1. Creates a security group rule in the default security group to allow ssh and ping.
2. Creates a volume from the configured image.
3. Boots instance A from the volume.
4. Writes some random text to a tmp file on instance A which is written to the backing volume.
5. Deletes instance A.
6. Create instance B from the volume.
7. Uses ssh to cat out the contents of the file written in step 4 using instance B and verifies the text is the same.
8. Makes a snapshot of the volume.
9. Creates a volume from the snapshot image.
10. Create instance C from the volume created from the snapshot.
11. Uses instance C to check the content of the text file written to the original volume in step 4.
The scenario test does the following:
1. Creates a security group rule in the default security group to allow ssh and ping.
2. Creates a volume from the configured image.
3. Boots instance A from the volume.
4. Writes some random text to a tmp file on instance A which is written to the backing volume.
5. Deletes instance A.
6. Create instance B from the volume.
7. Uses ssh to cat out the contents of the file written in step 4 using instance B and verifies the text is the same.
8. Makes a snapshot of the volume.
9. Creates a volume from the snapshot image.
10. Create instance C from the volume created from the snapshot.
11. Uses instance C to check the content of the text file written to the original volume in step 4.
We fail in step 11 with the ssh timeout.