Switch EC2 from its own IpPermission and IpProtocol to org.jclouds.net.domain ones
Project: http://git-wip-us.apache.org/repos/asf/incubator-jclouds/repo Commit: http://git-wip-us.apache.org/repos/asf/incubator-jclouds/commit/77417cbc Tree: http://git-wip-us.apache.org/repos/asf/incubator-jclouds/tree/77417cbc Diff: http://git-wip-us.apache.org/repos/asf/incubator-jclouds/diff/77417cbc Branch: refs/heads/jclouds-101 Commit: 77417cbc327a527b60c3b45d61961b1b41765a73 Parents: 30e309d Author: Andrew Bayer <[email protected]> Authored: Thu Jun 13 09:40:59 2013 -0700 Committer: Andrew Bayer <[email protected]> Committed: Thu Jun 13 09:40:59 2013 -0700 ---------------------------------------------------------------------- .../clojure/org/jclouds/ec2/security_group2.clj | 6 +- .../BindIpPermissionToIndexedFormParams.java | 2 +- .../BindIpPermissionsToIndexedFormParams.java | 2 +- .../loaders/CreateSecurityGroupIfNeeded.java | 2 +- .../org/jclouds/ec2/domain/IpPermission.java | 189 ------------------- .../java/org/jclouds/ec2/domain/IpProtocol.java | 48 ----- .../org/jclouds/ec2/domain/SecurityGroup.java | 1 + .../ec2/services/SecurityGroupAsyncClient.java | 2 +- .../ec2/services/SecurityGroupClient.java | 2 +- .../org/jclouds/ec2/util/IpPermissions.java | 22 +-- .../jclouds/ec2/xml/IpPermissionHandler.java | 8 +- ...plicationArchitecturesEC2ClientLiveTest.java | 2 +- .../jclouds/ec2/EBSBootEC2ClientLiveTest.java | 2 +- .../ec2/compute/EC2ComputeServiceLiveTest.java | 2 +- .../CreateSecurityGroupIfNeededTest.java | 2 +- .../services/SecurityGroupAsyncClientTest.java | 2 +- .../services/SecurityGroupClientLiveTest.java | 8 +- .../org/jclouds/ec2/util/IpPermissionsTest.java | 2 +- ...scribeSecurityGroupsResponseHandlerTest.java | 4 +- .../org/jclouds/net/domain/IpPermission.java | 2 +- .../java/org/jclouds/net/domain/IpProtocol.java | 12 +- .../services/AWSSecurityGroupAsyncClient.java | 2 +- .../ec2/services/AWSSecurityGroupClient.java | 2 +- .../compute/AWSEC2ComputeServiceLiveTest.java | 2 +- .../DescribeSecurityGroupsResponseTest.java | 6 +- .../AWSSecurityGroupAsyncClientTest.java | 4 +- .../AWSSecurityGroupClientLiveTest.java | 6 +- 27 files changed, 59 insertions(+), 285 deletions(-) ---------------------------------------------------------------------- http://git-wip-us.apache.org/repos/asf/incubator-jclouds/blob/77417cbc/apis/ec2/src/main/clojure/org/jclouds/ec2/security_group2.clj ---------------------------------------------------------------------- diff --git a/apis/ec2/src/main/clojure/org/jclouds/ec2/security_group2.clj b/apis/ec2/src/main/clojure/org/jclouds/ec2/security_group2.clj index bc000a2..a6bc49c 100644 --- a/apis/ec2/src/main/clojure/org/jclouds/ec2/security_group2.clj +++ b/apis/ec2/src/main/clojure/org/jclouds/ec2/security_group2.clj @@ -21,9 +21,9 @@ org.jclouds.ec2.security-group2 (:require (org.jclouds [compute2 :as compute]) [org.jclouds.ec2.ebs2 :as ebs]) - (:import org.jclouds.ec2.domain.IpProtocol - org.jclouds.ec2.domain.SecurityGroup - org.jclouds.ec2.services.SecurityGroupClient)) + (:import org.jclouds.ec2.domain.SecurityGroup + org.jclouds.ec2.services.SecurityGroupClient + org.jclouds.net.domain.IpProtocol)) (defn #^SecurityGroupClient sg-service http://git-wip-us.apache.org/repos/asf/incubator-jclouds/blob/77417cbc/apis/ec2/src/main/java/org/jclouds/ec2/binders/BindIpPermissionToIndexedFormParams.java ---------------------------------------------------------------------- diff --git a/apis/ec2/src/main/java/org/jclouds/ec2/binders/BindIpPermissionToIndexedFormParams.java b/apis/ec2/src/main/java/org/jclouds/ec2/binders/BindIpPermissionToIndexedFormParams.java index f90e938..403f592 100644 --- a/apis/ec2/src/main/java/org/jclouds/ec2/binders/BindIpPermissionToIndexedFormParams.java +++ b/apis/ec2/src/main/java/org/jclouds/ec2/binders/BindIpPermissionToIndexedFormParams.java @@ -19,9 +19,9 @@ package org.jclouds.ec2.binders; import static com.google.common.base.Preconditions.checkArgument; import static com.google.common.base.Preconditions.checkNotNull; -import org.jclouds.ec2.domain.IpPermission; import org.jclouds.ec2.util.IpPermissions; import org.jclouds.http.HttpRequest; +import org.jclouds.net.domain.IpPermission; import org.jclouds.rest.Binder; /** http://git-wip-us.apache.org/repos/asf/incubator-jclouds/blob/77417cbc/apis/ec2/src/main/java/org/jclouds/ec2/binders/BindIpPermissionsToIndexedFormParams.java ---------------------------------------------------------------------- diff --git a/apis/ec2/src/main/java/org/jclouds/ec2/binders/BindIpPermissionsToIndexedFormParams.java b/apis/ec2/src/main/java/org/jclouds/ec2/binders/BindIpPermissionsToIndexedFormParams.java index d9260f9..4bead83 100644 --- a/apis/ec2/src/main/java/org/jclouds/ec2/binders/BindIpPermissionsToIndexedFormParams.java +++ b/apis/ec2/src/main/java/org/jclouds/ec2/binders/BindIpPermissionsToIndexedFormParams.java @@ -19,9 +19,9 @@ package org.jclouds.ec2.binders; import static com.google.common.base.Preconditions.checkArgument; import static com.google.common.base.Preconditions.checkNotNull; -import org.jclouds.ec2.domain.IpPermission; import org.jclouds.ec2.util.IpPermissions; import org.jclouds.http.HttpRequest; +import org.jclouds.net.domain.IpPermission; import org.jclouds.rest.Binder; import com.google.common.collect.ImmutableMultimap; http://git-wip-us.apache.org/repos/asf/incubator-jclouds/blob/77417cbc/apis/ec2/src/main/java/org/jclouds/ec2/compute/loaders/CreateSecurityGroupIfNeeded.java ---------------------------------------------------------------------- diff --git a/apis/ec2/src/main/java/org/jclouds/ec2/compute/loaders/CreateSecurityGroupIfNeeded.java b/apis/ec2/src/main/java/org/jclouds/ec2/compute/loaders/CreateSecurityGroupIfNeeded.java index 0d54164..de3b906 100644 --- a/apis/ec2/src/main/java/org/jclouds/ec2/compute/loaders/CreateSecurityGroupIfNeeded.java +++ b/apis/ec2/src/main/java/org/jclouds/ec2/compute/loaders/CreateSecurityGroupIfNeeded.java @@ -27,10 +27,10 @@ import org.jclouds.compute.reference.ComputeServiceConstants; import org.jclouds.ec2.EC2Client; import org.jclouds.ec2.compute.domain.RegionAndName; import org.jclouds.ec2.compute.domain.RegionNameAndIngressRules; -import org.jclouds.ec2.domain.IpProtocol; import org.jclouds.ec2.domain.UserIdGroupPair; import org.jclouds.ec2.services.SecurityGroupClient; import org.jclouds.logging.Logger; +import org.jclouds.net.domain.IpProtocol; import com.google.common.base.Predicate; import com.google.common.cache.CacheLoader; http://git-wip-us.apache.org/repos/asf/incubator-jclouds/blob/77417cbc/apis/ec2/src/main/java/org/jclouds/ec2/domain/IpPermission.java ---------------------------------------------------------------------- diff --git a/apis/ec2/src/main/java/org/jclouds/ec2/domain/IpPermission.java b/apis/ec2/src/main/java/org/jclouds/ec2/domain/IpPermission.java deleted file mode 100644 index 91c75e7..0000000 --- a/apis/ec2/src/main/java/org/jclouds/ec2/domain/IpPermission.java +++ /dev/null @@ -1,189 +0,0 @@ -/* - * Licensed to the Apache Software Foundation (ASF) under one or more - * contributor license agreements. See the NOTICE file distributed with - * this work for additional information regarding copyright ownership. - * The ASF licenses this file to You under the Apache License, Version 2.0 - * (the "License"); you may not use this file except in compliance with - * the License. You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ -package org.jclouds.ec2.domain; - -import static com.google.common.base.Preconditions.checkNotNull; - -import java.util.Set; - -import com.google.common.base.Objects; -import com.google.common.collect.ImmutableMultimap; -import com.google.common.collect.ImmutableSet; -import com.google.common.collect.Iterables; -import com.google.common.collect.LinkedHashMultimap; -import com.google.common.collect.Multimap; -import com.google.common.collect.Sets; - -/** - * - * @see <a href= - * "http://docs.amazonwebservices.com/AWSEC2/latest/APIReference/ApiReference-ItemType-IpPermissionType.html" - * /> - * @author Adrian Cole - */ -public class IpPermission { - public static Builder builder() { - return new Builder(); - } - - public static class Builder { - private int fromPort; - private int toPort; - private IpProtocol ipProtocol; - private Multimap<String, String> userIdGroupPairs = LinkedHashMultimap.create(); - private Set<String> groupIds = Sets.newLinkedHashSet(); - private Set<String> ipRanges = Sets.newLinkedHashSet(); - - public Builder fromPort(int fromPort) { - this.fromPort = fromPort; - return this; - } - - public Builder toPort(int toPort) { - this.toPort = toPort; - return this; - } - - public Builder ipProtocol(IpProtocol ipProtocol) { - this.ipProtocol = checkNotNull(ipProtocol, "ipProtocol"); - return this; - } - - public Builder userIdGroupPair(String userId, String groupNameOrId) { - this.userIdGroupPairs.put(checkNotNull(userId, "userId"), checkNotNull(groupNameOrId, "groupNameOrId of %s", userId)); - return this; - } - - public Builder userIdGroupPairs(Multimap<String, String> userIdGroupPairs) { - this.userIdGroupPairs.putAll(checkNotNull(userIdGroupPairs, "userIdGroupPairs")); - return this; - } - - public Builder ipRange(String ipRange) { - this.ipRanges.add(ipRange); - return this; - } - - public Builder ipRanges(Iterable<String> ipRanges) { - Iterables.addAll(this.ipRanges, checkNotNull(ipRanges, "ipRanges")); - return this; - } - - public Builder groupId(String groupId) { - this.groupIds.add(checkNotNull(groupId, "groupId")); - return this; - } - - public Builder groupIds(Iterable<String> groupIds) { - Iterables.addAll(this.groupIds, checkNotNull(groupIds, "groupIds")); - return this; - } - - public IpPermission build() { - return new IpPermission(ipProtocol, fromPort, toPort, userIdGroupPairs, groupIds, ipRanges); - } - } - - private final int fromPort; - private final int toPort; - private final Multimap<String, String> userIdGroupPairs; - private final Set<String> groupIds; - private final IpProtocol ipProtocol; - private final Set<String> ipRanges; - - public IpPermission(IpProtocol ipProtocol, int fromPort, int toPort, Multimap<String, String> userIdGroupPairs, - Iterable<String> groupIds, Iterable<String> ipRanges) { - this.fromPort = fromPort; - this.toPort = toPort; - this.userIdGroupPairs = ImmutableMultimap.copyOf(checkNotNull(userIdGroupPairs, "userIdGroupPairs")); - this.ipProtocol = checkNotNull(ipProtocol, "ipProtocol"); - this.groupIds = ImmutableSet.copyOf(checkNotNull(groupIds, "groupIds")); - this.ipRanges = ImmutableSet.copyOf(checkNotNull(ipRanges, "ipRanges")); - } - - /** - * Start of port range for the TCP and UDP protocols, or an ICMP type number. - * An ICMP type number of -1 indicates a wildcard (i.e., any ICMP type - * number). - */ - public int getFromPort() { - return fromPort; - } - - /** - * End of port range for the TCP and UDP protocols, or an ICMP code. An ICMP - * code of -1 indicates a wildcard (i.e., any ICMP code). - */ - public int getToPort() { - return toPort; - } - - /** - * List of security group and user ID pairs. - */ - public Multimap<String, String> getUserIdGroupPairs() { - return userIdGroupPairs; - } - - /** - * List of security group Ids - */ - public Set<String> getGroupIds() { - return groupIds; - } - - /** - * IP protocol - */ - public IpProtocol getIpProtocol() { - return ipProtocol; - } - - /** - * IP ranges. - */ - public Set<String> getIpRanges() { - return ipRanges; - } - - @Override - public int hashCode() { - return Objects.hashCode(fromPort, toPort, groupIds, ipProtocol, ipRanges, userIdGroupPairs); - } - - @Override - public boolean equals(Object obj) { - if (this == obj) - return true; - if (obj == null || getClass() != obj.getClass()) - return false; - IpPermission that = IpPermission.class.cast(obj); - return Objects.equal(this.fromPort, that.fromPort) && Objects.equal(this.toPort, that.toPort) - && Objects.equal(this.groupIds, that.groupIds) && Objects.equal(this.ipProtocol, that.ipProtocol) - && Objects.equal(this.ipRanges, that.ipRanges) - && Objects.equal(this.userIdGroupPairs, that.userIdGroupPairs); - } - - @Override - public String toString() { - return Objects.toStringHelper(this).omitNullValues().add("fromPort", fromPort == -1 ? null : fromPort) - .add("toPort", toPort == -1 ? null : toPort).add("groupIds", groupIds.size() == 0 ? null : groupIds) - .add("ipProtocol", ipProtocol).add("ipRanges", ipRanges.size() == 0 ? null : ipRanges) - .add("userIdGroupPairs", userIdGroupPairs.size() == 0 ? null : userIdGroupPairs).toString(); - } - -} http://git-wip-us.apache.org/repos/asf/incubator-jclouds/blob/77417cbc/apis/ec2/src/main/java/org/jclouds/ec2/domain/IpProtocol.java ---------------------------------------------------------------------- diff --git a/apis/ec2/src/main/java/org/jclouds/ec2/domain/IpProtocol.java b/apis/ec2/src/main/java/org/jclouds/ec2/domain/IpProtocol.java deleted file mode 100644 index 41e771c..0000000 --- a/apis/ec2/src/main/java/org/jclouds/ec2/domain/IpProtocol.java +++ /dev/null @@ -1,48 +0,0 @@ -/* - * Licensed to the Apache Software Foundation (ASF) under one or more - * contributor license agreements. See the NOTICE file distributed with - * this work for additional information regarding copyright ownership. - * The ASF licenses this file to You under the Apache License, Version 2.0 - * (the "License"); you may not use this file except in compliance with - * the License. You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ -package org.jclouds.ec2.domain; - -import static com.google.common.base.Preconditions.checkNotNull; - -/** - * @author Adrian Cole - * - */ -public enum IpProtocol { - - TCP, UDP, ICMP, ALL, UNRECOGNIZED; - - public String value() { - return this == ALL ? "-1" : name().toLowerCase(); - } - - @Override - public String toString() { - return value(); - } - - public static IpProtocol fromValue(String protocol) { - try { - if (protocol.equalsIgnoreCase("-1")) - return ALL; - return valueOf(checkNotNull(protocol, "protocol").toUpperCase()); - } catch (IllegalArgumentException e) { - return UNRECOGNIZED; - } - } - -} http://git-wip-us.apache.org/repos/asf/incubator-jclouds/blob/77417cbc/apis/ec2/src/main/java/org/jclouds/ec2/domain/SecurityGroup.java ---------------------------------------------------------------------- diff --git a/apis/ec2/src/main/java/org/jclouds/ec2/domain/SecurityGroup.java b/apis/ec2/src/main/java/org/jclouds/ec2/domain/SecurityGroup.java index ca5cdbb..caccebc 100644 --- a/apis/ec2/src/main/java/org/jclouds/ec2/domain/SecurityGroup.java +++ b/apis/ec2/src/main/java/org/jclouds/ec2/domain/SecurityGroup.java @@ -21,6 +21,7 @@ import static com.google.common.base.Preconditions.checkNotNull; import java.util.Set; import org.jclouds.javax.annotation.Nullable; +import org.jclouds.net.domain.IpPermission; import com.google.common.base.Objects; import com.google.common.base.Objects.ToStringHelper; http://git-wip-us.apache.org/repos/asf/incubator-jclouds/blob/77417cbc/apis/ec2/src/main/java/org/jclouds/ec2/services/SecurityGroupAsyncClient.java ---------------------------------------------------------------------- diff --git a/apis/ec2/src/main/java/org/jclouds/ec2/services/SecurityGroupAsyncClient.java b/apis/ec2/src/main/java/org/jclouds/ec2/services/SecurityGroupAsyncClient.java index 4d074ee..0de10f9 100644 --- a/apis/ec2/src/main/java/org/jclouds/ec2/services/SecurityGroupAsyncClient.java +++ b/apis/ec2/src/main/java/org/jclouds/ec2/services/SecurityGroupAsyncClient.java @@ -30,12 +30,12 @@ import org.jclouds.Fallbacks.VoidOnNotFoundOr404; import org.jclouds.aws.filters.FormSigner; import org.jclouds.ec2.binders.BindGroupNamesToIndexedFormParams; import org.jclouds.ec2.binders.BindUserIdGroupPairToSourceSecurityGroupFormParams; -import org.jclouds.ec2.domain.IpProtocol; import org.jclouds.ec2.domain.SecurityGroup; import org.jclouds.ec2.domain.UserIdGroupPair; import org.jclouds.ec2.xml.DescribeSecurityGroupsResponseHandler; import org.jclouds.javax.annotation.Nullable; import org.jclouds.location.functions.RegionToEndpointOrProviderIfNull; +import org.jclouds.net.domain.IpProtocol; import org.jclouds.rest.annotations.BinderParam; import org.jclouds.rest.annotations.EndpointParam; import org.jclouds.rest.annotations.Fallback; http://git-wip-us.apache.org/repos/asf/incubator-jclouds/blob/77417cbc/apis/ec2/src/main/java/org/jclouds/ec2/services/SecurityGroupClient.java ---------------------------------------------------------------------- diff --git a/apis/ec2/src/main/java/org/jclouds/ec2/services/SecurityGroupClient.java b/apis/ec2/src/main/java/org/jclouds/ec2/services/SecurityGroupClient.java index 3874bfb..23c8272 100644 --- a/apis/ec2/src/main/java/org/jclouds/ec2/services/SecurityGroupClient.java +++ b/apis/ec2/src/main/java/org/jclouds/ec2/services/SecurityGroupClient.java @@ -17,10 +17,10 @@ package org.jclouds.ec2.services; import java.util.Set; -import org.jclouds.ec2.domain.IpProtocol; import org.jclouds.ec2.domain.SecurityGroup; import org.jclouds.ec2.domain.UserIdGroupPair; import org.jclouds.javax.annotation.Nullable; +import org.jclouds.net.domain.IpProtocol; /** * Provides access to EC2 via their REST API. http://git-wip-us.apache.org/repos/asf/incubator-jclouds/blob/77417cbc/apis/ec2/src/main/java/org/jclouds/ec2/util/IpPermissions.java ---------------------------------------------------------------------- diff --git a/apis/ec2/src/main/java/org/jclouds/ec2/util/IpPermissions.java b/apis/ec2/src/main/java/org/jclouds/ec2/util/IpPermissions.java index ac32cda..9c938f0 100644 --- a/apis/ec2/src/main/java/org/jclouds/ec2/util/IpPermissions.java +++ b/apis/ec2/src/main/java/org/jclouds/ec2/util/IpPermissions.java @@ -21,8 +21,8 @@ import static com.google.common.base.Preconditions.checkNotNull; import java.util.Map; import java.util.Map.Entry; -import org.jclouds.ec2.domain.IpPermission; -import org.jclouds.ec2.domain.IpProtocol; +import org.jclouds.net.domain.IpPermission; +import org.jclouds.net.domain.IpProtocol; import org.jclouds.util.Maps2; import com.google.common.annotations.Beta; @@ -58,7 +58,7 @@ public class IpPermissions extends IpPermission { headers.put("IpPermissions.%d.ToPort", permission.getToPort() + ""); String prefix = "IpPermissions.%d.IpRanges."; int i = 0; - for (String cidrIp : checkNotNull(permission.getIpRanges(), "cidrIps")) { + for (String cidrIp : checkNotNull(permission.getCidrBlocks(), "cidrIps")) { headers.put(prefix + i++ + ".CidrIp", cidrIp); } prefix = "IpPermissions.%d.Groups."; @@ -68,15 +68,15 @@ public class IpPermissions extends IpPermission { } prefix = "IpPermissions.%d.Groups."; i = 0; - for (Entry<String, String> userIdGroupNamePair : checkNotNull(permission.getUserIdGroupPairs(), - "userIdGroupNamePairs").entries()) { - headers.put(prefix + i + ".UserId", userIdGroupNamePair.getKey()); - headers.put(prefix + i + ".GroupName", userIdGroupNamePair.getValue()); + for (Entry<String, String> tenantIdGroupNamePair : checkNotNull(permission.getTenantIdGroupNamePairs(), + "tenantIdGroupNamePairs").entries()) { + headers.put(prefix + i + ".UserId", tenantIdGroupNamePair.getKey()); + headers.put(prefix + i + ".GroupName", tenantIdGroupNamePair.getValue()); i++; } prefix = "IpPermissions.%d.IpRanges."; i = 0; - for (String cidrIp : checkNotNull(permission.getIpRanges(), "cidrIps")) { + for (String cidrIp : checkNotNull(permission.getCidrBlocks(), "cidrIps")) { headers.put(prefix + i++ + ".CidrIp", cidrIp); } return Multimaps.forMap(Maps2.transformKeys(headers, new Function<String, String>() { @@ -165,7 +165,7 @@ public class IpPermissions extends IpPermission { } public IpPermissions toVPCSecurityGroups(Iterable<String> groupIds) { - return new IpPermissions(getIpProtocol(), getFromPort(), getToPort(), getUserIdGroupPairs(), groupIds, + return new IpPermissions(getIpProtocol(), getFromPort(), getToPort(), getTenantIdGroupNamePairs(), groupIds, ImmutableSet.<String> of()); } } @@ -189,8 +189,8 @@ public class IpPermissions extends IpPermission { checkNotNull(groupName, "groupName"))); } - public IpPermissions toEC2SecurityGroups(Multimap<String, String> userIdGroupNamePairs) { - return new IpPermissions(getIpProtocol(), getFromPort(), getToPort(), userIdGroupNamePairs, getGroupIds(), + public IpPermissions toEC2SecurityGroups(Multimap<String, String> tenantIdGroupNamePairs) { + return new IpPermissions(getIpProtocol(), getFromPort(), getToPort(), tenantIdGroupNamePairs, getGroupIds(), ImmutableSet.<String> of()); } } http://git-wip-us.apache.org/repos/asf/incubator-jclouds/blob/77417cbc/apis/ec2/src/main/java/org/jclouds/ec2/xml/IpPermissionHandler.java ---------------------------------------------------------------------- diff --git a/apis/ec2/src/main/java/org/jclouds/ec2/xml/IpPermissionHandler.java b/apis/ec2/src/main/java/org/jclouds/ec2/xml/IpPermissionHandler.java index 5b4dc6d..980ef35 100644 --- a/apis/ec2/src/main/java/org/jclouds/ec2/xml/IpPermissionHandler.java +++ b/apis/ec2/src/main/java/org/jclouds/ec2/xml/IpPermissionHandler.java @@ -19,9 +19,9 @@ package org.jclouds.ec2.xml; import static org.jclouds.util.SaxUtils.currentOrNull; import static org.jclouds.util.SaxUtils.equalsOrSuffix; -import org.jclouds.ec2.domain.IpPermission; -import org.jclouds.ec2.domain.IpProtocol; import org.jclouds.http.functions.ParseSax; +import org.jclouds.net.domain.IpPermission; +import org.jclouds.net.domain.IpProtocol; import org.xml.sax.SAXException; /** @@ -66,14 +66,14 @@ public class IpPermissionHandler extends ParseSax.HandlerForGeneratedRequestWith // EC2) builder.toPort(Integer.parseInt(currentOrNegative(currentText))); } else if (equalsOrSuffix(qName, "cidrIp")) { - builder.ipRange(currentOrNull(currentText)); + builder.cidrBlock(currentOrNull(currentText)); } else if (equalsOrSuffix(qName, "userId")) { this.userId = currentOrNull(currentText); } else if (equalsOrSuffix(qName, "groupName") || equalsOrSuffix(qName, "groupId")) { this.groupId = currentOrNull(currentText); } else if (equalsOrSuffix(qName, "item")) { if (userId != null && groupId != null) - builder.userIdGroupPair(userId, groupId); + builder.tenantIdGroupNamePair(userId, groupId); userId = groupId = null; } currentText = new StringBuilder(); http://git-wip-us.apache.org/repos/asf/incubator-jclouds/blob/77417cbc/apis/ec2/src/test/java/org/jclouds/ec2/CloudApplicationArchitecturesEC2ClientLiveTest.java ---------------------------------------------------------------------- diff --git a/apis/ec2/src/test/java/org/jclouds/ec2/CloudApplicationArchitecturesEC2ClientLiveTest.java b/apis/ec2/src/test/java/org/jclouds/ec2/CloudApplicationArchitecturesEC2ClientLiveTest.java index 584e6d9..1fc8de9 100644 --- a/apis/ec2/src/test/java/org/jclouds/ec2/CloudApplicationArchitecturesEC2ClientLiveTest.java +++ b/apis/ec2/src/test/java/org/jclouds/ec2/CloudApplicationArchitecturesEC2ClientLiveTest.java @@ -40,7 +40,6 @@ import org.jclouds.ec2.domain.BlockDevice; import org.jclouds.ec2.domain.Image.EbsBlockDevice; import org.jclouds.ec2.domain.InstanceState; import org.jclouds.ec2.domain.InstanceType; -import org.jclouds.ec2.domain.IpProtocol; import org.jclouds.ec2.domain.KeyPair; import org.jclouds.ec2.domain.PublicIpInstanceIdPair; import org.jclouds.ec2.domain.Reservation; @@ -49,6 +48,7 @@ import org.jclouds.ec2.domain.Volume.InstanceInitiatedShutdownBehavior; import org.jclouds.ec2.predicates.InstanceHasIpAddress; import org.jclouds.ec2.predicates.InstanceStateRunning; import org.jclouds.http.HttpResponseException; +import org.jclouds.net.domain.IpProtocol; import org.jclouds.predicates.SocketOpen; import org.jclouds.scriptbuilder.ScriptBuilder; import org.jclouds.scriptbuilder.domain.OsFamily; http://git-wip-us.apache.org/repos/asf/incubator-jclouds/blob/77417cbc/apis/ec2/src/test/java/org/jclouds/ec2/EBSBootEC2ClientLiveTest.java ---------------------------------------------------------------------- diff --git a/apis/ec2/src/test/java/org/jclouds/ec2/EBSBootEC2ClientLiveTest.java b/apis/ec2/src/test/java/org/jclouds/ec2/EBSBootEC2ClientLiveTest.java index 67af652..3b8bd75 100644 --- a/apis/ec2/src/test/java/org/jclouds/ec2/EBSBootEC2ClientLiveTest.java +++ b/apis/ec2/src/test/java/org/jclouds/ec2/EBSBootEC2ClientLiveTest.java @@ -42,7 +42,6 @@ import org.jclouds.ec2.domain.Image.Architecture; import org.jclouds.ec2.domain.Image.ImageType; import org.jclouds.ec2.domain.InstanceState; import org.jclouds.ec2.domain.InstanceType; -import org.jclouds.ec2.domain.IpProtocol; import org.jclouds.ec2.domain.KeyPair; import org.jclouds.ec2.domain.Reservation; import org.jclouds.ec2.domain.RootDeviceType; @@ -58,6 +57,7 @@ import org.jclouds.ec2.predicates.VolumeAttached; import org.jclouds.ec2.predicates.VolumeAvailable; import org.jclouds.http.HttpResponseException; import org.jclouds.io.Payloads; +import org.jclouds.net.domain.IpProtocol; import org.jclouds.predicates.SocketOpen; import org.jclouds.scriptbuilder.InitScript; import org.jclouds.scriptbuilder.domain.OsFamily; http://git-wip-us.apache.org/repos/asf/incubator-jclouds/blob/77417cbc/apis/ec2/src/test/java/org/jclouds/ec2/compute/EC2ComputeServiceLiveTest.java ---------------------------------------------------------------------- diff --git a/apis/ec2/src/test/java/org/jclouds/ec2/compute/EC2ComputeServiceLiveTest.java b/apis/ec2/src/test/java/org/jclouds/ec2/compute/EC2ComputeServiceLiveTest.java index 67db38b..6334c9a 100644 --- a/apis/ec2/src/test/java/org/jclouds/ec2/compute/EC2ComputeServiceLiveTest.java +++ b/apis/ec2/src/test/java/org/jclouds/ec2/compute/EC2ComputeServiceLiveTest.java @@ -39,7 +39,6 @@ import org.jclouds.ec2.EC2ApiMetadata; import org.jclouds.ec2.EC2Client; import org.jclouds.ec2.compute.options.EC2TemplateOptions; import org.jclouds.ec2.domain.BlockDevice; -import org.jclouds.ec2.domain.IpProtocol; import org.jclouds.ec2.domain.KeyPair; import org.jclouds.ec2.domain.PublicIpInstanceIdPair; import org.jclouds.ec2.domain.RunningInstance; @@ -51,6 +50,7 @@ import org.jclouds.ec2.services.ElasticBlockStoreClient; import org.jclouds.ec2.services.InstanceClient; import org.jclouds.ec2.services.KeyPairClient; import org.jclouds.ec2.services.SecurityGroupClient; +import org.jclouds.net.domain.IpProtocol; import org.jclouds.scriptbuilder.domain.Statements; import org.jclouds.sshj.config.SshjSshClientModule; import org.jclouds.util.InetAddresses2; http://git-wip-us.apache.org/repos/asf/incubator-jclouds/blob/77417cbc/apis/ec2/src/test/java/org/jclouds/ec2/compute/loaders/CreateSecurityGroupIfNeededTest.java ---------------------------------------------------------------------- diff --git a/apis/ec2/src/test/java/org/jclouds/ec2/compute/loaders/CreateSecurityGroupIfNeededTest.java b/apis/ec2/src/test/java/org/jclouds/ec2/compute/loaders/CreateSecurityGroupIfNeededTest.java index 85358b3..9597e1a 100644 --- a/apis/ec2/src/test/java/org/jclouds/ec2/compute/loaders/CreateSecurityGroupIfNeededTest.java +++ b/apis/ec2/src/test/java/org/jclouds/ec2/compute/loaders/CreateSecurityGroupIfNeededTest.java @@ -29,10 +29,10 @@ import java.util.concurrent.ExecutionException; import org.jclouds.ec2.compute.domain.RegionAndName; import org.jclouds.ec2.compute.domain.RegionNameAndIngressRules; -import org.jclouds.ec2.domain.IpProtocol; import org.jclouds.ec2.domain.SecurityGroup; import org.jclouds.ec2.domain.UserIdGroupPair; import org.jclouds.ec2.services.SecurityGroupClient; +import org.jclouds.net.domain.IpProtocol; import org.testng.annotations.Test; import com.google.common.base.Predicate; http://git-wip-us.apache.org/repos/asf/incubator-jclouds/blob/77417cbc/apis/ec2/src/test/java/org/jclouds/ec2/services/SecurityGroupAsyncClientTest.java ---------------------------------------------------------------------- diff --git a/apis/ec2/src/test/java/org/jclouds/ec2/services/SecurityGroupAsyncClientTest.java b/apis/ec2/src/test/java/org/jclouds/ec2/services/SecurityGroupAsyncClientTest.java index 24360d7..c22a279 100644 --- a/apis/ec2/src/test/java/org/jclouds/ec2/services/SecurityGroupAsyncClientTest.java +++ b/apis/ec2/src/test/java/org/jclouds/ec2/services/SecurityGroupAsyncClientTest.java @@ -22,12 +22,12 @@ import java.io.IOException; import org.jclouds.Fallbacks.EmptySetOnNotFoundOr404; import org.jclouds.Fallbacks.VoidOnNotFoundOr404; -import org.jclouds.ec2.domain.IpProtocol; import org.jclouds.ec2.domain.UserIdGroupPair; import org.jclouds.ec2.xml.DescribeSecurityGroupsResponseHandler; import org.jclouds.http.HttpRequest; import org.jclouds.http.functions.ParseSax; import org.jclouds.http.functions.ReleasePayloadAndReturn; +import org.jclouds.net.domain.IpProtocol; import org.jclouds.rest.internal.GeneratedHttpRequest; import org.testng.annotations.Test; http://git-wip-us.apache.org/repos/asf/incubator-jclouds/blob/77417cbc/apis/ec2/src/test/java/org/jclouds/ec2/services/SecurityGroupClientLiveTest.java ---------------------------------------------------------------------- diff --git a/apis/ec2/src/test/java/org/jclouds/ec2/services/SecurityGroupClientLiveTest.java b/apis/ec2/src/test/java/org/jclouds/ec2/services/SecurityGroupClientLiveTest.java index 0f25935..c6d02d2 100644 --- a/apis/ec2/src/test/java/org/jclouds/ec2/services/SecurityGroupClientLiveTest.java +++ b/apis/ec2/src/test/java/org/jclouds/ec2/services/SecurityGroupClientLiveTest.java @@ -30,10 +30,10 @@ import java.util.Set; import org.jclouds.compute.internal.BaseComputeServiceContextLiveTest; import org.jclouds.ec2.EC2ApiMetadata; import org.jclouds.ec2.EC2Client; -import org.jclouds.ec2.domain.IpPermission; -import org.jclouds.ec2.domain.IpProtocol; import org.jclouds.ec2.domain.SecurityGroup; import org.jclouds.ec2.domain.UserIdGroupPair; +import org.jclouds.net.domain.IpPermission; +import org.jclouds.net.domain.IpProtocol; import org.testng.annotations.BeforeClass; import org.testng.annotations.Test; @@ -174,7 +174,7 @@ public class SecurityGroupClientLiveTest extends BaseComputeServiceContextLiveTe assertEventually(new GroupHasPermission(client, group2Name, new Predicate<IpPermission>() { @Override public boolean apply(IpPermission arg0) { - return arg0.getUserIdGroupPairs().equals(ImmutableMultimap.of(group.getOwnerId(), group1Name)); + return arg0.getTenantIdGroupNamePairs().equals(ImmutableMultimap.of(group.getOwnerId(), group1Name)); } })); @@ -191,7 +191,7 @@ public class SecurityGroupClientLiveTest extends BaseComputeServiceContextLiveTe @Override public boolean apply(IpPermission arg0) { return arg0.getIpProtocol() == IpProtocol.TCP && arg0.getFromPort() == 80 && arg0.getToPort() == 80 - && arg0.getIpRanges().equals(ImmutableSet.of("0.0.0.0/0")); + && arg0.getCidrBlocks().equals(ImmutableSet.of("0.0.0.0/0")); } } http://git-wip-us.apache.org/repos/asf/incubator-jclouds/blob/77417cbc/apis/ec2/src/test/java/org/jclouds/ec2/util/IpPermissionsTest.java ---------------------------------------------------------------------- diff --git a/apis/ec2/src/test/java/org/jclouds/ec2/util/IpPermissionsTest.java b/apis/ec2/src/test/java/org/jclouds/ec2/util/IpPermissionsTest.java index 6d466b7..03a2549 100644 --- a/apis/ec2/src/test/java/org/jclouds/ec2/util/IpPermissionsTest.java +++ b/apis/ec2/src/test/java/org/jclouds/ec2/util/IpPermissionsTest.java @@ -18,7 +18,7 @@ package org.jclouds.ec2.util; import static org.testng.Assert.assertEquals; -import org.jclouds.ec2.domain.IpProtocol; +import org.jclouds.net.domain.IpProtocol; import org.testng.annotations.Test; import com.google.common.collect.ImmutableSet; http://git-wip-us.apache.org/repos/asf/incubator-jclouds/blob/77417cbc/apis/ec2/src/test/java/org/jclouds/ec2/xml/DescribeSecurityGroupsResponseHandlerTest.java ---------------------------------------------------------------------- diff --git a/apis/ec2/src/test/java/org/jclouds/ec2/xml/DescribeSecurityGroupsResponseHandlerTest.java b/apis/ec2/src/test/java/org/jclouds/ec2/xml/DescribeSecurityGroupsResponseHandlerTest.java index 8032aaa..5084069 100644 --- a/apis/ec2/src/test/java/org/jclouds/ec2/xml/DescribeSecurityGroupsResponseHandlerTest.java +++ b/apis/ec2/src/test/java/org/jclouds/ec2/xml/DescribeSecurityGroupsResponseHandlerTest.java @@ -21,10 +21,10 @@ import static org.testng.Assert.assertEquals; import java.io.InputStream; import java.util.Set; -import org.jclouds.ec2.domain.IpPermission; -import org.jclouds.ec2.domain.IpProtocol; import org.jclouds.ec2.domain.SecurityGroup; import org.jclouds.http.functions.ParseSax; +import org.jclouds.net.domain.IpPermission; +import org.jclouds.net.domain.IpProtocol; import org.testng.annotations.Test; import com.google.common.collect.ImmutableMultimap; http://git-wip-us.apache.org/repos/asf/incubator-jclouds/blob/77417cbc/compute/src/main/java/org/jclouds/net/domain/IpPermission.java ---------------------------------------------------------------------- diff --git a/compute/src/main/java/org/jclouds/net/domain/IpPermission.java b/compute/src/main/java/org/jclouds/net/domain/IpPermission.java index 15bfe0c..d04af0c 100644 --- a/compute/src/main/java/org/jclouds/net/domain/IpPermission.java +++ b/compute/src/main/java/org/jclouds/net/domain/IpPermission.java @@ -154,7 +154,7 @@ public class IpPermission implements Comparable<IpPermission> { private final IpProtocol ipProtocol; private final Set<String> cidrBlocks; - protected IpPermission(IpProtocol ipProtocol, int fromPort, int toPort, + public IpPermission(IpProtocol ipProtocol, int fromPort, int toPort, Multimap<String, String> tenantIdGroupNamePairs, Iterable<String> groupIds, Iterable<String> cidrBlocks) { this.fromPort = fromPort; this.toPort = toPort; http://git-wip-us.apache.org/repos/asf/incubator-jclouds/blob/77417cbc/compute/src/main/java/org/jclouds/net/domain/IpProtocol.java ---------------------------------------------------------------------- diff --git a/compute/src/main/java/org/jclouds/net/domain/IpProtocol.java b/compute/src/main/java/org/jclouds/net/domain/IpProtocol.java index 50d4422..203f0f9 100644 --- a/compute/src/main/java/org/jclouds/net/domain/IpProtocol.java +++ b/compute/src/main/java/org/jclouds/net/domain/IpProtocol.java @@ -29,12 +29,22 @@ public enum IpProtocol { TCP, UDP, ICMP, ALL, UNRECOGNIZED; + public String value() { + return this == ALL ? "-1" : name().toLowerCase(); + } + + @Override + public String toString() { + return value(); + } + public static IpProtocol fromValue(String protocol) { try { + if (protocol.equalsIgnoreCase("-1")) + return ALL; return valueOf(checkNotNull(protocol, "protocol").toUpperCase()); } catch (IllegalArgumentException e) { return UNRECOGNIZED; } } - } http://git-wip-us.apache.org/repos/asf/incubator-jclouds/blob/77417cbc/providers/aws-ec2/src/main/java/org/jclouds/aws/ec2/services/AWSSecurityGroupAsyncClient.java ---------------------------------------------------------------------- diff --git a/providers/aws-ec2/src/main/java/org/jclouds/aws/ec2/services/AWSSecurityGroupAsyncClient.java b/providers/aws-ec2/src/main/java/org/jclouds/aws/ec2/services/AWSSecurityGroupAsyncClient.java index 75a6f9b..25acb03 100644 --- a/providers/aws-ec2/src/main/java/org/jclouds/aws/ec2/services/AWSSecurityGroupAsyncClient.java +++ b/providers/aws-ec2/src/main/java/org/jclouds/aws/ec2/services/AWSSecurityGroupAsyncClient.java @@ -33,12 +33,12 @@ import org.jclouds.aws.filters.FormSigner; import org.jclouds.ec2.binders.BindGroupIdsToIndexedFormParams; import org.jclouds.ec2.binders.BindIpPermissionToIndexedFormParams; import org.jclouds.ec2.binders.BindIpPermissionsToIndexedFormParams; -import org.jclouds.ec2.domain.IpPermission; import org.jclouds.ec2.domain.SecurityGroup; import org.jclouds.ec2.services.SecurityGroupAsyncClient; import org.jclouds.ec2.xml.DescribeSecurityGroupsResponseHandler; import org.jclouds.javax.annotation.Nullable; import org.jclouds.location.functions.RegionToEndpointOrProviderIfNull; +import org.jclouds.net.domain.IpPermission; import org.jclouds.rest.annotations.BinderParam; import org.jclouds.rest.annotations.EndpointParam; import org.jclouds.rest.annotations.Fallback; http://git-wip-us.apache.org/repos/asf/incubator-jclouds/blob/77417cbc/providers/aws-ec2/src/main/java/org/jclouds/aws/ec2/services/AWSSecurityGroupClient.java ---------------------------------------------------------------------- diff --git a/providers/aws-ec2/src/main/java/org/jclouds/aws/ec2/services/AWSSecurityGroupClient.java b/providers/aws-ec2/src/main/java/org/jclouds/aws/ec2/services/AWSSecurityGroupClient.java index 383b0fd..ac3b301 100644 --- a/providers/aws-ec2/src/main/java/org/jclouds/aws/ec2/services/AWSSecurityGroupClient.java +++ b/providers/aws-ec2/src/main/java/org/jclouds/aws/ec2/services/AWSSecurityGroupClient.java @@ -18,10 +18,10 @@ package org.jclouds.aws.ec2.services; import java.util.Set; import org.jclouds.aws.ec2.options.CreateSecurityGroupOptions; -import org.jclouds.ec2.domain.IpPermission; import org.jclouds.ec2.domain.SecurityGroup; import org.jclouds.ec2.services.SecurityGroupClient; import org.jclouds.javax.annotation.Nullable; +import org.jclouds.net.domain.IpPermission; import com.google.common.annotations.Beta; http://git-wip-us.apache.org/repos/asf/incubator-jclouds/blob/77417cbc/providers/aws-ec2/src/test/java/org/jclouds/aws/ec2/compute/AWSEC2ComputeServiceLiveTest.java ---------------------------------------------------------------------- diff --git a/providers/aws-ec2/src/test/java/org/jclouds/aws/ec2/compute/AWSEC2ComputeServiceLiveTest.java b/providers/aws-ec2/src/test/java/org/jclouds/aws/ec2/compute/AWSEC2ComputeServiceLiveTest.java index 7ee0e9d..ae39523 100644 --- a/providers/aws-ec2/src/test/java/org/jclouds/aws/ec2/compute/AWSEC2ComputeServiceLiveTest.java +++ b/providers/aws-ec2/src/test/java/org/jclouds/aws/ec2/compute/AWSEC2ComputeServiceLiveTest.java @@ -48,11 +48,11 @@ import org.jclouds.compute.predicates.NodePredicates; import org.jclouds.domain.LoginCredentials; import org.jclouds.ec2.EC2Client; import org.jclouds.ec2.compute.EC2ComputeServiceLiveTest; -import org.jclouds.ec2.domain.IpProtocol; import org.jclouds.ec2.domain.KeyPair; import org.jclouds.ec2.domain.SecurityGroup; import org.jclouds.ec2.services.InstanceClient; import org.jclouds.ec2.services.KeyPairClient; +import org.jclouds.net.domain.IpProtocol; import org.jclouds.scriptbuilder.domain.Statements; import org.testng.annotations.Test; http://git-wip-us.apache.org/repos/asf/incubator-jclouds/blob/77417cbc/providers/aws-ec2/src/test/java/org/jclouds/aws/ec2/parse/DescribeSecurityGroupsResponseTest.java ---------------------------------------------------------------------- diff --git a/providers/aws-ec2/src/test/java/org/jclouds/aws/ec2/parse/DescribeSecurityGroupsResponseTest.java b/providers/aws-ec2/src/test/java/org/jclouds/aws/ec2/parse/DescribeSecurityGroupsResponseTest.java index 40e49dd..8f948f5 100644 --- a/providers/aws-ec2/src/test/java/org/jclouds/aws/ec2/parse/DescribeSecurityGroupsResponseTest.java +++ b/providers/aws-ec2/src/test/java/org/jclouds/aws/ec2/parse/DescribeSecurityGroupsResponseTest.java @@ -25,12 +25,12 @@ import static org.testng.Assert.assertEquals; import java.io.InputStream; import java.util.Set; -import org.jclouds.ec2.domain.IpPermission; -import org.jclouds.ec2.domain.IpProtocol; import org.jclouds.ec2.domain.SecurityGroup; import org.jclouds.ec2.xml.BaseEC2HandlerTest; import org.jclouds.ec2.xml.DescribeSecurityGroupsResponseHandler; import org.jclouds.http.functions.ParseSax; +import org.jclouds.net.domain.IpPermission; +import org.jclouds.net.domain.IpProtocol; import org.jclouds.reflect.Invocation; import org.jclouds.rest.internal.GeneratedHttpRequest; import org.testng.annotations.Test; @@ -69,7 +69,7 @@ public class DescribeSecurityGroupsResponseTest extends BaseEC2HandlerTest { // .vpcId("vpc-99999999") .ipPermission(IpPermission.builder() .ipProtocol(IpProtocol.ALL) - .userIdGroupPair("123123123123","sg-11111111").build()) + .tenantIdGroupNamePair("123123123123","sg-11111111").build()) // .ipPermissionEgress(IpPermission.builder() // .ipProtocol(IpProtocol.ALL) // .ipRange("0.0.0.0/0").build()) http://git-wip-us.apache.org/repos/asf/incubator-jclouds/blob/77417cbc/providers/aws-ec2/src/test/java/org/jclouds/aws/ec2/services/AWSSecurityGroupAsyncClientTest.java ---------------------------------------------------------------------- diff --git a/providers/aws-ec2/src/test/java/org/jclouds/aws/ec2/services/AWSSecurityGroupAsyncClientTest.java b/providers/aws-ec2/src/test/java/org/jclouds/aws/ec2/services/AWSSecurityGroupAsyncClientTest.java index 2ad3467..9ebead5 100644 --- a/providers/aws-ec2/src/test/java/org/jclouds/aws/ec2/services/AWSSecurityGroupAsyncClientTest.java +++ b/providers/aws-ec2/src/test/java/org/jclouds/aws/ec2/services/AWSSecurityGroupAsyncClientTest.java @@ -22,13 +22,13 @@ import java.io.IOException; import org.jclouds.Fallbacks.EmptySetOnNotFoundOr404; import org.jclouds.Fallbacks.VoidOnNotFoundOr404; -import org.jclouds.ec2.domain.IpPermission; -import org.jclouds.ec2.domain.IpProtocol; import org.jclouds.ec2.util.IpPermissions; import org.jclouds.ec2.xml.DescribeSecurityGroupsResponseHandler; import org.jclouds.http.HttpRequest; import org.jclouds.http.functions.ParseSax; import org.jclouds.http.functions.ReleasePayloadAndReturn; +import org.jclouds.net.domain.IpPermission; +import org.jclouds.net.domain.IpProtocol; import org.jclouds.rest.internal.GeneratedHttpRequest; import org.testng.annotations.Test; http://git-wip-us.apache.org/repos/asf/incubator-jclouds/blob/77417cbc/providers/aws-ec2/src/test/java/org/jclouds/aws/ec2/services/AWSSecurityGroupClientLiveTest.java ---------------------------------------------------------------------- diff --git a/providers/aws-ec2/src/test/java/org/jclouds/aws/ec2/services/AWSSecurityGroupClientLiveTest.java b/providers/aws-ec2/src/test/java/org/jclouds/aws/ec2/services/AWSSecurityGroupClientLiveTest.java index 0ec81dd..76c7e91 100644 --- a/providers/aws-ec2/src/test/java/org/jclouds/aws/ec2/services/AWSSecurityGroupClientLiveTest.java +++ b/providers/aws-ec2/src/test/java/org/jclouds/aws/ec2/services/AWSSecurityGroupClientLiveTest.java @@ -21,11 +21,11 @@ import static org.testng.Assert.assertNotNull; import java.util.Set; -import org.jclouds.ec2.domain.IpPermission; -import org.jclouds.ec2.domain.IpProtocol; import org.jclouds.ec2.domain.SecurityGroup; import org.jclouds.ec2.services.SecurityGroupClientLiveTest; import org.jclouds.ec2.util.IpPermissions; +import org.jclouds.net.domain.IpPermission; +import org.jclouds.net.domain.IpProtocol; import org.testng.annotations.Test; import com.google.common.base.Predicate; @@ -69,7 +69,7 @@ public class AWSSecurityGroupClientLiveTest extends SecurityGroupClientLiveTest assertEventually(new GroupHasPermission(client, group2Name, new Predicate<IpPermission>() { @Override public boolean apply(IpPermission arg0) { - return arg0.getUserIdGroupPairs().equals(ImmutableMultimap.of(group.getOwnerId(), group1Name)) + return arg0.getTenantIdGroupNamePairs().equals(ImmutableMultimap.of(group.getOwnerId(), group1Name)) && arg0.getFromPort() == 80 && arg0.getToPort() == 80 && arg0.getIpProtocol() == IpProtocol.TCP; } }));
