78
78
descr := "goamz security group for tests"
80
80
// Clean it up, if a previous test left it around and avoid leaving it around.
81
s.ec2.DelSecGroup(name)
82
defer s.ec2.DelSecGroup(name)
81
s.ec2.DeleteSecurityGroup(name)
82
defer s.ec2.DeleteSecurityGroup(name)
84
resp1, err := s.ec2.CreateSecGroup(name, descr)
84
resp1, err := s.ec2.CreateSecurityGroup(name, descr)
85
85
c.Assert(err, IsNil)
86
86
c.Assert(resp1.RequestId, Matches, ".+")
88
resp1, err = s.ec2.CreateSecGroup(name, descr)
88
resp1, err = s.ec2.CreateSecurityGroup(name, descr)
89
89
ec2err, _ := err.(*goamz.EC2Error)
90
90
c.Assert(resp1, IsNil)
91
91
c.Assert(ec2err, NotNil)
92
92
c.Assert(ec2err.Code, Equals, "InvalidGroup.Duplicate")
94
94
perms := []goamz.EC2IPPerm{{
98
SourceIPs: []string{"127.0.0.1/24"},
98
SourceIPs: []string{"127.0.0.1/24"},
101
resp1, err = s.ec2.AuthorizeSecGroup(name, perms)
101
resp1, err = s.ec2.AuthorizeSecurityGroup(name, perms)
102
102
c.Assert(err, IsNil)
103
103
c.Assert(resp1.RequestId, Matches, ".+")
105
resp2, err := s.ec2.SecGroups([]string{name}, nil)
105
resp2, err := s.ec2.SecurityGroups([]string{name}, nil)
106
106
c.Assert(err, IsNil)
107
107
c.Assert(resp2.RequestId, Matches, ".+")
108
c.Assert(len(resp2.SecGroups), Equals, 1)
108
c.Assert(len(resp2.SecurityGroups), Equals, 1)
110
g0 := resp2.SecGroups[0]
110
g0 := resp2.SecurityGroups[0]
111
111
c.Assert(g0.GroupName, Equals, name)
112
112
c.Assert(g0.GroupDescr, Equals, descr)
113
113
c.Assert(len(g0.IPPerms), Equals, 1)
116
116
c.Assert(g0.IPPerms[0].ToPort, Equals, 1024)
117
117
c.Assert(g0.IPPerms[0].SourceIPs, Equals, []string{"127.0.0.1/24"})
119
resp1, err = s.ec2.DelSecGroup(name)
119
resp1, err = s.ec2.DeleteSecurityGroup(name)
120
120
c.Assert(err, IsNil)
121
121
c.Assert(resp1.RequestId, Matches, ".+")