X-Git-Url: http://git.onelab.eu/?a=blobdiff_plain;f=system%2FTestSliceSfa.py;h=7de388dc3f7790ff21d7a2b277b203b495dd38d8;hb=b04620bb62db2323ab687f2d6811767df44c4608;hp=7f357fc9e2ad40a448884b248bc30ce8b18e2b1d;hpb=bb0875631f86a2603b4e53191a7e88e242c453bf;p=tests.git diff --git a/system/TestSliceSfa.py b/system/TestSliceSfa.py index 7f357fc..7de388d 100644 --- a/system/TestSliceSfa.py +++ b/system/TestSliceSfa.py @@ -1,184 +1,78 @@ # Thierry Parmentelat # Copyright (C) 2010 INRIA # -import utils -import os, os.path -import datetime + import time +from datetime import datetime, timedelta -from TestKey import TestKey -from TestUser import TestUser +import utils from TestNode import TestNode +from TestUser import TestUser +from TestBoxQemu import TestBoxQemu from TestSsh import TestSsh -from TestUserSfa import TestUserSfa + +from Completer import Completer, CompleterTask +from TestSlice import CompleterTaskSshSlice class TestSliceSfa: - def __init__ (self,test_plc,sfa_slice_spec): - self.test_plc=test_plc - self.sfa_slice_spec=sfa_slice_spec - self.test_ssh=TestSsh(self.test_plc.test_ssh) + def __init__ (self, test_auth_sfa, slice_spec): + self.test_auth_sfa=test_auth_sfa + self.slice_spec=slice_spec # shortcuts - self.sfa_spec=test_plc.plc_spec['sfa'] - self.piuser=self.sfa_slice_spec['piuser'] - self.regularuser=self.sfa_slice_spec['regularuser'] - self.slicename=self.sfa_slice_spec['slicename'] - self.login_base=self.sfa_slice_spec['login_base'] - - def name(self): - return self.sfa_slice_spec['slice_fields']['name'] - - def rspec_style (self): return self.sfa_slice_spec['rspec_style'] + self.test_plc=self.test_auth_sfa.test_plc - # the hrn for the site - def auth_hrn (self): - return self.test_plc.plc_spec['sfa']['SFA_REGISTRY_ROOT_AUTH'] + def qualified(self,name): return self.test_auth_sfa.qualified(name) + def hrn (self): return self.qualified(self.slice_spec['name']) + def sfi_path (self): return self.test_auth_sfa.sfi_path() - # the hrn for the site - def site_hrn (self): - return "%s.%s"%(self.auth_hrn(),self.login_base) + # send back up to the TestAuthSfa + def rspec_style (self): return self.test_auth_sfa.rspec_style() + def sfi_pi(self,*args,**kwds): return self.test_auth_sfa.sfi_pi(*args, **kwds) + def sfi_user(self,*args,**kwds): return self.test_auth_sfa.sfi_user(*args, **kwds) - # something in the site (users typically) - def qualified_hrn (self, name): - return "%s.%s"%(self.site_hrn(),name) - - # the slice hrn - def hrn(self): return self.qualified_hrn (self.slicename) - - # result name - def resname (self,name,ext): return "%s.%s"%(name,ext) - - def addslicefile (self): return self.resname("slice_record","xml") - def addpersonfile (self): return self.resname("person_record","xml") - def adfile (self): return self.resname("ad","rspec") - def reqfile (self): return self.resname("req","rspec") - def nodefile (self): return self.resname("nodes","txt") - # xxx this needs tweaks with more recent versions of sfa that have pgv2 as the default ? def discover_option(self): if self.rspec_style()=='pg': return "-r protogeni" else: return "-r sfa" - def sfi_path (self): - return "/root/sfi/%s%s"%(self.slicename,self.rspec_style()) - - def locate_key(self): - for username,keyname in self.sfa_slice_spec['usernames']: - key_spec=self.test_plc.locate_key(keyname) - test_key=TestKey(self.test_plc,key_spec) - publickey=test_key.publicpath() - privatekey=test_key.privatepath() - if os.path.isfile(publickey) and os.path.isfile(privatekey): - found=True - return (found,privatekey) - - # dir_name is local and will be pushed later on by TestPlc - # by default set SFI_USER to the pi, we'll overload this - # on the command line when needed - def sfi_config (self,dir_name): - plc_spec=self.test_plc.plc_spec - sfa_spec=self.sfa_spec - sfa_slice_spec=self.sfa_slice_spec - keys=plc_spec['keys'] - for (contents,name) in [ (keys[0]['private'], self.piuser+'.pkey'), - (keys[0]['key_fields']['key'], self.piuser+'.pub'), - (keys[1]['private'], self.regularuser+'.pkey'), - (keys[0]['key_fields']['key'], self.regularuser+'.pub'), - ]: - file_name=os.path.join(dir_name,self.qualified_hrn(name)) - fileconf=open(file_name,'w') - fileconf.write (contents) - fileconf.close() - utils.header ("(Over)wrote %s"%file_name) - # - file_name=dir_name + os.sep + self.addpersonfile() - fileconf=open(file_name,'w') - fileconf.write(sfa_slice_spec['person_record']) - fileconf.write('\n') - fileconf.close() - utils.header ("(Over)wrote %s"%file_name) - # - file_name=dir_name + os.sep + 'sfi_config' - fileconf=open(file_name,'w') - SFI_AUTH="%s"%(self.site_hrn()) - fileconf.write ("SFI_AUTH='%s'"%SFI_AUTH) - fileconf.write('\n') - SFI_USER=SFI_AUTH + '.' + self.piuser - fileconf.write ("SFI_USER='%s'"%SFI_USER) - fileconf.write('\n') - SFI_REGISTRY='http://' + sfa_spec['SFA_REGISTRY_HOST'] + ':12345/' - fileconf.write ("SFI_REGISTRY='%s'"%SFI_REGISTRY) - fileconf.write('\n') - SFI_SM='http://' + sfa_spec['SFA_SM_HOST'] + ':12347/' - fileconf.write ("SFI_SM='%s'"%SFI_SM) - fileconf.write('\n') - fileconf.close() - utils.header ("(Over)wrote %s"%file_name) - # - file_name=dir_name + os.sep + self.addslicefile() - fileconf=open(file_name,'w') - fileconf.write(sfa_slice_spec['slice_record']) - fileconf.write('\n') - utils.header ("(Over)wrote %s"%file_name) - fileconf.close() - - # using sfaadmin to bootstrap - def sfa_add_site (self, options): - "bootstrap a site using sfaadmin" - command="sfaadmin reg register -t authority -x %s"%self.site_hrn() - return self.test_plc.run_in_guest(command)==0 - - def sfa_add_pi (self, options): - "bootstrap a PI user for that site" - pi_hrn=self.qualified_hrn(self.piuser) - pi_mail=self.sfa_slice_spec['pimail'] - # as installed by sfi_config - pi_key=os.path.join(self.sfi_path(),self.qualified_hrn(self.piuser+'.pub')) - command="sfaadmin reg register -t user -x %s --email %s --key %s"%(pi_hrn,pi_mail,pi_key) - if self.test_plc.run_in_guest(command)!=0: return False - command="sfaadmin reg update -t authority -x %s --pi %s"%(self.site_hrn(),pi_hrn) - return self.test_plc.run_in_guest(command)==0 - - # user management - def sfa_add_user (self, options): - "add a regular user using sfi.py add" - return TestUserSfa(self.test_plc, self.sfa_slice_spec, self).add_user() - def sfa_update_user (self, options): - "update a user record using sfi.py update" - return TestUserSfa(self.test_plc, self.sfa_slice_spec, self).update_user() - def sfa_delete_user (self, options): - "run sfi.py delete" - return TestUserSfa(self.test_plc, self.sfa_slice_spec, self).delete_user() - - # run as pi - def sfi_pi (self, command): - return "sfi.py -d %s -u %s %s"%(self.sfi_path(),self.qualified_hrn(self.piuser), command,) - # the sfi.py command line option to run as a regular user - def sfi_user (self, command): - return "sfi.py -d %s -u %s %s"%(self.sfi_path(),self.qualified_hrn(self.regularuser), command,) - # those are step names exposed as methods of TestPlc, hence the _sfa - def sfa_list (self, options): - "run (as regular user) sfi list (on Registry)" - return \ - self.test_plc.run_in_guest(self.sfi_user("list -r %s"%self.auth_hrn()))==0 and \ - self.test_plc.run_in_guest(self.sfi_user("list %s"%(self.site_hrn())))==0 - - def sfa_show (self, options): - "run (as regular user) sfi show (on Registry)" - return \ - self.test_plc.run_in_guest(self.sfi_user("show %s"%(self.site_hrn())))==0 - - def sfa_slices (self, options): - "run (as regular user) sfi slices (on SM)" - return \ - self.test_plc.run_in_guest(self.sfi_user("slices"))==0 - # needs to be run as pi def sfa_add_slice(self,options): - "run sfi.py add (on Registry) from slice.xml" - return self.test_plc.run_in_guest(self.sfi_pi("add %s"%(self.addslicefile())))==0 - + "run sfi add (on Registry)" + sfi_command="add" + sfi_command += " --type slice" + sfi_command += " --xrn %s"%self.hrn() + for opt in self.slice_spec['add_options']: + sfi_command += " %s"%(opt) + return self.test_plc.run_in_guest(self.sfi_pi(sfi_command))==0 + + def sfa_renew_slice(self, options): + "run sfi renew (on Aggregates)" + too_late = datetime.now() + timedelta(weeks=52) + one_month = datetime.now() + timedelta(weeks=4) + # we expect this to fail on too long term attemps, but to succeed otherwise + overall=True + for ( renew_until, expected) in [ (too_late, False), (one_month, True) ] : + sfi_command="renew" + sfi_command += " %s"%self.hrn() + sfi_command += " %s"%renew_until.strftime("%Y-%m-%d") + succeeded = self.test_plc.run_in_guest(self.sfi_user(sfi_command))==0 + if succeeded!=expected: + utils.header ("Expecting success=%s, got %s"%(expected,succeeded)) + # however it turns out sfi renew always returns fine.... + #overall=False + # so for helping manual checks: + sfi_command="show -k hrn -k expires %s"%self.hrn() + self.test_plc.run_in_guest(self.sfi_user(sfi_command)) + return overall + + # helper - filename to store a given result + def _resname (self,name,ext): return "%s.%s"%(name,ext) + def adfile (self): return self._resname("ad","rspec") + def reqfile (self): return self._resname("req","rspec") + def nodefile (self): return self._resname("nodes","txt") + # run as user def sfa_discover(self,options): "discover resources into resouces_in.rspec" @@ -187,7 +81,7 @@ class TestSliceSfa: # run sfi create as a regular user def sfa_create_slice(self,options): - "run sfi.py create (on SM) - 1st time" + "run sfi create (on SM) - 1st time" commands=[ "sfiListNodes.py -i %s/%s -o %s/%s"%(self.sfi_path(),self.adfile(),self.sfi_path(),self.nodefile()), "sfiAddSliver.py -i %s/%s -n %s/%s -o %s/%s"%\ @@ -198,12 +92,13 @@ class TestSliceSfa: if self.test_plc.run_in_guest(command)!=0: return False return True + def plc_name (self): + return "%s_%s"%(self.test_auth_sfa.login_base,self.slice_spec['name']) + # all local nodes in slice ? def sfa_check_slice_plc (self,options): "check sfa_create_slice at the plcs - all local nodes should be in slice" - slice_fields = self.sfa_slice_spec['slice_fields'] - slice_name = slice_fields['name'] - slice=self.test_plc.apiserver.GetSlices(self.test_plc.auth_root(), slice_name)[0] + slice=self.test_plc.apiserver.GetSlices(self.test_plc.auth_root(), self.plc_name())[0] nodes=self.test_plc.apiserver.GetNodes(self.test_plc.auth_root(), {'peer_id':None}) result=True for node in nodes: @@ -216,70 +111,36 @@ class TestSliceSfa: # actually the same for now def sfa_update_slice(self,options): - "run sfi.py create (on SM) on existing object" + "run sfi create (on SM) on existing object" return self.sfa_create_slice(options) # run as pi def sfa_delete_slice(self,options): - "run sfi.py delete" + "run sfi delete" self.test_plc.run_in_guest(self.sfi_pi("delete %s"%(self.hrn(),))) return self.test_plc.run_in_guest(self.sfi_pi("remove -t slice %s"%(self.hrn(),)))==0 + def locate_private_key(self): + return self.test_plc.locate_private_key_from_key_names ( [ self.slice_spec['key_name'] ] ) + # check the resulting sliver - def ssh_slice_sfa(self,options,timeout_minutes=40,silent_minutes=30,period=15): + def ssh_slice_sfa(self,options,timeout_minutes=40,silent_minutes=0,period_seconds=15): "tries to ssh-enter the SFA slice" - timeout = datetime.datetime.now()+datetime.timedelta(minutes=timeout_minutes) - graceout = datetime.datetime.now()+datetime.timedelta(minutes=silent_minutes) + timeout = timedelta(minutes=timeout_minutes) + graceout = timedelta(minutes=silent_minutes) + period = timedelta(seconds=period_seconds) # locate a key - (found,remote_privatekey)=self.locate_key() - if not found : + private_key=self.locate_private_key() + if not private_key : utils.header("WARNING: Cannot find a valid key for slice %s"%self.name()) return False - - # convert nodenames to real hostnames - sfa_slice_spec = self.sfa_slice_spec - restarted=[] - tocheck=[] - for nodename in sfa_slice_spec['nodenames']: + command="echo hostname ; hostname; echo id; id; echo uname -a ; uname -a" + + tasks=[] + slicename=self.plc_name() + dry_run = getattr(options,'dry_run',False) + for nodename in self.slice_spec['nodenames']: (site_spec,node_spec) = self.test_plc.locate_node(nodename) - tocheck.append(node_spec['node_fields']['hostname']) - - utils.header("checking ssh access into slice %s on nodes %r"%(self.name(),tocheck)) - utils.header("max timeout is %d minutes, silent for %d minutes (period is %s)"%\ - (timeout_minutes,silent_minutes,period)) - while tocheck: - for hostname in tocheck: - (site_spec,node_spec) = self.test_plc.locate_hostname(hostname) - date_test_ssh = TestSsh (hostname,key=remote_privatekey,username=self.name()) - command = date_test_ssh.actual_command("echo hostname ; hostname; echo id; id; echo uname -a ; uname -a") - date = utils.system (command, silent=datetime.datetime.now() < graceout) - if date==0: - utils.header("Successfuly entered slice %s on %s"%(self.name(),hostname)) - tocheck.remove(hostname) - else: - # real nodes will have been checked once in case they're up - skip if not - if TestNode.is_real_model(node_spec['node_fields']['model']): - utils.header("WARNING : Checking slice %s on real node %s skipped"%(self.name(),hostname)) - tocheck.remove(hostname) - # nm restart after first failure, if requested - if options.forcenm and hostname not in restarted: - utils.header ("forcenm option : restarting nm on %s"%hostname) - restart_test_ssh=TestSsh(hostname,key="keys/key1.rsa") - access=restart_test_ssh.actual_command('service nm restart') - if (access==0): - utils.header('nm restarted on %s'%hostname) - else: - utils.header('Failed to restart nm on %s'%(hostname)) - restarted.append(hostname) - if not tocheck: - # we're done - return True - if datetime.datetime.now() > timeout: - for hostname in tocheck: - utils.header("FAILURE to ssh into %s@%s"%(self.name(),hostname)) - return False - # wait for the period - time.sleep (period) - # for an empty slice - return True - + tasks.append( CompleterTaskSshSlice(self.test_plc,node_spec['node_fields']['hostname'], + slicename,private_key,command,expected=True,dry_run=dry_run)) + return Completer (tasks).run (timeout, graceout, period)