Adding test case 2 69/16769/1
authorTim Irnich <tim.irnich@ericsson.com>
Fri, 8 Jul 2016 15:59:03 +0000 (17:59 +0200)
committerTim Irnich <tim.irnich@ericsson.com>
Tue, 12 Jul 2016 16:12:25 +0000 (18:12 +0200)
JIRA: SDNVPN-31

Test case 2 checks tenant IP address space separation.

Now done with this change.

Change-Id: I07ef04de4195b2892c837ac87e53146d133755c6

Signed-off-by: Tim Irnich <tim.irnich@ericsson.com>
test/functest/config.yaml
test/functest/testcase_2.py

index 6299556..91f960e 100644 (file)
@@ -45,12 +45,16 @@ testcases:
       instance_5_name: sdnvpn-2-5
       image_name: sdnvpn-image
       net_1_name: sdnvpn-2-1-net
-      subnet_1_name: sdnvpn-2-1-subnet
-      subnet_1_cidr: 10.10.10.0/24
+      subnet_1a_name: sdnvpn-2-1a-subnet
+      subnet_1a_cidr: 10.10.10.0/24
+      subnet_1b_name: sdnvpn-2-1b-subnet
+      subnet_1b_cidr: 10.10.11.0/24
       router_1_name: sdnvpn-2-1-router
       net_2_name: sdnvpn-2-2-net
-      subnet_2_name: sdnvpn-2-2-subnet
-      subnet_2_cidr: 10.10.11.0/24
+      subnet_2a_name: sdnvpn-2-2a-subnet
+      subnet_2a_cidr: 10.10.11.0/24
+      subnet_2b_name: sdnvpn-2-2b-subnet
+      subnet_2b_cidr: 10.10.10.0/24
       router_2_name: sdnvpn-2-2-router
       sdnvpn_sg_name: sdnvpn-sg
       sdnvpn_sg_descr: Security group for SDNVPN test cases
@@ -59,3 +63,4 @@ testcases:
       enabled: true
       description: Data center gateway integration
       type: python
+
index 1e586b1..4a51111 100644 (file)
 # http://www.apache.org/licenses/LICENSE-2.0
 #
 
+import argparse
+import os
+from random import randint
+import sys
+import time
 
 import functest.utils.functest_logger as ft_logger
-import functest.utils.functest_utils as functest_utils
+import functest.utils.functest_utils as ft_utils
 import functest.utils.openstack_utils as os_utils
 
 
+parser = argparse.ArgumentParser()
+
+parser.add_argument("-r", "--report",
+                    help="Create json result file",
+                    action="store_true")
+
+args = parser.parse_args()
+
+""" logging configuration """
+logger = ft_logger.Logger("sdnvpn-testcase-1").getLogger()
+
+REPO_PATH = os.environ['repos_dir'] + '/sdnvpn/'
+HOME = os.environ['HOME'] + "/"
+
+VM_BOOT_TIMEOUT = 180
+
+config_file = REPO_PATH + 'test/functest/config.yaml'
+
+INSTANCE_1_NAME = ft_utils.get_parameter_from_yaml(
+    "testcases.testcase_2.instance_1_name", config_file)
+INSTANCE_1_IP = "10.10.10.11"
+INSTANCE_2_NAME = ft_utils.get_parameter_from_yaml(
+    "testcases.testcase_2.instance_2_name", config_file)
+INSTANCE_2_IP = "10.10.10.12"
+INSTANCE_3_NAME = ft_utils.get_parameter_from_yaml(
+    "testcases.testcase_2.instance_3_name", config_file)
+INSTANCE_3_IP = "10.10.11.13"
+INSTANCE_4_NAME = ft_utils.get_parameter_from_yaml(
+    "testcases.testcase_2.instance_4_name", config_file)
+INSTANCE_4_IP = "10.10.10.12"
+INSTANCE_5_NAME = ft_utils.get_parameter_from_yaml(
+    "testcases.testcase_2.instance_5_name", config_file)
+INSTANCE_5_IP = "10.10.11.13"
+FLAVOR = ft_utils.get_parameter_from_yaml(
+    "testcases.testcase_2.flavor", config_file)
+IMAGE_NAME = ft_utils.get_parameter_from_yaml(
+    "testcases.testcase_2.image_name", config_file)
+IMAGE_FILENAME = ft_utils.get_parameter_from_yaml(
+    "general.openstack.image_file_name")
+IMAGE_FORMAT = ft_utils.get_parameter_from_yaml(
+    "general.openstack.image_disk_format")
+IMAGE_PATH = ft_utils.get_parameter_from_yaml(
+    "general.directories.dir_functest_data") + "/" + IMAGE_FILENAME
+
+KEYFILE_PATH = REPO_PATH + 'test/functest/id_rsa'
+
+# NEUTRON Private Network parameters
+
+NET_1_NAME = ft_utils.get_parameter_from_yaml(
+    "testcases.testcase_2.net_1_name", config_file)
+SUBNET_1a_NAME = ft_utils.get_parameter_from_yaml(
+    "testcases.testcase_2.subnet_1a_name", config_file)
+SUBNET_1a_CIDR = ft_utils.get_parameter_from_yaml(
+    "testcases.testcase_2.subnet_1a_cidr", config_file)
+SUBNET_1b_NAME = ft_utils.get_parameter_from_yaml(
+    "testcases.testcase_2.subnet_1b_name", config_file)
+SUBNET_1b_CIDR = ft_utils.get_parameter_from_yaml(
+    "testcases.testcase_2.subnet_1b_cidr", config_file)
+ROUTER_1_NAME = ft_utils.get_parameter_from_yaml(
+    "testcases.testcase_2.router_1_name", config_file)
+NET_2_NAME = ft_utils.get_parameter_from_yaml(
+    "testcases.testcase_2.net_2_name", config_file)
+SUBNET_2a_NAME = ft_utils.get_parameter_from_yaml(
+    "testcases.testcase_2.subnet_2a_name", config_file)
+SUBNET_2a_CIDR = ft_utils.get_parameter_from_yaml(
+    "testcases.testcase_2.subnet_2a_cidr", config_file)
+SUBNET_2b_NAME = ft_utils.get_parameter_from_yaml(
+    "testcases.testcase_2.subnet_2b_name", config_file)
+SUBNET_2b_CIDR = ft_utils.get_parameter_from_yaml(
+    "testcases.testcase_2.subnet_2b_cidr", config_file)
+ROUTER_1_NAME = ft_utils.get_parameter_from_yaml(
+    "testcases.testcase_2.router_1_name", config_file)
+ROUTER_2_NAME = ft_utils.get_parameter_from_yaml(
+    "testcases.testcase_2.router_2_name", config_file)
+SECGROUP_NAME = ft_utils.get_parameter_from_yaml(
+    "testcases.testcase_2.sdnvpn_sg_name", config_file)
+SECGROUP_DESCR = ft_utils.get_parameter_from_yaml(
+    "testcases.testcase_2.sdnvpn_sg_descr", config_file)
+
+TEST_DB = ft_utils.get_parameter_from_yaml("results.test_db_url")
+
+TEST_RESULT = "PASS"
+SUMMARY = ""
+LINE_LENGTH = 90  # length for the summary table
+
+
+def create_network(neutron_client, net, subnet1, cidr1,
+                   router, subnet2=None, cidr2=None):
+    network_dic = os_utils.create_network_full(logger,
+                                               neutron_client,
+                                               net,
+                                               subnet1,
+                                               router,
+                                               cidr1)
+    if not network_dic:
+        logger.error(
+            "There has been a problem when creating the neutron network")
+        sys.exit(-1)
+    net_id = network_dic["net_id"]
+    if subnet2 is not None:
+        logger.debug("Creating and attaching a second subnet...")
+        subnet_id = os_utils.create_neutron_subnet(
+            neutron_client, subnet2, cidr2, net_id)
+        if not subnet_id:
+            logger.error(
+                "There has been a problem when creating the second subnet")
+            sys.exit(-1)
+        logger.debug("Subnet '%s' created successfully" % subnet_id)
+    return net_id
+
+
+def create_instance(nova_client,
+                    name,
+                    flavor,
+                    image_id,
+                    network_id,
+                    sg_id,
+                    fixed_ip,
+                    compute_node='',
+                    userdata=None,
+                    files=None):
+    logger.info("Creating instance '%s'..." % name)
+    logger.debug(
+        "Configuration:\n name=%s \n flavor=%s \n image=%s \n"
+        " network=%s\n secgroup=%s \n hypervisor=%s \n"
+        " fixed_ip=%s\n files=%s\n userdata=\n%s\n"
+        % (name, flavor, image_id, network_id, sg_id,
+           compute_node, fixed_ip, files, userdata))
+    instance = os_utils.create_instance_and_wait_for_active(
+        flavor,
+        image_id,
+        network_id,
+        name,
+        config_drive=True,
+        userdata=userdata,
+        av_zone=compute_node,
+        fixed_ip=fixed_ip,
+        files=files)
+
+    if instance is None:
+        logger.error("Error while booting instance.")
+        sys.exit(-1)
+    # Retrieve IP of INSTANCE
+    # instance_ip = instance.networks.get(network_id)[0]
+
+
+            "sudo echo ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgnWtSS98Am516e"
+            "stBsq0jbyOB4eLMUYDdgzsUHsnxFQCtACwwAg9/2uq3FoGUBUWeHZNsT6jcK9"
+            "sCMEYiS479CUCzbrxcd8XaIlK38HECcDVglgBNwNzX/WDfMejXpKzZG61s98rU"
+            "ElNvZ0YDqhaqZGqxIV4ejalqLjYrQkoly3R+2k= "
+            "chmod 644 /home/cirros/.ssh/authorized_keys\n"
+            "chmod 600 /home/cirros/.ssh/id_rsa\n"
+            )
+
+
+def generate_userdata_with_ssh(ips_array):
+    u1 = generate_userdata_common()
+
+    ips = ""
+    for ip in ips_array:
+        ips = ("%s %s" % (ips, ip))
+
+    ips = ips.replace('  ', ' ')
+    u2 = ("#!/bin/sh\n"
+          "set%s\n"
+          "while true; do\n"
+          " for i do\n"
+          "  ip=$i\n"
+          "  hostname=$(ssh -y -i /home/cirros/.ssh/id_rsa "
+          "cirros@$ip 'hostname' </dev/zero 2>/dev/null)\n"
+          "  RES=$?\n"
+          "  if [ \"Z$RES\" = \"Z0\" ]; then echo $ip $hostname;\n"
+          "  else echo $ip 'not reachable';fi;\n"
+          " done\n"
+          " sleep 1\n"
+          "done\n"
+          % ips)
+    return (u1 + u2)
+
+
+def check_ssh_output(vm_source, ip_source,
+                     vm_target, ip_target,
+                     expected, timeout=30):
+    console_log = vm_source.get_console_output()
+
+    global TEST_RESULT
+
+    if "request failed" in console_log:
+        # Normally, cirros displays this message when userdata fails
+        logger.debug("It seems userdata is not supported in "
+                     "nova boot...")
+        return False
+    else:
+        tab = ("%s" % (" " * 53))
+        test_case_name = ("[%s] returns 'I am %s' to '%s'[%s]" %
+                          (ip_target, expected,
+                           vm_source.name, ip_source))
+        logger.debug("\n%sSSH\n%sfrom '%s' (%s)\n%sto '%s' (%s).\n"
+                     "%s-->Expected result: %s.\n"
+                     % (tab, tab, vm_source.name, ip_source,
+                        tab, vm_target.name, ip_target,
+                        tab, expected))
+        while True:
+            console_log = vm_source.get_console_output()
+            # the console_log is a long string, we want to take
+            # the last 4 lines (for example)
+            lines = console_log.split('\n')
+            last_n_lines = lines[-5:]
+            if ("%s %s" % (ip_target, expected)) in last_n_lines:
+                logger.debug("[PASS] %s" % test_case_name)
+                add_to_summary(2, "PASS", test_case_name)
+                break
+            elif ("%s not reachable" % ip_target) in last_n_lines:
+                logger.debug("[FAIL] %s" % test_case_name)
+                add_to_summary(2, "FAIL", test_case_name)
+                TEST_RESULT = "FAIL"
+                break
+            time.sleep(1)
+            timeout -= 1
+            if timeout == 0:
+                TEST_RESULT = "FAIL"
+                logger.debug("[FAIL] Timeout reached for '%s'. No ping output "
+                             "captured in the console log" % vm_source.name)
+                add_to_summary(2, "FAIL", test_case_name)
+                break
+
+
+def add_to_summary(num_cols, col1, col2=""):
+    global SUMMARY, LINE_LENGTH
+    if num_cols == 0:
+        SUMMARY += ("+%s+\n" % (col1 * (LINE_LENGTH - 2)))
+    elif num_cols == 1:
+        SUMMARY += ("| " + col1.ljust(LINE_LENGTH - 3) + "|\n")
+    elif num_cols == 2:
+        SUMMARY += ("| %s" % col1.ljust(7) + "| ")
+        SUMMARY += (col2.ljust(LINE_LENGTH - 12) + "|\n")
+
+
 def main():
-    pass
+    global TEST_RESULT, SUMMARY
+
+    add_to_summary(0, "=")
+    add_to_summary(2, "STATUS", "SUBTEST")
+    add_to_summary(0, "=")
+
+    nova_client = os_utils.get_nova_client()
+    neutron_client = os_utils.get_neutron_client()
+    glance_client = os_utils.get_glance_client()
+
+    logger.debug("Using private key %s injected to the VMs." % KEYFILE_PATH)
+    keyfile = open(KEYFILE_PATH, 'r')
+    key = keyfile.read()
+    keyfile.close()
+    files = {"/home/cirros/id_rsa": key}
+
+    image_id = os_utils.create_glance_image(glance_client,
+                                            IMAGE_NAME,
+                                            IMAGE_PATH,
+                                            disk=IMAGE_FORMAT,
+                                            container="bare",
+                                            public=True,
+                                            logger=logger)
+    network_1_id = create_network(neutron_client,
+                                  NET_1_NAME,
+                                  SUBNET_1a_NAME,
+                                  SUBNET_1a_CIDR,
+                                  ROUTER_1_NAME,
+                                  SUBNET_1b_NAME,
+                                  SUBNET_1b_CIDR)
+    network_2_id = create_network(neutron_client,
+                                  NET_2_NAME,
+                                  SUBNET_2a_NAME,
+                                  SUBNET_2a_CIDR,
+                                  ROUTER_2_NAME,
+                                  SUBNET_2b_NAME,
+                                  SUBNET_2b_CIDR)
+    sg_id = os_utils.create_security_group_full(logger, neutron_client,
+                                                SECGROUP_NAME, SECGROUP_DESCR)
+
+    # Get hypervisors zones
+    compute_nodes = os_utils.get_hypervisors(nova_client)
+    num_compute_nodes = len(compute_nodes)
+    if num_compute_nodes < 2:
+        logger.error("There are %s compute nodes in the deployment. "
+                     "Minimum number of nodes to complete the test is 2."
+                     % num_compute_nodes)
+        sys.exit(-1)
+
+    logger.debug("Compute nodes: %s" % compute_nodes)
+    av_zone_1 = "nova:" + compute_nodes[0]
+    av_zone_2 = "nova:" + compute_nodes[1]
+
+    # boot INTANCES
+    userdata_common = generate_userdata_common()
+    vm_2 = create_instance(nova_client,
+                           INSTANCE_2_NAME,
+                           FLAVOR,
+                           image_id,
+                           network_1_id,
+                           sg_id,
+                           INSTANCE_2_IP,
+                           compute_node=av_zone_1,
+                           userdata=userdata_common)
+    vm_2_ip = vm_2.networks.itervalues().next()[0]
+    logger.debug("Instance '%s' booted successfully. IP='%s'." %
+                 (INSTANCE_2_NAME, vm_2_ip))
+
+    vm_3 = create_instance(nova_client,
+                           INSTANCE_3_NAME,
+                           FLAVOR, image_id,
+                           network_1_id,
+                           sg_id,
+                           INSTANCE_3_IP,
+                           compute_node=av_zone_2,
+                           userdata=userdata_common)
+    vm_3_ip = vm_3.networks.itervalues().next()[0]
+    logger.debug("Instance '%s' booted successfully. IP='%s'." %
+                 (INSTANCE_3_NAME, vm_3_ip))
+
+    vm_5 = create_instance(nova_client,
+                           INSTANCE_5_NAME,
+                           FLAVOR,
+                           image_id,
+                           network_2_id,
+                           sg_id,
+                           fixed_ip=INSTANCE_5_IP,
+                           compute_node=av_zone_2,
+                           userdata=userdata_common)
+    vm_5_ip = vm_5.networks.itervalues().next()[0]
+    logger.debug("Instance '%s' booted successfully. IP='%s'." %
+                 (INSTANCE_5_NAME, vm_5_ip))
+
+    # We boot vm5 first because we need vm5_ip for vm4 userdata
+    u4 = generate_userdata_with_ssh(
+        [INSTANCE_1_IP, INSTANCE_3_IP, INSTANCE_5_IP])
+    vm_4 = create_instance(nova_client,
+                           INSTANCE_4_NAME,
+                           FLAVOR,
+                           image_id,
+                           network_2_id,
+                           sg_id,
+                           fixed_ip=INSTANCE_4_IP,
+                           compute_node=av_zone_1,
+                           userdata=u4,
+                           files=files)
+    vm_4_ip = vm_4.networks.itervalues().next()[0]
+    logger.debug("Instance '%s' booted successfully. IP='%s'." %
+                 (INSTANCE_4_NAME, vm_4_ip))
+
+    # We boot VM1 at the end because we need to get the IPs first to generate
+    # the userdata
+    u1 = generate_userdata_with_ssh(
+        [INSTANCE_2_IP, INSTANCE_3_IP, INSTANCE_4_IP, INSTANCE_5_IP])
+    vm_1 = create_instance(nova_client,
+                           INSTANCE_1_NAME,
+                           FLAVOR,
+                           image_id,
+                           network_1_id,
+                           sg_id,
+                           fixed_ip=INSTANCE_1_IP,
+                           compute_node=av_zone_1,
+                           userdata=u1,
+                           files=files)
+    vm_1_ip = vm_1.networks.itervalues().next()[0]
+    logger.debug("Instance '%s' booted successfully. IP='%s'." %
+                 (INSTANCE_1_NAME, vm_1_ip))
+
+    msg = ("Create VPN1 with eRT=iRT")
+    logger.info("\n\n--> %s ..." % msg)
+    add_to_summary(1, msg)
+    vpn1_name = "sdnvpn-1-" + str(randint(100000, 999999))
+    kwargs = {"import_targets": "55:55",
+              "export_targets": "55:55",
+              "route_targets": "55:55",
+              "name": vpn1_name}
+    bgpvpn1 = os_utils.create_bgpvpn(neutron_client, **kwargs)
+    bgpvpn1_id = bgpvpn1['bgpvpn']['id']
+    logger.debug("VPN1 created details: %s" % bgpvpn1)
+
+    msg = ("Associate network '%s' to the VPN." % NET_1_NAME)
+    logger.info("\n\n--> %s..." % msg)
+    add_to_summary(1, msg)
+    add_to_summary(0, "-")
+
+    os_utils.create_network_association(
+        neutron_client, bgpvpn1_id, network_1_id)
+
+    # Wait for VMs to get ips.
+    time.sleep(80)
+
+    # 10.10.10.12 should return sdnvpn-2 to sdnvpn-1
+    check_ssh_output(
+        vm_1, vm_1_ip, vm_2, vm_2_ip, expected=INSTANCE_2_NAME, timeout=200)
+    # 10.10.11.13 should return sdnvpn-3 to sdnvpn-1
+    check_ssh_output(
+        vm_1, vm_1_ip, vm_3, vm_3_ip, expected=INSTANCE_3_NAME, timeout=30)
+
+    add_to_summary(0, "-")
+    msg = ("Create VPN2 with eRT=iRT")
+    logger.info("\n\n--> %s ..." % msg)
+    add_to_summary(1, msg)
+    vpn2_name = "sdnvpn-2-" + str(randint(100000, 999999))
+    kwargs = {"import_targets": "88:88",
+              "export_targets": "88:88",
+              "route_targets": "88:88",
+              "name": vpn2_name}
+    bgpvpn2 = os_utils.create_bgpvpn(neutron_client, **kwargs)
+    bgpvpn2_id = bgpvpn2['bgpvpn']['id']
+    logger.debug("VPN created details: %s" % bgpvpn2)
+
+    msg = ("Associate network '%s' to the VPN2." % NET_2_NAME)
+    logger.info("\n\n--> %s..." % msg)
+    add_to_summary(1, msg)
+    add_to_summary(0, "-")
+
+    os_utils.create_network_association(
+        neutron_client, bgpvpn2_id, network_2_id)
+
+    # Wait a bit for this to take effect
+    time.sleep(80)
+
+    # 10.10.11.13 should return sdnvpn-5 to sdnvpn-4
+    check_ssh_output(
+        vm_4, vm_4_ip, vm_5, vm_5_ip, expected=INSTANCE_5_NAME, timeout=30)
+
+    # 10.10.10.11 should return "not reachable" to sdnvpn-4
+    check_ssh_output(
+        vm_4, vm_4_ip, vm_1, vm_1_ip, expected="not reachable", timeout=30)
+
+    add_to_summary(0, "=")
+    logger.info("\n%s" % SUMMARY)
+
+    if TEST_RESULT == "PASS":
+        logger.info("All the sub tests have passed as expected.")
+    else:
+        logger.info("One or more sub tests have failed.")
+
+    sys.exit(0)
 
 
 if __name__ == '__main__':
     main()
+
+            "cirros@test1>/home/cirros/.ssh/authorized_keys\n"
+            "sudo chown cirros:cirros /home/cirros/.ssh/authorized_keys\n"
+            "chmod 700 /home/cirros/.ssh\n"
+            "sudo chown cirros:cirros /home/cirros/.ssh/\n"
+            "sudo chown cirros:cirros /home/cirros/id_rsa\n"
+            "mv /home/cirros/id_rsa /home/cirros/.ssh/\n"
+def generate_userdata_common():
+    return ("#!/bin/sh\n"
+            "sudo mkdir -p /home/cirros/.ssh/\n"
+    return instance
+
+
+    logger.debug("Adding '%s' to security group '%s'..."
+                 % (name, SECGROUP_NAME))
+    os_utils.add_secgroup_to_instance(nova_client, instance.id, sg_id)
+