| Index: third_party/gsutil/third_party/boto/tests/integration/rds/test_db_subnet_group.py
|
| diff --git a/third_party/gsutil/third_party/boto/tests/integration/rds/test_db_subnet_group.py b/third_party/gsutil/third_party/boto/tests/integration/rds/test_db_subnet_group.py
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..52d63739fe21cbdcaf1a238461c46485f4485905
|
| --- /dev/null
|
| +++ b/third_party/gsutil/third_party/boto/tests/integration/rds/test_db_subnet_group.py
|
| @@ -0,0 +1,92 @@
|
| +# Copyright (c) 2013 Franc Carter franc.carter@gmail.com
|
| +# All rights reserved.
|
| +#
|
| +# Permission is hereby granted, free of charge, to any person obtaining a
|
| +# copy of this software and associated documentation files (the
|
| +# "Software"), to deal in the Software without restriction, including
|
| +# without limitation the rights to use, copy, modify, merge, publish, dis-
|
| +# tribute, sublicense, and/or sell copies of the Software, and to permit
|
| +# persons to whom the Software is furnished to do so, subject to the fol-
|
| +# lowing conditions:
|
| +#
|
| +# The above copyright notice and this permission notice shall be included
|
| +# in all copies or substantial portions of the Software.
|
| +#
|
| +# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
|
| +# OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABIL-
|
| +# ITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT
|
| +# SHALL THE AUTHOR BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY,
|
| +# WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
| +# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
|
| +# IN THE SOFTWARE.
|
| +
|
| +"""
|
| +Check that db_subnet_groups behave sanely
|
| +"""
|
| +
|
| +import time
|
| +import unittest
|
| +import boto.rds
|
| +from boto.vpc import VPCConnection
|
| +from boto.rds import RDSConnection
|
| +
|
| +def _is_ok(subnet_group, vpc_id, description, subnets):
|
| + if subnet_group.vpc_id != vpc_id:
|
| + print 'vpc_id is ',subnet_group.vpc_id, 'but should be ', vpc_id
|
| + return 0
|
| + if subnet_group.description != description:
|
| + print "description is '"+subnet_group.description+"' but should be '"+description+"'"
|
| + return 0
|
| + if set(subnet_group.subnet_ids) != set(subnets):
|
| + subnets_are = ','.join(subnet_group.subnet_ids)
|
| + should_be = ','.join(subnets)
|
| + print "subnets are "+subnets_are+" but should be "+should_be
|
| + return 0
|
| + return 1
|
| +
|
| +
|
| +class DbSubnetGroupTest(unittest.TestCase):
|
| + rds = True
|
| +
|
| + def test_db_subnet_group(self):
|
| + vpc_api = VPCConnection()
|
| + rds_api = RDSConnection()
|
| + vpc = vpc_api.create_vpc('10.0.0.0/16')
|
| +
|
| + az_list = vpc_api.get_all_zones(filters={'state':'available'})
|
| + subnet = list()
|
| + n = 0;
|
| + for az in az_list:
|
| + try:
|
| + subnet.append(vpc_api.create_subnet(vpc.id, '10.0.'+str(n)+'.0/24',availability_zone=az.name))
|
| + n = n+1
|
| + except:
|
| + pass
|
| +
|
| + grp_name = 'db_subnet_group'+str(int(time.time()))
|
| + subnet_group = rds_api.create_db_subnet_group(grp_name, grp_name, [subnet[0].id,subnet[1].id])
|
| + if not _is_ok(subnet_group, vpc.id, grp_name, [subnet[0].id,subnet[1].id]):
|
| + raise Exception("create_db_subnet_group returned bad values")
|
| +
|
| + rds_api.modify_db_subnet_group(grp_name, description='new description')
|
| + subnet_grps = rds_api.get_all_db_subnet_groups(name=grp_name)
|
| + if not _is_ok(subnet_grps[0], vpc.id, 'new description', [subnet[0].id,subnet[1].id]):
|
| + raise Exception("modifying the subnet group desciption returned bad values")
|
| +
|
| + rds_api.modify_db_subnet_group(grp_name, subnet_ids=[subnet[1].id,subnet[2].id])
|
| + subnet_grps = rds_api.get_all_db_subnet_groups(name=grp_name)
|
| + if not _is_ok(subnet_grps[0], vpc.id, 'new description', [subnet[1].id,subnet[2].id]):
|
| + raise Exception("modifying the subnet group subnets returned bad values")
|
| +
|
| + rds_api.delete_db_subnet_group(subnet_group.name)
|
| + try:
|
| + rds_api.get_all_db_subnet_groups(name=grp_name)
|
| + raise Exception(subnet_group.name+" still accessible after delete_db_subnet_group")
|
| + except:
|
| + pass
|
| +
|
| + while n > 0:
|
| + n = n-1
|
| + vpc_api.delete_subnet(subnet[n].id)
|
| + vpc_api.delete_vpc(vpc.id)
|
| +
|
|
|