blob: 5c36747914354721ffa112be820cc4ac49b5e524 [file] [log] [blame]
Elena Ezhova1ec6e182013-12-24 17:45:59 +04001# Copyright 2014 OpenStack Foundation
2# All Rights Reserved.
3#
4# Licensed under the Apache License, Version 2.0 (the "License"); you may
5# not use this file except in compliance with the License. You may obtain
6# a copy of the License at
7#
8# http://www.apache.org/licenses/LICENSE-2.0
9#
10# Unless required by applicable law or agreed to in writing, software
11# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
12# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
13# License for the specific language governing permissions and limitations
14# under the License.
15
Matthew Treinish01472ff2015-02-20 17:26:52 -050016import netaddr
zhuflfffec232016-09-18 17:09:11 +080017import testtools
Matthew Treinish01472ff2015-02-20 17:26:52 -050018
Neeti Dahiyade291772014-09-22 10:43:12 +053019from tempest.api.network import base_security_groups as sec_base
Santosh Kumarf0cbf9a2014-08-25 07:31:15 -070020from tempest.common import custom_matchers
Andrea Frittolicd368412017-08-14 21:37:56 +010021from tempest.common import utils
Elena Ezhova1ec6e182013-12-24 17:45:59 +040022from tempest import config
Ken'ichi Ohmichif50e4df2017-03-10 10:52:53 -080023from tempest.lib.common.utils import data_utils
Ken'ichi Ohmichi53b9a632017-01-27 18:04:39 -080024from tempest.lib import decorators
Matthew Treinish4217a702016-10-07 17:27:11 -040025from tempest.lib import exceptions
Elena Ezhova1ec6e182013-12-24 17:45:59 +040026
27CONF = config.CONF
28
29
Neeti Dahiyade291772014-09-22 10:43:12 +053030class PortsTestJSON(sec_base.BaseSecGroupTest):
Ken'ichi Ohmichie03bea92015-11-19 07:45:58 +000031 """Test the following operations for ports:
Elena Ezhova5c957152014-03-26 12:01:10 +040032
33 port create
34 port delete
35 port list
36 port show
37 port update
38 """
39
Elena Ezhova1ec6e182013-12-24 17:45:59 +040040 @classmethod
Andrea Frittolida4a2452014-09-15 13:12:08 +010041 def resource_setup(cls):
42 super(PortsTestJSON, cls).resource_setup()
Elena Ezhova1ec6e182013-12-24 17:45:59 +040043 cls.network = cls.create_network()
44 cls.port = cls.create_port(cls.network)
45
46 def _delete_port(self, port_id):
John Warren49c0fe52015-10-22 12:35:54 -040047 self.ports_client.delete_port(port_id)
48 body = self.ports_client.list_ports()
Elena Ezhova1ec6e182013-12-24 17:45:59 +040049 ports_list = body['ports']
50 self.assertFalse(port_id in [n['id'] for n in ports_list])
51
Jordan Pittier3b46d272017-04-12 16:17:28 +020052 @decorators.attr(type='smoke')
Ken'ichi Ohmichi53b9a632017-01-27 18:04:39 -080053 @decorators.idempotent_id('c72c1c0c-2193-4aca-aaa4-b1442640f51c')
Elena Ezhova1ec6e182013-12-24 17:45:59 +040054 def test_create_update_delete_port(self):
55 # Verify port creation
John Warren49c0fe52015-10-22 12:35:54 -040056 body = self.ports_client.create_port(network_id=self.network['id'])
Elena Ezhova1ec6e182013-12-24 17:45:59 +040057 port = body['port']
Dane LeBlanccbc4bc52014-03-19 16:03:23 -040058 # Schedule port deletion with verification upon test completion
59 self.addCleanup(self._delete_port, port['id'])
Elena Ezhova1ec6e182013-12-24 17:45:59 +040060 self.assertTrue(port['admin_state_up'])
61 # Verify port update
62 new_name = "New_Port"
John Warren49c0fe52015-10-22 12:35:54 -040063 body = self.ports_client.update_port(port['id'],
64 name=new_name,
65 admin_state_up=False)
Elena Ezhova1ec6e182013-12-24 17:45:59 +040066 updated_port = body['port']
67 self.assertEqual(updated_port['name'], new_name)
68 self.assertFalse(updated_port['admin_state_up'])
Elena Ezhova1ec6e182013-12-24 17:45:59 +040069
Ken'ichi Ohmichi53b9a632017-01-27 18:04:39 -080070 @decorators.idempotent_id('67f1b811-f8db-43e2-86bd-72c074d4a42c')
abhishek6001472607373102014-11-25 04:39:20 -080071 def test_create_bulk_port(self):
72 network1 = self.network
zhufld2c40ca2016-10-18 17:03:07 +080073 network2 = self.create_network()
abhishek6001472607373102014-11-25 04:39:20 -080074 network_list = [network1['id'], network2['id']]
75 port_list = [{'network_id': net_id} for net_id in network_list]
Ken'ichi Ohmichi1f52fd92016-03-03 12:24:12 -080076 body = self.ports_client.create_bulk_ports(ports=port_list)
abhishek6001472607373102014-11-25 04:39:20 -080077 created_ports = body['ports']
78 port1 = created_ports[0]
79 port2 = created_ports[1]
80 self.addCleanup(self._delete_port, port1['id'])
81 self.addCleanup(self._delete_port, port2['id'])
82 self.assertEqual(port1['network_id'], network1['id'])
83 self.assertEqual(port2['network_id'], network2['id'])
84 self.assertTrue(port1['admin_state_up'])
85 self.assertTrue(port2['admin_state_up'])
86
abhishek60014726de45a5e2014-12-16 03:01:35 -080087 @classmethod
88 def _get_ipaddress_from_tempest_conf(cls):
Guillaume Chenuetbdf1d8d2015-11-09 16:10:48 +010089 """Return subnet with mask bits for configured CIDR """
abhishek60014726de45a5e2014-12-16 03:01:35 -080090 if cls._ip_version == 4:
Sean Dagueed6e5862016-04-04 10:49:13 -040091 cidr = netaddr.IPNetwork(CONF.network.project_network_cidr)
92 cidr.prefixlen = CONF.network.project_network_mask_bits
abhishek60014726de45a5e2014-12-16 03:01:35 -080093
94 elif cls._ip_version == 6:
Sean Dagueed6e5862016-04-04 10:49:13 -040095 cidr = netaddr.IPNetwork(CONF.network.project_network_v6_cidr)
96 cidr.prefixlen = CONF.network.project_network_v6_mask_bits
abhishek60014726de45a5e2014-12-16 03:01:35 -080097
Guillaume Chenuetbdf1d8d2015-11-09 16:10:48 +010098 return cidr
abhishek60014726de45a5e2014-12-16 03:01:35 -080099
Jordan Pittier3b46d272017-04-12 16:17:28 +0200100 @decorators.attr(type='smoke')
Ken'ichi Ohmichi53b9a632017-01-27 18:04:39 -0800101 @decorators.idempotent_id('0435f278-40ae-48cb-a404-b8a087bc09b1')
abhishek60014726de45a5e2014-12-16 03:01:35 -0800102 def test_create_port_in_allowed_allocation_pools(self):
103 network = self.create_network()
104 net_id = network['id']
105 address = self._get_ipaddress_from_tempest_conf()
Guillaume Chenuetbdf1d8d2015-11-09 16:10:48 +0100106 if ((address.version == 4 and address.prefixlen >= 30) or
107 (address.version == 6 and address.prefixlen >= 126)):
108 msg = ("Subnet %s isn't large enough for the test" % address.cidr)
zhuflff30ede2016-12-27 10:29:13 +0800109 raise exceptions.InvalidConfiguration(msg)
Guillaume Chenuetbdf1d8d2015-11-09 16:10:48 +0100110 allocation_pools = {'allocation_pools': [{'start': str(address[2]),
111 'end': str(address[-2])}]}
112 subnet = self.create_subnet(network, cidr=address,
113 mask_bits=address.prefixlen,
114 **allocation_pools)
John Warren3961acd2015-10-02 14:38:53 -0400115 self.addCleanup(self.subnets_client.delete_subnet, subnet['id'])
John Warren49c0fe52015-10-22 12:35:54 -0400116 body = self.ports_client.create_port(network_id=net_id)
117 self.addCleanup(self.ports_client.delete_port, body['port']['id'])
abhishek60014726de45a5e2014-12-16 03:01:35 -0800118 port = body['port']
119 ip_address = port['fixed_ips'][0]['ip_address']
120 start_ip_address = allocation_pools['allocation_pools'][0]['start']
121 end_ip_address = allocation_pools['allocation_pools'][0]['end']
122 ip_range = netaddr.IPRange(start_ip_address, end_ip_address)
123 self.assertIn(ip_address, ip_range)
124
Jordan Pittier3b46d272017-04-12 16:17:28 +0200125 @decorators.attr(type='smoke')
Ken'ichi Ohmichi53b9a632017-01-27 18:04:39 -0800126 @decorators.idempotent_id('c9a685bd-e83f-499c-939f-9f7863ca259f')
Elena Ezhova1ec6e182013-12-24 17:45:59 +0400127 def test_show_port(self):
128 # Verify the details of port
John Warren49c0fe52015-10-22 12:35:54 -0400129 body = self.ports_client.show_port(self.port['id'])
Elena Ezhova1ec6e182013-12-24 17:45:59 +0400130 port = body['port']
131 self.assertIn('id', port)
Rafael Folco72788022016-03-24 13:02:09 +0000132 # NOTE(rfolco): created_at and updated_at may get inconsistent values
133 # due to possible delay between POST request and resource creation.
134 # TODO(rfolco): Neutron Bug #1365341 is fixed, can remove the key
135 # extra_dhcp_opts in the O release (K/L gate jobs still need it).
Santosh Kumarf0cbf9a2014-08-25 07:31:15 -0700136 self.assertThat(self.port,
137 custom_matchers.MatchesDictExceptForKeys
Rafael Folco72788022016-03-24 13:02:09 +0000138 (port, excluded_keys=['extra_dhcp_opts',
139 'created_at',
140 'updated_at']))
Elena Ezhova1ec6e182013-12-24 17:45:59 +0400141
Ken'ichi Ohmichi53b9a632017-01-27 18:04:39 -0800142 @decorators.idempotent_id('45fcdaf2-dab0-4c13-ac6c-fcddfb579dbd')
Elena Ezhova1ec6e182013-12-24 17:45:59 +0400143 def test_show_port_fields(self):
144 # Verify specific fields of a port
Zhi Kun Liu903596c2014-04-11 08:55:53 -0500145 fields = ['id', 'mac_address']
John Warren49c0fe52015-10-22 12:35:54 -0400146 body = self.ports_client.show_port(self.port['id'],
147 fields=fields)
Elena Ezhova1ec6e182013-12-24 17:45:59 +0400148 port = body['port']
Zhi Kun Liu903596c2014-04-11 08:55:53 -0500149 self.assertEqual(sorted(port.keys()), sorted(fields))
150 for field_name in fields:
Elena Ezhova1ec6e182013-12-24 17:45:59 +0400151 self.assertEqual(port[field_name], self.port[field_name])
152
Jordan Pittier3b46d272017-04-12 16:17:28 +0200153 @decorators.attr(type='smoke')
Ken'ichi Ohmichi53b9a632017-01-27 18:04:39 -0800154 @decorators.idempotent_id('cf95b358-3e92-4a29-a148-52445e1ac50e')
Elena Ezhova1ec6e182013-12-24 17:45:59 +0400155 def test_list_ports(self):
156 # Verify the port exists in the list of all ports
John Warren49c0fe52015-10-22 12:35:54 -0400157 body = self.ports_client.list_ports()
Elena Ezhova1ec6e182013-12-24 17:45:59 +0400158 ports = [port['id'] for port in body['ports']
159 if port['id'] == self.port['id']]
160 self.assertNotEmpty(ports, "Created port not found in the list")
161
Ken'ichi Ohmichi53b9a632017-01-27 18:04:39 -0800162 @decorators.idempotent_id('e7fe260b-1e79-4dd3-86d9-bec6a7959fc5')
Arx Cruze8dfad92015-05-29 09:57:14 +0200163 def test_port_list_filter_by_ip(self):
164 # Create network and subnet
165 network = self.create_network()
166 subnet = self.create_subnet(network)
John Warren3961acd2015-10-02 14:38:53 -0400167 self.addCleanup(self.subnets_client.delete_subnet, subnet['id'])
Yaroslav Lobankov5d71ac82015-06-16 16:43:43 +0300168 # Create two ports
John Warren49c0fe52015-10-22 12:35:54 -0400169 port_1 = self.ports_client.create_port(network_id=network['id'])
170 self.addCleanup(self.ports_client.delete_port, port_1['port']['id'])
171 port_2 = self.ports_client.create_port(network_id=network['id'])
172 self.addCleanup(self.ports_client.delete_port, port_2['port']['id'])
Arx Cruze8dfad92015-05-29 09:57:14 +0200173 # List ports filtered by fixed_ips
Yaroslav Lobankov5d71ac82015-06-16 16:43:43 +0300174 port_1_fixed_ip = port_1['port']['fixed_ips'][0]['ip_address']
175 fixed_ips = 'ip_address=' + port_1_fixed_ip
John Warren49c0fe52015-10-22 12:35:54 -0400176 port_list = self.ports_client.list_ports(fixed_ips=fixed_ips)
Yaroslav Lobankov5d71ac82015-06-16 16:43:43 +0300177 # Check that we got the desired port
Arx Cruze8dfad92015-05-29 09:57:14 +0200178 ports = port_list['ports']
Matthew Treinish1d942542015-08-25 18:16:14 -0400179 tenant_ids = set([port['tenant_id'] for port in ports])
180 self.assertEqual(len(tenant_ids), 1,
181 'Ports from multiple tenants are in the list resp')
182 port_ids = [port['id'] for port in ports]
183 fixed_ips = [port['fixed_ips'] for port in ports]
184 port_ips = []
185 for addr in fixed_ips:
186 port_ips.extend([port['ip_address'] for port in addr])
187
188 port_net_ids = [port['network_id'] for port in ports]
189 self.assertIn(port_1['port']['id'], port_ids)
190 self.assertIn(port_1_fixed_ip, port_ips)
191 self.assertIn(network['id'], port_net_ids)
Arx Cruze8dfad92015-05-29 09:57:14 +0200192
Ken'ichi Ohmichi53b9a632017-01-27 18:04:39 -0800193 @decorators.idempotent_id('5ad01ed0-0e6e-4c5d-8194-232801b15c72')
Elena Ezhova1ec6e182013-12-24 17:45:59 +0400194 def test_port_list_filter_by_router_id(self):
195 # Create a router
196 network = self.create_network()
John Warren94d8faf2015-09-15 12:22:24 -0400197 self.addCleanup(self.networks_client.delete_network, network['id'])
Adam Gandelmane8650042015-01-16 11:36:37 -0800198 subnet = self.create_subnet(network)
John Warren3961acd2015-10-02 14:38:53 -0400199 self.addCleanup(self.subnets_client.delete_subnet, subnet['id'])
zhufl39ac5682016-10-24 17:11:34 +0800200 router = self.create_router()
Ken'ichi Ohmichie35f4722015-12-22 04:57:11 +0000201 self.addCleanup(self.routers_client.delete_router, router['id'])
John Warren49c0fe52015-10-22 12:35:54 -0400202 port = self.ports_client.create_port(network_id=network['id'])
Elena Ezhova1ec6e182013-12-24 17:45:59 +0400203 # Add router interface to port created above
Ken'ichi Ohmichie35f4722015-12-22 04:57:11 +0000204 self.routers_client.add_router_interface(router['id'],
205 port_id=port['port']['id'])
206 self.addCleanup(self.routers_client.remove_router_interface,
207 router['id'], port_id=port['port']['id'])
Elena Ezhova1ec6e182013-12-24 17:45:59 +0400208 # List ports filtered by router_id
John Warren49c0fe52015-10-22 12:35:54 -0400209 port_list = self.ports_client.list_ports(device_id=router['id'])
Elena Ezhova1ec6e182013-12-24 17:45:59 +0400210 ports = port_list['ports']
211 self.assertEqual(len(ports), 1)
212 self.assertEqual(ports[0]['id'], port['port']['id'])
213 self.assertEqual(ports[0]['device_id'], router['id'])
214
Ken'ichi Ohmichi53b9a632017-01-27 18:04:39 -0800215 @decorators.idempotent_id('ff7f117f-f034-4e0e-abff-ccef05c454b4')
Elena Ezhova1ec6e182013-12-24 17:45:59 +0400216 def test_list_ports_fields(self):
217 # Verify specific fields of ports
Zhi Kun Liu903596c2014-04-11 08:55:53 -0500218 fields = ['id', 'mac_address']
John Warren49c0fe52015-10-22 12:35:54 -0400219 body = self.ports_client.list_ports(fields=fields)
Elena Ezhova1ec6e182013-12-24 17:45:59 +0400220 ports = body['ports']
221 self.assertNotEmpty(ports, "Port list returned is empty")
222 # Asserting the fields returned are correct
223 for port in ports:
Zhi Kun Liu903596c2014-04-11 08:55:53 -0500224 self.assertEqual(sorted(fields), sorted(port.keys()))
Elena Ezhova1ec6e182013-12-24 17:45:59 +0400225
Ken'ichi Ohmichi53b9a632017-01-27 18:04:39 -0800226 @decorators.idempotent_id('63aeadd4-3b49-427f-a3b1-19ca81f06270')
Neeti Dahiyade291772014-09-22 10:43:12 +0530227 def test_create_update_port_with_second_ip(self):
Dane LeBlanccbc4bc52014-03-19 16:03:23 -0400228 # Create a network with two subnets
229 network = self.create_network()
John Warren94d8faf2015-09-15 12:22:24 -0400230 self.addCleanup(self.networks_client.delete_network, network['id'])
Dane LeBlanccbc4bc52014-03-19 16:03:23 -0400231 subnet_1 = self.create_subnet(network)
John Warren3961acd2015-10-02 14:38:53 -0400232 self.addCleanup(self.subnets_client.delete_subnet, subnet_1['id'])
Dane LeBlanccbc4bc52014-03-19 16:03:23 -0400233 subnet_2 = self.create_subnet(network)
John Warren3961acd2015-10-02 14:38:53 -0400234 self.addCleanup(self.subnets_client.delete_subnet, subnet_2['id'])
Dane LeBlanccbc4bc52014-03-19 16:03:23 -0400235 fixed_ip_1 = [{'subnet_id': subnet_1['id']}]
236 fixed_ip_2 = [{'subnet_id': subnet_2['id']}]
237
Dane LeBlanccbc4bc52014-03-19 16:03:23 -0400238 fixed_ips = fixed_ip_1 + fixed_ip_2
Neeti Dahiyade291772014-09-22 10:43:12 +0530239
240 # Create a port with multiple IP addresses
241 port = self.create_port(network,
242 fixed_ips=fixed_ips)
John Warren49c0fe52015-10-22 12:35:54 -0400243 self.addCleanup(self.ports_client.delete_port, port['id'])
Dane LeBlanccbc4bc52014-03-19 16:03:23 -0400244 self.assertEqual(2, len(port['fixed_ips']))
Neeti Dahiyade291772014-09-22 10:43:12 +0530245 check_fixed_ips = [subnet_1['id'], subnet_2['id']]
246 for item in port['fixed_ips']:
247 self.assertIn(item['subnet_id'], check_fixed_ips)
Dane LeBlanccbc4bc52014-03-19 16:03:23 -0400248
249 # Update the port to return to a single IP address
250 port = self.update_port(port, fixed_ips=fixed_ip_1)
251 self.assertEqual(1, len(port['fixed_ips']))
252
Neeti Dahiyade291772014-09-22 10:43:12 +0530253 # Update the port with a second IP address from second subnet
254 port = self.update_port(port, fixed_ips=fixed_ips)
255 self.assertEqual(2, len(port['fixed_ips']))
256
Ashish Guptadba59f92014-07-16 02:24:45 -0700257 def _update_port_with_security_groups(self, security_groups_names):
Neeti Dahiyade291772014-09-22 10:43:12 +0530258 subnet_1 = self.create_subnet(self.network)
John Warren3961acd2015-10-02 14:38:53 -0400259 self.addCleanup(self.subnets_client.delete_subnet, subnet_1['id'])
Neeti Dahiyade291772014-09-22 10:43:12 +0530260 fixed_ip_1 = [{'subnet_id': subnet_1['id']}]
261
Ashish Guptadba59f92014-07-16 02:24:45 -0700262 security_groups_list = list()
John Warrenf9606e92015-12-10 12:12:42 -0500263 sec_grps_client = self.security_groups_client
Ashish Guptadba59f92014-07-16 02:24:45 -0700264 for name in security_groups_names:
John Warrenf9606e92015-12-10 12:12:42 -0500265 group_create_body = sec_grps_client.create_security_group(
Ashish Guptadba59f92014-07-16 02:24:45 -0700266 name=name)
John Warrenf9606e92015-12-10 12:12:42 -0500267 self.addCleanup(self.security_groups_client.delete_security_group,
Ashish Guptadba59f92014-07-16 02:24:45 -0700268 group_create_body['security_group']['id'])
269 security_groups_list.append(group_create_body['security_group']
270 ['id'])
271 # Create a port
Neeti Dahiyade291772014-09-22 10:43:12 +0530272 sec_grp_name = data_utils.rand_name('secgroup')
John Warrenf9606e92015-12-10 12:12:42 -0500273 security_group = sec_grps_client.create_security_group(
274 name=sec_grp_name)
275 self.addCleanup(self.security_groups_client.delete_security_group,
Neeti Dahiyade291772014-09-22 10:43:12 +0530276 security_group['security_group']['id'])
277 post_body = {
278 "name": data_utils.rand_name('port-'),
279 "security_groups": [security_group['security_group']['id']],
280 "network_id": self.network['id'],
281 "admin_state_up": True,
282 "fixed_ips": fixed_ip_1}
John Warren49c0fe52015-10-22 12:35:54 -0400283 body = self.ports_client.create_port(**post_body)
284 self.addCleanup(self.ports_client.delete_port, body['port']['id'])
Ashish Guptadba59f92014-07-16 02:24:45 -0700285 port = body['port']
Neeti Dahiyade291772014-09-22 10:43:12 +0530286
Ashish Guptadba59f92014-07-16 02:24:45 -0700287 # Update the port with security groups
Neeti Dahiyade291772014-09-22 10:43:12 +0530288 subnet_2 = self.create_subnet(self.network)
289 fixed_ip_2 = [{'subnet_id': subnet_2['id']}]
290 update_body = {"name": data_utils.rand_name('port-'),
291 "admin_state_up": False,
292 "fixed_ips": fixed_ip_2,
293 "security_groups": security_groups_list}
John Warren49c0fe52015-10-22 12:35:54 -0400294 body = self.ports_client.update_port(port['id'], **update_body)
Ashish Guptadba59f92014-07-16 02:24:45 -0700295 port_show = body['port']
Neeti Dahiyade291772014-09-22 10:43:12 +0530296 # Verify the security groups and other attributes updated to port
297 exclude_keys = set(port_show).symmetric_difference(update_body)
298 exclude_keys.add('fixed_ips')
299 exclude_keys.add('security_groups')
300 self.assertThat(port_show, custom_matchers.MatchesDictExceptForKeys(
301 update_body, exclude_keys))
302 self.assertEqual(fixed_ip_2[0]['subnet_id'],
303 port_show['fixed_ips'][0]['subnet_id'])
304
Ashish Guptadba59f92014-07-16 02:24:45 -0700305 for security_group in security_groups_list:
306 self.assertIn(security_group, port_show['security_groups'])
307
Ken'ichi Ohmichi53b9a632017-01-27 18:04:39 -0800308 @decorators.idempotent_id('58091b66-4ff4-4cc1-a549-05d60c7acd1a')
zhuflfffec232016-09-18 17:09:11 +0800309 @testtools.skipUnless(
Andrea Frittolicd368412017-08-14 21:37:56 +0100310 utils.is_extension_enabled('security-group', 'network'),
zhuflfffec232016-09-18 17:09:11 +0800311 'security-group extension not enabled.')
Neeti Dahiyade291772014-09-22 10:43:12 +0530312 def test_update_port_with_security_group_and_extra_attributes(self):
Ashish Guptadba59f92014-07-16 02:24:45 -0700313 self._update_port_with_security_groups(
314 [data_utils.rand_name('secgroup')])
315
Ken'ichi Ohmichi53b9a632017-01-27 18:04:39 -0800316 @decorators.idempotent_id('edf6766d-3d40-4621-bc6e-2521a44c257d')
zhuflfffec232016-09-18 17:09:11 +0800317 @testtools.skipUnless(
Andrea Frittolicd368412017-08-14 21:37:56 +0100318 utils.is_extension_enabled('security-group', 'network'),
zhuflfffec232016-09-18 17:09:11 +0800319 'security-group extension not enabled.')
Neeti Dahiyade291772014-09-22 10:43:12 +0530320 def test_update_port_with_two_security_groups_and_extra_attributes(self):
Ashish Guptadba59f92014-07-16 02:24:45 -0700321 self._update_port_with_security_groups(
322 [data_utils.rand_name('secgroup'),
323 data_utils.rand_name('secgroup')])
324
Ken'ichi Ohmichi53b9a632017-01-27 18:04:39 -0800325 @decorators.idempotent_id('13e95171-6cbd-489c-9d7c-3f9c58215c18')
Ashish Guptad42b6e12014-11-20 02:06:03 -0800326 def test_create_show_delete_port_user_defined_mac(self):
327 # Create a port for a legal mac
John Warren49c0fe52015-10-22 12:35:54 -0400328 body = self.ports_client.create_port(network_id=self.network['id'])
Ashish Guptad42b6e12014-11-20 02:06:03 -0800329 old_port = body['port']
330 free_mac_address = old_port['mac_address']
John Warren49c0fe52015-10-22 12:35:54 -0400331 self.ports_client.delete_port(old_port['id'])
Ashish Guptad42b6e12014-11-20 02:06:03 -0800332 # Create a new port with user defined mac
John Warren49c0fe52015-10-22 12:35:54 -0400333 body = self.ports_client.create_port(network_id=self.network['id'],
334 mac_address=free_mac_address)
335 self.addCleanup(self.ports_client.delete_port, body['port']['id'])
Ashish Guptad42b6e12014-11-20 02:06:03 -0800336 port = body['port']
John Warren49c0fe52015-10-22 12:35:54 -0400337 body = self.ports_client.show_port(port['id'])
Ashish Guptad42b6e12014-11-20 02:06:03 -0800338 show_port = body['port']
339 self.assertEqual(free_mac_address,
340 show_port['mac_address'])
341
Jordan Pittier3b46d272017-04-12 16:17:28 +0200342 @decorators.attr(type='smoke')
Ken'ichi Ohmichi53b9a632017-01-27 18:04:39 -0800343 @decorators.idempotent_id('4179dcb9-1382-4ced-84fe-1b91c54f5735')
zhuflfffec232016-09-18 17:09:11 +0800344 @testtools.skipUnless(
Andrea Frittolicd368412017-08-14 21:37:56 +0100345 utils.is_extension_enabled('security-group', 'network'),
zhuflfffec232016-09-18 17:09:11 +0800346 'security-group extension not enabled.')
Rajkumar Thiyagarajan0f562a82014-08-21 01:59:19 -0700347 def test_create_port_with_no_securitygroups(self):
Salvatore18dd66e2014-12-31 00:13:57 +0100348 network = self.create_network()
John Warren94d8faf2015-09-15 12:22:24 -0400349 self.addCleanup(self.networks_client.delete_network, network['id'])
Adam Gandelmane8650042015-01-16 11:36:37 -0800350 subnet = self.create_subnet(network)
John Warren3961acd2015-10-02 14:38:53 -0400351 self.addCleanup(self.subnets_client.delete_subnet, subnet['id'])
Salvatore18dd66e2014-12-31 00:13:57 +0100352 port = self.create_port(network, security_groups=[])
John Warren49c0fe52015-10-22 12:35:54 -0400353 self.addCleanup(self.ports_client.delete_port, port['id'])
Rajkumar Thiyagarajan0f562a82014-08-21 01:59:19 -0700354 self.assertIsNotNone(port['security_groups'])
355 self.assertEmpty(port['security_groups'])
356
Elena Ezhova1ec6e182013-12-24 17:45:59 +0400357
Elena Ezhova1ec6e182013-12-24 17:45:59 +0400358class PortsIpV6TestJSON(PortsTestJSON):
359 _ip_version = 6