mirror of
				https://github.com/apache/cloudstack.git
				synced 2025-10-26 08:42:29 +01:00 
			
		
		
		
	* cleanup plan * more robust cleanup within member method * ss_domain_limits fixed * egress 'icmp' instead of 'all' and cleanup * configdrive syntax, fixed to be up to par with py2 * cleanup fixed the lb secondary ip tests? * deal with different base64 encoding in py3 for userdata * cleanup of multiple_ips_per_nic * cleanup and reformat of test_volumes * cleanup and fixes for test_ps_domain_limits.py * cleanup and fix of test_ps_limits.py * fix occasional match of float against int * cleanup and fix test_ps_resize_volume.py * cleanup and fix test_snapshots * cleanup ss_max_limits and fix for float vs int problem in API * mere cleanup of test_volume_destroy_recover * add missing command creation * cleanup of test_vpc_on_host_maintenance * cleanup test_vpc_network * cleanup, comments and logging in test_vpc_network_lbrules * cleanup of test_vpc_network_pfrules * cleanup and format code for test_vpc_network_staticnatrule * f string instead of conversion specifiers * check http and ssh fix and cleanup (for vpc pfrules tests) * generalise create network method * make ip optional in creating webserver * remove unused code and add rules to enable ssh * more cleanup * remove unused code and cleanup * small cleanup, mostly precarous run environment required * cleanup and removed unused code * advancedsg only, cleanup, pulled in services * reformat/cleanup * log result of error after verify rule * add nw_off_no_services * tags=["TODO"] for escalations_networks * tags=["TODO"] for organization_states * tags=["TODO"] for browse_templates * tags=["TODO"] for configdrive * tags=["TODO"] for vpc_vms_deployment * add remove network cleanup and fixes * move tests that fail on all platforms out of the way Co-authored-by: Daan Hoogland <dahn@onecht.net>
		
			
				
	
	
		
			1207 lines
		
	
	
		
			43 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			1207 lines
		
	
	
		
			43 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
| # Licensed to the Apache Software Foundation (ASF) under one
 | |
| # or more contributor license agreements.  See the NOTICE file
 | |
| # distributed with this work for additional information
 | |
| # regarding copyright ownership.  The ASF licenses this file
 | |
| # to you under the Apache License, Version 2.0 (the
 | |
| # "License"); you may not use this file except in compliance
 | |
| # with the License.  You may obtain a copy of the License at
 | |
| #
 | |
| #   http://www.apache.org/licenses/LICENSE-2.0
 | |
| #
 | |
| # Unless required by applicable law or agreed to in writing,
 | |
| # software distributed under the License is distributed on an
 | |
| # "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
 | |
| # KIND, either express or implied.  See the License for the
 | |
| # specific language governing permissions and limitations
 | |
| # under the License.
 | |
| 
 | |
| """ Component tests for inter VLAN functionality
 | |
| """
 | |
| 
 | |
| # Import Local Modules
 | |
| from marvin.cloudstackAPI import *
 | |
| from marvin.cloudstackTestCase import *
 | |
| from marvin.lib.base import *
 | |
| from marvin.lib.common import *
 | |
| from marvin.lib.utils import *
 | |
| 
 | |
| from nose.plugins.attrib import attr
 | |
| import logging
 | |
| 
 | |
| 
 | |
| class Services:
 | |
|     """Test inter VLAN services
 | |
|     """
 | |
| 
 | |
|     def __init__(self):
 | |
|         self.services = {
 | |
|             "account": {
 | |
|                 "email": "test@test.com",
 | |
|                 "firstname": "Test",
 | |
|                 "lastname": "User",
 | |
|                 "username": "test",
 | |
|                 # Random characters are appended for unique
 | |
|                 # username
 | |
|                 "password": "password",
 | |
|             },
 | |
|             "service_offering": {
 | |
|                 "name": "Tiny Instance",
 | |
|                 "displaytext": "Tiny Instance",
 | |
|                 "cpunumber": 1,
 | |
|                 "cpuspeed": 100,
 | |
|                 "memory": 128,
 | |
|             },
 | |
|             "network_offering": {
 | |
|                 "name": 'VPC Network offering',
 | |
|                 "displaytext": 'VPC Network off',
 | |
|                 "guestiptype": 'Isolated',
 | |
|                 "supportedservices": 'Vpn,Dhcp,Dns,SourceNat,PortForwarding,Lb,UserData,StaticNat,NetworkACL',
 | |
|                 "traffictype": 'GUEST',
 | |
|                 "availability": 'Optional',
 | |
|                 "useVpc": 'on',
 | |
|                 "serviceProviderList": {
 | |
|                     "Vpn": 'VpcVirtualRouter',
 | |
|                     "Dhcp": 'VpcVirtualRouter',
 | |
|                     "Dns": 'VpcVirtualRouter',
 | |
|                     "SourceNat": 'VpcVirtualRouter',
 | |
|                     "PortForwarding": 'VpcVirtualRouter',
 | |
|                     "Lb": 'VpcVirtualRouter',
 | |
|                     "UserData": 'VpcVirtualRouter',
 | |
|                     "StaticNat": 'VpcVirtualRouter',
 | |
|                     "NetworkACL": 'VpcVirtualRouter'
 | |
|                 },
 | |
|             },
 | |
|             "vpc_offering": {
 | |
|                 "name": 'VPC off',
 | |
|                 "displaytext": 'VPC off',
 | |
|                 "supportedservices": 'Dhcp,Dns,SourceNat,PortForwarding,Vpn,Lb,UserData,StaticNat',
 | |
|             },
 | |
|             "redundant_vpc_offering": {
 | |
|                 "name": 'Redundant VPC off',
 | |
|                 "displaytext": 'Redundant VPC off',
 | |
|                 "supportedservices": 'Dhcp,Dns,SourceNat,PortForwarding,Vpn,Lb,UserData,StaticNat',
 | |
|                 "serviceProviderList": {
 | |
|                     "Vpn": 'VpcVirtualRouter',
 | |
|                     "Dhcp": 'VpcVirtualRouter',
 | |
|                     "Dns": 'VpcVirtualRouter',
 | |
|                     "SourceNat": 'VpcVirtualRouter',
 | |
|                     "PortForwarding": 'VpcVirtualRouter',
 | |
|                     "Lb": 'VpcVirtualRouter',
 | |
|                     "UserData": 'VpcVirtualRouter',
 | |
|                     "StaticNat": 'VpcVirtualRouter',
 | |
|                     "NetworkACL": 'VpcVirtualRouter'
 | |
|                 },
 | |
|                 "serviceCapabilityList": {
 | |
|                     "SourceNat": {
 | |
|                         "RedundantRouter": 'true'
 | |
|                     }
 | |
|                 },
 | |
|             },
 | |
|             "vpc": {
 | |
|                 "name": "TestVPC",
 | |
|                 "displaytext": "TestVPC",
 | |
|                 "cidr": '10.0.0.1/24'
 | |
|             },
 | |
|             "redundant_vpc": {
 | |
|                 "name": "TestRedundantVPC",
 | |
|                 "displaytext": "TestRedundantVPC",
 | |
|                 "cidr": '10.0.0.1/24'
 | |
|             },
 | |
|             "network": {
 | |
|                 "name": "Test Network",
 | |
|                 "displaytext": "Test Network",
 | |
|                 "netmask": '255.255.255.0'
 | |
|             },
 | |
|             "lbrule": {
 | |
|                 "name": "SSH",
 | |
|                 "alg": "leastconn",
 | |
|                 # Algorithm used for load balancing
 | |
|                 "privateport": 22,
 | |
|                 "publicport": 2222,
 | |
|                 "openfirewall": False,
 | |
|                 "startport": 2222,
 | |
|                 "endport": 2222,
 | |
|                 "cidrlist": '0.0.0.0/0',
 | |
|                 "protocol": 'TCP'
 | |
|             },
 | |
|             "natrule": {
 | |
|                 "privateport": 22,
 | |
|                 "publicport": 22,
 | |
|                 "startport": 22,
 | |
|                 "endport": 22,
 | |
|                 "protocol": "TCP",
 | |
|                 "cidrlist": '0.0.0.0/0',
 | |
|             },
 | |
|             "fw_rule": {
 | |
|                 "startport": 1,
 | |
|                 "endport": 6000,
 | |
|                 "cidr": '0.0.0.0/0',
 | |
|                 # Any network (For creating FW rule)
 | |
|                 "protocol": "TCP"
 | |
|             },
 | |
|             "virtual_machine": {
 | |
|                 "displayname": "Test VM",
 | |
|                 "username": "root",
 | |
|                 "password": "password",
 | |
|                 "ssh_port": 22,
 | |
|                 "hypervisor": 'XenServer',
 | |
|                 # Hypervisor type should be same as
 | |
|                 # hypervisor type of cluster
 | |
|                 "privateport": 22,
 | |
|                 "publicport": 22,
 | |
|                 "protocol": 'TCP',
 | |
|             },
 | |
|             "ostype": 'CentOS 5.3 (64-bit)',
 | |
|             # Cent OS 5.3 (64 bit)
 | |
|             "sleep": 60,
 | |
|             "timeout": 10,
 | |
|         }
 | |
| 
 | |
| 
 | |
| class TestVPCOffering(cloudstackTestCase):
 | |
| 
 | |
|     @classmethod
 | |
|     def setUpClass(cls):
 | |
| 
 | |
|         cls.logger = logging.getLogger('TestVPCOffering')
 | |
|         cls.stream_handler = logging.StreamHandler()
 | |
|         cls.logger.setLevel(logging.DEBUG)
 | |
|         cls.logger.addHandler(cls.stream_handler)
 | |
| 
 | |
|         cls.testClient = super(TestVPCOffering, cls).getClsTestClient()
 | |
|         cls.api_client = cls.testClient.getApiClient()
 | |
|         cls._cleanup = []
 | |
| 
 | |
|         cls.services = Services().services
 | |
|         # Get Zone, Domain and templates
 | |
|         cls.domain = get_domain(cls.api_client)
 | |
|         cls.zone = get_zone(cls.api_client, cls.testClient.getZoneForTests())
 | |
|         cls.template = get_template(
 | |
|             cls.api_client,
 | |
|             cls.zone.id,
 | |
|             cls.services["ostype"]
 | |
|         )
 | |
|         cls.services["virtual_machine"]["zoneid"] = cls.zone.id
 | |
|         cls.services["virtual_machine"]["template"] = cls.template.id
 | |
| 
 | |
|         cls.service_offering = ServiceOffering.create(
 | |
|             cls.api_client,
 | |
|             cls.services["service_offering"]
 | |
|         )
 | |
|         cls._cleanup.append(cls.service_offering)
 | |
|         return
 | |
| 
 | |
|     @classmethod
 | |
|     def tearDownClass(cls):
 | |
|         super(TestVPCOffering,cls).tearDownClass()
 | |
| 
 | |
|     def setUp(self):
 | |
|         self.logger.debug("test_vpc_offering#setUp")
 | |
|         self.apiclient = self.testClient.getApiClient()
 | |
|         self.dbclient = self.testClient.getDbConnection()
 | |
|         self.account = Account.create(
 | |
|             self.apiclient,
 | |
|             self.services["account"],
 | |
|             admin=True,
 | |
|             domainid=self.domain.id
 | |
|         )
 | |
|         self.cleanup = []
 | |
|         self.cleanup.append(self.account)
 | |
|         return
 | |
| 
 | |
|     def tearDown(self):
 | |
|         self.logger.debug("test_vpc_offering#tearDown")
 | |
|         super(TestVPCOffering,self).tearDown()
 | |
| 
 | |
|     def validate_vpc_offering(self, vpc_offering):
 | |
|         """Validates the VPC offering"""
 | |
| 
 | |
|         self.logger.debug("Check if the VPC offering is created successfully?")
 | |
|         vpc_offs = VpcOffering.list(
 | |
|             self.apiclient,
 | |
|             id=vpc_offering.id
 | |
|         )
 | |
|         self.assertEqual(
 | |
|             isinstance(vpc_offs, list),
 | |
|             True,
 | |
|             "List VPC offerings should return a valid list"
 | |
|         )
 | |
|         self.assertEqual(
 | |
|             vpc_offering.name,
 | |
|             vpc_offs[0].name,
 | |
|             "Name of the VPC offering should match with listVPCOff data"
 | |
|         )
 | |
|         self.logger.debug(
 | |
|             "VPC offering is created successfully - %s" %
 | |
|             vpc_offering.name)
 | |
|         return
 | |
| 
 | |
|     def validate_vpc_network(self, network):
 | |
|         """Validates the VPC network"""
 | |
| 
 | |
|         self.logger.debug("Check if the VPC network is created successfully?")
 | |
|         vpc_networks = VPC.list(
 | |
|             self.apiclient,
 | |
|             id=network.id
 | |
|         )
 | |
|         self.assertEqual(
 | |
|             isinstance(vpc_networks, list),
 | |
|             True,
 | |
|             "List VPC network should return a valid list"
 | |
|         )
 | |
|         self.assertEqual(
 | |
|             network.name,
 | |
|             vpc_networks[0].name,
 | |
|             "Name of the VPC network should match with listVPC data"
 | |
|         )
 | |
|         self.logger.debug("VPC network created successfully - %s" % network.name)
 | |
|         return
 | |
| 
 | |
|     @attr(tags=["advanced", "intervlan"], required_hardware="false")
 | |
|     def test_01_create_vpc_offering(self):
 | |
|         """ Test create VPC offering
 | |
|         """
 | |
| 
 | |
|         # Steps for validation
 | |
|         # 1. Create VPC Offering by specifying all supported Services
 | |
|         # 2. VPC offering should be created successfully.
 | |
| 
 | |
|         self.logger.debug("Creating inter VPC offering")
 | |
|         vpc_off = VpcOffering.create(
 | |
|             self.apiclient,
 | |
|             self.services["vpc_offering"]
 | |
|         )
 | |
| 
 | |
|         self.logger.debug("Check if the VPC offering is created successfully?")
 | |
|         self.cleanup.append(vpc_off)
 | |
|         self.validate_vpc_offering(vpc_off)
 | |
|         return
 | |
| 
 | |
|     # was tags=["advanced", "intervlan"]
 | |
|     @attr(tags=["TODO"], required_hardware="true")
 | |
|     def test_02_deploy_vms_in_vpc_nw(self):
 | |
|         """Test deploy virtual machines in VPC networks"""
 | |
| 
 | |
|         # 1. Create VPC Offering by specifying all supported Services
 | |
|         #   (Vpn,dhcpdns,UserData, SourceNat,Static NAT and PF,LB,NetworkAcl)
 | |
|         # 2. Create a VPC using the above VPC offering
 | |
|         # 3. Create a network as part of this VPC.
 | |
|         # 4. Deploy few Vms.
 | |
|         # 5. Create a LB rule for this VM.
 | |
|         # 6. Create a PF rule for this VM.
 | |
|         # 7. Create a  Static Nat rule for this VM.
 | |
|         # 8. Create Ingress rules on the network to open the above created
 | |
|         #    LB PF and Static Nat rule
 | |
|         # 9. Create Egress Network ACL for this network to access google.com.
 | |
|         # 10. Enable VPN services
 | |
| 
 | |
|         self.logger.debug("Creating a VPC offering..")
 | |
|         vpc_off = VpcOffering.create(
 | |
|             self.apiclient,
 | |
|             self.services["vpc_offering"]
 | |
|         )
 | |
|         self.cleanup.append(vpc_off)
 | |
| 
 | |
|         self.validate_vpc_offering(vpc_off)
 | |
| 
 | |
|         self.logger.debug("Enabling the VPC offering created")
 | |
|         vpc_off.update(self.apiclient, state='Enabled')
 | |
| 
 | |
|         self.logger.debug("creating a VPC network in the account: %s" %
 | |
|                           self.account.name)
 | |
|         vpc = VPC.create(
 | |
|             self.apiclient,
 | |
|             self.services["vpc"],
 | |
|             vpcofferingid=vpc_off.id,
 | |
|             zoneid=self.zone.id,
 | |
|             account=self.account.name,
 | |
|             domainid=self.account.domainid
 | |
|         )
 | |
|         self.cleanup.append(vpc)
 | |
|         self.validate_vpc_network(vpc)
 | |
| 
 | |
|         self.network_offering = NetworkOffering.create(
 | |
|             self.apiclient,
 | |
|             self.services["network_offering"],
 | |
|             conservemode=False
 | |
|         )
 | |
|         self.cleanup.append(self.network_offering)
 | |
|         # Enable Network offering
 | |
|         self.network_offering.update(self.apiclient, state='Enabled')
 | |
| 
 | |
|         gateway = vpc.cidr.split('/')[0]
 | |
|         # Split the cidr to retrieve gateway
 | |
|         # for eg. cidr = 10.0.0.1/24
 | |
|         # Gateway = 10.0.0.1
 | |
| 
 | |
|         # Creating network using the network offering created
 | |
|         self.logger.debug("Creating network with network offering: %s" %
 | |
|                           self.network_offering.id)
 | |
|         network = Network.create(
 | |
|             self.apiclient,
 | |
|             self.services["network"],
 | |
|             accountid=self.account.name,
 | |
|             domainid=self.account.domainid,
 | |
|             networkofferingid=self.network_offering.id,
 | |
|             zoneid=self.zone.id,
 | |
|             gateway=gateway,
 | |
|             vpcid=vpc.id
 | |
|         )
 | |
|         self.cleanup.append(network)
 | |
|         self.logger.debug("Created network with ID: %s" % network.id)
 | |
|         # Spawn an instance in that network
 | |
|         virtual_machine = VirtualMachine.create(
 | |
|             self.apiclient,
 | |
|             self.services["virtual_machine"],
 | |
|             accountid=self.account.name,
 | |
|             domainid=self.account.domainid,
 | |
|             serviceofferingid=self.service_offering.id,
 | |
|             networkids=[str(network.id)]
 | |
|         )
 | |
|         self.cleanup.append(virtual_machine)
 | |
|         self.logger.debug("Deployed VM in network: %s" % network.id)
 | |
| 
 | |
|         self.logger.debug("Associating public IP for network: %s" % network.name)
 | |
|         public_ip = PublicIPAddress.create(
 | |
|             self.apiclient,
 | |
|             accountid=self.account.name,
 | |
|             zoneid=self.zone.id,
 | |
|             domainid=self.account.domainid,
 | |
|             networkid=network.id,
 | |
|             vpcid=vpc.id
 | |
|         )
 | |
|         self.cleanup.append(public_ip)
 | |
|         self.logger.debug("Associated %s with network %s" % (
 | |
|             public_ip.ipaddress.ipaddress,
 | |
|             network.id
 | |
|         ))
 | |
| 
 | |
|         self.logger.debug("Creating LB rule for IP address: %s" %
 | |
|                           public_ip.ipaddress.ipaddress)
 | |
| 
 | |
|         lb_rule = LoadBalancerRule.create(
 | |
|             self.apiclient,
 | |
|             self.services["lbrule"],
 | |
|             ipaddressid=public_ip.ipaddress.id,
 | |
|             accountid=self.account.name,
 | |
|             networkid=network.id,
 | |
|             vpcid=vpc.id,
 | |
|             domainid=self.account.domainid
 | |
|         )
 | |
|         self.cleanup.append(lb_rule)
 | |
| 
 | |
|         self.logger.debug("Associating public IP for network: %s" % vpc.name)
 | |
|         public_ip_2 = PublicIPAddress.create(
 | |
|             self.apiclient,
 | |
|             accountid=self.account.name,
 | |
|             zoneid=self.zone.id,
 | |
|             domainid=self.account.domainid,
 | |
|             networkid=network.id,
 | |
|             vpcid=vpc.id
 | |
|         )
 | |
|         self.cleanup.append(public_ip_2)
 | |
|         self.logger.debug("Associated %s with network %s" % (
 | |
|             public_ip_2.ipaddress.ipaddress,
 | |
|             network.id
 | |
|         ))
 | |
| 
 | |
|         nat_rule = NATRule.create(
 | |
|             self.apiclient,
 | |
|             virtual_machine,
 | |
|             self.services["natrule"],
 | |
|             ipaddressid=public_ip_2.ipaddress.id,
 | |
|             openfirewall=False,
 | |
|             networkid=network.id,
 | |
|             vpcid=vpc.id
 | |
|         )
 | |
|         self.cleanup.append(nat_rule)
 | |
| 
 | |
|         self.logger.debug("Adding NetwrokACl rules to make PF and LB accessible")
 | |
|         networkacl_1 = NetworkACL.create(
 | |
|             self.apiclient,
 | |
|             networkid=network.id,
 | |
|             services=self.services["natrule"],
 | |
|             traffictype='Ingress'
 | |
|         )
 | |
|         self.cleanup.append(networkacl_1)
 | |
| 
 | |
|         networkacl_2 = NetworkACL.create(
 | |
|             self.apiclient,
 | |
|             networkid=network.id,
 | |
|             services=self.services["lbrule"],
 | |
|             traffictype='Ingress'
 | |
|         )
 | |
|         self.cleanup.append(networkacl_2)
 | |
|         self.logger.debug("Checking if we can SSH into VM?")
 | |
|         try:
 | |
|             virtual_machine.get_ssh_client(
 | |
|                 ipaddress=public_ip_2.ipaddress.ipaddress,
 | |
|             )
 | |
|             self.logger.debug("SSH into VM is successfully")
 | |
|         except Exception as e:
 | |
|             self.fail("Failed to SSH into VM - %s, %s" %
 | |
|                       (public_ip_2.ipaddress.ipaddress, e))
 | |
| 
 | |
|         self.logger.debug("Associating public IP for network: %s" % network.name)
 | |
|         public_ip_3 = PublicIPAddress.create(
 | |
|             self.apiclient,
 | |
|             accountid=self.account.name,
 | |
|             zoneid=self.zone.id,
 | |
|             domainid=self.account.domainid,
 | |
|             networkid=network.id,
 | |
|             vpcid=vpc.id
 | |
|         )
 | |
|         self.cleanup.append(public_ip_3)
 | |
|         self.logger.debug("Associated %s with network %s" % (
 | |
|             public_ip_3.ipaddress.ipaddress,
 | |
|             network.id
 | |
|         ))
 | |
|         self.logger.debug("Enabling static NAT for IP: %s" %
 | |
|                           public_ip_3.ipaddress.ipaddress)
 | |
|         try:
 | |
|             StaticNATRule.enable(
 | |
|                 self.apiclient,
 | |
|                 ipaddressid=public_ip_3.ipaddress.id,
 | |
|                 virtualmachineid=virtual_machine.id,
 | |
|                 networkid=network.id
 | |
|             )
 | |
|             self.logger.debug("Static NAT enabled for IP: %s" %
 | |
|                               public_ip_3.ipaddress.ipaddress)
 | |
|         except Exception as e:
 | |
|             self.fail("Failed to enable static NAT on IP: %s - %s" % (
 | |
|                 public_ip_3.ipaddress.ipaddress, e))
 | |
| 
 | |
|         public_ips = PublicIPAddress.list(
 | |
|             self.apiclient,
 | |
|             networkid=network.id,
 | |
|             listall=True,
 | |
|             isstaticnat=True,
 | |
|             account=self.account.name,
 | |
|             domainid=self.account.domainid
 | |
|         )
 | |
|         self.assertEqual(
 | |
|             isinstance(public_ips, list),
 | |
|             True,
 | |
|             "List public Ip for network should list the Ip addr"
 | |
|         )
 | |
|         self.assertEqual(
 | |
|             public_ips[0].ipaddress,
 | |
|             public_ip_3.ipaddress.ipaddress,
 | |
|             "List public Ip for network should list the Ip addr"
 | |
|         )
 | |
|         # TODO: Remote Access VPN is not yet supported in VPC
 | |
|         return
 | |
| 
 | |
|     @attr(tags=["advanced", "intervlan"], required_hardware="false")
 | |
|     def test_03_vpc_off_without_lb(self):
 | |
|         """Test VPC offering without load balancing service"""
 | |
| 
 | |
|         # Validate the following
 | |
|         # 1. Create VPC Offering by specifying all supported Services except
 | |
|         #    LB services.
 | |
|         # 2. Create a VPC using the above VPC offering.
 | |
|         # 3. Create a network as part of this VPC.
 | |
|         # 4. Deploy few Vms.
 | |
|         # 5. Try to create a LB rule for this VM. LB creation should fail
 | |
| 
 | |
|         self.logger.debug(
 | |
|             "Creating a VPC offering with Vpn,dhcpdns,UserData," +
 | |
|             " SourceNat,Static NAT and PF services"
 | |
|         )
 | |
| 
 | |
|         self.services["vpc_offering"]["supportedservices"] = 'Vpn,Dhcp,Dns,SourceNat,PortForwarding,UserData,StaticNat,NetworkACL'
 | |
|         self.services["network_offering"]["supportedservices"] = 'Vpn,Dhcp,Dns,SourceNat,PortForwarding,UserData,StaticNat,NetworkACL'
 | |
|         self.services["network_offering"]["serviceProviderList"] = {
 | |
|             "Vpn": 'VpcVirtualRouter',
 | |
|             "Dhcp": 'VpcVirtualRouter',
 | |
|             "Dns": 'VpcVirtualRouter',
 | |
|             "SourceNat": 'VpcVirtualRouter',
 | |
|             "PortForwarding": 'VpcVirtualRouter',
 | |
|             "UserData": 'VpcVirtualRouter',
 | |
|             "StaticNat": 'VpcVirtualRouter',
 | |
|             "NetworkACL": 'VpcVirtualRouter'
 | |
|         }
 | |
| 
 | |
|         self.network_offering = NetworkOffering.create(
 | |
|             self.apiclient,
 | |
|             self.services["network_offering"],
 | |
|             conservemode=False
 | |
|         )
 | |
|         self.cleanup.append(self.network_offering)
 | |
|         # Enable Network offering
 | |
|         self.network_offering.update(self.apiclient, state='Enabled')
 | |
| 
 | |
|         vpc_off = VpcOffering.create(
 | |
|             self.apiclient,
 | |
|             self.services["vpc_offering"]
 | |
|         )
 | |
|         self.cleanup.append(vpc_off)
 | |
| 
 | |
|         self.validate_vpc_offering(vpc_off)
 | |
| 
 | |
|         self.logger.debug("Enabling the VPC offering created")
 | |
|         vpc_off.update(self.apiclient, state='Enabled')
 | |
| 
 | |
|         self.logger.debug("creating a VPC network in the account: %s" %
 | |
|                           self.account.name)
 | |
|         vpc = VPC.create(
 | |
|             self.apiclient,
 | |
|             self.services["vpc"],
 | |
|             vpcofferingid=vpc_off.id,
 | |
|             zoneid=self.zone.id,
 | |
|             account=self.account.name,
 | |
|             domainid=self.account.domainid
 | |
|         )
 | |
|         self.cleanup.append(vpc)
 | |
|         self.validate_vpc_network(vpc)
 | |
| 
 | |
|         gateway = vpc.cidr.split('/')[0]
 | |
|         # Split the cidr to retrieve gateway
 | |
|         # for eg. cidr = 10.0.0.1/24
 | |
|         # Gateway = 10.0.0.1
 | |
| 
 | |
|         # Creating network using the network offering created
 | |
|         self.logger.debug("Creating network with network offering: %s" %
 | |
|                           self.network_offering.id)
 | |
|         network = Network.create(
 | |
|             self.apiclient,
 | |
|             self.services["network"],
 | |
|             accountid=self.account.name,
 | |
|             domainid=self.account.domainid,
 | |
|             networkofferingid=self.network_offering.id,
 | |
|             zoneid=self.zone.id,
 | |
|             gateway=gateway,
 | |
|             vpcid=vpc.id
 | |
|         )
 | |
|         self.cleanup.append(network)
 | |
|         self.logger.debug("Created network with ID: %s" % network.id)
 | |
| 
 | |
|         self.logger.debug("Deploying virtual machines in network: %s" % vpc.name)
 | |
|         # Spawn an instance in that network
 | |
|         virtual_machine = VirtualMachine.create(
 | |
|             self.apiclient,
 | |
|             self.services["virtual_machine"],
 | |
|             accountid=self.account.name,
 | |
|             domainid=self.account.domainid,
 | |
|             serviceofferingid=self.service_offering.id,
 | |
|             networkids=[str(network.id)]
 | |
|         )
 | |
|         self.cleanup.append(virtual_machine)
 | |
|         self.logger.debug("Deployed VM in network: %s" % network.id)
 | |
| 
 | |
|         self.logger.debug("Associating public IP for network: %s" % network.name)
 | |
|         public_ip = PublicIPAddress.create(
 | |
|             self.apiclient,
 | |
|             accountid=self.account.name,
 | |
|             zoneid=self.zone.id,
 | |
|             domainid=self.account.domainid,
 | |
|             networkid=network.id,
 | |
|             vpcid=vpc.id
 | |
|         )
 | |
|         self.cleanup.append(public_ip)
 | |
|         self.logger.debug("Associated %s with network %s" % (
 | |
|             public_ip.ipaddress.ipaddress,
 | |
|             vpc.id
 | |
|         ))
 | |
| 
 | |
|         self.logger.debug("Trying to LB rule for IP address: %s" %
 | |
|                           public_ip.ipaddress.ipaddress)
 | |
|         with self.assertRaises(Exception):
 | |
|             LoadBalancerRule.create(
 | |
|                 self.apiclient,
 | |
|                 self.services["lbrule"],
 | |
|                 ipaddressid=public_ip.ipaddress.id,
 | |
|                 accountid=self.account.name,
 | |
|                 networkid=network.id,
 | |
|                 vpcid=vpc.id
 | |
|             )
 | |
|         return
 | |
| 
 | |
|     @attr(tags=["advanced", "intervlan"], required_hardware="false")
 | |
|     def test_04_vpc_off_without_static_nat(self):
 | |
|         """Test VPC offering without static NAT service"""
 | |
| 
 | |
|         # Validate the following
 | |
|         # 1. Create VPC Offering by specifying all supported Services except
 | |
|         #    static NAT services.
 | |
|         # 2. Create a VPC using the above VPC offering.
 | |
|         # 3. Create a network as part of this VPC.
 | |
|         # 4. Deploy few Vms
 | |
|         # 5. Try to create NAT rule for this VMStatic NAT creation should fail
 | |
| 
 | |
|         self.logger.debug("Creating a VPC offering with Vpn,dhcpdns,UserData," +
 | |
|                           "SourceNat,lb and PF services")
 | |
| 
 | |
|         self.services["vpc_offering"]["supportedservices"] = 'Vpn,Dhcp,Dns,SourceNat,Lb,UserData,PortForwarding,NetworkACL'
 | |
|         self.services["network_offering"]["supportedservices"] = 'Vpn,Dhcp,Dns,SourceNat,Lb,UserData,PortForwarding,NetworkACL'
 | |
|         self.services["network_offering"]["serviceProviderList"] = {
 | |
|             "Vpn": 'VpcVirtualRouter',
 | |
|             "Dhcp": 'VpcVirtualRouter',
 | |
|             "Dns": 'VpcVirtualRouter',
 | |
|             "SourceNat": 'VpcVirtualRouter',
 | |
|             "Lb": 'VpcVirtualRouter',
 | |
|             "UserData": 'VpcVirtualRouter',
 | |
|             "PortForwarding": 'VpcVirtualRouter',
 | |
|             "NetworkACL": 'VpcVirtualRouter'
 | |
|         }
 | |
| 
 | |
|         self.network_offering = NetworkOffering.create(
 | |
|             self.apiclient,
 | |
|             self.services["network_offering"],
 | |
|             conservemode=False
 | |
|         )
 | |
|         self.cleanup.append(self.network_offering)
 | |
|         # Enable Network offering
 | |
|         self.network_offering.update(self.apiclient, state='Enabled')
 | |
| 
 | |
|         vpc_off = VpcOffering.create(
 | |
|             self.apiclient,
 | |
|             self.services["vpc_offering"]
 | |
|         )
 | |
|         self.cleanup.append(vpc_off)
 | |
| 
 | |
|         self.validate_vpc_offering(vpc_off)
 | |
| 
 | |
|         self.logger.debug("Enabling the VPC offering created")
 | |
|         vpc_off.update(self.apiclient, state='Enabled')
 | |
| 
 | |
|         self.logger.debug("creating a VPC network in the account: %s" %
 | |
|                           self.account.name)
 | |
|         vpc = VPC.create(
 | |
|             self.apiclient,
 | |
|             self.services["vpc"],
 | |
|             vpcofferingid=vpc_off.id,
 | |
|             zoneid=self.zone.id,
 | |
|             account=self.account.name,
 | |
|             domainid=self.account.domainid
 | |
|         )
 | |
|         self.cleanup.append(vpc)
 | |
|         self.validate_vpc_network(vpc)
 | |
| 
 | |
|         gateway = vpc.cidr.split('/')[0]
 | |
|         # Split the cidr to retrieve gateway
 | |
|         # for eg. cidr = 10.0.0.1/24
 | |
|         # Gateway = 10.0.0.1
 | |
| 
 | |
|         # Creating network using the network offering created
 | |
|         self.logger.debug("Creating network with network offering: %s" %
 | |
|                           self.network_offering.id)
 | |
|         network = Network.create(
 | |
|             self.apiclient,
 | |
|             self.services["network"],
 | |
|             accountid=self.account.name,
 | |
|             domainid=self.account.domainid,
 | |
|             networkofferingid=self.network_offering.id,
 | |
|             zoneid=self.zone.id,
 | |
|             gateway=gateway,
 | |
|             vpcid=vpc.id
 | |
|         )
 | |
|         self.cleanup.append(network)
 | |
|         self.logger.debug("Created network with ID: %s" % network.id)
 | |
| 
 | |
|         self.logger.debug("Deploying virtual machines in network: %s" % vpc.name)
 | |
|         # Spawn an instance in that network
 | |
|         virtual_machine = VirtualMachine.create(
 | |
|             self.apiclient,
 | |
|             self.services["virtual_machine"],
 | |
|             accountid=self.account.name,
 | |
|             domainid=self.account.domainid,
 | |
|             serviceofferingid=self.service_offering.id,
 | |
|             networkids=[str(network.id)]
 | |
|         )
 | |
|         self.cleanup.append(virtual_machine)
 | |
|         self.logger.debug("Deployed VM in network: %s" % network.id)
 | |
| 
 | |
|         self.logger.debug("Associating public IP for network: %s" % network.name)
 | |
|         public_ip = PublicIPAddress.create(
 | |
|             self.apiclient,
 | |
|             accountid=self.account.name,
 | |
|             zoneid=self.zone.id,
 | |
|             domainid=self.account.domainid,
 | |
|             networkid=network.id,
 | |
|             vpcid=vpc.id
 | |
|         )
 | |
|         self.cleanup.append(public_ip)
 | |
|         self.logger.debug("Associated %s with network %s" % (
 | |
|             public_ip.ipaddress.ipaddress,
 | |
|             network.id
 | |
|         ))
 | |
| 
 | |
|         with self.assertRaises(Exception):
 | |
|             static_nat = StaticNATRule.create(
 | |
|                 self.apiclient,
 | |
|                 self.services["fw_rule"],
 | |
|                 ipaddressid=public_ip.ipaddress.id
 | |
|             )
 | |
|             static_nat.enable(
 | |
|                 self.apiclient,
 | |
|                 ipaddressid=public_ip.ipaddress.id,
 | |
|                 virtualmachineid=virtual_machine.id
 | |
|             )
 | |
|         return
 | |
| 
 | |
|     @attr(tags=["advanced", "intervlan"], required_hardware="false")
 | |
|     def test_05_vpc_off_without_pf(self):
 | |
|         """Test VPC offering without port forwarding service"""
 | |
| 
 | |
|         # Validate the following
 | |
|         # 1. Create VPC Offering by specifying all supported Services except
 | |
|         #    PF services.
 | |
|         # 2. Create a VPC using the above VPC offering.
 | |
|         # 3. Create a network as part of this VPC.
 | |
|         # 4. Deploy few Vms.
 | |
|         # 5. Try to create a PF rule for this VM. PF creation should fail
 | |
| 
 | |
|         self.logger.debug(
 | |
|             "Creating a VPC offering with Vpn,dhcpdns,UserData," +
 | |
|             "SourceNat,Static NAT and lb services"
 | |
|         )
 | |
| 
 | |
|         self.services["vpc_offering"]["supportedservices"] = 'Vpn,Dhcp,Dns,SourceNat,Lb,UserData,StaticNat,NetworkACL'
 | |
|         self.services["network_offering"]["supportedservices"] = 'Vpn,Dhcp,Dns,SourceNat,Lb,UserData,StaticNat,NetworkACL'
 | |
|         self.services["network_offering"]["serviceProviderList"] = {
 | |
|             "Vpn": 'VpcVirtualRouter',
 | |
|             "Dhcp": 'VpcVirtualRouter',
 | |
|             "Dns": 'VpcVirtualRouter',
 | |
|             "SourceNat": 'VpcVirtualRouter',
 | |
|             "Lb": 'VpcVirtualRouter',
 | |
|             "UserData": 'VpcVirtualRouter',
 | |
|             "StaticNat": 'VpcVirtualRouter',
 | |
|             "NetworkACL": 'VpcVirtualRouter'
 | |
|         }
 | |
| 
 | |
|         self.network_offering = NetworkOffering.create(
 | |
|             self.apiclient,
 | |
|             self.services["network_offering"],
 | |
|             conservemode=False
 | |
|         )
 | |
|         self.cleanup.append(self.network_offering)
 | |
|         # Enable Network offering
 | |
|         self.network_offering.update(self.apiclient, state='Enabled')
 | |
| 
 | |
|         vpc_off = VpcOffering.create(
 | |
|             self.apiclient,
 | |
|             self.services["vpc_offering"]
 | |
|         )
 | |
|         self.cleanup.append(vpc_off)
 | |
| 
 | |
|         self.validate_vpc_offering(vpc_off)
 | |
| 
 | |
|         self.logger.debug("Enabling the VPC offering created")
 | |
|         vpc_off.update(self.apiclient, state='Enabled')
 | |
| 
 | |
|         self.logger.debug("creating a VPC network in the account: %s" %
 | |
|                           self.account.name)
 | |
|         vpc = VPC.create(
 | |
|             self.apiclient,
 | |
|             self.services["vpc"],
 | |
|             vpcofferingid=vpc_off.id,
 | |
|             zoneid=self.zone.id,
 | |
|             account=self.account.name,
 | |
|             domainid=self.account.domainid
 | |
|         )
 | |
|         self.cleanup.append(vpc)
 | |
|         self.validate_vpc_network(vpc)
 | |
| 
 | |
|         gateway = vpc.cidr.split('/')[0]
 | |
|         # Split the cidr to retrieve gateway
 | |
|         # for eg. cidr = 10.0.0.1/24
 | |
|         # Gateway = 10.0.0.1
 | |
| 
 | |
|         # Creating network using the network offering created
 | |
|         self.logger.debug("Creating network with network offering: %s" %
 | |
|                           self.network_offering.id)
 | |
|         network = Network.create(
 | |
|             self.apiclient,
 | |
|             self.services["network"],
 | |
|             accountid=self.account.name,
 | |
|             domainid=self.account.domainid,
 | |
|             networkofferingid=self.network_offering.id,
 | |
|             zoneid=self.zone.id,
 | |
|             gateway=gateway,
 | |
|             vpcid=vpc.id
 | |
|         )
 | |
|         self.cleanup.append(network)
 | |
|         self.logger.debug("Deploying virtual machines in network: %s" % vpc.name)
 | |
| 
 | |
|         # Spawn an instance in that network
 | |
|         virtual_machine = VirtualMachine.create(
 | |
|             self.apiclient,
 | |
|             self.services["virtual_machine"],
 | |
|             accountid=self.account.name,
 | |
|             domainid=self.account.domainid,
 | |
|             serviceofferingid=self.service_offering.id,
 | |
|             networkids=[str(network.id)]
 | |
|         )
 | |
|         self.cleanup.append(virtual_machine)
 | |
|         self.logger.debug("Deployed VM in network: %s" % network.id)
 | |
| 
 | |
|         self.logger.debug("Associating public IP for network: %s" % network.name)
 | |
|         public_ip = PublicIPAddress.create(
 | |
|             self.apiclient,
 | |
|             accountid=self.account.name,
 | |
|             zoneid=self.zone.id,
 | |
|             domainid=self.account.domainid,
 | |
|             networkid=network.id,
 | |
|             vpcid=vpc.id
 | |
|         )
 | |
|         self.logger.debug("Associated %s with network %s" % (
 | |
|             public_ip.ipaddress.ipaddress,
 | |
|             network.id
 | |
|         ))
 | |
| 
 | |
|         self.logger.debug("Trying to create NAT rule for the IP: %s" %
 | |
|                           public_ip.ipaddress.ipaddress)
 | |
|         with self.assertRaises(Exception):
 | |
|             NATRule.create(
 | |
|                 self.apiclient,
 | |
|                 virtual_machine,
 | |
|                 self.services["natrule"],
 | |
|                 ipaddressid=public_ip.ipaddress.id,
 | |
|                 openfirewall=True
 | |
|             )
 | |
|         return
 | |
| 
 | |
|     @attr(tags=["advanced", "intervlan"], required_hardware="false")
 | |
|     def test_06_vpc_off_invalid_services(self):
 | |
|         """Test VPC offering with invalid services"""
 | |
| 
 | |
|         # Validate the following
 | |
|         # 1. Creating VPC Offering with services NOT supported by VPC
 | |
|         #    like Firewall should not be allowed
 | |
| 
 | |
|         self.logger.debug("Creating a VPC offering with Firewall")
 | |
|         self.services["vpc_offering"]["supportedservices"] = 'Dhcp,Dns,PortForwarding,Firewall,Vpn,SourceNat,Lb,UserData,StaticNat'
 | |
| 
 | |
|         with self.assertRaises(Exception):
 | |
|             VpcOffering.create(
 | |
|                 self.apiclient,
 | |
|                 self.services["vpc_offering"]
 | |
|             )
 | |
| 
 | |
|         self.logger.debug("Creating a VPC offering with only sourceNAT service")
 | |
|         self.services["vpc_offering"]["supportedservices"] = 'SourceNat'
 | |
| 
 | |
|         try:
 | |
|             vpc_off = VpcOffering.create(
 | |
|                 self.apiclient,
 | |
|                 self.services["vpc_offering"]
 | |
|             )
 | |
|             self.cleanup.append(vpc_off)
 | |
|             self.validate_vpc_offering(vpc_off)
 | |
|             # Appending to cleanup to delete after test
 | |
|         except Exception as e:
 | |
|             self.fail("Failed to create the VPC offering - %s" % e)
 | |
|         return
 | |
| 
 | |
|     @attr(tags=["advanced", "intervlan"], required_hardware="false")
 | |
|     def test_07_update_vpc_off(self):
 | |
|         """Test update VPC offering"""
 | |
| 
 | |
|         # Validate the following
 | |
|         # 1. Create a VPC Offering.
 | |
|         # 2. Disable this VPC offering.
 | |
|         # 3. Create a VPC using this VPC offering. VPC creation should fail.
 | |
|         # 4. Enable the VPC offering again and create VPC. VPC should be
 | |
|         #    created successfully
 | |
|         # 5. Change name and displaytext of the VPCOffering. Name and
 | |
|         #    displaytext chnages should be reflected in listVPCPffering call
 | |
| 
 | |
|         self.logger.debug("Creating a VPC offering..")
 | |
|         vpc_off = VpcOffering.create(
 | |
|             self.apiclient,
 | |
|             self.services["vpc_offering"]
 | |
|         )
 | |
| 
 | |
|         self.cleanup.append(vpc_off)
 | |
|         self.validate_vpc_offering(vpc_off)
 | |
| 
 | |
|         self.logger.debug("Enabling the VPC offering created")
 | |
|         vpc_off.update(self.apiclient, state='Disabled')
 | |
| 
 | |
|         self.logger.debug("creating a VPC network in the account: %s" %
 | |
|                           self.account.name)
 | |
|         with self.assertRaises(Exception):
 | |
|             VPC.create(
 | |
|                 self.apiclient,
 | |
|                 self.services["vpc"],
 | |
|                 vpcofferingid=vpc_off.id,
 | |
|                 zoneid=self.zone.id,
 | |
|                 account=self.account.name,
 | |
|                 domainid=self.account.domainid
 | |
|             )
 | |
|         self.logger.debug("VPC network creation failed! (Test succeeded)")
 | |
|         self.logger.debug("Enabling the VPC offering created")
 | |
|         vpc_off.update(self.apiclient, state='Enabled')
 | |
| 
 | |
|         self.logger.debug("creating a VPC network in the account: %s" %
 | |
|                           self.account.name)
 | |
|         vpc = VPC.create(
 | |
|             self.apiclient,
 | |
|             self.services["vpc"],
 | |
|             vpcofferingid=vpc_off.id,
 | |
|             zoneid=self.zone.id,
 | |
|             account=self.account.name,
 | |
|             domainid=self.account.domainid
 | |
|         )
 | |
|         self.cleanup.append(vpc)
 | |
|         self.validate_vpc_network(vpc)
 | |
| 
 | |
|         self.logger.debug("Updating name & display text of the vpc offering created")
 | |
|         new_name = random_gen()
 | |
|         new_displaytext = random_gen()
 | |
| 
 | |
|         try:
 | |
|             vpc_off.update(
 | |
|                 self.apiclient,
 | |
|                 name=new_name,
 | |
|                 displaytext=new_displaytext
 | |
|             )
 | |
|         except Exception as e:
 | |
|             self.fail("Failed to update VPC offering- %s" % e)
 | |
| 
 | |
|         self.logger.debug("Cheking if the changes are reflected to listVPC call?")
 | |
|         vpc_offs = vpc_off.list(
 | |
|             self.apiclient,
 | |
|             id=vpc_off.id,
 | |
|             listall=True
 | |
|         )
 | |
|         self.assertEqual(
 | |
|             isinstance(vpc_offs, list),
 | |
|             True,
 | |
|             "List VPC offerings shall return a valid list"
 | |
|         )
 | |
|         list_reposnse_vpc = vpc_offs[0]
 | |
|         self.assertEqual(
 | |
|             list_reposnse_vpc.name,
 | |
|             new_name,
 | |
|             "VPC off Name should be updated with new one"
 | |
|         )
 | |
|         self.assertEqual(
 | |
|             list_reposnse_vpc.displaytext,
 | |
|             new_displaytext,
 | |
|             "VPC off display text should be updated with new one"
 | |
|         )
 | |
|         return
 | |
| 
 | |
|     @attr(tags=["advanced", "intervlan"], required_hardware="false")
 | |
|     def test_08_list_vpc_off(self):
 | |
|         """Test list VPC offering"""
 | |
| 
 | |
|         # Validate the following
 | |
|         # 1. Create multiple VPC Offerings
 | |
|         # 2. Delete few of the VPC offerings
 | |
|         # 3. List all the VPC offerings. Deleted VPC offering should not be
 | |
|         #    returned by list VPC offerings command
 | |
|         # 4. List offerings by ID. Only offering having ID should get listed
 | |
|         # 5. List VPC Offerings by displaytext. Only offerings with same
 | |
|         #    display text should be listed
 | |
|         # 6. List VPC Offerings by name. Only offerings with same
 | |
|         #    name should be listed
 | |
|         # 7. List VPC Offerings by supported services. Only offerings with same
 | |
|         #    supported services should be listed
 | |
|         # 8. All VPC offering in "Enabled" state should get listed.
 | |
|         # 9. All VPC offering in "Disabled" state should get listed
 | |
| 
 | |
|         self.logger.debug("Creating multiple VPC offerings")
 | |
|         self.services["vpc_offering"]["supportedservices"] = 'SourceNat'
 | |
| 
 | |
|         vpc_off_1 = VpcOffering.create(
 | |
|             self.apiclient,
 | |
|             self.services["vpc_offering"]
 | |
|         )
 | |
|         self.cleanup.append(vpc_off_1)
 | |
|         self.validate_vpc_offering(vpc_off_1)
 | |
|         self.logger.debug("Disabling the VPC offering created")
 | |
|         vpc_off_1.update(self.apiclient, state='Disabled')
 | |
| 
 | |
|         vpc_off_2 = VpcOffering.create(
 | |
|             self.apiclient,
 | |
|             self.services["vpc_offering"]
 | |
|         )
 | |
| 
 | |
|         self.cleanup.append(vpc_off_2)
 | |
|         self.validate_vpc_offering(vpc_off_2)
 | |
|         self.logger.debug("Enabling the VPC offering created")
 | |
|         vpc_off_2.update(self.apiclient, state='Enabled')
 | |
| 
 | |
|         vpc_off_3 = VpcOffering.create(
 | |
|             self.apiclient,
 | |
|             self.services["vpc_offering"]
 | |
|         )
 | |
| 
 | |
|         self.cleanup.append(vpc_off_3)
 | |
|         self.validate_vpc_offering(vpc_off_3)
 | |
|         self.logger.debug("Enabling the VPC offering created")
 | |
|         vpc_off_3.update(self.apiclient, state='Enabled')
 | |
| 
 | |
|         vpc_off_4 = VpcOffering.create(
 | |
|             self.apiclient,
 | |
|             self.services["vpc_offering"]
 | |
|         )
 | |
|         self.logger.debug("Enabling the VPC offering created")
 | |
|         vpc_off_4.update(self.apiclient, state='Enabled')
 | |
| 
 | |
|         self.logger.debug("Deleting the VPC offering: %s" % vpc_off_4.name)
 | |
|         vpc_off_4.delete(self.apiclient)
 | |
| 
 | |
|         self.logger.debug("Cheking if listVPCOff return the deleted VPC off")
 | |
|         vpc_offs = VpcOffering.list(
 | |
|             self.apiclient,
 | |
|             id=vpc_off_4.id,
 | |
|             listall=True
 | |
|         )
 | |
|         self.assertEqual(
 | |
|             vpc_offs,
 | |
|             None,
 | |
|             "List VPC offerings should nt return any response for deleted offering"
 | |
|         )
 | |
| 
 | |
|         self.logger.debug("Validating the listVPCOfferings repsonse by ids")
 | |
|         self.validate_vpc_offering(vpc_off_3)
 | |
| 
 | |
|         self.logger.debug("ListVPCOfferings by displaytext & verifying the response")
 | |
|         vpc_offs = VpcOffering.list(
 | |
|             self.apiclient,
 | |
|             displaytext=vpc_off_3.displaytext,
 | |
|             listall=True
 | |
|         )
 | |
|         self.assertEqual(
 | |
|             isinstance(vpc_offs, list),
 | |
|             True,
 | |
|             "List VPC offerings shall return a valid response"
 | |
|         )
 | |
|         list_vpc_off_response = vpc_offs[0]
 | |
|         self.assertIn(
 | |
|             vpc_off_3.id,
 | |
|             [vpc.id for vpc in vpc_offs],
 | |
|             "ListVPC Off with displaytext should return same VPC off"
 | |
|         )
 | |
| 
 | |
|         self.logger.debug("ListVPCOfferings by name and verifying the response")
 | |
|         vpc_offs = VpcOffering.list(
 | |
|             self.apiclient,
 | |
|             name=vpc_off_2.name,
 | |
|             listall=True
 | |
|         )
 | |
|         self.assertEqual(
 | |
|             isinstance(vpc_offs, list),
 | |
|             True,
 | |
|             "List VPC offerings shall return a valid response"
 | |
|         )
 | |
|         list_vpc_off_response = vpc_offs[0]
 | |
|         self.assertEqual(
 | |
|             list_vpc_off_response.id,
 | |
|             vpc_off_2.id,
 | |
|             "ListVPC Off with name should return same VPC off"
 | |
|         )
 | |
| 
 | |
|         self.logger.debug(
 | |
|             "ListVPCOfferings by supported services & verifying the response")
 | |
|         vpc_offs = VpcOffering.list(
 | |
|             self.apiclient,
 | |
|             supportedservices='SourceNat',
 | |
|             listall=True
 | |
|         )
 | |
|         self.assertEqual(
 | |
|             isinstance(vpc_offs, list),
 | |
|             True,
 | |
|             "List VPC offerings shall return a valid response"
 | |
|         )
 | |
|         for vpc_off in vpc_offs:
 | |
|             self.logger.debug(vpc_off)
 | |
|             self.assertEqual(
 | |
|                 'SourceNat' in str(vpc_off),
 | |
|                 True,
 | |
|                 "ListVPC Off with name should return same VPC off"
 | |
|             )
 | |
| 
 | |
|         self.logger.debug("ListVPCOfferings by state & verifying the response")
 | |
|         vpc_offs = VpcOffering.list(
 | |
|             self.apiclient,
 | |
|             state='Enabled',
 | |
|             listall=True
 | |
|         )
 | |
|         self.assertEqual(
 | |
|             isinstance(vpc_offs, list),
 | |
|             True,
 | |
|             "List VPC offerings shall return a valid response"
 | |
|         )
 | |
|         for vpc_off in vpc_offs:
 | |
|             self.assertEqual(
 | |
|                 vpc_off.state,
 | |
|                 'Enabled',
 | |
|                 "List VPC offering should return only offerings that are enabled"
 | |
|             )
 | |
| 
 | |
|         self.logger.debug("ListVPCOfferings by state & verifying the response")
 | |
|         vpc_offs = VpcOffering.list(
 | |
|             self.apiclient,
 | |
|             state='Disabled',
 | |
|             listall=True
 | |
|         )
 | |
|         self.assertEqual(
 | |
|             isinstance(vpc_offs, list),
 | |
|             True,
 | |
|             "List VPC offerings shall return a valid response"
 | |
|         )
 | |
|         for vpc_off in vpc_offs:
 | |
|             self.assertEqual(
 | |
|                 vpc_off.state,
 | |
|                 'Disabled',
 | |
|                 "List VPC offering should return only offerings that are disabled"
 | |
|             )
 | |
|         return
 | |
| 
 | |
|     @attr(tags=["advanced", "redundancy"], required_hardware="false")
 | |
|     def test_09_create_redundant_vpc_offering(self):
 | |
| 
 | |
|         self.logger.debug("Creating Redundant VPC offering")
 | |
|         vpc_off = VpcOffering.create(
 | |
|             self.apiclient,
 | |
|             self.services["redundant_vpc_offering"]
 | |
|         )
 | |
|         self.cleanup.append(vpc_off)
 | |
| 
 | |
|         self.logger.debug("Check if the Redundant VPC offering is created successfully?")
 | |
|         self.validate_vpc_offering(vpc_off)
 | |
| 
 | |
|         self.logger.debug("Enabling the created Redundant VPC offering")
 | |
|         vpc_off.update(self.apiclient, state='Enabled')
 | |
| 
 | |
|         self.logger.debug("Creating a Redundant VPC network in the account: %s" %
 | |
|                           self.account.name)
 | |
|         vpc = VPC.create(
 | |
|             self.apiclient,
 | |
|             self.services["redundant_vpc"],
 | |
|             vpcofferingid=vpc_off.id,
 | |
|             zoneid=self.zone.id,
 | |
|             account=self.account.name,
 | |
|             domainid=self.account.domainid
 | |
|         )
 | |
|         self.cleanup.append(vpc)
 | |
|         self.logger.debug("Validating Redundant VPC Nw creation")
 | |
|         self.validate_vpc_network(vpc)
 | |
| 
 | |
|         vpcs = VPC.list(
 | |
|             self.apiclient,
 | |
|             id=vpc.id
 | |
|         )
 | |
| 
 | |
|         found = False
 | |
|         redundant = False
 | |
|         for iVpc in vpcs:
 | |
|             if iVpc.id == vpc.id:
 | |
|                 found = True
 | |
|                 if iVpc.redundantvpcrouter:
 | |
|                     redundant = True
 | |
|                 break
 | |
| 
 | |
|         self.assertEqual(
 | |
|             redundant,
 | |
|             True,
 | |
|             "Didn't create any Redundant Vpc"
 | |
|         )
 | |
| 
 | |
|         return
 |