test_provider_security_service.py 5.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119
  1. import uuid
  2. from test.helpers import ProviderTestBase
  3. import test.helpers as helpers
  4. class ProviderSecurityServiceTestCase(ProviderTestBase):
  5. def __init__(self, methodName, provider):
  6. super(ProviderSecurityServiceTestCase, self).__init__(
  7. methodName=methodName, provider=provider)
  8. def test_crud_key_pair_service(self):
  9. name = 'cbtestkeypairA-{0}'.format(uuid.uuid4())
  10. kp = self.provider.security.key_pairs.create(name=name)
  11. with helpers.exception_action(
  12. lambda:
  13. self.provider.security.key_pairs.delete(name=kp.name)
  14. ):
  15. kpl = self.provider.security.key_pairs.list()
  16. found_kp = [k for k in kpl if k.name == name]
  17. self.assertTrue(
  18. len(found_kp) == 1,
  19. "List key pairs did not return the expected key {0}."
  20. .format(name))
  21. self.provider.security.key_pairs.delete(name=kp.name)
  22. kpl = self.provider.security.key_pairs.list()
  23. found_kp = [k for k in kpl if k.name == name]
  24. self.assertTrue(
  25. len(found_kp) == 0,
  26. "Key pair {0} should have been deleted but still exists."
  27. .format(name))
  28. no_kp = self.provider.security.key_pairs.delete(name='bogus_kp')
  29. self.assertTrue(
  30. no_kp,
  31. "Found a key pair {0} that should not exist?".format(no_kp))
  32. def test_key_pair(self):
  33. name = 'cbtestkeypairB-{0}'.format(uuid.uuid4())
  34. kp = self.provider.security.key_pairs.create(name=name)
  35. with helpers.exception_action(
  36. lambda:
  37. self.provider.security.key_pairs.delete(name=kp.name)
  38. ):
  39. kpl = self.provider.security.key_pairs.list()
  40. found_kp = [k for k in kpl if k.name == name]
  41. self.assertTrue(
  42. len(found_kp) == 1,
  43. "List key pairs did not return the expected key {0}."
  44. .format(name))
  45. self.assertTrue(
  46. repr(kp) == "<CBKeyPair: {0}>".format(name),
  47. "KeyPair repr {0} not matching expected format.".format(kp))
  48. self.assertIsNotNone(
  49. kp.material,
  50. "KeyPair material is empty but it should not be.")
  51. kp.delete()
  52. kpl = self.provider.security.key_pairs.list()
  53. found_kp = [k for k in kpl if k.name == name]
  54. self.assertTrue(
  55. len(found_kp) == 0,
  56. "Key pair {0} should have been deleted but still exists."
  57. .format(name))
  58. def test_crud_security_group_service(self):
  59. name = 'cbtestsecuritygroupA-{0}'.format(uuid.uuid4())
  60. sg = self.provider.security.security_groups.create(
  61. name=name, description=name)
  62. with helpers.exception_action(
  63. lambda:
  64. self.provider.security.security_groups.delete(group_id=sg.id)
  65. ):
  66. sgl = self.provider.security.security_groups.get(
  67. group_names=[
  68. sg.name])
  69. found_sg = [g for g in sgl if g.name == name]
  70. self.assertTrue(
  71. len(found_sg) == 1,
  72. "List security groups did not return the expected group {0}."
  73. .format(name))
  74. self.provider.security.security_groups.delete(group_id=sg.id)
  75. sgl = self.provider.security.security_groups.list()
  76. found_sg = [g for g in sgl if g.name == name]
  77. self.assertTrue(
  78. len(found_sg) == 0,
  79. "Security group {0} should have been deleted but still exists."
  80. .format(name))
  81. def test_security_group(self):
  82. name = 'cbtestsecuritygroupB-{0}'.format(uuid.uuid4())
  83. sg = self.provider.security.security_groups.create(
  84. name=name, description=name)
  85. with helpers.exception_action(
  86. lambda:
  87. self.provider.security.security_groups.delete(group_id=sg.id)
  88. ):
  89. sg.add_rule('tcp', 1111, 1111, '0.0.0.0/0')
  90. found_rules = [rule for rule in sg.rules if
  91. rule.cidr_ip == '0.0.0.0/0' and
  92. rule.ip_protocol == 'tcp' and
  93. rule.from_port == 1111 and
  94. rule.to_port == 1111]
  95. self.assertTrue(
  96. len(found_rules) == 1,
  97. "Expected rule not found in security group: {0}".format(name))
  98. self.assertTrue(
  99. repr(sg.rules[0]) == ("<CBSecurityGroupRule: IP: {0}; from: "
  100. "{1}; to: {2}>"
  101. .format(sg.rules[0].ip_protocol,
  102. sg.rules[0].from_port,
  103. sg.rules[0].to_port)),
  104. ("Security group rule repr {0} not matching expected format."
  105. .format(sg.rules[0])))
  106. sg.delete()
  107. sgl = self.provider.security.security_groups.list()
  108. found_sg = [g for g in sgl if g.name == name]
  109. self.assertTrue(
  110. len(found_sg) == 0,
  111. "Security group {0} should have been deleted but still exists."
  112. .format(name))