From 2bc7367cc90b44d4ba2fa12983c6dcf6661e587b Mon Sep 17 00:00:00 2001 From: Slawek Kaplonski Date: Tue, 27 Oct 2020 13:06:08 +0100 Subject: [PATCH] [Scenario] New test to check extra_dhcp_opts This patch adds new scenario test which spawns vm attached to the neutron port with specified extra_dhcp_opts and then asserts that option was correctly passed and configured inside guest VM. Change-Id: I16a4ce814b9de9fe8e1bb736d28c048f04e5a5d3 --- neutron_tempest_plugin/scenario/test_dhcp.py | 94 ++++++++++++++++++++ 1 file changed, 94 insertions(+) create mode 100644 neutron_tempest_plugin/scenario/test_dhcp.py diff --git a/neutron_tempest_plugin/scenario/test_dhcp.py b/neutron_tempest_plugin/scenario/test_dhcp.py new file mode 100644 index 00000000..b95eaa28 --- /dev/null +++ b/neutron_tempest_plugin/scenario/test_dhcp.py @@ -0,0 +1,94 @@ +# All Rights Reserved. +# +# Licensed under the Apache License, Version 2.0 (the "License"); you may +# not use this file except in compliance with the License. You may obtain +# a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT +# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the +# License for the specific language governing permissions and limitations +# under the License. +from oslo_log import log +from paramiko import ssh_exception as ssh_exc +from tempest.common import utils +from tempest.lib.common.utils import data_utils +from tempest.lib import decorators +from tempest.lib import exceptions as lib_exc + +from neutron_tempest_plugin.common import ssh +from neutron_tempest_plugin import config +from neutron_tempest_plugin.scenario import base + +CONF = config.CONF +LOG = log.getLogger(__name__) + + +class DHCPTest(base.BaseTempestTestCase): + + credentials = ['primary', 'admin'] + force_tenant_isolation = False + + @classmethod + def resource_setup(cls): + super(DHCPTest, cls).resource_setup() + cls.rand_name = data_utils.rand_name( + cls.__name__.rsplit('.', 1)[-1]) + cls.network = cls.create_network(name=cls.rand_name) + cls.subnet = cls.create_subnet( + network=cls.network, name=cls.rand_name) + cls.router = cls.create_router_by_client() + cls.create_router_interface(cls.router['id'], cls.subnet['id']) + cls.keypair = cls.create_keypair(name=cls.rand_name) + cls.security_group = cls.create_security_group(name=cls.rand_name) + cls.create_loginable_secgroup_rule(cls.security_group['id']) + + @utils.requires_ext(extension='extra_dhcp_opt', service='network') + @decorators.idempotent_id('58f7c094-1980-4e03-b0d3-6c4dd27217b1') + def test_extra_dhcp_opts(self): + """This test case tests DHCP extra options configured for Neutron port. + + Test is checking just extra option "15" which is domain-name + according to the RFC 2132: + https://tools.ietf.org/html/rfc2132#section-5.3 + + To test that option, there is spawned VM connected to the port with + configured extra_dhcp_opts and test asserts that search domain name is + configured inside VM in /etc/resolv.conf file + """ + + test_domain = "test.domain" + extra_dhcp_opts = [ + {'opt_name': 'domain-name', + 'opt_value': '"%s"' % test_domain}] + port = self.create_port( + network=self.network, name=self.rand_name, + security_groups=[self.security_group['id']], + extra_dhcp_opts=extra_dhcp_opts) + floating_ip = self.create_floatingip(port=port) + + server = self.create_server( + flavor_ref=CONF.compute.flavor_ref, + image_ref=CONF.compute.image_ref, + key_name=self.keypair['name'], + networks=[{'port': port['id']}]) + self.wait_for_server_active(server['server']) + self.wait_for_guest_os_ready(server['server']) + + try: + ssh_client = ssh.Client( + floating_ip['floating_ip_address'], + CONF.validation.image_ssh_user, + pkey=self.keypair['private_key']) + vm_resolv_conf = ssh_client.exec_command( + "cat /etc/resolv.conf") + self.assertIn(test_domain, vm_resolv_conf) + except (lib_exc.SSHTimeout, + ssh_exc.AuthenticationException, + AssertionError) as error: + LOG.debug(error) + self._log_console_output([server]) + self._log_local_network_status() + raise