blob: b73afdfd091dd2ac50e00566a2d29a67a8c225fa [file] [log] [blame]
Ben Andrewsdbdf6be2012-04-04 14:43:32 -04001#!/usr/bin/env bash
2
3# **sec_groups.sh**
4
Dean Troyerda85cda2013-02-15 11:07:14 -06005# Test security groups via the command line
Ben Andrewsdbdf6be2012-04-04 14:43:32 -04006
7echo "*********************************************************************"
8echo "Begin DevStack Exercise: $0"
9echo "*********************************************************************"
10
11# This script exits on an error so that errors don't compound and you see
12# only the first error that occured.
13set -o errexit
14
15# Print the commands being run so that we can see the command that triggers
16# an error. It is also useful for following allowing as the install occurs.
17set -o xtrace
18
19
20# Settings
21# ========
22
23# Keep track of the current directory
24EXERCISE_DIR=$(cd $(dirname "$0") && pwd)
25TOP_DIR=$(cd $EXERCISE_DIR/..; pwd)
26
27# Import common functions
28source $TOP_DIR/functions
29
30# Import configuration
31source $TOP_DIR/openrc
32
33# Import exercise configuration
34source $TOP_DIR/exerciserc
35
36
37# Testing Security Groups
Dean Troyerc5dfecd2012-09-08 14:20:43 -050038# =======================
Ben Andrewsdbdf6be2012-04-04 14:43:32 -040039
40# List security groups
41nova secgroup-list
42
43# Create random name for new sec group and create secgroup of said name
Dean Troyerda85cda2013-02-15 11:07:14 -060044SEC_GROUP_NAME="ex-secgroup-$(openssl rand -hex 4)"
Ben Andrewsdbdf6be2012-04-04 14:43:32 -040045nova secgroup-create $SEC_GROUP_NAME 'a test security group'
46
47# Add some rules to the secgroup
48RULES_TO_ADD=( 22 3389 5900 )
49
50for RULE in "${RULES_TO_ADD[@]}"; do
Dean Troyer029598e2013-01-17 11:17:16 -060051 nova secgroup-add-rule $SEC_GROUP_NAME tcp $RULE $RULE 0.0.0.0/0
Ben Andrewsdbdf6be2012-04-04 14:43:32 -040052done
53
54# Check to make sure rules were added
55SEC_GROUP_RULES=( $(nova secgroup-list-rules $SEC_GROUP_NAME | grep -v \- | grep -v 'Source Group' | cut -d '|' -f3 | tr -d ' ') )
56for i in "${RULES_TO_ADD[@]}"; do
57 skip=
58 for j in "${SEC_GROUP_RULES[@]}"; do
59 [[ $i == $j ]] && { skip=1; break; }
60 done
61 [[ -n $skip ]] || exit 1
62done
63
64# Delete rules and secgroup
65for RULE in "${RULES_TO_ADD[@]}"; do
Dean Troyer029598e2013-01-17 11:17:16 -060066 nova secgroup-delete-rule $SEC_GROUP_NAME tcp $RULE $RULE 0.0.0.0/0
Ben Andrewsdbdf6be2012-04-04 14:43:32 -040067done
Ben Andrewsdbdf6be2012-04-04 14:43:32 -040068
Dean Troyerda85cda2013-02-15 11:07:14 -060069# Delete secgroup
70nova secgroup-delete $SEC_GROUP_NAME || \
Nachi Ueno07115eb2013-02-26 12:38:18 -080071 die $LINENO "Failure deleting security group $SEC_GROUP_NAME"
Ben Andrewsdbdf6be2012-04-04 14:43:32 -040072
73set +o xtrace
74echo "*********************************************************************"
75echo "SUCCESS: End DevStack Exercise: $0"
76echo "*********************************************************************"