1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100
|
//go:build acceptance || networking || fwaas_v2
// +build acceptance networking fwaas_v2
package fwaas_v2
import (
"testing"
"github.com/gophercloud/gophercloud/acceptance/clients"
"github.com/gophercloud/gophercloud/acceptance/tools"
"github.com/gophercloud/gophercloud/openstack/networking/v2/extensions/fwaas_v2/groups"
th "github.com/gophercloud/gophercloud/testhelper"
)
func TestGroupCRUD(t *testing.T) {
clients.SkipReleasesAbove(t, "stable/ussuri")
client, err := clients.NewNetworkV2Client()
th.AssertNoErr(t, err)
createdGroup, err := CreateGroup(t, client)
th.AssertNoErr(t, err)
defer DeleteGroup(t, client, createdGroup.ID)
tools.PrintResource(t, createdGroup)
createdRule, err := CreateRule(t, client)
th.AssertNoErr(t, err)
defer DeleteRule(t, client, createdRule.ID)
tools.PrintResource(t, createdRule)
createdPolicy, err := CreatePolicy(t, client, createdRule.ID)
th.AssertNoErr(t, err)
defer DeletePolicy(t, client, createdPolicy.ID)
tools.PrintResource(t, createdPolicy)
groupName := tools.RandomString("TESTACC-", 8)
adminStateUp := false
description := ("Some firewall group description")
firewall_policy_id := createdPolicy.ID
updateOpts := groups.UpdateOpts{
Name: &groupName,
Description: &description,
AdminStateUp: &adminStateUp,
IngressFirewallPolicyID: &firewall_policy_id,
EgressFirewallPolicyID: &firewall_policy_id,
}
groupUpdated, err := groups.Update(client, createdGroup.ID, updateOpts).Extract()
if err != nil {
t.Fatalf("Unable to update firewall group %s: %v", createdGroup.ID, err)
}
th.AssertNoErr(t, err)
th.AssertEquals(t, groupUpdated.Name, groupName)
th.AssertEquals(t, groupUpdated.Description, description)
th.AssertEquals(t, groupUpdated.AdminStateUp, adminStateUp)
th.AssertEquals(t, groupUpdated.IngressFirewallPolicyID, firewall_policy_id)
th.AssertEquals(t, groupUpdated.EgressFirewallPolicyID, firewall_policy_id)
t.Logf("Updated firewall group %s", groupUpdated.ID)
removeIngressPolicy, err := groups.RemoveIngressPolicy(client, groupUpdated.ID).Extract()
if err != nil {
t.Fatalf("Unable to remove ingress firewall policy from firewall group %s: %v", removeIngressPolicy.ID, err)
}
th.AssertEquals(t, removeIngressPolicy.IngressFirewallPolicyID, "")
th.AssertEquals(t, removeIngressPolicy.EgressFirewallPolicyID, firewall_policy_id)
t.Logf("Ingress policy removed from firewall group %s", groupUpdated.ID)
removeEgressPolicy, err := groups.RemoveEgressPolicy(client, groupUpdated.ID).Extract()
if err != nil {
t.Fatalf("Unable to remove egress firewall policy from firewall group %s: %v", removeEgressPolicy.ID, err)
}
th.AssertEquals(t, removeEgressPolicy.EgressFirewallPolicyID, "")
t.Logf("Egress policy removed from firewall group %s", groupUpdated.ID)
allPages, err := groups.List(client, nil).AllPages()
th.AssertNoErr(t, err)
allGroups, err := groups.ExtractGroups(allPages)
th.AssertNoErr(t, err)
t.Logf("Attempting to find firewall group %s\n", createdGroup.ID)
var found bool
for _, group := range allGroups {
if group.ID == createdGroup.ID {
found = true
t.Logf("Found firewall group %s\n", group.ID)
}
}
th.AssertEquals(t, found, true)
}
|