Test ID | Test Case Name | Steps To Be Performed to Test | Verification Steps | Priority | Status
|
---|
1 | Create VPC(name,zoneId,cidr,vpcOfferingId). | 1. Create VPC Offering by specifying all supported Services(Vpn,dhcpdns,UserData, SourceNat,Static NAT and PF,LB,NetworkAcl). 2. Create a VPC using the above VPC offering by passing name,zoneId,cidr,vpcOfferingId | . VPC should get created with "Enabled" state. The VR should start when VPC is created. SourceNatIP address should be allocated to the VR | P0 | .Pass |
2 | With in the same account , any 2 VPCs should have non-overlapping CIDRs. | As account1, 1. Create VPC with cidr=10.1.1.1/16. 2. Create another VPC with cidr=10.2.1.1/16. | 1.Creation of both the VPCs should succeed. | P0 | Pass
|
3 | As User account , Create VPC(name,zoneId,cidr,vpcOfferingId,networkDomain) without passing Account/domain ID for himself. | 1. As User account , Create VPC(name,zoneId,cidr,vpcOfferingId,networkDomain) without passing Account/domain ID. 2. As this user account, create a network as part of this VPC. 3. Deploy Vms as part of this network. | User should be able to deploy Vms as part of the VPC that he has created. | P0 | Pass
|
4 | list VPCS as admin User to view all the Vpcs owned by admin user | 1. Create a VPC - vpc1 for admin user. 2. Create a VPC - vpc2 for regular user - user1. 3. As admin User list VPC with out passing any parameter. 4. As admin User list VPC by passing accountId/DomainId of user1. 5. As admin User list VPC by passing listAll=true | 1. For step3 , list VPC should return only vpc1. 2. For step4 , list VPC should return vpc2. 3. For step5 , list VPC should return vpc1 and vpc2. | P0 | Pass |
5 | Create VPC with networkDomain.Add network without networkDomain to this VPC. | 1. Create VPC by providing networkDomain. 2. Add network without networkDomain to this VPC. 3. Deploy Vm in this network. | VM should have the Network domain name from VPC. | P0 | Pass
|
6 | Start the User VM using one isolated network in a VPC | 1. Create a VPC with cidr - 10.1.1.1/16 2. Add network1(10.1.1.1/24) and network2(10.1.2.1/24) to this VPC. 3. Deploy vm1 and vm2 in network1 and vm3 and vm4 in network2. 4. Create a PF 5. Create ingress network ACL for allowing all the above rules from a public ip range on network1 and network2. 6. Create egress network ACL for network1 and network2 to access google.com
Steps: 1. Stop a user VM that is running. 2. Start this user VM..
| 1. Vm should be started successfully. 2.Make sure that we are able to access google.com from this user Vm. | P0
| Fail(CLOUDSTACK-106) |
7
| Reboot the User VM using one isolated network in a VPC
| 1. Create a VPC with cidr - 10.1.1.1/16 2. Add network1(10.1.1.1/24) and network2(10.1.2.1/24) to this VPC. 3. Deploy vm1 and vm2 in network1 and vm3 and vm4 in network2. 4. Create a PF 5. Create ingress network ACL for allowing all the above rules from a public ip range on network1 and network2. 6. Create egress network ACL for network1 and network2 to access google.com
Steps: Reboot user VM.
| 1. Vm should be rebooted successfully. 2.Static NAT rules on this VM works as expected. | P0 | Fail(CLOUDSTACK-106) outbound traffic is blocked
|
8 | Acquire Public IP Address to VPC | Pre-Req: 1. Create a VPC with cidr - 10.1.1.1/16 Steps: 1. Acquire a public IP Address to the VPC | 1. Successfully acquire public IP Address to the VPC | P0 | Pass |
9 | Associate Acquired Public IP Address to a network of the VPC | Pre-Req: 1. Create a VPC with cidr - 10.1.1.1/16 2. Acquire a public IP Address to the VPC. 3. Add network1(10.1.1.1/24) and network2(10.1.2.1/24) to this VPC. Steps: 1.Associate the public IP Address to network1 by creating a PF/LB/Static Nat rule. | 1. As part of network rule creation ,Association of the public IP Address to the network should succeed. | P0
| Fail |
10 | Disassociate Public IP Address from the VPC
| Pre-Req: 1. Create a VPC with cidr - 10.1.1.1/16 2. Acquire a public IP Address to the VPC. Steps: 1. Disassociate the Public IP Address. | 1. Successful disassociation of the Public IP Address from the VPC. | P0 | Pass |
| | | | | |
11 | Delete an Ingress and Egress rule rule for a network | PreReq: 1. Create a VPC with cidr - 10.1.1.1/16 2. Add network1(10.1.1.1/24) and network2(10.1.2.1/24) to this VPC. 3. Deploy vm1 and vm2 in network1 and vm3 and vm4 in network2. Steps: 1.For network1 , Create a Ingress rule (protocol TCP, cidr -cidr1 ) for port 22 2.For network1 , Create a Egress rule (protocol TCP, cidr -cidr2 ) for port 22 3. Delete the Ingress rule created in step1. 4. Delete theEgress rule created in step2. | Creation of Ingress and Egress rules should succeed. In the VR, we should see these rules being removed. | P1 | Pass |