clean up: remove unused import
[neutron.git] / integration / test / src / test / java / org / opendaylight / neutron / e2etest / NeutronIPSECPoliciesTests.java
index 7bb815b0872470257768d19b59eedc8c5fb7df57..8c72b91a2807bb86a6f64e1b338160d16e1389f9 100644 (file)
@@ -8,15 +8,6 @@
 
 package org.opendaylight.neutron.e2etest;
 
-import java.io.OutputStreamWriter;
-
-import java.lang.Thread;
-
-import java.net.HttpURLConnection;
-import java.net.URL;
-
-import org.junit.Assert;
-
 public class NeutronIPSECPoliciesTests {
     String base;
 
@@ -28,4 +19,76 @@ public class NeutronIPSECPoliciesTests {
         String url = base + "/vpn/ipsecpolicies";
         ITNeutronE2E.test_fetch(url, "IPSEC Policy Collection GET failed");
     }
+
+    public String singleton_ipsecPolicy_create_test() {
+        String url = base + "/vpn/ipsecpolicies";
+        String content = " { \"ipsecpolicy\": { \"name\": \"ipsecpolicy1\"," +
+            "\"transform_protocol\": \"esp\"," +
+            "\"auth_algorithm\": \"sha1\"," +
+            "\"encapsulation_mode\": \"tunnel\"," +
+            "\"encryption_algorithm\": \"aes-128\"," +
+            "\"pfs\": \"group5\"," +
+            "\"tenant_id\": \"ccb81365fe36411a9011e90491fe1330\"," +
+            "\"lifetime\": { \"units\": \"seconds\", \"value\": 7200 }," +
+            "\"id\": \"5291b189-fd84-46e5-84bd-78f40c05d69c\"," +
+            "\"description\": \"\" } }";
+        ITNeutronE2E.test_create(url, content, "IPSEC Policy POST failed");
+        return content;
+    }
+
+    public void singleton_ipsecPolicy_get_with_one_query_item_test(String createJsonString) {
+        String url = base + "/vpn/ipsecpolicies";
+        ITNeutronE2E.test_fetch_with_one_query_item(url, createJsonString, "ipsecpolicies");
+    }
+
+    public void ipsecPolicy_update_test() {
+        String url = base + "/vpn/ipsecpolicies/5291b189-fd84-46e5-84bd-78f40c05d69c";
+        String content = " { \"ipsecpolicy\": { \"name\": \"ipsecpolicy1\"," +
+            "\"transform_protocol\": \"esp\"," +
+            "\"auth_algorithm\": \"sha1\"," +
+            "\"encapsulation_mode\": \"tunnel\"," +
+            "\"encryption_algorithm\": \"aes-128\"," +
+            "\"pfs\": \"group14\"," +
+            "\"tenant_id\": \"ccb81365fe36411a9011e90491fe1330\"," +
+            "\"lifetime\": { \"units\": \"seconds\", \"value\": 3600 }," +
+            "\"id\": \"5291b189-fd84-46e5-84bd-78f40c05d69c\"," +
+            "\"description\": \"\" } }";
+        ITNeutronE2E.test_modify(url, content, "IPSEC Policy PUT failed");
+    }
+
+    public void ipsecPolicy_element_get_test() {
+        String url = base + "/vpn/ipsecpolicies/5291b189-fd84-46e5-84bd-78f40c05d69c";
+        ITNeutronE2E.test_fetch(url, true, "IPSEC Policy Element GET failed");
+    }
+
+    public void ipsecPolicy_element_get_with_query_test() {
+        String url = base + "/vpn/ipsecpolicies/5291b189-fd84-46e5-84bd-78f40c05d69c" +
+            "?fields=id&fields=tenant_id&fields=name&fields=description&fields=pfs" +
+            "&fields=encapsulation_mode&fields=transform_protocol" +
+            "&fields=auth_algorithm&fields=encryption_algorithm";
+        ITNeutronE2E.test_fetch(url, true, "IPSEC Policy Element GET With Query failed");
+    }
+
+    public void ipsecPolicy_delete_test() {
+        String url = base + "/vpn/ipsecpolicies/5291b189-fd84-46e5-84bd-78f40c05d69c";
+        ITNeutronE2E.test_delete(url, "IPSEC Policy DELETE failed");
+    }
+
+    public void ipsecPolicy_element_negative_get_test() {
+        String url = base + "/vpn/ipsecpolicies/5291b189-fd84-46e5-84bd-78f40c05d69c";
+        ITNeutronE2E.test_fetch(url, false, "IPSEC Policy Element Negative GET failed");
+    }
+
+    public static void runTests(String base) {
+        NeutronIPSECPoliciesTests ipsec_policy_tester = new NeutronIPSECPoliciesTests(base);
+        String createJsonString = ipsec_policy_tester.singleton_ipsecPolicy_create_test();
+        ipsec_policy_tester.singleton_ipsecPolicy_get_with_one_query_item_test(createJsonString);
+        ipsec_policy_tester.ipsecPolicy_update_test();
+        ipsec_policy_tester.ipsecPolicy_element_get_test();
+        ipsec_policy_tester.ipsecPolicy_element_get_with_query_test();
+        ipsec_policy_tester.ipsecPolicy_collection_get_test();
+        ipsec_policy_tester.ipsecPolicy_delete_test();
+        ipsec_policy_tester.ipsecPolicy_element_negative_get_test();
+    }
 }
+