summaryrefslogtreecommitdiffstats
path: root/nsh/nsh_postman_collection.json
diff options
context:
space:
mode:
authorHongjun Ni <hongjun.ni@intel.com>2017-01-18 20:50:49 +0800
committerMarek Gradzki <mgradzki@cisco.com>2017-01-18 10:39:53 +0000
commit75f8aa0f9a1ff45f1be500304fb156a13fb6e6ef (patch)
tree3d8b760cd379fb19995d7718f153b633b210f082 /nsh/nsh_postman_collection.json
parent2041dca222a92272c01468d89d315009eb9721ec (diff)
Add test postman for complete NSH Classifier
Add and Delete configuration items in numeric order Change-Id: I488cd213e8a6893a6cc173d80a45cb056e8c98e2 Signed-off-by: Hongjun Ni <hongjun.ni@intel.com>
Diffstat (limited to 'nsh/nsh_postman_collection.json')
-rw-r--r--nsh/nsh_postman_collection.json345
1 files changed, 345 insertions, 0 deletions
diff --git a/nsh/nsh_postman_collection.json b/nsh/nsh_postman_collection.json
index 84f508c01..db5f957c8 100644
--- a/nsh/nsh_postman_collection.json
+++ b/nsh/nsh_postman_collection.json
@@ -5,6 +5,31 @@
"order": [],
"folders": [
{
+ "id": "0f0316a8-f686-80b2-728b-d52e6d711d4c",
+ "name": "NSH_Classifier",
+ "description": "",
+ "order": [
+ "53496ff6-b3b8-bd37-aa12-a49c83386d86",
+ "9232139c-c6b6-403c-39a6-13c975370220",
+ "8a02106e-4c3b-b08f-7607-e766fc460d15",
+ "d7d83338-d147-fee2-5a96-e70159aad0ea",
+ "b3219f66-7c1c-e3be-0285-f521639191de",
+ "b15ceb4d-4214-858a-a888-bb11b7f0b338",
+ "66f2284b-9b78-e472-0cef-5e00153eb775",
+ "5ae3c7c7-1ab0-4210-04dc-c2e91c8a4017",
+ "56a85c94-41ab-0eb2-b84e-25989f87ccbd",
+ "cebf8294-aa91-cf21-342a-0d8f234176be",
+ "adc501e7-e3bb-ce73-b2a0-b85615ab15dd",
+ "9253bf49-b00d-8a39-b88b-483c4711bc07",
+ "eae0e8fe-8610-8760-1f1c-8d4a6960fe23",
+ "f9543e07-3140-222c-d1ac-83283e29a7c6",
+ "1907ae3a-25e1-f980-6e29-d612aa72b999",
+ "f85e69dd-7baf-2d63-6a62-99bffc7f508b"
+ ],
+ "owner": "652751",
+ "collectionId": "a9a935b5-9481-e4f7-44fb-17d13ef726f9"
+ },
+ {
"id": "42e7fe47-c72a-1db4-db53-ba1ba4385691",
"name": "NSH_Proxy",
"description": "",
@@ -181,6 +206,26 @@
"rawModeData": ""
},
{
+ "id": "1907ae3a-25e1-f980-6e29-d612aa72b999",
+ "headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n",
+ "url": "http://localhost:8183/restconf/config/vpp-classifier:vpp-classifier/classify-table/table1/classify-session/00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:06:00:00:00:00:00:00:00:00",
+ "preRequestScript": "",
+ "pathVariables": {},
+ "method": "DELETE",
+ "data": [],
+ "dataMode": "raw",
+ "version": 2,
+ "tests": "",
+ "currentHelper": "normal",
+ "helperAttributes": {},
+ "time": 1484632389744,
+ "name": "7_Remove classify session - cfg",
+ "description": "Adds classify session to table0. Corresponding vpp cli command:\n\nvppctl classify session acl-hit-next deny opaque-index 0 table-index 0 match l2 src 01:02:03:04:05:06\n\nTo verify invoke:\n\nvppctl sh class table verbose",
+ "collectionId": "a9a935b5-9481-e4f7-44fb-17d13ef726f9",
+ "responses": [],
+ "rawModeData": ""
+ },
+ {
"id": "1a24235c-7f73-daef-291e-4307b05a330f",
"headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n",
"url": "http://localhost:8183/restconf/config/vpp-nsh:vpp-nsh/nsh-maps/nsh-map/nshMap8",
@@ -421,6 +466,26 @@
"rawModeData": "{\r\n \r\n \"interface\": [\r\n {\r\n \"name\": \"vxlanTun1\",\r\n \"description\": \"for testing purposes\",\r\n \"type\": \"v3po:vxlan-tunnel\",\r\n \"enabled\": \"true\",\r\n \"link-up-down-trap-enable\": \"enabled\",\r\n \"routing\" : {\r\n \"ipv4-vrf-id\" : \"0\"\r\n },\r\n \"vxlan\" : {\r\n \"src\" : \"192.168.1.6\",\r\n \"dst\" : \"192.168.1.9\",\r\n \"vni\" : \"88\",\r\n \"encap-vrf-id\" : \"0\",\r\n \"decap-next\" : \"nsh-proxy\"\r\n }\r\n }\r\n ]\r\n \r\n}"
},
{
+ "id": "53496ff6-b3b8-bd37-aa12-a49c83386d86",
+ "headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n",
+ "url": "http://localhost:8183/restconf/config/vpp-classifier:vpp-classifier/classify-table/table1",
+ "preRequestScript": "",
+ "pathVariables": {},
+ "method": "PUT",
+ "data": [],
+ "dataMode": "raw",
+ "version": 2,
+ "tests": "",
+ "currentHelper": "normal",
+ "helperAttributes": {},
+ "time": 1484711092019,
+ "name": "1_Add classify table1 - cfg",
+ "description": "Adds classify table1. Corresponding vpp cli command:\n\nvppctl classify table mask l2 src\n\nTo verify invoke:\n\nvppctl sh class table verbose\n\nor:\n\nvat# classify_table_info table_id 1",
+ "collectionId": "a9a935b5-9481-e4f7-44fb-17d13ef726f9",
+ "responses": [],
+ "rawModeData": "{\n \"classify-table\": [\n {\n \"name\": \"table1\",\n \"classifier-node\": \"l2-input-classify\",\n \"nbuckets\": \"2\",\n \"memory_size\": \"1048576\",\n \"miss_next\": \"deny\",\n \"mask\": \"00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:ff:00:00:00:00:00:00:00:00\"\n }\n ]\n}"
+ },
+ {
"id": "5375ec48-2553-8cf8-42a5-2f914941411a",
"headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n",
"url": "http://localhost:8183/restconf/config/vpp-nsh:vpp-nsh/nsh-entries/nsh-entry/nshEntry5",
@@ -461,6 +526,46 @@
"rawModeData": "{\r\n \r\n \"nsh-entry\": [\r\n {\r\n \"name\": \"nshEntry5\",\r\n \"description\": \"for testing nshEntry\",\r\n \"version\": \"0\",\r\n \"length\": \"6\",\r\n \"next-protocol\": \"Ethernet\",\r\n \"md-type\": \"MdType1\",\r\n \"nsp\": \"185\",\r\n \"nsi\": \"255\" \r\n }\r\n ]\r\n \r\n}"
},
{
+ "id": "56a85c94-41ab-0eb2-b84e-25989f87ccbd",
+ "headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n",
+ "url": "http://localhost:8183/restconf/config/vpp-nsh:vpp-nsh/nsh-maps/nsh-map/nshMap7",
+ "preRequestScript": "",
+ "pathVariables": {},
+ "method": "DELETE",
+ "data": [],
+ "dataMode": "raw",
+ "version": 2,
+ "tests": "",
+ "currentHelper": "normal",
+ "helperAttributes": {},
+ "time": 1484632373158,
+ "name": "1_Delete nsh-map from SF to SFF2 - cfg",
+ "description": "",
+ "collectionId": "a9a935b5-9481-e4f7-44fb-17d13ef726f9",
+ "responses": [],
+ "rawModeData": "{\r\n \"nsh-map\": [\r\n {\r\n \"name\": \"nshMap7\",\r\n \"nsp\": \"185\",\r\n \"nsi\": \"255\",\r\n \"mapped-nsp\": \"185\",\r\n \"mapped-nsi\": \"255\" \r\n }\r\n ]\r\n}"
+ },
+ {
+ "id": "5ae3c7c7-1ab0-4210-04dc-c2e91c8a4017",
+ "headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n",
+ "url": "http://localhost:8183/restconf/config/vpp-nsh:vpp-nsh/nsh-maps/nsh-map/nshMap7",
+ "preRequestScript": "",
+ "pathVariables": {},
+ "method": "PUT",
+ "data": [],
+ "dataMode": "raw",
+ "version": 2,
+ "tests": "",
+ "currentHelper": "normal",
+ "helperAttributes": {},
+ "time": 1484632370544,
+ "name": "8_Add nsh-map from Classifier to SFF - cfg",
+ "description": "",
+ "collectionId": "a9a935b5-9481-e4f7-44fb-17d13ef726f9",
+ "responses": [],
+ "rawModeData": "{\r\n \"nsh-map\": [\r\n {\r\n \"name\": \"nshMap7\",\r\n \"nsp\": \"185\",\r\n \"nsi\": \"255\",\r\n \"mapped-nsp\": \"185\",\r\n \"mapped-nsi\": \"255\",\r\n \"nsh-action\": \"push\",\r\n \"encap-type\": \"vxlan-gpe\",\r\n \"encap-if-name\": \"vxlanGpeTun7\"\r\n }\r\n ]\r\n}"
+ },
+ {
"id": "5b6f7bc9-12c2-082e-56bf-cb5b9c39cc98",
"headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n",
"url": "http://localhost:8183/restconf/config/vpp-nsh:vpp-nsh/nsh-maps/nsh-map/nshMap1",
@@ -521,6 +626,26 @@
"rawModeData": "{\r\n \r\n \"nsh-entry\": [\r\n {\r\n \"name\": \"nshEntry5\",\r\n \"description\": \"for testing nshEntry\",\r\n \"version\": \"0\",\r\n \"length\": \"6\",\r\n \"next-protocol\": \"Ethernet\",\r\n \"md-type\": \"MdType1\",\r\n \"nsp\": \"185\",\r\n \"nsi\": \"255\" \r\n }\r\n ]\r\n \r\n}"
},
{
+ "id": "66f2284b-9b78-e472-0cef-5e00153eb775",
+ "headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n",
+ "url": "http://localhost:8183/restconf/config/vpp-nsh:vpp-nsh/nsh-entries/nsh-entry/nshEntry7",
+ "preRequestScript": "",
+ "pathVariables": {},
+ "method": "PUT",
+ "data": [],
+ "dataMode": "raw",
+ "version": 2,
+ "tests": "",
+ "currentHelper": "normal",
+ "helperAttributes": {},
+ "time": 1484632368244,
+ "name": "7_Add nsh-entry from Classifier to SFF - cfg",
+ "description": "",
+ "collectionId": "a9a935b5-9481-e4f7-44fb-17d13ef726f9",
+ "responses": [],
+ "rawModeData": "{\r\n \"nsh-entry\": [\r\n {\r\n \"name\": \"nshEntry7\",\r\n \"version\": \"0\",\r\n \"length\": \"6\",\r\n \"md-type\": \"md-type1\",\r\n \"next-protocol\": \"ethernet\",\r\n \"nsp\": \"185\",\r\n \"nsi\": \"255\",\r\n \"c1\": \"1\",\r\n \"c2\": \"2\",\r\n \"c3\": \"3\",\r\n \"c4\": \"4\"\r\n }\r\n ]\r\n}"
+ },
+ {
"id": "6959ea60-82ac-064e-f3a4-65908f9a8992",
"headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n",
"url": "http://localhost:8183/restconf/config/ietf-interfaces:interfaces/interface/vxlanGpeTun3",
@@ -601,6 +726,26 @@
"rawModeData": "{\r\n \"nsh-entry\": [\r\n {\r\n \"name\": \"nshEntry2\",\r\n \"version\": \"0\",\r\n \"length\": \"6\",\r\n \"md-type\": \"md-type1\",\r\n \"next-protocol\": \"ethernet\",\r\n \"nsp\": \"185\",\r\n \"nsi\": \"254\",\r\n \"c1\": \"11\",\r\n \"c2\": \"12\",\r\n \"c3\": \"13\",\r\n \"c4\": \"14\"\r\n }\r\n ]\r\n}"
},
{
+ "id": "8a02106e-4c3b-b08f-7607-e766fc460d15",
+ "headers": "Content-Type: application/json\nAuthorization: Basic YWRtaW46YWRtaW4=\n",
+ "url": "http://localhost:8183/restconf/config/v3po:vpp/bridge-domains/bridge-domain/l2_classifier_bd",
+ "preRequestScript": "",
+ "pathVariables": {},
+ "method": "PUT",
+ "data": [],
+ "dataMode": "raw",
+ "version": 2,
+ "tests": "",
+ "currentHelper": "normal",
+ "helperAttributes": {},
+ "time": 1484632357098,
+ "name": "3_Create bridge domain - cfg",
+ "description": "Creates bridgfe domain. Corresponds to invoking:\n\nvat# bridge_domain_add_del bd_id [bd_id] learn 0 forward 0 uu-flood 0 flood 1 arp-term 0\n\nTo verify run:\n\nvppctl show bridge-domain [bd_id] detail",
+ "collectionId": "a9a935b5-9481-e4f7-44fb-17d13ef726f9",
+ "responses": [],
+ "rawModeData": "{\r\n \"bridge-domain\": [\r\n {\r\n \"name\": \"l2_classifier_bd\",\r\n \"flood\": \"true\",\r\n \"forward\": \"false\",\r\n \"learn\": \"false\",\r\n \"unknown-unicast-flood\": \"false\",\r\n \"arp-termination\": \"false\"\r\n }\r\n ]\r\n}"
+ },
+ {
"id": "911beeb5-61c1-bdb5-a850-96171a6686ae",
"headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n",
"url": "http://localhost:8183/restconf/config/vpp-nsh:vpp-nsh/nsh-maps/nsh-map/nshMap5",
@@ -621,6 +766,46 @@
"rawModeData": "{\r\n \"nsh-map\": [\r\n {\r\n \"name\": \"nshMap5\",\r\n \"nsp\": \"184\",\r\n \"nsi\": \"255\",\r\n \"mapped-nsp\": \"183\",\r\n \"mapped-nsi\": \"254\",\r\n \"nsh-action\": \"push\",\r\n \"encap-type\": \"vxlan-gpe\",\r\n \"encap-if-name\": \"vxlanGpeTun3\"\r\n }\r\n ]\r\n}"
},
{
+ "id": "9232139c-c6b6-403c-39a6-13c975370220",
+ "headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n",
+ "url": "http://localhost:8183/restconf/config/vpp-classifier:vpp-classifier/classify-table/table1/classify-session/00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:06:00:00:00:00:00:00:00:00",
+ "preRequestScript": "",
+ "pathVariables": {},
+ "method": "PUT",
+ "data": [],
+ "dataMode": "raw",
+ "version": 2,
+ "tests": "",
+ "currentHelper": "normal",
+ "helperAttributes": {},
+ "time": 1484632354638,
+ "name": "2_Add classify session - cfg",
+ "description": "Adds classify session to table0. Corresponding vpp cli command:\n\nvppctl classify session acl-hit-next deny opaque-index 0 table-index 0 match l2 src 01:02:03:04:05:06\n\nTo verify invoke:\n\nvppctl sh class table verbose",
+ "collectionId": "a9a935b5-9481-e4f7-44fb-17d13ef726f9",
+ "responses": [],
+ "rawModeData": "{\n \"classify-session\": [\n {\n \"hit_next\": \"nsh-classifier\",\n \"opaque_index\": \"47615\",\n \"match\": \"00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:06:00:00:00:00:00:00:00:00\"\n }\n ]\n}"
+ },
+ {
+ "id": "9253bf49-b00d-8a39-b88b-483c4711bc07",
+ "headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n",
+ "url": "http://localhost:8183/restconf/config/ietf-interfaces:interfaces/interface/TenGigabitEthernet5%2F0%2F0/v3po:acl/ingress",
+ "preRequestScript": "",
+ "pathVariables": {},
+ "method": "DELETE",
+ "data": [],
+ "dataMode": "raw",
+ "version": 2,
+ "tests": "",
+ "currentHelper": "normal",
+ "helperAttributes": {},
+ "time": 1484632381203,
+ "name": "4_Disable Ipv4 ACL on interface - cfg",
+ "description": "Enables L2 and Ipv4 ACL on local0. Corresponding vpp cli commands:\n\nset int input acl intfc local0 l2-table 0\n\nset int input acl intfc local0 ip4-table 0\n\nTo verify invoke:\n\nvppctl show inacl type l2\n\nthen:\n\nvppctl show inacl type ip4",
+ "collectionId": "a9a935b5-9481-e4f7-44fb-17d13ef726f9",
+ "responses": [],
+ "rawModeData": "{\n \"ingress\": {\n \"ip4-acl\": {\n \"classify-table\": \"table1\"\n }\n }\n}"
+ },
+ {
"id": "9a36fb7d-ed6a-6a1d-8b8e-c4c3eb1cb154",
"headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n",
"url": "http://localhost:8183/restconf/config/ietf-interfaces:interfaces/interface/vxlanGpeTun2",
@@ -661,6 +846,26 @@
"rawModeData": "{\r\n \r\n \"interface\": [\r\n {\r\n \"name\": \"vxlanGpeTun4\",\r\n \"description\": \"for testing purposes\",\r\n \"type\": \"v3po:vxlan-gpe-tunnel\",\r\n \"enabled\": \"true\",\r\n \"link-up-down-trap-enable\": \"enabled\",\r\n \"routing\" : {\r\n \"ipv4-vrf-id\" : \"0\"\r\n },\r\n \"vxlan-gpe\" : {\r\n \"local\" : \"192.168.50.73\",\r\n \"remote\" : \"192.168.50.76\",\r\n \"vni\" : \"9\",\r\n \"next-protocol\" : \"nsh\",\r\n \"encap-vrf-id\" : \"0\",\r\n \"decap-vrf-id\" : \"0\"\r\n }\r\n }\r\n ]\r\n \r\n}"
},
{
+ "id": "adc501e7-e3bb-ce73-b2a0-b85615ab15dd",
+ "headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n",
+ "url": "http://localhost:8183/restconf/config/ietf-interfaces:interfaces/interface/vxlanGpeTun7",
+ "preRequestScript": "",
+ "pathVariables": {},
+ "method": "DELETE",
+ "data": [],
+ "dataMode": "raw",
+ "version": 2,
+ "tests": "",
+ "currentHelper": "normal",
+ "helperAttributes": {},
+ "time": 1484632378649,
+ "name": "3_Delete vxlan-gpe to SFF2 - cfg",
+ "description": "",
+ "collectionId": "a9a935b5-9481-e4f7-44fb-17d13ef726f9",
+ "responses": [],
+ "rawModeData": ""
+ },
+ {
"id": "b10b8a26-ae8d-b89a-b711-8ea5118071d5",
"headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n",
"url": "http://localhost:8183/restconf/config/vpp-nsh:vpp-nsh/nsh-entries/nsh-entry/nshEntry5",
@@ -681,6 +886,26 @@
"rawModeData": "{\r\n \"nsh-entry\": [\r\n {\r\n \"name\": \"nshEntry5\",\r\n \"version\": \"0\",\r\n \"length\": \"6\",\r\n \"md-type\": \"md-type1\",\r\n \"next-protocol\": \"ethernet\",\r\n \"nsp\": \"185\",\r\n \"nsi\": \"254\" \r\n }\r\n ]\r\n}"
},
{
+ "id": "b15ceb4d-4214-858a-a888-bb11b7f0b338",
+ "headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n",
+ "url": "http://localhost:8183/restconf/config/ietf-interfaces:interfaces/interface/vxlanGpeTun7",
+ "preRequestScript": "",
+ "pathVariables": {},
+ "method": "PUT",
+ "data": [],
+ "dataMode": "raw",
+ "version": 2,
+ "tests": "",
+ "currentHelper": "normal",
+ "helperAttributes": {},
+ "time": 1484632365137,
+ "name": "6_Add vxlan-gpe from Classifier to SFF - cfg",
+ "description": "",
+ "collectionId": "a9a935b5-9481-e4f7-44fb-17d13ef726f9",
+ "responses": [],
+ "rawModeData": "{\r\n \r\n \"interface\": [\r\n {\r\n \"name\": \"vxlanGpeTun7\",\r\n \"description\": \"for testing purposes\",\r\n \"type\": \"v3po:vxlan-gpe-tunnel\",\r\n \"enabled\": \"true\",\r\n \"link-up-down-trap-enable\": \"enabled\",\r\n \"routing\" : {\r\n \"ipv4-vrf-id\" : \"0\"\r\n },\r\n \"vxlan-gpe\" : {\r\n \"local\" : \"192.168.50.71\",\r\n \"remote\" : \"192.168.50.76\",\r\n \"vni\" : \"9\",\r\n \"next-protocol\" : \"nsh\",\r\n \"encap-vrf-id\" : \"0\",\r\n \"decap-vrf-id\" : \"0\"\r\n }\r\n }\r\n ]\r\n \r\n}"
+ },
+ {
"id": "b18d5cc2-7c42-0aee-152b-27b822a7bc66",
"headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n",
"url": "http://localhost:8183/restconf/config/ietf-interfaces:interfaces/interface/vxlanTun1",
@@ -701,6 +926,26 @@
"rawModeData": "{\r\n \r\n \"interface\": [\r\n {\r\n \"name\": \"vxlanTun1\",\r\n \"description\": \"for testing purposes\",\r\n \"type\": \"v3po:vxlan-tunnel\",\r\n \"enabled\": \"true\",\r\n \"link-up-down-trap-enable\": \"enabled\",\r\n \"routing\" : {\r\n \"ipv4-vrf-id\" : \"0\"\r\n },\r\n \"vxlan\" : {\r\n \"src\" : \"192.168.1.6\",\r\n \"dst\" : \"192.168.1.9\",\r\n \"vni\" : \"88\",\r\n \"encap-vrf-id\" : \"0\"\r\n }\r\n }\r\n ]\r\n \r\n}"
},
{
+ "id": "b3219f66-7c1c-e3be-0285-f521639191de",
+ "headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n",
+ "url": "http://localhost:8183/restconf/config/ietf-interfaces:interfaces/interface/TenGigabitEthernet5%2F0%2F0/v3po:acl/ingress",
+ "preRequestScript": "",
+ "pathVariables": {},
+ "method": "PUT",
+ "data": [],
+ "dataMode": "raw",
+ "version": 2,
+ "tests": "",
+ "currentHelper": "normal",
+ "helperAttributes": {},
+ "time": 1484632362696,
+ "name": "5_Enable Ipv4 ACL on interface - cfg",
+ "description": "Enables L2 and Ipv4 ACL on local0. Corresponding vpp cli commands:\n\nset int input acl intfc local0 l2-table 0\n\nset int input acl intfc local0 ip4-table 0\n\nTo verify invoke:\n\nvppctl show inacl type l2\n\nthen:\n\nvppctl show inacl type ip4",
+ "collectionId": "a9a935b5-9481-e4f7-44fb-17d13ef726f9",
+ "responses": [],
+ "rawModeData": "{\n \"ingress\": {\n \"ip4-acl\": {\n \"classify-table\": \"table1\"\n }\n }\n}"
+ },
+ {
"id": "baad4b5e-e213-78a8-6335-33e62ce3d819",
"headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n",
"url": "http://localhost:8183/restconf/config/vpp-nsh:vpp-nsh/nsh-entries/nsh-entry/nshEntry4",
@@ -801,6 +1046,26 @@
"rawModeData": "{\r\n \r\n \"interface\": [\r\n {\r\n \"name\": \"vxlanGpeTun3\",\r\n \"description\": \"for testing purposes\",\r\n \"type\": \"v3po:vxlan-gpe-tunnel\",\r\n \"enabled\": \"true\",\r\n \"link-up-down-trap-enable\": \"enabled\",\r\n \"routing\" : {\r\n \"vrf-id\" : \"0\"\r\n },\r\n \"vxlan-gpe\" : {\r\n \"local\" : \"192.168.50.76\",\r\n \"remote\" : \"192.168.50.71\",\r\n \"vni\" : \"9\",\r\n \"next-protocol\" : \"ethernet\",\r\n \"encap-vrf-id\" : \"0\",\r\n \"decap-vrf-id\" : \"0\"\r\n }\r\n }\r\n ]\r\n \r\n}"
},
{
+ "id": "cebf8294-aa91-cf21-342a-0d8f234176be",
+ "headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n",
+ "url": "http://localhost:8183/restconf/config/vpp-nsh:vpp-nsh/nsh-entries/nsh-entry/nshEntry7",
+ "preRequestScript": "",
+ "pathVariables": {},
+ "method": "DELETE",
+ "data": [],
+ "dataMode": "raw",
+ "version": 2,
+ "tests": "",
+ "currentHelper": "normal",
+ "helperAttributes": {},
+ "time": 1484632375680,
+ "name": "2_Delete nsh-entry from SF- cfg",
+ "description": "",
+ "collectionId": "a9a935b5-9481-e4f7-44fb-17d13ef726f9",
+ "responses": [],
+ "rawModeData": "{\r\n \"nsh-entry\": [\r\n {\r\n \"name\": \"nshEntry7\",\r\n \"version\": \"0\",\r\n \"length\": \"6\",\r\n \"md-type\": \"md-type1\",\r\n \"next-protocol\": \"ethernet\",\r\n \"nsp\": \"185\",\r\n \"nsi\": \"255\" \r\n }\r\n ]\r\n}"
+ },
+ {
"id": "cf046cce-141c-3d9b-704b-8b04e743baf6",
"headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n",
"url": "http://localhost:8183/restconf/config/vpp-nsh:vpp-nsh/nsh-maps/nsh-map/nshMap4",
@@ -841,6 +1106,26 @@
"rawModeData": "{\r\n \r\n \"nsh-entry\": [\r\n {\r\n \"name\": \"nshEntry5\",\r\n \"description\": \"for testing nshEntry\",\r\n \"version\": \"0\",\r\n \"length\": \"6\",\r\n \"next-protocol\": \"Ethernet\",\r\n \"md-type\": \"MdType1\",\r\n \"nsp\": \"185\",\r\n \"nsi\": \"255\" \r\n }\r\n ]\r\n \r\n}"
},
{
+ "id": "d7d83338-d147-fee2-5a96-e70159aad0ea",
+ "headers": "Content-Type: application/json\nAuthorization: Basic YWRtaW46YWRtaW4=\n",
+ "url": "http://localhost:8183/restconf/config/ietf-interfaces:interfaces/interface/TenGigabitEthernet5%2F0%2F0/v3po:l2",
+ "preRequestScript": "",
+ "pathVariables": {},
+ "method": "PUT",
+ "data": [],
+ "dataMode": "raw",
+ "version": 2,
+ "tests": "",
+ "currentHelper": "normal",
+ "helperAttributes": {},
+ "time": 1484632360420,
+ "name": "4_Add interface to bridge domain - cfg",
+ "description": "Adds l2 interconnection of bridge-based type to local0 interface.\nCorresponds to the following command:\n\nvppctl set interface l2 bridge local0 [bd_id]\n\nTo verify invoke:\n\nvppctl show bridge-domain [bd_id] detail",
+ "collectionId": "a9a935b5-9481-e4f7-44fb-17d13ef726f9",
+ "responses": [],
+ "rawModeData": "{\r\n \"l2\": {\r\n \"bridge-domain\": \"l2_classifier_bd\",\r\n \"split-horizon-group\": 1,\r\n \"bridged-virtual-interface\": \"false\"\r\n }\r\n}"
+ },
+ {
"id": "db501b30-8ac3-f889-8892-c8c8245a05fa",
"headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n",
"url": "http://localhost:8183/restconf/config/ietf-interfaces:interfaces/interface/vxlanTun1",
@@ -921,6 +1206,26 @@
"rawModeData": "{\r\n \"nsh-entry\": [\r\n {\r\n \"name\": \"nshEntry2\",\r\n \"version\": \"0\",\r\n \"length\": \"6\",\r\n \"md-type\": \"md-type1\",\r\n \"next-protocol\": \"ethernet\",\r\n \"nsp\": \"185\",\r\n \"nsi\": \"254\" \r\n }\r\n ]\r\n}"
},
{
+ "id": "eae0e8fe-8610-8760-1f1c-8d4a6960fe23",
+ "headers": "Content-Type: application/json\nAuthorization: Basic YWRtaW46YWRtaW4=\n",
+ "url": "http://localhost:8183/restconf/config/ietf-interfaces:interfaces/interface/TenGigabitEthernet5%2F0%2F0/v3po:l2",
+ "preRequestScript": "",
+ "pathVariables": {},
+ "method": "DELETE",
+ "data": [],
+ "dataMode": "raw",
+ "version": 2,
+ "tests": "",
+ "currentHelper": "normal",
+ "helperAttributes": {},
+ "time": 1484632384404,
+ "name": "5_Remove interface from bridge domain",
+ "description": "Removes l2 interconnection of bridge-based type from local0 interface.\nCorresponds to the following VAT command:\n\nvat# sw_interface_set_l2_bridge sw_if_index 0 bd_id 1 disable\n\nVerification in VAT:\n\nvat# bridge_domain_dump",
+ "collectionId": "a9a935b5-9481-e4f7-44fb-17d13ef726f9",
+ "responses": [],
+ "rawModeData": ""
+ },
+ {
"id": "ee2676f9-ce96-cae1-2d47-8515fc58dd78",
"headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n",
"url": "http://localhost:8183/restconf/operational/ietf-interfaces:interfaces-state/interface/vxlanGpeTun3",
@@ -961,6 +1266,46 @@
"rawModeData": "{\r\n \r\n \"interface\": [\r\n {\r\n \"name\": \"vxlanGpeTun3\",\r\n \"description\": \"for testing purposes\",\r\n \"type\": \"v3po:vxlan-gpe-tunnel\",\r\n \"enabled\": \"true\",\r\n \"link-up-down-trap-enable\": \"enabled\",\r\n \"routing\" : {\r\n \"vrf-id\" : \"0\"\r\n },\r\n \"vxlan-gpe\" : {\r\n \"local\" : \"192.168.50.76\",\r\n \"remote\" : \"192.168.50.71\",\r\n \"vni\" : \"9\",\r\n \"next-protocol\" : \"ethernet\",\r\n \"encap-vrf-id\" : \"0\",\r\n \"decap-vrf-id\" : \"0\"\r\n }\r\n }\r\n ]\r\n \r\n}"
},
{
+ "id": "f85e69dd-7baf-2d63-6a62-99bffc7f508b",
+ "headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n",
+ "url": "http://localhost:8183/restconf/config/vpp-classifier:vpp-classifier/classify-table/table1",
+ "preRequestScript": "",
+ "pathVariables": {},
+ "method": "DELETE",
+ "data": [],
+ "dataMode": "raw",
+ "version": 2,
+ "tests": "",
+ "currentHelper": "normal",
+ "helperAttributes": {},
+ "time": 1484632392308,
+ "name": "8_Remove classify table1 - cfg",
+ "description": "Adds classify table1. Corresponding vpp cli command:\n\nvppctl classify table mask l2 src\n\nTo verify invoke:\n\nvppctl sh class table verbose\n\nor:\n\nvat# classify_table_info table_id 1",
+ "collectionId": "a9a935b5-9481-e4f7-44fb-17d13ef726f9",
+ "responses": [],
+ "rawModeData": ""
+ },
+ {
+ "id": "f9543e07-3140-222c-d1ac-83283e29a7c6",
+ "headers": "Content-Type: application/json\nAuthorization: Basic YWRtaW46YWRtaW4=\n",
+ "url": "http://localhost:8183/restconf/config/v3po:vpp/bridge-domains/bridge-domain/l2_classifier_bd",
+ "preRequestScript": "",
+ "pathVariables": {},
+ "method": "DELETE",
+ "data": [],
+ "dataMode": "raw",
+ "version": 2,
+ "tests": "",
+ "currentHelper": "normal",
+ "helperAttributes": {},
+ "time": 1484632387304,
+ "name": "6_Remove bridge domain - cfg",
+ "description": "Creates bridgfe domain. Corresponds to invoking:\n\nvat# bridge_domain_add_del bd_id [bd_id] learn 0 forward 0 uu-flood 0 flood 1 arp-term 0\n\nTo verify run:\n\nvppctl show bridge-domain [bd_id] detail",
+ "collectionId": "a9a935b5-9481-e4f7-44fb-17d13ef726f9",
+ "responses": [],
+ "rawModeData": ""
+ },
+ {
"id": "fb8560fc-dda0-f07b-3d31-7c6df2ffd2ba",
"headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n",
"url": "http://localhost:8183/restconf/config/ietf-interfaces:interfaces/interface/vxlanTun5",