Chetan Gaonker | a58c258 | 2017-08-02 00:02:04 +0000 | [diff] [blame] | 1 | ubuntu@cord-rs-s8:~/cord-tester/src/test/setup$ sudo ./cord-test.py run -m manifest-ponsim.json -t voltha:voltha_exchange.test_subscriber_with_voltha_for_multiple_invalid_authentication_attempts |
| 2 | # Host [172.17.0.2]:8101 found: line 3 type RSA |
| 3 | onoscli: eof exception found |
| 4 | onoscli: logout |
| 5 | |
| 6 | Connection to 172.17.0.2 closed. |
| 7 | |
| 8 | result.ok, result.status_code are False and 409 |
| 9 | ONOS app cord-config, version 2.0-SNAPSHOT installed |
| 10 | result.ok, result.status_code are False and 409 |
| 11 | ONOS app aaa, version 2.0-SNAPSHOT installed |
| 12 | result.ok, result.status_code are False and 409 |
| 13 | ONOS app igmp, version 2.0-SNAPSHOT installed |
| 14 | Controller IP [u'172.17.0.2'], Test type voltha:voltha_exchange.test_subscriber_with_voltha_for_multiple_invalid_authentication_attempts |
| 15 | Installing cord tester ONOS app /home/ubuntu/cord-tester/src/test/apps/ciena-cordigmp-multitable-3.0-SNAPSHOT.oar |
| 16 | result.ok, result.status_code are False and 409 |
| 17 | WARNING: The DOCKER_HOST_IP variable is not set. Defaulting to a blank string. |
| 18 | compose_zookeeper_1 is up-to-date |
| 19 | compose_fluentd_1 is up-to-date |
| 20 | compose_consul_1 is up-to-date |
| 21 | compose_kafka_1 is up-to-date |
| 22 | compose_registrator_1 is up-to-date |
| 23 | IP 172.18.0.3 for service consul |
| 24 | IP 172.18.0.5 for service kafka |
| 25 | IP 172.18.0.4 for service zookeeper |
| 26 | IP 172.18.0.6 for service registrator |
| 27 | IP 172.18.0.2 for service fluentd |
| 28 | Chameleon voltha sevice is already running. Skipped start |
| 29 | VOLTHA core is already running. Skipped start |
| 30 | VOLTHA ofagent is already running. Skipped start |
| 31 | PONSIM already running. Skipped start |
| 32 | Radius server running with IP 172.17.0.3 |
| 33 | Running ['voltha:voltha_exchange.test_subscriber_with_voltha_for_multiple_invalid_authentication_attempts'] tests across 1 containers in parallel |
| 34 | Modifying scapy tool files before running a test: ['voltha:voltha_exchange.test_subscriber_with_voltha_for_multiple_invalid_authentication_attempts'] |
| 35 | Running tests: ['voltha:voltha_exchange.test_subscriber_with_voltha_for_multiple_invalid_authentication_attempts'] |
| 36 | WARNING: No route found for IPv6 destination :: (no default route?) |
| 37 | Connecting to controller at 172.17.0.2 |
| 38 | onoscli: Trying to connect to 172.17.0.2 |
| 39 | # Host [172.17.0.2]:8101 found: line 1 type RSA |
| 40 | Spawning pexpect for ip 172.17.0.2 |
| 41 | ssh connection asked for password, gave password |
| 42 | Command 'summary -j' sent to onoscli. |
| 43 | onoscli: eof exception found |
| 44 | onoscli: logout |
| 45 | |
| 46 | Connection to 172.17.0.2 closed. |
| 47 | |
| 48 | Installing the multi table app /root/test/src/test/voltha/../apps/ciena-cordigmp-multitable-3.0-SNAPSHOT.oar for subscriber test |
| 49 | Test Method: ... Enabling ponsim_olt |
| 50 | Pre-provisioning ponsim_olt with address 172.17.0.1:50060 |
| 51 | Enabling device 578984f1d484 |
| 52 | Checking operational status for device 578984f1d484 |
| 53 | Installing OLT app |
| 54 | Adding subscribers through OLT app |
| 55 | Running subscriber veth0 tls auth test with invalid TLS certificate |
| 56 | llheader packet is None |
| 57 | source mac of packet is 4efe788ced55 |
| 58 | _eapStart method started over interface veth0 |
| 59 | Inside EAP ID Req for interface veth0 |
| 60 | Got EAPOL packet with type id and code request for interface veth0 |
| 61 | Interface: veth0, Packet code: 1, type: 1, id: 0 |
| 62 | Send EAP Response with identity raduser over interface veth0 |
| 63 | Got hello request for id 1 over interface veth0 |
| 64 | Sending Client Hello TLS payload of len 50, id 1 over interface veth0 |
| 65 | Receiving server certificates over interface veth0 |
| 66 | Interface veth0, Appending packet type 02 to packet history of len 74 |
| 67 | Interface: veth0, Pending bytes left 1306 |
| 68 | Interface veth0, Appending packet type 0b to packet history of len 2216 |
| 69 | Interface veth0, Appending packet type 0d to packet history of len 154 |
| 70 | server hello received over interface veth0 |
| 71 | Interface veth0, Appending packet type 0e to packet history of len 4 |
| 72 | Sending client certificate request over interface veth0 |
| 73 | Sending Client Hello TLS Certificate payload of len 1569 over interface veth0 |
| 74 | entering into testFail function for interface veth0 |
| 75 | TLS verification failed |
| 76 | Running subscriber veth0 tls auth test with invalid TLS certificate |
| 77 | llheader packet is None |
| 78 | source mac of packet is 4efe788ced55 |
| 79 | _eapStart method started over interface veth0 |
| 80 | Inside EAP ID Req for interface veth0 |
| 81 | Got EAPOL packet with type id and code request for interface veth0 |
| 82 | Interface: veth0, Packet code: 1, type: 1, id: 0 |
| 83 | Send EAP Response with identity raduser over interface veth0 |
| 84 | Got hello request for id 1 over interface veth0 |
| 85 | Sending Client Hello TLS payload of len 50, id 1 over interface veth0 |
| 86 | Receiving server certificates over interface veth0 |
| 87 | Interface veth0, Appending packet type 02 to packet history of len 74 |
| 88 | Interface: veth0, Pending bytes left 1306 |
| 89 | Interface veth0, Appending packet type 0b to packet history of len 2216 |
| 90 | Interface veth0, Appending packet type 0d to packet history of len 154 |
| 91 | server hello received over interface veth0 |
| 92 | Interface veth0, Appending packet type 0e to packet history of len 4 |
| 93 | Sending client certificate request over interface veth0 |
| 94 | Sending Client Hello TLS Certificate payload of len 1569 over interface veth0 |
| 95 | entering into testFail function for interface veth0 |
| 96 | TLS verification failed |
| 97 | Running subscriber veth0 tls auth test with no TLS certificate |
| 98 | llheader packet is None |
| 99 | source mac of packet is 4efe788ced55 |
| 100 | _eapStart method started over interface veth0 |
| 101 | Inside EAP ID Req for interface veth0 |
| 102 | Got EAPOL packet with type id and code request for interface veth0 |
| 103 | Interface: veth0, Packet code: 1, type: 1, id: 0 |
| 104 | Send EAP Response with identity raduser over interface veth0 |
| 105 | Got hello request for id 1 over interface veth0 |
| 106 | Sending Client Hello TLS payload of len 50, id 1 over interface veth0 |
| 107 | Receiving server certificates over interface veth0 |
| 108 | Interface veth0, Appending packet type 02 to packet history of len 74 |
| 109 | Interface: veth0, Pending bytes left 1306 |
| 110 | Interface veth0, Appending packet type 0b to packet history of len 2216 |
| 111 | Interface veth0, Appending packet type 0d to packet history of len 154 |
| 112 | server hello received over interface veth0 |
| 113 | Interface veth0, Appending packet type 0e to packet history of len 4 |
| 114 | Sending client certificate request over interface veth0 |
| 115 | Sending Client Hello TLS Certificate payload of len 605 over interface veth0 |
| 116 | entering into testFail function for interface veth0 |
| 117 | TLS verification failed |
| 118 | Running subscriber veth0 tls auth test with invalid TLS certificate |
| 119 | llheader packet is None |
| 120 | source mac of packet is 4efe788ced55 |
| 121 | _eapStart method started over interface veth0 |
| 122 | Inside EAP ID Req for interface veth0 |
| 123 | Got EAPOL packet with type id and code request for interface veth0 |
| 124 | Interface: veth0, Packet code: 1, type: 1, id: 0 |
| 125 | Send EAP Response with identity raduser over interface veth0 |
| 126 | Got hello request for id 1 over interface veth0 |
| 127 | Sending Client Hello TLS payload of len 50, id 1 over interface veth0 |
| 128 | Receiving server certificates over interface veth0 |
| 129 | Interface veth0, Appending packet type 02 to packet history of len 74 |
| 130 | Interface: veth0, Pending bytes left 1306 |
| 131 | Interface veth0, Appending packet type 0b to packet history of len 2216 |
| 132 | Interface veth0, Appending packet type 0d to packet history of len 154 |
| 133 | server hello received over interface veth0 |
| 134 | Interface veth0, Appending packet type 0e to packet history of len 4 |
| 135 | Sending client certificate request over interface veth0 |
| 136 | Sending Client Hello TLS Certificate payload of len 1569 over interface veth0 |
| 137 | entering into testFail function for interface veth0 |
| 138 | TLS verification failed |
| 139 | Disabling device 578984f1d484 |
| 140 | Deleting device 578984f1d484 |
| 141 | ok |
| 142 | Installing back the cord igmp app /root/test/src/test/voltha/../apps/ciena-cordigmp-3.0-SNAPSHOT.oar for subscriber test on exit |
| 143 | |
| 144 | ---------------------------------------------------------------------- |
| 145 | Ran 1 test in 127.708s |
| 146 | |
| 147 | OK |
| 148 | Test volthaTest.py:voltha_exchange.test_subscriber_with_voltha_for_multiple_invalid_authentication_attempts Success |
| 149 | Done running tests |
| 150 | ubuntu@cord-rs-s8:~/cord-tester/src/test/setup$ |
| 151 | |