1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115
|
package testing
import (
"testing"
"github.com/gophercloud/gophercloud/openstack/keymanager/v1/acls"
th "github.com/gophercloud/gophercloud/testhelper"
"github.com/gophercloud/gophercloud/testhelper/client"
)
func TestGetSecretACL(t *testing.T) {
th.SetupHTTP()
defer th.TeardownHTTP()
HandleGetSecretACLSuccessfully(t)
actual, err := acls.GetSecretACL(client.ServiceClient(), "1b8068c4-3bb6-4be6-8f1e-da0d1ea0b67c").Extract()
th.AssertNoErr(t, err)
th.AssertDeepEquals(t, ExpectedACL, *actual)
}
func TestGetContainerACL(t *testing.T) {
th.SetupHTTP()
defer th.TeardownHTTP()
HandleGetContainerACLSuccessfully(t)
actual, err := acls.GetContainerACL(client.ServiceClient(), "1b8068c4-3bb6-4be6-8f1e-da0d1ea0b67c").Extract()
th.AssertNoErr(t, err)
th.AssertDeepEquals(t, ExpectedACL, *actual)
}
func TestSetSecretACL(t *testing.T) {
th.SetupHTTP()
defer th.TeardownHTTP()
HandleSetSecretACLSuccessfully(t)
users := []string{"GG27dVwR9gBMnsOaRoJ1DFJmZfdVjIdW"}
iFalse := false
setOpts := acls.SetOpts{
Type: "read",
Users: &users,
ProjectAccess: &iFalse,
}
actual, err := acls.SetSecretACL(client.ServiceClient(), "1b8068c4-3bb6-4be6-8f1e-da0d1ea0b67c", setOpts).Extract()
th.AssertNoErr(t, err)
th.AssertDeepEquals(t, ExpectedSecretACLRef, *actual)
}
func TestSetContainerACL(t *testing.T) {
th.SetupHTTP()
defer th.TeardownHTTP()
HandleSetContainerACLSuccessfully(t)
users := []string{"GG27dVwR9gBMnsOaRoJ1DFJmZfdVjIdW"}
iFalse := false
setOpts := acls.SetOpts{
Type: "read",
Users: &users,
ProjectAccess: &iFalse,
}
actual, err := acls.SetContainerACL(client.ServiceClient(), "1b8068c4-3bb6-4be6-8f1e-da0d1ea0b67c", setOpts).Extract()
th.AssertNoErr(t, err)
th.AssertDeepEquals(t, ExpectedContainerACLRef, *actual)
}
func TestDeleteSecretACL(t *testing.T) {
th.SetupHTTP()
defer th.TeardownHTTP()
HandleDeleteSecretACLSuccessfully(t)
res := acls.DeleteSecretACL(client.ServiceClient(), "1b8068c4-3bb6-4be6-8f1e-da0d1ea0b67c")
th.AssertNoErr(t, res.Err)
}
func TestDeleteContainerACL(t *testing.T) {
th.SetupHTTP()
defer th.TeardownHTTP()
HandleDeleteContainerACLSuccessfully(t)
res := acls.DeleteContainerACL(client.ServiceClient(), "1b8068c4-3bb6-4be6-8f1e-da0d1ea0b67c")
th.AssertNoErr(t, res.Err)
}
func TestUpdateSecretACL(t *testing.T) {
th.SetupHTTP()
defer th.TeardownHTTP()
HandleUpdateSecretACLSuccessfully(t)
newUsers := []string{}
updateOpts := acls.SetOpts{
Type: "read",
Users: &newUsers,
}
actual, err := acls.UpdateSecretACL(client.ServiceClient(), "1b8068c4-3bb6-4be6-8f1e-da0d1ea0b67c", updateOpts).Extract()
th.AssertNoErr(t, err)
th.AssertDeepEquals(t, ExpectedSecretACLRef, *actual)
}
func TestUpdateContainerACL(t *testing.T) {
th.SetupHTTP()
defer th.TeardownHTTP()
HandleUpdateContainerACLSuccessfully(t)
newUsers := []string{}
updateOpts := acls.SetOpts{
Type: "read",
Users: &newUsers,
}
actual, err := acls.UpdateContainerACL(client.ServiceClient(), "1b8068c4-3bb6-4be6-8f1e-da0d1ea0b67c", updateOpts).Extract()
th.AssertNoErr(t, err)
th.AssertDeepEquals(t, ExpectedContainerACLRef, *actual)
}
|