5ad8241f98
Change-Id: I70349b9a3d66e50bd096422594bfe97f8fa15500 Partially-Implements: blueprint neutron-routed-networks
919 lines
32 KiB
Python
919 lines
32 KiB
Python
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
from aodhclient import exceptions as aodh_exc
|
|
from ceilometerclient import exc as ceil_exc
|
|
from cinderclient import exceptions as cinder_exc
|
|
from glanceclient import exc as glance_exc
|
|
from heatclient import client as heatclient
|
|
from heatclient import exc as heat_exc
|
|
from keystoneauth1 import exceptions as keystone_exc
|
|
from keystoneauth1.identity import generic
|
|
from manilaclient import exceptions as manila_exc
|
|
import mock
|
|
from neutronclient.common import exceptions as neutron_exc
|
|
from openstack import exceptions
|
|
from oslo_config import cfg
|
|
from saharaclient.api import base as sahara_base
|
|
import six
|
|
from swiftclient import exceptions as swift_exc
|
|
from testtools import testcase
|
|
from troveclient import client as troveclient
|
|
from zaqarclient.transport import errors as zaqar_exc
|
|
|
|
from heat.common import exception
|
|
from heat.engine import clients
|
|
from heat.engine.clients import client_exception
|
|
from heat.engine.clients import client_plugin
|
|
from heat.tests import common
|
|
from heat.tests import fakes
|
|
from heat.tests.openstack.nova import fakes as fakes_nova
|
|
|
|
|
|
class ClientsTest(common.HeatTestCase):
|
|
|
|
def test_bad_cloud_backend(self):
|
|
con = mock.Mock()
|
|
cfg.CONF.set_override('cloud_backend', 'some.weird.object',
|
|
enforce_type=True)
|
|
exc = self.assertRaises(exception.Invalid, clients.Clients, con)
|
|
self.assertIn('Invalid cloud_backend setting in heat.conf detected',
|
|
six.text_type(exc))
|
|
|
|
cfg.CONF.set_override('cloud_backend', 'heat.engine.clients.Clients',
|
|
enforce_type=True)
|
|
exc = self.assertRaises(exception.Invalid, clients.Clients, con)
|
|
self.assertIn('Invalid cloud_backend setting in heat.conf detected',
|
|
six.text_type(exc))
|
|
|
|
def test_clients_get_heat_url(self):
|
|
con = mock.Mock()
|
|
con.tenant_id = "b363706f891f48019483f8bd6503c54b"
|
|
c = clients.Clients(con)
|
|
con.clients = c
|
|
|
|
obj = c.client_plugin('heat')
|
|
obj._get_client_option = mock.Mock()
|
|
obj._get_client_option.return_value = None
|
|
obj.url_for = mock.Mock(name="url_for")
|
|
obj.url_for.return_value = "url_from_keystone"
|
|
self.assertEqual("url_from_keystone", obj.get_heat_url())
|
|
heat_url = "http://0.0.0.0:8004/v1/%(tenant_id)s"
|
|
obj._get_client_option.return_value = heat_url
|
|
tenant_id = "b363706f891f48019483f8bd6503c54b"
|
|
result = heat_url % {"tenant_id": tenant_id}
|
|
self.assertEqual(result, obj.get_heat_url())
|
|
obj._get_client_option.return_value = result
|
|
self.assertEqual(result, obj.get_heat_url())
|
|
|
|
def _client_cfn_url(self):
|
|
con = mock.Mock()
|
|
c = clients.Clients(con)
|
|
con.clients = c
|
|
obj = c.client_plugin('heat')
|
|
obj._get_client_option = mock.Mock()
|
|
obj._get_client_option.return_value = None
|
|
obj.url_for = mock.Mock(name="url_for")
|
|
obj.url_for.return_value = "http://0.0.0.0:8000/v1/"
|
|
return obj
|
|
|
|
def test_clients_get_heat_cfn_url(self):
|
|
obj = self._client_cfn_url()
|
|
self.assertEqual("http://0.0.0.0:8000/v1/", obj.get_heat_cfn_url())
|
|
|
|
def test_clients_get_watch_server_url(self):
|
|
obj = self._client_cfn_url()
|
|
self.assertEqual("http://0.0.0.0:8003/v1/", obj.get_watch_server_url())
|
|
|
|
def test_clients_get_heat_cfn_metadata_url(self):
|
|
obj = self._client_cfn_url()
|
|
self.assertEqual("http://0.0.0.0:8000/v1/",
|
|
obj.get_cfn_metadata_server_url())
|
|
|
|
def test_clients_get_heat_cfn_metadata_url_conf(self):
|
|
cfg.CONF.set_override('heat_metadata_server_url',
|
|
'http://server.test:123', enforce_type=True)
|
|
obj = self._client_cfn_url()
|
|
self.assertEqual("http://server.test:123/v1/",
|
|
obj.get_cfn_metadata_server_url())
|
|
|
|
@mock.patch.object(heatclient, 'Client')
|
|
def test_clients_heat(self, mock_call):
|
|
self.stub_keystoneclient()
|
|
con = mock.Mock()
|
|
con.auth_url = "http://auth.example.com:5000/v2.0"
|
|
con.tenant_id = "b363706f891f48019483f8bd6503c54b"
|
|
con.auth_token = "3bcc3d3a03f44e3d8377f9247b0ad155"
|
|
c = clients.Clients(con)
|
|
con.clients = c
|
|
|
|
obj = c.client_plugin('heat')
|
|
obj.url_for = mock.Mock(name="url_for")
|
|
obj.url_for.return_value = "url_from_keystone"
|
|
obj.client()
|
|
self.assertEqual('url_from_keystone', obj.get_heat_url())
|
|
|
|
@mock.patch.object(heatclient, 'Client')
|
|
def test_clients_heat_no_auth_token(self, mock_call):
|
|
con = mock.Mock()
|
|
con.auth_url = "http://auth.example.com:5000/v2.0"
|
|
con.tenant_id = "b363706f891f48019483f8bd6503c54b"
|
|
con.auth_token = None
|
|
con.auth_plugin = fakes.FakeAuth(auth_token='anewtoken')
|
|
c = clients.Clients(con)
|
|
con.clients = c
|
|
|
|
obj = c.client_plugin('heat')
|
|
obj.url_for = mock.Mock(name="url_for")
|
|
obj.url_for.return_value = "url_from_keystone"
|
|
self.assertEqual('url_from_keystone', obj.get_heat_url())
|
|
|
|
@mock.patch.object(heatclient, 'Client')
|
|
def test_clients_heat_cached(self, mock_call):
|
|
self.stub_auth()
|
|
con = mock.Mock()
|
|
con.auth_url = "http://auth.example.com:5000/v2.0"
|
|
con.tenant_id = "b363706f891f48019483f8bd6503c54b"
|
|
con.auth_token = "3bcc3d3a03f44e3d8377f9247b0ad155"
|
|
con.trust_id = None
|
|
c = clients.Clients(con)
|
|
con.clients = c
|
|
|
|
obj = c.client_plugin('heat')
|
|
obj.get_heat_url = mock.Mock(name="get_heat_url")
|
|
obj.get_heat_url.return_value = None
|
|
obj.url_for = mock.Mock(name="url_for")
|
|
obj.url_for.return_value = "url_from_keystone"
|
|
heat = obj.client()
|
|
heat_cached = obj.client()
|
|
self.assertEqual(heat, heat_cached)
|
|
|
|
|
|
class FooClientsPlugin(client_plugin.ClientPlugin):
|
|
|
|
def _create(self):
|
|
pass
|
|
|
|
@property
|
|
def auth_token(self):
|
|
return '5678'
|
|
|
|
|
|
class ClientPluginTest(common.HeatTestCase):
|
|
|
|
def test_get_client_option(self):
|
|
con = mock.Mock()
|
|
con.auth_url = "http://auth.example.com:5000/v2.0"
|
|
con.tenant_id = "b363706f891f48019483f8bd6503c54b"
|
|
con.auth_token = "3bcc3d3a03f44e3d8377f9247b0ad155"
|
|
c = clients.Clients(con)
|
|
con.clients = c
|
|
|
|
plugin = FooClientsPlugin(con)
|
|
|
|
cfg.CONF.set_override('ca_file', '/tmp/bar',
|
|
group='clients_heat', enforce_type=True)
|
|
cfg.CONF.set_override('ca_file', '/tmp/foo',
|
|
group='clients', enforce_type=True)
|
|
cfg.CONF.set_override('endpoint_type', 'internalURL',
|
|
group='clients', enforce_type=True)
|
|
|
|
# check heat group
|
|
self.assertEqual('/tmp/bar',
|
|
plugin._get_client_option('heat', 'ca_file'))
|
|
|
|
# check fallback clients group for known client
|
|
self.assertEqual('internalURL',
|
|
plugin._get_client_option('glance', 'endpoint_type'))
|
|
|
|
# check fallback clients group for unknown client foo
|
|
self.assertEqual('/tmp/foo',
|
|
plugin._get_client_option('foo', 'ca_file'))
|
|
|
|
def test_auth_token(self):
|
|
con = mock.Mock()
|
|
con.auth_token = "1234"
|
|
con.trust_id = None
|
|
|
|
c = clients.Clients(con)
|
|
con.clients = c
|
|
|
|
plugin = FooClientsPlugin(con)
|
|
|
|
# assert token is from plugin rather than context
|
|
# even though both are set
|
|
self.assertEqual('5678', plugin.auth_token)
|
|
|
|
def test_url_for(self):
|
|
con = mock.Mock()
|
|
con.auth_token = "1234"
|
|
con.trust_id = None
|
|
|
|
c = clients.Clients(con)
|
|
con.clients = c
|
|
|
|
con.keystone_session = mock.Mock(name="keystone_Session")
|
|
con.keystone_session.get_endpoint = mock.Mock(name="get_endpoint")
|
|
con.keystone_session.get_endpoint.return_value = 'http://192.0.2.1/foo'
|
|
plugin = FooClientsPlugin(con)
|
|
|
|
self.assertEqual('http://192.0.2.1/foo',
|
|
plugin.url_for(service_type='foo'))
|
|
self.assertTrue(con.keystone_session.get_endpoint.called)
|
|
|
|
@mock.patch.object(generic, "Token", name="v3_token")
|
|
def test_get_missing_service_catalog(self, mock_v3):
|
|
class FakeKeystone(fakes.FakeKeystoneClient):
|
|
def __init__(self):
|
|
super(FakeKeystone, self).__init__()
|
|
self.client = self
|
|
self.version = 'v3'
|
|
|
|
self.stub_keystoneclient(fake_client=FakeKeystone())
|
|
con = mock.MagicMock(auth_token="1234", trust_id=None)
|
|
c = clients.Clients(con)
|
|
con.clients = c
|
|
|
|
con.keystone_session = mock.Mock(name="keystone_session")
|
|
get_endpoint_side_effects = [
|
|
keystone_exc.EmptyCatalog(), None, 'http://192.0.2.1/bar']
|
|
con.keystone_session.get_endpoint = mock.Mock(
|
|
name="get_endpoint", side_effect=get_endpoint_side_effects)
|
|
|
|
mock_token_obj = mock.Mock()
|
|
mock_token_obj.get_auth_ref.return_value = {'catalog': 'foo'}
|
|
mock_v3.return_value = mock_token_obj
|
|
|
|
plugin = FooClientsPlugin(con)
|
|
|
|
self.assertEqual('http://192.0.2.1/bar',
|
|
plugin.url_for(service_type='bar'))
|
|
|
|
@mock.patch.object(generic, "Token", name="v3_token")
|
|
def test_endpoint_not_found(self, mock_v3):
|
|
class FakeKeystone(fakes.FakeKeystoneClient):
|
|
def __init__(self):
|
|
super(FakeKeystone, self).__init__()
|
|
self.client = self
|
|
self.version = 'v3'
|
|
|
|
self.stub_keystoneclient(fake_client=FakeKeystone())
|
|
con = mock.MagicMock(auth_token="1234", trust_id=None)
|
|
c = clients.Clients(con)
|
|
con.clients = c
|
|
|
|
con.keystone_session = mock.Mock(name="keystone_session")
|
|
get_endpoint_side_effects = [keystone_exc.EmptyCatalog(), None]
|
|
con.keystone_session.get_endpoint = mock.Mock(
|
|
name="get_endpoint", side_effect=get_endpoint_side_effects)
|
|
|
|
mock_token_obj = mock.Mock()
|
|
mock_v3.return_value = mock_token_obj
|
|
mock_access = mock.Mock()
|
|
self.patchobject(mock_token_obj, 'get_access',
|
|
return_value=mock_access)
|
|
self.patchobject(mock_access, 'has_service_catalog',
|
|
return_value=False)
|
|
plugin = FooClientsPlugin(con)
|
|
|
|
self.assertRaises(keystone_exc.EndpointNotFound,
|
|
plugin.url_for, service_type='nonexistent')
|
|
|
|
def test_abstract_create(self):
|
|
con = mock.Mock()
|
|
c = clients.Clients(con)
|
|
con.clients = c
|
|
|
|
self.assertRaises(TypeError, client_plugin.ClientPlugin, c)
|
|
|
|
|
|
class TestClientPluginsInitialise(common.HeatTestCase):
|
|
|
|
@testcase.skip('skipped until keystone can read context auth_ref')
|
|
def test_create_all_clients(self):
|
|
con = mock.Mock()
|
|
con.auth_url = "http://auth.example.com:5000/v2.0"
|
|
con.tenant_id = "b363706f891f48019483f8bd6503c54b"
|
|
con.auth_token = "3bcc3d3a03f44e3d8377f9247b0ad155"
|
|
c = clients.Clients(con)
|
|
con.clients = c
|
|
|
|
for plugin_name in clients._mgr.names():
|
|
self.assertTrue(clients.has_client(plugin_name))
|
|
c.client(plugin_name)
|
|
|
|
def test_create_all_client_plugins(self):
|
|
plugin_types = clients._mgr.names()
|
|
self.assertIsNotNone(plugin_types)
|
|
|
|
con = mock.Mock()
|
|
c = clients.Clients(con)
|
|
con.clients = c
|
|
|
|
for plugin_name in plugin_types:
|
|
plugin = c.client_plugin(plugin_name)
|
|
self.assertIsNotNone(plugin)
|
|
self.assertEqual(c, plugin.clients)
|
|
self.assertEqual(con, plugin.context)
|
|
self.assertEqual({}, plugin._client_instances)
|
|
self.assertTrue(clients.has_client(plugin_name))
|
|
self.assertIsInstance(plugin.service_types, list)
|
|
self.assertGreaterEqual(len(plugin.service_types), 1,
|
|
'service_types is not defined for plugin')
|
|
|
|
|
|
class TestIsNotFound(common.HeatTestCase):
|
|
|
|
scenarios = [
|
|
('ceilometer_not_found', dict(
|
|
is_not_found=True,
|
|
is_over_limit=False,
|
|
is_client_exception=True,
|
|
is_conflict=False,
|
|
plugin='ceilometer',
|
|
exception=lambda: ceil_exc.HTTPNotFound(details='gone'),
|
|
)),
|
|
('ceilometer_exception', dict(
|
|
is_not_found=False,
|
|
is_over_limit=False,
|
|
is_client_exception=False,
|
|
is_conflict=False,
|
|
plugin='ceilometer',
|
|
exception=lambda: Exception()
|
|
)),
|
|
('ceilometer_overlimit', dict(
|
|
is_not_found=False,
|
|
is_over_limit=True,
|
|
is_client_exception=True,
|
|
is_conflict=False,
|
|
plugin='ceilometer',
|
|
exception=lambda: ceil_exc.HTTPOverLimit(details='over'),
|
|
)),
|
|
('ceilometer_conflict', dict(
|
|
is_not_found=False,
|
|
is_over_limit=False,
|
|
is_client_exception=True,
|
|
is_conflict=True,
|
|
plugin='ceilometer',
|
|
exception=lambda: ceil_exc.HTTPConflict(),
|
|
)),
|
|
('aodh_not_found', dict(
|
|
is_not_found=True,
|
|
is_over_limit=False,
|
|
is_client_exception=True,
|
|
is_conflict=False,
|
|
plugin='aodh',
|
|
exception=lambda: aodh_exc.NotFound('not found'),
|
|
)),
|
|
('aodh_overlimit', dict(
|
|
is_not_found=False,
|
|
is_over_limit=True,
|
|
is_client_exception=True,
|
|
is_conflict=False,
|
|
plugin='aodh',
|
|
exception=lambda: aodh_exc.OverLimit('over'),
|
|
)),
|
|
('aodh_conflict', dict(
|
|
is_not_found=False,
|
|
is_over_limit=False,
|
|
is_client_exception=True,
|
|
is_conflict=True,
|
|
plugin='aodh',
|
|
exception=lambda: aodh_exc.Conflict('conflict'),
|
|
)),
|
|
('cinder_not_found', dict(
|
|
is_not_found=True,
|
|
is_over_limit=False,
|
|
is_client_exception=True,
|
|
is_conflict=False,
|
|
plugin='cinder',
|
|
exception=lambda: cinder_exc.NotFound(code=404),
|
|
)),
|
|
('cinder_exception', dict(
|
|
is_not_found=False,
|
|
is_over_limit=False,
|
|
is_client_exception=False,
|
|
is_conflict=False,
|
|
plugin='cinder',
|
|
exception=lambda: Exception()
|
|
)),
|
|
('cinder_overlimit', dict(
|
|
is_not_found=False,
|
|
is_over_limit=True,
|
|
is_client_exception=True,
|
|
is_conflict=False,
|
|
plugin='cinder',
|
|
exception=lambda: cinder_exc.OverLimit(code=413),
|
|
)),
|
|
('cinder_conflict', dict(
|
|
is_not_found=False,
|
|
is_over_limit=False,
|
|
is_client_exception=True,
|
|
is_conflict=True,
|
|
plugin='cinder',
|
|
exception=lambda: cinder_exc.ClientException(
|
|
code=409, message='conflict'),
|
|
)),
|
|
('glance_not_found_1', dict(
|
|
is_not_found=True,
|
|
is_over_limit=False,
|
|
is_client_exception=True,
|
|
is_conflict=False,
|
|
plugin='glance',
|
|
exception=lambda: client_exception.EntityMatchNotFound(),
|
|
)),
|
|
('glance_not_found_2', dict(
|
|
is_not_found=True,
|
|
is_over_limit=False,
|
|
is_client_exception=True,
|
|
is_conflict=False,
|
|
plugin='glance',
|
|
exception=lambda: glance_exc.HTTPNotFound(),
|
|
)),
|
|
('glance_exception', dict(
|
|
is_not_found=False,
|
|
is_over_limit=False,
|
|
is_client_exception=False,
|
|
is_conflict=False,
|
|
plugin='glance',
|
|
exception=lambda: Exception()
|
|
)),
|
|
('glance_overlimit', dict(
|
|
is_not_found=False,
|
|
is_over_limit=True,
|
|
is_client_exception=True,
|
|
is_conflict=False,
|
|
plugin='glance',
|
|
exception=lambda: glance_exc.HTTPOverLimit(details='over'),
|
|
)),
|
|
('glance_conflict_1', dict(
|
|
is_not_found=False,
|
|
is_over_limit=False,
|
|
is_client_exception=True,
|
|
is_conflict=True,
|
|
plugin='glance',
|
|
exception=lambda: glance_exc.Conflict(),
|
|
)),
|
|
('heat_not_found', dict(
|
|
is_not_found=True,
|
|
is_over_limit=False,
|
|
is_client_exception=True,
|
|
is_conflict=False,
|
|
plugin='heat',
|
|
exception=lambda: heat_exc.HTTPNotFound(message='gone'),
|
|
)),
|
|
('heat_exception', dict(
|
|
is_not_found=False,
|
|
is_over_limit=False,
|
|
is_client_exception=False,
|
|
is_conflict=False,
|
|
plugin='heat',
|
|
exception=lambda: Exception()
|
|
)),
|
|
('heat_overlimit', dict(
|
|
is_not_found=False,
|
|
is_over_limit=True,
|
|
is_client_exception=True,
|
|
is_conflict=False,
|
|
plugin='heat',
|
|
exception=lambda: heat_exc.HTTPOverLimit(message='over'),
|
|
)),
|
|
('heat_conflict', dict(
|
|
is_not_found=False,
|
|
is_over_limit=False,
|
|
is_client_exception=True,
|
|
is_conflict=True,
|
|
plugin='heat',
|
|
exception=lambda: heat_exc.HTTPConflict(),
|
|
)),
|
|
('keystone_not_found', dict(
|
|
is_not_found=True,
|
|
is_over_limit=False,
|
|
is_client_exception=True,
|
|
is_conflict=False,
|
|
plugin='keystone',
|
|
exception=lambda: keystone_exc.NotFound(details='gone'),
|
|
)),
|
|
('keystone_entity_not_found', dict(
|
|
is_not_found=True,
|
|
is_over_limit=False,
|
|
is_client_exception=True,
|
|
is_conflict=False,
|
|
plugin='keystone',
|
|
exception=lambda: exception.EntityNotFound(),
|
|
)),
|
|
('keystone_exception', dict(
|
|
is_not_found=False,
|
|
is_over_limit=False,
|
|
is_client_exception=False,
|
|
is_conflict=False,
|
|
plugin='keystone',
|
|
exception=lambda: Exception()
|
|
)),
|
|
('keystone_overlimit', dict(
|
|
is_not_found=False,
|
|
is_over_limit=True,
|
|
is_client_exception=True,
|
|
is_conflict=False,
|
|
plugin='keystone',
|
|
exception=lambda: keystone_exc.RequestEntityTooLarge(
|
|
details='over'),
|
|
)),
|
|
('keystone_conflict', dict(
|
|
is_not_found=False,
|
|
is_over_limit=False,
|
|
is_client_exception=True,
|
|
is_conflict=True,
|
|
plugin='keystone',
|
|
exception=lambda: keystone_exc.Conflict(
|
|
message='Conflict'),
|
|
)),
|
|
('neutron_not_found', dict(
|
|
is_not_found=True,
|
|
is_over_limit=False,
|
|
is_client_exception=True,
|
|
is_conflict=False,
|
|
plugin='neutron',
|
|
exception=lambda: neutron_exc.NotFound,
|
|
)),
|
|
('neutron_network_not_found', dict(
|
|
is_not_found=True,
|
|
is_over_limit=False,
|
|
is_client_exception=True,
|
|
is_conflict=False,
|
|
plugin='neutron',
|
|
exception=lambda: neutron_exc.NetworkNotFoundClient(),
|
|
)),
|
|
('neutron_port_not_found', dict(
|
|
is_not_found=True,
|
|
is_over_limit=False,
|
|
is_client_exception=True,
|
|
is_conflict=False,
|
|
plugin='neutron',
|
|
exception=lambda: neutron_exc.PortNotFoundClient(),
|
|
)),
|
|
('neutron_status_not_found', dict(
|
|
is_not_found=True,
|
|
is_over_limit=False,
|
|
is_client_exception=True,
|
|
is_conflict=False,
|
|
plugin='neutron',
|
|
exception=lambda: neutron_exc.NeutronClientException(
|
|
status_code=404),
|
|
)),
|
|
('neutron_exception', dict(
|
|
is_not_found=False,
|
|
is_over_limit=False,
|
|
is_client_exception=False,
|
|
is_conflict=False,
|
|
plugin='neutron',
|
|
exception=lambda: Exception()
|
|
)),
|
|
('neutron_overlimit', dict(
|
|
is_not_found=False,
|
|
is_over_limit=True,
|
|
is_client_exception=True,
|
|
is_conflict=False,
|
|
plugin='neutron',
|
|
exception=lambda: neutron_exc.NeutronClientException(
|
|
status_code=413),
|
|
)),
|
|
('neutron_conflict', dict(
|
|
is_not_found=False,
|
|
is_over_limit=False,
|
|
is_client_exception=True,
|
|
is_conflict=True,
|
|
plugin='neutron',
|
|
exception=lambda: neutron_exc.Conflict(),
|
|
)),
|
|
('nova_not_found', dict(
|
|
is_not_found=True,
|
|
is_over_limit=False,
|
|
is_client_exception=True,
|
|
is_conflict=False,
|
|
is_unprocessable_entity=False,
|
|
plugin='nova',
|
|
exception=lambda: fakes_nova.fake_exception(),
|
|
)),
|
|
('nova_exception', dict(
|
|
is_not_found=False,
|
|
is_over_limit=False,
|
|
is_client_exception=False,
|
|
is_conflict=False,
|
|
is_unprocessable_entity=False,
|
|
plugin='nova',
|
|
exception=lambda: Exception()
|
|
)),
|
|
('nova_overlimit', dict(
|
|
is_not_found=False,
|
|
is_over_limit=True,
|
|
is_client_exception=True,
|
|
is_conflict=False,
|
|
is_unprocessable_entity=False,
|
|
plugin='nova',
|
|
exception=lambda: fakes_nova.fake_exception(413),
|
|
)),
|
|
('nova_unprocessable_entity', dict(
|
|
is_not_found=False,
|
|
is_over_limit=False,
|
|
is_client_exception=True,
|
|
is_conflict=False,
|
|
is_unprocessable_entity=True,
|
|
plugin='nova',
|
|
exception=lambda: fakes_nova.fake_exception(422),
|
|
)),
|
|
('nova_conflict', dict(
|
|
is_not_found=False,
|
|
is_over_limit=False,
|
|
is_client_exception=True,
|
|
is_conflict=True,
|
|
is_unprocessable_entity=False,
|
|
plugin='nova',
|
|
exception=lambda: fakes_nova.fake_exception(409),
|
|
)),
|
|
('openstack_not_found', dict(
|
|
is_not_found=True,
|
|
is_over_limit=False,
|
|
is_client_exception=True,
|
|
is_conflict=False,
|
|
is_unprocessable_entity=False,
|
|
plugin='openstack',
|
|
exception=lambda: exceptions.ResourceNotFound,
|
|
)),
|
|
('swift_not_found', dict(
|
|
is_not_found=True,
|
|
is_over_limit=False,
|
|
is_client_exception=True,
|
|
is_conflict=False,
|
|
plugin='swift',
|
|
exception=lambda: swift_exc.ClientException(
|
|
msg='gone', http_status=404),
|
|
)),
|
|
('swift_exception', dict(
|
|
is_not_found=False,
|
|
is_over_limit=False,
|
|
is_client_exception=False,
|
|
is_conflict=False,
|
|
plugin='swift',
|
|
exception=lambda: Exception()
|
|
)),
|
|
('swift_overlimit', dict(
|
|
is_not_found=False,
|
|
is_over_limit=True,
|
|
is_client_exception=True,
|
|
is_conflict=False,
|
|
plugin='swift',
|
|
exception=lambda: swift_exc.ClientException(
|
|
msg='ouch', http_status=413),
|
|
)),
|
|
('swift_conflict', dict(
|
|
is_not_found=False,
|
|
is_over_limit=False,
|
|
is_client_exception=True,
|
|
is_conflict=True,
|
|
plugin='swift',
|
|
exception=lambda: swift_exc.ClientException(
|
|
msg='conflict', http_status=409),
|
|
)),
|
|
('trove_not_found', dict(
|
|
is_not_found=True,
|
|
is_over_limit=False,
|
|
is_client_exception=True,
|
|
is_conflict=False,
|
|
plugin='trove',
|
|
exception=lambda: troveclient.exceptions.NotFound(message='gone'),
|
|
)),
|
|
('trove_exception', dict(
|
|
is_not_found=False,
|
|
is_over_limit=False,
|
|
is_client_exception=False,
|
|
is_conflict=False,
|
|
plugin='trove',
|
|
exception=lambda: Exception()
|
|
)),
|
|
('trove_overlimit', dict(
|
|
is_not_found=False,
|
|
is_over_limit=True,
|
|
is_client_exception=True,
|
|
is_conflict=False,
|
|
plugin='trove',
|
|
exception=lambda: troveclient.exceptions.RequestEntityTooLarge(
|
|
message='over'),
|
|
)),
|
|
('trove_conflict', dict(
|
|
is_not_found=False,
|
|
is_over_limit=False,
|
|
is_client_exception=True,
|
|
is_conflict=True,
|
|
plugin='trove',
|
|
exception=lambda: troveclient.exceptions.Conflict(
|
|
message='Conflict'),
|
|
)),
|
|
('sahara_not_found', dict(
|
|
is_not_found=True,
|
|
is_over_limit=False,
|
|
is_client_exception=True,
|
|
is_conflict=False,
|
|
plugin='sahara',
|
|
exception=lambda: sahara_base.APIException(
|
|
error_message='gone1', error_code=404),
|
|
)),
|
|
('sahara_exception', dict(
|
|
is_not_found=False,
|
|
is_over_limit=False,
|
|
is_client_exception=False,
|
|
is_conflict=False,
|
|
plugin='sahara',
|
|
exception=lambda: Exception()
|
|
)),
|
|
('sahara_overlimit', dict(
|
|
is_not_found=False,
|
|
is_over_limit=True,
|
|
is_client_exception=True,
|
|
is_conflict=False,
|
|
plugin='sahara',
|
|
exception=lambda: sahara_base.APIException(
|
|
error_message='over1', error_code=413),
|
|
)),
|
|
('sahara_conflict', dict(
|
|
is_not_found=False,
|
|
is_over_limit=False,
|
|
is_client_exception=True,
|
|
is_conflict=True,
|
|
plugin='sahara',
|
|
exception=lambda: sahara_base.APIException(
|
|
error_message='conflict1', error_code=409),
|
|
)),
|
|
('zaqar_not_found', dict(
|
|
is_not_found=True,
|
|
is_over_limit=False,
|
|
is_client_exception=True,
|
|
is_conflict=False,
|
|
plugin='zaqar',
|
|
exception=lambda: zaqar_exc.ResourceNotFound(),
|
|
)),
|
|
('manila_not_found', dict(
|
|
is_not_found=True,
|
|
is_over_limit=False,
|
|
is_client_exception=True,
|
|
is_conflict=False,
|
|
plugin='manila',
|
|
exception=lambda: manila_exc.NotFound(),
|
|
)),
|
|
('manila_exception', dict(
|
|
is_not_found=False,
|
|
is_over_limit=False,
|
|
is_client_exception=False,
|
|
is_conflict=False,
|
|
plugin='manila',
|
|
exception=lambda: Exception()
|
|
)),
|
|
('manila_overlimit', dict(
|
|
is_not_found=False,
|
|
is_over_limit=True,
|
|
is_client_exception=True,
|
|
is_conflict=False,
|
|
plugin='manila',
|
|
exception=lambda: manila_exc.RequestEntityTooLarge(),
|
|
)),
|
|
('manila_conflict', dict(
|
|
is_not_found=False,
|
|
is_over_limit=False,
|
|
is_client_exception=True,
|
|
is_conflict=True,
|
|
plugin='manila',
|
|
exception=lambda: manila_exc.Conflict(),
|
|
)),
|
|
]
|
|
|
|
def test_is_not_found(self):
|
|
con = mock.Mock()
|
|
c = clients.Clients(con)
|
|
client_plugin = c.client_plugin(self.plugin)
|
|
try:
|
|
raise self.exception()
|
|
except Exception as e:
|
|
if self.is_not_found != client_plugin.is_not_found(e):
|
|
raise
|
|
|
|
def test_ignore_not_found(self):
|
|
con = mock.Mock()
|
|
c = clients.Clients(con)
|
|
client_plugin = c.client_plugin(self.plugin)
|
|
try:
|
|
exp = self.exception()
|
|
exp_class = exp.__class__
|
|
raise exp
|
|
except Exception as e:
|
|
if self.is_not_found:
|
|
client_plugin.ignore_not_found(e)
|
|
else:
|
|
self.assertRaises(exp_class,
|
|
client_plugin.ignore_not_found,
|
|
e)
|
|
|
|
def test_ignore_not_found_context_manager(self):
|
|
con = mock.Mock()
|
|
c = clients.Clients(con)
|
|
client_plugin = c.client_plugin(self.plugin)
|
|
|
|
exp = self.exception()
|
|
exp_class = exp.__class__
|
|
|
|
def try_raise():
|
|
with client_plugin.ignore_not_found:
|
|
raise exp
|
|
|
|
if self.is_not_found:
|
|
try_raise()
|
|
else:
|
|
self.assertRaises(exp_class, try_raise)
|
|
|
|
def test_ignore_conflict_and_not_found(self):
|
|
con = mock.Mock()
|
|
c = clients.Clients(con)
|
|
client_plugin = c.client_plugin(self.plugin)
|
|
try:
|
|
exp = self.exception()
|
|
exp_class = exp.__class__
|
|
raise exp
|
|
except Exception as e:
|
|
if self.is_conflict or self.is_not_found:
|
|
client_plugin.ignore_conflict_and_not_found(e)
|
|
else:
|
|
self.assertRaises(exp_class,
|
|
client_plugin.ignore_conflict_and_not_found,
|
|
e)
|
|
|
|
def test_ignore_conflict_and_not_found_context_manager(self):
|
|
con = mock.Mock()
|
|
c = clients.Clients(con)
|
|
client_plugin = c.client_plugin(self.plugin)
|
|
|
|
exp = self.exception()
|
|
exp_class = exp.__class__
|
|
|
|
def try_raise():
|
|
with client_plugin.ignore_conflict_and_not_found:
|
|
raise exp
|
|
|
|
if self.is_conflict or self.is_not_found:
|
|
try_raise()
|
|
else:
|
|
self.assertRaises(exp_class, try_raise)
|
|
|
|
def test_is_over_limit(self):
|
|
con = mock.Mock()
|
|
c = clients.Clients(con)
|
|
client_plugin = c.client_plugin(self.plugin)
|
|
try:
|
|
raise self.exception()
|
|
except Exception as e:
|
|
if self.is_over_limit != client_plugin.is_over_limit(e):
|
|
raise
|
|
|
|
def test_is_client_exception(self):
|
|
con = mock.Mock()
|
|
c = clients.Clients(con)
|
|
client_plugin = c.client_plugin(self.plugin)
|
|
try:
|
|
raise self.exception()
|
|
except Exception as e:
|
|
ice = self.is_client_exception
|
|
actual = client_plugin.is_client_exception(e)
|
|
if ice != actual:
|
|
raise
|
|
|
|
def test_is_conflict(self):
|
|
con = mock.Mock()
|
|
c = clients.Clients(con)
|
|
client_plugin = c.client_plugin(self.plugin)
|
|
try:
|
|
raise self.exception()
|
|
except Exception as e:
|
|
if self.is_conflict != client_plugin.is_conflict(e):
|
|
raise
|
|
|
|
def test_is_unprocessable_entity(self):
|
|
con = mock.Mock()
|
|
c = clients.Clients(con)
|
|
# only 'nova' client plugin need to check this exception
|
|
if self.plugin == 'nova':
|
|
client_plugin = c.client_plugin(self.plugin)
|
|
try:
|
|
raise self.exception()
|
|
except Exception as e:
|
|
iue = self.is_unprocessable_entity
|
|
if iue != client_plugin.is_unprocessable_entity(e):
|
|
raise
|