From 39478740801049201d3fa9164dcfabdada3ce5f2 Mon Sep 17 00:00:00 2001 From: Bryan Sullivan Date: Mon, 14 Dec 2015 08:26:03 -0800 Subject: Initial versions of adhoc tests and test server setup JIRA: COPPER-4 Change-Id: Ia999801b5782642aa7044983268ba1e6cc256c5c Signed-off-by: Bryan Sullivan --- tests/adhoc/dmz01.sh | 86 ++++++++++++++++++++++++++++++++++++++++++++ tests/adhoc/smoke01-clean.sh | 48 +++++++++++++++++++++++++ tests/adhoc/smoke01.sh | 58 ++++++++++++++++++++++++++++++ 3 files changed, 192 insertions(+) create mode 100644 tests/adhoc/dmz01.sh create mode 100644 tests/adhoc/smoke01-clean.sh create mode 100644 tests/adhoc/smoke01.sh (limited to 'tests/adhoc') diff --git a/tests/adhoc/dmz01.sh b/tests/adhoc/dmz01.sh new file mode 100644 index 0000000..8854ca2 --- /dev/null +++ b/tests/adhoc/dmz01.sh @@ -0,0 +1,86 @@ +#!/bin/bash +# Copyright 2015 Open Platform for NFV Project, Inc. and its contributors +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# + +# What this is: An OpenStack Congress policy test. Sets up and validates policy +# creation and execution for: +# 1) Identifying VMs connected to a DMZ (currently identified through a +# specifically-named security group) +# 2) Identifying VMs connected per (1), which are by policy not allowed to be +# (currently implemented through an image tag intended to identify images +# that are "authorized" i.e. tested and secure, to be DMZ-connected) +# +# Status: this is a work in progress, under test. Test (1) has been verified, +# Test (2) is still in development. +# +# How to use: +# Install test server per https://wiki.opnfv.org/copper/academy/congress/test +# $ source ~/git/copper/tests/adhoc/dmz01.sh +# After test, cleanup with (not yet implemented) +# $ source ~/git/copper/tests/adhoc/dmz01-clean.sh + +set -x #echo on + +source ~/admin-openrc.sh + +glance --os-image-api-version 1 image-create --name cirros-0.3.3-x86_64-dmz --disk-format qcow2 --location http://download.cirros-cloud.net/0.3.3/cirros-0.3.3-x86_64-disk.img --container-format bare + +IMAGE_ID=$(glance image-list | awk "/ cirros-0.3.3-x86_64-dmz / { print \$2 }") + +glance --os-image-api-version 2 image-tag-update $IMAGE_ID "dmz" + +neutron net-create public --router:external=true --provider:network_type=flat --provider:physical_network=physnet1 + +neutron subnet-create --disable-dhcp public 192.168.10.0/24 + +neutron net-create internal + +neutron subnet-create internal 10.0.0.0/24 --name internal --gateway 10.0.0.1 --enable-dhcp --allocation-pool start=10.0.0.2,end=10.0.0.254 --dns-nameserver 8.8.8.8 + +neutron router-create external + +neutron router-gateway-set external public + +neutron router-interface-add external subnet=internal + +INTERNAL_NET=$(neutron net-list | awk "/ internal / { print \$2 }") + +neutron security-group-create dmz + +neutron security-group-rule-create --direction ingress dmz + +nova boot --flavor m1.tiny --image cirros-0.3.3-x86_64 --nic net-id=$INTERNAL_NET --security-groups dmz cirros1 + +nova boot --flavor m1.tiny --image cirros-0.3.3-x86_64-dmz --nic net-id=$INTERNAL_NET --security-groups dmz cirros2 + +openstack congress policy create test + +openstack congress policy rule create test "dmz_server(x) :- nova:servers(id=x,status='ACTIVE'), neutronv2:ports(id, device_id, status='ACTIVE'), neutronv2:security_group_port_bindings(pid, sg), neutronv2:security_groups(sg,name='dmz')" --name dmz_server + +# currently failing "Rule already exists::An unknown exception occurred. (HTTP 409)..." +openstack congress policy rule create test "dmz_placement_error(id) :- nova:servers( +id,name,hostId,status,tenant_id,user_id,image,flavor,OS1,OS2), not glance:images(image,tags='dmz'), dmz_server(x)" --name dmz_placement_error + +# validated rules created during test development +# openstack congress policy rule create test "active_servers(x) :- nova:servers(id=x, status='ACTIVE')" --name active_servers +# openstack congress policy rule create test "dmz_port(id) :- neutronv2:security_group_port_bindings(id,sg), neutronv2:security_groups(sg,name='dmz')" --name dmz_port +# +# rules under test +# openstack congress policy rule create test "cirros(x) :- glance:images(id=x,name='cirros-0.3.3-x86_64')" --name cirros +# openstack congress policy rule create test "image_notags(x) :- glance:images(id=x,tags='')" --name image_notags +# to remove a policy rule +# openstack congress policy rule delete test nondmz_image + +set +x #echo off diff --git a/tests/adhoc/smoke01-clean.sh b/tests/adhoc/smoke01-clean.sh new file mode 100644 index 0000000..c50d667 --- /dev/null +++ b/tests/adhoc/smoke01-clean.sh @@ -0,0 +1,48 @@ +#!/bin/bash +set -x #echo on + +instance=$(nova list | awk "/ cirros1 / { print \$2 }") +if [ "$instance" != "" ]; then nova delete $instance +fi + +instance=$(nova list | awk "/ cirros2 / { print \$2 }") +if [ "$instance" != "" ]; then nova delete $instance +fi + +router=$(neutron router-list | awk "/ external / { print \$2 }") + +internal_interface=$(neutron router-port-list $router | grep 10.0.0.1 | awk '{print $2}') + +if [ "$internal_interface" != "" ]; then neutron router-interface-delete $router port=$internal_interface +fi + +public_interface=$(neutron router-port-list $router | grep 191.168.10.2 | awk '{print $2}') + +if [ "$public_interface" != "" ]; then neutron router-interface-delete $router port=$public_interface +fi + +neutron router-interface-delete $router $internal_interface + +neutron router-gateway-clear external + +neutron router-delete external + +port=$(neutron port-list | awk "/ 10.0.0.1 / { print \$2 }") + +if [ "$port" != "" ]; then neutron port-delete $port +fi + +port=$(neutron port-list | awk "/ 10.0.0.2 / { print \$2 }") + +if [ "$port" != "" ]; then neutron port-delete $port +fi + +neutron subnet-delete internal + +neutron net-delete internal + +neutron subnet-delete public + +neutron net-delete public + +set +x #echo off diff --git a/tests/adhoc/smoke01.sh b/tests/adhoc/smoke01.sh new file mode 100644 index 0000000..911fabb --- /dev/null +++ b/tests/adhoc/smoke01.sh @@ -0,0 +1,58 @@ +#!/bin/bash +# Copyright 2015 Open Platform for NFV Project, Inc. and its contributors +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# + +# What this is: A basic test to validate an OPNFV install. Creates an image, +# public and private networks, a router, and launches two VMs connected to the +# private network and thru the router, to the internet. +# +# Status: this is a work in progress, under test. Automated ping test to the +# internet and between VMs has not yet been implemented. +# +# How to use: +# Install test server per https://wiki.opnfv.org/copper/academy/congress/test +# $ source ~/git/copper/tests/adhoc/smoke01.sh +# After test, cleanup with +# $ source ~/git/copper/tests/adhoc/smoke01-clean.sh + +set -x #echo on + +source ~/admin-openrc.sh + +openstack service list + +glance --os-image-api-version 1 image-create --name cirros-0.3.3-x86_64 --disk-format qcow2 --location http://download.cirros-cloud.net/0.3.3/cirros-0.3.3-x86_64-disk.img --container-format bare + +neutron net-create public --router:external=true --provider:network_type=flat --provider:physical_network=physnet1 + +neutron subnet-create --disable-dhcp public 192.168.10.0/24 + +neutron net-create internal + +neutron subnet-create internal 10.0.0.0/24 --name internal --gateway 10.0.0.1 --enable-dhcp --allocation-pool start=10.0.0.2,end=10.0.0.254 --dns-nameserver 8.8.8.8 + +neutron router-create external + +neutron router-gateway-set external public + +neutron router-interface-add external subnet=internal + +INTERNAL_NET=$(neutron net-list | awk "/ internal / { print \$2 }") + +nova boot --flavor m1.tiny --image cirros-0.3.3-x86_64 --nic net-id=$INTERNAL_NET cirros1 + +nova boot --flavor m1.tiny --image cirros-0.3.3-x86_64 --nic net-id=$INTERNAL_NET cirros2 + +set +x #echo off -- cgit 1.2.3-korg