09798caae1
Make use of the Tempest plugin interface instead of copying Manila files into Tempest. This will remove the burden to port Manila tests onto Tempest master recurrently. This ports all existing Manila Tempest test to the new structure. It uses manila_tempest_tests as new top folder for all Tempest tests. It follow the model of Heat (see [1]). [1]: https://github.com/openstack/heat/tree/master/heat_integrationtests Change-Id: Ie5ed64a6777ed1acf8dd56522c26705ae897596d Partly-implements: bp tempest-plugin-interface Depends-On: I26dd32b1de8cceeaa6dc674092efec683df71889
217 lines
8.0 KiB
Python
217 lines
8.0 KiB
Python
# Copyright 2014 Mirantis Inc.
|
|
# All Rights Reserved.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
import six # noqa
|
|
from tempest import config # noqa
|
|
from tempest import test # noqa
|
|
import testtools # noqa
|
|
|
|
from manila_tempest_tests.tests.api import base
|
|
|
|
CONF = config.CONF
|
|
|
|
|
|
class ShareNetworkListMixin(object):
|
|
|
|
@test.attr(type=["gate", "smoke", ])
|
|
def test_list_share_networks(self):
|
|
listed = self.shares_client.list_share_networks()
|
|
any(self.sn_with_ldap_ss["id"] in sn["id"] for sn in listed)
|
|
|
|
# verify keys
|
|
keys = ["name", "id"]
|
|
[self.assertIn(key, sn.keys()) for sn in listed for key in keys]
|
|
|
|
@test.attr(type=["gate", "smoke", ])
|
|
def test_list_share_networks_with_detail(self):
|
|
listed = self.shares_client.list_share_networks_with_detail()
|
|
any(self.sn_with_ldap_ss["id"] in sn["id"] for sn in listed)
|
|
|
|
# verify keys
|
|
keys = [
|
|
"name", "id", "description", "network_type",
|
|
"project_id", "cidr", "ip_version",
|
|
"neutron_net_id", "neutron_subnet_id",
|
|
"created_at", "updated_at", "segmentation_id",
|
|
]
|
|
[self.assertIn(key, sn.keys()) for sn in listed for key in keys]
|
|
|
|
@test.attr(type=["gate", "smoke", ])
|
|
def test_list_share_networks_filter_by_ss(self):
|
|
listed = self.shares_client.list_share_networks_with_detail(
|
|
{'security_service_id': self.ss_ldap['id']})
|
|
self.assertTrue(any(self.sn_with_ldap_ss['id'] == sn['id']
|
|
for sn in listed))
|
|
for sn in listed:
|
|
ss_list = self.shares_client.list_sec_services_for_share_network(
|
|
sn['id'])
|
|
self.assertTrue(any(ss['id'] == self.ss_ldap['id']
|
|
for ss in ss_list))
|
|
|
|
@test.attr(type=["gate", "smoke", ])
|
|
def test_list_share_networks_all_filter_opts(self):
|
|
valid_filter_opts = {
|
|
'created_before': '2002-10-10',
|
|
'created_since': '2001-01-01',
|
|
'neutron_net_id': '1111',
|
|
'neutron_subnet_id': '2222',
|
|
'network_type': 'vlan',
|
|
'segmentation_id': 1000,
|
|
'cidr': '10.0.0.0/24',
|
|
'ip_version': 4,
|
|
'name': 'sn_with_ldap_ss'
|
|
}
|
|
|
|
listed = self.shares_client.list_share_networks_with_detail(
|
|
valid_filter_opts)
|
|
self.assertTrue(any(self.sn_with_ldap_ss['id'] == sn['id']
|
|
for sn in listed))
|
|
created_before = valid_filter_opts.pop('created_before')
|
|
created_since = valid_filter_opts.pop('created_since')
|
|
for sn in listed:
|
|
self.assertTrue(all(sn[key] == value for key, value in
|
|
six.iteritems(valid_filter_opts)))
|
|
self.assertTrue(sn['created_at'] <= created_before)
|
|
self.assertTrue(sn['created_at'] >= created_since)
|
|
|
|
|
|
class ShareNetworksTest(base.BaseSharesTest, ShareNetworkListMixin):
|
|
|
|
@classmethod
|
|
def resource_setup(cls):
|
|
super(ShareNetworksTest, cls).resource_setup()
|
|
ss_data = cls.generate_security_service_data()
|
|
cls.ss_ldap = cls.create_security_service(**ss_data)
|
|
|
|
cls.data_sn_with_ldap_ss = {
|
|
'name': 'sn_with_ldap_ss',
|
|
'neutron_net_id': '1111',
|
|
'neutron_subnet_id': '2222',
|
|
'created_at': '2002-02-02',
|
|
'updated_at': None,
|
|
'network_type': 'vlan',
|
|
'segmentation_id': 1000,
|
|
'cidr': '10.0.0.0/24',
|
|
'ip_version': 4,
|
|
'description': 'fake description',
|
|
}
|
|
cls.sn_with_ldap_ss = cls.create_share_network(
|
|
cleanup_in_class=True,
|
|
**cls.data_sn_with_ldap_ss)
|
|
|
|
cls.shares_client.add_sec_service_to_share_network(
|
|
cls.sn_with_ldap_ss["id"],
|
|
cls.ss_ldap["id"])
|
|
|
|
cls.data_sn_with_kerberos_ss = {
|
|
'name': 'sn_with_kerberos_ss',
|
|
'neutron_net_id': '3333',
|
|
'neutron_subnet_id': '4444',
|
|
'created_at': '2003-03-03',
|
|
'updated_at': None,
|
|
'neutron_net_id': 'test net id',
|
|
'neutron_subnet_id': 'test subnet id',
|
|
'network_type': 'local',
|
|
'segmentation_id': 2000,
|
|
'cidr': '10.0.0.0/13',
|
|
'ip_version': 6,
|
|
'description': 'fake description',
|
|
}
|
|
|
|
cls.ss_kerberos = cls.create_security_service(
|
|
ss_type='kerberos',
|
|
**cls.data_sn_with_ldap_ss)
|
|
|
|
cls.sn_with_kerberos_ss = cls.create_share_network(
|
|
cleanup_in_class=True,
|
|
**cls.data_sn_with_kerberos_ss)
|
|
|
|
cls.shares_client.add_sec_service_to_share_network(
|
|
cls.sn_with_kerberos_ss["id"],
|
|
cls.ss_kerberos["id"])
|
|
|
|
@test.attr(type=["gate", "smoke", ])
|
|
def test_create_delete_share_network(self):
|
|
# generate data for share network
|
|
data = self.generate_share_network_data()
|
|
|
|
# create share network
|
|
created = self.shares_client.create_share_network(**data)
|
|
self.assertDictContainsSubset(data, created)
|
|
|
|
# Delete share_network
|
|
self.shares_client.delete_share_network(created["id"])
|
|
|
|
@test.attr(type=["gate", "smoke", ])
|
|
def test_get_share_network(self):
|
|
get = self.shares_client.get_share_network(self.sn_with_ldap_ss["id"])
|
|
self.assertEqual('2002-02-02T00:00:00.000000', get['created_at'])
|
|
data = self.data_sn_with_ldap_ss.copy()
|
|
del data['created_at']
|
|
self.assertDictContainsSubset(data, get)
|
|
|
|
@test.attr(type=["gate", "smoke", ])
|
|
def test_update_share_network(self):
|
|
update_data = self.generate_share_network_data()
|
|
updated = self.shares_client.update_share_network(
|
|
self.sn_with_ldap_ss["id"],
|
|
**update_data)
|
|
self.assertDictContainsSubset(update_data, updated)
|
|
|
|
@test.attr(type=["gate", "smoke"])
|
|
@testtools.skipIf(
|
|
not CONF.share.multitenancy_enabled, "Only for multitenancy.")
|
|
def test_update_valid_keys_sh_server_exists(self):
|
|
self.create_share(cleanup_in_class=False)
|
|
update_dict = {
|
|
"name": "new_name",
|
|
"description": "new_description",
|
|
}
|
|
updated = self.shares_client.update_share_network(
|
|
self.shares_client.share_network_id, **update_dict)
|
|
self.assertDictContainsSubset(update_dict, updated)
|
|
|
|
@test.attr(type=["gate", "smoke", ])
|
|
def test_recreate_share_network(self):
|
|
# generate data for share network
|
|
data = self.generate_share_network_data()
|
|
|
|
# create share network
|
|
sn1 = self.shares_client.create_share_network(**data)
|
|
self.assertDictContainsSubset(data, sn1)
|
|
|
|
# Delete first share network
|
|
self.shares_client.delete_share_network(sn1["id"])
|
|
|
|
# create second share network with same data
|
|
sn2 = self.shares_client.create_share_network(**data)
|
|
self.assertDictContainsSubset(data, sn2)
|
|
|
|
# Delete second share network
|
|
self.shares_client.delete_share_network(sn2["id"])
|
|
|
|
@test.attr(type=["gate", "smoke", ])
|
|
def test_create_two_share_networks_with_same_net_and_subnet(self):
|
|
# generate data for share network
|
|
data = self.generate_share_network_data()
|
|
|
|
# create first share network
|
|
sn1 = self.create_share_network(**data)
|
|
self.assertDictContainsSubset(data, sn1)
|
|
|
|
# create second share network
|
|
sn2 = self.create_share_network(**data)
|
|
self.assertDictContainsSubset(data, sn2)
|