summaryrefslogtreecommitdiffstats
path: root/docs/testing/user/testspecification/securitygroup
diff options
context:
space:
mode:
authorxudan <xudan16@huawei.com>2018-07-04 02:41:09 -0400
committerGeorg Kunz <georg.kunz@ericsson.com>2018-07-04 11:25:44 +0000
commit12aba80ab0cae835cf077c9592129070b401cf59 (patch)
tree9ba596a06c0b0e01dc14418f6f938e1cf4de4bf4 /docs/testing/user/testspecification/securitygroup
parent22f1f4b049736f1fa24ec3f5b7d1248c93bbb6ea (diff)
Update all existing test specifications
1. Update the names of 2 vping test cases 2. Update the names of 8 ha test cases 3. Update the sub test cases within osinterop 2017.09 4. Split IPv6 into ipv6_api and ipv6_scenario 5. Update the names of sdnvpn test cases 6. Update the names of 4 tempest scenario test cases 7. Remove forwardingpackets JIRA: DOVETAIL-685 Change-Id: I0d91b8a0477576e18581eb2788fdb666063c89b7 Signed-off-by: xudan <xudan16@huawei.com>
Diffstat (limited to 'docs/testing/user/testspecification/securitygroup')
-rw-r--r--docs/testing/user/testspecification/securitygroup/index.rst453
1 files changed, 0 insertions, 453 deletions
diff --git a/docs/testing/user/testspecification/securitygroup/index.rst b/docs/testing/user/testspecification/securitygroup/index.rst
deleted file mode 100644
index 61aa1c4b..00000000
--- a/docs/testing/user/testspecification/securitygroup/index.rst
+++ /dev/null
@@ -1,453 +0,0 @@
-.. This work is licensed under a Creative Commons Attribution 4.0 International License.
-.. http://creativecommons.org/licenses/by/4.0
-.. (c) Huawei Technologies Co.,Ltd
-
-===================================================
-Security Group and Port Security test specification
-===================================================
-
-.. toctree::
- :maxdepth: 2
-
-Scope
-=====
-
-The security group and port security test area evaluates the ability of the
-system under test to support packet filtering by security group and port security.
-The tests in this test area will evaluate preventing MAC spoofing by port security,
-basic security group operations including testing cross/in tenant traffic, testing
-multiple security groups, using port security to disable security groups and
-updating security groups.
-
-References
-==========
-
-N/A
-
-Definitions and abbreviations
-=============================
-
-The following terms and abbreviations are used in conjunction with this test
-area
-
-- API - Application Programming Interface
-- ICMP - Internet Control Message Protocol
-- MAC - Media Access Control
-- NFVi - Network Functions Virtualization infrastructure
-- SSH - Secure Shell
-- TCP - Transmission Control Protocol
-- VIM - Virtual Infrastructure Manager
-- VM - Virtual Machine
-
-System Under Test (SUT)
-=======================
-
-The system under test is assumed to be the NFVi and VIM in operation on a
-Pharos compliant infrastructure.
-
-Test Area Structure
-===================
-
-The test area is structured based on the basic operations of security group and
-port security. Each test case is able to run independently, i.e. irrelevant of
-the state created by a previous test. Specifically, every test performs clean-up
-operations which return the system to the same state as before the test.
-
-All these test cases are included in the test case dovetail.tempest.tc002 of
-OVP test suite.
-
-Test Descriptions
-=================
-
-API Used and Reference
-----------------------
-
-Security Groups: https://developer.openstack.org/api-ref/network/v2/index.html#security-groups-security-groups
-
-- create security group
-- delete security group
-
-Networks: https://developer.openstack.org/api-ref/networking/v2/index.html#networks
-
-- create network
-- delete network
-- list networks
-- create floating ip
-- delete floating ip
-
-Routers and interface: https://developer.openstack.org/api-ref/networking/v2/index.html#routers-routers
-
-- create router
-- delete router
-- list routers
-- add interface to router
-
-Subnets: https://developer.openstack.org/api-ref/networking/v2/index.html#subnets
-
-- create subnet
-- list subnets
-- delete subnet
-
-Servers: https://developer.openstack.org/api-ref/compute/
-
-- create keypair
-- create server
-- delete server
-- add/assign floating ip
-
-Ports: https://developer.openstack.org/api-ref/networking/v2/index.html#ports
-
-- update port
-- list ports
-- show port details
-
---------------------------------------------
-Test Case 1 - Port Security and MAC Spoofing
---------------------------------------------
-
-Test case specification
------------------------
-
-tempest.scenario.test_network_basic_ops.TestNetworkBasicOps.test_port_security_macspoofing_port
-
-Test preconditions
-------------------
-
-* Neutron port-security extension API
-* Neutron security-group extension API
-* One public network
-
-Basic test flow execution description and pass/fail criteria
-------------------------------------------------------------
-
-Test execution
-''''''''''''''
-
-* Test action 1: Create a security group SG1, which has rules for allowing incoming
- SSH and ICMP traffic
-* Test action 2: Create a neutron network NET1
-* Test action 3: Create a tenant router R1 which routes traffic to public network
-* Test action 4: Create a subnet SUBNET1 and add it as router interface
-* Test action 5: Create a server VM1 with SG1 and NET1, and assign a floating ip
- FIP1 (via R1) to VM1
-* Test action 6: Verify can ping FIP1 successfully and can SSH to VM1 with FIP1
-* Test action 7: Create a second neutron network NET2 and subnet SUBNET2, and attach VM1 to NET2
-* Test action 8: Get VM1's ethernet interface NIC2 for NET2
-* Test action 9: Create second server VM2 on NET2
-* Test action 10: Verify VM1 is able to communicate with VM2 via NIC2
-* Test action 11: Login to VM1 and spoof the MAC address of NIC2 to "00:00:00:00:00:01"
-* Test action 12: Verify VM1 fails to communicate with VM2 via NIC2
-* **Test assertion 1:** The ping operation is failed
-* Test action 13: Update 'security_groups' to be none for VM1's NIC2 port
-* Test action 14: Update 'port_security_enable' to be False for VM1's NIC2 port
-* Test action 15: Verify now VM1 is able to communicate with VM2 via NIC2
-* **Test assertion 2:** The ping operation is successful
-* Test action 16: Delete SG1, NET1, NET2, SUBNET1, SUBNET2, R1, VM1, VM2 and FIP1
-
-Pass / fail criteria
-''''''''''''''''''''
-
-This test evaluates the ability to prevent MAC spoofing by using port security.
-Specifically, the test verifies that:
-
-* With port security, the ICMP packets from a spoof server cannot pass the port.
-
-* Without port security, the ICMP packets from a spoof server can pass the port.
-
-In order to pass this test, all test assertions listed in the test execution above need to pass.
-
-Post conditions
----------------
-
-N/A
-
-------------------------------------------------------
-Test Case 2 - Test Security Group Cross Tenant Traffic
-------------------------------------------------------
-
-Test case specification
------------------------
-
-tempest.scenario.test_security_groups_basic_ops.TestSecurityGroupsBasicOps.test_cross_tenant_traffic
-
-Test preconditions
-------------------
-
-* Neutron security-group extension API
-* Two tenants
-* One public network
-
-Basic test flow execution description and pass/fail criteria
-------------------------------------------------------------
-
-Test execution
-''''''''''''''
-
-* Test action 1: Create a neutron network NET1 for primary tenant
-* Test action 2: Create a primary tenant router R1 which routes traffic to public network
-* Test action 3: Create a subnet SUBNET1 and add it as router interface
-* Test action 4: Create 2 empty security groups SG1 and SG2 for primary tenant
-* Test action 5: Add a tcp rule to SG1
-* Test action 6: Create a server VM1 with SG1, SG2 and NET1, and assign a floating ip
- FIP1 (via R1) to VM1
-* Test action 7: Repeat test action 1 to 6 and create NET2, R2, SUBNET2, SG3, SG4,
- FIP2 and VM2 for an alt_tenant
-* Test action 8: Verify VM1 fails to communicate with VM2 through FIP2
-* **Test assertion 1:** The ping operation is failed
-* Test action 9: Add ICMP rule to SG4
-* Test action 10: Verify VM1 is able to communicate with VM2 through FIP2
-* **Test assertion 2:** The ping operation is successful
-* Test action 11: Verify VM2 fails to communicate with VM1 through FIP1
-* **Test assertion 3:** The ping operation is failed
-* Test action 12: Add ICMP rule to SG2
-* Test action 13: Verify VM2 is able to communicate with VM1 through FIP1
-* **Test assertion 4:** The ping operation is successful
-* Test action 14: Delete SG1, SG2, SG3, SG4, NET1, NET2, SUBNET1, SUBNET2, R1, R2,
- VM1, VM2, FIP1 and FIP2
-
-Pass / fail criteria
-''''''''''''''''''''
-
-This test evaluates the ability of the security group to filter packets cross tenant.
-Specifically, the test verifies that:
-
-* Without ICMP security group rule, the ICMP packets cannot be received by the server
- in another tenant which differs from the source server.
-
-* With ingress ICMP security group rule enabled only at tenant1, the server in tenant2
- can ping server in tenant1 but not the reverse direction.
-
-* With ingress ICMP security group rule enabled at tenant2 also, the ping works from both directions.
-
-In order to pass this test, all test assertions listed in the test execution above need to pass.
-
-Post conditions
----------------
-
-N/A
-
----------------------------------------------------
-Test Case 3 - Test Security Group in Tenant Traffic
----------------------------------------------------
-
-Test case specification
------------------------
-
-tempest.scenario.test_security_groups_basic_ops.TestSecurityGroupsBasicOps.test_in_tenant_traffic
-
-Test preconditions
-------------------
-
-* Neutron security-group extension API
-* One public network
-
-Basic test flow execution description and pass/fail criteria
-------------------------------------------------------------
-
-Test execution
-''''''''''''''
-
-* Test action 1: Create a neutron network NET1
-* Test action 2: Create a tenant router R1 which routes traffic to public network
-* Test action 3: Create a subnet SUBNET1 and add it as router interface
-* Test action 4: Create 2 empty security groups SG1 and SG2
-* Test action 5: Add a tcp rule to SG1
-* Test action 6: Create a server VM1 with SG1, SG2 and NET1, and assign a floating ip
- FIP1 (via R1) to VM1
-* Test action 7: Create second server VM2 with default security group and NET1
-* Test action 8: Verify VM1 fails to communicate with VM2 through VM2's fixed ip
-* **Test assertion 1:** The ping operation is failed
-* Test action 9: Add ICMP security group rule to default security group
-* Test action 10: Verify VM1 is able to communicate with VM2 through VM2's fixed ip
-* **Test assertion 2:** The ping operation is successful
-* Test action 11: Delete SG1, SG2, NET1, SUBNET1, R1, VM1, VM2 and FIP1
-
-Pass / fail criteria
-''''''''''''''''''''
-
-This test evaluates the ability of the security group to filter packets in one tenant.
-Specifically, the test verifies that:
-
-* Without ICMP security group rule, the ICMP packets cannot be received by the server
- in the same tenant.
-
-* With ICMP security group rule, the ICMP packets can be received by the server
- in the same tenant.
-
-In order to pass this test, all test assertions listed in the test execution above need to pass.
-
-Post conditions
----------------
-
-N/A
-
--------------------------------------------
-Test Case 4 - Test Multiple Security Groups
--------------------------------------------
-
-Test case specification
------------------------
-
-tempest.scenario.test_security_groups_basic_ops.TestSecurityGroupsBasicOps.test_multiple_security_groups
-
-Test preconditions
-------------------
-
-* Neutron security-group extension API
-* One public network
-
-Basic test flow execution description and pass/fail criteria
-------------------------------------------------------------
-
-Test execution
-''''''''''''''
-
-* Test action 1: Create a neutron network NET1
-* Test action 2: Create a tenant router R1 which routes traffic to public network
-* Test action 3: Create a subnet SUBNET1 and add it as router interface
-* Test action 4: Create 2 empty security groups SG1 and SG2
-* Test action 5: Add a tcp rule to SG1
-* Test action 6: Create a server VM1 with SG1, SG2 and NET1, and assign a floating ip
- FIP1 (via R1) to VM1
-* Test action 7: Verify failed to ping FIP1
-* **Test assertion 1:** The ping operation is failed
-* Test action 8: Add ICMP security group rule to SG2
-* Test action 9: Verify can ping FIP1 successfully
-* **Test assertion 2:** The ping operation is successful
-* Test action 10: Verify can SSH to VM1 with FIP1
-* **Test assertion 3:** Can SSH to VM1 successfully
-* Test action 11: Delete SG1, SG2, NET1, SUBNET1, R1, VM1 and FIP1
-
-Pass / fail criteria
-''''''''''''''''''''
-
-This test evaluates the ability of multiple security groups to filter packets.
-Specifically, the test verifies that:
-
-* A server with 2 security groups, one with TCP rule and without ICMP rule,
- cannot receive the ICMP packets sending from the tempest host machine.
-
-* A server with 2 security groups, one with TCP rule and the other with ICMP rule,
- can receive the ICMP packets sending from the tempest host machine and be connected
- via the SSH client.
-
-In order to pass this test, all test assertions listed in the test execution above need to pass.
-
-Post conditions
----------------
-
-N/A
-
--------------------------------------------------------
-Test Case 5 - Test Port Security Disable Security Group
--------------------------------------------------------
-
-Test case specification
------------------------
-
-tempest.scenario.test_security_groups_basic_ops.TestSecurityGroupsBasicOps.test_port_security_disable_security_group
-
-Test preconditions
-------------------
-
-* Neutron security-group extension API
-* Neutron port-security extension API
-* One public network
-
-Basic test flow execution description and pass/fail criteria
-------------------------------------------------------------
-
-Test execution
-''''''''''''''
-
-* Test action 1: Create a neutron network NET1
-* Test action 2: Create a tenant router R1 which routes traffic to public network
-* Test action 3: Create a subnet SUBNET1 and add it as router interface
-* Test action 4: Create 2 empty security groups SG1 and SG2
-* Test action 5: Add a tcp rule to SG1
-* Test action 6: Create a server VM1 with SG1, SG2 and NET1, and assign a floating ip
- FIP1 (via R1) to VM1
-* Test action 7: Create second server VM2 with default security group and NET1
-* Test action 8: Update 'security_groups' to be none and 'port_security_enabled' to be
- True for VM2's port
-* Test action 9: Verify VM1 fails to communicate with VM2 through VM2's fixed ip
-* **Test assertion 1:** The ping operation is failed
-* Test action 10: Update 'security_groups' to be none and 'port_security_enabled' to be
- False for VM2's port
-* Test action 11: Verify VM1 is able to communicate with VM2 through VM2's fixed ip
-* **Test assertion 2:** The ping operation is successful
-* Test action 12: Delete SG1, SG2, NET1, SUBNET1, R1, VM1, VM2 and FIP1
-
-Pass / fail criteria
-''''''''''''''''''''
-
-This test evaluates the ability of port security to disable security group.
-Specifically, the test verifies that:
-
-* The ICMP packets cannot pass the port whose 'port_security_enabled' is True
- and security_groups is none.
-
-* The ICMP packets can pass the port whose 'port_security_enabled' is False
- and security_groups is none.
-
-In order to pass this test, all test assertions listed in the test execution above need to pass.
-
-Post conditions
----------------
-
-N/A
-
----------------------------------------------
-Test Case 6 - Test Update Port Security Group
----------------------------------------------
-
-Test case specification
------------------------
-
-tempest.scenario.test_security_groups_basic_ops.TestSecurityGroupsBasicOps.test_port_update_new_security_group
-
-Test preconditions
-------------------
-
-* Neutron security-group extension API
-* One public network
-
-Basic test flow execution description and pass/fail criteria
-------------------------------------------------------------
-
-Test execution
-''''''''''''''
-
-* Test action 1: Create a neutron network NET1
-* Test action 2: Create a tenant router R1 which routes traffic to public network
-* Test action 3: Create a subnet SUBNET1 and add it as router interface
-* Test action 4: Create 2 empty security groups SG1 and SG2
-* Test action 5: Add a tcp rule to SG1
-* Test action 6: Create a server VM1 with SG1, SG2 and NET1, and assign a floating ip
- FIP1 (via R1) to VM1
-* Test action 7: Create third empty security group SG3
-* Test action 8: Add ICMP rule to SG3
-* Test action 9: Create second server VM2 with default security group and NET1
-* Test action 10: Verify VM1 fails to communicate with VM2 through VM2's fixed ip
-* **Test assertion 1:** The ping operation is failed
-* Test action 11: Update 'security_groups' to be SG3 for VM2's port
-* Test action 12: Verify VM1 is able to communicate with VM2 through VM2's fixed ip
-* **Test assertion 2:** The ping operation is successful
-* Test action 13: Delete SG1, SG2, SG3, NET1, SUBNET1, R1, VM1, VM2 and FIP1
-
-Pass / fail criteria
-''''''''''''''''''''
-
-This test evaluates the ability to update port with a new security group.
-Specifically, the test verifies that:
-
-* Without ICMP security group rule, the VM cannot receive ICMP packets.
-
-* Update the port's security group which has ICMP rule, the VM can receive ICMP packets.
-
-In order to pass this test, all test assertions listed in the test execution above need to pass.
-
-Post conditions
----------------
-
-N/A