-
Notifications
You must be signed in to change notification settings - Fork 113
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Updated lldpRemManAddrTable to use all the management ip address associated with interface. #201
Changes from 10 commits
3194691
4dbc4dc
a0e0ef1
9749374
2b3ffc7
7f74185
448cad1
4aaa793
6956f42
09d41cf
341f548
80417ee
bab90f4
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -494,10 +494,9 @@ def __init__(self): | |
# establish connection to application database. | ||
Namespace.connect_all_dbs(self.db_conn, mibs.APPL_DB) | ||
self.if_range = [] | ||
self.mgmt_ips = {} | ||
self.if_with_mgmt_ips = set() | ||
self.oid_name_map = {} | ||
self.mgmt_oid_name_map = {} | ||
self.mgmt_ip_str = None | ||
self.pubsub = [None] * len(self.db_conn) | ||
|
||
def update_rem_if_mgmt(self, if_oid, if_name): | ||
|
@@ -511,28 +510,39 @@ def update_rem_if_mgmt(self, if_oid, if_name): | |
if len(mgmt_ip_str) == 0: | ||
# the peer advertise an emtpy mgmt address | ||
return | ||
time_mark = int(lldp_kvs['lldp_rem_time_mark']) | ||
remote_index = int(lldp_kvs['lldp_rem_index']) | ||
subtype = self.get_subtype(mgmt_ip_str) | ||
ip_hex = self.get_ip_hex(mgmt_ip_str, subtype) | ||
if subtype == ManAddrConst.man_addr_subtype_ipv4: | ||
addr_subtype_sub_oid = 4 | ||
mgmt_ip_sub_oid = (addr_subtype_sub_oid, *[int(i) for i in mgmt_ip_str.split('.')]) | ||
elif subtype == ManAddrConst.man_addr_subtype_ipv6: | ||
addr_subtype_sub_oid = 6 | ||
mgmt_ip_sub_oid = (addr_subtype_sub_oid, *[int(i, 16) if i else 0 for i in mgmt_ip_str.split(':')]) | ||
else: | ||
logger.warning("Invalid management IP {}".format(mgmt_ip_str)) | ||
return | ||
self.if_range.append((time_mark, | ||
if_oid, | ||
remote_index, | ||
subtype, | ||
*mgmt_ip_sub_oid)) | ||
|
||
self.mgmt_ips.update({if_name: {"ip_str": mgmt_ip_str, | ||
"addr_subtype": subtype, | ||
"addr_hex": ip_hex}}) | ||
|
||
mgmt_ip_set=set() | ||
for mgmt_ip in mgmt_ip_str.split(','): | ||
time_mark = int(lldp_kvs['lldp_rem_time_mark']) | ||
remote_index = int(lldp_kvs['lldp_rem_index']) | ||
subtype, exploded_mgmt_ip = self.get_subtype_and_exploded_ip(mgmt_ip) | ||
|
||
# Invalid management IP | ||
if not subtype or not exploded_mgmt_ip: | ||
logger.warning("Invalid management IP {}".format(mgmt_ip)) | ||
continue | ||
# Non-Unique management IP | ||
elif exploded_mgmt_ip in mgmt_ip_set: | ||
continue | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. if mgmt_ip_set is present in mgmt_ip_tuple, should the data be still updated instead of continuing? There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. we keep key tuple (eg: time_mark) only for unique ip's. |
||
# IPv4 management IP | ||
elif subtype == ManAddrConst.man_addr_subtype_ipv4: | ||
addr_subtype_sub_oid = 4 | ||
mgmt_ip_sub_oid = (addr_subtype_sub_oid, *[int(i) for i in exploded_mgmt_ip.split('.')]) | ||
mgmt_ip_set.add(exploded_mgmt_ip) | ||
# IPv6 management IP | ||
elif subtype == ManAddrConst.man_addr_subtype_ipv6: | ||
addr_subtype_sub_oid = 6 | ||
mgmt_ip_sub_oid = (addr_subtype_sub_oid, *[int(i, 16) if i else 0 for i in exploded_mgmt_ip.split(':')]) | ||
mgmt_ip_set.add(exploded_mgmt_ip) | ||
else: | ||
pass | ||
self.if_range.append((time_mark, | ||
if_oid, | ||
remote_index, | ||
subtype, | ||
*mgmt_ip_sub_oid)) | ||
self.if_with_mgmt_ips.add(if_name) | ||
|
||
except (KeyError, AttributeError) as e: | ||
logger.warning("Error updating remote mgmt addr: {}".format(e)) | ||
return | ||
|
@@ -577,7 +587,7 @@ def reinit_data(self): | |
Namespace.connect_all_dbs(self.db_conn, mibs.APPL_DB) | ||
|
||
self.if_range = [] | ||
self.mgmt_ips = {} | ||
self.if_with_mgmt_ips = set() | ||
for if_oid, if_name in self.oid_name_map.items(): | ||
self.update_rem_if_mgmt(if_oid, if_name) | ||
|
||
|
@@ -594,7 +604,7 @@ def lookup(self, sub_id, callable): | |
if sub_id not in self.oid_name_map: | ||
return None | ||
if_name = self.oid_name_map[sub_id] | ||
if if_name not in self.mgmt_ips: | ||
if if_name not in self.if_with_mgmt_ips: | ||
# no data for this interface | ||
return None | ||
return callable(sub_id, if_name) | ||
|
@@ -608,30 +618,21 @@ def get_ip_hex(self, mgmt_ip_str, subtype): | |
hex_ip = None | ||
return hex_ip | ||
|
||
def get_subtype(self, ip_str): | ||
def get_subtype_and_exploded_ip(self, ip_str): | ||
try: | ||
ipaddress.IPv4Address(ip_str) | ||
return ManAddrConst.man_addr_subtype_ipv4 | ||
return ManAddrConst.man_addr_subtype_ipv4, ip_str | ||
except ipaddress.AddressValueError: | ||
# not a valid IPv4 | ||
pass | ||
try: | ||
ipaddress.IPv6Address(ip_str) | ||
return ManAddrConst.man_addr_subtype_ipv6 | ||
return ManAddrConst.man_addr_subtype_ipv6, ipaddress.IPv6Address(ip_str).exploded | ||
except ipaddress.AddressValueError: | ||
# not a valid IPv6 | ||
logger.warning("Invalid mgmt IP {}".format(ip_str)) | ||
return None | ||
|
||
def man_addr_subtype(self, sub_id, if_name): | ||
return self.mgmt_ips[if_name]['addr_subtype'] | ||
return None, None | ||
|
||
def man_addr(self, sub_id, if_name): | ||
""" | ||
:param sub_id: | ||
:return: MGMT IP in HEX | ||
""" | ||
return self.mgmt_ips[if_name]['addr_hex'] | ||
|
||
@staticmethod | ||
def man_addr_if_subtype(sub_id, _): return ManAddrConst.man_addr_if_subtype | ||
|
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -124,11 +124,36 @@ def test_subtype_lldp_loc_man_addr_table(self): | |
|
||
|
||
def test_subtype_lldp_rem_man_addr_table(self): | ||
# Verfiy both valid ipv4 and ipv6 address exit | ||
for entry in range(3, 6): | ||
mib_entry = self.lut[(1, 0, 8802, 1, 1, 2, 1, 4, 2, 1, entry)] | ||
ret = mib_entry(sub_id=(1, 1)) | ||
self.assertIsNotNone(ret) | ||
print(ret) | ||
# Verfiy both valid ipv4 and invalid ipv6 address exit | ||
for entry in range(3, 6): | ||
mib_entry = self.lut[(1, 0, 8802, 1, 1, 2, 1, 4, 2, 1, entry)] | ||
ret = mib_entry(sub_id=(1, 5)) | ||
self.assertIsNotNone(ret) | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. How is the return value checked if both ipv4 and ipv6 exits? There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. intention of testcase is to check when both ip address are present we can get the data from first key (can be either v4 or v6) for given interface. Basically to check we are not ignoring management ip information in such case. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. @SuvarnaMeenakshi Updated test case for this. Fixed |
||
print(ret) | ||
# Verfiy only valid ipv4 address exit | ||
for entry in range(3, 6): | ||
mib_entry = self.lut[(1, 0, 8802, 1, 1, 2, 1, 4, 2, 1, entry)] | ||
ret = mib_entry(sub_id=(1, 9)) | ||
self.assertIsNotNone(ret) | ||
print(ret) | ||
# Verfiy only valid ipv6 address exit | ||
for entry in range(3, 6): | ||
mib_entry = self.lut[(1, 0, 8802, 1, 1, 2, 1, 4, 2, 1, entry)] | ||
ret = mib_entry(sub_id=(1, 13)) | ||
self.assertIsNotNone(ret) | ||
print(ret) | ||
# Verfiy no mgmt address exit | ||
for entry in range(3, 6): | ||
mib_entry = self.lut[(1, 0, 8802, 1, 1, 2, 1, 4, 2, 1, entry)] | ||
ret = mib_entry(sub_id=(1, 17)) | ||
self.assertIsNone(ret) | ||
print(ret) | ||
|
||
def test_local_port_identification(self): | ||
mib_entry = self.lut[(1, 0, 8802, 1, 1, 2, 1, 3, 7, 1, 3)] | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The code is okay, I am think about more readable and concise.
I found some sample code: https://github.com/Azure/sonic-snmpagent/blob/9b83459d647622a12387085f01d2256fd69430e2/src/sonic_ax_impl/mibs/vendor/cisco/bgp4.py#L41-L46
Suggest you extract a common method and reuse. #Closed
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks @qiluo-msft . Updated to use updated utility API.