
* switch from neutron.tests.tempest to neutron_tempest_plugin * Cleaned up README.rst and setup.cfg * Use neutron_tempest_plugin as a tempest plugin package * Fixed gitreview * Keeping flake8 Ignores in tox.ini as tempest plugin is imported from neutron codebase. Change-Id: I42d389836e72813fdeebc797a577f4a8ac2ee603
176 lines
7.4 KiB
Python
176 lines
7.4 KiB
Python
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
from tempest.lib.common.utils import data_utils
|
|
from tempest.lib import decorators
|
|
from tempest.lib import exceptions as lib_exc
|
|
from tempest import test
|
|
|
|
from neutron_tempest_plugin.api.admin import test_quotas
|
|
from neutron_tempest_plugin import config
|
|
|
|
CONF = config.CONF
|
|
|
|
|
|
class QuotasAdminNegativeTestJSON(test_quotas.QuotasTestBase):
|
|
|
|
@decorators.attr(type='negative')
|
|
@decorators.idempotent_id('952f9b24-9156-4bdc-90f3-682a3d4302f0')
|
|
def test_create_network_when_quotas_is_full(self):
|
|
tenant_id = self._create_tenant()['id']
|
|
new_quotas = {'network': 1}
|
|
self._setup_quotas(tenant_id, **new_quotas)
|
|
|
|
net_args = {'tenant_id': tenant_id}
|
|
net = self.admin_client.create_network(**net_args)['network']
|
|
self.addCleanup(self.admin_client.delete_network, net['id'])
|
|
|
|
self.assertRaises(lib_exc.Conflict,
|
|
self.admin_client.create_network, **net_args)
|
|
|
|
@decorators.attr(type='negative')
|
|
@decorators.idempotent_id('0b7f99e3-9f77-45ce-9a89-b39a184de618')
|
|
def test_create_subnet_when_quotas_is_full(self):
|
|
tenant_id = self._create_tenant()['id']
|
|
new_quotas = {'subnet': 1}
|
|
self._setup_quotas(tenant_id, **new_quotas)
|
|
|
|
net_args = {'tenant_id': tenant_id}
|
|
net = self.admin_client.create_network(**net_args)['network']
|
|
self.addCleanup(self.admin_client.delete_network, net['id'])
|
|
|
|
subnet_args = {'tenant_id': tenant_id,
|
|
'network_id': net['id'],
|
|
'cidr': '10.0.0.0/24',
|
|
'ip_version': '4'}
|
|
subnet = self.admin_client.create_subnet(**subnet_args)['subnet']
|
|
self.addCleanup(self.admin_client.delete_subnet, subnet['id'])
|
|
|
|
subnet_args['cidr'] = '10.1.0.0/24'
|
|
self.assertRaises(lib_exc.Conflict,
|
|
self.admin_client.create_subnet, **subnet_args)
|
|
|
|
@decorators.attr(type='negative')
|
|
@decorators.idempotent_id('fe20d9f9-346c-4a20-bbfa-d9ca390f4dc6')
|
|
def test_create_port_when_quotas_is_full(self):
|
|
tenant_id = self._create_tenant()['id']
|
|
new_quotas = {'port': 1}
|
|
self._setup_quotas(tenant_id, **new_quotas)
|
|
|
|
net_args = {'tenant_id': tenant_id}
|
|
net = self.admin_client.create_network(**net_args)['network']
|
|
self.addCleanup(self.admin_client.delete_network, net['id'])
|
|
|
|
subnet_args = {'tenant_id': tenant_id,
|
|
'network_id': net['id'],
|
|
'enable_dhcp': False,
|
|
'cidr': '10.0.0.0/24',
|
|
'ip_version': '4'}
|
|
subnet = self.admin_client.create_subnet(**subnet_args)['subnet']
|
|
self.addCleanup(self.admin_client.delete_subnet, subnet['id'])
|
|
|
|
port_args = {'tenant_id': tenant_id,
|
|
'network_id': net['id']}
|
|
port = self.admin_client.create_port(**port_args)['port']
|
|
self.addCleanup(self.admin_client.delete_port, port['id'])
|
|
|
|
self.assertRaises(lib_exc.Conflict,
|
|
self.admin_client.create_port, **port_args)
|
|
|
|
@decorators.attr(type='negative')
|
|
@decorators.idempotent_id('bb1e9c3c-7e6f-41f1-b579-63dbc655ecb7')
|
|
@test.requires_ext(extension="router", service="network")
|
|
def test_create_router_when_quotas_is_full(self):
|
|
tenant_id = self._create_tenant()['id']
|
|
new_quotas = {'router': 1}
|
|
self._setup_quotas(tenant_id, **new_quotas)
|
|
|
|
name = data_utils.rand_name('test_router_')
|
|
router_args = {'tenant_id': tenant_id}
|
|
router = self.admin_client.create_router(
|
|
name, True, **router_args)['router']
|
|
self.addCleanup(self.admin_client.delete_router, router['id'])
|
|
|
|
self.assertRaises(lib_exc.Conflict,
|
|
self.admin_client.create_router,
|
|
name, True, **router_args)
|
|
|
|
@decorators.attr(type='negative')
|
|
@decorators.idempotent_id('5c924ff7-b7a9-474f-92a3-dbe0f976ec13')
|
|
@test.requires_ext(extension="security-group", service="network")
|
|
def test_create_security_group_when_quotas_is_full(self):
|
|
tenant_id = self._create_tenant()['id']
|
|
sg_args = {'tenant_id': tenant_id}
|
|
# avoid a number that is made by default
|
|
sg_list = self.admin_client.list_security_groups(
|
|
tenant_id=tenant_id)['security_groups']
|
|
num = len(sg_list) + 1
|
|
|
|
new_quotas = {'security_group': num}
|
|
self._setup_quotas(tenant_id, **new_quotas)
|
|
|
|
sg = self.admin_client.create_security_group(
|
|
**sg_args)['security_group']
|
|
self.addCleanup(self.admin_client.delete_security_group, sg['id'])
|
|
|
|
self.assertRaises(lib_exc.Conflict,
|
|
self.admin_client.create_security_group, **sg_args)
|
|
|
|
@decorators.attr(type='negative')
|
|
@decorators.idempotent_id('b7143480-6118-4ed4-be38-1b6f15f30d05')
|
|
@test.requires_ext(extension="security-group", service="network")
|
|
def test_create_security_group_rule_when_quotas_is_full(self):
|
|
tenant_id = self._create_tenant()['id']
|
|
sg_args = {'tenant_id': tenant_id}
|
|
|
|
sg = self.admin_client.create_security_group(
|
|
**sg_args)['security_group']
|
|
self.addCleanup(self.admin_client.delete_security_group, sg['id'])
|
|
|
|
# avoid a number that is made by default
|
|
sg_rule_list = self.admin_client.list_security_group_rules(
|
|
tenant_id=tenant_id)['security_group_rules']
|
|
num = len(sg_rule_list) + 1
|
|
|
|
new_quotas = {'security_group_rule': num}
|
|
self._setup_quotas(tenant_id, **new_quotas)
|
|
|
|
sg_rule_args = {'tenant_id': tenant_id,
|
|
'security_group_id': sg['id'],
|
|
'direction': 'ingress'}
|
|
sg_rule = self.admin_client.create_security_group_rule(
|
|
**sg_rule_args)['security_group_rule']
|
|
self.addCleanup(
|
|
self.admin_client.delete_security_group_rule, sg_rule['id'])
|
|
|
|
sg_rule_args['direction'] = 'egress'
|
|
self.assertRaises(lib_exc.Conflict,
|
|
self.admin_client.create_security_group_rule,
|
|
**sg_rule_args)
|
|
|
|
@decorators.attr(type='negative')
|
|
@decorators.idempotent_id('d00fe5bb-9db8-4e1a-9c31-490f52897e6f')
|
|
@test.requires_ext(extension="router", service="network")
|
|
def test_create_floatingip_when_quotas_is_full(self):
|
|
tenant_id = self._create_tenant()['id']
|
|
new_quotas = {'floatingip': 1}
|
|
self._setup_quotas(tenant_id, **new_quotas)
|
|
|
|
ext_net_id = CONF.network.public_network_id
|
|
fip_args = {'tenant_id': tenant_id,
|
|
'floating_network_id': ext_net_id}
|
|
fip = self.admin_client.create_floatingip(**fip_args)['floatingip']
|
|
self.addCleanup(self.admin_client.delete_floatingip, fip['id'])
|
|
|
|
self.assertRaises(lib_exc.Conflict,
|
|
self.admin_client.create_floatingip, **fip_args)
|