
This changes splits the internal DB API in two parts, alarm and metering. It also adds a new configuration options to set a different database for alarm than the 'metering' one. Example: [database] connection = mongodb://localhost/ceilometer alarm_connection = mysql://localhost/ceilometer This changes don't take care of the drivers storaged. They will be splitted in later changes The ceilometer.storage.ConnectionProxy object ensure that only alarm methods are available when the namespace is the alarm one, same for the metering namespace. Partial implements blueprint dedicated-alarm-database Change-Id: I1e118e4adc59ca5cd3781dbb18865818c3cc2300
572 lines
24 KiB
Python
572 lines
24 KiB
Python
#
|
|
# Copyright Ericsson AB 2013. All rights reserved
|
|
#
|
|
# Authors: Ildiko Vancsa <ildiko.vancsa@ericsson.com>
|
|
# Balazs Gibizer <balazs.gibizer@ericsson.com>
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
"""Tests complex queries for samples
|
|
"""
|
|
|
|
import datetime
|
|
|
|
from ceilometer.alarm.storage import models
|
|
from ceilometer.openstack.common import timeutils
|
|
from ceilometer.publisher import utils
|
|
from ceilometer import sample
|
|
from ceilometer.tests.api import v2 as tests_api
|
|
from ceilometer.tests import db as tests_db
|
|
|
|
|
|
admin_header = {"X-Roles": "admin",
|
|
"X-Project-Id":
|
|
"project-id1"}
|
|
non_admin_header = {"X-Roles": "Member",
|
|
"X-Project-Id":
|
|
"project-id1"}
|
|
|
|
|
|
class TestQueryMetersController(tests_api.FunctionalTest,
|
|
tests_db.MixinTestsWithBackendScenarios):
|
|
|
|
def setUp(self):
|
|
super(TestQueryMetersController, self).setUp()
|
|
self.url = '/query/samples'
|
|
|
|
for cnt in [
|
|
sample.Sample('meter.test',
|
|
'cumulative',
|
|
'',
|
|
1,
|
|
'user-id1',
|
|
'project-id1',
|
|
'resource-id1',
|
|
timestamp=datetime.datetime(2012, 7, 2, 10, 40),
|
|
resource_metadata={'display_name': 'test-server1',
|
|
'tag': 'self.sample',
|
|
'size': 456,
|
|
'util': 0.25,
|
|
'is_public': True},
|
|
source='test_source'),
|
|
sample.Sample('meter.test',
|
|
'cumulative',
|
|
'',
|
|
2,
|
|
'user-id2',
|
|
'project-id2',
|
|
'resource-id2',
|
|
timestamp=datetime.datetime(2012, 7, 2, 10, 41),
|
|
resource_metadata={'display_name': 'test-server2',
|
|
'tag': 'self.sample',
|
|
'size': 123,
|
|
'util': 0.75,
|
|
'is_public': True},
|
|
source='test_source'),
|
|
sample.Sample('meter.test',
|
|
'cumulative',
|
|
'',
|
|
3,
|
|
'user-id3',
|
|
'project-id3',
|
|
'resource-id3',
|
|
timestamp=datetime.datetime(2012, 7, 2, 10, 42),
|
|
resource_metadata={'display_name': 'test-server3',
|
|
'tag': 'self.sample',
|
|
'size': 789,
|
|
'util': 0.95,
|
|
'is_public': True},
|
|
source='test_source')]:
|
|
|
|
msg = utils.meter_message_from_counter(
|
|
cnt,
|
|
self.CONF.publisher.metering_secret)
|
|
self.conn.record_metering_data(msg)
|
|
|
|
def test_query_fields_are_optional(self):
|
|
data = self.post_json(self.url, params={})
|
|
self.assertEqual(3, len(data.json))
|
|
|
|
def test_query_with_isotime(self):
|
|
date_time = datetime.datetime(2012, 7, 2, 10, 41)
|
|
isotime = date_time.isoformat()
|
|
|
|
data = self.post_json(self.url,
|
|
params={"filter":
|
|
'{">=": {"timestamp": "'
|
|
+ isotime + '"}}'})
|
|
|
|
self.assertEqual(2, len(data.json))
|
|
for sample_item in data.json:
|
|
result_time = timeutils.parse_isotime(sample_item['timestamp'])
|
|
result_time = result_time.replace(tzinfo=None)
|
|
self.assertTrue(result_time >= date_time)
|
|
|
|
def test_non_admin_tenant_sees_only_its_own_project(self):
|
|
data = self.post_json(self.url,
|
|
params={},
|
|
headers=non_admin_header)
|
|
for sample_item in data.json:
|
|
self.assertEqual("project-id1", sample_item['project_id'])
|
|
|
|
def test_non_admin_tenant_cannot_query_others_project(self):
|
|
data = self.post_json(self.url,
|
|
params={"filter":
|
|
'{"=": {"project_id": "project-id2"}}'},
|
|
expect_errors=True,
|
|
headers=non_admin_header)
|
|
|
|
self.assertEqual(401, data.status_int)
|
|
self.assertIn("Not Authorized to access project project-id2",
|
|
data.body)
|
|
|
|
def test_non_admin_tenant_can_explicitly_filter_for_own_project(self):
|
|
data = self.post_json(self.url,
|
|
params={"filter":
|
|
'{"=": {"project_id": "project-id1"}}'},
|
|
headers=non_admin_header)
|
|
|
|
for sample_item in data.json:
|
|
self.assertEqual("project-id1", sample_item['project_id'])
|
|
|
|
def test_admin_tenant_sees_every_project(self):
|
|
data = self.post_json(self.url,
|
|
params={},
|
|
headers=admin_header)
|
|
|
|
self.assertEqual(3, len(data.json))
|
|
for sample_item in data.json:
|
|
self.assertIn(sample_item['project_id'],
|
|
(["project-id1", "project-id2", "project-id3"]))
|
|
|
|
def test_admin_tenant_sees_every_project_with_complex_filter(self):
|
|
filter = ('{"OR": ' +
|
|
'[{"=": {"project_id": "project-id1"}}, ' +
|
|
'{"=": {"project_id": "project-id2"}}]}')
|
|
data = self.post_json(self.url,
|
|
params={"filter": filter},
|
|
headers=admin_header)
|
|
|
|
self.assertEqual(2, len(data.json))
|
|
for sample_item in data.json:
|
|
self.assertIn(sample_item['project_id'],
|
|
(["project-id1", "project-id2"]))
|
|
|
|
def test_admin_tenant_sees_every_project_with_in_filter(self):
|
|
filter = ('{"In": ' +
|
|
'{"project_id": ["project-id1", "project-id2"]}}')
|
|
data = self.post_json(self.url,
|
|
params={"filter": filter},
|
|
headers=admin_header)
|
|
|
|
self.assertEqual(2, len(data.json))
|
|
for sample_item in data.json:
|
|
self.assertIn(sample_item['project_id'],
|
|
(["project-id1", "project-id2"]))
|
|
|
|
def test_admin_tenant_can_query_any_project(self):
|
|
data = self.post_json(self.url,
|
|
params={"filter":
|
|
'{"=": {"project_id": "project-id2"}}'},
|
|
headers=admin_header)
|
|
|
|
self.assertEqual(1, len(data.json))
|
|
for sample_item in data.json:
|
|
self.assertIn(sample_item['project_id'], set(["project-id2"]))
|
|
|
|
def test_query_with_orderby(self):
|
|
data = self.post_json(self.url,
|
|
params={"orderby": '[{"project_id": "DESC"}]'})
|
|
|
|
self.assertEqual(3, len(data.json))
|
|
self.assertEqual(["project-id3", "project-id2", "project-id1"],
|
|
[s["project_id"] for s in data.json])
|
|
|
|
def test_query_with_field_name_project(self):
|
|
data = self.post_json(self.url,
|
|
params={"filter":
|
|
'{"=": {"project": "project-id2"}}'})
|
|
|
|
self.assertEqual(1, len(data.json))
|
|
for sample_item in data.json:
|
|
self.assertIn(sample_item['project_id'], set(["project-id2"]))
|
|
|
|
def test_query_with_field_name_resource(self):
|
|
data = self.post_json(self.url,
|
|
params={"filter":
|
|
'{"=": {"resource": "resource-id2"}}'})
|
|
|
|
self.assertEqual(1, len(data.json))
|
|
for sample_item in data.json:
|
|
self.assertIn(sample_item['resource_id'], set(["resource-id2"]))
|
|
|
|
def test_query_with_field_name_user(self):
|
|
data = self.post_json(self.url,
|
|
params={"filter":
|
|
'{"=": {"user": "user-id2"}}'})
|
|
|
|
self.assertEqual(1, len(data.json))
|
|
for sample_item in data.json:
|
|
self.assertIn(sample_item['user_id'], set(["user-id2"]))
|
|
|
|
def test_query_with_field_name_meter(self):
|
|
data = self.post_json(self.url,
|
|
params={"filter":
|
|
'{"=": {"meter": "meter.test"}}'})
|
|
|
|
self.assertEqual(3, len(data.json))
|
|
for sample_item in data.json:
|
|
self.assertIn(sample_item['meter'], set(["meter.test"]))
|
|
|
|
def test_query_with_lower_and_upper_case_orderby(self):
|
|
data = self.post_json(self.url,
|
|
params={"orderby": '[{"project_id": "DeSc"}]'})
|
|
|
|
self.assertEqual(3, len(data.json))
|
|
self.assertEqual(["project-id3", "project-id2", "project-id1"],
|
|
[s["project_id"] for s in data.json])
|
|
|
|
def test_query_with_user_field_name_orderby(self):
|
|
data = self.post_json(self.url,
|
|
params={"orderby": '[{"user": "aSc"}]'})
|
|
|
|
self.assertEqual(3, len(data.json))
|
|
self.assertEqual(["user-id1", "user-id2", "user-id3"],
|
|
[s["user_id"] for s in data.json])
|
|
|
|
def test_query_with_volume_field_name_orderby(self):
|
|
data = self.post_json(self.url,
|
|
params={"orderby": '[{"volume": "deSc"}]'})
|
|
|
|
self.assertEqual(3, len(data.json))
|
|
self.assertEqual([3, 2, 1],
|
|
[s["volume"] for s in data.json])
|
|
|
|
def test_query_with_missing_order_in_orderby(self):
|
|
data = self.post_json(self.url,
|
|
params={"orderby": '[{"project_id": ""}]'},
|
|
expect_errors=True)
|
|
|
|
self.assertEqual(500, data.status_int)
|
|
|
|
def test_filter_with_metadata(self):
|
|
data = self.post_json(self.url,
|
|
params={"filter":
|
|
'{">=": {"metadata.util": 0.5}}'})
|
|
|
|
self.assertEqual(2, len(data.json))
|
|
for sample_item in data.json:
|
|
self.assertTrue(sample_item["metadata"]["util"] >= 0.5)
|
|
|
|
def test_filter_with_negation(self):
|
|
filter_expr = '{"not": {">=": {"metadata.util": 0.5}}}'
|
|
data = self.post_json(self.url,
|
|
params={"filter": filter_expr})
|
|
|
|
self.assertEqual(1, len(data.json))
|
|
for sample_item in data.json:
|
|
self.assertTrue(float(sample_item["metadata"]["util"]) < 0.5)
|
|
|
|
def test_limit_should_be_positive(self):
|
|
data = self.post_json(self.url,
|
|
params={"limit": 0},
|
|
expect_errors=True)
|
|
|
|
self.assertEqual(400, data.status_int)
|
|
self.assertIn("Limit should be positive", data.body)
|
|
|
|
|
|
class TestQueryAlarmsController(tests_api.FunctionalTest,
|
|
tests_db.MixinTestsWithBackendScenarios):
|
|
|
|
def setUp(self):
|
|
super(TestQueryAlarmsController, self).setUp()
|
|
self.alarm_url = '/query/alarms'
|
|
|
|
for state in ['ok', 'alarm', 'insufficient data']:
|
|
for date in [datetime.datetime(2013, 1, 1),
|
|
datetime.datetime(2013, 2, 2)]:
|
|
for id in [1, 2]:
|
|
alarm_id = "-".join([state, date.isoformat(), str(id)])
|
|
project_id = "project-id%d" % id
|
|
alarm = models.Alarm(name=alarm_id,
|
|
type='threshold',
|
|
enabled=True,
|
|
alarm_id=alarm_id,
|
|
description='a',
|
|
state=state,
|
|
state_timestamp=date,
|
|
timestamp=date,
|
|
ok_actions=[],
|
|
insufficient_data_actions=[],
|
|
alarm_actions=[],
|
|
repeat_actions=True,
|
|
user_id="user-id%d" % id,
|
|
project_id=project_id,
|
|
time_constraints=[],
|
|
rule=dict(comparison_operator='gt',
|
|
threshold=2.0,
|
|
statistic='avg',
|
|
evaluation_periods=60,
|
|
period=1,
|
|
meter_name='meter.test',
|
|
query=[{'field':
|
|
'project_id',
|
|
'op': 'eq',
|
|
'value':
|
|
project_id}]))
|
|
self.alarm_conn.update_alarm(alarm)
|
|
|
|
def test_query_all(self):
|
|
data = self.post_json(self.alarm_url,
|
|
params={})
|
|
|
|
self.assertEqual(12, len(data.json))
|
|
|
|
def test_filter_with_isotime_timestamp(self):
|
|
date_time = datetime.datetime(2013, 1, 1)
|
|
isotime = date_time.isoformat()
|
|
|
|
data = self.post_json(self.alarm_url,
|
|
params={"filter":
|
|
'{">": {"timestamp": "'
|
|
+ isotime + '"}}'})
|
|
|
|
self.assertEqual(6, len(data.json))
|
|
for alarm in data.json:
|
|
result_time = timeutils.parse_isotime(alarm['timestamp'])
|
|
result_time = result_time.replace(tzinfo=None)
|
|
self.assertTrue(result_time > date_time)
|
|
|
|
def test_filter_with_isotime_state_timestamp(self):
|
|
date_time = datetime.datetime(2013, 1, 1)
|
|
isotime = date_time.isoformat()
|
|
|
|
data = self.post_json(self.alarm_url,
|
|
params={"filter":
|
|
'{">": {"state_timestamp": "'
|
|
+ isotime + '"}}'})
|
|
|
|
self.assertEqual(6, len(data.json))
|
|
for alarm in data.json:
|
|
result_time = timeutils.parse_isotime(alarm['state_timestamp'])
|
|
result_time = result_time.replace(tzinfo=None)
|
|
self.assertTrue(result_time > date_time)
|
|
|
|
def test_non_admin_tenant_sees_only_its_own_project(self):
|
|
data = self.post_json(self.alarm_url,
|
|
params={},
|
|
headers=non_admin_header)
|
|
for alarm in data.json:
|
|
self.assertEqual("project-id1", alarm['project_id'])
|
|
|
|
def test_non_admin_tenant_cannot_query_others_project(self):
|
|
data = self.post_json(self.alarm_url,
|
|
params={"filter":
|
|
'{"=": {"project_id": "project-id2"}}'},
|
|
expect_errors=True,
|
|
headers=non_admin_header)
|
|
|
|
self.assertEqual(401, data.status_int)
|
|
self.assertIn("Not Authorized to access project project-id2",
|
|
data.body)
|
|
|
|
def test_non_admin_tenant_can_explicitly_filter_for_own_project(self):
|
|
data = self.post_json(self.alarm_url,
|
|
params={"filter":
|
|
'{"=": {"project_id": "project-id1"}}'},
|
|
headers=non_admin_header)
|
|
|
|
for alarm in data.json:
|
|
self.assertEqual("project-id1", alarm['project_id'])
|
|
|
|
def test_admin_tenant_sees_every_project(self):
|
|
data = self.post_json(self.alarm_url,
|
|
params={},
|
|
headers=admin_header)
|
|
|
|
self.assertEqual(12, len(data.json))
|
|
for alarm in data.json:
|
|
self.assertIn(alarm['project_id'],
|
|
(["project-id1", "project-id2"]))
|
|
|
|
def test_admin_tenant_can_query_any_project(self):
|
|
data = self.post_json(self.alarm_url,
|
|
params={"filter":
|
|
'{"=": {"project_id": "project-id2"}}'},
|
|
headers=admin_header)
|
|
|
|
self.assertEqual(6, len(data.json))
|
|
for alarm in data.json:
|
|
self.assertIn(alarm['project_id'], set(["project-id2"]))
|
|
|
|
def test_query_with_field_project(self):
|
|
data = self.post_json(self.alarm_url,
|
|
params={"filter":
|
|
'{"=": {"project": "project-id2"}}'})
|
|
|
|
self.assertEqual(6, len(data.json))
|
|
for sample_item in data.json:
|
|
self.assertIn(sample_item['project_id'], set(["project-id2"]))
|
|
|
|
def test_query_with_field_user_in_orderby(self):
|
|
data = self.post_json(self.alarm_url,
|
|
params={"filter": '{"=": {"state": "alarm"}}',
|
|
"orderby": '[{"user": "DESC"}]'})
|
|
|
|
self.assertEqual(4, len(data.json))
|
|
self.assertEqual(["user-id2", "user-id2", "user-id1", "user-id1"],
|
|
[s["user_id"] for s in data.json])
|
|
|
|
def test_query_with_filter_orderby_and_limit(self):
|
|
orderby = '[{"state_timestamp": "DESC"}]'
|
|
data = self.post_json(self.alarm_url,
|
|
params={"filter": '{"=": {"state": "alarm"}}',
|
|
"orderby": orderby,
|
|
"limit": 3})
|
|
|
|
self.assertEqual(3, len(data.json))
|
|
self.assertEqual(["2013-02-02T00:00:00",
|
|
"2013-02-02T00:00:00",
|
|
"2013-01-01T00:00:00"],
|
|
[a["state_timestamp"] for a in data.json])
|
|
for alarm in data.json:
|
|
self.assertEqual("alarm", alarm["state"])
|
|
|
|
def test_limit_should_be_positive(self):
|
|
data = self.post_json(self.alarm_url,
|
|
params={"limit": 0},
|
|
expect_errors=True)
|
|
|
|
self.assertEqual(400, data.status_int)
|
|
self.assertIn("Limit should be positive", data.body)
|
|
|
|
|
|
class TestQueryAlarmsHistoryController(
|
|
tests_api.FunctionalTest, tests_db.MixinTestsWithBackendScenarios):
|
|
|
|
def setUp(self):
|
|
super(TestQueryAlarmsHistoryController, self).setUp()
|
|
self.url = '/query/alarms/history'
|
|
for id in [1, 2]:
|
|
for type in ["creation", "state transition"]:
|
|
for date in [datetime.datetime(2013, 1, 1),
|
|
datetime.datetime(2013, 2, 2)]:
|
|
event_id = "-".join([str(id), type, date.isoformat()])
|
|
alarm_change = {"event_id": event_id,
|
|
"alarm_id": "alarm-id%d" % id,
|
|
"type": type,
|
|
"detail": "",
|
|
"user_id": "user-id%d" % id,
|
|
"project_id": "project-id%d" % id,
|
|
"on_behalf_of": "project-id%d" % id,
|
|
"timestamp": date}
|
|
|
|
self.alarm_conn.record_alarm_change(alarm_change)
|
|
|
|
def test_query_all(self):
|
|
data = self.post_json(self.url,
|
|
params={})
|
|
|
|
self.assertEqual(8, len(data.json))
|
|
|
|
def test_filter_with_isotime(self):
|
|
date_time = datetime.datetime(2013, 1, 1)
|
|
isotime = date_time.isoformat()
|
|
|
|
data = self.post_json(self.url,
|
|
params={"filter":
|
|
'{">": {"timestamp":"'
|
|
+ isotime + '"}}'})
|
|
|
|
self.assertEqual(4, len(data.json))
|
|
for history in data.json:
|
|
result_time = timeutils.parse_isotime(history['timestamp'])
|
|
result_time = result_time.replace(tzinfo=None)
|
|
self.assertTrue(result_time > date_time)
|
|
|
|
def test_non_admin_tenant_sees_only_its_own_project(self):
|
|
data = self.post_json(self.url,
|
|
params={},
|
|
headers=non_admin_header)
|
|
for history in data.json:
|
|
self.assertEqual("project-id1", history['on_behalf_of'])
|
|
|
|
def test_non_admin_tenant_cannot_query_others_project(self):
|
|
data = self.post_json(self.url,
|
|
params={"filter":
|
|
'{"=": {"on_behalf_of":'
|
|
+ ' "project-id2"}}'},
|
|
expect_errors=True,
|
|
headers=non_admin_header)
|
|
|
|
self.assertEqual(401, data.status_int)
|
|
self.assertIn("Not Authorized to access project project-id2",
|
|
data.body)
|
|
|
|
def test_non_admin_tenant_can_explicitly_filter_for_own_project(self):
|
|
data = self.post_json(self.url,
|
|
params={"filter":
|
|
'{"=": {"on_behalf_of":'
|
|
+ ' "project-id1"}}'},
|
|
headers=non_admin_header)
|
|
|
|
for history in data.json:
|
|
self.assertEqual("project-id1", history['on_behalf_of'])
|
|
|
|
def test_admin_tenant_sees_every_project(self):
|
|
data = self.post_json(self.url,
|
|
params={},
|
|
headers=admin_header)
|
|
|
|
self.assertEqual(8, len(data.json))
|
|
for history in data.json:
|
|
self.assertIn(history['on_behalf_of'],
|
|
(["project-id1", "project-id2"]))
|
|
|
|
def test_query_with_filter_for_project_orderby_with_user(self):
|
|
data = self.post_json(self.url,
|
|
params={"filter":
|
|
'{"=": {"project": "project-id1"}}',
|
|
"orderby": '[{"user": "DESC"}]',
|
|
"limit": 3})
|
|
|
|
self.assertEqual(3, len(data.json))
|
|
self.assertEqual(["user-id1",
|
|
"user-id1",
|
|
"user-id1"],
|
|
[h["user_id"] for h in data.json])
|
|
for history in data.json:
|
|
self.assertEqual("project-id1", history['project_id'])
|
|
|
|
def test_query_with_filter_orderby_and_limit(self):
|
|
data = self.post_json(self.url,
|
|
params={"filter": '{"=": {"type": "creation"}}',
|
|
"orderby": '[{"timestamp": "DESC"}]',
|
|
"limit": 3})
|
|
|
|
self.assertEqual(3, len(data.json))
|
|
self.assertEqual(["2013-02-02T00:00:00",
|
|
"2013-02-02T00:00:00",
|
|
"2013-01-01T00:00:00"],
|
|
[h["timestamp"] for h in data.json])
|
|
for history in data.json:
|
|
self.assertEqual("creation", history['type'])
|
|
|
|
def test_limit_should_be_positive(self):
|
|
data = self.post_json(self.url,
|
|
params={"limit": 0},
|
|
expect_errors=True)
|
|
|
|
self.assertEqual(400, data.status_int)
|
|
self.assertIn("Limit should be positive", data.body)
|