test_provider_security_service.py 6.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141
  1. import uuid
  2. from test.helpers import ProviderTestBase
  3. import test.helpers as helpers
  4. class ProviderSecurityServiceTestCase(ProviderTestBase):
  5. def __init__(self, methodName, provider):
  6. super(ProviderSecurityServiceTestCase, self).__init__(
  7. methodName=methodName, provider=provider)
  8. def test_crud_key_pair_service(self):
  9. name = 'cbtestkeypairA-{0}'.format(uuid.uuid4())
  10. kp = self.provider.security.key_pairs.create(name=name)
  11. with helpers.cleanup_action(
  12. lambda:
  13. self.provider.security.key_pairs.delete(name=kp.name)
  14. ):
  15. found_kp = self.provider.security.key_pairs.find(name=name)
  16. self.assertTrue(
  17. found_kp == kp,
  18. "Find key pair did not return the expected key {0}."
  19. .format(name))
  20. kpl = self.provider.security.key_pairs.list()
  21. found_kp = [k for k in kpl if k.name == name]
  22. self.assertTrue(
  23. len(found_kp) == 0,
  24. "Key pair {0} should have been deleted but still exists."
  25. .format(name))
  26. no_kp = self.provider.security.key_pairs.find(name='bogus_kp')
  27. self.assertTrue(
  28. no_kp is None,
  29. "Found a key pair {0} that should not exist?".format(no_kp))
  30. def test_key_pair(self):
  31. name = 'cbtestkeypairB-{0}'.format(uuid.uuid4())
  32. kp = self.provider.security.key_pairs.create(name=name)
  33. with helpers.cleanup_action(lambda: kp.delete()):
  34. kpl = self.provider.security.key_pairs.list()
  35. found_kp = [k for k in kpl if k.name == name]
  36. self.assertTrue(
  37. len(found_kp) == 1,
  38. "List key pairs did not return the expected key {0}."
  39. .format(name))
  40. self.assertTrue(
  41. repr(kp) == "<CBKeyPair: {0}>".format(name),
  42. "KeyPair repr {0} not matching expected format.".format(kp))
  43. self.assertIsNotNone(
  44. kp.material,
  45. "KeyPair material is empty but it should not be.")
  46. self.assertTrue(
  47. kp == kp,
  48. "The same key pair should be equal to self.")
  49. kpl = self.provider.security.key_pairs.list()
  50. found_kp = [k for k in kpl if k.name == name]
  51. self.assertTrue(
  52. len(found_kp) == 0,
  53. "Key pair {0} should have been deleted but still exists."
  54. .format(name))
  55. def test_crud_security_group_service(self):
  56. name = 'cbtestsecuritygroupA-{0}'.format(uuid.uuid4())
  57. sg = self.provider.security.security_groups.create(
  58. name=name, description=name)
  59. with helpers.cleanup_action(
  60. lambda:
  61. self.provider.security.security_groups.delete(group_id=sg.id)
  62. ):
  63. sgl = self.provider.security.security_groups.get(
  64. group_names=[
  65. sg.name])
  66. found_sg = [g for g in sgl if g.name == name]
  67. self.assertTrue(
  68. len(found_sg) == 1,
  69. "List security groups did not return the expected group {0}."
  70. .format(name))
  71. sgl = self.provider.security.security_groups.list()
  72. found_sg = [g for g in sgl if g.name == name]
  73. self.assertTrue(
  74. len(found_sg) == 0,
  75. "Security group {0} should have been deleted but still exists."
  76. .format(name))
  77. def test_security_group(self):
  78. """Test for proper creation of a security group."""
  79. name = 'cbtestsecuritygroupB-{0}'.format(uuid.uuid4())
  80. sg = self.provider.security.security_groups.create(
  81. name=name, description=name)
  82. with helpers.cleanup_action(lambda: sg.delete()):
  83. sg.add_rule(ip_protocol='tcp', from_port=1111, to_port=1111,
  84. cidr_ip='0.0.0.0/0')
  85. found_rules = [rule for rule in sg.rules if
  86. rule.cidr_ip == '0.0.0.0/0' and
  87. rule.ip_protocol == 'tcp' and
  88. rule.from_port == 1111 and
  89. rule.to_port == 1111]
  90. self.assertTrue(
  91. len(found_rules) == 1,
  92. "Expected rule not found in security group: {0}".format(name))
  93. self.assertTrue(
  94. repr(sg.rules[0]) == ("<CBSecurityGroupRule: IP: {0}; from: "
  95. "{1}; to: {2}>"
  96. .format(sg.rules[0].ip_protocol,
  97. sg.rules[0].from_port,
  98. sg.rules[0].to_port)),
  99. ("Security group rule repr {0} not matching expected format."
  100. .format(sg.rules[0])))
  101. self.assertTrue(
  102. sg == sg,
  103. "The same security groups should be equal?")
  104. self.assertFalse(
  105. sg != sg,
  106. "The same security groups should still be equal?")
  107. sgl = self.provider.security.security_groups.list()
  108. found_sg = [g for g in sgl if g.name == name]
  109. self.assertTrue(
  110. len(found_sg) == 0,
  111. "Security group {0} should have been deleted but still exists."
  112. .format(name))
  113. def test_security_group_group_role(self):
  114. """Test for proper creation of a security group rule."""
  115. name = 'cbtestsecuritygroupC-{0}'.format(uuid.uuid4())
  116. sg = self.provider.security.security_groups.create(
  117. name=name, description=name)
  118. with helpers.cleanup_action(lambda: sg.delete()):
  119. self.assertTrue(
  120. len(sg.rules) == 0,
  121. "Expected no security group group rule. Got {0}."
  122. .format(sg.rules))
  123. sg.add_rule(src_group=sg)
  124. self.assertTrue(
  125. sg.rules[0].group.name == name,
  126. "Expected security group rule name {0}. Got {1}."
  127. .format(name, sg.rules[0].group.name))
  128. sgl = self.provider.security.security_groups.list()
  129. found_sg = [g for g in sgl if g.name == name]
  130. self.assertTrue(
  131. len(found_sg) == 0,
  132. "Security group {0} should have been deleted but still exists."
  133. .format(name))