Source code for compute.admin.test_aggregates_negative

# Copyright 2013 Huawei Technologies Co.,LTD.
# All Rights Reserved.
#
#    Licensed under the Apache License, Version 2.0 (the "License"); you may
#    not use this file except in compliance with the License. You may obtain
#    a copy of the License at
#
#         http://www.apache.org/licenses/LICENSE-2.0
#
#    Unless required by applicable law or agreed to in writing, software
#    distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
#    WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
#    License for the specific language governing permissions and limitations
#    under the License.

from tempest.api.compute import base
from tempest.common import tempest_fixtures as fixtures
from tempest import config
from tempest.lib.common.utils import data_utils
from tempest.lib import decorators
from tempest.lib import exceptions as lib_exc

CONF = config.CONF


[docs] class AggregatesAdminNegativeTestJSON(base.BaseV2ComputeAdminTest): """Tests Aggregates API that require admin privileges""" @classmethod def setup_clients(cls): super(AggregatesAdminNegativeTestJSON, cls).setup_clients() cls.client = cls.os_admin.aggregates_client cls.services_client = cls.os_admin.services_client @classmethod def resource_setup(cls): super(AggregatesAdminNegativeTestJSON, cls).resource_setup() cls.aggregate_name_prefix = 'test_aggregate' svc_list = cls.services_client.list_services( binary='nova-compute')['services'] cls.hosts = [v['host'] for v in svc_list if v['status'] == 'enabled' and v['state'] == 'up'] def _create_test_aggregate(self): aggregate_name = data_utils.rand_name( prefix=CONF.resource_name_prefix, name=self.aggregate_name_prefix) aggregate = (self.client.create_aggregate(name=aggregate_name) ['aggregate']) self.addCleanup(self.client.delete_aggregate, aggregate['id']) return aggregate
[docs] @decorators.attr(type=['negative']) @decorators.idempotent_id('86a1cb14-da37-4a70-b056-903fd56dfe29') def test_aggregate_create_as_user(self): """Regular user is not allowed to create an aggregate""" aggregate_name = data_utils.rand_name( prefix=CONF.resource_name_prefix, name=self.aggregate_name_prefix) self.assertRaises(lib_exc.Forbidden, self.aggregates_client.create_aggregate, name=aggregate_name)
[docs] @decorators.attr(type=['negative']) @decorators.idempotent_id('3b8a1929-3793-4e92-bcb4-dfa572ee6c1d') def test_aggregate_create_aggregate_name_length_less_than_1(self): """The length of aggregate name should >=1""" self.assertRaises(lib_exc.BadRequest, self.client.create_aggregate, name='')
[docs] @decorators.attr(type=['negative']) @decorators.idempotent_id('4c194563-543b-4e70-a719-557bbe947fac') def test_aggregate_create_aggregate_name_length_exceeds_255(self): """The length of aggregate name should <=255""" aggregate_name = 'a' * 256 self.assertRaises(lib_exc.BadRequest, self.client.create_aggregate, name=aggregate_name)
[docs] @decorators.attr(type=['negative']) @decorators.idempotent_id('9c23a291-b0b1-487b-b464-132e061151b3') def test_aggregate_create_with_existent_aggregate_name(self): """Creating an aggregate with existent aggregate name is forbidden""" aggregate = self._create_test_aggregate() self.assertRaises(lib_exc.Conflict, self.client.create_aggregate, name=aggregate['name'])
[docs] @decorators.attr(type=['negative']) @decorators.idempotent_id('cd6de795-c15d-45f1-8d9e-813c6bb72a3d') def test_aggregate_delete_as_user(self): """Regular user is not allowed to delete an aggregate""" aggregate = self._create_test_aggregate() self.assertRaises(lib_exc.Forbidden, self.aggregates_client.delete_aggregate, aggregate['id'])
[docs] @decorators.attr(type=['negative']) @decorators.idempotent_id('b7d475a6-5dcd-4ff4-b70a-cd9de66a6672') def test_aggregate_list_as_user(self): """Regular user is not allowed to list aggregates""" self.assertRaises(lib_exc.Forbidden, self.aggregates_client.list_aggregates)
[docs] @decorators.attr(type=['negative']) @decorators.idempotent_id('557cad12-34c9-4ff4-95f0-22f0dfbaf7dc') def test_aggregate_get_details_as_user(self): """Regular user is not allowed to get aggregate details""" aggregate = self._create_test_aggregate() self.assertRaises(lib_exc.Forbidden, self.aggregates_client.show_aggregate, aggregate['id'])
[docs] @decorators.attr(type=['negative']) @decorators.idempotent_id('c74f4bf1-4708-4ff2-95a0-f49eaca951bd') def test_aggregate_delete_with_invalid_id(self): """Delete an aggregate with invalid id should raise exceptions""" self.assertRaises(lib_exc.NotFound, self.client.delete_aggregate, -1)
[docs] @decorators.attr(type=['negative']) @decorators.idempotent_id('3c916244-2c46-49a4-9b55-b20bb0ae512c') def test_aggregate_get_details_with_invalid_id(self): """Get aggregate details with invalid id should raise exceptions""" self.assertRaises(lib_exc.NotFound, self.client.show_aggregate, -1)
[docs] @decorators.attr(type=['negative']) @decorators.idempotent_id('0ef07828-12b4-45ba-87cc-41425faf5711') def test_aggregate_add_non_exist_host(self): """Adding a non-exist host to an aggregate should fail""" while True: non_exist_host = data_utils.rand_name( prefix=CONF.resource_name_prefix, name='nonexist_host') if non_exist_host not in self.hosts: break aggregate = self._create_test_aggregate() self.assertRaises(lib_exc.NotFound, self.client.add_host, aggregate['id'], host=non_exist_host)
[docs] @decorators.attr(type=['negative']) @decorators.idempotent_id('7324c334-bd13-4c93-8521-5877322c3d51') def test_aggregate_add_host_as_user(self): """Regular user is not allowed to add a host to an aggregate""" aggregate = self._create_test_aggregate() self.assertRaises(lib_exc.Forbidden, self.aggregates_client.add_host, aggregate['id'], host=self.hosts[0])
[docs] @decorators.attr(type=['negative']) @decorators.idempotent_id('19dd44e1-c435-4ee1-a402-88c4f90b5950') def test_aggregate_add_existent_host(self): """Adding already existing host to aggregate should fail""" self.useFixture(fixtures.LockFixture('availability_zone')) aggregate = self._create_test_aggregate() self.client.add_host(aggregate['id'], host=self.hosts[0]) self.addCleanup(self.client.remove_host, aggregate['id'], host=self.hosts[0]) self.assertRaises(lib_exc.Conflict, self.client.add_host, aggregate['id'], host=self.hosts[0])
[docs] @decorators.attr(type=['negative']) @decorators.idempotent_id('7a53af20-137a-4e44-a4ae-e19260e626d9') def test_aggregate_remove_host_as_user(self): """Regular user is not allowed to remove a host from an aggregate""" self.useFixture(fixtures.LockFixture('availability_zone')) aggregate = self._create_test_aggregate() self.client.add_host(aggregate['id'], host=self.hosts[0]) self.addCleanup(self.client.remove_host, aggregate['id'], host=self.hosts[0]) self.assertRaises(lib_exc.Forbidden, self.aggregates_client.remove_host, aggregate['id'], host=self.hosts[0])
[docs] @decorators.attr(type=['negative']) @decorators.idempotent_id('95d6a6fa-8da9-4426-84d0-eec0329f2e4d') def test_aggregate_remove_nonexistent_host(self): """Removing not existing host from aggregate should fail""" aggregate = self._create_test_aggregate() self.assertRaises(lib_exc.NotFound, self.client.remove_host, aggregate['id'], host='nonexist_host')