCTL_CLEANUP
+AT_CLEANUP
]) # OVS_VSCTL_FAKE_BRIDGE_TESTS
OVS_VSCTL_FAKE_BRIDGE_TESTS([9])
[add-br xapi1],
[add-bond xapi1 bond0 eth0 eth1],
[add-br xapi2 xapi1 $1],
- [add-port xapi2 bond0.$1])],
- [0], [], [], [OVS_VSCTL_CLEANUP])])
+ [add-port xapi2 bond0.$1])])])
AT_SETUP([fake bridge on bond])
AT_KEYWORDS([ovs-vsctl fake-bridge])
OVS_VSCTL_SETUP
OVS_VSCTL_SETUP_BOND_FAKE_CONF([11])
AT_CHECK([RUN_OVS_VSCTL_ONELINE([del-br xapi2])], [0], [
-], [], [OVS_VSCTL_CLEANUP])
+])
CHECK_BRIDGES([xapi1, xapi1, 0])
CHECK_PORTS([xapi1], [bond0])
CHECK_IFACES([xapi1], [eth0], [eth1])
[get-manager],
[set-manager tcp:8.9.10.11 tcp:5.4.3.2],
[get-manager],
+ [--inactivity-probe=30000 set-manager tcp:1.2.3.4],
+ [get-manager],
[del-manager],
[get-manager])], [0], [
tcp:5.4.3.2\ntcp:8.9.10.11
+tcp:1.2.3.4
+
-], [], [OVS_VSCTL_CLEANUP])
+])
OVS_VSCTL_CLEANUP
AT_CLEANUP
[RUN_OVS_VSCTL_TOGETHER([--id=@br0 create bridge name=br123],
[set b br123 name=br0],
[set o . bridges=@br0])],
- [0], [stdout], [], [OVS_VSCTL_CLEANUP])
+ [0], [stdout])
cp stdout out1
AT_CHECK([RUN_OVS_VSCTL([list bridge], [get bridge br0 _uuid])],
- [0], [stdout], [], [OVS_VSCTL_CLEANUP])
+ [0], [stdout])
cp stdout out2
-AT_CHECK([${PERL} $srcdir/uuidfilt.pl out1 out2], [0],
+AT_CHECK([uuidfilt out1 out2], [0],
[[<0>
ipfix : []
mcast_snooping_enable: false
mirrors : []
-name : "br0"
+name : br0
netflow : []
other_config : {}
ports : []
status : {}
stp_enable : false
<0>
-]], [ignore], [test ! -e pid || kill `cat pid`])
+]], [ignore])
AT_CHECK(
[RUN_OVS_VSCTL([--columns=fail_mode,name,datapath_type list bridge])],
[0],
[[fail_mode : []
-name : "br0"
+name : br0
datapath_type : ""
-]], [ignore], [test ! -e pid || kill `cat pid`])
+]], [ignore])
AT_CHECK(
[RUN_OVS_VSCTL([--columns=fail_mode,name,datapath_type find bridge])],
[0],
[[fail_mode : []
-name : "br0"
+name : br0
datapath_type : ""
-]], [ignore], [test ! -e pid || kill `cat pid`])
+]], [ignore])
AT_CHECK([
RUN_OVS_VSCTL_TOGETHER([--id=@br1 create bridge name=br1 datapath_type="foo"],
[--id=@br2 create bridge name=br2 external-ids:bar=quux],
[add o . bridges @br1 @br2])],
- [0], [stdout], [], [OVS_VSCTL_CLEANUP])
+ [0], [stdout])
AT_CHECK(
[RUN_OVS_VSCTL([--columns=name find bridge datapath_type!=foo])], [0], [stdout],
- [ignore], [test ! -e pid || kill `cat pid`])
+ [ignore])
AT_CHECK([sed -n '/./p' stdout | sort], [0],
- [[name : "br0"
-name : "br2"
+ [[name : br0
+name : br2
]])
AT_CHECK(
[RUN_OVS_VSCTL(
'other_config:datapath_id="0123456789ab"' \
'other_config:hwaddr="00:11:22:33:44:55"' \
'external-ids={"uuids"="9c45f225-a7cf-439d-976d-83db6271fda1"}' -- \
- add bridge br0 external_ids '"roles"="local; remote; cloud"'])],
- [0], [], [], [OVS_VSCTL_CLEANUP])
+ add bridge br0 external_ids '"roles"="local; remote; cloud"'])])
AT_CHECK([RUN_OVS_VSCTL_ONELINE([get bridge br0 other_config external-ids])],
[0], [{datapath_id="0123456789ab", hwaddr="00:11:22:33:44:55"}\n{roles="local; remote; cloud", uuids="9c45f225-a7cf-439d-976d-83db6271fda1"}
-], [], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([RUN_OVS_VSCTL([get bridge br0 other_config:hwaddr -- --if-exists get bridge br0 other-config:nonexistent])],
[0], ["00:11:22:33:44:55"
-], [], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([RUN_OVS_VSCTL([remove bridge br0 other_config hwaddr 'datapath_id=""' -- get bridge br0 other_config])],
[0], [{datapath_id="0123456789ab"}
-], [], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([RUN_OVS_VSCTL([remove bridge br0 other_config 'datapath_id="0123456789ab"' -- get bridge br0 other_config])],
[0], [{}
-], [], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([RUN_OVS_VSCTL([clear bridge br0 external-ids -- get bridge br0 external_ids])],
[0], [{}
-], [], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([RUN_OVS_VSCTL_TOGETHER([destroy bridge br0],
[destroy bridge br1],
[destroy bridge br2],
[clear o . bridges])],
- [0], [stdout], [], [OVS_VSCTL_CLEANUP])
-AT_CHECK([RUN_OVS_VSCTL([list bridge])],
- [0], [], [], [OVS_VSCTL_CLEANUP])
-AT_CHECK([RUN_OVS_VSCTL([--if-exists get bridge x datapath_id])],
- [0], [], [], [OVS_VSCTL_CLEANUP])
-AT_CHECK([RUN_OVS_VSCTL([--if-exists list bridge x])],
- [0], [], [], [OVS_VSCTL_CLEANUP])
-AT_CHECK([RUN_OVS_VSCTL([--if-exists set controller x connection_mode=standalone])],
- [0], [], [], [OVS_VSCTL_CLEANUP])
+ [0], [stdout])
+AT_CHECK([RUN_OVS_VSCTL([list bridge])])
+AT_CHECK([RUN_OVS_VSCTL([--if-exists get bridge x datapath_id])])
+AT_CHECK([RUN_OVS_VSCTL([--if-exists list bridge x])])
+AT_CHECK([RUN_OVS_VSCTL([--if-exists set controller x connection_mode=standalone])])
AT_CHECK(
- [RUN_OVS_VSCTL([--if-exists remove netflow x targets '"1.2.3.4:567"'])],
- [0], [], [], [OVS_VSCTL_CLEANUP])
+ [RUN_OVS_VSCTL([--if-exists remove netflow x targets '"1.2.3.4:567"'])])
AT_CHECK(
- [RUN_OVS_VSCTL([--if-exists clear netflow x targets])],
- [0], [], [], [OVS_VSCTL_CLEANUP])
+ [RUN_OVS_VSCTL([--if-exists clear netflow x targets])])
+
+AT_CHECK([RUN_OVS_VSCTL([-- --id=@m create Datapath datapath_version=0 -- set Open_vSwitch . datapaths:"netdev"=@m])], [0], [stdout])
+AT_CHECK([RUN_OVS_VSCTL([add-zone-tp netdev zone=1 icmp_first=1 icmp_reply=2])])
+AT_CHECK([RUN_OVS_VSCTL([--may-exist add-zone-tp netdev zone=1 icmp_first=1 icmp_reply=2])])
+AT_CHECK([RUN_OVS_VSCTL([list-zone-tp netdev])], [0], [Zone:1, Timeout Policies: icmp_first=1 icmp_reply=2
+])
+AT_CHECK([RUN_OVS_VSCTL([add-zone-tp netdev zone=2 icmp_first=2 icmp_reply=3])])
+AT_CHECK([RUN_OVS_VSCTL([list-zone-tp netdev])], [0], [Zone:1, Timeout Policies: icmp_first=1 icmp_reply=2
+Zone:2, Timeout Policies: icmp_first=2 icmp_reply=3
+])
+AT_CHECK([RUN_OVS_VSCTL([del-zone-tp netdev zone=1])])
+AT_CHECK([RUN_OVS_VSCTL([--if-exists del-zone-tp netdev zone=1])])
+AT_CHECK([RUN_OVS_VSCTL([list-zone-tp netdev])], [0], [Zone:2, Timeout Policies: icmp_first=2 icmp_reply=3
+])
+
+AT_CHECK(
+ [RUN_OVS_VSCTL_TOGETHER([--id=@n create CT_Zone external_ids:"test"="123"],
+ [--id=@m create Datapath datapath_version=0 ct_zones:"10"=@n],
+ [set Open_vSwitch . datapaths:"netdev"=@m])],
+ [0], [stdout])
+AT_CHECK([RUN_OVS_VSCTL([list-zone-tp netdev])], [0], [Zone:10, Timeout Policies: system default
+])
+
+AT_CHECK([RUN_OVS_VSCTL([-- --id=@m create Datapath datapath_version=0 'capabilities={recirc=true}' -- set Open_vSwitch . datapaths:"system"=@m])], [0], [stdout])
+AT_CHECK([RUN_OVS_VSCTL([list-dp-cap system])], [0], [recirc=true
+])
OVS_VSCTL_CLEANUP
AT_CLEANUP
AT_CHECK([ovs-vsctl --may-exist],
[1], [ignore], [ovs-vsctl: missing command name (use --help for help)
-], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([ovs-vsctl --may-exist --],
[1], [ignore], [ovs-vsctl: missing command name (use --help for help)
-], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([ovs-vsctl -- --may-exist],
[1], [ignore], [ovs-vsctl: missing command name (use --help for help)
-], [OVS_VSCTL_CLEANUP])
-
-AT_CHECK([RUN_OVS_VSCTL([add-br br0])],
- [0], [ignore], [], [OVS_VSCTL_CLEANUP])
-AT_CHECK([RUN_OVS_VSCTL([add-br br1])],
- [0], [ignore], [], [OVS_VSCTL_CLEANUP])
-AT_CHECK([RUN_OVS_VSCTL([set-controller br1 tcp:127.0.0.1])],
- [0], [ignore], [], [OVS_VSCTL_CLEANUP])
+])
+
+AT_CHECK([RUN_OVS_VSCTL([add-br br0])], [0], [ignore])
+AT_CHECK([RUN_OVS_VSCTL([add-br br1])], [0], [ignore])
+AT_CHECK([RUN_OVS_VSCTL([set-controller br1 tcp:127.0.0.1])], [0], [ignore])
+AT_CHECK([RUN_OVS_VSCTL([list netflow br0])], [1], [],
+ [ovs-vsctl: no row "br0" in table NetFlow
+])
AT_CHECK([
RUN_OVS_VSCTL_TOGETHER([--id=@n create netflow targets='"1.2.3.4:567"'],
[set bridge br0 netflow=@n])],
- [0], [stdout], [], [OVS_VSCTL_CLEANUP])
+ [0], [stdout])
cp stdout netflow-uuid
-AT_CHECK([RUN_OVS_VSCTL([list netflow `cat netflow-uuid`])],
- [0], [stdout], [], [OVS_VSCTL_CLEANUP])
-AT_CHECK([${PERL} $srcdir/uuidfilt.pl netflow-uuid stdout], [0],
+AT_CHECK([RUN_OVS_VSCTL([list netflow `cat netflow-uuid`])], [0], [stdout])
+AT_CHECK([uuidfilt netflow-uuid stdout], [0],
[[<0>
_uuid : <0>
engine_type : []
external_ids : {}
targets : ["1.2.3.4:567"]
-]], [ignore], [test ! -e pid || kill `cat pid`])
+]], [ignore])
AT_CHECK([RUN_OVS_VSCTL([list interx x])],
[1], [], [ovs-vsctl: unknown table "interx"
-], [OVS_VSCTL_CLEANUP])
+])
+AT_CHECK([RUN_OVS_VSCTL([list c x])],
+ [1], [], [ovs-vsctl: "c" matches multiple table names: CT_Timeout_Policy, CT_Zone, Controller
+])
AT_CHECK([RUN_OVS_VSCTL([list bridge x])],
[1], [], [ovs-vsctl: no row "x" in table Bridge
-], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([RUN_OVS_VSCTL([get bridge x datapath_id])],
[1], [], [ovs-vsctl: no row "x" in table Bridge
-], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([RUN_OVS_VSCTL([get bridge br0 d])],
- [1], [], [ovs-vsctl: Bridge contains more than one column whose name matches "d"
-], [OVS_VSCTL_CLEANUP])
+ [1], [], [ovs-vsctl: Bridge contains more than one column whose name matches "d": datapath_id, datapath_type, datapath_version
+])
AT_CHECK([RUN_OVS_VSCTL([get bridge br0 x])],
[1], [], [ovs-vsctl: Bridge does not contain a column whose name matches "x"
-], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([RUN_OVS_VSCTL([get bridge br0 :y=z])],
[1], [], [ovs-vsctl: :y=z: missing column name
-], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([RUN_OVS_VSCTL([get bridge br0 datapath_id:y=z])],
[1], [], [ovs-vsctl: datapath_id:y=z: trailing garbage "=z" in argument
-], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([RUN_OVS_VSCTL([set bridge br0 'datapath_id:y>=z'])],
[1], [], [ovs-vsctl: datapath_id:y>=z: argument does not end in "=" followed by a value.
-], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([RUN_OVS_VSCTL([set controller x connection_mode=standalone])],
[1], [], [ovs-vsctl: no row "x" in table Controller
-], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([RUN_OVS_VSCTL([wait-until bridge br0 datapath_id:y,z])],
[1], [], [ovs-vsctl: datapath_id:y,z: argument does not end in "=", "!=", "<", ">", "<=", ">=", "{=}", "{!=}", "{<}", "{>}", "{<=}", or "{>=}" followed by a value.
-], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([RUN_OVS_VSCTL([get bridge br0 datapath_id::])],
[1], [], [ovs-vsctl: datapath_id::: trailing garbage ":" in argument
-], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([RUN_OVS_VSCTL([get bridge br0 datapath_id:x])],
[1], [], [ovs-vsctl: cannot specify key to get for non-map column datapath_id
-], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([RUN_OVS_VSCTL([get bridge br0 external_ids:x])],
[1], [], [ovs-vsctl: no key "x" in Bridge record "br0" column external_ids
-], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([RUN_OVS_VSCTL([set bridge br0 flood_vlans=-1])],
[1], [], [ovs-vsctl: constraint violation: -1 is not in the valid range 0 to 4095 (inclusive)
-], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([RUN_OVS_VSCTL([set bridge br0 flood_vlans=4096])],
[1], [], [ovs-vsctl: constraint violation: 4096 is not in the valid range 0 to 4095 (inclusive)
-], [OVS_VSCTL_CLEANUP])
-AT_CHECK([RUN_OVS_VSCTL([set c br1 'connection-mode=xyz'])],
+])
+AT_CHECK([RUN_OVS_VSCTL([set controller br1 'connection-mode=xyz'])],
[1], [], [[ovs-vsctl: constraint violation: xyz is not one of the allowed values ([in-band, out-of-band])
-]], [OVS_VSCTL_CLEANUP])
-AT_CHECK([RUN_OVS_VSCTL([set c br1 connection-mode:x=y])],
+]])
+AT_CHECK([RUN_OVS_VSCTL([set controller br1 connection-mode:x=y])],
[1], [], [ovs-vsctl: cannot specify key to set for non-map column connection_mode
-], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([RUN_OVS_VSCTL([add bridge br1 datapath_id x y])],
[1], [], [ovs-vsctl: "add" operation would put 2 values in column datapath_id of table Bridge but the maximum number is 1
-], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([RUN_OVS_VSCTL([remove netflow `cat netflow-uuid` targets '"1.2.3.4:567"'])],
[1], [], [ovs-vsctl: "remove" operation would put 0 values in column targets of table NetFlow but the minimum number is 1
-], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([RUN_OVS_VSCTL([remove netflow x targets '"1.2.3.4:567"'])],
[1], [], [ovs-vsctl: no row "x" in table NetFlow
-], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([RUN_OVS_VSCTL([clear netflow x targets])],
[1], [], [ovs-vsctl: no row "x" in table NetFlow
-], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([RUN_OVS_VSCTL([clear netflow `cat netflow-uuid` targets])],
[1], [], [ovs-vsctl: "clear" operation cannot be applied to column targets of table NetFlow, which is not allowed to be empty
-], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([RUN_OVS_VSCTL([destroy bridge br2])],
[1], [], [ovs-vsctl: no row "br2" in table Bridge
-], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([RUN_OVS_VSCTL([add in br1 name x])],
[1], [], [ovs-vsctl: cannot modify read-only column name in table Interface
-], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([RUN_OVS_VSCTL([set port br0 name=br2])],
[1], [], [ovs-vsctl: cannot modify read-only column name in table Port
-], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([RUN_OVS_VSCTL([remove bridge br0 name br1])],
[1], [], [ovs-vsctl: cannot modify read-only column name in table Bridge
-], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([RUN_OVS_VSCTL([remove bridge br1 flood-vlans true])],
- [1], [], [ovs-vsctl: "true" is not a valid integer
-], [OVS_VSCTL_CLEANUP])
+ [1], [], [ovs-vsctl: "true" is not a valid integer or range
+])
AT_CHECK([RUN_OVS_VSCTL([clear bridge br1 name])],
[1], [], [ovs-vsctl: cannot modify read-only column name in table Bridge
-], [OVS_VSCTL_CLEANUP])
+])
+
+AT_CHECK([RUN_OVS_VSCTL([-- --id=@m create Datapath datapath_version=0 -- set Open_vSwitch . datapaths:"netdev"=@m])], [0], [stdout])
+AT_CHECK([RUN_OVS_VSCTL([add-zone-tp netdevxx zone=1 icmp_first=1 icmp_reply=2])],
+ [1], [], [ovs-vsctl: datapath netdevxx does not exist
+])
+AT_CHECK([RUN_OVS_VSCTL([add-zone-tp netdev zone=2 icmp_first=2 icmp_reply=3])])
+AT_CHECK([RUN_OVS_VSCTL([add-zone-tp netdev zone=2 icmp_first=2 icmp_reply=3])],
+ [1], [], [ovs-vsctl: zone id 2 already exists
+])
+AT_CHECK([RUN_OVS_VSCTL([list-zone-tp netdev])], [0], [Zone:2, Timeout Policies: icmp_first=2 icmp_reply=3
+])
+AT_CHECK([RUN_OVS_VSCTL([del-zone-tp netdev zone=11])],
+ [1], [], [ovs-vsctl: zone id 11 does not exist
+])
+AT_CHECK([RUN_OVS_VSCTL([list-zone-tp netdev])], [0], [Zone:2, Timeout Policies: icmp_first=2 icmp_reply=3
+])
+
+AT_CHECK([RUN_OVS_VSCTL([-- --id=@m create Datapath datapath_version=0 'capabilities={recirc=true}' -- set Open_vSwitch . datapaths:"system"=@m])], [0], [stdout])
+AT_CHECK([RUN_OVS_VSCTL([list-dp-cap nosystem])],
+ [1], [], [ovs-vsctl: datapath "nosystem" record not found
+])
+
OVS_VSCTL_CLEANUP
AT_CLEANUP
AT_SETUP([database commands -- conditions])
AT_KEYWORDS([ovs-vsctl])
-ON_EXIT([kill `cat pid`])
OVS_VSCTL_SETUP
AT_CHECK(
[RUN_OVS_VSCTL_TOGETHER(
])
m4_define([VSCTL_CHECK_FIND],
- [AT_CHECK([echo `ovs-vsctl --bare --no-wait -vreconnect:emer --db=unix:socket -- --columns=name find bridge '$1' | sort`], [0], [$2
+ [AT_CHECK([echo `ovs-vsctl --bare --no-wait -vreconnect:emer -- --columns=name find bridge '$1' | sort`], [0], [$2
])])
# Arithmetic relational operators without keys.
AT_CHECK([RUN_OVS_VSCTL(
[add-br br0],
[add-bond br0 bond0 eth0 eth1],
- [set port bond0 bond_updelay=500 other-config:abc=def])],
- [0], [], [], [OVS_VSCTL_CLEANUP])
-AT_CHECK([RUN_OVS_VSCTL([[wait-until Open_vSwitch . manager_options=[]]])],
- [0], [], [], [OVS_VSCTL_CLEANUP])
-AT_CHECK([RUN_OVS_VSCTL([[wait-until Open_vSwitch . bridges!=[]]])],
- [0], [], [], [OVS_VSCTL_CLEANUP])
-AT_CHECK([RUN_OVS_VSCTL([[wait-until Port bond0 other-config:abc=def]])],
- [0], [], [], [OVS_VSCTL_CLEANUP])
-AT_CHECK([RUN_OVS_VSCTL([[wait-until port bond0 'bond_updelay>50' 'other-config:abc>d' 'other-config:abc<e']])],
- [0], [], [], [OVS_VSCTL_CLEANUP])
+ [set port bond0 bond_updelay=500 other-config:abc=def])])
+AT_CHECK([RUN_OVS_VSCTL([[wait-until Open_vSwitch . manager_options=[]]])])
+AT_CHECK([RUN_OVS_VSCTL([[wait-until Open_vSwitch . bridges!=[]]])])
+AT_CHECK([RUN_OVS_VSCTL([[wait-until Port bond0 other-config:abc=def]])])
+AT_CHECK([RUN_OVS_VSCTL([[wait-until port bond0 'bond_updelay>50' 'other-config:abc>d' 'other-config:abc<e']])])
OVS_VSCTL_CLEANUP
AT_CLEANUP
sleep 1
AT_CHECK([RUN_OVS_VSCTL([add-br br10 -- set bridge br10 other-config:abc=quux])
-RUN_OVS_VSCTL([add-br br1 -- set bridge br1 other-config:abc=def -- add-bond br1 bond0 eth0 eth1 -- set port bond0 bond_updelay=500])],
- [0], [], [], [OVS_VSCTL_CLEANUP])
+RUN_OVS_VSCTL([add-br br1 -- set bridge br1 other-config:abc=def -- add-bond br1 bond0 eth0 eth1 -- set port bond0 bond_updelay=500])])
# Wait for the ovs-vsctls to finish.
wait
# Check output
AT_CHECK([cat stdout1], [0], [quux
-], [], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([cat stdout2], [0], [def
-], [], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([cat stdout3], [0], [{abc=def}
-], [], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([cat stdout4], [0], [500
-], [], [OVS_VSCTL_CLEANUP])
+])
OVS_VSCTL_CLEANUP
AT_CLEANUP
[--id=@eth0 get port eth0],
[--id=@eth1 get port eth1],
[--id=@m create mirror name=mymirror select-dst-port=@eth0 select-src-port=@eth0 output-port=@eth1])],
- [0], [stdout], [], [OVS_VSCTL_CLEANUP])
+ [0], [stdout])
AT_CHECK(
- [${PERL} $srcdir/uuidfilt.pl stdout], [0], [dnl
+ [uuidfilt stdout], [0], [dnl
<0>
-],
- [], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK(
[RUN_OVS_VSCTL(
[list port eth0 eth1],
[list mirror],
[list bridge br0])],
- [0], [stdout], [], [OVS_VSCTL_CLEANUP])
+ [0], [stdout])
AT_CHECK(
- [sed -n -e '/uuid/p' -e '/name/p' -e '/mirrors/p' -e '/select/p' -e '/output/p' < stdout | ${PERL} $srcdir/uuidfilt.pl], [0], [dnl
+ [sed -n -e '/uuid/p' -e '/name/p' -e '/mirrors/p' -e '/select/p' -e '/output/p' < stdout | uuidfilt], [0], [dnl
[_uuid : <0>
-name : "eth0"
+name : eth0
_uuid : <1>
-name : "eth1"
+name : eth1
_uuid : <2>
name : mymirror
output_port : <1>
select_vlan : []
_uuid : <3>
mirrors : [<2>]
-name : "br0"
-]],
- [], [OVS_VSCTL_CLEANUP])
+name : br0
+]])
OVS_VSCTL_CLEANUP
AT_CLEANUP
AT_KEYWORDS([ovs-vsctl])
OVS_VSCTL_SETUP
AT_CHECK(
- [ovs-vsctl -vPATTERN:console:'%c|%p|%m' --no-wait -vreconnect:emer --db=unix:socket \
- -- create Bridge name=br0 | ${PERL} $srcdir/uuidfilt.pl],
+ [ovs-vsctl -vPATTERN:console:'%c|%p|%m' --no-wait -vreconnect:emer \
+ -- create Bridge name=br0 | uuidfilt],
[0], [<0>
], [db_ctl_base|WARN|applying "create" command to table Bridge without --id option will have no effect
-], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK(
- [ovs-vsctl -vPATTERN:console:'%c|%p|%m' --no-wait -vreconnect:emer --db=unix:socket \
- -- --id=@br0 create Bridge name=br0 | ${PERL} $srcdir/uuidfilt.pl],
+ [ovs-vsctl -vPATTERN:console:'%c|%p|%m' --no-wait -vreconnect:emer \
+ -- --id=@br0 create Bridge name=br0 | uuidfilt],
[0], [<0>
], [vsctl|WARN|row id "@br0" was created but no reference to it was inserted, so it will not actually appear in the database
-], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK(
- [ovs-vsctl -vPATTERN:console:'%c|%p|%m' --no-wait -vreconnect:emer --db=unix:socket \
+ [ovs-vsctl -vPATTERN:console:'%c|%p|%m' --no-wait -vreconnect:emer \
-- --id=@eth0_iface create Interface name=eth0 \
-- --id=@eth0 create Port name=eth0 interfaces=@eth0_iface \
-- --id=@m0 create Mirror name=m0 output_port=@eth0 \
-- --id=@br0 create Bridge name=br0 mirrors=@m0 \
- -- set Open_vSwitch . bridges=@br0 | ${PERL} $srcdir/uuidfilt.pl],
+ -- set Open_vSwitch . bridges=@br0 | uuidfilt],
[0], [<0>
<1>
<2>
<3>
], [vsctl|WARN|row id "@eth0" was created but only a weak reference to it was inserted, so it will not actually appear in the database
-], [OVS_VSCTL_CLEANUP])
+])
OVS_VSCTL_CLEANUP
AT_CLEANUP
AT_KEYWORDS([ovs-vsctl])
OVS_VSCTL_SETUP
AT_CHECK([RUN_OVS_VSCTL([--id=@br0 create Bridge name=br0 -- add Open_vSwitch . bridges @br0 -- list bridge])],
- [0], [stdout], [], [OVS_VSCTL_CLEANUP])
-AT_CHECK([${PERL} $srcdir/uuidfilt.pl stdout], [0],
+ [0], [stdout])
+AT_CHECK([uuidfilt stdout], [0],
[[<0>
_uuid : <1>
auto_attach : []
ipfix : []
mcast_snooping_enable: false
mirrors : []
-name : "br0"
+name : br0
netflow : []
other_config : {}
ports : []
sflow : []
status : {}
stp_enable : false
-]], [ignore], [test ! -e pid || kill `cat pid`])
+]], [ignore])
OVS_VSCTL_CLEANUP
AT_CLEANUP
AT_CHECK([RUN_OVS_VSCTL(
[add-br a],
[add-port a a1],
- [add-port a a2])], [0], [], [], [OVS_VSCTL_CLEANUP])
+ [add-port a a2])])
CHECK_BRIDGES([a, a, 0])
CHECK_PORTS([a], [a1], [a2])
CHECK_IFACES([a], [a1], [a2])
[set Port a2 qos=@newqos],
[--id=@newqos create QoS type=linux-htb other-config:max-rate=1000000000 queues=0=@q0,1=@q1],
[--id=@q0 create Queue other-config:min-rate=100000000 other-config:max-rate=100000000],
- [--id=@q1 create Queue other-config:min-rate=500000000])], [0], [ignore], [], [OVS_VSCTL_CLEANUP])
+ [--id=@q1 create Queue other-config:min-rate=500000000])], [0], [ignore])
AT_CHECK([RUN_OVS_VSCTL(
[--columns=other_config,type list Qos])], [0],
[other_config : {max-rate="1000000000"}
type : linux-htb
-], [], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([RUN_OVS_VSCTL(
[--columns=other_config list Queue | sort | sed '/^$/d'])], [0],
[other_config : {max-rate="100000000", min-rate="100000000"}
other_config : {min-rate="500000000"}
-], [], [OVS_VSCTL_CLEANUP])
+])
AT_CHECK([RUN_OVS_VSCTL(
[clear Port a1 qos],
- [clear Port a2 qos])], [0], [], [], [OVS_VSCTL_CLEANUP])
+ [clear Port a2 qos])])
AT_CHECK([RUN_OVS_VSCTL(
[--columns=qos list Port a1 a2])], [0],
[[qos : []
qos : []
-]], [], [OVS_VSCTL_CLEANUP])
+]])
AT_CHECK([RUN_OVS_VSCTL(
- [--all destroy Qos])], [0], [], [], [OVS_VSCTL_CLEANUP])
+ [--all destroy Qos])])
AT_CHECK([RUN_OVS_VSCTL(
- [-- list Qos])], [0], [], [], [OVS_VSCTL_CLEANUP])
+ [-- list Qos])])
AT_CHECK([RUN_OVS_VSCTL(
- [--all destroy Queue])], [0], [], [], [OVS_VSCTL_CLEANUP])
+ [--all destroy Queue])])
AT_CHECK([RUN_OVS_VSCTL(
- [-- list Queue])], [0], [], [], [OVS_VSCTL_CLEANUP])
+ [-- list Queue])])
OVS_VSCTL_CLEANUP
AT_CLEANUP
[vxlan_sys]],
[
# Try creating the port
-AT_CHECK([ovs-vsctl add-port br0 reserved_name], [0], [], [dnl
+cat >experr <<EOF
ovs-vsctl: Error detected while setting up 'reserved_name'. See ovs-vswitchd log for details.
-])
+ovs-vsctl: The default log directory is "$OVS_RUNDIR".
+EOF
+AT_CHECK([ovs-vsctl add-port br0 reserved_name], [0], [], [experr])
# Prevent race.
OVS_WAIT_UNTIL([test `grep -- "|WARN|" ovs-vswitchd.log | wc -l` -ge 1])
# Detect the warning log message
[vxlan_sys]],
[
# Try creating the port
-AT_CHECK([ovs-vsctl add-port br0 reserved_name], [0], [], [dnl
+cat >experr <<EOF
ovs-vsctl: Error detected while setting up 'reserved_name'. See ovs-vswitchd log for details.
-])
+ovs-vsctl: The default log directory is "$OVS_RUNDIR".
+EOF
+AT_CHECK([ovs-vsctl add-port br0 reserved_name], [0], [], [experr])
# Prevent race.
OVS_WAIT_UNTIL([test `grep -- "|WARN|" ovs-vswitchd.log | wc -l` -ge 1])
# Detect the warning log message
AT_CLEANUP
AT_SETUP([naming in db commands])
+AT_KEYWORDS([ovs-vsctl])
OVS_VSCTL_SETUP
dnl First check that the database commands can refer to row by database UUID.
AT_CHECK([RUN_OVS_VSCTL([add-br br0])])
uuid=`[]RUN_OVS_VSCTL(get port br0 _uuid)`
-AT_CHECK([RUN_OVS_VSCTL([get port $uuid name])], [0], ["br0"
+AT_CHECK([RUN_OVS_VSCTL([get port $uuid name])], [0], [br0
])
dnl Next check that, if a database row is given a name that has the same form
OVS_VSCTL_CLEANUP
AT_CLEANUP
+AT_SETUP([bootstrap ca cert])
+AT_KEYWORDS([ovs-vsctl ssl])
+AT_SKIP_IF([test "$HAVE_OPENSSL" = no])
+PKIDIR=`pwd`
+OVS_PKI="sh $abs_top_srcdir/utilities/ovs-pki.in --dir=$PKIDIR/pki --log=$PKIDIR/ovs-pki.log"
+AT_CHECK([$OVS_PKI init && $OVS_PKI req+sign vsctl switch && $OVS_PKI req ovsdbserver && $OVS_PKI self-sign ovsdbserver], [0], [ignore], [ignore])
+
+dnl Create database.
+OVSDB_INIT([conf.db])
+AT_CHECK([ovsdb-server --detach --no-chdir --pidfile --private-key=$PKIDIR/ovsdbserver-privkey.pem --certificate=$PKIDIR/ovsdbserver-cert.pem --ca-cert=$PKIDIR/pki/switchca/cacert.pem --remote=pssl:0:127.0.0.1 --log-file="`pwd`"/ovsdb-server.log conf.db], [0], [ignore], [ignore])
+on_exit "kill `cat ovsdb-server.pid`"
+PARSE_LISTENING_PORT([ovsdb-server.log], [SSL_PORT])
+
+# During bootstrap, the connection gets torn down. So the o/p of ovs-vsctl is error.
+AT_CHECK([ovs-vsctl -t 5 --db=ssl:127.0.0.1:$SSL_PORT --private-key=$PKIDIR/vsctl-privkey.pem --certificate=$PKIDIR/vsctl-cert.pem --bootstrap-ca-cert=$PKIDIR/cacert.pem show], [1], [ignore], [ignore])
+
+# If the bootstrap was successful, the following file should exist.
+OVS_WAIT_UNTIL([test -e $PKIDIR/cacert.pem])
+
+# After bootstrap, the connection should be successful.
+AT_CHECK([ovs-vsctl -t 5 --no-wait --db=ssl:127.0.0.1:$SSL_PORT --private-key=$PKIDIR/vsctl-privkey.pem --certificate=$PKIDIR/vsctl-cert.pem --bootstrap-ca-cert=$PKIDIR/cacert.pem add-br br0], [0])
+AT_CHECK([ovs-vsctl -t 5 --no-wait --db=ssl:127.0.0.1:$SSL_PORT --private-key=$PKIDIR/vsctl-privkey.pem --certificate=$PKIDIR/vsctl-cert.pem --bootstrap-ca-cert=$PKIDIR/cacert.pem list-br], [0], [br0
+])
+
+OVS_VSCTL_CLEANUP
+AT_CLEANUP
+
AT_SETUP([peer ca cert])
AT_KEYWORDS([ovs-vsctl ssl])
AT_SKIP_IF([test "$HAVE_OPENSSL" = no])
PKIDIR=`pwd`
OVS_PKI="sh $abs_top_srcdir/utilities/ovs-pki.in --dir=$PKIDIR/pki --log=$PKIDIR/ovs-pki.log"
-$OVS_PKI -B 1024 init && \
-$OVS_PKI -B 1024 req+sign vsctl switch && \
-$OVS_PKI -B 1024 req ovsdbserver && $OVS_PKI self-sign ovsdbserver
+AT_CHECK([$OVS_PKI init && $OVS_PKI req+sign vsctl switch && $OVS_PKI req+sign ovsdbserver controller], [0], [ignore], [ignore])
dnl Create database.
-touch .conf.db.~lock~
-AT_CHECK([ovsdb-tool create conf.db $abs_top_srcdir/vswitchd/vswitch.ovsschema])
-AT_CHECK([ovsdb-server --detach --no-chdir --pidfile="`pwd`"/pid --private-key=$PKIDIR/ovsdbserver-privkey.pem --certificate=$PKIDIR/ovsdbserver-cert.pem --ca-cert=$PKIDIR/pki/switchca/cacert.pem --peer-ca-cert=$PKIDIR/ovsdbserver-cert.pem --remote=pssl:0:127.0.0.1 --unixctl="`pwd`"/unixctl --log-file="`pwd`"/ovsdb-server.log conf.db], [0], [ignore], [ignore])
-ON_EXIT_UNQUOTED([kill `cat pid`])
-SSL_PORT=`parse_listening_port < ovsdb-server.log`
+OVSDB_INIT([conf.db])
+AT_CHECK([ovsdb-server --detach --no-chdir --pidfile --private-key=$PKIDIR/ovsdbserver-privkey.pem --certificate=$PKIDIR/ovsdbserver-cert.pem --ca-cert=$PKIDIR/pki/switchca/cacert.pem --peer-ca-cert=$PKIDIR/pki/controllerca/cacert.pem --remote=pssl:0:127.0.0.1 --log-file="`pwd`"/ovsdb-server.log conf.db], [0], [ignore], [ignore])
+on_exit "kill `cat ovsdb-server.pid`"
+PARSE_LISTENING_PORT([ovsdb-server.log], [SSL_PORT])
# During bootstrap, the connection gets torn down. So the o/p of ovs-vsctl is error.
AT_CHECK([ovs-vsctl -t 5 --db=ssl:127.0.0.1:$SSL_PORT --private-key=$PKIDIR/vsctl-privkey.pem --certificate=$PKIDIR/vsctl-cert.pem --bootstrap-ca-cert=$PKIDIR/cacert.pem show], [1], [ignore], [ignore])
# If the bootstrap was successful, the following file should exist.
OVS_WAIT_UNTIL([test -e $PKIDIR/cacert.pem])
-OVSDB_SERVER_SHUTDOWN
+
+# After bootstrap, the connection should be successful.
+AT_CHECK([ovs-vsctl -t 5 --no-wait --db=ssl:127.0.0.1:$SSL_PORT --private-key=$PKIDIR/vsctl-privkey.pem --certificate=$PKIDIR/vsctl-cert.pem --bootstrap-ca-cert=$PKIDIR/cacert.pem add-br br0], [0])
+AT_CHECK([ovs-vsctl -t 5 --no-wait --db=ssl:127.0.0.1:$SSL_PORT --private-key=$PKIDIR/vsctl-privkey.pem --certificate=$PKIDIR/vsctl-cert.pem --bootstrap-ca-cert=$PKIDIR/cacert.pem list-br], [0], [br0
+])
+
+OVS_VSCTL_CLEANUP
+AT_CLEANUP
+
+AT_SETUP([TLS server name indication (SNI)])
+AT_KEYWORDS([ovsdb server positive ssl tls sni])
+AT_SKIP_IF([test "$HAVE_OPENSSL" = no])
+AT_SKIP_IF([test "$OPENSSL_SUPPORTS_SNI" = no])
+AT_SKIP_IF([test "$HAVE_UNBOUND" = no])
+OVSDB_INIT([conf.db])
+PKIDIR=$abs_top_builddir/tests
+AT_CHECK([ovsdb-server --log-file --detach --no-chdir --pidfile --private-key=$PKIDIR/testpki-privkey2.pem --certificate=$PKIDIR/testpki-cert2.pem --ca-cert=$PKIDIR/testpki-cacert.pem --remote=pssl:0:127.0.0.1 -vPATTERN:file:%m -vstream_ssl conf.db], [0], [ignore], [ignore])
+PARSE_LISTENING_PORT([ovsdb-server.log], [SSL_PORT])
+
+AT_CHECK([ovs-vsctl -t 5 --no-wait --db=ssl:localhost:$SSL_PORT --private-key=$PKIDIR/testpki-privkey.pem --certificate=$PKIDIR/testpki-cert.pem --bootstrap-ca-cert=$PKIDIR/testpki-cacert.pem add-br br0])
+
+AT_CAPTURE_FILE([ovsdb-server.log])
+AT_CHECK([grep "server name" ovsdb-server.log], [0],
+ [connection indicated server name localhost
+])
+
+OVS_VSCTL_CLEANUP
AT_CLEANUP