root / snf-cyclades-app / synnefo / api / test / servers.py @ cb66110b
History | View | Annotate | Download (28.1 kB)
1 |
# Copyright 2012 GRNET S.A. All rights reserved.
|
---|---|
2 |
#
|
3 |
# Redistribution and use in source and binary forms, with or
|
4 |
# without modification, are permitted provided that the following
|
5 |
# conditions are met:
|
6 |
#
|
7 |
# 1. Redistributions of source code must retain the above
|
8 |
# copyright notice, this list of conditions and the following
|
9 |
# disclaimer.
|
10 |
#
|
11 |
# 2. Redistributions in binary form must reproduce the above
|
12 |
# copyright notice, this list of conditions and the following
|
13 |
# disclaimer in the documentation and/or other materials
|
14 |
# provided with the distribution.
|
15 |
#
|
16 |
# THIS SOFTWARE IS PROVIDED BY GRNET S.A. ``AS IS'' AND ANY EXPRESS
|
17 |
# OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
18 |
# WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
19 |
# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL GRNET S.A OR
|
20 |
# CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
21 |
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
22 |
# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
|
23 |
# USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
|
24 |
# AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
25 |
# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
|
26 |
# ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
27 |
# POSSIBILITY OF SUCH DAMAGE.
|
28 |
#
|
29 |
# The views and conclusions contained in the software and
|
30 |
# documentation are those of the authors and should not be
|
31 |
# interpreted as representing official policies, either expressed
|
32 |
# or implied, of GRNET S.A.
|
33 |
|
34 |
import json |
35 |
from copy import deepcopy |
36 |
|
37 |
from snf_django.utils.testing import (BaseAPITest, mocked_quotaholder, |
38 |
override_settings) |
39 |
from synnefo.db.models import VirtualMachine, VirtualMachineMetadata |
40 |
from synnefo.db import models_factory as mfactory |
41 |
from synnefo.logic.utils import get_rsapi_state |
42 |
from synnefo.cyclades_settings import cyclades_services |
43 |
from synnefo.lib.services import get_service_path |
44 |
from synnefo.lib import join_urls |
45 |
from synnefo import settings |
46 |
|
47 |
from mock import patch, Mock, call |
48 |
|
49 |
|
50 |
class ComputeAPITest(BaseAPITest): |
51 |
def setUp(self, *args, **kwargs): |
52 |
super(ComputeAPITest, self).setUp(*args, **kwargs) |
53 |
self.compute_path = get_service_path(cyclades_services, 'compute', |
54 |
version='v2.0')
|
55 |
|
56 |
def myget(self, path, *args, **kwargs): |
57 |
path = join_urls(self.compute_path, path)
|
58 |
return self.get(path, *args, **kwargs) |
59 |
|
60 |
def myput(self, path, *args, **kwargs): |
61 |
path = join_urls(self.compute_path, path)
|
62 |
return self.put(path, *args, **kwargs) |
63 |
|
64 |
def mypost(self, path, *args, **kwargs): |
65 |
path = join_urls(self.compute_path, path)
|
66 |
return self.post(path, *args, **kwargs) |
67 |
|
68 |
def mydelete(self, path, *args, **kwargs): |
69 |
path = join_urls(self.compute_path, path)
|
70 |
return self.delete(path, *args, **kwargs) |
71 |
|
72 |
|
73 |
class ServerAPITest(ComputeAPITest): |
74 |
def setUp(self): |
75 |
self.user1 = 'user1' |
76 |
self.user2 = 'user2' |
77 |
self.vm1 = mfactory.VirtualMachineFactory(userid=self.user1) |
78 |
self.vm2 = mfactory.VirtualMachineFactory(userid=self.user2) |
79 |
self.vm3 = mfactory.VirtualMachineFactory(deleted=True, |
80 |
userid=self.user1)
|
81 |
self.vm4 = mfactory.VirtualMachineFactory(userid=self.user2) |
82 |
super(ServerAPITest, self).setUp() |
83 |
|
84 |
def test_server_list_1(self): |
85 |
"""Test if the expected list of servers is returned."""
|
86 |
response = self.myget('servers') |
87 |
self.assertSuccess(response)
|
88 |
servers = json.loads(response.content)['servers']
|
89 |
self.assertEqual(servers, [])
|
90 |
|
91 |
def test_server_list_2(self): |
92 |
"""Test if the expected list of servers is returned."""
|
93 |
response = self.myget('servers', self.user1) |
94 |
self.assertSuccess(response)
|
95 |
servers = json.loads(response.content)['servers']
|
96 |
db_server = self.vm1
|
97 |
server = servers[0]
|
98 |
self.assertEqual(server["name"], db_server.name) |
99 |
self.assertEqual(server["id"], db_server.id) |
100 |
|
101 |
def test_server_list_detail(self): |
102 |
"""Test if the servers list details are returned."""
|
103 |
user = self.user2
|
104 |
user_vms = {self.vm2.id: self.vm2, |
105 |
self.vm4.id: self.vm4} |
106 |
|
107 |
response = self.myget('servers/detail', user) |
108 |
servers = json.loads(response.content)['servers']
|
109 |
self.assertEqual(len(servers), len(user_vms)) |
110 |
for api_vm in servers: |
111 |
db_vm = user_vms[api_vm['id']]
|
112 |
self.assertEqual(api_vm['flavor']["id"], db_vm.flavor.id) |
113 |
self.assertEqual(api_vm['hostId'], db_vm.hostid) |
114 |
self.assertEqual(api_vm['id'], db_vm.id) |
115 |
self.assertEqual(api_vm['image']["id"], db_vm.imageid) |
116 |
self.assertEqual(api_vm['name'], db_vm.name) |
117 |
self.assertEqual(api_vm['status'], get_rsapi_state(db_vm)) |
118 |
self.assertSuccess(response)
|
119 |
|
120 |
def test_server_detail(self): |
121 |
"""Test if a server details are returned."""
|
122 |
db_vm = self.vm2
|
123 |
user = self.vm2.userid
|
124 |
net = mfactory.NetworkFactory() |
125 |
nic = mfactory.NetworkInterfaceFactory(machine=self.vm2, network=net,
|
126 |
ipv6="::babe")
|
127 |
|
128 |
db_vm_meta = mfactory.VirtualMachineMetadataFactory(vm=db_vm) |
129 |
|
130 |
response = self.myget('servers/%d' % db_vm.id, user) |
131 |
server = json.loads(response.content)['server']
|
132 |
|
133 |
self.assertEqual(server['flavor']["id"], db_vm.flavor.id) |
134 |
self.assertEqual(server['hostId'], db_vm.hostid) |
135 |
self.assertEqual(server['id'], db_vm.id) |
136 |
self.assertEqual(server['image']["id"], db_vm.imageid) |
137 |
self.assertEqual(server['name'], db_vm.name) |
138 |
self.assertEqual(server['status'], get_rsapi_state(db_vm)) |
139 |
api_nic = server['attachments'][0] |
140 |
self.assertEqual(api_nic['network_id'], str(net.id)) |
141 |
self.assertEqual(api_nic['mac_address'], nic.mac) |
142 |
self.assertEqual(api_nic['firewallProfile'], nic.firewall_profile) |
143 |
self.assertEqual(api_nic['ipv4'], nic.ipv4) |
144 |
self.assertEqual(api_nic['ipv6'], nic.ipv6) |
145 |
self.assertEqual(api_nic['id'], 'nic-%s-%s' % (db_vm.id, nic.index)) |
146 |
api_address = server["addresses"]
|
147 |
self.assertEqual(api_address[str(net.id)], |
148 |
[{"version": 4, "addr": nic.ipv4, "OS-EXT-IPS:type": "fixed"}, |
149 |
{"version": 6, "addr": nic.ipv6, "OS-EXT-IPS:type": "fixed"}]) |
150 |
|
151 |
metadata = server['metadata']
|
152 |
self.assertEqual(len(metadata), 1) |
153 |
self.assertEqual(metadata[db_vm_meta.meta_key], db_vm_meta.meta_value)
|
154 |
self.assertSuccess(response)
|
155 |
|
156 |
def test_server_building_nics(self): |
157 |
db_vm = self.vm2
|
158 |
user = self.vm2.userid
|
159 |
net1 = mfactory.NetworkFactory() |
160 |
net2 = mfactory.NetworkFactory() |
161 |
net3 = mfactory.NetworkFactory() |
162 |
mfactory.NetworkInterfaceFactory(machine=self.vm2, network=net1,
|
163 |
state="BUILDING")
|
164 |
nic2 = mfactory.NetworkInterfaceFactory(machine=self.vm2, network=net2,
|
165 |
state="ACTIVE")
|
166 |
mfactory.NetworkInterfaceFactory(machine=self.vm2, network=net3,
|
167 |
state="BUILDING")
|
168 |
|
169 |
response = self.myget('servers/%d' % db_vm.id, user) |
170 |
server = json.loads(response.content)['server']
|
171 |
nics = server["attachments"]
|
172 |
self.assertEqual(len(nics), 1) |
173 |
self.assertEqual(nics[0]["network_id"], str(nic2.network_id)) |
174 |
|
175 |
def test_noauthorized(self): |
176 |
"""Test 404 for detail of other user vm"""
|
177 |
db_vm = self.vm2
|
178 |
|
179 |
response = self.myget('servers/%d' % db_vm.id, 'wrong_user') |
180 |
self.assertItemNotFound(response)
|
181 |
|
182 |
def test_wrong_server(self): |
183 |
"""Test 404 response if server does not exist."""
|
184 |
response = self.myget('servers/%d' % 5000) |
185 |
self.assertItemNotFound(response)
|
186 |
|
187 |
def test_create_server_empty(self): |
188 |
"""Test if the create server call returns a 400 badRequest if
|
189 |
no attributes are specified."""
|
190 |
|
191 |
response = self.mypost('servers', params={}) |
192 |
self.assertBadRequest(response)
|
193 |
|
194 |
def test_rename_server(self): |
195 |
vm = self.vm2
|
196 |
request = {'server': {'name': 'new_name'}} |
197 |
response = self.myput('servers/%d' % vm.id, vm.userid, |
198 |
json.dumps(request), 'json')
|
199 |
self.assertSuccess(response)
|
200 |
self.assertEqual(VirtualMachine.objects.get(id=vm.id).name, "new_name") |
201 |
|
202 |
def test_catch_wrong_api_paths(self): |
203 |
response = self.myget('nonexistent') |
204 |
self.assertEqual(response.status_code, 400) |
205 |
try:
|
206 |
error = json.loads(response.content) |
207 |
except ValueError: |
208 |
self.assertTrue(False) |
209 |
|
210 |
def test_method_not_allowed(self, *args): |
211 |
# /servers/ allows only POST, GET
|
212 |
response = self.myput('servers', '', '') |
213 |
self.assertMethodNotAllowed(response)
|
214 |
response = self.mydelete('servers') |
215 |
self.assertMethodNotAllowed(response)
|
216 |
|
217 |
# /servers/<srvid>/ allows only GET, PUT, DELETE
|
218 |
response = self.mypost("servers/42") |
219 |
self.assertMethodNotAllowed(response)
|
220 |
|
221 |
# /imags/<srvid>/metadata/ allows only POST, GET
|
222 |
response = self.myput('servers/42/metadata', '', '') |
223 |
self.assertMethodNotAllowed(response)
|
224 |
response = self.mydelete('servers/42/metadata') |
225 |
self.assertMethodNotAllowed(response)
|
226 |
|
227 |
# /imags/<srvid>/metadata/ allows only POST, GET
|
228 |
response = self.myput('servers/42/metadata', '', '') |
229 |
self.assertMethodNotAllowed(response)
|
230 |
response = self.mydelete('servers/42/metadata') |
231 |
self.assertMethodNotAllowed(response)
|
232 |
|
233 |
# /imags/<srvid>/metadata/<key> allows only PUT, GET, DELETE
|
234 |
response = self.mypost('servers/42/metadata/foo') |
235 |
self.assertMethodNotAllowed(response)
|
236 |
|
237 |
|
238 |
fixed_image = Mock() |
239 |
fixed_image.return_value = {'location': 'pithos://foo', |
240 |
'checksum': '1234', |
241 |
"id": 1, |
242 |
"name": "test_image", |
243 |
'disk_format': 'diskdump'} |
244 |
|
245 |
|
246 |
@patch('synnefo.api.util.get_image', fixed_image) |
247 |
@patch('synnefo.logic.rapi_pool.GanetiRapiClient') |
248 |
class ServerCreateAPITest(ComputeAPITest): |
249 |
def setUp(self): |
250 |
self.flavor = mfactory.FlavorFactory()
|
251 |
# Create public network and backend
|
252 |
self.network = mfactory.NetworkFactory(public=True) |
253 |
self.backend = mfactory.BackendFactory()
|
254 |
mfactory.BackendNetworkFactory(network=self.network,
|
255 |
backend=self.backend,
|
256 |
operstate="ACTIVE")
|
257 |
self.request = {
|
258 |
"server": {
|
259 |
"name": "new-server-test", |
260 |
"userid": "test_user", |
261 |
"imageRef": 1, |
262 |
"flavorRef": self.flavor.id, |
263 |
"metadata": {
|
264 |
"My Server Name": "Apache1" |
265 |
}, |
266 |
"personality": []
|
267 |
} |
268 |
} |
269 |
|
270 |
def test_create_server(self, mrapi): |
271 |
"""Test if the create server call returns the expected response
|
272 |
if a valid request has been speficied."""
|
273 |
|
274 |
mrapi().CreateInstance.return_value = 12
|
275 |
with override_settings(settings, DEFAULT_INSTANCE_NETWORKS=[]):
|
276 |
with mocked_quotaholder():
|
277 |
response = self.mypost('/api/v1.1/servers', 'test_user', |
278 |
json.dumps(self.request), 'json') |
279 |
self.assertEqual(response.status_code, 202) |
280 |
mrapi().CreateInstance.assert_called_once() |
281 |
|
282 |
api_server = json.loads(response.content)['server']
|
283 |
self.assertEqual(api_server['status'], "BUILD") |
284 |
self.assertEqual(api_server['progress'], 0) |
285 |
self.assertEqual(api_server['metadata'], |
286 |
{"My Server Name": "Apache1"}) |
287 |
self.assertTrue('adminPass' in api_server) |
288 |
|
289 |
db_vm = VirtualMachine.objects.get(userid='test_user')
|
290 |
self.assertEqual(api_server['name'], db_vm.name) |
291 |
self.assertEqual(api_server['status'], db_vm.operstate) |
292 |
|
293 |
# Test drained flag in Network:
|
294 |
self.network.drained = True |
295 |
self.network.save()
|
296 |
with mocked_quotaholder():
|
297 |
response = self.mypost('servers', 'test_user', |
298 |
json.dumps(self.request), 'json') |
299 |
self.assertEqual(response.status_code, 503, "serviceUnavailable") |
300 |
|
301 |
def test_create_network_settings(self, mrapi): |
302 |
mrapi().CreateInstance.return_value = 12
|
303 |
bnet1 = mfactory.BackendNetworkFactory(operstate="ACTIVE",
|
304 |
backend=self.backend)
|
305 |
bnet2 = mfactory.BackendNetworkFactory(operstate="ACTIVE",
|
306 |
backend=self.backend)
|
307 |
bnet3 = mfactory.BackendNetworkFactory(network__userid="test_user",
|
308 |
operstate="ACTIVE",
|
309 |
backend=self.backend)
|
310 |
bnet4 = mfactory.BackendNetworkFactory(network__userid="test_user",
|
311 |
operstate="ACTIVE",
|
312 |
backend=self.backend)
|
313 |
# User requested private networks
|
314 |
request = deepcopy(self.request)
|
315 |
request["server"]["networks"] = [bnet3.network.id, bnet4.network.id] |
316 |
with override_settings(settings,
|
317 |
DEFAULT_INSTANCE_NETWORKS=["public", bnet1.network.id,
|
318 |
bnet2.network.id]): |
319 |
with mocked_quotaholder():
|
320 |
response = self.mypost('/api/v1.1/servers', 'test_user', |
321 |
json.dumps(request), 'json')
|
322 |
self.assertEqual(response.status_code, 202) |
323 |
name, args, kwargs = mrapi().CreateInstance.mock_calls[0]
|
324 |
self.assertEqual(len(kwargs["nics"]), 5) |
325 |
self.assertEqual(kwargs["nics"][0]["network"], |
326 |
self.network.backend_id)
|
327 |
self.assertEqual(kwargs["nics"][1]["network"], |
328 |
bnet1.network.backend_id) |
329 |
self.assertEqual(kwargs["nics"][2]["network"], |
330 |
bnet2.network.backend_id) |
331 |
self.assertEqual(kwargs["nics"][3]["network"], |
332 |
bnet3.network.backend_id) |
333 |
self.assertEqual(kwargs["nics"][4]["network"], |
334 |
bnet4.network.backend_id) |
335 |
|
336 |
with override_settings(settings,
|
337 |
DEFAULT_INSTANCE_NETWORKS=[bnet2.network.id]): |
338 |
with mocked_quotaholder():
|
339 |
response = self.mypost('/api/v1.1/servers', 'test_user', |
340 |
json.dumps(request), 'json')
|
341 |
self.assertEqual(response.status_code, 202) |
342 |
name, args, kwargs = mrapi().CreateInstance.mock_calls[1]
|
343 |
self.assertEqual(len(kwargs["nics"]), 3) |
344 |
self.assertEqual(kwargs["nics"][0]["network"], |
345 |
bnet2.network.backend_id) |
346 |
self.assertEqual(kwargs["nics"][1]["network"], |
347 |
bnet3.network.backend_id) |
348 |
self.assertEqual(kwargs["nics"][2]["network"], |
349 |
bnet4.network.backend_id) |
350 |
|
351 |
# test invalid network in DEFAULT_INSTANCE_NETWORKS
|
352 |
with override_settings(settings, DEFAULT_INSTANCE_NETWORKS=[42]): |
353 |
response = self.mypost('/api/v1.1/servers', 'test_user', |
354 |
json.dumps(request), 'json')
|
355 |
self.assertFault(response, 500, "internalServerError") |
356 |
|
357 |
# test connect to public netwok
|
358 |
request = deepcopy(self.request)
|
359 |
request["server"]["networks"] = [self.network.id] |
360 |
with override_settings(settings, DEFAULT_INSTANCE_NETWORKS=["public"]): |
361 |
response = self.mypost('/api/v1.1/servers', 'test_user', |
362 |
json.dumps(request), 'json')
|
363 |
self.assertFault(response, 403, "forbidden") |
364 |
# test wrong user
|
365 |
request = deepcopy(self.request)
|
366 |
request["server"]["networks"] = [bnet3.network.id] |
367 |
with override_settings(settings, DEFAULT_INSTANCE_NETWORKS=["public"]): |
368 |
with mocked_quotaholder():
|
369 |
response = self.mypost('/api/v1.1/servers', 'dummy_user', |
370 |
json.dumps(request), 'json')
|
371 |
self.assertItemNotFound(response)
|
372 |
|
373 |
def test_create_server_no_flavor(self, mrapi): |
374 |
request = deepcopy(self.request)
|
375 |
request["server"]["flavorRef"] = 42 |
376 |
with mocked_quotaholder():
|
377 |
response = self.mypost('/api/v1.1/servers', 'test_user', |
378 |
json.dumps(request), 'json')
|
379 |
self.assertItemNotFound(response)
|
380 |
|
381 |
|
382 |
@patch('synnefo.logic.rapi_pool.GanetiRapiClient') |
383 |
class ServerDestroyAPITest(ComputeAPITest): |
384 |
def test_delete_server(self, mrapi): |
385 |
vm = mfactory.VirtualMachineFactory() |
386 |
mrapi().DeleteInstance.return_value = 12
|
387 |
response = self.mydelete('/api/v1.1/servers/%d' % vm.id, vm.userid) |
388 |
self.assertEqual(response.status_code, 204) |
389 |
mrapi().DeleteInstance.assert_called_once() |
390 |
|
391 |
def test_non_existing_delete_server(self, mrapi): |
392 |
vm = mfactory.VirtualMachineFactory() |
393 |
response = self.mydelete('servers/%d' % 42, vm.userid) |
394 |
self.assertItemNotFound(response)
|
395 |
self.assertFalse(mrapi.mock_calls)
|
396 |
|
397 |
|
398 |
class ServerMetadataAPITest(ComputeAPITest): |
399 |
def setUp(self): |
400 |
self.vm = mfactory.VirtualMachineFactory()
|
401 |
self.metadata = mfactory.VirtualMachineMetadataFactory(vm=self.vm) |
402 |
super(ServerMetadataAPITest, self).setUp() |
403 |
|
404 |
def test_get_metadata(self): |
405 |
vm = self.vm
|
406 |
create_meta = lambda: mfactory.VirtualMachineMetadataFactory(vm=vm)
|
407 |
metadata = [create_meta(), create_meta(), create_meta()] |
408 |
response = self.myget('servers/%d/metadata' % vm.id, vm.userid) |
409 |
self.assertTrue(response.status_code in [200, 203]) |
410 |
api_metadata = json.loads(response.content)['metadata']
|
411 |
self.assertEqual(len(api_metadata), len(metadata) + 1) |
412 |
for db_m in metadata: |
413 |
self.assertEqual(api_metadata[db_m.meta_key], db_m.meta_value)
|
414 |
|
415 |
request = {'metadata':
|
416 |
{'foo': 'bar'}, |
417 |
metadata[0].meta_key: 'bar2' |
418 |
} |
419 |
response = self.mypost('servers/%d/metadata' % vm.id, |
420 |
vm.userid, json.dumps(request), 'json')
|
421 |
metadata2 = VirtualMachineMetadata.objects.filter(vm=vm) |
422 |
response = self.myget('servers/%d/metadata' % vm.id, vm.userid) |
423 |
self.assertTrue(response.status_code in [200, 203]) |
424 |
api_metadata2 = json.loads(response.content)['metadata']
|
425 |
self.assertTrue('foo' in api_metadata2.keys()) |
426 |
self.assertTrue(api_metadata2[metadata[0].meta_key], 'bar2') |
427 |
self.assertEqual(len(api_metadata2), len(metadata2)) |
428 |
for db_m in metadata2: |
429 |
self.assertEqual(api_metadata2[db_m.meta_key], db_m.meta_value)
|
430 |
|
431 |
# Create new meta
|
432 |
request = {'meta': {'foo2': 'bar2'}} |
433 |
response = self.myput('servers/%d/metadata/foo2' % vm.id, |
434 |
vm.userid, json.dumps(request), 'json')
|
435 |
|
436 |
# Get the new meta
|
437 |
response = self.myget('servers/%d/metadata/foo2' % vm.id, vm.userid) |
438 |
meta = json.loads(response.content)['meta']
|
439 |
self.assertEqual(meta['foo2'], 'bar2') |
440 |
|
441 |
# Delete the new meta
|
442 |
response = self.mydelete('servers/%d/metadata/foo2' % vm.id, vm.userid) |
443 |
self.assertEqual(response.status_code, 204) |
444 |
|
445 |
# Try to get the deleted meta: should raise 404
|
446 |
response = self.myget('servers/%d/metadata/foo2' % vm.id, vm.userid) |
447 |
self.assertEqual(response.status_code, 404) |
448 |
|
449 |
def test_invalid_metadata(self): |
450 |
vm = self.vm
|
451 |
response = self.mypost('servers/%d/metadata' % vm.id, vm.userid) |
452 |
self.assertBadRequest(response)
|
453 |
self.assertEqual(len(vm.metadata.all()), 1) |
454 |
|
455 |
def test_invalid_metadata_server(self): |
456 |
response = self.mypost('servers/42/metadata', 'user') |
457 |
self.assertItemNotFound(response)
|
458 |
|
459 |
def test_get_meta_invalid_key(self): |
460 |
vm = self.vm
|
461 |
response = self.myget('servers/%d/metadata/foo2' % vm.id, vm.userid) |
462 |
self.assertItemNotFound(response)
|
463 |
|
464 |
|
465 |
@patch('synnefo.api.util.get_image') |
466 |
@patch('synnefo.logic.rapi_pool.GanetiRapiClient') |
467 |
class ServerActionAPITest(ComputeAPITest): |
468 |
def test_actions(self, mrapi, mimage): |
469 |
actions = ['start', 'shutdown', 'reboot'] |
470 |
vm = mfactory.VirtualMachineFactory() |
471 |
vm.operstate = "STOPPED"
|
472 |
vm.save() |
473 |
mrapi().StartupInstance.return_value = 0
|
474 |
mrapi().ShutdownInstance.return_value = 1
|
475 |
mrapi().RebootInstance.return_value = 2
|
476 |
for jobId, action in enumerate(actions): |
477 |
if action in ["shutdown", "reboot"]: |
478 |
vm.operstate = "STARTED"
|
479 |
else:
|
480 |
vm.operstate = "STOPPED"
|
481 |
vm.task = None
|
482 |
vm.task_job_id = None
|
483 |
vm.save() |
484 |
val = {'type': 'HARD'} if action == 'reboot' else {} |
485 |
request = {action: val} |
486 |
response = self.mypost('servers/%d/action' % vm.id, |
487 |
vm.userid, json.dumps(request), 'json')
|
488 |
self.assertEqual(response.status_code, 202) |
489 |
if action == 'shutdown': |
490 |
self.assertEqual(VirtualMachine.objects.get(id=vm.id).task,
|
491 |
"STOP")
|
492 |
else:
|
493 |
self.assertEqual(VirtualMachine.objects.get(id=vm.id).task,
|
494 |
action.upper()) |
495 |
self.assertEqual(VirtualMachine.objects.get(id=vm.id).task_job_id,
|
496 |
jobId) |
497 |
|
498 |
def test_action_in_building_vm(self, mrapi, mimage): |
499 |
"""Test building in progress"""
|
500 |
vm = mfactory.VirtualMachineFactory(operstate="BUILD")
|
501 |
request = {'start': {}}
|
502 |
with mocked_quotaholder():
|
503 |
response = self.mypost('/api/v1.1/servers/%d/action' % vm.id, |
504 |
vm.userid, json.dumps(request), 'json')
|
505 |
self.assertEqual(response.status_code, 409) |
506 |
self.assertFalse(mrapi.mock_calls)
|
507 |
|
508 |
def test_destroy_build_vm(self, mrapi, mimage): |
509 |
"""Test building in progress"""
|
510 |
vm = mfactory.VirtualMachineFactory() |
511 |
mrapi().DeleteInstance.return_value = 2
|
512 |
response = self.mydelete('/api/v1.1/servers/%d' % vm.id, |
513 |
vm.userid) |
514 |
self.assertSuccess(response)
|
515 |
mrapi().RemoveInstance.assert_called_once() |
516 |
|
517 |
def test_firewall(self, mrapi, mimage): |
518 |
vm = mfactory.VirtualMachineFactory() |
519 |
vm.operstate = "STOPPED"
|
520 |
vm.save() |
521 |
request = {'firewallProfile': {'profile': 'PROTECTED'}} |
522 |
response = self.mypost('servers/%d/action' % vm.id, |
523 |
vm.userid, json.dumps(request), 'json')
|
524 |
self.assertEqual(response.status_code, 202) |
525 |
mrapi().ModifyInstance.assert_called_once() |
526 |
|
527 |
def test_unsupported_firewall(self, mrapi, mimage): |
528 |
vm = mfactory.VirtualMachineFactory() |
529 |
vm.operstate = "STOPPED"
|
530 |
vm.save() |
531 |
request = {'firewallProfile': {'profile': 'FOO'}} |
532 |
response = self.mypost('servers/%d/action' % vm.id, |
533 |
vm.userid, json.dumps(request), 'json')
|
534 |
self.assertBadRequest(response)
|
535 |
self.assertFalse(mrapi.mock_calls)
|
536 |
|
537 |
def test_resize_vm(self, mrapi, mimage): |
538 |
flavor = mfactory.FlavorFactory(cpu=1, ram=1024) |
539 |
# Check building VM
|
540 |
vm = self.get_vm(flavor=flavor, operstate="BUILD") |
541 |
request = {'resize': {'flavorRef': flavor.id}} |
542 |
response = self.post('/api/v1.1/servers/%d/action' % vm.id, |
543 |
vm.userid, json.dumps(request), 'json')
|
544 |
self.assertFault(response, 409, "buildInProgress") |
545 |
# Check same Flavor
|
546 |
vm = self.get_vm(flavor=flavor, operstate="STOPPED") |
547 |
request = {'resize': {'flavorRef': flavor.id}} |
548 |
response = self.post('/api/v1.1/servers/%d/action' % vm.id, |
549 |
vm.userid, json.dumps(request), 'json')
|
550 |
self.assertBadRequest(response)
|
551 |
# Check flavor with different disk
|
552 |
flavor2 = mfactory.FlavorFactory(disk=1024)
|
553 |
flavor3 = mfactory.FlavorFactory(disk=2048)
|
554 |
vm = self.get_vm(flavor=flavor2, operstate="STOPPED") |
555 |
request = {'resize': {'flavorRef': flavor3.id}} |
556 |
response = self.post('/api/v1.1/servers/%d/action' % vm.id, |
557 |
vm.userid, json.dumps(request), 'json')
|
558 |
self.assertBadRequest(response)
|
559 |
flavor2 = mfactory.FlavorFactory(disk_template="foo")
|
560 |
flavor3 = mfactory.FlavorFactory(disk_template="baz")
|
561 |
vm = self.get_vm(flavor=flavor2, operstate="STOPPED") |
562 |
request = {'resize': {'flavorRef': flavor3.id}} |
563 |
response = self.post('/api/v1.1/servers/%d/action' % vm.id, |
564 |
vm.userid, json.dumps(request), 'json')
|
565 |
self.assertBadRequest(response)
|
566 |
# Check success
|
567 |
vm = self.get_vm(flavor=flavor, operstate="STOPPED") |
568 |
flavor4 = mfactory.FlavorFactory(disk_template=flavor.disk_template, |
569 |
disk=flavor.disk, |
570 |
cpu=4, ram=2048) |
571 |
request = {'resize': {'flavorRef': flavor4.id}} |
572 |
mrapi().ModifyInstance.return_value = 42
|
573 |
response = self.post('/api/v1.1/servers/%d/action' % vm.id, |
574 |
vm.userid, json.dumps(request), 'json')
|
575 |
self.assertEqual(response.status_code, 202) |
576 |
vm = VirtualMachine.objects.get(id=vm.id) |
577 |
self.assertEqual(vm.task_job_id, 42) |
578 |
name, args, kwargs = mrapi().ModifyInstance.mock_calls[0]
|
579 |
self.assertEqual(kwargs["beparams"]["vcpus"], 4) |
580 |
self.assertEqual(kwargs["beparams"]["minmem"], 2048) |
581 |
self.assertEqual(kwargs["beparams"]["maxmem"], 2048) |
582 |
|
583 |
def test_action_on_resizing_vm(self, mrapi, mimage): |
584 |
vm = mfactory.VirtualMachineFactory() |
585 |
vm.operstate = "RESIZE"
|
586 |
vm.save() |
587 |
for action in VirtualMachine.ACTIONS: |
588 |
request = {action[0]: ""} |
589 |
response = self.post('/api/v1.1/servers/%d/action' % vm.id, |
590 |
vm.userid, json.dumps(request), 'json')
|
591 |
self.assertBadRequest(response)
|
592 |
# however you can destroy
|
593 |
mrapi().DeleteInstance.return_value = 42
|
594 |
response = self.delete('/api/v1.1/servers/%d' % vm.id, |
595 |
vm.userid) |
596 |
self.assertSuccess(response)
|
597 |
|
598 |
def get_vm(self, flavor, operstate): |
599 |
vm = mfactory.VirtualMachineFactory(flavor=flavor) |
600 |
vm.operstate = operstate |
601 |
vm.backendjobstatus = "success"
|
602 |
vm.save() |
603 |
return vm
|
604 |
|
605 |
|
606 |
class ServerVNCConsole(ComputeAPITest): |
607 |
def test_not_active_server(self): |
608 |
"""Test console req for not ACTIVE server returns badRequest"""
|
609 |
vm = mfactory.VirtualMachineFactory(operstate="BUILD")
|
610 |
data = json.dumps({'console': {'type': 'vnc'}}) |
611 |
response = self.mypost('servers/%d/action' % vm.id, |
612 |
vm.userid, data, 'json')
|
613 |
self.assertBadRequest(response)
|
614 |
|
615 |
def test_active_server(self): |
616 |
"""Test console req for ACTIVE server"""
|
617 |
vm = mfactory.VirtualMachineFactory() |
618 |
vm.operstate = 'STARTED'
|
619 |
vm.save() |
620 |
|
621 |
data = json.dumps({'console': {'type': 'vnc'}}) |
622 |
with override_settings(settings, TEST=True): |
623 |
response = self.mypost('/api/v1.1/servers/%d/action' % vm.id, |
624 |
vm.userid, data, 'json')
|
625 |
self.assertEqual(response.status_code, 200) |
626 |
reply = json.loads(response.content) |
627 |
self.assertEqual(reply.keys(), ['console']) |
628 |
console = reply['console']
|
629 |
self.assertEqual(console['type'], 'vnc') |
630 |
self.assertEqual(set(console.keys()), |
631 |
set(['type', 'host', 'port', 'password'])) |
632 |
|
633 |
def test_wrong_console_type(self): |
634 |
"""Test console req for ACTIVE server"""
|
635 |
vm = mfactory.VirtualMachineFactory() |
636 |
vm.operstate = 'STARTED'
|
637 |
vm.save() |
638 |
|
639 |
data = json.dumps({'console': {'type': 'foo'}}) |
640 |
response = self.mypost('servers/%d/action' % vm.id, |
641 |
vm.userid, data, 'json')
|
642 |
self.assertBadRequest(response)
|