blob: a9f2dff3f7d2e1fdfc62eff3d21209c04c5eee87 [file] [log] [blame]
ZhiQiang Fan39f97222013-09-20 04:49:44 +08001# Copyright 2012 OpenStack Foundation
Jay Pipes051075a2012-04-28 17:39:37 -04002# All Rights Reserved.
3#
4# Licensed under the Apache License, Version 2.0 (the "License"); you may
5# not use this file except in compliance with the License. You may obtain
6# a copy of the License at
7#
8# http://www.apache.org/licenses/LICENSE-2.0
9#
10# Unless required by applicable law or agreed to in writing, software
11# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
12# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
13# License for the specific language governing permissions and limitations
14# under the License.
15
Alexander Gubanov509e2842015-06-09 15:29:51 +030016import json
17
Doug Hellmann583ce2c2015-03-11 14:55:46 +000018from oslo_log import log as logging
19
Matthew Treinish6c072292014-01-29 19:15:52 +000020from tempest import config
Yaroslav Lobankov117a48f2015-08-11 11:40:44 +030021from tempest import exceptions
Sean Dague6dbc6da2013-05-08 17:49:46 -040022from tempest.scenario import manager
Matthew Treinishd75edef2014-04-11 15:57:16 -040023from tempest.scenario import utils as test_utils
Masayuki Igawa4ded9f02014-02-17 15:05:59 +090024from tempest import test
Jay Pipes051075a2012-04-28 17:39:37 -040025
Matthew Treinish6c072292014-01-29 19:15:52 +000026CONF = config.CONF
27
Jay Pipes051075a2012-04-28 17:39:37 -040028LOG = logging.getLogger(__name__)
29
Matthew Treinisha0048cb2014-04-08 17:44:42 -040030load_tests = test_utils.load_tests_input_scenario_utils
Andrea Frittolif5da28b2013-12-06 07:08:07 +000031
Jay Pipes051075a2012-04-28 17:39:37 -040032
Ghanshyam5a305c42014-08-27 14:24:58 +090033class TestServerBasicOps(manager.ScenarioTest):
Jay Pipes051075a2012-04-28 17:39:37 -040034
Ken'ichi Ohmichic4e4f1c2015-11-17 08:16:12 +000035 """The test suite for server basic operations
Jay Pipes051075a2012-04-28 17:39:37 -040036
Ken'ichi Ohmichic4e4f1c2015-11-17 08:16:12 +000037 This smoke test case follows this basic set of operations:
Jay Pipes051075a2012-04-28 17:39:37 -040038 * Create a keypair for use in launching an instance
39 * Create a security group to control network access in instance
40 * Add simple permissive rules to the security group
41 * Launch an instance
ghanshyam416c94c2014-10-02 13:47:25 +090042 * Perform ssh to instance
YAMAMOTO Takashi1f62af22015-06-16 03:29:50 +090043 * Verify metadata service
Alexander Gubanov509e2842015-06-09 15:29:51 +030044 * Verify metadata on config_drive
Jay Pipes051075a2012-04-28 17:39:37 -040045 * Terminate the instance
46 """
47
Andrea Frittolif5da28b2013-12-06 07:08:07 +000048 def setUp(self):
49 super(TestServerBasicOps, self).setUp()
50 # Setup image and flavor the test instance
51 # Support both configured and injected values
52 if not hasattr(self, 'image_ref'):
Matthew Treinish6c072292014-01-29 19:15:52 +000053 self.image_ref = CONF.compute.image_ref
Andrea Frittolif5da28b2013-12-06 07:08:07 +000054 if not hasattr(self, 'flavor_ref'):
Matthew Treinish6c072292014-01-29 19:15:52 +000055 self.flavor_ref = CONF.compute.flavor_ref
Matthew Treinish96cadf42015-05-14 19:45:59 -040056 self.image_utils = test_utils.ImageUtils(self.manager)
Andrea Frittolif5da28b2013-12-06 07:08:07 +000057 if not self.image_utils.is_flavor_enough(self.flavor_ref,
58 self.image_ref):
59 raise self.skipException(
60 '{image} does not fit in {flavor}'.format(
61 image=self.image_ref, flavor=self.flavor_ref
62 )
63 )
Matthew Treinishe5cca002015-05-11 15:36:50 -040064 self.run_ssh = CONF.validation.run_validation and \
Andrea Frittolif5da28b2013-12-06 07:08:07 +000065 self.image_utils.is_sshable_image(self.image_ref)
66 self.ssh_user = self.image_utils.ssh_user(self.image_ref)
67 LOG.debug('Starting test for i:{image}, f:{flavor}. '
68 'Run ssh: {ssh}, user: {ssh_user}'.format(
69 image=self.image_ref, flavor=self.flavor_ref,
70 ssh=self.run_ssh, ssh_user=self.ssh_user))
71
Jordan Pittierbbb17122016-01-26 17:10:55 +010072 def verify_ssh(self, keypair):
Andrea Frittolif5da28b2013-12-06 07:08:07 +000073 if self.run_ssh:
74 # Obtain a floating IP
Alexander Gubanov2388e2a2015-11-07 11:16:28 +020075 self.fip = self.create_floating_ip(self.instance)['ip']
Andrea Frittolif5da28b2013-12-06 07:08:07 +000076 # Check ssh
YAMAMOTO Takashi1f62af22015-06-16 03:29:50 +090077 self.ssh_client = self.get_remote_client(
Sean Dague20e98612016-01-06 14:33:28 -050078 ip_address=self.fip,
JordanP3fe2dc32014-11-17 13:06:01 +010079 username=self.image_utils.ssh_user(self.image_ref),
Jordan Pittierbbb17122016-01-26 17:10:55 +010080 private_key=keypair['private_key'])
Andrea Frittolif5da28b2013-12-06 07:08:07 +000081
YAMAMOTO Takashi1f62af22015-06-16 03:29:50 +090082 def verify_metadata(self):
83 if self.run_ssh and CONF.compute_feature_enabled.metadata_service:
84 # Verify metadata service
Yaroslav Lobankov117a48f2015-08-11 11:40:44 +030085 md_url = 'http://169.254.169.254/latest/meta-data/public-ipv4'
86
87 def exec_cmd_and_verify_output():
88 cmd = 'curl ' + md_url
Yaroslav Lobankov117a48f2015-08-11 11:40:44 +030089 result = self.ssh_client.exec_command(cmd)
90 if result:
91 msg = ('Failed while verifying metadata on server. Result '
Alexander Gubanov2388e2a2015-11-07 11:16:28 +020092 'of command "%s" is NOT "%s".' % (cmd, self.fip))
93 self.assertEqual(self.fip, result, msg)
Yaroslav Lobankov117a48f2015-08-11 11:40:44 +030094 return 'Verification is successful!'
95
96 if not test.call_until_true(exec_cmd_and_verify_output,
97 CONF.compute.build_timeout,
98 CONF.compute.build_interval):
99 raise exceptions.TimeoutException('Timed out while waiting to '
100 'verify metadata on server. '
101 '%s is empty.' % md_url)
YAMAMOTO Takashi1f62af22015-06-16 03:29:50 +0900102
Alexander Gubanov509e2842015-06-09 15:29:51 +0300103 def verify_metadata_on_config_drive(self):
104 if self.run_ssh and CONF.compute_feature_enabled.config_drive:
105 # Verify metadata on config_drive
106 cmd_blkid = 'blkid -t LABEL=config-2 -o device'
107 dev_name = self.ssh_client.exec_command(cmd_blkid)
108 dev_name = dev_name.rstrip()
109 self.ssh_client.exec_command('sudo mount %s /mnt' % dev_name)
110 cmd_md = 'sudo cat /mnt/openstack/latest/meta_data.json'
111 result = self.ssh_client.exec_command(cmd_md)
112 self.ssh_client.exec_command('sudo umount /mnt')
113 result = json.loads(result)
114 self.assertIn('meta', result)
115 msg = ('Failed while verifying metadata on config_drive on server.'
116 ' Result of command "%s" is NOT "%s".' % (cmd_md, self.md))
117 self.assertEqual(self.md, result['meta'], msg)
118
Chris Hoge7579c1a2015-02-26 14:12:15 -0800119 @test.idempotent_id('7fff3fb3-91d8-4fd0-bd7d-0204f1f180ba')
Sean Dague3c634d12015-04-27 12:09:19 -0400120 @test.attr(type='smoke')
Masayuki Igawa4ded9f02014-02-17 15:05:59 +0900121 @test.services('compute', 'network')
Tong Liu9bee3b92016-03-23 23:53:43 +0000122 def test_server_basic_ops(self):
Jordan Pittierbbb17122016-01-26 17:10:55 +0100123 keypair = self.create_keypair()
Yair Fried1fc32a12014-08-04 09:11:30 +0300124 self.security_group = self._create_security_group()
lanoux5fc14522015-09-21 08:17:35 +0000125 security_groups = [{'name': self.security_group['name']}]
126 self.md = {'meta1': 'data1', 'meta2': 'data2', 'metaN': 'dataN'}
127 self.instance = self.create_server(
128 image_id=self.image_ref,
129 flavor=self.flavor_ref,
Jordan Pittierbbb17122016-01-26 17:10:55 +0100130 key_name=keypair['name'],
lanoux5fc14522015-09-21 08:17:35 +0000131 security_groups=security_groups,
132 config_drive=CONF.compute_feature_enabled.config_drive,
133 metadata=self.md,
134 wait_until='ACTIVE')
Jordan Pittierbbb17122016-01-26 17:10:55 +0100135 self.verify_ssh(keypair)
YAMAMOTO Takashi1f62af22015-06-16 03:29:50 +0900136 self.verify_metadata()
Alexander Gubanov509e2842015-06-09 15:29:51 +0300137 self.verify_metadata_on_config_drive()
Ghanshyam5a305c42014-08-27 14:24:58 +0900138 self.servers_client.delete_server(self.instance['id'])