rest_firewall had used the max_len value of flow_mod message which ofctl_v1_x specified. in response to change ofctl_v1_x, rest_firewall gets to use the specified max_len explicitly.
Signed-off-by: Yuichi Ito <[email protected]> --- ryu/app/rest_firewall.py | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/ryu/app/rest_firewall.py b/ryu/app/rest_firewall.py index ba5a166..1c42643 100644 --- a/ryu/app/rest_firewall.py +++ b/ryu/app/rest_firewall.py @@ -953,7 +953,8 @@ class Action(object): elif value == REST_ACTION_PACKETIN: out_port = dp.ofproto.OFPP_CONTROLLER action = [{'type': 'OUTPUT', - 'port': out_port}] + 'port': out_port, + 'max_len': 128}] else: raise ValueError('Invalid action type.') -- 1.7.10.4 ------------------------------------------------------------------------------ Rapidly troubleshoot problems before they affect your business. Most IT organizations don't have a clear picture of how application performance affects their revenue. With AppDynamics, you get 100% visibility into your Java,.NET, & PHP application. Start your 15-day FREE TRIAL of AppDynamics Pro! http://pubads.g.doubleclick.net/gampad/clk?id=84349831&iu=/4140/ostg.clktrk _______________________________________________ Ryu-devel mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/ryu-devel
