diff options
author | Jan Gelety <jgelety@cisco.com> | 2018-01-23 12:19:42 +0100 |
---|---|---|
committer | Maciek Konstantynowicz <mkonstan@cisco.com> | 2018-01-25 12:37:27 +0000 |
commit | 93907196951677ebaa47b9a384eee118cc2fad45 (patch) | |
tree | 80cb9fe9b4edcb33fc3ed4f0e1ea1b17483a3405 /docs/report | |
parent | f4cd1c230a2328fd647fd88da5d9149fbad556e3 (diff) |
CSIT 1801 report update
- func csit release notes
- func test environment
- perf csit release notes
Change-Id: I2cfd56585c646bc4553fe80afd8208dd7a01be30
Signed-off-by: Jan Gelety <jgelety@cisco.com>
Signed-off-by: Maciek Konstantynowicz <mkonstan@cisco.com>
Diffstat (limited to 'docs/report')
3 files changed, 16 insertions, 22 deletions
diff --git a/docs/report/vpp_functional_tests/csit_release_notes.rst b/docs/report/vpp_functional_tests/csit_release_notes.rst index 95f09eecfc..1eb3b9705f 100644 --- a/docs/report/vpp_functional_tests/csit_release_notes.rst +++ b/docs/report/vpp_functional_tests/csit_release_notes.rst @@ -6,18 +6,12 @@ Changes in CSIT |release| #. VPP functional test framework changes: - - Upgrade of tb4-virl3 host; - - - OS version to Ubuntu 16.04.02; - - - VIRL version to Mitaka; + - improved stability of tests with nested-VM and QEMU; #. Code updates and optimizations in CSIT functional framework: - - Traffic scripts adapted to ignore received unexpected ICMPv6 Neighbor - Discovery - Neighbor Solicitation packets; - - - Refactor of L1 robot keywords - Python libraries; + - IPSecSW tests - Software based IPSec encryption with CBC-SHA1 and + CBC-SHA ciphers, in combination with IPv4 routed-forwarding; Known Issues ------------ @@ -50,6 +44,3 @@ Here is the list of known issues in CSIT |release| for VPP functional tests in V | | | | reconnect. It requires moving CSIT VIRL environment | | | | | to QEMU 2.7.0. | +---+-------------------------------------------------+----------+------------------------------------------------------+ -| 6 | IPSEC: Tests cover old crypto code path | CSIT-733 | There are used default conf settings so IPSEC tests | -| | | | use old security code not the new Crypto SW code. | -+---+-------------------------------------------------+----------+------------------------------------------------------+ diff --git a/docs/report/vpp_functional_tests/test_environment.rst b/docs/report/vpp_functional_tests/test_environment.rst index a4209ed7ae..5b29b2d80b 100644 --- a/docs/report/vpp_functional_tests/test_environment.rst +++ b/docs/report/vpp_functional_tests/test_environment.rst @@ -6,6 +6,7 @@ VIRL testbed infrastructure consists of three VIRL hosts: - All hosts are Cisco UCS C240-M4 (2x Intel(R) Xeon(R) CPU E5-2699 v3 @2.30GHz,
18c, 512GB RAM)
+
- tb4-virl1:
- Status: Production
@@ -22,10 +23,10 @@ VIRL testbed infrastructure consists of three VIRL hosts: - tb4-virl3:
- - Status: Production
- - OS: Ubuntu 14.04.3
- - STD server version 0.10.24.7
- - UWM server version 0.10.24.7
+ - Status: Testing
+ - OS: Ubuntu 16.04.2
+ - STD server version 0.10.32.19
+ - UWM server version 0.10.32.19
Whenever a patch is submitted to gerrit for review, parallel VIRL simulations
are started to reduce the time of execution of all functional tests. The number
diff --git a/docs/report/vpp_performance_tests/csit_release_notes.rst b/docs/report/vpp_performance_tests/csit_release_notes.rst index 54275314e3..27b87c50e8 100644 --- a/docs/report/vpp_performance_tests/csit_release_notes.rst +++ b/docs/report/vpp_performance_tests/csit_release_notes.rst @@ -22,17 +22,19 @@ Changes in CSIT |release| - **VPP TCP/IP stack**
- Added tests for VPP TCP/IP stack using VPP built-in HTTP server.
- WRK traffic generator is used as a client-side.
+ WRK traffic generator is used as a client-side;
- **SRv6 tests**
- - Initial SRv6 tests verifying performance of SRv6 encapsulation and
- decapsulation and SID lookups.
+ - Initial SRv6 (Segment Routing IPv6) tests verifying performance of
+ IPv6 and SRH (Segment Routing Header) encapsulation, decapsulation,
+ lookups and rewrites based on configured End and End.DX6 SRv6 egress
+ functions;
- **IPSecSW tests**
- SW computed IPSec encryption with AES-GCM, CBC-SHA1 ciphers, in
- combination with IPv4 routed-forwarding.
+ combination with IPv4 routed-forwarding;
#. Presentation and Analytics Layer
@@ -44,9 +46,9 @@ Changes in CSIT |release| - **Framework optimizations**
- - Ability to run CSIT framework on ARM architecture.
+ - Ability to run CSIT framework on ARM architecture;
- - Overall stability improvements.
+ - Overall stability improvements;
Performance Improvements
------------------------
|