mirror of
				https://github.com/apache/cloudstack.git
				synced 2025-11-04 00:02:37 +01:00 
			
		
		
		
	Now VPN connection can be created as "passive", which would enable the ability of remote peer initiate the connection. So it's possible for VPC VR to establish the connection to another VPC VR of CloudStack. Test case also included. The test case would create 2 vpcs and using VPN to connect them.
		
			
				
	
	
		
			392 lines
		
	
	
		
			15 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			392 lines
		
	
	
		
			15 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
# Licensed to the Apache Software Foundation (ASF) under one
 | 
						|
# or more contributor license agreements.  See the NOTICE file
 | 
						|
# distributed with this work for additional information
 | 
						|
# regarding copyright ownership.  The ASF licenses this file
 | 
						|
# to you under the Apache License, Version 2.0 (the
 | 
						|
# "License"); you may not use this file except in compliance
 | 
						|
# with the License.  You may obtain a copy of the License at
 | 
						|
#
 | 
						|
#   http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
#
 | 
						|
# Unless required by applicable law or agreed to in writing,
 | 
						|
# software distributed under the License is distributed on an
 | 
						|
# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
 | 
						|
# KIND, either express or implied.  See the License for the
 | 
						|
# specific language governing permissions and limitations
 | 
						|
# under the License.
 | 
						|
""" Tests for VPN in VPC
 | 
						|
"""
 | 
						|
#Import Local Modules
 | 
						|
from marvin.cloudstackTestCase import *
 | 
						|
from marvin.cloudstackAPI import *
 | 
						|
from marvin.integration.lib.utils import *
 | 
						|
from marvin.integration.lib.base import *
 | 
						|
from marvin.integration.lib.common import *
 | 
						|
from nose.plugins.attrib import attr
 | 
						|
 | 
						|
import time
 | 
						|
 | 
						|
class Services:
 | 
						|
    def __init__(self):
 | 
						|
        self.services = {
 | 
						|
            "account": {
 | 
						|
                "email": "test@test.com",
 | 
						|
                "firstname": "Test",
 | 
						|
                "lastname": "User",
 | 
						|
                "username": "test",
 | 
						|
                "password": "password",
 | 
						|
            },
 | 
						|
            "virtual_machine": {
 | 
						|
                "displayname": "Test VM",
 | 
						|
                "username": "root",
 | 
						|
                "password": "password",
 | 
						|
                "ssh_port": 22,
 | 
						|
                "hypervisor": 'XenServer',
 | 
						|
                "privateport": 22,
 | 
						|
                "publicport": 22,
 | 
						|
                "protocol": 'TCP',
 | 
						|
            },
 | 
						|
            "ostype": 'CentOS 5.3 (64-bit)',
 | 
						|
            "service_offering": {
 | 
						|
                "name": "Tiny Instance",
 | 
						|
                "displaytext": "Tiny Instance",
 | 
						|
                "cpunumber": 1,
 | 
						|
                "cpuspeed": 100,
 | 
						|
                "memory": 256,
 | 
						|
            },
 | 
						|
            "network_offering": {
 | 
						|
                "name": "Network offering for internal vpc",
 | 
						|
                "displaytext": "Network offering for internal vpc",
 | 
						|
                "guestiptype": "Isolated",
 | 
						|
                "traffictype": "Guest",
 | 
						|
                "supportedservices": "Vpn,Dhcp,Dns,Lb,UserData,SourceNat,StaticNat,PortForwarding,NetworkACL",
 | 
						|
                "serviceProviderList": {
 | 
						|
                    "Dhcp": "VpcVirtualRouter",
 | 
						|
                    "Dns": "VpcVirtualRouter",
 | 
						|
                    "Vpn": "VpcVirtualRouter",
 | 
						|
                    "UserData": "VpcVirtualRouter",
 | 
						|
                    "Lb": "InternalLbVM",
 | 
						|
                    "SourceNat": "VpcVirtualRouter",
 | 
						|
                    "StaticNat": "VpcVirtualRouter",
 | 
						|
                    "PortForwarding": "VpcVirtualRouter",
 | 
						|
                    "NetworkACL": "VpcVirtualRouter",
 | 
						|
                },
 | 
						|
                "serviceCapabilityList": {
 | 
						|
                    "SourceNat": {"SupportedSourceNatTypes": "peraccount"},
 | 
						|
                    "Lb": {"lbSchemes": "internal", "SupportedLbIsolation": "dedicated"}
 | 
						|
                }
 | 
						|
            },
 | 
						|
            "vpn_user": {
 | 
						|
                "username": "test",
 | 
						|
                "password": "password",
 | 
						|
            },
 | 
						|
            "vpc": {
 | 
						|
                "name": "vpc_vpn",
 | 
						|
                "displaytext": "vpc-vpn",
 | 
						|
                "cidr": "10.1.1.0/24"
 | 
						|
            },
 | 
						|
            "ntwk": {
 | 
						|
                "name": "tier1",
 | 
						|
                "displaytext": "vpc-tier1",
 | 
						|
                "gateway" : "10.1.1.1",
 | 
						|
                "netmask" : "255.255.255.192"
 | 
						|
            },
 | 
						|
            "vpc2": {
 | 
						|
                "name": "vpc2_vpn",
 | 
						|
                "displaytext": "vpc2-vpn",
 | 
						|
                "cidr": "10.2.1.0/24"
 | 
						|
            },
 | 
						|
            "ntwk2": {
 | 
						|
                "name": "tier2",
 | 
						|
                "displaytext": "vpc-tier2",
 | 
						|
                "gateway" : "10.2.1.1",
 | 
						|
                "netmask" : "255.255.255.192"
 | 
						|
            }
 | 
						|
        }
 | 
						|
 | 
						|
 | 
						|
class TestVpcRemoteAccessVpn(cloudstackTestCase):
 | 
						|
 | 
						|
    @classmethod
 | 
						|
    def setUpClass(cls):
 | 
						|
        cls.apiclient = super(TestVpcRemoteAccessVpn, cls).getClsTestClient().getApiClient()
 | 
						|
        cls.services = Services().services
 | 
						|
        cls.zone = get_zone(cls.apiclient, cls.services)
 | 
						|
        cls.domain = get_domain(cls.apiclient)
 | 
						|
        cls.service_offering = ServiceOffering.create(
 | 
						|
            cls.apiclient,
 | 
						|
            cls.services["service_offering"]
 | 
						|
        )
 | 
						|
        cls.account = Account.create(cls.apiclient, services=cls.services["account"])
 | 
						|
        cls.template = get_template(
 | 
						|
            cls.apiclient,
 | 
						|
            cls.zone.id,
 | 
						|
            cls.services["ostype"]
 | 
						|
        )
 | 
						|
        cls.cleanup = [cls.account]
 | 
						|
 | 
						|
    @attr(tags=["advanced"])
 | 
						|
    def test_vpc_remote_access_vpn(self):
 | 
						|
        """Test VPN in VPC"""
 | 
						|
 | 
						|
        # 0) Get the default network offering for VPC
 | 
						|
        networkOffering = NetworkOffering.list(self.apiclient, name="DefaultIsolatedNetworkOfferingForVpcNetworks")
 | 
						|
        self.assert_(networkOffering is not None and len(networkOffering) > 0, "No VPC based network offering")
 | 
						|
 | 
						|
        # 1) Create VPC
 | 
						|
        vpcOffering = VpcOffering.list(self.apiclient,isdefault=True)
 | 
						|
        self.assert_(vpcOffering is not None and len(vpcOffering)>0, "No VPC offerings found")
 | 
						|
        vpc = VPC.create(
 | 
						|
                apiclient=self.apiclient,
 | 
						|
                services=self.services["vpc"],
 | 
						|
                networkDomain="vpc.vpn",
 | 
						|
                vpcofferingid=vpcOffering[0].id,
 | 
						|
                zoneid=self.zone.id,
 | 
						|
                account=self.account.name,
 | 
						|
                domainid=self.domain.id
 | 
						|
        )
 | 
						|
        self.assert_(vpc is not None, "VPC creation failed")
 | 
						|
        self.debug("VPC %s created" %(vpc.id))
 | 
						|
 | 
						|
        # 2) Create network in VPC
 | 
						|
        ntwk = Network.create(
 | 
						|
            apiclient=self.apiclient,
 | 
						|
            services=self.services["ntwk"],
 | 
						|
            accountid=self.account.name,
 | 
						|
            domainid=self.domain.id,
 | 
						|
            networkofferingid=networkOffering[0].id,
 | 
						|
            zoneid=self.zone.id,
 | 
						|
            vpcid=vpc.id
 | 
						|
        )
 | 
						|
        self.assertIsNotNone(ntwk, "Network failed to create")
 | 
						|
        self.debug("Network %s created in VPC %s" %(ntwk.id, vpc.id))
 | 
						|
 | 
						|
        # 3) Deploy a vm
 | 
						|
        vm = VirtualMachine.create(self.apiclient, services=self.services["virtual_machine"],
 | 
						|
            templateid=self.template.id,
 | 
						|
            zoneid=self.zone.id,
 | 
						|
            accountid=self.account.name,
 | 
						|
            domainid= self.domain.id,
 | 
						|
            serviceofferingid=self.service_offering.id,
 | 
						|
            networkids=ntwk.id
 | 
						|
        )
 | 
						|
        self.assert_(vm is not None, "VM failed to deploy")
 | 
						|
        self.assert_(vm.state == 'Running', "VM is not running")
 | 
						|
        self.debug("VM %s deployed in VPC %s" %(vm.id, vpc.id))
 | 
						|
 | 
						|
        # 4) Enable VPN for VPC
 | 
						|
 | 
						|
        src_nat_list = PublicIPAddress.list(
 | 
						|
                                        self.apiclient,
 | 
						|
                                        account=self.account.name,
 | 
						|
                                        domainid=self.account.domainid,
 | 
						|
                                        listall=True,
 | 
						|
                                        issourcenat=True,
 | 
						|
                                        vpcid=vpc.id
 | 
						|
                                        )
 | 
						|
        ip = src_nat_list[0]
 | 
						|
        vpn = Vpn.create(self.apiclient,
 | 
						|
                         publicipid=ip.id,
 | 
						|
                         account=self.account.name,
 | 
						|
                         domainid=self.account.domainid)
 | 
						|
 | 
						|
        # 5) Add VPN user for VPC
 | 
						|
        vpnUser = VpnUser.create(self.apiclient,
 | 
						|
                                 account=self.account.name,
 | 
						|
                                 domainid=self.account.domainid,
 | 
						|
                                 username=self.services["vpn_user"]["username"],
 | 
						|
                                 password=self.services["vpn_user"]["password"])
 | 
						|
 | 
						|
        # 6) Disable VPN for VPC
 | 
						|
        vpn.delete(self.apiclient)
 | 
						|
 | 
						|
    @classmethod
 | 
						|
    def tearDownClass(cls):
 | 
						|
        try:
 | 
						|
            cleanup_resources(cls.apiclient, cls.cleanup)
 | 
						|
        except Exception, e:
 | 
						|
            raise Exception("Cleanup failed with %s" % e)
 | 
						|
 | 
						|
class TestVpcSite2SiteVpn(cloudstackTestCase):
 | 
						|
 | 
						|
    @classmethod
 | 
						|
    def setUpClass(cls):
 | 
						|
        cls.apiclient = super(TestVpcSite2SiteVpn, cls).getClsTestClient().getApiClient()
 | 
						|
        cls.services = Services().services
 | 
						|
        cls.zone = get_zone(cls.apiclient, cls.services)
 | 
						|
        cls.domain = get_domain(cls.apiclient)
 | 
						|
        cls.service_offering = ServiceOffering.create(
 | 
						|
            cls.apiclient,
 | 
						|
            cls.services["service_offering"]
 | 
						|
        )
 | 
						|
        cls.account = Account.create(cls.apiclient, services=cls.services["account"])
 | 
						|
        cls.template = get_template(
 | 
						|
            cls.apiclient,
 | 
						|
            cls.zone.id,
 | 
						|
            cls.services["ostype"]
 | 
						|
        )
 | 
						|
        cls.cleanup = [cls.account]
 | 
						|
 | 
						|
    @attr(tags=["advanced"])
 | 
						|
    def test_vpc_site2site_vpn(self):
 | 
						|
        """Test VPN in VPC"""
 | 
						|
 | 
						|
        # 0) Get the default network offering for VPC
 | 
						|
        networkOffering = NetworkOffering.list(self.apiclient, name="DefaultIsolatedNetworkOfferingForVpcNetworks")
 | 
						|
        self.assert_(networkOffering is not None and len(networkOffering) > 0, "No VPC based network offering")
 | 
						|
 | 
						|
        # 1) Create VPC
 | 
						|
        vpcOffering = VpcOffering.list(self.apiclient,isdefault=True)
 | 
						|
        self.assert_(vpcOffering is not None and len(vpcOffering)>0, "No VPC offerings found")
 | 
						|
 | 
						|
        vpc1 = VPC.create(
 | 
						|
                apiclient=self.apiclient,
 | 
						|
                services=self.services["vpc"],
 | 
						|
                networkDomain="vpc1.vpn",
 | 
						|
                vpcofferingid=vpcOffering[0].id,
 | 
						|
                zoneid=self.zone.id,
 | 
						|
                account=self.account.name,
 | 
						|
                domainid=self.domain.id
 | 
						|
        )
 | 
						|
        self.assert_(vpc1 is not None, "VPC creation failed")
 | 
						|
        self.debug("VPC1 %s created" %(vpc1.id))
 | 
						|
 | 
						|
        vpc2 = VPC.create(
 | 
						|
                apiclient=self.apiclient,
 | 
						|
                services=self.services["vpc2"],
 | 
						|
                networkDomain="vpc2.vpn",
 | 
						|
                vpcofferingid=vpcOffering[0].id,
 | 
						|
                zoneid=self.zone.id,
 | 
						|
                account=self.account.name,
 | 
						|
                domainid=self.domain.id
 | 
						|
        )
 | 
						|
        self.assert_(vpc2 is not None, "VPC2 creation failed")
 | 
						|
        self.debug("VPC2 %s created" %(vpc1.id))
 | 
						|
 | 
						|
        # 2) Create network in VPC
 | 
						|
        ntwk1 = Network.create(
 | 
						|
            apiclient=self.apiclient,
 | 
						|
            services=self.services["ntwk"],
 | 
						|
            accountid=self.account.name,
 | 
						|
            domainid=self.domain.id,
 | 
						|
            networkofferingid=networkOffering[0].id,
 | 
						|
            zoneid=self.zone.id,
 | 
						|
            vpcid=vpc1.id
 | 
						|
        )
 | 
						|
        self.assertIsNotNone(ntwk1, "Network failed to create")
 | 
						|
        self.debug("Network %s created in VPC %s" %(ntwk1.id, vpc1.id))
 | 
						|
 | 
						|
        ntwk2 = Network.create(
 | 
						|
            apiclient=self.apiclient,
 | 
						|
            services=self.services["ntwk2"],
 | 
						|
            accountid=self.account.name,
 | 
						|
            domainid=self.domain.id,
 | 
						|
            networkofferingid=networkOffering[0].id,
 | 
						|
            zoneid=self.zone.id,
 | 
						|
            vpcid=vpc2.id
 | 
						|
        )
 | 
						|
        self.assertIsNotNone(ntwk2, "Network failed to create")
 | 
						|
        self.debug("Network %s created in VPC %s" %(ntwk2.id, vpc2.id))
 | 
						|
 | 
						|
        # 3) Deploy a vm
 | 
						|
        vm1 = VirtualMachine.create(self.apiclient, services=self.services["virtual_machine"],
 | 
						|
            templateid=self.template.id,
 | 
						|
            zoneid=self.zone.id,
 | 
						|
            accountid=self.account.name,
 | 
						|
            domainid= self.domain.id,
 | 
						|
            serviceofferingid=self.service_offering.id,
 | 
						|
            networkids=ntwk1.id
 | 
						|
        )
 | 
						|
        self.assert_(vm1 is not None, "VM failed to deploy")
 | 
						|
        self.assert_(vm1.state == 'Running', "VM is not running")
 | 
						|
        self.debug("VM %s deployed in VPC %s" %(vm1.id, vpc1.id))
 | 
						|
 | 
						|
        vm2 = VirtualMachine.create(self.apiclient, services=self.services["virtual_machine"],
 | 
						|
            templateid=self.template.id,
 | 
						|
            zoneid=self.zone.id,
 | 
						|
            accountid=self.account.name,
 | 
						|
            domainid= self.domain.id,
 | 
						|
            serviceofferingid=self.service_offering.id,
 | 
						|
            networkids=ntwk2.id
 | 
						|
        )
 | 
						|
        self.assert_(vm2 is not None, "VM failed to deploy")
 | 
						|
        self.assert_(vm2.state == 'Running', "VM is not running")
 | 
						|
        self.debug("VM %s deployed in VPC %s" %(vm2.id, vpc2.id))
 | 
						|
 | 
						|
        # 4) Enable Site-to-Site VPN for VPC
 | 
						|
        cmd=createVpnGateway.createVpnGatewayCmd()
 | 
						|
        cmd.vpcid=vpc1.id
 | 
						|
        vpn1_response = self.apiclient.createVpnGateway(cmd)
 | 
						|
 | 
						|
        self.debug("VPN gateway for VPC %s enabled" % (vpc1.id))
 | 
						|
 | 
						|
        cmd=createVpnGateway.createVpnGatewayCmd()
 | 
						|
        cmd.vpcid=vpc2.id
 | 
						|
        vpn2_response = self.apiclient.createVpnGateway(cmd)
 | 
						|
 | 
						|
        self.debug("VPN gateway for VPC %s enabled" %(vpc2.id))
 | 
						|
 | 
						|
        # 5) Add VPN Customer gateway info
 | 
						|
 | 
						|
        src_nat_list = PublicIPAddress.list(
 | 
						|
                                        self.apiclient,
 | 
						|
                                        account=self.account.name,
 | 
						|
                                        domainid=self.account.domainid,
 | 
						|
                                        listall=True,
 | 
						|
                                        issourcenat=True,
 | 
						|
                                        vpcid=vpc1.id
 | 
						|
                                        )
 | 
						|
        ip1 = src_nat_list[0]
 | 
						|
 | 
						|
        src_nat_list = PublicIPAddress.list(
 | 
						|
                                        self.apiclient,
 | 
						|
                                        account=self.account.name,
 | 
						|
                                        domainid=self.account.domainid,
 | 
						|
                                        listall=True,
 | 
						|
                                        issourcenat=True,
 | 
						|
                                        vpcid=vpc2.id
 | 
						|
                                        )
 | 
						|
        ip2 = src_nat_list[0]
 | 
						|
 | 
						|
        cmd=createVpnCustomerGateway.createVpnCustomerGatewayCmd()
 | 
						|
        cmd.esppolicy="3des-md5;modp1536"
 | 
						|
        cmd.ikepolicy="3des-md5;modp1536"
 | 
						|
        cmd.domainid=self.account.domainid
 | 
						|
        cmd.account=self.account.name
 | 
						|
        cmd.ipsecpsk="ipsecpsk"
 | 
						|
 | 
						|
        cmd.name="Peer VPC1"
 | 
						|
        cmd.gateway=ip1.ipaddress
 | 
						|
        cmd.cidrlist=vpc1.cidr
 | 
						|
        customer1_response = self.apiclient.createVpnCustomerGateway(cmd)
 | 
						|
        self.debug("VPN customer gateway added for VPC %s enabled" %(vpc1.id))
 | 
						|
 | 
						|
        cmd.name="Peer VPC2"
 | 
						|
        cmd.gateway=ip2.ipaddress
 | 
						|
        cmd.cidrlist=vpc2.cidr
 | 
						|
        customer2_response = self.apiclient.createVpnCustomerGateway(cmd)
 | 
						|
        self.debug("VPN customer gateway added for VPC %s enabled" %(vpc2.id))
 | 
						|
 | 
						|
        # 6) Connect two VPCs 
 | 
						|
        cmd = createVpnConnection.createVpnConnectionCmd()
 | 
						|
        cmd.s2svpngatewayid = vpn2_response.id
 | 
						|
        cmd.s2scustomergatewayid = customer1_response.id
 | 
						|
        cmd.passive="true"
 | 
						|
        vpnconn1_response = self.apiclient.createVpnConnection(cmd)
 | 
						|
        self.debug("VPN passive connection created for VPC %s" %(vpc2.id))
 | 
						|
 | 
						|
        cmd = createVpnConnection.createVpnConnectionCmd()
 | 
						|
        cmd.s2svpngatewayid = vpn1_response.id
 | 
						|
        cmd.s2scustomergatewayid = customer2_response.id
 | 
						|
        vpnconn2_response = self.apiclient.createVpnConnection(cmd)
 | 
						|
        self.debug("VPN connection created for VPC %s" %(vpc1.id))
 | 
						|
 | 
						|
        self.assertEqual(vpnconn2_response.state, "Connected", "Failed to connect between VPCs!")
 | 
						|
 | 
						|
    @classmethod
 | 
						|
    def tearDownClass(cls):
 | 
						|
        try:
 | 
						|
            cleanup_resources(cls.apiclient, cls.cleanup)
 | 
						|
        except Exception, e:
 | 
						|
            raise Exception("Cleanup failed with %s" % e)
 |