@@ -25,8 +25,8 @@ import (
25
25
type bridgePolicyStateSuite struct {
26
26
statetesting.StateSuite
27
27
28
- machine * state .Machine
29
- containerMachine * state. Machine
28
+ machine containerizer .Machine
29
+ containerMachine containerizer. Container
30
30
31
31
bridgePolicy * containerizer.BridgePolicy
32
32
}
@@ -70,8 +70,9 @@ func (s *bridgePolicyStateSuite) SetUpTest(c *gc.C) {
70
70
s .StateSuite .SetUpTest (c )
71
71
72
72
var err error
73
- s . machine , err = s .State .AddMachine ("quantal" , state .JobHostUnits )
73
+ m , err : = s .State .AddMachine ("quantal" , state .JobHostUnits )
74
74
c .Assert (err , jc .ErrorIsNil )
75
+ s .machine = & containerizer.MachineShim {m }
75
76
76
77
s .bridgePolicy = & containerizer.BridgePolicy {
77
78
NetBondReconfigureDelay : 13 ,
@@ -87,14 +88,16 @@ func (s *bridgePolicyStateSuite) addContainerMachine(c *gc.C) {
87
88
}
88
89
container , err := s .State .AddMachineInsideMachine (containerTemplate , s .machine .Id (), instance .LXD )
89
90
c .Assert (err , jc .ErrorIsNil )
90
- s .containerMachine = container
91
+ s .containerMachine = & containerizer. MachineShim { container }
91
92
}
92
93
93
- func (s * bridgePolicyStateSuite ) assertNoDevicesOnMachine (c * gc.C , machine * state. Machine ) {
94
+ func (s * bridgePolicyStateSuite ) assertNoDevicesOnMachine (c * gc.C , machine containerizer. Container ) {
94
95
s .assertAllLinkLayerDevicesOnMachineMatchCount (c , machine , 0 )
95
96
}
96
97
97
- func (s * bridgePolicyStateSuite ) assertAllLinkLayerDevicesOnMachineMatchCount (c * gc.C , machine * state.Machine , expectedCount int ) {
98
+ func (s * bridgePolicyStateSuite ) assertAllLinkLayerDevicesOnMachineMatchCount (
99
+ c * gc.C , machine containerizer.Container , expectedCount int ,
100
+ ) {
98
101
results , err := machine .AllLinkLayerDevices ()
99
102
c .Assert (err , jc .ErrorIsNil )
100
103
c .Check (results , gc .HasLen , expectedCount )
@@ -117,7 +120,7 @@ func (s *bridgePolicyStateSuite) setupTwoSpaces(c *gc.C) {
117
120
s .createSpaceAndSubnet (c , "dmz" , "10.10.0.0/24" )
118
121
}
119
122
120
- func (s * bridgePolicyStateSuite ) createNICWithIP (c * gc.C , machine * state .Machine , deviceName , cidrAddress string ) {
123
+ func (s * bridgePolicyStateSuite ) createNICWithIP (c * gc.C , machine containerizer .Machine , deviceName , cidrAddress string ) {
121
124
err := machine .SetLinkLayerDevices (
122
125
state.LinkLayerDeviceArgs {
123
126
Name : deviceName ,
@@ -137,7 +140,9 @@ func (s *bridgePolicyStateSuite) createNICWithIP(c *gc.C, machine *state.Machine
137
140
c .Assert (err , jc .ErrorIsNil )
138
141
}
139
142
140
- func (s * bridgePolicyStateSuite ) createBridgeWithIP (c * gc.C , machine * state.Machine , bridgeName , cidrAddress string ) {
143
+ func (s * bridgePolicyStateSuite ) createBridgeWithIP (
144
+ c * gc.C , machine containerizer.Machine , bridgeName , cidrAddress string ,
145
+ ) {
141
146
err := machine .SetLinkLayerDevices (
142
147
state.LinkLayerDeviceArgs {
143
148
Name : bridgeName ,
@@ -159,7 +164,9 @@ func (s *bridgePolicyStateSuite) createBridgeWithIP(c *gc.C, machine *state.Mach
159
164
160
165
// createNICAndBridgeWithIP creates a network interface and a bridge on the
161
166
// machine, and assigns the requested CIDRAddress to the bridge.
162
- func (s * bridgePolicyStateSuite ) createNICAndBridgeWithIP (c * gc.C , machine * state.Machine , deviceName , bridgeName , cidrAddress string ) {
167
+ func (s * bridgePolicyStateSuite ) createNICAndBridgeWithIP (
168
+ c * gc.C , machine containerizer.Machine , deviceName , bridgeName , cidrAddress string ,
169
+ ) {
163
170
s .createBridgeWithIP (c , machine , bridgeName , cidrAddress )
164
171
err := machine .SetLinkLayerDevices (
165
172
state.LinkLayerDeviceArgs {
@@ -178,7 +185,7 @@ func (s *bridgePolicyStateSuite) setupMachineInTwoSpaces(c *gc.C) {
178
185
s .createNICAndBridgeWithIP (c , s .machine , "ens0p10" , "br-ens0p10" , "10.10.0.20/24" )
179
186
}
180
187
181
- func (s * bridgePolicyStateSuite ) createLoopbackNIC (c * gc.C , machine * state .Machine ) {
188
+ func (s * bridgePolicyStateSuite ) createLoopbackNIC (c * gc.C , machine containerizer .Machine ) {
182
189
err := machine .SetLinkLayerDevices (
183
190
state.LinkLayerDeviceArgs {
184
191
Name : "lo" ,
@@ -199,15 +206,15 @@ func (s *bridgePolicyStateSuite) createLoopbackNIC(c *gc.C, machine *state.Machi
199
206
}
200
207
201
208
// createAllDefaultDevices creates the loopback, lxcbr0, lxdbr0, and virbr0 devices
202
- func (s * bridgePolicyStateSuite ) createAllDefaultDevices (c * gc.C , machine * state .Machine ) {
209
+ func (s * bridgePolicyStateSuite ) createAllDefaultDevices (c * gc.C , machine containerizer .Machine ) {
203
210
// loopback
204
- s .createLoopbackNIC (c , s . machine )
211
+ s .createLoopbackNIC (c , machine )
205
212
// container.DefaultLxcBridge
206
- s .createBridgeWithIP (c , s . machine , "lxcbr0" , "10.0.3.1/24" )
213
+ s .createBridgeWithIP (c , machine , "lxcbr0" , "10.0.3.1/24" )
207
214
// container.DefaultLxdBridge
208
- s .createBridgeWithIP (c , s . machine , "lxdbr0" , "10.0.4.1/24" )
215
+ s .createBridgeWithIP (c , machine , "lxdbr0" , "10.0.4.1/24" )
209
216
// container.DefaultKvmBridge
210
- s .createBridgeWithIP (c , s . machine , "virbr0" , "192.168.124.1/24" )
217
+ s .createBridgeWithIP (c , machine , "virbr0" , "192.168.124.1/24" )
211
218
}
212
219
213
220
func (s * bridgePolicyStateSuite ) TestPopulateContainerLinkLayerDevicesCorrectlyPaired (c * gc.C ) {
@@ -345,7 +352,7 @@ func (s *bridgePolicyStateSuite) TestPopulateContainerLinkLayerDevicesUnitBindin
345
352
addCharm (c , s .State , "quantal" , "mysql" ), map [string ]string {"server" : "default" })
346
353
unit , err := app .AddUnit (state.AddUnitParams {})
347
354
c .Assert (err , jc .ErrorIsNil )
348
- err = unit .AssignToMachine (s .containerMachine )
355
+ err = unit .AssignToMachine (s .containerMachine . Wrapped () )
349
356
c .Assert (err , jc .ErrorIsNil )
350
357
spaces , err := s .containerMachine .DesiredSpaces ()
351
358
c .Assert (err , jc .ErrorIsNil )
0 commit comments