summaryrefslogtreecommitdiff
path: root/smoketest/scripts
AgeCommit message (Collapse)Author
2021-05-23smoketest: vif: T3570: vlan interface MTU must be less or equal to parentChristian Poessinger
2021-05-23smoketest: ethernet: bugfix RPS CPU validationChristian Poessinger
We always read back the RPS value from eth1 which worked on the CI smoketests, but not when running a smoketest with only one interface e.g. by: $ TEST_ETH="eth2" /usr/libexec/vyos/tests/smoke/cli/test_interfaces_ethernet.py
2021-05-23smoketest: base: remove leftover debug code on interface testcaseChristian Poessinger
2021-05-23smoketest: base: use get_interface_config() for MTU retrievalChristian Poessinger
2021-05-22smoketest: bgp: T3565: test confederation configurationChristian Poessinger
2021-05-21vlan: T3551: support runtime changing of ingress and egress QoS settingsJACK
2021-05-19ospfv3: T3554: add area-type "stub"Viacheslav Hletenko
2021-05-15smoketest: T3549: dhcpv6-server: adjust to new config syntaxChristian Poessinger
Commit 9099636b ("dhcpv6-server: T3549: fix incorrect syntax for global name-server definition") changed how the daemon configuration represents global DNS nameservers. Test updated.
2021-05-15smoketest: interfaces: add testcase for q-in-q protocol changeChristian Poessinger
This is the smoketest for the fix added in commit cd504035 ("vyos.ifconfig: T3532: re-create Q-in-Q interface on protocol change").
2021-05-15smoketest: dhcp: T3544: verify locig preventing invalid daemon optionsChristian Poessinger
As we do not allow any invalid raw options passed into ISC dhcpd we should also verify this behavior with a smoketest.
2021-05-13bonding: T3543: add support to configure lact-rate (slow or fast)Christian Poessinger
Option specifying the rate in which we'll ask our link partner to transmit LACPDU packets in 802.3ad mode. set interfaces bonding bond0 lacp-rate <slow|fast> slow: Request partner to transmit LACPDUs every 30 seconds (default) fast: Request partner to transmit LACPDUs every 1 second
2021-05-13smoketest: bonding: test minimum link assignmentChristian Poessinger
2021-05-08vrf: bgp: T3523: bugfix Kernel route-map deploymentChristian Poessinger
Commit 4f9aa30f ("vrf: bgp: T3523: add route-map support for kernel routes") added the possibility to also filter BGP routes towards the OS kernel, but the smoketests failed. Reason was a non working CLI command applied to bgpd. Thus the VRF route-map and the BGP configuration is now split into two templates, one to be used for each daemon (zebra and bgpd). Nevertheless one more bug was found in vyos.frr which currently does not suppoort calling modify_section() inside a configuration "block". See [1] for more info. [1]: https://phabricator.vyos.net/T3529
2021-05-05smoketest: dns: T3277: add testcase for "serve rfc1918" zonesChristian Poessinger
2021-05-05smoketest: dns: forwarding: daemon should not run after test is completedChristian Poessinger
2021-04-24policy: T2425: verify() must check if a policy is still usedChristian Poessinger
When deleting a route-map, prefix-list or access-list, we must ensure that this routing policy is not referenced by any other protocol or policy. When trying to remove a policy still in use, raise an error.
2021-04-18smoketest: temporary disable container testsChristian Poessinger
2021-04-17Merge branch 't2425-policy' of github.com:c-po/vyos-1x into currentChristian Poessinger
* 't2425-policy' of github.com:c-po/vyos-1x: policy: T2425: re-implement "policy" tree from vyatta-cfg-quagga in XML/Python
2021-04-17policy: T2425: re-implement "policy" tree from vyatta-cfg-quagga in XML/PythonChristian Poessinger
2021-04-17Merge pull request #814 from sever-sever/T2216-smoketestChristian Poessinger
smoketest: T2216: Containers set ip to test01
2021-04-17smoketest: kernel-modules: fail hard if module is unloadableChristian Poessinger
2021-04-17smoketest: policy: add test for the route-map logicChristian Poessinger
2021-04-17smoketest: T2216: Containeres set ip to test01sever-sever
2021-04-16containers: T2216: Static ip for conteiner smoketestsever-sever
2021-04-15smoketest: policy: inherit sequence numbersChristian Poessinger
In the vyatta-cfg-quagga days the access-list(6) or prefix-list(6) sequence numbers have been made up artifically. The new implementation from vyos-1x will re-use the rule number specified on the CLI as the sequence number, this we have to alter the tast cases to get a proper match from the beginning - covering both the old and new world. This can be done by using rule numbers that are multiples of 5.
2021-04-15Merge pull request #808 from sever-sever/T2216-smokeChristian Poessinger
containers: T2216: Add smoketest
2021-04-15containers: T2216: Add smoketestsever-sever
2021-04-15bgp: T2771: add vpn, multicast, flowspec address familiesCheeze-It
In this commit we add more address families within BGP. This should bring VyOS the ability to enable the rest of the capabilities within FRR. Co-authored-by: Cheeze_It <none@none.com>
2021-04-12static: T3328: route-map to zebra/kernel can not be removedChristian Poessinger
Removing the Zebra/Linux Kernel route-map added by "set protocols static route-map" was not removed once applied. This was because the removal must happen within the zebra daemon and not staticd.
2021-04-12rip: T3328: route-map to zebra/kernel can not be removedChristian Poessinger
Removing the Zebra/Linux Kernel route-map added by "set protocols rip route-map" was not removed once applied. This was because the removal must happen within the zebra daemon and not ripd.
2021-04-12isis: T3328: route-map to zebra/kernel can not be removedChristian Poessinger
Removing the Zebra/Linux Kernel route-map added by "set protocols isis route-map" was not removed once applied. This was because the removal must happen within the zebra daemon and not isisd.
2021-04-12ospf: T3328: route-map to zebra/kernel can not be removedChristian Poessinger
Removing the Zebra/Linux Kernel route-map added by "set protocols ospf route-map" was not removed once applied. This was because the removal must happen within the zebra daemon and not ospfd.
2021-04-12bgp: T3328: route-map to zebra/kernel can not be removedChristian Poessinger
Removing the Zebra/Linux Kernel route-map added by "set protocols bgp route-map" was not removed once applied. This was because the removal must happen within the zebra daemon and not bgpd.
2021-04-11smoketest: temporary disable test for 802.1ad interface ip address assignemntChristian Poessinger
For an unknown reason this regularely fails on the QEMU builds, thus the test for reading back IP addresses is temporary disabled. There is no big deal here, as this uses the same methods on 802.1q and here it works and is verified.
2021-04-09tunnel: T3030: re-enable erspan version 2 supportChristian Poessinger
This was not possible due to a regression in iproute2 where the erspan_dir key did not have a value. See [1] for more information. [1]: https://lore.kernel.org/netdev/3ac544c09842410fb863b332917a03ad@poessinger.com/
2021-04-09smoketest: bgp: enable peer-group ttl-security tests as this is now implementedChristian Poessinger
2021-04-08bgp: T3464: use common helper functions to verify route-maps and prefix-listsChristian Poessinger
2021-04-05tunnel: T3030: move erspan type into regular tunnel interfaceChristian Poessinger
Instead of having a dedicated ERSPAN interface type, rather move the specifics into "interface tunnel". A migrator is not needed as there is yet no LTS release with this feature and this is considered experimental.
2021-04-05smoketest: l2tpv3: only remove modules if they are loadedChristian Poessinger
2021-04-04smoketest: l2tpv3: unload kernel modules after testChristian Poessinger
2021-03-31smoketest: bfd: only evaluate individual profile sectionChristian Poessinger
When validating FRR profiles, only load the configuration for each individual profile instead of all profiles. This is done by a new argument to getFRRconfig() named endsection='^!' which tells what is the delimiter when a config section of FRR ends, this is usually "^!", but for BFD profiles this is "^ !", as this is a new level under the FRR CLI.
2021-03-30smoketest: qat: change comment for unittest frameworkChristian Poessinger
2021-03-29bgp: T1711: remove ASN tagNode and move to "local-as"Christian Poessinger
Every time when set configuration bgp, you need set AS number. There is very less benefit in this system so the AS number is moved from a tagNode level down to a leafNode with the name "local-as", same as on the neighbor or peer-group level. This changes the CLI configuration from: set protocols bgp 100 neighbor 10.10.1.2 remote-as 200 to set protocols bgp local-as 100 set protocols bgp neighbor 10.10.1.2 remote-as 200
2021-03-26smoketest: ensure symlink exists /usr/sbin/ip -> /bin/ipChristian Poessinger
2021-03-24smoketest: isis: drop trailing whitespace on "router isis" statementChristian Poessinger
After upgrading FRR to a newer revision in stable/7.5 branch we can drop the workaround where an additional whitespace was required after the "router isis FOOO " statement. Related to https://github.com/FRRouting/frr/pull/8306
2021-03-21isis: T3417: drop artificial "domain" node identifying the IS-IS process nameChristian Poessinger
As we and FRR do not support multiple FRR process instances, there is no need to make this configurable for a user. We rather rely on a solid default "VyOS".
2021-03-21ospf: vrf: T2271: ease FRR interaction for config reloadChristian Poessinger
Instead of multiple if/else paths, use a common vrf string variable which is either populated or not. In addtion when interfaces are configured for a given VRF, harden the regex for config reload.
2021-03-21isis: T3417: add VRF supportChristian Poessinger
VRF support can be tested using: set vrf name red table 1000 set vrf name red protocols isis domain FOOO set vrf name red protocols isis net 49.0001.1921.6800.1002.00 set vrf name red protocols isis interface eth1
2021-03-21smoketest: add initial IS-IS testcaseChristian Poessinger
2021-03-19bridge: T3415: add port isolation / private-vlan optionChristian Poessinger
Private VLAN, also known as port isolation, is a technique in computer networking where a VLAN contains switch ports that are restricted such that they can only communicate with a given "uplink". The restricted ports are called "private ports". Each private VLAN typically contains many private ports, and a single uplink. The uplink will typically be a port (or link aggregation group) connected to a router, firewall, server, provider network, or similar central resource. Q: https://en.wikipedia.org/wiki/Private_VLAN