Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Investigate/handle disallowed port in connection request #223

Merged
merged 23 commits into from
Sep 5, 2024

Conversation

sajith
Copy link
Member

@sajith sajith commented Aug 30, 2024

This should resolve #208. Changes:

  • Reject requests for invalid VLAN tags (the VLANs that are not configured on a port).
  • Reject requests for VLANs that are in use.
  • Handle requests for the special "any" value.
  • Add some tests.

Support for requests that contain ranges, "all", and "untagged" are to be implemented in a follow-up: see #224.

@coveralls
Copy link

coveralls commented Aug 30, 2024

Pull Request Test Coverage Report for Build 10724236239

Details

  • 18 of 23 (78.26%) changed or added relevant lines in 1 file are covered.
  • 7 unchanged lines in 1 file lost coverage.
  • Overall coverage increased (+0.02%) to 88.658%

Changes Missing Coverage Covered Lines Changed/Added Lines %
src/sdx_pce/topology/temanager.py 18 23 78.26%
Files with Coverage Reduction New Missed Lines %
src/sdx_pce/topology/temanager.py 7 88.37%
Totals Coverage Status
Change from base Build 10633690359: 0.02%
Covered Lines: 1125
Relevant Lines: 1247

💛 - Coveralls

@sajith sajith marked this pull request as ready for review September 5, 2024 14:30
@sajith sajith merged commit 4836ab7 into main Sep 5, 2024
11 checks passed
@sajith sajith deleted the 208.disallowed-vlans branch September 5, 2024 16:27
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Investigate behavior of reserve VLAN when the user requests an VLAN which is not allowed by OXP
3 participants