Test ID |
Test Case Name |
Steps To Be Performed to Test |
Verification Steps |
Priority |
Status |
1 |
Create VPC(name,zoneId,cidr,vpcOfferingId). |
1. Create VPC Offering by specifying all supported Services(Vpn,dhcpdns,UserData, SourceNat,Static NAT and PF,LB,NetworkAcl).
2. Create a VPC using the above VPC offering by passing name,zoneId,cidr,vpcOfferingId |
. VPC should get created with "Enabled" state.
The VR should start when VPC is created.
SourceNatIP address should be allocated to the VR |
P0 |
.Pass |
2 |
With in the same account , any 2 VPCs should have non-overlapping CIDRs. |
As account1,
1. Create VPC with cidr=10.1.1.1/16.
2. Create another VPC with cidr=10.2.1.1/16. |
1.Creation of both the VPCs should succeed. |
P0 |
Pass |
3 |
As User account , Create VPC(name,zoneId,cidr,vpcOfferingId,networkDomain) without passing Account/domain ID for himself. |
1. As User account , Create VPC(name,zoneId,cidr,vpcOfferingId,networkDomain) without passing Account/domain ID.
2. As this user account, create a network as part of this VPC.
3. Deploy Vms as part of this network. |
User should be able to deploy Vms as part of the VPC that he has created. |
P0 |
Pass |
4 |
list VPCS as admin User to view all the Vpcs owned by admin user |
1. Create a VPC - vpc1 for admin user.
2. Create a VPC - vpc2 for regular user - user1.
3. As admin User list VPC with out passing any parameter.
4. As admin User list VPC by passing accountId/DomainId of user1.
5. As admin User list VPC by passing listAll=true |
1. For step3 , list VPC should return only vpc1.
2. For step4 , list VPC should return vpc2.
3. For step5 , list VPC should return vpc1 and vpc2. |
P0 |
Pass |
5 |
Create VPC with networkDomain.Add network without networkDomain to this VPC. |
1. Create VPC by providing networkDomain.
2. Add network without networkDomain to this VPC.
3. Deploy Vm in this network. |
VM should have the Network domain name from VPC. |
P0 |
Pass |
6 |
Start the User VM using one isolated network in a VPC |
1. Create a VPC with cidr - 10.1.1.1/16
2. Add network1(10.1.1.1/24) and network2(10.1.2.1/24) to this VPC.
3. Deploy vm1 and vm2 in network1 and vm3 and vm4 in network2.
4. Create a PF
5. Create ingress network ACL for allowing all the above rules from a public ip range on network1 and network2.
6. Create egress network ACL for network1 and network2 to access google.com
Steps:
1. Stop a user VM that is running.
2. Start this user VM.. |
1. Vm should be started successfully.
2.Make sure that we are able to access google.com from this user Vm. |
P0 |
Fail(CLOUDSTACK-106) |
7 |
Reboot the User VM using one isolated network in a VPC |
1. Create a VPC with cidr - 10.1.1.1/16
2. Add network1(10.1.1.1/24) and network2(10.1.2.1/24) to this VPC.
3. Deploy vm1 and vm2 in network1 and vm3 and vm4 in network2.
4. Create a PF
5. Create ingress network ACL for allowing all the above rules from a public ip range on network1 and network2.
6. Create egress network ACL for network1 and network2 to access google.com
Steps:
Reboot user VM. |
1. Vm should be rebooted successfully.
2.Static NAT rules on this VM works as expected. |
P0 |
Fail(CLOUDSTACK-106) outbound traffic is blocked |
8 |
Acquire Public IP Address to VPC |
Pre-Req:
1. Create a VPC with cidr - 10.1.1.1/16
Steps:
1. Acquire a public IP Address to the VPC |
1. Successfully acquire public IP Address to the VPC |
P0 |
Pass |
9 |
Associate Acquired Public IP Address to a network of the VPC |
Pre-Req:
1. Create a VPC with cidr - 10.1.1.1/16
2. Acquire a public IP Address to the VPC.
3. Add network1(10.1.1.1/24) and network2(10.1.2.1/24) to this VPC.
Steps:
1.Associate the public IP Address to network1 by creating a PF/LB/Static Nat rule. |
1. As part of network rule creation ,Association of the public IP Address to the network should succeed. |
P0 |
Fail |
10 |
Disassociate Public IP Address from the VPC |
Pre-Req:
1. Create a VPC with cidr - 10.1.1.1/16
2. Acquire a public IP Address to the VPC.
Steps:
1. Disassociate the Public IP Address. |
1. Successful disassociation of the Public IP Address from the VPC. |
P0 |
Pass |
|
|
|
|
|
|
11 |
Delete an Ingress and Egress rule rule for a network |
PreReq:
1. Create a VPC with cidr - 10.1.1.1/16
2. Add network1(10.1.1.1/24) and network2(10.1.2.1/24) to this VPC.
3. Deploy vm1 and vm2 in network1 and vm3 and vm4 in network2.
Steps:
1.For network1 , Create a Ingress rule (protocol TCP, cidr -cidr1 ) for port 22
2.For network1 , Create a Egress rule (protocol TCP, cidr -cidr2 ) for port 22
3. Delete the Ingress rule created in step1.
4. Delete theEgress rule created in step2. |
Creation of Ingress and Egress rules should succeed.
In the VR, we should see these rules being removed. |
|
|