blob: d5c378eeefefdea710148ce7ba979b0d5af9469f [file] [log] [blame]
ZhiQiang Fan39f97222013-09-20 04:49:44 +08001# Copyright 2012 OpenStack Foundation
Jay Pipes051075a2012-04-28 17:39:37 -04002# All Rights Reserved.
3#
4# Licensed under the Apache License, Version 2.0 (the "License"); you may
5# not use this file except in compliance with the License. You may obtain
6# a copy of the License at
7#
8# http://www.apache.org/licenses/LICENSE-2.0
9#
10# Unless required by applicable law or agreed to in writing, software
11# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
12# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
13# License for the specific language governing permissions and limitations
14# under the License.
15
Alexander Gubanov509e2842015-06-09 15:29:51 +030016import json
Alexander Gubanovdac47382016-06-24 16:49:36 +030017import re
Alexander Gubanov509e2842015-06-09 15:29:51 +030018
Andrea Frittolicd368412017-08-14 21:37:56 +010019from tempest.common import utils
zhufl44fce682016-11-23 15:37:49 +080020from tempest.common import waiters
Matthew Treinish6c072292014-01-29 19:15:52 +000021from tempest import config
YAMAMOTO Takashid5f7e232017-01-16 12:31:59 +090022from tempest.lib.common.utils import data_utils
Jordan Pittier35a63752016-08-30 13:09:12 +020023from tempest.lib.common.utils import test_utils
Ken'ichi Ohmichic85a9512017-01-27 18:34:24 -080024from tempest.lib import decorators
guo yunxian7383a6f2016-12-05 18:56:51 +080025from tempest.lib import exceptions
Sean Dague6dbc6da2013-05-08 17:49:46 -040026from tempest.scenario import manager
Jay Pipes051075a2012-04-28 17:39:37 -040027
Matthew Treinish6c072292014-01-29 19:15:52 +000028CONF = config.CONF
29
Jay Pipes051075a2012-04-28 17:39:37 -040030
Ghanshyam5a305c42014-08-27 14:24:58 +090031class TestServerBasicOps(manager.ScenarioTest):
Jay Pipes051075a2012-04-28 17:39:37 -040032
Ken'ichi Ohmichic4e4f1c2015-11-17 08:16:12 +000033 """The test suite for server basic operations
Jay Pipes051075a2012-04-28 17:39:37 -040034
Ken'ichi Ohmichic4e4f1c2015-11-17 08:16:12 +000035 This smoke test case follows this basic set of operations:
Jay Pipes051075a2012-04-28 17:39:37 -040036 * Create a keypair for use in launching an instance
37 * Create a security group to control network access in instance
38 * Add simple permissive rules to the security group
39 * Launch an instance
ghanshyam416c94c2014-10-02 13:47:25 +090040 * Perform ssh to instance
YAMAMOTO Takashi1f62af22015-06-16 03:29:50 +090041 * Verify metadata service
Alexander Gubanov509e2842015-06-09 15:29:51 +030042 * Verify metadata on config_drive
Jay Pipes051075a2012-04-28 17:39:37 -040043 * Terminate the instance
44 """
45
Matthew Treinish3312de32017-05-19 12:08:17 -040046 @classmethod
47 def skip_checks(cls):
48 super(TestServerBasicOps, cls).skip_checks()
49 if not CONF.network_feature_enabled.floating_ips:
50 raise cls.skipException("Floating ips are not available")
51
Andrea Frittolif5da28b2013-12-06 07:08:07 +000052 def setUp(self):
53 super(TestServerBasicOps, self).setUp()
Matthew Treinishf2c45012016-06-22 21:13:42 -040054 self.run_ssh = CONF.validation.run_validation
55 self.ssh_user = CONF.validation.image_ssh_user
Andrea Frittolif5da28b2013-12-06 07:08:07 +000056
Jordan Pittierbbb17122016-01-26 17:10:55 +010057 def verify_ssh(self, keypair):
Andrea Frittolif5da28b2013-12-06 07:08:07 +000058 if self.run_ssh:
59 # Obtain a floating IP
Alexander Gubanov2388e2a2015-11-07 11:16:28 +020060 self.fip = self.create_floating_ip(self.instance)['ip']
Andrea Frittolif5da28b2013-12-06 07:08:07 +000061 # Check ssh
YAMAMOTO Takashi1f62af22015-06-16 03:29:50 +090062 self.ssh_client = self.get_remote_client(
Sean Dague20e98612016-01-06 14:33:28 -050063 ip_address=self.fip,
YAMAMOTO Takashi42189bf2016-06-24 16:02:53 +090064 username=self.ssh_user,
zhuflf52c7592017-05-25 13:55:24 +080065 private_key=keypair['private_key'],
66 server=self.instance)
Andrea Frittolif5da28b2013-12-06 07:08:07 +000067
YAMAMOTO Takashi1f62af22015-06-16 03:29:50 +090068 def verify_metadata(self):
69 if self.run_ssh and CONF.compute_feature_enabled.metadata_service:
70 # Verify metadata service
Yaroslav Lobankov117a48f2015-08-11 11:40:44 +030071 md_url = 'http://169.254.169.254/latest/meta-data/public-ipv4'
72
73 def exec_cmd_and_verify_output():
74 cmd = 'curl ' + md_url
Yaroslav Lobankov117a48f2015-08-11 11:40:44 +030075 result = self.ssh_client.exec_command(cmd)
76 if result:
77 msg = ('Failed while verifying metadata on server. Result '
Alexander Gubanov2388e2a2015-11-07 11:16:28 +020078 'of command "%s" is NOT "%s".' % (cmd, self.fip))
79 self.assertEqual(self.fip, result, msg)
Yaroslav Lobankov117a48f2015-08-11 11:40:44 +030080 return 'Verification is successful!'
81
Jordan Pittier35a63752016-08-30 13:09:12 +020082 if not test_utils.call_until_true(exec_cmd_and_verify_output,
83 CONF.compute.build_timeout,
84 CONF.compute.build_interval):
Yaroslav Lobankov117a48f2015-08-11 11:40:44 +030085 raise exceptions.TimeoutException('Timed out while waiting to '
86 'verify metadata on server. '
87 '%s is empty.' % md_url)
YAMAMOTO Takashi1f62af22015-06-16 03:29:50 +090088
YAMAMOTO Takashid5f7e232017-01-16 12:31:59 +090089 # Also, test a POST
90 md_url = 'http://169.254.169.254/openstack/2013-10-17/password'
91 data = data_utils.arbitrary_string(100)
92 cmd = 'curl -X POST -d ' + data + ' ' + md_url
93 self.ssh_client.exec_command(cmd)
94 result = self.servers_client.show_password(self.instance['id'])
95 self.assertEqual(data, result['password'])
96
Clark Boylandf73bdf2016-07-06 09:55:28 -070097 def _mount_config_drive(self):
98 cmd_blkid = 'blkid | grep -i config-2'
99 result = self.ssh_client.exec_command(cmd_blkid)
100 dev_name = re.match('([^:]+)', result).group()
101 self.ssh_client.exec_command('sudo mount %s /mnt' % dev_name)
102
103 def _unmount_config_drive(self):
104 self.ssh_client.exec_command('sudo umount /mnt')
105
Alexander Gubanov509e2842015-06-09 15:29:51 +0300106 def verify_metadata_on_config_drive(self):
107 if self.run_ssh and CONF.compute_feature_enabled.config_drive:
108 # Verify metadata on config_drive
Clark Boylandf73bdf2016-07-06 09:55:28 -0700109 self._mount_config_drive()
Alexander Gubanov509e2842015-06-09 15:29:51 +0300110 cmd_md = 'sudo cat /mnt/openstack/latest/meta_data.json'
111 result = self.ssh_client.exec_command(cmd_md)
Clark Boylandf73bdf2016-07-06 09:55:28 -0700112 self._unmount_config_drive()
Alexander Gubanov509e2842015-06-09 15:29:51 +0300113 result = json.loads(result)
114 self.assertIn('meta', result)
115 msg = ('Failed while verifying metadata on config_drive on server.'
116 ' Result of command "%s" is NOT "%s".' % (cmd_md, self.md))
117 self.assertEqual(self.md, result['meta'], msg)
118
Clark Boylandf73bdf2016-07-06 09:55:28 -0700119 def verify_networkdata_on_config_drive(self):
120 if self.run_ssh and CONF.compute_feature_enabled.config_drive:
121 # Verify network data on config_drive
122 self._mount_config_drive()
123 cmd_md = 'sudo cat /mnt/openstack/latest/network_data.json'
124 result = self.ssh_client.exec_command(cmd_md)
125 self._unmount_config_drive()
126 result = json.loads(result)
127 self.assertIn('services', result)
128 self.assertIn('links', result)
129 self.assertIn('networks', result)
130 # TODO(clarkb) construct network_data from known network
131 # instance info and do direct comparison.
132
Ken'ichi Ohmichic85a9512017-01-27 18:34:24 -0800133 @decorators.idempotent_id('7fff3fb3-91d8-4fd0-bd7d-0204f1f180ba')
Jordan Pittier3b46d272017-04-12 16:17:28 +0200134 @decorators.attr(type='smoke')
Andrea Frittolicd368412017-08-14 21:37:56 +0100135 @utils.services('compute', 'network')
Tong Liu9bee3b92016-03-23 23:53:43 +0000136 def test_server_basic_ops(self):
Jordan Pittierbbb17122016-01-26 17:10:55 +0100137 keypair = self.create_keypair()
Jordan Pittier56c125e2016-09-16 16:20:22 +0200138 security_group = self._create_security_group()
lanoux5fc14522015-09-21 08:17:35 +0000139 self.md = {'meta1': 'data1', 'meta2': 'data2', 'metaN': 'dataN'}
140 self.instance = self.create_server(
Jordan Pittierbbb17122016-01-26 17:10:55 +0100141 key_name=keypair['name'],
Jordan Pittier56c125e2016-09-16 16:20:22 +0200142 security_groups=[{'name': security_group['name']}],
lanoux5fc14522015-09-21 08:17:35 +0000143 config_drive=CONF.compute_feature_enabled.config_drive,
zhufl13c9c892017-02-10 12:04:07 +0800144 metadata=self.md)
Jordan Pittierbbb17122016-01-26 17:10:55 +0100145 self.verify_ssh(keypair)
YAMAMOTO Takashi1f62af22015-06-16 03:29:50 +0900146 self.verify_metadata()
Alexander Gubanov509e2842015-06-09 15:29:51 +0300147 self.verify_metadata_on_config_drive()
Clark Boylandf73bdf2016-07-06 09:55:28 -0700148 self.verify_networkdata_on_config_drive()
Ghanshyam5a305c42014-08-27 14:24:58 +0900149 self.servers_client.delete_server(self.instance['id'])
zhufl44fce682016-11-23 15:37:49 +0800150 waiters.wait_for_server_termination(
151 self.servers_client, self.instance['id'], ignore_error=False)