Tabnine Logo
SecurityGroupApi.createRuleAllowingCidrBlock
Code IndexAdd Tabnine to your IDE (free)

How to use
createRuleAllowingCidrBlock
method
in
org.jclouds.openstack.nova.v2_0.extensions.SecurityGroupApi

Best Java code snippets using org.jclouds.openstack.nova.v2_0.extensions.SecurityGroupApi.createRuleAllowingCidrBlock (Showing top 17 results out of 315)

origin: stackoverflow.com

 NovaApi novaApi = ContextBuilder
    .newBuilder("openstack-nova")
    .credentials("username", "api_key")
    .buildApi(NovaApi.class);

Ingress ingress = Ingress.builder().fromPort(80).toPort(80).ipProtocol(IpProtocol.TCP).build();

SecurityGroupApi securityGroupApi = novaApi.getSecurityGroupExtensionForZone("RegionOne").get();
SecurityGroup securityGroup = securityGroupApi.createWithDescription("name", "description");
SecurityGroupRule rule = securityGroupApi.createRuleAllowingCidrBlock(securityGroup.getName(), ingress, "0.0.0.0/0");
securityGroupApi.delete(securityGroup.getId());
origin: io.fabric8/fabric-core-agent-jclouds

/**
 * Authorizes access to the specified ports of the node, from the specified source.
 */
@Override
public void authorize(ComputeService service, NodeMetadata node, String source, int... ports) {
  String region = AWSUtils.parseHandle(node.getId())[0];
  Optional<? extends SecurityGroupApi> securityGroupApi = getSecurityGroup(service, region);
  if (securityGroupApi.isPresent()) {
    String groupName = "jclouds-" + node.getGroup();
    Optional<? extends SecurityGroup> securityGroup = getSecurityGroupForGroup(securityGroupApi.get(), groupName);
    if (securityGroup.isPresent()) {
      for (int port : ports) {
        try {
          securityGroupApi.get().createRuleAllowingCidrBlock(securityGroup.get().getId(),
              Ingress.builder()
                  .ipProtocol(IpProtocol.TCP)
                  .fromPort(port).toPort(port).build(),
              source);
        } catch (IllegalStateException e) {
          //noop
        }
      }
    }
  }
}
origin: jclouds/legacy-jclouds

  private void authorizeGroupToItselfAndAllIPsToTCPPort(SecurityGroupApi securityGroupApi,
      SecurityGroup securityGroup, int port) {
   logger.debug(">> authorizing securityGroup(%s) permission to 0.0.0.0/0 on port %d", securityGroup, port);
   securityGroupApi.createRuleAllowingCidrBlock(securityGroup.getId(), Ingress.builder().ipProtocol(
        IpProtocol.TCP).fromPort(port).toPort(port).build(), "0.0.0.0/0");
   logger.debug("<< authorized securityGroup(%s) permission to 0.0.0.0/0 on port %d", securityGroup, port);

  }
}
origin: apache/jclouds

private void authorizeGroupToItselfAndAllIPsToTCPPort(
   org.jclouds.openstack.nova.v2_0.extensions.SecurityGroupApi securityGroupApi,
   org.jclouds.openstack.nova.v2_0.domain.SecurityGroup securityGroup, int port) {
 logger.debug(">> authorizing securityGroup(%s) permission to 0.0.0.0/0 on port %d", securityGroup, port);
 securityGroupApi.createRuleAllowingCidrBlock(securityGroup.getId(),
    Ingress.builder().ipProtocol(IpProtocol.TCP).fromPort(port).toPort(port).build(), "0.0.0.0/0");
 logger.debug("<< authorized securityGroup(%s) permission to 0.0.0.0/0 on port %d", securityGroup, port);
}
origin: io.cloudsoft.jclouds.api/openstack-nova

  private void authorizeGroupToItselfAndAllIPsToTCPPort(SecurityGroupApi securityGroupApi,
      SecurityGroup securityGroup, int port) {
   logger.debug(">> authorizing securityGroup(%s) permission to 0.0.0.0/0 on port %d", securityGroup, port);
   securityGroupApi.createRuleAllowingCidrBlock(securityGroup.getId(), Ingress.builder().ipProtocol(
        IpProtocol.TCP).fromPort(port).toPort(port).build(), "0.0.0.0/0");
   logger.debug("<< authorized securityGroup(%s) permission to 0.0.0.0/0 on port %d", securityGroup, port);

  }
}
origin: com.amysta.jclouds.api/openstack-nova

  private void authorizeGroupToItselfAndAllIPsToTCPPort(SecurityGroupApi securityGroupApi,
      SecurityGroup securityGroup, int port) {
   logger.debug(">> authorizing securityGroup(%s) permission to 0.0.0.0/0 on port %d", securityGroup, port);
   securityGroupApi.createRuleAllowingCidrBlock(securityGroup.getId(), Ingress.builder().ipProtocol(
        IpProtocol.TCP).fromPort(port).toPort(port).build(), "0.0.0.0/0");
   logger.debug("<< authorized securityGroup(%s) permission to 0.0.0.0/0 on port %d", securityGroup, port);

  }
}
origin: org.apache.jclouds.api/openstack-nova

private void authorizeGroupToItselfAndAllIPsToTCPPort(
   org.jclouds.openstack.nova.v2_0.extensions.SecurityGroupApi securityGroupApi,
   org.jclouds.openstack.nova.v2_0.domain.SecurityGroup securityGroup, int port) {
 logger.debug(">> authorizing securityGroup(%s) permission to 0.0.0.0/0 on port %d", securityGroup, port);
 securityGroupApi.createRuleAllowingCidrBlock(securityGroup.getId(),
    Ingress.builder().ipProtocol(IpProtocol.TCP).fromPort(port).toPort(port).build(), "0.0.0.0/0");
 logger.debug("<< authorized securityGroup(%s) permission to 0.0.0.0/0 on port %d", securityGroup, port);
}
origin: org.jclouds.api/openstack-nova

  private void authorizeGroupToItselfAndAllIPsToTCPPort(SecurityGroupApi securityGroupApi,
      SecurityGroup securityGroup, int port) {
   logger.debug(">> authorizing securityGroup(%s) permission to 0.0.0.0/0 on port %d", securityGroup, port);
   securityGroupApi.createRuleAllowingCidrBlock(securityGroup.getId(), Ingress.builder().ipProtocol(
        IpProtocol.TCP).fromPort(port).toPort(port).build(), "0.0.0.0/0");
   logger.debug("<< authorized securityGroup(%s) permission to 0.0.0.0/0 on port %d", securityGroup, port);

  }
}
origin: org.apache.whirr/whirr-core

for (int port : ports) {
 try {
  securityGroupApi.get().createRuleAllowingCidrBlock(group.get().getId(),
                            Ingress.builder()
                            .ipProtocol(org.jclouds.openstack.nova.v2_0.domain.IpProtocol.TCP)
origin: io.cloudsoft.jclouds.api/openstack-nova

sgApi.get().createRuleAllowingCidrBlock(id,
    Ingress.builder()
        .ipProtocol(ipPermission.getIpProtocol())
origin: org.apache.jclouds.api/openstack-nova

sgApi.get().createRuleAllowingCidrBlock(id,
    Ingress.builder()
        .ipProtocol(ipPermission.getIpProtocol())
origin: com.amysta.jclouds.api/openstack-nova

sgApi.get().createRuleAllowingCidrBlock(id,
    Ingress.builder()
        .ipProtocol(ipPermission.getIpProtocol())
origin: apache/jclouds

sgApi.get().createRuleAllowingCidrBlock(id,
    Ingress.builder()
        .ipProtocol(ipPermission.getIpProtocol())
origin: jclouds/legacy-jclouds

SecurityGroupRule rule = securityGroupApi.createRuleAllowingCidrBlock(securityGroup.getId(), Ingress
    .builder().ipProtocol(IpProtocol.TCP).fromPort(port).toPort(port).build(), "0.0.0.0/0");
assertNotNull(rule);
origin: apache/jclouds

SecurityGroupRule rule = securityGroupApi.createRuleAllowingCidrBlock(securityGroup.getId(), Ingress
    .builder().ipProtocol(IpProtocol.TCP).fromPort(port).toPort(port).build(), "0.0.0.0/0");
assertNotNull(rule);
origin: jclouds/legacy-jclouds

public void testCreateSecurityGroupRuleForCidrBlockWhenResponseIs2xx() throws Exception {
 HttpRequest createRule = HttpRequest
      .builder()
      .method("POST")
      .endpoint("https://az-1.region-a.geo-1.compute.hpcloudsvc.com/v1.1/3456/os-security-group-rules")
    .addHeader("Accept", "application/json")
    .addHeader("X-Auth-Token", authToken)
      .payload(
          payloadFromStringWithContentType(
               "{\"security_group_rule\":{\"parent_group_id\":\"161\",\"cidr\":\"0.0.0.0/0\",\"ip_protocol\":\"tcp\",\"from_port\":\"80\",\"to_port\":\"8080\"}}",
               "application/json")).build();
 HttpResponse createRuleResponse = HttpResponse.builder().statusCode(200).payload(
      payloadFromResource("/securitygrouprule_created.json")).build();
 NovaApi apiWhenSecurityGroupsExist = requestsSendResponses(keystoneAuthWithUsernameAndPasswordAndTenantName,
      responseWithKeystoneAccess, extensionsOfNovaRequest, extensionsOfNovaResponse, createRule,
      createRuleResponse);
 assertEquals(apiWhenSecurityGroupsExist.getSecurityGroupExtensionForZone("az-1.region-a.geo-1").get()
      .createRuleAllowingCidrBlock("161",
          Ingress.builder().ipProtocol(IpProtocol.TCP).fromPort(80).toPort(8080).build(), "0.0.0.0/0")
      .toString(), createRuleExpected().toString());
}
origin: apache/jclouds

public void testCreateSecurityGroupRuleForCidrBlockWhenResponseIs2xx() throws Exception {
 HttpRequest createRule = HttpRequest
      .builder()
      .method("POST")
      .endpoint("https://az-1.region-a.geo-1.compute.hpcloudsvc.com/v2/3456/os-security-group-rules")
    .addHeader("Accept", "application/json")
    .addHeader("X-Auth-Token", authToken)
      .payload(
          payloadFromStringWithContentType(
               "{\"security_group_rule\":{\"parent_group_id\":\"161\",\"cidr\":\"0.0.0.0/0\",\"ip_protocol\":\"tcp\",\"from_port\":\"80\",\"to_port\":\"8080\"}}",
               "application/json")).build();
 HttpResponse createRuleResponse = HttpResponse.builder().statusCode(200).payload(
      payloadFromResource("/securitygrouprule_created.json")).build();
 NovaApi apiWhenSecurityGroupsExist = requestsSendResponses(keystoneAuthWithUsernameAndPasswordAndTenantName,
      responseWithKeystoneAccess, extensionsOfNovaRequest, extensionsOfNovaResponse, createRule,
      createRuleResponse);
 assertEquals(apiWhenSecurityGroupsExist.getSecurityGroupApi("az-1.region-a.geo-1").get()
      .createRuleAllowingCidrBlock("161",
          Ingress.builder().ipProtocol(IpProtocol.TCP).fromPort(80).toPort(8080).build(), "0.0.0.0/0")
      .toString(), createRuleExpected().toString());
}
org.jclouds.openstack.nova.v2_0.extensionsSecurityGroupApicreateRuleAllowingCidrBlock

Javadoc

Create a Security Group Rule.

Popular methods of SecurityGroupApi

  • list
    List all Security Groups.
  • createWithDescription
    Create a Security Group
  • delete
    Delete a Security Group.
  • deleteRule
    Delete a Security Group Rule.
  • get
    Get a specific Security Group
  • createRuleAllowingSecurityGroupId
    Create a Security Group Rule.

Popular in Java

  • Making http post requests using okhttp
  • findViewById (Activity)
  • onRequestPermissionsResult (Fragment)
  • setScale (BigDecimal)
  • InputStreamReader (java.io)
    A class for turning a byte stream into a character stream. Data read from the source input stream is
  • PrintStream (java.io)
    Fake signature of an existing Java class.
  • Date (java.util)
    A specific moment in time, with millisecond precision. Values typically come from System#currentTime
  • BoxLayout (javax.swing)
  • IOUtils (org.apache.commons.io)
    General IO stream manipulation utilities. This class provides static utility methods for input/outpu
  • Logger (org.apache.log4j)
    This is the central class in the log4j package. Most logging operations, except configuration, are d
  • 21 Best Atom Packages for 2021
Tabnine Logo
  • Products

    Search for Java codeSearch for JavaScript code
  • IDE Plugins

    IntelliJ IDEAWebStormVisual StudioAndroid StudioEclipseVisual Studio CodePyCharmSublime TextPhpStormVimAtomGoLandRubyMineEmacsJupyter NotebookJupyter LabRiderDataGripAppCode
  • Company

    About UsContact UsCareers
  • Resources

    FAQBlogTabnine AcademyStudentsTerms of usePrivacy policyJava Code IndexJavascript Code Index
Get Tabnine for your IDE now