summaryrefslogtreecommitdiffstats
path: root/yardstick/benchmark/scenarios/availability/attacker/attacker_baremetal.py
blob: b35869d070898de2cef572065cda1c2795c2fd45 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
##############################################################################
# Copyright (c) 2015 Huawei Technologies Co.,Ltd. and others
#
# All rights reserved. This program and the accompanying materials
# are made available under the terms of the Apache License, Version 2.0
# which accompanies this distribution, and is available at
# http://www.apache.org/licenses/LICENSE-2.0
##############################################################################
import logging
import traceback
import subprocess
import yardstick.ssh as ssh
from baseattacker import BaseAttacker

LOG = logging.getLogger(__name__)


def _execute_shell_command(command, stdin=None):
    '''execute shell script with error handling'''
    exitcode = 0
    output = []
    try:
        output = subprocess.check_output(command, stdin=stdin, shell=True)
    except Exception:
        exitcode = -1
        output = traceback.format_exc()
        LOG.error("exec command '%s' error:\n " % command)
        LOG.error(traceback.format_exc())

    return exitcode, output


class BaremetalAttacker(BaseAttacker):

    __attacker_type__ = 'bare-metal-down'

    def setup(self):
        LOG.debug("config:%s context:%s" % (self._config, self._context))
        host = self._context.get(self._config['host'], None)
        ip = host.get("ip", None)
        user = host.get("user", "root")
        key_filename = host.get("key_filename", "~/.ssh/id_rsa")

        self.connection = ssh.SSH(user, ip, key_filename=key_filename)
        self.connection.wait(timeout=600)
        LOG.debug("ssh host success!")
        self.host_ip = ip

        self.ipmi_ip = host.get("ipmi_ip", None)
        self.ipmi_user = host.get("ipmi_user", "root")
        self.ipmi_pwd = host.get("ipmi_pwd", None)

        self.fault_cfg = BaseAttacker.attacker_cfgs.get('bare-metal-down')
        self.check_script = self.get_script_fullpath(
            self.fault_cfg['check_script'])
        self.recovery_script = self.get_script_fullpath(
            self.fault_cfg['recovery_script'])

        if self.check():
            self.setup_done = True

    def check(self):
        exit_status, stdout, stderr = self.connection.execute(
            "/bin/sh -s {0} -W 10".format(self.host_ip),
            stdin=open(self.check_script, "r"))

        LOG.debug("check ret: %s out:%s err:%s" %
                  (exit_status, stdout, stderr))
        if not stdout or "running" not in stdout:
            LOG.info("the host (ipmi_ip:%s) is not running!" % self.ipmi_ip)
            return False

        return True

    def inject_fault(self):
        exit_status, stdout, stderr = self.connection.execute(
            "shutdown -h now")
        LOG.debug("inject fault ret: %s out:%s err:%s" %
                  (exit_status, stdout, stderr))
        if not exit_status:
            LOG.info("inject fault success")

    def recover(self):
        jump_host_name = self._config.get("jump_host", None)
        self.jump_connection = None
        if jump_host_name is not None:
            host = self._context.get(jump_host_name, None)
            ip = host.get("ip", None)
            user = host.get("user", "root")
            pwd = host.get("pwd", None)

            LOG.debug("jump_host ip:%s user:%s" % (ip, user))
            self.jump_connection = ssh.SSH(user, ip, password=pwd)
            self.jump_connection.wait(timeout=600)
            LOG.debug("ssh jump host success!")

        if self.jump_connection is not None:
            exit_status, stdout, stderr = self.jump_connection.execute(
                "/bin/bash -s {0} {1} {2} {3}".format(
                    self.ipmi_ip, self.ipmi_user, self.ipmi_pwd, "on"),
                stdin=open(self.recovery_script, "r"))
        else:
            exit_status, stdout = _execute_shell_command(
                "/bin/bash -s {0} {1} {2} {3}".format(
                    self.ipmi_ip, self.ipmi_user, self.ipmi_pwd, "on"),
                stdin=open(self.recovery_script, "r"))


def _test():  # pragma: no cover
    host = {
        "ipmi_ip": "10.20.0.5",
        "ipmi_user": "root",
        "ipmi_pwd": "123456",
        "ip": "10.20.0.5",
        "user": "root",
        "key_filename": "/root/.ssh/id_rsa"
    }
    context = {"node1": host}
    attacker_cfg = {
        'fault_type': 'bear-metal-down',
        'host': 'node1',
    }
    ins = BaremetalAttacker(attacker_cfg, context)
    ins.setup()
    ins.inject_fault()


if __name__ == '__main__':  # pragma: no cover
    _test()