blob: 04dbc2d56ca099282e32519f616dc4b64dcc9d5d [file] [log] [blame]
Haiwei Xuc367d912014-01-14 19:51:10 +09001# Copyright 2014 NEC Corporation. All rights reserved.
2#
3# Licensed under the Apache License, Version 2.0 (the "License"); you may
4# not use this file except in compliance with the License. You may obtain
5# a copy of the License at
6#
7# http://www.apache.org/licenses/LICENSE-2.0
8#
9# Unless required by applicable law or agreed to in writing, software
10# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
11# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
12# License for the specific language governing permissions and limitations
13# under the License.
14
15from tempest.api.compute import base
Andrea Frittolicd368412017-08-14 21:37:56 +010016from tempest.common import utils
Haiwei Xuc367d912014-01-14 19:51:10 +090017from tempest import config
Ken'ichi Ohmichi757833a2017-03-10 10:30:30 -080018from tempest.lib.common.utils import data_utils
Andrea Frittoli (andreaf)db9672e2016-02-23 14:07:24 -050019from tempest.lib import decorators
20from tempest.lib import exceptions as lib_exc
Haiwei Xuc367d912014-01-14 19:51:10 +090021
22CONF = config.CONF
23
24
zhufl95d75252018-03-28 09:55:04 +080025class QuotasAdminNegativeTestBase(base.BaseV2ComputeAdminTest):
Haiwei Xuc367d912014-01-14 19:51:10 +090026 force_tenant_isolation = True
27
28 @classmethod
Rohan Kanade60b73092015-02-04 17:58:19 +053029 def setup_clients(cls):
zhufl95d75252018-03-28 09:55:04 +080030 super(QuotasAdminNegativeTestBase, cls).setup_clients()
Jordan Pittier8160d312017-04-18 11:52:23 +020031 cls.client = cls.os_primary.quotas_client
32 cls.adm_client = cls.os_admin.quotas_client
Haiwei Xuc367d912014-01-14 19:51:10 +090033 cls.sg_client = cls.security_groups_client
Ken'ichi Ohmichi685cd172015-07-13 01:29:57 +000034 cls.sgr_client = cls.security_group_rules_client
Haiwei Xuc367d912014-01-14 19:51:10 +090035
Rohan Kanade60b73092015-02-04 17:58:19 +053036 @classmethod
37 def resource_setup(cls):
zhufl95d75252018-03-28 09:55:04 +080038 super(QuotasAdminNegativeTestBase, cls).resource_setup()
Haiwei Xuc367d912014-01-14 19:51:10 +090039 # NOTE(afazekas): these test cases should always create and use a new
40 # tenant most of them should be skipped if we can't do that
Andrea Frittoli9612e812014-03-13 10:57:26 +000041 cls.demo_tenant_id = cls.client.tenant_id
Haiwei Xuc367d912014-01-14 19:51:10 +090042
zhuflaa5e41a2016-11-16 16:21:26 +080043 def _update_quota(self, quota_item, quota_value):
44 quota_set = (self.adm_client.show_quota_set(self.demo_tenant_id)
45 ['quota_set'])
46 default_quota_value = quota_set[quota_item]
47
48 self.adm_client.update_quota_set(self.demo_tenant_id,
49 force=True,
50 **{quota_item: quota_value})
51 self.addCleanup(self.adm_client.update_quota_set, self.demo_tenant_id,
52 **{quota_item: default_quota_value})
53
zhufl95d75252018-03-28 09:55:04 +080054
55class QuotasAdminNegativeTest(QuotasAdminNegativeTestBase):
zhufla0e87dc2020-05-13 15:52:15 +080056 """Negative tests of nova quotas"""
zhufl95d75252018-03-28 09:55:04 +080057
Jordan Pittier3b46d272017-04-12 16:17:28 +020058 @decorators.attr(type=['negative'])
Ken'ichi Ohmichiebbfd1c2017-01-27 16:37:00 -080059 @decorators.idempotent_id('733abfe8-166e-47bb-8363-23dbd7ff3476')
Haiwei Xuc367d912014-01-14 19:51:10 +090060 def test_update_quota_normal_user(self):
zhufla0e87dc2020-05-13 15:52:15 +080061 """Test updating nova quota by normal user should fail"""
Masayuki Igawa6b1cd292015-02-16 11:11:55 +090062 self.assertRaises(lib_exc.Forbidden,
Haiwei Xuc367d912014-01-14 19:51:10 +090063 self.client.update_quota_set,
64 self.demo_tenant_id,
65 ram=0)
66
Yaroslav Lobankov4f4834e2015-09-14 17:50:38 +030067 # TODO(afazekas): Add dedicated tenant to the skipped quota tests.
68 # It can be moved into the setUpClass as well.
Jordan Pittier3b46d272017-04-12 16:17:28 +020069 @decorators.attr(type=['negative'])
Ken'ichi Ohmichiebbfd1c2017-01-27 16:37:00 -080070 @decorators.idempotent_id('91058876-9947-4807-9f22-f6eb17140d9b')
Haiwei Xuc367d912014-01-14 19:51:10 +090071 def test_create_server_when_cpu_quota_is_full(self):
zhufla0e87dc2020-05-13 15:52:15 +080072 """Disallow server creation when tenant's vcpu quota is full"""
zhuflaa5e41a2016-11-16 16:21:26 +080073 self._update_quota('cores', 0)
Masayuki Igawa6b1cd292015-02-16 11:11:55 +090074 self.assertRaises((lib_exc.Forbidden, lib_exc.OverLimit),
ZHU ZHU35762542014-09-01 01:58:49 -050075 self.create_test_server)
Haiwei Xuc367d912014-01-14 19:51:10 +090076
Jordan Pittier3b46d272017-04-12 16:17:28 +020077 @decorators.attr(type=['negative'])
Ken'ichi Ohmichiebbfd1c2017-01-27 16:37:00 -080078 @decorators.idempotent_id('6fdd7012-584d-4327-a61c-49122e0d5864')
Haiwei Xuc367d912014-01-14 19:51:10 +090079 def test_create_server_when_memory_quota_is_full(self):
zhufla0e87dc2020-05-13 15:52:15 +080080 """Disallow server creation when tenant's memory quota is full"""
zhuflaa5e41a2016-11-16 16:21:26 +080081 self._update_quota('ram', 0)
Masayuki Igawa6b1cd292015-02-16 11:11:55 +090082 self.assertRaises((lib_exc.Forbidden, lib_exc.OverLimit),
ZHU ZHU35762542014-09-01 01:58:49 -050083 self.create_test_server)
Haiwei Xuc367d912014-01-14 19:51:10 +090084
Jordan Pittier3b46d272017-04-12 16:17:28 +020085 @decorators.attr(type=['negative'])
Ken'ichi Ohmichiebbfd1c2017-01-27 16:37:00 -080086 @decorators.idempotent_id('7c6be468-0274-449a-81c3-ac1c32ee0161')
Haiwei Xuc367d912014-01-14 19:51:10 +090087 def test_create_server_when_instances_quota_is_full(self):
zhufla0e87dc2020-05-13 15:52:15 +080088 """Once instances quota limit is reached, disallow server creation"""
zhuflaa5e41a2016-11-16 16:21:26 +080089 self._update_quota('instances', 0)
Masayuki Igawa6b1cd292015-02-16 11:11:55 +090090 self.assertRaises((lib_exc.Forbidden, lib_exc.OverLimit),
ZHU ZHU35762542014-09-01 01:58:49 -050091 self.create_test_server)
Haiwei Xuc367d912014-01-14 19:51:10 +090092
zhufl95d75252018-03-28 09:55:04 +080093
94class QuotasSecurityGroupAdminNegativeTest(QuotasAdminNegativeTestBase):
zhufla0e87dc2020-05-13 15:52:15 +080095 """Negative tests of nova security group quota"""
96
zhufl95d75252018-03-28 09:55:04 +080097 max_microversion = '2.35'
98
Matthew Treinishc49fcbe2015-02-05 23:37:34 -050099 @decorators.skip_because(bug="1186354",
100 condition=CONF.service_available.neutron)
Jordan Pittier3b46d272017-04-12 16:17:28 +0200101 @decorators.attr(type=['negative'])
Ken'ichi Ohmichiebbfd1c2017-01-27 16:37:00 -0800102 @decorators.idempotent_id('7c6c8f3b-2bf6-4918-b240-57b136a66aa0')
Andrea Frittolicd368412017-08-14 21:37:56 +0100103 @utils.services('network')
Haiwei Xuc367d912014-01-14 19:51:10 +0900104 def test_security_groups_exceed_limit(self):
zhufla0e87dc2020-05-13 15:52:15 +0800105 """Negative test: Creation Security Groups over limit should FAIL"""
Joseph Lanouxffe09dd2015-03-18 16:45:33 +0000106 # Set the quota to number of used security groups
ghanshyam8a599492015-08-24 15:55:59 +0900107 sg_quota = self.limits_client.show_limits()['limits']['absolute'][
Joseph Lanouxffe09dd2015-03-18 16:45:33 +0000108 'totalSecurityGroupsUsed']
zhuflaa5e41a2016-11-16 16:21:26 +0800109 self._update_quota('security_groups', sg_quota)
Haiwei Xuc367d912014-01-14 19:51:10 +0900110
111 # Check we cannot create anymore
Chris Yeoh60d5ce92014-06-27 13:59:23 +0930112 # A 403 Forbidden or 413 Overlimit (old behaviour) exception
113 # will be raised when out of quota
Masayuki Igawa6b1cd292015-02-16 11:11:55 +0900114 self.assertRaises((lib_exc.Forbidden, lib_exc.OverLimit),
Haiwei Xuc367d912014-01-14 19:51:10 +0900115 self.sg_client.create_security_group,
Ken'ichi Ohmichi34563cc2015-07-21 00:53:17 +0000116 name="sg-overlimit", description="sg-desc")
Haiwei Xuc367d912014-01-14 19:51:10 +0900117
Matthew Treinishc49fcbe2015-02-05 23:37:34 -0500118 @decorators.skip_because(bug="1186354",
119 condition=CONF.service_available.neutron)
Jordan Pittier3b46d272017-04-12 16:17:28 +0200120 @decorators.attr(type=['negative'])
Ken'ichi Ohmichiebbfd1c2017-01-27 16:37:00 -0800121 @decorators.idempotent_id('6e9f436d-f1ed-4f8e-a493-7275dfaa4b4d')
Andrea Frittolicd368412017-08-14 21:37:56 +0100122 @utils.services('network')
Haiwei Xuc367d912014-01-14 19:51:10 +0900123 def test_security_groups_rules_exceed_limit(self):
zhufla0e87dc2020-05-13 15:52:15 +0800124 """Negative test: Creation of Security Group Rules should FAIL"""
Haiwei Xuc367d912014-01-14 19:51:10 +0900125 # when we reach limit maxSecurityGroupRules
zhuflaa5e41a2016-11-16 16:21:26 +0800126 self._update_quota('security_group_rules', 0)
Haiwei Xuc367d912014-01-14 19:51:10 +0900127
Ken'ichi Ohmichi4937f562015-03-23 00:15:01 +0000128 s_name = data_utils.rand_name('securitygroup')
129 s_description = data_utils.rand_name('description')
ghanshyamb610b772015-08-24 17:29:38 +0900130 securitygroup = self.sg_client.create_security_group(
131 name=s_name, description=s_description)['security_group']
Haiwei Xuc367d912014-01-14 19:51:10 +0900132 self.addCleanup(self.sg_client.delete_security_group,
133 securitygroup['id'])
134
135 secgroup_id = securitygroup['id']
136 ip_protocol = 'tcp'
137
138 # Check we cannot create SG rule anymore
Chris Yeoh60d5ce92014-06-27 13:59:23 +0930139 # A 403 Forbidden or 413 Overlimit (old behaviour) exception
140 # will be raised when out of quota
Masayuki Igawa6b1cd292015-02-16 11:11:55 +0900141 self.assertRaises((lib_exc.OverLimit, lib_exc.Forbidden),
Ken'ichi Ohmichi685cd172015-07-13 01:29:57 +0000142 self.sgr_client.create_security_group_rule,
Ken'ichi Ohmichieb7eeec2015-07-21 01:00:06 +0000143 parent_group_id=secgroup_id, ip_protocol=ip_protocol,
144 from_port=1025, to_port=1025)