SFC Testcase for functest 37/16437/8
authorManuel Buil <manuel.buil@ericsson.com>
Wed, 6 Jul 2016 10:26:46 +0000 (12:26 +0200)
committerJose Lausuch <jose.lausuch@ericsson.com>
Fri, 8 Jul 2016 14:51:14 +0000 (14:51 +0000)
JIRA: FUNCTEST-354

This test case creates two chains, one blocks ssh, the other http
We check with the client that the blocking works in one and then
we change the classifier rules to check the other one

Change-Id: I7d12f5d8b4bc4a7e1566f04e02ca78ac2a4e0920
Signed-off-by: Manuel Buil <manuel.buil@ericsson.com>
testcases/features/sfc/sfc.py [new file with mode: 0644]
testcases/features/sfc/sfc_change_classi.bash [new file with mode: 0755]
testcases/features/sfc/sfc_tacker.bash [new file with mode: 0755]
testcases/features/sfc/test-vnfd1.yaml [new file with mode: 0644]
testcases/features/sfc/test-vnfd2.yaml [new file with mode: 0644]

diff --git a/testcases/features/sfc/sfc.py b/testcases/features/sfc/sfc.py
new file mode 100644 (file)
index 0000000..af6f95b
--- /dev/null
@@ -0,0 +1,361 @@
+import argparse
+import os
+import subprocess
+import sys
+import time
+import functest.utils.functest_logger as ft_logger
+import functest.utils.functest_utils as ft_utils
+import functest.utils.openstack_utils as os_utils
+import paramiko
+
+
+parser = argparse.ArgumentParser()
+
+parser.add_argument("-r", "--report",
+                    help="Create json result file",
+                    action="store_true")
+
+args = parser.parse_args()
+
+""" logging configuration """
+logger = ft_logger.Logger("create_instance_and_ip").getLogger()
+
+REPO_PATH = os.environ['repos_dir'] + '/functest/'
+HOME = os.environ['HOME'] + "/"
+
+VM_BOOT_TIMEOUT = 180
+INSTANCE_NAME = "client"
+FLAVOR = "m1.small"
+IMAGE_NAME = "sf_summit2016"
+IMAGE_FILENAME = "sf_summit2016.qcow2"
+IMAGE_FORMAT = "qcow2"
+IMAGE_PATH = "/home/opnfv/functest/data" + "/" + IMAGE_FILENAME
+
+# NEUTRON Private Network parameters
+
+NET_NAME = "example-net"
+SUBNET_NAME = "example-subnet"
+SUBNET_CIDR = "11.0.0.0/24"
+ROUTER_NAME = "example-router"
+
+SECGROUP_NAME = "example-sg"
+SECGROUP_DESCR = "Example Security group"
+
+INSTANCE_NAME_2 = "server"
+
+# TEST_DB = ft_utils.get_parameter_from_yaml("results.test_db_url")
+
+PRE_SETUP_SCRIPT = 'sfc_pre_setup.bash'
+TACKER_SCRIPT = 'sfc_tacker.bash'
+TEARDOWN_SCRIPT = "sfc_teardown.bash"
+TACKER_CHANGECLASSI = "sfc_change_classi.bash"
+
+
+def main():
+
+    nova_client = os_utils.get_nova_client()
+    neutron_client = os_utils.get_neutron_client()
+    glance_client = os_utils.get_glance_client()
+
+# Download the image
+
+    if not os.path.isfile(IMAGE_PATH):
+        logger.info("Downloading image")
+        ft_utils.download_url(
+            "http://artifacts.opnfv.org/sfc/demo/sf_summit2016.qcow2",
+            "/home/opnfv/functest/data/")
+    else:
+        logger.info("Using old image")
+
+# Allow any port so that tacker commands reaches the server.
+#CHECK IF THIS STILL MAKES SENSE WHEN TACKER IS INCLUDED IN OPNFV INSTALATION
+
+    controller_command = ("sshpass -p r00tme ssh root@10.20.0.2"
+                          " 'fuel node'|grep controller|awk '{print $10}'")
+    logger.info("Executing tacker script: '%s'" % controller_command)
+    process = subprocess.Popen(controller_command,
+                               shell=True,
+                               stdout=subprocess.PIPE)
+    ip = process.stdout.readline()
+
+    iptable_command1 = ("sshpass -p r00tme ssh root@10.20.0.2 ssh"
+                        " " + ip + " iptables -P INPUT ACCEPT ")
+    iptable_command2 = ("sshpass -p r00tme ssh root@10.20.0.2 ssh"
+                        " " + ip + "iptables -t nat -P INPUT ACCEPT ")
+
+    subprocess.call(iptable_command1, shell=True)
+    subprocess.call(iptable_command2, shell=True)
+
+# Create glance image and the neutron network
+
+    image_id = os_utils.create_glance_image(glance_client,
+                                            IMAGE_NAME,
+                                            IMAGE_PATH,
+                                            disk=IMAGE_FORMAT,
+                                            container="bare",
+                                            public=True,
+                                            logger=logger)
+
+    network_dic = os_utils.create_network_full(logger,
+                                               neutron_client,
+                                               NET_NAME,
+                                               SUBNET_NAME,
+                                               ROUTER_NAME,
+                                               SUBNET_CIDR)
+    if not network_dic:
+        logger.error(
+            "There has been a problem when creating the neutron network")
+        sys.exit(-1)
+
+    network_id = network_dic["net_id"]
+
+    sg_id = os_utils.create_security_group_full(logger, neutron_client,
+                                                SECGROUP_NAME, SECGROUP_DESCR)
+
+    # boot INTANCE
+    logger.info("Creating instance '%s'..." % INSTANCE_NAME)
+    logger.debug(
+        "Configuration:\n name=%s \n flavor=%s \n image=%s \n "
+        "network=%s \n" % (INSTANCE_NAME, FLAVOR, image_id, network_id))
+    instance = os_utils.create_instance_and_wait_for_active(FLAVOR,
+                                                            image_id,
+                                                            network_id,
+                                                            INSTANCE_NAME)
+
+    if instance is None:
+        logger.error("Error while booting instance.")
+        sys.exit(-1)
+    # Retrieve IP of INSTANCE
+    instance_ip = instance.networks.get(NET_NAME)[0]
+    logger.debug("Instance '%s' got private ip '%s'." %
+                 (INSTANCE_NAME, instance_ip))
+
+    logger.info("Adding '%s' to security group '%s'..."
+                % (INSTANCE_NAME, SECGROUP_NAME))
+    os_utils.add_secgroup_to_instance(nova_client, instance.id, sg_id)
+
+    logger.info("Creating floating IP for VM '%s'..." % INSTANCE_NAME)
+    floatip_dic = os_utils.create_floating_ip(neutron_client)
+    floatip_client = floatip_dic['fip_addr']
+    # floatip_id = floatip_dic['fip_id']
+
+    if floatip_client is None:
+        logger.error("Cannot create floating IP.")
+        sys.exit(-1)
+    logger.info("Floating IP created: '%s'" % floatip_client)
+
+    logger.info("Associating floating ip: '%s' to VM '%s' "
+                % (floatip_client, INSTANCE_NAME))
+    if not os_utils.add_floating_ip(nova_client, instance.id, floatip_client):
+        logger.error("Cannot associate floating IP to VM.")
+        sys.exit(-1)
+
+# STARTING SECOND VM (server) ###
+
+    # boot INTANCE
+    logger.info("Creating instance '%s'..." % INSTANCE_NAME)
+    logger.debug(
+        "Configuration:\n name=%s \n flavor=%s \n image=%s \n "
+        "network=%s \n" % (INSTANCE_NAME, FLAVOR, image_id, network_id))
+    instance_2 = os_utils.create_instance_and_wait_for_active(FLAVOR,
+                                                              image_id,
+                                                              network_id,
+                                                              INSTANCE_NAME_2)
+
+    if instance_2 is None:
+        logger.error("Error while booting instance.")
+        sys.exit(-1)
+    # Retrieve IP of INSTANCE
+    instance_ip_2 = instance_2.networks.get(NET_NAME)[0]
+    logger.debug("Instance '%s' got private ip '%s'." %
+                 (INSTANCE_NAME_2, instance_ip_2))
+
+    logger.info("Adding '%s' to security group '%s'..."
+                % (INSTANCE_NAME_2, SECGROUP_NAME))
+    os_utils.add_secgroup_to_instance(nova_client, instance_2.id, sg_id)
+
+    logger.info("Creating floating IP for VM '%s'..." % INSTANCE_NAME_2)
+    floatip_dic = os_utils.create_floating_ip(neutron_client)
+    floatip_server = floatip_dic['fip_addr']
+    # floatip_id = floatip_dic['fip_id']
+
+    if floatip_server is None:
+        logger.error("Cannot create floating IP.")
+        sys.exit(-1)
+    logger.info("Floating IP created: '%s'" % floatip_server)
+
+    logger.info("Associating floating ip: '%s' to VM '%s' "
+                % (floatip_server, INSTANCE_NAME_2))
+
+    if not os_utils.add_floating_ip(nova_client,
+                                    instance_2.id,
+                                    floatip_server):
+        logger.error("Cannot associate floating IP to VM.")
+        sys.exit(-1)
+
+    # CREATION OF THE 2 SF ####
+
+    tacker_script = "/home/opnfv/repos/functest/testcases/features/sfc/" + \
+        TACKER_SCRIPT
+    logger.info("Executing tacker script: '%s'" % tacker_script)
+    subprocess.call(tacker_script, shell=True)
+
+    # SSH CALL TO START HTTP SERVER
+    ssh = paramiko.SSHClient()
+    ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
+
+    try:
+        ssh.connect(floatip_server, username="root",
+                    password="opnfv", timeout=2)
+        command = "python -m SimpleHTTPServer 80 > /dev/null 2>&1 &"
+        logger.info("Starting HTTP server")
+        (stdin, stdout, stderr) = ssh.exec_command(command)
+    except:
+        logger.debug("Waiting for %s..." % floatip_server)
+        time.sleep(6)
+        # timeout -= 1
+
+    instances = nova_client.servers.list(search_opts={'all_tenants': 1})
+    ips = []
+    try:
+        for instance in instances:
+            if "server" not in instance.name:
+                if "client" not in instance.name:
+                    logger.debug(
+                        "This is the instance name: %s " % instance.name)
+                    floatip_dic = os_utils.create_floating_ip(neutron_client)
+                    floatip = floatip_dic['fip_addr']
+                    ips.append(floatip)
+                    instance.add_floating_ip(floatip)
+    except:
+        logger.debug("Problems assigning floating IP to SFs")
+
+    logger.debug("Floating IPs for SFs: %s..." % ips)
+    # SSH TO START THE VXLAN_TOOL ON SF1
+    logger.info("Configuring the SFs")
+    try:
+        ssh.connect(ips[0], username="root",
+                    password="opnfv", timeout=2)
+        command = ("nohup python vxlan_tool.py -i eth0 "
+                   "-d forward -v off -f -b 80 &")
+        (stdin, stdout, stderr) = ssh.exec_command(command)
+    except:
+        logger.debug("Waiting for %s..." % ips[0])
+        time.sleep(6)
+        # timeout -= 1
+
+    # SSH TO START THE VXLAN_TOOL ON SF2
+    try:
+        ssh.connect(ips[1], username="root",
+                    password="opnfv", timeout=2)
+        command = ("nohup python vxlan_tool.py -i eth0 "
+                   "-d forward -v off -f -b 22 &")
+        (stdin, stdout, stderr) = ssh.exec_command(command)
+    except:
+        logger.debug("Waiting for %s..." % ips[1])
+        time.sleep(6)
+        # timeout -= 1
+
+    # SSH TO EXECUTE cmd_client
+
+    logger.info("TEST STARTED")
+    try:
+        ssh.connect(floatip_client, username="root",
+                    password="opnfv", timeout=2)
+        command = "nc -w 5 -zv " + floatip_server + " 22 2>&1"
+        (stdin, stdout, stderr) = ssh.exec_command(command)
+    except:
+        logger.debug("Waiting for %s..." % floatip_client)
+        time.sleep(6)
+        # timeout -= 1
+
+    # WRITE THE CORRECT WAY TO DO LOGGING
+    i = 0
+    logger.info("First output: %s" % stdout.readlines())
+    if "timed out" in stdout.readlines()[0]:
+        logger.info('\033[92m' + "TEST 1 [PASSED] "
+                    "==> SSH BLOCKED" + '\033[0m')
+        i = i + 1
+    else:
+        logger.debug('\033[91m' + "TEST 1 [FAILED] "
+                     "==> SSH NOT BLOCKED" + '\033[0m')
+        return
+
+    # SSH TO EXECUTE cmd_client
+
+    try:
+        ssh.connect(floatip_client, username="root",
+                    password="opnfv", timeout=2)
+        command = "nc -w 5 -zv " + floatip_server + " 80 2>&1"
+        (stdin, stdout, stderr) = ssh.exec_command(command)
+    except:
+        logger.debug("Waiting for %s..." % floatip_client)
+        time.sleep(6)
+        # timeout -= 1
+
+    if "succeeded" in stdout.readlines()[0]:
+        logger.info('\033[92m' + "TEST 2 [PASSED] "
+                    "==> HTTP WORKS" + '\033[0m')
+        i = i + 1
+    else:
+        logger.debug('\033[91m' + "TEST 2 [FAILED] "
+                     "==> HTTP BLOCKED" + '\033[0m')
+        return
+
+    # CHANGE OF CLASSIFICATION #
+    logger.info("Changing the classification")
+    tacker_classi = "/home/opnfv/repos/functest/testcases/features/sfc/" + \
+        TACKER_CHANGECLASSI
+    subprocess.call(tacker_classi, shell=True)
+
+    # SSH TO EXECUTE cmd_client
+
+    try:
+        ssh.connect(floatip_client, username="root",
+                    password="opnfv", timeout=2)
+        command = "nc -w 5 -zv " + floatip_server + " 80 2>&1"
+        (stdin, stdout, stderr) = ssh.exec_command(command)
+    except:
+        logger.debug("Waiting for %s..." % floatip_client)
+        time.sleep(6)
+        # timeout -= 1
+
+    if "timed out" in stdout.readlines()[0]:
+        logger.info('\033[92m' + "TEST 3 [WORKS] "
+                    "==> HTTP BLOCKED" + '\033[0m')
+        i = i + 1
+    else:
+        logger.debug('\033[91m' + "TEST 3 [FAILED] "
+                     "==> HTTP NOT BLOCKED" + '\033[0m')
+        return
+
+    # SSH TO EXECUTE cmd_client
+
+    try:
+        ssh.connect(floatip_client, username="root",
+                    password="opnfv", timeout=2)
+        command = "nc -w 5 -zv " + floatip_server + " 22 2>&1"
+        (stdin, stdout, stderr) = ssh.exec_command(command)
+    except:
+        logger.debug("Waiting for %s..." % floatip_client)
+        time.sleep(6)
+        # timeout -= 1
+
+    if "succeeded" in stdout.readlines()[0]:
+        logger.info('\033[92m' + "TEST 4 [WORKS] "
+                    "==> SSH WORKS" + '\033[0m')
+        i = i + 1
+    else:
+        logger.debug('\033[91m' + "TEST 4 [FAILED] "
+                     "==> SSH BLOCKED" + '\033[0m')
+        return
+
+    if i == 4:
+        for x in range(0, 5):
+            logger.info('\033[92m' + "SFC TEST WORKED"
+                        " :) \n" + '\033[0m')
+
+    sys.exit(0)
+
+if __name__ == '__main__':
+    main()
diff --git a/testcases/features/sfc/sfc_change_classi.bash b/testcases/features/sfc/sfc_change_classi.bash
new file mode 100755 (executable)
index 0000000..70375ab
--- /dev/null
@@ -0,0 +1,7 @@
+tacker sfc-classifier-delete red_http
+tacker sfc-classifier-delete red_ssh
+
+tacker sfc-classifier-create --name blue_http --chain blue --match source_port=0,dest_port=80,protocol=6
+tacker sfc-classifier-create --name blue_ssh  --chain blue --match source_port=0,dest_port=22,protocol=6
+
+tacker sfc-classifier-list
diff --git a/testcases/features/sfc/sfc_tacker.bash b/testcases/features/sfc/sfc_tacker.bash
new file mode 100755 (executable)
index 0000000..8b53eeb
--- /dev/null
@@ -0,0 +1,31 @@
+#!/bin/bash
+BASEDIR=`pwd`
+
+#import VNF descriptor
+tacker vnfd-create --vnfd-file ${BASEDIR}/test-vnfd1.yaml
+tacker vnfd-create --vnfd-file ${BASEDIR}/test-vnfd2.yaml
+
+#create instances of the imported VNF
+tacker vnf-create --name testVNF1 --vnfd-name test-vnfd1
+tacker vnf-create --name testVNF2 --vnfd-name test-vnfd2
+
+key=true
+while $key;do
+        sleep 3
+        active=`tacker vnf-list | grep -E 'PENDING|ERROR'`
+        echo -e "checking if SFs are up:  $active"
+        if [ -z "$active" ]; then
+                key=false
+        fi
+done
+
+#create service chain
+tacker sfc-create --name red --chain testVNF1
+tacker sfc-create --name blue --chain testVNF2
+
+#create classifier
+tacker sfc-classifier-create --name red_http --chain red --match source_port=0,dest_port=80,protocol=6
+tacker sfc-classifier-create --name red_ssh --chain red --match source_port=0,dest_port=22,protocol=6
+
+tacker sfc-list
+tacker sfc-classifier-list
diff --git a/testcases/features/sfc/test-vnfd1.yaml b/testcases/features/sfc/test-vnfd1.yaml
new file mode 100644 (file)
index 0000000..310fc58
--- /dev/null
@@ -0,0 +1,31 @@
+template_name: test-vnfd1
+description: firewall1-example
+
+service_properties:
+  Id: firewall1-vnfd
+  vendor: tacker
+  version: 1
+  type:
+      - firewall1
+vdus:
+  vdu1:
+    id: vdu1
+    vm_image: sf_summit2016
+    instance_type: custom
+    service_type: firewall1
+
+    network_interfaces:
+      management:
+        network: example-net
+        management: true
+
+    placement_policy:
+      availability_zone: nova
+
+    auto-scaling: noop
+    monitoring_policy: noop
+    failure_policy: respawn
+
+    config:
+      param0: key0
+      param1: key1
diff --git a/testcases/features/sfc/test-vnfd2.yaml b/testcases/features/sfc/test-vnfd2.yaml
new file mode 100644 (file)
index 0000000..fd7ba0f
--- /dev/null
@@ -0,0 +1,31 @@
+template_name: test-vnfd2
+description: firewall2-example
+
+service_properties:
+  Id: firewall2-vnfd
+  vendor: tacker
+  version: 1
+  type:
+      - firewall2
+vdus:
+  vdu1:
+    id: vdu1
+    vm_image: sf_summit2016
+    instance_type: custom
+    service_type: firewall2
+
+    network_interfaces:
+      management:
+        network: example-net
+        management: true
+
+    placement_policy:
+      availability_zone: nova
+
+    auto-scaling: noop
+    monitoring_policy: noop
+    failure_policy: respawn
+
+    config:
+      param0: key0
+      param1: key1