
When Tempest is used in customer site, often we are required to provide a testcase list including testcase names and descriptions. Now no this kind of doc is available, so we can add descriptions with the format of doc string for every testcase, so later we can generata such a testcase description list. There are hundreds of testcases missing descriptions, so we can add them gradually, and limit the modified files in one patch for the convenience of reviewing. Change-Id: I1469ad5a34bac75203b2eb063326eded096706a5 partially-implements: blueprint testcase-description
118 lines
5.1 KiB
Python
118 lines
5.1 KiB
Python
# Copyright 2013 IBM Corporation
|
|
# All Rights Reserved.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
from tempest.api.compute import base
|
|
from tempest.common import utils
|
|
from tempest.lib import decorators
|
|
from tempest.lib import exceptions as lib_exc
|
|
|
|
|
|
class FlavorsAccessNegativeTestJSON(base.BaseV2ComputeAdminTest):
|
|
"""Tests Flavor Access API extension.
|
|
|
|
Add and remove Flavor Access require admin privileges.
|
|
"""
|
|
|
|
credentials = ['primary', 'admin', 'alt']
|
|
|
|
@classmethod
|
|
def skip_checks(cls):
|
|
super(FlavorsAccessNegativeTestJSON, cls).skip_checks()
|
|
if not utils.is_extension_enabled('OS-FLV-EXT-DATA', 'compute'):
|
|
msg = "OS-FLV-EXT-DATA extension not enabled."
|
|
raise cls.skipException(msg)
|
|
|
|
@classmethod
|
|
def resource_setup(cls):
|
|
super(FlavorsAccessNegativeTestJSON, cls).resource_setup()
|
|
|
|
cls.tenant_id = cls.flavors_client.tenant_id
|
|
cls.ram = 512
|
|
cls.vcpus = 1
|
|
cls.disk = 10
|
|
|
|
@decorators.attr(type=['negative'])
|
|
@decorators.idempotent_id('0621c53e-d45d-40e7-951d-43e5e257b272')
|
|
def test_flavor_access_list_with_public_flavor(self):
|
|
"""Test listing flavor access of a public flavor should fail"""
|
|
flavor = self.create_flavor(ram=self.ram, vcpus=self.vcpus,
|
|
disk=self.disk, is_public='True')
|
|
self.assertRaises(lib_exc.NotFound,
|
|
self.admin_flavors_client.list_flavor_access,
|
|
flavor['id'])
|
|
|
|
@decorators.attr(type=['negative'])
|
|
@decorators.idempotent_id('41eaaade-6d37-4f28-9c74-f21b46ca67bd')
|
|
def test_flavor_non_admin_add(self):
|
|
"""Test adding flavor access by a non-admin user is forbidden"""
|
|
flavor = self.create_flavor(ram=self.ram, vcpus=self.vcpus,
|
|
disk=self.disk, is_public='False')
|
|
self.assertRaises(lib_exc.Forbidden,
|
|
self.flavors_client.add_flavor_access,
|
|
flavor['id'],
|
|
self.tenant_id)
|
|
|
|
@decorators.attr(type=['negative'])
|
|
@decorators.idempotent_id('073e79a6-c311-4525-82dc-6083d919cb3a')
|
|
def test_flavor_non_admin_remove(self):
|
|
"""Test removing flavor access by a non-admin user should fail"""
|
|
flavor = self.create_flavor(ram=self.ram, vcpus=self.vcpus,
|
|
disk=self.disk, is_public='False')
|
|
|
|
# Add flavor access to a tenant.
|
|
self.admin_flavors_client.add_flavor_access(flavor['id'],
|
|
self.tenant_id)
|
|
self.addCleanup(self.admin_flavors_client.remove_flavor_access,
|
|
flavor['id'], self.tenant_id)
|
|
self.assertRaises(lib_exc.Forbidden,
|
|
self.flavors_client.remove_flavor_access,
|
|
flavor['id'],
|
|
self.tenant_id)
|
|
|
|
@decorators.attr(type=['negative'])
|
|
@decorators.idempotent_id('f3592cc0-0306-483c-b210-9a7b5346eddc')
|
|
def test_add_flavor_access_duplicate(self):
|
|
"""Test adding duplicate flavor access to same flavor should fail"""
|
|
# Create a new flavor.
|
|
flavor = self.create_flavor(ram=self.ram, vcpus=self.vcpus,
|
|
disk=self.disk, is_public='False')
|
|
|
|
# Add flavor access to a tenant.
|
|
self.admin_flavors_client.add_flavor_access(flavor['id'],
|
|
self.tenant_id)
|
|
self.addCleanup(self.admin_flavors_client.remove_flavor_access,
|
|
flavor['id'], self.tenant_id)
|
|
|
|
# An exception should be raised when adding flavor access to the same
|
|
# tenant
|
|
self.assertRaises(lib_exc.Conflict,
|
|
self.admin_flavors_client.add_flavor_access,
|
|
flavor['id'],
|
|
self.tenant_id)
|
|
|
|
@decorators.attr(type=['negative'])
|
|
@decorators.idempotent_id('1f710927-3bc7-4381-9f82-0ca6e42644b7')
|
|
def test_remove_flavor_access_not_found(self):
|
|
"""Test removing non existent flavor access should fail"""
|
|
# Create a new flavor.
|
|
flavor = self.create_flavor(ram=self.ram, vcpus=self.vcpus,
|
|
disk=self.disk, is_public='False')
|
|
|
|
# An exception should be raised when flavor access is not found
|
|
self.assertRaises(lib_exc.NotFound,
|
|
self.admin_flavors_client.remove_flavor_access,
|
|
flavor['id'],
|
|
self.os_alt.servers_client.tenant_id)
|