58bcbf711506665abb5b5f8b018a9e983cb6e3c3
[releng/builder.git] / jjb / integration / integration-deploy-openstack-run-test.sh
1 #@IgnoreInspection BashAddShebang
2 # Activate robotframework virtualenv
3 # ${ROBOT_VENV} comes from the integration-install-robotframework.sh
4 # script.
5 # shellcheck source=${ROBOT_VENV}/bin/activate disable=SC1091
6 source ${ROBOT_VENV}/bin/activate
7 PYTHON="${ROBOT_VENV}/bin/python"
8 SSH="ssh -t -t"
9 ADMIN_PASSWORD=admin
10
11 # TODO: remove this work to run changes.py if/when it's moved higher up to be visible at the Robot level
12 echo "showing recent changes that made it in to the distribution used by this job"
13 $PYTHON -m pip install --upgrade urllib3
14 python ${WORKSPACE}/test/tools/distchanges/changes.py -d /tmp/distribution_folder \
15                   -u ${ACTUAL_BUNDLE_URL} -b ${DISTROBRANCH} \
16                   -r ssh://jenkins-${SILO}@git.opendaylight.org:29418 || true
17
18 echo "#################################################"
19 echo "##         Deploy Openstack 3-node             ##"
20 echo "#################################################"
21
22 # Catch command errors and collect logs.
23 # This ensures logs are collected when script commands fail rather than simply exiting.
24 function trap_handler() {
25     local prog="$0"
26     local lastline="$1"
27     local lasterr="$2"
28     echo "${prog}: line ${lastline}: exit status of last command: ${lasterr}"
29     echo "command: ${BASH_COMMAND}"
30     collect_logs
31     exit 1
32 } # trap_handler()
33
34 trap 'trap_handler ${LINENO} ${$?}' ERR
35
36 function create_etc_hosts() {
37     NODE_IP=$1
38     CTRL_IP=$2
39     : > ${WORKSPACE}/hosts_file
40     for iter in `seq 1 ${NUM_OPENSTACK_COMPUTE_NODES}`
41     do
42         COMPUTE_IP=OPENSTACK_COMPUTE_NODE_${iter}_IP
43         if [ "${!COMPUTE_IP}" == "${NODE_IP}" ]; then
44            CONTROL_HNAME=$(${SSH}  ${CTRL_IP}  "hostname")
45            echo "${CTRL_IP}   ${CONTROL_HNAME}" >> ${WORKSPACE}/hosts_file
46         else
47            COMPUTE_HNAME=$(${SSH}  ${!COMPUTE_IP}  "hostname")
48            echo "${!COMPUTE_IP}   ${COMPUTE_HNAME}" >> ${WORKSPACE}/hosts_file
49         fi
50     done
51
52     echo "Created the hosts file for ${NODE_IP}:"
53     cat ${WORKSPACE}/hosts_file
54 } # create_etc_hosts()
55
56 # convert commas in csv strings to spaces (ssv)
57 function csv2ssv() {
58     local csv=$1
59     if [ -n "${csv}" ]; then
60         ssv=$(echo ${csv} | sed 's/,/ /g' | sed 's/\ \ */\ /g')
61     fi
62
63     echo "${ssv}"
64 } # csv2ssv
65
66 function create_control_node_local_conf() {
67     HOSTIP=$1
68     MGRIP=$2
69     ODL_OVS_MANAGERS="$3"
70
71     local_conf_file_name=${WORKSPACE}/local.conf_control_${HOSTIP}
72     cat > ${local_conf_file_name} << EOF
73 [[local|localrc]]
74 LOGFILE=stack.sh.log
75 USE_SCREEN=True
76 SCREEN_LOGDIR=/opt/stack/data/log
77 LOG_COLOR=False
78 RECLONE=${RECLONE}
79
80 disable_all_services
81 EOF
82
83     CORE_OS_SERVICES="dstat,g-api,g-reg,key,mysql,n-api,n-cauth,n-cond,n-crt,n-obj,n-sch,odl-compute,odl-neutron,q-dhcp,q-meta,q-svc,rabbit"
84     cat >> ${local_conf_file_name} << EOF
85 enable_service $(csv2ssv "${CORE_OS_SERVICES}")
86 EOF
87     if [ -n "${ENABLE_OS_SERVICES}" ]; then
88         cat >> ${local_conf_file_name} << EOF
89 enable_service $(csv2ssv "${ENABLE_OS_SERVICES}")
90 EOF
91     fi
92     if [ -n "${DISABLE_OS_SERVICES}" ]; then
93         cat >> ${local_conf_file_name} << EOF
94 disable_service $(csv2ssv "${DISABLE_OS_SERVICES}")
95 EOF
96     fi
97
98     cat >> ${local_conf_file_name} << EOF
99
100 HOST_IP=${HOSTIP}
101 SERVICE_HOST=\$HOST_IP
102 Q_ML2_TENANT_NETWORK_TYPE=${TENANT_NETWORK_TYPE}
103 NEUTRON_CREATE_INITIAL_NETWORKS=${CREATE_INITIAL_NETWORKS}
104 #Q_PLUGIN=ml2
105 #ENABLE_TENANT_TUNNELS=True
106 #LIBVIRT_TYPE=qemu
107
108 ODL_MODE=manual
109 ODL_MGR_IP=${MGRIP}
110 ODL_PORT=8080
111 ODL_PORT_BINDING_CONTROLLER=${ODL_ML2_PORT_BINDING}
112 ODL_OVS_MANAGERS=${ODL_OVS_MANAGERS}
113
114 MYSQL_HOST=\$SERVICE_HOST
115 RABBIT_HOST=\$SERVICE_HOST
116 GLANCE_HOSTPORT=\$SERVICE_HOST:9292
117 KEYSTONE_AUTH_HOST=\$SERVICE_HOST
118 KEYSTONE_SERVICE_HOST=\$SERVICE_HOST
119
120 ADMIN_PASSWORD=${ADMIN_PASSWORD}
121 DATABASE_PASSWORD=${ADMIN_PASSWORD}
122 RABBIT_PASSWORD=${ADMIN_PASSWORD}
123 SERVICE_TOKEN=${ADMIN_PASSWORD}
124 SERVICE_PASSWORD=${ADMIN_PASSWORD}
125
126 NEUTRON_LBAAS_SERVICE_PROVIDERV2=${LBAAS_SERVICE_PROVIDER} # Only relevant if neutron-lbaas plugin is enabled
127 NEUTRON_SFC_DRIVERS=${ODL_SFC_DRIVER} # Only relevant if networking-sfc plugin is enabled
128 NEUTRON_FLOWCLASSIFIER_DRIVERS=${ODL_SFC_DRIVER} # Only relevant if networking-sfc plugin is enabled
129 ETCD_PORT=2379
130 EOF
131
132     if [ "${ODL_ML2_DRIVER_VERSION}" == "v2" ]; then
133         echo "ODL_V2DRIVER=True" >> ${local_conf_file_name}
134     fi
135
136     IFS=,
137     for plugin_name in ${ENABLE_OS_PLUGINS}; do
138         if [ "$plugin_name" == "networking-odl" ]; then
139             ENABLE_PLUGIN_ARGS="${ODL_ML2_DRIVER_REPO} ${ODL_ML2_BRANCH}"
140         elif [ "$plugin_name" == "kuryr-kubernetes" ]; then
141             ENABLE_PLUGIN_ARGS="${DEVSTACK_KUBERNETES_PLUGIN_REPO} master" # note: kuryr-kubernetes only exists in master at the moment
142         elif [ "$plugin_name" == "neutron-lbaas" ]; then
143             ENABLE_PLUGIN_ARGS="${DEVSTACK_LBAAS_PLUGIN_REPO} ${OPENSTACK_BRANCH}"
144             IS_LBAAS_PLUGIN_ENABLED="yes"
145         elif [ "$plugin_name" == "networking-sfc" ]; then
146             ENABLE_PLUGIN_ARGS="${DEVSTACK_NETWORKING_SFC_PLUGIN_REPO} ${OPENSTACK_BRANCH}"
147         else
148             echo "Error: Invalid plugin $plugin_name, unsupported"
149             continue
150         fi
151         cat >> ${local_conf_file_name} << EOF
152
153 enable_plugin ${plugin_name} ${ENABLE_PLUGIN_ARGS}
154 EOF
155     done
156     unset IFS
157
158     if [ "${ENABLE_NETWORKING_L2GW}" == "yes" ]; then
159         cat >> ${local_conf_file_name} << EOF
160
161 enable_plugin networking-l2gw ${NETWORKING_L2GW_DRIVER} ${ODL_ML2_BRANCH}
162 NETWORKING_L2GW_SERVICE_DRIVER=L2GW:OpenDaylight:networking_odl.l2gateway.driver.OpenDaylightL2gwDriver:default
163 EOF
164     fi
165
166     if [ "${ODL_ENABLE_L3_FWD}" == "yes" ]; then
167         cat >> ${local_conf_file_name} << EOF
168
169 PUBLIC_BRIDGE=${PUBLIC_BRIDGE}
170 PUBLIC_PHYSICAL_NETWORK=${PUBLIC_PHYSICAL_NETWORK}
171 ML2_VLAN_RANGES=${PUBLIC_PHYSICAL_NETWORK}
172 ODL_PROVIDER_MAPPINGS=${ODL_PROVIDER_MAPPINGS}
173 EOF
174
175         if [ "${ODL_ML2_DRIVER_VERSION}" == "v2" ]; then
176            SERVICE_PLUGINS="odl-router_v2"
177         else
178            SERVICE_PLUGINS="odl-router"
179         fi
180         if [ "${ENABLE_NETWORKING_L2GW}" == "yes" ]; then
181             SERVICE_PLUGINS+=", networking_l2gw.services.l2gateway.plugin.L2GatewayPlugin"
182         fi
183         if [ "${IS_LBAAS_PLUGIN_ENABLED}" == "yes" ]; then
184             SERVICE_PLUGINS+=", lbaasv2"
185         fi
186     fi #check for ODL_ENABLE_L3_FWD
187
188     cat >> ${local_conf_file_name} << EOF
189
190 [[post-config|\$NEUTRON_CONF]]
191 [DEFAULT]
192 service_plugins = ${SERVICE_PLUGINS}
193
194 [[post-config|/etc/neutron/plugins/ml2/ml2_conf.ini]]
195 [agent]
196 minimize_polling=True
197
198 [ml2]
199 # Needed for VLAN provider tests - because our provider networks are always encapsulated in VXLAN (br-physnet1)
200 # MTU(1440) + VXLAN(50) + VLAN(4) = 1494 < MTU eth0/br-physnet1(1500)
201 physical_network_mtus = ${PUBLIC_PHYSICAL_NETWORK}:1440
202 path_mtu = 1490
203
204 # workaround for port-status not working due to https://bugs.opendaylight.org/show_bug.cgi?id=9092
205 [ml2_odl]
206 odl_features=nothing
207
208 [[post-config|/etc/neutron/dhcp_agent.ini]]
209 [DEFAULT]
210 force_metadata = True
211 enable_isolated_metadata = True
212
213 [[post-config|/etc/nova/nova.conf]]
214 [DEFAULT]
215 force_config_drive = False
216
217 [scheduler]
218 discover_hosts_in_cells_interval = 30
219 EOF
220
221     echo "Control local.conf created:"
222     cat ${local_conf_file_name}
223 } # create_control_node_local_conf()
224
225 function create_compute_node_local_conf() {
226     HOSTIP=$1
227     SERVICEHOST=$2
228     MGRIP=$3
229     ODL_OVS_MANAGERS="$4"
230
231     local_conf_file_name=${WORKSPACE}/local.conf_compute_${HOSTIP}
232     cat > ${local_conf_file_name} << EOF
233 [[local|localrc]]
234 LOGFILE=stack.sh.log
235 LOG_COLOR=False
236 USE_SCREEN=True
237 SCREEN_LOGDIR=/opt/stack/data/log
238 RECLONE=${RECLONE}
239
240 disable_all_services
241 EOF
242
243     CORE_OS_SERVICES="n-cpu,odl-compute"
244     cat >> ${local_conf_file_name} << EOF
245 enable_service $(csv2ssv "${CORE_OS_SERVICES}")
246 EOF
247     if [ -n "${ENABLE_OS_COMPUTE_SERVICES}" ]; then
248         cat >> ${local_conf_file_name} << EOF
249 enable_service $(csv2ssv "${ENABLE_OS_COMPUTE_SERVICES}")
250 EOF
251     fi
252     if [ -n "${DISABLE_OS_SERVICES}" ]; then
253         cat >> ${local_conf_file_name} << EOF
254 disable_service $(csv2ssv "${DISABLE_OS_SERVICES}")
255 EOF
256     fi
257
258     cat >> ${local_conf_file_name} << EOF
259
260 HOST_IP=${HOSTIP}
261 SERVICE_HOST=${SERVICEHOST}
262 Q_ML2_TENANT_NETWORK_TYPE=${TENANT_NETWORK_TYPE}
263 #Q_PLUGIN=ml2
264 #ENABLE_TENANT_TUNNELS=True
265 #LIBVIRT_TYPE=qemu
266 #MULTI_HOST=1
267
268 ODL_MODE=manual
269 ODL_MGR_IP=${MGRIP}
270 ODL_PORT=8080
271 ODL_PORT_BINDING_CONTROLLER=${ODL_ML2_PORT_BINDING}
272 ODL_OVS_MANAGERS=${ODL_OVS_MANAGERS}
273
274 Q_HOST=\$SERVICE_HOST
275 MYSQL_HOST=\$SERVICE_HOST
276 RABBIT_HOST=\$SERVICE_HOST
277 GLANCE_HOSTPORT=\$SERVICE_HOST:9292
278 KEYSTONE_AUTH_HOST=\$SERVICE_HOST
279 KEYSTONE_SERVICE_HOST=\$SERVICE_HOST
280
281 ADMIN_PASSWORD=${ADMIN_PASSWORD}
282 DATABASE_PASSWORD=${ADMIN_PASSWORD}
283 RABBIT_PASSWORD=${ADMIN_PASSWORD}
284 SERVICE_TOKEN=${ADMIN_PASSWORD}
285 SERVICE_PASSWORD=${ADMIN_PASSWORD}
286 EOF
287
288     if [[ "${ENABLE_OS_PLUGINS}" =~ networking-odl ]]; then
289         cat >> ${local_conf_file_name} << EOF
290
291 enable_plugin networking-odl ${ODL_ML2_DRIVER_REPO} ${ODL_ML2_BRANCH}
292 EOF
293     fi
294
295     if [ "${ODL_ENABLE_L3_FWD}" == "yes" ]; then
296         cat >> ${local_conf_file_name} << EOF
297
298 PUBLIC_BRIDGE=${PUBLIC_BRIDGE}
299 PUBLIC_PHYSICAL_NETWORK=${PUBLIC_PHYSICAL_NETWORK}
300 ODL_PROVIDER_MAPPINGS=${ODL_PROVIDER_MAPPINGS}
301 Q_L3_ENABLED=True
302 ODL_L3=${ODL_L3}
303 EOF
304     fi
305
306     cat >> ${local_conf_file_name} << EOF
307
308 [[post-config|/etc/nova/nova.conf]]
309 [api]
310 auth_strategy = keystone
311 [DEFAULT]
312 use_neutron = True
313 EOF
314
315     echo "Compute local.conf created:"
316     cat ${local_conf_file_name}
317 } # create_compute_node_local_conf()
318
319 function configure_haproxy_for_neutron_requests() {
320     MGRIP=$1
321     ODL_IPS=(${2//,/ })
322
323     cat > ${WORKSPACE}/install_ha_proxy.sh<< EOF
324 sudo systemctl stop firewalld
325 sudo yum -y install policycoreutils-python haproxy
326 EOF
327
328 cat > ${WORKSPACE}/haproxy.cfg << EOF
329 global
330   daemon
331   group  haproxy
332   log  /dev/log local0
333   maxconn  20480
334   pidfile  /tmp/haproxy.pid
335   user  haproxy
336
337 defaults
338   log  global
339   maxconn  4096
340   mode  tcp
341   retries  3
342   timeout  http-request 10s
343   timeout  queue 1m
344   timeout  connect 10s
345   timeout  client 1m
346   timeout  server 1m
347   timeout  check 10s
348
349 listen opendaylight
350   bind ${MGRIP}:8080
351   balance source
352 EOF
353
354     odlindex=1
355     for odlip in ${ODL_IPS[*]}; do
356         cat >> ${WORKSPACE}/haproxy.cfg << EOF
357   server controller-${odlindex} ${odlip}:8080 check fall 5 inter 2000 rise 2
358 EOF
359         odlindex=$((odlindex+1))
360     done
361
362     cat >> ${WORKSPACE}/haproxy.cfg << EOF
363 listen opendaylight_rest
364   bind ${MGRIP}:8181
365   balance source
366 EOF
367
368     odlindex=1
369     for odlip in ${ODL_IPS[*]}; do
370         cat >> ${WORKSPACE}/haproxy.cfg << EOF
371   server controller-rest-${odlindex} ${odlip}:8181 check fall 5 inter 2000 rise 2
372 EOF
373         odlindex=$((odlindex+1))
374     done
375
376     echo "Dump haproxy.cfg"
377     cat ${WORKSPACE}/haproxy.cfg
378
379     cat > ${WORKSPACE}/deploy_ha_proxy.sh<< EOF
380 sudo chown haproxy:haproxy /tmp/haproxy.cfg
381 sudo sed -i 's/\\/etc\\/haproxy\\/haproxy.cfg/\\/tmp\\/haproxy.cfg/g' /usr/lib/systemd/system/haproxy.service
382 sudo /usr/sbin/semanage permissive -a haproxy_t
383 sudo systemctl restart haproxy
384 sleep 3
385 sudo netstat -tunpl
386 sudo systemctl status haproxy
387 true
388 EOF
389
390     scp ${WORKSPACE}/install_ha_proxy.sh ${MGRIP}:/tmp
391     ${SSH} ${MGRIP} "sudo bash /tmp/install_ha_proxy.sh"
392     scp ${WORKSPACE}/haproxy.cfg ${MGRIP}:/tmp
393     scp ${WORKSPACE}/deploy_ha_proxy.sh ${MGRIP}:/tmp
394     ${SSH} ${MGRIP} "sudo bash /tmp/deploy_ha_proxy.sh"
395 } # configure_haproxy_for_neutron_requests()
396
397 function collect_logs () {
398     set +e  # We do not want to create red dot just because something went wrong while fetching logs.
399     for i in `seq 1 ${NUM_ODL_SYSTEM}`; do
400         CONTROLLERIP=ODL_SYSTEM_${i}_IP
401         echo "Lets's take the karaf thread dump again..."
402         KARAF_PID=$(ssh ${!CONTROLLERIP} "ps aux | grep ${KARAF_ARTIFACT} | grep -v grep | tr -s ' ' | cut -f2 -d' '")
403         ssh ${!CONTROLLERIP} "jstack $KARAF_PID"> ${WORKSPACE}/karaf_${i}_threads_after.log || true
404         echo "killing karaf process..."
405         ${SSH} "${!CONTROLLERIP}" bash -c 'ps axf | grep karaf | grep -v grep | awk '"'"'{print "kill -9 " $1}'"'"' | sh'
406     done
407
408     cat > extra_debug.sh << EOF
409 echo -e "/usr/sbin/lsmod | /usr/bin/grep openvswitch\n"
410 /usr/sbin/lsmod | /usr/bin/grep openvswitch
411 echo -e "\ngrep ct_ /var/log/openvswitch/ovs-vswitchd.log\n"
412 grep ct_ /var/log/openvswitch/ovs-vswitchd.log
413 echo -e "\novsdb-tool -mm show-log\n"
414 ovsdb-tool -mm show-log
415 echo -e "\nsudo netstat -punta\n"
416 sudo netstat -punta
417 echo -e "\nsudo getenforce\n"
418 sudo getenforce
419 echo -e "\njournalctl > /tmp/journalctl.log\n"
420 journalctl > /tmp/journalctl.log
421 EOF
422
423     sleep 5
424     # FIXME: Do not create .tar and gzip before copying.
425     for i in `seq 1 ${NUM_ODL_SYSTEM}`; do
426         CONTROLLERIP=ODL_SYSTEM_${i}_IP
427         ${SSH} "${!CONTROLLERIP}"  "cp -r /tmp/${BUNDLEFOLDER}/data/log /tmp/odl_log"
428         ${SSH} "${!CONTROLLERIP}"  "tar -cf /tmp/odl${i}_karaf.log.tar /tmp/odl_log/*"
429         scp "${!CONTROLLERIP}:/tmp/odl${i}_karaf.log.tar" "${WORKSPACE}/odl${i}_karaf.log.tar"
430         ${SSH} "${!CONTROLLERIP}"  "tar -cf /tmp/odl${i}_zrpcd.log.tar /tmp/zrpcd.init.log"
431         scp "${!CONTROLLERIP}:/tmp/odl${i}_zrpcd.log.tar" "${WORKSPACE}/odl${i}_zrpcd.log.tar"
432         tar -xvf ${WORKSPACE}/odl${i}_karaf.log.tar -C . --strip-components 2 --transform s/karaf/odl${i}_karaf/g
433         grep "ROBOT MESSAGE\| ERROR " odl${i}_karaf.log > odl${i}_err.log
434         grep "ROBOT MESSAGE\|Exception" odl${i}_karaf.log > odl${i}_exception.log
435         grep "ROBOT MESSAGE\| ERROR \| WARN \|Exception" odl${i}_karaf.log > odl${i}_err_warn_exception.log
436         rm ${WORKSPACE}/odl${i}_karaf.log.tar
437     done
438
439     # Since this log collection work is happening before the archive build macro which also
440     # creates the ${WORKSPACE}/archives dir, we have to do it here first.  The mkdir in the
441     # archives build step will essentially be a noop.
442     mkdir -p ${WORKSPACE}/archives
443
444     # Control Node
445     for i in `seq 1 ${NUM_OPENSTACK_CONTROL_NODES}`; do
446         OS_CTRL_IP=OPENSTACK_CONTROL_NODE_${i}_IP
447         OS_CTRL_FOLDER="control_${i}"
448         mkdir -p ${OS_CTRL_FOLDER}
449         scp ${!OS_CTRL_IP}:/opt/stack/devstack/nohup.out ${OS_CTRL_FOLDER}/stack.log
450         scp ${!OS_CTRL_IP}:/var/log/openvswitch/ovs-vswitchd.log ${OS_CTRL_FOLDER}/ovs-vswitchd.log
451         scp ${!OS_CTRL_IP}:/etc/neutron/plugins/ml2/ml2_conf.ini ${OS_CTRL_FOLDER}
452         scp ${!OS_CTRL_IP}:/etc/neutron/dhcp_agent.ini ${OS_CTRL_FOLDER}
453         scp ${!OS_CTRL_IP}:/etc/neutron/neutron.conf ${OS_CTRL_FOLDER}/neutron.conf
454         scp ${!OS_CTRL_IP}:/etc/nova/nova.conf ${OS_CTRL_FOLDER}/nova.conf
455         scp ${!OS_CTRL_IP}:/etc/kuryr/kuryr.conf ${OS_CTRL_FOLDER}/kuryr.conf
456         scp ${!OS_CTRL_IP}:/etc/neutron/neutron_lbaas.conf ${OS_CTRL_FOLDER}/neutron-lbaas.conf
457         scp ${!OS_CTRL_IP}:/etc/neutron/services/loadbalancer/haproxy/lbaas_agent.ini ${OS_CTRL_FOLDER}/lbaas-agent.ini
458         rsync --rsync-path="sudo rsync" -avhe ssh ${!OS_CTRL_IP}:/usr/lib/systemd/system/haproxy.service ${OS_CTRL_FOLDER}
459         rsync -avhe ssh ${!OS_CTRL_IP}:/opt/stack/logs/* ${OS_CTRL_FOLDER} # rsync to prevent copying of symbolic links
460         rsync --rsync-path="sudo rsync" -avhe ssh ${!OS_CTRL_IP}:/etc/hosts ${OS_CTRL_FOLDER}/hosts.log
461         # Use rsync with sudo to get access to the log dir.
462         rsync --rsync-path="sudo rsync" -avhe ssh ${!OS_CTRL_IP}:/var/log/audit/audit.log ${OS_CTRL_FOLDER}
463         scp ${!OS_CTRL_IP}:/tmp/get_devstack.sh.txt ${OS_CTRL_FOLDER}
464         scp extra_debug.sh ${!OS_CTRL_IP}:/tmp
465         ${SSH} ${!OS_CTRL_IP} "bash /tmp/extra_debug.sh > /tmp/extra_debug.log"
466         scp ${!OS_CTRL_IP}:/tmp/extra_debug.log ${OS_CTRL_FOLDER}/extra_debug.log
467         scp ${!OS_CTRL_IP}:/tmp/journalctl.log ${OS_CTRL_FOLDER}
468         rsync --rsync-path="sudo rsync" -avhe ssh ${!OS_CTRL_IP}:/var/log/messages ${OS_CTRL_FOLDER}
469         scp ${!OS_CTRL_IP}:/tmp/*.xz ${OS_CTRL_FOLDER}/
470         mv local.conf_control_${!OS_CTRL_IP} ${OS_CTRL_FOLDER}/local.conf
471         mv ${OS_CTRL_FOLDER} ${WORKSPACE}/archives/
472     done
473
474     # Compute Nodes
475     for i in `seq 1 ${NUM_OPENSTACK_COMPUTE_NODES}`; do
476         OSIP=OPENSTACK_COMPUTE_NODE_${i}_IP
477         OS_COMPUTE_FOLDER="compute_${i}"
478         mkdir -p ${OS_COMPUTE_FOLDER}
479         scp ${!OSIP}:/opt/stack/devstack/nohup.out ${OS_COMPUTE_FOLDER}/stack.log
480         scp ${!OSIP}:/var/log/openvswitch/ovs-vswitchd.log ${OS_COMPUTE_FOLDER}/ovs-vswitchd.log
481         scp ${!OSIP}:/var/log/openvswitch/ovsdb-server.log ${OS_COMPUTE_FOLDER}/ovsdb-server.log
482         scp ${!OSIP}:/var/log/libvirt/libvirtd.log* ${OS_COMPUTE_FOLDER}
483         scp ${!OSIP}:/var/log/libvirt/qeum/*.log ${OS_COMPUTE_FOLDER}
484         scp ${!OSIP}:/etc/nova/nova.conf ${OS_COMPUTE_FOLDER}/nova.conf
485         rsync -avhe ssh ${!OSIP}:/opt/stack/logs/* ${OS_COMPUTE_FOLDER} # rsync to prevent copying of symbolic links
486         rsync --rsync-path="sudo rsync" -avhe ssh ${!OSIP}:/etc/hosts ${OS_COMPUTE_FOLDER}/hosts.log
487         # Use rsync with sudo to get access to the log dir. Also can't use wildcard because the dirs only have
488         # exec permissions which doesn't allow ls.
489         rsync --rsync-path="sudo rsync" -avhe ssh ${!OSIP}:/var/log/libvirt ${OS_COMPUTE_FOLDER}
490         rsync --rsync-path="sudo rsync" -avhe ssh ${!OSIP}:/var/log/audit/audit.log ${OS_COMPUTE_FOLDER}
491         scp ${!OSIP}:/tmp/get_devstack.sh.txt ${OS_COMPUTE_FOLDER}
492         scp extra_debug.sh ${!OSIP}:/tmp
493         ${SSH} ${!OSIP} "bash /tmp/extra_debug.sh > /tmp/extra_debug.log"
494         scp ${!OSIP}:/tmp/extra_debug.log ${OS_COMPUTE_FOLDER}/extra_debug.log
495         scp ${!OSIP}:/tmp/journalctl.log ${OS_COMPUTE_FOLDER}
496         rsync --rsync-path="sudo rsync" -avhe ssh ${!OSIP}:/var/log/messages ${OS_COMPUTE_FOLDER}
497         scp ${!OSIP}:/tmp/*.xz ${OS_COMPUTE_FOLDER}/
498         mv local.conf_compute_${!OSIP} ${OS_COMPUTE_FOLDER}/local.conf
499         mv ${OS_COMPUTE_FOLDER} ${WORKSPACE}/archives/
500     done
501
502     # Tempest
503     DEVSTACK_TEMPEST_DIR="/opt/stack/tempest"
504     TESTREPO=".stestr"
505     # Look for tempest test results in the $TESTREPO dir and copy if found
506     if ${SSH} ${OPENSTACK_CONTROL_NODE_1_IP} "sudo sh -c '[ -f ${DEVSTACK_TEMPEST_DIR}/${TESTREPO}/0 ]'"; then
507         ${SSH} ${OPENSTACK_CONTROL_NODE_1_IP} "for I in \$(sudo ls ${DEVSTACK_TEMPEST_DIR}/${TESTREPO}/ | grep -E '^[0-9]+$'); do sudo sh -c \"${DEVSTACK_TEMPEST_DIR}/.tox/tempest/bin/subunit-1to2 < ${DEVSTACK_TEMPEST_DIR}/${TESTREPO}/\${I} >> ${DEVSTACK_TEMPEST_DIR}/subunit_log.txt\"; done"
508         ${SSH} ${OPENSTACK_CONTROL_NODE_1_IP} "sudo sh -c '${DEVSTACK_TEMPEST_DIR}/.tox/tempest/bin/python ${DEVSTACK_TEMPEST_DIR}/.tox/tempest/lib/python2.7/site-packages/os_testr/subunit2html.py ${DEVSTACK_TEMPEST_DIR}/subunit_log.txt ${DEVSTACK_TEMPEST_DIR}/tempest_results.html'"
509         TEMPEST_LOGS_DIR=${WORKSPACE}/archives/tempest
510         mkdir -p ${TEMPEST_LOGS_DIR}
511         scp ${OPENSTACK_CONTROL_NODE_1_IP}:${DEVSTACK_TEMPEST_DIR}/tempest_results.html ${TEMPEST_LOGS_DIR}
512         scp ${OPENSTACK_CONTROL_NODE_1_IP}:${DEVSTACK_TEMPEST_DIR}/tempest.log ${TEMPEST_LOGS_DIR}
513         mv ${WORKSPACE}/tempest_output* ${TEMPEST_LOGS_DIR}
514     else
515         echo "tempest results not found in ${DEVSTACK_TEMPEST_DIR}/${TESTREPO}/0"
516     fi
517 } # collect_logs()
518
519 # if we are using the new netvirt impl, as determined by the feature name
520 # odl-netvirt-openstack (note: old impl is odl-ovsdb-openstack) then we
521 # want PROVIDER_MAPPINGS to be used -- this should be fixed if we want to support
522 # external networks in legacy netvirt
523 if [[ ${CONTROLLERFEATURES} == *"odl-netvirt-openstack"* ]]; then
524   ODL_PROVIDER_MAPPINGS="\${PUBLIC_PHYSICAL_NETWORK}:${PUBLIC_BRIDGE}"
525 else
526   ODL_PROVIDER_MAPPINGS=
527 fi
528
529 # if we are using the old netvirt impl, as determined by the feature name
530 # odl-ovsdb-openstack (note: new impl is odl-netvirt-openstack) then we
531 # want ODL_L3 to be True.  New impl wants it False
532 if [[ ${CONTROLLERFEATURES} == *"odl-ovsdb-openstack"* ]]; then
533     ODL_L3=True
534 else
535     ODL_L3=False
536 fi
537
538 cat > ${WORKSPACE}/disable_firewall.sh << EOF
539 sudo systemctl stop firewalld
540 sudo systemctl stop iptables
541 true
542 EOF
543
544 cat > ${WORKSPACE}/get_devstack.sh << EOF
545 sudo systemctl stop firewalld
546 sudo yum install bridge-utils python-pip -y
547 #sudo systemctl stop  NetworkManager
548 #Disable NetworkManager and kill dhclient and dnsmasq
549 sudo systemctl stop NetworkManager
550 sudo killall dhclient
551 sudo killall dnsmasq
552 #Workaround for mysql failure
553 echo "127.0.0.1   localhost \${HOSTNAME}" >> /tmp/hosts
554 echo "::1         localhost \${HOSTNAME}" >> /tmp/hosts
555 sudo mv /tmp/hosts /etc/hosts
556 sudo mkdir /opt/stack
557 sudo chmod 777 /opt/stack
558 cd /opt/stack
559 echo "git clone https://git.openstack.org/openstack-dev/devstack --branch ${OPENSTACK_BRANCH}"
560 git clone https://git.openstack.org/openstack-dev/devstack --branch ${OPENSTACK_BRANCH}
561 cd devstack
562 if [ -n "${DEVSTACK_HASH}" ]; then
563     echo "git checkout ${DEVSTACK_HASH}"
564     git checkout ${DEVSTACK_HASH}
565 fi
566 git --no-pager log --pretty=format:'%h %<(13)%ar%<(13)%cr %<(20,trunc)%an%d %s\n%b' -n20
567 EOF
568
569 cat > "${WORKSPACE}/setup_host_cell_mapping.sh" << EOF
570 sudo nova-manage cell_v2 map_cell0
571 sudo nova-manage cell_v2 simple_cell_setup
572 sudo nova-manage db sync
573 sudo nova-manage cell_v2 discover_hosts
574 EOF
575
576 NUM_OPENSTACK_SITES=${NUM_OPENSTACK_SITES:-1}
577 compute_index=1
578 odl_index=1
579 os_node_list=()
580 os_interval=$(( ${NUM_OPENSTACK_SYSTEM} / ${NUM_OPENSTACK_SITES} ))
581 ha_proxy_index=${os_interval}
582
583 for i in `seq 1 ${NUM_OPENSTACK_SITES}`; do
584     if [ "${ENABLE_HAPROXY_FOR_NEUTRON}" == "yes" ]; then
585         echo "Configure HAProxy"
586         ODL_HAPROXYIP_PARAM=OPENSTACK_HAPROXY_${i}_IP
587         ha_proxy_index=$(( $ha_proxy_index + $os_interval ))
588         odl_index=$(((i - 1) * 3 + 1))
589         ODL_IP_PARAM1=ODL_SYSTEM_$((odl_index++))_IP
590         ODL_IP_PARAM2=ODL_SYSTEM_$((odl_index++))_IP
591         ODL_IP_PARAM3=ODL_SYSTEM_$((odl_index++))_IP
592         ODLMGRIP[$i]=${!ODL_HAPROXYIP_PARAM} # ODL Northbound uses HAProxy VIP
593         ODL_OVS_MGRS[$i]="${!ODL_IP_PARAM1},${!ODL_IP_PARAM2},${!ODL_IP_PARAM3}" # OVSDB connects to all ODL IPs
594         configure_haproxy_for_neutron_requests ${!ODL_HAPROXYIP_PARAM} "${ODL_OVS_MGRS[$i]}"
595     else
596         ODL_IP_PARAM=ODL_SYSTEM_${i}_IP
597         ODL_OVS_MGRS[$i]="${!ODL_IP_PARAM}" # ODL Northbound uses ODL IP
598         ODLMGRIP[$i]=${!ODL_IP_PARAM} # OVSDB connects to ODL IP
599     fi
600 done
601
602 # Begin stacking the nodes, starting with the controller(s) and then the compute(s)
603
604 for i in `seq 1 ${NUM_OPENSTACK_CONTROL_NODES}`; do
605     CONTROLIP=OPENSTACK_CONTROL_NODE_${i}_IP
606     echo "Stack the control node ${i} of ${NUM_OPENSTACK_CONTROL_NODES}: ${CONTROLIP}"
607     create_etc_hosts ${!CONTROLIP}
608     scp ${WORKSPACE}/hosts_file ${!CONTROLIP}:/tmp/hosts
609     scp ${WORKSPACE}/get_devstack.sh ${!CONTROLIP}:/tmp
610     ${SSH} ${!CONTROLIP} "bash /tmp/get_devstack.sh > /tmp/get_devstack.sh.txt 2>&1"
611     create_control_node_local_conf ${!CONTROLIP} ${ODLMGRIP[$i]} "${ODL_OVS_MGRS[$i]}"
612     scp ${WORKSPACE}/local.conf_control_${!CONTROLIP} ${!CONTROLIP}:/opt/stack/devstack/local.conf
613     ssh ${!CONTROLIP} "cd /opt/stack/devstack; nohup ./stack.sh > /opt/stack/devstack/nohup.out 2>&1 &"
614     ssh ${!CONTROLIP} "ps -ef | grep stack.sh"
615     ssh ${!CONTROLIP} "ls -lrt /opt/stack/devstack/nohup.out"
616     os_node_list+=(${!CONTROLIP})
617     # Workaround for stable/newton jobs
618     # TODO: can this be removed now?
619     if [ "${ODL_ML2_BRANCH}" == "stable/newton" ]; then
620         ssh ${!CONTROLIP} "cd /opt/stack; git clone https://git.openstack.org/openstack/requirements; cd requirements; git checkout stable/newton; sed -i /appdirs/d upper-constraints.txt"
621     fi
622 done
623
624 for i in `seq 1 ${NUM_OPENSTACK_COMPUTE_NODES}`; do
625     NUM_COMPUTES_PER_SITE=$((NUM_OPENSTACK_COMPUTE_NODES / NUM_OPENSTACK_SITES))
626     SITE_INDEX=$((((i - 1) / NUM_COMPUTES_PER_SITE) + 1)) # We need the site index to infer the control node IP for this compute
627     COMPUTEIP=OPENSTACK_COMPUTE_NODE_${i}_IP
628     CONTROLIP=OPENSTACK_CONTROL_NODE_${SITE_INDEX}_IP
629     echo "Stack the compute node ${i} of ${NUM_OPENSTACK_COMPUTE_NODES}: ${COMPUTEIP}"
630     create_etc_hosts ${!COMPUTEIP} ${!CONTROLIP}
631     scp ${WORKSPACE}/hosts_file ${!COMPUTEIP}:/tmp/hosts
632     scp ${WORKSPACE}/get_devstack.sh  ${!COMPUTEIP}:/tmp
633     ${SSH} ${!COMPUTEIP} "bash /tmp/get_devstack.sh > /tmp/get_devstack.sh.txt 2>&1"
634     create_compute_node_local_conf ${!COMPUTEIP} ${!CONTROLIP} ${ODLMGRIP[$SITE_INDEX]} "${ODL_OVS_MGRS[$SITE_INDEX]}"
635     scp ${WORKSPACE}/local.conf_compute_${!COMPUTEIP} ${!COMPUTEIP}:/opt/stack/devstack/local.conf
636     ssh ${!COMPUTEIP} "cd /opt/stack/devstack; nohup ./stack.sh > /opt/stack/devstack/nohup.out 2>&1 &"
637     ssh ${!COMPUTEIP} "ps -ef | grep stack.sh"
638     os_node_list+=(${!COMPUTEIP})
639     # Workaround for https://review.openstack.org/#/c/491032/
640     # Modify upper-constraints to use libvirt-python 3.2.0
641     if [ "${ODL_ML2_BRANCH}" == "stable/ocata" ]; then
642         ${SSH} ${!COMPUTEIP} "
643             cd /opt/stack;
644             git clone https://git.openstack.org/openstack/requirements;
645             cd requirements;
646             git checkout stable/ocata;
647             sed -i s/libvirt-python===2.5.0/libvirt-python===3.2.0/ upper-constraints.txt
648         "
649     fi
650 done
651
652 echo "nodelist: ${os_node_list[*]}"
653
654 # This script runs on the openstack nodes. It greps for a string that devstack writes when stacking is complete.
655 # The script then writes a status depending on the grep output that is later scraped by the robot vm to control
656 # the status polling.
657 cat > ${WORKSPACE}/check_stacking.sh << EOF
658 > /tmp/stack_progress
659 ps -ef | grep "stack.sh" | grep -v grep
660 ret=\$?
661 if [ \${ret} -eq 1 ]; then
662     grep "This is your host IP address:" /opt/stack/devstack/nohup.out
663     if [ \$? -eq 0 ]; then
664         echo "Stacking Complete" > /tmp/stack_progress
665     else
666         echo "Stacking Failed" > /tmp/stack_progress
667     fi
668 elif [ \${ret} -eq 0 ]; then
669     echo "Still Stacking" > /tmp/stack_progress
670 fi
671 EOF
672
673 # Check if the stacking is finished. Poll all nodes every 60s for one hour.
674 iteration=0
675 in_progress=1
676 while [ ${in_progress} -eq 1 ]; do
677     iteration=$(($iteration + 1))
678     for index in "${!os_node_list[@]}"; do
679         echo "node $index ${os_node_list[index]}: checking stacking status attempt ${iteration} of 60"
680         scp ${WORKSPACE}/check_stacking.sh  ${os_node_list[index]}:/tmp
681         ${SSH} ${os_node_list[index]} "bash /tmp/check_stacking.sh"
682         scp ${os_node_list[index]}:/tmp/stack_progress .
683         cat stack_progress
684         stacking_status=`cat stack_progress`
685         if [ "$stacking_status" == "Still Stacking" ]; then
686             continue
687         elif [ "$stacking_status" == "Stacking Failed" ]; then
688             echo "node $index ${os_node_list[index]}: stacking has failed"
689             collect_logs
690             exit 1
691         elif [ "$stacking_status" == "Stacking Complete" ]; then
692             echo "node $index ${os_node_list[index]}: stacking complete"
693             unset 'os_node_list[index]'
694             if  [ ${#os_node_list[@]} -eq 0 ]; then
695                 in_progress=0
696             fi
697         fi
698     done
699     echo "sleep for a minute before the next check"
700     sleep 60
701     if [ ${iteration} -eq 60 ]; then
702         echo "stacking has failed - took longer than 60m"
703         collect_logs
704         exit 1
705     fi
706 done
707
708 # Further configuration now that stacking is complete.
709 NUM_COMPUTES_PER_SITE=$((NUM_OPENSTACK_COMPUTE_NODES / NUM_OPENSTACK_SITES))
710 for i in `seq 1 ${NUM_OPENSTACK_SITES}`; do
711     echo "Configure the Control Node"
712     CONTROLIP=OPENSTACK_CONTROL_NODE_${i}_IP
713     # Gather Compute IPs for the site
714     for j in `seq 1 ${NUM_COMPUTES_PER_SITE}`; do
715         COMPUTE_INDEX=$(((i-1) * NUM_COMPUTES_PER_SITE + j))
716         IP_VAR=OPENSTACK_COMPUTE_NODE_${COMPUTE_INDEX}_IP
717         COMPUTE_IPS[$((j-1))]=${!IP_VAR}
718     done
719
720     # Need to disable firewalld and iptables in compute nodes as well
721     for ip in ${COMPUTE_IPS[*]}; do
722         scp ${WORKSPACE}/disable_firewall.sh "${ip}:/tmp"
723         ${SSH} "${ip}" "sudo bash /tmp/disable_firewall.sh"
724     done
725
726     #Need to disable firewalld and iptables in control node
727     echo "Stop Firewall in Control Node for compute nodes to be able to reach the ports and add to hypervisor-list"
728     scp ${WORKSPACE}/disable_firewall.sh ${!CONTROLIP}:/tmp
729     ${SSH} ${!CONTROLIP} "sudo bash /tmp/disable_firewall.sh"
730
731     echo "sleep for 60s and print hypervisor-list"
732     sleep 60
733     # In Ocata if we do not enable the n-cpu in control node then
734     # we need to discover hosts manually and ensure that they are mapped to cells.
735     # reference: https://ask.openstack.org/en/question/102256/how-to-configure-placement-service-for-compute-node-on-ocata/
736     if [ "${OPENSTACK_BRANCH}" == "stable/ocata" ]; then
737         scp ${WORKSPACE}/setup_host_cell_mapping.sh  ${!CONTROLIP}:/tmp
738         ${SSH} ${!CONTROLIP} "sudo bash /tmp/setup_host_cell_mapping.sh"
739     fi
740     ${SSH} ${!CONTROLIP} "cd /opt/stack/devstack; source openrc admin admin; nova hypervisor-list"
741     # in the case that we are doing openstack (control + compute) all in one node, then the number of hypervisors
742     # will be the same as the number of openstack systems. However, if we are doing multinode openstack then the
743     # assumption is we have a single control node and the rest are compute nodes, so the number of expected hypervisors
744     # is one less than the total number of openstack systems
745     if [ $((NUM_OPENSTACK_SYSTEM / NUM_OPENSTACK_SITES)) -eq 1 ]; then
746         expected_num_hypervisors=1
747     else
748         expected_num_hypervisors=${NUM_COMPUTES_PER_SITE}
749     fi
750     num_hypervisors=$(${SSH} ${!CONTROLIP} "cd /opt/stack/devstack; source openrc admin admin; openstack hypervisor list -f value | wc -l" | tail -1 | tr -d "\r")
751     if ! [ "${num_hypervisors}" ] || ! [ ${num_hypervisors} -eq ${expected_num_hypervisors} ]; then
752         echo "Error: Only $num_hypervisors hypervisors detected, expected $expected_num_hypervisors"
753         collect_logs
754         exit 1
755     fi
756
757     # upgrading pip, urllib3 and httplib2 so that tempest tests can be run on openstack control node
758     # this needs to happen after devstack runs because it seems devstack is pulling in specific versions
759     # of these libs that are not working for tempest.
760     ${SSH} ${!CONTROLIP} "sudo pip install --upgrade pip"
761     ${SSH} ${!CONTROLIP} "sudo pip install urllib3 --upgrade"
762     ${SSH} ${!CONTROLIP} "sudo pip install httplib2 --upgrade"
763
764     # Gather Compute IPs for the site
765     for j in `seq 1 ${NUM_COMPUTES_PER_SITE}`; do
766         COMPUTE_INDEX=$(((i-1) * NUM_COMPUTES_PER_SITE + j))
767         IP_VAR=OPENSTACK_COMPUTE_NODE_${COMPUTE_INDEX}_IP
768         COMPUTE_IPS[$((j-1))]=${!IP_VAR}
769     done
770
771     # Need to disable firewalld and iptables in compute nodes as well
772     for ip in ${COMPUTE_IPS[*]}; do
773         scp ${WORKSPACE}/disable_firewall.sh "${ip}:/tmp"
774         ${SSH} "${ip}" "sudo bash /tmp/disable_firewall.sh"
775     done
776
777     # External Network
778     echo "prepare external networks by adding vxlan tunnels between all nodes on a separate bridge..."
779     # FIXME Should there be a unique gateway IP and devstack index for each site?
780     devstack_index=1
781     for ip in ${!CONTROLIP} ${COMPUTE_IPS[*]}; do
782         # FIXME - Workaround, ODL (new netvirt) currently adds PUBLIC_BRIDGE as a port in br-int since it doesn't see such a bridge existing when we stack
783         ${SSH} $ip "sudo ovs-vsctl --if-exists del-port br-int $PUBLIC_BRIDGE"
784         ${SSH} $ip "sudo ovs-vsctl --may-exist add-br $PUBLIC_BRIDGE -- set bridge $PUBLIC_BRIDGE other-config:disable-in-band=true other_config:hwaddr=f6:00:00:ff:01:0$((devstack_index++))"
785     done
786
787     # ipsec support
788     if [ "${IPSEC_VXLAN_TUNNELS_ENABLED}" == "yes" ]; then
789         ALL_NODES=(${!CONTROLIP} ${COMPUTE_IPS[*]})
790         for ((inx_ip1=0; inx_ip1<$((${#ALL_NODES[@]} - 1)); inx_ip1++)); do
791             for ((inx_ip2=$((inx_ip1 + 1)); inx_ip2<${#ALL_NODES[@]}; inx_ip2++)); do
792                 KEY1=0x$(dd if=/dev/urandom count=32 bs=1 2> /dev/null| xxd -p -c 64)
793                 KEY2=0x$(dd if=/dev/urandom count=32 bs=1 2> /dev/null| xxd -p -c 64)
794                 ID=0x$(dd if=/dev/urandom count=4 bs=1 2> /dev/null| xxd -p -c 8)
795                 ip1=${ALL_NODES[$inx_ip1]}
796                 ip2=${ALL_NODES[$inx_ip2]}
797                 ${SSH} $ip1 "sudo ip xfrm state add src $ip1 dst $ip2 proto esp spi $ID reqid $ID mode transport auth sha256 $KEY1 enc aes $KEY2"
798                 ${SSH} $ip1 "sudo ip xfrm state add src $ip2 dst $ip1 proto esp spi $ID reqid $ID mode transport auth sha256 $KEY1 enc aes $KEY2"
799                 ${SSH} $ip1 "sudo ip xfrm policy add src $ip1 dst $ip2 proto udp dir out tmpl src $ip1 dst $ip2 proto esp reqid $ID mode transport"
800                 ${SSH} $ip1 "sudo ip xfrm policy add src $ip2 dst $ip1 proto udp dir in tmpl src $ip2 dst $ip1 proto esp reqid $ID mode transport"
801
802                 ${SSH} $ip2 "sudo ip xfrm state add src $ip2 dst $ip1 proto esp spi $ID reqid $ID mode transport auth sha256 $KEY1 enc aes $KEY2"
803                 ${SSH} $ip2 "sudo ip xfrm state add src $ip1 dst $ip2 proto esp spi $ID reqid $ID mode transport auth sha256 $KEY1 enc aes $KEY2"
804                 ${SSH} $ip2 "sudo ip xfrm policy add src $ip2 dst $ip1 proto udp dir out tmpl src $ip2 dst $ip1 proto esp reqid $ID mode transport"
805                 ${SSH} $ip2 "sudo ip xfrm policy add src $ip1 dst $ip2 proto udp dir in tmpl src $ip1 dst $ip2 proto esp reqid $ID mode transport"
806             done
807         done
808
809         for ip in ${!CONTROLIP} ${COMPUTE_IPS[*]}; do
810             echo "ip xfrm configuration for node $ip:"
811             ${SSH} $ip "sudo ip xfrm policy list"
812             ${SSH} $ip "sudo ip xfrm state list"
813         done
814     fi
815
816     # Control Node - PUBLIC_BRIDGE will act as the external router
817     # Parameter values below are used in integration/test - changing them requires updates in intergration/test as well
818     EXTNET_GATEWAY_IP="10.10.10.250"
819     EXTNET_INTERNET_IP="10.9.9.9"
820     EXTNET_PNF_IP="10.10.10.253"
821     ${SSH} ${!CONTROLIP} "sudo ifconfig ${PUBLIC_BRIDGE} up ${EXTNET_GATEWAY_IP}/24"
822
823     # Control Node - external net PNF simulation
824     ${SSH} ${!CONTROLIP} "
825         sudo ip netns add pnf_ns;
826         sudo ip link add pnf_veth0 type veth peer name pnf_veth1;
827         sudo ip link set pnf_veth1 netns pnf_ns;
828         sudo ip link set pnf_veth0 up;
829         sudo ip netns exec pnf_ns ifconfig pnf_veth1 up ${EXTNET_PNF_IP}/24;
830         sudo ovs-vsctl add-port ${PUBLIC_BRIDGE} pnf_veth0;
831     "
832
833     # Control Node - external net internet address simulation
834     ${SSH} ${!CONTROLIP} "
835         sudo ip tuntap add dev internet_tap mode tap;
836         sudo ifconfig internet_tap up ${EXTNET_INTERNET_IP}/24;
837     "
838
839     # Computes
840     compute_index=1
841     for compute_ip in ${COMPUTE_IPS[*]}; do
842         # Tunnel from controller to compute
843         COMPUTEPORT=compute$(( compute_index++ ))_vxlan
844         ${SSH} ${!CONTROLIP} "
845             sudo ovs-vsctl add-port $PUBLIC_BRIDGE $COMPUTEPORT -- set interface $COMPUTEPORT type=vxlan options:local_ip=${!CONTROLIP} options:remote_ip=$compute_ip options:dst_port=9876 options:key=flow
846         "
847         # Tunnel from compute to controller
848         CONTROLPORT="control_vxlan"
849         ${SSH} $compute_ip "
850             sudo ovs-vsctl add-port $PUBLIC_BRIDGE $CONTROLPORT -- set interface $CONTROLPORT type=vxlan options:local_ip=$compute_ip options:remote_ip=${!CONTROLIP} options:dst_port=9876 options:key=flow
851         "
852     done
853 done
854
855 if [ "${ENABLE_HAPROXY_FOR_NEUTRON}" == "yes" ]; then
856     odlmgrip=OPENSTACK_HAPROXY_1_IP
857     HA_PROXY_IP=${!odlmgrip}
858     HA_PROXY_1_IP=${!odlmgrip}
859     odlmgrip2=OPENSTACK_HAPROXY_2_IP
860     HA_PROXY_2_IP=${!odlmgrip2}
861     odlmgrip3=OPENSTACK_HAPROXY_1_IP
862     HA_PROXY_3_IP=${!odlmgrip3}
863 else
864     HA_PROXY_IP=${ODL_SYSTEM_IP}
865     HA_PROXY_1_IP=${ODL_SYSTEM_1_IP}
866     HA_PROXY_2_IP=${ODL_SYSTEM_2_IP}
867     HA_PROXY_3_IP=${ODL_SYSTEM_3_IP}
868 fi
869
870 echo "Locating test plan to use..."
871 testplan_filepath="${WORKSPACE}/test/csit/testplans/${STREAMTESTPLAN}"
872 if [ ! -f "${testplan_filepath}" ]; then
873     testplan_filepath="${WORKSPACE}/test/csit/testplans/${TESTPLAN}"
874 fi
875
876 echo "Changing the testplan path..."
877 cat "${testplan_filepath}" | sed "s:integration:${WORKSPACE}:" > testplan.txt
878 cat testplan.txt
879
880 # Use the testplan if specific SUITES are not defined.
881 if [ -z "${SUITES}" ]; then
882     SUITES=`egrep -v '(^[[:space:]]*#|^[[:space:]]*$)' testplan.txt | tr '\012' ' '`
883 fi
884
885 if [ "${OPENSTACK_BRANCH}" == "stable/pike" ]; then
886    AUTH="http://${!CONTROLIP}/identity"
887 else
888    AUTH="http://${!CONTROLIP}:35357/v3"
889 fi
890
891 # Environment Variables Needed to execute Openstack Client for NetVirt Jobs
892 cat > /tmp/os_netvirt_client_rc << EOF
893 export OS_USERNAME=admin
894 export OS_PASSWORD=admin
895 export OS_PROJECT_NAME=admin
896 export OS_USER_DOMAIN_NAME=default
897 export OS_PROJECT_DOMAIN_NAME=default
898 export OS_AUTH_URL=${AUTH}
899 export OS_IDENTITY_API_VERSION=3
900 export OS_IMAGE_API_VERSION=2
901 export OS_TENANT_NAME=admin
902 unset OS_CLOUD
903 EOF
904
905 source /tmp/os_netvirt_client_rc
906
907 echo "Starting Robot test suites ${SUITES} ..."
908 # please add pybot -v arguments on a single line and alphabetized
909 pybot -N ${TESTPLAN} --removekeywords wuks -c critical -e exclude -e skip_if_${DISTROSTREAM} \
910     -v BUNDLEFOLDER:${BUNDLEFOLDER} \
911     -v BUNDLE_URL:${ACTUAL_BUNDLE_URL} \
912     -v CONTROLLER_USER:${USER} \
913     -v DEVSTACK_DEPLOY_PATH:/opt/stack/devstack \
914     -v HA_PROXY_IP:${HA_PROXY_IP} \
915     -v HA_PROXY_1_IP:${HA_PROXY_1_IP} \
916     -v HA_PROXY_2_IP:${HA_PROXY_2_IP} \
917     -v HA_PROXY_3_IP:${HA_PROXY_3_IP} \
918     -v JDKVERSION:${JDKVERSION} \
919     -v NEXUSURL_PREFIX:${NEXUSURL_PREFIX} \
920     -v NUM_ODL_SYSTEM:${NUM_ODL_SYSTEM} \
921     -v NUM_OPENSTACK_SITES:${NUM_OPENSTACK_SITES} \
922     -v NUM_OS_SYSTEM:${NUM_OPENSTACK_SYSTEM} \
923     -v NUM_TOOLS_SYSTEM:${NUM_TOOLS_SYSTEM} \
924     -v ODL_SNAT_MODE:${ODL_SNAT_MODE} \
925     -v ODL_STREAM:${DISTROSTREAM} \
926     -v ODL_SYSTEM_IP:${ODL_SYSTEM_IP} \
927     -v ODL_SYSTEM_1_IP:${ODL_SYSTEM_1_IP} \
928     -v ODL_SYSTEM_2_IP:${ODL_SYSTEM_2_IP} \
929     -v ODL_SYSTEM_3_IP:${ODL_SYSTEM_3_IP} \
930     -v ODL_SYSTEM_4_IP:${ODL_SYSTEM_4_IP} \
931     -v ODL_SYSTEM_5_IP:${ODL_SYSTEM_5_IP} \
932     -v ODL_SYSTEM_6_IP:${ODL_SYSTEM_6_IP} \
933     -v ODL_SYSTEM_7_IP:${ODL_SYSTEM_7_IP} \
934     -v ODL_SYSTEM_8_IP:${ODL_SYSTEM_8_IP} \
935     -v ODL_SYSTEM_9_IP:${ODL_SYSTEM_9_IP} \
936     -v OS_CONTROL_NODE_IP:${OPENSTACK_CONTROL_NODE_1_IP} \
937     -v OS_CONTROL_NODE_1_IP:${OPENSTACK_CONTROL_NODE_1_IP} \
938     -v OS_CONTROL_NODE_2_IP:${OPENSTACK_CONTROL_NODE_2_IP} \
939     -v OS_CONTROL_NODE_3_IP:${OPENSTACK_CONTROL_NODE_3_IP} \
940     -v OPENSTACK_BRANCH:${OPENSTACK_BRANCH} \
941     -v OS_COMPUTE_1_IP:${OPENSTACK_COMPUTE_NODE_1_IP} \
942     -v OS_COMPUTE_2_IP:${OPENSTACK_COMPUTE_NODE_2_IP} \
943     -v OS_COMPUTE_3_IP:${OPENSTACK_COMPUTE_NODE_3_IP} \
944     -v OS_COMPUTE_4_IP:${OPENSTACK_COMPUTE_NODE_4_IP} \
945     -v OS_COMPUTE_5_IP:${OPENSTACK_COMPUTE_NODE_5_IP} \
946     -v OS_COMPUTE_6_IP:${OPENSTACK_COMPUTE_NODE_6_IP} \
947     -v OS_USER:${USER} \
948     -v PUBLIC_PHYSICAL_NETWORK:${PUBLIC_PHYSICAL_NETWORK} \
949     -v SECURITY_GROUP_MODE:${SECURITY_GROUP_MODE} \
950     -v TOOLS_SYSTEM_IP:${TOOLS_SYSTEM_1_IP} \
951     -v TOOLS_SYSTEM_1_IP:${TOOLS_SYSTEM_1_IP} \
952     -v TOOLS_SYSTEM_2_IP:${TOOLS_SYSTEM_2_IP} \
953     -v USER_HOME:${HOME} \
954     -v WORKSPACE:/tmp \
955     ${TESTOPTIONS} ${SUITES} || true
956
957 echo "Examining the files in data/log and checking file size"
958 ssh ${ODL_SYSTEM_IP} "ls -altr /tmp/${BUNDLEFOLDER}/data/log/"
959 ssh ${ODL_SYSTEM_IP} "du -hs /tmp/${BUNDLEFOLDER}/data/log/*"
960
961 echo "Tests Executed"
962 collect_logs
963
964 true  # perhaps Jenkins is testing last exit code
965 # vim: ts=4 sw=4 sts=4 et ft=sh :