| # Copyright 2012 OpenStack Foundation |
| # All Rights Reserved. |
| # |
| # Licensed under the Apache License, Version 2.0 (the "License"); you may |
| # not use this file except in compliance with the License. You may obtain |
| # a copy of the License at |
| # |
| # http://www.apache.org/licenses/LICENSE-2.0 |
| # |
| # Unless required by applicable law or agreed to in writing, software |
| # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the |
| # License for the specific language governing permissions and limitations |
| # under the License. |
| |
| import json |
| |
| from oslo_log import log as logging |
| |
| from tempest import config |
| from tempest import exceptions |
| from tempest.scenario import manager |
| from tempest.scenario import utils as test_utils |
| from tempest import test |
| |
| CONF = config.CONF |
| |
| LOG = logging.getLogger(__name__) |
| |
| load_tests = test_utils.load_tests_input_scenario_utils |
| |
| |
| class TestServerBasicOps(manager.ScenarioTest): |
| |
| """The test suite for server basic operations |
| |
| This smoke test case follows this basic set of operations: |
| * Create a keypair for use in launching an instance |
| * Create a security group to control network access in instance |
| * Add simple permissive rules to the security group |
| * Launch an instance |
| * Perform ssh to instance |
| * Verify metadata service |
| * Verify metadata on config_drive |
| * Terminate the instance |
| """ |
| |
| def setUp(self): |
| super(TestServerBasicOps, self).setUp() |
| # Setup image and flavor the test instance |
| # Support both configured and injected values |
| if not hasattr(self, 'image_ref'): |
| self.image_ref = CONF.compute.image_ref |
| if not hasattr(self, 'flavor_ref'): |
| self.flavor_ref = CONF.compute.flavor_ref |
| self.image_utils = test_utils.ImageUtils(self.manager) |
| if not self.image_utils.is_flavor_enough(self.flavor_ref, |
| self.image_ref): |
| raise self.skipException( |
| '{image} does not fit in {flavor}'.format( |
| image=self.image_ref, flavor=self.flavor_ref |
| ) |
| ) |
| self.run_ssh = CONF.validation.run_validation and \ |
| self.image_utils.is_sshable_image(self.image_ref) |
| self.ssh_user = self.image_utils.ssh_user(self.image_ref) |
| LOG.debug('Starting test for i:{image}, f:{flavor}. ' |
| 'Run ssh: {ssh}, user: {ssh_user}'.format( |
| image=self.image_ref, flavor=self.flavor_ref, |
| ssh=self.run_ssh, ssh_user=self.ssh_user)) |
| |
| def add_keypair(self): |
| self.keypair = self.create_keypair() |
| |
| def verify_ssh(self): |
| if self.run_ssh: |
| # Obtain a floating IP |
| self.fip = self.create_floating_ip(self.instance)['ip'] |
| # Check ssh |
| self.ssh_client = self.get_remote_client( |
| server_or_ip=self.fip, |
| username=self.image_utils.ssh_user(self.image_ref), |
| private_key=self.keypair['private_key']) |
| |
| def verify_metadata(self): |
| if self.run_ssh and CONF.compute_feature_enabled.metadata_service: |
| # Verify metadata service |
| md_url = 'http://169.254.169.254/latest/meta-data/public-ipv4' |
| |
| def exec_cmd_and_verify_output(): |
| cmd = 'curl ' + md_url |
| result = self.ssh_client.exec_command(cmd) |
| if result: |
| msg = ('Failed while verifying metadata on server. Result ' |
| 'of command "%s" is NOT "%s".' % (cmd, self.fip)) |
| self.assertEqual(self.fip, result, msg) |
| return 'Verification is successful!' |
| |
| if not test.call_until_true(exec_cmd_and_verify_output, |
| CONF.compute.build_timeout, |
| CONF.compute.build_interval): |
| raise exceptions.TimeoutException('Timed out while waiting to ' |
| 'verify metadata on server. ' |
| '%s is empty.' % md_url) |
| |
| def verify_metadata_on_config_drive(self): |
| if self.run_ssh and CONF.compute_feature_enabled.config_drive: |
| # Verify metadata on config_drive |
| cmd_blkid = 'blkid -t LABEL=config-2 -o device' |
| dev_name = self.ssh_client.exec_command(cmd_blkid) |
| dev_name = dev_name.rstrip() |
| self.ssh_client.exec_command('sudo mount %s /mnt' % dev_name) |
| cmd_md = 'sudo cat /mnt/openstack/latest/meta_data.json' |
| result = self.ssh_client.exec_command(cmd_md) |
| self.ssh_client.exec_command('sudo umount /mnt') |
| result = json.loads(result) |
| self.assertIn('meta', result) |
| msg = ('Failed while verifying metadata on config_drive on server.' |
| ' Result of command "%s" is NOT "%s".' % (cmd_md, self.md)) |
| self.assertEqual(self.md, result['meta'], msg) |
| |
| @test.idempotent_id('7fff3fb3-91d8-4fd0-bd7d-0204f1f180ba') |
| @test.attr(type='smoke') |
| @test.services('compute', 'network') |
| def test_server_basicops(self): |
| self.add_keypair() |
| self.security_group = self._create_security_group() |
| security_groups = [{'name': self.security_group['name']}] |
| self.md = {'meta1': 'data1', 'meta2': 'data2', 'metaN': 'dataN'} |
| self.instance = self.create_server( |
| image_id=self.image_ref, |
| flavor=self.flavor_ref, |
| key_name=self.keypair['name'], |
| security_groups=security_groups, |
| config_drive=CONF.compute_feature_enabled.config_drive, |
| metadata=self.md, |
| wait_until='ACTIVE') |
| self.verify_ssh() |
| self.verify_metadata() |
| self.verify_metadata_on_config_drive() |
| self.servers_client.delete_server(self.instance['id']) |