diff options
author | Akhila Kishore <akhila.kishore@intel.com> | 2019-03-06 06:34:09 -0800 |
---|---|---|
committer | Akhila Kishore <akhila.kishore@intel.com> | 2019-03-22 07:28:00 -0700 |
commit | 1fd5b3964a142be6c176dcc886d79a614c04ce70 (patch) | |
tree | 90e4c44d0c18ea51e1787627960556c6a1dcbe79 /vagrant/tests/vFW/Vagrantfile | |
parent | 7830bf49fbdcf1b726dc8dc3aca3638fb2195e66 (diff) |
Restructuring the repo.
The idea is to restructure the existing repo create a deployment
independent of Vagrant or other hosting providers.
Renamed KRD to KUbernetes Deploy(Kud) including the ansible scripts
Added new path to functional tests.
Moved samples pdfs to sites.
Minor changes to Readme.
Updated aio.sh, moved sample config
Corrected other nits. Updated and verified test cases.
Addressed comments and changes associated with it.
Updated Readme and minor change in Vagrantfile.
Validated test cases again. Moved aio.sh into vagrant folder.
Added new README for each hosting provider and project on the whole.
Updated the installer script with relative path.
Updated the name to deployment_infra, moved the cFW sripcts to tests.
Updated the gitignore file.
Issue-ID: MULTICLOUD-301
Change-Id: Ie48c26b12ab58b604493fba58a9c5b9f8ba10942
Signed-off-by: Akhila Kishore <akhila.kishore@intel.com>
Diffstat (limited to 'vagrant/tests/vFW/Vagrantfile')
-rw-r--r-- | vagrant/tests/vFW/Vagrantfile | 66 |
1 files changed, 0 insertions, 66 deletions
diff --git a/vagrant/tests/vFW/Vagrantfile b/vagrant/tests/vFW/Vagrantfile deleted file mode 100644 index cabe6504..00000000 --- a/vagrant/tests/vFW/Vagrantfile +++ /dev/null @@ -1,66 +0,0 @@ -# -*- mode: ruby -*- -# vi: set ft=ruby : - -vars = { - "demo_artifacts_version" => "1.3.0", - 'vfw_private_ip_0' => '192.168.10.100', - 'vfw_private_ip_1' => '192.168.20.100', - 'vfw_private_ip_2' => '10.10.100.2', - 'vpg_private_ip_0' => '192.168.10.200', - 'vpg_private_ip_1' => '10.0.100.3', - 'vsn_private_ip_0' => '192.168.20.250', - 'vsn_private_ip_1' => '10.10.100.4', - 'dcae_collector_ip' => '10.0.4.1', - 'dcae_collector_port' => '8081', - 'protected_net_gw' => '192.168.20.100', - 'protected_net_cidr' => '192.168.20.0/24', - 'protected_private_net_cidr' => '192.168.10.0/24', - 'onap_private_net_cidr' => '10.10.0.0/16' -} - -if ENV['no_proxy'] != nil or ENV['NO_PROXY'] - $no_proxy = ENV['NO_PROXY'] || ENV['no_proxy'] || "127.0.0.1,localhost" - $subnet = "192.168.121" - # NOTE: This range is based on vagrant-libivirt network definition - (1..27).each do |i| - $no_proxy += ",#{$subnet}.#{i}" - end -end - -Vagrant.configure("2") do |config| - config.vm.box = "elastic/ubuntu-16.04-x86_64" - - if ENV['http_proxy'] != nil and ENV['https_proxy'] != nil - if not Vagrant.has_plugin?('vagrant-proxyconf') - system 'vagrant plugin install vagrant-proxyconf' - raise 'vagrant-proxyconf was installed but it requires to execute again' - end - config.proxy.http = ENV['http_proxy'] || ENV['HTTP_PROXY'] || "" - config.proxy.https = ENV['https_proxy'] || ENV['HTTPS_PROXY'] || "" - config.proxy.no_proxy = $no_proxy - end - - config.vm.provider 'libvirt' do |v| - v.cpu_mode = 'host-passthrough' # DPDK requires Supplemental Streaming SIMD Extensions 3 (SSSE3) - end - - config.vm.define :packetgen do |packetgen| - packetgen.vm.hostname = "packetgen" - packetgen.vm.provision 'shell', path: 'packetgen', env: vars - packetgen.vm.network :private_network, :ip => vars['vpg_private_ip_0'], :type => :static, :netmask => "255.255.255.0" # unprotected_private_net_cidr - packetgen.vm.network :private_network, :ip => vars['vpg_private_ip_1'], :type => :static, :netmask => "255.255.0.0" # onap_private_net_cidr - end - config.vm.define :firewall do |firewall| - firewall.vm.hostname = "firewall" - firewall.vm.provision 'shell', path: 'firewall', env: vars - firewall.vm.network :private_network, :ip => vars['vfw_private_ip_0'], :type => :static, :netmask => "255.255.255.0" # unprotected_private_net_cidr - firewall.vm.network :private_network, :ip => vars['vfw_private_ip_1'], :type => :static, :netmask => "255.255.255.0" # protected_private_net_cidr - firewall.vm.network :private_network, :ip => vars['vfw_private_ip_2'], :type => :static, :netmask => "255.255.0.0" # onap_private_net_cidr - end - config.vm.define :sink do |sink| - sink.vm.hostname = "sink" - sink.vm.provision 'shell', path: 'sink', env: vars - sink.vm.network :private_network, :ip => vars['vsn_private_ip_0'], :type => :static, :netmask => "255.255.255.0" # protected_private_net_cidr - sink.vm.network :private_network, :ip => vars['vsn_private_ip_1'], :type => :static, :netmask => "255.255.0.0" # onap_private_net_cidr - end -end |