1
|
|
|
"""For packets received by the datapath and sent to the controller.""" |
2
|
|
|
|
3
|
|
|
# System imports |
4
|
1 |
|
from enum import IntEnum |
5
|
|
|
|
6
|
1 |
|
from pyof.foundation.base import GenericMessage |
7
|
1 |
|
from pyof.foundation.basic_types import ( |
8
|
|
|
BinaryData, Pad, UBInt8, UBInt16, UBInt32, UBInt64) |
9
|
1 |
|
from pyof.v0x04.common.flow_match import Match, OxmOfbMatchField |
10
|
1 |
|
from pyof.v0x04.common.header import Header, Type |
11
|
|
|
|
12
|
|
|
# Third-party imports |
13
|
|
|
|
14
|
|
|
|
15
|
1 |
|
__all__ = ('PacketIn', 'PacketInReason') |
16
|
|
|
|
17
|
|
|
# Enums |
18
|
|
|
|
19
|
|
|
|
20
|
1 |
|
class PacketInReason(IntEnum): |
21
|
|
|
"""Reason why this packet is being sent to the controller.""" |
22
|
|
|
|
23
|
|
|
#: matching flow (table-miss flow entry). |
24
|
1 |
|
OFPR_NO_MATCH = 0 |
25
|
|
|
#: Action explicitly output to controller. |
26
|
1 |
|
OFPR_ACTION = 1 |
27
|
|
|
#: Packet has invalid TTL. |
28
|
1 |
|
OFPR_INVALID_TTL = 2 |
29
|
|
|
|
30
|
|
|
|
31
|
|
|
# Classes |
32
|
|
|
|
33
|
|
|
|
34
|
1 |
View Code Duplication |
class PacketIn(GenericMessage): |
|
|
|
|
35
|
|
|
"""Packet received on port (datapath -> controller).""" |
36
|
|
|
|
37
|
|
|
#: :class:`~pyof.v0x04.common.header.Header`: OpenFlow Header |
38
|
1 |
|
header = Header(message_type=Type.OFPT_PACKET_IN) |
39
|
|
|
#: ID assigned by datapath. |
40
|
1 |
|
buffer_id = UBInt32() |
41
|
|
|
#: Full length of frame. |
42
|
1 |
|
total_len = UBInt16() |
43
|
|
|
#: Reason packet is being sent (one of OFPR_*), |
44
|
1 |
|
reason = UBInt8(enum_ref=PacketInReason) |
45
|
|
|
#: ID of the table that was looked up. |
46
|
1 |
|
table_id = UBInt8() |
47
|
|
|
#: Cookie of the flow entry that was looked up. |
48
|
1 |
|
cookie = UBInt64() |
49
|
|
|
#: Packet metadata. Variable size. |
50
|
1 |
|
match = Match() |
51
|
|
|
#: Align to 64 bit + 16 bit |
52
|
1 |
|
pad = Pad(2) |
53
|
|
|
#: Ethernet frame whose length is inferred from header.length. |
54
|
|
|
#: The padding bytes preceding the Ethernet frame ensure that the IP |
55
|
|
|
#: header (if any) following the Ethernet header is 32-bit aligned. |
56
|
1 |
|
data = BinaryData() |
57
|
|
|
|
58
|
1 |
|
def __init__(self, xid=None, buffer_id=None, total_len=None, reason=None, |
59
|
|
|
table_id=None, cookie=None, match=None, data=b''): |
60
|
|
|
"""Assign parameters to object attributes. |
61
|
|
|
|
62
|
|
|
Args: |
63
|
|
|
xid (int): Header's xid. |
64
|
|
|
buffer_id (int): ID assigned by datapath. |
65
|
|
|
total_len (int): Full length of frame. |
66
|
|
|
reason (~pyof.v0x04.asynchronous.packet_in.PacketInReason): |
67
|
|
|
The reason why the packet is being sent |
68
|
|
|
table_id (int): ID of the table that was looked up |
69
|
|
|
cookie (int): Cookie of the flow entry that was looked up |
70
|
|
|
match (:class:`~pyof.v0x04.common.flow_match.Match`): |
71
|
|
|
Packet metadata with variable size. |
72
|
|
|
data (bytes): Ethernet frame, halfway through 32-bit word, so the |
73
|
|
|
IP header is 32-bit aligned. The amount of data is inferred |
74
|
|
|
from the length field in the header. Because of padding, |
75
|
|
|
offsetof(struct ofp_packet_in, data) == |
76
|
|
|
sizeof(struct ofp_packet_in) - 2. |
77
|
|
|
""" |
78
|
1 |
|
super().__init__(xid) |
79
|
1 |
|
self.buffer_id = buffer_id |
80
|
1 |
|
self.total_len = total_len |
81
|
1 |
|
self.reason = reason |
82
|
1 |
|
self.table_id = table_id |
83
|
1 |
|
self.cookie = cookie |
84
|
1 |
|
self.match = match |
85
|
1 |
|
self.data = data |
86
|
|
|
|
87
|
1 |
|
@property |
88
|
|
|
def in_port(self): |
89
|
|
|
"""Retrieve the 'in_port' that generated the PacketIn. |
90
|
|
|
|
91
|
|
|
This method will look for the OXM_TLV with type OFPXMT_OFB_IN_PORT on |
92
|
|
|
the `oxm_match_fields` field from `match` field and return its value, |
93
|
|
|
if the OXM exists. |
94
|
|
|
|
95
|
|
|
Returns: |
96
|
|
|
The integer number of the 'in_port' that generated the PacketIn if |
97
|
|
|
it exists. Otherwise return None. |
98
|
|
|
|
99
|
|
|
""" |
100
|
|
|
return self.match.get_field(OxmOfbMatchField.OFPXMT_OFB_IN_PORT) |
101
|
|
|
|