Removed smoke tags from all -api job tests

Most of the smoke tests now in the Neutron tree were inherited from Tempest
and are in the process of being reconciled back. Since [1], Neutron tests
can be run via a Tempest plugin, therefore there is a chance that these
are picked up unwillingly by some CI systems (like the one of Puppet
sub-project).

We should purge the tags for now, complete the de-fork and consider which
ones are worth the tag again.

[1] Ia233aa162746845f6ae08a8157dcd242dcd58eab
[2] https://etherpad.openstack.org/p/neutron-tempest-defork-patches-since-initial-sync

Change-Id: Id0bbfef2058363c22dc042c8d0793a1df7bac3aa
This commit is contained in:
Ihar Hrachyshka 2016-04-18 22:54:23 +02:00
parent 8a4a12d17f
commit 1d66738c7b
30 changed files with 37 additions and 172 deletions

View File

@ -29,7 +29,6 @@ class AgentManagementTestJSON(base.BaseAdminNetworkTest):
cls.agent = agents[0] # don't modify this agent
cls.dyn_agent = agents[1]
@test.attr(type='smoke')
@test.idempotent_id('9c80f04d-11f3-44a4-8738-ed2f879b0ff4')
def test_list_agent(self):
body = self.admin_client.list_agents()
@ -42,20 +41,17 @@ class AgentManagementTestJSON(base.BaseAdminNetworkTest):
agent.pop('configurations', None)
self.assertIn(self.agent, agents)
@test.attr(type=['smoke'])
@test.idempotent_id('e335be47-b9a1-46fd-be30-0874c0b751e6')
def test_list_agents_non_admin(self):
body = self.client.list_agents()
self.assertEqual(len(body["agents"]), 0)
@test.attr(type='smoke')
@test.idempotent_id('869bc8e8-0fda-4a30-9b71-f8a7cf58ca9f')
def test_show_agent(self):
body = self.admin_client.show_agent(self.agent['id'])
agent = body['agent']
self.assertEqual(agent['id'], self.agent['id'])
@test.attr(type='smoke')
@test.idempotent_id('371dfc5b-55b9-4cb5-ac82-c40eadaac941')
def test_update_agent_status(self):
origin_status = self.agent['admin_state_up']
@ -67,7 +63,6 @@ class AgentManagementTestJSON(base.BaseAdminNetworkTest):
updated_status = body['agent']['admin_state_up']
self.assertEqual(origin_status, updated_status)
@test.attr(type='smoke')
@test.idempotent_id('68a94a14-1243-46e6-83bf-157627e31556')
def test_update_agent_description(self):
self.useFixture(tempest_fixtures.LockFixture('agent_description'))

View File

@ -30,13 +30,11 @@ class DHCPAgentSchedulersTestJSON(base.BaseAdminNetworkTest):
cls.cidr = cls.subnet['cidr']
cls.port = cls.create_port(cls.network)
@test.attr(type='smoke')
@test.idempotent_id('5032b1fe-eb42-4a64-8f3b-6e189d8b5c7d')
def test_list_dhcp_agent_hosting_network(self):
self.admin_client.list_dhcp_agent_hosting_network(
self.network['id'])
@test.attr(type='smoke')
@test.idempotent_id('30c48f98-e45d-4ffb-841c-b8aad57c7587')
def test_list_networks_hosted_by_one_dhcp(self):
body = self.admin_client.list_dhcp_agent_hosting_network(
@ -56,7 +54,6 @@ class DHCPAgentSchedulersTestJSON(base.BaseAdminNetworkTest):
network_ids.append(network['id'])
return network_id in network_ids
@test.attr(type='smoke')
@test.idempotent_id('a0856713-6549-470c-a656-e97c8df9a14d')
def test_add_remove_network_from_dhcp_agent(self):
# The agent is now bound to the network, we can free the port

View File

@ -23,7 +23,7 @@ from neutron.tests.tempest.api import base_security_groups as base_security
class PortSecurityAdminTests(base_security.BaseSecGroupTest,
base.BaseAdminNetworkTest):
@test.attr(type=['negative', 'smoke'])
@test.attr(type='negative')
@test.idempotent_id('d39a96e2-2dea-4feb-8093-e7ac991ce6f8')
@test.requires_ext(extension='port-security', service='network')
def test_create_port_security_false_on_shared_network(self):

View File

@ -38,7 +38,6 @@ class ExternalNetworksRBACTestJSON(base.BaseAdminNetworkTest):
self.addCleanup(self.admin_client.delete_network, network['id'])
return network
@test.attr(type='smoke')
@test.idempotent_id('afd8f1b7-a81e-4629-bca8-a367b3a144bb')
def test_regular_client_shares_with_another(self):
net = self.create_network()
@ -63,7 +62,6 @@ class ExternalNetworksRBACTestJSON(base.BaseAdminNetworkTest):
action='access_as_external',
target_tenant='*')
@test.attr(type='smoke')
@test.idempotent_id('a2e19f06-48a9-4e4c-b717-08cb2008707d')
def test_wildcard_policy_created_from_external_network_api(self):
# create external makes wildcard

View File

@ -41,7 +41,7 @@ class FloatingIPAdminTestJSON(base.BaseAdminNetworkTest):
cls.create_router_interface(cls.router['id'], cls.subnet['id'])
cls.port = cls.create_port(cls.network)
@test.attr(type=['negative', 'smoke'])
@test.attr(type='negative')
@test.idempotent_id('11116ee9-4e99-5b15-b8e1-aa7df92ca589')
def test_associate_floating_ip_with_port_from_another_tenant(self):
body = self.admin_client.create_floatingip(
@ -64,7 +64,6 @@ class FloatingIPAdminTestJSON(base.BaseAdminNetworkTest):
@testtools.skipUnless(
CONF.neutron_plugin_options.specify_floating_ip_address_available,
"Feature for specifying floating IP address is disabled")
@test.attr(type='smoke')
@test.idempotent_id('332a8ae4-402e-4b98-bb6f-532e5a87b8e0')
def test_create_floatingip_with_specified_ip_address(self):
# other tests may end up stealing the IP before we can use it

View File

@ -79,12 +79,10 @@ class L3AgentSchedulerTestJSON(base.BaseAdminNetworkTest):
cls.client.add_router_interface_with_port_id(
cls.router['id'], cls.port['id'])
@test.attr(type='smoke')
@test.idempotent_id('b7ce6e89-e837-4ded-9b78-9ed3c9c6a45a')
def test_list_routers_on_l3_agent(self):
self.admin_client.list_routers_on_l3_agent(self.agent['id'])
@test.attr(type='smoke')
@test.idempotent_id('9464e5e7-8625-49c3-8fd1-89c52be59d66')
def test_add_list_remove_router_on_l3_agent(self):
l3_agent_ids = list()

View File

@ -39,7 +39,6 @@ class RoutersTestDVR(base.BaseRouterTest):
raise cls.skipException(msg)
cls.admin_client.delete_router(router['router']['id'])
@test.attr(type='smoke')
@test.idempotent_id('08a2a0a8-f1e4-4b34-8e30-e522e836c44e')
def test_distributed_router_creation(self):
"""
@ -57,7 +56,6 @@ class RoutersTestDVR(base.BaseRouterTest):
router['router']['id'])
self.assertTrue(router['router']['distributed'])
@test.attr(type='smoke')
@test.idempotent_id('8a0a72b4-7290-4677-afeb-b4ffe37bc352')
def test_centralized_router_creation(self):
"""
@ -76,7 +74,6 @@ class RoutersTestDVR(base.BaseRouterTest):
router['router']['id'])
self.assertFalse(router['router']['distributed'])
@test.attr(type='smoke')
@test.idempotent_id('acd43596-c1fb-439d-ada8-31ad48ae3c2e')
def test_centralized_router_update_to_dvr(self):
"""

View File

@ -155,14 +155,12 @@ class AllowedAddressPairSharedNetworkTest(base.BaseAdminNetworkTest):
cls.network = cls.create_shared_network()
cls.create_subnet(cls.network, client=cls.admin_client)
@test.attr(type='smoke')
@test.idempotent_id('86c3529b-1231-40de-803c-ffffffff1fff')
def test_create_with_address_pair_blocked_on_other_network(self):
with testtools.ExpectedException(lib_exc.Forbidden):
self.create_port(self.network,
allowed_address_pairs=self.allowed_address_pairs)
@test.attr(type='smoke')
@test.idempotent_id('86c3529b-1231-40de-803c-ffffffff2fff')
def test_update_with_address_pair_blocked_on_other_network(self):
port = self.create_port(self.network)
@ -194,7 +192,6 @@ class RBACSharedNetworksTest(base.BaseAdminNetworkTest):
)['rbac_policy']
return {'network': net, 'subnet': subnet, 'policy': pol}
@test.attr(type='smoke')
@test.idempotent_id('86c3529b-1231-40de-803c-afffffff1fff')
def test_network_only_visible_to_policy_target(self):
net = self._make_admin_net_and_subnet_shared_to_tenant_id(
@ -204,7 +201,6 @@ class RBACSharedNetworksTest(base.BaseAdminNetworkTest):
# client2 has not been granted access
self.client2.show_network(net['id'])
@test.attr(type='smoke')
@test.idempotent_id('86c3529b-1231-40de-803c-afffffff2fff')
def test_subnet_on_network_only_visible_to_policy_target(self):
sub = self._make_admin_net_and_subnet_shared_to_tenant_id(
@ -214,7 +210,6 @@ class RBACSharedNetworksTest(base.BaseAdminNetworkTest):
# client2 has not been granted access
self.client2.show_subnet(sub['id'])
@test.attr(type='smoke')
@test.idempotent_id('86c3529b-1231-40de-803c-afffffff2eee')
def test_policy_target_update(self):
res = self._make_admin_net_and_subnet_shared_to_tenant_id(
@ -238,7 +233,6 @@ class RBACSharedNetworksTest(base.BaseAdminNetworkTest):
object_type='network', object_id=res['network']['id'],
action='access_as_shared', target_tenant=self.client.tenant_id)
@test.attr(type='smoke')
@test.idempotent_id('86c3529b-1231-40de-803c-afffffff3fff')
def test_port_presence_prevents_network_rbac_policy_deletion(self):
res = self._make_admin_net_and_subnet_shared_to_tenant_id(
@ -269,7 +263,6 @@ class RBACSharedNetworksTest(base.BaseAdminNetworkTest):
# anchor is gone, delete should pass
self.admin_client.delete_rbac_policy(wild['id'])
@test.attr(type='smoke')
@test.idempotent_id('86c3529b-1231-40de-803c-beefbeefbeef')
def test_tenant_can_delete_port_on_own_network(self):
net = self.create_network() # owned by self.client
@ -287,7 +280,6 @@ class RBACSharedNetworksTest(base.BaseAdminNetworkTest):
with testtools.ExpectedException(lib_exc.NotFound):
self.client2.delete_port(port['id'])
@test.attr(type='smoke')
@test.idempotent_id('86c3529b-1231-40de-803c-afffffff4fff')
def test_regular_client_shares_to_another_regular_client(self):
net = self.create_network() # owned by self.client
@ -306,7 +298,6 @@ class RBACSharedNetworksTest(base.BaseAdminNetworkTest):
[p['id']
for p in self.client2.list_rbac_policies()['rbac_policies']])
@test.attr(type='smoke')
@test.idempotent_id('bf5052b8-b11e-407c-8e43-113447404d3e')
def test_filter_fields(self):
net = self.create_network()
@ -319,7 +310,6 @@ class RBACSharedNetworksTest(base.BaseAdminNetworkTest):
res = self.client.list_rbac_policies(fields=fields)
self.assertEqual(set(fields), set(res['rbac_policies'][0].keys()))
@test.attr(type='smoke')
@test.idempotent_id('86c3529b-1231-40de-803c-afffffff5fff')
def test_policy_show(self):
res = self._make_admin_net_and_subnet_shared_to_tenant_id(
@ -335,7 +325,6 @@ class RBACSharedNetworksTest(base.BaseAdminNetworkTest):
self.assertEqual(
p2, self.admin_client.show_rbac_policy(p2['id'])['rbac_policy'])
@test.attr(type='smoke')
@test.idempotent_id('e7bcb1ea-4877-4266-87bb-76f68b421f31')
def test_filter_policies(self):
net = self.create_network()
@ -354,7 +343,6 @@ class RBACSharedNetworksTest(base.BaseAdminNetworkTest):
self.assertEqual(pol1['id'], res1[0]['id'])
self.assertEqual(pol2['id'], res2[0]['id'])
@test.attr(type='smoke')
@test.idempotent_id('86c3529b-1231-40de-803c-afffffff6fff')
def test_regular_client_blocked_from_sharing_anothers_network(self):
net = self._make_admin_net_and_subnet_shared_to_tenant_id(
@ -364,7 +352,6 @@ class RBACSharedNetworksTest(base.BaseAdminNetworkTest):
object_type='network', object_id=net['id'],
action='access_as_shared', target_tenant=self.client.tenant_id)
@test.attr(type='smoke')
@test.idempotent_id('c5f8f785-ce8d-4430-af7e-a236205862fb')
@test.requires_ext(extension="quotas", service="network")
def test_rbac_policy_quota(self):
@ -381,7 +368,6 @@ class RBACSharedNetworksTest(base.BaseAdminNetworkTest):
action='access_as_shared',
target_tenant=str(uuid.uuid4()).replace('-', ''))
@test.attr(type='smoke')
@test.idempotent_id('86c3529b-1231-40de-803c-afffffff7fff')
def test_regular_client_blocked_from_sharing_with_wildcard(self):
net = self.create_network()
@ -397,7 +383,6 @@ class RBACSharedNetworksTest(base.BaseAdminNetworkTest):
self.client.update_rbac_policy(pol['rbac_policy']['id'],
target_tenant='*')
@test.attr(type='smoke')
@test.idempotent_id('86c3529b-1231-40de-803c-aeeeeeee7fff')
def test_filtering_works_with_rbac_records_present(self):
resp = self._make_admin_net_and_subnet_shared_to_tenant_id(

View File

@ -56,7 +56,6 @@ class AddressScopeTestBase(base.BaseAdminNetworkTest):
class AddressScopeTest(AddressScopeTestBase):
@test.attr(type='smoke')
@test.idempotent_id('045f9294-8b1a-4848-b6a8-edf1b41e9d06')
def test_tenant_create_list_address_scope(self):
address_scope = self._create_address_scope(ip_version=4)
@ -69,7 +68,6 @@ class AddressScopeTest(AddressScopeTestBase):
[a_s['name'] for a_s in returned_address_scopes],
"Created address scope name should be in the list")
@test.attr(type='smoke')
@test.idempotent_id('85e0326b-4c75-4b92-bd6e-7c7de6aaf05c')
def test_show_address_scope(self):
address_scope = self._create_address_scope(ip_version=4)
@ -81,12 +79,10 @@ class AddressScopeTest(AddressScopeTestBase):
returned_address_scope['name'])
self.assertFalse(returned_address_scope['shared'])
@test.attr(type='smoke')
@test.idempotent_id('85a259b2-ace6-4e32-9657-a9a392b452aa')
def test_tenant_update_address_scope(self):
self._test_update_address_scope_helper()
@test.attr(type='smoke')
@test.idempotent_id('22b3b600-72a8-4b60-bc94-0f29dd6271df')
def test_delete_address_scope(self):
address_scope = self._create_address_scope(ip_version=4)
@ -94,7 +90,6 @@ class AddressScopeTest(AddressScopeTestBase):
self.assertRaises(lib_exc.NotFound, self.client.show_address_scope,
address_scope['id'])
@test.attr(type='smoke')
@test.idempotent_id('5a06c287-8036-4d04-9d78-def8e06d43df')
def test_admin_create_shared_address_scope(self):
address_scope = self._create_address_scope(is_admin=True, shared=True,
@ -106,7 +101,6 @@ class AddressScopeTest(AddressScopeTestBase):
returned_address_scope['name'])
self.assertTrue(returned_address_scope['shared'])
@test.attr(type='smoke')
@test.idempotent_id('e9e1ccdd-9ccd-4076-9503-71820529508b')
def test_admin_update_shared_address_scope(self):
address_scope = self._test_update_address_scope_helper(is_admin=True,

View File

@ -21,32 +21,32 @@ from neutron.tests.tempest.api import test_address_scopes
class AddressScopeTestNegative(test_address_scopes.AddressScopeTestBase):
@test.attr(type=['negative', 'smoke'])
@test.attr(type='negative')
@test.idempotent_id('9c92ec34-0c50-4104-aa47-9ce98d5088df')
def test_tenant_create_shared_address_scope(self):
self.assertRaises(lib_exc.Forbidden, self._create_address_scope,
shared=True, ip_version=4)
@test.attr(type=['negative', 'smoke'])
@test.attr(type='negative')
@test.idempotent_id('a857b61e-bf53-4fab-b21a-b0daaf81b5bd')
def test_tenant_update_address_scope_shared_true(self):
self.assertRaises(lib_exc.Forbidden,
self._test_update_address_scope_helper, shared=True)
@test.attr(type=['negative', 'smoke'])
@test.attr(type='negative')
@test.idempotent_id('a859ef2f-9c76-4e2e-ba0f-e0339a489e8c')
def test_tenant_update_address_scope_shared_false(self):
self.assertRaises(lib_exc.Forbidden,
self._test_update_address_scope_helper, shared=False)
@test.attr(type=['negative', 'smoke'])
@test.attr(type='negative')
@test.idempotent_id('9b6dd7ad-cabb-4f55-bd5e-e61176ef41f6')
def test_get_non_existent_address_scope(self):
non_exist_id = data_utils.rand_name('address_scope')
self.assertRaises(lib_exc.NotFound, self.client.show_address_scope,
non_exist_id)
@test.attr(type=['negative', 'smoke'])
@test.attr(type='negative')
@test.idempotent_id('ef213552-f2da-487d-bf4a-e1705d115ff1')
def test_tenant_get_not_shared_admin_address_scope(self):
address_scope = self._create_address_scope(is_admin=True,
@ -55,21 +55,21 @@ class AddressScopeTestNegative(test_address_scopes.AddressScopeTestBase):
self.assertRaises(lib_exc.NotFound, self.client.show_address_scope,
address_scope['id'])
@test.attr(type=['negative', 'smoke'])
@test.attr(type='negative')
@test.idempotent_id('5c25dc6a-1e92-467a-9cc7-cda74b6003db')
def test_delete_non_existent_address_scope(self):
non_exist_id = data_utils.rand_name('address_scope')
self.assertRaises(lib_exc.NotFound, self.client.delete_address_scope,
non_exist_id)
@test.attr(type=['negative', 'smoke'])
@test.attr(type='negative')
@test.idempotent_id('47c25dc5-e886-4a84-88c3-ac5031969661')
def test_update_non_existent_address_scope(self):
non_exist_id = data_utils.rand_name('address_scope')
self.assertRaises(lib_exc.NotFound, self.client.update_address_scope,
non_exist_id, name='foo-name')
@test.attr(type=['negative', 'smoke'])
@test.attr(type='negative')
@test.idempotent_id('702d0515-82cb-4207-b0d9-703336e54665')
def test_update_shared_address_scope_to_unshare(self):
address_scope = self._create_address_scope(is_admin=True, shared=True,
@ -78,7 +78,7 @@ class AddressScopeTestNegative(test_address_scopes.AddressScopeTestBase):
self.admin_client.update_address_scope,
address_scope['id'], name='new-name', shared=False)
@test.attr(type=['negative', 'smoke'])
@test.attr(type='negative')
@test.idempotent_id('1e471e5c-6f9c-437a-9257-fd9bc4b6f0fb')
def test_delete_address_scope_associated_with_subnetpool(self):
address_scope = self._create_address_scope(ip_version=4)

View File

@ -50,7 +50,6 @@ class AllowedAddressPairTestJSON(base.BaseNetworkTest):
cls.ip_address = port['fixed_ips'][0]['ip_address']
cls.mac_address = port['mac_address']
@test.attr(type='smoke')
@test.idempotent_id('86c3529b-1231-40de-803c-00e40882f043')
def test_create_list_port_with_address_pair(self):
# Create port with allowed address pair attribute
@ -70,7 +69,6 @@ class AllowedAddressPairTestJSON(base.BaseNetworkTest):
self.assertTrue(port, msg)
self._confirm_allowed_address_pair(port[0], self.ip_address)
@test.attr(type='smoke')
def _update_port_with_address(self, address, mac_address=None, **kwargs):
# Create a port without allowed address pair
body = self.client.create_port(network_id=self.network['id'])
@ -89,13 +87,11 @@ class AllowedAddressPairTestJSON(base.BaseNetworkTest):
allowed_address_pair = body['port']['allowed_address_pairs']
self.assertEqual(allowed_address_pair, allowed_address_pairs)
@test.attr(type='smoke')
@test.idempotent_id('9599b337-272c-47fd-b3cf-509414414ac4')
def test_update_port_with_address_pair(self):
# Update port with allowed address pair
self._update_port_with_address(self.ip_address)
@test.attr(type='smoke')
@test.idempotent_id('4d6d178f-34f6-4bff-a01c-0a2f8fe909e4')
def test_update_port_with_cidr_address_pair(self):
# Update allowed address pair with cidr
@ -104,7 +100,6 @@ class AllowedAddressPairTestJSON(base.BaseNetworkTest):
'network', 'project_network_cidr')))
self._update_port_with_address(cidr)
@test.attr(type='smoke')
@test.idempotent_id('b3f20091-6cd5-472b-8487-3516137df933')
def test_update_port_with_multiple_ip_mac_address_pair(self):
# Create an ip _address and mac_address through port create

View File

@ -75,7 +75,6 @@ class TestAutoAllocatedTopology(base.BaseAdminNetworkTest):
body = client.list_networks(name='auto_allocated_network')
self.networks.extend(body['networks'])
@test.attr(type='smoke')
@test.idempotent_id('64bc0b02-cee4-11e5-9f3c-080027605a2b')
def test_get_allocated_net_topology_as_tenant(self):
resources_before = self._count_topology_resources()

View File

@ -23,28 +23,28 @@ class BgpSpeakerTestJSONNegative(test_base.BgpSpeakerTestJSONBase):
"""Negative test cases asserting proper behavior of BGP API extension"""
@test.attr(type=['negative', 'smoke'])
@test.attr(type='negative')
@test.idempotent_id('75e9ee2f-6efd-4320-bff7-ae24741c8b06')
def test_create_bgp_speaker_illegal_local_asn(self):
self.assertRaises(lib_exc.BadRequest,
self.create_bgp_speaker,
local_as='65537')
@test.attr(type=['negative', 'smoke'])
@test.attr(type='negative')
@test.idempotent_id('6742ec2e-382a-4453-8791-13a19b47cd13')
def test_create_bgp_speaker_non_admin(self):
self.assertRaises(lib_exc.Forbidden,
self.client.create_bgp_speaker,
{'bgp_speaker': self.default_bgp_speaker_args})
@test.attr(type=['negative', 'smoke'])
@test.attr(type='negative')
@test.idempotent_id('33f7aaf0-9786-478b-b2d1-a51086a50eb4')
def test_create_bgp_peer_non_admin(self):
self.assertRaises(lib_exc.Forbidden,
self.client.create_bgp_peer,
{'bgp_peer': self.default_bgp_peer_args})
@test.attr(type=['negative', 'smoke'])
@test.attr(type='negative')
@test.idempotent_id('39435932-0266-4358-899b-0e9b1e53c3e9')
def test_update_bgp_speaker_local_asn(self):
bgp_speaker = self.create_bgp_speaker(**self.default_bgp_speaker_args)

View File

@ -28,7 +28,6 @@ FAKE_MAC = '00:25:64:e8:19:dd'
class PortSecTest(base_security.BaseSecGroupTest,
base.BaseNetworkTest):
@test.attr(type='smoke')
@test.idempotent_id('7c338ddf-e64e-4118-bd33-e49a1f2f1495')
@test.requires_ext(extension='port-security', service='network')
def test_port_sec_default_value(self):
@ -40,7 +39,6 @@ class PortSecTest(base_security.BaseSecGroupTest,
port = self.create_port(network)
self.assertTrue(port['port_security_enabled'])
@test.attr(type='smoke')
@test.idempotent_id('e60eafd2-31de-4c38-8106-55447d033b57')
@test.requires_ext(extension='port-security', service='network')
@ddt.unpack
@ -55,7 +53,6 @@ class PortSecTest(base_security.BaseSecGroupTest,
self.assertEqual(network['port_security_enabled'], port_sec_net)
self.assertEqual(port['port_security_enabled'], expected)
@test.attr(type=['smoke'])
@test.idempotent_id('05642059-1bfc-4581-9bc9-aaa5db08dd60')
@test.requires_ext(extension='port-security', service='network')
def test_create_port_sec_with_security_group(self):
@ -71,7 +68,7 @@ class PortSecTest(base_security.BaseSecGroupTest,
self.assertFalse(port['port_security_enabled'])
self.assertEmpty(port['security_groups'])
@test.attr(type=['negative', 'smoke'])
@test.attr(type='negative')
@test.idempotent_id('05642059-1bfc-4581-9bc9-aaa5db08dd60')
@test.requires_ext(extension='port-security', service='network')
def test_port_sec_update_port_failed(self):
@ -99,7 +96,6 @@ class PortSecTest(base_security.BaseSecGroupTest,
# Remove security group from port before deletion on resource_cleanup
self.update_port(port, security_groups=[])
@test.attr(type=['smoke'])
@test.idempotent_id('05642059-1bfc-4581-9bc9-aaa5db08dd60')
@test.requires_ext(extension='port-security', service='network')
def test_port_sec_update_pass(self):
@ -124,7 +120,6 @@ class PortSecTest(base_security.BaseSecGroupTest,
self.assertEmpty(port['security_groups'])
self.assertFalse(port['port_security_enabled'])
@test.attr(type=['smoke'])
@test.idempotent_id('2df6114b-b8c3-48a1-96e8-47f08159d35c')
@test.requires_ext(extension='port-security', service='network')
def test_delete_with_port_sec(self):
@ -137,7 +132,7 @@ class PortSecTest(base_security.BaseSecGroupTest,
self.assertTrue(
self.client.is_resource_deleted('network', network['id']))
@test.attr(type=['negative', 'smoke'])
@test.attr(type='negative')
@test.idempotent_id('ed93e453-3f8d-495e-8e7e-b0e268c2ebd9')
@test.requires_ext(extension='port-security', service='network')
@test.requires_ext(extension='allowed-address-pairs', service='network')

View File

@ -52,7 +52,6 @@ class ExtraDHCPOptionsTestJSON(base.BaseNetworkTest):
{'opt_value': cls.ip_server, 'opt_name': 'server-ip-address'}
]
@test.attr(type='smoke')
@test.idempotent_id('d2c17063-3767-4a24-be4f-a23dbfa133c9')
def test_create_list_port_with_extra_dhcp_options(self):
# Create a port with Extra DHCP Options
@ -69,7 +68,6 @@ class ExtraDHCPOptionsTestJSON(base.BaseNetworkTest):
self.assertTrue(port)
self._confirm_extra_dhcp_options(port[0], self.extra_dhcp_opts)
@test.attr(type='smoke')
@test.idempotent_id('9a6aebf4-86ee-4f47-b07a-7f7232c55607')
def test_update_show_port_with_extra_dhcp_options(self):
# Update port with extra dhcp options

View File

@ -63,7 +63,6 @@ class TestFlavorsJson(base.BaseAdminNetworkTest):
labels = self.admin_client.list_service_profiles(id=service_profile_id)
self.assertEqual(len(labels['service_profiles']), 0)
@test.attr(type='smoke')
@test.idempotent_id('ec8e15ff-95d0-433b-b8a6-b466bddb1e50')
def test_create_update_delete_service_profile(self):
# Creates a service profile
@ -87,7 +86,6 @@ class TestFlavorsJson(base.BaseAdminNetworkTest):
id=service_profile['id']))
self.assertEqual(len(labels['service_profiles']), 1)
@test.attr(type='smoke')
@test.idempotent_id('ec8e15ff-95d0-433b-b8a6-b466bddb1e50')
def test_create_update_delete_flavor(self):
# Creates a flavor
@ -107,7 +105,6 @@ class TestFlavorsJson(base.BaseAdminNetworkTest):
labels = (self.admin_client.list_flavors(id=flavor['id']))
self.assertEqual(len(labels['flavors']), 1)
@test.attr(type='smoke')
@test.idempotent_id('30abb445-0eea-472e-bd02-8649f54a5968')
def test_show_service_profile(self):
# Verifies the details of a service profile
@ -121,7 +118,6 @@ class TestFlavorsJson(base.BaseAdminNetworkTest):
service_profile['metainfo'])
self.assertTrue(service_profile['enabled'])
@test.attr(type='smoke')
@test.idempotent_id('30abb445-0eea-472e-bd02-8649f54a5968')
def test_show_flavor(self):
# Verifies the details of a flavor
@ -132,7 +128,6 @@ class TestFlavorsJson(base.BaseAdminNetworkTest):
self.assertEqual(self.flavor['name'], flavor['name'])
self.assertTrue(flavor['enabled'])
@test.attr(type='smoke')
@test.idempotent_id('e2fb2f8c-45bf-429a-9f17-171c70444612')
def test_list_flavors(self):
# Verify flavor lists
@ -140,7 +135,6 @@ class TestFlavorsJson(base.BaseAdminNetworkTest):
flavors = body['flavors']
self.assertEqual(0, len(flavors))
@test.attr(type='smoke')
@test.idempotent_id('e2fb2f8c-45bf-429a-9f17-171c70444612')
def test_list_service_profiles(self):
# Verify service profiles lists

View File

@ -41,7 +41,6 @@ class FloatingIPTestJSON(base.BaseNetworkTest):
for i in range(2):
cls.create_port(cls.network)
@test.attr(type='smoke')
@test.idempotent_id('c72c1c0c-2193-4aca-eeee-b1442641ffff')
@test.requires_ext(extension="standard-attr-description",
service="network")

View File

@ -38,7 +38,7 @@ class FloatingIPNegativeTestJSON(base.BaseNetworkTest):
cls.create_router_interface(cls.router['id'], cls.subnet['id'])
cls.port = cls.create_port(cls.network)
@test.attr(type=['negative', 'smoke'])
@test.attr(type='negative')
@test.idempotent_id('0b5b8797-6de7-4191-905c-a48b888eb429')
def test_associate_floatingip_with_port_with_floatingip(self):
net = self.create_network()

View File

@ -58,7 +58,6 @@ class MeteringTestJSON(base.BaseAdminNetworkTest):
id=metering_label_rule_id))
self.assertEqual(len(rules['metering_label_rules']), 0)
@test.attr(type='smoke')
@test.idempotent_id('e2fb2f8c-45bf-429a-9f17-171c70444612')
def test_list_metering_labels(self):
# Verify label filtering
@ -66,7 +65,6 @@ class MeteringTestJSON(base.BaseAdminNetworkTest):
metering_labels = body['metering_labels']
self.assertEqual(0, len(metering_labels))
@test.attr(type='smoke')
@test.idempotent_id('ec8e15ff-95d0-433b-b8a6-b466bddb1e50')
def test_create_delete_metering_label_with_filters(self):
# Creates a label
@ -83,7 +81,6 @@ class MeteringTestJSON(base.BaseAdminNetworkTest):
id=metering_label['id']))
self.assertEqual(len(labels['metering_labels']), 1)
@test.attr(type='smoke')
@test.idempotent_id('30abb445-0eea-472e-bd02-8649f54a5968')
def test_show_metering_label(self):
# Verifies the details of a label
@ -96,7 +93,6 @@ class MeteringTestJSON(base.BaseAdminNetworkTest):
self.assertEqual(self.metering_label['description'],
metering_label['description'])
@test.attr(type='smoke')
@test.idempotent_id('cc832399-6681-493b-9d79-0202831a1281')
def test_list_metering_label_rules(self):
# Verify rule filtering
@ -104,7 +100,6 @@ class MeteringTestJSON(base.BaseAdminNetworkTest):
metering_label_rules = body['metering_label_rules']
self.assertEqual(0, len(metering_label_rules))
@test.attr(type='smoke')
@test.idempotent_id('f4d547cd-3aee-408f-bf36-454f8825e045')
def test_create_delete_metering_label_rule_with_filters(self):
# Creates a rule
@ -123,7 +118,6 @@ class MeteringTestJSON(base.BaseAdminNetworkTest):
id=metering_label_rule['id']))
self.assertEqual(len(rules['metering_label_rules']), 1)
@test.attr(type='smoke')
@test.idempotent_id('b7354489-96ea-41f3-9452-bace120fb4a7')
def test_show_metering_label_rule(self):
# Verifies the details of a rule

View File

@ -107,7 +107,6 @@ def calc_total_ips(prefix, ip_version):
class NetworksIpAvailabilityIPv4Test(NetworksIpAvailabilityTest):
@test.attr(type='smoke')
@test.idempotent_id('0f33cc8c-1bf6-47d1-9ce1-010618240599')
def test_admin_network_availability_before_subnet(self):
net_name = data_utils.rand_name('network-')
@ -116,7 +115,6 @@ class NetworksIpAvailabilityIPv4Test(NetworksIpAvailabilityTest):
net_availability = self.admin_client.list_network_ip_availabilities()
self._assert_total_and_used_ips(0, 0, network, net_availability)
@test.attr(type='smoke')
@test.idempotent_id('3aecd3b2-16ed-4b87-a54a-91d7b3c2986b')
def test_net_ip_availability_after_subnet_and_ports(self):
net_name = data_utils.rand_name('network-')
@ -136,7 +134,6 @@ class NetworksIpAvailabilityIPv4Test(NetworksIpAvailabilityTest):
calc_total_ips(prefix, self._ip_version),
network, net_availability)
@test.attr(type='smoke')
@test.idempotent_id('9f11254d-757b-492e-b14b-f52144e4ee7b')
def test_net_ip_availability_after_port_delete(self):
net_name = data_utils.rand_name('network-')

View File

@ -39,7 +39,6 @@ class NetworksTestJSON(base.BaseNetworkTest):
super(NetworksTestJSON, cls).resource_setup()
cls.network = cls.create_network()
@test.attr(type='smoke')
@test.idempotent_id('2bf13842-c93f-4a69-83ed-717d2ec3b44e')
def test_show_network(self):
# Verify the details of a network
@ -51,7 +50,6 @@ class NetworksTestJSON(base.BaseNetworkTest):
for key in fields:
self.assertEqual(network[key], self.network[key])
@test.attr(type='smoke')
@test.idempotent_id('867819bb-c4b6-45f7-acf9-90edcf70aa5e')
def test_show_network_fields(self):
# Verify specific fields of a network
@ -65,7 +63,6 @@ class NetworksTestJSON(base.BaseNetworkTest):
for field_name in fields:
self.assertEqual(network[field_name], self.network[field_name])
@test.attr(type='smoke')
@test.idempotent_id('c72c1c0c-2193-4aca-ccc4-b1442640bbbb')
@test.requires_ext(extension="standard-attr-description",
service="network")
@ -81,7 +78,6 @@ class NetworksTestJSON(base.BaseNetworkTest):
body = self.client.list_networks(id=net_id)['networks'][0]
self.assertEqual('d2', body['description'])
@test.attr(type='smoke')
@test.idempotent_id('6ae6d24f-9194-4869-9c85-c313cb20e080')
def test_list_networks_fields(self):
# Verify specific fields of the networks

View File

@ -25,7 +25,6 @@ class PortsTestJSON(base.BaseNetworkTest):
super(PortsTestJSON, cls).resource_setup()
cls.network = cls.create_network()
@test.attr(type='smoke')
@test.idempotent_id('c72c1c0c-2193-4aca-bbb4-b1442640bbbb')
@test.requires_ext(extension="standard-attr-description",
service="network")

View File

@ -28,7 +28,6 @@ class QosTestJSON(base.BaseAdminNetworkTest):
def resource_setup(cls):
super(QosTestJSON, cls).resource_setup()
@test.attr(type='smoke')
@test.idempotent_id('108fbdf7-3463-4e47-9871-d07f3dcf5bbb')
def test_create_policy(self):
policy = self.create_qos_policy(name='test-policy',
@ -47,7 +46,6 @@ class QosTestJSON(base.BaseAdminNetworkTest):
policies_ids = [p['id'] for p in policies]
self.assertIn(policy['id'], policies_ids)
@test.attr(type='smoke')
@test.idempotent_id('f8d20e92-f06d-4805-b54f-230f77715815')
def test_list_policy_filter_by_name(self):
self.create_qos_policy(name='test', description='test policy',
@ -62,7 +60,6 @@ class QosTestJSON(base.BaseAdminNetworkTest):
retrieved_policy = policies[0]
self.assertEqual('test', retrieved_policy['name'])
@test.attr(type='smoke')
@test.idempotent_id('8e88a54b-f0b2-4b7d-b061-a15d93c2c7d6')
def test_policy_update(self):
policy = self.create_qos_policy(name='test-policy',
@ -78,7 +75,6 @@ class QosTestJSON(base.BaseAdminNetworkTest):
self.assertTrue(retrieved_policy['shared'])
self.assertEqual([], retrieved_policy['rules'])
@test.attr(type='smoke')
@test.idempotent_id('1cb42653-54bd-4a9a-b888-c55e18199201')
def test_delete_policy(self):
policy = self.admin_client.create_qos_policy(
@ -92,12 +88,10 @@ class QosTestJSON(base.BaseAdminNetworkTest):
self.assertRaises(exceptions.NotFound,
self.admin_client.show_qos_policy, policy['id'])
@test.attr(type='smoke')
@test.idempotent_id('cf776f77-8d3d-49f2-8572-12d6a1557224')
def test_list_admin_rule_types(self):
self._test_list_rule_types(self.admin_client)
@test.attr(type='smoke')
@test.idempotent_id('49c8ea35-83a9-453a-bd23-239cf3b13929')
def test_list_regular_rule_types(self):
self._test_list_rule_types(self.client)
@ -133,7 +127,6 @@ class QosTestJSON(base.BaseAdminNetworkTest):
updated_network = self.admin_client.show_network(network_id)
self.assertIsNone(updated_network['network']['qos_policy_id'])
@test.attr(type='smoke')
@test.idempotent_id('65b9ef75-1911-406a-bbdb-ca1d68d528b0')
def test_policy_association_with_admin_network(self):
policy = self.create_qos_policy(name='test-policy',
@ -148,7 +141,6 @@ class QosTestJSON(base.BaseAdminNetworkTest):
self._disassociate_network(self.admin_client, network['id'])
@test.attr(type='smoke')
@test.idempotent_id('1738de5d-0476-4163-9022-5e1b548c208e')
def test_policy_association_with_tenant_network(self):
policy = self.create_qos_policy(name='test-policy',
@ -163,7 +155,6 @@ class QosTestJSON(base.BaseAdminNetworkTest):
self._disassociate_network(self.client, network['id'])
@test.attr(type='smoke')
@test.idempotent_id('9efe63d0-836f-4cc2-b00c-468e63aa614e')
def test_policy_association_with_network_nonexistent_policy(self):
self.assertRaises(
@ -172,7 +163,6 @@ class QosTestJSON(base.BaseAdminNetworkTest):
'test network',
qos_policy_id='9efe63d0-836f-4cc2-b00c-468e63aa614e')
@test.attr(type='smoke')
@test.idempotent_id('1aa55a79-324f-47d9-a076-894a8fc2448b')
def test_policy_association_with_network_non_shared_policy(self):
policy = self.create_qos_policy(name='test-policy',
@ -183,7 +173,6 @@ class QosTestJSON(base.BaseAdminNetworkTest):
self.create_network,
'test network', qos_policy_id=policy['id'])
@test.attr(type='smoke')
@test.idempotent_id('09a9392c-1359-4cbb-989f-fb768e5834a8')
def test_policy_update_association_with_admin_network(self):
policy = self.create_qos_policy(name='test-policy',
@ -206,7 +195,6 @@ class QosTestJSON(base.BaseAdminNetworkTest):
updated_port = self.admin_client.show_port(port_id)
self.assertIsNone(updated_port['port']['qos_policy_id'])
@test.attr(type='smoke')
@test.idempotent_id('98fcd95e-84cf-4746-860e-44692e674f2e')
def test_policy_association_with_port_shared_policy(self):
policy = self.create_qos_policy(name='test-policy',
@ -221,7 +209,6 @@ class QosTestJSON(base.BaseAdminNetworkTest):
self._disassociate_port(port['id'])
@test.attr(type='smoke')
@test.idempotent_id('49e02f5a-e1dd-41d5-9855-cfa37f2d195e')
def test_policy_association_with_port_nonexistent_policy(self):
network = self.create_shared_network('test network')
@ -231,7 +218,6 @@ class QosTestJSON(base.BaseAdminNetworkTest):
network,
qos_policy_id='49e02f5a-e1dd-41d5-9855-cfa37f2d195e')
@test.attr(type='smoke')
@test.idempotent_id('f53d961c-9fe5-4422-8b66-7add972c6031')
def test_policy_association_with_port_non_shared_policy(self):
policy = self.create_qos_policy(name='test-policy',
@ -243,7 +229,6 @@ class QosTestJSON(base.BaseAdminNetworkTest):
self.create_port,
network, qos_policy_id=policy['id'])
@test.attr(type='smoke')
@test.idempotent_id('f8163237-fba9-4db5-9526-bad6d2343c76')
def test_policy_update_association_with_port_shared_policy(self):
policy = self.create_qos_policy(name='test-policy',
@ -261,7 +246,6 @@ class QosTestJSON(base.BaseAdminNetworkTest):
self._disassociate_port(port['id'])
@test.attr(type='smoke')
@test.idempotent_id('18163237-8ba9-4db5-9525-bad6d2343c75')
def test_delete_not_allowed_if_policy_in_use_by_network(self):
policy = self.create_qos_policy(name='test-policy',
@ -276,7 +260,6 @@ class QosTestJSON(base.BaseAdminNetworkTest):
self._disassociate_network(self.admin_client, network['id'])
self.admin_client.delete_qos_policy(policy['id'])
@test.attr(type='smoke')
@test.idempotent_id('24153230-84a9-4dd5-9525-bad6d2343c75')
def test_delete_not_allowed_if_policy_in_use_by_port(self):
policy = self.create_qos_policy(name='test-policy',
@ -291,7 +274,6 @@ class QosTestJSON(base.BaseAdminNetworkTest):
self._disassociate_port(port['id'])
self.admin_client.delete_qos_policy(policy['id'])
@test.attr(type='smoke')
@test.idempotent_id('a2a5849b-dd06-4b18-9664-0b6828a1fc27')
def test_qos_policy_delete_with_rules(self):
policy = self.create_qos_policy(name='test-policy',
@ -312,7 +294,6 @@ class QosBandwidthLimitRuleTestJSON(base.BaseAdminNetworkTest):
def resource_setup(cls):
super(QosBandwidthLimitRuleTestJSON, cls).resource_setup()
@test.attr(type='smoke')
@test.idempotent_id('8a59b00b-3e9c-4787-92f8-93a5cdf5e378')
def test_rule_create(self):
policy = self.create_qos_policy(name='test-policy',
@ -344,7 +325,6 @@ class QosBandwidthLimitRuleTestJSON(base.BaseAdminNetworkTest):
self.assertEqual(qos_consts.RULE_TYPE_BANDWIDTH_LIMIT,
policy_rules[0]['type'])
@test.attr(type='smoke')
@test.idempotent_id('8a59b00b-ab01-4787-92f8-93a5cdf5e378')
def test_rule_create_fail_for_the_same_type(self):
policy = self.create_qos_policy(name='test-policy',
@ -359,7 +339,6 @@ class QosBandwidthLimitRuleTestJSON(base.BaseAdminNetworkTest):
policy_id=policy['id'],
max_kbps=201, max_burst_kbps=1338)
@test.attr(type='smoke')
@test.idempotent_id('149a6988-2568-47d2-931e-2dbc858943b3')
def test_rule_update(self):
policy = self.create_qos_policy(name='test-policy',
@ -380,7 +359,6 @@ class QosBandwidthLimitRuleTestJSON(base.BaseAdminNetworkTest):
self.assertEqual(200, retrieved_policy['max_kbps'])
self.assertEqual(1337, retrieved_policy['max_burst_kbps'])
@test.attr(type='smoke')
@test.idempotent_id('67ee6efd-7b33-4a68-927d-275b4f8ba958')
def test_rule_delete(self):
policy = self.create_qos_policy(name='test-policy',
@ -399,7 +377,6 @@ class QosBandwidthLimitRuleTestJSON(base.BaseAdminNetworkTest):
self.admin_client.show_bandwidth_limit_rule,
policy['id'], rule['id'])
@test.attr(type='smoke')
@test.idempotent_id('f211222c-5808-46cb-a961-983bbab6b852')
def test_rule_create_rule_nonexistent_policy(self):
self.assertRaises(
@ -407,7 +384,6 @@ class QosBandwidthLimitRuleTestJSON(base.BaseAdminNetworkTest):
self.create_qos_bandwidth_limit_rule,
'policy', 200, 1337)
@test.attr(type='smoke')
@test.idempotent_id('eed8e2a6-22da-421b-89b9-935a2c1a1b50')
def test_policy_create_forbidden_for_regular_tenants(self):
self.assertRaises(
@ -415,7 +391,6 @@ class QosBandwidthLimitRuleTestJSON(base.BaseAdminNetworkTest):
self.client.create_qos_policy,
'test-policy', 'test policy', False)
@test.attr(type='smoke')
@test.idempotent_id('a4a2e7ad-786f-4927-a85a-e545a93bd274')
def test_rule_create_forbidden_for_regular_tenants(self):
self.assertRaises(
@ -423,7 +398,6 @@ class QosBandwidthLimitRuleTestJSON(base.BaseAdminNetworkTest):
self.client.create_bandwidth_limit_rule,
'policy', 1, 2)
@test.attr(type='smoke')
@test.idempotent_id('ce0bd0c2-54d9-4e29-85f1-cfb36ac3ebe2')
def test_get_rules_by_policy(self):
policy1 = self.create_qos_policy(name='test-policy1',
@ -709,7 +683,6 @@ class QosDscpMarkingRuleTestJSON(base.BaseAdminNetworkTest):
def resource_setup(cls):
super(QosDscpMarkingRuleTestJSON, cls).resource_setup()
@test.attr(type='smoke')
@test.idempotent_id('8a59b00b-3e9c-4787-92f8-93a5cdf5e378')
def test_rule_create(self):
policy = self.create_qos_policy(name='test-policy',
@ -739,7 +712,6 @@ class QosDscpMarkingRuleTestJSON(base.BaseAdminNetworkTest):
self.assertEqual(qos_consts.RULE_TYPE_DSCP_MARK,
policy_rules[0]['type'])
@test.attr(type='smoke')
@test.idempotent_id('8a59b00b-ab01-4787-92f8-93a5cdf5e378')
def test_rule_create_fail_for_the_same_type(self):
policy = self.create_qos_policy(name='test-policy',
@ -753,7 +725,6 @@ class QosDscpMarkingRuleTestJSON(base.BaseAdminNetworkTest):
policy_id=policy['id'],
dscp_mark=self.VALID_DSCP_MARK2)
@test.attr(type='smoke')
@test.idempotent_id('149a6988-2568-47d2-931e-2dbc858943b3')
def test_rule_update(self):
policy = self.create_qos_policy(name='test-policy',
@ -770,7 +741,6 @@ class QosDscpMarkingRuleTestJSON(base.BaseAdminNetworkTest):
retrieved_policy = retrieved_policy['dscp_marking_rule']
self.assertEqual(self.VALID_DSCP_MARK2, retrieved_policy['dscp_mark'])
@test.attr(type='smoke')
@test.idempotent_id('67ee6efd-7b33-4a68-927d-275b4f8ba958')
def test_rule_delete(self):
policy = self.create_qos_policy(name='test-policy',
@ -789,7 +759,6 @@ class QosDscpMarkingRuleTestJSON(base.BaseAdminNetworkTest):
self.admin_client.show_dscp_marking_rule,
policy['id'], rule['id'])
@test.attr(type='smoke')
@test.idempotent_id('f211222c-5808-46cb-a961-983bbab6b852')
def test_rule_create_rule_nonexistent_policy(self):
self.assertRaises(
@ -797,7 +766,6 @@ class QosDscpMarkingRuleTestJSON(base.BaseAdminNetworkTest):
self.admin_client.create_dscp_marking_rule,
'policy', self.VALID_DSCP_MARK1)
@test.attr(type='smoke')
@test.idempotent_id('a4a2e7ad-786f-4927-a85a-e545a93bd274')
def test_rule_create_forbidden_for_regular_tenants(self):
self.assertRaises(
@ -805,7 +773,6 @@ class QosDscpMarkingRuleTestJSON(base.BaseAdminNetworkTest):
self.client.create_dscp_marking_rule,
'policy', self.VALID_DSCP_MARK1)
@test.attr(type='smoke')
@test.idempotent_id('33646b08-4f05-4493-a48a-bde768a18533')
def test_invalid_rule_create(self):
policy = self.create_qos_policy(name='test-policy',
@ -816,7 +783,6 @@ class QosDscpMarkingRuleTestJSON(base.BaseAdminNetworkTest):
self.admin_client.create_dscp_marking_rule,
policy['id'], 58)
@test.attr(type='smoke')
@test.idempotent_id('ce0bd0c2-54d9-4e29-85f1-cfb36ac3ebe2')
def test_get_rules_by_policy(self):
policy1 = self.create_qos_policy(name='test-policy1',

View File

@ -39,7 +39,6 @@ class RoutersTest(base.BaseRouterTest):
if cls._ip_version == 4 else
config.safe_get_config_value('network', 'project_network_v6_cidr'))
@test.attr(type='smoke')
@test.idempotent_id('c72c1c0c-2193-4aca-eeee-b1442640eeee')
@test.requires_ext(extension="standard-attr-description",
service="network")
@ -55,7 +54,6 @@ class RoutersTest(base.BaseRouterTest):
@test.idempotent_id('847257cc-6afd-4154-b8fb-af49f5670ce8')
@test.requires_ext(extension='ext-gw-mode', service='network')
@test.attr(type='smoke')
def test_create_router_with_default_snat_value(self):
# Create a router with default snat rule
name = data_utils.rand_name('router')
@ -67,7 +65,6 @@ class RoutersTest(base.BaseRouterTest):
@test.idempotent_id('ea74068d-09e9-4fd7-8995-9b6a1ace920f')
@test.requires_ext(extension='ext-gw-mode', service='network')
@test.attr(type='smoke')
def test_create_router_with_snat_explicit(self):
name = data_utils.rand_name('snat-router')
# Create a router enabling snat attributes
@ -110,7 +107,6 @@ class RoutersTest(base.BaseRouterTest):
@test.idempotent_id('b386c111-3b21-466d-880c-5e72b01e1a33')
@test.requires_ext(extension='ext-gw-mode', service='network')
@test.attr(type='smoke')
def test_update_router_set_gateway_with_snat_explicit(self):
router = self._create_router(data_utils.rand_name('router-'))
self.admin_client.update_router_with_snat_gw_info(
@ -126,7 +122,6 @@ class RoutersTest(base.BaseRouterTest):
@test.idempotent_id('96536bc7-8262-4fb2-9967-5c46940fa279')
@test.requires_ext(extension='ext-gw-mode', service='network')
@test.attr(type='smoke')
def test_update_router_set_gateway_without_snat(self):
router = self._create_router(data_utils.rand_name('router-'))
self.admin_client.update_router_with_snat_gw_info(
@ -142,7 +137,6 @@ class RoutersTest(base.BaseRouterTest):
@test.idempotent_id('f2faf994-97f4-410b-a831-9bc977b64374')
@test.requires_ext(extension='ext-gw-mode', service='network')
@test.attr(type='smoke')
def test_update_router_reset_gateway_without_snat(self):
router = self._create_router(
data_utils.rand_name('router-'),
@ -160,7 +154,6 @@ class RoutersTest(base.BaseRouterTest):
@test.idempotent_id('c86ac3a8-50bd-4b00-a6b8-62af84a0765c')
@test.requires_ext(extension='extraroute', service='network')
@test.attr(type='smoke')
def test_update_extra_route(self):
self.network = self.create_network()
self.name = self.network['name']
@ -193,7 +186,6 @@ class RoutersTest(base.BaseRouterTest):
def _delete_extra_routes(self, router_id):
self.client.delete_extra_routes(router_id)
@test.attr(type='smoke')
@test.idempotent_id('01f185d1-d1a6-4cf9-abf7-e0e1384c169c')
def test_network_attached_with_two_routers(self):
network = self.create_network(data_utils.rand_name('network1'))
@ -231,7 +223,6 @@ class DvrRoutersTest(base.BaseRouterTest):
def skip_checks(cls):
super(DvrRoutersTest, cls).skip_checks()
@test.attr(type='smoke')
@test.idempotent_id('141297aa-3424-455d-aa8d-f2d95731e00a')
def test_create_distributed_router(self):
name = data_utils.rand_name('router')
@ -242,7 +233,6 @@ class DvrRoutersTest(base.BaseRouterTest):
self.admin_client)
self.assertTrue(create_body['router']['distributed'])
@test.attr(type='smoke')
@test.idempotent_id('644d7a4a-01a1-4b68-bb8d-0c0042cb1729')
def test_convert_centralized_router(self):
router = self._create_router(data_utils.rand_name('router'))

View File

@ -35,7 +35,7 @@ class DvrRoutersNegativeTest(base.BaseRouterTest):
cls.network = cls.create_network()
cls.subnet = cls.create_subnet(cls.network)
@test.attr(type=['negative', 'smoke'])
@test.attr(type='negative')
@test.idempotent_id('4990b055-8fc7-48ab-bba7-aa28beaad0b9')
def test_router_create_tenant_distributed_returns_forbidden(self):
with testtools.ExpectedException(lib_exc.Forbidden):

View File

@ -26,7 +26,6 @@ class SecGroupTest(base.BaseSecGroupTest):
def resource_setup(cls):
super(SecGroupTest, cls).resource_setup()
@test.attr(type='smoke')
@test.idempotent_id('bfd128e5-3c92-44b6-9d66-7fe29d22c802')
def test_create_list_update_show_delete_security_group(self):
group_create_body, name = self._create_security_group()

View File

@ -61,7 +61,7 @@ class NegativeSecGroupTest(base.BaseSecGroupTest):
direction='ingress', ethertype=self.ethertype)
self.assertIn(msg, str(ex))
@test.attr(type=['negative', 'smoke'])
@test.attr(type='negative')
@test.idempotent_id('55100aa8-b24f-333c-0bef-64eefd85f15c')
def test_update_default_security_group_name(self):
sg_list = self.client.list_security_groups(name='default')

View File

@ -22,7 +22,6 @@ class ServiceTypeManagementTest(base.BaseNetworkTest):
def resource_setup(cls):
super(ServiceTypeManagementTest, cls).resource_setup()
@test.attr(type='smoke')
@test.idempotent_id('2cbbeea9-f010-40f6-8df5-4eaa0c918ea6')
def test_service_provider_list(self):
body = self.client.list_service_providers()

View File

@ -90,7 +90,6 @@ class SubnetPoolsTest(SubnetPoolsTestBase):
self.assertEqual(expected_values['prefixes'],
updated_pool['prefixes'])
@test.attr(type='smoke')
@test.idempotent_id('6e1781ec-b45b-4042-aebe-f485c022996e')
def test_create_list_subnetpool(self):
created_subnetpool = self._create_subnetpool()
@ -103,7 +102,6 @@ class SubnetPoolsTest(SubnetPoolsTestBase):
[sp['name'] for sp in subnetpools],
"Created subnetpool name should be in the list")
@test.attr(type='smoke')
@test.idempotent_id('c72c1c0c-2193-4aca-ddd4-b1442640bbbb')
@test.requires_ext(extension="standard-attr-description",
service="network")
@ -120,7 +118,6 @@ class SubnetPoolsTest(SubnetPoolsTestBase):
self.client.list_subnetpools()['subnetpools'])[0]
self.assertEqual('d2', body['description'])
@test.attr(type='smoke')
@test.idempotent_id('741d08c2-1e3f-42be-99c7-0ea93c5b728c')
def test_get_subnetpool(self):
created_subnetpool = self._create_subnetpool()
@ -133,7 +130,6 @@ class SubnetPoolsTest(SubnetPoolsTestBase):
self.assertEqual(prefixlen, subnetpool['default_prefixlen'])
self.assertFalse(subnetpool['shared'])
@test.attr(type='smoke')
@test.idempotent_id('764f1b93-1c4a-4513-9e7b-6c2fc5e9270c')
def test_tenant_update_subnetpool(self):
created_subnetpool = self._create_subnetpool()
@ -148,7 +144,6 @@ class SubnetPoolsTest(SubnetPoolsTestBase):
subnetpool)
self.assertFalse(subnetpool['shared'])
@test.attr(type='smoke')
@test.idempotent_id('4b496082-c992-4319-90be-d4a7ce646290')
def test_update_subnetpool_prefixes_append(self):
# We can append new prefixes to subnetpool
@ -164,7 +159,6 @@ class SubnetPoolsTest(SubnetPoolsTestBase):
self.assertIn(self.new_prefix, prefixes)
self.assertIn(old_prefixes[0], prefixes)
@test.attr(type='smoke')
@test.idempotent_id('2cae5d6a-9d32-42d8-8067-f13970ae13bb')
def test_update_subnetpool_prefixes_extend(self):
# We can extend current subnetpool prefixes
@ -178,7 +172,6 @@ class SubnetPoolsTest(SubnetPoolsTestBase):
self.assertIn(self.larger_prefix, prefixes)
self.assertNotIn(old_prefixes[0], prefixes)
@test.attr(type='smoke')
@test.idempotent_id('d70c6c35-913b-4f24-909f-14cd0d29b2d2')
def test_admin_create_shared_subnetpool(self):
created_subnetpool = self._create_subnetpool(is_admin=True,
@ -212,7 +205,6 @@ class SubnetPoolsTest(SubnetPoolsTestBase):
subnet = body['subnet']
return pool_id, subnet
@test.attr(type='smoke')
@test.idempotent_id('1362ed7d-3089-42eb-b3a5-d6cb8398ee77')
def test_create_subnet_from_pool_with_prefixlen(self):
subnet_values = {"prefixlen": self.max_prefixlen}
@ -222,7 +214,6 @@ class SubnetPoolsTest(SubnetPoolsTestBase):
self.assertEqual(pool_id, subnet['subnetpool_id'])
self.assertTrue(cidr.endswith(str(self.max_prefixlen)))
@test.attr(type='smoke')
@test.idempotent_id('86b86189-9789-4582-9c3b-7e2bfe5735ee')
def test_create_subnet_from_pool_with_subnet_cidr(self):
subnet_values = {"cidr": self.subnet_cidr}
@ -232,7 +223,6 @@ class SubnetPoolsTest(SubnetPoolsTestBase):
self.assertEqual(pool_id, subnet['subnetpool_id'])
self.assertEqual(cidr, self.subnet_cidr)
@test.attr(type='smoke')
@test.idempotent_id('83f76e3a-9c40-40c2-a015-b7c5242178d8')
def test_create_subnet_from_pool_with_default_prefixlen(self):
# If neither cidr nor prefixlen is specified,
@ -243,7 +233,6 @@ class SubnetPoolsTest(SubnetPoolsTestBase):
prefixlen = self._subnetpool_data['min_prefixlen']
self.assertTrue(cidr.endswith(str(prefixlen)))
@test.attr(type='smoke')
@test.idempotent_id('a64af292-ec52-4bde-b654-a6984acaf477')
def test_create_subnet_from_pool_with_quota(self):
pool_values = {'default_quota': 4}
@ -254,7 +243,6 @@ class SubnetPoolsTest(SubnetPoolsTestBase):
self.assertEqual(pool_id, subnet['subnetpool_id'])
self.assertTrue(cidr.endswith(str(self.max_prefixlen)))
@test.attr(type='smoke')
@test.idempotent_id('49b44c64-1619-4b29-b527-ffc3c3115dc4')
@test.requires_ext(extension='address-scope', service='network')
def test_create_subnetpool_associate_address_scope(self):
@ -267,7 +255,6 @@ class SubnetPoolsTest(SubnetPoolsTestBase):
self.assertEqual(address_scope['id'],
body['subnetpool']['address_scope_id'])
@test.attr(type='smoke')
@test.idempotent_id('910b6393-db24-4f6f-87dc-b36892ad6c8c')
@test.requires_ext(extension='address-scope', service='network')
def test_update_subnetpool_associate_address_scope(self):
@ -284,7 +271,6 @@ class SubnetPoolsTest(SubnetPoolsTestBase):
self.assertEqual(address_scope['id'],
body['subnetpool']['address_scope_id'])
@test.attr(type='smoke')
@test.idempotent_id('18302e80-46a3-4563-82ac-ccd1dd57f652')
@test.requires_ext(extension='address-scope', service='network')
def test_update_subnetpool_associate_another_address_scope(self):
@ -306,7 +292,6 @@ class SubnetPoolsTest(SubnetPoolsTestBase):
self.assertEqual(another_address_scope['id'],
body['subnetpool']['address_scope_id'])
@test.attr(type='smoke')
@test.idempotent_id('f8970048-e41b-42d6-934b-a1297b07706a')
@test.requires_ext(extension='address-scope', service='network')
def test_update_subnetpool_disassociate_address_scope(self):
@ -342,7 +327,6 @@ class SubnetPoolsTestV6(SubnetPoolsTest):
cls._subnetpool_data = {'min_prefixlen': min_prefixlen,
'prefixes': prefixes}
@test.attr(type='smoke')
@test.idempotent_id('f62d73dc-cf6f-4879-b94b-dab53982bf3b')
def test_create_dual_stack_subnets_from_subnetpools(self):
pool_id_v6, subnet_v6 = self._create_subnet_from_pool()

View File

@ -30,14 +30,14 @@ class SubnetPoolsNegativeTestJSON(test_subnetpools.SubnetPoolsTestBase):
smaller_prefix = u'10.11.12.0/26'
@test.attr(type=['negative', 'smoke'])
@test.attr(type='negative')
@test.idempotent_id('0212a042-603a-4f46-99e0-e37de9374d30')
def test_get_non_existent_subnetpool(self):
non_exist_id = data_utils.rand_name('subnetpool')
self.assertRaises(lib_exc.NotFound, self.client.show_subnetpool,
non_exist_id)
@test.attr(type=['negative', 'smoke'])
@test.attr(type='negative')
@test.idempotent_id('dc9336e5-f28f-4658-a0b0-cc79e607007d')
def test_tenant_get_not_shared_admin_subnetpool(self):
created_subnetpool = self._create_subnetpool(is_admin=True)
@ -45,28 +45,28 @@ class SubnetPoolsNegativeTestJSON(test_subnetpools.SubnetPoolsTestBase):
self.assertRaises(lib_exc.NotFound, self.client.show_subnetpool,
created_subnetpool['id'])
@test.attr(type=['negative', 'smoke'])
@test.attr(type='negative')
@test.idempotent_id('5e1f2f86-d81a-498c-82ed-32a49f4dc4d3')
def test_delete_non_existent_subnetpool(self):
non_exist_id = data_utils.rand_name('subnetpool')
self.assertRaises(lib_exc.NotFound, self.client.delete_subnetpool,
non_exist_id)
@test.attr(type=['negative', 'smoke'])
@test.attr(type='negative')
@test.idempotent_id('d1143fe2-212b-4e23-a308-d18f7d8d78d6')
def test_tenant_create_shared_subnetpool(self):
# 'shared' subnetpool can only be created by admin.
self.assertRaises(lib_exc.Forbidden, self._create_subnetpool,
is_admin=False, shared=True)
@test.attr(type=['negative', 'smoke'])
@test.attr(type='negative')
@test.idempotent_id('4be84d30-60ca-4bd3-8512-db5b36ce1378')
def test_update_non_existent_subnetpool(self):
non_exist_id = data_utils.rand_name('subnetpool')
self.assertRaises(lib_exc.NotFound, self.client.update_subnetpool,
non_exist_id, name='foo-name')
@test.attr(type=['negative', 'smoke'])
@test.attr(type='negative')
@test.idempotent_id('e6cd6d87-6173-45dd-bf04-c18ea7ec7537')
def test_update_subnetpool_not_modifiable_shared(self):
# 'shared' attributes can be specified during creation.
@ -76,7 +76,7 @@ class SubnetPoolsNegativeTestJSON(test_subnetpools.SubnetPoolsTestBase):
self.assertRaises(lib_exc.BadRequest, self.client.update_subnetpool,
pool_id, shared=True)
@test.attr(type=['negative', 'smoke'])
@test.attr(type='negative')
@test.idempotent_id('62f7c43b-bff1-4def-8bb7-4754b840aaad')
def test_update_subnetpool_prefixes_shrink(self):
# Shrink current subnetpool prefixes is not supported
@ -86,7 +86,7 @@ class SubnetPoolsNegativeTestJSON(test_subnetpools.SubnetPoolsTestBase):
created_subnetpool['id'],
prefixes=[self.smaller_prefix])
@test.attr(type=['negative', 'smoke'])
@test.attr(type='negative')
@test.idempotent_id('fc011824-153e-4469-97ad-9808eb88cae1')
def test_create_subnet_different_pools_same_network(self):
network = self.create_network(network_name='smoke-network')
@ -103,21 +103,21 @@ class SubnetPoolsNegativeTestJSON(test_subnetpools.SubnetPoolsTestBase):
subnetpool_id=created_subnetpool['id'],
client=self.admin_client)
@test.attr(type=['negative', 'smoke'])
@test.attr(type='negative')
@test.idempotent_id('9589e332-638e-476e-81bd-013d964aa3cb')
@test.requires_ext(extension='address-scope', service='network')
def test_create_subnetpool_associate_invalid_address_scope(self):
self.assertRaises(lib_exc.BadRequest, self._create_subnetpool,
address_scope_id='foo-addr-scope')
@test.attr(type=['negative', 'smoke'])
@test.attr(type='negative')
@test.idempotent_id('3b6c5942-485d-4964-a560-55608af020b5')
@test.requires_ext(extension='address-scope', service='network')
def test_create_subnetpool_associate_non_exist_address_scope(self):
self.assertRaises(lib_exc.NotFound, self._create_subnetpool,
address_scope_id=str(uuid.uuid4()))
@test.attr(type=['negative', 'smoke'])
@test.attr(type='negative')
@test.idempotent_id('2dfb4269-8657-485a-a053-b022e911456e')
@test.requires_ext(extension='address-scope', service='network')
def test_create_subnetpool_associate_address_scope_prefix_intersect(self):
@ -133,7 +133,7 @@ class SubnetPoolsNegativeTestJSON(test_subnetpools.SubnetPoolsTestBase):
self.assertRaises(lib_exc.Conflict, self._create_subnetpool,
**subnetpool_data)
@test.attr(type=['negative', 'smoke'])
@test.attr(type='negative')
@test.idempotent_id('83a19a13-5384-42e2-b579-43fc69c80914')
@test.requires_ext(extension='address-scope', service='network')
def test_create_sp_associate_address_scope_multiple_prefix_intersect(self):
@ -151,7 +151,7 @@ class SubnetPoolsNegativeTestJSON(test_subnetpools.SubnetPoolsTestBase):
self.assertRaises(lib_exc.Conflict, self._create_subnetpool,
**subnetpool_data)
@test.attr(type=['negative', 'smoke'])
@test.attr(type='negative')
@test.idempotent_id('f06d8e7b-908b-4e94-b570-8156be6a4bf1')
@test.requires_ext(extension='address-scope', service='network')
def test_create_subnetpool_associate_address_scope_of_other_owner(self):
@ -161,7 +161,7 @@ class SubnetPoolsNegativeTestJSON(test_subnetpools.SubnetPoolsTestBase):
self.assertRaises(lib_exc.NotFound, self._create_subnetpool,
address_scope_id=address_scope['id'])
@test.attr(type=['negative', 'smoke'])
@test.attr(type='negative')
@test.idempotent_id('3396ec6c-cb80-4ebe-b897-84e904580bdf')
@test.requires_ext(extension='address-scope', service='network')
def test_tenant_create_subnetpool_associate_shared_address_scope(self):
@ -171,7 +171,6 @@ class SubnetPoolsNegativeTestJSON(test_subnetpools.SubnetPoolsTestBase):
self.assertRaises(lib_exc.BadRequest, self._create_subnetpool,
address_scope_id=address_scope['id'])
@test.attr(type='smoke')
@test.idempotent_id('6d3d9ad5-32d4-4d63-aa00-8c62f73e2881')
@test.requires_ext(extension='address-scope', service='network')
def test_update_subnetpool_associate_address_scope_of_other_owner(self):
@ -204,7 +203,7 @@ class SubnetPoolsNegativeTestJSON(test_subnetpools.SubnetPoolsTestBase):
self.assertRaises(lib_exc.Conflict, self.client.update_subnetpool,
pool_id_1, prefixes=pool_1_updated_prefixes)
@test.attr(type=['negative', 'smoke'])
@test.attr(type='negative')
@test.idempotent_id('96006292-7214-40e0-a471-153fb76e6b31')
@test.requires_ext(extension='address-scope', service='network')
def test_update_subnetpool_prefix_intersect(self):
@ -214,7 +213,7 @@ class SubnetPoolsNegativeTestJSON(test_subnetpools.SubnetPoolsTestBase):
self._test_update_subnetpool_prefix_intersect_helper(
pool_1_prefix, pool_2_prefix, pool_1_updated_prefix)
@test.attr(type=['negative', 'smoke'])
@test.attr(type='negative')
@test.idempotent_id('4d3f8a79-c530-4e59-9acf-6c05968adbfe')
@test.requires_ext(extension='address-scope', service='network')
def test_update_subnetpool_multiple_prefix_intersect(self):
@ -225,7 +224,7 @@ class SubnetPoolsNegativeTestJSON(test_subnetpools.SubnetPoolsTestBase):
self._test_update_subnetpool_prefix_intersect_helper(
pool_1_prefixes, pool_2_prefixes, pool_1_updated_prefixes)
@test.attr(type=['negative', 'smoke'])
@test.attr(type='negative')
@test.idempotent_id('7438e49e-1351-45d8-937b-892059fb97f5')
@test.requires_ext(extension='address-scope', service='network')
def test_tenant_update_sp_prefix_associated_with_shared_addr_scope(self):
@ -256,7 +255,6 @@ class SubnetPoolsNegativeTestJSON(test_subnetpools.SubnetPoolsTestBase):
self.assertEqual(update_prefixes,
body['subnetpool']['prefixes'])
@test.attr(type='smoke')
@test.idempotent_id('648fee7d-a909-4ced-bad3-3a169444c0a8')
def test_update_subnetpool_associate_address_scope_wrong_ip_version(self):
address_scope = self.create_address_scope(