Committed by
Gerrit Code Review
Fix naming conventions for CORD apps.
Change-Id: I0b1d4dd276301b726269376eec137511c8e0a805
Showing
9 changed files
with
92 additions
and
94 deletions
... | @@ -15,17 +15,17 @@ | ... | @@ -15,17 +15,17 @@ |
15 | */ | 15 | */ |
16 | package org.onosproject.aaa; | 16 | package org.onosproject.aaa; |
17 | 17 | ||
18 | -import java.net.InetAddress; | ||
19 | -import java.net.UnknownHostException; | ||
20 | - | ||
21 | import org.onosproject.core.ApplicationId; | 18 | import org.onosproject.core.ApplicationId; |
22 | import org.onosproject.net.config.Config; | 19 | import org.onosproject.net.config.Config; |
23 | import org.onosproject.net.config.basics.BasicElementConfig; | 20 | import org.onosproject.net.config.basics.BasicElementConfig; |
24 | 21 | ||
22 | +import java.net.InetAddress; | ||
23 | +import java.net.UnknownHostException; | ||
24 | + | ||
25 | /** | 25 | /** |
26 | * Network config for the AAA app. | 26 | * Network config for the AAA app. |
27 | */ | 27 | */ |
28 | -public class AAAConfig extends Config<ApplicationId> { | 28 | +public class AaaConfig extends Config<ApplicationId> { |
29 | 29 | ||
30 | private static final String RADIUS_IP = "radiusIp"; | 30 | private static final String RADIUS_IP = "radiusIp"; |
31 | private static final String RADIUS_SERVER_PORT = "1812"; | 31 | private static final String RADIUS_SERVER_PORT = "1812"; |
... | @@ -221,7 +221,7 @@ public class AAAConfig extends Config<ApplicationId> { | ... | @@ -221,7 +221,7 @@ public class AAAConfig extends Config<ApplicationId> { |
221 | * | 221 | * |
222 | * @return radius server UDP port. | 222 | * @return radius server UDP port. |
223 | */ | 223 | */ |
224 | - public short radiusServerUDPPort() { | 224 | + public short radiusServerUdpPort() { |
225 | return Short.parseShort(getStringProperty(RADIUS_SERVER_PORT, | 225 | return Short.parseShort(getStringProperty(RADIUS_SERVER_PORT, |
226 | DEFAULT_RADIUS_SERVER_PORT)); | 226 | DEFAULT_RADIUS_SERVER_PORT)); |
227 | } | 227 | } |
... | @@ -232,7 +232,7 @@ public class AAAConfig extends Config<ApplicationId> { | ... | @@ -232,7 +232,7 @@ public class AAAConfig extends Config<ApplicationId> { |
232 | * @param port new RADIUS UDP port; -1 to clear | 232 | * @param port new RADIUS UDP port; -1 to clear |
233 | * @return self | 233 | * @return self |
234 | */ | 234 | */ |
235 | - public BasicElementConfig radiusServerUDPPort(short port) { | 235 | + public BasicElementConfig radiusServerUdpPort(short port) { |
236 | return (BasicElementConfig) setOrClear(RADIUS_SERVER_PORT, (long) port); | 236 | return (BasicElementConfig) setOrClear(RADIUS_SERVER_PORT, (long) port); |
237 | } | 237 | } |
238 | 238 | ... | ... |
... | @@ -15,14 +15,7 @@ | ... | @@ -15,14 +15,7 @@ |
15 | */ | 15 | */ |
16 | package org.onosproject.aaa; | 16 | package org.onosproject.aaa; |
17 | 17 | ||
18 | -import java.io.IOException; | 18 | +import com.google.common.util.concurrent.ThreadFactoryBuilder; |
19 | -import java.net.DatagramPacket; | ||
20 | -import java.net.DatagramSocket; | ||
21 | -import java.net.InetAddress; | ||
22 | -import java.nio.ByteBuffer; | ||
23 | -import java.util.concurrent.ExecutorService; | ||
24 | -import java.util.concurrent.Executors; | ||
25 | - | ||
26 | import org.apache.felix.scr.annotations.Activate; | 19 | import org.apache.felix.scr.annotations.Activate; |
27 | import org.apache.felix.scr.annotations.Component; | 20 | import org.apache.felix.scr.annotations.Component; |
28 | import org.apache.felix.scr.annotations.Deactivate; | 21 | import org.apache.felix.scr.annotations.Deactivate; |
... | @@ -58,7 +51,13 @@ import org.onosproject.net.packet.PacketService; | ... | @@ -58,7 +51,13 @@ import org.onosproject.net.packet.PacketService; |
58 | import org.onosproject.xosintegration.VoltTenantService; | 51 | import org.onosproject.xosintegration.VoltTenantService; |
59 | import org.slf4j.Logger; | 52 | import org.slf4j.Logger; |
60 | 53 | ||
61 | -import com.google.common.util.concurrent.ThreadFactoryBuilder; | 54 | +import java.io.IOException; |
55 | +import java.net.DatagramPacket; | ||
56 | +import java.net.DatagramSocket; | ||
57 | +import java.net.InetAddress; | ||
58 | +import java.nio.ByteBuffer; | ||
59 | +import java.util.concurrent.ExecutorService; | ||
60 | +import java.util.concurrent.Executors; | ||
62 | 61 | ||
63 | import static org.onosproject.net.config.basics.SubjectFactories.APP_SUBJECT_FACTORY; | 62 | import static org.onosproject.net.config.basics.SubjectFactories.APP_SUBJECT_FACTORY; |
64 | import static org.onosproject.net.packet.PacketPriority.CONTROL; | 63 | import static org.onosproject.net.packet.PacketPriority.CONTROL; |
... | @@ -68,7 +67,7 @@ import static org.slf4j.LoggerFactory.getLogger; | ... | @@ -68,7 +67,7 @@ import static org.slf4j.LoggerFactory.getLogger; |
68 | * AAA application for ONOS. | 67 | * AAA application for ONOS. |
69 | */ | 68 | */ |
70 | @Component(immediate = true) | 69 | @Component(immediate = true) |
71 | -public class AAA { | 70 | +public class AaaManager { |
72 | 71 | ||
73 | // for verbose output | 72 | // for verbose output |
74 | private final Logger log = getLogger(getClass()); | 73 | private final Logger log = getLogger(getClass()); |
... | @@ -122,12 +121,12 @@ public class AAA { | ... | @@ -122,12 +121,12 @@ public class AAA { |
122 | 121 | ||
123 | // Configuration properties factory | 122 | // Configuration properties factory |
124 | private final ConfigFactory factory = | 123 | private final ConfigFactory factory = |
125 | - new ConfigFactory<ApplicationId, AAAConfig>(APP_SUBJECT_FACTORY, | 124 | + new ConfigFactory<ApplicationId, AaaConfig>(APP_SUBJECT_FACTORY, |
126 | - AAAConfig.class, | 125 | + AaaConfig.class, |
127 | "AAA") { | 126 | "AAA") { |
128 | @Override | 127 | @Override |
129 | - public AAAConfig createConfig() { | 128 | + public AaaConfig createConfig() { |
130 | - return new AAAConfig(); | 129 | + return new AaaConfig(); |
131 | } | 130 | } |
132 | }; | 131 | }; |
133 | 132 | ||
... | @@ -175,7 +174,7 @@ public class AAA { | ... | @@ -175,7 +174,7 @@ public class AAA { |
175 | // "org.onosproject.aaa" is the FQDN of our app | 174 | // "org.onosproject.aaa" is the FQDN of our app |
176 | appId = coreService.registerApplication("org.onosproject.aaa"); | 175 | appId = coreService.registerApplication("org.onosproject.aaa"); |
177 | 176 | ||
178 | - cfgListener.reconfigureNetwork(netCfgService.getConfig(appId, AAAConfig.class)); | 177 | + cfgListener.reconfigureNetwork(netCfgService.getConfig(appId, AaaConfig.class)); |
179 | 178 | ||
180 | // register our event handler | 179 | // register our event handler |
181 | packetService.addProcessor(processor, PacketProcessor.director(2)); | 180 | packetService.addProcessor(processor, PacketProcessor.director(2)); |
... | @@ -207,7 +206,7 @@ public class AAA { | ... | @@ -207,7 +206,7 @@ public class AAA { |
207 | executor.shutdownNow(); | 206 | executor.shutdownNow(); |
208 | } | 207 | } |
209 | 208 | ||
210 | - protected void sendRADIUSPacket(RADIUS radiusPacket) { | 209 | + protected void sendRadiusPacket(RADIUS radiusPacket) { |
211 | 210 | ||
212 | try { | 211 | try { |
213 | final byte[] data = radiusPacket.serialize(); | 212 | final byte[] data = radiusPacket.serialize(); |
... | @@ -305,7 +304,7 @@ public class AAA { | ... | @@ -305,7 +304,7 @@ public class AAA { |
305 | stateMachine.username()); | 304 | stateMachine.username()); |
306 | 305 | ||
307 | radiusPayload.setAttribute(RADIUSAttribute.RADIUS_ATTR_NAS_IP, | 306 | radiusPayload.setAttribute(RADIUSAttribute.RADIUS_ATTR_NAS_IP, |
308 | - AAA.this.nasIpAddress.getAddress()); | 307 | + AaaManager.this.nasIpAddress.getAddress()); |
309 | 308 | ||
310 | radiusPayload.encapsulateMessage(eapPacket); | 309 | radiusPayload.encapsulateMessage(eapPacket); |
311 | 310 | ||
... | @@ -320,7 +319,7 @@ public class AAA { | ... | @@ -320,7 +319,7 @@ public class AAA { |
320 | private void handleSupplicantPacket(InboundPacket inPacket) throws StateMachineException { | 319 | private void handleSupplicantPacket(InboundPacket inPacket) throws StateMachineException { |
321 | Ethernet ethPkt = inPacket.parsed(); | 320 | Ethernet ethPkt = inPacket.parsed(); |
322 | // Where does it come from? | 321 | // Where does it come from? |
323 | - MacAddress srcMAC = ethPkt.getSourceMAC(); | 322 | + MacAddress srcMac = ethPkt.getSourceMAC(); |
324 | 323 | ||
325 | DeviceId deviceId = inPacket.receivedFrom().deviceId(); | 324 | DeviceId deviceId = inPacket.receivedFrom().deviceId(); |
326 | PortNumber portNumber = inPacket.receivedFrom().port(); | 325 | PortNumber portNumber = inPacket.receivedFrom().port(); |
... | @@ -340,10 +339,10 @@ public class AAA { | ... | @@ -340,10 +339,10 @@ public class AAA { |
340 | 339 | ||
341 | //send an EAP Request/Identify to the supplicant | 340 | //send an EAP Request/Identify to the supplicant |
342 | EAP eapPayload = new EAP(EAP.REQUEST, stateMachine.identifier(), EAP.ATTR_IDENTITY, null); | 341 | EAP eapPayload = new EAP(EAP.REQUEST, stateMachine.identifier(), EAP.ATTR_IDENTITY, null); |
343 | - Ethernet eth = buildEapolResponse(srcMAC, MacAddress.valueOf(nasMacAddress), | 342 | + Ethernet eth = buildEapolResponse(srcMac, MacAddress.valueOf(nasMacAddress), |
344 | ethPkt.getVlanID(), EAPOL.EAPOL_PACKET, | 343 | ethPkt.getVlanID(), EAPOL.EAPOL_PACKET, |
345 | eapPayload); | 344 | eapPayload); |
346 | - stateMachine.setSupplicantAddress(srcMAC); | 345 | + stateMachine.setSupplicantAddress(srcMac); |
347 | stateMachine.setVlanId(ethPkt.getVlanID()); | 346 | stateMachine.setVlanId(ethPkt.getVlanID()); |
348 | 347 | ||
349 | sendPacketToSupplicant(eth, stateMachine.supplicantConnectpoint()); | 348 | sendPacketToSupplicant(eth, stateMachine.supplicantConnectpoint()); |
... | @@ -362,9 +361,9 @@ public class AAA { | ... | @@ -362,9 +361,9 @@ public class AAA { |
362 | stateMachine.setUsername(eapPacket.getData()); | 361 | stateMachine.setUsername(eapPacket.getData()); |
363 | 362 | ||
364 | radiusPayload = getRadiusPayload(stateMachine, stateMachine.identifier(), eapPacket); | 363 | radiusPayload = getRadiusPayload(stateMachine, stateMachine.identifier(), eapPacket); |
365 | - radiusPayload.addMessageAuthenticator(AAA.this.radiusSecret); | 364 | + radiusPayload.addMessageAuthenticator(AaaManager.this.radiusSecret); |
366 | 365 | ||
367 | - sendRADIUSPacket(radiusPayload); | 366 | + sendRadiusPacket(radiusPayload); |
368 | 367 | ||
369 | // change the state to "PENDING" | 368 | // change the state to "PENDING" |
370 | stateMachine.requestAccess(); | 369 | stateMachine.requestAccess(); |
... | @@ -382,8 +381,8 @@ public class AAA { | ... | @@ -382,8 +381,8 @@ public class AAA { |
382 | 381 | ||
383 | radiusPayload.setAttribute(RADIUSAttribute.RADIUS_ATTR_STATE, | 382 | radiusPayload.setAttribute(RADIUSAttribute.RADIUS_ATTR_STATE, |
384 | stateMachine.challengeState()); | 383 | stateMachine.challengeState()); |
385 | - radiusPayload.addMessageAuthenticator(AAA.this.radiusSecret); | 384 | + radiusPayload.addMessageAuthenticator(AaaManager.this.radiusSecret); |
386 | - sendRADIUSPacket(radiusPayload); | 385 | + sendRadiusPacket(radiusPayload); |
387 | } | 386 | } |
388 | break; | 387 | break; |
389 | case EAP.ATTR_TLS: | 388 | case EAP.ATTR_TLS: |
... | @@ -391,11 +390,11 @@ public class AAA { | ... | @@ -391,11 +390,11 @@ public class AAA { |
391 | radiusPayload = getRadiusPayload(stateMachine, stateMachine.identifier(), eapPacket); | 390 | radiusPayload = getRadiusPayload(stateMachine, stateMachine.identifier(), eapPacket); |
392 | 391 | ||
393 | radiusPayload.setAttribute(RADIUSAttribute.RADIUS_ATTR_STATE, | 392 | radiusPayload.setAttribute(RADIUSAttribute.RADIUS_ATTR_STATE, |
394 | - stateMachine.challengeState()); | 393 | + stateMachine.challengeState()); |
395 | stateMachine.setRequestAuthenticator(radiusPayload.generateAuthCode()); | 394 | stateMachine.setRequestAuthenticator(radiusPayload.generateAuthCode()); |
396 | 395 | ||
397 | - radiusPayload.addMessageAuthenticator(AAA.this.radiusSecret); | 396 | + radiusPayload.addMessageAuthenticator(AaaManager.this.radiusSecret); |
398 | - sendRADIUSPacket(radiusPayload); | 397 | + sendRadiusPacket(radiusPayload); |
399 | 398 | ||
400 | if (stateMachine.state() != StateMachine.STATE_PENDING) { | 399 | if (stateMachine.state() != StateMachine.STATE_PENDING) { |
401 | stateMachine.requestAccess(); | 400 | stateMachine.requestAccess(); |
... | @@ -512,10 +511,10 @@ public class AAA { | ... | @@ -512,10 +511,10 @@ public class AAA { |
512 | * | 511 | * |
513 | * @param cfg configuration object | 512 | * @param cfg configuration object |
514 | */ | 513 | */ |
515 | - private void reconfigureNetwork(AAAConfig cfg) { | 514 | + private void reconfigureNetwork(AaaConfig cfg) { |
516 | - AAAConfig newCfg; | 515 | + AaaConfig newCfg; |
517 | if (cfg == null) { | 516 | if (cfg == null) { |
518 | - newCfg = new AAAConfig(); | 517 | + newCfg = new AaaConfig(); |
519 | } else { | 518 | } else { |
520 | newCfg = cfg; | 519 | newCfg = cfg; |
521 | } | 520 | } |
... | @@ -540,8 +539,8 @@ public class AAA { | ... | @@ -540,8 +539,8 @@ public class AAA { |
540 | if (newCfg.radiusPort() != -1) { | 539 | if (newCfg.radiusPort() != -1) { |
541 | radiusPort = newCfg.radiusPort(); | 540 | radiusPort = newCfg.radiusPort(); |
542 | } | 541 | } |
543 | - if (newCfg.radiusServerUDPPort() != -1) { | 542 | + if (newCfg.radiusServerUdpPort() != -1) { |
544 | - radiusServerPort = newCfg.radiusServerUDPPort(); | 543 | + radiusServerPort = newCfg.radiusServerUdpPort(); |
545 | } | 544 | } |
546 | } | 545 | } |
547 | 546 | ||
... | @@ -550,9 +549,9 @@ public class AAA { | ... | @@ -550,9 +549,9 @@ public class AAA { |
550 | 549 | ||
551 | if ((event.type() == NetworkConfigEvent.Type.CONFIG_ADDED || | 550 | if ((event.type() == NetworkConfigEvent.Type.CONFIG_ADDED || |
552 | event.type() == NetworkConfigEvent.Type.CONFIG_UPDATED) && | 551 | event.type() == NetworkConfigEvent.Type.CONFIG_UPDATED) && |
553 | - event.configClass().equals(AAAConfig.class)) { | 552 | + event.configClass().equals(AaaConfig.class)) { |
554 | 553 | ||
555 | - AAAConfig cfg = netCfgService.getConfig(appId, AAAConfig.class); | 554 | + AaaConfig cfg = netCfgService.getConfig(appId, AaaConfig.class); |
556 | reconfigureNetwork(cfg); | 555 | reconfigureNetwork(cfg); |
557 | log.info("Reconfigured"); | 556 | log.info("Reconfigured"); |
558 | } | 557 | } | ... | ... |
... | @@ -34,9 +34,9 @@ import static org.junit.Assert.assertThat; | ... | @@ -34,9 +34,9 @@ import static org.junit.Assert.assertThat; |
34 | * server and sends live packets over the network to it. | 34 | * server and sends live packets over the network to it. |
35 | */ | 35 | */ |
36 | @Ignore ("This should not be run as part of the standard build") | 36 | @Ignore ("This should not be run as part of the standard build") |
37 | -public class AAAIntegrationTest extends AAATestBase { | 37 | +public class AaaIntegrationTest extends AaaTestBase { |
38 | 38 | ||
39 | - private AAA aaa; | 39 | + private AaaManager aaa; |
40 | 40 | ||
41 | /** | 41 | /** |
42 | * Mocks the network config registry. | 42 | * Mocks the network config registry. |
... | @@ -46,7 +46,7 @@ public class AAAIntegrationTest extends AAATestBase { | ... | @@ -46,7 +46,7 @@ public class AAAIntegrationTest extends AAATestBase { |
46 | extends NetworkConfigRegistryAdapter { | 46 | extends NetworkConfigRegistryAdapter { |
47 | @Override | 47 | @Override |
48 | public <S, C extends Config<S>> C getConfig(S subject, Class<C> configClass) { | 48 | public <S, C extends Config<S>> C getConfig(S subject, Class<C> configClass) { |
49 | - return (C) new AAAConfig(); | 49 | + return (C) new AaaConfig(); |
50 | } | 50 | } |
51 | } | 51 | } |
52 | 52 | ||
... | @@ -55,7 +55,7 @@ public class AAAIntegrationTest extends AAATestBase { | ... | @@ -55,7 +55,7 @@ public class AAAIntegrationTest extends AAATestBase { |
55 | */ | 55 | */ |
56 | @Before | 56 | @Before |
57 | public void setUp() { | 57 | public void setUp() { |
58 | - aaa = new AAA(); | 58 | + aaa = new AaaManager(); |
59 | aaa.netCfgService = new TestNetworkConfigRegistry(); | 59 | aaa.netCfgService = new TestNetworkConfigRegistry(); |
60 | aaa.coreService = new CoreServiceAdapter(); | 60 | aaa.coreService = new CoreServiceAdapter(); |
61 | aaa.packetService = new MockPacketService(); | 61 | aaa.packetService = new MockPacketService(); |
... | @@ -136,9 +136,9 @@ public class AAAIntegrationTest extends AAATestBase { | ... | @@ -136,9 +136,9 @@ public class AAAIntegrationTest extends AAATestBase { |
136 | 136 | ||
137 | Ethernet successRadiusPacket = fetchPacket(2); | 137 | Ethernet successRadiusPacket = fetchPacket(2); |
138 | assertThat(successRadiusPacket, notNullValue()); | 138 | assertThat(successRadiusPacket, notNullValue()); |
139 | - EAPOL successEAPOL = (EAPOL) successRadiusPacket.getPayload(); | 139 | + EAPOL successEapol = (EAPOL) successRadiusPacket.getPayload(); |
140 | - EAP successEAP = (EAP) successEAPOL.getPayload(); | 140 | + EAP successEap = (EAP) successEapol.getPayload(); |
141 | - assertThat(successEAP.getCode(), is(EAP.SUCCESS)); | 141 | + assertThat(successEap.getCode(), is(EAP.SUCCESS)); |
142 | 142 | ||
143 | // State machine should be in authorized state | 143 | // State machine should be in authorized state |
144 | 144 | ... | ... |
... | @@ -15,9 +15,7 @@ | ... | @@ -15,9 +15,7 @@ |
15 | */ | 15 | */ |
16 | package org.onosproject.aaa; | 16 | package org.onosproject.aaa; |
17 | 17 | ||
18 | -import java.net.InetAddress; | 18 | +import com.google.common.base.Charsets; |
19 | -import java.net.UnknownHostException; | ||
20 | - | ||
21 | import org.junit.After; | 19 | import org.junit.After; |
22 | import org.junit.Before; | 20 | import org.junit.Before; |
23 | import org.junit.Test; | 21 | import org.junit.Test; |
... | @@ -32,7 +30,8 @@ import org.onosproject.core.CoreServiceAdapter; | ... | @@ -32,7 +30,8 @@ import org.onosproject.core.CoreServiceAdapter; |
32 | import org.onosproject.net.config.Config; | 30 | import org.onosproject.net.config.Config; |
33 | import org.onosproject.net.config.NetworkConfigRegistryAdapter; | 31 | import org.onosproject.net.config.NetworkConfigRegistryAdapter; |
34 | 32 | ||
35 | -import com.google.common.base.Charsets; | 33 | +import java.net.InetAddress; |
34 | +import java.net.UnknownHostException; | ||
36 | 35 | ||
37 | import static org.hamcrest.Matchers.is; | 36 | import static org.hamcrest.Matchers.is; |
38 | import static org.hamcrest.Matchers.notNullValue; | 37 | import static org.hamcrest.Matchers.notNullValue; |
... | @@ -41,14 +40,14 @@ import static org.junit.Assert.assertThat; | ... | @@ -41,14 +40,14 @@ import static org.junit.Assert.assertThat; |
41 | /** | 40 | /** |
42 | * Set of tests of the ONOS application component. | 41 | * Set of tests of the ONOS application component. |
43 | */ | 42 | */ |
44 | -public class AAATest extends AAATestBase { | 43 | +public class AaaManagerTest extends AaaTestBase { |
45 | 44 | ||
46 | static final String BAD_IP_ADDRESS = "198.51.100.0"; | 45 | static final String BAD_IP_ADDRESS = "198.51.100.0"; |
47 | 46 | ||
48 | - private AAA aaa; | 47 | + private AaaManager aaaManager; |
49 | 48 | ||
50 | - class AAAWithoutRadiusServer extends AAA { | 49 | + class AaaManagerWithoutRadiusServer extends AaaManager { |
51 | - protected void sendRADIUSPacket(RADIUS radiusPacket) { | 50 | + protected void sendRadiusPacket(RADIUS radiusPacket) { |
52 | savePacket(radiusPacket); | 51 | savePacket(radiusPacket); |
53 | } | 52 | } |
54 | } | 53 | } |
... | @@ -57,7 +56,7 @@ public class AAATest extends AAATestBase { | ... | @@ -57,7 +56,7 @@ public class AAATest extends AAATestBase { |
57 | * Mocks the AAAConfig class to force usage of an unroutable address for the | 56 | * Mocks the AAAConfig class to force usage of an unroutable address for the |
58 | * RADIUS server. | 57 | * RADIUS server. |
59 | */ | 58 | */ |
60 | - static class MockAAAConfig extends AAAConfig { | 59 | + static class MockAaaConfig extends AaaConfig { |
61 | @Override | 60 | @Override |
62 | public InetAddress radiusIp() { | 61 | public InetAddress radiusIp() { |
63 | try { | 62 | try { |
... | @@ -77,7 +76,7 @@ public class AAATest extends AAATestBase { | ... | @@ -77,7 +76,7 @@ public class AAATest extends AAATestBase { |
77 | extends NetworkConfigRegistryAdapter { | 76 | extends NetworkConfigRegistryAdapter { |
78 | @Override | 77 | @Override |
79 | public <S, C extends Config<S>> C getConfig(S subject, Class<C> configClass) { | 78 | public <S, C extends Config<S>> C getConfig(S subject, Class<C> configClass) { |
80 | - AAAConfig aaaConfig = new MockAAAConfig(); | 79 | + AaaConfig aaaConfig = new MockAaaConfig(); |
81 | return (C) aaaConfig; | 80 | return (C) aaaConfig; |
82 | } | 81 | } |
83 | } | 82 | } |
... | @@ -90,7 +89,7 @@ public class AAATest extends AAATestBase { | ... | @@ -90,7 +89,7 @@ public class AAATest extends AAATestBase { |
90 | * @param challengeType type to use in challenge packet | 89 | * @param challengeType type to use in challenge packet |
91 | * @return Ethernet packet | 90 | * @return Ethernet packet |
92 | */ | 91 | */ |
93 | - private RADIUS constructRADIUSCodeAccessChallengePacket(byte challengeCode, byte challengeType) { | 92 | + private RADIUS constructRadiusCodeAccessChallengePacket(byte challengeCode, byte challengeType) { |
94 | 93 | ||
95 | String challenge = "12345678901234567"; | 94 | String challenge = "12345678901234567"; |
96 | 95 | ||
... | @@ -116,11 +115,11 @@ public class AAATest extends AAATestBase { | ... | @@ -116,11 +115,11 @@ public class AAATest extends AAATestBase { |
116 | */ | 115 | */ |
117 | @Before | 116 | @Before |
118 | public void setUp() { | 117 | public void setUp() { |
119 | - aaa = new AAAWithoutRadiusServer(); | 118 | + aaaManager = new AaaManagerWithoutRadiusServer(); |
120 | - aaa.netCfgService = new TestNetworkConfigRegistry(); | 119 | + aaaManager.netCfgService = new TestNetworkConfigRegistry(); |
121 | - aaa.coreService = new CoreServiceAdapter(); | 120 | + aaaManager.coreService = new CoreServiceAdapter(); |
122 | - aaa.packetService = new MockPacketService(); | 121 | + aaaManager.packetService = new MockPacketService(); |
123 | - aaa.activate(); | 122 | + aaaManager.activate(); |
124 | } | 123 | } |
125 | 124 | ||
126 | /** | 125 | /** |
... | @@ -128,7 +127,7 @@ public class AAATest extends AAATestBase { | ... | @@ -128,7 +127,7 @@ public class AAATest extends AAATestBase { |
128 | */ | 127 | */ |
129 | @After | 128 | @After |
130 | public void tearDown() { | 129 | public void tearDown() { |
131 | - aaa.deactivate(); | 130 | + aaaManager.deactivate(); |
132 | } | 131 | } |
133 | 132 | ||
134 | /** | 133 | /** |
... | @@ -138,7 +137,7 @@ public class AAATest extends AAATestBase { | ... | @@ -138,7 +137,7 @@ public class AAATest extends AAATestBase { |
138 | * @throws DeserializationException if deserialization of the packet contents | 137 | * @throws DeserializationException if deserialization of the packet contents |
139 | * fails. | 138 | * fails. |
140 | */ | 139 | */ |
141 | - private void checkRADIUSPacketFromSupplicant(RADIUS radius) | 140 | + private void checkRadiusPacketFromSupplicant(RADIUS radius) |
142 | throws DeserializationException { | 141 | throws DeserializationException { |
143 | assertThat(radius, notNullValue()); | 142 | assertThat(radius, notNullValue()); |
144 | 143 | ||
... | @@ -173,7 +172,7 @@ public class AAATest extends AAATestBase { | ... | @@ -173,7 +172,7 @@ public class AAATest extends AAATestBase { |
173 | sendPacket(startPacket); | 172 | sendPacket(startPacket); |
174 | 173 | ||
175 | Ethernet responsePacket = (Ethernet) fetchPacket(0); | 174 | Ethernet responsePacket = (Ethernet) fetchPacket(0); |
176 | - checkRadiusPacket(aaa, responsePacket, EAP.ATTR_IDENTITY); | 175 | + checkRadiusPacket(aaaManager, responsePacket, EAP.ATTR_IDENTITY); |
177 | 176 | ||
178 | // (2) Supplicant identify | 177 | // (2) Supplicant identify |
179 | 178 | ||
... | @@ -182,7 +181,7 @@ public class AAATest extends AAATestBase { | ... | @@ -182,7 +181,7 @@ public class AAATest extends AAATestBase { |
182 | 181 | ||
183 | RADIUS radiusIdentifyPacket = (RADIUS) fetchPacket(1); | 182 | RADIUS radiusIdentifyPacket = (RADIUS) fetchPacket(1); |
184 | 183 | ||
185 | - checkRADIUSPacketFromSupplicant(radiusIdentifyPacket); | 184 | + checkRadiusPacketFromSupplicant(radiusIdentifyPacket); |
186 | 185 | ||
187 | assertThat(radiusIdentifyPacket.getCode(), is(RADIUS.RADIUS_CODE_ACCESS_REQUEST)); | 186 | assertThat(radiusIdentifyPacket.getCode(), is(RADIUS.RADIUS_CODE_ACCESS_REQUEST)); |
188 | assertThat(new String(radiusIdentifyPacket.getAttribute(RADIUSAttribute.RADIUS_ATTR_USERNAME).getValue()), | 187 | assertThat(new String(radiusIdentifyPacket.getAttribute(RADIUSAttribute.RADIUS_ATTR_USERNAME).getValue()), |
... | @@ -192,7 +191,7 @@ public class AAATest extends AAATestBase { | ... | @@ -192,7 +191,7 @@ public class AAATest extends AAATestBase { |
192 | IpAddress.valueOf(IpAddress.Version.INET, | 191 | IpAddress.valueOf(IpAddress.Version.INET, |
193 | radiusIdentifyPacket.getAttribute(RADIUSAttribute.RADIUS_ATTR_NAS_IP) | 192 | radiusIdentifyPacket.getAttribute(RADIUSAttribute.RADIUS_ATTR_NAS_IP) |
194 | .getValue()); | 193 | .getValue()); |
195 | - assertThat(nasIp.toString(), is(aaa.nasIpAddress.getHostAddress())); | 194 | + assertThat(nasIp.toString(), is(aaaManager.nasIpAddress.getHostAddress())); |
196 | 195 | ||
197 | // State machine should have been created by now | 196 | // State machine should have been created by now |
198 | 197 | ||
... | @@ -204,11 +203,11 @@ public class AAATest extends AAATestBase { | ... | @@ -204,11 +203,11 @@ public class AAATest extends AAATestBase { |
204 | // (3) RADIUS MD5 challenge | 203 | // (3) RADIUS MD5 challenge |
205 | 204 | ||
206 | RADIUS radiusCodeAccessChallengePacket = | 205 | RADIUS radiusCodeAccessChallengePacket = |
207 | - constructRADIUSCodeAccessChallengePacket(RADIUS.RADIUS_CODE_ACCESS_CHALLENGE, EAP.ATTR_MD5); | 206 | + constructRadiusCodeAccessChallengePacket(RADIUS.RADIUS_CODE_ACCESS_CHALLENGE, EAP.ATTR_MD5); |
208 | - aaa.radiusListener.handleRadiusPacket(radiusCodeAccessChallengePacket); | 207 | + aaaManager.radiusListener.handleRadiusPacket(radiusCodeAccessChallengePacket); |
209 | 208 | ||
210 | Ethernet radiusChallengeMD5Packet = (Ethernet) fetchPacket(2); | 209 | Ethernet radiusChallengeMD5Packet = (Ethernet) fetchPacket(2); |
211 | - checkRadiusPacket(aaa, radiusChallengeMD5Packet, EAP.ATTR_MD5); | 210 | + checkRadiusPacket(aaaManager, radiusChallengeMD5Packet, EAP.ATTR_MD5); |
212 | 211 | ||
213 | // (4) Supplicant MD5 response | 212 | // (4) Supplicant MD5 response |
214 | 213 | ||
... | @@ -221,7 +220,7 @@ public class AAATest extends AAATestBase { | ... | @@ -221,7 +220,7 @@ public class AAATest extends AAATestBase { |
221 | 220 | ||
222 | RADIUS responseMd5RadiusPacket = (RADIUS) fetchPacket(3); | 221 | RADIUS responseMd5RadiusPacket = (RADIUS) fetchPacket(3); |
223 | 222 | ||
224 | - checkRADIUSPacketFromSupplicant(responseMd5RadiusPacket); | 223 | + checkRadiusPacketFromSupplicant(responseMd5RadiusPacket); |
225 | assertThat(responseMd5RadiusPacket.getIdentifier(), is((byte) 0)); | 224 | assertThat(responseMd5RadiusPacket.getIdentifier(), is((byte) 0)); |
226 | assertThat(responseMd5RadiusPacket.getCode(), is(RADIUS.RADIUS_CODE_ACCESS_REQUEST)); | 225 | assertThat(responseMd5RadiusPacket.getCode(), is(RADIUS.RADIUS_CODE_ACCESS_REQUEST)); |
227 | 226 | ||
... | @@ -233,11 +232,11 @@ public class AAATest extends AAATestBase { | ... | @@ -233,11 +232,11 @@ public class AAATest extends AAATestBase { |
233 | // (5) RADIUS Success | 232 | // (5) RADIUS Success |
234 | 233 | ||
235 | RADIUS successPacket = | 234 | RADIUS successPacket = |
236 | - constructRADIUSCodeAccessChallengePacket(RADIUS.RADIUS_CODE_ACCESS_ACCEPT, EAP.SUCCESS); | 235 | + constructRadiusCodeAccessChallengePacket(RADIUS.RADIUS_CODE_ACCESS_ACCEPT, EAP.SUCCESS); |
237 | - aaa.radiusListener.handleRadiusPacket((successPacket)); | 236 | + aaaManager.radiusListener.handleRadiusPacket((successPacket)); |
238 | Ethernet supplicantSuccessPacket = (Ethernet) fetchPacket(4); | 237 | Ethernet supplicantSuccessPacket = (Ethernet) fetchPacket(4); |
239 | 238 | ||
240 | - checkRadiusPacket(aaa, supplicantSuccessPacket, EAP.SUCCESS); | 239 | + checkRadiusPacket(aaaManager, supplicantSuccessPacket, EAP.SUCCESS); |
241 | 240 | ||
242 | // State machine should be in authorized state | 241 | // State machine should be in authorized state |
243 | 242 | ||
... | @@ -251,9 +250,9 @@ public class AAATest extends AAATestBase { | ... | @@ -251,9 +250,9 @@ public class AAATest extends AAATestBase { |
251 | */ | 250 | */ |
252 | @Test | 251 | @Test |
253 | public void testConfig() { | 252 | public void testConfig() { |
254 | - assertThat(aaa.nasIpAddress.getHostAddress(), is(AAAConfig.DEFAULT_NAS_IP)); | 253 | + assertThat(aaaManager.nasIpAddress.getHostAddress(), is(AaaConfig.DEFAULT_NAS_IP)); |
255 | - assertThat(aaa.nasMacAddress, is(AAAConfig.DEFAULT_NAS_MAC)); | 254 | + assertThat(aaaManager.nasMacAddress, is(AaaConfig.DEFAULT_NAS_MAC)); |
256 | - assertThat(aaa.radiusIpAddress.getHostAddress(), is(BAD_IP_ADDRESS)); | 255 | + assertThat(aaaManager.radiusIpAddress.getHostAddress(), is(BAD_IP_ADDRESS)); |
257 | - assertThat(aaa.radiusMacAddress, is(AAAConfig.DEFAULT_RADIUS_MAC)); | 256 | + assertThat(aaaManager.radiusMacAddress, is(AaaConfig.DEFAULT_RADIUS_MAC)); |
258 | } | 257 | } |
259 | } | 258 | } | ... | ... |
... | @@ -15,11 +15,6 @@ | ... | @@ -15,11 +15,6 @@ |
15 | */ | 15 | */ |
16 | package org.onosproject.aaa; | 16 | package org.onosproject.aaa; |
17 | 17 | ||
18 | -import java.nio.ByteBuffer; | ||
19 | -import java.security.MessageDigest; | ||
20 | -import java.util.LinkedList; | ||
21 | -import java.util.List; | ||
22 | - | ||
23 | import org.onlab.packet.BasePacket; | 18 | import org.onlab.packet.BasePacket; |
24 | import org.onlab.packet.EAP; | 19 | import org.onlab.packet.EAP; |
25 | import org.onlab.packet.EAPOL; | 20 | import org.onlab.packet.EAPOL; |
... | @@ -34,6 +29,11 @@ import org.onosproject.net.packet.PacketContext; | ... | @@ -34,6 +29,11 @@ import org.onosproject.net.packet.PacketContext; |
34 | import org.onosproject.net.packet.PacketProcessor; | 29 | import org.onosproject.net.packet.PacketProcessor; |
35 | import org.onosproject.net.packet.PacketServiceAdapter; | 30 | import org.onosproject.net.packet.PacketServiceAdapter; |
36 | 31 | ||
32 | +import java.nio.ByteBuffer; | ||
33 | +import java.security.MessageDigest; | ||
34 | +import java.util.LinkedList; | ||
35 | +import java.util.List; | ||
36 | + | ||
37 | import static org.hamcrest.Matchers.instanceOf; | 37 | import static org.hamcrest.Matchers.instanceOf; |
38 | import static org.hamcrest.Matchers.is; | 38 | import static org.hamcrest.Matchers.is; |
39 | import static org.hamcrest.Matchers.notNullValue; | 39 | import static org.hamcrest.Matchers.notNullValue; |
... | @@ -44,7 +44,7 @@ import static org.onosproject.net.NetTestTools.connectPoint; | ... | @@ -44,7 +44,7 @@ import static org.onosproject.net.NetTestTools.connectPoint; |
44 | /** | 44 | /** |
45 | * Common methods for AAA app testing. | 45 | * Common methods for AAA app testing. |
46 | */ | 46 | */ |
47 | -public class AAATestBase { | 47 | +public class AaaTestBase { |
48 | 48 | ||
49 | MacAddress clientMac = MacAddress.valueOf("1a:1a:1a:1a:1a:1a"); | 49 | MacAddress clientMac = MacAddress.valueOf("1a:1a:1a:1a:1a:1a"); |
50 | MacAddress serverMac = MacAddress.valueOf("2a:2a:2a:2a:2a:2a"); | 50 | MacAddress serverMac = MacAddress.valueOf("2a:2a:2a:2a:2a:2a"); |
... | @@ -204,10 +204,10 @@ public class AAATestBase { | ... | @@ -204,10 +204,10 @@ public class AAATestBase { |
204 | * @param radiusPacket packet to check | 204 | * @param radiusPacket packet to check |
205 | * @param code expected code | 205 | * @param code expected code |
206 | */ | 206 | */ |
207 | - void checkRadiusPacket(AAA aaa, Ethernet radiusPacket, byte code) { | 207 | + void checkRadiusPacket(AaaManager aaaManager, Ethernet radiusPacket, byte code) { |
208 | 208 | ||
209 | assertThat(radiusPacket.getSourceMAC(), | 209 | assertThat(radiusPacket.getSourceMAC(), |
210 | - is(MacAddress.valueOf(aaa.nasMacAddress))); | 210 | + is(MacAddress.valueOf(aaaManager.nasMacAddress))); |
211 | assertThat(radiusPacket.getDestinationMAC(), is(serverMac)); | 211 | assertThat(radiusPacket.getDestinationMAC(), is(serverMac)); |
212 | 212 | ||
213 | assertThat(radiusPacket.getPayload(), instanceOf(EAPOL.class)); | 213 | assertThat(radiusPacket.getPayload(), instanceOf(EAPOL.class)); | ... | ... |
... | @@ -62,7 +62,7 @@ import static org.slf4j.LoggerFactory.getLogger; | ... | @@ -62,7 +62,7 @@ import static org.slf4j.LoggerFactory.getLogger; |
62 | */ | 62 | */ |
63 | @Service | 63 | @Service |
64 | @Component(immediate = true) | 64 | @Component(immediate = true) |
65 | -public class OLT implements AccessDeviceService { | 65 | +public class Olt implements AccessDeviceService { |
66 | private final Logger log = getLogger(getClass()); | 66 | private final Logger log = getLogger(getClass()); |
67 | 67 | ||
68 | @Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY) | 68 | @Reference(cardinality = ReferenceCardinality.MANDATORY_UNARY) | ... | ... |
... | @@ -68,7 +68,7 @@ import static org.slf4j.LoggerFactory.getLogger; | ... | @@ -68,7 +68,7 @@ import static org.slf4j.LoggerFactory.getLogger; |
68 | */ | 68 | */ |
69 | @Component(immediate = true) | 69 | @Component(immediate = true) |
70 | @Service | 70 | @Service |
71 | -public class OnosXOSIntegrationManager implements VoltTenantService { | 71 | +public class OnosXosIntegrationManager implements VoltTenantService { |
72 | private static final String XOS_SERVER_ADDRESS_PROPERTY_NAME = | 72 | private static final String XOS_SERVER_ADDRESS_PROPERTY_NAME = |
73 | "xosServerAddress"; | 73 | "xosServerAddress"; |
74 | private static final String XOS_SERVER_PORT_PROPERTY_NAME = | 74 | private static final String XOS_SERVER_PORT_PROPERTY_NAME = |
... | @@ -355,12 +355,12 @@ public class OnosXOSIntegrationManager implements VoltTenantService { | ... | @@ -355,12 +355,12 @@ public class OnosXOSIntegrationManager implements VoltTenantService { |
355 | 355 | ||
356 | String retJson = postRest(json); | 356 | String retJson = postRest(json); |
357 | 357 | ||
358 | - fetchCPELocation(tenantToCreate, retJson); | 358 | + fetchCpeLocation(tenantToCreate, retJson); |
359 | 359 | ||
360 | return newTenant; | 360 | return newTenant; |
361 | } | 361 | } |
362 | 362 | ||
363 | - private void fetchCPELocation(VoltTenant newTenant, String jsonString) { | 363 | + private void fetchCpeLocation(VoltTenant newTenant, String jsonString) { |
364 | JsonObject json = JsonObject.readFrom(jsonString); | 364 | JsonObject json = JsonObject.readFrom(jsonString); |
365 | 365 | ||
366 | if (json.get("computeNodeName") != null) { | 366 | if (json.get("computeNodeName") != null) { | ... | ... |
... | @@ -57,7 +57,7 @@ import static org.slf4j.LoggerFactory.getLogger; | ... | @@ -57,7 +57,7 @@ import static org.slf4j.LoggerFactory.getLogger; |
57 | /** | 57 | /** |
58 | * Pipeliner for OLT device. | 58 | * Pipeliner for OLT device. |
59 | */ | 59 | */ |
60 | -public class OLTPipeline extends AbstractHandlerBehaviour implements Pipeliner { | 60 | +public class OltPipeline extends AbstractHandlerBehaviour implements Pipeliner { |
61 | 61 | ||
62 | private final Logger log = getLogger(getClass()); | 62 | private final Logger log = getLogger(getClass()); |
63 | 63 | ... | ... |
... | @@ -78,12 +78,12 @@ | ... | @@ -78,12 +78,12 @@ |
78 | <driver name="pmc-olt" extends="default" | 78 | <driver name="pmc-olt" extends="default" |
79 | manufacturer="Big Switch Networks" hwVersion="ivs 0.5" swVersion="ivs 0.5"> | 79 | manufacturer="Big Switch Networks" hwVersion="ivs 0.5" swVersion="ivs 0.5"> |
80 | <behaviour api="org.onosproject.net.behaviour.Pipeliner" | 80 | <behaviour api="org.onosproject.net.behaviour.Pipeliner" |
81 | - impl="org.onosproject.driver.pipeline.OLTPipeline"/> | 81 | + impl="org.onosproject.driver.pipeline.OltPipeline"/> |
82 | </driver> | 82 | </driver> |
83 | <driver name="g.fast" extends="default" | 83 | <driver name="g.fast" extends="default" |
84 | manufacturer="TEST1" hwVersion="TEST2" swVersion="TEST3"> | 84 | manufacturer="TEST1" hwVersion="TEST2" swVersion="TEST3"> |
85 | <behaviour api="org.onosproject.net.behaviour.Pipeliner" | 85 | <behaviour api="org.onosproject.net.behaviour.Pipeliner" |
86 | - impl="org.onosproject.driver.pipeline.OLTPipeline"/> | 86 | + impl="org.onosproject.driver.pipeline.OltPipeline"/> |
87 | </driver> | 87 | </driver> |
88 | <!-- The SoftRouter driver is meant to be used by any software/NPU based | 88 | <!-- The SoftRouter driver is meant to be used by any software/NPU based |
89 | ~ switch that wishes to implement a simple 2-table router. To use this | 89 | ~ switch that wishes to implement a simple 2-table router. To use this | ... | ... |
-
Please register or login to post a comment