293 lines
10 KiB
Python
293 lines
10 KiB
Python
# vim: tabstop=4 shiftwidth=4 softtabstop=4
|
|
#
|
|
# Copyright 2013 vArmour Networks Inc.
|
|
# All Rights Reserved.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
#
|
|
# @author: Gary Duan, vArmour Networks Inc.
|
|
#
|
|
|
|
|
|
import mock
|
|
from oslo.config import cfg
|
|
|
|
from neutron.agent.common import config as agent_config
|
|
from neutron.agent import l3_agent
|
|
from neutron.agent.linux import interface
|
|
from neutron.common import config as base_config
|
|
from neutron.common import constants as l3_constants
|
|
from neutron.openstack.common import uuidutils
|
|
from neutron.services.firewall.agents.varmour import varmour_router
|
|
from neutron.services.firewall.agents.varmour import varmour_utils
|
|
from neutron.services.firewall.drivers.varmour import varmour_fwaas
|
|
from neutron.tests import base
|
|
|
|
_uuid = uuidutils.generate_uuid
|
|
HOSTNAME = 'myhost'
|
|
FAKE_DIRECTOR = '1.1.1.1'
|
|
|
|
|
|
class TestBasicRouterOperations(base.BaseTestCase):
|
|
|
|
def setUp(self):
|
|
super(TestBasicRouterOperations, self).setUp()
|
|
self.conf = cfg.ConfigOpts()
|
|
self.conf.register_opts(base_config.core_opts)
|
|
self.conf.register_opts(varmour_router.vArmourL3NATAgent.OPTS)
|
|
agent_config.register_interface_driver_opts_helper(self.conf)
|
|
agent_config.register_use_namespaces_opts_helper(self.conf)
|
|
agent_config.register_root_helper(self.conf)
|
|
self.conf.register_opts(interface.OPTS)
|
|
self.conf.set_override('interface_driver',
|
|
'neutron.agent.linux.interface.NullDriver')
|
|
self.conf.root_helper = 'sudo'
|
|
|
|
self.device_exists_p = mock.patch(
|
|
'neutron.agent.linux.ip_lib.device_exists')
|
|
self.device_exists = self.device_exists_p.start()
|
|
|
|
self.utils_exec_p = mock.patch(
|
|
'neutron.agent.linux.utils.execute')
|
|
self.utils_exec = self.utils_exec_p.start()
|
|
|
|
self.external_process_p = mock.patch(
|
|
'neutron.agent.linux.external_process.ProcessManager')
|
|
self.external_process = self.external_process_p.start()
|
|
|
|
self.dvr_cls_p = mock.patch('neutron.agent.linux.interface.NullDriver')
|
|
driver_cls = self.dvr_cls_p.start()
|
|
self.mock_driver = mock.MagicMock()
|
|
self.mock_driver.DEV_NAME_LEN = (
|
|
interface.LinuxInterfaceDriver.DEV_NAME_LEN)
|
|
driver_cls.return_value = self.mock_driver
|
|
|
|
self.ip_cls_p = mock.patch('neutron.agent.linux.ip_lib.IPWrapper')
|
|
ip_cls = self.ip_cls_p.start()
|
|
self.mock_ip = mock.MagicMock()
|
|
ip_cls.return_value = self.mock_ip
|
|
|
|
self.looping_call_p = mock.patch(
|
|
'neutron.openstack.common.loopingcall.FixedIntervalLoopingCall')
|
|
self.looping_call_p.start()
|
|
|
|
self.addCleanup(mock.patch.stopall)
|
|
|
|
def _create_router(self):
|
|
router = varmour_router.vArmourL3NATAgent(HOSTNAME, self.conf)
|
|
router.rest.server = FAKE_DIRECTOR
|
|
router.rest.user = 'varmour'
|
|
router.rest.passwd = 'varmour'
|
|
return router
|
|
|
|
def _create_fwaas(self):
|
|
fwaas = varmour_fwaas.vArmourFwaasDriver()
|
|
fwaas.rest.server = FAKE_DIRECTOR
|
|
fwaas.rest.user = 'varmour'
|
|
fwaas.rest.passwd = 'varmour'
|
|
return fwaas
|
|
|
|
def _del_all_internal_ports(self, router):
|
|
router[l3_constants.INTERFACE_KEY] = []
|
|
|
|
def _del_internal_ports(self, router, port_idx):
|
|
del router[l3_constants.INTERFACE_KEY][port_idx]
|
|
|
|
def _add_internal_ports(self, router, port_count=1):
|
|
self._del_all_internal_ports(router)
|
|
for i in range(port_count):
|
|
port = {'id': _uuid(),
|
|
'network_id': _uuid(),
|
|
'admin_state_up': True,
|
|
'fixed_ips': [{'ip_address': '10.0.%s.4' % i,
|
|
'subnet_id': _uuid()}],
|
|
'mac_address': 'ca:fe:de:ad:be:ef',
|
|
'subnet': {'cidr': '10.0.%s.0/24' % i,
|
|
'gateway_ip': '10.0.%s.1' % i}}
|
|
router[l3_constants.INTERFACE_KEY].append(port)
|
|
|
|
def _del_all_floating_ips(self, router):
|
|
router[l3_constants.FLOATINGIP_KEY] = []
|
|
|
|
def _del_floating_ips(self, router, port_idx):
|
|
del router[l3_constants.FLOATINGIP_KEY][port_idx]
|
|
|
|
def _add_floating_ips(self, router, port_count=1):
|
|
self._del_all_floating_ips(router)
|
|
for i in range(port_count):
|
|
fip = {'id': _uuid(),
|
|
'port_id': router['gw_port']['id'],
|
|
'floating_ip_address': '172.24.4.%s' % (100 + i),
|
|
'fixed_ip_address': '10.0.0.%s' % (100 + i)}
|
|
router[l3_constants.FLOATINGIP_KEY].append(fip)
|
|
|
|
def _prepare_router_data(self, enable_snat=None):
|
|
router_id = _uuid()
|
|
ex_gw_port = {'id': _uuid(),
|
|
'network_id': _uuid(),
|
|
'fixed_ips': [{'ip_address': '172.24.4.2',
|
|
'subnet_id': _uuid()}],
|
|
'subnet': {'cidr': '172.24.4.0/24',
|
|
'gateway_ip': '172.24.4.1'},
|
|
'ip_cidr': '172.24.4.226/28'}
|
|
int_ports = []
|
|
|
|
router = {
|
|
'id': router_id,
|
|
l3_constants.INTERFACE_KEY: int_ports,
|
|
'routes': [],
|
|
'gw_port': ex_gw_port}
|
|
if enable_snat is not None:
|
|
router['enable_snat'] = enable_snat
|
|
|
|
ri = l3_agent.RouterInfo(router['id'], self.conf.root_helper,
|
|
self.conf.use_namespaces, router=router)
|
|
return ri
|
|
|
|
def _add_firewall_rules(self, fw, rule_count=1):
|
|
rules = []
|
|
for i in range(rule_count):
|
|
rule = {'id': _uuid(),
|
|
'enabled': True,
|
|
'action': 'deny' if (i % 2 == 0) else 'allow',
|
|
'ip_version': 4,
|
|
'protocol': 'tcp',
|
|
'source_ip_address': '10.0.0.%s/24' % (100 + i),
|
|
'destination_port': '%s' % (100 + i)}
|
|
rules.append(rule)
|
|
fw['firewall_rule_list'] = rules
|
|
|
|
def _prepare_firewall_data(self):
|
|
fw = {'id': _uuid(),
|
|
'admin_state_up': True,
|
|
'firewall_rule_list': []}
|
|
return fw
|
|
|
|
def test_firewall_without_rule(self):
|
|
router = self._create_router()
|
|
fwaas = self._create_fwaas()
|
|
try:
|
|
router.rest.auth()
|
|
except Exception:
|
|
# skip the test, firewall is not deployed
|
|
return
|
|
|
|
ri = self._prepare_router_data(enable_snat=True)
|
|
self._add_internal_ports(ri.router, port_count=1)
|
|
self._add_floating_ips(ri.router, port_count=1)
|
|
router._router_added(ri.router['id'], ri.router)
|
|
|
|
rl = [ri]
|
|
|
|
fw = self._prepare_firewall_data()
|
|
fwaas.create_firewall(rl, fw)
|
|
|
|
url = varmour_utils.REST_URL_CONF_POLICY
|
|
prefix = varmour_utils.get_firewall_object_prefix(ri, fw)
|
|
|
|
n = fwaas.rest.count_cfg_objs(url, prefix)
|
|
self.assertEqual(n, 0)
|
|
|
|
fwaas.delete_firewall(rl, fw)
|
|
n = fwaas.rest.count_cfg_objs(url, prefix)
|
|
self.assertEqual(n, 0)
|
|
|
|
router._router_removed(ri.router['id'])
|
|
|
|
def test_firewall_with_rules(self):
|
|
router = self._create_router()
|
|
fwaas = self._create_fwaas()
|
|
try:
|
|
router.rest.auth()
|
|
except Exception:
|
|
# skip the test, firewall is not deployed
|
|
return
|
|
|
|
ri = self._prepare_router_data(enable_snat=True)
|
|
self._add_internal_ports(ri.router, port_count=1)
|
|
self._add_floating_ips(ri.router, port_count=1)
|
|
router._router_added(ri.router['id'], ri.router)
|
|
|
|
rl = [ri]
|
|
|
|
fw = self._prepare_firewall_data()
|
|
self._add_firewall_rules(fw, 2)
|
|
fwaas.create_firewall(rl, fw)
|
|
|
|
prefix = varmour_utils.get_firewall_object_prefix(ri, fw)
|
|
pol_url = varmour_utils.REST_URL_CONF_POLICY
|
|
serv_url = varmour_utils.REST_URL_CONF_SERVICE
|
|
addr_url = varmour_utils.REST_URL_CONF_ADDR
|
|
|
|
# 3x number of policies
|
|
n = fwaas.rest.count_cfg_objs(pol_url, prefix)
|
|
self.assertEqual(n, 6)
|
|
n = fwaas.rest.count_cfg_objs(addr_url, prefix)
|
|
self.assertEqual(n, 2)
|
|
n = fwaas.rest.count_cfg_objs(serv_url, prefix)
|
|
self.assertEqual(n, 2)
|
|
|
|
fwaas.delete_firewall(rl, fw)
|
|
n = fwaas.rest.count_cfg_objs(pol_url, prefix)
|
|
self.assertEqual(n, 0)
|
|
|
|
router._router_removed(ri.router['id'])
|
|
|
|
def test_firewall_add_remove_rules(self):
|
|
router = self._create_router()
|
|
fwaas = self._create_fwaas()
|
|
try:
|
|
router.rest.auth()
|
|
except Exception:
|
|
# skip the test, firewall is not deployed
|
|
return
|
|
|
|
ri = self._prepare_router_data(enable_snat=True)
|
|
self._add_internal_ports(ri.router, port_count=1)
|
|
self._add_floating_ips(ri.router, port_count=1)
|
|
router._router_added(ri.router['id'], ri.router)
|
|
|
|
rl = [ri]
|
|
|
|
fw = self._prepare_firewall_data()
|
|
self._add_firewall_rules(fw, 2)
|
|
fwaas.create_firewall(rl, fw)
|
|
|
|
prefix = varmour_utils.get_firewall_object_prefix(ri, fw)
|
|
pol_url = varmour_utils.REST_URL_CONF_POLICY
|
|
serv_url = varmour_utils.REST_URL_CONF_SERVICE
|
|
addr_url = varmour_utils.REST_URL_CONF_ADDR
|
|
|
|
# 3x number of policies
|
|
n = fwaas.rest.count_cfg_objs(pol_url, prefix)
|
|
self.assertEqual(n, 6)
|
|
n = fwaas.rest.count_cfg_objs(addr_url, prefix)
|
|
self.assertEqual(n, 2)
|
|
n = fwaas.rest.count_cfg_objs(serv_url, prefix)
|
|
self.assertEqual(n, 2)
|
|
|
|
self._add_firewall_rules(fw, 1)
|
|
fwaas.create_firewall(rl, fw)
|
|
n = fwaas.rest.count_cfg_objs(pol_url, prefix)
|
|
self.assertEqual(n, 3)
|
|
n = fwaas.rest.count_cfg_objs(addr_url, prefix)
|
|
self.assertEqual(n, 1)
|
|
n = fwaas.rest.count_cfg_objs(serv_url, prefix)
|
|
self.assertEqual(n, 1)
|
|
|
|
fwaas.delete_firewall(rl, fw)
|
|
n = fwaas.rest.count_cfg_objs(pol_url, prefix)
|
|
self.assertEqual(n, 0)
|
|
|
|
router._router_removed(ri.router['id'])
|