diff options
author | wym_libra <yimin.wang@huawei.com> | 2015-12-07 16:02:18 +0800 |
---|---|---|
committer | wym_libra <yimin.wang@huawei.com> | 2015-12-18 10:09:08 +0800 |
commit | 53a96f499680587dc2f6172a964af35f9ce1c74b (patch) | |
tree | 0e6326ee1bd7d8e99c0c8ddc3cd0a9b50bb1dc6b /yardstick/benchmark/scenarios/availability/attacker/baseattacker.py | |
parent | 05c1840c9c4dda154c9c5d00ff3cd23ba202330b (diff) |
Rewrite the HA test case (1)
refactor the attacker implement.
1) BaseAttacker is added
2) a simple attacker named "kill-process" inherit the BaseAttacker
3) serviceha.py selects an attacker through the BaseAttacker by attacker name
JIRA: YARDSTICK-149
Change-Id: Ib718d5edc6b5e14bc3ea0592e0146468ff70b43e
Signed-off-by: wym_libra <yimin.wang@huawei.com>
Diffstat (limited to 'yardstick/benchmark/scenarios/availability/attacker/baseattacker.py')
-rw-r--r-- | yardstick/benchmark/scenarios/availability/attacker/baseattacker.py | 47 |
1 files changed, 47 insertions, 0 deletions
diff --git a/yardstick/benchmark/scenarios/availability/attacker/baseattacker.py b/yardstick/benchmark/scenarios/availability/attacker/baseattacker.py new file mode 100644 index 000000000..ddaf09969 --- /dev/null +++ b/yardstick/benchmark/scenarios/availability/attacker/baseattacker.py @@ -0,0 +1,47 @@ +############################################################################## +# Copyright (c) 2015 Huawei Technologies Co.,Ltd. and others +# +# All rights reserved. This program and the accompanying materials +# are made available under the terms of the Apache License, Version 2.0 +# which accompanies this distribution, and is available at +# http://www.apache.org/licenses/LICENSE-2.0 +############################################################################## +import pkg_resources +import yaml +import logging +import os + +import yardstick.common.utils as utils + +LOG = logging.getLogger(__name__) + +attacker_conf_path = pkg_resources.resource_filename( + "yardstick.benchmark.scenarios.availability.attacker", + "attacker_conf.yaml") + + +class BaseAttacker(object): + + attacker_cfgs = {} + + def __init__(self, config, context): + if not BaseAttacker.attacker_cfgs: + with open(attacker_conf_path) as stream: + BaseAttacker.attacker_cfgs = yaml.load(stream) + + self._config = config + self._context = context + self.setup_done = False + + @staticmethod + def get_attacker_cls(attacker_cfg): + '''return attacker instance of specified type''' + attacker_type = attacker_cfg['fault_type'] + for attacker_cls in utils.itersubclasses(BaseAttacker): + if attacker_type == attacker_cls.__attacker_type__: + return attacker_cls + raise RuntimeError("No such runner_type %s" % attacker_type) + + def get_script_fullpath(self, path): + base_path = os.path.dirname(attacker_conf_path) + return os.path.join(base_path, path) |