Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[TACACS] Improve IPv6 TACACS cases to workaround tacacs_plus server crash issue #13026

Merged
merged 1 commit into from
May 29, 2024

Conversation

sdszhang
Copy link
Contributor

Description of PR

Summary:
Fixes TACACS failures in test_mgmt_ipv6_only module.

Type of change

  • Bug fix
  • Testbed and Framework(new/improvement)
  • Test case(new/improvement)

Back port request

  • 201911
  • 202012
  • 202205
  • 202305
  • 202311

Approach

What is the motivation for this PR?

It's observed that tacacs_plus process may crash when receiving ipv6 tacacs requests. Need a way to workaround it.

How did you do it?

Similar issue in tacacs/test_ro_user has been fixed in #12819
Using the similar method to restart tacacs_plus process if it fails.

How did you verify/test it?

Verified in both virtual testbed and physical testbed. Not seeing tacacs failures anymore.

Any platform specific information?

Supported testbed topology if it's a new test case?

Documentation

Copy link
Collaborator

@yejianquan yejianquan left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@yejianquan yejianquan merged commit a9e714a into sonic-net:master May 29, 2024
17 checks passed
mssonicbld pushed a commit to mssonicbld/sonic-mgmt that referenced this pull request May 29, 2024
…s_plus server crash issue (sonic-net#13026)

Description of PR
Summary:
Fixes TACACS failures in test_mgmt_ipv6_only module.

Approach
What is the motivation for this PR?
It's observed that tacacs_plus process may crash when receiving ipv6 tacacs requests. Need a way to workaround it.

How did you do it?
Similar issue in tacacs/test_ro_user has been fixed in sonic-net#12819
Using the similar method to restart tacacs_plus process if it fails.

How did you verify/test it?
Verified in both virtual testbed and physical testbed. Not seeing tacacs failures anymore.

co-authorized by: [email protected]
@mssonicbld
Copy link
Collaborator

Cherry-pick PR to 202305: #13032

mssonicbld pushed a commit to mssonicbld/sonic-mgmt that referenced this pull request May 29, 2024
…s_plus server crash issue (sonic-net#13026)

Description of PR
Summary:
Fixes TACACS failures in test_mgmt_ipv6_only module.

Approach
What is the motivation for this PR?
It's observed that tacacs_plus process may crash when receiving ipv6 tacacs requests. Need a way to workaround it.

How did you do it?
Similar issue in tacacs/test_ro_user has been fixed in sonic-net#12819
Using the similar method to restart tacacs_plus process if it fails.

How did you verify/test it?
Verified in both virtual testbed and physical testbed. Not seeing tacacs failures anymore.

co-authorized by: [email protected]
@mssonicbld
Copy link
Collaborator

Cherry-pick PR to 202311: #13033

@sdszhang sdszhang deleted the master_ipv6_tacacs branch May 29, 2024 08:39
mssonicbld pushed a commit that referenced this pull request May 29, 2024
…s_plus server crash issue (#13026)

Description of PR
Summary:
Fixes TACACS failures in test_mgmt_ipv6_only module.

Approach
What is the motivation for this PR?
It's observed that tacacs_plus process may crash when receiving ipv6 tacacs requests. Need a way to workaround it.

How did you do it?
Similar issue in tacacs/test_ro_user has been fixed in #12819
Using the similar method to restart tacacs_plus process if it fails.

How did you verify/test it?
Verified in both virtual testbed and physical testbed. Not seeing tacacs failures anymore.

co-authorized by: [email protected]
yejianquan pushed a commit that referenced this pull request May 30, 2024
…s_plus server crash issue (#13026) (#13032)

Description of PR
Summary:
Fixes TACACS failures in test_mgmt_ipv6_only module.

Approach
What is the motivation for this PR?
It's observed that tacacs_plus process may crash when receiving ipv6 tacacs requests. Need a way to workaround it.

How did you do it?
Similar issue in tacacs/test_ro_user has been fixed in #12819
Using the similar method to restart tacacs_plus process if it fails.

How did you verify/test it?
Verified in both virtual testbed and physical testbed. Not seeing tacacs failures anymore.

co-authorized by: [email protected]

Co-authored-by: Dashuai Zhang <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants