get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/116979/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 116979,
    "url": "https://patches.dpdk.org/api/patches/116979/?format=api",
    "web_url": "https://patches.dpdk.org/project/dts/patch/20220928031836.770004-3-ke1.xu@intel.com/",
    "project": {
        "id": 3,
        "url": "https://patches.dpdk.org/api/projects/3/?format=api",
        "name": "DTS",
        "link_name": "dts",
        "list_id": "dts.dpdk.org",
        "list_email": "dts@dpdk.org",
        "web_url": "",
        "scm_url": "git://dpdk.org/tools/dts",
        "webscm_url": "http://git.dpdk.org/tools/dts/",
        "list_archive_url": "https://inbox.dpdk.org/dts",
        "list_archive_url_format": "https://inbox.dpdk.org/dts/{}",
        "commit_url_format": ""
    },
    "msgid": "<20220928031836.770004-3-ke1.xu@intel.com>",
    "list_archive_url": "https://inbox.dpdk.org/dts/20220928031836.770004-3-ke1.xu@intel.com",
    "date": "2022-09-28T03:18:21",
    "name": "[V1,02/21] test_plans/ice_dcf_acl_filter: update test plan to support represented port action from deprecated vf action",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": false,
    "hash": "3fc071d89a7414785e734f6be61a247bf8730662",
    "submitter": {
        "id": 2810,
        "url": "https://patches.dpdk.org/api/people/2810/?format=api",
        "name": "Ke Xu",
        "email": "ke1.xu@intel.com"
    },
    "delegate": null,
    "mbox": "https://patches.dpdk.org/project/dts/patch/20220928031836.770004-3-ke1.xu@intel.com/mbox/",
    "series": [
        {
            "id": 24869,
            "url": "https://patches.dpdk.org/api/series/24869/?format=api",
            "web_url": "https://patches.dpdk.org/project/dts/list/?series=24869",
            "date": "2022-09-28T03:18:17",
            "name": "update test plans and tests to support represented port action and port representor action from deprecated vf action on DCF cases",
            "version": 1,
            "mbox": "https://patches.dpdk.org/series/24869/mbox/"
        }
    ],
    "comments": "https://patches.dpdk.org/api/patches/116979/comments/",
    "check": "pending",
    "checks": "https://patches.dpdk.org/api/patches/116979/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dts-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 4D1B0A00C2;\n\tWed, 28 Sep 2022 05:24:13 +0200 (CEST)",
            "from [217.70.189.124] (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id 4985E4113D;\n\tWed, 28 Sep 2022 05:24:13 +0200 (CEST)",
            "from mga04.intel.com (mga04.intel.com [192.55.52.120])\n by mails.dpdk.org (Postfix) with ESMTP id 8609D40E25\n for <dts@dpdk.org>; Wed, 28 Sep 2022 05:24:11 +0200 (CEST)",
            "from fmsmga003.fm.intel.com ([10.253.24.29])\n by fmsmga104.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 27 Sep 2022 20:24:10 -0700",
            "from unknown (HELO DPDK-XUKE-LAB.sh.intel.com) ([10.67.116.226])\n by FMSMGA003.fm.intel.com with ESMTP; 27 Sep 2022 20:24:08 -0700"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/simple;\n d=intel.com; i=@intel.com; q=dns/txt; s=Intel;\n t=1664335451; x=1695871451;\n h=from:to:cc:subject:date:message-id:in-reply-to:\n references:mime-version:content-transfer-encoding;\n bh=FctFfbgxwCdiAEC10P51PxWEZeF9hzkueqO6s3ptmfo=;\n b=nfe3pup5Ek5IgNwf439iE1+yrXBG4OBb8nJmha3ilw0piuDMd0mj+GZc\n 0zCUtdytLiOcXeF91lPsArEvYs4m594cJiPkeJWK74CX4K46S0A1wgBGq\n 2Vfpnz/e676t5w5XSaaQfav3h05Vkcn3TNXe7q7Od3XN2wt8EVpswkGN3\n n6SIyBDIQieWDc9GFQmUyJG3iAp6c8zUgCHi1WKi7GleJF1g3bKp4Q/1b\n df1CxjcDCJUN/9PGOA2YpvPy/m/HVXJOzCftIW2ICCsUcOz93JJuIqBUI\n TDdd6JfNPUJC5Xe+Zxr4Q5jFHVe9GrgnUsXm7HkCTARr2rCiDr32K8QT6 Q==;",
        "X-IronPort-AV": [
            "E=McAfee;i=\"6500,9779,10483\"; a=\"300210246\"",
            "E=Sophos;i=\"5.93,350,1654585200\"; d=\"scan'208\";a=\"300210246\"",
            "E=McAfee;i=\"6500,9779,10483\"; a=\"710802717\"",
            "E=Sophos;i=\"5.93,350,1654585200\"; d=\"scan'208\";a=\"710802717\""
        ],
        "X-ExtLoop1": "1",
        "From": "Ke Xu <ke1.xu@intel.com>",
        "To": "dts@dpdk.org",
        "Cc": "lijuan.tu@intel.com, jin.ling@intel.com, zhiminx.huang@intel.com,\n weiyuanx.li@intel.com, qi.fu@intel.com, Ke Xu <ke1.xu@intel.com>",
        "Subject": "[DTS][PATCH V1 02/21] test_plans/ice_dcf_acl_filter: update test plan\n to support represented port action from deprecated vf action",
        "Date": "Wed, 28 Sep 2022 03:18:21 +0000",
        "Message-Id": "<20220928031836.770004-3-ke1.xu@intel.com>",
        "X-Mailer": "git-send-email 2.25.1",
        "In-Reply-To": "<20220928031836.770004-1-ke1.xu@intel.com>",
        "References": "<20220928031836.770004-1-ke1.xu@intel.com>",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "X-BeenThere": "dts@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "test suite reviews and discussions <dts.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dts>,\n <mailto:dts-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dts/>",
        "List-Post": "<mailto:dts@dpdk.org>",
        "List-Help": "<mailto:dts-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dts>,\n <mailto:dts-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dts-bounces@dpdk.org"
    },
    "content": "Signed-off-by: Jin Ling <jin.ling@intel.com>\nReviewed-by: Ke Xu <ke1.xu@intel.com>\n---\n test_plans/ice_dcf_acl_filter_test_plan.rst | 62 ++++++++++-----------\n 1 file changed, 31 insertions(+), 31 deletions(-)",
    "diff": "diff --git a/test_plans/ice_dcf_acl_filter_test_plan.rst b/test_plans/ice_dcf_acl_filter_test_plan.rst\nindex a6d038a0..f047598d 100644\n--- a/test_plans/ice_dcf_acl_filter_test_plan.rst\n+++ b/test_plans/ice_dcf_acl_filter_test_plan.rst\n@@ -90,7 +90,7 @@ Prerequisites\n \n or launch one testpmd on VF0 and VF1::\n \n-    ./x86_64-native-linuxapp-gcc/app/dpdk-testpmd -c 0xf -n 4 -a 0000:86:01.0,cap=dcf -a 86:01.1 --file-prefix=vf0 --log-level=\"ice,7\" -- -i\n+    ./x86_64-native-linuxapp-gcc/app/dpdk-testpmd -c 0xf -n 4 -a 0000:86:01.0,cap=dcf,representor=vf[1] -a 86:01.1 --file-prefix=vf0 --log-level=\"ice,7\" -- -i\n \n Common steps of basic cases\n ===========================\n@@ -134,9 +134,9 @@ Then the ACL filter can filter the packet with dst mac address.\n \n 1. rule::\n \n-    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 / end actions vf id 1 / end\n-    flow create 0 ingress pattern eth dst is 00:11:22:33:44:66 / ipv4 / end actions vf id 1 / end\n-    flow create 0 ingress pattern eth dst is 00:11:22:33:66:55 / ipv4 / end actions vf id 1 / end\n+    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 / end actions represented_port ethdev_port_id 1 / end\n+    flow create 0 ingress pattern eth dst is 00:11:22:33:44:66 / ipv4 / end actions represented_port ethdev_port_id 1 / end\n+    flow create 0 ingress pattern eth dst is 00:11:22:33:66:55 / ipv4 / end actions represented_port ethdev_port_id 1 / end\n     flow create 0 ingress pattern eth dst spec 00:11:22:33:44:55 dst mask ff:ff:ff:ff:ff:00 / ipv4 / end actions drop / end\n \n 2. matched packets::\n@@ -223,9 +223,9 @@ Subcase 6: src mac + dst mac + src ipv4 + dst ipv4(only 2port NIC support)\n --------------------------------------------------------------------------\n 1. rule::\n \n-    flow create 0 ingress pattern eth dst is 33:00:00:00:00:01 / ipv4 / end actions vf id 1 / end\n-    flow create 0 ingress pattern eth dst is 33:00:00:00:00:02 / ipv4 / end actions vf id 1 / end\n-    flow create 0 ingress pattern eth dst is 33:00:00:00:00:03 / ipv4 / end actions vf id 1 / end\n+    flow create 0 ingress pattern eth dst is 33:00:00:00:00:01 / ipv4 / end actions represented_port ethdev_port_id 1 / end\n+    flow create 0 ingress pattern eth dst is 33:00:00:00:00:02 / ipv4 / end actions represented_port ethdev_port_id 1 / end\n+    flow create 0 ingress pattern eth dst is 33:00:00:00:00:03 / ipv4 / end actions represented_port ethdev_port_id 1 / end\n     flow create 0 ingress pattern eth src spec 00:11:22:33:44:55 src mask ff:ff:ff:ff:ff:00 dst spec 33:00:00:00:00:02 dst mask ff:ff:ff:ff:ff:fe \\\n     / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 dst spec 192.168.0.2 dst mask 255.255.0.255 / end actions drop / end\n \n@@ -277,9 +277,9 @@ Then the ACL filter can filter the packet with dst mac address.\n \n 1. rule::\n \n-    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 / tcp / end actions vf id 1 / end\n-    flow create 0 ingress pattern eth dst is 00:11:22:33:44:66 / ipv4 / tcp / end actions vf id 1 / end\n-    flow create 0 ingress pattern eth dst is 00:11:22:33:66:55 / ipv4 / tcp / end actions vf id 1 / end\n+    flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 / tcp / end actions represented_port ethdev_port_id 1 / end\n+    flow create 0 ingress pattern eth dst is 00:11:22:33:44:66 / ipv4 / tcp / end actions represented_port ethdev_port_id 1 / end\n+    flow create 0 ingress pattern eth dst is 00:11:22:33:66:55 / ipv4 / tcp / end actions represented_port ethdev_port_id 1 / end\n     flow create 0 ingress pattern eth dst spec 00:11:22:33:44:55 dst mask ff:ff:ff:ff:ff:00 / ipv4 / tcp / end actions drop / end\n \n 2. matched packets::\n@@ -383,9 +383,9 @@ Subcase 8: src mac + dst mac + src ip + dst ip + src port + dst port(only 2ports\n ---------------------------------------------------------------------------------------------\n 1. rule::\n \n-    flow create 0 ingress pattern eth dst is 00:01:23:45:67:89 / ipv4 / tcp / end actions vf id 1 / end\n-    flow create 0 ingress pattern eth dst is 5E:8E:8B:4D:89:06 / ipv4 / tcp / end actions vf id 1 / end\n-    flow create 0 ingress pattern eth dst is 5E:8E:8B:4D:90:05 / ipv4 / tcp / end actions vf id 1 / end\n+    flow create 0 ingress pattern eth dst is 00:01:23:45:67:89 / ipv4 / tcp / end actions represented_port ethdev_port_id 1 / end\n+    flow create 0 ingress pattern eth dst is 5E:8E:8B:4D:89:06 / ipv4 / tcp / end actions represented_port ethdev_port_id 1 / end\n+    flow create 0 ingress pattern eth dst is 5E:8E:8B:4D:90:05 / ipv4 / tcp / end actions represented_port ethdev_port_id 1 / end\n     flow create 0 ingress pattern eth src spec 00:11:22:33:44:55 src mask ff:ff:ff:ff:ff:00 dst spec 00:01:23:45:67:89 dst mask ff:ff:ff:ff:00:ff \\\n     / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 dst spec 192.168.0.2 dst mask 255.255.0.255 \\\n     / tcp src spec 8010 src mask 65520 dst spec 8017 dst mask 65520 / end actions drop / end\n@@ -878,15 +878,15 @@ Test Case 11: switch/acl/fdir/rss rules combination\n \n 2. create rules::\n \n-    flow create 0 ingress pattern eth / ipv4 src is 192.168.0.1 dst is 192.168.0.20 / tcp / end actions vf id 1 / end\n-    flow create 0 ingress pattern eth / ipv4 src is 192.168.0.2 dst is 192.168.0.20 / tcp / end actions vf id 1 / end\n-    flow create 0 ingress pattern eth / ipv4 src is 192.168.0.3 dst is 192.168.0.20 / tcp / end actions vf id 1 / end\n-    flow create 0 ingress pattern eth / ipv4 src is 192.168.0.4 dst is 192.168.0.20 / tcp / end actions vf id 1 / end\n+    flow create 0 ingress pattern eth / ipv4 src is 192.168.0.1 dst is 192.168.0.20 / tcp / end actions represented_port ethdev_port_id 1 / end\n+    flow create 0 ingress pattern eth / ipv4 src is 192.168.0.2 dst is 192.168.0.20 / tcp / end actions represented_port ethdev_port_id 1 / end\n+    flow create 0 ingress pattern eth / ipv4 src is 192.168.0.3 dst is 192.168.0.20 / tcp / end actions represented_port ethdev_port_id 1 / end\n+    flow create 0 ingress pattern eth / ipv4 src is 192.168.0.4 dst is 192.168.0.20 / tcp / end actions represented_port ethdev_port_id 1 / end\n     flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.2 src mask 255.255.255.254 / tcp / end actions drop / end\n     flow create 0 ingress pattern eth / ipv4 dst spec 192.168.0.21 dst mask 255.255.0.255 / tcp / end actions drop / end\n-    flow create 1 ingress pattern eth / ipv4 src is 192.168.0.1 dst is 192.168.0.20 / tcp src is 22 dst is 23 / end actions queue index 3 / mark / end\n-    flow create 1 ingress pattern eth / ipv4 src is 192.168.0.2 dst is 192.168.0.20 / tcp src is 22 dst is 23 / end actions queue index 3 / mark / end\n-    flow create 1 ingress pattern eth / ipv4 src is 192.168.1.1 dst is 192.168.0.20 / tcp src is 22 dst is 23 / end actions queue index 3 / mark / end\n+    flow create 2 ingress pattern eth / ipv4 src is 192.168.0.1 dst is 192.168.0.20 / tcp src is 22 dst is 23 / end actions queue index 3 / mark / end\n+    flow create 2 ingress pattern eth / ipv4 src is 192.168.0.2 dst is 192.168.0.20 / tcp src is 22 dst is 23 / end actions queue index 3 / mark / end\n+    flow create 2 ingress pattern eth / ipv4 src is 192.168.1.1 dst is 192.168.0.20 / tcp src is 22 dst is 23 / end actions queue index 3 / mark / end\n \n 3. check the rule list::\n \n@@ -898,7 +898,7 @@ Test Case 11: switch/acl/fdir/rss rules combination\n     3       0       0       i--     ETH IPV4 TCP => VF\n     4       0       0       i--     ETH IPV4 TCP => DROP\n     5       0       0       i--     ETH IPV4 TCP => DROP\n-    testpmd> flow list 1\n+    testpmd> flow list 2\n     ID      Group   Prio    Attr    Rule\n     0       0       0       i--     ETH IPV4 TCP => QUEUE MARK\n     1       0       0       i--     ETH IPV4 TCP => QUEUE MARK\n@@ -915,14 +915,14 @@ Test Case 11: switch/acl/fdir/rss rules combination\n     sendp(Ether(src=\"00:11:22:33:44:55\", dst=\"00:01:23:45:67:89\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.20\")/TCP(sport=22,dport=23)/Raw(load=\"x\"*30), iface=\"enp216s0f0\")\n     sendp(Ether(src=\"00:11:22:33:44:55\", dst=\"00:01:23:45:67:89\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.21\")/TCP(sport=22,dport=23)/Raw(load=\"x\"*30), iface=\"enp216s0f0\")\n \n-5. check packet 1 is received by port 1 and redirected to queue 3 with FDIR matched ID=0x0.\n-   packet 2 is received by port 1 and distributed by RSS without mark ID.\n-   packet 3 is dropped by port 1.\n-   packet 4 is dropped by port 1.\n-   packet 5 is received by port 1 and distributed by RSS without mark ID.\n-   packet 6 is can't received by port 0 and port 1.\n-   packet 7 is received by port 1 and redirected to queue 3 with FDIR matched ID=0x0.\n-   packet 8 is dropped by port 1.\n+5. check packet 1 is received by port 2 and redirected to queue 3 with FDIR matched ID=0x0.\n+   packet 2 is received by port 2 and distributed by RSS without mark ID.\n+   packet 3 is dropped by port 2.\n+   packet 4 is dropped by port 2.\n+   packet 5 is received by port 2 and distributed by RSS without mark ID.\n+   packet 6 is can't received by port 0 and port 2.\n+   packet 7 is received by port 2 and redirected to queue 3 with FDIR matched ID=0x0.\n+   packet 8 is dropped by port 2.\n \n 6. delete rule ID 4 from port 0 and list the rules::\n \n@@ -941,5 +941,5 @@ Test Case 11: switch/acl/fdir/rss rules combination\n     sendp(Ether(src=\"00:11:22:33:44:55\", dst=\"00:01:23:45:67:88\")/IP(src=\"192.168.0.2\", dst=\"192.168.0.20\")/TCP(sport=22,dport=23)/Raw(load=\"x\"*30), iface=\"enp216s0f0\")\n     sendp(Ether(src=\"00:11:22:33:44:55\", dst=\"00:01:23:45:67:88\")/IP(src=\"192.168.0.3\", dst=\"192.168.0.20\")/TCP(sport=22,dport=23)/Raw(load=\"x\"*30), iface=\"enp216s0f0\")\n \n-8. check packet 1 is received by port 1 and redirected to queue 3 with FDIR matched ID=0x0.\n-   packet 2 is received by port 1 and distributed by RSS without mark ID.\n+8. check packet 1 is received by port 2 and redirected to queue 3 with FDIR matched ID=0x0.\n+   packet 2 is received by port 2 and distributed by RSS without mark ID.\n",
    "prefixes": [
        "V1",
        "02/21"
    ]
}