[Tempest]: Adding provider network api.

Added vxlan based provider network api.
Added vlan based provider network api.

Change-Id: I252a25bfb72c91406d9f7fe1c7da5ae6fc329bf4
This commit is contained in:
Puneet Arora
2017-09-07 18:48:34 +00:00
parent 9b232390b4
commit bc934f8ae7
4 changed files with 347 additions and 1 deletions

View File

@@ -64,3 +64,7 @@ APPLIANCE_NAME_STARTS_WITH = "vmw_"
TIME = {
"SEC": {"SIXTY": 60}
}
VLAN_TYPE = 'vlan'
VXLAN_TYPE = 'geneve'
VLAN = 1001

View File

@@ -275,7 +275,14 @@ class ApplianceManager(manager.NetworkScenarioTest):
if create_floating_ip:
ports = self._get_server_portid_and_ip4(server)
for port_id, ip4 in ports:
floating_ip = self.create_floatingip(server, port_id, ip4=ip4)
if clients is None:
floating_ip = self.create_floatingip(server, port_id,
ip4=ip4)
else:
floating_ip = self.\
create_floatingip(server,
port_id, ip4=ip4,
client=clients.floating_ips_client)
if server.get("floating_ips"):
server["floating_ips"].append(floating_ip)
else:

View File

@@ -0,0 +1,165 @@
# Copyright 2017 VMware Inc
# All Rights Reserved
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
from tempest import config
from tempest.lib import decorators
from tempest.lib import exceptions
from tempest import test
from vmware_nsx_tempest.common import constants
from vmware_nsx_tempest.lib import feature_manager
from vmware_nsx_tempest.services import nsxv3_client
CONF = config.CONF
LOG = constants.log.getLogger(__name__)
class ProviderNetworks(feature_manager.FeatureManager):
"""Test Provider Physical Networks
1. Create Vxlan Provider networks.
2. Create Vlan Provider networks.
3. Create Vlan/Vxlan provider networks using worng ID.
"""
@classmethod
def skip_checks(cls):
super(ProviderNetworks, cls).skip_checks()
if not test.is_extension_enabled('provider-security-group', 'network'):
msg = "Extension provider-security-group is not enabled."
raise cls.skipException(msg)
@classmethod
def setup_clients(cls):
super(ProviderNetworks, cls).setup_clients()
cls.cmgr_adm = cls.get_client_manager('admin')
@classmethod
def resource_setup(cls):
super(ProviderNetworks, cls).resource_setup()
cls.nsx = nsxv3_client.NSXV3Client(CONF.nsxv3.nsx_manager,
CONF.nsxv3.nsx_user,
CONF.nsxv3.nsx_password)
out = cls.nsx.get_transport_zones()
vlan_flag = 0
vxlan_flag = 0
for tz in out:
if "transport_type" in tz.keys() and (vlan_flag == 0
or vxlan_flag == 0):
if vxlan_flag == 0 and tz['transport_type'] == "OVERLAY":
cls.overlay_id = tz['id']
vxlan_flag = 1
if vlan_flag == 0 and tz['transport_type'] == "VLAN":
cls.vlan_id = tz['id']
vlan_flag = 1
def provider_networks_topoloy(self, tz_id, net_type,
admin_state_up=True):
networks_client = self.cmgr_adm.networks_client
if net_type == constants.VXLAN_TYPE:
name = "provider_network_vxlan"
body = {"provider:physical_network": tz_id,
"provider:network_type": net_type,
"admin_state_up": admin_state_up}
elif net_type == constants.VLAN_TYPE:
name = "provider_network_vlan"
body = {"provider:segmentation_id": constants.VLAN,
"provider:network_type": net_type,
"provider:physical_network": tz_id,
"admin_state_up": admin_state_up}
network = self.create_topology_network(name,
networks_client=networks_client,
**body)
return network
@decorators.attr(type='nsxv3')
@decorators.idempotent_id('75c793ed-fdce-4062-a633-2f0a7af5671d')
def test_provider_vxlan_network(self):
provider_network = self.provider_networks_topoloy(self.overlay_id,
constants.VXLAN_TYPE)
subnet_client = self.cmgr_adm.subnets_client
subnet_name = provider_network['name'] + '_subnet'
self.create_topology_subnet(subnet_name, provider_network,
subnets_client=subnet_client)
@decorators.attr(type='nsxv3')
@decorators.idempotent_id('0307068e-fef1-4d2d-b196-7ffc45c8ec81')
def test_provider_vxlan_network_with_admin_state_down(self):
provider_network = self.provider_networks_topoloy(self.overlay_id,
constants.VXLAN_TYPE,
admin_state_up=False)
subnet_client = self.cmgr_adm.subnets_client
subnet_name = provider_network['name'] + '_subnet'
self.create_topology_subnet(subnet_name, provider_network,
subnets_client=subnet_client)
@decorators.attr(type='nsxv3')
@decorators.attr(type=["negative"])
@decorators.idempotent_id('3c316de3-3df4-4a4b-bda4-e5735c7b53cf')
def test_provider_vlan_network_with_invalid_vlan_tz(self):
self.vlan_id += "ab"
self.assertRaises(exceptions.BadRequest,
self.provider_networks_topoloy,
self.vlan_id, constants.VLAN_TYPE)
@decorators.attr(type='nsxv3')
@decorators.attr(type=["negative"])
@decorators.idempotent_id('03a68787-9700-4aeb-bff5-b9af1a4dacce')
def test_provider_vxlan_network_with_invalid_vxlan_tz(self):
self.overlay_id += "ab"
self.assertRaises(exceptions.BadRequest,
self.provider_networks_topoloy,
self.overlay_id, constants.VXLAN_TYPE)
@decorators.attr(type='nsxv3')
@decorators.idempotent_id('bcede7c9-cc12-4b7e-800c-cf779c718df1')
def test_provider_vlan_network(self):
provider_network = self.provider_networks_topoloy(self.vlan_id,
constants.VLAN_TYPE)
subnet_client = self.cmgr_adm.subnets_client
subnet_name = provider_network['name'] + '_subnet'
kwargs = {"enable_dhcp": "False"}
self.create_topology_subnet(subnet_name, provider_network,
subnets_client=subnet_client,
**kwargs)
@decorators.attr(type='nsxv3')
@decorators.idempotent_id('e070ddd8-3caf-4aaf-8430-ffe5076b4a6b')
def test_provider_vlan_network_with_admin_state_down(self):
provider_network = self.provider_networks_topoloy(self.vlan_id,
constants.VLAN_TYPE,
admin_state_up=False)
subnet_client = self.cmgr_adm.subnets_client
subnet_name = provider_network['name'] + '_subnet'
kwargs = {"enable_dhcp": "False"}
self.create_topology_subnet(subnet_name, provider_network,
subnets_client=subnet_client,
**kwargs)
@decorators.attr(type='nsxv3')
@decorators.attr(type=["negative"])
@decorators.idempotent_id('fe1598bb-c36e-4585-b441-927737df781e')
def test_provider_vlan_network_with_vxlan_tz(self):
self.assertRaises(exceptions.BadRequest,
self.provider_networks_topoloy,
self.overlay_id, constants.VLAN_TYPE)
@decorators.attr(type='nsxv3')
@decorators.attr(type=["negative"])
@decorators.idempotent_id('13d8959c-fc49-49fc-9b03-51ea07313257')
def test_provider_vxlan_network_with_vlan_tz(self):
self.assertRaises(exceptions.BadRequest,
self.provider_networks_topoloy,
self.vlan_id, constants.VXLAN_TYPE)

View File

@@ -0,0 +1,170 @@
# Copyright 2017 VMware Inc
# All Rights Reserved
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
from tempest import config
from tempest.lib import decorators
from tempest import test
from vmware_nsx_tempest.common import constants
from vmware_nsx_tempest.lib import feature_manager
from vmware_nsx_tempest.services import nsxv3_client
CONF = config.CONF
LOG = constants.log.getLogger(__name__)
class ProviderNetworkScenario(feature_manager.FeatureManager):
"""Test Provider Physical Networks Scenario
"""
@classmethod
def skip_checks(cls):
super(ProviderNetworkScenario, cls).skip_checks()
if not test.is_extension_enabled('provider', 'network'):
msg = "Extension provider-security-group is not enabled."
raise cls.skipException(msg)
@classmethod
def setup_clients(cls):
super(ProviderNetworkScenario, cls).setup_clients()
cls.cmgr_adm = cls.get_client_manager('admin')
@classmethod
def resource_setup(cls):
super(ProviderNetworkScenario, cls).resource_setup()
cls.nsx = nsxv3_client.NSXV3Client(CONF.nsxv3.nsx_manager,
CONF.nsxv3.nsx_user,
CONF.nsxv3.nsx_password)
out = cls.nsx.get_transport_zones()
vlan_flag = 0
vxlan_flag = 0
for tz in out:
if "transport_type" in tz.keys() and (vlan_flag == 0
or vxlan_flag == 0):
if vxlan_flag == 0 and tz['transport_type'] == "OVERLAY":
cls.overlay_id = tz['id']
vxlan_flag = 1
if vlan_flag == 0 and tz['transport_type'] == "VLAN":
cls.vlan_id = tz['id']
vlan_flag = 1
def _create_provider_network(self, tz_id, net_type,
admin_state_up=True):
networks_client = self.cmgr_adm.networks_client
if net_type == constants.VXLAN_TYPE:
name = "network"
body = {"provider:physical_network": tz_id,
"provider:network_type": net_type,
"admin_state_up": admin_state_up}
elif net_type == constants.VLAN_TYPE:
name = "network"
body = {"provider:segmentation_id": 1001,
"provider:network_type": net_type,
"provider:physical_network": tz_id,
"admin_state_up": admin_state_up}
network = self.create_topology_network(name, networks_client, **body)
return network
def provider_network_topology1(self):
sec_rule_client = self.cmgr_adm.security_group_rules_client
sec_client = self.cmgr_adm.security_groups_client
network = self._create_provider_network(self.overlay_id,
constants.VXLAN_TYPE)
kwargs = dict(tenant_id=network['tenant_id'],
security_group_rules_client=sec_rule_client,
security_groups_client=sec_client)
self.sg = self.create_topology_security_group(**kwargs)
routers_client = self.cmgr_adm.routers_client
router_name = 'router'
router = self.create_topology_router(router_name,
routers_client=routers_client)
subnet_client = self.cmgr_adm.subnets_client
subnet_name = network['name'] + 'sub'
self.create_topology_subnet(subnet_name, network,
routers_client=routers_client,
subnets_client=subnet_client,
router_id=router['id'])
self.create_topology_instance(
"server1", [network],
security_groups=[{'name': self.sg['name']}],
clients=self.cmgr_adm)
self.create_topology_instance(
"server2", [network],
security_groups=[{'name': self.sg['name']}],
clients=self.cmgr_adm)
def provider_network_topology2(self):
sec_rule_client = self.cmgr_adm.security_group_rules_client
sec_client = self.cmgr_adm.security_groups_client
network1 = self._create_provider_network(self.overlay_id,
constants.VXLAN_TYPE)
kwargs = dict(tenant_id=network1['tenant_id'],
security_group_rules_client=sec_rule_client,
security_groups_client=sec_client)
self.sg = self.create_topology_security_group(**kwargs)
routers_client = self.cmgr_adm.routers_client
router_name = 'router'
router = self.create_topology_router(router_name,
routers_client=routers_client)
subnet_client = self.cmgr_adm.subnets_client
network2 = self._create_provider_network(self.overlay_id,
constants.VXLAN_TYPE)
subnet_name1 = network1['name'] + 'sub1'
subnet_name2 = network2['name'] + 'sub2'
self.create_topology_subnet(subnet_name1, network1,
routers_client=routers_client,
subnets_client=subnet_client,
router_id=router['id'],
cidr='23.0.0.0/24')
self.create_topology_subnet(subnet_name2, network2,
routers_client=routers_client,
subnets_client=subnet_client,
router_id=router['id'],
cidr='24.0.0.0/24')
self.create_topology_instance(
"server1", [network1],
security_groups=[{'name': self.sg['name']}],
clients=self.cmgr_adm)
self.create_topology_instance(
"server2", [network2],
security_groups=[{'name': self.sg['name']}],
clients=self.cmgr_adm)
@decorators.attr(type='nsxv3')
@decorators.idempotent_id('244b51c0-b758-49bc-bcaa-9de744322665')
def test_provider_vxlan_same_network_same_cidr_scenario(self):
self.provider_network_topology1()
self.check_cross_network_connectivity(
self.topology_networks["network"],
self.servers_details["server1"].floating_ips[0],
self.servers_details["server1"].server, should_connect=True)
self.check_cross_network_connectivity(
self.topology_networks["network"],
self.servers_details["server2"].floating_ips[0],
self.servers_details["server2"].server, should_connect=True)
@decorators.attr(type='nsxv3')
@decorators.idempotent_id('456b51c0-b758-49bc-bcaa-9de744322123')
def test_provider_vxlan_differnet_network_different_cidr_scenario(self):
self.provider_network_topology2()
self.check_cross_network_connectivity(
self.topology_networks["network"],
self.servers_details["server1"].floating_ips[0],
self.servers_details["server1"].server, should_connect=True)
self.check_cross_network_connectivity(
self.topology_networks["network"],
self.servers_details["server2"].floating_ips[0],
self.servers_details["server2"].server, should_connect=True)