674a45ffe0
mox doesn't work on Python 3, whereas mox3 works on Python 2 and Python 3. Cinder, Nova and many other projects already replaced mox with mox3. mox3 is now maintained by OpenStack. Partial-Implements: blueprint porting-python3 Change-Id: I10e6a9754ebd58a2640d73ec8966527c3aa1fe9a
834 lines
33 KiB
Python
834 lines
33 KiB
Python
# Copyright 2013, Mirantis Inc
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
from mox3.mox import IsA # noqa
|
|
|
|
from django.core.urlresolvers import reverse
|
|
from django.core.urlresolvers import reverse_lazy
|
|
from django import http
|
|
|
|
from horizon.workflows import views
|
|
|
|
from openstack_dashboard import api
|
|
from openstack_dashboard.test import helpers as test
|
|
|
|
from openstack_dashboard.dashboards.project.vpn import workflows
|
|
|
|
|
|
class VPNTests(test.TestCase):
|
|
class AttributeDict(dict):
|
|
def __getattr__(self, attr):
|
|
return self[attr]
|
|
|
|
def __setattr__(self, attr, value):
|
|
self[attr] = value
|
|
|
|
DASHBOARD = 'project'
|
|
INDEX_URL = reverse_lazy('horizon:%s:vpn:index' % DASHBOARD)
|
|
|
|
ADDIKEPOLICY_PATH = 'horizon:%s:vpn:addikepolicy' % DASHBOARD
|
|
ADDIPSECPOLICY_PATH = 'horizon:%s:vpn:addipsecpolicy' % DASHBOARD
|
|
ADDVPNSERVICE_PATH = 'horizon:%s:vpn:addvpnservice' % DASHBOARD
|
|
ADDVPNCONNECTION_PATH = 'horizon:%s:vpn:addipsecsiteconnection' % DASHBOARD
|
|
|
|
IKEPOLICY_DETAIL_PATH = 'horizon:%s:vpn:ikepolicydetails' % DASHBOARD
|
|
IPSECPOLICY_DETAIL_PATH = 'horizon:%s:vpn:ipsecpolicydetails' % DASHBOARD
|
|
VPNSERVICE_DETAIL_PATH = 'horizon:%s:vpn:vpnservicedetails' % DASHBOARD
|
|
VPNCONNECTION_DETAIL_PATH = 'horizon:%s:vpn:ipsecsiteconnectiondetails' %\
|
|
DASHBOARD
|
|
|
|
UPDATEIKEPOLICY_PATH = 'horizon:%s:vpn:update_ikepolicy' % DASHBOARD
|
|
UPDATEIPSECPOLICY_PATH = 'horizon:%s:vpn:update_ipsecpolicy' % DASHBOARD
|
|
UPDATEVPNSERVICE_PATH = 'horizon:%s:vpn:update_vpnservice' % DASHBOARD
|
|
UPDATEVPNCONNECTION_PATH = 'horizon:%s:vpn:update_ipsecsiteconnection' %\
|
|
DASHBOARD
|
|
|
|
def set_up_expect(self):
|
|
# retrieves vpnservices
|
|
api.vpn.vpnservice_list(
|
|
IsA(http.HttpRequest), tenant_id=self.tenant.id) \
|
|
.AndReturn(self.vpnservices.list())
|
|
|
|
# retrieves ikepolicies
|
|
api.vpn.ikepolicy_list(
|
|
IsA(http.HttpRequest), tenant_id=self.tenant.id) \
|
|
.AndReturn(self.ikepolicies.list())
|
|
|
|
# retrieves ipsecpolicies
|
|
api.vpn.ipsecpolicy_list(
|
|
IsA(http.HttpRequest), tenant_id=self.tenant.id) \
|
|
.AndReturn(self.ipsecpolicies.list())
|
|
|
|
# retrieves ipsecsiteconnections
|
|
api.vpn.ipsecsiteconnection_list(
|
|
IsA(http.HttpRequest), tenant_id=self.tenant.id) \
|
|
.AndReturn(self.ipsecsiteconnections.list())
|
|
|
|
def set_up_expect_with_exception(self):
|
|
api.vpn.vpnservice_list(
|
|
IsA(http.HttpRequest),
|
|
tenant_id=self.tenant.id).AndRaise(self.exceptions.neutron)
|
|
api.vpn.ikepolicy_list(
|
|
IsA(http.HttpRequest),
|
|
tenant_id=self.tenant.id).AndRaise(self.exceptions.neutron)
|
|
api.vpn.ipsecpolicy_list(
|
|
IsA(http.HttpRequest),
|
|
tenant_id=self.tenant.id).AndRaise(self.exceptions.neutron)
|
|
api.vpn.ipsecsiteconnection_list(
|
|
IsA(http.HttpRequest),
|
|
tenant_id=self.tenant.id).AndRaise(self.exceptions.neutron)
|
|
|
|
@test.create_stubs({api.vpn: ('ikepolicy_list', 'ipsecpolicy_list',
|
|
'vpnservice_list',
|
|
'ipsecsiteconnection_list')})
|
|
def test_index_vpnservices(self):
|
|
self.set_up_expect()
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
res = self.client.get(self.INDEX_URL)
|
|
|
|
self.assertTemplateUsed(res, '%s/vpn/index.html'
|
|
% self.DASHBOARD)
|
|
self.assertTemplateUsed(res, 'horizon/common/_detail_table.html')
|
|
self.assertEqual(len(res.context['table'].data),
|
|
len(self.vpnservices.list()))
|
|
|
|
@test.create_stubs({api.vpn: ('ikepolicy_list', 'ipsecpolicy_list',
|
|
'vpnservice_list',
|
|
'ipsecsiteconnection_list')})
|
|
def test_index_ikepolicies(self):
|
|
self.set_up_expect()
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
res = self.client.get(self.INDEX_URL + '?tab=vpntabs__ikepolicies')
|
|
|
|
self.assertTemplateUsed(res, '%s/vpn/index.html'
|
|
% self.DASHBOARD)
|
|
self.assertTemplateUsed(res, 'horizon/common/_detail_table.html')
|
|
self.assertEqual(len(res.context['ikepoliciestable_table'].data),
|
|
len(self.ikepolicies.list()))
|
|
|
|
@test.create_stubs({api.vpn: ('ikepolicy_list', 'ipsecpolicy_list',
|
|
'vpnservice_list',
|
|
'ipsecsiteconnection_list')})
|
|
def test_index_ipsecpolicies(self):
|
|
self.set_up_expect()
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
res = self.client.get(self.INDEX_URL + '?tab=vpntabs__ipsecpolicies')
|
|
|
|
self.assertTemplateUsed(res, '%s/vpn/index.html'
|
|
% self.DASHBOARD)
|
|
self.assertTemplateUsed(res, 'horizon/common/_detail_table.html')
|
|
self.assertEqual(len(res.context['ipsecpoliciestable_table'].data),
|
|
len(self.ipsecpolicies.list()))
|
|
|
|
@test.create_stubs({api.vpn: ('ikepolicy_list', 'ipsecpolicy_list',
|
|
'vpnservice_list',
|
|
'ipsecsiteconnection_list')})
|
|
def test_index_ipsecsiteconnections(self):
|
|
self.set_up_expect()
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
res = self.client.get(
|
|
self.INDEX_URL + '?tab=vpntabs__ipsecsiteconnections')
|
|
|
|
self.assertTemplateUsed(res, '%s/vpn/index.html'
|
|
% self.DASHBOARD)
|
|
self.assertTemplateUsed(res, 'horizon/common/_detail_table.html')
|
|
self.assertEqual(
|
|
len(res.context['ipsecsiteconnectionstable_table'].data),
|
|
len(self.ipsecsiteconnections.list()))
|
|
|
|
@test.create_stubs({api.vpn: ('ikepolicy_list', 'ipsecpolicy_list',
|
|
'vpnservice_list',
|
|
'ipsecsiteconnection_list')})
|
|
def test_index_exception_vpnservices(self):
|
|
self.set_up_expect_with_exception()
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
res = self.client.get(self.INDEX_URL)
|
|
|
|
self.assertTemplateUsed(res, '%s/vpn/index.html'
|
|
% self.DASHBOARD)
|
|
self.assertTemplateUsed(res,
|
|
'horizon/common/_detail_table.html')
|
|
self.assertEqual(len(res.context['table'].data), 0)
|
|
|
|
@test.create_stubs({api.vpn: ('ikepolicy_list', 'ipsecpolicy_list',
|
|
'vpnservice_list',
|
|
'ipsecsiteconnection_list')})
|
|
def test_index_exception_ikepolicies(self):
|
|
self.set_up_expect_with_exception()
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
res = self.client.get(self.INDEX_URL + '?tab=vpntabs__ikepolicies')
|
|
|
|
self.assertTemplateUsed(res, '%s/vpn/index.html'
|
|
% self.DASHBOARD)
|
|
self.assertTemplateUsed(res,
|
|
'horizon/common/_detail_table.html')
|
|
self.assertEqual(len(res.context['table'].data), 0)
|
|
|
|
@test.create_stubs({api.vpn: ('ikepolicy_list', 'ipsecpolicy_list',
|
|
'vpnservice_list',
|
|
'ipsecsiteconnection_list')})
|
|
def test_index_exception_ipsecpolicies(self):
|
|
self.set_up_expect_with_exception()
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
res = self.client.get(self.INDEX_URL + '?tab=vpntabs__ipsecpolicies')
|
|
|
|
self.assertTemplateUsed(res, '%s/vpn/index.html'
|
|
% self.DASHBOARD)
|
|
self.assertTemplateUsed(res,
|
|
'horizon/common/_detail_table.html')
|
|
self.assertEqual(len(res.context['table'].data), 0)
|
|
|
|
@test.create_stubs({api.vpn: ('ikepolicy_list', 'ipsecpolicy_list',
|
|
'vpnservice_list',
|
|
'ipsecsiteconnection_list')})
|
|
def test_index_exception_ipsecsiteconnections(self):
|
|
self.set_up_expect_with_exception()
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
res = self.client.get(
|
|
self.INDEX_URL + '?tab=vpntabs__ipsecsiteconnections')
|
|
|
|
self.assertTemplateUsed(res, '%s/vpn/index.html'
|
|
% self.DASHBOARD)
|
|
self.assertTemplateUsed(res,
|
|
'horizon/common/_detail_table.html')
|
|
self.assertEqual(len(res.context['table'].data), 0)
|
|
|
|
@test.create_stubs({api.neutron: ('network_list_for_tenant',
|
|
'router_list')})
|
|
def test_add_vpnservice_get(self):
|
|
networks = [{'subnets': [self.subnets.first(), ]}, ]
|
|
routers = self.routers.list()
|
|
|
|
api.neutron.network_list_for_tenant(
|
|
IsA(http.HttpRequest), self.tenant.id).AndReturn(networks)
|
|
api.neutron.router_list(
|
|
IsA(http.HttpRequest), tenant_id=self.tenant.id).AndReturn(routers)
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
res = self.client.get(reverse(self.ADDVPNSERVICE_PATH))
|
|
|
|
workflow = res.context['workflow']
|
|
self.assertTemplateUsed(res, views.WorkflowView.template_name)
|
|
self.assertEqual(workflow.name, workflows.AddVPNService.name)
|
|
|
|
expected_objs = ['<AddVPNServiceStep: addvpnserviceaction>', ]
|
|
self.assertQuerysetEqual(workflow.steps, expected_objs)
|
|
|
|
@test.create_stubs({api.neutron: ('router_list',
|
|
'network_list_for_tenant'),
|
|
api.vpn: ('vpnservice_create', )})
|
|
def test_add_vpnservice_post(self):
|
|
vpnservice = self.vpnservices.first()
|
|
networks = [{'subnets': [self.subnets.first(), ]}, ]
|
|
routers = self.routers.list()
|
|
|
|
api.neutron.network_list_for_tenant(
|
|
IsA(http.HttpRequest), self.tenant.id).AndReturn(networks)
|
|
api.neutron.router_list(
|
|
IsA(http.HttpRequest), tenant_id=self.tenant.id).AndReturn(routers)
|
|
|
|
form_data = {'name': vpnservice['name'],
|
|
'description': vpnservice['description'],
|
|
'subnet_id': vpnservice['subnet_id'],
|
|
'router_id': vpnservice['router_id'],
|
|
'admin_state_up': vpnservice['admin_state_up']}
|
|
|
|
api.vpn.vpnservice_create(
|
|
IsA(http.HttpRequest), **form_data).AndReturn(vpnservice)
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
res = self.client.post(reverse(self.ADDVPNSERVICE_PATH), form_data)
|
|
|
|
self.assertNoFormErrors(res)
|
|
self.assertRedirectsNoFollow(res, str(self.INDEX_URL))
|
|
|
|
@test.create_stubs({api.neutron: ('router_list',
|
|
'network_list_for_tenant')})
|
|
def test_add_vpnservice_post_error(self):
|
|
vpnservice = self.vpnservices.first()
|
|
networks = [{'subnets': [self.subnets.first(), ]}, ]
|
|
routers = self.routers.list()
|
|
|
|
api.neutron.network_list_for_tenant(
|
|
IsA(http.HttpRequest), self.tenant.id).AndReturn(networks)
|
|
api.neutron.router_list(
|
|
IsA(http.HttpRequest), tenant_id=self.tenant.id).AndReturn(routers)
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
form_data = {'name': vpnservice['name'],
|
|
'description': vpnservice['description'],
|
|
'subnet_id': '',
|
|
'router_id': '',
|
|
'admin_state_up': vpnservice['admin_state_up']}
|
|
|
|
res = self.client.post(reverse(self.ADDVPNSERVICE_PATH), form_data)
|
|
|
|
self.assertFormErrors(res, 2)
|
|
|
|
def test_add_ikepolicy_get(self):
|
|
res = self.client.get(reverse(self.ADDIKEPOLICY_PATH))
|
|
|
|
workflow = res.context['workflow']
|
|
self.assertTemplateUsed(res, views.WorkflowView.template_name)
|
|
self.assertEqual(workflow.name, workflows.AddIKEPolicy.name)
|
|
|
|
expected_objs = ['<AddIKEPolicyStep: addikepolicyaction>', ]
|
|
self.assertQuerysetEqual(workflow.steps, expected_objs)
|
|
|
|
@test.create_stubs({api.vpn: ('ikepolicy_create', )})
|
|
def test_add_ikepolicy_post(self):
|
|
ikepolicy = self.ikepolicies.first()
|
|
|
|
form_data = {'name': ikepolicy['name'],
|
|
'description': ikepolicy['description'],
|
|
'auth_algorithm': ikepolicy['auth_algorithm'],
|
|
'encryption_algorithm': ikepolicy[
|
|
'encryption_algorithm'],
|
|
'ike_version': ikepolicy['ike_version'],
|
|
'lifetime_units': ikepolicy['lifetime']['units'],
|
|
'lifetime_value': ikepolicy['lifetime']['value'],
|
|
'phase1_negotiation_mode': ikepolicy[
|
|
'phase1_negotiation_mode'],
|
|
'pfs': ikepolicy['pfs']}
|
|
|
|
api.vpn.ikepolicy_create(
|
|
IsA(http.HttpRequest), **form_data).AndReturn(ikepolicy)
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
res = self.client.post(reverse(self.ADDIKEPOLICY_PATH), form_data)
|
|
|
|
self.assertNoFormErrors(res)
|
|
self.assertRedirectsNoFollow(res, str(self.INDEX_URL))
|
|
|
|
def test_add_ikepolicy_post_error(self):
|
|
ikepolicy = self.ikepolicies.first()
|
|
|
|
form_data = {'name': ikepolicy['name'],
|
|
'description': ikepolicy['description'],
|
|
'auth_algorithm': ikepolicy['auth_algorithm'],
|
|
'encryption_algorithm': ikepolicy[
|
|
'encryption_algorithm'],
|
|
'ike_version': ikepolicy['ike_version'],
|
|
'lifetime_units': ikepolicy['lifetime']['units'],
|
|
'lifetime_value': 10,
|
|
'phase1_negotiation_mode': ikepolicy[
|
|
'phase1_negotiation_mode'],
|
|
'pfs': ikepolicy['pfs']}
|
|
|
|
res = self.client.post(reverse(self.ADDIKEPOLICY_PATH), form_data)
|
|
|
|
self.assertFormErrors(res, 1)
|
|
|
|
def test_add_ipsecpolicy_get(self):
|
|
res = self.client.get(reverse(self.ADDIPSECPOLICY_PATH))
|
|
|
|
workflow = res.context['workflow']
|
|
self.assertTemplateUsed(res, views.WorkflowView.template_name)
|
|
self.assertEqual(workflow.name, workflows.AddIPSecPolicy.name)
|
|
|
|
expected_objs = ['<AddIPSecPolicyStep: addipsecpolicyaction>', ]
|
|
self.assertQuerysetEqual(workflow.steps, expected_objs)
|
|
|
|
@test.create_stubs({api.vpn: ('ipsecpolicy_create', )})
|
|
def test_add_ipsecpolicy_post(self):
|
|
ipsecpolicy = self.ipsecpolicies.first()
|
|
|
|
form_data = {'name': ipsecpolicy['name'],
|
|
'description': ipsecpolicy['description'],
|
|
'auth_algorithm': ipsecpolicy['auth_algorithm'],
|
|
'encryption_algorithm': ipsecpolicy[
|
|
'encryption_algorithm'],
|
|
'encapsulation_mode': ipsecpolicy[
|
|
'encapsulation_mode'],
|
|
'lifetime_units': ipsecpolicy['lifetime']['units'],
|
|
'lifetime_value': ipsecpolicy['lifetime']['value'],
|
|
'pfs': ipsecpolicy['pfs'],
|
|
'transform_protocol': ipsecpolicy[
|
|
'transform_protocol']}
|
|
|
|
api.vpn.ipsecpolicy_create(
|
|
IsA(http.HttpRequest), **form_data).AndReturn(ipsecpolicy)
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
res = self.client.post(reverse(self.ADDIPSECPOLICY_PATH), form_data)
|
|
|
|
self.assertNoFormErrors(res)
|
|
self.assertRedirectsNoFollow(res, str(self.INDEX_URL))
|
|
|
|
def test_add_ipsecpolicy_post_error(self):
|
|
ipsecpolicy = self.ipsecpolicies.first()
|
|
|
|
form_data = {'name': ipsecpolicy['name'],
|
|
'description': ipsecpolicy['description'],
|
|
'auth_algorithm': ipsecpolicy['auth_algorithm'],
|
|
'encryption_algorithm': ipsecpolicy[
|
|
'encryption_algorithm'],
|
|
'encapsulation_mode': ipsecpolicy[
|
|
'encapsulation_mode'],
|
|
'lifetime_units': ipsecpolicy['lifetime']['units'],
|
|
'lifetime_value': 10,
|
|
'pfs': ipsecpolicy['pfs'],
|
|
'transform_protocol': ipsecpolicy[
|
|
'transform_protocol']}
|
|
|
|
res = self.client.post(reverse(self.ADDIPSECPOLICY_PATH), form_data)
|
|
|
|
self.assertFormErrors(res, 1)
|
|
|
|
@test.create_stubs({api.vpn: ('ikepolicy_list', 'ipsecpolicy_list',
|
|
'vpnservice_list')})
|
|
def test_add_ipsecsiteconnection_get(self):
|
|
ikepolicies = self.ikepolicies.list()
|
|
ipsecpolicies = self.ipsecpolicies.list()
|
|
vpnservices = self.vpnservices.list()
|
|
|
|
api.vpn.ikepolicy_list(
|
|
IsA(http.HttpRequest),
|
|
tenant_id=self.tenant.id).AndReturn(ikepolicies)
|
|
api.vpn.ipsecpolicy_list(
|
|
IsA(http.HttpRequest),
|
|
tenant_id=self.tenant.id).AndReturn(ipsecpolicies)
|
|
api.vpn.vpnservice_list(
|
|
IsA(http.HttpRequest),
|
|
tenant_id=self.tenant.id).AndReturn(vpnservices)
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
res = self.client.get(reverse(self.ADDVPNCONNECTION_PATH))
|
|
|
|
workflow = res.context['workflow']
|
|
self.assertTemplateUsed(res, views.WorkflowView.template_name)
|
|
self.assertEqual(workflow.name, workflows.AddIPSecSiteConnection.name)
|
|
|
|
expected_objs = ['<AddIPSecSiteConnectionStep: '
|
|
'addipsecsiteconnectionaction>',
|
|
'<AddIPSecSiteConnectionOptionalStep: '
|
|
'addipsecsiteconnectionoptionalaction>', ]
|
|
self.assertQuerysetEqual(workflow.steps, expected_objs)
|
|
|
|
@test.create_stubs({api.vpn: ('ikepolicy_list', 'ipsecpolicy_list',
|
|
'vpnservice_list',
|
|
'ipsecsiteconnection_create')})
|
|
def test_add_ipsecsiteconnection_post(self):
|
|
self._test_add_ipsecsiteconnection_post()
|
|
|
|
@test.create_stubs({api.vpn: ('ikepolicy_list', 'ipsecpolicy_list',
|
|
'vpnservice_list',
|
|
'ipsecsiteconnection_create')})
|
|
def test_add_ipsecsiteconnection_post_single_subnet(self):
|
|
self._test_add_ipsecsiteconnection_post(subnet_list=False)
|
|
|
|
def _test_add_ipsecsiteconnection_post(self, subnet_list=True):
|
|
if subnet_list:
|
|
ipsecsiteconnection = self.ipsecsiteconnections.first()
|
|
else:
|
|
ipsecsiteconnection = self.ipsecsiteconnections.list()[1]
|
|
ikepolicies = self.ikepolicies.list()
|
|
ipsecpolicies = self.ipsecpolicies.list()
|
|
vpnservices = self.vpnservices.list()
|
|
|
|
api.vpn.ikepolicy_list(
|
|
IsA(http.HttpRequest),
|
|
tenant_id=self.tenant.id).AndReturn(ikepolicies)
|
|
api.vpn.ipsecpolicy_list(
|
|
IsA(http.HttpRequest),
|
|
tenant_id=self.tenant.id).AndReturn(ipsecpolicies)
|
|
api.vpn.vpnservice_list(
|
|
IsA(http.HttpRequest),
|
|
tenant_id=self.tenant.id).AndReturn(vpnservices)
|
|
|
|
form_data = {'name': ipsecsiteconnection['name'],
|
|
'description': ipsecsiteconnection['description'],
|
|
'dpd_action': ipsecsiteconnection['dpd']['action'],
|
|
'dpd_interval': ipsecsiteconnection['dpd']['interval'],
|
|
'dpd_timeout': ipsecsiteconnection['dpd']['timeout'],
|
|
'ikepolicy_id': ipsecsiteconnection['ikepolicy_id'],
|
|
'initiator': ipsecsiteconnection['initiator'],
|
|
'ipsecpolicy_id': ipsecsiteconnection[
|
|
'ipsecpolicy_id'],
|
|
'mtu': ipsecsiteconnection['mtu'],
|
|
'peer_address': ipsecsiteconnection['peer_address'],
|
|
'peer_cidrs': ipsecsiteconnection['peer_cidrs'],
|
|
'peer_id': ipsecsiteconnection['peer_id'],
|
|
'psk': ipsecsiteconnection['psk'],
|
|
'vpnservice_id': ipsecsiteconnection['vpnservice_id'],
|
|
'admin_state_up': ipsecsiteconnection[
|
|
'admin_state_up']}
|
|
|
|
api.vpn.ipsecsiteconnection_create(
|
|
IsA(http.HttpRequest), **form_data).AndReturn(ipsecsiteconnection)
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
res = self.client.post(reverse(self.ADDVPNCONNECTION_PATH), form_data)
|
|
|
|
self.assertNoFormErrors(res)
|
|
self.assertRedirectsNoFollow(res, str(self.INDEX_URL))
|
|
|
|
@test.create_stubs({api.vpn: ('ikepolicy_list', 'ipsecpolicy_list',
|
|
'vpnservice_list',
|
|
'ipsecsiteconnection_create')})
|
|
def test_add_ipsecsiteconnection_post_required_fields_error(self):
|
|
self._test_add_ipsecsiteconnection_post_error()
|
|
|
|
@test.create_stubs({api.vpn: ('ikepolicy_list', 'ipsecpolicy_list',
|
|
'vpnservice_list',
|
|
'ipsecsiteconnection_create')})
|
|
def test_add_ipsecsiteconnection_post_peer_cidrs_error(self):
|
|
self._test_add_ipsecsiteconnection_post_error(subnets=True)
|
|
|
|
def _test_add_ipsecsiteconnection_post_error(self, subnets=False):
|
|
ipsecsiteconnection = self.ipsecsiteconnections.first()
|
|
ikepolicies = self.ikepolicies.list()
|
|
ipsecpolicies = self.ipsecpolicies.list()
|
|
vpnservices = self.vpnservices.list()
|
|
|
|
api.vpn.ikepolicy_list(
|
|
IsA(http.HttpRequest),
|
|
tenant_id=self.tenant.id).AndReturn(ikepolicies)
|
|
api.vpn.ipsecpolicy_list(
|
|
IsA(http.HttpRequest),
|
|
tenant_id=self.tenant.id).AndReturn(ipsecpolicies)
|
|
api.vpn.vpnservice_list(
|
|
IsA(http.HttpRequest),
|
|
tenant_id=self.tenant.id).AndReturn(vpnservices)
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
form_data = {'name': '',
|
|
'description': ipsecsiteconnection['description'],
|
|
'dpd_action': ipsecsiteconnection['dpd']['action'],
|
|
'dpd_interval': ipsecsiteconnection['dpd']['interval'],
|
|
'dpd_timeout': ipsecsiteconnection['dpd']['timeout'],
|
|
'ikepolicy_id': '',
|
|
'initiator': ipsecsiteconnection['initiator'],
|
|
'ipsecpolicy_id': '',
|
|
'mtu': ipsecsiteconnection['mtu'],
|
|
'peer_address': '',
|
|
'peer_cidrs': '',
|
|
'peer_id': '',
|
|
'psk': '',
|
|
'vpnservice_id': '',
|
|
'admin_state_up': ipsecsiteconnection[
|
|
'admin_state_up']}
|
|
if subnets:
|
|
form_data['peer_cidrs'] = '20.1.0.0/24; 21.1.0.0/24'
|
|
|
|
res = self.client.post(reverse(self.ADDVPNCONNECTION_PATH), form_data)
|
|
|
|
self.assertFormErrors(res, 7)
|
|
|
|
@test.create_stubs({api.vpn: ('vpnservice_get', )})
|
|
def test_update_vpnservice_get(self):
|
|
vpnservice = self.vpnservices.first()
|
|
|
|
api.vpn.vpnservice_get(IsA(http.HttpRequest), vpnservice.id)\
|
|
.AndReturn(vpnservice)
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
res = self.client.get(
|
|
reverse(self.UPDATEVPNSERVICE_PATH, args=(vpnservice.id,)))
|
|
|
|
self.assertTemplateUsed(
|
|
res, 'project/vpn/update_vpnservice.html')
|
|
|
|
@test.create_stubs({api.vpn: ('vpnservice_get', 'vpnservice_update')})
|
|
def test_update_vpnservice_post(self):
|
|
vpnservice = self.vpnservices.first()
|
|
|
|
api.vpn.vpnservice_get(IsA(http.HttpRequest), vpnservice.id)\
|
|
.AndReturn(vpnservice)
|
|
|
|
data = {'name': vpnservice.name,
|
|
'description': vpnservice.description,
|
|
'admin_state_up': vpnservice.admin_state_up}
|
|
|
|
api.vpn.vpnservice_update(IsA(http.HttpRequest), vpnservice.id,
|
|
vpnservice=data).AndReturn(vpnservice)
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
form_data = data.copy()
|
|
form_data['vpnservice_id'] = vpnservice.id
|
|
|
|
res = self.client.post(reverse(
|
|
self.UPDATEVPNSERVICE_PATH, args=(vpnservice.id,)), form_data)
|
|
|
|
self.assertNoFormErrors(res)
|
|
self.assertRedirectsNoFollow(res, str(self.INDEX_URL))
|
|
|
|
@test.create_stubs({api.vpn: ('ikepolicy_get', )})
|
|
def test_update_ikepolicy_get(self):
|
|
ikepolicy = self.ikepolicies.first()
|
|
|
|
api.vpn.ikepolicy_get(IsA(http.HttpRequest), ikepolicy.id)\
|
|
.AndReturn(ikepolicy)
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
res = self.client.get(
|
|
reverse(self.UPDATEIKEPOLICY_PATH, args=(ikepolicy.id,)))
|
|
|
|
self.assertTemplateUsed(
|
|
res, 'project/vpn/update_ikepolicy.html')
|
|
|
|
@test.create_stubs({api.vpn: ('ikepolicy_get', 'ikepolicy_update')})
|
|
def test_update_ikepolicy_post(self):
|
|
ikepolicy = self.ikepolicies.first()
|
|
|
|
api.vpn.ikepolicy_get(IsA(http.HttpRequest), ikepolicy.id)\
|
|
.AndReturn(ikepolicy)
|
|
|
|
data = {'name': ikepolicy.name,
|
|
'description': ikepolicy.description,
|
|
'auth_algorithm': ikepolicy.auth_algorithm,
|
|
'encryption_algorithm': ikepolicy.encryption_algorithm,
|
|
'ike_version': ikepolicy.ike_version,
|
|
'lifetime': ikepolicy.lifetime,
|
|
'pfs': ikepolicy.pfs,
|
|
'phase1_negotiation_mode': ikepolicy.phase1_negotiation_mode}
|
|
|
|
api.vpn.ikepolicy_update(IsA(http.HttpRequest), ikepolicy.id,
|
|
ikepolicy=data).AndReturn(ikepolicy)
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
form_data = data.copy()
|
|
|
|
form_data.update({'lifetime_units': form_data['lifetime']['units'],
|
|
'lifetime_value': form_data['lifetime']['value'],
|
|
'ikepolicy_id': ikepolicy.id})
|
|
form_data.pop('lifetime')
|
|
|
|
res = self.client.post(reverse(
|
|
self.UPDATEIKEPOLICY_PATH, args=(ikepolicy.id,)), form_data)
|
|
|
|
self.assertNoFormErrors(res)
|
|
self.assertRedirectsNoFollow(res, str(self.INDEX_URL))
|
|
|
|
@test.create_stubs({api.vpn: ('ipsecpolicy_get', )})
|
|
def test_update_ipsecpolicy_get(self):
|
|
ipsecpolicy = self.ipsecpolicies.first()
|
|
|
|
api.vpn.ipsecpolicy_get(IsA(http.HttpRequest), ipsecpolicy.id)\
|
|
.AndReturn(ipsecpolicy)
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
res = self.client.get(
|
|
reverse(self.UPDATEIPSECPOLICY_PATH, args=(ipsecpolicy.id,)))
|
|
|
|
self.assertTemplateUsed(
|
|
res, 'project/vpn/update_ipsecpolicy.html')
|
|
|
|
@test.create_stubs({api.vpn: ('ipsecpolicy_get', 'ipsecpolicy_update')})
|
|
def test_update_ipsecpolicy_post(self):
|
|
ipsecpolicy = self.ipsecpolicies.first()
|
|
|
|
api.vpn.ipsecpolicy_get(IsA(http.HttpRequest), ipsecpolicy.id)\
|
|
.AndReturn(ipsecpolicy)
|
|
|
|
data = {'name': ipsecpolicy.name,
|
|
'description': ipsecpolicy.description,
|
|
'auth_algorithm': ipsecpolicy.auth_algorithm,
|
|
'encapsulation_mode': ipsecpolicy.encapsulation_mode,
|
|
'encryption_algorithm': ipsecpolicy.encryption_algorithm,
|
|
'lifetime': ipsecpolicy.lifetime,
|
|
'pfs': ipsecpolicy.pfs,
|
|
'transform_protocol': ipsecpolicy.transform_protocol}
|
|
|
|
api.vpn.ipsecpolicy_update(IsA(http.HttpRequest), ipsecpolicy.id,
|
|
ipsecpolicy=data).AndReturn(ipsecpolicy)
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
form_data = data.copy()
|
|
|
|
form_data.update({'lifetime_units': form_data['lifetime']['units'],
|
|
'lifetime_value': form_data['lifetime']['value'],
|
|
'ipsecpolicy_id': ipsecpolicy.id})
|
|
form_data.pop('lifetime')
|
|
|
|
res = self.client.post(reverse(
|
|
self.UPDATEIPSECPOLICY_PATH, args=(ipsecpolicy.id,)), form_data)
|
|
|
|
self.assertNoFormErrors(res)
|
|
self.assertRedirectsNoFollow(res, str(self.INDEX_URL))
|
|
|
|
@test.create_stubs({api.vpn: ('ipsecsiteconnection_get', )})
|
|
def test_update_ipsecsiteconnection_get(self):
|
|
ipsecsiteconnection = self.ipsecsiteconnections.first()
|
|
|
|
api.vpn.ipsecsiteconnection_get(
|
|
IsA(http.HttpRequest), ipsecsiteconnection.id)\
|
|
.AndReturn(ipsecsiteconnection)
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
res = self.client.get(
|
|
reverse(self.UPDATEVPNCONNECTION_PATH,
|
|
args=(ipsecsiteconnection.id,)))
|
|
|
|
self.assertTemplateUsed(
|
|
res, 'project/vpn/update_ipsecsiteconnection.html')
|
|
|
|
@test.create_stubs({api.vpn: ('ipsecsiteconnection_get',
|
|
'ipsecsiteconnection_update')})
|
|
def test_update_ipsecsiteconnection_post(self):
|
|
ipsecsiteconnection = self.ipsecsiteconnections.first()
|
|
|
|
api.vpn.ipsecsiteconnection_get(
|
|
IsA(http.HttpRequest), ipsecsiteconnection.id)\
|
|
.AndReturn(ipsecsiteconnection)
|
|
|
|
data = {'name': ipsecsiteconnection.name,
|
|
'description': ipsecsiteconnection.description,
|
|
'peer_address': ipsecsiteconnection.peer_address,
|
|
'peer_id': ipsecsiteconnection.peer_id,
|
|
'peer_cidrs': ipsecsiteconnection.peer_cidrs,
|
|
'psk': ipsecsiteconnection.psk,
|
|
'mtu': ipsecsiteconnection.mtu,
|
|
'dpd': ipsecsiteconnection.dpd,
|
|
'initiator': ipsecsiteconnection.initiator,
|
|
'admin_state_up': ipsecsiteconnection.admin_state_up}
|
|
|
|
api.vpn.ipsecsiteconnection_update(
|
|
IsA(http.HttpRequest), ipsecsiteconnection.id,
|
|
ipsec_site_connection=data).AndReturn(ipsecsiteconnection)
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
form_data = data.copy()
|
|
|
|
form_data.update({
|
|
'dpd_action': form_data['dpd']['action'],
|
|
'dpd_interval': form_data['dpd']['interval'],
|
|
'dpd_timeout': form_data['dpd']['timeout'],
|
|
'peer_cidrs': ", ".join(ipsecsiteconnection['peer_cidrs']),
|
|
'ipsecsiteconnection_id': ipsecsiteconnection.id,
|
|
})
|
|
form_data.pop('dpd')
|
|
|
|
res = self.client.post(
|
|
reverse(self.UPDATEVPNCONNECTION_PATH,
|
|
args=(ipsecsiteconnection.id,)), form_data)
|
|
|
|
self.assertNoFormErrors(res)
|
|
self.assertRedirectsNoFollow(res, str(self.INDEX_URL))
|
|
|
|
@test.create_stubs({api.vpn: ('ikepolicy_list', 'ipsecpolicy_list',
|
|
'vpnservice_list',
|
|
'ipsecsiteconnection_list',
|
|
'vpnservice_delete',)})
|
|
def test_delete_vpnservice(self):
|
|
self.set_up_expect()
|
|
|
|
vpnservice = self.vpnservices.first()
|
|
|
|
api.vpn.vpnservice_delete(IsA(http.HttpRequest), vpnservice.id)
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
form_data = {"action":
|
|
"vpnservicestable__deletevpnservice__%s" % vpnservice.id}
|
|
|
|
res = self.client.post(self.INDEX_URL, form_data)
|
|
|
|
self.assertNoFormErrors(res)
|
|
|
|
@test.create_stubs({api.vpn: ('ikepolicy_list', 'ipsecpolicy_list',
|
|
'vpnservice_list',
|
|
'ipsecsiteconnection_list',
|
|
'ikepolicy_delete',)})
|
|
def test_delete_ikepolicy(self):
|
|
self.set_up_expect()
|
|
|
|
ikepolicy = self.ikepolicies.first()
|
|
|
|
api.vpn.ikepolicy_delete(IsA(http.HttpRequest), ikepolicy.id)
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
form_data = {"action":
|
|
"ikepoliciestable__deleteikepolicy__%s" % ikepolicy.id}
|
|
|
|
res = self.client.post(self.INDEX_URL, form_data)
|
|
|
|
self.assertNoFormErrors(res)
|
|
|
|
@test.create_stubs({api.vpn: ('ikepolicy_list', 'ipsecpolicy_list',
|
|
'vpnservice_list',
|
|
'ipsecsiteconnection_list',
|
|
'ipsecpolicy_delete',)})
|
|
def test_delete_ipsecpolicy(self):
|
|
self.set_up_expect()
|
|
|
|
ipsecpolicy = self.ipsecpolicies.first()
|
|
|
|
api.vpn.ipsecpolicy_delete(IsA(http.HttpRequest), ipsecpolicy.id)
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
form_data = {"action":
|
|
"ipsecpoliciestable__deleteipsecpolicy__%s"
|
|
% ipsecpolicy.id}
|
|
|
|
res = self.client.post(self.INDEX_URL, form_data)
|
|
|
|
self.assertNoFormErrors(res)
|
|
|
|
@test.create_stubs({api.vpn: ('ikepolicy_list', 'ipsecpolicy_list',
|
|
'vpnservice_list',
|
|
'ipsecsiteconnection_list',
|
|
'ipsecsiteconnection_delete',)})
|
|
def test_delete_ipsecsiteconnection(self):
|
|
self.set_up_expect()
|
|
|
|
ipsecsiteconnection = self.ipsecsiteconnections.first()
|
|
|
|
api.vpn.ipsecsiteconnection_delete(
|
|
IsA(http.HttpRequest), ipsecsiteconnection.id)
|
|
|
|
self.mox.ReplayAll()
|
|
|
|
form_data = {"action":
|
|
"ipsecsiteconnectionstable__deleteipsecsiteconnection__%s"
|
|
% ipsecsiteconnection.id}
|
|
|
|
res = self.client.post(self.INDEX_URL, form_data)
|
|
|
|
self.assertNoFormErrors(res)
|