Test scenarios for VSG module in context of
CIAB(Cord in a Box).
Description:
   1. It tests for vSG sanity and reachabilty.
   2. It checks for services suppported .
   3. Also checks for external connectivity.
More depth and functional scenarios will be added in addition
to CLI based verification.

Change-Id: I956dbedee745fa7be280ab65f7f991fc3b8ad341
diff --git a/src/test/vsg/vsgTest.py b/src/test/vsg/vsgTest.py
new file mode 100644
index 0000000..975e11c
--- /dev/null
+++ b/src/test/vsg/vsgTest.py
@@ -0,0 +1,217 @@
+#copyright 2016-present Ciena Corporation
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+#
+import unittest
+from nose.tools import *
+from scapy.all import *
+from OnosCtrl import OnosCtrl, get_mac
+from OltConfig import OltConfig
+from socket import socket
+from OnosFlowCtrl import OnosFlowCtrl
+from nose.twistedtools import reactor, deferred
+from twisted.internet import defer
+from onosclidriver import OnosCliDriver
+from CordContainer import Container, Onos, Quagga
+from CordTestServer import cord_test_onos_restart, cord_test_onos_shutdown
+from portmaps import g_subscriber_port_map
+from scapy.all import *
+import time, monotonic
+from OnosLog import OnosLog
+from CordLogger import CordLogger
+from os import environ as env
+import os
+import json
+import random
+import collections
+import paramiko
+from paramiko import SSHClient
+log.setLevel('INFO')
+
+class vsg_exchange(CordLogger):
+    ONOS_INSTANCES = 3
+    V_INF1 = 'veth0'
+    device_id = 'of:' + get_mac()
+    testcaseLoggers = ("")
+    TEST_IP = '8.8.8.8'
+    HOST = "10.1.0.1"
+    USER = "vagrant"
+    PASS = "vagrant"
+
+
+    def setUp(self):
+        if self._testMethodName not in self.testcaseLoggers:
+            super(vsg_exchange, self).setUp()
+
+    def tearDown(self):
+        if self._testMethodName not in self.testcaseLoggers:
+            super(vsg_exchange, self).tearDown()
+
+    def get_controller(self):
+        controller = os.getenv('ONOS_CONTROLLER_IP') or 'localhost'
+        controller = controller.split(',')[0]
+        return controller
+
+    @classmethod
+    def get_controllers(cls):
+        controllers = os.getenv('ONOS_CONTROLLER_IP') or ''
+        return controllers.split(',')
+
+    def cliEnter(self, controller = None):
+        retries = 0
+        while retries < 30:
+            self.cli = OnosCliDriver(controller = controller, connect = True)
+            if self.cli.handle:
+                break
+            else:
+                retries += 1
+                time.sleep(2)
+
+    def cliExit(self):
+        self.cli.disconnect()
+
+    def onos_shutdown(self, controller = None):
+        status = True
+        self.cliEnter(controller = controller)
+        try:
+            self.cli.shutdown(timeout = 10)
+        except:
+            log.info('Graceful shutdown of ONOS failed for controller: %s' %controller)
+            status = False
+
+        self.cliExit()
+        return status
+
+    def log_set(self, level = None, app = 'org.onosproject', controllers = None):
+        CordLogger.logSet(level = level, app = app, controllers = controllers, forced = True)
+
+    def get_nova_credentials_v2():
+        credential = {}
+        credential['version'] = '2'
+        credential['username'] = env['OS_USERNAME']
+        credential['api_key'] = env['OS_PASSWORD']
+        credential['auth_url'] = env['OS_AUTH_URL']
+        credential['project_id'] = env['OS_TENANT_NAME']
+        return credential
+
+    def get_vsg_ip(vm_id):
+        credentials = get_nova_credentials_v2()
+        nova_client = Client(**credentials)
+        result = nova_client.servers.list()
+        for server in result:
+            print server;
+
+    def health_check(self):
+        cmd = "nova list --all-tenants|grep mysite_vsg|cut -d '|' -f 2"
+        status, nova_id = commands.getstatusoutput(cmd)
+        cmd = "nova interface-list {{ nova_id }}|grep -o -m 1 '172\.27\.[[:digit:]]*\.[[:digit:]]*'"
+        status, ip = commands.getstatusoutput(cmd)
+        cmd = "ping -c1 {0}".format(ip)
+        status =  os.system(cmd)
+        return status
+
+    def ping_ip(remote, ip):
+        results = []
+        cmd = "ping -c1 {0}".format(ip)
+        result = remote.execute(cmd, verbose=False)
+        return results
+
+    def vsg_vm_ssh_check(vsg_ip):
+        cmd = "nc -z -v "+str(vsg_ip)+" 22"
+        status =  os.system(cmd)
+        return status
+
+    def get_vcpe(self):
+        cmd = "nova list --all-tenants|grep mysite_vsg|cut -d '|' -f 2"
+        status, node_id = commands.getstatusoutput(cmd)
+
+    def connect_ssh(vsg_ip, private_key_file=None, user='ubuntu'):
+        key = ssh.RSAKey.from_private_key_file(private_key_file)
+        client = ssh.SSHClient()
+        client.set_missing_host_key_policy(ssh.WarningPolicy())
+        client.connect(ip, username=user, pkey=key, timeout=5)
+        return client
+
+    def test_vsg_vm(self):
+        status = self.health_check()
+        assert_equal( status, False)
+
+    def test_vsg_for_default_route_to_vsg_vm(self):
+        client = SSHClient()
+        client.set_missing_host_key_policy(paramiko.AutoAddPolicy())
+        client.connect( self.HOST, username = self.USER, password=self.PASS)
+        cmd = "sudo lxc exec testclient -- route | grep default"
+        stdin, stdout, stderr = client.exec_command(cmd)
+        status = stdout.channel.recv_exit_status()
+        assert_equal( status, False)
+
+    def test_vsg_vm_for_vcpe(self):
+        client = SSHClient()
+        client.set_missing_host_key_policy(paramiko.AutoAddPolicy())
+        client.connect( self.HOST, username = self.USER, password=self.PASS)
+        cmd = "nova service-list|grep nova-compute|cut -d '|' -f 3"
+        stdin, stdout, stderr = client.exec_command(cmd)
+        cmd = "nova list --all-tenants | grep mysite_vsg|cut -d '|' -f 7 | cut -d '=' -f 2 | cut -d ';' -f 1"
+        status, ip = commands.getstatusoutput(cmd)
+        #cmd = "ssh -o ProxyCommand="ssh -W %h:%p -l ubuntu {0}" ubuntu@{1} "sudo docker ps|grep vcpe"".format(compute_node_name, ip)
+        status = stdout.channel.recv_exit_status()
+        assert_equal( status, False)
+
+    def test_vsg_for_external_connectivity(self):
+        client = SSHClient()
+        client.set_missing_host_key_policy(paramiko.AutoAddPolicy())
+        client.connect( self.HOST, username = self.USER, password=self.PASS)
+        cmd = "lxc exec testclient -- ping -c 3 8.8.8.8"
+        stdin, stdout, stderr = client.exec_command(cmd)
+        status = stdout.channel.recv_exit_status()
+        assert_equal( status, False)
+
+    def test_vsg_cord_subscriber_creation(self):
+        pass
+
+    def test_vsg_for_dhcp_client(self):
+        pass
+
+    def test_vsg_for_snat(self):
+        pass
+
+    def test_vsg_for_dns_service(self):
+        pass
+
+    def test_vsg_dnsmasq(self):
+        pass
+
+    def test_vsg_with_external_parental_control_family_shield_for_filter(self):
+        pass
+
+    def test_vsg_with_external_parental_control_with_answerx(self):
+        pass
+
+    def test_vsg_for_subscriber_upstream_bandwidth(self):
+        pass
+
+    def test_vsg_for_subscriber_downstream_bandwidth(self):
+        pass
+
+    def test_vsg_for_diagnostic_run_of_traceroute(self):
+        pass
+
+    def test_vsg_for_diagnostic_run_of_tcpdump(self):
+        pass
+
+    def test_vsg_for_iptable_rules(self):
+        pass
+
+    def test_vsg_for_iptables_with_neutron(self):
+        pass
+