blob: 5059a5bd286ac229cc35bafc992890057addbf2d [file] [log] [blame]
Matthew Treinishb86cda92013-07-29 11:22:23 -04001# Copyright 2013 IBM Corp.
2#
3# Licensed under the Apache License, Version 2.0 (the "License"); you may
4# not use this file except in compliance with the License. You may obtain
5# a copy of the License at
6#
7# http://www.apache.org/licenses/LICENSE-2.0
8#
9# Unless required by applicable law or agreed to in writing, software
10# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
11# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
12# License for the specific language governing permissions and limitations
13# under the License.
14
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050015import netaddr
16
Andrea Frittolifc315902014-03-20 09:21:44 +000017from tempest import auth
Matthew Treinishb86cda92013-07-29 11:22:23 -040018from tempest import clients
Masayuki Igawa259c1132013-10-31 17:48:44 +090019from tempest.common.utils import data_utils
Matthew Treinishb86cda92013-07-29 11:22:23 -040020from tempest import config
21from tempest import exceptions
22from tempest.openstack.common import log as logging
23
Sean Dague86bd8422013-12-20 09:56:44 -050024CONF = config.CONF
Matthew Treinishb86cda92013-07-29 11:22:23 -040025LOG = logging.getLogger(__name__)
26
27
28class IsolatedCreds(object):
29
30 def __init__(self, name, tempest_client=True, interface='json',
Matthew Treinish9f756a02014-01-15 10:26:07 -050031 password='pass', network_resources=None):
32 self.network_resources = network_resources
Matthew Treinishb86cda92013-07-29 11:22:23 -040033 self.isolated_creds = {}
Andrea Frittolifc315902014-03-20 09:21:44 +000034 self.isolated_creds_old_style = {}
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050035 self.isolated_net_resources = {}
36 self.ports = []
Matthew Treinishb86cda92013-07-29 11:22:23 -040037 self.name = name
Matthew Treinishb86cda92013-07-29 11:22:23 -040038 self.tempest_client = tempest_client
39 self.interface = interface
40 self.password = password
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050041 self.identity_admin_client, self.network_admin_client = (
42 self._get_admin_clients())
Matthew Treinishb86cda92013-07-29 11:22:23 -040043
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050044 def _get_admin_clients(self):
Matthew Treinishb86cda92013-07-29 11:22:23 -040045 """
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050046 Returns a tuple with instances of the following admin clients (in this
47 order):
48 identity
49 network
Matthew Treinishb86cda92013-07-29 11:22:23 -040050 """
51 if self.tempest_client:
52 os = clients.AdminManager(interface=self.interface)
Matthew Treinishb86cda92013-07-29 11:22:23 -040053 else:
Andrea Frittoli422fbdf2014-03-20 10:05:18 +000054 os = clients.OfficialClientManager(
55 auth.get_default_credentials('identity_admin')
56 )
57 return os.identity_client, os.network_client
Matthew Treinishb86cda92013-07-29 11:22:23 -040058
59 def _create_tenant(self, name, description):
60 if self.tempest_client:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050061 resp, tenant = self.identity_admin_client.create_tenant(
Matthew Treinishb86cda92013-07-29 11:22:23 -040062 name=name, description=description)
63 else:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050064 tenant = self.identity_admin_client.tenants.create(
65 name,
66 description=description)
Matthew Treinishb86cda92013-07-29 11:22:23 -040067 return tenant
68
69 def _get_tenant_by_name(self, name):
70 if self.tempest_client:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050071 resp, tenant = self.identity_admin_client.get_tenant_by_name(name)
Matthew Treinishb86cda92013-07-29 11:22:23 -040072 else:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050073 tenants = self.identity_admin_client.tenants.list()
Matthew Treinishb86cda92013-07-29 11:22:23 -040074 for ten in tenants:
75 if ten['name'] == name:
76 tenant = ten
DennyZhang1eb40462013-09-26 14:18:30 -050077 break
78 else:
79 raise exceptions.NotFound('No such tenant')
Matthew Treinishb86cda92013-07-29 11:22:23 -040080 return tenant
81
82 def _create_user(self, username, password, tenant, email):
83 if self.tempest_client:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050084 resp, user = self.identity_admin_client.create_user(username,
85 password,
86 tenant['id'],
87 email)
Matthew Treinishb86cda92013-07-29 11:22:23 -040088 else:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050089 user = self.identity_admin_client.users.create(username, password,
90 email,
91 tenant_id=tenant.id)
Matthew Treinishb86cda92013-07-29 11:22:23 -040092 return user
93
94 def _get_user(self, tenant, username):
95 if self.tempest_client:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050096 resp, user = self.identity_admin_client.get_user_by_username(
97 tenant['id'],
98 username)
Matthew Treinishb86cda92013-07-29 11:22:23 -040099 else:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500100 user = self.identity_admin_client.users.get(username)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400101 return user
102
103 def _list_roles(self):
104 if self.tempest_client:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500105 resp, roles = self.identity_admin_client.list_roles()
Matthew Treinishb86cda92013-07-29 11:22:23 -0400106 else:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500107 roles = self.identity_admin_client.roles.list()
Matthew Treinishb86cda92013-07-29 11:22:23 -0400108 return roles
109
110 def _assign_user_role(self, tenant, user, role):
111 if self.tempest_client:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500112 self.identity_admin_client.assign_user_role(tenant, user, role)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400113 else:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500114 self.identity_admin_client.roles.add_user_role(user,
115 role, tenant=tenant)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400116
117 def _delete_user(self, user):
118 if self.tempest_client:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500119 self.identity_admin_client.delete_user(user)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400120 else:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500121 self.identity_admin_client.users.delete(user)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400122
123 def _delete_tenant(self, tenant):
124 if self.tempest_client:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500125 self.identity_admin_client.delete_tenant(tenant)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400126 else:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500127 self.identity_admin_client.tenants.delete(tenant)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400128
Sean Dague6969b902014-01-28 06:48:37 -0500129 def _create_creds(self, suffix="", admin=False):
130 """Create random credentials under the following schema.
131
132 If the name contains a '.' is the full class path of something, and
133 we don't really care. If it isn't, it's probably a meaningful name,
134 so use it.
135
136 For logging purposes, -user and -tenant are long and redundant,
137 don't use them. The user# will be sufficient to figure it out.
138 """
139 if '.' in self.name:
140 root = ""
141 else:
142 root = self.name
143
144 tenant_name = data_utils.rand_name(root) + suffix
Matthew Treinishb86cda92013-07-29 11:22:23 -0400145 tenant_desc = tenant_name + "-desc"
Matthew Treinishb86cda92013-07-29 11:22:23 -0400146 tenant = self._create_tenant(name=tenant_name,
147 description=tenant_desc)
Sean Dague6969b902014-01-28 06:48:37 -0500148
149 username = data_utils.rand_name(root) + suffix
150 email = data_utils.rand_name(root) + suffix + "@example.com"
Matthew Treinishb86cda92013-07-29 11:22:23 -0400151 user = self._create_user(username, self.password,
152 tenant, email)
153 if admin:
154 role = None
155 try:
156 roles = self._list_roles()
Sean Dague86bd8422013-12-20 09:56:44 -0500157 admin_role = CONF.identity.admin_role
Matthew Treinishb86cda92013-07-29 11:22:23 -0400158 if self.tempest_client:
Russell Sim7f894a52013-09-13 10:35:21 +1000159 role = next(r for r in roles if r['name'] == admin_role)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400160 else:
Russell Sim7f894a52013-09-13 10:35:21 +1000161 role = next(r for r in roles if r.name == admin_role)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400162 except StopIteration:
163 msg = "No admin role found"
164 raise exceptions.NotFound(msg)
165 if self.tempest_client:
166 self._assign_user_role(tenant['id'], user['id'], role['id'])
167 else:
168 self._assign_user_role(tenant.id, user.id, role.id)
Andrea Frittolifc315902014-03-20 09:21:44 +0000169 return self._get_credentials(user, tenant), user, tenant
Matthew Treinishb86cda92013-07-29 11:22:23 -0400170
Andrea Frittolifc315902014-03-20 09:21:44 +0000171 def _get_credentials(self, user, tenant):
Matthew Treinishb86cda92013-07-29 11:22:23 -0400172 if self.tempest_client:
Andrea Frittolifc315902014-03-20 09:21:44 +0000173 user_get = user.get
174 tenant_get = tenant.get
Matthew Treinishb86cda92013-07-29 11:22:23 -0400175 else:
Andrea Frittolifc315902014-03-20 09:21:44 +0000176 user_get = user.__dict__.get
177 tenant_get = tenant.__dict__.get
178 return auth.get_credentials(
179 username=user_get('name'), user_id=user_get('id'),
180 tenant_name=tenant_get('name'), tenant_id=tenant_get('id'),
181 password=self.password)
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500182
183 def _create_network_resources(self, tenant_id):
184 network = None
185 subnet = None
186 router = None
Matthew Treinish9f756a02014-01-15 10:26:07 -0500187 # Make sure settings
188 if self.network_resources:
189 if self.network_resources['router']:
190 if (not self.network_resources['subnet'] or
191 not self.network_resources['network']):
192 raise exceptions.InvalidConfiguration(
193 'A router requires a subnet and network')
194 elif self.network_resources['subnet']:
195 if not self.network_resources['network']:
196 raise exceptions.InvalidConfiguration(
197 'A subnet requires a network')
198 elif self.network_resources['dhcp']:
199 raise exceptions.InvalidConfiguration('DHCP requires a subnet')
200
Masayuki Igawa259c1132013-10-31 17:48:44 +0900201 data_utils.rand_name_root = data_utils.rand_name(self.name)
Matthew Treinish9f756a02014-01-15 10:26:07 -0500202 if not self.network_resources or self.network_resources['network']:
203 network_name = data_utils.rand_name_root + "-network"
204 network = self._create_network(network_name, tenant_id)
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500205 try:
Matthew Treinish9f756a02014-01-15 10:26:07 -0500206 if not self.network_resources or self.network_resources['subnet']:
207 subnet_name = data_utils.rand_name_root + "-subnet"
208 subnet = self._create_subnet(subnet_name, tenant_id,
209 network['id'])
210 if not self.network_resources or self.network_resources['router']:
211 router_name = data_utils.rand_name_root + "-router"
212 router = self._create_router(router_name, tenant_id)
213 self._add_router_interface(router['id'], subnet['id'])
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500214 except Exception:
215 if router:
216 self._clear_isolated_router(router['id'], router['name'])
217 if subnet:
218 self._clear_isolated_subnet(subnet['id'], subnet['name'])
219 if network:
220 self._clear_isolated_network(network['id'], network['name'])
221 raise
222 return network, subnet, router
223
224 def _create_network(self, name, tenant_id):
225 if self.tempest_client:
226 resp, resp_body = self.network_admin_client.create_network(
Eugene Nikanorove9d255a2013-12-18 16:31:42 +0400227 name=name, tenant_id=tenant_id)
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500228 else:
229 body = {'network': {'tenant_id': tenant_id, 'name': name}}
230 resp_body = self.network_admin_client.create_network(body)
231 return resp_body['network']
232
233 def _create_subnet(self, subnet_name, tenant_id, network_id):
234 if not self.tempest_client:
235 body = {'subnet': {'name': subnet_name, 'tenant_id': tenant_id,
236 'network_id': network_id, 'ip_version': 4}}
Matthew Treinish9f756a02014-01-15 10:26:07 -0500237 if self.network_resources:
238 body['enable_dhcp'] = self.network_resources['dhcp']
Sean Dague86bd8422013-12-20 09:56:44 -0500239 base_cidr = netaddr.IPNetwork(CONF.network.tenant_network_cidr)
240 mask_bits = CONF.network.tenant_network_mask_bits
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500241 for subnet_cidr in base_cidr.subnet(mask_bits):
242 try:
243 if self.tempest_client:
Matthew Treinish9f756a02014-01-15 10:26:07 -0500244 if self.network_resources:
245 resp, resp_body = self.network_admin_client.\
246 create_subnet(
Eugene Nikanorove9d255a2013-12-18 16:31:42 +0400247 network_id=network_id, cidr=str(subnet_cidr),
Matthew Treinish9f756a02014-01-15 10:26:07 -0500248 name=subnet_name,
249 tenant_id=tenant_id,
Eugene Nikanorove9d255a2013-12-18 16:31:42 +0400250 enable_dhcp=self.network_resources['dhcp'],
251 ip_version=4)
Matthew Treinish9f756a02014-01-15 10:26:07 -0500252 else:
253 resp, resp_body = self.network_admin_client.\
Eugene Nikanorove9d255a2013-12-18 16:31:42 +0400254 create_subnet(network_id=network_id,
255 cidr=str(subnet_cidr),
Matthew Treinish9f756a02014-01-15 10:26:07 -0500256 name=subnet_name,
Eugene Nikanorove9d255a2013-12-18 16:31:42 +0400257 tenant_id=tenant_id,
258 ip_version=4)
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500259 else:
260 body['subnet']['cidr'] = str(subnet_cidr)
261 resp_body = self.network_admin_client.create_subnet(body)
262 break
263 except exceptions.BadRequest as e:
264 if 'overlaps with another subnet' not in str(e):
265 raise
266 else:
267 e = exceptions.BuildErrorException()
268 e.message = 'Available CIDR for subnet creation could not be found'
269 raise e
270 return resp_body['subnet']
271
272 def _create_router(self, router_name, tenant_id):
273 external_net_id = dict(
Sean Dague86bd8422013-12-20 09:56:44 -0500274 network_id=CONF.network.public_network_id)
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500275 if self.tempest_client:
276 resp, resp_body = self.network_admin_client.create_router(
277 router_name,
278 external_gateway_info=external_net_id,
279 tenant_id=tenant_id)
280 else:
281 body = {'router': {'name': router_name, 'tenant_id': tenant_id,
282 'external_gateway_info': external_net_id,
283 'admin_state_up': True}}
284 resp_body = self.network_admin_client.create_router(body)
285 return resp_body['router']
286
287 def _add_router_interface(self, router_id, subnet_id):
288 if self.tempest_client:
289 self.network_admin_client.add_router_interface_with_subnet_id(
290 router_id, subnet_id)
291 else:
292 body = {'subnet_id': subnet_id}
293 self.network_admin_client.add_interface_router(router_id, body)
294
Matthew Treinishb86cda92013-07-29 11:22:23 -0400295 def get_primary_tenant(self):
Andrea Frittolifc315902014-03-20 09:21:44 +0000296 # Deprecated. Maintained until all tests are ported
297 return self.isolated_creds_old_style.get('primary')[1]
Matthew Treinishb86cda92013-07-29 11:22:23 -0400298
299 def get_primary_user(self):
Andrea Frittolifc315902014-03-20 09:21:44 +0000300 # Deprecated. Maintained until all tests are ported
301 return self.isolated_creds_old_style.get('primary')[0]
Matthew Treinishb86cda92013-07-29 11:22:23 -0400302
303 def get_alt_tenant(self):
Andrea Frittolifc315902014-03-20 09:21:44 +0000304 # Deprecated. Maintained until all tests are ported
305 return self.isolated_creds_old_style.get('alt')[1]
Matthew Treinishb86cda92013-07-29 11:22:23 -0400306
307 def get_alt_user(self):
Andrea Frittolifc315902014-03-20 09:21:44 +0000308 # Deprecated. Maintained until all tests are ported
309 return self.isolated_creds_old_style.get('alt')[0]
Matthew Treinishb86cda92013-07-29 11:22:23 -0400310
311 def get_admin_tenant(self):
Andrea Frittolifc315902014-03-20 09:21:44 +0000312 # Deprecated. Maintained until all tests are ported
313 return self.isolated_creds_old_style.get('admin')[1]
Matthew Treinishb86cda92013-07-29 11:22:23 -0400314
315 def get_admin_user(self):
Andrea Frittolifc315902014-03-20 09:21:44 +0000316 # Deprecated. Maintained until all tests are ported
317 return self.isolated_creds_old_style.get('admin')[0]
Matthew Treinishb86cda92013-07-29 11:22:23 -0400318
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500319 def get_primary_network(self):
320 return self.isolated_net_resources.get('primary')[0]
321
322 def get_primary_subnet(self):
323 return self.isolated_net_resources.get('primary')[1]
324
325 def get_primary_router(self):
326 return self.isolated_net_resources.get('primary')[2]
327
328 def get_admin_network(self):
329 return self.isolated_net_resources.get('admin')[0]
330
331 def get_admin_subnet(self):
332 return self.isolated_net_resources.get('admin')[1]
333
334 def get_admin_router(self):
335 return self.isolated_net_resources.get('admin')[2]
336
337 def get_alt_network(self):
338 return self.isolated_net_resources.get('alt')[0]
339
340 def get_alt_subnet(self):
341 return self.isolated_net_resources.get('alt')[1]
342
343 def get_alt_router(self):
344 return self.isolated_net_resources.get('alt')[2]
345
Andrea Frittolifc315902014-03-20 09:21:44 +0000346 def get_credentials(self, credential_type, old_style):
347 if self.isolated_creds.get(credential_type):
348 credentials = self.isolated_creds[credential_type]
Matthew Treinishb86cda92013-07-29 11:22:23 -0400349 else:
Andrea Frittolifc315902014-03-20 09:21:44 +0000350 is_admin = (credential_type == 'admin')
351 credentials, user, tenant = self._create_creds(admin=is_admin)
352 self.isolated_creds[credential_type] = credentials
353 # Maintained until tests are ported
354 self.isolated_creds_old_style[credential_type] = (user, tenant)
355 LOG.info("Acquired isolated creds:\n credentials: %s"
356 % credentials)
Sean Dague86bd8422013-12-20 09:56:44 -0500357 if CONF.service_available.neutron:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500358 network, subnet, router = self._create_network_resources(
Andrea Frittolifc315902014-03-20 09:21:44 +0000359 credentials.tenant_id)
360 self.isolated_net_resources[credential_type] = (
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500361 network, subnet, router,)
362 LOG.info("Created isolated network resources for : \n"
Andrea Frittolifc315902014-03-20 09:21:44 +0000363 + " credentials: %s" % credentials)
364 if old_style:
365 return (credentials.username, credentials.tenant_name,
366 credentials.password)
367 else:
368 return credentials
Matthew Treinishb86cda92013-07-29 11:22:23 -0400369
Andrea Frittoli422fbdf2014-03-20 10:05:18 +0000370 def get_primary_creds(self, old_style=False):
Andrea Frittolifc315902014-03-20 09:21:44 +0000371 return self.get_credentials('primary', old_style)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400372
Andrea Frittoli422fbdf2014-03-20 10:05:18 +0000373 def get_admin_creds(self, old_style=False):
Andrea Frittolifc315902014-03-20 09:21:44 +0000374 return self.get_credentials('admin', old_style)
375
Andrea Frittoli422fbdf2014-03-20 10:05:18 +0000376 def get_alt_creds(self, old_style=False):
Andrea Frittolifc315902014-03-20 09:21:44 +0000377 return self.get_credentials('alt', old_style)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400378
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500379 def _clear_isolated_router(self, router_id, router_name):
380 net_client = self.network_admin_client
381 try:
382 net_client.delete_router(router_id)
383 except exceptions.NotFound:
384 LOG.warn('router with name: %s not found for delete' %
385 router_name)
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500386
387 def _clear_isolated_subnet(self, subnet_id, subnet_name):
388 net_client = self.network_admin_client
389 try:
390 net_client.delete_subnet(subnet_id)
391 except exceptions.NotFound:
392 LOG.warn('subnet with name: %s not found for delete' %
393 subnet_name)
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500394
395 def _clear_isolated_network(self, network_id, network_name):
396 net_client = self.network_admin_client
397 try:
398 net_client.delete_network(network_id)
399 except exceptions.NotFound:
400 LOG.warn('network with name: %s not found for delete' %
401 network_name)
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500402
403 def _cleanup_ports(self, network_id):
404 # TODO(mlavalle) This method will be removed once patch
405 # https://review.openstack.org/#/c/46563/ merges in Neutron
406 if not self.ports:
407 if self.tempest_client:
408 resp, resp_body = self.network_admin_client.list_ports()
409 else:
410 resp_body = self.network_admin_client.list_ports()
411 self.ports = resp_body['ports']
412 ports_to_delete = [
armando-migliaccio96a86ae2013-11-21 17:26:16 -0800413 port
414 for port in self.ports
415 if (port['network_id'] == network_id and
shihanzhangc3d73c82014-02-18 10:27:02 +0800416 port['device_owner'] != 'network:router_interface' and
417 port['device_owner'] != 'network:dhcp')
armando-migliaccio96a86ae2013-11-21 17:26:16 -0800418 ]
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500419 for port in ports_to_delete:
420 try:
421 LOG.info('Cleaning up port id %s, name %s' %
422 (port['id'], port['name']))
423 self.network_admin_client.delete_port(port['id'])
424 except exceptions.NotFound:
425 LOG.warn('Port id: %s, name %s not found for clean-up' %
426 (port['id'], port['name']))
427
428 def _clear_isolated_net_resources(self):
429 net_client = self.network_admin_client
430 for cred in self.isolated_net_resources:
431 network, subnet, router = self.isolated_net_resources.get(cred)
Salvatore Orlandocf996c62014-01-30 09:15:18 -0800432 LOG.debug("Clearing network: %(network)s, "
433 "subnet: %(subnet)s, router: %(router)s",
434 {'network': network, 'subnet': subnet, 'router': router})
435 if (not self.network_resources or
436 self.network_resources.get('router')):
Matthew Treinish9f756a02014-01-15 10:26:07 -0500437 try:
438 if self.tempest_client:
439 net_client.remove_router_interface_with_subnet_id(
440 router['id'], subnet['id'])
441 else:
442 body = {'subnet_id': subnet['id']}
443 net_client.remove_interface_router(router['id'], body)
444 except exceptions.NotFound:
445 LOG.warn('router with name: %s not found for delete' %
446 router['name'])
Matthew Treinish9f756a02014-01-15 10:26:07 -0500447 self._clear_isolated_router(router['id'], router['name'])
Salvatore Orlandocf996c62014-01-30 09:15:18 -0800448 if (not self.network_resources or
449 self.network_resources.get('network')):
Matthew Treinish9f756a02014-01-15 10:26:07 -0500450 # TODO(mlavalle) This method call will be removed once patch
451 # https://review.openstack.org/#/c/46563/ merges in Neutron
452 self._cleanup_ports(network['id'])
Salvatore Orlandocf996c62014-01-30 09:15:18 -0800453 if (not self.network_resources or
454 self.network_resources.get('subnet')):
Matthew Treinish9f756a02014-01-15 10:26:07 -0500455 self._clear_isolated_subnet(subnet['id'], subnet['name'])
Salvatore Orlandocf996c62014-01-30 09:15:18 -0800456 if (not self.network_resources or
457 self.network_resources.get('network')):
Matthew Treinish9f756a02014-01-15 10:26:07 -0500458 self._clear_isolated_network(network['id'], network['name'])
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500459
Matthew Treinishb86cda92013-07-29 11:22:23 -0400460 def clear_isolated_creds(self):
461 if not self.isolated_creds:
462 return
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500463 self._clear_isolated_net_resources()
Andrea Frittolifc315902014-03-20 09:21:44 +0000464 for creds in self.isolated_creds.itervalues():
Matthew Treinishb86cda92013-07-29 11:22:23 -0400465 try:
Andrea Frittolifc315902014-03-20 09:21:44 +0000466 self._delete_user(creds.user_id)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400467 except exceptions.NotFound:
Andrea Frittolifc315902014-03-20 09:21:44 +0000468 LOG.warn("user with name: %s not found for delete" %
469 creds.username)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400470 try:
Andrea Frittolifc315902014-03-20 09:21:44 +0000471 self._delete_tenant(creds.tenant_id)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400472 except exceptions.NotFound:
Andrea Frittolifc315902014-03-20 09:21:44 +0000473 LOG.warn("tenant with name: %s not found for delete" %
474 creds.tenant_name)