
The commit adds integration test that includes baremetal operator - test is driven by airshipctl phases - Deploys BMO from airshipctl repository as a phase - Verifies that after VINO-CR is deployed BMHs are created - Verifies that BMO can install an image into those BMHs using pxe - Various fixes that allow to integrate with BMO - Disables password authentication for BMHs untill we have a fix - BMO fails to authenticate against simple auth provided by nginx - Removes unit-tests for BMO creation. The whole approach of requesting VMs from vino-builder should be changed. When we have final view of the process, we will well define vino-builder API and add unit-tests to vino controller and builder Change-Id: I51976ca20811b227ecb069c4ffd81d8afe086e57
38 lines
1.3 KiB
Bash
Executable File
38 lines
1.3 KiB
Bash
Executable File
#!/bin/bash
|
|
|
|
set -xe
|
|
|
|
function create_bridge () {
|
|
if ! sudo brctl show| grep -q "${1}"; then
|
|
sudo brctl addbr "${1}"
|
|
sudo ip link set "${1}" up
|
|
sudo ip addr add ${2} dev "${1}"
|
|
fi;
|
|
}
|
|
|
|
VM_INFRA_BRIDGE=${VM_INFRA_BRIDGE:-"vm-infra"}
|
|
VM_INFRA_BRIDGE_IP=${VM_INFRA_BRIDGE_IP:-"192.168.2.1/24"}
|
|
|
|
VM_PXE_BRIDGE=${VM_PXE_BRIDGE:-"pxe"}
|
|
VM_PXE_BRIDGE_IP=${VM_PXE_BRIDGE_IP:-"172.3.3.1/24"}
|
|
PXE_NET="172.3.3.0/24"
|
|
|
|
export DEBCONF_NONINTERACTIVE_SEEN=true
|
|
export DEBIAN_FRONTEND=noninteractive
|
|
|
|
sudo -E apt-get update
|
|
sudo -E apt-get install -y bridge-utils
|
|
|
|
echo 1 | sudo tee /proc/sys/net/ipv4/ip_forward
|
|
|
|
create_bridge ${VM_INFRA_BRIDGE} ${VM_INFRA_BRIDGE_IP}
|
|
create_bridge ${VM_PXE_BRIDGE} ${VM_PXE_BRIDGE_IP}
|
|
|
|
sudo iptables -A FORWARD -d ${PXE_NET} -o ${VM_PXE_BRIDGE} -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
|
|
|
|
sudo iptables -t nat -A POSTROUTING -s ${PXE_NET} -d 224.0.0.0/24 -j RETURN
|
|
sudo iptables -t nat -A POSTROUTING -s ${PXE_NET} -d 255.255.255.255/32 -j RETURN
|
|
sudo iptables -t nat -A POSTROUTING -s ${PXE_NET} ! -d ${PXE_NET} -p tcp -j MASQUERADE --to-ports 1024-65535
|
|
sudo iptables -t nat -A POSTROUTING -s ${PXE_NET} ! -d ${PXE_NET} -p udp -j MASQUERADE --to-ports 1024-65535
|
|
sudo iptables -t nat -A POSTROUTING -s ${PXE_NET} ! -d ${PXE_NET} -j MASQUERADE
|