Merge "Migrated security_group_rules_client.py"
This commit is contained in:
48
tempest_lib/services/compute/security_group_rules_client.py
Normal file
48
tempest_lib/services/compute/security_group_rules_client.py
Normal file
@@ -0,0 +1,48 @@
|
||||
# Copyright 2012 OpenStack Foundation
|
||||
# All Rights Reserved.
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
from oslo_serialization import jsonutils as json
|
||||
|
||||
from tempest_lib.api_schema.response.compute.v2_1 import \
|
||||
security_groups as schema
|
||||
from tempest_lib.common import rest_client
|
||||
|
||||
|
||||
class SecurityGroupRulesClient(rest_client.RestClient):
|
||||
|
||||
def create_security_group_rule(self, **kwargs):
|
||||
"""Creating a new security group rules.
|
||||
|
||||
parent_group_id :ID of Security group.
|
||||
ip_protocol : ip_proto (icmp, tcp, udp).
|
||||
from_port: Port at start of range.
|
||||
to_port : Port at end of range.
|
||||
Following optional keyword arguments are accepted:
|
||||
cidr : CIDR for address range.
|
||||
group_id : ID of the Source group.
|
||||
"""
|
||||
post_body = json.dumps({'security_group_rule': kwargs})
|
||||
url = 'os-security-group-rules'
|
||||
resp, body = self.post(url, post_body)
|
||||
body = json.loads(body)
|
||||
self.validate_response(schema.create_security_group_rule, resp, body)
|
||||
return rest_client.ResponseBody(resp, body)
|
||||
|
||||
def delete_security_group_rule(self, group_rule_id):
|
||||
"""Deletes the provided Security Group rule."""
|
||||
resp, body = self.delete('os-security-group-rules/%s' %
|
||||
group_rule_id)
|
||||
self.validate_response(schema.delete_security_group_rule, resp, body)
|
||||
return rest_client.ResponseBody(resp, body)
|
@@ -0,0 +1,66 @@
|
||||
# Copyright 2015 NEC Corporation. All rights reserved.
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
from tempest_lib.services.compute import security_group_rules_client
|
||||
from tempest_lib.tests import fake_auth_provider
|
||||
from tempest_lib.tests.services.compute import base
|
||||
|
||||
|
||||
class TestSecurityGroupRulesClient(base.BaseComputeServiceTest):
|
||||
|
||||
FAKE_SECURITY_GROUP_RULE = {
|
||||
"security_group_rule": {
|
||||
"id": "2d021cf1-ce4b-4292-994f-7a785d62a144",
|
||||
"ip_range": {
|
||||
"cidr": "0.0.0.0/0"
|
||||
},
|
||||
"parent_group_id": "48700ff3-30b8-4e63-845f-a79c9633e9fb",
|
||||
"to_port": 443,
|
||||
"ip_protocol": "tcp",
|
||||
"group": {},
|
||||
"from_port": 443
|
||||
}
|
||||
}
|
||||
|
||||
def setUp(self):
|
||||
super(TestSecurityGroupRulesClient, self).setUp()
|
||||
fake_auth = fake_auth_provider.FakeAuthProvider()
|
||||
self.client = security_group_rules_client.SecurityGroupRulesClient(
|
||||
fake_auth, 'compute', 'regionOne')
|
||||
|
||||
def _test_create_security_group_rule(self, bytes_body=False):
|
||||
req_body = {
|
||||
"from_port": "443",
|
||||
"ip_protocol": "tcp",
|
||||
"to_port": "443",
|
||||
"cidr": "0.0.0.0/0",
|
||||
"parent_group_id": "48700ff3-30b8-4e63-845f-a79c9633e9fb"
|
||||
}
|
||||
self.check_service_client_function(
|
||||
self.client.create_security_group_rule,
|
||||
'tempest_lib.common.rest_client.RestClient.post',
|
||||
self.FAKE_SECURITY_GROUP_RULE,
|
||||
to_utf=bytes_body, **req_body)
|
||||
|
||||
def test_create_security_group_rule_with_str_body(self):
|
||||
self._test_create_security_group_rule()
|
||||
|
||||
def test_create_security_group_rule_with_bytes_body(self):
|
||||
self._test_create_security_group_rule(bytes_body=True)
|
||||
|
||||
def test_delete_security_group_rule(self):
|
||||
self.check_service_client_function(
|
||||
self.client.delete_security_group_rule,
|
||||
'tempest_lib.common.rest_client.RestClient.delete',
|
||||
{}, status=202, group_rule_id='group-id')
|
Reference in New Issue
Block a user