Split integration tests out from Makefile. (#17976)

This commit is contained in:
Matt Clay 2016-10-12 14:57:53 -07:00 committed by GitHub
commit 80a5c70ad7
169 changed files with 612 additions and 420 deletions

View file

@ -0,0 +1,10 @@
- assert:
that:
- 'secret_var == "secret"'
- copy: src=vault-secret.txt dest={{output_dir}}/secret.txt
- name: cleanup decrypted file
file: path={{ output_dir }}/secret.txt state=absent

View file

@ -0,0 +1,9 @@
$ANSIBLE_VAULT;1.1;AES256
31626536666232643662346539623662393436386162643439643434656231343435653936343235
6139346364396166336636383734333430373763336434310a303137623539653939336132626234
64613232396532313731313935333433353330666466646663303233323331636234326464643166
6538653264636166370a613161313064653566323037393962643032353230396536313865326362
34396262303130326632623162623230346238633932393938393766313036643835613936356233
33323730373331386337353339613165373064323134343930333031623036326164353534646631
31313963666234623731316238656233396638643331306231373539643039383434373035306233
30386230363730643561

View file

@ -0,0 +1,14 @@
---
- name: Assert that a embedded vault of a string with no newline works
assert:
that:
- '"{{ vault_encrypted_one_line_var }}" == "Setec Astronomy"'
- name: Assert that a multi line embedded vault works, including new line
assert:
that:
- vault_encrypted_var == "Setec Astronomy\n"
# TODO: add a expected fail here
# - debug: var=vault_encrypted_one_line_var_with_embedded_template

View file

@ -0,0 +1,17 @@
# If you use normal 'ansible-vault create' or edit, files always have at least one new line
# so c&p from a vault encrypted that wasn't specifically created sans new line ends up with one.
# (specifically created, as in 'echo -n "just one line" > my_secret.yml'
vault_encrypted_var: !vault-encrypted |
$ANSIBLE_VAULT;1.1;AES256
66386439653236336462626566653063336164663966303231363934653561363964363833313662
6431626536303530376336343832656537303632313433360a626438346336353331386135323734
62656361653630373231613662633962316233633936396165386439616533353965373339616234
3430613539666330390a313736323265656432366236633330313963326365653937323833366536
34623731376664623134383463316265643436343438623266623965636363326136
vault_encrypted_one_line_var: !vault-encrypted |
$ANSIBLE_VAULT;1.1;AES256
33363965326261303234626463623963633531343539616138316433353830356566396130353436
3562643163366231316662386565383735653432386435610a306664636137376132643732393835
63383038383730306639353234326630666539346233376330303938323639306661313032396437
6233623062366136310a633866373936313238333730653739323461656662303864663666653563
3138

View file

@ -0,0 +1,10 @@
#!/usr/bin/env bash
set -eux
ansible-playbook test_vault.yml -i ../../inventory -v "$@" --vault-password-file vault-password --list-tasks
ansible-playbook test_vault.yml -i ../../inventory -v "$@" --vault-password-file vault-password --list-hosts
ansible-playbook test_vault.yml -i ../../inventory -v "$@" --vault-password-file vault-password --syntax-check
ansible-playbook test_vault.yml -i ../../inventory -v "$@" --vault-password-file vault-password
ansible-playbook test_vault_embedded.yml -i ../../inventory -v "$@" --vault-password-file vault-password --syntax-check
ansible-playbook test_vault_embedded.yml -i ../../inventory -v "$@" --vault-password-file vault-password

View file

@ -0,0 +1,6 @@
- hosts: testhost
gather_facts: False
vars:
- output_dir: .
roles:
- { role: test_vault, tags: test_vault}

View file

@ -0,0 +1,4 @@
- hosts: testhost
gather_facts: False
roles:
- { role: test_vault_embedded, tags: test_vault_embedded}

View file

@ -0,0 +1 @@
test-vault-password

View file

@ -0,0 +1,6 @@
$ANSIBLE_VAULT;1.1;AES256
39303432393062643236616234306333383838333662386165616633303735336537613337396337
6662666233356462326631653161663663363166323338320a653131656636666339633863346530
32326238646631653133643936306666643065393038386234343736663239363665613963343661
3230353633643361650a363034323631613864326438396665343237383566336339323837326464
3930