blob: 15369dedc5fcd2dd41b9a61f74b51a91417e7c4e [file] [log] [blame]
Matthew Treinisha970d652015-03-11 15:39:24 -04001.. _tempest-configuration:
2
Matthew Treinishbc1b15b2015-02-20 15:56:07 -05003Tempest Configuration Guide
4===========================
5
Matthew Treinishf640f662015-03-11 15:13:30 -04006This guide is a starting point for configuring tempest. It aims to elaborate
7on and explain some of the mandatory and common configuration settings and how
8they are used in conjunction. The source of truth on each option is the sample
9config file which explains the purpose of each individual option.
10
11Lock Path
12---------
13
14There are some tests and operations inside of tempest that need to be
15externally locked when running in parallel to prevent them from running at
16the same time. This is a mandatory step for configuring tempest and is still
17needed even when running serially. All that is needed to do this is:
18
19 #. Set the lock_path option in the oslo_concurrency group
20
Matthew Treinishbc1b15b2015-02-20 15:56:07 -050021Auth/Credentials
22----------------
23
24Tempest currently has 2 different ways in configuration to provide credentials
25to use when running tempest. One is a traditional set of configuration options
26in the tempest.conf file. These options are in the identity section and let you
27specify a regular user, a global admin user, and a alternate user set of
28credentials. (which consist of a username, password, and project/tenant name)
29These options should be clearly labelled in the sample config file in the
30identity section.
31
32The other method to provide credentials is using the accounts.yaml file. This
33file is used to specify an arbitrary number of users available to run tests
34with. You can specify the location of the file in the
35auth section in the tempest.conf file. To see the specific format used in
36the file please refer to the accounts.yaml.sample file included in tempest.
37Currently users that are specified in the accounts.yaml file are assumed to
38have the same set of roles which can be used for executing all the tests you
39are running. This will be addressed in the future, but is a current limitation.
40Eventually the config options for providing credentials to tempest will be
41deprecated and removed in favor of the accounts.yaml file.
42
43Credential Provider Mechanisms
44^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
45
46Tempest currently also has 3 different internal methods for providing
47authentication to tests. Tenant isolation, locking test accounts, and
48non-locking test accounts. Depending on which one is in use the configuration
49of tempest is slightly different.
50
51Tenant Isolation
52""""""""""""""""
53Tenant isolation was originally create to enable running tempest in parallel.
54For each test class it creates a unique set of user credentials to use for the
55tests in the class. It can create up to 3 sets of username, password, and
56tenant/project names for a primary user, an admin user, and an alternate user.
57To enable and use tenant isolation you only need to configure 2 things:
58
59 #. A set of admin credentials with permissions to create users and
60 tenants/projects. This is specified in the identity section with the
61 admin_username, admin_tenant_name, and admin_password options
62 #. To enable tenant_isolation in the auth section with the
63 allow_tenant_isolation option.
64
Matthew Treinish0fd69e42015-03-06 00:40:51 -050065This is also the currently the default credential provider enabled by tempest,
66due to it's common use and ease of configuration.
Matthew Treinishbc1b15b2015-02-20 15:56:07 -050067
68Locking Test Accounts
69"""""""""""""""""""""
70For a long time using tenant isolation was the only method available if you
71wanted to enable parallel execution of tempest tests. However this was
72insufficient for certain use cases because of the admin credentials requirement
73to create the credential sets on demand. To get around that the accounts.yaml
74file was introduced and with that a new internal credential provider to enable
75using the list of credentials instead of creating them on demand. With locking
76test accounts each test class will reserve a set of credentials from the
77accounts.yaml before executing any of its tests so that each class is isolated
78like in tenant isolation.
79
Matthew Treinish0fd69e42015-03-06 00:40:51 -050080Currently, this mechanism has some limitations, mostly around networking. The
81locking test accounts provider will only work with a single flat network as
Matthew Treinishbc1b15b2015-02-20 15:56:07 -050082the default for each tenant/project. If another network configuration is used
83in your cloud you might face unexpected failures.
84
85To enable and use locking test accounts you need do a few things:
86
87 #. Enable the locking test account provider with the
88 locking_credentials_provider option in the auth section
89 #. Create a accounts.yaml file which contains the set of pre-existing
90 credentials to use for testing. To make sure you don't have a credentials
91 starvation issue when running in parallel make sure you have at least 2
92 times the number of parallel workers you are using to execute tempest
93 available in the file.
Matthew Treinish0fd69e42015-03-06 00:40:51 -050094
95 You can check the sample file packaged in tempest for the yaml format
Matthew Treinishbc1b15b2015-02-20 15:56:07 -050096 #. Provide tempest with the location of you accounts.yaml file with the
97 test_accounts_file option in the auth section
98
99
100Non-locking test accounts
101"""""""""""""""""""""""""
102When tempest was refactored to allow for locking test accounts, the original
103non-tenant isolated case was converted to support the new accounts.yaml file.
104This mechanism is the non-locking test accounts provider. It only makes sense
105to use it if parallel execution isn't needed. If the role restrictions were too
106limiting with the locking accounts provider and tenant isolation is not wanted
107then you can use the non-locking test accounts credential provider without the
Matthew Treinish0fd69e42015-03-06 00:40:51 -0500108accounts.yaml file.
Matthew Treinishbc1b15b2015-02-20 15:56:07 -0500109
110To use the non-locking test accounts provider you have 2 ways to configure it.
111First you can specify the sets of credentials in the configuration file like
112detailed above with following 9 options in the identity section:
113
114 #. username
115 #. password
116 #. tenant_name
117 #. admin_username
118 #. admin_password
119 #. admin_tenant_name
120 #. alt_username
121 #. alt_password
122 #. alt_tenant_name
123
Matthew Treinish0fd69e42015-03-06 00:40:51 -0500124The only restriction with using the traditional config options for credentials
125is that if a test requires specific roles on accounts these tests can not be
126run. This is because the config options do not give sufficient flexibility to
127describe the roles assigned to a user for running the tests.
Matthew Treinishbc1b15b2015-02-20 15:56:07 -0500128
129You also can use the accounts.yaml file to specify the credentials used for
130testing. This will just allocate them serially so you only need to provide
131a pair of credentials. Do note that all the restrictions associated with
Matthew Treinish0fd69e42015-03-06 00:40:51 -0500132locking test accounts applies to using the accounts.yaml file this way too,
133except since you can't run in parallel only 2 of each type of credential is
134required to run. However, the limitation on tests which require specific roles
135does not apply here.
136
Matthew Treinishbc1b15b2015-02-20 15:56:07 -0500137The procedure for doing this is very similar to with the locking accounts
138provider just don't set the locking_credentials_provider to true and you
139only should need a single pair of credentials.