Best Python code snippet using localstack_python
zstack_test_security_group.py
Source:zstack_test_security_group.py
...123 for rule_uuid in target_rule_uuids:124 rule = test_lib.lib_get_sg_rule_by_uuid(rule_uuid)125 if rule.protocol == inventory.TCP:126 if rule.type == inventory.INGRESS:127 self._delete_rule(rule, self.tcp_ingress_rule)128 else:129 self._delete_rule(rule, self.tcp_egress_rule)130 elif rule.protocol == inventory.UDP:131 if rule.type == inventory.INGRESS:132 self._delete_rule(rule, self.udp_ingress_rule)133 else:134 self._delete_rule(rule, self.udp_egress_rule)135 elif rule.protocol == inventory.ICMP:136 if rule.type == inventory.INGRESS:137 self._delete_rule(rule, self.icmp_ingress_rule)138 else:139 self._delete_rule(rule, self.icmp_egress_rule)140 net_ops.remove_rules_from_security_group(target_rule_uuids)141 def delete_rule(self, target_rule_objs):142 target_rule_uuids = test_lib.lib_get_sg_rule_uuid_by_rule_obj(self.security_group.uuid, target_rule_objs)143 self.delete_rule_by_uuids(target_rule_uuids)144 def _delete_rule(self, target_rule, rule_dict):145 if not rule_dict.has_key(target_rule.allowedCidr):146 return147 for rule in rule_dict[target_rule.allowedCidr]:148 if rule.uuid == target_rule.uuid:149 rule_dict[target_rule.allowedCidr].remove(rule)150 break151 if not rule_dict[target_rule.allowedCidr]:152 rule_dict.pop(target_rule.allowedCidr)153 def _add_nic(self, l3_uuid, nic_uuid):154 if self.nic_dict.has_key(l3_uuid):155 if not nic_uuid in self.nic_dict[l3_uuid]:156 self.nic_dict[l3_uuid].append(nic_uuid)157 else:158 self.nic_dict[l3_uuid] = [nic_uuid]...
linux_firewall.py
Source:linux_firewall.py
...42 L.debug("Creating iptables rule {}".format(rule_args))43 if self._rule_exists(rule_args):44 L.debug("iptables rule {} already exists".format(rule_args))45 self._connector_helper.check_command(["iptables", "-w", "-A"] + rule_args, root=True)46 def _delete_rule(self, rule_args):47 L.debug("Deleting iptables rule {}".format(rule_args))48 if not self._rule_exists(rule_args):49 L.debug("iptables rule {} doesn't exist".format(rule_args))50 return51 self._connector_helper.check_command(["iptables", "-w", "-D"] + rule_args, root=True)52 def _jump_rule_args(self, chain):53 return [chain, "-j", self._testing_chain_name]54 def _delete_testing_chain(self):55 # Flush all rules in our chain56 self._connector_helper.check_command(57 ["iptables", "-w", "-F", self._testing_chain_name], root=True)58 # Remove all references (jumps) to our chain59 L.debug("Cleaning up iptables testing chain")60 for source_chain in ["INPUT", "OUTPUT"]:61 self._delete_rule(self._jump_rule_args(source_chain))62 self._delete_chain(self._testing_chain_name)63 def _create_testing_chain(self):64 self._create_chain(self._testing_chain_name)65 for source_chain in ["INPUT", "OUTPUT"]:66 self._create_rule(self._jump_rule_args(source_chain))67 def block_ip(self, ip):68 rules = self._block_ip_args_rules(ip)69 for rule in rules:70 self._create_rule(rule)71 def unblock_ip(self, ip):72 rules = self._block_ip_args_rules(ip)73 for rule in rules:74 self._delete_rule(rule)75# I wanted to use iptc (https://github.com/ldx/python-iptables) but it was buggy so gave up.76 # def _delete_testing_chain(self):77 # for source_chain in ["INPUT", "OUTPUT"]:78 # jump_rule = iptc.Rule()79 # jump_rule.create_target(self._testing_chain_name)80 # chain = iptc.Chain(iptc.Table(iptc.Table.FILTER), source_chain)81 # chain.delete_rule(jump_rule)82 # chain = iptc.Chain(iptc.Table(iptc.Table.FILTER), self._testing_chain_name)83 # chain.flush()84 # chain.delete()85 # def _create_testing_chain(self):86 # try:87 # iptc.Table(iptc.Table.FILTER).create_chain(self._testing_chain_name)88 # except iptc.ip4tc.IPTCError as ex:...
firewall_rule_delete.py
Source:firewall_rule_delete.py
...15 def run(self):16 LOG.debug('Firewall Delete Rule running')17 if not self.status:18 # set rule19 return self._delete_rule()20 def _delete_rule(self):21 address = '%s:%s' % (self.host, self.port)22 res = {'host': self.host,23 'port': self.port,24 'status': None}25 rule_no = {}26 rule_no['rule_id'] = self.rule_id27 status = fw_proxy.delete_firewall_rule(address, rule_no, self.dpid)28 res['status'] = status...
Learn to execute automation testing from scratch with LambdaTest Learning Hub. Right from setting up the prerequisites to run your first automation test, to following best practices and diving deeper into advanced test scenarios. LambdaTest Learning Hubs compile a list of step-by-step guides to help you be proficient with different test automation frameworks i.e. Selenium, Cypress, TestNG etc.
You could also refer to video tutorials over LambdaTest YouTube channel to get step by step demonstration from industry experts.
Get 100 minutes of automation test minutes FREE!!