From dc8edb6e66d8a76e70fb92732924575258ba910c Mon Sep 17 00:00:00 2001 From: Aleksandr Didenko Date: Thu, 11 Dec 2014 12:26:44 +0200 Subject: [PATCH] Modular noop tests We can run noop tests via 'rake spec'. This will allow us to: - Make sure that catalog compiles and there are no dependency cycles in the graph. - Use RSpec tests to check that needed puppet resources present in the catalog for specific astute.yaml configuration. In order to test just execute these commands: export WORKSPACE=/tmp/fuel_noop_tests mkdir -p $WORKSPACE ./utils/jenkins/fuel_noop_tests.sh It iterates over astsute.yaml files and runs rspec tests for puppet tasks configured in the astute.yaml for the node. In order to run specific test and/or specific astute.yaml, you can set appropriate env variables. For example: export NOOP_TEST="keystone/*" export NOOP_YAMLS="tests/noop/astute.yaml/novanet_flat.primary-controller.yaml" ./utils/jenkins/fuel_noop_tests.sh If you also want to store puppet logs in case of errors, please set PUPPET_LOGS_DIR env variable: export PUPPET_LOGS_DIR=/tmp/puppet_error_logs If you want to store all the delcarated File and Package resources, please set NOOP_SAVE_RESOURCES_DIR env variable: export NOOP_SAVE_RESOURCES_DIR=/tmp/puppet_resources Related-bug: #1402738 Implement blueprint deployment-dryrun Fuel CI temporarily disabled since this change does not affect MOS deplyoment process, only CI itself. Fuel-CI: disable Change-Id: I38b23832d1e8701440aacb300256f513c466c762 --- tests/noop/.gitignore | 2 + tests/noop/.rspec | 2 + tests/noop/Gemfile | 18 + tests/noop/README.rst | 26 + tests/noop/Rakefile | 13 + tests/noop/astute.yaml/.gitignore | 1 + .../neut_gre.murano.sahara-cinder.yaml | 538 ++++++++++++ .../neut_gre.murano.sahara-compute.yaml | 556 ++++++++++++ .../neut_gre.murano.sahara-controller.yaml | 795 +++++++++++++++++ ..._gre.murano.sahara-primary-controller.yaml | 795 +++++++++++++++++ .../neut_vlan.ceph.ceil-ceph-osd.yaml | 549 ++++++++++++ .../neut_vlan.ceph.ceil-compute.yaml | 567 ++++++++++++ ...eut_vlan.ceph.ceil-primary-controller.yaml | 806 ++++++++++++++++++ .../neut_vlan.ceph.ceil-primary-mongo.yaml | 549 ++++++++++++ tests/noop/astute.yaml/novanet-compute.yaml | 509 +++++++++++ .../novanet-primary-controller.yaml | 725 ++++++++++++++++ .../astute.yaml/novanet-zabbix-server.yaml | 482 +++++++++++ tests/noop/file_resources/.gitignore | 1 + tests/noop/fixtures/hiera.yaml | 12 + tests/noop/generate/.gitignore | 1 + tests/noop/make_specs.rb | 25 + tests/noop/package_resources/.gitignore | 1 + tests/noop/rspec.sh | 4 + tests/noop/spec/hosts/010_globals_spec.rb | 24 + .../spec/hosts/api-proxy/api-proxy_spec.rb | 8 + .../spec/hosts/ceilometer/compute_spec.rb | 8 + .../spec/hosts/ceilometer/controller_spec.rb | 32 + tests/noop/spec/hosts/ceph/mon_spec.rb | 8 + tests/noop/spec/hosts/ceph/radosgw_spec.rb | 8 + .../cluster-haproxy/cluster-haproxy_spec.rb | 27 + tests/noop/spec/hosts/cluster/cluster_spec.rb | 8 + .../noop/spec/hosts/database/database_spec.rb | 8 + tests/noop/spec/hosts/dns/dns-client_spec.rb | 8 + tests/noop/spec/hosts/dns/dns-server_spec.rb | 8 + .../noop/spec/hosts/firewall/firewall_spec.rb | 8 + tests/noop/spec/hosts/glance/glance_spec.rb | 8 + tests/noop/spec/hosts/heat/heat_spec.rb | 8 + tests/noop/spec/hosts/hiera/hiera_spec.rb | 8 + tests/noop/spec/hosts/horizon/horizon_spec.rb | 23 + tests/noop/spec/hosts/hosts/hosts_spec.rb | 8 + .../noop/spec/hosts/keystone/keystone_spec.rb | 40 + tests/noop/spec/hosts/logging/logging_spec.rb | 8 + .../spec/hosts/memcached/memcached_spec.rb | 8 + tests/noop/spec/hosts/murano/murano_spec.rb | 23 + .../spec/hosts/netconfig/netconfig_spec.rb | 8 + tests/noop/spec/hosts/ntp/ntp-client_spec.rb | 8 + tests/noop/spec/hosts/ntp/ntp-server_spec.rb | 8 + tests/noop/spec/hosts/ntp/timesync_spec.rb | 8 + .../openstack-cinder/openstack-cinder_spec.rb | 8 + .../openstack-controller_spec.rb | 39 + .../openstack-haproxy_spec.rb | 8 + .../openstack-network-compute_spec.rb | 74 ++ .../openstack-network-controller_spec.rb | 54 ++ .../noop/spec/hosts/rabbitmq/rabbitmq_spec.rb | 8 + tests/noop/spec/hosts/roles/ceph-osd_spec.rb | 8 + tests/noop/spec/hosts/roles/cinder_spec.rb | 8 + tests/noop/spec/hosts/roles/compute_spec.rb | 66 ++ .../noop/spec/hosts/roles/controller_spec.rb | 23 + .../spec/hosts/roles/mongo_primary_spec.rb | 8 + tests/noop/spec/hosts/roles/mongo_spec.rb | 8 + tests/noop/spec/hosts/sahara/sahara_spec.rb | 26 + .../hosts/swift/rebalance_cronjob_spec.rb | 8 + tests/noop/spec/hosts/swift/swift_spec.rb | 51 ++ tests/noop/spec/hosts/tools/tools_spec.rb | 8 + tests/noop/spec/hosts/umm/umm_spec.rb | 8 + .../spec/hosts/virtual_ips/conntrackd_spec.rb | 8 + .../hosts/virtual_ips/virtual_ips_spec.rb | 8 + .../spec/hosts/vmware/cinder-vmware_spec.rb | 8 + tests/noop/spec/hosts/vmware/compute_spec.rb | 8 + tests/noop/spec/hosts/vmware/vcenter_spec.rb | 8 + tests/noop/spec/hosts/zabbix/zabbix_spec.rb | 8 + tests/noop/spec/shared-examples.rb | 127 +++ tests/noop/spec/spec_helper.rb | 236 +++++ utils/jenkins/fuel_noop_tests.sh | 67 ++ 74 files changed, 8189 insertions(+) create mode 100644 tests/noop/.gitignore create mode 100644 tests/noop/.rspec create mode 100644 tests/noop/Gemfile create mode 100644 tests/noop/README.rst create mode 100644 tests/noop/Rakefile create mode 100644 tests/noop/astute.yaml/.gitignore create mode 100644 tests/noop/astute.yaml/neut_gre.murano.sahara-cinder.yaml create mode 100644 tests/noop/astute.yaml/neut_gre.murano.sahara-compute.yaml create mode 100644 tests/noop/astute.yaml/neut_gre.murano.sahara-controller.yaml create mode 100644 tests/noop/astute.yaml/neut_gre.murano.sahara-primary-controller.yaml create mode 100644 tests/noop/astute.yaml/neut_vlan.ceph.ceil-ceph-osd.yaml create mode 100644 tests/noop/astute.yaml/neut_vlan.ceph.ceil-compute.yaml create mode 100644 tests/noop/astute.yaml/neut_vlan.ceph.ceil-primary-controller.yaml create mode 100644 tests/noop/astute.yaml/neut_vlan.ceph.ceil-primary-mongo.yaml create mode 100644 tests/noop/astute.yaml/novanet-compute.yaml create mode 100644 tests/noop/astute.yaml/novanet-primary-controller.yaml create mode 100644 tests/noop/astute.yaml/novanet-zabbix-server.yaml create mode 100644 tests/noop/file_resources/.gitignore create mode 100644 tests/noop/fixtures/hiera.yaml create mode 100644 tests/noop/generate/.gitignore create mode 100644 tests/noop/make_specs.rb create mode 100644 tests/noop/package_resources/.gitignore create mode 100755 tests/noop/rspec.sh create mode 100644 tests/noop/spec/hosts/010_globals_spec.rb create mode 100644 tests/noop/spec/hosts/api-proxy/api-proxy_spec.rb create mode 100644 tests/noop/spec/hosts/ceilometer/compute_spec.rb create mode 100644 tests/noop/spec/hosts/ceilometer/controller_spec.rb create mode 100644 tests/noop/spec/hosts/ceph/mon_spec.rb create mode 100644 tests/noop/spec/hosts/ceph/radosgw_spec.rb create mode 100644 tests/noop/spec/hosts/cluster-haproxy/cluster-haproxy_spec.rb create mode 100644 tests/noop/spec/hosts/cluster/cluster_spec.rb create mode 100644 tests/noop/spec/hosts/database/database_spec.rb create mode 100644 tests/noop/spec/hosts/dns/dns-client_spec.rb create mode 100644 tests/noop/spec/hosts/dns/dns-server_spec.rb create mode 100644 tests/noop/spec/hosts/firewall/firewall_spec.rb create mode 100644 tests/noop/spec/hosts/glance/glance_spec.rb create mode 100644 tests/noop/spec/hosts/heat/heat_spec.rb create mode 100644 tests/noop/spec/hosts/hiera/hiera_spec.rb create mode 100644 tests/noop/spec/hosts/horizon/horizon_spec.rb create mode 100644 tests/noop/spec/hosts/hosts/hosts_spec.rb create mode 100644 tests/noop/spec/hosts/keystone/keystone_spec.rb create mode 100644 tests/noop/spec/hosts/logging/logging_spec.rb create mode 100644 tests/noop/spec/hosts/memcached/memcached_spec.rb create mode 100644 tests/noop/spec/hosts/murano/murano_spec.rb create mode 100644 tests/noop/spec/hosts/netconfig/netconfig_spec.rb create mode 100644 tests/noop/spec/hosts/ntp/ntp-client_spec.rb create mode 100644 tests/noop/spec/hosts/ntp/ntp-server_spec.rb create mode 100644 tests/noop/spec/hosts/ntp/timesync_spec.rb create mode 100644 tests/noop/spec/hosts/openstack-cinder/openstack-cinder_spec.rb create mode 100644 tests/noop/spec/hosts/openstack-controller/openstack-controller_spec.rb create mode 100644 tests/noop/spec/hosts/openstack-haproxy/openstack-haproxy_spec.rb create mode 100644 tests/noop/spec/hosts/openstack-network/openstack-network-compute_spec.rb create mode 100644 tests/noop/spec/hosts/openstack-network/openstack-network-controller_spec.rb create mode 100644 tests/noop/spec/hosts/rabbitmq/rabbitmq_spec.rb create mode 100644 tests/noop/spec/hosts/roles/ceph-osd_spec.rb create mode 100644 tests/noop/spec/hosts/roles/cinder_spec.rb create mode 100644 tests/noop/spec/hosts/roles/compute_spec.rb create mode 100644 tests/noop/spec/hosts/roles/controller_spec.rb create mode 100644 tests/noop/spec/hosts/roles/mongo_primary_spec.rb create mode 100644 tests/noop/spec/hosts/roles/mongo_spec.rb create mode 100644 tests/noop/spec/hosts/sahara/sahara_spec.rb create mode 100644 tests/noop/spec/hosts/swift/rebalance_cronjob_spec.rb create mode 100644 tests/noop/spec/hosts/swift/swift_spec.rb create mode 100644 tests/noop/spec/hosts/tools/tools_spec.rb create mode 100644 tests/noop/spec/hosts/umm/umm_spec.rb create mode 100644 tests/noop/spec/hosts/virtual_ips/conntrackd_spec.rb create mode 100644 tests/noop/spec/hosts/virtual_ips/virtual_ips_spec.rb create mode 100644 tests/noop/spec/hosts/vmware/cinder-vmware_spec.rb create mode 100644 tests/noop/spec/hosts/vmware/compute_spec.rb create mode 100644 tests/noop/spec/hosts/vmware/vcenter_spec.rb create mode 100644 tests/noop/spec/hosts/zabbix/zabbix_spec.rb create mode 100644 tests/noop/spec/shared-examples.rb create mode 100644 tests/noop/spec/spec_helper.rb create mode 100755 utils/jenkins/fuel_noop_tests.sh diff --git a/tests/noop/.gitignore b/tests/noop/.gitignore new file mode 100644 index 0000000000..db869babb7 --- /dev/null +++ b/tests/noop/.gitignore @@ -0,0 +1,2 @@ +deprecations.log +Gemfile.lock diff --git a/tests/noop/.rspec b/tests/noop/.rspec new file mode 100644 index 0000000000..a51f56af65 --- /dev/null +++ b/tests/noop/.rspec @@ -0,0 +1,2 @@ +-f doc +--color diff --git a/tests/noop/Gemfile b/tests/noop/Gemfile new file mode 100644 index 0000000000..0769ab9e84 --- /dev/null +++ b/tests/noop/Gemfile @@ -0,0 +1,18 @@ +source 'https://rubygems.org' + +group :development, :test do + gem 'puppetlabs_spec_helper', :require => false + gem 'puppet-lint', '~> 0.3.2' + gem 'rspec-puppet', '~> 2.0.0' + gem 'openstack', :require => false + gem 'netaddr', :require => false +end + +if puppetversion = ENV['PUPPET_GEM_VERSION'] + gem 'puppet', puppetversion, :require => false +else + gem 'puppet', :require => false +end + +# vim:ft=ruby + diff --git a/tests/noop/README.rst b/tests/noop/README.rst new file mode 100644 index 0000000000..bae2a578b6 --- /dev/null +++ b/tests/noop/README.rst @@ -0,0 +1,26 @@ +Fuel noop rspec tests +===================== + +In order to test just execute these commands:: + + export WORKSPACE=/tmp/fuel_noop_tests + mkdir -p $WORKSPACE + ./utils/jenkins/fuel_noop_tests.sh + +In order to run specific test and/or specific astute.yaml, you can +set appropriate env variables. For example:: + + export NOOP_TEST='keystone/*' + export NOOP_YAMLS='/path/to/your/astute.yaml' + ./utils/jenkins/fuel_noop_tests.sh + +If you also want to store puppet logs in case of catalog +compilation errors, please set PUPPET_LOGS_DIR env variable:: + + export PUPPET_LOGS_DIR=/tmp/puppet_error_logs + +If you want to store all the delcarated File and Package resources, +please set NOOP_SAVE_RESOURCES_DIR env variable:: + + export NOOP_SAVE_RESOURCES_DIR=/tmp/puppet_resources + diff --git a/tests/noop/Rakefile b/tests/noop/Rakefile new file mode 100644 index 0000000000..da34ce4b00 --- /dev/null +++ b/tests/noop/Rakefile @@ -0,0 +1,13 @@ +require 'rspec/core/rake_task' + +RSpec::Core::RakeTask.new(:spec) do |t| + t.rspec_opts = '--deprecation-out deprecations.log --color --format documentation' + if ENV['NOOP_TEST'] + t.pattern = 'spec/*/' + ENV['NOOP_TEST'] + '_spec.rb' + else + t.pattern = 'spec/{*,*/*}/*_spec.rb' + end +end + +task :default => :spec + diff --git a/tests/noop/astute.yaml/.gitignore b/tests/noop/astute.yaml/.gitignore new file mode 100644 index 0000000000..767ce75a93 --- /dev/null +++ b/tests/noop/astute.yaml/.gitignore @@ -0,0 +1 @@ +globals_yaml_for_*yaml diff --git a/tests/noop/astute.yaml/neut_gre.murano.sahara-cinder.yaml b/tests/noop/astute.yaml/neut_gre.murano.sahara-cinder.yaml new file mode 100644 index 0000000000..75c1220dfe --- /dev/null +++ b/tests/noop/astute.yaml/neut_gre.murano.sahara-cinder.yaml @@ -0,0 +1,538 @@ +access: + email: admin@localhost + metadata: + label: Access + weight: 10 + password: admin + tenant: admin + user: admin +auth_key: '' +auto_assign_floating_ip: false +base_syslog: + syslog_port: '514' + syslog_server: 10.108.0.2 +ceilometer: + db_password: ZcffCIm5 + enabled: false + metering_secret: 7aqxzabx + user_password: FQUfTQ6a +cinder: + db_password: 71kNkN9U + fixed_key: 0ded0202e2a355df942df2bacbaba992658a0345f68f2db6e1bdb6dbb8f682cf + user_password: O2st17AP +cobbler: + profile: ubuntu_1404_x86_64 +corosync: + group: 226.94.1.1 + metadata: + label: Corosync + restrictions: + - action: hide + condition: 'true' + weight: 50 + port: '12000' + verified: false +debug: false +deployment_id: 38 +deployment_mode: ha_compact +external_dns: + dns_list: 8.8.8.8, 8.8.4.4 + metadata: + label: Upstream DNS + weight: 90 +external_mongo: + hosts_ip: '' + metadata: + label: External MongoDB + restrictions: + - action: hide + condition: settings:additional_components.mongo.value == false + weight: 20 + mongo_db_name: ceilometer + mongo_password: ceilometer + mongo_replset: '' + mongo_user: ceilometer +external_ntp: + metadata: + label: Upstream NTP + weight: 100 + ntp_list: 0.pool.ntp.org, 1.pool.ntp.org +fail_if_error: false +fqdn: node-118.test.domain.local +fuel_version: '6.1' +glance: + db_password: 0UYCFNfc + image_cache_max_size: '5368709120' + user_password: 94lWbeNn +heat: + auth_encryption_key: 8edb899a7e81e56abe51639880aa32dd + db_password: AuaPc3Yq + enabled: true + rabbit_password: Nmn2wr9S + user_password: EWJfBLJ9 +kernel_params: + kernel: console=ttyS0,9600 console=tty0 net.ifnames=0 biosdevname=0 rootdelay=90 + nomodeset + metadata: + label: Kernel parameters + weight: 40 +keystone: + admin_token: 0be9G8hj + db_password: 32TWl29R +last_controller: node-131 +libvirt_type: qemu +management_network_range: 192.168.0.0/24 +management_vip: 192.168.0.6 +management_vrouter_vip: 192.168.0.7 +master_ip: 10.108.0.2 +metadata: + label: Common + weight: 30 +mongo: + enabled: false +mp: +- point: '1' + weight: '1' +- point: '2' + weight: '2' +murano: + db_password: R3SuvZbh + enabled: true + rabbit_password: ZNdTAgF3 + user_password: xP8WtHQw +murano_settings: + metadata: + label: Murano Settings + restrictions: + - action: hide + condition: settings:additional_components.murano.value == false + weight: 20 + murano_repo_url: http://catalog.openstack.org/ +mysql: + root_password: Lz18BpbQ + wsrep_password: JrlrVOHu +network_scheme: + endpoints: + br-fw-admin: + IP: + - 10.108.0.7/24 + br-mgmt: + IP: + - 192.168.0.1/24 + gateway: 192.168.0.7 + vendor_specific: + phy_interfaces: + - eth0 + vlans: 101 + br-storage: + IP: + - 192.168.1.1/24 + vendor_specific: + phy_interfaces: + - eth0 + vlans: 102 + interfaces: + eth0: + vendor_specific: + bus_info: '0000:00:03.0' + driver: e1000 + eth1: + vendor_specific: + bus_info: '0000:00:04.0' + driver: e1000 + eth2: + vendor_specific: + bus_info: '0000:00:05.0' + driver: e1000 + eth3: + vendor_specific: + bus_info: '0000:00:06.0' + driver: e1000 + eth4: + vendor_specific: + bus_info: '0000:00:07.0' + driver: e1000 + provider: lnx + roles: + fw-admin: br-fw-admin + management: br-mgmt + neutron/mesh: br-mgmt + storage: br-storage + transformations: + - action: add-br + name: br-fw-admin + - action: add-br + name: br-mgmt + - action: add-br + name: br-storage + - action: add-port + bridge: br-fw-admin + name: eth0 + - action: add-port + bridge: br-storage + name: eth0.102 + - action: add-port + bridge: br-mgmt + name: eth0.101 + version: '1.1' +neutron_mellanox: + metadata: + enabled: true + label: Mellanox Neutron components + toggleable: false + weight: 50 + plugin: disabled + vf_num: '16' +nodes: +- fqdn: node-118.test.domain.local + internal_address: 192.168.0.1 + internal_netmask: 255.255.255.0 + name: node-118 + role: cinder + storage_address: 192.168.1.1 + storage_netmask: 255.255.255.0 + swift_zone: '118' + uid: '118' + user_node_name: Untitled (1d:4b) +- fqdn: node-128.test.domain.local + internal_address: 192.168.0.2 + internal_netmask: 255.255.255.0 + name: node-128 + public_address: 172.16.0.2 + public_netmask: 255.255.255.0 + role: primary-controller + storage_address: 192.168.1.2 + storage_netmask: 255.255.255.0 + swift_zone: '128' + uid: '128' + user_node_name: Untitled (6f:9d) +- fqdn: node-129.test.domain.local + internal_address: 192.168.0.3 + internal_netmask: 255.255.255.0 + name: node-129 + public_address: 172.16.0.3 + public_netmask: 255.255.255.0 + role: controller + storage_address: 192.168.1.3 + storage_netmask: 255.255.255.0 + swift_zone: '129' + uid: '129' + user_node_name: Untitled (74:27) +- fqdn: node-131.test.domain.local + internal_address: 192.168.0.4 + internal_netmask: 255.255.255.0 + name: node-131 + public_address: 172.16.0.4 + public_netmask: 255.255.255.0 + role: controller + storage_address: 192.168.1.4 + storage_netmask: 255.255.255.0 + swift_zone: '131' + uid: '131' + user_node_name: Untitled (34:45) +- fqdn: node-132.test.domain.local + internal_address: 192.168.0.5 + internal_netmask: 255.255.255.0 + name: node-132 + role: compute + storage_address: 192.168.1.5 + storage_netmask: 255.255.255.0 + swift_zone: '132' + uid: '132' + user_node_name: Untitled (18:c9) +nova: + db_password: mqnsUMgC + state_path: /var/lib/nova + user_password: fj4wVCEs +nova_quota: false +online: true +openstack_version: 2014.2-6.1 +openstack_version_prev: null +priority: 300 +provision: + codename: trusty + image_data: + /: + container: gzip + format: ext4 + uri: http://10.108.0.2:8080/targetimages/env_38_ubuntu_1404_amd64.img.gz + /boot: + container: gzip + format: ext2 + uri: http://10.108.0.2:8080/targetimages/env_38_ubuntu_1404_amd64-boot.img.gz + metadata: + label: Provision + weight: 80 + method: image +public_network_assignment: + assign_to_all_nodes: false + metadata: + label: Public network assignment + restrictions: + - action: hide + condition: cluster:net_provider != 'neutron' + weight: 50 +public_vip: 172.16.0.5 +public_vrouter_vip: 172.16.0.6 +puppet: + manifests: rsync://10.108.0.2:/puppet/2014.2-6.1/manifests/ + modules: rsync://10.108.0.2:/puppet/2014.2-6.1/modules/ +puppet_debug: true +quantum: true +quantum_settings: + L2: + base_mac: fa:16:3e:00:00:00 + phys_nets: {} + segmentation_type: gre + tunnel_id_ranges: 2:65535 + L3: + use_namespaces: true + database: + passwd: QRpCfPk8 + keystone: + admin_password: oT56DSZF + metadata: + metadata_proxy_shared_secret: fp618p5V + predefined_networks: + net04: + L2: + network_type: gre + physnet: null + router_ext: false + segment_id: null + L3: + enable_dhcp: true + floating: null + gateway: 192.168.111.1 + nameservers: + - 8.8.4.4 + - 8.8.8.8 + subnet: 192.168.111.0/24 + shared: false + tenant: admin + net04_ext: + L2: + network_type: local + physnet: null + router_ext: true + segment_id: null + L3: + enable_dhcp: false + floating: 172.16.0.130:172.16.0.254 + gateway: 172.16.0.1 + nameservers: [] + subnet: 172.16.0.0/24 + shared: false + tenant: admin +rabbit: + password: c7fQJeSe +repo_setup: + installer_initrd: + local: /var/www/nailgun/ubuntu/x86_64/images/initrd.gz + remote_relative: dists/trusty/main/installer-amd64/current/images/netboot/ubuntu-installer/amd64/initrd.gz + installer_kernel: + local: /var/www/nailgun/ubuntu/x86_64/images/linux + remote_relative: dists/trusty/main/installer-amd64/current/images/netboot/ubuntu-installer/amd64/linux + metadata: + label: Repositories + weight: 50 + repos: + - name: ubuntu + priority: null + section: main universe multiverse + suite: trusty + type: deb + uri: http://archive.ubuntu.com/ubuntu/ + - name: ubuntu-updates + priority: null + section: main universe multiverse + suite: trusty-updates + type: deb + uri: http://archive.ubuntu.com/ubuntu/ + - name: ubuntu-security + priority: null + section: main universe multiverse + suite: trusty-security + type: deb + uri: http://archive.ubuntu.com/ubuntu/ + - name: mos + priority: 1050 + section: main restricted + suite: mos6.1 + type: deb + uri: http://10.108.0.2:8080/2014.2-6.1/ubuntu/x86_64 + - name: mos-updates + priority: 1050 + section: main restricted + suite: mos6.1-updates + type: deb + uri: http://mirror.fuel-infra.org/mos/ubuntu/ + - name: mos-security + priority: 1050 + section: main restricted + suite: mos6.1-security + type: deb + uri: http://mirror.fuel-infra.org/mos/ubuntu/ + - name: mos-holdback + priority: 1100 + section: main restricted + suite: mos6.1-holdback + type: deb + uri: http://mirror.fuel-infra.org/mos/ubuntu/ +resume_guests_state_on_host_boot: true +role: cinder +sahara: + db_password: f0jl4v47 + enabled: true + user_password: pJc2zAOx +status: discover +storage: + ephemeral_ceph: false + images_ceph: false + images_vcenter: false + iser: false + metadata: + label: Storage + weight: 60 + objects_ceph: false + osd_pool_size: '2' + pg_num: 128 + volumes_ceph: false + volumes_lvm: true +storage_network_range: 192.168.1.0/24 +swift: + user_password: BP92J6tg +syslog: + metadata: + label: Syslog + weight: 50 + syslog_port: '514' + syslog_server: '' + syslog_transport: tcp +tasks: +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/hiera/hiera.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 100 + type: puppet + uids: + - '118' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/globals/globals.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 200 + type: puppet + uids: + - '118' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/logging/logging.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 300 + type: puppet + uids: + - '118' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/tools/tools.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 400 + type: puppet + uids: + - '118' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/netconfig/netconfig.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 500 + type: puppet + uids: + - '118' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/firewall/firewall.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 600 + type: puppet + uids: + - '118' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/hosts/hosts.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 700 + type: puppet + uids: + - '118' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/zabbix/zabbix.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 800 + type: puppet + uids: + - '118' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/roles/cinder.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 900 + type: puppet + uids: + - '118' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/dns/dns-client.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1000 + type: puppet + uids: + - '118' +test_vm_image: + container_format: bare + disk_format: qcow2 + glance_properties: '' + img_name: TestVM + img_path: /usr/share/cirros-testvm/cirros-x86_64-disk.img + min_ram: 64 + os_name: cirros + public: 'true' +uid: '118' +use_cinder: true +use_cow_images: true +use_vcenter: false +user_node_name: Untitled (1d:4b) +workloads_collector: + enabled: true + metadata: + label: Workloads Collector User + restrictions: + - action: hide + condition: 'true' + weight: 10 + password: 1r3ROjcQ + tenant: services + username: workloads_collector +zabbix: + db_password: ppbPNY1E + db_root_password: 09DsVeL3 + metadata: + label: Zabbix Access + restrictions: + - action: hide + condition: not ('experimental' in version:feature_groups) + weight: 70 + password: zabbix + username: admin diff --git a/tests/noop/astute.yaml/neut_gre.murano.sahara-compute.yaml b/tests/noop/astute.yaml/neut_gre.murano.sahara-compute.yaml new file mode 100644 index 0000000000..615c846abf --- /dev/null +++ b/tests/noop/astute.yaml/neut_gre.murano.sahara-compute.yaml @@ -0,0 +1,556 @@ +access: + email: admin@localhost + metadata: + label: Access + weight: 10 + password: admin + tenant: admin + user: admin +auth_key: '' +auto_assign_floating_ip: false +base_syslog: + syslog_port: '514' + syslog_server: 10.108.0.2 +ceilometer: + db_password: ZcffCIm5 + enabled: false + metering_secret: 7aqxzabx + user_password: FQUfTQ6a +cinder: + db_password: 71kNkN9U + fixed_key: 0ded0202e2a355df942df2bacbaba992658a0345f68f2db6e1bdb6dbb8f682cf + user_password: O2st17AP +cobbler: + profile: ubuntu_1404_x86_64 +corosync: + group: 226.94.1.1 + metadata: + label: Corosync + restrictions: + - action: hide + condition: 'true' + weight: 50 + port: '12000' + verified: false +debug: false +deployment_id: 38 +deployment_mode: ha_compact +external_dns: + dns_list: 8.8.8.8, 8.8.4.4 + metadata: + label: Upstream DNS + weight: 90 +external_mongo: + hosts_ip: '' + metadata: + label: External MongoDB + restrictions: + - action: hide + condition: settings:additional_components.mongo.value == false + weight: 20 + mongo_db_name: ceilometer + mongo_password: ceilometer + mongo_replset: '' + mongo_user: ceilometer +external_ntp: + metadata: + label: Upstream NTP + weight: 100 + ntp_list: 0.pool.ntp.org, 1.pool.ntp.org +fail_if_error: false +fqdn: node-132.test.domain.local +fuel_version: '6.1' +glance: + db_password: 0UYCFNfc + image_cache_max_size: '5368709120' + user_password: 94lWbeNn +heat: + auth_encryption_key: 8edb899a7e81e56abe51639880aa32dd + db_password: AuaPc3Yq + enabled: true + rabbit_password: Nmn2wr9S + user_password: EWJfBLJ9 +kernel_params: + kernel: console=ttyS0,9600 console=tty0 net.ifnames=0 biosdevname=0 rootdelay=90 + nomodeset + metadata: + label: Kernel parameters + weight: 40 +keystone: + admin_token: 0be9G8hj + db_password: 32TWl29R +last_controller: node-131 +libvirt_type: qemu +management_network_range: 192.168.0.0/24 +management_vip: 192.168.0.6 +management_vrouter_vip: 192.168.0.7 +master_ip: 10.108.0.2 +metadata: + label: Common + weight: 30 +mongo: + enabled: false +mp: +- point: '1' + weight: '1' +- point: '2' + weight: '2' +murano: + db_password: R3SuvZbh + enabled: true + rabbit_password: ZNdTAgF3 + user_password: xP8WtHQw +murano_settings: + metadata: + label: Murano Settings + restrictions: + - action: hide + condition: settings:additional_components.murano.value == false + weight: 20 + murano_repo_url: http://catalog.openstack.org/ +mysql: + root_password: Lz18BpbQ + wsrep_password: JrlrVOHu +network_scheme: + endpoints: + br-fw-admin: + IP: + - 10.108.0.4/24 + br-mgmt: + IP: + - 192.168.0.5/24 + gateway: 192.168.0.7 + vendor_specific: + phy_interfaces: + - eth0 + vlans: 101 + br-storage: + IP: + - 192.168.1.5/24 + vendor_specific: + phy_interfaces: + - eth0 + vlans: 102 + interfaces: + eth0: + vendor_specific: + bus_info: '0000:00:03.0' + driver: e1000 + eth1: + vendor_specific: + bus_info: '0000:00:04.0' + driver: e1000 + eth2: + vendor_specific: + bus_info: '0000:00:05.0' + driver: e1000 + eth3: + vendor_specific: + bus_info: '0000:00:06.0' + driver: e1000 + eth4: + vendor_specific: + bus_info: '0000:00:07.0' + driver: e1000 + provider: lnx + roles: + fw-admin: br-fw-admin + management: br-mgmt + neutron/mesh: br-mgmt + storage: br-storage + transformations: + - action: add-br + name: br-fw-admin + - action: add-br + name: br-mgmt + - action: add-br + name: br-storage + - action: add-port + bridge: br-fw-admin + name: eth0 + - action: add-port + bridge: br-storage + name: eth0.102 + - action: add-port + bridge: br-mgmt + name: eth0.101 + version: '1.1' +neutron_mellanox: + metadata: + enabled: true + label: Mellanox Neutron components + toggleable: false + weight: 50 + plugin: disabled + vf_num: '16' +nodes: +- fqdn: node-118.test.domain.local + internal_address: 192.168.0.1 + internal_netmask: 255.255.255.0 + name: node-118 + role: cinder + storage_address: 192.168.1.1 + storage_netmask: 255.255.255.0 + swift_zone: '118' + uid: '118' + user_node_name: Untitled (1d:4b) +- fqdn: node-128.test.domain.local + internal_address: 192.168.0.2 + internal_netmask: 255.255.255.0 + name: node-128 + public_address: 172.16.0.2 + public_netmask: 255.255.255.0 + role: primary-controller + storage_address: 192.168.1.2 + storage_netmask: 255.255.255.0 + swift_zone: '128' + uid: '128' + user_node_name: Untitled (6f:9d) +- fqdn: node-129.test.domain.local + internal_address: 192.168.0.3 + internal_netmask: 255.255.255.0 + name: node-129 + public_address: 172.16.0.3 + public_netmask: 255.255.255.0 + role: controller + storage_address: 192.168.1.3 + storage_netmask: 255.255.255.0 + swift_zone: '129' + uid: '129' + user_node_name: Untitled (74:27) +- fqdn: node-131.test.domain.local + internal_address: 192.168.0.4 + internal_netmask: 255.255.255.0 + name: node-131 + public_address: 172.16.0.4 + public_netmask: 255.255.255.0 + role: controller + storage_address: 192.168.1.4 + storage_netmask: 255.255.255.0 + swift_zone: '131' + uid: '131' + user_node_name: Untitled (34:45) +- fqdn: node-132.test.domain.local + internal_address: 192.168.0.5 + internal_netmask: 255.255.255.0 + name: node-132 + role: compute + storage_address: 192.168.1.5 + storage_netmask: 255.255.255.0 + swift_zone: '132' + uid: '132' + user_node_name: Untitled (18:c9) +nova: + db_password: mqnsUMgC + state_path: /var/lib/nova + user_password: fj4wVCEs +nova_quota: false +online: true +openstack_version: 2014.2-6.1 +openstack_version_prev: null +priority: 300 +provision: + codename: trusty + image_data: + /: + container: gzip + format: ext4 + uri: http://10.108.0.2:8080/targetimages/env_38_ubuntu_1404_amd64.img.gz + /boot: + container: gzip + format: ext2 + uri: http://10.108.0.2:8080/targetimages/env_38_ubuntu_1404_amd64-boot.img.gz + metadata: + label: Provision + weight: 80 + method: image +public_network_assignment: + assign_to_all_nodes: false + metadata: + label: Public network assignment + restrictions: + - action: hide + condition: cluster:net_provider != 'neutron' + weight: 50 +public_vip: 172.16.0.5 +public_vrouter_vip: 172.16.0.6 +puppet: + manifests: rsync://10.108.0.2:/puppet/2014.2-6.1/manifests/ + modules: rsync://10.108.0.2:/puppet/2014.2-6.1/modules/ +puppet_debug: true +quantum: true +quantum_settings: + L2: + base_mac: fa:16:3e:00:00:00 + phys_nets: {} + segmentation_type: gre + tunnel_id_ranges: 2:65535 + L3: + use_namespaces: true + database: + passwd: QRpCfPk8 + keystone: + admin_password: oT56DSZF + metadata: + metadata_proxy_shared_secret: fp618p5V + predefined_networks: + net04: + L2: + network_type: gre + physnet: null + router_ext: false + segment_id: null + L3: + enable_dhcp: true + floating: null + gateway: 192.168.111.1 + nameservers: + - 8.8.4.4 + - 8.8.8.8 + subnet: 192.168.111.0/24 + shared: false + tenant: admin + net04_ext: + L2: + network_type: local + physnet: null + router_ext: true + segment_id: null + L3: + enable_dhcp: false + floating: 172.16.0.130:172.16.0.254 + gateway: 172.16.0.1 + nameservers: [] + subnet: 172.16.0.0/24 + shared: false + tenant: admin +rabbit: + password: c7fQJeSe +repo_setup: + installer_initrd: + local: /var/www/nailgun/ubuntu/x86_64/images/initrd.gz + remote_relative: dists/trusty/main/installer-amd64/current/images/netboot/ubuntu-installer/amd64/initrd.gz + installer_kernel: + local: /var/www/nailgun/ubuntu/x86_64/images/linux + remote_relative: dists/trusty/main/installer-amd64/current/images/netboot/ubuntu-installer/amd64/linux + metadata: + label: Repositories + weight: 50 + repos: + - name: ubuntu + priority: null + section: main universe multiverse + suite: trusty + type: deb + uri: http://archive.ubuntu.com/ubuntu/ + - name: ubuntu-updates + priority: null + section: main universe multiverse + suite: trusty-updates + type: deb + uri: http://archive.ubuntu.com/ubuntu/ + - name: ubuntu-security + priority: null + section: main universe multiverse + suite: trusty-security + type: deb + uri: http://archive.ubuntu.com/ubuntu/ + - name: mos + priority: 1050 + section: main restricted + suite: mos6.1 + type: deb + uri: http://10.108.0.2:8080/2014.2-6.1/ubuntu/x86_64 + - name: mos-updates + priority: 1050 + section: main restricted + suite: mos6.1-updates + type: deb + uri: http://mirror.fuel-infra.org/mos/ubuntu/ + - name: mos-security + priority: 1050 + section: main restricted + suite: mos6.1-security + type: deb + uri: http://mirror.fuel-infra.org/mos/ubuntu/ + - name: mos-holdback + priority: 1100 + section: main restricted + suite: mos6.1-holdback + type: deb + uri: http://mirror.fuel-infra.org/mos/ubuntu/ +resume_guests_state_on_host_boot: true +role: compute +sahara: + db_password: f0jl4v47 + enabled: true + user_password: pJc2zAOx +status: discover +storage: + ephemeral_ceph: false + images_ceph: false + images_vcenter: false + iser: false + metadata: + label: Storage + weight: 60 + objects_ceph: false + osd_pool_size: '2' + pg_num: 128 + volumes_ceph: false + volumes_lvm: true +storage_network_range: 192.168.1.0/24 +swift: + user_password: BP92J6tg +syslog: + metadata: + label: Syslog + weight: 50 + syslog_port: '514' + syslog_server: '' + syslog_transport: tcp +tasks: +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/hiera/hiera.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 100 + type: puppet + uids: + - '132' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/globals/globals.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 200 + type: puppet + uids: + - '132' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/logging/logging.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 300 + type: puppet + uids: + - '132' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/tools/tools.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 400 + type: puppet + uids: + - '132' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/netconfig/netconfig.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 500 + type: puppet + uids: + - '132' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/firewall/firewall.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 600 + type: puppet + uids: + - '132' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/hosts/hosts.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 700 + type: puppet + uids: + - '132' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/zabbix/zabbix.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 800 + type: puppet + uids: + - '132' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/roles/compute.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 900 + type: puppet + uids: + - '132' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/ceilometer/compute.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1000 + type: puppet + uids: + - '132' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/dns/dns-client.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1100 + type: puppet + uids: + - '132' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/openstack-network/openstack-network-compute.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1200 + type: puppet + uids: + - '132' +test_vm_image: + container_format: bare + disk_format: qcow2 + glance_properties: '' + img_name: TestVM + img_path: /usr/share/cirros-testvm/cirros-x86_64-disk.img + min_ram: 64 + os_name: cirros + public: 'true' +uid: '132' +use_cinder: true +use_cow_images: true +use_vcenter: false +user_node_name: Untitled (18:c9) +workloads_collector: + enabled: true + metadata: + label: Workloads Collector User + restrictions: + - action: hide + condition: 'true' + weight: 10 + password: 1r3ROjcQ + tenant: services + username: workloads_collector +zabbix: + db_password: ppbPNY1E + db_root_password: 09DsVeL3 + metadata: + label: Zabbix Access + restrictions: + - action: hide + condition: not ('experimental' in version:feature_groups) + weight: 70 + password: zabbix + username: admin diff --git a/tests/noop/astute.yaml/neut_gre.murano.sahara-controller.yaml b/tests/noop/astute.yaml/neut_gre.murano.sahara-controller.yaml new file mode 100644 index 0000000000..b18bdbfbee --- /dev/null +++ b/tests/noop/astute.yaml/neut_gre.murano.sahara-controller.yaml @@ -0,0 +1,795 @@ +access: + email: admin@localhost + metadata: + label: Access + weight: 10 + password: admin + tenant: admin + user: admin +auth_key: '' +auto_assign_floating_ip: false +base_syslog: + syslog_port: '514' + syslog_server: 10.108.0.2 +ceilometer: + db_password: ZcffCIm5 + enabled: false + metering_secret: 7aqxzabx + user_password: FQUfTQ6a +cinder: + db_password: 71kNkN9U + fixed_key: 0ded0202e2a355df942df2bacbaba992658a0345f68f2db6e1bdb6dbb8f682cf + user_password: O2st17AP +cobbler: + profile: ubuntu_1404_x86_64 +corosync: + group: 226.94.1.1 + metadata: + label: Corosync + restrictions: + - action: hide + condition: 'true' + weight: 50 + port: '12000' + verified: false +debug: false +deployment_id: 38 +deployment_mode: ha_compact +external_dns: + dns_list: 8.8.8.8, 8.8.4.4 + metadata: + label: Upstream DNS + weight: 90 +external_mongo: + hosts_ip: '' + metadata: + label: External MongoDB + restrictions: + - action: hide + condition: settings:additional_components.mongo.value == false + weight: 20 + mongo_db_name: ceilometer + mongo_password: ceilometer + mongo_replset: '' + mongo_user: ceilometer +external_ntp: + metadata: + label: Upstream NTP + weight: 100 + ntp_list: 0.pool.ntp.org, 1.pool.ntp.org +fail_if_error: false +fqdn: node-129.test.domain.local +fuel_version: '6.1' +glance: + db_password: 0UYCFNfc + image_cache_max_size: '13868466176' + user_password: 94lWbeNn +heat: + auth_encryption_key: 8edb899a7e81e56abe51639880aa32dd + db_password: AuaPc3Yq + enabled: true + rabbit_password: Nmn2wr9S + user_password: EWJfBLJ9 +kernel_params: + kernel: console=ttyS0,9600 console=tty0 net.ifnames=0 biosdevname=0 rootdelay=90 + nomodeset + metadata: + label: Kernel parameters + weight: 40 +keystone: + admin_token: 0be9G8hj + db_password: 32TWl29R +last_controller: node-131 +libvirt_type: qemu +management_network_range: 192.168.0.0/24 +management_vip: 192.168.0.6 +management_vrouter_vip: 192.168.0.7 +master_ip: 10.108.0.2 +metadata: + label: Common + weight: 30 +mongo: + enabled: false +mp: +- point: '1' + weight: '1' +- point: '2' + weight: '2' +murano: + db_password: R3SuvZbh + enabled: true + rabbit_password: ZNdTAgF3 + user_password: xP8WtHQw +murano_settings: + metadata: + label: Murano Settings + restrictions: + - action: hide + condition: settings:additional_components.murano.value == false + weight: 20 + murano_repo_url: http://catalog.openstack.org/ +mysql: + root_password: Lz18BpbQ + wsrep_password: JrlrVOHu +network_scheme: + endpoints: + br-ex: + IP: + - 172.16.0.3/24 + gateway: 172.16.0.1 + vendor_specific: + phy_interfaces: + - eth1 + br-floating: + IP: none + br-fw-admin: + IP: + - 10.108.0.6/24 + br-mgmt: + IP: + - 192.168.0.3/24 + vendor_specific: + phy_interfaces: + - eth0 + vlans: 101 + br-storage: + IP: + - 192.168.1.3/24 + vendor_specific: + phy_interfaces: + - eth0 + vlans: 102 + interfaces: + eth0: + vendor_specific: + bus_info: '0000:00:03.0' + driver: e1000 + eth1: + vendor_specific: + bus_info: '0000:00:04.0' + driver: e1000 + eth2: + vendor_specific: + bus_info: '0000:00:05.0' + driver: e1000 + eth3: + vendor_specific: + bus_info: '0000:00:06.0' + driver: e1000 + eth4: + vendor_specific: + bus_info: '0000:00:07.0' + driver: e1000 + provider: lnx + roles: + ex: br-ex + fw-admin: br-fw-admin + management: br-mgmt + neutron/floating: br-floating + neutron/mesh: br-mgmt + storage: br-storage + transformations: + - action: add-br + name: br-fw-admin + - action: add-br + name: br-mgmt + - action: add-br + name: br-storage + - action: add-br + name: br-ex + - action: add-br + name: br-floating + provider: ovs + - action: add-patch + bridges: + - br-floating + - br-ex + provider: ovs + - action: add-port + bridge: br-fw-admin + name: eth0 + - action: add-port + bridge: br-storage + name: eth0.102 + - action: add-port + bridge: br-mgmt + name: eth0.101 + - action: add-port + bridge: br-ex + name: eth1 + version: '1.1' +neutron_mellanox: + metadata: + enabled: true + label: Mellanox Neutron components + toggleable: false + weight: 50 + plugin: disabled + vf_num: '16' +nodes: +- fqdn: node-118.test.domain.local + internal_address: 192.168.0.1 + internal_netmask: 255.255.255.0 + name: node-118 + role: cinder + storage_address: 192.168.1.1 + storage_netmask: 255.255.255.0 + swift_zone: '118' + uid: '118' + user_node_name: Untitled (1d:4b) +- fqdn: node-128.test.domain.local + internal_address: 192.168.0.2 + internal_netmask: 255.255.255.0 + name: node-128 + public_address: 172.16.0.2 + public_netmask: 255.255.255.0 + role: primary-controller + storage_address: 192.168.1.2 + storage_netmask: 255.255.255.0 + swift_zone: '128' + uid: '128' + user_node_name: Untitled (6f:9d) +- fqdn: node-129.test.domain.local + internal_address: 192.168.0.3 + internal_netmask: 255.255.255.0 + name: node-129 + public_address: 172.16.0.3 + public_netmask: 255.255.255.0 + role: controller + storage_address: 192.168.1.3 + storage_netmask: 255.255.255.0 + swift_zone: '129' + uid: '129' + user_node_name: Untitled (74:27) +- fqdn: node-131.test.domain.local + internal_address: 192.168.0.4 + internal_netmask: 255.255.255.0 + name: node-131 + public_address: 172.16.0.4 + public_netmask: 255.255.255.0 + role: controller + storage_address: 192.168.1.4 + storage_netmask: 255.255.255.0 + swift_zone: '131' + uid: '131' + user_node_name: Untitled (34:45) +- fqdn: node-132.test.domain.local + internal_address: 192.168.0.5 + internal_netmask: 255.255.255.0 + name: node-132 + role: compute + storage_address: 192.168.1.5 + storage_netmask: 255.255.255.0 + swift_zone: '132' + uid: '132' + user_node_name: Untitled (18:c9) +nova: + db_password: mqnsUMgC + state_path: /var/lib/nova + user_password: fj4wVCEs +nova_quota: false +online: true +openstack_version: 2014.2-6.1 +openstack_version_prev: null +priority: 200 +provision: + codename: trusty + image_data: + /: + container: gzip + format: ext4 + uri: http://10.108.0.2:8080/targetimages/env_38_ubuntu_1404_amd64.img.gz + /boot: + container: gzip + format: ext2 + uri: http://10.108.0.2:8080/targetimages/env_38_ubuntu_1404_amd64-boot.img.gz + metadata: + label: Provision + weight: 80 + method: image +public_network_assignment: + assign_to_all_nodes: false + metadata: + label: Public network assignment + restrictions: + - action: hide + condition: cluster:net_provider != 'neutron' + weight: 50 +public_vip: 172.16.0.5 +public_vrouter_vip: 172.16.0.6 +puppet: + manifests: rsync://10.108.0.2:/puppet/2014.2-6.1/manifests/ + modules: rsync://10.108.0.2:/puppet/2014.2-6.1/modules/ +puppet_debug: true +quantum: true +quantum_settings: + L2: + base_mac: fa:16:3e:00:00:00 + phys_nets: {} + segmentation_type: gre + tunnel_id_ranges: 2:65535 + L3: + use_namespaces: true + database: + passwd: QRpCfPk8 + keystone: + admin_password: oT56DSZF + metadata: + metadata_proxy_shared_secret: fp618p5V + predefined_networks: + net04: + L2: + network_type: gre + physnet: null + router_ext: false + segment_id: null + L3: + enable_dhcp: true + floating: null + gateway: 192.168.111.1 + nameservers: + - 8.8.4.4 + - 8.8.8.8 + subnet: 192.168.111.0/24 + shared: false + tenant: admin + net04_ext: + L2: + network_type: local + physnet: null + router_ext: true + segment_id: null + L3: + enable_dhcp: false + floating: 172.16.0.130:172.16.0.254 + gateway: 172.16.0.1 + nameservers: [] + subnet: 172.16.0.0/24 + shared: false + tenant: admin +rabbit: + password: c7fQJeSe +repo_setup: + installer_initrd: + local: /var/www/nailgun/ubuntu/x86_64/images/initrd.gz + remote_relative: dists/trusty/main/installer-amd64/current/images/netboot/ubuntu-installer/amd64/initrd.gz + installer_kernel: + local: /var/www/nailgun/ubuntu/x86_64/images/linux + remote_relative: dists/trusty/main/installer-amd64/current/images/netboot/ubuntu-installer/amd64/linux + metadata: + label: Repositories + weight: 50 + repos: + - name: ubuntu + priority: null + section: main universe multiverse + suite: trusty + type: deb + uri: http://archive.ubuntu.com/ubuntu/ + - name: ubuntu-updates + priority: null + section: main universe multiverse + suite: trusty-updates + type: deb + uri: http://archive.ubuntu.com/ubuntu/ + - name: ubuntu-security + priority: null + section: main universe multiverse + suite: trusty-security + type: deb + uri: http://archive.ubuntu.com/ubuntu/ + - name: mos + priority: 1050 + section: main restricted + suite: mos6.1 + type: deb + uri: http://10.108.0.2:8080/2014.2-6.1/ubuntu/x86_64 + - name: mos-updates + priority: 1050 + section: main restricted + suite: mos6.1-updates + type: deb + uri: http://mirror.fuel-infra.org/mos/ubuntu/ + - name: mos-security + priority: 1050 + section: main restricted + suite: mos6.1-security + type: deb + uri: http://mirror.fuel-infra.org/mos/ubuntu/ + - name: mos-holdback + priority: 1100 + section: main restricted + suite: mos6.1-holdback + type: deb + uri: http://mirror.fuel-infra.org/mos/ubuntu/ +resume_guests_state_on_host_boot: true +role: controller +sahara: + db_password: f0jl4v47 + enabled: true + user_password: pJc2zAOx +status: discover +storage: + ephemeral_ceph: false + images_ceph: false + images_vcenter: false + iser: false + metadata: + label: Storage + weight: 60 + objects_ceph: false + osd_pool_size: '2' + pg_num: 128 + volumes_ceph: false + volumes_lvm: true +storage_network_range: 192.168.1.0/24 +swift: + user_password: BP92J6tg +syslog: + metadata: + label: Syslog + weight: 50 + syslog_port: '514' + syslog_server: '' + syslog_transport: tcp +tasks: +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/hiera/hiera.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 100 + type: puppet + uids: + - '129' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/globals/globals.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 200 + type: puppet + uids: + - '129' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/logging/logging.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 300 + type: puppet + uids: + - '129' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/tools/tools.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 400 + type: puppet + uids: + - '129' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/umm/umm.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 500 + type: puppet + uids: + - '129' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/netconfig/netconfig.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 600 + type: puppet + uids: + - '129' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/hosts/hosts.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 700 + type: puppet + uids: + - '129' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/firewall/firewall.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 800 + type: puppet + uids: + - '129' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/cluster/cluster.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 900 + type: puppet + uids: + - '129' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/virtual_ips/virtual_ips.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1000 + type: puppet + uids: + - '129' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/virtual_ips/conntrackd.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1100 + type: puppet + uids: + - '129' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/cluster-haproxy/cluster-haproxy.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1200 + type: puppet + uids: + - '129' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/openstack-haproxy/openstack-haproxy.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1300 + type: puppet + uids: + - '129' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/dns/dns-server.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1400 + type: puppet + uids: + - '129' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/dns/dns-client.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1500 + type: puppet + uids: + - '129' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/ntp/ntp-server.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1600 + type: puppet + uids: + - '129' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/database/database.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1700 + type: puppet + uids: + - '129' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/ceilometer/controller.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1800 + type: puppet + uids: + - '129' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/rabbitmq/rabbitmq.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1900 + type: puppet + uids: + - '129' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/memcached/memcached.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 2000 + type: puppet + uids: + - '129' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/keystone/keystone.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 2100 + type: puppet + uids: + - '129' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/openstack-cinder/openstack-cinder.pp + puppet_modules: /etc/puppet/modules + timeout: 1200 + priority: 2200 + type: puppet + uids: + - '129' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/glance/glance.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 2300 + type: puppet + uids: + - '129' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/openstack-controller/openstack-controller.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 2400 + type: puppet + uids: + - '129' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/openstack-network/openstack-network-controller.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 2500 + type: puppet + uids: + - '129' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/heat/heat.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 2600 + type: puppet + uids: + - '129' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/horizon/horizon.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 2700 + type: puppet + uids: + - '129' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/murano/murano.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 2800 + type: puppet + uids: + - '129' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/sahara/sahara.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 2900 + type: puppet + uids: + - '129' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/api-proxy/api-proxy.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 3000 + type: puppet + uids: + - '129' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/ceph/mon.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 3100 + type: puppet + uids: + - '129' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/ceph/radosgw.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 3200 + type: puppet + uids: + - '129' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/swift/swift.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 3300 + type: puppet + uids: + - '129' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/roles/controller.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 3400 + type: puppet + uids: + - '129' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/swift/rebalance_cronjob.pp + puppet_modules: /etc/puppet/modules + timeout: 300 + priority: 3500 + type: puppet + uids: + - '129' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/zabbix/zabbix.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 3600 + type: puppet + uids: + - '129' +test_vm_image: + container_format: bare + disk_format: qcow2 + glance_properties: '' + img_name: TestVM + img_path: /usr/share/cirros-testvm/cirros-x86_64-disk.img + min_ram: 64 + os_name: cirros + public: 'true' +uid: '129' +use_cinder: true +use_cow_images: true +use_vcenter: false +user_node_name: Untitled (74:27) +workloads_collector: + enabled: true + metadata: + label: Workloads Collector User + restrictions: + - action: hide + condition: 'true' + weight: 10 + password: 1r3ROjcQ + tenant: services + username: workloads_collector +zabbix: + db_password: ppbPNY1E + db_root_password: 09DsVeL3 + metadata: + label: Zabbix Access + restrictions: + - action: hide + condition: not ('experimental' in version:feature_groups) + weight: 70 + password: zabbix + username: admin diff --git a/tests/noop/astute.yaml/neut_gre.murano.sahara-primary-controller.yaml b/tests/noop/astute.yaml/neut_gre.murano.sahara-primary-controller.yaml new file mode 100644 index 0000000000..074fc68332 --- /dev/null +++ b/tests/noop/astute.yaml/neut_gre.murano.sahara-primary-controller.yaml @@ -0,0 +1,795 @@ +access: + email: admin@localhost + metadata: + label: Access + weight: 10 + password: admin + tenant: admin + user: admin +auth_key: '' +auto_assign_floating_ip: false +base_syslog: + syslog_port: '514' + syslog_server: 10.108.0.2 +ceilometer: + db_password: ZcffCIm5 + enabled: false + metering_secret: 7aqxzabx + user_password: FQUfTQ6a +cinder: + db_password: 71kNkN9U + fixed_key: 0ded0202e2a355df942df2bacbaba992658a0345f68f2db6e1bdb6dbb8f682cf + user_password: O2st17AP +cobbler: + profile: ubuntu_1404_x86_64 +corosync: + group: 226.94.1.1 + metadata: + label: Corosync + restrictions: + - action: hide + condition: 'true' + weight: 50 + port: '12000' + verified: false +debug: false +deployment_id: 38 +deployment_mode: ha_compact +external_dns: + dns_list: 8.8.8.8, 8.8.4.4 + metadata: + label: Upstream DNS + weight: 90 +external_mongo: + hosts_ip: '' + metadata: + label: External MongoDB + restrictions: + - action: hide + condition: settings:additional_components.mongo.value == false + weight: 20 + mongo_db_name: ceilometer + mongo_password: ceilometer + mongo_replset: '' + mongo_user: ceilometer +external_ntp: + metadata: + label: Upstream NTP + weight: 100 + ntp_list: 0.pool.ntp.org, 1.pool.ntp.org +fail_if_error: true +fqdn: node-128.test.domain.local +fuel_version: '6.1' +glance: + db_password: 0UYCFNfc + image_cache_max_size: '13868466176' + user_password: 94lWbeNn +heat: + auth_encryption_key: 8edb899a7e81e56abe51639880aa32dd + db_password: AuaPc3Yq + enabled: true + rabbit_password: Nmn2wr9S + user_password: EWJfBLJ9 +kernel_params: + kernel: console=ttyS0,9600 console=tty0 net.ifnames=0 biosdevname=0 rootdelay=90 + nomodeset + metadata: + label: Kernel parameters + weight: 40 +keystone: + admin_token: 0be9G8hj + db_password: 32TWl29R +last_controller: node-131 +libvirt_type: qemu +management_network_range: 192.168.0.0/24 +management_vip: 192.168.0.6 +management_vrouter_vip: 192.168.0.7 +master_ip: 10.108.0.2 +metadata: + label: Common + weight: 30 +mongo: + enabled: false +mp: +- point: '1' + weight: '1' +- point: '2' + weight: '2' +murano: + db_password: R3SuvZbh + enabled: true + rabbit_password: ZNdTAgF3 + user_password: xP8WtHQw +murano_settings: + metadata: + label: Murano Settings + restrictions: + - action: hide + condition: settings:additional_components.murano.value == false + weight: 20 + murano_repo_url: http://catalog.openstack.org/ +mysql: + root_password: Lz18BpbQ + wsrep_password: JrlrVOHu +network_scheme: + endpoints: + br-ex: + IP: + - 172.16.0.2/24 + gateway: 172.16.0.1 + vendor_specific: + phy_interfaces: + - eth1 + br-floating: + IP: none + br-fw-admin: + IP: + - 10.108.0.3/24 + br-mgmt: + IP: + - 192.168.0.2/24 + vendor_specific: + phy_interfaces: + - eth0 + vlans: 101 + br-storage: + IP: + - 192.168.1.2/24 + vendor_specific: + phy_interfaces: + - eth0 + vlans: 102 + interfaces: + eth0: + vendor_specific: + bus_info: '0000:00:03.0' + driver: e1000 + eth1: + vendor_specific: + bus_info: '0000:00:04.0' + driver: e1000 + eth2: + vendor_specific: + bus_info: '0000:00:05.0' + driver: e1000 + eth3: + vendor_specific: + bus_info: '0000:00:06.0' + driver: e1000 + eth4: + vendor_specific: + bus_info: '0000:00:07.0' + driver: e1000 + provider: lnx + roles: + ex: br-ex + fw-admin: br-fw-admin + management: br-mgmt + neutron/floating: br-floating + neutron/mesh: br-mgmt + storage: br-storage + transformations: + - action: add-br + name: br-fw-admin + - action: add-br + name: br-mgmt + - action: add-br + name: br-storage + - action: add-br + name: br-ex + - action: add-br + name: br-floating + provider: ovs + - action: add-patch + bridges: + - br-floating + - br-ex + provider: ovs + - action: add-port + bridge: br-fw-admin + name: eth0 + - action: add-port + bridge: br-storage + name: eth0.102 + - action: add-port + bridge: br-mgmt + name: eth0.101 + - action: add-port + bridge: br-ex + name: eth1 + version: '1.1' +neutron_mellanox: + metadata: + enabled: true + label: Mellanox Neutron components + toggleable: false + weight: 50 + plugin: disabled + vf_num: '16' +nodes: +- fqdn: node-118.test.domain.local + internal_address: 192.168.0.1 + internal_netmask: 255.255.255.0 + name: node-118 + role: cinder + storage_address: 192.168.1.1 + storage_netmask: 255.255.255.0 + swift_zone: '118' + uid: '118' + user_node_name: Untitled (1d:4b) +- fqdn: node-128.test.domain.local + internal_address: 192.168.0.2 + internal_netmask: 255.255.255.0 + name: node-128 + public_address: 172.16.0.2 + public_netmask: 255.255.255.0 + role: primary-controller + storage_address: 192.168.1.2 + storage_netmask: 255.255.255.0 + swift_zone: '128' + uid: '128' + user_node_name: Untitled (6f:9d) +- fqdn: node-129.test.domain.local + internal_address: 192.168.0.3 + internal_netmask: 255.255.255.0 + name: node-129 + public_address: 172.16.0.3 + public_netmask: 255.255.255.0 + role: controller + storage_address: 192.168.1.3 + storage_netmask: 255.255.255.0 + swift_zone: '129' + uid: '129' + user_node_name: Untitled (74:27) +- fqdn: node-131.test.domain.local + internal_address: 192.168.0.4 + internal_netmask: 255.255.255.0 + name: node-131 + public_address: 172.16.0.4 + public_netmask: 255.255.255.0 + role: controller + storage_address: 192.168.1.4 + storage_netmask: 255.255.255.0 + swift_zone: '131' + uid: '131' + user_node_name: Untitled (34:45) +- fqdn: node-132.test.domain.local + internal_address: 192.168.0.5 + internal_netmask: 255.255.255.0 + name: node-132 + role: compute + storage_address: 192.168.1.5 + storage_netmask: 255.255.255.0 + swift_zone: '132' + uid: '132' + user_node_name: Untitled (18:c9) +nova: + db_password: mqnsUMgC + state_path: /var/lib/nova + user_password: fj4wVCEs +nova_quota: false +online: true +openstack_version: 2014.2-6.1 +openstack_version_prev: null +priority: 100 +provision: + codename: trusty + image_data: + /: + container: gzip + format: ext4 + uri: http://10.108.0.2:8080/targetimages/env_38_ubuntu_1404_amd64.img.gz + /boot: + container: gzip + format: ext2 + uri: http://10.108.0.2:8080/targetimages/env_38_ubuntu_1404_amd64-boot.img.gz + metadata: + label: Provision + weight: 80 + method: image +public_network_assignment: + assign_to_all_nodes: false + metadata: + label: Public network assignment + restrictions: + - action: hide + condition: cluster:net_provider != 'neutron' + weight: 50 +public_vip: 172.16.0.5 +public_vrouter_vip: 172.16.0.6 +puppet: + manifests: rsync://10.108.0.2:/puppet/2014.2-6.1/manifests/ + modules: rsync://10.108.0.2:/puppet/2014.2-6.1/modules/ +puppet_debug: true +quantum: true +quantum_settings: + L2: + base_mac: fa:16:3e:00:00:00 + phys_nets: {} + segmentation_type: gre + tunnel_id_ranges: 2:65535 + L3: + use_namespaces: true + database: + passwd: QRpCfPk8 + keystone: + admin_password: oT56DSZF + metadata: + metadata_proxy_shared_secret: fp618p5V + predefined_networks: + net04: + L2: + network_type: gre + physnet: null + router_ext: false + segment_id: null + L3: + enable_dhcp: true + floating: null + gateway: 192.168.111.1 + nameservers: + - 8.8.4.4 + - 8.8.8.8 + subnet: 192.168.111.0/24 + shared: false + tenant: admin + net04_ext: + L2: + network_type: local + physnet: null + router_ext: true + segment_id: null + L3: + enable_dhcp: false + floating: 172.16.0.130:172.16.0.254 + gateway: 172.16.0.1 + nameservers: [] + subnet: 172.16.0.0/24 + shared: false + tenant: admin +rabbit: + password: c7fQJeSe +repo_setup: + installer_initrd: + local: /var/www/nailgun/ubuntu/x86_64/images/initrd.gz + remote_relative: dists/trusty/main/installer-amd64/current/images/netboot/ubuntu-installer/amd64/initrd.gz + installer_kernel: + local: /var/www/nailgun/ubuntu/x86_64/images/linux + remote_relative: dists/trusty/main/installer-amd64/current/images/netboot/ubuntu-installer/amd64/linux + metadata: + label: Repositories + weight: 50 + repos: + - name: ubuntu + priority: null + section: main universe multiverse + suite: trusty + type: deb + uri: http://archive.ubuntu.com/ubuntu/ + - name: ubuntu-updates + priority: null + section: main universe multiverse + suite: trusty-updates + type: deb + uri: http://archive.ubuntu.com/ubuntu/ + - name: ubuntu-security + priority: null + section: main universe multiverse + suite: trusty-security + type: deb + uri: http://archive.ubuntu.com/ubuntu/ + - name: mos + priority: 1050 + section: main restricted + suite: mos6.1 + type: deb + uri: http://10.108.0.2:8080/2014.2-6.1/ubuntu/x86_64 + - name: mos-updates + priority: 1050 + section: main restricted + suite: mos6.1-updates + type: deb + uri: http://mirror.fuel-infra.org/mos/ubuntu/ + - name: mos-security + priority: 1050 + section: main restricted + suite: mos6.1-security + type: deb + uri: http://mirror.fuel-infra.org/mos/ubuntu/ + - name: mos-holdback + priority: 1100 + section: main restricted + suite: mos6.1-holdback + type: deb + uri: http://mirror.fuel-infra.org/mos/ubuntu/ +resume_guests_state_on_host_boot: true +role: primary-controller +sahara: + db_password: f0jl4v47 + enabled: true + user_password: pJc2zAOx +status: discover +storage: + ephemeral_ceph: false + images_ceph: false + images_vcenter: false + iser: false + metadata: + label: Storage + weight: 60 + objects_ceph: false + osd_pool_size: '2' + pg_num: 128 + volumes_ceph: false + volumes_lvm: true +storage_network_range: 192.168.1.0/24 +swift: + user_password: BP92J6tg +syslog: + metadata: + label: Syslog + weight: 50 + syslog_port: '514' + syslog_server: '' + syslog_transport: tcp +tasks: +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/hiera/hiera.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 100 + type: puppet + uids: + - '128' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/globals/globals.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 200 + type: puppet + uids: + - '128' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/logging/logging.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 300 + type: puppet + uids: + - '128' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/tools/tools.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 400 + type: puppet + uids: + - '128' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/umm/umm.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 500 + type: puppet + uids: + - '128' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/netconfig/netconfig.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 600 + type: puppet + uids: + - '128' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/hosts/hosts.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 700 + type: puppet + uids: + - '128' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/firewall/firewall.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 800 + type: puppet + uids: + - '128' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/cluster/cluster.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 900 + type: puppet + uids: + - '128' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/virtual_ips/virtual_ips.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1000 + type: puppet + uids: + - '128' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/virtual_ips/conntrackd.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1100 + type: puppet + uids: + - '128' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/cluster-haproxy/cluster-haproxy.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1200 + type: puppet + uids: + - '128' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/openstack-haproxy/openstack-haproxy.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1300 + type: puppet + uids: + - '128' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/dns/dns-server.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1400 + type: puppet + uids: + - '128' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/dns/dns-client.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1500 + type: puppet + uids: + - '128' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/ntp/ntp-server.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1600 + type: puppet + uids: + - '128' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/database/database.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1700 + type: puppet + uids: + - '128' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/ceilometer/controller.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1800 + type: puppet + uids: + - '128' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/rabbitmq/rabbitmq.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1900 + type: puppet + uids: + - '128' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/memcached/memcached.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 2000 + type: puppet + uids: + - '128' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/keystone/keystone.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 2100 + type: puppet + uids: + - '128' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/openstack-cinder/openstack-cinder.pp + puppet_modules: /etc/puppet/modules + timeout: 1200 + priority: 2200 + type: puppet + uids: + - '128' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/glance/glance.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 2300 + type: puppet + uids: + - '128' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/openstack-controller/openstack-controller.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 2400 + type: puppet + uids: + - '128' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/openstack-network/openstack-network-controller.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 2500 + type: puppet + uids: + - '128' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/heat/heat.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 2600 + type: puppet + uids: + - '128' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/horizon/horizon.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 2700 + type: puppet + uids: + - '128' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/murano/murano.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 2800 + type: puppet + uids: + - '128' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/sahara/sahara.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 2900 + type: puppet + uids: + - '128' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/api-proxy/api-proxy.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 3000 + type: puppet + uids: + - '128' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/ceph/mon.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 3100 + type: puppet + uids: + - '128' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/ceph/radosgw.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 3200 + type: puppet + uids: + - '128' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/swift/swift.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 3300 + type: puppet + uids: + - '128' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/roles/controller.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 3400 + type: puppet + uids: + - '128' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/swift/rebalance_cronjob.pp + puppet_modules: /etc/puppet/modules + timeout: 300 + priority: 3500 + type: puppet + uids: + - '128' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/zabbix/zabbix.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 3600 + type: puppet + uids: + - '128' +test_vm_image: + container_format: bare + disk_format: qcow2 + glance_properties: '' + img_name: TestVM + img_path: /usr/share/cirros-testvm/cirros-x86_64-disk.img + min_ram: 64 + os_name: cirros + public: 'true' +uid: '128' +use_cinder: true +use_cow_images: true +use_vcenter: false +user_node_name: Untitled (6f:9d) +workloads_collector: + enabled: true + metadata: + label: Workloads Collector User + restrictions: + - action: hide + condition: 'true' + weight: 10 + password: 1r3ROjcQ + tenant: services + username: workloads_collector +zabbix: + db_password: ppbPNY1E + db_root_password: 09DsVeL3 + metadata: + label: Zabbix Access + restrictions: + - action: hide + condition: not ('experimental' in version:feature_groups) + weight: 70 + password: zabbix + username: admin diff --git a/tests/noop/astute.yaml/neut_vlan.ceph.ceil-ceph-osd.yaml b/tests/noop/astute.yaml/neut_vlan.ceph.ceil-ceph-osd.yaml new file mode 100644 index 0000000000..8e4c3987d6 --- /dev/null +++ b/tests/noop/astute.yaml/neut_vlan.ceph.ceil-ceph-osd.yaml @@ -0,0 +1,549 @@ +access: + email: admin@localhost + metadata: + label: Access + weight: 10 + password: admin + tenant: admin + user: admin +auth_key: '' +auto_assign_floating_ip: false +base_syslog: + syslog_port: '514' + syslog_server: 10.108.0.2 +ceilometer: + db_password: Toe5phw4 + enabled: true + metering_secret: tHq2rcoq + user_password: WBfBSo6U +cinder: + db_password: trj609V8 + fixed_key: 7883d66c643ce9a508ebcd4cd5516fc98814a11276bc98c4e8e671188b54e941 + user_password: sJRfG0GP +cobbler: + profile: ubuntu_1404_x86_64 +corosync: + group: 226.94.1.1 + metadata: + label: Corosync + restrictions: + - action: hide + condition: 'true' + weight: 50 + port: '12000' + verified: false +debug: false +deployment_id: 37 +deployment_mode: ha_compact +external_dns: + dns_list: 8.8.8.8, 8.8.4.4 + metadata: + label: Upstream DNS + weight: 90 +external_mongo: + hosts_ip: '' + metadata: + label: External MongoDB + restrictions: + - action: hide + condition: settings:additional_components.mongo.value == false + weight: 20 + mongo_db_name: ceilometer + mongo_password: ceilometer + mongo_replset: '' + mongo_user: ceilometer +external_ntp: + metadata: + label: Upstream NTP + weight: 100 + ntp_list: 0.pool.ntp.org, 1.pool.ntp.org +fail_if_error: true +fqdn: node-124.test.domain.local +fuel_version: '6.1' +glance: + db_password: 385SUUrC + image_cache_max_size: '0' + user_password: A9KgbnX6 +heat: + auth_encryption_key: 2604abefbdf5043f07e989af10f6caba + db_password: NTeyraV2 + enabled: true + rabbit_password: ReVt6ZKQ + user_password: tryL79Yl +kernel_params: + kernel: console=ttyS0,9600 console=tty0 net.ifnames=0 biosdevname=0 rootdelay=90 + nomodeset + metadata: + label: Kernel parameters + weight: 40 +keystone: + admin_token: UxFQFw3m + db_password: e4Op1FQB +last_controller: node-125 +libvirt_type: qemu +management_network_range: 192.168.0.0/24 +management_vip: 192.168.0.6 +management_vrouter_vip: 192.168.0.7 +master_ip: 10.108.0.2 +metadata: + label: Common + weight: 30 +mongo: + enabled: false +mp: +- point: '1' + weight: '1' +- point: '2' + weight: '2' +murano: + db_password: 7I6NRZcB + enabled: false + rabbit_password: X4GK4R7f + user_password: nuCELy8q +murano_settings: + metadata: + label: Murano Settings + restrictions: + - action: hide + condition: settings:additional_components.murano.value == false + weight: 20 + murano_repo_url: http://catalog.openstack.org/ +mysql: + root_password: 5eqwkxY3 + wsrep_password: sFMiVJ7I +network_scheme: + endpoints: + br-fw-admin: + IP: + - 10.108.0.3/24 + br-mgmt: + IP: + - 192.168.0.2/24 + gateway: 192.168.0.7 + vendor_specific: + phy_interfaces: + - eth0 + vlans: 101 + br-prv: + IP: none + vendor_specific: + phy_interfaces: + - eth0 + vlans: 1000:1030 + br-storage: + IP: + - 192.168.1.2/24 + vendor_specific: + phy_interfaces: + - eth0 + vlans: 102 + interfaces: + eth0: + vendor_specific: + bus_info: '0000:00:03.0' + driver: e1000 + eth1: + vendor_specific: + bus_info: '0000:00:04.0' + driver: e1000 + eth2: + vendor_specific: + bus_info: '0000:00:05.0' + driver: e1000 + eth3: + vendor_specific: + bus_info: '0000:00:06.0' + driver: e1000 + eth4: + vendor_specific: + bus_info: '0000:00:07.0' + driver: e1000 + provider: lnx + roles: + fw-admin: br-fw-admin + management: br-mgmt + neutron/private: br-prv + storage: br-storage + transformations: + - action: add-br + name: br-fw-admin + - action: add-br + name: br-mgmt + - action: add-br + name: br-storage + - action: add-br + name: br-prv + provider: ovs + - action: add-patch + bridges: + - br-prv + - br-fw-admin + provider: ovs + - action: add-port + bridge: br-fw-admin + name: eth0 + - action: add-port + bridge: br-storage + name: eth0.102 + - action: add-port + bridge: br-mgmt + name: eth0.101 + version: '1.1' +neutron_mellanox: + metadata: + enabled: true + label: Mellanox Neutron components + toggleable: false + weight: 50 + plugin: disabled + vf_num: '16' +nodes: +- fqdn: node-121.test.domain.local + internal_address: 192.168.0.1 + internal_netmask: 255.255.255.0 + name: node-121 + role: primary-mongo + storage_address: 192.168.1.1 + storage_netmask: 255.255.255.0 + swift_zone: '121' + uid: '121' + user_node_name: Untitled (18:c9) +- fqdn: node-124.test.domain.local + internal_address: 192.168.0.2 + internal_netmask: 255.255.255.0 + name: node-124 + role: ceph-osd + storage_address: 192.168.1.2 + storage_netmask: 255.255.255.0 + swift_zone: '124' + uid: '124' + user_node_name: Untitled (6f:9d) +- fqdn: node-125.test.domain.local + internal_address: 192.168.0.3 + internal_netmask: 255.255.255.0 + name: node-125 + public_address: 172.16.0.2 + public_netmask: 255.255.255.0 + role: primary-controller + storage_address: 192.168.1.3 + storage_netmask: 255.255.255.0 + swift_zone: '125' + uid: '125' + user_node_name: Untitled (34:45) +- fqdn: node-126.test.domain.local + internal_address: 192.168.0.4 + internal_netmask: 255.255.255.0 + name: node-126 + role: ceph-osd + storage_address: 192.168.1.4 + storage_netmask: 255.255.255.0 + swift_zone: '126' + uid: '126' + user_node_name: Untitled (12:ea) +- fqdn: node-127.test.domain.local + internal_address: 192.168.0.5 + internal_netmask: 255.255.255.0 + name: node-127 + role: compute + storage_address: 192.168.1.5 + storage_netmask: 255.255.255.0 + swift_zone: '127' + uid: '127' + user_node_name: Untitled (74:27) +nova: + db_password: VXcP6cIR + state_path: /var/lib/nova + user_password: fuhtZH6v +nova_quota: false +online: true +openstack_version: 2014.2-6.1 +openstack_version_prev: null +priority: 300 +provision: + codename: trusty + image_data: + /: + container: gzip + format: ext4 + uri: http://10.108.0.2:8080/targetimages/env_37_ubuntu_1404_amd64.img.gz + /boot: + container: gzip + format: ext2 + uri: http://10.108.0.2:8080/targetimages/env_37_ubuntu_1404_amd64-boot.img.gz + metadata: + label: Provision + weight: 80 + method: image +public_network_assignment: + assign_to_all_nodes: false + metadata: + label: Public network assignment + restrictions: + - action: hide + condition: cluster:net_provider != 'neutron' + weight: 50 +public_vip: 172.16.0.3 +public_vrouter_vip: 172.16.0.4 +puppet: + manifests: rsync://10.108.0.2:/puppet/2014.2-6.1/manifests/ + modules: rsync://10.108.0.2:/puppet/2014.2-6.1/modules/ +puppet_debug: true +quantum: true +quantum_settings: + L2: + base_mac: fa:16:3e:00:00:00 + phys_nets: + physnet2: + bridge: br-prv + vlan_range: 1000:1030 + segmentation_type: vlan + L3: + use_namespaces: true + database: + passwd: zOXpcc6c + keystone: + admin_password: XgdPodA7 + metadata: + metadata_proxy_shared_secret: QU11ydS2 + predefined_networks: + net04: + L2: + network_type: vlan + physnet: physnet2 + router_ext: false + segment_id: null + L3: + enable_dhcp: true + floating: null + gateway: 192.168.111.1 + nameservers: + - 8.8.4.4 + - 8.8.8.8 + subnet: 192.168.111.0/24 + shared: false + tenant: admin + net04_ext: + L2: + network_type: local + physnet: null + router_ext: true + segment_id: null + L3: + enable_dhcp: false + floating: 172.16.0.130:172.16.0.254 + gateway: 172.16.0.1 + nameservers: [] + subnet: 172.16.0.0/24 + shared: false + tenant: admin +rabbit: + password: 1GXPbTgb +repo_setup: + installer_initrd: + local: /var/www/nailgun/ubuntu/x86_64/images/initrd.gz + remote_relative: dists/trusty/main/installer-amd64/current/images/netboot/ubuntu-installer/amd64/initrd.gz + installer_kernel: + local: /var/www/nailgun/ubuntu/x86_64/images/linux + remote_relative: dists/trusty/main/installer-amd64/current/images/netboot/ubuntu-installer/amd64/linux + metadata: + label: Repositories + weight: 50 + repos: + - name: ubuntu + priority: null + section: main universe multiverse + suite: trusty + type: deb + uri: http://archive.ubuntu.com/ubuntu/ + - name: ubuntu-updates + priority: null + section: main universe multiverse + suite: trusty-updates + type: deb + uri: http://archive.ubuntu.com/ubuntu/ + - name: ubuntu-security + priority: null + section: main universe multiverse + suite: trusty-security + type: deb + uri: http://archive.ubuntu.com/ubuntu/ + - name: mos + priority: 1050 + section: main restricted + suite: mos6.1 + type: deb + uri: http://10.108.0.2:8080/2014.2-6.1/ubuntu/x86_64 + - name: mos-updates + priority: 1050 + section: main restricted + suite: mos6.1-updates + type: deb + uri: http://mirror.fuel-infra.org/mos/ubuntu/ + - name: mos-security + priority: 1050 + section: main restricted + suite: mos6.1-security + type: deb + uri: http://mirror.fuel-infra.org/mos/ubuntu/ + - name: mos-holdback + priority: 1100 + section: main restricted + suite: mos6.1-holdback + type: deb + uri: http://mirror.fuel-infra.org/mos/ubuntu/ +resume_guests_state_on_host_boot: true +role: ceph-osd +sahara: + db_password: R68HpdNS + enabled: false + user_password: ts32qXcD +status: discover +storage: + ephemeral_ceph: false + images_ceph: true + images_vcenter: false + iser: false + metadata: + label: Storage + weight: 60 + objects_ceph: true + osd_pool_size: '2' + pg_num: 256 + volumes_ceph: true + volumes_lvm: false +storage_network_range: 192.168.1.0/24 +swift: + user_password: bpFT3TKn +syslog: + metadata: + label: Syslog + weight: 50 + syslog_port: '514' + syslog_server: '' + syslog_transport: tcp +tasks: +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/hiera/hiera.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 100 + type: puppet + uids: + - '124' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/globals/globals.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 200 + type: puppet + uids: + - '124' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/logging/logging.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 300 + type: puppet + uids: + - '124' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/tools/tools.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 400 + type: puppet + uids: + - '124' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/netconfig/netconfig.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 500 + type: puppet + uids: + - '124' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/firewall/firewall.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 600 + type: puppet + uids: + - '124' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/hosts/hosts.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 700 + type: puppet + uids: + - '124' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/zabbix/zabbix.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 800 + type: puppet + uids: + - '124' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/roles/ceph-osd.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 900 + type: puppet + uids: + - '124' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/dns/dns-client.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1000 + type: puppet + uids: + - '124' +test_vm_image: + container_format: bare + disk_format: qcow2 + glance_properties: '' + img_name: TestVM + img_path: /usr/share/cirros-testvm/cirros-x86_64-disk.img + min_ram: 64 + os_name: cirros + public: 'true' +uid: '124' +use_cow_images: true +use_vcenter: false +user_node_name: Untitled (6f:9d) +workloads_collector: + enabled: true + metadata: + label: Workloads Collector User + restrictions: + - action: hide + condition: 'true' + weight: 10 + password: v6vMAe7Q + tenant: services + username: workloads_collector +zabbix: + db_password: leqcx9h8 + db_root_password: UEzCPllm + metadata: + label: Zabbix Access + restrictions: + - action: hide + condition: not ('experimental' in version:feature_groups) + weight: 70 + password: zabbix + username: admin diff --git a/tests/noop/astute.yaml/neut_vlan.ceph.ceil-compute.yaml b/tests/noop/astute.yaml/neut_vlan.ceph.ceil-compute.yaml new file mode 100644 index 0000000000..e1c57cf99f --- /dev/null +++ b/tests/noop/astute.yaml/neut_vlan.ceph.ceil-compute.yaml @@ -0,0 +1,567 @@ +access: + email: admin@localhost + metadata: + label: Access + weight: 10 + password: admin + tenant: admin + user: admin +auth_key: '' +auto_assign_floating_ip: false +base_syslog: + syslog_port: '514' + syslog_server: 10.108.0.2 +ceilometer: + db_password: Toe5phw4 + enabled: true + metering_secret: tHq2rcoq + user_password: WBfBSo6U +cinder: + db_password: trj609V8 + fixed_key: 7883d66c643ce9a508ebcd4cd5516fc98814a11276bc98c4e8e671188b54e941 + user_password: sJRfG0GP +cobbler: + profile: ubuntu_1404_x86_64 +corosync: + group: 226.94.1.1 + metadata: + label: Corosync + restrictions: + - action: hide + condition: 'true' + weight: 50 + port: '12000' + verified: false +debug: false +deployment_id: 37 +deployment_mode: ha_compact +external_dns: + dns_list: 8.8.8.8, 8.8.4.4 + metadata: + label: Upstream DNS + weight: 90 +external_mongo: + hosts_ip: '' + metadata: + label: External MongoDB + restrictions: + - action: hide + condition: settings:additional_components.mongo.value == false + weight: 20 + mongo_db_name: ceilometer + mongo_password: ceilometer + mongo_replset: '' + mongo_user: ceilometer +external_ntp: + metadata: + label: Upstream NTP + weight: 100 + ntp_list: 0.pool.ntp.org, 1.pool.ntp.org +fail_if_error: false +fqdn: node-127.test.domain.local +fuel_version: '6.1' +glance: + db_password: 385SUUrC + image_cache_max_size: '0' + user_password: A9KgbnX6 +heat: + auth_encryption_key: 2604abefbdf5043f07e989af10f6caba + db_password: NTeyraV2 + enabled: true + rabbit_password: ReVt6ZKQ + user_password: tryL79Yl +kernel_params: + kernel: console=ttyS0,9600 console=tty0 net.ifnames=0 biosdevname=0 rootdelay=90 + nomodeset + metadata: + label: Kernel parameters + weight: 40 +keystone: + admin_token: UxFQFw3m + db_password: e4Op1FQB +last_controller: node-125 +libvirt_type: qemu +management_network_range: 192.168.0.0/24 +management_vip: 192.168.0.6 +management_vrouter_vip: 192.168.0.7 +master_ip: 10.108.0.2 +metadata: + label: Common + weight: 30 +mongo: + enabled: false +mp: +- point: '1' + weight: '1' +- point: '2' + weight: '2' +murano: + db_password: 7I6NRZcB + enabled: false + rabbit_password: X4GK4R7f + user_password: nuCELy8q +murano_settings: + metadata: + label: Murano Settings + restrictions: + - action: hide + condition: settings:additional_components.murano.value == false + weight: 20 + murano_repo_url: http://catalog.openstack.org/ +mysql: + root_password: 5eqwkxY3 + wsrep_password: sFMiVJ7I +network_scheme: + endpoints: + br-fw-admin: + IP: + - 10.108.0.6/24 + br-mgmt: + IP: + - 192.168.0.5/24 + gateway: 192.168.0.7 + vendor_specific: + phy_interfaces: + - eth0 + vlans: 101 + br-prv: + IP: none + vendor_specific: + phy_interfaces: + - eth0 + vlans: 1000:1030 + br-storage: + IP: + - 192.168.1.5/24 + vendor_specific: + phy_interfaces: + - eth0 + vlans: 102 + interfaces: + eth0: + vendor_specific: + bus_info: '0000:00:03.0' + driver: e1000 + eth1: + vendor_specific: + bus_info: '0000:00:04.0' + driver: e1000 + eth2: + vendor_specific: + bus_info: '0000:00:05.0' + driver: e1000 + eth3: + vendor_specific: + bus_info: '0000:00:06.0' + driver: e1000 + eth4: + vendor_specific: + bus_info: '0000:00:07.0' + driver: e1000 + provider: lnx + roles: + fw-admin: br-fw-admin + management: br-mgmt + neutron/private: br-prv + storage: br-storage + transformations: + - action: add-br + name: br-fw-admin + - action: add-br + name: br-mgmt + - action: add-br + name: br-storage + - action: add-br + name: br-prv + provider: ovs + - action: add-patch + bridges: + - br-prv + - br-fw-admin + provider: ovs + - action: add-port + bridge: br-fw-admin + name: eth0 + - action: add-port + bridge: br-storage + name: eth0.102 + - action: add-port + bridge: br-mgmt + name: eth0.101 + version: '1.1' +neutron_mellanox: + metadata: + enabled: true + label: Mellanox Neutron components + toggleable: false + weight: 50 + plugin: disabled + vf_num: '16' +nodes: +- fqdn: node-121.test.domain.local + internal_address: 192.168.0.1 + internal_netmask: 255.255.255.0 + name: node-121 + role: primary-mongo + storage_address: 192.168.1.1 + storage_netmask: 255.255.255.0 + swift_zone: '121' + uid: '121' + user_node_name: Untitled (18:c9) +- fqdn: node-124.test.domain.local + internal_address: 192.168.0.2 + internal_netmask: 255.255.255.0 + name: node-124 + role: ceph-osd + storage_address: 192.168.1.2 + storage_netmask: 255.255.255.0 + swift_zone: '124' + uid: '124' + user_node_name: Untitled (6f:9d) +- fqdn: node-125.test.domain.local + internal_address: 192.168.0.3 + internal_netmask: 255.255.255.0 + name: node-125 + public_address: 172.16.0.2 + public_netmask: 255.255.255.0 + role: primary-controller + storage_address: 192.168.1.3 + storage_netmask: 255.255.255.0 + swift_zone: '125' + uid: '125' + user_node_name: Untitled (34:45) +- fqdn: node-126.test.domain.local + internal_address: 192.168.0.4 + internal_netmask: 255.255.255.0 + name: node-126 + role: ceph-osd + storage_address: 192.168.1.4 + storage_netmask: 255.255.255.0 + swift_zone: '126' + uid: '126' + user_node_name: Untitled (12:ea) +- fqdn: node-127.test.domain.local + internal_address: 192.168.0.5 + internal_netmask: 255.255.255.0 + name: node-127 + role: compute + storage_address: 192.168.1.5 + storage_netmask: 255.255.255.0 + swift_zone: '127' + uid: '127' + user_node_name: Untitled (74:27) +nova: + db_password: VXcP6cIR + state_path: /var/lib/nova + user_password: fuhtZH6v +nova_quota: false +online: true +openstack_version: 2014.2-6.1 +openstack_version_prev: null +priority: 300 +provision: + codename: trusty + image_data: + /: + container: gzip + format: ext4 + uri: http://10.108.0.2:8080/targetimages/env_37_ubuntu_1404_amd64.img.gz + /boot: + container: gzip + format: ext2 + uri: http://10.108.0.2:8080/targetimages/env_37_ubuntu_1404_amd64-boot.img.gz + metadata: + label: Provision + weight: 80 + method: image +public_network_assignment: + assign_to_all_nodes: false + metadata: + label: Public network assignment + restrictions: + - action: hide + condition: cluster:net_provider != 'neutron' + weight: 50 +public_vip: 172.16.0.3 +public_vrouter_vip: 172.16.0.4 +puppet: + manifests: rsync://10.108.0.2:/puppet/2014.2-6.1/manifests/ + modules: rsync://10.108.0.2:/puppet/2014.2-6.1/modules/ +puppet_debug: true +quantum: true +quantum_settings: + L2: + base_mac: fa:16:3e:00:00:00 + phys_nets: + physnet2: + bridge: br-prv + vlan_range: 1000:1030 + segmentation_type: vlan + L3: + use_namespaces: true + database: + passwd: zOXpcc6c + keystone: + admin_password: XgdPodA7 + metadata: + metadata_proxy_shared_secret: QU11ydS2 + predefined_networks: + net04: + L2: + network_type: vlan + physnet: physnet2 + router_ext: false + segment_id: null + L3: + enable_dhcp: true + floating: null + gateway: 192.168.111.1 + nameservers: + - 8.8.4.4 + - 8.8.8.8 + subnet: 192.168.111.0/24 + shared: false + tenant: admin + net04_ext: + L2: + network_type: local + physnet: null + router_ext: true + segment_id: null + L3: + enable_dhcp: false + floating: 172.16.0.130:172.16.0.254 + gateway: 172.16.0.1 + nameservers: [] + subnet: 172.16.0.0/24 + shared: false + tenant: admin +rabbit: + password: 1GXPbTgb +repo_setup: + installer_initrd: + local: /var/www/nailgun/ubuntu/x86_64/images/initrd.gz + remote_relative: dists/trusty/main/installer-amd64/current/images/netboot/ubuntu-installer/amd64/initrd.gz + installer_kernel: + local: /var/www/nailgun/ubuntu/x86_64/images/linux + remote_relative: dists/trusty/main/installer-amd64/current/images/netboot/ubuntu-installer/amd64/linux + metadata: + label: Repositories + weight: 50 + repos: + - name: ubuntu + priority: null + section: main universe multiverse + suite: trusty + type: deb + uri: http://archive.ubuntu.com/ubuntu/ + - name: ubuntu-updates + priority: null + section: main universe multiverse + suite: trusty-updates + type: deb + uri: http://archive.ubuntu.com/ubuntu/ + - name: ubuntu-security + priority: null + section: main universe multiverse + suite: trusty-security + type: deb + uri: http://archive.ubuntu.com/ubuntu/ + - name: mos + priority: 1050 + section: main restricted + suite: mos6.1 + type: deb + uri: http://10.108.0.2:8080/2014.2-6.1/ubuntu/x86_64 + - name: mos-updates + priority: 1050 + section: main restricted + suite: mos6.1-updates + type: deb + uri: http://mirror.fuel-infra.org/mos/ubuntu/ + - name: mos-security + priority: 1050 + section: main restricted + suite: mos6.1-security + type: deb + uri: http://mirror.fuel-infra.org/mos/ubuntu/ + - name: mos-holdback + priority: 1100 + section: main restricted + suite: mos6.1-holdback + type: deb + uri: http://mirror.fuel-infra.org/mos/ubuntu/ +resume_guests_state_on_host_boot: true +role: compute +sahara: + db_password: R68HpdNS + enabled: false + user_password: ts32qXcD +status: discover +storage: + ephemeral_ceph: false + images_ceph: true + images_vcenter: false + iser: false + metadata: + label: Storage + weight: 60 + objects_ceph: true + osd_pool_size: '2' + pg_num: 256 + volumes_ceph: true + volumes_lvm: false +storage_network_range: 192.168.1.0/24 +swift: + user_password: bpFT3TKn +syslog: + metadata: + label: Syslog + weight: 50 + syslog_port: '514' + syslog_server: '' + syslog_transport: tcp +tasks: +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/hiera/hiera.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 100 + type: puppet + uids: + - '127' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/globals/globals.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 200 + type: puppet + uids: + - '127' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/logging/logging.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 300 + type: puppet + uids: + - '127' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/tools/tools.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 400 + type: puppet + uids: + - '127' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/netconfig/netconfig.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 500 + type: puppet + uids: + - '127' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/firewall/firewall.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 600 + type: puppet + uids: + - '127' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/hosts/hosts.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 700 + type: puppet + uids: + - '127' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/zabbix/zabbix.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 800 + type: puppet + uids: + - '127' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/roles/compute.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 900 + type: puppet + uids: + - '127' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/ceilometer/compute.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1000 + type: puppet + uids: + - '127' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/dns/dns-client.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1100 + type: puppet + uids: + - '127' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/openstack-network/openstack-network-compute.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1200 + type: puppet + uids: + - '127' +test_vm_image: + container_format: bare + disk_format: qcow2 + glance_properties: '' + img_name: TestVM + img_path: /usr/share/cirros-testvm/cirros-x86_64-disk.img + min_ram: 64 + os_name: cirros + public: 'true' +uid: '127' +use_cow_images: true +use_vcenter: false +user_node_name: Untitled (74:27) +workloads_collector: + enabled: true + metadata: + label: Workloads Collector User + restrictions: + - action: hide + condition: 'true' + weight: 10 + password: v6vMAe7Q + tenant: services + username: workloads_collector +zabbix: + db_password: leqcx9h8 + db_root_password: UEzCPllm + metadata: + label: Zabbix Access + restrictions: + - action: hide + condition: not ('experimental' in version:feature_groups) + weight: 70 + password: zabbix + username: admin diff --git a/tests/noop/astute.yaml/neut_vlan.ceph.ceil-primary-controller.yaml b/tests/noop/astute.yaml/neut_vlan.ceph.ceil-primary-controller.yaml new file mode 100644 index 0000000000..4fe1cd02d7 --- /dev/null +++ b/tests/noop/astute.yaml/neut_vlan.ceph.ceil-primary-controller.yaml @@ -0,0 +1,806 @@ +access: + email: admin@localhost + metadata: + label: Access + weight: 10 + password: admin + tenant: admin + user: admin +auth_key: '' +auto_assign_floating_ip: false +base_syslog: + syslog_port: '514' + syslog_server: 10.108.0.2 +ceilometer: + db_password: Toe5phw4 + enabled: true + metering_secret: tHq2rcoq + user_password: WBfBSo6U +cinder: + db_password: trj609V8 + fixed_key: 7883d66c643ce9a508ebcd4cd5516fc98814a11276bc98c4e8e671188b54e941 + user_password: sJRfG0GP +cobbler: + profile: ubuntu_1404_x86_64 +corosync: + group: 226.94.1.1 + metadata: + label: Corosync + restrictions: + - action: hide + condition: 'true' + weight: 50 + port: '12000' + verified: false +debug: false +deployment_id: 37 +deployment_mode: ha_compact +external_dns: + dns_list: 8.8.8.8, 8.8.4.4 + metadata: + label: Upstream DNS + weight: 90 +external_mongo: + hosts_ip: '' + metadata: + label: External MongoDB + restrictions: + - action: hide + condition: settings:additional_components.mongo.value == false + weight: 20 + mongo_db_name: ceilometer + mongo_password: ceilometer + mongo_replset: '' + mongo_user: ceilometer +external_ntp: + metadata: + label: Upstream NTP + weight: 100 + ntp_list: 0.pool.ntp.org, 1.pool.ntp.org +fail_if_error: true +fqdn: node-125.test.domain.local +fuel_version: '6.1' +glance: + db_password: 385SUUrC + image_cache_max_size: '0' + user_password: A9KgbnX6 +heat: + auth_encryption_key: 2604abefbdf5043f07e989af10f6caba + db_password: NTeyraV2 + enabled: true + rabbit_password: ReVt6ZKQ + user_password: tryL79Yl +kernel_params: + kernel: console=ttyS0,9600 console=tty0 net.ifnames=0 biosdevname=0 rootdelay=90 + nomodeset + metadata: + label: Kernel parameters + weight: 40 +keystone: + admin_token: UxFQFw3m + db_password: e4Op1FQB +last_controller: node-125 +libvirt_type: qemu +management_network_range: 192.168.0.0/24 +management_vip: 192.168.0.6 +management_vrouter_vip: 192.168.0.7 +master_ip: 10.108.0.2 +metadata: + label: Common + weight: 30 +mongo: + enabled: false +mp: +- point: '1' + weight: '1' +- point: '2' + weight: '2' +murano: + db_password: 7I6NRZcB + enabled: false + rabbit_password: X4GK4R7f + user_password: nuCELy8q +murano_settings: + metadata: + label: Murano Settings + restrictions: + - action: hide + condition: settings:additional_components.murano.value == false + weight: 20 + murano_repo_url: http://catalog.openstack.org/ +mysql: + root_password: 5eqwkxY3 + wsrep_password: sFMiVJ7I +network_scheme: + endpoints: + br-ex: + IP: + - 172.16.0.2/24 + gateway: 172.16.0.1 + vendor_specific: + phy_interfaces: + - eth1 + br-floating: + IP: none + br-fw-admin: + IP: + - 10.108.0.8/24 + br-mgmt: + IP: + - 192.168.0.3/24 + vendor_specific: + phy_interfaces: + - eth0 + vlans: 101 + br-prv: + IP: none + vendor_specific: + phy_interfaces: + - eth0 + vlans: 1000:1030 + br-storage: + IP: + - 192.168.1.3/24 + vendor_specific: + phy_interfaces: + - eth0 + vlans: 102 + interfaces: + eth0: + vendor_specific: + bus_info: '0000:00:03.0' + driver: e1000 + eth1: + vendor_specific: + bus_info: '0000:00:04.0' + driver: e1000 + eth2: + vendor_specific: + bus_info: '0000:00:05.0' + driver: e1000 + eth3: + vendor_specific: + bus_info: '0000:00:06.0' + driver: e1000 + eth4: + vendor_specific: + bus_info: '0000:00:07.0' + driver: e1000 + provider: lnx + roles: + ex: br-ex + fw-admin: br-fw-admin + management: br-mgmt + neutron/floating: br-floating + neutron/private: br-prv + storage: br-storage + transformations: + - action: add-br + name: br-fw-admin + - action: add-br + name: br-mgmt + - action: add-br + name: br-storage + - action: add-br + name: br-ex + - action: add-br + name: br-floating + provider: ovs + - action: add-patch + bridges: + - br-floating + - br-ex + provider: ovs + - action: add-br + name: br-prv + provider: ovs + - action: add-patch + bridges: + - br-prv + - br-fw-admin + provider: ovs + - action: add-port + bridge: br-fw-admin + name: eth0 + - action: add-port + bridge: br-storage + name: eth0.102 + - action: add-port + bridge: br-mgmt + name: eth0.101 + - action: add-port + bridge: br-ex + name: eth1 + version: '1.1' +neutron_mellanox: + metadata: + enabled: true + label: Mellanox Neutron components + toggleable: false + weight: 50 + plugin: disabled + vf_num: '16' +nodes: +- fqdn: node-121.test.domain.local + internal_address: 192.168.0.1 + internal_netmask: 255.255.255.0 + name: node-121 + role: primary-mongo + storage_address: 192.168.1.1 + storage_netmask: 255.255.255.0 + swift_zone: '121' + uid: '121' + user_node_name: Untitled (18:c9) +- fqdn: node-124.test.domain.local + internal_address: 192.168.0.2 + internal_netmask: 255.255.255.0 + name: node-124 + role: ceph-osd + storage_address: 192.168.1.2 + storage_netmask: 255.255.255.0 + swift_zone: '124' + uid: '124' + user_node_name: Untitled (6f:9d) +- fqdn: node-125.test.domain.local + internal_address: 192.168.0.3 + internal_netmask: 255.255.255.0 + name: node-125 + public_address: 172.16.0.2 + public_netmask: 255.255.255.0 + role: primary-controller + storage_address: 192.168.1.3 + storage_netmask: 255.255.255.0 + swift_zone: '125' + uid: '125' + user_node_name: Untitled (34:45) +- fqdn: node-126.test.domain.local + internal_address: 192.168.0.4 + internal_netmask: 255.255.255.0 + name: node-126 + role: ceph-osd + storage_address: 192.168.1.4 + storage_netmask: 255.255.255.0 + swift_zone: '126' + uid: '126' + user_node_name: Untitled (12:ea) +- fqdn: node-127.test.domain.local + internal_address: 192.168.0.5 + internal_netmask: 255.255.255.0 + name: node-127 + role: compute + storage_address: 192.168.1.5 + storage_netmask: 255.255.255.0 + swift_zone: '127' + uid: '127' + user_node_name: Untitled (74:27) +nova: + db_password: VXcP6cIR + state_path: /var/lib/nova + user_password: fuhtZH6v +nova_quota: false +online: true +openstack_version: 2014.2-6.1 +openstack_version_prev: null +priority: 200 +provision: + codename: trusty + image_data: + /: + container: gzip + format: ext4 + uri: http://10.108.0.2:8080/targetimages/env_37_ubuntu_1404_amd64.img.gz + /boot: + container: gzip + format: ext2 + uri: http://10.108.0.2:8080/targetimages/env_37_ubuntu_1404_amd64-boot.img.gz + metadata: + label: Provision + weight: 80 + method: image +public_network_assignment: + assign_to_all_nodes: false + metadata: + label: Public network assignment + restrictions: + - action: hide + condition: cluster:net_provider != 'neutron' + weight: 50 +public_vip: 172.16.0.3 +public_vrouter_vip: 172.16.0.4 +puppet: + manifests: rsync://10.108.0.2:/puppet/2014.2-6.1/manifests/ + modules: rsync://10.108.0.2:/puppet/2014.2-6.1/modules/ +puppet_debug: true +quantum: true +quantum_settings: + L2: + base_mac: fa:16:3e:00:00:00 + phys_nets: + physnet2: + bridge: br-prv + vlan_range: 1000:1030 + segmentation_type: vlan + L3: + use_namespaces: true + database: + passwd: zOXpcc6c + keystone: + admin_password: XgdPodA7 + metadata: + metadata_proxy_shared_secret: QU11ydS2 + predefined_networks: + net04: + L2: + network_type: vlan + physnet: physnet2 + router_ext: false + segment_id: null + L3: + enable_dhcp: true + floating: null + gateway: 192.168.111.1 + nameservers: + - 8.8.4.4 + - 8.8.8.8 + subnet: 192.168.111.0/24 + shared: false + tenant: admin + net04_ext: + L2: + network_type: local + physnet: null + router_ext: true + segment_id: null + L3: + enable_dhcp: false + floating: 172.16.0.130:172.16.0.254 + gateway: 172.16.0.1 + nameservers: [] + subnet: 172.16.0.0/24 + shared: false + tenant: admin +rabbit: + password: 1GXPbTgb +repo_setup: + installer_initrd: + local: /var/www/nailgun/ubuntu/x86_64/images/initrd.gz + remote_relative: dists/trusty/main/installer-amd64/current/images/netboot/ubuntu-installer/amd64/initrd.gz + installer_kernel: + local: /var/www/nailgun/ubuntu/x86_64/images/linux + remote_relative: dists/trusty/main/installer-amd64/current/images/netboot/ubuntu-installer/amd64/linux + metadata: + label: Repositories + weight: 50 + repos: + - name: ubuntu + priority: null + section: main universe multiverse + suite: trusty + type: deb + uri: http://archive.ubuntu.com/ubuntu/ + - name: ubuntu-updates + priority: null + section: main universe multiverse + suite: trusty-updates + type: deb + uri: http://archive.ubuntu.com/ubuntu/ + - name: ubuntu-security + priority: null + section: main universe multiverse + suite: trusty-security + type: deb + uri: http://archive.ubuntu.com/ubuntu/ + - name: mos + priority: 1050 + section: main restricted + suite: mos6.1 + type: deb + uri: http://10.108.0.2:8080/2014.2-6.1/ubuntu/x86_64 + - name: mos-updates + priority: 1050 + section: main restricted + suite: mos6.1-updates + type: deb + uri: http://mirror.fuel-infra.org/mos/ubuntu/ + - name: mos-security + priority: 1050 + section: main restricted + suite: mos6.1-security + type: deb + uri: http://mirror.fuel-infra.org/mos/ubuntu/ + - name: mos-holdback + priority: 1100 + section: main restricted + suite: mos6.1-holdback + type: deb + uri: http://mirror.fuel-infra.org/mos/ubuntu/ +resume_guests_state_on_host_boot: true +role: primary-controller +sahara: + db_password: R68HpdNS + enabled: false + user_password: ts32qXcD +status: discover +storage: + ephemeral_ceph: false + images_ceph: true + images_vcenter: false + iser: false + metadata: + label: Storage + weight: 60 + objects_ceph: true + osd_pool_size: '2' + pg_num: 256 + volumes_ceph: true + volumes_lvm: false +storage_network_range: 192.168.1.0/24 +swift: + user_password: bpFT3TKn +syslog: + metadata: + label: Syslog + weight: 50 + syslog_port: '514' + syslog_server: '' + syslog_transport: tcp +tasks: +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/hiera/hiera.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 100 + type: puppet + uids: + - '125' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/globals/globals.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 200 + type: puppet + uids: + - '125' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/logging/logging.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 300 + type: puppet + uids: + - '125' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/tools/tools.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 400 + type: puppet + uids: + - '125' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/umm/umm.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 500 + type: puppet + uids: + - '125' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/netconfig/netconfig.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 600 + type: puppet + uids: + - '125' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/hosts/hosts.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 700 + type: puppet + uids: + - '125' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/firewall/firewall.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 800 + type: puppet + uids: + - '125' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/cluster/cluster.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 900 + type: puppet + uids: + - '125' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/virtual_ips/virtual_ips.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1000 + type: puppet + uids: + - '125' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/virtual_ips/conntrackd.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1100 + type: puppet + uids: + - '125' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/cluster-haproxy/cluster-haproxy.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1200 + type: puppet + uids: + - '125' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/openstack-haproxy/openstack-haproxy.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1300 + type: puppet + uids: + - '125' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/dns/dns-server.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1400 + type: puppet + uids: + - '125' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/dns/dns-client.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1500 + type: puppet + uids: + - '125' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/ntp/ntp-server.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1600 + type: puppet + uids: + - '125' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/database/database.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1700 + type: puppet + uids: + - '125' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/ceilometer/controller.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1800 + type: puppet + uids: + - '125' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/rabbitmq/rabbitmq.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1900 + type: puppet + uids: + - '125' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/memcached/memcached.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 2000 + type: puppet + uids: + - '125' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/keystone/keystone.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 2100 + type: puppet + uids: + - '125' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/openstack-cinder/openstack-cinder.pp + puppet_modules: /etc/puppet/modules + timeout: 1200 + priority: 2200 + type: puppet + uids: + - '125' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/glance/glance.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 2300 + type: puppet + uids: + - '125' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/openstack-controller/openstack-controller.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 2400 + type: puppet + uids: + - '125' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/openstack-network/openstack-network-controller.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 2500 + type: puppet + uids: + - '125' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/heat/heat.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 2600 + type: puppet + uids: + - '125' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/horizon/horizon.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 2700 + type: puppet + uids: + - '125' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/murano/murano.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 2800 + type: puppet + uids: + - '125' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/sahara/sahara.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 2900 + type: puppet + uids: + - '125' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/api-proxy/api-proxy.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 3000 + type: puppet + uids: + - '125' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/ceph/mon.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 3100 + type: puppet + uids: + - '125' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/ceph/radosgw.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 3200 + type: puppet + uids: + - '125' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/swift/swift.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 3300 + type: puppet + uids: + - '125' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/roles/controller.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 3400 + type: puppet + uids: + - '125' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/swift/rebalance_cronjob.pp + puppet_modules: /etc/puppet/modules + timeout: 300 + priority: 3500 + type: puppet + uids: + - '125' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/zabbix/zabbix.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 3600 + type: puppet + uids: + - '125' +test_vm_image: + container_format: bare + disk_format: qcow2 + glance_properties: '' + img_name: TestVM + img_path: /usr/share/cirros-testvm/cirros-x86_64-disk.img + min_ram: 64 + os_name: cirros + public: 'true' +uid: '125' +use_cow_images: true +use_vcenter: false +user_node_name: Untitled (34:45) +workloads_collector: + enabled: true + metadata: + label: Workloads Collector User + restrictions: + - action: hide + condition: 'true' + weight: 10 + password: v6vMAe7Q + tenant: services + username: workloads_collector +zabbix: + db_password: leqcx9h8 + db_root_password: UEzCPllm + metadata: + label: Zabbix Access + restrictions: + - action: hide + condition: not ('experimental' in version:feature_groups) + weight: 70 + password: zabbix + username: admin diff --git a/tests/noop/astute.yaml/neut_vlan.ceph.ceil-primary-mongo.yaml b/tests/noop/astute.yaml/neut_vlan.ceph.ceil-primary-mongo.yaml new file mode 100644 index 0000000000..0c06a592ec --- /dev/null +++ b/tests/noop/astute.yaml/neut_vlan.ceph.ceil-primary-mongo.yaml @@ -0,0 +1,549 @@ +access: + email: admin@localhost + metadata: + label: Access + weight: 10 + password: admin + tenant: admin + user: admin +auth_key: '' +auto_assign_floating_ip: false +base_syslog: + syslog_port: '514' + syslog_server: 10.108.0.2 +ceilometer: + db_password: Toe5phw4 + enabled: true + metering_secret: tHq2rcoq + user_password: WBfBSo6U +cinder: + db_password: trj609V8 + fixed_key: 7883d66c643ce9a508ebcd4cd5516fc98814a11276bc98c4e8e671188b54e941 + user_password: sJRfG0GP +cobbler: + profile: ubuntu_1404_x86_64 +corosync: + group: 226.94.1.1 + metadata: + label: Corosync + restrictions: + - action: hide + condition: 'true' + weight: 50 + port: '12000' + verified: false +debug: false +deployment_id: 37 +deployment_mode: ha_compact +external_dns: + dns_list: 8.8.8.8, 8.8.4.4 + metadata: + label: Upstream DNS + weight: 90 +external_mongo: + hosts_ip: '' + metadata: + label: External MongoDB + restrictions: + - action: hide + condition: settings:additional_components.mongo.value == false + weight: 20 + mongo_db_name: ceilometer + mongo_password: ceilometer + mongo_replset: '' + mongo_user: ceilometer +external_ntp: + metadata: + label: Upstream NTP + weight: 100 + ntp_list: 0.pool.ntp.org, 1.pool.ntp.org +fail_if_error: true +fqdn: node-121.test.domain.local +fuel_version: '6.1' +glance: + db_password: 385SUUrC + image_cache_max_size: '0' + user_password: A9KgbnX6 +heat: + auth_encryption_key: 2604abefbdf5043f07e989af10f6caba + db_password: NTeyraV2 + enabled: true + rabbit_password: ReVt6ZKQ + user_password: tryL79Yl +kernel_params: + kernel: console=ttyS0,9600 console=tty0 net.ifnames=0 biosdevname=0 rootdelay=90 + nomodeset + metadata: + label: Kernel parameters + weight: 40 +keystone: + admin_token: UxFQFw3m + db_password: e4Op1FQB +last_controller: node-125 +libvirt_type: qemu +management_network_range: 192.168.0.0/24 +management_vip: 192.168.0.6 +management_vrouter_vip: 192.168.0.7 +master_ip: 10.108.0.2 +metadata: + label: Common + weight: 30 +mongo: + enabled: false +mp: +- point: '1' + weight: '1' +- point: '2' + weight: '2' +murano: + db_password: 7I6NRZcB + enabled: false + rabbit_password: X4GK4R7f + user_password: nuCELy8q +murano_settings: + metadata: + label: Murano Settings + restrictions: + - action: hide + condition: settings:additional_components.murano.value == false + weight: 20 + murano_repo_url: http://catalog.openstack.org/ +mysql: + root_password: 5eqwkxY3 + wsrep_password: sFMiVJ7I +network_scheme: + endpoints: + br-fw-admin: + IP: + - 10.108.0.4/24 + br-mgmt: + IP: + - 192.168.0.1/24 + gateway: 192.168.0.7 + vendor_specific: + phy_interfaces: + - eth0 + vlans: 101 + br-prv: + IP: none + vendor_specific: + phy_interfaces: + - eth0 + vlans: 1000:1030 + br-storage: + IP: + - 192.168.1.1/24 + vendor_specific: + phy_interfaces: + - eth0 + vlans: 102 + interfaces: + eth0: + vendor_specific: + bus_info: '0000:00:03.0' + driver: e1000 + eth1: + vendor_specific: + bus_info: '0000:00:04.0' + driver: e1000 + eth2: + vendor_specific: + bus_info: '0000:00:05.0' + driver: e1000 + eth3: + vendor_specific: + bus_info: '0000:00:06.0' + driver: e1000 + eth4: + vendor_specific: + bus_info: '0000:00:07.0' + driver: e1000 + provider: lnx + roles: + fw-admin: br-fw-admin + management: br-mgmt + neutron/private: br-prv + storage: br-storage + transformations: + - action: add-br + name: br-fw-admin + - action: add-br + name: br-mgmt + - action: add-br + name: br-storage + - action: add-br + name: br-prv + provider: ovs + - action: add-patch + bridges: + - br-prv + - br-fw-admin + provider: ovs + - action: add-port + bridge: br-fw-admin + name: eth0 + - action: add-port + bridge: br-storage + name: eth0.102 + - action: add-port + bridge: br-mgmt + name: eth0.101 + version: '1.1' +neutron_mellanox: + metadata: + enabled: true + label: Mellanox Neutron components + toggleable: false + weight: 50 + plugin: disabled + vf_num: '16' +nodes: +- fqdn: node-121.test.domain.local + internal_address: 192.168.0.1 + internal_netmask: 255.255.255.0 + name: node-121 + role: primary-mongo + storage_address: 192.168.1.1 + storage_netmask: 255.255.255.0 + swift_zone: '121' + uid: '121' + user_node_name: Untitled (18:c9) +- fqdn: node-124.test.domain.local + internal_address: 192.168.0.2 + internal_netmask: 255.255.255.0 + name: node-124 + role: ceph-osd + storage_address: 192.168.1.2 + storage_netmask: 255.255.255.0 + swift_zone: '124' + uid: '124' + user_node_name: Untitled (6f:9d) +- fqdn: node-125.test.domain.local + internal_address: 192.168.0.3 + internal_netmask: 255.255.255.0 + name: node-125 + public_address: 172.16.0.2 + public_netmask: 255.255.255.0 + role: primary-controller + storage_address: 192.168.1.3 + storage_netmask: 255.255.255.0 + swift_zone: '125' + uid: '125' + user_node_name: Untitled (34:45) +- fqdn: node-126.test.domain.local + internal_address: 192.168.0.4 + internal_netmask: 255.255.255.0 + name: node-126 + role: ceph-osd + storage_address: 192.168.1.4 + storage_netmask: 255.255.255.0 + swift_zone: '126' + uid: '126' + user_node_name: Untitled (12:ea) +- fqdn: node-127.test.domain.local + internal_address: 192.168.0.5 + internal_netmask: 255.255.255.0 + name: node-127 + role: compute + storage_address: 192.168.1.5 + storage_netmask: 255.255.255.0 + swift_zone: '127' + uid: '127' + user_node_name: Untitled (74:27) +nova: + db_password: VXcP6cIR + state_path: /var/lib/nova + user_password: fuhtZH6v +nova_quota: false +online: true +openstack_version: 2014.2-6.1 +openstack_version_prev: null +priority: 100 +provision: + codename: trusty + image_data: + /: + container: gzip + format: ext4 + uri: http://10.108.0.2:8080/targetimages/env_37_ubuntu_1404_amd64.img.gz + /boot: + container: gzip + format: ext2 + uri: http://10.108.0.2:8080/targetimages/env_37_ubuntu_1404_amd64-boot.img.gz + metadata: + label: Provision + weight: 80 + method: image +public_network_assignment: + assign_to_all_nodes: false + metadata: + label: Public network assignment + restrictions: + - action: hide + condition: cluster:net_provider != 'neutron' + weight: 50 +public_vip: 172.16.0.3 +public_vrouter_vip: 172.16.0.4 +puppet: + manifests: rsync://10.108.0.2:/puppet/2014.2-6.1/manifests/ + modules: rsync://10.108.0.2:/puppet/2014.2-6.1/modules/ +puppet_debug: true +quantum: true +quantum_settings: + L2: + base_mac: fa:16:3e:00:00:00 + phys_nets: + physnet2: + bridge: br-prv + vlan_range: 1000:1030 + segmentation_type: vlan + L3: + use_namespaces: true + database: + passwd: zOXpcc6c + keystone: + admin_password: XgdPodA7 + metadata: + metadata_proxy_shared_secret: QU11ydS2 + predefined_networks: + net04: + L2: + network_type: vlan + physnet: physnet2 + router_ext: false + segment_id: null + L3: + enable_dhcp: true + floating: null + gateway: 192.168.111.1 + nameservers: + - 8.8.4.4 + - 8.8.8.8 + subnet: 192.168.111.0/24 + shared: false + tenant: admin + net04_ext: + L2: + network_type: local + physnet: null + router_ext: true + segment_id: null + L3: + enable_dhcp: false + floating: 172.16.0.130:172.16.0.254 + gateway: 172.16.0.1 + nameservers: [] + subnet: 172.16.0.0/24 + shared: false + tenant: admin +rabbit: + password: 1GXPbTgb +repo_setup: + installer_initrd: + local: /var/www/nailgun/ubuntu/x86_64/images/initrd.gz + remote_relative: dists/trusty/main/installer-amd64/current/images/netboot/ubuntu-installer/amd64/initrd.gz + installer_kernel: + local: /var/www/nailgun/ubuntu/x86_64/images/linux + remote_relative: dists/trusty/main/installer-amd64/current/images/netboot/ubuntu-installer/amd64/linux + metadata: + label: Repositories + weight: 50 + repos: + - name: ubuntu + priority: null + section: main universe multiverse + suite: trusty + type: deb + uri: http://archive.ubuntu.com/ubuntu/ + - name: ubuntu-updates + priority: null + section: main universe multiverse + suite: trusty-updates + type: deb + uri: http://archive.ubuntu.com/ubuntu/ + - name: ubuntu-security + priority: null + section: main universe multiverse + suite: trusty-security + type: deb + uri: http://archive.ubuntu.com/ubuntu/ + - name: mos + priority: 1050 + section: main restricted + suite: mos6.1 + type: deb + uri: http://10.108.0.2:8080/2014.2-6.1/ubuntu/x86_64 + - name: mos-updates + priority: 1050 + section: main restricted + suite: mos6.1-updates + type: deb + uri: http://mirror.fuel-infra.org/mos/ubuntu/ + - name: mos-security + priority: 1050 + section: main restricted + suite: mos6.1-security + type: deb + uri: http://mirror.fuel-infra.org/mos/ubuntu/ + - name: mos-holdback + priority: 1100 + section: main restricted + suite: mos6.1-holdback + type: deb + uri: http://mirror.fuel-infra.org/mos/ubuntu/ +resume_guests_state_on_host_boot: true +role: primary-mongo +sahara: + db_password: R68HpdNS + enabled: false + user_password: ts32qXcD +status: discover +storage: + ephemeral_ceph: false + images_ceph: true + images_vcenter: false + iser: false + metadata: + label: Storage + weight: 60 + objects_ceph: true + osd_pool_size: '2' + pg_num: 256 + volumes_ceph: true + volumes_lvm: false +storage_network_range: 192.168.1.0/24 +swift: + user_password: bpFT3TKn +syslog: + metadata: + label: Syslog + weight: 50 + syslog_port: '514' + syslog_server: '' + syslog_transport: tcp +tasks: +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/hiera/hiera.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 100 + type: puppet + uids: + - '121' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/globals/globals.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 200 + type: puppet + uids: + - '121' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/logging/logging.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 300 + type: puppet + uids: + - '121' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/tools/tools.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 400 + type: puppet + uids: + - '121' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/netconfig/netconfig.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 500 + type: puppet + uids: + - '121' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/firewall/firewall.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 600 + type: puppet + uids: + - '121' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/hosts/hosts.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 700 + type: puppet + uids: + - '121' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/zabbix/zabbix.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 800 + type: puppet + uids: + - '121' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/roles/mongo_primary.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 900 + type: puppet + uids: + - '121' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/dns/dns-client.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1000 + type: puppet + uids: + - '121' +test_vm_image: + container_format: bare + disk_format: qcow2 + glance_properties: '' + img_name: TestVM + img_path: /usr/share/cirros-testvm/cirros-x86_64-disk.img + min_ram: 64 + os_name: cirros + public: 'true' +uid: '121' +use_cow_images: true +use_vcenter: false +user_node_name: Untitled (18:c9) +workloads_collector: + enabled: true + metadata: + label: Workloads Collector User + restrictions: + - action: hide + condition: 'true' + weight: 10 + password: v6vMAe7Q + tenant: services + username: workloads_collector +zabbix: + db_password: leqcx9h8 + db_root_password: UEzCPllm + metadata: + label: Zabbix Access + restrictions: + - action: hide + condition: not ('experimental' in version:feature_groups) + weight: 70 + password: zabbix + username: admin diff --git a/tests/noop/astute.yaml/novanet-compute.yaml b/tests/noop/astute.yaml/novanet-compute.yaml new file mode 100644 index 0000000000..8bf5bc7ec5 --- /dev/null +++ b/tests/noop/astute.yaml/novanet-compute.yaml @@ -0,0 +1,509 @@ +access: + email: admin@localhost + metadata: + label: Access + weight: 10 + password: admin + tenant: admin + user: admin +auth_key: '' +auto_assign_floating_ip: false +base_syslog: + syslog_port: '514' + syslog_server: 10.108.0.2 +ceilometer: + db_password: ZCWaANKg + enabled: false + metering_secret: 5gCCPfO8 + user_password: Ag2mna7b +cinder: + db_password: VwpNB13X + fixed_key: 0d983a86451032ba0b738fc12a654e314354aa0194390eed54608196831a425e + user_password: o9msdnTx +cobbler: + profile: ubuntu_1404_x86_64 +corosync: + group: 226.94.1.1 + metadata: + label: Corosync + restrictions: + - action: hide + condition: 'true' + weight: 50 + port: '12000' + verified: false +debug: false +deployment_id: 39 +deployment_mode: ha_compact +dns_nameservers: +- 8.8.4.4 +- 8.8.8.8 +external_dns: + dns_list: 8.8.8.8, 8.8.4.4 + metadata: + label: Upstream DNS + weight: 90 +external_mongo: + hosts_ip: '' + metadata: + label: External MongoDB + restrictions: + - action: hide + condition: settings:additional_components.mongo.value == false + weight: 20 + mongo_db_name: ceilometer + mongo_password: ceilometer + mongo_replset: '' + mongo_user: ceilometer +external_ntp: + metadata: + label: Upstream NTP + weight: 100 + ntp_list: 0.pool.ntp.org, 1.pool.ntp.org +fail_if_error: false +fixed_network_range: 10.0.0.0/16 +floating_network_range: +- 172.16.0.128-172.16.0.254 +fqdn: node-136.test.domain.local +fuel_version: '6.1' +glance: + db_password: s5aslXZn + image_cache_max_size: '5368709120' + user_password: UEtUqI9Z +heat: + auth_encryption_key: 194abdbbc31aded70db9b2084be8e215 + db_password: SvgZ3tKP + enabled: true + rabbit_password: 0fPV94mX + user_password: Nlq9bTGV +kernel_params: + kernel: console=ttyS0,9600 console=tty0 net.ifnames=0 biosdevname=0 rootdelay=90 + nomodeset + metadata: + label: Kernel parameters + weight: 40 +keystone: + admin_token: Uo10oynr + db_password: MnrQiwLn +last_controller: node-137 +libvirt_type: qemu +management_network_range: 192.168.0.0/24 +management_vip: 192.168.0.5 +management_vrouter_vip: 192.168.0.6 +master_ip: 10.108.0.2 +metadata: + label: Common + weight: 30 +mongo: + enabled: false +mp: +- point: '1' + weight: '1' +- point: '2' + weight: '2' +murano: + db_password: 07KOdk75 + enabled: false + rabbit_password: rJfH9CSy + user_password: mrQ9d0JW +murano_settings: + metadata: + label: Murano Settings + restrictions: + - action: hide + condition: settings:additional_components.murano.value == false + weight: 20 + murano_repo_url: http://catalog.openstack.org/ +mysql: + root_password: M3VTf8U9 + wsrep_password: jMCDynJR +network_scheme: + endpoints: + br-ex: + IP: + - 172.16.0.4/24 + gateway: 172.16.0.1 + br-fw-admin: + IP: + - 10.108.0.7/24 + br-mgmt: + IP: + - 192.168.0.3/24 + br-storage: + IP: + - 192.168.1.3/24 + eth0.103: + IP: none + interfaces: + eth0: {} + eth1: {} + eth2: {} + eth3: {} + eth4: {} + provider: lnx + roles: + ex: br-ex + fw-admin: br-fw-admin + management: br-mgmt + novanetwork/fixed: eth0.103 + storage: br-storage + transformations: + - action: add-br + name: br-fw-admin + - action: add-br + name: br-storage + - action: add-br + name: br-mgmt + - action: add-br + name: br-ex + - action: add-port + bridge: br-fw-admin + name: eth0 + - action: add-port + bridge: br-storage + name: eth0.102 + - action: add-port + bridge: br-mgmt + name: eth0.101 + - action: add-port + bridge: br-ex + name: eth1 + - action: add-port + name: eth0.103 + version: '1.1' +neutron_mellanox: + metadata: + enabled: true + label: Mellanox Neutron components + toggleable: false + weight: 50 + plugin: disabled + vf_num: '16' +nodes: +- fqdn: node-133.test.domain.local + internal_address: 192.168.0.1 + internal_netmask: 255.255.255.0 + name: node-133 + public_address: 172.16.0.2 + public_netmask: 255.255.255.0 + role: zabbix-server + storage_address: 192.168.1.1 + storage_netmask: 255.255.255.0 + swift_zone: '133' + uid: '133' + user_node_name: Untitled (74:27) +- fqdn: node-135.test.domain.local + internal_address: 192.168.0.2 + internal_netmask: 255.255.255.0 + name: node-135 + public_address: 172.16.0.3 + public_netmask: 255.255.255.0 + role: cinder + storage_address: 192.168.1.2 + storage_netmask: 255.255.255.0 + swift_zone: '135' + uid: '135' + user_node_name: Untitled (18:c9) +- fqdn: node-136.test.domain.local + internal_address: 192.168.0.3 + internal_netmask: 255.255.255.0 + name: node-136 + public_address: 172.16.0.4 + public_netmask: 255.255.255.0 + role: compute + storage_address: 192.168.1.3 + storage_netmask: 255.255.255.0 + swift_zone: '136' + uid: '136' + user_node_name: Untitled (1d:4b) +- fqdn: node-137.test.domain.local + internal_address: 192.168.0.4 + internal_netmask: 255.255.255.0 + name: node-137 + public_address: 172.16.0.5 + public_netmask: 255.255.255.0 + role: primary-controller + storage_address: 192.168.1.4 + storage_netmask: 255.255.255.0 + swift_zone: '137' + uid: '137' + user_node_name: Untitled (34:45) +nova: + db_password: aAU4jYDt + state_path: /var/lib/nova + user_password: UyrT2Ama +nova_quota: false +novanetwork_parameters: + network_manager: FlatDHCPManager + network_size: 65536 + num_networks: 1 +online: true +openstack_version: 2014.2-6.1 +openstack_version_prev: null +priority: 300 +provision: + codename: trusty + image_data: + /: + container: gzip + format: ext4 + uri: http://10.108.0.2:8080/targetimages/env_39_ubuntu_1404_amd64.img.gz + /boot: + container: gzip + format: ext2 + uri: http://10.108.0.2:8080/targetimages/env_39_ubuntu_1404_amd64-boot.img.gz + metadata: + label: Provision + weight: 80 + method: image +public_network_assignment: + assign_to_all_nodes: false + metadata: + label: Public network assignment + restrictions: + - action: hide + condition: cluster:net_provider != 'neutron' + weight: 50 +public_vip: 172.16.0.6 +public_vrouter_vip: 172.16.0.7 +puppet: + manifests: rsync://10.108.0.2:/puppet/2014.2-6.1/manifests/ + modules: rsync://10.108.0.2:/puppet/2014.2-6.1/modules/ +puppet_debug: true +quantum_settings: + database: + passwd: CXPYOeh1 + keystone: + admin_password: RmkB9TdA + metadata: + metadata_proxy_shared_secret: JeXWLjmx +rabbit: + password: zrMvquYX +repo_setup: + installer_initrd: + local: /var/www/nailgun/ubuntu/x86_64/images/initrd.gz + remote_relative: dists/trusty/main/installer-amd64/current/images/netboot/ubuntu-installer/amd64/initrd.gz + installer_kernel: + local: /var/www/nailgun/ubuntu/x86_64/images/linux + remote_relative: dists/trusty/main/installer-amd64/current/images/netboot/ubuntu-installer/amd64/linux + metadata: + label: Repositories + weight: 50 + repos: + - name: ubuntu + priority: null + section: main universe multiverse + suite: trusty + type: deb + uri: http://archive.ubuntu.com/ubuntu/ + - name: ubuntu-updates + priority: null + section: main universe multiverse + suite: trusty-updates + type: deb + uri: http://archive.ubuntu.com/ubuntu/ + - name: ubuntu-security + priority: null + section: main universe multiverse + suite: trusty-security + type: deb + uri: http://archive.ubuntu.com/ubuntu/ + - name: mos + priority: 1050 + section: main restricted + suite: mos6.1 + type: deb + uri: http://10.108.0.2:8080/2014.2-6.1/ubuntu/x86_64 + - name: mos-updates + priority: 1050 + section: main restricted + suite: mos6.1-updates + type: deb + uri: http://mirror.fuel-infra.org/mos/ubuntu/ + - name: mos-security + priority: 1050 + section: main restricted + suite: mos6.1-security + type: deb + uri: http://mirror.fuel-infra.org/mos/ubuntu/ + - name: mos-holdback + priority: 1100 + section: main restricted + suite: mos6.1-holdback + type: deb + uri: http://mirror.fuel-infra.org/mos/ubuntu/ +resume_guests_state_on_host_boot: true +role: compute +sahara: + db_password: xzyWeMAy + enabled: false + user_password: EqqXoxx9 +status: discover +storage: + ephemeral_ceph: false + images_ceph: false + images_vcenter: false + iser: false + metadata: + label: Storage + weight: 60 + objects_ceph: false + osd_pool_size: '2' + pg_num: 128 + volumes_ceph: false + volumes_lvm: true +storage_network_range: 192.168.1.0/24 +swift: + user_password: UcPlc9Wp +syslog: + metadata: + label: Syslog + weight: 50 + syslog_port: '514' + syslog_server: '' + syslog_transport: tcp +tasks: +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/hiera/hiera.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 100 + type: puppet + uids: + - '136' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/globals/globals.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 200 + type: puppet + uids: + - '136' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/logging/logging.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 300 + type: puppet + uids: + - '136' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/tools/tools.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 400 + type: puppet + uids: + - '136' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/netconfig/netconfig.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 500 + type: puppet + uids: + - '136' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/firewall/firewall.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 600 + type: puppet + uids: + - '136' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/hosts/hosts.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 700 + type: puppet + uids: + - '136' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/zabbix/zabbix.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 800 + type: puppet + uids: + - '136' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/roles/compute.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 900 + type: puppet + uids: + - '136' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/ceilometer/compute.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1000 + type: puppet + uids: + - '136' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/dns/dns-client.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1100 + type: puppet + uids: + - '136' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/openstack-network/openstack-network-compute.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1200 + type: puppet + uids: + - '136' +test_vm_image: + container_format: bare + disk_format: qcow2 + glance_properties: '' + img_name: TestVM + img_path: /usr/share/cirros-testvm/cirros-x86_64-disk.img + min_ram: 64 + os_name: cirros + public: 'true' +uid: '136' +use_cinder: true +use_cow_images: true +use_vcenter: false +user_node_name: Untitled (1d:4b) +workloads_collector: + enabled: true + metadata: + label: Workloads Collector User + restrictions: + - action: hide + condition: 'true' + weight: 10 + password: MhdNr1K7 + tenant: services + username: workloads_collector +zabbix: + db_password: UmcIBNZQ + db_root_password: aFJ2D3iZ + metadata: + label: Zabbix Access + restrictions: + - action: hide + condition: not ('experimental' in version:feature_groups) + weight: 70 + password: zabbix + username: admin diff --git a/tests/noop/astute.yaml/novanet-primary-controller.yaml b/tests/noop/astute.yaml/novanet-primary-controller.yaml new file mode 100644 index 0000000000..f1dacdad15 --- /dev/null +++ b/tests/noop/astute.yaml/novanet-primary-controller.yaml @@ -0,0 +1,725 @@ +access: + email: admin@localhost + metadata: + label: Access + weight: 10 + password: admin + tenant: admin + user: admin +auth_key: '' +auto_assign_floating_ip: false +base_syslog: + syslog_port: '514' + syslog_server: 10.108.0.2 +ceilometer: + db_password: ZCWaANKg + enabled: false + metering_secret: 5gCCPfO8 + user_password: Ag2mna7b +cinder: + db_password: VwpNB13X + fixed_key: 0d983a86451032ba0b738fc12a654e314354aa0194390eed54608196831a425e + user_password: o9msdnTx +cobbler: + profile: ubuntu_1404_x86_64 +corosync: + group: 226.94.1.1 + metadata: + label: Corosync + restrictions: + - action: hide + condition: 'true' + weight: 50 + port: '12000' + verified: false +debug: false +deployment_id: 39 +deployment_mode: ha_compact +dns_nameservers: +- 8.8.4.4 +- 8.8.8.8 +external_dns: + dns_list: 8.8.8.8, 8.8.4.4 + metadata: + label: Upstream DNS + weight: 90 +external_mongo: + hosts_ip: '' + metadata: + label: External MongoDB + restrictions: + - action: hide + condition: settings:additional_components.mongo.value == false + weight: 20 + mongo_db_name: ceilometer + mongo_password: ceilometer + mongo_replset: '' + mongo_user: ceilometer +external_ntp: + metadata: + label: Upstream NTP + weight: 100 + ntp_list: 0.pool.ntp.org, 1.pool.ntp.org +fail_if_error: true +fixed_network_range: 10.0.0.0/16 +floating_network_range: +- 172.16.0.128-172.16.0.254 +fqdn: node-137.test.domain.local +fuel_version: '6.1' +glance: + db_password: s5aslXZn + image_cache_max_size: '13868466176' + user_password: UEtUqI9Z +heat: + auth_encryption_key: 194abdbbc31aded70db9b2084be8e215 + db_password: SvgZ3tKP + enabled: true + rabbit_password: 0fPV94mX + user_password: Nlq9bTGV +kernel_params: + kernel: console=ttyS0,9600 console=tty0 net.ifnames=0 biosdevname=0 rootdelay=90 + nomodeset + metadata: + label: Kernel parameters + weight: 40 +keystone: + admin_token: Uo10oynr + db_password: MnrQiwLn +last_controller: node-137 +libvirt_type: qemu +management_network_range: 192.168.0.0/24 +management_vip: 192.168.0.5 +management_vrouter_vip: 192.168.0.6 +master_ip: 10.108.0.2 +metadata: + label: Common + weight: 30 +mongo: + enabled: false +mp: +- point: '1' + weight: '1' +- point: '2' + weight: '2' +murano: + db_password: 07KOdk75 + enabled: false + rabbit_password: rJfH9CSy + user_password: mrQ9d0JW +murano_settings: + metadata: + label: Murano Settings + restrictions: + - action: hide + condition: settings:additional_components.murano.value == false + weight: 20 + murano_repo_url: http://catalog.openstack.org/ +mysql: + root_password: M3VTf8U9 + wsrep_password: jMCDynJR +network_scheme: + endpoints: + br-ex: + IP: + - 172.16.0.5/24 + gateway: 172.16.0.1 + br-fw-admin: + IP: + - 10.108.0.8/24 + br-mgmt: + IP: + - 192.168.0.4/24 + br-storage: + IP: + - 192.168.1.4/24 + eth0.103: + IP: none + interfaces: + eth0: {} + eth1: {} + eth2: {} + eth3: {} + eth4: {} + provider: lnx + roles: + ex: br-ex + fw-admin: br-fw-admin + management: br-mgmt + novanetwork/fixed: eth0.103 + storage: br-storage + transformations: + - action: add-br + name: br-fw-admin + - action: add-br + name: br-storage + - action: add-br + name: br-mgmt + - action: add-br + name: br-ex + - action: add-port + bridge: br-fw-admin + name: eth0 + - action: add-port + bridge: br-storage + name: eth0.102 + - action: add-port + bridge: br-mgmt + name: eth0.101 + - action: add-port + bridge: br-ex + name: eth1 + - action: add-port + name: eth0.103 + version: '1.1' +neutron_mellanox: + metadata: + enabled: true + label: Mellanox Neutron components + toggleable: false + weight: 50 + plugin: disabled + vf_num: '16' +nodes: +- fqdn: node-133.test.domain.local + internal_address: 192.168.0.1 + internal_netmask: 255.255.255.0 + name: node-133 + public_address: 172.16.0.2 + public_netmask: 255.255.255.0 + role: zabbix-server + storage_address: 192.168.1.1 + storage_netmask: 255.255.255.0 + swift_zone: '133' + uid: '133' + user_node_name: Untitled (74:27) +- fqdn: node-135.test.domain.local + internal_address: 192.168.0.2 + internal_netmask: 255.255.255.0 + name: node-135 + public_address: 172.16.0.3 + public_netmask: 255.255.255.0 + role: cinder + storage_address: 192.168.1.2 + storage_netmask: 255.255.255.0 + swift_zone: '135' + uid: '135' + user_node_name: Untitled (18:c9) +- fqdn: node-136.test.domain.local + internal_address: 192.168.0.3 + internal_netmask: 255.255.255.0 + name: node-136 + public_address: 172.16.0.4 + public_netmask: 255.255.255.0 + role: compute + storage_address: 192.168.1.3 + storage_netmask: 255.255.255.0 + swift_zone: '136' + uid: '136' + user_node_name: Untitled (1d:4b) +- fqdn: node-137.test.domain.local + internal_address: 192.168.0.4 + internal_netmask: 255.255.255.0 + name: node-137 + public_address: 172.16.0.5 + public_netmask: 255.255.255.0 + role: primary-controller + storage_address: 192.168.1.4 + storage_netmask: 255.255.255.0 + swift_zone: '137' + uid: '137' + user_node_name: Untitled (34:45) +nova: + db_password: aAU4jYDt + state_path: /var/lib/nova + user_password: UyrT2Ama +nova_quota: false +novanetwork_parameters: + network_manager: FlatDHCPManager + network_size: 65536 + num_networks: 1 +online: true +openstack_version: 2014.2-6.1 +openstack_version_prev: null +priority: 200 +provision: + codename: trusty + image_data: + /: + container: gzip + format: ext4 + uri: http://10.108.0.2:8080/targetimages/env_39_ubuntu_1404_amd64.img.gz + /boot: + container: gzip + format: ext2 + uri: http://10.108.0.2:8080/targetimages/env_39_ubuntu_1404_amd64-boot.img.gz + metadata: + label: Provision + weight: 80 + method: image +public_network_assignment: + assign_to_all_nodes: false + metadata: + label: Public network assignment + restrictions: + - action: hide + condition: cluster:net_provider != 'neutron' + weight: 50 +public_vip: 172.16.0.6 +public_vrouter_vip: 172.16.0.7 +puppet: + manifests: rsync://10.108.0.2:/puppet/2014.2-6.1/manifests/ + modules: rsync://10.108.0.2:/puppet/2014.2-6.1/modules/ +puppet_debug: true +quantum_settings: + database: + passwd: CXPYOeh1 + keystone: + admin_password: RmkB9TdA + metadata: + metadata_proxy_shared_secret: JeXWLjmx +rabbit: + password: zrMvquYX +repo_setup: + installer_initrd: + local: /var/www/nailgun/ubuntu/x86_64/images/initrd.gz + remote_relative: dists/trusty/main/installer-amd64/current/images/netboot/ubuntu-installer/amd64/initrd.gz + installer_kernel: + local: /var/www/nailgun/ubuntu/x86_64/images/linux + remote_relative: dists/trusty/main/installer-amd64/current/images/netboot/ubuntu-installer/amd64/linux + metadata: + label: Repositories + weight: 50 + repos: + - name: ubuntu + priority: null + section: main universe multiverse + suite: trusty + type: deb + uri: http://archive.ubuntu.com/ubuntu/ + - name: ubuntu-updates + priority: null + section: main universe multiverse + suite: trusty-updates + type: deb + uri: http://archive.ubuntu.com/ubuntu/ + - name: ubuntu-security + priority: null + section: main universe multiverse + suite: trusty-security + type: deb + uri: http://archive.ubuntu.com/ubuntu/ + - name: mos + priority: 1050 + section: main restricted + suite: mos6.1 + type: deb + uri: http://10.108.0.2:8080/2014.2-6.1/ubuntu/x86_64 + - name: mos-updates + priority: 1050 + section: main restricted + suite: mos6.1-updates + type: deb + uri: http://mirror.fuel-infra.org/mos/ubuntu/ + - name: mos-security + priority: 1050 + section: main restricted + suite: mos6.1-security + type: deb + uri: http://mirror.fuel-infra.org/mos/ubuntu/ + - name: mos-holdback + priority: 1100 + section: main restricted + suite: mos6.1-holdback + type: deb + uri: http://mirror.fuel-infra.org/mos/ubuntu/ +resume_guests_state_on_host_boot: true +role: primary-controller +sahara: + db_password: xzyWeMAy + enabled: false + user_password: EqqXoxx9 +status: discover +storage: + ephemeral_ceph: false + images_ceph: false + images_vcenter: false + iser: false + metadata: + label: Storage + weight: 60 + objects_ceph: false + osd_pool_size: '2' + pg_num: 128 + volumes_ceph: false + volumes_lvm: true +storage_network_range: 192.168.1.0/24 +swift: + user_password: UcPlc9Wp +syslog: + metadata: + label: Syslog + weight: 50 + syslog_port: '514' + syslog_server: '' + syslog_transport: tcp +tasks: +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/hiera/hiera.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 100 + type: puppet + uids: + - '137' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/globals/globals.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 200 + type: puppet + uids: + - '137' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/logging/logging.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 300 + type: puppet + uids: + - '137' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/tools/tools.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 400 + type: puppet + uids: + - '137' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/umm/umm.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 500 + type: puppet + uids: + - '137' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/netconfig/netconfig.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 600 + type: puppet + uids: + - '137' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/hosts/hosts.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 700 + type: puppet + uids: + - '137' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/firewall/firewall.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 800 + type: puppet + uids: + - '137' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/cluster/cluster.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 900 + type: puppet + uids: + - '137' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/virtual_ips/virtual_ips.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1000 + type: puppet + uids: + - '137' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/virtual_ips/conntrackd.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1100 + type: puppet + uids: + - '137' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/cluster-haproxy/cluster-haproxy.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1200 + type: puppet + uids: + - '137' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/openstack-haproxy/openstack-haproxy.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1300 + type: puppet + uids: + - '137' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/dns/dns-server.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1400 + type: puppet + uids: + - '137' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/dns/dns-client.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1500 + type: puppet + uids: + - '137' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/ntp/ntp-server.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1600 + type: puppet + uids: + - '137' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/database/database.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1700 + type: puppet + uids: + - '137' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/ceilometer/controller.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1800 + type: puppet + uids: + - '137' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/rabbitmq/rabbitmq.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 1900 + type: puppet + uids: + - '137' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/memcached/memcached.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 2000 + type: puppet + uids: + - '137' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/keystone/keystone.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 2100 + type: puppet + uids: + - '137' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/openstack-cinder/openstack-cinder.pp + puppet_modules: /etc/puppet/modules + timeout: 1200 + priority: 2200 + type: puppet + uids: + - '137' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/glance/glance.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 2300 + type: puppet + uids: + - '137' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/openstack-controller/openstack-controller.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 2400 + type: puppet + uids: + - '137' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/openstack-network/openstack-network-controller.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 2500 + type: puppet + uids: + - '137' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/heat/heat.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 2600 + type: puppet + uids: + - '137' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/horizon/horizon.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 2700 + type: puppet + uids: + - '137' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/murano/murano.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 2800 + type: puppet + uids: + - '137' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/sahara/sahara.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 2900 + type: puppet + uids: + - '137' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/api-proxy/api-proxy.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 3000 + type: puppet + uids: + - '137' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/ceph/mon.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 3100 + type: puppet + uids: + - '137' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/ceph/radosgw.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 3200 + type: puppet + uids: + - '137' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/swift/swift.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 3300 + type: puppet + uids: + - '137' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/roles/controller.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 3400 + type: puppet + uids: + - '137' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/swift/rebalance_cronjob.pp + puppet_modules: /etc/puppet/modules + timeout: 300 + priority: 3500 + type: puppet + uids: + - '137' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/zabbix/zabbix.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 3600 + type: puppet + uids: + - '137' +test_vm_image: + container_format: bare + disk_format: qcow2 + glance_properties: '' + img_name: TestVM + img_path: /usr/share/cirros-testvm/cirros-x86_64-disk.img + min_ram: 64 + os_name: cirros + public: 'true' +uid: '137' +use_cinder: true +use_cow_images: true +use_vcenter: false +user_node_name: Untitled (34:45) +workloads_collector: + enabled: true + metadata: + label: Workloads Collector User + restrictions: + - action: hide + condition: 'true' + weight: 10 + password: MhdNr1K7 + tenant: services + username: workloads_collector +zabbix: + db_password: UmcIBNZQ + db_root_password: aFJ2D3iZ + metadata: + label: Zabbix Access + restrictions: + - action: hide + condition: not ('experimental' in version:feature_groups) + weight: 70 + password: zabbix + username: admin diff --git a/tests/noop/astute.yaml/novanet-zabbix-server.yaml b/tests/noop/astute.yaml/novanet-zabbix-server.yaml new file mode 100644 index 0000000000..8f9de1fa42 --- /dev/null +++ b/tests/noop/astute.yaml/novanet-zabbix-server.yaml @@ -0,0 +1,482 @@ +access: + email: admin@localhost + metadata: + label: Access + weight: 10 + password: admin + tenant: admin + user: admin +auth_key: '' +auto_assign_floating_ip: false +base_syslog: + syslog_port: '514' + syslog_server: 10.108.0.2 +ceilometer: + db_password: ZCWaANKg + enabled: false + metering_secret: 5gCCPfO8 + user_password: Ag2mna7b +cinder: + db_password: VwpNB13X + fixed_key: 0d983a86451032ba0b738fc12a654e314354aa0194390eed54608196831a425e + user_password: o9msdnTx +cobbler: + profile: ubuntu_1404_x86_64 +corosync: + group: 226.94.1.1 + metadata: + label: Corosync + restrictions: + - action: hide + condition: 'true' + weight: 50 + port: '12000' + verified: false +debug: false +deployment_id: 39 +deployment_mode: ha_compact +dns_nameservers: +- 8.8.4.4 +- 8.8.8.8 +external_dns: + dns_list: 8.8.8.8, 8.8.4.4 + metadata: + label: Upstream DNS + weight: 90 +external_mongo: + hosts_ip: '' + metadata: + label: External MongoDB + restrictions: + - action: hide + condition: settings:additional_components.mongo.value == false + weight: 20 + mongo_db_name: ceilometer + mongo_password: ceilometer + mongo_replset: '' + mongo_user: ceilometer +external_ntp: + metadata: + label: Upstream NTP + weight: 100 + ntp_list: 0.pool.ntp.org, 1.pool.ntp.org +fail_if_error: false +fixed_network_range: 10.0.0.0/16 +floating_network_range: +- 172.16.0.128-172.16.0.254 +fqdn: node-133.test.domain.local +fuel_version: '6.1' +glance: + db_password: s5aslXZn + image_cache_max_size: '5368709120' + user_password: UEtUqI9Z +heat: + auth_encryption_key: 194abdbbc31aded70db9b2084be8e215 + db_password: SvgZ3tKP + enabled: true + rabbit_password: 0fPV94mX + user_password: Nlq9bTGV +kernel_params: + kernel: console=ttyS0,9600 console=tty0 net.ifnames=0 biosdevname=0 rootdelay=90 + nomodeset + metadata: + label: Kernel parameters + weight: 40 +keystone: + admin_token: Uo10oynr + db_password: MnrQiwLn +last_controller: node-137 +libvirt_type: qemu +management_network_range: 192.168.0.0/24 +management_vip: 192.168.0.5 +management_vrouter_vip: 192.168.0.6 +master_ip: 10.108.0.2 +metadata: + label: Common + weight: 30 +mongo: + enabled: false +mp: +- point: '1' + weight: '1' +- point: '2' + weight: '2' +murano: + db_password: 07KOdk75 + enabled: false + rabbit_password: rJfH9CSy + user_password: mrQ9d0JW +murano_settings: + metadata: + label: Murano Settings + restrictions: + - action: hide + condition: settings:additional_components.murano.value == false + weight: 20 + murano_repo_url: http://catalog.openstack.org/ +mysql: + root_password: M3VTf8U9 + wsrep_password: jMCDynJR +network_scheme: + endpoints: + br-ex: + IP: + - 172.16.0.2/24 + gateway: 172.16.0.1 + br-fw-admin: + IP: + - 10.108.0.6/24 + br-mgmt: + IP: + - 192.168.0.1/24 + br-storage: + IP: + - 192.168.1.1/24 + eth0.103: + IP: none + interfaces: + eth0: {} + eth1: {} + eth2: {} + eth3: {} + eth4: {} + provider: lnx + roles: + ex: br-ex + fw-admin: br-fw-admin + management: br-mgmt + novanetwork/fixed: eth0.103 + storage: br-storage + transformations: + - action: add-br + name: br-fw-admin + - action: add-br + name: br-storage + - action: add-br + name: br-mgmt + - action: add-br + name: br-ex + - action: add-port + bridge: br-fw-admin + name: eth0 + - action: add-port + bridge: br-storage + name: eth0.102 + - action: add-port + bridge: br-mgmt + name: eth0.101 + - action: add-port + bridge: br-ex + name: eth1 + - action: add-port + name: eth0.103 + version: '1.1' +neutron_mellanox: + metadata: + enabled: true + label: Mellanox Neutron components + toggleable: false + weight: 50 + plugin: disabled + vf_num: '16' +nodes: +- fqdn: node-133.test.domain.local + internal_address: 192.168.0.1 + internal_netmask: 255.255.255.0 + name: node-133 + public_address: 172.16.0.2 + public_netmask: 255.255.255.0 + role: zabbix-server + storage_address: 192.168.1.1 + storage_netmask: 255.255.255.0 + swift_zone: '133' + uid: '133' + user_node_name: Untitled (74:27) +- fqdn: node-135.test.domain.local + internal_address: 192.168.0.2 + internal_netmask: 255.255.255.0 + name: node-135 + public_address: 172.16.0.3 + public_netmask: 255.255.255.0 + role: cinder + storage_address: 192.168.1.2 + storage_netmask: 255.255.255.0 + swift_zone: '135' + uid: '135' + user_node_name: Untitled (18:c9) +- fqdn: node-136.test.domain.local + internal_address: 192.168.0.3 + internal_netmask: 255.255.255.0 + name: node-136 + public_address: 172.16.0.4 + public_netmask: 255.255.255.0 + role: compute + storage_address: 192.168.1.3 + storage_netmask: 255.255.255.0 + swift_zone: '136' + uid: '136' + user_node_name: Untitled (1d:4b) +- fqdn: node-137.test.domain.local + internal_address: 192.168.0.4 + internal_netmask: 255.255.255.0 + name: node-137 + public_address: 172.16.0.5 + public_netmask: 255.255.255.0 + role: primary-controller + storage_address: 192.168.1.4 + storage_netmask: 255.255.255.0 + swift_zone: '137' + uid: '137' + user_node_name: Untitled (34:45) +nova: + db_password: aAU4jYDt + state_path: /var/lib/nova + user_password: UyrT2Ama +nova_quota: false +novanetwork_parameters: + network_manager: FlatDHCPManager + network_size: 65536 + num_networks: 1 +online: true +openstack_version: 2014.2-6.1 +openstack_version_prev: null +priority: 100 +provision: + codename: trusty + image_data: + /: + container: gzip + format: ext4 + uri: http://10.108.0.2:8080/targetimages/env_39_ubuntu_1404_amd64.img.gz + /boot: + container: gzip + format: ext2 + uri: http://10.108.0.2:8080/targetimages/env_39_ubuntu_1404_amd64-boot.img.gz + metadata: + label: Provision + weight: 80 + method: image +public_network_assignment: + assign_to_all_nodes: false + metadata: + label: Public network assignment + restrictions: + - action: hide + condition: cluster:net_provider != 'neutron' + weight: 50 +public_vip: 172.16.0.6 +public_vrouter_vip: 172.16.0.7 +puppet: + manifests: rsync://10.108.0.2:/puppet/2014.2-6.1/manifests/ + modules: rsync://10.108.0.2:/puppet/2014.2-6.1/modules/ +puppet_debug: true +quantum_settings: + database: + passwd: CXPYOeh1 + keystone: + admin_password: RmkB9TdA + metadata: + metadata_proxy_shared_secret: JeXWLjmx +rabbit: + password: zrMvquYX +repo_setup: + installer_initrd: + local: /var/www/nailgun/ubuntu/x86_64/images/initrd.gz + remote_relative: dists/trusty/main/installer-amd64/current/images/netboot/ubuntu-installer/amd64/initrd.gz + installer_kernel: + local: /var/www/nailgun/ubuntu/x86_64/images/linux + remote_relative: dists/trusty/main/installer-amd64/current/images/netboot/ubuntu-installer/amd64/linux + metadata: + label: Repositories + weight: 50 + repos: + - name: ubuntu + priority: null + section: main universe multiverse + suite: trusty + type: deb + uri: http://archive.ubuntu.com/ubuntu/ + - name: ubuntu-updates + priority: null + section: main universe multiverse + suite: trusty-updates + type: deb + uri: http://archive.ubuntu.com/ubuntu/ + - name: ubuntu-security + priority: null + section: main universe multiverse + suite: trusty-security + type: deb + uri: http://archive.ubuntu.com/ubuntu/ + - name: mos + priority: 1050 + section: main restricted + suite: mos6.1 + type: deb + uri: http://10.108.0.2:8080/2014.2-6.1/ubuntu/x86_64 + - name: mos-updates + priority: 1050 + section: main restricted + suite: mos6.1-updates + type: deb + uri: http://mirror.fuel-infra.org/mos/ubuntu/ + - name: mos-security + priority: 1050 + section: main restricted + suite: mos6.1-security + type: deb + uri: http://mirror.fuel-infra.org/mos/ubuntu/ + - name: mos-holdback + priority: 1100 + section: main restricted + suite: mos6.1-holdback + type: deb + uri: http://mirror.fuel-infra.org/mos/ubuntu/ +resume_guests_state_on_host_boot: true +role: zabbix-server +sahara: + db_password: xzyWeMAy + enabled: false + user_password: EqqXoxx9 +status: discover +storage: + ephemeral_ceph: false + images_ceph: false + images_vcenter: false + iser: false + metadata: + label: Storage + weight: 60 + objects_ceph: false + osd_pool_size: '2' + pg_num: 128 + volumes_ceph: false + volumes_lvm: true +storage_network_range: 192.168.1.0/24 +swift: + user_password: UcPlc9Wp +syslog: + metadata: + label: Syslog + weight: 50 + syslog_port: '514' + syslog_server: '' + syslog_transport: tcp +tasks: +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/hiera/hiera.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 100 + type: puppet + uids: + - '133' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/globals/globals.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 200 + type: puppet + uids: + - '133' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/logging/logging.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 300 + type: puppet + uids: + - '133' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/tools/tools.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 400 + type: puppet + uids: + - '133' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/netconfig/netconfig.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 500 + type: puppet + uids: + - '133' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/firewall/firewall.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 600 + type: puppet + uids: + - '133' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/hosts/hosts.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 700 + type: puppet + uids: + - '133' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/zabbix/zabbix.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 800 + type: puppet + uids: + - '133' +- parameters: + cwd: / + puppet_manifest: /etc/puppet/modules/osnailyfacter/modular/dns/dns-client.pp + puppet_modules: /etc/puppet/modules + timeout: 3600 + priority: 900 + type: puppet + uids: + - '133' +test_vm_image: + container_format: bare + disk_format: qcow2 + glance_properties: '' + img_name: TestVM + img_path: /usr/share/cirros-testvm/cirros-x86_64-disk.img + min_ram: 64 + os_name: cirros + public: 'true' +uid: '133' +use_cinder: true +use_cow_images: true +use_vcenter: false +user_node_name: Untitled (74:27) +workloads_collector: + enabled: true + metadata: + label: Workloads Collector User + restrictions: + - action: hide + condition: 'true' + weight: 10 + password: MhdNr1K7 + tenant: services + username: workloads_collector +zabbix: + db_password: UmcIBNZQ + db_root_password: aFJ2D3iZ + metadata: + label: Zabbix Access + restrictions: + - action: hide + condition: not ('experimental' in version:feature_groups) + weight: 70 + password: zabbix + username: admin diff --git a/tests/noop/file_resources/.gitignore b/tests/noop/file_resources/.gitignore new file mode 100644 index 0000000000..72c79abcff --- /dev/null +++ b/tests/noop/file_resources/.gitignore @@ -0,0 +1 @@ +*_files.yaml diff --git a/tests/noop/fixtures/hiera.yaml b/tests/noop/fixtures/hiera.yaml new file mode 100644 index 0000000000..722fd312b4 --- /dev/null +++ b/tests/noop/fixtures/hiera.yaml @@ -0,0 +1,12 @@ +--- +:backends: + - yaml + +:hierarchy: + - "%{::hiera_data_globals}" + - "%{::hiera_data_astute}" + +:yaml: + :datadir: "%{::hiera_data_path}" + +:logger: noop diff --git a/tests/noop/generate/.gitignore b/tests/noop/generate/.gitignore new file mode 100644 index 0000000000..0e553de5b9 --- /dev/null +++ b/tests/noop/generate/.gitignore @@ -0,0 +1 @@ +*_spec.rb diff --git a/tests/noop/make_specs.rb b/tests/noop/make_specs.rb new file mode 100644 index 0000000000..8938a73703 --- /dev/null +++ b/tests/noop/make_specs.rb @@ -0,0 +1,25 @@ +#!/usr/bin/env ruby +require 'find' +require 'fileutils' + +DIR=File.dirname __FILE__ +Dir.chdir DIR or raise "Cannot cd to #{DIR}" + +MODULAR_DIR='../../deployment/puppet/osnailyfacter/modular/' +SPEC_DIR='generate' +BASE_SPEC='spec/hosts/hiera/hiera_spec.rb' + +base_spec_content = File.read BASE_SPEC + +Find.find(MODULAR_DIR) do |file| + next unless File.file? file + next unless file.end_with? '.pp' + next if file.end_with? '/globals/globals.pp' + short_name = file.gsub MODULAR_DIR, '' + spec_path = File.join SPEC_DIR, short_name.gsub('.pp', '_spec.rb') + spec_content = base_spec_content.gsub 'hiera/hiera.pp', short_name + puts "Write spec: '#{spec_path}'" + spec_dir = File.dirname spec_path + FileUtils.mkdir_p spec_dir unless File.directory? spec_dir + File.open(spec_path, 'w') { |f| f.write spec_content } +end diff --git a/tests/noop/package_resources/.gitignore b/tests/noop/package_resources/.gitignore new file mode 100644 index 0000000000..4dac0eb438 --- /dev/null +++ b/tests/noop/package_resources/.gitignore @@ -0,0 +1 @@ +*_packages.yaml diff --git a/tests/noop/rspec.sh b/tests/noop/rspec.sh new file mode 100755 index 0000000000..693732c8bc --- /dev/null +++ b/tests/noop/rspec.sh @@ -0,0 +1,4 @@ +#!/bin/sh +DIR=`dirname $0` +cd "${DIR}" || exit 1 +rspec spec/hosts/*_spec.rb spec/hosts/*/*_spec.rb diff --git a/tests/noop/spec/hosts/010_globals_spec.rb b/tests/noop/spec/hosts/010_globals_spec.rb new file mode 100644 index 0000000000..37ffc56085 --- /dev/null +++ b/tests/noop/spec/hosts/010_globals_spec.rb @@ -0,0 +1,24 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'globals/globals.pp' + +describe manifest do + + shared_examples 'puppet catalogue' do + it { should contain_file '/etc/hiera/globals.yaml' } + it 'should save the globals yaml file' do + catalog = subject + catalog = subject.call if subject.is_a? Proc + globals_file_resource = catalog.resource 'file', '/etc/hiera/globals.yaml' + globals_yaml_path = Noop.globals_yaml_path + raise 'No globals file resouerce!' unless globals_file_resource + File.open(globals_yaml_path, 'w') { |file| file.write globals_file_resource[:content] } + puts "Globals yaml saved to: '#{globals_yaml_path}'" + end + end + + test_ubuntu_and_centos manifest +end + + + diff --git a/tests/noop/spec/hosts/api-proxy/api-proxy_spec.rb b/tests/noop/spec/hosts/api-proxy/api-proxy_spec.rb new file mode 100644 index 0000000000..bc96793bf9 --- /dev/null +++ b/tests/noop/spec/hosts/api-proxy/api-proxy_spec.rb @@ -0,0 +1,8 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'api-proxy/api-proxy.pp' + +describe manifest do + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/ceilometer/compute_spec.rb b/tests/noop/spec/hosts/ceilometer/compute_spec.rb new file mode 100644 index 0000000000..f4dc8435f6 --- /dev/null +++ b/tests/noop/spec/hosts/ceilometer/compute_spec.rb @@ -0,0 +1,8 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'ceilometer/compute.pp' + +describe manifest do + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/ceilometer/controller_spec.rb b/tests/noop/spec/hosts/ceilometer/controller_spec.rb new file mode 100644 index 0000000000..6cd102927e --- /dev/null +++ b/tests/noop/spec/hosts/ceilometer/controller_spec.rb @@ -0,0 +1,32 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'ceilometer/controller.pp' + +describe manifest do + shared_examples 'puppet catalogue' do + + # TODO All this stuff should be moved to shared examples controller* tests. + + settings = Noop.fuel_settings + internal_address = Noop.node_hash['internal_address'] + rabbit_user = settings['rabbit']['user'] || 'nova' + use_neutron = settings['quantum'].to_s + rabbit_ha_queues = 'true' + + # Ceilometer + if settings['ceilometer']['enabled'] + it 'should declare openstack::ceilometer class with correct parameters' do + should contain_class('openstack::ceilometer').with( + 'amqp_user' => rabbit_user, + 'amqp_password' => settings['rabbit']['password'], + 'rabbit_ha_queues' => rabbit_ha_queues, + 'on_controller' => 'true', + ) + end + end + + end # end of shared_examples + + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/ceph/mon_spec.rb b/tests/noop/spec/hosts/ceph/mon_spec.rb new file mode 100644 index 0000000000..7c32ede54c --- /dev/null +++ b/tests/noop/spec/hosts/ceph/mon_spec.rb @@ -0,0 +1,8 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'ceph/mon.pp' + +describe manifest do + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/ceph/radosgw_spec.rb b/tests/noop/spec/hosts/ceph/radosgw_spec.rb new file mode 100644 index 0000000000..b724007304 --- /dev/null +++ b/tests/noop/spec/hosts/ceph/radosgw_spec.rb @@ -0,0 +1,8 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'ceph/radosgw.pp' + +describe manifest do + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/cluster-haproxy/cluster-haproxy_spec.rb b/tests/noop/spec/hosts/cluster-haproxy/cluster-haproxy_spec.rb new file mode 100644 index 0000000000..314a585388 --- /dev/null +++ b/tests/noop/spec/hosts/cluster-haproxy/cluster-haproxy_spec.rb @@ -0,0 +1,27 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'cluster-haproxy/cluster-haproxy.pp' + +describe manifest do + shared_examples 'puppet catalogue' do + settings = Noop.fuel_settings + networks = [] + settings['network_scheme']['endpoints'].each{ |k,v| + if v['IP'].is_a?(Array) + v['IP'].each { |ip| + networks << IPAddr.new(ip).to_s + "/" + ip.split('/')[1] + } + end + } + + it "should delcare cluster::haproxy with other_networks set to #{networks.join(' ')}" do + should contain_class('cluster::haproxy').with( + 'other_networks' => networks.join(' '), + ) + end + + end + + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/cluster/cluster_spec.rb b/tests/noop/spec/hosts/cluster/cluster_spec.rb new file mode 100644 index 0000000000..74878ce0e5 --- /dev/null +++ b/tests/noop/spec/hosts/cluster/cluster_spec.rb @@ -0,0 +1,8 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'cluster/cluster.pp' + +describe manifest do + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/database/database_spec.rb b/tests/noop/spec/hosts/database/database_spec.rb new file mode 100644 index 0000000000..c78d67ca2f --- /dev/null +++ b/tests/noop/spec/hosts/database/database_spec.rb @@ -0,0 +1,8 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'database/database.pp' + +describe manifest do + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/dns/dns-client_spec.rb b/tests/noop/spec/hosts/dns/dns-client_spec.rb new file mode 100644 index 0000000000..6403b6b390 --- /dev/null +++ b/tests/noop/spec/hosts/dns/dns-client_spec.rb @@ -0,0 +1,8 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'dns/dns-client.pp' + +describe manifest do + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/dns/dns-server_spec.rb b/tests/noop/spec/hosts/dns/dns-server_spec.rb new file mode 100644 index 0000000000..84ddfaf9de --- /dev/null +++ b/tests/noop/spec/hosts/dns/dns-server_spec.rb @@ -0,0 +1,8 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'dns/dns-server.pp' + +describe manifest do + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/firewall/firewall_spec.rb b/tests/noop/spec/hosts/firewall/firewall_spec.rb new file mode 100644 index 0000000000..6c3df21bd8 --- /dev/null +++ b/tests/noop/spec/hosts/firewall/firewall_spec.rb @@ -0,0 +1,8 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'firewall/firewall.pp' + +describe manifest do + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/glance/glance_spec.rb b/tests/noop/spec/hosts/glance/glance_spec.rb new file mode 100644 index 0000000000..14cd6b1e7a --- /dev/null +++ b/tests/noop/spec/hosts/glance/glance_spec.rb @@ -0,0 +1,8 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'glance/glance.pp' + +describe manifest do + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/heat/heat_spec.rb b/tests/noop/spec/hosts/heat/heat_spec.rb new file mode 100644 index 0000000000..6d86522271 --- /dev/null +++ b/tests/noop/spec/hosts/heat/heat_spec.rb @@ -0,0 +1,8 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'heat/heat.pp' + +describe manifest do + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/hiera/hiera_spec.rb b/tests/noop/spec/hosts/hiera/hiera_spec.rb new file mode 100644 index 0000000000..437291f0f9 --- /dev/null +++ b/tests/noop/spec/hosts/hiera/hiera_spec.rb @@ -0,0 +1,8 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'hiera/hiera.pp' + +describe manifest do + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/horizon/horizon_spec.rb b/tests/noop/spec/hosts/horizon/horizon_spec.rb new file mode 100644 index 0000000000..6d89ff85af --- /dev/null +++ b/tests/noop/spec/hosts/horizon/horizon_spec.rb @@ -0,0 +1,23 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'horizon/horizon.pp' + +describe manifest do + shared_examples 'puppet catalogue' do + + settings = Noop.fuel_settings + horizon_bind_address = Noop.node_hash['internal_address'] + nova_quota = settings['nova_quota'] + + # Horizon + it 'should declare openstack::horizon class' do + should contain_class('openstack::horizon').with( + 'nova_quota' => nova_quota, + 'bind_address' => horizon_bind_address, + ) + end + + end + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/hosts/hosts_spec.rb b/tests/noop/spec/hosts/hosts/hosts_spec.rb new file mode 100644 index 0000000000..69b8e32e58 --- /dev/null +++ b/tests/noop/spec/hosts/hosts/hosts_spec.rb @@ -0,0 +1,8 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'hosts/hosts.pp' + +describe manifest do + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/keystone/keystone_spec.rb b/tests/noop/spec/hosts/keystone/keystone_spec.rb new file mode 100644 index 0000000000..e737c7cd44 --- /dev/null +++ b/tests/noop/spec/hosts/keystone/keystone_spec.rb @@ -0,0 +1,40 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'keystone/keystone.pp' + +describe manifest do + shared_examples 'puppet catalogue' do + + # TODO All this stuff should be moved to shared examples controller* tests. + + settings = Noop.fuel_settings + internal_address = Noop.node_hash['internal_address'] + primary_controller_nodes = filter_nodes(settings['nodes'],'role','primary-controller') + controllers = primary_controller_nodes + filter_nodes(settings['nodes'],'role','controller') + controller_internal_addresses = nodes_to_hash(controllers,'name','internal_address') + controller_nodes = ipsort(controller_internal_addresses.values) + memcached_servers = controller_nodes.map{ |n| n = n + ':11211' }.join(',') + admin_token = settings['keystone']['admin_token'] + + # Keystone + it 'should declare keystone class with admin_token' do + should contain_class('keystone').with( + 'admin_token' => admin_token, + ) + end + it 'should configure memcache_pool keystone cache backend' do + should contain_keystone_config('token/caching').with(:value => 'false') + should contain_keystone_config('cache/enabled').with(:value => 'true') + should contain_keystone_config('cache/backend').with(:value => 'keystone.cache.memcache_pool') + should contain_keystone_config('cache/memcache_servers').with(:value => memcached_servers) + should contain_keystone_config('cache/memcache_dead_retry').with(:value => '30') + should contain_keystone_config('cache/memcache_socket_timeout').with(:value => '1') + should contain_keystone_config('cache/memcache_pool_maxsize').with(:value => '1000') + should contain_keystone_config('cache/memcache_pool_unused_timeout').with(:value => '60') + end + + end # end of shared_examples + + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/logging/logging_spec.rb b/tests/noop/spec/hosts/logging/logging_spec.rb new file mode 100644 index 0000000000..ca868f2246 --- /dev/null +++ b/tests/noop/spec/hosts/logging/logging_spec.rb @@ -0,0 +1,8 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'logging/logging.pp' + +describe manifest do + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/memcached/memcached_spec.rb b/tests/noop/spec/hosts/memcached/memcached_spec.rb new file mode 100644 index 0000000000..e7f4abe6cb --- /dev/null +++ b/tests/noop/spec/hosts/memcached/memcached_spec.rb @@ -0,0 +1,8 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'memcached/memcached.pp' + +describe manifest do + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/murano/murano_spec.rb b/tests/noop/spec/hosts/murano/murano_spec.rb new file mode 100644 index 0000000000..a2dcb2f487 --- /dev/null +++ b/tests/noop/spec/hosts/murano/murano_spec.rb @@ -0,0 +1,23 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'murano/murano.pp' + +describe manifest do + shared_examples 'puppet catalogue' do + settings = Noop.fuel_settings + rabbit_user = settings['rabbit']['user'] || 'nova' + use_neutron = settings['quantum'].to_s + + if settings['murano']['enabled'] + it 'should declare murano class correctly' do + should contain_class('murano').with( + 'murano_os_rabbit_userid' => rabbit_user, + 'murano_os_rabbit_passwd' => settings['rabbit']['password'], + 'use_neutron' => use_neutron, + ) + end + end + end + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/netconfig/netconfig_spec.rb b/tests/noop/spec/hosts/netconfig/netconfig_spec.rb new file mode 100644 index 0000000000..0275661c56 --- /dev/null +++ b/tests/noop/spec/hosts/netconfig/netconfig_spec.rb @@ -0,0 +1,8 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'netconfig/netconfig.pp' + +describe manifest do + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/ntp/ntp-client_spec.rb b/tests/noop/spec/hosts/ntp/ntp-client_spec.rb new file mode 100644 index 0000000000..a0096c4308 --- /dev/null +++ b/tests/noop/spec/hosts/ntp/ntp-client_spec.rb @@ -0,0 +1,8 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'ntp/ntp-client.pp' + +describe manifest do + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/ntp/ntp-server_spec.rb b/tests/noop/spec/hosts/ntp/ntp-server_spec.rb new file mode 100644 index 0000000000..e6c0e6af7c --- /dev/null +++ b/tests/noop/spec/hosts/ntp/ntp-server_spec.rb @@ -0,0 +1,8 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'ntp/ntp-server.pp' + +describe manifest do + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/ntp/timesync_spec.rb b/tests/noop/spec/hosts/ntp/timesync_spec.rb new file mode 100644 index 0000000000..9519da1781 --- /dev/null +++ b/tests/noop/spec/hosts/ntp/timesync_spec.rb @@ -0,0 +1,8 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'ntp/timesync.pp' + +describe manifest do + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/openstack-cinder/openstack-cinder_spec.rb b/tests/noop/spec/hosts/openstack-cinder/openstack-cinder_spec.rb new file mode 100644 index 0000000000..0ad6ffd28d --- /dev/null +++ b/tests/noop/spec/hosts/openstack-cinder/openstack-cinder_spec.rb @@ -0,0 +1,8 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'openstack-cinder/openstack-cinder.pp' + +describe manifest do + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/openstack-controller/openstack-controller_spec.rb b/tests/noop/spec/hosts/openstack-controller/openstack-controller_spec.rb new file mode 100644 index 0000000000..e8f7ac1f5b --- /dev/null +++ b/tests/noop/spec/hosts/openstack-controller/openstack-controller_spec.rb @@ -0,0 +1,39 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'openstack-controller/openstack-controller.pp' + +describe manifest do + shared_examples 'puppet catalogue' do + + # TODO All this stuff should be moved to shared examples controller* tests. + + settings = Noop.fuel_settings + internal_address = Noop.node_hash['internal_address'] + rabbit_user = settings['rabbit']['user'] || 'nova' + use_neutron = settings['quantum'].to_s + role = settings['role'] + rabbit_ha_queues = 'true' + primary_controller_nodes = filter_nodes(settings['nodes'],'role','primary-controller') + controllers = primary_controller_nodes + filter_nodes(settings['nodes'],'role','controller') + controller_internal_addresses = nodes_to_hash(controllers,'name','internal_address') + controller_nodes = ipsort(controller_internal_addresses.values) + memcached_servers = controller_nodes.map{ |n| n = n + ':11211' }.join(',') + admin_token = settings['keystone']['admin_token'] + + # Nova config options + it 'nova config should have report_interval set to 60' do + should contain_nova_config('DEFAULT/report_interval').with( + 'value' => '60', + ) + end + it 'nova config should have service_down_time set to 180' do + should contain_nova_config('DEFAULT/service_down_time').with( + 'value' => '180', + ) + end + + end # end of shared_examples + + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/openstack-haproxy/openstack-haproxy_spec.rb b/tests/noop/spec/hosts/openstack-haproxy/openstack-haproxy_spec.rb new file mode 100644 index 0000000000..d1fa9d184e --- /dev/null +++ b/tests/noop/spec/hosts/openstack-haproxy/openstack-haproxy_spec.rb @@ -0,0 +1,8 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'openstack-haproxy/openstack-haproxy.pp' + +describe manifest do + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/openstack-network/openstack-network-compute_spec.rb b/tests/noop/spec/hosts/openstack-network/openstack-network-compute_spec.rb new file mode 100644 index 0000000000..6682c249fe --- /dev/null +++ b/tests/noop/spec/hosts/openstack-network/openstack-network-compute_spec.rb @@ -0,0 +1,74 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'openstack-network/openstack-network-compute.pp' + +describe manifest do + shared_examples 'puppet catalogue' do + + # TODO All this stuff should be moved to shared examples controller* tests. + + settings = Noop.fuel_settings + internal_address = Noop.node_hash['internal_address'] + + # Network + if settings['quantum'] + it 'should declare openstack::network with neutron_server parameter set to false' do + should contain_class('openstack::network').with( + 'neutron_server' => 'false', + ) + end + else + it 'should declare openstack::network with neutron_server parameter set to false' do + should contain_class('openstack::network').with( + 'neutron_server' => 'false', + ) + end + end + + if settings['quantum'] + it 'should create /etc/libvirt/qemu.conf file that notifies libvirt service' do + should contain_file('/etc/libvirt/qemu.conf').with( + 'ensure' => 'present', + 'source' => 'puppet:///modules/nova/libvirt_qemu.conf', + ).that_notifies('Service[libvirt]') + end + it 'should configure linuxnet_interface_driver and linuxnet_ovs_integration_bridge' do + should contain_nova_config('DEFAULT/linuxnet_interface_driver').with( + 'value' => 'nova.network.linux_net.LinuxOVSInterfaceDriver', + ) + should contain_nova_config('DEFAULT/linuxnet_ovs_integration_bridge').with( + 'value' => 'br-int', + ) + end + it 'should configure net.bridge.bridge* keys that come before libvirt service' do + should contain_augeas('sysctl-net.bridge.bridge-nf-call-arptables').with( + 'context' => '/files/etc/sysctl.conf', + 'changes' => "set net.bridge.bridge-nf-call-arptables '1'", + ).that_comes_before('Service[libvirt]') + should contain_augeas('sysctl-net.bridge.bridge-nf-call-iptables').with( + 'context' => '/files/etc/sysctl.conf', + 'changes' => "set net.bridge.bridge-nf-call-iptables '1'", + ).that_comes_before('Service[libvirt]') + should contain_augeas('sysctl-net.bridge.bridge-nf-call-ip6tables').with( + 'context' => '/files/etc/sysctl.conf', + 'changes' => "set net.bridge.bridge-nf-call-ip6tables '1'", + ).that_comes_before('Service[libvirt]') + end + else + it 'should configure multi_host, send_arp_for_ha, metadata_host in nova.conf for nova-network' do + should contain_nova_config('DEFAULT/multi_host').with( + 'value' => 'True', + ) + should contain_nova_config('DEFAULT/send_arp_for_ha').with( + 'value' => 'True', + ) + should contain_nova_config('DEFAULT/metadata_host').with( + 'value' => internal_address, + ) + end + end + end # end of shared_examples + + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/openstack-network/openstack-network-controller_spec.rb b/tests/noop/spec/hosts/openstack-network/openstack-network-controller_spec.rb new file mode 100644 index 0000000000..002e123263 --- /dev/null +++ b/tests/noop/spec/hosts/openstack-network/openstack-network-controller_spec.rb @@ -0,0 +1,54 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'openstack-network/openstack-network-controller.pp' + +describe manifest do + shared_examples 'puppet catalogue' do + + # TODO All this stuff should be moved to shared examples controller* tests. + + settings = Noop.fuel_settings + internal_address = Noop.node_hash['internal_address'] + rabbit_user = settings['rabbit']['user'] || 'nova' + use_neutron = settings['quantum'].to_s + role = settings['role'] + rabbit_ha_queues = 'true' + primary_controller_nodes = filter_nodes(settings['nodes'],'role','primary-controller') + controllers = primary_controller_nodes + filter_nodes(settings['nodes'],'role','controller') + controller_internal_addresses = nodes_to_hash(controllers,'name','internal_address') + controller_nodes = ipsort(controller_internal_addresses.values) + memcached_servers = controller_nodes.map{ |n| n = n + ':11211' }.join(',') + horizon_bind_address = internal_address + admin_token = settings['keystone']['admin_token'] + nova_quota = settings['nova_quota'] + + # Network + if settings['quantum'] + it 'should declare openstack::network with neutron enabled' do + should contain_class('openstack::network').with( + 'neutron_server' => 'true', + ) + end + else + it 'should declare openstack::network with neutron disabled' do + should contain_class('openstack::network').with( + 'neutron_server' => 'false', + ) + end + end + + # Ceilometer + if settings['ceilometer']['enabled'] + if use_neutron == 'true' + it 'should configure notification_driver for neutron' do + should contain_neutron_config('DEFAULT/notification_driver').with( + 'value' => 'messaging', + ) + end + end + end + end # end of shared_examples + + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/rabbitmq/rabbitmq_spec.rb b/tests/noop/spec/hosts/rabbitmq/rabbitmq_spec.rb new file mode 100644 index 0000000000..a5450bbde1 --- /dev/null +++ b/tests/noop/spec/hosts/rabbitmq/rabbitmq_spec.rb @@ -0,0 +1,8 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'rabbitmq/rabbitmq.pp' + +describe manifest do + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/roles/ceph-osd_spec.rb b/tests/noop/spec/hosts/roles/ceph-osd_spec.rb new file mode 100644 index 0000000000..9a34752f49 --- /dev/null +++ b/tests/noop/spec/hosts/roles/ceph-osd_spec.rb @@ -0,0 +1,8 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'roles/ceph-osd.pp' + +describe manifest do + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/roles/cinder_spec.rb b/tests/noop/spec/hosts/roles/cinder_spec.rb new file mode 100644 index 0000000000..62bfc88580 --- /dev/null +++ b/tests/noop/spec/hosts/roles/cinder_spec.rb @@ -0,0 +1,8 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'roles/cinder.pp' + +describe manifest do + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/roles/compute_spec.rb b/tests/noop/spec/hosts/roles/compute_spec.rb new file mode 100644 index 0000000000..51e0599402 --- /dev/null +++ b/tests/noop/spec/hosts/roles/compute_spec.rb @@ -0,0 +1,66 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'roles/compute.pp' + +describe manifest do + + shared_examples 'puppet catalogue' do + + use_neutron = Noop.fuel_settings['quantum'].to_s + internal_address = Noop.node_hash['internal_address'] + + # Libvirtd.conf + it 'should configure listen_tls, listen_tcp and auth_tcp in libvirtd.conf' do + should contain_augeas('libvirt-conf').with( + 'context' => '/files/etc/libvirt/libvirtd.conf', + 'changes' => [ + 'set listen_tls 0', + 'set listen_tcp 1', + 'set auth_tcp none', + ], + ) + end + + # Nova.config options + it 'nova config should have proper live_migration_flag' do + should contain_nova_config('libvirt/live_migration_flag').with( + 'value' => 'VIR_MIGRATE_UNDEFINE_SOURCE,VIR_MIGRATE_PEER2PEER,VIR_MIGRATE_LIVE,VIR_MIGRATE_PERSIST_DEST', + ) + end + it 'nova config should have proper cinder_catalog_info' do + should contain_nova_config('DEFAULT/cinder_catalog_info').with( + 'value' => 'volume:cinder:internalURL' + ) + end + it 'nova config should have proper use_syslog_rfc_format' do + should contain_nova_config('DEFAULT/use_syslog_rfc_format').with( + 'value' => 'true', + ) + end + it 'nova config should have proper connection_type' do + should contain_nova_config('DEFAULT/connection_type').with( + 'value' => 'libvirt', + ) + end + it 'nova config should have proper allow_resize_to_same_host' do + should contain_nova_config('DEFAULT/allow_resize_to_same_host').with( + 'value' => 'true', + ) + end + it 'nova config should have report_interval set to 60' do + should contain_nova_config('DEFAULT/report_interval').with( + 'value' => '60', + ) + end + it 'nova config should have service_down_time set to 180' do + should contain_nova_config('DEFAULT/service_down_time').with( + 'value' => '180', + ) + end + + end + + test_ubuntu_and_centos manifest +end + + diff --git a/tests/noop/spec/hosts/roles/controller_spec.rb b/tests/noop/spec/hosts/roles/controller_spec.rb new file mode 100644 index 0000000000..f3fffc1747 --- /dev/null +++ b/tests/noop/spec/hosts/roles/controller_spec.rb @@ -0,0 +1,23 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'roles/controller.pp' + +describe manifest do + shared_examples 'puppet catalogue' do + + it 'should set vm.swappiness sysctl to 10' do + should contain_sysctl('vm.swappiness').with( + 'val' => '10', + ) + end + it 'should make sure python-openstackclient package is installed' do + should contain_package('python-openstackclient').with( + 'ensure' => 'installed', + ) + end + + end # end of shared_examples + + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/roles/mongo_primary_spec.rb b/tests/noop/spec/hosts/roles/mongo_primary_spec.rb new file mode 100644 index 0000000000..8c9f486617 --- /dev/null +++ b/tests/noop/spec/hosts/roles/mongo_primary_spec.rb @@ -0,0 +1,8 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'roles/mongo_primary.pp' + +describe manifest do + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/roles/mongo_spec.rb b/tests/noop/spec/hosts/roles/mongo_spec.rb new file mode 100644 index 0000000000..c30fac6d3d --- /dev/null +++ b/tests/noop/spec/hosts/roles/mongo_spec.rb @@ -0,0 +1,8 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'roles/mongo.pp' + +describe manifest do + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/sahara/sahara_spec.rb b/tests/noop/spec/hosts/sahara/sahara_spec.rb new file mode 100644 index 0000000000..7f94ec036d --- /dev/null +++ b/tests/noop/spec/hosts/sahara/sahara_spec.rb @@ -0,0 +1,26 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'sahara/sahara.pp' + +describe manifest do + shared_examples 'puppet catalogue' do + + settings = Noop.fuel_settings + use_neutron = settings['quantum'].to_s + + # Sahara + if settings['sahara']['enabled'] + it 'should declare sahara class correctly' do + should contain_class('sahara').with( + 'db_password' => settings['sahara']['db_password'], + 'keystone_password' => settings['sahara']['user_password'], + 'use_neutron' => use_neutron, + 'rpc_backend' => 'rabbit', + 'rabbit_ha_queues' => 'true', + ) + end + end + end + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/swift/rebalance_cronjob_spec.rb b/tests/noop/spec/hosts/swift/rebalance_cronjob_spec.rb new file mode 100644 index 0000000000..ecf5ee2913 --- /dev/null +++ b/tests/noop/spec/hosts/swift/rebalance_cronjob_spec.rb @@ -0,0 +1,8 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'swift/rebalance_cronjob.pp' + +describe manifest do + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/swift/swift_spec.rb b/tests/noop/spec/hosts/swift/swift_spec.rb new file mode 100644 index 0000000000..ed53999b3a --- /dev/null +++ b/tests/noop/spec/hosts/swift/swift_spec.rb @@ -0,0 +1,51 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'swift/swift.pp' + +describe manifest do + shared_examples 'puppet catalogue' do + settings = Noop.fuel_settings + role = settings['role'] + storage_hash = Noop.fuel_settings['storage'] + primary_controller_nodes = filter_nodes(settings['nodes'],'role','primary-controller') + controllers = primary_controller_nodes + filter_nodes(settings['nodes'],'role','controller') + controller_internal_addresses = nodes_to_hash(controllers,'name','internal_address') + controller_nodes = ipsort(controller_internal_addresses.values) + memcached_servers = controller_nodes.map{ |n| n = n + ':11211' } + + # Swift + if !(storage_hash['images_ceph'] and storage_hash['objects_ceph']) and !storage_hash['images_vcenter'] + if role == 'primary-controller' + ['account', 'object', 'container'].each do | ring | + it "should run pretend_min_part_hours_passed before rabalancing swift #{ring} ring" do + should contain_exec("hours_passed_#{ring}").with( + 'command' => "swift-ring-builder /etc/swift/#{ring}.builder pretend_min_part_hours_passed", + 'user' => 'swift', + ) + should contain_exec("rebalance_#{ring}").with( + 'command' => "swift-ring-builder /etc/swift/#{ring}.builder rebalance", + 'user' => 'swift', + ).that_requires("Exec[hours_passed_#{ring}]") + should contain_exec("create_#{ring}").with( + 'user' => 'swift', + ) + end + end + end + it 'should create /etc/swift/backups directory with correct ownership' do + should contain_file('/etc/swift/backups').with( + 'ensure' => 'directory', + 'owner' => 'swift', + 'group' => 'swift', + ) + end + it 'should declare swift::proxy::cache class with correct memcache_servers parameter' do + should contain_class('swift::proxy::cache').with( + 'memcache_servers' => memcached_servers, + ) + end + end + end + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/tools/tools_spec.rb b/tests/noop/spec/hosts/tools/tools_spec.rb new file mode 100644 index 0000000000..b1e9907676 --- /dev/null +++ b/tests/noop/spec/hosts/tools/tools_spec.rb @@ -0,0 +1,8 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'tools/tools.pp' + +describe manifest do + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/umm/umm_spec.rb b/tests/noop/spec/hosts/umm/umm_spec.rb new file mode 100644 index 0000000000..e8ca6248a3 --- /dev/null +++ b/tests/noop/spec/hosts/umm/umm_spec.rb @@ -0,0 +1,8 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'umm/umm.pp' + +describe manifest do + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/virtual_ips/conntrackd_spec.rb b/tests/noop/spec/hosts/virtual_ips/conntrackd_spec.rb new file mode 100644 index 0000000000..43c717e595 --- /dev/null +++ b/tests/noop/spec/hosts/virtual_ips/conntrackd_spec.rb @@ -0,0 +1,8 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'virtual_ips/conntrackd.pp' + +describe manifest do + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/virtual_ips/virtual_ips_spec.rb b/tests/noop/spec/hosts/virtual_ips/virtual_ips_spec.rb new file mode 100644 index 0000000000..85c4171000 --- /dev/null +++ b/tests/noop/spec/hosts/virtual_ips/virtual_ips_spec.rb @@ -0,0 +1,8 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'virtual_ips/virtual_ips.pp' + +describe manifest do + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/vmware/cinder-vmware_spec.rb b/tests/noop/spec/hosts/vmware/cinder-vmware_spec.rb new file mode 100644 index 0000000000..8746e74723 --- /dev/null +++ b/tests/noop/spec/hosts/vmware/cinder-vmware_spec.rb @@ -0,0 +1,8 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'vmware/cinder-vmware.pp' + +describe manifest do + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/vmware/compute_spec.rb b/tests/noop/spec/hosts/vmware/compute_spec.rb new file mode 100644 index 0000000000..4e3a078868 --- /dev/null +++ b/tests/noop/spec/hosts/vmware/compute_spec.rb @@ -0,0 +1,8 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'vmware/compute.pp' + +describe manifest do + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/vmware/vcenter_spec.rb b/tests/noop/spec/hosts/vmware/vcenter_spec.rb new file mode 100644 index 0000000000..a59936ca35 --- /dev/null +++ b/tests/noop/spec/hosts/vmware/vcenter_spec.rb @@ -0,0 +1,8 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'vmware/vcenter.pp' + +describe manifest do + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/hosts/zabbix/zabbix_spec.rb b/tests/noop/spec/hosts/zabbix/zabbix_spec.rb new file mode 100644 index 0000000000..929b3817f8 --- /dev/null +++ b/tests/noop/spec/hosts/zabbix/zabbix_spec.rb @@ -0,0 +1,8 @@ +require 'spec_helper' +require 'shared-examples' +manifest = 'zabbix/zabbix.pp' + +describe manifest do + test_ubuntu_and_centos manifest +end + diff --git a/tests/noop/spec/shared-examples.rb b/tests/noop/spec/shared-examples.rb new file mode 100644 index 0000000000..f756be4cb4 --- /dev/null +++ b/tests/noop/spec/shared-examples.rb @@ -0,0 +1,127 @@ +# Shared functions +def filter_nodes(hash, name, value) + hash.select do |it| + it[name] == value + end +end + +def nodes_to_hash(hash, name, value) + result = {} + hash.each do |element| + result[element[name]] = element[value] + end + result +end + +def ipsort (ips) + require 'rubygems' + require 'ipaddr' + ips.sort { |a,b| IPAddr.new( a ) <=> IPAddr.new( b ) } +end + +def test_ubuntu_and_centos(manifest) + # check if task is present in the task list + unless Noop.manifest_present? manifest + # puts "Manifest '#{manifest}' is not enabled on the node '#{Noop.hostname}'. Skipping tests." + return + end + + # set manifest file + before(:all) do + Noop.manifest = manifest + end + + let(:os) do + os = facts[:operatingsystem] + os = os.downcase if os + os + end + + shared_examples 'should_compile' do + # it { puts "OS: '#{os}'\nYAML: '#{Noop.astute_yaml_base}'\nManifest: '#{Noop.manifest}'"} + it { + File.stubs(:exists?).with('/var/lib/astute/ceph/ceph').returns(true) + File.stubs(:exists?).with('/var/lib/astute/mongodb/mongodb.key').returns(true) + File.stubs(:exists?).with('/var/lib/astute/mongodb/mongodb.key').returns(true) + File.stubs(:exists?).with('/var/lib/astute/ceph/ceph').returns(true) + File.stubs(:exists?).with('/var/lib/astute/nova/nova').returns(true) + File.stubs(:exists?).with('/var/lib/astute/ceph/ceph').returns(true) + File.stubs(:exists?).returns(false) + should compile + } + end + + shared_examples 'save_files_list' do + it 'should save the list of file resources' do + catalog = subject + catalog = subject.call if subject.is_a? Proc + file_resources = {} + catalog.resources.each do |resource| + next unless resource.type == 'File' + next unless %w(present file).include? resource[:ensure] or not resource[:ensure] + + if resource[:source] + content = resource[:source] + elsif resource[:content] + content = 'TEMPLATE' + else + content = nil + end + next unless content + file_resources[resource[:path]] = content + end + if file_resources.any? + Noop.save_file_resources_list file_resources, manifest, os + end + end + end + + shared_examples 'save_packages_list' do + it 'should save the list of file resources' do + catalog = subject + catalog = subject.call if subject.is_a? Proc + package_resources = {} + catalog.resources.each do |resource| + next unless resource.type == 'Package' + next if %w(absent purged).include? resource[:ensure] or not resource[:ensure] + package_resources[resource[:name]] = resource[:ensure] + end + if package_resources.any? + Noop.save_package_resources_list package_resources, manifest, os + end + end + end + + ####################################### + # Testing on different operating systems + # Ubuntu + context 'on Ubuntu platforms' do + let(:facts) { Noop.ubuntu_facts } + it_behaves_like 'should_compile' + if ENV['NOOP_SAVE_RESOURCES_DIR'] and File.directory?(ENV['NOOP_SAVE_RESOURCES_DIR']) + it_behaves_like 'save_files_list' + it_behaves_like 'save_packages_list' + end + begin + it_behaves_like 'puppet catalogue' + rescue ArgumentError + true + end + end + + # CentOS + context 'on CentOS platforms' do + let(:facts) { Noop.centos_facts } + it_behaves_like 'should_compile' + if ENV['NOOP_SAVE_RESOURCES_DIR'] and File.directory?(ENV['NOOP_SAVE_RESOURCES_DIR']) + it_behaves_like 'save_files_list' + it_behaves_like 'save_packages_list' + end + begin + it_behaves_like 'puppet catalogue' + rescue ArgumentError + true + end + end +end + diff --git a/tests/noop/spec/spec_helper.rb b/tests/noop/spec/spec_helper.rb new file mode 100644 index 0000000000..6c08ac1502 --- /dev/null +++ b/tests/noop/spec/spec_helper.rb @@ -0,0 +1,236 @@ +require 'rubygems' +require 'rspec-puppet' +require 'puppetlabs_spec_helper/module_spec_helper' +require 'yaml' + +puppet_logs_dir = ENV['PUPPET_LOGS_DIR'] || 'none' + +module Noop + def self.module_path + return @module_path if @module_path + @module_path = File.expand_path(File.join(__FILE__, '..', '..', '..', '..', 'deployment', 'puppet')) + end + + def self.hiera_data_path + return @hiera_data_path if @hiera_data_path + @hiera_data_path = File.expand_path(File.join(__FILE__, '..', '..', 'astute.yaml')) + end + + def self.fixtures_path + return @fixtures_path if @fixtures_path + @fixtures_path = File.expand_path(File.join(__FILE__, '..', '..', 'fixtures')) + end + + def self.astute_yaml_name + ENV['astute_filename'] || 'neut_vlan.primary-controller.yaml' + end + + def self.astute_yaml_base + File.basename(self.astute_yaml_name).gsub(/.yaml$/, '') + end + + def self.astute_yaml_path + File.expand_path File.join(self.hiera_data_path, self.astute_yaml_name) + end + + def self.globals_yaml_path + File.expand_path File.join(self.hiera_data_path, self.globlas_prefix + self.astute_yaml_name) + end + + def self.globlas_prefix + 'globals_yaml_for_' + end + + def self.hiera_data_astute + self.astute_yaml_base + end + + def self.hiera_data_globals + self.globlas_prefix + self.hiera_data_astute + end + + def self.hiera_config_file + File.join self.fixtures_path, 'hiera.yaml' + end + + def self.fuel_settings + YAML.load_file self.astute_yaml_path + end + + def self.fqdn + self.fuel_settings['fqdn'] + end + + def self.hostname + self.fqdn.split('.').first + end + + def self.node_hash + Noop.fuel_settings['nodes'].find { |node| node['fqdn'] == Noop.fqdn } || {} + end + + def self.manifest_present?(manifest) + manifest_path = File.join self.modular_manifests_node_dir, manifest + self.fuel_settings['tasks'].find do |task| + task['parameters']['puppet_manifest'] == manifest_path + end + end + + def self.ubuntu_facts + { + :fqdn => self.fqdn, + :hostname => self.hostname, + :processorcount => '4', + :memorysize_mb => '32138.66', + :memorysize => '31.39 GB', + :kernel => 'Linux', + :osfamily => 'Debian', + :operatingsystem => 'Ubuntu', + :operatingsystemrelease => '14.04', + :lsbdistid => 'Ubuntu', + :l3_fqdn_hostname => self.hostname, + :l3_default_route => '172.16.1.1', + :concat_basedir => '/tmp/', + :hiera_data_path => self.hiera_data_path, + :hiera_data_globals => self.hiera_data_globals, + :hiera_data_astute => self.hiera_data_astute, + :hiera_config_file => self.hiera_config_file, + :l23_os => 'ubuntu', + } + end + + def self.centos_facts + { + :fqdn => self.fqdn, + :hostname => self.hostname, + :processorcount => '4', + :memorysize_mb => '32138.66', + :memorysize => '31.39 GB', + :kernel => 'Linux', + :osfamily => 'RedHat', + :operatingsystem => 'CentOS', + :operatingsystemrelease => '6.5', + :lsbdistid => 'CentOS', + :l3_fqdn_hostname => self.hostname, + :l3_default_route => '172.16.1.1', + :concat_basedir => '/tmp/', + :hiera_data_path => self.hiera_data_path, + :hiera_data_globals => self.hiera_data_globals, + :hiera_data_astute => self.hiera_data_astute, + :hiera_config_file => self.hiera_config_file, + :l23_os => 'centos6', + } + end + + def self.modular_manifests_node_dir + '/etc/puppet/modules/osnailyfacter/modular' + end + + def self.modular_manifests_local_dir + File.join self.module_path, 'osnailyfacter/modular' + end + + def self.manifest=(manifest) + RSpec.configuration.manifest = File.join self.modular_manifests_local_dir, manifest + end + + def self.manifest + RSpec.configuration.manifest + end + + ## File resources list ## + + def self.file_resources_lists_dir + File.expand_path File.join ENV['NOOP_SAVE_RESOURCES_DIR'], 'file_resources', self.astute_yaml_base + end + + def self.file_resources_list_file(manifest, os) + file_name = manifest.gsub('/', '_').gsub('.pp', '') + "_#{os}_files.yaml" + File.join file_resources_lists_dir, file_name + end + + def self.save_file_resources_list(data, manifest, os) + begin + Dir.mkdir file_resources_lists_dir unless File.directory? file_resources_lists_dir + file_path = file_resources_list_file manifest, os + File.open(file_path, 'w') do |list_file| + YAML.dump(data, list_file) + end + rescue + puts "Could not save File resources list for manifest: '#{manifest}' to: '#{file_path}'" + else + puts "File resources list for manifest: '#{manifest}' saved to: '#{file_path}'" + end + end + + ## Package resources list ## + + def self.package_resources_lists_dir + File.expand_path File.join ENV['NOOP_SAVE_RESOURCES_DIR'], 'package_resources', self.astute_yaml_base + end + + def self.package_resources_list_file(manifest, os) + file_name = manifest.gsub('/', '_').gsub('.pp', '') + "_#{os}_packages.yaml" + File.join package_resources_lists_dir, file_name + end + + def self.save_package_resources_list(data, manifest, os) + begin + Dir.mkdir package_resources_lists_dir unless File.directory? package_resources_lists_dir + file_path = package_resources_list_file manifest, os + File.open(file_path, 'w') do |list_file| + YAML.dump(data, list_file) + end + rescue + puts "Could not save Package resources list for manifest '#{manifest}' to '#{file_path}'" + else + puts "Package resources list for manifest '#{manifest}' saved to '#{file_path}'" + end + end + +end + +# Add fixture lib dirs to LOAD_PATH. Work-around for PUP-3336 +if Puppet.version < '4.0.0' + Dir["#{Noop.module_path}/*/lib"].entries.each do |lib_dir| + $LOAD_PATH << lib_dir + end +end + +RSpec.configure do |c| + c.module_path = Noop.module_path + c.hiera_config = Noop.hiera_config_file + c.expose_current_running_example_as :example + + c.pattern = 'hosts/**' + + c.before :each do |test| + # avoid "Only root can execute commands as other users" + Puppet.features.stubs(:root? => true) + # clear cached facts + Facter::Util::Loader.any_instance.stubs(:load_all) + Facter.clear + Facter.clear_messages + # Puppet logs creation + if puppet_logs_dir != 'none' + descr = test.metadata[:example_group][:full_description].gsub(/\s+|\//, '_').gsub(/\(|\)/, '') + @file = "#{puppet_logs_dir}/#{descr}.log" + Puppet::Util::Log.newdestination(@file) + Puppet::Util::Log.level = :debug + end + end + + c.after :each do |test| + # Puppet logs cleanup + if puppet_logs_dir != 'none' + Puppet::Util::Log.close_all + descr = test.metadata[:example_group][:full_description].gsub(/\s+|\//, '_').gsub(/\(|\)|/, '') + if example.exception == nil + # Remove puppet log if there are no compilation errors + File.delete("#{puppet_logs_dir}/#{descr}.log") + end + end + end + +end + diff --git a/utils/jenkins/fuel_noop_tests.sh b/utils/jenkins/fuel_noop_tests.sh new file mode 100755 index 0000000000..4f7cbac12b --- /dev/null +++ b/utils/jenkins/fuel_noop_tests.sh @@ -0,0 +1,67 @@ +#!/bin/bash + +MODULAR_BASE='deployment/puppet/osnailyfacter/modular/' + +if ! [ -d "$WORKSPACE" ] ; then + echo "ERROR: WORKSPACE not found" + exit 1 +fi + +if [ -z "$PUPPET_GEM_VERSION" ] ; then + export PUPPET_GEM_VERSION='~> 3.4.0' +fi + +if [ -z "$NOOP_YAMLS" ] ; then + NOOP_YAMLS=`ls ./tests/noop/astute.yaml/*yaml` +fi + +# Check for bundle and exit if failed +bundle --version || exit 1 + +export GEM_HOME=$WORKSPACE/.bundled_gems + +# Prepare gems +pushd ./tests/noop +bundle update +popd + +failed_yamls="" +untested_tasks="" + +# Check that all tasks have spec tests +for i in `find $MODULAR_BASE -name *\.pp | sed -e "s#$MODULAR_BASE##"` ; do + spec="${i/\.pp/_spec.rb}" + if ! [ -f "tests/noop/spec/hosts/$spec" ] && [ "$i" != "globals/globals.pp" ] ; then + untested_tasks="${untested_tasks}\n${MODULAR_BASE}${i}" + fi +done +if ! [ -z "$untested_tasks" ] ; then + echo -e "\nFAILED. No modular rspec tests found for the following tasks:" + echo -e "$untested_tasks\n" + exit 1 +fi + +# Iterate over astute.yaml files we have and run tests +for YAML in $NOOP_YAMLS ; do + echo "${YAML}" | grep -q 'globals_yaml_for_' + if [ $? -eq 0 ]; then + continue + fi + export astute_filename=`basename $YAML` + echo -e "\n\n======== Running modular noop tests for $astute_filename ========\n" + pushd ./tests/noop + echo "Starting test for YAML '${astute_filename} at directory '`pwd`'" + bundle exec rake spec || failed_yamls="$failed_yamls\n$astute_filename" + popd +done + +# Report and exit +if [ -z "$failed_yamls" ] ; then + echo -e "\nRSpec Noop Tests SUCCEEDED: No errors found.\n" + exit 0 +else + echo -e "\nRSpec Noop Tests FAILED for the following astute.yaml files:" + echo -e "$failed_yamls\n" + exit 1 +fi +