[ 
https://issues.apache.org/jira/browse/CLOUDSTACK-9075?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15037327#comment-15037327
 ] 

ASF GitHub Bot commented on CLOUDSTACK-9075:
--------------------------------------------

Github user wilderrodrigues commented on the pull request:

    https://github.com/apache/cloudstack/pull/1151#issuecomment-161528070
  
    Ping @remibergsma @DaanHoogland @borisroman 
    
    Before testing, please note that the smoke/test_privategw_acl.py now 
requires hardware!
    
    * Environment:
      * ACS 4.6 branch
      * Hardware required: TRUE
      * Management Server + MySQL on CentOS 7.1
      * One KVM Host on CentOS 7.1
      * Agent + Common RPMs built from source
    
    * Tests executed
    
    ```
    nosetests --with-marvin 
--marvin-config=/data/shared/marvin/mct-zone2-kvm2-ISOLATED.cfg -s -a 
tags=advanced,required_hardware=true 
component/test_routers_iptables_default_policy.py 
component/test_routers_network_ops.py component/test_vpc_router_nics.py 
component/test_password_server.py component/test_router_dhcphosts.py 
smoke/test_loadbalance.py smoke/test_internal_lb.py smoke/test_ssvm.py 
smoke/test_vpc_vpn.py smoke/test_network.py
    ```
    
    * Results
    
    ```
    Test iptables default INPUT/FORWARD policy on RouterVM ... === TestName: 
test_02_routervm_iptables_policies | Status : SUCCESS ===
    ok
    Test iptables default INPUT/FORWARD policies on VPC router ... === 
TestName: test_01_single_VPC_iptables_policies | Status : SUCCESS ===
    ok
    Test redundant router internals ... === TestName: 
test_01_isolate_network_FW_PF_default_routes_egress_true | Status : SUCCESS ===
    ok
    Test redundant router internals ... === TestName: 
test_02_isolate_network_FW_PF_default_routes_egress_false | Status : SUCCESS ===
    ok
    Test redundant router internals ... === TestName: 
test_01_RVR_Network_FW_PF_SSH_default_routes_egress_true | Status : SUCCESS ===
    ok
    Test redundant router internals ... === TestName: 
test_02_RVR_Network_FW_PF_SSH_default_routes_egress_false | Status : SUCCESS ===
    ok
    Create a VPC with two networks with one VM in each network and test nics 
after destroy ... === TestName: test_01_VPC_nics_after_destroy | Status : 
SUCCESS ===
    ok
    Create a VPC with two networks with one VM in each network and test default 
routes ... === TestName: test_02_VPC_default_routes | Status : SUCCESS ===
    ok
    Check the password file in the Router VM ... === TestName: 
test_isolate_network_password_server | Status : SUCCESS ===
    ok
    Check that the /etc/dhcphosts.txt doesn't contain duplicate IPs ... === 
TestName: test_router_dhcphosts | Status : SUCCESS ===
    ok
    Test to create Load balancing rule with source NAT ... === TestName: 
test_01_create_lb_rule_src_nat | Status : SUCCESS ===
    ok
    Test to create Load balancing rule with non source NAT ... === TestName: 
test_02_create_lb_rule_non_nat | Status : SUCCESS ===
    ok
    Test for assign & removing load balancing rule ... === TestName: 
test_assign_and_removal_lb | Status : SUCCESS ===
    ok
    Test to verify access to loadbalancer haproxy admin stats page ... === 
TestName: test02_internallb_haproxy_stats_on_all_interfaces | Status : SUCCESS 
===
    ok
    Test create, assign, remove of an Internal LB with roundrobin http traffic 
to 3 vm's ... === TestName: test_01_internallb_roundrobin_1VPC_3VM_HTTP_port80 
| Status : SUCCESS ===
    ok
    Test SSVM Internals ... === TestName: test_03_ssvm_internals | Status : 
SUCCESS ===
    ok
    Test CPVM Internals ... === TestName: test_04_cpvm_internals | Status : 
SUCCESS ===
    ok
    Test stop SSVM ... === TestName: test_05_stop_ssvm | Status : SUCCESS ===
    ok
    Test stop CPVM ... === TestName: test_06_stop_cpvm | Status : SUCCESS ===
    ok
    Test reboot SSVM ... === TestName: test_07_reboot_ssvm | Status : SUCCESS 
===
    ok
    Test reboot CPVM ... === TestName: test_08_reboot_cpvm | Status : SUCCESS 
===
    ok
    Test destroy SSVM ... === TestName: test_09_destroy_ssvm | Status : SUCCESS 
===
    ok
    Test destroy CPVM ... === TestName: test_10_destroy_cpvm | Status : SUCCESS 
===
    ok
    Test Remote Access VPN in VPC ... === TestName: test_vpc_remote_access_vpn 
| Status : SUCCESS ===
    ok
    Test VPN in VPC ... === TestName: test_vpc_site2site_vpn | Status : SUCCESS 
===
    ok
    Test for port forwarding on source NAT ... === TestName: 
test_01_port_fwd_on_src_nat | Status : SUCCESS ===
    ok
    Test for port forwarding on non source NAT ... === TestName: 
test_02_port_fwd_on_non_src_nat | Status : SUCCESS ===
    ok
    Test for reboot router ... === TestName: test_reboot_router | Status : 
SUCCESS ===
    ok
    Test for Router rules for network rules on acquired public IP ... === 
TestName: test_network_rules_acquired_public_ip_1_static_nat_rule | Status : 
SUCCESS ===
    ok
    Test for Router rules for network rules on acquired public IP ... === 
TestName: test_network_rules_acquired_public_ip_2_nat_rule | Status : SUCCESS 
===
    ok
    Test for Router rules for network rules on acquired public IP ... === 
TestName: test_network_rules_acquired_public_ip_3_Load_Balancer_Rule | Status : 
SUCCESS ===
    ok
    
    ----------------------------------------------------------------------
    Ran 31 tests in 11901.652s
    
    OK
    (END)
    ```



> As a Developer I want the Private GW feature fixed on single VPCs
> -----------------------------------------------------------------
>
>                 Key: CLOUDSTACK-9075
>                 URL: https://issues.apache.org/jira/browse/CLOUDSTACK-9075
>             Project: CloudStack
>          Issue Type: Bug
>      Security Level: Public(Anyone can view this level - this is the 
> default.) 
>    Affects Versions: 4.6.0
>            Reporter: Wilder Rodrigues
>            Assignee: Wilder Rodrigues
>             Fix For: 4.7.0
>
>
> The Private GW feature is broken since the VR refactor. it should be fixed 
> for single VPCs and more tests should be included in order to cover it as a 
> whole.
> 1. Test Private GW ACL replace
>     - existing tests
> 2. Test Private GW connectivity through 2 VPCs
>    - New test
> The new test should perform the following steps:
> 1. Create 2 VPCs
> 2. Create 2 Tiers - 1 per VPC
> 3. Deploy 2 VMs - 1 per Tier
> 4. Acquire 2 pub IPs - 1 per VPC
> 5. Create 2 PF rules - 1 per pub IP
> 6. Create 2 ACLs + rules - 1 per VPC
> 7. Assign new ACLs to Tiers
> 8. Create 2 Private GWs - 1 per VPC
> 9. Replace the Pvt GWs ACLs
> 10. Create 2 Static routes - 1 per Pvt GW
> 11. SSH into VM1 (VPC1) and from there ping VM2 (VPC2)
> Please note that the Private GWs have to be in the same VLAN.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to