[Mellanox] Update spf test related to error status when sw control is enabled#16573
[Mellanox] Update spf test related to error status when sw control is enabled#16573bingwang-ms merged 4 commits intosonic-net:masterfrom
Conversation
|
/azp run |
|
Azure Pipelines successfully started running 1 pipeline(s). |
…nic-buildimage#20964 When software control is enabled, the port error status is as follows: 1. For active module, the expected state is OK 2. For cmis passive module, the expected state is ModuleLowPwr 3. For non cmis passive module, the expected state is 'Not supported' when software control is disabled, the port error status keep the original behaviour
b76445a to
5ce252f
Compare
|
/azp run |
|
Azure Pipelines successfully started running 1 pipeline(s). |
|
/azp run |
|
Azure Pipelines successfully started running 1 pipeline(s). |
|
/azp run |
|
Azure Pipelines successfully started running 1 pipeline(s). |
|
/azpw run Azure.sonic-mgmt |
|
/AzurePipelines run Azure.sonic-mgmt |
|
Azure Pipelines successfully started running 1 pipeline(s). |
|
@prgeor Could you help review? |
|
We saw the returned error description is Can this change handle such case? |
1. For cmis passive module, when cmis ver is 3.0, the expected state is ModuleLowPwr, else it is OK
No. This case looks like a real issue, which has been fixed by sonic-net/sonic-platform-common#538 |
|
/azp run |
|
Azure Pipelines successfully started running 1 pipeline(s). |
|
/azpw run Azure.sonic-mgmt |
|
/AzurePipelines run Azure.sonic-mgmt |
|
Azure Pipelines successfully started running 1 pipeline(s). |
|
/azpw run Azure.sonic-mgmt |
|
/AzurePipelines run Azure.sonic-mgmt |
|
@congh-nvidia @oleksandrivantsiv this one too needed for 202411 |
|
Hi @bingwang-ms , could you help cherry-pick this to 202411? Looks like the auto cherry-pick was not triggered. |
|
@congh-nvidia there's a cherry-pick conflict for 202411. Could you please raise a new PR for 202411? Also, is this needed for 202505? |
|
Hi @JibinBao , please cherry-pick to 202411. |
… enabled (sonic-net#16573) * Update spf platform test related to error status, due to sonic-net/sonic-buildimage#20964 When software control is enabled, the port error status is as follows: 1. For active module, the expected state is OK 2. For cmis passive module, the expected state is ModuleLowPwr 3. For non cmis passive module, the expected state is 'Not supported' when software control is disabled, the port error status keep the original behaviour * fix issue caused by the vs * sfp test just run on physical setup * update sfp tests 1. For cmis passive module, when cmis ver is 3.0, the expected state is ModuleLowPwr, else it is OK
@prabhataravind |
… enabled (sonic-net#16573) * Update spf platform test related to error status, due to sonic-net/sonic-buildimage#20964 When software control is enabled, the port error status is as follows: 1. For active module, the expected state is OK 2. For cmis passive module, the expected state is ModuleLowPwr 3. For non cmis passive module, the expected state is 'Not supported' when software control is disabled, the port error status keep the original behaviour * fix issue caused by the vs * sfp test just run on physical setup * update sfp tests 1. For cmis passive module, when cmis ver is 3.0, the expected state is ModuleLowPwr, else it is OK
|
Cherry-pick PR to 202411: #19273 |
… enabled (sonic-net#16573) (sonic-net#19264) [Mellanox] Update spf test related to error status when sw control is enabled
PR #16573 added some fixtures for getting port information for sfp tests, however when these fixtures run on supervisor nodes, it fails as sfputil is not valid for supervisors. Add a check in these fixtures to skip supervisor nodes Signed-off-by: Liam Kearney <[email protected]>
…#18090) PR sonic-net#16573 added some fixtures for getting port information for sfp tests, however when these fixtures run on supervisor nodes, it fails as sfputil is not valid for supervisors. Add a check in these fixtures to skip supervisor nodes Signed-off-by: Liam Kearney <[email protected]>
PR #16573 added some fixtures for getting port information for sfp tests, however when these fixtures run on supervisor nodes, it fails as sfputil is not valid for supervisors. Add a check in these fixtures to skip supervisor nodes Signed-off-by: Liam Kearney <[email protected]>
Code sync sonic-net/sonic-mgmt:202411 => 202412 ``` * fb53396 (HEAD -> code-sync-202412, origin/code-sync-202412) r12f 250701:1725 - Merge remote-tracking branch 'base/202411' into code-sync-202412 |\ | * 54633cb (base/202411) prabhataravind 250701:0928 - Add t1-28-lag and t1-48-lag to tests_mark_conditions.yaml (sonic-net#19274) | * 9a23c16 Cong Hou 250416:2355 - Align the sensors data for SN4280 with sonic-buildimage PR#21845 (sonic-net#17747) | * 8b2d2cd Jibin Bao 250306:0835 - add watchdog test data for x86_64-nvidia_sn4280-r0 (sonic-net#17312) | * 5c8d5f0 Jibin Bao 250701:0045 - [Mellanox] Update spf test related to error status when sw control is enabled (sonic-net#16573) (sonic-net#19264) | * 0bea309 Yawen 250411:1620 - add hwsku V64 (sonic-net#17897) | * 8ab9e6b zitingguo-ms 250628:1755 - [test_static_route] Skip PT0 neighbor when checking route redistribution (sonic-net#19226) | * 4276be3 prabhataravind 250627:1827 - Support t1-48-lag topo for acl tests (sonic-net#19236) | * e070035 Wenda Chu 250625:1719 - Skip multiple servers testbed parsing on branch 202411 (sonic-net#19158) | * 0e5645d xwjiang-ms 250625:1619 - Roll back ceos image version since it's causing bgp failure (sonic-net#19180) | * 7625d06 ganglv 250624:1548 - Fix configuration after gnmi test (sonic-net#19150) | * 25e2e55 zitingguo-ms 250624:2000 - [ACL] Record service ports individually and add them to the acl_table_ports (sonic-net#19168) ```
…#18090) PR sonic-net#16573 added some fixtures for getting port information for sfp tests, however when these fixtures run on supervisor nodes, it fails as sfputil is not valid for supervisors. Add a check in these fixtures to skip supervisor nodes Signed-off-by: Liam Kearney <[email protected]>
…#18090) PR sonic-net#16573 added some fixtures for getting port information for sfp tests, however when these fixtures run on supervisor nodes, it fails as sfputil is not valid for supervisors. Add a check in these fixtures to skip supervisor nodes Signed-off-by: Liam Kearney <[email protected]>
…#18090) PR sonic-net#16573 added some fixtures for getting port information for sfp tests, however when these fixtures run on supervisor nodes, it fails as sfputil is not valid for supervisors. Add a check in these fixtures to skip supervisor nodes Signed-off-by: Liam Kearney <[email protected]>
…#18090) PR sonic-net#16573 added some fixtures for getting port information for sfp tests, however when these fixtures run on supervisor nodes, it fails as sfputil is not valid for supervisors. Add a check in these fixtures to skip supervisor nodes Signed-off-by: Liam Kearney <[email protected]>
…#18090) PR sonic-net#16573 added some fixtures for getting port information for sfp tests, however when these fixtures run on supervisor nodes, it fails as sfputil is not valid for supervisors. Add a check in these fixtures to skip supervisor nodes Signed-off-by: Liam Kearney <[email protected]> Signed-off-by: Guy Shemesh <[email protected]>
…#18090) PR sonic-net#16573 added some fixtures for getting port information for sfp tests, however when these fixtures run on supervisor nodes, it fails as sfputil is not valid for supervisors. Add a check in these fixtures to skip supervisor nodes Signed-off-by: Liam Kearney <[email protected]> Signed-off-by: Aharon Malkin <[email protected]>
… enabled (sonic-net#16573) * Update spf platform test related to error status, due to sonic-net/sonic-buildimage#20964 When software control is enabled, the port error status is as follows: 1. For active module, the expected state is OK 2. For cmis passive module, the expected state is ModuleLowPwr 3. For non cmis passive module, the expected state is 'Not supported' when software control is disabled, the port error status keep the original behaviour * fix issue caused by the vs * sfp test just run on physical setup * update sfp tests 1. For cmis passive module, when cmis ver is 3.0, the expected state is ModuleLowPwr, else it is OK Signed-off-by: Guy Shemesh <[email protected]>
…#18090) PR sonic-net#16573 added some fixtures for getting port information for sfp tests, however when these fixtures run on supervisor nodes, it fails as sfputil is not valid for supervisors. Add a check in these fixtures to skip supervisor nodes Signed-off-by: Liam Kearney <[email protected]> Signed-off-by: Guy Shemesh <[email protected]>
…#18090) PR sonic-net#16573 added some fixtures for getting port information for sfp tests, however when these fixtures run on supervisor nodes, it fails as sfputil is not valid for supervisors. Add a check in these fixtures to skip supervisor nodes Signed-off-by: Liam Kearney <[email protected]>
… enabled (sonic-net#16573) * Update spf platform test related to error status, due to sonic-net/sonic-buildimage#20964 When software control is enabled, the port error status is as follows: 1. For active module, the expected state is OK 2. For cmis passive module, the expected state is ModuleLowPwr 3. For non cmis passive module, the expected state is 'Not supported' when software control is disabled, the port error status keep the original behaviour * fix issue caused by the vs * sfp test just run on physical setup * update sfp tests 1. For cmis passive module, when cmis ver is 3.0, the expected state is ModuleLowPwr, else it is OK Signed-off-by: Guy Shemesh <[email protected]>
…#18090) PR sonic-net#16573 added some fixtures for getting port information for sfp tests, however when these fixtures run on supervisor nodes, it fails as sfputil is not valid for supervisors. Add a check in these fixtures to skip supervisor nodes Signed-off-by: Liam Kearney <[email protected]> Signed-off-by: Guy Shemesh <[email protected]>
…#18090) PR sonic-net#16573 added some fixtures for getting port information for sfp tests, however when these fixtures run on supervisor nodes, it fails as sfputil is not valid for supervisors. Add a check in these fixtures to skip supervisor nodes Signed-off-by: Liam Kearney <[email protected]> Signed-off-by: Yael Tzur <[email protected]>
Description of PR
Update spf platform test related to error status, due to PR: sonic-net/sonic-buildimage#20964
When software control is enabled, the port error status is as follows:
When software control is disabled, the port error status keeps the original behaviour
Summary:
Fixes # (issue)
Type of change
Back port request
Approach
What is the motivation for this PR?
Update spf test related to error status when sw control is enabled
How did you do it?
When sw control is enabled, check the error stats as the following logic:
How did you verify/test it?
Run test_get_error_description and test_check_sfputil_error_status when sw control is enabled
Any platform specific information?
Mellanox
Supported testbed topology if it's a new test case?
Documentation