mirror of
https://github.com/openvswitch/ovs
synced 2025-09-04 00:05:15 +00:00
tests: Fix sensitivity to record ordering in test-netflow output.
The order of records in a NetFlow message is essentially random, but the test case was picky about it. I started getting failures when I modified apparently unrelated code, so here's a fix. Signed-off-by: Ben Pfaff <blp@nicira.com>
This commit is contained in:
@@ -968,13 +968,13 @@ AT_CHECK([[sed -e 's/, uptime [0-9]*//
|
|||||||
s/, now [0-9.]*//
|
s/, now [0-9.]*//
|
||||||
s/time \([0-9]*\)\.\.\.\1$/time <moment>/
|
s/time \([0-9]*\)\.\.\.\1$/time <moment>/
|
||||||
s/time [0-9]*\.\.\.[0-9]*/time <range>/
|
s/time [0-9]*\.\.\.[0-9]*/time <range>/
|
||||||
' netflow.log]], [0],
|
' netflow.log | sort]], [0],
|
||||||
[header: v5, seq 0, engine 2,1
|
[
|
||||||
rec: 192.168.0.1 > 192.168.0.2, if 1 > 65535, 1 pkts, 60 bytes, ICMP 8:0, time <moment>
|
header: v5, seq 0, engine 2,1
|
||||||
|
|
||||||
header: v5, seq 1, engine 2,1
|
header: v5, seq 1, engine 2,1
|
||||||
rec: 192.168.0.2 > 192.168.0.1, if 2 > 1, 2 pkts, 120 bytes, ICMP 0:0, time <range>
|
seq 0: 192.168.0.1 > 192.168.0.2, if 1 > 65535, 1 pkts, 60 bytes, ICMP 8:0, time <moment>
|
||||||
rec: 192.168.0.1 > 192.168.0.2, if 1 > 2, 1 pkts, 60 bytes, ICMP 8:0, time <moment>
|
seq 1: 192.168.0.1 > 192.168.0.2, if 1 > 2, 1 pkts, 60 bytes, ICMP 8:0, time <moment>
|
||||||
|
seq 1: 192.168.0.2 > 192.168.0.1, if 2 > 1, 2 pkts, 120 bytes, ICMP 0:0, time <range>
|
||||||
])
|
])
|
||||||
AT_CLEANUP
|
AT_CLEANUP
|
||||||
|
|
||||||
@@ -1032,13 +1032,13 @@ while read line; do
|
|||||||
esac
|
esac
|
||||||
|
|
||||||
case $line in
|
case $line in
|
||||||
"rec: 192.168.0.1 > 192.168.0.2, if 1 > 65535, "*" pkts, "*" bytes, TCP 1234 > 80, time "*)
|
"seq "*": 192.168.0.1 > 192.168.0.2, if 1 > 65535, "*" pkts, "*" bytes, TCP 1234 > 80, time "*)
|
||||||
counter=n_learn
|
counter=n_learn
|
||||||
;;
|
;;
|
||||||
"rec: 192.168.0.1 > 192.168.0.2, if 1 > 2, "*" pkts, "*" bytes, TCP 1234 > 80, time "*)
|
"seq "*": 192.168.0.1 > 192.168.0.2, if 1 > 2, "*" pkts, "*" bytes, TCP 1234 > 80, time "*)
|
||||||
counter=n_in
|
counter=n_in
|
||||||
;;
|
;;
|
||||||
"rec: 192.168.0.2 > 192.168.0.1, if 2 > 1, "*" pkts, "*" bytes, TCP 80 > 1234, time "*)
|
"seq "*": 192.168.0.2 > 192.168.0.1, if 2 > 1, "*" pkts, "*" bytes, TCP 80 > 1234, time "*)
|
||||||
counter=n_out
|
counter=n_out
|
||||||
;;
|
;;
|
||||||
*)
|
*)
|
||||||
|
@@ -74,7 +74,7 @@ print_netflow(struct ofpbuf *buf)
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
printf("rec: "IP_FMT" > "IP_FMT,
|
printf("seq %"PRIu32": "IP_FMT" > "IP_FMT, ntohl(hdr->flow_seq),
|
||||||
IP_ARGS(&rec->src_addr), IP_ARGS(&rec->dst_addr));
|
IP_ARGS(&rec->src_addr), IP_ARGS(&rec->dst_addr));
|
||||||
|
|
||||||
printf(", if %"PRIu16" > %"PRIu16,
|
printf(", if %"PRIu16" > %"PRIu16,
|
||||||
|
Reference in New Issue
Block a user