Best Python code snippet using tempest_python
test_neutron_security_group.py
Source:test_neutron_security_group.py
...223 }],224 'id': 'aaaa'225 }226 })227 neutronclient.Client.create_security_group_rule({228 'security_group_rule': {229 'direction': 'ingress',230 'remote_group_id': None,231 'remote_ip_prefix': '0.0.0.0/0',232 'port_range_min': '22',233 'ethertype': 'IPv4',234 'port_range_max': '22',235 'protocol': 'tcp',236 'security_group_id': 'aaaa'237 }238 }).AndReturn({239 'security_group_rule': {240 'direction': 'ingress',241 'remote_group_id': None,242 'remote_ip_prefix': '0.0.0.0/0',243 'port_range_min': '22',244 'ethertype': 'IPv4',245 'port_range_max': '22',246 'protocol': 'tcp',247 'security_group_id': 'aaaa',248 'id': 'bbbb'249 }250 })251 neutronclient.Client.create_security_group_rule({252 'security_group_rule': {253 'direction': 'ingress',254 'remote_group_id': None,255 'remote_ip_prefix': '0.0.0.0/0',256 'port_range_min': '80',257 'ethertype': 'IPv4',258 'port_range_max': '80',259 'protocol': 'tcp',260 'security_group_id': 'aaaa'261 }262 }).AndReturn({263 'security_group_rule': {264 'direction': 'ingress',265 'remote_group_id': None,266 'remote_ip_prefix': '0.0.0.0/0',267 'port_range_min': '80',268 'ethertype': 'IPv4',269 'port_range_max': '80',270 'protocol': 'tcp',271 'security_group_id': 'aaaa',272 'id': 'cccc'273 }274 })275 neutronclient.Client.create_security_group_rule({276 'security_group_rule': {277 'direction': 'ingress',278 'remote_group_id': 'wwww',279 'remote_ip_prefix': None,280 'port_range_min': None,281 'ethertype': 'IPv4',282 'port_range_max': None,283 'protocol': 'tcp',284 'security_group_id': 'aaaa'285 }286 }).AndReturn({287 'security_group_rule': {288 'direction': 'ingress',289 'remote_group_id': 'wwww',290 'remote_ip_prefix': None,291 'port_range_min': None,292 'ethertype': 'IPv4',293 'port_range_max': None,294 'protocol': 'tcp',295 'security_group_id': 'aaaa',296 'id': 'dddd'297 }298 })299 neutronclient.Client.show_security_group('aaaa').AndReturn({300 'security_group': {301 'tenant_id': 'f18ca530cc05425e8bac0a5ff92f7e88',302 'name': sg_name,303 'description': 'HTTP and SSH access',304 'security_group_rules': [{305 "direction": "egress",306 "ethertype": "IPv4",307 "id": "aaaa-1",308 "port_range_max": None,309 "port_range_min": None,310 "protocol": None,311 "remote_group_id": None,312 "remote_ip_prefix": None,313 "security_group_id": "aaaa",314 "tenant_id": "f18ca530cc05425e8bac0a5ff92f7e88"315 }, {316 "direction": "egress",317 "ethertype": "IPv6",318 "id": "aaaa-2",319 "port_range_max": None,320 "port_range_min": None,321 "protocol": None,322 "remote_group_id": None,323 "remote_ip_prefix": None,324 "security_group_id": "aaaa",325 "tenant_id": "f18ca530cc05425e8bac0a5ff92f7e88"326 }],327 'id': 'aaaa'328 }329 })330 neutronclient.Client.delete_security_group_rule('aaaa-1').AndReturn(331 None)332 neutronclient.Client.delete_security_group_rule('aaaa-2').AndReturn(333 None)334 neutronclient.Client.create_security_group_rule({335 'security_group_rule': {336 'direction': 'egress',337 'remote_group_id': None,338 'remote_ip_prefix': '10.0.1.0/24',339 'port_range_min': '22',340 'ethertype': 'IPv4',341 'port_range_max': '22',342 'protocol': 'tcp',343 'security_group_id': 'aaaa'344 }345 }).AndReturn({346 'security_group_rule': {347 'direction': 'egress',348 'remote_group_id': None,349 'remote_ip_prefix': '10.0.1.0/24',350 'port_range_min': '22',351 'ethertype': 'IPv4',352 'port_range_max': '22',353 'protocol': 'tcp',354 'security_group_id': 'aaaa',355 'id': 'eeee'356 }357 })358 neutronclient.Client.create_security_group_rule({359 'security_group_rule': {360 'direction': 'egress',361 'remote_group_id': 'xxxx',362 'remote_ip_prefix': None,363 'port_range_min': None,364 'ethertype': 'IPv4',365 'port_range_max': None,366 'protocol': None,367 'security_group_id': 'aaaa'368 }369 }).AndReturn({370 'security_group_rule': {371 'direction': 'egress',372 'remote_group_id': 'xxxx',373 'remote_ip_prefix': None,374 'port_range_min': None,375 'ethertype': 'IPv4',376 'port_range_max': None,377 'protocol': None,378 'security_group_id': 'aaaa',379 'id': 'ffff'380 }381 })382 neutronclient.Client.create_security_group_rule({383 'security_group_rule': {384 'direction': 'egress',385 'remote_group_id': 'aaaa',386 'remote_ip_prefix': None,387 'port_range_min': None,388 'ethertype': 'IPv4',389 'port_range_max': None,390 'protocol': None,391 'security_group_id': 'aaaa'392 }393 }).AndReturn({394 'security_group_rule': {395 'direction': 'egress',396 'remote_group_id': 'aaaa',397 'remote_ip_prefix': None,398 'port_range_min': None,399 'ethertype': 'IPv4',400 'port_range_max': None,401 'protocol': None,402 'security_group_id': 'aaaa',403 'id': 'gggg'404 }405 })406 # update script407 neutronclient.Client.update_security_group(408 'aaaa',409 {'security_group': {410 'description': 'SSH access for private network',411 'name': 'myrules'}}412 ).AndReturn({413 'security_group': {414 'tenant_id': 'f18ca530cc05425e8bac0a5ff92f7e88',415 'name': 'myrules',416 'description': 'SSH access for private network',417 'security_group_rules': [],418 'id': 'aaaa'419 }420 })421 neutronclient.Client.show_security_group('aaaa').AndReturn(422 show_created)423 neutronclient.Client.delete_security_group_rule('bbbb').AndReturn(None)424 neutronclient.Client.delete_security_group_rule('cccc').AndReturn(None)425 neutronclient.Client.delete_security_group_rule('dddd').AndReturn(None)426 neutronclient.Client.delete_security_group_rule('eeee').AndReturn(None)427 neutronclient.Client.delete_security_group_rule('ffff').AndReturn(None)428 neutronclient.Client.delete_security_group_rule('gggg').AndReturn(None)429 neutronclient.Client.show_security_group('aaaa').AndReturn({430 'security_group': {431 'tenant_id': 'f18ca530cc05425e8bac0a5ff92f7e88',432 'name': 'sc1',433 'description': '',434 'security_group_rules': [],435 'id': 'aaaa'436 }437 })438 neutronclient.Client.create_security_group_rule({439 'security_group_rule': {440 'direction': 'egress',441 'ethertype': 'IPv4',442 'security_group_id': 'aaaa',443 }444 }).AndReturn({445 'security_group_rule': {446 'direction': 'egress',447 'remote_group_id': None,448 'remote_ip_prefix': None,449 'port_range_min': None,450 'ethertype': 'IPv4',451 'port_range_max': None,452 'protocol': None,453 'security_group_id': 'aaaa',454 'id': 'hhhh'455 }456 })457 neutronclient.Client.create_security_group_rule({458 'security_group_rule': {459 'direction': 'egress',460 'ethertype': 'IPv6',461 'security_group_id': 'aaaa',462 }463 }).AndReturn({464 'security_group_rule': {465 'direction': 'egress',466 'remote_group_id': None,467 'remote_ip_prefix': None,468 'port_range_min': None,469 'ethertype': 'IPv6',470 'port_range_max': None,471 'protocol': None,472 'security_group_id': 'aaaa',473 'id': 'iiii'474 }475 })476 neutronclient.Client.create_security_group_rule({477 'security_group_rule': {478 'direction': 'ingress',479 'remote_group_id': None,480 'remote_ip_prefix': '10.0.0.10/24',481 'port_range_min': '22',482 'ethertype': 'IPv4',483 'port_range_max': '22',484 'protocol': 'tcp',485 'security_group_id': 'aaaa'486 }487 }).AndReturn({488 'security_group_rule': {489 'direction': 'ingress',490 'remote_group_id': None,491 'remote_ip_prefix': '10.0.0.10/24',492 'port_range_min': '22',493 'ethertype': 'IPv4',494 'port_range_max': '22',495 'protocol': 'tcp',496 'security_group_id': 'aaaa',497 'id': 'jjjj'498 }499 })500 # delete script501 neutronclient.Client.show_security_group('aaaa').AndReturn(502 show_created)503 neutronclient.Client.delete_security_group_rule('bbbb').AndReturn(None)504 neutronclient.Client.delete_security_group_rule('cccc').AndReturn(None)505 neutronclient.Client.delete_security_group_rule('dddd').AndReturn(None)506 neutronclient.Client.delete_security_group_rule('eeee').AndReturn(None)507 neutronclient.Client.delete_security_group_rule('ffff').AndReturn(None)508 neutronclient.Client.delete_security_group_rule('gggg').AndReturn(None)509 neutronclient.Client.delete_security_group('aaaa').AndReturn(None)510 self.m.ReplayAll()511 stack = self.create_stack(self.test_template)512 sg = stack['the_sg']513 self.assertResourceState(sg, 'aaaa')514 updated_tmpl = template_format.parse(self.test_template_update)515 updated_stack = utils.parse_stack(updated_tmpl)516 stack.update(updated_stack)517 stack.delete()518 self.m.VerifyAll()519 def test_security_group_exception(self):520 # create script521 sg_name = utils.PhysName('test_stack', 'the_sg')522 neutronclient.Client.create_security_group({523 'security_group': {524 'name': sg_name,525 'description': 'HTTP and SSH access'526 }527 }).AndReturn({528 'security_group': {529 'tenant_id': 'f18ca530cc05425e8bac0a5ff92f7e88',530 'name': sg_name,531 'description': 'HTTP and SSH access',532 'security_group_rules': [],533 'id': 'aaaa'534 }535 })536 neutronclient.Client.create_security_group_rule({537 'security_group_rule': {538 'direction': 'ingress',539 'remote_group_id': None,540 'remote_ip_prefix': '0.0.0.0/0',541 'port_range_min': '22',542 'ethertype': 'IPv4',543 'port_range_max': '22',544 'protocol': 'tcp',545 'security_group_id': 'aaaa'546 }547 }).AndRaise(548 neutron_exc.Conflict())549 neutronclient.Client.create_security_group_rule({550 'security_group_rule': {551 'direction': 'ingress',552 'remote_group_id': None,553 'remote_ip_prefix': '0.0.0.0/0',554 'port_range_min': '80',555 'ethertype': 'IPv4',556 'port_range_max': '80',557 'protocol': 'tcp',558 'security_group_id': 'aaaa'559 }560 }).AndRaise(561 neutron_exc.Conflict())562 neutronclient.Client.create_security_group_rule({563 'security_group_rule': {564 'direction': 'ingress',565 'remote_group_id': 'wwww',566 'remote_ip_prefix': None,567 'port_range_min': None,568 'ethertype': 'IPv4',569 'port_range_max': None,570 'protocol': 'tcp',571 'security_group_id': 'aaaa'572 }573 }).AndRaise(574 neutron_exc.Conflict())575 neutronclient.Client.show_security_group('aaaa').AndReturn({576 'security_group': {577 'tenant_id': 'f18ca530cc05425e8bac0a5ff92f7e88',578 'name': sg_name,579 'description': 'HTTP and SSH access',580 'security_group_rules': [],581 'id': 'aaaa'582 }583 })584 neutronclient.Client.create_security_group_rule({585 'security_group_rule': {586 'direction': 'egress',587 'remote_group_id': None,588 'remote_ip_prefix': '10.0.1.0/24',589 'port_range_min': '22',590 'ethertype': 'IPv4',591 'port_range_max': '22',592 'protocol': 'tcp',593 'security_group_id': 'aaaa'594 }595 }).AndRaise(596 neutron_exc.Conflict())597 neutronclient.Client.create_security_group_rule({598 'security_group_rule': {599 'direction': 'egress',600 'remote_group_id': 'xxxx',601 'remote_ip_prefix': None,602 'port_range_min': None,603 'ethertype': 'IPv4',604 'port_range_max': None,605 'protocol': None,606 'security_group_id': 'aaaa'607 }608 }).AndRaise(609 neutron_exc.Conflict())610 neutronclient.Client.create_security_group_rule({611 'security_group_rule': {612 'direction': 'egress',613 'remote_group_id': 'aaaa',614 'remote_ip_prefix': None,615 'port_range_min': None,616 'ethertype': 'IPv4',617 'port_range_max': None,618 'protocol': None,619 'security_group_id': 'aaaa'620 }621 }).AndRaise(622 neutron_exc.Conflict())623 # delete script624 neutronclient.Client.show_security_group('aaaa').AndReturn({...
test_security_groups_negative.py
Source:test_security_groups_negative.py
...149 body, _ = self._create_security_group()150 min_port = 66151 max_port = 67152 # Create a rule with valid params153 self.client.create_security_group_rule(154 security_group_id=body['security_group']['id'],155 direction='ingress',156 ethertype=self.ethertype,157 protocol='tcp',158 port_range_min=min_port,159 port_range_max=max_port160 )161 # Try creating the same security group rule, it should fail162 self.assertRaises(163 lib_exc.Conflict, self.client.create_security_group_rule,164 security_group_id=body['security_group']['id'],165 protocol='tcp', direction='ingress', ethertype=self.ethertype,166 port_range_min=min_port, port_range_max=max_port)167 @test.attr(type=['negative', 'smoke'])...
security_group_rule.py
Source:security_group_rule.py
...24 """25 connection = connect(session["token"], session["project_id"])26 load = SecurityGroupRuleSchema().load(request.json)27 if load["type"] == "ssh":28 new_rule = connection.network.create_security_group_rule(29 direction="ingress",30 protocol="tcp",31 port_range_max=22,32 port_range_min=22,33 security_group_id=security_group_id,34 ether_type="IPv4",35 )36 if load["type"] == "all_icmp":37 new_rule = connection.network.create_security_group_rule(38 direction="ingress",39 protocol="ICMP",40 security_group_id=security_group_id,41 ether_type="IPv4",42 remote_ip_prefix="0.0.0.0/0")43 if load["type"] == "http":44 new_rule = connection.network.create_security_group_rule(45 direction="ingress",46 protocol="tcp",47 security_group_id=security_group_id,48 ether_type="IPv4",49 port_range_min="80",50 port_range_max="80",51 remote_ip_prefix="0.0.0.0/0")52 if load["type"] == "https":53 new_rule = connection.network.create_security_group_rule(54 direction="ingress",55 protocol="tcp",56 port_range_min="443",57 port_range_max="443",58 security_group_id=security_group_id,59 ether_type="IPv4",60 remote_ip_prefix="0.0.0.0/0")61 if load["type"] == "rdp":62 new_rule = connection.network.create_security_group_rule(63 direction="ingress",64 protocol="tcp",65 port_range_min="3389",66 port_range_max="3389",67 security_group_id=security_group_id,68 ether_type="IPv4",69 remote_ip_prefix="0.0.0.0/0")...
Learn to execute automation testing from scratch with LambdaTest Learning Hub. Right from setting up the prerequisites to run your first automation test, to following best practices and diving deeper into advanced test scenarios. LambdaTest Learning Hubs compile a list of step-by-step guides to help you be proficient with different test automation frameworks i.e. Selenium, Cypress, TestNG etc.
You could also refer to video tutorials over LambdaTest YouTube channel to get step by step demonstration from industry experts.
Get 100 minutes of automation test minutes FREE!!