ZhiQiang Fan | 39f9722 | 2013-09-20 04:49:44 +0800 | [diff] [blame] | 1 | # Copyright 2012 OpenStack Foundation |
Jay Pipes | 051075a | 2012-04-28 17:39:37 -0400 | [diff] [blame] | 2 | # All Rights Reserved. |
| 3 | # |
| 4 | # Licensed under the Apache License, Version 2.0 (the "License"); you may |
| 5 | # not use this file except in compliance with the License. You may obtain |
| 6 | # a copy of the License at |
| 7 | # |
| 8 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | # |
| 10 | # Unless required by applicable law or agreed to in writing, software |
| 11 | # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| 12 | # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the |
| 13 | # License for the specific language governing permissions and limitations |
| 14 | # under the License. |
| 15 | |
zhulingjie | 92b87a5 | 2019-02-21 01:05:54 +0800 | [diff] [blame] | 16 | from oslo_serialization import jsonutils as json |
Alexander Gubanov | 509e284 | 2015-06-09 15:29:51 +0300 | [diff] [blame] | 17 | |
Andrea Frittoli | cd36841 | 2017-08-14 21:37:56 +0100 | [diff] [blame] | 18 | from tempest.common import utils |
zhufl | 44fce68 | 2016-11-23 15:37:49 +0800 | [diff] [blame] | 19 | from tempest.common import waiters |
Matthew Treinish | 6c07229 | 2014-01-29 19:15:52 +0000 | [diff] [blame] | 20 | from tempest import config |
YAMAMOTO Takashi | d5f7e23 | 2017-01-16 12:31:59 +0900 | [diff] [blame] | 21 | from tempest.lib.common.utils import data_utils |
Jordan Pittier | 35a6375 | 2016-08-30 13:09:12 +0200 | [diff] [blame] | 22 | from tempest.lib.common.utils import test_utils |
Ken'ichi Ohmichi | c85a951 | 2017-01-27 18:34:24 -0800 | [diff] [blame] | 23 | from tempest.lib import decorators |
guo yunxian | 7383a6f | 2016-12-05 18:56:51 +0800 | [diff] [blame] | 24 | from tempest.lib import exceptions |
Sean Dague | 6dbc6da | 2013-05-08 17:49:46 -0400 | [diff] [blame] | 25 | from tempest.scenario import manager |
Jay Pipes | 051075a | 2012-04-28 17:39:37 -0400 | [diff] [blame] | 26 | |
Matthew Treinish | 6c07229 | 2014-01-29 19:15:52 +0000 | [diff] [blame] | 27 | CONF = config.CONF |
| 28 | |
Jay Pipes | 051075a | 2012-04-28 17:39:37 -0400 | [diff] [blame] | 29 | |
Ghanshyam | 5a305c4 | 2014-08-27 14:24:58 +0900 | [diff] [blame] | 30 | class TestServerBasicOps(manager.ScenarioTest): |
Jay Pipes | 051075a | 2012-04-28 17:39:37 -0400 | [diff] [blame] | 31 | |
Ken'ichi Ohmichi | c4e4f1c | 2015-11-17 08:16:12 +0000 | [diff] [blame] | 32 | """The test suite for server basic operations |
Jay Pipes | 051075a | 2012-04-28 17:39:37 -0400 | [diff] [blame] | 33 | |
Ken'ichi Ohmichi | c4e4f1c | 2015-11-17 08:16:12 +0000 | [diff] [blame] | 34 | This smoke test case follows this basic set of operations: |
Jay Pipes | 051075a | 2012-04-28 17:39:37 -0400 | [diff] [blame] | 35 | * Create a keypair for use in launching an instance |
| 36 | * Create a security group to control network access in instance |
| 37 | * Add simple permissive rules to the security group |
| 38 | * Launch an instance |
ghanshyam | 416c94c | 2014-10-02 13:47:25 +0900 | [diff] [blame] | 39 | * Perform ssh to instance |
YAMAMOTO Takashi | 1f62af2 | 2015-06-16 03:29:50 +0900 | [diff] [blame] | 40 | * Verify metadata service |
Alexander Gubanov | 509e284 | 2015-06-09 15:29:51 +0300 | [diff] [blame] | 41 | * Verify metadata on config_drive |
Jay Pipes | 051075a | 2012-04-28 17:39:37 -0400 | [diff] [blame] | 42 | * Terminate the instance |
| 43 | """ |
| 44 | |
Andrea Frittoli | f5da28b | 2013-12-06 07:08:07 +0000 | [diff] [blame] | 45 | def setUp(self): |
| 46 | super(TestServerBasicOps, self).setUp() |
Matthew Treinish | f2c4501 | 2016-06-22 21:13:42 -0400 | [diff] [blame] | 47 | self.run_ssh = CONF.validation.run_validation |
| 48 | self.ssh_user = CONF.validation.image_ssh_user |
Andrea Frittoli | f5da28b | 2013-12-06 07:08:07 +0000 | [diff] [blame] | 49 | |
Jordan Pittier | bbb1712 | 2016-01-26 17:10:55 +0100 | [diff] [blame] | 50 | def verify_ssh(self, keypair): |
Andrea Frittoli | f5da28b | 2013-12-06 07:08:07 +0000 | [diff] [blame] | 51 | if self.run_ssh: |
Roman Popelka | 86b8b62 | 2023-05-29 12:06:51 +0200 | [diff] [blame] | 52 | # Obtain server IP |
| 53 | self.ip = self.get_server_ip(self.instance) |
Andrea Frittoli | f5da28b | 2013-12-06 07:08:07 +0000 | [diff] [blame] | 54 | # Check ssh |
YAMAMOTO Takashi | 1f62af2 | 2015-06-16 03:29:50 +0900 | [diff] [blame] | 55 | self.ssh_client = self.get_remote_client( |
zhufl | 1bdc3e7 | 2018-01-10 14:10:47 +0800 | [diff] [blame] | 56 | ip_address=self.ip, |
YAMAMOTO Takashi | 42189bf | 2016-06-24 16:02:53 +0900 | [diff] [blame] | 57 | username=self.ssh_user, |
zhufl | f52c759 | 2017-05-25 13:55:24 +0800 | [diff] [blame] | 58 | private_key=keypair['private_key'], |
| 59 | server=self.instance) |
Andrea Frittoli | f5da28b | 2013-12-06 07:08:07 +0000 | [diff] [blame] | 60 | |
YAMAMOTO Takashi | 1f62af2 | 2015-06-16 03:29:50 +0900 | [diff] [blame] | 61 | def verify_metadata(self): |
| 62 | if self.run_ssh and CONF.compute_feature_enabled.metadata_service: |
| 63 | # Verify metadata service |
Deepanshu Bhatia | 4600842 | 2021-01-18 04:24:29 +0530 | [diff] [blame] | 64 | if CONF.network.public_network_id: |
| 65 | md_url = 'http://169.254.169.254/latest/meta-data/public-ipv4' |
| 66 | else: |
| 67 | md_url = 'http://169.254.169.254/latest/meta-data/local-ipv4' |
Yaroslav Lobankov | 117a48f | 2015-08-11 11:40:44 +0300 | [diff] [blame] | 68 | |
| 69 | def exec_cmd_and_verify_output(): |
| 70 | cmd = 'curl ' + md_url |
Yaroslav Lobankov | 117a48f | 2015-08-11 11:40:44 +0300 | [diff] [blame] | 71 | result = self.ssh_client.exec_command(cmd) |
| 72 | if result: |
| 73 | msg = ('Failed while verifying metadata on server. Result ' |
zhufl | 1bdc3e7 | 2018-01-10 14:10:47 +0800 | [diff] [blame] | 74 | 'of command "%s" is NOT "%s".' % (cmd, self.ip)) |
| 75 | self.assertEqual(self.ip, result, msg) |
Yaroslav Lobankov | 117a48f | 2015-08-11 11:40:44 +0300 | [diff] [blame] | 76 | return 'Verification is successful!' |
| 77 | |
Jordan Pittier | 35a6375 | 2016-08-30 13:09:12 +0200 | [diff] [blame] | 78 | if not test_utils.call_until_true(exec_cmd_and_verify_output, |
| 79 | CONF.compute.build_timeout, |
| 80 | CONF.compute.build_interval): |
Yaroslav Lobankov | 117a48f | 2015-08-11 11:40:44 +0300 | [diff] [blame] | 81 | raise exceptions.TimeoutException('Timed out while waiting to ' |
| 82 | 'verify metadata on server. ' |
| 83 | '%s is empty.' % md_url) |
YAMAMOTO Takashi | 1f62af2 | 2015-06-16 03:29:50 +0900 | [diff] [blame] | 84 | |
YAMAMOTO Takashi | d5f7e23 | 2017-01-16 12:31:59 +0900 | [diff] [blame] | 85 | # Also, test a POST |
| 86 | md_url = 'http://169.254.169.254/openstack/2013-10-17/password' |
| 87 | data = data_utils.arbitrary_string(100) |
| 88 | cmd = 'curl -X POST -d ' + data + ' ' + md_url |
| 89 | self.ssh_client.exec_command(cmd) |
| 90 | result = self.servers_client.show_password(self.instance['id']) |
| 91 | self.assertEqual(data, result['password']) |
| 92 | |
Alexander Gubanov | 509e284 | 2015-06-09 15:29:51 +0300 | [diff] [blame] | 93 | def verify_metadata_on_config_drive(self): |
| 94 | if self.run_ssh and CONF.compute_feature_enabled.config_drive: |
| 95 | # Verify metadata on config_drive |
Mohammed Naser | b6c6d2a | 2017-12-29 18:13:29 -0500 | [diff] [blame] | 96 | self.ssh_client.mount_config_drive() |
Alexander Gubanov | 509e284 | 2015-06-09 15:29:51 +0300 | [diff] [blame] | 97 | cmd_md = 'sudo cat /mnt/openstack/latest/meta_data.json' |
| 98 | result = self.ssh_client.exec_command(cmd_md) |
Mohammed Naser | b6c6d2a | 2017-12-29 18:13:29 -0500 | [diff] [blame] | 99 | self.ssh_client.unmount_config_drive() |
Alexander Gubanov | 509e284 | 2015-06-09 15:29:51 +0300 | [diff] [blame] | 100 | result = json.loads(result) |
| 101 | self.assertIn('meta', result) |
| 102 | msg = ('Failed while verifying metadata on config_drive on server.' |
| 103 | ' Result of command "%s" is NOT "%s".' % (cmd_md, self.md)) |
| 104 | self.assertEqual(self.md, result['meta'], msg) |
| 105 | |
Clark Boylan | df73bdf | 2016-07-06 09:55:28 -0700 | [diff] [blame] | 106 | def verify_networkdata_on_config_drive(self): |
| 107 | if self.run_ssh and CONF.compute_feature_enabled.config_drive: |
| 108 | # Verify network data on config_drive |
Mohammed Naser | b6c6d2a | 2017-12-29 18:13:29 -0500 | [diff] [blame] | 109 | self.ssh_client.mount_config_drive() |
Clark Boylan | df73bdf | 2016-07-06 09:55:28 -0700 | [diff] [blame] | 110 | cmd_md = 'sudo cat /mnt/openstack/latest/network_data.json' |
| 111 | result = self.ssh_client.exec_command(cmd_md) |
Mohammed Naser | b6c6d2a | 2017-12-29 18:13:29 -0500 | [diff] [blame] | 112 | self.ssh_client.unmount_config_drive() |
Clark Boylan | df73bdf | 2016-07-06 09:55:28 -0700 | [diff] [blame] | 113 | result = json.loads(result) |
| 114 | self.assertIn('services', result) |
| 115 | self.assertIn('links', result) |
| 116 | self.assertIn('networks', result) |
| 117 | # TODO(clarkb) construct network_data from known network |
| 118 | # instance info and do direct comparison. |
| 119 | |
Ken'ichi Ohmichi | c85a951 | 2017-01-27 18:34:24 -0800 | [diff] [blame] | 120 | @decorators.idempotent_id('7fff3fb3-91d8-4fd0-bd7d-0204f1f180ba') |
Jordan Pittier | 3b46d27 | 2017-04-12 16:17:28 +0200 | [diff] [blame] | 121 | @decorators.attr(type='smoke') |
Andrea Frittoli | cd36841 | 2017-08-14 21:37:56 +0100 | [diff] [blame] | 122 | @utils.services('compute', 'network') |
Tong Liu | 9bee3b9 | 2016-03-23 23:53:43 +0000 | [diff] [blame] | 123 | def test_server_basic_ops(self): |
Jordan Pittier | bbb1712 | 2016-01-26 17:10:55 +0100 | [diff] [blame] | 124 | keypair = self.create_keypair() |
Soniya Vyas | 582c170 | 2021-02-22 18:26:17 +0530 | [diff] [blame] | 125 | security_group = self.create_security_group() |
lanoux | 5fc1452 | 2015-09-21 08:17:35 +0000 | [diff] [blame] | 126 | self.md = {'meta1': 'data1', 'meta2': 'data2', 'metaN': 'dataN'} |
| 127 | self.instance = self.create_server( |
Dan Smith | 49c2b3b | 2023-04-26 15:52:22 -0700 | [diff] [blame] | 128 | keypair=keypair, |
| 129 | wait_until='SSHABLE', |
Jordan Pittier | 56c125e | 2016-09-16 16:20:22 +0200 | [diff] [blame] | 130 | security_groups=[{'name': security_group['name']}], |
lanoux | 5fc1452 | 2015-09-21 08:17:35 +0000 | [diff] [blame] | 131 | config_drive=CONF.compute_feature_enabled.config_drive, |
zhufl | 13c9c89 | 2017-02-10 12:04:07 +0800 | [diff] [blame] | 132 | metadata=self.md) |
Jordan Pittier | bbb1712 | 2016-01-26 17:10:55 +0100 | [diff] [blame] | 133 | self.verify_ssh(keypair) |
YAMAMOTO Takashi | 1f62af2 | 2015-06-16 03:29:50 +0900 | [diff] [blame] | 134 | self.verify_metadata() |
Alexander Gubanov | 509e284 | 2015-06-09 15:29:51 +0300 | [diff] [blame] | 135 | self.verify_metadata_on_config_drive() |
Clark Boylan | df73bdf | 2016-07-06 09:55:28 -0700 | [diff] [blame] | 136 | self.verify_networkdata_on_config_drive() |
Ghanshyam | 5a305c4 | 2014-08-27 14:24:58 +0900 | [diff] [blame] | 137 | self.servers_client.delete_server(self.instance['id']) |
zhufl | 44fce68 | 2016-11-23 15:37:49 +0800 | [diff] [blame] | 138 | waiters.wait_for_server_termination( |
| 139 | self.servers_client, self.instance['id'], ignore_error=False) |