This is merely a historical archive of years 2008-2021, before the migration to mailman3.
A maintained and still updated list archive can be found at https://lists.osmocom.org/hyperkitty/list/OpenBSC@lists.osmocom.org/.
Ivan Kluchnikov Ivan.Kluchnikov at fairwaves.ru--- openbsc/tests/vty_test_runner.py | 35 +++++++++++++++++++++++++++++++++++ 1 file changed, 35 insertions(+) diff --git a/openbsc/tests/vty_test_runner.py b/openbsc/tests/vty_test_runner.py index 3594129..1e25a91 100755 --- a/openbsc/tests/vty_test_runner.py +++ b/openbsc/tests/vty_test_runner.py @@ -205,6 +205,41 @@ class TestVTYNITB(TestVTYGenericBSC): res = self.vty.command("write terminal") self.assert_(res.find('auth policy black-list') > 0) + def testRachAccessControlClass(self): + self.vty.enable() + self.vty.command("configure terminal") + self.vty.command("network") + self.vty.command("bts 0") + + # Test invalid input + self.vty.verify("rach access-control-class", ['% Command incomplete.']) + self.vty.verify("rach access-control-class 1", ['% Command incomplete.']) + self.vty.verify("rach access-control-class -1", ['% Unknown command.']) + self.vty.verify("rach access-control-class 10", ['% Unknown command.']) + self.vty.verify("rach access-control-class 16", ['% Unknown command.']) + + # Barred rach access control classes + for classNum in range(16): + if classNum!=10: + self.vty.verify("rach access-control-class " + str(classNum) + " barred", ['']) + + # Verify settings + res = self.vty.command("write terminal") + for classNum in range(16): + if classNum!=10: + self.assert_(res.find("rach access-control-class " + str(classNum) + " barred") > 0) + + # Allowed rach access control classes + for classNum in range(16): + if classNum!=10: + self.vty.verify("rach access-control-class " + str(classNum) + " allowed", ['']) + + # Verify settings + res = self.vty.command("write terminal") + for classNum in range(16): + if classNum!=10: + self.assertEquals(res.find("rach access-control-class " + str(classNum) + " barred"), -1) + class TestVTYBSC(TestVTYGenericBSC): def vty_command(self): -- 1.7.9.5 2013/9/13 Ivan Kluchnikov <Ivan.Kluchnikov at fairwaves.ru>: > --- > openbsc/tests/vty_test_runner.py | 83 ++++++++++++++++++++++++++++++++++++++ > 1 file changed, 83 insertions(+) > > diff --git a/openbsc/tests/vty_test_runner.py b/openbsc/tests/vty_test_runner.py > index 3594129..6f45939 100755 > --- a/openbsc/tests/vty_test_runner.py > +++ b/openbsc/tests/vty_test_runner.py > @@ -205,6 +205,89 @@ class TestVTYNITB(TestVTYGenericBSC): > res = self.vty.command("write terminal") > self.assert_(res.find('auth policy black-list') > 0) > > + def testRachAccessControlClass(self): > + self.vty.enable() > + self.vty.command("configure terminal") > + self.vty.command("network") > + self.vty.command("bts 0") > + > + # Test invalid input > + self.vty.verify("rach access-control-class", ['% Command incomplete.']) > + self.vty.verify("rach access-control-class 1", ['% Command > incomplete.']) > + self.vty.verify("rach access-control-class -1", ['% Unknown command.']) > + self.vty.verify("rach access-control-class 10", ['% Unknown command.']) > + self.vty.verify("rach access-control-class 16", ['% Unknown command.']) > + > + # Barred rach access control classes > + self.vty.verify("rach access-control-class 0 barred", ['']) > + self.vty.verify("rach access-control-class 1 barred", ['']) > + self.vty.verify("rach access-control-class 2 barred", ['']) > + self.vty.verify("rach access-control-class 3 barred", ['']) > + self.vty.verify("rach access-control-class 4 barred", ['']) > + self.vty.verify("rach access-control-class 5 barred", ['']) > + self.vty.verify("rach access-control-class 6 barred", ['']) > + self.vty.verify("rach access-control-class 7 barred", ['']) > + self.vty.verify("rach access-control-class 8 barred", ['']) > + self.vty.verify("rach access-control-class 9 barred", ['']) > + self.vty.verify("rach access-control-class 11 barred", ['']) > + self.vty.verify("rach access-control-class 12 barred", ['']) > + self.vty.verify("rach access-control-class 13 barred", ['']) > + self.vty.verify("rach access-control-class 14 barred", ['']) > + self.vty.verify("rach access-control-class 15 barred", ['']) > + > + # Verify settings > + res = self.vty.command("write terminal") > + self.assert_(res.find('rach access-control-class 0 barred') > 0) > + self.assert_(res.find('rach access-control-class 1 barred') > 0) > + self.assert_(res.find('rach access-control-class 2 barred') > 0) > + self.assert_(res.find('rach access-control-class 3 barred') > 0) > + self.assert_(res.find('rach access-control-class 4 barred') > 0) > + self.assert_(res.find('rach access-control-class 5 barred') > 0) > + self.assert_(res.find('rach access-control-class 6 barred') > 0) > + self.assert_(res.find('rach access-control-class 7 barred') > 0) > + self.assert_(res.find('rach access-control-class 8 barred') > 0) > + self.assert_(res.find('rach access-control-class 9 barred') > 0) > + self.assert_(res.find('rach access-control-class 11 barred') > 0) > + self.assert_(res.find('rach access-control-class 12 barred') > 0) > + self.assert_(res.find('rach access-control-class 13 barred') > 0) > + self.assert_(res.find('rach access-control-class 14 barred') > 0) > + self.assert_(res.find('rach access-control-class 15 barred') > 0) > + > + # Allowed rach access control classes > + self.vty.verify("rach access-control-class 0 allowed", ['']) > + self.vty.verify("rach access-control-class 1 allowed", ['']) > + self.vty.verify("rach access-control-class 2 allowed", ['']) > + self.vty.verify("rach access-control-class 3 allowed", ['']) > + self.vty.verify("rach access-control-class 4 allowed", ['']) > + self.vty.verify("rach access-control-class 5 allowed", ['']) > + self.vty.verify("rach access-control-class 6 allowed", ['']) > + self.vty.verify("rach access-control-class 7 allowed", ['']) > + self.vty.verify("rach access-control-class 8 allowed", ['']) > + self.vty.verify("rach access-control-class 9 allowed", ['']) > + self.vty.verify("rach access-control-class 11 allowed", ['']) > + self.vty.verify("rach access-control-class 12 allowed", ['']) > + self.vty.verify("rach access-control-class 13 allowed", ['']) > + self.vty.verify("rach access-control-class 14 allowed", ['']) > + self.vty.verify("rach access-control-class 15 allowed", ['']) > + > + # Verify settings > + res = self.vty.command("write terminal") > + self.assertEquals(res.find('rach access-control-class 0 barred'), -1) > + self.assertEquals(res.find('rach access-control-class 1 barred'), -1) > + self.assertEquals(res.find('rach access-control-class 2 barred'), -1) > + self.assertEquals(res.find('rach access-control-class 3 barred'), -1) > + self.assertEquals(res.find('rach access-control-class 4 barred'), -1) > + self.assertEquals(res.find('rach access-control-class 5 barred'), -1) > + self.assertEquals(res.find('rach access-control-class 6 barred'), -1) > + self.assertEquals(res.find('rach access-control-class 7 barred'), -1) > + self.assertEquals(res.find('rach access-control-class 8 barred'), -1) > + self.assertEquals(res.find('rach access-control-class 9 barred'), -1) > + self.assertEquals(res.find('rach access-control-class 11 barred'), -1) > + self.assertEquals(res.find('rach access-control-class 12 barred'), -1) > + self.assertEquals(res.find('rach access-control-class 13 barred'), -1) > + self.assertEquals(res.find('rach access-control-class 14 barred'), -1) > + self.assertEquals(res.find('rach access-control-class 15 barred'), -1) > + > class TestVTYBSC(TestVTYGenericBSC): > > def vty_command(self): > -- > 1.7.9.5 > > -- > Regards, > Ivan Kluchnikov. > http://fairwaves.ru -- Regards, Ivan Kluchnikov. http://fairwaves.ru