get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/121205/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 121205,
    "url": "https://patches.dpdk.org/api/patches/121205/?format=api",
    "web_url": "https://patches.dpdk.org/project/dts/patch/20221221101252.59230-5-ke1.xu@intel.com/",
    "project": {
        "id": 3,
        "url": "https://patches.dpdk.org/api/projects/3/?format=api",
        "name": "DTS",
        "link_name": "dts",
        "list_id": "dts.dpdk.org",
        "list_email": "dts@dpdk.org",
        "web_url": "",
        "scm_url": "git://dpdk.org/tools/dts",
        "webscm_url": "http://git.dpdk.org/tools/dts/",
        "list_archive_url": "https://inbox.dpdk.org/dts",
        "list_archive_url_format": "https://inbox.dpdk.org/dts/{}",
        "commit_url_format": ""
    },
    "msgid": "<20221221101252.59230-5-ke1.xu@intel.com>",
    "list_archive_url": "https://inbox.dpdk.org/dts/20221221101252.59230-5-ke1.xu@intel.com",
    "date": "2022-12-21T10:12:52",
    "name": "[V2,4/4] tests/ice_dcf_switch_filter: update existing negative cases to validate represented port action and port representor action",
    "commit_ref": null,
    "pull_url": null,
    "state": "accepted",
    "archived": false,
    "hash": "0206f4c0a1eb8916e6c7d61a5cfab95acf772cd0",
    "submitter": {
        "id": 2810,
        "url": "https://patches.dpdk.org/api/people/2810/?format=api",
        "name": "Ke Xu",
        "email": "ke1.xu@intel.com"
    },
    "delegate": null,
    "mbox": "https://patches.dpdk.org/project/dts/patch/20221221101252.59230-5-ke1.xu@intel.com/mbox/",
    "series": [
        {
            "id": 26218,
            "url": "https://patches.dpdk.org/api/series/26218/?format=api",
            "web_url": "https://patches.dpdk.org/project/dts/list/?series=26218",
            "date": "2022-12-21T10:12:48",
            "name": "update existing cases and add new sub-cases to validate port representor action and represented port action",
            "version": 2,
            "mbox": "https://patches.dpdk.org/series/26218/mbox/"
        }
    ],
    "comments": "https://patches.dpdk.org/api/patches/121205/comments/",
    "check": "success",
    "checks": "https://patches.dpdk.org/api/patches/121205/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dts-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 53010A0545;\n\tWed, 21 Dec 2022 11:15:13 +0100 (CET)",
            "from mails.dpdk.org (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id 4CA6A42D0D;\n\tWed, 21 Dec 2022 11:15:13 +0100 (CET)",
            "from mga11.intel.com (mga11.intel.com [192.55.52.93])\n by mails.dpdk.org (Postfix) with ESMTP id 0A14C40698\n for <dts@dpdk.org>; Wed, 21 Dec 2022 11:15:11 +0100 (CET)",
            "from orsmga001.jf.intel.com ([10.7.209.18])\n by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 21 Dec 2022 02:15:11 -0800",
            "from dpdk-xuke-lab.sh.intel.com ([10.67.119.8])\n by orsmga001.jf.intel.com with ESMTP; 21 Dec 2022 02:15:09 -0800"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/simple;\n d=intel.com; i=@intel.com; q=dns/txt; s=Intel;\n t=1671617712; x=1703153712;\n h=from:to:cc:subject:date:message-id:in-reply-to:\n references:mime-version:content-transfer-encoding;\n bh=xSdswGfTIO8taWh9AneOgMpESD0CRPaono/qCuufTiM=;\n b=lQ8btCwdaHjNpjMPFdnh7srFWP/P5/ET2dw+Nn2kq/2/c+jiy2FPHimC\n +ldNTkh6Hgo48Hv16F604L3IrKWP78rhBXHrkTK2+CozsrFieMK9vOiCu\n nGtepL2uD1f/2orB9gxPxVGaLAVadgVuF9udoNSNCpJJoH3p8Y0LBjrwv\n VtO5vG0QVJJEGZOS/T+ovfZuVtz/pxNIdfu07b5H4BaoGIoFwnnwKvvmr\n jnkJaxLHhJasSKo0HVEezyl/hIs5UTdRQ26MkHCYjyKq8Tmy55bgkPv8M\n /80SQjCWw7ojJ9BRmf++FchI+UP1GYcGaoF35pXKb+498tIJjP6V3HI0S g==;",
        "X-IronPort-AV": [
            "E=McAfee;i=\"6500,9779,10567\"; a=\"317473221\"",
            "E=Sophos;i=\"5.96,262,1665471600\"; d=\"scan'208\";a=\"317473221\"",
            "E=McAfee;i=\"6500,9779,10567\"; a=\"683744058\"",
            "E=Sophos;i=\"5.96,262,1665471600\"; d=\"scan'208\";a=\"683744058\""
        ],
        "X-ExtLoop1": "1",
        "From": "Ke Xu <ke1.xu@intel.com>",
        "To": "dts@dpdk.org",
        "Cc": "lijuan.tu@intel.com, yuan.peng@intel.com, qi.fu@intel.com,\n Ke Xu <ke1.xu@intel.com>",
        "Subject": "[DTS][PATCH V2 4/4] tests/ice_dcf_switch_filter: update existing\n negative cases to validate represented port action and port representor\n action",
        "Date": "Wed, 21 Dec 2022 18:12:52 +0800",
        "Message-Id": "<20221221101252.59230-5-ke1.xu@intel.com>",
        "X-Mailer": "git-send-email 2.25.1",
        "In-Reply-To": "<20221221101252.59230-1-ke1.xu@intel.com>",
        "References": "<20221221101252.59230-1-ke1.xu@intel.com>",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "X-BeenThere": "dts@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "test suite reviews and discussions <dts.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dts>,\n <mailto:dts-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dts/>",
        "List-Post": "<mailto:dts@dpdk.org>",
        "List-Help": "<mailto:dts-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dts>,\n <mailto:dts-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dts-bounces@dpdk.org"
    },
    "content": "1. Add second PF with VFs for following cases\n2. Add a subcase to validate creating 'represented port' action on a representor\n3. Add a subcase to validate creating 'represented port' action on a VF\n4. Add a subcase to validate creating 'represented port' action to a VF\n5. Add two subcases to validate creating 'represented port' action to DCFs\n6. Add a subcase to validate creating 'represented port' action to a representor of another DCF\n7. Add a subcase to validate creating 'port representor' action on a representor\n8. Add a subcase to validate creating 'port representor' action on a VF\n9. Add a subcase to validate creating 'port representor' action to a VF\n10. Add a subcase to validate creating 'port representor' action to a representor\n11. Add a subcase to validate creating 'port representor' action to another DCF\n12. Add a subcase to validate deprecated action\n13. Add a subcase to validate using an invalid port id\n\nSigned-off-by: Ke Xu <ke1.xu@intel.com>\n---\n tests/TestSuite_ice_dcf_switch_filter.py | 109 +++++++++++++++++++++--\n 1 file changed, 100 insertions(+), 9 deletions(-)",
    "diff": "diff --git a/tests/TestSuite_ice_dcf_switch_filter.py b/tests/TestSuite_ice_dcf_switch_filter.py\nindex 4a7d7abb..23f9800b 100644\n--- a/tests/TestSuite_ice_dcf_switch_filter.py\n+++ b/tests/TestSuite_ice_dcf_switch_filter.py\n@@ -2559,22 +2559,113 @@ class ICEDCFSwitchFilterTest(TestCase):\n         # launch testpmd\n         self.launch_testpmd()\n         rules = {\n-            \"cannot create rule on vf 1\": \"flow create 1 ingress pattern eth dst is 68:05:ca:8d:ed:a8 / ipv4 src is 192.168.0.1 dst is 192.168.0.2 tos is 4 ttl is 3 / udp src is 25 dst is 23 / end actions represented_port ethdev_port_id 1 / end\",\n-            \"unsupported input set\": \"flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / nvgre tni is 2 / eth dst is 68:05:ca:8d:ed:a8 / ipv4 src is 192.168.1.2 dst is 192.168.1.3 tos is 4 / end actions represented_port ethdev_port_id 1 / end\",\n-            \"invalid vf id\": \"flow create 0 ingress pattern eth dst is 68:05:ca:8d:ed:a8 / ipv4 src is 192.168.0.1 dst is 192.168.0.2 tos is 4 ttl is 3 / tcp src is 25 dst is 23 / end actions represented_port ethdev_port_id 5 / end\",\n+            \"cannot create to vf rule on a representor\": \"flow create 1 ingress pattern eth dst is 68:05:ca:8d:ed:a8 / ipv4 src is 192.168.0.1 dst is 192.168.0.2 tos is 4 ttl is 3 / udp src is 25 dst is 23 / end actions represented_port ethdev_port_id 1 / end\",\n+            \"cannot create to vf rule on a vf\": \"flow create 3 ingress pattern eth dst is 68:05:ca:8d:ed:a8 / ipv4 src is 192.168.0.1 dst is 192.168.0.2 tos is 4 ttl is 3 / udp src is 25 dst is 23 / end actions represented_port ethdev_port_id 1 / end\",\n+            \"cannot create to vf rule to a vf\": \"flow create 0 ingress pattern eth dst is 68:05:ca:8d:ed:a8 / ipv4 src is 192.168.0.1 dst is 192.168.0.2 tos is 4 ttl is 3 / udp src is 25 dst is 23 / end actions represented_port ethdev_port_id 3 / end\",\n+            \"cannot create to vf rule to another dcf\": \"flow create 0 ingress pattern eth dst is 68:05:ca:8d:ed:a8 / ipv4 src is 192.168.0.1 dst is 192.168.0.2 tos is 4 ttl is 3 / udp src is 25 dst is 23 / end actions represented_port ethdev_port_id 4 / end\",\n+            \"cannot create to vf rule to a representor of another pf\": \"flow create 0 ingress pattern eth dst is 68:05:ca:8d:ed:a8 / ipv4 src is 192.168.0.1 dst is 192.168.0.2 tos is 4 ttl is 3 / udp src is 25 dst is 23 / end actions represented_port ethdev_port_id 5 / end\",\n+            \"cannot create vf original rule on a representor\": \"flow create 1 ingress pattern eth dst is 68:05:ca:8d:ed:a8 / ipv4 src is 192.168.0.1 dst is 192.168.0.2 tos is 4 ttl is 3 / udp src is 25 dst is 23 / end actions port_representor port_id 1 / end\",\n+            \"cannot create vf original rule on a vf\": \"flow create 3 ingress pattern eth dst is 68:05:ca:8d:ed:a8 / ipv4 src is 192.168.0.1 dst is 192.168.0.2 tos is 4 ttl is 3 / udp src is 25 dst is 23 / end actions port_representor port_id 1 / end\",\n+            \"cannot create vf original rule to a vf\": \"flow create 0 ingress pattern eth dst is 68:05:ca:8d:ed:a8 / ipv4 src is 192.168.0.1 dst is 192.168.0.2 tos is 4 ttl is 3 / udp src is 25 dst is 23 / end actions port_representor port_id 3 / end\",\n+            \"cannot create vf original rule to a representor\": \"flow create 0 ingress pattern eth dst is 68:05:ca:8d:ed:a8 / ipv4 src is 192.168.0.1 dst is 192.168.0.2 tos is 4 ttl is 3 / udp src is 25 dst is 23 / end actions port_representor port_id 1 / end\",\n+            \"cannot create vf original rule to another dcf\": \"flow create 0 ingress pattern eth dst is 68:05:ca:8d:ed:a8 / ipv4 src is 192.168.0.1 dst is 192.168.0.2 tos is 4 ttl is 3 / udp src is 25 dst is 23 / end actions port_representor port_id 4 / end\",\n+            \"unsupported input set\": \"flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / nvgre tni is 2 / eth dst is 68:05:ca:8d:ed:a8 / ipv4 src is 192.168.1.2 dst is 192.168.1.3 tos is 4 / end actions port_representor port_id 1 / end\",\n+            \"invalid port id\": \"flow create 0 ingress pattern eth dst is 68:05:ca:8d:ed:a8 / ipv4 src is 192.168.0.1 dst is 192.168.0.2 tos is 4 ttl is 3 / tcp src is 25 dst is 23 / end actions represented_port ethdev_port_id 20 / end\",\n             \"void action\": \"flow create 0 ingress pattern eth / ipv4 / udp src is 25 dst is 23 / end actions end\",\n             \"void input set value\": \"flow create 0 ingress pattern eth / ipv4 / end actions represented_port ethdev_port_id 1 end\",\n         }\n-        # cannot create rule on vf 1\n+        # cannot create to vf rule on a representor\n         self.validate_switch_filter_rule(\n-            rules[\"cannot create rule on vf 1\"], check_stats=False\n+            rules[\"cannot create to vf rule on a representor\"], check_stats=False\n         )\n         self.check_switch_filter_rule_list(1, [])\n         self.create_switch_filter_rule(\n-            rules[\"cannot create rule on vf 1\"], check_stats=False\n+            rules[\"cannot create to vf rule on a representor\"], check_stats=False\n         )\n         self.check_switch_filter_rule_list(1, [])\n \n+        # cannot create to vf rule on a vf\n+        self.validate_switch_filter_rule(\n+            rules[\"cannot create to vf rule on a vf\"], check_stats=False\n+        )\n+        self.check_switch_filter_rule_list(3, [])\n+        self.create_switch_filter_rule(\n+            rules[\"cannot create to vf rule on a vf\"], check_stats=False\n+        )\n+        self.check_switch_filter_rule_list(3, [])\n+\n+        # cannot create to vf rule to a vf\n+        self.validate_switch_filter_rule(\n+            rules[\"cannot create to vf rule to a vf\"], check_stats=False\n+        )\n+        self.check_switch_filter_rule_list(0, [])\n+        self.create_switch_filter_rule(\n+            rules[\"cannot create to vf rule to a vf\"], check_stats=False\n+        )\n+        self.check_switch_filter_rule_list(0, [])\n+\n+        # cannot create to vf rule to another dcf\n+        self.validate_switch_filter_rule(\n+            rules[\"cannot create to vf rule to another dcf\"], check_stats=False\n+        )\n+        self.check_switch_filter_rule_list(0, [])\n+        self.create_switch_filter_rule(\n+            rules[\"cannot create to vf rule to another dcf\"], check_stats=False\n+        )\n+        self.check_switch_filter_rule_list(0, [])\n+\n+        # cannot create to vf rule to a representor of another pf\n+        self.validate_switch_filter_rule(\n+            rules[\"cannot create to vf rule to a representor of another pf\"],\n+            check_stats=False,\n+        )\n+        self.check_switch_filter_rule_list(0, [])\n+        self.create_switch_filter_rule(\n+            rules[\"cannot create to vf rule to a representor of another pf\"],\n+            check_stats=False,\n+        )\n+        self.check_switch_filter_rule_list(0, [])\n+\n+        # cannot create vf original rule on a representor\n+        self.validate_switch_filter_rule(\n+            rules[\"cannot create vf original rule on a representor\"], check_stats=False\n+        )\n+        self.check_switch_filter_rule_list(0, [])\n+        self.create_switch_filter_rule(\n+            rules[\"cannot create vf original rule on a representor\"], check_stats=False\n+        )\n+        self.check_switch_filter_rule_list(0, [])\n+\n+        # cannot create vf original rule on a vf\n+        self.validate_switch_filter_rule(\n+            rules[\"cannot create vf original rule on a vf\"], check_stats=False\n+        )\n+        self.check_switch_filter_rule_list(0, [])\n+        self.create_switch_filter_rule(\n+            rules[\"cannot create vf original rule on a vf\"], check_stats=False\n+        )\n+        self.check_switch_filter_rule_list(0, [])\n+\n+        # cannot create vf original rule to a vf\n+        self.validate_switch_filter_rule(\n+            rules[\"cannot create vf original rule to a vf\"], check_stats=False\n+        )\n+        self.check_switch_filter_rule_list(0, [])\n+        self.create_switch_filter_rule(\n+            rules[\"cannot create vf original rule to a vf\"], check_stats=False\n+        )\n+        self.check_switch_filter_rule_list(0, [])\n+\n+        # cannot create vf original rule to a representor\n+        self.validate_switch_filter_rule(\n+            rules[\"cannot create vf original rule to a representor\"], check_stats=False\n+        )\n+        self.check_switch_filter_rule_list(0, [])\n+        self.create_switch_filter_rule(\n+            rules[\"cannot create vf original rule to a representor\"], check_stats=False\n+        )\n+        self.check_switch_filter_rule_list(0, [])\n+\n         # unsupported input set\n         self.validate_switch_filter_rule(\n             rules[\"unsupported input set\"], check_stats=False\n@@ -2607,10 +2698,10 @@ class ICEDCFSwitchFilterTest(TestCase):\n         self.create_switch_filter_rule(rules[\"void input set value\"], check_stats=False)\n         self.check_switch_filter_rule_list(0, [])\n \n-        # invalid vf id\n-        # self.validate_switch_filter_rule(rules[\"invalid vf id\"], check_stats=False)\n+        # invalid port id\n+        # self.validate_switch_filter_rule(rules[\"invalid port id\"], check_stats=False)\n         # self.check_switch_filter_rule_list(0, [])\n-        self.create_switch_filter_rule(rules[\"invalid vf id\"], check_stats=False)\n+        self.create_switch_filter_rule(rules[\"invalid port id\"], check_stats=False)\n         self.check_switch_filter_rule_list(0, [])\n \n         # delete non-existing rule\n",
    "prefixes": [
        "V2",
        "4/4"
    ]
}