Testcase for router/FloatingIP & net assoc mutual exclusivity 23/25623/2
authorRomanos Skiadas <rski@intracom-telecom.com>
Wed, 7 Dec 2016 12:11:16 +0000 (14:11 +0200)
committerRomanos Skiadas <rski@intracom-telecom.com>
Tue, 13 Dec 2016 13:35:52 +0000 (15:35 +0200)
A testcase for ODL Bug 6962, testing whether a subnet with a router can be
network associated:
- Create two VMs, each in a subnet with a router
- Network assoc the two networks in a VPN iRT=eRT
- Try to ping from one VM to the other
- Assign a floating IP to a VM
- Ping it

JIRA: SDNVPN-88
Change-Id: I464f62b8bba55bc5d162071406637f6be846f223
Signed-off-by: Romanos Skiadas <rski@intracom-telecom.com>
test/functest/config.yaml
test/functest/results.py
test/functest/testcase_7.py [new file with mode: 0644]
test/functest/utils.py

index d075c77..ccd5db7 100644 (file)
@@ -99,3 +99,24 @@ testcases:
       targets1: '88:88'
       targets2: '55:55'
       route_distinguishers: '12:12'
+
+  testcase_7:
+      enabled: false
+      description: Network associate VPNs with routers attached (ODL Bug 6962)
+      success_criteria: 100
+      testname_db: functest_testcase_7
+      image_name: sdnvpn-image
+      instance_1_name: sdnvpn-7-1
+      instance_2_name: sdnvpn-7-2
+      net_1_name: sdnvpn-7-1
+      subnet_1_name: sdnvpn-7-1-subnet
+      subnet_1_cidr: 10.10.10.0/24
+      router_1_name: sdnvpn-7-1-router
+      net_2_name: sdnvpn-7-2
+      subnet_2_name: sdnvpn-7-2-subnet
+      subnet_2_cidr: 10.10.20.0/24
+      router_2_name: sdnvpn-7-2-router
+      secgroup_name: sdnvpn-sg
+      secgroup_descr: Security group for SDNVPN test cases
+      targets: '77:77'
+      route_distinguishers: '11:11'
index 37dfc24..66e399e 100644 (file)
@@ -10,6 +10,7 @@
 import time
 
 import functest.utils.functest_logger as ft_logger
+import functest.utils.functest_utils as ft_utils
 
 logger = ft_logger.Logger("sdnvpn-results").getLogger()
 
@@ -161,6 +162,16 @@ class Results(object):
                     self.add_failure(test_case_name)
                     break
 
+    def ping_ip_test(self, address):
+        ping = "ping %s -c 3" % address
+        testcase_name = "Ping IP %s" % address
+        exit_code = ft_utils.execute_command(ping)
+
+        if exit_code != 0:
+            self.add_failure(testcase_name)
+        else:
+            self.add_success(testcase_name)
+
     def compile_summary(self, SUCCESS_CRITERIA):
         success_message = "All the subtests have passed."
         failure_message = "One or more subtests have failed."
diff --git a/test/functest/testcase_7.py b/test/functest/testcase_7.py
new file mode 100644 (file)
index 0000000..0e4a913
--- /dev/null
@@ -0,0 +1,153 @@
+#!/usr/bin/python
+#
+# Copyright (c) 2015 All rights reserved
+# This program and the accompanying materials
+# are made available under the terms of the Apache License, Version 2.0
+# which accompanies this distribution, and is available at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+"""
+Testcase for router/FloatingIP & net assoc mutual exclusivity
+
+A testcase for ODL Bug 6962, testing whether a subnet with a router can be
+network associated:
+- Create two VMs, each in a subnet with a router
+- Network assoc the two networks in a VPN iRT=eRT
+- Try to ping from one VM to the other
+- Assign a floating IP to a VM
+- Ping it
+"""
+import argparse
+
+import functest.utils.functest_logger as ft_logger
+import functest.utils.openstack_utils as os_utils
+
+import utils as test_utils
+from results import Results
+import config as sdnvpn_config
+
+parser = argparse.ArgumentParser()
+
+parser.add_argument("-r", "--report",
+                    help="Create json result file",
+                    action="store_true")
+
+args = parser.parse_args()
+
+logger = ft_logger.Logger("sdnvpn-testcase-7").getLogger()
+
+COMMON_CONFIG = sdnvpn_config.CommonConfig()
+TESTCASE_CONFIG = sdnvpn_config.TestcaseConfig('testcase_7')
+
+
+def main():
+    results = Results(COMMON_CONFIG.line_length)
+
+    results.add_to_summary(0, "=")
+    results.add_to_summary(2, "STATUS", "SUBTEST")
+    results.add_to_summary(0, "=")
+
+    nova_client = os_utils.get_nova_client()
+    neutron_client = os_utils.get_neutron_client()
+    glance_client = os_utils.get_glance_client()
+
+    image_id = os_utils.create_glance_image(glance_client,
+                                            TESTCASE_CONFIG.image_name,
+                                            COMMON_CONFIG.image_path,
+                                            disk=COMMON_CONFIG.image_format,
+                                            container="bare",
+                                            public=True)
+    network_1_id, _, _ = test_utils.create_network(
+        neutron_client,
+        TESTCASE_CONFIG.net_1_name,
+        TESTCASE_CONFIG.subnet_1_name,
+        TESTCASE_CONFIG.subnet_1_cidr,
+        TESTCASE_CONFIG.router_1_name)
+    network_2_id, _, _ = test_utils.create_network(
+        neutron_client,
+        TESTCASE_CONFIG.net_2_name,
+        TESTCASE_CONFIG.subnet_2_name,
+        TESTCASE_CONFIG.subnet_2_cidr,
+        TESTCASE_CONFIG.router_2_name)
+
+    sg_id = os_utils.create_security_group_full(neutron_client,
+                                                TESTCASE_CONFIG.secgroup_name,
+                                                TESTCASE_CONFIG.secgroup_descr)
+    test_utils.open_icmp_ssh(neutron_client, sg_id)
+    vm_2 = test_utils.create_instance(
+        nova_client,
+        TESTCASE_CONFIG.instance_2_name,
+        image_id,
+        network_2_id,
+        sg_id,
+        secgroup_name=TESTCASE_CONFIG.secgroup_name)
+    vm_2_ip = vm_2.networks.itervalues().next()[0]
+
+    u1 = test_utils.generate_ping_userdata([vm_2_ip])
+    vm_1 = test_utils.create_instance(
+        nova_client,
+        TESTCASE_CONFIG.instance_1_name,
+        image_id,
+        network_1_id,
+        sg_id,
+        secgroup_name=TESTCASE_CONFIG.secgroup_name,
+        userdata=u1)
+
+    msg = ("Create VPN with eRT==iRT")
+    results.record_action(msg)
+    vpn_name = "sdnvpn-7"
+    kwargs = {"import_targets": TESTCASE_CONFIG.targets,
+              "export_targets": TESTCASE_CONFIG.targets,
+              "route_distinguishers": TESTCASE_CONFIG.route_distinguishers,
+              "name": vpn_name}
+    bgpvpn = os_utils.create_bgpvpn(neutron_client, **kwargs)
+    bgpvpn_id = bgpvpn['bgpvpn']['id']
+    logger.debug("VPN created details: %s" % bgpvpn)
+
+    msg = ("Associate networks '%s', '%s' to the VPN."
+           % (TESTCASE_CONFIG.net_1_name,
+              TESTCASE_CONFIG.net_2_name))
+    results.record_action(msg)
+    results.add_to_summary(0, "-")
+
+    os_utils.create_network_association(
+        neutron_client, bgpvpn_id, network_1_id)
+    os_utils.create_network_association(
+        neutron_client, bgpvpn_id, network_2_id)
+
+    test_utils.wait_for_bgp_net_assoc(
+        neutron_client, bgpvpn_id, network_1_id)
+    test_utils.wait_for_bgp_net_assoc(
+        neutron_client, bgpvpn_id, network_2_id)
+
+    instances_up = test_utils.wait_for_instances_up(vm_1, vm_2)
+    if not instances_up:
+        logger.error("One or more instances is down")
+
+    logger.info("Waiting for the VMs to connect to each other using the"
+                " updated network configuration")
+    test_utils.wait_before_subtest()
+
+    results.get_ping_status(vm_1, vm_2, expected="PASS", timeout=200)
+    results.add_to_summary(0, "=")
+
+    msg = "Assign a Floating IP to %s" % vm_2.name
+    results.record_action(msg)
+
+    fip = os_utils.create_floating_ip(neutron_client)
+    fip_added = os_utils.add_floating_ip(nova_client, vm_2.id, fip['fip_addr'])
+    if fip_added:
+        results.add_success(msg)
+    else:
+        results.add_failure(msg)
+
+    msg = "Ping %s via Floating IP" % vm_2.name
+    results.record_action(msg)
+    results.add_to_summary(0, "-")
+    results.ping_ip_test(fip['fip_addr'])
+
+    return results.compile_summary(TESTCASE_CONFIG.success_criteria)
+
+if __name__ == '__main__':
+    main()
index 90dfe93..cbfc88d 100644 (file)
@@ -290,3 +290,14 @@ def assert_and_get_compute_nodes(nova_client, required_node_number=2):
 
     logger.debug("Compute nodes: %s" % compute_nodes)
     return compute_nodes
+
+
+def open_icmp_ssh(neutron_client, security_group_id):
+    os_utils.create_secgroup_rule(neutron_client,
+                                  security_group_id,
+                                  'ingress',
+                                  'icmp')
+    os_utils.create_secgroup_rule(neutron_client,
+                                  security_group_id,
+                                  'tcp',
+                                  80, 80)