Test Case ID | Test Case Name | Steps to be performed to test | Verification steps | Priority | Status | Comments | |||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | Deploy vm with newly created security group | 1) Try to bring a fresh setup of CS | Should be able to deply VM with newly created security group.Verify vm_instance table output in cloud db: | P1 | PASS |
| |||||||
2 | Basic zone without Security Groups | 1. Install a basic zone with a CSP enabled host | 1.Verify ebtables rules on the host. Make sure that dropping all traffic on FORWARD chain by default should not be present when Security Groups is disabled : ebtables -l | grep FORWARD Bridge chain: FORWARD, entries: 2, policy: ACCEPT | P1 |
|
| 3 | Add a security group. |
| Addition of SG should succeed. Output should be in the following format: | P1 | PASS |
|
4 | Delete an existing security group. |
| Deletion of SG should succeed. Output should be in the following format: | P1 | PASS |
| |||||||
5 | Delete an existing security group when there are security-ingress rules associated with this Security Group. |
| Deletion of SG should succeed. | P1 | PASS |
| |||||||
6 | Add a TCP ingress rule for a SG to an existing Security Group. |
| All the Vms in this group should be accessible using TCP protocol on the port range from all the Vms in the Security group. | P1 | PASS |
| |||||||
7 | Add a TCP ingress rule SG to an existing Security Group - Check for the API response. |
|
| P1 | PASS |
| |||||||
8 | Add a UDP ingress rule for a SG to an existing Security Group. |
| All the Vms in this group should be accessible using UDP protocol on the port range from all the Vms in the Security group. | P1 | PASS |
| |||||||
9 | Add a ICMP ingress rule for a SG to an existing Security Group. |
| All the Vms in this group should be able to ping all the Vms in the Security group. | P1 |
|
| |||||||
10 | Add TCP ingress rule for multiple SG to an existing Security Group. |
|
| P1 | PASS |
| |||||||
11 | Revoke an ingress rule for a CIDR from an existing Security Group. |
|
| P2 | PASS |
| |||||||
12 | Revoke an ingress rule for a CIDR from an existing Security Group - Check for the API response. |
|
| P2 | PASS |
| |||||||
13 | Revoke an ingress rule for a SG from an existing Security Group. |
|
| P2 | PASS |
| |||||||
14 | Add a TCP egress rule for a SG to an existing Security Group. |
| All the Vms in this group should be accessible using TCP protocol on the port range from all the Vms in the Security group. | P2 | PASS |
| |||||||
15 | Add a UDP egress rule for a SG to an existing Security Group. |
|
| P2 | PASS |
| |||||||
16 | Add a ICMP egress rule for a SG to an existing Security Group. |
|
| P2 | PASS |
| |||||||
17 | Add TCP egress rule for multiple SG to an existing Security Group. |
|
| P2 | PASS |
|