Create scenario tests for amphora

This patch implements amphora tests for the Octavia
Tempest Plugin.

Change-Id: I779d92b22a23b10d834220d80fe997f5a3719bbd
diff --git a/octavia_tempest_plugin/tests/scenario/v2/test_amphora.py b/octavia_tempest_plugin/tests/scenario/v2/test_amphora.py
new file mode 100644
index 0000000..b5ebaf5
--- /dev/null
+++ b/octavia_tempest_plugin/tests/scenario/v2/test_amphora.py
@@ -0,0 +1,159 @@
+# Copyright 2018 GoDaddy
+#
+#    Licensed under the Apache License, Version 2.0 (the "License"); you may
+#    not use this file except in compliance with the License. You may obtain
+#    a copy of the License at
+#
+#         http://www.apache.org/licenses/LICENSE-2.0
+#
+#    Unless required by applicable law or agreed to in writing, software
+#    distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+#    WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+#    License for the specific language governing permissions and limitations
+#    under the License.
+
+from uuid import UUID
+
+from dateutil import parser
+from tempest import config
+from tempest.lib.common.utils import data_utils
+from tempest.lib import decorators
+from tempest.lib import exceptions
+
+from octavia_tempest_plugin.common import constants as const
+from octavia_tempest_plugin.tests import test_base
+from octavia_tempest_plugin.tests import waiters
+
+CONF = config.CONF
+
+
+class AmphoraAPITest(test_base.LoadBalancerBaseTest):
+    """Test the amphora object API."""
+
+    @classmethod
+    def resource_setup(cls):
+        """Setup resources needed by the tests."""
+        super(AmphoraAPITest, cls).resource_setup()
+
+        lb_name = data_utils.rand_name("lb_member_lb1_amphora")
+        lb_kwargs = {const.PROVIDER: CONF.load_balancer.provider,
+                     const.NAME: lb_name}
+
+        cls._setup_lb_network_kwargs(lb_kwargs)
+
+        lb = cls.mem_lb_client.create_loadbalancer(**lb_kwargs)
+        cls.lb_id = lb[const.ID]
+        cls.addClassResourceCleanup(
+            cls.mem_lb_client.cleanup_loadbalancer,
+            cls.lb_id)
+
+        waiters.wait_for_status(cls.mem_lb_client.show_loadbalancer,
+                                cls.lb_id, const.PROVISIONING_STATUS,
+                                const.ACTIVE,
+                                CONF.load_balancer.lb_build_interval,
+                                CONF.load_balancer.lb_build_timeout)
+
+    @decorators.idempotent_id('a0e9ff99-2c4f-45d5-81c9-78d3107c236f')
+    def test_amphora_list_and_show(self):
+        """Tests amphora show API.
+
+        * Show amphora details.
+        * Validate the show reflects the requested values.
+        * Validates that other accounts cannot see the amphora.
+        """
+        lb_name = data_utils.rand_name("lb_member_lb2_amphora-list")
+        lb = self.mem_lb_client.create_loadbalancer(
+            name=lb_name,
+            vip_network_id=self.lb_member_vip_net[const.ID])
+        lb_id = lb[const.ID]
+        self.addCleanup(
+            self.mem_lb_client.cleanup_loadbalancer,
+            lb_id)
+
+        waiters.wait_for_status(self.mem_lb_client.show_loadbalancer,
+                                lb_id,
+                                const.PROVISIONING_STATUS,
+                                const.ACTIVE,
+                                CONF.load_balancer.lb_build_interval,
+                                CONF.load_balancer.lb_build_timeout)
+
+        # Test that a user with lb_admin role can list the amphora
+        if CONF.load_balancer.RBAC_test_type == const.ADVANCED:
+            amphora_client = self.os_roles_lb_admin.amphora_client
+            amphora_adm = amphora_client.list_amphorae()
+            self.assertTrue(len(amphora_adm) >= 2)
+
+        # Test that a different user, with load balancer member role, cannot
+        # see this amphora
+        if not CONF.load_balancer.RBAC_test_type == const.NONE:
+            member2_client = self.os_roles_lb_member2.amphora_client
+            self.assertRaises(exceptions.Forbidden,
+                              member2_client.list_amphorae)
+
+        # Test that a user, without the load balancer member role, cannot
+        # list amphorae
+        if CONF.load_balancer.RBAC_test_type == const.ADVANCED:
+            self.assertRaises(
+                exceptions.Forbidden,
+                self.os_primary.amphora_client.list_amphorae)
+
+        # Test that a user with cloud admin role can list the amphorae
+        if not CONF.load_balancer.RBAC_test_type == const.NONE:
+            adm = self.os_admin.amphora_client.list_amphorae()
+            self.assertTrue(len(adm) >= 2)
+
+        # Get an actual list of the amphorae
+        amphorae = self.os_admin.amphora_client.list_amphorae()
+
+        # There should be AT LEAST 2, there may be more depending on the
+        # configured topology, or if there are other LBs created besides ours
+        self.assertTrue(len(amphorae) >= 2)
+
+        # Make sure all of the fields exist on the amp list records
+        for field in const.SHOW_AMPHORA_RESPONSE_FIELDS:
+            self.assertIn(field, amphorae[0])
+
+        amp1_id = amphorae[0][const.ID]
+        amp1 = self.os_admin.amphora_client.show_amphora(amphora_id=amp1_id)
+
+        # Make sure all of the fields exist on the amp show record
+        for field in const.SHOW_AMPHORA_RESPONSE_FIELDS:
+            self.assertIn(field, amp1)
+
+        # Verify a few of the fields are the right type
+        parser.parse(amp1[const.CREATED_AT])
+        parser.parse(amp1[const.UPDATED_AT])
+        UUID(amp1[const.ID])
+        UUID(amp1[const.COMPUTE_ID])
+        UUID(amp1[const.VRRP_PORT_ID])
+        self.assertIn(amp1[const.ROLE], const.AMPHORA_ROLES)
+        self.assertIn(amp1[const.STATUS], const.AMPHORA_STATUSES)
+        # We might have gotten unassigned/spare amps?
+        if amp1[const.STATUS] == const.STATUS_ALLOCATED:
+            UUID(amp1[const.HA_PORT_ID])
+            UUID(amp1[const.LOADBALANCER_ID])
+
+        # Test that all of the fields from the amp list match those from a show
+        for field in const.SHOW_AMPHORA_RESPONSE_FIELDS:
+            self.assertEqual(amphorae[0][field], amp1[field])
+
+        amp2_id = amphorae[1][const.ID]
+        amp2 = self.os_admin.amphora_client.show_amphora(amphora_id=amp2_id)
+
+        # Test that all of the fields from the amp list match those from a show
+        # (on another amphora)
+        for field in const.SHOW_AMPHORA_RESPONSE_FIELDS:
+            self.assertEqual(amphorae[1][field], amp2[field])
+
+        # Test filtering by loadbalancer_id
+        amphorae = self.os_admin.amphora_client.list_amphorae(
+            query_params='{loadbalancer_id}={lb_id}'.format(
+                loadbalancer_id=const.LOADBALANCER_ID, lb_id=self.lb_id))
+        self.assertEqual(1, len(amphorae))
+        self.assertEqual(self.lb_id, amphorae[0][const.LOADBALANCER_ID])
+
+        amphorae = self.os_admin.amphora_client.list_amphorae(
+            query_params='{loadbalancer_id}={lb_id}'.format(
+                loadbalancer_id=const.LOADBALANCER_ID, lb_id=lb_id))
+        self.assertEqual(1, len(amphorae))
+        self.assertEqual(lb_id, amphorae[0][const.LOADBALANCER_ID])
diff --git a/octavia_tempest_plugin/tests/test_base.py b/octavia_tempest_plugin/tests/test_base.py
index cf06879..0e6eba4 100644
--- a/octavia_tempest_plugin/tests/test_base.py
+++ b/octavia_tempest_plugin/tests/test_base.py
@@ -114,6 +114,7 @@
             cls.os_roles_lb_member.healthmonitor_client)
         cls.mem_l7policy_client = cls.os_roles_lb_member.l7policy_client
         cls.mem_l7rule_client = cls.os_roles_lb_member.l7rule_client
+        cls.mem_amphora_client = cls.os_roles_lb_member.amphora_client
 
     @classmethod
     def resource_setup(cls):