1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63
|
// +build acceptance networking vpnaas
package vpnaas
import (
"testing"
"github.com/gophercloud/gophercloud/acceptance/clients"
"github.com/gophercloud/gophercloud/acceptance/tools"
"github.com/gophercloud/gophercloud/openstack/networking/v2/extensions/vpnaas/ipsecpolicies"
)
func TestIPSecPolicyList(t *testing.T) {
client, err := clients.NewNetworkV2Client()
if err != nil {
t.Fatalf("Unable to create a network client: %v", err)
}
allPages, err := ipsecpolicies.List(client, nil).AllPages()
if err != nil {
t.Fatalf("Unable to list IPSec policies: %v", err)
}
allPolicies, err := ipsecpolicies.ExtractPolicies(allPages)
if err != nil {
t.Fatalf("Unable to extract policies: %v", err)
}
for _, policy := range allPolicies {
tools.PrintResource(t, policy)
}
}
func TestIPSecPolicyCRUD(t *testing.T) {
client, err := clients.NewNetworkV2Client()
if err != nil {
t.Fatalf("Unable to create a network client: %v", err)
}
policy, err := CreateIPSecPolicy(t, client)
if err != nil {
t.Fatalf("Unable to create IPSec policy: %v", err)
}
defer DeleteIPSecPolicy(t, client, policy.ID)
tools.PrintResource(t, policy)
updatedDescription := "Updated policy description"
updateOpts := ipsecpolicies.UpdateOpts{
Description: &updatedDescription,
}
policy, err = ipsecpolicies.Update(client, policy.ID, updateOpts).Extract()
if err != nil {
t.Fatalf("Unable to update IPSec policy: %v", err)
}
tools.PrintResource(t, policy)
newPolicy, err := ipsecpolicies.Get(client, policy.ID).Extract()
if err != nil {
t.Fatalf("Unable to get IPSec policy: %v", err)
}
tools.PrintResource(t, newPolicy)
}
|