49695bde47
Filter noqa is used to avoid expected pep8 failures. But now, tempest has lots of these without any reason. Therefore, remove this filter and unused modules that were discovered as unused without it. Change-Id: I96f8a4a7e7a302f08581eed9e037f388e4c86802
129 lines
5.3 KiB
Python
129 lines
5.3 KiB
Python
# Copyright 2014 Mirantis Inc.
|
|
# All Rights Reserved.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
from oslo_log import log
|
|
import six
|
|
from tempest import config
|
|
from tempest.lib import exceptions as lib_exc
|
|
from tempest import test
|
|
import testtools
|
|
|
|
from manila_tempest_tests.tests.api import base
|
|
|
|
CONF = config.CONF
|
|
LOG = log.getLogger(__name__)
|
|
|
|
|
|
class SecurityServicesNegativeTest(base.BaseSharesTest):
|
|
|
|
@test.attr(type=[base.TAG_NEGATIVE, base.TAG_API])
|
|
def test_try_create_security_service_with_empty_type(self):
|
|
self.assertRaises(lib_exc.BadRequest,
|
|
self.shares_client.create_security_service, "")
|
|
|
|
@test.attr(type=[base.TAG_NEGATIVE, base.TAG_API])
|
|
def test_try_create_security_service_with_wrong_type(self):
|
|
self.assertRaises(lib_exc.BadRequest,
|
|
self.shares_client.create_security_service,
|
|
"wrong_type")
|
|
|
|
@test.attr(type=[base.TAG_NEGATIVE, base.TAG_API])
|
|
def test_try_get_security_service_without_id(self):
|
|
self.assertRaises(lib_exc.NotFound,
|
|
self.shares_client.get_security_service, "")
|
|
|
|
@test.attr(type=[base.TAG_NEGATIVE, base.TAG_API])
|
|
def test_try_get_security_service_with_wrong_id(self):
|
|
self.assertRaises(lib_exc.NotFound,
|
|
self.shares_client.get_security_service,
|
|
"wrong_id")
|
|
|
|
@test.attr(type=[base.TAG_NEGATIVE, base.TAG_API])
|
|
def test_try_delete_security_service_without_id(self):
|
|
self.assertRaises(lib_exc.NotFound,
|
|
self.shares_client.delete_security_service, "")
|
|
|
|
@test.attr(type=[base.TAG_NEGATIVE, base.TAG_API])
|
|
def test_try_delete_security_service_with_wrong_type(self):
|
|
self.assertRaises(lib_exc.NotFound,
|
|
self.shares_client.delete_security_service,
|
|
"wrong_id")
|
|
|
|
@test.attr(type=[base.TAG_NEGATIVE, base.TAG_API])
|
|
def test_try_update_nonexistant_security_service(self):
|
|
self.assertRaises(lib_exc.NotFound,
|
|
self.shares_client.update_security_service,
|
|
"wrong_id", name="name")
|
|
|
|
@test.attr(type=[base.TAG_NEGATIVE, base.TAG_API])
|
|
def test_try_update_security_service_with_empty_id(self):
|
|
self.assertRaises(lib_exc.NotFound,
|
|
self.shares_client.update_security_service,
|
|
"", name="name")
|
|
|
|
@test.attr(type=[base.TAG_NEGATIVE, base.TAG_API_WITH_BACKEND])
|
|
@testtools.skipIf(
|
|
not CONF.share.multitenancy_enabled, "Only for multitenancy.")
|
|
def test_try_update_invalid_keys_sh_server_exists(self):
|
|
ss_data = self.generate_security_service_data()
|
|
ss = self.create_security_service(**ss_data)
|
|
|
|
sn = self.shares_client.get_share_network(
|
|
self.os.shares_client.share_network_id)
|
|
fresh_sn = self.create_share_network(
|
|
neutron_net_id=sn["neutron_net_id"],
|
|
neutron_subnet_id=sn["neutron_subnet_id"])
|
|
|
|
self.shares_client.add_sec_service_to_share_network(
|
|
fresh_sn["id"], ss["id"])
|
|
|
|
# Security service with fake data is used, so if we use backend driver
|
|
# that fails on wrong data, we expect error here.
|
|
# We require any share that uses our share-network.
|
|
try:
|
|
self.create_share(
|
|
share_network_id=fresh_sn["id"], cleanup_in_class=False)
|
|
except Exception as e:
|
|
# we do wait for either 'error' or 'available' status because
|
|
# it is the only available statuses for proper deletion.
|
|
LOG.warning("Caught exception. It is expected in case backend "
|
|
"fails having security-service with improper data "
|
|
"that leads to share-server creation error. "
|
|
"%s" % six.text_type(e))
|
|
|
|
self.assertRaises(lib_exc.Forbidden,
|
|
self.shares_client.update_security_service,
|
|
ss["id"],
|
|
user="new_user")
|
|
|
|
@test.attr(type=[base.TAG_NEGATIVE, base.TAG_API])
|
|
def test_get_deleted_security_service(self):
|
|
data = self.generate_security_service_data()
|
|
ss = self.create_security_service(**data)
|
|
self.assertDictContainsSubset(data, ss)
|
|
|
|
self.shares_client.delete_security_service(ss["id"])
|
|
|
|
# try get deleted security service entity
|
|
self.assertRaises(lib_exc.NotFound,
|
|
self.shares_client.get_security_service,
|
|
ss["id"])
|
|
|
|
@test.attr(type=[base.TAG_NEGATIVE, base.TAG_API])
|
|
def test_try_list_security_services_all_tenants(self):
|
|
self.assertRaises(lib_exc.Forbidden,
|
|
self.shares_client.list_security_services,
|
|
params={'all_tenants': 1})
|