当前位置: 首页>>代码示例>>Java>>正文


Java ACLRuleResource.init方法代码示例

本文整理汇总了Java中net.floodlightcontroller.accesscontrollist.web.ACLRuleResource.init方法的典型用法代码示例。如果您正苦于以下问题:Java ACLRuleResource.init方法的具体用法?Java ACLRuleResource.init怎么用?Java ACLRuleResource.init使用的例子?那么恭喜您, 这里精选的方法代码示例或许可以为您提供帮助。您也可以进一步了解该方法所在net.floodlightcontroller.accesscontrollist.web.ACLRuleResource的用法示例。


在下文中一共展示了ACLRuleResource.init方法的2个代码示例,这些例子默认根据受欢迎程度排序。您可以为喜欢或者感觉有用的代码点赞,您的评价将有助于系统推荐出更棒的Java代码示例。

示例1: testRemove

import net.floodlightcontroller.accesscontrollist.web.ACLRuleResource; //导入方法依赖的package包/类
@Test
public void testRemove(){
	ACL s = new ACL();
       FloodlightModuleContext fmc = new FloodlightModuleContext();
	try {
		s.init(fmc);
	} catch (FloodlightModuleException e) {
		e.printStackTrace();
	}
	
	ACLRuleResource r = new ACLRuleResource();
	Context ctx = new Context();
	r.init(ctx, null, null);
	r.getContext().getAttributes().putIfAbsent(IACLService.class.getCanonicalName(), s);

	// input a valid JSON string
       String json = "{\"nw-proto\":\"TCP\",\"src-ip\":\"10.0.0.1/32\",\"dst-ip\": \"10.0.0.2/32\",\"tp-dst\":\"80\",\"action\":\"ALLOW\"}";
       assertEquals(r.store(json),"{\"status\" : \"" + "Success! New rule added." + "\"}");
       
       // input a invalid JSON string that contains a invalid ruleid value
       json = "{\"ruleid\":\"a\"}";
       assertEquals(r.remove(json),"{\"status\" : \"" + "Failed! ruleid must be specified as a number." + "\"}");
       
       // input a invalid JSON string that contains a non-existing ruleid value
       json = "{\"ruleid\":\"2\"}";
       assertEquals(r.remove(json),"{\"status\" : \"" + "Failed! a rule with this ID doesn't exist." + "\"}");
       
       // input a valid JSON string that removes an existing ACL rule
       json = "{\"ruleid\":\"1\"}";
       assertEquals(r.remove(json),"{\"status\" : \"" + "Success! Rule deleted" + "\"}");
       
}
 
开发者ID:xuraylei,项目名称:fresco_floodlight,代码行数:33,代码来源:ACLRuleResourceTest.java

示例2: testStore

import net.floodlightcontroller.accesscontrollist.web.ACLRuleResource; //导入方法依赖的package包/类
@Test
public void testStore(){
	
	ACL s = new ACL();
       FloodlightModuleContext fmc = new FloodlightModuleContext();
	try {
		s.init(fmc);
	} catch (FloodlightModuleException e) {
		e.printStackTrace();
	}
	
	ACLRuleResource r = new ACLRuleResource();
	Context ctx = new Context();
	r.init(ctx, null, null);
	r.getContext().getAttributes().putIfAbsent(IACLService.class.getCanonicalName(), s);

	// input a valid JSON string that adds a new ACL rule
       String json = "{\"nw-proto\":\"TCP\",\"src-ip\":\"10.0.0.1/32\",\"dst-ip\": \"10.0.0.2/32\",\"tp-dst\":\"80\",\"action\":\"ALLOW\"}";
       assertEquals(r.store(json),"{\"status\" : \"" + "Success! New rule added." + "\"}");
       
       // input a valid JSON string that matches an existing rule
       json = "{\"nw-proto\":\"TCP\",\"src-ip\":\"10.0.0.1/32\",\"dst-ip\": \"10.0.0.2/32\",\"tp-dst\":\"80\",\"action\":\"ALLOW\"}";
       assertEquals(r.store(json),"{\"status\" : \"" + "Failed! The new ACL rule matches an existing rule." + "\"}");
       
       // input a valid JSON string that adds a new ACL rule
       json = "{\"nw-proto\":\"TCP\",\"src-ip\":\"10.0.0.1/8\",\"dst-ip\": \"10.0.0.2/32\",\"tp-dst\":\"80\",\"action\":\"ALLOW\"}";
       assertEquals(r.store(json),"{\"status\" : \"" + "Success! New rule added." + "\"}");
       
       // input a valid JSON string that matches an existing rule
       json = "{\"nw-proto\":\"TCP\",\"src-ip\":\"10.0.0.2/32\",\"dst-ip\": \"10.0.0.2/32\",\"tp-dst\":\"80\",\"action\":\"ALLOW\"}";
       assertEquals(r.store(json),"{\"status\" : \"" + "Failed! The new ACL rule matches an existing rule." + "\"}");

       // input a invalid JSON string that contains neither nw_src and nw_dst
       json = "{\"nw-proto\":\"TCP\",\"tp-dst\":\"80\",\"action\":\"ALLOW\"}";
       assertEquals(r.store(json),"{\"status\" : \"" + "Failed! Either nw_src or nw_dst must be specified." + "\"}");
       
       // input a invalid JSON string that doesn't contain CIDR mask bits
       json = "{\"nw-proto\":\"TCP\",\"src-ip\":\"10.0.0.1\",\"tp-dst\":\"80\",\"action\":\"ALLOW\"}";
       assertEquals(r.store(json),"{\"status\" : \"" + "Failed! " + "CIDR mask bits must be specified." + "\"}");
       
       // input a invalid JSON string that contains a invalid IP address
       json = "{\"nw-proto\":\"TCP\",\"src-ip\":\"10.0.0.256/32\",\"tp-dst\":\"80\",\"action\":\"ALLOW\"}";
       assertEquals(r.store(json),"{\"status\" : \"" + "Failed! Octet values in specified IPv4 address must be 0 <= value <= 255" + "\"}");
       
       // input a invalid JSON string that contains a invalid IP address
       json = "{\"nw-proto\":\"TCP\",\"src-ip\":\"10.0.01/32\",\"tp-dst\":\"80\",\"action\":\"ALLOW\"}";
       assertEquals(r.store(json),"{\"status\" : \"" + "Failed! Specified IPv4 address mustcontain 4 sets of numerical digits separated by periods" + "\"}");
       
       // input a invalid JSON string that contains a invalid CIDR mask bits
       json = "{\"nw-proto\":\"TCP\",\"src-ip\":\"10.0.0.1/a\",\"tp-dst\":\"80\",\"action\":\"ALLOW\"}";
       assertEquals(r.store(json),"{\"status\" : \"" + "Failed! CIDR mask bits must be specified as a number(0 ~ 32)." + "\"}");
       
       // input a invalid JSON string that contains a invalid CIDR mask bits
       json = "{\"nw-proto\":\"TCP\",\"src-ip\":\"10.0.0.1/33\",\"tp-dst\":\"80\",\"action\":\"ALLOW\"}";
       assertEquals(r.store(json),"{\"status\" : \"" + "Failed! CIDR mask bits must be 0 <= value <= 32." + "\"}");
       
       // input a invalid JSON string that contains a invalid nw-proto value
       json = "{\"nw-proto\":\"ARP\",\"src-ip\":\"10.0.0.1/32\",\"tp-dst\":\"80\",\"action\":\"ALLOW\"}";
       assertEquals(r.store(json),"{\"status\" : \"" + "Failed! nw-proto must be specified as (TCP || UDP || ICMP)." + "\"}");
       
       // input a invalid JSON string that contains a invalid tp-dst value
       json = "{\"nw-proto\":\"TCP\",\"src-ip\":\"10.0.0.1/32\",\"tp-dst\":\"a\",\"action\":\"ALLOW\"}";
       assertEquals(r.store(json),"{\"status\" : \"" + "Failed! tp-dst must be specified as a number." + "\"}");
       
       // input a invalid JSON string that contains a invalid action value
       json = "{\"nw-proto\":\"TCP\",\"src-ip\":\"10.0.0.1/32\",\"tp-dst\":\"80\",\"action\":\"PERMIT\"}";
       assertEquals(r.store(json),"{\"status\" : \"" + "Failed! action must be specidied as (allow || deny)." + "\"}");
       
}
 
开发者ID:xuraylei,项目名称:fresco_floodlight,代码行数:70,代码来源:ACLRuleResourceTest.java


注:本文中的net.floodlightcontroller.accesscontrollist.web.ACLRuleResource.init方法示例由纯净天空整理自Github/MSDocs等开源代码及文档管理平台,相关代码片段筛选自各路编程大神贡献的开源项目,源码版权归原作者所有,传播和使用请参考对应项目的License;未经允许,请勿转载。