test_security_service.py 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260
  1. """Test cloudbridge.security modules."""
  2. import json
  3. import uuid
  4. from test.helpers import ProviderTestBase
  5. import test.helpers as helpers
  6. class CloudSecurityServiceTestCase(ProviderTestBase):
  7. def __init__(self, methodName, provider):
  8. super(CloudSecurityServiceTestCase, self).__init__(
  9. methodName=methodName, provider=provider)
  10. @helpers.skipIfNoService(['security.key_pairs'])
  11. def test_crud_key_pair_service(self):
  12. name = 'cbtestkeypairA-{0}'.format(uuid.uuid4())
  13. kp = self.provider.security.key_pairs.create(name=name)
  14. with helpers.cleanup_action(
  15. lambda:
  16. self.provider.security.key_pairs.delete(key_pair_id=kp.id)
  17. ):
  18. # test list method
  19. kpl = self.provider.security.key_pairs.list()
  20. list_kpl = [i for i in kpl if i.name == name]
  21. self.assertTrue(
  22. len(list_kpl) == 1,
  23. "List key pairs does not return the expected key pair %s" %
  24. name)
  25. # check iteration
  26. iter_kpl = [i for i in self.provider.security.key_pairs
  27. if i.name == name]
  28. self.assertTrue(
  29. len(iter_kpl) == 1,
  30. "Iter key pairs does not return the expected key pair %s" %
  31. name)
  32. # check find
  33. find_kp = self.provider.security.key_pairs.find(name=name)[0]
  34. self.assertTrue(
  35. find_kp == kp,
  36. "Find key pair did not return the expected key {0}."
  37. .format(name))
  38. # check get
  39. get_kp = self.provider.security.key_pairs.get(name)
  40. self.assertTrue(
  41. get_kp == kp,
  42. "Get key pair did not return the expected key {0}."
  43. .format(name))
  44. # Recreating existing keypair should raise an exception
  45. with self.assertRaises(Exception):
  46. self.provider.security.key_pairs.create(name=name)
  47. kpl = self.provider.security.key_pairs.list()
  48. found_kp = [k for k in kpl if k.name == name]
  49. self.assertTrue(
  50. len(found_kp) == 0,
  51. "Key pair {0} should have been deleted but still exists."
  52. .format(name))
  53. no_kp = self.provider.security.key_pairs.find(name='bogus_kp')
  54. self.assertFalse(
  55. no_kp,
  56. "Found a key pair {0} that should not exist?".format(no_kp))
  57. @helpers.skipIfNoService(['security.key_pairs'])
  58. def test_key_pair(self):
  59. name = 'cbtestkeypairB-{0}'.format(uuid.uuid4())
  60. kp = self.provider.security.key_pairs.create(name=name)
  61. with helpers.cleanup_action(lambda: kp.delete()):
  62. kpl = self.provider.security.key_pairs.list()
  63. found_kp = [k for k in kpl if k.name == name]
  64. self.assertTrue(
  65. len(found_kp) == 1,
  66. "List key pairs did not return the expected key {0}."
  67. .format(name))
  68. self.assertTrue(
  69. kp.id in repr(kp),
  70. "repr(obj) should contain the object id so that the object"
  71. " can be reconstructed, but does not. eval(repr(obj)) == obj")
  72. self.assertIsNotNone(
  73. kp.material,
  74. "KeyPair material is empty but it should not be.")
  75. self.assertTrue(
  76. kp == kp,
  77. "The same key pair should be equal to self.")
  78. json_repr = json.dumps(
  79. {"material": kp.material, "id": name, "name": name},
  80. sort_keys=True)
  81. self.assertEqual(
  82. kp.to_json(), json_repr,
  83. "JSON key pair representation {0} does not match expected {1}"
  84. .format(kp.to_json(), json_repr))
  85. kpl = self.provider.security.key_pairs.list()
  86. found_kp = [k for k in kpl if k.name == name]
  87. self.assertTrue(
  88. len(found_kp) == 0,
  89. "Key pair {0} should have been deleted but still exists."
  90. .format(name))
  91. def cleanup_sg(self, sg, net):
  92. with helpers.cleanup_action(
  93. lambda: self.provider.network.delete(network_id=net.id)):
  94. self.provider.security.security_groups.delete(group_id=sg.id)
  95. @helpers.skipIfNoService(['security.security_groups'])
  96. def test_crud_security_group_service(self):
  97. name = 'cbtestsecuritygroupA-{0}'.format(uuid.uuid4())
  98. net = self.provider.network.create(name=name)
  99. sg = self.provider.security.security_groups.create(
  100. name=name, description=name, network_id=net.id)
  101. with helpers.cleanup_action(lambda: self.cleanup_sg(sg, net)):
  102. self.assertEqual(name, sg.description)
  103. # test list method
  104. sgl = self.provider.security.security_groups.list()
  105. found_sgl = [i for i in sgl if i.name == name]
  106. self.assertTrue(
  107. len(found_sgl) == 1,
  108. "List security groups does not return the expected group %s" %
  109. name)
  110. # check iteration
  111. found_sgl = [i for i in self.provider.security.security_groups
  112. if i.name == name]
  113. self.assertTrue(
  114. len(found_sgl) == 1,
  115. "Iter security groups does not return the expected group %s" %
  116. name)
  117. # check find
  118. find_sg = self.provider.security.security_groups.find(name=sg.name)
  119. self.assertTrue(
  120. len(find_sg) == 1,
  121. "List security groups returned {0} when expected was: {1}."
  122. .format(find_sg, sg.name))
  123. # check get
  124. get_sg = self.provider.security.security_groups.get(sg.id)
  125. self.assertTrue(
  126. get_sg == sg,
  127. "Get SecurityGroup did not return the expected key {0}."
  128. .format(name))
  129. self.assertTrue(
  130. sg.id in repr(sg),
  131. "repr(obj) should contain the object id so that the object"
  132. " can be reconstructed, but does not. eval(repr(obj)) == obj")
  133. sgl = self.provider.security.security_groups.list()
  134. found_sg = [g for g in sgl if g.name == name]
  135. self.assertTrue(
  136. len(found_sg) == 0,
  137. "Security group {0} should have been deleted but still exists."
  138. .format(name))
  139. no_sg = self.provider.security.security_groups.find(name='bogus_sg')
  140. self.assertTrue(
  141. len(no_sg) == 0,
  142. "Found a bogus security group?!?".format(no_sg))
  143. @helpers.skipIfNoService(['security.security_groups'])
  144. def test_security_group(self):
  145. """Test for proper creation of a security group."""
  146. name = 'cbtestsecuritygroupB-{0}'.format(uuid.uuid4())
  147. net = self.provider.network.create(name=name)
  148. sg = self.provider.security.security_groups.create(
  149. name=name, description=name, network_id=net.id)
  150. with helpers.cleanup_action(lambda: self.cleanup_sg(sg, net)):
  151. rule = sg.add_rule(ip_protocol='tcp', from_port=1111, to_port=1111,
  152. cidr_ip='0.0.0.0/0')
  153. found_rule = sg.get_rule(ip_protocol='tcp', from_port=1111,
  154. to_port=1111, cidr_ip='0.0.0.0/0')
  155. self.assertTrue(
  156. rule == found_rule,
  157. "Expected rule {0} not found in security group: {0}".format(
  158. rule, sg.rules))
  159. object_keys = (
  160. sg.rules[0].ip_protocol,
  161. sg.rules[0].from_port,
  162. sg.rules[0].to_port)
  163. self.assertTrue(
  164. all(str(key) in repr(sg.rules[0]) for key in object_keys),
  165. "repr(obj) should contain ip_protocol, form_port, and to_port"
  166. " so that the object can be reconstructed, but does not:"
  167. " {0}; {1}".format(sg.rules[0], object_keys))
  168. self.assertTrue(
  169. sg == sg,
  170. "The same security groups should be equal?")
  171. self.assertFalse(
  172. sg != sg,
  173. "The same security groups should still be equal?")
  174. # json_repr = json.dumps(
  175. # {"description": name, "name": name, "id": sg.id,
  176. # "rules":
  177. # [{"from_port": 1111, "group": "", "cidr_ip": "0.0.0.0/0",
  178. # "parent": sg.id, "to_port": 1111, "ip_protocol": "tcp",
  179. # "id": sg.rules[0].id}]},
  180. # sort_keys=True)
  181. # self.assertTrue(
  182. # sg.to_json() == json_repr,
  183. # "JSON sec group representation {0} does not match expected {1}"
  184. # .format(sg.to_json(), json_repr))
  185. sgl = self.provider.security.security_groups.list()
  186. found_sg = [g for g in sgl if g.name == name]
  187. self.assertTrue(
  188. len(found_sg) == 0,
  189. "Security group {0} should have been deleted but still exists."
  190. .format(name))
  191. @helpers.skipIfNoService(['security.security_groups'])
  192. def test_security_group_rule_add_twice(self):
  193. """Test whether adding the same rule twice succeeds."""
  194. name = 'cbtestsecuritygroupB-{0}'.format(uuid.uuid4())
  195. net = self.provider.network.create(name=name)
  196. sg = self.provider.security.security_groups.create(
  197. name=name, description=name, network_id=net.id)
  198. with helpers.cleanup_action(lambda: self.cleanup_sg(sg, net)):
  199. rule = sg.add_rule(ip_protocol='tcp', from_port=1111, to_port=1111,
  200. cidr_ip='0.0.0.0/0')
  201. # attempting to add the same rule twice should succeed
  202. same_rule = sg.add_rule(ip_protocol='tcp', from_port=1111,
  203. to_port=1111, cidr_ip='0.0.0.0/0')
  204. self.assertTrue(
  205. rule == same_rule,
  206. "Expected rule {0} not found in security group: {0}".format(
  207. same_rule, sg.rules))
  208. @helpers.skipIfNoService(['security.security_groups'])
  209. def test_security_group_group_rule(self):
  210. """Test for proper creation of a security group rule."""
  211. name = 'cbtestsecuritygroupC-{0}'.format(uuid.uuid4())
  212. net = self.provider.network.create(name=name)
  213. sg = self.provider.security.security_groups.create(
  214. name=name, description=name, network_id=net.id)
  215. with helpers.cleanup_action(lambda: self.cleanup_sg(sg, net)):
  216. self.assertTrue(
  217. len(sg.rules) == 0,
  218. "Expected no security group group rule. Got {0}."
  219. .format(sg.rules))
  220. rule = sg.add_rule(src_group=sg, ip_protocol='tcp', from_port=1,
  221. to_port=65535)
  222. self.assertTrue(
  223. rule.group.name == name,
  224. "Expected security group rule name {0}. Got {1}."
  225. .format(name, rule.group.name))
  226. for r in sg.rules:
  227. r.delete()
  228. sg = self.provider.security.security_groups.get(sg.id) # update
  229. self.assertTrue(
  230. len(sg.rules) == 0,
  231. "Deleting SecurityGroupRule should delete it: {0}".format(
  232. sg.rules))
  233. sgl = self.provider.security.security_groups.list()
  234. found_sg = [g for g in sgl if g.name == name]
  235. self.assertTrue(
  236. len(found_sg) == 0,
  237. "Security group {0} should have been deleted but still exists."
  238. .format(name))