remove smoke tag from admin tests

remove the smoke test from the admin tests. The smoke tag should
really be a small set of positive user level tests of function, admin
only tests really don't fit in this category.

Change-Id: I940324172405865c4c56c4c1fd1b49819be5ef0e
This commit is contained in:
Sean Dague 2015-04-27 11:03:59 -04:00
parent 2a434871b8
commit f0462a116e
32 changed files with 1 additions and 108 deletions

View File

@ -17,7 +17,6 @@ from tempest import test
class TestApiDiscovery(base.BaseBaremetalTest):
"""Tests for API discovery features."""
@test.attr(type='smoke')
@test.idempotent_id('a3c27e94-f56c-42c4-8600-d6790650b9c5')
def test_api_versions(self):
_, descr = self.client.get_api_description()
@ -27,14 +26,12 @@ class TestApiDiscovery(base.BaseBaremetalTest):
for v in expected_versions:
self.assertIn(v, versions)
@test.attr(type='smoke')
@test.idempotent_id('896283a6-488e-4f31-af78-6614286cbe0d')
def test_default_version(self):
_, descr = self.client.get_api_description()
default_version = descr['default_version']
self.assertEqual(default_version['id'], 'v1')
@test.attr(type='smoke')
@test.idempotent_id('abc0b34d-e684-4546-9728-ab7a9ad9f174')
def test_version_1_resources(self):
_, descr = self.client.get_version_description(version='v1')

View File

@ -33,14 +33,12 @@ class TestChassis(base.BaseBaremetalTest):
self.assertIn(key, actual)
self.assertEqual(value, actual[key])
@test.attr(type='smoke')
@test.idempotent_id('7c5a2e09-699c-44be-89ed-2bc189992d42')
def test_create_chassis(self):
descr = data_utils.rand_name('test-chassis')
_, chassis = self.create_chassis(description=descr)
self.assertEqual(chassis['description'], descr)
@test.attr(type='smoke')
@test.idempotent_id('cabe9c6f-dc16-41a7-b6b9-0a90c212edd5')
def test_create_chassis_unicode_description(self):
# Use a unicode string for testing:
@ -49,20 +47,17 @@ class TestChassis(base.BaseBaremetalTest):
_, chassis = self.create_chassis(description=descr)
self.assertEqual(chassis['description'], descr)
@test.attr(type='smoke')
@test.idempotent_id('c84644df-31c4-49db-a307-8942881f41c0')
def test_show_chassis(self):
_, chassis = self.client.show_chassis(self.chassis['uuid'])
self._assertExpected(self.chassis, chassis)
@test.attr(type="smoke")
@test.idempotent_id('29c9cd3f-19b5-417b-9864-99512c3b33b3')
def test_list_chassis(self):
_, body = self.client.list_chassis()
self.assertIn(self.chassis['uuid'],
[i['uuid'] for i in body['chassis']])
@test.attr(type='smoke')
@test.idempotent_id('5ae649ad-22d1-4fe1-bbc6-97227d199fb3')
def test_delete_chassis(self):
_, body = self.create_chassis()
@ -71,7 +66,6 @@ class TestChassis(base.BaseBaremetalTest):
self.delete_chassis(uuid)
self.assertRaises(lib_exc.NotFound, self.client.show_chassis, uuid)
@test.attr(type='smoke')
@test.idempotent_id('cda8a41f-6be2-4cbf-840c-994b00a89b44')
def test_update_chassis(self):
_, body = self.create_chassis()
@ -83,7 +77,6 @@ class TestChassis(base.BaseBaremetalTest):
_, chassis = self.client.show_chassis(uuid)
self.assertEqual(chassis['description'], new_description)
@test.attr(type='smoke')
@test.idempotent_id('76305e22-a4e2-4ab3-855c-f4e2368b9335')
def test_chassis_node_list(self):
_, node = self.create_node(self.chassis['uuid'])

View File

@ -26,14 +26,12 @@ class TestDrivers(base.BaseBaremetalTest):
super(TestDrivers, cls).resource_setup()
cls.driver_name = CONF.baremetal.driver
@test.attr(type="smoke")
@test.idempotent_id('5aed2790-7592-4655-9b16-99abcc2e6ec5')
def test_list_drivers(self):
_, drivers = self.client.list_drivers()
self.assertIn(self.driver_name,
[d['name'] for d in drivers['drivers']])
@test.attr(type="smoke")
@test.idempotent_id('fb3287a3-c4d7-44bf-ae9d-1eef906d78ce')
def test_show_driver(self):
_, driver = self.client.show_driver(self.driver_name)

View File

@ -46,7 +46,6 @@ class TestNodes(base.BaseBaremetalTest):
uuid=self.node['uuid'], instance_uuid=None)
return instance_uuid
@test.attr(type='smoke')
@test.idempotent_id('4e939eb2-8a69-4e84-8652-6fffcbc9db8f')
def test_create_node(self):
params = {'cpu_arch': 'x86_64',
@ -57,7 +56,6 @@ class TestNodes(base.BaseBaremetalTest):
_, body = self.create_node(self.chassis['uuid'], **params)
self._assertExpected(params, body['properties'])
@test.attr(type='smoke')
@test.idempotent_id('9ade60a4-505e-4259-9ec4-71352cbbaf47')
def test_delete_node(self):
_, node = self.create_node(self.chassis['uuid'])
@ -67,20 +65,17 @@ class TestNodes(base.BaseBaremetalTest):
self.assertRaises(lib_exc.NotFound, self.client.show_node,
node['uuid'])
@test.attr(type='smoke')
@test.idempotent_id('55451300-057c-4ecf-8255-ba42a83d3a03')
def test_show_node(self):
_, loaded_node = self.client.show_node(self.node['uuid'])
self._assertExpected(self.node, loaded_node)
@test.attr(type='smoke')
@test.idempotent_id('4ca123c4-160d-4d8d-a3f7-15feda812263')
def test_list_nodes(self):
_, body = self.client.list_nodes()
self.assertIn(self.node['uuid'],
[i['uuid'] for i in body['nodes']])
@test.attr(type='smoke')
@test.idempotent_id('85b1f6e0-57fd-424c-aeff-c3422920556f')
def test_list_nodes_association(self):
_, body = self.client.list_nodes(associated=True)
@ -95,7 +90,6 @@ class TestNodes(base.BaseBaremetalTest):
_, body = self.client.list_nodes(associated=False)
self.assertNotIn(self.node['uuid'], [n['uuid'] for n in body['nodes']])
@test.attr(type='smoke')
@test.idempotent_id('18c4ebd8-f83a-4df7-9653-9fb33a329730')
def test_node_port_list(self):
_, port = self.create_port(self.node['uuid'],
@ -104,14 +98,12 @@ class TestNodes(base.BaseBaremetalTest):
self.assertIn(port['uuid'],
[p['uuid'] for p in body['ports']])
@test.attr(type='smoke')
@test.idempotent_id('72591acb-f215-49db-8395-710d14eb86ab')
def test_node_port_list_no_ports(self):
_, node = self.create_node(self.chassis['uuid'])
_, body = self.client.list_node_ports(node['uuid'])
self.assertEmpty(body['ports'])
@test.attr(type='smoke')
@test.idempotent_id('4fed270a-677a-4d19-be87-fd38ae490320')
def test_update_node(self):
props = {'cpu_arch': 'x86_64',
@ -130,7 +122,6 @@ class TestNodes(base.BaseBaremetalTest):
_, node = self.client.show_node(node['uuid'])
self._assertExpected(new_p, node['properties'])
@test.attr(type='smoke')
@test.idempotent_id('cbf1f515-5f4b-4e49-945c-86bcaccfeb1d')
def test_validate_driver_interface(self):
_, body = self.client.validate_driver_interface(self.node['uuid'])
@ -138,12 +129,10 @@ class TestNodes(base.BaseBaremetalTest):
for interface in core_interfaces:
self.assertIn(interface, body)
@test.attr(type='smoke')
@test.idempotent_id('5519371c-26a2-46e9-aa1a-f74226e9d71f')
def test_set_node_boot_device(self):
self.client.set_node_boot_device(self.node['uuid'], 'pxe')
@test.attr(type='smoke')
@test.idempotent_id('9ea73775-f578-40b9-bc34-efc639c4f21f')
def test_get_node_boot_device(self):
body = self.client.get_node_boot_device(self.node['uuid'])
@ -152,14 +141,12 @@ class TestNodes(base.BaseBaremetalTest):
self.assertTrue(isinstance(body['boot_device'], six.string_types))
self.assertTrue(isinstance(body['persistent'], bool))
@test.attr(type='smoke')
@test.idempotent_id('3622bc6f-3589-4bc2-89f3-50419c66b133')
def test_get_node_supported_boot_devices(self):
body = self.client.get_node_supported_boot_devices(self.node['uuid'])
self.assertIn('supported_boot_devices', body)
self.assertTrue(isinstance(body['supported_boot_devices'], list))
@test.attr(type='smoke')
@test.idempotent_id('f63b6288-1137-4426-8cfe-0d5b7eb87c06')
def test_get_console(self):
_, body = self.client.get_console(self.node['uuid'])
@ -167,7 +154,6 @@ class TestNodes(base.BaseBaremetalTest):
for key in con_info:
self.assertIn(key, body)
@test.attr(type='smoke')
@test.idempotent_id('80504575-9b21-4670-92d1-143b948f9437')
def test_set_console_mode(self):
self.client.set_console_mode(self.node['uuid'], True)
@ -175,7 +161,6 @@ class TestNodes(base.BaseBaremetalTest):
_, body = self.client.get_console(self.node['uuid'])
self.assertEqual(True, body['console_enabled'])
@test.attr(type='smoke')
@test.idempotent_id('b02a4f38-5e8b-44b2-aed2-a69a36ecfd69')
def test_get_node_by_instance_uuid(self):
instance_uuid = self._associate_node_with_instance()

View File

@ -42,14 +42,12 @@ class TestNodeStates(base.BaseBaremetalTest):
'the required time: %s sec.' % self.power_timeout)
raise exceptions.TimeoutException(message)
@test.attr(type='smoke')
@test.idempotent_id('cd8afa5e-3f57-4e43-8185-beb83d3c9015')
def test_list_nodestates(self):
_, nodestates = self.client.list_nodestates(self.node['uuid'])
for key in nodestates:
self.assertEqual(nodestates[key], self.node[key])
@test.attr(type='smoke')
@test.idempotent_id('fc5b9320-0c98-4e5a-8848-877fe5a0322c')
def test_set_node_power_state(self):
_, node = self.create_node(self.chassis['uuid'])

View File

@ -36,7 +36,6 @@ class TestPorts(base.BaseBaremetalTest):
self.assertIn(key, actual)
self.assertEqual(value, actual[key])
@test.attr(type='smoke')
@test.idempotent_id('83975898-2e50-42ed-b5f0-e510e36a0b56')
def test_create_port(self):
node_id = self.node['uuid']
@ -48,7 +47,6 @@ class TestPorts(base.BaseBaremetalTest):
self._assertExpected(port, body)
@test.attr(type='smoke')
@test.idempotent_id('d1f6b249-4cf6-4fe6-9ed6-a6e84b1bf67b')
def test_create_port_specifying_uuid(self):
node_id = self.node['uuid']
@ -62,7 +60,6 @@ class TestPorts(base.BaseBaremetalTest):
self._assertExpected(port, body)
@decorators.skip_because(bug='1398350')
@test.attr(type='smoke')
@test.idempotent_id('4a02c4b0-6573-42a4-a513-2e36ad485b62')
def test_create_port_with_extra(self):
node_id = self.node['uuid']
@ -76,7 +73,6 @@ class TestPorts(base.BaseBaremetalTest):
_, body = self.client.show_port(port['uuid'])
self._assertExpected(port, body)
@test.attr(type='smoke')
@test.idempotent_id('1bf257a9-aea3-494e-89c0-63f657ab4fdd')
def test_delete_port(self):
node_id = self.node['uuid']
@ -88,19 +84,16 @@ class TestPorts(base.BaseBaremetalTest):
self.assertRaises(lib_exc.NotFound, self.client.show_port,
port['uuid'])
@test.attr(type='smoke')
@test.idempotent_id('9fa77ab5-ce59-4f05-baac-148904ba1597')
def test_show_port(self):
_, port = self.client.show_port(self.port['uuid'])
self._assertExpected(self.port, port)
@test.attr(type='smoke')
@test.idempotent_id('7c1114ff-fc3f-47bb-bc2f-68f61620ba8b')
def test_show_port_by_address(self):
_, port = self.client.show_port_by_address(self.port['address'])
self._assertExpected(self.port, port['ports'][0])
@test.attr(type='smoke')
@test.idempotent_id('bd773405-aea5-465d-b576-0ab1780069e5')
def test_show_port_with_links(self):
_, port = self.client.show_port(self.port['uuid'])
@ -108,7 +101,6 @@ class TestPorts(base.BaseBaremetalTest):
self.assertEqual(2, len(port['links']))
self.assertIn(port['uuid'], port['links'][0]['href'])
@test.attr(type='smoke')
@test.idempotent_id('b5e91854-5cd7-4a8e-bb35-3e0a1314606d')
def test_list_ports(self):
_, body = self.client.list_ports()
@ -119,7 +111,6 @@ class TestPorts(base.BaseBaremetalTest):
self.validate_self_link('ports', port['uuid'],
port['links'][0]['href'])
@test.attr(type='smoke')
@test.idempotent_id('324a910e-2f80-4258-9087-062b5ae06240')
def test_list_with_limit(self):
_, body = self.client.list_ports(limit=3)
@ -165,7 +156,6 @@ class TestPorts(base.BaseBaremetalTest):
self.assertEqual(1, len(body['ports']))
self.assertEqual(address, body['ports'][0]['address'])
@test.attr(type='smoke')
@test.idempotent_id('9c26298b-1bcb-47b7-9b9e-8bdd6e3c4aba')
def test_update_port_replace(self):
node_id = self.node['uuid']
@ -198,7 +188,6 @@ class TestPorts(base.BaseBaremetalTest):
self.assertEqual(new_address, body['address'])
self.assertEqual(new_extra, body['extra'])
@test.attr(type='smoke')
@test.idempotent_id('d7e7fece-6ed9-460a-9ebe-9267217e8580')
def test_update_port_remove(self):
node_id = self.node['uuid']
@ -226,7 +215,6 @@ class TestPorts(base.BaseBaremetalTest):
self.assertEqual(node_id, body['node_uuid'])
self.assertEqual(address, body['address'])
@test.attr(type='smoke')
@test.idempotent_id('241288b3-e98a-400f-a4d7-d1f716146361')
def test_update_port_add(self):
node_id = self.node['uuid']
@ -249,7 +237,6 @@ class TestPorts(base.BaseBaremetalTest):
self.assertEqual(extra, body['extra'])
@decorators.skip_because(bug='1398350')
@test.attr(type='smoke')
@test.idempotent_id('5309e897-0799-4649-a982-0179b04c3876')
def test_update_port_mixed_ops(self):
node_id = self.node['uuid']

View File

@ -33,7 +33,7 @@ class BaremetalNodesAdminTestJSON(base.BaseV2ComputeAdminTest):
cls.client = cls.os_adm.baremetal_nodes_client
cls.ironic_client = cls.os_adm.baremetal_client
@test.attr(type=['smoke', 'baremetal'])
@test.attr(type=['baremetal'])
@test.idempotent_id('e475aa6e-416d-4fa4-b3af-28d5e84250fb')
def test_list_get_baremetal_nodes(self):
# Create some test nodes in Ironic directly

View File

@ -54,7 +54,6 @@ class QuotasAdminTestJSON(base.BaseV2ComputeAdminTest):
'instances', 'security_group_rules',
'cores', 'security_groups'))
@test.attr(type='smoke')
@test.idempotent_id('3b0a7c8f-cf58-46b8-a60c-715a32a8ba7d')
def test_get_default_quotas(self):
# Admin can get the default resource quota set for a tenant

View File

@ -55,7 +55,6 @@ class SecurityGroupDefaultRulesTest(base.BaseV2ComputeAdminTest):
self.assertEqual(cidr, rule['ip_range']['cidr'])
return rule
@test.attr(type='smoke')
@test.idempotent_id('6d880615-eec3-4d29-97c5-7a074dde239d')
def test_create_delete_security_group_default_rules(self):
# Create and delete Security Group default rule
@ -68,7 +67,6 @@ class SecurityGroupDefaultRulesTest(base.BaseV2ComputeAdminTest):
self.adm_client.get_security_group_default_rule,
rule['id'])
@test.attr(type='smoke')
@test.idempotent_id('4d752e0a-33a1-4c3a-b498-ff8667ca22e5')
def test_create_security_group_default_rule_without_cidr(self):
ip_protocol = 'udp'
@ -83,7 +81,6 @@ class SecurityGroupDefaultRulesTest(base.BaseV2ComputeAdminTest):
self.assertNotEqual(0, rule['id'])
self.assertEqual('0.0.0.0/0', rule['ip_range']['cidr'])
@test.attr(type='smoke')
@test.idempotent_id('29f2d218-69b0-4a95-8f3d-6bd0ef732b3a')
def test_create_security_group_default_rule_with_blank_cidr(self):
ip_protocol = 'icmp'
@ -100,7 +97,6 @@ class SecurityGroupDefaultRulesTest(base.BaseV2ComputeAdminTest):
self.assertNotEqual(0, rule['id'])
self.assertEqual('0.0.0.0/0', rule['ip_range']['cidr'])
@test.attr(type='smoke')
@test.idempotent_id('6e6de55e-9146-4ae0-89f2-3569586e0b9b')
def test_security_group_default_rules_list(self):
ip_protocol = 'tcp'
@ -117,7 +113,6 @@ class SecurityGroupDefaultRulesTest(base.BaseV2ComputeAdminTest):
self.assertNotEqual(0, len(rules))
self.assertIn(rule, rules)
@test.attr(type='smoke')
@test.idempotent_id('15cbb349-86b4-4f71-a048-04b7ef3f150b')
def test_default_security_group_default_rule_show(self):
ip_protocol = 'tcp'

View File

@ -41,7 +41,6 @@ class SecurityGroupsTestAdminJSON(base.BaseV2ComputeAdminTest):
@testtools.skipIf(CONF.service_available.neutron,
"Skipped because neutron does not support all_tenants "
"search filter.")
@test.attr(type='smoke')
@test.services('network')
def test_list_security_groups_list_all_tenants_filter(self):
# Admin can list security groups of all tenants

View File

@ -30,7 +30,6 @@ class ServicesTestJSON(base.BaseIdentityV2AdminTest):
self.assertRaises(lib_exc.NotFound, self.client.get_service,
service_id)
@test.attr(type='smoke')
@test.idempotent_id('84521085-c6e6-491c-9a08-ec9f70f90110')
def test_create_get_delete_service(self):
# GET Service

View File

@ -40,7 +40,6 @@ class UsersTestJSON(base.BaseIdentityV2AdminTest):
self.data.users.append(user)
self.assertEqual(self.alt_user, user['name'])
@test.attr(type='smoke')
@test.idempotent_id('89d9fdb8-15c2-4304-a429-48715d0af33d')
def test_create_user_with_enabled(self):
# Create a user with enabled : False
@ -54,7 +53,6 @@ class UsersTestJSON(base.BaseIdentityV2AdminTest):
self.assertEqual('false', str(user['enabled']).lower())
self.assertEqual(self.alt_email, user['email'])
@test.attr(type='smoke')
@test.idempotent_id('39d05857-e8a5-4ed4-ba83-0b52d3ab97ee')
def test_update_user(self):
# Test case to check if updating of user attributes is successful.
@ -81,7 +79,6 @@ class UsersTestJSON(base.BaseIdentityV2AdminTest):
self.assertEqual(u_email2, updated_user['email'])
self.assertEqual('false', str(updated_user['enabled']).lower())
@test.attr(type='smoke')
@test.idempotent_id('29ed26f4-a74e-4425-9a85-fdb49fa269d2')
def test_delete_user(self):
# Delete a user
@ -92,7 +89,6 @@ class UsersTestJSON(base.BaseIdentityV2AdminTest):
self.alt_email)
self.client.delete_user(user['id'])
@test.attr(type='smoke')
@test.idempotent_id('aca696c3-d645-4f45-b728-63646045beb1')
def test_user_authentication(self):
# Valid user's token is authenticated
@ -121,7 +117,6 @@ class UsersTestJSON(base.BaseIdentityV2AdminTest):
self.data.test_tenant)
self.client.auth_provider.clear_auth()
@test.attr(type='smoke')
@test.idempotent_id('a149c02e-e5e0-4b89-809e-7e8faf33ccda')
def test_get_users(self):
# Get a list of users and find the test user
@ -196,7 +191,6 @@ class UsersTestJSON(base.BaseIdentityV2AdminTest):
"Failed to find user %s in fetched list" %
', '.join(m_user for m_user in missing_users))
@test.attr(type='smoke')
@test.idempotent_id('1aeb25ac-6ec5-4d8b-97cb-7ac3567a989f')
def test_update_user_password(self):
# Test case to check if updating of user password is successful.

View File

@ -84,7 +84,6 @@ class CredentialsTestJSON(base.BaseIdentityV3AdminTest):
self.assertEqual(update_body['blob'][value2],
get_body['blob'][value2])
@test.attr(type='smoke')
@test.idempotent_id('13202c00-0021-42a1-88d4-81b44d448aab')
def test_credentials_list_delete(self):
created_cred_ids = list()

View File

@ -35,7 +35,6 @@ class TestDefaultProjectId (base.BaseIdentityV3AdminTest):
self.client.update_domain(domain_id, enabled=False)
self.client.delete_domain(domain_id)
@test.attr(type='smoke')
@test.idempotent_id('d6110661-6a71-49a7-a453-b5e26640ff6d')
def test_default_project_id(self):
# create a domain

View File

@ -27,7 +27,6 @@ class DomainsTestJSON(base.BaseIdentityV3AdminTest):
self.client.update_domain(domain_id, enabled=False)
self.client.delete_domain(domain_id)
@test.attr(type='smoke')
@test.idempotent_id('8cf516ef-2114-48f1-907b-d32726c734d4')
def test_list_domains(self):
# Test to list domains
@ -84,7 +83,6 @@ class DomainsTestJSON(base.BaseIdentityV3AdminTest):
self.assertEqual(new_desc, fetched_domain['description'])
self.assertEqual('true', str(fetched_domain['enabled']).lower())
@test.attr(type='smoke')
@test.idempotent_id('036df86e-bb5d-42c0-a7c2-66b9db3a6046')
def test_create_domain_with_disabled_status(self):
# Create domain with enabled status as false
@ -97,7 +95,6 @@ class DomainsTestJSON(base.BaseIdentityV3AdminTest):
self.assertFalse(domain['enabled'])
self.assertEqual(d_desc, domain['description'])
@test.attr(type='smoke')
@test.idempotent_id('2abf8764-309a-4fa9-bc58-201b799817ad')
def test_create_domain_without_description(self):
# Create domain only with name

View File

@ -21,7 +21,6 @@ from tempest import test
class GroupsV3TestJSON(base.BaseIdentityV3AdminTest):
@test.attr(type='smoke')
@test.idempotent_id('2e80343b-6c81-4ac3-88c7-452f3e9d5129')
def test_group_create_update_get(self):
name = data_utils.rand_name('Group')
@ -70,7 +69,6 @@ class GroupsV3TestJSON(base.BaseIdentityV3AdminTest):
group_users = self.client.list_group_users(group['id'])
self.assertEqual(len(group_users), 0)
@test.attr(type='smoke')
@test.idempotent_id('64573281-d26a-4a52-b899-503cb0f4e4ec')
def test_list_user_groups(self):
# create a user
@ -91,7 +89,6 @@ class GroupsV3TestJSON(base.BaseIdentityV3AdminTest):
self.assertEqual(sorted(groups), sorted(user_groups))
self.assertEqual(2, len(user_groups))
@test.attr(type='smoke')
@test.idempotent_id('cc9a57a5-a9ed-4f2d-a29f-4f979a06ec71')
def test_list_groups(self):
# Test to list groups

View File

@ -24,7 +24,6 @@ class PoliciesTestJSON(base.BaseIdentityV3AdminTest):
def _delete_policy(self, policy_id):
self.policy_client.delete_policy(policy_id)
@test.attr(type='smoke')
@test.idempotent_id('1a0ad286-2d06-4123-ab0d-728893a76201')
def test_list_policies(self):
# Test to list policies

View File

@ -89,7 +89,6 @@ class RolesV3TestJSON(base.BaseIdentityV3AdminTest):
roles = self.client.list_roles()
self.assertIn(role['id'], [r['id'] for r in roles])
@test.attr(type='smoke')
@test.idempotent_id('c6b80012-fe4a-498b-9ce8-eb391c05169f')
def test_grant_list_revoke_role_to_user_on_project(self):
self.client.assign_user_role_on_project(
@ -107,7 +106,6 @@ class RolesV3TestJSON(base.BaseIdentityV3AdminTest):
self.client.revoke_role_from_user_on_project(
self.project['id'], self.user_body['id'], self.role['id'])
@test.attr(type='smoke')
@test.idempotent_id('6c9a2940-3625-43a3-ac02-5dcec62ef3bd')
def test_grant_list_revoke_role_to_user_on_domain(self):
self.client.assign_user_role_on_domain(
@ -125,7 +123,6 @@ class RolesV3TestJSON(base.BaseIdentityV3AdminTest):
self.client.revoke_role_from_user_on_domain(
self.domain['id'], self.user_body['id'], self.role['id'])
@test.attr(type='smoke')
@test.idempotent_id('cbf11737-1904-4690-9613-97bcbb3df1c4')
def test_grant_list_revoke_role_to_group_on_project(self):
# Grant role to group on project
@ -156,7 +153,6 @@ class RolesV3TestJSON(base.BaseIdentityV3AdminTest):
self.client.revoke_role_from_group_on_project(
self.project['id'], self.group_body['id'], self.role['id'])
@test.attr(type='smoke')
@test.idempotent_id('4bf8a70b-e785-413a-ad53-9f91ce02faa7')
def test_grant_list_revoke_role_to_group_on_domain(self):
self.client.assign_group_role_on_domain(

View File

@ -62,7 +62,6 @@ class ServicesTestJSON(base.BaseIdentityV3AdminTest):
self.assertEqual(resp2_desc, resp3_desc)
self.assertDictContainsSubset(update_service, fetched_service)
@test.attr(type='smoke')
@test.idempotent_id('d1dcb1a1-2b6b-4da8-bbb8-5532ef6e8269')
def test_create_service_without_description(self):
# Create a service only with name and type
@ -75,7 +74,6 @@ class ServicesTestJSON(base.BaseIdentityV3AdminTest):
expected_data = {'name': name, 'type': serv_type}
self.assertDictContainsSubset(expected_data, service)
@test.attr(type='smoke')
@test.idempotent_id('e55908e8-360e-439e-8719-c3230a3e179e')
def test_list_services(self):
# Create, List, Verify and Delete Services

View File

@ -22,7 +22,6 @@ from tempest import test
class TokensV3TestJSON(base.BaseIdentityV3AdminTest):
@test.attr(type='smoke')
@test.idempotent_id('0f9f5a5f-d5cd-4a86-8a5b-c5ded151f212')
def test_tokens(self):
# Valid user's token is authenticated

View File

@ -187,7 +187,6 @@ class TrustsV3TestJSON(BaseTrustsV3Test):
self.create_trustor_and_roles()
self.addCleanup(self.cleanup_user_and_roles)
@test.attr(type='smoke')
@test.idempotent_id('5a0a91a4-baef-4a14-baba-59bf4d7fcace')
def test_trust_impersonate(self):
# Test case to check we can create, get and delete a trust
@ -200,7 +199,6 @@ class TrustsV3TestJSON(BaseTrustsV3Test):
self.check_trust_roles()
@test.attr(type='smoke')
@test.idempotent_id('ed2a8779-a7ac-49dc-afd7-30f32f936ed2')
def test_trust_noimpersonate(self):
# Test case to check we can create, get and delete a trust
@ -213,7 +211,6 @@ class TrustsV3TestJSON(BaseTrustsV3Test):
self.check_trust_roles()
@test.attr(type='smoke')
@test.idempotent_id('0ed14b66-cefd-4b5c-a964-65759453e292')
def test_trust_expire(self):
# Test case to check we can create, get and delete a trust
@ -239,7 +236,6 @@ class TrustsV3TestJSON(BaseTrustsV3Test):
self.check_trust_roles()
@test.attr(type='smoke')
@test.idempotent_id('3e48f95d-e660-4fa9-85e0-5a3d85594384')
def test_trust_expire_invalid(self):
# Test case to check we can check an invlaid expiry time
@ -250,7 +246,6 @@ class TrustsV3TestJSON(BaseTrustsV3Test):
self.create_trust,
expires=expires_str)
@test.attr(type='smoke')
@test.idempotent_id('6268b345-87ca-47c0-9ce3-37792b43403a')
def test_get_trusts_query(self):
self.create_trust()

View File

@ -33,7 +33,6 @@ class AgentManagementTestJSON(base.BaseAdminNetworkTest):
agents = body['agents']
cls.agent = agents[0]
@test.attr(type='smoke')
@test.idempotent_id('9c80f04d-11f3-44a4-8738-ed2f879b0ff4')
def test_list_agent(self):
body = self.admin_client.list_agents()
@ -46,20 +45,17 @@ class AgentManagementTestJSON(base.BaseAdminNetworkTest):
agent.pop('configurations', None)
self.assertIn(self.agent, agents)
@test.attr(type=['smoke'])
@test.idempotent_id('e335be47-b9a1-46fd-be30-0874c0b751e6')
def test_list_agents_non_admin(self):
body = self.client.list_agents()
self.assertEqual(len(body["agents"]), 0)
@test.attr(type='smoke')
@test.idempotent_id('869bc8e8-0fda-4a30-9b71-f8a7cf58ca9f')
def test_show_agent(self):
body = self.admin_client.show_agent(self.agent['id'])
agent = body['agent']
self.assertEqual(agent['id'], self.agent['id'])
@test.attr(type='smoke')
@test.idempotent_id('371dfc5b-55b9-4cb5-ac82-c40eadaac941')
def test_update_agent_status(self):
origin_status = self.agent['admin_state_up']
@ -71,7 +67,6 @@ class AgentManagementTestJSON(base.BaseAdminNetworkTest):
updated_status = body['agent']['admin_state_up']
self.assertEqual(origin_status, updated_status)
@test.attr(type='smoke')
@test.idempotent_id('68a94a14-1243-46e6-83bf-157627e31556')
def test_update_agent_description(self):
self.useFixture(fixtures.LockFixture('agent_description'))

View File

@ -35,13 +35,11 @@ class DHCPAgentSchedulersTestJSON(base.BaseAdminNetworkTest):
cls.cidr = cls.subnet['cidr']
cls.port = cls.create_port(cls.network)
@test.attr(type='smoke')
@test.idempotent_id('5032b1fe-eb42-4a64-8f3b-6e189d8b5c7d')
def test_list_dhcp_agent_hosting_network(self):
self.admin_client.list_dhcp_agent_hosting_network(
self.network['id'])
@test.attr(type='smoke')
@test.idempotent_id('30c48f98-e45d-4ffb-841c-b8aad57c7587')
def test_list_networks_hosted_by_one_dhcp(self):
body = self.admin_client.list_dhcp_agent_hosting_network(
@ -61,7 +59,6 @@ class DHCPAgentSchedulersTestJSON(base.BaseAdminNetworkTest):
network_ids.append(network['id'])
return network_id in network_ids
@test.attr(type='smoke')
@test.idempotent_id('a0856713-6549-470c-a656-e97c8df9a14d')
def test_add_remove_network_from_dhcp_agent(self):
# The agent is now bound to the network, we can free the port

View File

@ -43,7 +43,6 @@ class FloatingIPAdminTestJSON(base.BaseAdminNetworkTest):
cls.create_router_interface(cls.router['id'], cls.subnet['id'])
cls.port = cls.create_port(cls.network)
@test.attr(type='smoke')
@test.idempotent_id('64f2100b-5471-4ded-b46c-ddeeeb4f231b')
def test_list_floating_ips_from_admin_and_nonadmin(self):
# Create floating ip from admin user
@ -75,7 +74,6 @@ class FloatingIPAdminTestJSON(base.BaseAdminNetworkTest):
floating_ip_ids)
self.assertNotIn(floating_ip_alt['id'], floating_ip_ids)
@test.attr(type='smoke')
@test.idempotent_id('32727cc3-abe2-4485-a16e-48f2d54c14f2')
def test_create_list_show_floating_ip_with_tenant_id_by_admin(self):
# Creates a floating IP

View File

@ -81,12 +81,10 @@ class L3AgentSchedulerTestJSON(base.BaseAdminNetworkTest):
cls.client.add_router_interface_with_port_id(
cls.router['id'], cls.port['id'])
@test.attr(type='smoke')
@test.idempotent_id('b7ce6e89-e837-4ded-9b78-9ed3c9c6a45a')
def test_list_routers_on_l3_agent(self):
self.admin_client.list_routers_on_l3_agent(self.agent['id'])
@test.attr(type='smoke')
@test.idempotent_id('9464e5e7-8625-49c3-8fd1-89c52be59d66')
def test_add_list_remove_router_on_l3_agent(self):
l3_agent_ids = list()

View File

@ -49,7 +49,6 @@ class LBaaSAgentSchedulerTestJSON(base.BaseAdminNetworkTest):
cls.pool = cls.create_pool(pool_name, "ROUND_ROBIN",
"HTTP", cls.subnet)
@test.attr(type='smoke')
@test.idempotent_id('e5ea8b15-4f44-4350-963c-e0fcb533ee79')
def test_list_pools_on_lbaas_agent(self):
found = False
@ -68,7 +67,6 @@ class LBaaSAgentSchedulerTestJSON(base.BaseAdminNetworkTest):
msg = 'Unable to find Load Balancer agent hosting pool'
self.assertTrue(found, msg)
@test.attr(type='smoke')
@test.idempotent_id('e2745593-fd79-4b98-a262-575fd7865796')
def test_show_lbaas_agent_hosting_pool(self):
body = self.admin_client.show_lbaas_agent_hosting_pool(

View File

@ -50,7 +50,6 @@ class LoadBalancerAdminTestJSON(base.BaseAdminNetworkTest):
cls.pool = cls.create_pool(data_utils.rand_name('pool-'),
"ROUND_ROBIN", "HTTP", cls.subnet)
@test.attr(type='smoke')
@test.idempotent_id('6b0a20d8-4fcd-455e-b54f-ec4db5199518')
def test_create_vip_as_admin_for_another_tenant(self):
name = data_utils.rand_name('vip-')
@ -77,7 +76,6 @@ class LoadBalancerAdminTestJSON(base.BaseAdminNetworkTest):
self.assertEqual(vip['id'], show_vip['id'])
self.assertEqual(vip['name'], show_vip['name'])
@test.attr(type='smoke')
@test.idempotent_id('74552cfc-ab78-4fb6-825b-f67bca379921')
def test_create_health_monitor_as_admin_for_another_tenant(self):
body = (
@ -95,7 +93,6 @@ class LoadBalancerAdminTestJSON(base.BaseAdminNetworkTest):
show_health_monitor = body['health_monitor']
self.assertEqual(health_monitor['id'], show_health_monitor['id'])
@test.attr(type='smoke')
@test.idempotent_id('266a192d-3c22-46c4-a8fb-802450301e82')
def test_create_pool_from_admin_user_other_tenant(self):
body = self.admin_client.create_pool(
@ -109,7 +106,6 @@ class LoadBalancerAdminTestJSON(base.BaseAdminNetworkTest):
self.assertIsNotNone(pool['id'])
self.assertEqual(self.tenant_id, pool['tenant_id'])
@test.attr(type='smoke')
@test.idempotent_id('158bb272-b9ed-4cfc-803c-661dac46f783')
def test_create_member_from_admin_user_other_tenant(self):
body = self.admin_client.create_member(address="10.0.9.47",

View File

@ -41,7 +41,6 @@ class RoutersTestDVR(base.BaseRouterTest):
raise cls.skipException(msg)
cls.admin_client.delete_router(router['router']['id'])
@test.attr(type='smoke')
@test.idempotent_id('08a2a0a8-f1e4-4b34-8e30-e522e836c44e')
def test_distributed_router_creation(self):
"""
@ -59,7 +58,6 @@ class RoutersTestDVR(base.BaseRouterTest):
router['router']['id'])
self.assertTrue(router['router']['distributed'])
@test.attr(type='smoke')
@test.idempotent_id('8a0a72b4-7290-4677-afeb-b4ffe37bc352')
def test_centralized_router_creation(self):
"""
@ -78,7 +76,6 @@ class RoutersTestDVR(base.BaseRouterTest):
router['router']['id'])
self.assertFalse(router['router']['distributed'])
@test.attr(type='smoke')
@test.idempotent_id('acd43596-c1fb-439d-ada8-31ad48ae3c2e')
def test_centralized_router_update_to_dvr(self):
"""

View File

@ -100,14 +100,12 @@ class VolumeMultiBackendV2Test(base.BaseVolumeAdminTest):
super(VolumeMultiBackendV2Test, cls).resource_cleanup()
@test.attr(type='smoke')
@test.idempotent_id('c1a41f3f-9dad-493e-9f09-3ff197d477cc')
def test_backend_name_reporting(self):
# get volume id which created by type without prefix
volume_id = self.volume_id_list_without_prefix[0]
self._test_backend_name_reporting_by_volume_id(volume_id)
@test.attr(type='smoke')
@test.idempotent_id('f38e647f-ab42-4a31-a2e7-ca86a6485215')
def test_backend_name_reporting_with_prefix(self):
# get volume id which created by type with prefix

View File

@ -31,14 +31,12 @@ class VolumeTypesV2Test(base.BaseVolumeAdminTest):
def _delete_volume_type(self, volume_type_id):
self.volume_types_client.delete_volume_type(volume_type_id)
@test.attr(type='smoke')
@test.idempotent_id('9d9b28e3-1b2e-4483-a2cc-24aa0ea1de54')
def test_volume_type_list(self):
# List Volume types.
body = self.volume_types_client.list_volume_types()
self.assertIsInstance(body, list)
@test.attr(type='smoke')
@test.idempotent_id('c03cc62c-f4e9-4623-91ec-64ce2f9c1260')
def test_volume_crud_with_volume_type_and_extra_specs(self):
# Create/update/get/delete volume with volume_type and extra spec.
@ -89,7 +87,6 @@ class VolumeTypesV2Test(base.BaseVolumeAdminTest):
'The fetched Volume is different '
'from the created Volume')
@test.attr(type='smoke')
@test.idempotent_id('4e955c3b-49db-4515-9590-0c99f8e471ad')
def test_volume_type_create_get_delete(self):
# Create/get volume type.
@ -122,7 +119,6 @@ class VolumeTypesV2Test(base.BaseVolumeAdminTest):
'The fetched Volume_type is different '
'from the created Volume_type')
@test.attr(type='smoke')
@test.idempotent_id('7830abd0-ff99-4793-a265-405684a54d46')
def test_volume_type_encryption_create_get_delete(self):
# Create/get/delete encryption type.

View File

@ -33,7 +33,6 @@ class VolumeTypesExtraSpecsV2Test(base.BaseVolumeAdminTest):
cls.volume_types_client.delete_volume_type(cls.volume_type['id'])
super(VolumeTypesExtraSpecsV2Test, cls).resource_cleanup()
@test.attr(type='smoke')
@test.idempotent_id('b42923e9-0452-4945-be5b-d362ae533e60')
def test_volume_type_extra_specs_list(self):
# List Volume types extra specs.
@ -65,7 +64,6 @@ class VolumeTypesExtraSpecsV2Test(base.BaseVolumeAdminTest):
self.assertEqual(extra_spec['spec2'], body['spec2'],
"Volume type extra spec incorrectly updated")
@test.attr(type='smoke')
@test.idempotent_id('d4772798-601f-408a-b2a5-29e8a59d1220')
def test_volume_type_extra_spec_create_get_delete(self):
# Create/Get/Delete volume type extra spec.

View File

@ -38,7 +38,6 @@ class VolumesBackupsV2Test(base.BaseVolumeAdminTest):
cls.volume = cls.create_volume()
@test.attr(type='smoke')
@test.idempotent_id('a66eb488-8ee1-47d4-8e9f-575a095728c6')
def test_volume_backup_create_get_detailed_list_restore_delete(self):
# Create backup