diff options
author | Hongjun Ni <hongjun.ni@intel.com> | 2017-01-18 20:50:49 +0800 |
---|---|---|
committer | Marek Gradzki <mgradzki@cisco.com> | 2017-01-18 10:39:53 +0000 |
commit | 75f8aa0f9a1ff45f1be500304fb156a13fb6e6ef (patch) | |
tree | 3d8b760cd379fb19995d7718f153b633b210f082 /nsh | |
parent | 2041dca222a92272c01468d89d315009eb9721ec (diff) |
Add test postman for complete NSH Classifier
Add and Delete configuration items in numeric order
Change-Id: I488cd213e8a6893a6cc173d80a45cb056e8c98e2
Signed-off-by: Hongjun Ni <hongjun.ni@intel.com>
Diffstat (limited to 'nsh')
-rw-r--r-- | nsh/nsh_postman_collection.json | 345 |
1 files changed, 345 insertions, 0 deletions
diff --git a/nsh/nsh_postman_collection.json b/nsh/nsh_postman_collection.json index 84f508c01..db5f957c8 100644 --- a/nsh/nsh_postman_collection.json +++ b/nsh/nsh_postman_collection.json @@ -5,6 +5,31 @@ "order": [], "folders": [ { + "id": "0f0316a8-f686-80b2-728b-d52e6d711d4c", + "name": "NSH_Classifier", + "description": "", + "order": [ + "53496ff6-b3b8-bd37-aa12-a49c83386d86", + "9232139c-c6b6-403c-39a6-13c975370220", + "8a02106e-4c3b-b08f-7607-e766fc460d15", + "d7d83338-d147-fee2-5a96-e70159aad0ea", + "b3219f66-7c1c-e3be-0285-f521639191de", + "b15ceb4d-4214-858a-a888-bb11b7f0b338", + "66f2284b-9b78-e472-0cef-5e00153eb775", + "5ae3c7c7-1ab0-4210-04dc-c2e91c8a4017", + "56a85c94-41ab-0eb2-b84e-25989f87ccbd", + "cebf8294-aa91-cf21-342a-0d8f234176be", + "adc501e7-e3bb-ce73-b2a0-b85615ab15dd", + "9253bf49-b00d-8a39-b88b-483c4711bc07", + "eae0e8fe-8610-8760-1f1c-8d4a6960fe23", + "f9543e07-3140-222c-d1ac-83283e29a7c6", + "1907ae3a-25e1-f980-6e29-d612aa72b999", + "f85e69dd-7baf-2d63-6a62-99bffc7f508b" + ], + "owner": "652751", + "collectionId": "a9a935b5-9481-e4f7-44fb-17d13ef726f9" + }, + { "id": "42e7fe47-c72a-1db4-db53-ba1ba4385691", "name": "NSH_Proxy", "description": "", @@ -181,6 +206,26 @@ "rawModeData": "" }, { + "id": "1907ae3a-25e1-f980-6e29-d612aa72b999", + "headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n", + "url": "http://localhost:8183/restconf/config/vpp-classifier:vpp-classifier/classify-table/table1/classify-session/00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:06:00:00:00:00:00:00:00:00", + "preRequestScript": "", + "pathVariables": {}, + "method": "DELETE", + "data": [], + "dataMode": "raw", + "version": 2, + "tests": "", + "currentHelper": "normal", + "helperAttributes": {}, + "time": 1484632389744, + "name": "7_Remove classify session - cfg", + "description": "Adds classify session to table0. Corresponding vpp cli command:\n\nvppctl classify session acl-hit-next deny opaque-index 0 table-index 0 match l2 src 01:02:03:04:05:06\n\nTo verify invoke:\n\nvppctl sh class table verbose", + "collectionId": "a9a935b5-9481-e4f7-44fb-17d13ef726f9", + "responses": [], + "rawModeData": "" + }, + { "id": "1a24235c-7f73-daef-291e-4307b05a330f", "headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n", "url": "http://localhost:8183/restconf/config/vpp-nsh:vpp-nsh/nsh-maps/nsh-map/nshMap8", @@ -421,6 +466,26 @@ "rawModeData": "{\r\n \r\n \"interface\": [\r\n {\r\n \"name\": \"vxlanTun1\",\r\n \"description\": \"for testing purposes\",\r\n \"type\": \"v3po:vxlan-tunnel\",\r\n \"enabled\": \"true\",\r\n \"link-up-down-trap-enable\": \"enabled\",\r\n \"routing\" : {\r\n \"ipv4-vrf-id\" : \"0\"\r\n },\r\n \"vxlan\" : {\r\n \"src\" : \"192.168.1.6\",\r\n \"dst\" : \"192.168.1.9\",\r\n \"vni\" : \"88\",\r\n \"encap-vrf-id\" : \"0\",\r\n \"decap-next\" : \"nsh-proxy\"\r\n }\r\n }\r\n ]\r\n \r\n}" }, { + "id": "53496ff6-b3b8-bd37-aa12-a49c83386d86", + "headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n", + "url": "http://localhost:8183/restconf/config/vpp-classifier:vpp-classifier/classify-table/table1", + "preRequestScript": "", + "pathVariables": {}, + "method": "PUT", + "data": [], + "dataMode": "raw", + "version": 2, + "tests": "", + "currentHelper": "normal", + "helperAttributes": {}, + "time": 1484711092019, + "name": "1_Add classify table1 - cfg", + "description": "Adds classify table1. Corresponding vpp cli command:\n\nvppctl classify table mask l2 src\n\nTo verify invoke:\n\nvppctl sh class table verbose\n\nor:\n\nvat# classify_table_info table_id 1", + "collectionId": "a9a935b5-9481-e4f7-44fb-17d13ef726f9", + "responses": [], + "rawModeData": "{\n \"classify-table\": [\n {\n \"name\": \"table1\",\n \"classifier-node\": \"l2-input-classify\",\n \"nbuckets\": \"2\",\n \"memory_size\": \"1048576\",\n \"miss_next\": \"deny\",\n \"mask\": \"00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:ff:00:00:00:00:00:00:00:00\"\n }\n ]\n}" + }, + { "id": "5375ec48-2553-8cf8-42a5-2f914941411a", "headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n", "url": "http://localhost:8183/restconf/config/vpp-nsh:vpp-nsh/nsh-entries/nsh-entry/nshEntry5", @@ -461,6 +526,46 @@ "rawModeData": "{\r\n \r\n \"nsh-entry\": [\r\n {\r\n \"name\": \"nshEntry5\",\r\n \"description\": \"for testing nshEntry\",\r\n \"version\": \"0\",\r\n \"length\": \"6\",\r\n \"next-protocol\": \"Ethernet\",\r\n \"md-type\": \"MdType1\",\r\n \"nsp\": \"185\",\r\n \"nsi\": \"255\" \r\n }\r\n ]\r\n \r\n}" }, { + "id": "56a85c94-41ab-0eb2-b84e-25989f87ccbd", + "headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n", + "url": "http://localhost:8183/restconf/config/vpp-nsh:vpp-nsh/nsh-maps/nsh-map/nshMap7", + "preRequestScript": "", + "pathVariables": {}, + "method": "DELETE", + "data": [], + "dataMode": "raw", + "version": 2, + "tests": "", + "currentHelper": "normal", + "helperAttributes": {}, + "time": 1484632373158, + "name": "1_Delete nsh-map from SF to SFF2 - cfg", + "description": "", + "collectionId": "a9a935b5-9481-e4f7-44fb-17d13ef726f9", + "responses": [], + "rawModeData": "{\r\n \"nsh-map\": [\r\n {\r\n \"name\": \"nshMap7\",\r\n \"nsp\": \"185\",\r\n \"nsi\": \"255\",\r\n \"mapped-nsp\": \"185\",\r\n \"mapped-nsi\": \"255\" \r\n }\r\n ]\r\n}" + }, + { + "id": "5ae3c7c7-1ab0-4210-04dc-c2e91c8a4017", + "headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n", + "url": "http://localhost:8183/restconf/config/vpp-nsh:vpp-nsh/nsh-maps/nsh-map/nshMap7", + "preRequestScript": "", + "pathVariables": {}, + "method": "PUT", + "data": [], + "dataMode": "raw", + "version": 2, + "tests": "", + "currentHelper": "normal", + "helperAttributes": {}, + "time": 1484632370544, + "name": "8_Add nsh-map from Classifier to SFF - cfg", + "description": "", + "collectionId": "a9a935b5-9481-e4f7-44fb-17d13ef726f9", + "responses": [], + "rawModeData": "{\r\n \"nsh-map\": [\r\n {\r\n \"name\": \"nshMap7\",\r\n \"nsp\": \"185\",\r\n \"nsi\": \"255\",\r\n \"mapped-nsp\": \"185\",\r\n \"mapped-nsi\": \"255\",\r\n \"nsh-action\": \"push\",\r\n \"encap-type\": \"vxlan-gpe\",\r\n \"encap-if-name\": \"vxlanGpeTun7\"\r\n }\r\n ]\r\n}" + }, + { "id": "5b6f7bc9-12c2-082e-56bf-cb5b9c39cc98", "headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n", "url": "http://localhost:8183/restconf/config/vpp-nsh:vpp-nsh/nsh-maps/nsh-map/nshMap1", @@ -521,6 +626,26 @@ "rawModeData": "{\r\n \r\n \"nsh-entry\": [\r\n {\r\n \"name\": \"nshEntry5\",\r\n \"description\": \"for testing nshEntry\",\r\n \"version\": \"0\",\r\n \"length\": \"6\",\r\n \"next-protocol\": \"Ethernet\",\r\n \"md-type\": \"MdType1\",\r\n \"nsp\": \"185\",\r\n \"nsi\": \"255\" \r\n }\r\n ]\r\n \r\n}" }, { + "id": "66f2284b-9b78-e472-0cef-5e00153eb775", + "headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n", + "url": "http://localhost:8183/restconf/config/vpp-nsh:vpp-nsh/nsh-entries/nsh-entry/nshEntry7", + "preRequestScript": "", + "pathVariables": {}, + "method": "PUT", + "data": [], + "dataMode": "raw", + "version": 2, + "tests": "", + "currentHelper": "normal", + "helperAttributes": {}, + "time": 1484632368244, + "name": "7_Add nsh-entry from Classifier to SFF - cfg", + "description": "", + "collectionId": "a9a935b5-9481-e4f7-44fb-17d13ef726f9", + "responses": [], + "rawModeData": "{\r\n \"nsh-entry\": [\r\n {\r\n \"name\": \"nshEntry7\",\r\n \"version\": \"0\",\r\n \"length\": \"6\",\r\n \"md-type\": \"md-type1\",\r\n \"next-protocol\": \"ethernet\",\r\n \"nsp\": \"185\",\r\n \"nsi\": \"255\",\r\n \"c1\": \"1\",\r\n \"c2\": \"2\",\r\n \"c3\": \"3\",\r\n \"c4\": \"4\"\r\n }\r\n ]\r\n}" + }, + { "id": "6959ea60-82ac-064e-f3a4-65908f9a8992", "headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n", "url": "http://localhost:8183/restconf/config/ietf-interfaces:interfaces/interface/vxlanGpeTun3", @@ -601,6 +726,26 @@ "rawModeData": "{\r\n \"nsh-entry\": [\r\n {\r\n \"name\": \"nshEntry2\",\r\n \"version\": \"0\",\r\n \"length\": \"6\",\r\n \"md-type\": \"md-type1\",\r\n \"next-protocol\": \"ethernet\",\r\n \"nsp\": \"185\",\r\n \"nsi\": \"254\",\r\n \"c1\": \"11\",\r\n \"c2\": \"12\",\r\n \"c3\": \"13\",\r\n \"c4\": \"14\"\r\n }\r\n ]\r\n}" }, { + "id": "8a02106e-4c3b-b08f-7607-e766fc460d15", + "headers": "Content-Type: application/json\nAuthorization: Basic YWRtaW46YWRtaW4=\n", + "url": "http://localhost:8183/restconf/config/v3po:vpp/bridge-domains/bridge-domain/l2_classifier_bd", + "preRequestScript": "", + "pathVariables": {}, + "method": "PUT", + "data": [], + "dataMode": "raw", + "version": 2, + "tests": "", + "currentHelper": "normal", + "helperAttributes": {}, + "time": 1484632357098, + "name": "3_Create bridge domain - cfg", + "description": "Creates bridgfe domain. Corresponds to invoking:\n\nvat# bridge_domain_add_del bd_id [bd_id] learn 0 forward 0 uu-flood 0 flood 1 arp-term 0\n\nTo verify run:\n\nvppctl show bridge-domain [bd_id] detail", + "collectionId": "a9a935b5-9481-e4f7-44fb-17d13ef726f9", + "responses": [], + "rawModeData": "{\r\n \"bridge-domain\": [\r\n {\r\n \"name\": \"l2_classifier_bd\",\r\n \"flood\": \"true\",\r\n \"forward\": \"false\",\r\n \"learn\": \"false\",\r\n \"unknown-unicast-flood\": \"false\",\r\n \"arp-termination\": \"false\"\r\n }\r\n ]\r\n}" + }, + { "id": "911beeb5-61c1-bdb5-a850-96171a6686ae", "headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n", "url": "http://localhost:8183/restconf/config/vpp-nsh:vpp-nsh/nsh-maps/nsh-map/nshMap5", @@ -621,6 +766,46 @@ "rawModeData": "{\r\n \"nsh-map\": [\r\n {\r\n \"name\": \"nshMap5\",\r\n \"nsp\": \"184\",\r\n \"nsi\": \"255\",\r\n \"mapped-nsp\": \"183\",\r\n \"mapped-nsi\": \"254\",\r\n \"nsh-action\": \"push\",\r\n \"encap-type\": \"vxlan-gpe\",\r\n \"encap-if-name\": \"vxlanGpeTun3\"\r\n }\r\n ]\r\n}" }, { + "id": "9232139c-c6b6-403c-39a6-13c975370220", + "headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n", + "url": "http://localhost:8183/restconf/config/vpp-classifier:vpp-classifier/classify-table/table1/classify-session/00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:06:00:00:00:00:00:00:00:00", + "preRequestScript": "", + "pathVariables": {}, + "method": "PUT", + "data": [], + "dataMode": "raw", + "version": 2, + "tests": "", + "currentHelper": "normal", + "helperAttributes": {}, + "time": 1484632354638, + "name": "2_Add classify session - cfg", + "description": "Adds classify session to table0. Corresponding vpp cli command:\n\nvppctl classify session acl-hit-next deny opaque-index 0 table-index 0 match l2 src 01:02:03:04:05:06\n\nTo verify invoke:\n\nvppctl sh class table verbose", + "collectionId": "a9a935b5-9481-e4f7-44fb-17d13ef726f9", + "responses": [], + "rawModeData": "{\n \"classify-session\": [\n {\n \"hit_next\": \"nsh-classifier\",\n \"opaque_index\": \"47615\",\n \"match\": \"00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:06:00:00:00:00:00:00:00:00\"\n }\n ]\n}" + }, + { + "id": "9253bf49-b00d-8a39-b88b-483c4711bc07", + "headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n", + "url": "http://localhost:8183/restconf/config/ietf-interfaces:interfaces/interface/TenGigabitEthernet5%2F0%2F0/v3po:acl/ingress", + "preRequestScript": "", + "pathVariables": {}, + "method": "DELETE", + "data": [], + "dataMode": "raw", + "version": 2, + "tests": "", + "currentHelper": "normal", + "helperAttributes": {}, + "time": 1484632381203, + "name": "4_Disable Ipv4 ACL on interface - cfg", + "description": "Enables L2 and Ipv4 ACL on local0. Corresponding vpp cli commands:\n\nset int input acl intfc local0 l2-table 0\n\nset int input acl intfc local0 ip4-table 0\n\nTo verify invoke:\n\nvppctl show inacl type l2\n\nthen:\n\nvppctl show inacl type ip4", + "collectionId": "a9a935b5-9481-e4f7-44fb-17d13ef726f9", + "responses": [], + "rawModeData": "{\n \"ingress\": {\n \"ip4-acl\": {\n \"classify-table\": \"table1\"\n }\n }\n}" + }, + { "id": "9a36fb7d-ed6a-6a1d-8b8e-c4c3eb1cb154", "headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n", "url": "http://localhost:8183/restconf/config/ietf-interfaces:interfaces/interface/vxlanGpeTun2", @@ -661,6 +846,26 @@ "rawModeData": "{\r\n \r\n \"interface\": [\r\n {\r\n \"name\": \"vxlanGpeTun4\",\r\n \"description\": \"for testing purposes\",\r\n \"type\": \"v3po:vxlan-gpe-tunnel\",\r\n \"enabled\": \"true\",\r\n \"link-up-down-trap-enable\": \"enabled\",\r\n \"routing\" : {\r\n \"ipv4-vrf-id\" : \"0\"\r\n },\r\n \"vxlan-gpe\" : {\r\n \"local\" : \"192.168.50.73\",\r\n \"remote\" : \"192.168.50.76\",\r\n \"vni\" : \"9\",\r\n \"next-protocol\" : \"nsh\",\r\n \"encap-vrf-id\" : \"0\",\r\n \"decap-vrf-id\" : \"0\"\r\n }\r\n }\r\n ]\r\n \r\n}" }, { + "id": "adc501e7-e3bb-ce73-b2a0-b85615ab15dd", + "headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n", + "url": "http://localhost:8183/restconf/config/ietf-interfaces:interfaces/interface/vxlanGpeTun7", + "preRequestScript": "", + "pathVariables": {}, + "method": "DELETE", + "data": [], + "dataMode": "raw", + "version": 2, + "tests": "", + "currentHelper": "normal", + "helperAttributes": {}, + "time": 1484632378649, + "name": "3_Delete vxlan-gpe to SFF2 - cfg", + "description": "", + "collectionId": "a9a935b5-9481-e4f7-44fb-17d13ef726f9", + "responses": [], + "rawModeData": "" + }, + { "id": "b10b8a26-ae8d-b89a-b711-8ea5118071d5", "headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n", "url": "http://localhost:8183/restconf/config/vpp-nsh:vpp-nsh/nsh-entries/nsh-entry/nshEntry5", @@ -681,6 +886,26 @@ "rawModeData": "{\r\n \"nsh-entry\": [\r\n {\r\n \"name\": \"nshEntry5\",\r\n \"version\": \"0\",\r\n \"length\": \"6\",\r\n \"md-type\": \"md-type1\",\r\n \"next-protocol\": \"ethernet\",\r\n \"nsp\": \"185\",\r\n \"nsi\": \"254\" \r\n }\r\n ]\r\n}" }, { + "id": "b15ceb4d-4214-858a-a888-bb11b7f0b338", + "headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n", + "url": "http://localhost:8183/restconf/config/ietf-interfaces:interfaces/interface/vxlanGpeTun7", + "preRequestScript": "", + "pathVariables": {}, + "method": "PUT", + "data": [], + "dataMode": "raw", + "version": 2, + "tests": "", + "currentHelper": "normal", + "helperAttributes": {}, + "time": 1484632365137, + "name": "6_Add vxlan-gpe from Classifier to SFF - cfg", + "description": "", + "collectionId": "a9a935b5-9481-e4f7-44fb-17d13ef726f9", + "responses": [], + "rawModeData": "{\r\n \r\n \"interface\": [\r\n {\r\n \"name\": \"vxlanGpeTun7\",\r\n \"description\": \"for testing purposes\",\r\n \"type\": \"v3po:vxlan-gpe-tunnel\",\r\n \"enabled\": \"true\",\r\n \"link-up-down-trap-enable\": \"enabled\",\r\n \"routing\" : {\r\n \"ipv4-vrf-id\" : \"0\"\r\n },\r\n \"vxlan-gpe\" : {\r\n \"local\" : \"192.168.50.71\",\r\n \"remote\" : \"192.168.50.76\",\r\n \"vni\" : \"9\",\r\n \"next-protocol\" : \"nsh\",\r\n \"encap-vrf-id\" : \"0\",\r\n \"decap-vrf-id\" : \"0\"\r\n }\r\n }\r\n ]\r\n \r\n}" + }, + { "id": "b18d5cc2-7c42-0aee-152b-27b822a7bc66", "headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n", "url": "http://localhost:8183/restconf/config/ietf-interfaces:interfaces/interface/vxlanTun1", @@ -701,6 +926,26 @@ "rawModeData": "{\r\n \r\n \"interface\": [\r\n {\r\n \"name\": \"vxlanTun1\",\r\n \"description\": \"for testing purposes\",\r\n \"type\": \"v3po:vxlan-tunnel\",\r\n \"enabled\": \"true\",\r\n \"link-up-down-trap-enable\": \"enabled\",\r\n \"routing\" : {\r\n \"ipv4-vrf-id\" : \"0\"\r\n },\r\n \"vxlan\" : {\r\n \"src\" : \"192.168.1.6\",\r\n \"dst\" : \"192.168.1.9\",\r\n \"vni\" : \"88\",\r\n \"encap-vrf-id\" : \"0\"\r\n }\r\n }\r\n ]\r\n \r\n}" }, { + "id": "b3219f66-7c1c-e3be-0285-f521639191de", + "headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n", + "url": "http://localhost:8183/restconf/config/ietf-interfaces:interfaces/interface/TenGigabitEthernet5%2F0%2F0/v3po:acl/ingress", + "preRequestScript": "", + "pathVariables": {}, + "method": "PUT", + "data": [], + "dataMode": "raw", + "version": 2, + "tests": "", + "currentHelper": "normal", + "helperAttributes": {}, + "time": 1484632362696, + "name": "5_Enable Ipv4 ACL on interface - cfg", + "description": "Enables L2 and Ipv4 ACL on local0. Corresponding vpp cli commands:\n\nset int input acl intfc local0 l2-table 0\n\nset int input acl intfc local0 ip4-table 0\n\nTo verify invoke:\n\nvppctl show inacl type l2\n\nthen:\n\nvppctl show inacl type ip4", + "collectionId": "a9a935b5-9481-e4f7-44fb-17d13ef726f9", + "responses": [], + "rawModeData": "{\n \"ingress\": {\n \"ip4-acl\": {\n \"classify-table\": \"table1\"\n }\n }\n}" + }, + { "id": "baad4b5e-e213-78a8-6335-33e62ce3d819", "headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n", "url": "http://localhost:8183/restconf/config/vpp-nsh:vpp-nsh/nsh-entries/nsh-entry/nshEntry4", @@ -801,6 +1046,26 @@ "rawModeData": "{\r\n \r\n \"interface\": [\r\n {\r\n \"name\": \"vxlanGpeTun3\",\r\n \"description\": \"for testing purposes\",\r\n \"type\": \"v3po:vxlan-gpe-tunnel\",\r\n \"enabled\": \"true\",\r\n \"link-up-down-trap-enable\": \"enabled\",\r\n \"routing\" : {\r\n \"vrf-id\" : \"0\"\r\n },\r\n \"vxlan-gpe\" : {\r\n \"local\" : \"192.168.50.76\",\r\n \"remote\" : \"192.168.50.71\",\r\n \"vni\" : \"9\",\r\n \"next-protocol\" : \"ethernet\",\r\n \"encap-vrf-id\" : \"0\",\r\n \"decap-vrf-id\" : \"0\"\r\n }\r\n }\r\n ]\r\n \r\n}" }, { + "id": "cebf8294-aa91-cf21-342a-0d8f234176be", + "headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n", + "url": "http://localhost:8183/restconf/config/vpp-nsh:vpp-nsh/nsh-entries/nsh-entry/nshEntry7", + "preRequestScript": "", + "pathVariables": {}, + "method": "DELETE", + "data": [], + "dataMode": "raw", + "version": 2, + "tests": "", + "currentHelper": "normal", + "helperAttributes": {}, + "time": 1484632375680, + "name": "2_Delete nsh-entry from SF- cfg", + "description": "", + "collectionId": "a9a935b5-9481-e4f7-44fb-17d13ef726f9", + "responses": [], + "rawModeData": "{\r\n \"nsh-entry\": [\r\n {\r\n \"name\": \"nshEntry7\",\r\n \"version\": \"0\",\r\n \"length\": \"6\",\r\n \"md-type\": \"md-type1\",\r\n \"next-protocol\": \"ethernet\",\r\n \"nsp\": \"185\",\r\n \"nsi\": \"255\" \r\n }\r\n ]\r\n}" + }, + { "id": "cf046cce-141c-3d9b-704b-8b04e743baf6", "headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n", "url": "http://localhost:8183/restconf/config/vpp-nsh:vpp-nsh/nsh-maps/nsh-map/nshMap4", @@ -841,6 +1106,26 @@ "rawModeData": "{\r\n \r\n \"nsh-entry\": [\r\n {\r\n \"name\": \"nshEntry5\",\r\n \"description\": \"for testing nshEntry\",\r\n \"version\": \"0\",\r\n \"length\": \"6\",\r\n \"next-protocol\": \"Ethernet\",\r\n \"md-type\": \"MdType1\",\r\n \"nsp\": \"185\",\r\n \"nsi\": \"255\" \r\n }\r\n ]\r\n \r\n}" }, { + "id": "d7d83338-d147-fee2-5a96-e70159aad0ea", + "headers": "Content-Type: application/json\nAuthorization: Basic YWRtaW46YWRtaW4=\n", + "url": "http://localhost:8183/restconf/config/ietf-interfaces:interfaces/interface/TenGigabitEthernet5%2F0%2F0/v3po:l2", + "preRequestScript": "", + "pathVariables": {}, + "method": "PUT", + "data": [], + "dataMode": "raw", + "version": 2, + "tests": "", + "currentHelper": "normal", + "helperAttributes": {}, + "time": 1484632360420, + "name": "4_Add interface to bridge domain - cfg", + "description": "Adds l2 interconnection of bridge-based type to local0 interface.\nCorresponds to the following command:\n\nvppctl set interface l2 bridge local0 [bd_id]\n\nTo verify invoke:\n\nvppctl show bridge-domain [bd_id] detail", + "collectionId": "a9a935b5-9481-e4f7-44fb-17d13ef726f9", + "responses": [], + "rawModeData": "{\r\n \"l2\": {\r\n \"bridge-domain\": \"l2_classifier_bd\",\r\n \"split-horizon-group\": 1,\r\n \"bridged-virtual-interface\": \"false\"\r\n }\r\n}" + }, + { "id": "db501b30-8ac3-f889-8892-c8c8245a05fa", "headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n", "url": "http://localhost:8183/restconf/config/ietf-interfaces:interfaces/interface/vxlanTun1", @@ -921,6 +1206,26 @@ "rawModeData": "{\r\n \"nsh-entry\": [\r\n {\r\n \"name\": \"nshEntry2\",\r\n \"version\": \"0\",\r\n \"length\": \"6\",\r\n \"md-type\": \"md-type1\",\r\n \"next-protocol\": \"ethernet\",\r\n \"nsp\": \"185\",\r\n \"nsi\": \"254\" \r\n }\r\n ]\r\n}" }, { + "id": "eae0e8fe-8610-8760-1f1c-8d4a6960fe23", + "headers": "Content-Type: application/json\nAuthorization: Basic YWRtaW46YWRtaW4=\n", + "url": "http://localhost:8183/restconf/config/ietf-interfaces:interfaces/interface/TenGigabitEthernet5%2F0%2F0/v3po:l2", + "preRequestScript": "", + "pathVariables": {}, + "method": "DELETE", + "data": [], + "dataMode": "raw", + "version": 2, + "tests": "", + "currentHelper": "normal", + "helperAttributes": {}, + "time": 1484632384404, + "name": "5_Remove interface from bridge domain", + "description": "Removes l2 interconnection of bridge-based type from local0 interface.\nCorresponds to the following VAT command:\n\nvat# sw_interface_set_l2_bridge sw_if_index 0 bd_id 1 disable\n\nVerification in VAT:\n\nvat# bridge_domain_dump", + "collectionId": "a9a935b5-9481-e4f7-44fb-17d13ef726f9", + "responses": [], + "rawModeData": "" + }, + { "id": "ee2676f9-ce96-cae1-2d47-8515fc58dd78", "headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n", "url": "http://localhost:8183/restconf/operational/ietf-interfaces:interfaces-state/interface/vxlanGpeTun3", @@ -961,6 +1266,46 @@ "rawModeData": "{\r\n \r\n \"interface\": [\r\n {\r\n \"name\": \"vxlanGpeTun3\",\r\n \"description\": \"for testing purposes\",\r\n \"type\": \"v3po:vxlan-gpe-tunnel\",\r\n \"enabled\": \"true\",\r\n \"link-up-down-trap-enable\": \"enabled\",\r\n \"routing\" : {\r\n \"vrf-id\" : \"0\"\r\n },\r\n \"vxlan-gpe\" : {\r\n \"local\" : \"192.168.50.76\",\r\n \"remote\" : \"192.168.50.71\",\r\n \"vni\" : \"9\",\r\n \"next-protocol\" : \"ethernet\",\r\n \"encap-vrf-id\" : \"0\",\r\n \"decap-vrf-id\" : \"0\"\r\n }\r\n }\r\n ]\r\n \r\n}" }, { + "id": "f85e69dd-7baf-2d63-6a62-99bffc7f508b", + "headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n", + "url": "http://localhost:8183/restconf/config/vpp-classifier:vpp-classifier/classify-table/table1", + "preRequestScript": "", + "pathVariables": {}, + "method": "DELETE", + "data": [], + "dataMode": "raw", + "version": 2, + "tests": "", + "currentHelper": "normal", + "helperAttributes": {}, + "time": 1484632392308, + "name": "8_Remove classify table1 - cfg", + "description": "Adds classify table1. Corresponding vpp cli command:\n\nvppctl classify table mask l2 src\n\nTo verify invoke:\n\nvppctl sh class table verbose\n\nor:\n\nvat# classify_table_info table_id 1", + "collectionId": "a9a935b5-9481-e4f7-44fb-17d13ef726f9", + "responses": [], + "rawModeData": "" + }, + { + "id": "f9543e07-3140-222c-d1ac-83283e29a7c6", + "headers": "Content-Type: application/json\nAuthorization: Basic YWRtaW46YWRtaW4=\n", + "url": "http://localhost:8183/restconf/config/v3po:vpp/bridge-domains/bridge-domain/l2_classifier_bd", + "preRequestScript": "", + "pathVariables": {}, + "method": "DELETE", + "data": [], + "dataMode": "raw", + "version": 2, + "tests": "", + "currentHelper": "normal", + "helperAttributes": {}, + "time": 1484632387304, + "name": "6_Remove bridge domain - cfg", + "description": "Creates bridgfe domain. Corresponds to invoking:\n\nvat# bridge_domain_add_del bd_id [bd_id] learn 0 forward 0 uu-flood 0 flood 1 arp-term 0\n\nTo verify run:\n\nvppctl show bridge-domain [bd_id] detail", + "collectionId": "a9a935b5-9481-e4f7-44fb-17d13ef726f9", + "responses": [], + "rawModeData": "" + }, + { "id": "fb8560fc-dda0-f07b-3d31-7c6df2ffd2ba", "headers": "Authorization: Basic YWRtaW46YWRtaW4=\nContent-Type: application/json\n", "url": "http://localhost:8183/restconf/config/ietf-interfaces:interfaces/interface/vxlanTun5", |