[Tempest]: Adding provider network api.
Added vxlan based provider network api. Added vlan based provider network api. Change-Id: I252a25bfb72c91406d9f7fe1c7da5ae6fc329bf4
This commit is contained in:
@@ -64,3 +64,7 @@ APPLIANCE_NAME_STARTS_WITH = "vmw_"
|
||||
TIME = {
|
||||
"SEC": {"SIXTY": 60}
|
||||
}
|
||||
|
||||
VLAN_TYPE = 'vlan'
|
||||
VXLAN_TYPE = 'geneve'
|
||||
VLAN = 1001
|
||||
|
||||
@@ -275,7 +275,14 @@ class ApplianceManager(manager.NetworkScenarioTest):
|
||||
if create_floating_ip:
|
||||
ports = self._get_server_portid_and_ip4(server)
|
||||
for port_id, ip4 in ports:
|
||||
floating_ip = self.create_floatingip(server, port_id, ip4=ip4)
|
||||
if clients is None:
|
||||
floating_ip = self.create_floatingip(server, port_id,
|
||||
ip4=ip4)
|
||||
else:
|
||||
floating_ip = self.\
|
||||
create_floatingip(server,
|
||||
port_id, ip4=ip4,
|
||||
client=clients.floating_ips_client)
|
||||
if server.get("floating_ips"):
|
||||
server["floating_ips"].append(floating_ip)
|
||||
else:
|
||||
|
||||
165
vmware_nsx_tempest/tests/api/test_provider_networks.py
Normal file
165
vmware_nsx_tempest/tests/api/test_provider_networks.py
Normal file
@@ -0,0 +1,165 @@
|
||||
# Copyright 2017 VMware Inc
|
||||
# All Rights Reserved
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
from tempest import config
|
||||
from tempest.lib import decorators
|
||||
from tempest.lib import exceptions
|
||||
from tempest import test
|
||||
|
||||
from vmware_nsx_tempest.common import constants
|
||||
from vmware_nsx_tempest.lib import feature_manager
|
||||
from vmware_nsx_tempest.services import nsxv3_client
|
||||
|
||||
CONF = config.CONF
|
||||
LOG = constants.log.getLogger(__name__)
|
||||
|
||||
|
||||
class ProviderNetworks(feature_manager.FeatureManager):
|
||||
"""Test Provider Physical Networks
|
||||
|
||||
1. Create Vxlan Provider networks.
|
||||
2. Create Vlan Provider networks.
|
||||
3. Create Vlan/Vxlan provider networks using worng ID.
|
||||
"""
|
||||
|
||||
@classmethod
|
||||
def skip_checks(cls):
|
||||
super(ProviderNetworks, cls).skip_checks()
|
||||
if not test.is_extension_enabled('provider-security-group', 'network'):
|
||||
msg = "Extension provider-security-group is not enabled."
|
||||
raise cls.skipException(msg)
|
||||
|
||||
@classmethod
|
||||
def setup_clients(cls):
|
||||
super(ProviderNetworks, cls).setup_clients()
|
||||
cls.cmgr_adm = cls.get_client_manager('admin')
|
||||
|
||||
@classmethod
|
||||
def resource_setup(cls):
|
||||
super(ProviderNetworks, cls).resource_setup()
|
||||
cls.nsx = nsxv3_client.NSXV3Client(CONF.nsxv3.nsx_manager,
|
||||
CONF.nsxv3.nsx_user,
|
||||
CONF.nsxv3.nsx_password)
|
||||
out = cls.nsx.get_transport_zones()
|
||||
vlan_flag = 0
|
||||
vxlan_flag = 0
|
||||
for tz in out:
|
||||
if "transport_type" in tz.keys() and (vlan_flag == 0
|
||||
or vxlan_flag == 0):
|
||||
if vxlan_flag == 0 and tz['transport_type'] == "OVERLAY":
|
||||
cls.overlay_id = tz['id']
|
||||
vxlan_flag = 1
|
||||
if vlan_flag == 0 and tz['transport_type'] == "VLAN":
|
||||
cls.vlan_id = tz['id']
|
||||
vlan_flag = 1
|
||||
|
||||
def provider_networks_topoloy(self, tz_id, net_type,
|
||||
admin_state_up=True):
|
||||
networks_client = self.cmgr_adm.networks_client
|
||||
if net_type == constants.VXLAN_TYPE:
|
||||
name = "provider_network_vxlan"
|
||||
body = {"provider:physical_network": tz_id,
|
||||
"provider:network_type": net_type,
|
||||
"admin_state_up": admin_state_up}
|
||||
elif net_type == constants.VLAN_TYPE:
|
||||
name = "provider_network_vlan"
|
||||
body = {"provider:segmentation_id": constants.VLAN,
|
||||
"provider:network_type": net_type,
|
||||
"provider:physical_network": tz_id,
|
||||
"admin_state_up": admin_state_up}
|
||||
network = self.create_topology_network(name,
|
||||
networks_client=networks_client,
|
||||
**body)
|
||||
return network
|
||||
|
||||
@decorators.attr(type='nsxv3')
|
||||
@decorators.idempotent_id('75c793ed-fdce-4062-a633-2f0a7af5671d')
|
||||
def test_provider_vxlan_network(self):
|
||||
provider_network = self.provider_networks_topoloy(self.overlay_id,
|
||||
constants.VXLAN_TYPE)
|
||||
subnet_client = self.cmgr_adm.subnets_client
|
||||
subnet_name = provider_network['name'] + '_subnet'
|
||||
self.create_topology_subnet(subnet_name, provider_network,
|
||||
subnets_client=subnet_client)
|
||||
|
||||
@decorators.attr(type='nsxv3')
|
||||
@decorators.idempotent_id('0307068e-fef1-4d2d-b196-7ffc45c8ec81')
|
||||
def test_provider_vxlan_network_with_admin_state_down(self):
|
||||
provider_network = self.provider_networks_topoloy(self.overlay_id,
|
||||
constants.VXLAN_TYPE,
|
||||
admin_state_up=False)
|
||||
subnet_client = self.cmgr_adm.subnets_client
|
||||
subnet_name = provider_network['name'] + '_subnet'
|
||||
self.create_topology_subnet(subnet_name, provider_network,
|
||||
subnets_client=subnet_client)
|
||||
|
||||
@decorators.attr(type='nsxv3')
|
||||
@decorators.attr(type=["negative"])
|
||||
@decorators.idempotent_id('3c316de3-3df4-4a4b-bda4-e5735c7b53cf')
|
||||
def test_provider_vlan_network_with_invalid_vlan_tz(self):
|
||||
self.vlan_id += "ab"
|
||||
self.assertRaises(exceptions.BadRequest,
|
||||
self.provider_networks_topoloy,
|
||||
self.vlan_id, constants.VLAN_TYPE)
|
||||
|
||||
@decorators.attr(type='nsxv3')
|
||||
@decorators.attr(type=["negative"])
|
||||
@decorators.idempotent_id('03a68787-9700-4aeb-bff5-b9af1a4dacce')
|
||||
def test_provider_vxlan_network_with_invalid_vxlan_tz(self):
|
||||
self.overlay_id += "ab"
|
||||
self.assertRaises(exceptions.BadRequest,
|
||||
self.provider_networks_topoloy,
|
||||
self.overlay_id, constants.VXLAN_TYPE)
|
||||
|
||||
@decorators.attr(type='nsxv3')
|
||||
@decorators.idempotent_id('bcede7c9-cc12-4b7e-800c-cf779c718df1')
|
||||
def test_provider_vlan_network(self):
|
||||
provider_network = self.provider_networks_topoloy(self.vlan_id,
|
||||
constants.VLAN_TYPE)
|
||||
subnet_client = self.cmgr_adm.subnets_client
|
||||
subnet_name = provider_network['name'] + '_subnet'
|
||||
kwargs = {"enable_dhcp": "False"}
|
||||
self.create_topology_subnet(subnet_name, provider_network,
|
||||
subnets_client=subnet_client,
|
||||
**kwargs)
|
||||
|
||||
@decorators.attr(type='nsxv3')
|
||||
@decorators.idempotent_id('e070ddd8-3caf-4aaf-8430-ffe5076b4a6b')
|
||||
def test_provider_vlan_network_with_admin_state_down(self):
|
||||
provider_network = self.provider_networks_topoloy(self.vlan_id,
|
||||
constants.VLAN_TYPE,
|
||||
admin_state_up=False)
|
||||
subnet_client = self.cmgr_adm.subnets_client
|
||||
subnet_name = provider_network['name'] + '_subnet'
|
||||
kwargs = {"enable_dhcp": "False"}
|
||||
self.create_topology_subnet(subnet_name, provider_network,
|
||||
subnets_client=subnet_client,
|
||||
**kwargs)
|
||||
|
||||
@decorators.attr(type='nsxv3')
|
||||
@decorators.attr(type=["negative"])
|
||||
@decorators.idempotent_id('fe1598bb-c36e-4585-b441-927737df781e')
|
||||
def test_provider_vlan_network_with_vxlan_tz(self):
|
||||
self.assertRaises(exceptions.BadRequest,
|
||||
self.provider_networks_topoloy,
|
||||
self.overlay_id, constants.VLAN_TYPE)
|
||||
|
||||
@decorators.attr(type='nsxv3')
|
||||
@decorators.attr(type=["negative"])
|
||||
@decorators.idempotent_id('13d8959c-fc49-49fc-9b03-51ea07313257')
|
||||
def test_provider_vxlan_network_with_vlan_tz(self):
|
||||
self.assertRaises(exceptions.BadRequest,
|
||||
self.provider_networks_topoloy,
|
||||
self.vlan_id, constants.VXLAN_TYPE)
|
||||
170
vmware_nsx_tempest/tests/scenario/test_provider_networks.py
Normal file
170
vmware_nsx_tempest/tests/scenario/test_provider_networks.py
Normal file
@@ -0,0 +1,170 @@
|
||||
# Copyright 2017 VMware Inc
|
||||
# All Rights Reserved
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
from tempest import config
|
||||
from tempest.lib import decorators
|
||||
from tempest import test
|
||||
|
||||
from vmware_nsx_tempest.common import constants
|
||||
from vmware_nsx_tempest.lib import feature_manager
|
||||
from vmware_nsx_tempest.services import nsxv3_client
|
||||
|
||||
CONF = config.CONF
|
||||
LOG = constants.log.getLogger(__name__)
|
||||
|
||||
|
||||
class ProviderNetworkScenario(feature_manager.FeatureManager):
|
||||
"""Test Provider Physical Networks Scenario
|
||||
|
||||
"""
|
||||
|
||||
@classmethod
|
||||
def skip_checks(cls):
|
||||
super(ProviderNetworkScenario, cls).skip_checks()
|
||||
if not test.is_extension_enabled('provider', 'network'):
|
||||
msg = "Extension provider-security-group is not enabled."
|
||||
raise cls.skipException(msg)
|
||||
|
||||
@classmethod
|
||||
def setup_clients(cls):
|
||||
super(ProviderNetworkScenario, cls).setup_clients()
|
||||
cls.cmgr_adm = cls.get_client_manager('admin')
|
||||
|
||||
@classmethod
|
||||
def resource_setup(cls):
|
||||
super(ProviderNetworkScenario, cls).resource_setup()
|
||||
cls.nsx = nsxv3_client.NSXV3Client(CONF.nsxv3.nsx_manager,
|
||||
CONF.nsxv3.nsx_user,
|
||||
CONF.nsxv3.nsx_password)
|
||||
out = cls.nsx.get_transport_zones()
|
||||
vlan_flag = 0
|
||||
vxlan_flag = 0
|
||||
for tz in out:
|
||||
if "transport_type" in tz.keys() and (vlan_flag == 0
|
||||
or vxlan_flag == 0):
|
||||
if vxlan_flag == 0 and tz['transport_type'] == "OVERLAY":
|
||||
cls.overlay_id = tz['id']
|
||||
vxlan_flag = 1
|
||||
if vlan_flag == 0 and tz['transport_type'] == "VLAN":
|
||||
cls.vlan_id = tz['id']
|
||||
vlan_flag = 1
|
||||
|
||||
def _create_provider_network(self, tz_id, net_type,
|
||||
admin_state_up=True):
|
||||
networks_client = self.cmgr_adm.networks_client
|
||||
if net_type == constants.VXLAN_TYPE:
|
||||
name = "network"
|
||||
body = {"provider:physical_network": tz_id,
|
||||
"provider:network_type": net_type,
|
||||
"admin_state_up": admin_state_up}
|
||||
elif net_type == constants.VLAN_TYPE:
|
||||
name = "network"
|
||||
body = {"provider:segmentation_id": 1001,
|
||||
"provider:network_type": net_type,
|
||||
"provider:physical_network": tz_id,
|
||||
"admin_state_up": admin_state_up}
|
||||
network = self.create_topology_network(name, networks_client, **body)
|
||||
return network
|
||||
|
||||
def provider_network_topology1(self):
|
||||
sec_rule_client = self.cmgr_adm.security_group_rules_client
|
||||
sec_client = self.cmgr_adm.security_groups_client
|
||||
network = self._create_provider_network(self.overlay_id,
|
||||
constants.VXLAN_TYPE)
|
||||
kwargs = dict(tenant_id=network['tenant_id'],
|
||||
security_group_rules_client=sec_rule_client,
|
||||
security_groups_client=sec_client)
|
||||
self.sg = self.create_topology_security_group(**kwargs)
|
||||
routers_client = self.cmgr_adm.routers_client
|
||||
router_name = 'router'
|
||||
router = self.create_topology_router(router_name,
|
||||
routers_client=routers_client)
|
||||
subnet_client = self.cmgr_adm.subnets_client
|
||||
subnet_name = network['name'] + 'sub'
|
||||
self.create_topology_subnet(subnet_name, network,
|
||||
routers_client=routers_client,
|
||||
subnets_client=subnet_client,
|
||||
router_id=router['id'])
|
||||
self.create_topology_instance(
|
||||
"server1", [network],
|
||||
security_groups=[{'name': self.sg['name']}],
|
||||
clients=self.cmgr_adm)
|
||||
self.create_topology_instance(
|
||||
"server2", [network],
|
||||
security_groups=[{'name': self.sg['name']}],
|
||||
clients=self.cmgr_adm)
|
||||
|
||||
def provider_network_topology2(self):
|
||||
sec_rule_client = self.cmgr_adm.security_group_rules_client
|
||||
sec_client = self.cmgr_adm.security_groups_client
|
||||
network1 = self._create_provider_network(self.overlay_id,
|
||||
constants.VXLAN_TYPE)
|
||||
kwargs = dict(tenant_id=network1['tenant_id'],
|
||||
security_group_rules_client=sec_rule_client,
|
||||
security_groups_client=sec_client)
|
||||
self.sg = self.create_topology_security_group(**kwargs)
|
||||
routers_client = self.cmgr_adm.routers_client
|
||||
router_name = 'router'
|
||||
router = self.create_topology_router(router_name,
|
||||
routers_client=routers_client)
|
||||
subnet_client = self.cmgr_adm.subnets_client
|
||||
network2 = self._create_provider_network(self.overlay_id,
|
||||
constants.VXLAN_TYPE)
|
||||
subnet_name1 = network1['name'] + 'sub1'
|
||||
subnet_name2 = network2['name'] + 'sub2'
|
||||
self.create_topology_subnet(subnet_name1, network1,
|
||||
routers_client=routers_client,
|
||||
subnets_client=subnet_client,
|
||||
router_id=router['id'],
|
||||
cidr='23.0.0.0/24')
|
||||
self.create_topology_subnet(subnet_name2, network2,
|
||||
routers_client=routers_client,
|
||||
subnets_client=subnet_client,
|
||||
router_id=router['id'],
|
||||
cidr='24.0.0.0/24')
|
||||
self.create_topology_instance(
|
||||
"server1", [network1],
|
||||
security_groups=[{'name': self.sg['name']}],
|
||||
clients=self.cmgr_adm)
|
||||
self.create_topology_instance(
|
||||
"server2", [network2],
|
||||
security_groups=[{'name': self.sg['name']}],
|
||||
clients=self.cmgr_adm)
|
||||
|
||||
@decorators.attr(type='nsxv3')
|
||||
@decorators.idempotent_id('244b51c0-b758-49bc-bcaa-9de744322665')
|
||||
def test_provider_vxlan_same_network_same_cidr_scenario(self):
|
||||
self.provider_network_topology1()
|
||||
self.check_cross_network_connectivity(
|
||||
self.topology_networks["network"],
|
||||
self.servers_details["server1"].floating_ips[0],
|
||||
self.servers_details["server1"].server, should_connect=True)
|
||||
self.check_cross_network_connectivity(
|
||||
self.topology_networks["network"],
|
||||
self.servers_details["server2"].floating_ips[0],
|
||||
self.servers_details["server2"].server, should_connect=True)
|
||||
|
||||
@decorators.attr(type='nsxv3')
|
||||
@decorators.idempotent_id('456b51c0-b758-49bc-bcaa-9de744322123')
|
||||
def test_provider_vxlan_differnet_network_different_cidr_scenario(self):
|
||||
self.provider_network_topology2()
|
||||
self.check_cross_network_connectivity(
|
||||
self.topology_networks["network"],
|
||||
self.servers_details["server1"].floating_ips[0],
|
||||
self.servers_details["server1"].server, should_connect=True)
|
||||
self.check_cross_network_connectivity(
|
||||
self.topology_networks["network"],
|
||||
self.servers_details["server2"].floating_ips[0],
|
||||
self.servers_details["server2"].server, should_connect=True)
|
||||
Reference in New Issue
Block a user