mirror of
https://github.com/ansible-collections/community.general.git
synced 2024-09-14 20:13:21 +02:00
Fortios file only mode + integration tests (#23275)
* WIP file_mode * WIP * Add file_mode + integration tests * fix pep8 * Update doc fragments Create mutualy_exclusive param Fix yamllint problem in tests * Add aliases file + main playbook for fortios * Install pyfg before running tests * Install pyfg before running tests in role * Remove pre_task as it's done in roles * Force pyFG minimal version for python3 * role_path not role_dir :( * Change requirements * Specify Error type when error on import * Bug in pygf library with python 2.5 (PR is waiting https://github.com/spotify/pyfg/pull/19) * Bad requirement format * still bad format -_-' * remove test/integration/fortios.py (auto generated by tests) missing new lines at end of file * pyFG is now fixed in 0.50
This commit is contained in:
parent
e342b281d8
commit
e99815e9f5
8 changed files with 3368 additions and 42 deletions
|
@ -38,13 +38,15 @@ try:
|
|||
from pyFG import FortiOS, FortiConfig
|
||||
from pyFG.exceptions import CommandExecutionException, FailedCommit
|
||||
HAS_PYFG=True
|
||||
except:
|
||||
except ImportError:
|
||||
HAS_PYFG=False
|
||||
|
||||
fortios_argument_spec = dict(
|
||||
host = dict(required=True ),
|
||||
username = dict(required=True ),
|
||||
password = dict(required=True, type='str', no_log=True ),
|
||||
file_mode = dict(type='bool', default=False),
|
||||
config_file = dict(type='path'),
|
||||
host = dict( ),
|
||||
username = dict( ),
|
||||
password = dict(type='str', no_log=True ),
|
||||
timeout = dict(type='int', default=60),
|
||||
vdom = dict(type='str', default=None ),
|
||||
backup = dict(type='bool', default=False),
|
||||
|
@ -53,9 +55,16 @@ fortios_argument_spec = dict(
|
|||
)
|
||||
|
||||
fortios_required_if = [
|
||||
['file_mode', False, ['host', 'username', 'password']],
|
||||
['file_mode', True, ['config_file']],
|
||||
['backup', True , ['backup_path'] ],
|
||||
]
|
||||
|
||||
fortios_mutually_exclusive = [
|
||||
['config_file', 'host'],
|
||||
['config_file', 'username'],
|
||||
['config_file', 'password']
|
||||
]
|
||||
|
||||
fortios_error_codes = {
|
||||
'-3':"Object not found",
|
||||
|
@ -96,6 +105,9 @@ class AnsibleFortios(object):
|
|||
|
||||
|
||||
def _connect(self):
|
||||
if self.module.params['file_mode']:
|
||||
self.forti_device = FortiOS('')
|
||||
else:
|
||||
host = self.module.params['host']
|
||||
username = self.module.params['username']
|
||||
password = self.module.params['password']
|
||||
|
@ -112,22 +124,35 @@ class AnsibleFortios(object):
|
|||
|
||||
|
||||
def load_config(self, path):
|
||||
self._connect()
|
||||
self.path = path
|
||||
self._connect()
|
||||
#load in file_mode
|
||||
if self.module.params['file_mode']:
|
||||
try:
|
||||
f = open(self.module.params['config_file'], 'r')
|
||||
running = f.read()
|
||||
f.close()
|
||||
except IOError:
|
||||
e = get_exception()
|
||||
self.module.fail_json(msg='Error reading configuration file. %s' % e)
|
||||
self.forti_device.load_config(config_text=running, path = path)
|
||||
|
||||
else:
|
||||
#get config
|
||||
try:
|
||||
self.forti_device.load_config(path=path)
|
||||
self.result['running_config'] = self.forti_device.running_config.to_text()
|
||||
except Exception:
|
||||
self.forti_device.close()
|
||||
e = get_exception()
|
||||
self.module.fail_json(msg='Error reading running config. %s' % e)
|
||||
|
||||
#set configs in object
|
||||
self.result['running_config'] = self.forti_device.running_config.to_text()
|
||||
self.candidate_config = self.forti_device.candidate_config
|
||||
|
||||
#backup if needed
|
||||
if self.module.params['backup']:
|
||||
backup(self.module, self.result['running_config'])
|
||||
|
||||
self.candidate_config = self.forti_device.candidate_config
|
||||
backup(self.module, self.forti_device.running_config.to_text())
|
||||
|
||||
|
||||
def apply_changes(self):
|
||||
|
@ -138,6 +163,15 @@ class AnsibleFortios(object):
|
|||
|
||||
#Commit if not check mode
|
||||
if change_string and not self.module.check_mode:
|
||||
if self.module.params['file_mode']:
|
||||
try:
|
||||
f = open(self.module.params['config_file'], 'w')
|
||||
f.write(self.candidate_config.to_text())
|
||||
f.close
|
||||
except IOError:
|
||||
e = get_exception()
|
||||
self.module.fail_json(msg='Error writing configuration file. %s' % e)
|
||||
else:
|
||||
try:
|
||||
self.forti_device.commit()
|
||||
except FailedCommit:
|
||||
|
|
|
@ -23,18 +23,25 @@ class ModuleDocFragment(object):
|
|||
# Standard files documentation fragment
|
||||
DOCUMENTATION = """
|
||||
options:
|
||||
file_mode:
|
||||
description:
|
||||
- Don't connect to any device, only use I(config_file) as input and Output.
|
||||
default: false
|
||||
type: bool
|
||||
version_added: "2.4"
|
||||
config_file:
|
||||
description:
|
||||
- Path to configuration file. Required when I(file_mode) is True.
|
||||
version_added: "2.4"
|
||||
host:
|
||||
description:
|
||||
- Specifies the DNS hostname or IP address for connecting to the remote fortios device.
|
||||
required: true
|
||||
- Specifies the DNS hostname or IP address for connecting to the remote fortios device. Required when I(file_mode) is False.
|
||||
username:
|
||||
description:
|
||||
- Configures the username used to authenticate to the remote device.
|
||||
required: true
|
||||
- Configures the username used to authenticate to the remote device. Required when I(file_mode) is True.
|
||||
password:
|
||||
description:
|
||||
- Specifies the password used to authenticate to the remote device.
|
||||
required: true
|
||||
- Specifies the password used to authenticate to the remote device. Required when I(file_mode) is True.
|
||||
timeout:
|
||||
description:
|
||||
- Timeout in seconds for connecting to the remote device.
|
||||
|
|
1
test/integration/targets/fortios_ipv4_policy/aliases
Normal file
1
test/integration/targets/fortios_ipv4_policy/aliases
Normal file
|
@ -0,0 +1 @@
|
|||
posix/ci/group1
|
File diff suppressed because it is too large
Load diff
|
@ -0,0 +1 @@
|
|||
pyfg>=0.50
|
|
@ -0,0 +1,7 @@
|
|||
---
|
||||
- name: install required libraries
|
||||
pip:
|
||||
requirements: "{{ role_path }}/files/requirements.txt"
|
||||
|
||||
- { include: test_indempotency.yml }
|
||||
- { include: test_params.yml }
|
|
@ -0,0 +1,68 @@
|
|||
---
|
||||
- name: Add policy
|
||||
fortios_ipv4_policy:
|
||||
file_mode: true
|
||||
config_file: "{{role_path}}/files/default_config.conf"
|
||||
id: 42
|
||||
src_addr: all
|
||||
dst_addr: all
|
||||
policy_action: accept
|
||||
service: ALL
|
||||
state: present
|
||||
register: add_policy
|
||||
|
||||
- name: Assert
|
||||
assert:
|
||||
that:
|
||||
- "add_policy.changed == true"
|
||||
|
||||
- name: Add existing policy
|
||||
fortios_ipv4_policy:
|
||||
file_mode: true
|
||||
config_file: "{{role_path}}/files/default_config.conf"
|
||||
id: 42
|
||||
src_addr: all
|
||||
dst_addr: all
|
||||
policy_action: accept
|
||||
service: ALL
|
||||
state: present
|
||||
register: add_policy
|
||||
|
||||
- name: Assert
|
||||
assert:
|
||||
that:
|
||||
- "add_policy.changed == false"
|
||||
|
||||
- name: Delete existing policy
|
||||
fortios_ipv4_policy:
|
||||
file_mode: true
|
||||
config_file: "{{role_path}}/files/default_config.conf"
|
||||
id: 42
|
||||
src_addr: all
|
||||
dst_addr: all
|
||||
policy_action: accept
|
||||
service: ALL
|
||||
state: absent
|
||||
register: del_policy
|
||||
|
||||
- name: Assert
|
||||
assert:
|
||||
that:
|
||||
- "del_policy.changed == true"
|
||||
|
||||
- name: Delete not-existing policy
|
||||
fortios_ipv4_policy:
|
||||
file_mode: true
|
||||
config_file: "{{role_path}}/files/default_config.conf"
|
||||
id: 42
|
||||
src_addr: all
|
||||
dst_addr: all
|
||||
policy_action: accept
|
||||
service: ALL
|
||||
state: absent
|
||||
register: del_policy
|
||||
|
||||
- name: Assert
|
||||
assert:
|
||||
that:
|
||||
- "del_policy.changed == false"
|
|
@ -0,0 +1,74 @@
|
|||
---
|
||||
- name: Forget id
|
||||
fortios_ipv4_policy:
|
||||
file_mode: true
|
||||
config_file: "{{role_path}}/files/default_config.conf"
|
||||
# id: 42
|
||||
src_addr: all
|
||||
dst_addr: all
|
||||
policy_action: accept
|
||||
service: ALL
|
||||
state: present
|
||||
register: forget_id
|
||||
ignore_errors: True
|
||||
|
||||
- name: Forget src_addr
|
||||
fortios_ipv4_policy:
|
||||
file_mode: true
|
||||
config_file: "{{role_path}}/files/default_config.conf"
|
||||
id: 42
|
||||
# src_addr: all
|
||||
dst_addr: all
|
||||
policy_action: accept
|
||||
service: ALL
|
||||
state: present
|
||||
register: forget_src_addr
|
||||
ignore_errors: True
|
||||
|
||||
- name: Forget dst_addr
|
||||
fortios_ipv4_policy:
|
||||
file_mode: true
|
||||
config_file: "{{role_path}}/files/default_config.conf"
|
||||
id: 42
|
||||
src_addr: all
|
||||
# dst_addr: all
|
||||
policy_action: accept
|
||||
service: ALL
|
||||
state: present
|
||||
register: forget_dst_addr
|
||||
ignore_errors: True
|
||||
|
||||
- name: Forget policy_action
|
||||
fortios_ipv4_policy:
|
||||
file_mode: true
|
||||
config_file: "{{role_path}}/files/default_config.conf"
|
||||
id: 42
|
||||
src_addr: all
|
||||
dst_addr: all
|
||||
# policy_action: accept
|
||||
service: ALL
|
||||
state: present
|
||||
register: forget_policy_action
|
||||
ignore_errors: True
|
||||
|
||||
- name: Forget service
|
||||
fortios_ipv4_policy:
|
||||
file_mode: true
|
||||
config_file: "{{role_path}}/files/default_config.conf"
|
||||
id: 42
|
||||
src_addr: all
|
||||
dst_addr: all
|
||||
policy_action: accept
|
||||
# service: ALL
|
||||
state: present
|
||||
register: forget_service
|
||||
ignore_errors: True
|
||||
|
||||
- name: Verify that all previous test have failed
|
||||
assert:
|
||||
that:
|
||||
- "forget_id.failed == True"
|
||||
- "forget_src_addr.failed == True"
|
||||
- "forget_dst_addr.failed == True"
|
||||
- "forget_policy_action.failed == True"
|
||||
- "forget_service.failed == True"
|
Loading…
Reference in a new issue