ZhiQiang Fan | 39f9722 | 2013-09-20 04:49:44 +0800 | [diff] [blame] | 1 | # Copyright 2012 OpenStack Foundation |
Jay Pipes | 051075a | 2012-04-28 17:39:37 -0400 | [diff] [blame] | 2 | # All Rights Reserved. |
| 3 | # |
| 4 | # Licensed under the Apache License, Version 2.0 (the "License"); you may |
| 5 | # not use this file except in compliance with the License. You may obtain |
| 6 | # a copy of the License at |
| 7 | # |
| 8 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | # |
| 10 | # Unless required by applicable law or agreed to in writing, software |
| 11 | # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| 12 | # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the |
| 13 | # License for the specific language governing permissions and limitations |
| 14 | # under the License. |
| 15 | |
Alexander Gubanov | 509e284 | 2015-06-09 15:29:51 +0300 | [diff] [blame] | 16 | import json |
Alexander Gubanov | dac4738 | 2016-06-24 16:49:36 +0300 | [diff] [blame] | 17 | import re |
Alexander Gubanov | 509e284 | 2015-06-09 15:29:51 +0300 | [diff] [blame] | 18 | |
zhufl | 44fce68 | 2016-11-23 15:37:49 +0800 | [diff] [blame] | 19 | from tempest.common import waiters |
Matthew Treinish | 6c07229 | 2014-01-29 19:15:52 +0000 | [diff] [blame] | 20 | from tempest import config |
YAMAMOTO Takashi | d5f7e23 | 2017-01-16 12:31:59 +0900 | [diff] [blame] | 21 | from tempest.lib.common.utils import data_utils |
Jordan Pittier | 35a6375 | 2016-08-30 13:09:12 +0200 | [diff] [blame] | 22 | from tempest.lib.common.utils import test_utils |
Ken'ichi Ohmichi | c85a951 | 2017-01-27 18:34:24 -0800 | [diff] [blame] | 23 | from tempest.lib import decorators |
guo yunxian | 7383a6f | 2016-12-05 18:56:51 +0800 | [diff] [blame] | 24 | from tempest.lib import exceptions |
Sean Dague | 6dbc6da | 2013-05-08 17:49:46 -0400 | [diff] [blame] | 25 | from tempest.scenario import manager |
Masayuki Igawa | 4ded9f0 | 2014-02-17 15:05:59 +0900 | [diff] [blame] | 26 | from tempest import test |
Jay Pipes | 051075a | 2012-04-28 17:39:37 -0400 | [diff] [blame] | 27 | |
Matthew Treinish | 6c07229 | 2014-01-29 19:15:52 +0000 | [diff] [blame] | 28 | CONF = config.CONF |
| 29 | |
Jay Pipes | 051075a | 2012-04-28 17:39:37 -0400 | [diff] [blame] | 30 | |
Ghanshyam | 5a305c4 | 2014-08-27 14:24:58 +0900 | [diff] [blame] | 31 | class TestServerBasicOps(manager.ScenarioTest): |
Jay Pipes | 051075a | 2012-04-28 17:39:37 -0400 | [diff] [blame] | 32 | |
Ken'ichi Ohmichi | c4e4f1c | 2015-11-17 08:16:12 +0000 | [diff] [blame] | 33 | """The test suite for server basic operations |
Jay Pipes | 051075a | 2012-04-28 17:39:37 -0400 | [diff] [blame] | 34 | |
Ken'ichi Ohmichi | c4e4f1c | 2015-11-17 08:16:12 +0000 | [diff] [blame] | 35 | This smoke test case follows this basic set of operations: |
Jay Pipes | 051075a | 2012-04-28 17:39:37 -0400 | [diff] [blame] | 36 | * Create a keypair for use in launching an instance |
| 37 | * Create a security group to control network access in instance |
| 38 | * Add simple permissive rules to the security group |
| 39 | * Launch an instance |
ghanshyam | 416c94c | 2014-10-02 13:47:25 +0900 | [diff] [blame] | 40 | * Perform ssh to instance |
YAMAMOTO Takashi | 1f62af2 | 2015-06-16 03:29:50 +0900 | [diff] [blame] | 41 | * Verify metadata service |
Alexander Gubanov | 509e284 | 2015-06-09 15:29:51 +0300 | [diff] [blame] | 42 | * Verify metadata on config_drive |
Jay Pipes | 051075a | 2012-04-28 17:39:37 -0400 | [diff] [blame] | 43 | * Terminate the instance |
| 44 | """ |
| 45 | |
Andrea Frittoli | f5da28b | 2013-12-06 07:08:07 +0000 | [diff] [blame] | 46 | def setUp(self): |
| 47 | super(TestServerBasicOps, self).setUp() |
Matthew Treinish | f2c4501 | 2016-06-22 21:13:42 -0400 | [diff] [blame] | 48 | self.image_ref = CONF.compute.image_ref |
| 49 | self.flavor_ref = CONF.compute.flavor_ref |
| 50 | self.run_ssh = CONF.validation.run_validation |
| 51 | self.ssh_user = CONF.validation.image_ssh_user |
Andrea Frittoli | f5da28b | 2013-12-06 07:08:07 +0000 | [diff] [blame] | 52 | |
Jordan Pittier | bbb1712 | 2016-01-26 17:10:55 +0100 | [diff] [blame] | 53 | def verify_ssh(self, keypair): |
Andrea Frittoli | f5da28b | 2013-12-06 07:08:07 +0000 | [diff] [blame] | 54 | if self.run_ssh: |
| 55 | # Obtain a floating IP |
Alexander Gubanov | 2388e2a | 2015-11-07 11:16:28 +0200 | [diff] [blame] | 56 | self.fip = self.create_floating_ip(self.instance)['ip'] |
Andrea Frittoli | f5da28b | 2013-12-06 07:08:07 +0000 | [diff] [blame] | 57 | # Check ssh |
YAMAMOTO Takashi | 1f62af2 | 2015-06-16 03:29:50 +0900 | [diff] [blame] | 58 | self.ssh_client = self.get_remote_client( |
Sean Dague | 20e9861 | 2016-01-06 14:33:28 -0500 | [diff] [blame] | 59 | ip_address=self.fip, |
YAMAMOTO Takashi | 42189bf | 2016-06-24 16:02:53 +0900 | [diff] [blame] | 60 | username=self.ssh_user, |
Jordan Pittier | bbb1712 | 2016-01-26 17:10:55 +0100 | [diff] [blame] | 61 | private_key=keypair['private_key']) |
Andrea Frittoli | f5da28b | 2013-12-06 07:08:07 +0000 | [diff] [blame] | 62 | |
YAMAMOTO Takashi | 1f62af2 | 2015-06-16 03:29:50 +0900 | [diff] [blame] | 63 | def verify_metadata(self): |
| 64 | if self.run_ssh and CONF.compute_feature_enabled.metadata_service: |
| 65 | # Verify metadata service |
Yaroslav Lobankov | 117a48f | 2015-08-11 11:40:44 +0300 | [diff] [blame] | 66 | md_url = 'http://169.254.169.254/latest/meta-data/public-ipv4' |
| 67 | |
| 68 | def exec_cmd_and_verify_output(): |
| 69 | cmd = 'curl ' + md_url |
Yaroslav Lobankov | 117a48f | 2015-08-11 11:40:44 +0300 | [diff] [blame] | 70 | result = self.ssh_client.exec_command(cmd) |
| 71 | if result: |
| 72 | msg = ('Failed while verifying metadata on server. Result ' |
Alexander Gubanov | 2388e2a | 2015-11-07 11:16:28 +0200 | [diff] [blame] | 73 | 'of command "%s" is NOT "%s".' % (cmd, self.fip)) |
| 74 | self.assertEqual(self.fip, result, msg) |
Yaroslav Lobankov | 117a48f | 2015-08-11 11:40:44 +0300 | [diff] [blame] | 75 | return 'Verification is successful!' |
| 76 | |
Jordan Pittier | 35a6375 | 2016-08-30 13:09:12 +0200 | [diff] [blame] | 77 | if not test_utils.call_until_true(exec_cmd_and_verify_output, |
| 78 | CONF.compute.build_timeout, |
| 79 | CONF.compute.build_interval): |
Yaroslav Lobankov | 117a48f | 2015-08-11 11:40:44 +0300 | [diff] [blame] | 80 | raise exceptions.TimeoutException('Timed out while waiting to ' |
| 81 | 'verify metadata on server. ' |
| 82 | '%s is empty.' % md_url) |
YAMAMOTO Takashi | 1f62af2 | 2015-06-16 03:29:50 +0900 | [diff] [blame] | 83 | |
YAMAMOTO Takashi | d5f7e23 | 2017-01-16 12:31:59 +0900 | [diff] [blame] | 84 | # Also, test a POST |
| 85 | md_url = 'http://169.254.169.254/openstack/2013-10-17/password' |
| 86 | data = data_utils.arbitrary_string(100) |
| 87 | cmd = 'curl -X POST -d ' + data + ' ' + md_url |
| 88 | self.ssh_client.exec_command(cmd) |
| 89 | result = self.servers_client.show_password(self.instance['id']) |
| 90 | self.assertEqual(data, result['password']) |
| 91 | |
Clark Boylan | df73bdf | 2016-07-06 09:55:28 -0700 | [diff] [blame] | 92 | def _mount_config_drive(self): |
| 93 | cmd_blkid = 'blkid | grep -i config-2' |
| 94 | result = self.ssh_client.exec_command(cmd_blkid) |
| 95 | dev_name = re.match('([^:]+)', result).group() |
| 96 | self.ssh_client.exec_command('sudo mount %s /mnt' % dev_name) |
| 97 | |
| 98 | def _unmount_config_drive(self): |
| 99 | self.ssh_client.exec_command('sudo umount /mnt') |
| 100 | |
Alexander Gubanov | 509e284 | 2015-06-09 15:29:51 +0300 | [diff] [blame] | 101 | def verify_metadata_on_config_drive(self): |
| 102 | if self.run_ssh and CONF.compute_feature_enabled.config_drive: |
| 103 | # Verify metadata on config_drive |
Clark Boylan | df73bdf | 2016-07-06 09:55:28 -0700 | [diff] [blame] | 104 | self._mount_config_drive() |
Alexander Gubanov | 509e284 | 2015-06-09 15:29:51 +0300 | [diff] [blame] | 105 | cmd_md = 'sudo cat /mnt/openstack/latest/meta_data.json' |
| 106 | result = self.ssh_client.exec_command(cmd_md) |
Clark Boylan | df73bdf | 2016-07-06 09:55:28 -0700 | [diff] [blame] | 107 | self._unmount_config_drive() |
Alexander Gubanov | 509e284 | 2015-06-09 15:29:51 +0300 | [diff] [blame] | 108 | result = json.loads(result) |
| 109 | self.assertIn('meta', result) |
| 110 | msg = ('Failed while verifying metadata on config_drive on server.' |
| 111 | ' Result of command "%s" is NOT "%s".' % (cmd_md, self.md)) |
| 112 | self.assertEqual(self.md, result['meta'], msg) |
| 113 | |
Clark Boylan | df73bdf | 2016-07-06 09:55:28 -0700 | [diff] [blame] | 114 | def verify_networkdata_on_config_drive(self): |
| 115 | if self.run_ssh and CONF.compute_feature_enabled.config_drive: |
| 116 | # Verify network data on config_drive |
| 117 | self._mount_config_drive() |
| 118 | cmd_md = 'sudo cat /mnt/openstack/latest/network_data.json' |
| 119 | result = self.ssh_client.exec_command(cmd_md) |
| 120 | self._unmount_config_drive() |
| 121 | result = json.loads(result) |
| 122 | self.assertIn('services', result) |
| 123 | self.assertIn('links', result) |
| 124 | self.assertIn('networks', result) |
| 125 | # TODO(clarkb) construct network_data from known network |
| 126 | # instance info and do direct comparison. |
| 127 | |
Ken'ichi Ohmichi | c85a951 | 2017-01-27 18:34:24 -0800 | [diff] [blame] | 128 | @decorators.idempotent_id('7fff3fb3-91d8-4fd0-bd7d-0204f1f180ba') |
Sean Dague | 3c634d1 | 2015-04-27 12:09:19 -0400 | [diff] [blame] | 129 | @test.attr(type='smoke') |
Masayuki Igawa | 4ded9f0 | 2014-02-17 15:05:59 +0900 | [diff] [blame] | 130 | @test.services('compute', 'network') |
Tong Liu | 9bee3b9 | 2016-03-23 23:53:43 +0000 | [diff] [blame] | 131 | def test_server_basic_ops(self): |
Jordan Pittier | bbb1712 | 2016-01-26 17:10:55 +0100 | [diff] [blame] | 132 | keypair = self.create_keypair() |
Jordan Pittier | 56c125e | 2016-09-16 16:20:22 +0200 | [diff] [blame] | 133 | security_group = self._create_security_group() |
lanoux | 5fc1452 | 2015-09-21 08:17:35 +0000 | [diff] [blame] | 134 | self.md = {'meta1': 'data1', 'meta2': 'data2', 'metaN': 'dataN'} |
| 135 | self.instance = self.create_server( |
| 136 | image_id=self.image_ref, |
| 137 | flavor=self.flavor_ref, |
Jordan Pittier | bbb1712 | 2016-01-26 17:10:55 +0100 | [diff] [blame] | 138 | key_name=keypair['name'], |
Jordan Pittier | 56c125e | 2016-09-16 16:20:22 +0200 | [diff] [blame] | 139 | security_groups=[{'name': security_group['name']}], |
lanoux | 5fc1452 | 2015-09-21 08:17:35 +0000 | [diff] [blame] | 140 | config_drive=CONF.compute_feature_enabled.config_drive, |
zhufl | 13c9c89 | 2017-02-10 12:04:07 +0800 | [diff] [blame] | 141 | metadata=self.md) |
Jordan Pittier | bbb1712 | 2016-01-26 17:10:55 +0100 | [diff] [blame] | 142 | self.verify_ssh(keypair) |
YAMAMOTO Takashi | 1f62af2 | 2015-06-16 03:29:50 +0900 | [diff] [blame] | 143 | self.verify_metadata() |
Alexander Gubanov | 509e284 | 2015-06-09 15:29:51 +0300 | [diff] [blame] | 144 | self.verify_metadata_on_config_drive() |
Clark Boylan | df73bdf | 2016-07-06 09:55:28 -0700 | [diff] [blame] | 145 | self.verify_networkdata_on_config_drive() |
Ghanshyam | 5a305c4 | 2014-08-27 14:24:58 +0900 | [diff] [blame] | 146 | self.servers_client.delete_server(self.instance['id']) |
zhufl | 44fce68 | 2016-11-23 15:37:49 +0800 | [diff] [blame] | 147 | waiters.wait_for_server_termination( |
| 148 | self.servers_client, self.instance['id'], ignore_error=False) |