2018-05-30 20:41:52 +02:00
|
|
|
# Test class and utilities for functional tests
|
|
|
|
#
|
|
|
|
# Copyright (c) 2018 Red Hat, Inc.
|
|
|
|
#
|
|
|
|
# Author:
|
|
|
|
# Cleber Rosa <crosa@redhat.com>
|
|
|
|
#
|
|
|
|
# This work is licensed under the terms of the GNU GPL, version 2 or
|
|
|
|
# later. See the COPYING file in the top-level directory.
|
|
|
|
|
2019-10-29 00:04:04 +01:00
|
|
|
import logging
|
2018-05-30 20:41:52 +02:00
|
|
|
import os
|
2021-02-03 18:23:53 +01:00
|
|
|
import shutil
|
2018-05-30 20:41:52 +02:00
|
|
|
import sys
|
2019-02-12 20:38:54 +01:00
|
|
|
import uuid
|
2019-10-29 00:04:04 +01:00
|
|
|
import tempfile
|
2018-05-30 20:41:52 +02:00
|
|
|
|
|
|
|
import avocado
|
|
|
|
|
2021-02-03 18:23:49 +01:00
|
|
|
from avocado.utils import cloudinit
|
|
|
|
from avocado.utils import datadrainer
|
|
|
|
from avocado.utils import network
|
2021-04-12 06:46:37 +02:00
|
|
|
from avocado.utils import ssh
|
2021-02-03 18:23:49 +01:00
|
|
|
from avocado.utils import vmimage
|
|
|
|
from avocado.utils.path import find_command
|
|
|
|
|
|
|
|
|
2020-03-17 15:16:52 +01:00
|
|
|
#: The QEMU build root directory. It may also be the source directory
|
|
|
|
#: if building from the source dir, but it's safer to use BUILD_DIR for
|
|
|
|
#: that purpose. Be aware that if this code is moved outside of a source
|
|
|
|
#: and build tree, it will not be accurate.
|
|
|
|
BUILD_DIR = os.path.dirname(os.path.dirname(os.path.dirname(os.path.dirname(__file__))))
|
|
|
|
|
|
|
|
if os.path.islink(os.path.dirname(os.path.dirname(__file__))):
|
|
|
|
# The link to the acceptance tests dir in the source code directory
|
|
|
|
lnk = os.path.dirname(os.path.dirname(__file__))
|
|
|
|
#: The QEMU root source directory
|
|
|
|
SOURCE_DIR = os.path.dirname(os.path.dirname(os.readlink(lnk)))
|
|
|
|
else:
|
|
|
|
SOURCE_DIR = BUILD_DIR
|
|
|
|
|
|
|
|
sys.path.append(os.path.join(SOURCE_DIR, 'python'))
|
2018-05-30 20:41:52 +02:00
|
|
|
|
2019-06-27 23:28:14 +02:00
|
|
|
from qemu.machine import QEMUMachine
|
2021-05-27 23:16:53 +02:00
|
|
|
from qemu.utils import (
|
|
|
|
get_info_usernet_hostfwd_port,
|
|
|
|
kvm_available,
|
|
|
|
tcg_available,
|
|
|
|
)
|
2018-05-30 20:41:52 +02:00
|
|
|
|
|
|
|
def is_readable_executable_file(path):
|
|
|
|
return os.path.isfile(path) and os.access(path, os.R_OK | os.X_OK)
|
|
|
|
|
|
|
|
|
2019-03-12 18:18:08 +01:00
|
|
|
def pick_default_qemu_bin(arch=None):
|
2018-05-30 20:41:52 +02:00
|
|
|
"""
|
|
|
|
Picks the path of a QEMU binary, starting either in the current working
|
|
|
|
directory or in the source tree root directory.
|
2019-03-12 18:18:06 +01:00
|
|
|
|
2019-03-12 18:18:08 +01:00
|
|
|
:param arch: the arch to use when looking for a QEMU binary (the target
|
|
|
|
will match the arch given). If None (the default), arch
|
|
|
|
will be the current host system arch (as given by
|
|
|
|
:func:`os.uname`).
|
|
|
|
:type arch: str
|
2019-03-12 18:18:06 +01:00
|
|
|
:returns: the path to the default QEMU binary or None if one could not
|
|
|
|
be found
|
|
|
|
:rtype: str or None
|
2018-05-30 20:41:52 +02:00
|
|
|
"""
|
2019-03-12 18:18:08 +01:00
|
|
|
if arch is None:
|
|
|
|
arch = os.uname()[4]
|
2019-08-19 10:28:20 +02:00
|
|
|
# qemu binary path does not match arch for powerpc, handle it
|
|
|
|
if 'ppc64le' in arch:
|
|
|
|
arch = 'ppc64'
|
2020-08-03 17:04:25 +02:00
|
|
|
qemu_bin_relative_path = "./qemu-system-%s" % arch
|
2018-05-30 20:41:52 +02:00
|
|
|
if is_readable_executable_file(qemu_bin_relative_path):
|
|
|
|
return qemu_bin_relative_path
|
|
|
|
|
2020-03-17 15:16:52 +01:00
|
|
|
qemu_bin_from_bld_dir_path = os.path.join(BUILD_DIR,
|
2018-05-30 20:41:52 +02:00
|
|
|
qemu_bin_relative_path)
|
2020-03-17 15:16:52 +01:00
|
|
|
if is_readable_executable_file(qemu_bin_from_bld_dir_path):
|
|
|
|
return qemu_bin_from_bld_dir_path
|
2018-05-30 20:41:52 +02:00
|
|
|
|
|
|
|
|
2020-01-21 00:51:54 +01:00
|
|
|
def _console_interaction(test, success_message, failure_message,
|
2020-05-29 09:04:39 +02:00
|
|
|
send_string, keep_sending=False, vm=None):
|
2020-01-21 00:51:55 +01:00
|
|
|
assert not keep_sending or send_string
|
2020-05-29 09:04:39 +02:00
|
|
|
if vm is None:
|
|
|
|
vm = test.vm
|
|
|
|
console = vm.console_socket.makefile()
|
2019-10-29 00:04:04 +01:00
|
|
|
console_logger = logging.getLogger('console')
|
|
|
|
while True:
|
2020-01-21 00:51:54 +01:00
|
|
|
if send_string:
|
2020-05-29 09:04:39 +02:00
|
|
|
vm.console_socket.sendall(send_string.encode())
|
2020-01-21 00:51:55 +01:00
|
|
|
if not keep_sending:
|
|
|
|
send_string = None # send only once
|
2019-10-29 00:04:04 +01:00
|
|
|
msg = console.readline().strip()
|
|
|
|
if not msg:
|
|
|
|
continue
|
|
|
|
console_logger.debug(msg)
|
2021-03-03 21:53:19 +01:00
|
|
|
if success_message is None or success_message in msg:
|
2019-10-29 00:04:04 +01:00
|
|
|
break
|
|
|
|
if failure_message and failure_message in msg:
|
2019-10-29 00:04:04 +01:00
|
|
|
console.close()
|
2021-03-09 16:35:07 +01:00
|
|
|
fail = 'Failure message found in console: "%s". Expected: "%s"' % \
|
|
|
|
(failure_message, success_message)
|
2019-10-29 00:04:04 +01:00
|
|
|
test.fail(fail)
|
|
|
|
|
2020-01-21 00:51:55 +01:00
|
|
|
def interrupt_interactive_console_until_pattern(test, success_message,
|
|
|
|
failure_message=None,
|
|
|
|
interrupt_string='\r'):
|
|
|
|
"""
|
|
|
|
Keep sending a string to interrupt a console prompt, while logging the
|
|
|
|
console output. Typical use case is to break a boot loader prompt, such:
|
|
|
|
|
|
|
|
Press a key within 5 seconds to interrupt boot process.
|
|
|
|
5
|
|
|
|
4
|
|
|
|
3
|
|
|
|
2
|
|
|
|
1
|
|
|
|
Booting default image...
|
|
|
|
|
|
|
|
:param test: an Avocado test containing a VM that will have its console
|
|
|
|
read and probed for a success or failure message
|
|
|
|
:type test: :class:`avocado_qemu.Test`
|
|
|
|
:param success_message: if this message appears, test succeeds
|
|
|
|
:param failure_message: if this message appears, test fails
|
|
|
|
:param interrupt_string: a string to send to the console before trying
|
|
|
|
to read a new line
|
|
|
|
"""
|
|
|
|
_console_interaction(test, success_message, failure_message,
|
|
|
|
interrupt_string, True)
|
|
|
|
|
2020-05-29 09:04:39 +02:00
|
|
|
def wait_for_console_pattern(test, success_message, failure_message=None,
|
|
|
|
vm=None):
|
2020-01-21 00:51:54 +01:00
|
|
|
"""
|
|
|
|
Waits for messages to appear on the console, while logging the content
|
|
|
|
|
|
|
|
:param test: an Avocado test containing a VM that will have its console
|
|
|
|
read and probed for a success or failure message
|
|
|
|
:type test: :class:`avocado_qemu.Test`
|
|
|
|
:param success_message: if this message appears, test succeeds
|
|
|
|
:param failure_message: if this message appears, test fails
|
|
|
|
"""
|
2020-05-29 09:04:39 +02:00
|
|
|
_console_interaction(test, success_message, failure_message, None, vm=vm)
|
2019-10-29 00:04:04 +01:00
|
|
|
|
2021-03-03 21:53:19 +01:00
|
|
|
def exec_command(test, command):
|
|
|
|
"""
|
|
|
|
Send a command to a console (appending CRLF characters), while logging
|
|
|
|
the content.
|
|
|
|
|
|
|
|
:param test: an Avocado test containing a VM.
|
|
|
|
:type test: :class:`avocado_qemu.Test`
|
|
|
|
:param command: the command to send
|
|
|
|
:type command: str
|
|
|
|
"""
|
|
|
|
_console_interaction(test, None, None, command + '\r')
|
|
|
|
|
2019-10-29 00:04:04 +01:00
|
|
|
def exec_command_and_wait_for_pattern(test, command,
|
|
|
|
success_message, failure_message=None):
|
|
|
|
"""
|
|
|
|
Send a command to a console (appending CRLF characters), then wait
|
|
|
|
for success_message to appear on the console, while logging the.
|
|
|
|
content. Mark the test as failed if failure_message is found instead.
|
|
|
|
|
|
|
|
:param test: an Avocado test containing a VM that will have its console
|
|
|
|
read and probed for a success or failure message
|
|
|
|
:type test: :class:`avocado_qemu.Test`
|
|
|
|
:param command: the command to send
|
|
|
|
:param success_message: if this message appears, test succeeds
|
|
|
|
:param failure_message: if this message appears, test fails
|
|
|
|
"""
|
2020-01-21 00:51:54 +01:00
|
|
|
_console_interaction(test, success_message, failure_message, command + '\r')
|
2019-10-29 00:04:04 +01:00
|
|
|
|
2018-05-30 20:41:52 +02:00
|
|
|
class Test(avocado.Test):
|
2019-09-24 21:45:00 +02:00
|
|
|
def _get_unique_tag_val(self, tag_name):
|
|
|
|
"""
|
|
|
|
Gets a tag value, if unique for a key
|
|
|
|
"""
|
|
|
|
vals = self.tags.get(tag_name, [])
|
|
|
|
if len(vals) == 1:
|
|
|
|
return vals.pop()
|
|
|
|
return None
|
|
|
|
|
2021-02-03 18:23:51 +01:00
|
|
|
def require_accelerator(self, accelerator):
|
|
|
|
"""
|
|
|
|
Requires an accelerator to be available for the test to continue
|
|
|
|
|
|
|
|
It takes into account the currently set qemu binary.
|
|
|
|
|
|
|
|
If the check fails, the test is canceled. If the check itself
|
|
|
|
for the given accelerator is not available, the test is also
|
|
|
|
canceled.
|
|
|
|
|
|
|
|
:param accelerator: name of the accelerator, such as "kvm" or "tcg"
|
|
|
|
:type accelerator: str
|
|
|
|
"""
|
|
|
|
checker = {'tcg': tcg_available,
|
|
|
|
'kvm': kvm_available}.get(accelerator)
|
|
|
|
if checker is None:
|
|
|
|
self.cancel("Don't know how to check for the presence "
|
|
|
|
"of accelerator %s" % accelerator)
|
|
|
|
if not checker(qemu_bin=self.qemu_bin):
|
|
|
|
self.cancel("%s accelerator does not seem to be "
|
|
|
|
"available" % accelerator)
|
|
|
|
|
2018-05-30 20:41:52 +02:00
|
|
|
def setUp(self):
|
2019-02-12 20:38:54 +01:00
|
|
|
self._vms = {}
|
2019-09-24 21:45:00 +02:00
|
|
|
|
|
|
|
self.arch = self.params.get('arch',
|
|
|
|
default=self._get_unique_tag_val('arch'))
|
|
|
|
|
2019-11-04 16:13:18 +01:00
|
|
|
self.machine = self.params.get('machine',
|
|
|
|
default=self._get_unique_tag_val('machine'))
|
|
|
|
|
2019-03-12 18:18:08 +01:00
|
|
|
default_qemu_bin = pick_default_qemu_bin(arch=self.arch)
|
2018-05-30 20:41:52 +02:00
|
|
|
self.qemu_bin = self.params.get('qemu_bin',
|
2019-03-12 18:18:08 +01:00
|
|
|
default=default_qemu_bin)
|
2018-05-30 20:41:52 +02:00
|
|
|
if self.qemu_bin is None:
|
2020-03-17 15:16:52 +01:00
|
|
|
self.cancel("No QEMU binary defined or found in the build tree")
|
2019-02-12 20:38:54 +01:00
|
|
|
|
2021-02-11 22:55:05 +01:00
|
|
|
def _new_vm(self, name, *args):
|
2020-11-17 18:36:32 +01:00
|
|
|
self._sd = tempfile.TemporaryDirectory(prefix="avo_qemu_sock_")
|
2021-02-11 22:55:05 +01:00
|
|
|
vm = QEMUMachine(self.qemu_bin, base_temp_dir=self.workdir,
|
|
|
|
sock_dir=self._sd.name)
|
2021-02-11 22:55:05 +01:00
|
|
|
self.log.debug('QEMUMachine "%s" created', name)
|
|
|
|
self.log.debug('QEMUMachine "%s" temp_dir: %s', name, vm.temp_dir)
|
2019-02-12 20:38:54 +01:00
|
|
|
if args:
|
|
|
|
vm.add_args(*args)
|
|
|
|
return vm
|
|
|
|
|
|
|
|
@property
|
|
|
|
def vm(self):
|
|
|
|
return self.get_vm(name='default')
|
|
|
|
|
|
|
|
def get_vm(self, *args, name=None):
|
|
|
|
if not name:
|
|
|
|
name = str(uuid.uuid4())
|
|
|
|
if self._vms.get(name) is None:
|
2021-02-11 22:55:05 +01:00
|
|
|
self._vms[name] = self._new_vm(name, *args)
|
2019-11-04 16:13:18 +01:00
|
|
|
if self.machine is not None:
|
|
|
|
self._vms[name].set_machine(self.machine)
|
2019-02-12 20:38:54 +01:00
|
|
|
return self._vms[name]
|
2018-05-30 20:41:52 +02:00
|
|
|
|
|
|
|
def tearDown(self):
|
2019-02-12 20:38:54 +01:00
|
|
|
for vm in self._vms.values():
|
|
|
|
vm.shutdown()
|
2020-11-17 18:36:32 +01:00
|
|
|
self._sd = None
|
2020-09-09 13:27:40 +02:00
|
|
|
|
|
|
|
def fetch_asset(self, name,
|
|
|
|
asset_hash=None, algorithm=None,
|
|
|
|
locations=None, expire=None,
|
|
|
|
find_only=False, cancel_on_missing=True):
|
|
|
|
return super(Test, self).fetch_asset(name,
|
|
|
|
asset_hash=asset_hash,
|
|
|
|
algorithm=algorithm,
|
|
|
|
locations=locations,
|
|
|
|
expire=expire,
|
|
|
|
find_only=find_only,
|
|
|
|
cancel_on_missing=cancel_on_missing)
|
2021-02-03 18:23:49 +01:00
|
|
|
|
|
|
|
|
2021-04-12 06:46:37 +02:00
|
|
|
class LinuxSSHMixIn:
|
|
|
|
"""Contains utility methods for interacting with a guest via SSH."""
|
|
|
|
|
|
|
|
def ssh_connect(self, username, credential, credential_is_key=True):
|
|
|
|
self.ssh_logger = logging.getLogger('ssh')
|
|
|
|
res = self.vm.command('human-monitor-command',
|
|
|
|
command_line='info usernet')
|
|
|
|
port = get_info_usernet_hostfwd_port(res)
|
|
|
|
self.assertIsNotNone(port)
|
|
|
|
self.assertGreater(port, 0)
|
|
|
|
self.log.debug('sshd listening on port: %d', port)
|
|
|
|
if credential_is_key:
|
|
|
|
self.ssh_session = ssh.Session('127.0.0.1', port=port,
|
|
|
|
user=username, key=credential)
|
|
|
|
else:
|
|
|
|
self.ssh_session = ssh.Session('127.0.0.1', port=port,
|
|
|
|
user=username, password=credential)
|
|
|
|
for i in range(10):
|
|
|
|
try:
|
|
|
|
self.ssh_session.connect()
|
|
|
|
return
|
|
|
|
except:
|
|
|
|
time.sleep(4)
|
|
|
|
pass
|
|
|
|
self.fail('ssh connection timeout')
|
|
|
|
|
|
|
|
def ssh_command(self, command):
|
|
|
|
self.ssh_logger.info(command)
|
|
|
|
result = self.ssh_session.cmd(command)
|
|
|
|
stdout_lines = [line.rstrip() for line
|
|
|
|
in result.stdout_text.splitlines()]
|
|
|
|
for line in stdout_lines:
|
|
|
|
self.ssh_logger.info(line)
|
|
|
|
stderr_lines = [line.rstrip() for line
|
|
|
|
in result.stderr_text.splitlines()]
|
|
|
|
for line in stderr_lines:
|
|
|
|
self.ssh_logger.warning(line)
|
|
|
|
|
|
|
|
self.assertEqual(result.exit_status, 0,
|
|
|
|
f'Guest command failed: {command}')
|
|
|
|
return stdout_lines, stderr_lines
|
|
|
|
|
|
|
|
|
|
|
|
class LinuxTest(Test, LinuxSSHMixIn):
|
2021-02-03 18:23:49 +01:00
|
|
|
"""Facilitates having a cloud-image Linux based available.
|
|
|
|
|
|
|
|
For tests that indend to interact with guests, this is a better choice
|
|
|
|
to start with than the more vanilla `Test` class.
|
|
|
|
"""
|
|
|
|
|
|
|
|
timeout = 900
|
|
|
|
chksum = None
|
2021-04-12 06:46:39 +02:00
|
|
|
username = 'root'
|
|
|
|
password = 'password'
|
2021-02-03 18:23:49 +01:00
|
|
|
|
2021-04-12 06:46:38 +02:00
|
|
|
def setUp(self, ssh_pubkey=None, network_device_type='virtio-net'):
|
2021-02-03 18:23:49 +01:00
|
|
|
super(LinuxTest, self).setUp()
|
|
|
|
self.vm.add_args('-smp', '2')
|
|
|
|
self.vm.add_args('-m', '1024')
|
2021-04-12 06:46:38 +02:00
|
|
|
# The following network device allows for SSH connections
|
|
|
|
self.vm.add_args('-netdev', 'user,id=vnet,hostfwd=:127.0.0.1:0-:22',
|
|
|
|
'-device', '%s,netdev=vnet' % network_device_type)
|
2021-02-03 18:23:49 +01:00
|
|
|
self.set_up_boot()
|
2021-02-03 18:23:53 +01:00
|
|
|
if ssh_pubkey is None:
|
|
|
|
ssh_pubkey, self.ssh_key = self.set_up_existing_ssh_keys()
|
2021-02-03 18:23:49 +01:00
|
|
|
self.set_up_cloudinit(ssh_pubkey)
|
|
|
|
|
2021-02-03 18:23:53 +01:00
|
|
|
def set_up_existing_ssh_keys(self):
|
|
|
|
ssh_public_key = os.path.join(SOURCE_DIR, 'tests', 'keys', 'id_rsa.pub')
|
|
|
|
source_private_key = os.path.join(SOURCE_DIR, 'tests', 'keys', 'id_rsa')
|
|
|
|
ssh_dir = os.path.join(self.workdir, '.ssh')
|
|
|
|
os.mkdir(ssh_dir, mode=0o700)
|
|
|
|
ssh_private_key = os.path.join(ssh_dir,
|
|
|
|
os.path.basename(source_private_key))
|
|
|
|
shutil.copyfile(source_private_key, ssh_private_key)
|
|
|
|
os.chmod(ssh_private_key, 0o600)
|
|
|
|
return (ssh_public_key, ssh_private_key)
|
|
|
|
|
2021-02-03 18:23:49 +01:00
|
|
|
def download_boot(self):
|
|
|
|
self.log.debug('Looking for and selecting a qemu-img binary to be '
|
|
|
|
'used to create the bootable snapshot image')
|
|
|
|
# If qemu-img has been built, use it, otherwise the system wide one
|
|
|
|
# will be used. If none is available, the test will cancel.
|
|
|
|
qemu_img = os.path.join(BUILD_DIR, 'qemu-img')
|
|
|
|
if not os.path.exists(qemu_img):
|
|
|
|
qemu_img = find_command('qemu-img', False)
|
|
|
|
if qemu_img is False:
|
|
|
|
self.cancel('Could not find "qemu-img", which is required to '
|
|
|
|
'create the bootable image')
|
|
|
|
vmimage.QEMU_IMG = qemu_img
|
|
|
|
|
|
|
|
self.log.info('Downloading/preparing boot image')
|
|
|
|
# Fedora 31 only provides ppc64le images
|
|
|
|
image_arch = self.arch
|
|
|
|
if image_arch == 'ppc64':
|
|
|
|
image_arch = 'ppc64le'
|
|
|
|
try:
|
|
|
|
boot = vmimage.get(
|
|
|
|
'fedora', arch=image_arch, version='31',
|
|
|
|
checksum=self.chksum,
|
|
|
|
algorithm='sha256',
|
|
|
|
cache_dir=self.cache_dirs[0],
|
|
|
|
snapshot_dir=self.workdir)
|
|
|
|
except:
|
|
|
|
self.cancel('Failed to download/prepare boot image')
|
|
|
|
return boot.path
|
|
|
|
|
|
|
|
def prepare_cloudinit(self, ssh_pubkey=None):
|
|
|
|
self.log.info('Preparing cloudinit image')
|
|
|
|
try:
|
|
|
|
cloudinit_iso = os.path.join(self.workdir, 'cloudinit.iso')
|
|
|
|
self.phone_home_port = network.find_free_port()
|
2021-02-19 12:04:22 +01:00
|
|
|
pubkey_content = None
|
|
|
|
if ssh_pubkey:
|
|
|
|
with open(ssh_pubkey) as pubkey:
|
|
|
|
pubkey_content = pubkey.read()
|
2021-02-03 18:23:49 +01:00
|
|
|
cloudinit.iso(cloudinit_iso, self.name,
|
2021-04-12 06:46:39 +02:00
|
|
|
username=self.username,
|
|
|
|
password=self.password,
|
2021-02-03 18:23:49 +01:00
|
|
|
# QEMU's hard coded usermode router address
|
|
|
|
phone_home_host='10.0.2.2',
|
|
|
|
phone_home_port=self.phone_home_port,
|
2021-02-03 18:23:52 +01:00
|
|
|
authorized_key=pubkey_content)
|
2021-02-03 18:23:49 +01:00
|
|
|
except Exception:
|
|
|
|
self.cancel('Failed to prepare the cloudinit image')
|
|
|
|
return cloudinit_iso
|
|
|
|
|
|
|
|
def set_up_boot(self):
|
|
|
|
path = self.download_boot()
|
|
|
|
self.vm.add_args('-drive', 'file=%s' % path)
|
|
|
|
|
|
|
|
def set_up_cloudinit(self, ssh_pubkey=None):
|
|
|
|
cloudinit_iso = self.prepare_cloudinit(ssh_pubkey)
|
|
|
|
self.vm.add_args('-drive', 'file=%s,format=raw' % cloudinit_iso)
|
|
|
|
|
2021-04-12 06:46:40 +02:00
|
|
|
def launch_and_wait(self, set_up_ssh_connection=True):
|
2021-02-03 18:23:49 +01:00
|
|
|
self.vm.set_console()
|
|
|
|
self.vm.launch()
|
|
|
|
console_drainer = datadrainer.LineLogger(self.vm.console_socket.fileno(),
|
|
|
|
logger=self.log.getChild('console'))
|
|
|
|
console_drainer.start()
|
|
|
|
self.log.info('VM launched, waiting for boot confirmation from guest')
|
|
|
|
cloudinit.wait_for_phone_home(('0.0.0.0', self.phone_home_port), self.name)
|
2021-04-12 06:46:40 +02:00
|
|
|
if set_up_ssh_connection:
|
|
|
|
self.log.info('Setting up the SSH connection')
|
|
|
|
self.ssh_connect(self.username, self.ssh_key)
|