blob: e329869b563a64d627a994a604939548a8c4f7a5 [file] [log] [blame]
Abhijeet Malawade3e067382013-12-08 21:54:56 -08001# Copyright 2013 NTT Data
2# All Rights Reserved.
3#
4# Licensed under the Apache License, Version 2.0 (the "License"); you may
5# not use this file except in compliance with the License. You may obtain
6# a copy of the License at
7#
8# http://www.apache.org/licenses/LICENSE-2.0
9#
10# Unless required by applicable law or agreed to in writing, software
11# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
12# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
13# License for the specific language governing permissions and limitations
14# under the License.
15
Abhijeet Malawade3e067382013-12-08 21:54:56 -080016from tempest.api.compute import base
Fei Long Wangd39431f2015-05-14 11:30:48 +120017from tempest.common.utils import data_utils
Masayuki Igawa394d8d92014-03-04 17:21:56 +090018from tempest import test
Abhijeet Malawade3e067382013-12-08 21:54:56 -080019
20
21class SecurityGroupsTestAdminJSON(base.BaseV2ComputeAdminTest):
Abhijeet Malawade3e067382013-12-08 21:54:56 -080022
23 @classmethod
Rohan Kanade60b73092015-02-04 17:58:19 +053024 def setup_clients(cls):
25 super(SecurityGroupsTestAdminJSON, cls).setup_clients()
John Warrenf2345512015-12-10 13:39:30 -050026 cls.adm_client = cls.os_adm.compute_security_groups_client
Abhijeet Malawade3e067382013-12-08 21:54:56 -080027 cls.client = cls.security_groups_client
28
29 def _delete_security_group(self, securitygroup_id, admin=True):
30 if admin:
David Kranz9964b4e2015-02-06 15:45:29 -050031 self.adm_client.delete_security_group(securitygroup_id)
Abhijeet Malawade3e067382013-12-08 21:54:56 -080032 else:
David Kranz9964b4e2015-02-06 15:45:29 -050033 self.client.delete_security_group(securitygroup_id)
Abhijeet Malawade3e067382013-12-08 21:54:56 -080034
Chris Hoge7579c1a2015-02-26 14:12:15 -080035 @test.idempotent_id('49667619-5af9-4c63-ab5d-2cfdd1c8f7f1')
Matthew Treinish2df97482014-06-13 15:02:26 -040036 @test.services('network')
Abhijeet Malawade3e067382013-12-08 21:54:56 -080037 def test_list_security_groups_list_all_tenants_filter(self):
38 # Admin can list security groups of all tenants
39 # List of all security groups created
40 security_group_list = []
41 # Create two security groups for a non-admin tenant
42 for i in range(2):
Ken'ichi Ohmichi4937f562015-03-23 00:15:01 +000043 name = data_utils.rand_name('securitygroup')
44 description = data_utils.rand_name('description')
ghanshyamb610b772015-08-24 17:29:38 +090045 securitygroup = self.client.create_security_group(
46 name=name, description=description)['security_group']
Abhijeet Malawade3e067382013-12-08 21:54:56 -080047 self.addCleanup(self._delete_security_group,
48 securitygroup['id'], admin=False)
49 security_group_list.append(securitygroup)
50
51 client_tenant_id = securitygroup['tenant_id']
52 # Create two security groups for admin tenant
53 for i in range(2):
Ken'ichi Ohmichi4937f562015-03-23 00:15:01 +000054 name = data_utils.rand_name('securitygroup')
55 description = data_utils.rand_name('description')
Ken'ichi Ohmichi34563cc2015-07-21 00:53:17 +000056 adm_securitygroup = self.adm_client.create_security_group(
ghanshyamb610b772015-08-24 17:29:38 +090057 name=name, description=description)['security_group']
Abhijeet Malawade3e067382013-12-08 21:54:56 -080058 self.addCleanup(self._delete_security_group,
59 adm_securitygroup['id'])
60 security_group_list.append(adm_securitygroup)
61
62 # Fetch all security groups based on 'all_tenants' search filter
ghanshyamb610b772015-08-24 17:29:38 +090063 fetched_list = self.adm_client.list_security_groups(
64 all_tenants='true')['security_groups']
Sirushti Murugesan935f2cc2016-07-12 19:48:24 +053065 sec_group_id_list = [sg['id'] for sg in fetched_list]
Abhijeet Malawade3e067382013-12-08 21:54:56 -080066 # Now check if all created Security Groups are present in fetched list
67 for sec_group in security_group_list:
68 self.assertIn(sec_group['id'], sec_group_id_list)
69
70 # Fetch all security groups for non-admin user with 'all_tenants'
71 # search filter
ghanshyamb610b772015-08-24 17:29:38 +090072 fetched_list = (self.client.list_security_groups(all_tenants='true')
73 ['security_groups'])
Abhijeet Malawade3e067382013-12-08 21:54:56 -080074 # Now check if all created Security Groups are present in fetched list
75 for sec_group in fetched_list:
76 self.assertEqual(sec_group['tenant_id'], client_tenant_id,
77 "Failed to get all security groups for "
78 "non admin user.")