blob: 2f78e393ebd91e4152a7d0f30092e67d05aea45f [file] [log] [blame]
Ben Andrewsdbdf6be2012-04-04 14:43:32 -04001#!/usr/bin/env bash
2
3# **sec_groups.sh**
4
Dean Troyerda85cda2013-02-15 11:07:14 -06005# Test security groups via the command line
Ben Andrewsdbdf6be2012-04-04 14:43:32 -04006
7echo "*********************************************************************"
8echo "Begin DevStack Exercise: $0"
9echo "*********************************************************************"
10
11# This script exits on an error so that errors don't compound and you see
Joe Gordon46400262013-06-30 04:32:27 -070012# only the first error that occurred.
Ben Andrewsdbdf6be2012-04-04 14:43:32 -040013set -o errexit
14
15# Print the commands being run so that we can see the command that triggers
igor01acdab2016-07-29 13:11:53 +020016# an error. It is also useful for following as the install occurs.
Ben Andrewsdbdf6be2012-04-04 14:43:32 -040017set -o xtrace
18
19
20# Settings
21# ========
22
23# Keep track of the current directory
24EXERCISE_DIR=$(cd $(dirname "$0") && pwd)
25TOP_DIR=$(cd $EXERCISE_DIR/..; pwd)
26
27# Import common functions
28source $TOP_DIR/functions
29
30# Import configuration
31source $TOP_DIR/openrc
32
33# Import exercise configuration
34source $TOP_DIR/exerciserc
35
Kiall Mac Innesa16c8212014-01-12 19:35:43 +000036# If nova api is not enabled we exit with exitcode 55 so that
37# the exercise is skipped
38is_service_enabled n-api || exit 55
39
Ben Andrewsdbdf6be2012-04-04 14:43:32 -040040
41# Testing Security Groups
Dean Troyerc5dfecd2012-09-08 14:20:43 -050042# =======================
Ben Andrewsdbdf6be2012-04-04 14:43:32 -040043
44# List security groups
45nova secgroup-list
46
47# Create random name for new sec group and create secgroup of said name
Dean Troyerda85cda2013-02-15 11:07:14 -060048SEC_GROUP_NAME="ex-secgroup-$(openssl rand -hex 4)"
Ben Andrewsdbdf6be2012-04-04 14:43:32 -040049nova secgroup-create $SEC_GROUP_NAME 'a test security group'
50
51# Add some rules to the secgroup
52RULES_TO_ADD=( 22 3389 5900 )
53
54for RULE in "${RULES_TO_ADD[@]}"; do
Dean Troyer029598e2013-01-17 11:17:16 -060055 nova secgroup-add-rule $SEC_GROUP_NAME tcp $RULE $RULE 0.0.0.0/0
Ben Andrewsdbdf6be2012-04-04 14:43:32 -040056done
57
58# Check to make sure rules were added
59SEC_GROUP_RULES=( $(nova secgroup-list-rules $SEC_GROUP_NAME | grep -v \- | grep -v 'Source Group' | cut -d '|' -f3 | tr -d ' ') )
DennyZhang23178a92013-10-22 17:07:32 -050060die_if_not_set $LINENO SEC_GROUP_RULES "Failure retrieving SEC_GROUP_RULES for $SEC_GROUP_NAME"
Ben Andrewsdbdf6be2012-04-04 14:43:32 -040061for i in "${RULES_TO_ADD[@]}"; do
62 skip=
63 for j in "${SEC_GROUP_RULES[@]}"; do
64 [[ $i == $j ]] && { skip=1; break; }
65 done
66 [[ -n $skip ]] || exit 1
67done
68
69# Delete rules and secgroup
70for RULE in "${RULES_TO_ADD[@]}"; do
Dean Troyer029598e2013-01-17 11:17:16 -060071 nova secgroup-delete-rule $SEC_GROUP_NAME tcp $RULE $RULE 0.0.0.0/0
Ben Andrewsdbdf6be2012-04-04 14:43:32 -040072done
Ben Andrewsdbdf6be2012-04-04 14:43:32 -040073
Dean Troyerda85cda2013-02-15 11:07:14 -060074# Delete secgroup
75nova secgroup-delete $SEC_GROUP_NAME || \
Nachi Ueno07115eb2013-02-26 12:38:18 -080076 die $LINENO "Failure deleting security group $SEC_GROUP_NAME"
Ben Andrewsdbdf6be2012-04-04 14:43:32 -040077
78set +o xtrace
79echo "*********************************************************************"
80echo "SUCCESS: End DevStack Exercise: $0"
81echo "*********************************************************************"