2 # Activate robotframework virtualenv
3 # ${ROBOT_VENV} comes from the integration-install-robotframework.sh
5 # shellcheck source=${ROBOT_VENV}/bin/activate disable=SC1091
6 source "${ROBOT_VENV}/bin/activate"
7 source /tmp/common-functions.sh "${BUNDLEFOLDER}"
8 # Ensure we fail the job if any steps fail.
13 PYTHON="${ROBOT_VENV}/bin/python"
15 ADMIN_PASSWORD="admin"
16 OPENSTACK_MASTER_CLIENTS_VERSION="queens"
17 #Size of the partition to /opt/stack in control and compute nodes
19 if [ "${ODL_ML2_BRANCH}" == "stable/rocky" ]; then
22 # TODO: remove this work to run changes.py if/when it's moved higher up to be visible at the Robot level
23 printf "\nshowing recent changes that made it into the distribution used by this job:\n"
24 $PYTHON -m pip install --upgrade urllib3
25 python "${WORKSPACE}/test/tools/distchanges/changes.py" -d /tmp/distribution_folder \
26 -u "${ACTUAL_BUNDLE_URL}" -b "${DISTROBRANCH}" \
27 -r "ssh://jenkins-${SILO}@git.opendaylight.org:29418" || true
29 printf "\nshowing recent changes that made it into integration/test used by this job:\n"
31 cd "${WORKSPACE}/test"
32 printf "Hash Author Date Commit Date Author Subject\n"
33 printf "%s\n" "------- ------------------------------ ------------------------------ -------------------- -----------------------------"
34 git --no-pager log --pretty=format:'%h %<(30)%ad %<(30)%cd %<(20,trunc)%an%d %s' -n20
39 #################################################
40 ## Deploy Openstack 3-node ##
41 #################################################
44 # Catch command errors and collect logs.
45 # This ensures logs are collected when script commands fail rather than simply exiting.
46 function trap_handler() {
50 echo "trap_handler: ${prog}: line ${lastline}: exit status of last command: ${lasterr}"
51 echo "trap_handler: command: ${BASH_COMMAND}"
55 trap 'trap_handler ${LINENO} ${$?}' ERR
59 function create_etc_hosts() {
62 : > "${WORKSPACE}/hosts_file"
63 for iter in $(seq 1 "${NUM_OPENSTACK_COMPUTE_NODES}"); do
64 COMPUTE_IP=OPENSTACK_COMPUTE_NODE_${iter}_IP
65 if [ "${!COMPUTE_IP}" == "${NODE_IP}" ]; then
66 CONTROL_HNAME=$(${SSH} "${CTRL_IP}" "hostname")
67 echo "${CTRL_IP} ${CONTROL_HNAME}" >> "${WORKSPACE}/hosts_file"
69 COMPUTE_HNAME=$(${SSH} "${!COMPUTE_IP}" "hostname")
70 echo "${!COMPUTE_IP} ${COMPUTE_HNAME}" >> "${WORKSPACE}/hosts_file"
74 echo "Created the hosts file for ${NODE_IP}:"
75 cat "${WORKSPACE}/hosts_file"
76 } # create_etc_hosts()
78 #function to install Openstack Clients for Testing
79 #This will pull the latest versions compatiable with the
81 function install_openstack_clients_in_robot_vm() {
82 packages=("python-novaclient" "python-neutronclient" "python-openstackclient")
84 os_plugins=$(csv2ssv "${ENABLE_OS_PLUGINS}")
85 for plugin_name in $os_plugins; do
86 if [ "$plugin_name" == "networking-sfc" ]; then
87 packages+=("networking-sfc")
90 openstack_version=$(echo "${OPENSTACK_BRANCH}" | cut -d/ -f2)
91 #If the job tests "master", we will use the clients from previous released stable version to avoid failures
92 if [ "${openstack_version}" == "master" ]; then
93 openstack_version=${OPENSTACK_MASTER_CLIENTS_VERSION}
95 for package in ${packages[*]}; do
96 echo "Get the current support version of the package ${package}"
97 wget "https://raw.githubusercontent.com/openstack/requirements/stable/${openstack_version}/upper-constraints.txt" -O /tmp/constraints.txt 2>/dev/null
98 #python openstackclient version in rocky contradicts with version in global-jjb and stops openstackclient installation in rocky. Will be removed based on version change in global-jjb.
99 sed -i s/python-openstackclient===3.16.2/python-openstackclient===3.14.0/ /tmp/constraints.txt
100 #Python uwsgi 2.0.19 is having errors, forcing it to pick 2.0.18
101 sed -i '1 auwsgi===2.0.18' /tmp/constraints.txt
102 echo "$PYTHON -m pip install --upgrade --no-deps ${package} --no-cache-dir -c /tmp/constraints.txt"
103 $PYTHON -m pip install --upgrade --no-deps "${package}" --no-cache-dir -c /tmp/constraints.txt
104 echo "$PYTHON -m pip install ${package} --no-cache-dir -c /tmp/constraints.txt"
105 $PYTHON -m pip install "${package}" --no-cache-dir -c /tmp/constraints.txt
108 if [ "${ENABLE_NETWORKING_L2GW}" == "yes" ]; then
109 #networking-l2gw is not officially available in any release yet. Getting the latest stable version.
110 $PYTHON -m pip install networking-l2gw==11.0.0 more-itertools==5.0.0
114 #Function to install rdo release
115 # This will help avoiding installing wrong version of packages which causes
116 # functionality failures
117 function install_rdo_release() {
119 case ${OPENSTACK_BRANCH} in
121 ${SSH} "${ip}" "sudo yum install -y https://repos.fedorapeople.org/repos/openstack/openstack-rocky/rdo-release-rocky-1.noarch.rpm"
125 ${SSH} "${ip}" "sudo yum install -y https://repos.fedorapeople.org/repos/openstack/openstack-queens/rdo-release-queens-1.noarch.rpm"
129 ${SSH} "${ip}" "sudo yum install -y https://repos.fedorapeople.org/repos/openstack/openstack-rocky/rdo-release-rocky-1.noarch.rpm"
134 # Involves just setting up the shared directory
135 function setup_live_migration_control() {
137 printf "%s:Setup directory Share with NFS" "${control_ip}"
138 cat > "${WORKSPACE}/setup_live_migration_control.sh" << EOF
139 sudo mkdir --mode=777 /vm_instances
140 sudo chown -R jenkins:jenkins /vm_instances
141 sudo yum install -y nfs-utils
142 printf "/vm_instances *(rw,no_root_squash)" | sudo tee -a /etc/exports
143 sudo systemctl start rpcbind nfs-server
146 scp "${WORKSPACE}/setup_live_migration_control.sh" "${control_ip}:/tmp/setup_live_migration_control.sh"
147 ssh "${control_ip}" "bash /tmp/setup_live_migration_control.sh"
150 #Fix for broken requirements versions while bringing up the stack.
151 #Fix Problem caused due to new libvirt version in CentOS repo.
152 #The libvirt-python 3.10 does not support all the new API exposed
153 #This fix will force devstack to use latest libvirt-python
154 #from pypi.org (latest version as of 06-Dec-2018)
155 #Python uwsgi 2.0.19 is having errors, forcing it to pick 2.0.18
156 #more info: https://lists.opendaylight.org/g/app-dev/topic/netvirt_jobs_are_failing_with/74897077
157 function fix_broken_requirements_versions() {
161 git clone https://git.openstack.org/openstack/requirements;
163 git checkout ${ODL_ML2_BRANCH};
164 sed -i s/libvirt-python===3.10.0/libvirt-python===4.10.0/ upper-constraints.txt
165 sed -i '1 auwsgi===2.0.18' upper-constraints.txt
169 # Involves mounting the share and configuring the libvirtd
170 function setup_live_migration_compute() {
173 printf "%s:Mount Shared directory from ${control_ip}" "${compute_ip}"
174 printf "%s:Configure libvirt in listen mode" "${compute_ip}"
175 cat > "${WORKSPACE}/setup_live_migration_compute.sh" << EOF
176 sudo yum install -y libvirt libvirt-devel nfs-utils
177 sudo crudini --verbose --set --inplace /etc/libvirt/libvirtd.conf '' listen_tls 0
178 sudo crudini --verbose --set --inplace /etc/libvirt/libvirtd.conf '' listen_tcp 1
179 sudo crudini --verbose --set --inplace /etc/libvirt/libvirtd.conf '' auth_tcp '"none"'
180 sudo crudini --verbose --set --inplace /etc/sysconfig/libvirtd '' LIBVIRTD_ARGS '"--listen"'
181 sudo mkdir --mode=777 -p /var/instances
182 sudo chown -R jenkins:jenkins /var/instances
183 sudo chmod o+x /var/instances
184 sudo systemctl start rpcbind
185 sudo mount -t nfs ${control_ip}:/vm_instances /var/instances
188 scp "${WORKSPACE}/setup_live_migration_compute.sh" "${compute_ip}:/tmp/setup_live_migration_compute.sh"
189 ssh "${compute_ip}" "bash /tmp/setup_live_migration_compute.sh"
192 # Add enable_services and disable_services to the local.conf
193 function add_os_services() {
194 local core_services=$1
195 local enable_services=$2
196 local disable_services=$3
197 local local_conf_file_name=$4
198 local enable_network_services=$5
200 cat >> "${local_conf_file_name}" << EOF
201 enable_service $(csv2ssv "${core_services}")
203 if [ -n "${enable_services}" ]; then
204 cat >> "${local_conf_file_name}" << EOF
205 enable_service $(csv2ssv "${enable_services}")
208 if [ -n "${disable_services}" ]; then
209 cat >> "${local_conf_file_name}" << EOF
210 disable_service $(csv2ssv "${disable_services}")
213 if [ -n "${enable_network_services}" ]; then
214 cat >> "${local_conf_file_name}" << EOF
215 enable_service $(csv2ssv "${enable_network_services}")
220 function create_control_node_local_conf() {
223 ODL_OVS_MANAGERS="$3"
225 local_conf_file_name=${WORKSPACE}/local.conf_control_${HOSTIP}
226 cat > "${local_conf_file_name}" << EOF
232 # Increase the wait used by stack to poll for services
238 add_os_services "${CORE_OS_CONTROL_SERVICES}" "${ENABLE_OS_SERVICES}" "${DISABLE_OS_SERVICES}" "${local_conf_file_name}" "${ENABLE_OS_NETWORK_SERVICES}"
240 cat >> "${local_conf_file_name}" << EOF
243 SERVICE_HOST=\$HOST_IP
244 Q_ML2_TENANT_NETWORK_TYPE=${TENANT_NETWORK_TYPE}
245 NEUTRON_CREATE_INITIAL_NETWORKS=${CREATE_INITIAL_NETWORKS}
250 ODL_PORT_BINDING_CONTROLLER=${ODL_ML2_PORT_BINDING}
251 ODL_OVS_MANAGERS=${ODL_OVS_MANAGERS}
253 MYSQL_HOST=\$SERVICE_HOST
254 RABBIT_HOST=\$SERVICE_HOST
255 GLANCE_HOSTPORT=\$SERVICE_HOST:9292
256 KEYSTONE_AUTH_HOST=\$SERVICE_HOST
257 KEYSTONE_SERVICE_HOST=\$SERVICE_HOST
259 ADMIN_PASSWORD=${ADMIN_PASSWORD}
260 DATABASE_PASSWORD=${ADMIN_PASSWORD}
261 RABBIT_PASSWORD=${ADMIN_PASSWORD}
262 SERVICE_TOKEN=${ADMIN_PASSWORD}
263 SERVICE_PASSWORD=${ADMIN_PASSWORD}
265 NEUTRON_LBAAS_SERVICE_PROVIDERV2=${LBAAS_SERVICE_PROVIDER} # Only relevant if neutron-lbaas plugin is enabled
266 NEUTRON_SFC_DRIVERS=${ODL_SFC_DRIVER} # Only relevant if networking-sfc plugin is enabled
267 NEUTRON_FLOWCLASSIFIER_DRIVERS=${ODL_SFC_DRIVER} # Only relevant if networking-sfc plugin is enabled
269 PUBLIC_BRIDGE=${PUBLIC_BRIDGE}
270 PUBLIC_PHYSICAL_NETWORK=${PUBLIC_PHYSICAL_NETWORK}
271 ML2_VLAN_RANGES=${PUBLIC_PHYSICAL_NETWORK}
272 ODL_PROVIDER_MAPPINGS=${ODL_PROVIDER_MAPPINGS}
274 if [ "${TENANT_NETWORK_TYPE}" == "local" ]; then
275 cat >> "${local_conf_file_name}" << EOF
276 ENABLE_TENANT_TUNNELS=false
280 if [ "${ODL_ML2_DRIVER_VERSION}" == "v2" ]; then
281 echo "ODL_V2DRIVER=True" >> "${local_conf_file_name}"
284 for plugin_name in ${ENABLE_OS_PLUGINS}; do
285 if [ "$plugin_name" == "networking-odl" ]; then
286 ENABLE_PLUGIN_ARGS="${ODL_ML2_DRIVER_REPO} ${ODL_ML2_BRANCH}"
287 elif [ "$plugin_name" == "kuryr-kubernetes" ]; then
288 ENABLE_PLUGIN_ARGS="${DEVSTACK_KUBERNETES_PLUGIN_REPO} master" # note: kuryr-kubernetes only exists in master at the moment
289 elif [ "$plugin_name" == "neutron-lbaas" ]; then
290 ENABLE_PLUGIN_ARGS="${DEVSTACK_LBAAS_PLUGIN_REPO} ${OPENSTACK_BRANCH}"
291 IS_LBAAS_PLUGIN_ENABLED="yes"
292 elif [ "$plugin_name" == "networking-sfc" ]; then
293 ENABLE_PLUGIN_ARGS="${DEVSTACK_NETWORKING_SFC_PLUGIN_REPO} ${OPENSTACK_BRANCH}"
294 IS_SFC_PLUGIN_ENABLED="yes"
296 echo "Error: Invalid plugin $plugin_name, unsupported"
299 cat >> "${local_conf_file_name}" << EOF
301 enable_plugin ${plugin_name} ${ENABLE_PLUGIN_ARGS}
306 if [ "${ENABLE_NETWORKING_L2GW}" == "yes" ]; then
307 cat >> "${local_conf_file_name}" << EOF
309 enable_plugin networking-l2gw ${NETWORKING_L2GW_DRIVER} ${ODL_ML2_BRANCH}
310 NETWORKING_L2GW_SERVICE_DRIVER=L2GW:OpenDaylight:networking_odl.l2gateway.driver_v2.OpenDaylightL2gwDriver:default
314 if [ "${ODL_ML2_DRIVER_VERSION}" == "v2" ]; then
315 SERVICE_PLUGINS="odl-router_v2"
317 SERVICE_PLUGINS="odl-router"
319 if [ "${ENABLE_NETWORKING_L2GW}" == "yes" ]; then
320 SERVICE_PLUGINS+=", networking_l2gw.services.l2gateway.plugin.L2GatewayPlugin"
322 if [ "${IS_LBAAS_PLUGIN_ENABLED}" == "yes" ]; then
323 SERVICE_PLUGINS+=", lbaasv2"
325 if [ "${IS_SFC_PLUGIN_ENABLED}" == "yes" ]; then
326 SERVICE_PLUGINS+=", networking_sfc.services.flowclassifier.plugin.FlowClassifierPlugin,networking_sfc.services.sfc.plugin.SfcPlugin"
329 cat >> "${local_conf_file_name}" << EOF
331 [[post-config|\$NEUTRON_CONF]]
333 service_plugins = ${SERVICE_PLUGINS}
334 log_dir = /opt/stack/logs
336 [[post-config|/etc/neutron/plugins/ml2/ml2_conf.ini]]
338 minimize_polling=True
341 # Needed for VLAN provider tests - because our provider networks are always encapsulated in VXLAN (br-physnet1)
342 # MTU(1400) + VXLAN(50) + VLAN(4) = 1454 < MTU eth0/br-physnet1(1458)
343 physical_network_mtus = ${PUBLIC_PHYSICAL_NETWORK}:1400
346 if [ "${ENABLE_GRE_TYPE_DRIVERS}" == "yes" ]; then
347 cat >> "${local_conf_file_name}" << EOF
348 type_drivers = local,flat,vlan,gre,vxlan
350 tunnel_id_ranges = 1:1000
353 if [ "${ENABLE_NETWORKING_L2GW}" == "yes" ]; then
354 cat >> "${local_conf_file_name}" << EOF
357 enable_dhcp_service = True
361 cat >> "${local_conf_file_name}" << EOF
364 # Trigger n-odl full sync every 30 secs.
365 maintenance_interval = 30
367 [[post-config|/etc/neutron/dhcp_agent.ini]]
369 force_metadata = True
370 enable_isolated_metadata = True
371 log_dir = /opt/stack/logs
373 [[post-config|/etc/nova/nova.conf]]
375 discover_hosts_in_cells_interval = 30
378 force_config_drive = False
379 force_raw_images = False
380 log_dir = /opt/stack/logs
384 if [ "$(is_openstack_feature_enabled n-cpu)" == "1" ]; then
385 cat >> "${local_conf_file_name}" << EOF
387 force_raw_images = False
388 log_dir = /opt/stack/logs
390 live_migration_uri = qemu+tcp://%s/system
395 if [ "$(is_openstack_feature_enabled n-cpu)" == "1" ]; then
396 echo "Combo local.conf created:"
398 echo "Control local.conf created:"
400 cat "${local_conf_file_name}"
401 } # create_control_node_local_conf()
403 function create_compute_node_local_conf() {
407 ODL_OVS_MANAGERS="$4"
409 local_conf_file_name=${WORKSPACE}/local.conf_compute_${HOSTIP}
410 cat > "${local_conf_file_name}" << EOF
416 # Increase the wait used by stack to poll for the nova service on the control node
417 NOVA_READY_TIMEOUT=1800
422 add_os_services "${CORE_OS_COMPUTE_SERVICES}" "${ENABLE_OS_COMPUTE_SERVICES}" "${DISABLE_OS_SERVICES}" "${local_conf_file_name}"
424 cat >> "${local_conf_file_name}" << EOF
426 SERVICE_HOST=${SERVICEHOST}
427 Q_ML2_TENANT_NETWORK_TYPE=${TENANT_NETWORK_TYPE}
432 ODL_PORT_BINDING_CONTROLLER=${ODL_ML2_PORT_BINDING}
433 ODL_OVS_MANAGERS=${ODL_OVS_MANAGERS}
435 Q_HOST=\$SERVICE_HOST
436 MYSQL_HOST=\$SERVICE_HOST
437 RABBIT_HOST=\$SERVICE_HOST
438 GLANCE_HOSTPORT=\$SERVICE_HOST:9292
439 KEYSTONE_AUTH_HOST=\$SERVICE_HOST
440 KEYSTONE_SERVICE_HOST=\$SERVICE_HOST
442 ADMIN_PASSWORD=${ADMIN_PASSWORD}
443 DATABASE_PASSWORD=${ADMIN_PASSWORD}
444 RABBIT_PASSWORD=${ADMIN_PASSWORD}
445 SERVICE_TOKEN=${ADMIN_PASSWORD}
446 SERVICE_PASSWORD=${ADMIN_PASSWORD}
448 PUBLIC_BRIDGE=${PUBLIC_BRIDGE}
449 PUBLIC_PHYSICAL_NETWORK=${PUBLIC_PHYSICAL_NETWORK}
450 ODL_PROVIDER_MAPPINGS=${ODL_PROVIDER_MAPPINGS}
453 if [[ "${ENABLE_OS_PLUGINS}" =~ networking-odl ]]; then
454 cat >> "${local_conf_file_name}" << EOF
456 enable_plugin networking-odl ${ODL_ML2_DRIVER_REPO} ${ODL_ML2_BRANCH}
460 cat >> "${local_conf_file_name}" << EOF
462 [[post-config|/etc/nova/nova.conf]]
464 auth_strategy = keystone
467 force_raw_images = False
468 log_dir = /opt/stack/logs
470 live_migration_uri = qemu+tcp://%s/system
474 echo "Compute local.conf created:"
475 cat "${local_conf_file_name}"
476 } # create_compute_node_local_conf()
478 function configure_haproxy_for_neutron_requests() {
479 local -r haproxy_ip=$1
480 # shellcheck disable=SC2206
481 local -r odl_ips=(${2//,/ })
483 cat > "${WORKSPACE}/install_ha_proxy.sh" << EOF
484 sudo systemctl stop firewalld
485 sudo yum -y install policycoreutils-python haproxy
488 cat > "${WORKSPACE}/haproxy.cfg" << EOF
492 log /dev/log local0 debug
494 pidfile /tmp/haproxy.pid
495 ssl-default-bind-ciphers !SSLv2:kEECDH:kRSA:kEDH:kPSK:+3DES:!aNULL:!eNULL:!MD5:!EXP:!RC4:!SEED:!IDEA:!DES
496 ssl-default-bind-options no-sslv3 no-tlsv10
497 stats socket /var/lib/haproxy/stats mode 600 level user
503 option log-health-checks
507 timeout http-request 10s
514 bind ${haproxy_ip}:8181 transparent
516 http-request set-header X-Forwarded-Proto https if { ssl_fc }
517 http-request set-header X-Forwarded-Proto http if !{ ssl_fc }
518 option httpchk GET /diagstatus
523 for odlip in ${odl_ips[*]}; do
524 echo " server opendaylight-rest-${odlindex} ${odlip}:8181 check fall 5 inter 2000 rise 2" >> "${WORKSPACE}/haproxy.cfg"
525 odlindex=$((odlindex+1))
528 cat >> "${WORKSPACE}/haproxy.cfg" << EOF
530 listen opendaylight_ws
531 bind ${haproxy_ip}:8185 transparent
534 option httpchk GET /data-change-event-subscription/neutron:neutron/neutron:ports/datastore=OPERATIONAL/scope=SUBTREE HTTP/1.1\r\nHost:\ ws.opendaylight.org\r\nConnection:\ Upgrade\r\nUpgrade:\ websocket\r\nSec-WebSocket-Key:\ haproxy\r\nSec-WebSocket-Version:\ 13\r\nSec-WebSocket-Protocol:\ echo-protocol
535 http-check expect status 101
539 for odlip in ${odl_ips[*]}; do
540 echo " server opendaylight-ws-${odlindex} ${odlip}:8185 check fall 3 inter 1000 rise 2" >> "${WORKSPACE}/haproxy.cfg"
541 odlindex=$((odlindex+1))
544 echo "Dump haproxy.cfg"
545 cat "${WORKSPACE}/haproxy.cfg"
547 cat > "${WORKSPACE}/deploy_ha_proxy.sh" << EOF
548 sudo chown haproxy:haproxy /tmp/haproxy.cfg
549 sudo sed -i 's/\\/etc\\/haproxy\\/haproxy.cfg/\\/tmp\\/haproxy.cfg/g' /usr/lib/systemd/system/haproxy.service
550 sudo /usr/sbin/semanage permissive -a haproxy_t
551 sudo systemctl restart haproxy
554 sudo systemctl status haproxy
558 scp "${WORKSPACE}/install_ha_proxy.sh" "${haproxy_ip}:/tmp"
559 ${SSH} "${haproxy_ip}" "sudo bash /tmp/install_ha_proxy.sh"
560 scp "${WORKSPACE}/haproxy.cfg" "${haproxy_ip}:/tmp"
561 scp "${WORKSPACE}/deploy_ha_proxy.sh" "${haproxy_ip}:/tmp"
562 ${SSH} "${haproxy_ip}" "sudo bash /tmp/deploy_ha_proxy.sh"
563 } # configure_haproxy_for_neutron_requests()
565 # Following three functions are debugging helpers when debugging devstack changes.
566 # Keeping them for now so we can simply call them when needed.
570 function get_hostnames () {
572 local ctrlip=${OPENSTACK_CONTROL_NODE_1_IP}
573 local comp1ip=${OPENSTACK_COMPUTE_NODE_1_IP}
574 local comp2ip=${OPENSTACK_COMPUTE_NODE_2_IP}
575 ctrlhn=$(${SSH} "${ctrlip}" "hostname")
576 comp1hn=$(${SSH} "${comp1ip}" "hostname")
577 comp2hn=$(${SSH} "${comp2ip}" "hostname")
578 echo "hostnames: ${ctrlhn}, ${comp1hn}, ${comp2hn}"
582 function check_firewall() {
585 local ctrlip=${OPENSTACK_CONTROL_NODE_1_IP}
586 local comp1ip=${OPENSTACK_COMPUTE_NODE_1_IP}
587 local comp2ip=${OPENSTACK_COMPUTE_NODE_2_IP}
589 echo "check_firewall on control"
591 sudo systemctl status firewalld
592 sudo systemctl -l status iptables
593 sudo iptables --line-numbers -nvL
595 echo "check_firewall on compute 1"
596 ${SSH} "${comp1ip}" "
597 sudo systemctl status firewalld
598 sudo systemctl -l status iptables
599 sudo iptables --line-numbers -nvL
601 echo "check_firewall on compute 2"
602 ${SSH} "${comp2ip}" "
603 sudo systemctl status firewalld
604 sudo systemctl -l status iptables
605 sudo iptables --line-numbers -nvL
609 function get_service () {
613 local ctrlip=${OPENSTACK_CONTROL_NODE_1_IP}
614 local comp1ip=${OPENSTACK_COMPUTE_NODE_1_IP}
616 #if [ ${idx} -eq 1 ]; then
617 if [ "${iter}" -eq 1 ] || [ "${iter}" -gt 16 ]; then
618 curl "http://${ctrlip}:5000"
619 curl "http://${ctrlip}:35357"
620 curl "http://${ctrlip}/identity"
622 source /opt/stack/devstack/openrc admin admin;
624 openstack configuration show --unmask;
625 openstack service list
626 openstack --os-cloud devstack-admin --os-region RegionOne compute service list
627 openstack hypervisor list;
635 # Check if rabbitmq is ready by looking for a pid in it's status.
636 # The function returns the status of the grep command which callers can check.
637 function is_rabbitmq_ready() {
639 local grepfor="nova_cell1"
641 ${SSH} "${ip}" "sudo rabbitmqctl list_vhosts" > rabbit.txt
642 grep "${grepfor}" rabbit.txt
645 # retry the given command ($3) until success for a number of iterations ($1)
646 # sleeping ($2) between tries.
648 local -r -i max_tries=${1}
649 local -r -i sleep_time=${2}
654 echo "retry ${cmd}: attempt: ${retries}"
657 # shellcheck disable=SC2004
658 if ((${rc} == 0)); then
661 # shellcheck disable=SC2004
662 if ((${retries} == ${max_tries})); then
666 sleep "${sleep_time}"
673 function install_ovs() {
675 local -r rpm_path=${2}
677 if [ "${OVS_INSTALL:0:1}" = "v" ]; then
678 # An OVS version was given, so we build it ourselves from OVS git repo.
679 # Only on the first node though, consecutive nodes will use RPMs
680 # built for the first one.
681 [ ! -d "${rpm_path}" ] && mkdir -p "${rpm_path}" && build_ovs "${node}" "${OVS_INSTALL}" "${rpm_path}"
682 # Install OVS from path
683 install_ovs_from_path "${node}" "${rpm_path}"
684 elif [ "${OVS_INSTALL:0:4}" = "http" ]; then
685 # Otherwise, install from rpm repo directly.
686 install_ovs_from_repo "${node}" "${OVS_INSTALL}"
688 echo "Expected either an OVS version git tag or a repo http url"
693 ODL_PROVIDER_MAPPINGS="\${PUBLIC_PHYSICAL_NETWORK}:${PUBLIC_BRIDGE}"
697 # Always compare the lists below against the devstack upstream ENABLED_SERVICES in
698 # https://github.com/openstack-dev/devstack/blob/master/stackrc#L52
699 # ODL CSIT does not use vnc, cinder, q-agt, q-l3 or horizon so they are not included below.
700 # collect performance stats
701 CORE_OS_CONTROL_SERVICES="dstat"
703 CORE_OS_CONTROL_SERVICES+=",g-api,g-reg"
705 CORE_OS_CONTROL_SERVICES+=",key"
706 # Nova - services to support libvirt
707 CORE_OS_CONTROL_SERVICES+=",n-api,n-api-meta,n-cauth,n-cond,n-crt,n-obj,n-sch"
708 # ODL - services to connect to ODL
709 CORE_OS_CONTROL_SERVICES+=",odl-compute,odl-neutron"
710 # Additional services
711 CORE_OS_CONTROL_SERVICES+=",mysql,rabbit"
713 # collect performance stats
714 CORE_OS_COMPUTE_SERVICES="dstat"
715 # computes only need nova and odl
716 CORE_OS_COMPUTE_SERVICES+=",n-cpu,odl-compute"
718 cat > "${WORKSPACE}/disable_firewall.sh" << EOF
719 sudo systemctl stop firewalld
720 # Open these ports to match the tutorial vms
721 # http/https (80/443), samba (445), netbios (137,138,139)
722 sudo iptables -I INPUT -p tcp -m multiport --dports 80,443,139,445 -j ACCEPT
723 sudo iptables -I INPUT -p udp -m multiport --dports 137,138 -j ACCEPT
724 # OpenStack services as well as vxlan tunnel ports 4789 and 9876
725 # identity public/admin (5000/35357), ampq (5672), vnc (6080), nova (8774), glance (9292), neutron (9696)
726 sudo sudo iptables -I INPUT -p tcp -m multiport --dports 5000,5672,6080,8774,9292,9696,35357 -j ACCEPT
727 sudo sudo iptables -I INPUT -p udp -m multiport --dports 4789,9876 -j ACCEPT
728 sudo iptables-save > /etc/sysconfig/iptables
729 sudo systemctl restart iptables
730 sudo iptables --line-numbers -nvL
734 #For SFC Tests a larger partition is required for creating instances with Ubuntu
735 if [[ "${ENABLE_OS_PLUGINS}" =~ networking-sfc ]]; then
738 cat > "${WORKSPACE}/get_devstack.sh" << EOF
739 sudo systemctl stop firewalld
740 sudo yum install bridge-utils python-pip -y
741 #sudo systemctl stop NetworkManager
742 #Disable NetworkManager and kill dhclient and dnsmasq
743 sudo systemctl stop NetworkManager
744 sudo killall dhclient
746 #Workaround for mysql failure
747 echo "127.0.0.1 localhost \${HOSTNAME}" >> /tmp/hosts
748 echo "::1 localhost \${HOSTNAME}" >> /tmp/hosts
749 sudo mv /tmp/hosts /etc/hosts
750 sudo mkdir /opt/stack
751 echo "Create RAM disk for /opt/stack"
752 sudo mount -t tmpfs -o size=${TMPFS_SIZE} tmpfs /opt/stack
753 sudo chmod 777 /opt/stack
755 echo "git clone https://git.openstack.org/openstack-dev/devstack --branch ${OPENSTACK_BRANCH}"
756 git clone https://git.openstack.org/openstack-dev/devstack --branch ${OPENSTACK_BRANCH}
758 if [ -n "${DEVSTACK_HASH}" ]; then
759 echo "git checkout ${DEVSTACK_HASH}"
760 git checkout ${DEVSTACK_HASH}
762 wget https://raw.githubusercontent.com/shague/odl_tools/master/fix-logging.patch.txt -O /tmp/fix-logging.patch.txt
763 patch --verbose -p1 -i /tmp/fix-logging.patch.txt
764 git --no-pager log --pretty=format:'%h %<(13)%ar%<(13)%cr %<(20,trunc)%an%d %s%b' -n20
767 echo "workaround: do not upgrade openvswitch"
768 sudo yum install -y yum-plugin-versionlock
769 sudo yum versionlock add openvswitch
772 cat > "${WORKSPACE}/setup_host_cell_mapping.sh" << EOF
773 sudo nova-manage cell_v2 map_cell0
774 sudo nova-manage cell_v2 simple_cell_setup
775 sudo nova-manage db sync
776 sudo nova-manage cell_v2 discover_hosts
779 cat > "${WORKSPACE}/workaround_networking_sfc.sh" << EOF
781 git clone https://git.openstack.org/openstack/networking-sfc
783 git checkout ${OPENSTACK_BRANCH}
784 git checkout master -- devstack/plugin.sh
787 NUM_OPENSTACK_SITES=${NUM_OPENSTACK_SITES:-1}
791 if [ "${ENABLE_HAPROXY_FOR_NEUTRON}" == "yes" ]; then
792 echo "Configure HAProxy"
793 ODL_HAPROXYIP_PARAM=OPENSTACK_HAPROXY_1_IP
794 ODL_IP_PARAM1=ODL_SYSTEM_1_IP
795 ODL_IP_PARAM2=ODL_SYSTEM_2_IP
796 ODL_IP_PARAM3=ODL_SYSTEM_3_IP
797 ODLMGRIP=${!ODL_HAPROXYIP_PARAM} # ODL Northbound uses HAProxy VIP
798 ODL_OVS_MGRS="${!ODL_IP_PARAM1},${!ODL_IP_PARAM2},${!ODL_IP_PARAM3}" # OVSDB connects to all ODL IPs
799 configure_haproxy_for_neutron_requests ${!ODL_HAPROXYIP_PARAM} "${ODL_OVS_MGRS}"
801 ODL_IP_PARAM=ODL_SYSTEM_1_IP
802 ODLMGRIP=${!ODL_IP_PARAM} # OVSDB connects to ODL IP
803 ODL_OVS_MGRS="${!ODL_IP_PARAM}" # ODL Northbound uses ODL IP
807 for i in $(seq 1 "${NUM_OPENSTACK_CONTROL_NODES}"); do
808 cip=OPENSTACK_CONTROL_NODE_${i}_IP
810 os_ip_list+=("${ip}")
813 for i in $(seq 1 "${NUM_OPENSTACK_COMPUTE_NODES}"); do
814 cip=OPENSTACK_COMPUTE_NODE_${i}_IP
816 os_ip_list+=("${ip}")
819 for i in "${!os_ip_list[@]}"; do
821 tcpdump_start "${i}" "${ip}" "port 6653"
825 # Begin stacking the nodes, starting with the controller(s) and then the compute(s)
827 for i in $(seq 1 "${NUM_OPENSTACK_CONTROL_NODES}"); do
828 CONTROLIP="OPENSTACK_CONTROL_NODE_${i}_IP"
829 echo "Configure the stack of the control node ${i} of ${NUM_OPENSTACK_CONTROL_NODES}: ${!CONTROLIP}"
830 scp "${WORKSPACE}/disable_firewall.sh" "${!CONTROLIP}":/tmp
831 ${SSH} "${!CONTROLIP}" "sudo bash /tmp/disable_firewall.sh"
832 create_etc_hosts "${!CONTROLIP}"
833 scp "${WORKSPACE}/hosts_file" "${!CONTROLIP}":/tmp/hosts
834 scp "${WORKSPACE}/get_devstack.sh" "${!CONTROLIP}":/tmp
835 # devstack Master is yet to migrate fully to lib/neutron, there are some ugly hacks that is
836 # affecting the stacking.
837 # Workaround For Queens, Make the physical Network as physnet1 in lib/neutron
838 # In Queens the neutron new libs are used and do not have the following options from Pike and earlier:
839 # Q_ML2_PLUGIN_FLAT_TYPE_OPTIONS could be used for the flat_networks
840 # and Q_ML2_PLUGIN_VLAN_TYPE_OPTIONS could be used for the ml2_type_vlan
841 ${SSH} "${!CONTROLIP}" "bash /tmp/get_devstack.sh > /tmp/get_devstack.sh.txt 2>&1"
842 ssh "${!CONTROLIP}" "sed -i 's/flat_networks public/flat_networks public,physnet1/' /opt/stack/devstack/lib/neutron"
843 ssh "${!CONTROLIP}" "sed -i '186i iniset \$NEUTRON_CORE_PLUGIN_CONF ml2_type_vlan network_vlan_ranges public:1:4094,physnet1:1:4094' /opt/stack/devstack/lib/neutron"
844 #Workaround for networking-sfc to configure the paramaters in neutron.conf if the
845 # services used are neutron-api, neutron-dhcp etc instead of q-agt.
846 # Can be removed if the patch https://review.openstack.org/#/c/596287/ gets merged
847 if [[ "${ENABLE_OS_PLUGINS}" =~ networking-sfc ]]; then
848 scp "${WORKSPACE}/workaround_networking_sfc.sh" "${!CONTROLIP}":/tmp/
849 ssh "${!CONTROLIP}" "bash -x /tmp/workaround_networking_sfc.sh"
851 create_control_node_local_conf "${!CONTROLIP}" ${ODLMGRIP} "${ODL_OVS_MGRS}"
852 scp "${WORKSPACE}/local.conf_control_${!CONTROLIP}" "${!CONTROLIP}":/opt/stack/devstack/local.conf
853 echo "Install rdo release to avoid incompatible Package versions"
854 install_rdo_release "${!CONTROLIP}"
855 setup_live_migration_control "${!CONTROLIP}"
856 if [ "$(is_openstack_feature_enabled n-cpu)" == "1" ]; then
857 setup_live_migration_compute "${!CONTROLIP}" "${!CONTROLIP}"
859 [ -n "${OVS_INSTALL}" ] && install_ovs "${!CONTROLIP}" /tmp/ovs_rpms
860 if [[ "${ENABLE_OS_PLUGINS}" =~ networking-sfc ]]; then
861 # This should be really done by networking-odl devstack plugin,
862 # but in the meantime do it ourselves
863 ssh "${!CONTROLIP}" "sudo ovs-vsctl set Open_vSwitch . external_ids:of-tunnel=true"
865 fix_broken_requirements_versions "${!CONTROLIP}"
866 echo "Stack the control node ${i} of ${NUM_OPENSTACK_CONTROL_NODES}: ${CONTROLIP}"
867 # Workaround: fixing boneheaded polkit issue, to be removed later
868 ssh "${!CONTROLIP}" "sudo bash -c 'echo deltarpm=0 >> /etc/yum.conf && yum -y update polkit'"
869 ssh "${!CONTROLIP}" "cd /opt/stack/devstack; nohup ./stack.sh > /opt/stack/devstack/nohup.out 2>&1 &"
870 ssh "${!CONTROLIP}" "ps -ef | grep stack.sh"
871 ssh "${!CONTROLIP}" "ls -lrt /opt/stack/devstack/nohup.out"
872 os_node_list+=("${!CONTROLIP}")
875 # This is a backup to the CELLSV2_SETUP=singleconductor workaround. Keeping it here as an easy lookup
877 # Let the control node get started to avoid a race condition where the computes start and try to access
878 # the nova_cell1 on the control node before it is created. If that happens, the nova-compute service on the
879 # compute exits and does not attempt to restart.
880 # 180s is chosen because in test runs the control node usually finished in 17-20 minutes and the computes finished
881 # in 17 minutes, so take the max difference of 3 minutes and the jobs should still finish around the same time.
882 # one of the following errors is seen in the compute n-cpu.log:
883 # Unhandled error: NotAllowed: Connection.open: (530) NOT_ALLOWED - access to vhost 'nova_cell1' refused for user 'stackrabbit'
884 # AccessRefused: (0, 0): (403) ACCESS_REFUSED - Login was refused using authentication mechanism AMQPLAIN. For details see the broker logfile.
885 # Compare that timestamp to this log in the control stack.log: sudo rabbitmqctl set_permissions -p nova_cell1 stackrabbit
886 # If the n-cpu.log is earlier than the control stack.log timestamp then the failure condition is likely hit.
887 if [ "${NUM_OPENSTACK_COMPUTE_NODES}" -gt 0 ]; then
888 WAIT_FOR_RABBITMQ_MINUTES=60
889 echo "Wait a maximum of ${WAIT_FOR_RABBITMQ_MINUTES}m until rabbitmq is ready and nova_cell1 created to allow the controller to create nova_cell1 before the computes need it"
891 retry ${WAIT_FOR_RABBITMQ_MINUTES} 60 "is_rabbitmq_ready ${OPENSTACK_CONTROL_NODE_1_IP}"
894 # shellcheck disable=SC2004
895 if ((${rc} == 0)); then
896 echo "rabbitmq is ready, starting ${NUM_OPENSTACK_COMPUTE_NODES} compute(s)"
898 echo "rabbitmq was not ready in ${WAIT_FOR_RABBITMQ_MINUTES}m"
903 for i in $(seq 1 "${NUM_OPENSTACK_COMPUTE_NODES}"); do
904 COMPUTEIP=OPENSTACK_COMPUTE_NODE_${i}_IP
905 CONTROLIP=OPENSTACK_CONTROL_NODE_1_IP
906 echo "Configure the stack of the compute node ${i} of ${NUM_OPENSTACK_COMPUTE_NODES}: ${!COMPUTEIP}"
907 scp "${WORKSPACE}/disable_firewall.sh" "${!COMPUTEIP}:/tmp"
908 ${SSH} "${!COMPUTEIP}" "sudo bash /tmp/disable_firewall.sh"
909 create_etc_hosts "${!COMPUTEIP}" "${!CONTROLIP}"
910 scp "${WORKSPACE}/hosts_file" "${!COMPUTEIP}":/tmp/hosts
911 scp "${WORKSPACE}/get_devstack.sh" "${!COMPUTEIP}":/tmp
912 ${SSH} "${!COMPUTEIP}" "bash /tmp/get_devstack.sh > /tmp/get_devstack.sh.txt 2>&1"
913 create_compute_node_local_conf "${!COMPUTEIP}" "${!CONTROLIP}" "${ODLMGRIP}" "${ODL_OVS_MGRS}"
914 scp "${WORKSPACE}"/local.conf_compute_"${!COMPUTEIP}" "${!COMPUTEIP}":/opt/stack/devstack/local.conf
915 echo "Install rdo release to avoid incompatible Package versions"
916 install_rdo_release "${!COMPUTEIP}"
917 setup_live_migration_compute "${!COMPUTEIP}" "${!CONTROLIP}"
918 [ -n "${OVS_INSTALL}" ] && install_ovs "${!COMPUTEIP}" /tmp/ovs_rpms
919 if [[ "${ENABLE_OS_PLUGINS}" =~ networking-sfc ]]; then
920 # This should be really done by networking-odl devstack plugin,
921 # but in the meantime do it ourselves
922 ssh "${!COMPUTEIP}" "sudo ovs-vsctl set Open_vSwitch . external_ids:of-tunnel=true"
924 fix_broken_requirements_versions "${!COMPUTEIP}"
925 echo "Stack the compute node ${i} of ${NUM_OPENSTACK_COMPUTE_NODES}: ${!COMPUTEIP}"
926 ssh "${!COMPUTEIP}" "cd /opt/stack/devstack; nohup ./stack.sh > /opt/stack/devstack/nohup.out 2>&1 &"
927 ssh "${!COMPUTEIP}" "ps -ef | grep stack.sh"
928 os_node_list+=("${!COMPUTEIP}")
931 echo "nodelist: ${os_node_list[*]}"
933 # This script runs on the openstack nodes. It greps for a string that devstack writes when stacking is complete.
934 # The script then writes a status depending on the grep output that is later scraped by the robot vm to control
935 # the status polling.
936 cat > "${WORKSPACE}/check_stacking.sh" << EOF
937 > /tmp/stack_progress
938 ps -ef | grep "stack.sh" | grep -v grep
940 if [ \${ret} -eq 1 ]; then
941 grep "This is your host IP address:" /opt/stack/devstack/nohup.out
942 if [ \$? -eq 0 ]; then
943 echo "Stacking Complete" > /tmp/stack_progress
945 echo "Stacking Failed" > /tmp/stack_progress
947 elif [ \${ret} -eq 0 ]; then
948 echo "Still Stacking" > /tmp/stack_progress
955 # Check if the stacking is finished. Poll all nodes every 60s for one hour.
958 while [ ${in_progress} -eq 1 ]; do
959 # shellcheck disable=SC2004
960 iteration=$(($iteration + 1))
961 for index in "${!os_node_list[@]}"; do
962 echo "node $index ${os_node_list[index]}: checking stacking status attempt ${iteration} of 60"
963 scp "${WORKSPACE}/check_stacking.sh" "${os_node_list[index]}:/tmp"
964 ${SSH} "${os_node_list[index]}" "bash /tmp/check_stacking.sh"
965 scp "${os_node_list[index]}":/tmp/stack_progress .
967 stacking_status=$(cat stack_progress)
969 # get_service "${iteration}" "${index}"
970 if [ "$stacking_status" == "Still Stacking" ]; then
972 elif [ "$stacking_status" == "Stacking Failed" ]; then
973 echo "node $index ${os_node_list[index]}: stacking has failed"
975 elif [ "$stacking_status" == "Stacking Complete" ]; then
976 echo "node $index ${os_node_list[index]}: stacking complete"
977 unset 'os_node_list[index]'
978 if [ ${#os_node_list[@]} -eq 0 ]; then
983 echo "sleep for a minute before the next check"
985 if [ ${iteration} -eq 60 ]; then
986 echo "stacking has failed - took longer than 60m"
991 # Further configuration now that stacking is complete.
992 echo "Configure the Control Node"
993 CONTROLIP=OPENSTACK_CONTROL_NODE_1_IP
994 # Gather Compute IPs for the site
995 for i in $(seq 1 "${NUM_OPENSTACK_COMPUTE_NODES}"); do
996 IP_VAR=OPENSTACK_COMPUTE_NODE_${i}_IP
997 COMPUTE_IPS[$((i-1))]=${!IP_VAR}
1000 echo "sleep for 60s and print hypervisor-list"
1002 ${SSH} ${!CONTROLIP} "cd /opt/stack/devstack; source openrc admin admin; nova hypervisor-list"
1003 # in the case that we are doing openstack (control + compute) all in one node, then the number of hypervisors
1004 # will be the same as the number of openstack systems. However, if we are doing multinode openstack then the
1005 # assumption is we have a single control node and the rest are compute nodes, so the number of expected hypervisors
1006 # is one less than the total number of openstack systems
1007 if [ "${NUM_OPENSTACK_SYSTEM}" -eq 1 ]; then
1008 expected_num_hypervisors=1
1010 expected_num_hypervisors=${NUM_OPENSTACK_COMPUTE_NODES}
1011 if [ "$(is_openstack_feature_enabled n-cpu)" == "1" ]; then
1012 expected_num_hypervisors=$((expected_num_hypervisors + 1))
1015 num_hypervisors=$(${SSH} ${!CONTROLIP} "cd /opt/stack/devstack; source openrc admin admin; openstack hypervisor list -f value | wc -l" | tail -1 | tr -d "\r")
1016 if ! [ "${num_hypervisors}" ] || ! [ "${num_hypervisors}" -eq ${expected_num_hypervisors} ]; then
1017 echo "Error: Only $num_hypervisors hypervisors detected, expected $expected_num_hypervisors"
1022 echo "prepare external networks by adding vxlan tunnels between all nodes on a separate bridge..."
1023 # FIXME Should there be a unique gateway IP and devstack index for each site?
1025 for ip in ${!CONTROLIP} ${COMPUTE_IPS[*]}; do
1026 # FIXME - Workaround, ODL (new netvirt) currently adds PUBLIC_BRIDGE as a port in br-int since it doesn't see such a bridge existing when we stack
1027 ${SSH} "$ip" "sudo ovs-vsctl --if-exists del-port br-int $PUBLIC_BRIDGE"
1028 ${SSH} "$ip" "sudo ovs-vsctl --may-exist add-br $PUBLIC_BRIDGE -- set bridge $PUBLIC_BRIDGE other-config:disable-in-band=true other_config:hwaddr=f6:00:00:ff:01:0$((devstack_index++))"
1032 if [ "${IPSEC_VXLAN_TUNNELS_ENABLED}" == "yes" ]; then
1033 # shellcheck disable=SC2206
1034 ALL_NODES=(${!CONTROLIP} ${COMPUTE_IPS[*]})
1035 for ((inx_ip1=0; inx_ip1<$((${#ALL_NODES[@]} - 1)); inx_ip1++)); do
1036 for ((inx_ip2=$((inx_ip1 + 1)); inx_ip2<${#ALL_NODES[@]}; inx_ip2++)); do
1037 KEY1=0x$(dd if=/dev/urandom count=32 bs=1 2> /dev/null| xxd -p -c 64)
1038 KEY2=0x$(dd if=/dev/urandom count=32 bs=1 2> /dev/null| xxd -p -c 64)
1039 ID=0x$(dd if=/dev/urandom count=4 bs=1 2> /dev/null| xxd -p -c 8)
1040 ip1=${ALL_NODES[$inx_ip1]}
1041 ip2=${ALL_NODES[$inx_ip2]}
1042 ${SSH} "$ip1" "sudo ip xfrm state add src $ip1 dst $ip2 proto esp spi $ID reqid $ID mode transport auth sha256 $KEY1 enc aes $KEY2"
1043 ${SSH} "$ip1" "sudo ip xfrm state add src $ip2 dst $ip1 proto esp spi $ID reqid $ID mode transport auth sha256 $KEY1 enc aes $KEY2"
1044 ${SSH} "$ip1" "sudo ip xfrm policy add src $ip1 dst $ip2 proto udp dir out tmpl src $ip1 dst $ip2 proto esp reqid $ID mode transport"
1045 ${SSH} "$ip1" "sudo ip xfrm policy add src $ip2 dst $ip1 proto udp dir in tmpl src $ip2 dst $ip1 proto esp reqid $ID mode transport"
1047 ${SSH} "$ip2" "sudo ip xfrm state add src $ip2 dst $ip1 proto esp spi $ID reqid $ID mode transport auth sha256 $KEY1 enc aes $KEY2"
1048 ${SSH} "$ip2" "sudo ip xfrm state add src $ip1 dst $ip2 proto esp spi $ID reqid $ID mode transport auth sha256 $KEY1 enc aes $KEY2"
1049 ${SSH} "$ip2" "sudo ip xfrm policy add src $ip2 dst $ip1 proto udp dir out tmpl src $ip2 dst $ip1 proto esp reqid $ID mode transport"
1050 ${SSH} "$ip2" "sudo ip xfrm policy add src $ip1 dst $ip2 proto udp dir in tmpl src $ip1 dst $ip2 proto esp reqid $ID mode transport"
1054 for ip in ${!CONTROLIP} ${COMPUTE_IPS[*]}; do
1055 echo "ip xfrm configuration for node $ip:"
1056 ${SSH} "$ip" "sudo ip xfrm policy list"
1057 ${SSH} "$ip" "sudo ip xfrm state list"
1061 # Control Node - PUBLIC_BRIDGE will act as the external router
1062 # Parameter values below are used in integration/test - changing them requires updates in intergration/test as well
1063 EXTNET_GATEWAY_IP="10.10.10.250"
1064 EXTNET_INTERNET_IP="10.9.9.9"
1065 EXTNET_PNF_IP="10.10.10.253"
1066 ${SSH} ${!CONTROLIP} "sudo ifconfig ${PUBLIC_BRIDGE} up ${EXTNET_GATEWAY_IP}/24"
1068 # Control Node - external net PNF simulation
1069 ${SSH} ${!CONTROLIP} "
1070 sudo ip netns add pnf_ns;
1071 sudo ip link add pnf_veth0 type veth peer name pnf_veth1;
1072 sudo ip link set pnf_veth1 netns pnf_ns;
1073 sudo ip link set pnf_veth0 up;
1074 sudo ip netns exec pnf_ns ifconfig pnf_veth1 up ${EXTNET_PNF_IP}/24;
1075 sudo ovs-vsctl add-port ${PUBLIC_BRIDGE} pnf_veth0;
1078 # Control Node - external net internet address simulation
1079 ${SSH} ${!CONTROLIP} "
1080 sudo ip tuntap add dev internet_tap mode tap;
1081 sudo ifconfig internet_tap up ${EXTNET_INTERNET_IP}/24;
1086 for compute_ip in ${COMPUTE_IPS[*]}; do
1087 # Tunnel from controller to compute
1088 COMPUTEPORT=compute$(( compute_index++ ))_vxlan
1089 ${SSH} ${!CONTROLIP} "
1090 sudo ovs-vsctl add-port $PUBLIC_BRIDGE $COMPUTEPORT -- set interface $COMPUTEPORT type=vxlan options:local_ip=${!CONTROLIP} options:remote_ip=$compute_ip options:dst_port=9876 options:key=flow
1092 # Tunnel from compute to controller
1093 CONTROLPORT="control_vxlan"
1094 ${SSH} "$compute_ip" "
1095 sudo ovs-vsctl add-port $PUBLIC_BRIDGE $CONTROLPORT -- set interface $CONTROLPORT type=vxlan options:local_ip=$compute_ip options:remote_ip=${!CONTROLIP} options:dst_port=9876 options:key=flow
1099 if [ "${ENABLE_HAPROXY_FOR_NEUTRON}" == "yes" ]; then
1100 odlmgrip=OPENSTACK_HAPROXY_1_IP
1101 HA_PROXY_IP=${!odlmgrip}
1102 HA_PROXY_1_IP=${!odlmgrip}
1103 odlmgrip2=OPENSTACK_HAPROXY_2_IP
1104 HA_PROXY_2_IP=${!odlmgrip2}
1105 odlmgrip3=OPENSTACK_HAPROXY_1_IP
1106 HA_PROXY_3_IP=${!odlmgrip3}
1108 HA_PROXY_IP=${ODL_SYSTEM_IP}
1109 HA_PROXY_1_IP=${ODL_SYSTEM_1_IP}
1110 HA_PROXY_2_IP=${ODL_SYSTEM_2_IP}
1111 HA_PROXY_3_IP=${ODL_SYSTEM_3_IP}
1114 get_test_suites SUITES
1116 #install all client versions required for this job testing
1117 install_openstack_clients_in_robot_vm
1119 # TODO: run openrc on control node and then scrape the vars from it
1120 # Environment Variables Needed to execute Openstack Client for NetVirt Jobs
1121 cat > /tmp/os_netvirt_client_rc << EOF
1122 export OS_USERNAME=admin
1123 export OS_PASSWORD=admin
1124 export OS_PROJECT_NAME=admin
1125 export OS_USER_DOMAIN_NAME=default
1126 export OS_PROJECT_DOMAIN_NAME=default
1127 export OS_AUTH_URL="http://${!CONTROLIP}/identity"
1128 export OS_IDENTITY_API_VERSION=3
1129 export OS_IMAGE_API_VERSION=2
1130 export OS_TENANT_NAME=admin
1134 source /tmp/os_netvirt_client_rc
1136 echo "Get all versions before executing robot"
1137 echo "openstack --version"
1138 command -v openstack
1140 echo "nova --version"
1143 echo "neutron --version"
1147 stacktime=$(timer "$totaltmr")
1148 printf "Stacking elapsed time: %s\n" "${stacktime}"
1150 echo "Starting Robot test suites ${SUITES} ..."
1151 # please add robot -v arguments on a single line and alphabetized
1153 # ${TESTOPTIONS}, ${SUITES} are space-separated parameters and should not be quoted.
1154 # shellcheck disable=SC2086
1155 for suite in ${SUITES}; do
1156 # prepend an incremental counter to the suite name so that the full robot log combining all the suites as is done
1157 # in the rebot step below will list all the suites in chronological order as rebot seems to alphabetize them
1158 (( suite_num = suite_num + 1 ))
1159 suite_index="$(printf %02d "${suite_num}")"
1160 suite_name="$(basename "${suite}" | cut -d. -f1)"
1161 log_name="${suite_index}_${suite_name}"
1162 robot -N "${log_name}" \
1163 -c critical -e exclude -e "skip_if_${DISTROSTREAM}" \
1164 --log "log_${log_name}.html" --report "report_${log_name}.html" --output "output_${log_name}.xml" \
1165 --removekeywords wuks \
1166 --removekeywords name:SetupUtils.Setup_Utils_For_Setup_And_Teardown \
1167 --removekeywords name:SetupUtils.Setup_Test_With_Logging_And_Without_Fast_Failing \
1168 --removekeywords name:OpenStackOperations.Add_OVS_Logging_On_All_OpenStack_Nodes \
1169 -v BUNDLEFOLDER:"${BUNDLEFOLDER}" \
1170 -v BUNDLE_URL:"${ACTUAL_BUNDLE_URL}" \
1171 -v CMP_INSTANCES_SHARED_PATH:/var/instances \
1172 -v CONTROLLERFEATURES:"${CONTROLLERFEATURES}" \
1173 -v CONTROLLER_USER:"${USER}" \
1174 -v DEVSTACK_DEPLOY_PATH:/opt/stack/devstack \
1175 -v ENABLE_ITM_DIRECT_TUNNELS:"${ENABLE_ITM_DIRECT_TUNNELS}" \
1176 -v HA_PROXY_IP:"${HA_PROXY_IP}" \
1177 -v HA_PROXY_1_IP:"${HA_PROXY_1_IP}" \
1178 -v HA_PROXY_2_IP:"${HA_PROXY_2_IP}" \
1179 -v HA_PROXY_3_IP:"${HA_PROXY_3_IP}" \
1180 -v JDKVERSION:"${JDKVERSION}" \
1181 -v JENKINS_WORKSPACE:"${WORKSPACE}" \
1182 -v NEXUSURL_PREFIX:"${NEXUSURL_PREFIX}" \
1183 -v NUM_ODL_SYSTEM:"${NUM_ODL_SYSTEM}" \
1184 -v NUM_OS_SYSTEM:"${NUM_OPENSTACK_SYSTEM}" \
1185 -v NUM_TOOLS_SYSTEM:"${NUM_TOOLS_SYSTEM}" \
1186 -v ODL_SNAT_MODE:"${ODL_SNAT_MODE}" \
1187 -v GROUP_ADD_MOD_ENABLED:"${GROUP_ADD_MOD_ENABLED}" \
1188 -v ODL_STREAM:"${DISTROSTREAM}" \
1189 -v ODL_SYSTEM_IP:"${ODL_SYSTEM_IP}" \
1190 -v ODL_SYSTEM_1_IP:"${ODL_SYSTEM_1_IP}" \
1191 -v ODL_SYSTEM_2_IP:"${ODL_SYSTEM_2_IP}" \
1192 -v ODL_SYSTEM_3_IP:"${ODL_SYSTEM_3_IP}" \
1193 -v ODL_SYSTEM_4_IP:"${ODL_SYSTEM_4_IP}" \
1194 -v ODL_SYSTEM_5_IP:"${ODL_SYSTEM_5_IP}" \
1195 -v ODL_SYSTEM_6_IP:"${ODL_SYSTEM_6_IP}" \
1196 -v ODL_SYSTEM_7_IP:"${ODL_SYSTEM_7_IP}" \
1197 -v ODL_SYSTEM_8_IP:"${ODL_SYSTEM_8_IP}" \
1198 -v ODL_SYSTEM_9_IP:"${ODL_SYSTEM_9_IP}" \
1199 -v OS_CONTROL_NODE_IP:"${OPENSTACK_CONTROL_NODE_1_IP}" \
1200 -v OS_CONTROL_NODE_1_IP:"${OPENSTACK_CONTROL_NODE_1_IP}" \
1201 -v OS_CONTROL_NODE_2_IP:"${OPENSTACK_CONTROL_NODE_2_IP}" \
1202 -v OS_CONTROL_NODE_3_IP:"${OPENSTACK_CONTROL_NODE_3_IP}" \
1203 -v OPENSTACK_BRANCH:"${OPENSTACK_BRANCH}" \
1204 -v OS_COMPUTE_1_IP:"${OPENSTACK_COMPUTE_NODE_1_IP}" \
1205 -v OS_COMPUTE_2_IP:"${OPENSTACK_COMPUTE_NODE_2_IP}" \
1206 -v OS_COMPUTE_3_IP:"${OPENSTACK_COMPUTE_NODE_3_IP}" \
1207 -v OS_COMPUTE_4_IP:"${OPENSTACK_COMPUTE_NODE_4_IP}" \
1208 -v OS_COMPUTE_5_IP:"${OPENSTACK_COMPUTE_NODE_5_IP}" \
1209 -v OS_COMPUTE_6_IP:"${OPENSTACK_COMPUTE_NODE_6_IP}" \
1210 -v OPENSTACK_TOPO:"${OPENSTACK_TOPO}" \
1211 -v OS_USER:"${USER}" \
1212 -v PUBLIC_PHYSICAL_NETWORK:"${PUBLIC_PHYSICAL_NETWORK}" \
1213 -v SECURITY_GROUP_MODE:"${SECURITY_GROUP_MODE}" \
1214 -v TOOLS_SYSTEM_IP:"${TOOLS_SYSTEM_1_IP}" \
1215 -v TOOLS_SYSTEM_1_IP:"${TOOLS_SYSTEM_1_IP}" \
1216 -v TOOLS_SYSTEM_2_IP:"${TOOLS_SYSTEM_2_IP}" \
1217 -v TOOLS_SYSTEM_3_IP:"${TOOLS_SYSTEM_3_IP}" \
1218 -v USER_HOME:"${HOME}" \
1220 ${TESTOPTIONS} ${suite} || true
1222 #rebot exit codes seem to be different
1223 rebot --output "${WORKSPACE}/output.xml" --log log_full.html --report report.html -N openstack output_*.xml || true
1225 echo "Examining the files in data/log and checking file size"
1226 # shellcheck disable=SC2029
1227 ssh "${ODL_SYSTEM_IP}" "ls -altr /tmp/${BUNDLEFOLDER}/data/log/"
1228 # shellcheck disable=SC2029
1229 ssh "${ODL_SYSTEM_IP}" "du -hs /tmp/${BUNDLEFOLDER}/data/log/*"
1231 echo "Tests Executed"
1232 printf "Total elapsed time: %s, stacking time: %s\n" "$(timer "$totaltmr")" "${stacktime}"
1233 true # perhaps Jenkins is testing last exit code
1234 # vim: ts=4 sw=4 sts=4 et ft=sh :