self.assertEqual(res.status_int, 400)
req = self.new_list_request(collection)
res = req.get_response(self.api)
- self.assertEquals(res.status_int, 200)
+ self.assertEqual(res.status_int, 200)
items = self.deserialize('json', res)
self.assertEqual(len(items[collection]), 0)
class TestV2HTTPResponse(QuantumDbPluginV2TestCase):
def test_create_returns_201(self):
res = self._create_network('json', 'net2', True)
- self.assertEquals(res.status_int, 201)
+ self.assertEqual(res.status_int, 201)
def test_list_returns_200(self):
req = self.new_list_request('networks')
res = req.get_response(self.api)
- self.assertEquals(res.status_int, 200)
+ self.assertEqual(res.status_int, 200)
def _check_list_with_fields(self, res, field_name):
- self.assertEquals(res.status_int, 200)
+ self.assertEqual(res.status_int, 200)
body = self.deserialize('json', res)
# further checks: 1 networks
- self.assertEquals(len(body['networks']), 1)
+ self.assertEqual(len(body['networks']), 1)
# 1 field in the network record
- self.assertEquals(len(body['networks'][0]), 1)
+ self.assertEqual(len(body['networks'][0]), 1)
# field is 'name'
self.assertIn(field_name, body['networks'][0])
with self.network() as net:
req = self.new_show_request('networks', net['network']['id'])
res = req.get_response(self.api)
- self.assertEquals(res.status_int, 200)
+ self.assertEqual(res.status_int, 200)
def test_delete_returns_204(self):
res = self._create_network('json', 'net1', True)
net = self.deserialize('json', res)
req = self.new_delete_request('networks', net['network']['id'])
res = req.get_response(self.api)
- self.assertEquals(res.status_int, 204)
+ self.assertEqual(res.status_int, 204)
def test_update_returns_200(self):
with self.network() as net:
{'network': {'name': 'steve'}},
net['network']['id'])
res = req.get_response(self.api)
- self.assertEquals(res.status_int, 200)
+ self.assertEqual(res.status_int, 200)
def test_update_invalid_json_400(self):
with self.network() as net:
'{{"name": "aaa"}}',
net['network']['id'])
res = req.get_response(self.api)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_bad_route_404(self):
req = self.new_list_request('doohickeys')
res = req.get_response(self.api)
- self.assertEquals(res.status_int, 404)
+ self.assertEqual(res.status_int, 404)
class TestPortsV2(QuantumDbPluginV2TestCase):
keys = [('admin_state_up', True), ('status', 'ACTIVE')]
with self.port(name='myname') as port:
for k, v in keys:
- self.assertEquals(port['port'][k], v)
+ self.assertEqual(port['port'][k], v)
self.assertTrue('mac_address' in port['port'])
ips = port['port']['fixed_ips']
- self.assertEquals(len(ips), 1)
- self.assertEquals(ips[0]['ip_address'], '10.0.0.2')
- self.assertEquals('myname', port['port']['name'])
+ self.assertEqual(len(ips), 1)
+ self.assertEqual(ips[0]['ip_address'], '10.0.0.2')
+ self.assertEqual('myname', port['port']['name'])
def test_create_port_bad_tenant(self):
with self.network() as network:
port_req = self.new_create_request('ports', data)
res = port_req.get_response(self.api)
- self.assertEquals(res.status_int, 403)
+ self.assertEqual(res.status_int, 403)
def test_create_port_public_network(self):
keys = [('admin_state_up', True), ('status', 'ACTIVE')]
set_context=True)
port = self.deserialize('json', port_res)
for k, v in keys:
- self.assertEquals(port['port'][k], v)
+ self.assertEqual(port['port'][k], v)
self.assertTrue('mac_address' in port['port'])
self._delete('ports', port['port']['id'])
set_context=True)
port = self.deserialize('json', port_res)
for k, v in keys:
- self.assertEquals(port['port'][k], v)
+ self.assertEqual(port['port'][k], v)
self.assertTrue('mac_address' in port['port'])
self._delete('ports', port['port']['id'])
self.assertEqual(res.status_int, 400)
req = self.new_list_request('ports')
res = req.get_response(self.api)
- self.assertEquals(res.status_int, 200)
+ self.assertEqual(res.status_int, 200)
ports = self.deserialize('json', res)
self.assertEqual(len(ports['ports']), 0)
with self.port() as port:
req = self.new_show_request('ports', port['port']['id'], 'json')
sport = self.deserialize('json', req.get_response(self.api))
- self.assertEquals(port['port']['id'], sport['port']['id'])
+ self.assertEqual(port['port']['id'], sport['port']['id'])
def test_delete_port(self):
port_id = None
port_id = port['port']['id']
req = self.new_show_request('port', 'json', port['port']['id'])
res = req.get_response(self.api)
- self.assertEquals(res.status_int, 404)
+ self.assertEqual(res.status_int, 404)
def test_delete_port_public_network(self):
with self.network(shared=True) as network:
data = {'port': {'device_id': None}}
req = self.new_update_request('ports', data, port['port']['id'])
res = req.get_response(self.api)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_delete_network_if_port_exists(self):
fmt = 'json'
req = self.new_delete_request('networks',
port['port']['network_id'])
res = req.get_response(self.api)
- self.assertEquals(res.status_int, 409)
+ self.assertEqual(res.status_int, 409)
def test_delete_network_port_exists_owned_by_network(self):
gateway_ip = '10.0.0.1'
self._create_port(fmt, network_id, device_owner='network:dhcp')
req = self.new_delete_request('networks', network_id)
res = req.get_response(self.api)
- self.assertEquals(res.status_int, 204)
+ self.assertEqual(res.status_int, 204)
def test_update_port_delete_ip(self):
with self.subnet() as subnet:
with self.subnet() as subnet:
with self.port(subnet=subnet) as port:
ips = port['port']['fixed_ips']
- self.assertEquals(len(ips), 1)
- self.assertEquals(ips[0]['ip_address'], '10.0.0.2')
- self.assertEquals(ips[0]['subnet_id'], subnet['subnet']['id'])
+ self.assertEqual(len(ips), 1)
+ self.assertEqual(ips[0]['ip_address'], '10.0.0.2')
+ self.assertEqual(ips[0]['subnet_id'], subnet['subnet']['id'])
data = {'port': {'fixed_ips': [{'subnet_id':
subnet['subnet']['id'],
'ip_address': "10.0.0.10"}]}}
port['port']['id'])
res = self.deserialize('json', req.get_response(self.api))
ips = res['port']['fixed_ips']
- self.assertEquals(len(ips), 1)
- self.assertEquals(ips[0]['ip_address'], '10.0.0.10')
- self.assertEquals(ips[0]['subnet_id'], subnet['subnet']['id'])
+ self.assertEqual(len(ips), 1)
+ self.assertEqual(ips[0]['ip_address'], '10.0.0.10')
+ self.assertEqual(ips[0]['subnet_id'], subnet['subnet']['id'])
def test_update_port_update_ips(self):
"""Update IP and generate new IP on port.
self.assertEqual(res['port']['admin_state_up'],
data['port']['admin_state_up'])
ips = res['port']['fixed_ips']
- self.assertEquals(len(ips), 1)
- self.assertEquals(ips[0]['ip_address'], '10.0.0.3')
- self.assertEquals(ips[0]['subnet_id'], subnet['subnet']['id'])
+ self.assertEqual(len(ips), 1)
+ self.assertEqual(ips[0]['ip_address'], '10.0.0.3')
+ self.assertEqual(ips[0]['subnet_id'], subnet['subnet']['id'])
def test_update_port_add_additional_ip(self):
"""Test update of port with additional IP."""
self.assertEqual(res['port']['admin_state_up'],
data['port']['admin_state_up'])
ips = res['port']['fixed_ips']
- self.assertEquals(len(ips), 2)
- self.assertEquals(ips[0]['ip_address'], '10.0.0.3')
- self.assertEquals(ips[0]['subnet_id'], subnet['subnet']['id'])
- self.assertEquals(ips[1]['ip_address'], '10.0.0.4')
- self.assertEquals(ips[1]['subnet_id'], subnet['subnet']['id'])
+ self.assertEqual(len(ips), 2)
+ self.assertEqual(ips[0]['ip_address'], '10.0.0.3')
+ self.assertEqual(ips[0]['subnet_id'], subnet['subnet']['id'])
+ self.assertEqual(ips[1]['ip_address'], '10.0.0.4')
+ self.assertEqual(ips[1]['subnet_id'], subnet['subnet']['id'])
def test_requested_duplicate_mac(self):
fmt = 'json'
net_id = port['port']['network_id']
res = self._create_port(fmt, net_id=net_id, **kwargs)
port2 = self.deserialize(fmt, res)
- self.assertEquals(res.status_int, 409)
+ self.assertEqual(res.status_int, 409)
def test_mac_generation(self):
cfg.CONF.set_override('base_mac', "12:34:56:00:00:00")
network = self.deserialize(fmt, res)
net_id = network['network']['id']
res = self._create_port(fmt, net_id=net_id)
- self.assertEquals(res.status_int, 503)
+ self.assertEqual(res.status_int, 503)
def test_requested_duplicate_ip(self):
fmt = 'json'
with self.subnet() as subnet:
with self.port(subnet=subnet) as port:
ips = port['port']['fixed_ips']
- self.assertEquals(len(ips), 1)
- self.assertEquals(ips[0]['ip_address'], '10.0.0.2')
- self.assertEquals(ips[0]['subnet_id'], subnet['subnet']['id'])
+ self.assertEqual(len(ips), 1)
+ self.assertEqual(ips[0]['ip_address'], '10.0.0.2')
+ self.assertEqual(ips[0]['subnet_id'], subnet['subnet']['id'])
# Check configuring of duplicate IP
kwargs = {"fixed_ips": [{'subnet_id': subnet['subnet']['id'],
'ip_address': ips[0]['ip_address']}]}
net_id = port['port']['network_id']
res = self._create_port(fmt, net_id=net_id, **kwargs)
port2 = self.deserialize(fmt, res)
- self.assertEquals(res.status_int, 409)
+ self.assertEqual(res.status_int, 409)
def test_requested_subnet_delete(self):
fmt = 'json'
with self.subnet() as subnet:
with self.port(subnet=subnet) as port:
ips = port['port']['fixed_ips']
- self.assertEquals(len(ips), 1)
- self.assertEquals(ips[0]['ip_address'], '10.0.0.2')
- self.assertEquals(ips[0]['subnet_id'], subnet['subnet']['id'])
+ self.assertEqual(len(ips), 1)
+ self.assertEqual(ips[0]['ip_address'], '10.0.0.2')
+ self.assertEqual(ips[0]['subnet_id'], subnet['subnet']['id'])
req = self.new_delete_request('subnet',
subnet['subnet']['id'])
res = req.get_response(self.api)
- self.assertEquals(res.status_int, 404)
+ self.assertEqual(res.status_int, 404)
def test_requested_subnet_id(self):
fmt = 'json'
with self.subnet() as subnet:
with self.port(subnet=subnet) as port:
ips = port['port']['fixed_ips']
- self.assertEquals(len(ips), 1)
- self.assertEquals(ips[0]['ip_address'], '10.0.0.2')
- self.assertEquals(ips[0]['subnet_id'], subnet['subnet']['id'])
+ self.assertEqual(len(ips), 1)
+ self.assertEqual(ips[0]['ip_address'], '10.0.0.2')
+ self.assertEqual(ips[0]['subnet_id'], subnet['subnet']['id'])
# Request a IP from specific subnet
kwargs = {"fixed_ips": [{'subnet_id': subnet['subnet']['id']}]}
net_id = port['port']['network_id']
res = self._create_port(fmt, net_id=net_id, **kwargs)
port2 = self.deserialize(fmt, res)
ips = port2['port']['fixed_ips']
- self.assertEquals(len(ips), 1)
- self.assertEquals(ips[0]['ip_address'], '10.0.0.3')
- self.assertEquals(ips[0]['subnet_id'], subnet['subnet']['id'])
+ self.assertEqual(len(ips), 1)
+ self.assertEqual(ips[0]['ip_address'], '10.0.0.3')
+ self.assertEqual(ips[0]['subnet_id'], subnet['subnet']['id'])
self._delete('ports', port2['port']['id'])
def test_requested_subnet_id_not_on_network(self):
subnet2['subnet']['id']}]}
net_id = port['port']['network_id']
res = self._create_port(fmt, net_id=net_id, **kwargs)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_overlapping_subnets(self):
fmt = 'json'
cidr='10.0.0.225/28',
ip_version=4,
gateway_ip=ATTR_NOT_SPECIFIED)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_requested_subnet_id_v4_and_v6(self):
fmt = 'json'
res = self._create_port(fmt, net_id=net_id, **kwargs)
port3 = self.deserialize(fmt, res)
ips = port3['port']['fixed_ips']
- self.assertEquals(len(ips), 2)
- self.assertEquals(ips[0]['ip_address'], '10.0.0.2')
- self.assertEquals(ips[0]['subnet_id'], subnet['subnet']['id'])
- self.assertEquals(ips[1]['ip_address'], '2607:f0d0:1002:51::2')
- self.assertEquals(ips[1]['subnet_id'], subnet2['subnet']['id'])
+ self.assertEqual(len(ips), 2)
+ self.assertEqual(ips[0]['ip_address'], '10.0.0.2')
+ self.assertEqual(ips[0]['subnet_id'], subnet['subnet']['id'])
+ self.assertEqual(ips[1]['ip_address'], '2607:f0d0:1002:51::2')
+ self.assertEqual(ips[1]['subnet_id'], subnet2['subnet']['id'])
res = self._create_port(fmt, net_id=net_id)
port4 = self.deserialize(fmt, res)
# Check that a v4 and a v6 address are allocated
ips = port4['port']['fixed_ips']
- self.assertEquals(len(ips), 2)
- self.assertEquals(ips[0]['ip_address'], '10.0.0.3')
- self.assertEquals(ips[0]['subnet_id'], subnet['subnet']['id'])
- self.assertEquals(ips[1]['ip_address'], '2607:f0d0:1002:51::3')
- self.assertEquals(ips[1]['subnet_id'], subnet2['subnet']['id'])
+ self.assertEqual(len(ips), 2)
+ self.assertEqual(ips[0]['ip_address'], '10.0.0.3')
+ self.assertEqual(ips[0]['subnet_id'], subnet['subnet']['id'])
+ self.assertEqual(ips[1]['ip_address'], '2607:f0d0:1002:51::3')
+ self.assertEqual(ips[1]['subnet_id'], subnet2['subnet']['id'])
self._delete('ports', port3['port']['id'])
self._delete('ports', port4['port']['id'])
res = self._create_port(fmt, net_id=net_id, **kwargs)
port = self.deserialize(fmt, res)
ips = port['port']['fixed_ips']
- self.assertEquals(len(ips), 5)
+ self.assertEqual(len(ips), 5)
alloc = ['10.0.0.1', '10.0.0.2', '10.0.0.4', '10.0.0.5',
'10.0.0.6']
for i in range(len(alloc)):
- self.assertEquals(ips[i]['ip_address'], alloc[i])
- self.assertEquals(ips[i]['subnet_id'],
- subnet['subnet']['id'])
+ self.assertEqual(ips[i]['ip_address'], alloc[i])
+ self.assertEqual(ips[i]['subnet_id'],
+ subnet['subnet']['id'])
self._delete('ports', port['port']['id'])
with self.subnet(gateway_ip='11.0.0.6',
res = self._create_port(fmt, net_id=net_id, **kwargs)
port = self.deserialize(fmt, res)
ips = port['port']['fixed_ips']
- self.assertEquals(len(ips), 5)
+ self.assertEqual(len(ips), 5)
alloc = ['11.0.0.1', '11.0.0.2', '11.0.0.3', '11.0.0.4',
'11.0.0.5']
for i in range(len(alloc)):
- self.assertEquals(ips[i]['ip_address'], alloc[i])
- self.assertEquals(ips[i]['subnet_id'],
- subnet['subnet']['id'])
+ self.assertEqual(ips[i]['ip_address'], alloc[i])
+ self.assertEqual(ips[i]['subnet_id'],
+ subnet['subnet']['id'])
self._delete('ports', port['port']['id'])
def test_requested_invalid_fixed_ips(self):
with self.subnet() as subnet:
with self.port(subnet=subnet) as port:
ips = port['port']['fixed_ips']
- self.assertEquals(len(ips), 1)
- self.assertEquals(ips[0]['ip_address'], '10.0.0.2')
- self.assertEquals(ips[0]['subnet_id'], subnet['subnet']['id'])
+ self.assertEqual(len(ips), 1)
+ self.assertEqual(ips[0]['ip_address'], '10.0.0.2')
+ self.assertEqual(ips[0]['subnet_id'], subnet['subnet']['id'])
# Test invalid subnet_id
kwargs = {"fixed_ips":
[{'subnet_id': subnet['subnet']['id']},
net_id = port['port']['network_id']
res = self._create_port(fmt, net_id=net_id, **kwargs)
port2 = self.deserialize(fmt, res)
- self.assertEquals(res.status_int, 404)
+ self.assertEqual(res.status_int, 404)
# Test invalid IP address on specified subnet_id
kwargs = {"fixed_ips":
net_id = port['port']['network_id']
res = self._create_port(fmt, net_id=net_id, **kwargs)
port2 = self.deserialize(fmt, res)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
# Test invalid addresses - IP's not on subnet or network
# address or broadcast address
kwargs = {"fixed_ips": [{'ip_address': ip}]}
res = self._create_port(fmt, net_id=net_id, **kwargs)
port2 = self.deserialize(fmt, res)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
# Enable allocation of gateway address
kwargs = {"fixed_ips":
res = self._create_port(fmt, net_id=net_id, **kwargs)
port2 = self.deserialize(fmt, res)
ips = port2['port']['fixed_ips']
- self.assertEquals(len(ips), 1)
- self.assertEquals(ips[0]['ip_address'], '10.0.0.1')
- self.assertEquals(ips[0]['subnet_id'], subnet['subnet']['id'])
+ self.assertEqual(len(ips), 1)
+ self.assertEqual(ips[0]['ip_address'], '10.0.0.1')
+ self.assertEqual(ips[0]['subnet_id'], subnet['subnet']['id'])
self._delete('ports', port2['port']['id'])
def test_invalid_ip(self):
net_id = subnet['subnet']['network_id']
res = self._create_port(fmt, net_id=net_id, **kwargs)
port = self.deserialize(fmt, res)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_requested_split(self):
fmt = 'json'
with self.port(subnet=subnet) as port:
ports_to_delete = []
ips = port['port']['fixed_ips']
- self.assertEquals(len(ips), 1)
- self.assertEquals(ips[0]['ip_address'], '10.0.0.2')
- self.assertEquals(ips[0]['subnet_id'], subnet['subnet']['id'])
+ self.assertEqual(len(ips), 1)
+ self.assertEqual(ips[0]['ip_address'], '10.0.0.2')
+ self.assertEqual(ips[0]['subnet_id'], subnet['subnet']['id'])
# Allocate specific IP
kwargs = {"fixed_ips": [{'subnet_id': subnet['subnet']['id'],
'ip_address': '10.0.0.5'}]}
port2 = self.deserialize(fmt, res)
ports_to_delete.append(port2)
ips = port2['port']['fixed_ips']
- self.assertEquals(len(ips), 1)
- self.assertEquals(ips[0]['ip_address'], '10.0.0.5')
- self.assertEquals(ips[0]['subnet_id'], subnet['subnet']['id'])
+ self.assertEqual(len(ips), 1)
+ self.assertEqual(ips[0]['ip_address'], '10.0.0.5')
+ self.assertEqual(ips[0]['subnet_id'], subnet['subnet']['id'])
# Allocate specific IP's
allocated = ['10.0.0.3', '10.0.0.4', '10.0.0.6']
port2 = self.deserialize(fmt, res)
ports_to_delete.append(port2)
ips = port2['port']['fixed_ips']
- self.assertEquals(len(ips), 1)
- self.assertEquals(ips[0]['ip_address'], a)
- self.assertEquals(ips[0]['subnet_id'],
- subnet['subnet']['id'])
+ self.assertEqual(len(ips), 1)
+ self.assertEqual(ips[0]['ip_address'], a)
+ self.assertEqual(ips[0]['subnet_id'],
+ subnet['subnet']['id'])
for p in ports_to_delete:
self._delete('ports', p['port']['id'])
net_id = subnet['subnet']['network_id']
res = self._create_port(fmt, net_id=net_id, **kwargs)
port2 = self.deserialize(fmt, res)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_fixed_ip_invalid_subnet_id(self):
fmt = 'json'
net_id = subnet['subnet']['network_id']
res = self._create_port(fmt, net_id=net_id, **kwargs)
port2 = self.deserialize(fmt, res)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_fixed_ip_invalid_ip(self):
fmt = 'json'
net_id = subnet['subnet']['network_id']
res = self._create_port(fmt, net_id=net_id, **kwargs)
port2 = self.deserialize(fmt, res)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_requested_ips_only(self):
fmt = 'json'
with self.subnet() as subnet:
with self.port(subnet=subnet) as port:
ips = port['port']['fixed_ips']
- self.assertEquals(len(ips), 1)
- self.assertEquals(ips[0]['ip_address'], '10.0.0.2')
- self.assertEquals(ips[0]['subnet_id'], subnet['subnet']['id'])
+ self.assertEqual(len(ips), 1)
+ self.assertEqual(ips[0]['ip_address'], '10.0.0.2')
+ self.assertEqual(ips[0]['subnet_id'], subnet['subnet']['id'])
ips_only = ['10.0.0.18', '10.0.0.20', '10.0.0.22', '10.0.0.21',
'10.0.0.3', '10.0.0.17', '10.0.0.19']
ports_to_delete = []
port = self.deserialize(fmt, res)
ports_to_delete.append(port)
ips = port['port']['fixed_ips']
- self.assertEquals(len(ips), 1)
- self.assertEquals(ips[0]['ip_address'], i)
- self.assertEquals(ips[0]['subnet_id'],
- subnet['subnet']['id'])
+ self.assertEqual(len(ips), 1)
+ self.assertEqual(ips[0]['ip_address'], i)
+ self.assertEqual(ips[0]['subnet_id'],
+ subnet['subnet']['id'])
for p in ports_to_delete:
self._delete('ports', p['port']['id'])
with mock.patch.object(timeutils, 'utcnow') as mock_utcnow:
mock_utcnow.return_value = reference
ips = port['port']['fixed_ips']
- self.assertEquals(len(ips), 1)
- self.assertEquals(ips[0]['ip_address'], '10.0.1.2')
- self.assertEquals(ips[0]['subnet_id'],
- subnet['subnet']['id'])
+ self.assertEqual(len(ips), 1)
+ self.assertEqual(ips[0]['ip_address'], '10.0.1.2')
+ self.assertEqual(ips[0]['subnet_id'],
+ subnet['subnet']['id'])
net_id = port['port']['network_id']
ports = []
for i in range(16 - 3):
res = self._create_port(fmt, net_id=net_id)
port = self.deserialize(fmt, res)
ips = port['port']['fixed_ips']
- self.assertEquals(len(ips), 1)
- self.assertEquals(ips[0]['ip_address'], '10.0.1.3')
- self.assertEquals(ips[0]['subnet_id'],
- subnet['subnet']['id'])
+ self.assertEqual(len(ips), 1)
+ self.assertEqual(ips[0]['ip_address'], '10.0.1.3')
+ self.assertEqual(ips[0]['subnet_id'],
+ subnet['subnet']['id'])
self._delete('ports', port['port']['id'])
def test_invalid_admin_state(self):
'fixed_ips': []}}
port_req = self.new_create_request('ports', data)
res = port_req.get_response(self.api)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_invalid_mac_address(self):
with self.network() as network:
'fixed_ips': []}}
port_req = self.new_create_request('ports', data)
res = port_req.get_response(self.api)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_default_allocation_expiration(self):
cfg.CONF.set_override('dhcp_lease_duration', 120)
with self.port(subnet=subnet, no_delete=True) as port:
req = self.new_delete_request('ports', port['port']['id'])
res = req.get_response(self.api)
- self.assertEquals(res.status_int, 204)
+ self.assertEqual(res.status_int, 204)
hold_ip.assert_called_once_with(
mock.ANY,
q = update_context.session.query(models_v2.IPAllocation)
q = q.filter_by(port_id=None, ip_address=ip_address)
- self.assertEquals(len(q.all()), 1)
+ self.assertEqual(len(q.all()), 1)
def test_recycle_held_ip_address(self):
plugin = QuantumManager.get_plugin()
with mock.patch.object(plugin, '_recycle_ip') as rc:
plugin._recycle_expired_ip_allocations(
update_context, subnet['subnet']['network_id'])
- rc.assertEquals(len(rc.mock_calls), 1)
- self.assertEquals(update_context._recycled_networks,
- set([subnet['subnet']['network_id']]))
+ rc.assertEqual(len(rc.mock_calls), 1)
+ self.assertEqual(update_context._recycled_networks,
+ set([subnet['subnet']['network_id']]))
def test_recycle_expired_previously_run_within_context(self):
plugin = QuantumManager.get_plugin()
plugin._recycle_expired_ip_allocations(
update_context, subnet['subnet']['network_id'])
rc.assertFalse(rc.called)
- self.assertEquals(update_context._recycled_networks,
- set([subnet['subnet']['network_id']]))
+ self.assertEqual(update_context._recycled_networks,
+ set([subnet['subnet']['network_id']]))
class TestNetworksV2(QuantumDbPluginV2TestCase):
('status', 'ACTIVE'), ('shared', False)]
with self.network(name=name) as net:
for k, v in keys:
- self.assertEquals(net['network'][k], v)
+ self.assertEqual(net['network'][k], v)
def test_create_public_network(self):
name = 'public_net'
('status', 'ACTIVE'), ('shared', True)]
with self.network(name=name, shared=True) as net:
for k, v in keys:
- self.assertEquals(net['network'][k], v)
+ self.assertEqual(net['network'][k], v)
def test_create_public_network_no_admin_tenant(self):
name = 'public_net'
tenant_id="another_tenant",
set_context=True):
pass
- self.assertEquals(ctx_manager.exception.code, 403)
+ self.assertEqual(ctx_manager.exception.code, 403)
def test_update_network(self):
with self.network() as network:
self.assertEqual(res.status_int, 400)
req = self.new_list_request('networks')
res = req.get_response(self.api)
- self.assertEquals(res.status_int, 200)
+ self.assertEqual(res.status_int, 200)
nets = self.deserialize('json', res)
self.assertEqual(len(nets['networks']), 0)
req = self.new_list_request('networks',
params='fields=name')
res = self.deserialize('json', req.get_response(self.api))
- self.assertEquals(1, len(res['networks']))
- self.assertEquals(res['networks'][0]['name'],
- net1['network']['name'])
- self.assertEquals(None,
- res['networks'][0].get('id'))
+ self.assertEqual(1, len(res['networks']))
+ self.assertEqual(res['networks'][0]['name'],
+ net1['network']['name'])
+ self.assertEqual(None,
+ res['networks'][0].get('id'))
def test_list_networks_with_parameters_invalid_values(self):
with contextlib.nested(self.network(name='net1',
req = self.new_list_request('networks',
params='admin_state_up=fake')
res = req.get_response(self.api)
- self.assertEquals(400, res.status_int)
+ self.assertEqual(400, res.status_int)
def test_show_network(self):
with self.network(name='net1') as net:
req = self.new_show_request('networks', net['network']['id'])
res = self.deserialize('json', req.get_response(self.api))
- self.assertEquals(res['network']['name'],
- net['network']['name'])
+ self.assertEqual(res['network']['name'],
+ net['network']['name'])
def test_show_network_with_subnet(self):
with self.network(name='net1') as net:
with self.subnet(net) as subnet:
req = self.new_show_request('networks', net['network']['id'])
res = self.deserialize('json', req.get_response(self.api))
- self.assertEquals(res['network']['subnets'][0],
- subnet['subnet']['id'])
+ self.assertEqual(res['network']['subnets'][0],
+ subnet['subnet']['id'])
def test_invalid_admin_status(self):
fmt = 'json'
'tenant_id': self._tenant_id}}
network_req = self.new_create_request('networks', data)
req = network_req.get_response(self.api)
- self.assertEquals(req.status_int, v[2])
+ self.assertEqual(req.status_int, v[2])
if v[2] == 201:
res = self.deserialize(fmt, req)
- self.assertEquals(res['network']['admin_state_up'], v[1])
+ self.assertEqual(res['network']['admin_state_up'], v[1])
class TestSubnetsV2(QuantumDbPluginV2TestCase):
# verify the response has each key with the correct value
for k in keys:
self.assertIn(k, subnet['subnet'])
- self.assertEquals(subnet['subnet'][k], keys[k])
+ self.assertEqual(subnet['subnet'][k], keys[k])
# verify the configured validations are correct
if expected:
for k in expected:
self.assertIn(k, subnet['subnet'])
- self.assertEquals(subnet['subnet'][k], expected[k])
+ self.assertEqual(subnet['subnet'][k], expected[k])
return subnet
def test_create_subnet(self):
gateway_ip=gateway_ip_2,
cidr=cidr_2):
pass
- self.assertEquals(ctx_manager.exception.code, 400)
+ self.assertEqual(ctx_manager.exception.code, 400)
def test_create_subnet_bad_V4_cidr(self):
with self.network() as network:
'gateway_ip': '10.0.2.1'}}
subnet_req = self.new_create_request('subnets', data)
res = subnet_req.get_response(self.api)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_create_subnet_bad_V6_cidr(self):
with self.network() as network:
'gateway_ip': 'fe80::1'}}
subnet_req = self.new_create_request('subnets', data)
res = subnet_req.get_response(self.api)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_create_2_subnets_overlapping_cidr_allowed_returns_200(self):
cidr_1 = '10.0.0.0/23'
with contextlib.nested(self.subnet(cidr=cidr_1),
self.subnet(cidr=cidr_2)):
pass
- self.assertEquals(ctx_manager.exception.code, 400)
+ self.assertEqual(ctx_manager.exception.code, 400)
def test_create_subnets_bulk_native(self):
if self._skip_native_bulk:
cidr, ip_version=4)
req = self.new_delete_request('subnets', subnet['subnet']['id'])
res = req.get_response(self.api)
- self.assertEquals(res.status_int, 204)
+ self.assertEqual(res.status_int, 204)
def test_delete_subnet_port_exists_owned_by_network(self):
gateway_ip = '10.0.0.1'
device_owner='network:dhcp')
req = self.new_delete_request('subnets', subnet['subnet']['id'])
res = req.get_response(self.api)
- self.assertEquals(res.status_int, 204)
+ self.assertEqual(res.status_int, 204)
def test_delete_subnet_port_exists_owned_by_other(self):
with self.subnet() as subnet:
req = self.new_delete_request('subnets',
subnet['subnet']['id'])
res = req.get_response(self.api)
- self.assertEquals(res.status_int, 409)
+ self.assertEqual(res.status_int, 409)
def test_delete_network(self):
gateway_ip = '10.0.0.1'
cidr, ip_version=4)
req = self.new_delete_request('networks', network['network']['id'])
res = req.get_response(self.api)
- self.assertEquals(res.status_int, 204)
+ self.assertEqual(res.status_int, 204)
def test_create_subnet_bad_tenant(self):
with self.network() as network:
subnet_req = self.new_create_request('subnets', data)
res = subnet_req.get_response(self.api)
- self.assertEquals(res.status_int, 403)
+ self.assertEqual(res.status_int, 403)
def test_create_subnet_bad_ip_version(self):
with self.network() as network:
'gateway_ip': '10.0.2.1'}}
subnet_req = self.new_create_request('subnets', data)
res = subnet_req.get_response(self.api)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_create_subnet_bad_ip_version_null(self):
with self.network() as network:
'gateway_ip': '10.0.2.1'}}
subnet_req = self.new_create_request('subnets', data)
res = subnet_req.get_response(self.api)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_create_subnet_bad_uuid(self):
with self.network() as network:
'gateway_ip': '10.0.2.1'}}
subnet_req = self.new_create_request('subnets', data)
res = subnet_req.get_response(self.api)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_create_subnet_bad_boolean(self):
with self.network() as network:
'gateway_ip': '10.0.2.1'}}
subnet_req = self.new_create_request('subnets', data)
res = subnet_req.get_response(self.api)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_create_subnet_bad_pools(self):
with self.network() as network:
'allocation_pools': pool}}
subnet_req = self.new_create_request('subnets', data)
res = subnet_req.get_response(self.api)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_create_subnet_bad_nameserver(self):
with self.network() as network:
'dns_nameservers': nameservers}}
subnet_req = self.new_create_request('subnets', data)
res = subnet_req.get_response(self.api)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_create_subnet_bad_hostroutes(self):
with self.network() as network:
'host_routes': hostroutes}}
subnet_req = self.new_create_request('subnets', data)
res = subnet_req.get_response(self.api)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_create_subnet_defaults(self):
gateway = '10.0.0.1'
enable_dhcp = True
subnet = self._test_create_subnet()
# verify cidr & gw have been correctly generated
- self.assertEquals(subnet['subnet']['cidr'], cidr)
- self.assertEquals(subnet['subnet']['gateway_ip'], gateway)
- self.assertEquals(subnet['subnet']['enable_dhcp'], enable_dhcp)
- self.assertEquals(subnet['subnet']['allocation_pools'],
- allocation_pools)
+ self.assertEqual(subnet['subnet']['cidr'], cidr)
+ self.assertEqual(subnet['subnet']['gateway_ip'], gateway)
+ self.assertEqual(subnet['subnet']['enable_dhcp'], enable_dhcp)
+ self.assertEqual(subnet['subnet']['allocation_pools'],
+ allocation_pools)
def test_create_subnet_gw_values(self):
# Gateway not in subnet
kwargs = {"fixed_ips": [{'subnet_id': subnet['subnet']['id'],
'ip_address': '10.0.0.10'}]}
res = self._create_port(fmt, net_id=net_id, **kwargs)
- self.assertEquals(res.status_int, 201)
+ self.assertEqual(res.status_int, 201)
port = self.deserialize('json', res)
port_id = port['port']['id']
# delete the port
kwargs = {"fixed_ips": [{'subnet_id': subnet['subnet']['id'],
'ip_address': '10.0.0.1'}]}
res = self._create_port(fmt, net_id=net_id, **kwargs)
- self.assertEquals(res.status_int, 201)
+ self.assertEqual(res.status_int, 201)
port = self.deserialize('json', res)
port_id = port['port']['id']
# delete the port
with self.assertRaises(webob.exc.HTTPClientError) as ctx_manager:
self._test_create_subnet(cidr=cidr,
allocation_pools=allocation_pools)
- self.assertEquals(ctx_manager.exception.code, 409)
+ self.assertEqual(ctx_manager.exception.code, 409)
def test_create_subnet_gateway_in_allocation_pool_returns_409(self):
gateway_ip = '10.0.0.50'
self._test_create_subnet(gateway_ip=gateway_ip,
cidr=cidr,
allocation_pools=allocation_pools)
- self.assertEquals(ctx_manager.exception.code, 409)
+ self.assertEqual(ctx_manager.exception.code, 409)
def test_create_subnet_overlapping_allocation_pools_returns_409(self):
gateway_ip = '10.0.0.1'
self._test_create_subnet(gateway_ip=gateway_ip,
cidr=cidr,
allocation_pools=allocation_pools)
- self.assertEquals(ctx_manager.exception.code, 409)
+ self.assertEqual(ctx_manager.exception.code, 409)
def test_create_subnet_invalid_allocation_pool_returns_400(self):
gateway_ip = '10.0.0.1'
self._test_create_subnet(gateway_ip=gateway_ip,
cidr=cidr,
allocation_pools=allocation_pools)
- self.assertEquals(ctx_manager.exception.code, 400)
+ self.assertEqual(ctx_manager.exception.code, 400)
def test_create_subnet_out_of_range_allocation_pool_returns_400(self):
gateway_ip = '10.0.0.1'
self._test_create_subnet(gateway_ip=gateway_ip,
cidr=cidr,
allocation_pools=allocation_pools)
- self.assertEquals(ctx_manager.exception.code, 400)
+ self.assertEqual(ctx_manager.exception.code, 400)
def test_create_subnet_shared_returns_400(self):
cidr = '10.0.0.0/24'
with self.assertRaises(webob.exc.HTTPClientError) as ctx_manager:
self._test_create_subnet(cidr=cidr,
shared=True)
- self.assertEquals(ctx_manager.exception.code, 400)
+ self.assertEqual(ctx_manager.exception.code, 400)
def test_create_subnet_inconsistent_ipv6_cidrv4(self):
with self.network() as network:
'tenant_id': network['network']['tenant_id']}}
subnet_req = self.new_create_request('subnets', data)
res = subnet_req.get_response(self.api)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_create_subnet_inconsistent_ipv4_cidrv6(self):
with self.network() as network:
'tenant_id': network['network']['tenant_id']}}
subnet_req = self.new_create_request('subnets', data)
res = subnet_req.get_response(self.api)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_create_subnet_inconsistent_ipv4_gatewayv6(self):
with self.network() as network:
'tenant_id': network['network']['tenant_id']}}
subnet_req = self.new_create_request('subnets', data)
res = subnet_req.get_response(self.api)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_create_subnet_inconsistent_ipv6_gatewayv4(self):
with self.network() as network:
'tenant_id': network['network']['tenant_id']}}
subnet_req = self.new_create_request('subnets', data)
res = subnet_req.get_response(self.api)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_create_subnet_inconsistent_ipv6_dns_v4(self):
with self.network() as network:
'tenant_id': network['network']['tenant_id']}}
subnet_req = self.new_create_request('subnets', data)
res = subnet_req.get_response(self.api)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_create_subnet_inconsistent_ipv4_hostroute_dst_v6(self):
host_routes = [{'destination': 'fe80::0/48',
'tenant_id': network['network']['tenant_id']}}
subnet_req = self.new_create_request('subnets', data)
res = subnet_req.get_response(self.api)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_create_subnet_inconsistent_ipv4_hostroute_np_v6(self):
host_routes = [{'destination': '172.16.0.0/24',
'tenant_id': network['network']['tenant_id']}}
subnet_req = self.new_create_request('subnets', data)
res = subnet_req.get_response(self.api)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_update_subnet(self):
with self.subnet() as subnet:
req = self.new_update_request('subnets', data,
subnet['subnet']['id'])
res = req.get_response(self.api)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_update_subnet_inconsistent_ipv6_gatewayv4(self):
with self.network() as network:
req = self.new_update_request('subnets', data,
subnet['subnet']['id'])
res = req.get_response(self.api)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_update_subnet_inconsistent_ipv4_dns_v6(self):
dns_nameservers = ['fe80::1']
req = self.new_update_request('subnets', data,
subnet['subnet']['id'])
res = req.get_response(self.api)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_update_subnet_inconsistent_ipv6_hostroute_dst_v4(self):
host_routes = [{'destination': 'fe80::0/48',
req = self.new_update_request('subnets', data,
subnet['subnet']['id'])
res = req.get_response(self.api)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_update_subnet_inconsistent_ipv6_hostroute_np_v4(self):
host_routes = [{'destination': '172.16.0.0/24',
req = self.new_update_request('subnets', data,
subnet['subnet']['id'])
res = req.get_response(self.api)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_show_subnet(self):
with self.network() as network:
req = self.new_show_request('subnets',
subnet['subnet']['id'])
res = self.deserialize('json', req.get_response(self.api))
- self.assertEquals(res['subnet']['id'],
- subnet['subnet']['id'])
- self.assertEquals(res['subnet']['network_id'],
- network['network']['id'])
+ self.assertEqual(res['subnet']['id'],
+ subnet['subnet']['id'])
+ self.assertEqual(res['subnet']['network_id'],
+ network['network']['id'])
def test_list_subnets(self):
with self.network() as network:
res = self.deserialize('json',
req.get_response(self.api))
self.assertEqual(len(res['subnets']), 1)
- self.assertEquals(res['subnets'][0]['cidr'],
- subnet['subnet']['cidr'])
+ self.assertEqual(res['subnets'][0]['cidr'],
+ subnet['subnet']['cidr'])
# admin will see both subnets
admin_req = self.new_list_request('subnets')
admin_res = self.deserialize(
subnet_req = self.new_create_request('subnets', data)
res = subnet_req.get_response(self.api)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_invalid_subnet(self):
with self.network() as network:
subnet_req = self.new_create_request('subnets', data)
res = subnet_req.get_response(self.api)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_invalid_ip_address(self):
with self.network() as network:
subnet_req = self.new_create_request('subnets', data)
res = subnet_req.get_response(self.api)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_invalid_uuid(self):
with self.network() as network:
subnet_req = self.new_create_request('subnets', data)
res = subnet_req.get_response(self.api)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_create_subnet_with_one_dns(self):
gateway_ip = '10.0.0.1'
subnet_req = self.new_create_request('subnets', data)
res = subnet_req.get_response(self.api)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_create_subnet_with_one_host_route(self):
gateway_ip = '10.0.0.1'
subnet_req = self.new_create_request('subnets', data)
res = subnet_req.get_response(self.api)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_update_subnet_dns(self):
with self.subnet() as subnet:
req = self.new_update_request('subnets', data,
subnet['subnet']['id'])
res = req.get_response(self.api)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_update_subnet_route(self):
with self.subnet() as subnet:
req = self.new_update_request('subnets', data,
subnet['subnet']['id'])
res = req.get_response(self.api)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_delete_subnet_with_dns(self):
gateway_ip = '10.0.0.1'
dns_nameservers=dns_nameservers)
req = self.new_delete_request('subnets', subnet['subnet']['id'])
res = req.get_response(self.api)
- self.assertEquals(res.status_int, 204)
+ self.assertEqual(res.status_int, 204)
def test_delete_subnet_with_route(self):
gateway_ip = '10.0.0.1'
host_routes=host_routes)
req = self.new_delete_request('subnets', subnet['subnet']['id'])
res = req.get_response(self.api)
- self.assertEquals(res.status_int, 204)
+ self.assertEqual(res.status_int, 204)
def test_delete_subnet_with_dns_and_route(self):
gateway_ip = '10.0.0.1'
host_routes=host_routes)
req = self.new_delete_request('subnets', subnet['subnet']['id'])
res = req.get_response(self.api)
- self.assertEquals(res.status_int, 204)
+ self.assertEqual(res.status_int, 204)
keys = [('name', name,), ('description', description)]
with self.security_group(name, description) as security_group:
for k, v, in keys:
- self.assertEquals(security_group['security_group'][k], v)
+ self.assertEqual(security_group['security_group'][k], v)
def test_create_security_group_external_id(self):
cfg.CONF.SECURITYGROUP.proxy_mode = True
('external_id', external_id)]
with self.security_group(name, description, external_id) as sg:
for k, v, in keys:
- self.assertEquals(sg['security_group'][k], v)
+ self.assertEqual(sg['security_group'][k], v)
def test_default_security_group(self):
with self.network():
res = self.new_list_request('security-groups')
groups = self.deserialize('json', res.get_response(self.ext_api))
- self.assertEquals(len(groups['security_groups']), 1)
+ self.assertEqual(len(groups['security_groups']), 1)
def test_create_security_group_proxy_mode_not_admin(self):
cfg.CONF.SECURITYGROUP.proxy_mode = True
tenant_id='bad_tenant',
set_context=True)
self.deserialize('json', res)
- self.assertEquals(res.status_int, 500)
+ self.assertEqual(res.status_int, 500)
def test_create_security_group_no_external_id_proxy_mode(self):
cfg.CONF.SECURITYGROUP.proxy_mode = True
res = self._create_security_group('json', 'webservers',
'webservers')
self.deserialize('json', res)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_create_security_group_no_external_id_not_proxy_mode(self):
res = self._create_security_group('json', 'webservers',
'webservers', '1')
self.deserialize('json', res)
- self.assertEquals(res.status_int, 409)
+ self.assertEqual(res.status_int, 409)
def test_create_default_security_group_fail(self):
name = 'default'
description = 'my webservers'
res = self._create_security_group('json', name, description)
self.deserialize('json', res)
- self.assertEquals(res.status_int, 409)
+ self.assertEqual(res.status_int, 409)
def test_create_security_group_duplicate_external_id(self):
cfg.CONF.SECURITYGROUP.proxy_mode = True
res = self._create_security_group('json', name, description,
external_id)
self.deserialize('json', res)
- self.assertEquals(res.status_int, 409)
+ self.assertEqual(res.status_int, 409)
def test_list_security_groups(self):
name = 'webservers'
with self.security_group(name, description):
res = self.new_list_request('security-groups')
groups = self.deserialize('json', res.get_response(self.ext_api))
- self.assertEquals(len(groups['security_groups']), 2)
+ self.assertEqual(len(groups['security_groups']), 2)
def test_get_security_group(self):
name = 'webservers'
source_group_id = sg['security_group']['id']
res = self.new_show_request('security-groups', source_group_id)
group = self.deserialize('json', res.get_response(self.ext_api))
- self.assertEquals(group['security_group']['id'], source_group_id)
+ self.assertEqual(group['security_group']['id'], source_group_id)
def test_delete_security_group(self):
name = 'webservers'
with self.network():
res = self.new_list_request('security-groups')
groups = self.deserialize('json', res.get_response(self.ext_api))
- self.assertEquals(len(groups['security_groups']), 1)
+ self.assertEqual(len(groups['security_groups']), 1)
res = self.new_list_request('security-group-rules')
rules = self.deserialize('json', res.get_response(self.ext_api))
- self.assertEquals(len(rules['security_group_rules']), 2)
+ self.assertEqual(len(rules['security_group_rules']), 2)
# just generic rules to allow default egress and
# intergroup communicartion
for rule in rules['security_group_rules']:
- self.assertEquals(rule['port_range_max'], None)
- self.assertEquals(rule['port_range_min'], None)
- self.assertEquals(rule['protocol'], None)
+ self.assertEqual(rule['port_range_max'], None)
+ self.assertEqual(rule['port_range_min'], None)
+ self.assertEqual(rule['protocol'], None)
def test_create_security_group_rule_source_ip_prefix(self):
name = 'webservers'
port_range_max,
source_ip_prefix) as rule:
for k, v, in keys:
- self.assertEquals(rule['security_group_rule'][k], v)
+ self.assertEqual(rule['security_group_rule'][k], v)
def test_create_security_group_rule_group_id(self):
name = 'webservers'
source_group_id=source_group_id
) as rule:
for k, v, in keys:
- self.assertEquals(rule['security_group_rule'][k], v)
+ self.assertEqual(rule['security_group_rule'][k], v)
def test_create_security_group_source_group_ip_and_ip_prefix(self):
security_group_id = "4cd70774-cc67-4a87-9b39-7d1db38eb087"
source_group_id)
res = self._create_security_group_rule('json', rule)
self.deserialize('json', res)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_create_security_group_rule_bad_security_group_id(self):
security_group_id = "4cd70774-cc67-4a87-9b39-7d1db38eb087"
source_ip_prefix)
res = self._create_security_group_rule('json', rule)
self.deserialize('json', res)
- self.assertEquals(res.status_int, 404)
+ self.assertEqual(res.status_int, 404)
def test_create_security_group_rule_bad_tenant(self):
with self.security_group() as sg:
res = self._create_security_group_rule('json', rule)
self.deserialize('json', res)
- self.assertEquals(res.status_int, 404)
+ self.assertEqual(res.status_int, 404)
def test_create_security_group_rule_exteral_id_proxy_mode(self):
cfg.CONF.SECURITYGROUP.proxy_mode = True
res = self._create_security_group_rule('json', rule)
self.deserialize('json', res)
- self.assertEquals(res.status_int, 201)
+ self.assertEqual(res.status_int, 201)
def test_create_security_group_rule_exteral_id_not_proxy_mode(self):
with self.security_group() as sg:
res = self._create_security_group_rule('json', rule)
self.deserialize('json', res)
- self.assertEquals(res.status_int, 409)
+ self.assertEqual(res.status_int, 409)
def test_create_security_group_rule_not_admin(self):
cfg.CONF.SECURITYGROUP.proxy_mode = True
tenant_id='bad_tenant',
set_context=True)
self.deserialize('json', res)
- self.assertEquals(res.status_int, 500)
+ self.assertEqual(res.status_int, 500)
def test_create_security_group_rule_bad_tenant_source_group_id(self):
with self.security_group() as sg:
tenant_id='bad_tenant',
set_context=True)
self.deserialize('json', res)
- self.assertEquals(res.status_int, 404)
+ self.assertEqual(res.status_int, 404)
def test_create_security_group_rule_bad_tenant_security_group_rule(self):
with self.security_group() as sg:
tenant_id='bad_tenant',
set_context=True)
self.deserialize('json', res)
- self.assertEquals(res.status_int, 404)
+ self.assertEqual(res.status_int, 404)
def test_create_security_group_rule_bad_source_group_id(self):
name = 'webservers'
source_group_id=source_group_id)
res = self._create_security_group_rule('json', rule)
self.deserialize('json', res)
- self.assertEquals(res.status_int, 404)
+ self.assertEqual(res.status_int, 404)
def test_create_security_group_rule_duplicate_rules(self):
name = 'webservers'
self._create_security_group_rule('json', rule)
res = self._create_security_group_rule('json', rule)
self.deserialize('json', res)
- self.assertEquals(res.status_int, 409)
+ self.assertEqual(res.status_int, 409)
def test_create_security_group_rule_min_port_greater_max(self):
name = 'webservers'
self._create_security_group_rule('json', rule)
res = self._create_security_group_rule('json', rule)
self.deserialize('json', res)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_create_security_group_rule_ports_but_no_protocol(self):
name = 'webservers'
self._create_security_group_rule('json', rule)
res = self._create_security_group_rule('json', rule)
self.deserialize('json', res)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_update_port_with_security_group(self):
with self.network() as n:
req = self.new_update_request('ports', data,
port['port']['id'])
res = self.deserialize('json', req.get_response(self.api))
- self.assertEquals(res['port'][ext_sg.SECURITYGROUP][0],
- sg['security_group']['id'])
+ self.assertEqual(res['port'][ext_sg.SECURITYGROUP][0],
+ sg['security_group']['id'])
self._delete('ports', port['port']['id'])
def test_update_port_with_multiple_security_groups(self):
security_groups=[sg1['security_group']['id'],
sg2['security_group']['id']])
port = self.deserialize('json', res)
- self.assertEquals(len(
+ self.assertEqual(len(
port['port'][ext_sg.SECURITYGROUP]), 2)
self._delete('ports', port['port']['id'])
req = self.new_update_request('ports', data,
port['port']['id'])
res = self.deserialize('json', req.get_response(self.api))
- self.assertEquals(res['port'][ext_sg.SECURITYGROUP], [])
+ self.assertEqual(res['port'][ext_sg.SECURITYGROUP], [])
self._delete('ports', port['port']['id'])
def test_create_port_with_bad_security_group(self):
security_groups=['bad_id'])
self.deserialize('json', res)
- self.assertEquals(res.status_int, 404)
+ self.assertEqual(res.status_int, 404)
def test_create_delete_security_group_port_in_use(self):
with self.network() as n:
security_groups=(
[sg['security_group']['id']]))
port = self.deserialize('json', res)
- self.assertEquals(port['port'][ext_sg.SECURITYGROUP][0],
- sg['security_group']['id'])
+ self.assertEqual(port['port'][ext_sg.SECURITYGROUP][0],
+ sg['security_group']['id'])
# try to delete security group that's in use
res = self._delete('security-groups',
sg['security_group']['id'], 409)
rule2['security_group_rule']]}
res = self._create_security_group_rule('json', rules)
self.deserialize('json', res)
- self.assertEquals(res.status_int, 201)
+ self.assertEqual(res.status_int, 201)
def test_create_security_group_rule_bulk_emulated(self):
real_has_attr = hasattr
}
res = self._create_security_group_rule('json', rules)
self.deserialize('json', res)
- self.assertEquals(res.status_int, 201)
+ self.assertEqual(res.status_int, 201)
def test_create_security_group_rule_duplicate_rule_in_post(self):
if self._skip_native_bulk:
rule['security_group_rule']]}
res = self._create_security_group_rule('json', rules)
rule = self.deserialize('json', res)
- self.assertEquals(res.status_int, 409)
+ self.assertEqual(res.status_int, 409)
def test_create_security_group_rule_duplicate_rule_in_post_emulated(self):
real_has_attr = hasattr
rule['security_group_rule']]}
res = self._create_security_group_rule('json', rules)
rule = self.deserialize('json', res)
- self.assertEquals(res.status_int, 409)
+ self.assertEqual(res.status_int, 409)
def test_create_security_group_rule_duplicate_rule_db(self):
if self._skip_native_bulk:
self._create_security_group_rule('json', rules)
res = self._create_security_group_rule('json', rules)
rule = self.deserialize('json', res)
- self.assertEquals(res.status_int, 409)
+ self.assertEqual(res.status_int, 409)
def test_create_security_group_rule_duplicate_rule_db_emulated(self):
real_has_attr = hasattr
self._create_security_group_rule('json', rules)
res = self._create_security_group_rule('json', rule)
self.deserialize('json', res)
- self.assertEquals(res.status_int, 409)
+ self.assertEqual(res.status_int, 409)
def test_create_security_group_rule_differnt_security_group_ids(self):
if self._skip_native_bulk:
}
res = self._create_security_group_rule('json', rules)
self.deserialize('json', res)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_create_security_group_rule_with_invalid_ethertype(self):
security_group_id = "4cd70774-cc67-4a87-9b39-7d1db38eb087"
ethertype='IPv5')
res = self._create_security_group_rule('json', rule)
self.deserialize('json', res)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)
def test_create_security_group_rule_with_invalid_protocol(self):
security_group_id = "4cd70774-cc67-4a87-9b39-7d1db38eb087"
source_group_id)
res = self._create_security_group_rule('json', rule)
self.deserialize('json', res)
- self.assertEquals(res.status_int, 400)
+ self.assertEqual(res.status_int, 400)