def _check_connection(self, username, password): if not FAKE: util.assert_mysql_connection_fails(username, password, instance_info.user_ip) # Also determine the db is gone via API. result = self.dbaas.users.list(instance_info.id) for item in result: if item.name == username: fail("User %s was not deleted." % user)
def _check_connection(self, username, password): if not FAKE: util.assert_mysql_connection_fails(username, password, instance_info.get_address()) # Also determine the db is gone via API. result = self.dbaas.users.list(instance_info.id) for item in result: if item.name == username: fail("User %s was not deleted." % user)
def test_mysql_admin(self): """Ensure we aren't allowed access with os_admin and wrong password.""" assert_mysql_connection_fails("os_admin", "asdfd-asdf234", instance_info.user_ip)
def test_mysql_root(self): """Ensure we aren't allowed access with root and wrong password.""" assert_mysql_connection_fails("root", "dsfgnear", instance_info.user_ip)
def _check_connection(self, username, password): util.assert_mysql_connection_fails(username, password, instance_info.user_ip)
def test_mysql_root(self): """Ensure we aren't allowed access with root and wrong password.""" assert_mysql_connection_fails("root", "dsfgnear", instance_info.get_address())
def test_mysql_admin(self): """Ensure we aren't allowed access with os_admin and wrong password.""" assert_mysql_connection_fails("os_admin", "asdfd-asdf234", instance_info.get_address())