mirror of
https://git.proxmox.com/git/mirror_frr
synced 2025-05-29 07:35:33 +00:00
![]() fixes #13584 The test had the ospf client injecting multiple opaque LSAs on 5s pace, but the test itself verified and advanced on an LSA in the middle of that sequence and not the last one. Then the test reset the ospf client and originating router. If a later injected LSA managed to get in to the router and flooded prior to the client/router reset then the opaque data or sequence number could differ from the expected value. Signed-off-by: Christian Hopps <chopps@labn.net> |
||
---|---|---|
.. | ||
r1 | ||
r2 | ||
r3 | ||
r4 | ||
ctester.py | ||
lib | ||
test_ospf_clientapi.py |