This is merely a historical archive of years 2008-2021, before the migration to mailman3.
A maintained and still updated list archive can be found at https://lists.osmocom.org/hyperkitty/list/OpenBSC@lists.osmocom.org/.
Ivan Kluchnikov Ivan.Kluchnikov at fairwaves.ru---
openbsc/tests/vty_test_runner.py | 35 +++++++++++++++++++++++++++++++++++
1 file changed, 35 insertions(+)
diff --git a/openbsc/tests/vty_test_runner.py b/openbsc/tests/vty_test_runner.py
index 3594129..1e25a91 100755
--- a/openbsc/tests/vty_test_runner.py
+++ b/openbsc/tests/vty_test_runner.py
@@ -205,6 +205,41 @@ class TestVTYNITB(TestVTYGenericBSC):
res = self.vty.command("write terminal")
self.assert_(res.find('auth policy black-list') > 0)
+ def testRachAccessControlClass(self):
+ self.vty.enable()
+ self.vty.command("configure terminal")
+ self.vty.command("network")
+ self.vty.command("bts 0")
+
+ # Test invalid input
+ self.vty.verify("rach access-control-class", ['% Command incomplete.'])
+ self.vty.verify("rach access-control-class 1", ['% Command
incomplete.'])
+ self.vty.verify("rach access-control-class -1", ['% Unknown command.'])
+ self.vty.verify("rach access-control-class 10", ['% Unknown command.'])
+ self.vty.verify("rach access-control-class 16", ['% Unknown command.'])
+
+ # Barred rach access control classes
+ for classNum in range(16):
+ if classNum!=10:
+ self.vty.verify("rach access-control-class " +
str(classNum) + " barred", [''])
+
+ # Verify settings
+ res = self.vty.command("write terminal")
+ for classNum in range(16):
+ if classNum!=10:
+ self.assert_(res.find("rach access-control-class " +
str(classNum) + " barred") > 0)
+
+ # Allowed rach access control classes
+ for classNum in range(16):
+ if classNum!=10:
+ self.vty.verify("rach access-control-class " +
str(classNum) + " allowed", [''])
+
+ # Verify settings
+ res = self.vty.command("write terminal")
+ for classNum in range(16):
+ if classNum!=10:
+ self.assertEquals(res.find("rach access-control-class " +
str(classNum) + " barred"), -1)
+
class TestVTYBSC(TestVTYGenericBSC):
def vty_command(self):
--
1.7.9.5
2013/9/13 Ivan Kluchnikov <Ivan.Kluchnikov at fairwaves.ru>:
> ---
> openbsc/tests/vty_test_runner.py | 83 ++++++++++++++++++++++++++++++++++++++
> 1 file changed, 83 insertions(+)
>
> diff --git a/openbsc/tests/vty_test_runner.py b/openbsc/tests/vty_test_runner.py
> index 3594129..6f45939 100755
> --- a/openbsc/tests/vty_test_runner.py
> +++ b/openbsc/tests/vty_test_runner.py
> @@ -205,6 +205,89 @@ class TestVTYNITB(TestVTYGenericBSC):
> res = self.vty.command("write terminal")
> self.assert_(res.find('auth policy black-list') > 0)
>
> + def testRachAccessControlClass(self):
> + self.vty.enable()
> + self.vty.command("configure terminal")
> + self.vty.command("network")
> + self.vty.command("bts 0")
> +
> + # Test invalid input
> + self.vty.verify("rach access-control-class", ['% Command incomplete.'])
> + self.vty.verify("rach access-control-class 1", ['% Command
> incomplete.'])
> + self.vty.verify("rach access-control-class -1", ['% Unknown command.'])
> + self.vty.verify("rach access-control-class 10", ['% Unknown command.'])
> + self.vty.verify("rach access-control-class 16", ['% Unknown command.'])
> +
> + # Barred rach access control classes
> + self.vty.verify("rach access-control-class 0 barred", [''])
> + self.vty.verify("rach access-control-class 1 barred", [''])
> + self.vty.verify("rach access-control-class 2 barred", [''])
> + self.vty.verify("rach access-control-class 3 barred", [''])
> + self.vty.verify("rach access-control-class 4 barred", [''])
> + self.vty.verify("rach access-control-class 5 barred", [''])
> + self.vty.verify("rach access-control-class 6 barred", [''])
> + self.vty.verify("rach access-control-class 7 barred", [''])
> + self.vty.verify("rach access-control-class 8 barred", [''])
> + self.vty.verify("rach access-control-class 9 barred", [''])
> + self.vty.verify("rach access-control-class 11 barred", [''])
> + self.vty.verify("rach access-control-class 12 barred", [''])
> + self.vty.verify("rach access-control-class 13 barred", [''])
> + self.vty.verify("rach access-control-class 14 barred", [''])
> + self.vty.verify("rach access-control-class 15 barred", [''])
> +
> + # Verify settings
> + res = self.vty.command("write terminal")
> + self.assert_(res.find('rach access-control-class 0 barred') > 0)
> + self.assert_(res.find('rach access-control-class 1 barred') > 0)
> + self.assert_(res.find('rach access-control-class 2 barred') > 0)
> + self.assert_(res.find('rach access-control-class 3 barred') > 0)
> + self.assert_(res.find('rach access-control-class 4 barred') > 0)
> + self.assert_(res.find('rach access-control-class 5 barred') > 0)
> + self.assert_(res.find('rach access-control-class 6 barred') > 0)
> + self.assert_(res.find('rach access-control-class 7 barred') > 0)
> + self.assert_(res.find('rach access-control-class 8 barred') > 0)
> + self.assert_(res.find('rach access-control-class 9 barred') > 0)
> + self.assert_(res.find('rach access-control-class 11 barred') > 0)
> + self.assert_(res.find('rach access-control-class 12 barred') > 0)
> + self.assert_(res.find('rach access-control-class 13 barred') > 0)
> + self.assert_(res.find('rach access-control-class 14 barred') > 0)
> + self.assert_(res.find('rach access-control-class 15 barred') > 0)
> +
> + # Allowed rach access control classes
> + self.vty.verify("rach access-control-class 0 allowed", [''])
> + self.vty.verify("rach access-control-class 1 allowed", [''])
> + self.vty.verify("rach access-control-class 2 allowed", [''])
> + self.vty.verify("rach access-control-class 3 allowed", [''])
> + self.vty.verify("rach access-control-class 4 allowed", [''])
> + self.vty.verify("rach access-control-class 5 allowed", [''])
> + self.vty.verify("rach access-control-class 6 allowed", [''])
> + self.vty.verify("rach access-control-class 7 allowed", [''])
> + self.vty.verify("rach access-control-class 8 allowed", [''])
> + self.vty.verify("rach access-control-class 9 allowed", [''])
> + self.vty.verify("rach access-control-class 11 allowed", [''])
> + self.vty.verify("rach access-control-class 12 allowed", [''])
> + self.vty.verify("rach access-control-class 13 allowed", [''])
> + self.vty.verify("rach access-control-class 14 allowed", [''])
> + self.vty.verify("rach access-control-class 15 allowed", [''])
> +
> + # Verify settings
> + res = self.vty.command("write terminal")
> + self.assertEquals(res.find('rach access-control-class 0 barred'), -1)
> + self.assertEquals(res.find('rach access-control-class 1 barred'), -1)
> + self.assertEquals(res.find('rach access-control-class 2 barred'), -1)
> + self.assertEquals(res.find('rach access-control-class 3 barred'), -1)
> + self.assertEquals(res.find('rach access-control-class 4 barred'), -1)
> + self.assertEquals(res.find('rach access-control-class 5 barred'), -1)
> + self.assertEquals(res.find('rach access-control-class 6 barred'), -1)
> + self.assertEquals(res.find('rach access-control-class 7 barred'), -1)
> + self.assertEquals(res.find('rach access-control-class 8 barred'), -1)
> + self.assertEquals(res.find('rach access-control-class 9 barred'), -1)
> + self.assertEquals(res.find('rach access-control-class 11 barred'), -1)
> + self.assertEquals(res.find('rach access-control-class 12 barred'), -1)
> + self.assertEquals(res.find('rach access-control-class 13 barred'), -1)
> + self.assertEquals(res.find('rach access-control-class 14 barred'), -1)
> + self.assertEquals(res.find('rach access-control-class 15 barred'), -1)
> +
> class TestVTYBSC(TestVTYGenericBSC):
>
> def vty_command(self):
> --
> 1.7.9.5
>
> --
> Regards,
> Ivan Kluchnikov.
> http://fairwaves.ru
--
Regards,
Ivan Kluchnikov.
http://fairwaves.ru