mirror of
https://github.com/apache/cloudstack.git
synced 2025-10-26 08:42:29 +01:00
Adding tags that identify deployment configurations against test cases
* advanced - Advanced Zone only * basic - basic zone without SecurityGroups * sg - basic zone with security groups * eip - basic zone with EIP/ELB * advancedns - Advanced Zone with NetScalers
This commit is contained in:
parent
cddcc097b9
commit
8d74305707
@ -140,6 +140,8 @@ class TestAccounts(cloudstackTestCase):
|
||||
def test_01_create_account(self):
|
||||
"""Test Create Account and user for that account
|
||||
"""
|
||||
|
||||
tags = ["advanced", "basic", "eip", "advancedns", "sg"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Create an Account. Verify the account is created.
|
||||
@ -273,6 +275,8 @@ class TestRemoveUserFromAccount(cloudstackTestCase):
|
||||
def test_01_user_remove_VM_running(self):
|
||||
"""Test Remove one user from the account
|
||||
"""
|
||||
|
||||
tags = ["advanced", "basic", "eip", "advancedns", "sg"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Create an account with 2 users.
|
||||
@ -372,6 +376,8 @@ class TestRemoveUserFromAccount(cloudstackTestCase):
|
||||
def test_02_remove_all_users(self):
|
||||
"""Test Remove both users from the account
|
||||
"""
|
||||
|
||||
tags = ["advanced", "basic", "eip", "advancedns", "sg"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Remove both the users from the account.
|
||||
@ -528,6 +534,8 @@ class TestNonRootAdminsPrivileges(cloudstackTestCase):
|
||||
|
||||
def test_01_non_root_admin_Privileges(self):
|
||||
"""Test to verify Non Root admin previleges"""
|
||||
|
||||
tags = ["advanced", "basic", "eip", "advancedns", "sg"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Create few accounts/users in ROOT domain
|
||||
@ -645,6 +653,8 @@ class TestServiceOfferingSiblings(cloudstackTestCase):
|
||||
|
||||
def test_01_service_offering_siblings(self):
|
||||
"""Test to verify service offerings at same level in hierarchy"""
|
||||
|
||||
tags = ["advanced", "basic", "eip", "advancedns", "sg"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Verify service offering is visible for domain_1
|
||||
@ -758,6 +768,8 @@ class TestServiceOfferingHierarchy(cloudstackTestCase):
|
||||
|
||||
def test_01_service_offering_hierarchy(self):
|
||||
"""Test to verify service offerings at same level in hierarchy"""
|
||||
|
||||
tags = ["advanced", "basic", "eip", "advancedns", "sg"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Verify service offering is visible for domain_1
|
||||
@ -887,6 +899,8 @@ class TesttemplateHierarchy(cloudstackTestCase):
|
||||
|
||||
def test_01_template_hierarchy(self):
|
||||
"""Test to verify template at same level in hierarchy"""
|
||||
|
||||
tags = ["advanced", "basic", "eip", "advancedns", "sg"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Verify template is visible for domain_1
|
||||
@ -1046,6 +1060,8 @@ class TestAddVmToSubDomain(cloudstackTestCase):
|
||||
def test_01_add_vm_to_subdomain(self):
|
||||
""" Test Sub domain allowed to launch VM when a Domain level zone is
|
||||
created"""
|
||||
|
||||
tags = ["advanced", "basic", "eip", "advancedns", "sg"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Verify VM created by Account_1 is in Running state
|
||||
|
||||
@ -185,6 +185,8 @@ class TestSnapshots(cloudstackTestCase):
|
||||
"""TS_BUG_001-Test Creating snapshot from volume having spaces in name(KVM)
|
||||
"""
|
||||
|
||||
tags = ["advanced", "advancedns"]
|
||||
|
||||
# Validate the following
|
||||
#1. Create a virtual machine and data volume
|
||||
#2. Attach data volume to VM
|
||||
@ -454,6 +456,8 @@ class TestTemplate(cloudstackTestCase):
|
||||
def test_01_create_template(self):
|
||||
"""TS_BUG_002-Test to create and deploy VM using password enabled template
|
||||
"""
|
||||
|
||||
tags = ["advanced", "advancedns", "basic", "sg"]
|
||||
|
||||
# Validate the following:
|
||||
#1. Create a password enabled template
|
||||
@ -596,6 +600,8 @@ class TestNATRules(cloudstackTestCase):
|
||||
|
||||
def test_01_firewall_rules_port_fw(self):
|
||||
""""Checking firewall rules deletion after static NAT disable"""
|
||||
|
||||
tags = ["advanced"]
|
||||
|
||||
# Validate the following:
|
||||
#1. Enable static NAT for a VM
|
||||
@ -796,6 +802,8 @@ class TestRouters(cloudstackTestCase):
|
||||
def test_01_list_routers_admin(self):
|
||||
"""TS_BUG_007-Check listRouters() using Admin User
|
||||
"""
|
||||
|
||||
tags = ["advanced", "advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. PreReq: have rounters that are owned by other account
|
||||
@ -905,6 +913,8 @@ class TestRouterRestart(cloudstackTestCase):
|
||||
def test_01_restart_network_cleanup(self):
|
||||
"""TS_BUG_008-Test restart network
|
||||
"""
|
||||
|
||||
tags = ["advanced", "basic", "sg", "advancedns", "eip"]
|
||||
|
||||
# Validate the following
|
||||
# 1. When cleanup = true, router is destroyed and a new one created
|
||||
@ -1064,6 +1074,8 @@ class TestTemplates(cloudstackTestCase):
|
||||
def test_01_check_template_size(self):
|
||||
"""TS_BUG_009-Test the size of template created from root disk
|
||||
"""
|
||||
|
||||
tags = ["advanced", "advancedns", "basic", "sg", "eip"]
|
||||
|
||||
# Validate the following:
|
||||
# 1. Deploy new VM using the template created from Volume
|
||||
@ -1089,6 +1101,8 @@ class TestTemplates(cloudstackTestCase):
|
||||
def test_02_check_size_snapshotTemplate(self):
|
||||
"""TS_BUG_010-Test check size of snapshot and template
|
||||
"""
|
||||
|
||||
tags = ["advanced", "advancedns", "basic", "sg", "eip"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Deploy VM using default template, small service offering
|
||||
@ -1167,6 +1181,8 @@ class TestTemplates(cloudstackTestCase):
|
||||
def test_03_resuse_template_name(self):
|
||||
"""TS_BUG_011-Test Reusing deleted template name
|
||||
"""
|
||||
|
||||
tags = ["advanced", "advancedns", "basic", "sg", "eip"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Deploy VM using default template, small service offering
|
||||
|
||||
@ -197,6 +197,8 @@ class TestDefaultSecurityGroupEgress(cloudstackTestCase):
|
||||
def test_deployVM_InDefaultSecurityGroup(self):
|
||||
"""Test deploy VM in default security group with no egress rules
|
||||
"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following:
|
||||
# 1. Deploy a VM.
|
||||
@ -352,6 +354,8 @@ class TestAuthorizeIngressRule(cloudstackTestCase):
|
||||
def test_authorizeIngressRule(self):
|
||||
"""Test authorize ingress rule
|
||||
"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following:
|
||||
# 1. createaccount of type user
|
||||
@ -508,6 +512,8 @@ class TestDefaultGroupEgress(cloudstackTestCase):
|
||||
def test_01_default_group_with_egress(self):
|
||||
"""Test default group with egress rule before VM deploy and ping, ssh
|
||||
"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following:
|
||||
# 1. createaccount of type user
|
||||
@ -708,6 +714,8 @@ class TestDefaultGroupEgressAfterDeploy(cloudstackTestCase):
|
||||
""" Test default group with egress rule added after vm deploy and ping,
|
||||
ssh test
|
||||
"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following:
|
||||
# 1. createaccount of type user
|
||||
@ -888,6 +896,8 @@ class TestRevokeEgressRule(cloudstackTestCase):
|
||||
def test_revoke_egress_rule(self):
|
||||
"""Test revoke security group egress rule
|
||||
"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following:
|
||||
# 1. createaccount of type user
|
||||
@ -1148,6 +1158,8 @@ class TestInvalidAccountAuthroize(cloudstackTestCase):
|
||||
def test_invalid_account_authroize(self):
|
||||
"""Test invalid account authroize
|
||||
"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following:
|
||||
# 1. createaccount of type user
|
||||
@ -1274,6 +1286,8 @@ class TestMultipleAccountsEgressRuleNeg(cloudstackTestCase):
|
||||
def test_multiple_account_egress_rule_negative(self):
|
||||
"""Test multiple account egress rules negative case
|
||||
"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following:
|
||||
# 1. createaccount of type user A
|
||||
@ -1520,6 +1534,8 @@ class TestMultipleAccountsEgressRule(cloudstackTestCase):
|
||||
def test_multiple_account_egress_rule_positive(self):
|
||||
"""Test multiple account egress rules positive case
|
||||
"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following:
|
||||
# 1. createaccount of type user A
|
||||
@ -1809,6 +1825,8 @@ class TestStartStopVMWithEgressRule(cloudstackTestCase):
|
||||
def test_start_stop_vm_egress(self):
|
||||
""" Test stop start Vm with egress rules
|
||||
"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following:
|
||||
# 1. createaccount of type user
|
||||
@ -2018,6 +2036,8 @@ class TestInvalidParametersForEgress(cloudstackTestCase):
|
||||
def test_invalid_parameters(self):
|
||||
""" Test invalid parameters for egress rules
|
||||
"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following:
|
||||
# 1. createUserAccount
|
||||
@ -2203,6 +2223,8 @@ class TestEgressAfterHostMaintainance(cloudstackTestCase):
|
||||
def test_egress_after_host_maintainance(self):
|
||||
"""Test maintenance case for egress
|
||||
"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following:
|
||||
# 1. createaccount of type user
|
||||
|
||||
@ -183,6 +183,8 @@ class TestEIP(cloudstackTestCase):
|
||||
def test_01_eip_by_deploying_instance(self):
|
||||
"""Test EIP by deploying an instance
|
||||
"""
|
||||
|
||||
tags = ["eip"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Instance gets an IP from GUEST IP range.
|
||||
@ -348,6 +350,8 @@ class TestEIP(cloudstackTestCase):
|
||||
def test_02_acquire_ip_enable_static_nat(self):
|
||||
"""Test associate new IP and enable static NAT for new IP and the VM
|
||||
"""
|
||||
|
||||
tags = ["eip"]
|
||||
|
||||
# Validate the following
|
||||
# 1. user_ip_address.is_system = 0 & user_ip_address.one_to_one_nat=1
|
||||
@ -490,6 +494,8 @@ class TestEIP(cloudstackTestCase):
|
||||
def test_03_disable_static_nat(self):
|
||||
"""Test disable static NAT and release EIP acquired
|
||||
"""
|
||||
|
||||
tags = ["eip"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Disable static NAT. Disables one-to-one NAT and releases EIP
|
||||
@ -687,6 +693,8 @@ class TestEIP(cloudstackTestCase):
|
||||
def test_04_disable_static_nat_system(self):
|
||||
"""Test disable static NAT with system = True
|
||||
"""
|
||||
|
||||
tags = ["eip"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Try to disassociate/disable static NAT on EIP where is_system=1
|
||||
@ -754,6 +762,8 @@ class TestEIP(cloudstackTestCase):
|
||||
def test_05_destroy_instance(self):
|
||||
"""Test EIO after destroying instance
|
||||
"""
|
||||
|
||||
tags = ["eip"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Destroy instance. Destroy should result in is_system=0 for EIP
|
||||
@ -990,6 +1000,8 @@ class TestELB(cloudstackTestCase):
|
||||
def test_01_elb_create(self):
|
||||
"""Test ELB by creating a LB rule
|
||||
"""
|
||||
|
||||
tags = ["eip"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Deploy 2 instances
|
||||
@ -1161,6 +1173,8 @@ class TestELB(cloudstackTestCase):
|
||||
def test_02_elb_acquire_and_create(self):
|
||||
"""Test ELB by acquiring IP and then creating a LB rule
|
||||
"""
|
||||
|
||||
tags = ["eip"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Deploy 2 instances
|
||||
@ -1307,6 +1321,8 @@ class TestELB(cloudstackTestCase):
|
||||
def test_03_elb_delete_lb_system(self):
|
||||
"""Test delete LB rule generated with public IP with is_system = 1
|
||||
"""
|
||||
|
||||
tags = ["eip"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Deleting LB rule should release EIP where is_system=1
|
||||
@ -1409,6 +1425,8 @@ class TestELB(cloudstackTestCase):
|
||||
def test_04_delete_lb_on_eip(self):
|
||||
"""Test delete LB rule generated on EIP
|
||||
"""
|
||||
|
||||
tags = ["eip"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Deleting LB rule won't release EIP where is_system=0
|
||||
|
||||
@ -175,6 +175,8 @@ class TestHighAvailability(cloudstackTestCase):
|
||||
def test_01_host_maintenance_mode(self):
|
||||
"""Test host maintenance mode
|
||||
"""
|
||||
|
||||
tags = ["advanced", "advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Create Vms. Acquire IP. Create port forwarding & load balancing
|
||||
@ -573,6 +575,8 @@ class TestHighAvailability(cloudstackTestCase):
|
||||
def test_02_host_maintenance_mode_with_activities(self):
|
||||
"""Test host maintenance mode with activities
|
||||
"""
|
||||
|
||||
tags = ["advanced", "advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Create Vms. Acquire IP. Create port forwarding & load balancing
|
||||
|
||||
@ -212,6 +212,8 @@ class TestNOVirtualRouter(cloudstackTestCase):
|
||||
def test_01_network_off_without_conserve_mode(self):
|
||||
"""Test Network offering with Conserve mode off and VR - All services
|
||||
"""
|
||||
|
||||
tags = ["advanced"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Create a Network from the above network offering and deploy a VM.
|
||||
@ -455,6 +457,8 @@ class TestNOVirtualRouter(cloudstackTestCase):
|
||||
def test_02_network_off_with_conserve_mode(self):
|
||||
"""Test Network offering with Conserve mode ON and VR - All services
|
||||
"""
|
||||
|
||||
tags = ["advanced"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Create a Network from the above network offering and deploy a VM.
|
||||
@ -786,6 +790,8 @@ class TestNOWithNetscaler(cloudstackTestCase):
|
||||
def test_01_network_off_without_conserve_mode(self):
|
||||
"""Test Nw off with Conserve mode off, VR-All services, LB-netscaler
|
||||
"""
|
||||
|
||||
tags = ["advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Create a Network from the above network offering and deploy a VM.
|
||||
@ -1054,6 +1060,8 @@ class TestNOWithNetscaler(cloudstackTestCase):
|
||||
def test_02_network_off_with_conserve_mode_netscaler(self):
|
||||
"""Test NW off with Conserve mode ON, LB-Netscaler and VR-All services
|
||||
"""
|
||||
|
||||
tags = ["advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Create a Network from the above network offering and deploy a VM.
|
||||
@ -1428,6 +1436,8 @@ class TestNetworkUpgrade(cloudstackTestCase):
|
||||
def test_01_nwupgrade_netscaler_conserve_on(self):
|
||||
"""Test Nw upgrade to netscaler lb service and conserve mode ON
|
||||
"""
|
||||
|
||||
tags = ["advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Upgrade a network with VR and conserve mode ON TO
|
||||
@ -1625,6 +1635,8 @@ class TestNetworkUpgrade(cloudstackTestCase):
|
||||
def test_02_nwupgrade_netscaler_conserve_off(self):
|
||||
"""Test Nw upgrade to netscaler lb service and conserve mode OFF
|
||||
"""
|
||||
|
||||
tags = ["advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Upgrade a network with VR and conserve mode ON TO
|
||||
|
||||
@ -168,6 +168,8 @@ class TestDefaultSecurityGroup(cloudstackTestCase):
|
||||
def test_01_deployVM_InDefaultSecurityGroup(self):
|
||||
"""Test deploy VM in default security group
|
||||
"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following:
|
||||
# 1. deploy Virtual machine using admin user
|
||||
@ -245,6 +247,8 @@ class TestDefaultSecurityGroup(cloudstackTestCase):
|
||||
def test_02_listSecurityGroups(self):
|
||||
"""Test list security groups for admin account
|
||||
"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following:
|
||||
# 1. listSecurityGroups in admin account
|
||||
@ -278,6 +282,8 @@ class TestDefaultSecurityGroup(cloudstackTestCase):
|
||||
def test_03_accessInDefaultSecurityGroup(self):
|
||||
"""Test access in default security group
|
||||
"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following:
|
||||
# 1. deploy Virtual machine using admin user
|
||||
@ -433,6 +439,8 @@ class TestAuthorizeIngressRule(cloudstackTestCase):
|
||||
def test_01_authorizeIngressRule(self):
|
||||
"""Test authorize ingress rule
|
||||
"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following:
|
||||
#1. Create Security group for the account.
|
||||
@ -567,6 +575,8 @@ class TestRevokeIngressRule(cloudstackTestCase):
|
||||
def test_01_revokeIngressRule(self):
|
||||
"""Test revoke ingress rule
|
||||
"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following:
|
||||
#1. Create Security group for the account.
|
||||
@ -732,6 +742,9 @@ class TestDhcpOnlyRouter(cloudstackTestCase):
|
||||
def test_01_dhcpOnlyRouter(self):
|
||||
"""Test router services for user account
|
||||
"""
|
||||
|
||||
tags = ["sg", "eip", "basic"]
|
||||
|
||||
# Validate the following
|
||||
#1. List routers for any user account
|
||||
#2. The only service supported by this router should be dhcp
|
||||
@ -859,6 +872,8 @@ class TestdeployVMWithUserData(cloudstackTestCase):
|
||||
def test_01_deployVMWithUserData(self):
|
||||
"""Test Deploy VM with User data"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following
|
||||
# 1. CreateAccount of type user
|
||||
# 2. CreateSecurityGroup ssh-incoming
|
||||
@ -1033,6 +1048,8 @@ class TestDeleteSecurityGroup(cloudstackTestCase):
|
||||
def test_01_delete_security_grp_running_vm(self):
|
||||
"""Test delete security group with running VM"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following
|
||||
# 1. createsecuritygroup (ssh-incoming) for this account
|
||||
# 2. authorizeSecurityGroupIngress to allow ssh access to the VM
|
||||
@ -1115,6 +1132,8 @@ class TestDeleteSecurityGroup(cloudstackTestCase):
|
||||
def test_02_delete_security_grp_withoout_running_vm(self):
|
||||
"""Test delete security group without running VM"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following
|
||||
# 1. createsecuritygroup (ssh-incoming) for this account
|
||||
# 2. authorizeSecurityGroupIngress to allow ssh access to the VM
|
||||
@ -1275,6 +1294,8 @@ class TestIngressRule(cloudstackTestCase):
|
||||
def test_01_authorizeIngressRule_AfterDeployVM(self):
|
||||
"""Test delete security group with running VM"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following
|
||||
# 1. createsecuritygroup (ssh-incoming, 22via22) for this account
|
||||
# 2. authorizeSecurityGroupIngress to allow ssh access to the VM
|
||||
@ -1385,6 +1406,8 @@ class TestIngressRule(cloudstackTestCase):
|
||||
def test_02_revokeIngressRule_AfterDeployVM(self):
|
||||
"""Test Revoke ingress rule after deploy VM"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following
|
||||
# 1. createsecuritygroup (ssh-incoming, 22via22) for this account
|
||||
# 2. authorizeSecurityGroupIngress to allow ssh access to the VM
|
||||
@ -1537,6 +1560,8 @@ class TestIngressRule(cloudstackTestCase):
|
||||
def test_03_stopStartVM_verifyIngressAccess(self):
|
||||
"""Test Start/Stop VM and Verify ingress rule"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following
|
||||
# 1. createsecuritygroup (ssh-incoming, 22via22) for this account
|
||||
# 2. authorizeSecurityGroupIngress to allow ssh access to the VM
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user