add case
diff --git a/acctonUseDpctl/allow_all_ucast_route.py b/acctonUseDpctl/allow_all_ucast_route.py
index 14a6c56..d572c12 100755
--- a/acctonUseDpctl/allow_all_ucast_route.py
+++ b/acctonUseDpctl/allow_all_ucast_route.py
@@ -32,21 +32,29 @@
apply_dpctl_mod(self, config, "flow-mod table=10,cmd=add,prio=101 in_port="+str(input_port)+",vlan_vid=0x1000/0x1000 goto:20")
apply_dpctl_mod(self, config, "flow-mod table=20,cmd=add,prio=201 in_port="+str(input_port)+",eth_dst=00:00:00:11:33:55,eth_type=0x0800 goto:30")
- apply_dpctl_mod(self, config, "group-mod cmd=add,type=ind,group=0x20001 group=any,port=any,weight=0 output="+str(output_port))
- apply_dpctl_mod(self, config, "group-mod cmd=add,type=ind,group=0x20000001 group=any,port=any,weight=0 set_field=eth_src=00:00:04:22:33:55,set_field=eth_dst=00:00:04:22:44:66,set_field=vlan_vid=2,group=0x20001")
+ apply_dpctl_mod(self, config, "group-mod cmd=add,type=ind,group=0x2000"+str(output_port)+" group=any,port=any,weight=0 output="+str(output_port))
+ apply_dpctl_mod(self, config, "group-mod cmd=add,type=ind,group=0x20000001 group=any,port=any,weight=0 set_field=eth_src=00:00:04:22:33:55,set_field=eth_dst=00:00:04:22:44:66,set_field=vlan_vid=2,group=0x2000"+str(output_port))
apply_dpctl_mod(self, config, "flow-mod table=30,cmd=add,prio=301 eth_type=0x0800,ip_dst=192.168.2.2/255.255.255.0 write:group=0x20000001 goto:60")
- apply_dpctl_mod(self, config, "group-mod cmd=add,type=ind,group=0x30003 group=any,port=any,weight=0 pop_vlan,output="+str(input_port))
- apply_dpctl_mod(self, config, "flow-mod table=50,cmd=add,prio=501 vlan_vid=3,eth_dst=00:00:00:11:22:33 write:group=0x30003 goto:60")
+ apply_dpctl_mod(self, config, "group-mod cmd=add,type=ind,group=0x3000"+str(input_port)+" group=any,port=any,weight=0 pop_vlan,output="+str(input_port))
+ apply_dpctl_mod(self, config, "flow-mod table=50,cmd=add,prio=501 vlan_vid=3,eth_dst=00:00:00:11:22:33 write:group=0x3000"+str(input_port)+" goto:60")
- input_pkt = simple_tcp_packet(eth_dst="00:00:00:11:33:55",
- eth_src="00:00:00:11:22:33",
- ip_src=toIpV4Str(0xc0a80164),
- ip_dst=toIpV4Str(0xc0a80202))
+ input_pkt = simple_packet(
+ '00 00 00 11 33 55 00 00 00 11 22 33 81 00 00 03 '
+ '08 00 45 00 00 52 00 01 00 00 40 06 f5 ee c0 a8 '
+ '01 64 c0 a8 02 02 04 d2 00 50 00 00 00 00 00 00 '
+ '00 00 50 02 20 00 6c 46 00 00 44 44 44 44 44 44 '
+ '44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 '
+ '44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 '
+ '44 44 44 44')
- output_pkt = simple_tcp_packet(eth_dst="00:00:04:22:44:66",
- eth_src="00:00:04:22:33:55",
- ip_src=toIpV4Str(0xc0a80164),
- ip_dst=toIpV4Str(0xc0a80202))
+ output_pkt = simple_packet(
+ '00 00 04 22 44 66 00 00 04 22 33 55 81 00 00 02 '
+ '08 00 45 00 00 52 00 01 00 00 3f 06 f6 ee c0 a8 '
+ '01 64 c0 a8 02 02 04 d2 00 50 00 00 00 00 00 00 '
+ '00 00 50 02 20 00 6c 46 00 00 44 44 44 44 44 44 '
+ '44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 '
+ '44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 44 '
+ '44 44 44 44')
self.dataplane.send(input_port, str(input_pkt))
verify_packet(self, str(output_pkt), output_port)