ZhiQiang Fan | 39f9722 | 2013-09-20 04:49:44 +0800 | [diff] [blame] | 1 | # Copyright 2012 OpenStack Foundation |
Jay Pipes | 051075a | 2012-04-28 17:39:37 -0400 | [diff] [blame] | 2 | # All Rights Reserved. |
| 3 | # |
| 4 | # Licensed under the Apache License, Version 2.0 (the "License"); you may |
| 5 | # not use this file except in compliance with the License. You may obtain |
| 6 | # a copy of the License at |
| 7 | # |
| 8 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | # |
| 10 | # Unless required by applicable law or agreed to in writing, software |
| 11 | # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| 12 | # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the |
| 13 | # License for the specific language governing permissions and limitations |
| 14 | # under the License. |
| 15 | |
Alexander Gubanov | 509e284 | 2015-06-09 15:29:51 +0300 | [diff] [blame] | 16 | import json |
Alexander Gubanov | dac4738 | 2016-06-24 16:49:36 +0300 | [diff] [blame] | 17 | import re |
Alexander Gubanov | 509e284 | 2015-06-09 15:29:51 +0300 | [diff] [blame] | 18 | |
Matthew Treinish | 6c07229 | 2014-01-29 19:15:52 +0000 | [diff] [blame] | 19 | from tempest import config |
Yaroslav Lobankov | 117a48f | 2015-08-11 11:40:44 +0300 | [diff] [blame] | 20 | from tempest import exceptions |
Jordan Pittier | 35a6375 | 2016-08-30 13:09:12 +0200 | [diff] [blame] | 21 | from tempest.lib.common.utils import test_utils |
Sean Dague | 6dbc6da | 2013-05-08 17:49:46 -0400 | [diff] [blame] | 22 | from tempest.scenario import manager |
Masayuki Igawa | 4ded9f0 | 2014-02-17 15:05:59 +0900 | [diff] [blame] | 23 | from tempest import test |
Jay Pipes | 051075a | 2012-04-28 17:39:37 -0400 | [diff] [blame] | 24 | |
Matthew Treinish | 6c07229 | 2014-01-29 19:15:52 +0000 | [diff] [blame] | 25 | CONF = config.CONF |
| 26 | |
Jay Pipes | 051075a | 2012-04-28 17:39:37 -0400 | [diff] [blame] | 27 | |
Ghanshyam | 5a305c4 | 2014-08-27 14:24:58 +0900 | [diff] [blame] | 28 | class TestServerBasicOps(manager.ScenarioTest): |
Jay Pipes | 051075a | 2012-04-28 17:39:37 -0400 | [diff] [blame] | 29 | |
Ken'ichi Ohmichi | c4e4f1c | 2015-11-17 08:16:12 +0000 | [diff] [blame] | 30 | """The test suite for server basic operations |
Jay Pipes | 051075a | 2012-04-28 17:39:37 -0400 | [diff] [blame] | 31 | |
Ken'ichi Ohmichi | c4e4f1c | 2015-11-17 08:16:12 +0000 | [diff] [blame] | 32 | This smoke test case follows this basic set of operations: |
Jay Pipes | 051075a | 2012-04-28 17:39:37 -0400 | [diff] [blame] | 33 | * Create a keypair for use in launching an instance |
| 34 | * Create a security group to control network access in instance |
| 35 | * Add simple permissive rules to the security group |
| 36 | * Launch an instance |
ghanshyam | 416c94c | 2014-10-02 13:47:25 +0900 | [diff] [blame] | 37 | * Perform ssh to instance |
YAMAMOTO Takashi | 1f62af2 | 2015-06-16 03:29:50 +0900 | [diff] [blame] | 38 | * Verify metadata service |
Alexander Gubanov | 509e284 | 2015-06-09 15:29:51 +0300 | [diff] [blame] | 39 | * Verify metadata on config_drive |
Jay Pipes | 051075a | 2012-04-28 17:39:37 -0400 | [diff] [blame] | 40 | * Terminate the instance |
| 41 | """ |
| 42 | |
Andrea Frittoli | f5da28b | 2013-12-06 07:08:07 +0000 | [diff] [blame] | 43 | def setUp(self): |
| 44 | super(TestServerBasicOps, self).setUp() |
Matthew Treinish | f2c4501 | 2016-06-22 21:13:42 -0400 | [diff] [blame] | 45 | self.image_ref = CONF.compute.image_ref |
| 46 | self.flavor_ref = CONF.compute.flavor_ref |
| 47 | self.run_ssh = CONF.validation.run_validation |
| 48 | self.ssh_user = CONF.validation.image_ssh_user |
Andrea Frittoli | f5da28b | 2013-12-06 07:08:07 +0000 | [diff] [blame] | 49 | |
Jordan Pittier | bbb1712 | 2016-01-26 17:10:55 +0100 | [diff] [blame] | 50 | def verify_ssh(self, keypair): |
Andrea Frittoli | f5da28b | 2013-12-06 07:08:07 +0000 | [diff] [blame] | 51 | if self.run_ssh: |
| 52 | # Obtain a floating IP |
Alexander Gubanov | 2388e2a | 2015-11-07 11:16:28 +0200 | [diff] [blame] | 53 | self.fip = self.create_floating_ip(self.instance)['ip'] |
Andrea Frittoli | f5da28b | 2013-12-06 07:08:07 +0000 | [diff] [blame] | 54 | # Check ssh |
YAMAMOTO Takashi | 1f62af2 | 2015-06-16 03:29:50 +0900 | [diff] [blame] | 55 | self.ssh_client = self.get_remote_client( |
Sean Dague | 20e9861 | 2016-01-06 14:33:28 -0500 | [diff] [blame] | 56 | ip_address=self.fip, |
YAMAMOTO Takashi | 42189bf | 2016-06-24 16:02:53 +0900 | [diff] [blame] | 57 | username=self.ssh_user, |
Jordan Pittier | bbb1712 | 2016-01-26 17:10:55 +0100 | [diff] [blame] | 58 | private_key=keypair['private_key']) |
Andrea Frittoli | f5da28b | 2013-12-06 07:08:07 +0000 | [diff] [blame] | 59 | |
YAMAMOTO Takashi | 1f62af2 | 2015-06-16 03:29:50 +0900 | [diff] [blame] | 60 | def verify_metadata(self): |
| 61 | if self.run_ssh and CONF.compute_feature_enabled.metadata_service: |
| 62 | # Verify metadata service |
Yaroslav Lobankov | 117a48f | 2015-08-11 11:40:44 +0300 | [diff] [blame] | 63 | md_url = 'http://169.254.169.254/latest/meta-data/public-ipv4' |
| 64 | |
| 65 | def exec_cmd_and_verify_output(): |
| 66 | cmd = 'curl ' + md_url |
Yaroslav Lobankov | 117a48f | 2015-08-11 11:40:44 +0300 | [diff] [blame] | 67 | result = self.ssh_client.exec_command(cmd) |
| 68 | if result: |
| 69 | msg = ('Failed while verifying metadata on server. Result ' |
Alexander Gubanov | 2388e2a | 2015-11-07 11:16:28 +0200 | [diff] [blame] | 70 | 'of command "%s" is NOT "%s".' % (cmd, self.fip)) |
| 71 | self.assertEqual(self.fip, result, msg) |
Yaroslav Lobankov | 117a48f | 2015-08-11 11:40:44 +0300 | [diff] [blame] | 72 | return 'Verification is successful!' |
| 73 | |
Jordan Pittier | 35a6375 | 2016-08-30 13:09:12 +0200 | [diff] [blame] | 74 | if not test_utils.call_until_true(exec_cmd_and_verify_output, |
| 75 | CONF.compute.build_timeout, |
| 76 | CONF.compute.build_interval): |
Yaroslav Lobankov | 117a48f | 2015-08-11 11:40:44 +0300 | [diff] [blame] | 77 | raise exceptions.TimeoutException('Timed out while waiting to ' |
| 78 | 'verify metadata on server. ' |
| 79 | '%s is empty.' % md_url) |
YAMAMOTO Takashi | 1f62af2 | 2015-06-16 03:29:50 +0900 | [diff] [blame] | 80 | |
Clark Boylan | df73bdf | 2016-07-06 09:55:28 -0700 | [diff] [blame] | 81 | def _mount_config_drive(self): |
| 82 | cmd_blkid = 'blkid | grep -i config-2' |
| 83 | result = self.ssh_client.exec_command(cmd_blkid) |
| 84 | dev_name = re.match('([^:]+)', result).group() |
| 85 | self.ssh_client.exec_command('sudo mount %s /mnt' % dev_name) |
| 86 | |
| 87 | def _unmount_config_drive(self): |
| 88 | self.ssh_client.exec_command('sudo umount /mnt') |
| 89 | |
Alexander Gubanov | 509e284 | 2015-06-09 15:29:51 +0300 | [diff] [blame] | 90 | def verify_metadata_on_config_drive(self): |
| 91 | if self.run_ssh and CONF.compute_feature_enabled.config_drive: |
| 92 | # Verify metadata on config_drive |
Clark Boylan | df73bdf | 2016-07-06 09:55:28 -0700 | [diff] [blame] | 93 | self._mount_config_drive() |
Alexander Gubanov | 509e284 | 2015-06-09 15:29:51 +0300 | [diff] [blame] | 94 | cmd_md = 'sudo cat /mnt/openstack/latest/meta_data.json' |
| 95 | result = self.ssh_client.exec_command(cmd_md) |
Clark Boylan | df73bdf | 2016-07-06 09:55:28 -0700 | [diff] [blame] | 96 | self._unmount_config_drive() |
Alexander Gubanov | 509e284 | 2015-06-09 15:29:51 +0300 | [diff] [blame] | 97 | result = json.loads(result) |
| 98 | self.assertIn('meta', result) |
| 99 | msg = ('Failed while verifying metadata on config_drive on server.' |
| 100 | ' Result of command "%s" is NOT "%s".' % (cmd_md, self.md)) |
| 101 | self.assertEqual(self.md, result['meta'], msg) |
| 102 | |
Clark Boylan | df73bdf | 2016-07-06 09:55:28 -0700 | [diff] [blame] | 103 | def verify_networkdata_on_config_drive(self): |
| 104 | if self.run_ssh and CONF.compute_feature_enabled.config_drive: |
| 105 | # Verify network data on config_drive |
| 106 | self._mount_config_drive() |
| 107 | cmd_md = 'sudo cat /mnt/openstack/latest/network_data.json' |
| 108 | result = self.ssh_client.exec_command(cmd_md) |
| 109 | self._unmount_config_drive() |
| 110 | result = json.loads(result) |
| 111 | self.assertIn('services', result) |
| 112 | self.assertIn('links', result) |
| 113 | self.assertIn('networks', result) |
| 114 | # TODO(clarkb) construct network_data from known network |
| 115 | # instance info and do direct comparison. |
| 116 | |
Chris Hoge | 7579c1a | 2015-02-26 14:12:15 -0800 | [diff] [blame] | 117 | @test.idempotent_id('7fff3fb3-91d8-4fd0-bd7d-0204f1f180ba') |
Sean Dague | 3c634d1 | 2015-04-27 12:09:19 -0400 | [diff] [blame] | 118 | @test.attr(type='smoke') |
Masayuki Igawa | 4ded9f0 | 2014-02-17 15:05:59 +0900 | [diff] [blame] | 119 | @test.services('compute', 'network') |
Tong Liu | 9bee3b9 | 2016-03-23 23:53:43 +0000 | [diff] [blame] | 120 | def test_server_basic_ops(self): |
Jordan Pittier | bbb1712 | 2016-01-26 17:10:55 +0100 | [diff] [blame] | 121 | keypair = self.create_keypair() |
Jordan Pittier | 56c125e | 2016-09-16 16:20:22 +0200 | [diff] [blame] | 122 | security_group = self._create_security_group() |
lanoux | 5fc1452 | 2015-09-21 08:17:35 +0000 | [diff] [blame] | 123 | self.md = {'meta1': 'data1', 'meta2': 'data2', 'metaN': 'dataN'} |
| 124 | self.instance = self.create_server( |
| 125 | image_id=self.image_ref, |
| 126 | flavor=self.flavor_ref, |
Jordan Pittier | bbb1712 | 2016-01-26 17:10:55 +0100 | [diff] [blame] | 127 | key_name=keypair['name'], |
Jordan Pittier | 56c125e | 2016-09-16 16:20:22 +0200 | [diff] [blame] | 128 | security_groups=[{'name': security_group['name']}], |
lanoux | 5fc1452 | 2015-09-21 08:17:35 +0000 | [diff] [blame] | 129 | config_drive=CONF.compute_feature_enabled.config_drive, |
| 130 | metadata=self.md, |
| 131 | wait_until='ACTIVE') |
Jordan Pittier | bbb1712 | 2016-01-26 17:10:55 +0100 | [diff] [blame] | 132 | self.verify_ssh(keypair) |
YAMAMOTO Takashi | 1f62af2 | 2015-06-16 03:29:50 +0900 | [diff] [blame] | 133 | self.verify_metadata() |
Alexander Gubanov | 509e284 | 2015-06-09 15:29:51 +0300 | [diff] [blame] | 134 | self.verify_metadata_on_config_drive() |
Clark Boylan | df73bdf | 2016-07-06 09:55:28 -0700 | [diff] [blame] | 135 | self.verify_networkdata_on_config_drive() |
Ghanshyam | 5a305c4 | 2014-08-27 14:24:58 +0900 | [diff] [blame] | 136 | self.servers_client.delete_server(self.instance['id']) |