f6bc6fa7bc
Tempest assumes a default share type already created to work. This means, if a default share type is not created and not specified in the conf file, tempest tests fail. A workaround is to create a share type as part of the environment setup for all the tests that need it. This patch set does that. Change-Id: I15880e400df30918762ebd7304244b4a27200168 Closes-Bug: #1743472
131 lines
5.3 KiB
Python
131 lines
5.3 KiB
Python
# Copyright 2014 Mirantis Inc.
|
|
# All Rights Reserved.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
from oslo_log import log
|
|
import six
|
|
from tempest import config
|
|
from tempest.lib import exceptions as lib_exc
|
|
import testtools
|
|
from testtools import testcase as tc
|
|
|
|
from manila_tempest_tests.tests.api import base
|
|
|
|
CONF = config.CONF
|
|
LOG = log.getLogger(__name__)
|
|
|
|
|
|
class SecurityServicesNegativeTest(base.BaseSharesMixedTest):
|
|
|
|
@classmethod
|
|
def resource_setup(cls):
|
|
super(SecurityServicesNegativeTest, cls).resource_setup()
|
|
# create share_type
|
|
cls.share_type = cls._create_share_type()
|
|
cls.share_type_id = cls.share_type['id']
|
|
|
|
@tc.attr(base.TAG_NEGATIVE, base.TAG_API)
|
|
def test_try_create_security_service_with_empty_type(self):
|
|
self.assertRaises(lib_exc.BadRequest,
|
|
self.shares_client.create_security_service, "")
|
|
|
|
@tc.attr(base.TAG_NEGATIVE, base.TAG_API)
|
|
def test_try_create_security_service_with_wrong_type(self):
|
|
self.assertRaises(lib_exc.BadRequest,
|
|
self.shares_client.create_security_service,
|
|
"wrong_type")
|
|
|
|
@tc.attr(base.TAG_NEGATIVE, base.TAG_API)
|
|
def test_try_get_security_service_without_id(self):
|
|
self.assertRaises(lib_exc.NotFound,
|
|
self.shares_client.get_security_service, "")
|
|
|
|
@tc.attr(base.TAG_NEGATIVE, base.TAG_API)
|
|
def test_try_get_security_service_with_wrong_id(self):
|
|
self.assertRaises(lib_exc.NotFound,
|
|
self.shares_client.get_security_service,
|
|
"wrong_id")
|
|
|
|
@tc.attr(base.TAG_NEGATIVE, base.TAG_API)
|
|
def test_try_delete_security_service_without_id(self):
|
|
self.assertRaises(lib_exc.NotFound,
|
|
self.shares_client.delete_security_service, "")
|
|
|
|
@tc.attr(base.TAG_NEGATIVE, base.TAG_API)
|
|
def test_try_delete_security_service_with_wrong_type(self):
|
|
self.assertRaises(lib_exc.NotFound,
|
|
self.shares_client.delete_security_service,
|
|
"wrong_id")
|
|
|
|
@tc.attr(base.TAG_NEGATIVE, base.TAG_API)
|
|
def test_try_update_nonexistant_security_service(self):
|
|
self.assertRaises(lib_exc.NotFound,
|
|
self.shares_client.update_security_service,
|
|
"wrong_id", name="name")
|
|
|
|
@tc.attr(base.TAG_NEGATIVE, base.TAG_API)
|
|
def test_try_update_security_service_with_empty_id(self):
|
|
self.assertRaises(lib_exc.NotFound,
|
|
self.shares_client.update_security_service,
|
|
"", name="name")
|
|
|
|
@tc.attr(base.TAG_NEGATIVE, base.TAG_API_WITH_BACKEND)
|
|
@testtools.skipIf(
|
|
not CONF.share.multitenancy_enabled, "Only for multitenancy.")
|
|
def test_try_update_invalid_keys_sh_server_exists(self):
|
|
ss_data = self.generate_security_service_data()
|
|
ss = self.create_security_service(**ss_data)
|
|
|
|
sn = self.shares_client.get_share_network(
|
|
self.shares_client.share_network_id)
|
|
fresh_sn = self.create_share_network(
|
|
neutron_net_id=sn["neutron_net_id"],
|
|
neutron_subnet_id=sn["neutron_subnet_id"])
|
|
|
|
self.shares_client.add_sec_service_to_share_network(
|
|
fresh_sn["id"], ss["id"])
|
|
|
|
# Security service with fake data is used, so if we use backend driver
|
|
# that fails on wrong data, we expect error here.
|
|
# We require any share that uses our share-network.
|
|
try:
|
|
self.create_share(share_type_id=self.share_type_id,
|
|
share_network_id=fresh_sn["id"],
|
|
cleanup_in_class=False)
|
|
except Exception as e:
|
|
# we do wait for either 'error' or 'available' status because
|
|
# it is the only available statuses for proper deletion.
|
|
LOG.warning("Caught exception. It is expected in case backend "
|
|
"fails having security-service with improper data "
|
|
"that leads to share-server creation error. "
|
|
"%s", six.text_type(e))
|
|
|
|
self.assertRaises(lib_exc.Forbidden,
|
|
self.shares_client.update_security_service,
|
|
ss["id"],
|
|
user="new_user")
|
|
|
|
@tc.attr(base.TAG_NEGATIVE, base.TAG_API)
|
|
def test_get_deleted_security_service(self):
|
|
data = self.generate_security_service_data()
|
|
ss = self.create_security_service(**data)
|
|
self.assertDictContainsSubset(data, ss)
|
|
|
|
self.shares_client.delete_security_service(ss["id"])
|
|
|
|
# try get deleted security service entity
|
|
self.assertRaises(lib_exc.NotFound,
|
|
self.shares_client.get_security_service,
|
|
ss["id"])
|