summaryrefslogtreecommitdiffhomepage
path: root/test/scenario_test/flow_spec_test.py
diff options
context:
space:
mode:
authorMatthieu Texier <matthieu@texier.tv>2017-02-17 21:20:59 +0900
committerFUJITA Tomonori <fujita.tomonori@lab.ntt.co.jp>2017-02-17 21:20:59 +0900
commit6de16dc885ebfeffb9ff3470805980f6fac579c5 (patch)
tree887b2deea8f346802688b296746d9d7c8cb316c9 /test/scenario_test/flow_spec_test.py
parenta1aa21844ee456cead80e8ef88fc373bc95b7b04 (diff)
flowspec: comply with RFC 5575 about TCP flags rules
This patch proposes a new way to configure BGP flowspec TCP flags rules It allows to comply with RFC 5575 by defining flags like this =SA =A / '!SA' / '=SA&=!U' = means match, ! means not, & means and, all TCP flags are identified by their first charater S for SYN A for Ack ...
Diffstat (limited to 'test/scenario_test/flow_spec_test.py')
-rw-r--r--test/scenario_test/flow_spec_test.py2
1 files changed, 1 insertions, 1 deletions
diff --git a/test/scenario_test/flow_spec_test.py b/test/scenario_test/flow_spec_test.py
index f3c6bff2..c8fa9068 100644
--- a/test/scenario_test/flow_spec_test.py
+++ b/test/scenario_test/flow_spec_test.py
@@ -44,7 +44,7 @@ class GoBGPTestBase(unittest.TestCase):
matchs = ['destination 10.0.0.0/24', 'source 20.0.0.0/24']
thens = ['discard']
e1.add_route(route='flow1', rf='ipv4-flowspec', matchs=matchs, thens=thens)
- matchs2 = ['tcp-flags syn', 'protocol tcp udp', "packet-length '>1000&<2000'"]
+ matchs2 = ['tcp-flags S', 'protocol tcp udp', "packet-length '>1000&<2000'"]
thens2 = ['rate-limit 9600', 'redirect 0.10:100', 'mark 20', 'action sample']
g1.add_route(route='flow1', rf='ipv4-flowspec', matchs=matchs2, thens=thens2)
matchs3 = ['destination 2001::/24/10', 'source 2002::/24/15']