self.slicename=self.sfa_slice_spec['slicename']
self.login_base=self.sfa_slice_spec['login_base']
- def name(self):
- return self.sfa_slice_spec['slice_fields']['name']
+ def plc_name(self):
+ return self.sfa_slice_spec['plc_slicename']
def rspec_style (self): return self.sfa_slice_spec['rspec_style']
# result name
def resname (self,name,ext): return "%s.%s"%(name,ext)
- def addslicefile (self): return self.resname("slice_record","xml")
def adfile (self): return self.resname("ad","rspec")
def reqfile (self): return self.resname("req","rspec")
def nodefile (self): return self.resname("nodes","txt")
return "/root/sfi/%s%s"%(self.slicename,self.rspec_style())
def locate_key(self):
- for username,keyname in self.sfa_slice_spec['usernames']:
- key_spec=self.test_plc.locate_key(keyname)
- test_key=TestKey(self.test_plc,key_spec)
- publickey=test_key.publicpath()
- privatekey=test_key.privatepath()
- if os.path.isfile(publickey) and os.path.isfile(privatekey):
- found=True
+ for key_name in self.sfa_slice_spec['slice_key_names']:
+ key_spec=self.test_plc.locate_key(key_name)
+ test_key=TestKey(self.test_plc,key_spec)
+ publickey=test_key.publicpath()
+ privatekey=test_key.privatepath()
+ if os.path.isfile(publickey) and os.path.isfile(privatekey):
+ found=True
return (found,privatekey)
# dir_name is local and will be pushed later on by TestPlc
sfa_spec=self.sfa_spec
sfa_slice_spec=self.sfa_slice_spec
keys=plc_spec['keys']
- for (contents,name) in [ (keys[0]['private'], self.piuser+'.pkey'),
- (keys[0]['key_fields']['key'], self.piuser+'.pub'),
- (keys[1]['private'], self.regularuser+'.pkey'),
- (keys[0]['key_fields']['key'], self.regularuser+'.pub'),
- ]:
- file_name=os.path.join(dir_name,self.qualified_hrn(name))
- fileconf=open(file_name,'w')
- fileconf.write (contents)
- fileconf.close()
- utils.header ("(Over)wrote %s"%file_name)
+ # fetch keys in config spec and expose to sfi
+ for (hrn_leaf,key_name) in sfa_slice_spec['hrn_keys'].items():
+ key_spec = self.test_plc.locate_key (key_name)
+ for (kind,ext) in [ ('private', 'pkey'), ('public', 'pub') ] :
+ contents=key_spec[kind]
+ file_name=os.path.join(dir_name,self.qualified_hrn(hrn_leaf))+"."+ext
+ fileconf=open(file_name,'w')
+ fileconf.write (contents)
+ fileconf.close()
+ utils.header ("(Over)wrote %s"%file_name)
#
file_name=dir_name + os.sep + 'sfi_config'
fileconf=open(file_name,'w')
fileconf.write('\n')
fileconf.close()
utils.header ("(Over)wrote %s"%file_name)
- #
- file_name=dir_name + os.sep + self.addslicefile()
- fileconf=open(file_name,'w')
- fileconf.write(sfa_slice_spec['slice_record'])
- fileconf.write('\n')
- utils.header ("(Over)wrote %s"%file_name)
- fileconf.close()
# using sfaadmin to bootstrap
def sfa_add_site (self, options):
# user management
def sfa_add_user (self, options):
- "add a regular user using sfi.py add"
+ "add a regular user using sfi add"
return TestUserSfa(self.test_plc, self.sfa_slice_spec, self).add_user()
def sfa_update_user (self, options):
- "update a user record using sfi.py update"
+ "update a user record using sfi update"
return TestUserSfa(self.test_plc, self.sfa_slice_spec, self).update_user()
def sfa_delete_user (self, options):
- "run sfi.py delete"
+ "run sfi delete"
return TestUserSfa(self.test_plc, self.sfa_slice_spec, self).delete_user()
# run as pi
def sfi_pi (self, command):
- return "sfi.py -d %s -u %s %s"%(self.sfi_path(),self.qualified_hrn(self.piuser), command,)
- # the sfi.py command line option to run as a regular user
+ return "sfi -d %s -u %s %s"%(self.sfi_path(),self.qualified_hrn(self.piuser), command,)
+ # the sfi command line option to run as a regular user
def sfi_user (self, command):
- return "sfi.py -d %s -u %s %s"%(self.sfi_path(),self.qualified_hrn(self.regularuser), command,)
+ return "sfi -d %s -u %s %s"%(self.sfi_path(),self.qualified_hrn(self.regularuser), command,)
# those are step names exposed as methods of TestPlc, hence the _sfa
# needs to be run as pi
def sfa_add_slice(self,options):
- "run sfi.py add (on Registry) from slice.xml"
- return self.test_plc.run_in_guest(self.sfi_pi("add %s"%(self.addslicefile())))==0
+ "run sfi add (on Registry) from slice.xml"
+ sfi_options="add"
+ for opt in self.sfa_slice_spec['slice_sfi_options']:
+ sfi_options += " %s"%(opt)
+ return self.test_plc.run_in_guest(self.sfi_pi(sfi_options))==0
# run as user
def sfa_discover(self,options):
# run sfi create as a regular user
def sfa_create_slice(self,options):
- "run sfi.py create (on SM) - 1st time"
+ "run sfi create (on SM) - 1st time"
commands=[
"sfiListNodes.py -i %s/%s -o %s/%s"%(self.sfi_path(),self.adfile(),self.sfi_path(),self.nodefile()),
"sfiAddSliver.py -i %s/%s -n %s/%s -o %s/%s"%\
# all local nodes in slice ?
def sfa_check_slice_plc (self,options):
"check sfa_create_slice at the plcs - all local nodes should be in slice"
- slice_fields = self.sfa_slice_spec['slice_fields']
- slice_name = slice_fields['name']
+ slice_name = self.plc_name()
slice=self.test_plc.apiserver.GetSlices(self.test_plc.auth_root(), slice_name)[0]
nodes=self.test_plc.apiserver.GetNodes(self.test_plc.auth_root(), {'peer_id':None})
result=True
# actually the same for now
def sfa_update_slice(self,options):
- "run sfi.py create (on SM) on existing object"
+ "run sfi create (on SM) on existing object"
return self.sfa_create_slice(options)
# run as pi
def sfa_delete_slice(self,options):
- "run sfi.py delete"
+ "run sfi delete"
self.test_plc.run_in_guest(self.sfi_pi("delete %s"%(self.hrn(),)))
return self.test_plc.run_in_guest(self.sfi_pi("remove -t slice %s"%(self.hrn(),)))==0
# locate a key
(found,remote_privatekey)=self.locate_key()
if not found :
- utils.header("WARNING: Cannot find a valid key for slice %s"%self.name())
+ utils.header("WARNING: Cannot find a valid key for slice %s"%self.plc_name())
return False
# convert nodenames to real hostnames
(site_spec,node_spec) = self.test_plc.locate_node(nodename)
tocheck.append(node_spec['node_fields']['hostname'])
- utils.header("checking ssh access into slice %s on nodes %r"%(self.name(),tocheck))
+ utils.header("checking ssh access into slice %s on nodes %r"%(self.plc_name(),tocheck))
utils.header("max timeout is %d minutes, silent for %d minutes (period is %s)"%\
(timeout_minutes,silent_minutes,period))
while tocheck:
for hostname in tocheck:
(site_spec,node_spec) = self.test_plc.locate_hostname(hostname)
- date_test_ssh = TestSsh (hostname,key=remote_privatekey,username=self.name())
+ date_test_ssh = TestSsh (hostname,key=remote_privatekey,username=self.plc_name())
command = date_test_ssh.actual_command("echo hostname ; hostname; echo id; id; echo uname -a ; uname -a")
date = utils.system (command, silent=datetime.datetime.now() < graceout)
if date==0:
- utils.header("Successfuly entered slice %s on %s"%(self.name(),hostname))
+ utils.header("Successfuly entered slice %s on %s"%(self.plc_name(),hostname))
tocheck.remove(hostname)
else:
# real nodes will have been checked once in case they're up - skip if not
if TestNode.is_real_model(node_spec['node_fields']['model']):
- utils.header("WARNING : Checking slice %s on real node %s skipped"%(self.name(),hostname))
+ utils.header("WARNING : Checking slice %s on real node %s skipped"%(self.plc_name(),hostname))
tocheck.remove(hostname)
# nm restart after first failure, if requested
if options.forcenm and hostname not in restarted:
utils.header ("forcenm option : restarting nm on %s"%hostname)
- restart_test_ssh=TestSsh(hostname,key="keys/key1.rsa")
+ restart_test_ssh=TestSsh(hostname,key="keys/key_admin.rsa")
access=restart_test_ssh.actual_command('service nm restart')
if (access==0):
utils.header('nm restarted on %s'%hostname)
return True
if datetime.datetime.now() > timeout:
for hostname in tocheck:
- utils.header("FAILURE to ssh into %s@%s"%(self.name(),hostname))
+ utils.header("FAILURE to ssh into %s@%s"%(self.plc_name(),hostname))
return False
# wait for the period
time.sleep (period)