Open vSwitch accepts NXM_NX_TUN_IPV6_SRC(109) and
NXM_NX_TUN_IPV6_DST(110) since v2.5.

Signed-off-by: Atzm Watanabe <[email protected]>
---
 ryu/ofproto/nx_match.py                        | 4 ++++
 ryu/tests/unit/ofproto/test_parser_ofpmatch.py | 2 ++
 2 files changed, 6 insertions(+)

diff --git a/ryu/ofproto/nx_match.py b/ryu/ofproto/nx_match.py
index 49a5e03..4998927 100644
--- a/ryu/ofproto/nx_match.py
+++ b/ryu/ofproto/nx_match.py
@@ -1264,6 +1264,8 @@ ct_state         Integer 32bit   Conntrack state.
 ct_zone          Integer 16bit   Conntrack zone.
 ct_mark          Integer 32bit   Conntrack mark.
 ct_label         Integer 128bit  Conntrack label.
+tun_ipv6_src     IPv6 address    Tunnel IPv6 source address.
+tun_ipv6_dst     IPv6 address    Tunnel IPv6 destination address.
 _dp_hash         Integer 32bit   Flow hash computed in Datapath.
 reg<idx>         Integer 32bit   Packet register.
                                  <idx> is register number 0-7.
@@ -1308,6 +1310,8 @@ oxm_types = [
     oxm_fields.NiciraExtended1('ct_zone', 106, type_desc.Int2),
     oxm_fields.NiciraExtended1('ct_mark', 107, type_desc.Int4),
     oxm_fields.NiciraExtended1('ct_label', 108, type_desc.Int16),
+    oxm_fields.NiciraExtended1('tun_ipv6_src', 109, type_desc.IPv6Addr),
+    oxm_fields.NiciraExtended1('tun_ipv6_dst', 110, type_desc.IPv6Addr),
 
     # The following definition is merely for testing 64-bit experimenter OXMs.
     # Following Open vSwitch, we use dp_hash for this purpose.
diff --git a/ryu/tests/unit/ofproto/test_parser_ofpmatch.py 
b/ryu/tests/unit/ofproto/test_parser_ofpmatch.py
index 3989f38..d4dba9e 100644
--- a/ryu/tests/unit/ofproto/test_parser_ofpmatch.py
+++ b/ryu/tests/unit/ofproto/test_parser_ofpmatch.py
@@ -200,6 +200,8 @@ def _add_tests():
         ('tun_ipv4_dst', IPv4),
         ('pkt_mark', Int4),
         ('conj_id', Int4),
+        ('tun_ipv6_src', IPv6),
+        ('tun_ipv6_dst', IPv6),
         ('_dp_hash', Int4),
         ('reg0', Int4),
         ('reg1', Int4),
-- 
1.8.3.1


------------------------------------------------------------------------------
Mobile security can be enabling, not merely restricting. Employees who
bring their own devices (BYOD) to work are irked by the imposition of MDM
restrictions. Mobile Device Manager Plus allows you to control only the
apps on BYO-devices by containerizing them, leaving personal data untouched!
https://ad.doubleclick.net/ddm/clk/304595813;131938128;j
_______________________________________________
Ryu-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/ryu-devel

Reply via email to