blob: fd6df3ee52cec68cf41e61b7c74d6233d82e6cf8 [file] [log] [blame]
ZhiQiang Fan39f97222013-09-20 04:49:44 +08001# Copyright 2012 OpenStack Foundation
Jay Pipes13b479b2012-06-11 14:52:27 -04002# All Rights Reserved.
3#
4# Licensed under the Apache License, Version 2.0 (the "License"); you may
5# not use this file except in compliance with the License. You may obtain
6# a copy of the License at
7#
8# http://www.apache.org/licenses/LICENSE-2.0
9#
10# Unless required by applicable law or agreed to in writing, software
11# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
12# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
13# License for the specific language governing permissions and limitations
14# under the License.
15
Daryl Wallecked8bef32011-12-05 23:02:08 -060016import base64
Ryan Hsu38231092014-06-08 23:12:10 -070017import logging
Matthew Treinish96e9e882014-06-09 18:37:19 -040018import urlparse
Brian Waldon738cd632011-12-12 18:45:09 -050019
ivan-zhu1feeb382013-01-24 10:14:39 +080020import testtools
Jay Pipes13b479b2012-06-11 14:52:27 -040021
Sean Dague1937d092013-05-17 16:36:38 -040022from tempest.api.compute import base
Masayuki Igawa259c1132013-10-31 17:48:44 +090023from tempest.common.utils import data_utils
Masayuki Igawa209fd502014-02-17 14:46:43 +090024from tempest.common.utils.linux import remote_client
Sean Dague86bd8422013-12-20 09:56:44 -050025from tempest import config
Matthew Treinisha83a16e2012-12-07 13:44:02 -050026from tempest import exceptions
Masayuki Igawa209fd502014-02-17 14:46:43 +090027from tempest import test
Daryl Wallecked8bef32011-12-05 23:02:08 -060028
Sean Dague86bd8422013-12-20 09:56:44 -050029CONF = config.CONF
30
Ryan Hsu38231092014-06-08 23:12:10 -070031LOG = logging.getLogger(__name__)
32
Daryl Walleckc7251962012-03-12 17:26:54 -050033
ivan-zhuf2b00502013-10-18 10:06:52 +080034class ServerActionsTestJSON(base.BaseV2ComputeTest):
Sean Dague86bd8422013-12-20 09:56:44 -050035 run_ssh = CONF.compute.run_ssh
Daryl Wallecked8bef32011-12-05 23:02:08 -060036
Attila Fazekas19044d52013-02-16 07:35:06 +010037 def setUp(self):
Matt Riedemann2da58592014-06-08 12:46:02 +000038 # NOTE(afazekas): Normally we use the same server with all test cases,
39 # but if it has an issue, we build a new one
Attila Fazekas19044d52013-02-16 07:35:06 +010040 super(ServerActionsTestJSON, self).setUp()
Matt Riedemann2da58592014-06-08 12:46:02 +000041 # Check if the server is in a clean state after test
42 try:
43 self.client.wait_for_server_status(self.server_id, 'ACTIVE')
44 except Exception:
45 # Rebuild server if something happened to it during a test
46 self.__class__.server_id = self.rebuild_server(self.server_id)
47
48 def tearDown(self):
49 _, server = self.client.get_server(self.server_id)
50 self.assertEqual(self.image_ref, server['image']['id'])
51 self.server_check_teardown()
52 super(ServerActionsTestJSON, self).tearDown()
Attila Fazekas305e65b2013-10-29 13:23:07 +010053
Attila Fazekas19044d52013-02-16 07:35:06 +010054 @classmethod
55 def setUpClass(cls):
Attila Fazekas423834d2014-03-14 17:33:13 +010056 cls.prepare_instance_network()
Attila Fazekas19044d52013-02-16 07:35:06 +010057 super(ServerActionsTestJSON, cls).setUpClass()
58 cls.client = cls.servers_client
Matt Riedemann2da58592014-06-08 12:46:02 +000059 cls.server_id = cls.rebuild_server(None)
Attila Fazekas19044d52013-02-16 07:35:06 +010060
Sean Dague86bd8422013-12-20 09:56:44 -050061 @testtools.skipUnless(CONF.compute_feature_enabled.change_password,
ivan-zhu1feeb382013-01-24 10:14:39 +080062 'Change password not available.')
Masayuki Igawa209fd502014-02-17 14:46:43 +090063 @test.attr(type='gate')
Daryl Wallecked8bef32011-12-05 23:02:08 -060064 def test_change_server_password(self):
Sean Dague4dd2c0b2013-01-03 17:50:28 -050065 # The server's password should be set to the provided password
Daryl Walleck98e66dd2012-06-21 04:58:39 -050066 new_password = 'Newpass1234'
67 resp, body = self.client.change_password(self.server_id, new_password)
Daryl Wallecked8bef32011-12-05 23:02:08 -060068 self.assertEqual(202, resp.status)
Brian Waldon3bde07f2011-12-13 15:11:22 -050069 self.client.wait_for_server_status(self.server_id, 'ACTIVE')
Daryl Wallecked8bef32011-12-05 23:02:08 -060070
Daryl Walleck98e66dd2012-06-21 04:58:39 -050071 if self.run_ssh:
72 # Verify that the user can authenticate with the new password
73 resp, server = self.client.get_server(self.server_id)
Masayuki Igawa209fd502014-02-17 14:46:43 +090074 linux_client = remote_client.RemoteClient(server, self.ssh_user,
75 new_password)
Attila Fazekasad7ef7d2013-11-20 10:12:53 +010076 linux_client.validate_authentication()
Daryl Walleck98e66dd2012-06-21 04:58:39 -050077
Masayuki Igawa209fd502014-02-17 14:46:43 +090078 @test.attr(type='smoke')
Daryl Wallecked8bef32011-12-05 23:02:08 -060079 def test_reboot_server_hard(self):
Sean Dague4dd2c0b2013-01-03 17:50:28 -050080 # The server should be power cycled
Daryl Walleck98e66dd2012-06-21 04:58:39 -050081 if self.run_ssh:
82 # Get the time the server was last rebooted,
Daryl Walleck98e66dd2012-06-21 04:58:39 -050083 resp, server = self.client.get_server(self.server_id)
Masayuki Igawa209fd502014-02-17 14:46:43 +090084 linux_client = remote_client.RemoteClient(server, self.ssh_user,
85 self.password)
Daryl Walleck98e66dd2012-06-21 04:58:39 -050086 boot_time = linux_client.get_boot_time()
Daryl Walleck98e66dd2012-06-21 04:58:39 -050087
Brian Waldon3bde07f2011-12-13 15:11:22 -050088 resp, body = self.client.reboot(self.server_id, 'HARD')
Daryl Wallecked8bef32011-12-05 23:02:08 -060089 self.assertEqual(202, resp.status)
Brian Waldon3bde07f2011-12-13 15:11:22 -050090 self.client.wait_for_server_status(self.server_id, 'ACTIVE')
Daryl Wallecked8bef32011-12-05 23:02:08 -060091
Daryl Walleck98e66dd2012-06-21 04:58:39 -050092 if self.run_ssh:
93 # Log in and verify the boot time has changed
Masayuki Igawa209fd502014-02-17 14:46:43 +090094 linux_client = remote_client.RemoteClient(server, self.ssh_user,
95 self.password)
Daryl Walleck98e66dd2012-06-21 04:58:39 -050096 new_boot_time = linux_client.get_boot_time()
Vincent Untz32173d12014-01-19 20:34:47 +010097 self.assertTrue(new_boot_time > boot_time,
98 '%s > %s' % (new_boot_time, boot_time))
Daryl Walleck98e66dd2012-06-21 04:58:39 -050099
Masayuki Igawa209fd502014-02-17 14:46:43 +0900100 @test.skip_because(bug="1014647")
101 @test.attr(type='smoke')
Daryl Wallecked8bef32011-12-05 23:02:08 -0600102 def test_reboot_server_soft(self):
Sean Dague4dd2c0b2013-01-03 17:50:28 -0500103 # The server should be signaled to reboot gracefully
Daryl Walleck98e66dd2012-06-21 04:58:39 -0500104 if self.run_ssh:
105 # Get the time the server was last rebooted,
Daryl Walleck98e66dd2012-06-21 04:58:39 -0500106 resp, server = self.client.get_server(self.server_id)
Masayuki Igawa209fd502014-02-17 14:46:43 +0900107 linux_client = remote_client.RemoteClient(server, self.ssh_user,
108 self.password)
Daryl Walleck98e66dd2012-06-21 04:58:39 -0500109 boot_time = linux_client.get_boot_time()
Daryl Walleck98e66dd2012-06-21 04:58:39 -0500110
Brian Waldon3bde07f2011-12-13 15:11:22 -0500111 resp, body = self.client.reboot(self.server_id, 'SOFT')
Daryl Wallecked8bef32011-12-05 23:02:08 -0600112 self.assertEqual(202, resp.status)
Brian Waldon3bde07f2011-12-13 15:11:22 -0500113 self.client.wait_for_server_status(self.server_id, 'ACTIVE')
Daryl Wallecked8bef32011-12-05 23:02:08 -0600114
Daryl Walleck98e66dd2012-06-21 04:58:39 -0500115 if self.run_ssh:
116 # Log in and verify the boot time has changed
Masayuki Igawa209fd502014-02-17 14:46:43 +0900117 linux_client = remote_client.RemoteClient(server, self.ssh_user,
118 self.password)
Daryl Walleck98e66dd2012-06-21 04:58:39 -0500119 new_boot_time = linux_client.get_boot_time()
Vincent Untz32173d12014-01-19 20:34:47 +0100120 self.assertTrue(new_boot_time > boot_time,
121 '%s > %s' % (new_boot_time, boot_time))
Daryl Walleck98e66dd2012-06-21 04:58:39 -0500122
Masayuki Igawa209fd502014-02-17 14:46:43 +0900123 @test.attr(type='smoke')
Daryl Wallecked8bef32011-12-05 23:02:08 -0600124 def test_rebuild_server(self):
Sean Dague4dd2c0b2013-01-03 17:50:28 -0500125 # The server should be rebuilt using the provided image and data
Daryl Wallecked8bef32011-12-05 23:02:08 -0600126 meta = {'rebuild': 'server'}
Masayuki Igawa259c1132013-10-31 17:48:44 +0900127 new_name = data_utils.rand_name('server')
Daryl Wallecked8bef32011-12-05 23:02:08 -0600128 file_contents = 'Test server rebuild.'
Mahesh Panchaksharaiah21599a92013-07-03 15:28:58 +0530129 personality = [{'path': 'rebuild.txt',
Daryl Wallecked8bef32011-12-05 23:02:08 -0600130 'contents': base64.b64encode(file_contents)}]
Daryl Walleck98e66dd2012-06-21 04:58:39 -0500131 password = 'rebuildPassw0rd'
Brian Waldon3bde07f2011-12-13 15:11:22 -0500132 resp, rebuilt_server = self.client.rebuild(self.server_id,
Daryl Wallecked8bef32011-12-05 23:02:08 -0600133 self.image_ref_alt,
ivan-zhu454b1c52013-09-30 16:40:21 +0800134 name=new_name,
135 metadata=meta,
Daryl Wallecked8bef32011-12-05 23:02:08 -0600136 personality=personality,
Daryl Walleck98e66dd2012-06-21 04:58:39 -0500137 adminPass=password)
Daryl Wallecked8bef32011-12-05 23:02:08 -0600138
Attila Fazekasf7f34f92013-08-01 17:01:44 +0200139 # Verify the properties in the initial response are correct
Brian Waldon3bde07f2011-12-13 15:11:22 -0500140 self.assertEqual(self.server_id, rebuilt_server['id'])
Eoghan Glynn57c1a3d2012-03-01 16:50:29 -0500141 rebuilt_image_id = rebuilt_server['image']['id']
142 self.assertTrue(self.image_ref_alt.endswith(rebuilt_image_id))
Ken'ichi Ohmichi35772602013-11-14 15:03:27 +0900143 self.assertEqual(self.flavor_ref, rebuilt_server['flavor']['id'])
Daryl Wallecked8bef32011-12-05 23:02:08 -0600144
Attila Fazekasf7f34f92013-08-01 17:01:44 +0200145 # Verify the server properties after the rebuild completes
Daryl Wallecked8bef32011-12-05 23:02:08 -0600146 self.client.wait_for_server_status(rebuilt_server['id'], 'ACTIVE')
147 resp, server = self.client.get_server(rebuilt_server['id'])
Zhi Kun Liue5401762013-09-11 20:45:48 +0800148 rebuilt_image_id = server['image']['id']
Eoghan Glynn57c1a3d2012-03-01 16:50:29 -0500149 self.assertTrue(self.image_ref_alt.endswith(rebuilt_image_id))
Zhi Kun Liue5401762013-09-11 20:45:48 +0800150 self.assertEqual(new_name, server['name'])
Daryl Wallecked8bef32011-12-05 23:02:08 -0600151
Daryl Walleck98e66dd2012-06-21 04:58:39 -0500152 if self.run_ssh:
153 # Verify that the user can authenticate with the provided password
Masayuki Igawa209fd502014-02-17 14:46:43 +0900154 linux_client = remote_client.RemoteClient(server, self.ssh_user,
155 password)
Attila Fazekasad7ef7d2013-11-20 10:12:53 +0100156 linux_client.validate_authentication()
Attila Fazekas305e65b2013-10-29 13:23:07 +0100157 if self.image_ref_alt != self.image_ref:
158 self.client.rebuild(self.server_id, self.image_ref)
Daryl Walleck98e66dd2012-06-21 04:58:39 -0500159
Masayuki Igawa209fd502014-02-17 14:46:43 +0900160 @test.attr(type='gate')
Zhi Kun Liue5401762013-09-11 20:45:48 +0800161 def test_rebuild_server_in_stop_state(self):
162 # The server in stop state should be rebuilt using the provided
163 # image and remain in SHUTOFF state
164 resp, server = self.client.get_server(self.server_id)
165 old_image = server['image']['id']
166 new_image = self.image_ref_alt \
167 if old_image == self.image_ref else self.image_ref
168 resp, server = self.client.stop(self.server_id)
169 self.assertEqual(202, resp.status)
170 self.client.wait_for_server_status(self.server_id, 'SHUTOFF')
Zhi Kun Liue5401762013-09-11 20:45:48 +0800171 resp, rebuilt_server = self.client.rebuild(self.server_id, new_image)
Zhi Kun Liue5401762013-09-11 20:45:48 +0800172
173 # Verify the properties in the initial response are correct
174 self.assertEqual(self.server_id, rebuilt_server['id'])
175 rebuilt_image_id = rebuilt_server['image']['id']
176 self.assertEqual(new_image, rebuilt_image_id)
177 self.assertEqual(self.flavor_ref, rebuilt_server['flavor']['id'])
178
179 # Verify the server properties after the rebuild completes
180 self.client.wait_for_server_status(rebuilt_server['id'], 'SHUTOFF')
181 resp, server = self.client.get_server(rebuilt_server['id'])
182 rebuilt_image_id = server['image']['id']
183 self.assertEqual(new_image, rebuilt_image_id)
184
Attila Fazekas305e65b2013-10-29 13:23:07 +0100185 # Restore to the original image (The tearDown will test it again)
186 if self.image_ref_alt != self.image_ref:
187 self.client.rebuild(self.server_id, old_image)
188 self.client.wait_for_server_status(self.server_id, 'SHUTOFF')
189 self.client.start(self.server_id)
190
Tiago Mello52d8fda2013-02-12 12:10:30 -0500191 def _detect_server_image_flavor(self, server_id):
192 # Detects the current server image flavor ref.
Jinhe Fangd4bd30b2014-01-07 15:23:41 +0800193 resp, server = self.client.get_server(server_id)
Tiago Mello52d8fda2013-02-12 12:10:30 -0500194 current_flavor = server['flavor']['id']
195 new_flavor_ref = self.flavor_ref_alt \
Ken'ichi Ohmichi35772602013-11-14 15:03:27 +0900196 if current_flavor == self.flavor_ref else self.flavor_ref
197 return current_flavor, new_flavor_ref
Tiago Mello52d8fda2013-02-12 12:10:30 -0500198
Matt Riedemann9fd63b82014-04-14 09:33:05 -0700199 def _test_resize_server_confirm(self, stop=False):
Sean Dague4dd2c0b2013-01-03 17:50:28 -0500200 # The server's RAM and disk space should be modified to that of
201 # the provided flavor
Daryl Wallecked8bef32011-12-05 23:02:08 -0600202
Tiago Mello52d8fda2013-02-12 12:10:30 -0500203 previous_flavor_ref, new_flavor_ref = \
204 self._detect_server_image_flavor(self.server_id)
205
Matt Riedemann9fd63b82014-04-14 09:33:05 -0700206 if stop:
207 resp = self.servers_client.stop(self.server_id)[0]
208 self.assertEqual(202, resp.status)
209 self.servers_client.wait_for_server_status(self.server_id,
210 'SHUTOFF')
211
Tiago Mello52d8fda2013-02-12 12:10:30 -0500212 resp, server = self.client.resize(self.server_id, new_flavor_ref)
Daryl Wallecked8bef32011-12-05 23:02:08 -0600213 self.assertEqual(202, resp.status)
Brian Waldon3bde07f2011-12-13 15:11:22 -0500214 self.client.wait_for_server_status(self.server_id, 'VERIFY_RESIZE')
Daryl Wallecked8bef32011-12-05 23:02:08 -0600215
Brian Waldon3bde07f2011-12-13 15:11:22 -0500216 self.client.confirm_resize(self.server_id)
Matt Riedemann9fd63b82014-04-14 09:33:05 -0700217 expected_status = 'SHUTOFF' if stop else 'ACTIVE'
218 self.client.wait_for_server_status(self.server_id, expected_status)
Daryl Wallecked8bef32011-12-05 23:02:08 -0600219
Brian Waldon3bde07f2011-12-13 15:11:22 -0500220 resp, server = self.client.get_server(self.server_id)
Ken'ichi Ohmichi35772602013-11-14 15:03:27 +0900221 self.assertEqual(new_flavor_ref, server['flavor']['id'])
Daryl Wallecked8bef32011-12-05 23:02:08 -0600222
Matt Riedemann9fd63b82014-04-14 09:33:05 -0700223 if stop:
224 # NOTE(mriedem): tearDown requires the server to be started.
225 self.client.start(self.server_id)
226
227 @testtools.skipUnless(CONF.compute_feature_enabled.resize,
228 'Resize not available.')
229 @test.attr(type='smoke')
230 def test_resize_server_confirm(self):
231 self._test_resize_server_confirm(stop=False)
232
233 @testtools.skipUnless(CONF.compute_feature_enabled.resize,
234 'Resize not available.')
235 @test.attr(type='smoke')
236 def test_resize_server_confirm_from_stopped(self):
237 self._test_resize_server_confirm(stop=True)
238
Matt Riedemann5d1f8b12014-03-24 09:12:53 -0700239 @testtools.skipUnless(CONF.compute_feature_enabled.resize,
240 'Resize not available.')
Masayuki Igawa209fd502014-02-17 14:46:43 +0900241 @test.attr(type='gate')
Daryl Wallecked8bef32011-12-05 23:02:08 -0600242 def test_resize_server_revert(self):
Sean Dague4dd2c0b2013-01-03 17:50:28 -0500243 # The server's RAM and disk space should return to its original
244 # values after a resize is reverted
Daryl Wallecked8bef32011-12-05 23:02:08 -0600245
Tiago Mello52d8fda2013-02-12 12:10:30 -0500246 previous_flavor_ref, new_flavor_ref = \
247 self._detect_server_image_flavor(self.server_id)
248
249 resp, server = self.client.resize(self.server_id, new_flavor_ref)
Daryl Wallecked8bef32011-12-05 23:02:08 -0600250 self.assertEqual(202, resp.status)
Brian Waldon3bde07f2011-12-13 15:11:22 -0500251 self.client.wait_for_server_status(self.server_id, 'VERIFY_RESIZE')
Daryl Wallecked8bef32011-12-05 23:02:08 -0600252
Brian Waldon3bde07f2011-12-13 15:11:22 -0500253 self.client.revert_resize(self.server_id)
254 self.client.wait_for_server_status(self.server_id, 'ACTIVE')
Daryl Wallecked8bef32011-12-05 23:02:08 -0600255
Brian Waldon3bde07f2011-12-13 15:11:22 -0500256 resp, server = self.client.get_server(self.server_id)
Matt Riedemanne8a845f2014-03-21 06:54:15 -0700257 self.assertEqual(previous_flavor_ref, server['flavor']['id'])
sapan-konaf1e3f002011-12-22 23:18:44 +0530258
Adam Gandelmanfbc95ac2014-06-19 17:33:43 -0700259 @testtools.skipUnless(CONF.compute_feature_enabled.snapshot,
260 'Snapshotting not available, backup not possible.')
Masayuki Igawa209fd502014-02-17 14:46:43 +0900261 @test.attr(type='gate')
ekhugen0b3bc522014-08-04 20:58:21 +0000262 @test.services('image')
ivan-zhuccc89462013-10-31 16:53:12 +0800263 def test_create_backup(self):
264 # Positive test:create backup successfully and rotate backups correctly
265 # create the first and the second backup
Matt Riedemanne699f822014-01-24 08:11:42 -0800266 backup1 = data_utils.rand_name('backup-1')
ivan-zhuccc89462013-10-31 16:53:12 +0800267 resp, _ = self.servers_client.create_backup(self.server_id,
268 'daily',
269 2,
270 backup1)
271 oldest_backup_exist = True
272
273 # the oldest one should be deleted automatically in this test
274 def _clean_oldest_backup(oldest_backup):
275 if oldest_backup_exist:
Ryan Hsu38231092014-06-08 23:12:10 -0700276 try:
277 self.os.image_client.delete_image(oldest_backup)
278 except exceptions.NotFound:
279 pass
280 else:
281 LOG.warning("Deletion of oldest backup %s should not have "
282 "been successful as it should have been "
283 "deleted during rotation." % oldest_backup)
ivan-zhuccc89462013-10-31 16:53:12 +0800284
Masayuki Igawa259c1132013-10-31 17:48:44 +0900285 image1_id = data_utils.parse_image_id(resp['location'])
ivan-zhuccc89462013-10-31 16:53:12 +0800286 self.addCleanup(_clean_oldest_backup, image1_id)
287 self.assertEqual(202, resp.status)
Matt Riedemann46c1b2c2013-12-11 19:51:39 -0800288 self.os.image_client.wait_for_image_status(image1_id, 'active')
ivan-zhuccc89462013-10-31 16:53:12 +0800289
Matt Riedemanne699f822014-01-24 08:11:42 -0800290 backup2 = data_utils.rand_name('backup-2')
ivan-zhuccc89462013-10-31 16:53:12 +0800291 self.servers_client.wait_for_server_status(self.server_id, 'ACTIVE')
292 resp, _ = self.servers_client.create_backup(self.server_id,
293 'daily',
294 2,
295 backup2)
Masayuki Igawa259c1132013-10-31 17:48:44 +0900296 image2_id = data_utils.parse_image_id(resp['location'])
ivan-zhuccc89462013-10-31 16:53:12 +0800297 self.addCleanup(self.os.image_client.delete_image, image2_id)
298 self.assertEqual(202, resp.status)
Matt Riedemann46c1b2c2013-12-11 19:51:39 -0800299 self.os.image_client.wait_for_image_status(image2_id, 'active')
ivan-zhuccc89462013-10-31 16:53:12 +0800300
301 # verify they have been created
302 properties = {
303 'image_type': 'backup',
304 'backup_type': "daily",
305 'instance_uuid': self.server_id,
306 }
307 resp, image_list = self.os.image_client.image_list_detail(
308 properties,
Ken'ichi Ohmichi06d37cf2014-01-28 07:55:46 +0900309 status='active',
ivan-zhuccc89462013-10-31 16:53:12 +0800310 sort_key='created_at',
311 sort_dir='asc')
312 self.assertEqual(200, resp.status)
313 self.assertEqual(2, len(image_list))
314 self.assertEqual((backup1, backup2),
315 (image_list[0]['name'], image_list[1]['name']))
316
317 # create the third one, due to the rotation is 2,
318 # the first one will be deleted
Matt Riedemanne699f822014-01-24 08:11:42 -0800319 backup3 = data_utils.rand_name('backup-3')
ivan-zhuccc89462013-10-31 16:53:12 +0800320 self.servers_client.wait_for_server_status(self.server_id, 'ACTIVE')
321 resp, _ = self.servers_client.create_backup(self.server_id,
322 'daily',
323 2,
324 backup3)
Masayuki Igawa259c1132013-10-31 17:48:44 +0900325 image3_id = data_utils.parse_image_id(resp['location'])
ivan-zhuccc89462013-10-31 16:53:12 +0800326 self.addCleanup(self.os.image_client.delete_image, image3_id)
327 self.assertEqual(202, resp.status)
328 # the first back up should be deleted
Chang Ye Wang02970572013-12-03 03:32:38 -0600329 self.servers_client.wait_for_server_status(self.server_id, 'ACTIVE')
ivan-zhuccc89462013-10-31 16:53:12 +0800330 self.os.image_client.wait_for_resource_deletion(image1_id)
331 oldest_backup_exist = False
332 resp, image_list = self.os.image_client.image_list_detail(
333 properties,
Ken'ichi Ohmichi06d37cf2014-01-28 07:55:46 +0900334 status='active',
ivan-zhuccc89462013-10-31 16:53:12 +0800335 sort_key='created_at',
336 sort_dir='asc')
337 self.assertEqual(200, resp.status)
Matt Riedemanne699f822014-01-24 08:11:42 -0800338 self.assertEqual(2, len(image_list),
339 'Unexpected number of images for '
340 'v2:test_create_backup; was the oldest backup not '
341 'yet deleted? Image list: %s' %
342 [image['name'] for image in image_list])
ivan-zhuccc89462013-10-31 16:53:12 +0800343 self.assertEqual((backup2, backup3),
344 (image_list[0]['name'], image_list[1]['name']))
345
Ken'ichi Ohmichi547a3062013-12-02 09:30:36 +0900346 def _get_output(self):
347 resp, output = self.servers_client.get_console_output(
348 self.server_id, 10)
349 self.assertEqual(200, resp.status)
350 self.assertTrue(output, "Console output was empty.")
351 lines = len(output.split('\n'))
352 self.assertEqual(lines, 10)
353
Adam Gandelmanc6eefb42014-07-15 16:44:08 -0700354 @testtools.skipUnless(CONF.compute_feature_enabled.console_output,
355 'Console output not supported.')
Masayuki Igawa209fd502014-02-17 14:46:43 +0900356 @test.attr(type='gate')
Attila Fazekas45c3fbc2013-02-24 16:39:52 +0100357 def test_get_console_output(self):
358 # Positive test:Should be able to GET the console output
359 # for a given server_id and number of lines
Ken'ichi Ohmichi851a1352013-11-26 18:42:52 +0900360
361 # This reboot is necessary for outputting some console log after
362 # creating a instance backup. If a instance backup, the console
363 # log file is truncated and we cannot get any console log through
364 # "console-log" API.
365 # The detail is https://bugs.launchpad.net/nova/+bug/1251920
366 resp, body = self.servers_client.reboot(self.server_id, 'HARD')
367 self.assertEqual(202, resp.status)
368 self.servers_client.wait_for_server_status(self.server_id, 'ACTIVE')
369
Ken'ichi Ohmichi547a3062013-12-02 09:30:36 +0900370 self.wait_for(self._get_output)
Attila Fazekas45c3fbc2013-02-24 16:39:52 +0100371
Adam Gandelmanc6eefb42014-07-15 16:44:08 -0700372 @testtools.skipUnless(CONF.compute_feature_enabled.console_output,
373 'Console output not supported.')
Masayuki Igawa209fd502014-02-17 14:46:43 +0900374 @test.attr(type='gate')
Ken'ichi Ohmichi547a3062013-12-02 09:30:36 +0900375 def test_get_console_output_server_id_in_shutoff_status(self):
Attila Fazekas45c3fbc2013-02-24 16:39:52 +0100376 # Positive test:Should be able to GET the console output
Ken'ichi Ohmichi547a3062013-12-02 09:30:36 +0900377 # for a given server_id in SHUTOFF status
378
379 # NOTE: SHUTOFF is irregular status. To avoid test instability,
380 # one server is created only for this test without using
381 # the server that was created in setupClass.
382 resp, server = self.create_test_server(wait_until='ACTIVE')
383 temp_server_id = server['id']
384
385 resp, server = self.servers_client.stop(temp_server_id)
386 self.assertEqual(202, resp.status)
387 self.servers_client.wait_for_server_status(temp_server_id, 'SHUTOFF')
388
389 self.wait_for(self._get_output)
Dan Smithbc3bd242012-08-14 09:48:48 -0700390
Matt Riedemann992162e2014-03-24 09:11:06 -0700391 @testtools.skipUnless(CONF.compute_feature_enabled.pause,
392 'Pause is not available.')
Masayuki Igawa209fd502014-02-17 14:46:43 +0900393 @test.attr(type='gate')
Prem Karat6631f802013-07-04 12:07:33 +0530394 def test_pause_unpause_server(self):
395 resp, server = self.client.pause_server(self.server_id)
396 self.assertEqual(202, resp.status)
397 self.client.wait_for_server_status(self.server_id, 'PAUSED')
398 resp, server = self.client.unpause_server(self.server_id)
399 self.assertEqual(202, resp.status)
400 self.client.wait_for_server_status(self.server_id, 'ACTIVE')
401
Matt Riedemannf0cf6952014-03-24 09:08:52 -0700402 @testtools.skipUnless(CONF.compute_feature_enabled.suspend,
403 'Suspend is not available.')
Masayuki Igawa209fd502014-02-17 14:46:43 +0900404 @test.attr(type='gate')
Prem Karat6631f802013-07-04 12:07:33 +0530405 def test_suspend_resume_server(self):
406 resp, server = self.client.suspend_server(self.server_id)
407 self.assertEqual(202, resp.status)
408 self.client.wait_for_server_status(self.server_id, 'SUSPENDED')
409 resp, server = self.client.resume_server(self.server_id)
410 self.assertEqual(202, resp.status)
411 self.client.wait_for_server_status(self.server_id, 'ACTIVE')
412
David Shrewsbury25f666f2014-07-22 12:17:59 -0400413 @testtools.skipUnless(CONF.compute_feature_enabled.shelve,
414 'Shelve is not available.')
Masayuki Igawa209fd502014-02-17 14:46:43 +0900415 @test.attr(type='gate')
Ken'ichi Ohmichi39437e22013-10-06 00:21:38 +0900416 def test_shelve_unshelve_server(self):
417 resp, server = self.client.shelve_server(self.server_id)
418 self.assertEqual(202, resp.status)
419
Matthew Treinishb0a78fc2014-01-29 16:49:12 +0000420 offload_time = CONF.compute.shelved_offload_time
Ken'ichi Ohmichi39437e22013-10-06 00:21:38 +0900421 if offload_time >= 0:
422 self.client.wait_for_server_status(self.server_id,
423 'SHELVED_OFFLOADED',
424 extra_timeout=offload_time)
425 else:
426 self.client.wait_for_server_status(self.server_id,
427 'SHELVED')
428
Ken'ichi Ohmichi17b7f112014-02-20 06:33:49 +0900429 resp, server = self.client.shelve_offload_server(self.server_id)
430 self.assertEqual(202, resp.status)
431 self.client.wait_for_server_status(self.server_id,
432 'SHELVED_OFFLOADED')
433
Ken'ichi Ohmichi39437e22013-10-06 00:21:38 +0900434 resp, server = self.client.get_server(self.server_id)
435 image_name = server['name'] + '-shelved'
436 params = {'name': image_name}
437 resp, images = self.images_client.list_images(params)
438 self.assertEqual(1, len(images))
439 self.assertEqual(image_name, images[0]['name'])
440
441 resp, server = self.client.unshelve_server(self.server_id)
442 self.assertEqual(202, resp.status)
443 self.client.wait_for_server_status(self.server_id, 'ACTIVE')
444
Masayuki Igawa209fd502014-02-17 14:46:43 +0900445 @test.attr(type='gate')
Anju Tiwariaf98d222013-08-05 15:19:50 +0530446 def test_stop_start_server(self):
447 resp, server = self.servers_client.stop(self.server_id)
448 self.assertEqual(202, resp.status)
449 self.servers_client.wait_for_server_status(self.server_id, 'SHUTOFF')
450 resp, server = self.servers_client.start(self.server_id)
451 self.assertEqual(202, resp.status)
452 self.servers_client.wait_for_server_status(self.server_id, 'ACTIVE')
453
Masayuki Igawa209fd502014-02-17 14:46:43 +0900454 @test.attr(type='gate')
Zhu Zhu9643e512013-09-23 09:13:07 -0500455 def test_lock_unlock_server(self):
456 # Lock the server,try server stop(exceptions throw),unlock it and retry
457 resp, server = self.servers_client.lock_server(self.server_id)
458 self.assertEqual(202, resp.status)
459 resp, server = self.servers_client.get_server(self.server_id)
460 self.assertEqual(200, resp.status)
461 self.assertEqual(server['status'], 'ACTIVE')
462 # Locked server is not allowed to be stopped by non-admin user
ivan-zhu75a4ac82013-10-31 23:07:05 +0800463 self.assertRaises(exceptions.Conflict,
Zhu Zhu9643e512013-09-23 09:13:07 -0500464 self.servers_client.stop, self.server_id)
465 resp, server = self.servers_client.unlock_server(self.server_id)
466 self.assertEqual(202, resp.status)
467 resp, server = self.servers_client.stop(self.server_id)
468 self.assertEqual(202, resp.status)
469 self.servers_client.wait_for_server_status(self.server_id, 'SHUTOFF')
470 resp, server = self.servers_client.start(self.server_id)
471 self.assertEqual(202, resp.status)
472 self.servers_client.wait_for_server_status(self.server_id, 'ACTIVE')
473
Ghanshyam86d1a572014-03-05 10:19:25 +0900474 def _validate_url(self, url):
475 valid_scheme = ['http', 'https']
476 parsed_url = urlparse.urlparse(url)
477 self.assertNotEqual('None', parsed_url.port)
478 self.assertNotEqual('None', parsed_url.hostname)
479 self.assertIn(parsed_url.scheme, valid_scheme)
480
481 @testtools.skipUnless(CONF.compute_feature_enabled.vnc_console,
482 'VNC Console feature is disabled.')
483 @test.attr(type='gate')
484 def test_get_vnc_console(self):
485 # Get the VNC console of type 'novnc' and 'xvpvnc'
486 console_types = ['novnc', 'xvpvnc']
487 for console_type in console_types:
488 resp, body = self.servers_client.get_vnc_console(self.server_id,
489 console_type)
490 self.assertEqual(
491 200, resp.status,
492 "Failed to get Console Type: %s" % (console_types))
493 self.assertEqual(console_type, body['type'])
494 self.assertNotEqual('', body['url'])
495 self._validate_url(body['url'])
496
Dan Smithbc3bd242012-08-14 09:48:48 -0700497
Attila Fazekas19044d52013-02-16 07:35:06 +0100498class ServerActionsTestXML(ServerActionsTestJSON):
499 _interface = 'xml'