09798caae1
Make use of the Tempest plugin interface instead of copying Manila files into Tempest. This will remove the burden to port Manila tests onto Tempest master recurrently. This ports all existing Manila Tempest test to the new structure. It uses manila_tempest_tests as new top folder for all Tempest tests. It follow the model of Heat (see [1]). [1]: https://github.com/openstack/heat/tree/master/heat_integrationtests Change-Id: Ie5ed64a6777ed1acf8dd56522c26705ae897596d Partly-implements: bp tempest-plugin-interface Depends-On: I26dd32b1de8cceeaa6dc674092efec683df71889
129 lines
5.3 KiB
Python
129 lines
5.3 KiB
Python
# Copyright 2014 Mirantis Inc.
|
|
# All Rights Reserved.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
from oslo_log import log # noqa
|
|
import six # noqa
|
|
from tempest import config # noqa
|
|
from tempest import test # noqa
|
|
from tempest_lib import exceptions as lib_exc # noqa
|
|
import testtools # noqa
|
|
|
|
from manila_tempest_tests.tests.api import base
|
|
|
|
CONF = config.CONF
|
|
LOG = log.getLogger(__name__)
|
|
|
|
|
|
class SecurityServicesNegativeTest(base.BaseSharesTest):
|
|
|
|
@test.attr(type=["gate", "smoke", "negative"])
|
|
def test_try_create_security_service_with_empty_type(self):
|
|
self.assertRaises(lib_exc.BadRequest,
|
|
self.shares_client.create_security_service, "")
|
|
|
|
@test.attr(type=["gate", "smoke", "negative"])
|
|
def test_try_create_security_service_with_wrong_type(self):
|
|
self.assertRaises(lib_exc.BadRequest,
|
|
self.shares_client.create_security_service,
|
|
"wrong_type")
|
|
|
|
@test.attr(type=["gate", "smoke", "negative"])
|
|
def test_try_get_security_service_without_id(self):
|
|
self.assertRaises(lib_exc.NotFound,
|
|
self.shares_client.get_security_service, "")
|
|
|
|
@test.attr(type=["gate", "smoke", "negative"])
|
|
def test_try_get_security_service_with_wrong_id(self):
|
|
self.assertRaises(lib_exc.NotFound,
|
|
self.shares_client.get_security_service,
|
|
"wrong_id")
|
|
|
|
@test.attr(type=["gate", "smoke", "negative"])
|
|
def test_try_delete_security_service_without_id(self):
|
|
self.assertRaises(lib_exc.NotFound,
|
|
self.shares_client.delete_security_service, "")
|
|
|
|
@test.attr(type=["gate", "smoke", "negative"])
|
|
def test_try_delete_security_service_with_wrong_type(self):
|
|
self.assertRaises(lib_exc.NotFound,
|
|
self.shares_client.delete_security_service,
|
|
"wrong_id")
|
|
|
|
@test.attr(type=["gate", "smoke", "negative"])
|
|
def test_try_update_nonexistant_security_service(self):
|
|
self.assertRaises(lib_exc.NotFound,
|
|
self.shares_client.update_security_service,
|
|
"wrong_id", name="name")
|
|
|
|
@test.attr(type=["gate", "smoke", "negative"])
|
|
def test_try_update_security_service_with_empty_id(self):
|
|
self.assertRaises(lib_exc.NotFound,
|
|
self.shares_client.update_security_service,
|
|
"", name="name")
|
|
|
|
@test.attr(type=["gate", "smoke", "negative"])
|
|
@testtools.skipIf(
|
|
not CONF.share.multitenancy_enabled, "Only for multitenancy.")
|
|
def test_try_update_invalid_keys_sh_server_exists(self):
|
|
ss_data = self.generate_security_service_data()
|
|
ss = self.create_security_service(**ss_data)
|
|
|
|
sn = self.shares_client.get_share_network(
|
|
self.os.shares_client.share_network_id)
|
|
fresh_sn = self.create_share_network(
|
|
neutron_net_id=sn["neutron_net_id"],
|
|
neutron_subnet_id=sn["neutron_subnet_id"])
|
|
|
|
self.shares_client.add_sec_service_to_share_network(
|
|
fresh_sn["id"], ss["id"])
|
|
|
|
# Security service with fake data is used, so if we use backend driver
|
|
# that fails on wrong data, we expect error here.
|
|
# We require any share that uses our share-network.
|
|
try:
|
|
self.create_share(
|
|
share_network_id=fresh_sn["id"], cleanup_in_class=False)
|
|
except Exception as e:
|
|
# we do wait for either 'error' or 'available' status because
|
|
# it is the only available statuses for proper deletion.
|
|
LOG.warning("Caught exception. It is expected in case backend "
|
|
"fails having security-service with improper data "
|
|
"that leads to share-server creation error. "
|
|
"%s" % six.text_type(e))
|
|
|
|
self.assertRaises(lib_exc.Forbidden,
|
|
self.shares_client.update_security_service,
|
|
ss["id"],
|
|
user="new_user")
|
|
|
|
@test.attr(type=["gate", "smoke", "negative"])
|
|
def test_get_deleted_security_service(self):
|
|
data = self.generate_security_service_data()
|
|
ss = self.create_security_service(**data)
|
|
self.assertDictContainsSubset(data, ss)
|
|
|
|
self.shares_client.delete_security_service(ss["id"])
|
|
|
|
# try get deleted security service entity
|
|
self.assertRaises(lib_exc.NotFound,
|
|
self.shares_client.get_security_service,
|
|
ss["id"])
|
|
|
|
@test.attr(type=["gate", "smoke", "negative"])
|
|
def test_try_list_security_services_all_tenants(self):
|
|
self.assertRaises(lib_exc.Forbidden,
|
|
self.shares_client.list_security_services,
|
|
params={'all_tenants': 1})
|