aboutsummaryrefslogtreecommitdiffstats
path: root/resources/libraries
diff options
context:
space:
mode:
Diffstat (limited to 'resources/libraries')
-rw-r--r--resources/libraries/python/Classify.py347
-rw-r--r--resources/libraries/python/PapiExecutor.py2
-rw-r--r--resources/libraries/python/Policer.py725
-rw-r--r--resources/libraries/robot/features/policer.robot122
-rw-r--r--resources/libraries/robot/shared/default.robot2
-rw-r--r--resources/libraries/robot/shared/test_teardown.robot7
-rw-r--r--resources/libraries/robot/shared/traffic.robot1
7 files changed, 370 insertions, 836 deletions
diff --git a/resources/libraries/python/Classify.py b/resources/libraries/python/Classify.py
index 6f05a6157d..6d4b84c1cc 100644
--- a/resources/libraries/python/Classify.py
+++ b/resources/libraries/python/Classify.py
@@ -20,6 +20,7 @@ from ipaddress import ip_address
from robot.api import logger
+from resources.libraries.python.Constants import Constants
from resources.libraries.python.topology import Topology
from resources.libraries.python.PapiExecutor import PapiSocketExecutor
@@ -40,16 +41,10 @@ class Classify(object):
:returns MAC ACL mask in hexstring format.
:rtype: str
"""
- if ether_type:
- end = 28
- elif src_mac:
- end = 24
- else:
- end = 12
return ('{!s:0>12}{!s:0>12}{!s:0>4}'.format(
dst_mac.replace(':', ''), src_mac.replace(':', ''),
- ether_type))[0:end]
+ ether_type)).decode('hex').rstrip('\0')
@staticmethod
def _build_ip_mask(proto='', src_ip='', dst_ip='', src_port='',
@@ -69,19 +64,10 @@ class Classify(object):
:returns: IP mask in hexstring format.
:rtype: str
"""
- if dst_port:
- end = 48
- elif src_port:
- end = 44
- elif dst_ip:
- end = 40
- elif src_ip:
- end = 32
- else:
- end = 20
return ('{!s:0>20}{!s:0>12}{!s:0>8}{!s:0>4}{!s:0>4}'.format(
- proto, src_ip, dst_ip, src_port, dst_port))[0:end]
+ proto, src_ip, dst_ip, src_port, dst_port)).decode('hex').\
+ rstrip('\0')
@staticmethod
def _build_ip6_mask(next_hdr='', src_ip='', dst_ip='', src_port='',
@@ -101,19 +87,10 @@ class Classify(object):
:returns: IPv6 ACL mask in hexstring format.
:rtype: str
"""
- if dst_port:
- end = 88
- elif src_port:
- end = 84
- elif dst_ip:
- end = 80
- elif src_ip:
- end = 48
- else:
- end = 14
return ('{!s:0>14}{!s:0>34}{!s:0>32}{!s:0>4}{!s:0>4}'.format(
- next_hdr, src_ip, dst_ip, src_port, dst_port))[0:end]
+ next_hdr, src_ip, dst_ip, src_port, dst_port)).decode('hex').\
+ rstrip('\0')
@staticmethod
def _build_mac_match(dst_mac='', src_mac='', ether_type=''):
@@ -128,24 +105,18 @@ class Classify(object):
:returns: MAC ACL match data in hexstring format.
:rtype: str
"""
- if ether_type:
- end = 28
- elif src_mac:
- end = 24
- else:
- end = 12
return ('{!s:0>12}{!s:0>12}{!s:0>4}'.format(
dst_mac.replace(':', ''), src_mac.replace(':', ''),
- ether_type))[0:end]
+ ether_type)).decode('hex').rstrip('\0')
@staticmethod
def _build_ip_match(proto=0, src_ip='', dst_ip='', src_port=0, dst_port=0):
- """Build IP ACL match data in hexstring format.
+ """Build IP ACL match data in byte-string format.
:param proto: Protocol number with valid option "x".
- :param src_ip: Source ip address with format of "x.x.x.x".
- :param dst_ip: Destination ip address with format of "x.x.x.x".
+ :param src_ip: Source ip address in packed format.
+ :param dst_ip: Destination ip address in packed format.
:param src_port: Source port number "x".
:param dst_port: Destination port number "x".
:type proto: int
@@ -153,37 +124,22 @@ class Classify(object):
:type dst_ip: str
:type src_port: int
:type dst_port: int
- :returns: IP ACL match data in hexstring format.
+ :returns: IP ACL match data in byte-string format.
:rtype: str
"""
- if src_ip:
- src_ip = binascii.hexlify(ip_address(unicode(src_ip)).packed)
- if dst_ip:
- dst_ip = binascii.hexlify(ip_address(unicode(dst_ip)).packed)
- if dst_port:
- end = 48
- elif src_port:
- end = 44
- elif dst_ip:
- end = 40
- elif src_ip:
- end = 32
- else:
- end = 20
return ('{!s:0>20}{!s:0>12}{!s:0>8}{!s:0>4}{!s:0>4}'.format(
hex(proto)[2:], src_ip, dst_ip, hex(src_port)[2:],
- hex(dst_port)[2:]))[0:end]
+ hex(dst_port)[2:])).decode('hex').rstrip('\0')
@staticmethod
def _build_ip6_match(next_hdr=0, src_ip='', dst_ip='', src_port=0,
dst_port=0):
- """Build IPv6 ACL match data in hexstring format.
+ """Build IPv6 ACL match data in byte-string format.
:param next_hdr: Next header number with valid option "x".
- :param src_ip: Source ip6 address with format of "xxxx:xxxx::xxxx".
- :param dst_ip: Destination ip6 address with format of
- "xxxx:xxxx::xxxx".
+ :param src_ip: Source ip6 address in packed format.
+ :param dst_ip: Destination ip6 address in packed format.
:param src_port: Source port number "x".
:param dst_port: Destination port number "x".
:type next_hdr: int
@@ -191,52 +147,36 @@ class Classify(object):
:type dst_ip: str
:type src_port: int
:type dst_port: int
- :returns: IPv6 ACL match data in hexstring format.
+ :returns: IPv6 ACL match data in byte-string format.
:rtype: str
"""
- if src_ip:
- src_ip = binascii.hexlify(ip_address(unicode(src_ip)).packed)
- if dst_ip:
- dst_ip = binascii.hexlify(ip_address(unicode(dst_ip)).packed)
- if dst_port:
- end = 88
- elif src_port:
- end = 84
- elif dst_ip:
- end = 80
- elif src_ip:
- end = 48
- else:
- end = 14
return ('{!s:0>14}{!s:0>34}{!s:0>32}{!s:0>4}{!s:0>4}'.format(
hex(next_hdr)[2:], src_ip, dst_ip, hex(src_port)[2:],
- hex(dst_port)[2:]))[0:end]
+ hex(dst_port)[2:])).decode('hex').rstrip('\0')
@staticmethod
- def _classify_add_del_table(node, is_add, mask, match_n_vectors=1,
- table_index=0xFFFFFFFF, nbuckets=2,
- memory_size=2097152, skip_n_vectors=0,
- next_table_index=0xFFFFFFFF,
- miss_next_index=0xFFFFFFFF, current_data_flag=0,
- current_data_offset=0):
+ def _classify_add_del_table(
+ node, is_add, mask, match_n_vectors=Constants.BITWISE_NON_ZERO,
+ table_index=Constants.BITWISE_NON_ZERO, nbuckets=2,
+ memory_size=2097152, skip_n_vectors=Constants.BITWISE_NON_ZERO,
+ next_table_index=Constants.BITWISE_NON_ZERO,
+ miss_next_index=Constants.BITWISE_NON_ZERO,
+ current_data_flag=0, current_data_offset=0):
"""Add or delete a classify table.
:param node: VPP node to create classify table.
:param is_add: If 1 the table is added, if 0 the table is deleted.
:param mask: ACL mask in hexstring format.
- :param match_n_vectors: Number of vectors to match (Default value = 1).
- :param table_index: Index of the classify table.
- (Default value = 0xFFFFFFFF)
+ :param match_n_vectors: Number of vectors to match (Default value = ~0).
+ :param table_index: Index of the classify table. (Default value = ~0)
:param nbuckets: Number of buckets when adding a table.
(Default value = 2)
:param memory_size: Memory size when adding a table.
(Default value = 2097152)
- :param skip_n_vectors: Number of skip vectors (Default value = 0).
- :param next_table_index: Index of next table.
- (Default value = 0xFFFFFFFF)
- :param miss_next_index: Index of miss table.
- (Default value = 0xFFFFFFFF)
+ :param skip_n_vectors: Number of skip vectors (Default value = ~0).
+ :param next_table_index: Index of next table. (Default value = ~0)
+ :param miss_next_index: Index of miss table. (Default value = ~0)
:param current_data_flag: Option to use current node's packet payload
as the starting point from where packets are classified.
This option is only valid for L2/L3 input ACL for now.
@@ -267,9 +207,7 @@ class Classify(object):
match_n: Number of match vectors.
:rtype: tuple(int, int, int)
"""
- mask_len = ((len(mask) - 1) / 16 + 1) * 16
- mask = mask + '\0' * (mask_len - len(mask))
-
+ cmd = 'classify_add_del_table'
args = dict(
is_add=is_add,
table_index=table_index,
@@ -281,11 +219,9 @@ class Classify(object):
miss_next_index=miss_next_index,
current_data_flag=current_data_flag,
current_data_offset=current_data_offset,
- mask_len=mask_len,
+ mask_len=len(mask),
mask=mask
)
-
- cmd = 'classify_add_del_table'
err_msg = "Failed to create a classify table on host {host}".format(
host=node['host'])
@@ -296,10 +232,11 @@ class Classify(object):
int(reply["match_n_vectors"])
@staticmethod
- def _classify_add_del_session(node, is_add, table_index, match,
- opaque_index=0xFFFFFFFF,
- hit_next_index=0xFFFFFFFF, advance=0,
- action=0, metadata=0):
+ def _classify_add_del_session(
+ node, is_add, table_index, match,
+ opaque_index=Constants.BITWISE_NON_ZERO,
+ hit_next_index=Constants.BITWISE_NON_ZERO, advance=0,
+ action=0, metadata=0):
"""Add or delete a classify session.
:param node: VPP node to create classify session.
@@ -309,9 +246,9 @@ class Classify(object):
include bytes in front with length of skip_n_vectors of target table
times sizeof (u32x4) (values of those bytes will be ignored).
:param opaque_index: For add, opaque_index of new session.
- (Default value = 0xFFFFFFFF)
+ (Default value = ~0)
:param hit_next_index: For add, hit_next_index of new session.
- (Default value = 0xFFFFFFFF)
+ (Default value = ~0)
:param advance: For add, advance value for session. (Default value = 0)
:param action: 0: No action (by default) metadata is not used.
1: Classified IP packets will be looked up from the specified ipv4
@@ -337,9 +274,7 @@ class Classify(object):
:type action: int
:type metadata: int
"""
-
- match_len = ((len(match) - 1) / 16 + 1) * 16
- match = match + '\0' * (match_len - len(match))
+ cmd = 'classify_add_del_session'
args = dict(
is_add=is_add,
table_index=table_index,
@@ -348,10 +283,9 @@ class Classify(object):
advance=advance,
action=action,
metadata=metadata,
- match_len=match_len,
+ match_len=len(match),
match=match
)
- cmd = 'classify_add_del_session'
err_msg = "Failed to create a classify session on host {host}".format(
host=node['host'])
@@ -438,18 +372,18 @@ class Classify(object):
papi_exec.add(cmd, **args).get_reply(err_msg)
@staticmethod
- def vpp_creates_classify_table_l3(node, ip_version, direction, ip_addr):
+ def vpp_creates_classify_table_l3(node, ip_version, direction, netmask):
"""Create classify table for IP address filtering.
:param node: VPP node to create classify table.
:param ip_version: Version of IP protocol.
:param direction: Direction of traffic - src/dst.
- :param ip_addr: IPv4 or Ipv6 (depending on the parameter 'ip_version')
- address.
+ :param netmask: IPv4 or Ipv6 (depending on the parameter 'ip_version')
+ netmask (decimal, e.g. 255.255.255.255).
:type node: dict
:type ip_version: str
:type direction: str
- :type ip_addr: str
+ :type netmask: str
:returns: (table_index, skip_n, match_n)
table_index: Classify table index.
skip_n: Number of skip vectors.
@@ -462,181 +396,114 @@ class Classify(object):
ip4=Classify._build_ip_mask,
ip6=Classify._build_ip6_mask
)
+
if ip_version == "ip4" or ip_version == "ip6":
- ip_addr = binascii.hexlify(ip_address(unicode(ip_addr)).packed)
+ netmask = binascii.hexlify(ip_address(unicode(netmask)).packed)
else:
- raise ValueError("IP version {ver} is not supported.".
- format(ver=ip_version))
+ raise ValueError("IP version {ver} is not supported.".format(
+ ver=ip_version))
if direction == "src":
- mask = mask_f[ip_version](src_ip=ip_addr)
+ mask = mask_f[ip_version](src_ip=netmask)
elif direction == "dst":
- mask = mask_f[ip_version](dst_ip=ip_addr)
+ mask = mask_f[ip_version](dst_ip=netmask)
else:
- raise ValueError("Direction {dir} is not supported.".
- format(dir=direction))
+ raise ValueError("Direction {dir} is not supported.".format(
+ dir=direction))
- return Classify._classify_add_del_table(
- node,
- is_add=1,
- mask=binascii.unhexlify(mask),
- match_n_vectors=(len(mask) - 1) // 32 + 1
- )
+ # Add l2 ethernet header to mask
+ mask = 14 * '\0' + mask
- @staticmethod
- def vpp_creates_classify_table_l2(node, direction, mac=""):
- """Create classify table for MAC address filtering.
+ # Get index of the first significant mask octet
+ i = len(mask) - len(mask.lstrip('\0'))
- :param node: VPP node to create classify table.
- :param direction: Direction of traffic - src/dst.
- :param mac: Source or destination (depending on the parameter
- 'direction') MAC address.
- :type node: dict
- :type direction: str
- :type mac: str
- :returns: (table_index, skip_n, match_n)
- table_index: Classify table index.
- skip_n: Number of skip vectors.
- match_n: Number of match vectors.
- :rtype: tuple(int, int, int)
- :raises ValueError: If the parameter 'direction' has incorrect value.
- """
- if direction == "src":
- mask = Classify._build_mac_mask(src_mac=mac)
- elif direction == "dst":
- mask = Classify._build_mac_mask(dst_mac=mac)
- else:
- raise ValueError("Direction {dir} is not supported.".
- format(dir=direction))
-
- return Classify._classify_add_del_table(
- node,
- is_add=1,
- mask=binascii.unhexlify(mask),
- match_n_vectors=(len(mask) - 1) // 32 + 1
- )
-
- @staticmethod
- def vpp_creates_classify_table_hex(node, hex_mask):
- """Create classify table with hex mask.
+ # Compute skip_n parameter
+ skip_n = i // 16
+ # Remove octets to be skipped from the mask
+ mask = mask[skip_n*16:]
+ # Pad mask to an even multiple of the vector size
+ mask = mask + (16 - len(mask) % 16 if len(mask) % 16 else 0) * '\0'
+ # Compute match_n parameter
+ match_n = len(mask) // 16
- :param node: VPP node to create classify table based on hex mask.
- :param hex_mask: Classify hex mask.
- :type node: dict
- :type hex_mask: str
- :returns: (table_index, skip_n, match_n)
- table_index: Classify table index.
- skip_n: Number of skip vectors.
- match_n: Number of match vectors.
- :rtype: tuple(int, int, int)
- """
return Classify._classify_add_del_table(
node,
is_add=1,
- mask=binascii.unhexlify(hex_mask),
- match_n_vectors=(len(hex_mask) - 1) // 32 + 1
+ mask=mask,
+ match_n_vectors=match_n,
+ skip_n_vectors=skip_n
)
@staticmethod
- def vpp_configures_classify_session_l3(node, acl_method, table_index,
- ip_version, direction, address):
+ def vpp_configures_classify_session_l3(
+ node, acl_method, table_index, skip_n, match_n, ip_version,
+ direction, address, hit_next_index=Constants.BITWISE_NON_ZERO,
+ opaque_index=Constants.BITWISE_NON_ZERO):
"""Configuration of classify session for IP address filtering.
:param node: VPP node to setup classify session.
:param acl_method: ACL method - deny/permit.
:param table_index: Classify table index.
+ :param skip_n: Number of skip vectors.
+ :param match_n: Number of vectors to match.
:param ip_version: Version of IP protocol.
:param direction: Direction of traffic - src/dst.
:param address: IPv4 or IPv6 address.
+ :param hit_next_index: hit_next_index of new session.
+ (Default value = ~0)
+ :param opaque_index: opaque_index of new session. (Default value = ~0)
:type node: dict
:type acl_method: str
:type table_index: int
+ :type skip_n: int
+ :type match_n: int
:type ip_version: str
:type direction: str
:type address: str
+ :type hit_next_index: int
+ :type opaque_index: int
:raises ValueError: If the parameter 'direction' has incorrect value.
"""
match_f = dict(
ip4=Classify._build_ip_match,
ip6=Classify._build_ip6_match
)
- if direction == "src":
- match = match_f[ip_version](src_ip=address)
- elif direction == "dst":
- match = match_f[ip_version](dst_ip=address)
- else:
- raise ValueError("Direction {dir} is not supported.".
- format(dir=direction))
action = dict(
permit=0,
deny=1
)
- Classify._classify_add_del_session(
- node,
- is_add=1,
- table_index=table_index,
- match=binascii.unhexlify(match),
- action=action[acl_method])
- @staticmethod
- def vpp_configures_classify_session_l2(node, acl_method, table_index,
- direction, address):
- """Configuration of classify session for MAC address filtering.
+ if ip_version == "ip4" or ip_version == "ip6":
+ address = binascii.hexlify(ip_address(unicode(address)).packed)
+ else:
+ raise ValueError("IP version {ver} is not supported.".format(
+ ver=ip_version))
- :param node: VPP node to setup classify session.
- :param acl_method: ACL method - deny/permit.
- :param table_index: Classify table index.
- :param direction: Direction of traffic - src/dst.
- :param address: MAC address.
- :type node: dict
- :type acl_method: str
- :type table_index: int
- :type direction: str
- :type address: str
- :raises ValueError: If the parameter 'direction' has incorrect value.
- """
if direction == "src":
- match = Classify._build_mac_match(src_mac=address)
+ match = match_f[ip_version](src_ip=address)
elif direction == "dst":
- match = Classify._build_mac_match(dst_mac=address)
+ match = match_f[ip_version](dst_ip=address)
else:
- raise ValueError("Direction {dir} is not supported.".
- format(dir=direction))
- action = dict(
- permit=0,
- deny=1
- )
- Classify._classify_add_del_session(
- node,
- is_add=1,
- table_index=table_index,
- match=binascii.unhexlify(match),
- action=action[acl_method])
+ raise ValueError("Direction {dir} is not supported.".format(
+ dir=direction))
- @staticmethod
- def vpp_configures_classify_session_hex(node, acl_method, table_index,
- hex_value):
- """Configuration of classify session with hex value.
+ # Prepend match with l2 ethernet header part
+ match = 14 * '\0' + match
+
+ # Pad match to match skip_n_vector + match_n_vector size
+ match = match + ((match_n + skip_n) * 16 - len(match)
+ if len(match) < (match_n + skip_n) * 16
+ else 0) * '\0'
- :param node: VPP node to setup classify session.
- :param acl_method: ACL method - deny/permit.
- :param table_index: Classify table index.
- :param hex_value: Classify hex value.
- :type node: dict
- :type acl_method: str
- :type table_index: int
- :type hex_value: str
- """
- action = dict(
- permit=0,
- deny=1
- )
Classify._classify_add_del_session(
node,
is_add=1,
table_index=table_index,
- match=binascii.unhexlify(hex_value),
- action=action[acl_method])
+ hit_next_index=hit_next_index,
+ opaque_index=opaque_index,
+ match=match,
+ action=action[acl_method]
+ )
@staticmethod
def compute_classify_hex_mask(ip_version, protocol, direction):
@@ -757,6 +624,18 @@ class Classify(object):
return details
@staticmethod
+ def show_classify_tables_verbose(node):
+ """Show classify tables verbose.
+
+ :param node: Topology node.
+ :type node: dict
+ :returns: Classify tables verbose data.
+ :rtype: str
+ """
+ return PapiSocketExecutor.run_cli_cmd(
+ node, "show classify tables verbose")
+
+ @staticmethod
def vpp_log_plugin_acl_settings(node):
"""Retrieve configured settings from the ACL plugin and write to robot
log.
diff --git a/resources/libraries/python/PapiExecutor.py b/resources/libraries/python/PapiExecutor.py
index d651e78cca..60d35a8543 100644
--- a/resources/libraries/python/PapiExecutor.py
+++ b/resources/libraries/python/PapiExecutor.py
@@ -442,7 +442,7 @@ class PapiSocketExecutor(object):
cmd = 'cli_inband'
args = dict(cmd=cli_cmd)
err_msg = "Failed to run 'cli_inband {cmd}' PAPI command on host " \
- "{host}".format(host=node['host'], cmd=cmd)
+ "{host}".format(host=node['host'], cmd=cli_cmd)
with PapiSocketExecutor(node, remote_vpp_socket) as papi_exec:
reply = papi_exec.add(cmd, **args).get_reply(err_msg)["reply"]
if log:
diff --git a/resources/libraries/python/Policer.py b/resources/libraries/python/Policer.py
index 9e14a4fd58..a51f99609c 100644
--- a/resources/libraries/python/Policer.py
+++ b/resources/libraries/python/Policer.py
@@ -1,4 +1,4 @@
-# Copyright (c) 2018 Cisco and/or its affiliates.
+# Copyright (c) 2019 Cisco and/or its affiliates.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at:
@@ -13,600 +13,227 @@
"""Policer utilities library."""
-from enum import Enum
+from enum import IntEnum
-from ipaddress import ip_address
-
-from resources.libraries.python.VatExecutor import VatExecutor
-from resources.libraries.python.VatJsonUtil import VatJsonUtil
+from resources.libraries.python.Constants import Constants
+from resources.libraries.python.PapiExecutor import PapiSocketExecutor
from resources.libraries.python.topology import Topology
-class PolicerRateType(Enum):
+class PolicerRateType(IntEnum):
"""Policer rate types."""
- KBPS = 'kbps'
- PPS = 'pps'
-
- def __init__(self, string):
- self.string = string
+ KBPS = 0
+ PPS = 1
+ INVALID = 2
-# pylint: disable=invalid-name
-class PolicerRoundType(Enum):
+class PolicerRoundType(IntEnum):
"""Policer round types."""
- CLOSEST = 'closest'
- UP = 'up'
- DOWN = 'down'
-
- def __init__(self, string):
- self.string = string
+ ROUND_TO_CLOSEST = 0
+ ROUND_TO_UP = 1
+ ROUND_TO_DOWN = 2
+ ROUND_TO_INVALID = 3
-class PolicerType(Enum):
+class PolicerType(IntEnum):
"""Policer type."""
- P_1R2C = '1r2c'
- P_1R3C = '1r3c'
- P_2R3C_2698 = '2r3c-2698'
- P_2R3C_4115 = '2r3c-4115'
- P_2R3C_MEF5CF1 = '2r3c-mef5cf1'
+ TYPE_1R2C = 0
+ TYPE_1R3C_RFC_2697 = 1
+ TYPE_2R3C_RFC_2698 = 2
+ TYPE_2R3C_RFC_4115 = 3
+ TYPE_2R3C_RFC_MEF5CF1 = 4
+ TYPE_MAX = 5
- def __init__(self, string):
- self.string = string
-
-class PolicerAction(Enum):
+class PolicerAction(IntEnum):
"""Policer action."""
- DROP = 'drop'
- TRANSMIT = 'transmit'
- MARK_AND_TRANSMIT = 'mark-and-transmit'
-
- def __init__(self, string):
- self.string = string
-
-
-class DSCP(Enum):
- """DSCP for mark-and-transmit action."""
- CS0 = ('CS0', 0)
- CS1 = ('CS1', 8)
- CS2 = ('CS2', 16)
- CS3 = ('CS3', 24)
- CS4 = ('CS4', 32)
- CS5 = ('CS5', 40)
- CS6 = ('CS6', 48)
- CS7 = ('CS7', 56)
- AF11 = ('AF11', 10)
- AF12 = ('AF12', 12)
- AF13 = ('AF13', 14)
- AF21 = ('AF21', 18)
- AF22 = ('AF22', 20)
- AF23 = ('AF23', 22)
- AF31 = ('AF31', 26)
- AF32 = ('AF32', 28)
- AF33 = ('AF33', 30)
- EF = ('EF', 46)
-
- def __init__(self, string, num):
- self.string = string
- self.num = num
-
+ DROP = 0
+ TRANSMIT = 1
+ MARK_AND_TRANSMIT = 2
-class PolicerClassifyPreColor(Enum):
- """Policer classify precolor."""
- CONFORM_COLOR = 'conform-color'
- EXCEED_COLOR = 'exceed-color'
- def __init__(self, string):
- self.string = string
+class PolicerPreColor(IntEnum):
+ """Policer Pre-color."""
+ CONFORM_COLOR = 0
+ EXCEED_COLOR = 1
+ VIOLATE_COLOR = 2
-class PolicerClassifyTableType(Enum):
- """Policer classify table type."""
- IP4_TABLE = 'ip4-table'
- IP6_TABLE = 'ip6-table'
- L2_TABLE = 'l2-table'
-
- def __init__(self, string):
- self.string = string
+class DSCP(IntEnum):
+ """DSCP for mark-and-transmit action."""
+ D_CS0 = 0
+ D_CS1 = 8
+ D_CS2 = 16
+ D_CS3 = 24
+ D_CS4 = 32
+ D_vCS5 = 40
+ D_CS6 = 48
+ D_CS7 = 56
+ D_AF11 = 10
+ D_AF12 = 12
+ D_AF13 = 14
+ D_AF21 = 18
+ D_AF22 = 20
+ D_AF23 = 22
+ D_AF31 = 26
+ D_AF32 = 28
+ D_AF33 = 30
+ D_EF = 46
class Policer(object):
"""Policer utilities."""
- def __init__(self):
- self._cir = 0
- self._eir = 0
- self._cb = 0
- self._eb = 0
- self._rate_type = None
- self._round_type = None
- self._policer_type = None
- self._conform_action = None
- self._conform_dscp = None
- self._exceed_action = None
- self._exceed_dscp = None
- self._violate_action = None
- self._violate_dscp = None
- self._color_aware = False
- self._classify_match_ip = ''
- self._classify_match_is_src = True
- self._classify_precolor = None
- self._sw_if_index = 0
- self._node = None
- self._policer_name = ''
-
- def policer_set_configuration(self):
+ # pylint: disable=too-many-arguments, too-many-locals
+ @staticmethod
+ def policer_set_configuration(
+ node, policer_name, cir, eir, cbs, ebs, rate_type, round_type,
+ policer_type, conform_action_type, exceed_action_type,
+ violate_action_type, color_aware, is_add=True, conform_dscp=None,
+ exceed_dscp=None, violate_dscp=None):
"""Configure policer on VPP node.
- ...note:: First set all required parameters.
- """
- node = self._node
-
- # create policer
- color_aware = 'color-aware' if self._color_aware else ''
-
- conform_action = self._conform_action.value
-
- if PolicerAction.MARK_AND_TRANSMIT == self._conform_action:
- conform_action += ' {0}'.format(self._conform_dscp.string)
-
- exceed_action = self._exceed_action.value
- if PolicerAction.MARK_AND_TRANSMIT == self._exceed_action:
- exceed_action += ' {0}'.format(self._exceed_dscp.string)
-
- violate_action = self._violate_action.value
- if PolicerAction.MARK_AND_TRANSMIT == self._violate_action:
- violate_action += ' {0}'.format(self._violate_dscp.string)
-
- out = VatExecutor.cmd_from_template(node,
- "policer/policer_add_3c.vat",
- name=self._policer_name,
- cir=self._cir,
- eir=self._eir,
- cb=self._cb,
- eb=self._eb,
- rate_type=self._rate_type.value,
- round_type=self._round_type.value,
- p_type=self._policer_type.value,
- conform_action=conform_action,
- exceed_action=exceed_action,
- violate_action=violate_action,
- color_aware=color_aware)
-
- VatJsonUtil.verify_vat_retval(
- out[0],
- err_msg='Add policer {0} failed on {1}'.format(self._policer_name,
- node['host']))
-
- policer_index = out[0].get('policer_index')
-
- # create classify table
- direction = 'src' if self._classify_match_is_src else 'dst'
-
- if ip_address(unicode(self._classify_match_ip)).version == 6:
- ip_version = 'ip6'
- table_type = PolicerClassifyTableType.IP6_TABLE
- else:
- ip_version = 'ip4'
- table_type = PolicerClassifyTableType.IP4_TABLE
-
- out = VatExecutor.cmd_from_template(node,
- "classify_add_table.vat",
- ip_version=ip_version,
- direction=direction)
-
- VatJsonUtil.verify_vat_retval(
- out[0],
- err_msg='Add classify table failed on {0}'.format(node['host']))
-
- new_table_index = out[0].get('new_table_index')
- skip_n_vectors = out[0].get('skip_n_vectors')
- match_n_vectors = out[0].get('match_n_vectors')
-
- # create classify session
- match = 'l3 {0} {1} {2}'.format(ip_version,
- direction,
- self._classify_match_ip)
-
- out = VatExecutor.cmd_from_template(
- node,
- "policer/policer_classify_add_session.vat",
- policer_index=policer_index,
- pre_color=self._classify_precolor.value,
- table_index=new_table_index,
- skip_n=skip_n_vectors,
- match_n=match_n_vectors,
- match=match)
-
- VatJsonUtil.verify_vat_retval(
- out[0],
- err_msg='Add classify session failed on {0}'.format(node['host']))
-
- # set classify interface
- out = VatExecutor.cmd_from_template(
- node,
- "policer/policer_classify_set_interface.vat",
- sw_if_index=self._sw_if_index,
- table_type=table_type.value,
- table_index=new_table_index)
-
- VatJsonUtil.verify_vat_retval(
- out[0],
- err_msg='Set classify interface failed on {0}'.format(node['host']))
-
- def policer_clear_settings(self):
- """Clear policer settings."""
- self._cir = 0
- self._eir = 0
- self._cb = 0
- self._eb = 0
- self._rate_type = None
- self._round_type = None
- self._policer_type = None
- self._conform_action = None
- self._conform_dscp = None
- self._exceed_action = None
- self._exceed_dscp = None
- self._violate_action = None
- self._violate_dscp = None
- self._color_aware = False
- self._classify_match_ip = ''
- self._classify_match_is_src = True
- self._classify_precolor = None
- self._sw_if_index = 0
- self._node = None
- self._policer_name = ''
-
- def policer_set_name(self, name):
- """Set policer name.
-
- :param name: Policer name.
- :type name: str
- """
- self._policer_name = name
-
- def policer_set_node(self, node):
- """Set node to setup policer on.
-
:param node: VPP node.
+ :param policer_name: Name of the policer.
+ :param cir: Committed information rate.
+ :param eir: Excess (or Peak) information rate.
+ :param cbs: Committed burst size.
+ :param ebs: Excess (or Peak) burst size.
+ :param rate_type: Rate type.
+ :param round_type: Round type.
+ :param policer_type: Policer algorithm.
+ :param conform_action_type: Conform action type.
+ :param exceed_action_type: Exceed action type.
+ :param violate_action_type: Violate action type.
+ :param color_aware: Color-blind (cb) or color-aware (ca).
+ :param is_add: Add policer if True, else delete.
+ :param conform_dscp: DSCP for conform mark_and_transmit action.
+ :param exceed_dscp: DSCP for exceed mark_and_transmit action.
+ :param violate_dscp: DSCP for vilate mark_and_transmit action.
:type node: dict
- """
- self._node = node
-
- def policer_set_cir(self, cir):
- """Set policer CIR.
-
- :param cir: Committed Information Rate.
+ :type policer_name: str
:type cir: int
- """
- self._cir = cir
-
- def policer_set_eir(self, eir):
- """Set polcier EIR.
-
- :param eir: Excess Information Rate.
:type eir: int
- """
- self._eir = eir
-
- def policer_set_cb(self, cb):
- """Set policer CB.
-
- :param cb: Committed Burst size.
- :type cb: int or str
- """
- if cb == "IMIX_v4_1":
- self._cb = 1518
- else:
- self._cb = cb
-
- def policer_set_eb(self, eb):
- """Set policer EB.
-
- :param eb: Excess Burst size.
- :type eb: int or str
- """
- if eb == "IMIX_v4_1":
- self._eb = 1518
- else:
- self._eb = eb
-
- def policer_set_rate_type_kbps(self):
- """Set policer rate type to kbps."""
- self._rate_type = PolicerRateType.KBPS
-
- def policer_set_rate_type_pps(self):
- """Set policer rate type to pps."""
- self._rate_type = PolicerRateType.PPS
-
- def policer_set_round_type_closest(self):
- """Set policer round type to closest."""
- self._round_type = PolicerRoundType.CLOSEST
-
- def policer_set_round_type_up(self):
- """Set policer round type to up."""
- self._round_type = PolicerRoundType.UP
-
- def policer_set_round_type_down(self):
- """Set policer round type to down."""
- self._round_type = PolicerRoundType.DOWN
-
- def policer_set_type_1r2c(self):
- """Set policer type to 1r2c."""
- self._policer_type = PolicerType.P_1R2C
-
- def policer_set_type_1r3c(self):
- """Set policer type to 1r3c RFC2697."""
- self._policer_type = PolicerType.P_1R3C
-
- def policer_set_type_2r3c_2698(self):
- """Set policer type to 2r3c RFC2698."""
- self._policer_type = PolicerType.P_2R3C_2698
-
- def policer_set_type_2r3c_4115(self):
- """Set policer type to 2r3c RFC4115."""
- self._policer_type = PolicerType.P_2R3C_4115
-
- def policer_set_type_2r3c_mef5cf1(self):
- """Set policer type to 2r3c MEF5CF1."""
- self._policer_type = PolicerType.P_2R3C_MEF5CF1
-
- def policer_set_conform_action_drop(self):
- """Set policer conform-action to drop."""
- self._conform_action = PolicerAction.DROP
-
- def policer_set_conform_action_transmit(self):
- """Set policer conform-action to transmit."""
- self._conform_action = PolicerAction.TRANSMIT
-
- def policer_set_conform_action_mark_and_transmit(self, dscp):
- """Set policer conform-action to mark-and-transmit.
-
- :param dscp: DSCP value to mark.
- :type dscp: DSCP
- """
- self._conform_action = PolicerAction.MARK_AND_TRANSMIT
- self._conform_dscp = dscp
-
- def policer_set_exceed_action_drop(self):
- """Set policer exceed-action to drop."""
- self._exceed_action = PolicerAction.DROP
-
- def policer_set_exceed_action_transmit(self):
- """Set policer exceed-action to transmit."""
- self._exceed_action = PolicerAction.TRANSMIT
-
- def policer_set_exceed_action_mark_and_transmit(self, dscp):
- """Set policer exceed-action to mark-and-transmit.
-
- :param dscp: DSCP value to mark.
- :type dscp: DSCP
- """
- self._exceed_action = PolicerAction.MARK_AND_TRANSMIT
- self._exceed_dscp = dscp
-
- def policer_set_violate_action_drop(self):
- """Set policer violate-action to drop."""
- self._violate_action = PolicerAction.DROP
-
- def policer_set_violate_action_transmit(self):
- """Set policer violate-action to transmit."""
- self._violate_action = PolicerAction.TRANSMIT
-
- def policer_set_violate_action_mark_and_transmit(self, dscp):
- """Set policer violate-action to mark-and-transmit.
+ :type cbs: int
+ :type ebs: int
+ :type rate_type: str
+ :type round_type: str
+ :type policer_type: str
+ :type conform_action_type: str
+ :type exceed_action_type: str
+ :type violate_action_type: str
+ :type color_aware: str
+ :type is_add: bool
+ :type conform_dscp: str
+ :type exceed_dscp: str
+ :type violate_dscp: str
+ """
+ cmd = 'policer_add_del'
+ args = dict(
+ is_add=int(is_add),
+ name=str(policer_name),
+ cir=int(cir),
+ eir=int(eir),
+ cb=int(cbs),
+ eb=int(ebs),
+ rate_type=getattr(PolicerRateType, rate_type.upper()).value,
+ round_type=getattr(
+ PolicerRoundType, 'ROUND_TO_{rt}'.format(
+ rt=round_type.upper())).value,
+ type=getattr(PolicerType, 'TYPE_{pt}'.format(
+ pt=policer_type.upper())).value,
+ conform_action_type=getattr(
+ PolicerAction, conform_action_type.upper()).value,
+ conform_dscp=getattr(DSCP, 'D_{dscp}'.format(
+ dscp=conform_dscp.upper())).value
+ if
+ conform_action_type.upper() == PolicerAction.MARK_AND_TRANSMIT.name
+ else 0,
+ exceed_action_type=getattr(
+ PolicerAction, exceed_action_type.upper()).value,
+ exceed_dscp=getattr(DSCP, 'D_{dscp}'.format(
+ dscp=exceed_dscp.upper())).value
+ if
+ exceed_action_type.upper() == PolicerAction.MARK_AND_TRANSMIT.name
+ else 0,
+ violate_action_type=getattr(
+ PolicerAction, violate_action_type.upper()).value,
+ violate_dscp=getattr(DSCP, 'D_{dscp}'.format(
+ dscp=violate_dscp.upper())).value
+ if
+ violate_action_type.upper() == PolicerAction.MARK_AND_TRANSMIT.name
+ else 0,
+ color_aware=1 if color_aware == "'ca'" else 0
+ )
+ err_msg = 'Failed to configure policer {pn} on host {host}'.format(
+ pn=policer_name, host=node['host'])
+
+ with PapiSocketExecutor(node) as papi_exec:
+ reply = papi_exec.add(cmd, **args).get_reply(err_msg)
+
+ return reply['policer_index']
+
+ @staticmethod
+ def policer_classify_set_interface(
+ node, interface, ip4_table_index=Constants.BITWISE_NON_ZERO,
+ ip6_table_index=Constants.BITWISE_NON_ZERO,
+ l2_table_index=Constants.BITWISE_NON_ZERO, is_add=1):
+ """Set/unset policer classify interface.
- :param dscp: DSCP value to mark.
- :type dscp: DSCP
- """
- self._violate_action = PolicerAction.MARK_AND_TRANSMIT
- self._violate_dscp = dscp
-
- def policer_enable_color_aware(self):
- """Enable color-aware mode for policer."""
- self._color_aware = True
-
- def policer_classify_set_precolor_conform(self):
- """Set policer classify pre-color to conform-color."""
- self._classify_precolor = PolicerClassifyPreColor.CONFORM_COLOR
-
- def policer_classify_set_precolor_exceed(self):
- """Set policer classify pre-color to exceeed-color."""
- self._classify_precolor = PolicerClassifyPreColor.EXCEED_COLOR
-
- def policer_classify_set_interface(self, interface):
- """Set policer classify interface.
-
- .. note:: First set node with policer_set_node.
-
- :param interface: Interface name or sw_if_index.
+ :param node: VPP node.
+ :param interface: Interface name or sw_if_index to set/unset policer
+ classify.
+ :param ip4_table_index: IP4 classify table index (~0 to skip).
+ (Default value = ~0)
+ :param ip6_table_index: IP6 classify table index (~0 to skip).
+ (Default value = ~0)
+ :param l2_table_index: L2 classify table index (~0 to skip).
+ (Default value = ~0)
+ :param is_add: Set if non-zero, else unset.
+ :type node: dict
:type interface: str or int
+ :type ip4_table_index: int
+ :type ip6_table_index: int
+ :type l2_table_index: int
"""
if isinstance(interface, basestring):
- self._sw_if_index = Topology.get_interface_sw_index(self._node,
- interface)
+ sw_if_index = Topology.get_interface_sw_index(node, interface)
else:
- self._sw_if_index = interface
-
- def policer_classify_set_match_ip(self, ip, is_src=True):
- """Set policer classify match source IP address.
-
- :param ip: IPv4 or IPv6 address.
- :param is_src: Match src IP if True otherwise match dst IP.
- :type ip: str
- :type is_src: bool
- """
- self._classify_match_ip = ip
- self._classify_match_is_src = is_src
-
- @staticmethod
- def dscp_cs0():
- """Return DSCP CS0.
-
- :returns: DSCP enum CS0 object.
- :rtype: DSCP
- """
- return DSCP.CS0
-
- @staticmethod
- def dscp_cs1():
- """Return DSCP CS1.
-
- :returns: DSCP enum CS1 object.
- :rtype: DSCP
- """
- return DSCP.CS1
-
- @staticmethod
- def dscp_cs2():
- """Return DSCP CS2.
-
- :returns: DSCP enum CS2 object.
- :rtype: DSCP
- """
- return DSCP.CS2
-
- @staticmethod
- def dscp_cs3():
- """Return DSCP CS3.
-
- :returns: DSCP enum CS3 object.
- :rtype: DSCP
- """
- return DSCP.CS3
-
- @staticmethod
- def dscp_cs4():
- """Return DSCP CS4.
-
- :returns: DSCP enum CS4 object.
- :rtype: DSCP
- """
- return DSCP.CS4
-
- @staticmethod
- def dscp_cs5():
- """Return DSCP CS5.
-
- :returns: DSCP enum CS5 object.
- :rtype: DSCP
- """
- return DSCP.CS5
-
- @staticmethod
- def dscp_cs6():
- """Return DSCP CS6.
-
- :returns: DSCP enum CS6 object.
- :rtype: DSCP
- """
- return DSCP.CS6
-
- @staticmethod
- def dscp_cs7():
- """Return DSCP CS7.
-
- :returns: DSCP enum CS7 object.
- :rtype: DSCP
- """
- return DSCP.CS7
-
- @staticmethod
- def dscp_ef():
- """Return DSCP EF.
-
- :returns: DSCP enum EF object.
- :rtype: DSCP
- """
- return DSCP.EF
-
- @staticmethod
- def dscp_af11():
- """Return DSCP AF11.
-
- :returns: DSCP enum AF11 object.
- :rtype: DSCP
- """
- return DSCP.AF11
-
- @staticmethod
- def dscp_af12():
- """Return DSCP AF12.
+ sw_if_index = interface
- :returns: DSCP enum AF12 object.
- :rtype: DSCP
- """
- return DSCP.AF12
+ cmd = 'policer_classify_set_interface'
- @staticmethod
- def dscp_af13():
- """Return DSCP AF13.
+ args = dict(
+ is_add=int(is_add),
+ sw_if_index=sw_if_index,
+ ip4_table_index=int(ip4_table_index),
+ ip6_table_index=int(ip6_table_index),
+ l2_table_index=int(l2_table_index)
+ )
+ err_msg = 'Failed to set/unset policer classify interface {ifc} ' \
+ 'on host {host}'.format(ifc=interface, host=node['host'])
- :returns: DSCP enum AF13 object.
- :rtype: DSCP
- """
- return DSCP.AF13
+ with PapiSocketExecutor(node) as papi_exec:
+ papi_exec.add(cmd, **args).get_reply(err_msg)
@staticmethod
- def dscp_af21():
- """Return DSCP AF21.
-
- :returns: DSCP enum AF21 object.
- :rtype: DSCP
- """
- return DSCP.AF21
+ def policer_classify_get_precolor(precolor):
+ """Return policer pre-color numeric value.
- @staticmethod
- def dscp_af22():
- """Return DSCP AF22.
-
- :returns: DSCP enum AF22 object.
- :rtype: DSCP
- """
- return DSCP.AF22
-
- @staticmethod
- def dscp_af23():
- """Return DSCP AF23.
-
- :returns: DSCP enum AF23 object.
- :rtype: DSCP
- """
- return DSCP.AF23
-
- @staticmethod
- def dscp_af31():
- """Return DSCP AF31.
-
- :returns: DSCP enum AF31 object.
- :rtype: DSCP
- """
- return DSCP.AF31
-
- @staticmethod
- def dscp_af32():
- """Return DSCP AF32.
-
- :returns: DSCP enum AF32 object.
- :rtype: DSCP
- """
- return DSCP.AF32
-
- @staticmethod
- def dscp_af33():
- """Return DSCP AF33.
-
- :returns: DSCP enum AF33 object.
- :rtype: DSCP
+ :param precolor: Policer pre-color name.
+ :type precolor: str
+ :returns: Policer pre-color numeric value.
+ :rtype: int
"""
- return DSCP.AF33
+ return getattr(PolicerPreColor, precolor.upper()).value
@staticmethod
def get_dscp_num_value(dscp):
"""Return DSCP numeric value.
- :param dscp: DSCP enum object.
- :type dscp: DSCP
+ :param dscp: DSCP name.
+ :type dscp: str
:returns: DSCP numeric value.
:rtype: int
"""
- return dscp.num
+ return getattr(DSCP, 'D_{dscp}'.format(dscp=dscp.upper())).value
diff --git a/resources/libraries/robot/features/policer.robot b/resources/libraries/robot/features/policer.robot
index 111b932a4b..962f4cf2be 100644
--- a/resources/libraries/robot/features/policer.robot
+++ b/resources/libraries/robot/features/policer.robot
@@ -12,6 +12,7 @@
# limitations under the License.
*** Settings ***
+| Library | resources.libraries.python.Classify
| Library | resources.libraries.python.Policer
| ...
| Documentation | Policer keywords
@@ -23,25 +24,18 @@
| | ... | on all DUT nodes in 2-node / 3-node circular topology. Policer is
| | ... | applied on links TG - DUTx.
| | ...
-| | ${dscp}= | DSCP AF22
-| | Policer Set Name | policer1
-| | Policer Set CIR | ${cir}
-| | Policer Set EIR | ${eir}
-| | Policer Set CB | ${cb}
-| | Policer Set EB | ${eb}
-| | Policer Set Rate Type pps
-| | Policer Set Round Type Closest
-| | Policer Set Type 2R3C 2698
-| | Policer Set Conform Action Transmit
-| | Policer Set Exceed Action Mark and Transmit | ${dscp}
-| | Policer Set Violate Action Transmit
-| | Policer Enable Color Aware
-| | Run Keyword If | ${t} == 'ca' | Policer Enable Color Aware
-| | Policer Classify Set Precolor Exceed
-| | Policer Set Node | ${dut1}
-| | Policer Classify Set Interface | ${dut1_if1}
-| | Policer Classify Set Match IP | 20.20.20.2 | ${False}
-| | Policer Set Configuration
+| | ${policer_index}= | Policer Set Configuration | ${dut1} | policer1 | ${cir}
+| | ... | ${eir} | ${cb} | ${eb} | pps | Closest | 2R3C_RFC_2698 | Transmit
+| | ... | Mark_and_Transmit | Transmit | ${t} | exceed_dscp=${dscp}
+| | ${table_idx} | ${skip_n} | ${match_n}= | Vpp Creates Classify Table L3
+| | ... | ${dut1} | ip4 | dst | 255.255.255.255
+| | ${pre_color}= | Policer Classify Get Precolor | exceed_color
+| | Vpp Configures Classify Session L3 | ${dut1} | permit | ${table_idx}
+| | ... | ${skip_n} | ${match_n} | ip4 | dst | 20.20.20.2
+| | ... | hit_next_index=${policer_index} | opaque_index=${pre_color}
+| | Policer Classify Set Interface | ${dut1} | ${dut1_if1}
+| | ... | ip4_table_index=${table_idx}
+| | ...
| | ${dut2_status} | ${value}= | Run Keyword And Ignore Error
| | ... | Variable Should Exist | ${dut2}
| | ${dut}= | Run Keyword If | '${dut2_status}' == 'PASS'
@@ -50,12 +44,21 @@
| | ${dut_if2}= | Run Keyword If | '${dut2_status}' == 'PASS'
| | ... | Set Variable | ${dut2_if2}
| | ... | ELSE | Set Variable | ${dut1_if2}
-| | Run Keyword Unless | '${dut2_status}' == 'PASS'
-| | ... | Policer Set Name | policer2
-| | Policer Set Node | ${dut}
-| | Policer Classify Set Interface | ${dut_if2}
-| | Policer Classify Set Match IP | 10.10.10.2 | ${False}
-| | Policer Set Configuration
+| | ...
+| | ${policer_index}= | Run Keyword If | '${dut2_status}' == 'PASS'
+| | ... | Policer Set Configuration | ${dut} | policer2 | ${cir}
+| | ... | ${eir} | ${cb} | ${eb} | pps | Closest | 2R3C_RFC_2698 | Transmit
+| | ... | Mark_and_Transmit | Transmit | ${t} | exceed_dscp=${dscp}
+| | ... | ELSE | Set Variable | ${policer_index}
+| | ${table_idx} | ${skip_n} | ${match_n}=
+| | ... | Run Keyword If | '${dut2_status}' == 'PASS'
+| | ... | Vpp Creates Classify Table L3 | ${dut} | ip4 | dst | 255.255.255.255
+| | ... | ELSE | Set Variable | ${table_idx} | ${skip_n} | ${match_n}
+| | Vpp Configures Classify Session L3 | ${dut} | permit | ${table_idx}
+| | ... | ${skip_n} | ${match_n} | ip4 | dst | 10.10.10.2
+| | ... | hit_next_index=${policer_index} | opaque_index=${pre_color}
+| | Policer Classify Set Interface | ${dut} | ${dut_if2}
+| | ... | ip4_table_index=${table_idx}
| Initialize IPv6 policer 2r3c-${t} in circular topology
| | [Documentation]
@@ -63,25 +66,18 @@
| | ... | on all DUT nodes in 2-node / 3-node circular topology. Policer is
| | ... | applied on links TG - DUTx.
| | ...
-| | ${dscp}= | DSCP AF22
-| | Policer Set Name | policer1
-| | Policer Set CIR | ${cir}
-| | Policer Set EIR | ${eir}
-| | Policer Set CB | ${cb}
-| | Policer Set EB | ${eb}
-| | Policer Set Rate Type pps
-| | Policer Set Round Type Closest
-| | Policer Set Type 2R3C 2698
-| | Policer Set Conform Action Transmit
-| | Policer Set Exceed Action Mark and Transmit | ${dscp}
-| | Policer Set Violate Action Transmit
-| | Policer Enable Color Aware
-| | Run Keyword If | ${t} == 'ca' | Policer Enable Color Aware
-| | Policer Classify Set Precolor Exceed
-| | Policer Set Node | ${dut1}
-| | Policer Classify Set Interface | ${dut1_if1}
-| | Policer Classify Set Match IP | 2001:2::2 | ${False}
-| | Policer Set Configuration
+| | ${policer_index}= | Policer Set Configuration | ${dut1} | policer1 | ${cir}
+| | ... | ${eir} | ${cb} | ${eb} | pps | Closest | 2R3C_RFC_2698 | Transmit
+| | ... | Mark_and_Transmit | Transmit | ${t} | exceed_dscp=${dscp}
+| | ${table_idx} | ${skip_n} | ${match_n}= | Vpp Creates Classify Table L3
+| | ... | ${dut1} | ip6 | dst | ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
+| | ${pre_color}= | Policer Classify Get Precolor | exceed_color
+| | Vpp Configures Classify Session L3 | ${dut1} | permit | ${table_idx}
+| | ... | ${skip_n} | ${match_n} | ip6 | dst | 2001:2::2
+| | ... | hit_next_index=${policer_index} | opaque_index=${pre_color}
+| | Policer Classify Set Interface | ${dut1} | ${dut1_if1}
+| | ... | ip6_table_index=${table_idx}
+| | ...
| | ${dut2_status} | ${value}= | Run Keyword And Ignore Error
| | ... | Variable Should Exist | ${dut2}
| | ${dut}= | Run Keyword If | '${dut2_status}' == 'PASS'
@@ -90,9 +86,35 @@
| | ${dut_if2}= | Run Keyword If | '${dut2_status}' == 'PASS'
| | ... | Set Variable | ${dut2_if2}
| | ... | ELSE | Set Variable | ${dut1_if2}
-| | Run Keyword Unless | '${dut2_status}' == 'PASS'
-| | ... | Policer Set Name | policer2
-| | Policer Set Node | ${dut}
-| | Policer Classify Set Interface | ${dut_if2}
-| | Policer Classify Set Match IP | 2001:1::2 | ${False}
-| | Policer Set Configuration
+| | ...
+| | ${policer_index}= | Run Keyword If | '${dut2_status}' == 'PASS'
+| | ... | Policer Set Configuration | ${dut} | policer2 | ${cir}
+| | ... | ${eir} | ${cb} | ${eb} | pps | Closest | 2R3C_RFC_2698 | Transmit
+| | ... | Mark_and_Transmit | Transmit | ${t} | exceed_dscp=${dscp}
+| | ... | ELSE | Set Variable | ${policer_index}
+| | ${table_idx} | ${skip_n} | ${match_n}=
+| | ... | Run Keyword If | '${dut2_status}' == 'PASS'
+| | ... | Vpp Creates Classify Table L3
+| | ... | ${dut} | ip6 | dst | ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
+| | ... | ELSE | Set Variable | ${table_idx} | ${skip_n} | ${match_n}
+| | Vpp Configures Classify Session L3 | ${dut} | permit | ${table_idx}
+| | ... | ${skip_n} | ${match_n} | ip6 | dst | 2001:1::2
+| | ... | hit_next_index=${policer_index} | opaque_index=${pre_color}
+| | Policer Classify Set Interface | ${dut} | ${dut_if2}
+| | ... | ip6_table_index=${table_idx}
+
+| Show Classify Tables Verbose on all DUTs
+| | [Documentation] | Show classify tables verbose on all DUT nodes in topology.
+| | ...
+| | ... | *Arguments:*
+| | ... | - nodes - Topology. Type: dictionary
+| | ...
+| | ... | *Example:*
+| | ...
+| | ... | \| Show Classify Tables Verbose on all DUTs \| ${nodes} \|
+| | ...
+| | [Arguments] | ${nodes}
+| | ...
+| | ${duts}= | Get Matches | ${nodes} | DUT*
+| | :FOR | ${dut} | IN | @{duts}
+| | | Show Classify Tables Verbose | ${nodes['${dut}']}
diff --git a/resources/libraries/robot/shared/default.robot b/resources/libraries/robot/shared/default.robot
index 8985bd2434..c560dcf8c2 100644
--- a/resources/libraries/robot/shared/default.robot
+++ b/resources/libraries/robot/shared/default.robot
@@ -20,7 +20,7 @@
| Library | OperatingSystem
| Library | String
| ...
-| Library | resources.libraries.python.Classify.Classify
+| Library | resources.libraries.python.Classify
| Library | resources.libraries.python.CpuUtils
| Library | resources.libraries.python.CoreDumpUtil
| Library | resources.libraries.python.Cop
diff --git a/resources/libraries/robot/shared/test_teardown.robot b/resources/libraries/robot/shared/test_teardown.robot
index 8ba914b946..1cc526211d 100644
--- a/resources/libraries/robot/shared/test_teardown.robot
+++ b/resources/libraries/robot/shared/test_teardown.robot
@@ -111,6 +111,13 @@
| | Run Keyword If Test Failed
| | ... | Vpp Log Macip Acl Interface Assignment | ${dut1}
+| Additional Test Tear Down Action For classify
+| | [Documentation]
+| | ... | Additional teardown for tests which uses classify tables.
+| | ...
+| | Run Keyword If Test Failed
+| | ... | Show Classify Tables Verbose on all DUTs | ${nodes}
+
| Additional Test Tear Down Action For srv6
| | [Documentation]
| | ... | Additional teardown for tests which uses SRv6.
diff --git a/resources/libraries/robot/shared/traffic.robot b/resources/libraries/robot/shared/traffic.robot
index 294d0a7deb..b3e030986e 100644
--- a/resources/libraries/robot/shared/traffic.robot
+++ b/resources/libraries/robot/shared/traffic.robot
@@ -571,7 +571,6 @@
| | [Arguments] | ${node} | ${tx_if} | ${rx_if} | ${src_mac} | ${dst_mac}
| | ... | ${src_ip} | ${dst_ip}
| | ...
-| | ${dscp}= | DSCP AF22
| | ${tx_if_name}= | Get Interface Name | ${node} | ${tx_if}
| | ${rx_if_name}= | Get Interface Name | ${node} | ${rx_if}
| | ${args}= | Traffic Script Gen Arg | ${rx_if_name} | ${tx_if_name}