summaryrefslogtreecommitdiff
path: root/openstackclient
diff options
context:
space:
mode:
Diffstat (limited to 'openstackclient')
-rw-r--r--openstackclient/common/clientmanager.py27
-rw-r--r--openstackclient/compute/v2/server.py20
-rw-r--r--openstackclient/identity/v3/mapping.py1
-rw-r--r--openstackclient/identity/v3/token.py2
-rw-r--r--openstackclient/identity/v3/trust.py12
-rw-r--r--openstackclient/image/v1/image.py16
-rw-r--r--openstackclient/image/v2/image.py14
-rw-r--r--openstackclient/network/v2/network.py4
-rw-r--r--openstackclient/network/v2/port.py84
-rw-r--r--openstackclient/network/v2/security_group.py33
-rw-r--r--openstackclient/tests/functional/base.py27
-rw-r--r--openstackclient/tests/functional/common/test_help.py7
-rw-r--r--openstackclient/tests/functional/identity/v2/common.py9
-rw-r--r--openstackclient/tests/functional/identity/v3/common.py8
-rw-r--r--openstackclient/tests/functional/network/v2/test_port.py164
-rw-r--r--openstackclient/tests/unit/compute/v2/test_server.py23
-rw-r--r--openstackclient/tests/unit/identity/v3/test_mappings.py8
-rw-r--r--openstackclient/tests/unit/network/v2/test_port.py194
-rw-r--r--openstackclient/tests/unit/network/v2/test_security_group.py4
-rw-r--r--openstackclient/tests/unit/volume/v2/test_snapshot.py15
-rw-r--r--openstackclient/volume/v2/volume_snapshot.py22
21 files changed, 568 insertions, 126 deletions
diff --git a/openstackclient/common/clientmanager.py b/openstackclient/common/clientmanager.py
index 23c35a3b..3e1a50e3 100644
--- a/openstackclient/common/clientmanager.py
+++ b/openstackclient/common/clientmanager.py
@@ -59,6 +59,8 @@ class ClientManager(clientmanager.ClientManager):
self._interface = self.interface
self._cacert = self.cacert
self._insecure = not self.verify
+ # store original auth_type
+ self._original_auth_type = cli_options.auth_type
def setup_auth(self):
"""Set up authentication"""
@@ -73,12 +75,33 @@ class ClientManager(clientmanager.ClientManager):
if self._cli_options._openstack_config is not None:
self._cli_options._openstack_config._pw_callback = \
shell.prompt_for_password
+ try:
+ self._cli_options._auth = \
+ self._cli_options._openstack_config.load_auth_plugin(
+ self._cli_options.config,
+ )
+ except TypeError as e:
+ self._fallback_load_auth_plugin(e)
+
+ return super(ClientManager, self).setup_auth()
+
+ def _fallback_load_auth_plugin(self, e):
+ # NOTES(RuiChen): Hack to avoid auth plugins choking on data they don't
+ # expect, delete fake token and endpoint, then try to
+ # load auth plugin again with user specified options.
+ # We know it looks ugly, but it's necessary.
+ if self._cli_options.config['auth']['token'] == 'x':
+ # restore original auth_type
+ self._cli_options.config['auth_type'] = \
+ self._original_auth_type
+ del self._cli_options.config['auth']['token']
+ del self._cli_options.config['auth']['endpoint']
self._cli_options._auth = \
self._cli_options._openstack_config.load_auth_plugin(
self._cli_options.config,
)
-
- return super(ClientManager, self).setup_auth()
+ else:
+ raise e
def is_network_endpoint_enabled(self):
"""Check if the network endpoint is enabled"""
diff --git a/openstackclient/compute/v2/server.py b/openstackclient/compute/v2/server.py
index 798d3d3f..a1330e01 100644
--- a/openstackclient/compute/v2/server.py
+++ b/openstackclient/compute/v2/server.py
@@ -113,7 +113,7 @@ def _get_ip_address(addresses, address_type, ip_address_family):
)
-def _prep_server_detail(compute_client, server):
+def _prep_server_detail(compute_client, image_client, server):
"""Prepare the detailed server dict for printing
:param compute_client: a compute client instance
@@ -130,7 +130,7 @@ def _prep_server_detail(compute_client, server):
if image_info:
image_id = image_info.get('id', '')
try:
- image = utils.find_resource(compute_client.images, image_id)
+ image = utils.find_resource(image_client.images, image_id)
info['image'] = "%s (%s)" % (image.name, image_id)
except Exception:
info['image'] = image_id
@@ -450,12 +450,13 @@ class CreateServer(command.ShowOne):
def take_action(self, parsed_args):
compute_client = self.app.client_manager.compute
volume_client = self.app.client_manager.volume
+ image_client = self.app.client_manager.image
# Lookup parsed_args.image
image = None
if parsed_args.image:
image = utils.find_resource(
- compute_client.images,
+ image_client.images,
parsed_args.image,
)
@@ -629,7 +630,7 @@ class CreateServer(command.ShowOne):
sys.stdout.write(_('Error creating server\n'))
raise SystemExit
- details = _prep_server_detail(compute_client, server)
+ details = _prep_server_detail(compute_client, image_client, server)
return zip(*sorted(six.iteritems(details)))
@@ -797,6 +798,7 @@ class ListServer(command.Lister):
def take_action(self, parsed_args):
compute_client = self.app.client_manager.compute
identity_client = self.app.client_manager.identity
+ image_client = self.app.client_manager.image
project_id = None
if parsed_args.project:
@@ -826,7 +828,7 @@ class ListServer(command.Lister):
# image name is given, map it to ID.
image_id = None
if parsed_args.image:
- image_id = utils.find_resource(compute_client.images,
+ image_id = utils.find_resource(image_client.images,
parsed_args.image).id
search_opts = {
@@ -1164,13 +1166,14 @@ class RebuildServer(command.ShowOne):
def take_action(self, parsed_args):
compute_client = self.app.client_manager.compute
+ image_client = self.app.client_manager.image
server = utils.find_resource(
compute_client.servers, parsed_args.server)
# If parsed_args.image is not set, default to the currently used one.
image_id = parsed_args.image or server._info.get('image', {}).get('id')
- image = utils.find_resource(compute_client.images, image_id)
+ image = utils.find_resource(image_client.images, image_id)
server = server.rebuild(image, parsed_args.password)
if parsed_args.wait:
@@ -1186,7 +1189,7 @@ class RebuildServer(command.ShowOne):
sys.stdout.write(_('Error rebuilding server\n'))
raise SystemExit
- details = _prep_server_detail(compute_client, server)
+ details = _prep_server_detail(compute_client, image_client, server)
return zip(*sorted(six.iteritems(details)))
@@ -1561,7 +1564,8 @@ class ShowServer(command.ShowOne):
sys.stderr.write(_("Error retrieving diagnostics data\n"))
return ({}, {})
else:
- data = _prep_server_detail(compute_client, server)
+ data = _prep_server_detail(compute_client,
+ self.app.client_manager.image, server)
return zip(*sorted(six.iteritems(data)))
diff --git a/openstackclient/identity/v3/mapping.py b/openstackclient/identity/v3/mapping.py
index dbb1b068..28080f89 100644
--- a/openstackclient/identity/v3/mapping.py
+++ b/openstackclient/identity/v3/mapping.py
@@ -183,7 +183,6 @@ class SetMapping(command.Command, _RulesReader):
rules=rules)
mapping._info.pop('links', None)
- return zip(*sorted(six.iteritems(mapping._info)))
class ShowMapping(command.ShowOne):
diff --git a/openstackclient/identity/v3/token.py b/openstackclient/identity/v3/token.py
index 7a66f23b..effb9e35 100644
--- a/openstackclient/identity/v3/token.py
+++ b/openstackclient/identity/v3/token.py
@@ -42,7 +42,7 @@ class AuthorizeRequestToken(command.ShowOne):
default=[],
required=True,
help=_('Roles to authorize (name or ID) '
- '(repeat option to set multiple values, required)'),
+ '(repeat option to set multiple values) (required)'),
)
return parser
diff --git a/openstackclient/identity/v3/trust.py b/openstackclient/identity/v3/trust.py
index 04ee4dce..52daeb4d 100644
--- a/openstackclient/identity/v3/trust.py
+++ b/openstackclient/identity/v3/trust.py
@@ -16,6 +16,7 @@
import datetime
import logging
+from keystoneclient import exceptions as identity_exc
from osc_lib.command import command
from osc_lib import exceptions
from osc_lib import utils
@@ -105,10 +106,13 @@ class CreateTrust(command.ShowOne):
role_names = []
for role in parsed_args.role:
- role_name = utils.find_resource(
- identity_client.roles,
- role,
- ).name
+ try:
+ role_name = utils.find_resource(
+ identity_client.roles,
+ role,
+ ).name
+ except identity_exc.Forbidden:
+ role_name = role
role_names.append(role_name)
expires_at = None
diff --git a/openstackclient/image/v1/image.py b/openstackclient/image/v1/image.py
index 1f239b67..f4944afa 100644
--- a/openstackclient/image/v1/image.py
+++ b/openstackclient/image/v1/image.py
@@ -36,6 +36,7 @@ from openstackclient.api import utils as api_utils
from openstackclient.i18n import _
+CONTAINER_CHOICES = ["ami", "ari", "aki", "bare", "docker", "ova", "ovf"]
DEFAULT_CONTAINER_FORMAT = 'bare'
DEFAULT_DISK_FORMAT = 'raw'
DISK_CHOICES = ["ami", "ari", "aki", "vhd", "vmdk", "raw", "qcow2", "vhdx",
@@ -84,8 +85,12 @@ class CreateImage(command.ShowOne):
"--container-format",
default=DEFAULT_CONTAINER_FORMAT,
metavar="<container-format>",
- help=_("Image container format "
- "(default: %s)") % DEFAULT_CONTAINER_FORMAT,
+ choices=CONTAINER_CHOICES,
+ help=(_("Image container format. "
+ "The supported options are: %(option_list)s. "
+ "The default format is: %(default_opt)s") %
+ {'option_list': ', '.join(CONTAINER_CHOICES),
+ 'default_opt': DEFAULT_CONTAINER_FORMAT})
)
parser.add_argument(
"--disk-format",
@@ -498,13 +503,12 @@ class SetImage(command.Command):
type=int,
help=_("Minimum RAM size needed to boot image, in megabytes"),
)
- container_choices = ["ami", "ari", "aki", "bare", "ovf"]
parser.add_argument(
"--container-format",
metavar="<container-format>",
- help=_("Container format of image. Acceptable formats: %s") %
- container_choices,
- choices=container_choices
+ choices=CONTAINER_CHOICES,
+ help=_("Image container format. The supported options are: %s") %
+ ', '.join(CONTAINER_CHOICES)
)
parser.add_argument(
"--disk-format",
diff --git a/openstackclient/image/v2/image.py b/openstackclient/image/v2/image.py
index 418cc397..29499ec2 100644
--- a/openstackclient/image/v2/image.py
+++ b/openstackclient/image/v2/image.py
@@ -30,6 +30,7 @@ from openstackclient.i18n import _
from openstackclient.identity import common
+CONTAINER_CHOICES = ["ami", "ari", "aki", "bare", "docker", "ova", "ovf"]
DEFAULT_CONTAINER_FORMAT = 'bare'
DEFAULT_DISK_FORMAT = 'raw'
DISK_CHOICES = ["ami", "ari", "aki", "vhd", "vmdk", "raw", "qcow2", "vhdx",
@@ -135,9 +136,13 @@ class CreateImage(command.ShowOne):
parser.add_argument(
"--container-format",
default=DEFAULT_CONTAINER_FORMAT,
+ choices=CONTAINER_CHOICES,
metavar="<container-format>",
- help=_("Image container format "
- "(default: %s)") % DEFAULT_CONTAINER_FORMAT,
+ help=(_("Image container format. "
+ "The supported options are: %(option_list)s. "
+ "The default format is: %(default_opt)s") %
+ {'option_list': ', '.join(CONTAINER_CHOICES),
+ 'default_opt': DEFAULT_CONTAINER_FORMAT})
)
parser.add_argument(
"--disk-format",
@@ -659,8 +664,9 @@ class SetImage(command.Command):
parser.add_argument(
"--container-format",
metavar="<container-format>",
- help=_("Image container format "
- "(default: %s)") % DEFAULT_CONTAINER_FORMAT,
+ choices=CONTAINER_CHOICES,
+ help=_("Image container format. The supported options are: %s") %
+ ', '.join(CONTAINER_CHOICES)
)
parser.add_argument(
"--disk-format",
diff --git a/openstackclient/network/v2/network.py b/openstackclient/network/v2/network.py
index 26cd02c6..17ce0f7f 100644
--- a/openstackclient/network/v2/network.py
+++ b/openstackclient/network/v2/network.py
@@ -141,10 +141,8 @@ def _add_additional_network_options(parser):
parser.add_argument(
'--provider-network-type',
metavar='<provider-network-type>',
- choices=['flat', 'geneve', 'gre', 'local',
- 'vlan', 'vxlan'],
help=_("The physical mechanism by which the virtual network "
- "is implemented. The supported options are: "
+ "is implemented. For example: "
"flat, geneve, gre, local, vlan, vxlan."))
parser.add_argument(
'--provider-physical-network',
diff --git a/openstackclient/network/v2/port.py b/openstackclient/network/v2/port.py
index 20f3ad75..9ce0ce63 100644
--- a/openstackclient/network/v2/port.py
+++ b/openstackclient/network/v2/port.py
@@ -250,6 +250,17 @@ def _add_updatable_args(parser):
# TODO(abhiraut): Use the SDK resource mapped attribute names once the
# OSC minimum requirements include SDK 1.0.
+def _convert_address_pairs(parsed_args):
+ ops = []
+ for opt in parsed_args.allowed_address_pairs:
+ addr = {}
+ addr['ip_address'] = opt['ip-address']
+ if 'mac-address' in opt:
+ addr['mac_address'] = opt['mac-address']
+ ops.append(addr)
+ return ops
+
+
class CreatePort(command.ShowOne):
_description = _("Create a new port")
@@ -309,7 +320,7 @@ class CreatePort(command.ShowOne):
help=_("Name of this port")
)
# TODO(singhj): Add support for extended options:
- # qos,dhcp, address pairs
+ # qos,dhcp
secgroups = parser.add_mutually_exclusive_group()
secgroups.add_argument(
'--security-group',
@@ -336,7 +347,17 @@ class CreatePort(command.ShowOne):
action='store_true',
help=_("Disable port security for this port")
)
-
+ parser.add_argument(
+ '--allowed-address',
+ metavar='ip-address=<ip-address>[,mac-address=<mac-address>]',
+ action=parseractions.MultiKeyValueAction,
+ dest='allowed_address_pairs',
+ required_keys=['ip-address'],
+ optional_keys=['mac-address'],
+ help=_("Add allowed-address pair associated with this port: "
+ "ip-address=<ip-address>[,mac-address=<mac-address>] "
+ "(repeat option to set multiple allowed-address pairs)")
+ )
return parser
def take_action(self, parsed_args):
@@ -353,6 +374,9 @@ class CreatePort(command.ShowOne):
for sg in parsed_args.security_groups]
if parsed_args.no_security_group:
attrs['security_groups'] = []
+ if parsed_args.allowed_address_pairs:
+ attrs['allowed_address_pairs'] = (
+ _convert_address_pairs(parsed_args))
obj = client.create_port(**attrs)
display_columns, columns = _get_columns(obj)
@@ -573,7 +597,26 @@ class SetPort(command.Command):
action='store_true',
help=_("Disable port security for this port")
)
-
+ parser.add_argument(
+ '--allowed-address',
+ metavar='ip-address=<ip-address>[,mac-address=<mac-address>]',
+ action=parseractions.MultiKeyValueAction,
+ dest='allowed_address_pairs',
+ required_keys=['ip-address'],
+ optional_keys=['mac-address'],
+ help=_("Add allowed-address pair associated with this port: "
+ "ip-address=<ip-address>[,mac-address=<mac-address>] "
+ "(repeat option to set multiple allowed-address pairs)")
+ )
+ parser.add_argument(
+ '--no-allowed-address',
+ dest='no_allowed_address_pair',
+ action='store_true',
+ help=_("Clear existing allowed-address pairs associated"
+ "with this port."
+ "(Specify both --allowed-address and --no-allowed-address"
+ "to overwrite the current allowed-address pairs)")
+ )
return parser
def take_action(self, parsed_args):
@@ -613,6 +656,19 @@ class SetPort(command.Command):
elif parsed_args.no_security_group:
attrs['security_groups'] = []
+ if (parsed_args.allowed_address_pairs and
+ parsed_args.no_allowed_address_pair):
+ attrs['allowed_address_pairs'] = (
+ _convert_address_pairs(parsed_args))
+
+ elif parsed_args.allowed_address_pairs:
+ attrs['allowed_address_pairs'] = (
+ [addr for addr in obj.allowed_address_pairs if addr] +
+ _convert_address_pairs(parsed_args))
+
+ elif parsed_args.no_allowed_address_pair:
+ attrs['allowed_address_pairs'] = []
+
client.update_port(obj, **attrs)
@@ -673,6 +729,19 @@ class UnsetPort(command.Command):
metavar="<port>",
help=_("Port to modify (name or ID)")
)
+ parser.add_argument(
+ '--allowed-address',
+ metavar='ip-address=<ip-address>[,mac-address=<mac-address>]',
+ action=parseractions.MultiKeyValueAction,
+ dest='allowed_address_pairs',
+ required_keys=['ip-address'],
+ optional_keys=['mac-address'],
+ help=_("Desired allowed-address pair which should be removed "
+ "from this port: ip-address=<ip-address> "
+ "[,mac-address=<mac-address>] (repeat option to set "
+ "multiple allowed-address pairs)")
+ )
+
return parser
def take_action(self, parsed_args):
@@ -684,6 +753,7 @@ class UnsetPort(command.Command):
tmp_fixed_ips = copy.deepcopy(obj.fixed_ips)
tmp_binding_profile = copy.deepcopy(obj.binding_profile)
tmp_secgroups = copy.deepcopy(obj.security_groups)
+ tmp_addr_pairs = copy.deepcopy(obj.allowed_address_pairs)
_prepare_fixed_ips(self.app.client_manager, parsed_args)
attrs = {}
if parsed_args.fixed_ip:
@@ -712,6 +782,14 @@ class UnsetPort(command.Command):
msg = _("Port does not contain security group %s") % sg
raise exceptions.CommandError(msg)
attrs['security_groups'] = tmp_secgroups
+ if parsed_args.allowed_address_pairs:
+ try:
+ for addr in _convert_address_pairs(parsed_args):
+ tmp_addr_pairs.remove(addr)
+ except ValueError:
+ msg = _("Port does not contain allowed-address-pair %s") % addr
+ raise exceptions.CommandError(msg)
+ attrs['allowed_address_pairs'] = tmp_addr_pairs
if attrs:
client.update_port(obj, **attrs)
diff --git a/openstackclient/network/v2/security_group.py b/openstackclient/network/v2/security_group.py
index df9e320b..c6d9ede7 100644
--- a/openstackclient/network/v2/security_group.py
+++ b/openstackclient/network/v2/security_group.py
@@ -21,6 +21,7 @@ import six
from openstackclient.i18n import _
from openstackclient.identity import common as identity_common
from openstackclient.network import common
+from openstackclient.network import sdk_utils
from openstackclient.network import utils as network_utils
@@ -34,6 +35,7 @@ def _format_network_security_group_rules(sg_rules):
sg_rule.pop(key)
sg_rule.pop('security_group_id', None)
sg_rule.pop('tenant_id', None)
+ sg_rule.pop('project_id', None)
return utils.format_list_of_dicts(sg_rules)
@@ -72,29 +74,15 @@ _formatters_compute = {
def _get_columns(item):
- # Build the display columns and a list of the property columns
- # that need to be mapped (display column name, property name).
- columns = list(item.to_dict().keys())
- property_column_mappings = []
- if 'security_group_rules' in columns:
- columns.append('rules')
- columns.remove('security_group_rules')
- property_column_mappings.append(('rules', 'security_group_rules'))
- if 'tenant_id' in columns:
- columns.remove('tenant_id')
- if 'project_id' not in columns:
- columns.append('project_id')
- property_column_mappings.append(('project_id', 'tenant_id'))
- display_columns = sorted(columns)
-
- # Build the property columns and apply any column mappings.
- property_columns = sorted(columns)
- for property_column_mapping in property_column_mappings:
- property_index = property_columns.index(property_column_mapping[0])
- property_columns[property_index] = property_column_mapping[1]
- return tuple(display_columns), property_columns
+ column_map = {
+ 'security_group_rules': 'rules',
+ 'tenant_id': 'project_id',
+ }
+ return sdk_utils.get_osc_show_columns_for_sdk_resource(item, column_map)
+# TODO(abhiraut): Use the SDK resource mapped attribute names once the
+# OSC minimum requirements include SDK 1.0.
class CreateSecurityGroup(common.NetworkAndComputeShowOne):
_description = _("Create a new security group")
@@ -190,6 +178,8 @@ class DeleteSecurityGroup(common.NetworkAndComputeDelete):
client.security_groups.delete(data.id)
+# TODO(rauta): Use the SDK resource mapped attribute names once
+# the OSC minimum requirements include SDK 1.0.
class ListSecurityGroup(common.NetworkAndComputeLister):
_description = _("List security groups")
@@ -245,6 +235,7 @@ class ListSecurityGroup(common.NetworkAndComputeLister):
parsed_args.project_domain,
).id
filters['tenant_id'] = project_id
+ filters['project_id'] = project_id
return self._get_return_data(client.security_groups(**filters))
def take_action_compute(self, client, parsed_args):
diff --git a/openstackclient/tests/functional/base.py b/openstackclient/tests/functional/base.py
index fb78ea62..85743296 100644
--- a/openstackclient/tests/functional/base.py
+++ b/openstackclient/tests/functional/base.py
@@ -16,7 +16,6 @@ import shlex
import subprocess
import testtools
-import six
from tempest.lib.cli import output_parser
from tempest.lib import exceptions
@@ -88,23 +87,17 @@ class TestCase(testtools.TestCase):
for field in field_names:
self.assertIn(field, item)
- def assert_show_fields(self, items, field_names):
+ def assert_show_fields(self, show_output, field_names):
"""Verify that all items have keys listed in field_names."""
- for item in items:
- for key in six.iterkeys(item):
- self.assertIn(key, field_names)
-
- def assert_show_structure(self, items, field_names):
- """Verify that all field_names listed in keys of all items."""
- if isinstance(items, list):
- o = {}
- for d in items:
- o.update(d)
- else:
- o = items
- item_keys = o.keys()
- for field in field_names:
- self.assertIn(field, item_keys)
+
+ # field_names = ['name', 'description']
+ # show_output = [{'name': 'fc2b98d8faed4126b9e371eda045ade2'},
+ # {'description': 'description-821397086'}]
+ # this next line creates a flattened list of all 'keys' (like 'name',
+ # and 'description' out of the output
+ all_headers = [item for sublist in show_output for item in sublist]
+ for field_name in field_names:
+ self.assertIn(field_name, all_headers)
def parse_show_as_object(self, raw_output):
"""Return a dict with values parsed from cli output."""
diff --git a/openstackclient/tests/functional/common/test_help.py b/openstackclient/tests/functional/common/test_help.py
index bbc52197..211c52b1 100644
--- a/openstackclient/tests/functional/common/test_help.py
+++ b/openstackclient/tests/functional/common/test_help.py
@@ -64,3 +64,10 @@ class HelpTests(base.TestCase):
raw_output = self.openstack('help server')
for command in [row[0] for row in self.SERVER_COMMANDS]:
self.assertIn(command, raw_output)
+
+ def test_networking_commands_help(self):
+ """Check networking related commands in help message."""
+ raw_output = self.openstack('help network list')
+ self.assertIn('List networks', raw_output)
+ raw_output = self.openstack('network create --help')
+ self.assertIn('Create new network', raw_output)
diff --git a/openstackclient/tests/functional/identity/v2/common.py b/openstackclient/tests/functional/identity/v2/common.py
index b390c5bc..ad02f779 100644
--- a/openstackclient/tests/functional/identity/v2/common.py
+++ b/openstackclient/tests/functional/identity/v2/common.py
@@ -22,14 +22,13 @@ BASIC_LIST_HEADERS = ['ID', 'Name']
class IdentityTests(base.TestCase):
"""Functional tests for Identity commands. """
- USER_FIELDS = ['email', 'enabled', 'id', 'name', 'project_id',
- 'username', 'domain_id', 'default_project_id']
- PROJECT_FIELDS = ['enabled', 'id', 'name', 'description', 'domain_id']
+ USER_FIELDS = ['email', 'enabled', 'id', 'name', 'project_id', 'username']
+ PROJECT_FIELDS = ['enabled', 'id', 'name', 'description']
TOKEN_FIELDS = ['expires', 'id', 'project_id', 'user_id']
- ROLE_FIELDS = ['id', 'name', 'links', 'domain_id']
+ ROLE_FIELDS = ['id', 'name', 'domain_id']
SERVICE_FIELDS = ['id', 'enabled', 'name', 'type', 'description']
ENDPOINT_FIELDS = ['id', 'region', 'service_id', 'service_name',
- 'service_type', 'enabled', 'publicurl',
+ 'service_type', 'publicurl',
'adminurl', 'internalurl']
EC2_CREDENTIALS_FIELDS = ['access', 'project_id', 'secret',
diff --git a/openstackclient/tests/functional/identity/v3/common.py b/openstackclient/tests/functional/identity/v3/common.py
index 3b6fc27b..a509574c 100644
--- a/openstackclient/tests/functional/identity/v3/common.py
+++ b/openstackclient/tests/functional/identity/v3/common.py
@@ -23,15 +23,15 @@ BASIC_LIST_HEADERS = ['ID', 'Name']
class IdentityTests(base.TestCase):
"""Functional tests for Identity commands. """
- DOMAIN_FIELDS = ['description', 'enabled', 'id', 'name', 'links']
- GROUP_FIELDS = ['description', 'domain_id', 'id', 'name', 'links']
+ DOMAIN_FIELDS = ['description', 'enabled', 'id', 'name']
+ GROUP_FIELDS = ['description', 'domain_id', 'id', 'name']
TOKEN_FIELDS = ['expires', 'id', 'project_id', 'user_id']
USER_FIELDS = ['email', 'enabled', 'id', 'name', 'name',
'domain_id', 'default_project_id', 'description',
'password_expires_at']
PROJECT_FIELDS = ['description', 'id', 'domain_id', 'is_domain',
- 'enabled', 'name', 'parent_id', 'links']
- ROLE_FIELDS = ['id', 'name', 'links', 'domain_id']
+ 'enabled', 'name', 'parent_id']
+ ROLE_FIELDS = ['id', 'name', 'domain_id']
SERVICE_FIELDS = ['id', 'enabled', 'name', 'type', 'description']
REGION_FIELDS = ['description', 'enabled', 'parent_region', 'region']
ENDPOINT_FIELDS = ['id', 'region', 'region_id', 'service_id',
diff --git a/openstackclient/tests/functional/network/v2/test_port.py b/openstackclient/tests/functional/network/v2/test_port.py
index decd9553..e100bd82 100644
--- a/openstackclient/tests/functional/network/v2/test_port.py
+++ b/openstackclient/tests/functional/network/v2/test_port.py
@@ -10,6 +10,7 @@
# License for the specific language governing permissions and limitations
# under the License.
+import re
import uuid
from openstackclient.tests.functional import base
@@ -24,35 +25,152 @@ class PortTests(base.TestCase):
@classmethod
def setUpClass(cls):
- # Create a network for the subnet.
- cls.openstack('network create ' + cls.NETWORK_NAME)
- opts = cls.get_opts(cls.FIELDS)
- raw_output = cls.openstack(
- 'port create --network ' + cls.NETWORK_NAME + ' ' +
- cls.NAME + opts
- )
- expected = cls.NAME + '\n'
- cls.assertOutput(expected, raw_output)
+ # Set up some regex for matching below
+ cls.re_id = re.compile("\s+id\s+\|\s+(\S+)")
+ cls.re_name = re.compile("\s+name\s+\|\s+([^|]+?)\s+\|")
+ cls.re_description = re.compile("\s+description\s+\|\s+([^|]+?)\s+\|")
+ cls.re_mac_address = re.compile("\s+mac_address\s+\|\s+([^|]+?)\s+\|")
+ cls.re_state = re.compile("\s+admin_state_up\s+\|\s+([^|]+?)\s+\|")
+
+ # Create a network for the port
+ raw_output = cls.openstack('network create ' + cls.NETWORK_NAME)
+ cls.network_id = re.search(cls.re_id, raw_output).group(1)
@classmethod
def tearDownClass(cls):
- raw_output = cls.openstack('port delete ' + cls.NAME)
- cls.assertOutput('', raw_output)
raw_output = cls.openstack('network delete ' + cls.NETWORK_NAME)
cls.assertOutput('', raw_output)
+ def test_port_delete(self):
+ """Test create, delete multiple"""
+ raw_output = self.openstack(
+ 'port create --network ' + self.NETWORK_NAME + ' ' + self.NAME
+ )
+ re_id1 = re.search(self.re_id, raw_output)
+ self.assertIsNotNone(re_id1)
+ id1 = re_id1.group(1)
+ self.assertIsNotNone(
+ re.search(self.re_mac_address, raw_output).group(1),
+ )
+ self.assertEqual(
+ self.NAME,
+ re.search(self.re_name, raw_output).group(1),
+ )
+
+ raw_output = self.openstack(
+ 'port create ' +
+ '--network ' + self.NETWORK_NAME + ' ' +
+ self.NAME + 'x'
+ )
+ id2 = re.search(self.re_id, raw_output).group(1)
+ self.assertIsNotNone(
+ re.search(self.re_mac_address, raw_output).group(1),
+ )
+ self.assertEqual(
+ self.NAME + 'x',
+ re.search(self.re_name, raw_output).group(1),
+ )
+
+ # Clean up after ourselves
+ raw_output = self.openstack('port delete ' + id1 + ' ' + id2)
+ self.assertOutput('', raw_output)
+
def test_port_list(self):
- opts = self.get_opts(self.HEADERS)
- raw_output = self.openstack('port list' + opts)
- self.assertIn(self.NAME, raw_output)
+ """Test create defaults, list, delete"""
+ raw_output = self.openstack(
+ 'port create --network ' + self.NETWORK_NAME + ' ' + self.NAME
+ )
+ re_id1 = re.search(self.re_id, raw_output)
+ self.assertIsNotNone(re_id1)
+ id1 = re_id1.group(1)
+ mac1 = re.search(self.re_mac_address, raw_output).group(1)
+ self.addCleanup(self.openstack, 'port delete ' + id1)
+ self.assertEqual(
+ self.NAME,
+ re.search(self.re_name, raw_output).group(1),
+ )
+
+ raw_output = self.openstack(
+ 'port create ' +
+ '--network ' + self.NETWORK_NAME + ' ' +
+ self.NAME + 'x'
+ )
+ id2 = re.search(self.re_id, raw_output).group(1)
+ mac2 = re.search(self.re_mac_address, raw_output).group(1)
+ self.addCleanup(self.openstack, 'port delete ' + id2)
+ self.assertEqual(
+ self.NAME + 'x',
+ re.search(self.re_name, raw_output).group(1),
+ )
+
+ # Test list
+ raw_output = self.openstack('port list')
+ self.assertIsNotNone(re.search("\|\s+" + id1 + "\s+\|", raw_output))
+ self.assertIsNotNone(re.search("\|\s+" + id2 + "\s+\|", raw_output))
+ self.assertIsNotNone(re.search("\|\s+" + mac1 + "\s+\|", raw_output))
+ self.assertIsNotNone(re.search("\|\s+" + mac2 + "\s+\|", raw_output))
+
+ # Test list --long
+ raw_output = self.openstack('port list --long')
+ self.assertIsNotNone(re.search("\|\s+" + id1 + "\s+\|", raw_output))
+ self.assertIsNotNone(re.search("\|\s+" + id2 + "\s+\|", raw_output))
+
+ # Test list --mac-address
+ raw_output = self.openstack('port list --mac-address ' + mac2)
+ self.assertIsNone(re.search("\|\s+" + id1 + "\s+\|", raw_output))
+ self.assertIsNotNone(re.search("\|\s+" + id2 + "\s+\|", raw_output))
+ self.assertIsNone(re.search("\|\s+" + mac1 + "\s+\|", raw_output))
+ self.assertIsNotNone(re.search("\|\s+" + mac2 + "\s+\|", raw_output))
def test_port_set(self):
- self.openstack('port set --disable ' + self.NAME)
- opts = self.get_opts(['name', 'admin_state_up'])
- raw_output = self.openstack('port show ' + self.NAME + opts)
- self.assertEqual("DOWN\n" + self.NAME + "\n", raw_output)
-
- def test_port_show(self):
- opts = self.get_opts(self.FIELDS)
- raw_output = self.openstack('port show ' + self.NAME + opts)
- self.assertEqual(self.NAME + "\n", raw_output)
+ """Test create, set, show, delete"""
+ raw_output = self.openstack(
+ 'port create ' +
+ '--network ' + self.NETWORK_NAME + ' ' +
+ '--description xyzpdq '
+ '--disable ' +
+ self.NAME
+ )
+ re_id = re.search(self.re_id, raw_output)
+ self.assertIsNotNone(re_id)
+ id = re_id.group(1)
+ self.addCleanup(self.openstack, 'port delete ' + id)
+ self.assertEqual(
+ self.NAME,
+ re.search(self.re_name, raw_output).group(1),
+ )
+ self.assertEqual(
+ 'xyzpdq',
+ re.search(self.re_description, raw_output).group(1),
+ )
+ self.assertEqual(
+ 'DOWN',
+ re.search(self.re_state, raw_output).group(1),
+ )
+
+ raw_output = self.openstack(
+ 'port set ' +
+ '--enable ' +
+ self.NAME
+ )
+ self.assertOutput('', raw_output)
+
+ raw_output = self.openstack(
+ 'port show ' +
+ self.NAME
+ )
+ self.assertEqual(
+ self.NAME,
+ re.search(self.re_name, raw_output).group(1),
+ )
+ self.assertEqual(
+ 'xyzpdq',
+ re.search(self.re_description, raw_output).group(1),
+ )
+ self.assertEqual(
+ 'UP',
+ re.search(self.re_state, raw_output).group(1),
+ )
+ self.assertIsNotNone(
+ re.search(self.re_mac_address, raw_output).group(1),
+ )
diff --git a/openstackclient/tests/unit/compute/v2/test_server.py b/openstackclient/tests/unit/compute/v2/test_server.py
index 57221189..54f36209 100644
--- a/openstackclient/tests/unit/compute/v2/test_server.py
+++ b/openstackclient/tests/unit/compute/v2/test_server.py
@@ -36,10 +36,6 @@ class TestServer(compute_fakes.TestComputev2):
self.servers_mock = self.app.client_manager.compute.servers
self.servers_mock.reset_mock()
- # Get a shortcut to the compute client ImageManager Mock
- self.cimages_mock = self.app.client_manager.compute.images
- self.cimages_mock.reset_mock()
-
# Get a shortcut to the compute client FlavorManager Mock
self.flavors_mock = self.app.client_manager.compute.flavors
self.flavors_mock.reset_mock()
@@ -259,7 +255,7 @@ class TestServerCreate(TestServer):
self.servers_mock.create.return_value = self.new_server
self.image = image_fakes.FakeImage.create_one_image()
- self.cimages_mock.get.return_value = self.image
+ self.images_mock.get.return_value = self.image
self.flavor = compute_fakes.FakeFlavor.create_one_flavor()
self.flavors_mock.get.return_value = self.flavor
@@ -859,7 +855,7 @@ class TestServerList(TestServer):
self.servers_mock.list.return_value = self.servers
self.image = image_fakes.FakeImage.create_one_image()
- self.cimages_mock.get.return_value = self.image
+ self.images_mock.get.return_value = self.image
self.flavor = compute_fakes.FakeFlavor.create_one_flavor()
self.flavors_mock.get.return_value = self.flavor
@@ -943,7 +939,7 @@ class TestServerList(TestServer):
parsed_args = self.check_parser(self.cmd, arglist, verifylist)
columns, data = self.cmd.take_action(parsed_args)
- self.cimages_mock.get.assert_any_call(self.image.id)
+ self.images_mock.get.assert_any_call(self.image.id)
self.search_opts['image'] = self.image.id
self.servers_mock.list.assert_called_with(**self.kwargs)
@@ -1019,7 +1015,7 @@ class TestServerRebuild(TestServer):
# Return value for utils.find_resource for image
self.image = image_fakes.FakeImage.create_one_image()
- self.cimages_mock.get.return_value = self.image
+ self.images_mock.get.return_value = self.image
# Fake the rebuilt new server.
new_server = compute_fakes.FakeServer.create_one_server()
@@ -1059,7 +1055,7 @@ class TestServerRebuild(TestServer):
self.cmd.take_action(parsed_args)
self.servers_mock.get.assert_called_with(self.server.id)
- self.cimages_mock.get.assert_called_with(self.image.id)
+ self.images_mock.get.assert_called_with(self.image.id)
self.server.rebuild.assert_called_with(self.image, None)
def test_rebuild_with_current_image_and_password(self):
@@ -1078,7 +1074,7 @@ class TestServerRebuild(TestServer):
self.cmd.take_action(parsed_args)
self.servers_mock.get.assert_called_with(self.server.id)
- self.cimages_mock.get.assert_called_with(self.image.id)
+ self.images_mock.get.assert_called_with(self.image.id)
self.server.rebuild.assert_called_with(self.image, password)
@mock.patch.object(common_utils, 'wait_for_status', return_value=True)
@@ -1106,7 +1102,7 @@ class TestServerRebuild(TestServer):
)
self.servers_mock.get.assert_called_with(self.server.id)
- self.cimages_mock.get.assert_called_with(self.image.id)
+ self.images_mock.get.assert_called_with(self.image.id)
self.server.rebuild.assert_called_with(self.image, None)
@mock.patch.object(common_utils, 'wait_for_status', return_value=False)
@@ -1130,7 +1126,7 @@ class TestServerRebuild(TestServer):
)
self.servers_mock.get.assert_called_with(self.server.id)
- self.cimages_mock.get.assert_called_with(self.image.id)
+ self.images_mock.get.assert_called_with(self.image.id)
self.server.rebuild.assert_called_with(self.image, None)
@@ -1628,7 +1624,7 @@ class TestServerShow(TestServer):
# This is the return value for utils.find_resource()
self.servers_mock.get.return_value = self.server
- self.cimages_mock.get.return_value = self.image
+ self.images_mock.get.return_value = self.image
self.flavors_mock.get.return_value = self.flavor
# Get the command object to test
@@ -1986,6 +1982,7 @@ class TestServerGeneral(TestServer):
# Call _prep_server_detail().
server_detail = server._prep_server_detail(
self.app.client_manager.compute,
+ self.app.client_manager.image,
_server
)
# 'networks' is used to create _server. Remove it.
diff --git a/openstackclient/tests/unit/identity/v3/test_mappings.py b/openstackclient/tests/unit/identity/v3/test_mappings.py
index 5086724c..93fe1196 100644
--- a/openstackclient/tests/unit/identity/v3/test_mappings.py
+++ b/openstackclient/tests/unit/identity/v3/test_mappings.py
@@ -181,16 +181,12 @@ class TestMappingSet(TestMapping):
mocker.return_value = identity_fakes.MAPPING_RULES_2
with mock.patch("openstackclient.identity.v3.mapping."
"SetMapping._read_rules", mocker):
- columns, data = self.cmd.take_action(parsed_args)
+ result = self.cmd.take_action(parsed_args)
self.mapping_mock.update.assert_called_with(
mapping=identity_fakes.mapping_id,
rules=identity_fakes.MAPPING_RULES_2)
- collist = ('id', 'rules')
- self.assertEqual(collist, columns)
- datalist = (identity_fakes.mapping_id,
- identity_fakes.MAPPING_RULES_2)
- self.assertEqual(datalist, data)
+ self.assertIsNone(result)
def test_set_rules_wrong_file_path(self):
arglist = [
diff --git a/openstackclient/tests/unit/network/v2/test_port.py b/openstackclient/tests/unit/network/v2/test_port.py
index 255e8116..9deb77ac 100644
--- a/openstackclient/tests/unit/network/v2/test_port.py
+++ b/openstackclient/tests/unit/network/v2/test_port.py
@@ -216,7 +216,7 @@ class TestCreatePort(TestPort):
'test-port',
]
verifylist = [
- ('network', self._port.network_id,),
+ ('network', self._port.network_id),
('enable', True),
('binding_profile', {'parent_name': 'fake_parent', 'tag': 42}),
('name', 'test-port'),
@@ -351,6 +351,74 @@ class TestCreatePort(TestPort):
self.assertEqual(ref_columns, columns)
self.assertEqual(ref_data, data)
+ def test_create_port_with_allowed_address_pair_ipaddr(self):
+ pairs = [{'ip_address': '192.168.1.123'},
+ {'ip_address': '192.168.1.45'}]
+ arglist = [
+ '--network', self._port.network_id,
+ '--allowed-address', 'ip-address=192.168.1.123',
+ '--allowed-address', 'ip-address=192.168.1.45',
+ 'test-port',
+ ]
+ verifylist = [
+ ('network', self._port.network_id),
+ ('enable', True),
+ ('allowed_address_pairs', [{'ip-address': '192.168.1.123'},
+ {'ip-address': '192.168.1.45'}]),
+ ('name', 'test-port'),
+ ]
+ parsed_args = self.check_parser(self.cmd, arglist, verifylist)
+
+ columns, data = (self.cmd.take_action(parsed_args))
+
+ self.network.create_port.assert_called_once_with(**{
+ 'admin_state_up': True,
+ 'network_id': self._port.network_id,
+ 'allowed_address_pairs': pairs,
+ 'name': 'test-port',
+ })
+
+ ref_columns, ref_data = self._get_common_cols_data(self._port)
+ self.assertEqual(ref_columns, columns)
+ self.assertEqual(ref_data, data)
+
+ def test_create_port_with_allowed_address_pair(self):
+ pairs = [{'ip_address': '192.168.1.123',
+ 'mac_address': 'aa:aa:aa:aa:aa:aa'},
+ {'ip_address': '192.168.1.45',
+ 'mac_address': 'aa:aa:aa:aa:aa:b1'}]
+ arglist = [
+ '--network', self._port.network_id,
+ '--allowed-address',
+ 'ip-address=192.168.1.123,mac-address=aa:aa:aa:aa:aa:aa',
+ '--allowed-address',
+ 'ip-address=192.168.1.45,mac-address=aa:aa:aa:aa:aa:b1',
+ 'test-port',
+ ]
+ verifylist = [
+ ('network', self._port.network_id),
+ ('enable', True),
+ ('allowed_address_pairs', [{'ip-address': '192.168.1.123',
+ 'mac-address': 'aa:aa:aa:aa:aa:aa'},
+ {'ip-address': '192.168.1.45',
+ 'mac-address': 'aa:aa:aa:aa:aa:b1'}]),
+ ('name', 'test-port'),
+ ]
+ parsed_args = self.check_parser(self.cmd, arglist, verifylist)
+
+ columns, data = (self.cmd.take_action(parsed_args))
+
+ self.network.create_port.assert_called_once_with(**{
+ 'admin_state_up': True,
+ 'network_id': self._port.network_id,
+ 'allowed_address_pairs': pairs,
+ 'name': 'test-port',
+ })
+
+ ref_columns, ref_data = self._get_common_cols_data(self._port)
+ self.assertEqual(ref_columns, columns)
+ self.assertEqual(ref_data, data)
+
def test_create_port_security_enabled(self):
arglist = [
'--network', self._port.network_id,
@@ -996,6 +1064,91 @@ class TestSetPort(TestPort):
self.network.update_port.assert_called_once_with(_testport, **attrs)
self.assertIsNone(result)
+ def test_set_allowed_address_pair(self):
+ arglist = [
+ '--allowed-address', 'ip-address=192.168.1.123',
+ self._port.name,
+ ]
+ verifylist = [
+ ('allowed_address_pairs', [{'ip-address': '192.168.1.123'}]),
+ ('port', self._port.name),
+ ]
+
+ parsed_args = self.check_parser(self.cmd, arglist, verifylist)
+ result = self.cmd.take_action(parsed_args)
+
+ attrs = {
+ 'allowed_address_pairs': [{'ip_address': '192.168.1.123'}],
+ }
+ self.network.update_port.assert_called_once_with(self._port, **attrs)
+ self.assertIsNone(result)
+
+ def test_append_allowed_address_pair(self):
+ _testport = network_fakes.FakePort.create_one_port(
+ {'allowed_address_pairs': [{'ip_address': '192.168.1.123'}]})
+ self.network.find_port = mock.Mock(return_value=_testport)
+ arglist = [
+ '--allowed-address', 'ip-address=192.168.1.45',
+ _testport.name,
+ ]
+ verifylist = [
+ ('allowed_address_pairs', [{'ip-address': '192.168.1.45'}]),
+ ('port', _testport.name),
+ ]
+
+ parsed_args = self.check_parser(self.cmd, arglist, verifylist)
+ result = self.cmd.take_action(parsed_args)
+
+ attrs = {
+ 'allowed_address_pairs': [{'ip_address': '192.168.1.123'},
+ {'ip_address': '192.168.1.45'}],
+ }
+ self.network.update_port.assert_called_once_with(_testport, **attrs)
+ self.assertIsNone(result)
+
+ def test_overwrite_allowed_address_pair(self):
+ _testport = network_fakes.FakePort.create_one_port(
+ {'allowed_address_pairs': [{'ip_address': '192.168.1.123'}]})
+ self.network.find_port = mock.Mock(return_value=_testport)
+ arglist = [
+ '--allowed-address', 'ip-address=192.168.1.45',
+ '--no-allowed-address',
+ _testport.name,
+ ]
+ verifylist = [
+ ('allowed_address_pairs', [{'ip-address': '192.168.1.45'}]),
+ ('no_allowed_address_pair', True),
+ ('port', _testport.name),
+ ]
+
+ parsed_args = self.check_parser(self.cmd, arglist, verifylist)
+ result = self.cmd.take_action(parsed_args)
+
+ attrs = {
+ 'allowed_address_pairs': [{'ip_address': '192.168.1.45'}],
+ }
+ self.network.update_port.assert_called_once_with(_testport, **attrs)
+ self.assertIsNone(result)
+
+ def test_set_no_allowed_address_pairs(self):
+ arglist = [
+ '--no-allowed-address',
+ self._port.name,
+ ]
+ verifylist = [
+ ('no_allowed_address_pair', True),
+ ('port', self._port.name),
+ ]
+
+ parsed_args = self.check_parser(self.cmd, arglist, verifylist)
+ result = self.cmd.take_action(parsed_args)
+
+ attrs = {
+ 'allowed_address_pairs': [],
+ }
+ self.network.update_port.assert_called_once_with(self._port, **attrs)
+ self.assertIsNone(result)
+
def test_port_security_enabled(self):
arglist = [
'--enable-port-security',
@@ -1192,3 +1345,42 @@ class TestUnsetPort(TestPort):
self.assertRaises(exceptions.CommandError,
self.cmd.take_action,
parsed_args)
+
+ def test_unset_port_allowed_address_pair(self):
+ _fake_port = network_fakes.FakePort.create_one_port(
+ {'allowed_address_pairs': [{'ip_address': '192.168.1.123'}]})
+ self.network.find_port = mock.Mock(return_value=_fake_port)
+ arglist = [
+ '--allowed-address', 'ip-address=192.168.1.123',
+ _fake_port.name,
+ ]
+ verifylist = [
+ ('allowed_address_pairs', [{'ip-address': '192.168.1.123'}]),
+ ]
+
+ parsed_args = self.check_parser(self.cmd, arglist, verifylist)
+ result = self.cmd.take_action(parsed_args)
+
+ attrs = {
+ 'allowed_address_pairs': [],
+ }
+
+ self.network.update_port.assert_called_once_with(_fake_port, **attrs)
+ self.assertIsNone(result)
+
+ def test_unset_port_allowed_address_pair_not_existent(self):
+ _fake_port = network_fakes.FakePort.create_one_port(
+ {'allowed_address_pairs': [{'ip_address': '192.168.1.123'}]})
+ self.network.find_port = mock.Mock(return_value=_fake_port)
+ arglist = [
+ '--allowed-address', 'ip-address=192.168.1.45',
+ _fake_port.name,
+ ]
+ verifylist = [
+ ('allowed_address_pairs', [{'ip-address': '192.168.1.45'}]),
+ ]
+
+ parsed_args = self.check_parser(self.cmd, arglist, verifylist)
+ self.assertRaises(exceptions.CommandError,
+ self.cmd.take_action,
+ parsed_args)
diff --git a/openstackclient/tests/unit/network/v2/test_security_group.py b/openstackclient/tests/unit/network/v2/test_security_group.py
index 43aa07cc..9a30267e 100644
--- a/openstackclient/tests/unit/network/v2/test_security_group.py
+++ b/openstackclient/tests/unit/network/v2/test_security_group.py
@@ -456,7 +456,7 @@ class TestListSecurityGroupNetwork(TestSecurityGroupNetwork):
parsed_args = self.check_parser(self.cmd, arglist, verifylist)
columns, data = self.cmd.take_action(parsed_args)
- filters = {'tenant_id': project.id}
+ filters = {'tenant_id': project.id, 'project_id': project.id}
self.network.security_groups.assert_called_once_with(**filters)
self.assertEqual(self.columns, columns)
@@ -476,7 +476,7 @@ class TestListSecurityGroupNetwork(TestSecurityGroupNetwork):
parsed_args = self.check_parser(self.cmd, arglist, verifylist)
columns, data = self.cmd.take_action(parsed_args)
- filters = {'tenant_id': project.id}
+ filters = {'tenant_id': project.id, 'project_id': project.id}
self.network.security_groups.assert_called_once_with(**filters)
self.assertEqual(self.columns, columns)
diff --git a/openstackclient/tests/unit/volume/v2/test_snapshot.py b/openstackclient/tests/unit/volume/v2/test_snapshot.py
index 8ce356ae..12d1e390 100644
--- a/openstackclient/tests/unit/volume/v2/test_snapshot.py
+++ b/openstackclient/tests/unit/volume/v2/test_snapshot.py
@@ -19,6 +19,7 @@ from mock import call
from osc_lib import exceptions
from osc_lib import utils
+from openstackclient.tests.unit.identity.v3 import fakes as project_fakes
from openstackclient.tests.unit.volume.v2 import fakes as volume_fakes
from openstackclient.volume.v2 import volume_snapshot
@@ -32,6 +33,8 @@ class TestSnapshot(volume_fakes.TestVolume):
self.snapshots_mock.reset_mock()
self.volumes_mock = self.app.client_manager.volume.volumes
self.volumes_mock.reset_mock()
+ self.project_mock = self.app.client_manager.identity.projects
+ self.project_mock.reset_mock()
class TestSnapshotCreate(TestSnapshot):
@@ -278,6 +281,7 @@ class TestSnapshotDelete(TestSnapshot):
class TestSnapshotList(TestSnapshot):
volume = volume_fakes.FakeVolume.create_one_volume()
+ project = project_fakes.FakeProject.create_one_project()
snapshots = volume_fakes.FakeSnapshot.create_snapshots(
attrs={'volume_id': volume.name}, count=3)
@@ -321,6 +325,7 @@ class TestSnapshotList(TestSnapshot):
self.volumes_mock.list.return_value = [self.volume]
self.volumes_mock.get.return_value = self.volume
+ self.project_mock.get.return_value = self.project
self.snapshots_mock.list.return_value = self.snapshots
# Get the command to test
self.cmd = volume_snapshot.ListVolumeSnapshot(self.app, None)
@@ -341,6 +346,7 @@ class TestSnapshotList(TestSnapshot):
'all_tenants': False,
'name': None,
'status': None,
+ 'project_id': None,
'volume_id': None
}
)
@@ -351,11 +357,13 @@ class TestSnapshotList(TestSnapshot):
arglist = [
"--long",
"--limit", "2",
+ "--project", self.project.id,
"--marker", self.snapshots[0].id,
]
verifylist = [
("long", True),
("limit", 2),
+ ("project", self.project.id),
("marker", self.snapshots[0].id),
('all_projects', False),
]
@@ -367,7 +375,8 @@ class TestSnapshotList(TestSnapshot):
limit=2,
marker=self.snapshots[0].id,
search_opts={
- 'all_tenants': False,
+ 'all_tenants': True,
+ 'project_id': self.project.id,
'name': None,
'status': None,
'volume_id': None
@@ -394,6 +403,7 @@ class TestSnapshotList(TestSnapshot):
'all_tenants': True,
'name': None,
'status': None,
+ 'project_id': None,
'volume_id': None
}
)
@@ -419,6 +429,7 @@ class TestSnapshotList(TestSnapshot):
'all_tenants': False,
'name': self.snapshots[0].name,
'status': None,
+ 'project_id': None,
'volume_id': None
}
)
@@ -444,6 +455,7 @@ class TestSnapshotList(TestSnapshot):
'all_tenants': False,
'name': None,
'status': self.snapshots[0].status,
+ 'project_id': None,
'volume_id': None
}
)
@@ -469,6 +481,7 @@ class TestSnapshotList(TestSnapshot):
'all_tenants': False,
'name': None,
'status': None,
+ 'project_id': None,
'volume_id': self.volume.id
}
)
diff --git a/openstackclient/volume/v2/volume_snapshot.py b/openstackclient/volume/v2/volume_snapshot.py
index af29b777..3283bb53 100644
--- a/openstackclient/volume/v2/volume_snapshot.py
+++ b/openstackclient/volume/v2/volume_snapshot.py
@@ -24,6 +24,7 @@ from osc_lib import utils
import six
from openstackclient.i18n import _
+from openstackclient.identity import common as identity_common
LOG = logging.getLogger(__name__)
@@ -166,6 +167,12 @@ class ListVolumeSnapshot(command.Lister):
help=_('Include all projects (admin only)'),
)
parser.add_argument(
+ '--project',
+ metavar='<project>',
+ help=_('Filter results by project (name or ID) (admin only)')
+ )
+ identity_common.add_project_domain_option_to_parser(parser)
+ parser.add_argument(
'--long',
action='store_true',
default=False,
@@ -208,6 +215,7 @@ class ListVolumeSnapshot(command.Lister):
def take_action(self, parsed_args):
volume_client = self.app.client_manager.volume
+ identity_client = self.app.client_manager.identity
def _format_volume_id(volume_id):
"""Return a volume name if available
@@ -245,8 +253,20 @@ class ListVolumeSnapshot(command.Lister):
volume_id = utils.find_resource(
volume_client.volumes, parsed_args.volume).id
+ project_id = None
+ if parsed_args.project:
+ project_id = identity_common.find_project(
+ identity_client,
+ parsed_args.project,
+ parsed_args.project_domain).id
+
+ # set value of 'all_tenants' when using project option
+ all_projects = True if parsed_args.project else \
+ parsed_args.all_projects
+
search_opts = {
- 'all_tenants': parsed_args.all_projects,
+ 'all_tenants': all_projects,
+ 'project_id': project_id,
'name': parsed_args.name,
'status': parsed_args.status,
'volume_id': volume_id,