---
 openbsc/tests/vty_test_runner.py |   35 +++++++++++++++++++++++++++++++++++
 1 file changed, 35 insertions(+)

diff --git a/openbsc/tests/vty_test_runner.py b/openbsc/tests/vty_test_runner.py
index 3594129..1e25a91 100755
--- a/openbsc/tests/vty_test_runner.py
+++ b/openbsc/tests/vty_test_runner.py
@@ -205,6 +205,41 @@ class TestVTYNITB(TestVTYGenericBSC):
         res = self.vty.command("write terminal")
         self.assert_(res.find('auth policy black-list') > 0)

+    def testRachAccessControlClass(self):
+        self.vty.enable()
+        self.vty.command("configure terminal")
+        self.vty.command("network")
+        self.vty.command("bts 0")
+
+        # Test invalid input
+        self.vty.verify("rach access-control-class", ['% Command incomplete.'])
+        self.vty.verify("rach access-control-class 1", ['% Command
incomplete.'])
+        self.vty.verify("rach access-control-class -1", ['% Unknown command.'])
+        self.vty.verify("rach access-control-class 10", ['% Unknown command.'])
+        self.vty.verify("rach access-control-class 16", ['% Unknown command.'])
+
+        # Barred rach access control classes
+        for classNum in range(16):
+          if classNum!=10:
+            self.vty.verify("rach access-control-class " +
str(classNum) + " barred", [''])
+
+        # Verify settings
+        res = self.vty.command("write terminal")
+        for classNum in range(16):
+          if classNum!=10:
+            self.assert_(res.find("rach access-control-class " +
str(classNum) + " barred") > 0)
+
+        # Allowed rach access control classes
+        for classNum in range(16):
+          if classNum!=10:
+            self.vty.verify("rach access-control-class " +
str(classNum) + " allowed", [''])
+
+        # Verify settings
+        res = self.vty.command("write terminal")
+        for classNum in range(16):
+          if classNum!=10:
+            self.assertEquals(res.find("rach access-control-class " +
str(classNum) + " barred"), -1)
+
 class TestVTYBSC(TestVTYGenericBSC):

     def vty_command(self):
-- 
1.7.9.5

2013/9/13 Ivan Kluchnikov <[email protected]>:
> ---
>  openbsc/tests/vty_test_runner.py |   83 
> ++++++++++++++++++++++++++++++++++++++
>  1 file changed, 83 insertions(+)
>
> diff --git a/openbsc/tests/vty_test_runner.py 
> b/openbsc/tests/vty_test_runner.py
> index 3594129..6f45939 100755
> --- a/openbsc/tests/vty_test_runner.py
> +++ b/openbsc/tests/vty_test_runner.py
> @@ -205,6 +205,89 @@ class TestVTYNITB(TestVTYGenericBSC):
>          res = self.vty.command("write terminal")
>          self.assert_(res.find('auth policy black-list') > 0)
>
> +    def testRachAccessControlClass(self):
> +        self.vty.enable()
> +        self.vty.command("configure terminal")
> +        self.vty.command("network")
> +        self.vty.command("bts 0")
> +
> +        # Test invalid input
> +        self.vty.verify("rach access-control-class", ['% Command 
> incomplete.'])
> +        self.vty.verify("rach access-control-class 1", ['% Command
> incomplete.'])
> +        self.vty.verify("rach access-control-class -1", ['% Unknown 
> command.'])
> +        self.vty.verify("rach access-control-class 10", ['% Unknown 
> command.'])
> +        self.vty.verify("rach access-control-class 16", ['% Unknown 
> command.'])
> +
> +        # Barred rach access control classes
> +        self.vty.verify("rach access-control-class 0 barred", [''])
> +        self.vty.verify("rach access-control-class 1 barred", [''])
> +        self.vty.verify("rach access-control-class 2 barred", [''])
> +        self.vty.verify("rach access-control-class 3 barred", [''])
> +        self.vty.verify("rach access-control-class 4 barred", [''])
> +        self.vty.verify("rach access-control-class 5 barred", [''])
> +        self.vty.verify("rach access-control-class 6 barred", [''])
> +        self.vty.verify("rach access-control-class 7 barred", [''])
> +        self.vty.verify("rach access-control-class 8 barred", [''])
> +        self.vty.verify("rach access-control-class 9 barred", [''])
> +        self.vty.verify("rach access-control-class 11 barred", [''])
> +        self.vty.verify("rach access-control-class 12 barred", [''])
> +        self.vty.verify("rach access-control-class 13 barred", [''])
> +        self.vty.verify("rach access-control-class 14 barred", [''])
> +        self.vty.verify("rach access-control-class 15 barred", [''])
> +
> +        # Verify settings
> +        res = self.vty.command("write terminal")
> +        self.assert_(res.find('rach access-control-class 0 barred') > 0)
> +        self.assert_(res.find('rach access-control-class 1 barred') > 0)
> +        self.assert_(res.find('rach access-control-class 2 barred') > 0)
> +        self.assert_(res.find('rach access-control-class 3 barred') > 0)
> +        self.assert_(res.find('rach access-control-class 4 barred') > 0)
> +        self.assert_(res.find('rach access-control-class 5 barred') > 0)
> +        self.assert_(res.find('rach access-control-class 6 barred') > 0)
> +        self.assert_(res.find('rach access-control-class 7 barred') > 0)
> +        self.assert_(res.find('rach access-control-class 8 barred') > 0)
> +        self.assert_(res.find('rach access-control-class 9 barred') > 0)
> +        self.assert_(res.find('rach access-control-class 11 barred') > 0)
> +        self.assert_(res.find('rach access-control-class 12 barred') > 0)
> +        self.assert_(res.find('rach access-control-class 13 barred') > 0)
> +        self.assert_(res.find('rach access-control-class 14 barred') > 0)
> +        self.assert_(res.find('rach access-control-class 15 barred') > 0)
> +
> +        # Allowed rach access control classes
> +        self.vty.verify("rach access-control-class 0 allowed", [''])
> +        self.vty.verify("rach access-control-class 1 allowed", [''])
> +        self.vty.verify("rach access-control-class 2 allowed", [''])
> +        self.vty.verify("rach access-control-class 3 allowed", [''])
> +        self.vty.verify("rach access-control-class 4 allowed", [''])
> +        self.vty.verify("rach access-control-class 5 allowed", [''])
> +        self.vty.verify("rach access-control-class 6 allowed", [''])
> +        self.vty.verify("rach access-control-class 7 allowed", [''])
> +        self.vty.verify("rach access-control-class 8 allowed", [''])
> +        self.vty.verify("rach access-control-class 9 allowed", [''])
> +        self.vty.verify("rach access-control-class 11 allowed", [''])
> +        self.vty.verify("rach access-control-class 12 allowed", [''])
> +        self.vty.verify("rach access-control-class 13 allowed", [''])
> +        self.vty.verify("rach access-control-class 14 allowed", [''])
> +        self.vty.verify("rach access-control-class 15 allowed", [''])
> +
> +        # Verify settings
> +        res = self.vty.command("write terminal")
> +        self.assertEquals(res.find('rach access-control-class 0 barred'), -1)
> +        self.assertEquals(res.find('rach access-control-class 1 barred'), -1)
> +        self.assertEquals(res.find('rach access-control-class 2 barred'), -1)
> +        self.assertEquals(res.find('rach access-control-class 3 barred'), -1)
> +        self.assertEquals(res.find('rach access-control-class 4 barred'), -1)
> +        self.assertEquals(res.find('rach access-control-class 5 barred'), -1)
> +        self.assertEquals(res.find('rach access-control-class 6 barred'), -1)
> +        self.assertEquals(res.find('rach access-control-class 7 barred'), -1)
> +        self.assertEquals(res.find('rach access-control-class 8 barred'), -1)
> +        self.assertEquals(res.find('rach access-control-class 9 barred'), -1)
> +        self.assertEquals(res.find('rach access-control-class 11 barred'), 
> -1)
> +        self.assertEquals(res.find('rach access-control-class 12 barred'), 
> -1)
> +        self.assertEquals(res.find('rach access-control-class 13 barred'), 
> -1)
> +        self.assertEquals(res.find('rach access-control-class 14 barred'), 
> -1)
> +        self.assertEquals(res.find('rach access-control-class 15 barred'), 
> -1)
> +
>  class TestVTYBSC(TestVTYGenericBSC):
>
>      def vty_command(self):
> --
> 1.7.9.5
>
> --
> Regards,
> Ivan Kluchnikov.
> http://fairwaves.ru



-- 
Regards,
Ivan Kluchnikov.
http://fairwaves.ru

Reply via email to