Skip to content

Commit

Permalink
Merge branch 'pr_ci_automation2' of https://github.com/hubogee/testing
Browse files Browse the repository at this point in the history
…into pr_ci_automation2
  • Loading branch information
hubogee committed Jun 21, 2024
2 parents d3054c4 + f6f609d commit 6367c23
Show file tree
Hide file tree
Showing 140 changed files with 4,160 additions and 0 deletions.
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
#
# ISC dhcpd configuration
#


option domain-name "dentlab-agg1";
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
dentlab-agg1
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
127.0.0.1 localhost
::1 localhost ip6-localhost ip6-loopback
ff02::1 ip6-allnodes
ff02::2 ip6-allrouters
127.0.1.1 dentlab-agg1
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
#
# ONL format of dent interfaces
#
# This file describes the network interfaces available on your system
# and how to activate them. For more information, see interfaces(5).

source /etc/network/interfaces.d/*.intf

# The loopback network interface
auto lo
iface lo inet loopback
address 20.20.0.1/32

# The management interface
auto ma1
iface ma1 inet dhcp
Original file line number Diff line number Diff line change
@@ -0,0 +1,59 @@
# /etc/ntp.conf, configuration for ntpd; see ntp.conf(5) for help


driftfile /var/lib/ntp/ntp.drift


# Enable this if you want statistics to be logged.
#statsdir /var/log/ntpstats/

statistics loopstats peerstats clockstats
filegen loopstats file loopstats type day enable
filegen peerstats file peerstats type day enable
filegen clockstats file clockstats type day enable


# You do need to talk to an NTP server or two (or three).
#server ntp.your-provider.example


# pool.ntp.org maps to about 1000 low-stratum NTP servers. Your server will
# pick a different set every time it starts up. Please consider joining the
# pool: <http://www.pool.ntp.org/join.html>
#

# Access control configuration; see /usr/share/doc/ntp-doc/html/accopt.html for
# details. The web page <http://support.ntp.org/bin/view/Support/AccessRestrictions>
# might also be helpful.
#
# Note that "restrict" applies to both servers and clients, so a configuration
# that might be intended to block requests from certain clients could also end
# up blocking replies from your own upstream servers.

# By default, exchange time with everybody, but don't allow configuration.
restrict -4 default kod notrap nomodify nopeer noquery
restrict -6 default kod notrap nomodify nopeer noquery

# Local users may interrogate the ntp server more closely.
restrict 127.0.0.1
restrict ::1

# Clients from this (example!) subnet have unlimited access, but only if
# cryptographically authenticated.
#restrict 192.168.123.0 mask 255.255.255.0 notrust


# If you want to provide time to your local subnet, change the next line.
# (Again, the address is an example only.)
#broadcast 192.168.123.255

# If you want to listen to time broadcasts on your local subnet, de-comment the
# next lines. Please do this only if you trust everybody on the network!
#disable auth
#broadcastclient

# Specify interfaces, don't listen on switch ports
#interface listen ma1
interface listen lo
interface listen lo:0
interface listen dummy0
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
username cumulus nopassword
!
service integrated-vtysh-config
!
log timestamp precision 6
!
no zebra nexthop kernel enable
!
line vty
!
end
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
# This file tells the quagga package which daemons to start.
#
# Entries are in the format: <daemon>=(yes|no|priority)
# 0, "no" = disabled
# 1, "yes" = highest priority
# 2 .. 10 = lower priorities
# Read /usr/share/doc/quagga/README.Debian for details.
#
# Sample configurations for these daemons can be found in
# /usr/share/doc/quagga/examples/.
#
# ATTENTION:
#
# When activation a daemon at the first time, a config file, even if it is
# empty, has to be present *and* be owned by the user and group "quagga", else
# the daemon will not be started by /etc/init.d/quagga. The permissions should
# be u=rw,g=r,o=.
# When using "vtysh" such a config file is also needed. It should be owned by
# group "quaggavty" and set to ug=rw,o= though. Check /etc/pam.d/quagga, too.
#
# The watchquagga daemon is always started. Per default in monitoring-only but
# that can be changed via /etc/quagga/debian.conf.
#
zebra=yes
bgpd=yes
ospfd=no
ospf6d=no
ripd=no
ripngd=no
isisd=no
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
username cumulus nopassword
!
service integrated-vtysh-config
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
nameserver 8.8.8.8
Original file line number Diff line number Diff line change
@@ -0,0 +1,88 @@
# Package generated configuration file
# See the sshd_config(5) manpage for details

# What ports, IPs and protocols we listen for
Port 22
# Use these options to restrict which interfaces/protocols sshd will bind to
#ListenAddress ::
ListenAddress 0.0.0.0
Protocol 2
# HostKeys for protocol version 2
HostKey /etc/ssh/ssh_host_rsa_key
HostKey /etc/ssh/ssh_host_dsa_key
HostKey /etc/ssh/ssh_host_ecdsa_key
HostKey /etc/ssh/ssh_host_ed25519_key
#Privilege Separation is turned on for security
UsePrivilegeSeparation yes

# Lifetime and size of ephemeral version 1 server key
KeyRegenerationInterval 3600
ServerKeyBits 1024

# Logging
SyslogFacility AUTH
LogLevel INFO

# Authentication:
LoginGraceTime 120
PermitRootLogin yes
StrictModes yes

RSAAuthentication yes
PubkeyAuthentication yes
#AuthorizedKeysFile %h/.ssh/authorized_keys

# Don't read the user's ~/.rhosts and ~/.shosts files
IgnoreRhosts yes
# For this to work you will also need host keys in /etc/ssh_known_hosts
RhostsRSAAuthentication no
# similar for protocol version 2
HostbasedAuthentication no
# Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication
#IgnoreUserKnownHosts yes

# To enable empty passwords, change to yes (NOT RECOMMENDED)
PermitEmptyPasswords no

# Change to yes to enable challenge-response passwords (beware issues with
# some PAM modules and threads)
ChallengeResponseAuthentication no

# Change to no to disable tunnelled clear text passwords
PasswordAuthentication yes

# Kerberos options
#KerberosAuthentication no
#KerberosGetAFSToken no
#KerberosOrLocalPasswd yes
#KerberosTicketCleanup yes

# GSSAPI options
#GSSAPIAuthentication no
#GSSAPICleanupCredentials yes

X11Forwarding yes
X11DisplayOffset 10
PrintMotd no
PrintLastLog yes
TCPKeepAlive yes
#UseLogin no

#MaxStartups 10:30:60
#Banner /etc/issue.net

# Allow client to pass locale environment variables
AcceptEnv LANG LC_*

Subsystem sftp /usr/lib/openssh/sftp-server

# Set this to 'yes' to enable PAM authentication, account processing,
# and session processing. If this is enabled, PAM authentication will
# be allowed through the ChallengeResponseAuthentication and
# PasswordAuthentication. Depending on your PAM configuration,
# PAM authentication via ChallengeResponseAuthentication may bypass
# the setting of "PermitRootLogin without-password".
# If you just want the PAM account and session checks to run without
# PAM authentication, then enable this but set PasswordAuthentication
# and ChallengeResponseAuthentication to 'no'.
UsePAM yes
Original file line number Diff line number Diff line change
@@ -0,0 +1,60 @@
{
"devices": [
{
"friendlyName":"Dent agg1",
"os":"dentos",
"type" : "INFRA_SWITCH",
"hostName": "agg1",
"model": "arm64-accton-as5114-48x-r0",
"ip": "10.36.118.44",
"login":{
"userName":"root",
"password":"onl"
},
"cpuArchitecture": "arm",
"macAddress": "34:EF:B6:EC:38:02",
"serialConsole": {
"ip": "10.36.118.200",
"port": 7005
},
"pdu": {
"ip": "10.36.118.201",
"login": "dent",
"password": "dent123!",
"number": 5
},
"serialDev":"/dev/ttyUSB0",
"baudrate": 115200,
"mediaMode":"fiber",
"links" : [
["swp5", "agg1:swp6"],
["swp7", "agg1:swp8"],
["swp9", "agg1:swp10"]
]
},
{
"friendlyName":"Ixia Traffic Generator",
"os":"ixnetwork",
"type" : "TRAFFIC_GENERATOR",
"hostName": "ixia",
"model": "Novus10G",
"ip": "10.36.118.111",
"login":{
"userName":"admin",
"password":"admin"
},
"serialDev":"/dev/ttyUSBXX",
"baudrate": 115200,
"mediaMode":"mixed",
"links" : [
["10.36.118.199:1:5", "agg1:swp1", "fiber"],
["10.36.118.199:1:6", "agg1:swp2", "fiber"],
["10.36.118.199:1:7", "agg1:swp3", "fiber"],
["10.36.118.199:1:8", "agg1:swp4", "fiber"]
]
}
],
"operator" : "dent",
"topology" : "bachelor",
"force_discovery" : false
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
#
# ISC dhcpd configuration
#


option domain-name "dentlab-agg2";
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
dentlab-agg2
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
127.0.0.1 localhost
::1 localhost ip6-localhost ip6-loopback
ff02::1 ip6-allnodes
ff02::2 ip6-allrouters
127.0.1.1 dentlab-agg2
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
#
# ONL format of dent interfaces
#
# This file describes the network interfaces available on your system
# and how to activate them. For more information, see interfaces(5).

source /etc/network/interfaces.d/*.intf

# The loopback network interface
auto lo
iface lo inet loopback
address 20.20.0.1/32

# The management interface
auto ma1
iface ma1 inet dhcp
Original file line number Diff line number Diff line change
@@ -0,0 +1,59 @@
# /etc/ntp.conf, configuration for ntpd; see ntp.conf(5) for help


driftfile /var/lib/ntp/ntp.drift


# Enable this if you want statistics to be logged.
#statsdir /var/log/ntpstats/

statistics loopstats peerstats clockstats
filegen loopstats file loopstats type day enable
filegen peerstats file peerstats type day enable
filegen clockstats file clockstats type day enable


# You do need to talk to an NTP server or two (or three).
#server ntp.your-provider.example


# pool.ntp.org maps to about 1000 low-stratum NTP servers. Your server will
# pick a different set every time it starts up. Please consider joining the
# pool: <http://www.pool.ntp.org/join.html>
#

# Access control configuration; see /usr/share/doc/ntp-doc/html/accopt.html for
# details. The web page <http://support.ntp.org/bin/view/Support/AccessRestrictions>
# might also be helpful.
#
# Note that "restrict" applies to both servers and clients, so a configuration
# that might be intended to block requests from certain clients could also end
# up blocking replies from your own upstream servers.

# By default, exchange time with everybody, but don't allow configuration.
restrict -4 default kod notrap nomodify nopeer noquery
restrict -6 default kod notrap nomodify nopeer noquery

# Local users may interrogate the ntp server more closely.
restrict 127.0.0.1
restrict ::1

# Clients from this (example!) subnet have unlimited access, but only if
# cryptographically authenticated.
#restrict 192.168.123.0 mask 255.255.255.0 notrust


# If you want to provide time to your local subnet, change the next line.
# (Again, the address is an example only.)
#broadcast 192.168.123.255

# If you want to listen to time broadcasts on your local subnet, de-comment the
# next lines. Please do this only if you trust everybody on the network!
#disable auth
#broadcastclient

# Specify interfaces, don't listen on switch ports
#interface listen ma1
interface listen lo
interface listen lo:0
interface listen dummy0
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
username cumulus nopassword
!
service integrated-vtysh-config
!
log timestamp precision 6
!
no zebra nexthop kernel enable
!
line vty
!
end
Loading

0 comments on commit 6367c23

Please sign in to comment.