blob: 6dd3166fdac250b6c96c1de4613bcf816e71cac2 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
|
##############################################################################
# Copyright (c) 2017 Tomas Cechvala (Cisco) and others.
#
# All rights reserved. This program and the accompanying materials
# are made available under the terms of the Apache License, Version 2.0
# which accompanies this distribution, and is available at
# http://www.apache.org/licenses/LICENSE-2.0
##############################################################################
*** Settings ***
Library OperatingSystem
Library lib/FDSLibrary.py
Variables data/test_data.py
Resource lib/Keywords.robot
Suite Setup Setup Suite
Suite Teardown Teardown Suite
*** Variables ***
*** Test Cases ***
Create network for VMs
Create tenant network
Create subnet with dhcp for VMs
Create subnet with dhcp
Create sec groups
${result} = Create security group no default rules ${sg_server}
Set Suite Variable ${SEC_GR_SERVER} ${result}
${result} = Create security group no default rules ${sg_client}
Set Suite Variable ${SEC_GR_CLIENT} ${result}
Create sec rules
Wait Until Keyword Succeeds 3x 3s create security rule ${SEC_GR_CLIENT} egress ipv4
Wait Until Keyword Succeeds 3x 3s create security rule ${SEC_GR_CLIENT} ingress ipv4
Wait Until Keyword Succeeds 3x 3s create security rule ${SEC_GR_SERVER} egress ipv4
Wait Until Keyword Succeeds 3x 3s create security rule ${SEC_GR_SERVER} ingress ipv4 proto=icmp
Create port for VM1
${security_groups} = Create List ${SEC_GR_SERVER}
${result} = Create port with ip ${port1_name} ${vm1_address} ${security_groups}
Set Suite Variable ${port1_id} ${result}
Create port for VM2
${security_groups} = Create List ${SEC_GR_CLIENT}
${result} = Create port with ip ${port2_name} ${vm2_address} ${security_groups}
Set Suite Variable ${port2_id} ${result}
Create VM1
${port_ids} = Create List ${port1_id}
${result} = Create vm ${vm1_name} ${port_ids} userdata=${userdata1}
Set Suite Variable ${vm1_id} ${result}
Wait for VM1 to be active
Should Be True $vm1_id is not $None
Poll vm ${vm1_id} active
Create VM2
${port_ids} = Create List ${port2_id}
${result} = Create vm ${vm2_name} ${port_ids} userdata=${userdata2}
Set Suite Variable ${vm2_id} ${result}
Wait for VM2 to be active
Should Be True $vm2_id is not $None
Poll vm ${vm2_id} active
Check VM2 userdata
${result} = Check vm console ${vm2_id} PASSED
Should Be True ${result}
Modify policy
Wait Until Keyword Succeeds 3x 3s create security rule ${SEC_GR_SERVER} ingress ipv4 proto=tcp port_min=80 port_max=80
Check VM2 userdata again
${result} = Check vm console ${vm2_id} curl_passed
Should Be True ${result}
*** Keywords ***
Setup Suite
Set Suite Variable ${network_id} ${None}
Set Suite Variable ${subnet_id} ${None}
Set Suite Variable ${port1_id} ${None}
Set Suite Variable ${port2_id} ${None}
Set Suite Variable ${vm1_id} ${None}
Set Suite Variable ${vm2_id} ${None}
Set Suite Variable ${SEC_GR_SERVER} ${None}
Set Suite Variable ${SEC_GR_CLIENT} ${None}
Ensure Image
Ensure Flavor
Teardown Suite
Run Keyword If $vm1_id is not $None Delete vm ${vm1_id}
Run Keyword If $vm2_id is not $None Delete vm ${vm2_id}
Run Keyword If $port1_id is not $None Delete ports ${port1_id}
Run Keyword If $port2_id is not $None Delete ports ${port2_id}
Run Keyword If $network_id is not $None Delete network ${network_id}
Run Keyword If $SEC_GR_SERVER is not $None delete security group ${SEC_GR_SERVER}
Run Keyword If $SEC_GR_CLIENT is not $None delete security group ${SEC_GR_CLIENT}
|