test_azure_security_service.py 5.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127
  1. import json
  2. import unittest
  3. import uuid
  4. from cloudbridge.cloud.interfaces import TestMockHelperMixin
  5. from test.helpers import ProviderTestBase
  6. import test.helpers as helpers
  7. class AzureSecurityServiceTestCase(ProviderTestBase):
  8. def __init__(self, methodName, provider):
  9. super(AzureSecurityServiceTestCase, self).__init__(
  10. methodName=methodName, provider=provider)
  11. @helpers.skipIfNoService(['security.security_groups'])
  12. def test_azure_security_group_create(self):
  13. name = "testCreateSecGroup3"
  14. sg = self.provider.security.security_groups.create(
  15. name=name, description=name, network_id="")
  16. print("Create( " + "Name-" + sg.name + " Id-" + sg.id + " Rules - " + str(sg.rules) + " )")
  17. self.assertEqual(name, sg.name)
  18. @helpers.skipIfNoService(['security.security_groups'])
  19. def test_azure_security_group_list(self):
  20. sgl = self.provider.security.security_groups.list()
  21. found_sg = [g.name for g in sgl]
  22. for group in sgl:
  23. print("List( " + "Name-" + group.name + " Id-" + group.id + " Rules - " + " )")
  24. self.assertTrue(
  25. len(sgl) == 3,
  26. "Count should be 3")
  27. @helpers.skipIfNoService(['security.security_groups'])
  28. def test_azure_security_group_get_found(self):
  29. sgl = self.provider.security.security_groups.get("sg3")
  30. print("Get ( " + "Name - " + sgl.name + " Id - " + sgl.id + " )")
  31. self.assertTrue(
  32. sgl.name == "sec_group3",
  33. "SG name should be sec_group2")
  34. @helpers.skipIfNoService(['security.security_groups'])
  35. def test_azure_security_group_get_not_found(self):
  36. sgl = self.provider.security.security_groups.get("sg4")
  37. print(str(sgl))
  38. self.assertTrue(
  39. sgl == None,
  40. "Security group does not exist. Should return None.")
  41. @helpers.skipIfNoService(['security.security_groups'])
  42. def test_azure_security_group_delete_IdExists(self):
  43. sg = self.provider.security.security_groups.delete("sg2")
  44. print("Delete - ")
  45. self.assertEqual(sg, True)
  46. @helpers.skipIfNoService(['security.security_groups'])
  47. def test_azure_security_group_delete_IdNotExist(self):
  48. sg = self.provider.security.security_groups.delete("sg5")
  49. self.assertEqual(sg, False)
  50. @helpers.skipIfNoService(['security.security_groups'])
  51. def test_azure_security_group_rule_create(self):
  52. list = self.provider.security.security_groups.list()
  53. cb = list.data[0]
  54. rules = cb.rules
  55. for rule in rules:
  56. print(str(rule))
  57. print("Before creating Rule - " + str(rules[0]) + " length - " + str(len(rules)))
  58. cb.add_rule('*', '25', '100', '*')
  59. rules = cb.rules
  60. print("After creating Rule - " + str(rules[0]) + " length - " + str(len(rules)))
  61. self.assertEqual(len(rules), 3)
  62. @helpers.skipIfNoService(['security.security_groups'])
  63. def test_azure_security_group_rule_delete(self):
  64. list = self.provider.security.security_groups.list()
  65. cb = list.data[0]
  66. rules = cb.rules
  67. print("Before deleting Rule - " + str(rules[0]) + " length - " + str(len(rules)))
  68. rules[1].delete()
  69. rules = cb.rules
  70. print("After deleting Rule - " + str(rules[0]) + " length - " + str(len(rules)))
  71. self.assertEqual(len(rules), 2)
  72. @helpers.skipIfNoService(['security.security_groups'])
  73. def test_azure_security_group_rule_delete_Default(self):
  74. list = self.provider.security.security_groups.list()
  75. cb = list.data[0]
  76. rules = cb.rules
  77. print("Before deleting Rule - " + str(rules[0]) + " length - " + str(len(rules)))
  78. with self.assertRaises(Exception):
  79. rules[0].delete()
  80. @helpers.skipIfNoService(['security.security_groups'])
  81. def test_azure_security_group_rule_get_exist(self):
  82. list = self.provider.security.security_groups.list()
  83. cb = list.data[0]
  84. rule = cb.get_rule('*', '25', '1', '100')
  85. print("Get Rule - " + str(rule))
  86. self.assertEqual(str(rule), "<CBSecurityGroupRule: IP: *; from: 25; to: 1; grp: None>")
  87. @helpers.skipIfNoService(['security.security_groups'])
  88. def test_azure_security_group_rule_get_notExist(self):
  89. list = self.provider.security.security_groups.list()
  90. cb = list.data[0]
  91. rule = cb.get_rule('*', '25', '1', '1')
  92. print("Get Rule - " + str(rule))
  93. self.assertEqual(str(rule), 'None')
  94. @helpers.skipIfNoService(['security.security_groups'])
  95. def test_azure_security_group_to_json(self):
  96. list = self.provider.security.security_groups.list()
  97. cb = list.data[0]
  98. rule = cb.to_json()
  99. print("Get Rule - " + str(rule))
  100. self.assertEqual(rule[2:4], "id")
  101. @helpers.skipIfNoService(['security.security_groups'])
  102. def test_azure_security_group_rule_to_json(self):
  103. list = self.provider.security.security_groups.list()
  104. cb = list.data[0]
  105. rules = cb.rules
  106. rule = rules[0]
  107. json = rule.to_json()
  108. print("Get Rule - " + str(json))
  109. self.assertEqual(json[2:9], "cidr_ip")