1 #@IgnoreInspection BashAddShebang
2 # Activate robotframework virtualenv
3 # ${ROBOT_VENV} comes from the integration-install-robotframework.sh
5 # shellcheck source=${ROBOT_VENV}/bin/activate disable=SC1091
6 source ${ROBOT_VENV}/bin/activate
7 PYTHON="${ROBOT_VENV}/bin/python"
11 # TODO: remove this work to run changes.py if/when it's moved higher up to be visible at the Robot level
12 echo "showing recent changes that made it in to the distribution used by this job"
13 $PYTHON -m pip install --upgrade urllib3
14 python ${WORKSPACE}/test/tools/distchanges/changes.py -d /tmp/distribution_folder \
15 -u ${ACTUAL_BUNDLE_URL} -b ${DISTROBRANCH} \
16 -r ssh://jenkins-${SILO}@git.opendaylight.org:29418 || true
18 echo "#################################################"
19 echo "## Deploy Openstack 3-node ##"
20 echo "#################################################"
22 # Catch command errors and collect logs.
23 # This ensures logs are collected when script commands fail rather than simply exiting.
24 function trap_handler() {
28 echo "${prog}: line ${lastline}: exit status of last command: ${lasterr}"
29 echo "command: ${BASH_COMMAND}"
34 trap 'trap_handler ${LINENO} ${$?}' ERR
36 function create_etc_hosts() {
39 : > ${WORKSPACE}/hosts_file
40 for iter in `seq 1 ${NUM_OPENSTACK_COMPUTE_NODES}`
42 COMPUTE_IP=OPENSTACK_COMPUTE_NODE_${iter}_IP
43 if [ "${!COMPUTE_IP}" == "${NODE_IP}" ]; then
44 CONTROL_HNAME=$(${SSH} ${CTRL_IP} "hostname")
45 echo "${CTRL_IP} ${CONTROL_HNAME}" >> ${WORKSPACE}/hosts_file
47 COMPUTE_HNAME=$(${SSH} ${!COMPUTE_IP} "hostname")
48 echo "${!COMPUTE_IP} ${COMPUTE_HNAME}" >> ${WORKSPACE}/hosts_file
52 echo "Created the hosts file for ${NODE_IP}:"
53 cat ${WORKSPACE}/hosts_file
54 } # create_etc_hosts()
56 # convert commas in csv strings to spaces (ssv)
59 if [ -n "${csv}" ]; then
60 ssv=$(echo ${csv} | sed 's/,/ /g' | sed 's/\ \ */\ /g')
66 function create_control_node_local_conf() {
71 local_conf_file_name=${WORKSPACE}/local.conf_control_${HOSTIP}
72 cat > ${local_conf_file_name} << EOF
76 SCREEN_LOGDIR=/opt/stack/data/log
83 CORE_OS_SERVICES="dstat,g-api,g-reg,key,mysql,n-api,n-cauth,n-cond,n-crt,n-obj,n-sch,odl-compute,odl-neutron,q-dhcp,q-meta,q-svc,rabbit"
84 cat >> ${local_conf_file_name} << EOF
85 enable_service $(csv2ssv "${CORE_OS_SERVICES}")
87 if [ -n "${ENABLE_OS_SERVICES}" ]; then
88 cat >> ${local_conf_file_name} << EOF
89 enable_service $(csv2ssv "${ENABLE_OS_SERVICES}")
92 if [ -n "${DISABLE_OS_SERVICES}" ]; then
93 cat >> ${local_conf_file_name} << EOF
94 disable_service $(csv2ssv "${DISABLE_OS_SERVICES}")
98 cat >> ${local_conf_file_name} << EOF
101 SERVICE_HOST=\$HOST_IP
102 Q_ML2_TENANT_NETWORK_TYPE=${TENANT_NETWORK_TYPE}
103 NEUTRON_CREATE_INITIAL_NETWORKS=${CREATE_INITIAL_NETWORKS}
105 #ENABLE_TENANT_TUNNELS=True
111 ODL_PORT_BINDING_CONTROLLER=${ODL_ML2_PORT_BINDING}
112 ODL_OVS_MANAGERS=${ODL_OVS_MANAGERS}
114 MYSQL_HOST=\$SERVICE_HOST
115 RABBIT_HOST=\$SERVICE_HOST
116 GLANCE_HOSTPORT=\$SERVICE_HOST:9292
117 KEYSTONE_AUTH_HOST=\$SERVICE_HOST
118 KEYSTONE_SERVICE_HOST=\$SERVICE_HOST
120 ADMIN_PASSWORD=${ADMIN_PASSWORD}
121 DATABASE_PASSWORD=${ADMIN_PASSWORD}
122 RABBIT_PASSWORD=${ADMIN_PASSWORD}
123 SERVICE_TOKEN=${ADMIN_PASSWORD}
124 SERVICE_PASSWORD=${ADMIN_PASSWORD}
126 NEUTRON_LBAAS_SERVICE_PROVIDERV2=${LBAAS_SERVICE_PROVIDER} # Only relevant if neutron-lbaas plugin is enabled
127 NEUTRON_SFC_DRIVERS=${ODL_SFC_DRIVER} # Only relevant if networking-sfc plugin is enabled
128 NEUTRON_FLOWCLASSIFIER_DRIVERS=${ODL_SFC_DRIVER} # Only relevant if networking-sfc plugin is enabled
132 if [ "${ODL_ML2_DRIVER_VERSION}" == "v2" ]; then
133 echo "ODL_V2DRIVER=True" >> ${local_conf_file_name}
137 for plugin_name in ${ENABLE_OS_PLUGINS}; do
138 if [ "$plugin_name" == "networking-odl" ]; then
139 ENABLE_PLUGIN_ARGS="${ODL_ML2_DRIVER_REPO} ${ODL_ML2_BRANCH}"
140 elif [ "$plugin_name" == "kuryr-kubernetes" ]; then
141 ENABLE_PLUGIN_ARGS="${DEVSTACK_KUBERNETES_PLUGIN_REPO} master" # note: kuryr-kubernetes only exists in master at the moment
142 elif [ "$plugin_name" == "neutron-lbaas" ]; then
143 ENABLE_PLUGIN_ARGS="${DEVSTACK_LBAAS_PLUGIN_REPO} ${OPENSTACK_BRANCH}"
144 IS_LBAAS_PLUGIN_ENABLED="yes"
145 elif [ "$plugin_name" == "networking-sfc" ]; then
146 ENABLE_PLUGIN_ARGS="${DEVSTACK_NETWORKING_SFC_PLUGIN_REPO} ${OPENSTACK_BRANCH}"
148 echo "Error: Invalid plugin $plugin_name, unsupported"
151 cat >> ${local_conf_file_name} << EOF
153 enable_plugin ${plugin_name} ${ENABLE_PLUGIN_ARGS}
158 if [ "${ENABLE_NETWORKING_L2GW}" == "yes" ]; then
159 cat >> ${local_conf_file_name} << EOF
161 enable_plugin networking-l2gw ${NETWORKING_L2GW_DRIVER} ${ODL_ML2_BRANCH}
162 NETWORKING_L2GW_SERVICE_DRIVER=L2GW:OpenDaylight:networking_odl.l2gateway.driver.OpenDaylightL2gwDriver:default
166 if [ "${ODL_ENABLE_L3_FWD}" == "yes" ]; then
167 cat >> ${local_conf_file_name} << EOF
169 PUBLIC_BRIDGE=${PUBLIC_BRIDGE}
170 PUBLIC_PHYSICAL_NETWORK=${PUBLIC_PHYSICAL_NETWORK}
171 ML2_VLAN_RANGES=${PUBLIC_PHYSICAL_NETWORK}
172 ODL_PROVIDER_MAPPINGS=${ODL_PROVIDER_MAPPINGS}
175 if [ "${ODL_ML2_DRIVER_VERSION}" == "v2" ]; then
176 SERVICE_PLUGINS="odl-router_v2"
178 SERVICE_PLUGINS="odl-router"
180 if [ "${ENABLE_NETWORKING_L2GW}" == "yes" ]; then
181 SERVICE_PLUGINS+=", networking_l2gw.services.l2gateway.plugin.L2GatewayPlugin"
183 if [ "${IS_LBAAS_PLUGIN_ENABLED}" == "yes" ]; then
184 SERVICE_PLUGINS+=", lbaasv2"
186 fi #check for ODL_ENABLE_L3_FWD
188 cat >> ${local_conf_file_name} << EOF
190 [[post-config|\$NEUTRON_CONF]]
192 service_plugins = ${SERVICE_PLUGINS}
194 [[post-config|/etc/neutron/plugins/ml2/ml2_conf.ini]]
196 minimize_polling=True
199 # Needed for VLAN provider tests - because our provider networks are always encapsulated in VXLAN (br-physnet1)
200 # MTU(1440) + VXLAN(50) + VLAN(4) = 1494 < MTU eth0/br-physnet1(1500)
201 physical_network_mtus = ${PUBLIC_PHYSICAL_NETWORK}:1440
204 # workaround for port-status not working due to https://bugs.opendaylight.org/show_bug.cgi?id=9092
208 [[post-config|/etc/neutron/dhcp_agent.ini]]
210 force_metadata = True
211 enable_isolated_metadata = True
213 [[post-config|/etc/nova/nova.conf]]
215 force_config_drive = False
218 discover_hosts_in_cells_interval = 30
221 echo "Control local.conf created:"
222 cat ${local_conf_file_name}
223 } # create_control_node_local_conf()
225 function create_compute_node_local_conf() {
229 ODL_OVS_MANAGERS="$4"
231 local_conf_file_name=${WORKSPACE}/local.conf_compute_${HOSTIP}
232 cat > ${local_conf_file_name} << EOF
237 SCREEN_LOGDIR=/opt/stack/data/log
243 CORE_OS_SERVICES="n-cpu,odl-compute"
244 cat >> ${local_conf_file_name} << EOF
245 enable_service $(csv2ssv "${CORE_OS_SERVICES}")
247 if [ -n "${ENABLE_OS_COMPUTE_SERVICES}" ]; then
248 cat >> ${local_conf_file_name} << EOF
249 enable_service $(csv2ssv "${ENABLE_OS_COMPUTE_SERVICES}")
252 if [ -n "${DISABLE_OS_SERVICES}" ]; then
253 cat >> ${local_conf_file_name} << EOF
254 disable_service $(csv2ssv "${DISABLE_OS_SERVICES}")
258 cat >> ${local_conf_file_name} << EOF
261 SERVICE_HOST=${SERVICEHOST}
262 Q_ML2_TENANT_NETWORK_TYPE=${TENANT_NETWORK_TYPE}
264 #ENABLE_TENANT_TUNNELS=True
271 ODL_PORT_BINDING_CONTROLLER=${ODL_ML2_PORT_BINDING}
272 ODL_OVS_MANAGERS=${ODL_OVS_MANAGERS}
274 Q_HOST=\$SERVICE_HOST
275 MYSQL_HOST=\$SERVICE_HOST
276 RABBIT_HOST=\$SERVICE_HOST
277 GLANCE_HOSTPORT=\$SERVICE_HOST:9292
278 KEYSTONE_AUTH_HOST=\$SERVICE_HOST
279 KEYSTONE_SERVICE_HOST=\$SERVICE_HOST
281 ADMIN_PASSWORD=${ADMIN_PASSWORD}
282 DATABASE_PASSWORD=${ADMIN_PASSWORD}
283 RABBIT_PASSWORD=${ADMIN_PASSWORD}
284 SERVICE_TOKEN=${ADMIN_PASSWORD}
285 SERVICE_PASSWORD=${ADMIN_PASSWORD}
288 if [[ "${ENABLE_OS_PLUGINS}" =~ networking-odl ]]; then
289 cat >> ${local_conf_file_name} << EOF
291 enable_plugin networking-odl ${ODL_ML2_DRIVER_REPO} ${ODL_ML2_BRANCH}
295 if [ "${ODL_ENABLE_L3_FWD}" == "yes" ]; then
296 cat >> ${local_conf_file_name} << EOF
298 PUBLIC_BRIDGE=${PUBLIC_BRIDGE}
299 PUBLIC_PHYSICAL_NETWORK=${PUBLIC_PHYSICAL_NETWORK}
300 ODL_PROVIDER_MAPPINGS=${ODL_PROVIDER_MAPPINGS}
306 cat >> ${local_conf_file_name} << EOF
308 [[post-config|/etc/nova/nova.conf]]
310 auth_strategy = keystone
315 echo "Compute local.conf created:"
316 cat ${local_conf_file_name}
317 } # create_compute_node_local_conf()
319 function configure_haproxy_for_neutron_requests() {
323 cat > ${WORKSPACE}/install_ha_proxy.sh<< EOF
324 sudo systemctl stop firewalld
325 sudo yum -y install policycoreutils-python haproxy
328 cat > ${WORKSPACE}/haproxy.cfg << EOF
334 pidfile /tmp/haproxy.pid
342 timeout http-request 10s
355 for odlip in ${ODL_IPS[*]}; do
356 cat >> ${WORKSPACE}/haproxy.cfg << EOF
357 server controller-${odlindex} ${odlip}:8080 check fall 5 inter 2000 rise 2
359 odlindex=$((odlindex+1))
362 cat >> ${WORKSPACE}/haproxy.cfg << EOF
363 listen opendaylight_rest
369 for odlip in ${ODL_IPS[*]}; do
370 cat >> ${WORKSPACE}/haproxy.cfg << EOF
371 server controller-rest-${odlindex} ${odlip}:8181 check fall 5 inter 2000 rise 2
373 odlindex=$((odlindex+1))
376 echo "Dump haproxy.cfg"
377 cat ${WORKSPACE}/haproxy.cfg
379 cat > ${WORKSPACE}/deploy_ha_proxy.sh<< EOF
380 sudo chown haproxy:haproxy /tmp/haproxy.cfg
381 sudo sed -i 's/\\/etc\\/haproxy\\/haproxy.cfg/\\/tmp\\/haproxy.cfg/g' /usr/lib/systemd/system/haproxy.service
382 sudo /usr/sbin/semanage permissive -a haproxy_t
383 sudo systemctl restart haproxy
386 sudo systemctl status haproxy
390 scp ${WORKSPACE}/install_ha_proxy.sh ${MGRIP}:/tmp
391 ${SSH} ${MGRIP} "sudo bash /tmp/install_ha_proxy.sh"
392 scp ${WORKSPACE}/haproxy.cfg ${MGRIP}:/tmp
393 scp ${WORKSPACE}/deploy_ha_proxy.sh ${MGRIP}:/tmp
394 ${SSH} ${MGRIP} "sudo bash /tmp/deploy_ha_proxy.sh"
395 } # configure_haproxy_for_neutron_requests()
397 function collect_logs () {
398 set +e # We do not want to create red dot just because something went wrong while fetching logs.
399 for i in `seq 1 ${NUM_ODL_SYSTEM}`; do
400 CONTROLLERIP=ODL_SYSTEM_${i}_IP
401 echo "Lets's take the karaf thread dump again..."
402 KARAF_PID=$(ssh ${!CONTROLLERIP} "ps aux | grep ${KARAF_ARTIFACT} | grep -v grep | tr -s ' ' | cut -f2 -d' '")
403 ssh ${!CONTROLLERIP} "jstack $KARAF_PID"> ${WORKSPACE}/karaf_${i}_threads_after.log || true
404 echo "killing karaf process..."
405 ${SSH} "${!CONTROLLERIP}" bash -c 'ps axf | grep karaf | grep -v grep | awk '"'"'{print "kill -9 " $1}'"'"' | sh'
408 cat > extra_debug.sh << EOF
409 echo -e "/usr/sbin/lsmod | /usr/bin/grep openvswitch\n"
410 /usr/sbin/lsmod | /usr/bin/grep openvswitch
411 echo -e "\ngrep ct_ /var/log/openvswitch/ovs-vswitchd.log\n"
412 grep ct_ /var/log/openvswitch/ovs-vswitchd.log
413 echo -e "\novsdb-tool -mm show-log\n"
414 ovsdb-tool -mm show-log
415 echo -e "\nsudo netstat -punta\n"
417 echo -e "\nsudo getenforce\n"
419 echo -e "\njournalctl > /tmp/journalctl.log\n"
420 journalctl > /tmp/journalctl.log
424 # FIXME: Do not create .tar and gzip before copying.
425 for i in `seq 1 ${NUM_ODL_SYSTEM}`; do
426 CONTROLLERIP=ODL_SYSTEM_${i}_IP
427 ${SSH} "${!CONTROLLERIP}" "cp -r /tmp/${BUNDLEFOLDER}/data/log /tmp/odl_log"
428 ${SSH} "${!CONTROLLERIP}" "tar -cf /tmp/odl${i}_karaf.log.tar /tmp/odl_log/*"
429 scp "${!CONTROLLERIP}:/tmp/odl${i}_karaf.log.tar" "${WORKSPACE}/odl${i}_karaf.log.tar"
430 ${SSH} "${!CONTROLLERIP}" "tar -cf /tmp/odl${i}_zrpcd.log.tar /tmp/zrpcd.init.log"
431 scp "${!CONTROLLERIP}:/tmp/odl${i}_zrpcd.log.tar" "${WORKSPACE}/odl${i}_zrpcd.log.tar"
432 tar -xvf ${WORKSPACE}/odl${i}_karaf.log.tar -C . --strip-components 2 --transform s/karaf/odl${i}_karaf/g
433 grep "ROBOT MESSAGE\| ERROR " odl${i}_karaf.log > odl${i}_err.log
434 grep "ROBOT MESSAGE\|Exception" odl${i}_karaf.log > odl${i}_exception.log
435 grep "ROBOT MESSAGE\| ERROR \| WARN \|Exception" odl${i}_karaf.log > odl${i}_err_warn_exception.log
436 rm ${WORKSPACE}/odl${i}_karaf.log.tar
439 # Since this log collection work is happening before the archive build macro which also
440 # creates the ${WORKSPACE}/archives dir, we have to do it here first. The mkdir in the
441 # archives build step will essentially be a noop.
442 mkdir -p ${WORKSPACE}/archives
445 for i in `seq 1 ${NUM_OPENSTACK_CONTROL_NODES}`; do
446 OS_CTRL_IP=OPENSTACK_CONTROL_NODE_${i}_IP
447 OS_CTRL_FOLDER="control_${i}"
448 mkdir -p ${OS_CTRL_FOLDER}
449 scp ${!OS_CTRL_IP}:/opt/stack/devstack/nohup.out ${OS_CTRL_FOLDER}/stack.log
450 scp ${!OS_CTRL_IP}:/var/log/openvswitch/ovs-vswitchd.log ${OS_CTRL_FOLDER}/ovs-vswitchd.log
451 scp ${!OS_CTRL_IP}:/etc/neutron/plugins/ml2/ml2_conf.ini ${OS_CTRL_FOLDER}
452 scp ${!OS_CTRL_IP}:/etc/neutron/dhcp_agent.ini ${OS_CTRL_FOLDER}
453 scp ${!OS_CTRL_IP}:/etc/neutron/neutron.conf ${OS_CTRL_FOLDER}/neutron.conf
454 scp ${!OS_CTRL_IP}:/etc/nova/nova.conf ${OS_CTRL_FOLDER}/nova.conf
455 scp ${!OS_CTRL_IP}:/etc/kuryr/kuryr.conf ${OS_CTRL_FOLDER}/kuryr.conf
456 scp ${!OS_CTRL_IP}:/etc/neutron/neutron_lbaas.conf ${OS_CTRL_FOLDER}/neutron-lbaas.conf
457 scp ${!OS_CTRL_IP}:/etc/neutron/services/loadbalancer/haproxy/lbaas_agent.ini ${OS_CTRL_FOLDER}/lbaas-agent.ini
458 rsync --rsync-path="sudo rsync" -avhe ssh ${!OS_CTRL_IP}:/usr/lib/systemd/system/haproxy.service ${OS_CTRL_FOLDER}
459 rsync -avhe ssh ${!OS_CTRL_IP}:/opt/stack/logs/* ${OS_CTRL_FOLDER} # rsync to prevent copying of symbolic links
460 rsync --rsync-path="sudo rsync" -avhe ssh ${!OS_CTRL_IP}:/etc/hosts ${OS_CTRL_FOLDER}/hosts.log
461 # Use rsync with sudo to get access to the log dir.
462 rsync --rsync-path="sudo rsync" -avhe ssh ${!OS_CTRL_IP}:/var/log/audit/audit.log ${OS_CTRL_FOLDER}
463 scp ${!OS_CTRL_IP}:/tmp/get_devstack.sh.txt ${OS_CTRL_FOLDER}
464 scp extra_debug.sh ${!OS_CTRL_IP}:/tmp
465 ${SSH} ${!OS_CTRL_IP} "bash /tmp/extra_debug.sh > /tmp/extra_debug.log"
466 scp ${!OS_CTRL_IP}:/tmp/extra_debug.log ${OS_CTRL_FOLDER}/extra_debug.log
467 scp ${!OS_CTRL_IP}:/tmp/journalctl.log ${OS_CTRL_FOLDER}
468 rsync --rsync-path="sudo rsync" -avhe ssh ${!OS_CTRL_IP}:/var/log/messages ${OS_CTRL_FOLDER}
469 scp ${!OS_CTRL_IP}:/tmp/*.xz ${OS_CTRL_FOLDER}/
470 mv local.conf_control_${!OS_CTRL_IP} ${OS_CTRL_FOLDER}/local.conf
471 mv ${OS_CTRL_FOLDER} ${WORKSPACE}/archives/
475 for i in `seq 1 ${NUM_OPENSTACK_COMPUTE_NODES}`; do
476 OSIP=OPENSTACK_COMPUTE_NODE_${i}_IP
477 OS_COMPUTE_FOLDER="compute_${i}"
478 mkdir -p ${OS_COMPUTE_FOLDER}
479 scp ${!OSIP}:/opt/stack/devstack/nohup.out ${OS_COMPUTE_FOLDER}/stack.log
480 scp ${!OSIP}:/var/log/openvswitch/ovs-vswitchd.log ${OS_COMPUTE_FOLDER}/ovs-vswitchd.log
481 scp ${!OSIP}:/var/log/openvswitch/ovsdb-server.log ${OS_COMPUTE_FOLDER}/ovsdb-server.log
482 scp ${!OSIP}:/var/log/libvirt/libvirtd.log* ${OS_COMPUTE_FOLDER}
483 scp ${!OSIP}:/var/log/libvirt/qeum/*.log ${OS_COMPUTE_FOLDER}
484 scp ${!OSIP}:/etc/nova/nova.conf ${OS_COMPUTE_FOLDER}/nova.conf
485 rsync -avhe ssh ${!OSIP}:/opt/stack/logs/* ${OS_COMPUTE_FOLDER} # rsync to prevent copying of symbolic links
486 rsync --rsync-path="sudo rsync" -avhe ssh ${!OSIP}:/etc/hosts ${OS_COMPUTE_FOLDER}/hosts.log
487 # Use rsync with sudo to get access to the log dir. Also can't use wildcard because the dirs only have
488 # exec permissions which doesn't allow ls.
489 rsync --rsync-path="sudo rsync" -avhe ssh ${!OSIP}:/var/log/libvirt ${OS_COMPUTE_FOLDER}
490 rsync --rsync-path="sudo rsync" -avhe ssh ${!OSIP}:/var/log/audit/audit.log ${OS_COMPUTE_FOLDER}
491 scp ${!OSIP}:/tmp/get_devstack.sh.txt ${OS_COMPUTE_FOLDER}
492 scp extra_debug.sh ${!OSIP}:/tmp
493 ${SSH} ${!OSIP} "bash /tmp/extra_debug.sh > /tmp/extra_debug.log"
494 scp ${!OSIP}:/tmp/extra_debug.log ${OS_COMPUTE_FOLDER}/extra_debug.log
495 scp ${!OSIP}:/tmp/journalctl.log ${OS_COMPUTE_FOLDER}
496 rsync --rsync-path="sudo rsync" -avhe ssh ${!OSIP}:/var/log/messages ${OS_COMPUTE_FOLDER}
497 scp ${!OSIP}:/tmp/*.xz ${OS_COMPUTE_FOLDER}/
498 mv local.conf_compute_${!OSIP} ${OS_COMPUTE_FOLDER}/local.conf
499 mv ${OS_COMPUTE_FOLDER} ${WORKSPACE}/archives/
503 DEVSTACK_TEMPEST_DIR="/opt/stack/tempest"
505 # Look for tempest test results in the $TESTREPO dir and copy if found
506 if ${SSH} ${OPENSTACK_CONTROL_NODE_1_IP} "sudo sh -c '[ -f ${DEVSTACK_TEMPEST_DIR}/${TESTREPO}/0 ]'"; then
507 ${SSH} ${OPENSTACK_CONTROL_NODE_1_IP} "for I in \$(sudo ls ${DEVSTACK_TEMPEST_DIR}/${TESTREPO}/ | grep -E '^[0-9]+$'); do sudo sh -c \"${DEVSTACK_TEMPEST_DIR}/.tox/tempest/bin/subunit-1to2 < ${DEVSTACK_TEMPEST_DIR}/${TESTREPO}/\${I} >> ${DEVSTACK_TEMPEST_DIR}/subunit_log.txt\"; done"
508 ${SSH} ${OPENSTACK_CONTROL_NODE_1_IP} "sudo sh -c '${DEVSTACK_TEMPEST_DIR}/.tox/tempest/bin/python ${DEVSTACK_TEMPEST_DIR}/.tox/tempest/lib/python2.7/site-packages/os_testr/subunit2html.py ${DEVSTACK_TEMPEST_DIR}/subunit_log.txt ${DEVSTACK_TEMPEST_DIR}/tempest_results.html'"
509 TEMPEST_LOGS_DIR=${WORKSPACE}/archives/tempest
510 mkdir -p ${TEMPEST_LOGS_DIR}
511 scp ${OPENSTACK_CONTROL_NODE_1_IP}:${DEVSTACK_TEMPEST_DIR}/tempest_results.html ${TEMPEST_LOGS_DIR}
512 scp ${OPENSTACK_CONTROL_NODE_1_IP}:${DEVSTACK_TEMPEST_DIR}/tempest.log ${TEMPEST_LOGS_DIR}
513 mv ${WORKSPACE}/tempest_output* ${TEMPEST_LOGS_DIR}
515 echo "tempest results not found in ${DEVSTACK_TEMPEST_DIR}/${TESTREPO}/0"
519 # if we are using the new netvirt impl, as determined by the feature name
520 # odl-netvirt-openstack (note: old impl is odl-ovsdb-openstack) then we
521 # want PROVIDER_MAPPINGS to be used -- this should be fixed if we want to support
522 # external networks in legacy netvirt
523 if [[ ${CONTROLLERFEATURES} == *"odl-netvirt-openstack"* ]]; then
524 ODL_PROVIDER_MAPPINGS="\${PUBLIC_PHYSICAL_NETWORK}:${PUBLIC_BRIDGE}"
526 ODL_PROVIDER_MAPPINGS=
529 # if we are using the old netvirt impl, as determined by the feature name
530 # odl-ovsdb-openstack (note: new impl is odl-netvirt-openstack) then we
531 # want ODL_L3 to be True. New impl wants it False
532 if [[ ${CONTROLLERFEATURES} == *"odl-ovsdb-openstack"* ]]; then
538 cat > ${WORKSPACE}/disable_firewall.sh << EOF
539 sudo systemctl stop firewalld
540 sudo systemctl stop iptables
544 cat > ${WORKSPACE}/get_devstack.sh << EOF
545 sudo systemctl stop firewalld
546 sudo yum install bridge-utils python-pip -y
547 #sudo systemctl stop NetworkManager
548 #Disable NetworkManager and kill dhclient and dnsmasq
549 sudo systemctl stop NetworkManager
550 sudo killall dhclient
552 #Workaround for mysql failure
553 echo "127.0.0.1 localhost \${HOSTNAME}" >> /tmp/hosts
554 echo "::1 localhost \${HOSTNAME}" >> /tmp/hosts
555 sudo mv /tmp/hosts /etc/hosts
556 sudo mkdir /opt/stack
557 sudo chmod 777 /opt/stack
559 echo "git clone https://git.openstack.org/openstack-dev/devstack --branch ${OPENSTACK_BRANCH}"
560 git clone https://git.openstack.org/openstack-dev/devstack --branch ${OPENSTACK_BRANCH}
562 if [ -n "${DEVSTACK_HASH}" ]; then
563 echo "git checkout ${DEVSTACK_HASH}"
564 git checkout ${DEVSTACK_HASH}
566 git --no-pager log --pretty=format:'%h %<(13)%ar%<(13)%cr %<(20,trunc)%an%d %s\n%b' -n20
569 cat > "${WORKSPACE}/setup_host_cell_mapping.sh" << EOF
570 sudo nova-manage cell_v2 map_cell0
571 sudo nova-manage cell_v2 simple_cell_setup
572 sudo nova-manage db sync
573 sudo nova-manage cell_v2 discover_hosts
576 NUM_OPENSTACK_SITES=${NUM_OPENSTACK_SITES:-1}
580 os_interval=$(( ${NUM_OPENSTACK_SYSTEM} / ${NUM_OPENSTACK_SITES} ))
581 ha_proxy_index=${os_interval}
583 for i in `seq 1 ${NUM_OPENSTACK_SITES}`; do
584 if [ "${ENABLE_HAPROXY_FOR_NEUTRON}" == "yes" ]; then
585 echo "Configure HAProxy"
586 ODL_HAPROXYIP_PARAM=OPENSTACK_HAPROXY_${i}_IP
587 ha_proxy_index=$(( $ha_proxy_index + $os_interval ))
588 odl_index=$(((i - 1) * 3 + 1))
589 ODL_IP_PARAM1=ODL_SYSTEM_$((odl_index++))_IP
590 ODL_IP_PARAM2=ODL_SYSTEM_$((odl_index++))_IP
591 ODL_IP_PARAM3=ODL_SYSTEM_$((odl_index++))_IP
592 ODLMGRIP[$i]=${!ODL_HAPROXYIP_PARAM} # ODL Northbound uses HAProxy VIP
593 ODL_OVS_MGRS[$i]="${!ODL_IP_PARAM1},${!ODL_IP_PARAM2},${!ODL_IP_PARAM3}" # OVSDB connects to all ODL IPs
594 configure_haproxy_for_neutron_requests ${!ODL_HAPROXYIP_PARAM} "${ODL_OVS_MGRS[$i]}"
596 ODL_IP_PARAM=ODL_SYSTEM_${i}_IP
597 ODL_OVS_MGRS[$i]="${!ODL_IP_PARAM}" # ODL Northbound uses ODL IP
598 ODLMGRIP[$i]=${!ODL_IP_PARAM} # OVSDB connects to ODL IP
602 # Begin stacking the nodes, starting with the controller(s) and then the compute(s)
604 for i in `seq 1 ${NUM_OPENSTACK_CONTROL_NODES}`; do
605 CONTROLIP=OPENSTACK_CONTROL_NODE_${i}_IP
606 echo "Stack the control node ${i} of ${NUM_OPENSTACK_CONTROL_NODES}: ${CONTROLIP}"
607 create_etc_hosts ${!CONTROLIP}
608 scp ${WORKSPACE}/hosts_file ${!CONTROLIP}:/tmp/hosts
609 scp ${WORKSPACE}/get_devstack.sh ${!CONTROLIP}:/tmp
610 ${SSH} ${!CONTROLIP} "bash /tmp/get_devstack.sh > /tmp/get_devstack.sh.txt 2>&1"
611 create_control_node_local_conf ${!CONTROLIP} ${ODLMGRIP[$i]} "${ODL_OVS_MGRS[$i]}"
612 scp ${WORKSPACE}/local.conf_control_${!CONTROLIP} ${!CONTROLIP}:/opt/stack/devstack/local.conf
613 ssh ${!CONTROLIP} "cd /opt/stack/devstack; nohup ./stack.sh > /opt/stack/devstack/nohup.out 2>&1 &"
614 ssh ${!CONTROLIP} "ps -ef | grep stack.sh"
615 ssh ${!CONTROLIP} "ls -lrt /opt/stack/devstack/nohup.out"
616 os_node_list+=(${!CONTROLIP})
617 # Workaround for stable/newton jobs
618 # TODO: can this be removed now?
619 if [ "${ODL_ML2_BRANCH}" == "stable/newton" ]; then
620 ssh ${!CONTROLIP} "cd /opt/stack; git clone https://git.openstack.org/openstack/requirements; cd requirements; git checkout stable/newton; sed -i /appdirs/d upper-constraints.txt"
624 for i in `seq 1 ${NUM_OPENSTACK_COMPUTE_NODES}`; do
625 NUM_COMPUTES_PER_SITE=$((NUM_OPENSTACK_COMPUTE_NODES / NUM_OPENSTACK_SITES))
626 SITE_INDEX=$((((i - 1) / NUM_COMPUTES_PER_SITE) + 1)) # We need the site index to infer the control node IP for this compute
627 COMPUTEIP=OPENSTACK_COMPUTE_NODE_${i}_IP
628 CONTROLIP=OPENSTACK_CONTROL_NODE_${SITE_INDEX}_IP
629 echo "Stack the compute node ${i} of ${NUM_OPENSTACK_COMPUTE_NODES}: ${COMPUTEIP}"
630 create_etc_hosts ${!COMPUTEIP} ${!CONTROLIP}
631 scp ${WORKSPACE}/hosts_file ${!COMPUTEIP}:/tmp/hosts
632 scp ${WORKSPACE}/get_devstack.sh ${!COMPUTEIP}:/tmp
633 ${SSH} ${!COMPUTEIP} "bash /tmp/get_devstack.sh > /tmp/get_devstack.sh.txt 2>&1"
634 create_compute_node_local_conf ${!COMPUTEIP} ${!CONTROLIP} ${ODLMGRIP[$SITE_INDEX]} "${ODL_OVS_MGRS[$SITE_INDEX]}"
635 scp ${WORKSPACE}/local.conf_compute_${!COMPUTEIP} ${!COMPUTEIP}:/opt/stack/devstack/local.conf
636 ssh ${!COMPUTEIP} "cd /opt/stack/devstack; nohup ./stack.sh > /opt/stack/devstack/nohup.out 2>&1 &"
637 ssh ${!COMPUTEIP} "ps -ef | grep stack.sh"
638 os_node_list+=(${!COMPUTEIP})
639 # Workaround for https://review.openstack.org/#/c/491032/
640 # Modify upper-constraints to use libvirt-python 3.2.0
641 if [ "${ODL_ML2_BRANCH}" == "stable/ocata" ]; then
642 ${SSH} ${!COMPUTEIP} "
644 git clone https://git.openstack.org/openstack/requirements;
646 git checkout stable/ocata;
647 sed -i s/libvirt-python===2.5.0/libvirt-python===3.2.0/ upper-constraints.txt
652 echo "nodelist: ${os_node_list[*]}"
654 # This script runs on the openstack nodes. It greps for a string that devstack writes when stacking is complete.
655 # The script then writes a status depending on the grep output that is later scraped by the robot vm to control
656 # the status polling.
657 cat > ${WORKSPACE}/check_stacking.sh << EOF
658 > /tmp/stack_progress
659 ps -ef | grep "stack.sh" | grep -v grep
661 if [ \${ret} -eq 1 ]; then
662 grep "This is your host IP address:" /opt/stack/devstack/nohup.out
663 if [ \$? -eq 0 ]; then
664 echo "Stacking Complete" > /tmp/stack_progress
666 echo "Stacking Failed" > /tmp/stack_progress
668 elif [ \${ret} -eq 0 ]; then
669 echo "Still Stacking" > /tmp/stack_progress
673 # Check if the stacking is finished. Poll all nodes every 60s for one hour.
676 while [ ${in_progress} -eq 1 ]; do
677 iteration=$(($iteration + 1))
678 for index in "${!os_node_list[@]}"; do
679 echo "node $index ${os_node_list[index]}: checking stacking status attempt ${iteration} of 60"
680 scp ${WORKSPACE}/check_stacking.sh ${os_node_list[index]}:/tmp
681 ${SSH} ${os_node_list[index]} "bash /tmp/check_stacking.sh"
682 scp ${os_node_list[index]}:/tmp/stack_progress .
684 stacking_status=`cat stack_progress`
685 if [ "$stacking_status" == "Still Stacking" ]; then
687 elif [ "$stacking_status" == "Stacking Failed" ]; then
688 echo "node $index ${os_node_list[index]}: stacking has failed"
691 elif [ "$stacking_status" == "Stacking Complete" ]; then
692 echo "node $index ${os_node_list[index]}: stacking complete"
693 unset 'os_node_list[index]'
694 if [ ${#os_node_list[@]} -eq 0 ]; then
699 echo "sleep for a minute before the next check"
701 if [ ${iteration} -eq 60 ]; then
702 echo "stacking has failed - took longer than 60m"
708 # Further configuration now that stacking is complete.
709 NUM_COMPUTES_PER_SITE=$((NUM_OPENSTACK_COMPUTE_NODES / NUM_OPENSTACK_SITES))
710 for i in `seq 1 ${NUM_OPENSTACK_SITES}`; do
711 echo "Configure the Control Node"
712 CONTROLIP=OPENSTACK_CONTROL_NODE_${i}_IP
713 # Gather Compute IPs for the site
714 for j in `seq 1 ${NUM_COMPUTES_PER_SITE}`; do
715 COMPUTE_INDEX=$(((i-1) * NUM_COMPUTES_PER_SITE + j))
716 IP_VAR=OPENSTACK_COMPUTE_NODE_${COMPUTE_INDEX}_IP
717 COMPUTE_IPS[$((j-1))]=${!IP_VAR}
720 # Need to disable firewalld and iptables in compute nodes as well
721 for ip in ${COMPUTE_IPS[*]}; do
722 scp ${WORKSPACE}/disable_firewall.sh "${ip}:/tmp"
723 ${SSH} "${ip}" "sudo bash /tmp/disable_firewall.sh"
726 #Need to disable firewalld and iptables in control node
727 echo "Stop Firewall in Control Node for compute nodes to be able to reach the ports and add to hypervisor-list"
728 scp ${WORKSPACE}/disable_firewall.sh ${!CONTROLIP}:/tmp
729 ${SSH} ${!CONTROLIP} "sudo bash /tmp/disable_firewall.sh"
731 echo "sleep for 60s and print hypervisor-list"
733 # In Ocata if we do not enable the n-cpu in control node then
734 # we need to discover hosts manually and ensure that they are mapped to cells.
735 # reference: https://ask.openstack.org/en/question/102256/how-to-configure-placement-service-for-compute-node-on-ocata/
736 if [ "${OPENSTACK_BRANCH}" == "stable/ocata" ]; then
737 scp ${WORKSPACE}/setup_host_cell_mapping.sh ${!CONTROLIP}:/tmp
738 ${SSH} ${!CONTROLIP} "sudo bash /tmp/setup_host_cell_mapping.sh"
740 ${SSH} ${!CONTROLIP} "cd /opt/stack/devstack; source openrc admin admin; nova hypervisor-list"
741 # in the case that we are doing openstack (control + compute) all in one node, then the number of hypervisors
742 # will be the same as the number of openstack systems. However, if we are doing multinode openstack then the
743 # assumption is we have a single control node and the rest are compute nodes, so the number of expected hypervisors
744 # is one less than the total number of openstack systems
745 if [ $((NUM_OPENSTACK_SYSTEM / NUM_OPENSTACK_SITES)) -eq 1 ]; then
746 expected_num_hypervisors=1
748 expected_num_hypervisors=${NUM_COMPUTES_PER_SITE}
750 num_hypervisors=$(${SSH} ${!CONTROLIP} "cd /opt/stack/devstack; source openrc admin admin; openstack hypervisor list -f value | wc -l" | tail -1 | tr -d "\r")
751 if ! [ "${num_hypervisors}" ] || ! [ ${num_hypervisors} -eq ${expected_num_hypervisors} ]; then
752 echo "Error: Only $num_hypervisors hypervisors detected, expected $expected_num_hypervisors"
757 # upgrading pip, urllib3 and httplib2 so that tempest tests can be run on openstack control node
758 # this needs to happen after devstack runs because it seems devstack is pulling in specific versions
759 # of these libs that are not working for tempest.
760 ${SSH} ${!CONTROLIP} "sudo pip install --upgrade pip"
761 ${SSH} ${!CONTROLIP} "sudo pip install urllib3 --upgrade"
762 ${SSH} ${!CONTROLIP} "sudo pip install httplib2 --upgrade"
764 # Gather Compute IPs for the site
765 for j in `seq 1 ${NUM_COMPUTES_PER_SITE}`; do
766 COMPUTE_INDEX=$(((i-1) * NUM_COMPUTES_PER_SITE + j))
767 IP_VAR=OPENSTACK_COMPUTE_NODE_${COMPUTE_INDEX}_IP
768 COMPUTE_IPS[$((j-1))]=${!IP_VAR}
771 # Need to disable firewalld and iptables in compute nodes as well
772 for ip in ${COMPUTE_IPS[*]}; do
773 scp ${WORKSPACE}/disable_firewall.sh "${ip}:/tmp"
774 ${SSH} "${ip}" "sudo bash /tmp/disable_firewall.sh"
778 echo "prepare external networks by adding vxlan tunnels between all nodes on a separate bridge..."
779 # FIXME Should there be a unique gateway IP and devstack index for each site?
781 for ip in ${!CONTROLIP} ${COMPUTE_IPS[*]}; do
782 # FIXME - Workaround, ODL (new netvirt) currently adds PUBLIC_BRIDGE as a port in br-int since it doesn't see such a bridge existing when we stack
783 ${SSH} $ip "sudo ovs-vsctl --if-exists del-port br-int $PUBLIC_BRIDGE"
784 ${SSH} $ip "sudo ovs-vsctl --may-exist add-br $PUBLIC_BRIDGE -- set bridge $PUBLIC_BRIDGE other-config:disable-in-band=true other_config:hwaddr=f6:00:00:ff:01:0$((devstack_index++))"
788 if [ "${IPSEC_VXLAN_TUNNELS_ENABLED}" == "yes" ]; then
789 ALL_NODES=(${!CONTROLIP} ${COMPUTE_IPS[*]})
790 for ((inx_ip1=0; inx_ip1<$((${#ALL_NODES[@]} - 1)); inx_ip1++)); do
791 for ((inx_ip2=$((inx_ip1 + 1)); inx_ip2<${#ALL_NODES[@]}; inx_ip2++)); do
792 KEY1=0x$(dd if=/dev/urandom count=32 bs=1 2> /dev/null| xxd -p -c 64)
793 KEY2=0x$(dd if=/dev/urandom count=32 bs=1 2> /dev/null| xxd -p -c 64)
794 ID=0x$(dd if=/dev/urandom count=4 bs=1 2> /dev/null| xxd -p -c 8)
795 ip1=${ALL_NODES[$inx_ip1]}
796 ip2=${ALL_NODES[$inx_ip2]}
797 ${SSH} $ip1 "sudo ip xfrm state add src $ip1 dst $ip2 proto esp spi $ID reqid $ID mode transport auth sha256 $KEY1 enc aes $KEY2"
798 ${SSH} $ip1 "sudo ip xfrm state add src $ip2 dst $ip1 proto esp spi $ID reqid $ID mode transport auth sha256 $KEY1 enc aes $KEY2"
799 ${SSH} $ip1 "sudo ip xfrm policy add src $ip1 dst $ip2 proto udp dir out tmpl src $ip1 dst $ip2 proto esp reqid $ID mode transport"
800 ${SSH} $ip1 "sudo ip xfrm policy add src $ip2 dst $ip1 proto udp dir in tmpl src $ip2 dst $ip1 proto esp reqid $ID mode transport"
802 ${SSH} $ip2 "sudo ip xfrm state add src $ip2 dst $ip1 proto esp spi $ID reqid $ID mode transport auth sha256 $KEY1 enc aes $KEY2"
803 ${SSH} $ip2 "sudo ip xfrm state add src $ip1 dst $ip2 proto esp spi $ID reqid $ID mode transport auth sha256 $KEY1 enc aes $KEY2"
804 ${SSH} $ip2 "sudo ip xfrm policy add src $ip2 dst $ip1 proto udp dir out tmpl src $ip2 dst $ip1 proto esp reqid $ID mode transport"
805 ${SSH} $ip2 "sudo ip xfrm policy add src $ip1 dst $ip2 proto udp dir in tmpl src $ip1 dst $ip2 proto esp reqid $ID mode transport"
809 for ip in ${!CONTROLIP} ${COMPUTE_IPS[*]}; do
810 echo "ip xfrm configuration for node $ip:"
811 ${SSH} $ip "sudo ip xfrm policy list"
812 ${SSH} $ip "sudo ip xfrm state list"
816 # Control Node - PUBLIC_BRIDGE will act as the external router
817 # Parameter values below are used in integration/test - changing them requires updates in intergration/test as well
818 EXTNET_GATEWAY_IP="10.10.10.250"
819 EXTNET_INTERNET_IP="10.9.9.9"
820 EXTNET_PNF_IP="10.10.10.253"
821 ${SSH} ${!CONTROLIP} "sudo ifconfig ${PUBLIC_BRIDGE} up ${EXTNET_GATEWAY_IP}/24"
823 # Control Node - external net PNF simulation
824 ${SSH} ${!CONTROLIP} "
825 sudo ip netns add pnf_ns;
826 sudo ip link add pnf_veth0 type veth peer name pnf_veth1;
827 sudo ip link set pnf_veth1 netns pnf_ns;
828 sudo ip link set pnf_veth0 up;
829 sudo ip netns exec pnf_ns ifconfig pnf_veth1 up ${EXTNET_PNF_IP}/24;
830 sudo ovs-vsctl add-port ${PUBLIC_BRIDGE} pnf_veth0;
833 # Control Node - external net internet address simulation
834 ${SSH} ${!CONTROLIP} "
835 sudo ip tuntap add dev internet_tap mode tap;
836 sudo ifconfig internet_tap up ${EXTNET_INTERNET_IP}/24;
841 for compute_ip in ${COMPUTE_IPS[*]}; do
842 # Tunnel from controller to compute
843 COMPUTEPORT=compute$(( compute_index++ ))_vxlan
844 ${SSH} ${!CONTROLIP} "
845 sudo ovs-vsctl add-port $PUBLIC_BRIDGE $COMPUTEPORT -- set interface $COMPUTEPORT type=vxlan options:local_ip=${!CONTROLIP} options:remote_ip=$compute_ip options:dst_port=9876 options:key=flow
847 # Tunnel from compute to controller
848 CONTROLPORT="control_vxlan"
850 sudo ovs-vsctl add-port $PUBLIC_BRIDGE $CONTROLPORT -- set interface $CONTROLPORT type=vxlan options:local_ip=$compute_ip options:remote_ip=${!CONTROLIP} options:dst_port=9876 options:key=flow
855 if [ "${ENABLE_HAPROXY_FOR_NEUTRON}" == "yes" ]; then
856 odlmgrip=OPENSTACK_HAPROXY_1_IP
857 HA_PROXY_IP=${!odlmgrip}
858 HA_PROXY_1_IP=${!odlmgrip}
859 odlmgrip2=OPENSTACK_HAPROXY_2_IP
860 HA_PROXY_2_IP=${!odlmgrip2}
861 odlmgrip3=OPENSTACK_HAPROXY_1_IP
862 HA_PROXY_3_IP=${!odlmgrip3}
864 HA_PROXY_IP=${ODL_SYSTEM_IP}
865 HA_PROXY_1_IP=${ODL_SYSTEM_1_IP}
866 HA_PROXY_2_IP=${ODL_SYSTEM_2_IP}
867 HA_PROXY_3_IP=${ODL_SYSTEM_3_IP}
870 echo "Locating test plan to use..."
871 testplan_filepath="${WORKSPACE}/test/csit/testplans/${STREAMTESTPLAN}"
872 if [ ! -f "${testplan_filepath}" ]; then
873 testplan_filepath="${WORKSPACE}/test/csit/testplans/${TESTPLAN}"
876 echo "Changing the testplan path..."
877 cat "${testplan_filepath}" | sed "s:integration:${WORKSPACE}:" > testplan.txt
880 # Use the testplan if specific SUITES are not defined.
881 if [ -z "${SUITES}" ]; then
882 SUITES=`egrep -v '(^[[:space:]]*#|^[[:space:]]*$)' testplan.txt | tr '\012' ' '`
885 if [ "${OPENSTACK_BRANCH}" == "stable/pike" ]; then
886 AUTH="http://${!CONTROLIP}/identity"
888 AUTH="http://${!CONTROLIP}:35357/v3"
891 # Environment Variables Needed to execute Openstack Client for NetVirt Jobs
892 cat > /tmp/os_netvirt_client_rc << EOF
893 export OS_USERNAME=admin
894 export OS_PASSWORD=admin
895 export OS_PROJECT_NAME=admin
896 export OS_USER_DOMAIN_NAME=default
897 export OS_PROJECT_DOMAIN_NAME=default
898 export OS_AUTH_URL=${AUTH}
899 export OS_IDENTITY_API_VERSION=3
900 export OS_IMAGE_API_VERSION=2
901 export OS_TENANT_NAME=admin
905 source /tmp/os_netvirt_client_rc
907 echo "Starting Robot test suites ${SUITES} ..."
908 # please add pybot -v arguments on a single line and alphabetized
909 pybot -N ${TESTPLAN} --removekeywords wuks -c critical -e exclude -e skip_if_${DISTROSTREAM} \
910 -v BUNDLEFOLDER:${BUNDLEFOLDER} \
911 -v BUNDLE_URL:${ACTUAL_BUNDLE_URL} \
912 -v CONTROLLER_USER:${USER} \
913 -v DEVSTACK_DEPLOY_PATH:/opt/stack/devstack \
914 -v HA_PROXY_IP:${HA_PROXY_IP} \
915 -v HA_PROXY_1_IP:${HA_PROXY_1_IP} \
916 -v HA_PROXY_2_IP:${HA_PROXY_2_IP} \
917 -v HA_PROXY_3_IP:${HA_PROXY_3_IP} \
918 -v JDKVERSION:${JDKVERSION} \
919 -v NEXUSURL_PREFIX:${NEXUSURL_PREFIX} \
920 -v NUM_ODL_SYSTEM:${NUM_ODL_SYSTEM} \
921 -v NUM_OPENSTACK_SITES:${NUM_OPENSTACK_SITES} \
922 -v NUM_OS_SYSTEM:${NUM_OPENSTACK_SYSTEM} \
923 -v NUM_TOOLS_SYSTEM:${NUM_TOOLS_SYSTEM} \
924 -v ODL_SNAT_MODE:${ODL_SNAT_MODE} \
925 -v ODL_STREAM:${DISTROSTREAM} \
926 -v ODL_SYSTEM_IP:${ODL_SYSTEM_IP} \
927 -v ODL_SYSTEM_1_IP:${ODL_SYSTEM_1_IP} \
928 -v ODL_SYSTEM_2_IP:${ODL_SYSTEM_2_IP} \
929 -v ODL_SYSTEM_3_IP:${ODL_SYSTEM_3_IP} \
930 -v ODL_SYSTEM_4_IP:${ODL_SYSTEM_4_IP} \
931 -v ODL_SYSTEM_5_IP:${ODL_SYSTEM_5_IP} \
932 -v ODL_SYSTEM_6_IP:${ODL_SYSTEM_6_IP} \
933 -v ODL_SYSTEM_7_IP:${ODL_SYSTEM_7_IP} \
934 -v ODL_SYSTEM_8_IP:${ODL_SYSTEM_8_IP} \
935 -v ODL_SYSTEM_9_IP:${ODL_SYSTEM_9_IP} \
936 -v OS_CONTROL_NODE_IP:${OPENSTACK_CONTROL_NODE_1_IP} \
937 -v OS_CONTROL_NODE_1_IP:${OPENSTACK_CONTROL_NODE_1_IP} \
938 -v OS_CONTROL_NODE_2_IP:${OPENSTACK_CONTROL_NODE_2_IP} \
939 -v OS_CONTROL_NODE_3_IP:${OPENSTACK_CONTROL_NODE_3_IP} \
940 -v OPENSTACK_BRANCH:${OPENSTACK_BRANCH} \
941 -v OS_COMPUTE_1_IP:${OPENSTACK_COMPUTE_NODE_1_IP} \
942 -v OS_COMPUTE_2_IP:${OPENSTACK_COMPUTE_NODE_2_IP} \
943 -v OS_COMPUTE_3_IP:${OPENSTACK_COMPUTE_NODE_3_IP} \
944 -v OS_COMPUTE_4_IP:${OPENSTACK_COMPUTE_NODE_4_IP} \
945 -v OS_COMPUTE_5_IP:${OPENSTACK_COMPUTE_NODE_5_IP} \
946 -v OS_COMPUTE_6_IP:${OPENSTACK_COMPUTE_NODE_6_IP} \
948 -v PUBLIC_PHYSICAL_NETWORK:${PUBLIC_PHYSICAL_NETWORK} \
949 -v SECURITY_GROUP_MODE:${SECURITY_GROUP_MODE} \
950 -v TOOLS_SYSTEM_IP:${TOOLS_SYSTEM_1_IP} \
951 -v TOOLS_SYSTEM_1_IP:${TOOLS_SYSTEM_1_IP} \
952 -v TOOLS_SYSTEM_2_IP:${TOOLS_SYSTEM_2_IP} \
953 -v USER_HOME:${HOME} \
955 ${TESTOPTIONS} ${SUITES} || true
957 echo "Examining the files in data/log and checking file size"
958 ssh ${ODL_SYSTEM_IP} "ls -altr /tmp/${BUNDLEFOLDER}/data/log/"
959 ssh ${ODL_SYSTEM_IP} "du -hs /tmp/${BUNDLEFOLDER}/data/log/*"
961 echo "Tests Executed"
964 true # perhaps Jenkins is testing last exit code
965 # vim: ts=4 sw=4 sts=4 et ft=sh :