da45177a2f
The tenant_id property of RestClient in tempest was deprecated in 25.0.0. This replaces the deprecated property by the new project_id property to avoid the following warning. WARNING tempest.lib.common.rest_client [-] Deprecated: "tenant_id" property is deprecated for removal, use "project_id" instead Depends-on: https://review.opendev.org/c/openstack/tempest/+/707938 Change-Id: Ie3c32f9f2278b78603a4214c5717df8691ba490a
294 lines
14 KiB
Python
294 lines
14 KiB
Python
# Copyright 2015 Hewlett-Packard Development Company, L.P.
|
|
# All Rights Reserved.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
import testtools
|
|
|
|
import netaddr
|
|
from oslo_utils import uuidutils
|
|
from tempest.common import utils
|
|
from tempest.lib.common.utils import data_utils
|
|
from tempest.lib import decorators
|
|
from tempest.lib import exceptions as lib_exc
|
|
|
|
from neutron_tempest_plugin.api import test_subnetpools
|
|
|
|
|
|
SUBNETPOOL_NAME = 'smoke-subnetpool'
|
|
|
|
|
|
class SubnetPoolsNegativeTestJSON(test_subnetpools.SubnetPoolsTestBase):
|
|
|
|
smaller_prefix = u'10.11.12.0/26'
|
|
|
|
@decorators.attr(type='negative')
|
|
@decorators.idempotent_id('0212a042-603a-4f46-99e0-e37de9374d30')
|
|
def test_get_non_existent_subnetpool(self):
|
|
non_exist_id = data_utils.rand_name('subnetpool')
|
|
self.assertRaises(lib_exc.NotFound, self.client.show_subnetpool,
|
|
non_exist_id)
|
|
|
|
@decorators.attr(type='negative')
|
|
@decorators.idempotent_id('dc9336e5-f28f-4658-a0b0-cc79e607007d')
|
|
def test_tenant_get_not_shared_admin_subnetpool(self):
|
|
created_subnetpool = self._create_subnetpool(is_admin=True)
|
|
# None-shared admin subnetpool cannot be retrieved by tenant user.
|
|
self.assertRaises(lib_exc.NotFound, self.client.show_subnetpool,
|
|
created_subnetpool['id'])
|
|
|
|
@decorators.attr(type='negative')
|
|
@decorators.idempotent_id('5e1f2f86-d81a-498c-82ed-32a49f4dc4d3')
|
|
def test_delete_non_existent_subnetpool(self):
|
|
non_exist_id = data_utils.rand_name('subnetpool')
|
|
self.assertRaises(lib_exc.NotFound, self.client.delete_subnetpool,
|
|
non_exist_id)
|
|
|
|
@decorators.attr(type='negative')
|
|
@decorators.idempotent_id('d1143fe2-212b-4e23-a308-d18f7d8d78d6')
|
|
def test_tenant_create_shared_subnetpool(self):
|
|
# 'shared' subnetpool can only be created by admin.
|
|
self.assertRaises(lib_exc.Forbidden, self._create_subnetpool,
|
|
is_admin=False, shared=True)
|
|
|
|
@decorators.attr(type='negative')
|
|
@decorators.idempotent_id('6ae09d8f-95be-40ed-b1cf-8b850d45bab5')
|
|
@utils.requires_ext(extension='default-subnetpools', service='network')
|
|
def test_tenant_create_default_subnetpool(self):
|
|
# 'default' subnetpool can only be created by admin.
|
|
self.assertRaises(lib_exc.Forbidden, self._create_subnetpool,
|
|
is_admin=False, is_default=True)
|
|
|
|
@decorators.attr(type='negative')
|
|
@decorators.idempotent_id('4be84d30-60ca-4bd3-8512-db5b36ce1378')
|
|
def test_update_non_existent_subnetpool(self):
|
|
non_exist_id = data_utils.rand_name('subnetpool')
|
|
self.assertRaises(lib_exc.NotFound, self.client.update_subnetpool,
|
|
non_exist_id, name='foo-name')
|
|
|
|
@decorators.attr(type='negative')
|
|
@decorators.idempotent_id('e6cd6d87-6173-45dd-bf04-c18ea7ec7537')
|
|
def test_update_subnetpool_not_modifiable_shared(self):
|
|
# 'shared' attributes can be specified during creation.
|
|
# But this attribute is not modifiable after creation.
|
|
created_subnetpool = self._create_subnetpool(is_admin=True)
|
|
pool_id = created_subnetpool['id']
|
|
self.assertRaises(lib_exc.BadRequest, self.client.update_subnetpool,
|
|
pool_id, shared=True)
|
|
|
|
@decorators.attr(type='negative')
|
|
@decorators.idempotent_id('62f7c43b-bff1-4def-8bb7-4754b840aaad')
|
|
def test_update_subnetpool_prefixes_shrink(self):
|
|
# Shrink current subnetpool prefixes is not supported
|
|
created_subnetpool = self._create_subnetpool()
|
|
self.assertRaises(lib_exc.BadRequest,
|
|
self.client.update_subnetpool,
|
|
created_subnetpool['id'],
|
|
prefixes=[self.smaller_prefix])
|
|
|
|
@decorators.attr(type='negative')
|
|
@decorators.idempotent_id('fc011824-153e-4469-97ad-9808eb88cae1')
|
|
def test_create_subnet_different_pools_same_network(self):
|
|
network = self.create_network(network_name='smoke-network')
|
|
created_subnetpool = self._create_subnetpool(
|
|
is_admin=True, prefixes=['192.168.0.0/16'])
|
|
subnet = self.create_subnet(
|
|
network, cidr=netaddr.IPNetwork('10.10.10.0/24'), ip_version=4,
|
|
gateway=None, client=self.admin_client)
|
|
# add the subnet created by admin to the cleanUp because
|
|
# the base.py doesn't delete it using the admin client
|
|
self.addCleanup(self.admin_client.delete_subnet, subnet['id'])
|
|
self.assertRaises(lib_exc.BadRequest, self.create_subnet, network,
|
|
ip_version=4,
|
|
subnetpool_id=created_subnetpool['id'],
|
|
client=self.admin_client)
|
|
|
|
@decorators.attr(type='negative')
|
|
@decorators.idempotent_id('9589e332-638e-476e-81bd-013d964aa3cb')
|
|
@utils.requires_ext(extension='address-scope', service='network')
|
|
def test_create_subnetpool_associate_invalid_address_scope(self):
|
|
self.assertRaises(lib_exc.BadRequest, self._create_subnetpool,
|
|
address_scope_id='foo-addr-scope')
|
|
|
|
@decorators.attr(type='negative')
|
|
@decorators.idempotent_id('3b6c5942-485d-4964-a560-55608af020b5')
|
|
@utils.requires_ext(extension='address-scope', service='network')
|
|
def test_create_subnetpool_associate_non_exist_address_scope(self):
|
|
self.assertRaises(lib_exc.NotFound, self._create_subnetpool,
|
|
address_scope_id=uuidutils.generate_uuid())
|
|
|
|
@decorators.attr(type='negative')
|
|
@decorators.idempotent_id('2dfb4269-8657-485a-a053-b022e911456e')
|
|
@utils.requires_ext(extension='address-scope', service='network')
|
|
def test_create_subnetpool_associate_address_scope_prefix_intersect(self):
|
|
address_scope = self.create_address_scope(
|
|
name=data_utils.rand_name('smoke-address-scope'),
|
|
ip_version=4)
|
|
addr_scope_id = address_scope['id']
|
|
self._create_subnetpool(address_scope_id=addr_scope_id)
|
|
subnetpool_data = {'name': 'foo-subnetpool',
|
|
'prefixes': [u'10.11.12.13/24'],
|
|
'min_prefixlen': '29',
|
|
'address_scope_id': addr_scope_id}
|
|
self.assertRaises(lib_exc.Conflict, self._create_subnetpool,
|
|
**subnetpool_data)
|
|
|
|
@decorators.attr(type='negative')
|
|
@decorators.idempotent_id('83a19a13-5384-42e2-b579-43fc69c80914')
|
|
@utils.requires_ext(extension='address-scope', service='network')
|
|
def test_create_sp_associate_address_scope_multiple_prefix_intersect(self):
|
|
address_scope = self.create_address_scope(
|
|
name=data_utils.rand_name('smoke-address-scope'),
|
|
ip_version=4)
|
|
addr_scope_id = address_scope['id']
|
|
self._create_subnetpool(prefixes=[u'20.0.0.0/18', u'30.0.0.0/18'],
|
|
address_scope_id=addr_scope_id)
|
|
prefixes = [u'40.0.0.0/18', u'50.0.0.0/18', u'30.0.0.0/12']
|
|
subnetpool_data = {'name': 'foo-subnetpool',
|
|
'prefixes': prefixes,
|
|
'min_prefixlen': '29',
|
|
'address_scope_id': addr_scope_id}
|
|
self.assertRaises(lib_exc.Conflict, self._create_subnetpool,
|
|
**subnetpool_data)
|
|
|
|
@decorators.attr(type='negative')
|
|
@decorators.idempotent_id('f06d8e7b-908b-4e94-b570-8156be6a4bf1')
|
|
@utils.requires_ext(extension='address-scope', service='network')
|
|
def test_create_subnetpool_associate_address_scope_of_other_owner(self):
|
|
address_scope = self.create_address_scope(
|
|
name=data_utils.rand_name('smoke-address-scope'), is_admin=True,
|
|
ip_version=4)
|
|
self.assertRaises(lib_exc.NotFound, self._create_subnetpool,
|
|
address_scope_id=address_scope['id'])
|
|
|
|
@decorators.attr(type='negative')
|
|
@decorators.idempotent_id('3396ec6c-cb80-4ebe-b897-84e904580bdf')
|
|
@testtools.skipIf(
|
|
utils.is_extension_enabled('rbac-address-scope', 'network'),
|
|
reason="Test is outdated starting from Ussuri release."
|
|
)
|
|
@utils.requires_ext(extension='address-scope', service='network')
|
|
def test_tenant_create_subnetpool_associate_shared_address_scope(self):
|
|
address_scope = self.create_address_scope(
|
|
name=data_utils.rand_name('smoke-address-scope'), is_admin=True,
|
|
shared=True, ip_version=4)
|
|
self.assertRaises(lib_exc.BadRequest, self._create_subnetpool,
|
|
address_scope_id=address_scope['id'])
|
|
|
|
@decorators.attr(type='negative')
|
|
@decorators.idempotent_id('6d3d9ad5-32d4-4d63-aa00-8c62f73e2881')
|
|
@utils.requires_ext(extension='address-scope', service='network')
|
|
def test_update_subnetpool_associate_address_scope_of_other_owner(self):
|
|
address_scope = self.create_address_scope(
|
|
name=data_utils.rand_name('smoke-address-scope'), is_admin=True,
|
|
ip_version=4)
|
|
address_scope_id = address_scope['id']
|
|
created_subnetpool = self._create_subnetpool(self.client)
|
|
self.assertRaises(lib_exc.NotFound, self.client.update_subnetpool,
|
|
created_subnetpool['id'],
|
|
address_scope_id=address_scope_id)
|
|
|
|
def _test_update_subnetpool_prefix_intersect_helper(
|
|
self, pool_1_prefixes, pool_2_prefixes, pool_1_updated_prefixes):
|
|
# create two subnet pools associating to an address scope.
|
|
# Updating the first subnet pool with the prefix intersecting
|
|
# with the second one should be a failure
|
|
address_scope = self.create_address_scope(
|
|
name=data_utils.rand_name('smoke-address-scope'), ip_version=4)
|
|
addr_scope_id = address_scope['id']
|
|
pool_values = {'address_scope_id': addr_scope_id,
|
|
'prefixes': pool_1_prefixes}
|
|
created_subnetpool_1 = self._create_subnetpool(**pool_values)
|
|
pool_id_1 = created_subnetpool_1['id']
|
|
pool_values = {'address_scope_id': addr_scope_id,
|
|
'prefixes': pool_2_prefixes}
|
|
self._create_subnetpool(**pool_values)
|
|
# now update the pool_id_1 with the prefix intersecting with
|
|
# pool_id_2
|
|
self.assertRaises(lib_exc.Conflict, self.client.update_subnetpool,
|
|
pool_id_1, prefixes=pool_1_updated_prefixes)
|
|
|
|
@decorators.attr(type='negative')
|
|
@decorators.idempotent_id('96006292-7214-40e0-a471-153fb76e6b31')
|
|
@utils.requires_ext(extension='address-scope', service='network')
|
|
def test_update_subnetpool_prefix_intersect(self):
|
|
pool_1_prefix = [u'20.0.0.0/18']
|
|
pool_2_prefix = [u'20.10.0.0/24']
|
|
pool_1_updated_prefix = [u'20.0.0.0/12']
|
|
self._test_update_subnetpool_prefix_intersect_helper(
|
|
pool_1_prefix, pool_2_prefix, pool_1_updated_prefix)
|
|
|
|
@decorators.attr(type='negative')
|
|
@decorators.idempotent_id('4d3f8a79-c530-4e59-9acf-6c05968adbfe')
|
|
@utils.requires_ext(extension='address-scope', service='network')
|
|
def test_update_subnetpool_multiple_prefix_intersect(self):
|
|
pool_1_prefixes = [u'20.0.0.0/18', u'30.0.0.0/18']
|
|
pool_2_prefixes = [u'20.10.0.0/24', u'40.0.0.0/18', '50.0.0.0/18']
|
|
pool_1_updated_prefixes = [u'20.0.0.0/18', u'30.0.0.0/18',
|
|
u'50.0.0.0/12']
|
|
self._test_update_subnetpool_prefix_intersect_helper(
|
|
pool_1_prefixes, pool_2_prefixes, pool_1_updated_prefixes)
|
|
|
|
@decorators.attr(type='negative')
|
|
@decorators.idempotent_id('7438e49e-1351-45d8-937b-892059fb97f5')
|
|
@utils.requires_ext(extension='address-scope', service='network')
|
|
def test_tenant_update_sp_prefix_associated_with_shared_addr_scope(self):
|
|
address_scope = self.create_address_scope(
|
|
name=data_utils.rand_name('smoke-address-scope'), is_admin=True,
|
|
shared=True, ip_version=4)
|
|
addr_scope_id = address_scope['id']
|
|
pool_values = {'prefixes': [u'20.0.0.0/18', u'30.0.0.0/18']}
|
|
|
|
created_subnetpool = self._create_subnetpool(**pool_values)
|
|
pool_id = created_subnetpool['id']
|
|
# associate the subnetpool to the address scope as an admin
|
|
self.admin_client.update_subnetpool(pool_id,
|
|
address_scope_id=addr_scope_id)
|
|
body = self.admin_client.show_subnetpool(pool_id)
|
|
self.assertEqual(addr_scope_id,
|
|
body['subnetpool']['address_scope_id'])
|
|
|
|
# updating the subnetpool prefix by the tenant user should fail
|
|
# since the tenant is not the owner of address scope
|
|
update_prefixes = [u'20.0.0.0/18', u'30.0.0.0/18', u'40.0.0.0/18']
|
|
self.assertRaises(lib_exc.BadRequest, self.client.update_subnetpool,
|
|
pool_id, prefixes=update_prefixes)
|
|
|
|
# admin can update the prefixes
|
|
self.admin_client.update_subnetpool(pool_id, prefixes=update_prefixes)
|
|
body = self.admin_client.show_subnetpool(pool_id)
|
|
self.assertEqual(update_prefixes,
|
|
body['subnetpool']['prefixes'])
|
|
|
|
@decorators.attr(type='negative')
|
|
@decorators.idempotent_id('648fee7d-a909-4ced-bad3-3a169444c0a8')
|
|
@utils.requires_ext(extension='address-scope', service='network')
|
|
def test_update_subnetpool_associate_address_scope_wrong_ip_version(self):
|
|
address_scope = self.create_address_scope(
|
|
name=data_utils.rand_name('smoke-address-scope'),
|
|
ip_version=6)
|
|
created_subnetpool = self._create_subnetpool()
|
|
self.assertRaises(lib_exc.BadRequest, self.client.update_subnetpool,
|
|
created_subnetpool['id'],
|
|
address_scope_id=address_scope['id'])
|
|
|
|
@decorators.attr(type='negative')
|
|
@decorators.idempotent_id('2f66dc2f-cc32-4caa-91ec-0c0cd7c46d70')
|
|
def test_update_subnetpool_tenant_id(self):
|
|
subnetpool = self._create_subnetpool()
|
|
self.assertRaises(
|
|
lib_exc.BadRequest,
|
|
self.admin_client.update_subnetpool,
|
|
subnetpool['id'],
|
|
tenant_id=self.admin_client.project_id,
|
|
)
|