diff options
Diffstat (limited to 'smoketest')
-rw-r--r-- | smoketest/scripts/cli/base_interfaces_test.py | 12 | ||||
-rwxr-xr-x | smoketest/scripts/cli/test_service_dhcp-server.py | 12 | ||||
-rwxr-xr-x | smoketest/scripts/cli/test_service_dhcpv6-server.py | 155 |
3 files changed, 170 insertions, 9 deletions
diff --git a/smoketest/scripts/cli/base_interfaces_test.py b/smoketest/scripts/cli/base_interfaces_test.py index 615317368..4187fd77c 100644 --- a/smoketest/scripts/cli/base_interfaces_test.py +++ b/smoketest/scripts/cli/base_interfaces_test.py @@ -16,7 +16,9 @@ import os import unittest import json -from netifaces import ifaddresses, AF_INET, AF_INET6 +from netifaces import ifaddresses +from netifaces import AF_INET +from netifaces import AF_INET6 from vyos.configsession import ConfigSession from vyos.ifconfig import Interface @@ -99,7 +101,7 @@ class BasicInterfaceTest: Check if description can be added to interface """ for intf in self._interfaces: - test_string='Description-Test-{}'.format(intf) + test_string=f'Description-Test-{intf}' self.session.set(self._base_path + [intf, 'description', test_string]) for option in self._options.get(intf, []): self.session.set(self._base_path + [intf] + option.split()) @@ -108,8 +110,8 @@ class BasicInterfaceTest: # Validate interface description for intf in self._interfaces: - test_string='Description-Test-{}'.format(intf) - with open('/sys/class/net/{}/ifalias'.format(intf), 'r') as f: + test_string=f'Description-Test-{intf}' + with open(f'/sys/class/net/{intf}/ifalias', 'r') as f: tmp = f.read().rstrip() self.assertTrue(tmp, test_string) @@ -182,7 +184,7 @@ class BasicInterfaceTest: def _mtu_test(self, intf): """ helper function to verify MTU size """ - with open('/sys/class/net/{}/mtu'.format(intf), 'r') as f: + with open(f'/sys/class/net/{intf}/mtu', 'r') as f: tmp = f.read().rstrip() self.assertEqual(tmp, self._mtu) diff --git a/smoketest/scripts/cli/test_service_dhcp-server.py b/smoketest/scripts/cli/test_service_dhcp-server.py index 2ee26c8bb..e13896095 100755 --- a/smoketest/scripts/cli/test_service_dhcp-server.py +++ b/smoketest/scripts/cli/test_service_dhcp-server.py @@ -1,6 +1,6 @@ #!/usr/bin/env python3 # -# Copyright (C) 2019-2020 VyOS maintainers and contributors +# Copyright (C) 2020 VyOS maintainers and contributors # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License version 2 or later as @@ -101,7 +101,7 @@ class TestServiceDHCPServer(unittest.TestCase): smtp_server = '1.2.3.4' time_server = '4.3.2.1' tftp_server = 'tftp.vyos.io' - search_domain = 'foo.vyos.net' + search_domains = ['foo.vyos.net', 'bar.vyos.net'] bootfile_name = 'vyos' bootfile_server = '192.0.2.1' wpad = 'http://wpad.vyos.io/foo/bar' @@ -118,7 +118,8 @@ class TestServiceDHCPServer(unittest.TestCase): self.session.set(pool + ['pop-server', smtp_server]) self.session.set(pool + ['time-server', time_server]) self.session.set(pool + ['tftp-server-name', tftp_server]) - self.session.set(pool + ['domain-search', search_domain]) + for search in search_domains: + self.session.set(pool + ['domain-search', search]) self.session.set(pool + ['bootfile-name', bootfile_name]) self.session.set(pool + ['bootfile-server', bootfile_server]) self.session.set(pool + ['wpad-url', wpad]) @@ -168,7 +169,10 @@ class TestServiceDHCPServer(unittest.TestCase): self.assertIn(f'option domain-name-servers {dns_1}, {dns_2};', config) self.assertIn(f'option routers {router};', config) self.assertIn(f'option domain-name "{domain_name}";', config) - self.assertIn(f'option domain-search "{search_domain}";', config) + + search = '"' + ('", "').join(search_domains) + '"' + self.assertIn(f'option domain-search {search};', config) + self.assertIn(f'option ip-forwarding true;', config) self.assertIn(f'option smtp-server {smtp_server};', config) self.assertIn(f'option pop-server {smtp_server};', config) diff --git a/smoketest/scripts/cli/test_service_dhcpv6-server.py b/smoketest/scripts/cli/test_service_dhcpv6-server.py new file mode 100755 index 000000000..56fc16d2b --- /dev/null +++ b/smoketest/scripts/cli/test_service_dhcpv6-server.py @@ -0,0 +1,155 @@ +#!/usr/bin/env python3 +# +# Copyright (C) 2020 VyOS maintainers and contributors +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License version 2 or later as +# published by the Free Software Foundation. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program. If not, see <http://www.gnu.org/licenses/>. + +import re +import os +import unittest + +from vyos.configsession import ConfigSession +from vyos.configsession import ConfigSessionError +from vyos.template import inc_ip +from vyos.util import cmd +from vyos.util import process_named_running +from vyos.util import read_file + +PROCESS_NAME = 'dhcpd' +DHCPD_CONF = '/run/dhcp-server/dhcpdv6.conf' +base_path = ['service', 'dhcpv6-server'] + +subnet = '2001:db8:f00::/64' +dns_1 = '2001:db8::1' +dns_2 = '2001:db8::2' +domain = 'vyos.net' +nis_servers = ['2001:db8:ffff::1', '2001:db8:ffff::2'] +interface = 'eth1' +interface_addr = inc_ip(subnet, 1) + '/64' + +class TestServiceDHCPServer(unittest.TestCase): + def setUp(self): + self.session = ConfigSession(os.getpid()) + self.session.set(['interfaces', 'ethernet', interface, 'address', interface_addr]) + + def tearDown(self): + self.session.delete(base_path) + self.session.delete(['interfaces', 'ethernet', interface, 'address', interface_addr]) + self.session.commit() + del self.session + + def test_single_pool(self): + shared_net_name = 'SMOKE-1' + search_domains = ['foo.vyos.net', 'bar.vyos.net'] + lease_time = '1200' + max_lease_time = '72000' + min_lease_time = '600' + preference = '10' + sip_server = 'sip.vyos.net' + sntp_server = inc_ip(subnet, 100) + range_start = inc_ip(subnet, 256) # ::100 + range_stop = inc_ip(subnet, 65535) # ::ffff + + pool = base_path + ['shared-network-name', shared_net_name, 'subnet', subnet] + + self.session.set(base_path + ['preference', preference]) + + # we use the first subnet IP address as default gateway + self.session.set(pool + ['name-server', dns_1]) + self.session.set(pool + ['name-server', dns_2]) + self.session.set(pool + ['name-server', dns_2]) + self.session.set(pool + ['lease-time', 'default', lease_time]) + self.session.set(pool + ['lease-time', 'maximum', max_lease_time]) + self.session.set(pool + ['lease-time', 'minimum', min_lease_time]) + self.session.set(pool + ['nis-domain', domain]) + self.session.set(pool + ['nisplus-domain', domain]) + self.session.set(pool + ['sip-server', sip_server]) + self.session.set(pool + ['sntp-server', sntp_server]) + self.session.set(pool + ['address-range', 'start', range_start, 'stop', range_stop]) + + for server in nis_servers: + self.session.set(pool + ['nis-server', server]) + self.session.set(pool + ['nisplus-server', server]) + + for search in search_domains: + self.session.set(pool + ['domain-search', search]) + + client_base = 1 + for client in ['client1', 'client2', 'client3']: + cid = '00:01:00:01:12:34:56:78:aa:bb:cc:dd:ee:{}'.format(client_base) + self.session.set(pool + ['static-mapping', client, 'identifier', cid]) + self.session.set(pool + ['static-mapping', client, 'ipv6-address', inc_ip(subnet, client_base)]) + client_base += 1 + + # commit changes + self.session.commit() + + config = read_file(DHCPD_CONF) + self.assertIn(f'option dhcp6.preference {preference};', config) + + self.assertIn(f'subnet6 {subnet}' + r' {', config) + search = '"' + '", "'.join(search_domains) + '"' + nissrv = ', '.join(nis_servers) + self.assertIn(f'range6 {range_start} {range_stop};', config) + self.assertIn(f'default-lease-time {lease_time};', config) + self.assertIn(f'default-lease-time {lease_time};', config) + self.assertIn(f'max-lease-time {max_lease_time};', config) + self.assertIn(f'min-lease-time {min_lease_time};', config) + self.assertIn(f'option dhcp6.domain-search {search};', config) + self.assertIn(f'option dhcp6.name-servers {dns_1}, {dns_2};', config) + self.assertIn(f'option dhcp6.nis-domain-name "{domain}";', config) + self.assertIn(f'option dhcp6.nis-servers {nissrv};', config) + self.assertIn(f'option dhcp6.nisp-domain-name "{domain}";', config) + self.assertIn(f'option dhcp6.nisp-servers {nissrv};', config) + self.assertIn(f'set shared-networkname = "{shared_net_name}";', config) + + client_base = 1 + for client in ['client1', 'client2', 'client3']: + cid = '00:01:00:01:12:34:56:78:aa:bb:cc:dd:ee:{}'.format(client_base) + ip = inc_ip(subnet, client_base) + self.assertIn(f'host {shared_net_name}_{client}' + ' {', config) + self.assertIn(f'fixed-address6 {ip};', config) + self.assertIn(f'host-identifier option dhcp6.client-id {cid};', config) + client_base += 1 + + # Check for running process + self.assertTrue(process_named_running(PROCESS_NAME)) + + + def test_prefix_delegation(self): + shared_net_name = 'SMOKE-2' + range_start = inc_ip(subnet, 256) # ::100 + range_stop = inc_ip(subnet, 65535) # ::ffff + delegate_start = '2001:db8:ee::' + delegate_stop = '2001:db8:ee:ff00::' + delegate_len = '56' + + pool = base_path + ['shared-network-name', shared_net_name, 'subnet', subnet] + + self.session.set(pool + ['address-range', 'start', range_start, 'stop', range_stop]) + self.session.set(pool + ['prefix-delegation', 'start', delegate_start, 'stop', delegate_stop]) + self.session.set(pool + ['prefix-delegation', 'start', delegate_start, 'prefix-length', delegate_len]) + + # commit changes + self.session.commit() + + config = read_file(DHCPD_CONF) + self.assertIn(f'subnet6 {subnet}' + r' {', config) + self.assertIn(f'range6 {range_start} {range_stop};', config) + self.assertIn(f'prefix6 {delegate_start} {delegate_stop} /{delegate_len};', config) + + # Check for running process + self.assertTrue(process_named_running(PROCESS_NAME)) + +if __name__ == '__main__': + unittest.main() |