summaryrefslogtreecommitdiff
path: root/smoketest/scripts/cli/test_policy.py
AgeCommit message (Collapse)Author
2022-06-22Policy: T4475: add support for matching ipv6 addresses on peer option in ↵Nicolas Fort
route-map
2022-06-16smoketest: policy: T4467: validate relative route-map metricChristian Poessinger
2022-06-04Policy: T3976-T4449-nexthop: add - match ipv6 nexthop type - as available ↵Nicolas Fort
for ipv4
2022-05-31IPv6: T3976: add prefix-list and access-list option from ipv6 route-mapfett0
2022-05-29Policy: T4450: Expand options for ip|ipv6 address match. Now support ↵Nicolas Fort
prefix-len on both matches. Also change help properties of route-source node.
2022-05-28Policy: T4449: Extend matching options for route-map ip nexthopNicolas Fort
2022-05-08policy: evpn: T3739: support "set evpn gateway-ip"Christian Poessinger
2022-05-05policy: T4414: add support for route-map "as-path prepend last-as x"Christian Poessinger
2022-04-07policy: T4194: simplify prefix-list duplication checksChristian Poessinger
Commit 5dafe255d ("policy: T4194: Add prefix-list duplication checks") added first support for FRR prefix-list duplication checks. FRR does not allow to specify the same profix list rule multiple times. vyos(config)# ip prefix-list foo seq 10 permit 192.0.2.0/24 vyos(config)# ip prefix-list foo seq 20 permit 192.0.2.0/24 % Configuration failed. Error type: validation Error description: duplicated prefix list value: 192.0.2.0/24 There is a VyOS verify() function which simply probed for the prefix, action, le and ge settings - but as Python has excellent support when comparing data, this can be as simple as a dictionary comparison using "==".
2022-03-15frr: T4302: upgrade to version 8.2Christian Poessinger
2022-01-30policy: T4219: add local-route(6) incoming-interfaceHenning Surmeier
2022-01-29policy: T4151: bugfix smoketestHenning Surmeier
.sort() is an inplace operation and return None...
2022-01-28policy: T4151: remove all previous rules on editHenning Surmeier
2022-01-21policy: T4151: Bugfix policy ipv6-local-routeHenning Surmeier
2022-01-14policy: T4151: Add policy ipv6-local-routeHenning Surmeier
Adds support for `ip -6 rule` policy based routing. Also, extends the existing ipv4 implemenation with a `destination` key, which is translated as `ip rule add to x.x.x.x/x` rules. https://phabricator.vyos.net/T4151
2021-11-27policy: T3753: adjust to new FRR 8.1 syntaxChristian Poessinger
Every node in running config now has an explicit "exit" tag
2021-11-21smoketest: remove superfluous ConfigSession importChristian Poessinger
2021-08-26Merge pull request #965 from c-po/t3739-evpn-route-mapChristian Poessinger
bgp: evpn: T3739: add route-map match support
2021-08-11bgp: evpn: T3739: add prefix-list match supportChristian Poessinger
FRR 7.5.1 supports: vyos(config-route-map)# match evpn default-route default EVPN type-5 route rd Route Distinguisher route-type Match route-type vni Match VNI This commit adds a proper VyOS CLI abstraction.
2021-08-02pbr: T3702: Add rules match fwmarkViacheslav
2021-06-16policy: T3624: add extended community bandwith support to route-mapChristian Poessinger
2021-06-16policy: T3631: migrate "set extcommunity-rt/soo" to "set extcommunity rt|soo"Christian Poessinger
Thi adds a new configuration level "set extcommunity" which then holds rt and soo als leaf-nodes below. This is the foundational work required to properly implement T3624 ("BGP: add support for extended community bandwidth definition")
2021-04-17policy: T2425: re-implement "policy" tree from vyatta-cfg-quagga in XML/PythonChristian Poessinger
2021-04-17smoketest: policy: add test for the route-map logicChristian Poessinger
2021-04-15smoketest: policy: inherit sequence numbersChristian Poessinger
In the vyatta-cfg-quagga days the access-list(6) or prefix-list(6) sequence numbers have been made up artifically. The new implementation from vyos-1x will re-use the rule number specified on the CLI as the sequence number, this we have to alter the tast cases to get a proper match from the beginning - covering both the old and new world. This can be done by using rule numbers that are multiples of 5.
2021-03-17smoketest: add shim for every test to re-use common tastsChristian Poessinger
Currently every smoketest does the setup and destruction of the configsession on its own durin setUp(). This creates a lot of overhead and one configsession should be re-used during execution of every smoketest script. In addiion a test that failed will leaf the system in an unconsistent state. For this reason before the test is executed we will save the running config to /tmp and the will re-load the config after the test has passed, always ensuring a clean environment for the next test.
2021-02-25smoketest: extend "policy" smoke testsChristian Poessinger
Only missing is the route-map smoketest which tens to become very "heavy"
2021-02-24smoketest: add basic "policy access-list" test caseChristian Poessinger