aboutsummaryrefslogtreecommitdiffstats
path: root/docker/firstboot
AgeCommit message (Expand)AuthorFilesLines
2017-03-08Enable Docker service for Compute roleMartin André1-21/+3
2017-02-15docker: new hybrid deployment architecture and configurationDan Prince3-79/+29
2017-01-03Merge "Bump template version for all templates to "ocata""Jenkins1-1/+1
2016-12-23Bump template version for all templates to "ocata"Steven Hardy1-1/+1
2016-12-19Use overcloud-full instead of atomic-imageSteve Baker1-72/+29
2016-12-19Add bind mounts for agent stateSteve Baker1-0/+3
2016-12-08docker: don't use custom run-os-net-configSteve Baker1-0/+1
2016-10-19Bind mount files to run DiD in latest atomic hostMartin André1-1/+22
2016-10-19Have docker start script honor configurationMartin André1-1/+3
2016-10-06Be more inclusive in insecure registry regexMartin André1-1/+1
2016-07-29Update heat-agents setup filesFlavio Percoco2-30/+31
2016-05-06Use docker-cmd hook.Ian Main1-1/+1
2016-03-30Remove hack the pulls latest dockerRyan Hallisey1-13/+0
2016-03-30Centos gives /dev/pts/ptmx the wrong permsRyan Hallisey1-0/+3
2016-03-09Allow the containerized compute node to spawn larger VMsRyan Hallisey1-0/+19
2016-02-16Merge "Remove DNS hack."Jenkins1-2/+0
2016-02-12Minor fixes to allow local docker registry usageJeff Peeler2-3/+9
2016-02-12Remove DNS hack.Ian Main1-2/+0
2016-01-05Use new heat-docker-agents imagesRyan Hallisey1-1/+1
2015-11-20Merge "Add local docker registry support"Jenkins2-1/+11
2015-11-20Merge "Update docker compute environment to use json config"Jenkins1-4/+1
2015-11-09Pin docker version for atomic at 1.8.2Jeff Peeler1-2/+3
2015-11-02Add local docker registry supportRyan Hallisey2-1/+11
2015-11-02Update docker compute environment to use json configRyan Hallisey1-4/+1
2015-10-08Docker compute role configured via PuppetDan Prince2-0/+102
sd">"""This method is run once before _each_ test method is executed""" def teardown(self): """This method is run once after _each_ test method is executed""" def test_init(self): assert_is_instance( NetworkSettings(os.path.join(files_dir, 'network_settings.yaml')), NetworkSettings) def test_init_vlans(self): assert_is_instance( NetworkSettings(os.path.join(files_dir, 'network_settings_vlans.yaml')), NetworkSettings) # TODO, v6 test is stuck # def test_init_v6(self): # assert_is_instance( # NetworkSettings(files_dir+'network_settings_v6.yaml', True), # NetworkSettings) def test_init_admin_disabled_or_missing(self): ns = NetworkSettings(os.path.join(files_dir, 'network_settings.yaml')) # remove admin, apex section will re-add it ns['networks'].pop('admin', None) assert_raises(NetworkSettingsException, NetworkSettings, ns) # remove admin and apex ns.pop('apex', None) ns['networks'].pop('admin', None) assert_raises(NetworkSettingsException, NetworkSettings, ns) def test_init_collapse_storage(self): ns = NetworkSettings(os.path.join(files_dir, 'network_settings.yaml')) # remove storage ns['networks'].pop('storage', None) assert_is_instance(NetworkSettings(ns), NetworkSettings) def test_init_missing_dns_domain(self): ns = NetworkSettings(os.path.join(files_dir, 'network_settings.yaml')) # remove storage ns.pop('dns-domain', None) assert_is_instance(NetworkSettings(ns), NetworkSettings) def test_get_network_settings(self): ns = NetworkSettings(os.path.join(files_dir, 'network_settings.yaml')) assert_is_instance(ns, NetworkSettings) for role in ['controller', 'compute']: nic_index = 0 print(ns.nics) for network in ns.enabled_network_list: nic = 'eth' + str(nic_index) assert_equal(ns.nics[role][network], nic) nic_index += 1 def test_get_enabled_networks(self): ns = NetworkSettings(os.path.join(files_dir, 'network_settings.yaml')) assert_is_instance(ns.enabled_network_list, list) def test_invalid_nic_members(self): ns = NetworkSettings(os.path.join(files_dir, 'network_settings.yaml')) storage_net_nicmap = ns['networks'][STORAGE_NETWORK]['nic_mapping'] # set duplicate nic storage_net_nicmap['controller']['members'][0] = 'eth0' assert_raises(NetworkSettingsException, NetworkSettings, ns) # remove nic members storage_net_nicmap['controller']['members'] = [] assert_raises(NetworkSettingsException, NetworkSettings, ns) def test_missing_vlan(self): ns = NetworkSettings(os.path.join(files_dir, 'network_settings.yaml')) storage_net_nicmap = ns['networks'][STORAGE_NETWORK]['nic_mapping'] # remove vlan from storage net storage_net_nicmap['compute'].pop('vlan', None) assert_is_instance(NetworkSettings(ns), NetworkSettings) for role in ('compute', 'controller'): assert_equal(ns['networks'][ADMIN_NETWORK]['nic_mapping'][ role]['vlan'], 'native') # TODO # need to manipulate interfaces some how # maybe for ip_utils to return something to pass this # def test_admin_auto_detect(self): # ns = NetworkSettings(files_dir+'network_settings.yaml') # # remove cidr to force autodetection # ns['networks'][ADMIN_NETWORK].pop('cidr', None) # assert_is_instance(NetworkSettings(ns), NetworkSettings) def test_admin_fail_auto_detect(self): ns = NetworkSettings(os.path.join(files_dir, 'network_settings.yaml')) # remove cidr and installer_vm to fail autodetect ns['networks'][ADMIN_NETWORK].pop('cidr', None) ns['networks'][ADMIN_NETWORK].pop('installer_vm', None) assert_raises(NetworkSettingsException, NetworkSettings, ns) def test_exception(self): e = NetworkSettingsException("test") print(e) assert_is_instance(e, NetworkSettingsException) def test_config_ip(self): ns = NetworkSettings(os.path.join(files_dir, 'network_settings.yaml')) # set the provisioner ip to None to force _gen_ip to generate one ns['networks'][ADMIN_NETWORK]['installer_vm']['ip'] = None ns['networks'][EXTERNAL_NETWORK][0]['installer_vm']['ip'] = None # Now rebuild network settings object and check for repopulated values ns = NetworkSettings(ns) assert_equal(ns['networks'][ADMIN_NETWORK]['installer_vm']['ip'], '192.0.2.1') assert_equal(ns['networks'][EXTERNAL_NETWORK][0]['installer_vm']['ip'], '192.168.37.1') def test_config_gateway(self): ns = NetworkSettings(os.path.join(files_dir, 'network_settings.yaml')) # set the gateway ip to None to force _config_gateway to generate one ns['networks'][EXTERNAL_NETWORK][0]['gateway'] = None # Now rebuild network settings object and check for a repopulated value ns = NetworkSettings(ns) assert_equal(ns['networks'][EXTERNAL_NETWORK][0]['gateway'], '192.168.37.1')