summaryrefslogtreecommitdiffstats
path: root/test
diff options
context:
space:
mode:
authorTim Irnich <tim.irnich@ericsson.com>2016-07-08 17:59:03 +0200
committerTim Irnich <tim.irnich@ericsson.com>2016-07-12 18:12:25 +0200
commit9c41d70e736bd9fd19bf6448bc87a45407e395da (patch)
treee25824cc09d4c86d24d0b3c33dde9aa5aae3fb32 /test
parentc2da6b53dcf9f7b0c2a082d302de3250a9f6b7f2 (diff)
Adding test case 2
JIRA: SDNVPN-31 Test case 2 checks tenant IP address space separation. Now done with this change. Change-Id: I07ef04de4195b2892c837ac87e53146d133755c6 Signed-off-by: Tim Irnich <tim.irnich@ericsson.com>
Diffstat (limited to 'test')
-rw-r--r--test/functest/config.yaml13
-rw-r--r--test/functest/testcase_2.py462
2 files changed, 469 insertions, 6 deletions
diff --git a/test/functest/config.yaml b/test/functest/config.yaml
index 6299556..91f960e 100644
--- a/test/functest/config.yaml
+++ b/test/functest/config.yaml
@@ -45,12 +45,16 @@ testcases:
instance_5_name: sdnvpn-2-5
image_name: sdnvpn-image
net_1_name: sdnvpn-2-1-net
- subnet_1_name: sdnvpn-2-1-subnet
- subnet_1_cidr: 10.10.10.0/24
+ subnet_1a_name: sdnvpn-2-1a-subnet
+ subnet_1a_cidr: 10.10.10.0/24
+ subnet_1b_name: sdnvpn-2-1b-subnet
+ subnet_1b_cidr: 10.10.11.0/24
router_1_name: sdnvpn-2-1-router
net_2_name: sdnvpn-2-2-net
- subnet_2_name: sdnvpn-2-2-subnet
- subnet_2_cidr: 10.10.11.0/24
+ subnet_2a_name: sdnvpn-2-2a-subnet
+ subnet_2a_cidr: 10.10.11.0/24
+ subnet_2b_name: sdnvpn-2-2b-subnet
+ subnet_2b_cidr: 10.10.10.0/24
router_2_name: sdnvpn-2-2-router
sdnvpn_sg_name: sdnvpn-sg
sdnvpn_sg_descr: Security group for SDNVPN test cases
@@ -59,3 +63,4 @@ testcases:
enabled: true
description: Data center gateway integration
type: python
+
diff --git a/test/functest/testcase_2.py b/test/functest/testcase_2.py
index 1e586b1..4a51111 100644
--- a/test/functest/testcase_2.py
+++ b/test/functest/testcase_2.py
@@ -8,15 +8,473 @@
# http://www.apache.org/licenses/LICENSE-2.0
#
+import argparse
+import os
+from random import randint
+import sys
+import time
import functest.utils.functest_logger as ft_logger
-import functest.utils.functest_utils as functest_utils
+import functest.utils.functest_utils as ft_utils
import functest.utils.openstack_utils as os_utils
+parser = argparse.ArgumentParser()
+
+parser.add_argument("-r", "--report",
+ help="Create json result file",
+ action="store_true")
+
+args = parser.parse_args()
+
+""" logging configuration """
+logger = ft_logger.Logger("sdnvpn-testcase-1").getLogger()
+
+REPO_PATH = os.environ['repos_dir'] + '/sdnvpn/'
+HOME = os.environ['HOME'] + "/"
+
+VM_BOOT_TIMEOUT = 180
+
+config_file = REPO_PATH + 'test/functest/config.yaml'
+
+INSTANCE_1_NAME = ft_utils.get_parameter_from_yaml(
+ "testcases.testcase_2.instance_1_name", config_file)
+INSTANCE_1_IP = "10.10.10.11"
+INSTANCE_2_NAME = ft_utils.get_parameter_from_yaml(
+ "testcases.testcase_2.instance_2_name", config_file)
+INSTANCE_2_IP = "10.10.10.12"
+INSTANCE_3_NAME = ft_utils.get_parameter_from_yaml(
+ "testcases.testcase_2.instance_3_name", config_file)
+INSTANCE_3_IP = "10.10.11.13"
+INSTANCE_4_NAME = ft_utils.get_parameter_from_yaml(
+ "testcases.testcase_2.instance_4_name", config_file)
+INSTANCE_4_IP = "10.10.10.12"
+INSTANCE_5_NAME = ft_utils.get_parameter_from_yaml(
+ "testcases.testcase_2.instance_5_name", config_file)
+INSTANCE_5_IP = "10.10.11.13"
+FLAVOR = ft_utils.get_parameter_from_yaml(
+ "testcases.testcase_2.flavor", config_file)
+IMAGE_NAME = ft_utils.get_parameter_from_yaml(
+ "testcases.testcase_2.image_name", config_file)
+IMAGE_FILENAME = ft_utils.get_parameter_from_yaml(
+ "general.openstack.image_file_name")
+IMAGE_FORMAT = ft_utils.get_parameter_from_yaml(
+ "general.openstack.image_disk_format")
+IMAGE_PATH = ft_utils.get_parameter_from_yaml(
+ "general.directories.dir_functest_data") + "/" + IMAGE_FILENAME
+
+KEYFILE_PATH = REPO_PATH + 'test/functest/id_rsa'
+
+# NEUTRON Private Network parameters
+
+NET_1_NAME = ft_utils.get_parameter_from_yaml(
+ "testcases.testcase_2.net_1_name", config_file)
+SUBNET_1a_NAME = ft_utils.get_parameter_from_yaml(
+ "testcases.testcase_2.subnet_1a_name", config_file)
+SUBNET_1a_CIDR = ft_utils.get_parameter_from_yaml(
+ "testcases.testcase_2.subnet_1a_cidr", config_file)
+SUBNET_1b_NAME = ft_utils.get_parameter_from_yaml(
+ "testcases.testcase_2.subnet_1b_name", config_file)
+SUBNET_1b_CIDR = ft_utils.get_parameter_from_yaml(
+ "testcases.testcase_2.subnet_1b_cidr", config_file)
+ROUTER_1_NAME = ft_utils.get_parameter_from_yaml(
+ "testcases.testcase_2.router_1_name", config_file)
+NET_2_NAME = ft_utils.get_parameter_from_yaml(
+ "testcases.testcase_2.net_2_name", config_file)
+SUBNET_2a_NAME = ft_utils.get_parameter_from_yaml(
+ "testcases.testcase_2.subnet_2a_name", config_file)
+SUBNET_2a_CIDR = ft_utils.get_parameter_from_yaml(
+ "testcases.testcase_2.subnet_2a_cidr", config_file)
+SUBNET_2b_NAME = ft_utils.get_parameter_from_yaml(
+ "testcases.testcase_2.subnet_2b_name", config_file)
+SUBNET_2b_CIDR = ft_utils.get_parameter_from_yaml(
+ "testcases.testcase_2.subnet_2b_cidr", config_file)
+ROUTER_1_NAME = ft_utils.get_parameter_from_yaml(
+ "testcases.testcase_2.router_1_name", config_file)
+ROUTER_2_NAME = ft_utils.get_parameter_from_yaml(
+ "testcases.testcase_2.router_2_name", config_file)
+SECGROUP_NAME = ft_utils.get_parameter_from_yaml(
+ "testcases.testcase_2.sdnvpn_sg_name", config_file)
+SECGROUP_DESCR = ft_utils.get_parameter_from_yaml(
+ "testcases.testcase_2.sdnvpn_sg_descr", config_file)
+
+TEST_DB = ft_utils.get_parameter_from_yaml("results.test_db_url")
+
+TEST_RESULT = "PASS"
+SUMMARY = ""
+LINE_LENGTH = 90 # length for the summary table
+
+
+def create_network(neutron_client, net, subnet1, cidr1,
+ router, subnet2=None, cidr2=None):
+ network_dic = os_utils.create_network_full(logger,
+ neutron_client,
+ net,
+ subnet1,
+ router,
+ cidr1)
+ if not network_dic:
+ logger.error(
+ "There has been a problem when creating the neutron network")
+ sys.exit(-1)
+ net_id = network_dic["net_id"]
+ if subnet2 is not None:
+ logger.debug("Creating and attaching a second subnet...")
+ subnet_id = os_utils.create_neutron_subnet(
+ neutron_client, subnet2, cidr2, net_id)
+ if not subnet_id:
+ logger.error(
+ "There has been a problem when creating the second subnet")
+ sys.exit(-1)
+ logger.debug("Subnet '%s' created successfully" % subnet_id)
+ return net_id
+
+
+def create_instance(nova_client,
+ name,
+ flavor,
+ image_id,
+ network_id,
+ sg_id,
+ fixed_ip,
+ compute_node='',
+ userdata=None,
+ files=None):
+ logger.info("Creating instance '%s'..." % name)
+ logger.debug(
+ "Configuration:\n name=%s \n flavor=%s \n image=%s \n"
+ " network=%s\n secgroup=%s \n hypervisor=%s \n"
+ " fixed_ip=%s\n files=%s\n userdata=\n%s\n"
+ % (name, flavor, image_id, network_id, sg_id,
+ compute_node, fixed_ip, files, userdata))
+ instance = os_utils.create_instance_and_wait_for_active(
+ flavor,
+ image_id,
+ network_id,
+ name,
+ config_drive=True,
+ userdata=userdata,
+ av_zone=compute_node,
+ fixed_ip=fixed_ip,
+ files=files)
+
+ if instance is None:
+ logger.error("Error while booting instance.")
+ sys.exit(-1)
+ # Retrieve IP of INSTANCE
+ # instance_ip = instance.networks.get(network_id)[0]
+
+
+ "sudo echo ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgnWtSS98Am516e"
+ "stBsq0jbyOB4eLMUYDdgzsUHsnxFQCtACwwAg9/2uq3FoGUBUWeHZNsT6jcK9"
+ "sCMEYiS479CUCzbrxcd8XaIlK38HECcDVglgBNwNzX/WDfMejXpKzZG61s98rU"
+ "ElNvZ0YDqhaqZGqxIV4ejalqLjYrQkoly3R+2k= "
+ "chmod 644 /home/cirros/.ssh/authorized_keys\n"
+ "chmod 600 /home/cirros/.ssh/id_rsa\n"
+ )
+
+
+def generate_userdata_with_ssh(ips_array):
+ u1 = generate_userdata_common()
+
+ ips = ""
+ for ip in ips_array:
+ ips = ("%s %s" % (ips, ip))
+
+ ips = ips.replace(' ', ' ')
+ u2 = ("#!/bin/sh\n"
+ "set%s\n"
+ "while true; do\n"
+ " for i do\n"
+ " ip=$i\n"
+ " hostname=$(ssh -y -i /home/cirros/.ssh/id_rsa "
+ "cirros@$ip 'hostname' </dev/zero 2>/dev/null)\n"
+ " RES=$?\n"
+ " if [ \"Z$RES\" = \"Z0\" ]; then echo $ip $hostname;\n"
+ " else echo $ip 'not reachable';fi;\n"
+ " done\n"
+ " sleep 1\n"
+ "done\n"
+ % ips)
+ return (u1 + u2)
+
+
+def check_ssh_output(vm_source, ip_source,
+ vm_target, ip_target,
+ expected, timeout=30):
+ console_log = vm_source.get_console_output()
+
+ global TEST_RESULT
+
+ if "request failed" in console_log:
+ # Normally, cirros displays this message when userdata fails
+ logger.debug("It seems userdata is not supported in "
+ "nova boot...")
+ return False
+ else:
+ tab = ("%s" % (" " * 53))
+ test_case_name = ("[%s] returns 'I am %s' to '%s'[%s]" %
+ (ip_target, expected,
+ vm_source.name, ip_source))
+ logger.debug("\n%sSSH\n%sfrom '%s' (%s)\n%sto '%s' (%s).\n"
+ "%s-->Expected result: %s.\n"
+ % (tab, tab, vm_source.name, ip_source,
+ tab, vm_target.name, ip_target,
+ tab, expected))
+ while True:
+ console_log = vm_source.get_console_output()
+ # the console_log is a long string, we want to take
+ # the last 4 lines (for example)
+ lines = console_log.split('\n')
+ last_n_lines = lines[-5:]
+ if ("%s %s" % (ip_target, expected)) in last_n_lines:
+ logger.debug("[PASS] %s" % test_case_name)
+ add_to_summary(2, "PASS", test_case_name)
+ break
+ elif ("%s not reachable" % ip_target) in last_n_lines:
+ logger.debug("[FAIL] %s" % test_case_name)
+ add_to_summary(2, "FAIL", test_case_name)
+ TEST_RESULT = "FAIL"
+ break
+ time.sleep(1)
+ timeout -= 1
+ if timeout == 0:
+ TEST_RESULT = "FAIL"
+ logger.debug("[FAIL] Timeout reached for '%s'. No ping output "
+ "captured in the console log" % vm_source.name)
+ add_to_summary(2, "FAIL", test_case_name)
+ break
+
+
+def add_to_summary(num_cols, col1, col2=""):
+ global SUMMARY, LINE_LENGTH
+ if num_cols == 0:
+ SUMMARY += ("+%s+\n" % (col1 * (LINE_LENGTH - 2)))
+ elif num_cols == 1:
+ SUMMARY += ("| " + col1.ljust(LINE_LENGTH - 3) + "|\n")
+ elif num_cols == 2:
+ SUMMARY += ("| %s" % col1.ljust(7) + "| ")
+ SUMMARY += (col2.ljust(LINE_LENGTH - 12) + "|\n")
+
+
def main():
- pass
+ global TEST_RESULT, SUMMARY
+
+ add_to_summary(0, "=")
+ add_to_summary(2, "STATUS", "SUBTEST")
+ add_to_summary(0, "=")
+
+ nova_client = os_utils.get_nova_client()
+ neutron_client = os_utils.get_neutron_client()
+ glance_client = os_utils.get_glance_client()
+
+ logger.debug("Using private key %s injected to the VMs." % KEYFILE_PATH)
+ keyfile = open(KEYFILE_PATH, 'r')
+ key = keyfile.read()
+ keyfile.close()
+ files = {"/home/cirros/id_rsa": key}
+
+ image_id = os_utils.create_glance_image(glance_client,
+ IMAGE_NAME,
+ IMAGE_PATH,
+ disk=IMAGE_FORMAT,
+ container="bare",
+ public=True,
+ logger=logger)
+ network_1_id = create_network(neutron_client,
+ NET_1_NAME,
+ SUBNET_1a_NAME,
+ SUBNET_1a_CIDR,
+ ROUTER_1_NAME,
+ SUBNET_1b_NAME,
+ SUBNET_1b_CIDR)
+ network_2_id = create_network(neutron_client,
+ NET_2_NAME,
+ SUBNET_2a_NAME,
+ SUBNET_2a_CIDR,
+ ROUTER_2_NAME,
+ SUBNET_2b_NAME,
+ SUBNET_2b_CIDR)
+ sg_id = os_utils.create_security_group_full(logger, neutron_client,
+ SECGROUP_NAME, SECGROUP_DESCR)
+
+ # Get hypervisors zones
+ compute_nodes = os_utils.get_hypervisors(nova_client)
+ num_compute_nodes = len(compute_nodes)
+ if num_compute_nodes < 2:
+ logger.error("There are %s compute nodes in the deployment. "
+ "Minimum number of nodes to complete the test is 2."
+ % num_compute_nodes)
+ sys.exit(-1)
+
+ logger.debug("Compute nodes: %s" % compute_nodes)
+ av_zone_1 = "nova:" + compute_nodes[0]
+ av_zone_2 = "nova:" + compute_nodes[1]
+
+ # boot INTANCES
+ userdata_common = generate_userdata_common()
+ vm_2 = create_instance(nova_client,
+ INSTANCE_2_NAME,
+ FLAVOR,
+ image_id,
+ network_1_id,
+ sg_id,
+ INSTANCE_2_IP,
+ compute_node=av_zone_1,
+ userdata=userdata_common)
+ vm_2_ip = vm_2.networks.itervalues().next()[0]
+ logger.debug("Instance '%s' booted successfully. IP='%s'." %
+ (INSTANCE_2_NAME, vm_2_ip))
+
+ vm_3 = create_instance(nova_client,
+ INSTANCE_3_NAME,
+ FLAVOR, image_id,
+ network_1_id,
+ sg_id,
+ INSTANCE_3_IP,
+ compute_node=av_zone_2,
+ userdata=userdata_common)
+ vm_3_ip = vm_3.networks.itervalues().next()[0]
+ logger.debug("Instance '%s' booted successfully. IP='%s'." %
+ (INSTANCE_3_NAME, vm_3_ip))
+
+ vm_5 = create_instance(nova_client,
+ INSTANCE_5_NAME,
+ FLAVOR,
+ image_id,
+ network_2_id,
+ sg_id,
+ fixed_ip=INSTANCE_5_IP,
+ compute_node=av_zone_2,
+ userdata=userdata_common)
+ vm_5_ip = vm_5.networks.itervalues().next()[0]
+ logger.debug("Instance '%s' booted successfully. IP='%s'." %
+ (INSTANCE_5_NAME, vm_5_ip))
+
+ # We boot vm5 first because we need vm5_ip for vm4 userdata
+ u4 = generate_userdata_with_ssh(
+ [INSTANCE_1_IP, INSTANCE_3_IP, INSTANCE_5_IP])
+ vm_4 = create_instance(nova_client,
+ INSTANCE_4_NAME,
+ FLAVOR,
+ image_id,
+ network_2_id,
+ sg_id,
+ fixed_ip=INSTANCE_4_IP,
+ compute_node=av_zone_1,
+ userdata=u4,
+ files=files)
+ vm_4_ip = vm_4.networks.itervalues().next()[0]
+ logger.debug("Instance '%s' booted successfully. IP='%s'." %
+ (INSTANCE_4_NAME, vm_4_ip))
+
+ # We boot VM1 at the end because we need to get the IPs first to generate
+ # the userdata
+ u1 = generate_userdata_with_ssh(
+ [INSTANCE_2_IP, INSTANCE_3_IP, INSTANCE_4_IP, INSTANCE_5_IP])
+ vm_1 = create_instance(nova_client,
+ INSTANCE_1_NAME,
+ FLAVOR,
+ image_id,
+ network_1_id,
+ sg_id,
+ fixed_ip=INSTANCE_1_IP,
+ compute_node=av_zone_1,
+ userdata=u1,
+ files=files)
+ vm_1_ip = vm_1.networks.itervalues().next()[0]
+ logger.debug("Instance '%s' booted successfully. IP='%s'." %
+ (INSTANCE_1_NAME, vm_1_ip))
+
+ msg = ("Create VPN1 with eRT=iRT")
+ logger.info("\n\n--> %s ..." % msg)
+ add_to_summary(1, msg)
+ vpn1_name = "sdnvpn-1-" + str(randint(100000, 999999))
+ kwargs = {"import_targets": "55:55",
+ "export_targets": "55:55",
+ "route_targets": "55:55",
+ "name": vpn1_name}
+ bgpvpn1 = os_utils.create_bgpvpn(neutron_client, **kwargs)
+ bgpvpn1_id = bgpvpn1['bgpvpn']['id']
+ logger.debug("VPN1 created details: %s" % bgpvpn1)
+
+ msg = ("Associate network '%s' to the VPN." % NET_1_NAME)
+ logger.info("\n\n--> %s..." % msg)
+ add_to_summary(1, msg)
+ add_to_summary(0, "-")
+
+ os_utils.create_network_association(
+ neutron_client, bgpvpn1_id, network_1_id)
+
+ # Wait for VMs to get ips.
+ time.sleep(80)
+
+ # 10.10.10.12 should return sdnvpn-2 to sdnvpn-1
+ check_ssh_output(
+ vm_1, vm_1_ip, vm_2, vm_2_ip, expected=INSTANCE_2_NAME, timeout=200)
+ # 10.10.11.13 should return sdnvpn-3 to sdnvpn-1
+ check_ssh_output(
+ vm_1, vm_1_ip, vm_3, vm_3_ip, expected=INSTANCE_3_NAME, timeout=30)
+
+ add_to_summary(0, "-")
+ msg = ("Create VPN2 with eRT=iRT")
+ logger.info("\n\n--> %s ..." % msg)
+ add_to_summary(1, msg)
+ vpn2_name = "sdnvpn-2-" + str(randint(100000, 999999))
+ kwargs = {"import_targets": "88:88",
+ "export_targets": "88:88",
+ "route_targets": "88:88",
+ "name": vpn2_name}
+ bgpvpn2 = os_utils.create_bgpvpn(neutron_client, **kwargs)
+ bgpvpn2_id = bgpvpn2['bgpvpn']['id']
+ logger.debug("VPN created details: %s" % bgpvpn2)
+
+ msg = ("Associate network '%s' to the VPN2." % NET_2_NAME)
+ logger.info("\n\n--> %s..." % msg)
+ add_to_summary(1, msg)
+ add_to_summary(0, "-")
+
+ os_utils.create_network_association(
+ neutron_client, bgpvpn2_id, network_2_id)
+
+ # Wait a bit for this to take effect
+ time.sleep(80)
+
+ # 10.10.11.13 should return sdnvpn-5 to sdnvpn-4
+ check_ssh_output(
+ vm_4, vm_4_ip, vm_5, vm_5_ip, expected=INSTANCE_5_NAME, timeout=30)
+
+ # 10.10.10.11 should return "not reachable" to sdnvpn-4
+ check_ssh_output(
+ vm_4, vm_4_ip, vm_1, vm_1_ip, expected="not reachable", timeout=30)
+
+ add_to_summary(0, "=")
+ logger.info("\n%s" % SUMMARY)
+
+ if TEST_RESULT == "PASS":
+ logger.info("All the sub tests have passed as expected.")
+ else:
+ logger.info("One or more sub tests have failed.")
+
+ sys.exit(0)
if __name__ == '__main__':
main()
+
+ "cirros@test1>/home/cirros/.ssh/authorized_keys\n"
+ "sudo chown cirros:cirros /home/cirros/.ssh/authorized_keys\n"
+ "chmod 700 /home/cirros/.ssh\n"
+ "sudo chown cirros:cirros /home/cirros/.ssh/\n"
+ "sudo chown cirros:cirros /home/cirros/id_rsa\n"
+ "mv /home/cirros/id_rsa /home/cirros/.ssh/\n"
+def generate_userdata_common():
+ return ("#!/bin/sh\n"
+ "sudo mkdir -p /home/cirros/.ssh/\n"
+ return instance
+
+
+ logger.debug("Adding '%s' to security group '%s'..."
+ % (name, SECGROUP_NAME))
+ os_utils.add_secgroup_to_instance(nova_client, instance.id, sg_id)
+