Пример #1
0
class TestServiceRADVD(unittest.TestCase):
    def setUp(self):
        self.session = ConfigSession(os.getpid())
        self.session.set(address_base + ['2001:db8::1/64'])

    def tearDown(self):
        self.session.delete(address_base)
        self.session.delete(base_path)
        self.session.commit()
        del self.session

    def test_single(self):
        self.session.set(base_path + ['prefix', '::/64', 'no-on-link-flag'])
        self.session.set(base_path + ['prefix', '::/64', 'no-autonomous-flag'])
        self.session.set(base_path +
                         ['prefix', '::/64', 'valid-lifetime', 'infinity'])
        self.session.set(base_path + ['dnssl', '2001:db8::1234'])
        self.session.set(base_path + ['other-config-flag'])

        # commit changes
        self.session.commit()

        # verify values
        tmp = get_config_value('interface')
        self.assertEqual(tmp, interface)

        tmp = get_config_value('prefix')
        self.assertEqual(tmp, '::/64')

        tmp = get_config_value('AdvOtherConfigFlag')
        self.assertEqual(tmp, 'on')

        # this is a default value
        tmp = get_config_value('AdvRetransTimer')
        self.assertEqual(tmp, '0')

        # this is a default value
        tmp = get_config_value('AdvCurHopLimit')
        self.assertEqual(tmp, '64')

        # this is a default value
        tmp = get_config_value('AdvDefaultPreference')
        self.assertEqual(tmp, 'medium')

        tmp = get_config_value('AdvAutonomous')
        self.assertEqual(tmp, 'off')

        # this is a default value
        tmp = get_config_value('AdvValidLifetime')
        self.assertEqual(tmp, 'infinity')

        # this is a default value
        tmp = get_config_value('AdvPreferredLifetime')
        self.assertEqual(tmp, '14400')

        tmp = get_config_value('AdvOnLink')
        self.assertEqual(tmp, 'off')

        # Check for running process
        self.assertTrue('radvd' in (p.name() for p in process_iter()))
Пример #2
0
class VRFTest(unittest.TestCase):
    def setUp(self):
        self.session = ConfigSession(os.getpid())
        self._vrfs = ['red', 'green', 'blue']

    def tearDown(self):
        # delete all VRFs
        self.session.delete(['vrf'])
        self.session.commit()
        del self.session

    def test_table_id(self):
        table = 1000
        for vrf in self._vrfs:
            base = ['vrf', 'name', vrf]
            description = "VyOS-VRF-" + vrf
            self.session.set(base + ['description', description])

            # check validate() - a table ID is mandatory
            with self.assertRaises(ConfigSessionError):
                self.session.commit()

            self.session.set(base + ['table', str(table)])
            table += 1

        # commit changes
        self.session.commit()
class TestVpnAnyconnect(unittest.TestCase):
    def setUp(self):
        self.session = ConfigSession(os.getpid())

    def tearDown(self):
        # Delete vpn anyconnect configuration
        self.session.delete(base_path)
        self.session.commit()

        del self.session

    def test_vpn(self):
        user = '******'
        password = '******'
        self.session.delete(base_path)
        self.session.set(base_path + [
            "authentication", "local-users", "username", user, "password",
            password
        ])
        self.session.set(base_path + ["authentication", "mode", "local"])
        self.session.set(base_path + [
            "network-settings", "client-ip-settings", "subnet", "192.0.2.0/24"
        ])
        self.session.set(base_path + ["ssl", "ca-cert-file", cert])
        self.session.set(base_path + ["ssl", "cert-file", cert])
        self.session.set(base_path + ["ssl", "key-file", cert_key])

        self.session.commit()

        # Check for running process
        self.assertTrue("ocserv-main" in (p.name() for p in process_iter()))
Пример #4
0
class TestSystemLCD(unittest.TestCase):
    def setUp(self):
        self.session = ConfigSession(os.getpid())

    def tearDown(self):
        self.session.delete(base_path)
        self.session.commit()
        del self.session

    def test_system_display(self):
        # configure some system display
        self.session.set(base_path + ['device', 'ttyS1'])
        self.session.set(base_path + ['model', 'cfa-533'])

        # commit changes
        self.session.commit()

        # load up ini-styled LCDd.conf
        conf = ConfigParser()
        conf.read('/run/LCDd/LCDd.conf')

        self.assertEqual(conf['CFontzPacket']['Model'], '533')
        self.assertEqual(conf['CFontzPacket']['Device'], '/dev/ttyS1')

        # both processes running
        self.assertTrue('LCDd' in (p.name() for p in process_iter()))
class TestSystemNameServer(unittest.TestCase):
    def setUp(self):
        self.session = ConfigSession(os.getpid())

    def tearDown(self):
        # Delete existing name servers
        self.session.delete(base_path)
        self.session.commit()

        del self.session

    def test_add_server(self):
        """ Check if server is added to resolv.conf """
        for s in test_servers:
            self.session.set(base_path + [s])
        self.session.commit()

        servers = get_name_servers()
        for s in servers:
            self.assertTrue(s in servers)

    def test_delete_server(self):
        """ Test if a deleted server disappears from resolv.conf """
        for s in test_servers:
            self.session.delete(base_path + [s])
        self.session.commit()

        servers = get_name_servers()
        for s in servers:
            self.assertTrue(test_server_1 not in servers)
class WWANInterfaceTest(unittest.TestCase):
    def setUp(self):
        self.session = ConfigSession(os.getpid())
        self._interfaces = ['wlm0', 'wlm1']

    def tearDown(self):
        self.session.delete(base_path)
        self.session.commit()
        del self.session

    def test_wlm_1(self):
        for interface in self._interfaces:
            self.session.set(base_path + [interface, 'no-peer-dns'])
            self.session.set(base_path + [interface, 'ondemand'])

            # check validate() - APN must be configure
            with self.assertRaises(ConfigSessionError):
                self.session.commit()
            self.session.set(base_path + [interface, 'apn', 'vyos.net'])

            # check validate() - device must be configure
            with self.assertRaises(ConfigSessionError):
                self.session.commit()
            self.session.set(base_path + [interface, 'device', 'ttyS0'])

            # commit changes
            self.session.commit()

        # verify configuration file(s)
        for interface in self._interfaces:
            tmp = get_config_value(interface, 'ifname')[1]
            self.assertTrue(interface in tmp)

            tmp = get_config_value(interface, 'demand')[0]
            self.assertTrue('demand' in tmp)

            tmp = os.path.isfile(f'/etc/ppp/peers/chat.{interface}')
            self.assertTrue(tmp)

            # Check if ppp process is running in the interface in question
            running = False
            for p in process_iter():
                if "pppd" in p.name():
                    if interface in p.cmdline():
                        running = True

            self.assertTrue(running)
class TestServiceBroadcastRelay(unittest.TestCase):
    _address1 = '192.0.2.1/24'
    _address2 = '192.0.2.1/24'

    def setUp(self):
        self.session = ConfigSession(os.getpid())
        self.session.set(
            ['interfaces', 'dummy', 'dum1001', 'address', self._address1])
        self.session.set(
            ['interfaces', 'dummy', 'dum1002', 'address', self._address2])
        self.session.commit()

    def tearDown(self):
        self.session.delete(['interfaces', 'dummy', 'dum1001'])
        self.session.delete(['interfaces', 'dummy', 'dum1002'])
        self.session.delete(base_path)
        self.session.commit()
        del self.session

    def test_service(self):
        """ Check if broadcast relay service can be configured and runs """
        ids = range(1, 5)
        for id in ids:
            base = base_path + ['id', str(id)]
            self.session.set(base + ['description', 'vyos'])
            self.session.set(base + ['port', str(10000 + id)])

            # check validate() - two interfaces must be present
            with self.assertRaises(ConfigSessionError):
                self.session.commit()

            self.session.set(base + ['interface', 'dum1001'])
            self.session.set(base + ['interface', 'dum1002'])
            self.session.set(base + ['address', self._address1.split('/')[0]])

        self.session.commit()

        for id in ids:
            # check if process is running
            running = False
            for p in process_iter():
                if "udp-broadcast-relay" in p.name():
                    if p.cmdline()[3] == str(id):
                        running = True
                        break
            self.assertTrue(running)
Пример #8
0
class TestSystemLogin(unittest.TestCase):
    def setUp(self):
        self.session = ConfigSession(os.getpid())

    def tearDown(self):
        # Delete individual users from configuration
        for user in users:
            self.session.delete(base_path + ['user', user])

        self.session.commit()
        del self.session

    def test_user(self):
        """ Check if user can be created and we can SSH to localhost """
        self.session.set(['service', 'ssh', 'port', '22'])

        for user in users:
            name = "VyOS Roxx " + user
            home_dir = "/tmp/" + user

            self.session.set(
                base_path +
                ['user', user, 'authentication', 'plaintext-password', user])
            self.session.set(base_path +
                             ['user', user, 'full-name', 'VyOS Roxx'])
            self.session.set(base_path +
                             ['user', user, 'home-directory', home_dir])

        self.session.commit()

        for user in users:
            cmd = ['su', '-', user]
            proc = Popen(cmd, stdin=PIPE, stdout=PIPE, stderr=PIPE)
            tmp = "{}\nuname -a".format(user)
            proc.stdin.write(tmp.encode())
            proc.stdin.flush()
            (stdout, stderr) = proc.communicate()

            # stdout is something like this:
            # b'Linux vyos 4.19.101-amd64-vyos #1 SMP Sun Feb 2 10:18:07 UTC 2020 x86_64 GNU/Linux\n'
            self.assertTrue(len(stdout) > 40)
class TestServiceMDNSrepeater(unittest.TestCase):
    def setUp(self):
        self.session = ConfigSession(os.getpid())

    def tearDown(self):
        self.session.delete(base_path)
        self.session.delete(intf_base + ['dum10'])
        self.session.delete(intf_base + ['dum20'])
        self.session.commit()
        del self.session

    def test_service(self):
        # Service required a configured IP address on the interface

        self.session.set(intf_base + ['dum10', 'address', '192.0.2.1/30'])
        self.session.set(intf_base + ['dum20', 'address', '192.0.2.5/30'])

        self.session.set(base_path + ['interface', 'dum10'])
        self.session.set(base_path + ['interface', 'dum20'])
        self.session.commit()

        # Check for running process
        self.assertTrue("mdns-repeater" in (p.name() for p in process_iter()))
class WireGuardInterfaceTest(unittest.TestCase):
    def setUp(self):
        self.session = ConfigSession(os.getpid())
        self._test_addr = ['192.0.2.1/26', '192.0.2.255/31', '192.0.2.64/32',
                          '2001:db8:1::ffff/64', '2001:db8:101::1/112']
        self._interfaces = ['wg0', 'wg1']

    def tearDown(self):
        self.session.delete(base_path)
        self.session.commit()
        del self.session

    def test_peer_setup(self):
        """
        Create WireGuard interfaces with associated peers
        """
        for intf in self._interfaces:
            peer = 'foo-' + intf
            psk = 'u2xdA70hkz0S1CG0dZlOh0aq2orwFXRIVrKo4DCvHgM='
            pubkey = 'n6ZZL7ph/QJUJSUUTyu19c77my1dRCDHkMzFQUO9Z3A='

            for addr in self._test_addr:
                self.session.set(base_path + [intf, 'address', addr])

            self.session.set(base_path + [intf, 'peer', peer, 'address', '127.0.0.1'])
            self.session.set(base_path + [intf, 'peer', peer, 'port', '1337'])

            # Allow different prefixes to traverse the tunnel
            allowed_ips = ['10.0.0.0/8', '172.16.0.0/12', '192.168.0.0/16']
            for ip in allowed_ips:
                self.session.set(base_path + [intf, 'peer', peer, 'allowed-ips', ip])

            self.session.set(base_path + [intf, 'peer', peer, 'preshared-key', psk])
            self.session.set(base_path + [intf, 'peer', peer, 'pubkey', pubkey])
            self.session.commit()

            self.assertTrue(os.path.isdir(f'/sys/class/net/{intf}'))
Пример #11
0
class TestNAT(unittest.TestCase):
    def setUp(self):
        # ensure we can also run this test on a live system - so lets clean
        # out the current configuration :)
        self.session = ConfigSession(os.getpid())
        self.session.delete(base_path)

    def tearDown(self):
        self.session.delete(base_path)
        self.session.commit()

    def test_source_nat(self):
        """ Configure and validate source NAT rule(s) """

        path = base_path + ['source']
        network = '192.168.0.0/16'
        self.session.set(path +
                         ['rule', '1', 'destination', 'address', network])
        self.session.set(path + ['rule', '1', 'exclude'])

        # check validate() - outbound-interface must be defined
        with self.assertRaises(ConfigSessionError):
            self.session.commit()

        self.session.set(path + ['rule', '1', 'outbound-interface', 'any'])
        self.session.commit()

        tmp = cmd('sudo nft -j list table nat')
        nftable_json = json.loads(tmp)
        condensed_json = jmespath.search(snat_pattern, nftable_json)[0]

        self.assertEqual(condensed_json['comment'], 'DST-NAT-1')
        self.assertEqual(condensed_json['address']['network'],
                         network.split('/')[0])
        self.assertEqual(str(condensed_json['address']['prefix']),
                         network.split('/')[1])
Пример #12
0
class TestSNMPService(unittest.TestCase):
    def setUp(self):
        self.session = ConfigSession(os.getpid())
        # ensure we can also run this test on a live system - so lets clean
        # out the current configuration :)
        self.session.delete(base_path)

    def tearDown(self):
        del self.session

    def test_snmp(self):
        """ Check if SNMP can be configured and service runs """
        clients = ['192.0.2.1', '2001:db8::1']
        networks = ['192.0.2.128/25', '2001:db8:babe::/48']
        listen = ['127.0.0.1', '::1']

        for auth in ['ro', 'rw']:
            community = 'VyOS' + auth
            self.session.set(base_path + ['community', community, 'authorization', auth])
            for client in clients:
                self.session.set(base_path + ['community', community, 'client', client])
            for network in networks:
                self.session.set(base_path + ['community', community, 'network', network])

        for addr in listen:
            self.session.set(base_path + ['listen-address', addr])

        self.session.set(base_path + ['contact', '*****@*****.**'])
        self.session.set(base_path + ['location', 'qemu'])

        self.session.commit()

        # verify listen address, it will be returned as
        # ['unix:/run/snmpd.socket,udp:127.0.0.1:161,udp6:[::1]:161']
        # thus we need to transfor this into a proper list
        config = get_config_value('agentaddress')
        expected = 'unix:/run/snmpd.socket'
        for addr in listen:
            if is_ipv4(addr):
                expected += ',udp:{}:161'.format(addr)
            else:
                expected += ',udp6:[{}]:161'.format(addr)

        self.assertTrue(expected in config)

        # Check for running process
        self.assertTrue("snmpd" in (p.name() for p in process_iter()))


    def test_snmpv3(self):
        """ Check if SNMPv3 can be configured and service runs"""

        self.session.set(base_path + ['v3', 'engineid', '0xaffedeadbeef'])
        self.session.set(base_path + ['v3', 'group', 'default', 'mode', 'ro'])
        # check validate() - a view must be created before this can be comitted
        with self.assertRaises(ConfigSessionError):
            self.session.commit()

        self.session.set(base_path + ['v3', 'view', 'default', 'oid', '1'])
        self.session.set(base_path + ['v3', 'group', 'default', 'view', 'default'])
        self.session.commit()

        # create user
        for authpriv in ['auth', 'privacy']:
            self.session.set(base_path + ['v3', 'user', 'vyos', authpriv, 'plaintext-key', 'vyos1234'])

        self.session.set(base_path + ['v3', 'user', 'vyos', 'group', 'default'])

        # TODO: read in config file and check values

        # Check for running process
        self.assertTrue("snmpd" in (p.name() for p in process_iter()))
Пример #13
0
class TestServiceSSH(unittest.TestCase):
    def setUp(self):
        self.session = ConfigSession(os.getpid())
        # ensure we can also run this test on a live system - so lets clean
        # out the current configuration :)
        self.session.delete(base_path)

    def tearDown(self):
        # delete testing SSH config
        self.session.delete(base_path)
        # restore "plain" SSH access
        self.session.set(base_path)

        self.session.commit()
        del self.session

    def test_ssh_single(self):
        """ Check if SSH service can be configured and runs """
        self.session.set(base_path + ['port', '1234'])
        self.session.set(base_path + ['disable-host-validation'])
        self.session.set(base_path + ['disable-password-authentication'])
        self.session.set(base_path + ['loglevel', 'verbose'])
        self.session.set(base_path + ['client-keepalive-interval', '100'])
        self.session.set(base_path + ['listen-address', '127.0.0.1'])

        # commit changes
        self.session.commit()

        # Check configured port
        port = get_config_value('Port')[0]
        self.assertTrue("1234" in port)

        # Check DNS usage
        dns = get_config_value('UseDNS')[0]
        self.assertTrue("no" in dns)

        # Check PasswordAuthentication
        pwd = get_config_value('PasswordAuthentication')[0]
        self.assertTrue("no" in pwd)

        # Check loglevel
        loglevel = get_config_value('LogLevel')[0]
        self.assertTrue("VERBOSE" in loglevel)

        # Check listen address
        address = get_config_value('ListenAddress')[0]
        self.assertTrue("127.0.0.1" in address)

        # Check keepalive
        keepalive = get_config_value('ClientAliveInterval')[0]
        self.assertTrue("100" in keepalive)

        # Check for running process
        self.assertTrue("sshd" in (p.name() for p in process_iter()))

    def test_ssh_multi(self):
        """ Check if SSH service can be configured and runs with multiple
            listen ports and listen-addresses """
        ports = ['22', '2222']
        for port in ports:
            self.session.set(base_path + ['port', port])

        addresses = ['127.0.0.1', '::1']
        for address in addresses:
            self.session.set(base_path + ['listen-address', address])

        # commit changes
        self.session.commit()

        # Check configured port
        tmp = get_config_value('Port')
        for port in ports:
            self.assertIn(port, tmp)

        # Check listen address
        tmp = get_config_value('ListenAddress')
        for address in addresses:
            self.assertIn(address, tmp)

        # Check for running process
        self.assertTrue("sshd" in (p.name() for p in process_iter()))
Пример #14
0
class PPPoEInterfaceTest(unittest.TestCase):
    def setUp(self):
        self.session = ConfigSession(os.getpid())
        self._interfaces = ['pppoe0', 'pppoe50']
        self._source_interface = 'eth0'

    def tearDown(self):
        self.session.delete(base_path)
        self.session.commit()
        del self.session

    def test_pppoe_1(self):
        """ Check if PPPoE dialer can be configured and runs """
        for interface in self._interfaces:
            user = '******' + interface
            passwd = 'VyOS-passwd-' + interface
            mtu = '1400'

            self.session.set(base_path + [interface, 'authentication', 'user', user])
            self.session.set(base_path + [interface, 'authentication', 'password', passwd])
            self.session.set(base_path + [interface, 'default-route', 'auto'])
            self.session.set(base_path + [interface, 'mtu', mtu])
            self.session.set(base_path + [interface, 'no-peer-dns'])

            # check validate() - a source-interface is required
            with self.assertRaises(ConfigSessionError):
                self.session.commit()
            self.session.set(base_path + [interface, 'source-interface', self._source_interface])

            # commit changes
            self.session.commit()

        # verify configuration file(s)
        for interface in self._interfaces:
            user = '******' + interface
            password = '******' + interface

            tmp = get_config_value(interface, 'mtu')[1]
            self.assertTrue(tmp in mtu)
            tmp = get_config_value(interface, 'user')[1].replace('"', '')
            self.assertTrue(tmp in user)
            tmp = get_config_value(interface, 'password')[1].replace('"', '')
            self.assertTrue(tmp in password)
            tmp = get_config_value(interface, 'ifname')[1]
            self.assertTrue(tmp in interface)

            # Check if ppp process is running in the interface in question
            running = False
            for p in process_iter():
                if "pppd" in p.name():
                    if interface in p.cmdline():
                        running = True

            self.assertTrue(running)

    def test_pppoe_dhcpv6pd(self):
        """ Check if PPPoE dialer can be configured and runs """
        address = '1'
        sla_id = '0'
        sla_len = '8'
        for interface in self._interfaces:
            self.session.set(base_path + [interface, 'authentication', 'user', 'vyos'])
            self.session.set(base_path + [interface, 'authentication', 'password', 'vyos'])
            self.session.set(base_path + [interface, 'default-route', 'none'])
            self.session.set(base_path + [interface, 'no-peer-dns'])
            self.session.set(base_path + [interface, 'source-interface', self._source_interface])
            self.session.set(base_path + [interface, 'ipv6', 'enable'])

            # prefix delegation stuff
            dhcpv6_pd_base = base_path + [interface, 'dhcpv6-options', 'prefix-delegation']
            self.session.set(dhcpv6_pd_base + ['length', '56'])
            self.session.set(dhcpv6_pd_base + ['interface', self._source_interface, 'address', address])
            self.session.set(dhcpv6_pd_base + ['interface', self._source_interface, 'sla-id',  sla_id])
            self.session.set(dhcpv6_pd_base + ['interface', self._source_interface, 'sla-len', sla_len])

            # commit changes
            self.session.commit()

            # verify "normal" PPPoE value - 1492 is default MTU
            tmp = get_config_value(interface, 'mtu')[1]
            self.assertTrue(tmp in '1492')
            tmp = get_config_value(interface, 'user')[1].replace('"', '')
            self.assertTrue(tmp in 'vyos')
            tmp = get_config_value(interface, 'password')[1].replace('"', '')
            self.assertTrue(tmp in 'vyos')

            for param in ['+ipv6', 'ipv6cp-use-ipaddr']:
                tmp = get_config_value(interface, param)[0]
                self.assertTrue(tmp in param)

            # verify DHCPv6 prefix delegation
            # will return: ['delegation', '::/56 infinity;']
            tmp = get_dhcp6c_config_value(interface, 'prefix')[1].split()[0] # mind the whitespace
            self.assertTrue(tmp in '::/56')
            tmp = get_dhcp6c_config_value(interface, 'prefix-interface')[0].split()[0]
            self.assertTrue(tmp in self._source_interface)
            tmp = get_dhcp6c_config_value(interface, 'ifid')[0]
            self.assertTrue(tmp in address)
            tmp = get_dhcp6c_config_value(interface, 'sla-id')[0]
            self.assertTrue(tmp in sla_id)
            tmp = get_dhcp6c_config_value(interface, 'sla-len')[0]
            self.assertTrue(tmp in sla_len)

            # Check if ppp process is running in the interface in question
            running = False
            for p in process_iter():
                if "pppd" in p.name():
                    running = True
            self.assertTrue(running)
Пример #15
0
    class BaseTest(unittest.TestCase):
        _test_ip = False
        _test_mtu = False
        _test_vlan = False
        _test_qinq = False
        _test_ipv6 = False
        _base_path = []

        _options = {}
        _interfaces = []
        _qinq_range = ['10', '20', '30']
        _vlan_range = ['100', '200', '300', '2000']
        # choose IPv6 minimum MTU value for tests - this must always work
        _mtu = '1280'

        def setUp(self):
            self.session = ConfigSession(os.getpid())

            self._test_addr = [
                '192.0.2.1/26', '192.0.2.255/31', '192.0.2.64/32',
                '2001:db8:1::ffff/64', '2001:db8:101::1/112'
            ]
            self._test_mtu = False
            self._options = {}

        def tearDown(self):
            # we should not remove ethernet from the overall CLI
            if 'ethernet' in self._base_path:
                for interface in self._interfaces:
                    # when using a dedicated interface to test via TEST_ETH environment
                    # variable only this one will be cleared in the end - usable to test
                    # ethernet interfaces via SSH
                    self.session.delete(self._base_path + [interface])
                    self.session.set(self._base_path +
                                     [interface, 'duplex', 'auto'])
                    self.session.set(self._base_path +
                                     [interface, 'speed', 'auto'])
                    self.session.set(self._base_path +
                                     [interface, 'smp-affinity', 'auto'])
            else:
                self.session.delete(self._base_path)

            self.session.commit()
            del self.session

        def test_add_description(self):
            """
            Check if description can be added to interface
            """
            for intf in self._interfaces:
                test_string = 'Description-Test-{}'.format(intf)
                self.session.set(self._base_path +
                                 [intf, 'description', test_string])
                for option in self._options.get(intf, []):
                    self.session.set(self._base_path + [intf] + option.split())

            self.session.commit()

            # Validate interface description
            for intf in self._interfaces:
                test_string = 'Description-Test-{}'.format(intf)
                with open('/sys/class/net/{}/ifalias'.format(intf), 'r') as f:
                    tmp = f.read().rstrip()
                    self.assertTrue(tmp, test_string)

        def test_add_address_single(self):
            """
            Check if a single address can be added to interface.
            """
            addr = '192.0.2.0/31'
            for intf in self._interfaces:
                self.session.set(self._base_path + [intf, 'address', addr])
                for option in self._options.get(intf, []):
                    self.session.set(self._base_path + [intf] + option.split())

            self.session.commit()

            for intf in self._interfaces:
                self.assertTrue(is_intf_addr_assigned(intf, addr))

        def test_add_address_multi(self):
            """
            Check if IPv4/IPv6 addresses can be added to interface.
            """

            # Add address
            for intf in self._interfaces:
                for addr in self._test_addr:
                    self.session.set(self._base_path + [intf, 'address', addr])
                    for option in self._options.get(intf, []):
                        self.session.set(self._base_path + [intf] +
                                         option.split())

            self.session.commit()

            # Validate address
            for intf in self._interfaces:
                for af in AF_INET, AF_INET6:
                    for addr in ifaddresses(intf)[af]:
                        # checking link local addresses makes no sense
                        if is_ipv6_link_local(addr['addr']):
                            continue

                        self.assertTrue(
                            is_intf_addr_assigned(intf, addr['addr']))

        def test_ipv6_link_local(self):
            """ Common function for IPv6 link-local address assignemnts """
            if not self._test_ipv6:
                return None

            for interface in self._interfaces:
                base = self._base_path + [interface]
                for option in self._options.get(interface, []):
                    self.session.set(base + option.split())

            # after commit we must have an IPv6 link-local address
            self.session.commit()

            for interface in self._interfaces:
                for addr in ifaddresses(interface)[AF_INET6]:
                    self.assertTrue(is_ipv6_link_local(addr['addr']))

            # disable IPv6 link-local address assignment
            for interface in self._interfaces:
                base = self._base_path + [interface]
                self.session.set(base +
                                 ['ipv6', 'address', 'no-default-link-local'])

            # after commit we must have no IPv6 link-local address
            self.session.commit()

            for interface in self._interfaces:
                self.assertTrue(AF_INET6 not in ifaddresses(interface))

        def _mtu_test(self, intf):
            """ helper function to verify MTU size """
            with open('/sys/class/net/{}/mtu'.format(intf), 'r') as f:
                tmp = f.read().rstrip()
                self.assertEqual(tmp, self._mtu)

        def test_change_mtu(self):
            """ Testcase if MTU can be changed on interface """
            if not self._test_mtu:
                return None
            for intf in self._interfaces:
                base = self._base_path + [intf]
                self.session.set(base + ['mtu', self._mtu])
                for option in self._options.get(intf, []):
                    self.session.set(base + option.split())

            self.session.commit()
            for intf in self._interfaces:
                self._mtu_test(intf)

        def test_8021q_vlan(self):
            """ Testcase for 802.1q VLAN interfaces """
            if not self._test_vlan:
                return None

            for interface in self._interfaces:
                base = self._base_path + [interface]
                for option in self._options.get(interface, []):
                    self.session.set(base + option.split())

                for vlan in self._vlan_range:
                    base = self._base_path + [interface, 'vif', vlan]
                    self.session.set(base + ['mtu', self._mtu])
                    for address in self._test_addr:
                        self.session.set(base + ['address', address])

            self.session.commit()
            for intf in self._interfaces:
                for vlan in self._vlan_range:
                    vif = f'{intf}.{vlan}'
                    for address in self._test_addr:
                        self.assertTrue(is_intf_addr_assigned(vif, address))
                    self._mtu_test(vif)

        def test_8021ad_qinq_vlan(self):
            """ Testcase for 802.1ad Q-in-Q VLAN interfaces """
            if not self._test_qinq:
                return None

            for interface in self._interfaces:
                base = self._base_path + [interface]
                for option in self._options.get(interface, []):
                    self.session.set(base + option.split())

                for vif_s in self._qinq_range:
                    for vif_c in self._vlan_range:
                        base = self._base_path + [
                            interface, 'vif-s', vif_s, 'vif-c', vif_c
                        ]
                        self.session.set(base + ['mtu', self._mtu])
                        for address in self._test_addr:
                            self.session.set(base + ['address', address])

            self.session.commit()
            for interface in self._interfaces:
                for vif_s in self._qinq_range:
                    for vif_c in self._vlan_range:
                        vif = f'{interface}.{vif_s}.{vif_c}'
                        for address in self._test_addr:
                            self.assertTrue(is_intf_addr_assigned(
                                vif, address))
                        self._mtu_test(vif)

        def test_ip_options(self):
            """ test IP options like arp """
            if not self._test_ip:
                return None

            for interface in self._interfaces:
                arp_tmo = '300'
                path = self._base_path + [interface]
                for option in self._options.get(interface, []):
                    self.session.set(path + option.split())

                # Options
                self.session.set(path + ['ip', 'arp-cache-timeout', arp_tmo])
                self.session.set(path + ['ip', 'disable-arp-filter'])
                self.session.set(path + ['ip', 'enable-arp-accept'])
                self.session.set(path + ['ip', 'enable-arp-announce'])
                self.session.set(path + ['ip', 'enable-arp-ignore'])
                self.session.set(path + ['ip', 'enable-proxy-arp'])
                self.session.set(path + ['ip', 'proxy-arp-pvlan'])
                self.session.set(path + ['ip', 'source-validation', 'loose'])

            self.session.commit()

            for interface in self._interfaces:
                tmp = read_file(
                    f'/proc/sys/net/ipv4/neigh/{interface}/base_reachable_time_ms'
                )
                self.assertEqual(tmp, str(
                    (int(arp_tmo) * 1000)))  # tmo value is in milli seconds

                tmp = read_file(
                    f'/proc/sys/net/ipv4/conf/{interface}/arp_filter')
                self.assertEqual('0', tmp)

                tmp = read_file(
                    f'/proc/sys/net/ipv4/conf/{interface}/arp_accept')
                self.assertEqual('1', tmp)

                tmp = read_file(
                    f'/proc/sys/net/ipv4/conf/{interface}/arp_announce')
                self.assertEqual('1', tmp)

                tmp = read_file(
                    f'/proc/sys/net/ipv4/conf/{interface}/arp_ignore')
                self.assertEqual('1', tmp)

                tmp = read_file(
                    f'/proc/sys/net/ipv4/conf/{interface}/proxy_arp')
                self.assertEqual('1', tmp)

                tmp = read_file(
                    f'/proc/sys/net/ipv4/conf/{interface}/proxy_arp_pvlan')
                self.assertEqual('1', tmp)

                tmp = read_file(
                    f'/proc/sys/net/ipv4/conf/{interface}/rp_filter')
                self.assertEqual('2', tmp)
Пример #16
0
class PPPoEInterfaceTest(unittest.TestCase):
    def setUp(self):
        self.session = ConfigSession(os.getpid())
        self._interfaces = ['pppoe0', 'pppoe50']
        self._source_interface = 'eth0'

    def tearDown(self):
        self.session.delete(base_path)
        self.session.commit()
        del self.session

    def test_pppoe(self):
        """ Check if PPPoE dialer can be configured and runs """
        for interface in self._interfaces:
            user = '******' + interface
            passwd = 'VyOS-passwd-' + interface
            mtu = '1400'

            self.session.set(base_path +
                             [interface, 'authentication', 'user', user])
            self.session.set(base_path +
                             [interface, 'authentication', 'password', passwd])
            self.session.set(base_path + [interface, 'default-route', 'auto'])
            self.session.set(base_path + [interface, 'mtu', mtu])
            self.session.set(base_path + [interface, 'no-peer-dns'])

            # check validate() - a source-interface is required
            with self.assertRaises(ConfigSessionError):
                self.session.commit()
            self.session.set(
                base_path +
                [interface, 'source-interface', self._source_interface])

            # commit changes
            self.session.commit()

        # verify configuration file(s)
        for interface in self._interfaces:
            user = '******' + interface
            password = '******' + interface

            tmp = get_config_value(interface, 'mtu')[1]
            self.assertEqual(tmp, mtu)
            tmp = get_config_value(interface, 'user')[1].replace('"', '')
            self.assertEqual(tmp, user)
            tmp = get_config_value(interface, 'password')[1].replace('"', '')
            self.assertEqual(tmp, password)
            tmp = get_config_value(interface, 'ifname')[1]
            self.assertEqual(tmp, interface)

            # Check if ppp process is running in the interface in question
            running = False
            for p in process_iter():
                if "pppd" in p.name():
                    if interface in p.cmdline():
                        running = True

            self.assertTrue(running)

    def test_pppoe_dhcpv6pd(self):
        """ Check if PPPoE dialer can be configured with DHCPv6-PD """
        address = '1'
        sla_id = '0'
        sla_len = '8'
        for interface in self._interfaces:
            self.session.set(base_path +
                             [interface, 'authentication', 'user', 'vyos'])
            self.session.set(base_path +
                             [interface, 'authentication', 'password', 'vyos'])
            self.session.set(base_path + [interface, 'default-route', 'none'])
            self.session.set(base_path + [interface, 'no-peer-dns'])
            self.session.set(
                base_path +
                [interface, 'source-interface', self._source_interface])
            self.session.set(base_path + [interface, 'ipv6', 'enable'])

            # prefix delegation stuff
            dhcpv6_pd_base = base_path + [
                interface, 'dhcpv6-options', 'pd', '0'
            ]
            self.session.set(dhcpv6_pd_base + ['length', '56'])
            self.session.set(
                dhcpv6_pd_base +
                ['interface', self._source_interface, 'address', address])
            self.session.set(
                dhcpv6_pd_base +
                ['interface', self._source_interface, 'sla-id', sla_id])

            # commit changes
            self.session.commit()

            # verify "normal" PPPoE value - 1492 is default MTU
            tmp = get_config_value(interface, 'mtu')[1]
            self.assertEqual(tmp, '1492')
            tmp = get_config_value(interface, 'user')[1].replace('"', '')
            self.assertEqual(tmp, 'vyos')
            tmp = get_config_value(interface, 'password')[1].replace('"', '')
            self.assertEqual(tmp, 'vyos')

            for param in ['+ipv6', 'ipv6cp-use-ipaddr']:
                tmp = get_config_value(interface, param)[0]
                self.assertEqual(tmp, param)

            # verify DHCPv6 prefix delegation
            # will return: ['delegation', '::/56 infinity;']
            tmp = get_dhcp6c_config_value(
                interface, 'prefix')[1].split()[0]  # mind the whitespace
            self.assertEqual(tmp, '::/56')
            tmp = get_dhcp6c_config_value(interface,
                                          'prefix-interface')[0].split()[0]
            self.assertEqual(tmp, self._source_interface)
            tmp = get_dhcp6c_config_value(interface, 'ifid')[0]
            self.assertEqual(tmp, address)
            tmp = get_dhcp6c_config_value(interface, 'sla-id')[0]
            self.assertEqual(tmp, sla_id)
            tmp = get_dhcp6c_config_value(interface, 'sla-len')[0]
            self.assertEqual(tmp, sla_len)

            # Check if ppp process is running in the interface in question
            running = False
            for p in process_iter():
                if "pppd" in p.name():
                    running = True
            self.assertTrue(running)

            # We can not check if wide-dhcpv6 process is running as it is started
            # after the PPP interface gets a link to the ISP - but we can see if
            # it would be started by the scripts
            tmp = read_file(f'/etc/ppp/ipv6-up.d/1000-vyos-pppoe-{interface}')
            tmp = re.findall(f'systemctl start dhcp6c@{interface}.service',
                             tmp)
            self.assertTrue(tmp)
class TestServicePPPoEServer(unittest.TestCase):
    def setUp(self):
        self.session = ConfigSession(os.getpid())
        # ensure we can also run this test on a live system - so lets clean
        # out the current configuration :)
        self.session.delete(base_path)

    def tearDown(self):
        self.session.delete(base_path)
        self.session.delete(local_if)
        self.session.commit()
        del self.session

    def verify(self, conf):
        # validate some common values in the configuration
        for tmp in [
                'log_syslog', 'pppoe', 'chap-secrets', 'ippool', 'ipv6pool',
                'ipv6_nd', 'ipv6_dhcp', 'auth_mschap_v2', 'auth_mschap_v1',
                'auth_chap_md5', 'auth_pap', 'shaper'
        ]:
            # Settings without values provide None
            self.assertEqual(conf['modules'][tmp], None)

        # check Access Concentrator setting
        self.assertTrue(conf['pppoe']['ac-name'] == ac_name)
        self.assertTrue(conf['pppoe'].getboolean('verbose'))
        self.assertTrue(conf['pppoe']['interface'], interface)

        # check configured subnet
        self.assertEqual(conf['ip-pool'][subnet], None)
        self.assertEqual(conf['ip-pool']['gw-ip-address'], gateway)

        # check ppp
        self.assertTrue(conf['ppp'].getboolean('verbose'))
        self.assertTrue(conf['ppp'].getboolean('check-ip'))
        self.assertEqual(conf['ppp']['min-mtu'], mtu)
        self.assertEqual(conf['ppp']['mtu'], mtu)
        self.assertEqual(conf['ppp']['lcp-echo-interval'], '30')
        self.assertEqual(conf['ppp']['lcp-echo-timeout'], '0')
        self.assertEqual(conf['ppp']['lcp-echo-failure'], '3')

    def basic_config(self):
        self.session.set(local_if + ['address', '192.0.2.1/32'])

        self.session.set(base_path + ['access-concentrator', ac_name])
        self.session.set(base_path + ['authentication', 'mode', 'local'])
        self.session.set(base_path + ['client-ip-pool', 'subnet', subnet])
        self.session.set(base_path + ['name-server', nameserver])
        self.session.set(base_path + ['interface', interface])
        self.session.set(base_path + ['local-ip', gateway])

    def test_local_auth(self):
        """ Test configuration of local authentication for PPPoE server """
        self.basic_config()
        # authentication
        self.session.set(base_path + [
            'authentication', 'local-users', 'username', 'vyos', 'password',
            'vyos'
        ])
        self.session.set(base_path + ['authentication', 'mode', 'local'])
        # other settings
        self.session.set(base_path + ['ppp-options', 'ccp'])
        self.session.set(base_path + ['ppp-options', 'mppe', 'require'])
        self.session.set(base_path + ['limits', 'connection-limit', '20/min'])

        # commit changes
        self.session.commit()

        # Validate configuration values
        conf = ConfigParser(allow_no_value=True)
        conf.read(pppoe_conf)

        # basic verification
        self.verify(conf)

        # check auth
        self.assertEqual(conf['chap-secrets']['chap-secrets'],
                         '/run/accel-pppd/pppoe.chap-secrets')
        self.assertEqual(conf['chap-secrets']['gw-ip-address'], gateway)

        # check pado
        self.assertEqual(conf['ppp']['mppe'], 'require')
        self.assertTrue(conf['ppp'].getboolean('ccp'))

        # check other settings
        self.assertEqual(conf['connlimit']['limit'], '20/min')

        # Check for running process
        self.assertTrue('accel-pppd' in (p.name() for p in process_iter()))

    def test_radius_auth(self):
        """ Test configuration of RADIUS authentication for PPPoE server """
        radius_server = '192.0.2.22'
        radius_key = 'secretVyOS'
        radius_port = '2000'
        radius_port_acc = '3000'

        self.basic_config()
        self.session.set(base_path + [
            'authentication', 'radius', 'server', radius_server, 'key',
            radius_key
        ])
        self.session.set(base_path + [
            'authentication', 'radius', 'server', radius_server, 'port',
            radius_port
        ])
        self.session.set(base_path + [
            'authentication', 'radius', 'server', radius_server, 'acct-port',
            radius_port_acc
        ])
        self.session.set(base_path + ['authentication', 'mode', 'radius'])

        # commit changes
        self.session.commit()

        # Validate configuration values
        conf = ConfigParser(allow_no_value=True)
        conf.read(pppoe_conf)

        # basic verification
        self.verify(conf)

        # check auth
        self.assertTrue(conf['radius'].getboolean('verbose'))
        self.assertTrue(conf['radius']['acct-timeout'], '3')
        self.assertTrue(conf['radius']['timeout'], '3')
        self.assertTrue(conf['radius']['max-try'], '3')
        self.assertTrue(conf['radius']['gw-ip-address'], gateway)

        server = conf['radius']['server'].split(',')
        self.assertEqual(radius_server, server[0])
        self.assertEqual(radius_key, server[1])
        self.assertEqual(f'auth-port={radius_port}', server[2])
        self.assertEqual(f'acct-port={radius_port_acc}', server[3])
        self.assertEqual(f'req-limit=0', server[4])
        self.assertEqual(f'fail-time=0', server[5])

        # check defaults
        self.assertEqual(conf['ppp']['mppe'], 'prefer')
        self.assertFalse(conf['ppp'].getboolean('ccp'))

        # Check for running process
        self.assertTrue('accel-pppd' in (p.name() for p in process_iter()))
Пример #18
0
class TestServiceDDNS(unittest.TestCase):
    def setUp(self):
        self.session = ConfigSession(os.getpid())

    def tearDown(self):
        # Delete DDNS configuration
        self.session.delete(base_path)
        self.session.commit()

        del self.session

    def test_service(self):
        """ Check individual DDNS service providers """
        ddns = ['interface', 'eth0', 'service']
        services = ['cloudflare', 'afraid', 'dyndns', 'zoneedit']

        for service in services:
            user = '******'
            password = '******'
            zone = 'vyos.io'
            self.session.delete(base_path)
            self.session.set(base_path + ddns + [service, 'host-name', 'test.ddns.vyos.io'])
            self.session.set(base_path + ddns + [service, 'login', user])
            self.session.set(base_path + ddns + [service, 'password', password])
            self.session.set(base_path + ddns + [service, 'zone', zone])

            # commit changes
            if service == 'cloudflare':
                self.session.commit()
            else:
                # zone option only works on cloudflare, an exception is raised
                # for all others
                with self.assertRaises(ConfigSessionError):
                    self.session.commit()
                self.session.delete(base_path + ddns + [service, 'zone', 'vyos.io'])
                # commit changes again - now it should work
                self.session.commit()

            # we can only read the configuration file when we operate as 'root'
            if getuser() == 'root':
                protocol = get_config_value('protocol')
                login = get_config_value('login')
                pwd = get_config_value('password')

                # some services need special treatment
                protoname = service
                if service == 'cloudflare':
                    tmp = get_config_value('zone')
                    self.assertTrue(tmp == zone)
                elif service == 'afraid':
                    protoname = 'freedns'
                elif service == 'dyndns':
                    protoname = 'dyndns2'
                elif service == 'zoneedit':
                    protoname = 'zoneedit1'

                self.assertTrue(protocol == protoname)
                self.assertTrue(login == user)
                self.assertTrue(pwd == "'" + password + "'")

            # Check for running process
            self.assertTrue(check_process())


    def test_rfc2136(self):
        """ Check if DDNS service can be configured and runs """
        ddns = ['interface', 'eth0', 'rfc2136', 'vyos']
        ddns_key_file = '/config/auth/my.key'

        self.session.set(base_path + ddns + ['key', ddns_key_file])
        self.session.set(base_path + ddns + ['record', 'test.ddns.vyos.io'])
        self.session.set(base_path + ddns + ['server', 'ns1.vyos.io'])
        self.session.set(base_path + ddns + ['ttl', '300'])
        self.session.set(base_path + ddns + ['zone', 'vyos.io'])

        # ensure an exception will be raised as no key is present
        if os.path.exists(ddns_key_file):
            os.unlink(ddns_key_file)

        # check validate() - the key file does not exist yet
        with self.assertRaises(ConfigSessionError):
            self.session.commit()

        with open(ddns_key_file, 'w') as f:
            f.write('S3cretKey')

        # commit changes
        self.session.commit()

        # TODO: inspect generated configuration file

        # Check for running process
        self.assertTrue(check_process())
Пример #19
0
    class BaseTest(unittest.TestCase):
        _test_mtu = False
        _base_path = []
        _options = {}
        _interfaces = []

        def setUp(self):
            self.session = ConfigSession(os.getpid())

            self._test_addr = [
                '192.0.2.1/26', '192.0.2.255/31', '192.0.2.64/32',
                '2001:db8:1::ffff/64', '2001:db8:101::1/112'
            ]
            self._test_mtu = False
            self._options = {}

        def tearDown(self):
            # we should not remove ethernet from the overall CLI
            if 'ethernet' in self._base_path:
                self.session.delete(self._base_path)
                for intf in self._interfaces:
                    self.session.set(self._base_path + [intf])
            else:
                self.session.delete(self._base_path)

            self.session.commit()
            del self.session

        def test_add_description(self):
            """
            Check if description can be added to interface
            """
            for intf in self._interfaces:
                test_string = 'Description-Test-{}'.format(intf)
                self.session.set(self._base_path +
                                 [intf, 'description', test_string])
                for option in self._options.get(intf, []):
                    self.session.set(self._base_path + [intf] + option.split())

            self.session.commit()

            # Validate interface description
            for intf in self._interfaces:
                test_string = 'Description-Test-{}'.format(intf)
                with open('/sys/class/net/{}/ifalias'.format(intf), 'r') as f:
                    tmp = f.read().rstrip()
                    self.assertTrue(tmp, test_string)

        def test_add_address_single(self):
            """
            Check if a single address can be added to interface.
            """
            addr = '192.0.2.0/31'
            for intf in self._interfaces:
                self.session.set(self._base_path + [intf, 'address', addr])
                for option in self._options.get(intf, []):
                    self.session.set(self._base_path + [intf] + option.split())

            self.session.commit()

            for intf in self._interfaces:
                self.assertTrue(is_intf_addr_assigned(intf, addr))

        def test_add_address_multi(self):
            """
            Check if IPv4/IPv6 addresses can be added to interface.
            """

            # Add address
            for intf in self._interfaces:
                for addr in self._test_addr:
                    self.session.set(self._base_path + [intf, 'address', addr])
                    for option in self._options.get(intf, []):
                        self.session.set(self._base_path + [intf] +
                                         option.split())

            self.session.commit()

            # Validate address
            for intf in self._interfaces:
                for af in AF_INET, AF_INET6:
                    for addr in ifaddresses(intf)[af]:
                        # checking link local addresses makes no sense
                        if is_ipv6_link_local(addr['addr']):
                            continue

                        self.assertTrue(
                            is_intf_addr_assigned(intf, addr['addr']))

        def test_change_mtu(self):
            """
            Check if MTU can be changed on interface.
            Test MTU size will be 1400 bytes.
            """
            if self._test_mtu is False:
                return None

            # choose a MTU which works on every interface
            mtu = '1400'
            for intf in self._interfaces:
                self.session.set(self._base_path + [intf, 'mtu', mtu])
                for option in self._options.get(intf, []):
                    self.session.set(self._base_path + [intf] + option.split())

            self.session.commit()

            # Validate interface description
            for intf in self._interfaces:
                with open('/sys/class/net/{}/mtu'.format(intf), 'r') as f:
                    tmp = f.read().rstrip()
                    self.assertTrue(tmp == mtu)
class TestSNMPService(unittest.TestCase):
    def setUp(self):
        self.session = ConfigSession(os.getpid())
        # ensure we can also run this test on a live system - so lets clean
        # out the current configuration :)
        self.session.delete(base_path)

    def tearDown(self):
        del self.session

    def test_snmp(self):
        """ Check if SNMP can be configured and service runs """
        clients = ['192.0.2.1', '2001:db8::1']
        networks = ['192.0.2.128/25', '2001:db8:babe::/48']
        listen = ['127.0.0.1', '::1']

        for auth in ['ro', 'rw']:
            community = 'VyOS' + auth
            self.session.set(base_path +
                             ['community', community, 'authorization', auth])
            for client in clients:
                self.session.set(base_path +
                                 ['community', community, 'client', client])
            for network in networks:
                self.session.set(base_path +
                                 ['community', community, 'network', network])

        for addr in listen:
            self.session.set(base_path + ['listen-address', addr])

        self.session.set(base_path + ['contact', '*****@*****.**'])
        self.session.set(base_path + ['location', 'qemu'])

        self.session.commit()

        # verify listen address, it will be returned as
        # ['unix:/run/snmpd.socket,udp:127.0.0.1:161,udp6:[::1]:161']
        # thus we need to transfor this into a proper list
        config = get_config_value('agentaddress')
        expected = 'unix:/run/snmpd.socket'
        for addr in listen:
            if is_ipv4(addr):
                expected += ',udp:{}:161'.format(addr)
            else:
                expected += ',udp6:[{}]:161'.format(addr)

        self.assertTrue(expected in config)

        # Check for running process
        self.assertTrue("snmpd" in (p.name() for p in process_iter()))

    def test_snmpv3_sha(self):
        """ Check if SNMPv3 can be configured with SHA authentication and service runs"""

        self.session.set(base_path +
                         ['v3', 'engineid', '000000000000000000000002'])
        self.session.set(base_path + ['v3', 'group', 'default', 'mode', 'ro'])
        # check validate() - a view must be created before this can be comitted
        with self.assertRaises(ConfigSessionError):
            self.session.commit()

        self.session.set(base_path + ['v3', 'view', 'default', 'oid', '1'])
        self.session.set(base_path +
                         ['v3', 'group', 'default', 'view', 'default'])

        # create user
        self.session.set(base_path + [
            'v3', 'user', 'vyos', 'auth', 'plaintext-password', 'vyos12345678'
        ])
        self.session.set(base_path +
                         ['v3', 'user', 'vyos', 'auth', 'type', 'sha'])
        self.session.set(base_path + [
            'v3', 'user', 'vyos', 'privacy', 'plaintext-password',
            'vyos12345678'
        ])
        self.session.set(base_path +
                         ['v3', 'user', 'vyos', 'privacy', 'type', 'aes'])
        self.session.set(base_path +
                         ['v3', 'user', 'vyos', 'group', 'default'])

        self.session.commit()

        # commit will alter the CLI values - check if they have been updated:
        hashed_password = '******'
        tmp = self.session.show_config(
            base_path +
            ['v3', 'user', 'vyos', 'auth', 'encrypted-password']).split()[1]
        self.assertEqual(tmp, hashed_password)

        tmp = self.session.show_config(
            base_path +
            ['v3', 'user', 'vyos', 'privacy', 'encrypted-password']).split()[1]
        self.assertEqual(tmp, hashed_password)

        # TODO: read in config file and check values

        # Check for running process
        self.assertTrue("snmpd" in (p.name() for p in process_iter()))

    def test_snmpv3_md5(self):
        """ Check if SNMPv3 can be configured with MD5 authentication and service runs"""

        self.session.set(base_path +
                         ['v3', 'engineid', '000000000000000000000002'])
        self.session.set(base_path + ['v3', 'group', 'default', 'mode', 'ro'])
        # check validate() - a view must be created before this can be comitted
        with self.assertRaises(ConfigSessionError):
            self.session.commit()

        self.session.set(base_path + ['v3', 'view', 'default', 'oid', '1'])
        self.session.set(base_path +
                         ['v3', 'group', 'default', 'view', 'default'])

        # create user
        self.session.set(base_path + [
            'v3', 'user', 'vyos', 'auth', 'plaintext-password', 'vyos12345678'
        ])
        self.session.set(base_path +
                         ['v3', 'user', 'vyos', 'auth', 'type', 'md5'])
        self.session.set(base_path + [
            'v3', 'user', 'vyos', 'privacy', 'plaintext-password',
            'vyos12345678'
        ])
        self.session.set(base_path +
                         ['v3', 'user', 'vyos', 'privacy', 'type', 'des'])
        self.session.set(base_path +
                         ['v3', 'user', 'vyos', 'group', 'default'])

        self.session.commit()

        # commit will alter the CLI values - check if they have been updated:
        hashed_password = '******'
        tmp = self.session.show_config(
            base_path +
            ['v3', 'user', 'vyos', 'auth', 'encrypted-password']).split()[1]
        self.assertEqual(tmp, hashed_password)

        tmp = self.session.show_config(
            base_path +
            ['v3', 'user', 'vyos', 'privacy', 'encrypted-password']).split()[1]
        self.assertEqual(tmp, hashed_password)

        # TODO: read in config file and check values

        # Check for running process
        self.assertTrue("snmpd" in (p.name() for p in process_iter()))