summaryrefslogtreecommitdiff
path: root/smoketest/scripts/cli/test_policy_local-route.py
diff options
context:
space:
mode:
authorsever-sever <v.gletenko@vyos.io>2020-11-17 15:14:42 +0000
committersever-sever <v.gletenko@vyos.io>2020-11-20 15:49:13 +0000
commit7606fa6081e2f6d76982056ca93003e6c5dbd685 (patch)
tree813ca20057c45dc993c3876c38a64f94e9c22b26 /smoketest/scripts/cli/test_policy_local-route.py
parent4dc93212f77c00433330f5e90d4c5383c883f644 (diff)
downloadvyos-1x-7606fa6081e2f6d76982056ca93003e6c5dbd685.tar.gz
vyos-1x-7606fa6081e2f6d76982056ca93003e6c5dbd685.zip
policy-conf: T439: Add policy local-route PBR
Diffstat (limited to 'smoketest/scripts/cli/test_policy_local-route.py')
-rwxr-xr-xsmoketest/scripts/cli/test_policy_local-route.py61
1 files changed, 61 insertions, 0 deletions
diff --git a/smoketest/scripts/cli/test_policy_local-route.py b/smoketest/scripts/cli/test_policy_local-route.py
new file mode 100755
index 000000000..490bf6b47
--- /dev/null
+++ b/smoketest/scripts/cli/test_policy_local-route.py
@@ -0,0 +1,61 @@
+#!/usr/bin/env python3
+#
+# Copyright (C) 2020 VyOS maintainers and contributors
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2 or later as
+# published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program. If not, see <http://www.gnu.org/licenses/>.
+
+import os
+import unittest
+
+from vyos.configsession import ConfigSession
+from vyos.configsession import ConfigSessionError
+from vyos.util import cmd
+from vyos.util import process_named_running
+
+class PolicyLocalRouteTest(unittest.TestCase):
+ def setUp(self):
+ self.session = ConfigSession(os.getpid())
+ self._sources = ['203.0.113.1', '203.0.113.2']
+
+ def tearDown(self):
+ # Delete all policies
+ self.session.delete(['policy', 'local-route'])
+ self.session.commit()
+ del self.session
+
+ # Test set table for some sources
+ def test_table_id(self):
+ base = ['policy', 'local-route']
+ rule = '50'
+ table = '23'
+ for src in self._sources:
+ self.session.set(base + ['rule', rule, 'set', 'table', table])
+ self.session.set(base + ['rule', rule, 'source', src])
+
+ self.session.commit()
+
+ # Check generated configuration
+
+ # Expected values
+ original = """
+ 50: from 203.0.113.1 lookup 23
+ 50: from 203.0.113.2 lookup 23
+ """
+ tmp = cmd('ip rule show prio 50')
+ original = original.split()
+ tmp = tmp.split()
+
+ self.assertEqual(tmp, original)
+
+if __name__ == '__main__':
+ unittest.main()