Merge "Add os-odl_l2-fdio-ha scenario support"
[yardstick.git] / yardstick / benchmark / scenarios / availability / attacker / attacker_baremetal.py
1 ##############################################################################
2 # Copyright (c) 2015 Huawei Technologies Co.,Ltd. and others
3 #
4 # All rights reserved. This program and the accompanying materials
5 # are made available under the terms of the Apache License, Version 2.0
6 # which accompanies this distribution, and is available at
7 # http://www.apache.org/licenses/LICENSE-2.0
8 ##############################################################################
9 import logging
10 import traceback
11 import subprocess
12 import yardstick.ssh as ssh
13 from baseattacker import BaseAttacker
14
15 LOG = logging.getLogger(__name__)
16
17
18 def _execute_shell_command(command, stdin=None):
19     '''execute shell script with error handling'''
20     exitcode = 0
21     output = []
22     try:
23         output = subprocess.check_output(command, stdin=stdin, shell=True)
24     except Exception:
25         exitcode = -1
26         output = traceback.format_exc()
27         LOG.error("exec command '%s' error:\n " % command)
28         LOG.error(traceback.format_exc())
29
30     return exitcode, output
31
32
33 class BaremetalAttacker(BaseAttacker):
34     __attacker_type__ = 'bare-metal-down'
35
36     def setup(self):
37         LOG.debug("config:%s context:%s" % (self._config, self._context))
38         host = self._context.get(self._config['host'], None)
39         ip = host.get("ip", None)
40         user = host.get("user", "root")
41         ssh_port = host.get("ssh_port", ssh.DEFAULT_PORT)
42         key_filename = host.get("key_filename", "~/.ssh/id_rsa")
43
44         self.connection = ssh.SSH(user, ip, key_filename=key_filename,
45                                   port=ssh_port)
46         self.connection.wait(timeout=600)
47         LOG.debug("ssh host success!")
48         self.host_ip = ip
49
50         self.ipmi_ip = host.get("ipmi_ip", None)
51         self.ipmi_user = host.get("ipmi_user", "root")
52         self.ipmi_pwd = host.get("ipmi_pwd", None)
53
54         self.fault_cfg = BaseAttacker.attacker_cfgs.get('bare-metal-down')
55         self.check_script = self.get_script_fullpath(
56             self.fault_cfg['check_script'])
57         self.recovery_script = self.get_script_fullpath(
58             self.fault_cfg['recovery_script'])
59
60         if self.check():
61             self.setup_done = True
62
63     def check(self):
64         exit_status, stdout, stderr = self.connection.execute(
65             "/bin/sh -s {0} -W 10".format(self.host_ip),
66             stdin=open(self.check_script, "r"))
67
68         LOG.debug("check ret: %s out:%s err:%s" %
69                   (exit_status, stdout, stderr))
70         if not stdout or "running" not in stdout:
71             LOG.info("the host (ipmi_ip:%s) is not running!" % self.ipmi_ip)
72             return False
73
74         return True
75
76     def inject_fault(self):
77         exit_status, stdout, stderr = self.connection.execute(
78             "shutdown -h now")
79         LOG.debug("inject fault ret: %s out:%s err:%s" %
80                   (exit_status, stdout, stderr))
81         if not exit_status:
82             LOG.info("inject fault success")
83
84     def recover(self):
85         jump_host_name = self._config.get("jump_host", None)
86         self.jump_connection = None
87         if jump_host_name is not None:
88             host = self._context.get(jump_host_name, None)
89             ip = host.get("ip", None)
90             user = host.get("user", "root")
91             ssh_port = host.get("ssh_port", ssh.DEFAULT_PORT)
92             pwd = host.get("pwd", None)
93
94             LOG.debug("jump_host ip:%s user:%s" % (ip, user))
95             self.jump_connection = ssh.SSH(user, ip, password=pwd,
96                                            port=ssh_port)
97             self.jump_connection.wait(timeout=600)
98             LOG.debug("ssh jump host success!")
99
100         if self.jump_connection is not None:
101             exit_status, stdout, stderr = self.jump_connection.execute(
102                 "/bin/bash -s {0} {1} {2} {3}".format(
103                     self.ipmi_ip, self.ipmi_user, self.ipmi_pwd, "on"),
104                 stdin=open(self.recovery_script, "r"))
105         else:
106             exit_status, stdout = _execute_shell_command(
107                 "/bin/bash -s {0} {1} {2} {3}".format(
108                     self.ipmi_ip, self.ipmi_user, self.ipmi_pwd, "on"),
109                 stdin=open(self.recovery_script, "r"))
110
111
112 def _test():  # pragma: no cover
113     host = {
114         "ipmi_ip": "10.20.0.5",
115         "ipmi_user": "root",
116         "ipmi_pwd": "123456",
117         "ip": "10.20.0.5",
118         "user": "root",
119         "key_filename": "/root/.ssh/id_rsa"
120     }
121     context = {"node1": host}
122     attacker_cfg = {
123         'fault_type': 'bear-metal-down',
124         'host': 'node1',
125     }
126     ins = BaremetalAttacker(attacker_cfg, context)
127     ins.setup()
128     ins.inject_fault()
129
130
131 if __name__ == '__main__':  # pragma: no cover
132     _test()