Should Contain ${output} Created a new subnet
Create Port
- [Arguments] ${network_name} ${port_name} ${sg}=default
+ [Arguments] ${network_name} ${port_name} ${sg}=default ${additional_args}=${EMPTY}
[Documentation] Create Port with neutron request.
${devstack_conn_id}= Get ControlNode Connection
Switch Connection ${devstack_conn_id}
- ${output}= Write Commands Until Prompt neutron -v port-create ${network_name} --name ${port_name} --security-group ${sg} 30s
+ ${output}= Write Commands Until Prompt neutron -v port-create ${network_name} --name ${port_name} --security-group ${sg} ${additional_args} 30s
Close Connection
Log ${output}
Should Contain ${output} Created a new port
[Documentation] Check if the session has been able to login to the VM instance and exit the instance
${rcode}= Run Keyword And Return Status Check If Console Is VmInstance cirros
Run Keyword If ${rcode} Write Commands Until Prompt exit
- Get OvsDebugInfo
Check Ping
[Arguments] ${ip_address}
Switch Connection ${devstack_conn_id}
${net_id} = Get Net Id ${net_name} ${devstack_conn_id}
Log ${vm_ip}
- ${output} = Write Commands Until Expected Prompt sudo ip netns exec qdhcp-${net_id} ssh ${user}@${vm_ip} -o ConnectTimeout=10 -o StrictHostKeyChecking=no d:
+ ${output} = Write Commands Until Expected Prompt sudo ip netns exec qdhcp-${net_id} ssh ${user}@${vm_ip} -o ConnectTimeout=10 -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null d:
Log ${output}
${output} = Write Commands Until Expected Prompt ${password} ${OS_SYSTEM_PROMPT}
Log ${output}
Switch Connection ${devstack_conn_id}
Log ${src_ip}
${net_id}= Get Net Id ${net_name} ${devstack_conn_id}
- ${output}= Write Commands Until Expected Prompt sudo ip netns exec qdhcp-${net_id} ssh -o ConnectTimeout=10 -o StrictHostKeyChecking=no ${user}@${src_ip} d:
+ ${output}= Write Commands Until Expected Prompt sudo ip netns exec qdhcp-${net_id} ssh -o ConnectTimeout=10 -o StrictHostKeyChecking=no ${user}@${src_ip} -o UserKnownHostsFile=/dev/null d:
Log ${output}
${output}= Write Commands Until Expected Prompt ${password} ${OS_SYSTEM_PROMPT}
Log ${output}
Run Keyword If ${rcode} Check Metadata Access
[Teardown] Exit From Vm Console
+Install Netcat On Controller
+ [Documentation] Installs Netcat on the controller - this probably shouldn't be here
+ ${devstack_conn_id}= Get ControlNode Connection
+ Switch Connection ${devstack_conn_id}
+ ${output}= Write Commands Until Prompt sudo yum install -y nc
+ Log ${output}
+ Close Connection
+
+Test Netcat Operations From Vm Instance
+ [Arguments] ${net_name} ${vm_ip} ${dest_ip} ${additional_args}=${EMPTY} ${port}=12345 ${user}=cirros
+ ... ${password}=cubswin:)
+ [Documentation] Use Netcat to test TCP/UDP connections to the controller
+ ${client_data} Set Variable Test Client Data
+ ${server_data} Set Variable Test Server Data
+ ${devstack_conn_id}= Get ControlNode Connection
+ Switch Connection ${devstack_conn_id}
+ Log ${vm_ip}
+ ${output}= Write Commands Until Prompt ( ( echo "${server_data}" | sudo timeout 60 nc -l ${additional_args} ${port} ) & )
+ Log ${output}
+ ${output}= Write Commands Until Prompt sudo netstat -nlap | grep ${port}
+ Log ${output}
+ ${nc_output}= Execute Command on VM Instance ${net_name} ${vm_ip} sudo echo "${client_data}" | nc -v -w 5 ${additional_args} ${dest_ip} ${port}
+ Log ${nc_output}
+ ${output}= Execute Command on VM Instance ${net_name} ${vm_ip} sudo route -n
+ Log ${output}
+ ${output}= Execute Command on VM Instance ${net_name} ${vm_ip} sudo arp -an
+ Log ${output}
+ Should Match Regexp ${nc_output} ${server_data}
+
Ping Other Instances
[Arguments] ${list_of_external_dst_ips}
[Documentation] Check reachability with other network's instances.
Get Model Dump ${HA_PROXY_IP}
Get Karaf Log Events From Test Start ${test_name}
+Get Suite Teardown Debugs
+ Get OvsDebugInfo
+ Get Model Dump ${HA_PROXY_IP}
+
Show Debugs
[Arguments] @{vm_indices}
[Documentation] Run these commands for debugging, it can list state of VM instances and ip information in control node
Close Connection
[Return] ${output}
+Delete SecurityGroup
+ [Arguments] ${sg_name}
+ [Documentation] Delete Security group
+ ${devstack_conn_id}= Get ControlNode Connection
+ Switch Connection ${devstack_conn_id}
+ ${output}= Write Commands Until Prompt neutron security-group-delete ${sg_name} 40s
+ Log ${output}
+ Should Match Regexp ${output} Deleted security_group: ${sg_name}|Deleted security_group\\(s\\): ${sg_name}
+ Close Connection
+
Neutron Security Group Rule Create
[Arguments] ${Security_group_name} &{Kwargs}
[Documentation] Creates neutron security rule with neutron request with or without optional params, here security group name is mandatory args, rule with optional params can be created by passing the optional args values ex: direction=${INGRESS_EGRESS}, Then these optional params are catenated with mandatory args, example of usage: "Neutron Security Group Rule Create ${SGP_SSH} direction=${RULE_PARAMS[0]} ethertype=${RULE_PARAMS[1]} ..."
Log ${port_id}
Close Connection
[Return] ${OUTPUT} ${port_id}
+
+Get Ports MacAddr
+ [Arguments] ${portName_list}
+ [Documentation] Retrieve the port MacAddr for the given list of port name and return the MAC address list.
+ ${devstack_conn_id}= Get ControlNode Connection
+ Switch Connection ${devstack_conn_id}
+ ${MacAddr-list} Create List
+ : FOR ${portName} IN @{portName_list}
+ \ ${output} = Write Commands Until Prompt neutron port-list | grep "${portName}" | awk '{print $6}' 30s
+ \ Log ${output}
+ \ ${splitted_output}= Split String ${output} ${EMPTY}
+ \ ${macAddr}= Get from List ${splitted_output} 0
+ \ Log ${macAddr}
+ \ Append To List ${MacAddr-list} ${macAddr}
+ [Return] ${MacAddr-list}
+
+Delete SecurityGroup
+ [Arguments] ${sg_name}
+ [Documentation] Delete Security group
+ ${devstack_conn_id}= Get ControlNode Connection
+ Switch Connection ${devstack_conn_id}
+ ${output}= Write Commands Until Prompt neutron security-group-delete ${sg_name} 40s
+ Log ${output}
+ Should Match Regexp ${output} Deleted security_group: ${sg_name}|Deleted security_group\\(s\\): ${sg_name}
+ Close Connection