blob: 36136a1c0b9846094bee220585c2c48d6160639d (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
|
##############################################################################
# Copyright (c) 2016 Juraj Linkes (Cisco) and others.
#
# All rights reserved. This program and the accompanying materials
# are made available under the terms of the Apache License, Version 2.0
# which accompanies this distribution, and is available at
# http://www.apache.org/licenses/LICENSE-2.0
##############################################################################
*** Settings ***
Library OperatingSystem
Library FDSLibrary.py
Variables ../data/test_data.py
*** Keywords ***
Ensure Flavor
${result} = Check Flavor Exists ${vm_flavor}
Return From Keyword If '${result}' == 'True'
Create Flavor ${vm_flavor} ram=768
${result} = Check Flavor Exists ${vm_flavor}
Should be True ${result}
Ensure Image
${result} = Check Image Exists ${vm_image}
Return From Keyword If '${result}' == 'True'
Create Image ${vm_image} /home/opnfv/functest/data/cirros-0.3.4-x86_64-disk.img
${result} = Check Image Exists ${vm_image}
Should be True ${result}
Create tenant network
&{response} = create network ${network_name}
log many &{response}
Set Suite Variable ${network_id} ${response.network['id']}
log ${network_id}
Create subnet without dhcp
&{response} = create subnet ${subnet_name} ${network_id} ${subnet_cidr} dhcp=False
log many &{response}
Set Suite Variable ${subnet_id} ${response.subnet['id']}
log ${subnet_id}
Create subnet with dhcp
&{response} = create subnet ${subnet_name} ${network_id} ${subnet_cidr} dhcp=True
log many &{response}
Set Suite Variable ${subnet_id} ${response.subnet['id']}
log ${subnet_id}
Create security group no default rules
[Arguments] ${name}
&{response} = create security group ${name}
log many &{response}
: FOR ${rule} IN @{response.security_group['security_group_rules']}
\ log ${rule}
\ log ${rule['id']}
\ delete security rule ${rule['id']}
[Return] ${response.security_group['id']}
Create security group rules
#def create_security_rule(self, sg_id, dir, eth, desc=None, proto=None, port_min=None, port_max=None, r_sg_id=None, r_prefix=None):
&{response} = create security rule ${sg_client} ingress ipv4
log many &{response}
&{response} = create security rule ${sg_client} egress' ipv4
log many &{response}
&{response} = create security rule ${sg_server} egress ipv4
log many &{response}
&{response} = create security rule ${sg_server} ingress ipv4 icmp
log many &{response}
Create port with ip
[Arguments] ${port_name} ${ip_address}
&{response} = create port ${port_name} ${network_id} ${subnet_id} ${ip_address}
log many &{response}
log ${response.port['id']}
[Return] ${response.port['id']}
Create vm
[Arguments] ${vm_name} ${port_ids} ${security_groups}=${None} ${userdata}=${None}
Log Many ${vm_name} ${vm_image} ${vm_flavor} ${port_ids} ${userdata}
${response} = create server ${vm_name} ${vm_image} ${vm_flavor} ${port_ids} ${security_groups}
... ${userdata}
log many ${response}
log ${response.id}
[Return] ${response.id}
Check vm console
[Arguments] ${vm_id} ${string}
${response} = check server console ${vm_id} ${string}
[Return] ${response}
Poll vm
[Arguments] ${id} ${state}
poll server ${id} ${state}
Delete vm
[Arguments] ${id}
${response} = delete server ${id}
log ${response}
Poll vm ${id} ${None}
Delete ports
[Arguments] ${id}
${response} = delete port ${id}
log ${response}
Delete network
[Arguments] ${id}
${response} = delete net ${id}
log ${response}
|