Test Case ID | Test Case Name | Steps to be performed to test | Verification steps | Priority | Status | Comments | ||||
---|---|---|---|---|---|---|---|---|---|---|
1 | Deploy vm with newly created security group | 1) Try to bring a fresh setup of CS | Should be able to deply VM with newly created security group.Verify vm_instance table output in cloud db: | P1 | PASS |
| ||||
3 | Add a security group. |
| Addition of SG should succeed. Output should be in the following format: | P1 | PASS |
| ||||
4 | Delete an existing security group. |
| Deletion of SG should succeed. Output should be in the following format: | P1 | PASS |
| ||||
5 | Delete an existing security group when there are security-ingress rules associated with this Security Group. |
| Deletion of SG should succeed. | P1 | PASS |
| ||||
6 | Add a TCP ingress rule for a SG to an existing Security Group. |
| All the Vms in this group should be accessible using TCP protocol on the port range from all the Vms in the Security group. | P1 | PASS |
| ||||
7 | Add a TCP ingress rule SG to an existing Security Group - Check for the API response. |
|
| P1 | PASS |
| ||||
8 | Add a UDP ingress rule for a SG to an existing Security Group. |
| Tried to delete SG when instances are deployed using this SG |
| SG should not get deleted All the Vms in this group should be accessible using UDP protocol on the port range from all the Vms in the Security group. | P1 | PASS |
| ||
9 | Add a ICMP ingress rule for a SG to an existing Security Group. |
| All the Vms in this group should be able to ping all the Vms in the Security group. | P1 | TCP ingress rules with SG1 and SG2 . Verify the accessing Vm |
|
| P1 | PASS |
|
10 | Add TCP ingress rule for multiple SG to an existing Security Group. |
|
| P1 | PASS |
| ||||
11 | Revoke an ingress rule for a CIDR from an existing Security Group. |
|
| P2 | PASS |
| ||||
12 | Revoke an ingress rule for a CIDR from an existing Security Group - Check for the API response. |
|
| P2 | PASS |
| ||||
13 | Revoke an ingress rule for a SG from an existing Security Group. |
|
| P2 | PASS |
| ||||
14 | Add a TCP egress rule for a SG to an existing Security Group. |
| All the Vms in this group should be accessible using TCP protocol on the port range from all the Vms in the Security group. | P2 | PASS |
| ||||
15 | Verify DB tables for all entries SG and VM mappings . Ensure mapping gets deleted when SG is deleted |
|
| P2 | PASS |
| ||||
16 | Check IP tables at the instances when its created with SG |
|
| P2 | PASS |
| ||||
17 | Add TCP egress rule for multiple SG to an existing Security Group. |
|
| P2 | PASS |
|