Verify vic-machine create public, management, bridge network and container networks functions
- vic-machine-linux create -h
This test requires that a vSphere server is running and available
- Create without public network provided
- Verify "VM Network" is connected in VCH VM
- Integration test passed
- Create with wrong network name provided for public network
- Verify create failed for network is not found
- Create with distribute virtual switch as public network name
- Verify create failed for network type is wrong
- Create with network name no DHCP availabile for public network
- Verify VCH created but without ip address
- Verify VCH can be deleted without anything wrong through vic-machine delete
- Create with DPG as public network in VC and correct switch in ESXi
- Verify create passed
- Verify integration test passed
- Create without management network provided, but public network correctly set
- Verify warning message set for management network and client network sharing the same network
- No multiple attachement in VM network to same vSphere virtual switch (or DPG)
- Integration test passed
- Create with wrong network name provided for management network
- Verify create failed for network is not found
- Create with distribute virtual switch as management network name
- Verify create failed for network type is wrong
- Create with network unreachable for vSphere or VC as management network
- Verify VCH created but VC or vSphere is unreachable
- Make sure vic-machine failed with user-friendly error message
- Create with correct management network (switch for ESX, DPG for vCenter)
- Verify create passed
- Verify integration test passed
- Create without bridge network provided in VC
- Create failed for bridge network should be specified in VC
- Create without bridge network provided in ESXi
- Integration test pass
- Create with wrong network name provided for bridge network
- Verify create failed for network is not found, create will succeed on ESXi
- Create with distribute virtual switch as bridge network name
- Verify create failed for network type is wrong
- Create with standard network in VC as bridge network
- vic-machine failed for DPG is required for bridge network
- Create with DPG in VC and switch in ESXi
- Verify create passed
- Verify integration test passed
- Create with same network for bridge and public network
- Verify create failed for same network with public network
- Same case with management network
- Same case with container network
- Create with bridge network correctly set
- Set bridge network IP range with wrong format
- Verify create failed with user-friendly error message
- Create with bridge network IP range smaller than /16
- Verify create failed with user-friendly error message
- Create with bridge network correctly set
- Set bridge network ip range correctly
- Verify create passed
- Regression test passed
- docker create container, with ip address correctly set in the above ip range
- Create with container network and : and :s
- Verify create failed with a network name must be supplied for
- Create with container network: :vmnet
- Verify create passed
- Regression test passed
- Verify docker network ls command to show net1 network
- Create with invalid container network: :alias
- Verify create failed with WrongNet is not found
- Create with container network: :alias in VC
- Verify create failed with standard network is not supported
- Create with container network: :net1 in VC or :net1 in ESXi
- Verify create passed
- Regression test passed
- Verify docker network ls command to show net1 network
- Create with container network: in VC or in ESXi
- Verify create passed
- Regression test passed
- Verify docker network ls command to show the network
- Create with two container network map to same alias
- Verify create failed with two different vsphere network map to same docker network
- Create with container network mapping
- Set container network gateway as :1.1.1.1/24
- Set container network gateway as :192.168.1.0/24
- Set container network gateway as :192.168.1.0/24
- Verify create failed for wrong vsphere network name or gateway is not routable
- Create with container network mapping
- Set container ip range as :192.168.2.1-192.168.2.100
- Set container network gateway as :192.168.1.1/24, and container ip range as :192.168.2.1-192.168.2.100
- Verify create failed for wrong vsphere network name or ip range is wrong
- Create with container network mapping
- Set container DNS as :8.8.8.8
- Set container DNS as :abcdefg
- Verify create failed for wrong vsphere name or wrong dns format
- Create with container network mapping :net1
- Set container network gateway as :192.168.1.1/24
- Set container ip range as :192.168.1.2-192.168.1.100
- Set container DNS as :
- Verify create passed
- Integration test passed
- Docker network ls show net1
- Docker container created with network attached with net1, got ip address inside of network range
- Docker create another container, and link to previous one, can talk to the the first container successfully
- Create an open container and verify another open container can connect to it on arbitrary ports.
- a. Try to publish a port on a closed firewall and verify an error is received. b. Create a closed container and verify an open container cannot connect to it on an arbitrary port. c. Create a container connected to a bridge and a closed network. Verify that another container connected to the same bridge can connect to the closed container.
- a. Create an outbound container. Verify that an outbound container on the same external network cannot connect to the first outbound container. b. Verify that the outbound container can initiate a connection with an open network on an arbitrary port. c. Verify that two outbound containers on the same external network and on the same bridge network can talk to one another via hte bridge.
- a. Create a published container that publishes port 1337. Verify that an outbound container can connect to port 1337 on the published container. b. Verify that an outbound container cannot connect to any other arbitrary port on the published container.
- a. Create a peer network
A
with ip range10.10.10.0/24
and gateway10.10.10.1/24
. b. Create a peer networkB
with ip range192.168.0.0/16
and gateway192.168.0.1/16
. c. Verify that a container on networkB
cannot connect to networkA
through an arbitrary port. d. Verify that a new container on networkA
(a peer) can connect to another container on networkA
on an arbitrary port. - Verify that a closed container can ping localhost
- Create with static IP address for public network (client and management networks unspecified default to same port group as public network)
- Verify debug output shows specified static IP address correctly assigned and copied to client and management networks
- Create with static IP address for client network and specify client, public, and management networks to be on same port group
- Verify debug output shows specified static IP address correctly assigned and copied to public and management networks
- Create with static IP address for management network and specify client, public, and management networks to be on the same port group
- Verify debug output shows specified static IP address correctly assigned and copied to client and public management networks
- Create with static IP address for public network and specify client and management networks to be on different port group
- Verify debug output shows specified static IP address correctly assigned
- Verify debug output shows client and management networks set to DHCP
- Create with static IP address for public network on
public-network
port group and a static IP address for client network onclient-network
port group - Verify debug output shows correct IP address assigned to each interface
- Create with static IP address for each public network and client network and specify both to be on the same port group
- Verify output shows configuration error and install does not proceed
- Create with static IP address for public network and a static IP address for client network. Specify the addresses to be on the same subnet, but assign each network to a different port group
- Verify output shows warning that assigning the same subnet to different port groups is unsupported