From 62bd08a5811aeec5670c29af18583f9f3350cb1d Mon Sep 17 00:00:00 2001
From: Christian Poessinger <christian@poessinger.com>
Date: Sun, 17 Jan 2021 10:17:14 +0100
Subject: smoketest: add testcases for "system ipv6"

---
 smoketest/scripts/cli/test_system_ip.py   |   2 +-
 smoketest/scripts/cli/test_system_ipv6.py | 102 ++++++++++++++++++++++++++++++
 2 files changed, 103 insertions(+), 1 deletion(-)
 create mode 100755 smoketest/scripts/cli/test_system_ipv6.py

diff --git a/smoketest/scripts/cli/test_system_ip.py b/smoketest/scripts/cli/test_system_ip.py
index 8fc18ba88..4ad8d537d 100755
--- a/smoketest/scripts/cli/test_system_ip.py
+++ b/smoketest/scripts/cli/test_system_ip.py
@@ -1,6 +1,6 @@
 #!/usr/bin/env python3
 #
-# Copyright (C) 2020 Francois Mertz fireboxled@gmail.com
+# Copyright (C) 2020 VyOS maintainers and contributors
 #
 # This program is free software; you can redistribute it and/or modify
 # it under the terms of the GNU General Public License version 2 or later as
diff --git a/smoketest/scripts/cli/test_system_ipv6.py b/smoketest/scripts/cli/test_system_ipv6.py
new file mode 100755
index 000000000..df69739eb
--- /dev/null
+++ b/smoketest/scripts/cli/test_system_ipv6.py
@@ -0,0 +1,102 @@
+#!/usr/bin/env python3
+#
+# Copyright (C) 2021 VyOS maintainers and contributors
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2 or later as
+# published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program.  If not, see <http://www.gnu.org/licenses/>.
+
+import os
+import unittest
+
+from vyos.configsession import ConfigSession
+from vyos.util import read_file
+
+base_path = ['system', 'ipv6']
+
+file_forwarding = '/proc/sys/net/ipv6/conf/all/forwarding'
+file_disable = '/etc/modprobe.d/vyos_disable_ipv6.conf'
+file_dad = '/proc/sys/net/ipv6/conf/all/accept_dad'
+file_multipath = '/proc/sys/net/ipv6/fib_multipath_hash_policy'
+
+class TestSystemIPv6(unittest.TestCase):
+    def setUp(self):
+        self.session = ConfigSession(os.getpid())
+
+    def tearDown(self):
+        self.session.delete(base_path)
+        self.session.commit()
+        del self.session
+
+    def test_system_ipv6_forwarding(self):
+        # Test if IPv6 forwarding can be disabled globally, default is '1'
+        # which means forwearding enabled
+        self.assertEqual(read_file(file_forwarding), '1')
+
+        self.session.set(base_path + ['disable-forwarding'])
+        self.session.commit()
+
+        self.assertEqual(read_file(file_forwarding), '0')
+
+    def test_system_ipv6_disable(self):
+        # Do not assign any IPv6 address on interfaces, this requires a reboot
+        # which can not be tested, but we can read the config file :)
+        self.session.set(base_path + ['disable'])
+        self.session.commit()
+
+        # Verify configuration file
+        self.assertEqual(read_file(file_disable), 'options ipv6 disable_ipv6=1')
+
+    def test_system_ipv6_strict_dad(self):
+        # This defaults to 1
+        self.assertEqual(read_file(file_dad), '1')
+
+        # Do not assign any IPv6 address on interfaces, this requires a reboot
+        # which can not be tested, but we can read the config file :)
+        self.session.set(base_path + ['strict-dad'])
+        self.session.commit()
+
+        # Verify configuration file
+        self.assertEqual(read_file(file_dad), '2')
+
+    def test_system_ipv6_multipath(self):
+        # This defaults to 0
+        self.assertEqual(read_file(file_multipath), '0')
+
+        # Do not assign any IPv6 address on interfaces, this requires a reboot
+        # which can not be tested, but we can read the config file :)
+        self.session.set(base_path + ['multipath', 'layer4-hashing'])
+        self.session.commit()
+
+        # Verify configuration file
+        self.assertEqual(read_file(file_multipath), '1')
+
+    def test_system_ipv6_neighbor_table_size(self):
+        # Maximum number of entries to keep in the ARP cache, the
+        # default is 8192
+
+        gc_thresh3 = '/proc/sys/net/ipv6/neigh/default/gc_thresh3'
+        gc_thresh2 = '/proc/sys/net/ipv6/neigh/default/gc_thresh2'
+        gc_thresh1 = '/proc/sys/net/ipv6/neigh/default/gc_thresh1'
+        self.assertEqual(read_file(gc_thresh3), '8192')
+        self.assertEqual(read_file(gc_thresh2), '4096')
+        self.assertEqual(read_file(gc_thresh1), '1024')
+
+        for size in [1024, 2048, 4096, 8192, 16384, 32768]:
+            self.session.set(base_path + ['neighbor', 'table-size', str(size)])
+            self.session.commit()
+
+            self.assertEqual(read_file(gc_thresh3), str(size))
+            self.assertEqual(read_file(gc_thresh2), str(size // 2))
+            self.assertEqual(read_file(gc_thresh1), str(size // 8))
+
+if __name__ == '__main__':
+    unittest.main(verbosity=2)
-- 
cgit v1.2.3