731c6b1d5d
Fixes the wait_for_not_running function in smoketests/base.py so that it short circuits when an instance ID is deleted rather than waits 60 seconds (the timeout). Previously this function had two problems: 1) It used Boto's instance.update() instead of instance.update(validate=True). Since update() returns returns quietly if no data about the instance was returned (aka the instance has been deleted) it effectively made this function almost always wait for the timeout (60 seconds). This makes the tests take about a minute longer than they need to unless #2 below occurs... 2) It also introduced a race condition in that... if hit just right the instance.state would get set to 'terminated'. Which would cause the loop to short circuit. This might seem correct at first glance but in fact causes intermittent failures in some of the netadmin tests because security groups can't be deleted if a running (or exiting) instance is still assigned to them. In fact wait_for_not_running was added to guard against just this in the first place! Also, renames the base.wait_for_not_running function to be called wait_for_deleted (that is what we are really doing here) Change-Id: I4486995a7d9028d876366e8d7a2c845520319b86
204 lines
8.5 KiB
Python
204 lines
8.5 KiB
Python
# vim: tabstop=4 shiftwidth=4 softtabstop=4
|
|
|
|
# Copyright 2010 United States Government as represented by the
|
|
# Administrator of the National Aeronautics and Space Administration.
|
|
# All Rights Reserved.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
import commands
|
|
import os
|
|
import random
|
|
import sys
|
|
import time
|
|
|
|
# If ../nova/__init__.py exists, add ../ to Python search path, so that
|
|
# it will override what happens to be installed in /usr/(local/)lib/python...
|
|
possible_topdir = os.path.normpath(os.path.join(os.path.abspath(sys.argv[0]),
|
|
os.pardir,
|
|
os.pardir))
|
|
if os.path.exists(os.path.join(possible_topdir, 'nova', '__init__.py')):
|
|
sys.path.insert(0, possible_topdir)
|
|
|
|
from smoketests import base
|
|
from smoketests import flags
|
|
|
|
|
|
FLAGS = flags.FLAGS
|
|
|
|
TEST_PREFIX = 'test%s' % int(random.random() * 1000000)
|
|
TEST_BUCKET = '%s_bucket' % TEST_PREFIX
|
|
TEST_KEY = '%s_key' % TEST_PREFIX
|
|
TEST_GROUP = '%s_group' % TEST_PREFIX
|
|
|
|
|
|
class AddressTests(base.UserSmokeTestCase):
|
|
def test_000_setUp(self):
|
|
self.create_key_pair(self.conn, TEST_KEY)
|
|
reservation = self.conn.run_instances(FLAGS.test_image,
|
|
instance_type='m1.tiny',
|
|
key_name=TEST_KEY)
|
|
self.data['instance'] = reservation.instances[0]
|
|
if not self.wait_for_running(self.data['instance']):
|
|
self.fail('instance failed to start')
|
|
self.data['instance'].update()
|
|
if not self.wait_for_ping(self.data['instance'].private_ip_address):
|
|
self.fail('could not ping instance')
|
|
if not self.wait_for_ssh(self.data['instance'].private_ip_address,
|
|
TEST_KEY):
|
|
self.fail('could not ssh to instance')
|
|
|
|
def test_001_can_allocate_floating_ip(self):
|
|
result = self.conn.allocate_address()
|
|
self.assertTrue(hasattr(result, 'public_ip'))
|
|
self.data['public_ip'] = result.public_ip
|
|
|
|
def test_002_can_associate_ip_with_instance(self):
|
|
result = self.conn.associate_address(self.data['instance'].id,
|
|
self.data['public_ip'])
|
|
self.assertTrue(result)
|
|
|
|
def test_003_can_ssh_with_public_ip(self):
|
|
ssh_authorized = False
|
|
groups = self.conn.get_all_security_groups(['default'])
|
|
for rule in groups[0].rules:
|
|
if (rule.ip_protocol == 'tcp' and
|
|
int(rule.from_port) <= 22 and
|
|
int(rule.to_port) >= 22):
|
|
ssh_authorized = True
|
|
break
|
|
if not ssh_authorized:
|
|
self.conn.authorize_security_group('default',
|
|
ip_protocol='tcp',
|
|
from_port=22,
|
|
to_port=22)
|
|
try:
|
|
if not self.wait_for_ssh(self.data['public_ip'], TEST_KEY):
|
|
self.fail('could not ssh to public ip')
|
|
finally:
|
|
if not ssh_authorized:
|
|
self.conn.revoke_security_group('default',
|
|
ip_protocol='tcp',
|
|
from_port=22,
|
|
to_port=22)
|
|
|
|
def test_004_can_disassociate_ip_from_instance(self):
|
|
result = self.conn.disassociate_address(self.data['public_ip'])
|
|
self.assertTrue(result)
|
|
|
|
def test_005_can_deallocate_floating_ip(self):
|
|
result = self.conn.release_address(self.data['public_ip'])
|
|
self.assertTrue(result)
|
|
|
|
def test_999_tearDown(self):
|
|
self.delete_key_pair(self.conn, TEST_KEY)
|
|
self.conn.terminate_instances([self.data['instance'].id])
|
|
|
|
|
|
class SecurityGroupTests(base.UserSmokeTestCase):
|
|
|
|
def __get_metadata_item(self, category):
|
|
id_url = "latest/meta-data/%s" % category
|
|
options = "-f -s --max-time 1"
|
|
command = "curl %s %s/%s" % (options, self.data['public_ip'], id_url)
|
|
status, output = commands.getstatusoutput(command)
|
|
value = output.strip()
|
|
if status > 0:
|
|
return False
|
|
return value
|
|
|
|
def __public_instance_is_accessible(self):
|
|
instance_id = self.__get_metadata_item('instance-id')
|
|
if not instance_id:
|
|
return False
|
|
if instance_id != self.data['instance'].id:
|
|
raise Exception("Wrong instance id. Expected: %s, Got: %s" %
|
|
(self.data['instance'].id, instance_id))
|
|
return True
|
|
|
|
def test_001_can_create_security_group(self):
|
|
self.conn.create_security_group(TEST_GROUP, description='test')
|
|
|
|
groups = self.conn.get_all_security_groups()
|
|
self.assertTrue(TEST_GROUP in [group.name for group in groups])
|
|
|
|
def test_002_can_launch_instance_in_security_group(self):
|
|
with open("proxy.sh") as f:
|
|
user_data = f.read()
|
|
self.create_key_pair(self.conn, TEST_KEY)
|
|
reservation = self.conn.run_instances(FLAGS.test_image,
|
|
key_name=TEST_KEY,
|
|
security_groups=[TEST_GROUP],
|
|
user_data=user_data,
|
|
instance_type='m1.tiny')
|
|
|
|
self.data['instance'] = reservation.instances[0]
|
|
if not self.wait_for_running(self.data['instance']):
|
|
self.fail('instance failed to start')
|
|
self.data['instance'].update()
|
|
|
|
def test_003_can_authorize_security_group_ingress(self):
|
|
self.assertTrue(self.conn.authorize_security_group(TEST_GROUP,
|
|
ip_protocol='tcp',
|
|
from_port=80,
|
|
to_port=80))
|
|
|
|
def test_004_can_access_metadata_over_public_ip(self):
|
|
result = self.conn.allocate_address()
|
|
self.assertTrue(hasattr(result, 'public_ip'))
|
|
self.data['public_ip'] = result.public_ip
|
|
|
|
result = self.conn.associate_address(self.data['instance'].id,
|
|
self.data['public_ip'])
|
|
start_time = time.time()
|
|
while not self.__public_instance_is_accessible():
|
|
# 1 minute to launch
|
|
if time.time() - start_time > 60:
|
|
raise Exception("Timeout")
|
|
time.sleep(1)
|
|
|
|
def test_005_validate_metadata(self):
|
|
instance = self.data['instance']
|
|
start_time = time.time()
|
|
instance_type = False
|
|
while not instance_type:
|
|
instance_type = self.__get_metadata_item('instance-type')
|
|
# 10 seconds to restart proxy
|
|
if time.time() - start_time > 10:
|
|
raise Exception("Timeout")
|
|
time.sleep(1)
|
|
self.assertEqual(instance.instance_type, instance_type)
|
|
#FIXME(dprince): validate more metadata here
|
|
|
|
def test_006_can_revoke_security_group_ingress(self):
|
|
self.assertTrue(self.conn.revoke_security_group(TEST_GROUP,
|
|
ip_protocol='tcp',
|
|
from_port=80,
|
|
to_port=80))
|
|
start_time = time.time()
|
|
while self.__public_instance_is_accessible():
|
|
# 1 minute to teardown
|
|
if time.time() - start_time > 60:
|
|
raise Exception("Timeout")
|
|
time.sleep(1)
|
|
|
|
def test_999_tearDown(self):
|
|
self.conn.disassociate_address(self.data['public_ip'])
|
|
self.conn.delete_key_pair(TEST_KEY)
|
|
self.conn.terminate_instances([self.data['instance'].id])
|
|
self.wait_for_deleted(self.data['instance'])
|
|
self.conn.delete_security_group(TEST_GROUP)
|
|
groups = self.conn.get_all_security_groups()
|
|
self.assertFalse(TEST_GROUP in [group.name for group in groups])
|
|
self.assertTrue(self.conn.release_address(self.data['public_ip']))
|