test_integration_azure_security_group.py 3.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687
  1. import uuid
  2. import azure_integration_test.helpers as helpers
  3. from azure_integration_test.helpers import ProviderTestBase
  4. class AzureIntegrationSecurityServiceTestCase(ProviderTestBase):
  5. @helpers.skipIfNoService(['security.security_groups'])
  6. def test_azure_security_group(self):
  7. sg_name = '{0}'.format(uuid.uuid4())
  8. print("SG guid - " + sg_name)
  9. listBeforeCreate = self.provider.security.security_groups.list()
  10. print("Length Before create - " + str(len(listBeforeCreate)))
  11. # netId = "/subscriptions/7904d702-e01c-4826-8519-f5a25c866a96
  12. # /resourceGroups/CloudBridge-Azure'\
  13. # '/providers/Microsoft.Network/virtualNetworks/SampleNetwork"
  14. sg = self.provider.security.security_groups.create(
  15. name=sg_name, description="testCreateSecGroup", network_id='')
  16. self.assertEqual(sg_name, sg.name)
  17. print(str(sg))
  18. listAfterCreate = self.provider.security.security_groups.list()
  19. print("Length After create - " + str(len(listAfterCreate)))
  20. self.assertEqual(len(listAfterCreate), len(listBeforeCreate) + 1)
  21. get = self.provider.security.security_groups.get(sg_name)
  22. print("Get SG - " + str(get))
  23. print(str(get.rules))
  24. self.assertEqual(get.name, sg_name)
  25. get_notfound = self.provider.security.\
  26. security_groups.get("SecgrupDontFindMe")
  27. self.assertEqual(get_notfound, None)
  28. find_exists_list = self.provider.security.security_groups.find(sg_name)
  29. for sg in find_exists_list:
  30. self.assertTrue(sg_name in sg.name)
  31. print("Find - " + str(find_exists_list))
  32. print("Find Total Results- " + str(find_exists_list.total_results))
  33. self.assertTrue(find_exists_list.total_results > 0)
  34. find_not_exists_list = self.provider.security.security_groups. \
  35. find('dontfindme')
  36. self.assertTrue(find_not_exists_list.total_results == 0)
  37. lenBeforeCreateRule = len(sg.rules)
  38. sg.add_rule('tcp', '1111', '2222', '0.0.0.0/0')
  39. lenAfterCreateRule = len(sg.rules)
  40. print("Length before create rule - " + str(lenBeforeCreateRule))
  41. print("Length after create rule - " + str(lenAfterCreateRule))
  42. self.assertEqual(lenAfterCreateRule, lenBeforeCreateRule + 1)
  43. print("create second rule ")
  44. sg.add_rule('tcp', '1111', '2222', '0.0.0.0/0')
  45. print("Length before second create rule - " + str(lenBeforeCreateRule))
  46. print("Length after second create rule - " + str(lenAfterCreateRule))
  47. print(str(sg.rules))
  48. get_rule = sg.get_rule('tcp', '1111', '2222', '0.0.0.0/0')
  49. print("Get Rule - " + str(get_rule))
  50. self.assertIsNotNone(get_rule)
  51. get_rule_notfound = sg.get_rule('*', '25', '1', '1')
  52. self.assertEqual(str(get_rule_notfound), 'None')
  53. rule_json = sg.rules[0].to_json()
  54. print("Rule json - " + str(rule_json))
  55. self.assertIsNotNone(rule_json)
  56. sg_json = sg.to_json()
  57. print("SG json - " + str(sg_json))
  58. self.assertIsNotNone(sg_json)
  59. listBeforeDeleteFound = self.provider.security.security_groups.list()
  60. self.provider.security.security_groups.delete(sg_name)
  61. listAfterDeleteFound = self.provider.security.security_groups.list()
  62. print("Length before delete - " + str(len(listBeforeDeleteFound)))
  63. print("Length after delete - " + str(len(listAfterDeleteFound)))
  64. self.assertEqual(
  65. len(listAfterDeleteFound), len(listBeforeDeleteFound) - 1)
  66. sg_id = "sg5"
  67. self.provider.security.security_groups.delete(sg_id)
  68. listAfterDeleteNotFound = self.provider.security.security_groups.list()
  69. self.assertEqual(
  70. len(listAfterDeleteNotFound), len(listAfterDeleteFound))