cloudstack-commits mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From bhais...@apache.org
Subject [cloudstack] branch master updated: CLOUDSTACK-10021: Marvin test to check VR internal DNS Service (#1784)
Date Fri, 28 Jul 2017 08:09:01 GMT
This is an automated email from the ASF dual-hosted git repository.

bhaisaab pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/cloudstack.git


The following commit(s) were added to refs/heads/master by this push:
     new b83aa2a  CLOUDSTACK-10021: Marvin test to check VR internal DNS Service (#1784)
b83aa2a is described below

commit b83aa2a50bcead9eccc85eac0cd32d416d47d64e
Author: Abhinandan Prateek <abhinandan.prateek@shapeblue.com>
AuthorDate: Fri Jul 28 13:38:57 2017 +0530

    CLOUDSTACK-10021: Marvin test to check VR internal DNS Service (#1784)
---
 test/integration/smoke/test_router_dnsservice.py | 275 +++++++++++++++++++++++
 1 file changed, 275 insertions(+)

diff --git a/test/integration/smoke/test_router_dnsservice.py b/test/integration/smoke/test_router_dnsservice.py
new file mode 100644
index 0000000..436d9e4
--- /dev/null
+++ b/test/integration/smoke/test_router_dnsservice.py
@@ -0,0 +1,275 @@
+# Licensed to the Apache Software Foundation (ASF) under one
+# or more contributor license agreements.  See the NOTICE file
+# distributed with this work for additional information
+# regarding copyright ownership.  The ASF licenses this file
+# to you under the Apache License, Version 2.0 (the
+# "License"); you may not use this file except in compliance
+# with the License.  You may obtain a copy of the License at
+#
+#   http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing,
+# software distributed under the License is distributed on an
+# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+# KIND, either express or implied.  See the License for the
+# specific language governing permissions and limitations
+# under the License.
+
+import logging
+import dns.resolver
+
+from nose.plugins.attrib import attr
+from marvin.cloudstackTestCase import cloudstackTestCase
+from marvin.lib.utils import cleanup_resources
+from marvin.lib.base import (ServiceOffering,
+                             VirtualMachine,
+                             Account,
+                             NATRule,
+                             FireWallRule,
+                             NetworkOffering,
+                             Network)
+from marvin.lib.common import (get_zone,
+                               get_template,
+                               get_domain,
+                               list_routers,
+                               list_nat_rules,
+                               list_publicIP)
+
+VM1_NAME="drump"
+VM2_NAME="dilton"
+
+class TestRouterDnsService(cloudstackTestCase):
+
+
+    @classmethod
+    def setUpClass(cls):
+        cls.logger = logging.getLogger('TestRouterDnsService')
+        cls.stream_handler = logging.StreamHandler()
+        cls.logger.setLevel(logging.DEBUG)
+        cls.logger.addHandler(cls.stream_handler)
+
+        cls.testClient = super(TestRouterDnsService, cls).getClsTestClient()
+        cls.api_client = cls.testClient.getApiClient()
+        cls.services = cls.testClient.getParsedTestDataConfig()
+
+        cls.domain = get_domain(cls.api_client)
+        cls.zone = get_zone(cls.api_client, cls.testClient.getZoneForTests())
+        cls.services['mode'] = cls.zone.networktype
+        cls.template = get_template(
+            cls.api_client,
+            cls.zone.id,
+            cls.services["ostype"]
+        )
+        cls.services["virtual_machine"]["zoneid"] = cls.zone.id
+
+        cls.logger.debug("Creating Admin Account for domain %s on zone %s" % (cls.domain.id,
cls.zone.id))
+        cls.account = Account.create(
+            cls.api_client,
+            cls.services["account"],
+            admin=True,
+            domainid=cls.domain.id
+        )
+
+        cls.logger.debug("Creating Service Offering on zone %s" % (cls.zone.id))
+        cls.service_offering = ServiceOffering.create(
+            cls.api_client,
+            cls.services["service_offering"]
+        )
+
+        cls.logger.debug("Creating Network Offering on zone %s" % (cls.zone.id))
+        cls.services["isolated_network_offering"]["egress_policy"] = "true"
+        cls.network_offering = NetworkOffering.create(cls.api_client,
+                                                       cls.services["isolated_network_offering"],
+                                                       conservemode=True)
+        cls.network_offering.update(cls.api_client, state='Enabled')
+
+        cls.logger.debug("Creating Network for Account %s using offering %s" % (cls.account.name,
cls.network_offering.id))
+        cls.network = Network.create(cls.api_client,
+                                      cls.services["network"],
+                                      accountid=cls.account.name,
+                                      domainid=cls.account.domainid,
+                                      networkofferingid=cls.network_offering.id,
+                                      zoneid=cls.zone.id)
+
+        cls.logger.debug("Creating guest VM for Account %s using offering %s" % (cls.account.name,
cls.service_offering.id))
+        cls.services["virtual_machine"]["displayname"] = VM1_NAME;
+        cls.services["virtual_machine"]["name"] = VM1_NAME;
+        cls.vm1 = VirtualMachine.create(cls.api_client,
+                                         cls.services["virtual_machine"],
+                                         templateid=cls.template.id,
+                                         accountid=cls.account.name,
+                                         domainid=cls.domain.id,
+                                         serviceofferingid=cls.service_offering.id,
+                                         networkids=[str(cls.network.id)])
+        cls.vm1.password = "password"
+        cls.logger.debug("Created VM named %s" % VM1_NAME);
+                
+        cls.services["virtual_machine"]["displayname"] = VM2_NAME;
+        cls.services["virtual_machine"]["name"] = VM2_NAME;
+        cls.vm2 = VirtualMachine.create(cls.api_client,
+                                         cls.services["virtual_machine"],
+                                         templateid=cls.template.id,
+                                         accountid=cls.account.name,
+                                         domainid=cls.domain.id,
+                                         serviceofferingid=cls.service_offering.id,
+                                         networkids=[str(cls.network.id)])
+        cls.vm2.password = "password"
+        cls.logger.debug("Created VM named %s" % VM2_NAME);
+
+        cls.services["natrule1"] = {
+            "privateport": 22,
+            "publicport": 22,
+            "protocol": "TCP"
+        }
+
+        cls.services["configurableData"] = {
+            "host": {
+                "password": "password",
+                "username": "root",
+                "port": 22
+            },
+            "input": "INPUT",
+            "forward": "FORWARD"
+        }
+
+        cls._cleanup = [
+            cls.vm1,
+            cls.vm2,
+            cls.network,
+            cls.network_offering,
+            cls.service_offering,
+            cls.account
+        ]
+
+
+    @classmethod
+    def tearDownClass(cls):
+        try:
+            cleanup_resources(cls.api_client, cls._cleanup)
+        except Exception as e:
+            raise Exception("Warning: Exception during cleanup : %s" % e)
+
+
+    def setUp(self):
+        self.apiclient = self.testClient.getApiClient()
+        self.cleanup = []
+
+
+    def tearDown(self):
+        try:
+            cleanup_resources(self.apiclient, self.cleanup)
+        except Exception as e:
+            raise Exception("Warning: Exception during cleanup : %s" % e)
+
+
+    def test_router_common(self):
+        """Performs common router tests and returns router public_ips"""
+
+        routers = list_routers(
+            self.apiclient,
+            account=self.account.name,
+            domainid=self.account.domainid
+        )
+
+        self.assertEqual(
+            isinstance(routers, list),
+            True,
+            "Check for list routers response return valid data"
+        )
+
+        self.assertTrue(
+            len(routers) >= 1,
+            "Check list router response"
+        )
+
+        router = routers[0]
+
+        self.assertEqual(
+            router.state,
+            'Running',
+            "Check list router response for router state"
+        )
+
+        public_ips = list_publicIP(
+            self.apiclient,
+            account=self.account.name,
+            domainid=self.account.domainid,
+            zoneid=self.zone.id
+        )
+
+        self.assertEqual(
+            isinstance(public_ips, list),
+            True,
+            "Check for list public IPs response return valid data"
+        )
+
+        self.assertTrue(
+            len(public_ips) >= 1,
+            "Check public IP list has at least one IP"
+        )
+        return public_ips
+
+
+    @attr(tags=["advanced", "advancedns", "ssh"], required_hardware="true")
+    def test_router_dns_guestipquery(self):
+        """Checks that guest VM can query VR DNS"""
+
+        self.logger.debug("Starting test_router_dns_guestipquery...")
+        public_ip = self.test_router_common()[0]
+
+        self.logger.debug("Creating Firewall rule for VM ID: %s" % self.vm1.id)
+        FireWallRule.create(
+            self.apiclient,
+            ipaddressid=public_ip.id,
+            protocol=self.services["natrule1"]["protocol"],
+            cidrlist=['0.0.0.0/0'],
+            startport=self.services["natrule1"]["publicport"],
+            endport=self.services["natrule1"]["publicport"]
+        )
+
+        self.logger.debug("Creating NAT rule for VM ID: %s" % self.vm1.id)
+        nat_rule1 = NATRule.create(
+            self.apiclient,
+            self.vm1,
+            self.services["natrule1"],
+            public_ip.id
+        )
+        nat_rules = list_nat_rules(
+            self.apiclient,
+            id=nat_rule1.id
+        )
+        self.assertEqual(
+            isinstance(nat_rules, list),
+            True,
+            "Check for list NAT rules response return valid data"
+        )
+        self.assertTrue(
+            len(nat_rules) >= 1,
+            "Check for list NAT rules to have at least one rule"
+        )
+        self.assertEqual(
+            nat_rules[0].state,
+            'Active',
+            "Check list port forwarding rules"
+        )
+
+        result1 = None
+        try:
+            self.logger.debug("SSH into guest VM with IP: %s" % nat_rule1.ipaddress)
+            ssh = self.vm1.get_ssh_client(ipaddress=nat_rule1.ipaddress, port=self.services['natrule1']["publicport"],
retries=8)
+            result1 = str(ssh.execute("nslookup %s" % VM1_NAME))
+            self.logger.debug("nslookup %s: %s " % (VM1_NAME, result1))
+            result2 = str(ssh.execute("nslookup %s" % VM2_NAME))
+            self.logger.debug("nslookup %s: %s " % (VM2_NAME, result2))
+        except Exception as e:
+            self.fail("Failed to SSH into VM - %s due to exception: %s" % (nat_rule1.ipaddress,
e))
+
+        if not result1:
+            self.fail("Did not to receive any response from the guest VM, failing.")
+
+        self.assertTrue(VM1_NAME in result1 and "#53" in result1,
+                        "VR DNS should serve requests from guest network, ping for %s successful."
% VM1_NAME)
+        self.assertTrue(VM2_NAME in result2 and "#53" in result2,
+                        "VR DNS should serve requests from guest network, ping for %s successful."
% VM2_NAME)
+        
+        return

-- 
To stop receiving notification emails like this one, please contact
['"commits@cloudstack.apache.org" <commits@cloudstack.apache.org>'].

Mime
View raw message