diff options
author | Juan Vidal <juan.vidal.allende@ericsson.com> | 2017-02-13 14:32:04 +0000 |
---|---|---|
committer | Brady Johnson <brady.allen.johnson@ericsson.com> | 2017-02-17 15:40:39 +0000 |
commit | 72b6571f2b448e27a1d8c50dd8f27e564004d687 (patch) | |
tree | a965201a58eb14bdd36f2aea135686adef1f05c6 /sfc/tests/functest/sfc_symmetric_chain.py | |
parent | 75ac61401c83253d533983de6e2650f82fc4c427 (diff) |
Introduce new test case: symmetric service chain
JIRA: SFC-53
The goal is to verify that the traffic traverses the service chain, not only
in the uplink (client --> server) direction, but also in the downlink
(client <-- server) direction, which is the part that is not currently being
covered by other test cases.
Change-Id: I198a53e5afe3da1b397cee95627834856498b674
Signed-off-by: Juan Vidal <juan.vidal.allende@ericsson.com>
Diffstat (limited to 'sfc/tests/functest/sfc_symmetric_chain.py')
-rw-r--r-- | sfc/tests/functest/sfc_symmetric_chain.py | 201 |
1 files changed, 201 insertions, 0 deletions
diff --git a/sfc/tests/functest/sfc_symmetric_chain.py b/sfc/tests/functest/sfc_symmetric_chain.py new file mode 100644 index 00000000..87e6f594 --- /dev/null +++ b/sfc/tests/functest/sfc_symmetric_chain.py @@ -0,0 +1,201 @@ +#!/bin/python +# +# Copyright (c) 2017 Ericsson AB and others. All rights reserved +# +# This program and the accompanying materials +# are made available under the terms of the Apache License, Version 2.0 +# which accompanies this distribution, and is available at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# + +import os +import sys +import threading + +import functest.utils.functest_logger as ft_logger +import functest.utils.openstack_tacker as os_tacker +import functest.utils.openstack_utils as os_utils +import opnfv.utils.ovs_logger as ovs_log +from opnfv.deployment.factory import Factory as DeploymentFactory + +import sfc.lib.config as sfc_config +import sfc.lib.utils as test_utils +from sfc.lib.results import Results + + +logger = ft_logger.Logger("ODL_SFC").getLogger() + +CLIENT = "client" +SERVER = "server" +COMMON_CONFIG = sfc_config.CommonConfig() +TESTCASE_CONFIG = sfc_config.TestcaseConfig('sfc_symmetric_chain') + + +def main(): + deploymentHandler = DeploymentFactory.get_handler( + COMMON_CONFIG.installer_type, + COMMON_CONFIG.installer_ip, + COMMON_CONFIG.installer_user, + installer_pwd=COMMON_CONFIG.installer_password) + + cluster = COMMON_CONFIG.installer_cluster + all_nodes = (deploymentHandler.get_nodes({'cluster': cluster}) + if cluster is not None + else deploymentHandler.get_nodes()) + + controller_nodes = [node for node in all_nodes if node.is_controller()] + compute_nodes = [node for node in all_nodes if node.is_compute()] + + results = Results(COMMON_CONFIG.line_length) + results.add_to_summary(0, "=") + results.add_to_summary(2, "STATUS", "SUBTEST") + results.add_to_summary(0, "=") + + test_utils.setup_compute_node(TESTCASE_CONFIG.subnet_cidr, compute_nodes) + test_utils.configure_iptables(controller_nodes) + test_utils.download_image(COMMON_CONFIG.url, COMMON_CONFIG.image_path) + + neutron_client = os_utils.get_neutron_client() + nova_client = os_utils.get_nova_client() + tacker_client = os_tacker.get_tacker_client() + + _, custom_flavor_id = os_utils.get_or_create_flavor( + COMMON_CONFIG.flavor, + COMMON_CONFIG.ram_size_in_mb, + COMMON_CONFIG.disk_size_in_gb, + COMMON_CONFIG.vcpu_count, + public=True) + if custom_flavor_id is None: + logger.error("Failed to create custom flavor") + sys.exit(1) + + controller_clients = test_utils.get_ssh_clients(controller_nodes) + compute_clients = test_utils.get_ssh_clients(compute_nodes) + + ovs_logger = ovs_log.OVSLogger( + os.path.join(COMMON_CONFIG.sfc_test_dir, 'ovs-logs'), + COMMON_CONFIG.functest_results_dir) + + image_id = os_utils.create_glance_image( + os_utils.get_glance_client(), + COMMON_CONFIG.image_name, + COMMON_CONFIG.image_path, + COMMON_CONFIG.image_format, + public='public') + + network_id = test_utils.setup_neutron( + neutron_client, + TESTCASE_CONFIG.net_name, + TESTCASE_CONFIG.subnet_name, + TESTCASE_CONFIG.router_name, + TESTCASE_CONFIG.subnet_cidr) + + sg_id = test_utils.create_security_groups( + neutron_client, + TESTCASE_CONFIG.secgroup_name, + TESTCASE_CONFIG.secgroup_descr) + + test_utils.create_instance( + nova_client, + CLIENT, + COMMON_CONFIG.flavor, + image_id, + network_id, + sg_id) + + server_instance = test_utils.create_instance( + nova_client, + SERVER, + COMMON_CONFIG.flavor, + image_id, + network_id, + sg_id) + + server_ip = server_instance.networks.get(TESTCASE_CONFIG.net_name)[0] + + tosca = os.path.join( + COMMON_CONFIG.sfc_test_dir, + COMMON_CONFIG.vnfd_dir, + TESTCASE_CONFIG.test_vnfd) + + os_tacker.create_vnfd(tacker_client, tosca_file=tosca) + test_utils.create_vnf_in_av_zone(tacker_client, 'testVNF1', 'test-vnfd1') + + vnf_id = os_tacker.wait_for_vnf(tacker_client, vnf_name='testVNF1') + if vnf_id is None: + logger.error('ERROR while booting VNF') + sys.exit(1) + + os_tacker.create_sfc( + tacker_client, + sfc_name='red', + chain_vnf_names=['testVNF1'], + symmetrical=True) + + os_tacker.create_sfc_classifier( + tacker_client, 'red_http', sfc_name='red', + match={ + 'source_port': 0, + 'dest_port': 80, + 'protocol': 6 + }) + + logger.info(test_utils.run_cmd('tacker sfc-list')) + logger.info(test_utils.run_cmd('tacker sfc-classifier-list')) + + # Start measuring the time it takes to implement the classification rules + t1 = threading.Thread(target=test_utils.wait_for_classification_rules, + args=(ovs_logger, compute_clients,)) + try: + t1.start() + except Exception, e: + logger.error("Unable to start the thread that counts time %s" % e) + + # TODO: Find a replacement for get_floating_ips() + server_floating_ip, client_floating_ip, sf_floating_ip = \ + test_utils.get_floating_ips_2(nova_client, neutron_client) + + if not test_utils.check_ssh([sf_floating_ip]): + logger.error("Cannot establish SSH connection to the SFs") + sys.exit(1) + + logger.info("Starting HTTP server on %s" % server_floating_ip) + if not test_utils.start_http_server(server_floating_ip): + logger.error('\033[91mFailed to start the HTTP server\033[0m') + sys.exit(1) + + blocked_port = TESTCASE_CONFIG.blocked_source_port + logger.info("Firewall started, blocking traffic port %d" % blocked_port) + test_utils.vxlan_firewall(sf_floating_ip, port=blocked_port) + + logger.info("Wait for ODL to update the classification rules in OVS") + t1.join() + + allowed_port = TESTCASE_CONFIG.allowed_source_port + logger.info("Test HTTP") + if not test_utils.is_http_blocked( + client_floating_ip, server_ip, allowed_port): + results.add_to_summary(2, "PASS", "HTTP works") + else: + error = ('\033[91mTEST 1 [FAILED] ==> HTTP BLOCKED\033[0m') + logger.error(error) + test_utils.capture_ovs_logs( + ovs_logger, controller_clients, compute_clients, error) + results.add_to_summary(2, "FAIL", "HTTP works") + + logger.info("Test HTTP") + if test_utils.is_http_blocked(client_floating_ip, server_ip, blocked_port): + results.add_to_summary(2, "PASS", "HTTP Blocked") + else: + error = ('\033[91mTEST 2 [FAILED] ==> HTTP WORKS\033[0m') + logger.error(error) + test_utils.capture_ovs_logs( + ovs_logger, controller_clients, compute_clients, error) + results.add_to_summary(2, "FAIL", "HTTP Blocked") + + return results.compile_summary() + + +if __name__ == '__main__': + main() |