• 设为首页
  • 点击收藏
  • 手机版
    手机扫一扫访问
    迪恩网络手机版
  • 关注官方公众号
    微信扫一扫关注
    迪恩网络公众号

Java ACLRuleResource类代码示例

原作者: [db:作者] 来自: [db:来源] 收藏 邀请

本文整理汇总了Java中net.floodlightcontroller.accesscontrollist.web.ACLRuleResource的典型用法代码示例。如果您正苦于以下问题:Java ACLRuleResource类的具体用法?Java ACLRuleResource怎么用?Java ACLRuleResource使用的例子?那么恭喜您, 这里精选的类代码示例或许可以为您提供帮助。



ACLRuleResource类属于net.floodlightcontroller.accesscontrollist.web包,在下文中一共展示了ACLRuleResource类的2个代码示例,这些例子默认根据受欢迎程度排序。您可以为喜欢或者感觉有用的代码点赞,您的评价将有助于我们的系统推荐出更棒的Java代码示例。

示例1: testRemove

import net.floodlightcontroller.accesscontrollist.web.ACLRuleResource; //导入依赖的package包/类
@Test
public void testRemove(){
	ACL s = new ACL();
       FloodlightModuleContext fmc = new FloodlightModuleContext();
	try {
		s.init(fmc);
	} catch (FloodlightModuleException e) {
		e.printStackTrace();
	}
	
	ACLRuleResource r = new ACLRuleResource();
	Context ctx = new Context();
	r.init(ctx, null, null);
	r.getContext().getAttributes().putIfAbsent(IACLService.class.getCanonicalName(), s);

	// input a valid JSON string
       String json = "{\"nw-proto\":\"TCP\",\"src-ip\":\"10.0.0.1/32\",\"dst-ip\": \"10.0.0.2/32\",\"tp-dst\":\"80\",\"action\":\"ALLOW\"}";
       assertEquals(r.store(json),"{\"status\" : \"" + "Success! New rule added." + "\"}");
       
       // input a invalid JSON string that contains a invalid ruleid value
       json = "{\"ruleid\":\"a\"}";
       assertEquals(r.remove(json),"{\"status\" : \"" + "Failed! ruleid must be specified as a number." + "\"}");
       
       // input a invalid JSON string that contains a non-existing ruleid value
       json = "{\"ruleid\":\"2\"}";
       assertEquals(r.remove(json),"{\"status\" : \"" + "Failed! a rule with this ID doesn't exist." + "\"}");
       
       // input a valid JSON string that removes an existing ACL rule
       json = "{\"ruleid\":\"1\"}";
       assertEquals(r.remove(json),"{\"status\" : \"" + "Success! Rule deleted" + "\"}");
       
}
 
开发者ID:xuraylei,项目名称:fresco_floodlight,代码行数:33,代码来源:ACLRuleResourceTest.java


示例2: testStore

import net.floodlightcontroller.accesscontrollist.web.ACLRuleResource; //导入依赖的package包/类
@Test
public void testStore(){
	
	ACL s = new ACL();
       FloodlightModuleContext fmc = new FloodlightModuleContext();
	try {
		s.init(fmc);
	} catch (FloodlightModuleException e) {
		e.printStackTrace();
	}
	
	ACLRuleResource r = new ACLRuleResource();
	Context ctx = new Context();
	r.init(ctx, null, null);
	r.getContext().getAttributes().putIfAbsent(IACLService.class.getCanonicalName(), s);

	// input a valid JSON string that adds a new ACL rule
       String json = "{\"nw-proto\":\"TCP\",\"src-ip\":\"10.0.0.1/32\",\"dst-ip\": \"10.0.0.2/32\",\"tp-dst\":\"80\",\"action\":\"ALLOW\"}";
       assertEquals(r.store(json),"{\"status\" : \"" + "Success! New rule added." + "\"}");
       
       // input a valid JSON string that matches an existing rule
       json = "{\"nw-proto\":\"TCP\",\"src-ip\":\"10.0.0.1/32\",\"dst-ip\": \"10.0.0.2/32\",\"tp-dst\":\"80\",\"action\":\"ALLOW\"}";
       assertEquals(r.store(json),"{\"status\" : \"" + "Failed! The new ACL rule matches an existing rule." + "\"}");
       
       // input a valid JSON string that adds a new ACL rule
       json = "{\"nw-proto\":\"TCP\",\"src-ip\":\"10.0.0.1/8\",\"dst-ip\": \"10.0.0.2/32\",\"tp-dst\":\"80\",\"action\":\"ALLOW\"}";
       assertEquals(r.store(json),"{\"status\" : \"" + "Success! New rule added." + "\"}");
       
       // input a valid JSON string that matches an existing rule
       json = "{\"nw-proto\":\"TCP\",\"src-ip\":\"10.0.0.2/32\",\"dst-ip\": \"10.0.0.2/32\",\"tp-dst\":\"80\",\"action\":\"ALLOW\"}";
       assertEquals(r.store(json),"{\"status\" : \"" + "Failed! The new ACL rule matches an existing rule." + "\"}");

       // input a invalid JSON string that contains neither nw_src and nw_dst
       json = "{\"nw-proto\":\"TCP\",\"tp-dst\":\"80\",\"action\":\"ALLOW\"}";
       assertEquals(r.store(json),"{\"status\" : \"" + "Failed! Either nw_src or nw_dst must be specified." + "\"}");
       
       // input a invalid JSON string that doesn't contain CIDR mask bits
       json = "{\"nw-proto\":\"TCP\",\"src-ip\":\"10.0.0.1\",\"tp-dst\":\"80\",\"action\":\"ALLOW\"}";
       assertEquals(r.store(json),"{\"status\" : \"" + "Failed! " + "CIDR mask bits must be specified." + "\"}");
       
       // input a invalid JSON string that contains a invalid IP address
       json = "{\"nw-proto\":\"TCP\",\"src-ip\":\"10.0.0.256/32\",\"tp-dst\":\"80\",\"action\":\"ALLOW\"}";
       assertEquals(r.store(json),"{\"status\" : \"" + "Failed! Octet values in specified IPv4 address must be 0 <= value <= 255" + "\"}");
       
       // input a invalid JSON string that contains a invalid IP address
       json = "{\"nw-proto\":\"TCP\",\"src-ip\":\"10.0.01/32\",\"tp-dst\":\"80\",\"action\":\"ALLOW\"}";
       assertEquals(r.store(json),"{\"status\" : \"" + "Failed! Specified IPv4 address mustcontain 4 sets of numerical digits separated by periods" + "\"}");
       
       // input a invalid JSON string that contains a invalid CIDR mask bits
       json = "{\"nw-proto\":\"TCP\",\"src-ip\":\"10.0.0.1/a\",\"tp-dst\":\"80\",\"action\":\"ALLOW\"}";
       assertEquals(r.store(json),"{\"status\" : \"" + "Failed! CIDR mask bits must be specified as a number(0 ~ 32)." + "\"}");
       
       // input a invalid JSON string that contains a invalid CIDR mask bits
       json = "{\"nw-proto\":\"TCP\",\"src-ip\":\"10.0.0.1/33\",\"tp-dst\":\"80\",\"action\":\"ALLOW\"}";
       assertEquals(r.store(json),"{\"status\" : \"" + "Failed! CIDR mask bits must be 0 <= value <= 32." + "\"}");
       
       // input a invalid JSON string that contains a invalid nw-proto value
       json = "{\"nw-proto\":\"ARP\",\"src-ip\":\"10.0.0.1/32\",\"tp-dst\":\"80\",\"action\":\"ALLOW\"}";
       assertEquals(r.store(json),"{\"status\" : \"" + "Failed! nw-proto must be specified as (TCP || UDP || ICMP)." + "\"}");
       
       // input a invalid JSON string that contains a invalid tp-dst value
       json = "{\"nw-proto\":\"TCP\",\"src-ip\":\"10.0.0.1/32\",\"tp-dst\":\"a\",\"action\":\"ALLOW\"}";
       assertEquals(r.store(json),"{\"status\" : \"" + "Failed! tp-dst must be specified as a number." + "\"}");
       
       // input a invalid JSON string that contains a invalid action value
       json = "{\"nw-proto\":\"TCP\",\"src-ip\":\"10.0.0.1/32\",\"tp-dst\":\"80\",\"action\":\"PERMIT\"}";
       assertEquals(r.store(json),"{\"status\" : \"" + "Failed! action must be specidied as (allow || deny)." + "\"}");
       
}
 
开发者ID:xuraylei,项目名称:fresco_floodlight,代码行数:70,代码来源:ACLRuleResourceTest.java



注:本文中的net.floodlightcontroller.accesscontrollist.web.ACLRuleResource类示例整理自Github/MSDocs等源码及文档管理平台,相关代码片段筛选自各路编程大神贡献的开源项目,源码版权归原作者所有,传播和使用请参考对应项目的License;未经允许,请勿转载。


鲜花

握手

雷人

路过

鸡蛋
该文章已有0人参与评论

请发表评论

全部评论

专题导读
上一篇:
Java ReadTimeoutException类代码示例发布时间:2022-05-22
下一篇:
Java Cache类代码示例发布时间:2022-05-22
热门推荐
阅读排行榜

扫描微信二维码

查看手机版网站

随时了解更新最新资讯

139-2527-9053

在线客服(服务时间 9:00~18:00)

在线QQ客服
地址:深圳市南山区西丽大学城创智工业园
电邮:jeky_zhao#qq.com
移动电话:139-2527-9053

Powered by 互联科技 X3.4© 2001-2213 极客世界.|Sitemap