Adds base in-tree functional testing of the ovs_neutron_agent
Base setup and utility methods for functional testing of the OVS L2 agent. Partially-Implements: blueprint restructure-l2-agent Co-Authored-By: Rossella Sblendido <rsblendido@suse.com> Change-Id: I5b3149b2b8502b9b9a36d3e20d909872cc17f8e8
This commit is contained in:
parent
49b64ca6bc
commit
21ff82d9d3
|
@ -0,0 +1,298 @@
|
|||
# Copyright (c) 2015 Red Hat, Inc.
|
||||
# Copyright (c) 2015 SUSE Linux Products GmbH
|
||||
# All Rights Reserved.
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
import eventlet
|
||||
import mock
|
||||
import random
|
||||
|
||||
from oslo_config import cfg
|
||||
from oslo_log import log as logging
|
||||
from oslo_utils import uuidutils
|
||||
|
||||
from neutron.agent.common import config as agent_config
|
||||
from neutron.agent.common import ovs_lib
|
||||
from neutron.agent.linux import interface
|
||||
from neutron.agent.linux import polling
|
||||
from neutron.agent.linux import utils as agent_utils
|
||||
from neutron.common import config as common_config
|
||||
from neutron.common import constants as n_const
|
||||
from neutron.common import utils
|
||||
from neutron.plugins.common import constants as p_const
|
||||
from neutron.plugins.ml2.drivers.openvswitch.agent.common import config \
|
||||
as ovs_config
|
||||
from neutron.plugins.ml2.drivers.openvswitch.agent.common import constants
|
||||
from neutron.plugins.ml2.drivers.openvswitch.agent.openflow.ovs_ofctl \
|
||||
import br_int
|
||||
from neutron.plugins.ml2.drivers.openvswitch.agent.openflow.ovs_ofctl \
|
||||
import br_phys
|
||||
from neutron.plugins.ml2.drivers.openvswitch.agent.openflow.ovs_ofctl \
|
||||
import br_tun
|
||||
from neutron.plugins.ml2.drivers.openvswitch.agent import ovs_neutron_agent \
|
||||
as ovs_agent
|
||||
from neutron.tests.functional.agent.linux import base
|
||||
|
||||
LOG = logging.getLogger(__name__)
|
||||
|
||||
|
||||
class OVSAgentTestFramework(base.BaseOVSLinuxTestCase):
|
||||
|
||||
def setUp(self):
|
||||
super(OVSAgentTestFramework, self).setUp()
|
||||
agent_rpc = ('neutron.plugins.ml2.drivers.openvswitch.agent.'
|
||||
'ovs_neutron_agent.OVSPluginApi')
|
||||
mock.patch(agent_rpc).start()
|
||||
mock.patch('neutron.agent.rpc.PluginReportStateAPI').start()
|
||||
self.br_int = base.get_rand_name(n_const.DEVICE_NAME_MAX_LEN,
|
||||
prefix='br-int')
|
||||
self.br_tun = base.get_rand_name(n_const.DEVICE_NAME_MAX_LEN,
|
||||
prefix='br-tun')
|
||||
patch_name_len = n_const.DEVICE_NAME_MAX_LEN - len("-patch-tun")
|
||||
self.patch_tun = "%s-patch-tun" % self.br_int[:patch_name_len]
|
||||
self.patch_int = "%s-patch-int" % self.br_tun[:patch_name_len]
|
||||
self.ovs = ovs_lib.BaseOVS()
|
||||
self.config = self._configure_agent()
|
||||
self.driver = interface.OVSInterfaceDriver(self.config)
|
||||
|
||||
def _get_config_opts(self):
|
||||
config = cfg.ConfigOpts()
|
||||
config.register_opts(common_config.core_opts)
|
||||
config.register_opts(interface.OPTS)
|
||||
config.register_opts(ovs_config.ovs_opts, "OVS")
|
||||
config.register_opts(ovs_config.agent_opts, "AGENT")
|
||||
agent_config.register_interface_driver_opts_helper(config)
|
||||
agent_config.register_agent_state_opts_helper(config)
|
||||
return config
|
||||
|
||||
def _configure_agent(self):
|
||||
config = self._get_config_opts()
|
||||
config.set_override(
|
||||
'interface_driver',
|
||||
'neutron.agent.linux.interface.OVSInterfaceDriver')
|
||||
config.set_override('integration_bridge', self.br_int, "OVS")
|
||||
config.set_override('ovs_integration_bridge', self.br_int)
|
||||
config.set_override('tunnel_bridge', self.br_tun, "OVS")
|
||||
config.set_override('int_peer_patch_port', self.patch_tun, "OVS")
|
||||
config.set_override('tun_peer_patch_port', self.patch_int, "OVS")
|
||||
config.set_override('host', 'ovs-agent')
|
||||
return config
|
||||
|
||||
def _bridge_classes(self):
|
||||
return {
|
||||
'br_int': br_int.OVSIntegrationBridge,
|
||||
'br_phys': br_phys.OVSPhysicalBridge,
|
||||
'br_tun': br_tun.OVSTunnelBridge
|
||||
}
|
||||
|
||||
def create_agent(self, create_tunnels=True):
|
||||
if create_tunnels:
|
||||
tunnel_types = [p_const.TYPE_VXLAN]
|
||||
else:
|
||||
tunnel_types = None
|
||||
local_ip = '192.168.10.1'
|
||||
bridge_mappings = {'physnet': self.br_int}
|
||||
agent = ovs_agent.OVSNeutronAgent(self._bridge_classes(),
|
||||
self.br_int, self.br_tun,
|
||||
local_ip, bridge_mappings,
|
||||
polling_interval=1,
|
||||
tunnel_types=tunnel_types,
|
||||
prevent_arp_spoofing=False,
|
||||
conf=self.config)
|
||||
self.addCleanup(self.ovs.delete_bridge, self.br_int)
|
||||
if tunnel_types:
|
||||
self.addCleanup(self.ovs.delete_bridge, self.br_tun)
|
||||
agent.sg_agent = mock.Mock()
|
||||
return agent
|
||||
|
||||
def start_agent(self, agent):
|
||||
polling_manager = polling.InterfacePollingMinimizer()
|
||||
self.addCleanup(polling_manager.stop)
|
||||
polling_manager.start()
|
||||
agent_utils.wait_until_true(
|
||||
polling_manager._monitor.is_active)
|
||||
agent.check_ovs_status = mock.Mock(
|
||||
return_value=constants.OVS_NORMAL)
|
||||
t = eventlet.spawn(agent.rpc_loop, polling_manager)
|
||||
|
||||
def stop_agent(agent, rpc_loop_thread):
|
||||
agent.run_daemon_loop = False
|
||||
rpc_loop_thread.wait()
|
||||
|
||||
self.addCleanup(stop_agent, agent, t)
|
||||
|
||||
def _bind_ports(self, ports, network, agent):
|
||||
devices = []
|
||||
for port in ports:
|
||||
dev = OVSAgentTestFramework._get_device_details(port, network)
|
||||
vif_name = port.get('vif_name')
|
||||
vif_id = uuidutils.generate_uuid(),
|
||||
vif_port = ovs_lib.VifPort(
|
||||
vif_name, "%s" % vif_id, 'id-%s' % vif_id,
|
||||
port.get('mac_address'), agent.int_br)
|
||||
dev['vif_port'] = vif_port
|
||||
devices.append(dev)
|
||||
agent._bind_devices(devices)
|
||||
|
||||
def _create_test_port_dict(self):
|
||||
return {'id': uuidutils.generate_uuid(),
|
||||
'mac_address': utils.get_random_mac(
|
||||
'fa:16:3e:00:00:00'.split(':')),
|
||||
'fixed_ips': [{
|
||||
'ip_address': '10.%d.%d.%d' % (
|
||||
random.randint(3, 254),
|
||||
random.randint(3, 254),
|
||||
random.randint(3, 254))}],
|
||||
'vif_name': base.get_rand_name(
|
||||
self.driver.DEV_NAME_LEN, self.driver.DEV_NAME_PREFIX)}
|
||||
|
||||
def _create_test_network_dict(self):
|
||||
return {'id': uuidutils.generate_uuid(),
|
||||
'tenant_id': uuidutils.generate_uuid()}
|
||||
|
||||
def _plug_ports(self, network, ports, agent, ip_len=24):
|
||||
for port in ports:
|
||||
self.driver.plug(
|
||||
network.get('id'), port.get('id'), port.get('vif_name'),
|
||||
port.get('mac_address'),
|
||||
agent.int_br.br_name, namespace=None)
|
||||
ip_cidrs = ["%s/%s" % (port.get('fixed_ips')[0][
|
||||
'ip_address'], ip_len)]
|
||||
self.driver.init_l3(port.get('vif_name'), ip_cidrs, namespace=None)
|
||||
|
||||
@staticmethod
|
||||
def _get_device_details(port, network):
|
||||
dev = {'device': port['id'],
|
||||
'port_id': port['id'],
|
||||
'network_id': network['id'],
|
||||
'network_type': 'vlan',
|
||||
'physical_network': 'physnet',
|
||||
'segmentation_id': 1,
|
||||
'fixed_ips': port['fixed_ips'],
|
||||
'device_owner': 'compute',
|
||||
'admin_state_up': True}
|
||||
return dev
|
||||
|
||||
def assert_bridge(self, br, exists=True):
|
||||
self.assertEqual(exists, self.ovs.bridge_exists(br))
|
||||
|
||||
def assert_patch_ports(self, agent):
|
||||
|
||||
def get_peer(port):
|
||||
return agent.int_br.db_get_val(
|
||||
'Interface', port, 'options', check_error=True)
|
||||
|
||||
agent_utils.wait_until_true(
|
||||
lambda: get_peer(self.patch_int) == {'peer': self.patch_tun})
|
||||
agent_utils.wait_until_true(
|
||||
lambda: get_peer(self.patch_tun) == {'peer': self.patch_int})
|
||||
|
||||
def assert_bridge_ports(self):
|
||||
for port in [self.patch_tun, self.patch_int]:
|
||||
self.assertTrue(self.ovs.port_exists(port))
|
||||
|
||||
def assert_no_vlan_tags(self, ports, agent):
|
||||
for port in ports:
|
||||
res = agent.int_br.db_get_val('Port', port.get('vif_name'), 'tag')
|
||||
self.assertEqual([], res)
|
||||
|
||||
def assert_vlan_tags(self, ports, agent):
|
||||
for port in ports:
|
||||
res = agent.int_br.db_get_val('Port', port.get('vif_name'), 'tag')
|
||||
self.assertTrue(res)
|
||||
|
||||
|
||||
class TestOVSAgent(OVSAgentTestFramework):
|
||||
|
||||
def _expected_plugin_rpc_call(self, call, expected_devices):
|
||||
"""Helper to check expected rpc call are received
|
||||
:param call: The call to check
|
||||
:param expected_devices The device for which call is expected
|
||||
"""
|
||||
args = (args[0][1] for args in call.call_args_list)
|
||||
return not (set(expected_devices) - set(args))
|
||||
|
||||
def _create_ports(self, network, agent):
|
||||
ports = []
|
||||
for x in range(3):
|
||||
ports.append(self._create_test_port_dict())
|
||||
|
||||
def mock_device_details(context, devices, agent_id, host=None):
|
||||
details = []
|
||||
for port in ports:
|
||||
if port['id'] in devices:
|
||||
dev = OVSAgentTestFramework._get_device_details(
|
||||
port, network)
|
||||
details.append(dev)
|
||||
return details
|
||||
|
||||
agent.plugin_rpc.get_devices_details_list.side_effect = (
|
||||
mock_device_details)
|
||||
return ports
|
||||
|
||||
def test_port_creation_and_deletion(self):
|
||||
agent = self.create_agent()
|
||||
self.start_agent(agent)
|
||||
network = self._create_test_network_dict()
|
||||
ports = self._create_ports(network, agent)
|
||||
self._plug_ports(network, ports, agent)
|
||||
up_ports_ids = [p['id'] for p in ports]
|
||||
agent_utils.wait_until_true(
|
||||
lambda: self._expected_plugin_rpc_call(
|
||||
agent.plugin_rpc.update_device_up, up_ports_ids))
|
||||
down_ports_ids = [p['id'] for p in ports]
|
||||
for port in ports:
|
||||
agent.int_br.delete_port(port['vif_name'])
|
||||
agent_utils.wait_until_true(
|
||||
lambda: self._expected_plugin_rpc_call(
|
||||
agent.plugin_rpc.update_device_down, down_ports_ids))
|
||||
|
||||
def test_resync_devices_set_up_after_exception(self):
|
||||
agent = self.create_agent()
|
||||
self.start_agent(agent)
|
||||
network = self._create_test_network_dict()
|
||||
ports = self._create_ports(network, agent)
|
||||
agent.plugin_rpc.update_device_up.side_effect = [
|
||||
Exception('Exception to trigger resync'),
|
||||
None, None, None]
|
||||
self._plug_ports(network, ports, agent)
|
||||
ports_ids = [p['id'] for p in ports]
|
||||
agent_utils.wait_until_true(
|
||||
lambda: self._expected_plugin_rpc_call(
|
||||
agent.plugin_rpc.update_device_up, ports_ids))
|
||||
|
||||
def test_port_vlan_tags(self):
|
||||
agent = self.create_agent()
|
||||
self.start_agent(agent)
|
||||
ports = []
|
||||
for x in range(3):
|
||||
ports.append(self._create_test_port_dict())
|
||||
network = self._create_test_network_dict()
|
||||
self._plug_ports(network, ports, agent)
|
||||
agent.provision_local_vlan(network['id'], 'vlan', 'physnet', 1)
|
||||
self.assert_no_vlan_tags(ports, agent)
|
||||
self._bind_ports(ports, network, agent)
|
||||
self.assert_vlan_tags(ports, agent)
|
||||
|
||||
def test_assert_bridges_ports_vxlan(self):
|
||||
agent = self.create_agent()
|
||||
self.assertTrue(self.ovs.bridge_exists(self.br_int))
|
||||
self.assertTrue(self.ovs.bridge_exists(self.br_tun))
|
||||
self.assert_bridge_ports()
|
||||
self.assert_patch_ports(agent)
|
||||
|
||||
def test_assert_bridges_ports_no_tunnel(self):
|
||||
self.create_agent(create_tunnels=False)
|
||||
self.assertTrue(self.ovs.bridge_exists(self.br_int))
|
||||
self.assertFalse(self.ovs.bridge_exists(self.br_tun))
|
Loading…
Reference in New Issue