Ejemplo n.º 1
0
 def test_callbacks_registered(self):
     with mock.patch.object(callbacks_registry, "subscribe") as subscribe:
         firewall = ovsfw.OVSFirewallDriver(mock.MagicMock())
         subscribe.assert_called_once_with(
             firewall._init_firewall_callback,
             callbacks_resources.AGENT,
             callbacks_events.OVS_RESTARTED)
Ejemplo n.º 2
0
 def setUp(self):
     super(TestOVSFirewallDriver, self).setUp()
     mock_bridge = mock.patch.object(ovs_lib, 'OVSBridge',
                                     autospec=True).start()
     self.firewall = ovsfw.OVSFirewallDriver(mock_bridge)
     self.mock_bridge = self.firewall.int_br
     self.mock_bridge.reset_mock()
     self.fake_ovs_port = FakeOVSPort('port', 1, '00:00:00:00:00:00')
     self.mock_bridge.br.get_vif_port_by_id.return_value = \
         self.fake_ovs_port
Ejemplo n.º 3
0
 def setUp(self):
     super(TestOVSFirewallDriver, self).setUp()
     mock_bridge = mock.patch.object(
         ovs_lib, 'OVSBridge', autospec=True).start()
     securitygroups_rpc.register_securitygroups_opts()
     self.firewall = ovsfw.OVSFirewallDriver(mock_bridge)
     self.mock_bridge = self.firewall.int_br
     self.mock_bridge.reset_mock()
     self.fake_ovs_port = FakeOVSPort('port', 1, '00:00:00:00:00:00')
     self.mock_bridge.br.get_vif_port_by_id.return_value = \
         self.fake_ovs_port
     cfg.CONF.set_override('explicitly_egress_direct', True, 'AGENT')
Ejemplo n.º 4
0
 def test_migration(self):
     sg_rules = [{'ethertype': constants.IPv4,
                  'direction': constants.INGRESS_DIRECTION,
                  'protocol': constants.PROTO_NAME_ICMP},
                 {'ethertype': constants.IPv4,
                  'direction': constants.EGRESS_DIRECTION}]
     port, desc = self._prepare_port_and_description(sg_rules)
     ovs_firewall = ovs_fw_mod.OVSFirewallDriver(self.bridge)
     # Check that iptables driver was set and replace it with the one that
     # has access to namespace
     if isinstance(
             ovs_firewall.iptables_helper.iptables_driver,
             iptables_firewall.OVSHybridIptablesFirewallDriver):
         ovs_firewall.iptables_helper.iptables_driver = (
             self.iptables_firewall)
     ovs_firewall.prepare_port_filter(desc)
     self._check_no_iptables_rules_for_port(port)
Ejemplo n.º 5
0
    def setUp(self):
        super(TestCookieContext, self).setUp()
        # Don't attempt to connect to ovsdb
        mock.patch('neutron.agent.ovsdb.api.from_config').start()
        # Don't trigger iptables -> ovsfw migration
        mock.patch('neutron.agent.linux.openvswitch_firewall.iptables.Helper'
                   ).start()

        self.execute = mock.patch.object(utils, "execute",
                                         spec=utils.execute).start()
        bridge = ovs_bridge.OVSAgentBridge('foo')
        mock.patch.object(ovsfw.OVSFirewallDriver,
                          'initialize_bridge',
                          return_value=bridge.deferred(
                              full_ordered=True, use_bundle=True)).start()

        self.firewall = ovsfw.OVSFirewallDriver(bridge)
        # Remove calls from firewall initialization
        self.execute.reset_mock()