blob: 65e7201965fda635eed5aee1142ab5fc739fa2e2 [file] [log] [blame]
"""These tests fall under Conformance Test-Suite (OF-SWITCH-1.0.0 TestCases).
Refer Documentation -- Detailed testing methodology
<Some of test-cases are directly taken from oftest> """
"Test Suite 3 --> Detailed Controller to switch messages"
import logging
import unittest
import random
from oftest import config
import oftest.controller as controller
import ofp
import oftest.dataplane as dataplane
import oftest.parse as parse
import oftest.base_tests as base_tests
from oftest.testutils import *
from time import sleep
from FuncUtils import *
class OverlapChecking(base_tests.SimpleDataPlane):
"""Verify that if overlap check flag is set in the flow entry and an overlapping flow is inserted then an error
is generated and switch refuses flow entry"""
def runTest(self):
logging.info("Running Overlap_Checking test")
of_ports = config["port_map"].keys()
of_ports.sort()
self.assertTrue(len(of_ports) > 1, "Not enough ports for test")
#Clear Switch State
delete_all_flows(self.controller)
logging.info("Inserting two overlapping flows")
logging.info("Expecting switch to return an error")
#Insert a flow F with wildcarded all fields
(pkt,match) = wildcard_all(self,of_ports)
#Verify flow is active
verify_tablestats(self,expect_active=1)
# Build a overlapping flow F'-- Wildcard All except ingress with check overlap bit set
pkt_matchingress = simple_tcp_packet()
match3 = parse.packet_to_flow_match(pkt_matchingress)
self.assertTrue(match3 is not None, "Could not generate flow match from pkt")
match3.wildcards = ofp.OFPFW_ALL-ofp.OFPFW_IN_PORT
match3.in_port = of_ports[0]
msg3 = ofp.message.flow_mod()
msg3.command = ofp.OFPFC_ADD
msg3.match = match3
msg3.flags |= ofp.OFPFF_CHECK_OVERLAP
msg3.cookie = random.randint(0,9007199254740992)
msg3.buffer_id = 0xffffffff
act3 = ofp.action.output()
act3.port = of_ports[1]
msg3.actions.append(act3)
self.controller.message_send(msg3)
do_barrier(self.controller)
# Verify Flow does not get inserted
verify_tablestats(self,expect_active=1)
#Verify OFPET_FLOW_MOD_FAILED/OFPFMFC_OVERLAP error is recieved on the control plane
(response, pkt) = self.controller.poll(exp_msg=ofp.OFPT_ERROR,
timeout=5)
self.assertTrue(response is not None,
'Switch did not reply with error message')
self.assertTrue(response.err_type==ofp.OFPET_FLOW_MOD_FAILED,
'Error message type is not flow mod failed ')
self.assertTrue(response.code==ofp.OFPFMFC_OVERLAP,
'Error Message code is not overlap')
class NoOverlapChecking(base_tests.SimpleDataPlane):
"""Verify that without overlap check flag set, overlapping flows can be created."""
def runTest(self):
logging.info("Running No_Overlap_Checking test")
of_ports = config["port_map"].keys()
of_ports.sort()
self.assertTrue(len(of_ports) > 1, "Not enough ports for test")
#Clear Switch State
delete_all_flows(self.controller)
logging.info("Inserting two overlapping flows")
logging.info("Expecting switch to insert the flows without generating errors")
#Build a flow F with wildcarded all fields.
(pkt,match) = wildcard_all(self,of_ports)
#Verify flow is active
verify_tablestats(self,expect_active=1)
# Build a overlapping flow F' without check overlap bit set.
wildcard_all_except_ingress(self,of_ports)
# Verify Flow gets inserted
verify_tablestats(self,expect_active=2)
class IdenticalFlows(base_tests.SimpleDataPlane):
"""Verify that adding two identical flows overwrites the existing one and clears counters"""
def runTest(self):
logging.info("Running Identical_Flows test ")
of_ports = config["port_map"].keys()
of_ports.sort()
self.assertTrue(len(of_ports) > 1, "Not enough ports for test")
#Clear switch state
delete_all_flows(self.controller)
logging.info("Inserting two identical flows one by one")
logging.info("Expecting switch to overwrite the first flow and clear the counters associated with it ")
# Create and add flow-1, check on dataplane it is active.
(pkt,match) = wildcard_all(self,of_ports)
# Verify active_entries in table_stats_request =1
verify_tablestats(self,expect_active=1)
# Send Packet (to increment counters like byte_count and packet_count)
send_packet(self,pkt,of_ports[0],of_ports[1])
# Verify Flow counters have incremented
verify_flow_stats(self, match, pkts=1, bytes=len(str(pkt)))
#Send Identical flow
(pkt1,match1) = wildcard_all(self,of_ports)
# Verify active_entries in table_stats_request =1
verify_tablestats(self,expect_active=1)
# Verify Flow counters reset
verify_flow_stats(self, match, pkts=0, bytes=0)
class EmerFlowTimeout(base_tests.SimpleProtocol):
"""Timeout values are not allowed for emergency flows"""
def runTest(self):
logging.info("Running Emergency_Flow_Timeout test")
of_ports = config["port_map"].keys()
of_ports.sort()
self.assertTrue(len(of_ports) > 1, "Not enough ports for test")
#Clear switch state
delete_all_flows(self.controller)
logging.info("Inserting an emergency flow with timeout values")
logging.info("Expecting switch to generate error ")
#Insert an emergency flow
pkt = simple_tcp_packet()
match = parse.packet_to_flow_match(pkt)
match.in_port = of_ports[0]
request = ofp.message.flow_mod()
request.match = match
request.command = ofp.OFPFC_ADD
request.flags = request.flags|ofp.OFPFF_EMERG
request.hard_timeout =9
request.idle_timeout =9
act = ofp.action.output()
act.port = of_ports[1]
request.actions.append(act)
logging.info("Inserting flow")
self.controller.message_send(request)
do_barrier(self.controller)
#Verify OFPET_FLOW_MOD_FAILED/OFPFMFC_OVERLAP error is recieved on the control plane
(response, pkt) = self.controller.poll(exp_msg=ofp.OFPT_ERROR,
timeout=5)
self.assertTrue(response is not None,
'Switch did not reply with error message')
self.assertTrue(response.err_type==ofp.OFPET_FLOW_MOD_FAILED,
'Error message type is not flow mod failed ')
self.assertTrue(response.code==ofp.OFPFMFC_BAD_EMERG_TIMEOUT,
'Error Message code is not bad emergency timeout')
class MissingModifyAdd(base_tests.SimpleDataPlane):
"""If a modify does not match an existing flow, the flow gets added """
def runTest(self):
logging.info("Running Missing_Modify_Add test")
of_ports = config["port_map"].keys()
of_ports.sort()
self.assertTrue(len(of_ports) > 1, "Not enough ports for test")
logging.info("Inserting a flow-modify that does not match an existing flow")
logging.info("Expecting flow to get added i.e OFPFC_MODIFY command should be taken as OFPFC_ADD ")
#Clear Switch State
delete_all_flows(self.controller)
#Generate a flow-mod,command OFPC_MODIFY
request = ofp.message.flow_mod()
request.command = ofp.OFPFC_MODIFY
request.match.wildcards = ofp.OFPFW_ALL-ofp.OFPFW_IN_PORT
request.match.in_port = of_ports[0]
request.cookie = random.randint(0,9007199254740992)
request.buffer_id = 0xffffffff
act3 = ofp.action.output()
act3.port = of_ports[1]
request.actions.append(act3)
logging.info("Inserting flow")
self.controller.message_send(request)
do_barrier(self.controller)
#Verify the flow gets added i.e. active_count= 1
verify_tablestats(self,expect_active=1)
class ModifyAction(base_tests.SimpleDataPlane):
"""A modified flow preserves counters"""
def runTest(self):
logging.info("Running Modify_Action test ")
of_ports = config["port_map"].keys()
of_ports.sort()
self.assertTrue(len(of_ports) > 1, "Not enough ports for test")
#Clear switch state
delete_all_flows(self.controller)
logging.info("Inserting a Flow and incrementing flow counters. Modifying the flow action")
logging.info("Expecting the flow action to be modified , but the flow-counters should be preserved")
#Create and add flow-1 Match on all, except one wildcarded (src adddress).Action A , output to of_port[1]
(pkt,match) = match_all_except_source_address(self,of_ports)
#Send Packet matching the flow thus incrementing counters like packet_count,byte_count
send_packet(self,pkt,of_ports[0],of_ports[1])
#Verify flow counters
verify_flow_stats(self, match, pkts=1, bytes=len(str(pkt)))
#Modify flow- 1
modify_flow_action(self,of_ports,match)
# Send Packet matching the flow-1 i.e ingress_port=port[0] and verify it is recieved on corret dataplane port i.e port[2]
send_packet(self,pkt,of_ports[0],of_ports[2])
#Verify flow counters are preserved
verify_flow_stats(self, match, pkts=2, bytes=len(str(pkt))*2)
class StrictModifyAction(base_tests.SimpleDataPlane):
"""Strict Modify Flow also changes action preserves counters"""
def runTest(self):
logging.info("Running Strict_Modify_Action test")
of_ports = config["port_map"].keys()
of_ports.sort()
self.assertTrue(len(of_ports) > 1, "Not enough ports for test")
#Clear switch state
delete_all_flows(self.controller)
logging.info("Inserting Flows and incrementing flow counters. Strict Modify the flow action ")
logging.info("Expecting the flow action to be modified , but the flow-counters should be preserved")
#Create and add flow-1 Match on all, except one wildcarded (src adddress).Action A
(pkt,match) = match_all_except_source_address(self,of_ports,priority=100)
#Create and add flow-2 , Match on ingress_port only, Action A
(pkt1,match1) = wildcard_all_except_ingress(self,of_ports,priority=10)
# Verify both the flows are active
verify_tablestats(self,expect_active=2)
#Send a packet matching the flows, thus incrementing flow-counters (packet matches the flow F-1 with higher priority)
send_packet(self,pkt,of_ports[0],of_ports[1])
# Verify flow counters of the flow-1
verify_flow_stats(self, match, pkts=1, bytes=len(str(pkt)))
# Strict-Modify flow- 1
strict_modify_flow_action(self,of_ports[2],match,priority=100)
# Send Packet matching the flow-1 i.e ingress_port=port[0] and verify it is recieved on corret dataplane port i.e port[2]
send_packet(self,pkt,of_ports[0],of_ports[2])
# Verify flow counters are preserved
verify_flow_stats(self, match, pkts=2, bytes=2*len(str(pkt)))
class DeleteNonexistingFlow(base_tests.SimpleDataPlane):
"""Request deletion of non-existing flow"""
def runTest(self):
logging.info("Delete_NonExisting_Flow test begins")
of_ports = config["port_map"].keys()
of_ports.sort()
self.assertTrue(len(of_ports) > 1, "Not enough ports for test")
#Clear switch state
delete_all_flows(self.controller)
logging.info("Deleting a non-existing flow")
logging.info("Expecting switch to ignore the command , without generating errors")
# Issue a delete command
msg = ofp.message.flow_mod()
msg.match.wildcards = ofp.OFPFW_ALL
msg.out_port = ofp.OFPP_NONE
msg.command = ofp.OFPFC_DELETE
msg.buffer_id = 0xffffffff
# Verify no message or error is generated by polling the the control plane
(response, pkt) = self.controller.poll(exp_msg=ofp.OFPT_ERROR,
timeout=2)
self.assertTrue(response is None,
'Recieved Error for deleting non-exiting flow ')
class SendFlowRem(base_tests.SimpleDataPlane):
"""Check deletion of flows happens and generates messages as configured.
If Send Flow removed message Flag is set in the flow entry, the flow deletion of that respective flow should generate the flow removed message,
vice versa also exists """
def runTest(self):
logging.info("Running Send_Flow_Rem test ")
of_ports = config["port_map"].keys()
of_ports.sort()
self.assertTrue(len(of_ports) > 1, "Not enough ports for test")
#Clear swicth state
delete_all_flows(self.controller)
logging.info("Inserting flows F1 and F2 without and with send_flow_removed_message flag set ")
logging.info("Deleting the flows")
logging.info("Expecting flow removed message only for F2")
# Insert flow-1 with F without OFPFF_SEND_FLOW_REM flag set.
(pkt,match) = wildcard_all_except_ingress(self,of_ports)
# Verify flow is inserted
verify_tablestats(self,expect_active=1)
#Delete the flow-1
nonstrict_delete(self,match,priority=0)
# Verify no flow removed message is generated for the FLOW-1
(response1, pkt1) = self.controller.poll(exp_msg=ofp.OFPT_FLOW_REMOVED,
timeout=2)
self.assertTrue(response1 is None,
'Received flow removed message for the flow with flow_rem flag not set')
# Insert another flow F' with OFPFF_SEND_FLOW_REM flag set.
msg9 = ofp.message.flow_mod()
msg9.match.wildcards = ofp.OFPFW_ALL
msg9.cookie = random.randint(0,9007199254740992)
msg9.buffer_id = 0xffffffff
msg9.idle_timeout = 1
msg9.flags |= ofp.OFPFF_SEND_FLOW_REM
rv1 = self.controller.message_send(msg9)
self.assertTrue(rv1 != -1, "Error installing flow mod")
do_barrier(self.controller)
# Delete the flow-2
delete_all_flows(self.controller)
# Verify flow removed message is generated for the FLOW-2
(response2, pkt2) = self.controller.poll(exp_msg=ofp.OFPT_FLOW_REMOVED,
timeout=2)
self.assertTrue(response2 is not None,
'Did not receive flow removed message for this flow')
class DeleteEmerFlow(base_tests.SimpleProtocol):
"""Delete emergency flow and verify no message is generated.An emergency flow deletion will not generate flow-removed messages even if
Send Flow removed message flag was set during the emergency flow entry"""
def runTest(self):
logging.info("Running Delete_Emer_Flow")
of_ports = config["port_map"].keys()
of_ports.sort()
#Clear switch state
delete_all_flows(self.controller)
logging.info("Inserting a emergency flow with send_flow_removed flag set")
logging.info("Expecting no flow_removed_message on the deletion of the emergency flow")
# Insert a flow with emergency bit set.
pkt = simple_tcp_packet()
match = parse.packet_to_flow_match(pkt)
match.in_port = of_ports[0]
request = ofp.message.flow_mod()
request.match = match
request.command = ofp.OFPFC_ADD
request.flags = request.flags|ofp.OFPFF_EMERG|ofp.OFPFF_SEND_FLOW_REM
act = ofp.action.output()
act.port = of_ports[1]
request.actions.append(act)
self.controller.message_send(request)
# Delete the emergency flow
nonstrict_delete(self,match)
(response, pkt) = self.controller.poll(exp_msg=ofp.OFPFF_SEND_FLOW_REM ,
timeout=2)
self.assertTrue(response is None,
'Test Failed ')
class StrictVsNonstrict(base_tests.SimpleDataPlane):
"""Delete and verify strict and non-strict behaviors
This test compares the behavior of delete strict and non-strict"""
def runTest(self):
logging.info("Strict_Vs_Nonstrict test begins")
of_ports = config["port_map"].keys()
of_ports.sort()
self.assertTrue(len(of_ports) > 1, "Not enough ports for test")
#Clear switch state
delete_all_flows(self.controller)
logging.info("Inserting a flow with exact match")
logging.info("Issue Strict Delete command , verify it gets deleted")
#Insert F with an exact Match
(pkt,match) = exact_match(self,of_ports)
verify_tablestats(self,expect_active=1)
#Issue Strict Delete Command , verify F gets deleted.
strict_delete(self,match)
verify_tablestats(self,expect_active=0)
logging.info("Inserting two overlapping flows")
logging.info("Issue Strict Delete command ")
logging.info("Expecting only one flow gets deleted , because Strict Delete matches on wildcards as well")
#Insert Flow T with match on all , except one wildcarded ( say src adddress ).
(pkt,match) = match_all_except_source_address(self,of_ports)
#Insert another flow T' with match on ingress_port , wildcarded rest.
(pkt1,match1) = wildcard_all_except_ingress(self,of_ports)
verify_tablestats(self,expect_active=2)
#Issue Strict Delete matching on ingress_port. Verify only T' gets deleted
strict_delete(self,match1)
verify_tablestats(self,expect_active=1)
logging.info("Inserting two overlapping flows")
logging.info("Issue Non-Strict Delete command ")
logging.info("Expecting both the flow gets deleted , because wildcards are active")
#Insert T and T' again .
(pkt,match) = match_all_except_source_address(self,of_ports)
(pkt1,match1) = wildcard_all_except_ingress(self,of_ports)
verify_tablestats(self,expect_active=2)
#Issue Non-strict Delete with match on ingress_port.Verify T+T' gets deleted .
nonstrict_delete(self,match1)
verify_tablestats(self,expect_active=0)
logging.info("Inserting three overlapping flows with different priorities")
logging.info("Issue Non-Strict Delete command ")
logging.info("Expecting all the flows to get deleted")
#Insert T , add Priority P (say 100 )
(pkt,match) = match_all_except_source_address(self,of_ports,priority=100)
#Insert T' add priority (200).
(pkt1,match1) = wildcard_all_except_ingress(self,of_ports,priority=200)
#Insert T' again add priority 300 --> T" .
(pkt2,match2) = wildcard_all_except_ingress(self,of_ports,priority=300)
verify_tablestats(self,expect_active=3)
#Issue Non-Strict Delete and verify all getting deleted
nonstrict_delete(self,match1,priority=200)
verify_tablestats(self,expect_active=0)
logging.info("Inserting three overlapping flows with different priorities")
logging.info("Issue Strict Delete command ")
logging.info("Expecting only one to get deleted because here priorities & wildcards are being matched")
#Issue Strict-Delete and verify only T'' gets deleted.
(pkt,match) = match_all_except_source_address(self,of_ports,priority=100)
(pkt1,match1) = wildcard_all_except_ingress(self,of_ports,priority=200)
(pkt2,match2) = wildcard_all_except_ingress(self,of_ports,priority=300)
strict_delete(self,match1,priority=200)
verify_tablestats(self,expect_active=2)
class Outport1(base_tests.SimpleDataPlane):
"""Delete flows filtered by action outport.If the out_port field in the delete command contains a value other than OFPP_NONE,
it introduces a constraint when matching. This constraint is that the rule must contain an output action directed at that port."""
def runTest(self):
logging.info("Outport1 test begins")
of_ports = config["port_map"].keys()
of_ports.sort()
self.assertTrue(len(of_ports) > 1, "Not enough ports for test")
#Clear switch state
delete_all_flows(self.controller)
logging.info("Inserting a flow with output action --> of_port[1]")
logging.info("Deleting the flow but with out_port set to of_port[2]")
logging.info("Expecting switch to filter the delete command")
#Build and send Flow-1 with action output to of_port[1]
(pkt,match) = wildcard_all_except_ingress(self,of_ports)
# Verify active_entries in table_stats_request = 1
verify_tablestats(self,expect_active=1)
#Send delete command matching the flow-1 but with contraint out_port = of_port[2]
msg7 = ofp.message.flow_mod()
msg7.out_port = of_ports[2]
msg7.command = ofp.OFPFC_DELETE
msg7.buffer_id = 0xffffffff
msg7.match = match
self.controller.message_send(msg7)
do_barrier(self.controller)
# Verify flow will not get deleted, active_entries in table_stats_request = 1
verify_tablestats(self,expect_active=1)
logging.info("Deleting the flow with out_port set to of_port[1]")
logging.info("Expecting switch to delete the flow")
#Send Delete command with contraint out_port = of_ports[1]
msg7 = ofp.message.flow_mod()
msg7.out_port = of_ports[1]
msg7.command = ofp.OFPFC_DELETE
msg7.buffer_id = 0xffffffff
msg7.match = match
self.controller.message_send(msg7)
do_barrier(self.controller)
#Verify flow gets deleted.
verify_tablestats(self,expect_active=0)
class IdleTimeout(base_tests.SimpleDataPlane):
""" Verify that idle timeout is implemented"""
def runTest(self):
logging.info("Running Idle_Timeout test ")
of_ports = config["port_map"].keys()
of_ports.sort()
self.assertTrue(len(of_ports) > 1, "Not enough ports for test")
#Clear switch state
delete_all_flows(self.controller)
logging.info("Inserting flow entry with idle_timeout set. Also send_flow_removed_message flag set")
logging.info("Expecting the flow entry to delete with given idle_timeout")
#Insert a flow entry with idle_timeout=1.Send_Flow_Rem flag set
msg9 = ofp.message.flow_mod()
msg9.match.wildcards = ofp.OFPFW_ALL
msg9.cookie = random.randint(0,9007199254740992)
msg9.buffer_id = 0xffffffff
msg9.idle_timeout = 1
msg9.flags |= ofp.OFPFF_SEND_FLOW_REM
rv1 = self.controller.message_send(msg9)
self.assertTrue(rv1 != -1, "Error installing flow mod")
do_barrier(self.controller)
#Verify flow gets inserted
verify_tablestats(self,expect_active=1)
# Verify flow removed message is recieved.
(response, pkt) = self.controller.poll(exp_msg=ofp.OFPT_FLOW_REMOVED,
timeout=5)
self.assertTrue(response is not None,
'Did not receive flow removed message ')
self.assertEqual(ofp.OFPRR_IDLE_TIMEOUT, response.reason,
'Flow table entry removal reason is not idle_timeout')
self.assertEqual(1, response.duration_sec,
'Flow was not alive for 1 sec')
class Outport2(base_tests.SimpleDataPlane):
"""Add, modify flows with outport set. This field is ignored by ADD, MODIFY, and MODIFY STRICT messages."""
def runTest(self):
logging.info("Running Outport2 test ")
of_ports = config["port_map"].keys()
of_ports.sort()
self.assertTrue(len(of_ports) > 1, "Not enough ports for test")
#Clear switch state
delete_all_flows(self.controller)
logging.info("Adding and modifying flow with out_port fields set")
logging.info("Expecting switch to ignore out_port")
# Create and add flow-1,Action A ,output to port of_port[1], out_port set to of_ports[2]
(pkt,match) = wildcard_all_except_ingress(self,of_ports)
# Verify flow is active
verify_tablestats(self,expect_active=1)
# Send Packet matching the flow
send_packet(self,pkt,of_ports[0],of_ports[1])
# Insert Flow-Modify matching flow F-1 ,action A', output to port[2], out_port set to port[3]
modify_flow_action(self,of_ports,match)
# Again verify active_entries in table_stats_request =1
verify_tablestats(self,expect_active=1)
#Verify action is modified
send_packet(self,pkt,of_ports[0],of_ports[2])
class HardTimeout(base_tests.SimpleDataPlane):
""" Verify that hard timeout is implemented """
def runTest(self):
logging.info("Running Hard_Timeout test ")
of_ports = config["port_map"].keys()
of_ports.sort()
self.assertTrue(len(of_ports) > 1, "Not enough ports for test")
#Clear switch state
delete_all_flows(self.controller)
logging.info("Inserting flow entry with hard_timeout set. Also send_flow_removed_message flag set")
logging.info("Expecting the flow entry to delete with given hard_timeout")
# Insert a flow entry with hardtimeout=1 and send_flow_removed flag set
msg9 = ofp.message.flow_mod()
msg9.match.wildcards = ofp.OFPFW_ALL
msg9.cookie = random.randint(0,9007199254740992)
msg9.buffer_id = 0xffffffff
msg9.hard_timeout = 1
msg9.flags |= ofp.OFPFF_SEND_FLOW_REM
rv1 = self.controller.message_send(msg9)
self.assertTrue(rv1 != -1, "Error installing flow mod")
do_barrier(self.controller)
#Verify flow gets inserted
verify_tablestats(self,expect_active=1)
# Verify flow removed message is recieved.
(response, pkt) = self.controller.poll(exp_msg=ofp.OFPT_FLOW_REMOVED,
timeout=5)
self.assertTrue(response is not None,
'Did not receive flow removed message ')
self.assertEqual(ofp.OFPRR_HARD_TIMEOUT, response.reason,
'Flow table entry removal reason is not hard_timeout')
self.assertEqual(1, response.duration_sec,
'Flow was not alive for 1 sec')
class FlowTimeout(base_tests.SimpleDataPlane):
"""Verify that Flow removed messages are generated as expected
Flow removed messages being generated when flag is set, is already tested in the above tests
So here, we test the vice-versa condition"""
def runTest(self):
logging.info("Running Flow_Timeout test ")
of_ports = config["port_map"].keys()
of_ports.sort()
self.assertTrue(len(of_ports) > 1, "Not enough ports for test")
#Clear switch state
delete_all_flows(self.controller)
logging.info("Inserting flow entry with hard_timeout set and send_flow_removed_message flag not set")
logging.info("Expecting the flow entry to delete, but no flow removed message")
# Insert a flow with hard_timeout = 1 but no Send_Flow_Rem flag set
pkt = simple_tcp_packet()
match3 = parse.packet_to_flow_match(pkt)
self.assertTrue(match3 is not None, "Could not generate flow match from pkt")
match3.wildcards = ofp.OFPFW_ALL-ofp.OFPFW_IN_PORT
match3.in_port = of_ports[0]
msg3 = ofp.message.flow_mod()
msg3.out_port = of_ports[2] # ignored by flow add,flow modify
msg3.command = ofp.OFPFC_ADD
msg3.cookie = random.randint(0,9007199254740992)
msg3.buffer_id = 0xffffffff
msg3.hard_timeout = 1
msg3.buffer_id = 0xffffffff
msg3.match = match3
act3 = ofp.action.output()
act3.port = of_ports[1]
msg3.actions.append(act3)
self.controller.message_send(msg3)
do_barrier(self.controller)
#Verify no flow removed message is generated
(response, pkt) = self.controller.poll(exp_msg=ofp.OFPT_FLOW_REMOVED,
timeout=3)
self.assertTrue(response is None,
'Recieved flow removed message ')
# Verify no entries in the table
verify_tablestats(self,expect_active=0)