mirror of
https://github.com/apache/cloudstack.git
synced 2025-10-26 08:42:29 +01:00
Removed duplicate test data related to vm properties.Modified tests dependent on it Removed duplicte service offerings from test data and modified tests dependent on it Bug-Id: CLOUDSTACK-8617 This closes #644
325 lines
13 KiB
Python
325 lines
13 KiB
Python
# Licensed to the Apache Software Foundation (ASF) under one
|
|
# or more contributor license agreements. See the NOTICE file
|
|
# distributed with this work for additional information
|
|
# regarding copyright ownership. The ASF licenses this file
|
|
# to you under the Apache License, Version 2.0 (the
|
|
# "License"); you may not use this file except in compliance
|
|
# with the License. You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing,
|
|
# software distributed under the License is distributed on an
|
|
# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
|
|
# KIND, either express or implied. See the License for the
|
|
# specific language governing permissions and limitations
|
|
# under the License.
|
|
""" Tests for VPN in VPC
|
|
"""
|
|
#Import Local Modules
|
|
from marvin.codes import FAILED
|
|
from marvin.cloudstackTestCase import *
|
|
from marvin.cloudstackAPI import *
|
|
from marvin.lib.utils import *
|
|
from marvin.lib.base import *
|
|
from marvin.lib.common import *
|
|
from nose.plugins.attrib import attr
|
|
|
|
import time
|
|
|
|
class TestVpcRemoteAccessVpn(cloudstackTestCase):
|
|
|
|
@classmethod
|
|
def setUpClass(cls):
|
|
testClient = super(TestVpcRemoteAccessVpn, cls).getClsTestClient()
|
|
cls.apiclient = testClient.getApiClient()
|
|
cls.services = testClient.getParsedTestDataConfig()
|
|
|
|
cls.zone = get_zone(cls.apiclient, testClient.getZoneForTests())
|
|
cls.domain = get_domain(cls.apiclient)
|
|
cls.service_offering = ServiceOffering.create(
|
|
cls.apiclient,
|
|
cls.services["service_offerings"]["tiny"]
|
|
)
|
|
cls.account = Account.create(cls.apiclient, services=cls.services["account"])
|
|
cls.template = get_template(
|
|
cls.apiclient,
|
|
cls.zone.id,
|
|
cls.services["ostype"]
|
|
)
|
|
if cls.template == FAILED:
|
|
assert False, "get_template() failed to return template with description %s" % cls.services["ostype"]
|
|
|
|
cls.cleanup = [cls.account]
|
|
|
|
|
|
@attr(tags=["advanced"], required_hardware="false")
|
|
def test_vpc_remote_access_vpn(self):
|
|
"""Test VPN in VPC"""
|
|
|
|
# 0) Get the default network offering for VPC
|
|
networkOffering = NetworkOffering.list(self.apiclient, name="DefaultIsolatedNetworkOfferingForVpcNetworks")
|
|
self.assert_(networkOffering is not None and len(networkOffering) > 0, "No VPC based network offering")
|
|
|
|
# 1) Create VPC
|
|
vpcOffering = VpcOffering.list(self.apiclient,isdefault=True)
|
|
self.assert_(vpcOffering is not None and len(vpcOffering)>0, "No VPC offerings found")
|
|
vpc = VPC.create(
|
|
apiclient=self.apiclient,
|
|
services=self.services["vpc"],
|
|
networkDomain="vpc.vpn",
|
|
vpcofferingid=vpcOffering[0].id,
|
|
zoneid=self.zone.id,
|
|
account=self.account.name,
|
|
domainid=self.domain.id
|
|
)
|
|
self.assert_(vpc is not None, "VPC creation failed")
|
|
self.debug("VPC %s created" %(vpc.id))
|
|
|
|
# 2) Create network in VPC
|
|
ntwk = Network.create(
|
|
apiclient=self.apiclient,
|
|
services=self.services["ntwk"],
|
|
accountid=self.account.name,
|
|
domainid=self.domain.id,
|
|
networkofferingid=networkOffering[0].id,
|
|
zoneid=self.zone.id,
|
|
vpcid=vpc.id
|
|
)
|
|
self.assertIsNotNone(ntwk, "Network failed to create")
|
|
self.debug("Network %s created in VPC %s" %(ntwk.id, vpc.id))
|
|
|
|
# 3) Deploy a vm
|
|
vm = VirtualMachine.create(self.apiclient, services=self.services["virtual_machine"],
|
|
templateid=self.template.id,
|
|
zoneid=self.zone.id,
|
|
accountid=self.account.name,
|
|
domainid= self.domain.id,
|
|
serviceofferingid=self.service_offering.id,
|
|
networkids=ntwk.id
|
|
)
|
|
self.assert_(vm is not None, "VM failed to deploy")
|
|
self.assert_(vm.state == 'Running', "VM is not running")
|
|
self.debug("VM %s deployed in VPC %s" %(vm.id, vpc.id))
|
|
|
|
# 4) Enable VPN for VPC
|
|
|
|
src_nat_list = PublicIPAddress.list(
|
|
self.apiclient,
|
|
account=self.account.name,
|
|
domainid=self.account.domainid,
|
|
listall=True,
|
|
issourcenat=True,
|
|
vpcid=vpc.id
|
|
)
|
|
ip = src_nat_list[0]
|
|
vpn = Vpn.create(self.apiclient,
|
|
publicipid=ip.id,
|
|
account=self.account.name,
|
|
domainid=self.account.domainid)
|
|
|
|
# 5) Add VPN user for VPC
|
|
vpnUser = VpnUser.create(self.apiclient,
|
|
account=self.account.name,
|
|
domainid=self.account.domainid,
|
|
username=self.services["vpn_user"]["username"],
|
|
password=self.services["vpn_user"]["password"])
|
|
|
|
# 6) Disable VPN for VPC
|
|
vpn.delete(self.apiclient)
|
|
|
|
@classmethod
|
|
def tearDownClass(cls):
|
|
try:
|
|
cleanup_resources(cls.apiclient, cls.cleanup)
|
|
except Exception, e:
|
|
raise Exception("Cleanup failed with %s" % e)
|
|
|
|
class TestVpcSite2SiteVpn(cloudstackTestCase):
|
|
|
|
@classmethod
|
|
def setUpClass(cls):
|
|
testClient = super(TestVpcSite2SiteVpn, cls).getClsTestClient()
|
|
cls.apiclient = testClient.getApiClient()
|
|
cls.services = testClient.getParsedTestDataConfig()
|
|
|
|
cls.zone = get_zone(cls.apiclient, testClient.getZoneForTests())
|
|
cls.domain = get_domain(cls.apiclient)
|
|
cls.service_offering = ServiceOffering.create(
|
|
cls.apiclient,
|
|
cls.services["service_offerings"]["tiny"]
|
|
)
|
|
cls.account = Account.create(cls.apiclient, services=cls.services["account"])
|
|
cls.template = get_template(
|
|
cls.apiclient,
|
|
cls.zone.id,
|
|
cls.services["ostype"]
|
|
)
|
|
if cls.template == FAILED:
|
|
assert False, "get_template() failed to return template with description %s" % cls.services["ostype"]
|
|
|
|
cls.cleanup = [cls.account]
|
|
|
|
@attr(tags=["advanced"], required_hardware="false")
|
|
def test_vpc_site2site_vpn(self):
|
|
"""Test VPN in VPC"""
|
|
|
|
# 0) Get the default network offering for VPC
|
|
networkOffering = NetworkOffering.list(self.apiclient, name="DefaultIsolatedNetworkOfferingForVpcNetworks")
|
|
self.assert_(networkOffering is not None and len(networkOffering) > 0, "No VPC based network offering")
|
|
|
|
# 1) Create VPC
|
|
vpcOffering = VpcOffering.list(self.apiclient,isdefault=True)
|
|
self.assert_(vpcOffering is not None and len(vpcOffering)>0, "No VPC offerings found")
|
|
|
|
vpc1 = VPC.create(
|
|
apiclient=self.apiclient,
|
|
services=self.services["vpc"],
|
|
networkDomain="vpc1.vpn",
|
|
vpcofferingid=vpcOffering[0].id,
|
|
zoneid=self.zone.id,
|
|
account=self.account.name,
|
|
domainid=self.domain.id
|
|
)
|
|
self.assert_(vpc1 is not None, "VPC creation failed")
|
|
self.debug("VPC1 %s created" %(vpc1.id))
|
|
|
|
vpc2 = VPC.create(
|
|
apiclient=self.apiclient,
|
|
services=self.services["vpc2"],
|
|
networkDomain="vpc2.vpn",
|
|
vpcofferingid=vpcOffering[0].id,
|
|
zoneid=self.zone.id,
|
|
account=self.account.name,
|
|
domainid=self.domain.id
|
|
)
|
|
self.assert_(vpc2 is not None, "VPC2 creation failed")
|
|
self.debug("VPC2 %s created" %(vpc1.id))
|
|
|
|
# 2) Create network in VPC
|
|
ntwk1 = Network.create(
|
|
apiclient=self.apiclient,
|
|
services=self.services["ntwk"],
|
|
accountid=self.account.name,
|
|
domainid=self.domain.id,
|
|
networkofferingid=networkOffering[0].id,
|
|
zoneid=self.zone.id,
|
|
vpcid=vpc1.id
|
|
)
|
|
self.assertIsNotNone(ntwk1, "Network failed to create")
|
|
self.debug("Network %s created in VPC %s" %(ntwk1.id, vpc1.id))
|
|
|
|
ntwk2 = Network.create(
|
|
apiclient=self.apiclient,
|
|
services=self.services["ntwk2"],
|
|
accountid=self.account.name,
|
|
domainid=self.domain.id,
|
|
networkofferingid=networkOffering[0].id,
|
|
zoneid=self.zone.id,
|
|
vpcid=vpc2.id
|
|
)
|
|
self.assertIsNotNone(ntwk2, "Network failed to create")
|
|
self.debug("Network %s created in VPC %s" %(ntwk2.id, vpc2.id))
|
|
|
|
# 3) Deploy a vm
|
|
vm1 = VirtualMachine.create(self.apiclient, services=self.services["virtual_machine"],
|
|
templateid=self.template.id,
|
|
zoneid=self.zone.id,
|
|
accountid=self.account.name,
|
|
domainid= self.domain.id,
|
|
serviceofferingid=self.service_offering.id,
|
|
networkids=ntwk1.id
|
|
)
|
|
self.assert_(vm1 is not None, "VM failed to deploy")
|
|
self.assert_(vm1.state == 'Running', "VM is not running")
|
|
self.debug("VM %s deployed in VPC %s" %(vm1.id, vpc1.id))
|
|
|
|
vm2 = VirtualMachine.create(self.apiclient, services=self.services["virtual_machine"],
|
|
templateid=self.template.id,
|
|
zoneid=self.zone.id,
|
|
accountid=self.account.name,
|
|
domainid= self.domain.id,
|
|
serviceofferingid=self.service_offering.id,
|
|
networkids=ntwk2.id
|
|
)
|
|
self.assert_(vm2 is not None, "VM failed to deploy")
|
|
self.assert_(vm2.state == 'Running', "VM is not running")
|
|
self.debug("VM %s deployed in VPC %s" %(vm2.id, vpc2.id))
|
|
|
|
# 4) Enable Site-to-Site VPN for VPC
|
|
cmd=createVpnGateway.createVpnGatewayCmd()
|
|
cmd.vpcid=vpc1.id
|
|
vpn1_response = self.apiclient.createVpnGateway(cmd)
|
|
|
|
self.debug("VPN gateway for VPC %s enabled" % (vpc1.id))
|
|
|
|
cmd=createVpnGateway.createVpnGatewayCmd()
|
|
cmd.vpcid=vpc2.id
|
|
vpn2_response = self.apiclient.createVpnGateway(cmd)
|
|
|
|
self.debug("VPN gateway for VPC %s enabled" %(vpc2.id))
|
|
|
|
# 5) Add VPN Customer gateway info
|
|
|
|
src_nat_list = PublicIPAddress.list(
|
|
self.apiclient,
|
|
account=self.account.name,
|
|
domainid=self.account.domainid,
|
|
listall=True,
|
|
issourcenat=True,
|
|
vpcid=vpc1.id
|
|
)
|
|
ip1 = src_nat_list[0]
|
|
|
|
src_nat_list = PublicIPAddress.list(
|
|
self.apiclient,
|
|
account=self.account.name,
|
|
domainid=self.account.domainid,
|
|
listall=True,
|
|
issourcenat=True,
|
|
vpcid=vpc2.id
|
|
)
|
|
ip2 = src_nat_list[0]
|
|
|
|
cmd=createVpnCustomerGateway.createVpnCustomerGatewayCmd()
|
|
cmd.esppolicy="3des-md5;modp1536"
|
|
cmd.ikepolicy="3des-md5;modp1536"
|
|
cmd.domainid=self.account.domainid
|
|
cmd.account=self.account.name
|
|
cmd.ipsecpsk="ipsecpsk"
|
|
|
|
cmd.name="Peer VPC1"
|
|
cmd.gateway=ip1.ipaddress
|
|
cmd.cidrlist=vpc1.cidr
|
|
customer1_response = self.apiclient.createVpnCustomerGateway(cmd)
|
|
self.debug("VPN customer gateway added for VPC %s enabled" %(vpc1.id))
|
|
|
|
cmd.name="Peer VPC2"
|
|
cmd.gateway=ip2.ipaddress
|
|
cmd.cidrlist=vpc2.cidr
|
|
customer2_response = self.apiclient.createVpnCustomerGateway(cmd)
|
|
self.debug("VPN customer gateway added for VPC %s enabled" %(vpc2.id))
|
|
|
|
# 6) Connect two VPCs
|
|
cmd = createVpnConnection.createVpnConnectionCmd()
|
|
cmd.s2svpngatewayid = vpn2_response.id
|
|
cmd.s2scustomergatewayid = customer1_response.id
|
|
cmd.passive="true"
|
|
vpnconn1_response = self.apiclient.createVpnConnection(cmd)
|
|
self.debug("VPN passive connection created for VPC %s" %(vpc2.id))
|
|
|
|
cmd = createVpnConnection.createVpnConnectionCmd()
|
|
cmd.s2svpngatewayid = vpn1_response.id
|
|
cmd.s2scustomergatewayid = customer2_response.id
|
|
vpnconn2_response = self.apiclient.createVpnConnection(cmd)
|
|
self.debug("VPN connection created for VPC %s" %(vpc1.id))
|
|
|
|
self.assertEqual(vpnconn2_response.state, "Connected", "Failed to connect between VPCs!")
|
|
|
|
@classmethod
|
|
def tearDownClass(cls):
|
|
try:
|
|
cleanup_resources(cls.apiclient, cls.cleanup)
|
|
except Exception, e:
|
|
raise Exception("Cleanup failed with %s" % e)
|