From patchwork Wed Oct 20 02:55:28 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Jiale, SongX" X-Patchwork-Id: 102329 Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 34591A0C45; Wed, 20 Oct 2021 04:41:40 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 222FF40683; Wed, 20 Oct 2021 04:41:40 +0200 (CEST) Received: from mga12.intel.com (mga12.intel.com [192.55.52.136]) by mails.dpdk.org (Postfix) with ESMTP id 7C1FF40142 for ; Wed, 20 Oct 2021 04:41:38 +0200 (CEST) X-IronPort-AV: E=McAfee;i="6200,9189,10142"; a="208779048" X-IronPort-AV: E=Sophos;i="5.87,165,1631602800"; d="scan'208";a="208779048" Received: from orsmga008.jf.intel.com ([10.7.209.65]) by fmsmga106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 19 Oct 2021 19:41:37 -0700 X-IronPort-AV: E=Sophos;i="5.87,165,1631602800"; d="scan'208";a="494406636" Received: from unknown (HELO dpdk-zhaohy-t.sh.intel.com) ([10.240.183.68]) by orsmga008-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 19 Oct 2021 19:41:35 -0700 From: Jiale Song To: dts@dpdk.org Cc: Jiale Song Date: Wed, 20 Oct 2021 10:55:28 +0800 Message-Id: <1634698528-112655-1-git-send-email-songx.jiale@intel.com> X-Mailer: git-send-email 1.8.3.1 Subject: [dts] [PATCH V2] tests/dcf_lifecycle: add a method to create and check acl rule X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org Sender: "dts" as the priority of switch rule becomes higher, some rules that support switch cannot be downloaded directly to acl. add a method to create and check acl rule. Signed-off-by: Jiale Song --- tests/TestSuite_dcf_lifecycle.py | 59 +++++++++++++++++++++++++++++++- 1 file changed, 58 insertions(+), 1 deletion(-) diff --git a/tests/TestSuite_dcf_lifecycle.py b/tests/TestSuite_dcf_lifecycle.py index d47ef2b1..310172af 100755 --- a/tests/TestSuite_dcf_lifecycle.py +++ b/tests/TestSuite_dcf_lifecycle.py @@ -315,6 +315,7 @@ class TestDcfLifeCycle(TestCase): "-c {core_mask} " "-n {mem_channel} " "{allowlist} " + "--log-level=ice,7 " "--file-prefix={prefix} " "-- -i ").format(**{ 'bin': ''.join(['./',self.vf_dcf_testpmd]), @@ -374,6 +375,7 @@ class TestDcfLifeCycle(TestCase): "-c {core_mask} " "-n {mem_channel} " "{allowlist} " + "--log-level=ice,7 " "--file-prefix={prefix} " "-- -i ").format(**{ 'bin': ''.join(['./',self.vf_testpmd2]), @@ -1020,6 +1022,60 @@ class TestDcfLifeCycle(TestCase): self.preset_pmd_res() self.vf_create() + def create_acl_filter_rule(self, rules, session_name="", check_stats=True): + """ + create acl filter rules + """ + if session_name == "": + session_name = self.dut + p = re.compile(r"Flow rule #(\d+) created") + rule_list = [] + acl_list = [] + switch_rule = "Succeeded to create (2) flow" + acl_rule = "Succeeded to create (4) flow" + if isinstance(rules, str): + rule_list.append(rules) + else: + rule_list = rules + for rule in rule_list: + # create rule is switch or acl + out1 = session_name.send_expect(rule, "testpmd> ") + if check_stats: + if switch_rule in out1: + switch_id = p.findall(out1)[0] + # crete acl_rule + out2 = session_name.send_expect(rule, "testpmd> ") + # destory switch rule + session_name.send_expect("flow destroy %s rule %s" % (0, switch_id), "testpmd> ") + rule_id = p.search(out2) + if rule_id: + acl_list.append(rule_id.group(1)) + else: + acl_list.append(False) + + elif acl_rule in out1: + rule_id = p.search(out1) + if rule_id: + acl_list.append(rule_id.group(1)) + else: + acl_list.append(False) + else: + self.verify(False, "some rules not created Successful, result %s, rule %s" % (acl_list, rule_list)) + + else: + if switch_rule in out1: + # crete acl_rule + out2 = session_name.send_expect(rule, "testpmd> ") + self.verify('Failed to create flow' in out2, + "some rules should created Failed, '%s'" % (rule)) + elif acl_rule in out1: + self.verify(False, "some rules should created Failed, '%s' " % (rule)) + + else: + self.verify(True, "some rules should created Failed, '%s' " % (rule)) + + return acl_list + def destroy_resource(self): try: self.vf_destroy() @@ -1232,7 +1288,8 @@ class TestDcfLifeCycle(TestCase): def pretest_handle_acl_filter(self): # Create an ACL rule, and send packet with dst mac of VF1, then it will dropped by VF1. rule = 'flow create 0 priority 0 ingress pattern eth / ipv4 / tcp src spec 8010 src mask 65520 / end actions drop / end' - self.d_con([rule, "testpmd> ", 15]) + # acl rule + self.create_acl_filter_rule(rule, check_stats=True) self.check_rule_list() self.send_pkt_to_vf1_first(self.dmac) out = self.vf_pmd2_con(['stop', "testpmd> ", 15])