blob: 7d80570326898d236242f8ef1433dfc473ba9726 [file] [log] [blame]
Ben Andrewsdbdf6be2012-04-04 14:43:32 -04001#!/usr/bin/env bash
2
3# **sec_groups.sh**
4
Dean Troyerda85cda2013-02-15 11:07:14 -06005# Test security groups via the command line
Ben Andrewsdbdf6be2012-04-04 14:43:32 -04006
7echo "*********************************************************************"
8echo "Begin DevStack Exercise: $0"
9echo "*********************************************************************"
10
11# This script exits on an error so that errors don't compound and you see
Joe Gordon46400262013-06-30 04:32:27 -070012# only the first error that occurred.
Ben Andrewsdbdf6be2012-04-04 14:43:32 -040013set -o errexit
14
15# Print the commands being run so that we can see the command that triggers
16# an error. It is also useful for following allowing as the install occurs.
17set -o xtrace
18
19
20# Settings
21# ========
22
23# Keep track of the current directory
24EXERCISE_DIR=$(cd $(dirname "$0") && pwd)
25TOP_DIR=$(cd $EXERCISE_DIR/..; pwd)
26
27# Import common functions
28source $TOP_DIR/functions
29
30# Import configuration
31source $TOP_DIR/openrc
32
33# Import exercise configuration
34source $TOP_DIR/exerciserc
35
Dean Troyer2aa2a892013-08-04 19:53:19 -050036# Skip if the hypervisor is Docker
37[[ "$VIRT_DRIVER" == "docker" ]] && exit 55
38
Ben Andrewsdbdf6be2012-04-04 14:43:32 -040039
40# Testing Security Groups
Dean Troyerc5dfecd2012-09-08 14:20:43 -050041# =======================
Ben Andrewsdbdf6be2012-04-04 14:43:32 -040042
43# List security groups
44nova secgroup-list
45
46# Create random name for new sec group and create secgroup of said name
Dean Troyerda85cda2013-02-15 11:07:14 -060047SEC_GROUP_NAME="ex-secgroup-$(openssl rand -hex 4)"
Ben Andrewsdbdf6be2012-04-04 14:43:32 -040048nova secgroup-create $SEC_GROUP_NAME 'a test security group'
49
50# Add some rules to the secgroup
51RULES_TO_ADD=( 22 3389 5900 )
52
53for RULE in "${RULES_TO_ADD[@]}"; do
Dean Troyer029598e2013-01-17 11:17:16 -060054 nova secgroup-add-rule $SEC_GROUP_NAME tcp $RULE $RULE 0.0.0.0/0
Ben Andrewsdbdf6be2012-04-04 14:43:32 -040055done
56
57# Check to make sure rules were added
58SEC_GROUP_RULES=( $(nova secgroup-list-rules $SEC_GROUP_NAME | grep -v \- | grep -v 'Source Group' | cut -d '|' -f3 | tr -d ' ') )
59for i in "${RULES_TO_ADD[@]}"; do
60 skip=
61 for j in "${SEC_GROUP_RULES[@]}"; do
62 [[ $i == $j ]] && { skip=1; break; }
63 done
64 [[ -n $skip ]] || exit 1
65done
66
67# Delete rules and secgroup
68for RULE in "${RULES_TO_ADD[@]}"; do
Dean Troyer029598e2013-01-17 11:17:16 -060069 nova secgroup-delete-rule $SEC_GROUP_NAME tcp $RULE $RULE 0.0.0.0/0
Ben Andrewsdbdf6be2012-04-04 14:43:32 -040070done
Ben Andrewsdbdf6be2012-04-04 14:43:32 -040071
Dean Troyerda85cda2013-02-15 11:07:14 -060072# Delete secgroup
73nova secgroup-delete $SEC_GROUP_NAME || \
Nachi Ueno07115eb2013-02-26 12:38:18 -080074 die $LINENO "Failure deleting security group $SEC_GROUP_NAME"
Ben Andrewsdbdf6be2012-04-04 14:43:32 -040075
76set +o xtrace
77echo "*********************************************************************"
78echo "SUCCESS: End DevStack Exercise: $0"
79echo "*********************************************************************"