| package subnets |
| |
| import ( |
| "fmt" |
| "net/http" |
| "testing" |
| |
| "github.com/rackspace/gophercloud/pagination" |
| th "github.com/rackspace/gophercloud/testhelper" |
| fake "github.com/rackspace/gophercloud/testhelper/client" |
| ) |
| |
| func TestList(t *testing.T) { |
| th.SetupHTTP() |
| defer th.TeardownHTTP() |
| |
| th.Mux.HandleFunc("/subnets", func(w http.ResponseWriter, r *http.Request) { |
| th.TestMethod(t, r, "GET") |
| th.TestHeader(t, r, "X-Auth-Token", fake.TokenID) |
| |
| w.Header().Add("Content-Type", "application/json") |
| w.WriteHeader(http.StatusOK) |
| |
| fmt.Fprintf(w, ` |
| { |
| "subnets": [ |
| { |
| "name": "private-subnet", |
| "enable_dhcp": true, |
| "network_id": "db193ab3-96e3-4cb3-8fc5-05f4296d0324", |
| "tenant_id": "26a7980765d0414dbc1fc1f88cdb7e6e", |
| "dns_nameservers": [], |
| "allocation_pools": [ |
| { |
| "start": "10.0.0.2", |
| "end": "10.0.0.254" |
| } |
| ], |
| "host_routes": [], |
| "ip_version": 4, |
| "gateway_ip": "10.0.0.1", |
| "cidr": "10.0.0.0/24", |
| "id": "08eae331-0402-425a-923c-34f7cfe39c1b" |
| }, |
| { |
| "name": "my_subnet", |
| "enable_dhcp": true, |
| "network_id": "d32019d3-bc6e-4319-9c1d-6722fc136a22", |
| "tenant_id": "4fd44f30292945e481c7b8a0c8908869", |
| "dns_nameservers": [], |
| "allocation_pools": [ |
| { |
| "start": "192.0.0.2", |
| "end": "192.255.255.254" |
| } |
| ], |
| "host_routes": [], |
| "ip_version": 4, |
| "gateway_ip": "192.0.0.1", |
| "cidr": "192.0.0.0/8", |
| "id": "54d6f61d-db07-451c-9ab3-b9609b6b6f0b" |
| } |
| ] |
| } |
| `) |
| }) |
| |
| count := 0 |
| |
| List(fake.ServiceClient(), ListOpts{}).EachPage(func(page pagination.Page) (bool, error) { |
| count++ |
| actual, err := ExtractSubnets(page) |
| if err != nil { |
| t.Errorf("Failed to extract subnets: %v", err) |
| return false, nil |
| } |
| |
| expected := []Subnet{ |
| Subnet{ |
| Name: "private-subnet", |
| EnableDHCP: true, |
| NetworkID: "db193ab3-96e3-4cb3-8fc5-05f4296d0324", |
| TenantID: "26a7980765d0414dbc1fc1f88cdb7e6e", |
| DNSNameservers: []string{}, |
| AllocationPools: []AllocationPool{ |
| AllocationPool{ |
| Start: "10.0.0.2", |
| End: "10.0.0.254", |
| }, |
| }, |
| HostRoutes: []HostRoute{}, |
| IPVersion: 4, |
| GatewayIP: "10.0.0.1", |
| CIDR: "10.0.0.0/24", |
| ID: "08eae331-0402-425a-923c-34f7cfe39c1b", |
| }, |
| Subnet{ |
| Name: "my_subnet", |
| EnableDHCP: true, |
| NetworkID: "d32019d3-bc6e-4319-9c1d-6722fc136a22", |
| TenantID: "4fd44f30292945e481c7b8a0c8908869", |
| DNSNameservers: []string{}, |
| AllocationPools: []AllocationPool{ |
| AllocationPool{ |
| Start: "192.0.0.2", |
| End: "192.255.255.254", |
| }, |
| }, |
| HostRoutes: []HostRoute{}, |
| IPVersion: 4, |
| GatewayIP: "192.0.0.1", |
| CIDR: "192.0.0.0/8", |
| ID: "54d6f61d-db07-451c-9ab3-b9609b6b6f0b", |
| }, |
| } |
| |
| th.CheckDeepEquals(t, expected, actual) |
| |
| return true, nil |
| }) |
| |
| if count != 1 { |
| t.Errorf("Expected 1 page, got %d", count) |
| } |
| } |
| |
| func TestGet(t *testing.T) { |
| th.SetupHTTP() |
| defer th.TeardownHTTP() |
| |
| th.Mux.HandleFunc("/subnets/54d6f61d-db07-451c-9ab3-b9609b6b6f0b", func(w http.ResponseWriter, r *http.Request) { |
| th.TestMethod(t, r, "GET") |
| th.TestHeader(t, r, "X-Auth-Token", fake.TokenID) |
| |
| w.Header().Add("Content-Type", "application/json") |
| w.WriteHeader(http.StatusOK) |
| |
| fmt.Fprintf(w, ` |
| { |
| "subnet": { |
| "name": "my_subnet", |
| "enable_dhcp": true, |
| "network_id": "d32019d3-bc6e-4319-9c1d-6722fc136a22", |
| "tenant_id": "4fd44f30292945e481c7b8a0c8908869", |
| "dns_nameservers": [], |
| "allocation_pools": [ |
| { |
| "start": "192.0.0.2", |
| "end": "192.255.255.254" |
| } |
| ], |
| "host_routes": [], |
| "ip_version": 4, |
| "gateway_ip": "192.0.0.1", |
| "cidr": "192.0.0.0/8", |
| "id": "54d6f61d-db07-451c-9ab3-b9609b6b6f0b" |
| } |
| } |
| `) |
| }) |
| |
| s, err := Get(fake.ServiceClient(), "54d6f61d-db07-451c-9ab3-b9609b6b6f0b").Extract() |
| th.AssertNoErr(t, err) |
| |
| th.AssertEquals(t, s.Name, "my_subnet") |
| th.AssertEquals(t, s.EnableDHCP, true) |
| th.AssertEquals(t, s.NetworkID, "d32019d3-bc6e-4319-9c1d-6722fc136a22") |
| th.AssertEquals(t, s.TenantID, "4fd44f30292945e481c7b8a0c8908869") |
| th.AssertDeepEquals(t, s.DNSNameservers, []string{}) |
| th.AssertDeepEquals(t, s.AllocationPools, []AllocationPool{ |
| AllocationPool{ |
| Start: "192.0.0.2", |
| End: "192.255.255.254", |
| }, |
| }) |
| th.AssertDeepEquals(t, s.HostRoutes, []HostRoute{}) |
| th.AssertEquals(t, s.IPVersion, 4) |
| th.AssertEquals(t, s.GatewayIP, "192.0.0.1") |
| th.AssertEquals(t, s.CIDR, "192.0.0.0/8") |
| th.AssertEquals(t, s.ID, "54d6f61d-db07-451c-9ab3-b9609b6b6f0b") |
| } |
| |
| func TestCreate(t *testing.T) { |
| th.SetupHTTP() |
| defer th.TeardownHTTP() |
| |
| th.Mux.HandleFunc("/subnets", func(w http.ResponseWriter, r *http.Request) { |
| th.TestMethod(t, r, "POST") |
| th.TestHeader(t, r, "X-Auth-Token", fake.TokenID) |
| th.TestHeader(t, r, "Content-Type", "application/json") |
| th.TestHeader(t, r, "Accept", "application/json") |
| th.TestJSONRequest(t, r, ` |
| { |
| "subnet": { |
| "network_id": "d32019d3-bc6e-4319-9c1d-6722fc136a22", |
| "ip_version": 4, |
| "cidr": "192.168.199.0/24" |
| } |
| } |
| `) |
| |
| w.Header().Add("Content-Type", "application/json") |
| w.WriteHeader(http.StatusCreated) |
| |
| fmt.Fprintf(w, ` |
| { |
| "subnet": { |
| "name": "", |
| "enable_dhcp": true, |
| "network_id": "d32019d3-bc6e-4319-9c1d-6722fc136a22", |
| "tenant_id": "4fd44f30292945e481c7b8a0c8908869", |
| "dns_nameservers": [], |
| "allocation_pools": [ |
| { |
| "start": "192.168.199.2", |
| "end": "192.168.199.254" |
| } |
| ], |
| "host_routes": [], |
| "ip_version": 4, |
| "gateway_ip": "192.168.199.1", |
| "cidr": "192.168.199.0/24", |
| "id": "3b80198d-4f7b-4f77-9ef5-774d54e17126" |
| } |
| } |
| `) |
| }) |
| |
| opts := CreateOpts{NetworkID: "d32019d3-bc6e-4319-9c1d-6722fc136a22", IPVersion: 4, CIDR: "192.168.199.0/24"} |
| s, err := Create(fake.ServiceClient(), opts).Extract() |
| th.AssertNoErr(t, err) |
| |
| th.AssertEquals(t, s.Name, "") |
| th.AssertEquals(t, s.EnableDHCP, true) |
| th.AssertEquals(t, s.NetworkID, "d32019d3-bc6e-4319-9c1d-6722fc136a22") |
| th.AssertEquals(t, s.TenantID, "4fd44f30292945e481c7b8a0c8908869") |
| th.AssertDeepEquals(t, s.DNSNameservers, []string{}) |
| th.AssertDeepEquals(t, s.AllocationPools, []AllocationPool{ |
| AllocationPool{ |
| Start: "192.168.199.2", |
| End: "192.168.199.254", |
| }, |
| }) |
| th.AssertDeepEquals(t, s.HostRoutes, []HostRoute{}) |
| th.AssertEquals(t, s.IPVersion, 4) |
| th.AssertEquals(t, s.GatewayIP, "192.168.199.1") |
| th.AssertEquals(t, s.CIDR, "192.168.199.0/24") |
| th.AssertEquals(t, s.ID, "3b80198d-4f7b-4f77-9ef5-774d54e17126") |
| } |
| |
| func TestUpdate(t *testing.T) { |
| th.SetupHTTP() |
| defer th.TeardownHTTP() |
| |
| th.Mux.HandleFunc("/subnets/08eae331-0402-425a-923c-34f7cfe39c1b", func(w http.ResponseWriter, r *http.Request) { |
| th.TestMethod(t, r, "PUT") |
| th.TestHeader(t, r, "X-Auth-Token", fake.TokenID) |
| th.TestHeader(t, r, "Content-Type", "application/json") |
| th.TestHeader(t, r, "Accept", "application/json") |
| th.TestJSONRequest(t, r, ` |
| { |
| "subnet": { |
| "name": "my_new_subnet" |
| } |
| } |
| `) |
| |
| w.Header().Add("Content-Type", "application/json") |
| w.WriteHeader(http.StatusCreated) |
| |
| fmt.Fprintf(w, ` |
| { |
| "subnet": { |
| "name": "my_new_subnet", |
| "enable_dhcp": true, |
| "network_id": "db193ab3-96e3-4cb3-8fc5-05f4296d0324", |
| "tenant_id": "26a7980765d0414dbc1fc1f88cdb7e6e", |
| "dns_nameservers": [], |
| "allocation_pools": [ |
| { |
| "start": "10.0.0.2", |
| "end": "10.0.0.254" |
| } |
| ], |
| "host_routes": [], |
| "ip_version": 4, |
| "gateway_ip": "10.0.0.1", |
| "cidr": "10.0.0.0/24", |
| "id": "08eae331-0402-425a-923c-34f7cfe39c1b" |
| } |
| } |
| `) |
| }) |
| |
| opts := UpdateOpts{Name: "my_new_subnet"} |
| s, err := Update(fake.ServiceClient(), "08eae331-0402-425a-923c-34f7cfe39c1b", opts).Extract() |
| th.AssertNoErr(t, err) |
| |
| th.AssertEquals(t, s.Name, "my_new_subnet") |
| th.AssertEquals(t, s.ID, "08eae331-0402-425a-923c-34f7cfe39c1b") |
| } |
| |
| func TestDelete(t *testing.T) { |
| th.SetupHTTP() |
| defer th.TeardownHTTP() |
| |
| th.Mux.HandleFunc("/subnets/08eae331-0402-425a-923c-34f7cfe39c1b", func(w http.ResponseWriter, r *http.Request) { |
| th.TestMethod(t, r, "DELETE") |
| th.TestHeader(t, r, "X-Auth-Token", fake.TokenID) |
| w.WriteHeader(http.StatusNoContent) |
| }) |
| |
| res := Delete(fake.ServiceClient(), "08eae331-0402-425a-923c-34f7cfe39c1b") |
| th.AssertNoErr(t, res.Err) |
| } |