mirror of
https://github.com/ansible-collections/community.general.git
synced 2025-10-23 04:24:00 -07:00
Migrate Linux CI roles to test targets. (#17997)
This commit is contained in:
parent
374e4348e4
commit
75e4645ee7
263 changed files with 53 additions and 53 deletions
279
test/integration/targets/uri/tasks/main.yml
Normal file
279
test/integration/targets/uri/tasks/main.yml
Normal file
|
|
@ -0,0 +1,279 @@
|
|||
# test code for the uri module
|
||||
# (c) 2014, Leonid Evdokimov <leon@darkk.net.ru>
|
||||
|
||||
# This file is part of Ansible
|
||||
#
|
||||
# Ansible is free software: you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License as published by
|
||||
# the Free Software Foundation, either version 3 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# Ansible is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
- name: set role facts
|
||||
set_fact:
|
||||
http_port: 15260
|
||||
files_dir: '{{ output_dir|expanduser }}/files'
|
||||
checkout_dir: '{{ output_dir }}/git'
|
||||
|
||||
- name: create a directory to serve files from
|
||||
file:
|
||||
dest: "{{ files_dir }}"
|
||||
state: directory
|
||||
|
||||
- copy:
|
||||
src: "{{ item }}"
|
||||
dest: "{{files_dir}}/{{ item }}"
|
||||
with_sequence: start=0 end=4 format=pass%d.json
|
||||
|
||||
- copy:
|
||||
src: "{{ item }}"
|
||||
dest: "{{files_dir}}/{{ item }}"
|
||||
with_sequence: start=0 end=30 format=fail%d.json
|
||||
|
||||
- copy:
|
||||
src: "testserver.py"
|
||||
dest: "{{ output_dir }}/testserver.py"
|
||||
|
||||
- name: start SimpleHTTPServer
|
||||
shell: cd {{ files_dir }} && {{ ansible_python.executable }} {{ output_dir}}/testserver.py {{ http_port }}
|
||||
async: 60 # this test set takes ~15 seconds to run
|
||||
poll: 0
|
||||
|
||||
- wait_for: port={{ http_port }}
|
||||
|
||||
|
||||
- name: checksum pass_json
|
||||
stat: path={{ files_dir }}/{{ item }}.json get_checksum=yes
|
||||
register: pass_checksum
|
||||
with_sequence: start=0 end=4 format=pass%d
|
||||
|
||||
- name: fetch pass_json
|
||||
uri: return_content=yes url=http://localhost:{{ http_port }}/{{ item }}.json
|
||||
register: pass
|
||||
with_sequence: start=0 end=4 format=pass%d
|
||||
|
||||
- name: check pass_json
|
||||
assert:
|
||||
that:
|
||||
- '"json" in item.1'
|
||||
- item.0.stat.checksum == item.1.content | checksum
|
||||
with_together:
|
||||
- "{{pass_checksum.results}}"
|
||||
- "{{pass.results}}"
|
||||
|
||||
|
||||
- name: checksum fail_json
|
||||
stat: path={{ files_dir }}/{{ item }}.json get_checksum=yes
|
||||
register: fail_checksum
|
||||
with_sequence: start=0 end=30 format=fail%d
|
||||
|
||||
- name: fetch fail_json
|
||||
uri: return_content=yes url=http://localhost:{{ http_port }}/{{ item }}.json
|
||||
register: fail
|
||||
with_sequence: start=0 end=30 format=fail%d
|
||||
|
||||
- name: check fail_json
|
||||
assert:
|
||||
that:
|
||||
- item.0.stat.checksum == item.1.content | checksum
|
||||
- '"json" not in item.1'
|
||||
with_together:
|
||||
- "{{fail_checksum.results}}"
|
||||
- "{{fail.results}}"
|
||||
|
||||
- name: test https fetch to a site with mismatched hostname and certificate
|
||||
uri:
|
||||
url: "https://{{ badssl_host }}/"
|
||||
dest: "{{ output_dir }}/shouldnotexist.html"
|
||||
ignore_errors: True
|
||||
register: result
|
||||
|
||||
- stat:
|
||||
path: "{{ output_dir }}/shouldnotexist.html"
|
||||
register: stat_result
|
||||
|
||||
- name: Assert that the file was not downloaded
|
||||
assert:
|
||||
that:
|
||||
- "result.failed == true"
|
||||
- "'Failed to validate the SSL certificate' in result.msg"
|
||||
- "stat_result.stat.exists == false"
|
||||
|
||||
- name: Clean up any cruft from the results directory
|
||||
file:
|
||||
name: "{{ output_dir }}/kreitz.html"
|
||||
state: absent
|
||||
|
||||
- name: test https fetch to a site with mismatched hostname and certificate and validate_certs=no
|
||||
uri:
|
||||
url: "https://{{ badssl_host }}/"
|
||||
dest: "{{ output_dir }}/kreitz.html"
|
||||
validate_certs: no
|
||||
register: result
|
||||
|
||||
- stat:
|
||||
path: "{{ output_dir }}/kreitz.html"
|
||||
register: stat_result
|
||||
|
||||
- name: Assert that the file was downloaded
|
||||
assert:
|
||||
that:
|
||||
- "stat_result.stat.exists == true"
|
||||
- "result.changed == true"
|
||||
|
||||
- name: test redirect without follow_redirects
|
||||
uri:
|
||||
url: 'http://{{ httpbin_host }}/redirect/2'
|
||||
follow_redirects: 'none'
|
||||
status_code: 302
|
||||
register: result
|
||||
|
||||
- name: Assert location header
|
||||
assert:
|
||||
that:
|
||||
- 'result.location|default("") == "http://{{ httpbin_host }}/relative-redirect/1"'
|
||||
|
||||
- name: Check SSL with redirect
|
||||
uri:
|
||||
url: 'https://{{ httpbin_host }}/redirect/2'
|
||||
register: result
|
||||
|
||||
- name: Assert SSL with redirect
|
||||
assert:
|
||||
that:
|
||||
- 'result.url|default("") == "https://{{ httpbin_host }}/get"'
|
||||
|
||||
- name: redirect to bad SSL site
|
||||
uri:
|
||||
url: 'http://{{ badssl_host }}'
|
||||
register: result
|
||||
ignore_errors: true
|
||||
|
||||
- name: Ensure bad SSL site reidrect fails
|
||||
assert:
|
||||
that:
|
||||
- result|failed
|
||||
- 'badssl_host in result.msg'
|
||||
|
||||
- name: test basic auth
|
||||
uri:
|
||||
url: 'http://{{ httpbin_host }}/basic-auth/user/passwd'
|
||||
user: user
|
||||
password: passwd
|
||||
|
||||
- name: test basic forced auth
|
||||
uri:
|
||||
url: 'http://{{ httpbin_host }}/hidden-basic-auth/user/passwd'
|
||||
force_basic_auth: true
|
||||
user: user
|
||||
password: passwd
|
||||
|
||||
- name: test PUT
|
||||
uri:
|
||||
url: 'http://{{ httpbin_host }}/put'
|
||||
method: PUT
|
||||
body: 'foo=bar'
|
||||
|
||||
- name: test OPTIONS
|
||||
uri:
|
||||
url: 'http://{{ httpbin_host }}/'
|
||||
method: OPTIONS
|
||||
register: result
|
||||
|
||||
- name: Assert we got an allow header
|
||||
assert:
|
||||
that:
|
||||
- 'result.allow|default("") == "HEAD, OPTIONS, GET"'
|
||||
|
||||
# Ubuntu12.04 doesn't have python-urllib3, this makes handling required dependencies a pain across all variations
|
||||
# We'll use this to just skip 12.04 on those tests. We should be sufficiently covered with other OSes and versions
|
||||
- name: Set fact if running on Ubuntu 12.04
|
||||
set_fact:
|
||||
is_ubuntu_precise: "{{ ansible_distribution == 'Ubuntu' and ansible_distribution_release == 'precise' }}"
|
||||
|
||||
# These tests are just side effects of how the site is hosted. It's not
|
||||
# specifically a test site. So the tests may break due to the hosting
|
||||
# changing. Eventually we need to standup a webserver with SNI as part of the
|
||||
# test run.
|
||||
- name: Test that SNI succeeds on python versions that have SNI
|
||||
uri:
|
||||
url: 'https://{{ sni_host }}/'
|
||||
return_content: true
|
||||
when: ansible_python.has_sslcontext
|
||||
register: result
|
||||
|
||||
- name: Assert SNI verification succeeds on new python
|
||||
assert:
|
||||
that:
|
||||
- result|success
|
||||
- 'sni_host == result.content'
|
||||
when: ansible_python.has_sslcontext
|
||||
|
||||
- name: Verify SNI verification fails on old python without urllib3 contrib
|
||||
uri:
|
||||
url: 'https://{{ sni_host }}'
|
||||
ignore_errors: true
|
||||
when: not ansible_python.has_sslcontext
|
||||
register: result
|
||||
|
||||
- name: Assert SNI verification fails on old python
|
||||
assert:
|
||||
that:
|
||||
- result|failed
|
||||
when: not result|skipped
|
||||
|
||||
- name: install OS packages that are needed for SNI on old python
|
||||
package:
|
||||
name: "{{ item }}"
|
||||
with_items: "{{ uri_os_packages[ansible_os_family] | default([]) }}"
|
||||
when: not ansible_python.has_sslcontext and not is_ubuntu_precise|bool
|
||||
|
||||
- name: install python modules for Older Python SNI verification
|
||||
pip:
|
||||
name: "{{ item }}"
|
||||
with_items:
|
||||
- ndg-httpsclient
|
||||
when: not ansible_python.has_sslcontext and not is_ubuntu_precise|bool
|
||||
|
||||
- name: Verify SNI verification succeeds on old python with urllib3 contrib
|
||||
uri:
|
||||
url: 'https://{{ sni_host }}'
|
||||
return_content: true
|
||||
when: not ansible_python.has_sslcontext and not is_ubuntu_precise|bool
|
||||
register: result
|
||||
|
||||
- name: Assert SNI verification succeeds on old python
|
||||
assert:
|
||||
that:
|
||||
- result|success
|
||||
- 'sni_host == result.content'
|
||||
when: not ansible_python.has_sslcontext and not is_ubuntu_precise|bool
|
||||
|
||||
- name: Uninstall ndg-httpsclient and urllib3
|
||||
pip:
|
||||
name: "{{ item }}"
|
||||
state: absent
|
||||
with_items:
|
||||
- ndg-httpsclient
|
||||
when: not ansible_python.has_sslcontext and not is_ubuntu_precise|bool
|
||||
|
||||
- name: uninstall OS packages that are needed for SNI on old python
|
||||
package:
|
||||
name: "{{ item }}"
|
||||
state: absent
|
||||
with_items: "{{ uri_os_packages[ansible_os_family] | default([]) }}"
|
||||
when: not ansible_python.has_sslcontext and not is_ubuntu_precise|bool
|
||||
|
||||
- name: validate the status_codes are correct
|
||||
uri:
|
||||
url: "https://{{ httpbin_host }}/status/202"
|
||||
status_code: 202
|
||||
method: POST
|
||||
body: foo
|
||||
Loading…
Add table
Add a link
Reference in a new issue