mirror of
https://github.com/ansible-collections/community.general.git
synced 2024-09-14 20:13:21 +02:00
4fe08441be
* Warn on tests used as filters * Update docs, add aliases for tests that fit more gramatically with test syntax * Fix rst formatting * Add successful filter, alias of success * Remove renamed_deprecation, it was overkill * Make directory alias for is_dir * Update tests to use proper jinja test syntax * Update additional documentation, living outside of YAML files, to reflect proper jinja test syntax * Add conversion script, porting guide updates, and changelog updates * Update newly added uses of tests as filters * No underscore variable * Convert recent tests as filter changes to win_stat * Fix some changes related to rebasing a few integration tests * Make tests_as_filters_warning explicitly accept the name of the test, instead of inferring the name * Add test for tests_as_filters_warning * Update tests as filters in newly added/modified tests * Address recent changes to several integration tests * Address recent changes in cs_vpc
172 lines
5.5 KiB
YAML
172 lines
5.5 KiB
YAML
######################
|
|
### check mode add ###
|
|
######################
|
|
- name: check mode ADD audit policy directory
|
|
win_audit_rule:
|
|
path: "{{ test_audit_rule_folder }}"
|
|
user: "{{ test_audit_rule_user }}"
|
|
rights: "{{ test_audit_rule_rights }}"
|
|
state: present
|
|
audit_flags: "{{ test_audit_rule_audit_flags }}"
|
|
register: directory
|
|
check_mode: yes
|
|
|
|
- name: check mode ADD audit policy file
|
|
win_audit_rule:
|
|
path: "{{ test_audit_rule_file }}"
|
|
user: "{{ test_audit_rule_user }}"
|
|
rights: "{{ test_audit_rule_rights }}"
|
|
state: present
|
|
audit_flags: "{{ test_audit_rule_audit_flags }}"
|
|
inheritance_flags: none
|
|
register: file
|
|
check_mode: yes
|
|
|
|
- name: check mode ADD audit policy registry
|
|
win_audit_rule:
|
|
path: "{{ test_audit_rule_registry }}"
|
|
user: "{{ test_audit_rule_user }}"
|
|
rights: "{{ test_audit_rule_rights }}"
|
|
state: present
|
|
audit_flags: "{{ test_audit_rule_audit_flags }}"
|
|
register: registry
|
|
check_mode: yes
|
|
|
|
- name: check mode ADD get directory results
|
|
test_get_audit_rule:
|
|
path: "{{ test_audit_rule_folder }}"
|
|
user: "{{ test_audit_rule_user }}"
|
|
rights: "{{ test_audit_rule_rights }}"
|
|
audit_flags: "{{ test_audit_rule_audit_flags }}"
|
|
register: directory_results
|
|
|
|
- name: check mode ADD get file results
|
|
test_get_audit_rule:
|
|
path: "{{ test_audit_rule_file }}"
|
|
user: "{{ test_audit_rule_user }}"
|
|
rights: "{{ test_audit_rule_rights }}"
|
|
audit_flags: "{{ test_audit_rule_audit_flags }}"
|
|
inheritance_flags: none
|
|
register: file_results
|
|
|
|
- name: check mode ADD get REGISTRY results
|
|
test_get_audit_rule:
|
|
path: "{{ test_audit_rule_registry }}"
|
|
user: "{{ test_audit_rule_user }}"
|
|
rights: "{{ test_audit_rule_rights }}"
|
|
audit_flags: "{{ test_audit_rule_audit_flags }}"
|
|
register: registry_results
|
|
|
|
- name: check mode ADD assert that a change is needed, but no change occurred to the audit rules
|
|
assert:
|
|
that:
|
|
- directory is changed
|
|
- file is changed
|
|
- registry is changed
|
|
- not directory_results.matching_rule_found and directory_results.path_type == 'directory'
|
|
- not file_results.matching_rule_found and file_results.path_type == 'file'
|
|
- not registry_results.matching_rule_found and registry_results.path_type == 'registry'
|
|
|
|
##################
|
|
### add a rule ###
|
|
##################
|
|
- name: ADD audit policy directory
|
|
win_audit_rule:
|
|
path: "{{ test_audit_rule_folder }}"
|
|
user: "{{ test_audit_rule_user }}"
|
|
rights: "{{ test_audit_rule_rights }}"
|
|
state: present
|
|
audit_flags: "{{ test_audit_rule_audit_flags }}"
|
|
register: directory
|
|
|
|
- name: ADD audit policy file
|
|
win_audit_rule:
|
|
path: "{{ test_audit_rule_file }}"
|
|
user: "{{ test_audit_rule_user }}"
|
|
rights: "{{ test_audit_rule_rights }}"
|
|
state: present
|
|
audit_flags: "{{ test_audit_rule_audit_flags }}"
|
|
inheritance_flags: none
|
|
register: file
|
|
|
|
- name: ADD audit policy registry
|
|
win_audit_rule:
|
|
path: "{{ test_audit_rule_registry }}"
|
|
user: "{{ test_audit_rule_user }}"
|
|
rights: "{{ test_audit_rule_rights }}"
|
|
state: present
|
|
audit_flags: "{{ test_audit_rule_audit_flags }}"
|
|
register: registry
|
|
|
|
- name: ADD get directory results
|
|
test_get_audit_rule:
|
|
path: "{{ test_audit_rule_folder }}"
|
|
user: "{{ test_audit_rule_user }}"
|
|
rights: "{{ test_audit_rule_rights }}"
|
|
audit_flags: "{{ test_audit_rule_audit_flags }}"
|
|
register: directory_results
|
|
|
|
- name: ADD get file results
|
|
test_get_audit_rule:
|
|
path: "{{ test_audit_rule_file }}"
|
|
user: "{{ test_audit_rule_user }}"
|
|
rights: "{{ test_audit_rule_rights }}"
|
|
audit_flags: "{{ test_audit_rule_audit_flags }}"
|
|
inheritance_flags: none
|
|
register: file_results
|
|
|
|
- name: ADD get REGISTRY results
|
|
test_get_audit_rule:
|
|
path: "{{ test_audit_rule_registry }}"
|
|
user: "{{ test_audit_rule_user }}"
|
|
rights: "{{ test_audit_rule_rights }}"
|
|
audit_flags: "{{ test_audit_rule_audit_flags }}"
|
|
register: registry_results
|
|
|
|
- name: ADD assert that the rules were added and a change is detected
|
|
assert:
|
|
that:
|
|
- directory is changed
|
|
- file is changed
|
|
- registry is changed
|
|
- directory_results.matching_rule_found and directory_results.path_type == 'directory'
|
|
- file_results.matching_rule_found and file_results.path_type == 'file'
|
|
- registry_results.matching_rule_found and registry_results.path_type == 'registry'
|
|
|
|
#############################
|
|
### idempotent add a rule ###
|
|
#############################
|
|
- name: idempotent ADD audit policy directory
|
|
win_audit_rule:
|
|
path: "{{ test_audit_rule_folder }}"
|
|
user: "{{ test_audit_rule_user }}"
|
|
rights: "{{ test_audit_rule_rights }}"
|
|
state: present
|
|
audit_flags: "{{ test_audit_rule_audit_flags }}"
|
|
register: directory
|
|
|
|
- name: idempotent ADD audit policy file
|
|
win_audit_rule:
|
|
path: "{{ test_audit_rule_file }}"
|
|
user: "{{ test_audit_rule_user }}"
|
|
rights: "{{ test_audit_rule_rights }}"
|
|
state: present
|
|
audit_flags: "{{ test_audit_rule_audit_flags }}"
|
|
inheritance_flags: none
|
|
register: file
|
|
|
|
- name: idempotent ADD audit policy registry idempotent
|
|
win_audit_rule:
|
|
path: "{{ test_audit_rule_registry }}"
|
|
user: "{{ test_audit_rule_user }}"
|
|
rights: "{{ test_audit_rule_rights }}"
|
|
state: present
|
|
audit_flags: "{{ test_audit_rule_audit_flags }}"
|
|
register: registry
|
|
|
|
- name: idempotent ADD assert that a change did not occur
|
|
assert:
|
|
that:
|
|
- directory is not changed and directory.path_type == 'directory'
|
|
- file is not changed and file.path_type == 'file'
|
|
- registry is not changed and registry.path_type == 'registry'
|