blob: 3abf0c3b37968414c88830d4ec1bc52d4e87d615 [file] [log] [blame]
Dan Smithcf8fab62012-08-14 08:03:48 -07001# vim: tabstop=4 shiftwidth=4 softtabstop=4
2#
3# Copyright 2012 IBM
4# All Rights Reserved.
5#
6# Licensed under the Apache License, Version 2.0 (the "License"); you may
7# not use this file except in compliance with the License. You may obtain
8# a copy of the License at
9#
10# http://www.apache.org/licenses/LICENSE-2.0
11#
12# Unless required by applicable law or agreed to in writing, software
13# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
14# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
15# License for the specific language governing permissions and limitations
16# under the License.
17
18import logging
Matthew Treinisha83a16e2012-12-07 13:44:02 -050019import time
20import urllib
21
Dan Smithcf8fab62012-08-14 08:03:48 -070022from lxml import etree
Matthew Treinisha83a16e2012-12-07 13:44:02 -050023
Dan Smithcf8fab62012-08-14 08:03:48 -070024from tempest.common.rest_client import RestClientXML
Matthew Treinisha83a16e2012-12-07 13:44:02 -050025from tempest import exceptions
dwallecke62b9f02012-10-10 23:34:42 -050026from tempest.services.compute.xml.common import Document
27from tempest.services.compute.xml.common import Element
28from tempest.services.compute.xml.common import Text
29from tempest.services.compute.xml.common import xml_to_json
30from tempest.services.compute.xml.common import XMLNS_11
Matthew Treinisha83a16e2012-12-07 13:44:02 -050031
Dan Smithcf8fab62012-08-14 08:03:48 -070032
33LOG = logging.getLogger(__name__)
34
35
Jaroslav Henner93f19e82012-12-12 20:24:17 +010036def _translate_ip_xml_json(ip):
37 """
38 Convert the address version to int.
39 """
40 ip = dict(ip)
41 version = ip.get('version')
42 if version:
43 ip['version'] = int(version)
44 return ip
45
46
47def _translate_network_xml_to_json(network):
48 return [_translate_ip_xml_json(ip.attrib)
49 for ip in network.findall('{%s}ip' % XMLNS_11)]
50
51
52def _translate_addresses_xml_to_json(xml_addresses):
53 return dict((network.attrib['id'], _translate_network_xml_to_json(network))
54 for network in xml_addresses.findall('{%s}network' % XMLNS_11))
55
56
57def _translate_server_xml_to_json(xml_dom):
Attila Fazekasb2902af2013-02-16 16:22:44 +010058 """Convert server XML to server JSON.
Jaroslav Henner93f19e82012-12-12 20:24:17 +010059
60 The addresses collection does not convert well by the dumb xml_to_json.
61 This method does some pre and post-processing to deal with that.
62
63 Translate XML addresses subtree to JSON.
64
65 Having xml_doc similar to
66 <api:server xmlns:api="http://docs.openstack.org/compute/api/v1.1">
67 <api:addresses>
68 <api:network id="foo_novanetwork">
69 <api:ip version="4" addr="192.168.0.4"/>
70 </api:network>
71 <api:network id="bar_novanetwork">
72 <api:ip version="4" addr="10.1.0.4"/>
73 <api:ip version="6" addr="2001:0:0:1:2:3:4:5"/>
74 </api:network>
75 </api:addresses>
76 </api:server>
77
78 the _translate_server_xml_to_json(etree.fromstring(xml_doc)) should produce
79 something like
80
81 {'addresses': {'bar_novanetwork': [{'addr': '10.1.0.4', 'version': 4},
82 {'addr': '2001:0:0:1:2:3:4:5',
83 'version': 6}],
84 'foo_novanetwork': [{'addr': '192.168.0.4', 'version': 4}]}}
85 """
86 nsmap = {'api': XMLNS_11}
87 addresses = xml_dom.xpath('/api:server/api:addresses', namespaces=nsmap)
88 if addresses:
89 if len(addresses) > 1:
90 raise ValueError('Expected only single `addresses` element.')
91 json_addresses = _translate_addresses_xml_to_json(addresses[0])
92 json = xml_to_json(xml_dom)
93 json['addresses'] = json_addresses
94 else:
95 json = xml_to_json(xml_dom)
96 return json
97
98
Dan Smithcf8fab62012-08-14 08:03:48 -070099class ServersClientXML(RestClientXML):
100
101 def __init__(self, config, username, password, auth_url, tenant_name=None):
102 super(ServersClientXML, self).__init__(config, username, password,
103 auth_url, tenant_name)
104 self.service = self.config.compute.catalog_type
105
106 def _parse_key_value(self, node):
Sean Daguef237ccb2013-01-04 15:19:14 -0500107 """Parse <foo key='key'>value</foo> data into {'key': 'value'}."""
Dan Smithcf8fab62012-08-14 08:03:48 -0700108 data = {}
109 for node in node.getchildren():
110 data[node.get('key')] = node.text
111 return data
112
113 def _parse_links(self, node, json):
114 del json['link']
115 json['links'] = []
116 for linknode in node.findall('{http://www.w3.org/2005/Atom}link'):
117 json['links'].append(xml_to_json(linknode))
118
119 def _parse_server(self, body):
Jaroslav Henner93f19e82012-12-12 20:24:17 +0100120 json = _translate_server_xml_to_json(body)
121
Dan Smithcf8fab62012-08-14 08:03:48 -0700122 if 'metadata' in json and json['metadata']:
123 # NOTE(danms): if there was metadata, we need to re-parse
124 # that as a special type
125 metadata_tag = body.find('{%s}metadata' % XMLNS_11)
126 json["metadata"] = self._parse_key_value(metadata_tag)
127 if 'link' in json:
128 self._parse_links(body, json)
129 for sub in ['image', 'flavor']:
130 if sub in json and 'link' in json[sub]:
131 self._parse_links(body, json[sub])
Dan Smithcf8fab62012-08-14 08:03:48 -0700132 return json
133
134 def get_server(self, server_id):
Sean Daguef237ccb2013-01-04 15:19:14 -0500135 """Returns the details of an existing server."""
Dan Smithcf8fab62012-08-14 08:03:48 -0700136 resp, body = self.get("servers/%s" % str(server_id), self.headers)
137 server = self._parse_server(etree.fromstring(body))
138 return resp, server
139
140 def delete_server(self, server_id):
Sean Daguef237ccb2013-01-04 15:19:14 -0500141 """Deletes the given server."""
Dan Smithcf8fab62012-08-14 08:03:48 -0700142 return self.delete("servers/%s" % str(server_id))
143
144 def _parse_array(self, node):
145 array = []
146 for child in node.getchildren():
147 array.append(xml_to_json(child))
148 return array
149
150 def list_servers(self, params=None):
151 url = 'servers/detail'
Matthew Treinish26dd0fa2012-12-04 17:14:37 -0500152 if params:
153 url += '?%s' % urllib.urlencode(params)
Dan Smithcf8fab62012-08-14 08:03:48 -0700154
Dan Smithcf8fab62012-08-14 08:03:48 -0700155 resp, body = self.get(url, self.headers)
156 servers = self._parse_array(etree.fromstring(body))
157 return resp, {"servers": servers}
158
159 def list_servers_with_detail(self, params=None):
160 url = 'servers/detail'
Matthew Treinish26dd0fa2012-12-04 17:14:37 -0500161 if params:
162 url += '?%s' % urllib.urlencode(params)
Dan Smithcf8fab62012-08-14 08:03:48 -0700163
Dan Smithcf8fab62012-08-14 08:03:48 -0700164 resp, body = self.get(url, self.headers)
165 servers = self._parse_array(etree.fromstring(body))
166 return resp, {"servers": servers}
167
168 def update_server(self, server_id, name=None, meta=None, accessIPv4=None,
169 accessIPv6=None):
170 doc = Document()
171 server = Element("server")
172 doc.append(server)
173
174 if name:
175 server.add_attr("name", name)
176 if accessIPv4:
177 server.add_attr("accessIPv4", accessIPv4)
178 if accessIPv6:
179 server.add_attr("accessIPv6", accessIPv6)
180 if meta:
181 metadata = Element("metadata")
182 server.append(metadata)
183 for k, v in meta:
184 meta = Element("meta", key=k)
185 meta.append(Text(v))
186 metadata.append(meta)
187
188 resp, body = self.put('servers/%s' % str(server_id),
189 str(doc), self.headers)
190 return resp, xml_to_json(etree.fromstring(body))
191
192 def create_server(self, name, image_ref, flavor_ref, **kwargs):
193 """
194 Creates an instance of a server.
195 name (Required): The name of the server.
196 image_ref (Required): Reference to the image used to build the server.
197 flavor_ref (Required): The flavor used to build the server.
198 Following optional keyword arguments are accepted:
199 adminPass: Sets the initial root password.
200 key_name: Key name of keypair that was created earlier.
201 meta: A dictionary of values to be used as metadata.
202 personality: A list of dictionaries for files to be injected into
203 the server.
204 security_groups: A list of security group dicts.
205 networks: A list of network dicts with UUID and fixed_ip.
206 user_data: User data for instance.
207 availability_zone: Availability zone in which to launch instance.
208 accessIPv4: The IPv4 access address for the server.
209 accessIPv6: The IPv6 access address for the server.
210 min_count: Count of minimum number of instances to launch.
211 max_count: Count of maximum number of instances to launch.
212 disk_config: Determines if user or admin controls disk configuration.
213 """
214 server = Element("server",
215 xmlns=XMLNS_11,
216 imageRef=image_ref,
217 flavorRef=flavor_ref,
218 name=name)
219
220 for attr in ["adminPass", "accessIPv4", "accessIPv6", "key_name"]:
221 if attr in kwargs:
222 server.add_attr(attr, kwargs[attr])
223
224 if 'meta' in kwargs:
225 metadata = Element("metadata")
226 server.append(metadata)
227 for k, v in kwargs['meta'].items():
228 meta = Element("meta", key=k)
229 meta.append(Text(v))
230 metadata.append(meta)
231
Matthew Treinish2dfc2822012-08-16 16:57:08 -0400232 if 'personality' in kwargs:
233 personality = Element('personality')
234 server.append(personality)
235 for k in kwargs['personality']:
236 temp = Element('file', path=k['path'])
237 temp.append(Text(k['contents']))
238 personality.append(temp)
Dan Smithcf8fab62012-08-14 08:03:48 -0700239
240 resp, body = self.post('servers', str(Document(server)), self.headers)
241 server = self._parse_server(etree.fromstring(body))
242 return resp, server
243
244 def wait_for_server_status(self, server_id, status):
Sean Daguef237ccb2013-01-04 15:19:14 -0500245 """Waits for a server to reach a given status."""
Dan Smithcf8fab62012-08-14 08:03:48 -0700246 resp, body = self.get_server(server_id)
247 server_status = body['status']
248 start = int(time.time())
249
250 while(server_status != status):
251 time.sleep(self.build_interval)
252 resp, body = self.get_server(server_id)
253 server_status = body['status']
254
255 if server_status == 'ERROR':
256 raise exceptions.BuildErrorException(server_id=server_id)
257
258 timed_out = int(time.time()) - start >= self.build_timeout
259
260 if server_status != status and timed_out:
Zhongyue Luo79d8d362012-09-25 13:49:27 +0800261 message = ('Server %s failed to reach %s status within the '
262 'required time (%s s).' %
263 (server_id, status, self.build_timeout))
Dan Smithcf8fab62012-08-14 08:03:48 -0700264 message += ' Current status: %s.' % server_status
265 raise exceptions.TimeoutException(message)
266
267 def wait_for_server_termination(self, server_id, ignore_error=False):
Sean Daguef237ccb2013-01-04 15:19:14 -0500268 """Waits for server to reach termination."""
Dan Smithcf8fab62012-08-14 08:03:48 -0700269 start_time = int(time.time())
270 while True:
271 try:
272 resp, body = self.get_server(server_id)
273 except exceptions.NotFound:
274 return
275
276 server_status = body['status']
277 if server_status == 'ERROR' and not ignore_error:
278 raise exceptions.BuildErrorException
279
280 if int(time.time()) - start_time >= self.build_timeout:
281 raise exceptions.TimeoutException
282
283 time.sleep(self.build_interval)
284
285 def _parse_network(self, node):
286 addrs = []
287 for child in node.getchildren():
288 addrs.append({'version': int(child.get('version')),
289 'addr': child.get('version')})
290 return {node.get('id'): addrs}
291
292 def list_addresses(self, server_id):
Sean Daguef237ccb2013-01-04 15:19:14 -0500293 """Lists all addresses for a server."""
Dan Smithcf8fab62012-08-14 08:03:48 -0700294 resp, body = self.get("servers/%s/ips" % str(server_id), self.headers)
295
296 networks = {}
297 for child in etree.fromstring(body.getchildren()):
298 network = self._parse_network(child)
299 networks.update(**network)
300
301 return resp, networks
302
303 def list_addresses_by_network(self, server_id, network_id):
Sean Daguef237ccb2013-01-04 15:19:14 -0500304 """Lists all addresses of a specific network type for a server."""
Zhongyue Luoe0884a32012-09-25 17:24:17 +0800305 resp, body = self.get("servers/%s/ips/%s" % (str(server_id),
306 network_id),
307 self.headers)
Dan Smithcf8fab62012-08-14 08:03:48 -0700308 network = self._parse_network(etree.fromstring(body))
309
310 return resp, network
311
312 def change_password(self, server_id, password):
313 cpw = Element("changePassword",
314 xmlns=XMLNS_11,
315 adminPass=password)
316 return self.post("servers/%s/action" % server_id,
317 str(Document(cpw)), self.headers)
318
319 def reboot(self, server_id, reboot_type):
320 reboot = Element("reboot",
321 xmlns=XMLNS_11,
322 type=reboot_type)
323 return self.post("servers/%s/action" % server_id,
324 str(Document(reboot)), self.headers)
325
326 def rebuild(self, server_id, image_ref, name=None, meta=None,
327 personality=None, adminPass=None, disk_config=None):
328 rebuild = Element("rebuild",
329 xmlns=XMLNS_11,
330 imageRef=image_ref)
331
332 if name:
333 rebuild.add_attr("name", name)
334 if adminPass:
335 rebuild.add_attr("adminPass", adminPass)
336 if meta:
337 metadata = Element("metadata")
338 rebuild.append(metadata)
339 for k, v in meta.items():
340 meta = Element("meta", key=k)
341 meta.append(Text(v))
342 metadata.append(meta)
343
344 resp, body = self.post('servers/%s/action' % server_id,
345 str(Document(rebuild)), self.headers)
346 server = self._parse_server(etree.fromstring(body))
347 return resp, server
348
349 def resize(self, server_id, flavor_ref, disk_config=None):
350 resize = Element("resize",
351 xmlns=XMLNS_11,
352 flavorRef=flavor_ref)
353
354 if disk_config is not None:
355 raise Exception("Sorry, disk_config not supported via XML yet")
356
357 return self.post('servers/%s/action' % server_id,
358 str(Document(resize)), self.headers)
359
360 def confirm_resize(self, server_id):
361 conf = Element('confirmResize')
362 return self.post('servers/%s/action' % server_id,
363 str(Document(conf)), self.headers)
364
365 def revert_resize(self, server_id):
366 revert = Element('revertResize')
367 return self.post('servers/%s/action' % server_id,
368 str(Document(revert)), self.headers)
369
370 def create_image(self, server_id, image_name):
Vincent Houead03dc2012-08-24 21:35:11 +0800371 metadata = Element('metadata')
372 image = Element('createImage',
Dan Smithcf8fab62012-08-14 08:03:48 -0700373 metadata,
374 xmlns=XMLNS_11,
375 name=image_name)
376 return self.post('servers/%s/action' % server_id,
377 str(Document(image)), self.headers)
378
379 def add_security_group(self, server_id, security_group_name):
380 secgrp = Element('addSecurityGroup', name=security_group_name)
381 return self.post('servers/%s/action' % server_id,
382 str(Document(secgrp)), self.headers)
383
384 def remove_security_group(self, server_id, security_group_name):
385 secgrp = Element('removeSecurityGroup', name=security_group_name)
386 return self.post('servers/%s/action' % server_id,
387 str(Document(secgrp)), self.headers)
Attila Fazekase4cb04c2013-01-29 09:51:58 +0100388
389 def get_console_output(self, server_id, length):
390 post_body = Element("os-getConsoleOutput", length=length)
391 resp, body = self.post("/servers/%s/action" % server_id,
392 headers=self.headers,
393 body=str(Document(post_body)))
394 body = xml_to_json(etree.fromstring(body))
395 return resp, body
Rami Vaknin76bc8bd2013-02-17 16:18:27 +0200396
397 def list_virtual_interfaces(self, server_id):
398 """
399 List the virtual interfaces used in an instance.
400 """
401 resp, body = self.get('/'.join(['servers', server_id,
402 'os-virtual-interfaces']), self.headers)
403 server = self._parse_server(etree.fromstring(body))
404 return resp, server