1 # Thierry Parmentelat <thierry.parmentelat@inria.fr>
2 # Copyright (C) 2010 INRIA
9 from TestKey import TestKey
10 from TestUser import TestUser
11 from TestNode import TestNode
12 from TestSsh import TestSsh
16 def __init__ (self,test_plc,test_site,slice_spec):
17 self.test_plc=test_plc
18 self.test_site=test_site
19 self.slice_spec=slice_spec
20 self.test_ssh=TestSsh(self.test_plc.test_ssh)
23 return self.slice_spec['slice_fields']['name']
25 def get_slice(self,slice_name):
26 for slice_spec in self.test_plc.plc_spec['slices']:
27 if(slice_spec['slice_fields']['name']== slice_name):
31 owner_spec = self.test_site.locate_user(self.slice_spec['owner'])
32 return TestUser(self,self.test_site,owner_spec).auth()
34 def slice_name (self):
35 return self.slice_spec['slice_fields']['name']
37 # init slice with people, and then add nodes
38 def create_slice(self):
39 auth = self.owner_auth()
40 slice_fields = self.slice_spec['slice_fields']
41 slice_name = slice_fields['name']
42 utils.header("Creating slice %s"%slice_name)
43 self.test_plc.apiserver.AddSlice(auth,slice_fields)
44 for username in self.slice_spec['usernames']:
45 user_spec=self.test_site.locate_user(username)
46 test_user=TestUser(self,self.test_site,user_spec)
47 self.test_plc.apiserver.AddPersonToSlice(auth, test_user.name(), slice_name)
48 # add initscript code or name as appropriate
49 if self.slice_spec.has_key('initscriptcode'):
50 iscode=self.slice_spec['initscriptcode']
51 utils.header("Adding initscript code %s in %s"%(iscode,slice_name))
52 self.test_plc.apiserver.AddSliceTag(self.test_plc.auth_root(), slice_name,'initscript_code',iscode)
53 elif self.slice_spec.has_key('initscriptname'):
54 isname=self.slice_spec['initscriptname']
55 utils.header("Adding initscript name %s in %s"%(isname,slice_name))
56 self.test_plc.apiserver.AddSliceTag(self.test_plc.auth_root(), slice_name,'initscript',isname)
57 if self.slice_spec.has_key ('vref'):
58 vref_value=self.slice_spec['vref']
59 self.test_plc.apiserver.AddSliceTag(self.test_plc.auth_root(), slice_name,'vref',vref_value)
63 def check_vsys_defaults (self, options, *args, **kwds):
64 "check vsys tags match PLC_VSYS_DEFAULTS"
65 auth = self.owner_auth()
66 slice_fields = self.slice_spec['slice_fields']
67 slice_name = slice_fields['name']
68 vsys_tags = self.test_plc.apiserver.GetSliceTags (auth,{'tagname':'vsys','name':slice_name})
69 values=[ st['value'] for st in vsys_tags ]
70 expected=self.test_plc.plc_spec['expected_vsys_tags']
71 return set(values) == set(expected)
73 # just add the nodes and handle tags
75 auth = self.owner_auth()
76 slice_name = self.slice_name()
78 for nodename in self.slice_spec['nodenames']:
79 node_spec=self.test_site.locate_node(nodename)
80 test_node=TestNode(self,self.test_site,node_spec)
81 hostnames += [test_node.name()]
82 utils.header("Adding %r in %s"%(hostnames,slice_name))
83 self.test_plc.apiserver.AddSliceToNodes(auth, slice_name, hostnames)
85 # trash the slice altogether
86 def delete_slice(self):
87 auth = self.owner_auth()
88 slice_name = self.slice_name()
89 utils.header("Deleting slice %s"%slice_name)
90 self.test_plc.apiserver.DeleteSlice(auth,slice_name)
92 # keep the slice alive and just delete nodes
93 def delete_nodes (self):
94 auth = self.owner_auth()
95 slice_name = self.slice_name()
96 print 'retrieving slice %s'%slice_name
97 slice=self.test_plc.apiserver.GetSlices(auth,slice_name)[0]
98 node_ids=slice['node_ids']
99 utils.header ("Deleting %d nodes from slice %s"%\
100 (len(node_ids),slice_name))
101 self.test_plc.apiserver.DeleteSliceFromNodes (auth,slice_name, node_ids)
103 def locate_private_key(self):
105 for username in self.slice_spec['usernames']:
106 user_spec=self.test_site.locate_user(username)
107 key_names += user_spec['key_names']
108 return self.test_plc.locate_private_key_from_key_names (key_names)
110 # trying to reach the slice through ssh - expected to answer
111 def ssh_slice (self, options, *args, **kwds):
112 "tries to ssh-enter the slice with the user key, to ensure slice creation"
113 return self.do_ssh_slice(options, expected=True, *args, **kwds)
115 # when we expect the slice is not reachable
116 def ssh_slice_off (self, options, *args, **kwds):
117 "tries to ssh-enter the slice with the user key, expecting it to be unreachable"
118 return self.do_ssh_slice(options, expected=False, *args, **kwds)
120 def do_ssh_slice(self,options,expected=True,timeout_minutes=20,silent_minutes=10,period=15):
121 timeout = datetime.datetime.now()+datetime.timedelta(minutes=timeout_minutes)
122 graceout = datetime.datetime.now()+datetime.timedelta(minutes=silent_minutes)
124 private_key=self.locate_private_key()
126 utils.header("WARNING: Cannot find a valid key for slice %s"%self.name())
129 # convert nodenames to real hostnames
130 slice_spec = self.slice_spec
133 for nodename in slice_spec['nodenames']:
134 (site_spec,node_spec) = self.test_plc.locate_node(nodename)
135 tocheck.append(node_spec['node_fields']['hostname'])
137 if expected: msg="ssh slice access enabled"
138 else: msg="ssh slice access disabled"
140 utils.header("checking for %s -- slice %s on nodes %r"%(msg,self.name(),tocheck))
141 utils.header("max timeout is %d minutes, silent for %d minutes (period is %s)"%\
142 (timeout_minutes,silent_minutes,period))
144 for hostname in tocheck:
145 (site_spec,node_spec) = self.test_plc.locate_hostname(hostname)
146 date_test_ssh = TestSsh (hostname,key=private_key,username=self.name())
147 command = date_test_ssh.actual_command("echo hostname ; hostname; echo id; id; echo uname -a ; uname -a")
148 date = utils.system (command, silent=datetime.datetime.now() < graceout)
149 if getattr(options,'dry_run',None): return True
150 if expected: success = date==0
151 else: success = date!=0
154 utils.header("OK %s - slice=%s@%s"%(msg,self.name(),hostname))
155 tocheck.remove(hostname)
157 # real nodes will have been checked once in case they're up - skip if not
158 if TestNode.is_real_model(node_spec['node_fields']['model']):
159 utils.header("WARNING : Checking slice %s on real node %s skipped"%(self.name(),hostname))
160 tocheck.remove(hostname)
161 # nm restart after first failure, if requested
162 if options.forcenm and hostname not in restarted:
163 utils.header ("forcenm option : restarting nm on %s"%hostname)
164 restart_test_ssh=TestSsh(hostname,key="keys/key_admin.rsa")
165 access=restart_test_ssh.actual_command('service nm restart')
167 utils.header('nm restarted on %s'%hostname)
169 utils.header('Failed to restart nm on %s'%(hostname))
170 restarted.append(hostname)
174 if datetime.datetime.now() > timeout:
175 for hostname in tocheck:
176 utils.header("FAILED %s slice=%s@%s"%(msg,self.name(),hostname))
178 # wait for the period