da45177a2f
The tenant_id property of RestClient in tempest was deprecated in 25.0.0. This replaces the deprecated property by the new project_id property to avoid the following warning. WARNING tempest.lib.common.rest_client [-] Deprecated: "tenant_id" property is deprecated for removal, use "project_id" instead Depends-on: https://review.opendev.org/c/openstack/tempest/+/707938 Change-Id: Ie3c32f9f2278b78603a4214c5717df8691ba490a
254 lines
10 KiB
Python
254 lines
10 KiB
Python
# Copyright 2017 Red Hat, Inc.
|
|
# All Rights Reserved.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
import functools
|
|
|
|
from neutron_lib.api.definitions import portbindings as pb
|
|
from neutron_lib import constants as const
|
|
from neutron_lib.utils import test
|
|
from tempest.common import utils
|
|
from tempest.lib import decorators
|
|
import testtools
|
|
|
|
from neutron_tempest_plugin.common import utils as common_utils
|
|
from neutron_tempest_plugin import config
|
|
from neutron_tempest_plugin.scenario import base
|
|
from neutron_tempest_plugin.scenario import test_dvr
|
|
|
|
CONF = config.CONF
|
|
|
|
|
|
class NetworkMigrationTestBase(base.BaseTempestTestCase,
|
|
test_dvr.NetworkTestMixin):
|
|
credentials = ['primary', 'admin']
|
|
force_tenant_isolation = False
|
|
|
|
@classmethod
|
|
@utils.requires_ext(extension="dvr", service="network")
|
|
@utils.requires_ext(extension="l3-ha", service="network")
|
|
def skip_checks(cls):
|
|
super(NetworkMigrationTestBase, cls).skip_checks()
|
|
|
|
def _check_update(self, router, is_dvr, is_ha):
|
|
router = self.os_admin.network_client.show_router(router['id'])
|
|
self.assertEqual(is_dvr, router['router']['distributed'])
|
|
self.assertEqual(is_ha, router['router']['ha'])
|
|
|
|
def _wait_until_port_deleted(self, router_id, device_owner):
|
|
common_utils.wait_until_true(
|
|
functools.partial(
|
|
self._is_port_deleted,
|
|
router_id,
|
|
device_owner),
|
|
timeout=300, sleep=5)
|
|
|
|
def _is_port_deleted(self, router_id, device_owner):
|
|
ports = self.os_admin.network_client.list_ports(
|
|
device_id=router_id,
|
|
device_owner=device_owner)
|
|
return not ports.get('ports')
|
|
|
|
def _wait_until_port_ready(self, router_id, device_owner):
|
|
common_utils.wait_until_true(
|
|
functools.partial(
|
|
self._is_port_active,
|
|
router_id,
|
|
device_owner),
|
|
timeout=300, sleep=5)
|
|
|
|
def _wait_until_router_ports_down(self, router_id):
|
|
|
|
def _is_port_down(port_id):
|
|
port = self.os_admin.network_client.show_port(port_id).get('port')
|
|
return port['status'] == const.DOWN
|
|
|
|
ports = self.os_admin.network_client.list_ports(
|
|
device_id=router_id).get('ports')
|
|
for port in ports:
|
|
common_utils.wait_until_true(
|
|
functools.partial(_is_port_down, port['id']),
|
|
timeout=300, sleep=5)
|
|
|
|
def _is_port_active(self, router_id, device_owner):
|
|
ports = self.os_admin.network_client.list_ports(
|
|
device_id=router_id,
|
|
device_owner=device_owner,
|
|
status=const.ACTIVE).get('ports')
|
|
if ports:
|
|
if ports[0][pb.VIF_TYPE] not in [pb.VIF_TYPE_UNBOUND,
|
|
pb.VIF_TYPE_BINDING_FAILED]:
|
|
return True
|
|
return False
|
|
|
|
def _wait_until_router_ports_ready(self, router_id, dvr, ha):
|
|
if dvr:
|
|
self._wait_until_port_ready(
|
|
router_id, const.DEVICE_OWNER_DVR_INTERFACE)
|
|
if ha:
|
|
self._wait_until_port_ready(
|
|
router_id, const.DEVICE_OWNER_ROUTER_HA_INTF)
|
|
if dvr:
|
|
self._wait_until_port_ready(
|
|
router_id, const.DEVICE_OWNER_ROUTER_SNAT)
|
|
else:
|
|
self._wait_until_port_ready(
|
|
router_id, const.DEVICE_OWNER_HA_REPLICATED_INT)
|
|
self._wait_until_port_ready(
|
|
router_id, const.DEVICE_OWNER_ROUTER_GW)
|
|
|
|
def _wait_until_router_ports_migrated(
|
|
self, router_id, before_dvr, before_ha, after_dvr, after_ha):
|
|
if before_ha and not after_ha:
|
|
self._wait_until_port_deleted(
|
|
router_id, const.DEVICE_OWNER_ROUTER_HA_INTF)
|
|
self._wait_until_port_deleted(
|
|
router_id, const.DEVICE_OWNER_HA_REPLICATED_INT)
|
|
if before_dvr and not after_dvr:
|
|
self._wait_until_port_deleted(
|
|
router_id, const.DEVICE_OWNER_DVR_INTERFACE)
|
|
self._wait_until_port_deleted(
|
|
router_id, const.DEVICE_OWNER_ROUTER_SNAT)
|
|
self._wait_until_router_ports_ready(router_id, after_dvr, after_ha)
|
|
|
|
def _test_migration(self, before_dvr, before_ha, after_dvr, after_ha):
|
|
router = self.create_router_by_client(
|
|
distributed=before_dvr, ha=before_ha,
|
|
tenant_id=self.client.project_id, is_admin=True)
|
|
|
|
self.setup_network_and_server(router=router)
|
|
self._wait_until_router_ports_ready(
|
|
router['id'], before_dvr, before_ha)
|
|
self._check_connectivity()
|
|
|
|
self.os_admin.network_client.update_router(
|
|
router_id=router['id'], admin_state_up=False)
|
|
self._wait_until_router_ports_down(router['id'])
|
|
|
|
self.os_admin.network_client.update_router(
|
|
router_id=router['id'], distributed=after_dvr, ha=after_ha)
|
|
self._check_update(router, after_dvr, after_ha)
|
|
|
|
self.os_admin.network_client.update_router(
|
|
router_id=router['id'], admin_state_up=True)
|
|
|
|
self._wait_until_router_ports_migrated(
|
|
router['id'], before_dvr, before_ha, after_dvr, after_ha)
|
|
self._check_connectivity()
|
|
|
|
|
|
class NetworkMigrationFromLegacy(NetworkMigrationTestBase):
|
|
|
|
@decorators.idempotent_id('23724222-483a-4129-bc15-7a9278f3828b')
|
|
@testtools.skipUnless(
|
|
CONF.neutron_plugin_options.l3_agent_mode == 'dvr_snat',
|
|
"Need dvr_snat agent mode assumption.")
|
|
def test_from_legacy_to_dvr(self):
|
|
self._test_migration(before_dvr=False, before_ha=False,
|
|
after_dvr=True, after_ha=False)
|
|
|
|
@decorators.idempotent_id('09d85102-994f-4ff9-bf3e-17051145ca12')
|
|
def test_from_legacy_to_ha(self):
|
|
self._test_migration(before_dvr=False, before_ha=False,
|
|
after_dvr=False, after_ha=True)
|
|
|
|
@decorators.idempotent_id('fe169f2c-6ed3-4eb0-8afe-2d540c4b49e2')
|
|
@testtools.skipUnless(
|
|
CONF.neutron_plugin_options.l3_agent_mode == 'dvr_snat',
|
|
"Need dvr_snat agent mode assumption.")
|
|
def test_from_legacy_to_dvr_ha(self):
|
|
self._test_migration(before_dvr=False, before_ha=False,
|
|
after_dvr=True, after_ha=True)
|
|
|
|
|
|
class NetworkMigrationFromHA(NetworkMigrationTestBase):
|
|
|
|
@decorators.idempotent_id('b4e68ac0-3b76-4306-ae8a-51cf4d363b22')
|
|
def test_from_ha_to_legacy(self):
|
|
self._test_migration(before_dvr=False, before_ha=True,
|
|
after_dvr=False, after_ha=False)
|
|
|
|
@decorators.idempotent_id('42260eea-5d56-4d30-b62a-a62694dfe4d5')
|
|
@testtools.skipUnless(
|
|
CONF.neutron_plugin_options.l3_agent_mode == 'dvr_snat',
|
|
"Need dvr_snat agent mode assumption.")
|
|
def test_from_ha_to_dvr(self):
|
|
self._test_migration(before_dvr=False, before_ha=True,
|
|
after_dvr=True, after_ha=False)
|
|
|
|
@decorators.idempotent_id('e4149576-248b-43fa-9d0b-a5c2f51967ce')
|
|
@testtools.skipUnless(
|
|
CONF.neutron_plugin_options.l3_agent_mode == 'dvr_snat',
|
|
"Need dvr_snat agent mode assumption.")
|
|
def test_from_ha_to_dvr_ha(self):
|
|
self._test_migration(before_dvr=False, before_ha=True,
|
|
after_dvr=True, after_ha=True)
|
|
|
|
|
|
class NetworkMigrationFromDVR(NetworkMigrationTestBase):
|
|
|
|
@decorators.idempotent_id('e5cac02c-248d-4aac-bd5e-9d47c5197307')
|
|
@testtools.skipUnless(
|
|
CONF.neutron_plugin_options.l3_agent_mode == 'dvr_snat',
|
|
"Need dvr_snat agent mode assumption.")
|
|
def test_from_dvr_to_legacy(self):
|
|
self._test_migration(before_dvr=True, before_ha=False,
|
|
after_dvr=False, after_ha=False)
|
|
|
|
@decorators.idempotent_id('a00d5ad7-8509-4bb0-bdd2-7f1ee052d1cd')
|
|
@testtools.skipUnless(
|
|
CONF.neutron_plugin_options.l3_agent_mode == 'dvr_snat',
|
|
"Need dvr_snat agent mode assumption.")
|
|
def test_from_dvr_to_ha(self):
|
|
self._test_migration(before_dvr=True, before_ha=False,
|
|
after_dvr=False, after_ha=True)
|
|
|
|
@decorators.idempotent_id('25304a51-93a8-4cf3-9523-bce8b4eaecf8')
|
|
@testtools.skipUnless(
|
|
CONF.neutron_plugin_options.l3_agent_mode == 'dvr_snat',
|
|
"Need dvr_snat agent mode assumption.")
|
|
def test_from_dvr_to_dvr_ha(self):
|
|
self._test_migration(before_dvr=True, before_ha=False,
|
|
after_dvr=True, after_ha=True)
|
|
|
|
|
|
class NetworkMigrationFromDVRHA(NetworkMigrationTestBase):
|
|
|
|
@test.unstable_test("bug 1756301")
|
|
@decorators.idempotent_id('1be9b2e2-379c-40a4-a269-6687b81df691')
|
|
@testtools.skipUnless(
|
|
CONF.neutron_plugin_options.l3_agent_mode == 'dvr_snat',
|
|
"Need dvr_snat agent mode assumption.")
|
|
def test_from_dvr_ha_to_legacy(self):
|
|
self._test_migration(before_dvr=True, before_ha=True,
|
|
after_dvr=False, after_ha=False)
|
|
|
|
@test.unstable_test("bug 1756301")
|
|
@decorators.idempotent_id('55957267-4e84-4314-a2f7-7cd36a2df04b')
|
|
@testtools.skipUnless(
|
|
CONF.neutron_plugin_options.l3_agent_mode == 'dvr_snat',
|
|
"Need dvr_snat agent mode assumption.")
|
|
def test_from_dvr_ha_to_ha(self):
|
|
self._test_migration(before_dvr=True, before_ha=True,
|
|
after_dvr=False, after_ha=True)
|
|
|
|
@test.unstable_test("bug 1756301")
|
|
@decorators.idempotent_id('d6bedff1-72be-4a9a-8ea2-dc037cd838e0')
|
|
@testtools.skipUnless(
|
|
CONF.neutron_plugin_options.l3_agent_mode == 'dvr_snat',
|
|
"Need dvr_snat agent mode assumption.")
|
|
def test_from_dvr_ha_to_dvr(self):
|
|
self._test_migration(before_dvr=True, before_ha=True,
|
|
after_dvr=True, after_ha=False)
|