You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@cloudstack.apache.org by bh...@apache.org on 2015/03/24 12:26:50 UTC

git commit: updated refs/heads/master to 191bcdd

Repository: cloudstack
Updated Branches:
  refs/heads/master dc2aa8a80 -> 191bcdd43


CLOUDSTACK-8251: Adding automation test cases for dedicated public IP ranges

This closes #128

Signed-off-by: Rohit Yadav <ro...@shapeblue.com>


Project: http://git-wip-us.apache.org/repos/asf/cloudstack/repo
Commit: http://git-wip-us.apache.org/repos/asf/cloudstack/commit/191bcdd4
Tree: http://git-wip-us.apache.org/repos/asf/cloudstack/tree/191bcdd4
Diff: http://git-wip-us.apache.org/repos/asf/cloudstack/diff/191bcdd4

Branch: refs/heads/master
Commit: 191bcdd4394a54663d72e9a237d673879f541266
Parents: dc2aa8a
Author: Gaurav Aradhye <ga...@clogeny.com>
Authored: Tue Mar 24 16:16:50 2015 +0530
Committer: Rohit Yadav <ro...@shapeblue.com>
Committed: Tue Mar 24 16:56:33 2015 +0530

----------------------------------------------------------------------
 .../maint/test_dedicate_public_ip_range.py      | 1452 ++++++++++++++++++
 tools/marvin/marvin/config/test_data.py         |    9 +
 tools/marvin/marvin/lib/base.py                 |    7 +-
 3 files changed, 1467 insertions(+), 1 deletion(-)
----------------------------------------------------------------------


http://git-wip-us.apache.org/repos/asf/cloudstack/blob/191bcdd4/test/integration/component/maint/test_dedicate_public_ip_range.py
----------------------------------------------------------------------
diff --git a/test/integration/component/maint/test_dedicate_public_ip_range.py b/test/integration/component/maint/test_dedicate_public_ip_range.py
new file mode 100644
index 0000000..10b4a33
--- /dev/null
+++ b/test/integration/component/maint/test_dedicate_public_ip_range.py
@@ -0,0 +1,1452 @@
+# Licensed to the Apache Software Foundation (ASF) under one
+# or more contributor license agreements.  See the NOTICE file
+# distributed with this work for additional information
+# regarding copyright ownership.  The ASF licenses this file
+# to you under the Apache License, Version 2.0 (the
+# "License"); you may not use this file except in compliance
+# with the License.  You may obtain a copy of the License at
+#
+#   http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing,
+# software distributed under the License is distributed on an
+# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+# KIND, either express or implied.  See the License for the
+# specific language governing permissions and limitations
+# under the License.
+""" P1 tests for Dedicating Public IP addresses
+
+    Test Plan: https://cwiki.apache.org/confluence/display/CLOUDSTACK/
+    Dedicated+Resources+-+Public+IP+Addresses+and+VLANs+per+Tenant+Test+Plan
+
+    Issue Link: https://issues.apache.org/jira/browse/CLOUDSTACK-2251
+
+    Feature Specifications: https://cwiki.apache.org/confluence/display/
+    CLOUDSTACK/FS-+Dedicate+Public+IP+Addresses+per+tenant
+"""
+# Import Local Modules
+from nose.plugins.attrib import attr
+from marvin.cloudstackTestCase import cloudstackTestCase, unittest
+from marvin.lib.utils import (validateList,
+                              cleanup_resources,
+                              random_gen)
+from marvin.lib.base import (Account,
+                             PublicIpRange,
+                             Domain,
+                             Network,
+                             NetworkOffering,
+                             PublicIPAddress,
+                             VPC,
+                             VpcOffering,
+                             LoadBalancerRule,
+                             Resources)
+from marvin.lib.common import (get_domain,
+                               get_zone,
+                               get_free_vlan)
+from marvin.codes import PASS
+from netaddr import IPAddress
+import random
+
+
+class TestDedicatePublicIPRange(cloudstackTestCase):
+
+    @classmethod
+    def setUpClass(cls):
+        cls.testClient = super(
+            TestDedicatePublicIPRange,
+            cls).getClsTestClient()
+        cls.apiclient = cls.testClient.getApiClient()
+        cls.testdata = cls.testClient.getParsedTestDataConfig()
+        # Get Zone, Domain
+        cls.domain = get_domain(cls.apiclient)
+        cls.zone = get_zone(cls.apiclient, cls.testClient.getZoneForTests())
+        cls.testdata["isolated_network"]["zoneid"] = cls.zone.id
+        cls.testdata["publiciprange"]["zoneid"] = cls.zone.id
+        cls._cleanup = []
+        try:
+            cls.isolated_network_offering = NetworkOffering.create(
+                cls.apiclient,
+                cls.testdata["isolated_network_offering"])
+            cls._cleanup.append(cls.isolated_network_offering)
+            cls.isolated_network_offering.update(
+                cls.apiclient,
+                state='Enabled')
+
+            cls.vpc_network_offering = NetworkOffering.create(
+                cls.apiclient,
+                cls.testdata["nw_offering_isolated_vpc"],
+                conservemode=False)
+            cls._cleanup.append(cls.vpc_network_offering)
+            cls.vpc_network_offering.update(cls.apiclient, state='Enabled')
+
+            cls.vpc_off = VpcOffering.create(
+                cls.apiclient,
+                cls.testdata["vpc_offering"]
+            )
+            cls.vpc_off.update(cls.apiclient, state='Enabled')
+        except Exception as e:
+            cls.tearDownClass()
+            raise unittest.SkipTest(e)
+        return
+
+    @classmethod
+    def tearDownClass(cls):
+        try:
+            # Cleanup resources used
+            cleanup_resources(cls.apiclient, cls._cleanup)
+        except Exception as e:
+            raise Exception("Warning: Exception during cleanup : %s" % e)
+        return
+
+    def setUp(self):
+        self.apiclient = self.testClient.getApiClient()
+        self.dbclient = self.testClient.getDbConnection()
+        self.cleanup = []
+
+        # Setting up random public ip range
+        self.testdata["publiciprange"]["vlan"] = get_free_vlan(
+            self.apiclient,
+            self.zone.id)[1]
+        random_subnet_number = random.randrange(1, 254)
+        self.testdata["publiciprange"]["gateway"] = "172.16." + \
+            str(random_subnet_number) + ".1"
+        self.testdata["publiciprange"]["startip"] = "172.16." + \
+            str(random_subnet_number) + ".2"
+        self.testdata["publiciprange"]["endip"] = "172.16." + \
+            str(random_subnet_number) + ".3"
+        self.testdata["publiciprange"]["netmask"] = "255.255.255.0"
+        return
+
+    def tearDown(self):
+        try:
+            # Clean up
+            cleanup_resources(self.apiclient, self.cleanup)
+        except Exception as e:
+            raise Exception("Warning: Exception during cleanup : %s" % e)
+        return
+
+    @attr(tags=["advanced"], required_hardware="false")
+    def test_01_dedicate_public_ip_range_root_domain(self):
+        """Dedicate public IP range to an account in root domain
+
+        # Validate the following:
+        # 1. Create a Public IP range
+        # 2. Created IP range should be present, verify with listVlanIpRanges
+        # 3. Dedicate the created IP range to user account
+        # 4. Verify IP range is dedicated, verify with listVlanIpRanges
+        """
+        # Create Account
+        account = Account.create(
+            self.apiclient,
+            self.testdata["account"],
+            domainid=self.domain.id
+        )
+        self.cleanup.append(account)
+
+        public_ip_range = PublicIpRange.create(
+            self.apiclient,
+            self.testdata["publiciprange"]
+        )
+        self.cleanup.append(public_ip_range)
+        public_ip_ranges = PublicIpRange.list(
+            self.apiclient,
+            id=public_ip_range.vlan.id
+        )
+        self.assertEqual(
+            validateList(public_ip_ranges)[0],
+            PASS,
+            "public ip ranges list validation failed"
+        )
+        self.assertEqual(
+            public_ip_ranges[0].id,
+            public_ip_range.vlan.id,
+            "Check public ip range response id is in listVlanIpRanges"
+        )
+
+        PublicIpRange.dedicate(
+            self.apiclient,
+            public_ip_range.vlan.id,
+            account=account.name,
+            domainid=account.domainid
+        )
+        public_ip_ranges = PublicIpRange.list(
+            self.apiclient,
+            id=public_ip_range.vlan.id
+        )
+        self.assertEqual(validateList(public_ip_ranges)[0], PASS,
+                         "public ip ranges list validation failed")
+        self.assertEqual(
+            public_ip_ranges[0].account,
+            account.name,
+            "Check account name is in listVlanIpRanges\
+               as the account public ip range is dedicated to")
+        return
+
+    @attr(tags=["advanced"], required_hardware="false")
+    def test_02_dedicate_public_ip_range_user_domain(self):
+        """Dedicate public IP range to an account in user domain
+
+        # Validate the following:
+        # 1. Create a Public IP range
+        # 2. Created IP range should be present, verify with listVlanIpRanges
+        # 3. Dedicate the created IP range to user account
+        # 4. Verify IP range is dedicated, verify with listVlanIpRanges
+        # 5. Release the dedicated Public IP range back to the system
+        # 6. Verify IP range has been released, verify with listVlanIpRanges
+        # 7. Delete the Public IP range"""
+
+        user_domain = Domain.create(
+            self.apiclient,
+            services=self.testdata["domain"],
+            parentdomainid=self.domain.id)
+        self.cleanup.append(user_domain)
+        # Create Account
+        account = Account.create(
+            self.apiclient,
+            self.testdata["account"],
+            domainid=user_domain.id
+        )
+        self.cleanup.insert(-1, account)
+
+        public_ip_range = PublicIpRange.create(
+            self.apiclient,
+            self.testdata["publiciprange"]
+        )
+        self.cleanup.append(public_ip_range)
+        public_ip_ranges = PublicIpRange.list(
+            self.apiclient,
+            id=public_ip_range.vlan.id
+        )
+        self.assertEqual(
+            validateList(public_ip_ranges)[0],
+            PASS,
+            "public ip ranges list validation failed"
+        )
+        self.assertEqual(
+            public_ip_ranges[0].id,
+            public_ip_range.vlan.id,
+            "Check public ip range response id is in listVlanIpRanges"
+        )
+
+        PublicIpRange.dedicate(
+            self.apiclient,
+            public_ip_range.vlan.id,
+            account=account.name,
+            domainid=account.domainid
+        )
+        public_ip_ranges = PublicIpRange.list(
+            self.apiclient,
+            id=public_ip_range.vlan.id
+        )
+        self.assertEqual(validateList(public_ip_ranges)[0], PASS,
+                         "public ip ranges list validation failed")
+        self.assertEqual(
+            public_ip_ranges[0].account,
+            account.name,
+            "Check account name is in listVlanIpRanges\
+               as the account public ip range is dedicated to")
+        return
+
+    @attr(tags=["advanced"], required_hardware="false")
+    def test_03_dedicate_during_creation_root_domain(self):
+        """Dedicate public IP range to an account during its creation only
+
+        # Validate the following:
+        # 1. Create an account in root domain
+        # 2. Create a public IP range and pass account name and domain id
+             while creating
+        # 3. The public IP range should be successfully added and it should
+             be dedicated to the account
+        """
+        # Create Account
+        account = Account.create(
+            self.apiclient,
+            self.testdata["account"],
+            domainid=self.domain.id
+        )
+        self.cleanup.append(account)
+
+        public_ip_range = PublicIpRange.create(
+            self.apiclient,
+            self.testdata["publiciprange"],
+            account=account.name,
+            domainid=account.domainid
+        )
+        self.cleanup.append(public_ip_range)
+        public_ip_ranges = PublicIpRange.list(
+            self.apiclient,
+            id=public_ip_range.vlan.id
+        )
+        self.assertEqual(
+            validateList(public_ip_ranges)[0],
+            PASS,
+            "public ip ranges list validation failed"
+        )
+        self.assertEqual(
+            public_ip_ranges[0].id,
+            public_ip_range.vlan.id,
+            "Check public ip range response id is in listVlanIpRanges"
+        )
+
+        self.assertEqual(
+            public_ip_ranges[0].account,
+            account.name,
+            "Check account name is in listVlanIpRanges\
+               as the account public ip range is dedicated to")
+        return
+
+    @attr(tags=["advanced"], required_hardware="false")
+    def test_04_dedicate_during_creation_user_domain(self):
+        """Dedicate public IP range to an account in user
+           domain during its creation only
+
+        # Validate the following:
+        # 1. Create a user domain and an account in it
+        # 2. Create a public IP range and pass account name
+             and domain id while creating
+        # 3. The public IP range should be successfully added
+             and it should be dedicated to the account
+        """
+
+        user_domain = Domain.create(
+            self.apiclient,
+            services=self.testdata["domain"],
+            parentdomainid=self.domain.id)
+        self.cleanup.append(user_domain)
+        # Create Account
+        account = Account.create(
+            self.apiclient,
+            self.testdata["account"],
+            domainid=user_domain.id
+        )
+        self.cleanup.insert(-1, account)
+
+        public_ip_range = PublicIpRange.create(
+            self.apiclient,
+            self.testdata["publiciprange"],
+            account=account.name,
+            domainid=account.domainid
+        )
+        self.cleanup.append(public_ip_range)
+        public_ip_ranges = PublicIpRange.list(
+            self.apiclient,
+            id=public_ip_range.vlan.id
+        )
+        self.assertEqual(
+            validateList(public_ip_ranges)[0],
+            PASS,
+            "public ip ranges list validation failed"
+        )
+        self.assertEqual(
+            public_ip_ranges[0].id,
+            public_ip_range.vlan.id,
+            "Check public ip range response id is in listVlanIpRanges"
+        )
+
+        self.assertEqual(
+            public_ip_ranges[0].account,
+            account.name,
+            "Check account name is in listVlanIpRanges\
+               as the account public ip range is dedicated to")
+
+        return
+
+    @attr(tags=["advanced"], required_hardware="false")
+    def test_05_acquire_ip_single_guest_network(self):
+        """Create guest network in account with dedicated public
+           ip range and acquire IPs in network
+
+        # Validate the following:
+        # 1. Create a Public IP range with 2 IPs in it
+        # 2. Dedicate the created IP range to user account
+        # 3. Create a guest network in the account
+        # 4. Acquire a public IP for this network
+        # 5. Verify that the acquired IP is from the dedicated range
+        # 6. Repeat steps 4 and 5 so that both the IPs in the range are
+             now acquired
+        # 7. Repeat step 4
+        # 8. Now this public IP should not be from the dedicated range,
+             it should be from global pool
+        """
+        # Create Account
+        account = Account.create(
+            self.apiclient,
+            self.testdata["account"],
+            domainid=self.domain.id
+        )
+        self.cleanup.append(account)
+
+        public_ip_range = PublicIpRange.create(
+            self.apiclient,
+            self.testdata["publiciprange"]
+        )
+        self.cleanup.append(public_ip_range)
+        PublicIpRange.dedicate(
+            self.apiclient,
+            public_ip_range.vlan.id,
+            account=account.name,
+            domainid=account.domainid
+        )
+
+        isolated_network = Network.create(
+            self.apiclient,
+            self.testdata["isolated_network"],
+            account.name,
+            account.domainid,
+            networkofferingid=self.isolated_network_offering.id)
+
+        formatted_startip = IPAddress(
+            self.testdata["publiciprange"]["startip"])
+        formatted_endip = IPAddress(self.testdata["publiciprange"]["endip"])
+        public_ip1 = PublicIPAddress.create(
+            self.apiclient,
+            accountid=account.name,
+            zoneid=self.zone.id,
+            domainid=account.domainid,
+            networkid=isolated_network.id)
+
+        # Format the IP so that it can be used to compare with other IPs
+        formatted_publicip = IPAddress(public_ip1.ipaddress.ipaddress)
+
+        self.assertTrue(int(formatted_startip) <=
+                        int(formatted_publicip) <= int(formatted_endip),
+                        "publicip should be from the dedicated range")
+
+        public_ip2 = PublicIPAddress.create(
+            self.apiclient,
+            accountid=account.name,
+            zoneid=self.zone.id,
+            domainid=account.domainid,
+            networkid=isolated_network.id)
+
+        formatted_publicip = IPAddress(public_ip2.ipaddress.ipaddress)
+
+        self.assertTrue(int(formatted_startip) <=
+                        int(formatted_publicip) <= int(formatted_endip),
+                        "publicip should be from the dedicated range")
+
+        public_ip3 = PublicIPAddress.create(
+            self.apiclient,
+            accountid=account.name,
+            zoneid=self.zone.id,
+            domainid=account.domainid,
+            networkid=isolated_network.id)
+
+        formatted_publicip = IPAddress(public_ip3.ipaddress.ipaddress)
+
+        self.assertFalse(int(formatted_startip) <=
+                         int(formatted_publicip) <= int(formatted_endip),
+                         "publicip should not be from the dedicated range")
+        return
+
+    @attr(tags=["advanced"], required_hardware="false")
+    def test_06_acquire_ip_multiple_guest_network(self):
+        """Create multiple guest networks and acquire IPs from dedicated range
+
+        # Validate the following:
+        # 1. Create a Public IP range with 2 IPs in it
+        # 2. Dedicate the created IP range to user account
+        # 3. Create a guest network in the account
+        # 4. Acquire a public IP for this network
+        # 5. Verify that the acquired IP is from the dedicated range
+        # 6. Repeat steps 3,4 and 5 so that both the IPs in the range are
+             now acquired
+        # 7. Repeat step 4 for network 1
+        # 8. Now this public IP should not be from the dedicated range,
+             it should be from global pool
+        """
+        # Create Account
+        account = Account.create(
+            self.apiclient,
+            self.testdata["account"],
+            domainid=self.domain.id
+        )
+        self.cleanup.append(account)
+
+        public_ip_range = PublicIpRange.create(
+            self.apiclient,
+            self.testdata["publiciprange"]
+        )
+        self.cleanup.append(public_ip_range)
+        PublicIpRange.dedicate(
+            self.apiclient,
+            public_ip_range.vlan.id,
+            account=account.name,
+            domainid=account.domainid
+        )
+
+        formatted_startip = IPAddress(
+            self.testdata["publiciprange"]["startip"])
+        formatted_endip = IPAddress(self.testdata["publiciprange"]["endip"])
+
+        isolated_network1 = Network.create(
+            self.apiclient,
+            self.testdata["isolated_network"],
+            account.name,
+            account.domainid,
+            networkofferingid=self.isolated_network_offering.id)
+
+        public_ip1 = PublicIPAddress.create(
+            self.apiclient,
+            accountid=account.name,
+            zoneid=self.zone.id,
+            domainid=account.domainid,
+            networkid=isolated_network1.id)
+
+        formatted_publicip1 = IPAddress(public_ip1.ipaddress.ipaddress)
+
+        self.assertTrue(int(formatted_startip) <=
+                        int(formatted_publicip1) <= int(formatted_endip),
+                        "publicip should be from the dedicated range")
+
+        isolated_network2 = Network.create(
+            self.apiclient,
+            self.testdata["isolated_network"],
+            account.name,
+            account.domainid,
+            networkofferingid=self.isolated_network_offering.id)
+
+        public_ip2 = PublicIPAddress.create(
+            self.apiclient,
+            accountid=account.name,
+            zoneid=self.zone.id,
+            domainid=account.domainid,
+            networkid=isolated_network2.id)
+
+        formatted_publicip2 = IPAddress(public_ip2.ipaddress.ipaddress)
+
+        self.assertTrue(int(formatted_startip) <=
+                        int(formatted_publicip2) <= int(formatted_endip),
+                        "publicip should be from the dedicated range")
+
+        public_ip3 = PublicIPAddress.create(
+            self.apiclient,
+            accountid=account.name,
+            zoneid=self.zone.id,
+            domainid=account.domainid,
+            networkid=isolated_network1.id)
+
+        formatted_publicip3 = IPAddress(public_ip3.ipaddress.ipaddress)
+
+        self.assertFalse(int(formatted_startip) <=
+                         int(formatted_publicip3) <= int(formatted_endip),
+                         "publicip should not be from the dedicated range")
+        return
+
+    @attr(tags=["advanced"], required_hardware="false")
+    def test_08_acquire_ip_in_vpc(self):
+        """Acquire public IP from dedicated range in network tier of VPC
+
+        # Validate the following:
+        # 1. Create a domain and an account in it
+        # 2. Create a VPC in this account
+        # 3. Create a netwok tier in this VPC
+        # 4. Create a Public IP range and dedicate to account
+        # 5. Dedicate the created IP range to user account
+        # 6. Acquire public IP in the network tier of VPC
+        # 7. Ip should be from the dedicated range
+        # 8. Repeat steps 6 and 7
+        # 9. Repeat step 6, this time the IP should not be from
+             dedicated range, it should be from global pool
+        """
+        user_domain = Domain.create(
+            self.apiclient,
+            services=self.testdata["domain"],
+            parentdomainid=self.domain.id)
+        self.cleanup.append(user_domain)
+        # Create Account
+        account = Account.create(
+            self.apiclient,
+            self.testdata["account"],
+            domainid=user_domain.id
+        )
+        self.cleanup.insert(-1, account)
+        self.testdata["vpc"]["cidr"] = '10.1.1.0/16'
+        vpc = VPC.create(
+            self.apiclient,
+            self.testdata["vpc"],
+            vpcofferingid=self.vpc_off.id,
+            zoneid=self.zone.id,
+            account=account.name,
+            domainid=account.domainid
+        )
+        network = Network.create(
+            self.apiclient,
+            self.testdata["network"],
+            accountid=account.name,
+            domainid=account.domainid,
+            networkofferingid=self.vpc_network_offering.id,
+            zoneid=self.zone.id,
+            gateway='10.1.1.1',
+            netmask='255.255.255.0',
+            vpcid=vpc.id
+        )
+
+        public_ip_range = PublicIpRange.create(
+            self.apiclient,
+            self.testdata["publiciprange"]
+        )
+        self.cleanup.append(public_ip_range)
+        PublicIpRange.dedicate(
+            self.apiclient,
+            public_ip_range.vlan.id,
+            account=account.name,
+            domainid=account.domainid
+        )
+
+        formatted_startip = IPAddress(
+            self.testdata["publiciprange"]["startip"])
+        formatted_endip = IPAddress(self.testdata["publiciprange"]["endip"])
+
+        public_ip1 = PublicIPAddress.create(
+            self.apiclient,
+            zoneid=self.zone.id,
+            networkid=network.id,
+            accountid=account.name,
+            domainid=account.domainid,
+            vpcid=vpc.id)
+
+        formatted_publicip1 = IPAddress(public_ip1.ipaddress.ipaddress)
+
+        self.assertTrue(int(formatted_startip) <=
+                        int(formatted_publicip1) <= int(formatted_endip),
+                        "publicip should be from the dedicated range")
+
+        public_ip2 = PublicIPAddress.create(
+            self.apiclient,
+            zoneid=self.zone.id,
+            networkid=network.id,
+            accountid=account.name,
+            domainid=account.domainid,
+            vpcid=vpc.id)
+
+        formatted_publicip2 = IPAddress(public_ip2.ipaddress.ipaddress)
+
+        self.assertTrue(int(formatted_startip) <=
+                        int(formatted_publicip2) <= int(formatted_endip),
+                        "publicip should be from the dedicated range")
+
+        public_ip3 = PublicIPAddress.create(
+            self.apiclient,
+            zoneid=self.zone.id,
+            networkid=network.id,
+            accountid=account.name,
+            domainid=account.domainid,
+            vpcid=vpc.id)
+
+        formatted_publicip3 = IPAddress(public_ip3.ipaddress.ipaddress)
+
+        self.assertFalse(int(formatted_startip) <=
+                         int(formatted_publicip3) <= int(formatted_endip),
+                         "publicip should be from the dedicated range")
+
+        return
+
+
+class TestFailureScenarios(cloudstackTestCase):
+
+    @classmethod
+    def setUpClass(cls):
+        cls.testClient = super(TestFailureScenarios, cls).getClsTestClient()
+        cls.apiclient = cls.testClient.getApiClient()
+        cls.testdata = cls.testClient.getParsedTestDataConfig()
+        # Get Zone, Domain
+        cls.domain = get_domain(cls.apiclient)
+        cls.zone = get_zone(cls.apiclient, cls.testClient.getZoneForTests())
+        cls.testdata["isolated_network"]["zoneid"] = cls.zone.id
+        cls.testdata["publiciprange"]["zoneid"] = cls.zone.id
+        cls._cleanup = []
+        try:
+            cls.isolated_network_offering = NetworkOffering.create(
+                cls.apiclient,
+                cls.testdata["isolated_network_offering"])
+            cls._cleanup.append(cls.isolated_network_offering)
+            cls.isolated_network_offering.update(
+                cls.apiclient,
+                state='Enabled')
+        except Exception as e:
+            cls.tearDownClass()
+            raise unittest.SkipTest(e)
+        return
+
+    @classmethod
+    def tearDownClass(cls):
+        try:
+            # Cleanup resources used
+            cleanup_resources(cls.apiclient, cls._cleanup)
+        except Exception as e:
+            raise Exception("Warning: Exception during cleanup : %s" % e)
+        return
+
+    def setUp(self):
+        self.apiclient = self.testClient.getApiClient()
+        self.dbclient = self.testClient.getDbConnection()
+        self.cleanup = []
+
+        # Setting up random public ip range
+        self.testdata["publiciprange"]["vlan"] = get_free_vlan(
+            self.apiclient,
+            self.zone.id)[1]
+        subnet_number = random.randrange(1, 254)
+        self.testdata["publiciprange"][
+            "gateway"] = "172.16." + str(subnet_number) + ".1"
+        self.testdata["publiciprange"][
+            "startip"] = "172.16." + str(subnet_number) + ".2"
+        self.testdata["publiciprange"][
+            "endip"] = "172.16." + str(subnet_number) + ".3"
+        self.testdata["publiciprange"]["netmask"] = "255.255.255.0"
+        return
+
+    def tearDown(self):
+        try:
+            # Clean up
+            cleanup_resources(self.apiclient, self.cleanup)
+        except Exception as e:
+            raise Exception("Warning: Exception during cleanup : %s" % e)
+        return
+
+    @attr(tags=["advanced"], required_hardware="false")
+    def test_10_dedicate_invalid_ip_range(self):
+        """Dedicate invalid public IP range to an account
+
+        # Validate the following:
+        # 1. Create an account in root domain
+        # 2. Create a Public IP range by giving invalid ip addresses
+             and specify the account name and domain id while creating
+        # 3. The operations should fail
+        """
+        # Create Account
+        account = Account.create(
+            self.apiclient,
+            self.testdata["account"],
+            domainid=self.domain.id
+        )
+        self.cleanup.append(account)
+
+        # Specify invalid IPs
+        self.testdata["publiciprange"]["startip"] = "172.16.255.256"
+        self.testdata["publiciprange"]["startip"] = "172.16.255.257"
+        self.testdata["publiciprange"]["gateway"] = "172.16.255.1"
+
+        with self.assertRaises(Exception):
+            public_ip_range = PublicIpRange.create(
+                self.apiclient,
+                self.testdata["publiciprange"],
+                account=account.name,
+                domainid=account.domainid
+            )
+            self.cleanup.append(public_ip_range)
+        return
+
+    @attr(tags=["advanced"], required_hardware="false")
+    def test_11_dedicate_to_wrong_account(self):
+        """Dedicate public IP range to invalid account
+
+        # Validate the following:
+        # 1. Create an account in root domain
+        # 2. Create a Public IP range with valid ip addresses
+             and specify invalid account name and domain id while creating
+        # 3. The operation should fail
+        """
+        # Create Account
+        account = Account.create(
+            self.apiclient,
+            self.testdata["account"],
+            domainid=self.domain.id
+        )
+        self.cleanup.append(account)
+
+        with self.assertRaises(Exception):
+            public_ip_range = PublicIpRange.create(
+                self.apiclient,
+                self.testdata["publiciprange"],
+                account=account.name + random_gen(),
+                domainid=account.domainid
+            )
+            self.cleanup.append(public_ip_range)
+        return
+
+    @attr(tags=["advanced"], required_hardware="false")
+    def test_12_dedicate_already_dedicated_range(self):
+        """Dedicate already dedicated public IP range
+
+        # Validate the following:
+        # 1. Create a user domain and two accounts in it
+        # 2. Create a Public IP range
+        # 3. Dedicate the created IP range to account1
+        # 4. Try to dedicate the same public iprage to account 2
+        # 5. The operation should fail"""
+
+        user_domain = Domain.create(
+            self.apiclient,
+            services=self.testdata["domain"],
+            parentdomainid=self.domain.id)
+        self.cleanup.append(user_domain)
+
+        account1 = Account.create(
+            self.apiclient,
+            self.testdata["account"],
+            domainid=user_domain.id
+        )
+        self.cleanup.insert(-1, account1)
+
+        account2 = Account.create(
+            self.apiclient,
+            self.testdata["account"],
+            domainid=user_domain.id
+        )
+        self.cleanup.insert(-1, account2)
+
+        public_ip_range = PublicIpRange.create(
+            self.apiclient,
+            self.testdata["publiciprange"]
+        )
+        self.cleanup.append(public_ip_range)
+        PublicIpRange.dedicate(
+            self.apiclient,
+            public_ip_range.vlan.id,
+            account=account1.name,
+            domainid=account1.domainid
+        )
+
+        with self.assertRaises(Exception):
+            PublicIpRange.dedicate(
+                self.apiclient,
+                public_ip_range.vlan.id,
+                account=account2.name,
+                domainid=account2.domainid
+            )
+        return
+
+    @attr(tags=["advanced"], required_hardware="false")
+    def test_13_public_ips_limit(self):
+        """Dedicate public IP range to an account having lesser public
+           ip limit than range
+
+        # Validate the following:
+        # 1. Create a user domain and account
+        # 2. Set the public IP limit of account to 1
+        # 3. Create a Public IP range of 2 IPs
+        # 4. Try to dedicate the range to account
+        # 5. Operation should fail as it exceeds the account limit
+        """
+
+        user_domain = Domain.create(
+            self.apiclient,
+            services=self.testdata["domain"],
+            parentdomainid=self.domain.id)
+        self.cleanup.append(user_domain)
+
+        account1 = Account.create(
+            self.apiclient,
+            self.testdata["account"],
+            domainid=user_domain.id
+        )
+        self.cleanup.insert(-1, account1)
+
+        # Updating maximum public ips limit of account to 1
+        Resources.updateLimit(self.apiclient,
+                              resourcetype=1,
+                              max=1,
+                              account=account1.name,
+                              domainid=account1.domainid)
+
+        public_ip_range = PublicIpRange.create(
+            self.apiclient,
+            self.testdata["publiciprange"]
+        )
+        self.cleanup.append(public_ip_range)
+        # public ip range consists of 2 ips, hence dedication should fail
+        with self.assertRaises(Exception):
+            PublicIpRange.dedicate(
+                self.apiclient,
+                public_ip_range.vlan.id,
+                account=account1.name,
+                domainid=account1.domainid
+            )
+        return
+
+
+class TestReleaseIPs(cloudstackTestCase):
+
+    @classmethod
+    def setUpClass(cls):
+        cls.testClient = super(TestReleaseIPs, cls).getClsTestClient()
+        cls.apiclient = cls.testClient.getApiClient()
+        cls.testdata = cls.testClient.getParsedTestDataConfig()
+        # Get Zone, Domain
+        cls.domain = get_domain(cls.apiclient)
+        cls.zone = get_zone(cls.apiclient, cls.testClient.getZoneForTests())
+        cls.testdata["isolated_network"]["zoneid"] = cls.zone.id
+        cls.testdata["publiciprange"]["zoneid"] = cls.zone.id
+        cls._cleanup = []
+        try:
+            cls.isolated_network_offering = NetworkOffering.create(
+                cls.apiclient,
+                cls.testdata["isolated_network_offering"])
+            cls._cleanup.append(cls.isolated_network_offering)
+            cls.isolated_network_offering.update(
+                cls.apiclient,
+                state='Enabled')
+        except Exception as e:
+            cls.tearDownClass()
+            raise unittest.SkipTest(e)
+        return
+
+    @classmethod
+    def tearDownClass(cls):
+        try:
+            # Cleanup resources used
+            cleanup_resources(cls.apiclient, cls._cleanup)
+        except Exception as e:
+            raise Exception("Warning: Exception during cleanup : %s" % e)
+        return
+
+    def setUp(self):
+        self.apiclient = self.testClient.getApiClient()
+        self.dbclient = self.testClient.getDbConnection()
+        self.cleanup = []
+
+        # Setting up random public ip range
+        self.testdata["publiciprange"]["vlan"] = get_free_vlan(
+            self.apiclient,
+            self.zone.id)[1]
+        shared_network_subnet_number = random.randrange(1, 254)
+        self.testdata["publiciprange"]["gateway"] = "172.16." + \
+            str(shared_network_subnet_number) + ".1"
+        self.testdata["publiciprange"]["startip"] = "172.16." + \
+            str(shared_network_subnet_number) + ".2"
+        self.testdata["publiciprange"]["endip"] = "172.16." + \
+            str(shared_network_subnet_number) + ".3"
+        self.testdata["publiciprange"]["netmask"] = "255.255.255.0"
+        return
+
+    def tearDown(self):
+        try:
+            # Clean up
+            cleanup_resources(self.apiclient, self.cleanup)
+        except Exception as e:
+            raise Exception("Warning: Exception during cleanup : %s" % e)
+        return
+
+    @attr(tags=["advanced"], required_hardware="false")
+    def test_14_release_ip_from_dedicated_range(self):
+        """Disassociate a public IP from dedicated public IP range
+
+        # Validate the following:
+        # 1. Create an account in root domain
+        # 2. Create a guest network in the account
+        # 3. Acquire a public IP from global pool in this network
+             for source nat purpose
+        # 4. Create a public IP range
+        # 5. Dedicate this range to the account
+        # 6. Acquire public IP for the guest network
+        # 7. Verify that the public IP is from the dedicate range
+        # 8. Disassociate the public IP, the operation should be successful
+        """
+        # Create Account
+        account = Account.create(
+            self.apiclient,
+            self.testdata["account"],
+            domainid=self.domain.id
+        )
+        self.cleanup.append(account)
+
+        isolated_network = Network.create(
+            self.apiclient,
+            self.testdata["isolated_network"],
+            account.name,
+            account.domainid,
+            networkofferingid=self.isolated_network_offering.id)
+
+        # Acquiring IP for source nat purposes
+        PublicIPAddress.create(
+            self.apiclient,
+            accountid=account.name,
+            zoneid=self.zone.id,
+            domainid=account.domainid,
+            networkid=isolated_network.id)
+
+        public_ip_range = PublicIpRange.create(
+            self.apiclient,
+            self.testdata["publiciprange"]
+        )
+        self.cleanup.append(public_ip_range)
+        PublicIpRange.dedicate(
+            self.apiclient,
+            public_ip_range.vlan.id,
+            account=account.name,
+            domainid=account.domainid
+        )
+
+        formatted_startip = IPAddress(
+            self.testdata["publiciprange"]["startip"])
+        formatted_endip = IPAddress(self.testdata["publiciprange"]["endip"])
+        public_ip1 = PublicIPAddress.create(
+            self.apiclient,
+            accountid=account.name,
+            zoneid=self.zone.id,
+            domainid=account.domainid,
+            networkid=isolated_network.id)
+
+        formatted_publicip = IPAddress(public_ip1.ipaddress.ipaddress)
+
+        self.assertTrue(int(formatted_startip) <=
+                        int(formatted_publicip) <= int(formatted_endip),
+                        "publicip should be from the dedicated range")
+
+        public_ip1.delete(self.apiclient)
+        return
+
+    @attr(tags=["advanced"], required_hardware="false")
+    def test_15_release_dedicated_range(self):
+        """Release dedicated public ip range with no IPs acquired
+
+        # Validate the following:
+        # 1. Create a Public IP range in an account
+        # 2. Dedicate the created IP range to user account
+        # 3. Verify IP range is dedicated, verify with listVlanIpRanges
+        # 4. Release the public IP range, verify that it is released
+        """
+        # Create Account
+        account = Account.create(
+            self.apiclient,
+            self.testdata["account"],
+            domainid=self.domain.id
+        )
+        self.cleanup.append(account)
+
+        public_ip_range = PublicIpRange.create(
+            self.apiclient,
+            self.testdata["publiciprange"]
+        )
+        self.cleanup.append(public_ip_range)
+        PublicIpRange.dedicate(
+            self.apiclient,
+            public_ip_range.vlan.id,
+            account=account.name,
+            domainid=account.domainid
+        )
+
+        public_ip_ranges = PublicIpRange.list(
+            self.apiclient,
+            id=public_ip_range.vlan.id
+        )
+        self.assertEqual(validateList(public_ip_ranges)[0], PASS,
+                         "public ip ranges list validation failed")
+        self.assertEqual(
+            public_ip_ranges[0].account,
+            account.name,
+            "Check account name is in listVlanIpRanges\
+               as the account public ip range is dedicated to")
+
+        public_ip_range.release(self.apiclient)
+
+        public_ip_ranges = PublicIpRange.list(
+            self.apiclient,
+            id=public_ip_range.vlan.id
+        )
+        self.assertEqual(validateList(public_ip_ranges)[0], PASS,
+                         "public ip ranges list validation failed")
+        self.assertEqual(
+            str(public_ip_ranges[0].account).lower(),
+            "system",
+            "Check account name is system")
+        return
+
+    @attr(tags=["advanced"], required_hardware="false")
+    def test_21_release_dedicated_range_ip_address_in_use(self):
+        """Dedicate a public IP range, acquire some IPs and relese the range
+
+        # Validate the following:
+        # 1. Create an account
+        # 2. Create a guest network in the account
+        # 3. Create a Public IP range in an account
+        # 4. Dedicate the created IP range to user account
+        # 5. Acquire IP in the network and verify that it is from dedicated
+             range
+        # 6. Release the public IP range, verify that it is released
+        """
+        # Create Account
+        account = Account.create(
+            self.apiclient,
+            self.testdata["account"],
+            domainid=self.domain.id
+        )
+        self.cleanup.append(account)
+
+        public_ip_range = PublicIpRange.create(
+            self.apiclient,
+            self.testdata["publiciprange"]
+        )
+        self.cleanup.append(public_ip_range)
+        PublicIpRange.dedicate(
+            self.apiclient,
+            public_ip_range.vlan.id,
+            account=account.name,
+            domainid=account.domainid
+        )
+
+        public_ip_ranges = PublicIpRange.list(
+            self.apiclient,
+            id=public_ip_range.vlan.id
+        )
+        self.assertEqual(validateList(public_ip_ranges)[0], PASS,
+                         "public ip ranges list validation failed")
+        self.assertEqual(
+            public_ip_ranges[0].account,
+            account.name,
+            "Check account name is in listVlanIpRanges\
+               as the account public ip range is dedicated to")
+
+        isolated_network = Network.create(
+            self.apiclient,
+            self.testdata["isolated_network"],
+            account.name,
+            account.domainid,
+            networkofferingid=self.isolated_network_offering.id)
+
+        formatted_startip = IPAddress(
+            self.testdata["publiciprange"]["startip"])
+        formatted_endip = IPAddress(self.testdata["publiciprange"]["endip"])
+        public_ip1 = PublicIPAddress.create(
+            self.apiclient,
+            accountid=account.name,
+            zoneid=self.zone.id,
+            domainid=account.domainid,
+            networkid=isolated_network.id)
+
+        # Format the IP so that it can be used to compare with other IPs
+        formatted_publicip = IPAddress(public_ip1.ipaddress.ipaddress)
+
+        self.assertTrue(int(formatted_startip) <=
+                        int(formatted_publicip) <= int(formatted_endip),
+                        "publicip should be from the dedicated range")
+
+        public_ip_range.release(self.apiclient)
+
+        public_ip_ranges = PublicIpRange.list(
+            self.apiclient,
+            id=public_ip_range.vlan.id
+        )
+        self.assertEqual(validateList(public_ip_ranges)[0], PASS,
+                         "public ip ranges list validation failed")
+        self.assertEqual(
+            str(public_ip_ranges[0].account).lower(),
+            "system",
+            "Check account name is system")
+        return
+
+    @attr(tags=["advanced"], required_hardware="false")
+    def test_16_delete_ip_range_no_network_rules(self):
+        """Delete dedicated public IP range with no network rules on IP addresses
+
+        # Validate the following:
+        # 1. Create account in root domain
+        # 2. Create guest network in it
+        # 3. Create a Public IP range
+        # 4. Dedicate the created IP range to user account
+        # 5. Acquire public IP in guest network
+        # 6. Verify that IP address in from dedicated range
+        # 7. Delete the dedicated public IP range
+        # 8. The operation should be successful
+        """
+        # Create Account
+        account = Account.create(
+            self.apiclient,
+            self.testdata["account"],
+            domainid=self.domain.id
+        )
+        self.cleanup.append(account)
+
+        isolated_network = Network.create(
+            self.apiclient,
+            self.testdata["isolated_network"],
+            account.name,
+            account.domainid,
+            networkofferingid=self.isolated_network_offering.id)
+
+        # Acquiring ip for source nat purposes
+        PublicIPAddress.create(
+            self.apiclient,
+            accountid=account.name,
+            zoneid=self.zone.id,
+            domainid=account.domainid,
+            networkid=isolated_network.id)
+
+        public_ip_range = PublicIpRange.create(
+            self.apiclient,
+            self.testdata["publiciprange"]
+        )
+        self.cleanup.append(public_ip_range)
+        PublicIpRange.dedicate(
+            self.apiclient,
+            public_ip_range.vlan.id,
+            account=account.name,
+            domainid=account.domainid
+        )
+
+        formatted_startip = IPAddress(
+            self.testdata["publiciprange"]["startip"])
+        formatted_endip = IPAddress(self.testdata["publiciprange"]["endip"])
+        public_ip1 = PublicIPAddress.create(
+            self.apiclient,
+            accountid=account.name,
+            zoneid=self.zone.id,
+            domainid=account.domainid,
+            networkid=isolated_network.id)
+
+        formatted_publicip = IPAddress(public_ip1.ipaddress.ipaddress)
+
+        self.assertTrue(int(formatted_startip) <=
+                        int(formatted_publicip) <= int(formatted_endip),
+                        "publicip should be from the dedicated range")
+
+        public_ip_range.delete(self.apiclient)
+        self.cleanup.remove(public_ip_range)
+        return
+
+    @attr(tags=["advanced"], required_hardware="false")
+    def test_17_delete_ip_range_network_rules(self):
+        """Delete Dedicated public IP range with network rules on IP addresses
+
+        # Validate the following:
+        # 1. Create an account
+        # 2. Create a guest network in the account
+        # 3. Create a Public IP range
+        # 4  Dedicate the created IP range to user account
+        # 5. Acquire a public IP for the network
+        # 6. Verify that it is from the dedicated range
+        # 7. Create a LB rule for the public IP address
+        # 8. Try to delete the public IP range, the operation should fail
+        """
+        # Create Account
+        account = Account.create(
+            self.apiclient,
+            self.testdata["account"],
+            domainid=self.domain.id
+        )
+        self.cleanup.append(account)
+
+        isolated_network = Network.create(
+            self.apiclient,
+            self.testdata["isolated_network"],
+            account.name,
+            account.domainid,
+            networkofferingid=self.isolated_network_offering.id)
+
+        # Acquiring IP for source nat purpose
+        PublicIPAddress.create(
+            self.apiclient,
+            accountid=account.name,
+            zoneid=self.zone.id,
+            domainid=account.domainid,
+            networkid=isolated_network.id)
+
+        public_ip_range = PublicIpRange.create(
+            self.apiclient,
+            self.testdata["publiciprange"]
+        )
+        self.cleanup.append(public_ip_range)
+        PublicIpRange.dedicate(
+            self.apiclient,
+            public_ip_range.vlan.id,
+            account=account.name,
+            domainid=account.domainid
+        )
+
+        formatted_startip = IPAddress(
+            self.testdata["publiciprange"]["startip"])
+        formatted_endip = IPAddress(self.testdata["publiciprange"]["endip"])
+        public_ip = PublicIPAddress.create(
+            self.apiclient,
+            accountid=account.name,
+            zoneid=self.zone.id,
+            domainid=account.domainid,
+            networkid=isolated_network.id)
+
+        formatted_publicip = IPAddress(public_ip.ipaddress.ipaddress)
+
+        self.assertTrue(int(formatted_startip) <=
+                        int(formatted_publicip) <= int(formatted_endip),
+                        "publicip should be from the dedicated range")
+
+        LoadBalancerRule.create(
+            self.apiclient,
+            self.testdata["lbrule"],
+            ipaddressid=public_ip.ipaddress.id,
+            accountid=account.name,
+            networkid=isolated_network.id,
+            domainid=account.domainid)
+
+        with self.assertRaises(Exception):
+            public_ip_range.delete(self.apiclient)
+        return
+
+    @attr(tags=["advanced"], required_hardware="false")
+    def test_18_delete_network(self):
+        """Delete network with public IP from dedicated range acquired in it
+
+        # Validate the following:
+        # 1. Create an account
+        # 2. Create a guest network in it
+        # 1. Create a Public IP range
+        # 3. Dedicate the created IP range to user account
+        # 5. Acquire a public IP in the network
+        # 6. Verify that the IP is from the dedicated range
+        # 7. Delete the network
+        # 8. Verify that the public IP range is still dedicated to the account
+        """
+        # Create Account
+        account = Account.create(
+            self.apiclient,
+            self.testdata["account"],
+            domainid=self.domain.id
+        )
+        self.cleanup.append(account)
+
+        isolated_network = Network.create(
+            self.apiclient,
+            self.testdata["isolated_network"],
+            account.name,
+            account.domainid,
+            networkofferingid=self.isolated_network_offering.id)
+
+        # Acuiring IP for source nat purpose
+        PublicIPAddress.create(
+            self.apiclient,
+            accountid=account.name,
+            zoneid=self.zone.id,
+            domainid=account.domainid,
+            networkid=isolated_network.id)
+
+        public_ip_range = PublicIpRange.create(
+            self.apiclient,
+            self.testdata["publiciprange"]
+        )
+        self.cleanup.append(public_ip_range)
+        PublicIpRange.dedicate(
+            self.apiclient,
+            public_ip_range.vlan.id,
+            account=account.name,
+            domainid=account.domainid
+        )
+
+        formatted_startip = IPAddress(
+            self.testdata["publiciprange"]["startip"])
+        formatted_endip = IPAddress(self.testdata["publiciprange"]["endip"])
+        public_ip1 = PublicIPAddress.create(
+            self.apiclient,
+            accountid=account.name,
+            zoneid=self.zone.id,
+            domainid=account.domainid,
+            networkid=isolated_network.id)
+
+        formatted_publicip = IPAddress(public_ip1.ipaddress.ipaddress)
+
+        self.assertTrue(int(formatted_startip) <=
+                        int(formatted_publicip) <= int(formatted_endip),
+                        "publicip should be from the dedicated range")
+
+        isolated_network.delete(self.apiclient)
+
+        public_ip_ranges = PublicIpRange.list(
+            self.apiclient,
+            id=public_ip_range.vlan.id
+        )
+        self.assertEqual(validateList(public_ip_ranges)[0], PASS,
+                         "public ip ranges list validation failed")
+        self.assertEqual(
+            public_ip_ranges[0].account,
+            account.name,
+            "Check account name is in listVlanIpRanges\
+               as the account public ip range is dedicated to")
+        return
+
+    @attr(tags=["advanced"], required_hardware="false")
+    def test_19_delete_account(self):
+        """Create guest network in account with dedicated public ip range
+
+        # Validate the following:
+        # 1. Create an account
+        # 2. Create a Public IP range
+        # 3. Dedicate the created IP range to user account
+        # 4. Delete the account
+        # 5. Verify that the public IP range is released back to the system
+        """
+        # Create Account
+        account = Account.create(
+            self.apiclient,
+            self.testdata["account"],
+            domainid=self.domain.id
+        )
+        self.cleanup.append(account)
+
+        isolated_network = Network.create(
+            self.apiclient,
+            self.testdata["isolated_network"],
+            account.name,
+            account.domainid,
+            networkofferingid=self.isolated_network_offering.id)
+
+        public_ip_range = PublicIpRange.create(
+            self.apiclient,
+            self.testdata["publiciprange"]
+        )
+        self.cleanup.append(public_ip_range)
+        PublicIpRange.dedicate(
+            self.apiclient,
+            public_ip_range.vlan.id,
+            account=account.name,
+            domainid=account.domainid
+        )
+
+        formatted_startip = IPAddress(
+            self.testdata["publiciprange"]["startip"])
+        formatted_endip = IPAddress(self.testdata["publiciprange"]["endip"])
+        public_ip1 = PublicIPAddress.create(
+            self.apiclient,
+            accountid=account.name,
+            zoneid=self.zone.id,
+            domainid=account.domainid,
+            networkid=isolated_network.id)
+
+        formatted_publicip = IPAddress(public_ip1.ipaddress.ipaddress)
+
+        self.assertTrue(int(formatted_startip) <=
+                        int(formatted_publicip) <= int(formatted_endip),
+                        "publicip should be from the dedicated range")
+
+        account.delete(self.apiclient)
+        self.cleanup.remove(account)
+
+        public_ip_ranges = PublicIpRange.list(
+            self.apiclient,
+            id=public_ip_range.vlan.id
+        )
+        self.assertEqual(validateList(public_ip_ranges)[0], PASS,
+                         "public ip ranges list validation failed")
+        self.assertEqual(
+            str(public_ip_ranges[0].account).lower(),
+            "system",
+            "Account name should be system")
+        return
+
+    @attr(tags=["advanced"], required_hardware="false")
+    def test_20_release_range_not_dedicated(self):
+        """Create guest network in account with dedicated public ip range
+
+        # Validate the following:
+        # 1. Create a Public IP range
+        # 2. Do not dedicate it to any account, try to release it
+        # 3. Operation should fail as the range is not dedicated
+        """
+        public_ip_range = PublicIpRange.create(
+            self.apiclient,
+            self.testdata["publiciprange"]
+        )
+        self.cleanup.append(public_ip_range)
+
+        with self.assertRaises(Exception):
+            public_ip_range.release(self.apiclient)
+        return

http://git-wip-us.apache.org/repos/asf/cloudstack/blob/191bcdd4/tools/marvin/marvin/config/test_data.py
----------------------------------------------------------------------
diff --git a/tools/marvin/marvin/config/test_data.py b/tools/marvin/marvin/config/test_data.py
index 80ead64..28eae42 100644
--- a/tools/marvin/marvin/config/test_data.py
+++ b/tools/marvin/marvin/config/test_data.py
@@ -41,6 +41,15 @@ test_data = {
             "name": "Project",
         "displaytext": "Test project"
     },
+    "publiciprange": {
+        "gateway": "",
+        "netmask": "",
+        "startip": "",
+        "endip": "",
+        "forvirtualnetwork": "true",
+        "vlan": "",
+        "zoneid": ""
+    },
     "private_gateway": {
        "ipaddress": "172.16.1.2",
        "gateway": "172.16.1.1",

http://git-wip-us.apache.org/repos/asf/cloudstack/blob/191bcdd4/tools/marvin/marvin/lib/base.py
----------------------------------------------------------------------
diff --git a/tools/marvin/marvin/lib/base.py b/tools/marvin/marvin/lib/base.py
index 5ca1bc2..0ea1858 100755
--- a/tools/marvin/marvin/lib/base.py
+++ b/tools/marvin/marvin/lib/base.py
@@ -3047,7 +3047,7 @@ class PublicIpRange:
         self.__dict__.update(items)
 
     @classmethod
-    def create(cls, apiclient, services):
+    def create(cls, apiclient, services, account=None, domainid=None):
         """Create VlanIpRange"""
 
         cmd = createVlanIpRange.createVlanIpRangeCmd()
@@ -3061,6 +3061,11 @@ class PublicIpRange:
             cmd.podid = services["podid"]
         cmd.vlan = services["vlan"]
 
+        if account:
+            cmd.account = account
+        if domainid:
+            cmd.domainid = domainid
+
         return PublicIpRange(apiclient.createVlanIpRange(cmd).__dict__)
 
     def delete(self, apiclient):