Code Review
/
csit.git
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
review
|
tree
raw
|
inline
| side by side
CSIT-811 HC Test: BGP functional tests
[csit.git]
/
resources
/
libraries
/
python
/
SFC
/
VerifyPacket.py
diff --git
a/resources/libraries/python/SFC/VerifyPacket.py
b/resources/libraries/python/SFC/VerifyPacket.py
index
fd72bb2
..
90dfd37
100644
(file)
--- a/
resources/libraries/python/SFC/VerifyPacket.py
+++ b/
resources/libraries/python/SFC/VerifyPacket.py
@@
-20,11
+20,9
@@
import ipaddress
from scapy.layers.inet import IP, UDP
from scapy.all import Raw
from scapy.layers.inet import IP, UDP
from scapy.all import Raw
-from resources.libraries.python.constants import Constants as con
from resources.libraries.python.SFC.SFCConstants import SFCConstants as sfccon
from resources.libraries.python.SFC.TunnelProtocol import VxLAN, VxLANGPE, NSH
from resources.libraries.python.SFC.SFCConstants import SFCConstants as sfccon
from resources.libraries.python.SFC.TunnelProtocol import VxLAN, VxLANGPE, NSH
-from robot.api import logger
def valid_ipv4(ipaddr):
"""Check if IP address has the correct IPv4 address format.
def valid_ipv4(ipaddr):
"""Check if IP address has the correct IPv4 address format.
@@
-108,9
+106,13
@@
class VerifyPacket(object):
# get the NSH packet and check it
nsh_pkt = NSH(payload_data[8:32])
# get the NSH packet and check it
nsh_pkt = NSH(payload_data[8:32])
- if nsh_pkt.flags != sfccon.NSH_FLAGS:
- raise RuntimeError("Unexpected NSH flags: {0}".
- format(nsh_pkt.flags))
+ if nsh_pkt.Version != 0:
+ raise RuntimeError("Unexpected NSH version: {0}".
+ format(nsh_pkt.Version))
+
+ if nsh_pkt.OAM != 0 and nsh_pkt.OAM != 1:
+ raise RuntimeError("Unexpected NSH OAM: {0}".
+ format(nsh_pkt.OAM))
if nsh_pkt.length != sfccon.NSH_HEADER_LENGTH:
raise RuntimeError("NSH length {0} incorrect".
if nsh_pkt.length != sfccon.NSH_HEADER_LENGTH:
raise RuntimeError("NSH length {0} incorrect".
@@
-185,9
+187,9
@@
class VerifyPacket(object):
recv_pkt_len = len(ether)
if recv_pkt_len != expect_pkt_len:
recv_pkt_len = len(ether)
if recv_pkt_len != expect_pkt_len:
- raise RuntimeError("Received packet size {0} not "
\
- "the expect size {1}".format(recv_pkt_len,
\
- expect_pkt_len))
+ raise RuntimeError("Received packet size {0} not "
+ "the expect size {1}".format(recv_pkt_len,
+
expect_pkt_len))
if not ether.haslayer(IP):
raise RuntimeError("Not a IPv4 packet")
if not ether.haslayer(IP):
raise RuntimeError("Not a IPv4 packet")