now that we create an SFA auth to hold the sfa entities involved:
[tests.git] / system / TestSlice.py
1 # Thierry Parmentelat <thierry.parmentelat@inria.fr>
2 # Copyright (C) 2010 INRIA 
3 #
4 import utils
5 import os, os.path
6 import datetime
7 import time
8
9 from TestKey import TestKey
10 from TestUser import TestUser
11 from TestNode import TestNode
12 from TestSsh import TestSsh
13
14 class TestSlice:
15
16     def __init__ (self,test_plc,test_site,slice_spec):
17         self.test_plc=test_plc
18         self.test_site=test_site
19         self.slice_spec=slice_spec
20         self.test_ssh=TestSsh(self.test_plc.test_ssh)
21         
22     def name(self):
23         return self.slice_spec['slice_fields']['name']
24     
25     def get_slice(self,slice_name):
26         for slice_spec in self.test_plc.plc_spec['slices']:
27             if(slice_spec['slice_fields']['name']== slice_name):
28                 return slice_spec
29
30     def owner_auth(self):
31         owner_spec = self.test_site.locate_user(self.slice_spec['owner'])
32         return TestUser(self,self.test_site,owner_spec).auth()
33
34     def slice_name (self):
35         return self.slice_spec['slice_fields']['name']
36
37     # init slice with people, and then add nodes 
38     def create_slice(self):
39         auth = self.owner_auth()
40         slice_fields = self.slice_spec['slice_fields']
41         slice_name = slice_fields['name']
42         utils.header("Creating slice %s"%slice_name)
43         self.test_plc.apiserver.AddSlice(auth,slice_fields)
44         for username in self.slice_spec['usernames']:
45                 user_spec=self.test_site.locate_user(username)
46                 test_user=TestUser(self,self.test_site,user_spec)
47                 self.test_plc.apiserver.AddPersonToSlice(auth, test_user.name(), slice_name)
48         # add initscript code or name as appropriate
49         if self.slice_spec.has_key('initscriptcode'):
50             iscode=self.slice_spec['initscriptcode']
51             utils.header("Adding initscript code %s in %s"%(iscode,slice_name))
52             self.test_plc.apiserver.AddSliceTag(self.test_plc.auth_root(), slice_name,'initscript_code',iscode)
53         elif self.slice_spec.has_key('initscriptname'):
54             isname=self.slice_spec['initscriptname']
55             utils.header("Adding initscript name %s in %s"%(isname,slice_name))
56             self.test_plc.apiserver.AddSliceTag(self.test_plc.auth_root(), slice_name,'initscript',isname)
57         if self.slice_spec.has_key ('vref'):
58             vref_value=self.slice_spec['vref']
59             self.test_plc.apiserver.AddSliceTag(self.test_plc.auth_root(), slice_name,'vref',vref_value)
60
61         self.add_nodes()
62
63     # just add the nodes and handle tags
64     def add_nodes (self):
65         auth = self.owner_auth()
66         slice_name = self.slice_name()
67         hostnames=[]
68         for nodename in self.slice_spec['nodenames']:
69             node_spec=self.test_site.locate_node(nodename)
70             test_node=TestNode(self,self.test_site,node_spec)
71             hostnames += [test_node.name()]
72         utils.header("Adding %r in %s"%(hostnames,slice_name))
73         self.test_plc.apiserver.AddSliceToNodes(auth, slice_name, hostnames)
74         
75     # trash the slice altogether
76     def delete_slice(self):
77         auth = self.owner_auth()
78         slice_name = self.slice_name()
79         utils.header("Deleting slice %s"%slice_name)
80         self.test_plc.apiserver.DeleteSlice(auth,slice_name)
81
82     # keep the slice alive and just delete nodes
83     def delete_nodes (self):
84         auth = self.owner_auth()
85         slice_name = self.slice_name()
86         print 'retrieving slice %s'%slice_name
87         slice=self.test_plc.apiserver.GetSlices(auth,slice_name)[0]
88         node_ids=slice['node_ids']
89         utils.header ("Deleting %d nodes from slice %s"%\
90                           (len(node_ids),slice_name))
91         self.test_plc.apiserver.DeleteSliceFromNodes (auth,slice_name, node_ids)
92
93     def locate_key(self):
94         # locate the first avail. key
95         found=False
96         for username in self.slice_spec['usernames']:
97             user_spec=self.test_site.locate_user(username)
98             for key_name in user_spec['key_names']:
99                 key_spec=self.test_plc.locate_key(key_name)
100                 test_key=TestKey(self.test_plc,key_spec)
101                 publickey=test_key.publicpath()
102                 privatekey=test_key.privatepath()
103                 if os.path.isfile(publickey) and os.path.isfile(privatekey):
104                     found=True
105         return (found,privatekey)
106
107
108     # trying to reach the slice through ssh - expected to answer
109     def ssh_slice (self, options, *args, **kwds):
110         "tries to ssh-enter the slice with the user key, to ensure slice creation"
111         return self.do_ssh_slice(options, expected=True, *args, **kwds)
112
113     # when we expect the slice is not reachable
114     def ssh_slice_off (self, options, *args, **kwds):
115         "tries to ssh-enter the slice with the user key, expecting it to be unreachable"
116         return self.do_ssh_slice(options, expected=False, *args, **kwds)
117
118     def do_ssh_slice(self,options,expected=True,timeout_minutes=20,silent_minutes=10,period=15):
119         timeout = datetime.datetime.now()+datetime.timedelta(minutes=timeout_minutes)
120         graceout = datetime.datetime.now()+datetime.timedelta(minutes=silent_minutes)
121         # locate a key
122         (found,remote_privatekey)=self.locate_key()
123         if not found :
124             utils.header("WARNING: Cannot find a valid key for slice %s"%self.name())
125             return False
126
127         # convert nodenames to real hostnames
128         slice_spec = self.slice_spec
129         restarted=[]
130         tocheck=[]
131         for nodename in slice_spec['nodenames']:
132             (site_spec,node_spec) = self.test_plc.locate_node(nodename)
133             tocheck.append(node_spec['node_fields']['hostname'])
134
135         if expected:    msg="ssh slice access enabled"
136         else:           msg="ssh slice access disabled"
137             
138         utils.header("checking for %s -- slice %s on nodes %r"%(msg,self.name(),tocheck))
139         utils.header("max timeout is %d minutes, silent for %d minutes (period is %s)"%\
140                          (timeout_minutes,silent_minutes,period))
141         while tocheck:
142             for hostname in tocheck:
143                 (site_spec,node_spec) = self.test_plc.locate_hostname(hostname)
144                 date_test_ssh = TestSsh (hostname,key=remote_privatekey,username=self.name())
145                 command = date_test_ssh.actual_command("echo hostname ; hostname; echo id; id; echo uname -a ; uname -a")
146                 date = utils.system (command, silent=datetime.datetime.now() < graceout)
147                 if getattr(options,'dry_run',None): return True
148                 if expected:    success = date==0
149                 else:           success = date!=0
150                     
151                 if success:
152                     utils.header("OK %s - slice=%s@%s"%(msg,self.name(),hostname))
153                     tocheck.remove(hostname)
154                 else:
155                     # real nodes will have been checked once in case they're up - skip if not
156                     if TestNode.is_real_model(node_spec['node_fields']['model']):
157                         utils.header("WARNING : Checking slice %s on real node %s skipped"%(self.name(),hostname))
158                         tocheck.remove(hostname)
159                     # nm restart after first failure, if requested 
160                     if options.forcenm and hostname not in restarted:
161                         utils.header ("forcenm option : restarting nm on %s"%hostname)
162                         restart_test_ssh=TestSsh(hostname,key="keys/key_admin.rsa")
163                         access=restart_test_ssh.actual_command('service nm restart')
164                         if (access==0):
165                             utils.header('nm restarted on %s'%hostname)
166                         else:
167                             utils.header('Failed to restart nm on %s'%(hostname))
168                         restarted.append(hostname)
169             if not tocheck:
170                 # we're done
171                 return True
172             if datetime.datetime.now() > timeout:
173                 for hostname in tocheck:
174                     utils.header("FAILED %s slice=%s@%s"%(msg,self.name(),hostname))
175                 return False
176             # wait for the period
177             time.sleep (period)
178         # for an empty slice
179         return True