summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorTim Irnich <tim.irnich@ericsson.com>2017-11-16 17:00:25 +0000
committerGerrit Code Review <gerrit@opnfv.org>2017-11-16 17:00:25 +0000
commitcd1dee3f51f98adf8fedb50eaa96f785b3a27fa1 (patch)
treef638711545cbae51102da57605d6010111400b3a
parente1372d3c4955a92f36bfb50ae5925dac2fc0b89c (diff)
parent9c6c8f91387b3037b13848ef0230f63a5d2f57c4 (diff)
Merge "add resync testcase"
-rw-r--r--sdnvpn/lib/utils.py17
-rw-r--r--sdnvpn/test/functest/config.yaml12
-rw-r--r--sdnvpn/test/functest/testcase_12.py224
3 files changed, 253 insertions, 0 deletions
diff --git a/sdnvpn/lib/utils.py b/sdnvpn/lib/utils.py
index 269a319..78493be 100644
--- a/sdnvpn/lib/utils.py
+++ b/sdnvpn/lib/utils.py
@@ -756,3 +756,20 @@ def get_ovs_groups(compute_node_list, ovs_br_list, of_protocol="OpenFlow13"):
cmd_out_lines += (compute_node.run_cmd(ovs_groups_cmd).strip().
split("\n"))
return cmd_out_lines
+
+
+def get_ovs_flows(compute_node_list, ovs_br_list, of_protocol="OpenFlow13"):
+ """
+ Gets, as input, a list of compute nodes and a list of OVS bridges
+ and returns the command console output, as a list of lines, that
+ contains all the OVS flows from all bridges and nodes in lists.
+ """
+ cmd_out_lines = []
+ for compute_node in compute_node_list:
+ for ovs_br in ovs_br_list:
+ if ovs_br in compute_node.run_cmd("sudo ovs-vsctl show"):
+ ovs_flows_cmd = ("sudo ovs-ofctl dump-flows {} -O {} | "
+ "grep table=".format(ovs_br, of_protocol))
+ cmd_out_lines += (compute_node.run_cmd(ovs_flows_cmd).strip().
+ split("\n"))
+ return cmd_out_lines
diff --git a/sdnvpn/test/functest/config.yaml b/sdnvpn/test/functest/config.yaml
index 2b26077..c50c619 100644
--- a/sdnvpn/test/functest/config.yaml
+++ b/sdnvpn/test/functest/config.yaml
@@ -177,3 +177,15 @@ testcases:
router_1_name: sdnvpn-11-1-router
secgroup_name: sdnvpn-sg
secgroup_descr: Security group for SDNVPN test cases
+
+ sdnvpn.test.functest.testcase_12:
+ enabled: true
+ description: Check Flows and Groups are reprogrammed after OVS reconnect
+ instance_1_name: sdnvpn-12-1
+ instance_2_name: sdnvpn-12-2
+ image_name: sdnvpn-image
+ net_1_name: sdnvpn-12-1-net
+ subnet_1_name: sdnvpn-12-1-subnet
+ subnet_1_cidr: 10.10.10.0/24
+ secgroup_name: sdnvpn-sg
+ secgroup_descr: Security group for SDNVPN test cases
diff --git a/sdnvpn/test/functest/testcase_12.py b/sdnvpn/test/functest/testcase_12.py
new file mode 100644
index 0000000..e6a7ac5
--- /dev/null
+++ b/sdnvpn/test/functest/testcase_12.py
@@ -0,0 +1,224 @@
+#!/usr/bin/python
+#
+# Copyright (c) 2017 All rights reserved
+# This program and the accompanying materials
+# are made available under the terms of the Apache License, Version 2.0
+# which accompanies this distribution, and is available at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+
+import logging
+import sys
+
+from functest.utils import openstack_utils as os_utils
+from sdnvpn.lib import config as sdnvpn_config
+from sdnvpn.lib import utils as test_utils
+from sdnvpn.lib.results import Results
+
+logger = logging.getLogger(__name__)
+
+COMMON_CONFIG = sdnvpn_config.CommonConfig()
+TESTCASE_CONFIG = sdnvpn_config.TestcaseConfig(
+ 'sdnvpn.test.functest.testcase_12')
+
+
+def main():
+ results = Results(COMMON_CONFIG.line_length)
+
+ results.add_to_summary(0, "=")
+ results.add_to_summary(2, "STATUS", "SUBTEST")
+ results.add_to_summary(0, "=")
+
+ nova_client = os_utils.get_nova_client()
+ neutron_client = os_utils.get_neutron_client()
+ glance_client = os_utils.get_glance_client()
+ openstack_nodes = test_utils.get_nodes()
+
+ (floatingip_ids, instance_ids, router_ids, network_ids, image_ids,
+ subnet_ids, interfaces, bgpvpn_ids) = ([] for i in range(8))
+
+ try:
+ image_id = os_utils.create_glance_image(
+ glance_client, TESTCASE_CONFIG.image_name,
+ COMMON_CONFIG.image_path, disk=COMMON_CONFIG.image_format,
+ container="bare", public='public')
+ image_ids.append(image_id)
+
+ network_1_id = test_utils.create_net(neutron_client,
+ TESTCASE_CONFIG.net_1_name)
+ subnet_1_id = test_utils.create_subnet(neutron_client,
+ TESTCASE_CONFIG.subnet_1_name,
+ TESTCASE_CONFIG.subnet_1_cidr,
+ network_1_id)
+
+ network_ids.append(network_1_id)
+ subnet_ids.append(subnet_1_id)
+
+ sg_id = os_utils.create_security_group_full(
+ neutron_client, TESTCASE_CONFIG.secgroup_name,
+ TESTCASE_CONFIG.secgroup_descr)
+
+ # Check required number of compute nodes
+ compute_hostname = (
+ nova_client.hypervisors.list()[0].hypervisor_hostname)
+ compute_nodes = [node for node in openstack_nodes
+ if node.is_compute()]
+
+ av_zone_1 = "nova:" + compute_hostname
+ # List of OVS bridges to get groups
+ ovs_br = "br-int"
+ # Get a list of flows and groups, before start topology
+ initial_ovs_flows = len(test_utils.get_ovs_flows(compute_nodes,
+ [ovs_br]))
+ initial_ovs_groups = len(test_utils.get_ovs_groups(compute_nodes,
+ [ovs_br]))
+
+ # boot INSTANCES
+ vm_2 = test_utils.create_instance(
+ nova_client,
+ TESTCASE_CONFIG.instance_2_name,
+ image_id,
+ network_1_id,
+ sg_id,
+ secgroup_name=TESTCASE_CONFIG.secgroup_name,
+ compute_node=av_zone_1)
+
+ vm_1 = test_utils.create_instance(
+ nova_client,
+ TESTCASE_CONFIG.instance_1_name,
+ image_id,
+ network_1_id,
+ sg_id,
+ secgroup_name=TESTCASE_CONFIG.secgroup_name,
+ compute_node=av_zone_1)
+ instance_ids.extend([vm_1.id, vm_2.id])
+
+ # Wait for VMs to get ips.
+ instances_up = test_utils.wait_for_instances_up(vm_1, vm_2)
+
+ if not instances_up:
+ logger.error("One or more instances is down")
+
+ logging.info("Wait before subtest")
+ test_utils.wait_before_subtest()
+ # Get added OVS flows and groups
+ added_ovs_flows = len(test_utils.get_ovs_flows(compute_nodes,
+ [ovs_br]))
+ added_ovs_groups = len(test_utils.get_ovs_groups(compute_nodes,
+ [ovs_br]))
+ # Check if flows and groups added successfully
+ results.record_action("Check if new flows and groups were added "
+ "to OVS")
+
+ msg = "New OVS flows added"
+ results.add_to_summary(0, "-")
+ if added_ovs_flows - initial_ovs_flows > 0:
+ results.add_success(msg)
+ else:
+ results.add_failure(msg)
+ results.add_to_summary(0, "=")
+
+ msg = "New OVS groups added"
+ results.add_to_summary(0, "-")
+ if added_ovs_groups - initial_ovs_groups > 0:
+ results.add_success(msg)
+ else:
+ results.add_failure(msg)
+ results.add_to_summary(0, "=")
+
+ get_ext_ip_cmd = "sudo ovs-vsctl get-controller {}".format(ovs_br)
+ ovs_controller_conn = (compute_nodes[0].run_cmd(get_ext_ip_cmd).
+ strip().split('\n')[0])
+
+ for compute_node in compute_nodes:
+ # Disconnect OVS from controller
+ compute_node.run_cmd("sudo ovs-vsctl del-controller {}".
+ format(ovs_br))
+ test_utils.wait_before_subtest()
+ # Connect again OVS to Controller
+ compute_node.run_cmd("sudo ovs-vsctl set-controller {} {}".
+ format(ovs_br, ovs_controller_conn))
+
+ logging.info("Wait before subtest resync type 1")
+ test_utils.wait_before_subtest()
+ # Get OVS flows added after the reconnection
+ resynced_ovs_flows = len(test_utils.get_ovs_flows(
+ compute_nodes, [ovs_br]))
+ # Get OVS groups added after the reconnection
+ resynced_ovs_groups = len(test_utils.get_ovs_groups(
+ compute_nodes, [ovs_br]))
+
+ record_action_msg = ("Check if flows/groups are reprogrammed in OVS "
+ "after its reconnection by del/set controller.")
+ record_test_result(added_ovs_flows, resynced_ovs_flows,
+ added_ovs_groups, resynced_ovs_groups,
+ record_action_msg, results)
+
+ for compute_node in compute_nodes:
+ # Disconnect OVS from controller
+ compute_node.run_cmd("sudo iptables -A OUTPUT -p tcp --dport 6653"
+ " -j DROP")
+ test_utils.wait_before_subtest()
+ # Connect again OVS to Controller
+ compute_node.run_cmd("sudo iptables -D OUTPUT -p tcp --dport 6653"
+ " -j DROP")
+
+ logging.info("Wait before subtest resync type 2")
+ test_utils.wait_before_subtest()
+ # Get OVS flows added after the reconnection
+ resynced_ovs_flows = len(test_utils.get_ovs_flows(
+ compute_nodes, [ovs_br]))
+ # Get OVS groups added after the reconnection
+ resynced_ovs_groups = len(test_utils.get_ovs_groups(
+ compute_nodes, [ovs_br]))
+
+ record_action_msg = ("Check if flows/groups are reprogrammed in OVS "
+ "after its reconnection by firewall rule for "
+ "OF port block/unblok")
+ record_test_result(added_ovs_flows, resynced_ovs_flows,
+ added_ovs_groups, resynced_ovs_groups,
+ record_action_msg, results)
+
+ except Exception as e:
+ logger.error("exception occurred while executing testcase_12: %s", e)
+ raise
+ finally:
+ # Cleanup topology
+ test_utils.cleanup_nova(nova_client, instance_ids)
+ test_utils.cleanup_glance(glance_client, image_ids)
+ test_utils.cleanup_neutron(neutron_client, floatingip_ids, bgpvpn_ids,
+ interfaces, subnet_ids, router_ids,
+ network_ids)
+
+ return results.compile_summary()
+
+
+def record_test_result(expected_flow_count, actual_flow_count,
+ expected_group_count, actual_group_count,
+ record_msg, results):
+ results.record_action(record_msg)
+ msg = ("OVS flows are programmed after resync expected flow count %s,"
+ " actual flow count %s" % (str(expected_flow_count),
+ str(actual_flow_count)))
+ results.add_to_summary(0, "-")
+ if expected_flow_count == actual_flow_count:
+ results.add_success(msg)
+ else:
+ results.add_failure(msg)
+ results.add_to_summary(0, "=")
+
+ msg = ("OVS groups are programmed after resync expected group count %s,"
+ " actual group count %s" % (str(expected_group_count),
+ str(actual_group_count)))
+ results.add_to_summary(0, "-")
+ if expected_group_count == actual_group_count:
+ results.add_success(msg)
+ else:
+ results.add_failure(msg)
+ results.add_to_summary(0, "=")
+
+
+if __name__ == '__main__':
+ logging.basicConfig(level=logging.INFO)
+ sys.exit(main())