ZhiQiang Fan | 39f9722 | 2013-09-20 04:49:44 +0800 | [diff] [blame] | 1 | # Copyright 2012 OpenStack Foundation |
Jay Pipes | 13b479b | 2012-06-11 14:52:27 -0400 | [diff] [blame] | 2 | # All Rights Reserved. |
| 3 | # |
| 4 | # Licensed under the Apache License, Version 2.0 (the "License"); you may |
| 5 | # not use this file except in compliance with the License. You may obtain |
| 6 | # a copy of the License at |
| 7 | # |
| 8 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | # |
| 10 | # Unless required by applicable law or agreed to in writing, software |
| 11 | # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| 12 | # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the |
| 13 | # License for the specific language governing permissions and limitations |
| 14 | # under the License. |
| 15 | |
Mauro S. M. Rodrigues | 5411036 | 2013-02-15 13:14:04 -0500 | [diff] [blame] | 16 | import netaddr |
ivan-zhu | 1feeb38 | 2013-01-24 10:14:39 +0800 | [diff] [blame] | 17 | import testtools |
Jay Pipes | 13b479b | 2012-06-11 14:52:27 -0400 | [diff] [blame] | 18 | |
Sean Dague | 1937d09 | 2013-05-17 16:36:38 -0400 | [diff] [blame] | 19 | from tempest.api.compute import base |
Fei Long Wang | d39431f | 2015-05-14 11:30:48 +1200 | [diff] [blame] | 20 | from tempest.common.utils import data_utils |
Masayuki Igawa | 209fd50 | 2014-02-17 14:46:43 +0900 | [diff] [blame] | 21 | from tempest.common.utils.linux import remote_client |
Ken'ichi Ohmichi | e91a0c6 | 2015-08-13 02:09:16 +0000 | [diff] [blame] | 22 | from tempest.common import waiters |
Sean Dague | 86bd842 | 2013-12-20 09:56:44 -0500 | [diff] [blame] | 23 | from tempest import config |
Masayuki Igawa | 209fd50 | 2014-02-17 14:46:43 +0900 | [diff] [blame] | 24 | from tempest import test |
Daryl Walleck | 6b9b288 | 2012-04-08 21:43:39 -0500 | [diff] [blame] | 25 | |
Sean Dague | 86bd842 | 2013-12-20 09:56:44 -0500 | [diff] [blame] | 26 | CONF = config.CONF |
| 27 | |
Daryl Walleck | 6b9b288 | 2012-04-08 21:43:39 -0500 | [diff] [blame] | 28 | |
ivan-zhu | f2b0050 | 2013-10-18 10:06:52 +0800 | [diff] [blame] | 29 | class ServersTestJSON(base.BaseV2ComputeTest): |
ivan-zhu | a5141d9 | 2013-03-06 23:12:43 +0800 | [diff] [blame] | 30 | disk_config = 'AUTO' |
Daryl Walleck | 6b9b288 | 2012-04-08 21:43:39 -0500 | [diff] [blame] | 31 | |
Attila Fazekas | 19044d5 | 2013-02-16 07:35:06 +0100 | [diff] [blame] | 32 | @classmethod |
Rohan Kanade | 60b7309 | 2015-02-04 17:58:19 +0530 | [diff] [blame] | 33 | def setup_credentials(cls): |
Attila Fazekas | 423834d | 2014-03-14 17:33:13 +0100 | [diff] [blame] | 34 | cls.prepare_instance_network() |
Rohan Kanade | 60b7309 | 2015-02-04 17:58:19 +0530 | [diff] [blame] | 35 | super(ServersTestJSON, cls).setup_credentials() |
| 36 | |
| 37 | @classmethod |
| 38 | def setup_clients(cls): |
| 39 | super(ServersTestJSON, cls).setup_clients() |
| 40 | cls.client = cls.servers_client |
John Warren | 94d8faf | 2015-09-15 12:22:24 -0400 | [diff] [blame] | 41 | cls.networks_client = cls.os.networks_client |
John Warren | 3961acd | 2015-10-02 14:38:53 -0400 | [diff] [blame] | 42 | cls.subnets_client = cls.os.subnets_client |
Rohan Kanade | 60b7309 | 2015-02-04 17:58:19 +0530 | [diff] [blame] | 43 | |
| 44 | @classmethod |
| 45 | def resource_setup(cls): |
nithya-ganesan | 222efd7 | 2015-01-22 12:20:27 +0000 | [diff] [blame] | 46 | cls.set_validation_resources() |
Andrea Frittoli | 50bb80d | 2014-09-15 12:34:27 +0100 | [diff] [blame] | 47 | super(ServersTestJSON, cls).resource_setup() |
Daryl Walleck | 6b9b288 | 2012-04-08 21:43:39 -0500 | [diff] [blame] | 48 | cls.meta = {'hello': 'world'} |
| 49 | cls.accessIPv4 = '1.1.1.1' |
Mauro S. M. Rodrigues | 5411036 | 2013-02-15 13:14:04 -0500 | [diff] [blame] | 50 | cls.accessIPv6 = '0000:0000:0000:0000:0000:babe:220.12.22.2' |
zhufl | c6ce539 | 2016-08-17 14:34:37 +0800 | [diff] [blame] | 51 | cls.name = data_utils.rand_name(cls.__name__ + '-server') |
Ghanshyam | 3390d9f | 2015-12-25 12:48:02 +0900 | [diff] [blame] | 52 | cls.password = data_utils.rand_password() |
David Kranz | 0fb1429 | 2015-02-11 15:55:20 -0500 | [diff] [blame] | 53 | disk_config = cls.disk_config |
Joseph Lanoux | b3e1f87 | 2015-01-30 11:13:07 +0000 | [diff] [blame] | 54 | cls.server_initial = cls.create_test_server( |
| 55 | validatable=True, |
| 56 | wait_until='ACTIVE', |
| 57 | name=cls.name, |
Ken'ichi Ohmichi | f2d436e | 2015-09-03 01:13:16 +0000 | [diff] [blame] | 58 | metadata=cls.meta, |
Joseph Lanoux | b3e1f87 | 2015-01-30 11:13:07 +0000 | [diff] [blame] | 59 | accessIPv4=cls.accessIPv4, |
| 60 | accessIPv6=cls.accessIPv6, |
Ghanshyam | 3390d9f | 2015-12-25 12:48:02 +0900 | [diff] [blame] | 61 | disk_config=disk_config, |
| 62 | adminPass=cls.password) |
ghanshyam | 0f82525 | 2015-08-25 16:02:50 +0900 | [diff] [blame] | 63 | cls.server = (cls.client.show_server(cls.server_initial['id']) |
| 64 | ['server']) |
Daryl Walleck | 6b9b288 | 2012-04-08 21:43:39 -0500 | [diff] [blame] | 65 | |
Matt Riedemann | 778b5f9 | 2015-03-11 12:44:28 -0700 | [diff] [blame] | 66 | def _create_net_subnet_ret_net_from_cidr(self, cidr): |
| 67 | name_net = data_utils.rand_name(self.__class__.__name__) |
John Warren | 94d8faf | 2015-09-15 12:22:24 -0400 | [diff] [blame] | 68 | net = self.networks_client.create_network(name=name_net) |
| 69 | self.addCleanup(self.networks_client.delete_network, |
Matt Riedemann | 778b5f9 | 2015-03-11 12:44:28 -0700 | [diff] [blame] | 70 | net['network']['id']) |
| 71 | |
John Warren | 3961acd | 2015-10-02 14:38:53 -0400 | [diff] [blame] | 72 | subnet = self.subnets_client.create_subnet( |
Matt Riedemann | 778b5f9 | 2015-03-11 12:44:28 -0700 | [diff] [blame] | 73 | network_id=net['network']['id'], |
| 74 | cidr=cidr, |
| 75 | ip_version=4) |
John Warren | 3961acd | 2015-10-02 14:38:53 -0400 | [diff] [blame] | 76 | self.addCleanup(self.subnets_client.delete_subnet, |
Matt Riedemann | 778b5f9 | 2015-03-11 12:44:28 -0700 | [diff] [blame] | 77 | subnet['subnet']['id']) |
| 78 | return net |
| 79 | |
Masayuki Igawa | 209fd50 | 2014-02-17 14:46:43 +0900 | [diff] [blame] | 80 | @test.attr(type='smoke') |
Chris Hoge | 7579c1a | 2015-02-26 14:12:15 -0800 | [diff] [blame] | 81 | @test.idempotent_id('5de47127-9977-400a-936f-abcfbec1218f') |
Daryl Walleck | ed97dca | 2012-07-04 23:25:45 -0500 | [diff] [blame] | 82 | def test_verify_server_details(self): |
Sean Dague | 4dd2c0b | 2013-01-03 17:50:28 -0500 | [diff] [blame] | 83 | # Verify the specified server attributes are set correctly |
Daryl Walleck | 6b9b288 | 2012-04-08 21:43:39 -0500 | [diff] [blame] | 84 | self.assertEqual(self.accessIPv4, self.server['accessIPv4']) |
Mauro S. M. Rodrigues | 5411036 | 2013-02-15 13:14:04 -0500 | [diff] [blame] | 85 | # NOTE(maurosr): See http://tools.ietf.org/html/rfc5952 (section 4) |
| 86 | # Here we compare directly with the canonicalized format. |
| 87 | self.assertEqual(self.server['accessIPv6'], |
| 88 | str(netaddr.IPAddress(self.accessIPv6))) |
Daryl Walleck | 6b9b288 | 2012-04-08 21:43:39 -0500 | [diff] [blame] | 89 | self.assertEqual(self.name, self.server['name']) |
| 90 | self.assertEqual(self.image_ref, self.server['image']['id']) |
Ken'ichi Ohmichi | 3577260 | 2013-11-14 15:03:27 +0900 | [diff] [blame] | 91 | self.assertEqual(self.flavor_ref, self.server['flavor']['id']) |
Daryl Walleck | 6b9b288 | 2012-04-08 21:43:39 -0500 | [diff] [blame] | 92 | self.assertEqual(self.meta, self.server['metadata']) |
| 93 | |
Masayuki Igawa | 209fd50 | 2014-02-17 14:46:43 +0900 | [diff] [blame] | 94 | @test.attr(type='smoke') |
Chris Hoge | 7579c1a | 2015-02-26 14:12:15 -0800 | [diff] [blame] | 95 | @test.idempotent_id('9a438d88-10c6-4bcd-8b5b-5b6e25e1346f') |
Daryl Walleck | ed97dca | 2012-07-04 23:25:45 -0500 | [diff] [blame] | 96 | def test_list_servers(self): |
Sean Dague | 4dd2c0b | 2013-01-03 17:50:28 -0500 | [diff] [blame] | 97 | # The created server should be in the list of all servers |
David Kranz | ae99b9a | 2015-02-16 13:37:01 -0500 | [diff] [blame] | 98 | body = self.client.list_servers() |
Daryl Walleck | ed97dca | 2012-07-04 23:25:45 -0500 | [diff] [blame] | 99 | servers = body['servers'] |
| 100 | found = any([i for i in servers if i['id'] == self.server['id']]) |
| 101 | self.assertTrue(found) |
| 102 | |
Chris Hoge | 7579c1a | 2015-02-26 14:12:15 -0800 | [diff] [blame] | 103 | @test.idempotent_id('585e934c-448e-43c4-acbf-d06a9b899997') |
Daryl Walleck | ed97dca | 2012-07-04 23:25:45 -0500 | [diff] [blame] | 104 | def test_list_servers_with_detail(self): |
Sean Dague | 4dd2c0b | 2013-01-03 17:50:28 -0500 | [diff] [blame] | 105 | # The created server should be in the detailed list of all servers |
Ken'ichi Ohmichi | cbc26a8 | 2015-07-03 08:18:04 +0000 | [diff] [blame] | 106 | body = self.client.list_servers(detail=True) |
Daryl Walleck | ed97dca | 2012-07-04 23:25:45 -0500 | [diff] [blame] | 107 | servers = body['servers'] |
| 108 | found = any([i for i in servers if i['id'] == self.server['id']]) |
| 109 | self.assertTrue(found) |
| 110 | |
Chris Hoge | 7579c1a | 2015-02-26 14:12:15 -0800 | [diff] [blame] | 111 | @test.idempotent_id('cbc0f52f-05aa-492b-bdc1-84b575ca294b') |
Matthew Treinish | e5cca00 | 2015-05-11 15:36:50 -0400 | [diff] [blame] | 112 | @testtools.skipUnless(CONF.validation.run_validation, |
Matt Riedemann | 6c66820 | 2014-03-24 09:17:10 -0700 | [diff] [blame] | 113 | 'Instance validation tests are disabled.') |
Daryl Walleck | 6b9b288 | 2012-04-08 21:43:39 -0500 | [diff] [blame] | 114 | def test_verify_created_server_vcpus(self): |
Sean Dague | 4dd2c0b | 2013-01-03 17:50:28 -0500 | [diff] [blame] | 115 | # Verify that the number of vcpus reported by the instance matches |
| 116 | # the amount stated by the flavor |
ghanshyam | 19973be | 2015-08-18 15:46:42 +0900 | [diff] [blame] | 117 | flavor = self.flavors_client.show_flavor(self.flavor_ref)['flavor'] |
Joseph Lanoux | ffe09dd | 2015-03-18 16:45:33 +0000 | [diff] [blame] | 118 | linux_client = remote_client.RemoteClient( |
| 119 | self.get_server_ip(self.server), |
| 120 | self.ssh_user, |
| 121 | self.password, |
Andrea Frittoli (andreaf) | 2a70a61 | 2016-04-29 16:09:13 -0500 | [diff] [blame] | 122 | self.validation_resources['keypair']['private_key'], |
| 123 | server=self.server, |
| 124 | servers_client=self.client) |
Daryl Walleck | 6b9b288 | 2012-04-08 21:43:39 -0500 | [diff] [blame] | 125 | self.assertEqual(flavor['vcpus'], linux_client.get_number_of_vcpus()) |
| 126 | |
Chris Hoge | 7579c1a | 2015-02-26 14:12:15 -0800 | [diff] [blame] | 127 | @test.idempotent_id('ac1ad47f-984b-4441-9274-c9079b7a0666') |
Matthew Treinish | e5cca00 | 2015-05-11 15:36:50 -0400 | [diff] [blame] | 128 | @testtools.skipUnless(CONF.validation.run_validation, |
Matt Riedemann | 6c66820 | 2014-03-24 09:17:10 -0700 | [diff] [blame] | 129 | 'Instance validation tests are disabled.') |
Daryl Walleck | 6b9b288 | 2012-04-08 21:43:39 -0500 | [diff] [blame] | 130 | def test_host_name_is_same_as_server_name(self): |
Sean Dague | 4dd2c0b | 2013-01-03 17:50:28 -0500 | [diff] [blame] | 131 | # Verify the instance host name is the same as the server name |
Joseph Lanoux | ffe09dd | 2015-03-18 16:45:33 +0000 | [diff] [blame] | 132 | linux_client = remote_client.RemoteClient( |
| 133 | self.get_server_ip(self.server), |
| 134 | self.ssh_user, |
| 135 | self.password, |
Andrea Frittoli (andreaf) | 2a70a61 | 2016-04-29 16:09:13 -0500 | [diff] [blame] | 136 | self.validation_resources['keypair']['private_key'], |
| 137 | server=self.server, |
| 138 | servers_client=self.client) |
imran malik | cdf2038 | 2016-06-16 00:43:57 -0700 | [diff] [blame] | 139 | hostname = linux_client.get_hostname() |
| 140 | msg = ('Failed while verifying servername equals hostname. Expected ' |
| 141 | 'hostname "%s" but got "%s".' % (self.name, hostname)) |
obutenko | 149feaf | 2016-08-31 16:14:45 +0300 | [diff] [blame] | 142 | self.assertEqual(self.name.lower(), hostname, msg) |
Dan Smith | 4307f99 | 2012-08-16 09:23:20 -0700 | [diff] [blame] | 143 | |
Chris Hoge | 7579c1a | 2015-02-26 14:12:15 -0800 | [diff] [blame] | 144 | @test.idempotent_id('ed20d3fb-9d1f-4329-b160-543fbd5d9811') |
zhufl | 70f3c77 | 2016-10-27 11:52:33 +0800 | [diff] [blame] | 145 | @testtools.skipUnless( |
| 146 | test.is_scheduler_filter_enabled("ServerGroupAffinityFilter"), |
| 147 | 'ServerGroupAffinityFilter is not available.') |
Ken'ichi Ohmichi | 60a67f7 | 2014-05-20 09:19:50 +0900 | [diff] [blame] | 148 | def test_create_server_with_scheduler_hint_group(self): |
| 149 | # Create a server with the scheduler hint "group". |
zhufl | b556d25 | 2016-10-24 12:15:56 +0800 | [diff] [blame] | 150 | group_id = self.create_test_server_group()['id'] |
Ken'ichi Ohmichi | 60a67f7 | 2014-05-20 09:19:50 +0900 | [diff] [blame] | 151 | hints = {'group': group_id} |
Ken'ichi Ohmichi | f2d436e | 2015-09-03 01:13:16 +0000 | [diff] [blame] | 152 | server = self.create_test_server(scheduler_hints=hints, |
David Kranz | 0fb1429 | 2015-02-11 15:55:20 -0500 | [diff] [blame] | 153 | wait_until='ACTIVE') |
Ken'ichi Ohmichi | 60a67f7 | 2014-05-20 09:19:50 +0900 | [diff] [blame] | 154 | |
| 155 | # Check a server is in the group |
Ken'ichi Ohmichi | cd11187 | 2015-11-16 06:01:11 +0000 | [diff] [blame] | 156 | server_group = (self.server_groups_client.show_server_group(group_id) |
ghanshyam | 2dc1345 | 2015-08-24 17:39:25 +0900 | [diff] [blame] | 157 | ['server_group']) |
Ken'ichi Ohmichi | 60a67f7 | 2014-05-20 09:19:50 +0900 | [diff] [blame] | 158 | self.assertIn(server['id'], server_group['members']) |
| 159 | |
Chris Hoge | 7579c1a | 2015-02-26 14:12:15 -0800 | [diff] [blame] | 160 | @test.idempotent_id('0578d144-ed74-43f8-8e57-ab10dbf9b3c2') |
Joseph Lanoux | 38edc05 | 2014-09-18 14:25:46 +0000 | [diff] [blame] | 161 | @testtools.skipUnless(CONF.service_available.neutron, |
| 162 | 'Neutron service must be available.') |
| 163 | def test_verify_multiple_nics_order(self): |
| 164 | # Verify that the networks order given at the server creation is |
| 165 | # preserved within the server. |
Matt Riedemann | 778b5f9 | 2015-03-11 12:44:28 -0700 | [diff] [blame] | 166 | net1 = self._create_net_subnet_ret_net_from_cidr('19.80.0.0/24') |
| 167 | net2 = self._create_net_subnet_ret_net_from_cidr('19.86.0.0/24') |
Joseph Lanoux | 38edc05 | 2014-09-18 14:25:46 +0000 | [diff] [blame] | 168 | |
| 169 | networks = [{'uuid': net1['network']['id']}, |
| 170 | {'uuid': net2['network']['id']}] |
| 171 | |
David Kranz | 0fb1429 | 2015-02-11 15:55:20 -0500 | [diff] [blame] | 172 | server_multi_nics = self.create_test_server( |
Joseph Lanoux | 38edc05 | 2014-09-18 14:25:46 +0000 | [diff] [blame] | 173 | networks=networks, wait_until='ACTIVE') |
| 174 | |
Joseph Lanoux | e59f0ff | 2014-10-17 14:56:56 +0000 | [diff] [blame] | 175 | # Cleanup server; this is needed in the test case because with the LIFO |
| 176 | # nature of the cleanups, if we don't delete the server first, the port |
| 177 | # will still be part of the subnet and we'll get a 409 from Neutron |
| 178 | # when trying to delete the subnet. The tear down in the base class |
| 179 | # will try to delete the server and get a 404 but it's ignored so |
| 180 | # we're OK. |
| 181 | def cleanup_server(): |
| 182 | self.client.delete_server(server_multi_nics['id']) |
Ken'ichi Ohmichi | e91a0c6 | 2015-08-13 02:09:16 +0000 | [diff] [blame] | 183 | waiters.wait_for_server_termination(self.client, |
| 184 | server_multi_nics['id']) |
Joseph Lanoux | e59f0ff | 2014-10-17 14:56:56 +0000 | [diff] [blame] | 185 | |
| 186 | self.addCleanup(cleanup_server) |
| 187 | |
ghanshyam | 0f82525 | 2015-08-25 16:02:50 +0900 | [diff] [blame] | 188 | addresses = (self.client.list_addresses(server_multi_nics['id']) |
| 189 | ['addresses']) |
Joseph Lanoux | 38edc05 | 2014-09-18 14:25:46 +0000 | [diff] [blame] | 190 | |
venkata anil | bd2d49a | 2015-01-16 08:07:15 +0000 | [diff] [blame] | 191 | # We can't predict the ip addresses assigned to the server on networks. |
| 192 | # Sometimes the assigned addresses are ['19.80.0.2', '19.86.0.2'], at |
| 193 | # other times ['19.80.0.3', '19.86.0.3']. So we check if the first |
| 194 | # address is in first network, similarly second address is in second |
| 195 | # network. |
Matt Riedemann | 778b5f9 | 2015-03-11 12:44:28 -0700 | [diff] [blame] | 196 | addr = [addresses[net1['network']['name']][0]['addr'], |
| 197 | addresses[net2['network']['name']][0]['addr']] |
venkata anil | bd2d49a | 2015-01-16 08:07:15 +0000 | [diff] [blame] | 198 | networks = [netaddr.IPNetwork('19.80.0.0/24'), |
| 199 | netaddr.IPNetwork('19.86.0.0/24')] |
| 200 | for address, network in zip(addr, networks): |
| 201 | self.assertIn(address, network) |
Joseph Lanoux | 38edc05 | 2014-09-18 14:25:46 +0000 | [diff] [blame] | 202 | |
Matt Riedemann | 778b5f9 | 2015-03-11 12:44:28 -0700 | [diff] [blame] | 203 | @test.idempotent_id('1678d144-ed74-43f8-8e57-ab10dbf9b3c2') |
| 204 | @testtools.skipUnless(CONF.service_available.neutron, |
| 205 | 'Neutron service must be available.') |
Matt Riedemann | 778b5f9 | 2015-03-11 12:44:28 -0700 | [diff] [blame] | 206 | def test_verify_duplicate_network_nics(self): |
| 207 | # Verify that server creation does not fail when more than one nic |
| 208 | # is created on the same network. |
| 209 | net1 = self._create_net_subnet_ret_net_from_cidr('19.80.0.0/24') |
| 210 | net2 = self._create_net_subnet_ret_net_from_cidr('19.86.0.0/24') |
| 211 | |
| 212 | networks = [{'uuid': net1['network']['id']}, |
| 213 | {'uuid': net2['network']['id']}, |
| 214 | {'uuid': net1['network']['id']}] |
| 215 | |
| 216 | server_multi_nics = self.create_test_server( |
| 217 | networks=networks, wait_until='ACTIVE') |
| 218 | |
| 219 | def cleanup_server(): |
| 220 | self.client.delete_server(server_multi_nics['id']) |
Ken'ichi Ohmichi | e91a0c6 | 2015-08-13 02:09:16 +0000 | [diff] [blame] | 221 | waiters.wait_for_server_termination(self.client, |
| 222 | server_multi_nics['id']) |
Matt Riedemann | 778b5f9 | 2015-03-11 12:44:28 -0700 | [diff] [blame] | 223 | |
| 224 | self.addCleanup(cleanup_server) |
| 225 | |
ghanshyam | 0f82525 | 2015-08-25 16:02:50 +0900 | [diff] [blame] | 226 | addresses = (self.client.list_addresses(server_multi_nics['id']) |
| 227 | ['addresses']) |
Matt Riedemann | 778b5f9 | 2015-03-11 12:44:28 -0700 | [diff] [blame] | 228 | |
| 229 | addr = [addresses[net1['network']['name']][0]['addr'], |
| 230 | addresses[net2['network']['name']][0]['addr'], |
| 231 | addresses[net1['network']['name']][1]['addr']] |
| 232 | networks = [netaddr.IPNetwork('19.80.0.0/24'), |
| 233 | netaddr.IPNetwork('19.86.0.0/24'), |
| 234 | netaddr.IPNetwork('19.80.0.0/24')] |
| 235 | for address, network in zip(addr, networks): |
| 236 | self.assertIn(address, network) |
| 237 | |
Dan Smith | 4307f99 | 2012-08-16 09:23:20 -0700 | [diff] [blame] | 238 | |
Chang Bo Guo | edd6ec0 | 2013-12-12 23:53:09 -0800 | [diff] [blame] | 239 | class ServersWithSpecificFlavorTestJSON(base.BaseV2ComputeAdminTest): |
Chang Bo Guo | edd6ec0 | 2013-12-12 23:53:09 -0800 | [diff] [blame] | 240 | disk_config = 'AUTO' |
| 241 | |
| 242 | @classmethod |
Joseph Lanoux | ffe09dd | 2015-03-18 16:45:33 +0000 | [diff] [blame] | 243 | def setup_credentials(cls): |
Attila Fazekas | 423834d | 2014-03-14 17:33:13 +0100 | [diff] [blame] | 244 | cls.prepare_instance_network() |
Joseph Lanoux | ffe09dd | 2015-03-18 16:45:33 +0000 | [diff] [blame] | 245 | super(ServersWithSpecificFlavorTestJSON, cls).setup_credentials() |
| 246 | |
| 247 | @classmethod |
| 248 | def setup_clients(cls): |
Rohan Kanade | 60b7309 | 2015-02-04 17:58:19 +0530 | [diff] [blame] | 249 | super(ServersWithSpecificFlavorTestJSON, cls).setup_clients() |
Chang Bo Guo | edd6ec0 | 2013-12-12 23:53:09 -0800 | [diff] [blame] | 250 | cls.flavor_client = cls.os_adm.flavors_client |
Attila Fazekas | 076f79f | 2014-03-14 17:43:46 +0100 | [diff] [blame] | 251 | cls.client = cls.servers_client |
Chang Bo Guo | edd6ec0 | 2013-12-12 23:53:09 -0800 | [diff] [blame] | 252 | |
Joseph Lanoux | ffe09dd | 2015-03-18 16:45:33 +0000 | [diff] [blame] | 253 | @classmethod |
| 254 | def resource_setup(cls): |
| 255 | cls.set_validation_resources() |
| 256 | |
| 257 | super(ServersWithSpecificFlavorTestJSON, cls).resource_setup() |
| 258 | |
Chris Hoge | 7579c1a | 2015-02-26 14:12:15 -0800 | [diff] [blame] | 259 | @test.idempotent_id('b3c7bcfc-bb5b-4e22-b517-c7f686b802ca') |
Matthew Treinish | e5cca00 | 2015-05-11 15:36:50 -0400 | [diff] [blame] | 260 | @testtools.skipUnless(CONF.validation.run_validation, |
Matt Riedemann | 6c66820 | 2014-03-24 09:17:10 -0700 | [diff] [blame] | 261 | 'Instance validation tests are disabled.') |
Chang Bo Guo | edd6ec0 | 2013-12-12 23:53:09 -0800 | [diff] [blame] | 262 | def test_verify_created_server_ephemeral_disk(self): |
| 263 | # Verify that the ephemeral disk is created when creating server |
Evgeny Antyshev | 10ed620 | 2015-12-25 10:47:33 +0000 | [diff] [blame] | 264 | flavor_base = self.flavors_client.show_flavor( |
| 265 | self.flavor_ref)['flavor'] |
Chang Bo Guo | edd6ec0 | 2013-12-12 23:53:09 -0800 | [diff] [blame] | 266 | |
zhufl | 25f5ca5 | 2016-10-24 16:06:08 +0800 | [diff] [blame] | 267 | def create_flavor_with_ephemeral(ephem_disk): |
Chang Bo Guo | edd6ec0 | 2013-12-12 23:53:09 -0800 | [diff] [blame] | 268 | flavor_with_eph_disk_id = data_utils.rand_int_id(start=1000) |
Evgeny Antyshev | 10ed620 | 2015-12-25 10:47:33 +0000 | [diff] [blame] | 269 | |
| 270 | ram = flavor_base['ram'] |
| 271 | vcpus = flavor_base['vcpus'] |
| 272 | disk = flavor_base['disk'] |
Chang Bo Guo | edd6ec0 | 2013-12-12 23:53:09 -0800 | [diff] [blame] | 273 | |
Yaroslav Lobankov | f910344 | 2016-11-02 19:37:03 +0300 | [diff] [blame] | 274 | if ephem_disk > 0: |
| 275 | # Create a flavor with ephemeral disk |
| 276 | flavor_name = data_utils.rand_name('eph_flavor') |
| 277 | flavor = self.flavor_client.create_flavor( |
| 278 | name=flavor_name, ram=ram, vcpus=vcpus, disk=disk, |
| 279 | id=flavor_with_eph_disk_id, ephemeral=ephem_disk)['flavor'] |
| 280 | else: |
| 281 | # Create a flavor without ephemeral disk |
| 282 | flavor_name = data_utils.rand_name('no_eph_flavor') |
| 283 | flavor = self.flavor_client.create_flavor( |
| 284 | name=flavor_name, ram=ram, vcpus=vcpus, disk=disk, |
| 285 | id=flavor_with_eph_disk_id)['flavor'] |
Attila Fazekas | 076f79f | 2014-03-14 17:43:46 +0100 | [diff] [blame] | 286 | self.addCleanup(flavor_clean_up, flavor['id']) |
Chang Bo Guo | edd6ec0 | 2013-12-12 23:53:09 -0800 | [diff] [blame] | 287 | |
| 288 | return flavor['id'] |
| 289 | |
Attila Fazekas | 076f79f | 2014-03-14 17:43:46 +0100 | [diff] [blame] | 290 | def flavor_clean_up(flavor_id): |
David Kranz | 2fa77b2 | 2015-02-09 11:39:50 -0500 | [diff] [blame] | 291 | self.flavor_client.delete_flavor(flavor_id) |
Chang Bo Guo | edd6ec0 | 2013-12-12 23:53:09 -0800 | [diff] [blame] | 292 | self.flavor_client.wait_for_resource_deletion(flavor_id) |
| 293 | |
zhufl | 25f5ca5 | 2016-10-24 16:06:08 +0800 | [diff] [blame] | 294 | flavor_with_eph_disk_id = create_flavor_with_ephemeral(ephem_disk=1) |
| 295 | flavor_no_eph_disk_id = create_flavor_with_ephemeral(ephem_disk=0) |
Chang Bo Guo | edd6ec0 | 2013-12-12 23:53:09 -0800 | [diff] [blame] | 296 | |
| 297 | admin_pass = self.image_ssh_password |
| 298 | |
Ken'ichi Ohmichi | e1dc991 | 2015-08-27 09:06:26 +0000 | [diff] [blame] | 299 | server_no_eph_disk = self.create_test_server( |
| 300 | validatable=True, |
| 301 | wait_until='ACTIVE', |
| 302 | adminPass=admin_pass, |
| 303 | flavor=flavor_no_eph_disk_id) |
Joseph Lanoux | ffe09dd | 2015-03-18 16:45:33 +0000 | [diff] [blame] | 304 | |
zhufl | 25f5ca5 | 2016-10-24 16:06:08 +0800 | [diff] [blame] | 305 | # Get partition number of server without ephemeral disk. |
Ken'ichi Ohmichi | 7680024 | 2015-07-03 05:12:31 +0000 | [diff] [blame] | 306 | server_no_eph_disk = self.client.show_server( |
ghanshyam | 0f82525 | 2015-08-25 16:02:50 +0900 | [diff] [blame] | 307 | server_no_eph_disk['id'])['server'] |
Joseph Lanoux | ffe09dd | 2015-03-18 16:45:33 +0000 | [diff] [blame] | 308 | linux_client = remote_client.RemoteClient( |
| 309 | self.get_server_ip(server_no_eph_disk), |
| 310 | self.ssh_user, |
| 311 | admin_pass, |
Andrea Frittoli (andreaf) | 2a70a61 | 2016-04-29 16:09:13 -0500 | [diff] [blame] | 312 | self.validation_resources['keypair']['private_key'], |
| 313 | server=server_no_eph_disk, |
| 314 | servers_client=self.client) |
Attila Fazekas | 076f79f | 2014-03-14 17:43:46 +0100 | [diff] [blame] | 315 | partition_num = len(linux_client.get_partitions().split('\n')) |
Chang Bo Guo | edd6ec0 | 2013-12-12 23:53:09 -0800 | [diff] [blame] | 316 | |
Joseph Lanoux | ffe09dd | 2015-03-18 16:45:33 +0000 | [diff] [blame] | 317 | # Explicit server deletion necessary for Juno compatibility |
| 318 | self.client.delete_server(server_no_eph_disk['id']) |
| 319 | |
Ken'ichi Ohmichi | e1dc991 | 2015-08-27 09:06:26 +0000 | [diff] [blame] | 320 | server_with_eph_disk = self.create_test_server( |
| 321 | validatable=True, |
| 322 | wait_until='ACTIVE', |
| 323 | adminPass=admin_pass, |
| 324 | flavor=flavor_with_eph_disk_id) |
Joseph Lanoux | ffe09dd | 2015-03-18 16:45:33 +0000 | [diff] [blame] | 325 | |
Ken'ichi Ohmichi | 7680024 | 2015-07-03 05:12:31 +0000 | [diff] [blame] | 326 | server_with_eph_disk = self.client.show_server( |
ghanshyam | 0f82525 | 2015-08-25 16:02:50 +0900 | [diff] [blame] | 327 | server_with_eph_disk['id'])['server'] |
Joseph Lanoux | ffe09dd | 2015-03-18 16:45:33 +0000 | [diff] [blame] | 328 | linux_client = remote_client.RemoteClient( |
| 329 | self.get_server_ip(server_with_eph_disk), |
| 330 | self.ssh_user, |
| 331 | admin_pass, |
Andrea Frittoli (andreaf) | 2a70a61 | 2016-04-29 16:09:13 -0500 | [diff] [blame] | 332 | self.validation_resources['keypair']['private_key'], |
| 333 | server=server_with_eph_disk, |
| 334 | servers_client=self.client) |
Attila Fazekas | 076f79f | 2014-03-14 17:43:46 +0100 | [diff] [blame] | 335 | partition_num_emph = len(linux_client.get_partitions().split('\n')) |
| 336 | self.assertEqual(partition_num + 1, partition_num_emph) |
Chang Bo Guo | edd6ec0 | 2013-12-12 23:53:09 -0800 | [diff] [blame] | 337 | |
| 338 | |
Attila Fazekas | 19044d5 | 2013-02-16 07:35:06 +0100 | [diff] [blame] | 339 | class ServersTestManualDisk(ServersTestJSON): |
| 340 | disk_config = 'MANUAL' |
| 341 | |
Daryl Walleck | 0aea003 | 2012-12-04 00:53:28 -0600 | [diff] [blame] | 342 | @classmethod |
Rohan Kanade | 60b7309 | 2015-02-04 17:58:19 +0530 | [diff] [blame] | 343 | def skip_checks(cls): |
| 344 | super(ServersTestManualDisk, cls).skip_checks() |
Sean Dague | 86bd842 | 2013-12-20 09:56:44 -0500 | [diff] [blame] | 345 | if not CONF.compute_feature_enabled.disk_config: |
Daryl Walleck | 0aea003 | 2012-12-04 00:53:28 -0600 | [diff] [blame] | 346 | msg = "DiskConfig extension not enabled." |
ivan-zhu | 1feeb38 | 2013-01-24 10:14:39 +0800 | [diff] [blame] | 347 | raise cls.skipException(msg) |