create the default security group rules to test the floating ips. 53/15953/1
authorNarinder Gupta <narinder.gupta@canonical.com>
Thu, 23 Jun 2016 02:34:00 +0000 (21:34 -0500)
committerNarinder Gupta <narinder.gupta@canonical.com>
Thu, 23 Jun 2016 02:34:43 +0000 (21:34 -0500)
Change-Id: I91a3fe0c3d28da27ea521d93e826b16ffc7a4261
Signed-off-by: Narinder Gupta <narinder.gupta@canonical.com>
ci/deploy.sh
ci/openstack.sh

index 9d0c028..a374d39 100755 (executable)
@@ -163,12 +163,6 @@ fi
 check_status
 echo "...... deployment finished  ......."
 
-if [ "$opnfvsdn" == "onos" ]; then
-    ./openstack.sh "$opnfvsdn"
-    check_status
-else
-    #create the basic data for verification of stack.
-    ./openstack.sh
-fi
+./openstack.sh "$opnfvsdn"
 
 echo "...... finished  ......."
index 1b36aab..2da729f 100755 (executable)
@@ -106,14 +106,22 @@ if [ "onos" == "$1" ]; then
     neutron net-create ext-net --shared --router:external=True
     neutron subnet-create ext-net --name ext-subnet $EXTNET_NET
     update_gw_mac
+elif [ "nosdn" == "$1" ]; then
+    neutron net-create ext-net --shared --router:external --provider:physical_network external --provider:network_type flat
+    neutron subnet-create ext-net --name ext-subnet \
+       --allocation-pool start=$EXTNET_FIP,end=$EXTNET_LIP \
+          --disable-dhcp --gateway $EXTNET_GW $EXTNET_NET
+    # configure security groups
+    neutron security-group-rule-create --direction ingress --ethertype IPv4 --protocol icmp --remote-ip-prefix 0.0.0.0/0 default
+    neutron security-group-rule-create --direction ingress --ethertype IPv4 --protocol tcp --port-range-min 22 --port-range-max 22 --remote-ip-prefix 0.0.0.0/0 default
 else
     neutron net-create ext-net --shared --router:external --provider:physical_network external --provider:network_type flat
     neutron subnet-create ext-net --name ext-subnet \
        --allocation-pool start=$EXTNET_FIP,end=$EXTNET_LIP \
           --disable-dhcp --gateway $EXTNET_GW $EXTNET_NET
     # configure security groups
-#    neutron security-group-rule-create --direction ingress --ethertype IPv4 --protocol icmp --remote-ip-prefix 0.0.0.0/0 default
-#    neutron security-group-rule-create --direction ingress --ethertype IPv4 --protocol tcp --port-range-min 22 --port-range-max 22 --remote-ip-prefix 0.0.0.0/0 default
+    #neutron security-group-rule-create --direction ingress --ethertype IPv4 --protocol icmp --remote-ip-prefix 0.0.0.0/0 default
+    #neutron security-group-rule-create --direction ingress --ethertype IPv4 --protocol tcp --port-range-min 22 --port-range-max 22 --remote-ip-prefix 0.0.0.0/0 default
 fi