mirror of
				https://github.com/apache/cloudstack.git
				synced 2025-10-26 08:42:29 +01:00 
			
		
		
		
	
		
			
				
	
	
		
			426 lines
		
	
	
		
			19 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			426 lines
		
	
	
		
			19 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
| # Licensed to the Apache Software Foundation (ASF) under one
 | |
| # or more contributor license agreements.  See the NOTICE file
 | |
| # distributed with this work for additional information
 | |
| # regarding copyright ownership.  The ASF licenses this file
 | |
| # to you under the Apache License, Version 2.0 (the
 | |
| # "License"); you may not use this file except in compliance
 | |
| # with the License.  You may obtain a copy of the License at
 | |
| #
 | |
| #   http://www.apache.org/licenses/LICENSE-2.0
 | |
| #
 | |
| # Unless required by applicable law or agreed to in writing,
 | |
| # software distributed under the License is distributed on an
 | |
| # "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
 | |
| # KIND, either express or implied.  See the License for the
 | |
| # specific language governing permissions and limitations
 | |
| # under the License.
 | |
| 
 | |
| """
 | |
| Tests of user-private gateway
 | |
| """
 | |
| 
 | |
| import logging
 | |
| import time
 | |
| 
 | |
| from nose.plugins.attrib import attr
 | |
| from marvin.cloudstackTestCase import cloudstackTestCase
 | |
| from marvin.lib.utils import cleanup_resources, random_gen
 | |
| 
 | |
| from marvin.lib.base import (Account,
 | |
|                              Domain,
 | |
|                              Project,
 | |
|                              Configurations,
 | |
|                              ServiceOffering,
 | |
|                              Zone,
 | |
|                              Network,
 | |
|                              NetworkOffering,
 | |
|                              VPC,
 | |
|                              VpcOffering,
 | |
|                              PrivateGateway)
 | |
| 
 | |
| from marvin.lib.common import (get_domain,
 | |
|                                get_zone,
 | |
|                                get_template)
 | |
| 
 | |
| NETWORK_STATE_ALLOCATED = "Allocated"
 | |
| NETWORK_STATE_IMPLEMENTED = "Implemented"
 | |
| NETWORK_STATE_SETUP = "Setup"
 | |
| NETWORK_STATE_REMOVED = "Removed"
 | |
| 
 | |
| class TestUserPrivateGateways(cloudstackTestCase):
 | |
|     """
 | |
|     Test user-shared networks
 | |
|     """
 | |
|     @classmethod
 | |
|     def setUpClass(cls):
 | |
|         cls.testClient = super(
 | |
|             TestUserPrivateGateways,
 | |
|             cls).getClsTestClient()
 | |
|         cls.apiclient = cls.testClient.getApiClient()
 | |
|         cls.apiclient = cls.testClient.getApiClient()
 | |
|         cls.services = cls.testClient.getParsedTestDataConfig()
 | |
| 
 | |
|         zone = get_zone(cls.apiclient, cls.testClient.getZoneForTests())
 | |
|         cls.zone = Zone(zone.__dict__)
 | |
|         cls.template = get_template(cls.apiclient, cls.zone.id)
 | |
|         cls._cleanup = []
 | |
| 
 | |
|         cls.logger = logging.getLogger("TestUserPrivateGateways")
 | |
|         cls.stream_handler = logging.StreamHandler()
 | |
|         cls.logger.setLevel(logging.DEBUG)
 | |
|         cls.logger.addHandler(cls.stream_handler)
 | |
| 
 | |
|         cls.domain = get_domain(cls.apiclient)
 | |
| 
 | |
|         # Create small service offering
 | |
|         cls.service_offering = ServiceOffering.create(
 | |
|             cls.apiclient,
 | |
|             cls.services["service_offerings"]["small"]
 | |
|         )
 | |
|         cls._cleanup.append(cls.service_offering)
 | |
| 
 | |
|         # Create network offering for isolated networks
 | |
|         cls.network_offering_isolated = NetworkOffering.create(
 | |
|             cls.apiclient,
 | |
|             cls.services["network_offering"]
 | |
|         )
 | |
|         cls.network_offering_isolated.update(cls.apiclient, state='Enabled')
 | |
|         cls._cleanup.append(cls.network_offering_isolated)
 | |
| 
 | |
|         # Create vpc offering
 | |
|         cls.vpc_offering = VpcOffering.create(
 | |
|             cls.apiclient,
 | |
|             cls.services["vpc_offering_multi_lb"])
 | |
|         cls.vpc_offering.update(cls.apiclient, state='Enabled')
 | |
|         cls._cleanup.append(cls.vpc_offering)
 | |
| 
 | |
|         # Create network offering for vpc tiers
 | |
|         cls.network_offering_vpc = NetworkOffering.create(
 | |
|             cls.apiclient,
 | |
|             cls.services["nw_offering_isolated_vpc"],
 | |
|             conservemode=False
 | |
|         )
 | |
|         cls.network_offering_vpc.update(cls.apiclient, state='Enabled')
 | |
|         cls._cleanup.append(cls.network_offering_vpc)
 | |
| 
 | |
|         # Create sub-domain
 | |
|         cls.sub_domain = Domain.create(
 | |
|             cls.apiclient,
 | |
|             cls.services["acl"]["domain1"]
 | |
|         )
 | |
|         cls._cleanup.append(cls.sub_domain)
 | |
| 
 | |
|         # Create domain admin and normal user
 | |
|         cls.domain_admin = Account.create(
 | |
|             cls.apiclient,
 | |
|             cls.services["acl"]["accountD1A"],
 | |
|             admin=True,
 | |
|             domainid=cls.sub_domain.id
 | |
|         )
 | |
|         cls._cleanup.append(cls.domain_admin)
 | |
| 
 | |
|         cls.normal_user = Account.create(
 | |
|             cls.apiclient,
 | |
|             cls.services["acl"]["accountD1B"],
 | |
|             domainid=cls.sub_domain.id
 | |
|         )
 | |
|         cls._cleanup.append(cls.normal_user)
 | |
| 
 | |
|         # Create project
 | |
|         cls.project = Project.create(
 | |
|           cls.apiclient,
 | |
|           cls.services["project"],
 | |
|           account=cls.domain_admin.name,
 | |
|           domainid=cls.domain_admin.domainid
 | |
|         )
 | |
|         cls._cleanup.append(cls.project)
 | |
| 
 | |
|         # Create api clients for domain admin and normal user
 | |
|         cls.domainadmin_user = cls.domain_admin.user[0]
 | |
|         cls.domainapiclient = cls.testClient.getUserApiClient(
 | |
|             cls.domainadmin_user.username, cls.sub_domain.name
 | |
|         )
 | |
|         cls.normaluser_user = cls.normal_user.user[0]
 | |
|         cls.normaluser_apiclient = cls.testClient.getUserApiClient(
 | |
|             cls.normaluser_user.username, cls.sub_domain.name
 | |
|         )
 | |
| 
 | |
|     @classmethod
 | |
|     def tearDownClass(cls):
 | |
|         super(TestUserPrivateGateways, cls).tearDownClass()
 | |
| 
 | |
|     def setUp(self):
 | |
|         self.cleanup = []
 | |
| 
 | |
|     def tearDown(self):
 | |
|         super(TestUserPrivateGateways, self).tearDown()
 | |
| 
 | |
|     def delete_network(self, network, apiclient, expected=True):
 | |
|         result = True
 | |
|         try:
 | |
|             Network.delete(
 | |
|                 network,
 | |
|                 apiclient,
 | |
|             )
 | |
|         except Exception as ex:
 | |
|             result = False
 | |
|             if expected:
 | |
|                 self.fail(f"Failed to remove Shared network, but expected to succeed : {ex}")
 | |
|         if result and not expected:
 | |
|             self.fail("network is removed successfully, but expected to fail")
 | |
| 
 | |
|     def create_isolated_network_for_account(self, apiclient, domain, account, project, expected=True):
 | |
|         self.services["network"]["name"] = "Test Network Isolated - " + random_gen()
 | |
|         domain_id = None
 | |
|         account_name = None
 | |
|         project_id = None
 | |
|         if domain:
 | |
|             domain_id = domain.id
 | |
|         if account:
 | |
|             account_name = account.name
 | |
|         if project:
 | |
|             project_id = project.id
 | |
|         try:
 | |
|             network = Network.create(
 | |
|                 apiclient,
 | |
|                 self.services["network"],
 | |
|                 domainid=domain_id,
 | |
|                 accountid=account_name,
 | |
|                 projectid=project_id,
 | |
|                 networkofferingid=self.network_offering_isolated.id,
 | |
|                 zoneid=self.zone.id
 | |
|             )
 | |
|         except Exception as ex:
 | |
|             network = None
 | |
|             if expected:
 | |
|                 self.fail(f"Failed to create Isolated network, but expected to succeed : {ex}")
 | |
|         if network and not expected:
 | |
|             self.fail("Isolated network is created successfully, but expected to fail")
 | |
|         return network
 | |
| 
 | |
|     def check_network_state(self, apiclient, network, project, expected_state):
 | |
|         project_id = None
 | |
|         if project:
 | |
|             project_id = project.id
 | |
|         networks = Network.list(
 | |
|             apiclient,
 | |
|             listall=True,
 | |
|             projectid=project_id,
 | |
|             id=network.id
 | |
|         )
 | |
|         if isinstance(networks, list) and len(networks) > 0:
 | |
|             if expected_state == NETWORK_STATE_REMOVED:
 | |
|                 self.fail("Found the network, but expected to fail")
 | |
|             if networks[0].state != expected_state:
 | |
|                 self.fail(f"Expect network state is {expected_state}, but actual state is {networks[0].state}")
 | |
|         elif expected_state != NETWORK_STATE_REMOVED:
 | |
|             self.fail("Failed to find the network, but expected to succeed")
 | |
| 
 | |
|     def create_vpc_for_account(self, apiclient, domain, account, project):
 | |
|         self.services["vpc"]["name"] = "Test VPC - " + random_gen()
 | |
|         self.services["vpc"]["cidr"] = "10.1.0.0/20"
 | |
|         domain_id = None
 | |
|         account_name = None
 | |
|         if domain:
 | |
|             domain_id = domain.id
 | |
|         if account:
 | |
|             account_name = account.name
 | |
|         project_id = None
 | |
|         if project:
 | |
|             project_id = project.id
 | |
|         vpc = VPC.create(
 | |
|             apiclient,
 | |
|             self.services["vpc"],
 | |
|             domainid=domain_id,
 | |
|             accountid=account_name,
 | |
|             projectid=project_id,
 | |
|             vpcofferingid=self.vpc_offering.id,
 | |
|             zoneid=self.zone.id,
 | |
|             start=False
 | |
|         )
 | |
|         return vpc
 | |
| 
 | |
|     def create_vpc_tier_for_account(self, apiclient, vpc, project=None, gateway = '10.1.1.1'):
 | |
|         self.services["network"]["name"] = "Test VPC tier - " + random_gen()
 | |
|         project_id = None
 | |
|         if project:
 | |
|             project_id = project.id
 | |
|         vpc_tier = Network.create(
 | |
|             apiclient,
 | |
|             self.services["network"],
 | |
|             networkofferingid=self.network_offering_vpc.id,
 | |
|             zoneid=self.zone.id,
 | |
|             projectid=project_id,
 | |
|             gateway=gateway,
 | |
|             netmask="255.255.255.0",
 | |
|             vpcid=vpc.id
 | |
|         )
 | |
|         return vpc_tier
 | |
| 
 | |
|     def create_vpc_private_gateway(self, apiclient, vpc, vlan_id, associated_network=None, expected=True):
 | |
|         self.services["private_gateway"]["name"] = "Test Network Isolated - " + random_gen()
 | |
|         associated_network_id = None
 | |
|         if associated_network:
 | |
|             associated_network_id = associated_network.id
 | |
|         private_gateway = None
 | |
|         try:
 | |
|             private_gateway = PrivateGateway.create(
 | |
|                 apiclient,
 | |
|                 vpcid=vpc.id,
 | |
|                 gateway = self.services["private_gateway"]["gateway"],
 | |
|                 ipaddress = self.services["private_gateway"]["ipaddress"],
 | |
|                 netmask = self.services["private_gateway"]["netmask"],
 | |
|                 vlan = vlan_id,
 | |
|                 associatednetworkid = associated_network_id
 | |
|             )
 | |
|         except Exception as ex:
 | |
|             private_gateway = None
 | |
|             if expected:
 | |
|                 self.fail(f"Failed to create private gateway, but expected to succeed : {ex}")
 | |
|         if private_gateway and not expected:
 | |
|             self.fail("private gateway is created successfully, but expected to fail")
 | |
|         return private_gateway
 | |
| 
 | |
|     def delete_vpc_private_gateway(self, apiclient, private_gateway, expected=True):
 | |
|         result = True
 | |
|         try:
 | |
|             private_gateway.delete(apiclient)
 | |
|         except Exception as ex:
 | |
|             result = False
 | |
|             if expected:
 | |
|                 self.fail(f"Failed to remove private gateway, but expected to succeed : {ex}")
 | |
|         if result and not expected:
 | |
|             self.fail("private gateway is removed successfully, but expected to fail")
 | |
| 
 | |
|     def delete_vpc(self, apiclient, vpc, expected=True):
 | |
|         result = True
 | |
|         try:
 | |
|             vpc.delete(apiclient)
 | |
|         except Exception as ex:
 | |
|             result = False
 | |
|             if expected:
 | |
|                 self.fail(f"Failed to remove VPC, but expected to succeed : {ex}")
 | |
|         if result and not expected:
 | |
|             self.fail("VPC is removed successfully, but expected to fail")
 | |
| 
 | |
|     @attr(tags=["advanced"], required_hardware="false")
 | |
|     def test_01_create_private_gateway_with_vlan(self):
 | |
|         """ Create private gateway with vlan """
 | |
| 
 | |
|         # Create VPC
 | |
|         vpc1 = self.create_vpc_for_account(self.apiclient, None, None, None)
 | |
|         vpc2 = self.create_vpc_for_account(self.domainapiclient, None, None, None)
 | |
|         vpc3 = self.create_vpc_for_account(self.normaluser_apiclient, None, None, None)
 | |
|         vpc4 = self.create_vpc_for_account(self.domainapiclient, None, None, self.project)
 | |
| 
 | |
|         # Create VPC private gateway with vlan (can only be done by ROOT admin)
 | |
|         private_gateway1 = self.create_vpc_private_gateway(self.apiclient, vpc1, 10, None, True)
 | |
|         self.create_vpc_private_gateway(self.domainapiclient, vpc2, 11, None, False)
 | |
|         self.create_vpc_private_gateway(self.normaluser_apiclient, vpc3, 12, None, False)
 | |
|         self.create_vpc_private_gateway(self.domainapiclient, vpc4, 13, None, False)
 | |
|         private_gateway2 = self.create_vpc_private_gateway(self.apiclient, vpc2, 11, None, True)
 | |
|         private_gateway3 = self.create_vpc_private_gateway(self.apiclient, vpc3, 12, None, True)
 | |
|         private_gateway4 = self.create_vpc_private_gateway(self.apiclient, vpc4, 13, None, True)
 | |
| 
 | |
|         # Delete VPC private gateway (should succeed by ROOT admin)
 | |
|         self.delete_vpc_private_gateway(self.apiclient, private_gateway1, True)
 | |
|         self.delete_vpc_private_gateway(self.domainapiclient, private_gateway2, False)
 | |
|         self.delete_vpc_private_gateway(self.normaluser_apiclient, private_gateway2, False)
 | |
|         self.delete_vpc_private_gateway(self.domainapiclient, private_gateway4, False)
 | |
|         self.delete_vpc_private_gateway(self.apiclient, private_gateway2, True)
 | |
|         self.delete_vpc_private_gateway(self.apiclient, private_gateway3, True)
 | |
|         self.delete_vpc_private_gateway(self.apiclient, private_gateway4, True)
 | |
| 
 | |
|         # Delete VPC
 | |
|         self.delete_vpc(self.apiclient, vpc1)
 | |
|         self.delete_vpc(self.domainapiclient, vpc2)
 | |
|         self.delete_vpc(self.normaluser_apiclient, vpc3)
 | |
|         self.delete_vpc(self.domainapiclient, vpc4)
 | |
| 
 | |
|     @attr(tags=["advanced"], required_hardware="false")
 | |
|     def test_02_create_private_gateway_with_associated_network(self):
 | |
|         """ Create private gateway with associated network """
 | |
| 
 | |
|         self.services["network"]["networkoffering"] = self.network_offering_isolated.id
 | |
|         self.services["network"]["vlan"] = None
 | |
| 
 | |
|         # Create isolated networks
 | |
|         isolated_network1 = self.create_isolated_network_for_account(self.apiclient, None, None, None)
 | |
|         isolated_network2 = self.create_isolated_network_for_account(self.apiclient, self.sub_domain, self.domain_admin, None)
 | |
|         isolated_network3 = self.create_isolated_network_for_account(self.apiclient, self.sub_domain, self.normal_user, None)
 | |
|         isolated_network4 = self.create_isolated_network_for_account(self.apiclient, self.sub_domain, None, self.project)
 | |
| 
 | |
|         # Check state of isolated networks (should be Allocated)
 | |
|         self.check_network_state(self.apiclient, isolated_network1, None, NETWORK_STATE_ALLOCATED)
 | |
|         self.check_network_state(self.domainapiclient, isolated_network2, None, NETWORK_STATE_ALLOCATED)
 | |
|         self.check_network_state(self.normaluser_apiclient, isolated_network3, None, NETWORK_STATE_ALLOCATED)
 | |
|         self.check_network_state(self.domainapiclient, isolated_network4, self.project, NETWORK_STATE_ALLOCATED)
 | |
| 
 | |
|         # Create VPC
 | |
|         vpc1 = self.create_vpc_for_account(self.apiclient, None, None, None)
 | |
|         vpc2 = self.create_vpc_for_account(self.domainapiclient, None, None, None)
 | |
|         vpc3 = self.create_vpc_for_account(self.normaluser_apiclient, None, None, None)
 | |
|         vpc4 = self.create_vpc_for_account(self.domainapiclient, None, None, self.project)
 | |
| 
 | |
|         # Create VPC tier
 | |
|         vpc1_tier1 = self.create_vpc_tier_for_account(self.apiclient, vpc1)
 | |
|         vpc2_tier1 = self.create_vpc_tier_for_account(self.domainapiclient, vpc2)
 | |
|         vpc3_tier1 = self.create_vpc_tier_for_account(self.normaluser_apiclient, vpc3)
 | |
|         vpc4_tier1 = self.create_vpc_tier_for_account(self.domainapiclient, vpc4, self.project)
 | |
| 
 | |
|         # Create VPC private gateway with associated network (can be done by ROOT admin / domain admin / normal user)
 | |
|         private_gateway1 = self.create_vpc_private_gateway(self.apiclient, vpc1, None, isolated_network1, True)
 | |
|         private_gateway2 = self.create_vpc_private_gateway(self.domainapiclient, vpc2, None, isolated_network2, True)
 | |
|         private_gateway3 = self.create_vpc_private_gateway(self.normaluser_apiclient, vpc3, None, isolated_network3, True)
 | |
|         private_gateway4 = self.create_vpc_private_gateway(self.domainapiclient, vpc4, None, isolated_network4, True)
 | |
| 
 | |
|         # Check state of isolated networks (should be Implemented)
 | |
|         self.check_network_state(self.apiclient, isolated_network1, None, NETWORK_STATE_IMPLEMENTED)
 | |
|         self.check_network_state(self.domainapiclient, isolated_network2, None, NETWORK_STATE_IMPLEMENTED)
 | |
|         self.check_network_state(self.normaluser_apiclient, isolated_network3, None, NETWORK_STATE_IMPLEMENTED)
 | |
|         self.check_network_state(self.domainapiclient, isolated_network4, self.project, NETWORK_STATE_IMPLEMENTED)
 | |
| 
 | |
|         # Delete VPC private gateway of domain admin (should succeed)
 | |
|         self.delete_vpc_private_gateway(self.domainapiclient, private_gateway2, True)
 | |
| 
 | |
|         # Wait for network GC to shut down the isolated networks
 | |
|         gc_wait = Configurations.list(self.apiclient, name="network.gc.wait")
 | |
|         gc_interval = Configurations.list(self.apiclient, name="network.gc.interval")
 | |
|         total_sleep = 360
 | |
|         if gc_wait and gc_interval:
 | |
|             self.logger.debug("network.gc.wait is ==> %s", gc_wait[0].value)
 | |
|             self.logger.debug("network.gc.interval is ==> %s", gc_interval[0].value)
 | |
|             total_sleep = max(int(gc_wait[0].value), int(gc_interval[0].value)) * 2 + 60
 | |
|         else:
 | |
|             self.logger.debug("Could not retrieve the keys 'network.gc.interval' and 'network.gc.wait'. Sleeping for 6 minutes.")
 | |
|         time.sleep(total_sleep)
 | |
| 
 | |
|         # Check state of isolated networks (1 should be Allocated, 2 should still be Implemented)
 | |
|         self.check_network_state(self.apiclient, isolated_network1, None, NETWORK_STATE_IMPLEMENTED)
 | |
|         self.check_network_state(self.domainapiclient, isolated_network2, None, NETWORK_STATE_ALLOCATED)
 | |
|         self.check_network_state(self.normaluser_apiclient, isolated_network3, None, NETWORK_STATE_IMPLEMENTED)
 | |
|         self.check_network_state(self.domainapiclient, isolated_network4, self.project, NETWORK_STATE_IMPLEMENTED)
 | |
| 
 | |
|         # Delete 2 VPC private gateway (should succeed)
 | |
|         self.delete_vpc_private_gateway(self.apiclient, private_gateway1, True)
 | |
|         self.delete_vpc_private_gateway(self.apiclient, private_gateway3, True)
 | |
|         self.delete_vpc_private_gateway(self.apiclient, private_gateway4, True)
 | |
| 
 | |
|         # Delete VPC tiers (should succeed)
 | |
|         self.delete_network(vpc1_tier1, self.apiclient, True)
 | |
|         self.delete_network(vpc2_tier1, self.domainapiclient, True)
 | |
|         self.delete_network(vpc3_tier1, self.normaluser_apiclient, True)
 | |
|         self.delete_network(vpc4_tier1, self.domainapiclient, True)
 | |
| 
 | |
|         # Delete VPC
 | |
|         self.delete_vpc(self.apiclient, vpc1)
 | |
|         self.delete_vpc(self.domainapiclient, vpc2)
 | |
|         self.delete_vpc(self.normaluser_apiclient, vpc3)
 | |
|         self.delete_vpc(self.domainapiclient, vpc4)
 | |
| 
 | |
|         # Delete isolated networks (should succeed)
 | |
|         self.delete_network(isolated_network1, self.apiclient, True)
 | |
|         self.delete_network(isolated_network2, self.domainapiclient, True)
 | |
|         self.delete_network(isolated_network3, self.normaluser_apiclient, True)
 | |
|         self.delete_network(isolated_network4, self.domainapiclient, True)
 |