mirror of
https://github.com/ansible-collections/community.general.git
synced 2025-04-06 10:40:32 -07:00
[PR #9838/a1781d09 backport][stable-10] Unit tests: make set_module_args() a context manager, and remove copies of it in some tests (#9839)
Unit tests: make set_module_args() a context manager, and remove copies of it in some tests (#9838)
Make set_module_args() a context manager, and remove copies of set_module_args().
Prepares for Data Tagging.
(cherry picked from commit a1781d09dd
)
Co-authored-by: Felix Fontein <felix@fontein.de>
This commit is contained in:
parent
cd0ca389ed
commit
7d45b678e4
84 changed files with 4043 additions and 4302 deletions
|
@ -82,29 +82,28 @@ class TestAlertaCustomerModule(ModuleTestCase):
|
|||
def test_without_parameters(self):
|
||||
"""Failure if no parameters set"""
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
self.module.main()
|
||||
|
||||
def test_without_content(self):
|
||||
"""Failure if customer and match are missing"""
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'alerta_url': "http://localhost:8080",
|
||||
'api_username': "admin@example.com",
|
||||
'api_password': "password"
|
||||
})
|
||||
}):
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
self.module.main()
|
||||
|
||||
def test_successful_existing_customer_creation(self):
|
||||
"""Test the customer creation (already exists)."""
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'alerta_url': "http://localhost:8080",
|
||||
'api_username': "admin@example.com",
|
||||
'api_password': "password",
|
||||
'customer': 'Developer',
|
||||
'match': 'dev@example.com'
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(alerta_customer, "fetch_url") as fetch_url_mock:
|
||||
fetch_url_mock.return_value = customer_response_page1()
|
||||
with self.assertRaises(AnsibleExitJson):
|
||||
|
@ -113,14 +112,13 @@ class TestAlertaCustomerModule(ModuleTestCase):
|
|||
|
||||
def test_successful_customer_creation(self):
|
||||
"""Test the customer creation."""
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'alerta_url': "http://localhost:8080",
|
||||
'api_username': "admin@example.com",
|
||||
'api_password': "password",
|
||||
'customer': 'Developer',
|
||||
'match': 'dev2@example.com'
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(alerta_customer, "fetch_url") as fetch_url_mock:
|
||||
fetch_url_mock.return_value = customer_response_page1()
|
||||
with self.assertRaises(AnsibleExitJson):
|
||||
|
@ -133,13 +131,12 @@ class TestAlertaCustomerModule(ModuleTestCase):
|
|||
|
||||
def test_successful_customer_creation_key(self):
|
||||
"""Test the customer creation using api_key."""
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'alerta_url': "http://localhost:8080",
|
||||
'api_key': "demo-key",
|
||||
'customer': 'Developer',
|
||||
'match': 'dev2@example.com'
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(alerta_customer, "fetch_url") as fetch_url_mock:
|
||||
fetch_url_mock.return_value = customer_response_page1()
|
||||
with self.assertRaises(AnsibleExitJson):
|
||||
|
@ -153,14 +150,13 @@ class TestAlertaCustomerModule(ModuleTestCase):
|
|||
def test_failed_not_found(self):
|
||||
"""Test failure with wrong URL."""
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'alerta_url': "http://localhost:8080/s",
|
||||
'api_username': "admin@example.com",
|
||||
'api_password': "password",
|
||||
'customer': 'Developer',
|
||||
'match': 'dev@example.com'
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(alerta_customer, "fetch_url") as fetch_url_mock:
|
||||
fetch_url_mock.return_value = (None, {"status": 404, 'msg': 'Not found for request GET on http://localhost:8080/a/api/customers'})
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
|
@ -169,14 +165,13 @@ class TestAlertaCustomerModule(ModuleTestCase):
|
|||
def test_failed_forbidden(self):
|
||||
"""Test failure with wrong user."""
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'alerta_url': "http://localhost:8080",
|
||||
'api_username': "dev@example.com",
|
||||
'api_password': "password",
|
||||
'customer': 'Developer',
|
||||
'match': 'dev@example.com'
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(alerta_customer, "fetch_url") as fetch_url_mock:
|
||||
fetch_url_mock.return_value = (None, {"status": 403, 'msg': 'Permission Denied for GET on http://localhost:8080/api/customers'})
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
|
@ -185,14 +180,13 @@ class TestAlertaCustomerModule(ModuleTestCase):
|
|||
def test_failed_unauthorized(self):
|
||||
"""Test failure with wrong username or password."""
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'alerta_url': "http://localhost:8080",
|
||||
'api_username': "admin@example.com",
|
||||
'api_password': "password_wrong",
|
||||
'customer': 'Developer',
|
||||
'match': 'dev@example.com'
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(alerta_customer, "fetch_url") as fetch_url_mock:
|
||||
fetch_url_mock.return_value = (None, {"status": 401, 'msg': 'Unauthorized to request GET on http://localhost:8080/api/customers'})
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
|
@ -201,15 +195,14 @@ class TestAlertaCustomerModule(ModuleTestCase):
|
|||
def test_successful_customer_deletion(self):
|
||||
"""Test the customer deletion."""
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'alerta_url': "http://localhost:8080",
|
||||
'api_username': "admin@example.com",
|
||||
'api_password': "password",
|
||||
'customer': 'Developer',
|
||||
'match': 'dev@example.com',
|
||||
'state': 'absent'
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(alerta_customer, "fetch_url") as fetch_url_mock:
|
||||
fetch_url_mock.return_value = customer_response_page1()
|
||||
with self.assertRaises(AnsibleExitJson):
|
||||
|
@ -218,15 +211,14 @@ class TestAlertaCustomerModule(ModuleTestCase):
|
|||
def test_successful_customer_deletion_page2(self):
|
||||
"""Test the customer deletion on the second page."""
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'alerta_url': "http://localhost:8080",
|
||||
'api_username': "admin@example.com",
|
||||
'api_password': "password",
|
||||
'customer': 'Developer',
|
||||
'match': 'dev@example.com',
|
||||
'state': 'absent'
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(alerta_customer, "fetch_url") as fetch_url_mock:
|
||||
fetch_url_mock.return_value = customer_response_page2()
|
||||
with self.assertRaises(AnsibleExitJson):
|
||||
|
@ -235,15 +227,14 @@ class TestAlertaCustomerModule(ModuleTestCase):
|
|||
def test_successful_nonexisting_customer_deletion(self):
|
||||
"""Test the customer deletion (non existing)."""
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'alerta_url': "http://localhost:8080",
|
||||
'api_username': "admin@example.com",
|
||||
'api_password': "password",
|
||||
'customer': 'Billing',
|
||||
'match': 'dev@example.com',
|
||||
'state': 'absent'
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(alerta_customer, "fetch_url") as fetch_url_mock:
|
||||
fetch_url_mock.return_value = customer_response_page1()
|
||||
with self.assertRaises(AnsibleExitJson):
|
||||
|
|
|
@ -25,14 +25,13 @@ class TestArchive(ModuleTestCase):
|
|||
self.os_path_isdir = self.mock_os_path_isdir.stop()
|
||||
|
||||
def test_archive_removal_safety(self):
|
||||
set_module_args(
|
||||
with set_module_args(
|
||||
dict(
|
||||
path=['/foo', '/bar', '/baz'],
|
||||
dest='/foo/destination.tgz',
|
||||
remove=True
|
||||
)
|
||||
)
|
||||
|
||||
):
|
||||
module = AnsibleModule(
|
||||
argument_spec=dict(
|
||||
path=dict(type='list', elements='path', required=True),
|
||||
|
|
|
@ -19,14 +19,14 @@ class TestBucketAccessKeyModule(ModuleTestCase):
|
|||
|
||||
def test_missing_key_with_present_state(self):
|
||||
with self.assertRaises(AnsibleFailJson) as exec_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'client_id': 'ABC',
|
||||
'client_secret': 'XXX',
|
||||
'workspace': 'name',
|
||||
'repository': 'repo',
|
||||
'label': 'key name',
|
||||
'state': 'present',
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(exec_info.exception.args[0]['msg'], self.module.error_messages['required_key'])
|
||||
|
@ -35,7 +35,7 @@ class TestBucketAccessKeyModule(ModuleTestCase):
|
|||
def test_create_deploy_key(self, *args):
|
||||
with patch.object(self.module, 'create_deploy_key') as create_deploy_key_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as exec_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'user': 'ABC',
|
||||
'password': 'XXX',
|
||||
'workspace': 'name',
|
||||
|
@ -43,7 +43,7 @@ class TestBucketAccessKeyModule(ModuleTestCase):
|
|||
'key': 'public_key',
|
||||
'label': 'key name',
|
||||
'state': 'present',
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(create_deploy_key_mock.call_count, 1)
|
||||
|
@ -54,7 +54,7 @@ class TestBucketAccessKeyModule(ModuleTestCase):
|
|||
def test_create_deploy_key_check_mode(self, *args):
|
||||
with patch.object(self.module, 'create_deploy_key') as create_deploy_key_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as exec_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'client_id': 'ABC',
|
||||
'client_secret': 'XXX',
|
||||
'workspace': 'name',
|
||||
|
@ -63,7 +63,7 @@ class TestBucketAccessKeyModule(ModuleTestCase):
|
|||
'label': 'key name',
|
||||
'state': 'present',
|
||||
'_ansible_check_mode': True,
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(create_deploy_key_mock.call_count, 0)
|
||||
|
@ -105,7 +105,7 @@ class TestBucketAccessKeyModule(ModuleTestCase):
|
|||
with patch.object(self.module, 'delete_deploy_key') as delete_deploy_key_mock:
|
||||
with patch.object(self.module, 'create_deploy_key') as create_deploy_key_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as exec_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'client_id': 'ABC',
|
||||
'client_secret': 'XXX',
|
||||
'workspace': 'name',
|
||||
|
@ -113,7 +113,7 @@ class TestBucketAccessKeyModule(ModuleTestCase):
|
|||
'key': 'new public key',
|
||||
'label': 'mykey',
|
||||
'state': 'present',
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(delete_deploy_key_mock.call_count, 1)
|
||||
|
@ -156,7 +156,7 @@ class TestBucketAccessKeyModule(ModuleTestCase):
|
|||
with patch.object(self.module, 'delete_deploy_key') as delete_deploy_key_mock:
|
||||
with patch.object(self.module, 'create_deploy_key') as create_deploy_key_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as exec_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'client_id': 'ABC',
|
||||
'client_secret': 'XXX',
|
||||
'workspace': 'name',
|
||||
|
@ -164,7 +164,7 @@ class TestBucketAccessKeyModule(ModuleTestCase):
|
|||
'key': 'new public key',
|
||||
'label': 'mykey',
|
||||
'state': 'present',
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(delete_deploy_key_mock.call_count, 0)
|
||||
|
@ -207,7 +207,7 @@ class TestBucketAccessKeyModule(ModuleTestCase):
|
|||
with patch.object(self.module, 'delete_deploy_key') as delete_deploy_key_mock:
|
||||
with patch.object(self.module, 'create_deploy_key') as create_deploy_key_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as exec_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'client_id': 'ABC',
|
||||
'client_secret': 'XXX',
|
||||
'workspace': 'name',
|
||||
|
@ -216,7 +216,7 @@ class TestBucketAccessKeyModule(ModuleTestCase):
|
|||
'label': 'mykey',
|
||||
'state': 'present',
|
||||
'_ansible_check_mode': True,
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(delete_deploy_key_mock.call_count, 0)
|
||||
|
@ -258,14 +258,14 @@ class TestBucketAccessKeyModule(ModuleTestCase):
|
|||
def test_delete_deploy_key(self, *args):
|
||||
with patch.object(self.module, 'delete_deploy_key') as delete_deploy_key_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as exec_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'client_id': 'ABC',
|
||||
'client_secret': 'XXX',
|
||||
'workspace': 'name',
|
||||
'repository': 'repo',
|
||||
'label': 'mykey',
|
||||
'state': 'absent',
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(delete_deploy_key_mock.call_count, 1)
|
||||
|
@ -276,14 +276,14 @@ class TestBucketAccessKeyModule(ModuleTestCase):
|
|||
def test_delete_absent_deploy_key(self, *args):
|
||||
with patch.object(self.module, 'delete_deploy_key') as delete_deploy_key_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as exec_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'client_id': 'ABC',
|
||||
'client_secret': 'XXX',
|
||||
'workspace': 'name',
|
||||
'repository': 'repo',
|
||||
'label': 'mykey',
|
||||
'state': 'absent',
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(delete_deploy_key_mock.call_count, 0)
|
||||
|
@ -324,7 +324,7 @@ class TestBucketAccessKeyModule(ModuleTestCase):
|
|||
def test_delete_deploy_key_check_mode(self, *args):
|
||||
with patch.object(self.module, 'delete_deploy_key') as delete_deploy_key_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as exec_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'client_id': 'ABC',
|
||||
'client_secret': 'XXX',
|
||||
'workspace': 'name',
|
||||
|
@ -332,7 +332,7 @@ class TestBucketAccessKeyModule(ModuleTestCase):
|
|||
'label': 'mykey',
|
||||
'state': 'absent',
|
||||
'_ansible_check_mode': True,
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(delete_deploy_key_mock.call_count, 0)
|
||||
|
|
|
@ -19,13 +19,13 @@ class TestBucketPipelineKeyPairModule(ModuleTestCase):
|
|||
|
||||
def test_missing_keys_with_present_state(self):
|
||||
with self.assertRaises(AnsibleFailJson) as exec_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'client_id': 'ABC',
|
||||
'client_secret': 'XXX',
|
||||
'workspace': 'name',
|
||||
'repository': 'repo',
|
||||
'state': 'present',
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(exec_info.exception.args[0]['msg'], self.module.error_messages['required_keys'])
|
||||
|
@ -34,7 +34,7 @@ class TestBucketPipelineKeyPairModule(ModuleTestCase):
|
|||
def test_create_keys(self, *args):
|
||||
with patch.object(self.module, 'update_ssh_key_pair') as update_ssh_key_pair_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as exec_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'user': 'ABC',
|
||||
'password': 'XXX',
|
||||
'workspace': 'name',
|
||||
|
@ -42,7 +42,7 @@ class TestBucketPipelineKeyPairModule(ModuleTestCase):
|
|||
'public_key': 'public',
|
||||
'private_key': 'PRIVATE',
|
||||
'state': 'present',
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(update_ssh_key_pair_mock.call_count, 1)
|
||||
|
@ -53,7 +53,7 @@ class TestBucketPipelineKeyPairModule(ModuleTestCase):
|
|||
def test_create_keys_check_mode(self, *args):
|
||||
with patch.object(self.module, 'update_ssh_key_pair') as update_ssh_key_pair_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as exec_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'client_id': 'ABC',
|
||||
'client_secret': 'XXX',
|
||||
'workspace': 'name',
|
||||
|
@ -62,7 +62,7 @@ class TestBucketPipelineKeyPairModule(ModuleTestCase):
|
|||
'private_key': 'PRIVATE',
|
||||
'state': 'present',
|
||||
'_ansible_check_mode': True,
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(update_ssh_key_pair_mock.call_count, 0)
|
||||
|
@ -76,7 +76,7 @@ class TestBucketPipelineKeyPairModule(ModuleTestCase):
|
|||
def test_update_keys(self, *args):
|
||||
with patch.object(self.module, 'update_ssh_key_pair') as update_ssh_key_pair_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as exec_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'client_id': 'ABC',
|
||||
'client_secret': 'XXX',
|
||||
'workspace': 'name',
|
||||
|
@ -84,7 +84,7 @@ class TestBucketPipelineKeyPairModule(ModuleTestCase):
|
|||
'public_key': 'public',
|
||||
'private_key': 'PRIVATE',
|
||||
'state': 'present',
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(update_ssh_key_pair_mock.call_count, 1)
|
||||
|
@ -98,7 +98,7 @@ class TestBucketPipelineKeyPairModule(ModuleTestCase):
|
|||
def test_dont_update_same_key(self, *args):
|
||||
with patch.object(self.module, 'update_ssh_key_pair') as update_ssh_key_pair_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as exec_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'client_id': 'ABC',
|
||||
'client_secret': 'XXX',
|
||||
'workspace': 'name',
|
||||
|
@ -106,7 +106,7 @@ class TestBucketPipelineKeyPairModule(ModuleTestCase):
|
|||
'public_key': 'public',
|
||||
'private_key': 'PRIVATE',
|
||||
'state': 'present',
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(update_ssh_key_pair_mock.call_count, 0)
|
||||
|
@ -120,7 +120,7 @@ class TestBucketPipelineKeyPairModule(ModuleTestCase):
|
|||
def test_update_keys_check_mode(self, *args):
|
||||
with patch.object(self.module, 'update_ssh_key_pair') as update_ssh_key_pair_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as exec_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'client_id': 'ABC',
|
||||
'client_secret': 'XXX',
|
||||
'workspace': 'name',
|
||||
|
@ -129,7 +129,7 @@ class TestBucketPipelineKeyPairModule(ModuleTestCase):
|
|||
'private_key': 'PRIVATE',
|
||||
'state': 'present',
|
||||
'_ansible_check_mode': True,
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(update_ssh_key_pair_mock.call_count, 0)
|
||||
|
@ -143,13 +143,13 @@ class TestBucketPipelineKeyPairModule(ModuleTestCase):
|
|||
def test_delete_keys(self, *args):
|
||||
with patch.object(self.module, 'delete_ssh_key_pair') as delete_ssh_key_pair_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as exec_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'client_id': 'ABC',
|
||||
'client_secret': 'XXX',
|
||||
'workspace': 'name',
|
||||
'repository': 'repo',
|
||||
'state': 'absent',
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(delete_ssh_key_pair_mock.call_count, 1)
|
||||
|
@ -160,13 +160,13 @@ class TestBucketPipelineKeyPairModule(ModuleTestCase):
|
|||
def test_delete_absent_keys(self, *args):
|
||||
with patch.object(self.module, 'delete_ssh_key_pair') as delete_ssh_key_pair_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as exec_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'client_id': 'ABC',
|
||||
'client_secret': 'XXX',
|
||||
'workspace': 'name',
|
||||
'repository': 'repo',
|
||||
'state': 'absent',
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(delete_ssh_key_pair_mock.call_count, 0)
|
||||
|
@ -180,14 +180,14 @@ class TestBucketPipelineKeyPairModule(ModuleTestCase):
|
|||
def test_delete_keys_check_mode(self, *args):
|
||||
with patch.object(self.module, 'delete_ssh_key_pair') as delete_ssh_key_pair_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as exec_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'client_id': 'ABC',
|
||||
'client_secret': 'XXX',
|
||||
'workspace': 'name',
|
||||
'repository': 'repo',
|
||||
'state': 'absent',
|
||||
'_ansible_check_mode': True,
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(delete_ssh_key_pair_mock.call_count, 0)
|
||||
|
|
|
@ -26,14 +26,14 @@ class TestBucketPipelineKnownHostModule(ModuleTestCase):
|
|||
def test_create_known_host(self, *args):
|
||||
with patch.object(self.module, 'create_known_host') as create_known_host_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as exec_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'client_id': 'ABC',
|
||||
'client_secret': 'XXX',
|
||||
'workspace': 'name',
|
||||
'repository': 'repo',
|
||||
'name': 'bitbucket.org',
|
||||
'state': 'present',
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(create_known_host_mock.call_count, 1)
|
||||
|
@ -44,7 +44,7 @@ class TestBucketPipelineKnownHostModule(ModuleTestCase):
|
|||
def test_create_known_host_with_key(self, *args):
|
||||
with patch.object(self.module, 'get_host_key') as get_host_key_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as exec_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'user': 'ABC',
|
||||
'password': 'XXX',
|
||||
'workspace': 'name',
|
||||
|
@ -52,7 +52,7 @@ class TestBucketPipelineKnownHostModule(ModuleTestCase):
|
|||
'name': 'bitbucket.org',
|
||||
'key': 'ssh-rsa public',
|
||||
'state': 'present',
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(get_host_key_mock.call_count, 0)
|
||||
|
@ -75,14 +75,14 @@ class TestBucketPipelineKnownHostModule(ModuleTestCase):
|
|||
def test_dont_create_same_value(self, *args):
|
||||
with patch.object(self.module, 'create_known_host') as create_known_host_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as exec_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'client_id': 'ABC',
|
||||
'client_secret': 'XXX',
|
||||
'workspace': 'name',
|
||||
'repository': 'repo',
|
||||
'name': 'bitbucket.org',
|
||||
'state': 'present',
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(create_known_host_mock.call_count, 0)
|
||||
|
@ -94,7 +94,7 @@ class TestBucketPipelineKnownHostModule(ModuleTestCase):
|
|||
def test_create_known_host_check_mode(self, *args):
|
||||
with patch.object(self.module, 'create_known_host') as create_known_host_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as exec_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'client_id': 'ABC',
|
||||
'client_secret': 'XXX',
|
||||
'workspace': 'name',
|
||||
|
@ -102,7 +102,7 @@ class TestBucketPipelineKnownHostModule(ModuleTestCase):
|
|||
'name': 'bitbucket.org',
|
||||
'state': 'present',
|
||||
'_ansible_check_mode': True,
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(create_known_host_mock.call_count, 0)
|
||||
|
@ -125,14 +125,14 @@ class TestBucketPipelineKnownHostModule(ModuleTestCase):
|
|||
def test_delete_known_host(self, *args):
|
||||
with patch.object(self.module, 'delete_known_host') as delete_known_host_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as exec_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'client_id': 'ABC',
|
||||
'client_secret': 'XXX',
|
||||
'workspace': 'name',
|
||||
'repository': 'repo',
|
||||
'name': 'bitbucket.org',
|
||||
'state': 'absent',
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(delete_known_host_mock.call_count, 1)
|
||||
|
@ -144,14 +144,14 @@ class TestBucketPipelineKnownHostModule(ModuleTestCase):
|
|||
def test_delete_absent_known_host(self, *args):
|
||||
with patch.object(self.module, 'delete_known_host') as delete_known_host_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as exec_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'client_id': 'ABC',
|
||||
'client_secret': 'XXX',
|
||||
'workspace': 'name',
|
||||
'repository': 'repo',
|
||||
'name': 'bitbucket.org',
|
||||
'state': 'absent',
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(delete_known_host_mock.call_count, 0)
|
||||
|
@ -174,7 +174,7 @@ class TestBucketPipelineKnownHostModule(ModuleTestCase):
|
|||
def test_delete_known_host_check_mode(self, *args):
|
||||
with patch.object(self.module, 'delete_known_host') as delete_known_host_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as exec_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'client_id': 'ABC',
|
||||
'client_secret': 'XXX',
|
||||
'workspace': 'name',
|
||||
|
@ -182,7 +182,7 @@ class TestBucketPipelineKnownHostModule(ModuleTestCase):
|
|||
'name': 'bitbucket.org',
|
||||
'state': 'absent',
|
||||
'_ansible_check_mode': True,
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(delete_known_host_mock.call_count, 0)
|
||||
|
|
|
@ -19,26 +19,26 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
|
|||
|
||||
def test_without_required_parameters(self):
|
||||
with self.assertRaises(AnsibleFailJson) as exec_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'workspace': 'name',
|
||||
'repository': 'repo',
|
||||
'name': 'PIPELINE_VAR_NAME',
|
||||
'state': 'absent',
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(exec_info.exception.args[0]['failed'], True)
|
||||
|
||||
def test_missing_value_with_present_state(self):
|
||||
with self.assertRaises(AnsibleFailJson) as exec_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'client_id': 'ABC',
|
||||
'client_secret': 'XXX',
|
||||
'workspace': 'name',
|
||||
'repository': 'repo',
|
||||
'name': 'PIPELINE_VAR_NAME',
|
||||
'state': 'present',
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(exec_info.exception.args[0]['msg'], self.module.error_messages['required_value'])
|
||||
|
@ -51,12 +51,12 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
|
|||
@patch.object(bitbucket_pipeline_variable, 'get_existing_pipeline_variable', return_value=None)
|
||||
def test_oauth_env_vars_params(self, *args):
|
||||
with self.assertRaises(AnsibleExitJson):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'workspace': 'name',
|
||||
'repository': 'repo',
|
||||
'name': 'PIPELINE_VAR_NAME',
|
||||
'state': 'absent',
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
@patch.dict('os.environ', {
|
||||
|
@ -66,19 +66,19 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
|
|||
@patch.object(bitbucket_pipeline_variable, 'get_existing_pipeline_variable', return_value=None)
|
||||
def test_basic_auth_env_vars_params(self, *args):
|
||||
with self.assertRaises(AnsibleExitJson):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'workspace': 'name',
|
||||
'repository': 'repo',
|
||||
'name': 'PIPELINE_VAR_NAME',
|
||||
'state': 'absent',
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
@patch.object(bitbucket_pipeline_variable, 'get_existing_pipeline_variable', return_value=None)
|
||||
def test_create_variable(self, *args):
|
||||
with patch.object(self.module, 'create_pipeline_variable') as create_pipeline_variable_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as exec_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'user': 'ABC',
|
||||
'password': 'XXX',
|
||||
'workspace': 'name',
|
||||
|
@ -86,7 +86,7 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
|
|||
'name': 'PIPELINE_VAR_NAME',
|
||||
'value': '42',
|
||||
'state': 'present',
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(create_pipeline_variable_mock.call_count, 1)
|
||||
|
@ -97,7 +97,7 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
|
|||
def test_create_variable_check_mode(self, *args):
|
||||
with patch.object(self.module, 'create_pipeline_variable') as create_pipeline_variable_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as exec_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'client_id': 'ABC',
|
||||
'client_secret': 'XXX',
|
||||
'workspace': 'name',
|
||||
|
@ -106,7 +106,7 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
|
|||
'value': '42',
|
||||
'state': 'present',
|
||||
'_ansible_check_mode': True,
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(create_pipeline_variable_mock.call_count, 0)
|
||||
|
@ -123,7 +123,7 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
|
|||
def test_update_variable(self, *args):
|
||||
with patch.object(self.module, 'update_pipeline_variable') as update_pipeline_variable_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as exec_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'client_id': 'ABC',
|
||||
'client_secret': 'XXX',
|
||||
'workspace': 'name',
|
||||
|
@ -131,7 +131,7 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
|
|||
'name': 'PIPELINE_VAR_NAME',
|
||||
'value': '42',
|
||||
'state': 'present',
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(update_pipeline_variable_mock.call_count, 1)
|
||||
|
@ -147,7 +147,7 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
|
|||
def test_update_secured_variable(self, *args):
|
||||
with patch.object(self.module, 'update_pipeline_variable') as update_pipeline_variable_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as exec_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'client_id': 'ABC',
|
||||
'client_secret': 'XXX',
|
||||
'workspace': 'name',
|
||||
|
@ -156,7 +156,7 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
|
|||
'value': '42',
|
||||
'secured': True,
|
||||
'state': 'present',
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(update_pipeline_variable_mock.call_count, 1)
|
||||
|
@ -173,7 +173,7 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
|
|||
def test_update_secured_state(self, *args):
|
||||
with patch.object(self.module, 'update_pipeline_variable') as update_pipeline_variable_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as exec_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'client_id': 'ABC',
|
||||
'client_secret': 'XXX',
|
||||
'workspace': 'name',
|
||||
|
@ -182,7 +182,7 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
|
|||
'value': '42',
|
||||
'secured': True,
|
||||
'state': 'present',
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(update_pipeline_variable_mock.call_count, 1)
|
||||
|
@ -199,7 +199,7 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
|
|||
def test_dont_update_same_value(self, *args):
|
||||
with patch.object(self.module, 'update_pipeline_variable') as update_pipeline_variable_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as exec_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'client_id': 'ABC',
|
||||
'client_secret': 'XXX',
|
||||
'workspace': 'name',
|
||||
|
@ -207,7 +207,7 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
|
|||
'name': 'PIPELINE_VAR_NAME',
|
||||
'value': '42',
|
||||
'state': 'present',
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(update_pipeline_variable_mock.call_count, 0)
|
||||
|
@ -224,7 +224,7 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
|
|||
def test_update_variable_check_mode(self, *args):
|
||||
with patch.object(self.module, 'update_pipeline_variable') as update_pipeline_variable_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as exec_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'client_id': 'ABC',
|
||||
'client_secret': 'XXX',
|
||||
'workspace': 'name',
|
||||
|
@ -233,7 +233,7 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
|
|||
'value': '42',
|
||||
'state': 'present',
|
||||
'_ansible_check_mode': True,
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(update_pipeline_variable_mock.call_count, 0)
|
||||
|
@ -250,14 +250,14 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
|
|||
def test_delete_variable(self, *args):
|
||||
with patch.object(self.module, 'delete_pipeline_variable') as delete_pipeline_variable_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as exec_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'client_id': 'ABC',
|
||||
'client_secret': 'XXX',
|
||||
'workspace': 'name',
|
||||
'repository': 'repo',
|
||||
'name': 'PIPELINE_VAR_NAME',
|
||||
'state': 'absent',
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(delete_pipeline_variable_mock.call_count, 1)
|
||||
|
@ -268,14 +268,14 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
|
|||
def test_delete_absent_variable(self, *args):
|
||||
with patch.object(self.module, 'delete_pipeline_variable') as delete_pipeline_variable_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as exec_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'client_id': 'ABC',
|
||||
'client_secret': 'XXX',
|
||||
'workspace': 'name',
|
||||
'repository': 'repo',
|
||||
'name': 'PIPELINE_VAR_NAME',
|
||||
'state': 'absent',
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(delete_pipeline_variable_mock.call_count, 0)
|
||||
|
@ -292,7 +292,7 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
|
|||
def test_delete_variable_check_mode(self, *args):
|
||||
with patch.object(self.module, 'delete_pipeline_variable') as delete_pipeline_variable_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as exec_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'client_id': 'ABC',
|
||||
'client_secret': 'XXX',
|
||||
'workspace': 'name',
|
||||
|
@ -300,7 +300,7 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
|
|||
'name': 'PIPELINE_VAR_NAME',
|
||||
'state': 'absent',
|
||||
'_ansible_check_mode': True,
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(delete_pipeline_variable_mock.call_count, 0)
|
||||
|
|
|
@ -21,14 +21,14 @@ class TestBootcManageModule(ModuleTestCase):
|
|||
|
||||
def test_switch_without_image(self):
|
||||
"""Failure if state is 'switch' but no image provided"""
|
||||
set_module_args({'state': 'switch'})
|
||||
with set_module_args({'state': 'switch'}):
|
||||
with self.assertRaises(AnsibleFailJson) as result:
|
||||
self.module.main()
|
||||
self.assertEqual(result.exception.args[0]['msg'], "state is switch but all of the following are missing: image")
|
||||
|
||||
def test_switch_with_image(self):
|
||||
"""Test successful switch with image provided"""
|
||||
set_module_args({'state': 'switch', 'image': 'example.com/image:latest'})
|
||||
with set_module_args({'state': 'switch', 'image': 'example.com/image:latest'}):
|
||||
with patch('ansible.module_utils.basic.AnsibleModule.run_command') as run_command_mock:
|
||||
run_command_mock.return_value = (0, 'Queued for next boot: ', '')
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
|
@ -37,7 +37,7 @@ class TestBootcManageModule(ModuleTestCase):
|
|||
|
||||
def test_latest_state(self):
|
||||
"""Test successful upgrade to the latest state"""
|
||||
set_module_args({'state': 'latest'})
|
||||
with set_module_args({'state': 'latest'}):
|
||||
with patch('ansible.module_utils.basic.AnsibleModule.run_command') as run_command_mock:
|
||||
run_command_mock.return_value = (0, 'Queued for next boot: ', '')
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
|
@ -46,7 +46,7 @@ class TestBootcManageModule(ModuleTestCase):
|
|||
|
||||
def test_latest_state_no_change(self):
|
||||
"""Test no change for latest state"""
|
||||
set_module_args({'state': 'latest'})
|
||||
with set_module_args({'state': 'latest'}):
|
||||
with patch('ansible.module_utils.basic.AnsibleModule.run_command') as run_command_mock:
|
||||
run_command_mock.return_value = (0, 'No changes in ', '')
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
|
@ -55,7 +55,7 @@ class TestBootcManageModule(ModuleTestCase):
|
|||
|
||||
def test_switch_image_failure(self):
|
||||
"""Test failure during image switch"""
|
||||
set_module_args({'state': 'switch', 'image': 'example.com/image:latest'})
|
||||
with set_module_args({'state': 'switch', 'image': 'example.com/image:latest'}):
|
||||
with patch('ansible.module_utils.basic.AnsibleModule.run_command') as run_command_mock:
|
||||
run_command_mock.return_value = (1, '', 'ERROR')
|
||||
with self.assertRaises(AnsibleFailJson) as result:
|
||||
|
@ -64,7 +64,7 @@ class TestBootcManageModule(ModuleTestCase):
|
|||
|
||||
def test_latest_state_failure(self):
|
||||
"""Test failure during upgrade"""
|
||||
set_module_args({'state': 'latest'})
|
||||
with set_module_args({'state': 'latest'}):
|
||||
with patch('ansible.module_utils.basic.AnsibleModule.run_command') as run_command_mock:
|
||||
run_command_mock.return_value = (1, '', 'ERROR')
|
||||
with self.assertRaises(AnsibleFailJson) as result:
|
||||
|
|
|
@ -27,18 +27,17 @@ class TestCampfireModule(ModuleTestCase):
|
|||
def test_without_required_parameters(self):
|
||||
"""Failure must occurs when all parameters are missing"""
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
self.module.main()
|
||||
|
||||
def test_successful_message(self):
|
||||
"""Test failure message"""
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'subscription': 'test',
|
||||
'token': 'abc',
|
||||
'room': 'test',
|
||||
'msg': 'test'
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(campfire, "fetch_url") as fetch_url_mock:
|
||||
fetch_url_mock.return_value = (None, {"status": 200})
|
||||
with self.assertRaises(AnsibleExitJson):
|
||||
|
@ -53,14 +52,13 @@ class TestCampfireModule(ModuleTestCase):
|
|||
|
||||
def test_successful_message_with_notify(self):
|
||||
"""Test failure message"""
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'subscription': 'test',
|
||||
'token': 'abc',
|
||||
'room': 'test',
|
||||
'msg': 'test',
|
||||
'notify': 'bell'
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(campfire, "fetch_url") as fetch_url_mock:
|
||||
fetch_url_mock.return_value = (None, {"status": 200})
|
||||
with self.assertRaises(AnsibleExitJson):
|
||||
|
@ -83,13 +81,12 @@ class TestCampfireModule(ModuleTestCase):
|
|||
|
||||
def test_failure_message(self):
|
||||
"""Test failure message"""
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'subscription': 'test',
|
||||
'token': 'abc',
|
||||
'room': 'test',
|
||||
'msg': 'test'
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(campfire, "fetch_url") as fetch_url_mock:
|
||||
fetch_url_mock.return_value = (None, {"status": 403})
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
|
|
|
@ -30,17 +30,17 @@ class TestCirconusAnnotation(ModuleTestCase):
|
|||
def test_without_required_parameters(self):
|
||||
"""Failure must occurs when all parameters are missing"""
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
self.module.main()
|
||||
|
||||
def test_add_annotation(self):
|
||||
"""Check that result is changed"""
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'test category',
|
||||
'description': 'test description',
|
||||
'title': 'test title',
|
||||
'api_key': str(uuid.uuid4()),
|
||||
})
|
||||
}):
|
||||
|
||||
cid = '/annotation/100000'
|
||||
|
||||
|
@ -67,6 +67,7 @@ class TestCirconusAnnotation(ModuleTestCase):
|
|||
with patch('requests.adapters.HTTPAdapter.send', autospec=True, side_effect=send) as send:
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
self.module.main()
|
||||
|
||||
self.assertTrue(result.exception.args[0]['changed'])
|
||||
self.assertEqual(result.exception.args[0]['annotation']['_cid'], cid)
|
||||
self.assertEqual(send.call_count, 1)
|
||||
|
@ -76,12 +77,12 @@ class TestCirconusAnnotation(ModuleTestCase):
|
|||
Note: it seems there is a bug which prevent to create an annotation
|
||||
with a non-ASCII category if this category already exists, in such
|
||||
case an Internal Server Error (500) occurs."""
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'new catégorÿ',
|
||||
'description': 'test description',
|
||||
'title': 'test title',
|
||||
'api_key': str(uuid.uuid4()),
|
||||
})
|
||||
}):
|
||||
|
||||
cid = '/annotation/100000'
|
||||
|
||||
|
@ -110,18 +111,19 @@ class TestCirconusAnnotation(ModuleTestCase):
|
|||
with patch('requests.adapters.HTTPAdapter.send', autospec=True, side_effect=send) as send:
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
self.module.main()
|
||||
|
||||
self.assertTrue(result.exception.args[0]['changed'])
|
||||
self.assertEqual(result.exception.args[0]['annotation']['_cid'], cid)
|
||||
self.assertEqual(send.call_count, 1)
|
||||
|
||||
def test_auth_failure(self):
|
||||
"""Check that an error is raised when authentication failed"""
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'test category',
|
||||
'description': 'test description',
|
||||
'title': 'test title',
|
||||
'api_key': str(uuid.uuid4()),
|
||||
})
|
||||
}):
|
||||
|
||||
cid = '/annotation/100000'
|
||||
|
||||
|
@ -148,6 +150,7 @@ class TestCirconusAnnotation(ModuleTestCase):
|
|||
with patch('requests.adapters.HTTPAdapter.send', autospec=True, side_effect=send) as send:
|
||||
with self.assertRaises(AnsibleFailJson) as result:
|
||||
self.module.main()
|
||||
|
||||
self.assertTrue(result.exception.args[0]['failed'])
|
||||
self.assertTrue(re.match(r'\b403\b', result.exception.args[0]['reason']))
|
||||
self.assertEqual(send.call_count, 1)
|
||||
|
|
|
@ -33,12 +33,12 @@ class TestDatadogDowntime(ModuleTestCase):
|
|||
def test_without_required_parameters(self):
|
||||
"""Failure must occurs when all parameters are missing"""
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
self.module.main()
|
||||
|
||||
@patch("ansible_collections.community.general.plugins.modules.datadog_downtime.DowntimesApi")
|
||||
def test_create_downtime_when_no_id(self, downtimes_api_mock):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"monitor_tags": ["foo:bar"],
|
||||
"scope": ["*"],
|
||||
"monitor_id": 12345,
|
||||
|
@ -49,8 +49,7 @@ class TestDatadogDowntime(ModuleTestCase):
|
|||
"rrule": "rrule",
|
||||
"api_key": "an_api_key",
|
||||
"app_key": "an_app_key",
|
||||
})
|
||||
|
||||
}):
|
||||
downtime = Downtime()
|
||||
downtime.monitor_tags = ["foo:bar"]
|
||||
downtime.scope = ["*"]
|
||||
|
@ -68,13 +67,14 @@ class TestDatadogDowntime(ModuleTestCase):
|
|||
downtimes_api_mock.return_value = MagicMock(create_downtime=create_downtime_mock)
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
self.module.main()
|
||||
|
||||
self.assertTrue(result.exception.args[0]['changed'])
|
||||
self.assertEqual(result.exception.args[0]['downtime']['id'], 12345)
|
||||
create_downtime_mock.assert_called_once_with(downtime)
|
||||
|
||||
@patch("ansible_collections.community.general.plugins.modules.datadog_downtime.DowntimesApi")
|
||||
def test_create_downtime_when_id_and_disabled(self, downtimes_api_mock):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"id": 1212,
|
||||
"monitor_tags": ["foo:bar"],
|
||||
"scope": ["*"],
|
||||
|
@ -86,8 +86,7 @@ class TestDatadogDowntime(ModuleTestCase):
|
|||
"rrule": "rrule",
|
||||
"api_key": "an_api_key",
|
||||
"app_key": "an_app_key",
|
||||
})
|
||||
|
||||
}):
|
||||
downtime = Downtime()
|
||||
downtime.monitor_tags = ["foo:bar"]
|
||||
downtime.scope = ["*"]
|
||||
|
@ -112,6 +111,7 @@ class TestDatadogDowntime(ModuleTestCase):
|
|||
)
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
self.module.main()
|
||||
|
||||
self.assertTrue(result.exception.args[0]['changed'])
|
||||
self.assertEqual(result.exception.args[0]['downtime']['id'], 12345)
|
||||
create_downtime_mock.assert_called_once_with(downtime)
|
||||
|
@ -119,7 +119,7 @@ class TestDatadogDowntime(ModuleTestCase):
|
|||
|
||||
@patch("ansible_collections.community.general.plugins.modules.datadog_downtime.DowntimesApi")
|
||||
def test_update_downtime_when_not_disabled(self, downtimes_api_mock):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"id": 1212,
|
||||
"monitor_tags": ["foo:bar"],
|
||||
"scope": ["*"],
|
||||
|
@ -131,8 +131,7 @@ class TestDatadogDowntime(ModuleTestCase):
|
|||
"rrule": "rrule",
|
||||
"api_key": "an_api_key",
|
||||
"app_key": "an_app_key",
|
||||
})
|
||||
|
||||
}):
|
||||
downtime = Downtime()
|
||||
downtime.monitor_tags = ["foo:bar"]
|
||||
downtime.scope = ["*"]
|
||||
|
@ -157,6 +156,7 @@ class TestDatadogDowntime(ModuleTestCase):
|
|||
)
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
self.module.main()
|
||||
|
||||
self.assertTrue(result.exception.args[0]['changed'])
|
||||
self.assertEqual(result.exception.args[0]['downtime']['id'], 1212)
|
||||
update_downtime_mock.assert_called_once_with(1212, downtime)
|
||||
|
@ -164,7 +164,7 @@ class TestDatadogDowntime(ModuleTestCase):
|
|||
|
||||
@patch("ansible_collections.community.general.plugins.modules.datadog_downtime.DowntimesApi")
|
||||
def test_update_downtime_no_change(self, downtimes_api_mock):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"id": 1212,
|
||||
"monitor_tags": ["foo:bar"],
|
||||
"scope": ["*"],
|
||||
|
@ -176,8 +176,7 @@ class TestDatadogDowntime(ModuleTestCase):
|
|||
"rrule": "rrule",
|
||||
"api_key": "an_api_key",
|
||||
"app_key": "an_app_key",
|
||||
})
|
||||
|
||||
}):
|
||||
downtime = Downtime()
|
||||
downtime.monitor_tags = ["foo:bar"]
|
||||
downtime.scope = ["*"]
|
||||
|
@ -212,6 +211,7 @@ class TestDatadogDowntime(ModuleTestCase):
|
|||
)
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
self.module.main()
|
||||
|
||||
self.assertFalse(result.exception.args[0]['changed'])
|
||||
self.assertEqual(result.exception.args[0]['downtime']['id'], 1212)
|
||||
update_downtime_mock.assert_called_once_with(1212, downtime)
|
||||
|
@ -219,13 +219,12 @@ class TestDatadogDowntime(ModuleTestCase):
|
|||
|
||||
@patch("ansible_collections.community.general.plugins.modules.datadog_downtime.DowntimesApi")
|
||||
def test_delete_downtime(self, downtimes_api_mock):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"id": 1212,
|
||||
"state": "absent",
|
||||
"api_key": "an_api_key",
|
||||
"app_key": "an_app_key",
|
||||
})
|
||||
|
||||
}):
|
||||
cancel_downtime_mock = MagicMock()
|
||||
downtimes_api_mock.return_value = MagicMock(
|
||||
get_downtime=self.__downtime_with_id,
|
||||
|
@ -233,6 +232,7 @@ class TestDatadogDowntime(ModuleTestCase):
|
|||
)
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
self.module.main()
|
||||
|
||||
self.assertTrue(result.exception.args[0]['changed'])
|
||||
cancel_downtime_mock.assert_called_once_with(1212)
|
||||
|
||||
|
|
|
@ -28,25 +28,25 @@ class TestDiscordModule(ModuleTestCase):
|
|||
def test_without_parameters(self):
|
||||
"""Failure if no parameters set"""
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
self.module.main()
|
||||
|
||||
def test_without_content(self):
|
||||
"""Failure if content and embeds both are missing"""
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'webhook_id': 'xxx',
|
||||
'webhook_token': 'xxx'
|
||||
})
|
||||
}):
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
self.module.main()
|
||||
|
||||
def test_successful_message(self):
|
||||
"""Test a basic message successfully."""
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'webhook_id': 'xxx',
|
||||
'webhook_token': 'xxx',
|
||||
'content': 'test'
|
||||
})
|
||||
}):
|
||||
|
||||
with patch.object(discord, "fetch_url") as fetch_url_mock:
|
||||
fetch_url_mock.return_value = (None, {"status": 204, 'msg': 'OK (0 bytes)'})
|
||||
|
@ -59,12 +59,12 @@ class TestDiscordModule(ModuleTestCase):
|
|||
|
||||
def test_message_with_username(self):
|
||||
"""Test a message with username set successfully."""
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'webhook_id': 'xxx',
|
||||
'webhook_token': 'xxx',
|
||||
'content': 'test',
|
||||
'username': 'Ansible Bot'
|
||||
})
|
||||
}):
|
||||
|
||||
with patch.object(discord, "fetch_url") as fetch_url_mock:
|
||||
fetch_url_mock.return_value = (None, {"status": 204, 'msg': 'OK (0 bytes)'})
|
||||
|
@ -79,25 +79,28 @@ class TestDiscordModule(ModuleTestCase):
|
|||
def test_failed_message(self):
|
||||
"""Test failure because webhook id is wrong."""
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'webhook_id': 'wrong',
|
||||
'webhook_token': 'xxx',
|
||||
'content': 'test'
|
||||
})
|
||||
}):
|
||||
|
||||
with patch.object(discord, "fetch_url") as fetch_url_mock:
|
||||
fetch_url_mock.return_value = (None, {"status": 404, 'msg': 'HTTP Error 404: Not Found', 'body': '{"message": "Unknown Webhook", "code": 10015}'})
|
||||
fetch_url_mock.return_value = (
|
||||
None,
|
||||
{"status": 404, 'msg': 'HTTP Error 404: Not Found', 'body': '{"message": "Unknown Webhook", "code": 10015}'},
|
||||
)
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
self.module.main()
|
||||
|
||||
def test_failed_message_without_body(self):
|
||||
"""Test failure with empty response body."""
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'webhook_id': 'wrong',
|
||||
'webhook_token': 'xxx',
|
||||
'content': 'test'
|
||||
})
|
||||
}):
|
||||
|
||||
with patch.object(discord, "fetch_url") as fetch_url_mock:
|
||||
fetch_url_mock.return_value = (None, {"status": 404, 'msg': 'HTTP Error 404: Not Found'})
|
||||
|
|
|
@ -305,7 +305,7 @@ class TestDNFConfigManager(ModuleTestCase):
|
|||
return result
|
||||
|
||||
def test_get_repo_states(self):
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
self.set_command_mock(execute_return=(0, mock_repolist_crb_enabled, ''))
|
||||
result = self.execute_module(changed=False)
|
||||
self.assertEqual(result['repo_states_pre'], expected_repo_states_crb_enabled)
|
||||
|
@ -314,10 +314,10 @@ class TestDNFConfigManager(ModuleTestCase):
|
|||
self.run_command.assert_has_calls(calls=[call_get_repo_states, call_get_repo_states], any_order=False)
|
||||
|
||||
def test_enable_disabled_repo(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'name': ['crb'],
|
||||
'state': 'enabled'
|
||||
})
|
||||
}):
|
||||
side_effects = [(0, mock_repolist_crb_disabled, ''), (0, '', ''), (0, mock_repolist_crb_enabled, '')]
|
||||
self.set_command_mock(execute_side_effect=side_effects)
|
||||
result = self.execute_module(changed=True)
|
||||
|
@ -328,11 +328,11 @@ class TestDNFConfigManager(ModuleTestCase):
|
|||
self.run_command.assert_has_calls(calls=expected_calls, any_order=False)
|
||||
|
||||
def test_enable_disabled_repo_check_mode(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'name': ['crb'],
|
||||
'state': 'enabled',
|
||||
'_ansible_check_mode': True
|
||||
})
|
||||
}):
|
||||
side_effects = [(0, mock_repolist_crb_disabled, ''), (0, mock_repolist_crb_disabled, '')]
|
||||
self.set_command_mock(execute_side_effect=side_effects)
|
||||
result = self.execute_module(changed=True)
|
||||
|
@ -340,10 +340,10 @@ class TestDNFConfigManager(ModuleTestCase):
|
|||
self.run_command.assert_has_calls(calls=[call_get_repo_states], any_order=False)
|
||||
|
||||
def test_disable_enabled_repo(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'name': ['crb'],
|
||||
'state': 'disabled'
|
||||
})
|
||||
}):
|
||||
side_effects = [(0, mock_repolist_crb_enabled, ''), (0, '', ''), (0, mock_repolist_crb_disabled, '')]
|
||||
self.set_command_mock(execute_side_effect=side_effects)
|
||||
result = self.execute_module(changed=True)
|
||||
|
@ -354,10 +354,10 @@ class TestDNFConfigManager(ModuleTestCase):
|
|||
self.run_command.assert_has_calls(calls=expected_calls, any_order=False)
|
||||
|
||||
def test_crb_already_enabled(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'name': ['crb'],
|
||||
'state': 'enabled'
|
||||
})
|
||||
}):
|
||||
side_effects = [(0, mock_repolist_crb_enabled, ''), (0, mock_repolist_crb_enabled, '')]
|
||||
self.set_command_mock(execute_side_effect=side_effects)
|
||||
result = self.execute_module(changed=False)
|
||||
|
@ -367,33 +367,33 @@ class TestDNFConfigManager(ModuleTestCase):
|
|||
self.run_command.assert_has_calls(calls=[call_get_repo_states, call_get_repo_states], any_order=False)
|
||||
|
||||
def test_get_repo_states_fail_no_status(self):
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
self.set_command_mock(execute_return=(0, mock_repolist_no_status, ''))
|
||||
result = self.execute_module(failed=True)
|
||||
self.assertEqual(result['msg'], 'dnf repolist parse failure: parsed another repo id before next status')
|
||||
self.run_command.assert_has_calls(calls=[call_get_repo_states], any_order=False)
|
||||
|
||||
def test_get_repo_states_fail_status_before_id(self):
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
self.set_command_mock(execute_return=(0, mock_repolist_status_before_id, ''))
|
||||
result = self.execute_module(failed=True)
|
||||
self.assertEqual(result['msg'], 'dnf repolist parse failure: parsed status before repo id')
|
||||
self.run_command.assert_has_calls(calls=[call_get_repo_states], any_order=False)
|
||||
|
||||
def test_failed__unknown_repo_id(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'name': ['fake']
|
||||
})
|
||||
}):
|
||||
self.set_command_mock(execute_return=(0, mock_repolist_crb_disabled, ''))
|
||||
result = self.execute_module(failed=True)
|
||||
self.assertEqual(result['msg'], "did not find repo with ID 'fake' in dnf repolist --all --verbose")
|
||||
self.run_command.assert_has_calls(calls=[call_get_repo_states], any_order=False)
|
||||
|
||||
def test_failed_state_change_ineffective(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'name': ['crb'],
|
||||
'state': 'enabled'
|
||||
})
|
||||
}):
|
||||
side_effects = [(0, mock_repolist_crb_disabled, ''), (0, '', ''), (0, mock_repolist_crb_disabled, '')]
|
||||
self.set_command_mock(execute_side_effect=side_effects)
|
||||
result = self.execute_module(failed=True)
|
||||
|
|
|
@ -38,7 +38,7 @@ class TestDNSimple(ModuleTestCase):
|
|||
def test_without_required_parameters(self):
|
||||
"""Failure must occurs when all parameters are missing"""
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
self.module.main()
|
||||
|
||||
@patch('dnsimple.service.Identity.whoami')
|
||||
|
|
|
@ -56,7 +56,7 @@ class TestDNSimple_Info(ModuleTestCase):
|
|||
def test_with_no_parameters(self):
|
||||
"""Failure must occurs when all parameters are missing"""
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
self.module.main()
|
||||
|
||||
@with_httmock(zones_resp)
|
||||
|
@ -64,10 +64,10 @@ class TestDNSimple_Info(ModuleTestCase):
|
|||
"""key and account will pass, returns domains"""
|
||||
account_id = "1234"
|
||||
with self.assertRaises(AnsibleExitJson) as exc_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"api_key": "abcd1324",
|
||||
"account_id": account_id
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
result = exc_info.exception.args[0]
|
||||
# nothing should change
|
||||
|
@ -80,11 +80,11 @@ class TestDNSimple_Info(ModuleTestCase):
|
|||
"""name and no record should not fail, returns the record"""
|
||||
name = "example.com"
|
||||
with self.assertRaises(AnsibleExitJson) as exc_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"api_key": "abcd1324",
|
||||
"name": "example.com",
|
||||
"account_id": "1234"
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
result = exc_info.exception.args[0]
|
||||
# nothing should change
|
||||
|
@ -97,12 +97,12 @@ class TestDNSimple_Info(ModuleTestCase):
|
|||
"""name and record should not fail, returns the record"""
|
||||
record = "example"
|
||||
with self.assertRaises(AnsibleExitJson) as exc_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"api_key": "abcd1324",
|
||||
"account_id": "1234",
|
||||
"name": "example.com",
|
||||
"record": "example"
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
result = exc_info.exception.args[0]
|
||||
# nothing should change
|
||||
|
|
|
@ -55,12 +55,11 @@ class TestGem(ModuleTestCase):
|
|||
return self.mocker.patch(target)
|
||||
|
||||
def test_fails_when_user_install_and_install_dir_are_combined(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'name': 'dummy',
|
||||
'user_install': True,
|
||||
'install_dir': '/opt/dummy',
|
||||
})
|
||||
|
||||
}):
|
||||
with pytest.raises(AnsibleFailJson) as exc:
|
||||
gem.main()
|
||||
|
||||
|
@ -75,12 +74,11 @@ class TestGem(ModuleTestCase):
|
|||
# test mocks. The only thing that matters is the assertion that this 'gem install' is
|
||||
# invoked with '--install-dir'.
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'name': 'dummy',
|
||||
'user_install': False,
|
||||
'install_dir': '/opt/dummy',
|
||||
})
|
||||
|
||||
}):
|
||||
self.patch_rubygems_version()
|
||||
self.patch_installed_versions([])
|
||||
run_command = self.patch_run_command()
|
||||
|
@ -98,13 +96,12 @@ class TestGem(ModuleTestCase):
|
|||
# XXX: This test is also extremely fragile because of mocking.
|
||||
# If this breaks, the only that matters is to check whether '--install-dir' is
|
||||
# in the run command, and that GEM_HOME is passed to the command.
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'name': 'dummy',
|
||||
'user_install': False,
|
||||
'install_dir': '/opt/dummy',
|
||||
'state': 'absent',
|
||||
})
|
||||
|
||||
}):
|
||||
self.patch_rubygems_version()
|
||||
self.patch_installed_versions(['1.0.0'])
|
||||
|
||||
|
@ -124,11 +121,10 @@ class TestGem(ModuleTestCase):
|
|||
assert update_environ.get('GEM_HOME') == '/opt/dummy'
|
||||
|
||||
def test_passes_add_force_option(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'name': 'dummy',
|
||||
'force': True,
|
||||
})
|
||||
|
||||
}):
|
||||
self.patch_rubygems_version()
|
||||
self.patch_installed_versions([])
|
||||
run_command = self.patch_run_command()
|
||||
|
|
|
@ -38,14 +38,14 @@ class TestIcinga2Feature(ModuleTestCase):
|
|||
def test_without_required_parameters(self):
|
||||
"""Failure must occurs when all parameters are missing."""
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
self.module.main()
|
||||
|
||||
def test_enable_feature(self):
|
||||
"""Check that result is changed."""
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'name': 'api',
|
||||
})
|
||||
}):
|
||||
with patch.object(basic.AnsibleModule, 'run_command') as run_command:
|
||||
run_command.return_value = 0, '', '' # successful execution, no output
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
|
@ -57,10 +57,10 @@ class TestIcinga2Feature(ModuleTestCase):
|
|||
|
||||
def test_enable_feature_with_check_mode(self):
|
||||
"""Check that result is changed in check mode."""
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'name': 'api',
|
||||
'_ansible_check_mode': True,
|
||||
})
|
||||
}):
|
||||
with patch.object(basic.AnsibleModule, 'run_command') as run_command:
|
||||
run_command.return_value = 0, '', '' # successful execution, no output
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
|
@ -71,10 +71,10 @@ class TestIcinga2Feature(ModuleTestCase):
|
|||
|
||||
def test_disable_feature(self):
|
||||
"""Check that result is changed."""
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'name': 'api',
|
||||
'state': 'absent'
|
||||
})
|
||||
}):
|
||||
with patch.object(basic.AnsibleModule, 'run_command') as run_command:
|
||||
run_command.return_value = 0, '', '' # successful execution, no output
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
|
@ -86,11 +86,11 @@ class TestIcinga2Feature(ModuleTestCase):
|
|||
|
||||
def test_disable_feature_with_check_mode(self):
|
||||
"""Check that result is changed in check mode."""
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'name': 'api',
|
||||
'state': 'absent',
|
||||
'_ansible_check_mode': True,
|
||||
})
|
||||
}):
|
||||
with patch.object(basic.AnsibleModule, 'run_command') as run_command:
|
||||
run_command.return_value = 0, '', '' # successful execution, no output
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
|
|
|
@ -34,13 +34,12 @@ class IPAKeytabModuleTestCase(ModuleTestCase):
|
|||
return exc.exception.args[0]
|
||||
|
||||
def test_present(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'path': '/tmp/test.keytab',
|
||||
'principal': 'HTTP/freeipa-dc02.ipa.test',
|
||||
'ipa_host': 'freeipa-dc01.ipa.test',
|
||||
'state': 'present'
|
||||
})
|
||||
|
||||
}):
|
||||
self.module_main_command.side_effect = [
|
||||
(0, '{}', ''),
|
||||
]
|
||||
|
|
|
@ -61,9 +61,9 @@ class TestIPAOTPConfig(ModuleTestCase):
|
|||
changed (bool):
|
||||
Whether or not the module is supposed to be marked as changed
|
||||
"""
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
with set_module_args(module_args):
|
||||
with patch_ipa(return_value=return_value) as (mock_login, mock_post):
|
||||
with self.assertRaises(AnsibleExitJson) as exec_info:
|
||||
self.module.main()
|
||||
|
@ -389,13 +389,12 @@ class TestIPAOTPConfig(ModuleTestCase):
|
|||
|
||||
def test_fail_post(self):
|
||||
"""Fail due to an exception raised from _post_json"""
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'ipatokentotpauthwindow': 11,
|
||||
'ipatokentotpsyncwindow': 12,
|
||||
'ipatokenhotpauthwindow': 13,
|
||||
'ipatokenhotpsyncwindow': 14
|
||||
})
|
||||
|
||||
}):
|
||||
with patch_ipa(side_effect=Exception('ERROR MESSAGE')) as (mock_login, mock_post):
|
||||
with self.assertRaises(AnsibleFailJson) as exec_info:
|
||||
self.module.main()
|
||||
|
|
|
@ -61,8 +61,7 @@ class TestIPAOTPToken(ModuleTestCase):
|
|||
changed (bool):
|
||||
Whether or not the module is supposed to be marked as changed
|
||||
"""
|
||||
set_module_args(module_args)
|
||||
|
||||
with set_module_args(module_args):
|
||||
# Run the module
|
||||
with patch_ipa(return_value=return_value) as (mock_login, mock_post):
|
||||
with self.assertRaises(AnsibleExitJson) as exec_info:
|
||||
|
@ -481,10 +480,9 @@ class TestIPAOTPToken(ModuleTestCase):
|
|||
|
||||
def test_fail_post(self):
|
||||
"""Fail due to an exception raised from _post_json"""
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'uniqueid': 'NewToken1'
|
||||
})
|
||||
|
||||
}):
|
||||
with patch_ipa(side_effect=Exception('ERROR MESSAGE')) as (mock_login, mock_post):
|
||||
with self.assertRaises(AnsibleFailJson) as exec_info:
|
||||
self.module.main()
|
||||
|
|
|
@ -62,8 +62,7 @@ class TestIPAPwPolicy(ModuleTestCase):
|
|||
changed (bool):
|
||||
Whether or not the module is supposed to be marked as changed
|
||||
"""
|
||||
set_module_args(module_args)
|
||||
|
||||
with set_module_args(module_args):
|
||||
# Run the module
|
||||
with patch_ipa(return_value=return_value) as (mock_login, mock_post):
|
||||
with self.assertRaises(AnsibleExitJson) as exec_info:
|
||||
|
@ -693,11 +692,10 @@ class TestIPAPwPolicy(ModuleTestCase):
|
|||
|
||||
def test_fail_post(self):
|
||||
"""Fail due to an exception raised from _post_json"""
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'group': 'admins',
|
||||
'state': 'absent'
|
||||
})
|
||||
|
||||
}):
|
||||
with patch_ipa(side_effect=Exception('ERROR MESSAGE')) as (mock_login, mock_post):
|
||||
with self.assertRaises(AnsibleFailJson) as exec_info:
|
||||
self.module.main()
|
||||
|
|
|
@ -83,13 +83,13 @@ class TestCreateJavaKeystore(ModuleTestCase):
|
|||
self.mock_os_path_exists.stop()
|
||||
|
||||
def test_create_jks_success(self):
|
||||
set_module_args(dict(
|
||||
with set_module_args(dict(
|
||||
certificate='cert-foo',
|
||||
private_key='private-foo',
|
||||
dest='/path/to/keystore.jks',
|
||||
name='test',
|
||||
password='changeit'
|
||||
))
|
||||
)):
|
||||
|
||||
module = AnsibleModule(
|
||||
argument_spec=module_argument_spec,
|
||||
|
@ -115,14 +115,14 @@ class TestCreateJavaKeystore(ModuleTestCase):
|
|||
}
|
||||
|
||||
def test_create_jks_keypass_fail_export_pkcs12(self):
|
||||
set_module_args(dict(
|
||||
with set_module_args(dict(
|
||||
certificate='cert-foo',
|
||||
private_key='private-foo',
|
||||
private_key_passphrase='passphrase-foo',
|
||||
dest='/path/to/keystore.jks',
|
||||
name='test',
|
||||
password='changeit'
|
||||
))
|
||||
)):
|
||||
|
||||
module = AnsibleModule(
|
||||
argument_spec=module_argument_spec,
|
||||
|
@ -154,13 +154,13 @@ class TestCreateJavaKeystore(ModuleTestCase):
|
|||
)
|
||||
|
||||
def test_create_jks_fail_export_pkcs12(self):
|
||||
set_module_args(dict(
|
||||
with set_module_args(dict(
|
||||
certificate='cert-foo',
|
||||
private_key='private-foo',
|
||||
dest='/path/to/keystore.jks',
|
||||
name='test',
|
||||
password='changeit'
|
||||
))
|
||||
)):
|
||||
|
||||
module = AnsibleModule(
|
||||
argument_spec=module_argument_spec,
|
||||
|
@ -191,13 +191,13 @@ class TestCreateJavaKeystore(ModuleTestCase):
|
|||
)
|
||||
|
||||
def test_create_jks_fail_import_key(self):
|
||||
set_module_args(dict(
|
||||
with set_module_args(dict(
|
||||
certificate='cert-foo',
|
||||
private_key='private-foo',
|
||||
dest='/path/to/keystore.jks',
|
||||
name='test',
|
||||
password='changeit'
|
||||
))
|
||||
)):
|
||||
|
||||
module = AnsibleModule(
|
||||
argument_spec=module_argument_spec,
|
||||
|
@ -257,13 +257,13 @@ class TestCertChanged(ModuleTestCase):
|
|||
self.mock_atomic_move.stop()
|
||||
|
||||
def test_cert_unchanged_same_fingerprint(self):
|
||||
set_module_args(dict(
|
||||
with set_module_args(dict(
|
||||
certificate='cert-foo',
|
||||
private_key='private-foo',
|
||||
dest='/path/to/keystore.jks',
|
||||
name='foo',
|
||||
password='changeit'
|
||||
))
|
||||
)):
|
||||
|
||||
module = AnsibleModule(
|
||||
argument_spec=module_argument_spec,
|
||||
|
@ -282,13 +282,13 @@ class TestCertChanged(ModuleTestCase):
|
|||
self.assertFalse(result, 'Fingerprint is identical')
|
||||
|
||||
def test_cert_changed_fingerprint_mismatch(self):
|
||||
set_module_args(dict(
|
||||
with set_module_args(dict(
|
||||
certificate='cert-foo',
|
||||
private_key='private-foo',
|
||||
dest='/path/to/keystore.jks',
|
||||
name='foo',
|
||||
password='changeit'
|
||||
))
|
||||
)):
|
||||
|
||||
module = AnsibleModule(
|
||||
argument_spec=module_argument_spec,
|
||||
|
@ -307,13 +307,13 @@ class TestCertChanged(ModuleTestCase):
|
|||
self.assertTrue(result, 'Fingerprint mismatch')
|
||||
|
||||
def test_cert_changed_alias_does_not_exist(self):
|
||||
set_module_args(dict(
|
||||
with set_module_args(dict(
|
||||
certificate='cert-foo',
|
||||
private_key='private-foo',
|
||||
dest='/path/to/keystore.jks',
|
||||
name='foo',
|
||||
password='changeit'
|
||||
))
|
||||
)):
|
||||
|
||||
module = AnsibleModule(
|
||||
argument_spec=module_argument_spec,
|
||||
|
@ -332,13 +332,13 @@ class TestCertChanged(ModuleTestCase):
|
|||
self.assertTrue(result, 'Alias mismatch detected')
|
||||
|
||||
def test_cert_changed_password_mismatch(self):
|
||||
set_module_args(dict(
|
||||
with set_module_args(dict(
|
||||
certificate='cert-foo',
|
||||
private_key='private-foo',
|
||||
dest='/path/to/keystore.jks',
|
||||
name='foo',
|
||||
password='changeit'
|
||||
))
|
||||
)):
|
||||
|
||||
module = AnsibleModule(
|
||||
argument_spec=module_argument_spec,
|
||||
|
@ -357,13 +357,13 @@ class TestCertChanged(ModuleTestCase):
|
|||
self.assertTrue(result, 'Password mismatch detected')
|
||||
|
||||
def test_cert_changed_fail_read_cert(self):
|
||||
set_module_args(dict(
|
||||
with set_module_args(dict(
|
||||
certificate='cert-foo',
|
||||
private_key='private-foo',
|
||||
dest='/path/to/keystore.jks',
|
||||
name='foo',
|
||||
password='changeit'
|
||||
))
|
||||
)):
|
||||
|
||||
module = AnsibleModule(
|
||||
argument_spec=module_argument_spec,
|
||||
|
@ -390,13 +390,13 @@ class TestCertChanged(ModuleTestCase):
|
|||
)
|
||||
|
||||
def test_cert_changed_fail_read_keystore(self):
|
||||
set_module_args(dict(
|
||||
with set_module_args(dict(
|
||||
certificate='cert-foo',
|
||||
private_key='private-foo',
|
||||
dest='/path/to/keystore.jks',
|
||||
name='foo',
|
||||
password='changeit'
|
||||
))
|
||||
)):
|
||||
|
||||
module = AnsibleModule(
|
||||
argument_spec=module_argument_spec,
|
||||
|
|
|
@ -8,39 +8,8 @@ __metaclass__ = type
|
|||
from ansible_collections.community.general.tests.unit.compat import unittest
|
||||
from ansible_collections.community.general.tests.unit.compat.mock import patch
|
||||
from ansible.module_utils import basic
|
||||
from ansible.module_utils.common.text.converters import to_bytes
|
||||
from ansible_collections.community.general.plugins.modules import jenkins_build
|
||||
|
||||
import json
|
||||
|
||||
|
||||
def set_module_args(args):
|
||||
"""prepare arguments so that they will be picked up during module creation"""
|
||||
args = json.dumps({'ANSIBLE_MODULE_ARGS': args})
|
||||
basic._ANSIBLE_ARGS = to_bytes(args)
|
||||
|
||||
|
||||
class AnsibleExitJson(Exception):
|
||||
"""Exception class to be raised by module.exit_json and caught by the test case"""
|
||||
pass
|
||||
|
||||
|
||||
class AnsibleFailJson(Exception):
|
||||
"""Exception class to be raised by module.fail_json and caught by the test case"""
|
||||
pass
|
||||
|
||||
|
||||
def exit_json(*args, **kwargs):
|
||||
"""function to patch over exit_json; package return data into an exception"""
|
||||
if 'changed' not in kwargs:
|
||||
kwargs['changed'] = False
|
||||
raise AnsibleExitJson(kwargs)
|
||||
|
||||
|
||||
def fail_json(*args, **kwargs):
|
||||
"""function to patch over fail_json; package return data into an exception"""
|
||||
kwargs['failed'] = True
|
||||
raise AnsibleFailJson(kwargs)
|
||||
from ansible_collections.community.general.tests.unit.plugins.modules.utils import AnsibleExitJson, AnsibleFailJson, set_module_args, exit_json, fail_json
|
||||
|
||||
|
||||
class jenkins:
|
||||
|
@ -131,17 +100,17 @@ class TestJenkinsBuild(unittest.TestCase):
|
|||
def test_module_fail_when_required_args_missing(self, test_deps):
|
||||
test_deps.return_value = None
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
jenkins_build.main()
|
||||
|
||||
@patch('ansible_collections.community.general.plugins.modules.jenkins_build.test_dependencies')
|
||||
def test_module_fail_when_missing_build_number(self, test_deps):
|
||||
test_deps.return_value = None
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "required-if",
|
||||
"state": "stopped"
|
||||
})
|
||||
}):
|
||||
jenkins_build.main()
|
||||
|
||||
@patch('ansible_collections.community.general.plugins.modules.jenkins_build.test_dependencies')
|
||||
|
@ -151,11 +120,11 @@ class TestJenkinsBuild(unittest.TestCase):
|
|||
jenkins_connection.return_value = JenkinsMock()
|
||||
|
||||
with self.assertRaises(AnsibleExitJson):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "host-check",
|
||||
"user": "abc",
|
||||
"token": "xyz"
|
||||
})
|
||||
}):
|
||||
jenkins_build.main()
|
||||
|
||||
@patch('ansible_collections.community.general.plugins.modules.jenkins_build.test_dependencies')
|
||||
|
@ -165,13 +134,13 @@ class TestJenkinsBuild(unittest.TestCase):
|
|||
jenkins_connection.return_value = JenkinsMock()
|
||||
|
||||
with self.assertRaises(AnsibleExitJson) as return_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "host-check",
|
||||
"build_number": "1234",
|
||||
"state": "stopped",
|
||||
"user": "abc",
|
||||
"token": "xyz"
|
||||
})
|
||||
}):
|
||||
jenkins_build.main()
|
||||
|
||||
self.assertTrue(return_json.exception.args[0]['changed'])
|
||||
|
@ -183,13 +152,13 @@ class TestJenkinsBuild(unittest.TestCase):
|
|||
jenkins_connection.return_value = JenkinsMockIdempotent()
|
||||
|
||||
with self.assertRaises(AnsibleExitJson) as return_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "host-check",
|
||||
"build_number": "1234",
|
||||
"state": "stopped",
|
||||
"user": "abc",
|
||||
"password": "xyz"
|
||||
})
|
||||
}):
|
||||
jenkins_build.main()
|
||||
|
||||
self.assertFalse(return_json.exception.args[0]['changed'])
|
||||
|
@ -203,13 +172,13 @@ class TestJenkinsBuild(unittest.TestCase):
|
|||
build_status.return_value = JenkinsBuildMock().get_build_status()
|
||||
|
||||
with self.assertRaises(AnsibleExitJson):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "host-delete",
|
||||
"build_number": "1234",
|
||||
"state": "absent",
|
||||
"user": "abc",
|
||||
"token": "xyz"
|
||||
})
|
||||
}):
|
||||
jenkins_build.main()
|
||||
|
||||
@patch('ansible_collections.community.general.plugins.modules.jenkins_build.test_dependencies')
|
||||
|
@ -219,13 +188,13 @@ class TestJenkinsBuild(unittest.TestCase):
|
|||
jenkins_connection.return_value = JenkinsMockIdempotent()
|
||||
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "host-delete",
|
||||
"build_number": "1234",
|
||||
"state": "absent",
|
||||
"user": "abc",
|
||||
"token": "xyz"
|
||||
})
|
||||
}):
|
||||
jenkins_build.main()
|
||||
|
||||
@patch('ansible_collections.community.general.plugins.modules.jenkins_build.test_dependencies')
|
||||
|
@ -237,11 +206,11 @@ class TestJenkinsBuild(unittest.TestCase):
|
|||
build_status.return_value = JenkinsBuildMock().get_build_status()
|
||||
|
||||
with self.assertRaises(AnsibleExitJson) as return_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "create-detached",
|
||||
"user": "abc",
|
||||
"token": "xyz"
|
||||
})
|
||||
}):
|
||||
jenkins_build.main()
|
||||
|
||||
self.assertFalse(return_json.exception.args[0]['changed'])
|
||||
|
@ -253,12 +222,12 @@ class TestJenkinsBuild(unittest.TestCase):
|
|||
jenkins_connection.return_value = JenkinsMock()
|
||||
|
||||
with self.assertRaises(AnsibleExitJson) as return_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "create-detached",
|
||||
"user": "abc",
|
||||
"token": "xyz",
|
||||
"detach": True
|
||||
})
|
||||
}):
|
||||
jenkins_build.main()
|
||||
|
||||
self.assertTrue(return_json.exception.args[0]['changed'])
|
||||
|
|
|
@ -8,39 +8,8 @@ __metaclass__ = type
|
|||
from ansible_collections.community.general.tests.unit.compat import unittest
|
||||
from ansible_collections.community.general.tests.unit.compat.mock import patch
|
||||
from ansible.module_utils import basic
|
||||
from ansible.module_utils.common.text.converters import to_bytes
|
||||
from ansible_collections.community.general.plugins.modules import jenkins_build_info
|
||||
|
||||
import json
|
||||
|
||||
|
||||
def set_module_args(args):
|
||||
"""prepare arguments so that they will be picked up during module creation"""
|
||||
args = json.dumps({'ANSIBLE_MODULE_ARGS': args})
|
||||
basic._ANSIBLE_ARGS = to_bytes(args)
|
||||
|
||||
|
||||
class AnsibleExitJson(Exception):
|
||||
"""Exception class to be raised by module.exit_json and caught by the test case"""
|
||||
pass
|
||||
|
||||
|
||||
class AnsibleFailJson(Exception):
|
||||
"""Exception class to be raised by module.fail_json and caught by the test case"""
|
||||
pass
|
||||
|
||||
|
||||
def exit_json(*args, **kwargs):
|
||||
"""function to patch over exit_json; package return data into an exception"""
|
||||
if 'changed' not in kwargs:
|
||||
kwargs['changed'] = False
|
||||
raise AnsibleExitJson(kwargs)
|
||||
|
||||
|
||||
def fail_json(*args, **kwargs):
|
||||
"""function to patch over fail_json; package return data into an exception"""
|
||||
kwargs['failed'] = True
|
||||
raise AnsibleFailJson(kwargs)
|
||||
from ansible_collections.community.general.tests.unit.plugins.modules.utils import AnsibleExitJson, AnsibleFailJson, set_module_args, exit_json, fail_json
|
||||
|
||||
|
||||
class jenkins:
|
||||
|
@ -101,7 +70,7 @@ class TestJenkinsBuildInfo(unittest.TestCase):
|
|||
def test_module_fail_when_required_args_missing(self, test_deps):
|
||||
test_deps.return_value = None
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
jenkins_build_info.main()
|
||||
|
||||
@patch('ansible_collections.community.general.plugins.modules.jenkins_build_info.test_dependencies')
|
||||
|
@ -111,12 +80,12 @@ class TestJenkinsBuildInfo(unittest.TestCase):
|
|||
jenkins_connection.return_value = JenkinsMock()
|
||||
|
||||
with self.assertRaises(AnsibleExitJson) as return_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "job-present",
|
||||
"user": "abc",
|
||||
"token": "xyz",
|
||||
"build_number": 30
|
||||
})
|
||||
}):
|
||||
jenkins_build_info.main()
|
||||
|
||||
self.assertFalse(return_json.exception.args[0]["changed"])
|
||||
|
@ -130,12 +99,12 @@ class TestJenkinsBuildInfo(unittest.TestCase):
|
|||
build_status.return_value = JenkinsBuildMock("job-absent", 30).get_build_status()
|
||||
|
||||
with self.assertRaises(AnsibleExitJson) as return_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "job-absent",
|
||||
"user": "abc",
|
||||
"token": "xyz",
|
||||
"build_number": 30
|
||||
})
|
||||
}):
|
||||
jenkins_build_info.main()
|
||||
|
||||
self.assertFalse(return_json.exception.args[0]['changed'])
|
||||
|
@ -149,11 +118,11 @@ class TestJenkinsBuildInfo(unittest.TestCase):
|
|||
jenkins_connection.return_value = JenkinsMock()
|
||||
|
||||
with self.assertRaises(AnsibleExitJson) as return_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "job-present",
|
||||
"user": "abc",
|
||||
"token": "xyz"
|
||||
})
|
||||
}):
|
||||
jenkins_build_info.main()
|
||||
|
||||
self.assertFalse(return_json.exception.args[0]['changed'])
|
||||
|
@ -168,11 +137,11 @@ class TestJenkinsBuildInfo(unittest.TestCase):
|
|||
build_status.return_value = JenkinsBuildMock("job-absent").get_build_status()
|
||||
|
||||
with self.assertRaises(AnsibleExitJson) as return_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "job-absent",
|
||||
"user": "abc",
|
||||
"token": "xyz"
|
||||
})
|
||||
}):
|
||||
jenkins_build_info.main()
|
||||
|
||||
self.assertFalse(return_json.exception.args[0]['changed'])
|
||||
|
|
|
@ -6,16 +6,14 @@ from __future__ import absolute_import, division, print_function
|
|||
__metaclass__ = type
|
||||
|
||||
import jenkins
|
||||
import json
|
||||
|
||||
from xml.etree import ElementTree as et
|
||||
|
||||
import pytest
|
||||
|
||||
from ansible.module_utils import basic
|
||||
from ansible.module_utils.common.text.converters import to_bytes
|
||||
from ansible_collections.community.general.tests.unit.compat.mock import patch, call
|
||||
from ansible_collections.community.general.plugins.modules import jenkins_node
|
||||
from ansible_collections.community.general.tests.unit.plugins.modules.utils import AnsibleExitJson, AnsibleFailJson, set_module_args, exit_json, fail_json
|
||||
from pytest import fixture, raises, mark, param
|
||||
|
||||
|
||||
|
@ -62,35 +60,6 @@ def assert_xml_equal(x, y):
|
|||
raise AssertionError("{} != {}".format(x, y))
|
||||
|
||||
|
||||
def set_module_args(args):
|
||||
"""prepare arguments so that they will be picked up during module creation"""
|
||||
args = json.dumps({'ANSIBLE_MODULE_ARGS': args})
|
||||
basic._ANSIBLE_ARGS = to_bytes(args)
|
||||
|
||||
|
||||
class AnsibleExitJson(Exception):
|
||||
def __init__(self, value):
|
||||
self.value = value
|
||||
|
||||
def __getitem__(self, item):
|
||||
return self.value[item]
|
||||
|
||||
|
||||
def exit_json(*args, **kwargs):
|
||||
if 'changed' not in kwargs:
|
||||
kwargs['changed'] = False
|
||||
raise AnsibleExitJson(kwargs)
|
||||
|
||||
|
||||
class AnsibleFailJson(Exception):
|
||||
pass
|
||||
|
||||
|
||||
def fail_json(*args, **kwargs):
|
||||
kwargs['failed'] = True
|
||||
raise AnsibleFailJson(kwargs)
|
||||
|
||||
|
||||
@fixture(autouse=True)
|
||||
def module():
|
||||
with patch.multiple(
|
||||
|
@ -120,13 +89,13 @@ def get_instance(instance):
|
|||
def test_get_jenkins_instance_with_user_and_token(instance):
|
||||
instance.node_exists.return_value = False
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "my-node",
|
||||
"state": "absent",
|
||||
"url": "https://localhost:8080",
|
||||
"user": "admin",
|
||||
"token": "password",
|
||||
})
|
||||
}):
|
||||
|
||||
with pytest.raises(AnsibleExitJson):
|
||||
jenkins_node.main()
|
||||
|
@ -137,12 +106,12 @@ def test_get_jenkins_instance_with_user_and_token(instance):
|
|||
def test_get_jenkins_instance_with_user(instance):
|
||||
instance.node_exists.return_value = False
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "my-node",
|
||||
"state": "absent",
|
||||
"url": "https://localhost:8080",
|
||||
"user": "admin",
|
||||
})
|
||||
}):
|
||||
|
||||
with pytest.raises(AnsibleExitJson):
|
||||
jenkins_node.main()
|
||||
|
@ -153,11 +122,11 @@ def test_get_jenkins_instance_with_user(instance):
|
|||
def test_get_jenkins_instance_with_no_credential(instance):
|
||||
instance.node_exists.return_value = False
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "my-node",
|
||||
"state": "absent",
|
||||
"url": "https://localhost:8080",
|
||||
})
|
||||
}):
|
||||
|
||||
with pytest.raises(AnsibleExitJson):
|
||||
jenkins_node.main()
|
||||
|
@ -173,18 +142,18 @@ def test_state_present_when_absent(get_instance, instance, state):
|
|||
instance.node_exists.return_value = False
|
||||
instance.get_node_config.return_value = "<slave />"
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "my-node",
|
||||
"state": state,
|
||||
})
|
||||
}):
|
||||
|
||||
with raises(AnsibleExitJson) as result:
|
||||
jenkins_node.main()
|
||||
|
||||
assert instance.create_node.call_args == call("my-node", launcher=jenkins.LAUNCHER_SSH)
|
||||
|
||||
assert result.value["created"] is True
|
||||
assert result.value["changed"] is True
|
||||
assert result.value.args[0]["created"] is True
|
||||
assert result.value.args[0]["changed"] is True
|
||||
|
||||
|
||||
@mark.parametrize(["state"], [param(state) for state in PRESENT_STATES])
|
||||
|
@ -192,19 +161,19 @@ def test_state_present_when_absent_check_mode(get_instance, instance, state):
|
|||
instance.node_exists.return_value = False
|
||||
instance.get_node_config.return_value = "<slave />"
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "my-node",
|
||||
"state": state,
|
||||
"_ansible_check_mode": True,
|
||||
})
|
||||
}):
|
||||
|
||||
with raises(AnsibleExitJson) as result:
|
||||
jenkins_node.main()
|
||||
|
||||
assert not instance.create_node.called
|
||||
|
||||
assert result.value["created"] is True
|
||||
assert result.value["changed"] is True
|
||||
assert result.value.args[0]["created"] is True
|
||||
assert result.value.args[0]["changed"] is True
|
||||
|
||||
|
||||
@mark.parametrize(["state"], [param(state) for state in PRESENT_STATES])
|
||||
|
@ -215,18 +184,18 @@ def test_state_present_when_absent_redirect_auth_error_handled(
|
|||
instance.get_node_config.return_value = "<slave />"
|
||||
instance.create_node.side_effect = jenkins.JenkinsException
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "my-node",
|
||||
"state": state,
|
||||
})
|
||||
}):
|
||||
|
||||
with raises(AnsibleExitJson) as result:
|
||||
jenkins_node.main()
|
||||
|
||||
assert instance.create_node.call_args == call("my-node", launcher=jenkins.LAUNCHER_SSH)
|
||||
|
||||
assert result.value["created"] is True
|
||||
assert result.value["changed"] is True
|
||||
assert result.value.args[0]["created"] is True
|
||||
assert result.value.args[0]["changed"] is True
|
||||
|
||||
|
||||
@mark.parametrize(["state"], [param(state) for state in PRESENT_STATES])
|
||||
|
@ -235,72 +204,72 @@ def test_state_present_when_absent_other_error_raised(get_instance, instance, st
|
|||
instance.get_node_config.return_value = "<slave />"
|
||||
instance.create_node.side_effect = jenkins.JenkinsException
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "my-node",
|
||||
"state": state,
|
||||
})
|
||||
}):
|
||||
|
||||
with raises(AnsibleFailJson) as result:
|
||||
jenkins_node.main()
|
||||
|
||||
assert instance.create_node.call_args == call("my-node", launcher=jenkins.LAUNCHER_SSH)
|
||||
|
||||
assert "Create node failed" in str(result.value)
|
||||
assert "Create node failed" in str(result.value.args[0])
|
||||
|
||||
|
||||
def test_state_present_when_present(get_instance, instance):
|
||||
instance.node_exists.return_value = True
|
||||
instance.get_node_config.return_value = "<slave />"
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "my-node",
|
||||
"state": "present",
|
||||
})
|
||||
}):
|
||||
|
||||
with raises(AnsibleExitJson) as result:
|
||||
jenkins_node.main()
|
||||
|
||||
assert not instance.create_node.called
|
||||
|
||||
assert result.value["created"] is False
|
||||
assert result.value["changed"] is False
|
||||
assert result.value.args[0]["created"] is False
|
||||
assert result.value.args[0]["changed"] is False
|
||||
|
||||
|
||||
def test_state_absent_when_present(get_instance, instance):
|
||||
instance.node_exists.return_value = True
|
||||
instance.get_node_config.return_value = "<slave />"
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "my-node",
|
||||
"state": "absent",
|
||||
})
|
||||
}):
|
||||
|
||||
with raises(AnsibleExitJson) as result:
|
||||
jenkins_node.main()
|
||||
|
||||
assert instance.delete_node.call_args == call("my-node")
|
||||
|
||||
assert result.value["deleted"] is True
|
||||
assert result.value["changed"] is True
|
||||
assert result.value.args[0]["deleted"] is True
|
||||
assert result.value.args[0]["changed"] is True
|
||||
|
||||
|
||||
def test_state_absent_when_present_check_mode(get_instance, instance):
|
||||
instance.node_exists.return_value = True
|
||||
instance.get_node_config.return_value = "<slave />"
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "my-node",
|
||||
"state": "absent",
|
||||
"_ansible_check_mode": True,
|
||||
})
|
||||
}):
|
||||
|
||||
with raises(AnsibleExitJson) as result:
|
||||
jenkins_node.main()
|
||||
|
||||
assert not instance.delete_node.called
|
||||
|
||||
assert result.value["deleted"] is True
|
||||
assert result.value["changed"] is True
|
||||
assert result.value.args[0]["deleted"] is True
|
||||
assert result.value.args[0]["changed"] is True
|
||||
|
||||
|
||||
def test_state_absent_when_present_redirect_auth_error_handled(get_instance, instance):
|
||||
|
@ -308,18 +277,18 @@ def test_state_absent_when_present_redirect_auth_error_handled(get_instance, ins
|
|||
instance.get_node_config.return_value = "<slave />"
|
||||
instance.delete_node.side_effect = jenkins.JenkinsException
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "my-node",
|
||||
"state": "absent",
|
||||
})
|
||||
}):
|
||||
|
||||
with raises(AnsibleExitJson) as result:
|
||||
jenkins_node.main()
|
||||
|
||||
assert instance.delete_node.call_args == call("my-node")
|
||||
|
||||
assert result.value["deleted"] is True
|
||||
assert result.value["changed"] is True
|
||||
assert result.value.args[0]["deleted"] is True
|
||||
assert result.value.args[0]["changed"] is True
|
||||
|
||||
|
||||
def test_state_absent_when_present_other_error_raised(get_instance, instance):
|
||||
|
@ -327,35 +296,35 @@ def test_state_absent_when_present_other_error_raised(get_instance, instance):
|
|||
instance.get_node_config.return_value = "<slave />"
|
||||
instance.delete_node.side_effect = jenkins.JenkinsException
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "my-node",
|
||||
"state": "absent",
|
||||
})
|
||||
}):
|
||||
|
||||
with raises(AnsibleFailJson) as result:
|
||||
jenkins_node.main()
|
||||
|
||||
assert instance.delete_node.call_args == call("my-node")
|
||||
|
||||
assert "Delete node failed" in str(result.value)
|
||||
assert "Delete node failed" in str(result.value.args[0])
|
||||
|
||||
|
||||
def test_state_absent_when_absent(get_instance, instance):
|
||||
instance.node_exists.return_value = False
|
||||
instance.get_node_config.return_value = "<slave />"
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "my-node",
|
||||
"state": "absent",
|
||||
})
|
||||
}):
|
||||
|
||||
with raises(AnsibleExitJson) as result:
|
||||
jenkins_node.main()
|
||||
|
||||
assert not instance.delete_node.called
|
||||
|
||||
assert result.value["deleted"] is False
|
||||
assert result.value["changed"] is False
|
||||
assert result.value.args[0]["deleted"] is False
|
||||
assert result.value.args[0]["changed"] is False
|
||||
|
||||
|
||||
def test_state_enabled_when_offline(get_instance, instance):
|
||||
|
@ -363,18 +332,18 @@ def test_state_enabled_when_offline(get_instance, instance):
|
|||
instance.get_node_config.return_value = "<slave />"
|
||||
instance.get_node_info.return_value = {"offline": True}
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "my-node",
|
||||
"state": "enabled",
|
||||
})
|
||||
}):
|
||||
|
||||
with raises(AnsibleExitJson) as result:
|
||||
jenkins_node.main()
|
||||
|
||||
assert instance.enable_node.call_args == call("my-node")
|
||||
|
||||
assert result.value["enabled"] is True
|
||||
assert result.value["changed"] is True
|
||||
assert result.value.args[0]["enabled"] is True
|
||||
assert result.value.args[0]["changed"] is True
|
||||
|
||||
|
||||
def test_state_enabled_when_offline_check_mode(get_instance, instance):
|
||||
|
@ -382,19 +351,19 @@ def test_state_enabled_when_offline_check_mode(get_instance, instance):
|
|||
instance.get_node_config.return_value = "<slave />"
|
||||
instance.get_node_info.return_value = {"offline": True}
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "my-node",
|
||||
"state": "enabled",
|
||||
"_ansible_check_mode": True,
|
||||
})
|
||||
}):
|
||||
|
||||
with raises(AnsibleExitJson) as result:
|
||||
jenkins_node.main()
|
||||
|
||||
assert not instance.enable_node.called
|
||||
|
||||
assert result.value["enabled"] is True
|
||||
assert result.value["changed"] is True
|
||||
assert result.value.args[0]["enabled"] is True
|
||||
assert result.value.args[0]["changed"] is True
|
||||
|
||||
|
||||
def test_state_enabled_when_offline_redirect_auth_error_handled(get_instance, instance):
|
||||
|
@ -403,18 +372,18 @@ def test_state_enabled_when_offline_redirect_auth_error_handled(get_instance, in
|
|||
instance.get_node_info.side_effect = [{"offline": True}, {"offline": False}]
|
||||
instance.enable_node.side_effect = jenkins.JenkinsException
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "my-node",
|
||||
"state": "enabled",
|
||||
})
|
||||
}):
|
||||
|
||||
with raises(AnsibleExitJson) as result:
|
||||
jenkins_node.main()
|
||||
|
||||
assert instance.enable_node.call_args == call("my-node")
|
||||
|
||||
assert result.value["enabled"] is True
|
||||
assert result.value["changed"] is True
|
||||
assert result.value.args[0]["enabled"] is True
|
||||
assert result.value.args[0]["changed"] is True
|
||||
|
||||
|
||||
def test_state_enabled_when_offline_other_error_raised(get_instance, instance):
|
||||
|
@ -423,17 +392,17 @@ def test_state_enabled_when_offline_other_error_raised(get_instance, instance):
|
|||
instance.get_node_info.side_effect = [{"offline": True}, {"offline": True}]
|
||||
instance.enable_node.side_effect = jenkins.JenkinsException
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "my-node",
|
||||
"state": "enabled",
|
||||
})
|
||||
}):
|
||||
|
||||
with raises(AnsibleFailJson) as result:
|
||||
jenkins_node.main()
|
||||
|
||||
assert instance.enable_node.call_args == call("my-node")
|
||||
|
||||
assert "Enable node failed" in str(result.value)
|
||||
assert "Enable node failed" in str(result.value.args[0])
|
||||
|
||||
|
||||
def test_state_enabled_when_not_offline(get_instance, instance):
|
||||
|
@ -441,18 +410,18 @@ def test_state_enabled_when_not_offline(get_instance, instance):
|
|||
instance.get_node_config.return_value = "<slave />"
|
||||
instance.get_node_info.return_value = {"offline": False}
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "my-node",
|
||||
"state": "enabled",
|
||||
})
|
||||
}):
|
||||
|
||||
with raises(AnsibleExitJson) as result:
|
||||
jenkins_node.main()
|
||||
|
||||
assert not instance.enable_node.called
|
||||
|
||||
assert result.value["enabled"] is False
|
||||
assert result.value["changed"] is False
|
||||
assert result.value.args[0]["enabled"] is False
|
||||
assert result.value.args[0]["changed"] is False
|
||||
|
||||
|
||||
def test_state_disabled_when_not_offline(get_instance, instance):
|
||||
|
@ -463,18 +432,18 @@ def test_state_disabled_when_not_offline(get_instance, instance):
|
|||
"offlineCauseReason": "",
|
||||
}
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "my-node",
|
||||
"state": "disabled",
|
||||
})
|
||||
}):
|
||||
|
||||
with raises(AnsibleExitJson) as result:
|
||||
jenkins_node.main()
|
||||
|
||||
assert instance.disable_node.call_args == call("my-node", "")
|
||||
|
||||
assert result.value["disabled"] is True
|
||||
assert result.value["changed"] is True
|
||||
assert result.value.args[0]["disabled"] is True
|
||||
assert result.value.args[0]["changed"] is True
|
||||
|
||||
|
||||
def test_state_disabled_when_not_offline_redirect_auth_error_handled(
|
||||
|
@ -494,18 +463,18 @@ def test_state_disabled_when_not_offline_redirect_auth_error_handled(
|
|||
]
|
||||
instance.disable_node.side_effect = jenkins.JenkinsException
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "my-node",
|
||||
"state": "disabled",
|
||||
})
|
||||
}):
|
||||
|
||||
with raises(AnsibleExitJson) as result:
|
||||
jenkins_node.main()
|
||||
|
||||
assert instance.disable_node.call_args == call("my-node", "")
|
||||
|
||||
assert result.value["disabled"] is True
|
||||
assert result.value["changed"] is True
|
||||
assert result.value.args[0]["disabled"] is True
|
||||
assert result.value.args[0]["changed"] is True
|
||||
|
||||
|
||||
def test_state_disabled_when_not_offline_other_error_raised(get_instance, instance):
|
||||
|
@ -523,17 +492,17 @@ def test_state_disabled_when_not_offline_other_error_raised(get_instance, instan
|
|||
]
|
||||
instance.disable_node.side_effect = jenkins.JenkinsException
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "my-node",
|
||||
"state": "disabled",
|
||||
})
|
||||
}):
|
||||
|
||||
with raises(AnsibleFailJson) as result:
|
||||
jenkins_node.main()
|
||||
|
||||
assert instance.disable_node.call_args == call("my-node", "")
|
||||
|
||||
assert "Disable node failed" in str(result.value)
|
||||
assert "Disable node failed" in str(result.value.args[0])
|
||||
|
||||
|
||||
def test_state_disabled_when_not_offline_check_mode(get_instance, instance):
|
||||
|
@ -544,19 +513,19 @@ def test_state_disabled_when_not_offline_check_mode(get_instance, instance):
|
|||
"offlineCauseReason": "",
|
||||
}
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "my-node",
|
||||
"state": "disabled",
|
||||
"_ansible_check_mode": True,
|
||||
})
|
||||
}):
|
||||
|
||||
with raises(AnsibleExitJson) as result:
|
||||
jenkins_node.main()
|
||||
|
||||
assert not instance.disable_node.called
|
||||
|
||||
assert result.value["disabled"] is True
|
||||
assert result.value["changed"] is True
|
||||
assert result.value.args[0]["disabled"] is True
|
||||
assert result.value.args[0]["changed"] is True
|
||||
|
||||
|
||||
def test_state_disabled_when_offline(get_instance, instance):
|
||||
|
@ -567,29 +536,29 @@ def test_state_disabled_when_offline(get_instance, instance):
|
|||
"offlineCauseReason": "",
|
||||
}
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "my-node",
|
||||
"state": "disabled",
|
||||
})
|
||||
}):
|
||||
|
||||
with raises(AnsibleExitJson) as result:
|
||||
jenkins_node.main()
|
||||
|
||||
assert not instance.disable_node.called
|
||||
|
||||
assert result.value["disabled"] is False
|
||||
assert result.value["changed"] is False
|
||||
assert result.value.args[0]["disabled"] is False
|
||||
assert result.value.args[0]["changed"] is False
|
||||
|
||||
|
||||
def test_configure_num_executors_when_not_configured(get_instance, instance):
|
||||
instance.node_exists.return_value = True
|
||||
instance.get_node_config.return_value = "<slave />"
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "my-node",
|
||||
"state": "present",
|
||||
"num_executors": 3,
|
||||
})
|
||||
}):
|
||||
|
||||
with raises(AnsibleExitJson) as result:
|
||||
jenkins_node.main()
|
||||
|
@ -601,8 +570,8 @@ def test_configure_num_executors_when_not_configured(get_instance, instance):
|
|||
</slave>
|
||||
""")
|
||||
|
||||
assert result.value["configured"] is True
|
||||
assert result.value["changed"] is True
|
||||
assert result.value.args[0]["configured"] is True
|
||||
assert result.value.args[0]["changed"] is True
|
||||
|
||||
|
||||
def test_configure_num_executors_when_not_equal(get_instance, instance):
|
||||
|
@ -613,11 +582,11 @@ def test_configure_num_executors_when_not_equal(get_instance, instance):
|
|||
</slave>
|
||||
"""
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "my-node",
|
||||
"state": "present",
|
||||
"num_executors": 2,
|
||||
})
|
||||
}):
|
||||
|
||||
with raises(AnsibleExitJson) as result:
|
||||
jenkins_node.main()
|
||||
|
@ -628,8 +597,8 @@ def test_configure_num_executors_when_not_equal(get_instance, instance):
|
|||
</slave>
|
||||
""")
|
||||
|
||||
assert result.value["configured"] is True
|
||||
assert result.value["changed"] is True
|
||||
assert result.value.args[0]["configured"] is True
|
||||
assert result.value.args[0]["changed"] is True
|
||||
|
||||
|
||||
def test_configure_num_executors_when_equal(get_instance, instance):
|
||||
|
@ -640,26 +609,26 @@ def test_configure_num_executors_when_equal(get_instance, instance):
|
|||
</slave>
|
||||
"""
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "my-node",
|
||||
"state": "present",
|
||||
"num_executors": 2,
|
||||
})
|
||||
}):
|
||||
|
||||
with raises(AnsibleExitJson) as result:
|
||||
jenkins_node.main()
|
||||
|
||||
assert not instance.reconfig_node.called
|
||||
|
||||
assert result.value["configured"] is False
|
||||
assert result.value["changed"] is False
|
||||
assert result.value.args[0]["configured"] is False
|
||||
assert result.value.args[0]["changed"] is False
|
||||
|
||||
|
||||
def test_configure_labels_when_not_configured(get_instance, instance):
|
||||
instance.node_exists.return_value = True
|
||||
instance.get_node_config.return_value = "<slave />"
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "my-node",
|
||||
"state": "present",
|
||||
"labels": [
|
||||
|
@ -667,7 +636,7 @@ def test_configure_labels_when_not_configured(get_instance, instance):
|
|||
"b",
|
||||
"c",
|
||||
],
|
||||
})
|
||||
}):
|
||||
|
||||
with raises(AnsibleExitJson) as result:
|
||||
jenkins_node.main()
|
||||
|
@ -679,8 +648,8 @@ def test_configure_labels_when_not_configured(get_instance, instance):
|
|||
</slave>
|
||||
""")
|
||||
|
||||
assert result.value["configured"] is True
|
||||
assert result.value["changed"] is True
|
||||
assert result.value.args[0]["configured"] is True
|
||||
assert result.value.args[0]["changed"] is True
|
||||
|
||||
|
||||
def test_configure_labels_when_not_equal(get_instance, instance):
|
||||
|
@ -691,7 +660,7 @@ def test_configure_labels_when_not_equal(get_instance, instance):
|
|||
</slave>
|
||||
"""
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "my-node",
|
||||
"state": "present",
|
||||
"labels": [
|
||||
|
@ -699,7 +668,7 @@ def test_configure_labels_when_not_equal(get_instance, instance):
|
|||
"z",
|
||||
"c",
|
||||
],
|
||||
})
|
||||
}):
|
||||
|
||||
with raises(AnsibleExitJson) as result:
|
||||
jenkins_node.main()
|
||||
|
@ -711,8 +680,8 @@ def test_configure_labels_when_not_equal(get_instance, instance):
|
|||
</slave>
|
||||
""")
|
||||
|
||||
assert result.value["configured"] is True
|
||||
assert result.value["changed"] is True
|
||||
assert result.value.args[0]["configured"] is True
|
||||
assert result.value.args[0]["changed"] is True
|
||||
|
||||
|
||||
def test_configure_labels_when_equal(get_instance, instance):
|
||||
|
@ -723,7 +692,7 @@ def test_configure_labels_when_equal(get_instance, instance):
|
|||
</slave>
|
||||
"""
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "my-node",
|
||||
"state": "present",
|
||||
"labels": [
|
||||
|
@ -731,28 +700,28 @@ def test_configure_labels_when_equal(get_instance, instance):
|
|||
"b",
|
||||
"c",
|
||||
],
|
||||
})
|
||||
}):
|
||||
|
||||
with raises(AnsibleExitJson) as result:
|
||||
jenkins_node.main()
|
||||
|
||||
assert not instance.reconfig_node.called
|
||||
|
||||
assert result.value["configured"] is False
|
||||
assert result.value["changed"] is False
|
||||
assert result.value.args[0]["configured"] is False
|
||||
assert result.value.args[0]["changed"] is False
|
||||
|
||||
|
||||
def test_configure_labels_fail_when_contains_space(get_instance, instance):
|
||||
instance.node_exists.return_value = True
|
||||
instance.get_node_config.return_value = "<slave />"
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "my-node",
|
||||
"state": "present",
|
||||
"labels": [
|
||||
"a error",
|
||||
],
|
||||
})
|
||||
}):
|
||||
|
||||
with raises(AnsibleFailJson):
|
||||
jenkins_node.main()
|
||||
|
@ -762,11 +731,11 @@ def test_configure_labels_fail_when_contains_space(get_instance, instance):
|
|||
|
||||
@mark.parametrize(["state"], [param(state) for state in ["enabled", "present", "absent"]])
|
||||
def test_raises_error_if_offline_message_when_state_not_disabled(get_instance, instance, state):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "my-node",
|
||||
"state": state,
|
||||
"offline_message": "This is a message...",
|
||||
})
|
||||
}):
|
||||
|
||||
with raises(AnsibleFailJson):
|
||||
jenkins_node.main()
|
||||
|
@ -782,18 +751,18 @@ def test_set_offline_message_when_equal(get_instance, instance):
|
|||
"offlineCauseReason": "This is an old message...",
|
||||
}
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "my-node",
|
||||
"state": "disabled",
|
||||
"offline_message": "This is an old message...",
|
||||
})
|
||||
}):
|
||||
|
||||
with raises(AnsibleExitJson) as result:
|
||||
jenkins_node.main()
|
||||
|
||||
assert not instance.disable_node.called
|
||||
|
||||
assert result.value["changed"] is False
|
||||
assert result.value.args[0]["changed"] is False
|
||||
|
||||
|
||||
def test_set_offline_message_when_not_equal_not_offline(get_instance, instance):
|
||||
|
@ -804,18 +773,18 @@ def test_set_offline_message_when_not_equal_not_offline(get_instance, instance):
|
|||
"offlineCauseReason": "This is an old message...",
|
||||
}
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "my-node",
|
||||
"state": "disabled",
|
||||
"offline_message": "This is a new message...",
|
||||
})
|
||||
}):
|
||||
|
||||
with raises(AnsibleExitJson) as result:
|
||||
jenkins_node.main()
|
||||
|
||||
assert instance.disable_node.call_args == call("my-node", "This is a new message...")
|
||||
|
||||
assert result.value["changed"] is True
|
||||
assert result.value.args[0]["changed"] is True
|
||||
|
||||
|
||||
# Not calling disable_node when already offline seems like a sensible thing to do.
|
||||
|
@ -829,15 +798,15 @@ def test_set_offline_message_when_not_equal_offline(get_instance, instance):
|
|||
"offlineCauseReason": "This is an old message...",
|
||||
}
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
"name": "my-node",
|
||||
"state": "disabled",
|
||||
"offline_message": "This is a new message...",
|
||||
})
|
||||
}):
|
||||
|
||||
with raises(AnsibleExitJson) as result:
|
||||
jenkins_node.main()
|
||||
|
||||
assert not instance.disable_node.called
|
||||
|
||||
assert result.value["changed"] is False
|
||||
assert result.value.args[0]["changed"] is False
|
||||
|
|
|
@ -163,10 +163,9 @@ class TestKeycloakAuthentication(ModuleTestCase):
|
|||
]
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_authentication_flow_by_alias=return_value_auth_flow_before, copy_auth_flow=return_value_copied,
|
||||
get_executions_representation=return_value_executions_after) \
|
||||
|
@ -256,10 +255,9 @@ class TestKeycloakAuthentication(ModuleTestCase):
|
|||
]
|
||||
changed = False
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_authentication_flow_by_alias=return_value_auth_flow_before,
|
||||
get_executions_representation=return_value_executions_after) \
|
||||
|
@ -328,10 +326,9 @@ class TestKeycloakAuthentication(ModuleTestCase):
|
|||
]
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_authentication_flow_by_alias=return_value_auth_flow_before,
|
||||
get_executions_representation=return_value_executions_after, create_empty_auth_flow=return_value_created_empty_flow) \
|
||||
|
@ -419,10 +416,9 @@ class TestKeycloakAuthentication(ModuleTestCase):
|
|||
]
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_authentication_flow_by_alias=return_value_auth_flow_before,
|
||||
get_executions_representation=return_value_executions_after) \
|
||||
|
@ -472,10 +468,9 @@ class TestKeycloakAuthentication(ModuleTestCase):
|
|||
}]
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_authentication_flow_by_alias=return_value_auth_flow_before) \
|
||||
as (mock_get_authentication_flow_by_alias, mock_copy_auth_flow, mock_create_empty_auth_flow,
|
||||
|
@ -508,10 +503,9 @@ class TestKeycloakAuthentication(ModuleTestCase):
|
|||
return_value_auth_flow_before = [{}]
|
||||
changed = False
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_authentication_flow_by_alias=return_value_auth_flow_before) \
|
||||
as (mock_get_authentication_flow_by_alias, mock_copy_auth_flow, mock_create_empty_auth_flow,
|
||||
|
@ -596,10 +590,9 @@ class TestKeycloakAuthentication(ModuleTestCase):
|
|||
]
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_authentication_flow_by_alias=return_value_auth_flow_before,
|
||||
get_executions_representation=return_value_executions_after, create_empty_auth_flow=return_value_created_empty_flow) \
|
||||
|
|
|
@ -235,9 +235,8 @@ class TestKeycloakAuthentication(ModuleTestCase):
|
|||
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(
|
||||
get_required_actions=return_value_required_actions,
|
||||
|
@ -386,9 +385,8 @@ class TestKeycloakAuthentication(ModuleTestCase):
|
|||
|
||||
changed = False
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(
|
||||
get_required_actions=return_value_required_actions,
|
||||
|
@ -537,9 +535,8 @@ class TestKeycloakAuthentication(ModuleTestCase):
|
|||
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(
|
||||
get_required_actions=return_value_required_actions,
|
||||
|
@ -676,9 +673,8 @@ class TestKeycloakAuthentication(ModuleTestCase):
|
|||
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(
|
||||
get_required_actions=return_value_required_actions,
|
||||
|
@ -806,9 +802,8 @@ class TestKeycloakAuthentication(ModuleTestCase):
|
|||
|
||||
changed = False
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(
|
||||
get_required_actions=return_value_required_actions,
|
||||
|
|
|
@ -126,10 +126,9 @@ class TestKeycloakRealm(ModuleTestCase):
|
|||
]
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_client_by_clientid=return_value_get_client_by_clientid) \
|
||||
as (mock_get_client_by_clientid, mock_get_client_by_id, mock_create_client, mock_update_client, mock_delete_client):
|
||||
|
|
|
@ -188,10 +188,9 @@ class TestKeycloakRealm(ModuleTestCase):
|
|||
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_group_by_name=return_value_get_group_by_name, get_client_id=return_value_get_client_id,
|
||||
get_client_role_id_by_name=return_value_get_client_role_id_by_name,
|
||||
|
@ -272,10 +271,9 @@ class TestKeycloakRealm(ModuleTestCase):
|
|||
|
||||
changed = False
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_group_by_name=return_value_get_group_by_name, get_client_id=return_value_get_client_id,
|
||||
get_client_role_id_by_name=return_value_get_client_role_id_by_name,
|
||||
|
@ -374,10 +372,9 @@ class TestKeycloakRealm(ModuleTestCase):
|
|||
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_group_by_name=return_value_get_group_by_name, get_client_id=return_value_get_client_id,
|
||||
get_client_role_id_by_name=return_value_get_client_role_id_by_name,
|
||||
|
@ -461,10 +458,9 @@ class TestKeycloakRealm(ModuleTestCase):
|
|||
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_group_by_name=return_value_get_group_by_name, get_client_id=return_value_get_client_id,
|
||||
get_client_role_id_by_name=return_value_get_client_role_id_by_name,
|
||||
|
@ -547,10 +543,9 @@ class TestKeycloakRealm(ModuleTestCase):
|
|||
|
||||
changed = False
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_group_by_name=return_value_get_group_by_name, get_client_id=return_value_get_client_id,
|
||||
get_client_role_id_by_name=return_value_get_client_role_id_by_name,
|
||||
|
|
|
@ -142,10 +142,9 @@ class TestKeycloakAuthentication(ModuleTestCase):
|
|||
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_clientscope_by_name=return_value_get_clientscope_by_name) \
|
||||
as (mock_get_clientscope_by_name, mock_get_clientscope_by_clientscopeid, mock_create_clientscope,
|
||||
|
@ -188,10 +187,9 @@ class TestKeycloakAuthentication(ModuleTestCase):
|
|||
|
||||
changed = False
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_clientscope_by_name=return_value_get_clientscope_by_name) \
|
||||
as (mock_get_clientscope_by_name, mock_get_clientscope_by_clientscopeid, mock_create_clientscope,
|
||||
|
@ -234,10 +232,9 @@ class TestKeycloakAuthentication(ModuleTestCase):
|
|||
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_clientscope_by_name=return_value_get_clientscope_by_name) \
|
||||
as (mock_get_clientscope_by_name, mock_get_clientscope_by_clientscopeid, mock_create_clientscope,
|
||||
|
@ -276,10 +273,9 @@ class TestKeycloakAuthentication(ModuleTestCase):
|
|||
|
||||
changed = False
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_clientscope_by_name=return_value_get_clientscope_by_name) \
|
||||
as (mock_get_clientscope_by_name, mock_get_clientscope_by_clientscopeid, mock_create_clientscope,
|
||||
|
@ -405,10 +401,9 @@ class TestKeycloakAuthentication(ModuleTestCase):
|
|||
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_clientscope_by_name=return_value_get_clientscope_by_name) \
|
||||
as (mock_get_clientscope_by_name, mock_get_clientscope_by_clientscopeid, mock_create_clientscope,
|
||||
|
@ -582,10 +577,9 @@ class TestKeycloakAuthentication(ModuleTestCase):
|
|||
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_clientscope_by_name=return_value_get_clientscope_by_name,
|
||||
get_clientscope_by_clientscopeid=return_value_get_clientscope_by_clientscopeid) \
|
||||
|
|
|
@ -126,10 +126,9 @@ class TestKeycloakComponent(ModuleTestCase):
|
|||
]
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_components=return_value_components_get, create_component=return_value_component_create) \
|
||||
as (mock_get_components, mock_create_component, mock_update_component, mock_delete_component):
|
||||
|
@ -199,10 +198,9 @@ class TestKeycloakComponent(ModuleTestCase):
|
|||
]
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_components=return_value_components_get,
|
||||
update_component=return_value_component_update) \
|
||||
|
@ -241,10 +239,9 @@ class TestKeycloakComponent(ModuleTestCase):
|
|||
]
|
||||
changed = False
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_components=return_value_components_get) \
|
||||
as (mock_get_components, mock_create_component, mock_update_component, mock_delete_component):
|
||||
|
@ -304,10 +301,9 @@ class TestKeycloakComponent(ModuleTestCase):
|
|||
]
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_components=return_value_components_get, delete_component=return_value_component_delete) \
|
||||
as (mock_get_components, mock_create_component, mock_update_component, mock_delete_component):
|
||||
|
|
|
@ -238,10 +238,9 @@ class TestKeycloakIdentityProvider(ModuleTestCase):
|
|||
return_value_mapper_created = [None, None]
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_identity_provider=return_value_idp_get, get_identity_provider_mappers=return_value_mappers_get,
|
||||
create_identity_provider=return_value_idp_created, create_identity_provider_mapper=return_value_mapper_created,
|
||||
|
@ -547,10 +546,9 @@ class TestKeycloakIdentityProvider(ModuleTestCase):
|
|||
return_value_mapper_created = [None]
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_identity_provider=return_value_idp_get, get_identity_provider_mappers=return_value_mappers_get,
|
||||
update_identity_provider=return_value_idp_updated, update_identity_provider_mapper=return_value_mapper_updated,
|
||||
|
@ -697,10 +695,9 @@ class TestKeycloakIdentityProvider(ModuleTestCase):
|
|||
return_value_mapper_created = [None]
|
||||
changed = False
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_identity_provider=return_value_idp_get, get_identity_provider_mappers=return_value_mappers_get,
|
||||
update_identity_provider=return_value_idp_updated, update_identity_provider_mapper=return_value_mapper_updated,
|
||||
|
@ -738,10 +735,9 @@ class TestKeycloakIdentityProvider(ModuleTestCase):
|
|||
return_value_idp_get = [None]
|
||||
changed = False
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_identity_provider=return_value_idp_get) \
|
||||
as (mock_get_identity_provider, mock_create_identity_provider, mock_update_identity_provider, mock_delete_identity_provider,
|
||||
|
@ -844,10 +840,9 @@ class TestKeycloakIdentityProvider(ModuleTestCase):
|
|||
return_value_idp_deleted = [None]
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_identity_provider=return_value_idp_get, get_identity_provider_mappers=return_value_mappers_get,
|
||||
delete_identity_provider=return_value_idp_deleted, get_realm_by_id=return_value_realm_get) \
|
||||
|
|
|
@ -113,10 +113,9 @@ class TestKeycloakRealm(ModuleTestCase):
|
|||
}]
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_realm_by_id=return_value_absent, create_realm=return_value_created) \
|
||||
as (mock_get_realm_by_id, mock_create_realm, mock_update_realm, mock_delete_realm):
|
||||
|
@ -164,10 +163,9 @@ class TestKeycloakRealm(ModuleTestCase):
|
|||
}]
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_realm_by_id=return_value_absent, update_realm=return_value_updated) \
|
||||
as (mock_get_realm_by_id, mock_create_realm, mock_update_realm, mock_delete_realm):
|
||||
|
@ -215,10 +213,9 @@ class TestKeycloakRealm(ModuleTestCase):
|
|||
}]
|
||||
changed = False
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_realm_by_id=return_value_absent, update_realm=return_value_updated) \
|
||||
as (mock_get_realm_by_id, mock_create_realm, mock_update_realm, mock_delete_realm):
|
||||
|
@ -251,10 +248,9 @@ class TestKeycloakRealm(ModuleTestCase):
|
|||
return_value_deleted = [None]
|
||||
changed = False
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_realm_by_id=return_value_absent, delete_realm=return_value_deleted) \
|
||||
as (mock_get_realm_by_id, mock_create_realm, mock_update_realm, mock_delete_realm):
|
||||
|
@ -290,10 +286,9 @@ class TestKeycloakRealm(ModuleTestCase):
|
|||
return_value_deleted = [None]
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_realm_by_id=return_value_absent, delete_realm=return_value_deleted) \
|
||||
as (mock_get_realm_by_id, mock_create_realm, mock_update_realm, mock_delete_realm):
|
||||
|
|
|
@ -105,10 +105,9 @@ class TestKeycloakRealmRole(ModuleTestCase):
|
|||
}
|
||||
]
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_realm_info_by_id=return_value) \
|
||||
as (mock_get_realm_info_by_id):
|
||||
|
|
|
@ -139,10 +139,9 @@ class TestKeycloakRealmKeys(ModuleTestCase):
|
|||
]
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_components=return_value_components_get, create_component=return_value_component_create) \
|
||||
as (mock_get_components, mock_get_component, mock_create_component, mock_update_component, mock_delete_component):
|
||||
|
@ -232,10 +231,9 @@ class TestKeycloakRealmKeys(ModuleTestCase):
|
|||
]
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_components=return_value_components_get,
|
||||
update_component=return_value_component_update) \
|
||||
|
@ -277,10 +275,9 @@ class TestKeycloakRealmKeys(ModuleTestCase):
|
|||
]
|
||||
changed = False
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_components=return_value_components_get) \
|
||||
as (mock_get_components, mock_get_component, mock_create_component, mock_update_component, mock_delete_component):
|
||||
|
@ -356,10 +353,9 @@ class TestKeycloakRealmKeys(ModuleTestCase):
|
|||
]
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_components=return_value_components_get, delete_component=return_value_component_delete) \
|
||||
as (mock_get_components, mock_get_component, mock_create_component, mock_update_component, mock_delete_component):
|
||||
|
|
|
@ -158,10 +158,9 @@ class TestKeycloakRealmRole(ModuleTestCase):
|
|||
}
|
||||
]
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(side_effect=return_value) as (
|
||||
mock_get_realm_keys_metadata_by_id
|
||||
|
|
|
@ -129,10 +129,9 @@ class TestKeycloakRealmRole(ModuleTestCase):
|
|||
return_value_created = [None]
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_realm_role=return_value_absent, create_realm_role=return_value_created) \
|
||||
as (mock_get_realm_role, mock_create_realm_role, mock_update_realm_role, mock_delete_realm_role,
|
||||
|
@ -185,10 +184,9 @@ class TestKeycloakRealmRole(ModuleTestCase):
|
|||
return_value_updated = [None]
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_realm_role=return_value_present, update_realm_role=return_value_updated) \
|
||||
as (mock_get_realm_role, mock_create_realm_role, mock_update_realm_role, mock_delete_realm_role,
|
||||
|
@ -241,10 +239,9 @@ class TestKeycloakRealmRole(ModuleTestCase):
|
|||
return_value_updated = [None]
|
||||
changed = False
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_realm_role=return_value_present, update_realm_role=return_value_updated) \
|
||||
as (mock_get_realm_role, mock_create_realm_role, mock_update_realm_role, mock_delete_realm_role,
|
||||
|
@ -371,10 +368,9 @@ class TestKeycloakRealmRole(ModuleTestCase):
|
|||
|
||||
changed = False
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_realm_role=return_value_present, update_realm_role=return_value_updated,
|
||||
get_client_by_id=return_get_client_by_client_id,
|
||||
|
@ -412,10 +408,9 @@ class TestKeycloakRealmRole(ModuleTestCase):
|
|||
return_value_deleted = [None]
|
||||
changed = False
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_realm_role=return_value_absent, delete_realm_role=return_value_deleted) \
|
||||
as (mock_get_realm_role, mock_create_realm_role, mock_update_realm_role, mock_delete_realm_role,
|
||||
|
@ -458,10 +453,9 @@ class TestKeycloakRealmRole(ModuleTestCase):
|
|||
return_value_deleted = [None]
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_realm_role=return_value_absent, delete_realm_role=return_value_deleted) \
|
||||
as (mock_get_realm_role, mock_create_realm_role, mock_update_realm_role, mock_delete_realm_role,
|
||||
|
@ -531,10 +525,9 @@ class TestKeycloakClientRole(ModuleTestCase):
|
|||
]
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_client_role=return_get_client_role) \
|
||||
as (mock_get_realm_role, mock_create_realm_role, mock_update_realm_role, mock_delete_realm_role,
|
||||
|
@ -653,10 +646,9 @@ class TestKeycloakClientRole(ModuleTestCase):
|
|||
]
|
||||
changed = False
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_client_role=return_get_client_role, get_client_by_id=return_get_client_by_client_id,
|
||||
get_role_composites=return_get_role_composites) \
|
||||
|
|
|
@ -114,10 +114,9 @@ class TestKeycloakUser(ModuleTestCase):
|
|||
return_update_user = None
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_user_by_username=return_value_get_user_by_username,
|
||||
create_user=return_create_user,
|
||||
|
@ -176,10 +175,9 @@ class TestKeycloakUser(ModuleTestCase):
|
|||
return_update_user = None
|
||||
changed = False
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_user_by_username=return_value_get_user_by_username,
|
||||
create_user=return_create_user,
|
||||
|
@ -257,10 +255,9 @@ class TestKeycloakUser(ModuleTestCase):
|
|||
]
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_user_by_username=return_value_get_user_by_username,
|
||||
create_user=return_create_user,
|
||||
|
@ -319,10 +316,9 @@ class TestKeycloakUser(ModuleTestCase):
|
|||
return_update_user = None
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_user_by_username=return_value_get_user_by_username,
|
||||
create_user=return_create_user,
|
||||
|
|
|
@ -150,10 +150,9 @@ class TestKeycloakUserFederation(ModuleTestCase):
|
|||
]
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_components=return_value_components_get, create_component=return_value_component_create) \
|
||||
as (mock_get_components, mock_get_component, mock_create_component, mock_update_component, mock_delete_component):
|
||||
|
@ -272,10 +271,9 @@ class TestKeycloakUserFederation(ModuleTestCase):
|
|||
]
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_components=return_value_components_get, get_component=return_value_component_get,
|
||||
update_component=return_value_component_update) \
|
||||
|
@ -494,10 +492,9 @@ class TestKeycloakUserFederation(ModuleTestCase):
|
|||
]
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_components=return_value_components_get, create_component=return_value_component_create) \
|
||||
as (mock_get_components, mock_get_component, mock_create_component, mock_update_component, mock_delete_component):
|
||||
|
@ -530,10 +527,9 @@ class TestKeycloakUserFederation(ModuleTestCase):
|
|||
]
|
||||
changed = False
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_components=return_value_components_get) \
|
||||
as (mock_get_components, mock_get_component, mock_create_component, mock_update_component, mock_delete_component):
|
||||
|
@ -604,10 +600,9 @@ class TestKeycloakUserFederation(ModuleTestCase):
|
|||
]
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_components=return_value_components_get, delete_component=return_value_component_delete) \
|
||||
as (mock_get_components, mock_get_component, mock_create_component, mock_update_component, mock_delete_component):
|
||||
|
|
|
@ -350,10 +350,9 @@ class TestKeycloakUserprofile(ModuleTestCase):
|
|||
]
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_components=return_value_get_components_get, create_component=return_value_component_create) as (
|
||||
mock_get_components, mock_get_component, mock_create_component, mock_update_component, mock_delete_component):
|
||||
|
@ -639,10 +638,9 @@ class TestKeycloakUserprofile(ModuleTestCase):
|
|||
]
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_components=return_value_get_components_get,
|
||||
update_component=return_value_component_update) as (
|
||||
|
@ -676,10 +674,9 @@ class TestKeycloakUserprofile(ModuleTestCase):
|
|||
]
|
||||
changed = False
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_components=return_value_get_components_get) as (
|
||||
mock_get_components, mock_get_component, mock_create_component, mock_update_component, mock_delete_component):
|
||||
|
@ -844,10 +841,9 @@ class TestKeycloakUserprofile(ModuleTestCase):
|
|||
]
|
||||
changed = True
|
||||
|
||||
set_module_args(module_args)
|
||||
|
||||
# Run the module
|
||||
|
||||
with set_module_args(module_args):
|
||||
with mock_good_connection():
|
||||
with patch_keycloak_api(get_components=return_value_get_components_get, delete_component=return_value_component_delete) as (
|
||||
mock_get_components, mock_get_component, mock_create_component, mock_update_component, mock_delete_component):
|
||||
|
|
|
@ -18,5 +18,5 @@ if not linode.HAS_LINODE:
|
|||
|
||||
def test_name_is_a_required_parameter(api_key, auth):
|
||||
with pytest.raises(SystemExit):
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
linode.main()
|
||||
|
|
|
@ -30,7 +30,7 @@ from .linode_conftest import access_token, no_access_token_in_env, default_args,
|
|||
|
||||
def test_mandatory_state_is_validated(capfd):
|
||||
with pytest.raises(SystemExit):
|
||||
set_module_args({'label': 'foo'})
|
||||
with set_module_args({'label': 'foo'}):
|
||||
linode_v4.initialise_module()
|
||||
|
||||
out, err = capfd.readouterr()
|
||||
|
@ -42,7 +42,7 @@ def test_mandatory_state_is_validated(capfd):
|
|||
|
||||
def test_mandatory_label_is_validated(capfd):
|
||||
with pytest.raises(SystemExit):
|
||||
set_module_args({'state': 'present'})
|
||||
with set_module_args({'state': 'present'}):
|
||||
linode_v4.initialise_module()
|
||||
|
||||
out, err = capfd.readouterr()
|
||||
|
@ -56,7 +56,7 @@ def test_mandatory_access_token_is_validated(default_args,
|
|||
no_access_token_in_env,
|
||||
capfd):
|
||||
with pytest.raises(SystemExit):
|
||||
set_module_args(default_args)
|
||||
with set_module_args(default_args):
|
||||
linode_v4.initialise_module()
|
||||
|
||||
out, err = capfd.readouterr()
|
||||
|
@ -72,7 +72,7 @@ def test_mandatory_access_token_is_validated(default_args,
|
|||
|
||||
def test_mandatory_access_token_passed_in_env(default_args,
|
||||
access_token):
|
||||
set_module_args(default_args)
|
||||
with set_module_args(default_args):
|
||||
|
||||
try:
|
||||
module = linode_v4.initialise_module()
|
||||
|
@ -86,7 +86,7 @@ def test_mandatory_access_token_passed_in_env(default_args,
|
|||
def test_mandatory_access_token_passed_in_as_parameter(default_args,
|
||||
no_access_token_in_env):
|
||||
default_args.update({'access_token': 'foo'})
|
||||
set_module_args(default_args)
|
||||
with set_module_args(default_args):
|
||||
|
||||
try:
|
||||
module = linode_v4.initialise_module()
|
||||
|
@ -98,7 +98,7 @@ def test_mandatory_access_token_passed_in_as_parameter(default_args,
|
|||
|
||||
def test_instance_by_label_cannot_authenticate(capfd, access_token,
|
||||
default_args):
|
||||
set_module_args(default_args)
|
||||
with set_module_args(default_args):
|
||||
module = linode_v4.initialise_module()
|
||||
client = LinodeClient(module.params['access_token'])
|
||||
|
||||
|
@ -116,7 +116,7 @@ def test_instance_by_label_cannot_authenticate(capfd, access_token,
|
|||
|
||||
def test_no_instances_found_with_label_gives_none(default_args,
|
||||
access_token):
|
||||
set_module_args(default_args)
|
||||
with set_module_args(default_args):
|
||||
module = linode_v4.initialise_module()
|
||||
client = LinodeClient(module.params['access_token'])
|
||||
|
||||
|
@ -129,7 +129,7 @@ def test_no_instances_found_with_label_gives_none(default_args,
|
|||
|
||||
def test_optional_region_is_validated(default_args, capfd, access_token):
|
||||
default_args.update({'type': 'foo', 'image': 'bar'})
|
||||
set_module_args(default_args)
|
||||
with set_module_args(default_args):
|
||||
|
||||
with pytest.raises(SystemExit):
|
||||
linode_v4.initialise_module()
|
||||
|
@ -147,7 +147,7 @@ def test_optional_region_is_validated(default_args, capfd, access_token):
|
|||
|
||||
def test_optional_type_is_validated(default_args, capfd, access_token):
|
||||
default_args.update({'region': 'foo', 'image': 'bar'})
|
||||
set_module_args(default_args)
|
||||
with set_module_args(default_args):
|
||||
|
||||
with pytest.raises(SystemExit):
|
||||
linode_v4.initialise_module()
|
||||
|
@ -165,7 +165,7 @@ def test_optional_type_is_validated(default_args, capfd, access_token):
|
|||
|
||||
def test_optional_image_is_validated(default_args, capfd, access_token):
|
||||
default_args.update({'type': 'foo', 'region': 'bar'})
|
||||
set_module_args(default_args)
|
||||
with set_module_args(default_args):
|
||||
|
||||
with pytest.raises(SystemExit):
|
||||
linode_v4.initialise_module()
|
||||
|
@ -184,7 +184,7 @@ def test_optional_image_is_validated(default_args, capfd, access_token):
|
|||
@pytest.mark.parametrize('value', [True, False])
|
||||
def test_private_ip_valid_values(default_args, access_token, value):
|
||||
default_args.update({'private_ip': value})
|
||||
set_module_args(default_args)
|
||||
with set_module_args(default_args):
|
||||
|
||||
module = linode_v4.initialise_module()
|
||||
|
||||
|
@ -194,7 +194,7 @@ def test_private_ip_valid_values(default_args, access_token, value):
|
|||
@pytest.mark.parametrize('value', ['not-a-bool', 42])
|
||||
def test_private_ip_invalid_values(default_args, capfd, access_token, value):
|
||||
default_args.update({'private_ip': value})
|
||||
set_module_args(default_args)
|
||||
with set_module_args(default_args):
|
||||
|
||||
with pytest.raises(SystemExit):
|
||||
linode_v4.initialise_module()
|
||||
|
@ -208,7 +208,7 @@ def test_private_ip_invalid_values(default_args, capfd, access_token, value):
|
|||
|
||||
def test_private_ip_default_value(default_args, access_token):
|
||||
default_args.pop('private_ip', None)
|
||||
set_module_args(default_args)
|
||||
with set_module_args(default_args):
|
||||
|
||||
module = linode_v4.initialise_module()
|
||||
|
||||
|
@ -217,7 +217,7 @@ def test_private_ip_default_value(default_args, access_token):
|
|||
|
||||
def test_private_ip_is_forwarded_to_linode(default_args, mock_linode, access_token):
|
||||
default_args.update({'private_ip': True})
|
||||
set_module_args(default_args)
|
||||
with set_module_args(default_args):
|
||||
|
||||
target = 'linode_api4.linode_client.LinodeGroup.instances'
|
||||
with mock.patch(target, return_value=[]):
|
||||
|
@ -239,7 +239,7 @@ def test_instance_already_created(default_args,
|
|||
'region': 'bar',
|
||||
'image': 'baz'
|
||||
})
|
||||
set_module_args(default_args)
|
||||
with set_module_args(default_args):
|
||||
|
||||
target = 'linode_api4.linode_client.LinodeGroup.instances'
|
||||
with mock.patch(target, return_value=[mock_linode]):
|
||||
|
@ -268,7 +268,7 @@ def test_instance_to_be_created_without_root_pass(default_args,
|
|||
'region': 'bar',
|
||||
'image': 'baz'
|
||||
})
|
||||
set_module_args(default_args)
|
||||
with set_module_args(default_args):
|
||||
|
||||
target = 'linode_api4.linode_client.LinodeGroup.instances'
|
||||
with mock.patch(target, return_value=[]):
|
||||
|
@ -300,7 +300,7 @@ def test_instance_to_be_created_with_root_pass(default_args,
|
|||
'image': 'baz',
|
||||
'root_pass': 'passw0rd',
|
||||
})
|
||||
set_module_args(default_args)
|
||||
with set_module_args(default_args):
|
||||
|
||||
target = 'linode_api4.linode_client.LinodeGroup.instances'
|
||||
with mock.patch(target, return_value=[]):
|
||||
|
@ -327,7 +327,7 @@ def test_instance_to_be_deleted(default_args,
|
|||
capfd,
|
||||
access_token):
|
||||
default_args.update({'state': 'absent'})
|
||||
set_module_args(default_args)
|
||||
with set_module_args(default_args):
|
||||
|
||||
target = 'linode_api4.linode_client.LinodeGroup.instances'
|
||||
with mock.patch(target, return_value=[mock_linode]):
|
||||
|
@ -351,7 +351,7 @@ def test_instance_already_deleted_no_change(default_args,
|
|||
capfd,
|
||||
access_token):
|
||||
default_args.update({'state': 'absent'})
|
||||
set_module_args(default_args)
|
||||
with set_module_args(default_args):
|
||||
|
||||
target = 'linode_api4.linode_client.LinodeGroup.instances'
|
||||
with mock.patch(target, return_value=[]):
|
||||
|
|
|
@ -48,7 +48,7 @@ class TestLvgRename(ModuleTestCase):
|
|||
'vg': 'vg_missing',
|
||||
'vg_new': 'vg_data_testhost2',
|
||||
}
|
||||
set_module_args(args=module_args)
|
||||
with set_module_args(args=module_args):
|
||||
|
||||
with self.assertRaises(AnsibleFailJson) as result:
|
||||
self.module.main()
|
||||
|
@ -67,7 +67,7 @@ class TestLvgRename(ModuleTestCase):
|
|||
'vg': 'Yfj4YG-c8nI-z7w5-B7Fw-i2eM-HqlF-ApFVp0',
|
||||
'vg_new': 'vg_data_testhost2',
|
||||
}
|
||||
set_module_args(args=module_args)
|
||||
with set_module_args(args=module_args):
|
||||
|
||||
with self.assertRaises(AnsibleFailJson) as result:
|
||||
self.module.main()
|
||||
|
@ -86,7 +86,7 @@ class TestLvgRename(ModuleTestCase):
|
|||
'vg': 'vg_data_testhost1',
|
||||
'vg_new': 'vg_sys_testhost2',
|
||||
}
|
||||
set_module_args(args=module_args)
|
||||
with set_module_args(args=module_args):
|
||||
|
||||
with self.assertRaises(AnsibleFailJson) as result:
|
||||
self.module.main()
|
||||
|
@ -109,7 +109,7 @@ class TestLvgRename(ModuleTestCase):
|
|||
'vg': '/dev/vg_data_testhost1',
|
||||
'vg_new': 'vg_data_testhost2',
|
||||
}
|
||||
set_module_args(args=module_args)
|
||||
with set_module_args(args=module_args):
|
||||
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
self.module.main()
|
||||
|
@ -130,7 +130,7 @@ class TestLvgRename(ModuleTestCase):
|
|||
'vg_new': 'vg_data_testhost2',
|
||||
'_ansible_check_mode': True,
|
||||
}
|
||||
set_module_args(args=module_args)
|
||||
with set_module_args(args=module_args):
|
||||
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
self.module.main()
|
||||
|
@ -150,7 +150,7 @@ class TestLvgRename(ModuleTestCase):
|
|||
'vg': 'vg_data_testhostX',
|
||||
'vg_new': 'vg_data_testhost1',
|
||||
}
|
||||
set_module_args(args=module_args)
|
||||
with set_module_args(args=module_args):
|
||||
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
self.module.main()
|
||||
|
|
|
@ -36,11 +36,10 @@ class TestLoadModule(ModuleTestCase):
|
|||
self.mock_get_bin_path.stop()
|
||||
|
||||
def test_load_module_success(self):
|
||||
set_module_args(dict(
|
||||
with set_module_args(dict(
|
||||
name='test',
|
||||
state='present',
|
||||
))
|
||||
|
||||
)):
|
||||
module = build_module()
|
||||
|
||||
self.get_bin_path.side_effect = ['modprobe']
|
||||
|
@ -58,11 +57,10 @@ class TestLoadModule(ModuleTestCase):
|
|||
}
|
||||
|
||||
def test_load_module_unchanged(self):
|
||||
set_module_args(dict(
|
||||
with set_module_args(dict(
|
||||
name='test',
|
||||
state='present',
|
||||
))
|
||||
|
||||
)):
|
||||
module = build_module()
|
||||
|
||||
module.warn = Mock()
|
||||
|
@ -99,11 +97,10 @@ class TestUnloadModule(ModuleTestCase):
|
|||
self.mock_get_bin_path.stop()
|
||||
|
||||
def test_unload_module_success(self):
|
||||
set_module_args(dict(
|
||||
with set_module_args(dict(
|
||||
name='test',
|
||||
state='absent',
|
||||
))
|
||||
|
||||
)):
|
||||
module = build_module()
|
||||
|
||||
self.get_bin_path.side_effect = ['modprobe']
|
||||
|
@ -121,11 +118,10 @@ class TestUnloadModule(ModuleTestCase):
|
|||
}
|
||||
|
||||
def test_unload_module_failure(self):
|
||||
set_module_args(dict(
|
||||
with set_module_args(dict(
|
||||
name='test',
|
||||
state='absent',
|
||||
))
|
||||
|
||||
)):
|
||||
module = build_module()
|
||||
|
||||
module.fail_json = Mock()
|
||||
|
@ -168,12 +164,11 @@ class TestModuleIsLoadedPersistently(ModuleTestCase):
|
|||
|
||||
def test_module_is_loaded(self):
|
||||
|
||||
set_module_args(dict(
|
||||
with set_module_args(dict(
|
||||
name='dummy',
|
||||
state='present',
|
||||
persistent='present'
|
||||
))
|
||||
|
||||
)):
|
||||
module = build_module()
|
||||
|
||||
self.get_bin_path.side_effect = ['modprobe']
|
||||
|
@ -189,12 +184,11 @@ class TestModuleIsLoadedPersistently(ModuleTestCase):
|
|||
|
||||
def test_module_is_not_loaded_empty_file(self):
|
||||
|
||||
set_module_args(dict(
|
||||
with set_module_args(dict(
|
||||
name='dummy',
|
||||
state='present',
|
||||
persistent='present'
|
||||
))
|
||||
|
||||
)):
|
||||
module = build_module()
|
||||
|
||||
self.get_bin_path.side_effect = ['modprobe']
|
||||
|
@ -210,12 +204,11 @@ class TestModuleIsLoadedPersistently(ModuleTestCase):
|
|||
|
||||
def test_module_is_not_loaded_no_files(self):
|
||||
|
||||
set_module_args(dict(
|
||||
with set_module_args(dict(
|
||||
name='dummy',
|
||||
state='present',
|
||||
persistent='present'
|
||||
))
|
||||
|
||||
)):
|
||||
module = build_module()
|
||||
|
||||
self.get_bin_path.side_effect = ['modprobe']
|
||||
|
@ -251,12 +244,11 @@ class TestPermanentParams(ModuleTestCase):
|
|||
]
|
||||
mock_files_content = [mock_open(read_data=content).return_value for content in files_content]
|
||||
|
||||
set_module_args(dict(
|
||||
with set_module_args(dict(
|
||||
name='dummy',
|
||||
state='present',
|
||||
persistent='present'
|
||||
))
|
||||
|
||||
)):
|
||||
module = build_module()
|
||||
|
||||
self.get_bin_path.side_effect = ['modprobe']
|
||||
|
@ -278,12 +270,11 @@ class TestPermanentParams(ModuleTestCase):
|
|||
]
|
||||
mock_files_content = [mock_open(read_data=content).return_value for content in files_content]
|
||||
|
||||
set_module_args(dict(
|
||||
with set_module_args(dict(
|
||||
name='dummy',
|
||||
state='present',
|
||||
persistent='present'
|
||||
))
|
||||
|
||||
)):
|
||||
module = build_module()
|
||||
|
||||
self.get_bin_path.side_effect = ['modprobe']
|
||||
|
@ -314,12 +305,11 @@ class TestCreateModuleFIle(ModuleTestCase):
|
|||
|
||||
def test_create_file(self):
|
||||
|
||||
set_module_args(dict(
|
||||
with set_module_args(dict(
|
||||
name='dummy',
|
||||
state='present',
|
||||
persistent='present'
|
||||
))
|
||||
|
||||
)):
|
||||
module = build_module()
|
||||
|
||||
self.get_bin_path.side_effect = ['modprobe']
|
||||
|
@ -348,13 +338,12 @@ class TestCreateModuleOptionsFIle(ModuleTestCase):
|
|||
|
||||
def test_create_file(self):
|
||||
|
||||
set_module_args(dict(
|
||||
with set_module_args(dict(
|
||||
name='dummy',
|
||||
state='present',
|
||||
params='numdummies=4',
|
||||
persistent='present'
|
||||
))
|
||||
|
||||
)):
|
||||
module = build_module()
|
||||
|
||||
self.get_bin_path.side_effect = ['modprobe']
|
||||
|
@ -384,13 +373,12 @@ class TestDisableOldParams(ModuleTestCase):
|
|||
def test_disable_old_params_file_changed(self):
|
||||
mock_data = 'options dummy numdummies=4'
|
||||
|
||||
set_module_args(dict(
|
||||
with set_module_args(dict(
|
||||
name='dummy',
|
||||
state='present',
|
||||
params='numdummies=4',
|
||||
persistent='present'
|
||||
))
|
||||
|
||||
)):
|
||||
module = build_module()
|
||||
|
||||
self.get_bin_path.side_effect = ['modprobe']
|
||||
|
@ -407,13 +395,12 @@ class TestDisableOldParams(ModuleTestCase):
|
|||
def test_disable_old_params_file_unchanged(self):
|
||||
mock_data = 'options notdummy numdummies=4'
|
||||
|
||||
set_module_args(dict(
|
||||
with set_module_args(dict(
|
||||
name='dummy',
|
||||
state='present',
|
||||
params='numdummies=4',
|
||||
persistent='present'
|
||||
))
|
||||
|
||||
)):
|
||||
module = build_module()
|
||||
|
||||
self.get_bin_path.side_effect = ['modprobe']
|
||||
|
@ -443,13 +430,12 @@ class TestDisableModulePermanent(ModuleTestCase):
|
|||
|
||||
def test_disable_module_permanent_file_changed(self):
|
||||
|
||||
set_module_args(dict(
|
||||
with set_module_args(dict(
|
||||
name='dummy',
|
||||
state='present',
|
||||
params='numdummies=4',
|
||||
persistent='present'
|
||||
))
|
||||
|
||||
)):
|
||||
module = build_module()
|
||||
|
||||
self.get_bin_path.side_effect = ['modprobe']
|
||||
|
@ -465,13 +451,12 @@ class TestDisableModulePermanent(ModuleTestCase):
|
|||
|
||||
def test_disable_module_permanent_file_unchanged(self):
|
||||
|
||||
set_module_args(dict(
|
||||
with set_module_args(dict(
|
||||
name='dummy',
|
||||
state='present',
|
||||
params='numdummies=4',
|
||||
persistent='present'
|
||||
))
|
||||
|
||||
)):
|
||||
module = build_module()
|
||||
|
||||
self.get_bin_path.side_effect = ['modprobe']
|
||||
|
|
|
@ -11,9 +11,7 @@ __metaclass__ = type
|
|||
import nomad
|
||||
from ansible_collections.community.general.plugins.modules import nomad_token
|
||||
from ansible_collections.community.general.tests.unit.compat.mock import patch
|
||||
from ansible_collections.community.general.tests.unit.plugins.modules.utils import AnsibleExitJson, AnsibleFailJson, \
|
||||
ModuleTestCase, \
|
||||
set_module_args
|
||||
from ansible_collections.community.general.tests.unit.plugins.modules.utils import AnsibleExitJson, AnsibleFailJson, ModuleTestCase, set_module_args
|
||||
|
||||
|
||||
def mock_acl_get_tokens(empty_list=False):
|
||||
|
@ -102,7 +100,7 @@ class TestNomadTokenModule(ModuleTestCase):
|
|||
|
||||
def test_should_fail_without_parameters(self):
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
self.module.main()
|
||||
|
||||
def test_should_create_token_type_client(self):
|
||||
|
@ -113,7 +111,7 @@ class TestNomadTokenModule(ModuleTestCase):
|
|||
'state': 'present'
|
||||
}
|
||||
|
||||
set_module_args(module_args)
|
||||
with set_module_args(module_args):
|
||||
with patch.object(nomad.api.acl.Acl, 'get_tokens', return_value=mock_acl_get_tokens()) as mock_get_tokens:
|
||||
with patch.object(nomad.api.acl.Acl, 'create_token', return_value=mock_acl_create_update_token()) as \
|
||||
mock_create_update_token:
|
||||
|
@ -130,7 +128,7 @@ class TestNomadTokenModule(ModuleTestCase):
|
|||
'state': 'present'
|
||||
}
|
||||
|
||||
set_module_args(module_args)
|
||||
with set_module_args(module_args):
|
||||
|
||||
with patch.object(nomad.api.acl.Acl, 'get_tokens') as mock_get_tokens:
|
||||
with patch.object(nomad.api.Acl, 'generate_bootstrap') as mock_generate_bootstrap:
|
||||
|
@ -149,7 +147,7 @@ class TestNomadTokenModule(ModuleTestCase):
|
|||
'state': 'absent'
|
||||
}
|
||||
|
||||
set_module_args(module_args)
|
||||
with set_module_args(module_args):
|
||||
with patch.object(nomad.api.acl.Acl, 'get_tokens') as mock_get_tokens:
|
||||
with patch.object(nomad.api.acl.Acl, 'delete_token') as mock_delete_token:
|
||||
mock_get_tokens.return_value = mock_acl_get_tokens()
|
||||
|
@ -165,7 +163,7 @@ class TestNomadTokenModule(ModuleTestCase):
|
|||
'state': 'absent'
|
||||
}
|
||||
|
||||
set_module_args(module_args)
|
||||
with set_module_args(module_args):
|
||||
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
self.module.main()
|
||||
|
@ -177,7 +175,7 @@ class TestNomadTokenModule(ModuleTestCase):
|
|||
'state': 'absent'
|
||||
}
|
||||
|
||||
set_module_args(module_args)
|
||||
with set_module_args(module_args):
|
||||
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
self.module.main()
|
||||
|
@ -189,7 +187,7 @@ class TestNomadTokenModule(ModuleTestCase):
|
|||
'state': 'absent'
|
||||
}
|
||||
|
||||
set_module_args(module_args)
|
||||
with set_module_args(module_args):
|
||||
|
||||
with patch.object(nomad.api.acl.Acl, 'get_tokens') as mock_get_tokens:
|
||||
with patch.object(nomad.api.acl.Acl, 'delete_token') as mock_delete_token:
|
||||
|
@ -209,7 +207,7 @@ class TestNomadTokenModule(ModuleTestCase):
|
|||
'state': 'present'
|
||||
}
|
||||
|
||||
set_module_args(module_args)
|
||||
with set_module_args(module_args):
|
||||
|
||||
with patch.object(nomad.api.acl.Acl, 'get_tokens') as mock_get_tokens:
|
||||
with patch.object(nomad.api.acl.Acl, 'update_token') as mock_create_update_token:
|
||||
|
|
|
@ -34,11 +34,11 @@ class NPMModuleTestCase(ModuleTestCase):
|
|||
return exc.exception.args[0]
|
||||
|
||||
def test_present(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'name': 'coffee-script',
|
||||
'global': 'true',
|
||||
'state': 'present'
|
||||
})
|
||||
}):
|
||||
self.module_main_command.side_effect = [
|
||||
(0, '{}', ''),
|
||||
(0, '{}', ''),
|
||||
|
@ -53,11 +53,11 @@ class NPMModuleTestCase(ModuleTestCase):
|
|||
])
|
||||
|
||||
def test_present_missing(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'name': 'coffee-script',
|
||||
'global': 'true',
|
||||
'state': 'present',
|
||||
})
|
||||
}):
|
||||
self.module_main_command.side_effect = [
|
||||
(0, '{"dependencies": {"coffee-script": {"missing" : true}}}', ''),
|
||||
(0, '{}', ''),
|
||||
|
@ -72,12 +72,12 @@ class NPMModuleTestCase(ModuleTestCase):
|
|||
])
|
||||
|
||||
def test_present_version(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'name': 'coffee-script',
|
||||
'global': 'true',
|
||||
'state': 'present',
|
||||
'version': '2.5.1'
|
||||
})
|
||||
}):
|
||||
self.module_main_command.side_effect = [
|
||||
(0, '{}', ''),
|
||||
(0, '{}', ''),
|
||||
|
@ -92,12 +92,12 @@ class NPMModuleTestCase(ModuleTestCase):
|
|||
])
|
||||
|
||||
def test_present_version_update(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'name': 'coffee-script',
|
||||
'global': 'true',
|
||||
'state': 'present',
|
||||
'version': '2.5.1'
|
||||
})
|
||||
}):
|
||||
self.module_main_command.side_effect = [
|
||||
(0, '{"dependencies": {"coffee-script": {"version" : "2.5.0"}}}', ''),
|
||||
(0, '{}', ''),
|
||||
|
@ -112,12 +112,12 @@ class NPMModuleTestCase(ModuleTestCase):
|
|||
])
|
||||
|
||||
def test_present_version_exists(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'name': 'coffee-script',
|
||||
'global': 'true',
|
||||
'state': 'present',
|
||||
'version': '2.5.1'
|
||||
})
|
||||
}):
|
||||
self.module_main_command.side_effect = [
|
||||
(0, '{"dependencies": {"coffee-script": {"version" : "2.5.1"}}}', ''),
|
||||
(0, '{}', ''),
|
||||
|
@ -131,11 +131,11 @@ class NPMModuleTestCase(ModuleTestCase):
|
|||
])
|
||||
|
||||
def test_absent(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'name': 'coffee-script',
|
||||
'global': 'true',
|
||||
'state': 'absent'
|
||||
})
|
||||
}):
|
||||
self.module_main_command.side_effect = [
|
||||
(0, '{"dependencies": {"coffee-script": {"version" : "2.5.1"}}}', ''),
|
||||
(0, '{}', ''),
|
||||
|
@ -150,12 +150,12 @@ class NPMModuleTestCase(ModuleTestCase):
|
|||
])
|
||||
|
||||
def test_absent_version(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'name': 'coffee-script',
|
||||
'global': 'true',
|
||||
'state': 'absent',
|
||||
'version': '2.5.1'
|
||||
})
|
||||
}):
|
||||
self.module_main_command.side_effect = [
|
||||
(0, '{"dependencies": {"coffee-script": {"version" : "2.5.1"}}}', ''),
|
||||
(0, '{}', ''),
|
||||
|
@ -170,12 +170,12 @@ class NPMModuleTestCase(ModuleTestCase):
|
|||
])
|
||||
|
||||
def test_absent_version_different(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'name': 'coffee-script',
|
||||
'global': 'true',
|
||||
'state': 'absent',
|
||||
'version': '2.5.1'
|
||||
})
|
||||
}):
|
||||
self.module_main_command.side_effect = [
|
||||
(0, '{"dependencies": {"coffee-script": {"version" : "2.5.0"}}}', ''),
|
||||
(0, '{}', ''),
|
||||
|
@ -190,10 +190,10 @@ class NPMModuleTestCase(ModuleTestCase):
|
|||
])
|
||||
|
||||
def test_present_package_json(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'global': 'true',
|
||||
'state': 'present'
|
||||
})
|
||||
}):
|
||||
self.module_main_command.side_effect = [
|
||||
(0, '{}', ''),
|
||||
(0, '{}', ''),
|
||||
|
@ -207,11 +207,11 @@ class NPMModuleTestCase(ModuleTestCase):
|
|||
])
|
||||
|
||||
def test_present_package_json_production(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'production': 'true',
|
||||
'global': 'true',
|
||||
'state': 'present',
|
||||
})
|
||||
}):
|
||||
self.module_main_command.side_effect = [
|
||||
(0, '{}', ''),
|
||||
(0, '{}', ''),
|
||||
|
@ -225,11 +225,11 @@ class NPMModuleTestCase(ModuleTestCase):
|
|||
])
|
||||
|
||||
def test_present_package_json_ci(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'ci': 'true',
|
||||
'global': 'true',
|
||||
'state': 'present'
|
||||
})
|
||||
}):
|
||||
self.module_main_command.side_effect = [
|
||||
(0, '{}', ''),
|
||||
(0, '{}', ''),
|
||||
|
@ -243,12 +243,12 @@ class NPMModuleTestCase(ModuleTestCase):
|
|||
])
|
||||
|
||||
def test_present_package_json_ci_production(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'ci': 'true',
|
||||
'production': 'true',
|
||||
'global': 'true',
|
||||
'state': 'present'
|
||||
})
|
||||
}):
|
||||
self.module_main_command.side_effect = [
|
||||
(0, '{}', ''),
|
||||
(0, '{}', ''),
|
||||
|
|
|
@ -188,19 +188,19 @@ class TestOcapiCommand(unittest.TestCase):
|
|||
|
||||
def test_module_fail_when_required_args_missing(self):
|
||||
with self.assertRaises(AnsibleFailJson) as ansible_fail_json:
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
module.main()
|
||||
self.assertIn("missing required arguments:", get_exception_message(ansible_fail_json))
|
||||
|
||||
def test_module_fail_when_unknown_category(self):
|
||||
with self.assertRaises(AnsibleFailJson) as ansible_fail_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'unknown',
|
||||
'command': 'IndicatorLedOn',
|
||||
'username': 'USERID',
|
||||
'password': 'PASSW0RD=21',
|
||||
'baseuri': MOCK_BASE_URI
|
||||
})
|
||||
}):
|
||||
module.main()
|
||||
self.assertIn("Invalid Category 'unknown", get_exception_message(ansible_fail_json))
|
||||
|
||||
|
@ -210,13 +210,13 @@ class TestOcapiCommand(unittest.TestCase):
|
|||
get_request=mock_get_request,
|
||||
put_request=mock_put_request):
|
||||
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Chassis',
|
||||
'command': 'PowerModeLow',
|
||||
'baseuri': MOCK_BASE_URI,
|
||||
'username': 'USERID',
|
||||
'password': 'PASSWORD=21'
|
||||
})
|
||||
}):
|
||||
module.main()
|
||||
self.assertEqual(ACTION_WAS_SUCCESSFUL, get_exception_message(ansible_exit_json))
|
||||
self.assertTrue(is_changed(ansible_exit_json))
|
||||
|
@ -227,13 +227,13 @@ class TestOcapiCommand(unittest.TestCase):
|
|||
get_request=mock_get_request,
|
||||
put_request=mock_put_request):
|
||||
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Chassis',
|
||||
'command': 'IndicatorLedOn',
|
||||
'baseuri': MOCK_BASE_URI,
|
||||
'username': 'USERID',
|
||||
'password': 'PASSWORD=21'
|
||||
})
|
||||
}):
|
||||
module.main()
|
||||
self.assertEqual(ACTION_WAS_SUCCESSFUL, get_exception_message(ansible_exit_json))
|
||||
self.assertTrue(is_changed(ansible_exit_json))
|
||||
|
@ -244,13 +244,13 @@ class TestOcapiCommand(unittest.TestCase):
|
|||
get_request=mock_get_request,
|
||||
put_request=mock_invalid_http_request):
|
||||
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Chassis',
|
||||
'command': 'PowerModeNormal',
|
||||
'baseuri': MOCK_BASE_URI,
|
||||
'username': 'USERID',
|
||||
'password': 'PASSWORD=21'
|
||||
})
|
||||
}):
|
||||
module.main()
|
||||
self.assertEqual(ACTION_WAS_SUCCESSFUL, get_exception_message(ansible_exit_json))
|
||||
self.assertFalse(is_changed(ansible_exit_json))
|
||||
|
@ -261,14 +261,14 @@ class TestOcapiCommand(unittest.TestCase):
|
|||
get_request=mock_get_request,
|
||||
put_request=mock_invalid_http_request):
|
||||
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Chassis',
|
||||
'command': 'IndicatorLedOn',
|
||||
'baseuri': MOCK_BASE_URI,
|
||||
'username': 'USERID',
|
||||
'password': 'PASSWORD=21',
|
||||
'_ansible_check_mode': True
|
||||
})
|
||||
}):
|
||||
module.main()
|
||||
self.assertEqual(UPDATE_NOT_PERFORMED_IN_CHECK_MODE, get_exception_message(ansible_exit_json))
|
||||
self.assertTrue(is_changed(ansible_exit_json))
|
||||
|
@ -279,14 +279,14 @@ class TestOcapiCommand(unittest.TestCase):
|
|||
get_request=mock_get_request,
|
||||
put_request=mock_invalid_http_request):
|
||||
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Chassis',
|
||||
'command': 'IndicatorLedOn',
|
||||
'baseuri': MOCK_BASE_URI,
|
||||
'username': 'USERID',
|
||||
'password': 'PASSWORD=21',
|
||||
'_ansible_check_mode': True
|
||||
})
|
||||
}):
|
||||
module.main()
|
||||
self.assertEqual(UPDATE_NOT_PERFORMED_IN_CHECK_MODE, get_exception_message(ansible_exit_json))
|
||||
self.assertTrue(is_changed(ansible_exit_json))
|
||||
|
@ -297,13 +297,13 @@ class TestOcapiCommand(unittest.TestCase):
|
|||
get_request=mock_get_request,
|
||||
put_request=mock_invalid_http_request):
|
||||
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Chassis',
|
||||
'command': 'IndicatorLedOff',
|
||||
'baseuri': MOCK_BASE_URI,
|
||||
'username': 'USERID',
|
||||
'password': 'PASSWORD=21'
|
||||
})
|
||||
}):
|
||||
module.main()
|
||||
self.assertEqual(ACTION_WAS_SUCCESSFUL, get_exception_message(ansible_exit_json))
|
||||
self.assertFalse(is_changed(ansible_exit_json))
|
||||
|
@ -314,14 +314,14 @@ class TestOcapiCommand(unittest.TestCase):
|
|||
get_request=mock_get_request,
|
||||
put_request=mock_invalid_http_request):
|
||||
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Chassis',
|
||||
'command': 'IndicatorLedOff',
|
||||
'baseuri': MOCK_BASE_URI,
|
||||
'username': 'USERID',
|
||||
'password': 'PASSWORD=21',
|
||||
"_ansible_check_mode": True
|
||||
})
|
||||
}):
|
||||
module.main()
|
||||
self.assertEqual(NO_ACTION_PERFORMED_IN_CHECK_MODE, get_exception_message(ansible_exit_json))
|
||||
self.assertFalse(is_changed(ansible_exit_json))
|
||||
|
@ -331,13 +331,13 @@ class TestOcapiCommand(unittest.TestCase):
|
|||
get_request=mock_get_request,
|
||||
put_request=mock_put_request):
|
||||
with self.assertRaises(AnsibleFailJson) as ansible_fail_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Chassis',
|
||||
'command': 'IndicatorLedBright',
|
||||
'baseuri': MOCK_BASE_URI,
|
||||
'username': 'USERID',
|
||||
'password': 'PASSWORD=21'
|
||||
})
|
||||
}):
|
||||
module.main()
|
||||
self.assertIn("Invalid Command", get_exception_message(ansible_fail_json))
|
||||
|
||||
|
@ -346,13 +346,13 @@ class TestOcapiCommand(unittest.TestCase):
|
|||
get_request=mock_get_request,
|
||||
put_request=mock_put_request):
|
||||
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Systems',
|
||||
'command': 'PowerGracefulRestart',
|
||||
'baseuri': MOCK_BASE_URI,
|
||||
'username': 'USERID',
|
||||
'password': 'PASSWORD=21'
|
||||
})
|
||||
}):
|
||||
module.main()
|
||||
self.assertEqual(ACTION_WAS_SUCCESSFUL, get_exception_message(ansible_exit_json))
|
||||
self.assertTrue(is_changed(ansible_exit_json))
|
||||
|
@ -362,14 +362,14 @@ class TestOcapiCommand(unittest.TestCase):
|
|||
get_request=mock_get_request,
|
||||
put_request=mock_invalid_http_request):
|
||||
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Systems',
|
||||
'command': 'PowerGracefulRestart',
|
||||
'baseuri': MOCK_BASE_URI,
|
||||
'username': 'USERID',
|
||||
'password': 'PASSWORD=21',
|
||||
"_ansible_check_mode": True
|
||||
})
|
||||
}):
|
||||
module.main()
|
||||
self.assertEqual(UPDATE_NOT_PERFORMED_IN_CHECK_MODE, get_exception_message(ansible_exit_json))
|
||||
self.assertTrue(is_changed(ansible_exit_json))
|
||||
|
@ -379,13 +379,13 @@ class TestOcapiCommand(unittest.TestCase):
|
|||
get_request=mock_get_request,
|
||||
put_request=mock_put_request):
|
||||
with self.assertRaises(AnsibleFailJson) as ansible_fail_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Update',
|
||||
'command': 'FWUpload',
|
||||
'baseuri': MOCK_BASE_URI,
|
||||
'username': 'USERID',
|
||||
'password': 'PASSWORD=21'
|
||||
})
|
||||
}):
|
||||
module.main()
|
||||
self.assertEqual("Missing update_image_path.", get_exception_message(ansible_fail_json))
|
||||
|
||||
|
@ -394,14 +394,14 @@ class TestOcapiCommand(unittest.TestCase):
|
|||
get_request=mock_get_request,
|
||||
put_request=mock_invalid_http_request):
|
||||
with self.assertRaises(AnsibleFailJson) as ansible_fail_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Update',
|
||||
'command': 'FWUpload',
|
||||
'update_image_path': 'nonexistentfile.bin',
|
||||
'baseuri': MOCK_BASE_URI,
|
||||
'username': 'USERID',
|
||||
'password': 'PASSWORD=21'
|
||||
})
|
||||
}):
|
||||
module.main()
|
||||
self.assertEqual("File does not exist.", get_exception_message(ansible_fail_json))
|
||||
|
||||
|
@ -417,14 +417,14 @@ class TestOcapiCommand(unittest.TestCase):
|
|||
put_request=mock_put_request,
|
||||
post_request=mock_post_request):
|
||||
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Update',
|
||||
'command': 'FWUpload',
|
||||
'update_image_path': filepath,
|
||||
'baseuri': MOCK_BASE_URI,
|
||||
'username': 'USERID',
|
||||
'password': 'PASSWORD=21'
|
||||
})
|
||||
}):
|
||||
module.main()
|
||||
self.assertEqual(ACTION_WAS_SUCCESSFUL, get_exception_message(ansible_exit_json))
|
||||
self.assertTrue(is_changed(ansible_exit_json))
|
||||
|
@ -441,7 +441,7 @@ class TestOcapiCommand(unittest.TestCase):
|
|||
put_request=mock_put_request,
|
||||
post_request=mock_invalid_http_request):
|
||||
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Update',
|
||||
'command': 'FWUpload',
|
||||
'update_image_path': filepath,
|
||||
|
@ -449,7 +449,7 @@ class TestOcapiCommand(unittest.TestCase):
|
|||
'username': 'USERID',
|
||||
'password': 'PASSWORD=21',
|
||||
"_ansible_check_mode": True
|
||||
})
|
||||
}):
|
||||
module.main()
|
||||
self.assertEqual(UPDATE_NOT_PERFORMED_IN_CHECK_MODE, get_exception_message(ansible_exit_json))
|
||||
self.assertTrue(is_changed(ansible_exit_json))
|
||||
|
@ -460,13 +460,13 @@ class TestOcapiCommand(unittest.TestCase):
|
|||
put_request=mock_put_request,
|
||||
post_request=mock_invalid_http_request):
|
||||
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Update',
|
||||
'command': 'FWUpdate',
|
||||
'baseuri': MOCK_BASE_URI,
|
||||
'username': 'USERID',
|
||||
'password': 'PASSWORD=21'
|
||||
})
|
||||
}):
|
||||
module.main()
|
||||
self.assertEqual(ACTION_WAS_SUCCESSFUL, get_exception_message(ansible_exit_json))
|
||||
self.assertTrue(is_changed(ansible_exit_json))
|
||||
|
@ -477,14 +477,14 @@ class TestOcapiCommand(unittest.TestCase):
|
|||
put_request=mock_invalid_http_request,
|
||||
post_request=mock_invalid_http_request):
|
||||
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Update',
|
||||
'command': 'FWUpdate',
|
||||
'baseuri': MOCK_BASE_URI,
|
||||
'username': 'USERID',
|
||||
'password': 'PASSWORD=21',
|
||||
"_ansible_check_mode": True
|
||||
})
|
||||
}):
|
||||
module.main()
|
||||
self.assertEqual(UPDATE_NOT_PERFORMED_IN_CHECK_MODE, get_exception_message(ansible_exit_json))
|
||||
self.assertTrue(is_changed(ansible_exit_json))
|
||||
|
@ -495,13 +495,13 @@ class TestOcapiCommand(unittest.TestCase):
|
|||
put_request=mock_put_request,
|
||||
post_request=mock_invalid_http_request):
|
||||
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Update',
|
||||
'command': 'FWActivate',
|
||||
'baseuri': MOCK_BASE_URI,
|
||||
'username': 'USERID',
|
||||
'password': 'PASSWORD=21'
|
||||
})
|
||||
}):
|
||||
module.main()
|
||||
self.assertEqual(ACTION_WAS_SUCCESSFUL, get_exception_message(ansible_exit_json))
|
||||
self.assertTrue(is_changed(ansible_exit_json))
|
||||
|
@ -512,14 +512,14 @@ class TestOcapiCommand(unittest.TestCase):
|
|||
put_request=mock_invalid_http_request,
|
||||
post_request=mock_invalid_http_request):
|
||||
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Update',
|
||||
'command': 'FWActivate',
|
||||
'baseuri': MOCK_BASE_URI,
|
||||
'username': 'USERID',
|
||||
'password': 'PASSWORD=21',
|
||||
"_ansible_check_mode": True
|
||||
})
|
||||
}):
|
||||
module.main()
|
||||
self.assertEqual(UPDATE_NOT_PERFORMED_IN_CHECK_MODE, get_exception_message(ansible_exit_json))
|
||||
self.assertTrue(is_changed(ansible_exit_json))
|
||||
|
@ -531,14 +531,14 @@ class TestOcapiCommand(unittest.TestCase):
|
|||
put_request=mock_invalid_http_request,
|
||||
post_request=mock_invalid_http_request):
|
||||
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Jobs',
|
||||
'command': 'DeleteJob',
|
||||
'baseuri': MOCK_BASE_URI,
|
||||
'job_name': MOCK_JOB_NAME,
|
||||
'username': 'USERID',
|
||||
'password': 'PASSWORD=21'
|
||||
})
|
||||
}):
|
||||
module.main()
|
||||
self.assertEqual(ACTION_WAS_SUCCESSFUL, get_exception_message(ansible_exit_json))
|
||||
self.assertTrue(is_changed(ansible_exit_json))
|
||||
|
@ -550,14 +550,14 @@ class TestOcapiCommand(unittest.TestCase):
|
|||
put_request=mock_invalid_http_request,
|
||||
post_request=mock_invalid_http_request):
|
||||
with self.assertRaises(AnsibleFailJson) as ansible_fail_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Jobs',
|
||||
'command': 'DeleteJob',
|
||||
'baseuri': MOCK_BASE_URI,
|
||||
'job_name': MOCK_JOB_NAME,
|
||||
'username': 'USERID',
|
||||
'password': 'PASSWORD=21'
|
||||
})
|
||||
}):
|
||||
module.main()
|
||||
self.assertEqual("Cannot delete job because it is in progress.", get_exception_message(ansible_fail_json))
|
||||
|
||||
|
@ -568,14 +568,14 @@ class TestOcapiCommand(unittest.TestCase):
|
|||
put_request=mock_invalid_http_request,
|
||||
post_request=mock_invalid_http_request):
|
||||
with self.assertRaises(AnsibleFailJson) as ansible_fail_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Jobs',
|
||||
'command': 'DeleteJob',
|
||||
'baseuri': MOCK_BASE_URI,
|
||||
'job_name': MOCK_JOB_NAME,
|
||||
'username': 'USERID',
|
||||
'password': 'PASSWORD=21'
|
||||
})
|
||||
}):
|
||||
module.main()
|
||||
self.assertEqual("Cannot delete job because it is in progress.", get_exception_message(ansible_fail_json))
|
||||
|
||||
|
@ -586,7 +586,7 @@ class TestOcapiCommand(unittest.TestCase):
|
|||
put_request=mock_invalid_http_request,
|
||||
post_request=mock_invalid_http_request):
|
||||
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Jobs',
|
||||
'command': 'DeleteJob',
|
||||
'baseuri': MOCK_BASE_URI,
|
||||
|
@ -594,7 +594,7 @@ class TestOcapiCommand(unittest.TestCase):
|
|||
'username': 'USERID',
|
||||
'password': 'PASSWORD=21',
|
||||
'_ansible_check_mode': True
|
||||
})
|
||||
}):
|
||||
module.main()
|
||||
self.assertEqual(UPDATE_NOT_PERFORMED_IN_CHECK_MODE, get_exception_message(ansible_exit_json))
|
||||
self.assertTrue(is_changed(ansible_exit_json))
|
||||
|
@ -606,7 +606,7 @@ class TestOcapiCommand(unittest.TestCase):
|
|||
put_request=mock_invalid_http_request,
|
||||
post_request=mock_invalid_http_request):
|
||||
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Jobs',
|
||||
'command': 'DeleteJob',
|
||||
'baseuri': MOCK_BASE_URI,
|
||||
|
@ -614,7 +614,7 @@ class TestOcapiCommand(unittest.TestCase):
|
|||
'username': 'USERID',
|
||||
'password': 'PASSWORD=21',
|
||||
'_ansible_check_mode': True
|
||||
})
|
||||
}):
|
||||
module.main()
|
||||
self.assertEqual("Job already deleted.", get_exception_message(ansible_exit_json))
|
||||
self.assertFalse(is_changed(ansible_exit_json))
|
||||
|
@ -626,7 +626,7 @@ class TestOcapiCommand(unittest.TestCase):
|
|||
put_request=mock_invalid_http_request,
|
||||
post_request=mock_invalid_http_request):
|
||||
with self.assertRaises(AnsibleFailJson) as ansible_fail_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Jobs',
|
||||
'command': 'DeleteJob',
|
||||
'baseuri': MOCK_BASE_URI,
|
||||
|
@ -634,6 +634,6 @@ class TestOcapiCommand(unittest.TestCase):
|
|||
'username': 'USERID',
|
||||
'password': 'PASSWORD=21',
|
||||
'_ansible_check_mode': True
|
||||
})
|
||||
}):
|
||||
module.main()
|
||||
self.assertEqual("Cannot delete job because it is in progress.", get_exception_message(ansible_fail_json))
|
||||
|
|
|
@ -127,31 +127,31 @@ class TestOcapiInfo(unittest.TestCase):
|
|||
|
||||
def test_module_fail_when_required_args_missing(self):
|
||||
with self.assertRaises(AnsibleFailJson) as ansible_fail_json:
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
module.main()
|
||||
self.assertIn("missing required arguments:", get_exception_message(ansible_fail_json))
|
||||
|
||||
def test_module_fail_when_unknown_category(self):
|
||||
with self.assertRaises(AnsibleFailJson) as ansible_fail_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'unknown',
|
||||
'command': 'JobStatus',
|
||||
'username': 'USERID',
|
||||
'password': 'PASSW0RD=21',
|
||||
'baseuri': MOCK_BASE_URI
|
||||
})
|
||||
}):
|
||||
module.main()
|
||||
self.assertIn("Invalid Category 'unknown", get_exception_message(ansible_fail_json))
|
||||
|
||||
def test_module_fail_when_unknown_command(self):
|
||||
with self.assertRaises(AnsibleFailJson) as ansible_fail_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Jobs',
|
||||
'command': 'unknown',
|
||||
'username': 'USERID',
|
||||
'password': 'PASSW0RD=21',
|
||||
'baseuri': MOCK_BASE_URI
|
||||
})
|
||||
}):
|
||||
module.main()
|
||||
self.assertIn("Invalid Command 'unknown", get_exception_message(ansible_fail_json))
|
||||
|
||||
|
@ -162,14 +162,14 @@ class TestOcapiInfo(unittest.TestCase):
|
|||
delete_request=mock_delete_request,
|
||||
post_request=mock_post_request):
|
||||
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Jobs',
|
||||
'command': 'JobStatus',
|
||||
'job_name': MOCK_JOB_NAME_IN_PROGRESS,
|
||||
'baseuri': MOCK_BASE_URI,
|
||||
'username': 'USERID',
|
||||
'password': 'PASSWORD=21'
|
||||
})
|
||||
}):
|
||||
module.main()
|
||||
self.assertEqual(ACTION_WAS_SUCCESSFUL, get_exception_message(ansible_exit_json))
|
||||
response_data = ansible_exit_json.exception.args[0]
|
||||
|
@ -190,14 +190,14 @@ class TestOcapiInfo(unittest.TestCase):
|
|||
delete_request=mock_delete_request,
|
||||
post_request=mock_post_request):
|
||||
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Jobs',
|
||||
'command': 'JobStatus',
|
||||
'job_name': MOCK_JOB_NAME_COMPLETE,
|
||||
'baseuri': MOCK_BASE_URI,
|
||||
'username': 'USERID',
|
||||
'password': 'PASSWORD=21'
|
||||
})
|
||||
}):
|
||||
module.main()
|
||||
self.assertEqual(ACTION_WAS_SUCCESSFUL, get_exception_message(ansible_exit_json))
|
||||
response_data = ansible_exit_json.exception.args[0]
|
||||
|
@ -218,14 +218,14 @@ class TestOcapiInfo(unittest.TestCase):
|
|||
delete_request=mock_delete_request,
|
||||
post_request=mock_post_request):
|
||||
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Jobs',
|
||||
'command': 'JobStatus',
|
||||
'job_name': MOCK_JOB_NAME_DOES_NOT_EXIST,
|
||||
'baseuri': MOCK_BASE_URI,
|
||||
'username': 'USERID',
|
||||
'password': 'PASSWORD=21'
|
||||
})
|
||||
}):
|
||||
module.main()
|
||||
self.assertEqual(ACTION_WAS_SUCCESSFUL, get_exception_message(ansible_exit_json))
|
||||
response_data = ansible_exit_json.exception.args[0]
|
||||
|
|
|
@ -152,18 +152,18 @@ class TestPacman:
|
|||
|
||||
def test_fail_without_required_args(self):
|
||||
with pytest.raises(AnsibleFailJson) as e:
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
pacman.main()
|
||||
assert e.match(r"one of the following is required")
|
||||
|
||||
def test_success(self, mock_empty_inventory):
|
||||
set_module_args({"update_cache": True}) # Simplest args to let init go through
|
||||
with set_module_args({"update_cache": True}): # Simplest args to let init go through
|
||||
P = pacman.Pacman(pacman.setup_module())
|
||||
with pytest.raises(AnsibleExitJson) as e:
|
||||
P.success()
|
||||
|
||||
def test_fail(self, mock_empty_inventory):
|
||||
set_module_args({"update_cache": True})
|
||||
with set_module_args({"update_cache": True}):
|
||||
P = pacman.Pacman(pacman.setup_module())
|
||||
|
||||
args = dict(
|
||||
|
@ -333,7 +333,7 @@ class TestPacman:
|
|||
def test_build_inventory(self, expected, run_command_side_effect, raises):
|
||||
self.mock_run_command.side_effect = run_command_side_effect
|
||||
|
||||
set_module_args({"update_cache": True})
|
||||
with set_module_args({"update_cache": True}):
|
||||
if raises:
|
||||
with pytest.raises(raises):
|
||||
P = pacman.Pacman(pacman.setup_module())
|
||||
|
@ -344,18 +344,18 @@ class TestPacman:
|
|||
|
||||
@pytest.mark.parametrize("check_mode_value", [True, False])
|
||||
def test_upgrade_check_empty_inventory(self, mock_empty_inventory, check_mode_value):
|
||||
set_module_args({"upgrade": True, "_ansible_check_mode": check_mode_value})
|
||||
with set_module_args({"upgrade": True, "_ansible_check_mode": check_mode_value}):
|
||||
P = pacman.Pacman(pacman.setup_module())
|
||||
with pytest.raises(AnsibleExitJson) as e:
|
||||
P.run()
|
||||
self.mock_run_command.call_count == 0
|
||||
assert self.mock_run_command.call_count == 0
|
||||
out = e.value.args[0]
|
||||
assert "packages" not in out
|
||||
assert not out["changed"]
|
||||
assert "diff" not in out
|
||||
|
||||
def test_update_db_check(self, mock_empty_inventory):
|
||||
set_module_args({"update_cache": True, "_ansible_check_mode": True})
|
||||
with set_module_args({"update_cache": True, "_ansible_check_mode": True}):
|
||||
P = pacman.Pacman(pacman.setup_module())
|
||||
|
||||
with pytest.raises(AnsibleExitJson) as e:
|
||||
|
@ -422,7 +422,7 @@ class TestPacman:
|
|||
def test_update_db(self, module_args, expected_calls, changed):
|
||||
args = {"update_cache": True}
|
||||
args.update(module_args)
|
||||
set_module_args(args)
|
||||
with set_module_args(args):
|
||||
|
||||
self.mock_run_command.side_effect = [
|
||||
(rc, stdout, stderr) for expected_call, kwargs, rc, stdout, stderr in expected_calls
|
||||
|
@ -475,7 +475,7 @@ class TestPacman:
|
|||
args = {"upgrade": True, "_ansible_check_mode": check_mode_value}
|
||||
if upgrade_extra_args:
|
||||
args["upgrade_extra_args"] = upgrade_extra_args
|
||||
set_module_args(args)
|
||||
with set_module_args(args):
|
||||
|
||||
if run_command_data and "return_value" in run_command_data:
|
||||
self.mock_run_command.return_value = run_command_data["return_value"]
|
||||
|
@ -499,13 +499,13 @@ class TestPacman:
|
|||
assert out["diff"]["before"] and out["diff"]["after"]
|
||||
|
||||
def test_upgrade_fail(self, mock_valid_inventory):
|
||||
set_module_args({"upgrade": True})
|
||||
with set_module_args({"upgrade": True}):
|
||||
self.mock_run_command.return_value = [1, "stdout", "stderr"]
|
||||
P = pacman.Pacman(pacman.setup_module())
|
||||
|
||||
with pytest.raises(AnsibleFailJson) as e:
|
||||
P.run()
|
||||
self.mock_run_command.call_count == 1
|
||||
assert self.mock_run_command.call_count == 1
|
||||
out = e.value.args[0]
|
||||
assert out["failed"]
|
||||
assert out["stdout"] == "stdout"
|
||||
|
@ -633,7 +633,7 @@ class TestPacman:
|
|||
def test_package_list(
|
||||
self, mock_valid_inventory, state, pkg_names, expected, run_command_data, raises
|
||||
):
|
||||
set_module_args({"name": pkg_names, "state": state})
|
||||
with set_module_args({"name": pkg_names, "state": state}):
|
||||
P = pacman.Pacman(pacman.setup_module())
|
||||
P.inventory = P._build_inventory()
|
||||
if run_command_data:
|
||||
|
@ -658,7 +658,7 @@ class TestPacman:
|
|||
def test_op_packages_nothing_to_do(
|
||||
self, mock_valid_inventory, mock_package_list, check_mode_value, name, state, package_list
|
||||
):
|
||||
set_module_args({"name": name, "state": state, "_ansible_check_mode": check_mode_value})
|
||||
with set_module_args({"name": name, "state": state, "_ansible_check_mode": check_mode_value}):
|
||||
mock_package_list.return_value = package_list
|
||||
P = pacman.Pacman(pacman.setup_module())
|
||||
with pytest.raises(AnsibleExitJson) as e:
|
||||
|
@ -1079,7 +1079,7 @@ class TestPacman:
|
|||
run_command_data,
|
||||
raises,
|
||||
):
|
||||
set_module_args(module_args)
|
||||
with set_module_args(module_args):
|
||||
self.mock_run_command.side_effect = run_command_data["side_effect"]
|
||||
mock_package_list.return_value = package_list_out
|
||||
|
||||
|
|
|
@ -64,17 +64,17 @@ class TestPagerDutyAlertModule(ModuleTestCase):
|
|||
|
||||
def test_module_fail_when_required_args_missing(self):
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
self.module.main()
|
||||
|
||||
def test_ensure_alert_created_with_minimal_data(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'state': 'triggered',
|
||||
'api_version': 'v2',
|
||||
'integration_key': 'test',
|
||||
'source': 'My Ansible Script',
|
||||
'desc': 'Description for alert'
|
||||
})
|
||||
}):
|
||||
|
||||
with patch.object(pagerduty_alert, 'fetch_url') as fetch_url_mock:
|
||||
fetch_url_mock.return_value = (Response(), {"status": 202})
|
||||
|
@ -95,7 +95,7 @@ class TestPagerDutyAlertModule(ModuleTestCase):
|
|||
assert data['payload']['timestamp'] is not None
|
||||
|
||||
def test_ensure_alert_created_with_full_data(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'api_version': 'v2',
|
||||
'component': 'mysql',
|
||||
'custom_details': {'environment': 'production', 'notes': 'this is a test note'},
|
||||
|
@ -106,7 +106,7 @@ class TestPagerDutyAlertModule(ModuleTestCase):
|
|||
'link_text': 'PagerDuty',
|
||||
'state': 'triggered',
|
||||
'source': 'My Ansible Script',
|
||||
})
|
||||
}):
|
||||
|
||||
with patch.object(pagerduty_alert, 'fetch_url') as fetch_url_mock:
|
||||
fetch_url_mock.return_value = (Response(), {"status": 202})
|
||||
|
@ -130,12 +130,12 @@ class TestPagerDutyAlertModule(ModuleTestCase):
|
|||
assert data['links'][0]['text'] == 'PagerDuty'
|
||||
|
||||
def test_ensure_alert_acknowledged(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'state': 'acknowledged',
|
||||
'api_version': 'v2',
|
||||
'integration_key': 'test',
|
||||
'incident_key': 'incident_test_id',
|
||||
})
|
||||
}):
|
||||
|
||||
with patch.object(pagerduty_alert, 'fetch_url') as fetch_url_mock:
|
||||
fetch_url_mock.return_value = (Response(), {"status": 202})
|
||||
|
|
|
@ -26,14 +26,14 @@ class TestPagerDutyChangeModule(ModuleTestCase):
|
|||
|
||||
def test_module_fail_when_required_args_missing(self):
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
self.module.main()
|
||||
|
||||
def test_ensure_change_event_created_with_minimal_data(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'integration_key': 'test',
|
||||
'summary': 'Testing'
|
||||
})
|
||||
}):
|
||||
|
||||
with patch.object(pagerduty_change, 'fetch_url') as fetch_url_mock:
|
||||
fetch_url_mock.return_value = (None, {"status": 202})
|
||||
|
@ -51,7 +51,7 @@ class TestPagerDutyChangeModule(ModuleTestCase):
|
|||
assert data['payload']['source'] == 'Ansible'
|
||||
|
||||
def test_ensure_change_event_created_with_full_data(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'integration_key': 'test',
|
||||
'summary': 'Testing',
|
||||
'source': 'My Ansible Script',
|
||||
|
@ -61,7 +61,7 @@ class TestPagerDutyChangeModule(ModuleTestCase):
|
|||
'environment': 'production',
|
||||
'link_url': 'https://pagerduty.com',
|
||||
'link_text': 'PagerDuty'
|
||||
})
|
||||
}):
|
||||
|
||||
with patch.object(pagerduty_change, 'fetch_url') as fetch_url_mock:
|
||||
fetch_url_mock.return_value = (None, {"status": 202})
|
||||
|
|
|
@ -187,61 +187,61 @@ class TestParted(ModuleTestCase):
|
|||
self.assertEqual(parse_partition_info(parted_output2, 'MB'), parted_dict2)
|
||||
|
||||
def test_partition_already_exists(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'device': '/dev/sdb',
|
||||
'number': 1,
|
||||
'state': 'present',
|
||||
})
|
||||
}):
|
||||
with patch('ansible_collections.community.general.plugins.modules.parted.get_device_info', return_value=parted_dict1):
|
||||
self.execute_module(changed=False)
|
||||
|
||||
def test_create_new_partition(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'device': '/dev/sdb',
|
||||
'number': 4,
|
||||
'state': 'present',
|
||||
})
|
||||
}):
|
||||
with patch('ansible_collections.community.general.plugins.modules.parted.get_device_info', return_value=parted_dict1):
|
||||
self.execute_module(changed=True, script='unit KiB mkpart primary 0% 100%')
|
||||
|
||||
def test_create_new_partition_1G(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'device': '/dev/sdb',
|
||||
'number': 4,
|
||||
'state': 'present',
|
||||
'part_end': '1GiB',
|
||||
})
|
||||
}):
|
||||
with patch('ansible_collections.community.general.plugins.modules.parted.get_device_info', return_value=parted_dict1):
|
||||
self.execute_module(changed=True, script='unit KiB mkpart primary 0% 1GiB')
|
||||
|
||||
def test_create_new_partition_minus_1G(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'device': '/dev/sdb',
|
||||
'number': 4,
|
||||
'state': 'present',
|
||||
'fs_type': 'ext2',
|
||||
'part_start': '-1GiB',
|
||||
})
|
||||
}):
|
||||
with patch('ansible_collections.community.general.plugins.modules.parted.get_device_info', return_value=parted_dict1):
|
||||
self.execute_module(changed=True, script='unit KiB mkpart primary ext2 -1GiB 100%')
|
||||
|
||||
def test_remove_partition_number_1(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'device': '/dev/sdb',
|
||||
'number': 1,
|
||||
'state': 'absent',
|
||||
})
|
||||
}):
|
||||
with patch('ansible_collections.community.general.plugins.modules.parted.get_device_info', return_value=parted_dict1):
|
||||
self.execute_module(changed=True, script='rm 1')
|
||||
|
||||
def test_resize_partition(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'device': '/dev/sdb',
|
||||
'number': 3,
|
||||
'state': 'present',
|
||||
'part_end': '100%',
|
||||
'resize': True
|
||||
})
|
||||
}):
|
||||
with patch('ansible_collections.community.general.plugins.modules.parted.get_device_info', return_value=parted_dict1):
|
||||
self.execute_module(changed=True, script='resizepart 3 100%')
|
||||
|
||||
|
@ -250,13 +250,13 @@ class TestParted(ModuleTestCase):
|
|||
# Between the two runs, the partition dict is updated.
|
||||
# use checkmode here allow us to continue even if the dictionary is
|
||||
# not updated.
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'device': '/dev/sdb',
|
||||
'number': 3,
|
||||
'state': 'present',
|
||||
'flags': ['lvm', 'boot'],
|
||||
'_ansible_check_mode': True,
|
||||
})
|
||||
}):
|
||||
|
||||
with patch('ansible_collections.community.general.plugins.modules.parted.get_device_info', return_value=parted_dict1):
|
||||
self.parted.reset_mock()
|
||||
|
@ -273,7 +273,7 @@ class TestParted(ModuleTestCase):
|
|||
|
||||
def test_create_new_primary_lvm_partition(self):
|
||||
# use check_mode, see previous test comment
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'device': '/dev/sdb',
|
||||
'number': 4,
|
||||
'flags': ["boot"],
|
||||
|
@ -281,7 +281,7 @@ class TestParted(ModuleTestCase):
|
|||
'part_start': '257GiB',
|
||||
'fs_type': 'ext3',
|
||||
'_ansible_check_mode': True,
|
||||
})
|
||||
}):
|
||||
with patch('ansible_collections.community.general.plugins.modules.parted.get_device_info', return_value=parted_dict1):
|
||||
self.execute_module(changed=True, script='unit KiB mkpart primary ext3 257GiB 100% unit KiB set 4 boot on')
|
||||
|
||||
|
@ -289,7 +289,7 @@ class TestParted(ModuleTestCase):
|
|||
# Like previous test, current implementation use parted to create the partition and
|
||||
# then retrieve and update the dictionary. Use check_mode to force to continue even if
|
||||
# dictionary is not updated.
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'device': '/dev/sdb',
|
||||
'number': 1,
|
||||
'flags': ["lvm"],
|
||||
|
@ -297,46 +297,46 @@ class TestParted(ModuleTestCase):
|
|||
'name': 'lvmpartition',
|
||||
'state': 'present',
|
||||
'_ansible_check_mode': True,
|
||||
})
|
||||
}):
|
||||
with patch('ansible_collections.community.general.plugins.modules.parted.get_device_info', return_value=parted_dict2):
|
||||
self.execute_module(changed=True, script='unit KiB mklabel gpt mkpart primary 0% 100% unit KiB name 1 \'"lvmpartition"\' set 1 lvm on')
|
||||
|
||||
def test_change_label_gpt(self):
|
||||
# When partitions already exists and label is changed, mkpart should be called even when partition already exists,
|
||||
# because new empty label will be created anyway
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'device': '/dev/sdb',
|
||||
'number': 1,
|
||||
'state': 'present',
|
||||
'label': 'gpt',
|
||||
'_ansible_check_mode': True,
|
||||
})
|
||||
}):
|
||||
with patch('ansible_collections.community.general.plugins.modules.parted.get_device_info', return_value=parted_dict1):
|
||||
self.execute_module(changed=True, script='unit KiB mklabel gpt mkpart primary 0% 100%')
|
||||
|
||||
def test_check_mode_unchanged(self):
|
||||
# Test that get_device_info result is checked in check mode too
|
||||
# No change on partition 1
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'device': '/dev/sdb',
|
||||
'number': 1,
|
||||
'state': 'present',
|
||||
'flags': ['some_flag'],
|
||||
'_ansible_check_mode': True,
|
||||
})
|
||||
}):
|
||||
with patch('ansible_collections.community.general.plugins.modules.parted.get_device_info', return_value=parted_dict3):
|
||||
self.execute_module(changed=False)
|
||||
|
||||
def test_check_mode_changed(self):
|
||||
# Test that get_device_info result is checked in check mode too
|
||||
# Flag change on partition 1
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'device': '/dev/sdb',
|
||||
'number': 1,
|
||||
'state': 'present',
|
||||
'flags': ['other_flag'],
|
||||
'_ansible_check_mode': True,
|
||||
})
|
||||
}):
|
||||
with patch('ansible_collections.community.general.plugins.modules.parted.get_device_info', return_value=parted_dict3):
|
||||
self.execute_module(changed=True)
|
||||
|
||||
|
|
|
@ -321,44 +321,44 @@ class TestPmem(ModuleTestCase):
|
|||
|
||||
def test_fail_when_required_args_missing(self):
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
pmem_module.main()
|
||||
|
||||
def test_fail_when_appdirect_only(self):
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'appdirect': 10,
|
||||
})
|
||||
}):
|
||||
pmem_module.main()
|
||||
|
||||
def test_fail_when_MemosyMode_only(self):
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'memorymode': 70,
|
||||
})
|
||||
}):
|
||||
pmem_module.main()
|
||||
|
||||
def test_fail_when_reserved_only(self):
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'reserved': 10,
|
||||
})
|
||||
}):
|
||||
pmem_module.main()
|
||||
|
||||
def test_fail_when_appdirect_memorymode_reserved_total_not_100(self):
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'appdirect': 10,
|
||||
'memorymode': 70,
|
||||
'reserved': 10,
|
||||
})
|
||||
}):
|
||||
pmem_module.main()
|
||||
|
||||
def test_when_appdirect_memorymode(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'appdirect': 10,
|
||||
'memorymode': 70,
|
||||
})
|
||||
}):
|
||||
with patch(
|
||||
'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
|
||||
side_effect=[goal_plain, goal, dimmlist]):
|
||||
|
@ -367,11 +367,11 @@ class TestPmem(ModuleTestCase):
|
|||
self.result_check(result, False, [25769803776], [188978561024], [328230764544])
|
||||
|
||||
def test_when_appdirect_memorymode_reserved(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'appdirect': 10,
|
||||
'memorymode': 70,
|
||||
'reserved': 20,
|
||||
})
|
||||
}):
|
||||
with patch(
|
||||
'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
|
||||
side_effect=[goal_plain, goal, dimmlist]):
|
||||
|
@ -380,12 +380,12 @@ class TestPmem(ModuleTestCase):
|
|||
self.result_check(result, False, [25769803776], [188978561024], [328230764544])
|
||||
|
||||
def test_when_appdirect_notinterleaved_memorymode_reserved(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'appdirect': 10,
|
||||
'appdirect_interleaved': False,
|
||||
'memorymode': 70,
|
||||
'reserved': 20,
|
||||
})
|
||||
}):
|
||||
with patch(
|
||||
'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
|
||||
side_effect=[goal_plain, goal, dimmlist]):
|
||||
|
@ -395,7 +395,7 @@ class TestPmem(ModuleTestCase):
|
|||
|
||||
def test_fail_when_socket_id_appdirect(self):
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'socket': [
|
||||
{
|
||||
'id': 0,
|
||||
|
@ -406,12 +406,12 @@ class TestPmem(ModuleTestCase):
|
|||
'appdirect': 10,
|
||||
},
|
||||
],
|
||||
})
|
||||
}):
|
||||
pmem_module.main()
|
||||
|
||||
def test_fail_when_socket0_id_memorymode_socket1_id_appdirect(self):
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'socket': [
|
||||
{
|
||||
'id': 0,
|
||||
|
@ -422,12 +422,12 @@ class TestPmem(ModuleTestCase):
|
|||
'appdirect': 10,
|
||||
},
|
||||
],
|
||||
})
|
||||
}):
|
||||
pmem_module.main()
|
||||
|
||||
def test_fail_when_socket0_without_id(self):
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'socket': [
|
||||
{
|
||||
'appdirect': 10,
|
||||
|
@ -439,11 +439,11 @@ class TestPmem(ModuleTestCase):
|
|||
'memorymode': 70,
|
||||
},
|
||||
],
|
||||
})
|
||||
}):
|
||||
pmem_module.main()
|
||||
|
||||
def test_when_socket0_and_1_appdirect_memorymode(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'socket': [
|
||||
{
|
||||
'id': 0,
|
||||
|
@ -456,7 +456,7 @@ class TestPmem(ModuleTestCase):
|
|||
'memorymode': 70,
|
||||
},
|
||||
],
|
||||
})
|
||||
}):
|
||||
with patch(
|
||||
'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
|
||||
side_effect=[
|
||||
|
@ -467,7 +467,7 @@ class TestPmem(ModuleTestCase):
|
|||
result, True, [12884901888, 12884901888], [94489280512, 94489280512], [164115382272, 164115382272])
|
||||
|
||||
def test_when_socket0_and_1_appdirect_memorymode_reserved(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'socket': [
|
||||
{
|
||||
'id': 0,
|
||||
|
@ -482,7 +482,7 @@ class TestPmem(ModuleTestCase):
|
|||
'reserved': 20,
|
||||
},
|
||||
],
|
||||
})
|
||||
}):
|
||||
with patch(
|
||||
'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
|
||||
side_effect=[
|
||||
|
@ -493,7 +493,7 @@ class TestPmem(ModuleTestCase):
|
|||
result, True, [12884901888, 12884901888], [94489280512, 94489280512], [164115382272, 164115382272])
|
||||
|
||||
def test_when_socket0_appdirect_notinterleaved_memorymode_reserved_socket1_appdirect_memorymode_reserved(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'socket': [
|
||||
{
|
||||
'id': 0,
|
||||
|
@ -509,7 +509,7 @@ class TestPmem(ModuleTestCase):
|
|||
'reserved': 20,
|
||||
},
|
||||
],
|
||||
})
|
||||
}):
|
||||
with patch(
|
||||
'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
|
||||
side_effect=[
|
||||
|
@ -521,7 +521,7 @@ class TestPmem(ModuleTestCase):
|
|||
|
||||
def test_fail_when_namespace_without_mode(self):
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'namespace': [
|
||||
{
|
||||
'size': '1GB',
|
||||
|
@ -532,12 +532,12 @@ class TestPmem(ModuleTestCase):
|
|||
'type': 'blk',
|
||||
},
|
||||
],
|
||||
})
|
||||
}):
|
||||
pmem_module.main()
|
||||
|
||||
def test_fail_when_region_is_empty(self):
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'namespace': [
|
||||
{
|
||||
'size': '1GB',
|
||||
|
@ -545,7 +545,7 @@ class TestPmem(ModuleTestCase):
|
|||
'mode': 'sector',
|
||||
},
|
||||
],
|
||||
})
|
||||
}):
|
||||
with patch(
|
||||
'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
|
||||
side_effect=[ndctl_region_empty]):
|
||||
|
@ -553,7 +553,7 @@ class TestPmem(ModuleTestCase):
|
|||
|
||||
def test_fail_when_namespace_invalid_size(self):
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'namespace': [
|
||||
{
|
||||
'size': '1XXX',
|
||||
|
@ -561,7 +561,7 @@ class TestPmem(ModuleTestCase):
|
|||
'mode': 'sector',
|
||||
},
|
||||
],
|
||||
})
|
||||
}):
|
||||
with patch(
|
||||
'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
|
||||
side_effect=[ndctl_region]):
|
||||
|
@ -569,7 +569,7 @@ class TestPmem(ModuleTestCase):
|
|||
|
||||
def test_fail_when_size_is_invalid_alignment(self):
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'namespace': [
|
||||
{
|
||||
'size': '400MB',
|
||||
|
@ -582,7 +582,7 @@ class TestPmem(ModuleTestCase):
|
|||
'mode': 'sector'
|
||||
},
|
||||
],
|
||||
})
|
||||
}):
|
||||
with patch(
|
||||
'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
|
||||
side_effect=[ndctl_region]):
|
||||
|
@ -590,7 +590,7 @@ class TestPmem(ModuleTestCase):
|
|||
|
||||
def test_fail_when_blk_is_unsupported_type(self):
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'namespace': [
|
||||
{
|
||||
'size': '4GB',
|
||||
|
@ -603,7 +603,7 @@ class TestPmem(ModuleTestCase):
|
|||
'mode': 'sector'
|
||||
},
|
||||
],
|
||||
})
|
||||
}):
|
||||
with patch(
|
||||
'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
|
||||
side_effect=[ndctl_region]):
|
||||
|
@ -611,7 +611,7 @@ class TestPmem(ModuleTestCase):
|
|||
|
||||
def test_fail_when_size_isnot_set_to_multiple_namespaces(self):
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'namespace': [
|
||||
{
|
||||
'type': 'pmem',
|
||||
|
@ -623,7 +623,7 @@ class TestPmem(ModuleTestCase):
|
|||
'mode': 'sector'
|
||||
},
|
||||
],
|
||||
})
|
||||
}):
|
||||
with patch(
|
||||
'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
|
||||
side_effect=[ndctl_region]):
|
||||
|
@ -631,7 +631,7 @@ class TestPmem(ModuleTestCase):
|
|||
|
||||
def test_fail_when_size_of_namespace_over_available(self):
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'namespace': [
|
||||
{
|
||||
'size': '400GB',
|
||||
|
@ -644,21 +644,21 @@ class TestPmem(ModuleTestCase):
|
|||
'mode': 'sector'
|
||||
},
|
||||
],
|
||||
})
|
||||
}):
|
||||
with patch(
|
||||
'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
|
||||
side_effect=[ndctl_region]):
|
||||
pmem_module.main()
|
||||
|
||||
def test_when_namespace0_without_size(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'namespace': [
|
||||
{
|
||||
'type': 'pmem',
|
||||
'mode': 'sector'
|
||||
},
|
||||
],
|
||||
})
|
||||
}):
|
||||
with patch(
|
||||
'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
|
||||
side_effect=[ndctl_region, ndctl_create_without_size, ndctl_list_N]):
|
||||
|
@ -667,7 +667,7 @@ class TestPmem(ModuleTestCase):
|
|||
self.result_check_ns(result, ndctl_list_N)
|
||||
|
||||
def test_when_namespace0_with_namespace_append(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'namespace': [
|
||||
{
|
||||
'size': '640MB',
|
||||
|
@ -676,7 +676,7 @@ class TestPmem(ModuleTestCase):
|
|||
},
|
||||
],
|
||||
'namespace_append': True,
|
||||
})
|
||||
}):
|
||||
with patch(
|
||||
'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
|
||||
side_effect=[ndctl_region, ndctl_create_640M, ndctl_list_N_two_namespaces]):
|
||||
|
@ -685,7 +685,7 @@ class TestPmem(ModuleTestCase):
|
|||
self.result_check_ns(result, ndctl_list_N_two_namespaces)
|
||||
|
||||
def test_when_namespace0_1GiB_pmem_sector_namespace1_640MiB_pmem_raw(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'namespace': [
|
||||
{
|
||||
'size': '1GB',
|
||||
|
@ -698,7 +698,7 @@ class TestPmem(ModuleTestCase):
|
|||
'mode': 'raw',
|
||||
},
|
||||
],
|
||||
})
|
||||
}):
|
||||
with patch(
|
||||
'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
|
||||
side_effect=[ndctl_region, ndctl_create_1G, ndctl_create_640M, ndctl_list_N_two_namespaces]):
|
||||
|
|
|
@ -64,14 +64,14 @@ class TestPritunlOrg(ModuleTestCase):
|
|||
|
||||
def test_without_parameters(self):
|
||||
"""Test without parameters"""
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
self.module.main()
|
||||
|
||||
def test_present(self):
|
||||
"""Test Pritunl organization creation."""
|
||||
org_params = {"name": "NewOrg"}
|
||||
set_module_args(
|
||||
with set_module_args(
|
||||
dict_merge(
|
||||
{
|
||||
"pritunl_api_token": "token",
|
||||
|
@ -80,7 +80,7 @@ class TestPritunlOrg(ModuleTestCase):
|
|||
},
|
||||
org_params,
|
||||
)
|
||||
)
|
||||
):
|
||||
# Test creation
|
||||
with self.patch_get_pritunl_organizations(
|
||||
side_effect=PritunlListOrganizationMock
|
||||
|
@ -120,7 +120,7 @@ class TestPritunlOrg(ModuleTestCase):
|
|||
def test_absent(self):
|
||||
"""Test organization removal from Pritunl."""
|
||||
org_params = {"name": "NewOrg"}
|
||||
set_module_args(
|
||||
with set_module_args(
|
||||
dict_merge(
|
||||
{
|
||||
"state": "absent",
|
||||
|
@ -130,7 +130,7 @@ class TestPritunlOrg(ModuleTestCase):
|
|||
},
|
||||
org_params,
|
||||
)
|
||||
)
|
||||
):
|
||||
# Test deletion
|
||||
with self.patch_get_pritunl_organizations(
|
||||
side_effect=PritunlListOrganizationAfterPostMock
|
||||
|
@ -172,8 +172,7 @@ class TestPritunlOrg(ModuleTestCase):
|
|||
"pritunl_url": "https://pritunl.domain.com",
|
||||
"name": "GumGum",
|
||||
}
|
||||
set_module_args(module_args)
|
||||
|
||||
with set_module_args(module_args):
|
||||
# Test deletion
|
||||
with self.patch_get_pritunl_organizations(
|
||||
side_effect=PritunlListOrganizationMock
|
||||
|
@ -189,8 +188,7 @@ class TestPritunlOrg(ModuleTestCase):
|
|||
self.assertRegex(failure_exc["msg"], "Can not remove organization")
|
||||
|
||||
# Switch force=True which should run successfully
|
||||
set_module_args(dict_merge(module_args, {"force": True}))
|
||||
|
||||
with set_module_args(dict_merge(module_args, {"force": True})):
|
||||
with self.patch_get_pritunl_organizations(
|
||||
side_effect=PritunlListOrganizationMock
|
||||
) as mock_get:
|
||||
|
|
|
@ -49,7 +49,7 @@ class TestPritunlOrgInfo(ModuleTestCase):
|
|||
with self.patch_get_pritunl_organizations(
|
||||
side_effect=PritunlListOrganizationMock
|
||||
) as org_mock:
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
self.module.main()
|
||||
|
||||
|
@ -61,13 +61,13 @@ class TestPritunlOrgInfo(ModuleTestCase):
|
|||
side_effect=PritunlEmptyOrganizationMock
|
||||
) as org_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
set_module_args(
|
||||
with set_module_args(
|
||||
{
|
||||
"pritunl_api_token": "token",
|
||||
"pritunl_api_secret": "secret",
|
||||
"pritunl_url": "https://pritunl.domain.com",
|
||||
}
|
||||
)
|
||||
):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(org_mock.call_count, 1)
|
||||
|
@ -81,14 +81,14 @@ class TestPritunlOrgInfo(ModuleTestCase):
|
|||
side_effect=PritunlListOrganizationMock
|
||||
) as org_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
set_module_args(
|
||||
with set_module_args(
|
||||
{
|
||||
"pritunl_api_token": "token",
|
||||
"pritunl_api_secret": "secret",
|
||||
"pritunl_url": "https://pritunl.domain.com",
|
||||
"org": "GumGum",
|
||||
}
|
||||
)
|
||||
):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(org_mock.call_count, 1)
|
||||
|
@ -102,14 +102,14 @@ class TestPritunlOrgInfo(ModuleTestCase):
|
|||
side_effect=PritunlListOrganizationMock
|
||||
) as org_mock:
|
||||
with self.assertRaises(AnsibleFailJson) as result:
|
||||
set_module_args(
|
||||
with set_module_args(
|
||||
{
|
||||
"pritunl_api_token": "token",
|
||||
"pritunl_api_secret": "secret",
|
||||
"pritunl_url": "https://pritunl.domain.com",
|
||||
"org": "Unknown",
|
||||
}
|
||||
)
|
||||
):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(org_mock.call_count, 1)
|
||||
|
@ -123,13 +123,13 @@ class TestPritunlOrgInfo(ModuleTestCase):
|
|||
side_effect=PritunlListOrganizationMock
|
||||
) as org_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
set_module_args(
|
||||
with set_module_args(
|
||||
{
|
||||
"pritunl_api_token": "token",
|
||||
"pritunl_api_secret": "secret",
|
||||
"pritunl_url": "https://pritunl.domain.com",
|
||||
}
|
||||
)
|
||||
):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(org_mock.call_count, 1)
|
||||
|
|
|
@ -94,7 +94,7 @@ class TestPritunlUser(ModuleTestCase):
|
|||
|
||||
def test_without_parameters(self):
|
||||
"""Test without parameters"""
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
self.module.main()
|
||||
|
||||
|
@ -105,7 +105,7 @@ class TestPritunlUser(ModuleTestCase):
|
|||
"user_name": "alice",
|
||||
"user_email": "alice@company.com",
|
||||
}
|
||||
set_module_args(
|
||||
with set_module_args(
|
||||
dict_merge(
|
||||
{
|
||||
"pritunl_api_token": "token",
|
||||
|
@ -115,8 +115,7 @@ class TestPritunlUser(ModuleTestCase):
|
|||
},
|
||||
user_params,
|
||||
)
|
||||
)
|
||||
|
||||
):
|
||||
with self.patch_update_pritunl_users(
|
||||
side_effect=PritunlPostUserMock
|
||||
) as post_mock:
|
||||
|
@ -137,7 +136,7 @@ class TestPritunlUser(ModuleTestCase):
|
|||
"user_email": "bob@company.com",
|
||||
"user_disabled": True,
|
||||
}
|
||||
set_module_args(
|
||||
with set_module_args(
|
||||
dict_merge(
|
||||
{
|
||||
"pritunl_api_token": "token",
|
||||
|
@ -147,12 +146,10 @@ class TestPritunlUser(ModuleTestCase):
|
|||
},
|
||||
new_user_params,
|
||||
)
|
||||
)
|
||||
|
||||
):
|
||||
with self.patch_update_pritunl_users(
|
||||
side_effect=PritunlPutUserMock
|
||||
) as put_mock:
|
||||
|
||||
with self.assertRaises(AnsibleExitJson) as update_result:
|
||||
self.module.main()
|
||||
|
||||
|
@ -168,7 +165,7 @@ class TestPritunlUser(ModuleTestCase):
|
|||
@mock_pritunl_api
|
||||
def test_absent(self):
|
||||
"""Test user removal from Pritunl."""
|
||||
set_module_args(
|
||||
with set_module_args(
|
||||
{
|
||||
"state": "absent",
|
||||
"pritunl_api_token": "token",
|
||||
|
@ -177,8 +174,7 @@ class TestPritunlUser(ModuleTestCase):
|
|||
"organization": "GumGum",
|
||||
"user_name": "florian",
|
||||
}
|
||||
)
|
||||
|
||||
):
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
self.module.main()
|
||||
|
||||
|
@ -190,7 +186,7 @@ class TestPritunlUser(ModuleTestCase):
|
|||
@mock_pritunl_api
|
||||
def test_absent_failure(self):
|
||||
"""Test user removal from a non existing organization."""
|
||||
set_module_args(
|
||||
with set_module_args(
|
||||
{
|
||||
"state": "absent",
|
||||
"pritunl_api_token": "token",
|
||||
|
@ -199,8 +195,7 @@ class TestPritunlUser(ModuleTestCase):
|
|||
"organization": "Unknown",
|
||||
"user_name": "floria@company.com",
|
||||
}
|
||||
)
|
||||
|
||||
):
|
||||
with self.assertRaises(AnsibleFailJson) as result:
|
||||
self.module.main()
|
||||
|
||||
|
|
|
@ -59,7 +59,7 @@ class TestPritunlUserInfo(ModuleTestCase):
|
|||
with self.patch_get_pritunl_users(
|
||||
side_effect=PritunlListUserMock
|
||||
) as user_mock:
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
self.module.main()
|
||||
|
||||
|
@ -75,14 +75,14 @@ class TestPritunlUserInfo(ModuleTestCase):
|
|||
side_effect=PritunlListUserMock
|
||||
) as user_mock:
|
||||
with self.assertRaises(AnsibleFailJson) as result:
|
||||
set_module_args(
|
||||
with set_module_args(
|
||||
{
|
||||
"pritunl_api_token": "token",
|
||||
"pritunl_api_secret": "secret",
|
||||
"pritunl_url": "https://pritunl.domain.com",
|
||||
"organization": "Unknown",
|
||||
}
|
||||
)
|
||||
):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(org_mock.call_count, 1)
|
||||
|
@ -103,14 +103,14 @@ class TestPritunlUserInfo(ModuleTestCase):
|
|||
side_effect=PritunlListUserMock
|
||||
) as user_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
set_module_args(
|
||||
with set_module_args(
|
||||
{
|
||||
"pritunl_api_token": "token",
|
||||
"pritunl_api_secret": "secret",
|
||||
"pritunl_url": "https://pritunl.domain.com",
|
||||
"organization": "GumGum",
|
||||
}
|
||||
)
|
||||
):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(org_mock.call_count, 1)
|
||||
|
@ -137,7 +137,7 @@ class TestPritunlUserInfo(ModuleTestCase):
|
|||
side_effect=PritunlListUserMock
|
||||
) as user_mock:
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
set_module_args(
|
||||
with set_module_args(
|
||||
{
|
||||
"pritunl_api_token": "token",
|
||||
"pritunl_api_secret": "secret",
|
||||
|
@ -146,7 +146,7 @@ class TestPritunlUserInfo(ModuleTestCase):
|
|||
"user_name": expected_user_name,
|
||||
"user_type": expected_user_type,
|
||||
}
|
||||
)
|
||||
):
|
||||
self.module.main()
|
||||
|
||||
self.assertEqual(org_mock.call_count, 1)
|
||||
|
|
|
@ -247,18 +247,21 @@ class TestProxmoxBackup(ModuleTestCase):
|
|||
super(TestProxmoxBackup, self).tearDown()
|
||||
|
||||
def test_proxmox_backup_without_argument(self):
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
with pytest.raises(AnsibleFailJson):
|
||||
proxmox_backup.main()
|
||||
|
||||
def test_create_backup_check_mode(self):
|
||||
set_module_args({"api_user": "root@pam",
|
||||
with set_module_args(
|
||||
{
|
||||
"api_user": "root@pam",
|
||||
"api_password": "secret",
|
||||
"api_host": "127.0.0.1",
|
||||
"mode": "all",
|
||||
"storage": "backup",
|
||||
"_ansible_check_mode": True,
|
||||
})
|
||||
}
|
||||
):
|
||||
with pytest.raises(AnsibleExitJson) as exc_info:
|
||||
proxmox_backup.main()
|
||||
|
||||
|
@ -272,12 +275,13 @@ class TestProxmoxBackup(ModuleTestCase):
|
|||
assert self.mock_post_vzdump.call_count == 0
|
||||
|
||||
def test_create_backup_all_mode(self):
|
||||
set_module_args({"api_user": "root@pam",
|
||||
with set_module_args({
|
||||
"api_user": "root@pam",
|
||||
"api_password": "secret",
|
||||
"api_host": "127.0.0.1",
|
||||
"mode": "all",
|
||||
"storage": "backup",
|
||||
})
|
||||
}):
|
||||
with pytest.raises(AnsibleExitJson) as exc_info:
|
||||
proxmox_backup.main()
|
||||
|
||||
|
@ -291,7 +295,8 @@ class TestProxmoxBackup(ModuleTestCase):
|
|||
assert self.mock_post_vzdump.call_count == 3
|
||||
|
||||
def test_create_backup_include_mode_with_wait(self):
|
||||
set_module_args({"api_user": "root@pam",
|
||||
with set_module_args({
|
||||
"api_user": "root@pam",
|
||||
"api_password": "secret",
|
||||
"api_host": "127.0.0.1",
|
||||
"mode": "include",
|
||||
|
@ -299,7 +304,7 @@ class TestProxmoxBackup(ModuleTestCase):
|
|||
"storage": "backup",
|
||||
"vmids": [100],
|
||||
"wait": True
|
||||
})
|
||||
}):
|
||||
with pytest.raises(AnsibleExitJson) as exc_info:
|
||||
proxmox_backup.main()
|
||||
|
||||
|
@ -313,7 +318,8 @@ class TestProxmoxBackup(ModuleTestCase):
|
|||
assert self.mock_post_vzdump.call_count == 1
|
||||
|
||||
def test_fail_insufficient_permissions(self):
|
||||
set_module_args({"api_user": "root@pam",
|
||||
with set_module_args({
|
||||
"api_user": "root@pam",
|
||||
"api_password": "secret",
|
||||
"api_host": "127.0.0.1",
|
||||
"mode": "include",
|
||||
|
@ -321,7 +327,7 @@ class TestProxmoxBackup(ModuleTestCase):
|
|||
"performance_tweaks": "max-workers=2",
|
||||
"vmids": [100],
|
||||
"wait": True
|
||||
})
|
||||
}):
|
||||
with pytest.raises(AnsibleFailJson) as exc_info:
|
||||
proxmox_backup.main()
|
||||
|
||||
|
@ -331,7 +337,8 @@ class TestProxmoxBackup(ModuleTestCase):
|
|||
assert self.mock_post_vzdump.call_count == 0
|
||||
|
||||
def test_fail_missing_node(self):
|
||||
set_module_args({"api_user": "root@pam",
|
||||
with set_module_args({
|
||||
"api_user": "root@pam",
|
||||
"api_password": "secret",
|
||||
"api_host": "127.0.0.1",
|
||||
"mode": "include",
|
||||
|
@ -339,7 +346,7 @@ class TestProxmoxBackup(ModuleTestCase):
|
|||
"node": "nonexistingnode",
|
||||
"vmids": [100],
|
||||
"wait": True
|
||||
})
|
||||
}):
|
||||
with pytest.raises(AnsibleFailJson) as exc_info:
|
||||
proxmox_backup.main()
|
||||
|
||||
|
@ -349,14 +356,15 @@ class TestProxmoxBackup(ModuleTestCase):
|
|||
assert self.mock_post_vzdump.call_count == 0
|
||||
|
||||
def test_fail_missing_storage(self):
|
||||
set_module_args({"api_user": "root@pam",
|
||||
with set_module_args({
|
||||
"api_user": "root@pam",
|
||||
"api_password": "secret",
|
||||
"api_host": "127.0.0.1",
|
||||
"mode": "include",
|
||||
"storage": "nonexistingstorage",
|
||||
"vmids": [100],
|
||||
"wait": True
|
||||
})
|
||||
}):
|
||||
with pytest.raises(AnsibleFailJson) as exc_info:
|
||||
proxmox_backup.main()
|
||||
|
||||
|
|
|
@ -207,7 +207,7 @@ class TestProxmoxBackupInfoModule(ModuleTestCase):
|
|||
|
||||
def test_module_fail_when_required_args_missing(self):
|
||||
with pytest.raises(AnsibleFailJson) as exc_info:
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
self.module.main()
|
||||
|
||||
result = exc_info.value.args[0]
|
||||
|
@ -215,11 +215,11 @@ class TestProxmoxBackupInfoModule(ModuleTestCase):
|
|||
|
||||
def test_get_all_backups_information(self):
|
||||
with pytest.raises(AnsibleExitJson) as exc_info:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'api_host': 'proxmoxhost',
|
||||
'api_user': 'root@pam',
|
||||
'api_password': 'supersecret'
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
result = exc_info.value.args[0]
|
||||
|
@ -231,12 +231,12 @@ class TestProxmoxBackupInfoModule(ModuleTestCase):
|
|||
expected_output = [
|
||||
backup for backup in EXPECTED_BACKUP_OUTPUT if backup["vm_name"] == vmname
|
||||
]
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'api_host': 'proxmoxhost',
|
||||
'api_user': 'root@pam',
|
||||
'api_password': 'supersecret',
|
||||
'vm_name': vmname
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
result = exc_info.value.args[0]
|
||||
|
@ -249,12 +249,12 @@ class TestProxmoxBackupInfoModule(ModuleTestCase):
|
|||
expected_output = [
|
||||
backup for backup in EXPECTED_BACKUP_OUTPUT if backup["vmid"] == vmid
|
||||
]
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'api_host': 'proxmoxhost',
|
||||
'api_user': 'root@pam',
|
||||
'api_password': 'supersecret',
|
||||
'vm_id': vmid
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
result = exc_info.value.args[0]
|
||||
assert result["backup_info"] == expected_output
|
||||
|
@ -263,12 +263,12 @@ class TestProxmoxBackupInfoModule(ModuleTestCase):
|
|||
def test_get_specific_backup_information_by_backupjobs(self):
|
||||
with pytest.raises(AnsibleExitJson) as exc_info:
|
||||
backupjobs = True
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'api_host': 'proxmoxhost',
|
||||
'api_user': 'root@pam',
|
||||
'api_password': 'supersecret',
|
||||
'backup_jobs': backupjobs
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
|
||||
result = exc_info.value.args[0]
|
||||
|
|
|
@ -57,11 +57,11 @@ class TestProxmoxKvmModule(ModuleTestCase):
|
|||
|
||||
def test_module_fail_when_required_args_missing(self):
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
self.module.main()
|
||||
|
||||
def test_module_exits_unchaged_when_provided_vmid_exists(self):
|
||||
set_module_args(
|
||||
with set_module_args(
|
||||
{
|
||||
"api_host": "host",
|
||||
"api_user": "user",
|
||||
|
@ -69,7 +69,7 @@ class TestProxmoxKvmModule(ModuleTestCase):
|
|||
"vmid": "100",
|
||||
"node": "pve",
|
||||
}
|
||||
)
|
||||
):
|
||||
self.get_vm_mock.return_value = [{"vmid": "100"}]
|
||||
with pytest.raises(AnsibleExitJson) as exc_info:
|
||||
self.module.main()
|
||||
|
@ -80,7 +80,7 @@ class TestProxmoxKvmModule(ModuleTestCase):
|
|||
assert result["msg"] == "VM with vmid <100> already exists"
|
||||
|
||||
def test_vm_created_when_vmid_not_exist_but_name_already_exist(self):
|
||||
set_module_args(
|
||||
with set_module_args(
|
||||
{
|
||||
"api_host": "host",
|
||||
"api_user": "user",
|
||||
|
@ -89,7 +89,7 @@ class TestProxmoxKvmModule(ModuleTestCase):
|
|||
"name": "existing.vm.local",
|
||||
"node": "pve",
|
||||
}
|
||||
)
|
||||
):
|
||||
self.get_vm_mock.return_value = None
|
||||
with pytest.raises(AnsibleExitJson) as exc_info:
|
||||
self.module.main()
|
||||
|
@ -101,7 +101,7 @@ class TestProxmoxKvmModule(ModuleTestCase):
|
|||
assert result["msg"] == "VM existing.vm.local with vmid 100 deployed"
|
||||
|
||||
def test_vm_not_created_when_name_already_exist_and_vmid_not_set(self):
|
||||
set_module_args(
|
||||
with set_module_args(
|
||||
{
|
||||
"api_host": "host",
|
||||
"api_user": "user",
|
||||
|
@ -109,7 +109,7 @@ class TestProxmoxKvmModule(ModuleTestCase):
|
|||
"name": "existing.vm.local",
|
||||
"node": "pve",
|
||||
}
|
||||
)
|
||||
):
|
||||
with patch.object(proxmox_utils.ProxmoxAnsible, "get_vmid") as get_vmid_mock:
|
||||
get_vmid_mock.return_value = {
|
||||
"vmid": 100,
|
||||
|
@ -123,7 +123,7 @@ class TestProxmoxKvmModule(ModuleTestCase):
|
|||
assert result["changed"] is False
|
||||
|
||||
def test_vm_created_when_name_doesnt_exist_and_vmid_not_set(self):
|
||||
set_module_args(
|
||||
with set_module_args(
|
||||
{
|
||||
"api_host": "host",
|
||||
"api_user": "user",
|
||||
|
@ -131,7 +131,7 @@ class TestProxmoxKvmModule(ModuleTestCase):
|
|||
"name": "existing.vm.local",
|
||||
"node": "pve",
|
||||
}
|
||||
)
|
||||
):
|
||||
self.get_vm_mock.return_value = None
|
||||
with patch.multiple(
|
||||
proxmox_utils.ProxmoxAnsible, get_vmid=DEFAULT, get_nextvmid=DEFAULT
|
||||
|
|
|
@ -51,7 +51,7 @@ def fake_api(mocker):
|
|||
|
||||
|
||||
def test_proxmox_snap_without_argument(capfd):
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
with pytest.raises(SystemExit) as results:
|
||||
proxmox_snap.main()
|
||||
|
||||
|
@ -62,7 +62,8 @@ def test_proxmox_snap_without_argument(capfd):
|
|||
|
||||
@patch('ansible_collections.community.general.plugins.module_utils.proxmox.ProxmoxAnsible._connect')
|
||||
def test_create_snapshot_check_mode(connect_mock, capfd, mocker):
|
||||
set_module_args({"hostname": "test-lxc",
|
||||
with set_module_args({
|
||||
"hostname": "test-lxc",
|
||||
"api_user": "root@pam",
|
||||
"api_password": "secret",
|
||||
"api_host": "127.0.0.1",
|
||||
|
@ -70,7 +71,8 @@ def test_create_snapshot_check_mode(connect_mock, capfd, mocker):
|
|||
"snapname": "test",
|
||||
"timeout": "1",
|
||||
"force": True,
|
||||
"_ansible_check_mode": True})
|
||||
"_ansible_check_mode": True
|
||||
}):
|
||||
proxmox_utils.HAS_PROXMOXER = True
|
||||
connect_mock.side_effect = lambda: fake_api(mocker)
|
||||
with pytest.raises(SystemExit) as results:
|
||||
|
@ -83,7 +85,8 @@ def test_create_snapshot_check_mode(connect_mock, capfd, mocker):
|
|||
|
||||
@patch('ansible_collections.community.general.plugins.module_utils.proxmox.ProxmoxAnsible._connect')
|
||||
def test_remove_snapshot_check_mode(connect_mock, capfd, mocker):
|
||||
set_module_args({"hostname": "test-lxc",
|
||||
with set_module_args({
|
||||
"hostname": "test-lxc",
|
||||
"api_user": "root@pam",
|
||||
"api_password": "secret",
|
||||
"api_host": "127.0.0.1",
|
||||
|
@ -91,7 +94,8 @@ def test_remove_snapshot_check_mode(connect_mock, capfd, mocker):
|
|||
"snapname": "test",
|
||||
"timeout": "1",
|
||||
"force": True,
|
||||
"_ansible_check_mode": True})
|
||||
"_ansible_check_mode": True
|
||||
}):
|
||||
proxmox_utils.HAS_PROXMOXER = True
|
||||
connect_mock.side_effect = lambda: fake_api(mocker)
|
||||
with pytest.raises(SystemExit) as results:
|
||||
|
@ -104,7 +108,8 @@ def test_remove_snapshot_check_mode(connect_mock, capfd, mocker):
|
|||
|
||||
@patch('ansible_collections.community.general.plugins.module_utils.proxmox.ProxmoxAnsible._connect')
|
||||
def test_rollback_snapshot_check_mode(connect_mock, capfd, mocker):
|
||||
set_module_args({"hostname": "test-lxc",
|
||||
with set_module_args({
|
||||
"hostname": "test-lxc",
|
||||
"api_user": "root@pam",
|
||||
"api_password": "secret",
|
||||
"api_host": "127.0.0.1",
|
||||
|
@ -112,7 +117,8 @@ def test_rollback_snapshot_check_mode(connect_mock, capfd, mocker):
|
|||
"snapname": "test",
|
||||
"timeout": "1",
|
||||
"force": True,
|
||||
"_ansible_check_mode": True})
|
||||
"_ansible_check_mode": True
|
||||
}):
|
||||
proxmox_utils.HAS_PROXMOXER = True
|
||||
connect_mock.side_effect = lambda: fake_api(mocker)
|
||||
with pytest.raises(SystemExit) as results:
|
||||
|
|
|
@ -76,12 +76,12 @@ class TestProxmoxStorageContentsInfo(ModuleTestCase):
|
|||
|
||||
def test_module_fail_when_required_args_missing(self):
|
||||
with pytest.raises(AnsibleFailJson) as exc_info:
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
self.module.main()
|
||||
|
||||
def test_storage_contents_info(self):
|
||||
with pytest.raises(AnsibleExitJson) as exc_info:
|
||||
set_module_args(get_module_args(node=NODE1, storage="datastore"))
|
||||
with set_module_args(get_module_args(node=NODE1, storage="datastore")):
|
||||
expected_output = {}
|
||||
self.module.main()
|
||||
|
||||
|
|
|
@ -127,7 +127,7 @@ EXPECTED_SINGLE_TASK = [
|
|||
|
||||
@patch('ansible_collections.community.general.plugins.module_utils.proxmox.ProxmoxAnsible._connect')
|
||||
def test_without_required_parameters(connect_mock, capfd, mocker):
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
with pytest.raises(SystemExit):
|
||||
proxmox_tasks_info.main()
|
||||
out, err = capfd.readouterr()
|
||||
|
@ -145,11 +145,12 @@ def mock_api_tasks_response(mocker):
|
|||
|
||||
@patch('ansible_collections.community.general.plugins.module_utils.proxmox.ProxmoxAnsible._connect')
|
||||
def test_get_tasks(connect_mock, capfd, mocker):
|
||||
set_module_args({'api_host': 'proxmoxhost',
|
||||
with set_module_args({
|
||||
'api_host': 'proxmoxhost',
|
||||
'api_user': 'root@pam',
|
||||
'api_password': 'supersecret',
|
||||
'node': NODE})
|
||||
|
||||
'node': NODE
|
||||
}):
|
||||
connect_mock.side_effect = lambda: mock_api_tasks_response(mocker)
|
||||
proxmox_utils.HAS_PROXMOXER = True
|
||||
|
||||
|
@ -163,12 +164,13 @@ def test_get_tasks(connect_mock, capfd, mocker):
|
|||
|
||||
@patch('ansible_collections.community.general.plugins.module_utils.proxmox.ProxmoxAnsible._connect')
|
||||
def test_get_single_task(connect_mock, capfd, mocker):
|
||||
set_module_args({'api_host': 'proxmoxhost',
|
||||
with set_module_args({
|
||||
'api_host': 'proxmoxhost',
|
||||
'api_user': 'root@pam',
|
||||
'api_password': 'supersecret',
|
||||
'node': NODE,
|
||||
'task': TASK_UPID})
|
||||
|
||||
'task': TASK_UPID
|
||||
}):
|
||||
connect_mock.side_effect = lambda: mock_api_tasks_response(mocker)
|
||||
proxmox_utils.HAS_PROXMOXER = True
|
||||
|
||||
|
@ -183,12 +185,13 @@ def test_get_single_task(connect_mock, capfd, mocker):
|
|||
|
||||
@patch('ansible_collections.community.general.plugins.module_utils.proxmox.ProxmoxAnsible._connect')
|
||||
def test_get_non_existent_task(connect_mock, capfd, mocker):
|
||||
set_module_args({'api_host': 'proxmoxhost',
|
||||
with set_module_args({
|
||||
'api_host': 'proxmoxhost',
|
||||
'api_user': 'root@pam',
|
||||
'api_password': 'supersecret',
|
||||
'node': NODE,
|
||||
'task': 'UPID:nonexistent'})
|
||||
|
||||
'task': 'UPID:nonexistent'
|
||||
}):
|
||||
connect_mock.side_effect = lambda: mock_api_tasks_response(mocker)
|
||||
proxmox_utils.HAS_PROXMOXER = True
|
||||
|
||||
|
|
|
@ -48,7 +48,7 @@ class TestProxmoxTemplateModule(ModuleTestCase):
|
|||
def test_module_fail_when_toolbelt_not_installed_and_file_size_is_big(self, mock_stat):
|
||||
self.module.HAS_REQUESTS_TOOLBELT = False
|
||||
mock_stat.return_value.st_size = 268435460
|
||||
set_module_args(
|
||||
with set_module_args(
|
||||
{
|
||||
"api_host": "host",
|
||||
"api_user": "user",
|
||||
|
@ -57,7 +57,7 @@ class TestProxmoxTemplateModule(ModuleTestCase):
|
|||
"src": "/tmp/mock.iso",
|
||||
"content_type": "iso"
|
||||
}
|
||||
)
|
||||
):
|
||||
with pytest.raises(AnsibleFailJson) as exc_info:
|
||||
self.module.main()
|
||||
|
||||
|
|
|
@ -452,7 +452,7 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
|
|||
|
||||
def test_module_fail_when_required_args_missing(self):
|
||||
with pytest.raises(AnsibleFailJson) as exc_info:
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
self.module.main()
|
||||
|
||||
result = exc_info.value.args[0]
|
||||
|
@ -460,7 +460,7 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
|
|||
|
||||
def test_get_lxc_vms_information(self):
|
||||
with pytest.raises(AnsibleExitJson) as exc_info:
|
||||
set_module_args(get_module_args(type="lxc"))
|
||||
with set_module_args(get_module_args(type="lxc")):
|
||||
expected_output = [vm for vm in EXPECTED_VMS_OUTPUT if vm["type"] == "lxc"]
|
||||
self.module.main()
|
||||
|
||||
|
@ -470,7 +470,7 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
|
|||
|
||||
def test_get_qemu_vms_information(self):
|
||||
with pytest.raises(AnsibleExitJson) as exc_info:
|
||||
set_module_args(get_module_args(type="qemu"))
|
||||
with set_module_args(get_module_args(type="qemu")):
|
||||
expected_output = [vm for vm in EXPECTED_VMS_OUTPUT if vm["type"] == "qemu"]
|
||||
self.module.main()
|
||||
|
||||
|
@ -479,7 +479,7 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
|
|||
|
||||
def test_get_all_vms_information(self):
|
||||
with pytest.raises(AnsibleExitJson) as exc_info:
|
||||
set_module_args(get_module_args())
|
||||
with set_module_args(get_module_args()):
|
||||
self.module.main()
|
||||
|
||||
result = exc_info.value.args[0]
|
||||
|
@ -487,7 +487,7 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
|
|||
|
||||
def test_vmid_is_converted_to_int(self):
|
||||
with pytest.raises(AnsibleExitJson) as exc_info:
|
||||
set_module_args(get_module_args(type="lxc"))
|
||||
with set_module_args(get_module_args(type="lxc")):
|
||||
self.module.main()
|
||||
|
||||
result = exc_info.value.args[0]
|
||||
|
@ -501,7 +501,7 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
|
|||
for vm in EXPECTED_VMS_OUTPUT
|
||||
if vm["vmid"] == vmid and vm["type"] == "lxc"
|
||||
]
|
||||
set_module_args(get_module_args(type="lxc", vmid=vmid))
|
||||
with set_module_args(get_module_args(type="lxc", vmid=vmid)):
|
||||
self.module.main()
|
||||
|
||||
result = exc_info.value.args[0]
|
||||
|
@ -516,7 +516,7 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
|
|||
for vm in EXPECTED_VMS_OUTPUT
|
||||
if vm["vmid"] == vmid and vm["type"] == "qemu"
|
||||
]
|
||||
set_module_args(get_module_args(type="qemu", vmid=vmid))
|
||||
with set_module_args(get_module_args(type="qemu", vmid=vmid)):
|
||||
self.module.main()
|
||||
|
||||
result = exc_info.value.args[0]
|
||||
|
@ -527,7 +527,7 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
|
|||
with pytest.raises(AnsibleExitJson) as exc_info:
|
||||
vmid = 100
|
||||
expected_output = [vm for vm in EXPECTED_VMS_OUTPUT if vm["vmid"] == vmid]
|
||||
set_module_args(get_module_args(type="all", vmid=vmid))
|
||||
with set_module_args(get_module_args(type="all", vmid=vmid)):
|
||||
self.module.main()
|
||||
|
||||
result = exc_info.value.args[0]
|
||||
|
@ -542,7 +542,7 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
|
|||
|
||||
with pytest.raises(AnsibleExitJson) as exc_info:
|
||||
expected_output = [vm for vm in EXPECTED_VMS_OUTPUT if vm["name"] == name]
|
||||
set_module_args(get_module_args(type="all", name=name))
|
||||
with set_module_args(get_module_args(type="all", name=name)):
|
||||
self.module.main()
|
||||
|
||||
result = exc_info.value.args[0]
|
||||
|
@ -558,7 +558,7 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
|
|||
|
||||
with pytest.raises(AnsibleExitJson) as exc_info:
|
||||
expected_output = [vm for vm in EXPECTED_VMS_OUTPUT if vm["name"] == name]
|
||||
set_module_args(get_module_args(type="all", name=name))
|
||||
with set_module_args(get_module_args(type="all", name=name)):
|
||||
self.module.main()
|
||||
|
||||
result = exc_info.value.args[0]
|
||||
|
@ -573,7 +573,7 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
|
|||
|
||||
with pytest.raises(AnsibleExitJson) as exc_info:
|
||||
expected_output = [vm for vm in EXPECTED_VMS_OUTPUT if vm["name"] == name]
|
||||
set_module_args(get_module_args(type="all", name=name))
|
||||
with set_module_args(get_module_args(type="all", name=name)):
|
||||
self.module.main()
|
||||
|
||||
result = exc_info.value.args[0]
|
||||
|
@ -587,7 +587,7 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
|
|||
for vm in EXPECTED_VMS_OUTPUT
|
||||
if vm["node"] == NODE1 and vm["type"] == "lxc"
|
||||
]
|
||||
set_module_args(get_module_args(type="lxc", node=NODE1))
|
||||
with set_module_args(get_module_args(type="lxc", node=NODE1)):
|
||||
self.module.main()
|
||||
|
||||
result = exc_info.value.args[0]
|
||||
|
@ -601,7 +601,7 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
|
|||
for vm in EXPECTED_VMS_OUTPUT
|
||||
if vm["node"] == NODE1 and vm["type"] == "qemu"
|
||||
]
|
||||
set_module_args(get_module_args(type="qemu", node=NODE1))
|
||||
with set_module_args(get_module_args(type="qemu", node=NODE1)):
|
||||
self.module.main()
|
||||
|
||||
result = exc_info.value.args[0]
|
||||
|
@ -611,7 +611,7 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
|
|||
def test_get_all_vms_from_specific_node(self):
|
||||
with pytest.raises(AnsibleExitJson) as exc_info:
|
||||
expected_output = [vm for vm in EXPECTED_VMS_OUTPUT if vm["node"] == NODE1]
|
||||
set_module_args(get_module_args(node=NODE1))
|
||||
with set_module_args(get_module_args(node=NODE1)):
|
||||
self.module.main()
|
||||
|
||||
result = exc_info.value.args[0]
|
||||
|
@ -621,7 +621,7 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
|
|||
def test_module_returns_empty_list_when_vm_does_not_exist(self):
|
||||
with pytest.raises(AnsibleExitJson) as exc_info:
|
||||
vmid = 200
|
||||
set_module_args(get_module_args(type="all", vmid=vmid))
|
||||
with set_module_args(get_module_args(type="all", vmid=vmid)):
|
||||
self.module.main()
|
||||
|
||||
result = exc_info.value.args[0]
|
||||
|
@ -632,7 +632,7 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
|
|||
"Some mocked connection error."
|
||||
)
|
||||
with pytest.raises(AnsibleFailJson) as exc_info:
|
||||
set_module_args(get_module_args(type="qemu"))
|
||||
with set_module_args(get_module_args(type="qemu")):
|
||||
self.module.main()
|
||||
|
||||
result = exc_info.value.args[0]
|
||||
|
@ -643,7 +643,7 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
|
|||
"Some mocked connection error."
|
||||
)
|
||||
with pytest.raises(AnsibleFailJson) as exc_info:
|
||||
set_module_args(get_module_args(type="lxc"))
|
||||
with set_module_args(get_module_args(type="lxc")):
|
||||
self.module.main()
|
||||
|
||||
result = exc_info.value.args[0]
|
||||
|
@ -654,7 +654,7 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
|
|||
"Some mocked connection error."
|
||||
)
|
||||
with pytest.raises(AnsibleFailJson) as exc_info:
|
||||
set_module_args(get_module_args())
|
||||
with set_module_args(get_module_args()):
|
||||
self.module.main()
|
||||
|
||||
result = exc_info.value.args[0]
|
||||
|
@ -665,7 +665,7 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
|
|||
|
||||
def test_module_fail_when_node_does_not_exist(self):
|
||||
with pytest.raises(AnsibleFailJson) as exc_info:
|
||||
set_module_args(get_module_args(type="all", node="NODE3"))
|
||||
with set_module_args(get_module_args(type="all", node="NODE3")):
|
||||
self.module.main()
|
||||
|
||||
result = exc_info.value.args[0]
|
||||
|
@ -677,9 +677,9 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
|
|||
) as get_vmid_mock:
|
||||
with pytest.raises(AnsibleExitJson):
|
||||
vmid = 100
|
||||
set_module_args(
|
||||
with set_module_args(
|
||||
get_module_args(type="all", vmid=vmid, name="something")
|
||||
)
|
||||
):
|
||||
self.module.main()
|
||||
|
||||
assert get_vmid_mock.call_count == 0
|
||||
|
@ -701,11 +701,11 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
|
|||
|
||||
with pytest.raises(AnsibleExitJson) as exc_info:
|
||||
vmid = 101
|
||||
set_module_args(get_module_args(
|
||||
with set_module_args(get_module_args(
|
||||
type="qemu",
|
||||
vmid=vmid,
|
||||
config="current",
|
||||
))
|
||||
)):
|
||||
expected_output = [vm for vm in EXPECTED_VMS_OUTPUT if vm["vmid"] == vmid]
|
||||
expected_output[0]["config"] = config_vm_value
|
||||
self.module.main()
|
||||
|
|
|
@ -21,7 +21,7 @@ if tuple(map(int, __version__.split('.'))) < (3, 4, 0):
|
|||
|
||||
|
||||
def test_redis_data_without_arguments(capfd):
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
with pytest.raises(SystemExit) as results:
|
||||
redis_data.main()
|
||||
out, err = capfd.readouterr()
|
||||
|
@ -31,12 +31,12 @@ def test_redis_data_without_arguments(capfd):
|
|||
|
||||
@pytest.mark.skipif(not HAS_REDIS_USERNAME_OPTION, reason="Redis version < 3.4.0")
|
||||
def test_redis_data_key(capfd, mocker):
|
||||
set_module_args({'login_host': 'localhost',
|
||||
with set_module_args({'login_host': 'localhost',
|
||||
'login_user': 'root',
|
||||
'login_password': 'secret',
|
||||
'key': 'foo',
|
||||
'value': 'baz',
|
||||
'_ansible_check_mode': False})
|
||||
'_ansible_check_mode': False}):
|
||||
mocker.patch('redis.Redis.get', return_value='bar')
|
||||
mocker.patch('redis.Redis.set', return_value=True)
|
||||
with pytest.raises(SystemExit):
|
||||
|
@ -52,13 +52,13 @@ def test_redis_data_key(capfd, mocker):
|
|||
|
||||
@pytest.mark.skipif(not HAS_REDIS_USERNAME_OPTION, reason="Redis version < 3.4.0")
|
||||
def test_redis_data_existing_key_nx(capfd, mocker):
|
||||
set_module_args({'login_host': 'localhost',
|
||||
with set_module_args({'login_host': 'localhost',
|
||||
'login_user': 'root',
|
||||
'login_password': 'secret',
|
||||
'key': 'foo',
|
||||
'value': 'baz',
|
||||
'non_existing': True,
|
||||
'_ansible_check_mode': False})
|
||||
'_ansible_check_mode': False}):
|
||||
mocker.patch('redis.Redis.get', return_value='bar')
|
||||
mocker.patch('redis.Redis.set', return_value=None)
|
||||
with pytest.raises(SystemExit):
|
||||
|
@ -76,13 +76,13 @@ def test_redis_data_existing_key_nx(capfd, mocker):
|
|||
|
||||
@pytest.mark.skipif(not HAS_REDIS_USERNAME_OPTION, reason="Redis version < 3.4.0")
|
||||
def test_redis_data_non_existing_key_xx(capfd, mocker):
|
||||
set_module_args({'login_host': 'localhost',
|
||||
with set_module_args({'login_host': 'localhost',
|
||||
'login_user': 'root',
|
||||
'login_password': 'secret',
|
||||
'key': 'foo',
|
||||
'value': 'baz',
|
||||
'existing': True,
|
||||
'_ansible_check_mode': False})
|
||||
'_ansible_check_mode': False}):
|
||||
mocker.patch('redis.Redis.get', return_value=None)
|
||||
mocker.patch('redis.Redis.set', return_value=None)
|
||||
with pytest.raises(SystemExit):
|
||||
|
@ -100,11 +100,11 @@ def test_redis_data_non_existing_key_xx(capfd, mocker):
|
|||
|
||||
@pytest.mark.skipif(not HAS_REDIS_USERNAME_OPTION, reason="Redis version < 3.4.0")
|
||||
def test_redis_data_delete_present_key(capfd, mocker):
|
||||
set_module_args({'login_host': 'localhost',
|
||||
with set_module_args({'login_host': 'localhost',
|
||||
'login_user': 'root',
|
||||
'login_password': 'secret',
|
||||
'key': 'foo',
|
||||
'state': 'absent'})
|
||||
'state': 'absent'}):
|
||||
mocker.patch('redis.Redis.get', return_value='bar')
|
||||
mocker.patch('redis.Redis.delete', return_value=1)
|
||||
with pytest.raises(SystemExit):
|
||||
|
@ -118,11 +118,11 @@ def test_redis_data_delete_present_key(capfd, mocker):
|
|||
|
||||
@pytest.mark.skipif(not HAS_REDIS_USERNAME_OPTION, reason="Redis version < 3.4.0")
|
||||
def test_redis_data_delete_absent_key(capfd, mocker):
|
||||
set_module_args({'login_host': 'localhost',
|
||||
with set_module_args({'login_host': 'localhost',
|
||||
'login_user': 'root',
|
||||
'login_password': 'secret',
|
||||
'key': 'foo',
|
||||
'state': 'absent'})
|
||||
'state': 'absent'}):
|
||||
mocker.patch('redis.Redis.delete', return_value=0)
|
||||
mocker.patch('redis.Redis.get', return_value=None)
|
||||
with pytest.raises(SystemExit):
|
||||
|
@ -136,12 +136,12 @@ def test_redis_data_delete_absent_key(capfd, mocker):
|
|||
|
||||
@pytest.mark.skipif(HAS_REDIS_USERNAME_OPTION, reason="Redis version > 3.4.0")
|
||||
def test_redis_data_fail_username(capfd, mocker):
|
||||
set_module_args({'login_host': 'localhost',
|
||||
with set_module_args({'login_host': 'localhost',
|
||||
'login_user': 'root',
|
||||
'login_password': 'secret',
|
||||
'key': 'foo',
|
||||
'value': 'baz',
|
||||
'_ansible_check_mode': False})
|
||||
'_ansible_check_mode': False}):
|
||||
with pytest.raises(SystemExit):
|
||||
redis_data.main()
|
||||
out, err = capfd.readouterr()
|
||||
|
@ -153,11 +153,11 @@ def test_redis_data_fail_username(capfd, mocker):
|
|||
|
||||
|
||||
def test_redis_data_key_no_username(capfd, mocker):
|
||||
set_module_args({'login_host': 'localhost',
|
||||
with set_module_args({'login_host': 'localhost',
|
||||
'login_password': 'secret',
|
||||
'key': 'foo',
|
||||
'value': 'baz',
|
||||
'_ansible_check_mode': False})
|
||||
'_ansible_check_mode': False}):
|
||||
mocker.patch('redis.Redis.get', return_value='bar')
|
||||
mocker.patch('redis.Redis.set', return_value=True)
|
||||
with pytest.raises(SystemExit):
|
||||
|
@ -172,11 +172,11 @@ def test_redis_data_key_no_username(capfd, mocker):
|
|||
|
||||
|
||||
def test_redis_delete_key_no_username(capfd, mocker):
|
||||
set_module_args({'login_host': 'localhost',
|
||||
with set_module_args({'login_host': 'localhost',
|
||||
'login_password': 'secret',
|
||||
'key': 'foo',
|
||||
'state': 'absent',
|
||||
'_ansible_check_mode': False})
|
||||
'_ansible_check_mode': False}):
|
||||
mocker.patch('redis.Redis.get', return_value='bar')
|
||||
mocker.patch('redis.Redis.delete', return_value=1)
|
||||
with pytest.raises(SystemExit):
|
||||
|
@ -189,11 +189,11 @@ def test_redis_delete_key_no_username(capfd, mocker):
|
|||
|
||||
|
||||
def test_redis_delete_key_non_existent_key(capfd, mocker):
|
||||
set_module_args({'login_host': 'localhost',
|
||||
with set_module_args({'login_host': 'localhost',
|
||||
'login_password': 'secret',
|
||||
'key': 'foo',
|
||||
'state': 'absent',
|
||||
'_ansible_check_mode': False})
|
||||
'_ansible_check_mode': False}):
|
||||
mocker.patch('redis.Redis.get', return_value=None)
|
||||
mocker.patch('redis.Redis.delete', return_value=0)
|
||||
with pytest.raises(SystemExit):
|
||||
|
@ -206,12 +206,12 @@ def test_redis_delete_key_non_existent_key(capfd, mocker):
|
|||
|
||||
|
||||
def test_redis_set_key_check_mode_nochange(capfd, mocker):
|
||||
set_module_args({'login_host': 'localhost',
|
||||
with set_module_args({'login_host': 'localhost',
|
||||
'login_password': 'secret',
|
||||
'key': 'foo',
|
||||
'state': 'present',
|
||||
'value': 'bar',
|
||||
'_ansible_check_mode': True})
|
||||
'_ansible_check_mode': True}):
|
||||
mocker.patch('redis.Redis.get', return_value='bar')
|
||||
with pytest.raises(SystemExit):
|
||||
redis_data.main()
|
||||
|
@ -225,12 +225,12 @@ def test_redis_set_key_check_mode_nochange(capfd, mocker):
|
|||
|
||||
|
||||
def test_redis_set_key_check_mode_delete_nx(capfd, mocker):
|
||||
set_module_args({'login_host': 'localhost',
|
||||
with set_module_args({'login_host': 'localhost',
|
||||
'login_password': 'secret',
|
||||
'key': 'foo',
|
||||
'state': 'present',
|
||||
'value': 'baz',
|
||||
'_ansible_check_mode': True})
|
||||
'_ansible_check_mode': True}):
|
||||
mocker.patch('redis.Redis.get', return_value=None)
|
||||
with pytest.raises(SystemExit):
|
||||
redis_data.main()
|
||||
|
@ -243,12 +243,12 @@ def test_redis_set_key_check_mode_delete_nx(capfd, mocker):
|
|||
|
||||
|
||||
def test_redis_set_key_check_mode_delete(capfd, mocker):
|
||||
set_module_args({'login_host': 'localhost',
|
||||
with set_module_args({'login_host': 'localhost',
|
||||
'login_password': 'secret',
|
||||
'key': 'foo',
|
||||
'state': 'present',
|
||||
'value': 'baz',
|
||||
'_ansible_check_mode': True})
|
||||
'_ansible_check_mode': True}):
|
||||
mocker.patch('redis.Redis.get', return_value='bar')
|
||||
with pytest.raises(SystemExit):
|
||||
redis_data.main()
|
||||
|
@ -261,12 +261,12 @@ def test_redis_set_key_check_mode_delete(capfd, mocker):
|
|||
|
||||
|
||||
def test_redis_set_key_check_mode(capfd, mocker):
|
||||
set_module_args({'login_host': 'localhost',
|
||||
with set_module_args({'login_host': 'localhost',
|
||||
'login_password': 'secret',
|
||||
'key': 'foo',
|
||||
'state': 'present',
|
||||
'value': 'baz',
|
||||
'_ansible_check_mode': True})
|
||||
'_ansible_check_mode': True}):
|
||||
mocker.patch('redis.Redis.get', return_value='bar')
|
||||
with pytest.raises(SystemExit):
|
||||
redis_data.main()
|
||||
|
|
|
@ -25,7 +25,7 @@ if HAS_REDIS_USERNAME_OPTION:
|
|||
|
||||
|
||||
def test_redis_data_incr_without_arguments(capfd):
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
with pytest.raises(SystemExit) as results:
|
||||
redis_data_incr.main()
|
||||
out, err = capfd.readouterr()
|
||||
|
@ -35,10 +35,10 @@ def test_redis_data_incr_without_arguments(capfd):
|
|||
|
||||
@pytest.mark.skipif(not HAS_REDIS_USERNAME_OPTION, reason="Redis version < 3.4.0")
|
||||
def test_redis_data_incr(capfd, mocker):
|
||||
set_module_args({'login_host': 'localhost',
|
||||
with set_module_args({'login_host': 'localhost',
|
||||
'login_user': 'root',
|
||||
'login_password': 'secret',
|
||||
'key': 'foo', })
|
||||
'key': 'foo', }):
|
||||
mocker.patch('redis.Redis.incr', return_value=57)
|
||||
with pytest.raises(SystemExit):
|
||||
redis_data_incr.main()
|
||||
|
@ -53,11 +53,11 @@ def test_redis_data_incr(capfd, mocker):
|
|||
|
||||
@pytest.mark.skipif(not HAS_REDIS_USERNAME_OPTION, reason="Redis version < 3.4.0")
|
||||
def test_redis_data_incr_int(capfd, mocker):
|
||||
set_module_args({'login_host': 'localhost',
|
||||
with set_module_args({'login_host': 'localhost',
|
||||
'login_user': 'root',
|
||||
'login_password': 'secret',
|
||||
'key': 'foo',
|
||||
'increment_int': 10})
|
||||
'increment_int': 10}):
|
||||
mocker.patch('redis.Redis.incrby', return_value=57)
|
||||
with pytest.raises(SystemExit):
|
||||
redis_data_incr.main()
|
||||
|
@ -72,11 +72,11 @@ def test_redis_data_incr_int(capfd, mocker):
|
|||
|
||||
@pytest.mark.skipif(not HAS_REDIS_USERNAME_OPTION, reason="Redis version < 3.4.0")
|
||||
def test_redis_data_inc_float(capfd, mocker):
|
||||
set_module_args({'login_host': 'localhost',
|
||||
with set_module_args({'login_host': 'localhost',
|
||||
'login_user': 'root',
|
||||
'login_password': 'secret',
|
||||
'key': 'foo',
|
||||
'increment_float': '5.5'})
|
||||
'increment_float': '5.5'}):
|
||||
mocker.patch('redis.Redis.incrbyfloat', return_value=57.45)
|
||||
with pytest.raises(SystemExit):
|
||||
redis_data_incr.main()
|
||||
|
@ -91,11 +91,13 @@ def test_redis_data_inc_float(capfd, mocker):
|
|||
|
||||
@pytest.mark.skipif(not HAS_REDIS_USERNAME_OPTION, reason="Redis version < 3.4.0")
|
||||
def test_redis_data_incr_float_wrong_value(capfd):
|
||||
set_module_args({'login_host': 'localhost',
|
||||
with set_module_args({
|
||||
'login_host': 'localhost',
|
||||
'login_user': 'root',
|
||||
'login_password': 'secret',
|
||||
'key': 'foo',
|
||||
'increment_float': 'not_a_number'})
|
||||
'increment_float': 'not_a_number'
|
||||
}):
|
||||
with pytest.raises(SystemExit):
|
||||
redis_data_incr.main()
|
||||
out, err = capfd.readouterr()
|
||||
|
@ -106,11 +108,11 @@ def test_redis_data_incr_float_wrong_value(capfd):
|
|||
|
||||
@pytest.mark.skipif(HAS_REDIS_USERNAME_OPTION, reason="Redis version > 3.4.0")
|
||||
def test_redis_data_incr_fail_username(capfd, mocker):
|
||||
set_module_args({'login_host': 'localhost',
|
||||
with set_module_args({'login_host': 'localhost',
|
||||
'login_user': 'root',
|
||||
'login_password': 'secret',
|
||||
'key': 'foo',
|
||||
'_ansible_check_mode': False})
|
||||
'_ansible_check_mode': False}):
|
||||
with pytest.raises(SystemExit):
|
||||
redis_data_incr.main()
|
||||
out, err = capfd.readouterr()
|
||||
|
@ -122,9 +124,9 @@ def test_redis_data_incr_fail_username(capfd, mocker):
|
|||
|
||||
|
||||
def test_redis_data_incr_no_username(capfd, mocker):
|
||||
set_module_args({'login_host': 'localhost',
|
||||
with set_module_args({'login_host': 'localhost',
|
||||
'login_password': 'secret',
|
||||
'key': 'foo', })
|
||||
'key': 'foo', }):
|
||||
mocker.patch('redis.Redis.incr', return_value=57)
|
||||
with pytest.raises(SystemExit):
|
||||
redis_data_incr.main()
|
||||
|
@ -138,10 +140,10 @@ def test_redis_data_incr_no_username(capfd, mocker):
|
|||
|
||||
|
||||
def test_redis_data_incr_float_no_username(capfd, mocker):
|
||||
set_module_args({'login_host': 'localhost',
|
||||
with set_module_args({'login_host': 'localhost',
|
||||
'login_password': 'secret',
|
||||
'key': 'foo',
|
||||
'increment_float': '5.5'})
|
||||
'increment_float': '5.5'}):
|
||||
mocker.patch('redis.Redis.incrbyfloat', return_value=57.45)
|
||||
with pytest.raises(SystemExit):
|
||||
redis_data_incr.main()
|
||||
|
@ -155,10 +157,10 @@ def test_redis_data_incr_float_no_username(capfd, mocker):
|
|||
|
||||
|
||||
def test_redis_data_incr_check_mode(capfd, mocker):
|
||||
set_module_args({'login_host': 'localhost',
|
||||
with set_module_args({'login_host': 'localhost',
|
||||
'login_password': 'secret',
|
||||
'key': 'foo',
|
||||
'_ansible_check_mode': True})
|
||||
'_ansible_check_mode': True}):
|
||||
mocker.patch('redis.Redis.get', return_value=10)
|
||||
with pytest.raises(SystemExit):
|
||||
redis_data_incr.main()
|
||||
|
@ -171,10 +173,10 @@ def test_redis_data_incr_check_mode(capfd, mocker):
|
|||
|
||||
|
||||
def test_redis_data_incr_check_mode_not_incrementable(capfd, mocker):
|
||||
set_module_args({'login_host': 'localhost',
|
||||
with set_module_args({'login_host': 'localhost',
|
||||
'login_password': 'secret',
|
||||
'key': 'foo',
|
||||
'_ansible_check_mode': True})
|
||||
'_ansible_check_mode': True}):
|
||||
mocker.patch('redis.Redis.get', return_value='bar')
|
||||
with pytest.raises(SystemExit):
|
||||
redis_data_incr.main()
|
||||
|
@ -190,10 +192,10 @@ def test_redis_data_incr_check_mode_not_incrementable(capfd, mocker):
|
|||
|
||||
@pytest.mark.skipif(not HAS_REDIS_USERNAME_OPTION, reason="Redis version < 3.4.0")
|
||||
def test_redis_data_incr_check_mode_permissions(capfd, mocker):
|
||||
set_module_args({'login_host': 'localhost',
|
||||
with set_module_args({'login_host': 'localhost',
|
||||
'login_password': 'secret',
|
||||
'key': 'foo',
|
||||
'_ansible_check_mode': True})
|
||||
'_ansible_check_mode': True}):
|
||||
redis.Redis.get = mocker.Mock(side_effect=NoPermissionError(
|
||||
"this user has no permissions to run the 'get' command or its subcommand"))
|
||||
with pytest.raises(SystemExit):
|
||||
|
|
|
@ -23,7 +23,7 @@ if tuple(map(int, __version__.split('.'))) < (3, 4, 0):
|
|||
|
||||
|
||||
def test_redis_data_info_without_arguments(capfd):
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
with pytest.raises(SystemExit):
|
||||
redis_data_info.main()
|
||||
out, err = capfd.readouterr()
|
||||
|
@ -33,11 +33,13 @@ def test_redis_data_info_without_arguments(capfd):
|
|||
|
||||
@pytest.mark.skipif(not HAS_REDIS_USERNAME_OPTION, reason="Redis version < 3.4.0")
|
||||
def test_redis_data_info_existing_key(capfd, mocker):
|
||||
set_module_args({'login_host': 'localhost',
|
||||
with set_module_args({
|
||||
'login_host': 'localhost',
|
||||
'login_user': 'root',
|
||||
'login_password': 'secret',
|
||||
'key': 'foo',
|
||||
'_ansible_check_mode': False})
|
||||
'_ansible_check_mode': False
|
||||
}):
|
||||
mocker.patch('redis.Redis.get', return_value='bar')
|
||||
with pytest.raises(SystemExit):
|
||||
redis_data_info.main()
|
||||
|
@ -50,11 +52,13 @@ def test_redis_data_info_existing_key(capfd, mocker):
|
|||
|
||||
@pytest.mark.skipif(not HAS_REDIS_USERNAME_OPTION, reason="Redis version < 3.4.0")
|
||||
def test_redis_data_info_absent_key(capfd, mocker):
|
||||
set_module_args({'login_host': 'localhost',
|
||||
with set_module_args({
|
||||
'login_host': 'localhost',
|
||||
'login_user': 'root',
|
||||
'login_password': 'secret',
|
||||
'key': 'foo',
|
||||
'_ansible_check_mode': False})
|
||||
'_ansible_check_mode': False
|
||||
}):
|
||||
mocker.patch('redis.Redis.get', return_value=None)
|
||||
with pytest.raises(SystemExit):
|
||||
redis_data_info.main()
|
||||
|
@ -67,11 +71,13 @@ def test_redis_data_info_absent_key(capfd, mocker):
|
|||
|
||||
@pytest.mark.skipif(HAS_REDIS_USERNAME_OPTION, reason="Redis version > 3.4.0")
|
||||
def test_redis_data_fail_username(capfd, mocker):
|
||||
set_module_args({'login_host': 'localhost',
|
||||
with set_module_args({
|
||||
'login_host': 'localhost',
|
||||
'login_user': 'root',
|
||||
'login_password': 'secret',
|
||||
'key': 'foo',
|
||||
'_ansible_check_mode': False})
|
||||
'_ansible_check_mode': False
|
||||
}):
|
||||
with pytest.raises(SystemExit):
|
||||
redis_data_info.main()
|
||||
out, err = capfd.readouterr()
|
||||
|
@ -84,10 +90,12 @@ def test_redis_data_fail_username(capfd, mocker):
|
|||
|
||||
@pytest.mark.skipif(HAS_REDIS_USERNAME_OPTION, reason="Redis version > 3.4.0")
|
||||
def test_redis_data_info_absent_key_no_username(capfd, mocker):
|
||||
set_module_args({'login_host': 'localhost',
|
||||
with set_module_args({
|
||||
'login_host': 'localhost',
|
||||
'login_password': 'secret',
|
||||
'key': 'foo',
|
||||
'_ansible_check_mode': False})
|
||||
'_ansible_check_mode': False
|
||||
}):
|
||||
mocker.patch('redis.Redis.get', return_value=None)
|
||||
with pytest.raises(SystemExit):
|
||||
redis_data_info.main()
|
||||
|
@ -100,10 +108,12 @@ def test_redis_data_info_absent_key_no_username(capfd, mocker):
|
|||
|
||||
@pytest.mark.skipif(HAS_REDIS_USERNAME_OPTION, reason="Redis version > 3.4.0")
|
||||
def test_redis_data_info_existing_key_no_username(capfd, mocker):
|
||||
set_module_args({'login_host': 'localhost',
|
||||
with set_module_args({
|
||||
'login_host': 'localhost',
|
||||
'login_password': 'secret',
|
||||
'key': 'foo',
|
||||
'_ansible_check_mode': False})
|
||||
'_ansible_check_mode': False
|
||||
}):
|
||||
mocker.patch('redis.Redis.get', return_value='bar')
|
||||
with pytest.raises(SystemExit):
|
||||
redis_data_info.main()
|
||||
|
|
|
@ -47,7 +47,7 @@ class TestRedisInfoModule(ModuleTestCase):
|
|||
"""Test without parameters"""
|
||||
with self.patch_redis_client(side_effect=FakeRedisClient) as redis_client:
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
self.module.main()
|
||||
self.assertEqual(redis_client.call_count, 1)
|
||||
self.assertEqual(redis_client.call_args, ({'host': 'localhost',
|
||||
|
@ -64,11 +64,11 @@ class TestRedisInfoModule(ModuleTestCase):
|
|||
"""Test with all parameters"""
|
||||
with self.patch_redis_client(side_effect=FakeRedisClient) as redis_client:
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'login_host': 'test',
|
||||
'login_port': 1234,
|
||||
'login_password': 'PASS'
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
self.assertEqual(redis_client.call_count, 1)
|
||||
self.assertEqual(redis_client.call_args, ({'host': 'test',
|
||||
|
@ -85,7 +85,7 @@ class TestRedisInfoModule(ModuleTestCase):
|
|||
"""Test with tls parameters"""
|
||||
with self.patch_redis_client(side_effect=FakeRedisClient) as redis_client:
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'login_host': 'test',
|
||||
'login_port': 1234,
|
||||
'login_password': 'PASS',
|
||||
|
@ -94,7 +94,7 @@ class TestRedisInfoModule(ModuleTestCase):
|
|||
'client_cert_file': '/etc/ssl/client.pem',
|
||||
'client_key_file': '/etc/ssl/client.key',
|
||||
'validate_certs': False
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
self.assertEqual(redis_client.call_count, 1)
|
||||
self.assertEqual(redis_client.call_args, ({'host': 'test',
|
||||
|
@ -111,7 +111,7 @@ class TestRedisInfoModule(ModuleTestCase):
|
|||
"""Test failure message"""
|
||||
with self.patch_redis_client(side_effect=FakeRedisClientFail) as redis_client:
|
||||
with self.assertRaises(AnsibleFailJson) as result:
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
self.module.main()
|
||||
self.assertEqual(redis_client.call_count, 1)
|
||||
self.assertEqual(result.exception.args[0]['msg'], 'unable to connect to database: Test Error')
|
||||
|
|
|
@ -52,7 +52,7 @@ class RhsmRepositoryReleaseModuleTestCase(ModuleTestCase):
|
|||
def test_release_set(self):
|
||||
# test that the module attempts to change the release when the current
|
||||
# release is not the same as the user-specific target release
|
||||
set_module_args({'release': '7.5'})
|
||||
with set_module_args({'release': '7.5'}):
|
||||
self.module_main_command.side_effect = [
|
||||
# first call, get_release: returns different version so set_release is called
|
||||
(0, '7.4', ''),
|
||||
|
@ -72,7 +72,7 @@ class RhsmRepositoryReleaseModuleTestCase(ModuleTestCase):
|
|||
def test_release_set_idempotent(self):
|
||||
# test that the module does not attempt to change the release when
|
||||
# the current release matches the user-specified target release
|
||||
set_module_args({'release': '7.5'})
|
||||
with set_module_args({'release': '7.5'}):
|
||||
self.module_main_command.side_effect = [
|
||||
# first call, get_release: returns same version, set_release is not called
|
||||
(0, '7.5', ''),
|
||||
|
@ -89,7 +89,7 @@ class RhsmRepositoryReleaseModuleTestCase(ModuleTestCase):
|
|||
def test_release_unset(self):
|
||||
# test that the module attempts to change the release when the current
|
||||
# release is not the same as the user-specific target release
|
||||
set_module_args({'release': None})
|
||||
with set_module_args({'release': None}):
|
||||
self.module_main_command.side_effect = [
|
||||
# first call, get_release: returns version so set_release is called
|
||||
(0, '7.5', ''),
|
||||
|
@ -109,7 +109,7 @@ class RhsmRepositoryReleaseModuleTestCase(ModuleTestCase):
|
|||
def test_release_unset_idempotent(self):
|
||||
# test that the module attempts to change the release when the current
|
||||
# release is not the same as the user-specific target release
|
||||
set_module_args({'release': None})
|
||||
with set_module_args({'release': None}):
|
||||
self.module_main_command.side_effect = [
|
||||
# first call, get_release: returns no version, set_release is not called
|
||||
(0, 'Release not set', ''),
|
||||
|
@ -126,8 +126,7 @@ class RhsmRepositoryReleaseModuleTestCase(ModuleTestCase):
|
|||
def test_release_insane(self):
|
||||
# test that insane values for release trigger fail_json
|
||||
insane_value = 'this is an insane release value'
|
||||
set_module_args({'release': insane_value})
|
||||
|
||||
with set_module_args({'release': insane_value}):
|
||||
result = self.module_main(AnsibleFailJson)
|
||||
|
||||
# also ensure that the fail msg includes the insane value
|
||||
|
|
|
@ -35,7 +35,7 @@ class RpmOSTreeModuleTestCase(ModuleTestCase):
|
|||
return exc.exception.args[0]
|
||||
|
||||
def test_present(self):
|
||||
set_module_args({'name': 'nfs-utils', 'state': 'present'})
|
||||
with set_module_args({'name': 'nfs-utils', 'state': 'present'}):
|
||||
self.module_main_command.side_effect = [
|
||||
(0, '', ''),
|
||||
]
|
||||
|
@ -49,7 +49,7 @@ class RpmOSTreeModuleTestCase(ModuleTestCase):
|
|||
])
|
||||
|
||||
def test_present_unchanged(self):
|
||||
set_module_args({'name': 'nfs-utils', 'state': 'present'})
|
||||
with set_module_args({'name': 'nfs-utils', 'state': 'present'}):
|
||||
self.module_main_command.side_effect = [
|
||||
(77, '', ''),
|
||||
]
|
||||
|
@ -64,7 +64,7 @@ class RpmOSTreeModuleTestCase(ModuleTestCase):
|
|||
])
|
||||
|
||||
def test_present_failed(self):
|
||||
set_module_args({'name': 'nfs-utils', 'state': 'present'})
|
||||
with set_module_args({'name': 'nfs-utils', 'state': 'present'}):
|
||||
self.module_main_command.side_effect = [
|
||||
(1, '', ''),
|
||||
]
|
||||
|
@ -79,7 +79,7 @@ class RpmOSTreeModuleTestCase(ModuleTestCase):
|
|||
])
|
||||
|
||||
def test_absent(self):
|
||||
set_module_args({'name': 'nfs-utils', 'state': 'absent'})
|
||||
with set_module_args({'name': 'nfs-utils', 'state': 'absent'}):
|
||||
self.module_main_command.side_effect = [
|
||||
(0, '', ''),
|
||||
]
|
||||
|
@ -93,7 +93,7 @@ class RpmOSTreeModuleTestCase(ModuleTestCase):
|
|||
])
|
||||
|
||||
def test_absent_failed(self):
|
||||
set_module_args({'name': 'nfs-utils', 'state': 'absent'})
|
||||
with set_module_args({'name': 'nfs-utils', 'state': 'absent'}):
|
||||
self.module_main_command.side_effect = [
|
||||
(1, '', ''),
|
||||
]
|
||||
|
|
|
@ -62,7 +62,7 @@ def response_remove_nics():
|
|||
|
||||
|
||||
def test_scaleway_private_network_without_arguments(capfd):
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
with pytest.raises(SystemExit) as results:
|
||||
scaleway_compute_private_network.main()
|
||||
out, err = capfd.readouterr()
|
||||
|
@ -77,12 +77,13 @@ def test_scaleway_add_nic(capfd):
|
|||
cid = 'c004b4cd-ef5g-678h-90i1-jk2345678l90'
|
||||
url = 'servers/' + cid + '/private_nics'
|
||||
|
||||
set_module_args({"project": "a123b4cd-ef5g-678h-90i1-jk2345678l90",
|
||||
with set_module_args({
|
||||
"project": "a123b4cd-ef5g-678h-90i1-jk2345678l90",
|
||||
"state": "present",
|
||||
"region": "par1",
|
||||
"compute_id": cid,
|
||||
"private_network_id": pnid
|
||||
})
|
||||
}):
|
||||
|
||||
with patch.object(Scaleway, 'get') as mock_scw_get:
|
||||
mock_scw_get.return_value = response_without_nics()
|
||||
|
@ -105,12 +106,13 @@ def test_scaleway_add_existing_nic(capfd):
|
|||
cid = 'c004b4cd-ef5g-678h-90i1-jk2345678l90'
|
||||
url = 'servers/' + cid + '/private_nics'
|
||||
|
||||
set_module_args({"project": "a123b4cd-ef5g-678h-90i1-jk2345678l90",
|
||||
with set_module_args({
|
||||
"project": "a123b4cd-ef5g-678h-90i1-jk2345678l90",
|
||||
"state": "present",
|
||||
"region": "par1",
|
||||
"compute_id": cid,
|
||||
"private_network_id": pnid
|
||||
})
|
||||
}):
|
||||
|
||||
with patch.object(Scaleway, 'get') as mock_scw_get:
|
||||
mock_scw_get.return_value = response_with_nics()
|
||||
|
@ -132,12 +134,13 @@ def test_scaleway_remove_existing_nic(capfd):
|
|||
url = 'servers/' + cid + '/private_nics'
|
||||
urlremove = 'servers/' + cid + '/private_nics/' + nicid
|
||||
|
||||
set_module_args({"project": "a123b4cd-ef5g-678h-90i1-jk2345678l90",
|
||||
with set_module_args({
|
||||
"project": "a123b4cd-ef5g-678h-90i1-jk2345678l90",
|
||||
"state": "absent",
|
||||
"region": "par1",
|
||||
"compute_id": cid,
|
||||
"private_network_id": pnid
|
||||
})
|
||||
}):
|
||||
|
||||
with patch.object(Scaleway, 'get') as mock_scw_get:
|
||||
mock_scw_get.return_value = response_with_nics()
|
||||
|
@ -161,12 +164,13 @@ def test_scaleway_remove_absent_nic(capfd):
|
|||
cid = 'c004b4cd-ef5g-678h-90i1-jk2345678l90'
|
||||
url = 'servers/' + cid + '/private_nics'
|
||||
|
||||
set_module_args({"project": "a123b4cd-ef5g-678h-90i1-jk2345678l90",
|
||||
with set_module_args({
|
||||
"project": "a123b4cd-ef5g-678h-90i1-jk2345678l90",
|
||||
"state": "absent",
|
||||
"region": "par1",
|
||||
"compute_id": cid,
|
||||
"private_network_id": pnid
|
||||
})
|
||||
}):
|
||||
|
||||
with patch.object(Scaleway, 'get') as mock_scw_get:
|
||||
mock_scw_get.return_value = response_without_nics()
|
||||
|
|
|
@ -71,7 +71,7 @@ def response_delete():
|
|||
|
||||
|
||||
def test_scaleway_private_network_without_arguments(capfd):
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
with pytest.raises(SystemExit) as results:
|
||||
scaleway_private_network.main()
|
||||
out, err = capfd.readouterr()
|
||||
|
@ -81,12 +81,13 @@ def test_scaleway_private_network_without_arguments(capfd):
|
|||
|
||||
|
||||
def test_scaleway_create_pn(capfd):
|
||||
set_module_args({"state": "present",
|
||||
with set_module_args({
|
||||
"state": "present",
|
||||
"project": "a123b4cd-ef5g-678h-90i1-jk2345678l90",
|
||||
"region": "par2",
|
||||
"name": "new_network_name",
|
||||
"tags": ["tag1"]
|
||||
})
|
||||
}):
|
||||
|
||||
os.environ['SCW_API_TOKEN'] = 'notrealtoken'
|
||||
with patch.object(Scaleway, 'get') as mock_scw_get:
|
||||
|
@ -105,12 +106,13 @@ def test_scaleway_create_pn(capfd):
|
|||
|
||||
|
||||
def test_scaleway_existing_pn(capfd):
|
||||
set_module_args({"state": "present",
|
||||
with set_module_args({
|
||||
"state": "present",
|
||||
"project": "a123b4cd-ef5g-678h-90i1-jk2345678l90",
|
||||
"region": "par2",
|
||||
"name": "new_network_name",
|
||||
"tags": ["tag1"]
|
||||
})
|
||||
}):
|
||||
|
||||
os.environ['SCW_API_TOKEN'] = 'notrealtoken'
|
||||
with patch.object(Scaleway, 'get') as mock_scw_get:
|
||||
|
@ -127,12 +129,13 @@ def test_scaleway_existing_pn(capfd):
|
|||
|
||||
|
||||
def test_scaleway_add_tag_pn(capfd):
|
||||
set_module_args({"state": "present",
|
||||
with set_module_args({
|
||||
"state": "present",
|
||||
"project": "a123b4cd-ef5g-678h-90i1-jk2345678l90",
|
||||
"region": "par2",
|
||||
"name": "new_network_name",
|
||||
"tags": ["newtag"]
|
||||
})
|
||||
}):
|
||||
|
||||
os.environ['SCW_API_TOKEN'] = 'notrealtoken'
|
||||
with patch.object(Scaleway, 'get') as mock_scw_get:
|
||||
|
@ -152,12 +155,13 @@ def test_scaleway_add_tag_pn(capfd):
|
|||
|
||||
|
||||
def test_scaleway_remove_pn(capfd):
|
||||
set_module_args({"state": "absent",
|
||||
with set_module_args({
|
||||
"state": "absent",
|
||||
"project": "a123b4cd-ef5g-678h-90i1-jk2345678l90",
|
||||
"region": "par2",
|
||||
"name": "new_network_name",
|
||||
"tags": ["newtag"]
|
||||
})
|
||||
}):
|
||||
|
||||
os.environ['SCW_API_TOKEN'] = 'notrealtoken'
|
||||
with patch.object(Scaleway, 'get') as mock_scw_get:
|
||||
|
@ -177,12 +181,13 @@ def test_scaleway_remove_pn(capfd):
|
|||
|
||||
|
||||
def test_scaleway_absent_pn_not_exists(capfd):
|
||||
set_module_args({"state": "absent",
|
||||
with set_module_args({
|
||||
"state": "absent",
|
||||
"project": "a123b4cd-ef5g-678h-90i1-jk2345678l90",
|
||||
"region": "par2",
|
||||
"name": "new_network_name",
|
||||
"tags": ["newtag"]
|
||||
})
|
||||
}):
|
||||
|
||||
os.environ['SCW_API_TOKEN'] = 'notrealtoken'
|
||||
with patch.object(Scaleway, 'get') as mock_scw_get:
|
||||
|
|
|
@ -91,18 +91,14 @@ class TestSimpleinitMSB(ModuleTestCase):
|
|||
def tearDown(self):
|
||||
super(TestSimpleinitMSB, self).tearDown()
|
||||
|
||||
def init_module(self, args):
|
||||
set_module_args(args)
|
||||
|
||||
return SimpleinitMSB(build_module())
|
||||
|
||||
@patch('os.path.exists', return_value=True)
|
||||
@patch('ansible.module_utils.basic.AnsibleModule.get_bin_path', return_value="/sbin/telinit")
|
||||
def test_get_service_tools(self, *args, **kwargs):
|
||||
simpleinit_msb = self.init_module({
|
||||
with set_module_args({
|
||||
'name': 'smgl-suspend-single',
|
||||
'state': 'running',
|
||||
})
|
||||
}):
|
||||
simpleinit_msb = SimpleinitMSB(build_module())
|
||||
|
||||
simpleinit_msb.get_service_tools()
|
||||
|
||||
|
@ -110,10 +106,11 @@ class TestSimpleinitMSB(ModuleTestCase):
|
|||
|
||||
@patch('ansible_collections.community.general.plugins.modules.simpleinit_msb.SimpleinitMSB.execute_command')
|
||||
def test_service_exists(self, execute_command):
|
||||
simpleinit_msb = self.init_module({
|
||||
with set_module_args({
|
||||
'name': 'smgl-suspend-single',
|
||||
'state': 'running',
|
||||
})
|
||||
}):
|
||||
simpleinit_msb = SimpleinitMSB(build_module())
|
||||
|
||||
execute_command.return_value = (0, _TELINIT_LIST, "")
|
||||
|
||||
|
@ -121,10 +118,11 @@ class TestSimpleinitMSB(ModuleTestCase):
|
|||
|
||||
@patch('ansible_collections.community.general.plugins.modules.simpleinit_msb.SimpleinitMSB.execute_command')
|
||||
def test_service_exists_not(self, execute_command):
|
||||
simpleinit_msb = self.init_module({
|
||||
with set_module_args({
|
||||
'name': 'ntp',
|
||||
'state': 'running',
|
||||
})
|
||||
}):
|
||||
simpleinit_msb = SimpleinitMSB(build_module())
|
||||
|
||||
execute_command.return_value = (0, _TELINIT_LIST, "")
|
||||
|
||||
|
@ -136,11 +134,12 @@ class TestSimpleinitMSB(ModuleTestCase):
|
|||
@patch('ansible_collections.community.general.plugins.modules.simpleinit_msb.SimpleinitMSB.service_exists')
|
||||
@patch('ansible_collections.community.general.plugins.modules.simpleinit_msb.SimpleinitMSB.execute_command')
|
||||
def test_check_service_enabled(self, execute_command, service_exists):
|
||||
simpleinit_msb = self.init_module({
|
||||
with set_module_args({
|
||||
'name': 'nscd',
|
||||
'state': 'running',
|
||||
'enabled': 'true',
|
||||
})
|
||||
}):
|
||||
simpleinit_msb = SimpleinitMSB(build_module())
|
||||
|
||||
service_exists.return_value = True
|
||||
execute_command.return_value = (0, _TELINIT_LIST_ENABLED, "")
|
||||
|
@ -158,11 +157,12 @@ class TestSimpleinitMSB(ModuleTestCase):
|
|||
@patch('ansible_collections.community.general.plugins.modules.simpleinit_msb.SimpleinitMSB.service_exists')
|
||||
@patch('ansible_collections.community.general.plugins.modules.simpleinit_msb.SimpleinitMSB.execute_command')
|
||||
def test_check_service_disabled(self, execute_command, service_exists):
|
||||
simpleinit_msb = self.init_module({
|
||||
with set_module_args({
|
||||
'name': 'sysstat',
|
||||
'state': 'stopped',
|
||||
'enabled': 'false',
|
||||
})
|
||||
}):
|
||||
simpleinit_msb = SimpleinitMSB(build_module())
|
||||
|
||||
service_exists.return_value = True
|
||||
execute_command.return_value = (0, _TELINIT_LIST_DISABLED, "")
|
||||
|
@ -179,10 +179,11 @@ class TestSimpleinitMSB(ModuleTestCase):
|
|||
|
||||
@patch('ansible_collections.community.general.plugins.modules.simpleinit_msb.SimpleinitMSB.service_control')
|
||||
def test_check_service_running(self, service_control):
|
||||
simpleinit_msb = self.init_module({
|
||||
with set_module_args({
|
||||
'name': 'sshd',
|
||||
'state': 'running',
|
||||
})
|
||||
}):
|
||||
simpleinit_msb = SimpleinitMSB(build_module())
|
||||
|
||||
service_control.return_value = (0, _TELINIT_STATUS_RUNNING, "")
|
||||
|
||||
|
@ -190,10 +191,11 @@ class TestSimpleinitMSB(ModuleTestCase):
|
|||
|
||||
@patch('ansible_collections.community.general.plugins.modules.simpleinit_msb.SimpleinitMSB.service_control')
|
||||
def test_check_service_running_not(self, service_control):
|
||||
simpleinit_msb = self.init_module({
|
||||
with set_module_args({
|
||||
'name': 'smgl-metalog',
|
||||
'state': 'running',
|
||||
})
|
||||
}):
|
||||
simpleinit_msb = SimpleinitMSB(build_module())
|
||||
|
||||
service_control.return_value = (0, _TELINIT_STATUS_RUNNING_NOT, "")
|
||||
|
||||
|
|
|
@ -28,24 +28,23 @@ class TestSlackModule(ModuleTestCase):
|
|||
def test_without_required_parameters(self):
|
||||
"""Failure must occurs when all parameters are missing"""
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
self.module.main()
|
||||
|
||||
def test_invalid_old_token(self):
|
||||
"""Failure if there is an old style token"""
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'token': 'test',
|
||||
})
|
||||
}):
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
self.module.main()
|
||||
|
||||
def test_successful_message(self):
|
||||
"""tests sending a message. This is example 1 from the docs"""
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'token': 'XXXX/YYYY/ZZZZ',
|
||||
'msg': 'test'
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(slack, "fetch_url") as fetch_url_mock:
|
||||
fetch_url_mock.return_value = (None, {"status": 200})
|
||||
with self.assertRaises(AnsibleExitJson):
|
||||
|
@ -60,11 +59,10 @@ class TestSlackModule(ModuleTestCase):
|
|||
def test_failed_message(self):
|
||||
"""tests failing to send a message"""
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'token': 'XXXX/YYYY/ZZZZ',
|
||||
'msg': 'test'
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(slack, "fetch_url") as fetch_url_mock:
|
||||
fetch_url_mock.return_value = (None, {"status": 404, 'msg': 'test'})
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
|
@ -72,12 +70,11 @@ class TestSlackModule(ModuleTestCase):
|
|||
|
||||
def test_message_with_thread(self):
|
||||
"""tests sending a message with a thread"""
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'token': 'XXXX/YYYY/ZZZZ',
|
||||
'msg': 'test',
|
||||
'thread_id': '100.00'
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(slack, "fetch_url") as fetch_url_mock:
|
||||
fetch_url_mock.return_value = (None, {"status": 200})
|
||||
with self.assertRaises(AnsibleExitJson):
|
||||
|
@ -92,11 +89,10 @@ class TestSlackModule(ModuleTestCase):
|
|||
|
||||
# https://github.com/ansible-collections/community.general/issues/1097
|
||||
def test_ts_in_message_does_not_cause_edit(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'token': 'xoxa-123456789abcdef',
|
||||
'msg': 'test with ts'
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(slack, "fetch_url") as fetch_url_mock:
|
||||
mock_response = Mock()
|
||||
mock_response.read.return_value = '{"fake":"data"}'
|
||||
|
@ -108,12 +104,11 @@ class TestSlackModule(ModuleTestCase):
|
|||
self.assertEqual(fetch_url_mock.call_args[1]['url'], "https://slack.com/api/chat.postMessage")
|
||||
|
||||
def test_edit_message(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'token': 'xoxa-123456789abcdef',
|
||||
'msg': 'test2',
|
||||
'message_id': '12345'
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(slack, "fetch_url") as fetch_url_mock:
|
||||
mock_response = Mock()
|
||||
mock_response.read.return_value = '{"messages":[{"ts":"12345","msg":"test1"}]}'
|
||||
|
@ -131,7 +126,7 @@ class TestSlackModule(ModuleTestCase):
|
|||
|
||||
def test_message_with_blocks(self):
|
||||
"""tests sending a message with blocks"""
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'token': 'XXXX/YYYY/ZZZZ',
|
||||
'msg': 'test',
|
||||
'blocks': [{
|
||||
|
@ -153,8 +148,7 @@ class TestSlackModule(ModuleTestCase):
|
|||
'emoji': True
|
||||
}
|
||||
}]
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(slack, "fetch_url") as fetch_url_mock:
|
||||
fetch_url_mock.return_value = (None, {"status": 200})
|
||||
with self.assertRaises(AnsibleExitJson):
|
||||
|
@ -168,11 +162,11 @@ class TestSlackModule(ModuleTestCase):
|
|||
|
||||
def test_message_with_invalid_color(self):
|
||||
"""tests sending invalid color value to module"""
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'token': 'XXXX/YYYY/ZZZZ',
|
||||
'msg': 'test',
|
||||
'color': 'aa',
|
||||
})
|
||||
}):
|
||||
with self.assertRaises(AnsibleFailJson) as exec_info:
|
||||
self.module.main()
|
||||
|
||||
|
|
|
@ -54,14 +54,14 @@ def test_zone_create(mocked_zone_create, capfd):
|
|||
"""
|
||||
test zone creation
|
||||
"""
|
||||
set_module_args(
|
||||
with set_module_args(
|
||||
{
|
||||
"name": "z1",
|
||||
"state": "installed",
|
||||
"path": "/zones/z1",
|
||||
"_ansible_check_mode": False,
|
||||
}
|
||||
)
|
||||
):
|
||||
with pytest.raises(SystemExit):
|
||||
solaris_zone.main()
|
||||
|
||||
|
@ -75,14 +75,14 @@ def test_zone_delete(mocked_zone_delete, capfd):
|
|||
"""
|
||||
test zone deletion
|
||||
"""
|
||||
set_module_args(
|
||||
with set_module_args(
|
||||
{
|
||||
"name": "z1",
|
||||
"state": "absent",
|
||||
"path": "/zones/z1",
|
||||
"_ansible_check_mode": False,
|
||||
}
|
||||
)
|
||||
):
|
||||
with pytest.raises(SystemExit):
|
||||
solaris_zone.main()
|
||||
|
||||
|
@ -100,14 +100,14 @@ def test_zone_create_invalid_names(mocked_zone_create, capfd):
|
|||
# 2. Zone name > 64 characters.
|
||||
# 3. Zone name beginning with non-alphanumeric character.
|
||||
for invalid_name in ('foo!bar', 'z' * 65, '_zone'):
|
||||
set_module_args(
|
||||
with set_module_args(
|
||||
{
|
||||
"name": invalid_name,
|
||||
"state": "installed",
|
||||
"path": "/zones/" + invalid_name,
|
||||
"_ansible_check_mode": False,
|
||||
}
|
||||
)
|
||||
):
|
||||
with pytest.raises(SystemExit):
|
||||
solaris_zone.main()
|
||||
|
||||
|
|
|
@ -42,35 +42,35 @@ class TestStatsDModule(ModuleTestCase):
|
|||
"""Test udp without parameters"""
|
||||
with self.patch_udp_statsd_client(side_effect=FakeStatsD) as fake_statsd:
|
||||
with self.assertRaises(AnsibleFailJson) as result:
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
self.module.main()
|
||||
|
||||
def test_tcp_without_parameters(self):
|
||||
"""Test tcp without parameters"""
|
||||
with self.patch_tcp_statsd_client(side_effect=FakeStatsD) as fake_statsd:
|
||||
with self.assertRaises(AnsibleFailJson) as result:
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
self.module.main()
|
||||
|
||||
def test_udp_with_parameters(self):
|
||||
"""Test udp with parameters"""
|
||||
with self.patch_udp_statsd_client(side_effect=FakeStatsD) as fake_statsd:
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'metric': 'my_counter',
|
||||
'metric_type': 'counter',
|
||||
'value': 1,
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
self.assertEqual(result.exception.args[0]['msg'], 'Sent counter my_counter -> 1 to StatsD')
|
||||
self.assertEqual(result.exception.args[0]['changed'], True)
|
||||
with self.patch_udp_statsd_client(side_effect=FakeStatsD) as fake_statsd:
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'metric': 'my_gauge',
|
||||
'metric_type': 'gauge',
|
||||
'value': 3,
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
self.assertEqual(result.exception.args[0]['msg'], 'Sent gauge my_gauge -> 3 (delta=False) to StatsD')
|
||||
self.assertEqual(result.exception.args[0]['changed'], True)
|
||||
|
@ -79,23 +79,23 @@ class TestStatsDModule(ModuleTestCase):
|
|||
"""Test tcp with parameters"""
|
||||
with self.patch_tcp_statsd_client(side_effect=FakeStatsD) as fake_statsd:
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'protocol': 'tcp',
|
||||
'metric': 'my_counter',
|
||||
'metric_type': 'counter',
|
||||
'value': 1,
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
self.assertEqual(result.exception.args[0]['msg'], 'Sent counter my_counter -> 1 to StatsD')
|
||||
self.assertEqual(result.exception.args[0]['changed'], True)
|
||||
with self.patch_tcp_statsd_client(side_effect=FakeStatsD) as fake_statsd:
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'protocol': 'tcp',
|
||||
'metric': 'my_gauge',
|
||||
'metric_type': 'gauge',
|
||||
'value': 3,
|
||||
})
|
||||
}):
|
||||
self.module.main()
|
||||
self.assertEqual(result.exception.args[0]['msg'], 'Sent gauge my_gauge -> 3 (delta=False) to StatsD')
|
||||
self.assertEqual(result.exception.args[0]['changed'], True)
|
||||
|
|
|
@ -7,7 +7,7 @@ __metaclass__ = type
|
|||
|
||||
from ansible.module_utils import basic
|
||||
from ansible_collections.community.general.tests.unit.compat.mock import patch
|
||||
from ansible_collections.community.general.tests.unit.plugins.modules.utils import AnsibleExitJson, AnsibleFailJson, ModuleTestCase
|
||||
from ansible_collections.community.general.tests.unit.plugins.modules.utils import set_module_args, AnsibleExitJson, AnsibleFailJson, ModuleTestCase
|
||||
from ansible_collections.community.general.plugins.modules import sysupgrade
|
||||
|
||||
|
||||
|
@ -48,6 +48,7 @@ class TestSysupgradeModule(ModuleTestCase):
|
|||
"""
|
||||
stderr = ""
|
||||
|
||||
with set_module_args({}):
|
||||
with patch.object(basic.AnsibleModule, "run_command") as run_command:
|
||||
run_command.return_value = (rc, stdout, stderr)
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
|
@ -61,6 +62,7 @@ class TestSysupgradeModule(ModuleTestCase):
|
|||
stdout = ""
|
||||
stderr = "sysupgrade: need root privileges"
|
||||
|
||||
with set_module_args({}):
|
||||
with patch.object(basic.AnsibleModule, "run_command") as run_command_mock:
|
||||
run_command_mock.return_value = (rc, stdout, stderr)
|
||||
with self.assertRaises(AnsibleFailJson) as result:
|
||||
|
|
|
@ -13,7 +13,7 @@ from ansible_collections.community.general.tests.unit.plugins.modules.utils impo
|
|||
|
||||
|
||||
def test_terraform_without_argument(capfd):
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
with pytest.raises(SystemExit) as results:
|
||||
terraform.main()
|
||||
|
||||
|
|
|
@ -7,10 +7,8 @@ __metaclass__ = type
|
|||
from ansible_collections.community.general.tests.unit.compat import unittest
|
||||
from ansible_collections.community.general.tests.unit.compat.mock import patch
|
||||
from ansible.module_utils import basic
|
||||
from ansible.module_utils.common.text.converters import to_bytes
|
||||
import ansible_collections.community.general.plugins.modules.ufw as module
|
||||
|
||||
import json
|
||||
from ansible_collections.community.general.tests.unit.plugins.modules.utils import AnsibleExitJson, AnsibleFailJson, set_module_args, exit_json, fail_json
|
||||
|
||||
|
||||
# mock ufw messages
|
||||
|
@ -104,35 +102,6 @@ def do_nothing_func_port_7000(*args, **kwarg):
|
|||
return 0, dry_mode_cmd_with_port_700[args[0]], ""
|
||||
|
||||
|
||||
def set_module_args(args):
|
||||
args = json.dumps({'ANSIBLE_MODULE_ARGS': args})
|
||||
"""prepare arguments so that they will be picked up during module creation"""
|
||||
basic._ANSIBLE_ARGS = to_bytes(args)
|
||||
|
||||
|
||||
class AnsibleExitJson(Exception):
|
||||
"""Exception class to be raised by module.exit_json and caught by the test case"""
|
||||
pass
|
||||
|
||||
|
||||
class AnsibleFailJson(Exception):
|
||||
"""Exception class to be raised by module.fail_json and caught by the test case"""
|
||||
pass
|
||||
|
||||
|
||||
def exit_json(*args, **kwargs):
|
||||
"""function to patch over exit_json; package return data into an exception"""
|
||||
if 'changed' not in kwargs:
|
||||
kwargs['changed'] = False
|
||||
raise AnsibleExitJson(kwargs)
|
||||
|
||||
|
||||
def fail_json(*args, **kwargs):
|
||||
"""function to patch over fail_json; package return data into an exception"""
|
||||
kwargs['failed'] = True
|
||||
raise AnsibleFailJson(kwargs)
|
||||
|
||||
|
||||
def get_bin_path(self, arg, required=False):
|
||||
"""Mock AnsibleModule.get_bin_path"""
|
||||
return arg
|
||||
|
@ -171,28 +140,28 @@ class TestUFW(unittest.TestCase):
|
|||
self.assertTrue(reg.match("::") is not None)
|
||||
|
||||
def test_check_mode_add_rules(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'rule': 'allow',
|
||||
'proto': 'tcp',
|
||||
'port': '7000',
|
||||
'_ansible_check_mode': True
|
||||
})
|
||||
}):
|
||||
result = self.__getResult(do_nothing_func_port_7000)
|
||||
self.assertFalse(result.exception.args[0]['changed'])
|
||||
|
||||
def test_check_mode_add_insert_rules(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'insert': '1',
|
||||
'rule': 'allow',
|
||||
'proto': 'tcp',
|
||||
'port': '7000',
|
||||
'_ansible_check_mode': True
|
||||
})
|
||||
}):
|
||||
result = self.__getResult(do_nothing_func_port_7000)
|
||||
self.assertFalse(result.exception.args[0]['changed'])
|
||||
|
||||
def test_check_mode_add_detailed_route(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'rule': 'allow',
|
||||
'route': 'yes',
|
||||
'interface_in': 'foo',
|
||||
|
@ -203,13 +172,12 @@ class TestUFW(unittest.TestCase):
|
|||
'from_port': '7000',
|
||||
'to_port': '7001',
|
||||
'_ansible_check_mode': True
|
||||
})
|
||||
|
||||
}):
|
||||
result = self.__getResult(do_nothing_func_port_7000)
|
||||
self.assertTrue(result.exception.args[0]['changed'])
|
||||
|
||||
def test_check_mode_add_ambiguous_route(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'rule': 'allow',
|
||||
'route': 'yes',
|
||||
'interface_in': 'foo',
|
||||
|
@ -217,8 +185,7 @@ class TestUFW(unittest.TestCase):
|
|||
'direction': 'in',
|
||||
'interface': 'baz',
|
||||
'_ansible_check_mode': True
|
||||
})
|
||||
|
||||
}):
|
||||
with self.assertRaises(AnsibleFailJson) as result:
|
||||
self.__getResult(do_nothing_func_port_7000)
|
||||
|
||||
|
@ -227,37 +194,36 @@ class TestUFW(unittest.TestCase):
|
|||
self.assertIn('mutually exclusive', exc['msg'])
|
||||
|
||||
def test_check_mode_add_interface_in(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'rule': 'allow',
|
||||
'proto': 'tcp',
|
||||
'port': '7003',
|
||||
'interface_in': 'foo',
|
||||
'_ansible_check_mode': True
|
||||
})
|
||||
}):
|
||||
result = self.__getResult(do_nothing_func_port_7000)
|
||||
self.assertTrue(result.exception.args[0]['changed'])
|
||||
|
||||
def test_check_mode_add_interface_out(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'rule': 'allow',
|
||||
'proto': 'tcp',
|
||||
'port': '7004',
|
||||
'interface_out': 'foo',
|
||||
'_ansible_check_mode': True
|
||||
})
|
||||
}):
|
||||
result = self.__getResult(do_nothing_func_port_7000)
|
||||
self.assertTrue(result.exception.args[0]['changed'])
|
||||
|
||||
def test_check_mode_add_non_route_interface_both(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'rule': 'allow',
|
||||
'proto': 'tcp',
|
||||
'port': '7004',
|
||||
'interface_in': 'foo',
|
||||
'interface_out': 'bar',
|
||||
'_ansible_check_mode': True
|
||||
})
|
||||
|
||||
}):
|
||||
with self.assertRaises(AnsibleFailJson) as result:
|
||||
self.__getResult(do_nothing_func_port_7000)
|
||||
|
||||
|
@ -266,19 +232,19 @@ class TestUFW(unittest.TestCase):
|
|||
self.assertIn('combine', exc['msg'])
|
||||
|
||||
def test_check_mode_add_direction_in(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'rule': 'allow',
|
||||
'proto': 'tcp',
|
||||
'port': '7003',
|
||||
'direction': 'in',
|
||||
'interface': 'foo',
|
||||
'_ansible_check_mode': True
|
||||
})
|
||||
}):
|
||||
result = self.__getResult(do_nothing_func_port_7000)
|
||||
self.assertTrue(result.exception.args[0]['changed'])
|
||||
|
||||
def test_check_mode_add_direction_in_with_ip(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'rule': 'allow',
|
||||
'proto': 'tcp',
|
||||
'from_ip': '1.1.1.1',
|
||||
|
@ -288,24 +254,24 @@ class TestUFW(unittest.TestCase):
|
|||
'direction': 'in',
|
||||
'interface': 'foo',
|
||||
'_ansible_check_mode': True
|
||||
})
|
||||
}):
|
||||
result = self.__getResult(do_nothing_func_port_7000)
|
||||
self.assertTrue(result.exception.args[0]['changed'])
|
||||
|
||||
def test_check_mode_add_direction_out(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'rule': 'allow',
|
||||
'proto': 'tcp',
|
||||
'port': '7004',
|
||||
'direction': 'out',
|
||||
'interface': 'foo',
|
||||
'_ansible_check_mode': True
|
||||
})
|
||||
}):
|
||||
result = self.__getResult(do_nothing_func_port_7000)
|
||||
self.assertTrue(result.exception.args[0]['changed'])
|
||||
|
||||
def test_check_mode_add_direction_out_with_ip(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'rule': 'allow',
|
||||
'proto': 'tcp',
|
||||
'from_ip': '1.1.1.1',
|
||||
|
@ -315,156 +281,148 @@ class TestUFW(unittest.TestCase):
|
|||
'direction': 'out',
|
||||
'interface': 'foo',
|
||||
'_ansible_check_mode': True
|
||||
})
|
||||
}):
|
||||
result = self.__getResult(do_nothing_func_port_7000)
|
||||
self.assertTrue(result.exception.args[0]['changed'])
|
||||
|
||||
def test_check_mode_delete_existing_rules(self):
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'rule': 'allow',
|
||||
'proto': 'tcp',
|
||||
'port': '7000',
|
||||
'delete': 'yes',
|
||||
'_ansible_check_mode': True,
|
||||
})
|
||||
|
||||
}):
|
||||
self.assertTrue(self.__getResult(do_nothing_func_port_7000).exception.args[0]['changed'])
|
||||
|
||||
def test_check_mode_delete_existing_insert_rules(self):
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'insert': '1',
|
||||
'rule': 'allow',
|
||||
'proto': 'tcp',
|
||||
'port': '7000',
|
||||
'delete': 'yes',
|
||||
'_ansible_check_mode': True,
|
||||
})
|
||||
|
||||
}):
|
||||
self.assertTrue(self.__getResult(do_nothing_func_port_7000).exception.args[0]['changed'])
|
||||
|
||||
def test_check_mode_delete_not_existing_rules(self):
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'rule': 'allow',
|
||||
'proto': 'tcp',
|
||||
'port': '7001',
|
||||
'delete': 'yes',
|
||||
'_ansible_check_mode': True,
|
||||
})
|
||||
|
||||
}):
|
||||
self.assertFalse(self.__getResult(do_nothing_func_port_7000).exception.args[0]['changed'])
|
||||
|
||||
def test_check_mode_delete_not_existing_insert_rules(self):
|
||||
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'insert': '1',
|
||||
'rule': 'allow',
|
||||
'proto': 'tcp',
|
||||
'port': '7001',
|
||||
'delete': 'yes',
|
||||
'_ansible_check_mode': True,
|
||||
})
|
||||
|
||||
}):
|
||||
self.assertFalse(self.__getResult(do_nothing_func_port_7000).exception.args[0]['changed'])
|
||||
|
||||
def test_enable_mode(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'state': 'enabled',
|
||||
'_ansible_check_mode': True
|
||||
})
|
||||
|
||||
}):
|
||||
self.assertFalse(self.__getResult(do_nothing_func_port_7000).exception.args[0]['changed'])
|
||||
|
||||
def test_disable_mode(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'state': 'disabled',
|
||||
'_ansible_check_mode': True
|
||||
})
|
||||
|
||||
}):
|
||||
self.assertTrue(self.__getResult(do_nothing_func_port_7000).exception.args[0]['changed'])
|
||||
|
||||
def test_logging_off(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'logging': 'off',
|
||||
'_ansible_check_mode': True
|
||||
})
|
||||
|
||||
}):
|
||||
self.assertTrue(self.__getResult(do_nothing_func_port_7000).exception.args[0]['changed'])
|
||||
|
||||
def test_logging_on(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'logging': 'on',
|
||||
'_ansible_check_mode': True
|
||||
})
|
||||
|
||||
}):
|
||||
self.assertFalse(self.__getResult(do_nothing_func_port_7000).exception.args[0]['changed'])
|
||||
|
||||
def test_default_changed(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'default': 'allow',
|
||||
"direction": "incoming",
|
||||
'_ansible_check_mode': True
|
||||
})
|
||||
}):
|
||||
self.assertTrue(self.__getResult(do_nothing_func_port_7000).exception.args[0]['changed'])
|
||||
|
||||
def test_default_not_changed(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'default': 'deny',
|
||||
"direction": "incoming",
|
||||
'_ansible_check_mode': True
|
||||
})
|
||||
}):
|
||||
self.assertFalse(self.__getResult(do_nothing_func_port_7000).exception.args[0]['changed'])
|
||||
|
||||
def test_ipv6_remove(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'rule': 'allow',
|
||||
'proto': 'udp',
|
||||
'port': '5353',
|
||||
'from': 'ff02::fb',
|
||||
'delete': 'yes',
|
||||
'_ansible_check_mode': True,
|
||||
})
|
||||
}):
|
||||
self.assertTrue(self.__getResult(do_nothing_func_ipv6).exception.args[0]['changed'])
|
||||
|
||||
def test_ipv6_add_existing(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'rule': 'allow',
|
||||
'proto': 'udp',
|
||||
'port': '5353',
|
||||
'from': 'ff02::fb',
|
||||
'_ansible_check_mode': True,
|
||||
})
|
||||
}):
|
||||
self.assertFalse(self.__getResult(do_nothing_func_ipv6).exception.args[0]['changed'])
|
||||
|
||||
def test_add_not_existing_ipv4_submask(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'rule': 'allow',
|
||||
'proto': 'udp',
|
||||
'port': '1577',
|
||||
'from': '10.0.0.0/24',
|
||||
'_ansible_check_mode': True,
|
||||
})
|
||||
}):
|
||||
self.assertTrue(self.__getResult(do_nothing_func_ipv6).exception.args[0]['changed'])
|
||||
|
||||
def test_ipv4_add_with_existing_ipv6(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'rule': 'allow',
|
||||
'proto': 'udp',
|
||||
'port': '5353',
|
||||
'from': '224.0.0.252',
|
||||
'_ansible_check_mode': True,
|
||||
})
|
||||
}):
|
||||
self.assertTrue(self.__getResult(do_nothing_func_ipv6).exception.args[0]['changed'])
|
||||
|
||||
def test_ipv6_add_from_nothing(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'rule': 'allow',
|
||||
'port': '23',
|
||||
'to': '::',
|
||||
'_ansible_check_mode': True,
|
||||
})
|
||||
}):
|
||||
result = self.__getResult(do_nothing_func_nothing).exception.args[0]
|
||||
print(result)
|
||||
self.assertTrue(result['changed'])
|
||||
|
|
|
@ -5,42 +5,11 @@
|
|||
from __future__ import (absolute_import, division, print_function)
|
||||
__metaclass__ = type
|
||||
|
||||
import json
|
||||
|
||||
from ansible_collections.community.general.tests.unit.compat import mock
|
||||
from ansible_collections.community.general.tests.unit.compat import unittest
|
||||
from ansible.module_utils import basic
|
||||
from ansible.module_utils.common.text.converters import to_bytes
|
||||
from ansible_collections.community.general.plugins.modules import usb_facts
|
||||
|
||||
|
||||
def set_module_args(args):
|
||||
"""prepare arguments so that they will be picked up during module creation"""
|
||||
args = json.dumps({'ANSIBLE_MODULE_ARGS': args})
|
||||
basic._ANSIBLE_ARGS = to_bytes(args)
|
||||
|
||||
|
||||
class AnsibleExitJson(Exception):
|
||||
"""Exception class to be raised by module.exit_json and caught by the test case"""
|
||||
pass
|
||||
|
||||
|
||||
class AnsibleFailJson(Exception):
|
||||
"""Exception class to be raised by module.fail_json and caught by the test case"""
|
||||
pass
|
||||
|
||||
|
||||
def exit_json(*args, **kwargs):
|
||||
"""function to patch over exit_json; package return data into an exception"""
|
||||
if 'changed' not in kwargs:
|
||||
kwargs['changed'] = False
|
||||
raise AnsibleExitJson(kwargs)
|
||||
|
||||
|
||||
def fail_json(*args, **kwargs):
|
||||
"""function to patch over fail_json; package return data into an exception"""
|
||||
kwargs['failed'] = True
|
||||
raise AnsibleFailJson(kwargs)
|
||||
from ansible_collections.community.general.tests.unit.plugins.modules.utils import AnsibleExitJson, set_module_args, exit_json, fail_json
|
||||
|
||||
|
||||
def get_bin_path(self, arg, required=False):
|
||||
|
@ -85,7 +54,7 @@ class TestUsbFacts(unittest.TestCase):
|
|||
command_output = data["input"]
|
||||
mock_run_command.return_value = 0, command_output, None
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
usb_facts.main()
|
||||
for output_field in self.output_fields:
|
||||
self.assertEqual(result.exception.args[0]["ansible_facts"]["usb_devices"][0][output_field], data[output_field])
|
||||
|
@ -97,7 +66,7 @@ class TestUsbFacts(unittest.TestCase):
|
|||
with mock.patch.object(basic.AnsibleModule, 'run_command') as mock_run_command:
|
||||
mock_run_command.return_value = 0, input, None
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
usb_facts.main()
|
||||
for index in range(0, len(self.testing_data)):
|
||||
for output_field in self.output_fields:
|
||||
|
|
|
@ -309,29 +309,29 @@ class TestWdcRedfishCommand(unittest.TestCase):
|
|||
|
||||
def test_module_fail_when_required_args_missing(self):
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
module.main()
|
||||
|
||||
def test_module_fail_when_unknown_category(self):
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'unknown',
|
||||
'command': 'FWActivate',
|
||||
'username': 'USERID',
|
||||
'password': 'PASSW0RD=21',
|
||||
'ioms': [],
|
||||
})
|
||||
}):
|
||||
module.main()
|
||||
|
||||
def test_module_fail_when_unknown_command(self):
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Update',
|
||||
'command': 'unknown',
|
||||
'username': 'USERID',
|
||||
'password': 'PASSW0RD=21',
|
||||
'ioms': [],
|
||||
})
|
||||
}):
|
||||
module.main()
|
||||
|
||||
def test_module_chassis_power_mode_low(self):
|
||||
|
@ -344,7 +344,7 @@ class TestWdcRedfishCommand(unittest.TestCase):
|
|||
'resource_id': 'Enclosure',
|
||||
'baseuri': 'example.com'
|
||||
}
|
||||
set_module_args(module_args)
|
||||
with set_module_args(module_args):
|
||||
with patch.multiple("ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.WdcRedfishUtils",
|
||||
get_request=mock_get_request,
|
||||
post_request=mock_post_request):
|
||||
|
@ -364,7 +364,7 @@ class TestWdcRedfishCommand(unittest.TestCase):
|
|||
'resource_id': 'Enclosure',
|
||||
'baseuri': 'example.com'
|
||||
}
|
||||
set_module_args(module_args)
|
||||
with set_module_args(module_args):
|
||||
with patch.multiple("ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.WdcRedfishUtils",
|
||||
get_request=mock_get_request):
|
||||
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
|
||||
|
@ -383,7 +383,7 @@ class TestWdcRedfishCommand(unittest.TestCase):
|
|||
'resource_id': 'Enclosure',
|
||||
'baseuri': 'example.com'
|
||||
}
|
||||
set_module_args(module_args)
|
||||
with set_module_args(module_args):
|
||||
with patch.multiple("ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.WdcRedfishUtils",
|
||||
get_request=mock_get_request):
|
||||
with self.assertRaises(AnsibleFailJson) as ansible_fail_json:
|
||||
|
@ -402,8 +402,7 @@ class TestWdcRedfishCommand(unittest.TestCase):
|
|||
"resource_id": "Enclosure",
|
||||
"baseuri": "example.com"
|
||||
}
|
||||
set_module_args(module_args)
|
||||
|
||||
with set_module_args(module_args):
|
||||
with patch.multiple("ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.WdcRedfishUtils",
|
||||
get_request=mock_get_request,
|
||||
post_request=mock_post_request):
|
||||
|
@ -423,8 +422,7 @@ class TestWdcRedfishCommand(unittest.TestCase):
|
|||
"resource_id": "Disk99",
|
||||
"baseuri": "example.com"
|
||||
}
|
||||
set_module_args(module_args)
|
||||
|
||||
with set_module_args(module_args):
|
||||
with patch.multiple("ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.WdcRedfishUtils",
|
||||
get_request=mock_get_request,
|
||||
post_request=mock_post_request):
|
||||
|
@ -444,8 +442,7 @@ class TestWdcRedfishCommand(unittest.TestCase):
|
|||
"resource_id": "Enclosure",
|
||||
"baseuri": "example.com"
|
||||
}
|
||||
set_module_args(module_args)
|
||||
|
||||
with set_module_args(module_args):
|
||||
with patch.multiple("ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.WdcRedfishUtils",
|
||||
get_request=mock_get_request):
|
||||
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
|
||||
|
@ -467,7 +464,7 @@ class TestWdcRedfishCommand(unittest.TestCase):
|
|||
'password': 'PASSW0RD=21',
|
||||
'ioms': ioms
|
||||
}
|
||||
set_module_args(module_args)
|
||||
with set_module_args(module_args):
|
||||
|
||||
def mock_get_request(*args, **kwargs):
|
||||
"""Mock for get_request that will fail on the 'bad' IOM."""
|
||||
|
@ -508,8 +505,7 @@ class TestWdcRedfishCommand(unittest.TestCase):
|
|||
'password': 'PASSW0RD=21',
|
||||
}
|
||||
module_args.update(uri_specifier)
|
||||
set_module_args(module_args)
|
||||
|
||||
with set_module_args(module_args):
|
||||
with patch.multiple("ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.WdcRedfishUtils",
|
||||
_firmware_activate_uri=mock_fw_activate_url,
|
||||
_update_uri=mock_update_url,
|
||||
|
@ -526,13 +522,13 @@ class TestWdcRedfishCommand(unittest.TestCase):
|
|||
def test_module_fw_activate_service_does_not_support_fw_activate(self):
|
||||
"""Test FW Activate when it is not supported."""
|
||||
expected_error_message = "Service does not support FWActivate"
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Update',
|
||||
'command': 'FWActivate',
|
||||
'username': 'USERID',
|
||||
'password': 'PASSW0RD=21',
|
||||
'ioms': ["example1.example.com"]
|
||||
})
|
||||
}):
|
||||
|
||||
def mock_update_uri_response(*args, **kwargs):
|
||||
return {
|
||||
|
@ -554,14 +550,14 @@ class TestWdcRedfishCommand(unittest.TestCase):
|
|||
def test_module_update_and_activate_image_uri_not_http(self):
|
||||
"""Test Update and Activate when URI is not http(s)"""
|
||||
expected_error_message = "Bundle URI must be HTTP or HTTPS"
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Update',
|
||||
'command': 'UpdateAndActivate',
|
||||
'username': 'USERID',
|
||||
'password': 'PASSW0RD=21',
|
||||
'ioms': ["example1.example.com"],
|
||||
'update_image_uri': "ftp://example.com/image"
|
||||
})
|
||||
}):
|
||||
with patch.multiple(module.WdcRedfishUtils,
|
||||
_firmware_activate_uri=mocked_url_response,
|
||||
_update_uri=mock_update_url,
|
||||
|
@ -580,14 +576,14 @@ class TestWdcRedfishCommand(unittest.TestCase):
|
|||
mock_status_code,
|
||||
mock_status_description
|
||||
)
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Update',
|
||||
'command': 'UpdateAndActivate',
|
||||
'username': 'USERID',
|
||||
'password': 'PASSW0RD=21',
|
||||
'ioms': ["example1.example.com"],
|
||||
'update_image_uri': "http://example.com/image"
|
||||
})
|
||||
}):
|
||||
with patch.object(module.WdcRedfishUtils, "get_simple_update_status") as mock_get_simple_update_status:
|
||||
mock_get_simple_update_status.return_value = {
|
||||
"ret": True,
|
||||
|
@ -611,7 +607,7 @@ class TestWdcRedfishCommand(unittest.TestCase):
|
|||
"""Test Update and Activate when bundle is not a tarfile"""
|
||||
mock_filename = os.path.abspath(__file__)
|
||||
expected_error_message = ERROR_MESSAGE_UNABLE_TO_EXTRACT_BUNDLE_VERSION
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Update',
|
||||
'command': 'UpdateAndActivate',
|
||||
'username': 'USERID',
|
||||
|
@ -622,7 +618,7 @@ class TestWdcRedfishCommand(unittest.TestCase):
|
|||
"username": "image_user",
|
||||
"password": "image_password"
|
||||
}
|
||||
})
|
||||
}):
|
||||
with patch('ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.fetch_file') as mock_fetch_file:
|
||||
mock_fetch_file.return_value = mock_filename
|
||||
with patch.multiple(module.WdcRedfishUtils,
|
||||
|
@ -639,7 +635,7 @@ class TestWdcRedfishCommand(unittest.TestCase):
|
|||
def test_module_update_and_activate_bundle_contains_no_firmware_version(self):
|
||||
"""Test Update and Activate when bundle contains no firmware version"""
|
||||
expected_error_message = ERROR_MESSAGE_UNABLE_TO_EXTRACT_BUNDLE_VERSION
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Update',
|
||||
'command': 'UpdateAndActivate',
|
||||
'username': 'USERID',
|
||||
|
@ -650,7 +646,7 @@ class TestWdcRedfishCommand(unittest.TestCase):
|
|||
"username": "image_user",
|
||||
"password": "image_password"
|
||||
}
|
||||
})
|
||||
}):
|
||||
|
||||
tar_name = "empty_tarfile{0}.tar".format(uuid.uuid4())
|
||||
empty_tarfile = tarfile.open(os.path.join(self.tempdir, tar_name), "w")
|
||||
|
@ -672,7 +668,7 @@ class TestWdcRedfishCommand(unittest.TestCase):
|
|||
"""Test Update and Activate when the bundle version is already installed"""
|
||||
mock_firmware_version = "1.2.3"
|
||||
expected_error_message = ACTION_WAS_SUCCESSFUL_MESSAGE
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Update',
|
||||
'command': 'UpdateAndActivate',
|
||||
'username': 'USERID',
|
||||
|
@ -683,7 +679,7 @@ class TestWdcRedfishCommand(unittest.TestCase):
|
|||
"username": "image_user",
|
||||
"password": "image_password"
|
||||
}
|
||||
})
|
||||
}):
|
||||
|
||||
tar_name = self.generate_temp_bundlefile(mock_firmware_version=mock_firmware_version,
|
||||
is_multi_tenant=False)
|
||||
|
@ -707,7 +703,7 @@ class TestWdcRedfishCommand(unittest.TestCase):
|
|||
"""Test Update and Activate on multi-tenant when version is already installed"""
|
||||
mock_firmware_version = "1.2.3"
|
||||
expected_error_message = ACTION_WAS_SUCCESSFUL_MESSAGE
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Update',
|
||||
'command': 'UpdateAndActivate',
|
||||
'username': 'USERID',
|
||||
|
@ -718,7 +714,7 @@ class TestWdcRedfishCommand(unittest.TestCase):
|
|||
"username": "image_user",
|
||||
"password": "image_password"
|
||||
}
|
||||
})
|
||||
}):
|
||||
|
||||
tar_name = self.generate_temp_bundlefile(mock_firmware_version=mock_firmware_version,
|
||||
is_multi_tenant=True)
|
||||
|
@ -741,7 +737,7 @@ class TestWdcRedfishCommand(unittest.TestCase):
|
|||
def test_module_update_and_activate_pass(self):
|
||||
"""Test Update and Activate (happy path)"""
|
||||
mock_firmware_version = "1.2.2"
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Update',
|
||||
'command': 'UpdateAndActivate',
|
||||
'username': 'USERID',
|
||||
|
@ -752,7 +748,7 @@ class TestWdcRedfishCommand(unittest.TestCase):
|
|||
"username": "image_user",
|
||||
"password": "image_password"
|
||||
}
|
||||
})
|
||||
}):
|
||||
|
||||
tar_name = self.generate_temp_bundlefile(mock_firmware_version=mock_firmware_version,
|
||||
is_multi_tenant=False)
|
||||
|
@ -779,7 +775,7 @@ class TestWdcRedfishCommand(unittest.TestCase):
|
|||
def test_module_update_and_activate_pass_multi_tenant(self):
|
||||
"""Test Update and Activate with multi-tenant (happy path)"""
|
||||
mock_firmware_version = "1.2.2"
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Update',
|
||||
'command': 'UpdateAndActivate',
|
||||
'username': 'USERID',
|
||||
|
@ -790,7 +786,7 @@ class TestWdcRedfishCommand(unittest.TestCase):
|
|||
"username": "image_user",
|
||||
"password": "image_password"
|
||||
}
|
||||
})
|
||||
}):
|
||||
|
||||
tar_name = self.generate_temp_bundlefile(mock_firmware_version=mock_firmware_version,
|
||||
is_multi_tenant=True)
|
||||
|
@ -817,7 +813,7 @@ class TestWdcRedfishCommand(unittest.TestCase):
|
|||
"""Test Update and Activate using multi-tenant bundle on single-tenant enclosure"""
|
||||
mock_firmware_version = "1.1.1"
|
||||
expected_error_message = "Enclosure multi-tenant is False but bundle multi-tenant is True"
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Update',
|
||||
'command': 'UpdateAndActivate',
|
||||
'username': 'USERID',
|
||||
|
@ -828,7 +824,7 @@ class TestWdcRedfishCommand(unittest.TestCase):
|
|||
"username": "image_user",
|
||||
"password": "image_password"
|
||||
}
|
||||
})
|
||||
}):
|
||||
|
||||
tar_name = self.generate_temp_bundlefile(mock_firmware_version=mock_firmware_version,
|
||||
is_multi_tenant=True)
|
||||
|
@ -851,7 +847,7 @@ class TestWdcRedfishCommand(unittest.TestCase):
|
|||
"""Test Update and Activate using singe-tenant bundle on multi-tenant enclosure"""
|
||||
mock_firmware_version = "1.1.1"
|
||||
expected_error_message = "Enclosure multi-tenant is True but bundle multi-tenant is False"
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Update',
|
||||
'command': 'UpdateAndActivate',
|
||||
'username': 'USERID',
|
||||
|
@ -862,7 +858,7 @@ class TestWdcRedfishCommand(unittest.TestCase):
|
|||
"username": "image_user",
|
||||
"password": "image_password"
|
||||
}
|
||||
})
|
||||
}):
|
||||
|
||||
tar_name = self.generate_temp_bundlefile(mock_firmware_version=mock_firmware_version,
|
||||
is_multi_tenant=False)
|
||||
|
|
|
@ -77,39 +77,39 @@ class TestWdcRedfishInfo(unittest.TestCase):
|
|||
|
||||
def test_module_fail_when_required_args_missing(self):
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
module.main()
|
||||
|
||||
def test_module_fail_when_unknown_category(self):
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'unknown',
|
||||
'command': 'SimpleUpdateStatus',
|
||||
'username': 'USERID',
|
||||
'password': 'PASSW0RD=21',
|
||||
'ioms': [],
|
||||
})
|
||||
}):
|
||||
module.main()
|
||||
|
||||
def test_module_fail_when_unknown_command(self):
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Update',
|
||||
'command': 'unknown',
|
||||
'username': 'USERID',
|
||||
'password': 'PASSW0RD=21',
|
||||
'ioms': [],
|
||||
})
|
||||
}):
|
||||
module.main()
|
||||
|
||||
def test_module_simple_update_status_pass(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Update',
|
||||
'command': 'SimpleUpdateStatus',
|
||||
'username': 'USERID',
|
||||
'password': 'PASSW0RD=21',
|
||||
'ioms': ["example1.example.com"],
|
||||
})
|
||||
}):
|
||||
|
||||
def mock_simple_update_status(*args, **kwargs):
|
||||
return {
|
||||
|
@ -140,13 +140,13 @@ class TestWdcRedfishInfo(unittest.TestCase):
|
|||
redfish_facts["simple_update_status"]["entries"])
|
||||
|
||||
def test_module_simple_update_status_updateservice_resource_not_found(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Update',
|
||||
'command': 'SimpleUpdateStatus',
|
||||
'username': 'USERID',
|
||||
'password': 'PASSW0RD=21',
|
||||
'ioms': ["example1.example.com"],
|
||||
})
|
||||
}):
|
||||
with patch.object(module.WdcRedfishUtils, 'get_request') as mock_get_request:
|
||||
mock_get_request.return_value = {
|
||||
"ret": True,
|
||||
|
@ -158,13 +158,13 @@ class TestWdcRedfishInfo(unittest.TestCase):
|
|||
get_exception_message(ansible_exit_json))
|
||||
|
||||
def test_module_simple_update_status_service_does_not_support_simple_update(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Update',
|
||||
'command': 'SimpleUpdateStatus',
|
||||
'username': 'USERID',
|
||||
'password': 'PASSW0RD=21',
|
||||
'ioms': ["example1.example.com"],
|
||||
})
|
||||
}):
|
||||
|
||||
def mock_get_request_function(uri):
|
||||
mock_url_string = "mockURL"
|
||||
|
@ -190,13 +190,13 @@ class TestWdcRedfishInfo(unittest.TestCase):
|
|||
get_exception_message(ansible_exit_json))
|
||||
|
||||
def test_module_simple_update_status_service_does_not_support_fw_activate(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Update',
|
||||
'command': 'SimpleUpdateStatus',
|
||||
'username': 'USERID',
|
||||
'password': 'PASSW0RD=21',
|
||||
'ioms': ["example1.example.com"],
|
||||
})
|
||||
}):
|
||||
|
||||
def mock_get_request_function(uri):
|
||||
if uri.endswith("/redfish/v1") or uri.endswith("/redfish/v1/"):
|
||||
|
|
|
@ -30,33 +30,33 @@ class TestXCCRedfishCommand(unittest.TestCase):
|
|||
|
||||
def test_module_fail_when_required_args_missing(self):
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({})
|
||||
with set_module_args({}):
|
||||
module.main()
|
||||
|
||||
def test_module_fail_when_unknown_category(self):
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'unknown',
|
||||
'command': 'VirtualMediaEject',
|
||||
'baseuri': '10.245.39.251',
|
||||
'username': 'USERID',
|
||||
'password': 'PASSW0RD=21',
|
||||
})
|
||||
}):
|
||||
module.main()
|
||||
|
||||
def test_module_fail_when_unknown_command(self):
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Manager',
|
||||
'command': 'unknown',
|
||||
'baseuri': '10.245.39.251',
|
||||
'username': 'USERID',
|
||||
'password': 'PASSW0RD=21',
|
||||
})
|
||||
}):
|
||||
module.main()
|
||||
|
||||
def test_module_command_VirtualMediaInsert_pass(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Manager',
|
||||
'command': 'VirtualMediaInsert',
|
||||
'baseuri': '10.245.39.251',
|
||||
|
@ -70,7 +70,7 @@ class TestXCCRedfishCommand(unittest.TestCase):
|
|||
'write_protected': True,
|
||||
'transfer_protocol_type': 'NFS'
|
||||
}
|
||||
})
|
||||
}):
|
||||
with patch.object(module.XCCRedfishUtils, '_find_systems_resource') as mock__find_systems_resource:
|
||||
mock__find_systems_resource.return_value = {'ret': True, 'changed': True, 'msg': 'success'}
|
||||
with patch.object(module.XCCRedfishUtils, '_find_managers_resource') as mock__find_managers_resource:
|
||||
|
@ -83,7 +83,7 @@ class TestXCCRedfishCommand(unittest.TestCase):
|
|||
module.main()
|
||||
|
||||
def test_module_command_VirtualMediaEject_pass(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Manager',
|
||||
'command': 'VirtualMediaEject',
|
||||
'baseuri': '10.245.39.251',
|
||||
|
@ -93,7 +93,7 @@ class TestXCCRedfishCommand(unittest.TestCase):
|
|||
'virtual_media': {
|
||||
'image_url': "nfs://10.245.52.18:/home/nfs/bootable-sr635-20210111-autorun.iso",
|
||||
}
|
||||
})
|
||||
}):
|
||||
with patch.object(module.XCCRedfishUtils, '_find_systems_resource') as mock__find_systems_resource:
|
||||
mock__find_systems_resource.return_value = {'ret': True, 'changed': True, 'msg': 'success'}
|
||||
with patch.object(module.XCCRedfishUtils, '_find_managers_resource') as mock__find_managers_resource:
|
||||
|
@ -107,24 +107,23 @@ class TestXCCRedfishCommand(unittest.TestCase):
|
|||
|
||||
def test_module_command_VirtualMediaEject_fail_when_required_args_missing(self):
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Manager',
|
||||
'command': 'VirtualMediaEject',
|
||||
'baseuri': '10.245.39.251',
|
||||
'username': 'USERID',
|
||||
'password': 'PASSW0RD=21',
|
||||
})
|
||||
}):
|
||||
module.main()
|
||||
|
||||
def test_module_command_GetResource_fail_when_required_args_missing(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Raw',
|
||||
'command': 'GetResource',
|
||||
'baseuri': '10.245.39.251',
|
||||
'username': 'USERID',
|
||||
'password': 'PASSW0RD=21',
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
|
||||
mock_get_request.return_value = {'ret': True, 'data': {'teststr': 'xxxx'}}
|
||||
|
||||
|
@ -132,15 +131,14 @@ class TestXCCRedfishCommand(unittest.TestCase):
|
|||
module.main()
|
||||
|
||||
def test_module_command_GetResource_fail_when_get_return_false(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Raw',
|
||||
'command': 'GetResource',
|
||||
'baseuri': '10.245.39.251',
|
||||
'username': 'USERID',
|
||||
'password': 'PASSW0RD=21',
|
||||
'resource_uri': '/redfish/v1/testuri',
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
|
||||
mock_get_request.return_value = {'ret': False, 'msg': '404 error'}
|
||||
|
||||
|
@ -148,15 +146,14 @@ class TestXCCRedfishCommand(unittest.TestCase):
|
|||
module.main()
|
||||
|
||||
def test_module_command_GetResource_pass(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Raw',
|
||||
'command': 'GetResource',
|
||||
'baseuri': '10.245.39.251',
|
||||
'username': 'USERID',
|
||||
'password': 'PASSW0RD=21',
|
||||
'resource_uri': '/redfish/v1/testuri',
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
|
||||
mock_get_request.return_value = {'ret': True, 'data': {'teststr': 'xxxx'}}
|
||||
|
||||
|
@ -164,14 +161,13 @@ class TestXCCRedfishCommand(unittest.TestCase):
|
|||
module.main()
|
||||
|
||||
def test_module_command_GetCollectionResource_fail_when_required_args_missing(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Raw',
|
||||
'command': 'GetCollectionResource',
|
||||
'baseuri': '10.245.39.251',
|
||||
'username': 'USERID',
|
||||
'password': 'PASSW0RD=21',
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
|
||||
mock_get_request.return_value = {'ret': True, 'data': {'teststr': 'xxxx'}}
|
||||
|
||||
|
@ -179,15 +175,14 @@ class TestXCCRedfishCommand(unittest.TestCase):
|
|||
module.main()
|
||||
|
||||
def test_module_command_GetCollectionResource_fail_when_get_return_false(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Raw',
|
||||
'command': 'GetCollectionResource',
|
||||
'baseuri': '10.245.39.251',
|
||||
'username': 'USERID',
|
||||
'password': 'PASSW0RD=21',
|
||||
'resource_uri': '/redfish/v1/testuri',
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
|
||||
mock_get_request.return_value = {'ret': False, 'msg': '404 error'}
|
||||
|
||||
|
@ -195,15 +190,14 @@ class TestXCCRedfishCommand(unittest.TestCase):
|
|||
module.main()
|
||||
|
||||
def test_module_command_GetCollectionResource_fail_when_get_not_colection(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Raw',
|
||||
'command': 'GetCollectionResource',
|
||||
'baseuri': '10.245.39.251',
|
||||
'username': 'USERID',
|
||||
'password': 'PASSW0RD=21',
|
||||
'resource_uri': '/redfish/v1/testuri',
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
|
||||
mock_get_request.return_value = {'ret': True, 'data': {'teststr': 'xxxx'}}
|
||||
|
||||
|
@ -211,15 +205,14 @@ class TestXCCRedfishCommand(unittest.TestCase):
|
|||
module.main()
|
||||
|
||||
def test_module_command_GetCollectionResource_pass_when_get_empty_collection(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Raw',
|
||||
'command': 'GetCollectionResource',
|
||||
'baseuri': '10.245.39.251',
|
||||
'username': 'USERID',
|
||||
'password': 'PASSW0RD=21',
|
||||
'resource_uri': '/redfish/v1/testuri',
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
|
||||
mock_get_request.return_value = {'ret': True, 'data': {'Members': [], 'Members@odata.count': 0}}
|
||||
|
||||
|
@ -227,15 +220,14 @@ class TestXCCRedfishCommand(unittest.TestCase):
|
|||
module.main()
|
||||
|
||||
def test_module_command_GetCollectionResource_pass_when_get_collection(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Raw',
|
||||
'command': 'GetCollectionResource',
|
||||
'baseuri': '10.245.39.251',
|
||||
'username': 'USERID',
|
||||
'password': 'PASSW0RD=21',
|
||||
'resource_uri': '/redfish/v1/testuri',
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
|
||||
mock_get_request.return_value = {'ret': True, 'data': {'Members': [{'@odata.id': '/redfish/v1/testuri/1'}], 'Members@odata.count': 1}}
|
||||
|
||||
|
@ -243,14 +235,13 @@ class TestXCCRedfishCommand(unittest.TestCase):
|
|||
module.main()
|
||||
|
||||
def test_module_command_PatchResource_fail_when_required_args_missing(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Raw',
|
||||
'command': 'PatchResource',
|
||||
'baseuri': '10.245.39.251',
|
||||
'username': 'USERID',
|
||||
'password': 'PASSW0RD=21',
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
|
||||
mock_get_request.return_value = {'ret': True, 'data': {'teststr': 'xxxx', '@odata.etag': '27f6eb13fa1c28a2711'}}
|
||||
|
||||
|
@ -261,15 +252,14 @@ class TestXCCRedfishCommand(unittest.TestCase):
|
|||
module.main()
|
||||
|
||||
def test_module_command_PatchResource_fail_when_required_args_missing_no_requestbody(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Raw',
|
||||
'command': 'PatchResource',
|
||||
'baseuri': '10.245.39.251',
|
||||
'username': 'USERID',
|
||||
'password': 'PASSW0RD=21',
|
||||
'resource_uri': '/redfish/v1/testuri',
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
|
||||
mock_get_request.return_value = {'ret': True, 'data': {'teststr': 'xxxx', '@odata.etag': '27f6eb13fa1c28a2711'}}
|
||||
|
||||
|
@ -280,7 +270,7 @@ class TestXCCRedfishCommand(unittest.TestCase):
|
|||
module.main()
|
||||
|
||||
def test_module_command_PatchResource_fail_when_noexisting_property_in_requestbody(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Raw',
|
||||
'command': 'PatchResource',
|
||||
'baseuri': '10.245.39.251',
|
||||
|
@ -288,8 +278,7 @@ class TestXCCRedfishCommand(unittest.TestCase):
|
|||
'password': 'PASSW0RD=21',
|
||||
'resource_uri': '/redfish/v1/testuri',
|
||||
'request_body': {'teststr': 'yyyy', 'otherkey': 'unknownkey'}
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
|
||||
mock_get_request.return_value = {'ret': True, 'data': {'teststr': 'xxxx', '@odata.etag': '27f6eb13fa1c28a2711'}}
|
||||
|
||||
|
@ -300,7 +289,7 @@ class TestXCCRedfishCommand(unittest.TestCase):
|
|||
module.main()
|
||||
|
||||
def test_module_command_PatchResource_fail_when_get_return_false(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Raw',
|
||||
'command': 'PatchResource',
|
||||
'baseuri': '10.245.39.251',
|
||||
|
@ -308,8 +297,7 @@ class TestXCCRedfishCommand(unittest.TestCase):
|
|||
'password': 'PASSW0RD=21',
|
||||
'resource_uri': '/redfish/v1/testuri',
|
||||
'request_body': {'teststr': 'yyyy'}
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
|
||||
mock_get_request.return_value = {'ret': True, 'data': {'teststr': 'xxxx', '@odata.etag': '27f6eb13fa1c28a2711'}}
|
||||
|
||||
|
@ -320,7 +308,7 @@ class TestXCCRedfishCommand(unittest.TestCase):
|
|||
module.main()
|
||||
|
||||
def test_module_command_PatchResource_pass(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Raw',
|
||||
'command': 'PatchResource',
|
||||
'baseuri': '10.245.39.251',
|
||||
|
@ -328,8 +316,7 @@ class TestXCCRedfishCommand(unittest.TestCase):
|
|||
'password': 'PASSW0RD=21',
|
||||
'resource_uri': '/redfish/v1/testuri',
|
||||
'request_body': {'teststr': 'yyyy'}
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
|
||||
mock_get_request.return_value = {'ret': True, 'data': {'teststr': 'xxxx', '@odata.etag': '27f6eb13fa1c28a2711'}}
|
||||
|
||||
|
@ -340,14 +327,13 @@ class TestXCCRedfishCommand(unittest.TestCase):
|
|||
module.main()
|
||||
|
||||
def test_module_command_PostResource_fail_when_required_args_missing(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Raw',
|
||||
'command': 'PostResource',
|
||||
'baseuri': '10.245.39.251',
|
||||
'username': 'USERID',
|
||||
'password': 'PASSW0RD=21',
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
|
||||
mock_get_request.return_value = {
|
||||
'ret': True,
|
||||
|
@ -377,15 +363,14 @@ class TestXCCRedfishCommand(unittest.TestCase):
|
|||
module.main()
|
||||
|
||||
def test_module_command_PostResource_fail_when_invalid_resourceuri(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Raw',
|
||||
'command': 'PostResource',
|
||||
'baseuri': '10.245.39.251',
|
||||
'username': 'USERID',
|
||||
'password': 'PASSW0RD=21',
|
||||
'resource_uri': '/redfish/v1/testuri',
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
|
||||
mock_get_request.return_value = {
|
||||
'ret': True,
|
||||
|
@ -415,15 +400,14 @@ class TestXCCRedfishCommand(unittest.TestCase):
|
|||
module.main()
|
||||
|
||||
def test_module_command_PostResource_fail_when_no_requestbody(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Raw',
|
||||
'command': 'PostResource',
|
||||
'baseuri': '10.245.39.251',
|
||||
'username': 'USERID',
|
||||
'password': 'PASSW0RD=21',
|
||||
'resource_uri': '/redfish/v1/Systems/1/Bios/Actions/Bios.ChangePassword',
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
|
||||
mock_get_request.return_value = {
|
||||
'ret': True,
|
||||
|
@ -453,15 +437,14 @@ class TestXCCRedfishCommand(unittest.TestCase):
|
|||
module.main()
|
||||
|
||||
def test_module_command_PostResource_fail_when_no_requestbody(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Raw',
|
||||
'command': 'PostResource',
|
||||
'baseuri': '10.245.39.251',
|
||||
'username': 'USERID',
|
||||
'password': 'PASSW0RD=21',
|
||||
'resource_uri': '/redfish/v1/Systems/1/Bios/Actions/Bios.ChangePassword',
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
|
||||
mock_get_request.return_value = {
|
||||
'ret': True,
|
||||
|
@ -491,7 +474,7 @@ class TestXCCRedfishCommand(unittest.TestCase):
|
|||
module.main()
|
||||
|
||||
def test_module_command_PostResource_fail_when_requestbody_mismatch_with_data_from_actioninfo_uri(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Raw',
|
||||
'command': 'PostResource',
|
||||
'baseuri': '10.245.39.251',
|
||||
|
@ -499,8 +482,7 @@ class TestXCCRedfishCommand(unittest.TestCase):
|
|||
'password': 'PASSW0RD=21',
|
||||
'resource_uri': '/redfish/v1/Systems/1/Bios/Actions/Bios.ChangePassword',
|
||||
'request_body': {'PasswordName': 'UefiAdminPassword', 'NewPassword': 'PASSW0RD=='}
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
|
||||
mock_get_request.return_value = {
|
||||
'ret': True,
|
||||
|
@ -531,7 +513,7 @@ class TestXCCRedfishCommand(unittest.TestCase):
|
|||
module.main()
|
||||
|
||||
def test_module_command_PostResource_fail_when_get_return_false(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Raw',
|
||||
'command': 'PostResource',
|
||||
'baseuri': '10.245.39.251',
|
||||
|
@ -539,8 +521,7 @@ class TestXCCRedfishCommand(unittest.TestCase):
|
|||
'password': 'PASSW0RD=21',
|
||||
'resource_uri': '/redfish/v1/Systems/1/Bios/Actions/Bios.ChangePassword',
|
||||
'request_body': {'PasswordName': 'UefiAdminPassword', 'NewPassword': 'PASSW0RD=='}
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
|
||||
mock_get_request.return_value = {'ret': False, 'msg': '404 error'}
|
||||
|
||||
|
@ -551,7 +532,7 @@ class TestXCCRedfishCommand(unittest.TestCase):
|
|||
module.main()
|
||||
|
||||
def test_module_command_PostResource_fail_when_post_return_false(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Raw',
|
||||
'command': 'PostResource',
|
||||
'baseuri': '10.245.39.251',
|
||||
|
@ -559,8 +540,7 @@ class TestXCCRedfishCommand(unittest.TestCase):
|
|||
'password': 'PASSW0RD=21',
|
||||
'resource_uri': '/redfish/v1/Systems/1/Bios/Actions/Bios.ResetBios',
|
||||
'request_body': {}
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
|
||||
mock_get_request.return_value = {
|
||||
'ret': True,
|
||||
|
@ -590,7 +570,7 @@ class TestXCCRedfishCommand(unittest.TestCase):
|
|||
module.main()
|
||||
|
||||
def test_module_command_PostResource_pass(self):
|
||||
set_module_args({
|
||||
with set_module_args({
|
||||
'category': 'Raw',
|
||||
'command': 'PostResource',
|
||||
'baseuri': '10.245.39.251',
|
||||
|
@ -598,8 +578,7 @@ class TestXCCRedfishCommand(unittest.TestCase):
|
|||
'password': 'PASSW0RD=21',
|
||||
'resource_uri': '/redfish/v1/Systems/1/Bios/Actions/Bios.ResetBios',
|
||||
'request_body': {}
|
||||
})
|
||||
|
||||
}):
|
||||
with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
|
||||
mock_get_request.return_value = {
|
||||
'ret': True,
|
||||
|
|
|
@ -5,6 +5,7 @@
|
|||
from __future__ import (absolute_import, division, print_function)
|
||||
__metaclass__ = type
|
||||
|
||||
import contextlib as _contextlib
|
||||
import json
|
||||
|
||||
from ansible_collections.community.general.tests.unit.compat import unittest
|
||||
|
@ -13,14 +14,16 @@ from ansible.module_utils import basic
|
|||
from ansible.module_utils.common.text.converters import to_bytes
|
||||
|
||||
|
||||
@_contextlib.contextmanager
|
||||
def set_module_args(args):
|
||||
if '_ansible_remote_tmp' not in args:
|
||||
args['_ansible_remote_tmp'] = '/tmp'
|
||||
if '_ansible_keep_remote_files' not in args:
|
||||
args['_ansible_keep_remote_files'] = False
|
||||
|
||||
args = json.dumps({'ANSIBLE_MODULE_ARGS': args})
|
||||
basic._ANSIBLE_ARGS = to_bytes(args)
|
||||
serialized_args = to_bytes(json.dumps({'ANSIBLE_MODULE_ARGS': args}))
|
||||
with patch.object(basic, '_ANSIBLE_ARGS', serialized_args):
|
||||
yield
|
||||
|
||||
|
||||
class AnsibleExitJson(Exception):
|
||||
|
|
Loading…
Add table
Reference in a new issue