@@ -66,10 +66,12 @@ def setup_module(mod):
66
66
tgen .start_topology ()
67
67
for rname , router in tgen .routers ().items ():
68
68
router .run ("/bin/bash {}/{}/setup.sh" .format (CWD , rname ))
69
- router .load_config (TopoRouter .RD_ZEBRA ,
70
- os .path .join (CWD , '{}/zebra.conf' .format (rname )))
71
- router .load_config (TopoRouter .RD_BGP ,
72
- os .path .join (CWD , '{}/bgpd.conf' .format (rname )))
69
+ router .load_config (
70
+ TopoRouter .RD_ZEBRA , os .path .join (CWD , "{}/zebra.conf" .format (rname ))
71
+ )
72
+ router .load_config (
73
+ TopoRouter .RD_BGP , os .path .join (CWD , "{}/bgpd.conf" .format (rname ))
74
+ )
73
75
74
76
tgen .gears ["r1" ].run ("sysctl net.vrf.strict_mode=1" )
75
77
tgen .gears ["r1" ].run ("ip link add vrf10 type vrf table 10" )
@@ -111,7 +113,7 @@ def _check(name, dest_addr, match):
111
113
logger .info (output )
112
114
assert match in output , "ping fail"
113
115
114
- match = "{} packet loss" .format ("0%" if expect_connected else "100%" )
116
+ match = ", {} packet loss" .format ("0%" if expect_connected else "100%" )
115
117
logger .info ("[+] check {} {} {}" .format (name , dest_addr , match ))
116
118
tgen = get_topogen ()
117
119
func = functools .partial (_check , name , dest_addr , match )
@@ -144,7 +146,7 @@ def _check(name, dest_addr, match):
144
146
expected = open_json_file ("{}/{}" .format (CWD , expected_file ))
145
147
return topotest .json_cmp (output , expected )
146
148
147
- logger .info (" [+] check {} \ " {}\ " {}" .format (name , cmd , expected_file ))
149
+ logger .info (' [+] check {} "{}" {}' .format (name , cmd , expected_file ))
148
150
tgen = get_topogen ()
149
151
func = functools .partial (_check , name , cmd , expected_file )
150
152
success , result = topotest .run_and_expect (func , None , count = 10 , wait = 0.5 )
@@ -214,10 +216,18 @@ def test_bgp_sid_vpn_export_disable():
214
216
no sid vpn per-vrf export
215
217
"""
216
218
)
217
- check_rib ("r1" , "show bgp ipv4 vpn json" , "r1/vpnv4_rib_sid_vpn_export_disabled.json" )
218
- check_rib ("r2" , "show bgp ipv4 vpn json" , "r2/vpnv4_rib_sid_vpn_export_disabled.json" )
219
- check_rib ("r1" , "show bgp ipv6 vpn json" , "r1/vpnv6_rib_sid_vpn_export_disabled.json" )
220
- check_rib ("r2" , "show bgp ipv6 vpn json" , "r2/vpnv6_rib_sid_vpn_export_disabled.json" )
219
+ check_rib (
220
+ "r1" , "show bgp ipv4 vpn json" , "r1/vpnv4_rib_sid_vpn_export_disabled.json"
221
+ )
222
+ check_rib (
223
+ "r2" , "show bgp ipv4 vpn json" , "r2/vpnv4_rib_sid_vpn_export_disabled.json"
224
+ )
225
+ check_rib (
226
+ "r1" , "show bgp ipv6 vpn json" , "r1/vpnv6_rib_sid_vpn_export_disabled.json"
227
+ )
228
+ check_rib (
229
+ "r2" , "show bgp ipv6 vpn json" , "r2/vpnv6_rib_sid_vpn_export_disabled.json"
230
+ )
221
231
check_ping4 ("ce1" , "192.168.2.2" , False )
222
232
check_ping6 ("ce1" , "2001:2::2" , False )
223
233
@@ -233,10 +243,18 @@ def test_bgp_sid_vpn_export_reenable():
233
243
sid vpn per-vrf export auto
234
244
"""
235
245
)
236
- check_rib ("r1" , "show bgp ipv4 vpn json" , "r1/vpnv4_rib_sid_vpn_export_reenabled.json" )
237
- check_rib ("r2" , "show bgp ipv4 vpn json" , "r2/vpnv4_rib_sid_vpn_export_reenabled.json" )
238
- check_rib ("r1" , "show bgp ipv6 vpn json" , "r1/vpnv6_rib_sid_vpn_export_reenabled.json" )
239
- check_rib ("r2" , "show bgp ipv6 vpn json" , "r2/vpnv6_rib_sid_vpn_export_reenabled.json" )
246
+ check_rib (
247
+ "r1" , "show bgp ipv4 vpn json" , "r1/vpnv4_rib_sid_vpn_export_reenabled.json"
248
+ )
249
+ check_rib (
250
+ "r2" , "show bgp ipv4 vpn json" , "r2/vpnv4_rib_sid_vpn_export_reenabled.json"
251
+ )
252
+ check_rib (
253
+ "r1" , "show bgp ipv6 vpn json" , "r1/vpnv6_rib_sid_vpn_export_reenabled.json"
254
+ )
255
+ check_rib (
256
+ "r2" , "show bgp ipv6 vpn json" , "r2/vpnv6_rib_sid_vpn_export_reenabled.json"
257
+ )
240
258
check_ping4 ("ce1" , "192.168.2.2" , True )
241
259
check_ping6 ("ce1" , "2001:2::2" , True )
242
260
0 commit comments