2 Documentation Openstack library. This library is useful for tests to create network, subnet, router and vm instances
4 Resource CompareStream.robot
6 Resource TemplatedRequests.robot
7 Resource KarafKeywords.robot
8 Resource ../variables/Variables.robot
9 Resource ../variables/netvirt/Variables.robot
12 Library OperatingSystem
15 &{ITM_CREATE_DEFAULT} tunneltype=vxlan vlanid=0 prefix=1.1.1.1/24 gateway=0.0.0.0 dpnid1=1 portname1=BR1-eth1 ipaddress1=2.2.2.2
16 ... dpnid2=2 portname2= BR2-eth1 ipaddress2=3.3.3.3
17 &{L3VPN_CREATE_DEFAULT} vpnid=4ae8cd92-48ca-49b5-94e1-b2921a261111 name=vpn1 rd=["2200:1"] exportrt=["2200:1","8800:1"] importrt=["2200:1","8800:1"] tenantid=6c53df3a-3456-11e5-a151-feff819cdc9f
18 ${VAR_BASE} ${CURDIR}/../variables/vpnservice/
19 ${ODL_FLOWTABLE_L3VPN} 21
22 ${STATE_UNKNOWN} UNKNOWN
23 ${STATE_ENABLE} ENABLED
24 ${STATE_DISABLE} DISABLE
29 OpenStackOperations.OpenStack Suite Setup
30 TemplatedRequests.Create Default Session timeout=${SESSION_TIMEOUT}
32 Basic Vpnservice Suite Cleanup
33 [Arguments] ${vpn_instance_ids}=@{EMPTY} ${vms}=@{EMPTY} ${networks}=@{EMPTY} ${subnets}=@{EMPTY} ${ports}=@{EMPTY} ${sgs}=@{EMPTY}
34 : FOR ${vpn_instance_id} IN @{vpn_instance_ids}
35 \ BuiltIn.Run Keyword And Ignore Error VPN Delete L3VPN vpnid=${vpn_instance_id}
36 OpenStackOperations.Neutron Cleanup ${vms} ${networks} ${subnets} ${ports} ${sgs}
40 [Documentation] Create an L3VPN using the Json using the list of optional arguments received.
41 Run keyword if "routerid" in ${Kwargs} Collections.Set_To_Dictionary ${Kwargs} router=, "router-id":"${Kwargs['routerid']}"
42 ... ELSE Collections.Set_To_Dictionary ${Kwargs} router=${empty}
43 &{L3vpn_create_actual_val} = Collections.Copy_Dictionary ${L3VPN_CREATE_DEFAULT}
44 Collections.Set_To_Dictionary ${L3vpn_create_actual_val} &{Kwargs}
45 TemplatedRequests.Post_As_Json_Templated folder=${VAR_BASE}/l3vpn_create mapping=${L3vpn_create_actual_val} session=default http_timeout=${SESSION_TIMEOUT}
49 [Documentation] Will return detailed list of the L3VPN_ID received
50 ${resp} = TemplatedRequests.Post_As_Json_Templated folder=${VAR_BASE}/get_l3vpn mapping=${Kwargs} session=default http_timeout=${SESSION_TIMEOUT}
56 [Documentation] Check that sub interface ip has been learnt after ARP request
57 ${resp} = RequestsLibrary.Get Request session ${VPN_REST}
58 BuiltIn.Log ${resp.content}
59 @{list_any_matches} = String.Get_Regexp_Matches ${resp.content} \"vpn-instance-name\":\"${VPN_INSTANCE_ID}\",.*"vrf-id":"${vrf_id}",\"vpn-id\":(\\d+) 1
60 ${result} = Evaluate ${list_any_matches[0]} * 2
61 ${vpn_id_hex} = BuiltIn.Convert To Hex ${result}
62 [Return] ${vpn_id_hex.lower()}
64 Associate L3VPN To Network
66 [Documentation] Associate the created L3VPN to a network-id received as dictionary argument
67 TemplatedRequests.Post_As_Json_Templated folder=${VAR_BASE}/assoc_l3vpn mapping=${Kwargs} session=default http_timeout=${SESSION_TIMEOUT}
69 Dissociate L3VPN From Networks
71 [Documentation] Disssociate the already associated networks from L3VPN
72 TemplatedRequests.Post_As_Json_Templated folder=${VAR_BASE}/dissoc_l3vpn mapping=${Kwargs} session=default http_timeout=${SESSION_TIMEOUT}
74 Associate VPN to Router
76 [Documentation] Associate the created L3VPN to a router-id received as argument
77 TemplatedRequests.Post_As_Json_Templated folder=${VAR_BASE}/assoc_router_l3vpn mapping=${Kwargs} session=default http_timeout=${SESSION_TIMEOUT}
79 Dissociate VPN to Router
81 [Documentation] Dissociate the already associated routers from L3VPN
82 TemplatedRequests.Post_As_Json_Templated folder=${VAR_BASE}/dissoc_router_l3vpn mapping=${Kwargs} session=default http_timeout=${SESSION_TIMEOUT}
86 [Documentation] Delete the created L3VPN
87 TemplatedRequests.Post_As_Json_Templated folder=${VAR_BASE}/l3vpn_delete mapping=${Kwargs} session=default http_timeout=${SESSION_TIMEOUT}
91 [Documentation] Creates Tunnel between the two DPNs received in the dictionary argument
92 &{Itm_actual_val} = Collections.Copy_Dictionary ${ITM_CREATE_DEFAULT}
93 Collections.Set_To_Dictionary ${Itm_actual_val} &{Kwargs}
94 TemplatedRequests.Post_As_Json_Templated folder=${VAR_BASE}/itm_create mapping=${Itm_actual_val} session=default http_timeout=${SESSION_TIMEOUT}
97 [Documentation] Get all Tunnels and return the contents
98 ${resp} = RequestsLibrary.Get Request session ${CONFIG_API}/itm:transport-zones/
100 Should Be Equal As Strings ${resp.status_code} 200
101 [Return] ${resp.content}
104 [Arguments] ${zone-name}
105 [Documentation] Delete Tunnels created under the transport-zone
106 ${resp} = RequestsLibrary.Delete Request session ${CONFIG_API}/itm:transport-zones/transport-zone/${zone-name}/
108 Should Be Equal As Strings ${resp.status_code} 200
109 [Return] ${resp.content}
111 Verify Flows Are Present For L3VPN
112 [Arguments] ${ip} ${vm_ips}
113 [Documentation] Verify Flows Are Present For L3VPN
114 ${flow_output}= Run Command On Remote System And Log ${ip} sudo ovs-ofctl -O OpenFlow13 dump-flows ${INTEGRATION_BRIDGE}
115 Should Contain ${flow_output} table=${ODL_FLOWTABLE_L3VPN}
116 ${l3vpn_table} = Get Lines Containing String ${flow_output} table=${ODL_FLOWTABLE_L3VPN},
118 : FOR ${i} IN @{vm_ips}
119 \ ${resp}= Should Contain ${l3vpn_table} ${i}
121 Verify GWMAC Entry On ODL
122 [Arguments] ${GWMAC_ADDRS}
123 [Documentation] get ODL GWMAC table entry
124 ${resp} = RequestsLibrary.Get Request session ${VPN_PORT_DATA_URL}
126 Should Be Equal As Strings ${resp.status_code} 200
127 : FOR ${macAdd} IN @{GWMAC_ADDRS}
128 \ Should Contain ${resp.content} ${macAdd}
130 Verify GWMAC Flow Entry Removed From Flow Table
132 [Documentation] Verify the GWMAC Table, ARP Response table and Dispatcher table.
133 ${flow_output}= Run Command On Remote System And Log ${cnIp} sudo ovs-ofctl -O OpenFlow13 dump-flows ${INTEGRATION_BRIDGE}
134 Should Contain ${flow_output} table=${GWMAC_TABLE}
135 ${gwmac_table} = Get Lines Containing String ${flow_output} table=${GWMAC_TABLE}
137 #Verify GWMAC address present in table 19
138 : FOR ${macAdd} IN @{GWMAC_ADDRS}
139 \ Should Not Contain ${gwmac_table} dl_dst=${macAdd} actions=goto_table:${L3_TABLE}
141 Verify ARP REQUEST in groupTable
142 [Arguments] ${group_output} ${Group-ID}
143 [Documentation] get flow dump for group ID
144 Should Contain ${group_output} group_id=${Group-ID}
145 ${arp_group} = Get Lines Containing String ${group_output} group_id=${Group-ID}
147 CompareStream.Run_Keyword_If_At_Most_Oxygen BuiltIn.Should Match Regexp ${arp_group} ${ARP_REQUEST_GROUP_REGEX}
148 CompareStream.Run_Keyword_If_At_Least_Fluorine BuiltIn.Should Match Regexp ${arp_group} ${ARP_REQUEST_GROUP_REGEX_FLUORINE}
150 Verify Tunnel Status as UP
151 [Documentation] Verify that the tunnels are UP
152 ${output}= Issue Command On Karaf Console ${TEP_SHOW_STATE}
154 Should Contain ${output} ${STATE_UP}
155 Should Not Contain ${output} ${STATE_DOWN}
156 Should Not Contain ${output} ${STATE_UNKNOWN}
158 Verify Tunnel Status as DOWN
159 [Documentation] Verify that the tunnels are DOWN
160 ${output}= Issue Command On Karaf Console ${TEP_SHOW_STATE}
162 Should Contain ${output} ${STATE_DOWN}
163 Should Not Contain ${output} ${STATE_UP}
164 Should Not Contain ${output} ${STATE_UNKNOWN}
166 Verify Tunnel Status as UNKNOWN
167 [Documentation] Verify that the tunnels are in Unknown state
168 ${output}= Issue Command On Karaf Console ${TEP_SHOW_STATE}
170 Should Not Contain ${output} ${STATE_UP}
171 Should Not Contain ${output} ${STATE_DOWN}
172 Should Contain ${output} ${STATE_UNKNOWN}
174 Verify VXLAN interface
175 [Documentation] Verify that the VXLAN interfaces are Enabled
176 ${output}= Issue Command On Karaf Console ${VXLAN_SHOW}
178 Should Contain ${output} ${STATE_UP}
179 Should Contain ${output} ${STATE_ENABLE}
180 Should Not Contain ${output} ${STATE_DISABLE}
183 [Arguments] ${session}
184 [Documentation] Get Fib table entries from ODL session
185 ${resp} RequestsLibrary.Get Request ${session} ${FIB_ENTRIES_URL}
187 [Return] ${resp.content}
189 Get Gateway MAC And IP Address
190 [Arguments] ${router_Name} ${ip_regex}=${IP_REGEX}
191 [Documentation] Get Gateway mac and IP Address
192 ${output} = OpenStack CLI openstack port list --router ${router_Name}
193 @{MacAddr-list} = Get Regexp Matches ${output} ${MAC_REGEX}
194 @{IpAddr-list} = Get Regexp Matches ${output} ${ip_regex}
195 [Return] ${MacAddr-list} ${IpAddr-list}
197 Test Teardown With Tcpdump Stop
198 [Arguments] ${conn_ids}=@{EMPTY}
199 OpenStackOperations.Stop Packet Capture On Nodes ${conn_ids}
200 Get Test Teardown Debugs
202 Verify IPv4 GWMAC Flow Entry On Flow Table
203 [Arguments] ${group_output} ${group_id} ${flow_output}
204 Verify ARP REQUEST in groupTable ${group_output} ${groupID[1]}
205 #Verify ARP_RESPONSE_TABLE - 81
206 Should Contain ${flow_output} table=${ARP_RESPONSE_TABLE}
207 ${arpResponder_table} = Get Lines Containing String ${flow_output} table=${ARP_RESPONSE_TABLE}
208 Should Contain ${arpResponder_table} priority=0 actions=drop
209 : FOR ${macAdd} ${ipAdd} IN ZIP ${GWMAC_ADDRS} ${GWIP_ADDRS}
210 \ ${ARP_RESPONSE_IP_MAC_REGEX} = Set Variable arp_tpa=${ipAdd},arp_op=1 actions=.*,set_field:${macAdd}->eth_src
211 \ Should Match Regexp ${arpResponder_table} ${ARP_RESPONSE_IP_MAC_REGEX}
213 Verify IPv6 GWMAC Flow Entry On Flow Table
214 [Arguments] ${flow_output}
215 Should Contain ${flow_output} table=${IPV6_TABLE}
216 ${icmp_ipv6_flows} = Get Lines Containing String ${flow_output} icmp_type=135
217 : FOR ${ip_addr} IN @{GWIP_ADDRS}
218 \ ${rule} = Set Variable icmp_type=135,icmp_code=0,nd_target=${ip_addr} actions=CONTROLLER:65535
219 \ Should Match Regexp ${icmp_ipv6_flows} ${rule}
221 Verify GWMAC Flow Entry On Flow Table
222 [Arguments] ${cnIp} ${ipv}=ipv4
223 [Documentation] Verify the GWMAC Table, ARP Response table and Dispatcher table.
224 ${flow_output}= Run Command On Remote System ${cnIp} sudo ovs-ofctl -O OpenFlow13 dump-flows ${INTEGRATION_BRIDGE}
225 ${group_output}= Run Command On Remote System ${cnIp} sudo ovs-ofctl -O OpenFlow13 dump-groups ${INTEGRATION_BRIDGE}
226 Should Contain ${flow_output} table=${DISPATCHER_TABLE}
227 ${dispatcher_table} = Get Lines Containing String ${flow_output} table=${DISPATCHER_TABLE}
228 Should Contain ${dispatcher_table} goto_table:${GWMAC_TABLE}
229 Should Not Contain ${dispatcher_table} goto_table:${ARP_RESPONSE_TABLE}
230 Should Contain ${flow_output} table=${GWMAC_TABLE}
231 ${gwmac_table} = Get Lines Containing String ${flow_output} table=${GWMAC_TABLE}
232 #Verify GWMAC address present in table 19
233 : FOR ${macAdd} IN @{GWMAC_ADDRS}
234 \ Should Contain ${gwmac_table} dl_dst=${macAdd} actions=goto_table:${L3_TABLE}
236 Should Contain ${gwmac_table} actions=resubmit(,17)
237 #Verify ARP_CHECK_TABLE - 43
238 #arp request and response
239 ${arpchk_table} = Get Lines Containing String ${flow_output} table=${ARP_CHECK_TABLE}
240 CompareStream.Run_Keyword_If_At_Most_Oxygen BuiltIn.Should Match Regexp ${arpchk_table} ${ARP_RESPONSE_REGEX}
241 CompareStream.Run_Keyword_If_At_Least_Fluorine BuiltIn.Should Match Regexp ${arpchk_table} ${ARP_RESPONSE_REGEX_FLUORINE}
242 ${arppunt_table} = String.Get Lines Containing String ${flow_output} table=${ARP_PUNT_TABLE}
243 CompareStream.Run_Keyword_If_At_Least_Fluorine BuiltIn.Should Match Regexp ${arppunt_table} ${ARP_PUNT_RESPONSE_REGEX}
244 ${match} = Should Match Regexp ${arpchk_table} ${ARP_REQUEST_REGEX}
245 ${groupID} = Split String ${match} separator=:
246 BuiltIn.Run Keyword If '${ipv}' == 'ipv4' Verify IPv4 GWMAC Flow Entry On Flow Table ${group_output} ${group_id} ${flow_output}
247 ... ELSE Verify IPv6 GWMAC Flow Entry On Flow Table ${flow_output}
249 Delete Multiple L3VPNs
251 [Documentation] Delete three L3VPNs created using Multiple L3VPN Test
252 : FOR ${vpn} IN ${vpns}
253 \ VPN Delete L3VPN vpnid=${vpn}