e38b07ae033d3c0548c402b7bea239fdda3318f6
[releng/builder.git] / jjb / integration / common-functions.sh
1 #!/bin/bash
2
3 echo "common-functions.sh is being sourced"
4
5 BUNDLEFOLDER=$1
6
7 # Basic controller configuration settings
8 export MAVENCONF=/tmp/${BUNDLEFOLDER}/etc/org.ops4j.pax.url.mvn.cfg
9 export FEATURESCONF=/tmp/${BUNDLEFOLDER}/etc/org.apache.karaf.features.cfg
10 export CUSTOMPROP=/tmp/${BUNDLEFOLDER}/etc/custom.properties
11 export LOGCONF=/tmp/${BUNDLEFOLDER}/etc/org.ops4j.pax.logging.cfg
12 export MEMCONF=/tmp/${BUNDLEFOLDER}/bin/setenv
13 export CONTROLLERMEM="2048m"
14
15 # Cluster specific configuration settings
16 export AKKACONF=/tmp/${BUNDLEFOLDER}/configuration/initial/akka.conf
17 export MODULESCONF=/tmp/${BUNDLEFOLDER}/configuration/initial/modules.conf
18 export MODULESHARDSCONF=/tmp/${BUNDLEFOLDER}/configuration/initial/module-shards.conf
19
20 function print_common_env() {
21     cat << EOF
22 common-functions environment:
23 MAVENCONF: ${MAVENCONF}
24 ACTUALFEATURES: ${ACTUALFEATURES}
25 FEATURESCONF: ${FEATURESCONF}
26 CUSTOMPROP: ${CUSTOMPROP}
27 LOGCONF: ${LOGCONF}
28 MEMCONF: ${MEMCONF}
29 CONTROLLERMEM: ${CONTROLLERMEM}
30 AKKACONF: ${AKKACONF}
31 MODULESCONF: ${MODULESCONF}
32 MODULESHARDSCONF: ${MODULESHARDSCONF}
33 SUITES: ${SUITES}
34
35 EOF
36 }
37 print_common_env
38
39 # Setup JAVA_HOME and MAX_MEM Value in ODL startup config file
40 function set_java_vars() {
41     local -r java_home=$1
42     local -r controllermem=$2
43     local -r memconf=$3
44
45     echo "Configure"
46     echo "    java home: ${java_home}"
47     echo "    max memory: ${controllermem}"
48     echo "    memconf: ${memconf}"
49
50     # We do not want expressions to expand here.
51     # shellcheck disable=SC2016
52     sed -ie 's%^# export JAVA_HOME%export JAVA_HOME=${JAVA_HOME:-'"${java_home}"'}%g' "${memconf}"
53     sed -ie 's/JAVA_MAX_MEM="2048m"/JAVA_MAX_MEM='"${controllermem}"'/g' "${memconf}"
54     echo "cat ${memconf}"
55     cat "${memconf}"
56
57     echo "Set Java version"
58     sudo /usr/sbin/alternatives --install /usr/bin/java java "${java_home}/bin/java" 1
59     sudo /usr/sbin/alternatives --set java "${java_home}/bin/java"
60     echo "JDK default version ..."
61     java -version
62
63     echo "Set JAVA_HOME"
64     export JAVA_HOME="${java_home}"
65
66     # shellcheck disable=SC2037
67     JAVA_RESOLVED=$(readlink -e "${java_home}/bin/java")
68     echo "Java binary pointed at by JAVA_HOME: ${JAVA_RESOLVED}"
69 } # set_java_vars()
70
71 # shellcheck disable=SC2034
72 # foo appears unused. Verify it or export it.
73 function configure_karaf_log() {
74     local -r karaf_version=$1
75     local -r controllerdebugmap=$2
76     local logapi=log4j
77
78     # Check what the logging.cfg file is using for the logging api: log4j or log4j2
79     if grep "log4j2" "${LOGCONF}"; then
80         logapi=log4j2
81     fi
82
83     echo "Configuring the karaf log... karaf_version: ${karaf_version}, logapi: ${logapi}"
84     if [ "${logapi}" == "log4j2" ]; then
85         # FIXME: Make log size limit configurable from build parameter.
86         # From Neon the default karaf file size is 64 MB
87         sed -ie 's/log4j2.appender.rolling.policies.size.size = 64MB/log4j2.appender.rolling.policies.size.size = 1GB/g' "${LOGCONF}"
88         # Flourine still uses 16 MB
89         sed -ie 's/log4j2.appender.rolling.policies.size.size = 16MB/log4j2.appender.rolling.policies.size.size = 1GB/g' "${LOGCONF}"
90         orgmodule="org.opendaylight.yangtools.yang.parser.repo.YangTextSchemaContextResolver"
91         orgmodule_="${orgmodule//./_}"
92         echo "${logapi}.logger.${orgmodule_}.name = WARN" >> "${LOGCONF}"
93         echo "${logapi}.logger.${orgmodule_}.level = WARN" >> "${LOGCONF}"
94     else
95         sed -ie 's/log4j.appender.out.maxBackupIndex=10/log4j.appender.out.maxBackupIndex=1/g' "${LOGCONF}"
96         # FIXME: Make log size limit configurable from build parameter.
97         sed -ie 's/log4j.appender.out.maxFileSize=1MB/log4j.appender.out.maxFileSize=30GB/g' "${LOGCONF}"
98         echo "${logapi}.logger.org.opendaylight.yangtools.yang.parser.repo.YangTextSchemaContextResolver = WARN" >> "${LOGCONF}"
99     fi
100
101     # Add custom logging levels
102     # CONTROLLERDEBUGMAP is expected to be a key:value map of space separated
103     # values like "module:level module2:level2" where module is abbreviated and
104     # does not include "org.opendaylight."
105     unset IFS
106     echo "controllerdebugmap: ${controllerdebugmap}"
107     if [ -n "${controllerdebugmap}" ]; then
108         for kv in ${controllerdebugmap}; do
109             module="${kv%%:*}"
110             level="${kv#*:}"
111             echo "module: $module, level: $level"
112             # shellcheck disable=SC2157
113             if [ -n "${module}" ] && [ -n "${level}" ]; then
114                 orgmodule="org.opendaylight.${module}"
115                 if [ "${logapi}" == "log4j2" ]; then
116                     orgmodule_="${orgmodule//./_}"
117                     echo "${logapi}.logger.${orgmodule_}.name = ${orgmodule}" >> "${LOGCONF}"
118                     echo "${logapi}.logger.${orgmodule_}.level = ${level}" >> "${LOGCONF}"
119                 else
120                     echo "${logapi}.logger.${orgmodule} = ${level}" >> "${LOGCONF}"
121                 fi
122             fi
123         done
124     fi
125
126     echo "cat ${LOGCONF}"
127     cat "${LOGCONF}"
128 } # function configure_karaf_log()
129
130 function configure_karaf_log_for_apex() {
131     # TODO: add the extra steps to this function to do any extra work
132     # in this apex environment like we do in our standard environment.
133     # EX: log size, rollover, etc.
134
135     # Modify ODL Log Levels, if needed, for new distribution. This will modify
136     # the control nodes hiera data which will be used during the puppet deploy
137     # CONTROLLERDEBUGMAP is expected to be a key:value map of space separated
138     # values like "module:level module2:level2" where module is abbreviated and
139     # does not include "org.opendaylight."
140
141     local -r controller_ip=$1
142
143     unset IFS
144     # shellcheck disable=SC2153
145     echo "CONTROLLERDEBUGMAP: ${CONTROLLERDEBUGMAP}"
146     if [ -n "${CONTROLLERDEBUGMAP}" ]; then
147         logging_config='\"opendaylight::log_levels\": {'
148         for kv in ${CONTROLLERDEBUGMAP}; do
149             module="${kv%%:*}"
150             level="${kv#*:}"
151             echo "module: $module, level: $level"
152             # shellcheck disable=SC2157
153             if [ -n "${module}" ] && [ -n "${level}" ]; then
154                 orgmodule="org.opendaylight.${module}"
155                 logging_config="${logging_config} \\\"${orgmodule}\\\": \\\"${level}\\\","
156             fi
157         done
158         # replace the trailing comma with a closing brace followed by trailing comma
159         logging_config=${logging_config%,}" },"
160         echo "$logging_config"
161
162         # fine a sane line number to inject the custom logging json
163         lineno=$(ssh "$OPENSTACK_CONTROL_NODE_1_IP" "sudo grep -Fn 'opendaylight::log_mechanism' /etc/puppet/hieradata/service_configs.json" | awk -F: '{print $1}')
164         # We purposely want these variables to expand client-side
165         # shellcheck disable=SC2029
166         ssh "$controller_ip" "sudo sed -i \"${lineno}i ${logging_config}\" /etc/puppet/hieradata/service_configs.json"
167         ssh "$controller_ip" "sudo cat /etc/puppet/hieradata/service_configs.json"
168     fi
169 } # function configure_karaf_log_for_apex()
170
171 function configure_odl_features_for_apex() {
172
173     # if the environment variable $ACTUALFEATURES is not null, then rewrite
174     # the puppet config file with the features given in that variable, otherwise
175     # this function is a noop
176
177     local -r controller_ip=$1
178     local -r config_file=/etc/puppet/hieradata/service_configs.json
179
180 cat > /tmp/set_odl_features.sh << EOF
181 sudo jq '.["opendaylight::extra_features"] |= []' $config_file > tmp.json && mv tmp.json $config_file
182 for feature in "\${ACTUALFEATURES//,/ }"; do
183     sudo jq --arg jq_arg \$feature '.["opendaylight::extra_features"] |= . + [\$jq_arg]' $config_file > tmp && mv tmp $config_file;
184 done
185 echo "Modified puppet-opendaylight service_configs.json..."
186 cat $config_file
187 EOF
188
189     echo "Feature configuration script..."
190     cat /tmp/set_odl_features.sh
191
192     if [ -n "${ACTUALFEATURES}" ]; then
193         scp /tmp/set_odl_features.sh "$controller_ip":/tmp/set_odl_features.sh
194         ssh "$controller_ip" "sudo bash /tmp/set_odl_features.sh"
195     fi
196
197 } # function configure_odl_features_for_apex()
198
199 function get_os_deploy() {
200     local -r num_systems=${1:-$NUM_OPENSTACK_SYSTEM}
201     case ${num_systems} in
202     1)
203         OPENSTACK_TOPO="1cmb-0ctl-0cmp"
204         ;;
205     2)
206         OPENSTACK_TOPO="1cmb-0ctl-1cmp"
207         ;;
208     3|*)
209         OPENSTACK_TOPO="0cmb-1ctl-2cmp"
210         ;;
211     esac
212     export OPENSTACK_TOPO
213 }
214
215 function get_test_suites() {
216
217     #let the caller pick the name of the variable we will assign the suites to
218     local __suite_list=$1
219
220     echo "Locating test plan to use..."
221     testplan_filepath="${WORKSPACE}/test/csit/testplans/${STREAMTESTPLAN}"
222     if [ ! -f "${testplan_filepath}" ]; then
223         testplan_filepath="${WORKSPACE}/test/csit/testplans/${TESTPLAN}"
224     fi
225
226     echo "Changing the testplan path..."
227     sed "s:integration:${WORKSPACE}:" "${testplan_filepath}" > testplan.txt
228     cat testplan.txt
229
230     # Use the testplan if specific SUITES are not defined.
231     if [ -z "${SUITES}" ]; then
232         suite_list=$(grep -E -v '(^[[:space:]]*#|^[[:space:]]*$)' testplan.txt | tr '\012' ' ')
233     else
234         suite_list=""
235         workpath="${WORKSPACE}/test/csit/suites"
236         for suite in ${SUITES}; do
237             fullsuite="${workpath}/${suite}"
238             if [ -z "${suite_list}" ]; then
239                 suite_list+=${fullsuite}
240             else
241                 suite_list+=" "${fullsuite}
242             fi
243         done
244     fi
245
246     eval "$__suite_list='$suite_list'"
247 }
248
249 function run_plan() {
250     local -r type=$1
251
252     case ${type} in
253     script)
254         plan=$SCRIPTPLAN
255         ;;
256     config|*)
257         plan=$CONFIGPLAN
258         ;;
259     esac
260
261     printf "Locating %s plan to use...\\n" "${type}"
262     plan_filepath="${WORKSPACE}/test/csit/${type}plans/$plan"
263     if [ ! -f "${plan_filepath}" ]; then
264         plan_filepath="${WORKSPACE}/test/csit/${type}plans/${STREAMTESTPLAN}"
265         if [ ! -f "${plan_filepath}" ]; then
266             plan_filepath="${WORKSPACE}/test/csit/${type}plans/${TESTPLAN}"
267         fi
268     fi
269
270     if [ -f "${plan_filepath}" ]; then
271         printf "%s plan exists!!!\\n" "${type}"
272         printf "Changing the %s plan path...\\n" "${type}"
273         sed "s:integration:${WORKSPACE}:" "${plan_filepath}" > "${type}plan.txt"
274         cat "${type}plan.txt"
275         # shellcheck disable=SC2013
276         for line in $( grep -E -v '(^[[:space:]]*#|^[[:space:]]*$)' "${type}plan.txt" ); do
277             printf "Executing %s...\\n" "${line}"
278             # shellcheck source=${line} disable=SC1091
279             source "${line}"
280         done
281     fi
282     printf "Finished running %s plans\\n" "${type}"
283 } # function run_plan()
284
285 # Return elapsed time. Usage:
286 # - Call first time with no arguments and a new timer is returned.
287 # - Next call with the first argument as the timer and the elapsed time is returned.
288 function timer()
289 {
290     if [ $# -eq 0 ]; then
291         # return the current time
292         printf "%s" "$(date "+%s")"
293     else
294         local start_time=$1
295         end_time=$(date "+%s")
296
297         if [ -z "$start_time" ]; then
298             start_time=$end_time;
299         fi
300
301         delta_time=$((end_time - start_time))
302         ds=$((delta_time % 60))
303         dm=$(((delta_time / 60) % 60))
304         dh=$((delta_time / 3600))
305         # return the elapsed time
306         printf "%d:%02d:%02d" $dh $dm $ds
307     fi
308 }
309
310 # convert commas in csv strings to spaces (ssv)
311 function csv2ssv() {
312     local csv=$1
313     if [ -n "${csv}" ]; then
314         ssv=$(echo "${csv}" | sed 's/,/ /g' | sed 's/\ \ */\ /g')
315     fi
316
317     echo "${ssv}"
318 } # csv2ssv
319
320 function is_openstack_feature_enabled() {
321     local feature=$1
322     for enabled_feature in $(csv2ssv "${ENABLE_OS_SERVICES}"); do
323         if [ "${enabled_feature}" == "${feature}" ]; then
324            echo 1
325            return
326         fi
327     done
328     echo 0
329 }
330
331 SSH="ssh -t -t"
332
333 # shellcheck disable=SC2153
334 function print_job_parameters() {
335     cat << EOF
336
337 Job parameters:
338 DISTROBRANCH: ${DISTROBRANCH}
339 DISTROSTREAM: ${DISTROSTREAM}
340 BUNDLE_URL: ${BUNDLE_URL}
341 CONTROLLERFEATURES: ${CONTROLLERFEATURES}
342 CONTROLLERDEBUGMAP: ${CONTROLLERDEBUGMAP}
343 SCRIPTPLAN: ${SCRIPTPLAN}
344 CONFIGPLAN: ${CONFIGPLAN}
345 STREAMTESTPLAN: ${STREAMTESTPLAN}
346 TESTPLAN: ${TESTPLAN}
347 SUITES: ${SUITES}
348 PATCHREFSPEC: ${PATCHREFSPEC}
349 OPENSTACK_BRANCH: ${OPENSTACK_BRANCH}
350 DEVSTACK_HASH: ${DEVSTACK_HASH}
351 ODL_ML2_DRIVER_REPO: ${ODL_ML2_DRIVER_REPO}
352 ODL_ML2_BRANCH: ${ODL_ML2_BRANCH}
353 ODL_ML2_DRIVER_VERSION: ${ODL_ML2_DRIVER_VERSION}
354 ODL_ML2_PORT_BINDING: ${ODL_ML2_PORT_BINDING}
355 DEVSTACK_KUBERNETES_PLUGIN_REPO: ${DEVSTACK_KUBERNETES_PLUGIN_REPO}
356 DEVSTACK_LBAAS_PLUGIN_REPO: ${DEVSTACK_LBAAS_PLUGIN_REPO}
357 DEVSTACK_NETWORKING_SFC_PLUGIN_REPO: ${DEVSTACK_NETWORKING_SFC_PLUGIN_REPO}
358 IPSEC_VXLAN_TUNNELS_ENABLED: ${IPSEC_VXLAN_TUNNELS_ENABLED}
359 PUBLIC_BRIDGE: ${PUBLIC_BRIDGE}
360 ENABLE_HAPROXY_FOR_NEUTRON: ${ENABLE_HAPROXY_FOR_NEUTRON}
361 ENABLE_OS_SERVICES: ${ENABLE_OS_SERVICES}
362 ENABLE_OS_COMPUTE_SERVICES: ${ENABLE_OS_COMPUTE_SERVICES}
363 ENABLE_OS_NETWORK_SERVICES: ${ENABLE_OS_NETWORK_SERVICES}
364 ENABLE_OS_PLUGINS: ${ENABLE_OS_PLUGINS}
365 DISABLE_OS_SERVICES: ${DISABLE_OS_SERVICES}
366 TENANT_NETWORK_TYPE: ${TENANT_NETWORK_TYPE}
367 SECURITY_GROUP_MODE: ${SECURITY_GROUP_MODE}
368 ENABLE_ITM_DIRECT_TUNNELS: ${ENABLE_ITM_DIRECT_TUNNELS}
369 PUBLIC_PHYSICAL_NETWORK: ${PUBLIC_PHYSICAL_NETWORK}
370 ENABLE_NETWORKING_L2GW: ${ENABLE_NETWORKING_L2GW}
371 CREATE_INITIAL_NETWORKS: ${CREATE_INITIAL_NETWORKS}
372 LBAAS_SERVICE_PROVIDER: ${LBAAS_SERVICE_PROVIDER}
373 ODL_SFC_DRIVER: ${ODL_SFC_DRIVER}
374 ODL_SNAT_MODE: ${ODL_SNAT_MODE}
375
376 EOF
377 }
378
379 function tcpdump_start() {
380     local -r prefix=$1
381     local -r ip=$2
382     local -r filter=$3
383     filter_=${filter// /_}
384
385     printf "node %s, %s_%s__%s: starting tcpdump\\n" "${ip}" "${prefix}" "${ip}" "${filter}"
386     # $fileter needs to be parsed client-side
387     # shellcheck disable=SC2029
388     ssh "${ip}" "nohup sudo /usr/sbin/tcpdump -vvv -ni eth0 ${filter} -w /tmp/tcpdump_${prefix}_${ip}__${filter_}.pcap > /tmp/tcpdump_start.log 2>&1 &"
389     ${SSH} "${ip}" "ps -ef | grep tcpdump"
390 }
391
392 function tcpdump_stop() {
393     local -r ip=$1
394
395     printf "node %s: stopping tcpdump\\n" "$ip"
396     ${SSH} "${ip}" "ps -ef | grep tcpdump.sh"
397     ${SSH} "${ip}" "sudo pkill -f tcpdump"
398     ${SSH} "${ip}" "sudo xz -9ekvvf /tmp/*.pcap"
399     ${SSH} "${ip}" "sudo ls -al /tmp/*.pcap"
400     # copy_logs will copy any *.xz files
401 }
402
403 # Collect the list of files on the hosts
404 function collect_files() {
405     local -r ip=$1
406     local -r folder=$2
407     finddir=/tmp/finder
408     ${SSH} "${ip}" "mkdir -p ${finddir}"
409     ${SSH} "${ip}" "sudo find /etc > ${finddir}/find.etc.txt"
410     ${SSH} "${ip}" "sudo find /opt/stack > ${finddir}/find.opt.stack.txt"
411     ${SSH} "${ip}" "sudo find /var > ${finddir}/find2.txt"
412     ${SSH} "${ip}" "sudo find /var > ${finddir}/find.var.txt"
413     ${SSH} "${ip}" "sudo tar -cf - -C /tmp finder | xz -T 0 > /tmp/find.tar.xz"
414     scp "${ip}":/tmp/find.tar.xz "${folder}"
415     mkdir -p "${finddir}"
416     rsync --rsync-path="sudo rsync" --list-only -arvhe ssh "${ip}":/etc/ > "${finddir}"/rsync.etc.txt
417     rsync --rsync-path="sudo rsync" --list-only -arvhe ssh "${ip}":/opt/stack/ > "${finddir}"/rsync.opt.stack.txt
418     rsync --rsync-path="sudo rsync" --list-only -arvhe ssh "${ip}":/var/ > "${finddir}"/rsync.var.txt
419     tar -cf - -C /tmp finder | xz -T 0 > /tmp/rsync.tar.xz
420     cp /tmp/rsync.tar.xz "${folder}"
421 }
422
423 # List of extra services to extract from journalctl
424 # Add new services on a separate line, in alpha order, add \ at the end
425 extra_services_cntl=" \
426     dnsmasq.service \
427     httpd.service \
428     libvirtd.service \
429     openvswitch.service \
430     ovs-vswitchd.service \
431     ovsdb-server.service \
432     rabbitmq-server.service \
433 "
434
435 extra_services_cmp=" \
436     libvirtd.service \
437     openvswitch.service \
438     ovs-vswitchd.service \
439     ovsdb-server.service \
440 "
441
442 # Collect the logs for the openstack services
443 # First get all the services started by devstack which would have devstack@ as a prefix
444 # Next get all the extra services
445 function collect_openstack_logs() {
446     local -r ip=${1}
447     local -r folder=${2}
448     local -r node_type=${3}
449     local oslogs="${folder}/oslogs"
450
451     printf "collect_openstack_logs for %s node: %s into %s\\n" "${node_type}" "${ip}" "${oslogs}"
452     rm -rf "${oslogs}"
453     mkdir -p "${oslogs}"
454     # There are always some logs in /opt/stack/logs and this also covers the
455     # pre-queens branches which always use /opt/stack/logs
456     rsync -avhe ssh "${ip}":/opt/stack/logs/* "${oslogs}" # rsync to prevent copying of symbolic links
457
458     # Starting with queens break out the logs from journalctl
459     if [ "${OPENSTACK_BRANCH}" = "stable/queens" ]; then
460         cat > "${WORKSPACE}"/collect_openstack_logs.sh << EOF
461 extra_services_cntl="${extra_services_cntl}"
462 extra_services_cmp="${extra_services_cmp}"
463
464 function extract_from_journal() {
465     local -r services=\${1}
466     local -r folder=\${2}
467     local -r node_type=\${3}
468     printf "extract_from_journal folder: \${folder}, services: \${services}\\n"
469     for service in \${services}; do
470         # strip anything before @ and anything after .
471         # devstack@g-api.service will end as g-api
472         service_="\${service#*@}"
473         service_="\${service_%.*}"
474         sudo journalctl -u "\${service}" > "\${folder}/\${service_}.log"
475     done
476 }
477
478 rm -rf /tmp/oslogs
479 mkdir -p /tmp/oslogs
480 systemctl list-unit-files --all > /tmp/oslogs/systemctl.units.log 2>&1
481 svcs=\$(grep devstack@ /tmp/oslogs/systemctl.units.log | awk '{print \$1}')
482 extract_from_journal "\${svcs}" "/tmp/oslogs"
483 if [ "\${node_type}" = "control" ]; then
484     extract_from_journal "\${extra_services_cntl}" "/tmp/oslogs"
485 else
486     extract_from_journal "\${extra_services_cmp}" "/tmp/oslogs"
487 fi
488 ls -al /tmp/oslogs
489 EOF
490 # cat > ${WORKSPACE}/collect_openstack_logs.sh << EOF
491         printf "collect_openstack_logs for %s node: %s into %s, executing script\\n" "${node_type}" "${ip}" "${oslogs}"
492         cat "${WORKSPACE}"/collect_openstack_logs.sh
493         scp "${WORKSPACE}"/collect_openstack_logs.sh "${ip}":/tmp
494         ${SSH} "${ip}" "bash /tmp/collect_openstack_logs.sh > /tmp/collect_openstack_logs.log 2>&1"
495         rsync -avhe ssh "${ip}":/tmp/oslogs/* "${oslogs}"
496         scp "${ip}":/tmp/collect_openstack_logs.log "${oslogs}"
497     fi # if [ "${OPENSTACK_BRANCH}" = "stable/queens" ]; then
498 }
499
500 function collect_netvirt_logs() {
501     set +e  # We do not want to create red dot just because something went wrong while fetching logs.
502
503     cat > extra_debug.sh << EOF
504 echo -e "/usr/sbin/lsmod | /usr/bin/grep openvswitch\\n"
505 /usr/sbin/lsmod | /usr/bin/grep openvswitch
506 echo -e "\\nsudo grep ct_ /var/log/openvswitch/ovs-vswitchd.log\\n"
507 sudo grep "Datapath supports" /var/log/openvswitch/ovs-vswitchd.log
508 echo -e "\\nsudo netstat -punta\\n"
509 sudo netstat -punta
510 echo -e "\\nsudo getenforce\\n"
511 sudo getenforce
512 echo -e "\\nsudo systemctl status httpd\\n"
513 sudo systemctl status httpd
514 echo -e "\\nenv\\n"
515 env
516 source /opt/stack/devstack/openrc admin admin
517 echo -e "\\nenv after openrc\\n"
518 env
519 echo -e "\\nsudo du -hs /opt/stack"
520 sudo du -hs /opt/stack
521 echo -e "\\nsudo mount"
522 sudo mount
523 echo -e "\\ndmesg -T > /tmp/dmesg.log"
524 dmesg -T > /tmp/dmesg.log
525 echo -e "\\njournalctl > /tmp/journalctl.log\\n"
526 sudo journalctl > /tmp/journalctl.log
527 echo -e "\\novsdb-tool -mm show-log > /tmp/ovsdb-tool.log"
528 ovsdb-tool -mm show-log > /tmp/ovsdb-tool.log
529 EOF
530
531     # Since this log collection work is happening before the archive build macro which also
532     # creates the ${WORKSPACE}/archives dir, we have to do it here first.  The mkdir in the
533     # archives build step will essentially be a noop.
534     mkdir -p "${WORKSPACE}"/archives
535
536     mv /tmp/changes.txt "${WORKSPACE}"/archives
537     mv /tmp/validations.txt "${WORKSPACE}"/archives
538     mv "${WORKSPACE}"/rabbit.txt "${WORKSPACE}"/archives
539     mv "${WORKSPACE}"/haproxy.cfg "${WORKSPACE}"/archives
540     ssh "${OPENSTACK_HAPROXY_1_IP}" "sudo journalctl -u haproxy > /tmp/haproxy.log"
541     scp "${OPENSTACK_HAPROXY_1_IP}":/tmp/haproxy.log "${WORKSPACE}"/archives/
542
543     sleep 5
544     # FIXME: Do not create .tar and gzip before copying.
545     for i in $(seq 1 "${NUM_ODL_SYSTEM}"); do
546         CONTROLLERIP=ODL_SYSTEM_${i}_IP
547         echo "collect_logs: for opendaylight controller ip: ${!CONTROLLERIP}"
548         NODE_FOLDER="odl_${i}"
549         mkdir -p "${NODE_FOLDER}"
550         echo "Lets's take the karaf thread dump again..."
551         ssh "${!CONTROLLERIP}" "sudo ps aux" > "${WORKSPACE}"/ps_after.log
552         pid=$(grep org.apache.karaf.main.Main "${WORKSPACE}"/ps_after.log | grep -v grep | tr -s ' ' | cut -f2 -d' ')
553         echo "karaf main: org.apache.karaf.main.Main, pid:${pid}"
554         # $pid needs to be parsed client-side
555         # shellcheck disable=SC2029
556         ssh "${!CONTROLLERIP}" "${JAVA_HOME}/bin/jstack -l ${pid}" > "${WORKSPACE}/karaf_${i}_${pid}_threads_after.log" || true
557         echo "killing karaf process..."
558         # shellcheck disable=SC2016
559         ${SSH} "${!CONTROLLERIP}" bash -c 'ps axf | grep karaf | grep -v grep | awk '"'"'{print "kill -9 " $1}'"'"' | sh'
560         ${SSH} "${!CONTROLLERIP}" "sudo journalctl > /tmp/journalctl.log"
561         scp "${!CONTROLLERIP}":/tmp/journalctl.log "${NODE_FOLDER}"
562         ${SSH} "${!CONTROLLERIP}" "dmesg -T > /tmp/dmesg.log"
563         scp "${!CONTROLLERIP}":/tmp/dmesg.log "${NODE_FOLDER}"
564         ${SSH} "${!CONTROLLERIP}" "tar -cf - -C /tmp/${BUNDLEFOLDER} etc | xz -T 0 > /tmp/etc.tar.xz"
565         scp "${!CONTROLLERIP}":/tmp/etc.tar.xz "${NODE_FOLDER}"
566         ${SSH} "${!CONTROLLERIP}" "cp -r /tmp/${BUNDLEFOLDER}/data/log /tmp/odl_log"
567         ${SSH} "${!CONTROLLERIP}" "tar -cf /tmp/odl${i}_karaf.log.tar /tmp/odl_log/*"
568         scp "${!CONTROLLERIP}:/tmp/odl${i}_karaf.log.tar" "${NODE_FOLDER}"
569         ${SSH} "${!CONTROLLERIP}" "tar -cf /tmp/odl${i}_zrpcd.log.tar /tmp/zrpcd.init.log"
570         scp "${!CONTROLLERIP}:/tmp/odl${i}_zrpcd.log.tar" "${NODE_FOLDER}"
571         tar -xvf "${NODE_FOLDER}/odl${i}_karaf.log.tar" -C "${NODE_FOLDER}" --strip-components 2 --transform "s/karaf/odl${i}_karaf/g"
572         grep "ROBOT MESSAGE\\| ERROR " "${NODE_FOLDER}/odl${i}_karaf.log" > "${NODE_FOLDER}/odl${i}_err.log"
573         grep "ROBOT MESSAGE\\| ERROR \\| WARN \\|Exception" \
574             "${NODE_FOLDER}/odl${i}_karaf.log" > "${NODE_FOLDER}/odl${i}_err_warn_exception.log"
575         # Print ROBOT lines and print Exception lines. For exception lines also print the previous line for context
576         sed -n -e '/ROBOT MESSAGE/P' -e '$!N;/Exception/P;D' "${NODE_FOLDER}/odl${i}_karaf.log" > "${NODE_FOLDER}/odl${i}_exception.log"
577         mv "/tmp/odl${i}_exceptions.txt" "${NODE_FOLDER}"
578         rm "${NODE_FOLDER}/odl${i}_karaf.log.tar"
579         mv -- *_threads* "${NODE_FOLDER}"
580         mv ps_* "${NODE_FOLDER}"
581         mv "${NODE_FOLDER}" "${WORKSPACE}"/archives/
582     done
583
584     print_job_parameters > "${WORKSPACE}"/archives/params.txt
585
586     # Control Node
587     for i in $(seq 1 "${NUM_OPENSTACK_CONTROL_NODES}"); do
588         OSIP=OPENSTACK_CONTROL_NODE_${i}_IP
589         if [ "$(is_openstack_feature_enabled n-cpu)" == "1" ]; then
590             echo "collect_logs: for openstack combo node ip: ${!OSIP}"
591             NODE_FOLDER="combo_${i}"
592         else
593             echo "collect_logs: for openstack control node ip: ${!OSIP}"
594             NODE_FOLDER="control_${i}"
595         fi
596         mkdir -p "${NODE_FOLDER}"
597         tcpdump_stop "${!OSIP}"
598         scp extra_debug.sh "${!OSIP}":/tmp
599         # Capture compute logs if this is a combo node
600         if [ "$(is_openstack_feature_enabled n-cpu)" == "1" ]; then
601             scp "${!OSIP}":/etc/nova/nova.conf "${NODE_FOLDER}"
602             scp "${!OSIP}":/etc/nova/nova-cpu.conf "${NODE_FOLDER}"
603             scp "${!OSIP}":/etc/openstack/clouds.yaml "${NODE_FOLDER}"
604             rsync --rsync-path="sudo rsync" -avhe ssh "${!OSIP}":/var/log/nova-agent.log "${NODE_FOLDER}"
605         fi
606         ${SSH} "${!OSIP}" "bash /tmp/extra_debug.sh > /tmp/extra_debug.log 2>&1"
607         scp "${!OSIP}":/etc/dnsmasq.conf "${NODE_FOLDER}"
608         scp "${!OSIP}":/etc/keystone/keystone.conf "${NODE_FOLDER}"
609         scp "${!OSIP}":/etc/keystone/keystone-uwsgi-admin.ini "${NODE_FOLDER}"
610         scp "${!OSIP}":/etc/keystone/keystone-uwsgi-public.ini "${NODE_FOLDER}"
611         scp "${!OSIP}":/etc/kuryr/kuryr.conf "${NODE_FOLDER}"
612         scp "${!OSIP}":/etc/neutron/dhcp_agent.ini "${NODE_FOLDER}"
613         scp "${!OSIP}":/etc/neutron/metadata_agent.ini "${NODE_FOLDER}"
614         scp "${!OSIP}":/etc/neutron/neutron.conf "${NODE_FOLDER}"
615         scp "${!OSIP}":/etc/neutron/neutron_lbaas.conf "${NODE_FOLDER}"
616         scp "${!OSIP}":/etc/neutron/plugins/ml2/ml2_conf.ini "${NODE_FOLDER}"
617         scp "${!OSIP}":/etc/neutron/services/loadbalancer/haproxy/lbaas_agent.ini "${NODE_FOLDER}"
618         scp "${!OSIP}":/etc/nova/nova.conf "${NODE_FOLDER}"
619         scp "${!OSIP}":/etc/nova/nova-api-uwsgi.ini "${NODE_FOLDER}"
620         scp "${!OSIP}":/etc/nova/nova_cell1.conf "${NODE_FOLDER}"
621         scp "${!OSIP}":/etc/nova/nova-cpu.conf "${NODE_FOLDER}"
622         scp "${!OSIP}":/etc/nova/placement-uwsgi.ini "${NODE_FOLDER}"
623         scp "${!OSIP}":/etc/openstack/clouds.yaml "${NODE_FOLDER}"
624         scp "${!OSIP}":/opt/stack/devstack/.stackenv "${NODE_FOLDER}"
625         scp "${!OSIP}":/opt/stack/devstack/nohup.out "${NODE_FOLDER}"/stack.log
626         scp "${!OSIP}":/opt/stack/devstack/openrc "${NODE_FOLDER}"
627         scp "${!OSIP}":/opt/stack/requirements/upper-constraints.txt "${NODE_FOLDER}"
628         scp "${!OSIP}":/opt/stack/tempest/etc/tempest.conf "${NODE_FOLDER}"
629         scp "${!OSIP}":/tmp/*.xz "${NODE_FOLDER}"
630         scp "${!OSIP}":/tmp/dmesg.log "${NODE_FOLDER}"
631         scp "${!OSIP}":/tmp/extra_debug.log "${NODE_FOLDER}"
632         scp "${!OSIP}":/tmp/get_devstack.sh.txt "${NODE_FOLDER}"
633         scp "${!OSIP}":/tmp/install_ovs.txt "${NODE_FOLDER}"
634         scp "${!OSIP}":/tmp/journalctl.log "${NODE_FOLDER}"
635         scp "${!OSIP}":/tmp/ovsdb-tool.log "${NODE_FOLDER}"
636         scp "${!OSIP}":/tmp/tcpdump_start.log "${NODE_FOLDER}"
637         collect_files "${!OSIP}" "${NODE_FOLDER}"
638         ${SSH} "${!OSIP}" "sudo tar -cf - -C /var/log rabbitmq | xz -T 0 > /tmp/rabbitmq.tar.xz "
639         scp "${!OSIP}":/tmp/rabbitmq.tar.xz "${NODE_FOLDER}"
640         rsync --rsync-path="sudo rsync" -avhe ssh "${!OSIP}":/etc/hosts "${NODE_FOLDER}"
641         rsync --rsync-path="sudo rsync" -avhe ssh "${!OSIP}":/usr/lib/systemd/system/haproxy.service "${NODE_FOLDER}"
642         rsync --rsync-path="sudo rsync" -avhe ssh "${!OSIP}":/var/log/audit/audit.log "${NODE_FOLDER}"
643         rsync --rsync-path="sudo rsync" -avhe ssh "${!OSIP}":/var/log/httpd/keystone_access.log "${NODE_FOLDER}"
644         rsync --rsync-path="sudo rsync" -avhe ssh "${!OSIP}":/var/log/httpd/keystone.log "${NODE_FOLDER}"
645         rsync --rsync-path="sudo rsync" -avhe ssh "${!OSIP}":/var/log/messages* "${NODE_FOLDER}"
646         rsync --rsync-path="sudo rsync" -avhe ssh "${!OSIP}":/var/log/openvswitch/ovs-vswitchd.log "${NODE_FOLDER}"
647         rsync --rsync-path="sudo rsync" -avhe ssh "${!OSIP}":/var/log/openvswitch/ovsdb-server.log "${NODE_FOLDER}"
648         collect_openstack_logs "${!OSIP}" "${NODE_FOLDER}" "control"
649         mv "local.conf_control_${!OSIP}" "${NODE_FOLDER}/local.conf"
650         # qdhcp files are created by robot tests and copied into /tmp/qdhcp during the test
651         tar -cf - -C /tmp qdhcp | xz -T 0 > /tmp/qdhcp.tar.xz
652         mv /tmp/qdhcp.tar.xz "${NODE_FOLDER}"
653         mv "${NODE_FOLDER}" "${WORKSPACE}"/archives/
654     done
655
656     # Compute Nodes
657     for i in $(seq 1 "${NUM_OPENSTACK_COMPUTE_NODES}"); do
658         OSIP="OPENSTACK_COMPUTE_NODE_${i}_IP"
659         echo "collect_logs: for openstack compute node ip: ${!OSIP}"
660         NODE_FOLDER="compute_${i}"
661         mkdir -p "${NODE_FOLDER}"
662         tcpdump_stop "${!OSIP}"
663         scp extra_debug.sh "${!OSIP}":/tmp
664         ${SSH} "${!OSIP}" "bash /tmp/extra_debug.sh > /tmp/extra_debug.log 2>&1"
665         scp "${!OSIP}":/etc/nova/nova.conf "${NODE_FOLDER}"
666         scp "${!OSIP}":/etc/nova/nova-cpu.conf "${NODE_FOLDER}"
667         scp "${!OSIP}":/etc/openstack/clouds.yaml "${NODE_FOLDER}"
668         scp "${!OSIP}":/opt/stack/devstack/.stackenv "${NODE_FOLDER}"
669         scp "${!OSIP}":/opt/stack/devstack/nohup.out "${NODE_FOLDER}"/stack.log
670         scp "${!OSIP}":/opt/stack/devstack/openrc "${NODE_FOLDER}"
671         scp "${!OSIP}":/opt/stack/requirements/upper-constraints.txt "${NODE_FOLDER}"
672         scp "${!OSIP}":/tmp/*.xz "${NODE_FOLDER}"/
673         scp "${!OSIP}":/tmp/dmesg.log "${NODE_FOLDER}"
674         scp "${!OSIP}":/tmp/extra_debug.log "${NODE_FOLDER}"
675         scp "${!OSIP}":/tmp/get_devstack.sh.txt "${NODE_FOLDER}"
676         scp "${!OSIP}":/tmp/install_ovs.txt "${NODE_FOLDER}"
677         scp "${!OSIP}":/tmp/journalctl.log "${NODE_FOLDER}"
678         scp "${!OSIP}":/tmp/ovsdb-tool.log "${NODE_FOLDER}"
679         scp "${!OSIP}":/tmp/tcpdump_start.log "${NODE_FOLDER}"
680         collect_files "${!OSIP}" "${NODE_FOLDER}"
681         ${SSH} "${!OSIP}" "sudo tar -cf - -C /var/log libvirt | xz -T 0 > /tmp/libvirt.tar.xz "
682         scp "${!OSIP}":/tmp/libvirt.tar.xz "${NODE_FOLDER}"
683         rsync --rsync-path="sudo rsync" -avhe ssh "${!OSIP}":/etc/hosts "${NODE_FOLDER}"
684         rsync --rsync-path="sudo rsync" -avhe ssh "${!OSIP}":/var/log/audit/audit.log "${NODE_FOLDER}"
685         rsync --rsync-path="sudo rsync" -avhe ssh "${!OSIP}":/var/log/messages* "${NODE_FOLDER}"
686         rsync --rsync-path="sudo rsync" -avhe ssh "${!OSIP}":/var/log/nova-agent.log "${NODE_FOLDER}"
687         rsync --rsync-path="sudo rsync" -avhe ssh "${!OSIP}":/var/log/openvswitch/ovs-vswitchd.log "${NODE_FOLDER}"
688         rsync --rsync-path="sudo rsync" -avhe ssh "${!OSIP}":/var/log/openvswitch/ovsdb-server.log "${NODE_FOLDER}"
689         collect_openstack_logs "${!OSIP}" "${NODE_FOLDER}" "compute"
690         mv "local.conf_compute_${!OSIP}" "${NODE_FOLDER}"/local.conf
691         mv "${NODE_FOLDER}" "${WORKSPACE}"/archives/
692     done
693
694     # Tempest
695     DEVSTACK_TEMPEST_DIR="/opt/stack/tempest"
696     TESTREPO=".stestr"
697     TEMPEST_LOGS_DIR="${WORKSPACE}/archives/tempest"
698     # Look for tempest test results in the $TESTREPO dir and copy if found
699     if ${SSH} "${OPENSTACK_CONTROL_NODE_1_IP}" "sudo sh -c '[ -f ${DEVSTACK_TEMPEST_DIR}/${TESTREPO}/0 ]'"; then
700         ${SSH} "${OPENSTACK_CONTROL_NODE_1_IP}" "for I in \$(sudo ls ${DEVSTACK_TEMPEST_DIR}/${TESTREPO}/ | grep -E '^[0-9]+$'); do sudo sh -c \"${DEVSTACK_TEMPEST_DIR}/.tox/tempest/bin/subunit-1to2 < ${DEVSTACK_TEMPEST_DIR}/${TESTREPO}/\${I} >> ${DEVSTACK_TEMPEST_DIR}/subunit_log.txt\"; done"
701         ${SSH} "${OPENSTACK_CONTROL_NODE_1_IP}" "sudo sh -c '${DEVSTACK_TEMPEST_DIR}/.tox/tempest/bin/python ${DEVSTACK_TEMPEST_DIR}/.tox/tempest/lib/python2.7/site-packages/os_testr/subunit2html.py ${DEVSTACK_TEMPEST_DIR}/subunit_log.txt ${DEVSTACK_TEMPEST_DIR}/tempest_results.html'"
702         mkdir -p "${TEMPEST_LOGS_DIR}"
703         scp "${OPENSTACK_CONTROL_NODE_1_IP}:${DEVSTACK_TEMPEST_DIR}/tempest_results.html" "${TEMPEST_LOGS_DIR}"
704         scp "${OPENSTACK_CONTROL_NODE_1_IP}:${DEVSTACK_TEMPEST_DIR}/tempest.log" "${TEMPEST_LOGS_DIR}"
705     else
706         echo "tempest results not found in ${DEVSTACK_TEMPEST_DIR}/${TESTREPO}/0"
707     fi
708 } # collect_netvirt_logs()
709
710 # Utility function for joining strings.
711 function join() {
712     delim=' '
713     final=$1; shift
714
715     for str in "$@" ; do
716         final=${final}${delim}${str}
717     done
718
719     echo "${final}"
720 }
721
722 function get_nodes_list() {
723     # Create the string for nodes
724     for i in $(seq 1 "${NUM_ODL_SYSTEM}") ; do
725         CONTROLLERIP=ODL_SYSTEM_${i}_IP
726         nodes[$i]=${!CONTROLLERIP}
727     done
728
729     nodes_list=$(join "${nodes[@]}")
730     echo "${nodes_list}"
731 }
732
733 function get_features() {
734     if [ "${CONTROLLERSCOPE}" == 'all' ]; then
735         ACTUALFEATURES="odl-integration-compatible-with-all,${CONTROLLERFEATURES}"
736         export CONTROLLERMEM="3072m"
737     else
738         ACTUALFEATURES="odl-infrautils-ready,${CONTROLLERFEATURES}"
739     fi
740
741     # Some versions of jenkins job builder result in feature list containing spaces
742     # and ending in newline. Remove all that.
743     ACTUALFEATURES=$(echo "${ACTUALFEATURES}" | tr -d '\n \r')
744     echo "ACTUALFEATURES: ${ACTUALFEATURES}"
745
746     # In the case that we want to install features via karaf shell, a space separated list of
747     # ACTUALFEATURES IS NEEDED
748     SPACE_SEPARATED_FEATURES=$(echo "${ACTUALFEATURES}" | tr ',' ' ')
749     echo "SPACE_SEPARATED_FEATURES: ${SPACE_SEPARATED_FEATURES}"
750
751     export ACTUALFEATURES
752     export SPACE_SEPARATED_FEATURES
753 }
754
755 # Create the configuration script to be run on controllers.
756 function create_configuration_script() {
757     cat > "${WORKSPACE}"/configuration-script.sh <<EOF
758 set -x
759 source /tmp/common-functions.sh ${BUNDLEFOLDER}
760
761 echo "Changing to /tmp"
762 cd /tmp
763
764 echo "Downloading the distribution from ${ACTUAL_BUNDLE_URL}"
765 wget --progress=dot:mega '${ACTUAL_BUNDLE_URL}'
766
767 echo "Extracting the new controller..."
768 unzip -q ${BUNDLE}
769
770 echo "Adding external repositories..."
771 sed -ie "s%org.ops4j.pax.url.mvn.repositories=%org.ops4j.pax.url.mvn.repositories=https://nexus.opendaylight.org/content/repositories/opendaylight.snapshot@id=opendaylight-snapshot@snapshots, https://nexus.opendaylight.org/content/repositories/public@id=opendaylight-mirror, http://repo1.maven.org/maven2@id=central, http://repository.springsource.com/maven/bundles/release@id=spring.ebr.release, http://repository.springsource.com/maven/bundles/external@id=spring.ebr.external, http://zodiac.springsource.com/maven/bundles/release@id=gemini, http://repository.apache.org/content/groups/snapshots-group@id=apache@snapshots@noreleases, https://oss.sonatype.org/content/repositories/snapshots@id=sonatype.snapshots.deploy@snapshots@noreleases, https://oss.sonatype.org/content/repositories/ops4j-snapshots@id=ops4j.sonatype.snapshots.deploy@snapshots@noreleases%g" ${MAVENCONF}
772 cat ${MAVENCONF}
773
774 if [[ "$USEFEATURESBOOT" == "True" ]]; then
775     echo "Configuring the startup features..."
776     sed -ie "s/\\(featuresBoot=\\|featuresBoot =\\)/featuresBoot = ${ACTUALFEATURES},/g" ${FEATURESCONF}
777 fi
778
779 FEATURE_TEST_STRING="features-integration-test"
780 KARAF_VERSION=${KARAF_VERSION:-karaf4}
781 if [[ "$KARAF_VERSION" == "karaf4" ]]; then
782     FEATURE_TEST_STRING="features-test"
783 fi
784
785 sed -ie "s%\\(featuresRepositories=\\|featuresRepositories =\\)%featuresRepositories = mvn:org.opendaylight.integration/\${FEATURE_TEST_STRING}/${BUNDLE_VERSION}/xml/features,mvn:org.apache.karaf.decanter/apache-karaf-decanter/1.0.0/xml/features,%g" ${FEATURESCONF}
786 if [[ ! -z "${REPO_URL}" ]]; then
787    sed -ie "s%featuresRepositories =%featuresRepositories = ${REPO_URL},%g" ${FEATURESCONF}
788 fi
789 cat ${FEATURESCONF}
790
791 configure_karaf_log "${KARAF_VERSION}" "${CONTROLLERDEBUGMAP}"
792
793 set_java_vars "${JAVA_HOME}" "${CONTROLLERMEM}" "${MEMCONF}"
794
795 echo "Listing all open ports on controller system..."
796 netstat -pnatu
797
798 # Copy shard file if exists
799 if [ -f /tmp/custom_shard_config.txt ]; then
800     echo "Custom shard config exists!!!"
801     echo "Copying the shard config..."
802     cp /tmp/custom_shard_config.txt /tmp/${BUNDLEFOLDER}/bin/
803 fi
804
805 echo "Configuring cluster"
806 /tmp/${BUNDLEFOLDER}/bin/configure_cluster.sh \$1 ${nodes_list}
807
808 echo "Dump akka.conf"
809 cat ${AKKACONF}
810
811 echo "Dump modules.conf"
812 cat ${MODULESCONF}
813
814 echo "Dump module-shards.conf"
815 cat ${MODULESHARDSCONF}
816 EOF
817 # cat > ${WORKSPACE}/configuration-script.sh <<EOF
818 }
819
820 # Create the startup script to be run on controllers.
821 function create_startup_script() {
822     cat > "${WORKSPACE}"/startup-script.sh <<EOF
823 echo "Redirecting karaf console output to karaf_console.log"
824 export KARAF_REDIRECT="/tmp/${BUNDLEFOLDER}/data/log/karaf_console.log"
825 mkdir -p /tmp/${BUNDLEFOLDER}/data/log
826
827 echo "Starting controller..."
828 /tmp/${BUNDLEFOLDER}/bin/start
829 EOF
830 # cat > ${WORKSPACE}/startup-script.sh <<EOF
831 }
832
833 function create_post_startup_script() {
834     cat > "${WORKSPACE}"/post-startup-script.sh <<EOF
835 # wait up to 60s for karaf port 8101 to be opened, polling every 5s
836 loop_count=0;
837 until [[ \$loop_count -ge 12 ]]; do
838     netstat -na | grep 8101 && break;
839     loop_count=\$[\$loop_count+1];
840     sleep 5;
841 done
842
843 # This workaround is required for Karaf decanter to work proper
844 # The bundle:refresh command does not fail if the decanter bundles are not present
845 echo "ssh to karaf console to do bundle refresh of decanter jmx collector"
846 sshpass -p karaf ssh -o StrictHostKeyChecking=no \
847                      -o UserKnownHostsFile=/dev/null \
848                      -o LogLevel=error \
849                      -p 8101 karaf@localhost \
850                      "bundle:refresh org.apache.karaf.decanter.collector.jmx && bundle:refresh org.apache.karaf.decanter.appender.elasticsearch"
851
852 if [[ "$USEFEATURESBOOT" != "True" ]]; then
853
854     echo "going to feature:install --no-auto-refresh ${SPACE_SEPARATED_FEATURES} one at a time"
855     for feature in ${SPACE_SEPARATED_FEATURES}; do
856         sshpass -p karaf ssh -o StrictHostKeyChecking=no \
857                              -o UserKnownHostsFile=/dev/null \
858                              -o LogLevel=error \
859                              -p 8101 karaf@localhost \
860                              feature:install --no-auto-refresh \$feature;
861     done
862
863     echo "ssh to karaf console to list -i installed features"
864     sshpass -p karaf ssh -o StrictHostKeyChecking=no \
865                          -o UserKnownHostsFile=/dev/null \
866                          -o LogLevel=error \
867                          -p 8101 karaf@localhost \
868                          feature:list -i
869 fi
870
871 echo "Waiting up to 3 minutes for controller to come up, checking every 5 seconds..."
872 for i in {1..36}; do
873     sleep 5;
874     grep 'org.opendaylight.infrautils.*System ready' /tmp/${BUNDLEFOLDER}/data/log/karaf.log
875     if [ \$? -eq 0 ]; then
876         echo "Controller is UP"
877         break
878     fi
879 done;
880
881 # if we ended up not finding ready status in the above loop, we can output some debugs
882 grep 'org.opendaylight.infrautils.*System ready' /tmp/${BUNDLEFOLDER}/data/log/karaf.log
883 if [ $? -ne 0 ]; then
884     echo "Timeout Controller DOWN"
885     echo "Dumping first 500K bytes of karaf log..."
886     head --bytes=500K "/tmp/${BUNDLEFOLDER}/data/log/karaf.log"
887     echo "Dumping last 500K bytes of karaf log..."
888     tail --bytes=500K "/tmp/${BUNDLEFOLDER}/data/log/karaf.log"
889     echo "Listing all open ports on controller system"
890     netstat -pnatu
891     exit 1
892 fi
893
894 echo "Listing all open ports on controller system..."
895 netstat -pnatu
896
897 function exit_on_log_file_message {
898     echo "looking for \"\$1\" in log file"
899     if grep --quiet "\$1" "/tmp/${BUNDLEFOLDER}/data/log/karaf.log"; then
900         echo ABORTING: found "\$1"
901         echo "Dumping first 500K bytes of karaf log..."
902         head --bytes=500K "/tmp/${BUNDLEFOLDER}/data/log/karaf.log"
903         echo "Dumping last 500K bytes of karaf log..."
904         tail --bytes=500K "/tmp/${BUNDLEFOLDER}/data/log/karaf.log"
905         exit 1
906     fi
907 }
908
909 exit_on_log_file_message 'BindException: Address already in use'
910 exit_on_log_file_message 'server is unhealthy'
911 EOF
912 # cat > ${WORKSPACE}/post-startup-script.sh <<EOF
913 }
914
915 # Copy over the configuration script and configuration files to each controller
916 # Execute the configuration script on each controller.
917 function copy_and_run_configuration_script() {
918     for i in $(seq 1 "${NUM_ODL_SYSTEM}"); do
919         CONTROLLERIP="ODL_SYSTEM_${i}_IP"
920         echo "Configuring member-${i} with IP address ${!CONTROLLERIP}"
921         scp "${WORKSPACE}"/configuration-script.sh "${!CONTROLLERIP}":/tmp/
922         # $i needs to be parsed client-side
923         # shellcheck disable=SC2029
924         ssh "${!CONTROLLERIP}" "bash /tmp/configuration-script.sh ${i}"
925     done
926 }
927
928 # Copy over the startup script to each controller and execute it.
929 function copy_and_run_startup_script() {
930     for i in $(seq 1 "${NUM_ODL_SYSTEM}"); do
931         CONTROLLERIP="ODL_SYSTEM_${i}_IP"
932         echo "Starting member-${i} with IP address ${!CONTROLLERIP}"
933         scp "${WORKSPACE}"/startup-script.sh "${!CONTROLLERIP}":/tmp/
934         ssh "${!CONTROLLERIP}" "bash /tmp/startup-script.sh"
935     done
936 }
937
938 function copy_and_run_post_startup_script() {
939     seed_index=1
940     for i in $(seq 1 "${NUM_ODL_SYSTEM}"); do
941         CONTROLLERIP="ODL_SYSTEM_${i}_IP"
942         echo "Execute the post startup script on controller ${!CONTROLLERIP}"
943         scp "${WORKSPACE}"/post-startup-script.sh "${!CONTROLLERIP}":/tmp/
944         # $seed_index needs to be parsed client-side
945         # shellcheck disable=SC2029
946         ssh "${!CONTROLLERIP}" "bash /tmp/post-startup-script.sh $(( seed_index++ ))"
947         if [ $(( i % NUM_ODL_SYSTEM )) == 0 ]; then
948             seed_index=1
949         fi
950     done
951 }
952
953 function create_controller_variables() {
954     echo "Generating controller variables..."
955     for i in $(seq 1 "${NUM_ODL_SYSTEM}"); do
956         CONTROLLERIP="ODL_SYSTEM_${i}_IP"
957         odl_variables=${odl_variables}" -v ${CONTROLLERIP}:${!CONTROLLERIP}"
958         echo "Lets's take the karaf thread dump"
959         ssh "${!CONTROLLERIP}" "sudo ps aux" > "${WORKSPACE}"/ps_before.log
960         pid=$(grep org.apache.karaf.main.Main "${WORKSPACE}"/ps_before.log | grep -v grep | tr -s ' ' | cut -f2 -d' ')
961         echo "karaf main: org.apache.karaf.main.Main, pid:${pid}"
962         # $i needs to be parsed client-side
963         # shellcheck disable=SC2029
964         ssh "${!CONTROLLERIP}" "${JAVA_HOME}/bin/jstack -l ${pid}" > "${WORKSPACE}/karaf_${i}_${pid}_threads_before.log" || true
965     done
966 }
967
968 # Function to build OVS from git repo
969 function build_ovs() {
970     local -r ip=$1
971     local -r version=$2
972     local -r rpm_path="$3"
973
974     echo "Building OVS ${version} on ${ip} ..."
975     cat > "${WORKSPACE}"/build_ovs.sh << EOF
976 set -ex -o pipefail
977
978 echo '---> Building openvswitch version ${version}'
979
980 # Install running kernel devel packages
981 K_VERSION=\$(uname -r)
982 YUM_OPTS="-y --disablerepo=* --enablerepo=base,updates,extra,C*-base,C*-updates,C*-extras"
983 # Install centos-release to update vault repos from which to fetch
984 # kernel devel packages
985 sudo yum \${YUM_OPTS} install centos-release yum-utils @'Development Tools' rpm-build
986 sudo yum \${YUM_OPTS} install kernel-{devel,headers}-\${K_VERSION}
987
988 TMP=\$(mktemp -d)
989 pushd \${TMP}
990
991 git clone https://github.com/openvswitch/ovs.git
992 cd ovs
993
994 if [ "${version}" = "v2.6.1-nsh" ]; then
995     git checkout v2.6.1
996     echo "Will apply nsh patches for OVS version 2.6.1"
997     git clone https://github.com/yyang13/ovs_nsh_patches.git ../ovs_nsh_patches
998     git apply ../ovs_nsh_patches/v2.6.1_centos7/*.patch
999 else
1000     git checkout ${version}
1001 fi
1002
1003 # On early versions of OVS, flake warnings would fail the build.
1004 # Remove it.
1005 sudo pip uninstall -y flake8
1006
1007 # Get rid of sphinx dep as it conflicts with the already
1008 # installed one (via pip). Docs wont be built.
1009 sed -i "/BuildRequires:.*sphinx.*/d" rhel/openvswitch-fedora.spec.in
1010
1011 sed -e 's/@VERSION@/0.0.1/' rhel/openvswitch-fedora.spec.in > /tmp/ovs.spec
1012 sed -e 's/@VERSION@/0.0.1/' rhel/openvswitch-kmod-fedora.spec.in > /tmp/ovs-kmod.spec
1013 sed -e 's/@VERSION@/0.0.1/' rhel/openvswitch-dkms.spec.in > /tmp/ovs-dkms.spec
1014 sudo yum-builddep \${YUM_OPTS} /tmp/ovs.spec /tmp/ovs-kmod.spec /tmp/ovs-dkms.spec
1015 rm /tmp/ovs.spec /tmp/ovs-kmod.spec /tmp/ovs-dkms.spec
1016 ./boot.sh
1017 ./configure --build=x86_64-redhat-linux-gnu --host=x86_64-redhat-linux-gnu --with-linux=/lib/modules/\${K_VERSION}/build --program-prefix= --disable-dependency-tracking --prefix=/usr --exec-prefix=/usr --bindir=/usr/bin --sbindir=/usr/sbin --sysconfdir=/etc --datadir=/usr/share --includedir=/usr/include --libdir=/usr/lib64 --libexecdir=/usr/libexec --localstatedir=/var --sharedstatedir=/var/lib --mandir=/usr/share/man --infodir=/usr/share/info --enable-libcapng --enable-ssl --with-pkidir=/var/lib/openvswitch/pki PYTHON=/usr/bin/python2
1018 make rpm-fedora RPMBUILD_OPT="--without check"
1019 # Build dkms only for now
1020 # make rpm-fedora-kmod RPMBUILD_OPT='-D "kversion \${K_VERSION}"'
1021 rpmbuild -D "_topdir \$(pwd)/rpm/rpmbuild" -bb --without check rhel/openvswitch-dkms.spec
1022
1023 mkdir -p /tmp/ovs_rpms
1024 cp -r rpm/rpmbuild/RPMS/* /tmp/ovs_rpms/
1025
1026 popd
1027 rm -rf \${TMP}
1028 EOF
1029
1030     scp "${WORKSPACE}"/build_ovs.sh "${ip}":/tmp
1031     ${SSH} "${ip}" " bash /tmp/build_ovs.sh >> /tmp/install_ovs.txt 2>&1"
1032     scp -r "${ip}":/tmp/ovs_rpms/* "${rpm_path}/"
1033     ${SSH} "${ip}" "rm -rf /tmp/ovs_rpms"
1034 }
1035
1036 # Install OVS RPMs from yum repo
1037 function install_ovs_from_repo() {
1038     local -r ip=$1
1039     local -r rpm_repo="$2"
1040
1041     echo "Installing OVS from repo ${rpm_repo} on ${ip} ..."
1042     cat > "${WORKSPACE}"/install_ovs.sh << EOF
1043 set -ex -o pipefail
1044
1045 echo '---> Installing openvswitch from ${rpm_repo}'
1046
1047 # We need repoquery from yum-utils.
1048 sudo yum -y install yum-utils
1049
1050 # Get openvswitch packages offered by custom repo.
1051 # dkms package will have priority over kmod.
1052 OVS_REPO_OPTS="--repofrompath=ovs-repo,${rpm_repo} --disablerepo=* --enablerepo=ovs-repo"
1053 OVS_PKGS=\$(repoquery \${OVS_REPO_OPTS} openvswitch)
1054 OVS_SEL_PKG=\$(repoquery \${OVS_REPO_OPTS} openvswitch-selinux-policy)
1055 OVS_DKMS_PKG=\$(repoquery \${OVS_REPO_OPTS} openvswitch-dkms)
1056 OVS_KMOD_PKG=\$(repoquery \${OVS_REPO_OPTS} openvswitch-kmod)
1057 [ -n "\${OVS_SEL_PKG}" ] && OVS_PKGS="\${OVS_PKGS} \${OVS_SEL_PKG}"
1058 [ -n "\${OVS_DKMS_PKG}" ] && OVS_PKGS="\${OVS_PKGS} \${OVS_DKMS_PKG}"
1059 [ -z "\${OVS_DKMS_PKG}" ] && [ -n "\${OVS_KMOD_PKG}" ] && OVS_PKGS="\${OVS_PKGS} \${OVS_KMOD_PKG}"
1060
1061 # Bail with error if custom repo was provided but we could not
1062 # find suitable packages there.
1063 [ -z "\${OVS_PKGS}" ] && echo "No OVS packages found in custom repo." && exit 1
1064
1065 # Install kernel & devel packages for the openvswitch dkms package.
1066 if [ -n "\${OVS_DKMS_PKG}" ]; then
1067     # install centos-release to update vault repos from which to fetch
1068     # kernel devel packages
1069     sudo yum -y install centos-release
1070     K_VERSION=\$(uname -r)
1071     YUM_OPTS="-y --disablerepo=* --enablerepo=base,updates,extra,C*-base,C*-updates,C*-extras"
1072     sudo yum \${YUM_OPTS} install kernel-{headers,devel}-\${K_VERSION} @'Development Tools' python-six
1073 fi
1074
1075 PREV_MOD=\$(sudo modinfo -n openvswitch || echo '')
1076
1077 # Install OVS offered by custom repo.
1078 sudo yum-config-manager --add-repo "${rpm_repo}"
1079 sudo yum -y versionlock delete openvswitch-*
1080 sudo yum -y remove openvswitch-*
1081 sudo yum -y --nogpgcheck install \${OVS_PKGS}
1082 sudo yum -y versionlock add \${OVS_PKGS}
1083
1084 # Most recent OVS versions have some incompatibility with certain versions of iptables
1085 # This below line will overcome that problem.
1086 sudo modprobe openvswitch
1087
1088 # Start OVS and print details
1089 sudo systemctl start openvswitch
1090 sudo systemctl enable openvswitch
1091 sudo ovs-vsctl --retry -t 5 show
1092 sudo modinfo openvswitch
1093
1094 # dkms rpm install can fail silently (probably because the OVS version is
1095 # incompatible with the running kernel), verify module was updated.
1096 NEW_MOD=\$(sudo modinfo -n openvswitch || echo '')
1097 [ "\${PREV_MOD}" != "\${NEW_MOD}" ] || (echo "Kernel module was not updated" && exit 1)
1098 EOF
1099
1100     scp "${WORKSPACE}"/install_ovs.sh "${ip}":/tmp
1101     ${SSH} "${ip}" "bash /tmp/install_ovs.sh >> /tmp/install_ovs.txt 2>&1"
1102 }
1103
1104 # Install OVS RPMS from path
1105 function install_ovs_from_path() {
1106     local -r ip=$1
1107     local -r rpm_path="$2"
1108
1109     echo "Creating OVS RPM repo on ${ip} ..."
1110     ${SSH} "${ip}" "mkdir -p /tmp/ovs_rpms"
1111     scp -r "${rpm_path}"/* "${ip}":/tmp/ovs_rpms
1112     ${SSH} "${ip}" "sudo yum -y install createrepo && createrepo --database /tmp/ovs_rpms"
1113     install_ovs_from_repo "${ip}" file:/tmp/ovs_rpms
1114 }
1115
1116