blob: 146fac9df717519ecb837e0e43b2bbf1f3f4edc4 [file] [log] [blame]
Matthew Treinishb86cda92013-07-29 11:22:23 -04001# Copyright 2013 IBM Corp.
2#
3# Licensed under the Apache License, Version 2.0 (the "License"); you may
4# not use this file except in compliance with the License. You may obtain
5# a copy of the License at
6#
7# http://www.apache.org/licenses/LICENSE-2.0
8#
9# Unless required by applicable law or agreed to in writing, software
10# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
11# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
12# License for the specific language governing permissions and limitations
13# under the License.
14
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050015import netaddr
16
17import keystoneclient.v2_0.client as keystoneclient
18import neutronclient.v2_0.client as neutronclient
Matthew Treinishb86cda92013-07-29 11:22:23 -040019
20from tempest import clients
Masayuki Igawa259c1132013-10-31 17:48:44 +090021from tempest.common.utils import data_utils
Matthew Treinishb86cda92013-07-29 11:22:23 -040022from tempest import config
23from tempest import exceptions
24from tempest.openstack.common import log as logging
25
Sean Dague86bd8422013-12-20 09:56:44 -050026CONF = config.CONF
Matthew Treinishb86cda92013-07-29 11:22:23 -040027LOG = logging.getLogger(__name__)
28
29
30class IsolatedCreds(object):
31
32 def __init__(self, name, tempest_client=True, interface='json',
Matthew Treinish9f756a02014-01-15 10:26:07 -050033 password='pass', network_resources=None):
34 self.network_resources = network_resources
Matthew Treinishb86cda92013-07-29 11:22:23 -040035 self.isolated_creds = {}
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050036 self.isolated_net_resources = {}
37 self.ports = []
Matthew Treinishb86cda92013-07-29 11:22:23 -040038 self.name = name
Sean Dague86bd8422013-12-20 09:56:44 -050039 self.config = CONF
Matthew Treinishb86cda92013-07-29 11:22:23 -040040 self.tempest_client = tempest_client
41 self.interface = interface
42 self.password = password
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050043 self.identity_admin_client, self.network_admin_client = (
44 self._get_admin_clients())
Matthew Treinishb86cda92013-07-29 11:22:23 -040045
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050046 def _get_official_admin_clients(self):
Sean Dague86bd8422013-12-20 09:56:44 -050047 username = CONF.identity.admin_username
48 password = CONF.identity.admin_password
49 tenant_name = CONF.identity.admin_tenant_name
50 auth_url = CONF.identity.uri
51 dscv = CONF.identity.disable_ssl_certificate_validation
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050052 identity_client = keystoneclient.Client(username=username,
53 password=password,
54 tenant_name=tenant_name,
55 auth_url=auth_url,
56 insecure=dscv)
57 network_client = neutronclient.Client(username=username,
58 password=password,
59 tenant_name=tenant_name,
60 auth_url=auth_url,
61 insecure=dscv)
62 return identity_client, network_client
Matthew Treinishb86cda92013-07-29 11:22:23 -040063
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050064 def _get_admin_clients(self):
Matthew Treinishb86cda92013-07-29 11:22:23 -040065 """
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050066 Returns a tuple with instances of the following admin clients (in this
67 order):
68 identity
69 network
Matthew Treinishb86cda92013-07-29 11:22:23 -040070 """
71 if self.tempest_client:
72 os = clients.AdminManager(interface=self.interface)
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050073 admin_clients = (os.identity_client,
74 os.network_client,)
Matthew Treinishb86cda92013-07-29 11:22:23 -040075 else:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050076 admin_clients = self._get_official_admin_clients()
77 return admin_clients
Matthew Treinishb86cda92013-07-29 11:22:23 -040078
79 def _create_tenant(self, name, description):
80 if self.tempest_client:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050081 resp, tenant = self.identity_admin_client.create_tenant(
Matthew Treinishb86cda92013-07-29 11:22:23 -040082 name=name, description=description)
83 else:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050084 tenant = self.identity_admin_client.tenants.create(
85 name,
86 description=description)
Matthew Treinishb86cda92013-07-29 11:22:23 -040087 return tenant
88
89 def _get_tenant_by_name(self, name):
90 if self.tempest_client:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050091 resp, tenant = self.identity_admin_client.get_tenant_by_name(name)
Matthew Treinishb86cda92013-07-29 11:22:23 -040092 else:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -050093 tenants = self.identity_admin_client.tenants.list()
Matthew Treinishb86cda92013-07-29 11:22:23 -040094 for ten in tenants:
95 if ten['name'] == name:
96 tenant = ten
DennyZhang1eb40462013-09-26 14:18:30 -050097 break
98 else:
99 raise exceptions.NotFound('No such tenant')
Matthew Treinishb86cda92013-07-29 11:22:23 -0400100 return tenant
101
102 def _create_user(self, username, password, tenant, email):
103 if self.tempest_client:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500104 resp, user = self.identity_admin_client.create_user(username,
105 password,
106 tenant['id'],
107 email)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400108 else:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500109 user = self.identity_admin_client.users.create(username, password,
110 email,
111 tenant_id=tenant.id)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400112 return user
113
114 def _get_user(self, tenant, username):
115 if self.tempest_client:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500116 resp, user = self.identity_admin_client.get_user_by_username(
117 tenant['id'],
118 username)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400119 else:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500120 user = self.identity_admin_client.users.get(username)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400121 return user
122
123 def _list_roles(self):
124 if self.tempest_client:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500125 resp, roles = self.identity_admin_client.list_roles()
Matthew Treinishb86cda92013-07-29 11:22:23 -0400126 else:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500127 roles = self.identity_admin_client.roles.list()
Matthew Treinishb86cda92013-07-29 11:22:23 -0400128 return roles
129
130 def _assign_user_role(self, tenant, user, role):
131 if self.tempest_client:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500132 self.identity_admin_client.assign_user_role(tenant, user, role)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400133 else:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500134 self.identity_admin_client.roles.add_user_role(user,
135 role, tenant=tenant)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400136
137 def _delete_user(self, user):
138 if self.tempest_client:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500139 self.identity_admin_client.delete_user(user)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400140 else:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500141 self.identity_admin_client.users.delete(user)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400142
143 def _delete_tenant(self, tenant):
144 if self.tempest_client:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500145 self.identity_admin_client.delete_tenant(tenant)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400146 else:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500147 self.identity_admin_client.tenants.delete(tenant)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400148
Sean Dague6969b902014-01-28 06:48:37 -0500149 def _create_creds(self, suffix="", admin=False):
150 """Create random credentials under the following schema.
151
152 If the name contains a '.' is the full class path of something, and
153 we don't really care. If it isn't, it's probably a meaningful name,
154 so use it.
155
156 For logging purposes, -user and -tenant are long and redundant,
157 don't use them. The user# will be sufficient to figure it out.
158 """
159 if '.' in self.name:
160 root = ""
161 else:
162 root = self.name
163
164 tenant_name = data_utils.rand_name(root) + suffix
Matthew Treinishb86cda92013-07-29 11:22:23 -0400165 tenant_desc = tenant_name + "-desc"
Matthew Treinishb86cda92013-07-29 11:22:23 -0400166 tenant = self._create_tenant(name=tenant_name,
167 description=tenant_desc)
Sean Dague6969b902014-01-28 06:48:37 -0500168
169 username = data_utils.rand_name(root) + suffix
170 email = data_utils.rand_name(root) + suffix + "@example.com"
Matthew Treinishb86cda92013-07-29 11:22:23 -0400171 user = self._create_user(username, self.password,
172 tenant, email)
173 if admin:
174 role = None
175 try:
176 roles = self._list_roles()
Sean Dague86bd8422013-12-20 09:56:44 -0500177 admin_role = CONF.identity.admin_role
Matthew Treinishb86cda92013-07-29 11:22:23 -0400178 if self.tempest_client:
Russell Sim7f894a52013-09-13 10:35:21 +1000179 role = next(r for r in roles if r['name'] == admin_role)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400180 else:
Russell Sim7f894a52013-09-13 10:35:21 +1000181 role = next(r for r in roles if r.name == admin_role)
Matthew Treinishb86cda92013-07-29 11:22:23 -0400182 except StopIteration:
183 msg = "No admin role found"
184 raise exceptions.NotFound(msg)
185 if self.tempest_client:
186 self._assign_user_role(tenant['id'], user['id'], role['id'])
187 else:
188 self._assign_user_role(tenant.id, user.id, role.id)
189 return user, tenant
190
191 def _get_cred_names(self, user, tenant):
192 if self.tempest_client:
193 username = user.get('name')
194 tenant_name = tenant.get('name')
195 else:
196 username = user.name
197 tenant_name = tenant.name
198 return username, tenant_name
199
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500200 def _get_tenant_id(self, tenant):
201 if self.tempest_client:
202 return tenant.get('id')
203 else:
204 return tenant.id
205
206 def _create_network_resources(self, tenant_id):
207 network = None
208 subnet = None
209 router = None
Matthew Treinish9f756a02014-01-15 10:26:07 -0500210 # Make sure settings
211 if self.network_resources:
212 if self.network_resources['router']:
213 if (not self.network_resources['subnet'] or
214 not self.network_resources['network']):
215 raise exceptions.InvalidConfiguration(
216 'A router requires a subnet and network')
217 elif self.network_resources['subnet']:
218 if not self.network_resources['network']:
219 raise exceptions.InvalidConfiguration(
220 'A subnet requires a network')
221 elif self.network_resources['dhcp']:
222 raise exceptions.InvalidConfiguration('DHCP requires a subnet')
223
Masayuki Igawa259c1132013-10-31 17:48:44 +0900224 data_utils.rand_name_root = data_utils.rand_name(self.name)
Matthew Treinish9f756a02014-01-15 10:26:07 -0500225 if not self.network_resources or self.network_resources['network']:
226 network_name = data_utils.rand_name_root + "-network"
227 network = self._create_network(network_name, tenant_id)
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500228 try:
Matthew Treinish9f756a02014-01-15 10:26:07 -0500229 if not self.network_resources or self.network_resources['subnet']:
230 subnet_name = data_utils.rand_name_root + "-subnet"
231 subnet = self._create_subnet(subnet_name, tenant_id,
232 network['id'])
233 if not self.network_resources or self.network_resources['router']:
234 router_name = data_utils.rand_name_root + "-router"
235 router = self._create_router(router_name, tenant_id)
236 self._add_router_interface(router['id'], subnet['id'])
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500237 except Exception:
238 if router:
239 self._clear_isolated_router(router['id'], router['name'])
240 if subnet:
241 self._clear_isolated_subnet(subnet['id'], subnet['name'])
242 if network:
243 self._clear_isolated_network(network['id'], network['name'])
244 raise
245 return network, subnet, router
246
247 def _create_network(self, name, tenant_id):
248 if self.tempest_client:
249 resp, resp_body = self.network_admin_client.create_network(
Eugene Nikanorove9d255a2013-12-18 16:31:42 +0400250 name=name, tenant_id=tenant_id)
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500251 else:
252 body = {'network': {'tenant_id': tenant_id, 'name': name}}
253 resp_body = self.network_admin_client.create_network(body)
254 return resp_body['network']
255
256 def _create_subnet(self, subnet_name, tenant_id, network_id):
257 if not self.tempest_client:
258 body = {'subnet': {'name': subnet_name, 'tenant_id': tenant_id,
259 'network_id': network_id, 'ip_version': 4}}
Matthew Treinish9f756a02014-01-15 10:26:07 -0500260 if self.network_resources:
261 body['enable_dhcp'] = self.network_resources['dhcp']
Sean Dague86bd8422013-12-20 09:56:44 -0500262 base_cidr = netaddr.IPNetwork(CONF.network.tenant_network_cidr)
263 mask_bits = CONF.network.tenant_network_mask_bits
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500264 for subnet_cidr in base_cidr.subnet(mask_bits):
265 try:
266 if self.tempest_client:
Matthew Treinish9f756a02014-01-15 10:26:07 -0500267 if self.network_resources:
268 resp, resp_body = self.network_admin_client.\
269 create_subnet(
Eugene Nikanorove9d255a2013-12-18 16:31:42 +0400270 network_id=network_id, cidr=str(subnet_cidr),
Matthew Treinish9f756a02014-01-15 10:26:07 -0500271 name=subnet_name,
272 tenant_id=tenant_id,
Eugene Nikanorove9d255a2013-12-18 16:31:42 +0400273 enable_dhcp=self.network_resources['dhcp'],
274 ip_version=4)
Matthew Treinish9f756a02014-01-15 10:26:07 -0500275 else:
276 resp, resp_body = self.network_admin_client.\
Eugene Nikanorove9d255a2013-12-18 16:31:42 +0400277 create_subnet(network_id=network_id,
278 cidr=str(subnet_cidr),
Matthew Treinish9f756a02014-01-15 10:26:07 -0500279 name=subnet_name,
Eugene Nikanorove9d255a2013-12-18 16:31:42 +0400280 tenant_id=tenant_id,
281 ip_version=4)
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500282 else:
283 body['subnet']['cidr'] = str(subnet_cidr)
284 resp_body = self.network_admin_client.create_subnet(body)
285 break
286 except exceptions.BadRequest as e:
287 if 'overlaps with another subnet' not in str(e):
288 raise
289 else:
290 e = exceptions.BuildErrorException()
291 e.message = 'Available CIDR for subnet creation could not be found'
292 raise e
293 return resp_body['subnet']
294
295 def _create_router(self, router_name, tenant_id):
296 external_net_id = dict(
Sean Dague86bd8422013-12-20 09:56:44 -0500297 network_id=CONF.network.public_network_id)
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500298 if self.tempest_client:
299 resp, resp_body = self.network_admin_client.create_router(
300 router_name,
301 external_gateway_info=external_net_id,
302 tenant_id=tenant_id)
303 else:
304 body = {'router': {'name': router_name, 'tenant_id': tenant_id,
305 'external_gateway_info': external_net_id,
306 'admin_state_up': True}}
307 resp_body = self.network_admin_client.create_router(body)
308 return resp_body['router']
309
310 def _add_router_interface(self, router_id, subnet_id):
311 if self.tempest_client:
312 self.network_admin_client.add_router_interface_with_subnet_id(
313 router_id, subnet_id)
314 else:
315 body = {'subnet_id': subnet_id}
316 self.network_admin_client.add_interface_router(router_id, body)
317
Matthew Treinishb86cda92013-07-29 11:22:23 -0400318 def get_primary_tenant(self):
319 return self.isolated_creds.get('primary')[1]
320
321 def get_primary_user(self):
322 return self.isolated_creds.get('primary')[0]
323
324 def get_alt_tenant(self):
325 return self.isolated_creds.get('alt')[1]
326
327 def get_alt_user(self):
328 return self.isolated_creds.get('alt')[0]
329
330 def get_admin_tenant(self):
331 return self.isolated_creds.get('admin')[1]
332
333 def get_admin_user(self):
334 return self.isolated_creds.get('admin')[0]
335
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500336 def get_primary_network(self):
337 return self.isolated_net_resources.get('primary')[0]
338
339 def get_primary_subnet(self):
340 return self.isolated_net_resources.get('primary')[1]
341
342 def get_primary_router(self):
343 return self.isolated_net_resources.get('primary')[2]
344
345 def get_admin_network(self):
346 return self.isolated_net_resources.get('admin')[0]
347
348 def get_admin_subnet(self):
349 return self.isolated_net_resources.get('admin')[1]
350
351 def get_admin_router(self):
352 return self.isolated_net_resources.get('admin')[2]
353
354 def get_alt_network(self):
355 return self.isolated_net_resources.get('alt')[0]
356
357 def get_alt_subnet(self):
358 return self.isolated_net_resources.get('alt')[1]
359
360 def get_alt_router(self):
361 return self.isolated_net_resources.get('alt')[2]
362
Matthew Treinishb86cda92013-07-29 11:22:23 -0400363 def get_primary_creds(self):
364 if self.isolated_creds.get('primary'):
365 user, tenant = self.isolated_creds['primary']
366 username, tenant_name = self._get_cred_names(user, tenant)
367 else:
368 user, tenant = self._create_creds()
369 username, tenant_name = self._get_cred_names(user, tenant)
370 self.isolated_creds['primary'] = (user, tenant)
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500371 LOG.info("Acquired isolated creds:\n user: %s, tenant: %s"
Matthew Treinishb86cda92013-07-29 11:22:23 -0400372 % (username, tenant_name))
Sean Dague86bd8422013-12-20 09:56:44 -0500373 if CONF.service_available.neutron:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500374 network, subnet, router = self._create_network_resources(
375 self._get_tenant_id(tenant))
376 self.isolated_net_resources['primary'] = (
377 network, subnet, router,)
378 LOG.info("Created isolated network resources for : \n"
379 + " user: %s, tenant: %s" % (username, tenant_name))
Matthew Treinishb86cda92013-07-29 11:22:23 -0400380 return username, tenant_name, self.password
381
382 def get_admin_creds(self):
383 if self.isolated_creds.get('admin'):
384 user, tenant = self.isolated_creds['admin']
385 username, tenant_name = self._get_cred_names(user, tenant)
386 else:
387 user, tenant = self._create_creds(admin=True)
388 username, tenant_name = self._get_cred_names(user, tenant)
389 self.isolated_creds['admin'] = (user, tenant)
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500390 LOG.info("Acquired admin isolated creds:\n user: %s, tenant: %s"
Matthew Treinishb86cda92013-07-29 11:22:23 -0400391 % (username, tenant_name))
Sean Dague86bd8422013-12-20 09:56:44 -0500392 if CONF.service_available.neutron:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500393 network, subnet, router = self._create_network_resources(
394 self._get_tenant_id(tenant))
395 self.isolated_net_resources['admin'] = (
396 network, subnet, router,)
397 LOG.info("Created isolated network resources for : \n"
398 + " user: %s, tenant: %s" % (username, tenant_name))
399 return username, tenant_name, self.password
Matthew Treinishb86cda92013-07-29 11:22:23 -0400400
401 def get_alt_creds(self):
402 if self.isolated_creds.get('alt'):
403 user, tenant = self.isolated_creds['alt']
404 username, tenant_name = self._get_cred_names(user, tenant)
405 else:
406 user, tenant = self._create_creds()
407 username, tenant_name = self._get_cred_names(user, tenant)
408 self.isolated_creds['alt'] = (user, tenant)
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500409 LOG.info("Acquired alt isolated creds:\n user: %s, tenant: %s"
Matthew Treinishb86cda92013-07-29 11:22:23 -0400410 % (username, tenant_name))
Sean Dague86bd8422013-12-20 09:56:44 -0500411 if CONF.service_available.neutron:
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500412 network, subnet, router = self._create_network_resources(
413 self._get_tenant_id(tenant))
414 self.isolated_net_resources['alt'] = (
415 network, subnet, router,)
416 LOG.info("Created isolated network resources for : \n"
417 + " user: %s, tenant: %s" % (username, tenant_name))
Matthew Treinishb86cda92013-07-29 11:22:23 -0400418 return username, tenant_name, self.password
419
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500420 def _clear_isolated_router(self, router_id, router_name):
421 net_client = self.network_admin_client
422 try:
423 net_client.delete_router(router_id)
424 except exceptions.NotFound:
425 LOG.warn('router with name: %s not found for delete' %
426 router_name)
427 pass
428
429 def _clear_isolated_subnet(self, subnet_id, subnet_name):
430 net_client = self.network_admin_client
431 try:
432 net_client.delete_subnet(subnet_id)
433 except exceptions.NotFound:
434 LOG.warn('subnet with name: %s not found for delete' %
435 subnet_name)
436 pass
437
438 def _clear_isolated_network(self, network_id, network_name):
439 net_client = self.network_admin_client
440 try:
441 net_client.delete_network(network_id)
442 except exceptions.NotFound:
443 LOG.warn('network with name: %s not found for delete' %
444 network_name)
445 pass
446
447 def _cleanup_ports(self, network_id):
448 # TODO(mlavalle) This method will be removed once patch
449 # https://review.openstack.org/#/c/46563/ merges in Neutron
450 if not self.ports:
451 if self.tempest_client:
452 resp, resp_body = self.network_admin_client.list_ports()
453 else:
454 resp_body = self.network_admin_client.list_ports()
455 self.ports = resp_body['ports']
456 ports_to_delete = [
armando-migliaccio96a86ae2013-11-21 17:26:16 -0800457 port
458 for port in self.ports
459 if (port['network_id'] == network_id and
460 port['device_owner'] != 'network:router_interface')
461 ]
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500462 for port in ports_to_delete:
463 try:
464 LOG.info('Cleaning up port id %s, name %s' %
465 (port['id'], port['name']))
466 self.network_admin_client.delete_port(port['id'])
467 except exceptions.NotFound:
468 LOG.warn('Port id: %s, name %s not found for clean-up' %
469 (port['id'], port['name']))
470
471 def _clear_isolated_net_resources(self):
472 net_client = self.network_admin_client
473 for cred in self.isolated_net_resources:
474 network, subnet, router = self.isolated_net_resources.get(cred)
Salvatore Orlandocf996c62014-01-30 09:15:18 -0800475 LOG.debug("Clearing network: %(network)s, "
476 "subnet: %(subnet)s, router: %(router)s",
477 {'network': network, 'subnet': subnet, 'router': router})
478 if (not self.network_resources or
479 self.network_resources.get('router')):
Matthew Treinish9f756a02014-01-15 10:26:07 -0500480 try:
481 if self.tempest_client:
482 net_client.remove_router_interface_with_subnet_id(
483 router['id'], subnet['id'])
484 else:
485 body = {'subnet_id': subnet['id']}
486 net_client.remove_interface_router(router['id'], body)
487 except exceptions.NotFound:
488 LOG.warn('router with name: %s not found for delete' %
489 router['name'])
490 pass
491 self._clear_isolated_router(router['id'], router['name'])
Salvatore Orlandocf996c62014-01-30 09:15:18 -0800492 if (not self.network_resources or
493 self.network_resources.get('network')):
Matthew Treinish9f756a02014-01-15 10:26:07 -0500494 # TODO(mlavalle) This method call will be removed once patch
495 # https://review.openstack.org/#/c/46563/ merges in Neutron
496 self._cleanup_ports(network['id'])
Salvatore Orlandocf996c62014-01-30 09:15:18 -0800497 if (not self.network_resources or
498 self.network_resources.get('subnet')):
Matthew Treinish9f756a02014-01-15 10:26:07 -0500499 self._clear_isolated_subnet(subnet['id'], subnet['name'])
Salvatore Orlandocf996c62014-01-30 09:15:18 -0800500 if (not self.network_resources or
501 self.network_resources.get('network')):
Matthew Treinish9f756a02014-01-15 10:26:07 -0500502 self._clear_isolated_network(network['id'], network['name'])
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500503
Matthew Treinishb86cda92013-07-29 11:22:23 -0400504 def clear_isolated_creds(self):
505 if not self.isolated_creds:
506 return
Miguel Lavalleb8fabc52013-08-23 11:19:57 -0500507 self._clear_isolated_net_resources()
Matthew Treinishb86cda92013-07-29 11:22:23 -0400508 for cred in self.isolated_creds:
509 user, tenant = self.isolated_creds.get(cred)
510 try:
511 if self.tempest_client:
512 self._delete_user(user['id'])
513 else:
514 self._delete_user(user.id)
515 except exceptions.NotFound:
516 if self.tempest_client:
517 name = user['name']
518 else:
519 name = user.name
520 LOG.warn("user with name: %s not found for delete" % name)
521 pass
522 try:
523 if self.tempest_client:
524 self._delete_tenant(tenant['id'])
525 else:
526 self._delete_tenant(tenant.id)
527 except exceptions.NotFound:
528 if self.tempest_client:
529 name = tenant['name']
530 else:
531 name = tenant.name
532 LOG.warn("tenant with name: %s not found for delete" % name)
533 pass