mirror of
https://github.com/ansible-collections/community.general.git
synced 2024-09-14 20:13:21 +02:00
acb26758ef
The new detection includes things like provider spec. The action plugin for bigip generally was changed, so this is a required change
183 lines
5.7 KiB
Python
183 lines
5.7 KiB
Python
# -*- coding: utf-8 -*-
|
|
#
|
|
# Copyright (c) 2017 F5 Networks Inc.
|
|
# GNU General Public License v3.0 (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
|
|
|
|
from __future__ import (absolute_import, division, print_function)
|
|
__metaclass__ = type
|
|
|
|
import os
|
|
import json
|
|
import sys
|
|
|
|
from nose.plugins.skip import SkipTest
|
|
if sys.version_info < (2, 7):
|
|
raise SkipTest("F5 Ansible modules require Python >= 2.7")
|
|
|
|
from ansible.compat.tests import unittest
|
|
from ansible.compat.tests.mock import patch
|
|
from ansible.compat.tests.mock import Mock
|
|
from ansible.module_utils.basic import AnsibleModule
|
|
|
|
try:
|
|
from library.bigip_command import Parameters
|
|
from library.bigip_command import ModuleManager
|
|
from library.bigip_command import ArgumentSpec
|
|
from library.module_utils.network.f5.common import F5ModuleError
|
|
from library.module_utils.network.f5.common import iControlUnexpectedHTTPError
|
|
from test.unit.modules.utils import set_module_args
|
|
except ImportError:
|
|
try:
|
|
from ansible.modules.network.f5.bigip_command import Parameters
|
|
from ansible.modules.network.f5.bigip_command import ModuleManager
|
|
from ansible.modules.network.f5.bigip_command import ArgumentSpec
|
|
from ansible.module_utils.network.f5.common import F5ModuleError
|
|
from ansible.module_utils.network.f5.common import iControlUnexpectedHTTPError
|
|
from units.modules.utils import set_module_args
|
|
except ImportError:
|
|
raise SkipTest("F5 Ansible modules require the f5-sdk Python library")
|
|
|
|
fixture_path = os.path.join(os.path.dirname(__file__), 'fixtures')
|
|
fixture_data = {}
|
|
|
|
|
|
def load_fixture(name):
|
|
path = os.path.join(fixture_path, name)
|
|
with open(path) as f:
|
|
data = f.read()
|
|
try:
|
|
data = json.loads(data)
|
|
except Exception:
|
|
pass
|
|
return data
|
|
|
|
|
|
class TestParameters(unittest.TestCase):
|
|
|
|
def test_module_parameters(self):
|
|
args = dict(
|
|
commands=[
|
|
"tmsh show sys version"
|
|
],
|
|
server='localhost',
|
|
user='admin',
|
|
password='password'
|
|
)
|
|
p = Parameters(params=args)
|
|
assert len(p.commands) == 1
|
|
|
|
|
|
class TestManager(unittest.TestCase):
|
|
|
|
def setUp(self):
|
|
self.spec = ArgumentSpec()
|
|
|
|
def test_run_single_command(self, *args):
|
|
set_module_args(dict(
|
|
commands=[
|
|
"tmsh show sys version"
|
|
],
|
|
server='localhost',
|
|
user='admin',
|
|
password='password'
|
|
))
|
|
|
|
module = AnsibleModule(
|
|
argument_spec=self.spec.argument_spec,
|
|
supports_check_mode=self.spec.supports_check_mode
|
|
)
|
|
|
|
mm = ModuleManager(module=module)
|
|
mm._run_commands = Mock(return_value=[])
|
|
mm.execute_on_device = Mock(return_value=[])
|
|
|
|
results = mm.exec_module()
|
|
|
|
assert results['changed'] is False
|
|
assert mm._run_commands.call_count == 0
|
|
assert mm.execute_on_device.call_count == 1
|
|
|
|
def test_run_single_modification_command(self, *args):
|
|
set_module_args(dict(
|
|
commands=[
|
|
"tmsh create ltm virtual foo"
|
|
],
|
|
server='localhost',
|
|
user='admin',
|
|
password='password'
|
|
))
|
|
|
|
module = AnsibleModule(
|
|
argument_spec=self.spec.argument_spec,
|
|
supports_check_mode=self.spec.supports_check_mode
|
|
)
|
|
mm = ModuleManager(module=module)
|
|
mm._run_commands = Mock(return_value=[])
|
|
mm.execute_on_device = Mock(return_value=[])
|
|
|
|
results = mm.exec_module()
|
|
|
|
assert results['changed'] is True
|
|
assert mm._run_commands.call_count == 0
|
|
assert mm.execute_on_device.call_count == 1
|
|
|
|
def test_cli_command(self, *args):
|
|
set_module_args(dict(
|
|
commands=[
|
|
"show sys version"
|
|
],
|
|
server='localhost',
|
|
user='admin',
|
|
password='password',
|
|
transport='cli'
|
|
))
|
|
|
|
module = AnsibleModule(
|
|
argument_spec=self.spec.argument_spec,
|
|
supports_check_mode=self.spec.supports_check_mode
|
|
)
|
|
mm = ModuleManager(module=module)
|
|
mm._run_commands = Mock(return_value=[])
|
|
mm.execute_on_device = Mock(return_value=[])
|
|
|
|
results = mm.exec_module()
|
|
|
|
assert results['changed'] is False
|
|
|
|
# call count is two on CLI transport because we must first
|
|
# determine if the remote CLI is in tmsh mode or advanced shell
|
|
# (bash) mode.
|
|
#
|
|
# 1 call for the shell check
|
|
# 1 call for the command in the "commands" list above
|
|
#
|
|
# Can we change this in the future by making the terminal plugin
|
|
# find this out ahead of time?
|
|
assert mm._run_commands.call_count == 2
|
|
assert mm.execute_on_device.call_count == 0
|
|
|
|
def test_command_with_commas(self, *args):
|
|
set_module_args(dict(
|
|
commands="""
|
|
tmsh create /auth ldap system-auth {bind-dn uid=binduser,
|
|
cn=users,dc=domain,dc=com bind-pw $ENCRYPTEDPW check-roles-group
|
|
enabled search-base-dn cn=users,dc=domain,dc=com servers add {
|
|
ldap.server.com } }"
|
|
""",
|
|
server='localhost',
|
|
user='admin',
|
|
password='password'
|
|
))
|
|
module = AnsibleModule(
|
|
argument_spec=self.spec.argument_spec,
|
|
supports_check_mode=self.spec.supports_check_mode
|
|
)
|
|
mm = ModuleManager(module=module)
|
|
mm._run_commands = Mock(return_value=[])
|
|
mm.execute_on_device = Mock(return_value=[])
|
|
|
|
results = mm.exec_module()
|
|
|
|
assert results['changed'] is True
|
|
assert mm._run_commands.call_count == 0
|
|
assert mm.execute_on_device.call_count == 1
|