mirror of https://github.com/apache/cloudstack.git
Adding tags that identify deployment configurations against test cases
* advanced - Advanced Zone only * basic - basic zone without SecurityGroups * sg - basic zone with security groups * eip - basic zone with EIP/ELB * advancedns - Advanced Zone with NetScalers
This commit is contained in:
parent
ed35cba899
commit
a1416c82f0
|
|
@ -137,6 +137,8 @@ class TestAccounts(cloudstackTestCase):
|
|||
def test_01_create_account(self):
|
||||
"""Test Create Account and user for that account
|
||||
"""
|
||||
|
||||
tags = ["advanced", "basic", "eip", "advancedns", "sg"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Create an Account. Verify the account is created.
|
||||
|
|
@ -270,6 +272,8 @@ class TestRemoveUserFromAccount(cloudstackTestCase):
|
|||
def test_01_user_remove_VM_running(self):
|
||||
"""Test Remove one user from the account
|
||||
"""
|
||||
|
||||
tags = ["advanced", "basic", "eip", "advancedns", "sg"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Create an account with 2 users.
|
||||
|
|
@ -369,6 +373,8 @@ class TestRemoveUserFromAccount(cloudstackTestCase):
|
|||
def test_02_remove_all_users(self):
|
||||
"""Test Remove both users from the account
|
||||
"""
|
||||
|
||||
tags = ["advanced", "basic", "eip", "advancedns", "sg"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Remove both the users from the account.
|
||||
|
|
@ -525,6 +531,8 @@ class TestNonRootAdminsPrivileges(cloudstackTestCase):
|
|||
|
||||
def test_01_non_root_admin_Privileges(self):
|
||||
"""Test to verify Non Root admin previleges"""
|
||||
|
||||
tags = ["advanced", "basic", "eip", "advancedns", "sg"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Create few accounts/users in ROOT domain
|
||||
|
|
@ -642,6 +650,8 @@ class TestServiceOfferingSiblings(cloudstackTestCase):
|
|||
|
||||
def test_01_service_offering_siblings(self):
|
||||
"""Test to verify service offerings at same level in hierarchy"""
|
||||
|
||||
tags = ["advanced", "basic", "eip", "advancedns", "sg"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Verify service offering is visible for domain_1
|
||||
|
|
@ -755,6 +765,8 @@ class TestServiceOfferingHierarchy(cloudstackTestCase):
|
|||
|
||||
def test_01_service_offering_hierarchy(self):
|
||||
"""Test to verify service offerings at same level in hierarchy"""
|
||||
|
||||
tags = ["advanced", "basic", "eip", "advancedns", "sg"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Verify service offering is visible for domain_1
|
||||
|
|
@ -884,6 +896,8 @@ class TesttemplateHierarchy(cloudstackTestCase):
|
|||
|
||||
def test_01_template_hierarchy(self):
|
||||
"""Test to verify template at same level in hierarchy"""
|
||||
|
||||
tags = ["advanced", "basic", "eip", "advancedns", "sg"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Verify template is visible for domain_1
|
||||
|
|
@ -1043,6 +1057,8 @@ class TestAddVmToSubDomain(cloudstackTestCase):
|
|||
def test_01_add_vm_to_subdomain(self):
|
||||
""" Test Sub domain allowed to launch VM when a Domain level zone is
|
||||
created"""
|
||||
|
||||
tags = ["advanced", "basic", "eip", "advancedns", "sg"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Verify VM created by Account_1 is in Running state
|
||||
|
|
|
|||
|
|
@ -182,6 +182,8 @@ class TestSnapshots(cloudstackTestCase):
|
|||
"""TS_BUG_001-Test Creating snapshot from volume having spaces in name(KVM)
|
||||
"""
|
||||
|
||||
tags = ["advanced", "advancedns"]
|
||||
|
||||
# Validate the following
|
||||
#1. Create a virtual machine and data volume
|
||||
#2. Attach data volume to VM
|
||||
|
|
@ -451,6 +453,8 @@ class TestTemplate(cloudstackTestCase):
|
|||
def test_01_create_template(self):
|
||||
"""TS_BUG_002-Test to create and deploy VM using password enabled template
|
||||
"""
|
||||
|
||||
tags = ["advanced", "advancedns", "basic", "sg"]
|
||||
|
||||
# Validate the following:
|
||||
#1. Create a password enabled template
|
||||
|
|
@ -593,6 +597,8 @@ class TestNATRules(cloudstackTestCase):
|
|||
|
||||
def test_01_firewall_rules_port_fw(self):
|
||||
""""Checking firewall rules deletion after static NAT disable"""
|
||||
|
||||
tags = ["advanced"]
|
||||
|
||||
# Validate the following:
|
||||
#1. Enable static NAT for a VM
|
||||
|
|
@ -793,6 +799,8 @@ class TestRouters(cloudstackTestCase):
|
|||
def test_01_list_routers_admin(self):
|
||||
"""TS_BUG_007-Check listRouters() using Admin User
|
||||
"""
|
||||
|
||||
tags = ["advanced", "advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. PreReq: have rounters that are owned by other account
|
||||
|
|
@ -902,6 +910,8 @@ class TestRouterRestart(cloudstackTestCase):
|
|||
def test_01_restart_network_cleanup(self):
|
||||
"""TS_BUG_008-Test restart network
|
||||
"""
|
||||
|
||||
tags = ["advanced", "basic", "sg", "advancedns", "eip"]
|
||||
|
||||
# Validate the following
|
||||
# 1. When cleanup = true, router is destroyed and a new one created
|
||||
|
|
@ -1061,6 +1071,8 @@ class TestTemplates(cloudstackTestCase):
|
|||
def test_01_check_template_size(self):
|
||||
"""TS_BUG_009-Test the size of template created from root disk
|
||||
"""
|
||||
|
||||
tags = ["advanced", "advancedns", "basic", "sg", "eip"]
|
||||
|
||||
# Validate the following:
|
||||
# 1. Deploy new VM using the template created from Volume
|
||||
|
|
@ -1086,6 +1098,8 @@ class TestTemplates(cloudstackTestCase):
|
|||
def test_02_check_size_snapshotTemplate(self):
|
||||
"""TS_BUG_010-Test check size of snapshot and template
|
||||
"""
|
||||
|
||||
tags = ["advanced", "advancedns", "basic", "sg", "eip"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Deploy VM using default template, small service offering
|
||||
|
|
@ -1164,6 +1178,8 @@ class TestTemplates(cloudstackTestCase):
|
|||
def test_03_resuse_template_name(self):
|
||||
"""TS_BUG_011-Test Reusing deleted template name
|
||||
"""
|
||||
|
||||
tags = ["advanced", "advancedns", "basic", "sg", "eip"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Deploy VM using default template, small service offering
|
||||
|
|
|
|||
|
|
@ -194,6 +194,8 @@ class TestDefaultSecurityGroupEgress(cloudstackTestCase):
|
|||
def test_deployVM_InDefaultSecurityGroup(self):
|
||||
"""Test deploy VM in default security group with no egress rules
|
||||
"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following:
|
||||
# 1. Deploy a VM.
|
||||
|
|
@ -349,6 +351,8 @@ class TestAuthorizeIngressRule(cloudstackTestCase):
|
|||
def test_authorizeIngressRule(self):
|
||||
"""Test authorize ingress rule
|
||||
"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following:
|
||||
# 1. createaccount of type user
|
||||
|
|
@ -505,6 +509,8 @@ class TestDefaultGroupEgress(cloudstackTestCase):
|
|||
def test_01_default_group_with_egress(self):
|
||||
"""Test default group with egress rule before VM deploy and ping, ssh
|
||||
"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following:
|
||||
# 1. createaccount of type user
|
||||
|
|
@ -705,6 +711,8 @@ class TestDefaultGroupEgressAfterDeploy(cloudstackTestCase):
|
|||
""" Test default group with egress rule added after vm deploy and ping,
|
||||
ssh test
|
||||
"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following:
|
||||
# 1. createaccount of type user
|
||||
|
|
@ -885,6 +893,8 @@ class TestRevokeEgressRule(cloudstackTestCase):
|
|||
def test_revoke_egress_rule(self):
|
||||
"""Test revoke security group egress rule
|
||||
"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following:
|
||||
# 1. createaccount of type user
|
||||
|
|
@ -1145,6 +1155,8 @@ class TestInvalidAccountAuthroize(cloudstackTestCase):
|
|||
def test_invalid_account_authroize(self):
|
||||
"""Test invalid account authroize
|
||||
"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following:
|
||||
# 1. createaccount of type user
|
||||
|
|
@ -1271,6 +1283,8 @@ class TestMultipleAccountsEgressRuleNeg(cloudstackTestCase):
|
|||
def test_multiple_account_egress_rule_negative(self):
|
||||
"""Test multiple account egress rules negative case
|
||||
"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following:
|
||||
# 1. createaccount of type user A
|
||||
|
|
@ -1517,6 +1531,8 @@ class TestMultipleAccountsEgressRule(cloudstackTestCase):
|
|||
def test_multiple_account_egress_rule_positive(self):
|
||||
"""Test multiple account egress rules positive case
|
||||
"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following:
|
||||
# 1. createaccount of type user A
|
||||
|
|
@ -1806,6 +1822,8 @@ class TestStartStopVMWithEgressRule(cloudstackTestCase):
|
|||
def test_start_stop_vm_egress(self):
|
||||
""" Test stop start Vm with egress rules
|
||||
"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following:
|
||||
# 1. createaccount of type user
|
||||
|
|
@ -2015,6 +2033,8 @@ class TestInvalidParametersForEgress(cloudstackTestCase):
|
|||
def test_invalid_parameters(self):
|
||||
""" Test invalid parameters for egress rules
|
||||
"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following:
|
||||
# 1. createUserAccount
|
||||
|
|
@ -2200,6 +2220,8 @@ class TestEgressAfterHostMaintainance(cloudstackTestCase):
|
|||
def test_egress_after_host_maintainance(self):
|
||||
"""Test maintenance case for egress
|
||||
"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following:
|
||||
# 1. createaccount of type user
|
||||
|
|
|
|||
|
|
@ -180,6 +180,8 @@ class TestEIP(cloudstackTestCase):
|
|||
def test_01_eip_by_deploying_instance(self):
|
||||
"""Test EIP by deploying an instance
|
||||
"""
|
||||
|
||||
tags = ["eip"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Instance gets an IP from GUEST IP range.
|
||||
|
|
@ -345,6 +347,8 @@ class TestEIP(cloudstackTestCase):
|
|||
def test_02_acquire_ip_enable_static_nat(self):
|
||||
"""Test associate new IP and enable static NAT for new IP and the VM
|
||||
"""
|
||||
|
||||
tags = ["eip"]
|
||||
|
||||
# Validate the following
|
||||
# 1. user_ip_address.is_system = 0 & user_ip_address.one_to_one_nat=1
|
||||
|
|
@ -487,6 +491,8 @@ class TestEIP(cloudstackTestCase):
|
|||
def test_03_disable_static_nat(self):
|
||||
"""Test disable static NAT and release EIP acquired
|
||||
"""
|
||||
|
||||
tags = ["eip"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Disable static NAT. Disables one-to-one NAT and releases EIP
|
||||
|
|
@ -684,6 +690,8 @@ class TestEIP(cloudstackTestCase):
|
|||
def test_04_disable_static_nat_system(self):
|
||||
"""Test disable static NAT with system = True
|
||||
"""
|
||||
|
||||
tags = ["eip"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Try to disassociate/disable static NAT on EIP where is_system=1
|
||||
|
|
@ -751,6 +759,8 @@ class TestEIP(cloudstackTestCase):
|
|||
def test_05_destroy_instance(self):
|
||||
"""Test EIO after destroying instance
|
||||
"""
|
||||
|
||||
tags = ["eip"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Destroy instance. Destroy should result in is_system=0 for EIP
|
||||
|
|
@ -987,6 +997,8 @@ class TestELB(cloudstackTestCase):
|
|||
def test_01_elb_create(self):
|
||||
"""Test ELB by creating a LB rule
|
||||
"""
|
||||
|
||||
tags = ["eip"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Deploy 2 instances
|
||||
|
|
@ -1158,6 +1170,8 @@ class TestELB(cloudstackTestCase):
|
|||
def test_02_elb_acquire_and_create(self):
|
||||
"""Test ELB by acquiring IP and then creating a LB rule
|
||||
"""
|
||||
|
||||
tags = ["eip"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Deploy 2 instances
|
||||
|
|
@ -1304,6 +1318,8 @@ class TestELB(cloudstackTestCase):
|
|||
def test_03_elb_delete_lb_system(self):
|
||||
"""Test delete LB rule generated with public IP with is_system = 1
|
||||
"""
|
||||
|
||||
tags = ["eip"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Deleting LB rule should release EIP where is_system=1
|
||||
|
|
@ -1406,6 +1422,8 @@ class TestELB(cloudstackTestCase):
|
|||
def test_04_delete_lb_on_eip(self):
|
||||
"""Test delete LB rule generated on EIP
|
||||
"""
|
||||
|
||||
tags = ["eip"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Deleting LB rule won't release EIP where is_system=0
|
||||
|
|
|
|||
|
|
@ -172,6 +172,8 @@ class TestHighAvailability(cloudstackTestCase):
|
|||
def test_01_host_maintenance_mode(self):
|
||||
"""Test host maintenance mode
|
||||
"""
|
||||
|
||||
tags = ["advanced", "advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Create Vms. Acquire IP. Create port forwarding & load balancing
|
||||
|
|
@ -561,6 +563,8 @@ class TestHighAvailability(cloudstackTestCase):
|
|||
def test_02_host_maintenance_mode_with_activities(self):
|
||||
"""Test host maintenance mode with activities
|
||||
"""
|
||||
|
||||
tags = ["advanced", "advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Create Vms. Acquire IP. Create port forwarding & load balancing
|
||||
|
|
|
|||
|
|
@ -224,6 +224,8 @@ class TestLbSourceNat(cloudstackTestCase):
|
|||
def test_add_lb_on_source_nat(self):
|
||||
"""Test Create LB rule for sourceNat IP address
|
||||
"""
|
||||
|
||||
tags = ["advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Deploy the first VM using a network from the above created
|
||||
|
|
@ -431,6 +433,8 @@ class TestLbOnIpWithPf(cloudstackTestCase):
|
|||
def test_lb_on_ip_with_pf(self):
|
||||
"""Test Create LB rule for sourceNat IP address
|
||||
"""
|
||||
|
||||
tags = ["advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Deploy the first VM using a network from the above created
|
||||
|
|
@ -640,6 +644,8 @@ class TestPfOnIpWithLb(cloudstackTestCase):
|
|||
def test_pf_on_ip_with_lb(self):
|
||||
"""Test Create a port forwarding rule on an Ip address that already has a LB rule.
|
||||
"""
|
||||
|
||||
tags = ["advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Deploy the first VM using a network from the above created
|
||||
|
|
@ -850,6 +856,8 @@ class TestLbOnNonSourceNat(cloudstackTestCase):
|
|||
def test_lb_on_non_source_nat(self):
|
||||
"""Test Create LB rule for non-sourceNat IP address
|
||||
"""
|
||||
|
||||
tags = ["advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Deploy the first VM using a network from the above created
|
||||
|
|
@ -1063,6 +1071,8 @@ class TestAddMultipleVmsLb(cloudstackTestCase):
|
|||
def test_add_multiple_vms_lb(self):
|
||||
"""Test Add multiple Vms to an existing LB rule.
|
||||
"""
|
||||
|
||||
tags = ["advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Deploy the first VM using a network from the above created
|
||||
|
|
@ -1339,6 +1349,8 @@ class TestMultipleLbRules(cloudstackTestCase):
|
|||
def test_multiple_lb_publicip(self):
|
||||
"""Test Create multiple LB rules using different public Ips acquired
|
||||
"""
|
||||
|
||||
tags = ["advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Deploy the first VM using a network from the above created
|
||||
|
|
@ -1653,6 +1665,8 @@ class TestMultipleLbRulesSameIp(cloudstackTestCase):
|
|||
def test_multiple_lb_same_publicip(self):
|
||||
"""Test Create multiple LB rules using same public Ips on diff ports
|
||||
"""
|
||||
|
||||
tags = ["advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Deploy the first VM using a network from the above created
|
||||
|
|
@ -2008,6 +2022,8 @@ class TestLoadBalancingRule(cloudstackTestCase):
|
|||
def test_01_edit_name_lb_rule(self):
|
||||
"""Test edit name of LB rule
|
||||
"""
|
||||
|
||||
tags = ["advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Create an Lb rule for couple of Vms .
|
||||
|
|
@ -2040,6 +2056,8 @@ class TestLoadBalancingRule(cloudstackTestCase):
|
|||
def test_02_edit_lb_ports(self):
|
||||
"""Test edit public port of LB rule
|
||||
"""
|
||||
|
||||
tags = ["advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Create an Lb rule for couple of Vms .
|
||||
|
|
@ -2060,6 +2078,8 @@ class TestLoadBalancingRule(cloudstackTestCase):
|
|||
def test_03_delete_lb_rule(self):
|
||||
"""Test delete LB rule
|
||||
"""
|
||||
|
||||
tags = ["advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Delete existing load balancing rule
|
||||
|
|
@ -2224,6 +2244,8 @@ class TestDeleteCreateLBRule(cloudstackTestCase):
|
|||
|
||||
def test_01_create_with_same_public_port(self):
|
||||
"""Test create LB rule with same public port after deleting rule"""
|
||||
|
||||
tags = ["advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Delete existing rule and create exactly same rule with different
|
||||
|
|
@ -2383,6 +2405,8 @@ class TestVmWithLb(cloudstackTestCase):
|
|||
|
||||
def test_01_delete_public_ip(self):
|
||||
"""Test delete one public Ip with LB rules"""
|
||||
|
||||
tags = ["advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Associate 2 public Ips and create load balancing rules in it
|
||||
|
|
@ -2450,6 +2474,8 @@ class TestVmWithLb(cloudstackTestCase):
|
|||
|
||||
def test_02_stop_user_vm(self):
|
||||
"""Test stop user VM with LB"""
|
||||
|
||||
tags = ["advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Create 2 instances and add these two for load balancing
|
||||
|
|
@ -2528,6 +2554,8 @@ class TestVmWithLb(cloudstackTestCase):
|
|||
|
||||
def test_03_start_user_vm(self):
|
||||
"""Test start user VM with LB"""
|
||||
|
||||
tags = ["advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Create 2 instances and add these two for load balancing
|
||||
|
|
@ -2597,6 +2625,8 @@ class TestVmWithLb(cloudstackTestCase):
|
|||
|
||||
def test_04_migrate_user_vm(self):
|
||||
"""Test migrate user VM with LB"""
|
||||
|
||||
tags = ["advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Create 2 instances and add these two for load balancing
|
||||
|
|
@ -2708,6 +2738,8 @@ class TestVmWithLb(cloudstackTestCase):
|
|||
|
||||
def test_05_reboot_user_vm(self):
|
||||
"""Test reboot user VM with LB"""
|
||||
|
||||
tags = ["advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Create 2 instances and add these two for load balancing
|
||||
|
|
@ -2776,6 +2808,8 @@ class TestVmWithLb(cloudstackTestCase):
|
|||
|
||||
def test_06_destroy_user_vm(self):
|
||||
"""Test destroy user VM with LB"""
|
||||
|
||||
tags = ["advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Create 2 instances and add these two for load balancing
|
||||
|
|
@ -2857,6 +2891,8 @@ class TestVmWithLb(cloudstackTestCase):
|
|||
|
||||
def test_07_delete_all_public_ip(self):
|
||||
"""Test delete all public Ip with LB rules"""
|
||||
|
||||
tags = ["advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Associate 2 public Ips and create load balancing rules in it
|
||||
|
|
|
|||
|
|
@ -205,6 +205,8 @@ class TestAddMultipleNetScaler(cloudstackTestCase):
|
|||
def test_add_netscaler_device(self):
|
||||
"""Test add netscaler device
|
||||
"""
|
||||
|
||||
tags = ["advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Add multiple instances of netscaler
|
||||
|
|
@ -361,6 +363,8 @@ class TestAddMultipleNSDiffZone(cloudstackTestCase):
|
|||
def test_add_mul_netscaler_diff_zone(self):
|
||||
"""Test add netscaler devices in different zones
|
||||
"""
|
||||
|
||||
tags = ["advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Add multiple instances of Netscaler in different zones
|
||||
|
|
@ -647,6 +651,8 @@ class TestNetScalerSharedMode(cloudstackTestCase):
|
|||
def test_01_netscaler_shared_mode(self):
|
||||
"""Test netscaler device in shared mode
|
||||
"""
|
||||
|
||||
tags = ["advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Add Netscaler device in shared mode with capacity 3
|
||||
|
|
@ -800,6 +806,8 @@ class TestNetScalerSharedMode(cloudstackTestCase):
|
|||
def test_02_multiple_netscaler_capacilty(self):
|
||||
"""Test multiple netscaler devices with limited capacity
|
||||
"""
|
||||
|
||||
tags = ["advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Add another netscaler device and spawn a new VM again
|
||||
|
|
@ -900,6 +908,8 @@ class TestNetScalerSharedMode(cloudstackTestCase):
|
|||
def test_03_multiple_netscaler_full_capacilty(self):
|
||||
"""Test netscaler device with full capacity
|
||||
"""
|
||||
|
||||
tags = ["advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Spawn multiple instances for utilizing full capacity of Netscaler
|
||||
|
|
@ -983,6 +993,8 @@ class TestNetScalerSharedMode(cloudstackTestCase):
|
|||
def test_04_delete_account_after_capacity_full(self):
|
||||
"""Test delete and add resouces after netscaler device capacity is full
|
||||
"""
|
||||
|
||||
tags = ["advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Delete one of the account. Wait till Network.gc.wait &
|
||||
|
|
@ -1166,6 +1178,8 @@ class TestNwOffDedicatedNetscaler(cloudstackTestCase):
|
|||
def test_nw_off_dedicated_mode(self):
|
||||
"""Test network offering in dedicated mode device
|
||||
"""
|
||||
|
||||
tags = ["advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Add Netscaler device in shared mode
|
||||
|
|
@ -1358,6 +1372,8 @@ class TestNwOffNetscaler(cloudstackTestCase):
|
|||
def test_ns_shared_nw_dedicated(self):
|
||||
"""Test netscaler device in shared mode with network offering in dedicated mode
|
||||
"""
|
||||
|
||||
tags = ["advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Add Netscaler device in shared mode
|
||||
|
|
@ -1666,6 +1682,8 @@ class TestNwOffSToDUpgrade(cloudstackTestCase):
|
|||
|
||||
def test_shared_to_dedicated_upgrade(self):
|
||||
"""Test upgrade from shared LB isolation to dedicated LB isolation"""
|
||||
|
||||
tags = ["advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Create a dedicated and shared network offering
|
||||
|
|
@ -2081,6 +2099,8 @@ class TestNwOffDToSUpgrade(cloudstackTestCase):
|
|||
|
||||
def test_shared_to_dedicated_upgrade(self):
|
||||
"""Test upgrade from shared LB isolation to dedicated LB isolation"""
|
||||
|
||||
tags = ["advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Create a dedicated and shared network offering
|
||||
|
|
|
|||
|
|
@ -209,6 +209,8 @@ class TestNOVirtualRouter(cloudstackTestCase):
|
|||
def test_01_network_off_without_conserve_mode(self):
|
||||
"""Test Network offering with Conserve mode off and VR - All services
|
||||
"""
|
||||
|
||||
tags = ["advanced"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Create a Network from the above network offering and deploy a VM.
|
||||
|
|
@ -452,6 +454,8 @@ class TestNOVirtualRouter(cloudstackTestCase):
|
|||
def test_02_network_off_with_conserve_mode(self):
|
||||
"""Test Network offering with Conserve mode ON and VR - All services
|
||||
"""
|
||||
|
||||
tags = ["advanced"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Create a Network from the above network offering and deploy a VM.
|
||||
|
|
@ -783,6 +787,8 @@ class TestNOWithNetscaler(cloudstackTestCase):
|
|||
def test_01_network_off_without_conserve_mode(self):
|
||||
"""Test Nw off with Conserve mode off, VR-All services, LB-netscaler
|
||||
"""
|
||||
|
||||
tags = ["advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Create a Network from the above network offering and deploy a VM.
|
||||
|
|
@ -1051,6 +1057,8 @@ class TestNOWithNetscaler(cloudstackTestCase):
|
|||
def test_02_network_off_with_conserve_mode_netscaler(self):
|
||||
"""Test NW off with Conserve mode ON, LB-Netscaler and VR-All services
|
||||
"""
|
||||
|
||||
tags = ["advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Create a Network from the above network offering and deploy a VM.
|
||||
|
|
@ -1425,6 +1433,8 @@ class TestNetworkUpgrade(cloudstackTestCase):
|
|||
def test_01_nwupgrade_netscaler_conserve_on(self):
|
||||
"""Test Nw upgrade to netscaler lb service and conserve mode ON
|
||||
"""
|
||||
|
||||
tags = ["advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Upgrade a network with VR and conserve mode ON TO
|
||||
|
|
@ -1622,6 +1632,8 @@ class TestNetworkUpgrade(cloudstackTestCase):
|
|||
def test_02_nwupgrade_netscaler_conserve_off(self):
|
||||
"""Test Nw upgrade to netscaler lb service and conserve mode OFF
|
||||
"""
|
||||
|
||||
tags = ["advancedns"]
|
||||
|
||||
# Validate the following
|
||||
# 1. Upgrade a network with VR and conserve mode ON TO
|
||||
|
|
|
|||
|
|
@ -165,6 +165,8 @@ class TestDefaultSecurityGroup(cloudstackTestCase):
|
|||
def test_01_deployVM_InDefaultSecurityGroup(self):
|
||||
"""Test deploy VM in default security group
|
||||
"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following:
|
||||
# 1. deploy Virtual machine using admin user
|
||||
|
|
@ -242,6 +244,8 @@ class TestDefaultSecurityGroup(cloudstackTestCase):
|
|||
def test_02_listSecurityGroups(self):
|
||||
"""Test list security groups for admin account
|
||||
"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following:
|
||||
# 1. listSecurityGroups in admin account
|
||||
|
|
@ -275,6 +279,8 @@ class TestDefaultSecurityGroup(cloudstackTestCase):
|
|||
def test_03_accessInDefaultSecurityGroup(self):
|
||||
"""Test access in default security group
|
||||
"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following:
|
||||
# 1. deploy Virtual machine using admin user
|
||||
|
|
@ -430,6 +436,8 @@ class TestAuthorizeIngressRule(cloudstackTestCase):
|
|||
def test_01_authorizeIngressRule(self):
|
||||
"""Test authorize ingress rule
|
||||
"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following:
|
||||
#1. Create Security group for the account.
|
||||
|
|
@ -564,6 +572,8 @@ class TestRevokeIngressRule(cloudstackTestCase):
|
|||
def test_01_revokeIngressRule(self):
|
||||
"""Test revoke ingress rule
|
||||
"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following:
|
||||
#1. Create Security group for the account.
|
||||
|
|
@ -729,6 +739,9 @@ class TestDhcpOnlyRouter(cloudstackTestCase):
|
|||
def test_01_dhcpOnlyRouter(self):
|
||||
"""Test router services for user account
|
||||
"""
|
||||
|
||||
tags = ["sg", "eip", "basic"]
|
||||
|
||||
# Validate the following
|
||||
#1. List routers for any user account
|
||||
#2. The only service supported by this router should be dhcp
|
||||
|
|
@ -856,6 +869,8 @@ class TestdeployVMWithUserData(cloudstackTestCase):
|
|||
def test_01_deployVMWithUserData(self):
|
||||
"""Test Deploy VM with User data"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following
|
||||
# 1. CreateAccount of type user
|
||||
# 2. CreateSecurityGroup ssh-incoming
|
||||
|
|
@ -1030,6 +1045,8 @@ class TestDeleteSecurityGroup(cloudstackTestCase):
|
|||
def test_01_delete_security_grp_running_vm(self):
|
||||
"""Test delete security group with running VM"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following
|
||||
# 1. createsecuritygroup (ssh-incoming) for this account
|
||||
# 2. authorizeSecurityGroupIngress to allow ssh access to the VM
|
||||
|
|
@ -1112,6 +1129,8 @@ class TestDeleteSecurityGroup(cloudstackTestCase):
|
|||
def test_02_delete_security_grp_withoout_running_vm(self):
|
||||
"""Test delete security group without running VM"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following
|
||||
# 1. createsecuritygroup (ssh-incoming) for this account
|
||||
# 2. authorizeSecurityGroupIngress to allow ssh access to the VM
|
||||
|
|
@ -1272,6 +1291,8 @@ class TestIngressRule(cloudstackTestCase):
|
|||
def test_01_authorizeIngressRule_AfterDeployVM(self):
|
||||
"""Test delete security group with running VM"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following
|
||||
# 1. createsecuritygroup (ssh-incoming, 22via22) for this account
|
||||
# 2. authorizeSecurityGroupIngress to allow ssh access to the VM
|
||||
|
|
@ -1382,6 +1403,8 @@ class TestIngressRule(cloudstackTestCase):
|
|||
def test_02_revokeIngressRule_AfterDeployVM(self):
|
||||
"""Test Revoke ingress rule after deploy VM"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following
|
||||
# 1. createsecuritygroup (ssh-incoming, 22via22) for this account
|
||||
# 2. authorizeSecurityGroupIngress to allow ssh access to the VM
|
||||
|
|
@ -1534,6 +1557,8 @@ class TestIngressRule(cloudstackTestCase):
|
|||
def test_03_stopStartVM_verifyIngressAccess(self):
|
||||
"""Test Start/Stop VM and Verify ingress rule"""
|
||||
|
||||
tags = ["sg", "eip"]
|
||||
|
||||
# Validate the following
|
||||
# 1. createsecuritygroup (ssh-incoming, 22via22) for this account
|
||||
# 2. authorizeSecurityGroupIngress to allow ssh access to the VM
|
||||
|
|
|
|||
Loading…
Reference in New Issue