@@ -1418,8 +1418,12 @@ func TestNetworkPktRanges(t *testing.T) {
1418
1418
1419
1419
// TestPolicyRules tests policy and rule REST objects
1420
1420
func TestPolicyRules (t * testing.T ) {
1421
+ containerID1 := "723e55bf5b244f47c1b184cb786a1c2ad8870cc3a3db723c49ac09f68a9d1e69"
1422
+ ep1 := "657355bf5b244f47c1b184cb786a14535d8870cc3a3db723c49ac09f68a9d6a5"
1421
1423
checkCreateNetwork (t , false , "default" , "contiv" , "data" , "vxlan" , "10.1.1.1/16" , "10.1.1.254" , 1 , "" , "" , "" )
1422
1424
checkCreateEpg (t , false , "default" , "contiv" , "group1" , []string {}, []string {}, "" )
1425
+ createEPinEPG (t , "10.1.1.15" , "default" , "group1" , containerID1 , "default" , ep1 , []string {})
1426
+
1423
1427
// create policy
1424
1428
checkCreatePolicy (t , false , "default" , "policy1" )
1425
1429
@@ -1435,6 +1439,14 @@ func TestPolicyRules(t *testing.T) {
1435
1439
checkCreateRule (t , false , "default" , "policy1" , "6" , "in" , "" , "group1" , "" , "" , "" , "" , "" , "deny" , 1 , 0 )
1436
1440
checkCreateRule (t , false , "default" , "policy1" , "7" , "out" , "" , "" , "" , "" , "group1" , "" , "tcp" , "allow" , 1 , 80 )
1437
1441
1442
+ // verify --to-ip, no linked epg fails
1443
+ checkCreateRule (t , true , "default" , "policy1" , "to-ip" , "in" , "" , "" , "10.1.1.15" , "" , "" , "10.2.1.31" , "tcp" , "allow" , 1 , 80 )
1444
+ // verify --to-ip not in epg fails
1445
+ checkCreateEpg (t , false , "default" , "contiv" , "group1" , []string {"policy1" }, []string {}, "" )
1446
+ checkCreateRule (t , true , "default" , "policy1" , "to-ip" , "in" , "" , "" , "10.2.1.115" , "" , "" , "10.1.1.19" , "tcp" , "allow" , 1 , 80 )
1447
+ checkCreateRule (t , false , "default" , "policy1" , "to-ip" , "in" , "" , "" , "10.2.1.11" , "" , "" , "10.1.1.15" , "tcp" , "allow" , 1 , 80 )
1448
+ checkCreateEpg (t , false , "default" , "contiv" , "group1" , []string {}, []string {}, "" )
1449
+
1438
1450
// verify duplicate rule id fails
1439
1451
checkCreateRule (t , true , "default" , "policy1" , "1" , "in" , "" , "" , "" , "" , "" , "" , "tcp" , "allow" , 1 , 80 )
1440
1452
@@ -1479,6 +1491,7 @@ func TestPolicyRules(t *testing.T) {
1479
1491
// checkCreateRule(t, true, tenant, policy, ruleID, dir, fnet, fepg, fip, tnet, tepg, tip, proto, prio, port)
1480
1492
1481
1493
// delete rules
1494
+ checkDeleteRule (t , false , "default" , "policy1" , "to-ip" )
1482
1495
checkDeleteRule (t , false , "default" , "policy1" , "1" )
1483
1496
checkDeleteRule (t , false , "default" , "policy1" , "2" )
1484
1497
checkDeleteRule (t , false , "default" , "policy1" , "3" )
@@ -1493,6 +1506,8 @@ func TestPolicyRules(t *testing.T) {
1493
1506
1494
1507
// delete policy
1495
1508
checkDeletePolicy (t , false , "default" , "policy1" )
1509
+
1510
+ deleteEP (t , "default" , "default" , ep1 )
1496
1511
// delete the EPG
1497
1512
checkDeleteEpg (t , false , "default" , "contiv" , "group1" )
1498
1513
// delete the network
@@ -2245,6 +2260,29 @@ func get(getAll bool, hook func(id string) ([]core.State, error)) func(http.Resp
2245
2260
}
2246
2261
}
2247
2262
2263
+ func createEPinEPG (t * testing.T , providerIP , network , epg , containerID , tenant , endpointID string , labels []string ) {
2264
+
2265
+ epCfg := & mastercfg.CfgEndpointState {
2266
+ NetID : network ,
2267
+ EndpointID : endpointID ,
2268
+ IPAddress : providerIP ,
2269
+ EndpointGroupKey : epg + ":" + tenant ,
2270
+ }
2271
+ epCfg .Labels = make (map [string ]string )
2272
+ for _ , v := range labels {
2273
+ key := strings .Split (v , "=" )[0 ]
2274
+ value := strings .Split (v , "=" )[1 ]
2275
+ epCfg .Labels [key ] = value
2276
+ }
2277
+ epCfg .StateDriver = stateStore
2278
+ netID := network + "." + tenant
2279
+ epCfg .ID = netID + "-" + endpointID
2280
+ err := epCfg .Write ()
2281
+ if err != nil {
2282
+ t .Errorf ("Error creating Ep :%s" , err )
2283
+ }
2284
+ }
2285
+
2248
2286
func createEP (t * testing.T , providerIP , network , containerID , tenant , endpointID string , labels []string ) {
2249
2287
2250
2288
epCfg := & mastercfg.CfgEndpointState {
0 commit comments