|
| 1 | +#!/bin/bash |
| 2 | +LOG_INFO="\x1b[33;42;1m[INFO]:\x1b[0m" |
| 3 | +LOG_TODO="\x1b[37;43;1m[TODO]:\x1b[0m" |
| 4 | +LOG_ERR="\x1b[33;41;1m[ERROR]:\x1b[0m" |
| 5 | + |
| 6 | +echo "============" |
| 7 | +echo "Start Docker" |
| 8 | +echo "============" |
| 9 | +echo "running from $(pwd)" |
| 10 | +sudo service docker start |
| 11 | + |
| 12 | +echo "========================" |
| 13 | +echo "Extract self-signed cert" |
| 14 | +echo "========================" |
| 15 | +PROXY_CERT_ZFILE="./haproxy/haproxy.bin" |
| 16 | +PROXY_CERT_FILE="./haproxy/haproxy.pem" |
| 17 | +if [ -f "$PROXY_CERT_FILE" ]; |
| 18 | +then |
| 19 | + echo -e "$LOG_INFO Use existing Proxy Service Cert found." |
| 20 | +elif [ -f "$PROXY_CERT_ZFILE" ]; |
| 21 | +then |
| 22 | + gzip -d -N -k -q -S ".bin" ./haproxy/haproxy.bin |
| 23 | + echo -e "$LOG_INFO Proxy Service Cert extracted." |
| 24 | +else |
| 25 | + echo -e "$LOG_ERR Missing Proxy Service Cert! Check your repo." |
| 26 | + exit |
| 27 | +fi |
| 28 | + |
| 29 | +echo "===============" |
| 30 | +echo "Inspect network" |
| 31 | +echo "===============" |
| 32 | +ip -4 addr |
| 33 | +CVTEST_HOST_IP=$(ip -4 addr show eth0 | grep -Po 'inet \K[\d.]+') |
| 34 | +CVTEST_HOST_NETWORK=$(ip -4 addr show eth0 | grep -Po 'inet \K[\d.]+/*\d.') |
| 35 | +CVTEST_HOST_SUBNET=$(ip -4 addr show eth0 | grep -Po 'inet \K[\d.]+' | grep -Po '[\d]{1,3}.[\d]{1,3}.[\d]{1,3}') |
| 36 | +CVTEST_HOST_SUBNET_MASK=$(ip -4 addr show eth0 | grep -Po 'inet \K[\d.]+/*\d.' | grep -Po '/[\d]{1,2}') |
| 37 | +CVTEST_CONTAINER_GW=$(ip -4 addr show docker0 | grep -Po 'inet \K[\d.]+') |
| 38 | +CVTEST_HOST_WSL_IP=$(ip -4 addr show eth0 | grep -Po 'inet \K[\d.]+') |
| 39 | +CVTEST_ROUTE_NET=$(route -n | grep 'eth0' | grep -v 'UG' | awk -F" " '{print $1}' | awk -F"." '{print $1"."$2"."$3"."$4"/29"}') |
| 40 | +CVTEST_TST_NET=$CVTEST_HOST_NETWORK |
| 41 | +CVTEST_GDE_IP=$(ip -4 addr show eth0 | grep -Po 'inet \K[\d.]+' | awk -F"." '{print $1"."$2"."$3"."$4+3}') |
| 42 | +CVTEST_DPS_IP=$(ip -4 addr show eth0 | grep -Po 'inet \K[\d.]+' | awk -F"." '{print $1"."$2"."$3"."$4+4}') |
| 43 | +CVTEST_HUB_IP=$(ip -4 addr show eth0 | grep -Po 'inet \K[\d.]+' | awk -F"." '{print $1"."$2"."$3"."$4+5}') |
| 44 | +echo "HOST=$CVTEST_HOST_IP" |
| 45 | +echo "HOST NETWORK=$CVTEST_HOST_NETWORK" |
| 46 | +echo "HOST SUBNET=$CVTEST_HOST_SUBNET" |
| 47 | +echo "HOST SUBNET MASK=$CVTEST_HOST_SUBNET_MASK" |
| 48 | +echo "Container GW=$CVTEST_CONTAINER_GW" |
| 49 | +echo "WSL=$CVTEST_HOST_WSL_IP" |
| 50 | +echo "Container NET=$CVTEST_TST_NET" |
| 51 | +echo "Container GDE=$CVTEST_GDE_IP" |
| 52 | +echo "Container DPS=$CVTEST_DPS_IP" |
| 53 | +echo "Container HUB=$CVTEST_HUB_IP" |
| 54 | +ping -c 2 $CVTEST_HOST_IP |
| 55 | + |
| 56 | +echo "====================" |
| 57 | +echo "Setup docker network" |
| 58 | +echo "====================" |
| 59 | +docker images |
| 60 | +docker ps -a |
| 61 | +docker stop invalid-gde invalid-dps invalid-hub e2etest-tpm e2etest-pxy |
| 62 | +docker rm invalid-gde invalid-dps invalid-hub e2etest-tpm e2etest-pxy |
| 63 | +docker network rm testnet |
| 64 | +docker network create -d ipvlan --subnet=$CVTEST_TST_NET -o ipvlan_mode=l2 -o parent=eth0 testnet |
| 65 | +docker network ls |
| 66 | + |
| 67 | +echo "======================" |
| 68 | +echo "Setup docker instances" |
| 69 | +echo "======================" |
| 70 | +AZURE_ACR_TOKEN=$(az acr login -n aziotacr -t --output tsv --query accessToken) |
| 71 | +echo $AZURE_ACR_TOKEN | docker login aziotacr.azurecr.io --username 00000000-0000-0000-0000-000000000000 --password-stdin |
| 72 | +docker run -h invalidcertgde1.westus.cloudapp.azure.com --name invalid-gde --expose=443 --expose=5671 --expose=8883 --network=testnet --ip=$CVTEST_GDE_IP -v $(pwd)/haproxy:/usr/local/etc/haproxy:ro -d aziotacr.azurecr.io/haproxy haproxy -f /usr/local/etc/haproxy/haproxygde.cfg |
| 73 | +docker run -h invalidcertdps1.westus.cloudapp.azure.com --name invalid-dps --expose=443 --expose=5671 --expose=8883 --network=testnet --ip=$CVTEST_DPS_IP -v $(pwd)/haproxy:/usr/local/etc/haproxy:ro -d aziotacr.azurecr.io/haproxy haproxy -f /usr/local/etc/haproxy/haproxydps.cfg |
| 74 | +docker run -h invalidcertiothub1.westus.cloudapp.azure.com --name invalid-hub --expose=443 --expose=5671 --expose=8883 --network=testnet --ip=$CVTEST_HUB_IP -v $(pwd)/haproxy:/usr/local/etc/haproxy:ro -d aziotacr.azurecr.io/haproxy haproxy -f /usr/local/etc/haproxy/haproxyhub.cfg |
| 75 | +docker run --name e2etest-tpm -p 127.0.0.1:2321:2321 -p 127.0.0.1:2322:2322 -d aziotacr.azurecr.io/aziotbld/testtpm |
| 76 | +docker run --name e2etest-pxy -p 127.0.0.1:8888:8888 -d aziotacr.azurecr.io/aziotbld/testproxy |
| 77 | + |
| 78 | +echo "=================" |
| 79 | +echo "Inspect instances" |
| 80 | +echo "=================" |
| 81 | +docker ps -a |
| 82 | + |
| 83 | +echo "========================================================" |
| 84 | +echo -e "$LOG_TODO update host file for local E2E Tests" |
| 85 | +echo " (on your host Windows OS)" |
| 86 | +echo " add/update hosts file with the following entries" |
| 87 | +echo " (at C:\Windows\System32\drivers\etc\hosts)" |
| 88 | +echo "========================================================" |
| 89 | +echo "$(docker inspect invalid-gde | grep -Po -m 1 '"IPAddress": "\K[\d.]+') invalidcertgde1.westus.cloudapp.azure.com" |
| 90 | +echo "$(docker inspect invalid-dps | grep -Po -m 1 '"IPAddress": "\K[\d.]+') invalidcertdps1.westus.cloudapp.azure.com" |
| 91 | +echo "$(docker inspect invalid-hub | grep -Po -m 1 '"IPAddress": "\K[\d.]+') invalidcertiothub1.westus.cloudapp.azure.com" |
0 commit comments