2 Documentation Openstack library. This library is useful for tests to create network, subnet, router and vm instances
4 Resource CompareStream.robot
6 Resource TemplatedRequests.robot
7 Resource KarafKeywords.robot
8 Resource ../variables/Variables.robot
9 Resource ../variables/netvirt/Variables.robot
12 Library OperatingSystem
15 &{ITM_CREATE_DEFAULT} tunneltype=vxlan vlanid=0 prefix=1.1.1.1/24 gateway=0.0.0.0 dpnid1=1 portname1=BR1-eth1 ipaddress1=2.2.2.2
16 ... dpnid2=2 portname2= BR2-eth1 ipaddress2=3.3.3.3
17 &{L3VPN_CREATE_DEFAULT} vpnid=4ae8cd92-48ca-49b5-94e1-b2921a261111 name=vpn1 rd=["2200:1"] exportrt=["2200:1","8800:1"] importrt=["2200:1","8800:1"] tenantid=6c53df3a-3456-11e5-a151-feff819cdc9f
18 ${VAR_BASE} ${CURDIR}/../variables/vpnservice/
19 ${ODL_FLOWTABLE_L3VPN} 21
22 ${STATE_UNKNOWN} UNKNOWN
23 ${STATE_ENABLE} ENABLED
24 ${STATE_DISABLE} DISABLE
29 OpenStackOperations.OpenStack Suite Setup
30 TemplatedRequests.Create Default Session timeout=${SESSION_TIMEOUT}
32 Basic Vpnservice Suite Cleanup
33 [Arguments] ${vpn_instance_ids}=@{EMPTY} ${vms}=@{EMPTY} ${networks}=@{EMPTY} ${subnets}=@{EMPTY} ${ports}=@{EMPTY} ${sgs}=@{EMPTY}
34 : FOR ${vpn_instance_id} IN @{vpn_instance_ids}
35 \ BuiltIn.Run Keyword And Ignore Error VPN Delete L3VPN vpnid=${vpn_instance_id}
36 OpenStackOperations.Neutron Cleanup ${vms} ${networks} ${subnets} ${ports} ${sgs}
40 [Documentation] Create an L3VPN using the Json using the list of optional arguments received.
41 Run keyword if "routerid" in ${Kwargs} Collections.Set_To_Dictionary ${Kwargs} router=, "router-id":"${Kwargs['routerid']}"
42 ... ELSE Collections.Set_To_Dictionary ${Kwargs} router=${empty}
43 &{L3vpn_create_actual_val} = Collections.Copy_Dictionary ${L3VPN_CREATE_DEFAULT}
44 Collections.Set_To_Dictionary ${L3vpn_create_actual_val} &{Kwargs}
45 TemplatedRequests.Post_As_Json_Templated folder=${VAR_BASE}/l3vpn_create mapping=${L3vpn_create_actual_val} session=default http_timeout=${SESSION_TIMEOUT}
49 [Documentation] Will return detailed list of the L3VPN_ID received
50 ${resp} = TemplatedRequests.Post_As_Json_Templated folder=${VAR_BASE}/get_l3vpn mapping=${Kwargs} session=default http_timeout=${SESSION_TIMEOUT}
56 [Documentation] Check that sub interface ip has been learnt after ARP request
57 ${resp} = RequestsLibrary.Get Request session ${VPN_REST}
58 BuiltIn.Log ${resp.content}
59 @{list_any_matches} = String.Get_Regexp_Matches ${resp.content} \"vpn-instance-name\":\"${VPN_INSTANCE_ID}\",.*"vrf-id":"${vrf_id}",\"vpn-id\":(\\d+) 1
60 ${result} = Evaluate ${list_any_matches[0]} * 2
61 ${vpn_id_hex} = BuiltIn.Convert To Hex ${result}
62 [Return] ${vpn_id_hex.lower()}
66 [Documentation] To verify L3VPN on ODL for given vpn ids
67 : FOR ${vpn} IN @{vpns}
68 \ ${resp} = VpnOperations.VPN Get L3VPN vpnid=${vpn}
69 \ BuiltIn.Should Contain ${resp} ${vpn}
71 Associate L3VPN To Network
73 [Documentation] Associate the created L3VPN to a network-id received as dictionary argument
74 TemplatedRequests.Post_As_Json_Templated folder=${VAR_BASE}/assoc_l3vpn mapping=${Kwargs} session=default http_timeout=${SESSION_TIMEOUT}
76 Associate L3VPNs To Networks
77 [Arguments] ${vpnid_list} ${network_list}
78 [Documentation] Associates multiple networks to L3VPN and verify the same
79 : FOR ${network} ${vpnid} IN ZIP ${network_list} ${vpnid_list}
80 \ ${network_id} = OpenStackOperations.Get Net Id ${network}
81 \ VpnOperations.Associate L3VPN To Network networkid=${network_id} vpnid=${vpnid}
82 \ ${resp} = VpnOperations.VPN Get L3VPN vpnid=${vpnid}
83 \ BuiltIn.Should Contain ${resp} ${network_id}
85 Dissociate L3VPN From Networks
87 [Documentation] Disssociate the already associated networks from L3VPN
88 TemplatedRequests.Post_As_Json_Templated folder=${VAR_BASE}/dissoc_l3vpn mapping=${Kwargs} session=default http_timeout=${SESSION_TIMEOUT}
90 Associate VPN to Router
92 [Documentation] Associate the created L3VPN to a router-id received as argument
93 CompareStream.Run_Keyword_If_At_Least_Fluorine TemplatedRequests.Post_As_Json_Templated folder=${VAR_BASE}/assoc_two_router_l3vpn mapping=${Kwargs} session=default http_timeout=${SESSION_TIMEOUT}
94 CompareStream.Run_Keyword_If_At_Most_Oxygen TemplatedRequests.Post_As_Json_Templated folder=${VAR_BASE}/assoc_router_l3vpn mapping=${Kwargs} session=default http_timeout=${SESSION_TIMEOUT}
96 Dissociate VPN to Router
98 [Documentation] Dissociate the already associated routers from L3VPN
99 CompareStream.Run_Keyword_If_At_Least_Fluorine TemplatedRequests.Post_As_Json_Templated folder=${VAR_BASE}/dissoc_two_router_l3vpn mapping=${Kwargs} session=default http_timeout=${SESSION_TIMEOUT}
100 CompareStream.Run_Keyword_If_At_Most_Oxygen TemplatedRequests.Post_As_Json_Templated folder=${VAR_BASE}/dissoc_router_l3vpn mapping=${Kwargs} session=default http_timeout=${SESSION_TIMEOUT}
103 [Arguments] &{Kwargs}
104 [Documentation] Delete the created L3VPN
105 TemplatedRequests.Post_As_Json_Templated folder=${VAR_BASE}/l3vpn_delete mapping=${Kwargs} session=default http_timeout=${SESSION_TIMEOUT}
108 [Arguments] &{Kwargs}
109 [Documentation] Creates Tunnel between the two DPNs received in the dictionary argument
110 &{Itm_actual_val} = Collections.Copy_Dictionary ${ITM_CREATE_DEFAULT}
111 Collections.Set_To_Dictionary ${Itm_actual_val} &{Kwargs}
112 TemplatedRequests.Post_As_Json_Templated folder=${VAR_BASE}/itm_create mapping=${Itm_actual_val} session=default http_timeout=${SESSION_TIMEOUT}
115 [Documentation] Get all Tunnels and return the contents
116 ${resp} = RequestsLibrary.Get Request session ${CONFIG_API}/itm:transport-zones/
118 Should Be Equal As Strings ${resp.status_code} 200
119 [Return] ${resp.content}
122 [Arguments] ${zone-name}
123 [Documentation] Delete Tunnels created under the transport-zone
124 ${resp} = RequestsLibrary.Delete Request session ${CONFIG_API}/itm:transport-zones/transport-zone/${zone-name}/
126 Should Be Equal As Strings ${resp.status_code} 200
127 [Return] ${resp.content}
129 Verify Flows Are Present For L3VPN
130 [Arguments] ${ip} ${vm_ips}
131 [Documentation] Verify Flows Are Present For L3VPN
132 ${flow_output}= Run Command On Remote System And Log ${ip} sudo ovs-ofctl -O OpenFlow13 dump-flows ${INTEGRATION_BRIDGE}
133 Should Contain ${flow_output} table=${ODL_FLOWTABLE_L3VPN}
134 ${l3vpn_table} = Get Lines Containing String ${flow_output} table=${ODL_FLOWTABLE_L3VPN},
136 : FOR ${i} IN @{vm_ips}
137 \ ${resp}= Should Contain ${l3vpn_table} ${i}
139 Verify Flows Are Present For L3VPN On All Compute Nodes
140 [Arguments] ${vm_ips}
141 [Documentation] Verify Flows Are Present For L3VPN On All Compute Nodes
142 : FOR ${ip} IN @{OS_CMP_IPS}
143 \ BuiltIn.Wait Until Keyword Succeeds 30s 10s VpnOperations.Verify Flows Are Present For L3VPN ${ip} ${vm_ips}
145 Verify GWMAC Entry On ODL
146 [Arguments] ${GWMAC_ADDRS}
147 [Documentation] get ODL GWMAC table entry
148 ${resp} = RequestsLibrary.Get Request session ${VPN_PORT_DATA_URL}
150 Should Be Equal As Strings ${resp.status_code} 200
151 : FOR ${macAdd} IN @{GWMAC_ADDRS}
152 \ Should Contain ${resp.content} ${macAdd}
154 Verify GWMAC Flow Entry Removed From Flow Table
156 [Documentation] Verify the GWMAC Table, ARP Response table and Dispatcher table.
157 ${flow_output}= Run Command On Remote System And Log ${cnIp} sudo ovs-ofctl -O OpenFlow13 dump-flows ${INTEGRATION_BRIDGE}
158 Should Contain ${flow_output} table=${GWMAC_TABLE}
159 ${gwmac_table} = Get Lines Containing String ${flow_output} table=${GWMAC_TABLE}
161 #Verify GWMAC address present in table 19
162 : FOR ${macAdd} IN @{GWMAC_ADDRS}
163 \ Should Not Contain ${gwmac_table} dl_dst=${macAdd} actions=goto_table:${L3_TABLE}
165 Verify GWMAC Flow Entry Removed From Flow Table On All Compute Nodes
166 [Documentation] Verify the GWMAC Table, ARP Response table and Dispatcher table.
167 : FOR ${ip} IN @{OS_CMP_IPS}
168 \ BuiltIn.Wait Until Keyword Succeeds 30s 10s Verify GWMAC Flow Entry Removed From Flow Table ${ip}
170 Verify ARP REQUEST in groupTable
171 [Arguments] ${group_output} ${Group-ID}
172 [Documentation] get flow dump for group ID
173 Should Contain ${group_output} group_id=${Group-ID}
174 ${arp_group} = Get Lines Containing String ${group_output} group_id=${Group-ID}
176 CompareStream.Run_Keyword_If_At_Most_Oxygen BuiltIn.Should Match Regexp ${arp_group} ${ARP_REQUEST_GROUP_REGEX}
177 CompareStream.Run_Keyword_If_At_Least_Fluorine BuiltIn.Should Match Regexp ${arp_group} ${ARP_REQUEST_GROUP_REGEX_FLUORINE}
179 Verify Tunnel Status as UP
180 [Documentation] Verify that the tunnels are UP
181 BuiltIn.Return From Keyword If ${OS_NODE_CNT} == ${1} ${True}
182 ${output}= Issue Command On Karaf Console ${TEP_SHOW_STATE}
184 Should Contain ${output} ${STATE_UP}
185 Should Not Contain ${output} ${STATE_DOWN}
186 Should Not Contain ${output} ${STATE_UNKNOWN}
188 Verify Tunnel Status as DOWN
189 [Documentation] Verify that the tunnels are DOWN
190 ${output}= Issue Command On Karaf Console ${TEP_SHOW_STATE}
192 Should Contain ${output} ${STATE_DOWN}
193 Should Not Contain ${output} ${STATE_UP}
194 Should Not Contain ${output} ${STATE_UNKNOWN}
196 Verify Tunnel Status as UNKNOWN
197 [Documentation] Verify that the tunnels are in Unknown state
198 ${output}= Issue Command On Karaf Console ${TEP_SHOW_STATE}
200 Should Not Contain ${output} ${STATE_UP}
201 Should Not Contain ${output} ${STATE_DOWN}
202 Should Contain ${output} ${STATE_UNKNOWN}
204 Verify VXLAN interface
205 [Documentation] Verify that the VXLAN interfaces are Enabled
206 ${output}= Issue Command On Karaf Console ${VXLAN_SHOW}
208 Should Contain ${output} ${STATE_UP}
209 Should Contain ${output} ${STATE_ENABLE}
210 Should Not Contain ${output} ${STATE_DISABLE}
213 [Arguments] ${session}
214 [Documentation] Get Fib table entries from ODL session
215 ${resp} RequestsLibrary.Get Request ${session} ${FIB_ENTRIES_URL}
217 [Return] ${resp.content}
219 Get Gateway MAC And IP Address
220 [Arguments] ${router_Name} ${ip_regex}=${IP_REGEX}
221 [Documentation] Get Gateway mac and IP Address
222 ${output} = OpenStack CLI openstack port list --router ${router_Name}
223 @{MacAddr-list} = Get Regexp Matches ${output} ${MAC_REGEX}
224 @{IpAddr-list} = Get Regexp Matches ${output} ${ip_regex}
225 [Return] ${MacAddr-list} ${IpAddr-list}
227 Test Teardown With Tcpdump Stop
228 [Arguments] ${conn_ids}=@{EMPTY}
229 OpenStackOperations.Stop Packet Capture On Nodes ${conn_ids}
230 Get Test Teardown Debugs
232 Verify IPv4 GWMAC Flow Entry On Flow Table
233 [Arguments] ${group_output} ${group_id} ${flow_output}
234 Verify ARP REQUEST in groupTable ${group_output} ${groupID[1]}
235 #Verify ARP_RESPONSE_TABLE - 81
236 Should Contain ${flow_output} table=${ARP_RESPONSE_TABLE}
237 ${arpResponder_table} = Get Lines Containing String ${flow_output} table=${ARP_RESPONSE_TABLE}
238 Should Contain ${arpResponder_table} priority=0 actions=drop
239 : FOR ${macAdd} ${ipAdd} IN ZIP ${GWMAC_ADDRS} ${GWIP_ADDRS}
240 \ ${ARP_RESPONSE_IP_MAC_REGEX} = Set Variable arp_tpa=${ipAdd},arp_op=1 actions=.*,set_field:${macAdd}->eth_src
241 \ Should Match Regexp ${arpResponder_table} ${ARP_RESPONSE_IP_MAC_REGEX}
243 Verify IPv6 GWMAC Flow Entry On Flow Table
244 [Arguments] ${flow_output}
245 Should Contain ${flow_output} table=${IPV6_TABLE}
246 ${icmp_ipv6_flows} = Get Lines Containing String ${flow_output} icmp_type=135
247 : FOR ${ip_addr} IN @{GWIP_ADDRS}
248 \ ${rule} = Set Variable icmp_type=135,icmp_code=0,nd_target=${ip_addr} actions=CONTROLLER:65535
249 \ Should Match Regexp ${icmp_ipv6_flows} ${rule}
251 Verify GWMAC Flow Entry On Flow Table
252 [Arguments] ${cnIp} ${ipv}=ipv4
253 [Documentation] Verify the GWMAC Table, ARP Response table and Dispatcher table.
254 ${flow_output}= Run Command On Remote System ${cnIp} sudo ovs-ofctl -O OpenFlow13 dump-flows ${INTEGRATION_BRIDGE}
255 ${group_output}= Run Command On Remote System ${cnIp} sudo ovs-ofctl -O OpenFlow13 dump-groups ${INTEGRATION_BRIDGE}
256 Should Contain ${flow_output} table=${DISPATCHER_TABLE}
257 ${dispatcher_table} = Get Lines Containing String ${flow_output} table=${DISPATCHER_TABLE}
258 Should Contain ${dispatcher_table} goto_table:${GWMAC_TABLE}
259 Should Not Contain ${dispatcher_table} goto_table:${ARP_RESPONSE_TABLE}
260 Should Contain ${flow_output} table=${GWMAC_TABLE}
261 ${gwmac_table} = Get Lines Containing String ${flow_output} table=${GWMAC_TABLE}
262 #Verify GWMAC address present in table 19
263 : FOR ${macAdd} IN @{GWMAC_ADDRS}
264 \ Should Contain ${gwmac_table} dl_dst=${macAdd} actions=goto_table:${L3_TABLE}
266 Should Contain ${gwmac_table} actions=resubmit(,17)
267 #Verify ARP_CHECK_TABLE - 43
268 #arp request and response
269 ${arpchk_table} = Get Lines Containing String ${flow_output} table=${ARP_CHECK_TABLE}
270 CompareStream.Run_Keyword_If_At_Most_Oxygen BuiltIn.Should Match Regexp ${arpchk_table} ${ARP_RESPONSE_REGEX}
271 CompareStream.Run_Keyword_If_At_Least_Fluorine BuiltIn.Should Match Regexp ${arpchk_table} ${ARP_RESPONSE_REGEX_FLUORINE}
272 ${arppunt_table} = String.Get Lines Containing String ${flow_output} table=${ARP_PUNT_TABLE}
273 CompareStream.Run_Keyword_If_At_Least_Fluorine BuiltIn.Should Match Regexp ${arppunt_table} ${ARP_PUNT_RESPONSE_REGEX}
274 ${match} = Should Match Regexp ${arpchk_table} ${ARP_REQUEST_REGEX}
275 ${groupID} = Split String ${match} separator=:
276 BuiltIn.Run Keyword If '${ipv}' == 'ipv4' Verify IPv4 GWMAC Flow Entry On Flow Table ${group_output} ${group_id} ${flow_output}
277 ... ELSE Verify IPv6 GWMAC Flow Entry On Flow Table ${flow_output}
279 Verify GWMAC Flow Entry On Flow Table On All Compute Nodes
280 [Arguments] ${ipv}=ipv4
281 [Documentation] Verify the GWMAC Table, ARP Response table and Dispatcher table.
282 : FOR ${ip} IN @{OS_CMP_IPS}
283 \ BuiltIn.Wait Until Keyword Succeeds 30s 10s VpnOperations.Verify GWMAC Flow Entry On Flow Table ${ip} ${ipv}
285 Delete Multiple L3VPNs
287 [Documentation] Delete three L3VPNs created using Multiple L3VPN Test
288 : FOR ${vpn} IN @{vpns}
289 \ VPN Delete L3VPN vpnid=${vpn}
292 BuiltIn.Return From Keyword If "${OPENSTACK_TOPO}" == "1cmb-0ctl-0cmp"
293 SetupUtils.Setup_Test_With_Logging_And_Without_Fast_Failing
296 BuiltIn.Return From Keyword If "${OPENSTACK_TOPO}" == "1cmb-0ctl-0cmp"
297 OpenStackOperations.Get Test Teardown Debugs