|  | # Copyright (c) 2017 Midokura SARL | 
|  | # All Rights Reserved. | 
|  | # | 
|  | #    Licensed under the Apache License, Version 2.0 (the "License"); you may | 
|  | #    not use this file except in compliance with the License. You may obtain | 
|  | #    a copy of the License at | 
|  | # | 
|  | #         http://www.apache.org/licenses/LICENSE-2.0 | 
|  | # | 
|  | #    Unless required by applicable law or agreed to in writing, software | 
|  | #    distributed under the License is distributed on an "AS IS" BASIS, WITHOUT | 
|  | #    WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the | 
|  | #    License for the specific language governing permissions and limitations | 
|  | #    under the License. | 
|  |  | 
|  | import time | 
|  |  | 
|  | import ddt | 
|  | from neutron_lib import constants as lib_constants | 
|  | from neutron_lib.services.qos import constants as qos_consts | 
|  | from oslo_log import log | 
|  | from tempest.common import utils | 
|  | from tempest.common import waiters | 
|  | from tempest.lib.common.utils import data_utils | 
|  | from tempest.lib import decorators | 
|  | from tempest.lib import exceptions | 
|  | import testtools | 
|  |  | 
|  | from neutron_tempest_plugin.api import base as base_api | 
|  | from neutron_tempest_plugin.common import ssh | 
|  | from neutron_tempest_plugin.common import utils as common_utils | 
|  | from neutron_tempest_plugin import config | 
|  | from neutron_tempest_plugin.scenario import base | 
|  | from neutron_tempest_plugin.scenario import constants | 
|  | from neutron_tempest_plugin.scenario import test_qos | 
|  |  | 
|  |  | 
|  | CONF = config.CONF | 
|  | LOG = log.getLogger(__name__) | 
|  |  | 
|  |  | 
|  | class FloatingIpTestCasesMixin(object): | 
|  | credentials = ['primary', 'admin'] | 
|  |  | 
|  | @classmethod | 
|  | @utils.requires_ext(extension="router", service="network") | 
|  | def resource_setup(cls): | 
|  | super(FloatingIpTestCasesMixin, cls).resource_setup() | 
|  | cls.network = cls.create_network() | 
|  | cls.subnet = cls.create_subnet(cls.network) | 
|  | cls.router = cls.create_router_by_client() | 
|  | cls.create_router_interface(cls.router['id'], cls.subnet['id']) | 
|  | cls.keypair = cls.create_keypair() | 
|  |  | 
|  | cls.secgroup = cls.os_primary.network_client.create_security_group( | 
|  | name=data_utils.rand_name('secgroup'))['security_group'] | 
|  | cls.security_groups.append(cls.secgroup) | 
|  | cls.create_loginable_secgroup_rule(secgroup_id=cls.secgroup['id']) | 
|  | cls.create_pingable_secgroup_rule(secgroup_id=cls.secgroup['id']) | 
|  |  | 
|  | if cls.same_network: | 
|  | cls._dest_network = cls.network | 
|  | else: | 
|  | cls._dest_network = cls._create_dest_network() | 
|  |  | 
|  | @classmethod | 
|  | def _get_external_gateway(cls): | 
|  | if CONF.network.public_network_id: | 
|  | subnets = cls.os_admin.network_client.list_subnets( | 
|  | network_id=CONF.network.public_network_id) | 
|  |  | 
|  | for subnet in subnets['subnets']: | 
|  | if (subnet['gateway_ip'] and | 
|  | subnet['ip_version'] == lib_constants.IP_VERSION_4): | 
|  | return subnet['gateway_ip'] | 
|  |  | 
|  | @classmethod | 
|  | def _create_dest_network(cls): | 
|  | network = cls.create_network() | 
|  | subnet = cls.create_subnet(network) | 
|  | cls.create_router_interface(cls.router['id'], subnet['id']) | 
|  | return network | 
|  |  | 
|  | def _create_server(self, create_floating_ip=True, network=None): | 
|  | if network is None: | 
|  | network = self.network | 
|  | port = self.create_port(network, security_groups=[self.secgroup['id']]) | 
|  | if create_floating_ip: | 
|  | fip = self.create_floatingip(port=port) | 
|  | else: | 
|  | fip = None | 
|  | server = self.create_server( | 
|  | flavor_ref=CONF.compute.flavor_ref, | 
|  | image_ref=CONF.compute.image_ref, | 
|  | key_name=self.keypair['name'], | 
|  | networks=[{'port': port['id']}])['server'] | 
|  | waiters.wait_for_server_status(self.os_primary.servers_client, | 
|  | server['id'], | 
|  | constants.SERVER_STATUS_ACTIVE) | 
|  | return {'port': port, 'fip': fip, 'server': server} | 
|  |  | 
|  | def _test_east_west(self, src_has_fip, dest_has_fip): | 
|  | # The proxy VM is used to control the source VM when it doesn't | 
|  | # have a floating-ip. | 
|  | if src_has_fip: | 
|  | proxy = None | 
|  | proxy_client = None | 
|  | else: | 
|  | proxy = self._create_server() | 
|  | proxy_client = ssh.Client(proxy['fip']['floating_ip_address'], | 
|  | CONF.validation.image_ssh_user, | 
|  | pkey=self.keypair['private_key']) | 
|  |  | 
|  | # Source VM | 
|  | if src_has_fip: | 
|  | src_server = self._create_server() | 
|  | src_server_ip = src_server['fip']['floating_ip_address'] | 
|  | else: | 
|  | src_server = self._create_server(create_floating_ip=False) | 
|  | src_server_ip = src_server['port']['fixed_ips'][0]['ip_address'] | 
|  | ssh_client = ssh.Client(src_server_ip, | 
|  | CONF.validation.image_ssh_user, | 
|  | pkey=self.keypair['private_key'], | 
|  | proxy_client=proxy_client) | 
|  |  | 
|  | # Destination VM | 
|  | if dest_has_fip: | 
|  | dest_server = self._create_server(network=self._dest_network) | 
|  | else: | 
|  | dest_server = self._create_server(create_floating_ip=False, | 
|  | network=self._dest_network) | 
|  |  | 
|  | # Check connectivity | 
|  | self.check_remote_connectivity(ssh_client, | 
|  | dest_server['port']['fixed_ips'][0]['ip_address'], | 
|  | servers=[src_server, dest_server]) | 
|  | if dest_has_fip: | 
|  | self.check_remote_connectivity(ssh_client, | 
|  | dest_server['fip']['floating_ip_address'], | 
|  | servers=[src_server, dest_server]) | 
|  |  | 
|  |  | 
|  | @ddt.ddt | 
|  | class FloatingIpSameNetwork(FloatingIpTestCasesMixin, | 
|  | base.BaseTempestTestCase): | 
|  |  | 
|  | same_network = True | 
|  |  | 
|  | @decorators.idempotent_id('05c4e3b3-7319-4052-90ad-e8916436c23b') | 
|  | @ddt.unpack | 
|  | @ddt.data({'src_has_fip': True, 'dest_has_fip': True}, | 
|  | {'src_has_fip': True, 'dest_has_fip': False}, | 
|  | {'src_has_fip': False, 'dest_has_fip': True}, | 
|  | {'src_has_fip': True, 'dest_has_fip': False}) | 
|  | def test_east_west(self, src_has_fip, dest_has_fip): | 
|  | self._test_east_west(src_has_fip=src_has_fip, | 
|  | dest_has_fip=dest_has_fip) | 
|  |  | 
|  |  | 
|  | @ddt.ddt | 
|  | class FloatingIpSeparateNetwork(FloatingIpTestCasesMixin, | 
|  | base.BaseTempestTestCase): | 
|  |  | 
|  | same_network = False | 
|  |  | 
|  | @decorators.idempotent_id('f18f0090-3289-4783-b956-a0f8ac511e8b') | 
|  | @ddt.unpack | 
|  | @ddt.data({'src_has_fip': True, 'dest_has_fip': True}, | 
|  | {'src_has_fip': True, 'dest_has_fip': False}, | 
|  | {'src_has_fip': False, 'dest_has_fip': True}, | 
|  | {'src_has_fip': True, 'dest_has_fip': False}) | 
|  | def test_east_west(self, src_has_fip, dest_has_fip): | 
|  | self._test_east_west(src_has_fip=src_has_fip, | 
|  | dest_has_fip=dest_has_fip) | 
|  |  | 
|  |  | 
|  | class DefaultSnatToExternal(FloatingIpTestCasesMixin, | 
|  | base.BaseTempestTestCase): | 
|  | same_network = True | 
|  |  | 
|  | @decorators.idempotent_id('3d73ea1a-27c6-45a9-b0f8-04a283d9d764') | 
|  | def test_snat_external_ip(self): | 
|  | """Check connectivity to an external IP""" | 
|  | gateway_external_ip = self._get_external_gateway() | 
|  |  | 
|  | if not gateway_external_ip: | 
|  | raise self.skipTest("IPv4 gateway is not configured for public " | 
|  | "network or public_network_id is not " | 
|  | "configured") | 
|  | proxy = self._create_server() | 
|  | proxy_client = ssh.Client(proxy['fip']['floating_ip_address'], | 
|  | CONF.validation.image_ssh_user, | 
|  | pkey=self.keypair['private_key']) | 
|  | src_server = self._create_server(create_floating_ip=False) | 
|  | src_server_ip = src_server['port']['fixed_ips'][0]['ip_address'] | 
|  | ssh_client = ssh.Client(src_server_ip, | 
|  | CONF.validation.image_ssh_user, | 
|  | pkey=self.keypair['private_key'], | 
|  | proxy_client=proxy_client) | 
|  | self.check_remote_connectivity(ssh_client, | 
|  | gateway_external_ip, | 
|  | servers=[proxy, src_server]) | 
|  |  | 
|  | def _test_nested_snat_external_ip(self, feature_enabled_bool): | 
|  | """Check connectivity to an external IP from a nested network.""" | 
|  | gateway_external_ip = self._get_external_gateway() | 
|  |  | 
|  | if not gateway_external_ip: | 
|  | raise self.skipTest("IPv4 gateway is not configured for public " | 
|  | "network or public_network_id is not " | 
|  | "configured") | 
|  | proxy = self._create_server() | 
|  | proxy_client = ssh.Client(proxy['fip']['floating_ip_address'], | 
|  | CONF.validation.image_ssh_user, | 
|  | pkey=self.keypair['private_key']) | 
|  |  | 
|  | # Create a nested router | 
|  | router = self.create_router( | 
|  | router_name=data_utils.rand_name('router'), | 
|  | admin_state_up=True) | 
|  |  | 
|  | # Attach outer subnet to it | 
|  | outer_port = self.create_port(self.network) | 
|  | self.client.add_router_interface_with_port_id(router['id'], | 
|  | outer_port['id']) | 
|  |  | 
|  | # Attach a nested subnet to it | 
|  | network = self.create_network() | 
|  | subnet = self.create_subnet(network) | 
|  | self.create_router_interface(router['id'], subnet['id']) | 
|  |  | 
|  | # Set up static routes in both directions | 
|  | self.client.update_extra_routes( | 
|  | self.router['id'], | 
|  | outer_port['fixed_ips'][0]['ip_address'], subnet['cidr']) | 
|  | self.client.update_extra_routes( | 
|  | router['id'], self.subnet['gateway_ip'], '0.0.0.0/0') | 
|  |  | 
|  | # Create a server inside the nested network | 
|  | src_server = self._create_server(create_floating_ip=False, | 
|  | network=network) | 
|  |  | 
|  | # Check connectivity if nested SNAT is enabled, else no connectivity | 
|  | src_server_ip = src_server['port']['fixed_ips'][0]['ip_address'] | 
|  | ssh_client = ssh.Client(src_server_ip, | 
|  | CONF.validation.image_ssh_user, | 
|  | pkey=self.keypair['private_key'], | 
|  | proxy_client=proxy_client) | 
|  | self.check_remote_connectivity(ssh_client, | 
|  | gateway_external_ip, | 
|  | should_succeed=feature_enabled_bool, | 
|  | servers=[proxy, src_server]) | 
|  |  | 
|  | @decorators.idempotent_id('b911b124-b6cb-449d-83d9-b34f3665741d') | 
|  | @utils.requires_ext(extension='extraroute', service='network') | 
|  | def test_nested_snat_external_ip(self): | 
|  | feature_enabled_bool = ( | 
|  | CONF.neutron_plugin_options.snat_rules_apply_to_nested_networks | 
|  | ) | 
|  | self._test_nested_snat_external_ip(feature_enabled_bool) | 
|  |  | 
|  |  | 
|  | class FloatingIPPortDetailsTest(FloatingIpTestCasesMixin, | 
|  | base.BaseTempestTestCase): | 
|  | same_network = True | 
|  |  | 
|  | @classmethod | 
|  | @utils.requires_ext(extension="router", service="network") | 
|  | @utils.requires_ext(extension="fip-port-details", service="network") | 
|  | def resource_setup(cls): | 
|  | super(FloatingIPPortDetailsTest, cls).resource_setup() | 
|  |  | 
|  | @decorators.idempotent_id('a663aeee-dd81-492b-a207-354fd6284dbe') | 
|  | def test_floatingip_port_details(self): | 
|  | """Tests the following: | 
|  |  | 
|  | 1. Create a port with floating ip in Neutron. | 
|  | 2. Create two servers in Nova. | 
|  | 3. Attach the port to the server. | 
|  | 4. Detach the port from the server. | 
|  | 5. Attach the port to the second server. | 
|  | 6. Detach the port from the second server. | 
|  | """ | 
|  | port = self.create_port(self.network) | 
|  | fip = self.create_and_associate_floatingip(port['id']) | 
|  | server1 = self._create_server(create_floating_ip=False) | 
|  | server2 = self._create_server(create_floating_ip=False) | 
|  |  | 
|  | for server in [server1, server2]: | 
|  | # attach the port to the server | 
|  | self.create_interface( | 
|  | server['server']['id'], port_id=port['id']) | 
|  | waiters.wait_for_interface_status( | 
|  | self.os_primary.interfaces_client, server['server']['id'], | 
|  | port['id'], lib_constants.PORT_STATUS_ACTIVE) | 
|  | fip = self.client.show_floatingip(fip['id'])['floatingip'] | 
|  | server_data = self.os_admin.servers_client.show_server( | 
|  | server['server']['id'])['server'] | 
|  | zone = 'compute:' + server_data['OS-EXT-AZ:availability_zone'] | 
|  | self._check_port_details( | 
|  | fip, port, status=lib_constants.PORT_STATUS_ACTIVE, | 
|  | device_id=server['server']['id'], | 
|  | device_owner=zone) | 
|  | LOG.debug('Port check for server %s and FIP %s finished, ' | 
|  | 'lets detach port %s from server!', | 
|  | server['server']['id'], fip['id'], port['id']) | 
|  |  | 
|  | # detach the port from the server; this is a cast in the compute | 
|  | # API so we have to poll the port until the device_id is unset. | 
|  | self.delete_interface(server['server']['id'], port['id']) | 
|  | port = self._wait_for_port_detach(port['id']) | 
|  | LOG.debug('Port %s has been detached from server %s, lets check ' | 
|  | 'the status of port in FIP %s details!', | 
|  | port['id'], server['server']['id'], fip['id']) | 
|  | fip = self._wait_for_fip_port_down(fip['id']) | 
|  | self._check_port_details( | 
|  | fip, port, status=lib_constants.PORT_STATUS_DOWN, | 
|  | device_id='', device_owner='') | 
|  |  | 
|  | def _check_port_details(self, fip, port, status, device_id, device_owner): | 
|  | self.assertIn('port_details', fip) | 
|  | port_details = fip['port_details'] | 
|  | self.assertEqual(port['name'], port_details['name']) | 
|  | self.assertEqual(port['network_id'], port_details['network_id']) | 
|  | self.assertEqual(port['mac_address'], port_details['mac_address']) | 
|  | self.assertEqual(port['admin_state_up'], | 
|  | port_details['admin_state_up']) | 
|  | self.assertEqual(status, port_details['status']) | 
|  | self.assertEqual(device_id, port_details['device_id']) | 
|  | self.assertEqual(device_owner, port_details['device_owner']) | 
|  |  | 
|  | def _wait_for_port_detach(self, port_id, timeout=120, interval=10): | 
|  | """Waits for the port's device_id to be unset. | 
|  |  | 
|  | :param port_id: The id of the port being detached. | 
|  | :returns: The final port dict from the show_port response. | 
|  | """ | 
|  | port = self.client.show_port(port_id)['port'] | 
|  | device_id = port['device_id'] | 
|  | start = int(time.time()) | 
|  |  | 
|  | # NOTE(mriedem): Nova updates the port's device_id to '' rather than | 
|  | # None, but it's not contractual so handle Falsey either way. | 
|  | while device_id: | 
|  | time.sleep(interval) | 
|  | port = self.client.show_port(port_id)['port'] | 
|  | device_id = port['device_id'] | 
|  |  | 
|  | timed_out = int(time.time()) - start >= timeout | 
|  |  | 
|  | if device_id and timed_out: | 
|  | message = ('Port %s failed to detach (device_id %s) within ' | 
|  | 'the required time (%s s).' % | 
|  | (port_id, device_id, timeout)) | 
|  | raise exceptions.TimeoutException(message) | 
|  |  | 
|  | return port | 
|  |  | 
|  | def _wait_for_fip_port_down(self, fip_id, timeout=120, interval=10): | 
|  | """Waits for the fip's attached port status to be 'DOWN'. | 
|  |  | 
|  | :param fip_id: The id of the floating IP. | 
|  | :returns: The final fip dict from the show_floatingip response. | 
|  | """ | 
|  | fip = self.client.show_floatingip(fip_id)['floatingip'] | 
|  | self.assertIn('port_details', fip) | 
|  | port_details = fip['port_details'] | 
|  | status = port_details['status'] | 
|  | start = int(time.time()) | 
|  |  | 
|  | while status != lib_constants.PORT_STATUS_DOWN: | 
|  | time.sleep(interval) | 
|  | fip = self.client.show_floatingip(fip_id)['floatingip'] | 
|  | self.assertIn('port_details', fip) | 
|  | port_details = fip['port_details'] | 
|  | status = port_details['status'] | 
|  |  | 
|  | timed_out = int(time.time()) - start >= timeout | 
|  |  | 
|  | if status != lib_constants.PORT_STATUS_DOWN and timed_out: | 
|  | port_id = fip.get("port_id") | 
|  | port = self.os_admin.network_client.show_port(port_id)['port'] | 
|  | message = ('Floating IP %s attached port status failed to ' | 
|  | 'transition to DOWN (current status %s) within ' | 
|  | 'the required time (%s s). Port details: %s' % | 
|  | (fip_id, status, timeout, port)) | 
|  | raise exceptions.TimeoutException(message) | 
|  |  | 
|  | LOG.debug('Port %s attached to FIP %s is down after %s!', | 
|  | fip.get("port_id"), fip_id, int(time.time()) - start) | 
|  | return fip | 
|  |  | 
|  |  | 
|  | class FloatingIPQosTest(FloatingIpTestCasesMixin, | 
|  | test_qos.QoSTestMixin, | 
|  | base.BaseTempestTestCase): | 
|  |  | 
|  | same_network = True | 
|  |  | 
|  | @classmethod | 
|  | @utils.requires_ext(extension="router", service="network") | 
|  | @utils.requires_ext(extension="qos", service="network") | 
|  | @utils.requires_ext(extension="qos-fip", service="network") | 
|  | @base_api.require_qos_rule_type(qos_consts.RULE_TYPE_BANDWIDTH_LIMIT) | 
|  | def resource_setup(cls): | 
|  | super(FloatingIPQosTest, cls).resource_setup() | 
|  |  | 
|  | @classmethod | 
|  | def setup_clients(cls): | 
|  | super(FloatingIPQosTest, cls).setup_clients() | 
|  | cls.admin_client = cls.os_admin.network_client | 
|  | cls.qos_bw_limit_rule_client = \ | 
|  | cls.os_admin.qos_limit_bandwidth_rules_client | 
|  |  | 
|  | @decorators.idempotent_id('5eb48aea-eaba-4c20-8a6f-7740070a0aa3') | 
|  | def test_qos(self): | 
|  | """Test floating IP is binding to a QoS policy with | 
|  |  | 
|  | ingress and egress bandwidth limit rules. And it applied correctly | 
|  | by sending a file from the instance to the test node. | 
|  | Then calculating the bandwidth every ~1 sec by the number of bits | 
|  | received / elapsed time. | 
|  | """ | 
|  |  | 
|  | self.skip_if_no_extension_enabled_in_l3_agents("fip_qos") | 
|  |  | 
|  | self._test_basic_resources() | 
|  |  | 
|  | # Create a new QoS policy | 
|  | policy_id = self._create_qos_policy() | 
|  | ssh_client = self._create_ssh_client() | 
|  |  | 
|  | # As admin user create a new QoS rules | 
|  | rule_data = {'max_kbps': constants.LIMIT_KILO_BITS_PER_SECOND, | 
|  | 'max_burst_kbps': constants.LIMIT_KILO_BYTES, | 
|  | 'direction': lib_constants.INGRESS_DIRECTION} | 
|  | self.qos_bw_limit_rule_client.create_limit_bandwidth_rule( | 
|  | qos_policy_id=policy_id, **rule_data) | 
|  |  | 
|  | rule_data = {'max_kbps': constants.LIMIT_KILO_BITS_PER_SECOND, | 
|  | 'max_burst_kbps': constants.LIMIT_KILO_BYTES, | 
|  | 'direction': lib_constants.EGRESS_DIRECTION} | 
|  | self.qos_bw_limit_rule_client.create_limit_bandwidth_rule( | 
|  | qos_policy_id=policy_id, **rule_data) | 
|  |  | 
|  | rules = self.qos_bw_limit_rule_client.list_limit_bandwidth_rules( | 
|  | policy_id) | 
|  | self.assertEqual(2, len(rules['bandwidth_limit_rules'])) | 
|  |  | 
|  | fip = self.os_admin.network_client.get_floatingip( | 
|  | self.fip['id'])['floatingip'] | 
|  | self.assertEqual(self.port['id'], fip['port_id']) | 
|  |  | 
|  | # Associate QoS to the FIP | 
|  | self.os_admin.network_client.update_floatingip( | 
|  | self.fip['id'], | 
|  | qos_policy_id=policy_id) | 
|  |  | 
|  | fip = self.os_admin.network_client.get_floatingip( | 
|  | self.fip['id'])['floatingip'] | 
|  | self.assertEqual(policy_id, fip['qos_policy_id']) | 
|  |  | 
|  | # Basic test, Check that actual BW while downloading file | 
|  | # is as expected (Original BW) | 
|  | common_utils.wait_until_true(lambda: self._check_bw( | 
|  | ssh_client, | 
|  | self.fip['floating_ip_address'], | 
|  | port=self.NC_PORT), | 
|  | timeout=120, | 
|  | sleep=1, | 
|  | exception=RuntimeError( | 
|  | 'Failed scenario: "Create a QoS policy associated with FIP" ' | 
|  | 'Actual BW is not as expected!')) | 
|  |  | 
|  | # As admin user update QoS rules | 
|  | for rule in rules['bandwidth_limit_rules']: | 
|  | self.qos_bw_limit_rule_client.update_limit_bandwidth_rule( | 
|  | policy_id, rule['id'], | 
|  | **{'max_kbps': constants.LIMIT_KILO_BITS_PER_SECOND * 2, | 
|  | 'max_burst_kbps': constants.LIMIT_KILO_BITS_PER_SECOND * 2}) | 
|  |  | 
|  | # Check that actual BW while downloading file | 
|  | # is as expected (Update BW) | 
|  | common_utils.wait_until_true(lambda: self._check_bw( | 
|  | ssh_client, | 
|  | self.fip['floating_ip_address'], | 
|  | port=self.NC_PORT, | 
|  | expected_bw=test_qos.QoSTestMixin.LIMIT_BYTES_SEC * 2), | 
|  | timeout=120, | 
|  | sleep=1, | 
|  | exception=RuntimeError( | 
|  | 'Failed scenario: "Update QoS policy associated with FIP" ' | 
|  | 'Actual BW is not as expected!')) | 
|  |  | 
|  |  | 
|  | class TestFloatingIPUpdate(FloatingIpTestCasesMixin, | 
|  | base.BaseTempestTestCase): | 
|  |  | 
|  | same_network = None | 
|  |  | 
|  | @decorators.idempotent_id('1bdd849b-03dd-4b8f-994f-457cf8a36f93') | 
|  | def test_floating_ip_update(self): | 
|  | """Test updating FIP with another port. | 
|  |  | 
|  | The test creates two servers and attaches floating ip to first server. | 
|  | Then it checks server is accesible using the FIP. FIP is then | 
|  | associated with the second server and connectivity is checked again. | 
|  | """ | 
|  | ports = [self.create_port( | 
|  | self.network, security_groups=[self.secgroup['id']]) | 
|  | for i in range(2)] | 
|  |  | 
|  | servers = [] | 
|  | for port in ports: | 
|  | name = data_utils.rand_name("server-%s" % port['id'][:8]) | 
|  | server = self.create_server( | 
|  | name=name, | 
|  | flavor_ref=CONF.compute.flavor_ref, | 
|  | key_name=self.keypair['name'], | 
|  | image_ref=CONF.compute.image_ref, | 
|  | networks=[{'port': port['id']}])['server'] | 
|  | server['name'] = name | 
|  | servers.append(server) | 
|  | for server in servers: | 
|  | self.wait_for_server_active(server) | 
|  | self.wait_for_guest_os_ready(server) | 
|  |  | 
|  | self.fip = self.create_floatingip(port=ports[0]) | 
|  | self.check_connectivity(self.fip['floating_ip_address'], | 
|  | CONF.validation.image_ssh_user, | 
|  | self.keypair['private_key'], | 
|  | servers=servers) | 
|  | self.client.update_floatingip(self.fip['id'], port_id=ports[1]['id']) | 
|  |  | 
|  | def _wait_for_fip_associated(): | 
|  | try: | 
|  | self.check_servers_hostnames(servers[-1:], log_errors=False) | 
|  | except (AssertionError, exceptions.SSHTimeout): | 
|  | return False | 
|  | return True | 
|  |  | 
|  | # The FIP is now associated with the port of the second server. | 
|  | try: | 
|  | common_utils.wait_until_true(_wait_for_fip_associated, sleep=3) | 
|  | except common_utils.WaitTimeout: | 
|  | self._log_console_output(servers[-1:]) | 
|  | self.fail( | 
|  | "Server %s is not accessible via its floating ip %s" % ( | 
|  | servers[-1]['id'], self.fip['id'])) | 
|  |  | 
|  |  | 
|  | class FloatingIpMultipleRoutersTest(base.BaseTempestTestCase): | 
|  | credentials = ['primary', 'admin'] | 
|  |  | 
|  | @classmethod | 
|  | @utils.requires_ext(extension="router", service="network") | 
|  | def skip_checks(cls): | 
|  | super(FloatingIpMultipleRoutersTest, cls).skip_checks() | 
|  |  | 
|  | def _create_keypair_and_secgroup(self): | 
|  | self.keypair = self.create_keypair() | 
|  | self.secgroup = self.create_security_group() | 
|  | self.create_loginable_secgroup_rule( | 
|  | secgroup_id=self.secgroup['id']) | 
|  | self.create_pingable_secgroup_rule( | 
|  | secgroup_id=self.secgroup['id']) | 
|  |  | 
|  | def _delete_floating_ip(self, fip_address): | 
|  | ip_address = fip_address['floating_ip_address'] | 
|  |  | 
|  | def _fip_is_free(): | 
|  | fips = self.os_admin.network_client.list_floatingips() | 
|  | for fip in fips['floatingips']: | 
|  | if ip_address == fip['floating_ip_address']: | 
|  | return False | 
|  | return True | 
|  |  | 
|  | self.delete_floatingip(fip_address) | 
|  | try: | 
|  | common_utils.wait_until_true(_fip_is_free, timeout=30, sleep=5) | 
|  | except common_utils.WaitTimeout: | 
|  | self.fail("Can't reuse IP address %s because it is not free" % | 
|  | ip_address) | 
|  |  | 
|  | def _create_network_and_servers(self, servers_num=1, fip_addresses=None, | 
|  | delete_fip_ids=None): | 
|  | delete_fip_ids = delete_fip_ids or [] | 
|  | if fip_addresses: | 
|  | self.assertEqual(servers_num, len(fip_addresses), | 
|  | ('Number of specified fip addresses ' | 
|  | 'does not match the number of servers')) | 
|  | network = self.create_network() | 
|  | subnet = self.create_subnet(network) | 
|  | router = self.create_router_by_client() | 
|  | self.create_router_interface(router['id'], subnet['id']) | 
|  |  | 
|  | fips = [] | 
|  | for server in range(servers_num): | 
|  | fip = fip_addresses[server] if fip_addresses else None | 
|  | delete_fip = fip['id'] in delete_fip_ids if fip else False | 
|  | fips.append( | 
|  | self._create_server_and_fip(network=network, | 
|  | fip_address=fip, | 
|  | delete_fip_address=delete_fip)) | 
|  | return fips | 
|  |  | 
|  | def _create_server_and_fip(self, network, fip_address=None, | 
|  | delete_fip_address=False): | 
|  | server = self.create_server( | 
|  | flavor_ref=CONF.compute.flavor_ref, | 
|  | image_ref=CONF.compute.image_ref, | 
|  | key_name=self.keypair['name'], | 
|  | networks=[{'uuid': network['id']}], | 
|  | security_groups=[{'name': self.secgroup['name']}]) | 
|  | waiters.wait_for_server_status(self.os_primary.servers_client, | 
|  | server['server']['id'], | 
|  | constants.SERVER_STATUS_ACTIVE) | 
|  | port = self.client.list_ports( | 
|  | network_id=network['id'], | 
|  | device_id=server['server']['id'])['ports'][0] | 
|  |  | 
|  | if fip_address: | 
|  | if delete_fip_address: | 
|  | self._delete_floating_ip(fip_address) | 
|  | fip = self.create_floatingip( | 
|  | floating_ip_address=fip_address['floating_ip_address'], | 
|  | client=self.os_admin.network_client, | 
|  | port=port) | 
|  | self.addCleanup( | 
|  | self.delete_floatingip, fip, self.os_admin.network_client) | 
|  | else: | 
|  | fip = self.create_floatingip(port=port) | 
|  | return fip | 
|  |  | 
|  | def _check_fips_connectivity(self, mutable_fip, permanent_fip): | 
|  | for fip in [mutable_fip, permanent_fip]: | 
|  | fip['ssh_client'] = ssh.Client(fip['floating_ip_address'], | 
|  | CONF.validation.image_ssh_user, | 
|  | pkey=self.keypair['private_key']) | 
|  | self.check_remote_connectivity( | 
|  | permanent_fip['ssh_client'], mutable_fip['floating_ip_address']) | 
|  | self.check_remote_connectivity( | 
|  | mutable_fip['ssh_client'], permanent_fip['floating_ip_address']) | 
|  |  | 
|  | @testtools.skipUnless(CONF.network.public_network_id, | 
|  | 'The public_network_id option must be specified.') | 
|  | @decorators.idempotent_id('b0382ab3-3c86-4415-84e3-649a8b040dab') | 
|  | def test_reuse_ip_address_with_other_fip_on_other_router(self): | 
|  | """Reuse IP address by another floating IP on another router | 
|  |  | 
|  | Scenario: | 
|  | 1. Create and connect a router to the external network. | 
|  | 2. Create and connect an internal network to the router. | 
|  | 3. Create and connect 2 VMs to the internal network. | 
|  | 4. Create FIPs in the external network for the VMs. | 
|  | 5. Make sure that VM1 can ping VM2 FIP address. | 
|  | 6. Create and connect one more router to the external network. | 
|  | 7. Create and connect an internal network to the second router. | 
|  | 8. Create and connect a VM (VM3) to the internal network of | 
|  | the second router. | 
|  | 9. Delete VM2 FIP but save IP address that it used. The FIP is | 
|  | deleted just before the creation of the new IP to "reserve" the | 
|  | IP address associated (see LP#1880976). | 
|  | 10. Create a FIP for the VM3 in the external network with | 
|  | the same IP address that was used for VM2. | 
|  | 11. Make sure that now VM1 is able to reach VM3 using the FIP. | 
|  |  | 
|  | Note, the scenario passes only in case corresponding | 
|  | ARP update was sent to the external network when reusing same IP | 
|  | address for another FIP. | 
|  | """ | 
|  |  | 
|  | self._create_keypair_and_secgroup() | 
|  | [mutable_fip, permanent_fip] = ( | 
|  | self._create_network_and_servers(servers_num=2)) | 
|  | self._check_fips_connectivity(mutable_fip, permanent_fip) | 
|  | [mutable_fip] = self._create_network_and_servers( | 
|  | servers_num=1, fip_addresses=[mutable_fip], | 
|  | delete_fip_ids=[mutable_fip['id']]) | 
|  | self._check_fips_connectivity(mutable_fip, permanent_fip) |