Merge "Return complete resp from security_group_rules_client"

This commit is contained in:
Jenkins
2015-08-25 17:15:01 +00:00
committed by Gerrit Code Review
5 changed files with 14 additions and 15 deletions

View File

@@ -73,7 +73,7 @@ class SecurityGroupRulesTestJSON(base.BaseSecurityGroupsTest):
parent_group_id=securitygroup_id,
ip_protocol=self.ip_protocol,
from_port=self.from_port,
to_port=self.to_port)
to_port=self.to_port)['security_group_rule']
self.expected['parent_group_id'] = securitygroup_id
self.expected['ip_range'] = {'cidr': '0.0.0.0/0'}
self._check_expected_response(rule)
@@ -96,7 +96,7 @@ class SecurityGroupRulesTestJSON(base.BaseSecurityGroupsTest):
ip_protocol=self.ip_protocol,
from_port=self.from_port,
to_port=self.to_port,
cidr=cidr)
cidr=cidr)['security_group_rule']
self.expected['parent_group_id'] = parent_group_id
self.expected['ip_range'] = {'cidr': cidr}
self._check_expected_response(rule)
@@ -123,7 +123,7 @@ class SecurityGroupRulesTestJSON(base.BaseSecurityGroupsTest):
ip_protocol=self.ip_protocol,
from_port=self.from_port,
to_port=self.to_port,
group_id=group_id)
group_id=group_id)['security_group_rule']
self.expected['parent_group_id'] = parent_group_id
self.expected['group'] = {'tenant_id': self.client.tenant_id,
'name': group_name}
@@ -144,7 +144,7 @@ class SecurityGroupRulesTestJSON(base.BaseSecurityGroupsTest):
parent_group_id=securitygroup_id,
ip_protocol=self.ip_protocol,
from_port=self.from_port,
to_port=self.to_port)
to_port=self.to_port)['security_group_rule']
rule1_id = rule['id']
# Add a second rule to the created Security Group
@@ -155,14 +155,14 @@ class SecurityGroupRulesTestJSON(base.BaseSecurityGroupsTest):
parent_group_id=securitygroup_id,
ip_protocol=ip_protocol2,
from_port=from_port2,
to_port=to_port2)
to_port=to_port2)['security_group_rule']
rule2_id = rule['id']
# Delete the Security Group rule2 at the end of this method
self.addCleanup(self.client.delete_security_group_rule, rule2_id)
# Get rules of the created Security Group
rules = \
self.client.list_security_group_rules(securitygroup_id)
rules = (self.client.list_security_group_rules(securitygroup_id)
['rules'])
self.assertTrue(any([i for i in rules if i['id'] == rule1_id]))
self.assertTrue(any([i for i in rules if i['id'] == rule2_id]))
@@ -182,12 +182,11 @@ class SecurityGroupRulesTestJSON(base.BaseSecurityGroupsTest):
ip_protocol=self.ip_protocol,
from_port=self.from_port,
to_port=self.to_port,
group_id=sg2_id)
group_id=sg2_id)['security_group_rule']
# Delete group2
self.security_groups_client.delete_security_group(sg2_id)
# Get rules of the Group1
rules = \
self.client.list_security_group_rules(sg1_id)
rules = self.client.list_security_group_rules(sg1_id)['rules']
# The group1 has no rules because group2 has deleted
self.assertEqual(0, len(rules))

View File

@@ -87,7 +87,7 @@ class SecurityGroupRulesNegativeTestJSON(base.BaseSecurityGroupsTest):
rule = self.rules_client.create_security_group_rule(
parent_group_id=parent_group_id, ip_protocol=ip_protocol,
from_port=from_port, to_port=to_port)
from_port=from_port, to_port=to_port)['security_group_rule']
self.addCleanup(self.rules_client.delete_security_group_rule,
rule['id'])
# Add the same rule to the group should fail

View File

@@ -92,7 +92,7 @@ class AuthorizationTestJSON(base.BaseV2ComputeTest):
to_port = 22
cls.rule = cls.rule_client.create_security_group_rule(
parent_group_id=parent_group_id, ip_protocol=ip_protocol,
from_port=from_port, to_port=to_port)
from_port=from_port, to_port=to_port)['security_group_rule']
@classmethod
def resource_cleanup(cls):

View File

@@ -254,7 +254,7 @@ class ScenarioTest(tempest.test.BaseTestCase):
rules = list()
for ruleset in rulesets:
sg_rule = _client_rules.create_security_group_rule(
parent_group_id=secgroup_id, **ruleset)
parent_group_id=secgroup_id, **ruleset)['security_group_rule']
self.addCleanup(self.delete_wrapper,
_client_rules.delete_security_group_rule,
sg_rule['id'])

View File

@@ -39,7 +39,7 @@ class SecurityGroupRulesClient(service_client.ServiceClient):
resp, body = self.post(url, post_body)
body = json.loads(body)
self.validate_response(schema.create_security_group_rule, resp, body)
return service_client.ResponseBody(resp, body['security_group_rule'])
return service_client.ResponseBody(resp, body)
def delete_security_group_rule(self, group_rule_id):
"""Deletes the provided Security Group rule."""
@@ -55,5 +55,5 @@ class SecurityGroupRulesClient(service_client.ServiceClient):
self.validate_response(schema.list_security_groups, resp, body)
for sg in body['security_groups']:
if sg['id'] == security_group_id:
return service_client.ResponseBodyList(resp, sg['rules'])
return service_client.ResponseBody(resp, sg)
raise lib_exc.NotFound('No such Security Group')