/labs/savvis-symphonyvpdc/src/test/java/org/jclouds/savvis/vpdc/xml/FirewallServiceHandlerTest.java

http://github.com/jclouds/jclouds · Java · 64 lines · 29 code · 8 blank · 27 comment · 0 complexity · 9259d90f00e030624f87f5f41e46d8b9 MD5 · raw file

  1. /**
  2. * Licensed to jclouds, Inc. (jclouds) under one or more
  3. * contributor license agreements. See the NOTICE file
  4. * distributed with this work for additional information
  5. * regarding copyright ownership. jclouds licenses this file
  6. * to you under the Apache License, Version 2.0 (the
  7. * "License"); you may not use this file except in compliance
  8. * with the License. You may obtain a copy of the License at
  9. *
  10. * http://www.apache.org/licenses/LICENSE-2.0
  11. *
  12. * Unless required by applicable law or agreed to in writing,
  13. * software distributed under the License is distributed on an
  14. * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
  15. * KIND, either express or implied. See the License for the
  16. * specific language governing permissions and limitations
  17. * under the License.
  18. */
  19. package org.jclouds.savvis.vpdc.xml;
  20. import static org.testng.Assert.assertEquals;
  21. import java.io.InputStream;
  22. import org.jclouds.http.functions.ParseSax;
  23. import org.jclouds.http.functions.ParseSax.Factory;
  24. import org.jclouds.http.functions.config.SaxParserModule;
  25. import org.jclouds.savvis.vpdc.domain.FirewallRule;
  26. import org.jclouds.savvis.vpdc.domain.FirewallService;
  27. import org.testng.annotations.Test;
  28. import com.google.common.collect.ImmutableSet;
  29. import com.google.inject.Guice;
  30. import com.google.inject.Injector;
  31. /**
  32. * Tests behavior of {@code FirewallServiceHandler and @code FirewallRuleHandler}
  33. *
  34. * @author Kedar Dave
  35. */
  36. @Test(groups = "unit")
  37. public class FirewallServiceHandlerTest {
  38. /*new FirewallRule(null, null, null, null, "SERVER_TIER_FIREWALL", true, "internet" , "VM Tier01" ,
  39. "22", "allow", "Server Tier Firewall Rule", false, "Tcp"),
  40. new FirewallRule(null, null, null, null, "SERVER_TIER_FIREWALL", true, "VM Tier03" , "VM Tier03" ,
  41. null, "allow", "Server Tier Firewall Rule", false, "Icmp-ping")));*/
  42. public void test() {
  43. InputStream is = getClass().getResourceAsStream("/firewallService.xml");
  44. Injector injector = Guice.createInjector(new SaxParserModule());
  45. Factory factory = injector.getInstance(ParseSax.Factory.class);
  46. FirewallService result = factory.create(injector.getInstance(FirewallServiceHandler.class)).parse(is);
  47. assertEquals(result.isEnabled(), false);
  48. assertEquals(
  49. result.getFirewallRules(),
  50. ImmutableSet.<FirewallRule> of(
  51. FirewallRule.builder().firewallType("SERVER_TIER_FIREWALL").isEnabled(true).source("internet")
  52. .destination("VM Tier01").port("22").protocol("Tcp").policy("allow").description("Server Tier Firewall Rule").isLogged(false).build(),
  53. FirewallRule.builder().firewallType("SERVER_TIER_FIREWALL").isEnabled(true).source("VM Tier03")
  54. .destination("VM Tier03").protocol("Icmp-ping").policy("allow").description("Server Tier Firewall Rule").isLogged(false).build()));
  55. }
  56. }