aboutsummaryrefslogtreecommitdiffstats
path: root/lib/common_test/test/ct_netconfc_SUITE.erl
AgeCommit message (Collapse)Author
2017-06-14Update copyright yearHans Nilsson
2017-05-08[ct_netconfc] Start multiple sessions per SSH connectionSiri Hansen
The following new functions are added to ct_netconfc: * connect/1,2 - open an SSH connection to a netconf server * disconnect/1 - close the given SSH connectoin * session/1,2,3 - open an SSH channel on the give connection and send 'hello' to start a netconf session. This allows running multiple channels on on SSH connection, realizing one netconf session per channel. The existing ct_netconfc:open will always run one channel(session) per SSH connection.
2016-06-18[ct test] Catch call to ssh:start/0Siri Hansen
The ssh application is not installed on all test hosts. Catching the call to ssh:start/0 allows the the netconf tests to be nicely skipped if ssh does not exist.
2016-06-09[ct test] Check that crypto is loaded, or skip netconf testsSiri Hansen
Tests for ct_netconfc are failed instead of skipped if crypto can not be loaded. This is now corrected.
2016-05-04Merge branch 'siri/cuddle-master'Siri Hansen
* siri/cuddle-master: Extend timer in test Update crashdump_viewer_SUITE with new release numbers Set longer timetrap when creating dsa files Check that ssh application exists before starting netconf tests Improve error control when starting ssh in netconf test
2016-03-30Check that ssh application exists before starting netconf testsSiri Hansen
On some test machines, crypto or ssh applications do not exist. ct_netconfc_SUITE only checked for crypto, causing failed instead of skipped test case when ssh does not exist.
2016-03-15update copyright-yearHenrik Nord
2015-06-18Change license text to APLv2Bruce Yinhe
2014-07-01[ct] Add test with netconf server on remote nodeSiri Hansen
The new test is related to support sequence seq12645. It tests that the netconf client process dies if the node hosting the netconf server terminates.
2012-12-14[common_test] Avoid hanging ct@host node if crypto does not existSiri Hansen
ct_netconfc:init_per_suite called ct_test_support:init_per_suite before checking if crypto exists. This caused the slave node (ct@host) to be started even though the suite would be skipped when crypto did not exist - which in turn caused a hanging ct node since end_per_suite is not run in a skipped suite. This has been corrected.
2012-11-14[common_test] Ensure process down after ct_netconf:close_sessionSiri Hansen
OTP-10510 When starting a named netconf connection directly after stopping one with the same name, it sometimes failed with 'connection_exists'. This has been corrected.
2012-10-22Skip ct_netconf tests if there is no cryptoLukas Larsson
2012-08-17[common_test] Move ct_netconfc_SUITE into datadir and run with ct_test_supportSiri Hansen
2012-08-17[common_test] Don't allow named (required) connection to be opened twiceSiri Hansen
Earlier, it was possible to open connection (ct_gen_conn) with the same (required) name twice, which could give unexpected results. Such attempts will now return {error,{connection_exists,OtherClient}}.
2012-08-17[common_test] Don't abort test run if connection process crashesSiri Hansen
Earlier ct_util_server would terminate and thus abort the complete test run if a connection process (ct_gen_conn) crashed. This is now changed so that ct_util will only print an error report (in the test case log) and continue the rest of the test.
2012-08-17[common_test] Add netconf client, ct_netconfcSiri Hansen
The netconf client supports basic netconf functionality over SSH. In order to allow testing of both success and failure cases, it is intentionally written to allow non-standard behavior. In order for the netconf client to use the generic connection mechanism in common_test, ct_gen_conn has been updated to be more flexible: Added options: {reconnect,bool()} {forward_messages,bool()} {use_existing_connection,bool()} Allow handle_msg to return {reply,Reply,State} | {noreply,State} | {stop,Reply,State} If forward_messages==true, the ct_gen_conn callback must also implement: handle_msgs(Msg,State) -> {noreply,State} | {stop,State}