| # Copyright 2017 Red Hat, Inc. |
| # All Rights Reserved. |
| # |
| # Licensed under the Apache License, Version 2.0 (the "License"); you may |
| # not use this file except in compliance with the License. You may obtain |
| # a copy of the License at |
| # |
| # http://www.apache.org/licenses/LICENSE-2.0 |
| # |
| # Unless required by applicable law or agreed to in writing, software |
| # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the |
| # License for the specific language governing permissions and limitations |
| # under the License. |
| |
| import functools |
| |
| from neutron_lib.api.definitions import portbindings as pb |
| from neutron_lib import constants as const |
| from tempest.common import utils |
| from tempest.lib import decorators |
| import testtools |
| |
| from neutron_tempest_plugin.common import utils as common_utils |
| from neutron_tempest_plugin import config |
| from neutron_tempest_plugin.scenario import base |
| from neutron_tempest_plugin.scenario import test_dvr |
| |
| CONF = config.CONF |
| |
| |
| class NetworkMigrationTestBase(base.BaseTempestTestCase, |
| test_dvr.NetworkTestMixin): |
| credentials = ['primary', 'admin'] |
| force_tenant_isolation = False |
| |
| @classmethod |
| @utils.requires_ext(extension="dvr", service="network") |
| @utils.requires_ext(extension="l3-ha", service="network") |
| def skip_checks(cls): |
| super(NetworkMigrationTestBase, cls).skip_checks() |
| |
| def _check_update(self, router, is_dvr, is_ha): |
| router = self.os_admin.network_client.show_router(router['id']) |
| self.assertEqual(is_dvr, router['router']['distributed']) |
| self.assertEqual(is_ha, router['router']['ha']) |
| |
| def _wait_until_port_deleted(self, router_id, device_owner): |
| common_utils.wait_until_true( |
| functools.partial( |
| self._is_port_deleted, |
| router_id, |
| device_owner), |
| timeout=300, sleep=5) |
| |
| def _is_port_deleted(self, router_id, device_owner): |
| ports = self.os_admin.network_client.list_ports( |
| device_id=router_id, |
| device_owner=device_owner) |
| return not ports.get('ports') |
| |
| def _wait_until_port_ready(self, router_id, device_owner): |
| common_utils.wait_until_true( |
| functools.partial( |
| self._is_port_active, |
| router_id, |
| device_owner), |
| timeout=300, sleep=5) |
| |
| def _wait_until_router_ports_down(self, router_id): |
| |
| def _is_port_down(port_id): |
| port = self.os_admin.network_client.show_port(port_id).get('port') |
| return port['status'] == const.DOWN |
| |
| ports = self.os_admin.network_client.list_ports( |
| device_id=router_id).get('ports') |
| for port in ports: |
| common_utils.wait_until_true( |
| functools.partial(_is_port_down, port['id']), |
| timeout=300, sleep=5) |
| |
| def _is_port_active(self, router_id, device_owner): |
| ports = self.os_admin.network_client.list_ports( |
| device_id=router_id, |
| device_owner=device_owner, |
| status=const.ACTIVE).get('ports') |
| if ports: |
| if ports[0][pb.VIF_TYPE] not in [pb.VIF_TYPE_UNBOUND, |
| pb.VIF_TYPE_BINDING_FAILED]: |
| return True |
| return False |
| |
| def _wait_until_router_ports_ready(self, router_id, dvr, ha): |
| if dvr: |
| self._wait_until_port_ready( |
| router_id, const.DEVICE_OWNER_DVR_INTERFACE) |
| if ha: |
| self._wait_until_port_ready( |
| router_id, const.DEVICE_OWNER_ROUTER_HA_INTF) |
| if dvr: |
| self._wait_until_port_ready( |
| router_id, const.DEVICE_OWNER_ROUTER_SNAT) |
| else: |
| self._wait_until_port_ready( |
| router_id, const.DEVICE_OWNER_HA_REPLICATED_INT) |
| self._wait_until_port_ready( |
| router_id, const.DEVICE_OWNER_ROUTER_GW) |
| |
| def _wait_until_router_ports_migrated( |
| self, router_id, before_dvr, before_ha, after_dvr, after_ha): |
| if before_ha and not after_ha: |
| self._wait_until_port_deleted( |
| router_id, const.DEVICE_OWNER_ROUTER_HA_INTF) |
| self._wait_until_port_deleted( |
| router_id, const.DEVICE_OWNER_HA_REPLICATED_INT) |
| if before_dvr and not after_dvr: |
| self._wait_until_port_deleted( |
| router_id, const.DEVICE_OWNER_DVR_INTERFACE) |
| self._wait_until_port_deleted( |
| router_id, const.DEVICE_OWNER_ROUTER_SNAT) |
| self._wait_until_router_ports_ready(router_id, after_dvr, after_ha) |
| |
| def _test_migration(self, before_dvr, before_ha, after_dvr, after_ha): |
| router = self.create_router_by_client( |
| distributed=before_dvr, ha=before_ha, |
| tenant_id=self.client.tenant_id, is_admin=True) |
| |
| self.setup_network_and_server(router=router) |
| self._wait_until_router_ports_ready( |
| router['id'], before_dvr, before_ha) |
| self._check_connectivity() |
| |
| self.os_admin.network_client.update_router( |
| router_id=router['id'], admin_state_up=False) |
| self._wait_until_router_ports_down(router['id']) |
| |
| self.os_admin.network_client.update_router( |
| router_id=router['id'], distributed=after_dvr, ha=after_ha) |
| self._check_update(router, after_dvr, after_ha) |
| |
| self.os_admin.network_client.update_router( |
| router_id=router['id'], admin_state_up=True) |
| |
| self._wait_until_router_ports_migrated( |
| router['id'], before_dvr, before_ha, after_dvr, after_ha) |
| self._check_connectivity() |
| |
| |
| class NetworkMigrationFromLegacy(NetworkMigrationTestBase): |
| |
| @decorators.idempotent_id('23724222-483a-4129-bc15-7a9278f3828b') |
| @testtools.skipUnless( |
| CONF.neutron_plugin_options.l3_agent_mode == 'dvr_snat', |
| "Need dvr_snat agent mode assumption.") |
| def test_from_legacy_to_dvr(self): |
| self._test_migration(before_dvr=False, before_ha=False, |
| after_dvr=True, after_ha=False) |
| |
| @decorators.idempotent_id('09d85102-994f-4ff9-bf3e-17051145ca12') |
| def test_from_legacy_to_ha(self): |
| self._test_migration(before_dvr=False, before_ha=False, |
| after_dvr=False, after_ha=True) |
| |
| @decorators.idempotent_id('fe169f2c-6ed3-4eb0-8afe-2d540c4b49e2') |
| @testtools.skipUnless( |
| CONF.neutron_plugin_options.l3_agent_mode == 'dvr_snat', |
| "Need dvr_snat agent mode assumption.") |
| def test_from_legacy_to_dvr_ha(self): |
| self._test_migration(before_dvr=False, before_ha=False, |
| after_dvr=True, after_ha=True) |
| |
| |
| class NetworkMigrationFromHA(NetworkMigrationTestBase): |
| |
| @decorators.idempotent_id('b4e68ac0-3b76-4306-ae8a-51cf4d363b22') |
| def test_from_ha_to_legacy(self): |
| self._test_migration(before_dvr=False, before_ha=True, |
| after_dvr=False, after_ha=False) |
| |
| @decorators.idempotent_id('42260eea-5d56-4d30-b62a-a62694dfe4d5') |
| @testtools.skipUnless( |
| CONF.neutron_plugin_options.l3_agent_mode == 'dvr_snat', |
| "Need dvr_snat agent mode assumption.") |
| def test_from_ha_to_dvr(self): |
| self._test_migration(before_dvr=False, before_ha=True, |
| after_dvr=True, after_ha=False) |
| |
| @decorators.idempotent_id('e4149576-248b-43fa-9d0b-a5c2f51967ce') |
| @testtools.skipUnless( |
| CONF.neutron_plugin_options.l3_agent_mode == 'dvr_snat', |
| "Need dvr_snat agent mode assumption.") |
| def test_from_ha_to_dvr_ha(self): |
| self._test_migration(before_dvr=False, before_ha=True, |
| after_dvr=True, after_ha=True) |
| |
| |
| class NetworkMigrationFromDVR(NetworkMigrationTestBase): |
| |
| @decorators.idempotent_id('e5cac02c-248d-4aac-bd5e-9d47c5197307') |
| @testtools.skipUnless( |
| CONF.neutron_plugin_options.l3_agent_mode == 'dvr_snat', |
| "Need dvr_snat agent mode assumption.") |
| def test_from_dvr_to_legacy(self): |
| self._test_migration(before_dvr=True, before_ha=False, |
| after_dvr=False, after_ha=False) |
| |
| @decorators.idempotent_id('a00d5ad7-8509-4bb0-bdd2-7f1ee052d1cd') |
| @testtools.skipUnless( |
| CONF.neutron_plugin_options.l3_agent_mode == 'dvr_snat', |
| "Need dvr_snat agent mode assumption.") |
| def test_from_dvr_to_ha(self): |
| self._test_migration(before_dvr=True, before_ha=False, |
| after_dvr=False, after_ha=True) |
| |
| @decorators.idempotent_id('25304a51-93a8-4cf3-9523-bce8b4eaecf8') |
| @testtools.skipUnless( |
| CONF.neutron_plugin_options.l3_agent_mode == 'dvr_snat', |
| "Need dvr_snat agent mode assumption.") |
| def test_from_dvr_to_dvr_ha(self): |
| self._test_migration(before_dvr=True, before_ha=False, |
| after_dvr=True, after_ha=True) |
| |
| |
| class NetworkMigrationFromDVRHA(NetworkMigrationTestBase): |
| |
| @common_utils.unstable_test("bug 1756301") |
| @decorators.idempotent_id('1be9b2e2-379c-40a4-a269-6687b81df691') |
| @testtools.skipUnless( |
| CONF.neutron_plugin_options.l3_agent_mode == 'dvr_snat', |
| "Need dvr_snat agent mode assumption.") |
| def test_from_dvr_ha_to_legacy(self): |
| self._test_migration(before_dvr=True, before_ha=True, |
| after_dvr=False, after_ha=False) |
| |
| @common_utils.unstable_test("bug 1756301") |
| @decorators.idempotent_id('55957267-4e84-4314-a2f7-7cd36a2df04b') |
| @testtools.skipUnless( |
| CONF.neutron_plugin_options.l3_agent_mode == 'dvr_snat', |
| "Need dvr_snat agent mode assumption.") |
| def test_from_dvr_ha_to_ha(self): |
| self._test_migration(before_dvr=True, before_ha=True, |
| after_dvr=False, after_ha=True) |
| |
| @common_utils.unstable_test("bug 1756301") |
| @decorators.idempotent_id('d6bedff1-72be-4a9a-8ea2-dc037cd838e0') |
| @testtools.skipUnless( |
| CONF.neutron_plugin_options.l3_agent_mode == 'dvr_snat', |
| "Need dvr_snat agent mode assumption.") |
| def test_from_dvr_ha_to_dvr(self): |
| self._test_migration(before_dvr=True, before_ha=True, |
| after_dvr=True, after_ha=False) |