summaryrefslogtreecommitdiff
path: root/smoketest/scripts/cli/test_interfaces_tunnel.py
diff options
context:
space:
mode:
authorChristian Poessinger <christian@poessinger.com>2020-08-27 21:12:55 +0200
committerChristian Poessinger <christian@poessinger.com>2020-08-27 21:12:55 +0200
commit0f8123268da02372cf4e5ee5f552f45fd79fc5e7 (patch)
tree6e9fb3124b3cfb148729dbcf8483a1135110667f /smoketest/scripts/cli/test_interfaces_tunnel.py
parentefeac80f82810c4d752b9633861d691e36de4385 (diff)
parent756c9153e683be83ab1f2786a72e6ed1e65dd3b5 (diff)
downloadvyos-1x-0f8123268da02372cf4e5ee5f552f45fd79fc5e7.tar.gz
vyos-1x-0f8123268da02372cf4e5ee5f552f45fd79fc5e7.zip
Merge branch 'master' of github.com:vyos/vyos-smoketest into vyos-smoketest-integration (T2832)
* 'master' of github.com:vyos/vyos-smoketest: (153 commits) pppoe-server: test some more values lcd: adjust to cli changes lcd: adapt test to new CLI design pppoe-server: initial smoketest with local and radius auth pppoe: validate dhcpv6 client will be started wireless: validate hostapd/wpa_supplicant is running pppoe: sync to new dhcpv6-pd cli anyconnect: T2812: add basic testing ethernet: check interface disable state router-advert: check 'infinity' option in script logic ssh: config file is now volatile (moved to /run) ipv6: link-local: test address assignment on interfaces router-advert: add initial test mdns-repeater: add basic test pseudo-ethernet: extend smoketests with VIFs l2tpv3: add initial interface test wireless: use library function for loading kernel modules ethernet: test "ip" subtree of interface for e.g. ARP settings pppoe: use assertEqual() service: bcast-relay: add initial tests ...
Diffstat (limited to 'smoketest/scripts/cli/test_interfaces_tunnel.py')
-rwxr-xr-xsmoketest/scripts/cli/test_interfaces_tunnel.py109
1 files changed, 109 insertions, 0 deletions
diff --git a/smoketest/scripts/cli/test_interfaces_tunnel.py b/smoketest/scripts/cli/test_interfaces_tunnel.py
new file mode 100755
index 000000000..7611ffe26
--- /dev/null
+++ b/smoketest/scripts/cli/test_interfaces_tunnel.py
@@ -0,0 +1,109 @@
+#!/usr/bin/env python3
+#
+# Copyright (C) 2020 VyOS maintainers and contributors
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2 or later as
+# published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program. If not, see <http://www.gnu.org/licenses/>.
+
+import os
+import unittest
+
+from vyos.configsession import ConfigSession
+
+from base_interfaces_test import BasicInterfaceTest
+
+class TunnelInterfaceTest(BasicInterfaceTest.BaseTest):
+ # encoding, tunnel endpoint (v4/v6), address (v4/v6)
+ _valid = [
+ ('gre', 4, 4),
+ ('gre', 4, 6),
+ ('ip6gre', 6, 4),
+ ('ip6gre', 6, 6),
+ ('gre-bridge', 4, 4),
+ ('ipip', 4, 4),
+ ('ipip', 4, 6),
+ ('ipip6', 6, 4),
+ ('ipip6', 6, 6),
+ ('ip6ip6', 6, 6),
+ ('sit', 4, 6),
+ ]
+
+ local = {
+ 4: '10.100.{}.1/24',
+ 6: '2001:db8:{}::1/64',
+ }
+
+ remote = {
+ 4: '192.0.{}.1',
+ 6: '2002::{}:1',
+ }
+
+ address = {
+ 4: '10.100.{}.1/24',
+ 6: '2001:db8:{}::1/64',
+ }
+
+ def setUp(self):
+ local = {}
+ remote = {}
+ address = {}
+
+ self._intf_dummy = ['interfaces', 'dummy']
+ self._base_path = ['interfaces', 'tunnel']
+ self._interfaces = ['tun{}'.format(n) for n in range(len(self._valid))]
+
+ self._test_mtu = True
+ super().setUp()
+
+ for number in range(len(self._valid)):
+ dum4 = 'dum4{}'.format(number)
+ dum6 = 'dum6{}'.format(number)
+
+ ipv4 = self.local[4].format(number)
+ ipv6 = self.local[6].format(number)
+
+ local.setdefault(4, {})[number] = ipv4
+ local.setdefault(6, {})[number] = ipv6
+
+ ipv4 = self.remote[4].format(number)
+ ipv6 = self.remote[6].format(number)
+
+ remote.setdefault(4, {})[number] = ipv4
+ remote.setdefault(6, {})[number] = ipv6
+
+ ipv4 = self.address[4].format(number)
+ ipv6 = self.address[6].format(number)
+
+ address.setdefault(4, {})[number] = ipv4
+ address.setdefault(6, {})[number] = ipv6
+
+ self.session.set(self._intf_dummy + [dum4, 'address', ipv4])
+ self.session.set(self._intf_dummy + [dum6, 'address', ipv6])
+ self.session.commit()
+
+ for number, (encap, p2p, addr) in enumerate(self._valid):
+ intf = 'tun%d' % number
+ tunnel = {}
+ tunnel['encapsulation'] = encap
+ tunnel['local-ip'] = local[p2p][number].split('/')[0]
+ tunnel['remote-ip'] = remote[p2p][number].split('/')[0]
+ tunnel['address'] = address[addr][number]
+ for name in tunnel:
+ self.session.set(self._base_path + [intf, name, tunnel[name]])
+
+ def tearDown(self):
+ self.session.delete(self._intf_dummy)
+ super().tearDown()
+
+
+if __name__ == '__main__':
+ unittest.main()