Masayuki Igawa | 73d9f3a | 2013-05-24 10:30:01 +0900 | [diff] [blame] | 1 | # Copyright 2013 NEC Corporation |
| 2 | # All Rights Reserved. |
| 3 | # |
| 4 | # Licensed under the Apache License, Version 2.0 (the "License"); you may |
| 5 | # not use this file except in compliance with the License. You may obtain |
| 6 | # a copy of the License at |
| 7 | # |
| 8 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | # |
| 10 | # Unless required by applicable law or agreed to in writing, software |
| 11 | # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| 12 | # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the |
| 13 | # License for the specific language governing permissions and limitations |
| 14 | # under the License. |
| 15 | |
Benny Kopilov | d4d49b0 | 2021-08-10 18:54:01 +0300 | [diff] [blame] | 16 | import testtools |
| 17 | |
Andrea Frittoli | 247058f | 2014-07-16 16:09:22 +0100 | [diff] [blame] | 18 | from tempest.common import custom_matchers |
Andrea Frittoli | cd36841 | 2017-08-14 21:37:56 +0100 | [diff] [blame] | 19 | from tempest.common import utils |
Ken'ichi Ohmichi | 0eb153c | 2015-07-13 02:18:25 +0000 | [diff] [blame] | 20 | from tempest.common import waiters |
Matthew Treinish | 6c07229 | 2014-01-29 19:15:52 +0000 | [diff] [blame] | 21 | from tempest import config |
Jordan Pittier | 35a6375 | 2016-08-30 13:09:12 +0200 | [diff] [blame] | 22 | from tempest.lib.common.utils import test_utils |
Ken'ichi Ohmichi | c85a951 | 2017-01-27 18:34:24 -0800 | [diff] [blame] | 23 | from tempest.lib import decorators |
guo yunxian | 7383a6f | 2016-12-05 18:56:51 +0800 | [diff] [blame] | 24 | from tempest.lib import exceptions |
Masayuki Igawa | 73d9f3a | 2013-05-24 10:30:01 +0900 | [diff] [blame] | 25 | from tempest.scenario import manager |
| 26 | |
Matthew Treinish | 6c07229 | 2014-01-29 19:15:52 +0000 | [diff] [blame] | 27 | CONF = config.CONF |
Masayuki Igawa | 73d9f3a | 2013-05-24 10:30:01 +0900 | [diff] [blame] | 28 | |
Masayuki Igawa | 73d9f3a | 2013-05-24 10:30:01 +0900 | [diff] [blame] | 29 | |
Andrea Frittoli | 247058f | 2014-07-16 16:09:22 +0100 | [diff] [blame] | 30 | class TestMinimumBasicScenario(manager.ScenarioTest): |
Masayuki Igawa | 73d9f3a | 2013-05-24 10:30:01 +0900 | [diff] [blame] | 31 | |
Ken'ichi Ohmichi | c4e4f1c | 2015-11-17 08:16:12 +0000 | [diff] [blame] | 32 | """This is a basic minimum scenario test. |
Masayuki Igawa | 73d9f3a | 2013-05-24 10:30:01 +0900 | [diff] [blame] | 33 | |
Benny Kopilov | d4d49b0 | 2021-08-10 18:54:01 +0300 | [diff] [blame] | 34 | These tests below: |
Masayuki Igawa | 73d9f3a | 2013-05-24 10:30:01 +0900 | [diff] [blame] | 35 | * across the multiple components |
| 36 | * as a regular user |
| 37 | * with and without optional parameters |
| 38 | * check command outputs |
Masayuki Igawa | 73d9f3a | 2013-05-24 10:30:01 +0900 | [diff] [blame] | 39 | """ |
afazekas | 40fcb9b | 2019-03-08 11:25:11 +0100 | [diff] [blame] | 40 | |
Jordan Pittier | 7cf6476 | 2015-10-14 15:01:12 +0200 | [diff] [blame] | 41 | def nova_show(self, server): |
| 42 | got_server = (self.servers_client.show_server(server['id']) |
ghanshyam | 0f82525 | 2015-08-25 16:02:50 +0900 | [diff] [blame] | 43 | ['server']) |
Jordan Pittier | 5d36715 | 2015-08-19 12:03:49 +0200 | [diff] [blame] | 44 | excluded_keys = ['OS-EXT-AZ:availability_zone'] |
| 45 | # Exclude these keys because of LP:#1486475 |
| 46 | excluded_keys.extend(['OS-EXT-STS:power_state', 'updated']) |
Andrea Frittoli | 247058f | 2014-07-16 16:09:22 +0100 | [diff] [blame] | 47 | self.assertThat( |
Jordan Pittier | 7cf6476 | 2015-10-14 15:01:12 +0200 | [diff] [blame] | 48 | server, custom_matchers.MatchesDictExceptForKeys( |
Jordan Pittier | 5d36715 | 2015-08-19 12:03:49 +0200 | [diff] [blame] | 49 | got_server, excluded_keys=excluded_keys)) |
Masayuki Igawa | 73d9f3a | 2013-05-24 10:30:01 +0900 | [diff] [blame] | 50 | |
Jordan Pittier | 7cf6476 | 2015-10-14 15:01:12 +0200 | [diff] [blame] | 51 | def cinder_show(self, volume): |
| 52 | got_volume = self.volumes_client.show_volume(volume['id'])['volume'] |
Matt Riedemann | 3ec41c2 | 2019-10-15 11:39:32 -0400 | [diff] [blame] | 53 | # Exclude updated_at because of bug 1838202. |
| 54 | excluded_keys = ['updated_at'] |
| 55 | self.assertThat( |
| 56 | volume, custom_matchers.MatchesDictExceptForKeys( |
| 57 | got_volume, excluded_keys=excluded_keys)) |
Masayuki Igawa | 73d9f3a | 2013-05-24 10:30:01 +0900 | [diff] [blame] | 58 | |
Benny Kopilov | d4d49b0 | 2021-08-10 18:54:01 +0300 | [diff] [blame] | 59 | def nova_reboot(self, server, hard=False): |
| 60 | self.servers_client.reboot_server(server['id'], |
| 61 | type="HARD" if hard else "SOFT") |
Masayuki Igawa | 8bf6867 | 2016-01-15 14:43:10 +0900 | [diff] [blame] | 62 | waiters.wait_for_server_status(self.servers_client, |
| 63 | server['id'], 'ACTIVE') |
Masayuki Igawa | 73d9f3a | 2013-05-24 10:30:01 +0900 | [diff] [blame] | 64 | |
Evgeny Antyshev | 4894a91 | 2016-11-21 12:17:18 +0000 | [diff] [blame] | 65 | def check_disks(self): |
Andrea Frittoli | 247058f | 2014-07-16 16:09:22 +0100 | [diff] [blame] | 66 | # NOTE(andreaf) The device name may be different on different guest OS |
Evgeny Antyshev | 4894a91 | 2016-11-21 12:17:18 +0000 | [diff] [blame] | 67 | disks = self.linux_client.get_disks() |
| 68 | self.assertEqual(1, disks.count(CONF.compute.volume_device_name)) |
Masayuki Igawa | 73d9f3a | 2013-05-24 10:30:01 +0900 | [diff] [blame] | 69 | |
Jordan Pittier | 7cf6476 | 2015-10-14 15:01:12 +0200 | [diff] [blame] | 70 | def create_and_add_security_group_to_server(self, server): |
Soniya Vyas | 582c170 | 2021-02-22 18:26:17 +0530 | [diff] [blame] | 71 | secgroup = self.create_security_group() |
Jordan Pittier | 7cf6476 | 2015-10-14 15:01:12 +0200 | [diff] [blame] | 72 | self.servers_client.add_security_group(server['id'], |
Ken'ichi Ohmichi | e6349f3 | 2015-12-09 06:47:54 +0000 | [diff] [blame] | 73 | name=secgroup['name']) |
Andrea Frittoli | 247058f | 2014-07-16 16:09:22 +0100 | [diff] [blame] | 74 | self.addCleanup(self.servers_client.remove_security_group, |
Ken'ichi Ohmichi | 36b714c | 2015-12-09 08:12:47 +0000 | [diff] [blame] | 75 | server['id'], name=secgroup['name']) |
Grishkin | 0f1e11c | 2014-05-04 20:44:52 +0400 | [diff] [blame] | 76 | |
Clark Boylan | ff31bcc | 2014-11-04 13:44:04 -0800 | [diff] [blame] | 77 | def wait_for_secgroup_add(): |
Jordan Pittier | 7cf6476 | 2015-10-14 15:01:12 +0200 | [diff] [blame] | 78 | body = (self.servers_client.show_server(server['id']) |
ghanshyam | 0f82525 | 2015-08-25 16:02:50 +0900 | [diff] [blame] | 79 | ['server']) |
Clark Boylan | ff31bcc | 2014-11-04 13:44:04 -0800 | [diff] [blame] | 80 | return {'name': secgroup['name']} in body['security_groups'] |
| 81 | |
Jordan Pittier | 35a6375 | 2016-08-30 13:09:12 +0200 | [diff] [blame] | 82 | if not test_utils.call_until_true(wait_for_secgroup_add, |
| 83 | CONF.compute.build_timeout, |
| 84 | CONF.compute.build_interval): |
Clark Boylan | ff31bcc | 2014-11-04 13:44:04 -0800 | [diff] [blame] | 85 | msg = ('Timed out waiting for adding security group %s to server ' |
Jordan Pittier | 7cf6476 | 2015-10-14 15:01:12 +0200 | [diff] [blame] | 86 | '%s' % (secgroup['id'], server['id'])) |
Clark Boylan | ff31bcc | 2014-11-04 13:44:04 -0800 | [diff] [blame] | 87 | raise exceptions.TimeoutException(msg) |
| 88 | |
Ghanshyam Mann | b3da2e1 | 2023-02-03 13:20:48 -0600 | [diff] [blame] | 89 | @decorators.attr(type='slow') |
Ken'ichi Ohmichi | c85a951 | 2017-01-27 18:34:24 -0800 | [diff] [blame] | 90 | @decorators.idempotent_id('bdbb5441-9204-419d-a225-b4fdbfb1a1a8') |
Andrea Frittoli | cd36841 | 2017-08-14 21:37:56 +0100 | [diff] [blame] | 91 | @utils.services('compute', 'volume', 'image', 'network') |
Masayuki Igawa | 73d9f3a | 2013-05-24 10:30:01 +0900 | [diff] [blame] | 92 | def test_minimum_basic_scenario(self): |
Benny Kopilov | d4d49b0 | 2021-08-10 18:54:01 +0300 | [diff] [blame] | 93 | """This is a basic minimum scenario with multiple components |
| 94 | |
| 95 | Steps: |
| 96 | 1. Create image |
| 97 | 2. Create keypair |
| 98 | 3. Boot instance with keypair and get list of instances |
| 99 | 4. Create volume and show list of volumes |
| 100 | 5. Attach volume to instance and getlist of volumes |
| 101 | 6. Add IP to instance |
| 102 | 7. Create and add security group to instance |
| 103 | 8. Check SSH connection to instance |
| 104 | 9. Reboot instance |
| 105 | 10. Check SSH connection to instance after reboot |
| 106 | """ |
Soniya Vyas | be8d510 | 2020-08-17 17:23:30 +0530 | [diff] [blame] | 107 | image = self.image_create() |
Jordan Pittier | 7cf6476 | 2015-10-14 15:01:12 +0200 | [diff] [blame] | 108 | keypair = self.create_keypair() |
JordanP | 3fe2dc3 | 2014-11-17 13:06:01 +0100 | [diff] [blame] | 109 | |
zhufl | 13c9c89 | 2017-02-10 12:04:07 +0800 | [diff] [blame] | 110 | server = self.create_server(image_id=image, key_name=keypair['name']) |
Jordan Pittier | 93dffb7 | 2016-09-16 15:12:31 +0200 | [diff] [blame] | 111 | servers = self.servers_client.list_servers()['servers'] |
Jordan Pittier | 7cf6476 | 2015-10-14 15:01:12 +0200 | [diff] [blame] | 112 | self.assertIn(server['id'], [x['id'] for x in servers]) |
JordanP | 3fe2dc3 | 2014-11-17 13:06:01 +0100 | [diff] [blame] | 113 | |
Jordan Pittier | 7cf6476 | 2015-10-14 15:01:12 +0200 | [diff] [blame] | 114 | self.nova_show(server) |
| 115 | |
Jordan Pittier | bbb1712 | 2016-01-26 17:10:55 +0100 | [diff] [blame] | 116 | volume = self.create_volume() |
| 117 | volumes = self.volumes_client.list_volumes()['volumes'] |
Jordan Pittier | 7cf6476 | 2015-10-14 15:01:12 +0200 | [diff] [blame] | 118 | self.assertIn(volume['id'], [x['id'] for x in volumes]) |
| 119 | |
| 120 | self.cinder_show(volume) |
| 121 | |
| 122 | volume = self.nova_volume_attach(server, volume) |
| 123 | self.addCleanup(self.nova_volume_detach, server, volume) |
| 124 | self.cinder_show(volume) |
| 125 | |
zhufl | 1bdc3e7 | 2018-01-10 14:10:47 +0800 | [diff] [blame] | 126 | floating_ip = None |
Matt Riedemann | 8ca5056 | 2016-08-16 14:46:01 -0400 | [diff] [blame] | 127 | server = self.servers_client.show_server(server['id'])['server'] |
zhufl | 1bdc3e7 | 2018-01-10 14:10:47 +0800 | [diff] [blame] | 128 | if (CONF.network_feature_enabled.floating_ips and |
Benny Kopilov | d4d49b0 | 2021-08-10 18:54:01 +0300 | [diff] [blame] | 129 | CONF.network.floating_network_name): |
Ghanshyam Mann | 6428139 | 2021-03-24 18:48:38 -0500 | [diff] [blame] | 130 | fip = self.create_floating_ip(server) |
| 131 | floating_ip = self.associate_floating_ip( |
| 132 | fip, server) |
Artom Lifshitz | 8a959ea | 2021-09-27 12:09:12 -0400 | [diff] [blame] | 133 | waiters.wait_for_server_floating_ip(self.servers_client, |
| 134 | server, floating_ip) |
Ghanshyam Mann | 6428139 | 2021-03-24 18:48:38 -0500 | [diff] [blame] | 135 | ssh_ip = floating_ip['floating_ip_address'] |
zhufl | 1bdc3e7 | 2018-01-10 14:10:47 +0800 | [diff] [blame] | 136 | else: |
| 137 | ssh_ip = self.get_server_ip(server) |
Matt Riedemann | 8ca5056 | 2016-08-16 14:46:01 -0400 | [diff] [blame] | 138 | |
Jordan Pittier | 7cf6476 | 2015-10-14 15:01:12 +0200 | [diff] [blame] | 139 | self.create_and_add_security_group_to_server(server) |
| 140 | |
Alexander Gubanov | a5ab12e | 2015-11-17 18:18:46 +0200 | [diff] [blame] | 141 | # check that we can SSH to the server before reboot |
Jordan Pittier | 7cf6476 | 2015-10-14 15:01:12 +0200 | [diff] [blame] | 142 | self.linux_client = self.get_remote_client( |
zhufl | 1bdc3e7 | 2018-01-10 14:10:47 +0800 | [diff] [blame] | 143 | ssh_ip, private_key=keypair['private_key'], |
zhufl | f52c759 | 2017-05-25 13:55:24 +0800 | [diff] [blame] | 144 | server=server) |
Alexander Gubanov | a5ab12e | 2015-11-17 18:18:46 +0200 | [diff] [blame] | 145 | |
Jordan Pittier | 7cf6476 | 2015-10-14 15:01:12 +0200 | [diff] [blame] | 146 | self.nova_reboot(server) |
| 147 | |
Alexander Gubanov | a5ab12e | 2015-11-17 18:18:46 +0200 | [diff] [blame] | 148 | # check that we can SSH to the server after reboot |
| 149 | # (both connections are part of the scenario) |
Jordan Pittier | 7cf6476 | 2015-10-14 15:01:12 +0200 | [diff] [blame] | 150 | self.linux_client = self.get_remote_client( |
zhufl | 1bdc3e7 | 2018-01-10 14:10:47 +0800 | [diff] [blame] | 151 | ssh_ip, private_key=keypair['private_key'], |
zhufl | f52c759 | 2017-05-25 13:55:24 +0800 | [diff] [blame] | 152 | server=server) |
Alexander Gubanov | a5ab12e | 2015-11-17 18:18:46 +0200 | [diff] [blame] | 153 | |
Evgeny Antyshev | 4894a91 | 2016-11-21 12:17:18 +0000 | [diff] [blame] | 154 | self.check_disks() |
Matt Riedemann | 8ca5056 | 2016-08-16 14:46:01 -0400 | [diff] [blame] | 155 | |
zhufl | 1bdc3e7 | 2018-01-10 14:10:47 +0800 | [diff] [blame] | 156 | if floating_ip: |
| 157 | # delete the floating IP, this should refresh the server addresses |
Ghanshyam Mann | 6428139 | 2021-03-24 18:48:38 -0500 | [diff] [blame] | 158 | self.disassociate_floating_ip(floating_ip) |
Artom Lifshitz | 8a959ea | 2021-09-27 12:09:12 -0400 | [diff] [blame] | 159 | waiters.wait_for_server_floating_ip( |
| 160 | self.servers_client, server, floating_ip, |
| 161 | wait_for_disassociate=True) |
Benny Kopilov | d4d49b0 | 2021-08-10 18:54:01 +0300 | [diff] [blame] | 162 | |
Ghanshyam Mann | b3da2e1 | 2023-02-03 13:20:48 -0600 | [diff] [blame] | 163 | @decorators.attr(type='slow') |
Benny Kopilov | d4d49b0 | 2021-08-10 18:54:01 +0300 | [diff] [blame] | 164 | @decorators.idempotent_id('a8fd48ec-1d01-4895-b932-02321661ec1e') |
| 165 | @testtools.skipUnless(CONF.volume_feature_enabled.snapshot, |
| 166 | "Cinder volume snapshots are disabled") |
| 167 | @utils.services('compute', 'volume', 'image', 'network') |
| 168 | def test_minimum_basic_instance_hard_reboot_after_vol_snap_deletion(self): |
| 169 | """Test compute hard reboot after volume snapshot deleted |
| 170 | |
| 171 | Steps: |
| 172 | 1. Create image |
| 173 | 2. Create keypair |
| 174 | 3. Boot instance with keypair and get list of instances |
| 175 | 4. Create volume and show list of volumes |
| 176 | 5. Attach volume to instance and getlist of volumes |
| 177 | 6. Create a snapshot from volume |
| 178 | 7. Add IP to instance |
| 179 | 8. Create and add security group to instance |
| 180 | 9. Check SSH connection to instance |
| 181 | 10. Write data timestamp to the attached volume |
| 182 | 11. Delete volume snapshot before reboot instance |
| 183 | 12. Reboot instance (HARD) |
| 184 | 13. Check SSH connection to instance after reboot |
| 185 | 14. Verify attached disk data timestamp post instance reboot |
| 186 | """ |
| 187 | image = self.image_create() |
| 188 | keypair = self.create_keypair() |
| 189 | |
| 190 | server = self.create_server(image_id=image, key_name=keypair['name']) |
| 191 | servers = self.servers_client.list_servers()['servers'] |
| 192 | self.assertIn(server['id'], [x['id'] for x in servers]) |
| 193 | |
| 194 | self.nova_show(server) |
| 195 | |
| 196 | volume = self.create_volume() |
| 197 | volumes = self.volumes_client.list_volumes()['volumes'] |
| 198 | self.assertIn(volume['id'], [x['id'] for x in volumes]) |
| 199 | |
| 200 | self.cinder_show(volume) |
| 201 | |
| 202 | volume = self.nova_volume_attach(server, volume) |
| 203 | self.addCleanup(self.nova_volume_detach, server, volume) |
| 204 | snapshot = self.create_volume_snapshot(volume['id'], force=True) |
| 205 | self.cinder_show(volume) |
| 206 | |
| 207 | floating_ip = None |
| 208 | server = self.servers_client.show_server(server['id'])['server'] |
| 209 | if (CONF.network_feature_enabled.floating_ips and |
| 210 | CONF.network.floating_network_name): |
| 211 | fip = self.create_floating_ip(server) |
| 212 | floating_ip = self.associate_floating_ip( |
| 213 | fip, server) |
Artom Lifshitz | 3f7c50c | 2022-07-12 12:03:15 -0400 | [diff] [blame] | 214 | waiters.wait_for_server_floating_ip(self.servers_client, server, |
| 215 | floating_ip) |
Benny Kopilov | d4d49b0 | 2021-08-10 18:54:01 +0300 | [diff] [blame] | 216 | ssh_ip = floating_ip['floating_ip_address'] |
| 217 | else: |
| 218 | ssh_ip = self.get_server_ip(server) |
| 219 | |
| 220 | self.create_and_add_security_group_to_server(server) |
| 221 | |
| 222 | # check that we can SSH to the server before reboot |
| 223 | self.linux_client = self.get_remote_client( |
| 224 | ssh_ip, private_key=keypair['private_key'], |
| 225 | server=server) |
| 226 | |
| 227 | # write data to the volume before reboot instance |
| 228 | timestamp_before = self.create_timestamp( |
| 229 | ssh_ip, private_key=keypair['private_key'], server=server) |
| 230 | # delete the snapshot before rebooting the instance |
| 231 | self.snapshots_client.delete_snapshot(snapshot['id']) |
| 232 | self.snapshots_client.wait_for_resource_deletion(snapshot['id']) |
| 233 | self.nova_reboot(server, hard=True) |
| 234 | |
| 235 | # check that we can SSH to the server after reboot |
| 236 | # (both connections are part of the scenario) |
| 237 | self.linux_client = self.get_remote_client( |
| 238 | ssh_ip, private_key=keypair['private_key'], |
| 239 | server=server) |
| 240 | |
| 241 | self.check_disks() |
| 242 | timestamp_after = self.get_timestamp( |
| 243 | ssh_ip, private_key=keypair['private_key'], server=server) |
| 244 | self.assertEqual(timestamp_before, timestamp_after) |
| 245 | if floating_ip: |
| 246 | # delete the floating IP, this should refresh the server addresses |
| 247 | self.disassociate_floating_ip(floating_ip) |
| 248 | waiters.wait_for_server_floating_ip( |
| 249 | self.servers_client, server, floating_ip, |
| 250 | wait_for_disassociate=True) |