Tempest: Fix upstream patch 32049 which replacing oo-wrap

Patch 32049 replaced object-oriented wrapped network resources with
python method and object reference mechanism, and relys on
test framework's teardown mechanism.

Partial oo-wrapped mechanism are replaced with methods defined at
module network_addon_methods.py, and object referenc method is
replaced with python dict/list reference methods.

For API tests, their _try_delete_resources are replaced with
test_utils.call_and_ignore_notfound_exc

config.nsxv.no_router_type added to support running lbaasv2
under upstream environment.

Potential issues whith NSX-6.2.3 during this fix:
bug#1682911 and bug#1683241

Change-Id: I93a667b85d87644e8cbf27337c7355b338f67982
This commit is contained in:
Alex Kang 2016-06-25 22:30:36 -07:00
parent 9e74370f6b
commit 3d39f1300c
22 changed files with 861 additions and 1043 deletions

View File

@ -96,6 +96,11 @@ NSXvGroup = [
cfg.IntOpt('provider_vlan_id', cfg.IntOpt('provider_vlan_id',
default=888, default=888,
help="The default vlan_id for admin vlan."), help="The default vlan_id for admin vlan."),
cfg.BoolOpt('no_router_type',
default=False,
help="router_type is NSXv extension."
"Set it to True allow tests to remove this attribute"
" when creating router."),
] ]

View File

@ -18,6 +18,7 @@ import netaddr
from tempest.api.network import base from tempest.api.network import base
from tempest import config from tempest import config
from tempest.lib.common.utils import data_utils from tempest.lib.common.utils import data_utils
from tempest.lib.common.utils import test_utils
from tempest.lib import exceptions from tempest.lib import exceptions
from tempest import test from tempest import test
@ -49,8 +50,8 @@ class BaseAdminNetworkTest(base.BaseAdminNetworkTest):
for netwk_info in cls.admin_netwk_info: for netwk_info in cls.admin_netwk_info:
net_client, network = netwk_info net_client, network = netwk_info
try: try:
cls._try_delete_resource(net_client.delete_network, test_utils.call_and_ignore_notfound_exc(
network['id']) net_client.delete_network, network['id'])
except Exception: except Exception:
pass pass
super(BaseAdminNetworkTest, cls).resource_cleanup() super(BaseAdminNetworkTest, cls).resource_cleanup()

View File

@ -25,6 +25,7 @@ from tempest import config
from tempest import test from tempest import test
from tempest.lib.common.utils import data_utils from tempest.lib.common.utils import data_utils
from tempest.lib.common.utils import test_utils
from tempest.lib import exceptions from tempest.lib import exceptions
from vmware_nsx_tempest._i18n import _ from vmware_nsx_tempest._i18n import _
@ -96,23 +97,25 @@ class BaseTestCase(base.BaseNetworkTest):
for pool in listener.get('pools'): for pool in listener.get('pools'):
hm = pool.get('healthmonitor') hm = pool.get('healthmonitor')
if hm: if hm:
cls._try_delete_resource( test_utils.call_and_ignore_notfound_exc(
cls.health_monitors_client.delete_health_monitor, cls.health_monitors_client.delete_health_monitor,
pool.get('healthmonitor').get('id')) pool.get('healthmonitor').get('id'))
cls._wait_for_load_balancer_status(lb_id) cls._wait_for_load_balancer_status(lb_id)
cls._try_delete_resource(cls.pools_client.delete_pool, test_utils.call_and_ignore_notfound_exc(
pool.get('id')) cls.pools_client.delete_pool, pool.get('id'))
cls._wait_for_load_balancer_status(lb_id) cls._wait_for_load_balancer_status(lb_id)
health_monitor = pool.get('healthmonitor') health_monitor = pool.get('healthmonitor')
if health_monitor: if health_monitor:
cls._try_delete_resource( test_utils.call_and_ignore_notfound_exc(
cls.health_monitors_client.delete_health_monitor, cls.health_monitors_client.delete_health_monitor,
health_monitor.get('id')) health_monitor.get('id'))
cls._wait_for_load_balancer_status(lb_id) cls._wait_for_load_balancer_status(lb_id)
cls._try_delete_resource(cls.listeners_client.delete_listener, test_utils.call_and_ignore_notfound_exc(
listener.get('id')) cls.listeners_client.delete_listener,
listener.get('id'))
cls._wait_for_load_balancer_status(lb_id) cls._wait_for_load_balancer_status(lb_id)
cls._try_delete_resource(cls._delete_load_balancer, lb_id) test_utils.call_and_ignore_notfound_exc(
cls._delete_load_balancer, lb_id)
# NSX-v: delete exclusive router # NSX-v: delete exclusive router
cls.delete_router(cls.router) cls.delete_router(cls.router)
super(BaseTestCase, cls).resource_cleanup() super(BaseTestCase, cls).resource_cleanup()

View File

@ -56,7 +56,7 @@ class TestHealthMonitors(base.BaseTestCase):
hm_list = self._list_health_monitors() hm_list = self._list_health_monitors()
for hm in hm_list: for hm in hm_list:
self._try_delete_resource( test_utils.call_and_igonre_not_found_exc(
self._delete_health_monitor, self._delete_health_monitor,
hm.get('id')) hm.get('id'))
""" """

View File

@ -14,6 +14,7 @@
# under the License. # under the License.
from tempest.lib.common.utils import data_utils from tempest.lib.common.utils import data_utils
from tempest.lib.common.utils import test_utils
from tempest import config from tempest import config
from tempest import test from tempest import test
@ -43,15 +44,16 @@ class DnsSearchDomainTest(base.BaseAdminNetworkTest):
@classmethod @classmethod
def resource_cleanup(cls): def resource_cleanup(cls):
# we need to cleanup resouces created at class methods # we need to cleanup resouces created at class methods
cls._try_delete_resource(cls.networks_client.delete_network, test_utils.call_and_ignore_notfound_exc(
cls.project_network['id']) cls.networks_client.delete_network,
cls.project_network['id'])
super(DnsSearchDomainTest, cls).resource_cleanup() super(DnsSearchDomainTest, cls).resource_cleanup()
def create_networks(self, network_name): def create_networks(self, network_name):
resp = self.create_network(client=self.networks_client, resp = self.create_network(client=self.networks_client,
name=network_name) name=network_name)
network = resp.get('network', resp) network = resp.get('network', resp)
self.addCleanup(self._try_delete_resource, self.addCleanup(test_utils.call_and_ignore_notfound_exc,
self.networks_client.delete_network, self.networks_client.delete_network,
network['id']) network['id'])
resp = self.create_subnet(network, resp = self.create_subnet(network,

View File

@ -16,6 +16,7 @@
from tempest.api.network import base from tempest.api.network import base
from tempest import config from tempest import config
from tempest.lib.common.utils import data_utils from tempest.lib.common.utils import data_utils
from tempest.lib.common.utils import test_utils
from tempest.lib import exceptions from tempest.lib import exceptions
from tempest import test from tempest import test
@ -35,7 +36,7 @@ class DnsSearchDoaminsNegativeTest(base.BaseAdminNetworkTest):
network_name = data_utils.rand_name('dns-sear-negative') network_name = data_utils.rand_name('dns-sear-negative')
resp = networks_client.create_network(name=network_name) resp = networks_client.create_network(name=network_name)
network = resp.get('network', resp) network = resp.get('network', resp)
self.addCleanup(self._try_delete_resource, self.addCleanup(test_utils.call_and_ignore_notfound_exc,
networks_client.delete_network, networks_client.delete_network,
network['id']) network['id'])
subnet_cfg = { subnet_cfg = {

View File

@ -17,6 +17,7 @@ import re
import six import six
from tempest.lib.common.utils import data_utils from tempest.lib.common.utils import data_utils
from tempest.lib.common.utils import test_utils
from tempest.lib import decorators from tempest.lib import decorators
import base_provider as base import base_provider as base
@ -94,7 +95,7 @@ class MultipleTransportZonesTest(base.BaseAdminNetworkTest):
resp = self.create_network(network_name, **create_kwargs) resp = self.create_network(network_name, **create_kwargs)
network = resp.get('network', resp) network = resp.get('network', resp)
net_id = network['id'] net_id = network['id']
self.addCleanup(self._try_delete_resource, self.addCleanup(test_utils.call_and_ignore_notfound_exc,
self.delete_network, net_id) self.delete_network, net_id)
self.assertEqual(scope_id, self.assertEqual(scope_id,
network['provider:physical_network']) network['provider:physical_network'])
@ -150,7 +151,7 @@ class MultipleTransportZonesTest(base.BaseAdminNetworkTest):
kwargs.update(create_kwargs) kwargs.update(create_kwargs)
router = routers_client.create_router(**kwargs) router = routers_client.create_router(**kwargs)
router = router['router'] if 'router' in router else router router = router['router'] if 'router' in router else router
self.addCleanup(self._try_delete_resource, self.addCleanup(test_utils.call_and_ignore_notfound_exc,
routers_client.delete_router, router['id']) routers_client.delete_router, router['id'])
self.assertEqual(router['name'], router_name) self.assertEqual(router['name'], router_name)
return (routers_client, router) return (routers_client, router)
@ -165,8 +166,7 @@ class MultipleTransportZonesTest(base.BaseAdminNetworkTest):
for net_id, (s_id, network, subnet) in six.iteritems(nets): for net_id, (s_id, network, subnet) in six.iteritems(nets):
# register to cleanup before adding interfaces so interfaces # register to cleanup before adding interfaces so interfaces
# and router can be deleted if test is aborted. # and router can be deleted if test is aborted.
self.addCleanup( self.addCleanup(test_utils.call_and_ignore_notfound_exc,
self._try_delete_resource,
routers_client.remove_router_interface, routers_client.remove_router_interface,
router['id'], subnet_id=subnet['id']) router['id'], subnet_id=subnet['id'])
routers_client.add_router_interface( routers_client.add_router_interface(

View File

@ -15,6 +15,7 @@
# under the License. # under the License.
from tempest.lib.common.utils import data_utils from tempest.lib.common.utils import data_utils
from tempest.lib.common.utils import test_utils
from tempest.lib import exceptions as lib_exc from tempest.lib import exceptions as lib_exc
from tempest.api.network import base from tempest.api.network import base
@ -42,7 +43,7 @@ class MultipleTransportZonesNegativeTest(base.BaseAdminNetworkTest):
resp = networks_client.create_network(name=network_name, resp = networks_client.create_network(name=network_name,
**create_kwargs) **create_kwargs)
network = resp['network'] if 'network' in resp else resp network = resp['network'] if 'network' in resp else resp
self.addCleanup(self._try_delete_resource, self.addCleanup(test_utils.call_and_ignore_notfound_exc,
networks_client.delete_network, networks_client.delete_network,
network['id']) network['id'])
return network return network

View File

@ -17,6 +17,7 @@
import six import six
from tempest.lib.common.utils import data_utils from tempest.lib.common.utils import data_utils
from tempest.lib.common.utils import test_utils
from tempest.lib import decorators from tempest.lib import decorators
from tempest.api.network import base from tempest.api.network import base
@ -99,26 +100,27 @@ class LoadBalancerTestJSON(base.BaseNetworkTest):
""" """
# Cleanup lb health monitors # Cleanup lb health monitors
if cls.health_monitor: if cls.health_monitor:
cls._try_delete_resource(cls.lbv1_client.delete_health_monitor, test_utils.call_and_ignore_notfound_exc(
cls.health_monitor['id']) cls.lbv1_client.delete_health_monitor,
cls.health_monitor['id'])
cls.health_monitor = None cls.health_monitor = None
# Cleanup members # Cleanup members
if cls.member: if cls.member:
cls._try_delete_resource(cls.lbv1_client.delete_member, test_utils.call_and_ignore_notfound_exc(
cls.member['id']) cls.lbv1_client.delete_member, cls.member['id'])
cls.member = None cls.member = None
# Cleanup vips # Cleanup vips
if cls.vip: if cls.vip:
cls._try_delete_resource(cls.lbv1_client.delete_vip, test_utils.call_and_ignore_notfound_exc(
cls.vip['id']) cls.lbv1_client.delete_vip, cls.vip['id'])
cls.vip = None cls.vip = None
# Cleanup pool # Cleanup pool
if cls.pool: if cls.pool:
cls._try_delete_resource(cls.lbv1_client.delete_pool, test_utils.call_and_ignore_notfound_exc(
cls.pool['id']) cls.lbv1_client.delete_pool, cls.pool['id'])
cls.pool = None cls.pool = None
super(LoadBalancerTestJSON, cls).resource_cleanup() super(LoadBalancerTestJSON, cls).resource_cleanup()

View File

@ -14,24 +14,22 @@
# under the License. # under the License.
import collections import collections
from fixtures._fixtures import timeout as fixture_timeout
import os import os
import re import re
import subprocess import subprocess
import time import time
import traceback import traceback
import net_resources
import netaddr
from tempest.common.utils.linux import remote_client from tempest.common.utils.linux import remote_client
from tempest.common import waiters from tempest.common import waiters
from tempest import config from tempest import config
from tempest.lib.common.utils import data_utils
from tempest.lib.common.utils import test_utils
from tempest.scenario import manager from tempest.scenario import manager
from tempest import test from tempest import test
from tempest.lib.common.utils import data_utils from vmware_nsx_tempest.tests.nsxv.scenario import (
from tempest.lib import exceptions network_addon_methods as HELO)
CONF = config.CONF CONF = config.CONF
LOG = manager.log.getLogger(__name__) LOG = manager.log.getLogger(__name__)
@ -65,6 +63,9 @@ class TopoDeployScenarioManager(manager.NetworkScenarioTest):
3. net_resources.py overwrite resourses.py so the method to add 3. net_resources.py overwrite resourses.py so the method to add
interfaces to routers are inline with CLI, and support router interfaces to routers are inline with CLI, and support router
owned by admin, but subnets are primary/alt clients. owned by admin, but subnets are primary/alt clients.
-- mechanism removed with patch 320495
-- we are relaying on the test framework to delete resources
in the reverse order of creating.
4. Ping is used for Data-plane testing. OUTSIDE_WORLD_SERVERS ping 4. Ping is used for Data-plane testing. OUTSIDE_WORLD_SERVERS ping
test make sense when tenant's DNS is pirvate to provider. test make sense when tenant's DNS is pirvate to provider.
5. Teardown is high cost, each test should perform its un-config to 5. Teardown is high cost, each test should perform its un-config to
@ -124,56 +125,80 @@ class TopoDeployScenarioManager(manager.NetworkScenarioTest):
def tearDown(self): def tearDown(self):
super(TopoDeployScenarioManager, self).tearDown() super(TopoDeployScenarioManager, self).tearDown()
# bypass pareant _create_router() to use the net_resources module. # overwrite parent class which does not accept NSX-v extension
# Scenario: routers belong to admin, subnets belon to tenent
def _create_router(self, client_mgr=None, tenant_id=None, def _create_router(self, client_mgr=None, tenant_id=None,
namestart='topo-deploy', **kwargs): namestart='topo-deploy', **kwargs):
client_mgr = client_mgr or self.manager client_mgr = client_mgr or self.manager
routers_client = getattr(client_mgr, "routers_client") routers_client = getattr(client_mgr, "routers_client")
if not tenant_id: router = HELO.router_create(self, client=routers_client,
tenant_id = routers_client.tenant_id tenant_id=tenant_id,
distributed = kwargs.pop('distributed', None) namestart=namestart,
router_type = kwargs.pop('router_type', None) **kwargs)
if distributed:
kwargs['distributed'] = True
elif router_type in ('shared', 'exclusive'):
kwargs['router_type'] = router_type
name = data_utils.rand_name(namestart)
result = routers_client.create_router(name=name,
admin_state_up=True,
tenant_id=tenant_id,
**kwargs)
router = net_resources.DeletableRouter(client=routers_client,
routers_client=routers_client,
**result['router'])
self.assertEqual(router.name, name)
self.addCleanup(self.delete_wrapper, router.delete)
return router return router
def _router_set_gateway(self, router_id, network_id, client=None):
routers_client = client or self.routers_client
return HELO.router_gateway_set(self, router_id, network_id,
client=routers_client)
def _router_clear_gateway(self, router_id, client=None):
routers_client = client or self.routers_client
return HELO.router_gateway_clear(self, router_id,
client=routers_client)
def _router_update_extra_routes(self, router_id, routes, client=None):
routers_client = client or self.routers_client
router = routers_client.update_route(self, router_id,
routes=routes)
return router['router']
def _router_delete_extra_routes(self, router_id, client=None):
routers_client = client or self.routers_client
return HELO.router_delete_extra_routes(self, router_id,
routers_client)
def _router_add_interface(self, net_router, net_subnet, client_mgr):
routers_client = client_mgr.routers_client
return HELO.router_interface_add(self, net_router['id'],
net_subnet['id'], routers_client)
def router_interface_add(self, router_id, subnet_id, client=None):
routers_client = client or self.routers_client
return HELO.router_interface_add(self, router_id, subnet_id,
routers_client)
def router_interface_delete(self, router_id, subnet_id, client=None):
routers_client = client or self.routers_client
return HELO.router_interface_delete(self, router_id, subnet_id,
routers_client)
def create_server_on_network(self, networks, security_groups=None, def create_server_on_network(self, networks, security_groups=None,
name=None, image=None, wait_on_boot=True, name=None, image=None, wait_on_boot=True,
flavor=None, servers_client=None, flavor=None, servers_client=None,
key_name=None): key_name=None, tenant_id=None):
name = name or data_utils.rand_name('topo-deploy-vm') name = name or data_utils.rand_name('topo-deploy-vm')
if security_groups is None: if security_groups is None:
security_groups = [{'name': 'default'}] security_groups = [{'name': 'default'}]
if type(networks) in (list, tuple): if type(networks) in (list, tuple):
network_ifs = [{'uuid': nw.id} for nw in networks] network_ifs = [{'uuid': nw['id']} for nw in networks]
else: else:
network_ifs = [{'uuid': networks.id}] network_ifs = [{'uuid': networks['id']}]
create_kwargs = { create_kwargs = {
'networks': network_ifs, 'networks': network_ifs,
'security_groups': security_groups, 'security_groups': security_groups,
} }
if key_name: if key_name:
create_kwargs['key_name'] = key_name create_kwargs['key_name'] = key_name
if tenant_id:
if not (servers_client and servers_client.tenant_id == tenant_id):
create_kwargs['tenant_id'] = tenant_id
LOG.debug("TopoDeploy Create server name=%(name)s" LOG.debug("TopoDeploy Create server name=%(name)s"
", create_kwargs=%(create_kwargs)s", ", create_kwargs=%(create_kwargs)s",
{'name': name, 'create_kwargs': str(create_kwargs)}) {'name': name, 'create_kwargs': str(create_kwargs)})
server = self.create_server( server = self.create_server(
name=name, image=image, wait_on_boot=wait_on_boot, name=name, image=image, wait_on_boot=wait_on_boot,
servers_client=servers_client, flavor=flavor, servers_client=servers_client, flavor=flavor,
create_kwargs=create_kwargs) tenant_id=tenant_id, create_kwargs=create_kwargs)
return server return server
# overwrite parent classes; add servers_client # overwrite parent classes; add servers_client
@ -197,7 +222,8 @@ class TopoDeployScenarioManager(manager.NetworkScenarioTest):
servers_client = servers_client or self.servers_client servers_client = servers_client or self.servers_client
create_kwargs = create_kwargs or {} create_kwargs = create_kwargs or {}
if type(tenant_id) in (str, unicode): if type(tenant_id) in (str, unicode):
create_kwargs['tenant_id'] = tenant_id if servers_client.tenant_id != tenant_id:
create_kwargs['tenant_id'] = tenant_id
xmsg = ("Creating a server name=%(name)s, image=%(image)s" xmsg = ("Creating a server name=%(name)s, image=%(image)s"
", flavor=%(flavor)s, create_kwargs=%(create_kwargs)s" % ", flavor=%(flavor)s, create_kwargs=%(create_kwargs)s" %
@ -215,7 +241,7 @@ class TopoDeployScenarioManager(manager.NetworkScenarioTest):
waiter_callable=waiters.wait_for_server_termination, waiter_callable=waiters.wait_for_server_termination,
thing_id=server['id'], thing_id_param='server_id', thing_id=server['id'], thing_id_param='server_id',
waiter_client=servers_client, waiter_client=servers_client,
cleanup_callable=self.delete_wrapper, cleanup_callable=test_utils.call_and_ignore_notfound_exc,
cleanup_args=[servers_client.delete_server, server['id']]) cleanup_args=[servers_client.delete_server, server['id']])
if wait_on_boot: if wait_on_boot:
waiters.wait_for_server_status( waiters.wait_for_server_status(
@ -234,21 +260,18 @@ class TopoDeployScenarioManager(manager.NetworkScenarioTest):
name = create_body.get('name', None) or data_utils.rand_name('P-net') name = create_body.get('name', None) or data_utils.rand_name('P-net')
create_body['name'] = name create_body['name'] = name
client_mgr = client_mgr or self.admin_manager client_mgr = client_mgr or self.admin_manager
networks_client = client_mgr.networks_client net_network = HELO.create_network(
body = networks_client.create_network(**create_body) self, client=client_mgr.networks_client, **create_body)
net_network = net_resources.DeletableNetwork(
networks_client=networks_client, **body['network'])
self.assertEqual(net_network.name, name)
self.addCleanup(self.delete_wrapper, net_network.delete)
return net_network return net_network
def create_provider_subnet(self, client_mgr=None, create_body=None): def create_provider_subnet(self, client_mgr=None, create_body=None):
client_mgr = client_mgr or self.admin_manager client_mgr = client_mgr or self.admin_manager
subnets_client = client_mgr.subnets_client subnets_client = client_mgr.subnets_client
body = subnets_client.create_subnet(**create_body) body = subnets_client.create_subnet(**create_body)
net_subnet = net_resources.DeletableSubnet( net_subnet = body['subnet']
subnets_client=subnets_client, **body['subnet']) self.addCleanup(test_utils.call_and_ignore_notfound_exc,
self.addCleanup(self.delete_wrapper, net_subnet.delete) subnets_client.delete_subnet,
net_subnet['id'])
return net_subnet return net_subnet
def setup_project_network(self, external_network_id, def setup_project_network(self, external_network_id,
@ -277,13 +300,12 @@ class TopoDeployScenarioManager(manager.NetworkScenarioTest):
client_mgr=client_mgr, tenant_id=tenant_id, client_mgr=client_mgr, tenant_id=tenant_id,
namestart=name, namestart=name,
distributed=distributed, router_type=router_type) distributed=distributed, router_type=router_type)
net_router.set_gateway(external_network_id) self._router_set_gateway(net_router['id'], external_network_id,
client=client_mgr.routers_client)
net_network, net_subnet = self.create_network_subnet( net_network, net_subnet = self.create_network_subnet(
client_mgr=client_mgr, client_mgr=client_mgr, name=net_router['name'],
tenant_id=tenant_id, name=net_router.name, tenant_id=tenant_id, cidr_offset=cidr_offset)
cidr_offset=cidr_offset) self._router_add_interface(net_router, net_subnet, client_mgr)
# different from the resources.py
net_router.add_interface(net_subnet)
return net_network, net_subnet, net_router return net_network, net_subnet, net_router
def create_network_subnet(self, client_mgr=None, def create_network_subnet(self, client_mgr=None,
@ -303,40 +325,25 @@ class TopoDeployScenarioManager(manager.NetworkScenarioTest):
# cloned from _create_network@manager.py. Allow name parameter # cloned from _create_network@manager.py. Allow name parameter
def create_network(self, client=None, tenant_id=None, name=None, def create_network(self, client=None, tenant_id=None, name=None,
**kwargs): **kwargs):
client = client or self.networks_client networks_client = client or self.networks_client
tenant_id = tenant_id or _g_tenant_id(client) tenant_id = tenant_id or _g_tenant_id(networks_client)
name = name or data_utils.rand_name('topo-deploy-network') name = name or data_utils.rand_name('topo-deploy-network')
result = client.create_network(name=name, tenant_id=tenant_id, return HELO.create_network(self, client=networks_client,
**kwargs) tenant_id=tenant_id, name=name,
net_network = net_resources.DeletableNetwork( **kwargs)
client=client, networks_client=client,
**result['network'])
self.assertEqual(net_network.name, name)
self.addCleanup(self.delete_wrapper, net_network.delete)
return net_network
def create_subnet(self, network, client=None, def create_subnet(self, network, client=None,
gateway='', cidr=None, mask_bits=None, gateway='', cidr=None, mask_bits=None,
ip_version=None, cidr_offset=0, ip_version=None, cidr_offset=0,
allocation_pools=None, dns_nameservers=None, allocation_pools=None, dns_nameservers=None,
**kwargs): **kwargs):
client = client or self.subnets_client subnets_client = client or self.subnets_client
ip_version = ip_version or 4 kwargs.update(client=subnets_client, gateway=gateway,
post_body = get_subnet_create_options( cidr=cidr, cidr_offset=cidr_offset,
network['id'], ip_version, mask_bits=mask_bits, ip_version=ip_version,
gateway=gateway, cidr=cidr, cidr_offset=cidr_offset, allocation_pools=allocation_pools,
mask_bits=mask_bits, **kwargs) dns_nameservers=dns_nameservers)
if allocation_pools: return HELO.create_subnet(self, network, **kwargs)
post_body['allocation_pools'] = allocation_pools
if dns_nameservers:
post_body['dns_nameservers'] = dns_nameservers
LOG.debug("create_subnet args: %s", post_body)
body = client.create_subnet(**post_body)
net_subnet = net_resources.DeletableSubnet(
client=client, subnets_client=client,
**body['subnet'])
self.addCleanup(self.delete_wrapper, net_subnet.delete)
return net_subnet
def create_floatingip_for_server(self, server, external_network_id=None, def create_floatingip_for_server(self, server, external_network_id=None,
port_id=None, client_mgr=None): port_id=None, client_mgr=None):
@ -391,34 +398,29 @@ class TopoDeployScenarioManager(manager.NetworkScenarioTest):
LOG.debug(xmsg) LOG.debug(xmsg)
return server_pingable return server_pingable
def disassociate_floatingip(self, net_floatingip, and_delete=False): def disassociate_floatingip(self, net_floatingip, client=None,
self._disassociate_floating_ip(net_floatingip) and_delete=False):
floating_ips_client = client or self.floating_ips_client
kwargs = dict(port_id=None)
floating_ip = floating_ips_client.update_floatingip(
net_floatingip['id'], **kwargs)
floating_ip = floating_ip.get('floatingip', floating_ip)
self.assertIsNone(floating_ip['port_id'])
if and_delete: if and_delete:
net_floatingip.delete() floating_ips_client.delete_floatingip(floating_ip['id'])
return floating_ip
def associate_floatingip(self, net_floatingip, to_server): def associate_floatingip(self, net_floatingip, to_server, client=None):
self._associate_floating_ip(net_floatingip, to_server) floating_ips_client = client or self.floating_ips_client
port_id, _ = self._get_server_port_id_and_ip4(to_server)
kwargs = dict(port_id=port_id)
floating_ip = floating_ips_client.update_floatingip(
net_floatingip['id'], **kwargs)['floatingip']
self.assertEqual(port_id, floating_ip['port_id'])
return floating_ip
def check_networks(self, net_network, net_subnet=None, net_router=None): def check_networks(self, net_network, net_subnet=None, net_router=None):
seen_nets = self._list_networks() return HELO.check_networks(self, net_network, net_subnet, net_router)
seen_names = [n['name'] for n in seen_nets]
seen_ids = [n['id'] for n in seen_nets]
self.assertIn(net_network.name, seen_names)
self.assertIn(net_network.id, seen_ids)
if net_subnet:
seen_subnets = self._list_subnets()
seen_net_ids = [n['network_id'] for n in seen_subnets]
seen_subnet_ids = [n['id'] for n in seen_subnets]
self.assertIn(net_network.id, seen_net_ids)
self.assertIn(net_subnet.id, seen_subnet_ids)
if net_router:
seen_routers = self._list_routers()
seen_router_ids = [n['id'] for n in seen_routers]
seen_router_names = [n['name'] for n in seen_routers]
self.assertIn(net_router.name, seen_router_names)
self.assertIn(net_router.id, seen_router_ids)
# use this carefully, as it expect existence of floating_ip_tuple # use this carefully, as it expect existence of floating_ip_tuple
def check_public_network_connectivity(self, should_connect=True, def check_public_network_connectivity(self, should_connect=True,
@ -441,7 +443,7 @@ class TopoDeployScenarioManager(manager.NetworkScenarioTest):
def _check_floatingip_connectivity(self, floating_ip, server, def _check_floatingip_connectivity(self, floating_ip, server,
should_connect=True, should_connect=True,
msg=None, ping_timeout=30): msg=None, ping_timeout=30):
ip_address = floating_ip.floating_ip_address ip_address = floating_ip['floating_ip_address']
floatingip_status = 'ACTIVE' if should_connect else 'DOWN' floatingip_status = 'ACTIVE' if should_connect else 'DOWN'
is_pingable = self.ping_ip_address(ip_address, is_pingable = self.ping_ip_address(ip_address,
ping_timeout=ping_timeout) ping_timeout=ping_timeout)
@ -463,36 +465,17 @@ class TopoDeployScenarioManager(manager.NetworkScenarioTest):
def get_server_flavor(self): def get_server_flavor(self):
return CONF.compute.flavor_ref return CONF.compute.flavor_ref
# replaced by call_and_ignore_notfound_exc method
# at tempest/lib/common/utils/test_utils.py
def delete_wrapper(self, delete_thing, *args, **kwargs):
"""Ignores NotFound exceptions for delete operations.
@param delete_thing: delete method of a resource. method will be
executed as delete_thing(*args, **kwargs)
"""
try:
delete_thing(*args, **kwargs)
except exceptions.NotFound:
# If the resource is already missing, mission accomplished.
pass
except fixture_timeout.TimeoutException:
# one more time
try:
delete_thing(*args, **kwargs)
except exceptions.NotFound:
pass
# common utilities # common utilities
def make_node_info(net_floatingip, username, password, def make_node_info(net_floatingip, username, password,
include_outside_servers=False): include_outside_servers=False):
node = dict(ipaddr=net_floatingip.floating_ip_address, floating_ip_address = net_floatingip['floating_ip_address']
fixed_ip_address = net_floatingip['fixed_ip_address']
node = dict(ipaddr=floating_ip_address,
username=username, password=password) username=username, password=password)
node['dest'] = [dict(ipaddr=net_floatingip.floating_ip_address, node['dest'] = [dict(ipaddr=floating_ip_address,
reachable=None, helper=IPTYPE_FLOATING), reachable=None, helper=IPTYPE_FLOATING),
dict(ipaddr=net_floatingip.fixed_ip_address, dict(ipaddr=fixed_ip_address,
reachable=None, helper=IPTYPE_FIXED)] reachable=None, helper=IPTYPE_FIXED)]
if include_outside_servers: if include_outside_servers:
outside_servers = dict(ipaddr=OUTSIDE_WORLD_SERVERS[0], outside_servers = dict(ipaddr=OUTSIDE_WORLD_SERVERS[0],
@ -656,59 +639,6 @@ def _g_tenant_id(os_client):
return os_client.rest_client.tenant_id return os_client.rest_client.tenant_id
def get_subnet_create_options(network_id, ip_version=4,
gateway='', cidr=None, mask_bits=None,
num_subnet=1, gateway_offset=1, cidr_offset=0,
**kwargs):
"""When cidr_offset>0 it request only one subnet-options:
subnet = get_subnet_create_options('abcdefg', 4, num_subnet=4)[3]
subnet = get_subnet_create_options('abcdefg', 4, cidr_offset=3)
"""
gateway_not_set = gateway == ''
if ip_version == 4:
cidr = cidr or netaddr.IPNetwork(CONF.network.project_network_cidr)
mask_bits = mask_bits or CONF.network.project_network_mask_bits
elif ip_version == 6:
cidr = (
cidr or netaddr.IPNetwork(CONF.network.project_network_v6_cidr))
mask_bits = mask_bits or CONF.network.project_network_v6_mask_bits
# Find a cidr that is not in use yet and create a subnet with it
subnet_list = []
if cidr_offset > 0:
num_subnet = cidr_offset + 1
for subnet_cidr in cidr.subnet(mask_bits):
if gateway_not_set:
gateway_ip = gateway or (
str(netaddr.IPAddress(subnet_cidr) + gateway_offset))
else:
gateway_ip = gateway
try:
subnet_body = dict(network_id=network_id,
cidr=str(subnet_cidr),
ip_version=ip_version,
gateway_ip=gateway_ip,
**kwargs)
if num_subnet <= 1:
return subnet_body
subnet_list.append(subnet_body)
if len(subnet_list) >= num_subnet:
if cidr_offset > 0:
# user request the 'cidr_offset'th of cidr
return subnet_list[cidr_offset]
# user request list of cidr
return subnet_list
except exceptions.BadRequest as e:
is_overlapping_cidr = 'overlaps with another subnet' in str(e)
if not is_overlapping_cidr:
raise
else:
message = 'Available CIDR for subnet creation could not be found'
raise exceptions.BuildErrorException(message)
return {}
def get_remote_client_by_password(client_ip, username, password): def get_remote_client_by_password(client_ip, username, password):
ssh_client = remote_client.RemoteClient(client_ip, username, password) ssh_client = remote_client.RemoteClient(client_ip, username, password)
return ssh_client return ssh_client

View File

@ -1,101 +0,0 @@
# Copyright 2015 OpenStack Foundation
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
#
# This module inherents from resources module and enhances router functions
# and block subnet's add_to/delete_from_router so it is more similar to CLI.
# from tempest.scenario import network_resources as n_resources
import network_resources as n_resources
DELETABLE_CLASS_DEF = """class %(cls_name)s(n_resources.%(cls_name)s):
pass
"""
IGNORE_LIST = ['DeletableSubnet', 'DeletableRouter']
# inhere Deletable<Class> from parent module
for cls_name in [x for x in dir(n_resources)
if x.startswith('Deletable') and x not in IGNORE_LIST]:
class_def = DELETABLE_CLASS_DEF % dict(cls_name=cls_name)
exec class_def
# Add/mod methods so we can use it while sustain original functions.
MSG_BLOCK_BY_ADMIN = "Block %s as router might be owned by ADMIN. " \
"Use DeletableRouter instead."
class DeletableSubnet(n_resources.DeletableSubnet):
def __init__(self, *args, **kwargs):
super(DeletableSubnet, self).__init__(*args, **kwargs)
def add_to_router(self, router_id):
raise Exception(MSG_BLOCK_BY_ADMIN % "add_to_router()")
def delete_from_router(self, router_id):
raise Exception(MSG_BLOCK_BY_ADMIN % "delete_from_router()")
# DeletableSubnet should not deal with router which when owned by ADMIN
# will raise privilege issue. Always let the router deals with interfaces.
class DeletableRouter(n_resources.DeletableRouter):
def __init__(self, *args, **kwargs):
super(DeletableRouter, self).__init__(*args, **kwargs)
self._subnets = set()
def set_gateway(self, network_id):
return self.client.update_router(
self.id,
external_gateway_info=dict(network_id=network_id))
def unset_gateway(self):
return self.client.update_router(
self.id,
external_gateway_info=dict())
def add_subnet(self, subnet):
return self.add_interface(subnet)
def add_interface(self, subnet):
self.client.add_router_interface(self.id, subnet_id=subnet.id)
self._subnets.add(subnet)
def delete_subnet(self, subnet):
return self.delete_interface(subnet)
def delete_interface(self, subnet):
self.client.remove_router_interface(self.id, subnet_id=subnet.id)
self._subnets.remove(subnet)
def update_extra_routes(self, nexthop, destination):
return self.client.update_extra_routes(self.id, nexthop, destination)
# to-be-fixed by https://bugs.launchpad.net/tempest/+bug/1468600
def update_extra_routes_future(self, routes):
return self.client.update_extra_routes(self.id, routes)
def delete_extra_routes(self):
return self.client.delete_extra_routes(self.id)
def delete(self):
try:
self.delete_extra_routes()
except Exception:
pass
self.unset_gateway()
for subnet in self._subnets.copy():
self.delete_interface(subnet)
super(DeletableRouter, self).delete()

View File

@ -0,0 +1,258 @@
# All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
#
# This module contains the methods added to test class that to be shared by
# scenario tests that are inherent from tempest/scneario/manager.py or
# manager_topo_deployment.py
import netaddr
from oslo_log import log
from tempest import config
from tempest.lib.common.utils import data_utils
from tempest.lib.common.utils import test_utils
from tempest.lib import exceptions
CONF = config.CONF
LOG = log.getLogger(__name__)
NO_ROUTER_TYPE = CONF.nsxv.no_router_type
# following router methods are not support by upstream tempest,
def router_create(SELF, client=None, tenant_id=None,
namestart='nsxv-router',
admin_state_up=True, **kwargs):
routers_client = client or SELF.routers_client
no_router_type = kwargs.pop('no_router_type', False)
if tenant_id:
if routers_client.tenant_id != tenant_id:
kwargs['tenant_id'] = tenant_id
distributed = kwargs.pop('distributed', None)
router_type = kwargs.pop('router_type', None)
if distributed:
kwargs['distributed'] = True
elif router_type in ('shared', 'exclusive'):
kwargs['router_type'] = router_type
name = kwargs.pop('name', None) or data_utils.rand_name(namestart)
kwargs['name'] = name
kwargs['admin_state_up'] = admin_state_up
if NO_ROUTER_TYPE or no_router_type:
# router_type is NSX-v extension.
# caller can set no_router_type=True to remove it
kwargs.pop('router_type', None)
result = routers_client.create_router(**kwargs)
router = result['router']
SELF.addCleanup(test_utils.call_and_ignore_notfound_exc,
routers_client.delete_router, router['id'])
SELF.assertEqual(router['name'], name)
return router
def router_delete(SELF, router_id):
routers_client = SELF.routers_client
routers_client.delete_router(router_id)
def router_gateway_set(SELF, router_id, network_id, client=None):
routers_client = client or SELF.routers_client
routers_client.update_router(
router_id,
external_gateway_info=dict(network_id=network_id))
SELF.addCleanup(test_utils.call_and_ignore_notfound_exc,
router_gateway_clear, SELF,
router_id, client=routers_client)
router = routers_client.show_router(router_id)
return router.get('router', router)
def router_gateway_clear(SELF, router_id, client=None):
routers_client = client or SELF.routers_client
routers_client.update_router(
router_id,
external_gateway_info=dict())
router = routers_client.show_router(router_id)
return router.get('router', router)
def router_update_extra_routes(SELF, router_id, routes, client=None):
routers_client = client or SELF.routers_client
router = routers_client.update_route(router_id, routes=routes)
return router.get('router', router)
def router_delete_extra_routes(SELF, router_id, client=None):
routers_client = client or SELF.routers_client
router = routers_client.update_route(router_id, routes=None)
return router.get('router', router)
def router_interface_add(SELF, router_id, subnet_id, client=None):
routers_client = client or SELF.routers_client
routers_client.add_router_interface(router_id,
subnet_id=subnet_id)
SELF.addCleanup(test_utils.call_and_ignore_notfound_exc,
routers_client.remove_router_interface,
router_id, subnet_id=subnet_id)
def router_interface_delete(SELF, router_id, subnet_id, client=None):
routers_client = client or SELF.routers_client
routers_client.remove_router_interface(router_id, subnet_id=subnet_id)
def router_add_interface(SELF, net_router, net_subnet, client_mgr):
routers_client = client_mgr.routers_client
return router_interface_add(SELF, net_router['id'], net_subnet['id'],
routers_client)
def check_networks(SELF, t_network, t_subnet=None, t_router=None):
"""Checks that we see the newly created network/subnet/router.
checking the result of list_[networks,routers,subnets]
"""
seen_nets = SELF._list_networks()
seen_names = [n['name'] for n in seen_nets]
seen_ids = [n['id'] for n in seen_nets]
SELF.assertIn(t_network['name'], seen_names)
SELF.assertIn(t_network['id'], seen_ids)
if t_subnet:
seen_subnets = SELF._list_subnets()
seen_net_ids = [n['network_id'] for n in seen_subnets]
seen_subnet_ids = [n['id'] for n in seen_subnets]
SELF.assertIn(t_network['id'], seen_net_ids)
SELF.assertIn(t_subnet['id'], seen_subnet_ids)
if t_router:
seen_routers = SELF._list_routers()
seen_router_ids = [n['id'] for n in seen_routers]
seen_router_names = [n['name'] for n in seen_routers]
SELF.assertIn(t_router['name'],
seen_router_names)
SELF.assertIn(t_router['id'],
seen_router_ids)
def create_network_subnet(SELF, client_mgr=None, name=None,
tenant_id=None, cidr_offset=0):
client_mgr = client_mgr or SELF.manager
networks_client = client_mgr.networks_client
subnets_client = client_mgr.subnets_client
tenant_id = tenant_id or networks_client.tenant_id
name = name or data_utils.rand_name('network')
net_network = create_network(SELF, client=networks_client,
tenant_id=tenant_id, name=name)
net_subnet = create_subnet(SELF, client=subnets_client,
network=net_network,
name=net_network['name'],
cidr_offset=cidr_offset)
return net_network, net_subnet
# cloned from _create_network@manager.py. Allow name parameter
def create_network(SELF, client=None, tenant_id=None, name=None, **kwargs):
networks_client = client or SELF.networks_client
tenant_id = tenant_id or networks_client.tenant_id
name = name or data_utils.rand_name('network')
body = networks_client.create_network(name=name,
tenant_id=tenant_id,
**kwargs)
net_network = body['network']
SELF.addCleanup(test_utils.call_and_ignore_notfound_exc,
networks_client.delete_network,
net_network['id'])
SELF.assertEqual(net_network['name'], name)
return net_network
# gateway=None means don't set gateway_ip in subnet
def create_subnet(SELF, network, client=None,
gateway='', cidr=None, mask_bits=None,
ip_version=None, cidr_offset=0,
allocation_pools=None, dns_nameservers=None,
**kwargs):
subnets_client = client or SELF.subnets_client
network_id = network['id']
ip_version = ip_version or 4
post_body = get_subnet_create_options(
network_id, ip_version,
gateway=gateway, cidr=cidr, cidr_offset=cidr_offset,
mask_bits=mask_bits, **kwargs)
if allocation_pools:
post_body['allocation_pools'] = allocation_pools
if dns_nameservers:
post_body['dns_nameservers'] = dns_nameservers
LOG.debug("create_subnet args: %s", post_body)
body = subnets_client.create_subnet(**post_body)
net_subnet = body['subnet']
SELF.addCleanup(test_utils.call_and_ignore_notfound_exc,
subnets_client.delete_subnet,
net_subnet['id'])
return net_subnet
# utilities
def get_subnet_create_options(network_id, ip_version=4,
gateway='', cidr=None, mask_bits=None,
num_subnet=1, gateway_offset=1, cidr_offset=0,
**kwargs):
"""When cidr_offset>0 it request only one subnet-options:
subnet = get_subnet_create_options('abcdefg', 4, num_subnet=4)[3]
subnet = get_subnet_create_options('abcdefg', 4, cidr_offset=3)
"""
gateway_not_set = (gateway == '')
if ip_version == 4:
cidr = cidr or netaddr.IPNetwork(CONF.network.project_network_cidr)
mask_bits = mask_bits or CONF.network.project_network_mask_bits
elif ip_version == 6:
cidr = (
cidr or netaddr.IPNetwork(CONF.network.project_network_v6_cidr))
mask_bits = mask_bits or CONF.network.project_network_v6_mask_bits
# Find a cidr that is not in use yet and create a subnet with it
subnet_list = []
if cidr_offset > 0:
num_subnet = cidr_offset + 1
for subnet_cidr in cidr.subnet(mask_bits):
if gateway_not_set:
gateway_ip = gateway or (
str(netaddr.IPAddress(subnet_cidr) + gateway_offset))
else:
gateway_ip = gateway
try:
subnet_body = dict(network_id=network_id,
cidr=str(subnet_cidr),
ip_version=ip_version,
gateway_ip=gateway_ip,
**kwargs)
if num_subnet <= 1:
return subnet_body
subnet_list.append(subnet_body)
if len(subnet_list) >= num_subnet:
if cidr_offset > 0:
# user request the 'cidr_offset'th of cidr
return subnet_list[cidr_offset]
# user request list of cidr
return subnet_list
except exceptions.BadRequest as e:
is_overlapping_cidr = 'overlaps with another subnet' in str(e)
if not is_overlapping_cidr:
raise
else:
message = 'Available CIDR for subnet creation could not be found'
raise exceptions.BuildErrorException(message)
return {}

View File

@ -1,220 +0,0 @@
# Copyright 2013 Hewlett-Packard Development Company, L.P.
# All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
import abc
import time
import six
from tempest import exceptions
from tempest.lib.common.utils import misc
class AttributeDict(dict):
"""Provide attribute access (dict.key) to dictionary values."""
def __getattr__(self, name):
"""Allow attribute access for all keys in the dict."""
if name in self:
return self[name]
return super(AttributeDict, self).__getattribute__(name)
@six.add_metaclass(abc.ABCMeta)
class DeletableResource(AttributeDict):
"""Support deletion of neutron resources (networks, subnets)
via a delete() method, as is supported by keystone and nova resources.
"""
def __init__(self, *args, **kwargs):
self.client = kwargs.pop('client', None)
self.networks_client = kwargs.pop('networks_client', None)
self.routers_client = kwargs.pop('routers_client', None)
self.subnets_client = kwargs.pop('subnets_client', None)
self.ports_client = kwargs.pop('ports_client', None)
super(DeletableResource, self).__init__(*args, **kwargs)
def __str__(self):
return '<%s id="%s" name="%s">' % (self.__class__.__name__,
self.id, self.name)
@abc.abstractmethod
def delete(self):
return
@abc.abstractmethod
def refresh(self):
return
def __hash__(self):
return hash(self.id)
def wait_for_status(self, status):
if not hasattr(self, 'status'):
return
def helper_get():
self.refresh()
return self
return self.wait_for_resource_status(helper_get, status)
def wait_for_resource_status(self, fetch, status):
"""Waits for a network resource to reach a status
@param fetch: the callable to be used to query the resource status
@type fetch: callable that takes no parameters and returns the resource
@param status: the status that the resource has to reach
@type status: String
"""
interval = self.build_interval
timeout = self.build_timeout
start_time = time.time()
while time.time() - start_time <= timeout:
resource = fetch()
if resource['status'] == status:
return
time.sleep(interval)
# At this point, the wait has timed out
message = 'Resource %s' % (str(resource))
message += ' failed to reach status %s' % status
message += ' (current: %s)' % resource['status']
message += ' within the required time %s' % timeout
caller = misc.find_test_caller()
if caller:
message = '(%s) %s' % (caller, message)
raise exceptions.TimeoutException(message)
class DeletableNetwork(DeletableResource):
def delete(self):
self.networks_client.delete_network(self.id)
class DeletableSubnet(DeletableResource):
def __init__(self, *args, **kwargs):
super(DeletableSubnet, self).__init__(*args, **kwargs)
self._router_ids = set()
def update(self, *args, **kwargs):
result = self.subnets_client.update_subnet(self.id,
*args,
**kwargs)
return super(DeletableSubnet, self).update(**result['subnet'])
def add_to_router(self, router_id):
self._router_ids.add(router_id)
self.routers_client.add_router_interface(router_id,
subnet_id=self.id)
def delete(self):
for router_id in self._router_ids.copy():
self.routers_client.remove_router_interface(router_id,
subnet_id=self.id)
self._router_ids.remove(router_id)
self.subnets_client.delete_subnet(self.id)
class DeletableRouter(DeletableResource):
def set_gateway(self, network_id):
return self.update(external_gateway_info=dict(network_id=network_id))
def unset_gateway(self):
return self.update(external_gateway_info=dict())
def update(self, *args, **kwargs):
result = self.routers_client.update_router(self.id,
*args,
**kwargs)
return super(DeletableRouter, self).update(**result['router'])
def delete(self):
self.unset_gateway()
self.routers_client.delete_router(self.id)
class DeletableFloatingIp(DeletableResource):
def refresh(self, *args, **kwargs):
result = self.client.show_floatingip(self.id,
*args,
**kwargs)
super(DeletableFloatingIp, self).update(**result['floatingip'])
def update(self, *args, **kwargs):
result = self.client.update_floatingip(self.id,
*args,
**kwargs)
super(DeletableFloatingIp, self).update(**result['floatingip'])
def __repr__(self):
return '<%s addr="%s">' % (self.__class__.__name__,
self.floating_ip_address)
def __str__(self):
return '<"FloatingIP" addr="%s" id="%s">' % (self.floating_ip_address,
self.id)
def delete(self):
self.client.delete_floatingip(self.id)
class DeletablePort(DeletableResource):
def delete(self):
self.ports_client.delete_port(self.id)
class DeletableSecurityGroup(DeletableResource):
def delete(self):
self.client.delete_security_group(self.id)
class DeletableSecurityGroupRule(DeletableResource):
def __repr__(self):
return '<%s id="%s">' % (self.__class__.__name__, self.id)
def delete(self):
self.client.delete_security_group_rule(self.id)
class DeletablePool(DeletableResource):
def delete(self):
self.client.delete_pool(self.id)
class DeletableMember(DeletableResource):
def delete(self):
self.client.delete_member(self.id)
class DeletableVip(DeletableResource):
def delete(self):
self.client.delete_vip(self.id)
def refresh(self):
result = self.client.show_vip(self.id)
super(DeletableVip, self).update(**result['vip'])

View File

@ -65,8 +65,8 @@ class TestSimpleFlatNetwork(dmgr.TopoDeployScenarioManager):
def create_subnet(self, net_network, info_flat): def create_subnet(self, net_network, info_flat):
alloc_pool = [{'start': info_flat['start'], alloc_pool = [{'start': info_flat['start'],
'end': info_flat['end']}] 'end': info_flat['end']}]
post_body = {'name': net_network.name, post_body = {'name': net_network['name'],
'network_id': net_network.id, 'network_id': net_network['id'],
'ip_version': 4, 'ip_version': 4,
'gateway_ip': info_flat['gateway'], 'gateway_ip': info_flat['gateway'],
'cidr': info_flat['cidr'], 'cidr': info_flat['cidr'],
@ -94,7 +94,7 @@ class TestSimpleFlatNetwork(dmgr.TopoDeployScenarioManager):
security_groups_client=self.security_groups_client, security_groups_client=self.security_groups_client,
security_group_rules_client=self.security_group_rules_client, security_group_rules_client=self.security_group_rules_client,
namestart='FLAT-tenant') namestart='FLAT-tenant')
security_groups = [{'name': self.security_group['name']}] security_groups = [{'name': self.security_group['id']}]
self.serv1 = self.create_server_on_network( self.serv1 = self.create_server_on_network(
self.net_network, security_groups, self.net_network, security_groups,
image=self.get_server_image(), image=self.get_server_image(),
@ -124,15 +124,6 @@ class TestTenantConnectivity(dmgr.TopoDeployScenarioManager):
def tearDown(self): def tearDown(self):
# do mini teardown if test failed already # do mini teardown if test failed already
try:
self.disassociate_floatingip(self.fip1)
except Exception:
pass
try:
self.router.unset_gateway()
self.router.delete()
except Exception:
pass
super(TestTenantConnectivity, self).tearDown() super(TestTenantConnectivity, self).tearDown()
@test.idempotent_id('3c6cd4fe-de25-47ef-b638-a6bbb312da09') @test.idempotent_id('3c6cd4fe-de25-47ef-b638-a6bbb312da09')
@ -147,9 +138,10 @@ class TestTenantConnectivity(dmgr.TopoDeployScenarioManager):
security_group_rules_client=client_mgr.security_group_rules_client, security_group_rules_client=client_mgr.security_group_rules_client,
namestart='deploy-connect') namestart='deploy-connect')
self.network, self.subnet, self.router = self.setup_project_network( self.network, self.subnet, self.router = self.setup_project_network(
self.public_network_id, namestart='deploy-connect') self.public_network_id, client_mgr=client_mgr,
namestart='deploy-connect')
self.check_networks(self.network, self.subnet, self.router) self.check_networks(self.network, self.subnet, self.router)
security_groups = [{'name': self.security_group['name']}] security_groups = [{'name': self.security_group['id']}]
self.serv1 = self.create_server_on_network( self.serv1 = self.create_server_on_network(
self.network, security_groups, self.network, security_groups,
image=self.get_server_image(), image=self.get_server_image(),
@ -169,7 +161,8 @@ class TestTenantConnectivity(dmgr.TopoDeployScenarioManager):
"VM=%s CAN-NOT-REACH-OUTSIDE-WORLD" % (node1['ipaddr'])) "VM=%s CAN-NOT-REACH-OUTSIDE-WORLD" % (node1['ipaddr']))
LOG.debug('tenant[%s] CAN-REACH-OUTSIDE-WORLD', LOG.debug('tenant[%s] CAN-REACH-OUTSIDE-WORLD',
node1['ipaddr']) node1['ipaddr'])
self.disassociate_floatingip(self.fip1) self.disassociate_floatingip(self.fip1,
client=self.manager.floating_ips_client)
time.sleep(dmgr.WAITTIME_AFTER_DISASSOC_FLOATINGIP) time.sleep(dmgr.WAITTIME_AFTER_DISASSOC_FLOATINGIP)
msg = "after disassociate floatingip[%s] from server#1" % self.fip1 msg = "after disassociate floatingip[%s] from server#1" % self.fip1
self._check_floatingip_connectivity( self._check_floatingip_connectivity(
@ -179,17 +172,19 @@ class TestTenantConnectivity(dmgr.TopoDeployScenarioManager):
image=self.get_server_image(), image=self.get_server_image(),
flavor=self.get_server_flavor(), flavor=self.get_server_flavor(),
name=self.network['name']) name=self.network['name'])
self.associate_floatingip(self.fip1, self.serv2) self.associate_floatingip(self.fip1, self.serv2,
client=self.manager.floating_ips_client)
server_pingable = self._waitfor_associated_floatingip(self.fip1) server_pingable = self._waitfor_associated_floatingip(self.fip1)
self.assertTrue( self.assertTrue(
server_pingable, server_pingable,
msg="Expect server#2 to be reachable after floatingip assigned.") msg="Expect server#2 to be reachable after floatingip assigned.")
self.disassociate_floatingip(self.fip1) self.disassociate_floatingip(self.fip1,
client=self.manager.floating_ips_client,
and_delete=True)
LOG.debug(Z_DEPLOY_DELETE_SERVER, "tenant connectivity") LOG.debug(Z_DEPLOY_DELETE_SERVER, "tenant connectivity")
self.servers_client.delete_server(self.serv1['id']) self.servers_client.delete_server(self.serv1['id'])
self.servers_client.delete_server(self.serv2['id']) self.servers_client.delete_server(self.serv2['id'])
self.router.unset_gateway() # self._router_unset_gateway(self.router['id'])
self.router.delete()
LOG.debug(Z_DEPLOY_COMPLETED, "tenant connectivity") LOG.debug(Z_DEPLOY_COMPLETED, "tenant connectivity")
@ -223,22 +218,18 @@ class TestMultiTenantsNetwork(dmgr.TopoDeployScenarioManager):
if tenant and 'fip1' in tenant: if tenant and 'fip1' in tenant:
servers_client = tenant['client_mgr'].servers_client servers_client = tenant['client_mgr'].servers_client
dmgr.delete_all_servers(servers_client) dmgr.delete_all_servers(servers_client)
self.disassociate_floatingip(tenant['fip1'])
self.disassociate_floatingip(tenant['fip2'])
if from_test:
time.sleep(dmgr.WAITTIME_AFTER_DISASSOC_FLOATINGIP)
fip_client = tenant['client_mgr'].floating_ips_client fip_client = tenant['client_mgr'].floating_ips_client
fip_client.delete_floatingip(tenant['fip1'].id) self.disassociate_floatingip(tenant['fip1'],
fip_client.delete_floatingip(tenant['fip2'].id) client=fip_client,
and_delete=True)
self.disassociate_floatingip(tenant['fip2'],
client=fip_client,
and_delete=True)
tenant.pop('fip1') tenant.pop('fip1')
tenant['router'].delete()
if from_test:
time.sleep(dmgr.WAITTIME_AFTER_ASSOC_FLOATINGIP)
tenant['network'].delete()
def create_project_network_env(self, client_mgr, t_id, def create_project_network_env(self, client_mgr, t_id,
check_outside_world=True, check_outside_world=True,
cidr_offset=0): cidr_offset=1):
username, password = self.get_image_userpass() username, password = self.get_image_userpass()
t_security_group = self._create_security_group( t_security_group = self._create_security_group(
security_groups_client=client_mgr.security_groups_client, security_groups_client=client_mgr.security_groups_client,
@ -352,36 +343,58 @@ class TestProviderRouterTenantNetwork(dmgr.TopoDeployScenarioManager):
super(TestProviderRouterTenantNetwork, self).tearDown() super(TestProviderRouterTenantNetwork, self).tearDown()
def remove_project_network(self, from_test=True): def remove_project_network(self, from_test=True):
router_id = self.p_router['id']
for tn in ['yellow', 'blue']: for tn in ['yellow', 'blue']:
tenant = getattr(self, tn, None) tenant = getattr(self, tn, None)
if tenant and 'fip' in tenant: if tenant and 'fip' in tenant:
servers_client = tenant['client_mgr'].servers_client servers_client = tenant['client_mgr'].servers_client
dmgr.delete_all_servers(servers_client) dmgr.delete_all_servers(servers_client)
self.disassociate_floatingip(tenant['fip'])
if from_test:
time.sleep(dmgr.WAITTIME_AFTER_DISASSOC_FLOATINGIP)
fip_client = tenant['client_mgr'].floating_ips_client fip_client = tenant['client_mgr'].floating_ips_client
fip_client.delete_floatingip(tenant['fip'].id) self.disassociate_floatingip(tenant['fip'],
client=fip_client,
and_delete=True)
tenant.pop('fip') tenant.pop('fip')
tenant['router'].delete_subnet(tenant['subnet']) self.router_interface_delete(
tenant['network'].delete() router_id, tenant['subnet']['id'],
self.p_router.unset_gateway() self.admin_manager.routers_client)
self.p_router.delete() self.admin_manager.networks_client.delete_network(
tenant['network']['id'])
tenant.pop('subnet')
tenant.pop('network')
self._router_clear_gateway(
router_id, client=self.admin_manager.routers_client)
def create_project_network_env(self, to_router, t_id, client_mgr=None, def create_project_network_env(self, t_id, client_mgr=None,
cidr_offset=0, **kwargs): tenant_id=None, cidr_offset=0, **kwargs):
tenant = self.create_tenant_network(t_id, client_mgr, tenant_id,
cidr_offset, **kwargs)
tenant = self.create_server_and_assign_floatingip(tenant)
return tenant
def create_tenant_network(self, t_id, client_mgr=None,
tenant_id=None, cidr_offset=0, **kwargs):
namestart = "deploy-%s-tenant" % t_id namestart = "deploy-%s-tenant" % t_id
name = data_utils.rand_name(namestart) name = data_utils.rand_name(namestart)
client_mgr = client_mgr or self.manager client_mgr = client_mgr or self.manager
servers_client = client_mgr.servers_client security_groups_client = client_mgr.security_groups_client
security_group_rules_client = client_mgr.security_group_rules_client
t_network, t_subnet = self.create_network_subnet( t_network, t_subnet = self.create_network_subnet(
client_mgr, name=name, client_mgr, name=name, tenant_id=tenant_id,
cidr_offset=cidr_offset,) cidr_offset=cidr_offset,)
to_router.add_subnet(t_subnet)
t_security_group = self._create_security_group( t_security_group = self._create_security_group(
security_groups_client=client_mgr.security_groups_client, security_groups_client=security_groups_client,
security_group_rules_client=client_mgr.security_group_rules_client, security_group_rules_client=security_group_rules_client,
namestart=namestart) namestart=namestart, tenant_id=tenant_id)
self._router_add_interface(
self.p_router, t_subnet, self.admin_manager)
return dict(id=t_id, network=t_network, subnet=t_subnet,
client_mgr=client_mgr, security_group=t_security_group)
def create_server_and_assign_floatingip(self, tenant):
t_network = tenant['network']
t_security_group = tenant['security_group']
client_mgr = tenant['client_mgr']
servers_client = client_mgr.servers_client
security_groups = [{'name': t_security_group['name']}] security_groups = [{'name': t_security_group['name']}]
t_serv = self.create_server_on_network( t_serv = self.create_server_on_network(
t_network, security_groups, t_network, security_groups,
@ -391,12 +404,8 @@ class TestProviderRouterTenantNetwork(dmgr.TopoDeployScenarioManager):
servers_client=servers_client) servers_client=servers_client)
t_fip = self.create_floatingip_for_server( t_fip = self.create_floatingip_for_server(
t_serv, client_mgr=client_mgr) t_serv, client_mgr=client_mgr)
tenant.update(serv=t_serv, fip=t_fip)
return dict(network=t_network, subnet=t_subnet, return tenant
router=to_router,
client_mgr=client_mgr,
secuirty_group=t_security_group,
serv=t_serv, fip=t_fip)
@test.idempotent_id('a31712de-33ad-4dc2-9755-1a0631a4f66a') @test.idempotent_id('a31712de-33ad-4dc2-9755-1a0631a4f66a')
@test.services('compute', 'network') @test.services('compute', 'network')
@ -406,11 +415,12 @@ class TestProviderRouterTenantNetwork(dmgr.TopoDeployScenarioManager):
client_mgr=self.admin_manager, namestart="deploy-provider-router", client_mgr=self.admin_manager, namestart="deploy-provider-router",
distributed=self.tenant_router_attrs.get('distributed'), distributed=self.tenant_router_attrs.get('distributed'),
router_type=self.tenant_router_attrs.get('router_type')) router_type=self.tenant_router_attrs.get('router_type'))
self.p_router.set_gateway(self.public_network_id) self._router_set_gateway(self.p_router['id'], self.public_network_id,
client=self.admin_manager.routers_client)
self.yellow = self.create_project_network_env( self.yellow = self.create_project_network_env(
self.p_router, 'yellow', self.manager, 0) 'yellow', self.manager, cidr_offset=1)
self.blue = self.create_project_network_env( self.blue = self.create_project_network_env(
self.p_router, 'blue', self.alt_manager, 2) 'blue', self.alt_manager, cidr_offset=2)
username, password = self.get_image_userpass() username, password = self.get_image_userpass()
yellow = dmgr.make_node_info(self.yellow['fip'], username, password) yellow = dmgr.make_node_info(self.yellow['fip'], username, password)
blue = dmgr.make_node_info(self.blue['fip'], username, password) blue = dmgr.make_node_info(self.blue['fip'], username, password)

View File

@ -16,7 +16,6 @@
import re import re
import sys import sys
import time
from tempest import config from tempest import config
from tempest.lib.common import ssh from tempest.lib.common import ssh
@ -80,16 +79,181 @@ class TestDHCP121BasicOps(dmgr.TopoDeployScenarioManager):
def resource_cleanup(cls): def resource_cleanup(cls):
super(TestDHCP121BasicOps, cls).resource_cleanup() super(TestDHCP121BasicOps, cls).resource_cleanup()
def setUp(self):
super(TestDHCP121BasicOps, self).setUp()
def tearDown(self): def tearDown(self):
try: self.remove_project_network()
self.remove_project_network(False)
except Exception:
pass
super(TestDHCP121BasicOps, self).tearDown() super(TestDHCP121BasicOps, self).tearDown()
def remove_project_network(self):
project_name = 'green'
tenant = getattr(self, project_name, None)
if tenant:
servers_client = tenant['client_mgr'].servers_client
dmgr.delete_all_servers(servers_client)
self.disassociate_floatingip(tenant['fip1'],
and_delete=True)
def check_server_connected(self, serv):
# Fetch tenant-network from where vm deployed
serv_net = list(serv['addresses'].keys())[0]
serv_addr = serv['addresses'][serv_net][0]
host_ip = serv_addr['addr']
self.waitfor_host_connected(host_ip)
def create_project_network_subnet(self,
name_prefix='dhcp-project'):
network_name = data_utils.rand_name(name_prefix)
network, subnet = self.create_network_subnet(
name=network_name)
return (network['id'], network, subnet)
def dhcp_121_metadata_hostroutes_check_on_vm_nsxv(self, vm_env):
self.serv_fip = vm_env['fip1']['floating_ip_address']
username, password = self.get_image_userpass()
# Connect to instance launched using ssh lib
client = ssh.Client(self.serv_fip, username=username,
password=password)
# Executes route over launched instance
cmd = ('route -n')
out_data = client.exec_command(cmd)
self.assertIn(Metadataserver_ip, out_data)
LOG.info(_LI("Metadata routes available on vm"))
cmd = ('wget http://169.254.169.254 -O sample.txt')
client.exec_command(cmd)
cmd = ('cat sample.txt')
out_data = client.exec_command(cmd)
# Check metadata server inforamtion available or not
self.assertIn('latest', out_data)
LOG.info(_LI("metadata server is acessible"))
# Fetch dhcp edge infor from nsx-v
exc_edge = self.vsm.get_dhcp_edge_info()
self.assertIsNotNone(exc_edge)
# Fetch host-route and metadata info from nsx-v
dhcp_options_info = {}
dhcp_options_info = \
exc_edge['staticBindings']['staticBindings'][0]['dhcpOptions']
# Check Host Route information avaialable at beckend
self.assertIn(
Metadataserver_ip,
dhcp_options_info['option121'][
'staticRoutes'][0]['destinationSubnet'])
# Storing sec-group, network, subnet, router, server info in dict
project_dict = dict(security_group=vm_env['security_group'],
network=vm_env['network'], subnet=vm_env['subnet'],
router=vm_env['router'],
client_mgr=vm_env['client_mgr'],
serv1=vm_env['serv1'], fip1=vm_env['fip1'])
return project_dict
def dhcp_121_hostroutes_clear(self, vm_env):
# Fetch next hop information from tempest.conf
next_hop = CONF.network.project_network_cidr
self.nexthop_host_route = next_hop.rsplit('.', 1)[0]
self.nexthop1 = self.nexthop_host_route + ".2"
# Floating-ip of VM
self.serv_fip = vm_env['fip1']['floating_ip_address']
username, password = self.get_image_userpass()
# Update subnet with host routes
_subnet_data = {'host_routes': [{'destination': '10.20.0.0/32',
'nexthop': '10.100.1.1'}],
'new_host_routes': [{'destination': '10.20.0.0/32',
'nexthop': self.nexthop1}]}
new_host_routes = _subnet_data['new_host_routes']
kwargs = {'host_routes': new_host_routes}
new_name = "New_subnet"
subnet_id = vm_env['subnet']['id']
# Update subnet with host-route info
self.subnets_client.update_subnet(
subnet_id, name=new_name, **kwargs)
# Connect to instance launched using ssh lib
client = ssh.Client(self.serv_fip, username=username,
password=password)
# Executes route over instance launched
cmd = ('route -n')
out_data = client.exec_command(cmd)
self.assertIn(
_subnet_data['new_host_routes'][0]['nexthop'], out_data)
self.assertIn(self.nexthop_host_route, out_data)
LOG.info(_LI("Host routes available on vm"))
# Check Host route info at beckend
exc_edge = self.vsm.get_dhcp_edge_info()
self.assertIsNotNone(exc_edge)
# Fetch host-route and metadata info from nsx-v
dhcp_options_info = {}
dhcp_options_info = exc_edge['staticBindings']['staticBindings'][0][
'dhcpOptions']['option121']['staticRoutes']
# Check Host Route information avaialable at beckend
for destination_net in dhcp_options_info:
dest = _subnet_data['new_host_routes'][0]['destination']
dest_subnet = destination_net['destinationSubnet']
dest_router = destination_net['router']
if (dest in dest_subnet and self.nexthop1 in dest_router):
LOG.info(_LI("Host routes available on nsxv"))
# Update subnet with no host-routes
_subnet_data1 = {'new_host_routes': []}
new_host_routes = _subnet_data1['new_host_routes']
kwargs = {'host_routes': new_host_routes}
new_name = "New_subnet"
self.subnets_client.update_subnet(
subnet_id, name=new_name, **kwargs)
# Executes route over instance launched
cmd = ('dhclient eth0')
client.exec_command(cmd)
cmd = ('route -n')
out_data = client.exec_command(cmd)
self.assertIsNotNone(out_data)
# Check Host routes on VM shouldn't be avialable
self.assertNotIn(
_subnet_data['new_host_routes'][0]['destination'], out_data)
# Check Host-routes at beckend after deletion
exc_edge = self.vsm.get_dhcp_edge_info()
self.assertIsNotNone(exc_edge)
dhcp_options_info = []
dhcp_options_info = exc_edge['staticBindings']['staticBindings'][0][
'dhcpOptions']['option121']['staticRoutes']
# Check Host Route information avaialable at beckend
for destination_net in dhcp_options_info:
if (_subnet_data['new_host_routes'][0]['destination']
not in destination_net['destinationSubnet']):
LOG.info(_LI("Host routes not available on nsxv"))
project_dict = dict(security_group=vm_env['security_group'],
network=vm_env['network'], subnet=vm_env['subnet'],
router=vm_env['router'],
client_mgr=vm_env['client_mgr'],
serv1=vm_env['serv1'], fip1=vm_env['fip1'])
return project_dict
def setup_vm_enviornment(self, client_mgr, t_id,
check_outside_world=True,
cidr_offset=0):
t_network, t_subnet, t_router = self.setup_project_network(
self.public_network_id, namestart=("deploy-%s-dhcp" % t_id),
cidr_offset=1)
t_security_group = self._create_security_group(
security_groups_client=self.security_groups_client,
security_group_rules_client=self.security_group_rules_client,
namestart='adm')
username, password = self.get_image_userpass()
security_groups = [{'name': t_security_group['id']}]
t_serv1 = self.create_server_on_network(
t_network, security_groups,
image=self.get_server_image(),
flavor=self.get_server_flavor(),
name=t_network['name'])
self.check_server_connected(t_serv1)
t_floatingip = self.create_floatingip_for_server(
t_serv1, client_mgr=self.admin_manager)
msg = ("Associate t_floatingip[%s] to server[%s]"
% (t_floatingip, t_serv1['name']))
self._check_floatingip_connectivity(
t_floatingip, t_serv1, should_connect=True, msg=msg)
vm_enviornment = dict(security_group=t_security_group,
network=t_network, subnet=t_subnet,
router=t_router, client_mgr=client_mgr,
serv1=t_serv1, fip1=t_floatingip)
return vm_enviornment
class TestDhcpMetadata(TestDHCP121BasicOps):
@test.attr(type='nsxv') @test.attr(type='nsxv')
@test.idempotent_id('95d06aba-895f-47f8-b47d-ae48c6853a85') @test.idempotent_id('95d06aba-895f-47f8-b47d-ae48c6853a85')
def test_dhcp_121_metadata_check_on_vm_nsxv(self): def test_dhcp_121_metadata_check_on_vm_nsxv(self):
@ -98,23 +262,21 @@ class TestDHCP121BasicOps(dmgr.TopoDeployScenarioManager):
self.vm_env = self.setup_vm_enviornment(self.manager, 'green', True) self.vm_env = self.setup_vm_enviornment(self.manager, 'green', True)
self.green = self.dhcp_121_metadata_hostroutes_check_on_vm_nsxv( self.green = self.dhcp_121_metadata_hostroutes_check_on_vm_nsxv(
self.vm_env) self.vm_env)
self.remove_project_network()
self.green['router'].unset_gateway()
self.green['router'].delete()
LOG.info(_LI("Testcase DHCP-121 option metadata check on vm and on \ LOG.info(_LI("Testcase DHCP-121 option metadata check on vm and on \
nsx completed")) nsx completed"))
class TestDhcpHostroutesClear(TestDHCP121BasicOps):
@test.attr(type='nsxv') @test.attr(type='nsxv')
@test.idempotent_id('6bec6eb4-8632-493d-a895-a3ee87cb3002') @test.idempotent_id('6bec6eb4-8632-493d-a895-a3ee87cb3002')
def test_dhcp_121_hostroutes_clear(self): def test_dhcp_121_hostroutes_clear(self):
LOG.info(_LI("Testcase DHCP-121 option host routes clear deploying")) LOG.info(_LI("Testcase DHCP-121 option host routes clear deploying"))
self.vm_env = self.setup_vm_enviornment(self.manager, 'green', True) self.vm_env = self.setup_vm_enviornment(self.manager, 'green', True)
self.green = self.dhcp_121_hostroutes_clear(self.vm_env) self.green = self.dhcp_121_hostroutes_clear(self.vm_env)
self.remove_project_network()
self.green['router'].unset_gateway()
self.green['router'].delete()
LOG.info(_LI("Testcase DHCP-121 option host routes clear completed")) LOG.info(_LI("Testcase DHCP-121 option host routes clear completed"))
class TestDhcpNegative(TestDHCP121BasicOps):
@test.attr(type='nsxv') @test.attr(type='nsxv')
@test.idempotent_id('a58dc6c5-9f28-4184-baf7-37ded52593c4') @test.idempotent_id('a58dc6c5-9f28-4184-baf7-37ded52593c4')
def test_dhcp121_negative_test(self): def test_dhcp121_negative_test(self):
@ -181,6 +343,8 @@ class TestDHCP121BasicOps(dmgr.TopoDeployScenarioManager):
pass pass
LOG.info(_LI("Testcase DHCP-121 option negative test completed")) LOG.info(_LI("Testcase DHCP-121 option negative test completed"))
class TestDhcpMultiHostRoute(TestDHCP121BasicOps):
@test.attr(type='nsxv') @test.attr(type='nsxv')
@test.idempotent_id('c3ca96d7-b704-4d94-b42d-e7bae94b82cd') @test.idempotent_id('c3ca96d7-b704-4d94-b42d-e7bae94b82cd')
def test_dhcp121_multi_host_route(self): def test_dhcp121_multi_host_route(self):
@ -246,176 +410,3 @@ class TestDHCP121BasicOps(dmgr.TopoDeployScenarioManager):
if (len(subnet['subnet']['host_routes']) == 19): if (len(subnet['subnet']['host_routes']) == 19):
LOG.info(_LI("Multiple entries for host routes available")) LOG.info(_LI("Multiple entries for host routes available"))
LOG.info(_LI("Testcase DHCP-121 option multi host routes completed")) LOG.info(_LI("Testcase DHCP-121 option multi host routes completed"))
def remove_project_network(self, from_test=True):
project_name = 'green'
tenant = getattr(self, project_name, None)
servers_client = tenant['client_mgr'].servers_client
dmgr.delete_all_servers(servers_client)
self.disassociate_floatingip(tenant['fip1'])
if from_test:
time.sleep(dmgr.WAITTIME_AFTER_DISASSOC_FLOATINGIP)
fip_client = tenant['client_mgr'].floating_ips_client
fip_client.delete_floatingip(tenant['fip1'].id)
tenant.pop('fip1')
tenant['router'].delete_subnet(tenant['subnet'])
tenant['subnet'].delete()
tenant['network'].delete()
def check_server_connected(self, serv):
# Fetch tenant-network from where vm deployed
serv_net = list(serv['addresses'].keys())[0]
serv_addr = serv['addresses'][serv_net][0]
host_ip = serv_addr['addr']
self.waitfor_host_connected(host_ip)
def create_project_network_subnet(self,
name_prefix='dhcp-project'):
network_name = data_utils.rand_name(name_prefix)
network, subnet = self.create_network_subnet(
name=network_name)
return (network.id, network, subnet)
def dhcp_121_metadata_hostroutes_check_on_vm_nsxv(self, vm_env):
self.serv_fip = vm_env['fip1'].floating_ip_address
username, password = self.get_image_userpass()
# Connect to instance launched using ssh lib
client = ssh.Client(self.serv_fip, username=username,
password=password)
# Executes route over launched instance
cmd = ('route -n')
out_data = client.exec_command(cmd)
self.assertIn(Metadataserver_ip, out_data)
LOG.info(_LI("Metadata routes available on vm"))
cmd = ('wget http://169.254.169.254 -O sample.txt')
client.exec_command(cmd)
cmd = ('cat sample.txt')
out_data = client.exec_command(cmd)
# Check metadata server inforamtion available or not
self.assertIn('latest', out_data)
LOG.info(_LI("metadata server is acessible"))
# Fetch dhcp edge infor from nsx-v
exc_edge = self.vsm.get_dhcp_edge_info()
self.assertIsNotNone(exc_edge)
# Fetch host-route and metadata info from nsx-v
dhcp_options_info = {}
dhcp_options_info = \
exc_edge['staticBindings']['staticBindings'][0]['dhcpOptions']
# Check Host Route information avaialable at beckend
self.assertIn(
Metadataserver_ip,
dhcp_options_info['option121'][
'staticRoutes'][0]['destinationSubnet'])
# Storing sec-group, network, subnet, router, server info in dict
project_dict = dict(security_group=vm_env['security_group'],
network=vm_env['network'], subnet=vm_env['subnet'],
router=vm_env['router'],
client_mgr=vm_env['client_mgr'],
serv1=vm_env['serv1'], fip1=vm_env['fip1'])
return project_dict
def dhcp_121_hostroutes_clear(self, vm_env):
# Fetch next hop information from tempest.conf
next_hop = CONF.network.project_network_cidr
self.nexthop_host_route = next_hop.rsplit('.', 1)[0]
self.nexthop1 = self.nexthop_host_route + ".2"
# Floating-ip of VM
self.serv_fip = vm_env['fip1'].floating_ip_address
username, password = self.get_image_userpass()
# Update subnet with host routes
_subnet_data = {'host_routes': [{'destination': '10.20.0.0/32',
'nexthop': '10.100.1.1'}],
'new_host_routes': [{'destination': '10.20.0.0/32',
'nexthop': self.nexthop1}]}
new_host_routes = _subnet_data['new_host_routes']
kwargs = {'host_routes': new_host_routes}
new_name = "New_subnet"
subnet_id = vm_env['subnet']['id']
# Update subnet with host-route info
self.subnets_client.update_subnet(
subnet_id, name=new_name, **kwargs)
# Connect to instance launched using ssh lib
client = ssh.Client(self.serv_fip, username=username,
password=password)
# Executes route over instance launched
cmd = ('route -n')
out_data = client.exec_command(cmd)
self.assertIn(
_subnet_data['new_host_routes'][0]['nexthop'], out_data)
self.assertIn(self.nexthop_host_route, out_data)
LOG.info(_LI("Host routes available on vm"))
# Check Host route info at beckend
exc_edge = self.vsm.get_dhcp_edge_info()
self.assertIsNotNone(exc_edge)
# Fetch host-route and metadata info from nsx-v
dhcp_options_info = {}
dhcp_options_info = exc_edge['staticBindings']['staticBindings'][0][
'dhcpOptions']['option121']['staticRoutes']
# Check Host Route information avaialable at beckend
for destination_net in dhcp_options_info:
if _subnet_data['new_host_routes'][0]['destination']\
in destination_net['destinationSubnet'] and\
self.nexthop1 in destination_net['router']:
LOG.info(_LI("Host routes available on nsxv"))
# Update subnet with no host-routes
_subnet_data1 = {'new_host_routes': []}
new_host_routes = _subnet_data1['new_host_routes']
kwargs = {'host_routes': new_host_routes}
new_name = "New_subnet"
self.subnets_client.update_subnet(
subnet_id, name=new_name, **kwargs)
# Executes route over instance launched
cmd = ('dhclient eth0')
client.exec_command(cmd)
cmd = ('route -n')
out_data = client.exec_command(cmd)
self.assertIsNotNone(out_data)
# Check Host routes on VM shouldn't be avialable
self.assertNotIn(
_subnet_data['new_host_routes'][0]['destination'], out_data)
# Check Host-routes at beckend after deletion
exc_edge = self.vsm.get_dhcp_edge_info()
self.assertIsNotNone(exc_edge)
dhcp_options_info = []
dhcp_options_info = exc_edge['staticBindings']['staticBindings'][0][
'dhcpOptions']['option121']['staticRoutes']
# Check Host Route information avaialable at beckend
for destination_net in dhcp_options_info:
if (_subnet_data['new_host_routes'][0]['destination']
not in destination_net['destinationSubnet']):
LOG.info(_LI("Host routes not available on nsxv"))
project_dict = dict(security_group=vm_env['security_group'],
network=vm_env['network'], subnet=vm_env['subnet'],
router=vm_env['router'],
client_mgr=vm_env['client_mgr'],
serv1=vm_env['serv1'], fip1=vm_env['fip1'])
return project_dict
def setup_vm_enviornment(self, client_mgr, t_id,
check_outside_world=True,
cidr_offset=0):
t_network, t_subnet, t_router = self.setup_project_network(
self.public_network_id, namestart=("deploy-%s-tenant" % t_id))
t_security_group = self._create_security_group(
security_groups_client=self.security_groups_client,
security_group_rules_client=self.security_group_rules_client,
namestart='adm')
username, password = self.get_image_userpass()
security_groups = [{'name': t_security_group['name']}]
t_serv1 = self.create_server_on_network(
t_network, security_groups,
image=self.get_server_image(),
flavor=self.get_server_flavor(),
name=t_network['name'])
self.check_server_connected(t_serv1)
t_floatingip = self.create_floatingip_for_server(
t_serv1, client_mgr=self.admin_manager)
msg = ("Associate t_floatingip[%s] to server[%s]"
% (t_floatingip, t_serv1['name']))
self._check_floatingip_connectivity(
t_floatingip, t_serv1, should_connect=True, msg=msg)
vm_enviornment = dict(security_group=t_security_group,
network=t_network, subnet=t_subnet,
router=t_router, client_mgr=client_mgr,
serv1=t_serv1, fip1=t_floatingip)
return vm_enviornment

View File

@ -21,6 +21,8 @@ from tempest import test
from vmware_nsx_tempest.tests.nsxv.scenario import ( from vmware_nsx_tempest.tests.nsxv.scenario import (
manager_topo_deployment as dmgr) manager_topo_deployment as dmgr)
from vmware_nsx_tempest.tests.nsxv.scenario import (
network_addon_methods as HELO)
CONF = config.CONF CONF = config.CONF
DNS_SEARCH_DOMAIN = 'dns_search_domain' DNS_SEARCH_DOMAIN = 'dns_search_domain'
@ -71,22 +73,29 @@ class TestDnsSearchDomainBasicOps(dmgr.TopoDeployScenarioManager):
self.assertEqual(dns_search_domain, subnet[DNS_SEARCH_DOMAIN]) self.assertEqual(dns_search_domain, subnet[DNS_SEARCH_DOMAIN])
return (network, subnet, dns_search_domain) return (network, subnet, dns_search_domain)
def create_router_by_type(self, router_type, name=None, **kwargs): def create_router_by_type(self, router_type, client=None,
name=None, **kwargs):
routers_client = client or self.admin_manager.routers_client
create_kwargs = dict(namestart='dns-search', external_gateway_info={ create_kwargs = dict(namestart='dns-search', external_gateway_info={
"network_id": CONF.network.public_network_id}) "network_id": CONF.network.public_network_id})
if router_type in ('shared', 'exclusive'): if router_type in ('shared', 'exclusive'):
create_kwargs['router_type'] = router_type create_kwargs['router_type'] = router_type
elif router_type in ('distributed'): elif router_type in ('distributed'):
create_kwargs['distributed'] = True create_kwargs['distributed'] = True
kwargs.update(create_kwargs) create_kwargs.update(**kwargs)
router = self._create_router(client_mgr=self.admin_manager, router = HELO.router_create(self, client=routers_client,
**kwargs) **create_kwargs)
return router return router
def create_router_and_add_interfaces(self, router_type, net_list): def create_router_and_add_interfaces(self, router_type, net_list,
router = self.create_router_by_type(router_type) client_mgr=None):
client_mgr = client_mgr or self.admin_manager
routers_client = client_mgr.routers_client
router = self.create_router_by_type(router_type,
client=routers_client)
for (network, subnet, dns_search_domain) in net_list: for (network, subnet, dns_search_domain) in net_list:
router.add_subnet(subnet) HELO.router_interface_add(self, router['id'], subnet['id'],
client=routers_client)
return router return router
def setup_tenant_networks(self, router_type): def setup_tenant_networks(self, router_type):
@ -135,7 +144,7 @@ class TestDnsSearchDomainBasicOps(dmgr.TopoDeployScenarioManager):
% (floatingip, server['name'])) % (floatingip, server['name']))
self._check_floatingip_connectivity( self._check_floatingip_connectivity(
floatingip, server, should_connect=True, msg=msg) floatingip, server, should_connect=True, msg=msg)
serv_fip = floatingip.floating_ip_address serv_fip = floatingip['floating_ip_address']
dmgr.rm_sshkey(serv_fip) dmgr.rm_sshkey(serv_fip)
ssh_client = dmgr.get_remote_client_by_password( ssh_client = dmgr.get_remote_client_by_password(
serv_fip, username, password) serv_fip, username, password)

View File

@ -21,12 +21,12 @@ from oslo_log import log as logging
import testtools import testtools
from tempest import config from tempest import config
from tempest import exceptions
from tempest.lib.common.utils import data_utils from tempest.lib.common.utils import data_utils
from tempest.scenario import manager from tempest.scenario import manager
from tempest import test from tempest import test
from vmware_nsx_tempest.tests.nsxv.scenario import net_resources from vmware_nsx_tempest.tests.nsxv.scenario import (
network_addon_methods as HELO)
CONF = config.CONF CONF = config.CONF
FIP_OPS_TIMEOUT = 10 FIP_OPS_TIMEOUT = 10
@ -113,7 +113,7 @@ class TestDvrBasicOps(manager.NetworkScenarioTest):
self.port_id = None self.port_id = None
if boot_with_port: if boot_with_port:
# create a port on the network and boot with that # create a port on the network and boot with that
self.port_id = self._create_port(self.network['id']).id self.port_id = self._create_port(self.network['id'])['id']
name = data_utils.rand_name('server-smoke') name = data_utils.rand_name('server-smoke')
server = self._create_server(name, self.network, self.port_id) server = self._create_server(name, self.network, self.port_id)
@ -139,7 +139,9 @@ class TestDvrBasicOps(manager.NetworkScenarioTest):
if k in ('distributed', 'router_type', 'router_size'): if k in ('distributed', 'router_type', 'router_size'):
router_kwargs[k] = kwargs.pop(k) router_kwargs[k] = kwargs.pop(k)
router = self._create_router(**router_kwargs) router = self._create_router(**router_kwargs)
router.set_gateway(CONF.network.public_network_id) HELO.router_gateway_set(self, router['id'],
CONF.network.public_network_id,
routers_client)
subnet_kwargs = dict(network=network, subnet_kwargs = dict(network=network,
namestart=namestart, namestart=namestart,
@ -148,54 +150,21 @@ class TestDvrBasicOps(manager.NetworkScenarioTest):
if dns_nameservers is not None: if dns_nameservers is not None:
subnet_kwargs['dns_nameservers'] = dns_nameservers subnet_kwargs['dns_nameservers'] = dns_nameservers
subnet = self._create_subnet(**subnet_kwargs) subnet = self._create_subnet(**subnet_kwargs)
subnet.add_to_router(router.id) HELO.router_interface_add(self, router['id'], subnet['id'],
routers_client)
return network, subnet, router return network, subnet, router
# overwrite super class # overwrite super class
def _create_router(self, client=None, tenant_id=None, def _create_router(self, client=None, tenant_id=None,
namestart='dvr-ops', **kwargs): namestart='dvr-ops', **kwargs):
if not client: return HELO.router_create(self, client,
client = self.routers_client tenant_id=tenant_id,
if not tenant_id: namestart=namestart,
tenant_id = client.tenant_id admin_state_up=True,
name = data_utils.rand_name(namestart) **kwargs)
result = client.create_router(name=name,
admin_state_up=True,
tenant_id=tenant_id,
**kwargs)
router = net_resources.DeletableRouter(
routers_client=client, **result['router'])
self.assertEqual(router.name, name)
self.addCleanup(self.delete_wrapper, router.delete)
return router
def check_networks(self): def check_networks(self):
""" HELO.check_networks(self, self.network, self.subnet, self.router)
Checks that we see the newly created network/subnet/router via
checking the result of list_[networks,routers,subnets]
"""
seen_nets = self._list_networks()
seen_names = [n['name'] for n in seen_nets]
seen_ids = [n['id'] for n in seen_nets]
self.assertIn(self.network.name, seen_names)
self.assertIn(self.network.id, seen_ids)
if self.subnet:
seen_subnets = self._list_subnets()
seen_net_ids = [n['network_id'] for n in seen_subnets]
seen_subnet_ids = [n['id'] for n in seen_subnets]
self.assertIn(self.network.id, seen_net_ids)
self.assertIn(self.subnet.id, seen_subnet_ids)
if self.router:
seen_routers = self._list_routers()
seen_router_ids = [n['id'] for n in seen_routers]
seen_router_names = [n['name'] for n in seen_routers]
self.assertIn(self.router.name,
seen_router_names)
self.assertIn(self.router.id,
seen_router_ids)
def _create_server(self, name, network, port_id=None): def _create_server(self, name, network, port_id=None):
keypair = self.create_keypair() keypair = self.create_keypair()
@ -203,7 +172,7 @@ class TestDvrBasicOps(manager.NetworkScenarioTest):
security_groups = [{'name': self.security_group['name']}] security_groups = [{'name': self.security_group['name']}]
create_kwargs = { create_kwargs = {
'networks': [ 'networks': [
{'uuid': network.id}, {'uuid': network['id']},
], ],
'key_name': keypair['name'], 'key_name': keypair['name'],
'security_groups': security_groups, 'security_groups': security_groups,
@ -243,7 +212,7 @@ class TestDvrBasicOps(manager.NetworkScenarioTest):
""" """
ssh_login = CONF.validation.image_ssh_user ssh_login = CONF.validation.image_ssh_user
floating_ip, server = self.floating_ip_tuple floating_ip, server = self.floating_ip_tuple
ip_address = floating_ip.floating_ip_address ip_address = floating_ip['floating_ip_address']
private_key = None private_key = None
floatingip_status = 'DOWN' floatingip_status = 'DOWN'
if should_connect: if should_connect:
@ -282,58 +251,6 @@ class TestDvrBasicOps(manager.NetworkScenarioTest):
network=self.new_net, network=self.new_net,
gateway_ip=None) gateway_ip=None)
def _hotplug_server(self):
old_floating_ip, server = self.floating_ip_tuple
ip_address = old_floating_ip.floating_ip_address
private_key = self._get_server_key(server)
ssh_client = self.get_remote_client(ip_address,
private_key=private_key)
old_nic_list = self._get_server_nics(ssh_client)
# get a port from a list of one item
port_list = self._list_ports(device_id=server['id'])
self.assertEqual(1, len(port_list))
old_port = port_list[0]
interface = self.interface_client.create_interface(
server=server['id'],
network_id=self.new_net.id)
self.addCleanup(self.ports_client.wait_for_resource_deletion,
interface['port_id'])
self.addCleanup(self.delete_wrapper,
self.interface_client.delete_interface,
server['id'], interface['port_id'])
def check_ports():
self.new_port_list = [port for port in
self._list_ports(device_id=server['id'])
if port['id'] != old_port['id']]
return len(self.new_port_list) == 1
if not test.call_until_true(check_ports, CONF.network.build_timeout,
CONF.network.build_interval):
raise exceptions.TimeoutException(
"No new port attached to the server in time (%s sec)! "
"Old port: %s. Number of new ports: %d" % (
CONF.network.build_timeout, old_port,
len(self.new_port_list)))
new_port = net_resources.DeletablePort(client=self.ports_client,
**self.new_port_list[0])
def check_new_nic():
new_nic_list = self._get_server_nics(ssh_client)
self.diff_list = [n for n in new_nic_list if n not in old_nic_list]
return len(self.diff_list) == 1
if not test.call_until_true(check_new_nic, CONF.network.build_timeout,
CONF.network.build_interval):
raise exceptions.TimeoutException("Interface not visible on the "
"guest after %s sec"
% CONF.network.build_timeout)
num, new_nic = self.diff_list[0]
ssh_client.assign_static_ip(nic=new_nic,
addr=new_port.fixed_ips[0]['ip_address'])
ssh_client.turn_nic_on(nic=new_nic)
def _get_server_nics(self, ssh_client): def _get_server_nics(self, ssh_client):
reg = re.compile(r'(?P<num>\d+): (?P<nic_name>\w+):') reg = re.compile(r'(?P<num>\d+): (?P<nic_name>\w+):')
ipatxt = ssh_client.get_ip_list() ipatxt = ssh_client.get_ip_list()
@ -351,7 +268,7 @@ class TestDvrBasicOps(manager.NetworkScenarioTest):
# get all network ports in the new network # get all network ports in the new network
internal_ips = (p['fixed_ips'][0]['ip_address'] for p in internal_ips = (p['fixed_ips'][0]['ip_address'] for p in
self._list_ports(tenant_id=server['tenant_id'], self._list_ports(tenant_id=server['tenant_id'],
network_id=network.id) network_id=network['id'])
if (p['device_owner'].startswith('network') and if (p['device_owner'].startswith('network') and
not p['device_owner'].endswith('dhcp'))) not p['device_owner'].endswith('dhcp')))
@ -383,7 +300,7 @@ class TestDvrBasicOps(manager.NetworkScenarioTest):
def _check_server_connectivity(self, floating_ip, address_list, def _check_server_connectivity(self, floating_ip, address_list,
should_connect=True): should_connect=True):
ip_address = floating_ip.floating_ip_address ip_address = floating_ip['floating_ip_address']
private_key = self._get_server_key(self.floating_ip_tuple.server) private_key = self._get_server_key(self.floating_ip_tuple.server)
# ssh_source = self._ssh_to_server(ip_address, private_key) # ssh_source = self._ssh_to_server(ip_address, private_key)
ssh_source = self.get_remote_client(ip_address, ssh_source = self.get_remote_client(ip_address,
@ -506,7 +423,8 @@ class TestDvrBasicOps(manager.NetworkScenarioTest):
self._create_server(name, self.new_net) self._create_server(name, self.new_net)
self._check_network_internal_connectivity(network=self.new_net, self._check_network_internal_connectivity(network=self.new_net,
should_connect=False) should_connect=False)
self.new_subnet.add_to_router(self.router.id) HELO.router_interface_add(self, self.router['id'],
self.new_subnet['id'])
self._check_network_internal_connectivity(network=self.new_net, self._check_network_internal_connectivity(network=self.new_net,
should_connect=True) should_connect=True)

View File

@ -13,10 +13,10 @@ import tempfile
import time import time
import urllib2 import urllib2
from tempest.lib.common.utils import data_utils
from tempest.common import waiters from tempest.common import waiters
from tempest import config from tempest import config
from tempest.lib.common.utils import data_utils
from tempest.lib.common.utils import test_utils
from tempest import test from tempest import test
from vmware_nsx_tempest.services.lbaas import health_monitors_client from vmware_nsx_tempest.services.lbaas import health_monitors_client
@ -120,10 +120,6 @@ class TestLBaasRoundRobinOps(dmgr.TopoDeployScenarioManager):
waiters.wait_for_server_termination( waiters.wait_for_server_termination(
self.manager.servers_client, server_id) self.manager.servers_client, server_id)
# delete lbaas network before handing back to framework # delete lbaas network before handing back to framework
LOG.debug("tearDown lbaas network")
self.delete_wrapper(self.router.delete)
self.delete_wrapper(self.subnet.delete)
self.delete_wrapper(self.network.delete)
super(TestLBaasRoundRobinOps, self).tearDown() super(TestLBaasRoundRobinOps, self).tearDown()
LOG.debug("tearDown lbaas exiting...") LOG.debug("tearDown lbaas exiting...")
@ -137,21 +133,24 @@ class TestLBaasRoundRobinOps(dmgr.TopoDeployScenarioManager):
pool_id = pool.get('id') pool_id = pool.get('id')
hm = pool.get('healthmonitor') hm = pool.get('healthmonitor')
if hm: if hm:
self.delete_wrapper( test_utils.call_and_ignore_notfound_exc(
self.health_monitors_client.delete_health_monitor, self.health_monitors_client.delete_health_monitor,
pool.get('healthmonitor').get('id')) pool.get('healthmonitor').get('id'))
self.wait_for_load_balancer_status(lb_id) self.wait_for_load_balancer_status(lb_id)
self.delete_wrapper(self.pools_client.delete_pool, test_utils.call_and_ignore_notfound_exc(
pool.get('id')) self.pools_client.delete_pool, pool.get('id'))
self.wait_for_load_balancer_status(lb_id) self.wait_for_load_balancer_status(lb_id)
for member in pool.get('members', []): for member in pool.get('members', []):
self.delete_wrapper(self.members_client.delete_member, test_utils.call_and_ignore_notfound_exc(
pool_id, member.get('id')) self.members_client.delete_member,
pool_id, member.get('id'))
self.wait_for_load_balancer_status(lb_id) self.wait_for_load_balancer_status(lb_id)
self.delete_wrapper(self.listeners_client.delete_listener, test_utils.call_and_ignore_notfound_exc(
listener.get('id')) self.listeners_client.delete_listener,
listener.get('id'))
self.wait_for_load_balancer_status(lb_id) self.wait_for_load_balancer_status(lb_id)
self.delete_wrapper(lb_client.delete_load_balancer, lb_id) test_utils.call_and_ignore_notfound_exc(
lb_client.delete_load_balancer, lb_id)
self.load_balancers_client.wait_for_load_balancers_status( self.load_balancers_client.wait_for_load_balancers_status(
lb_id, is_delete_op=True) lb_id, is_delete_op=True)
lbs = lb_client.list_load_balancers()['loadbalancers'] lbs = lb_client.list_load_balancers()['loadbalancers']
@ -170,13 +169,14 @@ class TestLBaasRoundRobinOps(dmgr.TopoDeployScenarioManager):
security_groups = [{'name': self.security_group['id']}] security_groups = [{'name': self.security_group['id']}]
self.keypair = self.create_keypair() self.keypair = self.create_keypair()
key_name = self.keypair['name'] key_name = self.keypair['name']
network_name = self.network['name']
self.server1 = self.create_server_on_network( self.server1 = self.create_server_on_network(
self.network, name=(self.network.name + "-1"), self.network, name=(network_name + "-1"),
security_groups=security_groups, security_groups=security_groups,
key_name=key_name, wait_on_boot=False, key_name=key_name, wait_on_boot=False,
servers_client=self.manager.servers_client) servers_client=self.manager.servers_client)
self.server2 = self.create_server_on_network( self.server2 = self.create_server_on_network(
self.network, name=(self.network.name + "-2"), self.network, name=(network_name + "-2"),
security_groups=security_groups, security_groups=security_groups,
key_name=key_name, key_name=key_name,
servers_client=self.manager.servers_client) servers_client=self.manager.servers_client)
@ -269,7 +269,7 @@ class TestLBaasRoundRobinOps(dmgr.TopoDeployScenarioManager):
return None return None
def create_project_lbaas(self): def create_project_lbaas(self):
vip_subnet_id = self.subnet.id vip_subnet_id = self.subnet['id']
lb_name = data_utils.rand_name(self.namestart) lb_name = data_utils.rand_name(self.namestart)
self.loadbalancer = self.load_balancers_client.create_load_balancer( self.loadbalancer = self.load_balancers_client.create_load_balancer(
name=lb_name, vip_subnet_id=vip_subnet_id)['loadbalancer'] name=lb_name, vip_subnet_id=vip_subnet_id)['loadbalancer']

View File

@ -16,15 +16,17 @@
import re import re
import six import six
from tempest.lib.common.utils import data_utils
from tempest.common import waiters from tempest.common import waiters
from tempest import config from tempest import config
from tempest.lib.common.utils import data_utils
from tempest.lib.common.utils import test_utils
from tempest import test from tempest import test
from vmware_nsx_tempest.services import nsxv_client from vmware_nsx_tempest.services import nsxv_client
from vmware_nsx_tempest.tests.nsxv.scenario \ from vmware_nsx_tempest.tests.nsxv.scenario import (
import manager_topo_deployment as dmgr manager_topo_deployment as dmgr)
from vmware_nsx_tempest.tests.nsxv.scenario import (
network_addon_methods as HELO)
CONF = config.CONF CONF = config.CONF
@ -69,9 +71,6 @@ class TestMultipleTransportZonesBasicOps(dmgr.TopoDeployScenarioManager):
"provider_network_type", "provider_network_type",
'vxlan') 'vxlan')
cls.MAX_MTZ = getattr(CONF.nsxv, 'max_mtz', 0) or 3 cls.MAX_MTZ = getattr(CONF.nsxv, 'max_mtz', 0) or 3
cls.admin_networks_client = cls.admin_manager.networks_client
cls.admin_subnets_client = cls.admin_manager.subnets_client
cls.admin_routers_client = cls.admin_manager.routers_client
@classmethod @classmethod
def resource_cleanup(cls): def resource_cleanup(cls):
@ -90,91 +89,109 @@ class TestMultipleTransportZonesBasicOps(dmgr.TopoDeployScenarioManager):
pass pass
return scope_id_list return scope_id_list
def create_project_network_subnet(self, def setup(self):
name_prefix='mtz-project'): super(TestMultipleTransportZonesBasicOps, self).setUp()
network_name = data_utils.rand_name(name_prefix) self.tp_svrs = {}
network, subnet = self.create_network_subnet(
name=network_name)
return (network.id, network, subnet)
def create_mtz_network_subnet(self, scope_id, def tearDown(self):
self.delete_all_servers()
super(TestMultipleTransportZonesBasicOps, self).tearDown()
def create_project_network_subnet(self, name_prefix='mtz-project',
client_mgr=None):
client_mgr = client_mgr or self.manager
network_name = data_utils.rand_name(name_prefix)
network, subnet = HELO.create_network_subnet(
self, client_mgr=client_mgr, name=network_name)
return (network['id'], network, subnet)
def create_mtz_network_subnet(self, scope_id, tenant_project_id,
cidr=None, cidr_offset=0): cidr=None, cidr_offset=0):
"""MTZ networks can only be created by ADMIN
All tenant network resources will be created by ADMIN.
"""
networks_client = self.admin_manager.networks_client
subnets_client = self.admin_manager.subnets_client
network_name = data_utils.rand_name('mtz-net') network_name = data_utils.rand_name('mtz-net')
create_body = {'name': network_name, create_body = {'name': network_name,
'provider:network_type': self.provider_network_type, 'provider:network_type': self.provider_network_type,
'provider:physical_network': scope_id} 'provider:physical_network': scope_id}
network = self.create_network( network = HELO.create_network(self, client=networks_client,
client=self.admin_manager.networks_client, tenant_id=tenant_project_id,
**create_body) **create_body)
subnet = self.create_subnet( subnet = HELO.create_subnet(self, network, client=subnets_client,
network, name=network_name,
client=self.admin_manager.subnets_client, tenant_id=tenant_project_id,
name=network_name, cidr=cidr, cidr_offset=cidr_offset)
cidr=cidr, cidr_offset=cidr_offset)
lswitch_list = self.vsm.get_all_logical_switches(scope_id) lswitch_list = self.vsm.get_all_logical_switches(scope_id)
lswitch_list = [x for x in lswitch_list if x['name'] == network.id] lswitch_list = [x for x in lswitch_list if x['name'] == network['id']]
msg = ("network=%s is not configured by specified vdn_scope_id=%s" msg = ("network=%s is not configured by specified vdn_scope_id=%s"
% (network.id, scope_id)) % (network['id'], scope_id))
self.assertTrue(len(lswitch_list) == 1, msg=msg) self.assertTrue(len(lswitch_list) == 1, msg=msg)
return (network.id, network, subnet) return (network['id'], network, subnet)
def create_router_by_type(self, router_type, name=None, **kwargs): def create_router_by_type(self, router_type, client=None,
name=None, **kwargs):
routers_client = client or self.manager.routers_client
create_kwargs = dict(namestart='mtz-', external_gateway_info={ create_kwargs = dict(namestart='mtz-', external_gateway_info={
"network_id": CONF.network.public_network_id}) "network_id": CONF.network.public_network_id})
if router_type in ('shared', 'exclusive'): if router_type in ('shared', 'exclusive'):
create_kwargs['router_type'] = router_type create_kwargs['router_type'] = router_type
elif router_type in ('distributed'): elif router_type in ('distributed'):
create_kwargs['distributed'] = True create_kwargs['distributed'] = True
kwargs.update(create_kwargs) create_kwargs.update(**kwargs)
router = self._create_router(client_mgr=self.admin_manager, router = HELO.router_create(self, client=routers_client,
**kwargs) **create_kwargs)
return router return router
def create_router_and_add_interfaces(self, router_type, nets): def create_router_and_add_interfaces(self, router_type, nets,
router = self.create_router_by_type(router_type) client_mgr=None):
client_mgr = client_mgr or self.admin_manager
routers_client = client_mgr.routers_client
router = self.create_router_by_type(router_type,
client=routers_client)
if router_type == 'exclusive': if router_type == 'exclusive':
router_nsxv_name = '%s-%s' % (router.name, router.id) router_nsxv_name = '%s-%s' % (router['name'], router['id'])
exc_edge = self.vsm.get_edge(router_nsxv_name) exc_edge = self.vsm.get_edge(router_nsxv_name)
self.assertIsNotNone(exc_edge) self.assertIsNotNone(exc_edge)
self.assertEqual(exc_edge['edgeType'], 'gatewayServices') self.assertEqual(exc_edge['edgeType'], 'gatewayServices')
for net_id, (s_id, network, subnet, sg) in six.iteritems(nets): for net_id, (s_id, network, subnet, sg) in six.iteritems(nets):
router.add_subnet(subnet) # import pdb; pdb.set_trace()
HELO.router_interface_add(self, router['id'], subnet['id'],
client=routers_client)
return router return router
def clear_router_gateway_and_interfaces(self, router, nets): def clear_router_gateway_and_interfaces(self, router, nets, client=None):
routers_client = self.admin_routers_client routers_client = client or self.manager.routers_client
routers_client.update_router(router['id'], HELO.router_gateway_clear(self, router['id'],
external_gateway_info=dict()) client=routers_client)
for net_id, (s_id, network, subnet, sg) in six.iteritems(nets): for net_id, (s_id, network, subnet, sg) in six.iteritems(nets):
try: test_utils.call_and_ignore_notfound_exc(
routers_client.remove_router_interface_with_subnet_id( HELO.router_interface_delete,
router['id'], subnet['id']) self, router['id'], subnet['id'], client=routers_client)
except Exception:
pass
def _test_router_with_network_and_mtz_networks(self, router_type): def _test_router_with_network_and_mtz_networks(self, router_type):
"""router attached with multiple TZs and one tenant network.""" """router attached with multiple TZs and one tenant network."""
client_mgr = self.manager
scope_id_list = self.get_all_scope_id_list(with_default_scope=True) scope_id_list = self.get_all_scope_id_list(with_default_scope=True)
nets = {} nets = {}
net_id, network, subnet = self.create_project_network_subnet( net_id, network, subnet = self.create_project_network_subnet(
'mtz-tenant') 'mtz-tenant', client_mgr=client_mgr)
tenant_project_id = client_mgr.networks_client.tenant_id
# create security_group with loginable rules # create security_group with loginable rules
security_group = self._create_security_group( security_group = self._create_security_group(
security_groups_client=self.security_groups_client, security_groups_client=client_mgr.security_groups_client,
security_group_rules_client=self.security_group_rules_client, security_group_rules_client=client_mgr.security_group_rules_client,
namestart='mtz-tenant') namestart='mtz-tenant')
nets[net_id] = [None, network, subnet, security_group] nets[net_id] = [None, network, subnet, security_group]
admin_security_group = self._create_security_group(
security_groups_client=self.admin_manager.security_groups_client,
security_group_rules_client=(
self.admin_manager.security_group_rules_client),
namestart='mtz-admin')
for cidr_step in range(0, self.MAX_MTZ): for cidr_step in range(0, self.MAX_MTZ):
s_id = scope_id_list[cidr_step % len(scope_id_list)] s_id = scope_id_list[cidr_step % len(scope_id_list)]
net_id, network, subnet = self.create_mtz_network_subnet( net_id, network, subnet = self.create_mtz_network_subnet(
s_id, cidr_offset=(cidr_step + 2)) s_id, tenant_project_id, cidr_offset=(cidr_step + 2))
nets[net_id] = [s_id, network, subnet, admin_security_group] nets[net_id] = [s_id, network, subnet, security_group]
router = self.create_router_and_add_interfaces(router_type, nets) router = self.create_router_and_add_interfaces(router_type, nets,
client_mgr=client_mgr)
return router, nets return router, nets
def run_servers_connectivity_test(self, servers): def run_servers_connectivity_test(self, servers):
@ -183,15 +200,15 @@ class TestMultipleTransportZonesBasicOps(dmgr.TopoDeployScenarioManager):
net_id = net_id_list[0] net_id = net_id_list[0]
other_net_id_list = net_id_list[1:] other_net_id_list = net_id_list[1:]
username, password = self.get_image_userpass() username, password = self.get_image_userpass()
nsv = self.servers[net_id] nsv = self.tp_svrs[net_id]
serv = nsv['server'] serv = nsv['server']
floatingip = self.create_floatingip_for_server( floatingip = self.create_floatingip_for_server(
serv, client_mgr=self.admin_manager) serv, client_mgr=self.manager)
msg = ("Associate floatingip[%s] to server[%s]" msg = ("Associate floatingip[%s] to server[%s]"
% (floatingip, serv['name'])) % (floatingip, serv['name']))
self._check_floatingip_connectivity( self._check_floatingip_connectivity(
floatingip, serv, should_connect=True, msg=msg) floatingip, serv, should_connect=True, msg=msg)
serv_fip = floatingip.floating_ip_address serv_fip = floatingip['floating_ip_address']
dmgr.rm_sshkey(serv_fip) dmgr.rm_sshkey(serv_fip)
ssh_client = dmgr.get_remote_client_by_password( ssh_client = dmgr.get_remote_client_by_password(
serv_fip, username, password) serv_fip, username, password)
@ -214,34 +231,51 @@ class TestMultipleTransportZonesBasicOps(dmgr.TopoDeployScenarioManager):
return addr['addr'] return addr['addr']
return None return None
def wait_for_servers_become_active(self, servers): def wait_for_servers_become_active(self, servers, client=None):
servers_client = self.admin_manager.servers_client servers_client = client or self.admin_manager.servers_client
net_id_list = servers.keys() net_id_list = servers.keys()
for net_id in net_id_list: for net_id in net_id_list:
nsv = self.servers[net_id] nsv = self.tp_svrs[net_id]
serv = nsv['server'] serv = nsv['server']
waiters.wait_for_server_status( waiters.wait_for_server_status(
servers_client, serv['id'], 'ACTIVE') servers_client, serv['id'], 'ACTIVE')
# update server context. A server might not have ip address
# if not in running/active state
act_server = servers_client.show_server(serv['id'])
self.tp_svrs[net_id]['server'] = act_server.get('server',
act_server)
def delete_all_servers(self, client=None):
servers_client = client or self.admin_manager.servers_client
for net_id in six.iterkeys(self.tp_svrs):
server = self.tp_svrs[net_id]['server']
test_utils.call_and_ignore_notfound_exc(
servers_client.delete, server['id'])
dmgr.waitfor_servers_terminated(servers_client)
def run_mtz_basic_ops(self, router_type): def run_mtz_basic_ops(self, router_type):
self.servers = {} self.tp_svrs = {}
router, nets = self._test_router_with_network_and_mtz_networks( router, nets = self._test_router_with_network_and_mtz_networks(
router_type) router_type)
servers_client = self.manager.servers_client
for net_id in six.iterkeys(nets): for net_id in six.iterkeys(nets):
s_id, network, subnet, security_group = nets[net_id] s_id, network, subnet, security_group = nets[net_id]
"""
servers_client = (self.manager.servers_client if s_id is None servers_client = (self.manager.servers_client if s_id is None
else self.admin_manager.servers_client) else self.admin_manager.servers_client)
"""
security_groups = [{'name': security_group['id']}] security_groups = [{'name': security_group['id']}]
svr = self.create_server_on_network( svr = self.create_server_on_network(
network, security_groups, network, security_groups,
name=network['name'], name=network['name'],
servers_client=servers_client) servers_client=servers_client,
self.servers[net_id] = dict(server=svr, s_id=s_id, wait_on_boot=False)
self.tp_svrs[net_id] = dict(server=svr, s_id=s_id,
network=network, subnet=subnet, network=network, subnet=subnet,
security_group=security_group, security_group=security_group,
servers_client=servers_client) servers_client=servers_client)
self.wait_for_servers_become_active(self.servers) self.wait_for_servers_become_active(self.tp_svrs)
self.run_servers_connectivity_test(self.servers) self.run_servers_connectivity_test(self.tp_svrs)
class TestMTZBasicOpsOverSharedRouter(TestMultipleTransportZonesBasicOps): class TestMTZBasicOpsOverSharedRouter(TestMultipleTransportZonesBasicOps):

View File

@ -28,7 +28,7 @@ class TestNetworkBasicOps(network_ops.TestNetworkBasicOps):
# NSX-v: dhcp is not reachable # NSX-v: dhcp is not reachable
internal_ips = (p['fixed_ips'][0]['ip_address'] for p in internal_ips = (p['fixed_ips'][0]['ip_address'] for p in
self._list_ports(tenant_id=server['tenant_id'], self._list_ports(tenant_id=server['tenant_id'],
network_id=network.id) network_id=network['id'])
if (p['device_owner'].startswith('network') and if (p['device_owner'].startswith('network') and
not p['device_owner'].endswith('dhcp'))) not p['device_owner'].endswith('dhcp')))

View File

@ -23,11 +23,13 @@ import urllib2
from tempest import config from tempest import config
from tempest import exceptions from tempest import exceptions
from tempest.lib.common.utils import data_utils from tempest.lib.common.utils import data_utils
from tempest.lib.common.utils import test_utils
from tempest.scenario import manager from tempest.scenario import manager
from tempest import test from tempest import test
from vmware_nsx_tempest.services import load_balancer_v1_client as LBV1C from vmware_nsx_tempest.services import load_balancer_v1_client as LBV1C
from vmware_nsx_tempest.tests.nsxv.scenario import net_resources from vmware_nsx_tempest.tests.nsxv.scenario import (
network_addon_methods as HELO)
CONF = config.CONF CONF = config.CONF
@ -119,7 +121,8 @@ class TestLBaaSBasicOps(manager.NetworkScenarioTest):
if k in ('distributed', 'router_type', 'router_size'): if k in ('distributed', 'router_type', 'router_size'):
router_kwargs[k] = kwargs.pop(k) router_kwargs[k] = kwargs.pop(k)
router = self._create_router(**router_kwargs) router = self._create_router(**router_kwargs)
router.set_gateway(CONF.network.public_network_id) HELO.router_gateway_set(self, router['id'],
CONF.network.public_network_id)
network = self._create_network( network = self._create_network(
routers_client=routers_client, routers_client=routers_client,
@ -134,54 +137,21 @@ class TestLBaaSBasicOps(manager.NetworkScenarioTest):
if dns_nameservers is not None: if dns_nameservers is not None:
subnet_kwargs['dns_nameservers'] = dns_nameservers subnet_kwargs['dns_nameservers'] = dns_nameservers
subnet = self._create_subnet(**subnet_kwargs) subnet = self._create_subnet(**subnet_kwargs)
subnet.add_to_router(router.id) HELO.router_interface_add(self, router['id'], subnet['id'],
routers_client)
return network, subnet, router return network, subnet, router
# overwrite super class # overwrite super class
def _create_router(self, client=None, tenant_id=None, def _create_router(self, client=None, tenant_id=None,
namestart='router-lbv1', **kwargs): namestart='router-lbv1', **kwargs):
if not client: return HELO.router_create(self, client,
client = self.routers_client tenant_id=tenant_id,
if not tenant_id: namestart=namestart,
tenant_id = client.tenant_id admin_state_up=True,
name = data_utils.rand_name(namestart) **kwargs)
result = client.create_router(name=name,
admin_state_up=True,
tenant_id=tenant_id,
**kwargs)
router = net_resources.DeletableRouter(
routers_client=client, **result['router'])
self.assertEqual(router.name, name)
self.addCleanup(self.delete_wrapper, router.delete)
return router
def check_networks(self): def check_networks(self):
"""Checks that we see the newly created network/subnet/router. HELO.check_networks(self, self.network, self.subnet, self.router)
checking the result of list_[networks,routers,subnets]
"""
seen_nets = self._list_networks()
seen_names = [n['name'] for n in seen_nets]
seen_ids = [n['id'] for n in seen_nets]
self.assertIn(self.network.name, seen_names)
self.assertIn(self.network.id, seen_ids)
if self.subnet:
seen_subnets = self._list_subnets()
seen_net_ids = [n['network_id'] for n in seen_subnets]
seen_subnet_ids = [n['id'] for n in seen_subnets]
self.assertIn(self.network.id, seen_net_ids)
self.assertIn(self.subnet.id, seen_subnet_ids)
if self.router:
seen_routers = self._list_routers()
seen_router_ids = [n['id'] for n in seen_routers]
seen_router_names = [n['name'] for n in seen_routers]
self.assertIn(self.router.name,
seen_router_names)
self.assertIn(self.router.id,
seen_router_ids)
def _create_security_group_for_test(self): def _create_security_group_for_test(self):
self.security_group = self._create_security_group( self.security_group = self._create_security_group(
@ -222,7 +192,7 @@ class TestLBaaSBasicOps(manager.NetworkScenarioTest):
floating_ip = self.create_floating_ip( floating_ip = self.create_floating_ip(
server, public_network_id) server, public_network_id)
self.floating_ips[floating_ip] = server self.floating_ips[floating_ip] = server
self.server_ips[serv_id] = floating_ip.floating_ip_address self.server_ips[serv_id] = floating_ip['floating_ip_address']
else: else:
self.server_ips[serv_id] = self._server_ip(server, net_name) self.server_ips[serv_id] = self._server_ip(server, net_name)
self.server_fixed_ips[serv_id] = self._server_ip(server, net_name) self.server_fixed_ips[serv_id] = self._server_ip(server, net_name)
@ -320,24 +290,29 @@ class TestLBaaSBasicOps(manager.NetworkScenarioTest):
pool_name, pool_name,
lb_method='ROUND_ROBIN', lb_method='ROUND_ROBIN',
protocol='HTTP', protocol='HTTP',
subnet_id=self.subnet.id)['pool'] subnet_id=self.subnet['id'])
self.pool = net_resources.DeletablePool(client=self.lbv1_client, self.pool = pool.get('pool', pool)
**pool) self.addCleanup(test_utils.call_and_ignore_notfound_exc,
self.lbv1_client.delete_pool,
self.pool['id'])
self.assertTrue(self.pool) self.assertTrue(self.pool)
return self.pool return self.pool
def _create_vip(self, pool_id, **kwargs): def _create_vip(self, pool_id, **kwargs):
result = self.lbv1_client.create_vip(pool_id, **kwargs) result = self.lbv1_client.create_vip(pool_id, **kwargs)
vip = net_resources.DeletableVip(client=self.lbv1_client, vip = result.get('vip', result)
**result['vip']) self.addCleanup(test_utils.call_and_ignore_notfound_exc,
self.lbv1_client.delete_vip,
vip['id'])
return vip return vip
def _create_member(self, protocol_port, pool_id, ip_version=4, **kwargs): def _create_member(self, protocol_port, pool_id, ip_version=4, **kwargs):
result = self.lbv1_client.create_member(protocol_port, pool_id, result = self.lbv1_client.create_member(protocol_port, pool_id,
ip_version, **kwargs) ip_version, **kwargs)
member = net_resources.DeletableMember(client=self.lbv1_client, member = result.get('member', result)
**result['member']) self.addCleanup(test_utils.call_and_ignore_notfound_exc,
return member self.lbv1_client.delete_member,
member['id'])
def _create_members(self): def _create_members(self):
"""Create two members. """Create two members.
@ -346,63 +321,68 @@ class TestLBaaSBasicOps(manager.NetworkScenarioTest):
but with different ports to listen on. but with different ports to listen on.
""" """
pool_id = self.pool['id']
for server_id, ip in six.iteritems(self.server_fixed_ips): for server_id, ip in six.iteritems(self.server_fixed_ips):
if len(self.server_fixed_ips) == 1: if len(self.server_fixed_ips) == 1:
member1 = self._create_member(address=ip, member1 = self._create_member(address=ip,
protocol_port=self.port1, protocol_port=self.port1,
pool_id=self.pool.id) pool_id=pool_id)
member2 = self._create_member(address=ip, member2 = self._create_member(address=ip,
protocol_port=self.port2, protocol_port=self.port2,
pool_id=self.pool.id) pool_id=pool_id)
self.members.extend([member1, member2]) self.members.extend([member1, member2])
else: else:
member = self._create_member(address=ip, member = self._create_member(address=ip,
protocol_port=self.port1, protocol_port=self.port1,
pool_id=self.pool.id) pool_id=pool_id)
self.members.append(member) self.members.append(member)
self.assertTrue(self.members) self.assertTrue(self.members)
def _assign_floating_ip_to_vip(self, vip): def _assign_floating_ip_to_vip(self, vip):
public_network_id = CONF.network.public_network_id public_network_id = CONF.network.public_network_id
port_id = vip.port_id vip_id = vip['id']
port_id = vip['port_id']
floating_ip = self.create_floating_ip(vip, public_network_id, floating_ip = self.create_floating_ip(vip, public_network_id,
port_id=port_id) port_id=port_id)
self.floating_ips.setdefault(vip.id, []) #?# self.floating_ips.setdefault(vip_id, [])
self.floating_ips[vip.id].append(floating_ip) self.floating_ips[vip_id].append(floating_ip)
# Check for floating ip status before you check load-balancer # Check for floating ip status before you check load-balancer
self.check_floating_ip_status(floating_ip, "ACTIVE") self.check_floating_ip_status(floating_ip, "ACTIVE")
def _create_load_balancer(self): def _create_load_balancer(self):
self._create_pool() self._create_pool()
self._create_members() self._create_members()
vip_id = self.vip['id']
self.vip = self._create_vip(protocol='HTTP', self.vip = self._create_vip(protocol='HTTP',
protocol_port=80, protocol_port=80,
subnet_id=self.subnet.id, subnet_id=self.subnet['id'],
pool_id=self.pool.id) pool_id=self.pool['id'])
self.vip_wait_for_status(self.vip, 'ACTIVE') self.vip_wait_for_status(self.vip, 'ACTIVE')
if (CONF.network.public_network_id and not if (CONF.network.public_network_id and not
CONF.network.project_networks_reachable): CONF.network.project_networks_reachable):
self._assign_floating_ip_to_vip(self.vip) self._assign_floating_ip_to_vip(self.vip)
self.vip_ip = self.floating_ips[ self.vip_ip = self.floating_ips[
self.vip.id][0]['floating_ip_address'] vip_id][0]['floating_ip_address']
else: else:
self.vip_ip = self.vip.address self.vip_ip = self.vip['address']
# Currently the ovs-agent is not enforcing security groups on the # Currently the ovs-agent is not enforcing security groups on the
# vip port - see https://bugs.launchpad.net/neutron/+bug/1163569 # vip port - see https://bugs.launchpad.net/neutron/+bug/1163569
# However the linuxbridge-agent does, and it is necessary to add a # However the linuxbridge-agent does, and it is necessary to add a
# security group with a rule that allows tcp port 80 to the vip port. # security group with a rule that allows tcp port 80 to the vip port.
self.ports_client.update_port( self.ports_client.update_port(
self.vip.port_id, security_groups=[self.security_group.id]) self.vip['port_id'],
security_groups=[self.security_group['id']])
def vip_wait_for_status(self, vip, status='ACTIVE'): def vip_wait_for_status(self, vip, status='ACTIVE'):
# vip is DelatableVip # vip is DelatableVip
interval = vip.client.build_interval interval = self.lbv1_client.build_interval
timeout = vip.client.build_timeout timeout = self.lbv1_client.build_timeout
start_time = time.time() start_time = time.time()
vip_id = vip['id']
while time.time() - start_time <= timeout: while time.time() - start_time <= timeout:
resource = vip.client.show_vip(vip.id)['vip'] resource = self.lbv1_client.show_vip(vip_id)['vip']
if resource['status'] == status: if resource['status'] == status:
return return
time.sleep(interval) time.sleep(interval)

View File

@ -17,6 +17,7 @@ import time
from tempest.common import waiters from tempest.common import waiters
from tempest import config from tempest import config
from tempest.lib.common.utils import test_utils
from tempest import test from tempest import test
from vmware_nsx_tempest.tests.nsxv.scenario import ( from vmware_nsx_tempest.tests.nsxv.scenario import (
@ -61,7 +62,7 @@ class TestXnetMultiSubnetsOps(dmgr.TopoDeployScenarioManager):
ATTENTION: ATTENTION:
Because, this test consumes floatingip's so both subnets ip-ranges Because, this test consumes floatingip's so both subnets ip-ranges
will be used. NO OTHER TESTS should run when execute this test. will be used. NO OTHER TESTS should run when executing this test.
Run this test module sequencially : Run this test module sequencially :
@ -181,15 +182,6 @@ class TestXnetMultiSubnetsOps(dmgr.TopoDeployScenarioManager):
namestart='xnet-subnets') namestart='xnet-subnets')
def tearDown(self): def tearDown(self):
if self.my_network:
self.delete_floatingips_and_servers()
if self.my_network['router']:
self.delete_wrapper(self.my_network['router'].delete)
# Delete subnet - distributed router take longer time.
if self.my_network['subnet']:
self.delete_wrapper(self.my_network['subnet'].delete)
if self.my_network['network']:
self.delete_wrapper(self.my_network['network'].delete)
super(TestXnetMultiSubnetsOps, self).tearDown() super(TestXnetMultiSubnetsOps, self).tearDown()
def create_user_servers(self, num_servers=5): def create_user_servers(self, num_servers=5):
@ -220,7 +212,7 @@ class TestXnetMultiSubnetsOps(dmgr.TopoDeployScenarioManager):
for sv in self.my_network['servers']: for sv in self.my_network['servers']:
floatingip, sshc = self.create_floatingip_for_server(sv) floatingip, sshc = self.create_floatingip_for_server(sv)
self.my_network['floatingips'].append(floatingip) self.my_network['floatingips'].append(floatingip)
self.fixed_ip_addresses.append(floatingip.fixed_ip_address) self.fixed_ip_addresses.append(floatingip['fixed_ip_address'])
# check inside this tenant network, all VMs are reachable. # check inside this tenant network, all VMs are reachable.
self.validate_all_servers_private_address_are_reachable( self.validate_all_servers_private_address_are_reachable(
sshc, self.fixed_ip_addresses) sshc, self.fixed_ip_addresses)
@ -241,7 +233,7 @@ class TestXnetMultiSubnetsOps(dmgr.TopoDeployScenarioManager):
% (floatingip, server['name'])) % (floatingip, server['name']))
self._check_floatingip_connectivity( self._check_floatingip_connectivity(
floatingip, server, should_connect=True, msg=msg) floatingip, server, should_connect=True, msg=msg)
serv_fip = floatingip.floating_ip_address serv_fip = floatingip['floating_ip_address']
dmgr.rm_sshkey(serv_fip) dmgr.rm_sshkey(serv_fip)
ssh_client = dmgr.get_remote_client_by_password( ssh_client = dmgr.get_remote_client_by_password(
serv_fip, username, password) serv_fip, username, password)
@ -249,7 +241,9 @@ class TestXnetMultiSubnetsOps(dmgr.TopoDeployScenarioManager):
def delete_floatingips_and_servers(self): def delete_floatingips_and_servers(self):
for net_floatingip in self.my_network['floatingips']: for net_floatingip in self.my_network['floatingips']:
self.delete_wrapper(net_floatingip.delete) test_utils.call_and_ignore_notfound_exc(
self.floating_ips_client.delete_floatingip,
net_floatingip['id'])
fip_list = self.floating_ips_client.list_floatingips()['floatingips'] fip_list = self.floating_ips_client.list_floatingips()['floatingips']
if len(fip_list) > 0: if len(fip_list) > 0:
time.sleep(dmgr.WAITTIME_AFTER_DISASSOC_FLOATINGIP) time.sleep(dmgr.WAITTIME_AFTER_DISASSOC_FLOATINGIP)
@ -264,14 +258,14 @@ class TestXnetMultiSubnetsOps(dmgr.TopoDeployScenarioManager):
reachable = dmgr.is_reachable(ssh_client, ip_addr) reachable = dmgr.is_reachable(ssh_client, ip_addr)
self.assertTrue(reachable, msg) self.assertTrue(reachable, msg)
def _test_xnet_multiple_subnets_basic_ops(self, def _test_xnet_multiple_subnets_basic_ops(self, router_type='exclusive',
router_type='exclusive', namestart='xnet-subnets',
distributed=None): distributed=None):
network, subnet, router = self.setup_project_network( network, subnet, router = self.setup_project_network(
self.public_network_id, self.public_network_id,
client_mgr=self.admin_manager, client_mgr=self.admin_manager,
tenant_id=self.primary_tenant_id, tenant_id=self.primary_tenant_id,
namestart='xnet-subnets', namestart=namestart,
router_type=router_type, distributed=distributed) router_type=router_type, distributed=distributed)
self.my_network = {'router': router, self.my_network = {'router': router,
'subnet': subnet, 'subnet': subnet,
@ -288,7 +282,7 @@ class TestXnetMultiSubnetsOpsOnSharedRouter(TestXnetMultiSubnetsOps):
@test.idempotent_id('e25d030f-7fdf-4500-bd55-4ed6f62c0a5c') @test.idempotent_id('e25d030f-7fdf-4500-bd55-4ed6f62c0a5c')
def test_xnet_multiple_subnets_basic_ops_on_shared_router(self): def test_xnet_multiple_subnets_basic_ops_on_shared_router(self):
return self._test_xnet_multiple_subnets_basic_ops( return self._test_xnet_multiple_subnets_basic_ops(
'shared', False) 'shared', 'xnet-shared', False)
class TestXnetMultiSubnetsOpsOnExclusiveRouter(TestXnetMultiSubnetsOps): class TestXnetMultiSubnetsOpsOnExclusiveRouter(TestXnetMultiSubnetsOps):
@ -296,7 +290,7 @@ class TestXnetMultiSubnetsOpsOnExclusiveRouter(TestXnetMultiSubnetsOps):
@test.idempotent_id('5b09351a-0560-4555-99f0-a1f80d54d435') @test.idempotent_id('5b09351a-0560-4555-99f0-a1f80d54d435')
def test_xnet_multiple_subnets_basic_ops_on_exclusive_router(self): def test_xnet_multiple_subnets_basic_ops_on_exclusive_router(self):
return self._test_xnet_multiple_subnets_basic_ops( return self._test_xnet_multiple_subnets_basic_ops(
'exclusive', False) 'exclusive', 'xnet-exclusive', False)
class TestXnetMultiSubnetsOpsOnDistributedRouter(TestXnetMultiSubnetsOps): class TestXnetMultiSubnetsOpsOnDistributedRouter(TestXnetMultiSubnetsOps):
@ -304,4 +298,4 @@ class TestXnetMultiSubnetsOpsOnDistributedRouter(TestXnetMultiSubnetsOps):
@test.idempotent_id('9652d36b-8816-4212-a6e1-3a8b2580deee') @test.idempotent_id('9652d36b-8816-4212-a6e1-3a8b2580deee')
def test_xnet_multiple_subnets_basic_ops_on_distributed_router(self): def test_xnet_multiple_subnets_basic_ops_on_distributed_router(self):
return self._test_xnet_multiple_subnets_basic_ops( return self._test_xnet_multiple_subnets_basic_ops(
'', True) '', 'xnet-distributed', True)