Designate API tests for Tempest Framework

Creates a new folder 'tempest' under 'designate/contrib' as a
placeholder for Designate API tests.
This submission implements CRUD operations on 'domains', 'records'
and 'servers' of Designate Api.
Adds related JSON supporting methods in client files
'domains_client.py', 'records_client.py', and 'server_client.py'
Also implemented schema validation for all the operations under
'domains.py', 'parameter_types.py', 'records.py', 'servers.py' files.
Modified 'tempest.conf.sample', 'config.py' , and 'clients.py' to
add parameters for enabling designate service.

Change-Id: I5fcac06200ce534a9cddf1e7ed9393ae5124a681
This commit is contained in:
ravikumar-venkatesan 2014-07-29 12:14:27 +00:00
parent 4c227c3251
commit cf8322e544
20 changed files with 3914 additions and 0 deletions

View File

@ -0,0 +1,72 @@
Designate API Testing using Tempest Framework.
==============================================
This is a set of Designate API tests written for Tempest Framework
to be run against a live OpenStack cluster with Designate service
enabled.
Configuration
-------------
Detailed configuration of Designate tests and configuration files is
the scope of this document.
Added all the required parameters in etc/tempest.conf.sample
to enable Designate service.
The sample config file is auto generated using the script
(based on parameters added in config.py):
tools/generate_sample.sh
To run Tempest, you first need to create a configuration file that will
tell Tempest where to find the designate service.
The easiest way to create a configuration file is to copy the sample
(tempest.conf.sample) one in the etc/ directory.
$> cd $TEMPEST_ROOT_DIR
$> cp etc/tempest.conf.sample etc/tempest.conf
After that, open up the etc/tempest.conf file and edit the configuration
variables to match valid data in your environment. This includes your
Keystone endpoint, a valid user and credentials, and reference
data to be used in testing.
Tests and Clients for Designate feature
---------------------------------------
1> Added tests for Domains, Records, Servers of Designate API
under dns_tests folder.
2> Added respective supporting functions for Json Interface
under dns_clients folder.
3> Modified respective clients.py and config.py files with respect
to Designate service and should be placed under'tempest' folder.
4> Implemented Schema validation for all the Designate operations as per
current Tempest framework under dns_schema.
Steps to execute Designate API tests.
-------------------------------------
In order to run Designate API tests against Tempest Suite, all the above
test scripts and client files has to be placed in paths as mentioned below.
1> Clone Tempest
git clone https://github.com/openstack/tempest.git
2> Add the following files
$> cp tempest.conf.sample $TEMPEST_ROOT_DIR/tempest/etc
$> cp config.py TEMPEST_ROOT_DIR/tempest
$> cp clients.py TEMPEST_ROOT_DIR/tempest
$> cp -r dns_clients TEMPEST_ROOT_DIR/tempest/services/dns
$> cp -r dns_schema TEMPEST_ROOT_DIR/tempest/api_schema/dns
$> cp -r dns_tests TEMPEST_ROOT_DIR/tempest/api/dns
After setting up your configuration files, you can execute the set of
designate tests by using testr.
$> testr run --parallel
To run one single test
$> testr run --parallel tempest.api.dns.test_domains.DnsDomainsTest.test_list_domains

706
contrib/tempest/clients.py Normal file
View File

@ -0,0 +1,706 @@
# Copyright 2012 OpenStack Foundation
# All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
import keystoneclient.exceptions
import keystoneclient.v2_0.client
from tempest import auth
from tempest.common import rest_client
from tempest import config
from tempest import exceptions
from tempest import manager
from tempest.openstack.common import log as logging
from tempest.services.baremetal.v1.client_json import BaremetalClientJSON
from tempest.services import botoclients
from tempest.services.compute.json.agents_client import \
AgentsClientJSON
from tempest.services.compute.json.aggregates_client import \
AggregatesClientJSON
from tempest.services.compute.json.availability_zone_client import \
AvailabilityZoneClientJSON
from tempest.services.compute.json.certificates_client import \
CertificatesClientJSON
from tempest.services.compute.json.extensions_client import \
ExtensionsClientJSON
from tempest.services.compute.json.fixed_ips_client import FixedIPsClientJSON
from tempest.services.compute.json.flavors_client import FlavorsClientJSON
from tempest.services.compute.json.floating_ips_client import \
FloatingIPsClientJSON
from tempest.services.compute.json.hosts_client import HostsClientJSON
from tempest.services.compute.json.hypervisor_client import \
HypervisorClientJSON
from tempest.services.compute.json.images_client import ImagesClientJSON
from tempest.services.compute.json.instance_usage_audit_log_client import \
InstanceUsagesAuditLogClientJSON
from tempest.services.compute.json.interfaces_client import \
InterfacesClientJSON
from tempest.services.compute.json.keypairs_client import KeyPairsClientJSON
from tempest.services.compute.json.limits_client import LimitsClientJSON
from tempest.services.compute.json.migrations_client import \
MigrationsClientJSON
from tempest.services.compute.json.quotas_client import QuotasClientJSON
from tempest.services.compute.json.security_groups_client import \
SecurityGroupsClientJSON
from tempest.services.compute.json.servers_client import ServersClientJSON
from tempest.services.compute.json.services_client import ServicesClientJSON
from tempest.services.compute.json.tenant_usages_client import \
TenantUsagesClientJSON
from tempest.services.compute.json.volumes_extensions_client import \
VolumesExtensionsClientJSON
from tempest.services.compute.v3.json.agents_client import AgentsV3ClientJSON
from tempest.services.compute.v3.json.aggregates_client import \
AggregatesV3ClientJSON
from tempest.services.compute.v3.json.availability_zone_client import \
AvailabilityZoneV3ClientJSON
from tempest.services.compute.v3.json.certificates_client import \
CertificatesV3ClientJSON
from tempest.services.compute.v3.json.extensions_client import \
ExtensionsV3ClientJSON
from tempest.services.compute.v3.json.flavors_client import FlavorsV3ClientJSON
from tempest.services.compute.v3.json.hosts_client import HostsV3ClientJSON
from tempest.services.compute.v3.json.hypervisor_client import \
HypervisorV3ClientJSON
from tempest.services.compute.v3.json.interfaces_client import \
InterfacesV3ClientJSON
from tempest.services.compute.v3.json.keypairs_client import \
KeyPairsV3ClientJSON
from tempest.services.compute.v3.json.migration_client import \
MigrationsV3ClientJSON
from tempest.services.compute.v3.json.quotas_client import \
QuotasV3ClientJSON
from tempest.services.compute.v3.json.servers_client import \
ServersV3ClientJSON
from tempest.services.compute.v3.json.services_client import \
ServicesV3ClientJSON
from tempest.services.compute.v3.json.version_client import \
VersionV3ClientJSON
from tempest.services.compute.xml.aggregates_client import AggregatesClientXML
from tempest.services.compute.xml.availability_zone_client import \
AvailabilityZoneClientXML
from tempest.services.compute.xml.certificates_client import \
CertificatesClientXML
from tempest.services.compute.xml.extensions_client import ExtensionsClientXML
from tempest.services.compute.xml.fixed_ips_client import FixedIPsClientXML
from tempest.services.compute.xml.flavors_client import FlavorsClientXML
from tempest.services.compute.xml.floating_ips_client import \
FloatingIPsClientXML
from tempest.services.compute.xml.hosts_client import HostsClientXML
from tempest.services.compute.xml.hypervisor_client import HypervisorClientXML
from tempest.services.compute.xml.images_client import ImagesClientXML
from tempest.services.compute.xml.instance_usage_audit_log_client import \
InstanceUsagesAuditLogClientXML
from tempest.services.compute.xml.interfaces_client import \
InterfacesClientXML
from tempest.services.compute.xml.keypairs_client import KeyPairsClientXML
from tempest.services.compute.xml.limits_client import LimitsClientXML
from tempest.services.compute.xml.quotas_client import QuotasClientXML
from tempest.services.compute.xml.security_groups_client \
import SecurityGroupsClientXML
from tempest.services.compute.xml.servers_client import ServersClientXML
from tempest.services.compute.xml.services_client import ServicesClientXML
from tempest.services.compute.xml.tenant_usages_client import \
TenantUsagesClientXML
from tempest.services.compute.xml.volumes_extensions_client import \
VolumesExtensionsClientXML
from tempest.services.data_processing.v1_1.client import DataProcessingClient
from tempest.services.database.json.flavors_client import \
DatabaseFlavorsClientJSON
from tempest.services.database.json.versions_client import \
DatabaseVersionsClientJSON
from tempest.services.dns.json.domains_client import DomainsClientJSON
from tempest.services.dns.json.records_client import RecordsClientJSON
from tempest.services.dns.json.server_client import ServerClientJSON
from tempest.services.identity.json.identity_client import IdentityClientJSON
from tempest.services.identity.json.identity_client import TokenClientJSON
from tempest.services.identity.v3.json.credentials_client import \
CredentialsClientJSON
from tempest.services.identity.v3.json.endpoints_client import \
EndPointClientJSON
from tempest.services.identity.v3.json.identity_client import \
IdentityV3ClientJSON
from tempest.services.identity.v3.json.identity_client import V3TokenClientJSON
from tempest.services.identity.v3.json.policy_client import PolicyClientJSON
from tempest.services.identity.v3.json.service_client import \
ServiceClientJSON
from tempest.services.identity.v3.xml.credentials_client import \
CredentialsClientXML
from tempest.services.identity.v3.xml.endpoints_client import EndPointClientXML
from tempest.services.identity.v3.xml.identity_client import \
IdentityV3ClientXML
from tempest.services.identity.v3.xml.identity_client import V3TokenClientXML
from tempest.services.identity.v3.xml.policy_client import PolicyClientXML
from tempest.services.identity.v3.xml.service_client import \
ServiceClientXML
from tempest.services.identity.xml.identity_client import IdentityClientXML
from tempest.services.identity.xml.identity_client import TokenClientXML
from tempest.services.image.v1.json.image_client import ImageClientJSON
from tempest.services.image.v2.json.image_client import ImageClientV2JSON
from tempest.services.network.json.network_client import NetworkClientJSON
from tempest.services.network.xml.network_client import NetworkClientXML
from tempest.services.object_storage.account_client import AccountClient
from tempest.services.object_storage.account_client import \
AccountClientCustomizedHeader
from tempest.services.object_storage.container_client import ContainerClient
from tempest.services.object_storage.object_client import ObjectClient
from tempest.services.object_storage.object_client import \
ObjectClientCustomizedHeader
from tempest.services.orchestration.json.orchestration_client import \
OrchestrationClient
from tempest.services.queuing.json.queuing_client import QueuingClientJSON
from tempest.services.telemetry.json.telemetry_client import \
TelemetryClientJSON
from tempest.services.telemetry.xml.telemetry_client import \
TelemetryClientXML
from tempest.services.volume.json.admin.volume_hosts_client import \
VolumeHostsClientJSON
from tempest.services.volume.json.admin.volume_quotas_client import \
VolumeQuotasClientJSON
from tempest.services.volume.json.admin.volume_services_client import \
VolumesServicesClientJSON
from tempest.services.volume.json.admin.volume_types_client import \
VolumeTypesClientJSON
from tempest.services.volume.json.backups_client import BackupsClientJSON
from tempest.services.volume.json.extensions_client import \
ExtensionsClientJSON as VolumeExtensionClientJSON
from tempest.services.volume.json.snapshots_client import SnapshotsClientJSON
from tempest.services.volume.json.volumes_client import VolumesClientJSON
from tempest.services.volume.v2.json.volumes_client import VolumesV2ClientJSON
from tempest.services.volume.v2.xml.volumes_client import VolumesV2ClientXML
from tempest.services.volume.xml.admin.volume_hosts_client import \
VolumeHostsClientXML
from tempest.services.volume.xml.admin.volume_quotas_client import \
VolumeQuotasClientXML
from tempest.services.volume.xml.admin.volume_services_client import \
VolumesServicesClientXML
from tempest.services.volume.xml.admin.volume_types_client import \
VolumeTypesClientXML
from tempest.services.volume.xml.backups_client import BackupsClientXML
from tempest.services.volume.xml.extensions_client import \
ExtensionsClientXML as VolumeExtensionClientXML
from tempest.services.volume.xml.snapshots_client import SnapshotsClientXML
from tempest.services.volume.xml.volumes_client import VolumesClientXML
CONF = config.CONF
LOG = logging.getLogger(__name__)
class Manager(manager.Manager):
"""
Top level manager for OpenStack tempest clients
"""
def __init__(self, credentials=None, interface='json', service=None):
# Set interface and client type first
self.interface = interface
self.client_type = 'tempest'
# super cares for credentials validation
super(Manager, self).__init__(credentials=credentials)
if self.interface == 'xml':
self.certificates_client = CertificatesClientXML(
self.auth_provider)
self.servers_client = ServersClientXML(self.auth_provider)
self.limits_client = LimitsClientXML(self.auth_provider)
self.images_client = ImagesClientXML(self.auth_provider)
self.keypairs_client = KeyPairsClientXML(self.auth_provider)
self.quotas_client = QuotasClientXML(self.auth_provider)
self.flavors_client = FlavorsClientXML(self.auth_provider)
self.extensions_client = ExtensionsClientXML(self.auth_provider)
self.volumes_extensions_client = VolumesExtensionsClientXML(
self.auth_provider)
self.floating_ips_client = FloatingIPsClientXML(
self.auth_provider)
self.backups_client = BackupsClientXML(self.auth_provider)
self.snapshots_client = SnapshotsClientXML(self.auth_provider)
self.volumes_client = VolumesClientXML(self.auth_provider)
self.volumes_v2_client = VolumesV2ClientXML(self.auth_provider)
self.volume_types_client = VolumeTypesClientXML(
self.auth_provider)
self.identity_client = IdentityClientXML(self.auth_provider)
self.identity_v3_client = IdentityV3ClientXML(
self.auth_provider)
self.security_groups_client = SecurityGroupsClientXML(
self.auth_provider)
self.interfaces_client = InterfacesClientXML(self.auth_provider)
self.endpoints_client = EndPointClientXML(self.auth_provider)
self.fixed_ips_client = FixedIPsClientXML(self.auth_provider)
self.availability_zone_client = AvailabilityZoneClientXML(
self.auth_provider)
self.service_client = ServiceClientXML(self.auth_provider)
self.volume_services_client = VolumesServicesClientXML(
self.auth_provider)
self.aggregates_client = AggregatesClientXML(self.auth_provider)
self.services_client = ServicesClientXML(self.auth_provider)
self.tenant_usages_client = TenantUsagesClientXML(
self.auth_provider)
self.policy_client = PolicyClientXML(self.auth_provider)
self.hosts_client = HostsClientXML(self.auth_provider)
self.hypervisor_client = HypervisorClientXML(self.auth_provider)
self.network_client = NetworkClientXML(self.auth_provider)
self.credentials_client = CredentialsClientXML(
self.auth_provider)
self.instance_usages_audit_log_client = \
InstanceUsagesAuditLogClientXML(self.auth_provider)
self.volume_hosts_client = VolumeHostsClientXML(
self.auth_provider)
self.volume_quotas_client = VolumeQuotasClientXML(
self.auth_provider)
self.volumes_extension_client = VolumeExtensionClientXML(
self.auth_provider)
if CONF.service_available.ceilometer:
self.telemetry_client = TelemetryClientXML(
self.auth_provider)
self.token_client = TokenClientXML()
self.token_v3_client = V3TokenClientXML()
elif self.interface == 'json':
self.certificates_client = CertificatesClientJSON(
self.auth_provider)
self.certificates_v3_client = CertificatesV3ClientJSON(
self.auth_provider)
self.baremetal_client = BaremetalClientJSON(self.auth_provider)
self.servers_client = ServersClientJSON(self.auth_provider)
self.servers_v3_client = ServersV3ClientJSON(self.auth_provider)
self.limits_client = LimitsClientJSON(self.auth_provider)
self.images_client = ImagesClientJSON(self.auth_provider)
self.keypairs_v3_client = KeyPairsV3ClientJSON(
self.auth_provider)
self.keypairs_client = KeyPairsClientJSON(self.auth_provider)
self.keypairs_v3_client = KeyPairsV3ClientJSON(
self.auth_provider)
self.quotas_client = QuotasClientJSON(self.auth_provider)
self.quotas_v3_client = QuotasV3ClientJSON(self.auth_provider)
self.flavors_client = FlavorsClientJSON(self.auth_provider)
self.flavors_v3_client = FlavorsV3ClientJSON(self.auth_provider)
self.extensions_v3_client = ExtensionsV3ClientJSON(
self.auth_provider)
self.extensions_client = ExtensionsClientJSON(
self.auth_provider)
self.volumes_extensions_client = VolumesExtensionsClientJSON(
self.auth_provider)
self.floating_ips_client = FloatingIPsClientJSON(
self.auth_provider)
self.backups_client = BackupsClientJSON(self.auth_provider)
self.snapshots_client = SnapshotsClientJSON(self.auth_provider)
self.volumes_client = VolumesClientJSON(self.auth_provider)
self.volumes_v2_client = VolumesV2ClientJSON(self.auth_provider)
self.volume_types_client = VolumeTypesClientJSON(
self.auth_provider)
self.identity_client = IdentityClientJSON(self.auth_provider)
self.identity_v3_client = IdentityV3ClientJSON(
self.auth_provider)
self.security_groups_client = SecurityGroupsClientJSON(
self.auth_provider)
self.interfaces_v3_client = InterfacesV3ClientJSON(
self.auth_provider)
self.interfaces_client = InterfacesClientJSON(
self.auth_provider)
self.endpoints_client = EndPointClientJSON(self.auth_provider)
self.fixed_ips_client = FixedIPsClientJSON(self.auth_provider)
self.availability_zone_v3_client = AvailabilityZoneV3ClientJSON(
self.auth_provider)
self.availability_zone_client = AvailabilityZoneClientJSON(
self.auth_provider)
self.services_v3_client = ServicesV3ClientJSON(
self.auth_provider)
self.service_client = ServiceClientJSON(self.auth_provider)
self.volume_services_client = VolumesServicesClientJSON(
self.auth_provider)
self.agents_v3_client = AgentsV3ClientJSON(self.auth_provider)
self.aggregates_v3_client = AggregatesV3ClientJSON(
self.auth_provider)
self.aggregates_client = AggregatesClientJSON(
self.auth_provider)
self.services_client = ServicesClientJSON(self.auth_provider)
self.tenant_usages_client = TenantUsagesClientJSON(
self.auth_provider)
self.version_v3_client = VersionV3ClientJSON(self.auth_provider)
self.migrations_v3_client = MigrationsV3ClientJSON(
self.auth_provider)
self.policy_client = PolicyClientJSON(self.auth_provider)
self.hosts_client = HostsClientJSON(self.auth_provider)
self.hypervisor_v3_client = HypervisorV3ClientJSON(
self.auth_provider)
self.hypervisor_client = HypervisorClientJSON(
self.auth_provider)
self.network_client = NetworkClientJSON(self.auth_provider)
self.credentials_client = CredentialsClientJSON(
self.auth_provider)
self.instance_usages_audit_log_client = \
InstanceUsagesAuditLogClientJSON(self.auth_provider)
self.volume_hosts_client = VolumeHostsClientJSON(
self.auth_provider)
self.volume_quotas_client = VolumeQuotasClientJSON(
self.auth_provider)
self.volumes_extension_client = VolumeExtensionClientJSON(
self.auth_provider)
self.hosts_v3_client = HostsV3ClientJSON(self.auth_provider)
self.database_flavors_client = DatabaseFlavorsClientJSON(
self.auth_provider)
self.database_versions_client = DatabaseVersionsClientJSON(
self.auth_provider)
self.dns_domains_client = DomainsClientJSON(self.auth_provider)
self.dns_servers_client = ServerClientJSON(self.auth_provider)
self.dns_records_client = RecordsClientJSON(self.auth_provider)
self.queuing_client = QueuingClientJSON(self.auth_provider)
if CONF.service_available.ceilometer:
self.telemetry_client = TelemetryClientJSON(
self.auth_provider)
self.token_client = TokenClientJSON()
self.token_v3_client = V3TokenClientJSON()
self.negative_client = rest_client.NegativeRestClient(
self.auth_provider)
self.negative_client.service = service
else:
msg = "Unsupported interface type `%s'" % interface
raise exceptions.InvalidConfiguration(msg)
# TODO(andreaf) EC2 client still do their auth, v2 only
ec2_client_args = (self.credentials.username,
self.credentials.password,
CONF.identity.uri,
self.credentials.tenant_name)
# common clients
self.account_client = AccountClient(self.auth_provider)
self.agents_client = AgentsClientJSON(self.auth_provider)
if CONF.service_available.glance:
self.image_client = ImageClientJSON(self.auth_provider)
self.image_client_v2 = ImageClientV2JSON(self.auth_provider)
self.container_client = ContainerClient(self.auth_provider)
self.object_client = ObjectClient(self.auth_provider)
self.orchestration_client = OrchestrationClient(
self.auth_provider)
self.ec2api_client = botoclients.APIClientEC2(*ec2_client_args)
self.s3_client = botoclients.ObjectClientS3(*ec2_client_args)
self.custom_object_client = ObjectClientCustomizedHeader(
self.auth_provider)
self.custom_account_client = \
AccountClientCustomizedHeader(self.auth_provider)
self.data_processing_client = DataProcessingClient(
self.auth_provider)
self.migrations_client = MigrationsClientJSON(self.auth_provider)
class AltManager(Manager):
"""
Manager object that uses the alt_XXX credentials for its
managed client objects
"""
def __init__(self, interface='json', service=None):
super(AltManager, self).__init__(
credentials=auth.get_default_credentials('alt_user'),
interface=interface,
service=service)
class AdminManager(Manager):
"""
Manager object that uses the admin credentials for its
managed client objects
"""
def __init__(self, interface='json', service=None):
super(AdminManager, self).__init__(
credentials=auth.get_default_credentials('identity_admin'),
interface=interface,
service=service)
class ComputeAdminManager(Manager):
"""
Manager object that uses the compute_admin credentials for its
managed client objects
"""
def __init__(self, interface='json', service=None):
base = super(ComputeAdminManager, self)
base.__init__(
credentials=auth.get_default_credentials('compute_admin'),
interface=interface,
service=service)
class DnsAdminManager(Manager):
"""
Manager object that uses the dns_admin credentials for its
managed client objects
"""
def __init__(self, interface='json', service=None):
base = super(DnsAdminManager, self)
base.__init__(
credentials=auth.get_default_credentials('dns_admin'),
interface=interface,
service=service)
class OfficialClientManager(manager.Manager):
"""
Manager that provides access to the official python clients for
calling various OpenStack APIs.
"""
NOVACLIENT_VERSION = '2'
CINDERCLIENT_VERSION = '1'
HEATCLIENT_VERSION = '1'
IRONICCLIENT_VERSION = '1'
SAHARACLIENT_VERSION = '1.1'
def __init__(self, credentials):
# FIXME(andreaf) Auth provider for client_type 'official' is
# not implemented yet, setting to 'tempest' for now.
self.client_type = 'tempest'
self.interface = None
# super cares for credentials validation
super(OfficialClientManager, self).__init__(credentials=credentials)
self.baremetal_client = self._get_baremetal_client()
self.compute_client = self._get_compute_client(credentials)
self.identity_client = self._get_identity_client(credentials)
self.image_client = self._get_image_client()
self.network_client = self._get_network_client()
self.volume_client = self._get_volume_client(credentials)
self.object_storage_client = self._get_object_storage_client(
credentials)
self.orchestration_client = self._get_orchestration_client(
credentials)
self.data_processing_client = self._get_data_processing_client(
credentials)
def _get_roles(self):
admin_credentials = auth.get_default_credentials('identity_admin')
keystone_admin = self._get_identity_client(admin_credentials)
username = self.credentials.username
tenant_name = self.credentials.tenant_name
user_id = keystone_admin.users.find(name=username).id
tenant_id = keystone_admin.tenants.find(name=tenant_name).id
roles = keystone_admin.roles.roles_for_user(
user=user_id, tenant=tenant_id)
return [r.name for r in roles]
def _get_compute_client(self, credentials):
# Novaclient will not execute operations for anyone but the
# identified user, so a new client needs to be created for
# each user that operations need to be performed for.
if not CONF.service_available.nova:
return None
import novaclient.client
auth_url = CONF.identity.uri
dscv = CONF.identity.disable_ssl_certificate_validation
region = CONF.identity.region
client_args = (credentials.username, credentials.password,
credentials.tenant_name, auth_url)
# Create our default Nova client to use in testing
service_type = CONF.compute.catalog_type
endpoint_type = CONF.compute.endpoint_type
return novaclient.client.Client(self.NOVACLIENT_VERSION,
*client_args,
service_type=service_type,
endpoint_type=endpoint_type,
region_name=region,
no_cache=True,
insecure=dscv,
http_log_debug=True)
def _get_image_client(self):
if not CONF.service_available.glance:
return None
import glanceclient
token = self.identity_client.auth_token
region = CONF.identity.region
endpoint_type = CONF.image.endpoint_type
endpoint = self.identity_client.service_catalog.url_for(
attr='region', filter_value=region,
service_type=CONF.image.catalog_type, endpoint_type=endpoint_type)
dscv = CONF.identity.disable_ssl_certificate_validation
return glanceclient.Client('1', endpoint=endpoint, token=token,
insecure=dscv)
def _get_volume_client(self, credentials):
if not CONF.service_available.cinder:
return None
import cinderclient.client
auth_url = CONF.identity.uri
region = CONF.identity.region
endpoint_type = CONF.volume.endpoint_type
dscv = CONF.identity.disable_ssl_certificate_validation
return cinderclient.client.Client(self.CINDERCLIENT_VERSION,
credentials.username,
credentials.password,
credentials.tenant_name,
auth_url,
region_name=region,
endpoint_type=endpoint_type,
insecure=dscv,
http_log_debug=True)
def _get_object_storage_client(self, credentials):
if not CONF.service_available.swift:
return None
import swiftclient
auth_url = CONF.identity.uri
# add current tenant to swift operator role group.
admin_credentials = auth.get_default_credentials('identity_admin')
keystone_admin = self._get_identity_client(admin_credentials)
# enable test user to operate swift by adding operator role to him.
roles = keystone_admin.roles.list()
operator_role = CONF.object_storage.operator_role
member_role = [role for role in roles if role.name == operator_role][0]
# NOTE(maurosr): This is surrounded in the try-except block cause
# neutron tests doesn't have tenant isolation.
try:
keystone_admin.roles.add_user_role(self.identity_client.user_id,
member_role.id,
self.identity_client.tenant_id)
except keystoneclient.exceptions.Conflict:
pass
endpoint_type = CONF.object_storage.endpoint_type
os_options = {'endpoint_type': endpoint_type}
return swiftclient.Connection(auth_url, credentials.username,
credentials.password,
tenant_name=credentials.tenant_name,
auth_version='2',
os_options=os_options)
def _get_orchestration_client(self, credentials):
if not CONF.service_available.heat:
return None
import heatclient.client
keystone = self._get_identity_client(credentials)
region = CONF.identity.region
endpoint_type = CONF.orchestration.endpoint_type
token = keystone.auth_token
service_type = CONF.orchestration.catalog_type
try:
endpoint = keystone.service_catalog.url_for(
attr='region',
filter_value=region,
service_type=service_type,
endpoint_type=endpoint_type)
except keystoneclient.exceptions.EndpointNotFound:
return None
else:
return heatclient.client.Client(self.HEATCLIENT_VERSION,
endpoint,
token=token,
username=credentials.username,
password=credentials.password)
def _get_identity_client(self, credentials):
# This identity client is not intended to check the security
# of the identity service, so use admin credentials by default.
auth_url = CONF.identity.uri
dscv = CONF.identity.disable_ssl_certificate_validation
return keystoneclient.v2_0.client.Client(
username=credentials.username,
password=credentials.password,
tenant_name=credentials.tenant_name,
auth_url=auth_url,
insecure=dscv)
def _get_baremetal_client(self):
# ironic client is currently intended to by used by admin users
if not CONF.service_available.ironic:
return None
import ironicclient.client
roles = self._get_roles()
if CONF.identity.admin_role not in roles:
return None
auth_url = CONF.identity.uri
api_version = self.IRONICCLIENT_VERSION
insecure = CONF.identity.disable_ssl_certificate_validation
service_type = CONF.baremetal.catalog_type
endpoint_type = CONF.baremetal.endpoint_type
creds = {
'os_username': self.credentials.username,
'os_password': self.credentials.password,
'os_tenant_name': self.credentials.tenant_name
}
try:
return ironicclient.client.get_client(
api_version=api_version,
os_auth_url=auth_url,
insecure=insecure,
os_service_type=service_type,
os_endpoint_type=endpoint_type,
**creds)
except keystoneclient.exceptions.EndpointNotFound:
return None
def _get_network_client(self):
# The intended configuration is for the network client to have
# admin privileges and indicate for whom resources are being
# created via a 'tenant_id' parameter. This will often be
# preferable to authenticating as a specific user because
# working with certain resources (public routers and networks)
# often requires admin privileges anyway.
if not CONF.service_available.neutron:
return None
import neutronclient.v2_0.client
credentials = auth.get_default_credentials('identity_admin')
auth_url = CONF.identity.uri
dscv = CONF.identity.disable_ssl_certificate_validation
endpoint_type = CONF.network.endpoint_type
return neutronclient.v2_0.client.Client(
username=credentials.username,
password=credentials.password,
tenant_name=credentials.tenant_name,
endpoint_type=endpoint_type,
auth_url=auth_url,
insecure=dscv)
def _get_data_processing_client(self, credentials):
if not CONF.service_available.sahara:
# Sahara isn't available
return None
import saharaclient.client
endpoint_type = CONF.data_processing.endpoint_type
catalog_type = CONF.data_processing.catalog_type
auth_url = CONF.identity.uri
client = saharaclient.client.Client(
self.SAHARACLIENT_VERSION,
credentials.username,
credentials.password,
project_name=credentials.tenant_name,
endpoint_type=endpoint_type,
service_type=catalog_type,
auth_url=auth_url)
return client

1107
contrib/tempest/config.py Normal file

File diff suppressed because it is too large Load Diff

View File

View File

@ -0,0 +1,79 @@
# Copyright 2014 Hewlett-Packard Development Company, L.P
# All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
import json
from tempest.api_schema.dns import domains as schema
from tempest.common import rest_client
from tempest import config
CONF = config.CONF
class DomainsClientJSON(rest_client.RestClient):
def __init__(self, auth_provider):
super(DomainsClientJSON, self).__init__(auth_provider)
self.service = CONF.dns.catalog_type
def list_domains(self, params=None):
"""List all domains."""
resp, body = self.get("v1/domains")
body = json.loads(body)
self.validate_response(schema.list_domains, resp, body)
return resp, body['domains']
def get_domain(self, domain_id):
"""Get the details of a domain."""
resp, body = self.get("v1/domains/%s" % str(domain_id))
body = json.loads(body)
self.validate_response(schema.get_domain, resp, body)
return resp, body
def delete_domain(self, domain_id):
"""Delete the given domain."""
resp, body = self.delete("v1/domains/%s" % str(domain_id))
self.validate_response(schema.delete_domain, resp, body)
return resp, body
def create_domain(self, name, email, **kwargs):
"""Createa a domain."""
post_body = {
"name": name,
"email": email
}
for option in ['ttl', 'description']:
post_param = option
value = kwargs.get(option)
if value is not None:
post_body[post_param] = value
resp, body = self.post('v1/domains', json.dumps(post_body))
body = json.loads(body)
self.validate_response(schema.create_domain, resp, body)
return resp, body
def update_domain(self, domain_id, **kwargs):
"""Updates a domain."""
post_body = {}
for option in ['email', 'name', 'ttl', 'description']:
post_param = option
value = kwargs.get(option)
if value is not None:
post_body[post_param] = value
resp, body = self.put('v1/domains/%s' % domain_id,
json.dumps(post_body))
body = json.loads(body)
self.validate_response(schema.update_domain, resp, body)
return resp, body

View File

@ -0,0 +1,84 @@
# Copyright 2014 Hewlett-Packard Development Company, L.P
# All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
import json
from tempest.api_schema.dns import records as schema
from tempest.common import rest_client
from tempest import config
CONF = config.CONF
class RecordsClientJSON(rest_client.RestClient):
def __init__(self, auth_provider):
super(RecordsClientJSON, self).__init__(auth_provider)
self.service = CONF.dns.catalog_type
def list_records(self, domain_id):
"""List all records."""
resp, body = self.get("v1/domains/%s/records" % (domain_id))
body = json.loads(body)
self.validate_response(schema.list_records, resp, body)
return resp, body['records']
def get_record(self, domain_id, record_id):
"""Get the details of a record."""
resp, body = self.get("v1/domains/%s/records/%s" % (domain_id,
record_id))
body = json.loads(body)
self.validate_response(schema.get_record, resp, body)
return resp, body
def delete_record(self, domain_id, record_id):
"""Delete the given record."""
resp, body = self.delete("v1/domains/%s/records/%s" % (domain_id,
record_id))
self.validate_response(schema.delete_record, resp, body)
return resp, body
def create_record(self, domain_id, name, type, data, **kwargs):
"""Createa a record."""
post_body = {
"name": name,
"type": type,
"data": data
}
for option in ['ttl', 'priority', 'description']:
post_param = option
value = kwargs.get(option)
if value is not None:
post_body[post_param] = value
uri = "v1/domains/%s/records" % (domain_id)
resp, body = self.post(uri, json.dumps(post_body))
body = json.loads(body)
self.validate_response(schema.create_record, resp, body)
return resp, body
def update_record(self, domain_id, record_id, **kwargs):
"""Updates a record."""
post_body = {}
for option in ['name', 'type', 'data', 'ttl', 'priority',
'description']:
post_param = option
value = kwargs.get(option)
if value is not None:
post_body[post_param] = value
resp, body = self.put('v1/domains/%s/records/%s' % (domain_id,
record_id), json.dumps(post_body))
body = json.loads(body)
self.validate_response(schema.update_record, resp, body)
return resp, body

View File

@ -0,0 +1,76 @@
# Copyright 2014 Hewlett-Packard Development Company, L.P
# All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
import json
from tempest.api_schema.dns import servers as schema
from tempest.common import rest_client
from tempest import config
CONF = config.CONF
class ServersClientJSON(rest_client.RestClient):
def __init__(self, auth_provider):
super(ServersClientJSON, self).__init__(auth_provider)
self.service = CONF.dns.catalog_type
def list_servers(self, params=None):
"""List all servers."""
resp, body = self.get("v1/servers")
body = json.loads(body)
self.validate_response(schema.list_servers, resp, body)
return resp, body['servers']
def get_server(self, server_id):
"""Get the details of a server."""
resp, body = self.get("v1/servers/%s" % str(server_id))
body = json.loads(body)
self.validate_response(schema.get_server, resp, body)
return resp, body
def delete_server(self, server_id):
"""Delete the given server."""
resp, body = self.delete("v1/servers/%s" % str(server_id))
self.validate_response(schema.delete_server, resp, body)
return resp, body
def create_server(self, name, **kwargs):
"""Creates a server."""
post_body = {
"name": name,
}
for option in ['max-width', 'variable', 'prefix']:
value = kwargs.get(option)
post_param = option
if value is not None:
post_body[post_param] = value
resp, body = self.post('v1/servers', json.dumps(post_body))
body = json.loads(body)
self.validate_response(schema.create_server, resp, body)
return resp, body
def update_server(self, server_id, **kwargs):
"""Updates a server."""
name = kwargs.get('name')
post_body = {
'name': name
}
resp, body = self.put('v1/servers/%s' % server_id,
json.dumps(post_body))
body = json.loads(body)
self.validate_response(schema.update_server, resp, body)
return resp, body

View File

View File

@ -0,0 +1,123 @@
# Copyright 2014 Hewlett-Packard Development Company, L.P
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
list_domains = {
"status_code": [200],
"response_body": {
"type": "object",
"properties": {
"domains": {
"type": "array",
"items": {
"type": "object",
"properties": {
"created_at": {"type": "string"},
"description": {
"anyOf": [{'type': 'string'}, {"type": "null"}]},
"email": {"type": "string"},
"id": {"type": "string"},
"name": {"type": "string"},
"serial": {"type": "number"},
"ttl": {"type": "number"},
"updated_at": {
"anyOf": [{'type': 'string'}, {"type": "null"}]}
},
'required': ['id', 'name', 'email', 'ttl']
}
}
},
'required': ['domains']
}
}
create_domain = {
"status_code": [200],
"response_body": {
"type": "object",
"properties": {
"domain": {
"type": "object",
"properties": {
"created_at": {"type": "string"},
"description": {
"anyOf": [{'type': 'string'}, {"type": "null"}]},
"email": {"type": "string"},
"id": {"type": "string"},
"name": {"type": "string"},
"serial": {"type": "number"},
"ttl": {"type": "number"},
"updated_at": {"type": "null"}
},
"required": ['id', 'name', 'email', 'ttl']
}
}
},
"required": ['domain']
}
update_domain = {
"status_code": [200],
"response_body": {
"type": "object",
"properties": {
"domain": {
"type": "object",
"properties": {
"created_at": {"type": "string"},
"description": {
"anyOf": [{'type': 'string'}, {"type": "null"}]},
"email": {"type": "string"},
"id": {"type": "string"},
"name": {"type": "string"},
"serial": {"type": "number"},
"ttl": {"type": "number"},
"updated_at": {
"anyOf": [{'type': 'string'}, {"type": "null"}]}
},
"required": ['id', 'name', 'email', 'ttl']
}
}
},
"required": ['domain']
}
get_domain = {
"status_code": [200],
"response_body": {
"type": "object",
"properties": {
"domain": {
"type": "object",
"properties": {
"created_at": {"type": "string"},
"description": {
"anyOf": [{'type': 'string'}, {"type": "null"}]},
"email": {"type": "string"},
"id": {"type": "string"},
"name": {"type": "string"},
"serial": {"type": "number"},
"ttl": {"type": "number"},
"updated_at": {
"anyOf": [{'type': 'string'}, {"type": "null"}]}
},
"required": ['id', 'name', 'email', 'ttl']
}
}
},
"required": ['domain']
}
delete_domain = {
'status_code': [200],
}

View File

@ -0,0 +1,23 @@
# Copyright 2014 Hewlett-Packard Development Company, L.P
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
access_ip_v4 = {
'type': 'string',
'anyOf': [{'format': 'ipv4'}, {'enum': ['']}]
}
access_ip_v6 = {
'type': 'string',
'anyOf': [{'format': 'ipv6'}, {'enum': ['']}]
}

View File

@ -0,0 +1,136 @@
# Copyright 2014 Hewlett-Packard Development Company, L.P
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
from tempest.api_schema.dns import parameter_types
list_records = {
"status_code": [200],
"response_body": {
"type": "object",
"properties": {
"records": {
"type": "array",
"items": {
"type": "object",
"properties": {
"created_at": {"type": "string"},
"data": {
"anyOf": [parameter_types.access_ip_v4,
parameter_types.access_ip_v6]},
"description": {"type": "null"},
"domain_id": {"type": "string"},
"id": {"type": "string"},
"name": {"type": "string"},
"priority": {"type": "null"},
"ttl": {"type": "null"},
"type": {"type": "string"},
"updated_at": {
"anyOf": [{'type': 'string'}, {"type": "null"}]}
},
'required': ['id', 'name', 'type', 'data']
}
}
},
'required': ['records']
}
}
create_record = {
"status_code": [200],
"response_body": {
"type": "object",
"properties": {
"record": {
"type": "object",
"properties": {
"created_at": {"type": "string"},
"data": {
"anyOf": [parameter_types.access_ip_v4,
parameter_types.access_ip_v6]},
"description": {"type": "null"},
"domain_id": {"type": "string"},
"id": {"type": "string"},
"name": {"type": "string"},
"priority": {"type": "null"},
"ttl": {"type": "null"},
"type": {"type": "string"},
"updated_at": {"type": "null"}
},
"required": ['id', 'name', 'type', 'domain_id']
}
}
},
"required": ['record']
}
update_record = {
"status_code": [200],
"response_body": {
"type": "object",
"properties": {
"record": {
"type": "object",
"properties": {
"created_at": {"type": "string"},
"data": {
"anyOf": [parameter_types.access_ip_v4,
parameter_types.access_ip_v6]},
"description": {"type": "null"},
"domain_id": {"type": "string"},
"id": {"type": "string"},
"name": {"type": "string"},
"priority": {"type": "null"},
"ttl": {"type": "null"},
"type": {"type": "string"},
"updated_at": {"type": "string"}
},
"required": ['id', 'name', 'type', 'domain_id']
}
}
},
"required": ['record']
}
get_record = {
"status_code": [200],
"response_body": {
"type": "object",
"properties": {
"record": {
"type": "object",
"properties": {
"created_at": {"type": "string"},
"data": {
"anyOf": [parameter_types.access_ip_v4,
parameter_types.access_ip_v6]},
"description": {"type": "null"},
"domain_id": {"type": "string"},
"id": {"type": "string"},
"name": {"type": "string"},
"priority": {"type": "null"},
"ttl": {"type": "null"},
"type": {"type": "string"},
"updated_at": {
"anyOf": [{'type': 'string'}, {"type": "null"}]}
},
"required": ['id', 'name', 'type', 'domain_id']
}
}
},
"required": ['record']
}
delete_record = {
'status_code': [200],
}

View File

@ -0,0 +1,103 @@
# Copyright 2014 Hewlett-Packard Development Company, L.P
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
list_servers = {
"status_code": [200],
"response_body": {
"type": "object",
"properties": {
"servers": {
"type": "array",
"items": {
"type": "object",
"properties": {
"created_at": {"type": "string"},
"id": {"type": "string"},
"name": {"type": "string"},
"updated_at": {
"anyOf": [{'type': 'string'}, {"type": "null"}]}
},
'required': ['id', 'name']
}
}
},
'required': ['servers']
}
}
create_server = {
"status_code": [200],
"response_body": {
"type": "object",
"properties": {
"server": {
"type": "object",
"properties": {
"created_at": {"type": "string"},
"id": {"type": "string"},
"name": {"type": "string"},
"updated_at": {"type": "null"}
},
"required": ['id', 'name']
}
}
},
"required": ['server']
}
update_server = {
"status_code": [200],
"response_body": {
"type": "object",
"properties": {
"server": {
"type": "object",
"properties": {
"created_at": {"type": "string"},
"id": {"type": "string"},
"name": {"type": "string"},
"updated_at": {"type": "string"}
},
"required": ['id', 'name']
}
}
},
"required": ['server']
}
get_server = {
"status_code": [200],
"response_body": {
"type": "object",
"properties": {
"server": {
"type": "object",
"properties": {
"created_at": {"type": "string"},
"id": {"type": "string"},
"name": {"type": "string"},
"updated_at": {
"anyOf": [{'type': 'string'}, {"type": "null"}]}
},
"required": ['id', 'name']
}
}
},
"required": ['server']
}
delete_server = {
'status_code': [200],
}

View File

View File

@ -0,0 +1,71 @@
# Copyright 2014 Hewlett-Packard Development Company, L.P.
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
from tempest.api.dns import base
from tempest.common.utils import data_utils
from tempest import exceptions
from tempest import test
class ServersAdminTestJSON(base.BaseDnsAdminTest):
"""
Tests Servers API Create, Get, List and Delete
that require admin privileges
"""
@classmethod
def setUpClass(cls):
super(ServersAdminTestJSON, cls).setUpClass()
cls.client = cls.os_adm.dns_servers_client
cls.setup_servers = list()
for i in range(2):
name = data_utils.rand_name('dns-server') + '.com.'
_, server = cls.client.create_server(name)
cls.setup_servers.append(server)
@classmethod
def tearDownClass(cls):
for server in cls.setup_servers:
cls.client.delete_server(server['id'])
super(ServersAdminTestJSON, cls).tearDownClass()
def _delete_server(self, server_id):
self.client.delete_server(server_id)
self.assertRaises(exceptions.NotFound,
self.client.get_server, server_id)
@test.attr(type='gate')
def test_list_servers(self):
# Get a list of servers
_, servers = self.client.list_servers()
# Verify servers created in setup class are in the list
for server in self.setup_servers:
self.assertIn(server['id'], map(lambda x: x['id'], servers))
@test.attr(type='smoke')
def test_create_update_get_delete_server(self):
# Create Dns Server
s_name1 = data_utils.rand_name('dns-server') + '.com.'
_, server = self.client.create_server(s_name1)
self.addCleanup(self._delete_server, server['id'])
self.assertEqual(s_name1, server['name'])
self.assertIsNotNone(server['id'])
# Update Dns Server
s_name2 = data_utils.rand_name('update-dns-server') + '.com.'
_, update_server = self.client.update_server(server['id'],
name=s_name2)
self.assertEqual(s_name2, update_server['name'])
# Get the details of Server
_, get_server = self.client.get_server(server['id'])
self.assertEqual(update_server['name'], get_server['name'])

View File

@ -0,0 +1,64 @@
# Copyright 2014 Hewlett-Packard Development Company, L.P
# All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
from tempest import clients
from tempest import config
from tempest import exceptions
from tempest.openstack.common import log as logging
import tempest.test
CONF = config.CONF
LOG = logging.getLogger(__name__)
class BaseDnsTest(tempest.test.BaseTestCase):
"""Base test case class for all Dns API tests."""
_interface = 'json'
force_tenant_isolation = False
@classmethod
def setUpClass(cls):
super(BaseDnsTest, cls).setUpClass()
if not CONF.service_available.designate:
skip_msg = ("%s skipped as designate is not available"
% cls.__name__)
raise cls.skipException(skip_msg)
os = cls.get_client_manager()
cls.os = os
cls.dns_domains_client = cls.os.dns_domains_client
cls.dns_records_client = cls.os.dns_records_client
class BaseDnsAdminTest(BaseDnsTest):
"""Base test case class for Dns Admin API tests."""
_interface = "json"
@classmethod
def setUpClass(cls):
super(BaseDnsAdminTest, cls).setUpClass()
if (CONF.compute.allow_tenant_isolation or
cls.force_tenant_isolation is True):
creds = cls.isolated_creds.get_admin_creds()
cls.os_adm = clients.Manager(credentials=creds,
interface=cls._interface)
else:
try:
cls.os_adm = clients.DnsAdminManager(
interface=cls._interface)
except exceptions.InvalidCredentials:
msg = ("Missing Dns Admin API credentials "
"in configuration.")
raise cls.skipException(msg)

View File

@ -0,0 +1,73 @@
# Copyright 2014 Hewlett-Packard Development Company, L.P
# All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
from tempest.api.dns import base
from tempest.common.utils import data_utils
from tempest import exceptions
from tempest import test
class DnsDomainsTest(base.BaseDnsTest):
_interface = 'json'
@classmethod
def setUpClass(cls):
super(DnsDomainsTest, cls).setUpClass()
cls.client = cls.dns_domains_client
cls.setup_domains = list()
for i in range(2):
name = data_utils.rand_name('domain') + '.com.'
email = data_utils.rand_name('dns') + '@testmail.com'
_, domain = cls.client.create_domain(name, email)
cls.setup_domains.append(domain)
@classmethod
def tearDownClass(cls):
for domain in cls.setup_domains:
cls.client.delete_domain(domain['id'])
super(DnsDomainsTest, cls).tearDownClass()
def _delete_domain(self, domain_id):
self.client.delete_domain(domain_id)
self.assertRaises(exceptions.NotFound,
self.client.get_domain, domain_id)
@test.attr(type='gate')
def test_list_domains(self):
# Get a list of domains
_, domains = self.client.list_domains()
# Verify domains created in setup class are in the list
for domain in self.setup_domains:
self.assertIn(domain['id'], map(lambda x: x['id'], domains))
@test.attr(type='smoke')
def test_create_update_get_domain(self):
# Create Domain
d_name = data_utils.rand_name('domain') + '.com.'
d_email = data_utils.rand_name('dns') + '@testmail.com'
_, domain = self.client.create_domain(name=d_name, email=d_email)
self.addCleanup(self._delete_domain, domain['id'])
self.assertEqual(d_name, domain['name'])
self.assertEqual(d_email, domain['email'])
# Update Domain with ttl
d_ttl = 3600
_, update_domain = self.client.update_domain(domain['id'],
ttl=d_ttl)
self.assertEqual(d_ttl, update_domain['ttl'])
# Get the details of Domain
_, get_domain = self.client.get_domain(domain['id'])
self.assertEqual(update_domain['name'], get_domain['name'])
self.assertEqual(update_domain['email'], get_domain['email'])
self.assertEqual(update_domain['ttl'], get_domain['ttl'])

View File

@ -0,0 +1,102 @@
# Copyright 2014 Hewlett-Packard Development Company, L.P
# All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
from tempest.api.dns import base
from tempest.common.utils import data_utils
from tempest import exceptions
from tempest import test
class RecordsTest(base.BaseDnsTest):
_interface = 'json'
@classmethod
def setUpClass(cls):
super(RecordsTest, cls).setUpClass()
cls.client = cls.dns_records_client
# Creates domains and Records for testcase
cls.setup_records = list()
name = data_utils.rand_name('domain') + '.com.'
email = data_utils.rand_name('dns') + '@testmail.com'
_, cls.domain = cls.dns_domains_client.create_domain(name, email)
# Creates a record with type as A
r_name = 'www.' + name
data1 = "192.0.2.3"
_, record = cls.client.create_record(
domain_id=cls.domain['id'], name=r_name, data=data1,
type='A')
cls.setup_records.append(record)
# Creates a record with type AAAA
data2 = "2001:db8:0:1234:0:5678:9:12"
_, record = cls.client.create_record(
domain_id=cls.domain['id'], name=r_name,
data=data2, type='AAAA')
cls.setup_records.append(record)
@classmethod
def tearDownClass(cls):
for record in cls.setup_records:
cls.client.delete_record(cls.domain['id'], record['id'])
cls.dns_domains_client.delete_domain(cls.domain['id'])
def _delete_record(self, domain_id, record_id):
self.client.delete_record(domain_id, record_id)
self.assertRaises(exceptions.NotFound,
self.client.get_record, domain_id, record_id)
@test.attr(type='gate')
def test_list_records_for_domain(self):
# Get a list of records for a domain
_, records = self.client.list_records(self.domain['id'])
# Verify records created in setup class are in the list
for record in self.setup_records:
self.assertIn(record['id'], map(lambda x: x['id'], records))
@test.attr(type='smoke')
def test_create_update_get_delete_record(self):
# Create Domain
name = data_utils.rand_name('domain') + '.com.'
email = data_utils.rand_name('dns') + '@testmail.com'
_, domain = self.dns_domains_client.create_domain(name, email)
self.addCleanup(self.dns_domains_client.delete_domain, domain['id'])
# Create Record
r_name = 'www.' + name
r_data = "192.0.2.4"
_, record = self.client.create_record(domain_id=domain['id'],
name=r_name, data=r_data,
type='A')
self.addCleanup(self._delete_record, domain['id'], record['id'])
self.assertIsNotNone(record['id'])
self.assertEqual(domain['id'], record['domain_id'])
self.assertEqual(r_name, record['name'])
self.assertEqual(r_data, record['data'])
self.assertEqual('A', record['type'])
# Update Record with data and ttl
r_data1 = "192.0.2.5"
r_ttl = 3600
_, update_record = self.client.update_record(domain_id=domain['id'],
record_id=record['id'],
name=r_name, type='A',
data=r_data1, ttl=r_ttl)
self.assertEqual(r_data1, update_record['data'])
self.assertEqual(r_ttl, update_record['ttl'])
# GET record
_, get_record = self.client.get_record(domain_id=domain['id'],
record_id=record['id'])
self.assertEqual(update_record['data'], get_record['data'])
self.assertEqual(update_record['name'], get_record['name'])
self.assertEqual(update_record['type'], get_record['type'])
self.assertEqual(update_record['ttl'], get_record['ttl'])
self.assertEqual(update_record['domain_id'], get_record['domain_id'])

File diff suppressed because it is too large Load Diff