blob: 38834ff2be5d66ef580bc170d8d57b2b4b2c05a4 [file] [log] [blame]
Matthew Treinishb86cda92013-07-29 11:22:23 -04001# Copyright 2013 IBM Corp.
2#
3# Licensed under the Apache License, Version 2.0 (the "License"); you may
4# not use this file except in compliance with the License. You may obtain
5# a copy of the License at
6#
7# http://www.apache.org/licenses/LICENSE-2.0
8#
9# Unless required by applicable law or agreed to in writing, software
10# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
11# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
12# License for the specific language governing permissions and limitations
13# under the License.
14
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050015import netaddr
16
17import keystoneclient.v2_0.client as keystoneclient
18import neutronclient.v2_0.client as neutronclient
Matthew Treinishb86cda92013-07-29 11:22:23 -040019
20from tempest import clients
Masayuki Igawa259c1132013-10-31 17:48:44 +090021from tempest.common.utils import data_utils
Matthew Treinishb86cda92013-07-29 11:22:23 -040022from tempest import config
23from tempest import exceptions
24from tempest.openstack.common import log as logging
25
Sean Dague86bd8422013-12-20 09:56:44 -050026CONF = config.CONF
Matthew Treinishb86cda92013-07-29 11:22:23 -040027LOG = logging.getLogger(__name__)
28
29
30class IsolatedCreds(object):
31
32 def __init__(self, name, tempest_client=True, interface='json',
Matthew Treinish9f756a02014-01-15 10:26:07 -050033 password='pass', network_resources=None):
34 self.network_resources = network_resources
Matthew Treinishb86cda92013-07-29 11:22:23 -040035 self.isolated_creds = {}
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050036 self.isolated_net_resources = {}
37 self.ports = []
Matthew Treinishb86cda92013-07-29 11:22:23 -040038 self.name = name
Sean Dague86bd8422013-12-20 09:56:44 -050039 self.config = CONF
Matthew Treinishb86cda92013-07-29 11:22:23 -040040 self.tempest_client = tempest_client
41 self.interface = interface
42 self.password = password
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050043 self.identity_admin_client, self.network_admin_client = (
44 self._get_admin_clients())
Matthew Treinishb86cda92013-07-29 11:22:23 -040045
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050046 def _get_official_admin_clients(self):
Sean Dague86bd8422013-12-20 09:56:44 -050047 username = CONF.identity.admin_username
48 password = CONF.identity.admin_password
49 tenant_name = CONF.identity.admin_tenant_name
50 auth_url = CONF.identity.uri
51 dscv = CONF.identity.disable_ssl_certificate_validation
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050052 identity_client = keystoneclient.Client(username=username,
53 password=password,
54 tenant_name=tenant_name,
55 auth_url=auth_url,
56 insecure=dscv)
57 network_client = neutronclient.Client(username=username,
58 password=password,
59 tenant_name=tenant_name,
60 auth_url=auth_url,
61 insecure=dscv)
62 return identity_client, network_client
Matthew Treinishb86cda92013-07-29 11:22:23 -040063
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050064 def _get_admin_clients(self):
Matthew Treinishb86cda92013-07-29 11:22:23 -040065 """
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050066 Returns a tuple with instances of the following admin clients (in this
67 order):
68 identity
69 network
Matthew Treinishb86cda92013-07-29 11:22:23 -040070 """
71 if self.tempest_client:
72 os = clients.AdminManager(interface=self.interface)
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050073 admin_clients = (os.identity_client,
74 os.network_client,)
Matthew Treinishb86cda92013-07-29 11:22:23 -040075 else:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050076 admin_clients = self._get_official_admin_clients()
77 return admin_clients
Matthew Treinishb86cda92013-07-29 11:22:23 -040078
79 def _create_tenant(self, name, description):
80 if self.tempest_client:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050081 resp, tenant = self.identity_admin_client.create_tenant(
Matthew Treinishb86cda92013-07-29 11:22:23 -040082 name=name, description=description)
83 else:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050084 tenant = self.identity_admin_client.tenants.create(
85 name,
86 description=description)
Matthew Treinishb86cda92013-07-29 11:22:23 -040087 return tenant
88
89 def _get_tenant_by_name(self, name):
90 if self.tempest_client:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050091 resp, tenant = self.identity_admin_client.get_tenant_by_name(name)
Matthew Treinishb86cda92013-07-29 11:22:23 -040092 else:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050093 tenants = self.identity_admin_client.tenants.list()
Matthew Treinishb86cda92013-07-29 11:22:23 -040094 for ten in tenants:
95 if ten['name'] == name:
96 tenant = ten
DennyZhang1eb40462013-09-26 14:18:30 -050097 break
98 else:
99 raise exceptions.NotFound('No such tenant')
Matthew Treinishb86cda92013-07-29 11:22:23 -0400100 return tenant
101
102 def _create_user(self, username, password, tenant, email):
103 if self.tempest_client:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500104 resp, user = self.identity_admin_client.create_user(username,
105 password,
106 tenant['id'],
107 email)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400108 else:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500109 user = self.identity_admin_client.users.create(username, password,
110 email,
111 tenant_id=tenant.id)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400112 return user
113
114 def _get_user(self, tenant, username):
115 if self.tempest_client:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500116 resp, user = self.identity_admin_client.get_user_by_username(
117 tenant['id'],
118 username)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400119 else:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500120 user = self.identity_admin_client.users.get(username)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400121 return user
122
123 def _list_roles(self):
124 if self.tempest_client:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500125 resp, roles = self.identity_admin_client.list_roles()
Matthew Treinishb86cda92013-07-29 11:22:23 -0400126 else:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500127 roles = self.identity_admin_client.roles.list()
Matthew Treinishb86cda92013-07-29 11:22:23 -0400128 return roles
129
130 def _assign_user_role(self, tenant, user, role):
131 if self.tempest_client:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500132 self.identity_admin_client.assign_user_role(tenant, user, role)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400133 else:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500134 self.identity_admin_client.roles.add_user_role(user,
135 role, tenant=tenant)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400136
137 def _delete_user(self, user):
138 if self.tempest_client:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500139 self.identity_admin_client.delete_user(user)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400140 else:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500141 self.identity_admin_client.users.delete(user)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400142
143 def _delete_tenant(self, tenant):
144 if self.tempest_client:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500145 self.identity_admin_client.delete_tenant(tenant)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400146 else:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500147 self.identity_admin_client.tenants.delete(tenant)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400148
Sean Dague6969b902014-01-28 06:48:37 -0500149 def _create_creds(self, suffix="", admin=False):
150 """Create random credentials under the following schema.
151
152 If the name contains a '.' is the full class path of something, and
153 we don't really care. If it isn't, it's probably a meaningful name,
154 so use it.
155
156 For logging purposes, -user and -tenant are long and redundant,
157 don't use them. The user# will be sufficient to figure it out.
158 """
159 if '.' in self.name:
160 root = ""
161 else:
162 root = self.name
163
164 tenant_name = data_utils.rand_name(root) + suffix
Matthew Treinishb86cda92013-07-29 11:22:23 -0400165 tenant_desc = tenant_name + "-desc"
Matthew Treinishb86cda92013-07-29 11:22:23 -0400166 tenant = self._create_tenant(name=tenant_name,
167 description=tenant_desc)
Sean Dague6969b902014-01-28 06:48:37 -0500168
169 username = data_utils.rand_name(root) + suffix
170 email = data_utils.rand_name(root) + suffix + "@example.com"
Matthew Treinishb86cda92013-07-29 11:22:23 -0400171 user = self._create_user(username, self.password,
172 tenant, email)
173 if admin:
174 role = None
175 try:
176 roles = self._list_roles()
Sean Dague86bd8422013-12-20 09:56:44 -0500177 admin_role = CONF.identity.admin_role
Matthew Treinishb86cda92013-07-29 11:22:23 -0400178 if self.tempest_client:
Russell Sim7f894a52013-09-13 10:35:21 +1000179 role = next(r for r in roles if r['name'] == admin_role)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400180 else:
Russell Sim7f894a52013-09-13 10:35:21 +1000181 role = next(r for r in roles if r.name == admin_role)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400182 except StopIteration:
183 msg = "No admin role found"
184 raise exceptions.NotFound(msg)
185 if self.tempest_client:
186 self._assign_user_role(tenant['id'], user['id'], role['id'])
187 else:
188 self._assign_user_role(tenant.id, user.id, role.id)
189 return user, tenant
190
191 def _get_cred_names(self, user, tenant):
192 if self.tempest_client:
193 username = user.get('name')
194 tenant_name = tenant.get('name')
195 else:
196 username = user.name
197 tenant_name = tenant.name
198 return username, tenant_name
199
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500200 def _get_tenant_id(self, tenant):
201 if self.tempest_client:
202 return tenant.get('id')
203 else:
204 return tenant.id
205
206 def _create_network_resources(self, tenant_id):
207 network = None
208 subnet = None
209 router = None
Matthew Treinish9f756a02014-01-15 10:26:07 -0500210 # Make sure settings
211 if self.network_resources:
212 if self.network_resources['router']:
213 if (not self.network_resources['subnet'] or
214 not self.network_resources['network']):
215 raise exceptions.InvalidConfiguration(
216 'A router requires a subnet and network')
217 elif self.network_resources['subnet']:
218 if not self.network_resources['network']:
219 raise exceptions.InvalidConfiguration(
220 'A subnet requires a network')
221 elif self.network_resources['dhcp']:
222 raise exceptions.InvalidConfiguration('DHCP requires a subnet')
223
Masayuki Igawa259c1132013-10-31 17:48:44 +0900224 data_utils.rand_name_root = data_utils.rand_name(self.name)
Matthew Treinish9f756a02014-01-15 10:26:07 -0500225 if not self.network_resources or self.network_resources['network']:
226 network_name = data_utils.rand_name_root + "-network"
227 network = self._create_network(network_name, tenant_id)
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500228 try:
Matthew Treinish9f756a02014-01-15 10:26:07 -0500229 if not self.network_resources or self.network_resources['subnet']:
230 subnet_name = data_utils.rand_name_root + "-subnet"
231 subnet = self._create_subnet(subnet_name, tenant_id,
232 network['id'])
233 if not self.network_resources or self.network_resources['router']:
234 router_name = data_utils.rand_name_root + "-router"
235 router = self._create_router(router_name, tenant_id)
236 self._add_router_interface(router['id'], subnet['id'])
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500237 except Exception:
238 if router:
239 self._clear_isolated_router(router['id'], router['name'])
240 if subnet:
241 self._clear_isolated_subnet(subnet['id'], subnet['name'])
242 if network:
243 self._clear_isolated_network(network['id'], network['name'])
244 raise
245 return network, subnet, router
246
247 def _create_network(self, name, tenant_id):
248 if self.tempest_client:
249 resp, resp_body = self.network_admin_client.create_network(
250 name, tenant_id=tenant_id)
251 else:
252 body = {'network': {'tenant_id': tenant_id, 'name': name}}
253 resp_body = self.network_admin_client.create_network(body)
254 return resp_body['network']
255
256 def _create_subnet(self, subnet_name, tenant_id, network_id):
257 if not self.tempest_client:
258 body = {'subnet': {'name': subnet_name, 'tenant_id': tenant_id,
259 'network_id': network_id, 'ip_version': 4}}
Matthew Treinish9f756a02014-01-15 10:26:07 -0500260 if self.network_resources:
261 body['enable_dhcp'] = self.network_resources['dhcp']
Sean Dague86bd8422013-12-20 09:56:44 -0500262 base_cidr = netaddr.IPNetwork(CONF.network.tenant_network_cidr)
263 mask_bits = CONF.network.tenant_network_mask_bits
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500264 for subnet_cidr in base_cidr.subnet(mask_bits):
265 try:
266 if self.tempest_client:
Matthew Treinish9f756a02014-01-15 10:26:07 -0500267 if self.network_resources:
268 resp, resp_body = self.network_admin_client.\
269 create_subnet(
270 network_id, str(subnet_cidr),
271 name=subnet_name,
272 tenant_id=tenant_id,
273 enable_dhcp=self.network_resources['dhcp'])
274 else:
275 resp, resp_body = self.network_admin_client.\
276 create_subnet(network_id, str(subnet_cidr),
277 name=subnet_name,
278 tenant_id=tenant_id)
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500279 else:
280 body['subnet']['cidr'] = str(subnet_cidr)
281 resp_body = self.network_admin_client.create_subnet(body)
282 break
283 except exceptions.BadRequest as e:
284 if 'overlaps with another subnet' not in str(e):
285 raise
286 else:
287 e = exceptions.BuildErrorException()
288 e.message = 'Available CIDR for subnet creation could not be found'
289 raise e
290 return resp_body['subnet']
291
292 def _create_router(self, router_name, tenant_id):
293 external_net_id = dict(
Sean Dague86bd8422013-12-20 09:56:44 -0500294 network_id=CONF.network.public_network_id)
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500295 if self.tempest_client:
296 resp, resp_body = self.network_admin_client.create_router(
297 router_name,
298 external_gateway_info=external_net_id,
299 tenant_id=tenant_id)
300 else:
301 body = {'router': {'name': router_name, 'tenant_id': tenant_id,
302 'external_gateway_info': external_net_id,
303 'admin_state_up': True}}
304 resp_body = self.network_admin_client.create_router(body)
305 return resp_body['router']
306
307 def _add_router_interface(self, router_id, subnet_id):
308 if self.tempest_client:
309 self.network_admin_client.add_router_interface_with_subnet_id(
310 router_id, subnet_id)
311 else:
312 body = {'subnet_id': subnet_id}
313 self.network_admin_client.add_interface_router(router_id, body)
314
Matthew Treinishb86cda92013-07-29 11:22:23 -0400315 def get_primary_tenant(self):
316 return self.isolated_creds.get('primary')[1]
317
318 def get_primary_user(self):
319 return self.isolated_creds.get('primary')[0]
320
321 def get_alt_tenant(self):
322 return self.isolated_creds.get('alt')[1]
323
324 def get_alt_user(self):
325 return self.isolated_creds.get('alt')[0]
326
327 def get_admin_tenant(self):
328 return self.isolated_creds.get('admin')[1]
329
330 def get_admin_user(self):
331 return self.isolated_creds.get('admin')[0]
332
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500333 def get_primary_network(self):
334 return self.isolated_net_resources.get('primary')[0]
335
336 def get_primary_subnet(self):
337 return self.isolated_net_resources.get('primary')[1]
338
339 def get_primary_router(self):
340 return self.isolated_net_resources.get('primary')[2]
341
342 def get_admin_network(self):
343 return self.isolated_net_resources.get('admin')[0]
344
345 def get_admin_subnet(self):
346 return self.isolated_net_resources.get('admin')[1]
347
348 def get_admin_router(self):
349 return self.isolated_net_resources.get('admin')[2]
350
351 def get_alt_network(self):
352 return self.isolated_net_resources.get('alt')[0]
353
354 def get_alt_subnet(self):
355 return self.isolated_net_resources.get('alt')[1]
356
357 def get_alt_router(self):
358 return self.isolated_net_resources.get('alt')[2]
359
Matthew Treinishb86cda92013-07-29 11:22:23 -0400360 def get_primary_creds(self):
361 if self.isolated_creds.get('primary'):
362 user, tenant = self.isolated_creds['primary']
363 username, tenant_name = self._get_cred_names(user, tenant)
364 else:
365 user, tenant = self._create_creds()
366 username, tenant_name = self._get_cred_names(user, tenant)
367 self.isolated_creds['primary'] = (user, tenant)
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500368 LOG.info("Acquired isolated creds:\n user: %s, tenant: %s"
Matthew Treinishb86cda92013-07-29 11:22:23 -0400369 % (username, tenant_name))
Sean Dague86bd8422013-12-20 09:56:44 -0500370 if CONF.service_available.neutron:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500371 network, subnet, router = self._create_network_resources(
372 self._get_tenant_id(tenant))
373 self.isolated_net_resources['primary'] = (
374 network, subnet, router,)
375 LOG.info("Created isolated network resources for : \n"
376 + " user: %s, tenant: %s" % (username, tenant_name))
Matthew Treinishb86cda92013-07-29 11:22:23 -0400377 return username, tenant_name, self.password
378
379 def get_admin_creds(self):
380 if self.isolated_creds.get('admin'):
381 user, tenant = self.isolated_creds['admin']
382 username, tenant_name = self._get_cred_names(user, tenant)
383 else:
384 user, tenant = self._create_creds(admin=True)
385 username, tenant_name = self._get_cred_names(user, tenant)
386 self.isolated_creds['admin'] = (user, tenant)
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500387 LOG.info("Acquired admin isolated creds:\n user: %s, tenant: %s"
Matthew Treinishb86cda92013-07-29 11:22:23 -0400388 % (username, tenant_name))
Sean Dague86bd8422013-12-20 09:56:44 -0500389 if CONF.service_available.neutron:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500390 network, subnet, router = self._create_network_resources(
391 self._get_tenant_id(tenant))
392 self.isolated_net_resources['admin'] = (
393 network, subnet, router,)
394 LOG.info("Created isolated network resources for : \n"
395 + " user: %s, tenant: %s" % (username, tenant_name))
396 return username, tenant_name, self.password
Matthew Treinishb86cda92013-07-29 11:22:23 -0400397
398 def get_alt_creds(self):
399 if self.isolated_creds.get('alt'):
400 user, tenant = self.isolated_creds['alt']
401 username, tenant_name = self._get_cred_names(user, tenant)
402 else:
403 user, tenant = self._create_creds()
404 username, tenant_name = self._get_cred_names(user, tenant)
405 self.isolated_creds['alt'] = (user, tenant)
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500406 LOG.info("Acquired alt isolated creds:\n user: %s, tenant: %s"
Matthew Treinishb86cda92013-07-29 11:22:23 -0400407 % (username, tenant_name))
Sean Dague86bd8422013-12-20 09:56:44 -0500408 if CONF.service_available.neutron:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500409 network, subnet, router = self._create_network_resources(
410 self._get_tenant_id(tenant))
411 self.isolated_net_resources['alt'] = (
412 network, subnet, router,)
413 LOG.info("Created isolated network resources for : \n"
414 + " user: %s, tenant: %s" % (username, tenant_name))
Matthew Treinishb86cda92013-07-29 11:22:23 -0400415 return username, tenant_name, self.password
416
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500417 def _clear_isolated_router(self, router_id, router_name):
418 net_client = self.network_admin_client
419 try:
420 net_client.delete_router(router_id)
421 except exceptions.NotFound:
422 LOG.warn('router with name: %s not found for delete' %
423 router_name)
424 pass
425
426 def _clear_isolated_subnet(self, subnet_id, subnet_name):
427 net_client = self.network_admin_client
428 try:
429 net_client.delete_subnet(subnet_id)
430 except exceptions.NotFound:
431 LOG.warn('subnet with name: %s not found for delete' %
432 subnet_name)
433 pass
434
435 def _clear_isolated_network(self, network_id, network_name):
436 net_client = self.network_admin_client
437 try:
438 net_client.delete_network(network_id)
439 except exceptions.NotFound:
440 LOG.warn('network with name: %s not found for delete' %
441 network_name)
442 pass
443
444 def _cleanup_ports(self, network_id):
445 # TODO(mlavalle) This method will be removed once patch
446 # https://review.openstack.org/#/c/46563/ merges in Neutron
447 if not self.ports:
448 if self.tempest_client:
449 resp, resp_body = self.network_admin_client.list_ports()
450 else:
451 resp_body = self.network_admin_client.list_ports()
452 self.ports = resp_body['ports']
453 ports_to_delete = [
armando-migliaccio96a86ae2013-11-21 17:26:16 -0800454 port
455 for port in self.ports
456 if (port['network_id'] == network_id and
457 port['device_owner'] != 'network:router_interface')
458 ]
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500459 for port in ports_to_delete:
460 try:
461 LOG.info('Cleaning up port id %s, name %s' %
462 (port['id'], port['name']))
463 self.network_admin_client.delete_port(port['id'])
464 except exceptions.NotFound:
465 LOG.warn('Port id: %s, name %s not found for clean-up' %
466 (port['id'], port['name']))
467
468 def _clear_isolated_net_resources(self):
469 net_client = self.network_admin_client
470 for cred in self.isolated_net_resources:
471 network, subnet, router = self.isolated_net_resources.get(cred)
Matthew Treinish9f756a02014-01-15 10:26:07 -0500472 if self.network_resources.get('router'):
473 try:
474 if self.tempest_client:
475 net_client.remove_router_interface_with_subnet_id(
476 router['id'], subnet['id'])
477 else:
478 body = {'subnet_id': subnet['id']}
479 net_client.remove_interface_router(router['id'], body)
480 except exceptions.NotFound:
481 LOG.warn('router with name: %s not found for delete' %
482 router['name'])
483 pass
484 self._clear_isolated_router(router['id'], router['name'])
485 if self.network_resources.get('network'):
486 # TODO(mlavalle) This method call will be removed once patch
487 # https://review.openstack.org/#/c/46563/ merges in Neutron
488 self._cleanup_ports(network['id'])
489 if self.network_resources.get('subnet'):
490 self._clear_isolated_subnet(subnet['id'], subnet['name'])
491 if self.network_resources.get('network'):
492 self._clear_isolated_network(network['id'], network['name'])
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500493
Matthew Treinishb86cda92013-07-29 11:22:23 -0400494 def clear_isolated_creds(self):
495 if not self.isolated_creds:
496 return
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500497 self._clear_isolated_net_resources()
Matthew Treinishb86cda92013-07-29 11:22:23 -0400498 for cred in self.isolated_creds:
499 user, tenant = self.isolated_creds.get(cred)
500 try:
501 if self.tempest_client:
502 self._delete_user(user['id'])
503 else:
504 self._delete_user(user.id)
505 except exceptions.NotFound:
506 if self.tempest_client:
507 name = user['name']
508 else:
509 name = user.name
510 LOG.warn("user with name: %s not found for delete" % name)
511 pass
512 try:
513 if self.tempest_client:
514 self._delete_tenant(tenant['id'])
515 else:
516 self._delete_tenant(tenant.id)
517 except exceptions.NotFound:
518 if self.tempest_client:
519 name = tenant['name']
520 else:
521 name = tenant.name
522 LOG.warn("tenant with name: %s not found for delete" % name)
523 pass