|  | # Copyright 2017 Red Hat, Inc. | 
|  | # All Rights Reserved. | 
|  | # | 
|  | #    Licensed under the Apache License, Version 2.0 (the "License"); you may | 
|  | #    not use this file except in compliance with the License. You may obtain | 
|  | #    a copy of the License at | 
|  | # | 
|  | #         http://www.apache.org/licenses/LICENSE-2.0 | 
|  | # | 
|  | #    Unless required by applicable law or agreed to in writing, software | 
|  | #    distributed under the License is distributed on an "AS IS" BASIS, WITHOUT | 
|  | #    WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the | 
|  | #    License for the specific language governing permissions and limitations | 
|  | #    under the License. | 
|  |  | 
|  | import functools | 
|  |  | 
|  | from neutron_lib.api.definitions import portbindings as pb | 
|  | from neutron_lib import constants as const | 
|  | from neutron_lib.utils import test | 
|  | from tempest.common import utils | 
|  | from tempest.lib import decorators | 
|  | import testtools | 
|  |  | 
|  | from neutron_tempest_plugin.common import utils as common_utils | 
|  | from neutron_tempest_plugin import config | 
|  | from neutron_tempest_plugin.scenario import base | 
|  | from neutron_tempest_plugin.scenario import test_dvr | 
|  |  | 
|  | CONF = config.CONF | 
|  |  | 
|  |  | 
|  | class NetworkMigrationTestBase(base.BaseTempestTestCase, | 
|  | test_dvr.NetworkTestMixin): | 
|  | credentials = ['primary', 'admin'] | 
|  | force_tenant_isolation = False | 
|  |  | 
|  | @classmethod | 
|  | @utils.requires_ext(extension="dvr", service="network") | 
|  | @utils.requires_ext(extension="l3-ha", service="network") | 
|  | def skip_checks(cls): | 
|  | super(NetworkMigrationTestBase, cls).skip_checks() | 
|  |  | 
|  | def _check_update(self, router, is_dvr, is_ha): | 
|  | router = self.os_admin.network_client.show_router(router['id']) | 
|  | self.assertEqual(is_dvr, router['router']['distributed']) | 
|  | self.assertEqual(is_ha, router['router']['ha']) | 
|  |  | 
|  | def _wait_until_port_deleted(self, router_id, device_owner): | 
|  | common_utils.wait_until_true( | 
|  | functools.partial( | 
|  | self._is_port_deleted, | 
|  | router_id, | 
|  | device_owner), | 
|  | timeout=300, sleep=5) | 
|  |  | 
|  | def _is_port_deleted(self, router_id, device_owner): | 
|  | ports = self.os_admin.network_client.list_ports( | 
|  | device_id=router_id, | 
|  | device_owner=device_owner) | 
|  | return not ports.get('ports') | 
|  |  | 
|  | def _wait_until_port_ready(self, router_id, device_owner): | 
|  | common_utils.wait_until_true( | 
|  | functools.partial( | 
|  | self._is_port_active, | 
|  | router_id, | 
|  | device_owner), | 
|  | timeout=300, sleep=5) | 
|  |  | 
|  | def _wait_until_router_ports_down(self, router_id): | 
|  |  | 
|  | def _is_port_down(port_id): | 
|  | port = self.os_admin.network_client.show_port(port_id).get('port') | 
|  | return port['status'] == const.DOWN | 
|  |  | 
|  | ports = self.os_admin.network_client.list_ports( | 
|  | device_id=router_id).get('ports') | 
|  | for port in ports: | 
|  | common_utils.wait_until_true( | 
|  | functools.partial(_is_port_down, port['id']), | 
|  | timeout=300, sleep=5) | 
|  |  | 
|  | def _is_port_active(self, router_id, device_owner): | 
|  | ports = self.os_admin.network_client.list_ports( | 
|  | device_id=router_id, | 
|  | device_owner=device_owner, | 
|  | status=const.ACTIVE).get('ports') | 
|  | if ports: | 
|  | if ports[0][pb.VIF_TYPE] not in [pb.VIF_TYPE_UNBOUND, | 
|  | pb.VIF_TYPE_BINDING_FAILED]: | 
|  | return True | 
|  | return False | 
|  |  | 
|  | def _wait_until_router_ports_ready(self, router_id, dvr, ha): | 
|  | if dvr: | 
|  | self._wait_until_port_ready( | 
|  | router_id, const.DEVICE_OWNER_DVR_INTERFACE) | 
|  | if ha: | 
|  | self._wait_until_port_ready( | 
|  | router_id, const.DEVICE_OWNER_ROUTER_HA_INTF) | 
|  | if dvr: | 
|  | self._wait_until_port_ready( | 
|  | router_id, const.DEVICE_OWNER_ROUTER_SNAT) | 
|  | else: | 
|  | self._wait_until_port_ready( | 
|  | router_id, const.DEVICE_OWNER_HA_REPLICATED_INT) | 
|  | self._wait_until_port_ready( | 
|  | router_id, const.DEVICE_OWNER_ROUTER_GW) | 
|  |  | 
|  | def _wait_until_router_ports_migrated( | 
|  | self, router_id, before_dvr, before_ha, after_dvr, after_ha): | 
|  | if before_ha and not after_ha: | 
|  | self._wait_until_port_deleted( | 
|  | router_id, const.DEVICE_OWNER_ROUTER_HA_INTF) | 
|  | self._wait_until_port_deleted( | 
|  | router_id, const.DEVICE_OWNER_HA_REPLICATED_INT) | 
|  | if before_dvr and not after_dvr: | 
|  | self._wait_until_port_deleted( | 
|  | router_id, const.DEVICE_OWNER_DVR_INTERFACE) | 
|  | self._wait_until_port_deleted( | 
|  | router_id, const.DEVICE_OWNER_ROUTER_SNAT) | 
|  | self._wait_until_router_ports_ready(router_id, after_dvr, after_ha) | 
|  |  | 
|  | def _test_migration(self, before_dvr, before_ha, after_dvr, after_ha): | 
|  | router = self.create_router_by_client( | 
|  | distributed=before_dvr, ha=before_ha, | 
|  | tenant_id=self.client.project_id, is_admin=True) | 
|  |  | 
|  | self.setup_network_and_server(router=router) | 
|  | self._wait_until_router_ports_ready( | 
|  | router['id'], before_dvr, before_ha) | 
|  | self._check_connectivity() | 
|  |  | 
|  | self.os_admin.network_client.update_router( | 
|  | router_id=router['id'], admin_state_up=False) | 
|  | self._wait_until_router_ports_down(router['id']) | 
|  |  | 
|  | self.os_admin.network_client.update_router( | 
|  | router_id=router['id'], distributed=after_dvr, ha=after_ha) | 
|  | self._check_update(router, after_dvr, after_ha) | 
|  |  | 
|  | self.os_admin.network_client.update_router( | 
|  | router_id=router['id'], admin_state_up=True) | 
|  |  | 
|  | self._wait_until_router_ports_migrated( | 
|  | router['id'], before_dvr, before_ha, after_dvr, after_ha) | 
|  | self._check_connectivity() | 
|  |  | 
|  |  | 
|  | class NetworkMigrationFromLegacy(NetworkMigrationTestBase): | 
|  |  | 
|  | @decorators.idempotent_id('23724222-483a-4129-bc15-7a9278f3828b') | 
|  | @testtools.skipUnless( | 
|  | CONF.neutron_plugin_options.l3_agent_mode == 'dvr_snat', | 
|  | "Need dvr_snat agent mode assumption.") | 
|  | def test_from_legacy_to_dvr(self): | 
|  | self._test_migration(before_dvr=False, before_ha=False, | 
|  | after_dvr=True, after_ha=False) | 
|  |  | 
|  | @decorators.idempotent_id('09d85102-994f-4ff9-bf3e-17051145ca12') | 
|  | def test_from_legacy_to_ha(self): | 
|  | self._test_migration(before_dvr=False, before_ha=False, | 
|  | after_dvr=False, after_ha=True) | 
|  |  | 
|  | @decorators.idempotent_id('fe169f2c-6ed3-4eb0-8afe-2d540c4b49e2') | 
|  | @testtools.skipUnless( | 
|  | CONF.neutron_plugin_options.l3_agent_mode == 'dvr_snat', | 
|  | "Need dvr_snat agent mode assumption.") | 
|  | def test_from_legacy_to_dvr_ha(self): | 
|  | self._test_migration(before_dvr=False, before_ha=False, | 
|  | after_dvr=True, after_ha=True) | 
|  |  | 
|  |  | 
|  | class NetworkMigrationFromHA(NetworkMigrationTestBase): | 
|  |  | 
|  | @decorators.idempotent_id('b4e68ac0-3b76-4306-ae8a-51cf4d363b22') | 
|  | def test_from_ha_to_legacy(self): | 
|  | self._test_migration(before_dvr=False, before_ha=True, | 
|  | after_dvr=False, after_ha=False) | 
|  |  | 
|  | @decorators.idempotent_id('42260eea-5d56-4d30-b62a-a62694dfe4d5') | 
|  | @testtools.skipUnless( | 
|  | CONF.neutron_plugin_options.l3_agent_mode == 'dvr_snat', | 
|  | "Need dvr_snat agent mode assumption.") | 
|  | def test_from_ha_to_dvr(self): | 
|  | self._test_migration(before_dvr=False, before_ha=True, | 
|  | after_dvr=True, after_ha=False) | 
|  |  | 
|  | @decorators.idempotent_id('e4149576-248b-43fa-9d0b-a5c2f51967ce') | 
|  | @testtools.skipUnless( | 
|  | CONF.neutron_plugin_options.l3_agent_mode == 'dvr_snat', | 
|  | "Need dvr_snat agent mode assumption.") | 
|  | def test_from_ha_to_dvr_ha(self): | 
|  | self._test_migration(before_dvr=False, before_ha=True, | 
|  | after_dvr=True, after_ha=True) | 
|  |  | 
|  |  | 
|  | class NetworkMigrationFromDVR(NetworkMigrationTestBase): | 
|  |  | 
|  | @decorators.idempotent_id('e5cac02c-248d-4aac-bd5e-9d47c5197307') | 
|  | @testtools.skipUnless( | 
|  | CONF.neutron_plugin_options.l3_agent_mode == 'dvr_snat', | 
|  | "Need dvr_snat agent mode assumption.") | 
|  | def test_from_dvr_to_legacy(self): | 
|  | self._test_migration(before_dvr=True, before_ha=False, | 
|  | after_dvr=False, after_ha=False) | 
|  |  | 
|  | @decorators.idempotent_id('a00d5ad7-8509-4bb0-bdd2-7f1ee052d1cd') | 
|  | @testtools.skipUnless( | 
|  | CONF.neutron_plugin_options.l3_agent_mode == 'dvr_snat', | 
|  | "Need dvr_snat agent mode assumption.") | 
|  | def test_from_dvr_to_ha(self): | 
|  | self._test_migration(before_dvr=True, before_ha=False, | 
|  | after_dvr=False, after_ha=True) | 
|  |  | 
|  | @decorators.idempotent_id('25304a51-93a8-4cf3-9523-bce8b4eaecf8') | 
|  | @testtools.skipUnless( | 
|  | CONF.neutron_plugin_options.l3_agent_mode == 'dvr_snat', | 
|  | "Need dvr_snat agent mode assumption.") | 
|  | def test_from_dvr_to_dvr_ha(self): | 
|  | self._test_migration(before_dvr=True, before_ha=False, | 
|  | after_dvr=True, after_ha=True) | 
|  |  | 
|  |  | 
|  | class NetworkMigrationFromDVRHA(NetworkMigrationTestBase): | 
|  |  | 
|  | @test.unstable_test("bug 1756301") | 
|  | @decorators.idempotent_id('1be9b2e2-379c-40a4-a269-6687b81df691') | 
|  | @testtools.skipUnless( | 
|  | CONF.neutron_plugin_options.l3_agent_mode == 'dvr_snat', | 
|  | "Need dvr_snat agent mode assumption.") | 
|  | def test_from_dvr_ha_to_legacy(self): | 
|  | self._test_migration(before_dvr=True, before_ha=True, | 
|  | after_dvr=False, after_ha=False) | 
|  |  | 
|  | @test.unstable_test("bug 1756301") | 
|  | @decorators.idempotent_id('55957267-4e84-4314-a2f7-7cd36a2df04b') | 
|  | @testtools.skipUnless( | 
|  | CONF.neutron_plugin_options.l3_agent_mode == 'dvr_snat', | 
|  | "Need dvr_snat agent mode assumption.") | 
|  | def test_from_dvr_ha_to_ha(self): | 
|  | self._test_migration(before_dvr=True, before_ha=True, | 
|  | after_dvr=False, after_ha=True) | 
|  |  | 
|  | @test.unstable_test("bug 1756301") | 
|  | @decorators.idempotent_id('d6bedff1-72be-4a9a-8ea2-dc037cd838e0') | 
|  | @testtools.skipUnless( | 
|  | CONF.neutron_plugin_options.l3_agent_mode == 'dvr_snat', | 
|  | "Need dvr_snat agent mode assumption.") | 
|  | def test_from_dvr_ha_to_dvr(self): | 
|  | self._test_migration(before_dvr=True, before_ha=True, | 
|  | after_dvr=True, after_ha=False) |