ZhiQiang Fan | 39f9722 | 2013-09-20 04:49:44 +0800 | [diff] [blame] | 1 | # Copyright 2012 OpenStack Foundation |
Jay Pipes | 051075a | 2012-04-28 17:39:37 -0400 | [diff] [blame] | 2 | # All Rights Reserved. |
| 3 | # |
| 4 | # Licensed under the Apache License, Version 2.0 (the "License"); you may |
| 5 | # not use this file except in compliance with the License. You may obtain |
| 6 | # a copy of the License at |
| 7 | # |
| 8 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | # |
| 10 | # Unless required by applicable law or agreed to in writing, software |
| 11 | # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| 12 | # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the |
| 13 | # License for the specific language governing permissions and limitations |
| 14 | # under the License. |
| 15 | |
Alexander Gubanov | 509e284 | 2015-06-09 15:29:51 +0300 | [diff] [blame] | 16 | import json |
Alexander Gubanov | dac4738 | 2016-06-24 16:49:36 +0300 | [diff] [blame] | 17 | import re |
Alexander Gubanov | 509e284 | 2015-06-09 15:29:51 +0300 | [diff] [blame] | 18 | |
Andrea Frittoli | cd36841 | 2017-08-14 21:37:56 +0100 | [diff] [blame] | 19 | from tempest.common import utils |
zhufl | 44fce68 | 2016-11-23 15:37:49 +0800 | [diff] [blame] | 20 | from tempest.common import waiters |
Matthew Treinish | 6c07229 | 2014-01-29 19:15:52 +0000 | [diff] [blame] | 21 | from tempest import config |
YAMAMOTO Takashi | d5f7e23 | 2017-01-16 12:31:59 +0900 | [diff] [blame] | 22 | from tempest.lib.common.utils import data_utils |
Jordan Pittier | 35a6375 | 2016-08-30 13:09:12 +0200 | [diff] [blame] | 23 | from tempest.lib.common.utils import test_utils |
Ken'ichi Ohmichi | c85a951 | 2017-01-27 18:34:24 -0800 | [diff] [blame] | 24 | from tempest.lib import decorators |
guo yunxian | 7383a6f | 2016-12-05 18:56:51 +0800 | [diff] [blame] | 25 | from tempest.lib import exceptions |
Sean Dague | 6dbc6da | 2013-05-08 17:49:46 -0400 | [diff] [blame] | 26 | from tempest.scenario import manager |
Jay Pipes | 051075a | 2012-04-28 17:39:37 -0400 | [diff] [blame] | 27 | |
Matthew Treinish | 6c07229 | 2014-01-29 19:15:52 +0000 | [diff] [blame] | 28 | CONF = config.CONF |
| 29 | |
Jay Pipes | 051075a | 2012-04-28 17:39:37 -0400 | [diff] [blame] | 30 | |
Ghanshyam | 5a305c4 | 2014-08-27 14:24:58 +0900 | [diff] [blame] | 31 | class TestServerBasicOps(manager.ScenarioTest): |
Jay Pipes | 051075a | 2012-04-28 17:39:37 -0400 | [diff] [blame] | 32 | |
Ken'ichi Ohmichi | c4e4f1c | 2015-11-17 08:16:12 +0000 | [diff] [blame] | 33 | """The test suite for server basic operations |
Jay Pipes | 051075a | 2012-04-28 17:39:37 -0400 | [diff] [blame] | 34 | |
Ken'ichi Ohmichi | c4e4f1c | 2015-11-17 08:16:12 +0000 | [diff] [blame] | 35 | This smoke test case follows this basic set of operations: |
Jay Pipes | 051075a | 2012-04-28 17:39:37 -0400 | [diff] [blame] | 36 | * Create a keypair for use in launching an instance |
| 37 | * Create a security group to control network access in instance |
| 38 | * Add simple permissive rules to the security group |
| 39 | * Launch an instance |
ghanshyam | 416c94c | 2014-10-02 13:47:25 +0900 | [diff] [blame] | 40 | * Perform ssh to instance |
YAMAMOTO Takashi | 1f62af2 | 2015-06-16 03:29:50 +0900 | [diff] [blame] | 41 | * Verify metadata service |
Alexander Gubanov | 509e284 | 2015-06-09 15:29:51 +0300 | [diff] [blame] | 42 | * Verify metadata on config_drive |
Jay Pipes | 051075a | 2012-04-28 17:39:37 -0400 | [diff] [blame] | 43 | * Terminate the instance |
| 44 | """ |
| 45 | |
Matthew Treinish | 3312de3 | 2017-05-19 12:08:17 -0400 | [diff] [blame] | 46 | @classmethod |
| 47 | def skip_checks(cls): |
| 48 | super(TestServerBasicOps, cls).skip_checks() |
| 49 | if not CONF.network_feature_enabled.floating_ips: |
| 50 | raise cls.skipException("Floating ips are not available") |
| 51 | |
Andrea Frittoli | f5da28b | 2013-12-06 07:08:07 +0000 | [diff] [blame] | 52 | def setUp(self): |
| 53 | super(TestServerBasicOps, self).setUp() |
Matthew Treinish | f2c4501 | 2016-06-22 21:13:42 -0400 | [diff] [blame] | 54 | self.run_ssh = CONF.validation.run_validation |
| 55 | self.ssh_user = CONF.validation.image_ssh_user |
Andrea Frittoli | f5da28b | 2013-12-06 07:08:07 +0000 | [diff] [blame] | 56 | |
Jordan Pittier | bbb1712 | 2016-01-26 17:10:55 +0100 | [diff] [blame] | 57 | def verify_ssh(self, keypair): |
Andrea Frittoli | f5da28b | 2013-12-06 07:08:07 +0000 | [diff] [blame] | 58 | if self.run_ssh: |
| 59 | # Obtain a floating IP |
Alexander Gubanov | 2388e2a | 2015-11-07 11:16:28 +0200 | [diff] [blame] | 60 | self.fip = self.create_floating_ip(self.instance)['ip'] |
Andrea Frittoli | f5da28b | 2013-12-06 07:08:07 +0000 | [diff] [blame] | 61 | # Check ssh |
YAMAMOTO Takashi | 1f62af2 | 2015-06-16 03:29:50 +0900 | [diff] [blame] | 62 | self.ssh_client = self.get_remote_client( |
Sean Dague | 20e9861 | 2016-01-06 14:33:28 -0500 | [diff] [blame] | 63 | ip_address=self.fip, |
YAMAMOTO Takashi | 42189bf | 2016-06-24 16:02:53 +0900 | [diff] [blame] | 64 | username=self.ssh_user, |
zhufl | f52c759 | 2017-05-25 13:55:24 +0800 | [diff] [blame] | 65 | private_key=keypair['private_key'], |
| 66 | server=self.instance) |
Andrea Frittoli | f5da28b | 2013-12-06 07:08:07 +0000 | [diff] [blame] | 67 | |
YAMAMOTO Takashi | 1f62af2 | 2015-06-16 03:29:50 +0900 | [diff] [blame] | 68 | def verify_metadata(self): |
| 69 | if self.run_ssh and CONF.compute_feature_enabled.metadata_service: |
| 70 | # Verify metadata service |
Yaroslav Lobankov | 117a48f | 2015-08-11 11:40:44 +0300 | [diff] [blame] | 71 | md_url = 'http://169.254.169.254/latest/meta-data/public-ipv4' |
| 72 | |
| 73 | def exec_cmd_and_verify_output(): |
| 74 | cmd = 'curl ' + md_url |
Yaroslav Lobankov | 117a48f | 2015-08-11 11:40:44 +0300 | [diff] [blame] | 75 | result = self.ssh_client.exec_command(cmd) |
| 76 | if result: |
| 77 | msg = ('Failed while verifying metadata on server. Result ' |
Alexander Gubanov | 2388e2a | 2015-11-07 11:16:28 +0200 | [diff] [blame] | 78 | 'of command "%s" is NOT "%s".' % (cmd, self.fip)) |
| 79 | self.assertEqual(self.fip, result, msg) |
Yaroslav Lobankov | 117a48f | 2015-08-11 11:40:44 +0300 | [diff] [blame] | 80 | return 'Verification is successful!' |
| 81 | |
Jordan Pittier | 35a6375 | 2016-08-30 13:09:12 +0200 | [diff] [blame] | 82 | if not test_utils.call_until_true(exec_cmd_and_verify_output, |
| 83 | CONF.compute.build_timeout, |
| 84 | CONF.compute.build_interval): |
Yaroslav Lobankov | 117a48f | 2015-08-11 11:40:44 +0300 | [diff] [blame] | 85 | raise exceptions.TimeoutException('Timed out while waiting to ' |
| 86 | 'verify metadata on server. ' |
| 87 | '%s is empty.' % md_url) |
YAMAMOTO Takashi | 1f62af2 | 2015-06-16 03:29:50 +0900 | [diff] [blame] | 88 | |
YAMAMOTO Takashi | d5f7e23 | 2017-01-16 12:31:59 +0900 | [diff] [blame] | 89 | # Also, test a POST |
| 90 | md_url = 'http://169.254.169.254/openstack/2013-10-17/password' |
| 91 | data = data_utils.arbitrary_string(100) |
| 92 | cmd = 'curl -X POST -d ' + data + ' ' + md_url |
| 93 | self.ssh_client.exec_command(cmd) |
| 94 | result = self.servers_client.show_password(self.instance['id']) |
| 95 | self.assertEqual(data, result['password']) |
| 96 | |
Clark Boylan | df73bdf | 2016-07-06 09:55:28 -0700 | [diff] [blame] | 97 | def _mount_config_drive(self): |
| 98 | cmd_blkid = 'blkid | grep -i config-2' |
| 99 | result = self.ssh_client.exec_command(cmd_blkid) |
| 100 | dev_name = re.match('([^:]+)', result).group() |
| 101 | self.ssh_client.exec_command('sudo mount %s /mnt' % dev_name) |
| 102 | |
| 103 | def _unmount_config_drive(self): |
| 104 | self.ssh_client.exec_command('sudo umount /mnt') |
| 105 | |
Alexander Gubanov | 509e284 | 2015-06-09 15:29:51 +0300 | [diff] [blame] | 106 | def verify_metadata_on_config_drive(self): |
| 107 | if self.run_ssh and CONF.compute_feature_enabled.config_drive: |
| 108 | # Verify metadata on config_drive |
Clark Boylan | df73bdf | 2016-07-06 09:55:28 -0700 | [diff] [blame] | 109 | self._mount_config_drive() |
Alexander Gubanov | 509e284 | 2015-06-09 15:29:51 +0300 | [diff] [blame] | 110 | cmd_md = 'sudo cat /mnt/openstack/latest/meta_data.json' |
| 111 | result = self.ssh_client.exec_command(cmd_md) |
Clark Boylan | df73bdf | 2016-07-06 09:55:28 -0700 | [diff] [blame] | 112 | self._unmount_config_drive() |
Alexander Gubanov | 509e284 | 2015-06-09 15:29:51 +0300 | [diff] [blame] | 113 | result = json.loads(result) |
| 114 | self.assertIn('meta', result) |
| 115 | msg = ('Failed while verifying metadata on config_drive on server.' |
| 116 | ' Result of command "%s" is NOT "%s".' % (cmd_md, self.md)) |
| 117 | self.assertEqual(self.md, result['meta'], msg) |
| 118 | |
Clark Boylan | df73bdf | 2016-07-06 09:55:28 -0700 | [diff] [blame] | 119 | def verify_networkdata_on_config_drive(self): |
| 120 | if self.run_ssh and CONF.compute_feature_enabled.config_drive: |
| 121 | # Verify network data on config_drive |
| 122 | self._mount_config_drive() |
| 123 | cmd_md = 'sudo cat /mnt/openstack/latest/network_data.json' |
| 124 | result = self.ssh_client.exec_command(cmd_md) |
| 125 | self._unmount_config_drive() |
| 126 | result = json.loads(result) |
| 127 | self.assertIn('services', result) |
| 128 | self.assertIn('links', result) |
| 129 | self.assertIn('networks', result) |
| 130 | # TODO(clarkb) construct network_data from known network |
| 131 | # instance info and do direct comparison. |
| 132 | |
Ken'ichi Ohmichi | c85a951 | 2017-01-27 18:34:24 -0800 | [diff] [blame] | 133 | @decorators.idempotent_id('7fff3fb3-91d8-4fd0-bd7d-0204f1f180ba') |
Jordan Pittier | 3b46d27 | 2017-04-12 16:17:28 +0200 | [diff] [blame] | 134 | @decorators.attr(type='smoke') |
Andrea Frittoli | cd36841 | 2017-08-14 21:37:56 +0100 | [diff] [blame] | 135 | @utils.services('compute', 'network') |
Tong Liu | 9bee3b9 | 2016-03-23 23:53:43 +0000 | [diff] [blame] | 136 | def test_server_basic_ops(self): |
Jordan Pittier | bbb1712 | 2016-01-26 17:10:55 +0100 | [diff] [blame] | 137 | keypair = self.create_keypair() |
Jordan Pittier | 56c125e | 2016-09-16 16:20:22 +0200 | [diff] [blame] | 138 | security_group = self._create_security_group() |
lanoux | 5fc1452 | 2015-09-21 08:17:35 +0000 | [diff] [blame] | 139 | self.md = {'meta1': 'data1', 'meta2': 'data2', 'metaN': 'dataN'} |
| 140 | self.instance = self.create_server( |
Jordan Pittier | bbb1712 | 2016-01-26 17:10:55 +0100 | [diff] [blame] | 141 | key_name=keypair['name'], |
Jordan Pittier | 56c125e | 2016-09-16 16:20:22 +0200 | [diff] [blame] | 142 | security_groups=[{'name': security_group['name']}], |
lanoux | 5fc1452 | 2015-09-21 08:17:35 +0000 | [diff] [blame] | 143 | config_drive=CONF.compute_feature_enabled.config_drive, |
zhufl | 13c9c89 | 2017-02-10 12:04:07 +0800 | [diff] [blame] | 144 | metadata=self.md) |
Jordan Pittier | bbb1712 | 2016-01-26 17:10:55 +0100 | [diff] [blame] | 145 | self.verify_ssh(keypair) |
YAMAMOTO Takashi | 1f62af2 | 2015-06-16 03:29:50 +0900 | [diff] [blame] | 146 | self.verify_metadata() |
Alexander Gubanov | 509e284 | 2015-06-09 15:29:51 +0300 | [diff] [blame] | 147 | self.verify_metadata_on_config_drive() |
Clark Boylan | df73bdf | 2016-07-06 09:55:28 -0700 | [diff] [blame] | 148 | self.verify_networkdata_on_config_drive() |
Ghanshyam | 5a305c4 | 2014-08-27 14:24:58 +0900 | [diff] [blame] | 149 | self.servers_client.delete_server(self.instance['id']) |
zhufl | 44fce68 | 2016-11-23 15:37:49 +0800 | [diff] [blame] | 150 | waiters.wait_for_server_termination( |
| 151 | self.servers_client, self.instance['id'], ignore_error=False) |