blob: 3019cc421c6bcda9a37a04a29f87f538907ca3fd [file] [log] [blame]
ZhiQiang Fan39f97222013-09-20 04:49:44 +08001# Copyright 2012 OpenStack Foundation
Jay Pipes051075a2012-04-28 17:39:37 -04002# All Rights Reserved.
3#
4# Licensed under the Apache License, Version 2.0 (the "License"); you may
5# not use this file except in compliance with the License. You may obtain
6# a copy of the License at
7#
8# http://www.apache.org/licenses/LICENSE-2.0
9#
10# Unless required by applicable law or agreed to in writing, software
11# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
12# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
13# License for the specific language governing permissions and limitations
14# under the License.
15
Doug Hellmann583ce2c2015-03-11 14:55:46 +000016from oslo_log import log as logging
17
Matthew Treinish6c072292014-01-29 19:15:52 +000018from tempest import config
Yaroslav Lobankov117a48f2015-08-11 11:40:44 +030019from tempest import exceptions
Sean Dague6dbc6da2013-05-08 17:49:46 -040020from tempest.scenario import manager
Matthew Treinishd75edef2014-04-11 15:57:16 -040021from tempest.scenario import utils as test_utils
Masayuki Igawa4ded9f02014-02-17 15:05:59 +090022from tempest import test
Jay Pipes051075a2012-04-28 17:39:37 -040023
Matthew Treinish6c072292014-01-29 19:15:52 +000024CONF = config.CONF
25
Jay Pipes051075a2012-04-28 17:39:37 -040026LOG = logging.getLogger(__name__)
27
Matthew Treinisha0048cb2014-04-08 17:44:42 -040028load_tests = test_utils.load_tests_input_scenario_utils
Andrea Frittolif5da28b2013-12-06 07:08:07 +000029
Jay Pipes051075a2012-04-28 17:39:37 -040030
Ghanshyam5a305c42014-08-27 14:24:58 +090031class TestServerBasicOps(manager.ScenarioTest):
Jay Pipes051075a2012-04-28 17:39:37 -040032
33 """
34 This smoke test case follows this basic set of operations:
35
36 * Create a keypair for use in launching an instance
37 * Create a security group to control network access in instance
38 * Add simple permissive rules to the security group
39 * Launch an instance
ghanshyam416c94c2014-10-02 13:47:25 +090040 * Perform ssh to instance
YAMAMOTO Takashi1f62af22015-06-16 03:29:50 +090041 * Verify metadata service
Jay Pipes051075a2012-04-28 17:39:37 -040042 * Terminate the instance
43 """
44
Andrea Frittolif5da28b2013-12-06 07:08:07 +000045 def setUp(self):
46 super(TestServerBasicOps, self).setUp()
47 # Setup image and flavor the test instance
48 # Support both configured and injected values
49 if not hasattr(self, 'image_ref'):
Matthew Treinish6c072292014-01-29 19:15:52 +000050 self.image_ref = CONF.compute.image_ref
Andrea Frittolif5da28b2013-12-06 07:08:07 +000051 if not hasattr(self, 'flavor_ref'):
Matthew Treinish6c072292014-01-29 19:15:52 +000052 self.flavor_ref = CONF.compute.flavor_ref
Matthew Treinish96cadf42015-05-14 19:45:59 -040053 self.image_utils = test_utils.ImageUtils(self.manager)
Andrea Frittolif5da28b2013-12-06 07:08:07 +000054 if not self.image_utils.is_flavor_enough(self.flavor_ref,
55 self.image_ref):
56 raise self.skipException(
57 '{image} does not fit in {flavor}'.format(
58 image=self.image_ref, flavor=self.flavor_ref
59 )
60 )
Matthew Treinishe5cca002015-05-11 15:36:50 -040061 self.run_ssh = CONF.validation.run_validation and \
Andrea Frittolif5da28b2013-12-06 07:08:07 +000062 self.image_utils.is_sshable_image(self.image_ref)
63 self.ssh_user = self.image_utils.ssh_user(self.image_ref)
64 LOG.debug('Starting test for i:{image}, f:{flavor}. '
65 'Run ssh: {ssh}, user: {ssh_user}'.format(
66 image=self.image_ref, flavor=self.flavor_ref,
67 ssh=self.run_ssh, ssh_user=self.ssh_user))
68
Ken'ichi Ohmichi599d1b82013-08-19 18:48:37 +090069 def add_keypair(self):
70 self.keypair = self.create_keypair()
Jay Pipes051075a2012-04-28 17:39:37 -040071
ivan-zhu19977392013-01-12 21:57:55 +080072 def boot_instance(self):
Andrea Frittolif5da28b2013-12-06 07:08:07 +000073 # Create server with image and flavor from input scenario
Ken'ichi Ohmichi1b3461e2014-12-02 03:41:07 +000074 security_groups = [{'name': self.security_group['name']}]
Jay Pipes051075a2012-04-28 17:39:37 -040075 create_kwargs = {
Ghanshyam5a305c42014-08-27 14:24:58 +090076 'key_name': self.keypair['name'],
Grishkin0f1e11c2014-05-04 20:44:52 +040077 'security_groups': security_groups
Jay Pipes051075a2012-04-28 17:39:37 -040078 }
Matthew Treinishb7144eb2013-12-13 22:57:35 +000079 self.instance = self.create_server(image=self.image_ref,
80 flavor=self.flavor_ref,
81 create_kwargs=create_kwargs)
ivan-zhu19977392013-01-12 21:57:55 +080082
Andrea Frittolif5da28b2013-12-06 07:08:07 +000083 def verify_ssh(self):
84 if self.run_ssh:
85 # Obtain a floating IP
YAMAMOTO Takashi1f62af22015-06-16 03:29:50 +090086 self.floating_ip = self.floating_ips_client.create_floating_ip()
Ghanshyam5a305c42014-08-27 14:24:58 +090087 self.addCleanup(self.delete_wrapper,
88 self.floating_ips_client.delete_floating_ip,
YAMAMOTO Takashi1f62af22015-06-16 03:29:50 +090089 self.floating_ip['id'])
Andrea Frittolif5da28b2013-12-06 07:08:07 +000090 # Attach a floating IP
Ghanshyam5a305c42014-08-27 14:24:58 +090091 self.floating_ips_client.associate_floating_ip_to_server(
YAMAMOTO Takashi1f62af22015-06-16 03:29:50 +090092 self.floating_ip['ip'], self.instance['id'])
Andrea Frittolif5da28b2013-12-06 07:08:07 +000093 # Check ssh
YAMAMOTO Takashi1f62af22015-06-16 03:29:50 +090094 self.ssh_client = self.get_remote_client(
95 server_or_ip=self.floating_ip['ip'],
JordanP3fe2dc32014-11-17 13:06:01 +010096 username=self.image_utils.ssh_user(self.image_ref),
97 private_key=self.keypair['private_key'])
Andrea Frittolif5da28b2013-12-06 07:08:07 +000098
YAMAMOTO Takashi1f62af22015-06-16 03:29:50 +090099 def verify_metadata(self):
100 if self.run_ssh and CONF.compute_feature_enabled.metadata_service:
101 # Verify metadata service
Yaroslav Lobankov117a48f2015-08-11 11:40:44 +0300102 md_url = 'http://169.254.169.254/latest/meta-data/public-ipv4'
103
104 def exec_cmd_and_verify_output():
105 cmd = 'curl ' + md_url
106 floating_ip = self.floating_ip['ip']
107 result = self.ssh_client.exec_command(cmd)
108 if result:
109 msg = ('Failed while verifying metadata on server. Result '
110 'of command "%s" is NOT "%s".' % (cmd, floating_ip))
111 self.assertEqual(floating_ip, result, msg)
112 return 'Verification is successful!'
113
114 if not test.call_until_true(exec_cmd_and_verify_output,
115 CONF.compute.build_timeout,
116 CONF.compute.build_interval):
117 raise exceptions.TimeoutException('Timed out while waiting to '
118 'verify metadata on server. '
119 '%s is empty.' % md_url)
YAMAMOTO Takashi1f62af22015-06-16 03:29:50 +0900120
Chris Hoge7579c1a2015-02-26 14:12:15 -0800121 @test.idempotent_id('7fff3fb3-91d8-4fd0-bd7d-0204f1f180ba')
Sean Dague3c634d12015-04-27 12:09:19 -0400122 @test.attr(type='smoke')
Masayuki Igawa4ded9f02014-02-17 15:05:59 +0900123 @test.services('compute', 'network')
ivan-zhu19977392013-01-12 21:57:55 +0800124 def test_server_basicops(self):
Ken'ichi Ohmichi599d1b82013-08-19 18:48:37 +0900125 self.add_keypair()
Yair Fried1fc32a12014-08-04 09:11:30 +0300126 self.security_group = self._create_security_group()
ivan-zhu19977392013-01-12 21:57:55 +0800127 self.boot_instance()
Andrea Frittolif5da28b2013-12-06 07:08:07 +0000128 self.verify_ssh()
YAMAMOTO Takashi1f62af22015-06-16 03:29:50 +0900129 self.verify_metadata()
Ghanshyam5a305c42014-08-27 14:24:58 +0900130 self.servers_client.delete_server(self.instance['id'])