6428139de1
nova-network is no more available in nova and all network request needs to move to neutron. Scenario tests are something we should be testing with the latest interface not the deprecated one so we can remove the nova netowrk specific service clients and methods. This commit moves the floating ip operation from nova-network to neutron. nova network create_floating_ip used to associate the FIP to server also so with neutron create floating ip we need to associate the FIP to server in separate method. Implements: blueprint tempest-scenario-manager-stable Change-Id: I6ad260731eedc2e1f56fe67b3a9e19fed8d4a38e
95 lines
3.7 KiB
Python
95 lines
3.7 KiB
Python
# Copyright 2018 Red Hat, Inc.
|
|
# All Rights Reserved.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
from tempest.common import utils
|
|
from tempest.common import waiters
|
|
from tempest import config
|
|
from tempest.lib import decorators
|
|
from tempest.scenario import manager
|
|
|
|
CONF = config.CONF
|
|
|
|
|
|
class TestVolumeBackupRestore(manager.ScenarioTest):
|
|
"""Test cinder backup and restore
|
|
|
|
This testcase verifies content preservation after backup and restore
|
|
operations by booting a server from a restored backup and check the
|
|
connectivity to it.
|
|
|
|
The following is the scenario outline:
|
|
1. Create volume from image.
|
|
2. Create a backup for the volume.
|
|
3. Restore the backup.
|
|
4. Boot a server from the restored backup.
|
|
5. Create a floating ip.
|
|
6. Check server connectivity.
|
|
"""
|
|
|
|
@classmethod
|
|
def skip_checks(cls):
|
|
super(TestVolumeBackupRestore, cls).skip_checks()
|
|
if not CONF.volume_feature_enabled.backup:
|
|
raise cls.skipException('Backup is not enable.')
|
|
|
|
@decorators.idempotent_id('2ce5e55c-4085-43c1-98c6-582525334ad7')
|
|
@decorators.attr(type='slow')
|
|
@utils.services('compute', 'volume', 'image')
|
|
def test_volume_backup_restore(self):
|
|
# Create volume from image
|
|
img_uuid = CONF.compute.image_ref
|
|
volume = self.create_volume(imageRef=img_uuid)
|
|
volume_details = self.volumes_client.show_volume(
|
|
volume['id'])['volume']
|
|
self.assertEqual('true', volume_details['bootable'])
|
|
|
|
# Create a backup
|
|
backup = self.create_backup(volume_id=volume['id'])
|
|
waiters.wait_for_volume_resource_status(self.volumes_client,
|
|
volume['id'], 'available')
|
|
|
|
# Restore the backup
|
|
restored_volume_id = self.restore_backup(backup['id'])['volume_id']
|
|
|
|
# Verify the restored backup volume is bootable
|
|
restored_volume_info = self.volumes_client.show_volume(
|
|
restored_volume_id)['volume']
|
|
self.assertEqual('true', restored_volume_info['bootable'])
|
|
|
|
# Create keypair and security group
|
|
keypair = self.create_keypair()
|
|
security_group = self.create_security_group()
|
|
|
|
# Boot a server from the restored backup
|
|
bd_map_v2 = [{
|
|
'uuid': restored_volume_id,
|
|
'source_type': 'volume',
|
|
'destination_type': 'volume',
|
|
'boot_index': 0}]
|
|
server = self.create_server(image_id='',
|
|
block_device_mapping_v2=bd_map_v2,
|
|
key_name=keypair['name'],
|
|
security_groups=[
|
|
{'name': security_group['name']}])
|
|
|
|
# Create a floating ip and associate it to server.
|
|
fip = self.create_floating_ip(server)
|
|
floating_ip = self.associate_floating_ip(fip, server)
|
|
# Check server connectivity
|
|
self.check_vm_connectivity(floating_ip['floating_ip_address'],
|
|
username=CONF.validation.image_ssh_user,
|
|
private_key=keypair['private_key'],
|
|
should_connect=True)
|