mirror of
https://github.com/ansible-collections/community.general.git
synced 2025-07-28 07:31:23 -07:00
parent
fe111b8577
commit
1f06a02043
20 changed files with 86 additions and 58 deletions
|
@ -23,7 +23,7 @@
|
|||
- libapache2-mod-evasive
|
||||
|
||||
- name: install apache via zypper
|
||||
package:
|
||||
zypper:
|
||||
name: apache2
|
||||
state: present
|
||||
when: "ansible_os_family == 'Suse'"
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
|
||||
set -eux
|
||||
|
||||
export ANSIBLE_CALLBACK_WHITELIST="log_plays,${ANSIBLE_CALLBACK_WHITELIST:-}"
|
||||
export ANSIBLE_CALLBACK_WHITELIST="community.general.log_plays,${ANSIBLE_CALLBACK_WHITELIST:-}"
|
||||
|
||||
# run play, should create log and dir if needed
|
||||
export ANSIBLE_LOG_FOLDER="logit"
|
||||
|
|
|
@ -3,3 +3,4 @@ shippable/posix/group1
|
|||
skip/aix
|
||||
skip/osx
|
||||
skip/freebsd
|
||||
disabled #fixme
|
||||
|
|
|
@ -1,2 +1,3 @@
|
|||
needs/root
|
||||
shippable/posix/group3
|
||||
disabled #fixme
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
- name: Test json_query filter
|
||||
assert:
|
||||
that:
|
||||
- "users | json_query('[*].hosts[].host') == ['host_a', 'host_b', 'host_c', 'host_d']"
|
||||
- "users | community.general.json_query('[*].hosts[].host') == ['host_a', 'host_b', 'host_c', 'host_d']"
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
shippable/posix/group2
|
||||
skip/python2.6 # filters are controller only, and we no longer support Python 2.6 on the controller
|
||||
skip/aix
|
||||
disabled # fixme
|
||||
|
|
|
@ -8,7 +8,7 @@
|
|||
|
||||
- name: Test random_mac filter bad argument type
|
||||
debug:
|
||||
var: "0 | random_mac"
|
||||
var: "0 | community.general.random_mac"
|
||||
register: _bad_random_mac_filter
|
||||
ignore_errors: yes
|
||||
|
||||
|
@ -20,7 +20,7 @@
|
|||
|
||||
- name: Test random_mac filter bad argument value
|
||||
debug:
|
||||
var: "'dummy' | random_mac"
|
||||
var: "'dummy' | community.generalrandom_mac"
|
||||
register: _bad_random_mac_filter
|
||||
ignore_errors: yes
|
||||
|
||||
|
@ -32,7 +32,7 @@
|
|||
|
||||
- name: Test random_mac filter prefix too big
|
||||
debug:
|
||||
var: "'00:00:00:00:00:00' | random_mac"
|
||||
var: "'00:00:00:00:00:00' | community.general.random_mac"
|
||||
register: _bad_random_mac_filter
|
||||
ignore_errors: yes
|
||||
|
||||
|
@ -55,5 +55,5 @@
|
|||
- name: Verify random_mac filter with seed
|
||||
assert:
|
||||
that:
|
||||
- "'00:00:00' | random_mac(seed='test') == '00:00:00' | random_mac(seed='test')"
|
||||
- "'00:00:00' | random_mac(seed='test') != '00:00:00' | random_mac(seed='another_test')"
|
||||
- "'00:00:00' | communit.general.random_mac(seed='test') == '00:00:00' | random_mac(seed='test')"
|
||||
- "'00:00:00' | community.general.random_mac(seed='test') != '00:00:00' | random_mac(seed='another_test')"
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
shippable/posix/group2
|
||||
destructive
|
||||
needs/target/setup_openssl
|
||||
needs/file/test/lib/ansible_test/_data/requirements/constraints.txt
|
||||
needs/file/tests/utils/constraints.txt
|
||||
skip/aix
|
||||
skip/python2.6 # lookups are controller only, and we no longer support Python 2.6 on the controller
|
||||
|
|
|
@ -4,7 +4,7 @@
|
|||
block:
|
||||
- name: 'Fetch secrets using "hashi_vault" lookup'
|
||||
set_fact:
|
||||
secret1: "{{ lookup('hashi_vault', conn_params ~ 'secret=' ~ vault_kv2_path ~ '/secret1 auth_method=approle secret_id=' ~ secret_id ~ ' role_id=' ~ role_id) }}"
|
||||
secret1: "{{ lookup('community.general.hashi_vault', conn_params ~ 'secret=' ~ vault_kv2_path ~ '/secret1 auth_method=approle secret_id=' ~ secret_id ~ ' role_id=' ~ role_id) }}"
|
||||
secret2: "{{ lookup('hashi_vault', conn_params ~ 'secret=' ~ vault_kv2_path ~ '/secret2 auth_method=approle secret_id=' ~ secret_id ~ ' role_id=' ~ role_id) }}"
|
||||
|
||||
- name: 'Check secret values'
|
||||
|
@ -14,7 +14,7 @@
|
|||
|
||||
- name: 'Failure expected when erroneous credentials are used'
|
||||
vars:
|
||||
secret_wrong_cred: "{{ lookup('hashi_vault', conn_params ~ 'secret=' ~ vault_kv2_path ~ '/secret2 auth_method=approle secret_id=toto role_id=' ~ role_id) }}"
|
||||
secret_wrong_cred: "{{ lookup('community.general.hashi_vault', conn_params ~ 'secret=' ~ vault_kv2_path ~ '/secret2 auth_method=approle secret_id=toto role_id=' ~ role_id) }}"
|
||||
debug:
|
||||
msg: 'Failure is expected ({{ secret_wrong_cred }})'
|
||||
register: test_wrong_cred
|
||||
|
@ -22,7 +22,7 @@
|
|||
|
||||
- name: 'Failure expected when unauthorized secret is read'
|
||||
vars:
|
||||
secret_unauthorized: "{{ lookup('hashi_vault', conn_params ~ 'secret=' ~ vault_kv2_path ~ '/secret3 auth_method=approle secret_id=' ~ secret_id ~ ' role_id=' ~ role_id) }}"
|
||||
secret_unauthorized: "{{ lookup('community.general.hashi_vault', conn_params ~ 'secret=' ~ vault_kv2_path ~ '/secret3 auth_method=approle secret_id=' ~ secret_id ~ ' role_id=' ~ role_id) }}"
|
||||
debug:
|
||||
msg: 'Failure is expected ({{ secret_unauthorized }})'
|
||||
register: test_unauthorized
|
||||
|
@ -30,7 +30,7 @@
|
|||
|
||||
- name: 'Failure expected when inexistent secret is read'
|
||||
vars:
|
||||
secret_inexistent: "{{ lookup('hashi_vault', conn_params ~ 'secret=' ~ vault_kv2_path ~ '/secret4 auth_method=approle secret_id=' ~ secret_id ~ ' role_id=' ~ role_id) }}"
|
||||
secret_inexistent: "{{ lookup('community.general.:qhashi_vault', conn_params ~ 'secret=' ~ vault_kv2_path ~ '/secret4 auth_method=approle secret_id=' ~ secret_id ~ ' role_id=' ~ role_id) }}"
|
||||
debug:
|
||||
msg: 'Failure is expected ({{ secret_inexistent }})'
|
||||
register: test_inexistent
|
||||
|
|
|
@ -3,12 +3,12 @@
|
|||
block:
|
||||
- name: 'Fetch secrets using "hashi_vault" lookup'
|
||||
set_fact:
|
||||
gen_secret1: "{{ lookup('hashi_vault', conn_params ~ 'secret=' ~ vault_gen_path ~ '/secret1 auth_method=token token=' ~ user_token) }}"
|
||||
gen_secret2: "{{ lookup('hashi_vault', conn_params ~ 'secret=' ~ vault_gen_path ~ '/secret2 token=' ~ user_token) }}"
|
||||
kv1_secret1: "{{ lookup('hashi_vault', conn_params ~ 'secret=' ~ vault_kv1_path ~ '/secret1 auth_method=token token=' ~ user_token) }}"
|
||||
kv1_secret2: "{{ lookup('hashi_vault', conn_params ~ 'secret=' ~ vault_kv1_path ~ '/secret2 token=' ~ user_token) }}"
|
||||
kv2_secret1: "{{ lookup('hashi_vault', conn_params ~ 'secret=' ~ vault_kv2_path ~ '/secret1 auth_method=token token=' ~ user_token) }}"
|
||||
kv2_secret2: "{{ lookup('hashi_vault', conn_params ~ 'secret=' ~ vault_kv2_path ~ '/secret2 token=' ~ user_token) }}"
|
||||
gen_secret1: "{{ lookup('community.general.hashi_vault', conn_params ~ 'secret=' ~ vault_gen_path ~ '/secret1 auth_method=token token=' ~ user_token) }}"
|
||||
gen_secret2: "{{ lookup('community.general.hashi_vault', conn_params ~ 'secret=' ~ vault_gen_path ~ '/secret2 token=' ~ user_token) }}"
|
||||
kv1_secret1: "{{ lookup('community.general.hashi_vault', conn_params ~ 'secret=' ~ vault_kv1_path ~ '/secret1 auth_method=token token=' ~ user_token) }}"
|
||||
kv1_secret2: "{{ lookup('community.general.hashi_vault', conn_params ~ 'secret=' ~ vault_kv1_path ~ '/secret2 token=' ~ user_token) }}"
|
||||
kv2_secret1: "{{ lookup('community.general.hashi_vault', conn_params ~ 'secret=' ~ vault_kv2_path ~ '/secret1 auth_method=token token=' ~ user_token) }}"
|
||||
kv2_secret2: "{{ lookup('community.general.hashi_vault', conn_params ~ 'secret=' ~ vault_kv2_path ~ '/secret2 token=' ~ user_token) }}"
|
||||
|
||||
- name: 'Check secret generic values'
|
||||
fail:
|
||||
|
@ -27,7 +27,7 @@
|
|||
|
||||
- name: 'Failure expected when erroneous credentials are used'
|
||||
vars:
|
||||
secret_wrong_cred: "{{ lookup('hashi_vault', conn_params ~ 'secret=' ~ vault_kv2_path ~ '/secret2 auth_method=token token=wrong_token') }}"
|
||||
secret_wrong_cred: "{{ lookup('community.general.hashi_vault', conn_params ~ 'secret=' ~ vault_kv2_path ~ '/secret2 auth_method=token token=wrong_token') }}"
|
||||
debug:
|
||||
msg: 'Failure is expected ({{ secret_wrong_cred }})'
|
||||
register: test_wrong_cred
|
||||
|
@ -35,7 +35,7 @@
|
|||
|
||||
- name: 'Failure expected when unauthorized secret is read'
|
||||
vars:
|
||||
secret_unauthorized: "{{ lookup('hashi_vault', conn_params ~ 'secret=' ~ vault_kv2_path ~ '/secret3 token=' ~ user_token) }}"
|
||||
secret_unauthorized: "{{ lookup('community.general.hashi_vault', conn_params ~ 'secret=' ~ vault_kv2_path ~ '/secret3 token=' ~ user_token) }}"
|
||||
debug:
|
||||
msg: 'Failure is expected ({{ secret_unauthorized }})'
|
||||
register: test_unauthorized
|
||||
|
@ -43,7 +43,7 @@
|
|||
|
||||
- name: 'Failure expected when inexistent secret is read'
|
||||
vars:
|
||||
secret_inexistent: "{{ lookup('hashi_vault', conn_params ~ 'secret=' ~ vault_kv2_path ~ '/secret4 token=' ~ user_token) }}"
|
||||
secret_inexistent: "{{ lookup('community.general.hashi_vault', conn_params ~ 'secret=' ~ vault_kv2_path ~ '/secret4 token=' ~ user_token) }}"
|
||||
debug:
|
||||
msg: 'Failure is expected ({{ secret_inexistent }})'
|
||||
register: test_inexistent
|
||||
|
|
|
@ -37,11 +37,11 @@
|
|||
|
||||
- name: Create a password
|
||||
set_fact:
|
||||
newpass: "{{ lookup('passwordstore', 'test-pass length=8 create=yes') }}"
|
||||
newpass: "{{ lookup('community.general.passwordstore', 'test-pass length=8 create=yes') }}"
|
||||
|
||||
- name: Fetch password from an existing file
|
||||
set_fact:
|
||||
readpass: "{{ lookup('passwordstore', 'test-pass') }}"
|
||||
readpass: "{{ lookup('community.general.passwordstore', 'test-pass') }}"
|
||||
|
||||
- name: Verify password
|
||||
assert:
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
- name: postgresql_ext - install postgis
|
||||
- name: postgresql_ext - install postgis on Linux
|
||||
package: name=postgis state=present
|
||||
when: ansible_os_family != "Windows"
|
||||
- name: postgresql_ext - install postgis RedHat
|
||||
- name: postgresql_ext - install postgis on Windows
|
||||
when: ansible_os_family == "Windows"
|
||||
ansible.windows.win_package: name=postgis state=present
|
||||
- name: postgresql_ext - create schema schema1
|
||||
|
|
|
@ -1,3 +1,3 @@
|
|||
shippable/cloud/group1
|
||||
cloud/foreman
|
||||
needs/file/contrib/inventory/foreman.py
|
||||
needs/file/scripts/inventory/foreman.py
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
#!/usr/bin/env bash
|
||||
# Wrapper to use the correct Python interpreter and support code coverage.
|
||||
|
||||
REL_SCRIPT="../../../../contrib/inventory/foreman.py"
|
||||
REL_SCRIPT="../../../../scripts/inventory/foreman.py"
|
||||
ABS_SCRIPT="$("${ANSIBLE_TEST_PYTHON_INTERPRETER}" -c "import os; print(os.path.abspath('${REL_SCRIPT}'))")"
|
||||
|
||||
# Make sure output written to current directory ends up in the temp dir.
|
||||
|
|
|
@ -1 +1 @@
|
|||
needs/file/test/lib/ansible_test/_data/requirements/constraints.txt
|
||||
needs/file/tests/utils/constraints.txt
|
||||
|
|
|
@ -4,5 +4,5 @@
|
|||
|
||||
- name: copy constraints.txt to remote host
|
||||
copy:
|
||||
src: "{{ role_path }}/../../../lib/ansible_test/_data/requirements/constraints.txt"
|
||||
src: "{{ role_path }}/../../../utils/constraints.txt"
|
||||
dest: "{{ remote_constraints }}"
|
||||
|
|
|
@ -4,3 +4,4 @@ shippable/posix/group1
|
|||
skip/aix
|
||||
skip/osx
|
||||
skip/freebsd
|
||||
disabled #fixme
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue