612 lines
23 KiB
Python
612 lines
23 KiB
Python
# Copyright 2016 Canonical Ltd
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
|
|
import amulet
|
|
import json
|
|
import subprocess
|
|
import time
|
|
|
|
|
|
import designateclient.client as designate_client
|
|
import designateclient.v1.domains as domains
|
|
import designateclient.v1.records as records
|
|
import designateclient.v1.servers as servers
|
|
|
|
import charmhelpers.contrib.openstack.amulet.deployment as amulet_deployment
|
|
import charmhelpers.contrib.openstack.amulet.utils as os_amulet_utils
|
|
|
|
# Use DEBUG to turn on debug logging
|
|
u = os_amulet_utils.OpenStackAmuletUtils(os_amulet_utils.DEBUG)
|
|
|
|
|
|
class DesignateBasicDeployment(amulet_deployment.OpenStackAmuletDeployment):
|
|
"""Amulet tests on a basic designate deployment."""
|
|
|
|
TEST_DOMAIN = 'amuletexample.com.'
|
|
TEST_WWW_RECORD = "www.{}".format(TEST_DOMAIN)
|
|
TEST_RECORD = {TEST_WWW_RECORD: '10.0.0.23'}
|
|
TEST_NS1_RECORD = 'ns1.amuletexample.com.'
|
|
TEST_NS2_RECORD = 'ns2.amuletexample.com.'
|
|
|
|
def __init__(self, series, openstack=None, source=None, stable=False):
|
|
"""Deploy the entire test environment."""
|
|
super(DesignateBasicDeployment, self).__init__(series, openstack,
|
|
source, stable)
|
|
self._add_services()
|
|
self._add_relations()
|
|
self._configure_services()
|
|
self._deploy()
|
|
|
|
u.log.info('Waiting on extended status checks...')
|
|
exclude_services = ['mongodb', 'memcached']
|
|
self._auto_wait_for_status(exclude_services=exclude_services)
|
|
|
|
self.d.sentry.wait()
|
|
self._initialize_tests()
|
|
|
|
def _add_services(self):
|
|
"""Add services
|
|
|
|
Add the services that we're testing, where designate is local,
|
|
and the rest of the service are from lp branches that are
|
|
compatible with the local charm (e.g. stable or next).
|
|
"""
|
|
this_service = {'name': 'designate'}
|
|
other_services = [
|
|
{'name': 'percona-cluster', 'constraints': {'mem': '3072M'}},
|
|
{'name': 'rabbitmq-server'},
|
|
{'name': 'keystone'},
|
|
{'name': 'memcached', 'location': 'cs:memcached'},
|
|
{'name': 'designate-bind'},
|
|
{'name': 'neutron-api'}
|
|
]
|
|
|
|
use_source = [
|
|
'percona-cluster',
|
|
'rabbitmq-server',
|
|
]
|
|
|
|
no_origin = [
|
|
'designate-bind',
|
|
'memcached',
|
|
]
|
|
|
|
super(DesignateBasicDeployment, self)._add_services(this_service,
|
|
other_services,
|
|
use_source,
|
|
no_origin)
|
|
|
|
def _add_relations(self):
|
|
"""Add all of the relations for the services."""
|
|
relations = {
|
|
'designate:shared-db': 'percona-cluster:shared-db',
|
|
'designate:amqp': 'rabbitmq-server:amqp',
|
|
'designate:identity-service': 'keystone:identity-service',
|
|
'keystone:shared-db': 'percona-cluster:shared-db',
|
|
'designate:dns-backend': 'designate-bind:dns-backend',
|
|
'designate:coordinator-memcached': 'memcached:cache',
|
|
'designate:dnsaas': 'neutron-api:external-dns',
|
|
'neutron-api:identity-service': 'keystone:identity-service',
|
|
'neutron-api:shared-db': 'percona-cluster:shared-db',
|
|
}
|
|
super(DesignateBasicDeployment, self)._add_relations(relations)
|
|
|
|
def _configure_services(self):
|
|
"""Configure all of the services."""
|
|
keystone_config = {
|
|
'admin-password': 'openstack',
|
|
'admin-token': 'ubuntutesting'
|
|
}
|
|
pxc_config = {
|
|
'dataset-size': '25%',
|
|
'max-connections': 1000,
|
|
'root-password': 'ChangeMe123',
|
|
'sst-password': 'ChangeMe123',
|
|
}
|
|
designate_config = {
|
|
'nameservers': ' '.join([self.TEST_NS1_RECORD,
|
|
self.TEST_NS2_RECORD])
|
|
}
|
|
configs = {
|
|
'keystone': keystone_config,
|
|
'percona-cluster': pxc_config,
|
|
'designate': designate_config,
|
|
}
|
|
super(DesignateBasicDeployment, self)._configure_services(configs)
|
|
|
|
def _get_token(self):
|
|
return self.keystone.service_catalog.catalog['token']['id']
|
|
|
|
def _initialize_tests(self):
|
|
"""Perform final initialization before tests get run."""
|
|
# Access the sentries for inspecting service units
|
|
self.designate_sentry = self.d.sentry['designate'][0]
|
|
self.designate_bind_sentry = self.d.sentry['designate-bind'][0]
|
|
self.pxc_sentry = self.d.sentry['percona-cluster'][0]
|
|
self.keystone_sentry = self.d.sentry['keystone'][0]
|
|
self.rabbitmq_sentry = self.d.sentry['rabbitmq-server'][0]
|
|
self.neutron_api_sentry = self.d.sentry['neutron-api'][0]
|
|
u.log.debug('openstack release val: {}'.format(
|
|
self._get_openstack_release()))
|
|
u.log.debug('openstack release str: {}'.format(
|
|
self._get_openstack_release_string()))
|
|
self.dns_slave_ip = self.designate_bind_sentry.relation(
|
|
'dns-backend',
|
|
'designate:dns-backend')['private-address']
|
|
# bionic_rocky is the "first" rocky version, on Amulet list
|
|
# that is why start comparing with this version
|
|
if self._get_openstack_release() >= self.bionic_rocky:
|
|
self.designate_svcs = [
|
|
'designate-agent', 'designate-api', 'designate-central',
|
|
'designate-mdns', 'designate-worker', 'designate-sink',
|
|
'designate-producer',
|
|
]
|
|
else:
|
|
self.designate_svcs = [
|
|
'designate-agent', 'designate-api', 'designate-central',
|
|
'designate-mdns', 'designate-pool-manager', 'designate-sink',
|
|
'designate-zone-manager',
|
|
]
|
|
|
|
# Authenticate admin with keystone endpoint
|
|
self.keystone_session, self.keystone = u.get_default_keystone_session(
|
|
self.keystone_sentry,
|
|
openstack_release=self._get_openstack_release())
|
|
|
|
# Authenticate admin with designate endpoint
|
|
designate_ep = self.keystone.service_catalog.url_for(
|
|
service_type='dns',
|
|
interface='publicURL')
|
|
keystone_ep = self.keystone.service_catalog.url_for(
|
|
service_type='identity',
|
|
interface='publicURL')
|
|
if self._get_openstack_release() >= self.xenial_queens:
|
|
self.designate = designate_client.Client(
|
|
version='2',
|
|
session=self.keystone_session)
|
|
else:
|
|
self.designate = designate_client.Client(
|
|
version='1',
|
|
auth_url=keystone_ep,
|
|
username="admin",
|
|
password="openstack",
|
|
tenant_name="admin",
|
|
endpoint=designate_ep)
|
|
|
|
def check_and_wait(self, check_command, interval=2, max_wait=200,
|
|
desc=None):
|
|
waited = 0
|
|
while not check_command() or waited > max_wait:
|
|
if desc:
|
|
u.log.debug(desc)
|
|
time.sleep(interval)
|
|
waited = waited + interval
|
|
if waited > max_wait:
|
|
raise Exception('cmd failed {}'.format(check_command))
|
|
|
|
def _run_action(self, unit_id, action, *args):
|
|
command = ["juju", "action", "do", "--format=json", unit_id, action]
|
|
command.extend(args)
|
|
print("Running command: %s\n" % " ".join(command))
|
|
output = subprocess.check_output(command)
|
|
output_json = output.decode(encoding="UTF-8")
|
|
data = json.loads(output_json)
|
|
action_id = data[u'Action queued with id']
|
|
return action_id
|
|
|
|
def _wait_on_action(self, action_id):
|
|
command = ["juju", "action", "fetch", "--format=json", action_id]
|
|
while True:
|
|
try:
|
|
output = subprocess.check_output(command)
|
|
except Exception as e:
|
|
print(e)
|
|
return False
|
|
output_json = output.decode(encoding="UTF-8")
|
|
data = json.loads(output_json)
|
|
if data[u"status"] == "completed":
|
|
return True
|
|
elif data[u"status"] == "failed":
|
|
return False
|
|
time.sleep(2)
|
|
|
|
def test_100_services(self):
|
|
"""Verify the expected services are running on the corresponding
|
|
service units."""
|
|
u.log.debug('Checking system services on units...')
|
|
|
|
service_names = {
|
|
self.designate_sentry: self.designate_svcs,
|
|
}
|
|
|
|
ret = u.validate_services_by_name(service_names)
|
|
if ret:
|
|
amulet.raise_status(amulet.FAIL, msg=ret)
|
|
|
|
u.log.debug('OK')
|
|
|
|
def test_110_service_catalog(self):
|
|
"""Verify that the service catalog endpoint data is valid."""
|
|
u.log.debug('Checking keystone service catalog data...')
|
|
endpoint_check = {
|
|
'adminURL': u.valid_url,
|
|
'id': u.not_null,
|
|
'region': 'RegionOne',
|
|
'publicURL': u.valid_url,
|
|
'internalURL': u.valid_url
|
|
}
|
|
expected = {
|
|
'dns': [endpoint_check],
|
|
}
|
|
actual = self.keystone.service_catalog.get_endpoints()
|
|
|
|
ret = u.validate_svc_catalog_endpoint_data(
|
|
expected,
|
|
actual,
|
|
openstack_release=self._get_openstack_release())
|
|
if ret:
|
|
amulet.raise_status(amulet.FAIL, msg=ret)
|
|
|
|
u.log.debug('OK')
|
|
|
|
def test_114_designate_api_endpoint(self):
|
|
"""Verify the designate api endpoint data."""
|
|
u.log.debug('Checking designate api endpoint data...')
|
|
endpoints = self.keystone.endpoints.list()
|
|
u.log.debug(endpoints)
|
|
admin_port = internal_port = public_port = '9001'
|
|
expected = {'id': u.not_null,
|
|
'region': 'RegionOne',
|
|
'adminurl': u.valid_url,
|
|
'internalurl': u.valid_url,
|
|
'publicurl': u.valid_url,
|
|
'service_id': u.not_null}
|
|
|
|
ret = u.validate_endpoint_data(
|
|
endpoints,
|
|
admin_port,
|
|
internal_port,
|
|
public_port,
|
|
expected,
|
|
openstack_release=self._get_openstack_release())
|
|
if ret:
|
|
message = 'Designate endpoint: {}'.format(ret)
|
|
amulet.raise_status(amulet.FAIL, msg=message)
|
|
|
|
u.log.debug('OK')
|
|
|
|
def test_200_designate_identity_relation(self):
|
|
"""Verify the designate to keystone identity-service relation data"""
|
|
u.log.debug('Checking designate to keystone identity-service '
|
|
'relation data...')
|
|
unit = self.designate_sentry
|
|
relation = ['identity-service', 'keystone:identity-service']
|
|
designate_ip = unit.relation(
|
|
'identity-service',
|
|
'keystone:identity-service')['private-address']
|
|
designate_endpoint = "http://%s:9001" % (designate_ip)
|
|
|
|
expected = {
|
|
'admin_url': designate_endpoint,
|
|
'internal_url': designate_endpoint,
|
|
'private-address': designate_ip,
|
|
'public_url': designate_endpoint,
|
|
'region': 'RegionOne',
|
|
'service': 'designate',
|
|
}
|
|
|
|
ret = u.validate_relation_data(unit, relation, expected)
|
|
if ret:
|
|
message = u.relation_error('designate identity-service', ret)
|
|
amulet.raise_status(amulet.FAIL, msg=message)
|
|
|
|
u.log.debug('OK')
|
|
|
|
def test_201_keystone_designate_identity_relation(self):
|
|
"""Verify the keystone to designate identity-service relation data"""
|
|
u.log.debug('Checking keystone:designate identity relation data...')
|
|
unit = self.keystone_sentry
|
|
relation = ['identity-service', 'designate:identity-service']
|
|
id_relation = unit.relation('identity-service',
|
|
'designate:identity-service')
|
|
id_ip = id_relation['private-address']
|
|
expected = {
|
|
'admin_token': 'ubuntutesting',
|
|
'auth_host': id_ip,
|
|
'auth_port': "35357",
|
|
'auth_protocol': 'http',
|
|
'private-address': id_ip,
|
|
'service_host': id_ip,
|
|
'service_password': u.not_null,
|
|
'service_port': "5000",
|
|
'service_protocol': 'http',
|
|
'service_tenant': 'services',
|
|
'service_tenant_id': u.not_null,
|
|
'service_username': 'designate',
|
|
}
|
|
ret = u.validate_relation_data(unit, relation, expected)
|
|
if ret:
|
|
message = u.relation_error('keystone identity-service', ret)
|
|
amulet.raise_status(amulet.FAIL, msg=message)
|
|
|
|
u.log.debug('OK')
|
|
|
|
def test_203_designate_amqp_relation(self):
|
|
"""Verify the designate to rabbitmq-server amqp relation data"""
|
|
u.log.debug('Checking designate:rabbitmq amqp relation data...')
|
|
unit = self.designate_sentry
|
|
relation = ['amqp', 'rabbitmq-server:amqp']
|
|
expected = {
|
|
'username': 'designate',
|
|
'private-address': u.valid_ip,
|
|
'vhost': 'openstack'
|
|
}
|
|
|
|
ret = u.validate_relation_data(unit, relation, expected)
|
|
if ret:
|
|
message = u.relation_error('designate amqp', ret)
|
|
amulet.raise_status(amulet.FAIL, msg=message)
|
|
|
|
u.log.debug('OK')
|
|
|
|
def test_204_amqp_designate_relation(self):
|
|
"""Verify the rabbitmq-server to designate amqp relation data"""
|
|
u.log.debug('Checking rabbitmq:designate amqp relation data...')
|
|
unit = self.rabbitmq_sentry
|
|
relation = ['amqp', 'designate:amqp']
|
|
expected = {
|
|
'hostname': u.valid_ip,
|
|
'private-address': u.valid_ip,
|
|
'password': u.not_null,
|
|
}
|
|
|
|
ret = u.validate_relation_data(unit, relation, expected)
|
|
if ret:
|
|
message = u.relation_error('rabbitmq amqp', ret)
|
|
amulet.raise_status(amulet.FAIL, msg=message)
|
|
|
|
u.log.debug('OK')
|
|
|
|
def test_205_designate_designate_bind_relation(self):
|
|
"""Verify the designate to designate-bind dns-backend relation data"""
|
|
u.log.debug('Checking designate:designate-bind dns-backend relation'
|
|
'data...')
|
|
unit = self.designate_sentry
|
|
relation = ['dns-backend', 'designate-bind:dns-backend']
|
|
expected = {
|
|
'private-address': u.valid_ip,
|
|
}
|
|
|
|
ret = u.validate_relation_data(unit, relation, expected)
|
|
if ret:
|
|
message = u.relation_error('designate dns-backend', ret)
|
|
amulet.raise_status(amulet.FAIL, msg=message)
|
|
|
|
def test_206_designate_bind_designate_relation(self):
|
|
"""Verify the designate_bind to designate dns-backend relation data"""
|
|
u.log.debug('Checking designate-bind:designate dns-backend relation'
|
|
'data...')
|
|
unit = self.designate_bind_sentry
|
|
relation = ['dns-backend', 'designate:dns-backend']
|
|
expected = {
|
|
'private-address': u.valid_ip,
|
|
'rndckey': u.not_null,
|
|
'algorithm': 'hmac-md5',
|
|
}
|
|
|
|
ret = u.validate_relation_data(unit, relation, expected)
|
|
if ret:
|
|
message = u.relation_error('designate dns-backend', ret)
|
|
amulet.raise_status(amulet.FAIL, msg=message)
|
|
|
|
def test_207_designate_neutron_api_relation(self):
|
|
"""Verify the designate to neutron-api relation data"""
|
|
u.log.debug('Checking designate:dnsaas relation data...')
|
|
unit = self.designate_sentry
|
|
relation = ['dnsaas', 'neutron-api:external-dns']
|
|
designate_ip = u.valid_ip
|
|
expected = {
|
|
'endpoint': u.valid_url,
|
|
'private-address': designate_ip,
|
|
}
|
|
ret = u.validate_relation_data(unit, relation, expected)
|
|
if ret:
|
|
message = u.relation_error('designate dnsaas', ret)
|
|
amulet.raise_status(amulet.FAIL, msg=message)
|
|
|
|
def test_208_neutron_api_designate_relation(self):
|
|
"""Verify the neutron-api to designate relation data"""
|
|
u.log.debug('Checking neutron-api:external-dns relation data...')
|
|
unit = self.neutron_api_sentry
|
|
relation = ['external-dns', 'designate:dnsaas']
|
|
expected = {
|
|
'private-address': u.valid_ip,
|
|
}
|
|
ret = u.validate_relation_data(unit, relation, expected)
|
|
if ret:
|
|
message = u.relation_error('neutron-api external-dns', ret)
|
|
amulet.raise_status(amulet.FAIL, msg=message)
|
|
|
|
def get_server_id(self, server_name):
|
|
server_id = None
|
|
for server in self.designate.servers.list():
|
|
if server.name == server_name:
|
|
server_id = server.id
|
|
break
|
|
return server_id
|
|
|
|
def get_test_server_id(self):
|
|
return self.get_server_id(self.TEST_NS2_RECORD)
|
|
|
|
def check_test_server_gone(self):
|
|
return not self.get_test_server_id()
|
|
|
|
def test_400_server_creation(self):
|
|
"""Simple api calls to create domain"""
|
|
# Designate does not allow the last server to be delete so ensure ns1
|
|
# always present
|
|
if self._get_openstack_release() >= self.xenial_queens:
|
|
u.log.info('Skipping server creation tests for Queens and above')
|
|
return
|
|
if not self.get_server_id(self.TEST_NS1_RECORD):
|
|
server = servers.Server(name=self.TEST_NS1_RECORD)
|
|
new_server = self.designate.servers.create(server)
|
|
|
|
u.log.debug('Checking if server exists before trying to create it')
|
|
old_server_id = self.get_test_server_id()
|
|
if old_server_id:
|
|
u.log.debug('Deleting old server')
|
|
self.designate.servers.delete(old_server_id)
|
|
self.check_and_wait(
|
|
self.check_test_server_gone,
|
|
desc='Waiting for server to disappear')
|
|
u.log.debug('Creating new server')
|
|
server = servers.Server(name=self.TEST_NS2_RECORD)
|
|
new_server = self.designate.servers.create(server)
|
|
assert(new_server is not None)
|
|
|
|
def get_domain_id(self, domain_name):
|
|
domain_id = None
|
|
for dom in self.designate.domains.list():
|
|
if dom.name == domain_name:
|
|
domain_id = dom.id
|
|
break
|
|
return domain_id
|
|
|
|
def get_test_domain_id(self):
|
|
return self.get_domain_id(self.TEST_DOMAIN)
|
|
|
|
def get_test_zone_id(self):
|
|
zone_id = None
|
|
for zone in self.designate.zones.list():
|
|
if zone['name'] == self.TEST_DOMAIN:
|
|
zone_id = zone['id']
|
|
break
|
|
return zone_id
|
|
|
|
def check_test_domain_gone(self):
|
|
return not self.get_test_domain_id()
|
|
|
|
def check_test_zone_gone(self):
|
|
return not self.get_test_zone_id()
|
|
|
|
def check_slave_resolve_test_record(self):
|
|
lookup_cmd = [
|
|
'dig', '+short', '@{}'.format(self.dns_slave_ip),
|
|
self.TEST_WWW_RECORD]
|
|
cmd_out = subprocess.check_output(lookup_cmd).rstrip('\r\n')
|
|
return self.TEST_RECORD[self.TEST_WWW_RECORD] == cmd_out
|
|
|
|
def test_410_domain_creation(self):
|
|
if self._get_openstack_release() >= self.xenial_queens:
|
|
self.v3_410_zone_creation()
|
|
else:
|
|
self.v2_410_domain_creation()
|
|
|
|
def v3_410_zone_creation(self):
|
|
"""Simple api calls to create domain"""
|
|
u.log.debug('Checking if zone exists before trying to create it')
|
|
old_zone_id = self.get_test_zone_id()
|
|
if old_zone_id:
|
|
u.log.debug('Deleting old zone')
|
|
self.designate.zones.delete(old_zone_id)
|
|
self.check_and_wait(
|
|
self.check_test_zone_gone,
|
|
desc='Waiting for zone to disappear')
|
|
u.log.debug('Creating new zone')
|
|
zone = self.designate.zones.create(
|
|
name=self.TEST_DOMAIN,
|
|
email="fred@amuletexample.com")
|
|
assert(zone is not None)
|
|
rs = self.designate.recordsets.create(
|
|
zone['id'],
|
|
'www',
|
|
'A',
|
|
[self.TEST_RECORD[self.TEST_WWW_RECORD]])
|
|
self.check_and_wait(
|
|
self.check_slave_resolve_test_record,
|
|
desc='Waiting for dns record to propagate')
|
|
u.log.debug('Tidy up delete test record')
|
|
self.designate.recordsets.delete(zone['id'], rs['id'])
|
|
u.log.debug('OK')
|
|
|
|
def v2_410_domain_creation(self):
|
|
"""Simple api calls to create domain"""
|
|
u.log.debug('Checking if domain exists before trying to create it')
|
|
old_dom_id = self.get_test_domain_id()
|
|
if old_dom_id:
|
|
u.log.debug('Deleting old domain')
|
|
self.designate.domains.delete(old_dom_id)
|
|
self.check_and_wait(
|
|
self.check_test_domain_gone,
|
|
desc='Waiting for domain to disappear')
|
|
u.log.debug('Creating new domain')
|
|
domain = domains.Domain(
|
|
name=self.TEST_DOMAIN,
|
|
email="fred@amuletexample.com")
|
|
new_domain = self.designate.domains.create(domain)
|
|
assert(new_domain is not None)
|
|
|
|
u.log.debug('Creating new test record')
|
|
_record = records.Record(
|
|
name=self.TEST_WWW_RECORD,
|
|
type="A",
|
|
data=self.TEST_RECORD[self.TEST_WWW_RECORD])
|
|
|
|
self.designate.records.create(new_domain.id, _record)
|
|
self.check_and_wait(
|
|
self.check_slave_resolve_test_record,
|
|
desc='Waiting for dns record to propagate')
|
|
u.log.debug('Tidy up delete test record')
|
|
self.designate.domains.delete(new_domain.id)
|
|
u.log.debug('OK')
|
|
|
|
def test_900_restart_on_config_change(self):
|
|
"""Verify that the specified services are restarted when the config
|
|
is changed.
|
|
"""
|
|
sentry = self.designate_sentry
|
|
juju_service = 'designate'
|
|
|
|
# Expected default and alternate values
|
|
set_default = {'debug': 'False'}
|
|
set_alternate = {'debug': 'True'}
|
|
|
|
# Services which are expected to restart upon config change,
|
|
# and corresponding config files affected by the change
|
|
conf_file = '/etc/designate/designate.conf'
|
|
services = {svc: conf_file for svc in self.designate_svcs}
|
|
|
|
# Make config change, check for service restarts
|
|
u.log.debug('Making config change on {}...'.format(juju_service))
|
|
mtime = u.get_sentry_time(sentry)
|
|
self.d.configure(juju_service, set_alternate)
|
|
|
|
sleep_time = 50
|
|
for s, conf_file in services.iteritems():
|
|
u.log.debug("Checking that service restarted: {}".format(s))
|
|
if not u.validate_service_config_changed(sentry, mtime, s,
|
|
conf_file,
|
|
retry_count=4,
|
|
retry_sleep_time=20,
|
|
sleep_time=sleep_time):
|
|
self.d.configure(juju_service, set_default)
|
|
msg = "service {} didn't restart after config change".format(s)
|
|
amulet.raise_status(amulet.FAIL, msg=msg)
|
|
sleep_time = 0
|
|
|
|
self.d.configure(juju_service, set_default)
|
|
u.log.debug('OK')
|