On 29 September 2015 at 13:40, Joe Stringer <joestrin...@nicira.com> wrote:
> When interacting with the local stack, the kernel may provide packets
> with existing ct state as they ingress OVS. These tests check that we
> are able to connection-track such packets successfully in non-zero
> zones, using slightly more realistic pipelines.
>
> Signed-off-by: Joe Stringer <joestrin...@nicira.com>
> ---
>  tests/system-common-macros.at |   5 +-
>  tests/system-traffic.at       | 117 
> ++++++++++++++++++++++++++++++++++++++++++
>  2 files changed, 121 insertions(+), 1 deletion(-)
>
> diff --git a/tests/system-common-macros.at b/tests/system-common-macros.at
> index 8f3b318..f0da589 100644
> --- a/tests/system-common-macros.at
> +++ b/tests/system-common-macros.at
> @@ -124,7 +124,10 @@ m4_define([FORMAT_PING], [grep "transmitted" | sed 
> 's/time.*ms$/time 0ms/'])
>  # Strip content from the piped input which would differ from test to test.
>  #
>  m4_define([FORMAT_CT],
> -    [[grep "dst=$1" | sed -e 's/port=[0-9]*/port=<cleared>/g' -e 's/  */ /g' 
> -e 's/secctx[^ ]* //' | cut -d' ' -f4- | sort | uniq]])
> +    [[grep "dst=$1" | sed -e 's/port=[0-9]*/port=<cleared>/g' -e 's/  */ /g' 
> \
> +                          -e 's/secctx[^ ]* //' \
> +                          -e 's/id=[0-9]*/id=<cleared>/g' \
> +                    | cut -d' ' -f4- | sort | uniq]])
>
>  # NETNS_DAEMONIZE([namespace], [command], [pidfile])
>  #
> diff --git a/tests/system-traffic.at b/tests/system-traffic.at
> index 081531b..84f5baa 100644
> --- a/tests/system-traffic.at
> +++ b/tests/system-traffic.at
> @@ -566,6 +566,123 @@ TIME_WAIT src=10.1.1.1 dst=10.1.1.2 sport=<cleared> 
> dport=<cleared> src=10.1.1.2
>  OVS_TRAFFIC_VSWITCHD_STOP
>  AT_CLEANUP
>
> +AT_SETUP([conntrack - multiple zones, local])
> +CHECK_CONNTRACK()
> +OVS_TRAFFIC_VSWITCHD_START(
> +   [set-fail-mode br0 secure -- ])
> +
> +ADD_NAMESPACES(at_ns0)
> +
> +AT_CHECK([ip addr add dev br0 "10.1.1.1/24"])
> +AT_CHECK([ip link set dev br0 up])
> +on_exit 'ip addr del dev br0 "10.1.1.1/24"'
> +ADD_VETH(p0, at_ns0, br0, "10.1.1.2/24")
> +
> +dnl Allow any traffic from ns0->ns1. Only allow nd, return traffic from 
> ns1->ns0.

This comment keeps leaking into other tests, it's meant to be the same
as the comment in the equivalent part of the next test:

+dnl Allow traffic from local stack to ns0. Only allow neighbour discovery,
+dnl return traffic from ns0 back to the local stack.
_______________________________________________
dev mailing list
dev@openvswitch.org
http://openvswitch.org/mailman/listinfo/dev

Reply via email to