2a242519f7
Background for this work can be read on the mailing list: http://lists.openstack.org/pipermail/openstack-dev/2016-May/094063.html Usage of the new Neutron is by setting the following in ENABLED_SERVICES: * neutron-api * neutron-l3 * neutron-agent * neutron-dhcp * neutron-metadata-agent For now, the new neutron library supports just the ML2 plugin, with the Open vSwitch and Linux Bridge agents supported. All other Neutron plugins should be creating their own DevStack plugin if they wish for DevStack to support them. Many of them already do. Other notable changes compared to neutron-legacy: * Rely on the Neutron defaults, and force Neutron to make sane defaults instead of all kinds of knobs in DevStack. * Default to rootwrap daemon support * Use the security group driver by default * interface_driver can now use NEUTRON_AGENT (linuxbridge, openvswitch), since they are entrypoints in neutron's setup.cfg * Use NEUTRON_AGENT variable to determine which agent to run Works with NEUTRON_AGENT set to either "linuxbridge" or "openvswitch" Default is openvswitch for the time being. * Set ML2 configuration for VXLAN support * Remove Xen hypervisor stuff - it should be a plugin * Move L3 crud into separate service file: There's a lot of L3 configuration that was in the main neutron file, but a lot of it is self contained and can be moved into its own file. The new l3 service file will contain all the previous L3 plumbing and configuration that the OpenStack Gate expects, while also eventually moving the whole l3 network creation step into a single hook that can be overridden by plugins. * Introduce a check for a function "neutron_plugin_create_initial_networks" which will become the mechanism through which different topologies, and networking plugins can create and wire the initial networks that are created during a stack.sh run. The new lib/neutron is considered experimental, and followup patches will build upon this one. Existing users of lib/neutron-legacy should remain unharmed. Co-Authored-By: Hirofumi Ichihara <ichihara.hirofumi@lab.ntt.co.jp> Co-Authored-By: Dean Troyer <dtroyer@gmail.com> Change-Id: I31b6362c6d9992f425f2dedbbeff2568390a93da
226 lines
7.0 KiB
Bash
Executable File
226 lines
7.0 KiB
Bash
Executable File
#!/usr/bin/env bash
|
|
|
|
# **volumes.sh**
|
|
|
|
# Test cinder volumes with the ``cinder`` command from ``python-cinderclient``
|
|
|
|
echo "*********************************************************************"
|
|
echo "Begin DevStack Exercise: $0"
|
|
echo "*********************************************************************"
|
|
|
|
# This script exits on an error so that errors don't compound and you see
|
|
# only the first error that occurred.
|
|
set -o errexit
|
|
|
|
# Print the commands being run so that we can see the command that triggers
|
|
# an error. It is also useful for following allowing as the install occurs.
|
|
set -o xtrace
|
|
|
|
|
|
# Settings
|
|
# ========
|
|
|
|
# Keep track of the current directory
|
|
EXERCISE_DIR=$(cd $(dirname "$0") && pwd)
|
|
TOP_DIR=$(cd $EXERCISE_DIR/..; pwd)
|
|
|
|
# Import common functions
|
|
source $TOP_DIR/functions
|
|
|
|
# Import configuration
|
|
source $TOP_DIR/openrc
|
|
|
|
# Import project functions
|
|
source $TOP_DIR/lib/cinder
|
|
source $TOP_DIR/lib/neutron
|
|
source $TOP_DIR/lib/neutron-legacy
|
|
|
|
# Import exercise configuration
|
|
source $TOP_DIR/exerciserc
|
|
|
|
# If cinder is not enabled we exit with exitcode 55 which mean
|
|
# exercise is skipped.
|
|
is_service_enabled cinder || exit 55
|
|
|
|
# Ironic does not currently support volume attachment.
|
|
[ "$VIRT_DRIVER" == "ironic" ] && exit 55
|
|
|
|
# Instance type to create
|
|
DEFAULT_INSTANCE_TYPE=${DEFAULT_INSTANCE_TYPE:-m1.tiny}
|
|
|
|
# Boot this image, use first AMI image if unset
|
|
DEFAULT_IMAGE_NAME=${DEFAULT_IMAGE_NAME:-ami}
|
|
|
|
# Security group name
|
|
SECGROUP=${SECGROUP:-vol_secgroup}
|
|
|
|
# Instance and volume names
|
|
VM_NAME=${VM_NAME:-ex-vol-inst}
|
|
VOL_NAME="ex-vol-$(openssl rand -hex 4)"
|
|
|
|
|
|
# Launching a server
|
|
# ==================
|
|
|
|
# List servers for tenant:
|
|
nova list
|
|
|
|
# Images
|
|
# ------
|
|
|
|
# List the images available
|
|
openstack image list
|
|
|
|
# Grab the id of the image to launch
|
|
IMAGE=$(openstack image list | egrep " $DEFAULT_IMAGE_NAME " | get_field 1)
|
|
die_if_not_set $LINENO IMAGE "Failure getting image $DEFAULT_IMAGE_NAME"
|
|
|
|
# Security Groups
|
|
# ---------------
|
|
|
|
# List security groups
|
|
nova secgroup-list
|
|
|
|
if is_service_enabled n-cell; then
|
|
# Cells does not support security groups, so force the use of "default"
|
|
SECGROUP="default"
|
|
echo "Using the default security group because of Cells."
|
|
else
|
|
# Create a secgroup
|
|
if ! nova secgroup-list | grep -q $SECGROUP; then
|
|
nova secgroup-create $SECGROUP "$SECGROUP description"
|
|
if ! timeout $ASSOCIATE_TIMEOUT sh -c "while ! nova secgroup-list | grep -q $SECGROUP; do sleep 1; done"; then
|
|
echo "Security group not created"
|
|
exit 1
|
|
fi
|
|
fi
|
|
fi
|
|
|
|
# Configure Security Group Rules
|
|
if ! nova secgroup-list-rules $SECGROUP | grep -q icmp; then
|
|
nova secgroup-add-rule $SECGROUP icmp -1 -1 0.0.0.0/0
|
|
fi
|
|
if ! nova secgroup-list-rules $SECGROUP | grep -q " tcp .* 22 "; then
|
|
nova secgroup-add-rule $SECGROUP tcp 22 22 0.0.0.0/0
|
|
fi
|
|
|
|
# List secgroup rules
|
|
nova secgroup-list-rules $SECGROUP
|
|
|
|
# Set up instance
|
|
# ---------------
|
|
|
|
# List flavors
|
|
nova flavor-list
|
|
|
|
# Select a flavor
|
|
INSTANCE_TYPE=$(nova flavor-list | grep $DEFAULT_INSTANCE_TYPE | get_field 1)
|
|
if [[ -z "$INSTANCE_TYPE" ]]; then
|
|
# grab the first flavor in the list to launch if default doesn't exist
|
|
INSTANCE_TYPE=$(nova flavor-list | head -n 4 | tail -n 1 | get_field 1)
|
|
die_if_not_set $LINENO INSTANCE_TYPE "Failure retrieving INSTANCE_TYPE"
|
|
fi
|
|
|
|
# Clean-up from previous runs
|
|
nova delete $VM_NAME || true
|
|
if ! timeout $ACTIVE_TIMEOUT sh -c "while nova show $VM_NAME; do sleep 1; done"; then
|
|
die $LINENO "server didn't terminate!"
|
|
fi
|
|
|
|
# Boot instance
|
|
# -------------
|
|
|
|
VM_UUID=$(nova boot --flavor $INSTANCE_TYPE --image $IMAGE --security-groups=$SECGROUP $VM_NAME | grep ' id ' | get_field 2)
|
|
die_if_not_set $LINENO VM_UUID "Failure launching $VM_NAME"
|
|
|
|
# Check that the status is active within ACTIVE_TIMEOUT seconds
|
|
if ! timeout $ACTIVE_TIMEOUT sh -c "while ! nova show $VM_UUID | grep status | grep -q ACTIVE; do sleep 1; done"; then
|
|
die $LINENO "server didn't become active!"
|
|
fi
|
|
|
|
# Get the instance IP
|
|
IP=$(get_instance_ip $VM_UUID $PRIVATE_NETWORK_NAME)
|
|
|
|
die_if_not_set $LINENO IP "Failure retrieving IP address"
|
|
|
|
# Private IPs can be pinged in single node deployments
|
|
ping_check $IP $BOOT_TIMEOUT "$PRIVATE_NETWORK_NAME"
|
|
|
|
# Volumes
|
|
# -------
|
|
|
|
# Verify it doesn't exist
|
|
if [[ -n $(cinder list | grep $VOL_NAME | head -1 | get_field 2) ]]; then
|
|
die $LINENO "Volume $VOL_NAME already exists"
|
|
fi
|
|
|
|
# Create a new volume
|
|
start_time=$(date +%s)
|
|
cinder create --display-name $VOL_NAME --display-description "test volume: $VOL_NAME" $DEFAULT_VOLUME_SIZE || \
|
|
die $LINENO "Failure creating volume $VOL_NAME"
|
|
if ! timeout $ACTIVE_TIMEOUT sh -c "while ! cinder list | grep $VOL_NAME | grep available; do sleep 1; done"; then
|
|
die $LINENO "Volume $VOL_NAME not created"
|
|
fi
|
|
end_time=$(date +%s)
|
|
echo "Completed cinder create in $((end_time - start_time)) seconds"
|
|
|
|
# Get volume ID
|
|
VOL_ID=$(cinder list | grep $VOL_NAME | head -1 | get_field 1)
|
|
die_if_not_set $LINENO VOL_ID "Failure retrieving volume ID for $VOL_NAME"
|
|
|
|
# Attach to server
|
|
DEVICE=/dev/vdb
|
|
start_time=$(date +%s)
|
|
nova volume-attach $VM_UUID $VOL_ID $DEVICE || \
|
|
die $LINENO "Failure attaching volume $VOL_NAME to $VM_NAME"
|
|
if ! timeout $ACTIVE_TIMEOUT sh -c "while ! cinder list | grep $VOL_NAME | grep in-use; do sleep 1; done"; then
|
|
die $LINENO "Volume $VOL_NAME not attached to $VM_NAME"
|
|
fi
|
|
end_time=$(date +%s)
|
|
echo "Completed volume-attach in $((end_time - start_time)) seconds"
|
|
|
|
VOL_ATTACH=$(cinder list | grep $VOL_NAME | head -1 | get_field -1)
|
|
die_if_not_set $LINENO VOL_ATTACH "Failure retrieving $VOL_NAME status"
|
|
if [[ "$VOL_ATTACH" != $VM_UUID ]]; then
|
|
die $LINENO "Volume not attached to correct instance"
|
|
fi
|
|
|
|
# Clean up
|
|
# --------
|
|
|
|
# Detach volume
|
|
start_time=$(date +%s)
|
|
nova volume-detach $VM_UUID $VOL_ID || die $LINENO "Failure detaching volume $VOL_NAME from $VM_NAME"
|
|
if ! timeout $ACTIVE_TIMEOUT sh -c "while ! cinder list | grep $VOL_NAME | grep available; do sleep 1; done"; then
|
|
die $LINENO "Volume $VOL_NAME not detached from $VM_NAME"
|
|
fi
|
|
end_time=$(date +%s)
|
|
echo "Completed volume-detach in $((end_time - start_time)) seconds"
|
|
|
|
# Delete volume
|
|
start_time=$(date +%s)
|
|
cinder delete $VOL_ID || die $LINENO "Failure deleting volume $VOL_NAME"
|
|
if ! timeout $ACTIVE_TIMEOUT sh -c "while cinder list | grep $VOL_NAME; do sleep 1; done"; then
|
|
die $LINENO "Volume $VOL_NAME not deleted"
|
|
fi
|
|
end_time=$(date +%s)
|
|
echo "Completed cinder delete in $((end_time - start_time)) seconds"
|
|
|
|
# Delete instance
|
|
nova delete $VM_UUID || die $LINENO "Failure deleting instance $VM_NAME"
|
|
if ! timeout $TERMINATE_TIMEOUT sh -c "while nova list | grep -q $VM_UUID; do sleep 1; done"; then
|
|
die $LINENO "Server $VM_NAME not deleted"
|
|
fi
|
|
|
|
if [[ $SECGROUP = "default" ]] ; then
|
|
echo "Skipping deleting default security group"
|
|
else
|
|
# Delete secgroup
|
|
nova secgroup-delete $SECGROUP || die $LINENO "Failure deleting security group $SECGROUP"
|
|
fi
|
|
|
|
set +o xtrace
|
|
echo "*********************************************************************"
|
|
echo "SUCCESS: End DevStack Exercise: $0"
|
|
echo "*********************************************************************"
|