From 5ac517ab36614d737c6434d9150ad0f68ecc694e Mon Sep 17 00:00:00 2001 From: Yuichi Ito Date: Mon, 16 Dec 2013 14:15:00 +0900 Subject: [PATCH] rest_firewall: use the explicit max_len of flow_mod rest_firewall had used the max_len value of flow_mod message which ofctl_v1_x specified. in response to change ofctl_v1_x, rest_firewall gets to use the specified max_len explicitly. Signed-off-by: Yuichi Ito Signed-off-by: FUJITA Tomonori --- ryu/app/rest_firewall.py | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/ryu/app/rest_firewall.py b/ryu/app/rest_firewall.py index ba5a166d..1c42643b 100644 --- a/ryu/app/rest_firewall.py +++ b/ryu/app/rest_firewall.py @@ -953,7 +953,8 @@ class Action(object): elif value == REST_ACTION_PACKETIN: out_port = dp.ofproto.OFPP_CONTROLLER action = [{'type': 'OUTPUT', - 'port': out_port}] + 'port': out_port, + 'max_len': 128}] else: raise ValueError('Invalid action type.')