Remove devstack upgrade and gate (for now).
This commit is contained in:
parent
7f55b15f63
commit
031f13edbd
@ -1,318 +0,0 @@
|
||||
#!/usr/bin/env bash
|
||||
|
||||
# **designate.sh**
|
||||
|
||||
# Simple Tests to verify designate is running
|
||||
|
||||
echo "*********************************************************************"
|
||||
echo "Begin DevStack Exercise: $0"
|
||||
echo "*********************************************************************"
|
||||
|
||||
# This script exits on an error so that errors don't compound and you see
|
||||
# only the first error that occurred.
|
||||
set -o errexit
|
||||
|
||||
# Print the commands being run so that we can see the command that triggers
|
||||
# an error. It is also useful for following allowing as the install occurs.
|
||||
set -o xtrace
|
||||
|
||||
|
||||
# Keep track of the current directory
|
||||
SCRIPT_DIR=$(cd $(dirname "$0") && pwd)
|
||||
|
||||
DEVSTACK_DIR=$(cd $SCRIPT_DIR/../..; pwd)/devstack
|
||||
if [ -x "$HOME/devstack/stack.sh" ]; then
|
||||
DEVSTACK_DIR=$HOME/devstack/
|
||||
fi
|
||||
|
||||
# Import common functions
|
||||
source $DEVSTACK_DIR/functions
|
||||
|
||||
# Import configuration
|
||||
source $DEVSTACK_DIR/openrc admin admin
|
||||
|
||||
# Import exercise configuration
|
||||
source $DEVSTACK_DIR/exerciserc
|
||||
|
||||
# Skip if designate is not enabled
|
||||
is_service_enabled designate || exit 55
|
||||
|
||||
# Import settings + designate library
|
||||
source $SCRIPT_DIR/plugin.sh
|
||||
|
||||
# Settings
|
||||
# ========
|
||||
source $SCRIPT_DIR/settings
|
||||
|
||||
# Used with dig to look up in DNS
|
||||
DIG_TIMEOUT=30
|
||||
|
||||
if [ "$DESIGNATE_BACKEND_DRIVER" == "akamai" ]; then
|
||||
# Akamai can be slow to propagate changes out
|
||||
DIG_TIMEOUT=300
|
||||
fi
|
||||
|
||||
# used with dig to look up in DNS
|
||||
DIG_FLAGS="-p $DESIGNATE_SERVICE_PORT_DNS @$DESIGNATE_SERVICE_HOST"
|
||||
|
||||
# used with dig to do an AXFR against MDNS
|
||||
DIG_AXFR_FLAGS="-p $DESIGNATE_SERVICE_PORT_MDNS @$DESIGNATE_SERVICE_HOST AXFR +tcp +nocmd"
|
||||
|
||||
# Functions
|
||||
# =========
|
||||
|
||||
function cleanup {
|
||||
# Try to cleanup any domains, this is important for backends like
|
||||
# Akamai/Dyn, where state is not fully reset between test runs.
|
||||
source $DEVSTACK_DIR/openrc admin admin
|
||||
|
||||
designate --all-tenants domain-list -f csv | awk 'BEGIN { FS = "," } ; {print $1}' | \
|
||||
tail -n+2 | xargs --no-run-if-empty -n1 designate --all-tenants domain-delete
|
||||
}
|
||||
trap cleanup EXIT
|
||||
|
||||
function ensure_record_present {
|
||||
local record_name=$1
|
||||
local record_type=$2
|
||||
local record_value=$3
|
||||
|
||||
if [ "$DESIGNATE_BACKEND_DRIVER" = "fake" ] ; then
|
||||
# if the backend is fake, there will be no actual DNS records
|
||||
return 0
|
||||
fi
|
||||
|
||||
if ! timeout $DIG_TIMEOUT sh -c "while ! dig +short $DIG_FLAGS $record_name $record_type | grep \"$record_value\"; do sleep 1; done"; then
|
||||
die $LINENO "Error: record $record_name ($record_type) not found in DNS"
|
||||
fi
|
||||
|
||||
# Display for debugging
|
||||
dig $DIG_FLAGS $record_name $record_type
|
||||
|
||||
return 0
|
||||
}
|
||||
|
||||
function ensure_record_absent {
|
||||
local record_name=$1
|
||||
local record_type=$2
|
||||
local record_value=$3
|
||||
|
||||
if [ "$DESIGNATE_BACKEND_DRIVER" = "fake" ] ; then
|
||||
# if the backend is fake, there will be no actual DNS records
|
||||
return 0
|
||||
fi
|
||||
|
||||
if ! timeout $DIG_TIMEOUT sh -c "while dig +short $DIG_FLAGS $record_name $record_type | grep \"$record_value\"; do sleep 1; done"; then
|
||||
# Display for debugging
|
||||
dig $DIG_FLAGS $record_name $record_type
|
||||
|
||||
die $LINENO "Error: record $record_name ($record_type) found in DNS, should be absent"
|
||||
fi
|
||||
|
||||
return 0
|
||||
}
|
||||
|
||||
# do an AXFR request to MDNS
|
||||
# if it does not match the expected value, give an error
|
||||
function verify_axfr_in_mdns {
|
||||
# Display for debugging
|
||||
dig $DIG_AXFR_FLAGS "$1"
|
||||
if dig $DIG_AXFR_FLAGS "$1"; then
|
||||
if [ -n "$2" ] ; then
|
||||
local axfr_records=$(dig $DIG_AXFR_FLAGS "$1" | grep "$1" | wc -l)
|
||||
if [ "$axfr_records" = "$2" ] ; then
|
||||
return 0
|
||||
else
|
||||
die $LINENO "Error: AXFR to MDNS did not return the expected number of records"
|
||||
fi
|
||||
fi
|
||||
return 0
|
||||
else
|
||||
die $LINENO "Error: AXFR to MDNS did not return a correct response"
|
||||
fi
|
||||
}
|
||||
|
||||
# get the domain id (uuid) given the domain name
|
||||
# if REQUIRED is set, die with an error if name not found
|
||||
function get_domain_id {
|
||||
local domain_name=$1
|
||||
local required=$2
|
||||
local domain_id=$(designate domain-list | egrep " $domain_name " | get_field 1)
|
||||
if [ "$required" = "1" ] ; then
|
||||
die_if_not_set $LINENO domain_id "Failure retrieving DOMAIN_ID"
|
||||
fi
|
||||
echo "$domain_id"
|
||||
}
|
||||
|
||||
|
||||
# get the domain_name given the id
|
||||
function get_domain_name {
|
||||
designate domain-list | grep "$1" | get_field 2
|
||||
}
|
||||
|
||||
# if the given domain does not exist, it will be created
|
||||
# the domain_id of the domain will be returned
|
||||
function get_or_create_domain_id {
|
||||
local domainid=$(get_domain_id "$1")
|
||||
if [[ -z "$domainid" ]]; then
|
||||
designate domain-create --name $1 --email admin@devstack.org --ttl 86400 --description "domain $1" 1>&2
|
||||
domainid=$(designate domain-list | grep "$1" | get_field 1)
|
||||
fi
|
||||
echo $domainid
|
||||
}
|
||||
|
||||
# get the record id (uuid) given the record name and domain id
|
||||
# if REQUIRED is set, die with an error if name not found
|
||||
function get_record_id {
|
||||
local domain_id=$1
|
||||
local record_name=$2
|
||||
local record_type=$3
|
||||
local required=$4
|
||||
local record_id=$(designate record-list $domain_id | egrep " $record_name " | egrep " $record_type " | get_field 1)
|
||||
if [ "$required" = "1" ] ; then
|
||||
die_if_not_set $LINENO record_id "Failure retrieving RECORD_ID"
|
||||
fi
|
||||
echo "$record_id"
|
||||
}
|
||||
|
||||
# Testing Servers
|
||||
# ===============
|
||||
designate server-list
|
||||
|
||||
# NUMBER_OF_RECORDS keeps track of the records we need to get for AXFR
|
||||
# We start with the number of NS lines returned from server list
|
||||
# (Header line makes up for SOA + Number of NS record lines)
|
||||
NUMBER_OF_RECORDS=$(designate server-list -f csv | wc -l)
|
||||
|
||||
# Add 1 extra to account for the additional SOA at the end of the AXFR
|
||||
((NUMBER_OF_RECORDS+=1))
|
||||
|
||||
# Testing Domains
|
||||
# ===============
|
||||
|
||||
# List domains
|
||||
designate domain-list
|
||||
|
||||
# Create random domain name
|
||||
DOMAIN_NAME="exercise-$(openssl rand -hex 4).com."
|
||||
|
||||
# Create the domain
|
||||
designate domain-create --name $DOMAIN_NAME --email devstack@example.org
|
||||
|
||||
DOMAIN_ID=$(get_domain_id $DOMAIN_NAME 1)
|
||||
|
||||
# Fetch the domain
|
||||
designate domain-get $DOMAIN_ID
|
||||
|
||||
# List the nameservers hosting the domain
|
||||
designate domain-servers-list $DOMAIN_ID
|
||||
|
||||
# Testing Records
|
||||
# ===============
|
||||
|
||||
# Create random record name
|
||||
A_RECORD_NAME="$(openssl rand -hex 4).${DOMAIN_NAME}"
|
||||
|
||||
# Create an A record
|
||||
designate record-create $DOMAIN_ID --name $A_RECORD_NAME --type A --data 127.0.0.1
|
||||
((NUMBER_OF_RECORDS++))
|
||||
A_RECORD_ID=$(get_record_id $DOMAIN_ID $A_RECORD_NAME A)
|
||||
|
||||
# Fetch the record
|
||||
designate record-get $DOMAIN_ID $A_RECORD_ID
|
||||
|
||||
# Verify the record is published in DNS
|
||||
ensure_record_present $A_RECORD_NAME A 127.0.0.1
|
||||
|
||||
# -----
|
||||
|
||||
# Create random record name
|
||||
AAAA_RECORD_NAME="$(openssl rand -hex 4).${DOMAIN_NAME}"
|
||||
|
||||
# Create an AAAA record
|
||||
designate record-create $DOMAIN_ID --name $AAAA_RECORD_NAME --type AAAA --data "2607:f0d0:1002:51::4"
|
||||
((NUMBER_OF_RECORDS++))
|
||||
AAAA_RECORD_ID=$(get_record_id $DOMAIN_ID $AAAA_RECORD_NAME AAAA)
|
||||
|
||||
# Fetch the record
|
||||
designate record-get $DOMAIN_ID $AAAA_RECORD_ID
|
||||
|
||||
# Verify the record is published in DNS
|
||||
ensure_record_present $AAAA_RECORD_NAME AAAA 2607:f0d0:1002:51::4
|
||||
|
||||
# -----
|
||||
|
||||
# Create a MX record
|
||||
designate record-create $DOMAIN_ID --name $DOMAIN_NAME --type MX --priority 5 --data "mail.example.com."
|
||||
((NUMBER_OF_RECORDS++))
|
||||
MX_RECORD_ID=$(get_record_id $DOMAIN_ID $DOMAIN_NAME MX)
|
||||
|
||||
# Fetch the record
|
||||
designate record-get $DOMAIN_ID $MX_RECORD_ID
|
||||
|
||||
# Verify the record is published in DNS
|
||||
ensure_record_present $DOMAIN_NAME MX "5 mail.example.com."
|
||||
|
||||
# -----
|
||||
|
||||
# Create a SRV record
|
||||
designate record-create $DOMAIN_ID --name _sip._tcp.$DOMAIN_NAME --type SRV --priority 10 --data "5 5060 sip.example.com."
|
||||
((NUMBER_OF_RECORDS++))
|
||||
SRV_RECORD_ID=$(get_record_id $DOMAIN_ID _sip._tcp.$DOMAIN_NAME SRV)
|
||||
|
||||
# Fetch the record
|
||||
designate record-get $DOMAIN_ID $SRV_RECORD_ID
|
||||
|
||||
# Verify the record is published in DNS
|
||||
ensure_record_present _sip._tcp.$DOMAIN_NAME SRV "10 5 5060 sip.example.com."
|
||||
|
||||
# -----
|
||||
|
||||
# Create random record name
|
||||
CNAME_RECORD_NAME="$(openssl rand -hex 4).${DOMAIN_NAME}"
|
||||
|
||||
# Create a CNAME record
|
||||
designate record-create $DOMAIN_ID --name $CNAME_RECORD_NAME --type CNAME --data $DOMAIN_NAME
|
||||
((NUMBER_OF_RECORDS++))
|
||||
CNAME_RECORD_ID=$(get_record_id $DOMAIN_ID $CNAME_RECORD_NAME CNAME)
|
||||
|
||||
# Fetch the record
|
||||
designate record-get $DOMAIN_ID $CNAME_RECORD_ID
|
||||
|
||||
# Verify the record is published in DNS
|
||||
ensure_record_present $CNAME_RECORD_NAME CNAME $DOMAIN_NAME
|
||||
|
||||
# -----
|
||||
|
||||
# List Records
|
||||
designate record-list $DOMAIN_ID
|
||||
|
||||
# Send an AXFR to MDNS and check for the records returned
|
||||
verify_axfr_in_mdns $DOMAIN_NAME $NUMBER_OF_RECORDS
|
||||
|
||||
# -----
|
||||
|
||||
# Delete a Record
|
||||
designate record-delete $DOMAIN_ID $CNAME_RECORD_ID
|
||||
|
||||
# List Records
|
||||
designate record-list $DOMAIN_ID
|
||||
|
||||
# Fetch the record - should be gone
|
||||
designate record-get $DOMAIN_ID $CNAME_RECORD_ID || echo "good - record was removed"
|
||||
|
||||
# verify not in DNS anymore
|
||||
ensure_record_absent $CNAME_RECORD_NAME CNAME $DOMAIN_NAME
|
||||
|
||||
# Testing Domains Delete
|
||||
# ======================
|
||||
|
||||
# Delete the domain
|
||||
designate domain-delete $DOMAIN_ID
|
||||
|
||||
# Fetch the domain - should be gone
|
||||
designate domain-get $DOMAIN_ID || echo "good - domain was removed"
|
||||
|
||||
set +o xtrace
|
||||
echo "*********************************************************************"
|
||||
echo "SUCCESS: End DevStack Exercise: $0"
|
||||
echo "*********************************************************************"
|
@ -1,24 +0,0 @@
|
||||
#!/bin/bash
|
||||
|
||||
set -ex
|
||||
|
||||
pushd $BASE/new/devstack
|
||||
|
||||
DEVSTACK_GATE_DESIGNATE_DRIVER=${DEVSTACK_GATE_DESIGNATE_DRIVER:-powerdns}
|
||||
|
||||
export KEEP_LOCALRC=1
|
||||
export ENABLED_SERVICES=designate,designate-api,designate-central,designate-sink,designate-mdns,designate-pool-manager,designate-zone-manager
|
||||
|
||||
echo "DESIGNATE_SERVICE_PORT_DNS=5322" >> $BASE/new/devstack/localrc
|
||||
echo "DESIGNATE_BACKEND_DRIVER=$DEVSTACK_GATE_DESIGNATE_DRIVER" >> $BASE/new/devstack/localrc
|
||||
echo "DESIGNATE_PERIODIC_RECOVERY_INTERVAL=20" >> $BASE/new/devstack/localrc
|
||||
echo "DESIGNATE_PERIODIC_SYNC_INTERVAL=20" >> $BASE/new/devstack/localrc
|
||||
|
||||
|
||||
# Pass through any DESIGNATE_ env vars to the localrc file
|
||||
env | grep -E "^DESIGNATE_" >> $BASE/new/devstack/localrc || :
|
||||
|
||||
popd
|
||||
|
||||
# Run DevStack Gate
|
||||
$BASE/new/devstack-gate/devstack-vm-gate.sh
|
@ -1,50 +0,0 @@
|
||||
#!/bin/bash
|
||||
|
||||
set -ex
|
||||
|
||||
# Run the Designate DevStack exercises
|
||||
$BASE/new/designate/devstack/exercise.sh
|
||||
|
||||
# Import functions needed for the below workaround
|
||||
source $BASE/new/devstack/functions
|
||||
|
||||
# Workaround for Tempest architectural changes
|
||||
# See bugs:
|
||||
# 1) https://bugs.launchpad.net/manila/+bug/1531049
|
||||
# 2) https://bugs.launchpad.net/tempest/+bug/1524717
|
||||
TEMPEST_CONFIG=$BASE/new/tempest/etc/tempest.conf
|
||||
ADMIN_TENANT_NAME=${ADMIN_TENANT_NAME:-"admin"}
|
||||
ADMIN_PASSWORD=${ADMIN_PASSWORD:-"secretadmin"}
|
||||
|
||||
sudo chown -R $USER:stack $BASE/new/tempest
|
||||
sudo chown -R $USER:stack $BASE/data/tempest
|
||||
|
||||
iniset $TEMPEST_CONFIG auth admin_username ${ADMIN_USERNAME:-"admin"}
|
||||
iniset $TEMPEST_CONFIG auth admin_password $ADMIN_PASSWORD
|
||||
iniset $TEMPEST_CONFIG auth admin_tenant_name $ADMIN_TENANT_NAME
|
||||
iniset $TEMPEST_CONFIG auth admin_domain_name ${ADMIN_DOMAIN_NAME:-"Default"}
|
||||
iniset $TEMPEST_CONFIG identity username ${TEMPEST_USERNAME:-"demo"}
|
||||
iniset $TEMPEST_CONFIG identity password $ADMIN_PASSWORD
|
||||
iniset $TEMPEST_CONFIG identity tenant_name ${TEMPEST_TENANT_NAME:-"demo"}
|
||||
iniset $TEMPEST_CONFIG identity alt_username ${ALT_USERNAME:-"alt_demo"}
|
||||
iniset $TEMPEST_CONFIG identity alt_password $ADMIN_PASSWORD
|
||||
iniset $TEMPEST_CONFIG identity alt_tenant_name ${ALT_TENANT_NAME:-"alt_demo"}
|
||||
iniset $TEMPEST_CONFIG validation ip_version_for_ssh 4
|
||||
iniset $TEMPEST_CONFIG validation ssh_timeout $BUILD_TIMEOUT
|
||||
iniset $TEMPEST_CONFIG validation network_for_ssh ${PRIVATE_NETWORK_NAME:-"private"}
|
||||
|
||||
# Run the Designate Tempest tests
|
||||
sudo BASE=$BASE ./run_tempest_tests.sh
|
||||
|
||||
# TODO(pglass) - update cli tests to look in the [auth] section for admin creds
|
||||
iniset $TEMPEST_CONFIG identity admin_username ${ADMIN_USERNAME:-"admin"}
|
||||
iniset $TEMPEST_CONFIG identity admin_password $ADMIN_PASSWORD
|
||||
iniset $TEMPEST_CONFIG identity admin_tenant_name $ADMIN_TENANT_NAME
|
||||
iniset $TEMPEST_CONFIG identity admin_domain_name ${ADMIN_DOMAIN_NAME:-"Default"}
|
||||
|
||||
# must match the dir where `openstack` is installed
|
||||
DESIGNATE_CLI_DIR=${DESIGNATE_CLI_DIR:-"$BASE/new/python-designateclient"}
|
||||
iniset $TEMPEST_CONFIG designateclient directory "$DESIGNATE_CLI_DIR/.venv/bin"
|
||||
|
||||
# Run the python-designateclient functional tests
|
||||
sudo BASE=$BASE ./run_cli_tests.sh
|
@ -1,28 +0,0 @@
|
||||
#!/bin/bash -e
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
DESIGNATE_CLI_DIR=${DESIGNATE_CLI_DIR:-"$BASE/new/python-designateclient"}
|
||||
TEMPEST_DIR=${TEMPEST_DIR:-"$BASE/new/tempest"}
|
||||
export TEMPEST_CONFIG=$TEMPEST_DIR/etc/tempest.conf
|
||||
|
||||
pushd $DESIGNATE_CLI_DIR
|
||||
|
||||
# we need the actual openstack executable which is not installed by tox
|
||||
virtualenv "$DESIGNATE_CLI_DIR/.venv"
|
||||
source "$DESIGNATE_CLI_DIR/.venv/bin/activate"
|
||||
pip install python-openstackclient
|
||||
pip install .
|
||||
|
||||
tox -e functional -- --concurrency 4
|
||||
popd
|
@ -1,32 +0,0 @@
|
||||
#!/bin/bash -e
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
# How many seconds to wait for the API to be responding before giving up
|
||||
API_RESPONDING_TIMEOUT=20
|
||||
|
||||
if ! timeout ${API_RESPONDING_TIMEOUT} sh -c "while ! curl -s http://127.0.0.1:9001/ 2>/dev/null | grep -q 'v2' ; do sleep 1; done"; then
|
||||
echo "The Designate API failed to respond within ${API_RESPONDING_TIMEOUT} seconds"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
echo "Successfully contacted the Designate API"
|
||||
|
||||
# Where Designate and Tempest code lives
|
||||
DESIGNATE_DIR=${DESIGNATE_DIR:-"$BASE/new/designate"}
|
||||
TEMPEST_DIR=${TEMPEST_DIR:-"$BASE/new/tempest"}
|
||||
|
||||
pushd $DESIGNATE_DIR
|
||||
export TEMPEST_CONFIG=$TEMPEST_DIR/etc/tempest.conf
|
||||
tox -e functional -- --concurrency 4
|
||||
popd
|
@ -1,664 +0,0 @@
|
||||
#!/usr/bin/env python
|
||||
# Copyright 2016 Hewlett Packard Enterprise Development Company LP
|
||||
#
|
||||
# Author: Federico Ceratto <federico.ceratto@hpe.com>
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
"""
|
||||
Network simulator
|
||||
~~~~~~~~~~~~~~~~~
|
||||
Perform end-to-end stress tests on Designate on a simulated network
|
||||
that displays high latency and packet loss (almost like real ones)
|
||||
|
||||
WARNING: this script is to be run on a disposable devstack VM
|
||||
It requires sudo and it will configure /sbin/tc
|
||||
|
||||
Usage:
|
||||
cd <designate_repo>/contrib/vagrant
|
||||
./setup_ubuntu_devstack
|
||||
vagrant ssh ubuntu
|
||||
source ~/devstack/openrc
|
||||
/opt/stack/designate/devstack/networking_test.py
|
||||
Monitor the logfiles
|
||||
"""
|
||||
|
||||
from argparse import ArgumentParser
|
||||
from collections import OrderedDict
|
||||
from itertools import product
|
||||
from subprocess import check_output
|
||||
from subprocess import CalledProcessError
|
||||
from tempfile import NamedTemporaryFile
|
||||
from threading import Thread
|
||||
import json
|
||||
import logging
|
||||
import os
|
||||
import random
|
||||
import string
|
||||
import time
|
||||
import sys
|
||||
|
||||
import dns
|
||||
import dns.resolver
|
||||
|
||||
log = logging.getLogger()
|
||||
|
||||
tc_path = '/sbin/tc'
|
||||
sudo_path = '/usr/bin/sudo'
|
||||
iptables_restore_path = '/sbin/iptables-restore'
|
||||
designate_cli_path = '/usr/local/bin/designate'
|
||||
openstack_cli = 'openstack'
|
||||
|
||||
|
||||
def gen_random_name(l):
|
||||
return "".join(
|
||||
random.choice(string.ascii_lowercase + string.digits)
|
||||
for n in range(l)
|
||||
)
|
||||
|
||||
|
||||
def parse_args():
|
||||
ap = ArgumentParser()
|
||||
ap.add_argument('-d', '--debug', action='store_true')
|
||||
return ap.parse_args()
|
||||
|
||||
|
||||
def run_shell(cmd, env=None):
|
||||
log.debug(" running %s" % cmd)
|
||||
out = check_output(cmd, env=env, shell=True, executable='/bin/bash')
|
||||
return [line.rstrip() for line in out.splitlines()]
|
||||
|
||||
|
||||
class DesignateCLI(object):
|
||||
"""Designate CLI runner
|
||||
"""
|
||||
|
||||
def __init__(self):
|
||||
"""Setup CLI handler"""
|
||||
self._cli_env = {}
|
||||
for k, v in sorted(os.environ.items()):
|
||||
if k.startswith('OS_'):
|
||||
log.debug("%s: %s", k, v)
|
||||
self._cli_env[k] = v
|
||||
|
||||
def setup_quota(self, quota):
|
||||
"""Setup quota
|
||||
"""
|
||||
user_id = self.run_json("token issue")["user_id"]
|
||||
|
||||
cmd = """quota-update
|
||||
--domains %(quota)d
|
||||
--domain-recordsets %(quota)d
|
||||
--recordset-records %(quota)d
|
||||
--domain-records %(quota)d
|
||||
%(user_id)s """
|
||||
cmd = ' '.join(cmd.split())
|
||||
quotas = self.run_designate_cli_table(cmd % dict(quota=quota,
|
||||
user_id=user_id))
|
||||
assert quotas['domain_records'] == str(quota)
|
||||
|
||||
def run(self, cmd):
|
||||
"""Run a openstack client command
|
||||
"""
|
||||
return run_shell("%s %s" % (openstack_cli, cmd),
|
||||
env=self._cli_env)
|
||||
|
||||
def run_json(self, cmd):
|
||||
"""Run a openstack client command using JSON output
|
||||
|
||||
:returns: dict
|
||||
:raises CalledProcessError:
|
||||
"""
|
||||
cmd = "%s %s -f json" % (openstack_cli, cmd)
|
||||
log.debug(" running %s" % cmd)
|
||||
out = check_output(cmd, env=self._cli_env, shell=True,
|
||||
executable='/bin/bash')
|
||||
return json.loads(out)
|
||||
|
||||
def runcsv(self, cmd):
|
||||
"""Run a command using the -f csv flag, parse the output
|
||||
and return a list of dicts
|
||||
"""
|
||||
cmdout = self.run(cmd + " -f csv")
|
||||
header = [item.strip('"') for item in cmdout[0].split(',')]
|
||||
output_rows = []
|
||||
for line in cmdout[1:]:
|
||||
rawvalues = line.split(',')
|
||||
d = OrderedDict()
|
||||
for k, v in zip(header, rawvalues):
|
||||
if v.startswith('"') or v.endswith('"'):
|
||||
v = v.strip('"')
|
||||
else:
|
||||
try:
|
||||
v = int(v)
|
||||
except ValueError:
|
||||
v = float(v)
|
||||
|
||||
d[k] = v
|
||||
|
||||
output_rows.append(d)
|
||||
|
||||
return output_rows
|
||||
|
||||
def run_designate_cli_table(self, cmd):
|
||||
"""Run a command in the designate cli expecting a table to be
|
||||
returned and parse it into a dict
|
||||
"""
|
||||
cmdout = run_shell("%s %s" % (designate_cli_path, cmd),
|
||||
env=self._cli_env)
|
||||
out = {}
|
||||
try:
|
||||
for line in cmdout:
|
||||
if not line.startswith('| '):
|
||||
continue
|
||||
if not line.endswith(' |'):
|
||||
continue
|
||||
k = line.split('|')[1].strip()
|
||||
v = line.split('|')[2].strip()
|
||||
out[k] = v
|
||||
except Exception:
|
||||
log.error("Unable to parse output into a dict:")
|
||||
for line in out:
|
||||
log.error(line)
|
||||
log.error("-----------------------------------")
|
||||
raise
|
||||
|
||||
return out
|
||||
|
||||
|
||||
class TrafficControl(object):
|
||||
"""Configure Linux Traffic Control to simulate a real network
|
||||
"""
|
||||
|
||||
protocol_marks = dict(
|
||||
mysql=1,
|
||||
dns_udp=2,
|
||||
dns_tcp=3,
|
||||
)
|
||||
|
||||
def run_tc(self, cmd):
|
||||
return run_shell("%s %s %s" % (sudo_path, tc_path, cmd))
|
||||
|
||||
def _apply_iptables_conf(self, ipt_conf):
|
||||
tf = NamedTemporaryFile()
|
||||
tf.file.write(ipt_conf)
|
||||
tf.file.flush()
|
||||
run_shell("%s %s %s" % (sudo_path, iptables_restore_path, tf.name))
|
||||
tf.file.close()
|
||||
|
||||
def cleanup_iptables_marking(self):
|
||||
# Currently unneeded
|
||||
ipt_conf = """
|
||||
*filter
|
||||
:INPUT ACCEPT [0:0]
|
||||
:FORWARD ACCEPT [0:0]
|
||||
:OUTPUT ACCEPT [0:0]
|
||||
COMMIT
|
||||
*mangle
|
||||
:PREROUTING ACCEPT [0:0]
|
||||
:INPUT ACCEPT [0:0]
|
||||
:FORWARD ACCEPT [0:0]
|
||||
:OUTPUT ACCEPT [0:0]
|
||||
:POSTROUTING ACCEPT [0:0]
|
||||
COMMIT
|
||||
"""
|
||||
self._apply_iptables_conf(ipt_conf)
|
||||
|
||||
def setup_iptables_marking(self):
|
||||
# Currently unneeded
|
||||
ipt_conf = """
|
||||
*filter
|
||||
:INPUT ACCEPT [0:0]
|
||||
:FORWARD ACCEPT [0:0]
|
||||
:OUTPUT ACCEPT [0:0]
|
||||
COMMIT
|
||||
*mangle
|
||||
:PREROUTING ACCEPT [0:0]
|
||||
:INPUT ACCEPT [0:0]
|
||||
:FORWARD ACCEPT [0:0]
|
||||
:OUTPUT ACCEPT [0:0]
|
||||
:POSTROUTING ACCEPT [0:0]
|
||||
-A PREROUTING -i lo -p tcp -m tcp --dport 3306 -j MARK --set-xmark %(mysql)s
|
||||
-A PREROUTING -i lo -p tcp -m tcp --sport 3306 -j MARK --set-xmark %(mysql)s
|
||||
-A PREROUTING -i lo -p tcp -m tcp --dport 53 -j MARK --set-xmark %(dns_tcp)s
|
||||
-A PREROUTING -i lo -p tcp -m tcp --sport 53 -j MARK --set-xmark %(dns_tcp)s
|
||||
-A PREROUTING -i lo -p udp -m udp --dport 53 -j MARK --set-xmark %(dns_udp)s
|
||||
-A PREROUTING -i lo -p udp -m udp --sport 53 -j MARK --set-xmark %(dns_udp)s
|
||||
COMMIT
|
||||
"""
|
||||
marks = dict((k, "0x%d/0xffffffff" % v)
|
||||
for k, v in self.protocol_marks.items())
|
||||
ipt_conf = ipt_conf % marks
|
||||
self._apply_iptables_conf(ipt_conf)
|
||||
|
||||
def cleanup_tc(self):
|
||||
"""Clean up tc conf
|
||||
"""
|
||||
out = self.run_tc('qdisc show dev lo')
|
||||
if out:
|
||||
log.debug("Cleaning up tc conf")
|
||||
self.run_tc('qdisc del dev lo root')
|
||||
else:
|
||||
log.debug("No tc conf to be cleaned up")
|
||||
|
||||
def setup_tc(self, dns_latency_ms=0, dns_packet_loss_perc=0,
|
||||
db_latency_ms=1, db_packet_loss_perc=1):
|
||||
"""Setup traffic control
|
||||
"""
|
||||
self.cleanup_tc()
|
||||
|
||||
# Create HTB at the root
|
||||
self.run_tc("qdisc add dev lo handle 1: root htb")
|
||||
|
||||
self.run_tc("class add dev lo parent 1: classid 1:5 htb rate 1000Mbps")
|
||||
self.run_tc("class add dev lo parent 1: classid 1:7 htb rate 1000Mbps")
|
||||
|
||||
# TCP DNS
|
||||
self._setup_tc_block('1:8', 'tcp', 53, dns_latency_ms,
|
||||
dns_packet_loss_perc)
|
||||
# UDP DNS
|
||||
self._setup_tc_block('1:9', 'udp', 53, dns_latency_ms,
|
||||
dns_packet_loss_perc)
|
||||
# TCP mDNS
|
||||
self._setup_tc_block('1:10', 'tcp', 5354, dns_latency_ms,
|
||||
dns_packet_loss_perc)
|
||||
# UDP mDNS
|
||||
self._setup_tc_block('1:11', 'udp', 5354, dns_latency_ms,
|
||||
dns_packet_loss_perc)
|
||||
# MySQL
|
||||
self._setup_tc_block('1:12', 'tcp', 3306, 1, 1)
|
||||
|
||||
# RabbitMQ port: 5672
|
||||
self._setup_tc_block('1:13', 'tcp', 5672, 1, 1)
|
||||
|
||||
# MemcacheD
|
||||
self._setup_tc_block('1:14', 'tcp', 11211, 1, 1)
|
||||
|
||||
def _setup_tc_block(self, class_id, proto, port, latency_ms,
|
||||
packet_loss_perc):
|
||||
"""Setup tc htb entry, netem and filter"""
|
||||
assert proto in ('tcp', 'udp')
|
||||
cmd = "class add dev lo parent 1: classid %s htb rate 1000Mbps" % \
|
||||
class_id
|
||||
self.run_tc(cmd)
|
||||
self._setup_netem(class_id, latency_ms, latency_ms, packet_loss_perc)
|
||||
self._setup_filter(proto, 'sport %d' % port, class_id)
|
||||
self._setup_filter(proto, 'dport %d' % port, class_id)
|
||||
|
||||
def _setup_netem(self, classid, latency1, latency2, loss_perc):
|
||||
"""Setup tc netem
|
||||
"""
|
||||
# This could be done with the FireQOS tool instead:
|
||||
# https://firehol.org/tutorial/fireqos-new-user/
|
||||
cmd = ("qdisc add dev lo parent {cid} netem"
|
||||
" corrupt 0.1%"
|
||||
" delay {lat1}ms {lat2}ms distribution normal"
|
||||
" duplicate 0.1%"
|
||||
" loss {packet_loss_perc}%"
|
||||
" reorder 25% 50%")
|
||||
cmd = cmd.format(cid=classid, lat1=latency1, lat2=latency2,
|
||||
packet_loss_perc=loss_perc)
|
||||
self.run_tc(cmd)
|
||||
|
||||
def _setup_filter(self, protocol, filter, flowid):
|
||||
"""Setup tc filter
|
||||
"""
|
||||
protocol_nums = dict(tcp=6, udp=17)
|
||||
pnum = protocol_nums[protocol]
|
||||
cmd = "filter add dev lo protocol ip prio 1 u32 match ip protocol " \
|
||||
"%(pnum)d 0xff match ip %(filter)s 0xffff flowid %(flowid)s"
|
||||
|
||||
self.run_tc(cmd % dict(pnum=pnum, filter=filter, flowid=flowid))
|
||||
|
||||
|
||||
class Digger(object):
|
||||
def __init__(self):
|
||||
self.ns_ipaddr = self.get_nameserver_ipaddr()
|
||||
self._setup_resolver()
|
||||
self.max_probes_per_second = 30
|
||||
self.reset_goals()
|
||||
|
||||
@property
|
||||
def prober_is_running(self):
|
||||
try:
|
||||
return self._prober_thread.is_alive()
|
||||
except AttributeError:
|
||||
return False
|
||||
|
||||
def _setup_resolver(self, timeout=1):
|
||||
resolver = dns.resolver.Resolver(configure=False)
|
||||
resolver.timeout = timeout
|
||||
resolver.lifetime = timeout
|
||||
resolver.nameservers = [self.ns_ipaddr]
|
||||
self.resolver = resolver
|
||||
|
||||
def get_nameserver_ipaddr(self):
|
||||
# FIXME: find a better way to do this
|
||||
out = run_shell('sudo netstat -nlpt | grep pdns_server')
|
||||
ipaddr = out[0].split()[3]
|
||||
ipaddr = ipaddr.split(':', 1)[0]
|
||||
log.debug("Resolver ipaddr: %s" % ipaddr)
|
||||
return ipaddr
|
||||
|
||||
def query_a_record(self, record_name, timeout=3):
|
||||
try:
|
||||
answer = self.resolver.query(record_name, 'A')
|
||||
if answer.rrset:
|
||||
return answer.rrset[0].address
|
||||
except Exception:
|
||||
return None
|
||||
|
||||
def query_soa(self, zone_name, timeout=3):
|
||||
try:
|
||||
soa_answer = self.resolver.query(zone_name, 'SOA')
|
||||
soa_serial = soa_answer[0].serial
|
||||
return soa_serial
|
||||
except Exception:
|
||||
return None
|
||||
|
||||
def reset_goals(self):
|
||||
assert not self.prober_is_running
|
||||
self.goals = set()
|
||||
self.summary = dict(
|
||||
success_cnt=0,
|
||||
total_time_to_success=0,
|
||||
)
|
||||
|
||||
def add_goal(self, goal):
|
||||
self.goals.add(goal + (time.time(), ))
|
||||
|
||||
def _print_summary(self, final=True):
|
||||
"""Log out a summary of the current run
|
||||
"""
|
||||
remaining = len(self.goals)
|
||||
success_cnt = self.summary['success_cnt']
|
||||
try:
|
||||
avg_t = (self.summary['total_time_to_success'] / success_cnt)
|
||||
avg_t = ", avg time to success: %2.3fs" % avg_t
|
||||
except ZeroDivisionError:
|
||||
avg_t = ''
|
||||
|
||||
logf = log.info if final else log.debug
|
||||
logf(" test summary: success %3d, remaining %3d %s" % (
|
||||
success_cnt, remaining, avg_t))
|
||||
|
||||
def _probe_resolver(self):
|
||||
"""Probe the local resolver, report achieved goals
|
||||
"""
|
||||
log.debug("Starting prober")
|
||||
assert self.prober_is_running is True
|
||||
self._progress_report_time = 0
|
||||
now = time.time()
|
||||
while (self.goals or not self.prober_can_stop) and \
|
||||
now < self.prober_timeout_time:
|
||||
|
||||
for goal in tuple(self.goals):
|
||||
goal_type = goal[0]
|
||||
if goal_type == 'zone_serial_ge':
|
||||
goal_type, zone_name, serial, t0 = goal
|
||||
actual_serial = self.query_soa(zone_name)
|
||||
if actual_serial and actual_serial >= serial:
|
||||
deltat = time.time() - t0
|
||||
log.debug(" reached %s in %.3fs" % (repr(goal),
|
||||
deltat))
|
||||
self.goals.discard(goal)
|
||||
self.summary['success_cnt'] += 1
|
||||
self.summary['total_time_to_success'] += deltat
|
||||
|
||||
elif goal_type == 'record_a':
|
||||
goal_type, record_name, ipaddr, t0 = goal
|
||||
actual_ipaddr = self.query_a_record(record_name)
|
||||
if actual_ipaddr == ipaddr:
|
||||
deltat = time.time() - t0
|
||||
log.debug(" reached %s in %.3fs" % (repr(goal),
|
||||
deltat))
|
||||
self.goals.discard(goal)
|
||||
self.summary['success_cnt'] += 1
|
||||
self.summary['total_time_to_success'] += deltat
|
||||
|
||||
else:
|
||||
log.error("Unknown goal %r" % goal)
|
||||
|
||||
if time.time() < self.prober_timeout_time:
|
||||
time.sleep(1.0 / self.max_probes_per_second)
|
||||
else:
|
||||
break
|
||||
|
||||
if time.time() > self._progress_report_time:
|
||||
self._print_summary(final=False)
|
||||
self._progress_report_time = time.time() + 10
|
||||
|
||||
time.sleep(1.0 / self.max_probes_per_second)
|
||||
now = time.time()
|
||||
|
||||
if now > self.prober_timeout_time:
|
||||
log.info("prober timed out after %d s" % (
|
||||
now - self.prober_start_time))
|
||||
|
||||
self._print_summary()
|
||||
|
||||
def probe_resolver(self, timeout=600):
|
||||
"""Probe the local resolver in a dedicated thread until all
|
||||
goals have been achieved or timeout occours
|
||||
"""
|
||||
assert not self.prober_is_running
|
||||
self.prober_can_stop = False
|
||||
self.prober_start_time = time.time()
|
||||
self.prober_timeout_time = self.prober_start_time + timeout
|
||||
self._prober_thread = Thread(target=self._probe_resolver)
|
||||
self._prober_thread.daemon = True
|
||||
self._prober_thread.start()
|
||||
|
||||
def stop_prober(self):
|
||||
self.prober_can_stop = True
|
||||
self.prober_timeout_time = 0
|
||||
|
||||
def wait_on_prober(self):
|
||||
self.prober_can_stop = True
|
||||
self._prober_thread.join()
|
||||
assert self.prober_is_running is False
|
||||
|
||||
|
||||
def list_zones(cli):
|
||||
zones = [z["name"] for z in cli.run_json('zone list')]
|
||||
log.debug("Found zones: %r", zones)
|
||||
return zones
|
||||
|
||||
|
||||
def delete_zone_by_name(cli, zn, ignore_missing=False):
|
||||
if ignore_missing:
|
||||
# Return if the zone is not present
|
||||
zones = list_zones(cli)
|
||||
if zn not in zones:
|
||||
return
|
||||
|
||||
cli.run('zone delete %s' % zn)
|
||||
|
||||
|
||||
def create_and_probe_a_record(cli, digger, zone_id, record_name, ipaddr):
|
||||
cli.run_json('recordset create %s %s --type A --records %s' %
|
||||
(zone_id, record_name, ipaddr))
|
||||
digger.add_goal(('record_a', record_name, ipaddr))
|
||||
|
||||
|
||||
def delete_all_zones(cli):
|
||||
zones = list_zones(cli)
|
||||
log.info("%d zones to be deleted" % len(zones))
|
||||
for zone in zones:
|
||||
log.info("Deleting %s", zone)
|
||||
delete_zone_by_name(cli, zone)
|
||||
|
||||
|
||||
def create_zone_with_retry_on_duplicate(cli, digger, zn, timeout=300,
|
||||
dig=False):
|
||||
"""Create a zone, retry when a duplicate is found,
|
||||
optionally monitor for propagation
|
||||
|
||||
:returns: dict
|
||||
"""
|
||||
t0 = time.time()
|
||||
timeout_time = timeout + t0
|
||||
created = False
|
||||
while time.time() < timeout_time:
|
||||
try:
|
||||
output = cli.run_json(
|
||||
"zone create %s --email devstack@example.org" % zn)
|
||||
created = True
|
||||
log.debug(" zone created after %f" % (time.time() - t0))
|
||||
break
|
||||
|
||||
except CalledProcessError as e:
|
||||
if e.output == 'Duplicate Zone':
|
||||
# dup zone, sleep and retry
|
||||
time.sleep(1)
|
||||
pass
|
||||
|
||||
elif e.output == 'over_quota':
|
||||
raise RuntimeError('over_quota')
|
||||
|
||||
else:
|
||||
raise
|
||||
|
||||
assert output['serial']
|
||||
|
||||
if not created:
|
||||
raise RuntimeError('timeout')
|
||||
|
||||
if dig:
|
||||
digger.reset_goals()
|
||||
digger.add_goal(('zone_serial_ge', zn, int(output['serial'])))
|
||||
digger.probe_resolver(timeout=timeout)
|
||||
digger.wait_on_prober()
|
||||
|
||||
return output
|
||||
|
||||
|
||||
def test_create_list_delete_loop(cli, digger, cycles_num, zn='cld.org.'):
|
||||
"""Create, list, delete a zone in a loop
|
||||
Monitor for propagation time
|
||||
"""
|
||||
log.info("Test zone creation, list, deletion")
|
||||
delete_zone_by_name(cli, zn, ignore_missing=True)
|
||||
|
||||
for cycle_cnt in range(cycles_num):
|
||||
zone = create_zone_with_retry_on_duplicate(cli, digger, zn, dig=True)
|
||||
|
||||
zones = cli.runcsv('domain-list')
|
||||
assert any(z['name'] == zn for z in zones), zones
|
||||
|
||||
cli.run('domain-delete %s' % zone['id'])
|
||||
|
||||
zones = cli.runcsv('domain-list')
|
||||
assert not any(z['name'] == zn for z in zones), zones
|
||||
|
||||
log.info("done")
|
||||
|
||||
|
||||
def test_one_big_zone(cli, digger, zone_size):
|
||||
"""Create a zone with many records,
|
||||
perform CRUD on records and monitor for propagation time
|
||||
"""
|
||||
t0 = time.time()
|
||||
zn = 'bigzone-%s.org.' % gen_random_name(12)
|
||||
delete_zone_by_name(cli, zn, ignore_missing=True)
|
||||
zone = create_zone_with_retry_on_duplicate(cli, digger, zn, dig=True)
|
||||
assert 'serial' in zone, zone
|
||||
assert 'id' in zone, zone
|
||||
try:
|
||||
digger.reset_goals()
|
||||
digger.add_goal(('zone_serial_ge', zn, int(zone['serial'])))
|
||||
digger.probe_resolver(timeout=60)
|
||||
|
||||
record_creation_threads = []
|
||||
for record_num in range(zone_size):
|
||||
record_name = "rec%d" % record_num
|
||||
ipaddr = "127.%d.%d.%d" % (
|
||||
(record_num >> 16) % 256,
|
||||
(record_num >> 8) % 256,
|
||||
record_num % 256,
|
||||
)
|
||||
t = Thread(target=create_and_probe_a_record,
|
||||
args=(cli, digger, zone['id'], record_name, ipaddr))
|
||||
t.start()
|
||||
record_creation_threads.append(t)
|
||||
time.sleep(.5)
|
||||
|
||||
digger.wait_on_prober()
|
||||
|
||||
except KeyboardInterrupt:
|
||||
log.info("Exiting on keyboard")
|
||||
raise
|
||||
|
||||
finally:
|
||||
digger.stop_prober()
|
||||
delete_zone_by_name(cli, zone['name'])
|
||||
log.info("Done in %ds" % (time.time() - t0))
|
||||
|
||||
|
||||
def test_servers_are_configured(cli):
|
||||
servers = cli.runcsv('server-list')
|
||||
assert servers[0]['name'] == 'ns1.devstack.org.'
|
||||
log.info("done")
|
||||
|
||||
|
||||
def test_big_zone(args, cli, digger, tc):
|
||||
log.info("Test creating many records in one big zone")
|
||||
|
||||
dns_latencies_ms = (1, 100)
|
||||
dns_packet_losses = (1, 15)
|
||||
zone_size = 20
|
||||
|
||||
for dns_latency_ms, dns_packet_loss_perc in product(dns_latencies_ms,
|
||||
dns_packet_losses):
|
||||
tc.cleanup_tc()
|
||||
tc.setup_tc(dns_latency_ms=dns_latency_ms,
|
||||
dns_packet_loss_perc=dns_packet_loss_perc)
|
||||
log.info("Running test with DNS latency %dms packet loss %d%%" % (
|
||||
dns_latency_ms, dns_packet_loss_perc))
|
||||
test_one_big_zone(cli, digger, zone_size)
|
||||
|
||||
|
||||
def run_tests(args, cli, digger, tc):
|
||||
"""Run all integration tests
|
||||
"""
|
||||
# test_servers_are_configured(cli)
|
||||
# test_create_list_delete_loop(cli, digger, 10)
|
||||
test_big_zone(args, cli, digger, tc)
|
||||
|
||||
|
||||
def main():
|
||||
args = parse_args()
|
||||
loglevel = logging.DEBUG if args.debug else logging.INFO
|
||||
logging.basicConfig(
|
||||
level=loglevel,
|
||||
format='%(relativeCreated)8d %(levelname)s %(funcName)20s %(message)s',
|
||||
)
|
||||
|
||||
cli = DesignateCLI()
|
||||
cli.setup_quota(10000)
|
||||
|
||||
digger = Digger()
|
||||
|
||||
delete_all_zones(cli)
|
||||
|
||||
tc = TrafficControl()
|
||||
tc.cleanup_tc()
|
||||
|
||||
try:
|
||||
run_tests(args, cli, digger, tc)
|
||||
finally:
|
||||
tc.cleanup_tc()
|
||||
|
||||
|
||||
if __name__ == '__main__':
|
||||
sys.exit(main())
|
@ -1,3 +0,0 @@
|
||||
#!/bin/bash
|
||||
IF=lo
|
||||
watch -n1 "tc -p -s -d qdisc show dev $IF; echo; tc class show dev $IF; echo; tc filter show dev $IF"
|
@ -1,61 +0,0 @@
|
||||
#!/usr/bin/env python
|
||||
# Copyright 2016 Hewlett Packard Enterprise Development Company LP
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
"""
|
||||
A simple mock UDP server to receive monasca-statsd traffic
|
||||
Log to stdout or to a file.
|
||||
"""
|
||||
|
||||
from argparse import ArgumentParser
|
||||
import sys
|
||||
from time import gmtime
|
||||
from time import strftime
|
||||
import SocketServer
|
||||
|
||||
|
||||
def parse_args():
|
||||
ap = ArgumentParser()
|
||||
ap.add_argument('--addr', default='127.0.0.1',
|
||||
help='Listen IP addr (default: 127.0.0.1)')
|
||||
ap.add_argument('--port', default=8125, type=int,
|
||||
help='UDP port (default: 8125)')
|
||||
ap.add_argument('--output-fname', default=None,
|
||||
help='Output file (default: stdout)')
|
||||
return ap.parse_args()
|
||||
|
||||
|
||||
class StatsdMessageHandler(SocketServer.BaseRequestHandler):
|
||||
|
||||
def handle(self):
|
||||
data = self.request[0].strip()
|
||||
tstamp = strftime("%Y-%m-%dT%H:%M:%S", gmtime())
|
||||
if self._output_fd:
|
||||
self._output_fd.write("%s %s\n" % (tstamp, data))
|
||||
else:
|
||||
print("%s %s" % (tstamp, data))
|
||||
|
||||
|
||||
def main():
|
||||
args = parse_args()
|
||||
fd = open(args.output_fname, 'a') if args.output_fname else None
|
||||
StatsdMessageHandler._output_fd = fd
|
||||
server = SocketServer.UDPServer(
|
||||
(args.addr, args.port),
|
||||
StatsdMessageHandler,
|
||||
)
|
||||
server.serve_forever()
|
||||
|
||||
if __name__ == "__main__":
|
||||
sys.exit(main())
|
@ -1,195 +0,0 @@
|
||||
#!/bin/bash
|
||||
|
||||
set -o errexit
|
||||
|
||||
source $GRENADE_DIR/grenaderc
|
||||
source $GRENADE_DIR/functions
|
||||
|
||||
source $TOP_DIR/openrc admin admin
|
||||
source $TOP_DIR/stackrc
|
||||
|
||||
set -o xtrace
|
||||
|
||||
DESIGNATE_PROJECT=designate_grenade
|
||||
DESIGNATE_USER=designate_grenade
|
||||
DESIGNATE_PASS=designate_grenade
|
||||
DESIGNATE_ZONE_NAME=example.com.
|
||||
DESIGNATE_ZONE_EMAIL=hostmaster@example.com
|
||||
DESIGNATE_RRSET_NAME=www.example.com.
|
||||
DESIGNATE_RRSET_TYPE=A
|
||||
DESIGNATE_RRSET_RECORD=10.0.0.1
|
||||
# used with dig to look up in DNS
|
||||
DIG_FLAGS="-p $DESIGNATE_SERVICE_PORT_DNS @$SERVICE_HOST"
|
||||
DIG_TIMEOUT=30
|
||||
|
||||
function _set_designate_user {
|
||||
OS_TENANT_NAME=$DESIGNATE_PROJECT
|
||||
OS_PROJECT_NAME=$DESIGNATE_PROJECT
|
||||
OS_USERNAME=$DESIGNATE_USER
|
||||
OS_PASSWORD=$DESIGNATE_PASS
|
||||
}
|
||||
|
||||
function _ensure_recordset_present {
|
||||
local record_name=$1
|
||||
local record_type=$2
|
||||
local record_value=$3
|
||||
|
||||
if [ "$DESIGNATE_BACKEND_DRIVER" = "fake" ] ; then
|
||||
# if the backend is fake, there will be no actual DNS records
|
||||
return 0
|
||||
fi
|
||||
|
||||
if ! timeout $DIG_TIMEOUT sh -c "while ! dig +short $DIG_FLAGS $record_name $record_type | grep \"$record_value\"; do sleep 1; done"; then
|
||||
die $LINENO "Error: record $record_name ($record_type) not found in DNS"
|
||||
fi
|
||||
|
||||
# Display for debugging
|
||||
dig $DIG_FLAGS $record_name $record_type
|
||||
|
||||
return 0
|
||||
}
|
||||
|
||||
function create {
|
||||
|
||||
# create a tenant for the server
|
||||
eval $(openstack project create -f shell -c id $DESIGNATE_PROJECT)
|
||||
if [[ -z "$id" ]]; then
|
||||
die $LINENO "Didn't create $DESIGNATE_PROJECT project"
|
||||
fi
|
||||
resource_save designate project_id $id
|
||||
local project_id=$id
|
||||
|
||||
# create the user, and set $id locally
|
||||
eval $(openstack user create $DESIGNATE_USER \
|
||||
--project $project_id \
|
||||
--password $DESIGNATE_PASS \
|
||||
-f shell -c id)
|
||||
if [[ -z "$id" ]]; then
|
||||
die $LINENO "Didn't create $DESIGNATE_USER user"
|
||||
fi
|
||||
resource_save designate user_id $id
|
||||
|
||||
# BUG(sdague): this really shouldn't be required, in Keystone v2 a
|
||||
# user created in a project was assigned to that project, in v3 it
|
||||
# is not - https://bugs.launchpad.net/keystone/+bug/1662911
|
||||
openstack role add Member --user $id --project $project_id
|
||||
|
||||
_set_designate_user
|
||||
|
||||
# Create a zone, and save the id
|
||||
|
||||
eval $(openstack zone create --email $DESIGNATE_ZONE_EMAIL \
|
||||
$DESIGNATE_ZONE_NAME \
|
||||
-f shell -c id)
|
||||
|
||||
|
||||
resource_save designate zone_id $id
|
||||
|
||||
eval $(openstack recordset create --records $DESIGNATE_RRSET_RECORD \
|
||||
--type $DESIGNATE_RRSET_TYPE \
|
||||
$DESIGNATE_ZONE_NAME \
|
||||
$DESIGNATE_RRSET_NAME \
|
||||
-f shell -c id)
|
||||
|
||||
resource_save designate rrset_id $id
|
||||
|
||||
# wait until rrset moves to active state
|
||||
local timeleft=1000
|
||||
while [[ $timeleft -gt 0 ]]; do
|
||||
local status
|
||||
eval $(openstack recordset show $DESIGNATE_ZONE_NAME \
|
||||
$DESIGNATE_RRSET_NAME \
|
||||
-f shell -c status)
|
||||
|
||||
if [[ "$status" != "ACTIVE" ]]; then
|
||||
if [[ "$cluster_state" == "Error" ]]; then
|
||||
die $LINENO "Zone is in Error state"
|
||||
fi
|
||||
echo "Zone is still not in Active state"
|
||||
sleep 10
|
||||
timeleft=$((timeleft - 10))
|
||||
if [[ $timeleft == 0 ]]; then
|
||||
die $LINENO "Zone hasn't moved to Active state \
|
||||
during 1000 seconds"
|
||||
fi
|
||||
else
|
||||
break
|
||||
fi
|
||||
done
|
||||
|
||||
}
|
||||
|
||||
function verify {
|
||||
_set_designate_user
|
||||
# check that cluster is in Active state
|
||||
local zone_id
|
||||
zone_id=$(resource_get designate zone_id)
|
||||
|
||||
local rrset_id
|
||||
rrset_id=$(resource_get designate rrset_id)
|
||||
|
||||
eval $(openstack zone show $zone_id -f shell -c status)
|
||||
echo -n $status
|
||||
if [[ "$status" != "ACTIVE" ]]; then
|
||||
die $LINENO "Zone is not in Active state anymore"
|
||||
fi
|
||||
|
||||
eval $(openstack recordset show $zone_id $rrset_id -f shell -c status)
|
||||
echo -n $status
|
||||
if [[ "$status" != "ACTIVE" ]]; then
|
||||
die $LINENO "Recordset is not in Active state anymore"
|
||||
fi
|
||||
|
||||
echo "Designate verification: SUCCESS"
|
||||
}
|
||||
|
||||
function verify_noapi {
|
||||
_ensure_recordset_present $DESIGNATE_RRSET_NAME $DESIGNATE_RRSET_TYPE $DESIGNATE_RRSET_RECORD
|
||||
}
|
||||
|
||||
function destroy {
|
||||
_set_designate_user
|
||||
set +o errexit
|
||||
|
||||
# delete cluster
|
||||
local cluster_id
|
||||
zone_id=$(resource_get designate zone_id)
|
||||
openstack zone delete $zone_id > /dev/null
|
||||
# wait for cluster deletion
|
||||
local timeleft=500
|
||||
while [[ $timeleft -gt 0 ]]; do
|
||||
openstack zone show $zone_id > /dev/null
|
||||
local rc=$?
|
||||
|
||||
if [[ "$rc" != 1 ]]; then
|
||||
echo "Zone still exists"
|
||||
sleep 5
|
||||
timeleft=$((timeleft - 5))
|
||||
if [[ $timeleft == 0 ]]; then
|
||||
die $LINENO "Zone hasn't been deleted during 500 seconds"
|
||||
fi
|
||||
else
|
||||
break
|
||||
fi
|
||||
done
|
||||
}
|
||||
|
||||
# Dispatcher
|
||||
case $1 in
|
||||
"create")
|
||||
create
|
||||
;;
|
||||
"verify_noapi")
|
||||
verify_noapi
|
||||
;;
|
||||
"verify")
|
||||
verify
|
||||
;;
|
||||
"destroy")
|
||||
destroy
|
||||
;;
|
||||
"force_destroy")
|
||||
set +o errexit
|
||||
destroy
|
||||
;;
|
||||
esac
|
@ -1,11 +0,0 @@
|
||||
register_project_for_upgrade designate
|
||||
register_db_to_save designate
|
||||
|
||||
devstack_localrc base enable_plugin designate https://git.openstack.org/openstack/designate
|
||||
devstack_localrc target enable_plugin designate https://git.openstack.org/openstack/designate
|
||||
|
||||
devstack_localrc base enable_service designate-api designate-central designate-producer designate-worker designate-mdns designate-agent designate-sink designate horizon
|
||||
devstack_localrc target enable_service designate-api designate-central designate-producer designate-worker designate-mdns designate-agent designate-sink designate horizon
|
||||
|
||||
BASE_RUN_SMOKE=False
|
||||
TARGET_RUN_SMOKE=False
|
@ -1,38 +0,0 @@
|
||||
#!/bin/bash
|
||||
|
||||
# ``shutdown-designate``
|
||||
|
||||
set -o errexit
|
||||
|
||||
source $GRENADE_DIR/grenaderc
|
||||
source $GRENADE_DIR/functions
|
||||
|
||||
# We need base DevStack functions for this
|
||||
source $BASE_DEVSTACK_DIR/functions
|
||||
source $BASE_DEVSTACK_DIR/stackrc # needed for status directory
|
||||
|
||||
source $BASE_DEVSTACK_DIR/lib/tls
|
||||
source ${GITDIR[designate]}/devstack/plugin.sh
|
||||
|
||||
set -o xtrace
|
||||
|
||||
stop_process designate-central
|
||||
stop_process designate-api
|
||||
stop_process designate-mdns
|
||||
stop_process designate-agent
|
||||
stop_process designate-sink
|
||||
if is_service_enabled designate-worker; then
|
||||
stop_process designate-worker
|
||||
stop_process designate-producer
|
||||
else
|
||||
stop_process designate-pool-manager
|
||||
stop_process designate-zone-manager
|
||||
fi
|
||||
|
||||
# sanity check that service is actually down
|
||||
ensure_services_stopped designate-api designate-central designate-mdns designate-agent designate-sink
|
||||
if is_service_enabled designate-worker; then
|
||||
ensure_services_stopped designate-worker designate-producer
|
||||
else
|
||||
ensure_services_stopped designate-pool-manager designate-zone-manager
|
||||
fi
|
@ -1,96 +0,0 @@
|
||||
#!/usr/bin/env bash
|
||||
|
||||
# ``upgrade-designate``
|
||||
|
||||
echo "*********************************************************************"
|
||||
echo "Begin $0"
|
||||
echo "*********************************************************************"
|
||||
|
||||
# Clean up any resources that may be in use
|
||||
cleanup() {
|
||||
set +o errexit
|
||||
|
||||
echo "********************************************************************"
|
||||
echo "ERROR: Abort $0"
|
||||
echo "********************************************************************"
|
||||
|
||||
# Kill ourselves to signal any calling process
|
||||
trap 2; kill -2 $$
|
||||
}
|
||||
|
||||
trap cleanup SIGHUP SIGINT SIGTERM
|
||||
|
||||
# Keep track of the grenade directory
|
||||
RUN_DIR=$(cd $(dirname "$0") && pwd)
|
||||
|
||||
# Source params
|
||||
source $GRENADE_DIR/grenaderc
|
||||
|
||||
# Import common functions
|
||||
source $GRENADE_DIR/functions
|
||||
|
||||
# This script exits on an error so that errors don't compound and you see
|
||||
# only the first error that occurred.
|
||||
set -o errexit
|
||||
|
||||
# Upgrade designate
|
||||
# ============
|
||||
|
||||
# Get functions from current DevStack
|
||||
source $TARGET_DEVSTACK_DIR/stackrc
|
||||
source $TARGET_DEVSTACK_DIR/lib/tls
|
||||
source $(dirname $(dirname $BASH_SOURCE))/plugin.sh
|
||||
source $(dirname $(dirname $BASH_SOURCE))/settings
|
||||
|
||||
# Print the commands being run so that we can see the command that triggers
|
||||
# an error. It is also useful for following allowing as the install occurs.
|
||||
set -o xtrace
|
||||
|
||||
# Save current config files for posterity
|
||||
[[ -d $SAVE_DIR/etc.designate ]] || cp -pr $DESIGNATE_CONF_DIR $SAVE_DIR/etc.designate
|
||||
|
||||
# install_designate()
|
||||
if is_ubuntu; then
|
||||
install_package libcap2-bin
|
||||
elif is_fedora; then
|
||||
# bind-utils package provides `dig`
|
||||
install_package libcap bind-utils
|
||||
fi
|
||||
|
||||
git_clone $DESIGNATE_REPO $DESIGNATE_DIR $DESIGNATE_BRANCH
|
||||
setup_develop $DESIGNATE_DIR
|
||||
|
||||
install_designateclient
|
||||
|
||||
# calls upgrade-designate for specific release
|
||||
upgrade_project designate $RUN_DIR $BASE_DEVSTACK_BRANCH $TARGET_DEVSTACK_BRANCH
|
||||
|
||||
# Migrate the database
|
||||
$DESIGNATE_BIN_DIR/designate-manage --config-file $DESIGNATE_CONF \
|
||||
database sync || die $LINENO "DB sync error"
|
||||
|
||||
# Start designate
|
||||
run_process designate-central "$DESIGNATE_BIN_DIR/designate-central --config-file $DESIGNATE_CONF"
|
||||
run_process designate-api "$DESIGNATE_BIN_DIR/designate-api --config-file $DESIGNATE_CONF"
|
||||
run_process designate-producer "$DESIGNATE_BIN_DIR/designate-producer --config-file $DESIGNATE_CONF"
|
||||
run_process designate-worker "$DESIGNATE_BIN_DIR/designate-worker --config-file $DESIGNATE_CONF"
|
||||
run_process designate-mdns "$DESIGNATE_BIN_DIR/designate-mdns --config-file $DESIGNATE_CONF"
|
||||
run_process designate-agent "$DESIGNATE_BIN_DIR/designate-agent --config-file $DESIGNATE_CONF"
|
||||
run_process designate-sink "$DESIGNATE_BIN_DIR/designate-sink --config-file $DESIGNATE_CONF"
|
||||
|
||||
# Start proxies if enabled
|
||||
if is_service_enabled designate-api && is_service_enabled tls-proxy; then
|
||||
start_tls_proxy '*' $DESIGNATE_SERVICE_PORT $DESIGNATE_SERVICE_HOST $DESIGNATE_SERVICE_PORT_INT &
|
||||
fi
|
||||
|
||||
if ! timeout $SERVICE_TIMEOUT sh -c "while ! wget --no-proxy -q -O- $DESIGNATE_SERVICE_PROTOCOL://$DESIGNATE_SERVICE_HOST:$DESIGNATE_SERVICE_PORT; do sleep 1; done"; then
|
||||
die $LINENO "Designate did not start"
|
||||
fi
|
||||
|
||||
# Don't succeed unless the service come up
|
||||
ensure_services_started designate-api designate-central designate-producer designate-worker designate-mdns designate-agent designate-sink
|
||||
|
||||
set +o xtrace
|
||||
echo "*********************************************************************"
|
||||
echo "SUCCESS: End $0"
|
||||
echo "*********************************************************************"
|
Loading…
Reference in New Issue
Block a user