weizhouapache edited a comment on pull request #4484:
URL: https://github.com/apache/cloudstack/pull/4484#issuecomment-732042168


   > I see nothing strange or wrong with this code. two remarks thought:
   > 
   > 1. it is a lot in one go and will require verification in a lot of 
different kinds of environments.
   > 2. I recognise some changes that already went into master over the last 
few weeks so merging forward might give some conflicts (nothing that should 
stop us now.
   
   @DaanHoogland @rhtyd rebased with latest 4.14
   yes, there are  indeed a lot of verifications to be done.
   
   I have added some test cases in this PR which verify the ips on nics and 
UP/DOWN state of public interfaces.
   I have tested with kvm, but not on xenserver and vmware.
   it takes around 1 hour to finish all 4 integration tests so I do not add 
them to .travis.yaml.
   The integration tests cover vpc/network with/without vr, and some actions 
(add/remove public ip in multiple ip ranges, add/remove vpc tier,add private 
gateway, reboot routers, restart vpc tiers, restart vpc/network w/wo cleanup). 
   
https://github.com/apache/cloudstack/blob/788ed28a8c73756a1bc8deb102a1d2506cc2d430/test/integration/component/test_multiple_subnets_in_isolated_network.py
   
https://github.com/apache/cloudstack/blob/788ed28a8c73756a1bc8deb102a1d2506cc2d430/test/integration/component/test_multiple_subnets_in_isolated_network_rvr.py
   
https://github.com/apache/cloudstack/blob/788ed28a8c73756a1bc8deb102a1d2506cc2d430/test/integration/component/test_multiple_subnets_in_vpc.py
   
https://github.com/apache/cloudstack/blob/788ed28a8c73756a1bc8deb102a1d2506cc2d430/test/integration/component/test_multiple_subnets_in_vpc_rvr.py
   
   
   However, for some changes on iptable rules , they require manual test.
   What I have done
   (1) create vpc1 and two tiers vpc1-001, vpc1-002, and some vms vpc1-001-001, 
vpc1-001-002, vpc1-002-001, vpc1-002-002
   (2) create a shared network and a vm in it, to simulate server in private 
rack.
   (3) create vpc2, create a tier and vm vpc2-001-001, and enable site-to-site 
vpn gateway
   (4) add multiple public ip ranges in zone/public physical network
   
   setup
   (5) create site-to-site vpn between vpc1 and vpc2
   (6) create private gateway in vpc1, with same vlan with shared network in 
step (2) above.
   (7) acquire multiple IPs in new public ranges created in step (4) above, and 
use them for different proposal (eg enable static nat on some vms in vpc, or 
create port forwarding rules to vms in vpc).
   
   expected results
   (1) if ACL is allow_all, then all servers (including vm in shared network, 
vm in vpc2, vms with/without static nat in vpc1) should be able to reach each 
other
   (2) if ACL is deny_all, vm in vpc tiers and private gateway should not be 
able to reach each other.
   
   By the way, if you merge his pr, could you use "Rebase and Merge" option so 
it would be better to track why a line of change is made if there are issues in 
the future.


----------------------------------------------------------------
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

For queries about this service, please contact Infrastructure at:
[email protected]


Reply via email to