blob: b51b46e4f2c131d385b6bdfd71003d5ec576aa5b [file] [log] [blame]
ZhiQiang Fan39f97222013-09-20 04:49:44 +08001# Copyright 2012 OpenStack Foundation
Jay Pipes13b479b2012-06-11 14:52:27 -04002# All Rights Reserved.
3#
4# Licensed under the Apache License, Version 2.0 (the "License"); you may
5# not use this file except in compliance with the License. You may obtain
6# a copy of the License at
7#
8# http://www.apache.org/licenses/LICENSE-2.0
9#
10# Unless required by applicable law or agreed to in writing, software
11# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
12# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
13# License for the specific language governing permissions and limitations
14# under the License.
15
Daryl Wallecked8bef32011-12-05 23:02:08 -060016import base64
Ryan Hsu38231092014-06-08 23:12:10 -070017import logging
Matthew Treinish96e9e882014-06-09 18:37:19 -040018import urlparse
Brian Waldon738cd632011-12-12 18:45:09 -050019
ivan-zhu1feeb382013-01-24 10:14:39 +080020import testtools
Jay Pipes13b479b2012-06-11 14:52:27 -040021
Sean Dague1937d092013-05-17 16:36:38 -040022from tempest.api.compute import base
Masayuki Igawa259c1132013-10-31 17:48:44 +090023from tempest.common.utils import data_utils
Masayuki Igawa209fd502014-02-17 14:46:43 +090024from tempest.common.utils.linux import remote_client
Sean Dague86bd8422013-12-20 09:56:44 -050025from tempest import config
Matthew Treinisha83a16e2012-12-07 13:44:02 -050026from tempest import exceptions
Masayuki Igawa209fd502014-02-17 14:46:43 +090027from tempest import test
Daryl Wallecked8bef32011-12-05 23:02:08 -060028
Sean Dague86bd8422013-12-20 09:56:44 -050029CONF = config.CONF
30
Ryan Hsu38231092014-06-08 23:12:10 -070031LOG = logging.getLogger(__name__)
32
Daryl Walleckc7251962012-03-12 17:26:54 -050033
ivan-zhuf2b00502013-10-18 10:06:52 +080034class ServerActionsTestJSON(base.BaseV2ComputeTest):
Sean Dague86bd8422013-12-20 09:56:44 -050035 run_ssh = CONF.compute.run_ssh
Daryl Wallecked8bef32011-12-05 23:02:08 -060036
Attila Fazekas19044d52013-02-16 07:35:06 +010037 def setUp(self):
Matt Riedemann2da58592014-06-08 12:46:02 +000038 # NOTE(afazekas): Normally we use the same server with all test cases,
39 # but if it has an issue, we build a new one
Attila Fazekas19044d52013-02-16 07:35:06 +010040 super(ServerActionsTestJSON, self).setUp()
Matt Riedemann2da58592014-06-08 12:46:02 +000041 # Check if the server is in a clean state after test
42 try:
43 self.client.wait_for_server_status(self.server_id, 'ACTIVE')
44 except Exception:
45 # Rebuild server if something happened to it during a test
46 self.__class__.server_id = self.rebuild_server(self.server_id)
47
48 def tearDown(self):
49 _, server = self.client.get_server(self.server_id)
50 self.assertEqual(self.image_ref, server['image']['id'])
51 self.server_check_teardown()
52 super(ServerActionsTestJSON, self).tearDown()
Attila Fazekas305e65b2013-10-29 13:23:07 +010053
Attila Fazekas19044d52013-02-16 07:35:06 +010054 @classmethod
Andrea Frittoli50bb80d2014-09-15 12:34:27 +010055 def resource_setup(cls):
Attila Fazekas423834d2014-03-14 17:33:13 +010056 cls.prepare_instance_network()
Andrea Frittoli50bb80d2014-09-15 12:34:27 +010057 super(ServerActionsTestJSON, cls).resource_setup()
Attila Fazekas19044d52013-02-16 07:35:06 +010058 cls.client = cls.servers_client
Matt Riedemann2da58592014-06-08 12:46:02 +000059 cls.server_id = cls.rebuild_server(None)
Attila Fazekas19044d52013-02-16 07:35:06 +010060
Sean Dague86bd8422013-12-20 09:56:44 -050061 @testtools.skipUnless(CONF.compute_feature_enabled.change_password,
ivan-zhu1feeb382013-01-24 10:14:39 +080062 'Change password not available.')
Masayuki Igawa209fd502014-02-17 14:46:43 +090063 @test.attr(type='gate')
Daryl Wallecked8bef32011-12-05 23:02:08 -060064 def test_change_server_password(self):
Sean Dague4dd2c0b2013-01-03 17:50:28 -050065 # The server's password should be set to the provided password
Daryl Walleck98e66dd2012-06-21 04:58:39 -050066 new_password = 'Newpass1234'
67 resp, body = self.client.change_password(self.server_id, new_password)
Daryl Wallecked8bef32011-12-05 23:02:08 -060068 self.assertEqual(202, resp.status)
Brian Waldon3bde07f2011-12-13 15:11:22 -050069 self.client.wait_for_server_status(self.server_id, 'ACTIVE')
Daryl Wallecked8bef32011-12-05 23:02:08 -060070
Daryl Walleck98e66dd2012-06-21 04:58:39 -050071 if self.run_ssh:
72 # Verify that the user can authenticate with the new password
73 resp, server = self.client.get_server(self.server_id)
Masayuki Igawa209fd502014-02-17 14:46:43 +090074 linux_client = remote_client.RemoteClient(server, self.ssh_user,
75 new_password)
Attila Fazekasad7ef7d2013-11-20 10:12:53 +010076 linux_client.validate_authentication()
Daryl Walleck98e66dd2012-06-21 04:58:39 -050077
Ken'ichi Ohmichi84d7fbc2014-09-30 01:42:33 +000078 def _test_reboot_server(self, reboot_type):
Daryl Walleck98e66dd2012-06-21 04:58:39 -050079 if self.run_ssh:
80 # Get the time the server was last rebooted,
Daryl Walleck98e66dd2012-06-21 04:58:39 -050081 resp, server = self.client.get_server(self.server_id)
Masayuki Igawa209fd502014-02-17 14:46:43 +090082 linux_client = remote_client.RemoteClient(server, self.ssh_user,
83 self.password)
Daryl Walleck98e66dd2012-06-21 04:58:39 -050084 boot_time = linux_client.get_boot_time()
Daryl Walleck98e66dd2012-06-21 04:58:39 -050085
Ken'ichi Ohmichi84d7fbc2014-09-30 01:42:33 +000086 resp, body = self.client.reboot(self.server_id, reboot_type)
Daryl Wallecked8bef32011-12-05 23:02:08 -060087 self.assertEqual(202, resp.status)
Brian Waldon3bde07f2011-12-13 15:11:22 -050088 self.client.wait_for_server_status(self.server_id, 'ACTIVE')
Daryl Wallecked8bef32011-12-05 23:02:08 -060089
Daryl Walleck98e66dd2012-06-21 04:58:39 -050090 if self.run_ssh:
91 # Log in and verify the boot time has changed
Masayuki Igawa209fd502014-02-17 14:46:43 +090092 linux_client = remote_client.RemoteClient(server, self.ssh_user,
93 self.password)
Daryl Walleck98e66dd2012-06-21 04:58:39 -050094 new_boot_time = linux_client.get_boot_time()
Vincent Untz32173d12014-01-19 20:34:47 +010095 self.assertTrue(new_boot_time > boot_time,
96 '%s > %s' % (new_boot_time, boot_time))
Daryl Walleck98e66dd2012-06-21 04:58:39 -050097
Ken'ichi Ohmichi84d7fbc2014-09-30 01:42:33 +000098 @test.attr(type='smoke')
99 def test_reboot_server_hard(self):
100 # The server should be power cycled
101 self._test_reboot_server('HARD')
102
Masayuki Igawa209fd502014-02-17 14:46:43 +0900103 @test.skip_because(bug="1014647")
104 @test.attr(type='smoke')
Daryl Wallecked8bef32011-12-05 23:02:08 -0600105 def test_reboot_server_soft(self):
Sean Dague4dd2c0b2013-01-03 17:50:28 -0500106 # The server should be signaled to reboot gracefully
Ken'ichi Ohmichi84d7fbc2014-09-30 01:42:33 +0000107 self._test_reboot_server('SOFT')
Daryl Walleck98e66dd2012-06-21 04:58:39 -0500108
Masayuki Igawa209fd502014-02-17 14:46:43 +0900109 @test.attr(type='smoke')
Daryl Wallecked8bef32011-12-05 23:02:08 -0600110 def test_rebuild_server(self):
Sean Dague4dd2c0b2013-01-03 17:50:28 -0500111 # The server should be rebuilt using the provided image and data
Daryl Wallecked8bef32011-12-05 23:02:08 -0600112 meta = {'rebuild': 'server'}
Masayuki Igawa259c1132013-10-31 17:48:44 +0900113 new_name = data_utils.rand_name('server')
Daryl Wallecked8bef32011-12-05 23:02:08 -0600114 file_contents = 'Test server rebuild.'
Mahesh Panchaksharaiah21599a92013-07-03 15:28:58 +0530115 personality = [{'path': 'rebuild.txt',
Daryl Wallecked8bef32011-12-05 23:02:08 -0600116 'contents': base64.b64encode(file_contents)}]
Daryl Walleck98e66dd2012-06-21 04:58:39 -0500117 password = 'rebuildPassw0rd'
Brian Waldon3bde07f2011-12-13 15:11:22 -0500118 resp, rebuilt_server = self.client.rebuild(self.server_id,
Daryl Wallecked8bef32011-12-05 23:02:08 -0600119 self.image_ref_alt,
ivan-zhu454b1c52013-09-30 16:40:21 +0800120 name=new_name,
121 metadata=meta,
Daryl Wallecked8bef32011-12-05 23:02:08 -0600122 personality=personality,
Daryl Walleck98e66dd2012-06-21 04:58:39 -0500123 adminPass=password)
Daryl Wallecked8bef32011-12-05 23:02:08 -0600124
Attila Fazekasf7f34f92013-08-01 17:01:44 +0200125 # Verify the properties in the initial response are correct
Brian Waldon3bde07f2011-12-13 15:11:22 -0500126 self.assertEqual(self.server_id, rebuilt_server['id'])
Eoghan Glynn57c1a3d2012-03-01 16:50:29 -0500127 rebuilt_image_id = rebuilt_server['image']['id']
128 self.assertTrue(self.image_ref_alt.endswith(rebuilt_image_id))
Ken'ichi Ohmichi35772602013-11-14 15:03:27 +0900129 self.assertEqual(self.flavor_ref, rebuilt_server['flavor']['id'])
Daryl Wallecked8bef32011-12-05 23:02:08 -0600130
Attila Fazekasf7f34f92013-08-01 17:01:44 +0200131 # Verify the server properties after the rebuild completes
Daryl Wallecked8bef32011-12-05 23:02:08 -0600132 self.client.wait_for_server_status(rebuilt_server['id'], 'ACTIVE')
133 resp, server = self.client.get_server(rebuilt_server['id'])
Zhi Kun Liue5401762013-09-11 20:45:48 +0800134 rebuilt_image_id = server['image']['id']
Eoghan Glynn57c1a3d2012-03-01 16:50:29 -0500135 self.assertTrue(self.image_ref_alt.endswith(rebuilt_image_id))
Zhi Kun Liue5401762013-09-11 20:45:48 +0800136 self.assertEqual(new_name, server['name'])
Daryl Wallecked8bef32011-12-05 23:02:08 -0600137
Daryl Walleck98e66dd2012-06-21 04:58:39 -0500138 if self.run_ssh:
139 # Verify that the user can authenticate with the provided password
Masayuki Igawa209fd502014-02-17 14:46:43 +0900140 linux_client = remote_client.RemoteClient(server, self.ssh_user,
141 password)
Attila Fazekasad7ef7d2013-11-20 10:12:53 +0100142 linux_client.validate_authentication()
Attila Fazekas305e65b2013-10-29 13:23:07 +0100143 if self.image_ref_alt != self.image_ref:
144 self.client.rebuild(self.server_id, self.image_ref)
Daryl Walleck98e66dd2012-06-21 04:58:39 -0500145
Masayuki Igawa209fd502014-02-17 14:46:43 +0900146 @test.attr(type='gate')
Zhi Kun Liue5401762013-09-11 20:45:48 +0800147 def test_rebuild_server_in_stop_state(self):
148 # The server in stop state should be rebuilt using the provided
149 # image and remain in SHUTOFF state
150 resp, server = self.client.get_server(self.server_id)
151 old_image = server['image']['id']
152 new_image = self.image_ref_alt \
153 if old_image == self.image_ref else self.image_ref
154 resp, server = self.client.stop(self.server_id)
155 self.assertEqual(202, resp.status)
156 self.client.wait_for_server_status(self.server_id, 'SHUTOFF')
Zhi Kun Liue5401762013-09-11 20:45:48 +0800157 resp, rebuilt_server = self.client.rebuild(self.server_id, new_image)
Zhi Kun Liue5401762013-09-11 20:45:48 +0800158
159 # Verify the properties in the initial response are correct
160 self.assertEqual(self.server_id, rebuilt_server['id'])
161 rebuilt_image_id = rebuilt_server['image']['id']
162 self.assertEqual(new_image, rebuilt_image_id)
163 self.assertEqual(self.flavor_ref, rebuilt_server['flavor']['id'])
164
165 # Verify the server properties after the rebuild completes
166 self.client.wait_for_server_status(rebuilt_server['id'], 'SHUTOFF')
167 resp, server = self.client.get_server(rebuilt_server['id'])
168 rebuilt_image_id = server['image']['id']
169 self.assertEqual(new_image, rebuilt_image_id)
170
Attila Fazekas305e65b2013-10-29 13:23:07 +0100171 # Restore to the original image (The tearDown will test it again)
172 if self.image_ref_alt != self.image_ref:
173 self.client.rebuild(self.server_id, old_image)
174 self.client.wait_for_server_status(self.server_id, 'SHUTOFF')
175 self.client.start(self.server_id)
176
Tiago Mello52d8fda2013-02-12 12:10:30 -0500177 def _detect_server_image_flavor(self, server_id):
178 # Detects the current server image flavor ref.
Jinhe Fangd4bd30b2014-01-07 15:23:41 +0800179 resp, server = self.client.get_server(server_id)
Tiago Mello52d8fda2013-02-12 12:10:30 -0500180 current_flavor = server['flavor']['id']
181 new_flavor_ref = self.flavor_ref_alt \
Ken'ichi Ohmichi35772602013-11-14 15:03:27 +0900182 if current_flavor == self.flavor_ref else self.flavor_ref
183 return current_flavor, new_flavor_ref
Tiago Mello52d8fda2013-02-12 12:10:30 -0500184
Matt Riedemann9fd63b82014-04-14 09:33:05 -0700185 def _test_resize_server_confirm(self, stop=False):
Sean Dague4dd2c0b2013-01-03 17:50:28 -0500186 # The server's RAM and disk space should be modified to that of
187 # the provided flavor
Daryl Wallecked8bef32011-12-05 23:02:08 -0600188
Tiago Mello52d8fda2013-02-12 12:10:30 -0500189 previous_flavor_ref, new_flavor_ref = \
190 self._detect_server_image_flavor(self.server_id)
191
Matt Riedemann9fd63b82014-04-14 09:33:05 -0700192 if stop:
193 resp = self.servers_client.stop(self.server_id)[0]
194 self.assertEqual(202, resp.status)
195 self.servers_client.wait_for_server_status(self.server_id,
196 'SHUTOFF')
197
Tiago Mello52d8fda2013-02-12 12:10:30 -0500198 resp, server = self.client.resize(self.server_id, new_flavor_ref)
Daryl Wallecked8bef32011-12-05 23:02:08 -0600199 self.assertEqual(202, resp.status)
Brian Waldon3bde07f2011-12-13 15:11:22 -0500200 self.client.wait_for_server_status(self.server_id, 'VERIFY_RESIZE')
Daryl Wallecked8bef32011-12-05 23:02:08 -0600201
Brian Waldon3bde07f2011-12-13 15:11:22 -0500202 self.client.confirm_resize(self.server_id)
Matt Riedemann9fd63b82014-04-14 09:33:05 -0700203 expected_status = 'SHUTOFF' if stop else 'ACTIVE'
204 self.client.wait_for_server_status(self.server_id, expected_status)
Daryl Wallecked8bef32011-12-05 23:02:08 -0600205
Brian Waldon3bde07f2011-12-13 15:11:22 -0500206 resp, server = self.client.get_server(self.server_id)
Ken'ichi Ohmichi35772602013-11-14 15:03:27 +0900207 self.assertEqual(new_flavor_ref, server['flavor']['id'])
Daryl Wallecked8bef32011-12-05 23:02:08 -0600208
Matt Riedemann9fd63b82014-04-14 09:33:05 -0700209 if stop:
210 # NOTE(mriedem): tearDown requires the server to be started.
211 self.client.start(self.server_id)
212
213 @testtools.skipUnless(CONF.compute_feature_enabled.resize,
214 'Resize not available.')
215 @test.attr(type='smoke')
216 def test_resize_server_confirm(self):
217 self._test_resize_server_confirm(stop=False)
218
219 @testtools.skipUnless(CONF.compute_feature_enabled.resize,
220 'Resize not available.')
221 @test.attr(type='smoke')
222 def test_resize_server_confirm_from_stopped(self):
223 self._test_resize_server_confirm(stop=True)
224
Matt Riedemann5d1f8b12014-03-24 09:12:53 -0700225 @testtools.skipUnless(CONF.compute_feature_enabled.resize,
226 'Resize not available.')
Masayuki Igawa209fd502014-02-17 14:46:43 +0900227 @test.attr(type='gate')
Daryl Wallecked8bef32011-12-05 23:02:08 -0600228 def test_resize_server_revert(self):
Sean Dague4dd2c0b2013-01-03 17:50:28 -0500229 # The server's RAM and disk space should return to its original
230 # values after a resize is reverted
Daryl Wallecked8bef32011-12-05 23:02:08 -0600231
Tiago Mello52d8fda2013-02-12 12:10:30 -0500232 previous_flavor_ref, new_flavor_ref = \
233 self._detect_server_image_flavor(self.server_id)
234
235 resp, server = self.client.resize(self.server_id, new_flavor_ref)
Daryl Wallecked8bef32011-12-05 23:02:08 -0600236 self.assertEqual(202, resp.status)
Brian Waldon3bde07f2011-12-13 15:11:22 -0500237 self.client.wait_for_server_status(self.server_id, 'VERIFY_RESIZE')
Daryl Wallecked8bef32011-12-05 23:02:08 -0600238
Brian Waldon3bde07f2011-12-13 15:11:22 -0500239 self.client.revert_resize(self.server_id)
240 self.client.wait_for_server_status(self.server_id, 'ACTIVE')
Daryl Wallecked8bef32011-12-05 23:02:08 -0600241
Brian Waldon3bde07f2011-12-13 15:11:22 -0500242 resp, server = self.client.get_server(self.server_id)
Matt Riedemanne8a845f2014-03-21 06:54:15 -0700243 self.assertEqual(previous_flavor_ref, server['flavor']['id'])
sapan-konaf1e3f002011-12-22 23:18:44 +0530244
Adam Gandelmanfbc95ac2014-06-19 17:33:43 -0700245 @testtools.skipUnless(CONF.compute_feature_enabled.snapshot,
246 'Snapshotting not available, backup not possible.')
Masayuki Igawa209fd502014-02-17 14:46:43 +0900247 @test.attr(type='gate')
ekhugen0b3bc522014-08-04 20:58:21 +0000248 @test.services('image')
ivan-zhuccc89462013-10-31 16:53:12 +0800249 def test_create_backup(self):
250 # Positive test:create backup successfully and rotate backups correctly
251 # create the first and the second backup
Matt Riedemanne699f822014-01-24 08:11:42 -0800252 backup1 = data_utils.rand_name('backup-1')
ivan-zhuccc89462013-10-31 16:53:12 +0800253 resp, _ = self.servers_client.create_backup(self.server_id,
254 'daily',
255 2,
256 backup1)
257 oldest_backup_exist = True
258
259 # the oldest one should be deleted automatically in this test
260 def _clean_oldest_backup(oldest_backup):
261 if oldest_backup_exist:
Ryan Hsu38231092014-06-08 23:12:10 -0700262 try:
263 self.os.image_client.delete_image(oldest_backup)
264 except exceptions.NotFound:
265 pass
266 else:
267 LOG.warning("Deletion of oldest backup %s should not have "
268 "been successful as it should have been "
269 "deleted during rotation." % oldest_backup)
ivan-zhuccc89462013-10-31 16:53:12 +0800270
Masayuki Igawa259c1132013-10-31 17:48:44 +0900271 image1_id = data_utils.parse_image_id(resp['location'])
ivan-zhuccc89462013-10-31 16:53:12 +0800272 self.addCleanup(_clean_oldest_backup, image1_id)
273 self.assertEqual(202, resp.status)
Matt Riedemann46c1b2c2013-12-11 19:51:39 -0800274 self.os.image_client.wait_for_image_status(image1_id, 'active')
ivan-zhuccc89462013-10-31 16:53:12 +0800275
Matt Riedemanne699f822014-01-24 08:11:42 -0800276 backup2 = data_utils.rand_name('backup-2')
ivan-zhuccc89462013-10-31 16:53:12 +0800277 self.servers_client.wait_for_server_status(self.server_id, 'ACTIVE')
278 resp, _ = self.servers_client.create_backup(self.server_id,
279 'daily',
280 2,
281 backup2)
Masayuki Igawa259c1132013-10-31 17:48:44 +0900282 image2_id = data_utils.parse_image_id(resp['location'])
ivan-zhuccc89462013-10-31 16:53:12 +0800283 self.addCleanup(self.os.image_client.delete_image, image2_id)
284 self.assertEqual(202, resp.status)
Matt Riedemann46c1b2c2013-12-11 19:51:39 -0800285 self.os.image_client.wait_for_image_status(image2_id, 'active')
ivan-zhuccc89462013-10-31 16:53:12 +0800286
287 # verify they have been created
288 properties = {
289 'image_type': 'backup',
290 'backup_type': "daily",
291 'instance_uuid': self.server_id,
292 }
293 resp, image_list = self.os.image_client.image_list_detail(
294 properties,
Ken'ichi Ohmichi06d37cf2014-01-28 07:55:46 +0900295 status='active',
ivan-zhuccc89462013-10-31 16:53:12 +0800296 sort_key='created_at',
297 sort_dir='asc')
298 self.assertEqual(200, resp.status)
299 self.assertEqual(2, len(image_list))
300 self.assertEqual((backup1, backup2),
301 (image_list[0]['name'], image_list[1]['name']))
302
303 # create the third one, due to the rotation is 2,
304 # the first one will be deleted
Matt Riedemanne699f822014-01-24 08:11:42 -0800305 backup3 = data_utils.rand_name('backup-3')
ivan-zhuccc89462013-10-31 16:53:12 +0800306 self.servers_client.wait_for_server_status(self.server_id, 'ACTIVE')
307 resp, _ = self.servers_client.create_backup(self.server_id,
308 'daily',
309 2,
310 backup3)
Masayuki Igawa259c1132013-10-31 17:48:44 +0900311 image3_id = data_utils.parse_image_id(resp['location'])
ivan-zhuccc89462013-10-31 16:53:12 +0800312 self.addCleanup(self.os.image_client.delete_image, image3_id)
313 self.assertEqual(202, resp.status)
314 # the first back up should be deleted
Chang Ye Wang02970572013-12-03 03:32:38 -0600315 self.servers_client.wait_for_server_status(self.server_id, 'ACTIVE')
ivan-zhuccc89462013-10-31 16:53:12 +0800316 self.os.image_client.wait_for_resource_deletion(image1_id)
317 oldest_backup_exist = False
318 resp, image_list = self.os.image_client.image_list_detail(
319 properties,
Ken'ichi Ohmichi06d37cf2014-01-28 07:55:46 +0900320 status='active',
ivan-zhuccc89462013-10-31 16:53:12 +0800321 sort_key='created_at',
322 sort_dir='asc')
323 self.assertEqual(200, resp.status)
Matt Riedemanne699f822014-01-24 08:11:42 -0800324 self.assertEqual(2, len(image_list),
325 'Unexpected number of images for '
326 'v2:test_create_backup; was the oldest backup not '
327 'yet deleted? Image list: %s' %
328 [image['name'] for image in image_list])
ivan-zhuccc89462013-10-31 16:53:12 +0800329 self.assertEqual((backup2, backup3),
330 (image_list[0]['name'], image_list[1]['name']))
331
Ken'ichi Ohmichi547a3062013-12-02 09:30:36 +0900332 def _get_output(self):
333 resp, output = self.servers_client.get_console_output(
334 self.server_id, 10)
335 self.assertEqual(200, resp.status)
336 self.assertTrue(output, "Console output was empty.")
337 lines = len(output.split('\n'))
338 self.assertEqual(lines, 10)
339
Adam Gandelmanc6eefb42014-07-15 16:44:08 -0700340 @testtools.skipUnless(CONF.compute_feature_enabled.console_output,
341 'Console output not supported.')
Masayuki Igawa209fd502014-02-17 14:46:43 +0900342 @test.attr(type='gate')
Attila Fazekas45c3fbc2013-02-24 16:39:52 +0100343 def test_get_console_output(self):
344 # Positive test:Should be able to GET the console output
345 # for a given server_id and number of lines
Ken'ichi Ohmichi851a1352013-11-26 18:42:52 +0900346
347 # This reboot is necessary for outputting some console log after
348 # creating a instance backup. If a instance backup, the console
349 # log file is truncated and we cannot get any console log through
350 # "console-log" API.
351 # The detail is https://bugs.launchpad.net/nova/+bug/1251920
352 resp, body = self.servers_client.reboot(self.server_id, 'HARD')
353 self.assertEqual(202, resp.status)
354 self.servers_client.wait_for_server_status(self.server_id, 'ACTIVE')
355
Ken'ichi Ohmichi547a3062013-12-02 09:30:36 +0900356 self.wait_for(self._get_output)
Attila Fazekas45c3fbc2013-02-24 16:39:52 +0100357
Adam Gandelmanc6eefb42014-07-15 16:44:08 -0700358 @testtools.skipUnless(CONF.compute_feature_enabled.console_output,
359 'Console output not supported.')
Masayuki Igawa209fd502014-02-17 14:46:43 +0900360 @test.attr(type='gate')
Ken'ichi Ohmichibd5df122014-09-18 08:03:52 +0000361 def test_get_console_output_with_unlimited_size(self):
362 _, server = self.create_test_server(wait_until='ACTIVE')
363
364 def _check_full_length_console_log():
365 _, output = self.servers_client.get_console_output(server['id'],
366 None)
367 self.assertTrue(output, "Console output was empty.")
368 lines = len(output.split('\n'))
369
370 # NOTE: This test tries to get full length console log, and the
371 # length should be bigger than the one of test_get_console_output.
372 self.assertTrue(lines > 10, "Cannot get enough console log length."
373 " (lines: %s)" % lines)
374
375 self.wait_for(_check_full_length_console_log)
376
377 @testtools.skipUnless(CONF.compute_feature_enabled.console_output,
378 'Console output not supported.')
379 @test.attr(type='gate')
Ken'ichi Ohmichi547a3062013-12-02 09:30:36 +0900380 def test_get_console_output_server_id_in_shutoff_status(self):
Attila Fazekas45c3fbc2013-02-24 16:39:52 +0100381 # Positive test:Should be able to GET the console output
Ken'ichi Ohmichi547a3062013-12-02 09:30:36 +0900382 # for a given server_id in SHUTOFF status
383
384 # NOTE: SHUTOFF is irregular status. To avoid test instability,
385 # one server is created only for this test without using
386 # the server that was created in setupClass.
387 resp, server = self.create_test_server(wait_until='ACTIVE')
388 temp_server_id = server['id']
389
390 resp, server = self.servers_client.stop(temp_server_id)
391 self.assertEqual(202, resp.status)
392 self.servers_client.wait_for_server_status(temp_server_id, 'SHUTOFF')
393
394 self.wait_for(self._get_output)
Dan Smithbc3bd242012-08-14 09:48:48 -0700395
Matt Riedemann992162e2014-03-24 09:11:06 -0700396 @testtools.skipUnless(CONF.compute_feature_enabled.pause,
397 'Pause is not available.')
Masayuki Igawa209fd502014-02-17 14:46:43 +0900398 @test.attr(type='gate')
Prem Karat6631f802013-07-04 12:07:33 +0530399 def test_pause_unpause_server(self):
400 resp, server = self.client.pause_server(self.server_id)
401 self.assertEqual(202, resp.status)
402 self.client.wait_for_server_status(self.server_id, 'PAUSED')
403 resp, server = self.client.unpause_server(self.server_id)
404 self.assertEqual(202, resp.status)
405 self.client.wait_for_server_status(self.server_id, 'ACTIVE')
406
Matt Riedemannf0cf6952014-03-24 09:08:52 -0700407 @testtools.skipUnless(CONF.compute_feature_enabled.suspend,
408 'Suspend is not available.')
Masayuki Igawa209fd502014-02-17 14:46:43 +0900409 @test.attr(type='gate')
Prem Karat6631f802013-07-04 12:07:33 +0530410 def test_suspend_resume_server(self):
411 resp, server = self.client.suspend_server(self.server_id)
412 self.assertEqual(202, resp.status)
413 self.client.wait_for_server_status(self.server_id, 'SUSPENDED')
414 resp, server = self.client.resume_server(self.server_id)
415 self.assertEqual(202, resp.status)
416 self.client.wait_for_server_status(self.server_id, 'ACTIVE')
417
David Shrewsbury25f666f2014-07-22 12:17:59 -0400418 @testtools.skipUnless(CONF.compute_feature_enabled.shelve,
419 'Shelve is not available.')
Masayuki Igawa209fd502014-02-17 14:46:43 +0900420 @test.attr(type='gate')
Ken'ichi Ohmichi39437e22013-10-06 00:21:38 +0900421 def test_shelve_unshelve_server(self):
422 resp, server = self.client.shelve_server(self.server_id)
423 self.assertEqual(202, resp.status)
424
Matthew Treinishb0a78fc2014-01-29 16:49:12 +0000425 offload_time = CONF.compute.shelved_offload_time
Ken'ichi Ohmichi39437e22013-10-06 00:21:38 +0900426 if offload_time >= 0:
427 self.client.wait_for_server_status(self.server_id,
428 'SHELVED_OFFLOADED',
429 extra_timeout=offload_time)
430 else:
431 self.client.wait_for_server_status(self.server_id,
432 'SHELVED')
433
Ken'ichi Ohmichi17b7f112014-02-20 06:33:49 +0900434 resp, server = self.client.shelve_offload_server(self.server_id)
435 self.assertEqual(202, resp.status)
436 self.client.wait_for_server_status(self.server_id,
437 'SHELVED_OFFLOADED')
438
Ken'ichi Ohmichi39437e22013-10-06 00:21:38 +0900439 resp, server = self.client.get_server(self.server_id)
440 image_name = server['name'] + '-shelved'
441 params = {'name': image_name}
442 resp, images = self.images_client.list_images(params)
443 self.assertEqual(1, len(images))
444 self.assertEqual(image_name, images[0]['name'])
445
446 resp, server = self.client.unshelve_server(self.server_id)
447 self.assertEqual(202, resp.status)
448 self.client.wait_for_server_status(self.server_id, 'ACTIVE')
449
Masayuki Igawa209fd502014-02-17 14:46:43 +0900450 @test.attr(type='gate')
Anju Tiwariaf98d222013-08-05 15:19:50 +0530451 def test_stop_start_server(self):
452 resp, server = self.servers_client.stop(self.server_id)
453 self.assertEqual(202, resp.status)
454 self.servers_client.wait_for_server_status(self.server_id, 'SHUTOFF')
455 resp, server = self.servers_client.start(self.server_id)
456 self.assertEqual(202, resp.status)
457 self.servers_client.wait_for_server_status(self.server_id, 'ACTIVE')
458
Masayuki Igawa209fd502014-02-17 14:46:43 +0900459 @test.attr(type='gate')
Zhu Zhu9643e512013-09-23 09:13:07 -0500460 def test_lock_unlock_server(self):
461 # Lock the server,try server stop(exceptions throw),unlock it and retry
462 resp, server = self.servers_client.lock_server(self.server_id)
463 self.assertEqual(202, resp.status)
464 resp, server = self.servers_client.get_server(self.server_id)
465 self.assertEqual(200, resp.status)
466 self.assertEqual(server['status'], 'ACTIVE')
467 # Locked server is not allowed to be stopped by non-admin user
ivan-zhu75a4ac82013-10-31 23:07:05 +0800468 self.assertRaises(exceptions.Conflict,
Zhu Zhu9643e512013-09-23 09:13:07 -0500469 self.servers_client.stop, self.server_id)
470 resp, server = self.servers_client.unlock_server(self.server_id)
471 self.assertEqual(202, resp.status)
472 resp, server = self.servers_client.stop(self.server_id)
473 self.assertEqual(202, resp.status)
474 self.servers_client.wait_for_server_status(self.server_id, 'SHUTOFF')
475 resp, server = self.servers_client.start(self.server_id)
476 self.assertEqual(202, resp.status)
477 self.servers_client.wait_for_server_status(self.server_id, 'ACTIVE')
478
Ghanshyam86d1a572014-03-05 10:19:25 +0900479 def _validate_url(self, url):
480 valid_scheme = ['http', 'https']
481 parsed_url = urlparse.urlparse(url)
482 self.assertNotEqual('None', parsed_url.port)
483 self.assertNotEqual('None', parsed_url.hostname)
484 self.assertIn(parsed_url.scheme, valid_scheme)
485
486 @testtools.skipUnless(CONF.compute_feature_enabled.vnc_console,
487 'VNC Console feature is disabled.')
488 @test.attr(type='gate')
489 def test_get_vnc_console(self):
490 # Get the VNC console of type 'novnc' and 'xvpvnc'
491 console_types = ['novnc', 'xvpvnc']
492 for console_type in console_types:
493 resp, body = self.servers_client.get_vnc_console(self.server_id,
494 console_type)
495 self.assertEqual(
496 200, resp.status,
497 "Failed to get Console Type: %s" % (console_types))
498 self.assertEqual(console_type, body['type'])
499 self.assertNotEqual('', body['url'])
500 self._validate_url(body['url'])
501
Dan Smithbc3bd242012-08-14 09:48:48 -0700502
Attila Fazekas19044d52013-02-16 07:35:06 +0100503class ServerActionsTestXML(ServerActionsTestJSON):
504 _interface = 'xml'