00221d59b9
1.As mentioned in [1], we should avoid using six.iteritems to achieve iterators. We can use dict.items instead, as it will return iterators in PY3 as well. And dict.items/keys will more readable. 2.In py2, the performance about list should be negligible, see the link [2]. [1] https://wiki.openstack.org/wiki/Python3 [2] http://lists.openstack.org/pipermail/openstack-dev/2015-June/066391.html Change-Id: Ic68ba358d51002e1a1aeac6159248ffb730b5daf
265 lines
10 KiB
Python
265 lines
10 KiB
Python
# Copyright 2014 Mirantis Inc.
|
|
# All Rights Reserved.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
from tempest import config
|
|
import testtools
|
|
from testtools import testcase as tc
|
|
|
|
from manila_tempest_tests.tests.api import base
|
|
from manila_tempest_tests import utils
|
|
|
|
CONF = config.CONF
|
|
|
|
|
|
class ShareNetworkListMixin(object):
|
|
|
|
@tc.attr("gate", "smoke", )
|
|
@tc.attr(base.TAG_POSITIVE, base.TAG_API)
|
|
def test_list_share_networks(self):
|
|
listed = self.shares_client.list_share_networks()
|
|
any(self.sn_with_ldap_ss["id"] in sn["id"] for sn in listed)
|
|
|
|
# verify keys
|
|
keys = ["name", "id"]
|
|
[self.assertIn(key, sn.keys()) for sn in listed for key in keys]
|
|
|
|
@tc.attr(base.TAG_POSITIVE, base.TAG_API)
|
|
def test_list_share_networks_with_detail(self):
|
|
listed = self.shares_v2_client.list_share_networks_with_detail()
|
|
any(self.sn_with_ldap_ss["id"] in sn["id"] for sn in listed)
|
|
|
|
# verify keys
|
|
keys = [
|
|
"name", "id", "description", "network_type",
|
|
"project_id", "cidr", "ip_version",
|
|
"neutron_net_id", "neutron_subnet_id",
|
|
"created_at", "updated_at", "segmentation_id",
|
|
]
|
|
|
|
# In v2.18 and beyond, we expect gateway.
|
|
if utils.is_microversion_supported('2.18'):
|
|
keys.append('gateway')
|
|
|
|
# In v2.20 and beyond, we expect mtu.
|
|
if utils.is_microversion_supported('2.20'):
|
|
keys.append('mtu')
|
|
|
|
[self.assertIn(key, sn.keys()) for sn in listed for key in keys]
|
|
|
|
@tc.attr(base.TAG_POSITIVE, base.TAG_API)
|
|
def test_list_share_networks_filter_by_ss(self):
|
|
listed = self.shares_client.list_share_networks_with_detail(
|
|
{'security_service_id': self.ss_ldap['id']})
|
|
self.assertTrue(any(self.sn_with_ldap_ss['id'] == sn['id']
|
|
for sn in listed))
|
|
for sn in listed:
|
|
ss_list = self.shares_client.list_sec_services_for_share_network(
|
|
sn['id'])
|
|
self.assertTrue(any(ss['id'] == self.ss_ldap['id']
|
|
for ss in ss_list))
|
|
|
|
@tc.attr(base.TAG_POSITIVE, base.TAG_API)
|
|
def test_list_share_networks_all_filter_opts(self):
|
|
valid_filter_opts = {
|
|
'created_before': '2002-10-10',
|
|
'created_since': '2001-01-01',
|
|
'neutron_net_id': '1111',
|
|
'neutron_subnet_id': '2222',
|
|
'network_type': 'vlan',
|
|
'segmentation_id': 1000,
|
|
'cidr': '10.0.0.0/24',
|
|
'ip_version': 4,
|
|
'name': 'sn_with_ldap_ss'
|
|
}
|
|
|
|
listed = self.shares_client.list_share_networks_with_detail(
|
|
valid_filter_opts)
|
|
self.assertTrue(any(self.sn_with_ldap_ss['id'] == sn['id']
|
|
for sn in listed))
|
|
created_before = valid_filter_opts.pop('created_before')
|
|
created_since = valid_filter_opts.pop('created_since')
|
|
for sn in listed:
|
|
self.assertTrue(all(sn[key] == value for key, value in
|
|
valid_filter_opts.items()))
|
|
self.assertLessEqual(sn['created_at'], created_before)
|
|
self.assertGreaterEqual(sn['created_at'], created_since)
|
|
|
|
|
|
class ShareNetworksTest(base.BaseSharesTest, ShareNetworkListMixin):
|
|
|
|
@classmethod
|
|
def resource_setup(cls):
|
|
super(ShareNetworksTest, cls).resource_setup()
|
|
ss_data = cls.generate_security_service_data()
|
|
cls.ss_ldap = cls.create_security_service(**ss_data)
|
|
|
|
cls.data_sn_with_ldap_ss = {
|
|
'name': 'sn_with_ldap_ss',
|
|
'neutron_net_id': '1111',
|
|
'neutron_subnet_id': '2222',
|
|
'created_at': '2002-02-02',
|
|
'updated_at': None,
|
|
'network_type': 'vlan',
|
|
'segmentation_id': 1000,
|
|
'cidr': '10.0.0.0/24',
|
|
'ip_version': 4,
|
|
'description': 'fake description',
|
|
}
|
|
cls.sn_with_ldap_ss = cls.create_share_network(
|
|
cleanup_in_class=True,
|
|
**cls.data_sn_with_ldap_ss)
|
|
|
|
cls.shares_client.add_sec_service_to_share_network(
|
|
cls.sn_with_ldap_ss["id"],
|
|
cls.ss_ldap["id"])
|
|
|
|
cls.data_sn_with_kerberos_ss = {
|
|
'name': 'sn_with_kerberos_ss',
|
|
'created_at': '2003-03-03',
|
|
'updated_at': None,
|
|
'neutron_net_id': 'test net id',
|
|
'neutron_subnet_id': 'test subnet id',
|
|
'network_type': 'local',
|
|
'segmentation_id': 2000,
|
|
'cidr': '10.0.0.0/13',
|
|
'ip_version': 6,
|
|
'description': 'fake description',
|
|
}
|
|
|
|
cls.ss_kerberos = cls.create_security_service(
|
|
ss_type='kerberos',
|
|
**cls.data_sn_with_ldap_ss)
|
|
|
|
cls.sn_with_kerberos_ss = cls.create_share_network(
|
|
cleanup_in_class=True,
|
|
**cls.data_sn_with_kerberos_ss)
|
|
|
|
cls.shares_client.add_sec_service_to_share_network(
|
|
cls.sn_with_kerberos_ss["id"],
|
|
cls.ss_kerberos["id"])
|
|
|
|
@tc.attr(base.TAG_POSITIVE, base.TAG_API)
|
|
def test_create_delete_share_network(self):
|
|
# generate data for share network
|
|
data = self.generate_share_network_data()
|
|
|
|
# create share network
|
|
created = self.shares_client.create_share_network(**data)
|
|
self.assertDictContainsSubset(data, created)
|
|
|
|
# Delete share_network
|
|
self.shares_client.delete_share_network(created["id"])
|
|
|
|
@tc.attr(base.TAG_POSITIVE, base.TAG_API)
|
|
def test_get_share_network(self):
|
|
get = self.shares_client.get_share_network(self.sn_with_ldap_ss["id"])
|
|
self.assertEqual('2002-02-02T00:00:00.000000', get['created_at'])
|
|
data = self.data_sn_with_ldap_ss.copy()
|
|
del data['created_at']
|
|
self.assertDictContainsSubset(data, get)
|
|
|
|
@tc.attr(base.TAG_POSITIVE, base.TAG_API)
|
|
def test_update_share_network(self):
|
|
update_data = self.generate_share_network_data()
|
|
updated = self.shares_client.update_share_network(
|
|
self.sn_with_ldap_ss["id"],
|
|
**update_data)
|
|
self.assertDictContainsSubset(update_data, updated)
|
|
|
|
@tc.attr(base.TAG_POSITIVE, base.TAG_API_WITH_BACKEND)
|
|
@testtools.skipIf(
|
|
not CONF.share.multitenancy_enabled, "Only for multitenancy.")
|
|
def test_update_valid_keys_sh_server_exists(self):
|
|
self.create_share(cleanup_in_class=False)
|
|
update_dict = {
|
|
"name": "new_name",
|
|
"description": "new_description",
|
|
}
|
|
updated = self.shares_client.update_share_network(
|
|
self.shares_client.share_network_id, **update_dict)
|
|
self.assertDictContainsSubset(update_dict, updated)
|
|
|
|
@tc.attr(base.TAG_POSITIVE, base.TAG_API)
|
|
def test_recreate_share_network(self):
|
|
# generate data for share network
|
|
data = self.generate_share_network_data()
|
|
|
|
# create share network
|
|
sn1 = self.shares_client.create_share_network(**data)
|
|
self.assertDictContainsSubset(data, sn1)
|
|
|
|
# Delete first share network
|
|
self.shares_client.delete_share_network(sn1["id"])
|
|
|
|
# create second share network with same data
|
|
sn2 = self.shares_client.create_share_network(**data)
|
|
self.assertDictContainsSubset(data, sn2)
|
|
|
|
# Delete second share network
|
|
self.shares_client.delete_share_network(sn2["id"])
|
|
|
|
@tc.attr(base.TAG_POSITIVE, base.TAG_API)
|
|
def test_create_two_share_networks_with_same_net_and_subnet(self):
|
|
# generate data for share network
|
|
data = self.generate_share_network_data()
|
|
|
|
# create first share network
|
|
sn1 = self.create_share_network(**data)
|
|
self.assertDictContainsSubset(data, sn1)
|
|
|
|
# create second share network
|
|
sn2 = self.create_share_network(**data)
|
|
self.assertDictContainsSubset(data, sn2)
|
|
|
|
@testtools.skipUnless(CONF.share.create_networks_when_multitenancy_enabled,
|
|
"Only for setups with network creation.")
|
|
@testtools.skipUnless(CONF.share.multitenancy_enabled,
|
|
"Only for multitenancy.")
|
|
@testtools.skipUnless(CONF.service_available.neutron, "Only with neutron.")
|
|
@base.skip_if_microversion_lt("2.18")
|
|
@tc.attr(base.TAG_POSITIVE, base.TAG_API_WITH_BACKEND)
|
|
def test_gateway_with_neutron(self):
|
|
os = getattr(self, 'os_%s' % self.credentials[0])
|
|
subnet_client = os.subnets_client
|
|
|
|
self.create_share(cleanup_in_class=False)
|
|
share_net_details = self.shares_v2_client.get_share_network(
|
|
self.shares_v2_client.share_network_id)
|
|
subnet_details = subnet_client.show_subnet(
|
|
share_net_details['neutron_subnet_id'])
|
|
|
|
self.assertEqual(subnet_details['subnet']['gateway_ip'],
|
|
share_net_details['gateway'])
|
|
|
|
@testtools.skipUnless(CONF.share.create_networks_when_multitenancy_enabled,
|
|
"Only for setups with network creation.")
|
|
@testtools.skipUnless(CONF.share.multitenancy_enabled,
|
|
"Only for multitenancy.")
|
|
@testtools.skipUnless(CONF.service_available.neutron, "Only with neutron.")
|
|
@base.skip_if_microversion_lt("2.20")
|
|
@tc.attr(base.TAG_POSITIVE, base.TAG_API_WITH_BACKEND)
|
|
def test_mtu_with_neutron(self):
|
|
os = getattr(self, 'os_%s' % self.credentials[0])
|
|
network_client = os.networks_client
|
|
|
|
self.create_share(cleanup_in_class=False)
|
|
share_net_details = self.shares_v2_client.get_share_network(
|
|
self.shares_v2_client.share_network_id)
|
|
network_details = network_client.show_network(
|
|
share_net_details['neutron_net_id'])
|
|
|
|
self.assertEqual(network_details['network']['mtu'],
|
|
share_net_details['mtu'])
|