neutron-lbaas/neutron_lbaas/tests/tempest/lib/clients.py
Ken'ichi Ohmichi d27692a1dd Remove unused compute clients
Some compute clients of Tempest-like tests are not used at all.
So this patch removes these clients' implementation.

Change-Id: I64a928c4468b93ed5a1f7f2cadd975785274f745
2016-01-18 10:48:22 +00:00

357 lines
18 KiB
Python

# Copyright 2012 OpenStack Foundation
# All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
import copy
from tempest_lib.services.identity.v2.token_client import TokenClientJSON
from tempest_lib.services.identity.v3.token_client import V3TokenClientJSON
from neutron_lbaas.tests.tempest.lib.common import cred_provider
from neutron_lbaas.tests.tempest.lib import config
from neutron_lbaas.tests.tempest.lib import exceptions
from neutron_lbaas.tests.tempest.lib import manager
from neutron_lbaas.tests.tempest.lib.services.compute.json.floating_ips_client import \
FloatingIPsClientJSON
from neutron_lbaas.tests.tempest.lib.services.compute.json.images_client import ImagesClientJSON
from neutron_lbaas.tests.tempest.lib.services.compute.json.keypairs_client import KeyPairsClientJSON
from neutron_lbaas.tests.tempest.lib.services.compute.json.networks_client import NetworksClientJSON
from neutron_lbaas.tests.tempest.lib.services.compute.json.security_groups_client import \
SecurityGroupsClientJSON
from neutron_lbaas.tests.tempest.lib.services.compute.json.servers_client import ServersClientJSON
from neutron_lbaas.tests.tempest.lib.services.database.json.flavors_client import \
DatabaseFlavorsClientJSON
from neutron_lbaas.tests.tempest.lib.services.database.json.limits_client import \
DatabaseLimitsClientJSON
from neutron_lbaas.tests.tempest.lib.services.database.json.versions_client import \
DatabaseVersionsClientJSON
from neutron_lbaas.tests.tempest.lib.services.identity.v2.json.identity_client import \
IdentityClientJSON
from neutron_lbaas.tests.tempest.lib.services.identity.v3.json.credentials_client import \
CredentialsClientJSON
from neutron_lbaas.tests.tempest.lib.services.identity.v3.json.endpoints_client import \
EndPointClientJSON
from neutron_lbaas.tests.tempest.lib.services.identity.v3.json.identity_client import \
IdentityV3ClientJSON
from neutron_lbaas.tests.tempest.lib.services.identity.v3.json.policy_client import PolicyClientJSON
from neutron_lbaas.tests.tempest.lib.services.identity.v3.json.region_client import RegionClientJSON
from neutron_lbaas.tests.tempest.lib.services.identity.v3.json.service_client import \
ServiceClientJSON
from neutron_lbaas.tests.tempest.lib.services.image.v1.json.image_client import ImageClientJSON
from neutron_lbaas.tests.tempest.lib.services.image.v2.json.image_client import ImageClientV2JSON
from neutron_lbaas.tests.tempest.lib.services.network.json.network_client import NetworkClientJSON
from neutron_lbaas.tests.tempest.lib.services.orchestration.json.orchestration_client import \
OrchestrationClient
from neutron_lbaas.tests.tempest.lib.services.volume.json.snapshots_client import SnapshotsClientJSON
from neutron_lbaas.tests.tempest.lib.services.volume.json.volumes_client import VolumesClientJSON
from neutron_lbaas.tests.tempest.lib.services.volume.v2.json.snapshots_client import \
SnapshotsV2ClientJSON
from neutron_lbaas.tests.tempest.lib.services.volume.v2.json.volumes_client import VolumesV2ClientJSON
CONF = config.CONF
class Manager(manager.Manager):
"""
Top level manager for OpenStack tempest clients
"""
default_params = {
'disable_ssl_certificate_validation':
CONF.identity.disable_ssl_certificate_validation,
'ca_certs': CONF.identity.ca_certificates_file,
'trace_requests': CONF.debug.trace_requests
}
# NOTE: Tempest uses timeout values of compute API if project specific
# timeout values don't exist.
default_params_with_timeout_values = {
'build_interval': CONF.compute.build_interval,
'build_timeout': CONF.compute.build_timeout
}
default_params_with_timeout_values.update(default_params)
def __init__(self, credentials=None, service=None):
super(Manager, self).__init__(credentials=credentials)
self._set_compute_clients()
self._set_database_clients()
self._set_identity_clients()
self._set_volume_clients()
# self._set_object_storage_clients()
# self.baremetal_client = BaremetalClientJSON(
# self.auth_provider,
# CONF.baremetal.catalog_type,
# CONF.identity.region,
# endpoint_type=CONF.baremetal.endpoint_type,
# **self.default_params_with_timeout_values)
self.network_client = NetworkClientJSON(
self.auth_provider,
CONF.network.catalog_type,
CONF.network.region or CONF.identity.region,
endpoint_type=CONF.network.endpoint_type,
build_interval=CONF.network.build_interval,
build_timeout=CONF.network.build_timeout,
**self.default_params)
# self.messaging_client = MessagingClientJSON(
# self.auth_provider,
# CONF.messaging.catalog_type,
# CONF.identity.region,
# **self.default_params_with_timeout_values)
# if CONF.service_available.ceilometer:
# self.telemetry_client = TelemetryClientJSON(
# self.auth_provider,
# CONF.telemetry.catalog_type,
# CONF.identity.region,
# endpoint_type=CONF.telemetry.endpoint_type,
# **self.default_params_with_timeout_values)
if CONF.service_available.glance:
self.image_client = ImageClientJSON(
self.auth_provider,
CONF.image.catalog_type,
CONF.image.region or CONF.identity.region,
endpoint_type=CONF.image.endpoint_type,
build_interval=CONF.image.build_interval,
build_timeout=CONF.image.build_timeout,
**self.default_params)
self.image_client_v2 = ImageClientV2JSON(
self.auth_provider,
CONF.image.catalog_type,
CONF.image.region or CONF.identity.region,
endpoint_type=CONF.image.endpoint_type,
build_interval=CONF.image.build_interval,
build_timeout=CONF.image.build_timeout,
**self.default_params)
self.orchestration_client = OrchestrationClient(
self.auth_provider,
CONF.orchestration.catalog_type,
CONF.orchestration.region or CONF.identity.region,
endpoint_type=CONF.orchestration.endpoint_type,
build_interval=CONF.orchestration.build_interval,
build_timeout=CONF.orchestration.build_timeout,
**self.default_params)
# self.data_processing_client = DataProcessingClient(
# self.auth_provider,
# CONF.data_processing.catalog_type,
# CONF.identity.region,
# endpoint_type=CONF.data_processing.endpoint_type,
# **self.default_params_with_timeout_values)
# self.negative_client = negative_rest_client.NegativeRestClient(
# self.auth_provider, service, **self.default_params)
# Generating EC2 credentials in tempest is only supported
# with identity v2
# if CONF.identity_feature_enabled.api_v2 and \
# CONF.identity.auth_version == 'v2':
# # EC2 and S3 clients, if used, will check onfigured AWS credentials
# # and generate new ones if needed
# self.ec2api_client = botoclients.APIClientEC2(self.identity_client)
# self.s3_client = botoclients.ObjectClientS3(self.identity_client)
def _set_compute_clients(self):
params = {
'service': CONF.compute.catalog_type,
'region': CONF.compute.region or CONF.identity.region,
'endpoint_type': CONF.compute.endpoint_type,
'build_interval': CONF.compute.build_interval,
'build_timeout': CONF.compute.build_timeout
}
params.update(self.default_params)
# self.agents_client = AgentsClientJSON(self.auth_provider, **params)
self.networks_client = NetworksClientJSON(self.auth_provider, **params)
# self.migrations_client = MigrationsClientJSON(self.auth_provider,
# **params)
# self.security_group_default_rules_client = (
# SecurityGroupDefaultRulesClientJSON(self.auth_provider, **params))
# self.certificates_client = CertificatesClientJSON(self.auth_provider,
# **params)
self.servers_client = ServersClientJSON(
self.auth_provider,
enable_instance_password=CONF.compute_feature_enabled
.enable_instance_password, **params)
# self.limits_client = LimitsClientJSON(self.auth_provider, **params)
self.images_client = ImagesClientJSON(self.auth_provider, **params)
self.keypairs_client = KeyPairsClientJSON(self.auth_provider, **params)
# self.quotas_client = QuotasClientJSON(self.auth_provider, **params)
# self.quota_classes_client = QuotaClassesClientJSON(self.auth_provider,
# **params)
# self.extensions_client = ExtensionsClientJSON(self.auth_provider,
# **params)
self.floating_ips_client = FloatingIPsClientJSON(self.auth_provider,
**params)
self.security_groups_client = SecurityGroupsClientJSON(
self.auth_provider, **params)
# self.fixed_ips_client = FixedIPsClientJSON(self.auth_provider,
# **params)
# self.availability_zone_client = AvailabilityZoneClientJSON(
# self.auth_provider, **params)
# self.aggregates_client = AggregatesClientJSON(self.auth_provider,
# **params)
# self.services_client = ServicesClientJSON(self.auth_provider, **params)
# self.tenant_usages_client = TenantUsagesClientJSON(self.auth_provider,
# **params)
# self.hosts_client = HostsClientJSON(self.auth_provider, **params)
# self.hypervisor_client = HypervisorClientJSON(self.auth_provider,
# **params)
# self.instance_usages_audit_log_client = \
# InstanceUsagesAuditLogClientJSON(self.auth_provider, **params)
# self.baremetal_nodes_client = BaremetalNodesClientJSON(
# self.auth_provider, **params)
# # NOTE: The following client needs special timeout values because
# # the API is a proxy for the other component.
# params_volume = copy.deepcopy(params)
# params_volume.update({
# 'build_interval': CONF.volume.build_interval,
# 'build_timeout': CONF.volume.build_timeout
# })
# self.volumes_extensions_client = VolumesExtensionsClientJSON(
# self.auth_provider, default_volume_size=CONF.volume.volume_size,
# **params_volume)
def _set_database_clients(self):
self.database_flavors_client = DatabaseFlavorsClientJSON(
self.auth_provider,
CONF.database.catalog_type,
CONF.identity.region,
**self.default_params_with_timeout_values)
self.database_limits_client = DatabaseLimitsClientJSON(
self.auth_provider,
CONF.database.catalog_type,
CONF.identity.region,
**self.default_params_with_timeout_values)
self.database_versions_client = DatabaseVersionsClientJSON(
self.auth_provider,
CONF.database.catalog_type,
CONF.identity.region,
**self.default_params_with_timeout_values)
def _set_identity_clients(self):
params = {
'service': CONF.identity.catalog_type,
'region': CONF.identity.region,
'endpoint_type': 'adminURL'
}
params.update(self.default_params_with_timeout_values)
self.identity_client = IdentityClientJSON(self.auth_provider,
**params)
self.identity_v3_client = IdentityV3ClientJSON(self.auth_provider,
**params)
self.endpoints_client = EndPointClientJSON(self.auth_provider,
**params)
self.service_client = ServiceClientJSON(self.auth_provider, **params)
self.policy_client = PolicyClientJSON(self.auth_provider, **params)
self.region_client = RegionClientJSON(self.auth_provider, **params)
self.credentials_client = CredentialsClientJSON(self.auth_provider,
**params)
# Token clients do not use the catalog. They only need default_params.
# They read auth_url, so they should only be set if the corresponding
# API version is marked as enabled
if CONF.identity_feature_enabled.api_v2:
if CONF.identity.uri:
self.token_client = TokenClientJSON(
CONF.identity.uri, **self.default_params)
else:
msg = 'Identity v2 API enabled, but no identity.uri set'
raise exceptions.InvalidConfiguration(msg)
if CONF.identity_feature_enabled.api_v3:
if CONF.identity.uri_v3:
self.token_v3_client = V3TokenClientJSON(
CONF.identity.uri_v3, **self.default_params)
else:
msg = 'Identity v3 API enabled, but no identity.uri_v3 set'
raise exceptions.InvalidConfiguration(msg)
def _set_volume_clients(self):
params = {
'service': CONF.volume.catalog_type,
'region': CONF.volume.region or CONF.identity.region,
'endpoint_type': CONF.volume.endpoint_type,
'build_interval': CONF.volume.build_interval,
'build_timeout': CONF.volume.build_timeout
}
params.update(self.default_params)
# self.volume_qos_client = QosSpecsClientJSON(self.auth_provider,
# **params)
# self.volume_qos_v2_client = QosSpecsV2ClientJSON(
# self.auth_provider, **params)
# self.volume_services_v2_client = VolumesServicesV2ClientJSON(
# self.auth_provider, **params)
# self.backups_client = BackupsClientJSON(self.auth_provider, **params)
# self.backups_v2_client = BackupsClientV2JSON(self.auth_provider,
# **params)
self.snapshots_client = SnapshotsClientJSON(self.auth_provider,
**params)
self.snapshots_v2_client = SnapshotsV2ClientJSON(self.auth_provider,
**params)
self.volumes_client = VolumesClientJSON(
self.auth_provider, default_volume_size=CONF.volume.volume_size,
**params)
self.volumes_v2_client = VolumesV2ClientJSON(
self.auth_provider, default_volume_size=CONF.volume.volume_size,
**params)
# self.volume_types_client = VolumeTypesClientJSON(self.auth_provider,
# **params)
# self.volume_services_client = VolumesServicesClientJSON(
# self.auth_provider, **params)
# self.volume_hosts_client = VolumeHostsClientJSON(self.auth_provider,
# **params)
# self.volume_hosts_v2_client = VolumeHostsV2ClientJSON(
# self.auth_provider, **params)
# self.volume_quotas_client = VolumeQuotasClientJSON(self.auth_provider,
# **params)
# self.volume_quotas_v2_client = VolumeQuotasV2Client(self.auth_provider,
# **params)
# self.volumes_extension_client = VolumeExtensionClientJSON(
# self.auth_provider, **params)
# self.volumes_v2_extension_client = VolumeV2ExtensionClientJSON(
# self.auth_provider, **params)
# self.volume_availability_zone_client = \
# VolumeAvailabilityZoneClientJSON(self.auth_provider, **params)
# self.volume_v2_availability_zone_client = \
# VolumeV2AvailabilityZoneClientJSON(self.auth_provider, **params)
# self.volume_types_v2_client = VolumeTypesV2ClientJSON(
# self.auth_provider, **params)
# def _set_object_storage_clients(self):
# params = {
# 'service': CONF.object_storage.catalog_type,
# 'region': CONF.object_storage.region or CONF.identity.region,
# 'endpoint_type': CONF.object_storage.endpoint_type
# }
# params.update(self.default_params_with_timeout_values)
# self.account_client = AccountClient(self.auth_provider, **params)
# self.container_client = ContainerClient(self.auth_provider, **params)
# self.object_client = ObjectClient(self.auth_provider, **params)
class AdminManager(Manager):
"""
Manager object that uses the admin credentials for its
managed client objects
"""
def __init__(self, service=None):
super(AdminManager, self).__init__(
credentials=cred_provider.get_configured_credentials(
'identity_admin'),
service=service)