Skip to content

Commit a8ac47c

Browse files
committed
default values
Signed-off-by: Katharina Trentau <[email protected]>
1 parent 0cba180 commit a8ac47c

File tree

2 files changed

+28
-23
lines changed

2 files changed

+28
-23
lines changed

Tests/iaas/security-groups/default-security-group-rules.py

Lines changed: 21 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ def test_rules(cloud_name: str):
5656
# we allow ingress from the same security group
5757
# but only for the default security group
5858
r_group_id = rule.remote_group_id
59-
if (r_group_id == "PARENT" and not r_custom_sg):
59+
if r_group_id == "PARENT" and not r_custom_sg:
6060
ingress_from_same_sg += 1
6161
elif direction == "egress" and ethertype == "IPv4":
6262
egress_rules += 1
@@ -82,34 +82,39 @@ def test_rules(cloud_name: str):
8282
f"Expected only ingress rules for default security groups, "
8383
f"that allow ingress traffic from the same group. "
8484
f"But there are more - in total {ingress_rules} ingress rules. "
85-
f"There should be only {ingress_from_same_sg} ingress rules.")
86-
assert egress_rules > 0, (
87-
f"Expected to have more than {egress_rules} egress rules present.")
88-
var_list = [egress_ipv4_default_sg, egress_ipv4_custom_sg,
89-
egress_ipv6_default_sg, egress_ipv6_custom_sg]
85+
f"There should be only {ingress_from_same_sg} ingress rules."
86+
)
87+
assert (
88+
egress_rules > 0
89+
), f"Expected to have more than {egress_rules} egress rules present."
90+
var_list = [
91+
egress_ipv4_default_sg,
92+
egress_ipv4_custom_sg,
93+
egress_ipv6_default_sg,
94+
egress_ipv6_custom_sg,
95+
]
9096
assert all([var > 0 for var in var_list]), (
9197
"Not all expected egress rules are present. "
9298
"Expected rules for egress for IPv4 and IPv6 "
93-
"both for default and custom security groups.")
99+
"both for default and custom security groups."
100+
)
94101

95-
result_dict = {
96-
"Ingress Rules": ingress_rules,
97-
"Egress Rules": egress_rules
98-
}
102+
result_dict = {"Ingress Rules": ingress_rules, "Egress Rules": egress_rules}
99103
return result_dict
100104

101105

102106
def main():
103107
parser = argparse.ArgumentParser(
104-
description="SCS Default Security Group Rules Checker")
108+
description="SCS Default Security Group Rules Checker"
109+
)
105110
parser.add_argument(
106-
"--os-cloud", type=str,
111+
"--os-cloud",
112+
type=str,
107113
help="Name of the cloud from clouds.yaml, alternative "
108-
"to the OS_CLOUD environment variable"
114+
"to the OS_CLOUD environment variable",
109115
)
110116
parser.add_argument(
111-
"--debug", action="store_true",
112-
help="Enable OpenStack SDK debug logging"
117+
"--debug", action="store_true", help="Enable OpenStack SDK debug logging"
113118
)
114119
args = parser.parse_args()
115120
openstack.enable_logging(debug=args.debug)

Tests/kaas/k8s-default-storage-class/k8s-default-storage-class-check.py

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -86,15 +86,15 @@ def check_default_storageclass(k8s_client_storage):
8686
return default_storage_class
8787

8888

89-
def create_pvc_pod(k8s_api_instance, storage_class):
89+
def create_pvc_pod(k8s_api_instance, storage_class, pvc_name = PVC_NAME, pod_name = POD_NAME, pv_name = PV_NAME, namespace = NAMESPACE, num_retries = NUM_RETRIES):
9090
"""
9191
1. Create PersistantVolumeClaim
9292
2. Create pod which uses the PersitantVolumeClaim
9393
"""
9494
# 1. Create PersistantVolumeClaim
95-
logger.debug(f"create pvc: {PVC_NAME}")
95+
logger.debug(f"create pvc: {pvc_name}")
9696

97-
pvc_meta = client.V1ObjectMeta(name=PVC_NAME)
97+
pvc_meta = client.V1ObjectMeta(name=pvc_name)
9898
pvc_resources = client.V1ResourceRequirements(
9999
requests={"storage": "1Gi"},
100100
)
@@ -112,11 +112,11 @@ def create_pvc_pod(k8s_api_instance, storage_class):
112112
)
113113

114114
# 2. Create a pod which makes use of the PersitantVolumeClaim
115-
logger.debug(f"create pod: {POD_NAME}")
115+
logger.debug(f"create pod: {pod_name}")
116116

117117
pod_vol = client.V1Volume(
118118
name=PV_NAME,
119-
persistent_volume_claim=client.V1PersistentVolumeClaimVolumeSource(PVC_NAME),
119+
persistent_volume_claim=client.V1PersistentVolumeClaimVolumeSource(pvc_name),
120120
)
121121
pod_con = client.V1Container(
122122
name="nginx",
@@ -130,7 +130,7 @@ def create_pvc_pod(k8s_api_instance, storage_class):
130130
pod_body = client.V1Pod(
131131
api_version="v1",
132132
kind="Pod",
133-
metadata=client.V1ObjectMeta(name=POD_NAME),
133+
metadata=client.V1ObjectMeta(name=pod_name),
134134
spec=pod_spec,
135135
)
136136

@@ -141,7 +141,7 @@ def create_pvc_pod(k8s_api_instance, storage_class):
141141
pod_status = pod_info["status"]["phase"]
142142

143143
retries = 0
144-
while pod_status != "Running" and retries <= NUM_RETRIES:
144+
while pod_status != "Running" and retries <= num_retries:
145145
api_response = k8s_api_instance.read_namespaced_pod(
146146
POD_NAME, NAMESPACE, _preload_content=False
147147
)

0 commit comments

Comments
 (0)