aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rwxr-xr-xbootstrap-TLDK.sh217
-rwxr-xr-xresources/tools/virl/bin/start-testcase-TLDK373
2 files changed, 590 insertions, 0 deletions
diff --git a/bootstrap-TLDK.sh b/bootstrap-TLDK.sh
new file mode 100755
index 0000000000..f974ab886f
--- /dev/null
+++ b/bootstrap-TLDK.sh
@@ -0,0 +1,217 @@
+#!/bin/bash
+# Copyright (c) 2016 Cisco and/or its affiliates.
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at:
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+
+set -x
+
+cat /etc/hostname
+cat /etc/hosts
+
+export DEBIAN_FRONTEND=noninteractive
+sudo apt-get -y update
+sudo apt-get -y install libpython2.7-dev python-virtualenv
+
+VIRL_SERVERS=("10.30.51.28" "10.30.51.29" "10.30.51.30")
+VIRL_SERVER=""
+
+VIRL_USERNAME=jenkins-in
+VIRL_PKEY=priv_key
+VIRL_SERVER_STATUS_FILE="status"
+VIRL_SERVER_EXPECTED_STATUS="PRODUCTION"
+
+SSH_OPTIONS="-i ${VIRL_PKEY} -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null -o BatchMode=yes -o LogLevel=error"
+
+DPDK_VERSION=16.07
+DPDK_DIR=dpdk-${DPDK_VERSION}
+DPDK_PACKAGE=${DPDK_DIR}.tar.xz
+
+function ssh_do() {
+ echo
+ echo "### " ssh $@
+ ssh ${SSH_OPTIONS} $@
+}
+
+rm -f ${VIRL_PKEY}
+cat > ${VIRL_PKEY} <<EOF
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----
+EOF
+chmod 600 ${VIRL_PKEY}
+
+#
+# Pick a random host from the array of VIRL servers, and attempt
+# to reach it and verify it's status.
+#
+# The server must be reachable, and have a "status" file with
+# the content "PRODUCTION", to be selected.
+#
+# If the server is not reachable, or does not have the correct
+# status, remove it from the array and start again.
+#
+# Abort if there are no more servers left in the array.
+#
+while [[ ! "$VIRL_SERVER" ]]
+do
+ num_hosts=${#VIRL_SERVERS[@]}
+ if [ $num_hosts == 0 ]
+ then
+ echo "No more VIRL candidate hosts available, failing."
+ exit 127
+ fi
+ element=$[ $RANDOM % $num_hosts ]
+ virl_server_candidate=${VIRL_SERVERS[$element]}
+ virl_server_status=$(ssh ${SSH_OPTIONS} ${VIRL_USERNAME}@${virl_server_candidate} cat $VIRL_SERVER_STATUS_FILE 2>&1)
+ echo VIRL HOST $virl_server_candidate status is \"$virl_server_status\"
+ if [ "$virl_server_status" == "$VIRL_SERVER_EXPECTED_STATUS" ]
+ then
+ # Candidate is in good status. Select this server.
+ VIRL_SERVER="$virl_server_candidate"
+ else
+ # Candidate is in bad status. Remove from array.
+ VIRL_SERVERS=("${VIRL_SERVERS[@]:0:$element}" "${VIRL_SERVERS[@]:$[$element+1]}")
+ fi
+done
+
+# Temporarily download TLDK packages from nexus.fd.io
+SCRIPT_DIR="$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd )"
+
+if [ "${#}" -ne "0" ]; then
+ arr=(${@})
+ echo ${arr[0]}
+else
+ ## we need to download the TLDK and DPDK test files to this local host, maybe use scp or wget
+ ## download DPDK source code from the fast.dpdk.org
+ ## download TLDK source code from the gerrit.fd.io
+ ## download some pcap file and .deb packages from the nexus.fd.io
+ wget -q "fast.dpdk.org/rel/${DPDK_PACKAGE}"
+ git clone https://gerrit.fd.io/r/tldk
+ wget -q "https://nexus.fd.io/tldk/test_ipv4_assemble_rx.pcap" -P ./TLDK-tests/tldk_testconfig
+ wget -q "https://nexus.fd.io/tldk/test_ipv4_checksum_rx.pcap" -P ./TLDK-tests/tldk_testconfig
+ wget -q "https://nexus.fd.io/tldk/test_ipv4_fragment_rx.pcap" -P ./TLDK-tests/tldk_testconfig
+ wget -q "https://nexus.fd.io/tldk/test_ipv6_checksum_rx.pcap" -P ./TLDK-tests/tldk_testconfig
+ wget -q "https://nexus.fd.io/tldk/test_ipv6_fragment_rx.pcap" -P ./TLDK-tests/tldk_testconfig
+fi
+
+#we will pack all the TLDK depend files and copy it to the VIRL_SERVER
+VIRL_DIR_LOC="/tmp"
+TLDK_TAR_FILE="tldk_depends.tar.gz"
+
+tar zcf ${TLDK_TAR_FILE} dpdk-16.07.tar.xz ./tldk/ \
+ ./TLDK-tests/tldk_testconfig/ ./TLDK-tests/tldk_deplibs/
+
+cat ${VIRL_PKEY}
+# Copy the files to VIRL host
+scp ${SSH_OPTIONS} ${TLDK_TAR_FILE} \
+ ${VIRL_USERNAME}@${VIRL_SERVER}:${VIRL_DIR_LOC}/
+
+result=$?
+if [ "${result}" -ne "0" ]; then
+ echo "Failed to copy tldk package file to virl host"
+ echo ${result}
+ exit ${result}
+fi
+
+# Start a simulation on VIRL server
+echo "Starting simulation on VIRL server"
+
+VIRL_TOPOLOGY=double-ring-nested.xenial
+VIRL_RELEASE=csit-ubuntu-16.04.1_2016-11-28_1.5
+
+function stop_virl_simulation {
+ ssh ${SSH_OPTIONS} ${VIRL_USERNAME}@${VIRL_SERVER}\
+ "stop-testcase ${VIRL_SID}"
+}
+
+# Upon script exit, cleanup the simulation execution
+trap stop_virl_simulation EXIT
+
+# use the start-testcase-TLDK for the TLDK test case
+VIRL_SID=$(ssh ${SSH_OPTIONS} \
+ ${VIRL_USERNAME}@${VIRL_SERVER} \
+ "start-testcase-TLDK -c ${VIRL_TOPOLOGY} -r ${VIRL_RELEASE} ${VIRL_DIR_LOC}/${TLDK_TAR_FILE}")
+retval=$?
+if [ "${retval}" -ne "0" ]; then
+ echo "VIRL simulation start failed"
+ exit ${retval}
+fi
+
+if [[ ! "${VIRL_SID}" =~ session-[a-zA-Z0-9_]{6} ]]; then
+ echo "No VIRL session ID reported."
+ exit 127
+fi
+
+echo ${VIRL_SID}
+
+ssh_do ${VIRL_USERNAME}@${VIRL_SERVER} cat /scratch/${VIRL_SID}/topology.yaml
+
+# Download the topology file from virl session
+scp ${SSH_OPTIONS} \
+ ${VIRL_USERNAME}@${VIRL_SERVER}:/scratch/${VIRL_SID}/topology.yaml \
+ topologies/enabled/topology.yaml
+
+retval=$?
+if [ "${retval}" -ne "0" ]; then
+ echo "Failed to copy topology file from VIRL simulation"
+ exit ${retval}
+fi
+
+# create a python virtual environment env
+virtualenv --system-site-packages env
+. env/bin/activate
+
+echo pip install
+pip install -r ${SCRIPT_DIR}/requirements.txt
+
+pykwalify -s ${SCRIPT_DIR}/resources/topology_schemas/3_node_topology.sch.yaml \
+ -s ${SCRIPT_DIR}/resources/topology_schemas/topology.sch.yaml \
+ -d ${SCRIPT_DIR}/topologies/enabled/topology.yaml \
+ -vvv
+
+if [ "$?" -ne "0" ]; then
+ echo "Topology schema validation failed."
+ echo "However, the tests will start."
+fi
+
+PYTHONPATH=`pwd` pybot -L TRACE -W 150 \
+ -v TOPOLOGY_PATH:${SCRIPT_DIR}/topologies/enabled/topology.yaml \
+ --suite "TLDK-tests.func" \
+ --include vm_envAND3_node_single_link_topo \
+ --exclude PERFTEST \
+ --exclude SKIP_PATCH \
+ --noncritical EXPECTED_FAILING \
+ TLDK-tests/
diff --git a/resources/tools/virl/bin/start-testcase-TLDK b/resources/tools/virl/bin/start-testcase-TLDK
new file mode 100755
index 0000000000..263e8beb90
--- /dev/null
+++ b/resources/tools/virl/bin/start-testcase-TLDK
@@ -0,0 +1,373 @@
+#!/usr/bin/python
+
+# Copyright (c) 2016 Cisco and/or its affiliates.
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at:
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+
+__author__ = 'fangyinx.hu@intel.com'
+
+import sys
+import requests
+import re
+import os
+import argparse
+import tempfile
+import shutil
+import time
+import paramiko
+import netifaces
+
+#
+# Helper function to indent a text string
+#
+def indent(lines, amount, fillchar=' '):
+ padding = amount * fillchar
+ return padding + ('\n'+padding).join(lines.split('\n'))
+
+#
+# Main function.
+# FIXME: Right now, this is really coded like a shell script, as one big
+# function executed in sequence. This should be broken down into multiple
+# functions.
+#
+def main():
+ #
+ # Get our default interface IP address. This will become the default
+ # value for the "NFS Server IP" option.
+ #
+ gws = netifaces.gateways()
+ addrs = netifaces.ifaddresses(gws['default'][netifaces.AF_INET][1])
+ default_addr = addrs[netifaces.AF_INET][0]['addr']
+
+ #
+ # Verify CLI parameters and try to download our VPP image into a temporary
+ # file first
+ #
+ parser = argparse.ArgumentParser()
+ parser.add_argument("topology", help="the base topology to be started")
+ parser.add_argument("packages", help="Path to the tldk package file that " +
+ "is/are to be installed", nargs='+')
+ parser.add_argument("-c", "--copy", help="Copy the tldk packages, " +
+ "leaving the originals in place. Default is to " +
+ "move them.", action='store_true')
+ parser.add_argument("-k", "--keep", help="Keep (do not delete) the " +
+ "simulation in case of error", action='store_true')
+ parser.add_argument("-v", "--verbosity", action="count", default=0)
+ parser.add_argument("-nip", "--nfs-server-ip", help="NFS server (our) IP " +
+ "default is derived from routing table: " +
+ "{}".format(default_addr), default=default_addr)
+ parser.add_argument("-ns", "--nfs-scratch-directory",
+ help="Server location for NFS scratch diretory",
+ default="/nfs/scratch")
+ parser.add_argument("-nc", "--nfs-common-directory",
+ help="Server location for NFS common (read-only) " +
+ "directory", default="/nfs/common")
+ parser.add_argument("-wc", "--wait-count",
+ help="number of intervals to wait for simulation to " +
+ "be ready", type=int, default=24)
+ parser.add_argument("-wt", "--wait-time",
+ help="length of a single interval to wait for " +
+ "simulation to be ready", type=int, default=5)
+ parser.add_argument("-vip", "--virl-ip",
+ help="VIRL IP and Port (e.g. 127.0.0.1:19399)",
+ default="127.0.0.1:19399")
+ parser.add_argument("-u", "--username", help="VIRL username",
+ default="tb4-virl")
+ parser.add_argument("-p", "--password", help="VIRL password",
+ default="Cisco1234")
+ parser.add_argument("-su", "--ssh-user", help="SSH username",
+ default="cisco")
+ parser.add_argument("-spr", "--ssh-privkey", help="SSH private keyfile",
+ default="/home/jenkins-in/.ssh/id_rsa_virl")
+ parser.add_argument("-spu", "--ssh-pubkey", help="SSH public keyfile",
+ default="/home/jenkins-in/.ssh/id_rsa_virl.pub")
+ parser.add_argument("-r", "--release", help="VM disk image/release " +
+ "(ex. \"csit-ubuntu-14.04.4_2016-05-25_1.0\")",
+ default="csit-ubuntu-14.04.4_2016-05-25_1.0")
+ parser.add_argument("--topology-directory", help="Topology directory",
+ default="/home/jenkins-in/testcase-infra/topologies")
+
+ args = parser.parse_args()
+
+ #
+ # Check if topology and template exist
+ #
+ if args.verbosity >= 2:
+ print "DEBUG: Running with topology {}".format(args.topology)
+
+ topology_virl_filename = os.path.join(args.topology_directory,
+ args.topology + ".virl")
+ topology_yaml_filename = os.path.join(args.topology_directory,
+ args.topology + ".yaml")
+
+ if not os.path.isfile(topology_virl_filename):
+ print "ERROR: Topology VIRL file {} does not exist".\
+ format(topology_virl_filename)
+ sys.exit(1)
+ if not os.path.isfile(topology_yaml_filename):
+ print "ERROR: Topology YAML file {} does not exist".\
+ format(topology_yaml_filename)
+ sys.exit(1)
+
+ #
+ # Check if TLDK package exists
+ #
+ for package in args.packages:
+ if args.verbosity >= 2:
+ print "DEBUG: Checking if file {} exists".format(package)
+ if not os.path.isfile(package):
+ print "ERROR: TLDK package {} does not exist.".format(package)
+ sys.exit(1)
+
+ #
+ # Start VIRL topology
+ #
+ if args.verbosity >= 1:
+ print "DEBUG: Starting VIRL topology"
+ temp_handle, temp_topology = tempfile.mkstemp()
+ with open(args.ssh_pubkey, 'r') as pubkey_file:
+ pub_key = pubkey_file.read().replace('\n', '')
+ with open(temp_topology, 'w') as new_file, \
+ open(topology_virl_filename, 'r') as old_file:
+ for line in old_file:
+ line = line.replace(" - VIRL-USER-SSH-PUBLIC-KEY", " - "+pub_key)
+ line = line.replace("$$NFS_SERVER_SCRATCH$$", \
+ args.nfs_server_ip+":"+args.nfs_scratch_directory)
+ line = line.replace("$$NFS_SERVER_COMMON$$", \
+ args.nfs_server_ip+":"+args.nfs_common_directory)
+ line = line.replace("$$VM_IMAGE$$", "server-"+args.release)
+ new_file.write(line)
+ os.close(temp_handle)
+
+ try:
+ new_file = open(temp_topology, 'rb')
+ headers = {'Content-Type': 'text/xml'}
+ req = requests.post('http://' + args.virl_ip + '/simengine/rest/launch',
+ headers=headers,
+ auth=(args.username, args.password), data=new_file)
+ if args.verbosity >= 2:
+ print "DEBUG: - Response Code {}".format(req.status_code)
+ new_file.close()
+
+ except:
+ print "ERROR: Launching VIRL simulation - received invalid response"
+ print req
+ os.remove(temp_topology)
+ sys.exit(1)
+
+ if req.status_code != 200:
+ print "ERROR: Launching VIRL simulation - received status other " + \
+ "than 200 HTTP OK"
+ print "Status was: {} \n".format(req.status_code)
+ print "Response content was: "
+ print req.content
+ os.remove(temp_topology)
+ sys.exit(1)
+
+ # If we got here, we had a good response. The response content is the
+ # session ID.
+ session_id = req.content
+
+ #
+ # Create simulation scratch directory. Move topology file into that
+ # directory. Copy or move TLDK packages into that directory.
+ #
+ scratch_directory = os.path.join(args.nfs_scratch_directory, session_id)
+ os.mkdir(scratch_directory)
+ shutil.move(temp_topology, os.path.join(scratch_directory,
+ "virl_topology.virl"))
+ os.mkdir(os.path.join(scratch_directory, "tldktest"))
+ for package in args.packages:
+ if args.copy:
+ shutil.copy(package, os.path.join(scratch_directory, "tldktest",
+ os.path.basename(package)))
+ else:
+ shutil.move(package, os.path.join(scratch_directory, "tldktest",
+ os.path.basename(package)))
+
+ #
+ # Wait for simulation to become active
+ #
+ if args.verbosity >= 1:
+ print "DEBUG: Waiting for simulation to become active"
+
+ sim_is_started = False
+ nodelist = []
+
+ count = args.wait_count
+ while (count > 0) and not sim_is_started:
+ time.sleep(args.wait_time)
+ count -= 1
+
+ req = requests.get('http://' + args.virl_ip + '/simengine/rest/nodes/' +
+ session_id, auth=(args.username, args.password))
+ data = req.json()
+
+ active = 0
+ total = 0
+
+ # Flush the node list every time, keep the last one
+ nodelist = []
+
+ # Hosts are the keys of the inner dictionary
+ for key in data[session_id].keys():
+ if data[session_id][key]['management-proxy'] == "self":
+ continue
+ nodelist.append(key)
+ total += 1
+ if data[session_id][key]['state'] == "ACTIVE":
+ active += 1
+ if args.verbosity >= 2:
+ print "DEBUG: - Attempt {} out of {}, total {} hosts, {} active".\
+ format(args.wait_count-count, args.wait_count, total, active)
+ if active == total:
+ sim_is_started = True
+
+ if not sim_is_started:
+ print "ERROR: Simulation started OK but devices never changed to " + \
+ "ACTIVE state"
+ print "Last VIRL response:"
+ print data
+ if not args.keep:
+ shutil.rmtree(scratch_directory)
+ req = requests.get('http://' + args.virl_ip +
+ '/simengine/rest/stop/' + session_id,
+ auth=(args.username, args.password))
+
+ if args.verbosity >= 2:
+ print "DEBUG: Nodes: " + ", ".join(nodelist)
+
+ #
+ # Fetch simulation's IPs and create files
+ # (ansible hosts file, topology YAML file)
+ #
+ req = requests.get('http://' + args.virl_ip +
+ '/simengine/rest/interfaces/' + session_id +
+ '?fetch-state=1', auth=(args.username, args.password))
+ data = req.json()
+
+ # Populate node addresses
+ nodeaddrs = {}
+ topology = {}
+ for key in nodelist:
+ nodetype = re.split('[0-9]', key)[0]
+ if not nodetype in nodeaddrs:
+ nodeaddrs[nodetype] = {}
+ nodeaddrs[nodetype][key] = re.split('\\/', \
+ data[session_id][key]['management']['ip-address'])[0]
+ if args.verbosity >= 2:
+ print "DEBUG: Node {} is of type {} and has management IP {}".\
+ format(key, nodetype, nodeaddrs[nodetype][key])
+
+ topology[key] = {}
+ for key2 in data[session_id][key]:
+ topology[key]["nic-"+key2] = data[session_id][key][key2]
+ if 'ip-address' in topology[key]["nic-"+key2]:
+ if topology[key]["nic-"+key2]['ip-address'] is not None:
+ topology[key]["nic-"+key2]['ip-addr'] = re.split('\\/', \
+ topology[key]["nic-"+key2]['ip-address'])[0]
+
+ # Write ansible file
+ ansiblehosts = open(os.path.join(scratch_directory, 'ansible-hosts'), 'w')
+ for key1 in nodeaddrs:
+ ansiblehosts.write("[{}]\n".format(key1))
+ for key2 in nodeaddrs[key1]:
+ ansiblehosts.write("{} hostname={}\n".format(nodeaddrs[key1][key2],
+ key2))
+ ansiblehosts.close()
+
+ # Process topology YAML template
+ with open(args.ssh_privkey, 'r') as privkey_file:
+ priv_key = indent(privkey_file.read(), 6)
+
+ with open(os.path.join(scratch_directory, "topology.yaml"), 'w') as \
+ new_file, open(topology_yaml_filename, 'r') as old_file:
+ for line in old_file:
+ new_file.write(line.format(priv_key=priv_key, topology=topology))
+
+ #
+ # Wait for hosts to become reachable over SSH
+ #
+ if args.verbosity >= 1:
+ print "DEBUG: Waiting for hosts to become reachable using SSH"
+
+ missing = -1
+ count = args.wait_count
+ while (count > 0) and missing != 0:
+ time.sleep(args.wait_time)
+ count -= 1
+
+ missing = 0
+ for key in nodelist:
+ if not os.path.exists(os.path.join(scratch_directory, key)):
+ missing += 1
+ if args.verbosity >= 2:
+ print "DEBUG: - Attempt {} out of {}, waiting for {} hosts".\
+ format(args.wait_count-count, args.wait_count, missing)
+
+ if missing != 0:
+ print "ERROR: Simulation started OK but {} hosts ".format(missing) + \
+ "never mounted their NFS directory"
+ if not args.keep:
+ shutil.rmtree(scratch_directory)
+ req = requests.get('http://' + args.virl_ip +
+ '/simengine/rest/stop/' + session_id,
+ auth=(args.username, args.password))
+
+ #
+ # just decompress the TLDK tar packages
+ #
+ if args.verbosity >= 1:
+ print "DEBUG: Uprading TLDK"
+
+ for key1 in nodeaddrs:
+ if not key1 == 'tg':
+ for key2 in nodeaddrs[key1]:
+ ipaddr = nodeaddrs[key1][key2]
+ if args.verbosity >= 2:
+ print "DEBUG: Upgrading TLDK on node {}".format(ipaddr)
+ paramiko.util.log_to_file(os.path.join(scratch_directory,
+ "ssh.log"))
+ client = paramiko.SSHClient()
+ client.load_system_host_keys()
+ client.load_host_keys("/dev/null")
+ client.set_missing_host_key_policy(paramiko.AutoAddPolicy())
+ client.connect(ipaddr, username=args.ssh_user,
+ key_filename=args.ssh_privkey)
+ stdin, stdout, stderr = \
+ client.exec_command('cd /scratch/tldktest/ && sudo tar zxf tldk_depends.tar.gz')
+ c_stdout = stdout.read()
+ c_stderr = stderr.read()
+ if args.verbosity >= 2:
+ print "DEBUG: Command output was:"
+ print c_stdout
+ print "DEBUG: Command stderr was:"
+ print c_stderr
+
+ #
+ # Write a file with timestamp to scratch directory. We can use this to track
+ # how long a simulation has been running.
+ #
+ with open(os.path.join(scratch_directory, 'start_time'), 'a') as \
+ timestampfile:
+ timestampfile.write('{}\n'.format(int(time.time())))
+
+ #
+ # Declare victory
+ #
+ if args.verbosity >= 1:
+ print "SESSION ID: {}".format(session_id)
+
+ print "{}".format(session_id)
+
+if __name__ == "__main__":
+ sys.exit(main())