rest_firewall had used the max_len value of flow_mod message which ofctl_v1_x 
specified.
in response to change ofctl_v1_x, rest_firewall gets to use the specified 
max_len explicitly.

Signed-off-by: Yuichi Ito <[email protected]>
---
 ryu/app/rest_firewall.py |    3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/ryu/app/rest_firewall.py b/ryu/app/rest_firewall.py
index ba5a166..1c42643 100644
--- a/ryu/app/rest_firewall.py
+++ b/ryu/app/rest_firewall.py
@@ -953,7 +953,8 @@ class Action(object):
         elif value == REST_ACTION_PACKETIN:
             out_port = dp.ofproto.OFPP_CONTROLLER
             action = [{'type': 'OUTPUT',
-                       'port': out_port}]
+                       'port': out_port,
+                       'max_len': 128}]
         else:
             raise ValueError('Invalid action type.')

-- 
1.7.10.4


------------------------------------------------------------------------------
Rapidly troubleshoot problems before they affect your business. Most IT 
organizations don't have a clear picture of how application performance 
affects their revenue. With AppDynamics, you get 100% visibility into your 
Java,.NET, & PHP application. Start your 15-day FREE TRIAL of AppDynamics Pro!
http://pubads.g.doubleclick.net/gampad/clk?id=84349831&iu=/4140/ostg.clktrk
_______________________________________________
Ryu-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/ryu-devel

Reply via email to