本文整理汇总了Java中net.floodlightcontroller.accesscontrollist.web.ACLRuleResource.init方法的典型用法代码示例。如果您正苦于以下问题:Java ACLRuleResource.init方法的具体用法?Java ACLRuleResource.init怎么用?Java ACLRuleResource.init使用的例子?那么恭喜您, 这里精选的方法代码示例或许可以为您提供帮助。您也可以进一步了解该方法所在类net.floodlightcontroller.accesscontrollist.web.ACLRuleResource
的用法示例。
在下文中一共展示了ACLRuleResource.init方法的2个代码示例,这些例子默认根据受欢迎程度排序。您可以为喜欢或者感觉有用的代码点赞,您的评价将有助于系统推荐出更棒的Java代码示例。
示例1: testRemove
import net.floodlightcontroller.accesscontrollist.web.ACLRuleResource; //导入方法依赖的package包/类
@Test
public void testRemove(){
ACL s = new ACL();
FloodlightModuleContext fmc = new FloodlightModuleContext();
try {
s.init(fmc);
} catch (FloodlightModuleException e) {
e.printStackTrace();
}
ACLRuleResource r = new ACLRuleResource();
Context ctx = new Context();
r.init(ctx, null, null);
r.getContext().getAttributes().putIfAbsent(IACLService.class.getCanonicalName(), s);
// input a valid JSON string
String json = "{\"nw-proto\":\"TCP\",\"src-ip\":\"10.0.0.1/32\",\"dst-ip\": \"10.0.0.2/32\",\"tp-dst\":\"80\",\"action\":\"ALLOW\"}";
assertEquals(r.store(json),"{\"status\" : \"" + "Success! New rule added." + "\"}");
// input a invalid JSON string that contains a invalid ruleid value
json = "{\"ruleid\":\"a\"}";
assertEquals(r.remove(json),"{\"status\" : \"" + "Failed! ruleid must be specified as a number." + "\"}");
// input a invalid JSON string that contains a non-existing ruleid value
json = "{\"ruleid\":\"2\"}";
assertEquals(r.remove(json),"{\"status\" : \"" + "Failed! a rule with this ID doesn't exist." + "\"}");
// input a valid JSON string that removes an existing ACL rule
json = "{\"ruleid\":\"1\"}";
assertEquals(r.remove(json),"{\"status\" : \"" + "Success! Rule deleted" + "\"}");
}
示例2: testStore
import net.floodlightcontroller.accesscontrollist.web.ACLRuleResource; //导入方法依赖的package包/类
@Test
public void testStore(){
ACL s = new ACL();
FloodlightModuleContext fmc = new FloodlightModuleContext();
try {
s.init(fmc);
} catch (FloodlightModuleException e) {
e.printStackTrace();
}
ACLRuleResource r = new ACLRuleResource();
Context ctx = new Context();
r.init(ctx, null, null);
r.getContext().getAttributes().putIfAbsent(IACLService.class.getCanonicalName(), s);
// input a valid JSON string that adds a new ACL rule
String json = "{\"nw-proto\":\"TCP\",\"src-ip\":\"10.0.0.1/32\",\"dst-ip\": \"10.0.0.2/32\",\"tp-dst\":\"80\",\"action\":\"ALLOW\"}";
assertEquals(r.store(json),"{\"status\" : \"" + "Success! New rule added." + "\"}");
// input a valid JSON string that matches an existing rule
json = "{\"nw-proto\":\"TCP\",\"src-ip\":\"10.0.0.1/32\",\"dst-ip\": \"10.0.0.2/32\",\"tp-dst\":\"80\",\"action\":\"ALLOW\"}";
assertEquals(r.store(json),"{\"status\" : \"" + "Failed! The new ACL rule matches an existing rule." + "\"}");
// input a valid JSON string that adds a new ACL rule
json = "{\"nw-proto\":\"TCP\",\"src-ip\":\"10.0.0.1/8\",\"dst-ip\": \"10.0.0.2/32\",\"tp-dst\":\"80\",\"action\":\"ALLOW\"}";
assertEquals(r.store(json),"{\"status\" : \"" + "Success! New rule added." + "\"}");
// input a valid JSON string that matches an existing rule
json = "{\"nw-proto\":\"TCP\",\"src-ip\":\"10.0.0.2/32\",\"dst-ip\": \"10.0.0.2/32\",\"tp-dst\":\"80\",\"action\":\"ALLOW\"}";
assertEquals(r.store(json),"{\"status\" : \"" + "Failed! The new ACL rule matches an existing rule." + "\"}");
// input a invalid JSON string that contains neither nw_src and nw_dst
json = "{\"nw-proto\":\"TCP\",\"tp-dst\":\"80\",\"action\":\"ALLOW\"}";
assertEquals(r.store(json),"{\"status\" : \"" + "Failed! Either nw_src or nw_dst must be specified." + "\"}");
// input a invalid JSON string that doesn't contain CIDR mask bits
json = "{\"nw-proto\":\"TCP\",\"src-ip\":\"10.0.0.1\",\"tp-dst\":\"80\",\"action\":\"ALLOW\"}";
assertEquals(r.store(json),"{\"status\" : \"" + "Failed! " + "CIDR mask bits must be specified." + "\"}");
// input a invalid JSON string that contains a invalid IP address
json = "{\"nw-proto\":\"TCP\",\"src-ip\":\"10.0.0.256/32\",\"tp-dst\":\"80\",\"action\":\"ALLOW\"}";
assertEquals(r.store(json),"{\"status\" : \"" + "Failed! Octet values in specified IPv4 address must be 0 <= value <= 255" + "\"}");
// input a invalid JSON string that contains a invalid IP address
json = "{\"nw-proto\":\"TCP\",\"src-ip\":\"10.0.01/32\",\"tp-dst\":\"80\",\"action\":\"ALLOW\"}";
assertEquals(r.store(json),"{\"status\" : \"" + "Failed! Specified IPv4 address mustcontain 4 sets of numerical digits separated by periods" + "\"}");
// input a invalid JSON string that contains a invalid CIDR mask bits
json = "{\"nw-proto\":\"TCP\",\"src-ip\":\"10.0.0.1/a\",\"tp-dst\":\"80\",\"action\":\"ALLOW\"}";
assertEquals(r.store(json),"{\"status\" : \"" + "Failed! CIDR mask bits must be specified as a number(0 ~ 32)." + "\"}");
// input a invalid JSON string that contains a invalid CIDR mask bits
json = "{\"nw-proto\":\"TCP\",\"src-ip\":\"10.0.0.1/33\",\"tp-dst\":\"80\",\"action\":\"ALLOW\"}";
assertEquals(r.store(json),"{\"status\" : \"" + "Failed! CIDR mask bits must be 0 <= value <= 32." + "\"}");
// input a invalid JSON string that contains a invalid nw-proto value
json = "{\"nw-proto\":\"ARP\",\"src-ip\":\"10.0.0.1/32\",\"tp-dst\":\"80\",\"action\":\"ALLOW\"}";
assertEquals(r.store(json),"{\"status\" : \"" + "Failed! nw-proto must be specified as (TCP || UDP || ICMP)." + "\"}");
// input a invalid JSON string that contains a invalid tp-dst value
json = "{\"nw-proto\":\"TCP\",\"src-ip\":\"10.0.0.1/32\",\"tp-dst\":\"a\",\"action\":\"ALLOW\"}";
assertEquals(r.store(json),"{\"status\" : \"" + "Failed! tp-dst must be specified as a number." + "\"}");
// input a invalid JSON string that contains a invalid action value
json = "{\"nw-proto\":\"TCP\",\"src-ip\":\"10.0.0.1/32\",\"tp-dst\":\"80\",\"action\":\"PERMIT\"}";
assertEquals(r.store(json),"{\"status\" : \"" + "Failed! action must be specidied as (allow || deny)." + "\"}");
}