Files
whitebox-neutron-tempest-pl…/whitebox_neutron_tempest_plugin/tests/scenario/test_l3ha_ovn.py
Maor Blaustein ea0e811aa9 Actively check type instead of WB_CONF.openstack_type
Plugin was built extensively around podified/devstack setups, maybe more
types in the future.
It isn't likely to be changed any time soon, such change will require
adding code into plenty of conditions spread around plugin.

We can replace manually maintained configuration with automated check
to reduce CI maintenance upstream/downstream.

As documented for devstack [1] home directory can optionally be
`/opt/stack`, for this plugin's devstack jobs it is commonly used,
check should work to tell the difference.

[1] https://docs.openstack.org/devstack/latest/

Related-Bug: #OSPRH-16056
Related-Bug: #OSPRH-15819
Change-Id: I2d3f807b07e5eb810b87320e31cf64ad72f2f2a9
2025-05-06 23:37:08 +03:00

313 lines
14 KiB
Python

# Copyright 2024 Red Hat, Inc.
# All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
import testtools
from neutron_lib import constants as lib_constants
from neutron_tempest_plugin.common import ssh
from neutron_tempest_plugin.common import utils as common_utils
from oslo_log import log
from tempest import config
from tempest.lib.common.utils import data_utils
from tempest.lib.common.utils import test_utils
from tempest.lib import decorators
from tempest.lib import exceptions
from whitebox_neutron_tempest_plugin.common import constants
from whitebox_neutron_tempest_plugin.common import utils
from whitebox_neutron_tempest_plugin.tests.scenario import base
CONF = config.CONF
WB_CONF = config.CONF.whitebox_neutron_plugin_options
LOG = log.getLogger(__name__)
class L3haOvnCommon(base.TrafficFlowTest, base.BaseTempestTestCaseOvn):
credentials = ['primary', 'admin']
@classmethod
def resource_setup(cls):
super(L3haOvnCommon, cls).resource_setup()
cls.setup_api_microversion_fixture(
compute_microversion='2.74')
def verify_routing_via_chassis(self, chassis_id):
self.expected_gateway_chassis = None
def _get_router_gateway_chassis_by_id(chassis_id):
try:
self.expected_gateway_chassis = \
self.get_router_gateway_chassis_by_id(chassis_id)
except exceptions.SSHExecCommandFailed as err:
LOG.exception(err)
LOG.warning("Retrying to obtain router gateway chassis in "
"case the OVN DBs are not ready yet")
return False
return True
common_utils.wait_until_true(
lambda: _get_router_gateway_chassis_by_id(chassis_id),
timeout=60, sleep=5)
LOG.debug("Waiting until router gateway chassis is updated")
self.router_gateway_chassis = None
def _router_gateway_chassis_updated():
self.router_gateway_chassis = self.get_router_gateway_chassis(
self.router_port['id'])
LOG.debug("chassis = '%s', expected = %s ",
self.router_gateway_chassis,
self.expected_gateway_chassis)
return self.router_gateway_chassis == self.expected_gateway_chassis
try:
common_utils.wait_until_true(
lambda: _router_gateway_chassis_updated(),
timeout=60, sleep=5)
except common_utils.WaitTimeout:
self.fail("Gateway chassis was not updated as expected")
self.check_north_south_icmp_flow(
dst_ip=self.gateway_external_ip,
expected_routing_nodes=[self.expected_gateway_chassis],
expected_mac=self.router_port['mac_address'],
ssh_client=self.test_server_client,
ignore_outbound=self.ignore_outbound)
def _validate_gateway_chassis(self, chassis_id):
node_name = self.get_router_gateway_chassis_by_id(chassis_id)
if self.get_node_setting(node_name, 'is_controller'):
raise self.skipException(
"The test currently does not support the required action "
"when gateway chassis is on controller.")
def _setup(self):
def create_router_candidate():
router = self.create_router_by_client()
self.router_port = self.os_admin.network_client.list_ports(
device_id=router['id'],
device_owner=lib_constants.DEVICE_OWNER_ROUTER_GW)['ports'][0]
self.chassis_list = self.get_router_gateway_chassis_list(
self.router_port['id'])
chassis_name = self.get_router_gateway_chassis_by_id(
self.chassis_list[0])
LOG.debug("router chassis name = %s", chassis_name)
return router, chassis_name
if (WB_CONF.avoid_disrupting_controllers and
self.get_standalone_networkers()):
attempts = 5
controller_nodes = [node['name'] for node in self.nodes
if node['is_controller']]
for i in range(1, attempts):
LOG.debug("Router creation attempt %s", i)
router, chassis_name = create_router_candidate()
if chassis_name in controller_nodes:
continue
else:
break
else:
router, chassis_name = create_router_candidate()
self._validate_gateway_chassis(self.chassis_list[0])
# Since we are going to spawn VMs with 'host' option which
# is available only for admin user, we create security group
# and keypair also as admin
secgroup = self.os_admin.network_client.create_security_group(
name=data_utils.rand_name('secgroup'))
self.security_groups.append(secgroup['security_group'])
self.os_admin.network_client.create_security_group_rule(
security_group_id=secgroup['security_group']['id'],
protocol=lib_constants.PROTO_NAME_ICMP,
direction=lib_constants.INGRESS_DIRECTION)
self.os_admin.network_client.create_security_group_rule(
security_group_id=secgroup['security_group']['id'],
protocol=lib_constants.PROTO_NAME_TCP,
direction=lib_constants.INGRESS_DIRECTION,
port_range_min=22,
port_range_max=22)
self.addCleanup(
test_utils.call_and_ignore_notfound_exc,
self.os_admin.network_client.delete_security_group,
secgroup['security_group']['id'])
self.keypair = self.os_admin.keypairs_client.create_keypair(
name=data_utils.rand_name('keypair'))['keypair']
self.network = self.create_network()
self.subnet = self.create_subnet(self.network)
self.create_router_interface(router['id'], self.subnet['id'])
# We create VMs on compute hosts that are not on the same host
# as router gateway port, i.e. the test is capable to work even
# on environments that schedule ovn routers on compute nodes
self.exclude_hosts = [chassis_name]
ssh_proxy_server = self._create_server(
exclude_hosts=self.exclude_hosts)
test_server = self._create_server(exclude_hosts=self.exclude_hosts,
create_floating_ip=False)
self.ssh_proxy_server_client = ssh.Client(
ssh_proxy_server['fip']['floating_ip_address'],
CONF.validation.image_ssh_user,
pkey=self.keypair['private_key'])
test_server_ip = test_server['port']['fixed_ips'][0]['ip_address']
self.test_server_client = ssh.Client(
test_server_ip,
CONF.validation.image_ssh_user,
pkey=self.keypair['private_key'],
proxy_client=self.ssh_proxy_server_client)
network_details = self.os_admin.network_client.show_network(
self.network['id'])
if network_details['network']['provider:network_type'] == 'vlan':
# This helps to avoid false positives with vlan+dvr,see BZ2192633
self.ignore_outbound = True
else:
self.ignore_outbound = False
self.verify_routing_via_chassis(self.chassis_list[0])
def refresh_nodes_data(self):
self.discover_nodes()
if not self.is_devstack:
self.set_ovs_pods_for_nodes()
@testtools.skipUnless(WB_CONF.run_power_operations_tests,
"run_power_operations_tests conf value is not "
"enabled.")
class L3haOvnDisruptiveTest(L3haOvnCommon, base.BaseDisruptiveTempestTestCase):
@decorators.idempotent_id('cf47a5e3-35cb-423c-84af-4cc6d389cfbd')
@decorators.attr(type='slow')
def test_l3ha_reboot_node(self):
"""Check that traffic from a VM connected to an internal network
passes through a networker node node which is the highest priority
chassis for a router the internal network is connected to.
The test is intended for OVN environments.
Topology: Any topology with at least 2 nodes acting as networker nodes
(controller nodes with networking services also valid) and at least
one compute node.
Scenario:
1. Create network, subnet, router, pingable and loginable security
group rules, keypair, run a VM instance (server).
2. Find which node is the highest priority chassis for the router.
3. Ping an external address from the VM and make sure that traffic
is passing through the interface connected to the external network
on the highest priority chassis.
4. Shutdown the node where the higher priority chassis was scheduled
and repeat steps 2-3. Make sure that now traffic is passing through
the other node(chassis).
5. Start up the turned off host, wait until it is up and repeat steps
2-3. Make sure that highest priority chassis is back and traffic
is passing through it.
"""
# ensures overcloud nodes are up for next tests
self.addCleanup(self.ensure_overcloud_nodes_active)
self._setup()
gateway_node = self.router_gateway_chassis
self.power_off_host(gateway_node)
self.refresh_nodes_data()
self.verify_routing_via_chassis(self.chassis_list[1])
self.power_on_host(gateway_node)
self.refresh_nodes_data()
self.verify_routing_via_chassis(self.chassis_list[0])
class L3haOvnTest(L3haOvnCommon):
@decorators.idempotent_id('f8fe1f69-a87f-41d8-ac6e-ed7905438338')
@decorators.attr(type='slow')
def test_l3ha_bring_down_interface(self):
"""Check that traffic from a VM connected to an internal network
passes through a networker node which is the highest priority
chassis for a router the internal network is connected to.
The test is intended for OVN environments.
Topology: Any topology with at least 2 nodes acting as dedicated
networker nodes.
Scenario:
1. Create network, subnet, router, pingable and loginable security
group rules, keypair, run a VM instance (server).
2. Find which node is the highest priority chassis for the router.
3. Ping an external address from the VM and make sure that traffic
is passing through the interface connected to the external network
on the highest priority chassis.
4. Bring down the interface which is passing tenant traffic
on the node where the higher priority chassis was scheduled
and repeat steps 2-3. Make sure that now traffic is passing through
the other node(chassis).
5. Bring up the interface, wait until port mappings updated and
repeat steps 2-3. Make sure that highest priority chassis is back
and traffic is passing through it.
"""
self._setup()
node_client = self.find_node_client(self.router_gateway_chassis)
interface = WB_CONF.node_tenant_interface
self.addCleanup(
utils.interface_state_set, node_client, interface,
constants.STATE_UP)
utils.interface_state_set(node_client, interface, constants.STATE_DOWN)
self.verify_routing_via_chassis(self.chassis_list[1])
utils.interface_state_set(node_client, interface, constants.STATE_UP)
self.verify_routing_via_chassis(self.chassis_list[0])
@decorators.idempotent_id('c662477b-6871-4c19-ae87-a2ece859d7f4')
@decorators.attr(type='slow')
def test_l3ha_stop_ovs_service(self):
"""Check that traffic from a VM connected to an internal network
passes through a networker node which is the highest priority
chassis for a router the internal network is connected to.
The test is intended for OVN environments.
Topology: Any topology with at least 2 nodes acting as dedicated
networker nodes.
Scenario:
1. Create network, subnet, router, pingable and loginable security
group rules, keypair, run a VM instance (server).
2. Find which node is the highest priority chassis for the router.
3. Ping an external address from the VM and make sure that traffic
is passing through the interface connected to the external network
on the highest priority chassis.
4. Stop the openvswitch service on the node where the higher priority
chassis was scheduled and repeat steps 2-3. Make sure that now
traffic is passing through the other node(chassis).
5. Start the openvswitch service, wait until port mappings updated and
repeat steps 2-3. Make sure that highest priority chassis is back
and traffic is passing through it.
"""
self._setup()
node_client = self.find_node_client(self.router_gateway_chassis)
remote_service = 'ovs-vswitchd.service'
self.addCleanup(
utils.remote_service_action, node_client,
remote_service, constants.ACTION_START, 'active')
utils.remote_service_action(
node_client, remote_service, constants.ACTION_STOP,
target_state='inactive')
self.verify_routing_via_chassis(self.chassis_list[1])
utils.remote_service_action(
node_client, remote_service, constants.ACTION_START,
target_state='active')
self.verify_routing_via_chassis(self.chassis_list[0])