aboutsummaryrefslogtreecommitdiffstats
path: root/openecomp-be/lib/openecomp-sdc-translator-lib/openecomp-sdc-translator-core/src/test/resources/mock/heat/resources/OS_Contrail_Network_Rule
diff options
context:
space:
mode:
Diffstat (limited to 'openecomp-be/lib/openecomp-sdc-translator-lib/openecomp-sdc-translator-core/src/test/resources/mock/heat/resources/OS_Contrail_Network_Rule')
-rw-r--r--openecomp-be/lib/openecomp-sdc-translator-lib/openecomp-sdc-translator-core/src/test/resources/mock/heat/resources/OS_Contrail_Network_Rule/expectedoutputfiles/MainServiceTemplate.yaml197
-rw-r--r--openecomp-be/lib/openecomp-sdc-translator-lib/openecomp-sdc-translator-core/src/test/resources/mock/heat/resources/OS_Contrail_Network_Rule/inputs/MANIFEST.json12
-rw-r--r--openecomp-be/lib/openecomp-sdc-translator-lib/openecomp-sdc-translator-core/src/test/resources/mock/heat/resources/OS_Contrail_Network_Rule/inputs/network_policy_chain.yaml117
3 files changed, 326 insertions, 0 deletions
diff --git a/openecomp-be/lib/openecomp-sdc-translator-lib/openecomp-sdc-translator-core/src/test/resources/mock/heat/resources/OS_Contrail_Network_Rule/expectedoutputfiles/MainServiceTemplate.yaml b/openecomp-be/lib/openecomp-sdc-translator-lib/openecomp-sdc-translator-core/src/test/resources/mock/heat/resources/OS_Contrail_Network_Rule/expectedoutputfiles/MainServiceTemplate.yaml
new file mode 100644
index 0000000000..0d9ec35ce7
--- /dev/null
+++ b/openecomp-be/lib/openecomp-sdc-translator-lib/openecomp-sdc-translator-core/src/test/resources/mock/heat/resources/OS_Contrail_Network_Rule/expectedoutputfiles/MainServiceTemplate.yaml
@@ -0,0 +1,197 @@
+tosca_definitions_version: tosca_simple_yaml_1_0_0
+metadata:
+ template_name: Main
+imports:
+ ContrailComputeGlobalTypes:
+ file: ContrailComputeGlobalTypesServiceTemplate.yaml
+ CinderVolumeGlobalTypes:
+ file: CinderVolumeGlobalTypesServiceTemplate.yaml
+ ContrailVirtualNetworkGlobalType:
+ file: ContrailVirtualNetworkGlobalTypeServiceTemplate.yaml
+ AbstractSubstituteGlobalTypes:
+ file: AbstractSubstituteGlobalTypesServiceTemplate.yaml
+ ContrailPortGlobalTypes:
+ file: ContrailPortGlobalTypesServiceTemplate.yaml
+ NeutronPortGlobalTypes:
+ file: NeutronPortGlobalTypesServiceTemplate.yaml
+ NeutronNetGlobalTypes:
+ file: NeutronNetGlobalTypesServiceTemplate.yaml
+ CommonGlobalTypes:
+ file: CommonGlobalTypesServiceTemplate.yaml
+ ContrailAbstractSubstituteGlobalTypes:
+ file: ContrailAbstractSubstituteGlobalTypesServiceTemplate.yaml
+ ContrailNetworkRuleGlobalType:
+ file: ContrailNetworkRuleGlobalTypeServiceTemplate.yaml
+ NeutronSecurityRulesGlobalTypes:
+ file: NeutronSecurityRulesGlobalTypesServiceTemplate.yaml
+ NovaServerGlobalTypes:
+ file: NovaServerGlobalTypesServiceTemplate.yaml
+ ContrailV2VirtualMachineInterfaceGlobalType:
+ file: ContrailV2VirtualMachineInterfaceGlobalTypeServiceTemplate.yaml
+topology_template:
+ inputs:
+ start_src_ports:
+ hidden: false
+ immutable: false
+ type: float
+ description: Start of src port
+ private_net_1_gateway:
+ hidden: false
+ immutable: false
+ type: string
+ description: Private network gateway address
+ private_net_2_name:
+ hidden: false
+ immutable: false
+ type: string
+ description: Name of private network to be created
+ private_net_2_gateway:
+ hidden: false
+ immutable: false
+ type: string
+ description: Private network gateway address
+ policy_name:
+ hidden: false
+ immutable: false
+ type: string
+ description: Virtual network id
+ private_net_1_name:
+ hidden: false
+ immutable: false
+ type: string
+ description: Name of private network to be created
+ private_net_2_pool_start:
+ hidden: false
+ immutable: false
+ type: string
+ description: Start of private network IP address allocation pool
+ private_net_2_cidr:
+ hidden: false
+ immutable: false
+ type: string
+ description: Private network address (CIDR notation)
+ private_net_1_pool_end:
+ hidden: false
+ immutable: false
+ type: string
+ description: End of private network IP address allocation pool
+ end_src_ports:
+ hidden: false
+ immutable: false
+ type: float
+ description: End of src port
+ apply_service:
+ hidden: false
+ immutable: false
+ type: string
+ description: service to apply
+ start_dst_ports:
+ hidden: false
+ immutable: false
+ type: float
+ description: Start of dst port
+ end_dst_ports:
+ hidden: false
+ immutable: false
+ type: float
+ description: End of dst port
+ private_net_1_cidr:
+ hidden: false
+ immutable: false
+ type: string
+ description: Private network address (CIDR notation)
+ private_net_1_pool_start:
+ hidden: false
+ immutable: false
+ type: string
+ description: Start of private network IP address allocation pool
+ private_net_2_pool_end:
+ hidden: false
+ immutable: false
+ type: string
+ description: End of private network IP address allocation pool
+ direction:
+ hidden: false
+ immutable: false
+ type: string
+ description: Direction of Policy
+ node_templates:
+ private_net_1:
+ type: org.openecomp.resource.vl.nodes.heat.network.neutron.Net
+ properties:
+ network_name:
+ get_input: private_net_1_name
+ subnets:
+ private_subnet_1:
+ cidr:
+ get_input: private_net_1_cidr
+ gateway_ip:
+ get_input: private_net_1_gateway
+ allocation_pools:
+ - start:
+ get_input: private_net_1_pool_start
+ end:
+ get_input: private_net_1_pool_end
+ private_policy:
+ type: org.openecomp.resource.vfc.rules.nodes.heat.network.contrail.NetworkRules
+ properties:
+ entries:
+ policy_rule:
+ - src_ports:
+ - start_port:
+ get_input: start_src_ports
+ end_port:
+ get_input: end_src_ports
+ protocol: any
+ action_list:
+ apply_service:
+ - get_input: apply_service
+ dst_addresses:
+ - virtual_network: private_net_1
+ dst_ports:
+ - start_port:
+ get_input: start_dst_ports
+ end_port:
+ get_input: end_dst_ports
+ src_addresses:
+ - virtual_network: private_net_2
+ direction:
+ get_input: direction
+ name:
+ get_input: policy_name
+ requirements:
+ - network:
+ capability: tosca.capabilities.Attachment
+ node: private_net_1
+ relationship: org.openecomp.relationships.AttachesTo
+ - network:
+ capability: tosca.capabilities.Attachment
+ node: private_net_2
+ relationship: org.openecomp.relationships.AttachesTo
+ private_net_2:
+ type: org.openecomp.resource.vl.nodes.heat.network.neutron.Net
+ properties:
+ network_name:
+ get_input: private_net_2_name
+ subnets:
+ private_subnet_2:
+ cidr:
+ get_input: private_net_2_cidr
+ gateway_ip:
+ get_input: private_net_2_gateway
+ allocation_pools:
+ - start:
+ get_input: private_net_2_pool_start
+ end:
+ get_input: private_net_2_pool_end
+ groups:
+ network_policy_chain:
+ type: org.openecomp.groups.heat.HeatStack
+ properties:
+ heat_file: ../Artifacts/network_policy_chain.yaml
+ description: |
+ HOT template to creates two virtual network with one subnet each. Creates a network policy for applying service between two VNs created before. Attach the network policy to two virtual networks
+ members:
+ - private_net_1
+ - private_policy
+ - private_net_2 \ No newline at end of file
diff --git a/openecomp-be/lib/openecomp-sdc-translator-lib/openecomp-sdc-translator-core/src/test/resources/mock/heat/resources/OS_Contrail_Network_Rule/inputs/MANIFEST.json b/openecomp-be/lib/openecomp-sdc-translator-lib/openecomp-sdc-translator-core/src/test/resources/mock/heat/resources/OS_Contrail_Network_Rule/inputs/MANIFEST.json
new file mode 100644
index 0000000000..81b11d1a77
--- /dev/null
+++ b/openecomp-be/lib/openecomp-sdc-translator-lib/openecomp-sdc-translator-core/src/test/resources/mock/heat/resources/OS_Contrail_Network_Rule/inputs/MANIFEST.json
@@ -0,0 +1,12 @@
+{
+ "name": "network_policy_chain",
+ "description": "network_policy_chain",
+ "version": "2013-05-23",
+ "data": [
+ {
+ "file": "network_policy_chain.yaml",
+ "type": "HEAT",
+ "data": []
+ }
+ ]
+} \ No newline at end of file
diff --git a/openecomp-be/lib/openecomp-sdc-translator-lib/openecomp-sdc-translator-core/src/test/resources/mock/heat/resources/OS_Contrail_Network_Rule/inputs/network_policy_chain.yaml b/openecomp-be/lib/openecomp-sdc-translator-lib/openecomp-sdc-translator-core/src/test/resources/mock/heat/resources/OS_Contrail_Network_Rule/inputs/network_policy_chain.yaml
new file mode 100644
index 0000000000..8963b1ff75
--- /dev/null
+++ b/openecomp-be/lib/openecomp-sdc-translator-lib/openecomp-sdc-translator-core/src/test/resources/mock/heat/resources/OS_Contrail_Network_Rule/inputs/network_policy_chain.yaml
@@ -0,0 +1,117 @@
+heat_template_version: 2013-05-23
+
+description: >
+ HOT template to creates two virtual network with one subnet each.
+ Creates a network policy for applying service between two VNs created before.
+ Attach the network policy to two virtual networks
+parameters:
+ policy_name:
+ type: string
+ description: Virtual network id
+ direction:
+ type: string
+ description: Direction of Policy
+ start_src_ports:
+ type: number
+ description: Start of src port
+ end_src_ports:
+ type: number
+ description: End of src port
+ start_dst_ports:
+ type: number
+ description: Start of dst port
+ end_dst_ports:
+ type: number
+ description: End of dst port
+ apply_service:
+ type: string
+ description: service to apply
+ private_net_1_name:
+ type: string
+ description: Name of private network to be created
+ private_net_1_cidr:
+ type: string
+ description: Private network address (CIDR notation)
+ private_net_1_gateway:
+ type: string
+ description: Private network gateway address
+ private_net_1_pool_start:
+ type: string
+ description: Start of private network IP address allocation pool
+ private_net_1_pool_end:
+ type: string
+ description: End of private network IP address allocation pool
+ private_net_2_name:
+ type: string
+ description: Name of private network to be created
+ private_net_2_cidr:
+ type: string
+ description: Private network address (CIDR notation)
+ private_net_2_gateway:
+ type: string
+ description: Private network gateway address
+ private_net_2_pool_start:
+ type: string
+ description: Start of private network IP address allocation pool
+ private_net_2_pool_end:
+ type: string
+ description: End of private network IP address allocation pool
+
+resources:
+ private_net_1:
+ type: OS::Neutron::Net
+ properties:
+ name: { get_param: private_net_1_name }
+
+ private_net_2:
+ type: OS::Neutron::Net
+ properties:
+ name: { get_param: private_net_2_name }
+
+ private_subnet_1:
+ type: OS::Neutron::Subnet
+ properties:
+ network_id: { get_resource: private_net_1 }
+ cidr: { get_param: private_net_1_cidr }
+ gateway_ip: { get_param: private_net_1_gateway }
+ allocation_pools:
+ - start: { get_param: private_net_1_pool_start }
+ end: { get_param: private_net_1_pool_end }
+
+ private_subnet_2:
+ type: OS::Neutron::Subnet
+ properties:
+ network_id: { get_resource: private_net_2 }
+ cidr: { get_param: private_net_2_cidr }
+ gateway_ip: { get_param: private_net_2_gateway }
+ allocation_pools:
+ - start: { get_param: private_net_2_pool_start }
+ end: { get_param: private_net_2_pool_end }
+
+ private_policy:
+ type: OS::Contrail::NetworkPolicy
+ properties:
+ name: { get_param: policy_name }
+ entries:
+ policy_rule: [
+ {
+ "direction": { get_param: direction },
+ "protocol": "any",
+ "src_ports": [{"start_port": {get_param: start_src_ports}, "end_port": {get_param: end_src_ports}}],
+ "dst_ports": [{"start_port": {get_param: start_dst_ports}, "end_port": {get_param: end_dst_ports}}],
+ "dst_addresses": [{ "virtual_network": {get_resource: private_net_1}}],
+ "action_list": {"apply_service": [{get_param: apply_service}]},
+ "src_addresses": [{ "virtual_network": {get_resource: private_net_2}}]
+ },
+ ]
+ private_policy_attach_net1:
+ type: OS::Contrail::AttachPolicy
+ properties:
+ network: { get_resource: private_net_1 }
+ policy: { get_attr: [private_policy, fq_name] }
+
+ private_policy_attach_net2:
+ type: OS::Contrail::AttachPolicy
+ properties:
+ network: { get_resource: private_net_2 }
+ policy: { get_attr: [private_policy, fq_name] } \ No newline at end of file