summaryrefslogtreecommitdiff
path: root/openstackclient/tests/unit/network
Commit message (Collapse)AuthorAgeFilesLines
* Merge "L3 conntrack helper: Use singular name consistently"Zuul2021-08-261-2/+2
|\
| * L3 conntrack helper: Use singular name consistentlyAkihiro Motoki2021-06-081-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | We use singular form for delete command argument in all places. This commit replaces conntrack-helper-ids with a singular form. The only visible change is a fix for the help message below. openstack network l3 conntrack helper delete <router> <conntrack-helper-ids> [<conntrack-helper-ids> ...] Change-Id: I50bbd9f6199071bb86cbb2f37c45ebda1de58433
* | Merge "Replace assertItemsEqual with assertCountEqual"Zuul2021-08-2310-145/+145
|\ \ | |/ |/|
| * Replace assertItemsEqual with assertCountEqualDirk Mueller2021-05-0310-145/+145
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | assertItemsEqual was removed from Python's unittest.TestCase in Python 3.3 [1][2]. We have been able to use them since then, because testtools required unittest2, which still included it. With testtools removing Python 2.7 support [3][4], we will lose support for assertItemsEqual, so we should switch to use assertCountEqual. [1] - https://bugs.python.org/issue17866 [2] - https://hg.python.org/cpython/rev/d9921cb6e3cd [3] - testing-cabal/testtools#286 [4] - testing-cabal/testtools#277 Change-Id: I0bbffbec8889b8b3067cfe17d258f5cb16624f38
* | Add support for Neutron's L3 conntrack helper resourceSlawek Kaplonski2021-06-072-0/+391
| | | | | | | | | | | | | | | | | | | | | | | | | | | | Neutron has got CRUD API for L3 conntrack helper since some time. This patch adds support for it in the OSC. OpenStack SDK supports that since [1] This patch also bumps minimum OpenStack SDK version to the 0.56.0 as that version introduced support for the Neutron's L3 conntrack helper. [1] https://review.opendev.org/c/openstack/openstacksdk/+/782870 Change-Id: I55604182ae50b6ad70c8bc1f7efad8859f191269
* | Allow to send extra attributes in Neutron related commandsSlawek Kaplonski2021-05-262-0/+198
|/ | | | | | | | | | To deprecate and drop support for neutronclient CLI and use only OSC we need feature parity between OSC and neutronclient. Last missing piece here is possibility to send in POST/PUT requests unknown parameters to the Neutron server. This patch adds such possibility to the OSC. Change-Id: Iba09297c2be9fb9fa0be1b3dc65755277b79230e
* network: Add missing subnet unset --gateway <subnet-id>Bharat Kunwar2021-03-051-0/+4
| | | | | | Story: 2008695 Task: 42003 Change-Id: I9486a09531b11f27a9ff0d68fd4ad8c68a65cccf
* Merge "Add --name to port list"Zuul2021-03-031-0/+20
|\
| * Add --name to port listBrian Haley2021-02-231-0/+20
| | | | | | | | | | | | | | | | | | The neutron API supports filtering ports by name, but the CLI was missing support for it like it does for other networking resources. Change-Id: I4ff339e18656013218a26f045b205cb7a02dd2fb Story: #2008654
* | Add 'address_group' type support to rbac commandsMiguel Lavalle2021-02-101-1/+5
|/ | | | | Depends-On: https://review.opendev.org/c/openstack/neutron/+/772460 Change-Id: Icd5e96d180364b979d1e93fcb39f9133a41a06e5
* Merge "Add device profile to ``port``"Zuul2021-01-222-0/+30
|\
| * Add device profile to ``port``Rodolfo Alonso Hernandez2021-01-192-0/+30
| | | | | | | | | | | | | | | | Added device profile parameter to ``port create`` command. Related-Bug: #1906602 Change-Id: I4c222ac334d3a0a0ee568ed1e0bc8518baa375e1
* | Support remote-address-group in SG rulesHang Yang2021-01-122-0/+44
|/ | | | | | | | Add support for using remote-address-group in security group rules. Change-Id: Ib1972244d484839943bc3cda07519a6c6d4b945a Implements: blueprint address-groups-in-sg-rules Depends-On: https://review.opendev.org/755644
* Merge "network: Address nits for I3c313fc9329837dde67815901528a34dca98ebcc"Zuul2021-01-121-4/+3
|\
| * network: Address nits for I3c313fc9329837dde67815901528a34dca98ebccStephen Finucane2021-01-121-4/+3
| | | | | | | | | | | | | | Address comments left in the review for $subject. Change-Id: I69449112027736152c9fb62f5fe427efd6a25107 Signed-off-by: Stephen Finucane <sfinucan@redhat.com>
* | Merge "Support Neutron Address Group CRUD"Zuul2021-01-112-0/+576
|\ \ | |/
| * Support Neutron Address Group CRUDHang Yang2020-12-242-0/+576
| | | | | | | | | | | | | | | | | | | | Add support for Neutron address group CRUD operations. Subsequent patches will be added to use address groups in security group rules. Change-Id: I3c313fc9329837dde67815901528a34dca98ebcc Implements: blueprint address-groups-in-sg-rules Depends-On: https://review.opendev.org/738274 Depends-On: https://review.opendev.org/745594
* | Make use of comparable 'FormattableColumn' subclassesStephen Finucane2020-12-099-136/+136
|/ | | | | | | | | | | | This requires fixes found in cliff 3.5.0 [1] and osc-lib 2.3.0 [2]. With these fixes in place, we can remove the icky, still broken 'assertItemEqual' and 'assertListItemEqual' helpers. [1] https://review.opendev.org/761421 [2] https://review.opendev.org/761394 Change-Id: Id6c26b37c3c7d5ec6761361abca57f9219b76838 Signed-off-by: Stephen Finucane <sfinucan@redhat.com>
* Add "fields" parameter to ListPort queryRodolfo Alonso Hernandez2020-11-181-19/+55
| | | | | | | | | | | | | | | | | | | | | This new query parameter will allow to send a query to the Neutron server filtering only by those parameters needed by the list command: ID, name, MAC address, fixed IPs and status. When using input parameter "long", security groups IDs, device owner and tags will be added to the fields filter. With 4500 ports, those are the execution times for the command "openstack port list" (average values in a development environment): Neutron API (seconds) CLI (seconds) Without filter: 3.05 10.15 With filter: 2.76 8.19 Depends-On: https://review.opendev.org/#/c/754113/ Change-Id: I1cccf0bc3533f8085e8dd61bf2fbe78c49b74b31 Closes-Bug: #1897100
* Merge "Always display direction for security group rules"Zuul2020-10-132-8/+9
|\
| * Always display direction for security group rulesSam Morrison2020-03-052-8/+9
| | | | | | | | | | | | | | The --long option is still accepted but is now ignored. Change-Id: I23dd9fa7cff310ee9a62ce32b843b822b93b7548 Story: #2007323
* | Merge "Add source_ip_prefix and destination_ip_prefix to metering label rules"Zuul2020-10-132-0/+14
|\ \
| * | Add source_ip_prefix and destination_ip_prefix to metering label rulesRafael Weingärtner2020-09-022-0/+14
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | As proposed in the RFE and then approved in the spec, we are adding to the neutron metering rules two new parameters. The source IP prefix, and destination IP prefix. Partially-Implements: https://bugs.launchpad.net/neutron/+bug/1889431 RFE: https://bugs.launchpad.net/neutron/+bug/1889431 Depends-On: https://review.opendev.org/#/c/746586/ Change-Id: Ic44d88fabea0fffef2279f2f2c3d2b1da6426d4d
* | | Fix: port attribute name propagate_uplink_statuspedh2020-10-062-5/+5
| | | | | | | | | | | | | | | | | | | | | | | | Change the incorrect port attribute name "uplink_status_propagation" to "propagate_uplink_status". Change-Id: Icd7c49af8d988a6e3a52a58c784bd701b2d36faf Closes-Bug: #1891873
* | | Merge "Support tagging Neutron ports on creation"Zuul2020-09-131-13/+45
|\ \ \
| * | | Support tagging Neutron ports on creationMiguel Lavalle2020-09-041-13/+45
| |/ / | | | | | | | | | | | | | | | | | | | | | | | | This change adds support for tagging ports on creation Co-Authored-By: Slawek Kaplonski <skaplons@redhat.com> Change-Id: I3148a568664588eb2f529138f984859570c0fca1 Related-Bug: #1815933
* | | Add NUMA affinity policy parameter to "port"Rodolfo Alonso Hernandez2020-07-312-0/+96
|/ / | | | | | | | | | | | | | | Added port NUMA affinity policy parameter to "port create", "port set" and "port unset" commands. Change-Id: I48cacab275856af2911829f9b7176bb87fd039b3 Related-Bug: #1886798
* | Merge "port: add --host to list command"Zuul2020-06-261-0/+16
|\ \
| * | port: add --host to list commandMohammed Naser2020-06-171-0/+16
| | | | | | | | | | | | | | | | | | | | | This adds an option to allow filtering ports bound to a specific host when listing them. Change-Id: I747ed0f8b070074c51789576a158345f670fe733
* | | Resolve PEP8Pete Zaitcev2020-05-141-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | No idea how this happened, but reviews started failing the pep8 gate job. The failures are legitimate, see the commit. I guess the pep8 tests became smarter and found these issues. Change-Id: Id9a0dad644134dafd68eed37fe8f41c583d7a619
* | | Merge "Revert "Disallow setting default on internal network""Zuul2020-04-221-33/+0
|\ \ \
| * | | Revert "Disallow setting default on internal network"Vasyl Saienko2020-04-081-33/+0
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The original patch assumes that both --external and --is-default are set in the same request and broke case when --is-default is set as an network update. The validation logic have to be moved on API side to avoid extra API calls from openstackclient. This reverts commit 962efd949feb461283a9bb4a668fbd310f80ba40. Related-Bug: #1745658 Change-Id: Idf08abb0e08a6880f89c3e9df9dd2ac82f36c432
* | | | Merge "Add 'subnetpool' type support to rbac commands"Zuul2020-04-151-0/+4
|\ \ \ \
| * | | | Add 'subnetpool' type support to rbac commandsIgor Malinovskiy2020-04-091-0/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Change-Id: Id6e528ebd1bf21ca142e60052d28371f97f629ac Partial-Bug: #1862032 Depends-On: https://review.opendev.org/710755
* | | | | Merge "Add 'address_scope' type support to network rbac commands"Zuul2020-04-101-47/+23
|\ \ \ \ \ | |/ / / /
| * | | | Add 'address_scope' type support to network rbac commandsIgor Malinovskiy2020-03-261-47/+23
| | |/ / | |/| | | | | | | | | | | | | | | | | | Change-Id: I6a4b7219934805c1bbd1e88fcc670ae231d9ac37 Partial-Bug: #1862968 Depends-On: https://review.opendev.org/709122
* | | | Merge "Support for stateless security groups"Zuul2020-04-082-0/+11
|\ \ \ \ | |_|/ / |/| | |
| * | | Support for stateless security groupsTom Stappaerts2020-03-312-0/+11
| | |/ | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | Add support for stateful attribute of security groups, using --stateful and --no-stateful flag on security group. This allows a user to create security groups with stateful false. Change-Id: Ifd20b5fc47fd0ea0bb5aeda84820dcc0fb1e8847 Blueprint: stateless-security-groups Depends-On: https://review.opendev.org/711513/
* | | Add description field to portforwarding NAT rulespedro2020-04-022-1/+15
| | | | | | | | | | | | | | | | | | | | | | | | | | | Add the `description` field to Floating IP Port Forwardings Depends-On: https://review.opendev.org/#/c/705038/ Change-Id: I6477368e32570c96cacddba4f86455262e533277 Implements: blueprint portforwarding-description Closes-Bug: #1850818
* | | Add command: router add/remove route --routeBence Romsics2020-03-301-0/+140
| |/ |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Add commands to osc to call the two new API methods introduced by new Neutron extension: extraroute-atomic. Bump our openstacksdk requirement to >=0.38.0 which contains the corresponding sdk change. The lower-constraints of dogpile.cache and keystoneauth1 are bumped because of requirements bumps in openstacksdk. The lower-constraint of decorator is bumped because of problem already fixed by amotoki here: https://review.opendev.org/701706 Change-Id: Ia9b9c216f1d1161ebedac31594a2c464d77f4ae2 Depends-On: https://review.opendev.org/674324 Partial-Bug: #1826396 (rfe) Related-Change: https://review.opendev.org/655680 (spec)
* | Merge "Add unit tests and release note for dns_publish_fixed_ip"Zuul2020-03-241-0/+38
|\ \
| * | Add unit tests and release note for dns_publish_fixed_ipDean Troyer2020-01-141-0/+38
| | | | | | | | | | | | | | | | | | | | | | | | | | | Follow-up to https://review.opendev.org/#/c/679834/ which added the options and lacked both a release note and minimal option-handling unit tests. Change-Id: Ibb2820add9b2fedaf5a8b1a77babf043f6641724 Signed-off-by: Dean Troyer <dtroyer@gmail.com>
* | | Merge "Add "fields" parameter to ListSecurityGroup query"Zuul2020-03-241-5/+12
|\ \ \
| * | | Add "fields" parameter to ListSecurityGroup queryRodolfo Alonso Hernandez2020-03-121-5/+12
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This new query parameter will allow to send a query sending the "fields" parameter. This "fields" parameter contains the needed API fields, translated into OVO fields in Neutron server, that require to be retrieved from the DB. As commented in the related bug, the OSC "list" command only prints five parameters, none of them the security group rules. In systems with a reasonable amount of security groups, skipping the unnecessary rule load can save a lot of time. Depends-On: https://review.opendev.org/#/c/710820/ Change-Id: I16f48e292997d029d68f66365db949b9f4b5a0c8 Closes-Bug: #1865223
* | | | Merge "Fix network segment range "_get_ranges" function"Zuul2020-03-231-0/+14
|\ \ \ \
| * | | | Fix network segment range "_get_ranges" functionRodolfo Alonso Hernandez2020-03-231-0/+14
| | |_|/ | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This function should return an ordered set of ranges based on an unordered list of numbers (int or str). Change-Id: I918c8befc51236cc33d96a5c88fb6eafdd143e9c Story: 2007341 Task: 38878
* | | | Allow setting floating IP descriptionDaniel Strong2020-03-181-0/+26
| | | | | | | | | | | | | | | | | | | | | | | | Change-Id: If664bfe3c9fdcb69c7046eb16c5d32602d1b3262 Story: 2007439 Task: 39094
* | | | Merge "Add qos_network_policy_id to network port tests"Zuul2020-03-132-0/+3
|\ \ \ \ | |_|/ / |/| | |
| * | | Add qos_network_policy_id to network port testsRodolfo Alonso Hernandez2020-02-182-0/+3
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Added "qos_network_policy_id" to "port show" command. Because this is just a read-only parameter and is read from the SDK port definition, this patch only modifies the corresponding tests. This patch is adding this new parameter to the test bench. Change-Id: Ice7423e0e0b98a39cc36622b70eae5a8493a037c Closes-Bug: #1851362
* | | | Disallow setting default on internal networkHongbin Lu2020-03-091-0/+33
| |/ / |/| | | | | | | | | | | | | | | | | | | | | | | The ``--default`` option should be only used for external network. Default internal network is not currently supported so we disallow it for now. Change-Id: Ia9d39b40e1e041d7bda0f6a27d058e382b572e1a Closes-Bug: #1745658