mirror of
https://github.com/ansible-collections/community.general.git
synced 2024-09-14 20:13:21 +02:00
f297229b52
* Add arg and doc validation for PowerShell modules * Verify if pwsh exists before running it
181 lines
5.5 KiB
Python
181 lines
5.5 KiB
Python
# -*- coding: utf-8 -*-
|
|
#
|
|
# Copyright (C) 2015 Matt Martz <matt@sivel.net>
|
|
# Copyright (C) 2015 Rackspace US, Inc.
|
|
#
|
|
# This program is free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
import ast
|
|
import os
|
|
import sys
|
|
|
|
from io import BytesIO, TextIOWrapper
|
|
|
|
import yaml
|
|
import yaml.reader
|
|
|
|
from ansible.module_utils._text import to_text
|
|
from ansible.module_utils.basic import AnsibleModule
|
|
|
|
|
|
class AnsibleTextIOWrapper(TextIOWrapper):
|
|
def write(self, s):
|
|
super(AnsibleTextIOWrapper, self).write(to_text(s, self.encoding, errors='replace'))
|
|
|
|
|
|
def find_executable(executable, cwd=None, path=None):
|
|
"""Finds the full path to the executable specified"""
|
|
# This is mostly a copy from test/runner/lib/util.py. Should be removed once validate-modules has been integrated
|
|
# into ansible-test
|
|
match = None
|
|
real_cwd = os.getcwd()
|
|
|
|
if not cwd:
|
|
cwd = real_cwd
|
|
|
|
if os.path.dirname(executable):
|
|
target = os.path.join(cwd, executable)
|
|
if os.path.exists(target) and os.access(target, os.F_OK | os.X_OK):
|
|
match = executable
|
|
else:
|
|
path = os.environ.get('PATH', os.path.defpath)
|
|
|
|
path_dirs = path.split(os.path.pathsep)
|
|
seen_dirs = set()
|
|
|
|
for path_dir in path_dirs:
|
|
if path_dir in seen_dirs:
|
|
continue
|
|
|
|
seen_dirs.add(path_dir)
|
|
|
|
if os.path.abspath(path_dir) == real_cwd:
|
|
path_dir = cwd
|
|
|
|
candidate = os.path.join(path_dir, executable)
|
|
|
|
if os.path.exists(candidate) and os.access(candidate, os.F_OK | os.X_OK):
|
|
match = candidate
|
|
break
|
|
|
|
return match
|
|
|
|
|
|
def find_globals(g, tree):
|
|
"""Uses AST to find globals in an ast tree"""
|
|
for child in tree:
|
|
if hasattr(child, 'body') and isinstance(child.body, list):
|
|
find_globals(g, child.body)
|
|
elif isinstance(child, (ast.FunctionDef, ast.ClassDef)):
|
|
g.add(child.name)
|
|
continue
|
|
elif isinstance(child, ast.Assign):
|
|
try:
|
|
g.add(child.targets[0].id)
|
|
except (IndexError, AttributeError):
|
|
pass
|
|
elif isinstance(child, ast.Import):
|
|
g.add(child.names[0].name)
|
|
elif isinstance(child, ast.ImportFrom):
|
|
for name in child.names:
|
|
g_name = name.asname or name.name
|
|
if g_name == '*':
|
|
continue
|
|
g.add(g_name)
|
|
|
|
|
|
class CaptureStd():
|
|
"""Context manager to handle capturing stderr and stdout"""
|
|
|
|
def __enter__(self):
|
|
self.sys_stdout = sys.stdout
|
|
self.sys_stderr = sys.stderr
|
|
sys.stdout = self.stdout = AnsibleTextIOWrapper(BytesIO(), encoding=self.sys_stdout.encoding)
|
|
sys.stderr = self.stderr = AnsibleTextIOWrapper(BytesIO(), encoding=self.sys_stderr.encoding)
|
|
return self
|
|
|
|
def __exit__(self, exc_type, exc_value, traceback):
|
|
sys.stdout = self.sys_stdout
|
|
sys.stderr = self.sys_stderr
|
|
|
|
def get(self):
|
|
"""Return ``(stdout, stderr)``"""
|
|
|
|
return self.stdout.buffer.getvalue(), self.stderr.buffer.getvalue()
|
|
|
|
|
|
def parse_yaml(value, lineno, module, name, load_all=False):
|
|
traces = []
|
|
errors = []
|
|
data = None
|
|
|
|
if load_all:
|
|
loader = yaml.safe_load_all
|
|
else:
|
|
loader = yaml.safe_load
|
|
|
|
try:
|
|
data = loader(value)
|
|
if load_all:
|
|
data = list(data)
|
|
except yaml.MarkedYAMLError as e:
|
|
e.problem_mark.line += lineno - 1
|
|
e.problem_mark.name = '%s.%s' % (module, name)
|
|
errors.append({
|
|
'msg': '%s is not valid YAML' % name,
|
|
'line': e.problem_mark.line + 1,
|
|
'column': e.problem_mark.column + 1
|
|
})
|
|
traces.append(e)
|
|
except yaml.reader.ReaderError as e:
|
|
traces.append(e)
|
|
# TODO: Better line/column detection
|
|
errors.append({
|
|
'msg': ('%s is not valid YAML. Character '
|
|
'0x%x at position %d.' % (name, e.character, e.position)),
|
|
'line': lineno
|
|
})
|
|
except yaml.YAMLError as e:
|
|
traces.append(e)
|
|
errors.append({
|
|
'msg': '%s is not valid YAML: %s: %s' % (name, type(e), e),
|
|
'line': lineno
|
|
})
|
|
|
|
return data, errors, traces
|
|
|
|
|
|
def is_empty(value):
|
|
"""Evaluate null like values excluding False"""
|
|
if value is False:
|
|
return False
|
|
return not bool(value)
|
|
|
|
|
|
def compare_unordered_lists(a, b):
|
|
"""Safe list comparisons
|
|
|
|
Supports:
|
|
- unordered lists
|
|
- unhashable elements
|
|
"""
|
|
return len(a) == len(b) and all(x in b for x in a)
|
|
|
|
|
|
class NoArgsAnsibleModule(AnsibleModule):
|
|
"""AnsibleModule that does not actually load params. This is used to get access to the
|
|
methods within AnsibleModule without having to fake a bunch of data
|
|
"""
|
|
def _load_params(self):
|
|
self.params = {'_ansible_selinux_special_fs': [], '_ansible_remote_tmp': '/tmp', '_ansible_keep_remote_files': False, '_ansible_check_mode': False}
|