Merge "Configuration for Testing Live Migration"
[releng/builder.git] / jjb / integration / integration-deploy-openstack-run-test.sh
1 #!/bin/bash
2 # Activate robotframework virtualenv
3 # ${ROBOT_VENV} comes from the integration-install-robotframework.sh
4 # script.
5 # shellcheck source=${ROBOT_VENV}/bin/activate disable=SC1091
6 source ${ROBOT_VENV}/bin/activate
7 source /tmp/common-functions.sh ${BUNDLEFOLDER}
8
9 PYTHON="${ROBOT_VENV}/bin/python"
10 SSH="ssh -t -t"
11 ADMIN_PASSWORD="admin"
12 OPENSTACK_MASTER_CLIENTS_VERSION="queens"
13
14 # TODO: remove this work to run changes.py if/when it's moved higher up to be visible at the Robot level
15 printf "\nshowing recent changes that made it into the distribution used by this job:\n"
16 $PYTHON -m pip install --upgrade urllib3
17 python ${WORKSPACE}/test/tools/distchanges/changes.py -d /tmp/distribution_folder \
18                   -u ${ACTUAL_BUNDLE_URL} -b ${DISTROBRANCH} \
19                   -r ssh://jenkins-${SILO}@git.opendaylight.org:29418 || true
20
21 printf "\nshowing recent changes that made it into integration/test used by this job:\n"
22 cd ${WORKSPACE}/test
23 printf "Hash    Author Date                    Commit Date                    Author               Subject\n"
24 printf "%s\n" "------- ------------------------------ ------------------------------ -------------------- -----------------------------"
25 git --no-pager log --pretty=format:'%h %<(30)%ad %<(30)%cd %<(20,trunc)%an%d %s' -n20
26 printf "\n"
27 cd -
28
29 cat << EOF
30 #################################################
31 ##         Deploy Openstack 3-node             ##
32 #################################################
33 EOF
34
35 # Catch command errors and collect logs.
36 # This ensures logs are collected when script commands fail rather than simply exiting.
37 function trap_handler() {
38     local prog="$0"
39     local lastline="$1"
40     local lasterr="$2"
41     echo "trap_hanlder: ${prog}: line ${lastline}: exit status of last command: ${lasterr}"
42     echo "trap_handler: command: ${BASH_COMMAND}"
43     exit 1
44 } # trap_handler()
45
46 trap 'trap_handler ${LINENO} ${$?}' ERR
47
48 function print_job_parameters() {
49     cat << EOF
50
51 Job parameters:
52 DISTROBRANCH: ${DISTROBRANCH}
53 DISTROSTREAM: ${DISTROSTREAM}
54 BUNDLE_URL: ${BUNDLE_URL}
55 CONTROLLERFEATURES: ${CONTROLLERFEATURES}
56 CONTROLLERDEBUGMAP: ${CONTROLLERDEBUGMAP}
57 TESTPLAN: ${TESTPLAN}
58 SUITES: ${SUITES}
59 PATCHREFSPEC: ${PATCHREFSPEC}
60 OPENSTACK_BRANCH: ${OPENSTACK_BRANCH}
61 DEVSTACK_HASH: ${DEVSTACK_HASH}
62 ODL_ML2_DRIVER_REPO: ${ODL_ML2_DRIVER_REPO}
63 ODL_ML2_BRANCH: ${ODL_ML2_BRANCH}
64 ODL_ML2_DRIVER_VERSION: ${ODL_ML2_DRIVER_VERSION}
65 ODL_ML2_PORT_BINDING: ${ODL_ML2_PORT_BINDING}
66 DEVSTACK_KUBERNETES_PLUGIN_REPO: ${DEVSTACK_KUBERNETES_PLUGIN_REPO}
67 DEVSTACK_LBAAS_PLUGIN_REPO: ${DEVSTACK_LBAAS_PLUGIN_REPO}
68 DEVSTACK_NETWORKING_SFC_PLUGIN_REPO: ${DEVSTACK_NETWORKING_SFC_PLUGIN_REPO}
69 ODL_ENABLE_L3_FWD: ${ODL_ENABLE_L3_FWD}
70 IPSEC_VXLAN_TUNNELS_ENABLED: ${IPSEC_VXLAN_TUNNELS_ENABLED}
71 PUBLIC_BRIDGE: ${PUBLIC_BRIDGE}
72 ENABLE_HAPROXY_FOR_NEUTRON: ${ENABLE_HAPROXY_FOR_NEUTRON}
73 ENABLE_OS_SERVICES: ${ENABLE_OS_SERVICES}
74 ENABLE_OS_COMPUTE_SERVICES: ${ENABLE_OS_COMPUTE_SERVICES}
75 ENABLE_OS_NETWORK_SERVICES: ${ENABLE_OS_NETWORK_SERVICES}
76 ENABLE_OS_PLUGINS: ${ENABLE_OS_PLUGINS}
77 DISABLE_OS_SERVICES: ${DISABLE_OS_SERVICES}
78 TENANT_NETWORK_TYPE: ${TENANT_NETWORK_TYPE}
79 SECURITY_GROUP_MODE: ${SECURITY_GROUP_MODE}
80 ENABLE_ITM_DIRECT_TUNNELS: ${ENABLE_ITM_DIRECT_TUNNELS}
81 PUBLIC_PHYSICAL_NETWORK: ${PUBLIC_PHYSICAL_NETWORK}
82 ENABLE_NETWORKING_L2GW: ${ENABLE_NETWORKING_L2GW}
83 CREATE_INITIAL_NETWORKS: ${CREATE_INITIAL_NETWORKS}
84 LBAAS_SERVICE_PROVIDER: ${LBAAS_SERVICE_PROVIDER}
85 NUM_OPENSTACK_SITES: ${NUM_OPENSTACK_SITES}
86 ODL_SFC_DRIVER: ${ODL_SFC_DRIVER}
87 ODL_SNAT_MODE: ${ODL_SNAT_MODE}
88
89 EOF
90 }
91
92 print_job_parameters
93
94 function create_etc_hosts() {
95     NODE_IP=$1
96     CTRL_IP=$2
97     : > ${WORKSPACE}/hosts_file
98     for iter in `seq 1 ${NUM_OPENSTACK_COMPUTE_NODES}`
99     do
100         COMPUTE_IP=OPENSTACK_COMPUTE_NODE_${iter}_IP
101         if [ "${!COMPUTE_IP}" == "${NODE_IP}" ]; then
102            CONTROL_HNAME=$(${SSH}  ${CTRL_IP}  "hostname")
103            echo "${CTRL_IP}   ${CONTROL_HNAME}" >> ${WORKSPACE}/hosts_file
104         else
105            COMPUTE_HNAME=$(${SSH}  ${!COMPUTE_IP}  "hostname")
106            echo "${!COMPUTE_IP}   ${COMPUTE_HNAME}" >> ${WORKSPACE}/hosts_file
107         fi
108     done
109
110     echo "Created the hosts file for ${NODE_IP}:"
111     cat ${WORKSPACE}/hosts_file
112 } # create_etc_hosts()
113
114 #function to install Openstack Clients for Testing
115 #This will pull the latest versions compatiable with the
116 # openstack release
117 function install_openstack_clients_in_robot_vm() {
118     packages=("python-novaclient" "python-neutronclient" "python-openstackclient")
119     local os_plugins
120     os_plugins=$(csv2ssv "${ENABLE_OS_PLUGINS}")
121     for plugin_name in $os_plugins; do
122         if [ "$plugin_name" == "networking-sfc" ]; then
123             packages+=("networking-sfc")
124         fi
125     done
126     openstack_version=$(echo ${OPENSTACK_BRANCH} | cut -d/ -f2)
127     #If the job tests "master", we will use the clients from previous released stable version to avoid failures
128     if [ "${openstack_version}" == "master" ]; then
129        openstack_version=${OPENSTACK_MASTER_CLIENTS_VERSION}
130     fi
131     for package in ${packages[*]}; do
132        echo "Get the current support version of the package ${package}"
133        wget https://raw.githubusercontent.com/openstack/requirements/stable/${openstack_version}/upper-constraints.txt -O /tmp/constraints.txt 2>/dev/null
134        echo "$PYTHON -m pip install --upgrade --no-deps ${package} --no-cache-dir -c /tmp/constraints.txt"
135        $PYTHON -m pip install --upgrade --no-deps ${package} --no-cache-dir -c /tmp/constraints.txt
136        echo "$PYTHON -m pip install ${package} --no-cache-dir -c /tmp/constraints.txt"
137        $PYTHON -m pip install ${package} --no-cache-dir -c /tmp/constraints.txt
138     done
139
140     if [ "${ENABLE_NETWORKING_L2GW}" == "yes" ]; then
141         #networking-l2gw is not officially available in any release yet. Gettting the latest stable version.
142         $PYTHON -m pip install networking-l2gw==11.0.0
143     fi
144 }
145
146 function is_openstack_feature_enabled() {
147     local feature=$1
148     for enabled_feature in $(csv2ssv ${ENABLE_OS_SERVICES})
149     do
150         if [ "${enabled_feature}" == "${feature}" ]; then
151            echo 1
152            return
153         fi
154     done
155     echo 0
156 }
157
158 function fix_libvirt_version_n_cpu_pike() {
159     local ip=$1
160     ${SSH} ${ip} "
161         cd /opt/stack;
162         git clone https://git.openstack.org/openstack/requirements;
163         cd requirements;
164         git checkout stable/pike;
165         sed -i s/libvirt-python===3.5.0/libvirt-python===4.2.0/ upper-constraints.txt
166    "
167 }
168
169 #Function to install rdo release
170 # This will help avoiding installing wrong version of packages which causes
171 # functionality failures
172 function install_rdo_release() {
173     local ip=$1
174     case ${OPENSTACK_BRANCH} in
175        *pike*)
176           ${SSH} ${ip} "sudo yum install -y https://repos.fedorapeople.org/repos/openstack/openstack-pike/rdo-release-pike-1.noarch.rpm"
177           ;;
178
179        *queens*)
180           ${SSH} ${ip} "sudo yum install -y https://repos.fedorapeople.org/repos/openstack/openstack-queens/rdo-release-queens-1.noarch.rpm"
181           ;;
182
183        master)
184           ${SSH} ${ip} "sudo yum install -y https://repos.fedorapeople.org/repos/openstack/openstack-queens/rdo-release-queens-1.noarch.rpm"
185           ;;
186     esac
187 }
188
189 # Involves just setting up the shared directory
190 function setup_live_migration_control() {
191     local control_ip=$1
192     printf "${control_ip}:Setup directory Share with NFS"
193     cat > ${WORKSPACE}/setup_live_migration_control.sh << EOF
194 sudo mkdir --mode=777 /vm_instances
195 sudo chown -R jenkins:jenkins /vm_instances
196 sudo yum install -y nfs-utils
197 printf "/vm_instances *(rw,no_root_squash)" | sudo tee -a /etc/exports
198 sudo systemctl start rpcbind nfs-server
199 sudo exportfs
200 EOF
201     scp ${WORKSPACE}/setup_live_migration_control.sh ${control_ip}:/tmp/setup_live_migration_control.sh
202     ssh ${control_ip} "bash /tmp/setup_live_migration_control.sh"
203 }
204
205 # Involves mounting the share and configuring the libvirtd
206 function setup_live_migration_compute() {
207     local compute_ip=$1
208     local control_ip=$2
209     printf "${compute_ip}:Mount Shared directory from ${control_ip}"
210     printf "${compute_ip}:Configure libvirt in listen mode"
211     cat >  ${WORKSPACE}/setup_live_migration_compute.sh << EOF
212 sudo yum install -y libvirt libvirt-devel nfs-utils
213 sudo crudini --verbose  --set --inplace /etc/libvirt/libvirtd.conf '' listen_tls 0
214 sudo crudini --verbose  --set --inplace /etc/libvirt/libvirtd.conf '' listen_tcp 1
215 sudo crudini --verbose  --set --inplace /etc/libvirt/libvirtd.conf '' auth_tcp '"none"'
216 sudo crudini --verbose  --set --inplace /etc/sysconfig/libvirtd '' LIBVIRTD_ARGS '"--listen"'
217 sudo mkdir --mode=777 -p /var/instances
218 sudo chown -R jenkins:jenkins /var/instances
219 sudo chmod o+x /var/instances
220 sudo systemctl start rpcbind
221 sudo mount -t nfs ${control_ip}:/vm_instances /var/instances
222 sudo mount
223 EOF
224     scp ${WORKSPACE}/setup_live_migration_compute.sh ${compute_ip}:/tmp/setup_live_migration_compute.sh
225     ssh ${compute_ip} "bash /tmp/setup_live_migration_compute.sh"
226 }
227
228 # Add enable_services and disable_services to the local.conf
229 function add_os_services() {
230     local core_services=$1
231     local enable_services=$2
232     local disable_services=$3
233     local local_conf_file_name=$4
234     local enable_network_services=$5
235
236     cat >> ${local_conf_file_name} << EOF
237 enable_service $(csv2ssv "${core_services}")
238 EOF
239     if [ -n "${enable_services}" ]; then
240         cat >> ${local_conf_file_name} << EOF
241 enable_service $(csv2ssv "${enable_services}")
242 EOF
243     fi
244     if [ -n "${disable_services}" ]; then
245         cat >> ${local_conf_file_name} << EOF
246 disable_service $(csv2ssv "${disable_services}")
247 EOF
248     fi
249     if [ -n "${enable_network_services}" ]; then
250         cat >> ${local_conf_file_name} << EOF
251 enable_service $(csv2ssv "${enable_network_services}")
252 EOF
253     fi
254 }
255
256 function create_control_node_local_conf() {
257     HOSTIP=$1
258     MGRIP=$2
259     ODL_OVS_MANAGERS="$3"
260
261     local_conf_file_name=${WORKSPACE}/local.conf_control_${HOSTIP}
262     cat > ${local_conf_file_name} << EOF
263 [[local|localrc]]
264 LOGFILE=stack.sh.log
265 LOG_COLOR=False
266 USE_SYSTEMD=True
267 RECLONE=${RECLONE}
268 # Increase the wait used by stack to poll for services
269 SERVICE_TIMEOUT=120
270
271 disable_all_services
272 EOF
273
274     add_os_services "${CORE_OS_CONTROL_SERVICES}" "${ENABLE_OS_SERVICES}" "${DISABLE_OS_SERVICES}" "${local_conf_file_name}" "${ENABLE_OS_NETWORK_SERVICES}"
275
276     cat >> ${local_conf_file_name} << EOF
277
278 HOST_IP=${HOSTIP}
279 SERVICE_HOST=\$HOST_IP
280 Q_ML2_TENANT_NETWORK_TYPE=${TENANT_NETWORK_TYPE}
281 NEUTRON_CREATE_INITIAL_NETWORKS=${CREATE_INITIAL_NETWORKS}
282
283 ODL_MODE=manual
284 ODL_MGR_IP=${MGRIP}
285 ODL_PORT=${ODL_PORT}
286 ODL_PORT_BINDING_CONTROLLER=${ODL_ML2_PORT_BINDING}
287 ODL_OVS_MANAGERS=${ODL_OVS_MANAGERS}
288
289 MYSQL_HOST=\$SERVICE_HOST
290 RABBIT_HOST=\$SERVICE_HOST
291 GLANCE_HOSTPORT=\$SERVICE_HOST:9292
292 KEYSTONE_AUTH_HOST=\$SERVICE_HOST
293 KEYSTONE_SERVICE_HOST=\$SERVICE_HOST
294
295 ADMIN_PASSWORD=${ADMIN_PASSWORD}
296 DATABASE_PASSWORD=${ADMIN_PASSWORD}
297 RABBIT_PASSWORD=${ADMIN_PASSWORD}
298 SERVICE_TOKEN=${ADMIN_PASSWORD}
299 SERVICE_PASSWORD=${ADMIN_PASSWORD}
300
301 NEUTRON_LBAAS_SERVICE_PROVIDERV2=${LBAAS_SERVICE_PROVIDER} # Only relevant if neutron-lbaas plugin is enabled
302 NEUTRON_SFC_DRIVERS=${ODL_SFC_DRIVER} # Only relevant if networking-sfc plugin is enabled
303 NEUTRON_FLOWCLASSIFIER_DRIVERS=${ODL_SFC_DRIVER} # Only relevant if networking-sfc plugin is enabled
304 ETCD_PORT=2379
305 EOF
306     if [ "${TENANT_NETWORK_TYPE}" == "local" ]; then
307         cat >> ${local_conf_file_name} << EOF
308 ENABLE_TENANT_TUNNELS=false
309 EOF
310     fi
311
312     if [ "${ODL_ML2_DRIVER_VERSION}" == "v2" ]; then
313         echo "ODL_V2DRIVER=True" >> ${local_conf_file_name}
314     fi
315     IFS=,
316     for plugin_name in ${ENABLE_OS_PLUGINS}; do
317         if [ "$plugin_name" == "networking-odl" ]; then
318             ENABLE_PLUGIN_ARGS="${ODL_ML2_DRIVER_REPO} ${ODL_ML2_BRANCH}"
319         elif [ "$plugin_name" == "kuryr-kubernetes" ]; then
320             ENABLE_PLUGIN_ARGS="${DEVSTACK_KUBERNETES_PLUGIN_REPO} master" # note: kuryr-kubernetes only exists in master at the moment
321         elif [ "$plugin_name" == "neutron-lbaas" ]; then
322             ENABLE_PLUGIN_ARGS="${DEVSTACK_LBAAS_PLUGIN_REPO} ${OPENSTACK_BRANCH}"
323             IS_LBAAS_PLUGIN_ENABLED="yes"
324         elif [ "$plugin_name" == "networking-sfc" ]; then
325             ENABLE_PLUGIN_ARGS="${DEVSTACK_NETWORKING_SFC_PLUGIN_REPO} master"
326             IS_SFC_PLUGIN_ENABLED="yes"
327         else
328             echo "Error: Invalid plugin $plugin_name, unsupported"
329             continue
330         fi
331         cat >> ${local_conf_file_name} << EOF
332
333 enable_plugin ${plugin_name} ${ENABLE_PLUGIN_ARGS}
334 EOF
335     done
336     unset IFS
337
338     if [ "${ENABLE_NETWORKING_L2GW}" == "yes" ]; then
339         cat >> ${local_conf_file_name} << EOF
340
341 enable_plugin networking-l2gw ${NETWORKING_L2GW_DRIVER} ${ODL_ML2_BRANCH}
342 NETWORKING_L2GW_SERVICE_DRIVER=L2GW:OpenDaylight:networking_odl.l2gateway.driver_v2.OpenDaylightL2gwDriver:default
343 EOF
344     fi
345
346     if [ "${ODL_ENABLE_L3_FWD}" == "yes" ]; then
347         cat >> ${local_conf_file_name} << EOF
348
349 PUBLIC_BRIDGE=${PUBLIC_BRIDGE}
350 PUBLIC_PHYSICAL_NETWORK=${PUBLIC_PHYSICAL_NETWORK}
351 ML2_VLAN_RANGES=${PUBLIC_PHYSICAL_NETWORK}
352 ODL_PROVIDER_MAPPINGS=${ODL_PROVIDER_MAPPINGS}
353 EOF
354
355         if [ "${ODL_ML2_DRIVER_VERSION}" == "v2" ]; then
356            SERVICE_PLUGINS="odl-router_v2"
357         else
358            SERVICE_PLUGINS="odl-router"
359         fi
360         if [ "${ENABLE_NETWORKING_L2GW}" == "yes" ]; then
361             SERVICE_PLUGINS+=", networking_l2gw.services.l2gateway.plugin.L2GatewayPlugin"
362         fi
363         if [ "${IS_LBAAS_PLUGIN_ENABLED}" == "yes" ]; then
364             SERVICE_PLUGINS+=", lbaasv2"
365         fi
366         if [ "${IS_SFC_PLUGIN_ENABLED}" == "yes" ]; then
367             SERVICE_PLUGINS+=", networking_sfc.services.flowclassifier.plugin.FlowClassifierPlugin,networking_sfc.services.sfc.plugin.SfcPlugin"
368         fi
369     fi #check for ODL_ENABLE_L3_FWD
370
371     cat >> ${local_conf_file_name} << EOF
372
373 [[post-config|\$NEUTRON_CONF]]
374 [DEFAULT]
375 service_plugins = ${SERVICE_PLUGINS}
376 log_dir = /opt/stack/logs
377
378 [[post-config|/etc/neutron/plugins/ml2/ml2_conf.ini]]
379 [agent]
380 minimize_polling=True
381
382 [ml2]
383 # Needed for VLAN provider tests - because our provider networks are always encapsulated in VXLAN (br-physnet1)
384 # MTU(1400) + VXLAN(50) + VLAN(4) = 1454 < MTU eth0/br-physnet1(1458)
385 physical_network_mtus = ${PUBLIC_PHYSICAL_NETWORK}:1400
386 path_mtu = 1458
387
388 [[post-config|/etc/neutron/dhcp_agent.ini]]
389 [DEFAULT]
390 force_metadata = True
391 enable_isolated_metadata = True
392 log_dir = /opt/stack/logs
393
394 [[post-config|/etc/nova/nova.conf]]
395 [DEFAULT]
396 force_config_drive = False
397 force_raw_images = False
398 log_dir = /opt/stack/logs
399
400 [scheduler]
401 discover_hosts_in_cells_interval = 30
402 EOF
403
404     echo "Control local.conf created:"
405     cat ${local_conf_file_name}
406 } # create_control_node_local_conf()
407
408 function create_compute_node_local_conf() {
409     HOSTIP=$1
410     SERVICEHOST=$2
411     MGRIP=$3
412     ODL_OVS_MANAGERS="$4"
413
414     local_conf_file_name=${WORKSPACE}/local.conf_compute_${HOSTIP}
415     cat > ${local_conf_file_name} << EOF
416 [[local|localrc]]
417 LOGFILE=stack.sh.log
418 LOG_COLOR=False
419 USE_SYSTEMD=True
420 RECLONE=${RECLONE}
421 # Increase the wait used by stack to poll for the nova service on the control node
422 NOVA_READY_TIMEOUT=1800
423
424 disable_all_services
425 EOF
426
427     add_os_services "${CORE_OS_COMPUTE_SERVICES}" "${ENABLE_OS_COMPUTE_SERVICES}" "${DISABLE_OS_SERVICES}" "${local_conf_file_name}"
428
429     cat >> ${local_conf_file_name} << EOF
430 HOST_IP=${HOSTIP}
431 SERVICE_HOST=${SERVICEHOST}
432 Q_ML2_TENANT_NETWORK_TYPE=${TENANT_NETWORK_TYPE}
433
434 ODL_MODE=manual
435 ODL_MGR_IP=${MGRIP}
436 ODL_PORT=${ODL_PORT}
437 ODL_PORT_BINDING_CONTROLLER=${ODL_ML2_PORT_BINDING}
438 ODL_OVS_MANAGERS=${ODL_OVS_MANAGERS}
439
440 Q_HOST=\$SERVICE_HOST
441 MYSQL_HOST=\$SERVICE_HOST
442 RABBIT_HOST=\$SERVICE_HOST
443 GLANCE_HOSTPORT=\$SERVICE_HOST:9292
444 KEYSTONE_AUTH_HOST=\$SERVICE_HOST
445 KEYSTONE_SERVICE_HOST=\$SERVICE_HOST
446
447 ADMIN_PASSWORD=${ADMIN_PASSWORD}
448 DATABASE_PASSWORD=${ADMIN_PASSWORD}
449 RABBIT_PASSWORD=${ADMIN_PASSWORD}
450 SERVICE_TOKEN=${ADMIN_PASSWORD}
451 SERVICE_PASSWORD=${ADMIN_PASSWORD}
452 EOF
453
454     if [[ "${ENABLE_OS_PLUGINS}" =~ networking-odl ]]; then
455         cat >> ${local_conf_file_name} << EOF
456
457 enable_plugin networking-odl ${ODL_ML2_DRIVER_REPO} ${ODL_ML2_BRANCH}
458 EOF
459     fi
460
461     if [ "${ODL_ENABLE_L3_FWD}" == "yes" ]; then
462         cat >> ${local_conf_file_name} << EOF
463
464 PUBLIC_BRIDGE=${PUBLIC_BRIDGE}
465 PUBLIC_PHYSICAL_NETWORK=${PUBLIC_PHYSICAL_NETWORK}
466 ODL_PROVIDER_MAPPINGS=${ODL_PROVIDER_MAPPINGS}
467 Q_L3_ENABLED=True
468 ODL_L3=${ODL_L3}
469 EOF
470     fi
471
472     cat >> ${local_conf_file_name} << EOF
473
474 [[post-config|/etc/nova/nova.conf]]
475 [api]
476 auth_strategy = keystone
477 [DEFAULT]
478 use_neutron = True
479 force_raw_images = False
480 log_dir = /opt/stack/logs
481 [libvirt]
482 live_migration_uri = qemu+tcp://%s/system
483 virt_type = qemu
484 EOF
485
486     echo "Compute local.conf created:"
487     cat ${local_conf_file_name}
488 } # create_compute_node_local_conf()
489
490 function configure_haproxy_for_neutron_requests() {
491     MGRIP=$1
492     # shellcheck disable=SC2206
493     ODL_IPS=(${2//,/ })
494
495     cat > ${WORKSPACE}/install_ha_proxy.sh<< EOF
496 sudo systemctl stop firewalld
497 sudo yum -y install policycoreutils-python haproxy
498 EOF
499
500 cat > ${WORKSPACE}/haproxy.cfg << EOF
501 global
502   daemon
503   group  haproxy
504   log  /dev/log local0
505   maxconn  20480
506   pidfile  /tmp/haproxy.pid
507   user  haproxy
508
509 defaults
510   log  global
511   maxconn  4096
512   mode  tcp
513   retries  3
514   timeout  http-request 10s
515   timeout  queue 1m
516   timeout  connect 10s
517   timeout  client 1m
518   timeout  server 1m
519   timeout  check 10s
520
521 listen opendaylight
522   bind ${MGRIP}:8080
523   balance source
524
525 listen opendaylight_rest
526   bind ${MGRIP}:8181
527   balance source
528
529 listen opendaylight_websocket
530   bind ${MGRIP}:8185
531   balance source
532
533 EOF
534
535     odlindex=1
536     for odlip in ${ODL_IPS[*]}; do
537         sed -i "/listen opendaylight$/a server controller-${odlindex} ${odlip}:8080 check fall 5 inter 2000 rise 2" ${WORKSPACE}/haproxy.cfg
538         sed -i "/listen opendaylight_rest$/a server controller-rest-${odlindex} ${odlip}:8181 check fall 5 inter 2000 rise 2" ${WORKSPACE}/haproxy.cfg
539         sed -i "/listen opendaylight_websocket$/a server controller-websocket-${odlindex} ${odlip}:8185 check fall 5 inter 2000 rise 2" ${WORKSPACE}/haproxy.cfg
540         odlindex=$((odlindex+1))
541     done
542
543
544     echo "Dump haproxy.cfg"
545     cat ${WORKSPACE}/haproxy.cfg
546
547     cat > ${WORKSPACE}/deploy_ha_proxy.sh<< EOF
548 sudo chown haproxy:haproxy /tmp/haproxy.cfg
549 sudo sed -i 's/\\/etc\\/haproxy\\/haproxy.cfg/\\/tmp\\/haproxy.cfg/g' /usr/lib/systemd/system/haproxy.service
550 sudo /usr/sbin/semanage permissive -a haproxy_t
551 sudo systemctl restart haproxy
552 sleep 3
553 sudo netstat -tunpl
554 sudo systemctl status haproxy
555 true
556 EOF
557
558     scp ${WORKSPACE}/install_ha_proxy.sh ${MGRIP}:/tmp
559     ${SSH} ${MGRIP} "sudo bash /tmp/install_ha_proxy.sh"
560     scp ${WORKSPACE}/haproxy.cfg ${MGRIP}:/tmp
561     scp ${WORKSPACE}/deploy_ha_proxy.sh ${MGRIP}:/tmp
562     ${SSH} ${MGRIP} "sudo bash /tmp/deploy_ha_proxy.sh"
563 } # configure_haproxy_for_neutron_requests()
564
565 # Following three functions are debugging helpers when debugging devstack changes.
566 # Keeping them for now so we can simply call them when needed.
567 ctrlhn=""
568 comp1hn=""
569 comp2hn=""
570 function get_hostnames () {
571     set +e
572     local ctrlip=${OPENSTACK_CONTROL_NODE_1_IP}
573     local comp1ip=${OPENSTACK_COMPUTE_NODE_1_IP}
574     local comp2ip=${OPENSTACK_COMPUTE_NODE_2_IP}
575     ctrlhn=$(${SSH} ${ctrlip} "hostname")
576     comp1hn=$(${SSH} ${comp1ip} "hostname")
577     comp2hn=$(${SSH} ${comp2ip} "hostname")
578     echo "hostnames: ${ctrlhn}, ${comp1hn}, ${comp2hn}"
579     set -e
580 }
581
582 function check_firewall() {
583     set +e
584     echo $-
585     local ctrlip=${OPENSTACK_CONTROL_NODE_1_IP}
586     local comp1ip=${OPENSTACK_COMPUTE_NODE_1_IP}
587     local comp2ip=${OPENSTACK_COMPUTE_NODE_2_IP}
588
589     echo "check_firewall on control"
590     ${SSH} ${ctrlip} "
591         sudo systemctl status firewalld
592         sudo systemctl -l status iptables
593         sudo iptables --line-numbers -nvL
594     " || true
595     echo "check_firewall on compute 1"
596     ${SSH} ${comp1ip} "
597         sudo systemctl status firewalld
598         sudo systemctl -l status iptables
599         sudo iptables --line-numbers -nvL
600     " || true
601     echo "check_firewall on compute 2"
602     ${SSH} ${comp2ip} "
603         sudo systemctl status firewalld
604         sudo systemctl -l status iptables
605         sudo iptables --line-numbers -nvL
606     " || true
607 }
608
609 function get_service () {
610     set +e
611     local iter=$1
612     #local idx=$2
613     local ctrlip=${OPENSTACK_CONTROL_NODE_1_IP}
614     local comp1ip=${OPENSTACK_COMPUTE_NODE_1_IP}
615
616     #if [ ${idx} -eq 1 ]; then
617         if [ ${iter} -eq 1 ] || [ ${iter} -gt 16 ]; then
618             curl http://${ctrlip}:5000
619             curl http://${ctrlip}:35357
620             curl http://${ctrlip}/identity
621             ${SSH} ${ctrlip} "
622                 source /opt/stack/devstack/openrc admin admin;
623                 env
624                 openstack configuration show --unmask;
625                 openstack service list
626                 openstack --os-cloud devstack-admin --os-region RegionOne compute service list
627                 openstack hypervisor list;
628             " || true
629             check_firewall
630         fi
631     #fi
632     set -e
633 }
634
635 # Check if rabbitmq is ready by looking for a pid in it's status.
636 # The function returns the status of the grep command which callers can check.
637 function is_rabbitmq_ready() {
638     local -r ip=${1}
639     local grepfor="nova_cell1"
640     rm -f rabbit.txt
641     ${SSH} ${ip} "sudo rabbitmqctl list_vhosts" > rabbit.txt
642     grep ${grepfor} rabbit.txt
643 }
644
645 # retry the given command ($3) until success for a number of iterations ($1)
646 # sleeping ($2) between tries.
647 function retry() {
648     local -r -i max_tries=${1}
649     local -r -i sleep_time=${2}
650     local -r cmd=${3}
651     local -i retries=1
652     local -i rc=1
653     while true; do
654         echo "retry ${cmd}: attempt: ${retries}"
655         ${cmd}
656         rc=$?
657         if ((${rc} == 0)); then
658             break;
659         else
660             if ((${retries} == ${max_tries})); then
661                 break
662             else
663                 ((retries++))
664                 sleep ${sleep_time}
665             fi
666         fi
667     done
668     return ${rc}
669 }
670
671 # if we are using the new netvirt impl, as determined by the feature name
672 # odl-netvirt-openstack (note: old impl is odl-ovsdb-openstack) then we
673 # want PROVIDER_MAPPINGS to be used -- this should be fixed if we want to support
674 # external networks in legacy netvirt
675 if [[ ${CONTROLLERFEATURES} == *"odl-netvirt-openstack"* ]]; then
676   ODL_PROVIDER_MAPPINGS="\${PUBLIC_PHYSICAL_NETWORK}:${PUBLIC_BRIDGE}"
677 else
678   ODL_PROVIDER_MAPPINGS=
679 fi
680
681 # if we are using the old netvirt impl, as determined by the feature name
682 # odl-ovsdb-openstack (note: new impl is odl-netvirt-openstack) then we
683 # want ODL_L3 to be True.  New impl wants it False
684 if [[ ${CONTROLLERFEATURES} == *"odl-ovsdb-openstack"* ]]; then
685     ODL_L3=True
686 else
687     ODL_L3=False
688 fi
689
690 RECLONE=False
691 ODL_PORT=8181
692
693 # Always compare the lists below against the devstack upstream ENABLED_SERVICES in
694 # https://github.com/openstack-dev/devstack/blob/master/stackrc#L52
695 # ODL CSIT does not use vnc, cinder, q-agt, q-l3 or horizon so they are not included below.
696 # collect performance stats
697 CORE_OS_CONTROL_SERVICES="dstat"
698 # Glance
699 CORE_OS_CONTROL_SERVICES+=",g-api,g-reg"
700 # Keystone
701 CORE_OS_CONTROL_SERVICES+=",key"
702 # Nova - services to support libvirt
703 CORE_OS_CONTROL_SERVICES+=",n-api,n-api-meta,n-cauth,n-cond,n-crt,n-obj,n-sch"
704 # ODL - services to connect to ODL
705 CORE_OS_CONTROL_SERVICES+=",odl-compute,odl-neutron"
706 # Additional services
707 CORE_OS_CONTROL_SERVICES+=",mysql,rabbit"
708
709 # collect performance stats
710 CORE_OS_COMPUTE_SERVICES="dstat"
711 # computes only need nova and odl
712 CORE_OS_COMPUTE_SERVICES+=",n-cpu,odl-compute"
713
714 cat > ${WORKSPACE}/disable_firewall.sh << EOF
715 sudo systemctl stop firewalld
716 # Open these ports to match the tutorial vms
717 # http/https (80/443), samba (445), netbios (137,138,139)
718 sudo iptables -I INPUT -p tcp -m multiport --dports 80,443,139,445 -j ACCEPT
719 sudo iptables -I INPUT -p udp -m multiport --dports 137,138 -j ACCEPT
720 # OpenStack services as well as vxlan tunnel ports 4789 and 9876
721 # identity public/admin (5000/35357), ampq (5672), vnc (6080), nova (8774), glance (9292), neutron (9696)
722 sudo sudo iptables -I INPUT -p tcp -m multiport --dports 5000,5672,6080,8774,9292,9696,35357 -j ACCEPT
723 sudo sudo iptables -I INPUT -p udp -m multiport --dports 4789,9876 -j ACCEPT
724 sudo iptables-save > /etc/sysconfig/iptables
725 sudo systemctl restart iptables
726 sudo iptables --line-numbers -nvL
727 true
728 EOF
729
730 cat > ${WORKSPACE}/get_devstack.sh << EOF
731 sudo systemctl stop firewalld
732 sudo yum install bridge-utils python-pip -y
733 #sudo systemctl stop  NetworkManager
734 #Disable NetworkManager and kill dhclient and dnsmasq
735 sudo systemctl stop NetworkManager
736 sudo killall dhclient
737 sudo killall dnsmasq
738 #Workaround for mysql failure
739 echo "127.0.0.1   localhost \${HOSTNAME}" >> /tmp/hosts
740 echo "::1         localhost \${HOSTNAME}" >> /tmp/hosts
741 sudo mv /tmp/hosts /etc/hosts
742 sudo mkdir /opt/stack
743 echo "Create RAM disk for /opt/stack"
744 sudo mount -t tmpfs -o size=2G tmpfs /opt/stack
745 sudo chmod 777 /opt/stack
746 cd /opt/stack
747 echo "git clone https://git.openstack.org/openstack-dev/devstack --branch ${OPENSTACK_BRANCH}"
748 git clone https://git.openstack.org/openstack-dev/devstack --branch ${OPENSTACK_BRANCH}
749 cd devstack
750 if [ -n "${DEVSTACK_HASH}" ]; then
751     echo "git checkout ${DEVSTACK_HASH}"
752     git checkout ${DEVSTACK_HASH}
753 fi
754 git --no-pager log --pretty=format:'%h %<(13)%ar%<(13)%cr %<(20,trunc)%an%d %s%b' -n20
755 echo
756
757 echo "workaround: do not upgrade openvswitch"
758 sudo yum install -y yum-plugin-versionlock
759 sudo yum versionlock add openvswitch
760
761 #Install qemu-img command in Control Node for Pike
762 echo "Install qemu-img application"
763 sudo yum install -y qemu-img
764 EOF
765
766 cat > "${WORKSPACE}/setup_host_cell_mapping.sh" << EOF
767 sudo nova-manage cell_v2 map_cell0
768 sudo nova-manage cell_v2 simple_cell_setup
769 sudo nova-manage db sync
770 sudo nova-manage cell_v2 discover_hosts
771 EOF
772
773 NUM_OPENSTACK_SITES=${NUM_OPENSTACK_SITES:-1}
774 compute_index=1
775 odl_index=1
776 os_node_list=()
777 os_interval=$(( ${NUM_OPENSTACK_SYSTEM} / ${NUM_OPENSTACK_SITES} ))
778 ha_proxy_index=${os_interval}
779
780 for i in `seq 1 ${NUM_OPENSTACK_SITES}`; do
781     if [ "${ENABLE_HAPROXY_FOR_NEUTRON}" == "yes" ]; then
782         echo "Configure HAProxy"
783         ODL_HAPROXYIP_PARAM=OPENSTACK_HAPROXY_${i}_IP
784         ha_proxy_index=$(( $ha_proxy_index + $os_interval ))
785         odl_index=$(((i - 1) * 3 + 1))
786         ODL_IP_PARAM1=ODL_SYSTEM_$((odl_index++))_IP
787         ODL_IP_PARAM2=ODL_SYSTEM_$((odl_index++))_IP
788         ODL_IP_PARAM3=ODL_SYSTEM_$((odl_index++))_IP
789         ODLMGRIP[$i]=${!ODL_HAPROXYIP_PARAM} # ODL Northbound uses HAProxy VIP
790         ODL_OVS_MGRS[$i]="${!ODL_IP_PARAM1},${!ODL_IP_PARAM2},${!ODL_IP_PARAM3}" # OVSDB connects to all ODL IPs
791         configure_haproxy_for_neutron_requests ${!ODL_HAPROXYIP_PARAM} "${ODL_OVS_MGRS[$i]}"
792     else
793         ODL_IP_PARAM=ODL_SYSTEM_${i}_IP
794         ODL_OVS_MGRS[$i]="${!ODL_IP_PARAM}" # ODL Northbound uses ODL IP
795         ODLMGRIP[$i]=${!ODL_IP_PARAM} # OVSDB connects to ODL IP
796     fi
797 done
798
799 # Begin stacking the nodes, starting with the controller(s) and then the compute(s)
800
801 for i in `seq 1 ${NUM_OPENSTACK_CONTROL_NODES}`; do
802     CONTROLIP=OPENSTACK_CONTROL_NODE_${i}_IP
803     echo "Configure the stack of the control node ${i} of ${NUM_OPENSTACK_CONTROL_NODES}: ${!CONTROLIP}"
804     scp ${WORKSPACE}/disable_firewall.sh ${!CONTROLIP}:/tmp
805     ${SSH} ${!CONTROLIP} "sudo bash /tmp/disable_firewall.sh"
806     create_etc_hosts ${!CONTROLIP}
807     scp ${WORKSPACE}/hosts_file ${!CONTROLIP}:/tmp/hosts
808     scp ${WORKSPACE}/get_devstack.sh ${!CONTROLIP}:/tmp
809     # devstack Master is yet to migrate fully to lib/neutron, there are some ugly hacks that is
810     # affecting the stacking.
811     #Workaround For Queens, Make the physical Network as physnet1 in lib/neutron
812     #Workaround Comment out creating initial Networks in lib/neutron
813     ${SSH} ${!CONTROLIP} "bash /tmp/get_devstack.sh > /tmp/get_devstack.sh.txt 2>&1"
814     if [ "${ODL_ML2_BRANCH}" == "stable/queens" ]; then
815        ssh ${!CONTROLIP} "sed -i 's/flat_networks public/flat_networks public,physnet1/' /opt/stack/devstack/lib/neutron"
816        ssh ${!CONTROLIP} "sed -i '186i iniset \$NEUTRON_CORE_PLUGIN_CONF ml2_type_vlan network_vlan_ranges public:1:4094,physnet1:1:4094' /opt/stack/devstack/lib/neutron"
817     fi
818     create_control_node_local_conf ${!CONTROLIP} ${ODLMGRIP[$i]} "${ODL_OVS_MGRS[$i]}"
819     scp ${WORKSPACE}/local.conf_control_${!CONTROLIP} ${!CONTROLIP}:/opt/stack/devstack/local.conf
820     echo "Install rdo release to avoid incompatible Package versions"
821     install_rdo_release ${!CONTROLIP}
822     setup_live_migration_control ${!CONTROLIP}
823     echo "Stack the control node ${i} of ${NUM_OPENSTACK_CONTROL_NODES}: ${CONTROLIP}"
824     ssh ${!CONTROLIP} "cd /opt/stack/devstack; nohup ./stack.sh > /opt/stack/devstack/nohup.out 2>&1 &"
825     ssh ${!CONTROLIP} "ps -ef | grep stack.sh"
826     ssh ${!CONTROLIP} "ls -lrt /opt/stack/devstack/nohup.out"
827     os_node_list+=("${!CONTROLIP}")
828 done
829
830 # This is a backup to the CELLSV2_SETUP=singleconductor workaround. Keeping it here as an easy lookup
831 # if needed.
832 # Let the control node get started to avoid a race condition where the computes start and try to access
833 # the nova_cell1 on the control node before it is created. If that happens, the nova-compute service on the
834 # compute exits and does not attempt to restart.
835 # 180s is chosen because in test runs the control node usually finished in 17-20 minutes and the computes finished
836 # in 17 minutes, so take the max difference of 3 minutes and the jobs should still finish around the same time.
837 # one of the following errors is seen in the compute n-cpu.log:
838 # Unhandled error: NotAllowed: Connection.open: (530) NOT_ALLOWED - access to vhost 'nova_cell1' refused for user 'stackrabbit'
839 # AccessRefused: (0, 0): (403) ACCESS_REFUSED - Login was refused using authentication mechanism AMQPLAIN. For details see the broker logfile.
840 # Compare that timestamp to this log in the control stack.log: sudo rabbitmqctl set_permissions -p nova_cell1 stackrabbit
841 # If the n-cpu.log is earlier than the control stack.log timestamp then the failure condition is likely hit.
842 if [ ${NUM_OPENSTACK_COMPUTE_NODES} -gt 0 ]; then
843     WAIT_FOR_RABBITMQ_MINUTES=60
844     echo "Wait a maximum of ${WAIT_FOR_RABBITMQ_MINUTES}m until rabbitmq is ready and nova_cell1 created to allow the controller to create nova_cell1 before the computes need it"
845     set +e
846     retry ${WAIT_FOR_RABBITMQ_MINUTES} 60 "is_rabbitmq_ready ${OPENSTACK_CONTROL_NODE_1_IP}"
847     rc=$?
848     set -e
849     if ((${rc} == 0)); then
850       echo "rabbitmq is ready, starting ${NUM_OPENSTACK_COMPUTE_NODES} compute(s)"
851     else
852       echo "rabbitmq was not ready in ${WAIT_FOR_RABBITMQ_MINUTES}m"
853       exit 1
854     fi
855 fi
856
857 for i in `seq 1 ${NUM_OPENSTACK_COMPUTE_NODES}`; do
858     NUM_COMPUTES_PER_SITE=$((NUM_OPENSTACK_COMPUTE_NODES / NUM_OPENSTACK_SITES))
859     SITE_INDEX=$((((i - 1) / NUM_COMPUTES_PER_SITE) + 1)) # We need the site index to infer the control node IP for this compute
860     COMPUTEIP=OPENSTACK_COMPUTE_NODE_${i}_IP
861     CONTROLIP=OPENSTACK_CONTROL_NODE_${SITE_INDEX}_IP
862     echo "Configure the stack of the compute node ${i} of ${NUM_OPENSTACK_COMPUTE_NODES}: ${!COMPUTEIP}"
863     scp ${WORKSPACE}/disable_firewall.sh "${!COMPUTEIP}:/tmp"
864     ${SSH} "${!COMPUTEIP}" "sudo bash /tmp/disable_firewall.sh"
865     create_etc_hosts ${!COMPUTEIP} ${!CONTROLIP}
866     scp ${WORKSPACE}/hosts_file ${!COMPUTEIP}:/tmp/hosts
867     scp ${WORKSPACE}/get_devstack.sh  ${!COMPUTEIP}:/tmp
868     ${SSH} ${!COMPUTEIP} "bash /tmp/get_devstack.sh > /tmp/get_devstack.sh.txt 2>&1"
869     if [ "${ODL_ML2_BRANCH}" == "stable/pike" ]; then
870         echo "Updating requirements for ${ODL_ML2_BRANCH}"
871         echo "Workaround for libvirt-python failing installation"
872         echo "Modify upper-constraints to use libvirt-python 4.2.0"
873         fix_libvirt_version_n_cpu_pike ${!COMPUTEIP}
874     fi
875     create_compute_node_local_conf ${!COMPUTEIP} ${!CONTROLIP} ${ODLMGRIP[$SITE_INDEX]} "${ODL_OVS_MGRS[$SITE_INDEX]}"
876     scp ${WORKSPACE}/local.conf_compute_${!COMPUTEIP} ${!COMPUTEIP}:/opt/stack/devstack/local.conf
877     echo "Install rdo release to avoid incompatible Package versions"
878     install_rdo_release ${!COMPUTEIP}
879     setup_live_migration_compute ${!COMPUTEIP} ${!CONTROLIP}
880     echo "Stack the compute node ${i} of ${NUM_OPENSTACK_COMPUTE_NODES}: ${COMPUTEIP}"
881     ssh ${!COMPUTEIP} "cd /opt/stack/devstack; nohup ./stack.sh > /opt/stack/devstack/nohup.out 2>&1 &"
882     ssh ${!COMPUTEIP} "ps -ef | grep stack.sh"
883     os_node_list+=("${!COMPUTEIP}")
884 done
885
886 echo "nodelist: ${os_node_list[*]}"
887
888 # This script runs on the openstack nodes. It greps for a string that devstack writes when stacking is complete.
889 # The script then writes a status depending on the grep output that is later scraped by the robot vm to control
890 # the status polling.
891 cat > ${WORKSPACE}/check_stacking.sh << EOF
892 > /tmp/stack_progress
893 ps -ef | grep "stack.sh" | grep -v grep
894 ret=\$?
895 if [ \${ret} -eq 1 ]; then
896     grep "This is your host IP address:" /opt/stack/devstack/nohup.out
897     if [ \$? -eq 0 ]; then
898         echo "Stacking Complete" > /tmp/stack_progress
899     else
900         echo "Stacking Failed" > /tmp/stack_progress
901     fi
902 elif [ \${ret} -eq 0 ]; then
903     echo "Still Stacking" > /tmp/stack_progress
904 fi
905 EOF
906
907 # devstack debugging
908 # get_hostnames
909
910 # Check if the stacking is finished. Poll all nodes every 60s for one hour.
911 iteration=0
912 in_progress=1
913 while [ ${in_progress} -eq 1 ]; do
914     iteration=$(($iteration + 1))
915     for index in "${!os_node_list[@]}"; do
916         echo "node $index ${os_node_list[index]}: checking stacking status attempt ${iteration} of 60"
917         scp ${WORKSPACE}/check_stacking.sh  ${os_node_list[index]}:/tmp
918         ${SSH} ${os_node_list[index]} "bash /tmp/check_stacking.sh"
919         scp ${os_node_list[index]}:/tmp/stack_progress .
920         cat stack_progress
921         stacking_status=`cat stack_progress`
922         # devstack debugging
923         # get_service "${iteration}" "${index}"
924         if [ "$stacking_status" == "Still Stacking" ]; then
925             continue
926         elif [ "$stacking_status" == "Stacking Failed" ]; then
927             echo "node $index ${os_node_list[index]}: stacking has failed"
928             exit 1
929         elif [ "$stacking_status" == "Stacking Complete" ]; then
930             echo "node $index ${os_node_list[index]}: stacking complete"
931             unset 'os_node_list[index]'
932             if  [ ${#os_node_list[@]} -eq 0 ]; then
933                 in_progress=0
934             fi
935         fi
936     done
937     echo "sleep for a minute before the next check"
938     sleep 60
939     if [ ${iteration} -eq 60 ]; then
940         echo "stacking has failed - took longer than 60m"
941         exit 1
942     fi
943 done
944
945 # Further configuration now that stacking is complete.
946 NUM_COMPUTES_PER_SITE=$((NUM_OPENSTACK_COMPUTE_NODES / NUM_OPENSTACK_SITES))
947 for i in `seq 1 ${NUM_OPENSTACK_SITES}`; do
948     echo "Configure the Control Node"
949     CONTROLIP=OPENSTACK_CONTROL_NODE_${i}_IP
950     # Gather Compute IPs for the site
951     for j in `seq 1 ${NUM_COMPUTES_PER_SITE}`; do
952         COMPUTE_INDEX=$(((i-1) * NUM_COMPUTES_PER_SITE + j))
953         IP_VAR=OPENSTACK_COMPUTE_NODE_${COMPUTE_INDEX}_IP
954         COMPUTE_IPS[$((j-1))]=${!IP_VAR}
955     done
956
957     echo "sleep for 60s and print hypervisor-list"
958     sleep 60
959     ${SSH} ${!CONTROLIP} "cd /opt/stack/devstack; source openrc admin admin; nova hypervisor-list"
960     # in the case that we are doing openstack (control + compute) all in one node, then the number of hypervisors
961     # will be the same as the number of openstack systems. However, if we are doing multinode openstack then the
962     # assumption is we have a single control node and the rest are compute nodes, so the number of expected hypervisors
963     # is one less than the total number of openstack systems
964     if [ $((NUM_OPENSTACK_SYSTEM / NUM_OPENSTACK_SITES)) -eq 1 ]; then
965         expected_num_hypervisors=1
966     else
967         expected_num_hypervisors=${NUM_COMPUTES_PER_SITE}
968     fi
969     num_hypervisors=$(${SSH} ${!CONTROLIP} "cd /opt/stack/devstack; source openrc admin admin; openstack hypervisor list -f value | wc -l" | tail -1 | tr -d "\r")
970     if ! [ "${num_hypervisors}" ] || ! [ ${num_hypervisors} -eq ${expected_num_hypervisors} ]; then
971         echo "Error: Only $num_hypervisors hypervisors detected, expected $expected_num_hypervisors"
972         exit 1
973     fi
974
975     # Gather Compute IPs for the site
976     for j in `seq 1 ${NUM_COMPUTES_PER_SITE}`; do
977         COMPUTE_INDEX=$(((i-1) * NUM_COMPUTES_PER_SITE + j))
978         IP_VAR=OPENSTACK_COMPUTE_NODE_${COMPUTE_INDEX}_IP
979         COMPUTE_IPS[$((j-1))]=${!IP_VAR}
980     done
981
982     # External Network
983     echo "prepare external networks by adding vxlan tunnels between all nodes on a separate bridge..."
984     # FIXME Should there be a unique gateway IP and devstack index for each site?
985     devstack_index=1
986     for ip in ${!CONTROLIP} ${COMPUTE_IPS[*]}; do
987         # FIXME - Workaround, ODL (new netvirt) currently adds PUBLIC_BRIDGE as a port in br-int since it doesn't see such a bridge existing when we stack
988         ${SSH} $ip "sudo ovs-vsctl --if-exists del-port br-int $PUBLIC_BRIDGE"
989         ${SSH} $ip "sudo ovs-vsctl --may-exist add-br $PUBLIC_BRIDGE -- set bridge $PUBLIC_BRIDGE other-config:disable-in-band=true other_config:hwaddr=f6:00:00:ff:01:0$((devstack_index++))"
990     done
991
992     # ipsec support
993     if [ "${IPSEC_VXLAN_TUNNELS_ENABLED}" == "yes" ]; then
994         # shellcheck disable=SC2206
995         ALL_NODES=(${!CONTROLIP} ${COMPUTE_IPS[*]})
996         for ((inx_ip1=0; inx_ip1<$((${#ALL_NODES[@]} - 1)); inx_ip1++)); do
997             for ((inx_ip2=$((inx_ip1 + 1)); inx_ip2<${#ALL_NODES[@]}; inx_ip2++)); do
998                 KEY1=0x$(dd if=/dev/urandom count=32 bs=1 2> /dev/null| xxd -p -c 64)
999                 KEY2=0x$(dd if=/dev/urandom count=32 bs=1 2> /dev/null| xxd -p -c 64)
1000                 ID=0x$(dd if=/dev/urandom count=4 bs=1 2> /dev/null| xxd -p -c 8)
1001                 ip1=${ALL_NODES[$inx_ip1]}
1002                 ip2=${ALL_NODES[$inx_ip2]}
1003                 ${SSH} $ip1 "sudo ip xfrm state add src $ip1 dst $ip2 proto esp spi $ID reqid $ID mode transport auth sha256 $KEY1 enc aes $KEY2"
1004                 ${SSH} $ip1 "sudo ip xfrm state add src $ip2 dst $ip1 proto esp spi $ID reqid $ID mode transport auth sha256 $KEY1 enc aes $KEY2"
1005                 ${SSH} $ip1 "sudo ip xfrm policy add src $ip1 dst $ip2 proto udp dir out tmpl src $ip1 dst $ip2 proto esp reqid $ID mode transport"
1006                 ${SSH} $ip1 "sudo ip xfrm policy add src $ip2 dst $ip1 proto udp dir in tmpl src $ip2 dst $ip1 proto esp reqid $ID mode transport"
1007
1008                 ${SSH} $ip2 "sudo ip xfrm state add src $ip2 dst $ip1 proto esp spi $ID reqid $ID mode transport auth sha256 $KEY1 enc aes $KEY2"
1009                 ${SSH} $ip2 "sudo ip xfrm state add src $ip1 dst $ip2 proto esp spi $ID reqid $ID mode transport auth sha256 $KEY1 enc aes $KEY2"
1010                 ${SSH} $ip2 "sudo ip xfrm policy add src $ip2 dst $ip1 proto udp dir out tmpl src $ip2 dst $ip1 proto esp reqid $ID mode transport"
1011                 ${SSH} $ip2 "sudo ip xfrm policy add src $ip1 dst $ip2 proto udp dir in tmpl src $ip1 dst $ip2 proto esp reqid $ID mode transport"
1012             done
1013         done
1014
1015         for ip in ${!CONTROLIP} ${COMPUTE_IPS[*]}; do
1016             echo "ip xfrm configuration for node $ip:"
1017             ${SSH} $ip "sudo ip xfrm policy list"
1018             ${SSH} $ip "sudo ip xfrm state list"
1019         done
1020     fi
1021
1022     # Control Node - PUBLIC_BRIDGE will act as the external router
1023     # Parameter values below are used in integration/test - changing them requires updates in intergration/test as well
1024     EXTNET_GATEWAY_IP="10.10.10.250"
1025     EXTNET_INTERNET_IP="10.9.9.9"
1026     EXTNET_PNF_IP="10.10.10.253"
1027     ${SSH} ${!CONTROLIP} "sudo ifconfig ${PUBLIC_BRIDGE} up ${EXTNET_GATEWAY_IP}/24"
1028
1029     # Control Node - external net PNF simulation
1030     ${SSH} ${!CONTROLIP} "
1031         sudo ip netns add pnf_ns;
1032         sudo ip link add pnf_veth0 type veth peer name pnf_veth1;
1033         sudo ip link set pnf_veth1 netns pnf_ns;
1034         sudo ip link set pnf_veth0 up;
1035         sudo ip netns exec pnf_ns ifconfig pnf_veth1 up ${EXTNET_PNF_IP}/24;
1036         sudo ovs-vsctl add-port ${PUBLIC_BRIDGE} pnf_veth0;
1037     "
1038
1039     # Control Node - external net internet address simulation
1040     ${SSH} ${!CONTROLIP} "
1041         sudo ip tuntap add dev internet_tap mode tap;
1042         sudo ifconfig internet_tap up ${EXTNET_INTERNET_IP}/24;
1043     "
1044
1045     # Computes
1046     compute_index=1
1047     for compute_ip in ${COMPUTE_IPS[*]}; do
1048         # Tunnel from controller to compute
1049         COMPUTEPORT=compute$(( compute_index++ ))_vxlan
1050         ${SSH} ${!CONTROLIP} "
1051             sudo ovs-vsctl add-port $PUBLIC_BRIDGE $COMPUTEPORT -- set interface $COMPUTEPORT type=vxlan options:local_ip=${!CONTROLIP} options:remote_ip=$compute_ip options:dst_port=9876 options:key=flow
1052         "
1053         # Tunnel from compute to controller
1054         CONTROLPORT="control_vxlan"
1055         ${SSH} $compute_ip "
1056             sudo ovs-vsctl add-port $PUBLIC_BRIDGE $CONTROLPORT -- set interface $CONTROLPORT type=vxlan options:local_ip=$compute_ip options:remote_ip=${!CONTROLIP} options:dst_port=9876 options:key=flow
1057         "
1058     done
1059 done
1060
1061 if [ "${ENABLE_HAPROXY_FOR_NEUTRON}" == "yes" ]; then
1062     odlmgrip=OPENSTACK_HAPROXY_1_IP
1063     HA_PROXY_IP=${!odlmgrip}
1064     HA_PROXY_1_IP=${!odlmgrip}
1065     odlmgrip2=OPENSTACK_HAPROXY_2_IP
1066     HA_PROXY_2_IP=${!odlmgrip2}
1067     odlmgrip3=OPENSTACK_HAPROXY_1_IP
1068     HA_PROXY_3_IP=${!odlmgrip3}
1069 else
1070     HA_PROXY_IP=${ODL_SYSTEM_IP}
1071     HA_PROXY_1_IP=${ODL_SYSTEM_1_IP}
1072     HA_PROXY_2_IP=${ODL_SYSTEM_2_IP}
1073     HA_PROXY_3_IP=${ODL_SYSTEM_3_IP}
1074 fi
1075
1076 echo "Locating test plan to use..."
1077 testplan_filepath="${WORKSPACE}/test/csit/testplans/${STREAMTESTPLAN}"
1078 if [ ! -f "${testplan_filepath}" ]; then
1079     testplan_filepath="${WORKSPACE}/test/csit/testplans/${TESTPLAN}"
1080 fi
1081
1082 echo "Changing the testplan path..."
1083 cat "${testplan_filepath}" | sed "s:integration:${WORKSPACE}:" > testplan.txt
1084 cat testplan.txt
1085
1086 # Use the testplan if specific SUITES are not defined.
1087 if [ -z "${SUITES}" ]; then
1088     SUITES=`egrep -v '(^[[:space:]]*#|^[[:space:]]*$)' testplan.txt | tr '\012' ' '`
1089 else
1090     newsuites=""
1091     workpath="${WORKSPACE}/test/csit/suites"
1092     for suite in ${SUITES}; do
1093         fullsuite="${workpath}/${suite}"
1094         if [ -z "${newsuites}" ]; then
1095             newsuites+=${fullsuite}
1096         else
1097             newsuites+=" "${fullsuite}
1098         fi
1099     done
1100     SUITES=${newsuites}
1101 fi
1102
1103 #install all client versions required for this job testing
1104 install_openstack_clients_in_robot_vm
1105
1106 # TODO: run openrc on control node and then scrape the vars from it
1107 # Environment Variables Needed to execute Openstack Client for NetVirt Jobs
1108 cat > /tmp/os_netvirt_client_rc << EOF
1109 export OS_USERNAME=admin
1110 export OS_PASSWORD=admin
1111 export OS_PROJECT_NAME=admin
1112 export OS_USER_DOMAIN_NAME=default
1113 export OS_PROJECT_DOMAIN_NAME=default
1114 export OS_AUTH_URL="http://${!CONTROLIP}/identity"
1115 export OS_IDENTITY_API_VERSION=3
1116 export OS_IMAGE_API_VERSION=2
1117 export OS_TENANT_NAME=admin
1118 unset OS_CLOUD
1119 EOF
1120
1121 source /tmp/os_netvirt_client_rc
1122
1123 echo "Get all versions before executing pybot"
1124 echo "openstack --version"
1125 which openstack
1126 openstack --version
1127 echo "nova --version"
1128 which nova
1129 nova --version
1130 echo "neutron --version"
1131 which neutron
1132 neutron --version
1133
1134 echo "Starting Robot test suites ${SUITES} ..."
1135 # please add pybot -v arguments on a single line and alphabetized
1136 suite_num=0
1137 for suite in ${SUITES}; do
1138     # prepend an incremental counter to the suite name so that the full robot log combining all the suites as is done
1139     # in the rebot step below will list all the suites in chronological order as rebot seems to alphabetize them
1140     let "suite_num = suite_num + 1"
1141     suite_index="$(printf %02d ${suite_num})"
1142     suite_name="$(basename ${suite} | cut -d. -f1)"
1143     log_name="${suite_index}_${suite_name}"
1144     pybot -N ${log_name} \
1145     -c critical -e exclude -e skip_if_${DISTROSTREAM} \
1146     --log log_${log_name}.html --report None --output output_${log_name}.xml \
1147     --removekeywords wuks \
1148     --removekeywords name:SetupUtils.Setup_Utils_For_Setup_And_Teardown \
1149     --removekeywords name:SetupUtils.Setup_Test_With_Logging_And_Without_Fast_Failing \
1150     --removekeywords name:OpenStackOperations.Add_OVS_Logging_On_All_OpenStack_Nodes \
1151     -v BUNDLEFOLDER:${BUNDLEFOLDER} \
1152     -v BUNDLE_URL:${ACTUAL_BUNDLE_URL} \
1153     -v CONTROLLERFEATURES:"${CONTROLLERFEATURES}" \
1154     -v CONTROLLER_USER:${USER} \
1155     -v DEVSTACK_DEPLOY_PATH:/opt/stack/devstack \
1156     -v ENABLE_ITM_DIRECT_TUNNELS:${ENABLE_ITM_DIRECT_TUNNELS} \
1157     -v HA_PROXY_IP:${HA_PROXY_IP} \
1158     -v HA_PROXY_1_IP:${HA_PROXY_1_IP} \
1159     -v HA_PROXY_2_IP:${HA_PROXY_2_IP} \
1160     -v HA_PROXY_3_IP:${HA_PROXY_3_IP} \
1161     -v JDKVERSION:${JDKVERSION} \
1162     -v JENKINS_WORKSPACE:${WORKSPACE} \
1163     -v NEXUSURL_PREFIX:${NEXUSURL_PREFIX} \
1164     -v NUM_ODL_SYSTEM:${NUM_ODL_SYSTEM} \
1165     -v NUM_OPENSTACK_SITES:${NUM_OPENSTACK_SITES} \
1166     -v NUM_OS_SYSTEM:${NUM_OPENSTACK_SYSTEM} \
1167     -v NUM_TOOLS_SYSTEM:${NUM_TOOLS_SYSTEM} \
1168     -v ODL_SNAT_MODE:${ODL_SNAT_MODE} \
1169     -v ODL_ENABLE_L3_FWD:${ODL_ENABLE_L3_FWD} \
1170     -v ODL_STREAM:${DISTROSTREAM} \
1171     -v ODL_SYSTEM_IP:${ODL_SYSTEM_IP} \
1172     -v ODL_SYSTEM_1_IP:${ODL_SYSTEM_1_IP} \
1173     -v ODL_SYSTEM_2_IP:${ODL_SYSTEM_2_IP} \
1174     -v ODL_SYSTEM_3_IP:${ODL_SYSTEM_3_IP} \
1175     -v ODL_SYSTEM_4_IP:${ODL_SYSTEM_4_IP} \
1176     -v ODL_SYSTEM_5_IP:${ODL_SYSTEM_5_IP} \
1177     -v ODL_SYSTEM_6_IP:${ODL_SYSTEM_6_IP} \
1178     -v ODL_SYSTEM_7_IP:${ODL_SYSTEM_7_IP} \
1179     -v ODL_SYSTEM_8_IP:${ODL_SYSTEM_8_IP} \
1180     -v ODL_SYSTEM_9_IP:${ODL_SYSTEM_9_IP} \
1181     -v OS_CONTROL_NODE_IP:${OPENSTACK_CONTROL_NODE_1_IP} \
1182     -v OS_CONTROL_NODE_1_IP:${OPENSTACK_CONTROL_NODE_1_IP} \
1183     -v OS_CONTROL_NODE_2_IP:${OPENSTACK_CONTROL_NODE_2_IP} \
1184     -v OS_CONTROL_NODE_3_IP:${OPENSTACK_CONTROL_NODE_3_IP} \
1185     -v OPENSTACK_BRANCH:${OPENSTACK_BRANCH} \
1186     -v OS_COMPUTE_1_IP:${OPENSTACK_COMPUTE_NODE_1_IP} \
1187     -v OS_COMPUTE_2_IP:${OPENSTACK_COMPUTE_NODE_2_IP} \
1188     -v OS_COMPUTE_3_IP:${OPENSTACK_COMPUTE_NODE_3_IP} \
1189     -v OS_COMPUTE_4_IP:${OPENSTACK_COMPUTE_NODE_4_IP} \
1190     -v OS_COMPUTE_5_IP:${OPENSTACK_COMPUTE_NODE_5_IP} \
1191     -v OS_COMPUTE_6_IP:${OPENSTACK_COMPUTE_NODE_6_IP} \
1192     -v CMP_INSTANCES_SHARED_PATH:/var/instances \
1193     -v OS_USER:${USER} \
1194     -v PUBLIC_PHYSICAL_NETWORK:${PUBLIC_PHYSICAL_NETWORK} \
1195     -v SECURITY_GROUP_MODE:${SECURITY_GROUP_MODE} \
1196     -v TOOLS_SYSTEM_IP:${TOOLS_SYSTEM_1_IP} \
1197     -v TOOLS_SYSTEM_1_IP:${TOOLS_SYSTEM_1_IP} \
1198     -v TOOLS_SYSTEM_2_IP:${TOOLS_SYSTEM_2_IP} \
1199     -v USER_HOME:${HOME} \
1200     -v WORKSPACE:/tmp \
1201     ${TESTOPTIONS} ${suite} || true
1202 done
1203 #rebot exit codes seem to be different
1204 rebot --output ${WORKSPACE}/output.xml --log log_full.html --report None -N openstack output_*.xml || true
1205
1206 echo "Examining the files in data/log and checking file size"
1207 ssh ${ODL_SYSTEM_IP} "ls -altr /tmp/${BUNDLEFOLDER}/data/log/"
1208 ssh ${ODL_SYSTEM_IP} "du -hs /tmp/${BUNDLEFOLDER}/data/log/*"
1209
1210 echo "Tests Executed"
1211
1212 true  # perhaps Jenkins is testing last exit code
1213 # vim: ts=4 sw=4 sts=4 et ft=sh :