Test Case ID

Test Case Name

Steps to be performed to test

Verification steps

Priority

Status

Comments

1

Deploy vm with newly created security group

1) Try to bring a fresh setup of CS
2) Add Zone -> Basic mode
3) Create a Security Group
4) Try to deploy a VM. Select the newly created security group during deployment selections on "Add Instance" Wizard

Should be able to deply VM with newly created security group.Verify vm_instance table output in cloud db:
mysql> select * from vm_instance;
sql quiery output should show the vm in running state.

P1

PASS

 

3

Add a security group.

 

Addition of SG should succeed. Output should be in the following format:
GROUP <group-name> <description>

P1

PASS

 

4

Delete  an existing security group.

 

Deletion of SG should succeed. Output should be in the following format:
GROUP <group-name>

P1

PASS

 

5

Delete  an existing security group when there are security-ingress rules associated with this Security Group.

 

Deletion of SG should succeed.
This should result in all the SG ingress rules associated with this SG also get deleted.

P1

PASS

 

6

Add a TCP ingress rule for a SG to an existing Security Group.

 

All the Vms in this group should be accessible using TCP protocol on the port range from all the Vms in the Security group.

P1

PASS

 

7

Add a TCP ingress rule  SG to an existing Security Group - Check for the API response.

 

 

P1

PASS

 

8

Tried to delete SG when instances are deployed using this SG

 

SG should not get deleted

P1

PASS

 

9

Add TCP ingress rules with SG1 and SG2 . Verify the accessing Vm

 

 

P1

PASS

 

10

Add TCP ingress rule for multiple SG to an existing Security Group.

 

 

P1

PASS

 

11

Revoke an ingress rule for a CIDR  from an existing Security Group.

 

 

P2

PASS

 

12

Revoke an ingress rule for a CIDR  from an existing Security Group - Check for the API response.

 

 

P2

PASS

 

13

Revoke an ingress rule for a SG  from an existing Security Group.

 

 

P2

PASS

 

14

Add a TCP egress rule for a SG to an existing Security Group.

 

All the Vms in this group should be accessible using TCP protocol on the port range from all the Vms in the Security group.

P2

PASS

 

15

Verify DB tables for all entries SG and VM mappings . Ensure mapping gets deleted when SG is deleted

 

 

P2

PASS

 

16

Check IP tables at the instances when its created with SG

 

 

P2

PASS

 

17

Add TCP egress rule for multiple SG to an existing Security Group.

 

 

P2

PASS

 

  • No labels