Skip to content

Address fixes to make sure t2 topology deploy works with and without macsec enabled.#17530

Merged
judyjoseph merged 1 commit intosonic-net:masterfrom
judyjoseph:macsec_profile_deploy_2
Mar 21, 2025
Merged

Address fixes to make sure t2 topology deploy works with and without macsec enabled.#17530
judyjoseph merged 1 commit intosonic-net:masterfrom
judyjoseph:macsec_profile_deploy_2

Conversation

@judyjoseph
Copy link
Copy Markdown
Contributor

@judyjoseph judyjoseph commented Mar 14, 2025

Description of PR

This PR is separating the code changes made in PR : #17087, to just take care of fixes to get the t2 toplogy deploy work with and without macsec_enabled.

Additional change is to support any cipher suite give in the arguments. In below eg: it uses MACSEC_PROFILE which is defined as GCM-AES-XPN-256 here https://github.com/sonic-net/sonic-mgmt/blob/master/tests/common/macsec/profile.json#L69

./testbed-cli.sh -t testbed.yaml deploy-mg <testbed_name> <inventory_file> -e enable_macsec=True -e macsec_profile=MACSEC_PROFILE 

Summary:
Fixes # (issue)

Type of change

  • Bug fix
  • Testbed and Framework(new/improvement)
  • New Test case
    • Skipped for non-supported platforms
  • Test case improvement

Back port request

  • 202012
  • 202205
  • 202305
  • 202311
  • 202405
  • 202411

Approach

What is the motivation for this PR?

How did you do it?

How did you verify/test it?

Any platform specific information?

Supported testbed topology if it's a new test case?

Documentation

@mssonicbld
Copy link
Copy Markdown
Collaborator

/azp run

@azure-pipelines
Copy link
Copy Markdown

Azure Pipelines successfully started running 1 pipeline(s).

judyjoseph added a commit to judyjoseph/sonic-mgmt that referenced this pull request Mar 14, 2025
@judyjoseph
Copy link
Copy Markdown
Contributor Author

/azp run

@azure-pipelines
Copy link
Copy Markdown

Azure Pipelines successfully started running 1 pipeline(s).

@judyjoseph
Copy link
Copy Markdown
Contributor Author

/azp run

@azure-pipelines
Copy link
Copy Markdown

Azure Pipelines successfully started running 1 pipeline(s).

@judyjoseph
Copy link
Copy Markdown
Contributor Author

/azp run

@azure-pipelines
Copy link
Copy Markdown

Azure Pipelines successfully started running 1 pipeline(s).

@judyjoseph
Copy link
Copy Markdown
Contributor Author

/azp run

@azure-pipelines
Copy link
Copy Markdown

Azure Pipelines successfully started running 1 pipeline(s).

@judyjoseph
Copy link
Copy Markdown
Contributor Author

/azp run

@azure-pipelines
Copy link
Copy Markdown

Azure Pipelines successfully started running 1 pipeline(s).

@judyjoseph judyjoseph merged commit 0b2f188 into sonic-net:master Mar 21, 2025
18 checks passed
amulyan7 pushed a commit to amulyan7/sonic-mgmt that referenced this pull request Mar 31, 2025
OriTrabelsi pushed a commit to OriTrabelsi/sonic-mgmt that referenced this pull request Apr 1, 2025
judyjoseph added a commit that referenced this pull request May 15, 2025
…enabled topology. (#17087)

* Fixes found during nightly run with macsec enabled topology
* Ffix for copp pfc voq ptftests
* Fix the port_number to port_id things again
* Fixes for acl tests, changes in config reload to pass override option if macsec is anebled, introduce the force_reload option if we need to reload macsec config for a port
* Fixes to get generate_golden_config work when this run for a non macsec case in t2 topo
* Add macsec support in acstests and saitests
* Loop for count of packets to be sent as we need to increment PN
* We need to import macsec to override send_packet and dp_poll
* Changes moved to a different PR : #17530
* Remove redundant macsec.py files - make it all point to ansible/roles/test/files/ptftests/macsec.py
* Take care of T0 macsec tests as well, so that t0-sonic is fine
* Additional fix to support multiple profile names given as input
* Use the right command KEYS instead of HGET
* Update comment, use macsec_card to set MacSecEnabled in DeviceMetadata
* Skip ACL egress tests when run on macsec enabled toplogy with braodcom DNX
tjchadaga added a commit to Azure/sonic-mgmt.msft that referenced this pull request Jun 5, 2025
… works both with and without macsec_enabled (#17530) (#361)

manual cherry-pick of PR -
sonic-net/sonic-mgmt#17530
auspham pushed a commit to auspham/sonic-mgmt that referenced this pull request Jun 27, 2025
opcoder0 pushed a commit to opcoder0/sonic-mgmt that referenced this pull request Dec 8, 2025
opcoder0 pushed a commit to opcoder0/sonic-mgmt that referenced this pull request Dec 8, 2025
…enabled topology. (sonic-net#17087)

* Fixes found during nightly run with macsec enabled topology
* Ffix for copp pfc voq ptftests
* Fix the port_number to port_id things again
* Fixes for acl tests, changes in config reload to pass override option if macsec is anebled, introduce the force_reload option if we need to reload macsec config for a port
* Fixes to get generate_golden_config work when this run for a non macsec case in t2 topo
* Add macsec support in acstests and saitests
* Loop for count of packets to be sent as we need to increment PN
* We need to import macsec to override send_packet and dp_poll
* Changes moved to a different PR : sonic-net#17530
* Remove redundant macsec.py files - make it all point to ansible/roles/test/files/ptftests/macsec.py
* Take care of T0 macsec tests as well, so that t0-sonic is fine
* Additional fix to support multiple profile names given as input
* Use the right command KEYS instead of HGET
* Update comment, use macsec_card to set MacSecEnabled in DeviceMetadata
* Skip ACL egress tests when run on macsec enabled toplogy with braodcom DNX

Signed-off-by: opcoder0 <[email protected]>
AharonMalkin pushed a commit to AharonMalkin/sonic-mgmt that referenced this pull request Dec 16, 2025
…enabled topology. (sonic-net#17087)

* Fixes found during nightly run with macsec enabled topology
* Ffix for copp pfc voq ptftests
* Fix the port_number to port_id things again
* Fixes for acl tests, changes in config reload to pass override option if macsec is anebled, introduce the force_reload option if we need to reload macsec config for a port
* Fixes to get generate_golden_config work when this run for a non macsec case in t2 topo
* Add macsec support in acstests and saitests
* Loop for count of packets to be sent as we need to increment PN
* We need to import macsec to override send_packet and dp_poll
* Changes moved to a different PR : sonic-net#17530
* Remove redundant macsec.py files - make it all point to ansible/roles/test/files/ptftests/macsec.py
* Take care of T0 macsec tests as well, so that t0-sonic is fine
* Additional fix to support multiple profile names given as input
* Use the right command KEYS instead of HGET
* Update comment, use macsec_card to set MacSecEnabled in DeviceMetadata
* Skip ACL egress tests when run on macsec enabled toplogy with braodcom DNX

Signed-off-by: Aharon Malkin <[email protected]>
gshemesh2 pushed a commit to gshemesh2/sonic-mgmt that referenced this pull request Dec 21, 2025
gshemesh2 pushed a commit to gshemesh2/sonic-mgmt that referenced this pull request Dec 21, 2025
…enabled topology. (sonic-net#17087)

* Fixes found during nightly run with macsec enabled topology
* Ffix for copp pfc voq ptftests
* Fix the port_number to port_id things again
* Fixes for acl tests, changes in config reload to pass override option if macsec is anebled, introduce the force_reload option if we need to reload macsec config for a port
* Fixes to get generate_golden_config work when this run for a non macsec case in t2 topo
* Add macsec support in acstests and saitests
* Loop for count of packets to be sent as we need to increment PN
* We need to import macsec to override send_packet and dp_poll
* Changes moved to a different PR : sonic-net#17530
* Remove redundant macsec.py files - make it all point to ansible/roles/test/files/ptftests/macsec.py
* Take care of T0 macsec tests as well, so that t0-sonic is fine
* Additional fix to support multiple profile names given as input
* Use the right command KEYS instead of HGET
* Update comment, use macsec_card to set MacSecEnabled in DeviceMetadata
* Skip ACL egress tests when run on macsec enabled toplogy with braodcom DNX

Signed-off-by: Guy Shemesh <[email protected]>
gshemesh2 pushed a commit to gshemesh2/sonic-mgmt that referenced this pull request Jan 26, 2026
gshemesh2 pushed a commit to gshemesh2/sonic-mgmt that referenced this pull request Jan 26, 2026
…enabled topology. (sonic-net#17087)

* Fixes found during nightly run with macsec enabled topology
* Ffix for copp pfc voq ptftests
* Fix the port_number to port_id things again
* Fixes for acl tests, changes in config reload to pass override option if macsec is anebled, introduce the force_reload option if we need to reload macsec config for a port
* Fixes to get generate_golden_config work when this run for a non macsec case in t2 topo
* Add macsec support in acstests and saitests
* Loop for count of packets to be sent as we need to increment PN
* We need to import macsec to override send_packet and dp_poll
* Changes moved to a different PR : sonic-net#17530
* Remove redundant macsec.py files - make it all point to ansible/roles/test/files/ptftests/macsec.py
* Take care of T0 macsec tests as well, so that t0-sonic is fine
* Additional fix to support multiple profile names given as input
* Use the right command KEYS instead of HGET
* Update comment, use macsec_card to set MacSecEnabled in DeviceMetadata
* Skip ACL egress tests when run on macsec enabled toplogy with braodcom DNX

Signed-off-by: Guy Shemesh <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants