summaryrefslogtreecommitdiffstats
path: root/robot/assets/asdc/base_vfw
diff options
context:
space:
mode:
Diffstat (limited to 'robot/assets/asdc/base_vfw')
-rw-r--r--robot/assets/asdc/base_vfw/MANIFEST.json17
-rw-r--r--robot/assets/asdc/base_vfw/base_vfw.env4
-rw-r--r--robot/assets/asdc/base_vfw/base_vfw.yaml423
3 files changed, 444 insertions, 0 deletions
diff --git a/robot/assets/asdc/base_vfw/MANIFEST.json b/robot/assets/asdc/base_vfw/MANIFEST.json
new file mode 100644
index 00000000..a4e5cfd0
--- /dev/null
+++ b/robot/assets/asdc/base_vfw/MANIFEST.json
@@ -0,0 +1,17 @@
+{
+ "name": "virtualFireWall",
+ "description": "robot ete manifest",
+ "data": [
+ {
+ "file": "base_vfw.yaml",
+ "type": "HEAT",
+ "isBase": "true",
+ "data": [
+ {
+ "file": "base_vfw.env",
+ "type": "HEAT_ENV"
+ }
+ ]
+ }
+ ]
+} \ No newline at end of file
diff --git a/robot/assets/asdc/base_vfw/base_vfw.env b/robot/assets/asdc/base_vfw/base_vfw.env
new file mode 100644
index 00000000..f7d2c803
--- /dev/null
+++ b/robot/assets/asdc/base_vfw/base_vfw.env
@@ -0,0 +1,4 @@
+parameters:
+ vfw_image_name: Ubuntu 14.04 LTS (Trusty Tahr) (PVHVM)
+ vfw_flavor_name: 4 GB General Purpose v1
+ public_net_id: 00000000-0000-0000-0000-000000000000 \ No newline at end of file
diff --git a/robot/assets/asdc/base_vfw/base_vfw.yaml b/robot/assets/asdc/base_vfw/base_vfw.yaml
new file mode 100644
index 00000000..076a8340
--- /dev/null
+++ b/robot/assets/asdc/base_vfw/base_vfw.yaml
@@ -0,0 +1,423 @@
+heat_template_version: 2013-05-23
+
+description: Heat template to deploy vFirewall demo app for OpenECOMP
+
+parameters:
+ vfw_image_name:
+ type: string
+ label: Image name or ID
+ description: Image to be used for compute instance
+ vfw_flavor_name:
+ type: string
+ label: Flavor
+ description: Type of instance (flavor) to be used
+ public_net_id:
+ type: string
+ label: Public network name or ID
+ description: Public network that enables remote connection to VNF
+ unprotected_private_net_id:
+ type: string
+ label: Unprotected private network name or ID
+ description: Private network that connects vPacketGenerator with vFirewall
+ protected_private_net_id:
+ type: string
+ label: Protected private network name or ID
+ description: Private network that connects vFirewall with vSink
+ ecomp_private_net_id:
+ type: string
+ label: ECOMP management network name or ID
+ description: Private network that connects ECOMP component and the VNF
+ ecomp_private_subnet_id:
+ type: string
+ label: ECOMP management sub-network name or ID
+ description: Private sub-network that connects ECOMP component and the VNF
+ unprotected_private_net_cidr:
+ type: string
+ label: Unprotected private network CIDR
+ description: The CIDR of the unprotected private network
+ protected_private_net_cidr:
+ type: string
+ label: Protected private network CIDR
+ description: The CIDR of the protected private network
+ ecomp_private_net_cidr:
+ type: string
+ label: ECOMP private network CIDR
+ description: The CIDR of the protected private network
+ vfw_private_ip_0:
+ type: string
+ label: vFirewall private IP address towards the unprotected network
+ description: Private IP address that is assigned to the vFirewall to communicate with the vPacketGenerator
+ vfw_private_ip_1:
+ type: string
+ label: vFirewall private IP address towards the protected network
+ description: Private IP address that is assigned to the vFirewall to communicate with the vSink
+ vfw_private_ip_2:
+ type: string
+ label: vFirewall private IP address towards the ECOMP management network
+ description: Private IP address that is assigned to the vFirewall to communicate with ECOMP components
+ vpg_private_ip_0:
+ type: string
+ label: vPacketGenerator private IP address towards the unprotected network
+ description: Private IP address that is assigned to the vPacketGenerator to communicate with the vFirewall
+ vpg_private_ip_1:
+ type: string
+ label: vPacketGenerator private IP address towards the ECOMP management network
+ description: Private IP address that is assigned to the vPacketGenerator to communicate with ECOMP components
+ vsn_private_ip_0:
+ type: string
+ label: vSink private IP address towards the protected network
+ description: Private IP address that is assigned to the vSink to communicate with the vFirewall
+ vsn_private_ip_1:
+ type: string
+ label: vSink private IP address towards the ECOMP management network
+ description: Private IP address that is assigned to the vSink to communicate with ECOMP components
+ vfw_name_0:
+ type: string
+ label: vFirewall name
+ description: Name of the vFirewall
+ vpg_name_0:
+ type: string
+ label: vPacketGenerator name
+ description: Name of the vPacketGenerator
+ vsn_name_0:
+ type: string
+ label: vSink name
+ description: Name of the vSink
+ vnf_id:
+ type: string
+ label: VNF ID
+ description: The VNF ID is provided by ECOMP
+ vf_module_id:
+ type: string
+ label: vFirewall module ID
+ description: The vFirewall Module ID is provided by ECOMP
+ webserver_ip:
+ type: string
+ label: Webserver IP address
+ description: IP address of the webserver that hosts the source code and binaries
+ dcae_collector_ip:
+ type: string
+ label: DCAE collector IP address
+ description: IP address of the DCAE collector
+ dcae_collector_port:
+ type: string
+ label: DCAE collector port
+ description: Port of the DCAE collector
+ key_name:
+ type: string
+ label: Key pair name
+ description: Public/Private key pair name
+ pub_key:
+ type: string
+ label: Public key
+ description: Public key to be installed on the compute instance
+ repo_user:
+ type: string
+ label: Repository username
+ description: Username to access the repository that hosts the demo packages
+ repo_passwd:
+ type: string
+ label: Repository password
+ description: Password to access the repository that hosts the demo packages
+ repo_url:
+ type: string
+ label: Repository URL
+ description: URL of the repository that hosts the demo packages
+
+resources:
+ my_keypair:
+ type: OS::Nova::KeyPair
+ properties:
+ name: { get_param: key_name }
+ public_key: { get_param: pub_key }
+ save_private_key: false
+
+ unprotected_private_network:
+ type: OS::Neutron::Net
+ properties:
+ name: { get_param: unprotected_private_net_id }
+
+ protected_private_network:
+ type: OS::Neutron::Net
+ properties:
+ name: { get_param: protected_private_net_id }
+
+ unprotected_private_subnet:
+ type: OS::Neutron::Subnet
+ properties:
+ network_id: { get_resource: unprotected_private_network }
+ cidr: { get_param: unprotected_private_net_cidr }
+
+ protected_private_subnet:
+ type: OS::Neutron::Subnet
+ properties:
+ network_id: { get_resource: protected_private_network }
+ cidr: { get_param: protected_private_net_cidr }
+
+ vfw_0:
+ type: OS::Nova::Server
+ properties:
+ image: { get_param: vfw_image_name }
+ flavor: { get_param: vfw_flavor_name }
+ name: { get_param: vfw_name_0 }
+ key_name: { get_resource: my_keypair }
+ networks:
+ - network: { get_param: public_net_id }
+ - port: { get_resource: vfw_private_0_port }
+ - port: { get_resource: vfw_private_1_port }
+ - port: { get_resource: vfw_private_2_port }
+ metadata: {vnf_id: { get_param: vnf_id }, vf_module_id: { get_param: vf_module_id }}
+ user_data_format: RAW
+ user_data:
+ str_replace:
+ params:
+ __webserver__: { get_param: webserver_ip }
+ __dcae_collector_ip__ : { get_param: dcae_collector_ip }
+ __dcae_collector_port__ : { get_param: dcae_collector_port }
+ __repo_url__ : { get_param: repo_url }
+ __repo_user__ : { get_param: repo_user }
+ __repo_passwd__ : { get_param: repo_passwd }
+ template: |
+ #!/bin/bash
+
+ WEBSERVER_IP=__webserver__
+ DCAE_COLLECTOR_IP=__dcae_collector_ip__
+ DCAE_COLLECTOR_PORT=__dcae_collector_port__
+ REPO_URL=__repo_url__
+ REPO_USER=__repo_user__
+ REPO_PASSWD=__repo_passwd__
+
+ # Download required dependencies
+ add-apt-repository -y ppa:openjdk-r/ppa
+ apt-get update
+ apt-get install -y make wget openjdk-8-jdk gcc libcurl4-openssl-dev python-pip bridge-utils apt-transport-https ca-certificates
+ pip install jsonschema
+
+ # Install Nexus certificate
+ echo "$WEBSERVER_IP ecomp-nexus" >> /etc/hosts
+ keytool -printcert -sslserver $WEBSERVER_IP:8443 -rfc > nexus.crt
+ cp nexus.crt /usr/local/share/ca-certificates/
+ update-ca-certificates
+
+ # Download vFirewall code for virtual firewall
+ mkdir /opt/config
+ cd /opt
+ wget --user=$REPO_USER --password=$REPO_PASSWD $REPO_URL/v_firewall_init.sh
+ wget --user=$REPO_USER --password=$REPO_PASSWD $REPO_URL/vfirewall.sh
+ wget --user=$REPO_USER --password=$REPO_PASSWD $REPO_URL/VESvFW.tar.gz
+ wget --user=$REPO_USER --password=$REPO_PASSWD $REPO_URL/vpp.tar.gz
+ wget --user=$REPO_USER --password=$REPO_PASSWD $REPO_URL/honeycomb.tar.gz
+ tar -zxvf VESvFW.tar.gz
+ tar -zxvf vpp.tar.gz
+ tar -zxvf honeycomb.tar.gz
+ rm *.tar.gz
+ chmod +x v_firewall_init.sh
+ chmod +x vfirewall.sh
+ echo $DCAE_COLLECTOR_IP > config/dcae_collector_ip.txt
+ echo $DCAE_COLLECTOR_PORT > config/dcae_collector_port.txt
+
+ # Install VPP
+ cd /opt/vpp/build-root/
+ dpkg -i vpp-lib_16.09-3~gc021053_amd64.deb
+ dpkg -i vpp_16.09-3~gc021053_amd64.deb
+ dpkg -i vpp-dbg_16.09-3~gc021053_amd64.deb
+ dpkg -i vpp-dev_16.09-3~gc021053_amd64.deb
+ dpkg -i vpp-dpdk-dev_16.09-3~gc021053_amd64.deb
+ dpkg -i vpp-plugins_16.09-3~gc021053_amd64.deb
+ sleep 1
+
+ # Install VES
+ cd /opt/VES1.1/bldjobs/
+ make clean
+ make
+ sleep 1
+
+ # Run instantiation script
+ cd /opt
+ mv vfirewall.sh /etc/init.d
+ update-rc.d vfirewall.sh defaults
+ ./v_firewall_init.sh
+
+ vfw_private_0_port:
+ type: OS::Neutron::Port
+ properties:
+ network: { get_resource: unprotected_private_network }
+ fixed_ips: [{"subnet": { get_resource: unprotected_private_subnet }, "ip_address": { get_param: vfw_private_ip_0 }}]
+
+ vfw_private_1_port:
+ type: OS::Neutron::Port
+ properties:
+ network: { get_resource: protected_private_network }
+ fixed_ips: [{"subnet": { get_resource: protected_private_subnet }, "ip_address": { get_param: vfw_private_ip_1 }}]
+
+ vfw_private_2_port:
+ type: OS::Neutron::Port
+ properties:
+ network: { get_param: ecomp_private_net_id }
+ fixed_ips: [{"subnet": { get_param: ecomp_private_subnet_id }, "ip_address": { get_param: vfw_private_ip_2 }}]
+
+ vpg_0:
+ type: OS::Nova::Server
+ properties:
+ image: { get_param: vfw_image_name }
+ flavor: { get_param: vfw_flavor_name }
+ name: { get_param: vpg_name_0 }
+ key_name: { get_resource: my_keypair }
+ networks:
+ - network: { get_param: public_net_id }
+ - port: { get_resource: vpg_private_0_port }
+ - port: { get_resource: vpg_private_1_port }
+ metadata: {vnf_id: { get_param: vnf_id }, vf_module_id: { get_param: vf_module_id }}
+ user_data_format: RAW
+ user_data:
+ str_replace:
+ params:
+ __webserver__: { get_param: webserver_ip }
+ __fw_ipaddr__: { get_param: vfw_private_ip_0 }
+ __protected_net_cidr__: { get_param: protected_private_net_cidr }
+ __sink_ipaddr__: { get_param: vsn_private_ip_0 }
+ __repo_url__ : { get_param: repo_url }
+ __repo_user__ : { get_param: repo_user }
+ __repo_passwd__ : { get_param: repo_passwd }
+ template: |
+ #!/bin/bash
+
+ WEBSERVER_IP=__webserver__
+ FW_IPADDR=__fw_ipaddr__
+ PROTECTED_NET_CIDR=__protected_net_cidr__
+ SINK_IPADDR=__sink_ipaddr__
+ REPO_URL=__repo_url__
+ REPO_USER=__repo_user__
+ REPO_PASSWD=__repo_passwd__
+
+ # Download required dependencies
+ add-apt-repository -y ppa:openjdk-r/ppa
+ apt-get update
+ apt-get install -y make wget openjdk-8-jdk gcc libcurl4-openssl-dev python-pip bridge-utils apt-transport-https ca-certificates
+ pip install jsonschema
+
+ # Install Nexus certificate
+ echo "$WEBSERVER_IP ecomp-nexus" >> /etc/hosts
+ keytool -printcert -sslserver $WEBSERVER_IP:8443 -rfc > nexus.crt
+ cp nexus.crt /usr/local/share/ca-certificates/
+ update-ca-certificates
+
+ # Download vFirewall demo code for packet generator
+ mkdir /opt/config
+ cd /opt
+ wget --user=$REPO_USER --password=$REPO_PASSWD $REPO_URL/v_packetgen_init.sh
+ wget --user=$REPO_USER --password=$REPO_PASSWD $REPO_URL/vpacketgen.sh
+ wget --user=$REPO_USER --password=$REPO_PASSWD $REPO_URL/vpp.tar.gz
+ wget --user=$REPO_USER --password=$REPO_PASSWD $REPO_URL/honeycomb.tar.gz
+ wget --user=$REPO_USER --password=$REPO_PASSWD $REPO_URL/pg_streams.tar.gz
+ wget --user=$REPO_USER --password=$REPO_PASSWD $REPO_URL/run_traffic_fw_demo.sh
+ tar -zxvf vpp.tar.gz
+ tar -zxvf honeycomb.tar.gz
+ tar -zxvf pg_streams.tar.gz
+ rm *.tar.gz
+ chmod +x v_packetgen_init.sh
+ chmod +x vpacketgen.sh
+ echo $FW_IPADDR > config/fw_ipaddr.txt
+ echo $PROTECTED_NET_CIDR > config/protected_net_cidr.txt
+ echo $SINK_IPADDR > config/sink_ipaddr.txt
+
+ # Install VPP
+ cd /opt/vpp/build-root/
+ dpkg -i vpp-lib_16.09-3~gc021053_amd64.deb
+ dpkg -i vpp_16.09-3~gc021053_amd64.deb
+ dpkg -i vpp-dbg_16.09-3~gc021053_amd64.deb
+ dpkg -i vpp-dev_16.09-3~gc021053_amd64.deb
+ dpkg -i vpp-dpdk-dev_16.09-3~gc021053_amd64.deb
+ dpkg -i vpp-plugins_16.09-3~gc021053_amd64.deb
+ sleep 1
+
+ # Run instantiation script
+ cd /opt
+ mv vpacketgen.sh /etc/init.d
+ update-rc.d vpacketgen.sh defaults
+ ./v_packetgen_init.sh
+
+ vpg_private_0_port:
+ type: OS::Neutron::Port
+ properties:
+ network: { get_resource: unprotected_private_network }
+ fixed_ips: [{"subnet": { get_resource: unprotected_private_subnet }, "ip_address": { get_param: vpg_private_ip_0 }}]
+
+ vpg_private_1_port:
+ type: OS::Neutron::Port
+ properties:
+ network: { get_param: ecomp_private_net_id }
+ fixed_ips: [{"subnet": { get_param: ecomp_private_subnet_id }, "ip_address": { get_param: vpg_private_ip_1 }}]
+
+ vsn_0:
+ type: OS::Nova::Server
+ properties:
+ image: { get_param: vfw_image_name }
+ flavor: { get_param: vfw_flavor_name }
+ name: { get_param: vsn_name_0 }
+ key_name: { get_resource: my_keypair }
+ networks:
+ - network: { get_param: public_net_id }
+ - port: { get_resource: vsn_private_0_port }
+ - port: { get_resource: vsn_private_1_port }
+ metadata: {vnf_id: { get_param: vnf_id }, vf_module_id: { get_param: vf_module_id }}
+ user_data_format: RAW
+ user_data:
+ str_replace:
+ params:
+ __webserver__: { get_param: webserver_ip }
+ __protected_net_gw__: { get_param: vfw_private_ip_1 }
+ __unprotected_net__: { get_param: unprotected_private_net_cidr }
+ __repo_url__ : { get_param: repo_url }
+ __repo_user__ : { get_param: repo_user }
+ __repo_passwd__ : { get_param: repo_passwd }
+ template: |
+ #!/bin/bash
+
+ WEBSERVER_IP=__webserver__
+ PROTECTED_NET_GW=__protected_net_gw__
+ UNPROTECTED_NET=__unprotected_net__
+ UNPROTECTED_NET=$(echo $UNPROTECTED_NET | cut -d'/' -f1)
+ REPO_URL=__repo_url__
+ REPO_USER=__repo_user__
+ REPO_PASSWD=__repo_passwd__
+
+ # Download required dependencies
+ add-apt-repository -y ppa:openjdk-r/ppa
+ apt-get update
+ apt-get install -y make wget openjdk-8-jdk apt-transport-https ca-certificates darkstat
+
+ # Configure and run darkstat
+ sed -i "s/START_DARKSTAT=.*/START_DARKSTAT=yes/g" /etc/darkstat/init.cfg
+ sed -i "s/INTERFACE=.*/INTERFACE=\"-i eth1\"/g" /etc/darkstat/init.cfg
+ /etc/init.d/darkstat start
+
+ # Install Nexus certificate
+ echo "$WEBSERVER_IP ecomp-nexus" >> /etc/hosts
+ keytool -printcert -sslserver $WEBSERVER_IP:8443 -rfc > nexus.crt
+ cp nexus.crt /usr/local/share/ca-certificates/
+ update-ca-certificates
+
+ mkdir /opt/config
+ cd /opt
+ wget --user=$REPO_USER --password=$REPO_PASSWD $REPO_URL/v_sink_init.sh
+ wget --user=$REPO_USER --password=$REPO_PASSWD $REPO_URL/vsink.sh
+ chmod +x v_sink_init.sh
+ chmod +x vsink.sh
+ echo $PROTECTED_NET_GW > config/protected_net_gw.txt
+ echo $UNPROTECTED_NET > config/unprotected_net.txt
+ mv vsink.sh /etc/init.d
+ update-rc.d vsink.sh defaults
+ ./v_sink_init.sh
+
+ vsn_private_0_port:
+ type: OS::Neutron::Port
+ properties:
+ network: { get_resource: protected_private_network }
+ fixed_ips: [{"subnet": { get_resource: protected_private_subnet }, "ip_address": { get_param: vsn_private_ip_0 }}]
+
+ vsn_private_1_port:
+ type: OS::Neutron::Port
+ properties:
+ network: { get_param: ecomp_private_net_id }
+ fixed_ips: [{"subnet": { get_param: ecomp_private_subnet_id }, "ip_address": { get_param: vsn_private_ip_1 }}]