| // +build acceptance compute secgroups |
| |
| package v2 |
| |
| import ( |
| "testing" |
| |
| "github.com/gophercloud/gophercloud/acceptance/clients" |
| "github.com/gophercloud/gophercloud/acceptance/tools" |
| "github.com/gophercloud/gophercloud/openstack/compute/v2/extensions/secgroups" |
| ) |
| |
| func TestSecGroupsList(t *testing.T) { |
| client, err := clients.NewComputeV2Client() |
| if err != nil { |
| t.Fatalf("Unable to create a compute client: %v", err) |
| } |
| |
| allPages, err := secgroups.List(client).AllPages() |
| if err != nil { |
| t.Fatalf("Unable to retrieve security groups: %v", err) |
| } |
| |
| allSecGroups, err := secgroups.ExtractSecurityGroups(allPages) |
| if err != nil { |
| t.Fatalf("Unable to extract security groups: %v", err) |
| } |
| |
| for _, secgroup := range allSecGroups { |
| PrintSecurityGroup(t, &secgroup) |
| } |
| } |
| |
| func TestSecGroupsCreate(t *testing.T) { |
| client, err := clients.NewComputeV2Client() |
| if err != nil { |
| t.Fatalf("Unable to create a compute client: %v", err) |
| } |
| |
| securityGroup, err := CreateSecurityGroup(t, client) |
| if err != nil { |
| t.Fatalf("Unable to create security group: %v", err) |
| } |
| defer DeleteSecurityGroup(t, client, securityGroup) |
| } |
| |
| func TestSecGroupsUpdate(t *testing.T) { |
| client, err := clients.NewComputeV2Client() |
| if err != nil { |
| t.Fatalf("Unable to create a compute client: %v", err) |
| } |
| |
| securityGroup, err := CreateSecurityGroup(t, client) |
| if err != nil { |
| t.Fatalf("Unable to create security group: %v", err) |
| } |
| defer DeleteSecurityGroup(t, client, securityGroup) |
| |
| updateOpts := secgroups.UpdateOpts{ |
| Name: tools.RandomString("secgroup_", 4), |
| Description: tools.RandomString("dec_", 10), |
| } |
| updatedSecurityGroup, err := secgroups.Update(client, securityGroup.ID, updateOpts).Extract() |
| if err != nil { |
| t.Fatalf("Unable to update security group: %v", err) |
| } |
| |
| t.Logf("Updated %s's name to %s", updatedSecurityGroup.ID, updatedSecurityGroup.Name) |
| } |
| |
| func TestSecGroupsRuleCreate(t *testing.T) { |
| client, err := clients.NewComputeV2Client() |
| if err != nil { |
| t.Fatalf("Unable to create a compute client: %v", err) |
| } |
| |
| securityGroup, err := CreateSecurityGroup(t, client) |
| if err != nil { |
| t.Fatalf("Unable to create security group: %v", err) |
| } |
| defer DeleteSecurityGroup(t, client, securityGroup) |
| |
| rule, err := CreateSecurityGroupRule(t, client, securityGroup.ID) |
| if err != nil { |
| t.Fatalf("Unable to create rule: %v", err) |
| } |
| defer DeleteSecurityGroupRule(t, client, rule) |
| } |
| |
| func TestSecGroupsAddGroupToServer(t *testing.T) { |
| if testing.Short() { |
| t.Skip("Skipping test that requires server creation in short mode.") |
| } |
| |
| client, err := clients.NewComputeV2Client() |
| if err != nil { |
| t.Fatalf("Unable to create a compute client: %v", err) |
| } |
| |
| choices, err := clients.AcceptanceTestChoicesFromEnv() |
| if err != nil { |
| t.Fatal(err) |
| } |
| |
| server, err := CreateServer(t, client, choices) |
| if err != nil { |
| t.Fatalf("Unable to create server: %v", err) |
| } |
| defer DeleteServer(t, client, server) |
| |
| securityGroup, err := CreateSecurityGroup(t, client) |
| if err != nil { |
| t.Fatalf("Unable to create security group: %v", err) |
| } |
| defer DeleteSecurityGroup(t, client, securityGroup) |
| |
| rule, err := CreateSecurityGroupRule(t, client, securityGroup.ID) |
| if err != nil { |
| t.Fatalf("Unable to create rule: %v", err) |
| } |
| defer DeleteSecurityGroupRule(t, client, rule) |
| |
| t.Logf("Adding group %s to server %s", securityGroup.ID, server.ID) |
| err = secgroups.AddServer(client, server.ID, securityGroup.Name).ExtractErr() |
| if err != nil && err.Error() != "EOF" { |
| t.Fatalf("Unable to add group %s to server %s: %s", securityGroup.ID, server.ID, err) |
| } |
| |
| t.Logf("Removing group %s from server %s", securityGroup.ID, server.ID) |
| err = secgroups.RemoveServer(client, server.ID, securityGroup.Name).ExtractErr() |
| if err != nil && err.Error() != "EOF" { |
| t.Fatalf("Unable to remove group %s from server %s: %s", securityGroup.ID, server.ID, err) |
| } |
| } |