summaryrefslogtreecommitdiff
path: root/openstackclient
diff options
context:
space:
mode:
Diffstat (limited to 'openstackclient')
-rw-r--r--openstackclient/compute/v2/server.py52
-rw-r--r--openstackclient/identity/v3/mapping.py1
-rw-r--r--openstackclient/identity/v3/user.py23
-rw-r--r--openstackclient/network/v2/network.py4
-rw-r--r--openstackclient/network/v2/network_meter_rule.py203
-rw-r--r--openstackclient/network/v2/port.py99
-rw-r--r--openstackclient/tests/functional/base.py27
-rw-r--r--openstackclient/tests/functional/compute/v2/test_server.py183
-rw-r--r--openstackclient/tests/functional/identity/v2/common.py13
-rw-r--r--openstackclient/tests/functional/identity/v3/common.py12
-rw-r--r--openstackclient/tests/functional/network/v2/test_network_meter_rule.py108
-rw-r--r--openstackclient/tests/unit/compute/v2/test_server.py23
-rw-r--r--openstackclient/tests/unit/identity/v3/test_mappings.py8
-rw-r--r--openstackclient/tests/unit/identity/v3/test_user.py36
-rw-r--r--openstackclient/tests/unit/network/v2/fakes.py46
-rw-r--r--openstackclient/tests/unit/network/v2/test_network_meter_rule.py321
-rw-r--r--openstackclient/tests/unit/network/v2/test_port.py235
-rw-r--r--openstackclient/tests/unit/volume/v2/test_snapshot.py15
-rw-r--r--openstackclient/volume/v2/volume_snapshot.py22
19 files changed, 1337 insertions, 94 deletions
diff --git a/openstackclient/compute/v2/server.py b/openstackclient/compute/v2/server.py
index dc32add5..ccda1c51 100644
--- a/openstackclient/compute/v2/server.py
+++ b/openstackclient/compute/v2/server.py
@@ -508,28 +508,40 @@ class CreateServer(command.ShowOne):
"exception": e}
)
- block_device_mapping = {}
+ block_device_mapping_v2 = []
if volume:
- # When booting from volume, for now assume no other mappings
- # This device value is likely KVM-specific
- block_device_mapping = {'vda': volume}
- else:
- for dev_map in parsed_args.block_device_mapping:
- dev_key, dev_vol = dev_map.split('=', 1)
- block_volume = None
- if dev_vol:
- vol = dev_vol.split(':', 1)[0]
- if vol:
- vol_id = utils.find_resource(
+ block_device_mapping_v2 = [{'uuid': volume,
+ 'boot_index': '0',
+ 'source_type': 'volume',
+ 'destination_type': 'volume'
+ }]
+ for dev_map in parsed_args.block_device_mapping:
+ dev_name, dev_map = dev_map.split('=', 1)
+ if dev_map:
+ dev_map = dev_map.split(':')
+ if len(dev_map) > 0:
+ mapping = {
+ 'device_name': dev_name,
+ 'uuid': utils.find_resource(
volume_client.volumes,
- vol,
- ).id
- block_volume = dev_vol.replace(vol, vol_id)
+ dev_map[0],
+ ).id}
+ # Block device mapping v1 compatibility
+ if len(dev_map) > 1 and \
+ dev_map[1] in ('volume', 'snapshot'):
+ mapping['source_type'] = dev_map[1]
else:
- msg = _("Volume name or ID must be specified if "
- "--block-device-mapping is specified")
- raise exceptions.CommandError(msg)
- block_device_mapping.update({dev_key: block_volume})
+ mapping['source_type'] = 'volume'
+ mapping['destination_type'] = 'volume'
+ if len(dev_map) > 2:
+ mapping['volume_size'] = dev_map[2]
+ if len(dev_map) > 3:
+ mapping['delete_on_termination'] = dev_map[3]
+ else:
+ msg = _("Volume name or ID must be specified if "
+ "--block-device-mapping is specified")
+ raise exceptions.CommandError(msg)
+ block_device_mapping_v2.append(mapping)
nics = []
if parsed_args.nic in ('auto', 'none'):
@@ -599,7 +611,7 @@ class CreateServer(command.ShowOne):
userdata=userdata,
key_name=parsed_args.key_name,
availability_zone=parsed_args.availability_zone,
- block_device_mapping=block_device_mapping,
+ block_device_mapping_v2=block_device_mapping_v2,
nics=nics,
scheduler_hints=hints,
config_drive=config_drive)
diff --git a/openstackclient/identity/v3/mapping.py b/openstackclient/identity/v3/mapping.py
index dbb1b068..28080f89 100644
--- a/openstackclient/identity/v3/mapping.py
+++ b/openstackclient/identity/v3/mapping.py
@@ -183,7 +183,6 @@ class SetMapping(command.Command, _RulesReader):
rules=rules)
mapping._info.pop('links', None)
- return zip(*sorted(six.iteritems(mapping._info)))
class ShowMapping(command.ShowOne):
diff --git a/openstackclient/identity/v3/user.py b/openstackclient/identity/v3/user.py
index 19a4c298..9c289a6d 100644
--- a/openstackclient/identity/v3/user.py
+++ b/openstackclient/identity/v3/user.py
@@ -302,6 +302,12 @@ class SetUser(command.Command):
help=_('Set user name'),
)
parser.add_argument(
+ '--domain',
+ metavar='<domain>',
+ help=_('Domain the user belongs to (name or ID). This can be '
+ 'used in case collisions between user names exist.'),
+ )
+ parser.add_argument(
'--project',
metavar='<project>',
help=_('Set default project (name or ID)'),
@@ -351,10 +357,19 @@ class SetUser(command.Command):
LOG.warning(_("No password was supplied, authentication will fail "
"when a user does not have a password."))
- user = utils.find_resource(
- identity_client.users,
- parsed_args.user,
- )
+ user_str = common._get_token_resource(identity_client, 'user',
+ parsed_args.user)
+ if parsed_args.domain:
+ domain = common.find_domain(identity_client, parsed_args.domain)
+ user = utils.find_resource(identity_client.users,
+ user_str,
+ domain_id=domain.id)
+ else:
+ user = utils.find_resource(
+ identity_client.users,
+ parsed_args.user,
+ )
+
kwargs = {}
if parsed_args.name:
kwargs['name'] = parsed_args.name
diff --git a/openstackclient/network/v2/network.py b/openstackclient/network/v2/network.py
index 26cd02c6..17ce0f7f 100644
--- a/openstackclient/network/v2/network.py
+++ b/openstackclient/network/v2/network.py
@@ -141,10 +141,8 @@ def _add_additional_network_options(parser):
parser.add_argument(
'--provider-network-type',
metavar='<provider-network-type>',
- choices=['flat', 'geneve', 'gre', 'local',
- 'vlan', 'vxlan'],
help=_("The physical mechanism by which the virtual network "
- "is implemented. The supported options are: "
+ "is implemented. For example: "
"flat, geneve, gre, local, vlan, vxlan."))
parser.add_argument(
'--provider-physical-network',
diff --git a/openstackclient/network/v2/network_meter_rule.py b/openstackclient/network/v2/network_meter_rule.py
new file mode 100644
index 00000000..49ff9e1b
--- /dev/null
+++ b/openstackclient/network/v2/network_meter_rule.py
@@ -0,0 +1,203 @@
+# Licensed under the Apache License, Version 2.0 (the "License"); you may
+# not use this file except in compliance with the License. You may obtain
+# a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+# License for the specific language governing permissions and limitations
+# under the License.
+#
+
+"""Meter Rule Implementations"""
+
+import logging
+
+from osc_lib.command import command
+from osc_lib import exceptions
+from osc_lib import utils
+
+from openstackclient.i18n import _
+from openstackclient.identity import common as identity_common
+from openstackclient.network import sdk_utils
+
+LOG = logging.getLogger(__name__)
+
+
+def _get_columns(item):
+ column_map = {
+ 'tenant_id': 'project_id',
+ }
+ return sdk_utils.get_osc_show_columns_for_sdk_resource(item, column_map)
+
+
+def _get_attrs(client_manager, parsed_args):
+ attrs = {}
+
+ if parsed_args.exclude:
+ attrs['excluded'] = True
+ if parsed_args.include:
+ attrs['excluded'] = False
+ if parsed_args.ingress or not parsed_args.egress:
+ attrs['direction'] = 'ingress'
+ if parsed_args.egress:
+ attrs['direction'] = 'egress'
+ if parsed_args.remote_ip_prefix is not None:
+ attrs['remote_ip_prefix'] = parsed_args.remote_ip_prefix
+ if parsed_args.meter is not None:
+ attrs['metering_label_id'] = parsed_args.meter
+ if parsed_args.project is not None:
+ identity_client = client_manager.identity
+ project_id = identity_common.find_project(
+ identity_client,
+ parsed_args.project,
+ parsed_args.project_domain,
+ ).id
+ attrs['tenant_id'] = project_id
+
+ return attrs
+
+
+class CreateMeterRule(command.ShowOne):
+ _description = _("Create a new meter rule")
+
+ def get_parser(self, prog_name):
+ parser = super(CreateMeterRule, self).get_parser(prog_name)
+
+ parser.add_argument(
+ '--project',
+ metavar='<project>',
+ help=_("Owner's project (name or ID)")
+ )
+ identity_common.add_project_domain_option_to_parser(parser)
+ exclude_group = parser.add_mutually_exclusive_group()
+ exclude_group.add_argument(
+ '--exclude',
+ action='store_true',
+ help=_("Exclude remote IP prefix from traffic count")
+ )
+ exclude_group.add_argument(
+ '--include',
+ action='store_true',
+ help=_("Include remote IP prefix from traffic count (default)")
+ )
+ direction_group = parser.add_mutually_exclusive_group()
+ direction_group.add_argument(
+ '--ingress',
+ action='store_true',
+ help=_("Apply rule to incoming network traffic (default)")
+ )
+ direction_group.add_argument(
+ '--egress',
+ action='store_true',
+ help=_('Apply rule to outgoing network traffic')
+ )
+ parser.add_argument(
+ '--remote-ip-prefix',
+ metavar='<remote-ip-prefix>',
+ required=True,
+ help=_('The remote IP prefix to associate with this rule'),
+ )
+ parser.add_argument(
+ 'meter',
+ metavar='<meter>',
+ help=_('Label to associate with this metering rule (name or ID)'),
+ )
+
+ return parser
+
+ def take_action(self, parsed_args):
+ client = self.app.client_manager.network
+ _meter = client.find_metering_label(parsed_args.meter,
+ ignore_missing=False)
+ parsed_args.meter = _meter.id
+ attrs = _get_attrs(self.app.client_manager, parsed_args)
+ obj = client.create_metering_label_rule(**attrs)
+ display_columns, columns = _get_columns(obj)
+ data = utils.get_item_properties(obj, columns, formatters={})
+
+ return (display_columns, data)
+
+
+class DeleteMeterRule(command.Command):
+ _description = _("Delete meter rule(s)")
+
+ def get_parser(self, prog_name):
+ parser = super(DeleteMeterRule, self).get_parser(prog_name)
+
+ parser.add_argument(
+ 'meter_rule_id',
+ metavar='<meter-rule-id>',
+ nargs='+',
+ help=_('Meter rule to delete (ID only)')
+ )
+
+ return parser
+
+ def take_action(self, parsed_args):
+ client = self.app.client_manager.network
+ result = 0
+
+ for id in parsed_args.meter_rule_id:
+ try:
+ obj = client.find_metering_label_rule(id, ignore_missing=False)
+ client.delete_metering_label_rule(obj)
+ except Exception as e:
+ result += 1
+ LOG.error(_("Failed to delete meter rule with "
+ "ID '%(id)s': %(e)s"),
+ {"id": id, "e": e})
+
+ if result > 0:
+ total = len(parsed_args.meter_rule_id)
+ msg = (_("%(result)s of %(total)s meter rules failed "
+ "to delete.") % {"result": result, "total": total})
+ raise exceptions.CommandError(msg)
+
+
+class ListMeterRule(command.Lister):
+ _description = _("List meter rules")
+
+ def take_action(self, parsed_args):
+ client = self.app.client_manager.network
+
+ columns = (
+ 'id',
+ 'excluded',
+ 'direction',
+ 'remote_ip_prefix',
+ )
+ column_headers = (
+ 'ID',
+ 'Excluded',
+ 'Direction',
+ 'Remote IP Prefix',
+ )
+ data = client.metering_label_rules()
+ return (column_headers,
+ (utils.get_item_properties(
+ s, columns,
+ ) for s in data))
+
+
+class ShowMeterRule(command.ShowOne):
+ _description = _("Display meter rules details")
+
+ def get_parser(self, prog_name):
+ parser = super(ShowMeterRule, self).get_parser(prog_name)
+ parser.add_argument(
+ 'meter_rule_id',
+ metavar='<meter-rule-id>',
+ help=_('Meter rule (ID only)')
+ )
+ return parser
+
+ def take_action(self, parsed_args):
+ client = self.app.client_manager.network
+ obj = client.find_metering_label_rule(parsed_args.meter_rule_id,
+ ignore_missing=False)
+ display_columns, columns = _get_columns(obj)
+ data = utils.get_item_properties(obj, columns)
+ return display_columns, data
diff --git a/openstackclient/network/v2/port.py b/openstackclient/network/v2/port.py
index 20f3ad75..c9de47e2 100644
--- a/openstackclient/network/v2/port.py
+++ b/openstackclient/network/v2/port.py
@@ -250,6 +250,17 @@ def _add_updatable_args(parser):
# TODO(abhiraut): Use the SDK resource mapped attribute names once the
# OSC minimum requirements include SDK 1.0.
+def _convert_address_pairs(parsed_args):
+ ops = []
+ for opt in parsed_args.allowed_address_pairs:
+ addr = {}
+ addr['ip_address'] = opt['ip-address']
+ if 'mac-address' in opt:
+ addr['mac_address'] = opt['mac-address']
+ ops.append(addr)
+ return ops
+
+
class CreatePort(command.ShowOne):
_description = _("Create a new port")
@@ -309,7 +320,7 @@ class CreatePort(command.ShowOne):
help=_("Name of this port")
)
# TODO(singhj): Add support for extended options:
- # qos,dhcp, address pairs
+ # qos,dhcp
secgroups = parser.add_mutually_exclusive_group()
secgroups.add_argument(
'--security-group',
@@ -336,7 +347,17 @@ class CreatePort(command.ShowOne):
action='store_true',
help=_("Disable port security for this port")
)
-
+ parser.add_argument(
+ '--allowed-address',
+ metavar='ip-address=<ip-address>[,mac-address=<mac-address>]',
+ action=parseractions.MultiKeyValueAction,
+ dest='allowed_address_pairs',
+ required_keys=['ip-address'],
+ optional_keys=['mac-address'],
+ help=_("Add allowed-address pair associated with this port: "
+ "ip-address=<ip-address>[,mac-address=<mac-address>] "
+ "(repeat option to set multiple allowed-address pairs)")
+ )
return parser
def take_action(self, parsed_args):
@@ -353,6 +374,9 @@ class CreatePort(command.ShowOne):
for sg in parsed_args.security_groups]
if parsed_args.no_security_group:
attrs['security_groups'] = []
+ if parsed_args.allowed_address_pairs:
+ attrs['allowed_address_pairs'] = (
+ _convert_address_pairs(parsed_args))
obj = client.create_port(**attrs)
display_columns, columns = _get_columns(obj)
@@ -436,11 +460,18 @@ class ListPort(command.Lister):
default=False,
help=_("List additional fields in output")
)
+ parser.add_argument(
+ '--project',
+ metavar='<project>',
+ help=_("List ports according to their project (name or ID)")
+ )
+ identity_common.add_project_domain_option_to_parser(parser)
return parser
def take_action(self, parsed_args):
network_client = self.app.client_manager.network
compute_client = self.app.client_manager.compute
+ identity_client = self.app.client_manager.identity
columns = (
'id',
@@ -477,6 +508,14 @@ class ListPort(command.Lister):
filters['network_id'] = network.id
if parsed_args.mac_address:
filters['mac_address'] = parsed_args.mac_address
+ if parsed_args.project:
+ project_id = identity_common.find_project(
+ identity_client,
+ parsed_args.project,
+ parsed_args.project_domain,
+ ).id
+ filters['tenant_id'] = project_id
+ filters['project_id'] = project_id
data = network_client.ports(**filters)
@@ -573,7 +612,26 @@ class SetPort(command.Command):
action='store_true',
help=_("Disable port security for this port")
)
-
+ parser.add_argument(
+ '--allowed-address',
+ metavar='ip-address=<ip-address>[,mac-address=<mac-address>]',
+ action=parseractions.MultiKeyValueAction,
+ dest='allowed_address_pairs',
+ required_keys=['ip-address'],
+ optional_keys=['mac-address'],
+ help=_("Add allowed-address pair associated with this port: "
+ "ip-address=<ip-address>[,mac-address=<mac-address>] "
+ "(repeat option to set multiple allowed-address pairs)")
+ )
+ parser.add_argument(
+ '--no-allowed-address',
+ dest='no_allowed_address_pair',
+ action='store_true',
+ help=_("Clear existing allowed-address pairs associated"
+ "with this port."
+ "(Specify both --allowed-address and --no-allowed-address"
+ "to overwrite the current allowed-address pairs)")
+ )
return parser
def take_action(self, parsed_args):
@@ -613,6 +671,19 @@ class SetPort(command.Command):
elif parsed_args.no_security_group:
attrs['security_groups'] = []
+ if (parsed_args.allowed_address_pairs and
+ parsed_args.no_allowed_address_pair):
+ attrs['allowed_address_pairs'] = (
+ _convert_address_pairs(parsed_args))
+
+ elif parsed_args.allowed_address_pairs:
+ attrs['allowed_address_pairs'] = (
+ [addr for addr in obj.allowed_address_pairs if addr] +
+ _convert_address_pairs(parsed_args))
+
+ elif parsed_args.no_allowed_address_pair:
+ attrs['allowed_address_pairs'] = []
+
client.update_port(obj, **attrs)
@@ -673,6 +744,19 @@ class UnsetPort(command.Command):
metavar="<port>",
help=_("Port to modify (name or ID)")
)
+ parser.add_argument(
+ '--allowed-address',
+ metavar='ip-address=<ip-address>[,mac-address=<mac-address>]',
+ action=parseractions.MultiKeyValueAction,
+ dest='allowed_address_pairs',
+ required_keys=['ip-address'],
+ optional_keys=['mac-address'],
+ help=_("Desired allowed-address pair which should be removed "
+ "from this port: ip-address=<ip-address> "
+ "[,mac-address=<mac-address>] (repeat option to set "
+ "multiple allowed-address pairs)")
+ )
+
return parser
def take_action(self, parsed_args):
@@ -684,6 +768,7 @@ class UnsetPort(command.Command):
tmp_fixed_ips = copy.deepcopy(obj.fixed_ips)
tmp_binding_profile = copy.deepcopy(obj.binding_profile)
tmp_secgroups = copy.deepcopy(obj.security_groups)
+ tmp_addr_pairs = copy.deepcopy(obj.allowed_address_pairs)
_prepare_fixed_ips(self.app.client_manager, parsed_args)
attrs = {}
if parsed_args.fixed_ip:
@@ -712,6 +797,14 @@ class UnsetPort(command.Command):
msg = _("Port does not contain security group %s") % sg
raise exceptions.CommandError(msg)
attrs['security_groups'] = tmp_secgroups
+ if parsed_args.allowed_address_pairs:
+ try:
+ for addr in _convert_address_pairs(parsed_args):
+ tmp_addr_pairs.remove(addr)
+ except ValueError:
+ msg = _("Port does not contain allowed-address-pair %s") % addr
+ raise exceptions.CommandError(msg)
+ attrs['allowed_address_pairs'] = tmp_addr_pairs
if attrs:
client.update_port(obj, **attrs)
diff --git a/openstackclient/tests/functional/base.py b/openstackclient/tests/functional/base.py
index fb78ea62..85743296 100644
--- a/openstackclient/tests/functional/base.py
+++ b/openstackclient/tests/functional/base.py
@@ -16,7 +16,6 @@ import shlex
import subprocess
import testtools
-import six
from tempest.lib.cli import output_parser
from tempest.lib import exceptions
@@ -88,23 +87,17 @@ class TestCase(testtools.TestCase):
for field in field_names:
self.assertIn(field, item)
- def assert_show_fields(self, items, field_names):
+ def assert_show_fields(self, show_output, field_names):
"""Verify that all items have keys listed in field_names."""
- for item in items:
- for key in six.iterkeys(item):
- self.assertIn(key, field_names)
-
- def assert_show_structure(self, items, field_names):
- """Verify that all field_names listed in keys of all items."""
- if isinstance(items, list):
- o = {}
- for d in items:
- o.update(d)
- else:
- o = items
- item_keys = o.keys()
- for field in field_names:
- self.assertIn(field, item_keys)
+
+ # field_names = ['name', 'description']
+ # show_output = [{'name': 'fc2b98d8faed4126b9e371eda045ade2'},
+ # {'description': 'description-821397086'}]
+ # this next line creates a flattened list of all 'keys' (like 'name',
+ # and 'description' out of the output
+ all_headers = [item for sublist in show_output for item in sublist]
+ for field_name in field_names:
+ self.assertIn(field_name, all_headers)
def parse_show_as_object(self, raw_output):
"""Return a dict with values parsed from cli output."""
diff --git a/openstackclient/tests/functional/compute/v2/test_server.py b/openstackclient/tests/functional/compute/v2/test_server.py
index 6eedf408..119ef05c 100644
--- a/openstackclient/tests/functional/compute/v2/test_server.py
+++ b/openstackclient/tests/functional/compute/v2/test_server.py
@@ -10,11 +10,13 @@
# License for the specific language governing permissions and limitations
# under the License.
+import json
import time
from tempest.lib.common.utils import data_utils
from openstackclient.tests.functional import base
+from openstackclient.tests.functional.volume.v2 import test_volume
from tempest.lib import exceptions
@@ -59,12 +61,10 @@ class ServerTests(base.TestCase):
"""Create server. Add cleanup."""
name = name or data_utils.rand_uuid()
opts = self.get_opts(self.FIELDS)
- flavor = self.get_flavor()
- image = self.get_image()
- network = self.get_network()
raw_output = self.openstack('--debug server create --flavor ' +
- flavor +
- ' --image ' + image + network + ' ' +
+ self.flavor_name +
+ ' --image ' + self.image_name +
+ self.network_arg + ' ' +
name + opts)
if not raw_output:
self.fail('Server has not been created!')
@@ -82,6 +82,10 @@ class ServerTests(base.TestCase):
def setUp(self):
"""Set necessary variables and create server."""
super(ServerTests, self).setUp()
+ self.flavor_name = self.get_flavor()
+ self.image_name = self.get_image()
+ self.network_arg = self.get_network()
+
self.NAME = data_utils.rand_name('TestServer')
self.OTHER_NAME = data_utils.rand_name('TestServer')
self.HEADERS = ['"Name"']
@@ -119,16 +123,47 @@ class ServerTests(base.TestCase):
self.assertIn(self.NAME, raw_output)
def test_server_show(self):
- """Test server show command.
-
- Test steps:
- 1) Boot server in setUp
- 2) Show server
- 3) Check output
- """
- opts = self.get_opts(self.FIELDS)
- raw_output = self.openstack('server show ' + self.NAME + opts)
- self.assertEqual(self.NAME + "\n", raw_output)
+ """Test server create, server delete commands"""
+ name1 = data_utils.rand_name('TestServer')
+ cmd_output = json.loads(self.openstack(
+ 'server create -f json ' +
+ '--flavor ' + self.flavor_name + ' ' +
+ '--image ' + self.image_name + ' ' +
+ self.network_arg + ' ' +
+ name1
+ ))
+ self.assertIsNotNone(cmd_output["id"])
+ self.addCleanup(self.openstack, 'server delete ' + name1)
+ self.assertEqual(
+ name1,
+ cmd_output["name"],
+ )
+
+ # Have a look at some other fields
+ flavor = json.loads(self.openstack(
+ 'flavor show -f json ' +
+ self.flavor_name
+ ))
+ self.assertEqual(
+ self.flavor_name,
+ flavor['name'],
+ )
+ self.assertEqual(
+ '%s (%s)' % (flavor['name'], flavor['id']),
+ cmd_output["flavor"],
+ )
+ image = json.loads(self.openstack(
+ 'image show -f json ' +
+ self.image_name
+ ))
+ self.assertEqual(
+ self.image_name,
+ image['name'],
+ )
+ self.assertEqual(
+ '%s (%s)' % (image['name'], image['id']),
+ cmd_output["image"],
+ )
def test_server_metadata(self):
"""Test command to set server metadata.
@@ -284,6 +319,124 @@ class ServerTests(base.TestCase):
self.assertEqual("", raw_output)
self.wait_for_status("ACTIVE")
+ def test_server_boot_from_volume(self):
+ """Test server create from volume, server delete
+
+ Test steps:
+ 1) Create volume from image
+ 2) Create empty volume
+ 3) Create server from new volumes
+ 4) Check for ACTIVE new server status
+ 5) Check volumes attached to server
+ """
+ # server_image = self.get_image()
+ # get volume status wait function
+ volume_wait_for = test_volume.VolumeTests(
+ methodName='wait_for',
+ ).wait_for
+
+ # get image size
+ cmd_output = json.loads(self.openstack(
+ 'image show -f json ' +
+ self.image_name
+ ))
+ try:
+ image_size = cmd_output['min_disk']
+ if image_size < 1:
+ image_size = 1
+ except ValueError:
+ image_size = 1
+
+ # create volume from image
+ volume_name = data_utils.rand_name('volume', self.image_name)
+ cmd_output = json.loads(self.openstack(
+ 'volume create -f json ' +
+ '--image ' + self.image_name + ' ' +
+ '--size ' + str(image_size) + ' ' +
+ volume_name
+ ))
+ self.assertIsNotNone(cmd_output["id"])
+ self.addCleanup(self.openstack, 'volume delete ' + volume_name)
+ self.assertEqual(
+ volume_name,
+ cmd_output['name'],
+ )
+ volume_wait_for("volume", volume_name, "available")
+
+ # create empty volume
+ empty_volume_name = data_utils.rand_name('TestVolume')
+ cmd_output = json.loads(self.openstack(
+ 'volume create -f json ' +
+ '--size ' + str(image_size) + ' ' +
+ empty_volume_name
+ ))
+ self.assertIsNotNone(cmd_output["id"])
+ self.addCleanup(self.openstack, 'volume delete ' + empty_volume_name)
+ self.assertEqual(
+ empty_volume_name,
+ cmd_output['name'],
+ )
+ volume_wait_for("volume", empty_volume_name, "available")
+
+ # create server
+ server_name = data_utils.rand_name('TestServer')
+ server = json.loads(self.openstack(
+ 'server create -f json ' +
+ '--flavor ' + self.flavor_name + ' ' +
+ '--volume ' + volume_name + ' ' +
+ '--block-device-mapping vdb=' + empty_volume_name + ' ' +
+ self.network_arg + ' ' +
+ server_name
+ ))
+ self.assertIsNotNone(server["id"])
+ self.addCleanup(self.openstack, 'server delete --wait ' + server_name)
+ self.assertEqual(
+ server_name,
+ server['name'],
+ )
+ volume_wait_for("server", server_name, "ACTIVE")
+
+ # check volumes
+ cmd_output = json.loads(self.openstack(
+ 'volume show -f json ' +
+ volume_name
+ ))
+ attachments = cmd_output['attachments']
+ self.assertEqual(
+ 1,
+ len(attachments),
+ )
+ self.assertEqual(
+ server['id'],
+ attachments[0]['server_id'],
+ )
+ self.assertEqual(
+ "in-use",
+ cmd_output['status'],
+ )
+
+ # NOTE(dtroyer): Prior to https://review.openstack.org/#/c/407111
+ # --block-device-mapping was ignored if --volume
+ # present on the command line. Now we should see the
+ # attachment.
+ cmd_output = json.loads(self.openstack(
+ 'volume show -f json ' +
+ empty_volume_name
+ ))
+ attachments = cmd_output['attachments']
+ self.assertEqual(
+ 1,
+ len(attachments),
+ )
+ self.assertEqual(
+ server['id'],
+ attachments[0]['server_id'],
+ )
+ self.assertEqual(
+ "in-use",
+ cmd_output['status'],
+ )
+
def wait_for_status(self, expected_status='ACTIVE', wait=900, interval=30):
"""Wait until server reaches expected status."""
# TODO(thowe): Add a server wait command to osc
diff --git a/openstackclient/tests/functional/identity/v2/common.py b/openstackclient/tests/functional/identity/v2/common.py
index b390c5bc..4f3e1801 100644
--- a/openstackclient/tests/functional/identity/v2/common.py
+++ b/openstackclient/tests/functional/identity/v2/common.py
@@ -22,14 +22,13 @@ BASIC_LIST_HEADERS = ['ID', 'Name']
class IdentityTests(base.TestCase):
"""Functional tests for Identity commands. """
- USER_FIELDS = ['email', 'enabled', 'id', 'name', 'project_id',
- 'username', 'domain_id', 'default_project_id']
- PROJECT_FIELDS = ['enabled', 'id', 'name', 'description', 'domain_id']
+ USER_FIELDS = ['email', 'enabled', 'id', 'name', 'project_id', 'username']
+ PROJECT_FIELDS = ['enabled', 'id', 'name', 'description']
TOKEN_FIELDS = ['expires', 'id', 'project_id', 'user_id']
- ROLE_FIELDS = ['id', 'name', 'links', 'domain_id']
+ ROLE_FIELDS = ['id', 'name', 'domain_id']
SERVICE_FIELDS = ['id', 'enabled', 'name', 'type', 'description']
ENDPOINT_FIELDS = ['id', 'region', 'service_id', 'service_name',
- 'service_type', 'enabled', 'publicurl',
+ 'service_type', 'publicurl',
'adminurl', 'internalurl']
EC2_CREDENTIALS_FIELDS = ['access', 'project_id', 'secret',
@@ -44,8 +43,8 @@ class IdentityTests(base.TestCase):
# prepare v2 env
os.environ['OS_IDENTITY_API_VERSION'] = '2.0'
auth_url = os.environ.get('OS_AUTH_URL')
- auth_url = auth_url.replace('v3', 'v2.0')
- os.environ['OS_AUTH_URL'] = auth_url
+ if auth_url:
+ os.environ['OS_AUTH_URL'] = auth_url.replace('v3', 'v2.0')
# create dummy project
cls.project_name = data_utils.rand_name('TestProject')
diff --git a/openstackclient/tests/functional/identity/v3/common.py b/openstackclient/tests/functional/identity/v3/common.py
index 3b6fc27b..1ec3ac92 100644
--- a/openstackclient/tests/functional/identity/v3/common.py
+++ b/openstackclient/tests/functional/identity/v3/common.py
@@ -23,15 +23,15 @@ BASIC_LIST_HEADERS = ['ID', 'Name']
class IdentityTests(base.TestCase):
"""Functional tests for Identity commands. """
- DOMAIN_FIELDS = ['description', 'enabled', 'id', 'name', 'links']
- GROUP_FIELDS = ['description', 'domain_id', 'id', 'name', 'links']
+ DOMAIN_FIELDS = ['description', 'enabled', 'id', 'name']
+ GROUP_FIELDS = ['description', 'domain_id', 'id', 'name']
TOKEN_FIELDS = ['expires', 'id', 'project_id', 'user_id']
USER_FIELDS = ['email', 'enabled', 'id', 'name', 'name',
'domain_id', 'default_project_id', 'description',
'password_expires_at']
PROJECT_FIELDS = ['description', 'id', 'domain_id', 'is_domain',
- 'enabled', 'name', 'parent_id', 'links']
- ROLE_FIELDS = ['id', 'name', 'links', 'domain_id']
+ 'enabled', 'name', 'parent_id']
+ ROLE_FIELDS = ['id', 'name', 'domain_id']
SERVICE_FIELDS = ['id', 'enabled', 'name', 'type', 'description']
REGION_FIELDS = ['description', 'enabled', 'parent_region', 'region']
ENDPOINT_FIELDS = ['id', 'region', 'region_id', 'service_id',
@@ -56,8 +56,8 @@ class IdentityTests(base.TestCase):
# prepare v3 env
os.environ['OS_IDENTITY_API_VERSION'] = '3'
auth_url = os.environ.get('OS_AUTH_URL')
- auth_url = auth_url.replace('v2.0', 'v3')
- os.environ['OS_AUTH_URL'] = auth_url
+ if auth_url:
+ os.environ['OS_AUTH_URL'] = auth_url.replace('v2.0', 'v3')
# create dummy domain
cls.domain_name = data_utils.rand_name('TestDomain')
diff --git a/openstackclient/tests/functional/network/v2/test_network_meter_rule.py b/openstackclient/tests/functional/network/v2/test_network_meter_rule.py
new file mode 100644
index 00000000..4f079e3c
--- /dev/null
+++ b/openstackclient/tests/functional/network/v2/test_network_meter_rule.py
@@ -0,0 +1,108 @@
+# Copyright (c) 2016, Intel Corporation.
+# All Rights Reserved.
+#
+# Licensed under the Apache License, Version 2.0 (the "License"); you may
+# not use this file except in compliance with the License. You may obtain
+# a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+# License for the specific language governing permissions and limitations
+# under the License.
+
+import re
+import uuid
+
+from openstackclient.tests.functional import base
+
+
+class TestMeterRule(base.TestCase):
+ """Functional tests for meter rule"""
+ METER_NAME = uuid.uuid4().hex
+ METER_ID = None
+ METER_RULE_ID = None
+
+ @classmethod
+ def setUpClass(cls):
+ # Set up some regex for matching below
+ cls.re_id = re.compile("id\s+\|\s+(\S+)")
+ cls.re_direction = re.compile("direction\s+\|\s+(\S+)")
+ cls.re_ip_prefix = re.compile(
+ "remote_ip_prefix\s+\|\s+([^|]+?)\s+\|"
+ )
+ cls.re_meter_id = re.compile("metering_label_id\s+\|\s+(\S+)")
+
+ raw_output = cls.openstack(
+ 'network meter create ' + cls.METER_NAME
+ )
+
+ cls.METER_ID = re.search(cls.re_id, raw_output).group(1)
+
+ @classmethod
+ def tearDownClass(cls):
+ raw_output = cls.openstack('network meter delete ' + cls.METER_ID)
+ cls.assertOutput('', raw_output)
+
+ def test_meter_rule_delete(self):
+ """test create, delete"""
+
+ raw_output = self.openstack(
+ 'network meter rule create ' +
+ '--remote-ip-prefix 10.0.0.0/8 ' +
+ self.METER_ID
+ )
+ rule_id = re.search(self.re_id, raw_output).group(1)
+ re_ip = re.search(self.re_ip_prefix, raw_output)
+
+ self.addCleanup(self.openstack,
+ 'network meter rule delete ' + rule_id)
+ self.assertIsNotNone(re_ip)
+ self.assertIsNotNone(rule_id)
+
+ def test_meter_rule_list(self):
+ """Test create, list, delete"""
+ raw_output = self.openstack(
+ 'network meter rule create ' +
+ '--remote-ip-prefix 10.0.0.0/8 ' +
+ self.METER_ID
+ )
+ rule_id = re.search(self.re_id, raw_output).group(1)
+ self.addCleanup(self.openstack,
+ 'network meter rule delete ' + rule_id)
+ self.assertEqual(
+ '10.0.0.0/8',
+ re.search(self.re_ip_prefix, raw_output).group(1)
+ )
+
+ raw_output = self.openstack('network meter rule list')
+ self.assertIsNotNone(re.search(rule_id + "|\s+\|\s+\|\s+10.0.0.0/8",
+ raw_output))
+
+ def test_meter_rule_show(self):
+ """Test create, show, delete"""
+ raw_output = self.openstack(
+ 'network meter rule create ' +
+ '--remote-ip-prefix 10.0.0.0/8 ' +
+ '--egress ' +
+ self.METER_ID
+ )
+ rule_id = re.search(self.re_id, raw_output).group(1)
+
+ self.assertEqual(
+ 'egress',
+ re.search(self.re_direction, raw_output).group(1)
+ )
+
+ raw_output = self.openstack('network meter rule show ' + rule_id)
+
+ self.assertEqual(
+ '10.0.0.0/8',
+ re.search(self.re_ip_prefix, raw_output).group(1)
+ )
+ self.assertIsNotNone(rule_id)
+
+ self.addCleanup(self.openstack,
+ 'network meter rule delete ' + rule_id)
diff --git a/openstackclient/tests/unit/compute/v2/test_server.py b/openstackclient/tests/unit/compute/v2/test_server.py
index deba4435..4cac990e 100644
--- a/openstackclient/tests/unit/compute/v2/test_server.py
+++ b/openstackclient/tests/unit/compute/v2/test_server.py
@@ -309,7 +309,7 @@ class TestServerCreate(TestServer):
userdata=None,
key_name=None,
availability_zone=None,
- block_device_mapping={},
+ block_device_mapping_v2=[],
nics=[],
scheduler_hints={},
config_drive=None,
@@ -364,7 +364,7 @@ class TestServerCreate(TestServer):
userdata=None,
key_name='keyname',
availability_zone=None,
- block_device_mapping={},
+ block_device_mapping_v2=[],
nics=[],
scheduler_hints={'a': ['b', 'c']},
config_drive=None,
@@ -444,7 +444,7 @@ class TestServerCreate(TestServer):
userdata=None,
key_name=None,
availability_zone=None,
- block_device_mapping={},
+ block_device_mapping_v2=[],
nics=[{'net-id': 'net1_uuid',
'v4-fixed-ip': '',
'v6-fixed-ip': '',
@@ -501,7 +501,7 @@ class TestServerCreate(TestServer):
userdata=None,
key_name=None,
availability_zone=None,
- block_device_mapping={},
+ block_device_mapping_v2=[],
nics=[],
scheduler_hints={},
config_drive=None,
@@ -551,7 +551,7 @@ class TestServerCreate(TestServer):
userdata=None,
key_name=None,
availability_zone=None,
- block_device_mapping={},
+ block_device_mapping_v2=[],
nics=[],
scheduler_hints={},
config_drive=None,
@@ -606,7 +606,7 @@ class TestServerCreate(TestServer):
userdata=mock_file,
key_name=None,
availability_zone=None,
- block_device_mapping={},
+ block_device_mapping_v2=[],
nics=[],
scheduler_hints={},
config_drive=None,
@@ -657,9 +657,14 @@ class TestServerCreate(TestServer):
userdata=None,
key_name=None,
availability_zone=None,
- block_device_mapping={
- 'vda': real_volume_mapping
- },
+ block_device_mapping_v2=[{
+ 'device_name': 'vda',
+ 'uuid': real_volume_mapping.split(':', 1)[0],
+ 'destination_type': 'volume',
+ 'source_type': 'volume',
+ 'delete_on_termination': '0',
+ 'volume_size': ''
+ }],
nics=[],
scheduler_hints={},
config_drive=None,
diff --git a/openstackclient/tests/unit/identity/v3/test_mappings.py b/openstackclient/tests/unit/identity/v3/test_mappings.py
index 5086724c..93fe1196 100644
--- a/openstackclient/tests/unit/identity/v3/test_mappings.py
+++ b/openstackclient/tests/unit/identity/v3/test_mappings.py
@@ -181,16 +181,12 @@ class TestMappingSet(TestMapping):
mocker.return_value = identity_fakes.MAPPING_RULES_2
with mock.patch("openstackclient.identity.v3.mapping."
"SetMapping._read_rules", mocker):
- columns, data = self.cmd.take_action(parsed_args)
+ result = self.cmd.take_action(parsed_args)
self.mapping_mock.update.assert_called_with(
mapping=identity_fakes.mapping_id,
rules=identity_fakes.MAPPING_RULES_2)
- collist = ('id', 'rules')
- self.assertEqual(collist, columns)
- datalist = (identity_fakes.mapping_id,
- identity_fakes.MAPPING_RULES_2)
- self.assertEqual(datalist, data)
+ self.assertIsNone(result)
def test_set_rules_wrong_file_path(self):
arglist = [
diff --git a/openstackclient/tests/unit/identity/v3/test_user.py b/openstackclient/tests/unit/identity/v3/test_user.py
index 3c1f49a6..2ce66e94 100644
--- a/openstackclient/tests/unit/identity/v3/test_user.py
+++ b/openstackclient/tests/unit/identity/v3/test_user.py
@@ -684,9 +684,14 @@ class TestUserList(TestUser):
class TestUserSet(TestUser):
project = identity_fakes.FakeProject.create_one_project()
+ domain = identity_fakes.FakeDomain.create_one_domain()
user = identity_fakes.FakeUser.create_one_user(
attrs={'default_project_id': project.id}
)
+ user2 = identity_fakes.FakeUser.create_one_user(
+ attrs={'default_project_id': project.id,
+ 'domain_id': domain.id}
+ )
def setUp(self):
super(TestUserSet, self).setUp()
@@ -748,6 +753,37 @@ class TestUserSet(TestUser):
)
self.assertIsNone(result)
+ def test_user_set_specify_domain(self):
+ arglist = [
+ '--name', 'qwerty',
+ '--domain', self.domain.id,
+ self.user2.name
+ ]
+ verifylist = [
+ ('name', 'qwerty'),
+ ('password', None),
+ ('domain', self.domain.id),
+ ('email', None),
+ ('project', None),
+ ('enable', False),
+ ('disable', False),
+ ('user', self.user2.name),
+ ]
+ parsed_args = self.check_parser(self.cmd, arglist, verifylist)
+
+ result = self.cmd.take_action(parsed_args)
+
+ kwargs = {
+ 'enabled': True,
+ 'name': 'qwerty'
+ }
+
+ self.users_mock.update.assert_called_with(
+ self.user.id,
+ **kwargs
+ )
+ self.assertIsNone(result)
+
def test_user_set_password(self):
arglist = [
'--password', 'secret',
diff --git a/openstackclient/tests/unit/network/v2/fakes.py b/openstackclient/tests/unit/network/v2/fakes.py
index 524285ab..eb965339 100644
--- a/openstackclient/tests/unit/network/v2/fakes.py
+++ b/openstackclient/tests/unit/network/v2/fakes.py
@@ -1322,6 +1322,52 @@ class FakeNetworkMeter(object):
return mock.Mock(side_effect=meter)
+class FakeNetworkMeterRule(object):
+ """Fake metering rule"""
+
+ @staticmethod
+ def create_one_rule(attrs=None):
+ """Create one meter rule"""
+ attrs = attrs or {}
+
+ meter_rule_attrs = {
+ 'id': 'meter-label-rule-id-' + uuid.uuid4().hex,
+ 'direction': 'ingress',
+ 'excluded': False,
+ 'metering_label_id': 'meter-label-id-' + uuid.uuid4().hex,
+ 'remote_ip_prefix': '10.0.0.0/24',
+ 'tenant_id': 'project-id-' + uuid.uuid4().hex,
+ }
+
+ meter_rule_attrs.update(attrs)
+
+ meter_rule = fakes.FakeResource(
+ info=copy.deepcopy(meter_rule_attrs),
+ loaded=True)
+
+ meter_rule.project_id = meter_rule_attrs['tenant_id']
+
+ return meter_rule
+
+ @staticmethod
+ def create_meter_rule(attrs=None, count=2):
+ """Create multiple meter rules"""
+
+ meter_rules = []
+ for i in range(0, count):
+ meter_rules.append(FakeNetworkMeterRule.
+ create_one_rule(attrs))
+ return meter_rules
+
+ @staticmethod
+ def get_meter_rule(meter_rule=None, count=2):
+ """Get a list of meter rules"""
+ if meter_rule is None:
+ meter_rule = (FakeNetworkMeterRule.
+ create_meter_rule(count))
+ return mock.Mock(side_effect=meter_rule)
+
+
class FakeSubnetPool(object):
"""Fake one or more subnet pools."""
diff --git a/openstackclient/tests/unit/network/v2/test_network_meter_rule.py b/openstackclient/tests/unit/network/v2/test_network_meter_rule.py
new file mode 100644
index 00000000..af481793
--- /dev/null
+++ b/openstackclient/tests/unit/network/v2/test_network_meter_rule.py
@@ -0,0 +1,321 @@
+# Copyright (c) 2016, Intel Corporation.
+# All Rights Reserved.
+#
+# Licensed under the Apache License, Version 2.0 (the "License"); you may
+# not use this file except in compliance with the License. You may obtain
+# a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+# License for the specific language governing permissions and limitations
+# under the License.
+
+import mock
+from mock import call
+
+from osc_lib import exceptions
+
+from openstackclient.network.v2 import network_meter_rule
+from openstackclient.tests.unit.identity.v3 import fakes as identity_fakes_v3
+from openstackclient.tests.unit.network.v2 import fakes as network_fakes
+from openstackclient.tests.unit import utils as tests_utils
+
+
+class TestMeterRule(network_fakes.TestNetworkV2):
+ def setUp(self):
+ super(TestMeterRule, self).setUp()
+ self.network = self.app.client_manager.network
+ self.projects_mock = self.app.client_manager.identity.projects
+ self.domains_mock = self.app.client_manager.identity.domains
+
+
+class TestCreateMeterRule(TestMeterRule):
+ project = identity_fakes_v3.FakeProject.create_one_project()
+ domain = identity_fakes_v3.FakeDomain.create_one_domain()
+
+ new_rule = (
+ network_fakes.FakeNetworkMeterRule.
+ create_one_rule()
+ )
+
+ columns = (
+ 'direction',
+ 'excluded',
+ 'id',
+ 'metering_label_id',
+ 'project_id',
+ 'remote_ip_prefix',
+ )
+ data = (
+ new_rule.direction,
+ new_rule.excluded,
+ new_rule.id,
+ new_rule.metering_label_id,
+ new_rule.project_id,
+ new_rule.remote_ip_prefix,
+ )
+
+ def setUp(self):
+ super(TestCreateMeterRule, self).setUp()
+ fake_meter = network_fakes.FakeNetworkMeter.create_one_meter({
+ 'id': self.new_rule.metering_label_id})
+
+ self.network.create_metering_label_rule = mock.Mock(
+ return_value=self.new_rule)
+ self.projects_mock.get.return_value = self.project
+ self.cmd = network_meter_rule.CreateMeterRule(self.app,
+ self.namespace)
+ self.network.find_metering_label = mock.Mock(
+ return_value=fake_meter)
+
+ def test_create_no_options(self):
+ arglist = []
+ verifylist = []
+
+ self.assertRaises(tests_utils.ParserException, self.check_parser,
+ self.cmd, arglist, verifylist)
+
+ def test_create_default_options(self):
+ arglist = [
+ self.new_rule.metering_label_id,
+ "--remote-ip-prefix", self.new_rule.remote_ip_prefix,
+ ]
+ verifylist = [
+ ('meter', self.new_rule.metering_label_id),
+ ('remote_ip_prefix', self.new_rule.remote_ip_prefix),
+ ]
+
+ parsed_args = self.check_parser(self.cmd, arglist, verifylist)
+ columns, data = (self.cmd.take_action(parsed_args))
+
+ self.network.create_metering_label_rule.assert_called_once_with(
+ **{'direction': 'ingress',
+ 'metering_label_id': self.new_rule.metering_label_id,
+ 'remote_ip_prefix': self.new_rule.remote_ip_prefix, }
+ )
+ self.assertEqual(self.columns, columns)
+ self.assertEqual(self.data, data)
+
+ def test_create_all_options(self):
+ arglist = [
+ "--ingress",
+ "--include",
+ self.new_rule.metering_label_id,
+ "--remote-ip-prefix", self.new_rule.remote_ip_prefix,
+ ]
+ verifylist = [
+ ('ingress', True),
+ ('include', True),
+ ('meter', self.new_rule.metering_label_id),
+ ('remote_ip_prefix', self.new_rule.remote_ip_prefix),
+ ]
+
+ parsed_args = self.check_parser(self.cmd, arglist, verifylist)
+ columns, data = (self.cmd.take_action(parsed_args))
+
+ self.network.create_metering_label_rule.assert_called_once_with(
+ **{'direction': self.new_rule.direction,
+ 'excluded': self.new_rule.excluded,
+ 'metering_label_id': self.new_rule.metering_label_id,
+ 'remote_ip_prefix': self.new_rule.remote_ip_prefix, }
+ )
+ self.assertEqual(self.columns, columns)
+ self.assertEqual(self.data, data)
+
+
+class TestDeleteMeterRule(TestMeterRule):
+ def setUp(self):
+ super(TestDeleteMeterRule, self).setUp()
+ self.rule_list = \
+ network_fakes.FakeNetworkMeterRule.create_meter_rule(
+ count=2
+ )
+ self.network.delete_metering_label_rule = mock.Mock(return_value=None)
+
+ self.network.find_metering_label_rule = network_fakes \
+ .FakeNetworkMeterRule.get_meter_rule(
+ meter_rule=self.rule_list
+ )
+
+ self.cmd = network_meter_rule.DeleteMeterRule(self.app,
+ self.namespace)
+
+ def test_delete_one_rule(self):
+ arglist = [
+ self.rule_list[0].id,
+ ]
+ verifylist = [
+ ('meter_rule_id', [self.rule_list[0].id]),
+ ]
+
+ parsed_args = self.check_parser(self.cmd, arglist, verifylist)
+
+ result = self.cmd.take_action(parsed_args)
+
+ self.network.delete_metering_label_rule.assert_called_once_with(
+ self.rule_list[0]
+ )
+ self.assertIsNone(result)
+
+ def test_delete_multiple_rules(self):
+ arglist = []
+ for rule in self.rule_list:
+ arglist.append(rule.id)
+ verifylist = [
+ ('meter_rule_id', arglist),
+ ]
+
+ parsed_args = self.check_parser(self.cmd, arglist, verifylist)
+
+ result = self.cmd.take_action(parsed_args)
+
+ calls = []
+ for rule in self.rule_list:
+ calls.append(call(rule))
+ self.network.delete_metering_label_rule.assert_has_calls(calls)
+ self.assertIsNone(result)
+
+ def test_delete_multiple_rules_exception(self):
+ arglist = [
+ self.rule_list[0].id,
+ 'xxxx-yyyy-zzzz',
+ self.rule_list[1].id,
+ ]
+ verifylist = [
+ ('meter_rule_id', arglist),
+ ]
+
+ parsed_args = self.check_parser(self.cmd, arglist, verifylist)
+
+ return_find = [
+ self.rule_list[0],
+ exceptions.NotFound('404'),
+ self.rule_list[1],
+ ]
+ self.network.find_metering_label_rule = mock.Mock(
+ side_effect=return_find
+ )
+
+ ret_delete = [
+ None,
+ exceptions.NotFound('404'),
+ ]
+ self.network.delete_metering_label_rule = mock.Mock(
+ side_effect=ret_delete
+ )
+
+ self.assertRaises(exceptions.CommandError, self.cmd.take_action,
+ parsed_args)
+
+ calls = [
+ call(self.rule_list[0]),
+ call(self.rule_list[1]),
+ ]
+ self.network.delete_metering_label_rule.assert_has_calls(calls)
+
+
+class TestListMeterRule(TestMeterRule):
+ rule_list = \
+ network_fakes.FakeNetworkMeterRule.create_meter_rule(
+ count=2
+ )
+
+ columns = (
+ 'ID',
+ 'Excluded',
+ 'Direction',
+ 'Remote IP Prefix',
+ )
+
+ data = []
+
+ for rule in rule_list:
+ data.append((
+ rule.id,
+ rule.excluded,
+ rule.direction,
+ rule.remote_ip_prefix,
+ ))
+
+ def setUp(self):
+ super(TestListMeterRule, self).setUp()
+
+ self.network.metering_label_rules = mock.Mock(
+ return_value=self.rule_list
+ )
+
+ self.cmd = network_meter_rule.ListMeterRule(self.app,
+ self.namespace)
+
+ def test_rule_list(self):
+ arglist = []
+ verifylist = []
+
+ parsed_args = self.check_parser(self.cmd, arglist, verifylist)
+
+ columns, data = self.cmd.take_action(parsed_args)
+
+ self.network.metering_label_rules.assert_called_with()
+ self.assertEqual(self.columns, columns)
+ self.assertEqual(self.data, list(data))
+
+
+class TestShowMeterRule(TestMeterRule):
+ new_rule = (
+ network_fakes.FakeNetworkMeterRule.
+ create_one_rule()
+ )
+
+ columns = (
+ 'direction',
+ 'excluded',
+ 'id',
+ 'metering_label_id',
+ 'project_id',
+ 'remote_ip_prefix',
+ )
+
+ data = (
+ new_rule.direction,
+ new_rule.excluded,
+ new_rule.id,
+ new_rule.metering_label_id,
+ new_rule.project_id,
+ new_rule.remote_ip_prefix,
+ )
+
+ def setUp(self):
+ super(TestShowMeterRule, self).setUp()
+
+ self.cmd = network_meter_rule.ShowMeterRule(self.app,
+ self.namespace)
+
+ self.network.find_metering_label_rule = \
+ mock.Mock(return_value=self.new_rule)
+
+ def test_show_no_options(self):
+ arglist = []
+ verifylist = []
+
+ self.assertRaises(tests_utils.ParserException, self.check_parser,
+ self.cmd, arglist, verifylist)
+
+ def test_label_rule_show_option(self):
+ arglist = [
+ self.new_rule.id,
+ ]
+ verifylist = [
+ ('meter_rule_id', self.new_rule.id),
+ ]
+ parsed_args = self.check_parser(self.cmd, arglist, verifylist)
+
+ columns, data = self.cmd.take_action(parsed_args)
+
+ self.network.find_metering_label_rule.assert_called_with(
+ self.new_rule.id, ignore_missing=False
+ )
+ self.assertEqual(self.columns, columns)
+ self.assertEqual(self.data, data)
diff --git a/openstackclient/tests/unit/network/v2/test_port.py b/openstackclient/tests/unit/network/v2/test_port.py
index 255e8116..fc626685 100644
--- a/openstackclient/tests/unit/network/v2/test_port.py
+++ b/openstackclient/tests/unit/network/v2/test_port.py
@@ -20,6 +20,7 @@ from osc_lib import utils
from openstackclient.network.v2 import port
from openstackclient.tests.unit.compute.v2 import fakes as compute_fakes
+from openstackclient.tests.unit.identity.v3 import fakes as identity_fakes
from openstackclient.tests.unit.network.v2 import fakes as network_fakes
from openstackclient.tests.unit import utils as tests_utils
@@ -31,6 +32,8 @@ class TestPort(network_fakes.TestNetworkV2):
# Get a shortcut to the network client
self.network = self.app.client_manager.network
+ # Get a shortcut to the ProjectManager Mock
+ self.projects_mock = self.app.client_manager.identity.projects
def _get_common_cols_data(self, fake_port):
columns = (
@@ -216,7 +219,7 @@ class TestCreatePort(TestPort):
'test-port',
]
verifylist = [
- ('network', self._port.network_id,),
+ ('network', self._port.network_id),
('enable', True),
('binding_profile', {'parent_name': 'fake_parent', 'tag': 42}),
('name', 'test-port'),
@@ -351,6 +354,74 @@ class TestCreatePort(TestPort):
self.assertEqual(ref_columns, columns)
self.assertEqual(ref_data, data)
+ def test_create_port_with_allowed_address_pair_ipaddr(self):
+ pairs = [{'ip_address': '192.168.1.123'},
+ {'ip_address': '192.168.1.45'}]
+ arglist = [
+ '--network', self._port.network_id,
+ '--allowed-address', 'ip-address=192.168.1.123',
+ '--allowed-address', 'ip-address=192.168.1.45',
+ 'test-port',
+ ]
+ verifylist = [
+ ('network', self._port.network_id),
+ ('enable', True),
+ ('allowed_address_pairs', [{'ip-address': '192.168.1.123'},
+ {'ip-address': '192.168.1.45'}]),
+ ('name', 'test-port'),
+ ]
+ parsed_args = self.check_parser(self.cmd, arglist, verifylist)
+
+ columns, data = (self.cmd.take_action(parsed_args))
+
+ self.network.create_port.assert_called_once_with(**{
+ 'admin_state_up': True,
+ 'network_id': self._port.network_id,
+ 'allowed_address_pairs': pairs,
+ 'name': 'test-port',
+ })
+
+ ref_columns, ref_data = self._get_common_cols_data(self._port)
+ self.assertEqual(ref_columns, columns)
+ self.assertEqual(ref_data, data)
+
+ def test_create_port_with_allowed_address_pair(self):
+ pairs = [{'ip_address': '192.168.1.123',
+ 'mac_address': 'aa:aa:aa:aa:aa:aa'},
+ {'ip_address': '192.168.1.45',
+ 'mac_address': 'aa:aa:aa:aa:aa:b1'}]
+ arglist = [
+ '--network', self._port.network_id,
+ '--allowed-address',
+ 'ip-address=192.168.1.123,mac-address=aa:aa:aa:aa:aa:aa',
+ '--allowed-address',
+ 'ip-address=192.168.1.45,mac-address=aa:aa:aa:aa:aa:b1',
+ 'test-port',
+ ]
+ verifylist = [
+ ('network', self._port.network_id),
+ ('enable', True),
+ ('allowed_address_pairs', [{'ip-address': '192.168.1.123',
+ 'mac-address': 'aa:aa:aa:aa:aa:aa'},
+ {'ip-address': '192.168.1.45',
+ 'mac-address': 'aa:aa:aa:aa:aa:b1'}]),
+ ('name', 'test-port'),
+ ]
+ parsed_args = self.check_parser(self.cmd, arglist, verifylist)
+
+ columns, data = (self.cmd.take_action(parsed_args))
+
+ self.network.create_port.assert_called_once_with(**{
+ 'admin_state_up': True,
+ 'network_id': self._port.network_id,
+ 'allowed_address_pairs': pairs,
+ 'name': 'test-port',
+ })
+
+ ref_columns, ref_data = self._get_common_cols_data(self._port)
+ self.assertEqual(ref_columns, columns)
+ self.assertEqual(ref_data, data)
+
def test_create_port_security_enabled(self):
arglist = [
'--network', self._port.network_id,
@@ -673,6 +744,44 @@ class TestListPort(TestPort):
self.assertEqual(self.columns_long, columns)
self.assertEqual(self.data_long, list(data))
+ def test_port_list_project(self):
+ project = identity_fakes.FakeProject.create_one_project()
+ self.projects_mock.get.return_value = project
+ arglist = [
+ '--project', project.id,
+ ]
+ verifylist = [
+ ('project', project.id),
+ ]
+ parsed_args = self.check_parser(self.cmd, arglist, verifylist)
+
+ columns, data = self.cmd.take_action(parsed_args)
+ filters = {'tenant_id': project.id, 'project_id': project.id}
+
+ self.network.ports.assert_called_once_with(**filters)
+ self.assertEqual(self.columns, columns)
+ self.assertEqual(self.data, list(data))
+
+ def test_port_list_project_domain(self):
+ project = identity_fakes.FakeProject.create_one_project()
+ self.projects_mock.get.return_value = project
+ arglist = [
+ '--project', project.id,
+ '--project-domain', project.domain_id,
+ ]
+ verifylist = [
+ ('project', project.id),
+ ('project_domain', project.domain_id),
+ ]
+ parsed_args = self.check_parser(self.cmd, arglist, verifylist)
+
+ columns, data = self.cmd.take_action(parsed_args)
+ filters = {'tenant_id': project.id, 'project_id': project.id}
+
+ self.network.ports.assert_called_once_with(**filters)
+ self.assertEqual(self.columns, columns)
+ self.assertEqual(self.data, list(data))
+
class TestSetPort(TestPort):
@@ -996,6 +1105,91 @@ class TestSetPort(TestPort):
self.network.update_port.assert_called_once_with(_testport, **attrs)
self.assertIsNone(result)
+ def test_set_allowed_address_pair(self):
+ arglist = [
+ '--allowed-address', 'ip-address=192.168.1.123',
+ self._port.name,
+ ]
+ verifylist = [
+ ('allowed_address_pairs', [{'ip-address': '192.168.1.123'}]),
+ ('port', self._port.name),
+ ]
+
+ parsed_args = self.check_parser(self.cmd, arglist, verifylist)
+ result = self.cmd.take_action(parsed_args)
+
+ attrs = {
+ 'allowed_address_pairs': [{'ip_address': '192.168.1.123'}],
+ }
+ self.network.update_port.assert_called_once_with(self._port, **attrs)
+ self.assertIsNone(result)
+
+ def test_append_allowed_address_pair(self):
+ _testport = network_fakes.FakePort.create_one_port(
+ {'allowed_address_pairs': [{'ip_address': '192.168.1.123'}]})
+ self.network.find_port = mock.Mock(return_value=_testport)
+ arglist = [
+ '--allowed-address', 'ip-address=192.168.1.45',
+ _testport.name,
+ ]
+ verifylist = [
+ ('allowed_address_pairs', [{'ip-address': '192.168.1.45'}]),
+ ('port', _testport.name),
+ ]
+
+ parsed_args = self.check_parser(self.cmd, arglist, verifylist)
+ result = self.cmd.take_action(parsed_args)
+
+ attrs = {
+ 'allowed_address_pairs': [{'ip_address': '192.168.1.123'},
+ {'ip_address': '192.168.1.45'}],
+ }
+ self.network.update_port.assert_called_once_with(_testport, **attrs)
+ self.assertIsNone(result)
+
+ def test_overwrite_allowed_address_pair(self):
+ _testport = network_fakes.FakePort.create_one_port(
+ {'allowed_address_pairs': [{'ip_address': '192.168.1.123'}]})
+ self.network.find_port = mock.Mock(return_value=_testport)
+ arglist = [
+ '--allowed-address', 'ip-address=192.168.1.45',
+ '--no-allowed-address',
+ _testport.name,
+ ]
+ verifylist = [
+ ('allowed_address_pairs', [{'ip-address': '192.168.1.45'}]),
+ ('no_allowed_address_pair', True),
+ ('port', _testport.name),
+ ]
+
+ parsed_args = self.check_parser(self.cmd, arglist, verifylist)
+ result = self.cmd.take_action(parsed_args)
+
+ attrs = {
+ 'allowed_address_pairs': [{'ip_address': '192.168.1.45'}],
+ }
+ self.network.update_port.assert_called_once_with(_testport, **attrs)
+ self.assertIsNone(result)
+
+ def test_set_no_allowed_address_pairs(self):
+ arglist = [
+ '--no-allowed-address',
+ self._port.name,
+ ]
+ verifylist = [
+ ('no_allowed_address_pair', True),
+ ('port', self._port.name),
+ ]
+
+ parsed_args = self.check_parser(self.cmd, arglist, verifylist)
+ result = self.cmd.take_action(parsed_args)
+
+ attrs = {
+ 'allowed_address_pairs': [],
+ }
+ self.network.update_port.assert_called_once_with(self._port, **attrs)
+ self.assertIsNone(result)
+
def test_port_security_enabled(self):
arglist = [
'--enable-port-security',
@@ -1192,3 +1386,42 @@ class TestUnsetPort(TestPort):
self.assertRaises(exceptions.CommandError,
self.cmd.take_action,
parsed_args)
+
+ def test_unset_port_allowed_address_pair(self):
+ _fake_port = network_fakes.FakePort.create_one_port(
+ {'allowed_address_pairs': [{'ip_address': '192.168.1.123'}]})
+ self.network.find_port = mock.Mock(return_value=_fake_port)
+ arglist = [
+ '--allowed-address', 'ip-address=192.168.1.123',
+ _fake_port.name,
+ ]
+ verifylist = [
+ ('allowed_address_pairs', [{'ip-address': '192.168.1.123'}]),
+ ]
+
+ parsed_args = self.check_parser(self.cmd, arglist, verifylist)
+ result = self.cmd.take_action(parsed_args)
+
+ attrs = {
+ 'allowed_address_pairs': [],
+ }
+
+ self.network.update_port.assert_called_once_with(_fake_port, **attrs)
+ self.assertIsNone(result)
+
+ def test_unset_port_allowed_address_pair_not_existent(self):
+ _fake_port = network_fakes.FakePort.create_one_port(
+ {'allowed_address_pairs': [{'ip_address': '192.168.1.123'}]})
+ self.network.find_port = mock.Mock(return_value=_fake_port)
+ arglist = [
+ '--allowed-address', 'ip-address=192.168.1.45',
+ _fake_port.name,
+ ]
+ verifylist = [
+ ('allowed_address_pairs', [{'ip-address': '192.168.1.45'}]),
+ ]
+
+ parsed_args = self.check_parser(self.cmd, arglist, verifylist)
+ self.assertRaises(exceptions.CommandError,
+ self.cmd.take_action,
+ parsed_args)
diff --git a/openstackclient/tests/unit/volume/v2/test_snapshot.py b/openstackclient/tests/unit/volume/v2/test_snapshot.py
index 8ce356ae..12d1e390 100644
--- a/openstackclient/tests/unit/volume/v2/test_snapshot.py
+++ b/openstackclient/tests/unit/volume/v2/test_snapshot.py
@@ -19,6 +19,7 @@ from mock import call
from osc_lib import exceptions
from osc_lib import utils
+from openstackclient.tests.unit.identity.v3 import fakes as project_fakes
from openstackclient.tests.unit.volume.v2 import fakes as volume_fakes
from openstackclient.volume.v2 import volume_snapshot
@@ -32,6 +33,8 @@ class TestSnapshot(volume_fakes.TestVolume):
self.snapshots_mock.reset_mock()
self.volumes_mock = self.app.client_manager.volume.volumes
self.volumes_mock.reset_mock()
+ self.project_mock = self.app.client_manager.identity.projects
+ self.project_mock.reset_mock()
class TestSnapshotCreate(TestSnapshot):
@@ -278,6 +281,7 @@ class TestSnapshotDelete(TestSnapshot):
class TestSnapshotList(TestSnapshot):
volume = volume_fakes.FakeVolume.create_one_volume()
+ project = project_fakes.FakeProject.create_one_project()
snapshots = volume_fakes.FakeSnapshot.create_snapshots(
attrs={'volume_id': volume.name}, count=3)
@@ -321,6 +325,7 @@ class TestSnapshotList(TestSnapshot):
self.volumes_mock.list.return_value = [self.volume]
self.volumes_mock.get.return_value = self.volume
+ self.project_mock.get.return_value = self.project
self.snapshots_mock.list.return_value = self.snapshots
# Get the command to test
self.cmd = volume_snapshot.ListVolumeSnapshot(self.app, None)
@@ -341,6 +346,7 @@ class TestSnapshotList(TestSnapshot):
'all_tenants': False,
'name': None,
'status': None,
+ 'project_id': None,
'volume_id': None
}
)
@@ -351,11 +357,13 @@ class TestSnapshotList(TestSnapshot):
arglist = [
"--long",
"--limit", "2",
+ "--project", self.project.id,
"--marker", self.snapshots[0].id,
]
verifylist = [
("long", True),
("limit", 2),
+ ("project", self.project.id),
("marker", self.snapshots[0].id),
('all_projects', False),
]
@@ -367,7 +375,8 @@ class TestSnapshotList(TestSnapshot):
limit=2,
marker=self.snapshots[0].id,
search_opts={
- 'all_tenants': False,
+ 'all_tenants': True,
+ 'project_id': self.project.id,
'name': None,
'status': None,
'volume_id': None
@@ -394,6 +403,7 @@ class TestSnapshotList(TestSnapshot):
'all_tenants': True,
'name': None,
'status': None,
+ 'project_id': None,
'volume_id': None
}
)
@@ -419,6 +429,7 @@ class TestSnapshotList(TestSnapshot):
'all_tenants': False,
'name': self.snapshots[0].name,
'status': None,
+ 'project_id': None,
'volume_id': None
}
)
@@ -444,6 +455,7 @@ class TestSnapshotList(TestSnapshot):
'all_tenants': False,
'name': None,
'status': self.snapshots[0].status,
+ 'project_id': None,
'volume_id': None
}
)
@@ -469,6 +481,7 @@ class TestSnapshotList(TestSnapshot):
'all_tenants': False,
'name': None,
'status': None,
+ 'project_id': None,
'volume_id': self.volume.id
}
)
diff --git a/openstackclient/volume/v2/volume_snapshot.py b/openstackclient/volume/v2/volume_snapshot.py
index af29b777..3283bb53 100644
--- a/openstackclient/volume/v2/volume_snapshot.py
+++ b/openstackclient/volume/v2/volume_snapshot.py
@@ -24,6 +24,7 @@ from osc_lib import utils
import six
from openstackclient.i18n import _
+from openstackclient.identity import common as identity_common
LOG = logging.getLogger(__name__)
@@ -166,6 +167,12 @@ class ListVolumeSnapshot(command.Lister):
help=_('Include all projects (admin only)'),
)
parser.add_argument(
+ '--project',
+ metavar='<project>',
+ help=_('Filter results by project (name or ID) (admin only)')
+ )
+ identity_common.add_project_domain_option_to_parser(parser)
+ parser.add_argument(
'--long',
action='store_true',
default=False,
@@ -208,6 +215,7 @@ class ListVolumeSnapshot(command.Lister):
def take_action(self, parsed_args):
volume_client = self.app.client_manager.volume
+ identity_client = self.app.client_manager.identity
def _format_volume_id(volume_id):
"""Return a volume name if available
@@ -245,8 +253,20 @@ class ListVolumeSnapshot(command.Lister):
volume_id = utils.find_resource(
volume_client.volumes, parsed_args.volume).id
+ project_id = None
+ if parsed_args.project:
+ project_id = identity_common.find_project(
+ identity_client,
+ parsed_args.project,
+ parsed_args.project_domain).id
+
+ # set value of 'all_tenants' when using project option
+ all_projects = True if parsed_args.project else \
+ parsed_args.all_projects
+
search_opts = {
- 'all_tenants': parsed_args.all_projects,
+ 'all_tenants': all_projects,
+ 'project_id': project_id,
'name': parsed_args.name,
'status': parsed_args.status,
'volume_id': volume_id,