Anju Tiwari | 860097d | 2013-10-17 11:10:39 +0530 | [diff] [blame] | 1 | # Copyright 2013 OpenStack Foundation |
| 2 | # All Rights Reserved. |
| 3 | # |
| 4 | # Licensed under the Apache License, Version 2.0 (the "License"); you may |
| 5 | # not use this file except in compliance with the License. You may obtain |
| 6 | # a copy of the License at |
| 7 | # |
| 8 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | # |
| 10 | # Unless required by applicable law or agreed to in writing, software |
| 11 | # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| 12 | # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the |
| 13 | # License for the specific language governing permissions and limitations |
| 14 | # under the License. |
| 15 | |
Matthew Treinish | 01472ff | 2015-02-20 17:26:52 -0500 | [diff] [blame] | 16 | from tempest_lib.common.utils import data_utils |
Masayuki Igawa | bfa0760 | 2015-01-20 18:47:17 +0900 | [diff] [blame] | 17 | from tempest_lib import exceptions as lib_exc |
| 18 | |
Anju Tiwari | 860097d | 2013-10-17 11:10:39 +0530 | [diff] [blame] | 19 | from tempest.api.network import base |
Matthew Treinish | 03b48df | 2014-01-29 16:59:49 +0000 | [diff] [blame] | 20 | from tempest import config |
mouad benchchaoui | ea2440d | 2013-12-22 00:38:06 +0100 | [diff] [blame] | 21 | from tempest import test |
Anju Tiwari | 860097d | 2013-10-17 11:10:39 +0530 | [diff] [blame] | 22 | |
Matthew Treinish | 03b48df | 2014-01-29 16:59:49 +0000 | [diff] [blame] | 23 | CONF = config.CONF |
| 24 | |
Anju Tiwari | 860097d | 2013-10-17 11:10:39 +0530 | [diff] [blame] | 25 | |
Miguel Lavalle | 3581e46 | 2014-03-27 19:01:46 -0500 | [diff] [blame] | 26 | class VPNaaSTestJSON(base.BaseAdminNetworkTest): |
Anju Tiwari | 860097d | 2013-10-17 11:10:39 +0530 | [diff] [blame] | 27 | """ |
| 28 | Tests the following operations in the Neutron API using the REST client for |
| 29 | Neutron: |
Miguel Lavalle | 3581e46 | 2014-03-27 19:01:46 -0500 | [diff] [blame] | 30 | List, Show, Create, Delete, and Update VPN Service |
raiesmh08 | bd6070d | 2013-12-06 15:13:38 +0530 | [diff] [blame] | 31 | List, Show, Create, Delete, and Update IKE policy |
Miguel Lavalle | 3581e46 | 2014-03-27 19:01:46 -0500 | [diff] [blame] | 32 | List, Show, Create, Delete, and Update IPSec policy |
Anju Tiwari | 860097d | 2013-10-17 11:10:39 +0530 | [diff] [blame] | 33 | """ |
| 34 | |
| 35 | @classmethod |
Rohan Kanade | a565e45 | 2015-01-27 14:00:13 +0530 | [diff] [blame^] | 36 | def skip_checks(cls): |
| 37 | super(VPNaaSTestJSON, cls).skip_checks() |
mouad benchchaoui | ea2440d | 2013-12-22 00:38:06 +0100 | [diff] [blame] | 38 | if not test.is_extension_enabled('vpnaas', 'network'): |
| 39 | msg = "vpnaas extension not enabled." |
| 40 | raise cls.skipException(msg) |
Rohan Kanade | a565e45 | 2015-01-27 14:00:13 +0530 | [diff] [blame^] | 41 | |
| 42 | @classmethod |
| 43 | def resource_setup(cls): |
Andrea Frittoli | da4a245 | 2014-09-15 13:12:08 +0100 | [diff] [blame] | 44 | super(VPNaaSTestJSON, cls).resource_setup() |
vikas | a347ffd | 2014-09-30 23:19:10 -0700 | [diff] [blame] | 45 | cls.ext_net_id = CONF.network.public_network_id |
Anju Tiwari | 860097d | 2013-10-17 11:10:39 +0530 | [diff] [blame] | 46 | cls.network = cls.create_network() |
| 47 | cls.subnet = cls.create_subnet(cls.network) |
Nachi Ueno | 41ecf5b | 2013-12-10 13:26:33 -0800 | [diff] [blame] | 48 | cls.router = cls.create_router( |
Miguel Lavalle | 3581e46 | 2014-03-27 19:01:46 -0500 | [diff] [blame] | 49 | data_utils.rand_name("router"), |
Matthew Treinish | 03b48df | 2014-01-29 16:59:49 +0000 | [diff] [blame] | 50 | external_network_id=CONF.network.public_network_id) |
Anju Tiwari | 860097d | 2013-10-17 11:10:39 +0530 | [diff] [blame] | 51 | cls.create_router_interface(cls.router['id'], cls.subnet['id']) |
| 52 | cls.vpnservice = cls.create_vpnservice(cls.subnet['id'], |
| 53 | cls.router['id']) |
Miguel Lavalle | 3581e46 | 2014-03-27 19:01:46 -0500 | [diff] [blame] | 54 | |
Eugene Nikanorov | 909ded1 | 2013-12-15 17:45:37 +0400 | [diff] [blame] | 55 | cls.ikepolicy = cls.create_ikepolicy( |
| 56 | data_utils.rand_name("ike-policy-")) |
raiesmh08 | df3fac4 | 2014-06-02 15:42:18 +0530 | [diff] [blame] | 57 | cls.ipsecpolicy = cls.create_ipsecpolicy( |
| 58 | data_utils.rand_name("ipsec-policy-")) |
raiesmh08 | bd6070d | 2013-12-06 15:13:38 +0530 | [diff] [blame] | 59 | |
| 60 | def _delete_ike_policy(self, ike_policy_id): |
| 61 | # Deletes a ike policy and verifies if it is deleted or not |
| 62 | ike_list = list() |
David Kranz | 34e8812 | 2014-12-11 15:24:05 -0500 | [diff] [blame] | 63 | all_ike = self.client.list_ikepolicies() |
raiesmh08 | bd6070d | 2013-12-06 15:13:38 +0530 | [diff] [blame] | 64 | for ike in all_ike['ikepolicies']: |
| 65 | ike_list.append(ike['id']) |
| 66 | if ike_policy_id in ike_list: |
Rohan Kanade | eeb2164 | 2014-08-14 12:00:26 +0200 | [diff] [blame] | 67 | self.client.delete_ikepolicy(ike_policy_id) |
raiesmh08 | bd6070d | 2013-12-06 15:13:38 +0530 | [diff] [blame] | 68 | # Asserting that the policy is not found in list after deletion |
David Kranz | 34e8812 | 2014-12-11 15:24:05 -0500 | [diff] [blame] | 69 | ikepolicies = self.client.list_ikepolicies() |
raiesmh08 | bd6070d | 2013-12-06 15:13:38 +0530 | [diff] [blame] | 70 | ike_id_list = list() |
| 71 | for i in ikepolicies['ikepolicies']: |
| 72 | ike_id_list.append(i['id']) |
| 73 | self.assertNotIn(ike_policy_id, ike_id_list) |
Anju Tiwari | 860097d | 2013-10-17 11:10:39 +0530 | [diff] [blame] | 74 | |
raiesmh08 | df3fac4 | 2014-06-02 15:42:18 +0530 | [diff] [blame] | 75 | def _delete_ipsec_policy(self, ipsec_policy_id): |
| 76 | # Deletes an ike policy if it exists |
| 77 | try: |
| 78 | self.client.delete_ipsecpolicy(ipsec_policy_id) |
| 79 | |
Masayuki Igawa | bfa0760 | 2015-01-20 18:47:17 +0900 | [diff] [blame] | 80 | except lib_exc.NotFound: |
raiesmh08 | df3fac4 | 2014-06-02 15:42:18 +0530 | [diff] [blame] | 81 | pass |
| 82 | |
| 83 | def _assertExpected(self, expected, actual): |
| 84 | # Check if not expected keys/values exists in actual response body |
| 85 | for key, value in expected.iteritems(): |
| 86 | self.assertIn(key, actual) |
| 87 | self.assertEqual(value, actual[key]) |
| 88 | |
Miguel Lavalle | 3581e46 | 2014-03-27 19:01:46 -0500 | [diff] [blame] | 89 | def _delete_vpn_service(self, vpn_service_id): |
Rohan Kanade | eeb2164 | 2014-08-14 12:00:26 +0200 | [diff] [blame] | 90 | self.client.delete_vpnservice(vpn_service_id) |
Miguel Lavalle | 3581e46 | 2014-03-27 19:01:46 -0500 | [diff] [blame] | 91 | # Asserting if vpn service is found in the list after deletion |
David Kranz | 34e8812 | 2014-12-11 15:24:05 -0500 | [diff] [blame] | 92 | body = self.client.list_vpnservices() |
Miguel Lavalle | 3581e46 | 2014-03-27 19:01:46 -0500 | [diff] [blame] | 93 | vpn_services = [vs['id'] for vs in body['vpnservices']] |
| 94 | self.assertNotIn(vpn_service_id, vpn_services) |
| 95 | |
| 96 | def _get_tenant_id(self): |
| 97 | """ |
| 98 | Returns the tenant_id of the client current user |
| 99 | """ |
| 100 | # TODO(jroovers) This is a temporary workaround to get the tenant_id |
| 101 | # of the the current client. Replace this once tenant_isolation for |
| 102 | # neutron is fixed. |
David Kranz | 34e8812 | 2014-12-11 15:24:05 -0500 | [diff] [blame] | 103 | body = self.client.show_network(self.network['id']) |
Miguel Lavalle | 3581e46 | 2014-03-27 19:01:46 -0500 | [diff] [blame] | 104 | return body['network']['tenant_id'] |
| 105 | |
| 106 | @test.attr(type='smoke') |
Chris Hoge | 7579c1a | 2015-02-26 14:12:15 -0800 | [diff] [blame] | 107 | @test.idempotent_id('14311574-0737-4e53-ac05-f7ae27742eed') |
Miguel Lavalle | 3581e46 | 2014-03-27 19:01:46 -0500 | [diff] [blame] | 108 | def test_admin_create_ipsec_policy_for_tenant(self): |
| 109 | tenant_id = self._get_tenant_id() |
| 110 | # Create IPSec policy for the newly created tenant |
| 111 | name = data_utils.rand_name('ipsec-policy') |
David Kranz | 34e8812 | 2014-12-11 15:24:05 -0500 | [diff] [blame] | 112 | body = (self.admin_client. |
| 113 | create_ipsecpolicy(name=name, tenant_id=tenant_id)) |
Miguel Lavalle | 3581e46 | 2014-03-27 19:01:46 -0500 | [diff] [blame] | 114 | ipsecpolicy = body['ipsecpolicy'] |
| 115 | self.assertIsNotNone(ipsecpolicy['id']) |
| 116 | self.addCleanup(self.admin_client.delete_ipsecpolicy, |
| 117 | ipsecpolicy['id']) |
| 118 | |
| 119 | # Assert that created ipsec policy is found in API list call |
David Kranz | 34e8812 | 2014-12-11 15:24:05 -0500 | [diff] [blame] | 120 | body = self.client.list_ipsecpolicies() |
Miguel Lavalle | 3581e46 | 2014-03-27 19:01:46 -0500 | [diff] [blame] | 121 | ipsecpolicies = [policy['id'] for policy in body['ipsecpolicies']] |
| 122 | self.assertIn(ipsecpolicy['id'], ipsecpolicies) |
| 123 | |
| 124 | @test.attr(type='smoke') |
Chris Hoge | 7579c1a | 2015-02-26 14:12:15 -0800 | [diff] [blame] | 125 | @test.idempotent_id('b62acdc6-0c53-4d84-84aa-859b22b79799') |
Miguel Lavalle | 3581e46 | 2014-03-27 19:01:46 -0500 | [diff] [blame] | 126 | def test_admin_create_vpn_service_for_tenant(self): |
| 127 | tenant_id = self._get_tenant_id() |
| 128 | |
| 129 | # Create vpn service for the newly created tenant |
vikas | a347ffd | 2014-09-30 23:19:10 -0700 | [diff] [blame] | 130 | network2 = self.create_network() |
| 131 | subnet2 = self.create_subnet(network2) |
| 132 | router2 = self.create_router(data_utils.rand_name('router-'), |
| 133 | external_network_id=self.ext_net_id) |
| 134 | self.create_router_interface(router2['id'], subnet2['id']) |
Miguel Lavalle | 3581e46 | 2014-03-27 19:01:46 -0500 | [diff] [blame] | 135 | name = data_utils.rand_name('vpn-service') |
David Kranz | 34e8812 | 2014-12-11 15:24:05 -0500 | [diff] [blame] | 136 | body = self.admin_client.create_vpnservice( |
vikas | a347ffd | 2014-09-30 23:19:10 -0700 | [diff] [blame] | 137 | subnet_id=subnet2['id'], |
| 138 | router_id=router2['id'], |
Miguel Lavalle | 3581e46 | 2014-03-27 19:01:46 -0500 | [diff] [blame] | 139 | name=name, |
| 140 | admin_state_up=True, |
| 141 | tenant_id=tenant_id) |
Miguel Lavalle | 3581e46 | 2014-03-27 19:01:46 -0500 | [diff] [blame] | 142 | vpnservice = body['vpnservice'] |
| 143 | self.assertIsNotNone(vpnservice['id']) |
| 144 | self.addCleanup(self.admin_client.delete_vpnservice, vpnservice['id']) |
Miguel Lavalle | 3581e46 | 2014-03-27 19:01:46 -0500 | [diff] [blame] | 145 | # Assert that created vpnservice is found in API list call |
David Kranz | 34e8812 | 2014-12-11 15:24:05 -0500 | [diff] [blame] | 146 | body = self.client.list_vpnservices() |
Miguel Lavalle | 3581e46 | 2014-03-27 19:01:46 -0500 | [diff] [blame] | 147 | vpn_services = [vs['id'] for vs in body['vpnservices']] |
| 148 | self.assertIn(vpnservice['id'], vpn_services) |
| 149 | |
| 150 | @test.attr(type='smoke') |
Chris Hoge | 7579c1a | 2015-02-26 14:12:15 -0800 | [diff] [blame] | 151 | @test.idempotent_id('58cc4a1c-443b-4f39-8fb6-c19d39f343ab') |
Miguel Lavalle | 3581e46 | 2014-03-27 19:01:46 -0500 | [diff] [blame] | 152 | def test_admin_create_ike_policy_for_tenant(self): |
| 153 | tenant_id = self._get_tenant_id() |
| 154 | |
| 155 | # Create IKE policy for the newly created tenant |
| 156 | name = data_utils.rand_name('ike-policy') |
David Kranz | 34e8812 | 2014-12-11 15:24:05 -0500 | [diff] [blame] | 157 | body = (self.admin_client. |
| 158 | create_ikepolicy(name=name, ike_version="v1", |
| 159 | encryption_algorithm="aes-128", |
| 160 | auth_algorithm="sha1", |
| 161 | tenant_id=tenant_id)) |
Miguel Lavalle | 3581e46 | 2014-03-27 19:01:46 -0500 | [diff] [blame] | 162 | ikepolicy = body['ikepolicy'] |
| 163 | self.assertIsNotNone(ikepolicy['id']) |
| 164 | self.addCleanup(self.admin_client.delete_ikepolicy, ikepolicy['id']) |
| 165 | |
| 166 | # Assert that created ike policy is found in API list call |
David Kranz | 34e8812 | 2014-12-11 15:24:05 -0500 | [diff] [blame] | 167 | body = self.client.list_ikepolicies() |
Miguel Lavalle | 3581e46 | 2014-03-27 19:01:46 -0500 | [diff] [blame] | 168 | ikepolicies = [ikp['id'] for ikp in body['ikepolicies']] |
| 169 | self.assertIn(ikepolicy['id'], ikepolicies) |
| 170 | |
mouad benchchaoui | ea2440d | 2013-12-22 00:38:06 +0100 | [diff] [blame] | 171 | @test.attr(type='smoke') |
Chris Hoge | 7579c1a | 2015-02-26 14:12:15 -0800 | [diff] [blame] | 172 | @test.idempotent_id('de5bb04c-3a1f-46b1-b329-7a8abba5c7f1') |
Anju Tiwari | 860097d | 2013-10-17 11:10:39 +0530 | [diff] [blame] | 173 | def test_list_vpn_services(self): |
| 174 | # Verify the VPN service exists in the list of all VPN services |
David Kranz | 34e8812 | 2014-12-11 15:24:05 -0500 | [diff] [blame] | 175 | body = self.client.list_vpnservices() |
Anju Tiwari | 860097d | 2013-10-17 11:10:39 +0530 | [diff] [blame] | 176 | vpnservices = body['vpnservices'] |
| 177 | self.assertIn(self.vpnservice['id'], [v['id'] for v in vpnservices]) |
| 178 | |
mouad benchchaoui | ea2440d | 2013-12-22 00:38:06 +0100 | [diff] [blame] | 179 | @test.attr(type='smoke') |
Chris Hoge | 7579c1a | 2015-02-26 14:12:15 -0800 | [diff] [blame] | 180 | @test.idempotent_id('aacb13b1-fdc7-41fd-bab2-32621aee1878') |
Anju Tiwari | 860097d | 2013-10-17 11:10:39 +0530 | [diff] [blame] | 181 | def test_create_update_delete_vpn_service(self): |
Miguel Lavalle | 3581e46 | 2014-03-27 19:01:46 -0500 | [diff] [blame] | 182 | # Creates a VPN service and sets up deletion |
vikas | a347ffd | 2014-09-30 23:19:10 -0700 | [diff] [blame] | 183 | network1 = self.create_network() |
| 184 | subnet1 = self.create_subnet(network1) |
| 185 | router1 = self.create_router(data_utils.rand_name('router-'), |
| 186 | external_network_id=self.ext_net_id) |
| 187 | self.create_router_interface(router1['id'], subnet1['id']) |
| 188 | name = data_utils.rand_name('vpn-service1') |
David Kranz | 34e8812 | 2014-12-11 15:24:05 -0500 | [diff] [blame] | 189 | body = self.client.create_vpnservice(subnet_id=subnet1['id'], |
| 190 | router_id=router1['id'], |
| 191 | name=name, |
| 192 | admin_state_up=True) |
Anju Tiwari | 860097d | 2013-10-17 11:10:39 +0530 | [diff] [blame] | 193 | vpnservice = body['vpnservice'] |
Miguel Lavalle | 3581e46 | 2014-03-27 19:01:46 -0500 | [diff] [blame] | 194 | self.addCleanup(self._delete_vpn_service, vpnservice['id']) |
Anju Tiwari | 860097d | 2013-10-17 11:10:39 +0530 | [diff] [blame] | 195 | # Assert if created vpnservices are not found in vpnservices list |
David Kranz | 34e8812 | 2014-12-11 15:24:05 -0500 | [diff] [blame] | 196 | body = self.client.list_vpnservices() |
Anju Tiwari | 860097d | 2013-10-17 11:10:39 +0530 | [diff] [blame] | 197 | vpn_services = [vs['id'] for vs in body['vpnservices']] |
| 198 | self.assertIsNotNone(vpnservice['id']) |
| 199 | self.assertIn(vpnservice['id'], vpn_services) |
| 200 | |
| 201 | # TODO(raies): implement logic to update vpnservice |
| 202 | # VPNaaS client function to update is implemented. |
| 203 | # But precondition is that current state of vpnservice |
| 204 | # should be "ACTIVE" not "PENDING*" |
| 205 | |
mouad benchchaoui | ea2440d | 2013-12-22 00:38:06 +0100 | [diff] [blame] | 206 | @test.attr(type='smoke') |
Chris Hoge | 7579c1a | 2015-02-26 14:12:15 -0800 | [diff] [blame] | 207 | @test.idempotent_id('0dedfc1d-f8ee-4e2a-bfd4-7997b9dc17ff') |
Anju Tiwari | 860097d | 2013-10-17 11:10:39 +0530 | [diff] [blame] | 208 | def test_show_vpn_service(self): |
| 209 | # Verifies the details of a vpn service |
David Kranz | 34e8812 | 2014-12-11 15:24:05 -0500 | [diff] [blame] | 210 | body = self.client.show_vpnservice(self.vpnservice['id']) |
Anju Tiwari | 860097d | 2013-10-17 11:10:39 +0530 | [diff] [blame] | 211 | vpnservice = body['vpnservice'] |
| 212 | self.assertEqual(self.vpnservice['id'], vpnservice['id']) |
| 213 | self.assertEqual(self.vpnservice['name'], vpnservice['name']) |
| 214 | self.assertEqual(self.vpnservice['description'], |
| 215 | vpnservice['description']) |
| 216 | self.assertEqual(self.vpnservice['router_id'], vpnservice['router_id']) |
| 217 | self.assertEqual(self.vpnservice['subnet_id'], vpnservice['subnet_id']) |
| 218 | self.assertEqual(self.vpnservice['tenant_id'], vpnservice['tenant_id']) |
Miguel Lavalle | 3581e46 | 2014-03-27 19:01:46 -0500 | [diff] [blame] | 219 | valid_status = ["ACTIVE", "DOWN", "BUILD", "ERROR", "PENDING_CREATE", |
| 220 | "PENDING_UPDATE", "PENDING_DELETE"] |
| 221 | self.assertIn(vpnservice['status'], valid_status) |
raiesmh08 | bd6070d | 2013-12-06 15:13:38 +0530 | [diff] [blame] | 222 | |
mouad benchchaoui | ea2440d | 2013-12-22 00:38:06 +0100 | [diff] [blame] | 223 | @test.attr(type='smoke') |
Chris Hoge | 7579c1a | 2015-02-26 14:12:15 -0800 | [diff] [blame] | 224 | @test.idempotent_id('e0fb6200-da3d-4869-8340-a8c1956ca618') |
raiesmh08 | bd6070d | 2013-12-06 15:13:38 +0530 | [diff] [blame] | 225 | def test_list_ike_policies(self): |
| 226 | # Verify the ike policy exists in the list of all IKE policies |
David Kranz | 34e8812 | 2014-12-11 15:24:05 -0500 | [diff] [blame] | 227 | body = self.client.list_ikepolicies() |
raiesmh08 | bd6070d | 2013-12-06 15:13:38 +0530 | [diff] [blame] | 228 | ikepolicies = body['ikepolicies'] |
| 229 | self.assertIn(self.ikepolicy['id'], [i['id'] for i in ikepolicies]) |
| 230 | |
mouad benchchaoui | ea2440d | 2013-12-22 00:38:06 +0100 | [diff] [blame] | 231 | @test.attr(type='smoke') |
Chris Hoge | 7579c1a | 2015-02-26 14:12:15 -0800 | [diff] [blame] | 232 | @test.idempotent_id('d61f29a5-160c-487d-bc0d-22e32e731b44') |
raiesmh08 | bd6070d | 2013-12-06 15:13:38 +0530 | [diff] [blame] | 233 | def test_create_update_delete_ike_policy(self): |
| 234 | # Creates a IKE policy |
Miguel Lavalle | 3581e46 | 2014-03-27 19:01:46 -0500 | [diff] [blame] | 235 | name = data_utils.rand_name('ike-policy') |
David Kranz | 34e8812 | 2014-12-11 15:24:05 -0500 | [diff] [blame] | 236 | body = (self.client.create_ikepolicy( |
| 237 | name=name, |
| 238 | ike_version="v1", |
| 239 | encryption_algorithm="aes-128", |
| 240 | auth_algorithm="sha1")) |
raiesmh08 | bd6070d | 2013-12-06 15:13:38 +0530 | [diff] [blame] | 241 | ikepolicy = body['ikepolicy'] |
Miguel Lavalle | 3581e46 | 2014-03-27 19:01:46 -0500 | [diff] [blame] | 242 | self.assertIsNotNone(ikepolicy['id']) |
raiesmh08 | bd6070d | 2013-12-06 15:13:38 +0530 | [diff] [blame] | 243 | self.addCleanup(self._delete_ike_policy, ikepolicy['id']) |
Miguel Lavalle | 3581e46 | 2014-03-27 19:01:46 -0500 | [diff] [blame] | 244 | |
| 245 | # Update IKE Policy |
| 246 | new_ike = {'name': data_utils.rand_name("New-IKE"), |
| 247 | 'description': "Updated ike policy", |
| 248 | 'encryption_algorithm': "aes-256", |
| 249 | 'ike_version': "v2", |
| 250 | 'pfs': "group14", |
| 251 | 'lifetime': {'units': "seconds", 'value': 2000}} |
Rohan Kanade | eeb2164 | 2014-08-14 12:00:26 +0200 | [diff] [blame] | 252 | self.client.update_ikepolicy(ikepolicy['id'], **new_ike) |
Miguel Lavalle | 3581e46 | 2014-03-27 19:01:46 -0500 | [diff] [blame] | 253 | # Confirm that update was successful by verifying using 'show' |
David Kranz | 34e8812 | 2014-12-11 15:24:05 -0500 | [diff] [blame] | 254 | body = self.client.show_ikepolicy(ikepolicy['id']) |
Miguel Lavalle | 3581e46 | 2014-03-27 19:01:46 -0500 | [diff] [blame] | 255 | ike_policy = body['ikepolicy'] |
| 256 | for key, value in new_ike.iteritems(): |
| 257 | self.assertIn(key, ike_policy) |
| 258 | self.assertEqual(value, ike_policy[key]) |
| 259 | |
raiesmh08 | bd6070d | 2013-12-06 15:13:38 +0530 | [diff] [blame] | 260 | # Verification of ike policy delete |
Rohan Kanade | eeb2164 | 2014-08-14 12:00:26 +0200 | [diff] [blame] | 261 | self.client.delete_ikepolicy(ikepolicy['id']) |
David Kranz | 34e8812 | 2014-12-11 15:24:05 -0500 | [diff] [blame] | 262 | body = self.client.list_ikepolicies() |
Miguel Lavalle | 3581e46 | 2014-03-27 19:01:46 -0500 | [diff] [blame] | 263 | ikepolicies = [ikp['id'] for ikp in body['ikepolicies']] |
| 264 | self.assertNotIn(ike_policy['id'], ikepolicies) |
raiesmh08 | bd6070d | 2013-12-06 15:13:38 +0530 | [diff] [blame] | 265 | |
mouad benchchaoui | ea2440d | 2013-12-22 00:38:06 +0100 | [diff] [blame] | 266 | @test.attr(type='smoke') |
Chris Hoge | 7579c1a | 2015-02-26 14:12:15 -0800 | [diff] [blame] | 267 | @test.idempotent_id('b5fcf3a3-9407-452d-b8a8-e7c6c32baea8') |
raiesmh08 | bd6070d | 2013-12-06 15:13:38 +0530 | [diff] [blame] | 268 | def test_show_ike_policy(self): |
| 269 | # Verifies the details of a ike policy |
David Kranz | 34e8812 | 2014-12-11 15:24:05 -0500 | [diff] [blame] | 270 | body = self.client.show_ikepolicy(self.ikepolicy['id']) |
raiesmh08 | bd6070d | 2013-12-06 15:13:38 +0530 | [diff] [blame] | 271 | ikepolicy = body['ikepolicy'] |
| 272 | self.assertEqual(self.ikepolicy['id'], ikepolicy['id']) |
| 273 | self.assertEqual(self.ikepolicy['name'], ikepolicy['name']) |
| 274 | self.assertEqual(self.ikepolicy['description'], |
| 275 | ikepolicy['description']) |
| 276 | self.assertEqual(self.ikepolicy['encryption_algorithm'], |
| 277 | ikepolicy['encryption_algorithm']) |
| 278 | self.assertEqual(self.ikepolicy['auth_algorithm'], |
| 279 | ikepolicy['auth_algorithm']) |
| 280 | self.assertEqual(self.ikepolicy['tenant_id'], |
| 281 | ikepolicy['tenant_id']) |
| 282 | self.assertEqual(self.ikepolicy['pfs'], |
| 283 | ikepolicy['pfs']) |
| 284 | self.assertEqual(self.ikepolicy['phase1_negotiation_mode'], |
| 285 | ikepolicy['phase1_negotiation_mode']) |
| 286 | self.assertEqual(self.ikepolicy['ike_version'], |
| 287 | ikepolicy['ike_version']) |
Mh Raies | c440bca | 2014-04-04 12:05:48 +0530 | [diff] [blame] | 288 | |
raiesmh08 | df3fac4 | 2014-06-02 15:42:18 +0530 | [diff] [blame] | 289 | @test.attr(type='smoke') |
Chris Hoge | 7579c1a | 2015-02-26 14:12:15 -0800 | [diff] [blame] | 290 | @test.idempotent_id('19ea0a2f-add9-44be-b732-ffd8a7b42f37') |
raiesmh08 | df3fac4 | 2014-06-02 15:42:18 +0530 | [diff] [blame] | 291 | def test_list_ipsec_policies(self): |
| 292 | # Verify the ipsec policy exists in the list of all ipsec policies |
David Kranz | 34e8812 | 2014-12-11 15:24:05 -0500 | [diff] [blame] | 293 | body = self.client.list_ipsecpolicies() |
raiesmh08 | df3fac4 | 2014-06-02 15:42:18 +0530 | [diff] [blame] | 294 | ipsecpolicies = body['ipsecpolicies'] |
| 295 | self.assertIn(self.ipsecpolicy['id'], [i['id'] for i in ipsecpolicies]) |
| 296 | |
| 297 | @test.attr(type='smoke') |
Chris Hoge | 7579c1a | 2015-02-26 14:12:15 -0800 | [diff] [blame] | 298 | @test.idempotent_id('9c1701c9-329a-4e5d-930a-1ead1b3f86ad') |
raiesmh08 | df3fac4 | 2014-06-02 15:42:18 +0530 | [diff] [blame] | 299 | def test_create_update_delete_ipsec_policy(self): |
| 300 | # Creates an ipsec policy |
| 301 | ipsec_policy_body = {'name': data_utils.rand_name('ipsec-policy'), |
| 302 | 'pfs': 'group5', |
| 303 | 'encryption_algorithm': "aes-128", |
| 304 | 'auth_algorithm': 'sha1'} |
David Kranz | 34e8812 | 2014-12-11 15:24:05 -0500 | [diff] [blame] | 305 | resp_body = self.client.create_ipsecpolicy(**ipsec_policy_body) |
raiesmh08 | df3fac4 | 2014-06-02 15:42:18 +0530 | [diff] [blame] | 306 | ipsecpolicy = resp_body['ipsecpolicy'] |
| 307 | self.addCleanup(self._delete_ipsec_policy, ipsecpolicy['id']) |
| 308 | self._assertExpected(ipsec_policy_body, ipsecpolicy) |
| 309 | # Verification of ipsec policy update |
| 310 | new_ipsec = {'description': 'Updated ipsec policy', |
| 311 | 'pfs': 'group2', |
| 312 | 'name': data_utils.rand_name("New-IPSec"), |
| 313 | 'encryption_algorithm': "aes-256", |
| 314 | 'lifetime': {'units': "seconds", 'value': '2000'}} |
David Kranz | 34e8812 | 2014-12-11 15:24:05 -0500 | [diff] [blame] | 315 | body = self.client.update_ipsecpolicy(ipsecpolicy['id'], |
| 316 | **new_ipsec) |
raiesmh08 | df3fac4 | 2014-06-02 15:42:18 +0530 | [diff] [blame] | 317 | updated_ipsec_policy = body['ipsecpolicy'] |
| 318 | self._assertExpected(new_ipsec, updated_ipsec_policy) |
| 319 | # Verification of ipsec policy delete |
Rohan Kanade | eeb2164 | 2014-08-14 12:00:26 +0200 | [diff] [blame] | 320 | self.client.delete_ipsecpolicy(ipsecpolicy['id']) |
Masayuki Igawa | bfa0760 | 2015-01-20 18:47:17 +0900 | [diff] [blame] | 321 | self.assertRaises(lib_exc.NotFound, |
raiesmh08 | df3fac4 | 2014-06-02 15:42:18 +0530 | [diff] [blame] | 322 | self.client.delete_ipsecpolicy, ipsecpolicy['id']) |
| 323 | |
| 324 | @test.attr(type='smoke') |
Chris Hoge | 7579c1a | 2015-02-26 14:12:15 -0800 | [diff] [blame] | 325 | @test.idempotent_id('601f8a05-9d3c-4539-a400-1c4b3a21b03b') |
raiesmh08 | df3fac4 | 2014-06-02 15:42:18 +0530 | [diff] [blame] | 326 | def test_show_ipsec_policy(self): |
| 327 | # Verifies the details of an ipsec policy |
David Kranz | 34e8812 | 2014-12-11 15:24:05 -0500 | [diff] [blame] | 328 | body = self.client.show_ipsecpolicy(self.ipsecpolicy['id']) |
raiesmh08 | df3fac4 | 2014-06-02 15:42:18 +0530 | [diff] [blame] | 329 | ipsecpolicy = body['ipsecpolicy'] |
| 330 | self._assertExpected(self.ipsecpolicy, ipsecpolicy) |