-
-tempest.scenario.test_network_basic_ops.TestNetworkBasicOps.test_port_security_macspoofing_port
- [Tags] skip_if_transparent skip_if_stable/mitaka
- # Failing due to default security rules behavior missing in Mitaka, and also in all transparent runs
- ${TEST_NAME} ${blacklist_file} ${tempest_config_file}
-
-*** Keywords ***
-Log In To Tempest Executor And Setup Test Environment
- [Documentation] Initialize SetupUtils, open SSH connection to a devstack system and source the openstack
- ... credentials needed to run the tempest tests. The (sometimes empty) tempest blacklist file will be created
- ... and pushed to the tempest executor.
- Create Blacklist File
- SetupUtils.Setup_Utils_For_Setup_And_Teardown
- # source_pwd is expected to exist in the below Create Network, Create Subnet keywords. Might be a bug.
- ${source_pwd} Set Variable yes
- Set Suite Variable ${source_pwd}
- # Tempest tests need an existing external network in order to create routers.
- : FOR ${feature_name} IN @{legacy_feature_list}
- \ ${feature_check_status}= Run Keyword And Return Status Verify Feature Is Installed ${feature_name}
- \ Exit For Loop If '${feature_check_status}' == 'True'
- Run Keyword If '${feature_check_status}' == 'True' Create Network ${external_net_name} --router:external --provider:network_type=flat --provider:physical_network=${external_physical_network}
- ... ELSE Create Network ${external_net_name} --router:external --provider:network_type=vlan --provider:physical_network=${PUBLIC_PHYSICAL_NETWORK} --provider:segmentation_id=${network_vlan_id}
- Create Subnet ${external_net_name} ${external_subnet_name} ${external_subnet} --gateway ${external_gateway} --allocation-pool ${external_subnet_allocation_pool}
- List Networks
- ${control_node_conn_id}= SSHLibrary.Open Connection ${OS_CONTROL_NODE_IP} prompt=${DEFAULT_LINUX_PROMPT_STRICT}
- Utils.Flexible SSH Login ${OS_USER}
- Write Commands Until Prompt source ${DEVSTACK_DEPLOY_PATH}/openrc admin admin
- Write Commands Until Prompt sudo rm -rf /opt/stack/tempest/.testrepository
- ${net_id}= Get Net Id ${external_net_name} ${control_node_conn_id}
- Tempest Conf Add External Network ${net_id}
-
-Tempest Conf Add External Network
- [Arguments] ${external_network_id}
- [Documentation] Tempest will be run with a config file - this function will add the
- ... given external network ID to the configuration file.
- Modify Config In File On Existing SSH Connection ${tempest_config_file} set network public_network_id ${external_network_id}
- Modify Config In File On Existing SSH Connection ${tempest_config_file} set DEFAULT debug False
- Modify Config In File On Existing SSH Connection ${tempest_config_file} set DEFAULT log_level INFO
- Write Commands Until Prompt sudo cat ${tempest_config_file}
- Write Commands Until Prompt sudo chmod 777 ${tempest_config_file}
-
-Modify Config In File On Existing SSH Connection
- [Arguments] ${config_file} ${modifier} ${config_section} ${config_key} ${config_value}=${EMPTY}
- [Documentation] uses crudini to populate oslo cofg file.
- # this keyword is only one line so seems like extra overhead, but this may be a good candidate to move
- # to a library at some point, when/if other suites need to use it, so wanted to make it generic.
- Write Commands Until Prompt sudo -E crudini --${modifier} ${config_file} ${config_section} ${config_key} ${config_value}
-
-Clean Up After Running Tempest
- [Documentation] Clean up any extra leftovers that were created to allow tempest tests to run.
- Delete Network ${external_net_name}
- List Networks
- Close All Connections
-
-Create Blacklist File
- [Documentation] For each exclusion regex in the required @{${OPENSTACK_BRANCH}_exclusion_regexes} list a new
- ... line will be created in the required ${blacklist_file} location. This file is pushed to the OS_CONTROL_NODE
- ... which is assumed to be the tempest executor.
- Create File ${blacklist_file}
- : FOR ${exclusion} IN @{${OPENSTACK_BRANCH}_exclusion_regexes}
- \ Append To File ${blacklist_file} ${exclusion}\n
- Log File ${blacklist_file}
- SSHKeywords.Copy File To Remote System ${OS_CONTROL_NODE_IP} ${blacklist_file} ${blacklist_file}