Jonathan Hart
Committed by Gerrit Code Review

Fix naming conventions for CORD apps.

Change-Id: I0b1d4dd276301b726269376eec137511c8e0a805
...@@ -15,17 +15,17 @@ ...@@ -15,17 +15,17 @@
15 */ 15 */
16 package org.onosproject.aaa; 16 package org.onosproject.aaa;
17 17
18 -import java.net.InetAddress;
19 -import java.net.UnknownHostException;
20 -
21 import org.onosproject.core.ApplicationId; 18 import org.onosproject.core.ApplicationId;
22 import org.onosproject.net.config.Config; 19 import org.onosproject.net.config.Config;
23 import org.onosproject.net.config.basics.BasicElementConfig; 20 import org.onosproject.net.config.basics.BasicElementConfig;
24 21
22 +import java.net.InetAddress;
23 +import java.net.UnknownHostException;
24 +
25 /** 25 /**
26 * Network config for the AAA app. 26 * Network config for the AAA app.
27 */ 27 */
28 -public class AAAConfig extends Config<ApplicationId> { 28 +public class AaaConfig extends Config<ApplicationId> {
29 29
30 private static final String RADIUS_IP = "radiusIp"; 30 private static final String RADIUS_IP = "radiusIp";
31 private static final String RADIUS_SERVER_PORT = "1812"; 31 private static final String RADIUS_SERVER_PORT = "1812";
...@@ -221,7 +221,7 @@ public class AAAConfig extends Config<ApplicationId> { ...@@ -221,7 +221,7 @@ public class AAAConfig extends Config<ApplicationId> {
221 * 221 *
222 * @return radius server UDP port. 222 * @return radius server UDP port.
223 */ 223 */
224 - public short radiusServerUDPPort() { 224 + public short radiusServerUdpPort() {
225 return Short.parseShort(getStringProperty(RADIUS_SERVER_PORT, 225 return Short.parseShort(getStringProperty(RADIUS_SERVER_PORT,
226 DEFAULT_RADIUS_SERVER_PORT)); 226 DEFAULT_RADIUS_SERVER_PORT));
227 } 227 }
...@@ -232,7 +232,7 @@ public class AAAConfig extends Config<ApplicationId> { ...@@ -232,7 +232,7 @@ public class AAAConfig extends Config<ApplicationId> {
232 * @param port new RADIUS UDP port; -1 to clear 232 * @param port new RADIUS UDP port; -1 to clear
233 * @return self 233 * @return self
234 */ 234 */
235 - public BasicElementConfig radiusServerUDPPort(short port) { 235 + public BasicElementConfig radiusServerUdpPort(short port) {
236 return (BasicElementConfig) setOrClear(RADIUS_SERVER_PORT, (long) port); 236 return (BasicElementConfig) setOrClear(RADIUS_SERVER_PORT, (long) port);
237 } 237 }
238 238
......
...@@ -15,14 +15,7 @@ ...@@ -15,14 +15,7 @@
15 */ 15 */
16 package org.onosproject.aaa; 16 package org.onosproject.aaa;
17 17
18 -import java.io.IOException; 18 +import com.google.common.util.concurrent.ThreadFactoryBuilder;
19 -import java.net.DatagramPacket;
20 -import java.net.DatagramSocket;
21 -import java.net.InetAddress;
22 -import java.nio.ByteBuffer;
23 -import java.util.concurrent.ExecutorService;
24 -import java.util.concurrent.Executors;
25 -
26 import org.apache.felix.scr.annotations.Activate; 19 import org.apache.felix.scr.annotations.Activate;
27 import org.apache.felix.scr.annotations.Component; 20 import org.apache.felix.scr.annotations.Component;
28 import org.apache.felix.scr.annotations.Deactivate; 21 import org.apache.felix.scr.annotations.Deactivate;
...@@ -58,7 +51,13 @@ import org.onosproject.net.packet.PacketService; ...@@ -58,7 +51,13 @@ import org.onosproject.net.packet.PacketService;
58 import org.onosproject.xosintegration.VoltTenantService; 51 import org.onosproject.xosintegration.VoltTenantService;
59 import org.slf4j.Logger; 52 import org.slf4j.Logger;
60 53
61 -import com.google.common.util.concurrent.ThreadFactoryBuilder; 54 +import java.io.IOException;
55 +import java.net.DatagramPacket;
56 +import java.net.DatagramSocket;
57 +import java.net.InetAddress;
58 +import java.nio.ByteBuffer;
59 +import java.util.concurrent.ExecutorService;
60 +import java.util.concurrent.Executors;
62 61
63 import static org.onosproject.net.config.basics.SubjectFactories.APP_SUBJECT_FACTORY; 62 import static org.onosproject.net.config.basics.SubjectFactories.APP_SUBJECT_FACTORY;
64 import static org.onosproject.net.packet.PacketPriority.CONTROL; 63 import static org.onosproject.net.packet.PacketPriority.CONTROL;
...@@ -68,7 +67,7 @@ import static org.slf4j.LoggerFactory.getLogger; ...@@ -68,7 +67,7 @@ import static org.slf4j.LoggerFactory.getLogger;
68 * AAA application for ONOS. 67 * AAA application for ONOS.
69 */ 68 */
70 @Component(immediate = true) 69 @Component(immediate = true)
71 -public class AAA { 70 +public class AaaManager {
72 71
73 // for verbose output 72 // for verbose output
74 private final Logger log = getLogger(getClass()); 73 private final Logger log = getLogger(getClass());
...@@ -122,12 +121,12 @@ public class AAA { ...@@ -122,12 +121,12 @@ public class AAA {
122 121
123 // Configuration properties factory 122 // Configuration properties factory
124 private final ConfigFactory factory = 123 private final ConfigFactory factory =
125 - new ConfigFactory<ApplicationId, AAAConfig>(APP_SUBJECT_FACTORY, 124 + new ConfigFactory<ApplicationId, AaaConfig>(APP_SUBJECT_FACTORY,
126 - AAAConfig.class, 125 + AaaConfig.class,
127 "AAA") { 126 "AAA") {
128 @Override 127 @Override
129 - public AAAConfig createConfig() { 128 + public AaaConfig createConfig() {
130 - return new AAAConfig(); 129 + return new AaaConfig();
131 } 130 }
132 }; 131 };
133 132
...@@ -175,7 +174,7 @@ public class AAA { ...@@ -175,7 +174,7 @@ public class AAA {
175 // "org.onosproject.aaa" is the FQDN of our app 174 // "org.onosproject.aaa" is the FQDN of our app
176 appId = coreService.registerApplication("org.onosproject.aaa"); 175 appId = coreService.registerApplication("org.onosproject.aaa");
177 176
178 - cfgListener.reconfigureNetwork(netCfgService.getConfig(appId, AAAConfig.class)); 177 + cfgListener.reconfigureNetwork(netCfgService.getConfig(appId, AaaConfig.class));
179 178
180 // register our event handler 179 // register our event handler
181 packetService.addProcessor(processor, PacketProcessor.director(2)); 180 packetService.addProcessor(processor, PacketProcessor.director(2));
...@@ -207,7 +206,7 @@ public class AAA { ...@@ -207,7 +206,7 @@ public class AAA {
207 executor.shutdownNow(); 206 executor.shutdownNow();
208 } 207 }
209 208
210 - protected void sendRADIUSPacket(RADIUS radiusPacket) { 209 + protected void sendRadiusPacket(RADIUS radiusPacket) {
211 210
212 try { 211 try {
213 final byte[] data = radiusPacket.serialize(); 212 final byte[] data = radiusPacket.serialize();
...@@ -305,7 +304,7 @@ public class AAA { ...@@ -305,7 +304,7 @@ public class AAA {
305 stateMachine.username()); 304 stateMachine.username());
306 305
307 radiusPayload.setAttribute(RADIUSAttribute.RADIUS_ATTR_NAS_IP, 306 radiusPayload.setAttribute(RADIUSAttribute.RADIUS_ATTR_NAS_IP,
308 - AAA.this.nasIpAddress.getAddress()); 307 + AaaManager.this.nasIpAddress.getAddress());
309 308
310 radiusPayload.encapsulateMessage(eapPacket); 309 radiusPayload.encapsulateMessage(eapPacket);
311 310
...@@ -320,7 +319,7 @@ public class AAA { ...@@ -320,7 +319,7 @@ public class AAA {
320 private void handleSupplicantPacket(InboundPacket inPacket) throws StateMachineException { 319 private void handleSupplicantPacket(InboundPacket inPacket) throws StateMachineException {
321 Ethernet ethPkt = inPacket.parsed(); 320 Ethernet ethPkt = inPacket.parsed();
322 // Where does it come from? 321 // Where does it come from?
323 - MacAddress srcMAC = ethPkt.getSourceMAC(); 322 + MacAddress srcMac = ethPkt.getSourceMAC();
324 323
325 DeviceId deviceId = inPacket.receivedFrom().deviceId(); 324 DeviceId deviceId = inPacket.receivedFrom().deviceId();
326 PortNumber portNumber = inPacket.receivedFrom().port(); 325 PortNumber portNumber = inPacket.receivedFrom().port();
...@@ -340,10 +339,10 @@ public class AAA { ...@@ -340,10 +339,10 @@ public class AAA {
340 339
341 //send an EAP Request/Identify to the supplicant 340 //send an EAP Request/Identify to the supplicant
342 EAP eapPayload = new EAP(EAP.REQUEST, stateMachine.identifier(), EAP.ATTR_IDENTITY, null); 341 EAP eapPayload = new EAP(EAP.REQUEST, stateMachine.identifier(), EAP.ATTR_IDENTITY, null);
343 - Ethernet eth = buildEapolResponse(srcMAC, MacAddress.valueOf(nasMacAddress), 342 + Ethernet eth = buildEapolResponse(srcMac, MacAddress.valueOf(nasMacAddress),
344 ethPkt.getVlanID(), EAPOL.EAPOL_PACKET, 343 ethPkt.getVlanID(), EAPOL.EAPOL_PACKET,
345 eapPayload); 344 eapPayload);
346 - stateMachine.setSupplicantAddress(srcMAC); 345 + stateMachine.setSupplicantAddress(srcMac);
347 stateMachine.setVlanId(ethPkt.getVlanID()); 346 stateMachine.setVlanId(ethPkt.getVlanID());
348 347
349 sendPacketToSupplicant(eth, stateMachine.supplicantConnectpoint()); 348 sendPacketToSupplicant(eth, stateMachine.supplicantConnectpoint());
...@@ -362,9 +361,9 @@ public class AAA { ...@@ -362,9 +361,9 @@ public class AAA {
362 stateMachine.setUsername(eapPacket.getData()); 361 stateMachine.setUsername(eapPacket.getData());
363 362
364 radiusPayload = getRadiusPayload(stateMachine, stateMachine.identifier(), eapPacket); 363 radiusPayload = getRadiusPayload(stateMachine, stateMachine.identifier(), eapPacket);
365 - radiusPayload.addMessageAuthenticator(AAA.this.radiusSecret); 364 + radiusPayload.addMessageAuthenticator(AaaManager.this.radiusSecret);
366 365
367 - sendRADIUSPacket(radiusPayload); 366 + sendRadiusPacket(radiusPayload);
368 367
369 // change the state to "PENDING" 368 // change the state to "PENDING"
370 stateMachine.requestAccess(); 369 stateMachine.requestAccess();
...@@ -382,8 +381,8 @@ public class AAA { ...@@ -382,8 +381,8 @@ public class AAA {
382 381
383 radiusPayload.setAttribute(RADIUSAttribute.RADIUS_ATTR_STATE, 382 radiusPayload.setAttribute(RADIUSAttribute.RADIUS_ATTR_STATE,
384 stateMachine.challengeState()); 383 stateMachine.challengeState());
385 - radiusPayload.addMessageAuthenticator(AAA.this.radiusSecret); 384 + radiusPayload.addMessageAuthenticator(AaaManager.this.radiusSecret);
386 - sendRADIUSPacket(radiusPayload); 385 + sendRadiusPacket(radiusPayload);
387 } 386 }
388 break; 387 break;
389 case EAP.ATTR_TLS: 388 case EAP.ATTR_TLS:
...@@ -391,11 +390,11 @@ public class AAA { ...@@ -391,11 +390,11 @@ public class AAA {
391 radiusPayload = getRadiusPayload(stateMachine, stateMachine.identifier(), eapPacket); 390 radiusPayload = getRadiusPayload(stateMachine, stateMachine.identifier(), eapPacket);
392 391
393 radiusPayload.setAttribute(RADIUSAttribute.RADIUS_ATTR_STATE, 392 radiusPayload.setAttribute(RADIUSAttribute.RADIUS_ATTR_STATE,
394 - stateMachine.challengeState()); 393 + stateMachine.challengeState());
395 stateMachine.setRequestAuthenticator(radiusPayload.generateAuthCode()); 394 stateMachine.setRequestAuthenticator(radiusPayload.generateAuthCode());
396 395
397 - radiusPayload.addMessageAuthenticator(AAA.this.radiusSecret); 396 + radiusPayload.addMessageAuthenticator(AaaManager.this.radiusSecret);
398 - sendRADIUSPacket(radiusPayload); 397 + sendRadiusPacket(radiusPayload);
399 398
400 if (stateMachine.state() != StateMachine.STATE_PENDING) { 399 if (stateMachine.state() != StateMachine.STATE_PENDING) {
401 stateMachine.requestAccess(); 400 stateMachine.requestAccess();
...@@ -512,10 +511,10 @@ public class AAA { ...@@ -512,10 +511,10 @@ public class AAA {
512 * 511 *
513 * @param cfg configuration object 512 * @param cfg configuration object
514 */ 513 */
515 - private void reconfigureNetwork(AAAConfig cfg) { 514 + private void reconfigureNetwork(AaaConfig cfg) {
516 - AAAConfig newCfg; 515 + AaaConfig newCfg;
517 if (cfg == null) { 516 if (cfg == null) {
518 - newCfg = new AAAConfig(); 517 + newCfg = new AaaConfig();
519 } else { 518 } else {
520 newCfg = cfg; 519 newCfg = cfg;
521 } 520 }
...@@ -540,8 +539,8 @@ public class AAA { ...@@ -540,8 +539,8 @@ public class AAA {
540 if (newCfg.radiusPort() != -1) { 539 if (newCfg.radiusPort() != -1) {
541 radiusPort = newCfg.radiusPort(); 540 radiusPort = newCfg.radiusPort();
542 } 541 }
543 - if (newCfg.radiusServerUDPPort() != -1) { 542 + if (newCfg.radiusServerUdpPort() != -1) {
544 - radiusServerPort = newCfg.radiusServerUDPPort(); 543 + radiusServerPort = newCfg.radiusServerUdpPort();
545 } 544 }
546 } 545 }
547 546
...@@ -550,9 +549,9 @@ public class AAA { ...@@ -550,9 +549,9 @@ public class AAA {
550 549
551 if ((event.type() == NetworkConfigEvent.Type.CONFIG_ADDED || 550 if ((event.type() == NetworkConfigEvent.Type.CONFIG_ADDED ||
552 event.type() == NetworkConfigEvent.Type.CONFIG_UPDATED) && 551 event.type() == NetworkConfigEvent.Type.CONFIG_UPDATED) &&
553 - event.configClass().equals(AAAConfig.class)) { 552 + event.configClass().equals(AaaConfig.class)) {
554 553
555 - AAAConfig cfg = netCfgService.getConfig(appId, AAAConfig.class); 554 + AaaConfig cfg = netCfgService.getConfig(appId, AaaConfig.class);
556 reconfigureNetwork(cfg); 555 reconfigureNetwork(cfg);
557 log.info("Reconfigured"); 556 log.info("Reconfigured");
558 } 557 }
......
...@@ -34,9 +34,9 @@ import static org.junit.Assert.assertThat; ...@@ -34,9 +34,9 @@ import static org.junit.Assert.assertThat;
34 * server and sends live packets over the network to it. 34 * server and sends live packets over the network to it.
35 */ 35 */
36 @Ignore ("This should not be run as part of the standard build") 36 @Ignore ("This should not be run as part of the standard build")
37 -public class AAAIntegrationTest extends AAATestBase { 37 +public class AaaIntegrationTest extends AaaTestBase {
38 38
39 - private AAA aaa; 39 + private AaaManager aaa;
40 40
41 /** 41 /**
42 * Mocks the network config registry. 42 * Mocks the network config registry.
...@@ -46,7 +46,7 @@ public class AAAIntegrationTest extends AAATestBase { ...@@ -46,7 +46,7 @@ public class AAAIntegrationTest extends AAATestBase {
46 extends NetworkConfigRegistryAdapter { 46 extends NetworkConfigRegistryAdapter {
47 @Override 47 @Override
48 public <S, C extends Config<S>> C getConfig(S subject, Class<C> configClass) { 48 public <S, C extends Config<S>> C getConfig(S subject, Class<C> configClass) {
49 - return (C) new AAAConfig(); 49 + return (C) new AaaConfig();
50 } 50 }
51 } 51 }
52 52
...@@ -55,7 +55,7 @@ public class AAAIntegrationTest extends AAATestBase { ...@@ -55,7 +55,7 @@ public class AAAIntegrationTest extends AAATestBase {
55 */ 55 */
56 @Before 56 @Before
57 public void setUp() { 57 public void setUp() {
58 - aaa = new AAA(); 58 + aaa = new AaaManager();
59 aaa.netCfgService = new TestNetworkConfigRegistry(); 59 aaa.netCfgService = new TestNetworkConfigRegistry();
60 aaa.coreService = new CoreServiceAdapter(); 60 aaa.coreService = new CoreServiceAdapter();
61 aaa.packetService = new MockPacketService(); 61 aaa.packetService = new MockPacketService();
...@@ -136,9 +136,9 @@ public class AAAIntegrationTest extends AAATestBase { ...@@ -136,9 +136,9 @@ public class AAAIntegrationTest extends AAATestBase {
136 136
137 Ethernet successRadiusPacket = fetchPacket(2); 137 Ethernet successRadiusPacket = fetchPacket(2);
138 assertThat(successRadiusPacket, notNullValue()); 138 assertThat(successRadiusPacket, notNullValue());
139 - EAPOL successEAPOL = (EAPOL) successRadiusPacket.getPayload(); 139 + EAPOL successEapol = (EAPOL) successRadiusPacket.getPayload();
140 - EAP successEAP = (EAP) successEAPOL.getPayload(); 140 + EAP successEap = (EAP) successEapol.getPayload();
141 - assertThat(successEAP.getCode(), is(EAP.SUCCESS)); 141 + assertThat(successEap.getCode(), is(EAP.SUCCESS));
142 142
143 // State machine should be in authorized state 143 // State machine should be in authorized state
144 144
......
...@@ -15,9 +15,7 @@ ...@@ -15,9 +15,7 @@
15 */ 15 */
16 package org.onosproject.aaa; 16 package org.onosproject.aaa;
17 17
18 -import java.net.InetAddress; 18 +import com.google.common.base.Charsets;
19 -import java.net.UnknownHostException;
20 -
21 import org.junit.After; 19 import org.junit.After;
22 import org.junit.Before; 20 import org.junit.Before;
23 import org.junit.Test; 21 import org.junit.Test;
...@@ -32,7 +30,8 @@ import org.onosproject.core.CoreServiceAdapter; ...@@ -32,7 +30,8 @@ import org.onosproject.core.CoreServiceAdapter;
32 import org.onosproject.net.config.Config; 30 import org.onosproject.net.config.Config;
33 import org.onosproject.net.config.NetworkConfigRegistryAdapter; 31 import org.onosproject.net.config.NetworkConfigRegistryAdapter;
34 32
35 -import com.google.common.base.Charsets; 33 +import java.net.InetAddress;
34 +import java.net.UnknownHostException;
36 35
37 import static org.hamcrest.Matchers.is; 36 import static org.hamcrest.Matchers.is;
38 import static org.hamcrest.Matchers.notNullValue; 37 import static org.hamcrest.Matchers.notNullValue;
...@@ -41,14 +40,14 @@ import static org.junit.Assert.assertThat; ...@@ -41,14 +40,14 @@ import static org.junit.Assert.assertThat;
41 /** 40 /**
42 * Set of tests of the ONOS application component. 41 * Set of tests of the ONOS application component.
43 */ 42 */
44 -public class AAATest extends AAATestBase { 43 +public class AaaManagerTest extends AaaTestBase {
45 44
46 static final String BAD_IP_ADDRESS = "198.51.100.0"; 45 static final String BAD_IP_ADDRESS = "198.51.100.0";
47 46
48 - private AAA aaa; 47 + private AaaManager aaaManager;
49 48
50 - class AAAWithoutRadiusServer extends AAA { 49 + class AaaManagerWithoutRadiusServer extends AaaManager {
51 - protected void sendRADIUSPacket(RADIUS radiusPacket) { 50 + protected void sendRadiusPacket(RADIUS radiusPacket) {
52 savePacket(radiusPacket); 51 savePacket(radiusPacket);
53 } 52 }
54 } 53 }
...@@ -57,7 +56,7 @@ public class AAATest extends AAATestBase { ...@@ -57,7 +56,7 @@ public class AAATest extends AAATestBase {
57 * Mocks the AAAConfig class to force usage of an unroutable address for the 56 * Mocks the AAAConfig class to force usage of an unroutable address for the
58 * RADIUS server. 57 * RADIUS server.
59 */ 58 */
60 - static class MockAAAConfig extends AAAConfig { 59 + static class MockAaaConfig extends AaaConfig {
61 @Override 60 @Override
62 public InetAddress radiusIp() { 61 public InetAddress radiusIp() {
63 try { 62 try {
...@@ -77,7 +76,7 @@ public class AAATest extends AAATestBase { ...@@ -77,7 +76,7 @@ public class AAATest extends AAATestBase {
77 extends NetworkConfigRegistryAdapter { 76 extends NetworkConfigRegistryAdapter {
78 @Override 77 @Override
79 public <S, C extends Config<S>> C getConfig(S subject, Class<C> configClass) { 78 public <S, C extends Config<S>> C getConfig(S subject, Class<C> configClass) {
80 - AAAConfig aaaConfig = new MockAAAConfig(); 79 + AaaConfig aaaConfig = new MockAaaConfig();
81 return (C) aaaConfig; 80 return (C) aaaConfig;
82 } 81 }
83 } 82 }
...@@ -90,7 +89,7 @@ public class AAATest extends AAATestBase { ...@@ -90,7 +89,7 @@ public class AAATest extends AAATestBase {
90 * @param challengeType type to use in challenge packet 89 * @param challengeType type to use in challenge packet
91 * @return Ethernet packet 90 * @return Ethernet packet
92 */ 91 */
93 - private RADIUS constructRADIUSCodeAccessChallengePacket(byte challengeCode, byte challengeType) { 92 + private RADIUS constructRadiusCodeAccessChallengePacket(byte challengeCode, byte challengeType) {
94 93
95 String challenge = "12345678901234567"; 94 String challenge = "12345678901234567";
96 95
...@@ -116,11 +115,11 @@ public class AAATest extends AAATestBase { ...@@ -116,11 +115,11 @@ public class AAATest extends AAATestBase {
116 */ 115 */
117 @Before 116 @Before
118 public void setUp() { 117 public void setUp() {
119 - aaa = new AAAWithoutRadiusServer(); 118 + aaaManager = new AaaManagerWithoutRadiusServer();
120 - aaa.netCfgService = new TestNetworkConfigRegistry(); 119 + aaaManager.netCfgService = new TestNetworkConfigRegistry();
121 - aaa.coreService = new CoreServiceAdapter(); 120 + aaaManager.coreService = new CoreServiceAdapter();
122 - aaa.packetService = new MockPacketService(); 121 + aaaManager.packetService = new MockPacketService();
123 - aaa.activate(); 122 + aaaManager.activate();
124 } 123 }
125 124
126 /** 125 /**
...@@ -128,7 +127,7 @@ public class AAATest extends AAATestBase { ...@@ -128,7 +127,7 @@ public class AAATest extends AAATestBase {
128 */ 127 */
129 @After 128 @After
130 public void tearDown() { 129 public void tearDown() {
131 - aaa.deactivate(); 130 + aaaManager.deactivate();
132 } 131 }
133 132
134 /** 133 /**
...@@ -138,7 +137,7 @@ public class AAATest extends AAATestBase { ...@@ -138,7 +137,7 @@ public class AAATest extends AAATestBase {
138 * @throws DeserializationException if deserialization of the packet contents 137 * @throws DeserializationException if deserialization of the packet contents
139 * fails. 138 * fails.
140 */ 139 */
141 - private void checkRADIUSPacketFromSupplicant(RADIUS radius) 140 + private void checkRadiusPacketFromSupplicant(RADIUS radius)
142 throws DeserializationException { 141 throws DeserializationException {
143 assertThat(radius, notNullValue()); 142 assertThat(radius, notNullValue());
144 143
...@@ -173,7 +172,7 @@ public class AAATest extends AAATestBase { ...@@ -173,7 +172,7 @@ public class AAATest extends AAATestBase {
173 sendPacket(startPacket); 172 sendPacket(startPacket);
174 173
175 Ethernet responsePacket = (Ethernet) fetchPacket(0); 174 Ethernet responsePacket = (Ethernet) fetchPacket(0);
176 - checkRadiusPacket(aaa, responsePacket, EAP.ATTR_IDENTITY); 175 + checkRadiusPacket(aaaManager, responsePacket, EAP.ATTR_IDENTITY);
177 176
178 // (2) Supplicant identify 177 // (2) Supplicant identify
179 178
...@@ -182,7 +181,7 @@ public class AAATest extends AAATestBase { ...@@ -182,7 +181,7 @@ public class AAATest extends AAATestBase {
182 181
183 RADIUS radiusIdentifyPacket = (RADIUS) fetchPacket(1); 182 RADIUS radiusIdentifyPacket = (RADIUS) fetchPacket(1);
184 183
185 - checkRADIUSPacketFromSupplicant(radiusIdentifyPacket); 184 + checkRadiusPacketFromSupplicant(radiusIdentifyPacket);
186 185
187 assertThat(radiusIdentifyPacket.getCode(), is(RADIUS.RADIUS_CODE_ACCESS_REQUEST)); 186 assertThat(radiusIdentifyPacket.getCode(), is(RADIUS.RADIUS_CODE_ACCESS_REQUEST));
188 assertThat(new String(radiusIdentifyPacket.getAttribute(RADIUSAttribute.RADIUS_ATTR_USERNAME).getValue()), 187 assertThat(new String(radiusIdentifyPacket.getAttribute(RADIUSAttribute.RADIUS_ATTR_USERNAME).getValue()),
...@@ -192,7 +191,7 @@ public class AAATest extends AAATestBase { ...@@ -192,7 +191,7 @@ public class AAATest extends AAATestBase {
192 IpAddress.valueOf(IpAddress.Version.INET, 191 IpAddress.valueOf(IpAddress.Version.INET,
193 radiusIdentifyPacket.getAttribute(RADIUSAttribute.RADIUS_ATTR_NAS_IP) 192 radiusIdentifyPacket.getAttribute(RADIUSAttribute.RADIUS_ATTR_NAS_IP)
194 .getValue()); 193 .getValue());
195 - assertThat(nasIp.toString(), is(aaa.nasIpAddress.getHostAddress())); 194 + assertThat(nasIp.toString(), is(aaaManager.nasIpAddress.getHostAddress()));
196 195
197 // State machine should have been created by now 196 // State machine should have been created by now
198 197
...@@ -204,11 +203,11 @@ public class AAATest extends AAATestBase { ...@@ -204,11 +203,11 @@ public class AAATest extends AAATestBase {
204 // (3) RADIUS MD5 challenge 203 // (3) RADIUS MD5 challenge
205 204
206 RADIUS radiusCodeAccessChallengePacket = 205 RADIUS radiusCodeAccessChallengePacket =
207 - constructRADIUSCodeAccessChallengePacket(RADIUS.RADIUS_CODE_ACCESS_CHALLENGE, EAP.ATTR_MD5); 206 + constructRadiusCodeAccessChallengePacket(RADIUS.RADIUS_CODE_ACCESS_CHALLENGE, EAP.ATTR_MD5);
208 - aaa.radiusListener.handleRadiusPacket(radiusCodeAccessChallengePacket); 207 + aaaManager.radiusListener.handleRadiusPacket(radiusCodeAccessChallengePacket);
209 208
210 Ethernet radiusChallengeMD5Packet = (Ethernet) fetchPacket(2); 209 Ethernet radiusChallengeMD5Packet = (Ethernet) fetchPacket(2);
211 - checkRadiusPacket(aaa, radiusChallengeMD5Packet, EAP.ATTR_MD5); 210 + checkRadiusPacket(aaaManager, radiusChallengeMD5Packet, EAP.ATTR_MD5);
212 211
213 // (4) Supplicant MD5 response 212 // (4) Supplicant MD5 response
214 213
...@@ -221,7 +220,7 @@ public class AAATest extends AAATestBase { ...@@ -221,7 +220,7 @@ public class AAATest extends AAATestBase {
221 220
222 RADIUS responseMd5RadiusPacket = (RADIUS) fetchPacket(3); 221 RADIUS responseMd5RadiusPacket = (RADIUS) fetchPacket(3);
223 222
224 - checkRADIUSPacketFromSupplicant(responseMd5RadiusPacket); 223 + checkRadiusPacketFromSupplicant(responseMd5RadiusPacket);
225 assertThat(responseMd5RadiusPacket.getIdentifier(), is((byte) 0)); 224 assertThat(responseMd5RadiusPacket.getIdentifier(), is((byte) 0));
226 assertThat(responseMd5RadiusPacket.getCode(), is(RADIUS.RADIUS_CODE_ACCESS_REQUEST)); 225 assertThat(responseMd5RadiusPacket.getCode(), is(RADIUS.RADIUS_CODE_ACCESS_REQUEST));
227 226
...@@ -233,11 +232,11 @@ public class AAATest extends AAATestBase { ...@@ -233,11 +232,11 @@ public class AAATest extends AAATestBase {
233 // (5) RADIUS Success 232 // (5) RADIUS Success
234 233
235 RADIUS successPacket = 234 RADIUS successPacket =
236 - constructRADIUSCodeAccessChallengePacket(RADIUS.RADIUS_CODE_ACCESS_ACCEPT, EAP.SUCCESS); 235 + constructRadiusCodeAccessChallengePacket(RADIUS.RADIUS_CODE_ACCESS_ACCEPT, EAP.SUCCESS);
237 - aaa.radiusListener.handleRadiusPacket((successPacket)); 236 + aaaManager.radiusListener.handleRadiusPacket((successPacket));
238 Ethernet supplicantSuccessPacket = (Ethernet) fetchPacket(4); 237 Ethernet supplicantSuccessPacket = (Ethernet) fetchPacket(4);
239 238
240 - checkRadiusPacket(aaa, supplicantSuccessPacket, EAP.SUCCESS); 239 + checkRadiusPacket(aaaManager, supplicantSuccessPacket, EAP.SUCCESS);
241 240
242 // State machine should be in authorized state 241 // State machine should be in authorized state
243 242
...@@ -251,9 +250,9 @@ public class AAATest extends AAATestBase { ...@@ -251,9 +250,9 @@ public class AAATest extends AAATestBase {
251 */ 250 */
252 @Test 251 @Test
253 public void testConfig() { 252 public void testConfig() {
254 - assertThat(aaa.nasIpAddress.getHostAddress(), is(AAAConfig.DEFAULT_NAS_IP)); 253 + assertThat(aaaManager.nasIpAddress.getHostAddress(), is(AaaConfig.DEFAULT_NAS_IP));
255 - assertThat(aaa.nasMacAddress, is(AAAConfig.DEFAULT_NAS_MAC)); 254 + assertThat(aaaManager.nasMacAddress, is(AaaConfig.DEFAULT_NAS_MAC));
256 - assertThat(aaa.radiusIpAddress.getHostAddress(), is(BAD_IP_ADDRESS)); 255 + assertThat(aaaManager.radiusIpAddress.getHostAddress(), is(BAD_IP_ADDRESS));
257 - assertThat(aaa.radiusMacAddress, is(AAAConfig.DEFAULT_RADIUS_MAC)); 256 + assertThat(aaaManager.radiusMacAddress, is(AaaConfig.DEFAULT_RADIUS_MAC));
258 } 257 }
259 } 258 }
......
...@@ -15,11 +15,6 @@ ...@@ -15,11 +15,6 @@
15 */ 15 */
16 package org.onosproject.aaa; 16 package org.onosproject.aaa;
17 17
18 -import java.nio.ByteBuffer;
19 -import java.security.MessageDigest;
20 -import java.util.LinkedList;
21 -import java.util.List;
22 -
23 import org.onlab.packet.BasePacket; 18 import org.onlab.packet.BasePacket;
24 import org.onlab.packet.EAP; 19 import org.onlab.packet.EAP;
25 import org.onlab.packet.EAPOL; 20 import org.onlab.packet.EAPOL;
...@@ -34,6 +29,11 @@ import org.onosproject.net.packet.PacketContext; ...@@ -34,6 +29,11 @@ import org.onosproject.net.packet.PacketContext;
34 import org.onosproject.net.packet.PacketProcessor; 29 import org.onosproject.net.packet.PacketProcessor;
35 import org.onosproject.net.packet.PacketServiceAdapter; 30 import org.onosproject.net.packet.PacketServiceAdapter;
36 31
32 +import java.nio.ByteBuffer;
33 +import java.security.MessageDigest;
34 +import java.util.LinkedList;
35 +import java.util.List;
36 +
37 import static org.hamcrest.Matchers.instanceOf; 37 import static org.hamcrest.Matchers.instanceOf;
38 import static org.hamcrest.Matchers.is; 38 import static org.hamcrest.Matchers.is;
39 import static org.hamcrest.Matchers.notNullValue; 39 import static org.hamcrest.Matchers.notNullValue;
...@@ -44,7 +44,7 @@ import static org.onosproject.net.NetTestTools.connectPoint; ...@@ -44,7 +44,7 @@ import static org.onosproject.net.NetTestTools.connectPoint;
44 /** 44 /**
45 * Common methods for AAA app testing. 45 * Common methods for AAA app testing.
46 */ 46 */
47 -public class AAATestBase { 47 +public class AaaTestBase {
48 48
49 MacAddress clientMac = MacAddress.valueOf("1a:1a:1a:1a:1a:1a"); 49 MacAddress clientMac = MacAddress.valueOf("1a:1a:1a:1a:1a:1a");
50 MacAddress serverMac = MacAddress.valueOf("2a:2a:2a:2a:2a:2a"); 50 MacAddress serverMac = MacAddress.valueOf("2a:2a:2a:2a:2a:2a");
...@@ -204,10 +204,10 @@ public class AAATestBase { ...@@ -204,10 +204,10 @@ public class AAATestBase {
204 * @param radiusPacket packet to check 204 * @param radiusPacket packet to check
205 * @param code expected code 205 * @param code expected code
206 */ 206 */
207 - void checkRadiusPacket(AAA aaa, Ethernet radiusPacket, byte code) { 207 + void checkRadiusPacket(AaaManager aaaManager, Ethernet radiusPacket, byte code) {
208 208
209 assertThat(radiusPacket.getSourceMAC(), 209 assertThat(radiusPacket.getSourceMAC(),
210 - is(MacAddress.valueOf(aaa.nasMacAddress))); 210 + is(MacAddress.valueOf(aaaManager.nasMacAddress)));
211 assertThat(radiusPacket.getDestinationMAC(), is(serverMac)); 211 assertThat(radiusPacket.getDestinationMAC(), is(serverMac));
212 212
213 assertThat(radiusPacket.getPayload(), instanceOf(EAPOL.class)); 213 assertThat(radiusPacket.getPayload(), instanceOf(EAPOL.class));
......
...@@ -62,7 +62,7 @@ import static org.slf4j.LoggerFactory.getLogger; ...@@ -62,7 +62,7 @@ import static org.slf4j.LoggerFactory.getLogger;
62 */ 62 */
63 @Service 63 @Service
64 @Component(immediate = true) 64 @Component(immediate = true)
65 -public class OLT implements AccessDeviceService { 65 +public class Olt implements AccessDeviceService {
66 private final Logger log = getLogger(getClass()); 66 private final Logger log = getLogger(getClass());
67 67
68 @Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY) 68 @Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY)
......
...@@ -68,7 +68,7 @@ import static org.slf4j.LoggerFactory.getLogger; ...@@ -68,7 +68,7 @@ import static org.slf4j.LoggerFactory.getLogger;
68 */ 68 */
69 @Component(immediate = true) 69 @Component(immediate = true)
70 @Service 70 @Service
71 -public class OnosXOSIntegrationManager implements VoltTenantService { 71 +public class OnosXosIntegrationManager implements VoltTenantService {
72 private static final String XOS_SERVER_ADDRESS_PROPERTY_NAME = 72 private static final String XOS_SERVER_ADDRESS_PROPERTY_NAME =
73 "xosServerAddress"; 73 "xosServerAddress";
74 private static final String XOS_SERVER_PORT_PROPERTY_NAME = 74 private static final String XOS_SERVER_PORT_PROPERTY_NAME =
...@@ -355,12 +355,12 @@ public class OnosXOSIntegrationManager implements VoltTenantService { ...@@ -355,12 +355,12 @@ public class OnosXOSIntegrationManager implements VoltTenantService {
355 355
356 String retJson = postRest(json); 356 String retJson = postRest(json);
357 357
358 - fetchCPELocation(tenantToCreate, retJson); 358 + fetchCpeLocation(tenantToCreate, retJson);
359 359
360 return newTenant; 360 return newTenant;
361 } 361 }
362 362
363 - private void fetchCPELocation(VoltTenant newTenant, String jsonString) { 363 + private void fetchCpeLocation(VoltTenant newTenant, String jsonString) {
364 JsonObject json = JsonObject.readFrom(jsonString); 364 JsonObject json = JsonObject.readFrom(jsonString);
365 365
366 if (json.get("computeNodeName") != null) { 366 if (json.get("computeNodeName") != null) {
......
...@@ -57,7 +57,7 @@ import static org.slf4j.LoggerFactory.getLogger; ...@@ -57,7 +57,7 @@ import static org.slf4j.LoggerFactory.getLogger;
57 /** 57 /**
58 * Pipeliner for OLT device. 58 * Pipeliner for OLT device.
59 */ 59 */
60 -public class OLTPipeline extends AbstractHandlerBehaviour implements Pipeliner { 60 +public class OltPipeline extends AbstractHandlerBehaviour implements Pipeliner {
61 61
62 private final Logger log = getLogger(getClass()); 62 private final Logger log = getLogger(getClass());
63 63
......
...@@ -78,12 +78,12 @@ ...@@ -78,12 +78,12 @@
78 <driver name="pmc-olt" extends="default" 78 <driver name="pmc-olt" extends="default"
79 manufacturer="Big Switch Networks" hwVersion="ivs 0.5" swVersion="ivs 0.5"> 79 manufacturer="Big Switch Networks" hwVersion="ivs 0.5" swVersion="ivs 0.5">
80 <behaviour api="org.onosproject.net.behaviour.Pipeliner" 80 <behaviour api="org.onosproject.net.behaviour.Pipeliner"
81 - impl="org.onosproject.driver.pipeline.OLTPipeline"/> 81 + impl="org.onosproject.driver.pipeline.OltPipeline"/>
82 </driver> 82 </driver>
83 <driver name="g.fast" extends="default" 83 <driver name="g.fast" extends="default"
84 manufacturer="TEST1" hwVersion="TEST2" swVersion="TEST3"> 84 manufacturer="TEST1" hwVersion="TEST2" swVersion="TEST3">
85 <behaviour api="org.onosproject.net.behaviour.Pipeliner" 85 <behaviour api="org.onosproject.net.behaviour.Pipeliner"
86 - impl="org.onosproject.driver.pipeline.OLTPipeline"/> 86 + impl="org.onosproject.driver.pipeline.OltPipeline"/>
87 </driver> 87 </driver>
88 <!-- The SoftRouter driver is meant to be used by any software/NPU based 88 <!-- The SoftRouter driver is meant to be used by any software/NPU based
89 ~ switch that wishes to implement a simple 2-table router. To use this 89 ~ switch that wishes to implement a simple 2-table router. To use this
......