8d71932c69
This new feature gives the user the ability to allow and deny access to the snapshots, so that they could be mounted in read-only mode to retrieve files. APIImpact DocImpact Co-Authored-By: Rodrigo Barbieri <rodrigo.barbieri@fit-tecnologia.org.br> Co-Authored-By: Alyson Rosa <alyson.rosa@fit-tecnologia.org.br> Co-Authored-By: Miriam Yumi <miriam.peixoto@fit-tecnologia.org.br> Partially-implements: blueprint manila-mountable-snapshots Change-Id: I65f398a05f82eef31ec317d70dfa101483b44b30
102 lines
3.6 KiB
Python
102 lines
3.6 KiB
Python
# Copyright 2016 Hitachi Data Systems
|
|
# All Rights Reserved.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
import six
|
|
|
|
import ddt
|
|
from tempest import config
|
|
import testtools
|
|
from testtools import testcase as tc
|
|
|
|
from manila_tempest_tests.tests.api import base
|
|
|
|
CONF = config.CONF
|
|
|
|
|
|
class BaseShareSnapshotRulesTest(base.BaseSharesTest):
|
|
|
|
protocol = ""
|
|
|
|
@classmethod
|
|
def resource_setup(cls):
|
|
super(BaseShareSnapshotRulesTest, cls).resource_setup()
|
|
cls.share = cls.create_share(cls.protocol)
|
|
cls.snapshot = cls.create_snapshot_wait_for_active(cls.share['id'])
|
|
|
|
def _test_create_delete_access_rules(self, access_to):
|
|
# create rule
|
|
rule = self.shares_v2_client.create_snapshot_access_rule(
|
|
self.snapshot['id'], self.access_type, access_to)
|
|
|
|
for key in ('deleted', 'deleted_at', 'instance_mappings'):
|
|
self.assertNotIn(key, list(six.iterkeys(rule)))
|
|
|
|
self.shares_v2_client.wait_for_snapshot_access_rule_status(
|
|
self.snapshot['id'], rule['id'])
|
|
|
|
# delete rule and wait for deletion
|
|
self.shares_v2_client.delete_snapshot_access_rule(self.snapshot['id'],
|
|
rule['id'])
|
|
self.shares_v2_client.wait_for_snapshot_access_rule_deletion(
|
|
self.snapshot['id'], rule['id'])
|
|
|
|
|
|
@base.skip_if_microversion_lt("2.32")
|
|
@testtools.skipUnless(CONF.share.run_mount_snapshot_tests and
|
|
CONF.share.run_snapshot_tests,
|
|
'Mountable snapshots tests are disabled.')
|
|
@ddt.ddt
|
|
class ShareSnapshotIpRulesForNFSTest(BaseShareSnapshotRulesTest):
|
|
protocol = "nfs"
|
|
|
|
@classmethod
|
|
def resource_setup(cls):
|
|
if not (cls.protocol in CONF.share.enable_protocols and
|
|
cls.protocol in CONF.share.enable_ip_rules_for_protocols):
|
|
msg = "IP rule tests for %s protocol are disabled." % cls.protocol
|
|
raise cls.skipException(msg)
|
|
super(ShareSnapshotIpRulesForNFSTest, cls).resource_setup()
|
|
|
|
cls.access_type = "ip"
|
|
|
|
@tc.attr(base.TAG_POSITIVE, base.TAG_BACKEND)
|
|
@ddt.data("1.1.1.1", "1.2.3.4/32")
|
|
def test_create_delete_access_rules(self, access_to):
|
|
self._test_create_delete_access_rules(access_to)
|
|
|
|
|
|
@base.skip_if_microversion_lt("2.32")
|
|
@testtools.skipUnless(CONF.share.run_mount_snapshot_tests,
|
|
'Mountable snapshots tests are disabled.')
|
|
@ddt.ddt
|
|
class ShareSnapshotUserRulesForCIFSTest(BaseShareSnapshotRulesTest):
|
|
protocol = "cifs"
|
|
|
|
@classmethod
|
|
def resource_setup(cls):
|
|
if not (cls.protocol in CONF.share.enable_protocols and
|
|
cls.protocol in CONF.share.enable_user_rules_for_protocols):
|
|
msg = ("User rule tests for %s protocol are "
|
|
"disabled." % cls.protocol)
|
|
raise cls.skipException(msg)
|
|
super(ShareSnapshotUserRulesForCIFSTest, cls).resource_setup()
|
|
|
|
cls.access_type = "user"
|
|
|
|
@tc.attr(base.TAG_POSITIVE, base.TAG_BACKEND)
|
|
def test_create_delete_access_rules(self):
|
|
access_to = CONF.share.username_for_user_rules
|
|
self._test_create_delete_access_rules(access_to)
|