Jay Pipes | 13b479b | 2012-06-11 14:52:27 -0400 | [diff] [blame] | 1 | # vim: tabstop=4 shiftwidth=4 softtabstop=4 |
| 2 | |
| 3 | # Copyright 2012 OpenStack, LLC |
| 4 | # All Rights Reserved. |
| 5 | # |
| 6 | # Licensed under the Apache License, Version 2.0 (the "License"); you may |
| 7 | # not use this file except in compliance with the License. You may obtain |
| 8 | # a copy of the License at |
| 9 | # |
| 10 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 11 | # |
| 12 | # Unless required by applicable law or agreed to in writing, software |
| 13 | # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| 14 | # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the |
| 15 | # License for the specific language governing permissions and limitations |
| 16 | # under the License. |
| 17 | |
Daryl Walleck | 6b9b288 | 2012-04-08 21:43:39 -0500 | [diff] [blame] | 18 | import base64 |
Jay Pipes | 13b479b | 2012-06-11 14:52:27 -0400 | [diff] [blame] | 19 | |
Mauro S. M. Rodrigues | 5411036 | 2013-02-15 13:14:04 -0500 | [diff] [blame] | 20 | import netaddr |
ivan-zhu | 1feeb38 | 2013-01-24 10:14:39 +0800 | [diff] [blame] | 21 | import testtools |
Jay Pipes | 13b479b | 2012-06-11 14:52:27 -0400 | [diff] [blame] | 22 | |
Matthew Treinish | a83a16e | 2012-12-07 13:44:02 -0500 | [diff] [blame] | 23 | |
Daryl Walleck | 6b9b288 | 2012-04-08 21:43:39 -0500 | [diff] [blame] | 24 | from tempest.common.utils.data_utils import rand_name |
| 25 | from tempest.common.utils.linux.remote_client import RemoteClient |
Matthew Treinish | a83a16e | 2012-12-07 13:44:02 -0500 | [diff] [blame] | 26 | import tempest.config |
Chris Yeoh | 9465b0b | 2013-02-09 22:19:15 +1030 | [diff] [blame] | 27 | from tempest.test import attr |
Daryl Walleck | 0aea003 | 2012-12-04 00:53:28 -0600 | [diff] [blame] | 28 | from tempest.tests import compute |
Matthew Treinish | a83a16e | 2012-12-07 13:44:02 -0500 | [diff] [blame] | 29 | from tempest.tests.compute import base |
Daryl Walleck | 6b9b288 | 2012-04-08 21:43:39 -0500 | [diff] [blame] | 30 | |
| 31 | |
Attila Fazekas | 19044d5 | 2013-02-16 07:35:06 +0100 | [diff] [blame^] | 32 | @attr(type='smoke') |
| 33 | class ServersTestJSON(base.BaseComputeTest): |
| 34 | _interface = 'json' |
Daryl Walleck | 6b9b288 | 2012-04-08 21:43:39 -0500 | [diff] [blame] | 35 | run_ssh = tempest.config.TempestConfig().compute.run_ssh |
Attila Fazekas | 19044d5 | 2013-02-16 07:35:06 +0100 | [diff] [blame^] | 36 | disk_config = None |
Daryl Walleck | 6b9b288 | 2012-04-08 21:43:39 -0500 | [diff] [blame] | 37 | |
Attila Fazekas | 19044d5 | 2013-02-16 07:35:06 +0100 | [diff] [blame^] | 38 | @classmethod |
Daryl Walleck | 6b9b288 | 2012-04-08 21:43:39 -0500 | [diff] [blame] | 39 | def setUpClass(cls): |
Attila Fazekas | 19044d5 | 2013-02-16 07:35:06 +0100 | [diff] [blame^] | 40 | super(ServersTestJSON, cls).setUpClass() |
Daryl Walleck | 6b9b288 | 2012-04-08 21:43:39 -0500 | [diff] [blame] | 41 | cls.meta = {'hello': 'world'} |
| 42 | cls.accessIPv4 = '1.1.1.1' |
Mauro S. M. Rodrigues | 5411036 | 2013-02-15 13:14:04 -0500 | [diff] [blame] | 43 | cls.accessIPv6 = '0000:0000:0000:0000:0000:babe:220.12.22.2' |
Daryl Walleck | 6b9b288 | 2012-04-08 21:43:39 -0500 | [diff] [blame] | 44 | cls.name = rand_name('server') |
| 45 | file_contents = 'This is a test file.' |
Pádraig Brady | c6081cf | 2013-01-04 17:43:53 +0000 | [diff] [blame] | 46 | personality = [{'path': '/test.txt', |
Daryl Walleck | 6b9b288 | 2012-04-08 21:43:39 -0500 | [diff] [blame] | 47 | 'contents': base64.b64encode(file_contents)}] |
| 48 | cls.client = cls.servers_client |
Zhongyue Luo | 79d8d36 | 2012-09-25 13:49:27 +0800 | [diff] [blame] | 49 | cli_resp = cls.client.create_server(cls.name, |
| 50 | cls.image_ref, |
| 51 | cls.flavor_ref, |
| 52 | meta=cls.meta, |
| 53 | accessIPv4=cls.accessIPv4, |
| 54 | accessIPv6=cls.accessIPv6, |
Daryl Walleck | 0aea003 | 2012-12-04 00:53:28 -0600 | [diff] [blame] | 55 | personality=personality, |
| 56 | disk_config=cls.disk_config) |
Zhongyue Luo | 79d8d36 | 2012-09-25 13:49:27 +0800 | [diff] [blame] | 57 | cls.resp, cls.server_initial = cli_resp |
Daryl Walleck | 6b9b288 | 2012-04-08 21:43:39 -0500 | [diff] [blame] | 58 | cls.password = cls.server_initial['adminPass'] |
| 59 | cls.client.wait_for_server_status(cls.server_initial['id'], 'ACTIVE') |
| 60 | resp, cls.server = cls.client.get_server(cls.server_initial['id']) |
| 61 | |
Attila Fazekas | 19044d5 | 2013-02-16 07:35:06 +0100 | [diff] [blame^] | 62 | @classmethod |
Daryl Walleck | 6b9b288 | 2012-04-08 21:43:39 -0500 | [diff] [blame] | 63 | def tearDownClass(cls): |
| 64 | cls.client.delete_server(cls.server_initial['id']) |
Attila Fazekas | 19044d5 | 2013-02-16 07:35:06 +0100 | [diff] [blame^] | 65 | super(ServersTestJSON, cls).tearDownClass() |
Daryl Walleck | 6b9b288 | 2012-04-08 21:43:39 -0500 | [diff] [blame] | 66 | |
| 67 | @attr(type='smoke') |
| 68 | def test_create_server_response(self): |
Sean Dague | 4dd2c0b | 2013-01-03 17:50:28 -0500 | [diff] [blame] | 69 | # Check that the required fields are returned with values |
Daryl Walleck | 6b9b288 | 2012-04-08 21:43:39 -0500 | [diff] [blame] | 70 | self.assertEqual(202, self.resp.status) |
| 71 | self.assertTrue(self.server_initial['id'] is not None) |
| 72 | self.assertTrue(self.server_initial['adminPass'] is not None) |
| 73 | |
| 74 | @attr(type='smoke') |
Daryl Walleck | ed97dca | 2012-07-04 23:25:45 -0500 | [diff] [blame] | 75 | def test_verify_server_details(self): |
Sean Dague | 4dd2c0b | 2013-01-03 17:50:28 -0500 | [diff] [blame] | 76 | # Verify the specified server attributes are set correctly |
Daryl Walleck | 6b9b288 | 2012-04-08 21:43:39 -0500 | [diff] [blame] | 77 | self.assertEqual(self.accessIPv4, self.server['accessIPv4']) |
Mauro S. M. Rodrigues | 5411036 | 2013-02-15 13:14:04 -0500 | [diff] [blame] | 78 | # NOTE(maurosr): See http://tools.ietf.org/html/rfc5952 (section 4) |
| 79 | # Here we compare directly with the canonicalized format. |
| 80 | self.assertEqual(self.server['accessIPv6'], |
| 81 | str(netaddr.IPAddress(self.accessIPv6))) |
Daryl Walleck | 6b9b288 | 2012-04-08 21:43:39 -0500 | [diff] [blame] | 82 | self.assertEqual(self.name, self.server['name']) |
| 83 | self.assertEqual(self.image_ref, self.server['image']['id']) |
| 84 | self.assertEqual(str(self.flavor_ref), self.server['flavor']['id']) |
| 85 | self.assertEqual(self.meta, self.server['metadata']) |
| 86 | |
Daryl Walleck | ed97dca | 2012-07-04 23:25:45 -0500 | [diff] [blame] | 87 | @attr(type='smoke') |
| 88 | def test_list_servers(self): |
Sean Dague | 4dd2c0b | 2013-01-03 17:50:28 -0500 | [diff] [blame] | 89 | # The created server should be in the list of all servers |
Daryl Walleck | ed97dca | 2012-07-04 23:25:45 -0500 | [diff] [blame] | 90 | resp, body = self.client.list_servers() |
| 91 | servers = body['servers'] |
| 92 | found = any([i for i in servers if i['id'] == self.server['id']]) |
| 93 | self.assertTrue(found) |
| 94 | |
| 95 | @attr(type='smoke') |
| 96 | def test_list_servers_with_detail(self): |
Sean Dague | 4dd2c0b | 2013-01-03 17:50:28 -0500 | [diff] [blame] | 97 | # The created server should be in the detailed list of all servers |
Daryl Walleck | ed97dca | 2012-07-04 23:25:45 -0500 | [diff] [blame] | 98 | resp, body = self.client.list_servers_with_detail() |
| 99 | servers = body['servers'] |
| 100 | found = any([i for i in servers if i['id'] == self.server['id']]) |
| 101 | self.assertTrue(found) |
| 102 | |
Daryl Walleck | 6b9b288 | 2012-04-08 21:43:39 -0500 | [diff] [blame] | 103 | @attr(type='positive') |
ivan-zhu | 1feeb38 | 2013-01-24 10:14:39 +0800 | [diff] [blame] | 104 | @testtools.skipIf(not run_ssh, 'Instance validation tests are disabled.') |
Daryl Walleck | 6b9b288 | 2012-04-08 21:43:39 -0500 | [diff] [blame] | 105 | def test_can_log_into_created_server(self): |
Sean Dague | 4dd2c0b | 2013-01-03 17:50:28 -0500 | [diff] [blame] | 106 | # Check that the user can authenticate with the generated password |
Daryl Walleck | 6b9b288 | 2012-04-08 21:43:39 -0500 | [diff] [blame] | 107 | linux_client = RemoteClient(self.server, self.ssh_user, self.password) |
| 108 | self.assertTrue(linux_client.can_authenticate()) |
| 109 | |
| 110 | @attr(type='positive') |
ivan-zhu | 1feeb38 | 2013-01-24 10:14:39 +0800 | [diff] [blame] | 111 | @testtools.skipIf(not run_ssh, 'Instance validation tests are disabled.') |
Daryl Walleck | 6b9b288 | 2012-04-08 21:43:39 -0500 | [diff] [blame] | 112 | def test_verify_created_server_vcpus(self): |
Sean Dague | 4dd2c0b | 2013-01-03 17:50:28 -0500 | [diff] [blame] | 113 | # Verify that the number of vcpus reported by the instance matches |
| 114 | # the amount stated by the flavor |
Daryl Walleck | 6b9b288 | 2012-04-08 21:43:39 -0500 | [diff] [blame] | 115 | resp, flavor = self.flavors_client.get_flavor_details(self.flavor_ref) |
| 116 | linux_client = RemoteClient(self.server, self.ssh_user, self.password) |
| 117 | self.assertEqual(flavor['vcpus'], linux_client.get_number_of_vcpus()) |
| 118 | |
| 119 | @attr(type='positive') |
ivan-zhu | 1feeb38 | 2013-01-24 10:14:39 +0800 | [diff] [blame] | 120 | @testtools.skipIf(not run_ssh, 'Instance validation tests are disabled.') |
Daryl Walleck | 6b9b288 | 2012-04-08 21:43:39 -0500 | [diff] [blame] | 121 | def test_host_name_is_same_as_server_name(self): |
Sean Dague | 4dd2c0b | 2013-01-03 17:50:28 -0500 | [diff] [blame] | 122 | # Verify the instance host name is the same as the server name |
Daryl Walleck | 6b9b288 | 2012-04-08 21:43:39 -0500 | [diff] [blame] | 123 | linux_client = RemoteClient(self.server, self.ssh_user, self.password) |
| 124 | self.assertTrue(linux_client.hostname_equals_servername(self.name)) |
Dan Smith | 4307f99 | 2012-08-16 09:23:20 -0700 | [diff] [blame] | 125 | |
| 126 | |
Daryl Walleck | 0aea003 | 2012-12-04 00:53:28 -0600 | [diff] [blame] | 127 | @attr(type='positive') |
Attila Fazekas | 19044d5 | 2013-02-16 07:35:06 +0100 | [diff] [blame^] | 128 | class ServersTestAutoDisk(ServersTestJSON): |
| 129 | disk_config = 'AUTO' |
| 130 | |
Daryl Walleck | 0aea003 | 2012-12-04 00:53:28 -0600 | [diff] [blame] | 131 | @classmethod |
| 132 | def setUpClass(cls): |
| 133 | if not compute.DISK_CONFIG_ENABLED: |
| 134 | msg = "DiskConfig extension not enabled." |
ivan-zhu | 1feeb38 | 2013-01-24 10:14:39 +0800 | [diff] [blame] | 135 | raise cls.skipException(msg) |
Daryl Walleck | 0aea003 | 2012-12-04 00:53:28 -0600 | [diff] [blame] | 136 | super(ServersTestAutoDisk, cls).setUpClass() |
Daryl Walleck | 0aea003 | 2012-12-04 00:53:28 -0600 | [diff] [blame] | 137 | |
| 138 | |
| 139 | @attr(type='positive') |
Attila Fazekas | 19044d5 | 2013-02-16 07:35:06 +0100 | [diff] [blame^] | 140 | class ServersTestManualDisk(ServersTestJSON): |
| 141 | disk_config = 'MANUAL' |
| 142 | |
Daryl Walleck | 0aea003 | 2012-12-04 00:53:28 -0600 | [diff] [blame] | 143 | @classmethod |
| 144 | def setUpClass(cls): |
| 145 | if not compute.DISK_CONFIG_ENABLED: |
| 146 | msg = "DiskConfig extension not enabled." |
ivan-zhu | 1feeb38 | 2013-01-24 10:14:39 +0800 | [diff] [blame] | 147 | raise cls.skipException(msg) |
Daryl Walleck | 0aea003 | 2012-12-04 00:53:28 -0600 | [diff] [blame] | 148 | super(ServersTestManualDisk, cls).setUpClass() |
Daryl Walleck | 0aea003 | 2012-12-04 00:53:28 -0600 | [diff] [blame] | 149 | |
| 150 | |
Attila Fazekas | 19044d5 | 2013-02-16 07:35:06 +0100 | [diff] [blame^] | 151 | class ServersTestXML(ServersTestJSON): |
| 152 | _interface = 'xml' |