File: groups_test.go

package info (click to toggle)
golang-github-gophercloud-gophercloud 1.4.0-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 11,416 kB
  • sloc: sh: 99; makefile: 21
file content (100 lines) | stat: -rw-r--r-- 3,253 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
//go:build acceptance || networking || fwaas_v2
// +build acceptance networking fwaas_v2

package fwaas_v2

import (
	"testing"

	"github.com/gophercloud/gophercloud/acceptance/clients"
	"github.com/gophercloud/gophercloud/acceptance/tools"
	"github.com/gophercloud/gophercloud/openstack/networking/v2/extensions/fwaas_v2/groups"
	th "github.com/gophercloud/gophercloud/testhelper"
)

func TestGroupCRUD(t *testing.T) {
	clients.SkipReleasesAbove(t, "stable/ussuri")

	client, err := clients.NewNetworkV2Client()
	th.AssertNoErr(t, err)

	createdGroup, err := CreateGroup(t, client)
	th.AssertNoErr(t, err)
	defer DeleteGroup(t, client, createdGroup.ID)

	tools.PrintResource(t, createdGroup)

	createdRule, err := CreateRule(t, client)
	th.AssertNoErr(t, err)
	defer DeleteRule(t, client, createdRule.ID)

	tools.PrintResource(t, createdRule)

	createdPolicy, err := CreatePolicy(t, client, createdRule.ID)
	th.AssertNoErr(t, err)
	defer DeletePolicy(t, client, createdPolicy.ID)

	tools.PrintResource(t, createdPolicy)

	groupName := tools.RandomString("TESTACC-", 8)
	adminStateUp := false
	description := ("Some firewall group description")
	firewall_policy_id := createdPolicy.ID
	updateOpts := groups.UpdateOpts{
		Name:                    &groupName,
		Description:             &description,
		AdminStateUp:            &adminStateUp,
		IngressFirewallPolicyID: &firewall_policy_id,
		EgressFirewallPolicyID:  &firewall_policy_id,
	}

	groupUpdated, err := groups.Update(client, createdGroup.ID, updateOpts).Extract()
	if err != nil {
		t.Fatalf("Unable to update firewall group %s: %v", createdGroup.ID, err)
	}

	th.AssertNoErr(t, err)
	th.AssertEquals(t, groupUpdated.Name, groupName)
	th.AssertEquals(t, groupUpdated.Description, description)
	th.AssertEquals(t, groupUpdated.AdminStateUp, adminStateUp)
	th.AssertEquals(t, groupUpdated.IngressFirewallPolicyID, firewall_policy_id)
	th.AssertEquals(t, groupUpdated.EgressFirewallPolicyID, firewall_policy_id)

	t.Logf("Updated firewall group %s", groupUpdated.ID)

	removeIngressPolicy, err := groups.RemoveIngressPolicy(client, groupUpdated.ID).Extract()
	if err != nil {
		t.Fatalf("Unable to remove ingress firewall policy from firewall group %s: %v", removeIngressPolicy.ID, err)
	}

	th.AssertEquals(t, removeIngressPolicy.IngressFirewallPolicyID, "")
	th.AssertEquals(t, removeIngressPolicy.EgressFirewallPolicyID, firewall_policy_id)

	t.Logf("Ingress policy removed from firewall group %s", groupUpdated.ID)

	removeEgressPolicy, err := groups.RemoveEgressPolicy(client, groupUpdated.ID).Extract()
	if err != nil {
		t.Fatalf("Unable to remove egress firewall policy from firewall group %s: %v", removeEgressPolicy.ID, err)
	}

	th.AssertEquals(t, removeEgressPolicy.EgressFirewallPolicyID, "")

	t.Logf("Egress policy removed from firewall group %s", groupUpdated.ID)

	allPages, err := groups.List(client, nil).AllPages()
	th.AssertNoErr(t, err)

	allGroups, err := groups.ExtractGroups(allPages)
	th.AssertNoErr(t, err)

	t.Logf("Attempting to find firewall group %s\n", createdGroup.ID)
	var found bool
	for _, group := range allGroups {
		if group.ID == createdGroup.ID {
			found = true
			t.Logf("Found firewall group %s\n", group.ID)
		}
	}

	th.AssertEquals(t, found, true)
}