mirror of
https://github.com/ansible-collections/community.general.git
synced 2024-09-14 20:13:21 +02:00
Redirect and Remove sap modules (#5592)
* redirect and remove sap modules * remove botmeta redirect * add changelog fragment * revert runtime.yml changes and add new entries * Update meta/runtime.yml Co-authored-by: Felix Fontein <felix@fontein.de> * Update changelogs/fragments/5592-redirect-remove-sap-modules.yml Co-authored-by: Felix Fontein <felix@fontein.de> * Update changelogs/fragments/5592-redirect-remove-sap-modules.yml Co-authored-by: Felix Fontein <felix@fontein.de> * Update 5592-redirect-remove-sap-modules.yml Fix indentation * Fix RST syntax. * Update meta/runtime.yml Co-authored-by: Felix Fontein <felix@fontein.de> * Update meta/runtime.yml Co-authored-by: Felix Fontein <felix@fontein.de> Co-authored-by: Felix Fontein <felix@fontein.de>
This commit is contained in:
parent
a3b748a15e
commit
b1094d840f
9 changed files with 19 additions and 1032 deletions
6
.github/BOTMETA.yml
vendored
6
.github/BOTMETA.yml
vendored
|
@ -527,8 +527,6 @@ files:
|
||||||
maintainers: zimbatm
|
maintainers: zimbatm
|
||||||
$modules/gunicorn.py:
|
$modules/gunicorn.py:
|
||||||
maintainers: agmezr
|
maintainers: agmezr
|
||||||
$modules/hana_query.py:
|
|
||||||
maintainers: rainerleber
|
|
||||||
$modules/haproxy.py:
|
$modules/haproxy.py:
|
||||||
maintainers: ravibhure Normo
|
maintainers: ravibhure Normo
|
||||||
$modules/heroku_collaborator.py:
|
$modules/heroku_collaborator.py:
|
||||||
|
@ -1073,10 +1071,6 @@ files:
|
||||||
maintainers: nerzhul
|
maintainers: nerzhul
|
||||||
$modules/runit.py:
|
$modules/runit.py:
|
||||||
maintainers: jsumners
|
maintainers: jsumners
|
||||||
$modules/sap_task_list_execute:
|
|
||||||
maintainers: rainerleber
|
|
||||||
$modules/sapcar_extract.py:
|
|
||||||
maintainers: RainerLeber
|
|
||||||
$modules/say.py:
|
$modules/say.py:
|
||||||
maintainers: $team_ansible_core
|
maintainers: $team_ansible_core
|
||||||
ignore: mpdehaan
|
ignore: mpdehaan
|
||||||
|
|
13
changelogs/fragments/5592-redirect-remove-sap-modules.yml
Normal file
13
changelogs/fragments/5592-redirect-remove-sap-modules.yml
Normal file
|
@ -0,0 +1,13 @@
|
||||||
|
removed_features:
|
||||||
|
- |
|
||||||
|
All ``sap`` modules have been removed from this collection.
|
||||||
|
They have been migrated to the `community.sap_libs <https://galaxy.ansible.com/community/sap_libs>`_ collection.
|
||||||
|
Redirections have been provided.
|
||||||
|
Following modules are affected:
|
||||||
|
- sapcar_extract
|
||||||
|
- sap_task_list_execute
|
||||||
|
- hana_query
|
||||||
|
breaking_changes:
|
||||||
|
- |
|
||||||
|
If you are not using this collection as part of Ansible, but installed (and/or upgraded) community.general manually, you need to make sure to also install ``community.sap_libs`` if you are using any of the ``sapcar_extract``, ``sap_task_list_execute``, and ``hana_query`` modules.
|
||||||
|
Without that collection installed, the redirects for these modules do not work.
|
|
@ -972,6 +972,8 @@ plugin_routing:
|
||||||
warning_text: You are using an internal name to access the community.general.heroku_collaborator
|
warning_text: You are using an internal name to access the community.general.heroku_collaborator
|
||||||
modules. This has never been supported or documented, and will stop working
|
modules. This has never been supported or documented, and will stop working
|
||||||
in community.general 9.0.0.
|
in community.general 9.0.0.
|
||||||
|
hana_query:
|
||||||
|
redirect: community.sap_libs.sap_hdbsql
|
||||||
hetzner_failover_ip:
|
hetzner_failover_ip:
|
||||||
redirect: community.hrobot.failover_ip
|
redirect: community.hrobot.failover_ip
|
||||||
hetzner_failover_ip_info:
|
hetzner_failover_ip_info:
|
||||||
|
@ -3389,6 +3391,10 @@ plugin_routing:
|
||||||
warning_text: You are using an internal name to access the community.general.redfish_info
|
warning_text: You are using an internal name to access the community.general.redfish_info
|
||||||
modules. This has never been supported or documented, and will stop working
|
modules. This has never been supported or documented, and will stop working
|
||||||
in community.general 9.0.0.
|
in community.general 9.0.0.
|
||||||
|
sapcar_extract:
|
||||||
|
redirect: community.sap_libs.sapcar_extract
|
||||||
|
sap_task_list_execute:
|
||||||
|
redirect: community.sap_libs.sap_task_list_execute
|
||||||
packaging.os.redhat_subscription:
|
packaging.os.redhat_subscription:
|
||||||
redirect: community.general.redhat_subscription
|
redirect: community.general.redhat_subscription
|
||||||
deprecation:
|
deprecation:
|
||||||
|
|
|
@ -1,214 +0,0 @@
|
||||||
#!/usr/bin/python
|
|
||||||
# -*- coding: utf-8 -*-
|
|
||||||
|
|
||||||
# Copyright (c) 2021, Rainer Leber <rainerleber@gmail.com>
|
|
||||||
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
|
|
||||||
# SPDX-License-Identifier: GPL-3.0-or-later
|
|
||||||
from __future__ import (absolute_import, division, print_function)
|
|
||||||
__metaclass__ = type
|
|
||||||
|
|
||||||
DOCUMENTATION = r'''
|
|
||||||
---
|
|
||||||
module: hana_query
|
|
||||||
short_description: Execute SQL on HANA
|
|
||||||
version_added: 3.2.0
|
|
||||||
description: This module executes SQL statements on HANA with hdbsql.
|
|
||||||
options:
|
|
||||||
sid:
|
|
||||||
description: The system ID.
|
|
||||||
type: str
|
|
||||||
required: true
|
|
||||||
instance:
|
|
||||||
description: The instance number.
|
|
||||||
type: str
|
|
||||||
required: true
|
|
||||||
user:
|
|
||||||
description: A dedicated username. The user could be also in hdbuserstore. Defaults to C(SYSTEM).
|
|
||||||
type: str
|
|
||||||
default: SYSTEM
|
|
||||||
userstore:
|
|
||||||
description: If C(true) the user must be in hdbuserstore.
|
|
||||||
type: bool
|
|
||||||
default: false
|
|
||||||
version_added: 3.5.0
|
|
||||||
password:
|
|
||||||
description:
|
|
||||||
- The password to connect to the database.
|
|
||||||
- "B(Note:) Since the passwords have to be passed as command line arguments, I(userstore=true) should
|
|
||||||
be used whenever possible, as command line arguments can be seen by other users
|
|
||||||
on the same machine."
|
|
||||||
type: str
|
|
||||||
autocommit:
|
|
||||||
description: Autocommit the statement.
|
|
||||||
type: bool
|
|
||||||
default: true
|
|
||||||
host:
|
|
||||||
description: The Host IP address. The port can be defined as well.
|
|
||||||
type: str
|
|
||||||
database:
|
|
||||||
description: Define the database on which to connect.
|
|
||||||
type: str
|
|
||||||
encrypted:
|
|
||||||
description: Use encrypted connection. Defaults to C(false).
|
|
||||||
type: bool
|
|
||||||
default: false
|
|
||||||
filepath:
|
|
||||||
description:
|
|
||||||
- One or more files each containing one SQL query to run.
|
|
||||||
- Must be a string or list containing strings.
|
|
||||||
type: list
|
|
||||||
elements: path
|
|
||||||
query:
|
|
||||||
description:
|
|
||||||
- SQL query to run.
|
|
||||||
- Must be a string or list containing strings. Please note that if you supply a string, it will be split by commas (C(,)) to a list.
|
|
||||||
It is better to supply a one-element list instead to avoid mangled input.
|
|
||||||
type: list
|
|
||||||
elements: str
|
|
||||||
notes:
|
|
||||||
- Does not support C(check_mode).
|
|
||||||
author:
|
|
||||||
- Rainer Leber (@rainerleber)
|
|
||||||
'''
|
|
||||||
|
|
||||||
EXAMPLES = r'''
|
|
||||||
- name: Simple select query
|
|
||||||
community.general.hana_query:
|
|
||||||
sid: "hdb"
|
|
||||||
instance: "01"
|
|
||||||
password: "Test123"
|
|
||||||
query: "select user_name from users"
|
|
||||||
|
|
||||||
- name: Run several queries
|
|
||||||
community.general.hana_query:
|
|
||||||
sid: "hdb"
|
|
||||||
instance: "01"
|
|
||||||
password: "Test123"
|
|
||||||
query:
|
|
||||||
- "select user_name from users;"
|
|
||||||
- select * from SYSTEM;
|
|
||||||
host: "localhost"
|
|
||||||
autocommit: false
|
|
||||||
|
|
||||||
- name: Run several queries from file
|
|
||||||
community.general.hana_query:
|
|
||||||
sid: "hdb"
|
|
||||||
instance: "01"
|
|
||||||
password: "Test123"
|
|
||||||
filepath:
|
|
||||||
- /tmp/HANA_CPU_UtilizationPerCore_2.00.020+.txt
|
|
||||||
- /tmp/HANA.txt
|
|
||||||
host: "localhost"
|
|
||||||
|
|
||||||
- name: Run several queries from user store
|
|
||||||
community.general.hana_query:
|
|
||||||
sid: "hdb"
|
|
||||||
instance: "01"
|
|
||||||
user: hdbstoreuser
|
|
||||||
userstore: true
|
|
||||||
query:
|
|
||||||
- "select user_name from users;"
|
|
||||||
- select * from users;
|
|
||||||
autocommit: false
|
|
||||||
'''
|
|
||||||
|
|
||||||
RETURN = r'''
|
|
||||||
query_result:
|
|
||||||
description: List containing results of all queries executed (one sublist for every query).
|
|
||||||
returned: on success
|
|
||||||
type: list
|
|
||||||
elements: list
|
|
||||||
sample: [[{"Column": "Value1"}, {"Column": "Value2"}], [{"Column": "Value1"}, {"Column": "Value2"}]]
|
|
||||||
'''
|
|
||||||
|
|
||||||
import csv
|
|
||||||
from ansible.module_utils.basic import AnsibleModule
|
|
||||||
from ansible.module_utils.six import StringIO
|
|
||||||
from ansible.module_utils.common.text.converters import to_native
|
|
||||||
|
|
||||||
|
|
||||||
def csv_to_list(rawcsv):
|
|
||||||
reader_raw = csv.DictReader(StringIO(rawcsv))
|
|
||||||
reader = [dict((k, v.strip()) for k, v in row.items()) for row in reader_raw]
|
|
||||||
return list(reader)
|
|
||||||
|
|
||||||
|
|
||||||
def main():
|
|
||||||
module = AnsibleModule(
|
|
||||||
argument_spec=dict(
|
|
||||||
sid=dict(type='str', required=True),
|
|
||||||
instance=dict(type='str', required=True),
|
|
||||||
encrypted=dict(type='bool', default=False),
|
|
||||||
host=dict(type='str', required=False),
|
|
||||||
user=dict(type='str', default="SYSTEM"),
|
|
||||||
userstore=dict(type='bool', default=False),
|
|
||||||
password=dict(type='str', no_log=True),
|
|
||||||
database=dict(type='str', required=False),
|
|
||||||
query=dict(type='list', elements='str', required=False),
|
|
||||||
filepath=dict(type='list', elements='path', required=False),
|
|
||||||
autocommit=dict(type='bool', default=True),
|
|
||||||
),
|
|
||||||
required_one_of=[('query', 'filepath')],
|
|
||||||
required_if=[('userstore', False, ['password'])],
|
|
||||||
supports_check_mode=False,
|
|
||||||
)
|
|
||||||
rc, out, err, out_raw = [0, [], "", ""]
|
|
||||||
|
|
||||||
params = module.params
|
|
||||||
|
|
||||||
sid = (params['sid']).upper()
|
|
||||||
instance = params['instance']
|
|
||||||
user = params['user']
|
|
||||||
userstore = params['userstore']
|
|
||||||
password = params['password']
|
|
||||||
autocommit = params['autocommit']
|
|
||||||
host = params['host']
|
|
||||||
database = params['database']
|
|
||||||
encrypted = params['encrypted']
|
|
||||||
|
|
||||||
filepath = params['filepath']
|
|
||||||
query = params['query']
|
|
||||||
|
|
||||||
bin_path = "/usr/sap/{sid}/HDB{instance}/exe/hdbsql".format(sid=sid, instance=instance)
|
|
||||||
|
|
||||||
try:
|
|
||||||
command = [module.get_bin_path(bin_path, required=True)]
|
|
||||||
except Exception as e:
|
|
||||||
module.fail_json(msg='Failed to find hdbsql at the expected path "{0}". Please check SID and instance number: "{1}"'.format(bin_path, to_native(e)))
|
|
||||||
|
|
||||||
if encrypted is True:
|
|
||||||
command.extend(['-attemptencrypt'])
|
|
||||||
if autocommit is False:
|
|
||||||
command.extend(['-z'])
|
|
||||||
if host is not None:
|
|
||||||
command.extend(['-n', host])
|
|
||||||
if database is not None:
|
|
||||||
command.extend(['-d', database])
|
|
||||||
# -x Suppresses additional output, such as the number of selected rows in a result set.
|
|
||||||
if userstore:
|
|
||||||
command.extend(['-x', '-U', user])
|
|
||||||
else:
|
|
||||||
command.extend(['-x', '-i', instance, '-u', user, '-p', password])
|
|
||||||
|
|
||||||
if filepath is not None:
|
|
||||||
command.extend(['-I'])
|
|
||||||
for p in filepath:
|
|
||||||
# makes a command like hdbsql -i 01 -u SYSTEM -p secret123# -I /tmp/HANA_CPU_UtilizationPerCore_2.00.020+.txt,
|
|
||||||
# iterates through files and append the output to var out.
|
|
||||||
query_command = command + [p]
|
|
||||||
(rc, out_raw, err) = module.run_command(query_command)
|
|
||||||
out.append(csv_to_list(out_raw))
|
|
||||||
if query is not None:
|
|
||||||
for q in query:
|
|
||||||
# makes a command like hdbsql -i 01 -u SYSTEM -p secret123# "select user_name from users",
|
|
||||||
# iterates through multiple commands and append the output to var out.
|
|
||||||
query_command = command + [q]
|
|
||||||
(rc, out_raw, err) = module.run_command(query_command)
|
|
||||||
out.append(csv_to_list(out_raw))
|
|
||||||
changed = True
|
|
||||||
|
|
||||||
module.exit_json(changed=changed, rc=rc, query_result=out, stderr=err)
|
|
||||||
|
|
||||||
|
|
||||||
if __name__ == '__main__':
|
|
||||||
main()
|
|
|
@ -1,343 +0,0 @@
|
||||||
#!/usr/bin/python
|
|
||||||
# -*- coding: utf-8 -*-
|
|
||||||
|
|
||||||
# Copyright (c) 2021, Rainer Leber <rainerleber@gmail.com>
|
|
||||||
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
|
|
||||||
# SPDX-License-Identifier: GPL-3.0-or-later
|
|
||||||
from __future__ import (absolute_import, division, print_function)
|
|
||||||
__metaclass__ = type
|
|
||||||
|
|
||||||
DOCUMENTATION = r'''
|
|
||||||
---
|
|
||||||
module: sap_task_list_execute
|
|
||||||
short_description: Perform SAP Task list execution
|
|
||||||
version_added: "3.5.0"
|
|
||||||
description:
|
|
||||||
- The C(sap_task_list_execute) module depends on C(pyrfc) Python library (version 2.4.0 and upwards).
|
|
||||||
Depending on distribution you are using, you may need to install additional packages to
|
|
||||||
have these available.
|
|
||||||
- Tasks in the task list which requires manual activities will be confirmed automatically.
|
|
||||||
- This module will use the RFC package C(STC_TM_API).
|
|
||||||
|
|
||||||
requirements:
|
|
||||||
- pyrfc >= 2.4.0
|
|
||||||
- xmltodict
|
|
||||||
|
|
||||||
options:
|
|
||||||
conn_username:
|
|
||||||
description: The required username for the SAP system.
|
|
||||||
required: true
|
|
||||||
type: str
|
|
||||||
conn_password:
|
|
||||||
description: The required password for the SAP system.
|
|
||||||
required: true
|
|
||||||
type: str
|
|
||||||
host:
|
|
||||||
description: The required host for the SAP system. Can be either an FQDN or IP Address.
|
|
||||||
required: true
|
|
||||||
type: str
|
|
||||||
sysnr:
|
|
||||||
description:
|
|
||||||
- The system number of the SAP system.
|
|
||||||
- You must quote the value to ensure retaining the leading zeros.
|
|
||||||
default: '00'
|
|
||||||
type: str
|
|
||||||
client:
|
|
||||||
description:
|
|
||||||
- The client number to connect to.
|
|
||||||
- You must quote the value to ensure retaining the leading zeros.
|
|
||||||
default: '000'
|
|
||||||
type: str
|
|
||||||
task_to_execute:
|
|
||||||
description: The task list which will be executed.
|
|
||||||
required: true
|
|
||||||
type: str
|
|
||||||
task_parameters:
|
|
||||||
description:
|
|
||||||
- The tasks and the parameters for execution.
|
|
||||||
- If the task list do not need any parameters. This could be empty.
|
|
||||||
- If only specific tasks from the task list should be executed.
|
|
||||||
The tasks even when no parameter is needed must be provided.
|
|
||||||
Alongside with the module parameter I(task_skip=true).
|
|
||||||
type: list
|
|
||||||
elements: dict
|
|
||||||
suboptions:
|
|
||||||
TASKNAME:
|
|
||||||
description: The name of the task in the task list.
|
|
||||||
type: str
|
|
||||||
required: true
|
|
||||||
FIELDNAME:
|
|
||||||
description: The name of the field of the task.
|
|
||||||
type: str
|
|
||||||
VALUE:
|
|
||||||
description: The value which have to be set.
|
|
||||||
type: raw
|
|
||||||
task_settings:
|
|
||||||
description:
|
|
||||||
- Setting for the execution of the task list. This can be the following as in TCODE SE80 described.
|
|
||||||
Check Mode C(CHECKRUN), Background Processing Active C(BATCH) (this is the default value),
|
|
||||||
Asynchronous Execution C(ASYNC), Trace Mode C(TRACE), Server Name C(BATCH_TARGET).
|
|
||||||
default: ['BATCH']
|
|
||||||
type: list
|
|
||||||
elements: str
|
|
||||||
task_skip:
|
|
||||||
description:
|
|
||||||
- If this parameter is C(true) not defined tasks in I(task_parameters) are skipped.
|
|
||||||
- This could be the case when only certain tasks should run from the task list.
|
|
||||||
default: false
|
|
||||||
type: bool
|
|
||||||
|
|
||||||
notes:
|
|
||||||
- Does not support C(check_mode).
|
|
||||||
author:
|
|
||||||
- Rainer Leber (@rainerleber)
|
|
||||||
'''
|
|
||||||
|
|
||||||
EXAMPLES = r'''
|
|
||||||
# Pass in a message
|
|
||||||
- name: Test task execution
|
|
||||||
community.general.sap_task_list_execute:
|
|
||||||
conn_username: DDIC
|
|
||||||
conn_password: Passwd1234
|
|
||||||
host: 10.1.8.10
|
|
||||||
sysnr: '01'
|
|
||||||
client: '000'
|
|
||||||
task_to_execute: SAP_BASIS_SSL_CHECK
|
|
||||||
task_settings: batch
|
|
||||||
|
|
||||||
- name: Pass in input parameters
|
|
||||||
community.general.sap_task_list_execute:
|
|
||||||
conn_username: DDIC
|
|
||||||
conn_password: Passwd1234
|
|
||||||
host: 10.1.8.10
|
|
||||||
sysnr: '00'
|
|
||||||
client: '000'
|
|
||||||
task_to_execute: SAP_BASIS_SSL_CHECK
|
|
||||||
task_parameters :
|
|
||||||
- { 'TASKNAME': 'CL_STCT_CHECK_SEC_CRYPTO', 'FIELDNAME': 'P_OPT2', 'VALUE': 'X' }
|
|
||||||
- TASKNAME: CL_STCT_CHECK_SEC_CRYPTO
|
|
||||||
FIELDNAME: P_OPT3
|
|
||||||
VALUE: X
|
|
||||||
task_settings: batch
|
|
||||||
|
|
||||||
# Exported environement variables.
|
|
||||||
- name: Hint if module will fail with error message like ImportError libsapnwrfc.so...
|
|
||||||
community.general.sap_task_list_execute:
|
|
||||||
conn_username: DDIC
|
|
||||||
conn_password: Passwd1234
|
|
||||||
host: 10.1.8.10
|
|
||||||
sysnr: '00'
|
|
||||||
client: '000'
|
|
||||||
task_to_execute: SAP_BASIS_SSL_CHECK
|
|
||||||
task_settings: batch
|
|
||||||
environment:
|
|
||||||
SAPNWRFC_HOME: /usr/local/sap/nwrfcsdk
|
|
||||||
LD_LIBRARY_PATH: /usr/local/sap/nwrfcsdk/lib
|
|
||||||
'''
|
|
||||||
|
|
||||||
RETURN = r'''
|
|
||||||
msg:
|
|
||||||
description: A small execution description.
|
|
||||||
type: str
|
|
||||||
returned: always
|
|
||||||
sample: 'Successful'
|
|
||||||
out:
|
|
||||||
description: A complete description of the executed tasks. If this is available.
|
|
||||||
type: list
|
|
||||||
elements: dict
|
|
||||||
returned: on success
|
|
||||||
sample: [...,{
|
|
||||||
"LOG": {
|
|
||||||
"STCTM_S_LOG": [
|
|
||||||
{
|
|
||||||
"ACTIVITY": "U_CONFIG",
|
|
||||||
"ACTIVITY_DESCR": "Configuration changed",
|
|
||||||
"DETAILS": null,
|
|
||||||
"EXEC_ID": "20210728184903.815739",
|
|
||||||
"FIELD": null,
|
|
||||||
"ID": "STC_TASK",
|
|
||||||
"LOG_MSG_NO": "000000",
|
|
||||||
"LOG_NO": null,
|
|
||||||
"MESSAGE": "For radiobutton group ICM too many options are set; choose only one option",
|
|
||||||
"MESSAGE_V1": "ICM",
|
|
||||||
"MESSAGE_V2": null,
|
|
||||||
"MESSAGE_V3": null,
|
|
||||||
"MESSAGE_V4": null,
|
|
||||||
"NUMBER": "048",
|
|
||||||
"PARAMETER": null,
|
|
||||||
"PERIOD": "M",
|
|
||||||
"PERIOD_DESCR": "Maintenance",
|
|
||||||
"ROW": "0",
|
|
||||||
"SRC_LINE": "170",
|
|
||||||
"SRC_OBJECT": "CL_STCTM_REPORT_UI IF_STCTM_UI_TASK~SET_PARAMETERS",
|
|
||||||
"SYSTEM": null,
|
|
||||||
"TIMESTMP": "20210728184903",
|
|
||||||
"TSTPNM": "DDIC",
|
|
||||||
"TYPE": "E"
|
|
||||||
},...
|
|
||||||
]}}]
|
|
||||||
'''
|
|
||||||
|
|
||||||
from ansible.module_utils.basic import AnsibleModule, missing_required_lib
|
|
||||||
import traceback
|
|
||||||
try:
|
|
||||||
from pyrfc import Connection
|
|
||||||
except ImportError:
|
|
||||||
HAS_PYRFC_LIBRARY = False
|
|
||||||
PYRFC_LIBRARY_IMPORT_ERROR = traceback.format_exc()
|
|
||||||
else:
|
|
||||||
HAS_PYRFC_LIBRARY = True
|
|
||||||
PYRFC_LIBRARY_IMPORT_ERROR = None
|
|
||||||
try:
|
|
||||||
import xmltodict
|
|
||||||
except ImportError:
|
|
||||||
HAS_XMLTODICT_LIBRARY = False
|
|
||||||
XMLTODICT_LIBRARY_IMPORT_ERROR = traceback.format_exc()
|
|
||||||
else:
|
|
||||||
HAS_XMLTODICT_LIBRARY = True
|
|
||||||
XMLTODICT_LIBRARY_IMPORT_ERROR = None
|
|
||||||
|
|
||||||
|
|
||||||
def call_rfc_method(connection, method_name, kwargs):
|
|
||||||
# PyRFC call function
|
|
||||||
return connection.call(method_name, **kwargs)
|
|
||||||
|
|
||||||
|
|
||||||
def process_exec_settings(task_settings):
|
|
||||||
# processes task settings to objects
|
|
||||||
exec_settings = {}
|
|
||||||
for settings in task_settings:
|
|
||||||
temp_dict = {settings.upper(): 'X'}
|
|
||||||
for key, value in temp_dict.items():
|
|
||||||
exec_settings[key] = value
|
|
||||||
return exec_settings
|
|
||||||
|
|
||||||
|
|
||||||
def xml_to_dict(xml_raw):
|
|
||||||
try:
|
|
||||||
xml_parsed = xmltodict.parse(xml_raw, dict_constructor=dict)
|
|
||||||
xml_dict = xml_parsed['asx:abap']['asx:values']['SESSION']['TASKLIST']
|
|
||||||
except KeyError:
|
|
||||||
xml_dict = "No logs available."
|
|
||||||
return xml_dict
|
|
||||||
|
|
||||||
|
|
||||||
def run_module():
|
|
||||||
|
|
||||||
params_spec = dict(
|
|
||||||
TASKNAME=dict(type='str', required=True),
|
|
||||||
FIELDNAME=dict(type='str'),
|
|
||||||
VALUE=dict(type='raw'),
|
|
||||||
)
|
|
||||||
|
|
||||||
# define available arguments/parameters a user can pass to the module
|
|
||||||
module = AnsibleModule(
|
|
||||||
argument_spec=dict(
|
|
||||||
# values for connection
|
|
||||||
conn_username=dict(type='str', required=True),
|
|
||||||
conn_password=dict(type='str', required=True, no_log=True),
|
|
||||||
host=dict(type='str', required=True),
|
|
||||||
sysnr=dict(type='str', default="00"),
|
|
||||||
client=dict(type='str', default="000"),
|
|
||||||
# values for execution tasks
|
|
||||||
task_to_execute=dict(type='str', required=True),
|
|
||||||
task_parameters=dict(type='list', elements='dict', options=params_spec),
|
|
||||||
task_settings=dict(type='list', elements='str', default=['BATCH']),
|
|
||||||
task_skip=dict(type='bool', default=False),
|
|
||||||
),
|
|
||||||
supports_check_mode=False,
|
|
||||||
)
|
|
||||||
result = dict(changed=False, msg='', out={})
|
|
||||||
|
|
||||||
params = module.params
|
|
||||||
|
|
||||||
username = params['conn_username'].upper()
|
|
||||||
password = params['conn_password']
|
|
||||||
host = params['host']
|
|
||||||
sysnr = params['sysnr']
|
|
||||||
client = params['client']
|
|
||||||
|
|
||||||
task_parameters = params['task_parameters']
|
|
||||||
task_to_execute = params['task_to_execute']
|
|
||||||
task_settings = params['task_settings']
|
|
||||||
task_skip = params['task_skip']
|
|
||||||
|
|
||||||
if not HAS_PYRFC_LIBRARY:
|
|
||||||
module.fail_json(
|
|
||||||
msg=missing_required_lib('pyrfc'),
|
|
||||||
exception=PYRFC_LIBRARY_IMPORT_ERROR)
|
|
||||||
|
|
||||||
if not HAS_XMLTODICT_LIBRARY:
|
|
||||||
module.fail_json(
|
|
||||||
msg=missing_required_lib('xmltodict'),
|
|
||||||
exception=XMLTODICT_LIBRARY_IMPORT_ERROR)
|
|
||||||
|
|
||||||
# basic RFC connection with pyrfc
|
|
||||||
try:
|
|
||||||
conn = Connection(user=username, passwd=password, ashost=host, sysnr=sysnr, client=client)
|
|
||||||
except Exception as err:
|
|
||||||
result['error'] = str(err)
|
|
||||||
result['msg'] = 'Something went wrong connecting to the SAP system.'
|
|
||||||
module.fail_json(**result)
|
|
||||||
|
|
||||||
try:
|
|
||||||
raw_params = call_rfc_method(conn, 'STC_TM_SCENARIO_GET_PARAMETERS',
|
|
||||||
{'I_SCENARIO_ID': task_to_execute})
|
|
||||||
except Exception as err:
|
|
||||||
result['error'] = str(err)
|
|
||||||
result['msg'] = 'The task list does not exsist.'
|
|
||||||
module.fail_json(**result)
|
|
||||||
exec_settings = process_exec_settings(task_settings)
|
|
||||||
# initialize session task
|
|
||||||
session_init = call_rfc_method(conn, 'STC_TM_SESSION_BEGIN',
|
|
||||||
{'I_SCENARIO_ID': task_to_execute,
|
|
||||||
'I_INIT_ONLY': 'X'})
|
|
||||||
# Confirm Tasks which requires manual activities from Task List Run
|
|
||||||
for task in raw_params['ET_PARAMETER']:
|
|
||||||
call_rfc_method(conn, 'STC_TM_TASK_CONFIRM',
|
|
||||||
{'I_SESSION_ID': session_init['E_SESSION_ID'],
|
|
||||||
'I_TASKNAME': task['TASKNAME']})
|
|
||||||
if task_skip:
|
|
||||||
for task in raw_params['ET_PARAMETER']:
|
|
||||||
call_rfc_method(conn, 'STC_TM_TASK_SKIP',
|
|
||||||
{'I_SESSION_ID': session_init['E_SESSION_ID'],
|
|
||||||
'I_TASKNAME': task['TASKNAME'], 'I_SKIP_DEP_TASKS': 'X'})
|
|
||||||
# unskip defined tasks and set parameters
|
|
||||||
if task_parameters is not None:
|
|
||||||
for task in task_parameters:
|
|
||||||
call_rfc_method(conn, 'STC_TM_TASK_UNSKIP',
|
|
||||||
{'I_SESSION_ID': session_init['E_SESSION_ID'],
|
|
||||||
'I_TASKNAME': task['TASKNAME'], 'I_UNSKIP_DEP_TASKS': 'X'})
|
|
||||||
|
|
||||||
call_rfc_method(conn, 'STC_TM_SESSION_SET_PARAMETERS',
|
|
||||||
{'I_SESSION_ID': session_init['E_SESSION_ID'],
|
|
||||||
'IT_PARAMETER': task_parameters})
|
|
||||||
# start the task
|
|
||||||
try:
|
|
||||||
session_start = call_rfc_method(conn, 'STC_TM_SESSION_RESUME',
|
|
||||||
{'I_SESSION_ID': session_init['E_SESSION_ID'],
|
|
||||||
'IS_EXEC_SETTINGS': exec_settings})
|
|
||||||
except Exception as err:
|
|
||||||
result['error'] = str(err)
|
|
||||||
result['msg'] = 'Something went wrong. See error.'
|
|
||||||
module.fail_json(**result)
|
|
||||||
# get task logs because the execution may successfully but the tasks shows errors or warnings
|
|
||||||
# returned value is ABAPXML https://help.sap.com/doc/abapdocu_755_index_htm/7.55/en-US/abenabap_xslt_asxml_general.htm
|
|
||||||
session_log = call_rfc_method(conn, 'STC_TM_SESSION_GET_LOG',
|
|
||||||
{'I_SESSION_ID': session_init['E_SESSION_ID']})
|
|
||||||
|
|
||||||
task_list = xml_to_dict(session_log['E_LOG'])
|
|
||||||
|
|
||||||
result['changed'] = True
|
|
||||||
result['msg'] = session_start['E_STATUS_DESCR']
|
|
||||||
result['out'] = task_list
|
|
||||||
|
|
||||||
module.exit_json(**result)
|
|
||||||
|
|
||||||
|
|
||||||
def main():
|
|
||||||
run_module()
|
|
||||||
|
|
||||||
|
|
||||||
if __name__ == '__main__':
|
|
||||||
main()
|
|
|
@ -1,221 +0,0 @@
|
||||||
#!/usr/bin/python
|
|
||||||
# -*- coding: utf-8 -*-
|
|
||||||
|
|
||||||
# Copyright (c) 2021, Rainer Leber <rainerleber@gmail.com>
|
|
||||||
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
|
|
||||||
# SPDX-License-Identifier: GPL-3.0-or-later
|
|
||||||
from __future__ import (absolute_import, division, print_function)
|
|
||||||
__metaclass__ = type
|
|
||||||
|
|
||||||
DOCUMENTATION = '''
|
|
||||||
---
|
|
||||||
module: sapcar_extract
|
|
||||||
short_description: Manages SAP SAPCAR archives
|
|
||||||
version_added: "3.2.0"
|
|
||||||
description:
|
|
||||||
- Provides support for unpacking C(sar)/C(car) files with the SAPCAR binary from SAP and pulling
|
|
||||||
information back into Ansible.
|
|
||||||
options:
|
|
||||||
path:
|
|
||||||
description: The path to the SAR/CAR file.
|
|
||||||
type: path
|
|
||||||
required: true
|
|
||||||
dest:
|
|
||||||
description:
|
|
||||||
- The destination where SAPCAR extracts the SAR file. Missing folders will be created.
|
|
||||||
If this parameter is not provided it will unpack in the same folder as the SAR file.
|
|
||||||
type: path
|
|
||||||
binary_path:
|
|
||||||
description:
|
|
||||||
- The path to the SAPCAR binary, for example, C(/home/dummy/sapcar) or C(https://myserver/SAPCAR).
|
|
||||||
If this parameter is not provided the module will look in C(PATH).
|
|
||||||
type: path
|
|
||||||
signature:
|
|
||||||
description:
|
|
||||||
- If C(true) the signature will be extracted.
|
|
||||||
default: false
|
|
||||||
type: bool
|
|
||||||
security_library:
|
|
||||||
description:
|
|
||||||
- The path to the security library, for example, C(/usr/sap/hostctrl/exe/libsapcrytp.so), for signature operations.
|
|
||||||
type: path
|
|
||||||
manifest:
|
|
||||||
description:
|
|
||||||
- The name of the manifest.
|
|
||||||
default: "SIGNATURE.SMF"
|
|
||||||
type: str
|
|
||||||
remove:
|
|
||||||
description:
|
|
||||||
- If C(true) the SAR/CAR file will be removed. B(This should be used with caution!)
|
|
||||||
default: false
|
|
||||||
type: bool
|
|
||||||
author:
|
|
||||||
- Rainer Leber (@RainerLeber)
|
|
||||||
notes:
|
|
||||||
- Always returns C(changed=true) in C(check_mode).
|
|
||||||
'''
|
|
||||||
|
|
||||||
EXAMPLES = """
|
|
||||||
- name: Extract SAR file
|
|
||||||
community.general.sapcar_extract:
|
|
||||||
path: "~/source/hana.sar"
|
|
||||||
|
|
||||||
- name: Extract SAR file with destination
|
|
||||||
community.general.sapcar_extract:
|
|
||||||
path: "~/source/hana.sar"
|
|
||||||
dest: "~/test/"
|
|
||||||
|
|
||||||
- name: Extract SAR file with destination and download from webserver can be a fileshare as well
|
|
||||||
community.general.sapcar_extract:
|
|
||||||
path: "~/source/hana.sar"
|
|
||||||
dest: "~/dest/"
|
|
||||||
binary_path: "https://myserver/SAPCAR"
|
|
||||||
|
|
||||||
- name: Extract SAR file and delete SAR after extract
|
|
||||||
community.general.sapcar_extract:
|
|
||||||
path: "~/source/hana.sar"
|
|
||||||
remove: true
|
|
||||||
|
|
||||||
- name: Extract SAR file with manifest
|
|
||||||
community.general.sapcar_extract:
|
|
||||||
path: "~/source/hana.sar"
|
|
||||||
signature: true
|
|
||||||
|
|
||||||
- name: Extract SAR file with manifest and rename it
|
|
||||||
community.general.sapcar_extract:
|
|
||||||
path: "~/source/hana.sar"
|
|
||||||
manifest: "MyNewSignature.SMF"
|
|
||||||
signature: true
|
|
||||||
"""
|
|
||||||
|
|
||||||
import os
|
|
||||||
from tempfile import NamedTemporaryFile
|
|
||||||
from ansible.module_utils.basic import AnsibleModule
|
|
||||||
from ansible.module_utils.urls import open_url
|
|
||||||
from ansible.module_utils.common.text.converters import to_native
|
|
||||||
|
|
||||||
|
|
||||||
def get_list_of_files(dir_name):
|
|
||||||
# create a list of file and directories
|
|
||||||
# names in the given directory
|
|
||||||
list_of_file = os.listdir(dir_name)
|
|
||||||
allFiles = list()
|
|
||||||
# Iterate over all the entries
|
|
||||||
for entry in list_of_file:
|
|
||||||
# Create full path
|
|
||||||
fullPath = os.path.join(dir_name, entry)
|
|
||||||
# If entry is a directory then get the list of files in this directory
|
|
||||||
if os.path.isdir(fullPath):
|
|
||||||
allFiles = allFiles + [fullPath]
|
|
||||||
allFiles = allFiles + get_list_of_files(fullPath)
|
|
||||||
else:
|
|
||||||
allFiles.append(fullPath)
|
|
||||||
return allFiles
|
|
||||||
|
|
||||||
|
|
||||||
def download_SAPCAR(binary_path, module):
|
|
||||||
bin_path = None
|
|
||||||
# download sapcar binary if url is provided otherwise path is returned
|
|
||||||
if binary_path is not None:
|
|
||||||
if binary_path.startswith('https://') or binary_path.startswith('http://'):
|
|
||||||
random_file = NamedTemporaryFile(delete=False)
|
|
||||||
with open_url(binary_path) as response:
|
|
||||||
with random_file as out_file:
|
|
||||||
data = response.read()
|
|
||||||
out_file.write(data)
|
|
||||||
os.chmod(out_file.name, 0o700)
|
|
||||||
bin_path = out_file.name
|
|
||||||
module.add_cleanup_file(bin_path)
|
|
||||||
else:
|
|
||||||
bin_path = binary_path
|
|
||||||
return bin_path
|
|
||||||
|
|
||||||
|
|
||||||
def check_if_present(command, path, dest, signature, manifest, module):
|
|
||||||
# manipuliating output from SAR file for compare with already extracted files
|
|
||||||
iter_command = [command, '-tvf', path]
|
|
||||||
sar_out = module.run_command(iter_command)[1]
|
|
||||||
sar_raw = sar_out.split("\n")[1:]
|
|
||||||
if dest[-1] != "/":
|
|
||||||
dest = dest + "/"
|
|
||||||
sar_files = [dest + x.split(" ")[-1] for x in sar_raw if x]
|
|
||||||
# remove any SIGNATURE.SMF from list because it will not unpacked if signature is false
|
|
||||||
if not signature:
|
|
||||||
sar_files = [item for item in sar_files if '.SMF' not in item]
|
|
||||||
# if signature is renamed manipulate files in list of sar file for compare.
|
|
||||||
if manifest != "SIGNATURE.SMF":
|
|
||||||
sar_files = [item for item in sar_files if '.SMF' not in item]
|
|
||||||
sar_files = sar_files + [manifest]
|
|
||||||
# get extracted files if present
|
|
||||||
files_extracted = get_list_of_files(dest)
|
|
||||||
# compare extracted files with files in sar file
|
|
||||||
present = all(elem in files_extracted for elem in sar_files)
|
|
||||||
return present
|
|
||||||
|
|
||||||
|
|
||||||
def main():
|
|
||||||
module = AnsibleModule(
|
|
||||||
argument_spec=dict(
|
|
||||||
path=dict(type='path', required=True),
|
|
||||||
dest=dict(type='path'),
|
|
||||||
binary_path=dict(type='path'),
|
|
||||||
signature=dict(type='bool', default=False),
|
|
||||||
security_library=dict(type='path'),
|
|
||||||
manifest=dict(type='str', default="SIGNATURE.SMF"),
|
|
||||||
remove=dict(type='bool', default=False),
|
|
||||||
),
|
|
||||||
supports_check_mode=True,
|
|
||||||
)
|
|
||||||
rc, out, err = [0, "", ""]
|
|
||||||
params = module.params
|
|
||||||
check_mode = module.check_mode
|
|
||||||
|
|
||||||
path = params['path']
|
|
||||||
dest = params['dest']
|
|
||||||
signature = params['signature']
|
|
||||||
security_library = params['security_library']
|
|
||||||
manifest = params['manifest']
|
|
||||||
remove = params['remove']
|
|
||||||
|
|
||||||
bin_path = download_SAPCAR(params['binary_path'], module)
|
|
||||||
|
|
||||||
if dest is None:
|
|
||||||
dest_head_tail = os.path.split(path)
|
|
||||||
dest = dest_head_tail[0] + '/'
|
|
||||||
else:
|
|
||||||
if not os.path.exists(dest):
|
|
||||||
os.makedirs(dest, 0o755)
|
|
||||||
|
|
||||||
if bin_path is not None:
|
|
||||||
command = [module.get_bin_path(bin_path, required=True)]
|
|
||||||
else:
|
|
||||||
try:
|
|
||||||
command = [module.get_bin_path('sapcar', required=True)]
|
|
||||||
except Exception as e:
|
|
||||||
module.fail_json(msg='Failed to find SAPCAR at the expected path or URL "{0}". Please check whether it is available: {1}'
|
|
||||||
.format(bin_path, to_native(e)))
|
|
||||||
|
|
||||||
present = check_if_present(command[0], path, dest, signature, manifest, module)
|
|
||||||
|
|
||||||
if not present:
|
|
||||||
command.extend(['-xvf', path, '-R', dest])
|
|
||||||
if security_library:
|
|
||||||
command.extend(['-L', security_library])
|
|
||||||
if signature:
|
|
||||||
command.extend(['-manifest', manifest])
|
|
||||||
if not check_mode:
|
|
||||||
(rc, out, err) = module.run_command(command, check_rc=True)
|
|
||||||
changed = True
|
|
||||||
else:
|
|
||||||
changed = False
|
|
||||||
out = "already unpacked"
|
|
||||||
|
|
||||||
if remove:
|
|
||||||
os.remove(path)
|
|
||||||
|
|
||||||
module.exit_json(changed=changed, message=rc, stdout=out,
|
|
||||||
stderr=err, command=' '.join(command))
|
|
||||||
|
|
||||||
|
|
||||||
if __name__ == '__main__':
|
|
||||||
main()
|
|
|
@ -1,103 +0,0 @@
|
||||||
# -*- coding: utf-8 -*-
|
|
||||||
|
|
||||||
# Copyright (c) 2021, Rainer Leber (@rainerleber) <rainerleber@gmail.com>
|
|
||||||
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
|
|
||||||
# SPDX-License-Identifier: GPL-3.0-or-later
|
|
||||||
|
|
||||||
from __future__ import absolute_import, division, print_function
|
|
||||||
__metaclass__ = type
|
|
||||||
|
|
||||||
from ansible_collections.community.general.plugins.modules import hana_query
|
|
||||||
from ansible_collections.community.general.tests.unit.plugins.modules.utils import (
|
|
||||||
AnsibleExitJson,
|
|
||||||
AnsibleFailJson,
|
|
||||||
ModuleTestCase,
|
|
||||||
set_module_args,
|
|
||||||
)
|
|
||||||
from ansible_collections.community.general.tests.unit.compat.mock import patch
|
|
||||||
from ansible.module_utils import basic
|
|
||||||
|
|
||||||
|
|
||||||
def get_bin_path(*args, **kwargs):
|
|
||||||
"""Function to return path of hdbsql"""
|
|
||||||
return "/usr/sap/HDB/HDB01/exe/hdbsql"
|
|
||||||
|
|
||||||
|
|
||||||
class Testhana_query(ModuleTestCase):
|
|
||||||
"""Main class for testing hana_query module."""
|
|
||||||
|
|
||||||
def setUp(self):
|
|
||||||
"""Setup."""
|
|
||||||
super(Testhana_query, self).setUp()
|
|
||||||
self.module = hana_query
|
|
||||||
self.mock_get_bin_path = patch.object(basic.AnsibleModule, 'get_bin_path', get_bin_path)
|
|
||||||
self.mock_get_bin_path.start()
|
|
||||||
self.addCleanup(self.mock_get_bin_path.stop) # ensure that the patching is 'undone'
|
|
||||||
|
|
||||||
def tearDown(self):
|
|
||||||
"""Teardown."""
|
|
||||||
super(Testhana_query, self).tearDown()
|
|
||||||
|
|
||||||
def test_without_required_parameters(self):
|
|
||||||
"""Failure must occurs when all parameters are missing."""
|
|
||||||
with self.assertRaises(AnsibleFailJson):
|
|
||||||
set_module_args({})
|
|
||||||
self.module.main()
|
|
||||||
|
|
||||||
def test_hana_query(self):
|
|
||||||
"""Check that result is processed."""
|
|
||||||
set_module_args({
|
|
||||||
'sid': "HDB",
|
|
||||||
'instance': "01",
|
|
||||||
'encrypted': False,
|
|
||||||
'host': "localhost",
|
|
||||||
'user': "SYSTEM",
|
|
||||||
'password': "1234Qwer",
|
|
||||||
'database': "HDB",
|
|
||||||
'query': "SELECT * FROM users;"
|
|
||||||
})
|
|
||||||
with patch.object(basic.AnsibleModule, 'run_command') as run_command:
|
|
||||||
run_command.return_value = 0, 'username,name\n testuser,test user \n myuser, my user \n', ''
|
|
||||||
with self.assertRaises(AnsibleExitJson) as result:
|
|
||||||
hana_query.main()
|
|
||||||
self.assertEqual(result.exception.args[0]['query_result'], [[
|
|
||||||
{'username': 'testuser', 'name': 'test user'},
|
|
||||||
{'username': 'myuser', 'name': 'my user'},
|
|
||||||
]])
|
|
||||||
self.assertEqual(run_command.call_count, 1)
|
|
||||||
|
|
||||||
def test_hana_userstore_query(self):
|
|
||||||
"""Check that result is processed with userstore."""
|
|
||||||
set_module_args({
|
|
||||||
'sid': "HDB",
|
|
||||||
'instance': "01",
|
|
||||||
'encrypted': False,
|
|
||||||
'host': "localhost",
|
|
||||||
'user': "SYSTEM",
|
|
||||||
'userstore': True,
|
|
||||||
'database': "HDB",
|
|
||||||
'query': "SELECT * FROM users;"
|
|
||||||
})
|
|
||||||
with patch.object(basic.AnsibleModule, 'run_command') as run_command:
|
|
||||||
run_command.return_value = 0, 'username,name\n testuser,test user \n myuser, my user \n', ''
|
|
||||||
with self.assertRaises(AnsibleExitJson) as result:
|
|
||||||
hana_query.main()
|
|
||||||
self.assertEqual(result.exception.args[0]['query_result'], [[
|
|
||||||
{'username': 'testuser', 'name': 'test user'},
|
|
||||||
{'username': 'myuser', 'name': 'my user'},
|
|
||||||
]])
|
|
||||||
self.assertEqual(run_command.call_count, 1)
|
|
||||||
|
|
||||||
def test_hana_failed_no_passwd(self):
|
|
||||||
"""Check that result is failed with no password."""
|
|
||||||
with self.assertRaises(AnsibleFailJson):
|
|
||||||
set_module_args({
|
|
||||||
'sid': "HDB",
|
|
||||||
'instance': "01",
|
|
||||||
'encrypted': False,
|
|
||||||
'host': "localhost",
|
|
||||||
'user': "SYSTEM",
|
|
||||||
'database': "HDB",
|
|
||||||
'query': "SELECT * FROM users;"
|
|
||||||
})
|
|
||||||
self.module.main()
|
|
|
@ -1,91 +0,0 @@
|
||||||
# Copyright (c) Ansible project
|
|
||||||
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
|
|
||||||
# SPDX-License-Identifier: GPL-3.0-or-later
|
|
||||||
|
|
||||||
from __future__ import (absolute_import, division, print_function)
|
|
||||||
__metaclass__ = type
|
|
||||||
|
|
||||||
import sys
|
|
||||||
from ansible_collections.community.general.tests.unit.compat.mock import patch, MagicMock
|
|
||||||
from ansible_collections.community.general.tests.unit.plugins.modules.utils import AnsibleExitJson, AnsibleFailJson, ModuleTestCase, set_module_args
|
|
||||||
|
|
||||||
sys.modules['pyrfc'] = MagicMock()
|
|
||||||
sys.modules['pyrfc.Connection'] = MagicMock()
|
|
||||||
sys.modules['xmltodict'] = MagicMock()
|
|
||||||
sys.modules['xmltodict.parse'] = MagicMock()
|
|
||||||
|
|
||||||
from ansible_collections.community.general.plugins.modules import sap_task_list_execute
|
|
||||||
|
|
||||||
|
|
||||||
class TestSAPRfcModule(ModuleTestCase):
|
|
||||||
|
|
||||||
def setUp(self):
|
|
||||||
super(TestSAPRfcModule, self).setUp()
|
|
||||||
self.module = sap_task_list_execute
|
|
||||||
|
|
||||||
def tearDown(self):
|
|
||||||
super(TestSAPRfcModule, self).tearDown()
|
|
||||||
|
|
||||||
def define_rfc_connect(self, mocker):
|
|
||||||
return mocker.patch(self.module.call_rfc_method)
|
|
||||||
|
|
||||||
def test_without_required_parameters(self):
|
|
||||||
"""Failure must occurs when all parameters are missing"""
|
|
||||||
with self.assertRaises(AnsibleFailJson):
|
|
||||||
set_module_args({})
|
|
||||||
self.module.main()
|
|
||||||
|
|
||||||
def test_error_no_task_list(self):
|
|
||||||
"""tests fail to exec task list"""
|
|
||||||
|
|
||||||
set_module_args({
|
|
||||||
"conn_username": "DDIC",
|
|
||||||
"conn_password": "Test1234",
|
|
||||||
"host": "10.1.8.9",
|
|
||||||
"task_to_execute": "SAP_BASIS_SSL_CHECK"
|
|
||||||
})
|
|
||||||
|
|
||||||
with patch.object(self.module, 'Connection') as conn:
|
|
||||||
conn.return_value = ''
|
|
||||||
with self.assertRaises(AnsibleFailJson) as result:
|
|
||||||
self.module.main()
|
|
||||||
self.assertEqual(result.exception.args[0]['msg'], 'The task list does not exsist.')
|
|
||||||
|
|
||||||
def test_success(self):
|
|
||||||
"""test execute task list success"""
|
|
||||||
|
|
||||||
set_module_args({
|
|
||||||
"conn_username": "DDIC",
|
|
||||||
"conn_password": "Test1234",
|
|
||||||
"host": "10.1.8.9",
|
|
||||||
"task_to_execute": "SAP_BASIS_SSL_CHECK"
|
|
||||||
})
|
|
||||||
with patch.object(self.module, 'xml_to_dict') as XML:
|
|
||||||
XML.return_value = {'item': [{'TASK': {'CHECK_STATUS_DESCR': 'Check successfully',
|
|
||||||
'STATUS_DESCR': 'Executed successfully', 'TASKNAME': 'CL_STCT_CHECK_SEC_CRYPTO',
|
|
||||||
'LNR': '1', 'DESCRIPTION': 'Check SAP Cryptographic Library', 'DOCU_EXIST': 'X',
|
|
||||||
'LOG_EXIST': 'X', 'ACTION_SKIP': None, 'ACTION_UNSKIP': None, 'ACTION_CONFIRM': None,
|
|
||||||
'ACTION_MAINTAIN': None}}]}
|
|
||||||
|
|
||||||
with self.assertRaises(AnsibleExitJson) as result:
|
|
||||||
sap_task_list_execute.main()
|
|
||||||
self.assertEqual(result.exception.args[0]['out'], {'item': [{'TASK': {'CHECK_STATUS_DESCR': 'Check successfully',
|
|
||||||
'STATUS_DESCR': 'Executed successfully', 'TASKNAME': 'CL_STCT_CHECK_SEC_CRYPTO',
|
|
||||||
'LNR': '1', 'DESCRIPTION': 'Check SAP Cryptographic Library', 'DOCU_EXIST': 'X',
|
|
||||||
'LOG_EXIST': 'X', 'ACTION_SKIP': None, 'ACTION_UNSKIP': None,
|
|
||||||
'ACTION_CONFIRM': None, 'ACTION_MAINTAIN': None}}]})
|
|
||||||
|
|
||||||
def test_success_no_log(self):
|
|
||||||
"""test execute task list success without logs"""
|
|
||||||
|
|
||||||
set_module_args({
|
|
||||||
"conn_username": "DDIC",
|
|
||||||
"conn_password": "Test1234",
|
|
||||||
"host": "10.1.8.9",
|
|
||||||
"task_to_execute": "SAP_BASIS_SSL_CHECK"
|
|
||||||
})
|
|
||||||
with patch.object(self.module, 'xml_to_dict') as XML:
|
|
||||||
XML.return_value = "No logs available."
|
|
||||||
with self.assertRaises(AnsibleExitJson) as result:
|
|
||||||
sap_task_list_execute.main()
|
|
||||||
self.assertEqual(result.exception.args[0]['out'], 'No logs available.')
|
|
|
@ -1,54 +0,0 @@
|
||||||
# -*- coding: utf-8 -*-
|
|
||||||
|
|
||||||
# Copyright (c) 2021, Rainer Leber (@rainerleber) <rainerleber@gmail.com>
|
|
||||||
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
|
|
||||||
# SPDX-License-Identifier: GPL-3.0-or-later
|
|
||||||
|
|
||||||
from __future__ import absolute_import, division, print_function
|
|
||||||
__metaclass__ = type
|
|
||||||
|
|
||||||
from ansible_collections.community.general.plugins.modules import sapcar_extract
|
|
||||||
from ansible_collections.community.general.tests.unit.plugins.modules.utils import AnsibleExitJson, AnsibleFailJson, ModuleTestCase, set_module_args
|
|
||||||
from ansible_collections.community.general.tests.unit.compat.mock import patch
|
|
||||||
from ansible.module_utils import basic
|
|
||||||
|
|
||||||
|
|
||||||
def get_bin_path(*args, **kwargs):
|
|
||||||
"""Function to return path of SAPCAR"""
|
|
||||||
return "/tmp/sapcar"
|
|
||||||
|
|
||||||
|
|
||||||
class Testsapcar_extract(ModuleTestCase):
|
|
||||||
"""Main class for testing sapcar_extract module."""
|
|
||||||
|
|
||||||
def setUp(self):
|
|
||||||
"""Setup."""
|
|
||||||
super(Testsapcar_extract, self).setUp()
|
|
||||||
self.module = sapcar_extract
|
|
||||||
self.mock_get_bin_path = patch.object(basic.AnsibleModule, 'get_bin_path', get_bin_path)
|
|
||||||
self.mock_get_bin_path.start()
|
|
||||||
self.addCleanup(self.mock_get_bin_path.stop) # ensure that the patching is 'undone'
|
|
||||||
|
|
||||||
def tearDown(self):
|
|
||||||
"""Teardown."""
|
|
||||||
super(Testsapcar_extract, self).tearDown()
|
|
||||||
|
|
||||||
def test_without_required_parameters(self):
|
|
||||||
"""Failure must occurs when all parameters are missing."""
|
|
||||||
with self.assertRaises(AnsibleFailJson):
|
|
||||||
set_module_args({})
|
|
||||||
self.module.main()
|
|
||||||
|
|
||||||
def test_sapcar_extract(self):
|
|
||||||
"""Check that result is changed."""
|
|
||||||
set_module_args({
|
|
||||||
'path': "/tmp/HANA_CLIENT_REV2_00_053_00_LINUX_X86_64.SAR",
|
|
||||||
'dest': "/tmp/test2",
|
|
||||||
'binary_path': "/tmp/sapcar"
|
|
||||||
})
|
|
||||||
with patch.object(basic.AnsibleModule, 'run_command') as run_command:
|
|
||||||
run_command.return_value = 0, '', '' # successful execution, no output
|
|
||||||
with self.assertRaises(AnsibleExitJson) as result:
|
|
||||||
sapcar_extract.main()
|
|
||||||
self.assertTrue(result.exception.args[0]['changed'])
|
|
||||||
self.assertEqual(run_command.call_count, 1)
|
|
Loading…
Reference in a new issue