Source code for yardstick.benchmark.scenarios.availability.attacker.attacker_baremetal

##############################################################################
# Copyright (c) 2015 Huawei Technologies Co.,Ltd. and others
#
# All rights reserved. This program and the accompanying materials
# are made available under the terms of the Apache License, Version 2.0
# which accompanies this distribution, and is available at
# http://www.apache.org/licenses/LICENSE-2.0
##############################################################################
import logging
import traceback
import subprocess
import yardstick.ssh as ssh
from baseattacker import BaseAttacker

LOG = logging.getLogger(__name__)


def _execute_shell_command(command, stdin=None):
    '''execute shell script with error handling'''
    exitcode = 0
    output = []
    try:
        output = subprocess.check_output(command, stdin=stdin, shell=True)
    except Exception:
        exitcode = -1
        output = traceback.format_exc()
        LOG.error("exec command '%s' error:\n " % command)
        LOG.error(traceback.format_exc())

    return exitcode, output


[docs]class BaremetalAttacker(BaseAttacker): __attacker_type__ = 'bare-metal-down'
[docs] def setup(self): LOG.debug("config:%s context:%s" % (self._config, self._context)) host = self._context.get(self._config['host'], None) ip = host.get("ip", None) user = host.get("user", "root") key_filename = host.get("key_filename", "~/.ssh/id_rsa") self.connection = ssh.SSH(user, ip, key_filename=key_filename) self.connection.wait(timeout=600) LOG.debug("ssh host success!") self.host_ip = ip self.ipmi_ip = host.get("ipmi_ip", None) self.ipmi_user = host.get("ipmi_user", "root") self.ipmi_pwd = host.get("ipmi_pwd", None) self.fault_cfg = BaseAttacker.attacker_cfgs.get('bare-metal-down') self.check_script = self.get_script_fullpath( self.fault_cfg['check_script']) self.recovery_script = self.get_script_fullpath( self.fault_cfg['recovery_script']) if self.check(): self.setup_done = True
[docs] def check(self): exit_status, stdout, stderr = self.connection.execute( "/bin/sh -s {0} -W 10".format(self.host_ip), stdin=open(self.check_script, "r")) LOG.debug("check ret: %s out:%s err:%s" % (exit_status, stdout, stderr)) if not stdout or "running" not in stdout: LOG.info("the host (ipmi_ip:%s) is not running!" % self.ipmi_ip) return False return True
[docs] def inject_fault(self): exit_status, stdout, stderr = self.connection.execute( "shutdown -h now") LOG.debug("inject fault ret: %s out:%s err:%s" % (exit_status, stdout, stderr)) if not exit_status: LOG.info("inject fault success")
[docs] def recover(self): jump_host_name = self._config.get("jump_host", None) self.jump_connection = None if jump_host_name is not None: host = self._context.get(jump_host_name, None) ip = host.get("ip", None) user = host.get("user", "root") pwd = host.get("pwd", None) LOG.debug("jump_host ip:%s user:%s" % (ip, user)) self.jump_connection = ssh.SSH(user, ip, password=pwd) self.jump_connection.wait(timeout=600) LOG.debug("ssh jump host success!") if self.jump_connection is not None: exit_status, stdout, stderr = self.jump_connection.execute( "/bin/bash -s {0} {1} {2} {3}".format( self.ipmi_ip, self.ipmi_user, self.ipmi_pwd, "on"), stdin=open(self.recovery_script, "r")) else: exit_status, stdout = _execute_shell_command( "/bin/bash -s {0} {1} {2} {3}".format( self.ipmi_ip, self.ipmi_user, self.ipmi_pwd, "on"), stdin=open(self.recovery_script, "r"))
def _test(): # pragma: no cover host = { "ipmi_ip": "10.20.0.5", "ipmi_user": "root", "ipmi_pwd": "123456", "ip": "10.20.0.5", "user": "root", "key_filename": "/root/.ssh/id_rsa" } context = {"node1": host} attacker_cfg = { 'fault_type': 'bear-metal-down', 'host': 'node1', } ins = BaremetalAttacker(attacker_cfg, context) ins.setup() ins.inject_fault() if __name__ == '__main__': # pragma: no cover _test()