diff --git a/tests/unit/plugins/modules/test_alerta_customer.py b/tests/unit/plugins/modules/test_alerta_customer.py
index ccd0ced50e..2bdf6c72b5 100644
--- a/tests/unit/plugins/modules/test_alerta_customer.py
+++ b/tests/unit/plugins/modules/test_alerta_customer.py
@@ -82,169 +82,160 @@ class TestAlertaCustomerModule(ModuleTestCase):
def test_without_parameters(self):
"""Failure if no parameters set"""
with self.assertRaises(AnsibleFailJson):
- set_module_args({})
- self.module.main()
+ with set_module_args({}):
+ self.module.main()
def test_without_content(self):
"""Failure if customer and match are missing"""
- set_module_args({
+ with set_module_args({
'alerta_url': "http://localhost:8080",
'api_username': "admin@example.com",
'api_password': "password"
- })
- with self.assertRaises(AnsibleFailJson):
- self.module.main()
+ }):
+ with self.assertRaises(AnsibleFailJson):
+ self.module.main()
def test_successful_existing_customer_creation(self):
"""Test the customer creation (already exists)."""
- set_module_args({
+ with set_module_args({
'alerta_url': "http://localhost:8080",
'api_username': "admin@example.com",
'api_password': "password",
'customer': 'Developer',
'match': 'dev@example.com'
- })
-
- with patch.object(alerta_customer, "fetch_url") as fetch_url_mock:
- fetch_url_mock.return_value = customer_response_page1()
- with self.assertRaises(AnsibleExitJson):
- self.module.main()
- self.assertTrue(fetch_url_mock.call_count, 1)
+ }):
+ with patch.object(alerta_customer, "fetch_url") as fetch_url_mock:
+ fetch_url_mock.return_value = customer_response_page1()
+ with self.assertRaises(AnsibleExitJson):
+ self.module.main()
+ self.assertTrue(fetch_url_mock.call_count, 1)
def test_successful_customer_creation(self):
"""Test the customer creation."""
- set_module_args({
+ with set_module_args({
'alerta_url': "http://localhost:8080",
'api_username': "admin@example.com",
'api_password': "password",
'customer': 'Developer',
'match': 'dev2@example.com'
- })
+ }):
+ with patch.object(alerta_customer, "fetch_url") as fetch_url_mock:
+ fetch_url_mock.return_value = customer_response_page1()
+ with self.assertRaises(AnsibleExitJson):
+ self.module.main()
- with patch.object(alerta_customer, "fetch_url") as fetch_url_mock:
- fetch_url_mock.return_value = customer_response_page1()
- with self.assertRaises(AnsibleExitJson):
- self.module.main()
-
- self.assertTrue(fetch_url_mock.call_count, 1)
- call_data = json.loads(fetch_url_mock.call_args[1]['data'])
- assert call_data['match'] == "dev2@example.com"
- assert call_data['customer'] == "Developer"
+ self.assertTrue(fetch_url_mock.call_count, 1)
+ call_data = json.loads(fetch_url_mock.call_args[1]['data'])
+ assert call_data['match'] == "dev2@example.com"
+ assert call_data['customer'] == "Developer"
def test_successful_customer_creation_key(self):
"""Test the customer creation using api_key."""
- set_module_args({
+ with set_module_args({
'alerta_url': "http://localhost:8080",
'api_key': "demo-key",
'customer': 'Developer',
'match': 'dev2@example.com'
- })
+ }):
+ with patch.object(alerta_customer, "fetch_url") as fetch_url_mock:
+ fetch_url_mock.return_value = customer_response_page1()
+ with self.assertRaises(AnsibleExitJson):
+ self.module.main()
- with patch.object(alerta_customer, "fetch_url") as fetch_url_mock:
- fetch_url_mock.return_value = customer_response_page1()
- with self.assertRaises(AnsibleExitJson):
- self.module.main()
-
- self.assertTrue(fetch_url_mock.call_count, 1)
- call_data = json.loads(fetch_url_mock.call_args[1]['data'])
- assert call_data['match'] == "dev2@example.com"
- assert call_data['customer'] == "Developer"
+ self.assertTrue(fetch_url_mock.call_count, 1)
+ call_data = json.loads(fetch_url_mock.call_args[1]['data'])
+ assert call_data['match'] == "dev2@example.com"
+ assert call_data['customer'] == "Developer"
def test_failed_not_found(self):
"""Test failure with wrong URL."""
- set_module_args({
+ with set_module_args({
'alerta_url': "http://localhost:8080/s",
'api_username': "admin@example.com",
'api_password': "password",
'customer': 'Developer',
'match': 'dev@example.com'
- })
-
- with patch.object(alerta_customer, "fetch_url") as fetch_url_mock:
- fetch_url_mock.return_value = (None, {"status": 404, 'msg': 'Not found for request GET on http://localhost:8080/a/api/customers'})
- with self.assertRaises(AnsibleFailJson):
- self.module.main()
+ }):
+ with patch.object(alerta_customer, "fetch_url") as fetch_url_mock:
+ fetch_url_mock.return_value = (None, {"status": 404, 'msg': 'Not found for request GET on http://localhost:8080/a/api/customers'})
+ with self.assertRaises(AnsibleFailJson):
+ self.module.main()
def test_failed_forbidden(self):
"""Test failure with wrong user."""
- set_module_args({
+ with set_module_args({
'alerta_url': "http://localhost:8080",
'api_username': "dev@example.com",
'api_password': "password",
'customer': 'Developer',
'match': 'dev@example.com'
- })
-
- with patch.object(alerta_customer, "fetch_url") as fetch_url_mock:
- fetch_url_mock.return_value = (None, {"status": 403, 'msg': 'Permission Denied for GET on http://localhost:8080/api/customers'})
- with self.assertRaises(AnsibleFailJson):
- self.module.main()
+ }):
+ with patch.object(alerta_customer, "fetch_url") as fetch_url_mock:
+ fetch_url_mock.return_value = (None, {"status": 403, 'msg': 'Permission Denied for GET on http://localhost:8080/api/customers'})
+ with self.assertRaises(AnsibleFailJson):
+ self.module.main()
def test_failed_unauthorized(self):
"""Test failure with wrong username or password."""
- set_module_args({
+ with set_module_args({
'alerta_url': "http://localhost:8080",
'api_username': "admin@example.com",
'api_password': "password_wrong",
'customer': 'Developer',
'match': 'dev@example.com'
- })
-
- with patch.object(alerta_customer, "fetch_url") as fetch_url_mock:
- fetch_url_mock.return_value = (None, {"status": 401, 'msg': 'Unauthorized to request GET on http://localhost:8080/api/customers'})
- with self.assertRaises(AnsibleFailJson):
- self.module.main()
+ }):
+ with patch.object(alerta_customer, "fetch_url") as fetch_url_mock:
+ fetch_url_mock.return_value = (None, {"status": 401, 'msg': 'Unauthorized to request GET on http://localhost:8080/api/customers'})
+ with self.assertRaises(AnsibleFailJson):
+ self.module.main()
def test_successful_customer_deletion(self):
"""Test the customer deletion."""
- set_module_args({
+ with set_module_args({
'alerta_url': "http://localhost:8080",
'api_username': "admin@example.com",
'api_password': "password",
'customer': 'Developer',
'match': 'dev@example.com',
'state': 'absent'
- })
-
- with patch.object(alerta_customer, "fetch_url") as fetch_url_mock:
- fetch_url_mock.return_value = customer_response_page1()
- with self.assertRaises(AnsibleExitJson):
- self.module.main()
+ }):
+ with patch.object(alerta_customer, "fetch_url") as fetch_url_mock:
+ fetch_url_mock.return_value = customer_response_page1()
+ with self.assertRaises(AnsibleExitJson):
+ self.module.main()
def test_successful_customer_deletion_page2(self):
"""Test the customer deletion on the second page."""
- set_module_args({
+ with set_module_args({
'alerta_url': "http://localhost:8080",
'api_username': "admin@example.com",
'api_password': "password",
'customer': 'Developer',
'match': 'dev@example.com',
'state': 'absent'
- })
-
- with patch.object(alerta_customer, "fetch_url") as fetch_url_mock:
- fetch_url_mock.return_value = customer_response_page2()
- with self.assertRaises(AnsibleExitJson):
- self.module.main()
+ }):
+ with patch.object(alerta_customer, "fetch_url") as fetch_url_mock:
+ fetch_url_mock.return_value = customer_response_page2()
+ with self.assertRaises(AnsibleExitJson):
+ self.module.main()
def test_successful_nonexisting_customer_deletion(self):
"""Test the customer deletion (non existing)."""
- set_module_args({
+ with set_module_args({
'alerta_url': "http://localhost:8080",
'api_username': "admin@example.com",
'api_password': "password",
'customer': 'Billing',
'match': 'dev@example.com',
'state': 'absent'
- })
-
- with patch.object(alerta_customer, "fetch_url") as fetch_url_mock:
- fetch_url_mock.return_value = customer_response_page1()
- with self.assertRaises(AnsibleExitJson):
- self.module.main()
+ }):
+ with patch.object(alerta_customer, "fetch_url") as fetch_url_mock:
+ fetch_url_mock.return_value = customer_response_page1()
+ with self.assertRaises(AnsibleExitJson):
+ self.module.main()
diff --git a/tests/unit/plugins/modules/test_archive.py b/tests/unit/plugins/modules/test_archive.py
index 84a1360f1b..becbc41f87 100644
--- a/tests/unit/plugins/modules/test_archive.py
+++ b/tests/unit/plugins/modules/test_archive.py
@@ -25,27 +25,26 @@ class TestArchive(ModuleTestCase):
self.os_path_isdir = self.mock_os_path_isdir.stop()
def test_archive_removal_safety(self):
- set_module_args(
+ with set_module_args(
dict(
path=['/foo', '/bar', '/baz'],
dest='/foo/destination.tgz',
remove=True
)
- )
-
- module = AnsibleModule(
- argument_spec=dict(
- path=dict(type='list', elements='path', required=True),
- format=dict(type='str', default='gz', choices=['bz2', 'gz', 'tar', 'xz', 'zip']),
- dest=dict(type='path'),
- exclude_path=dict(type='list', elements='path', default=[]),
- exclusion_patterns=dict(type='list', elements='path'),
- force_archive=dict(type='bool', default=False),
- remove=dict(type='bool', default=False),
- ),
- add_file_common_args=True,
- supports_check_mode=True,
- )
+ ):
+ module = AnsibleModule(
+ argument_spec=dict(
+ path=dict(type='list', elements='path', required=True),
+ format=dict(type='str', default='gz', choices=['bz2', 'gz', 'tar', 'xz', 'zip']),
+ dest=dict(type='path'),
+ exclude_path=dict(type='list', elements='path', default=[]),
+ exclusion_patterns=dict(type='list', elements='path'),
+ force_archive=dict(type='bool', default=False),
+ remove=dict(type='bool', default=False),
+ ),
+ add_file_common_args=True,
+ supports_check_mode=True,
+ )
self.os_path_isdir.side_effect = [True, False, False, True]
diff --git a/tests/unit/plugins/modules/test_bitbucket_access_key.py b/tests/unit/plugins/modules/test_bitbucket_access_key.py
index 71e28f653c..34b53ed776 100644
--- a/tests/unit/plugins/modules/test_bitbucket_access_key.py
+++ b/tests/unit/plugins/modules/test_bitbucket_access_key.py
@@ -19,15 +19,15 @@ class TestBucketAccessKeyModule(ModuleTestCase):
def test_missing_key_with_present_state(self):
with self.assertRaises(AnsibleFailJson) as exec_info:
- set_module_args({
+ with set_module_args({
'client_id': 'ABC',
'client_secret': 'XXX',
'workspace': 'name',
'repository': 'repo',
'label': 'key name',
'state': 'present',
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(exec_info.exception.args[0]['msg'], self.module.error_messages['required_key'])
@@ -35,7 +35,7 @@ class TestBucketAccessKeyModule(ModuleTestCase):
def test_create_deploy_key(self, *args):
with patch.object(self.module, 'create_deploy_key') as create_deploy_key_mock:
with self.assertRaises(AnsibleExitJson) as exec_info:
- set_module_args({
+ with set_module_args({
'user': 'ABC',
'password': 'XXX',
'workspace': 'name',
@@ -43,8 +43,8 @@ class TestBucketAccessKeyModule(ModuleTestCase):
'key': 'public_key',
'label': 'key name',
'state': 'present',
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(create_deploy_key_mock.call_count, 1)
self.assertEqual(exec_info.exception.args[0]['changed'], True)
@@ -54,7 +54,7 @@ class TestBucketAccessKeyModule(ModuleTestCase):
def test_create_deploy_key_check_mode(self, *args):
with patch.object(self.module, 'create_deploy_key') as create_deploy_key_mock:
with self.assertRaises(AnsibleExitJson) as exec_info:
- set_module_args({
+ with set_module_args({
'client_id': 'ABC',
'client_secret': 'XXX',
'workspace': 'name',
@@ -63,8 +63,8 @@ class TestBucketAccessKeyModule(ModuleTestCase):
'label': 'key name',
'state': 'present',
'_ansible_check_mode': True,
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(create_deploy_key_mock.call_count, 0)
self.assertEqual(exec_info.exception.args[0]['changed'], True)
@@ -105,7 +105,7 @@ class TestBucketAccessKeyModule(ModuleTestCase):
with patch.object(self.module, 'delete_deploy_key') as delete_deploy_key_mock:
with patch.object(self.module, 'create_deploy_key') as create_deploy_key_mock:
with self.assertRaises(AnsibleExitJson) as exec_info:
- set_module_args({
+ with set_module_args({
'client_id': 'ABC',
'client_secret': 'XXX',
'workspace': 'name',
@@ -113,8 +113,8 @@ class TestBucketAccessKeyModule(ModuleTestCase):
'key': 'new public key',
'label': 'mykey',
'state': 'present',
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(delete_deploy_key_mock.call_count, 1)
self.assertEqual(create_deploy_key_mock.call_count, 1)
@@ -156,7 +156,7 @@ class TestBucketAccessKeyModule(ModuleTestCase):
with patch.object(self.module, 'delete_deploy_key') as delete_deploy_key_mock:
with patch.object(self.module, 'create_deploy_key') as create_deploy_key_mock:
with self.assertRaises(AnsibleExitJson) as exec_info:
- set_module_args({
+ with set_module_args({
'client_id': 'ABC',
'client_secret': 'XXX',
'workspace': 'name',
@@ -164,8 +164,8 @@ class TestBucketAccessKeyModule(ModuleTestCase):
'key': 'new public key',
'label': 'mykey',
'state': 'present',
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(delete_deploy_key_mock.call_count, 0)
self.assertEqual(create_deploy_key_mock.call_count, 0)
@@ -207,7 +207,7 @@ class TestBucketAccessKeyModule(ModuleTestCase):
with patch.object(self.module, 'delete_deploy_key') as delete_deploy_key_mock:
with patch.object(self.module, 'create_deploy_key') as create_deploy_key_mock:
with self.assertRaises(AnsibleExitJson) as exec_info:
- set_module_args({
+ with set_module_args({
'client_id': 'ABC',
'client_secret': 'XXX',
'workspace': 'name',
@@ -216,8 +216,8 @@ class TestBucketAccessKeyModule(ModuleTestCase):
'label': 'mykey',
'state': 'present',
'_ansible_check_mode': True,
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(delete_deploy_key_mock.call_count, 0)
self.assertEqual(create_deploy_key_mock.call_count, 0)
@@ -258,15 +258,15 @@ class TestBucketAccessKeyModule(ModuleTestCase):
def test_delete_deploy_key(self, *args):
with patch.object(self.module, 'delete_deploy_key') as delete_deploy_key_mock:
with self.assertRaises(AnsibleExitJson) as exec_info:
- set_module_args({
+ with set_module_args({
'client_id': 'ABC',
'client_secret': 'XXX',
'workspace': 'name',
'repository': 'repo',
'label': 'mykey',
'state': 'absent',
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(delete_deploy_key_mock.call_count, 1)
self.assertEqual(exec_info.exception.args[0]['changed'], True)
@@ -276,15 +276,15 @@ class TestBucketAccessKeyModule(ModuleTestCase):
def test_delete_absent_deploy_key(self, *args):
with patch.object(self.module, 'delete_deploy_key') as delete_deploy_key_mock:
with self.assertRaises(AnsibleExitJson) as exec_info:
- set_module_args({
+ with set_module_args({
'client_id': 'ABC',
'client_secret': 'XXX',
'workspace': 'name',
'repository': 'repo',
'label': 'mykey',
'state': 'absent',
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(delete_deploy_key_mock.call_count, 0)
self.assertEqual(exec_info.exception.args[0]['changed'], False)
@@ -324,7 +324,7 @@ class TestBucketAccessKeyModule(ModuleTestCase):
def test_delete_deploy_key_check_mode(self, *args):
with patch.object(self.module, 'delete_deploy_key') as delete_deploy_key_mock:
with self.assertRaises(AnsibleExitJson) as exec_info:
- set_module_args({
+ with set_module_args({
'client_id': 'ABC',
'client_secret': 'XXX',
'workspace': 'name',
@@ -332,8 +332,8 @@ class TestBucketAccessKeyModule(ModuleTestCase):
'label': 'mykey',
'state': 'absent',
'_ansible_check_mode': True,
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(delete_deploy_key_mock.call_count, 0)
self.assertEqual(exec_info.exception.args[0]['changed'], True)
diff --git a/tests/unit/plugins/modules/test_bitbucket_pipeline_key_pair.py b/tests/unit/plugins/modules/test_bitbucket_pipeline_key_pair.py
index a1f5478c20..9cbb8b8b8f 100644
--- a/tests/unit/plugins/modules/test_bitbucket_pipeline_key_pair.py
+++ b/tests/unit/plugins/modules/test_bitbucket_pipeline_key_pair.py
@@ -19,14 +19,14 @@ class TestBucketPipelineKeyPairModule(ModuleTestCase):
def test_missing_keys_with_present_state(self):
with self.assertRaises(AnsibleFailJson) as exec_info:
- set_module_args({
+ with set_module_args({
'client_id': 'ABC',
'client_secret': 'XXX',
'workspace': 'name',
'repository': 'repo',
'state': 'present',
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(exec_info.exception.args[0]['msg'], self.module.error_messages['required_keys'])
@@ -34,7 +34,7 @@ class TestBucketPipelineKeyPairModule(ModuleTestCase):
def test_create_keys(self, *args):
with patch.object(self.module, 'update_ssh_key_pair') as update_ssh_key_pair_mock:
with self.assertRaises(AnsibleExitJson) as exec_info:
- set_module_args({
+ with set_module_args({
'user': 'ABC',
'password': 'XXX',
'workspace': 'name',
@@ -42,8 +42,8 @@ class TestBucketPipelineKeyPairModule(ModuleTestCase):
'public_key': 'public',
'private_key': 'PRIVATE',
'state': 'present',
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(update_ssh_key_pair_mock.call_count, 1)
self.assertEqual(exec_info.exception.args[0]['changed'], True)
@@ -53,7 +53,7 @@ class TestBucketPipelineKeyPairModule(ModuleTestCase):
def test_create_keys_check_mode(self, *args):
with patch.object(self.module, 'update_ssh_key_pair') as update_ssh_key_pair_mock:
with self.assertRaises(AnsibleExitJson) as exec_info:
- set_module_args({
+ with set_module_args({
'client_id': 'ABC',
'client_secret': 'XXX',
'workspace': 'name',
@@ -62,8 +62,8 @@ class TestBucketPipelineKeyPairModule(ModuleTestCase):
'private_key': 'PRIVATE',
'state': 'present',
'_ansible_check_mode': True,
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(update_ssh_key_pair_mock.call_count, 0)
self.assertEqual(exec_info.exception.args[0]['changed'], True)
@@ -76,7 +76,7 @@ class TestBucketPipelineKeyPairModule(ModuleTestCase):
def test_update_keys(self, *args):
with patch.object(self.module, 'update_ssh_key_pair') as update_ssh_key_pair_mock:
with self.assertRaises(AnsibleExitJson) as exec_info:
- set_module_args({
+ with set_module_args({
'client_id': 'ABC',
'client_secret': 'XXX',
'workspace': 'name',
@@ -84,8 +84,8 @@ class TestBucketPipelineKeyPairModule(ModuleTestCase):
'public_key': 'public',
'private_key': 'PRIVATE',
'state': 'present',
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(update_ssh_key_pair_mock.call_count, 1)
self.assertEqual(exec_info.exception.args[0]['changed'], True)
@@ -98,7 +98,7 @@ class TestBucketPipelineKeyPairModule(ModuleTestCase):
def test_dont_update_same_key(self, *args):
with patch.object(self.module, 'update_ssh_key_pair') as update_ssh_key_pair_mock:
with self.assertRaises(AnsibleExitJson) as exec_info:
- set_module_args({
+ with set_module_args({
'client_id': 'ABC',
'client_secret': 'XXX',
'workspace': 'name',
@@ -106,8 +106,8 @@ class TestBucketPipelineKeyPairModule(ModuleTestCase):
'public_key': 'public',
'private_key': 'PRIVATE',
'state': 'present',
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(update_ssh_key_pair_mock.call_count, 0)
self.assertEqual(exec_info.exception.args[0]['changed'], False)
@@ -120,7 +120,7 @@ class TestBucketPipelineKeyPairModule(ModuleTestCase):
def test_update_keys_check_mode(self, *args):
with patch.object(self.module, 'update_ssh_key_pair') as update_ssh_key_pair_mock:
with self.assertRaises(AnsibleExitJson) as exec_info:
- set_module_args({
+ with set_module_args({
'client_id': 'ABC',
'client_secret': 'XXX',
'workspace': 'name',
@@ -129,8 +129,8 @@ class TestBucketPipelineKeyPairModule(ModuleTestCase):
'private_key': 'PRIVATE',
'state': 'present',
'_ansible_check_mode': True,
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(update_ssh_key_pair_mock.call_count, 0)
self.assertEqual(exec_info.exception.args[0]['changed'], True)
@@ -143,14 +143,14 @@ class TestBucketPipelineKeyPairModule(ModuleTestCase):
def test_delete_keys(self, *args):
with patch.object(self.module, 'delete_ssh_key_pair') as delete_ssh_key_pair_mock:
with self.assertRaises(AnsibleExitJson) as exec_info:
- set_module_args({
+ with set_module_args({
'client_id': 'ABC',
'client_secret': 'XXX',
'workspace': 'name',
'repository': 'repo',
'state': 'absent',
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(delete_ssh_key_pair_mock.call_count, 1)
self.assertEqual(exec_info.exception.args[0]['changed'], True)
@@ -160,14 +160,14 @@ class TestBucketPipelineKeyPairModule(ModuleTestCase):
def test_delete_absent_keys(self, *args):
with patch.object(self.module, 'delete_ssh_key_pair') as delete_ssh_key_pair_mock:
with self.assertRaises(AnsibleExitJson) as exec_info:
- set_module_args({
+ with set_module_args({
'client_id': 'ABC',
'client_secret': 'XXX',
'workspace': 'name',
'repository': 'repo',
'state': 'absent',
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(delete_ssh_key_pair_mock.call_count, 0)
self.assertEqual(exec_info.exception.args[0]['changed'], False)
@@ -180,15 +180,15 @@ class TestBucketPipelineKeyPairModule(ModuleTestCase):
def test_delete_keys_check_mode(self, *args):
with patch.object(self.module, 'delete_ssh_key_pair') as delete_ssh_key_pair_mock:
with self.assertRaises(AnsibleExitJson) as exec_info:
- set_module_args({
+ with set_module_args({
'client_id': 'ABC',
'client_secret': 'XXX',
'workspace': 'name',
'repository': 'repo',
'state': 'absent',
'_ansible_check_mode': True,
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(delete_ssh_key_pair_mock.call_count, 0)
self.assertEqual(exec_info.exception.args[0]['changed'], True)
diff --git a/tests/unit/plugins/modules/test_bitbucket_pipeline_known_host.py b/tests/unit/plugins/modules/test_bitbucket_pipeline_known_host.py
index 07709f1a86..6b8536442e 100644
--- a/tests/unit/plugins/modules/test_bitbucket_pipeline_known_host.py
+++ b/tests/unit/plugins/modules/test_bitbucket_pipeline_known_host.py
@@ -26,15 +26,15 @@ class TestBucketPipelineKnownHostModule(ModuleTestCase):
def test_create_known_host(self, *args):
with patch.object(self.module, 'create_known_host') as create_known_host_mock:
with self.assertRaises(AnsibleExitJson) as exec_info:
- set_module_args({
+ with set_module_args({
'client_id': 'ABC',
'client_secret': 'XXX',
'workspace': 'name',
'repository': 'repo',
'name': 'bitbucket.org',
'state': 'present',
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(create_known_host_mock.call_count, 1)
self.assertEqual(exec_info.exception.args[0]['changed'], True)
@@ -44,7 +44,7 @@ class TestBucketPipelineKnownHostModule(ModuleTestCase):
def test_create_known_host_with_key(self, *args):
with patch.object(self.module, 'get_host_key') as get_host_key_mock:
with self.assertRaises(AnsibleExitJson) as exec_info:
- set_module_args({
+ with set_module_args({
'user': 'ABC',
'password': 'XXX',
'workspace': 'name',
@@ -52,8 +52,8 @@ class TestBucketPipelineKnownHostModule(ModuleTestCase):
'name': 'bitbucket.org',
'key': 'ssh-rsa public',
'state': 'present',
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(get_host_key_mock.call_count, 0)
self.assertEqual(exec_info.exception.args[0]['changed'], True)
@@ -75,15 +75,15 @@ class TestBucketPipelineKnownHostModule(ModuleTestCase):
def test_dont_create_same_value(self, *args):
with patch.object(self.module, 'create_known_host') as create_known_host_mock:
with self.assertRaises(AnsibleExitJson) as exec_info:
- set_module_args({
+ with set_module_args({
'client_id': 'ABC',
'client_secret': 'XXX',
'workspace': 'name',
'repository': 'repo',
'name': 'bitbucket.org',
'state': 'present',
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(create_known_host_mock.call_count, 0)
self.assertEqual(exec_info.exception.args[0]['changed'], False)
@@ -94,7 +94,7 @@ class TestBucketPipelineKnownHostModule(ModuleTestCase):
def test_create_known_host_check_mode(self, *args):
with patch.object(self.module, 'create_known_host') as create_known_host_mock:
with self.assertRaises(AnsibleExitJson) as exec_info:
- set_module_args({
+ with set_module_args({
'client_id': 'ABC',
'client_secret': 'XXX',
'workspace': 'name',
@@ -102,8 +102,8 @@ class TestBucketPipelineKnownHostModule(ModuleTestCase):
'name': 'bitbucket.org',
'state': 'present',
'_ansible_check_mode': True,
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(create_known_host_mock.call_count, 0)
self.assertEqual(exec_info.exception.args[0]['changed'], True)
@@ -125,15 +125,15 @@ class TestBucketPipelineKnownHostModule(ModuleTestCase):
def test_delete_known_host(self, *args):
with patch.object(self.module, 'delete_known_host') as delete_known_host_mock:
with self.assertRaises(AnsibleExitJson) as exec_info:
- set_module_args({
+ with set_module_args({
'client_id': 'ABC',
'client_secret': 'XXX',
'workspace': 'name',
'repository': 'repo',
'name': 'bitbucket.org',
'state': 'absent',
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(delete_known_host_mock.call_count, 1)
self.assertEqual(exec_info.exception.args[0]['changed'], True)
@@ -144,15 +144,15 @@ class TestBucketPipelineKnownHostModule(ModuleTestCase):
def test_delete_absent_known_host(self, *args):
with patch.object(self.module, 'delete_known_host') as delete_known_host_mock:
with self.assertRaises(AnsibleExitJson) as exec_info:
- set_module_args({
+ with set_module_args({
'client_id': 'ABC',
'client_secret': 'XXX',
'workspace': 'name',
'repository': 'repo',
'name': 'bitbucket.org',
'state': 'absent',
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(delete_known_host_mock.call_count, 0)
self.assertEqual(exec_info.exception.args[0]['changed'], False)
@@ -174,7 +174,7 @@ class TestBucketPipelineKnownHostModule(ModuleTestCase):
def test_delete_known_host_check_mode(self, *args):
with patch.object(self.module, 'delete_known_host') as delete_known_host_mock:
with self.assertRaises(AnsibleExitJson) as exec_info:
- set_module_args({
+ with set_module_args({
'client_id': 'ABC',
'client_secret': 'XXX',
'workspace': 'name',
@@ -182,8 +182,8 @@ class TestBucketPipelineKnownHostModule(ModuleTestCase):
'name': 'bitbucket.org',
'state': 'absent',
'_ansible_check_mode': True,
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(delete_known_host_mock.call_count, 0)
self.assertEqual(exec_info.exception.args[0]['changed'], True)
diff --git a/tests/unit/plugins/modules/test_bitbucket_pipeline_variable.py b/tests/unit/plugins/modules/test_bitbucket_pipeline_variable.py
index 6f710189c9..aebf3bb62a 100644
--- a/tests/unit/plugins/modules/test_bitbucket_pipeline_variable.py
+++ b/tests/unit/plugins/modules/test_bitbucket_pipeline_variable.py
@@ -19,27 +19,27 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
def test_without_required_parameters(self):
with self.assertRaises(AnsibleFailJson) as exec_info:
- set_module_args({
+ with set_module_args({
'workspace': 'name',
'repository': 'repo',
'name': 'PIPELINE_VAR_NAME',
'state': 'absent',
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(exec_info.exception.args[0]['failed'], True)
def test_missing_value_with_present_state(self):
with self.assertRaises(AnsibleFailJson) as exec_info:
- set_module_args({
+ with set_module_args({
'client_id': 'ABC',
'client_secret': 'XXX',
'workspace': 'name',
'repository': 'repo',
'name': 'PIPELINE_VAR_NAME',
'state': 'present',
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(exec_info.exception.args[0]['msg'], self.module.error_messages['required_value'])
@@ -51,13 +51,13 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
@patch.object(bitbucket_pipeline_variable, 'get_existing_pipeline_variable', return_value=None)
def test_oauth_env_vars_params(self, *args):
with self.assertRaises(AnsibleExitJson):
- set_module_args({
+ with set_module_args({
'workspace': 'name',
'repository': 'repo',
'name': 'PIPELINE_VAR_NAME',
'state': 'absent',
- })
- self.module.main()
+ }):
+ self.module.main()
@patch.dict('os.environ', {
'BITBUCKET_USERNAME': 'ABC',
@@ -66,19 +66,19 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
@patch.object(bitbucket_pipeline_variable, 'get_existing_pipeline_variable', return_value=None)
def test_basic_auth_env_vars_params(self, *args):
with self.assertRaises(AnsibleExitJson):
- set_module_args({
+ with set_module_args({
'workspace': 'name',
'repository': 'repo',
'name': 'PIPELINE_VAR_NAME',
'state': 'absent',
- })
- self.module.main()
+ }):
+ self.module.main()
@patch.object(bitbucket_pipeline_variable, 'get_existing_pipeline_variable', return_value=None)
def test_create_variable(self, *args):
with patch.object(self.module, 'create_pipeline_variable') as create_pipeline_variable_mock:
with self.assertRaises(AnsibleExitJson) as exec_info:
- set_module_args({
+ with set_module_args({
'user': 'ABC',
'password': 'XXX',
'workspace': 'name',
@@ -86,8 +86,8 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
'name': 'PIPELINE_VAR_NAME',
'value': '42',
'state': 'present',
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(create_pipeline_variable_mock.call_count, 1)
self.assertEqual(exec_info.exception.args[0]['changed'], True)
@@ -97,7 +97,7 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
def test_create_variable_check_mode(self, *args):
with patch.object(self.module, 'create_pipeline_variable') as create_pipeline_variable_mock:
with self.assertRaises(AnsibleExitJson) as exec_info:
- set_module_args({
+ with set_module_args({
'client_id': 'ABC',
'client_secret': 'XXX',
'workspace': 'name',
@@ -106,8 +106,8 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
'value': '42',
'state': 'present',
'_ansible_check_mode': True,
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(create_pipeline_variable_mock.call_count, 0)
self.assertEqual(exec_info.exception.args[0]['changed'], True)
@@ -123,7 +123,7 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
def test_update_variable(self, *args):
with patch.object(self.module, 'update_pipeline_variable') as update_pipeline_variable_mock:
with self.assertRaises(AnsibleExitJson) as exec_info:
- set_module_args({
+ with set_module_args({
'client_id': 'ABC',
'client_secret': 'XXX',
'workspace': 'name',
@@ -131,8 +131,8 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
'name': 'PIPELINE_VAR_NAME',
'value': '42',
'state': 'present',
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(update_pipeline_variable_mock.call_count, 1)
self.assertEqual(exec_info.exception.args[0]['changed'], True)
@@ -147,7 +147,7 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
def test_update_secured_variable(self, *args):
with patch.object(self.module, 'update_pipeline_variable') as update_pipeline_variable_mock:
with self.assertRaises(AnsibleExitJson) as exec_info:
- set_module_args({
+ with set_module_args({
'client_id': 'ABC',
'client_secret': 'XXX',
'workspace': 'name',
@@ -156,8 +156,8 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
'value': '42',
'secured': True,
'state': 'present',
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(update_pipeline_variable_mock.call_count, 1)
self.assertEqual(exec_info.exception.args[0]['changed'], True)
@@ -173,7 +173,7 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
def test_update_secured_state(self, *args):
with patch.object(self.module, 'update_pipeline_variable') as update_pipeline_variable_mock:
with self.assertRaises(AnsibleExitJson) as exec_info:
- set_module_args({
+ with set_module_args({
'client_id': 'ABC',
'client_secret': 'XXX',
'workspace': 'name',
@@ -182,8 +182,8 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
'value': '42',
'secured': True,
'state': 'present',
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(update_pipeline_variable_mock.call_count, 1)
self.assertEqual(exec_info.exception.args[0]['changed'], True)
@@ -199,7 +199,7 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
def test_dont_update_same_value(self, *args):
with patch.object(self.module, 'update_pipeline_variable') as update_pipeline_variable_mock:
with self.assertRaises(AnsibleExitJson) as exec_info:
- set_module_args({
+ with set_module_args({
'client_id': 'ABC',
'client_secret': 'XXX',
'workspace': 'name',
@@ -207,8 +207,8 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
'name': 'PIPELINE_VAR_NAME',
'value': '42',
'state': 'present',
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(update_pipeline_variable_mock.call_count, 0)
self.assertEqual(exec_info.exception.args[0]['changed'], False)
@@ -224,7 +224,7 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
def test_update_variable_check_mode(self, *args):
with patch.object(self.module, 'update_pipeline_variable') as update_pipeline_variable_mock:
with self.assertRaises(AnsibleExitJson) as exec_info:
- set_module_args({
+ with set_module_args({
'client_id': 'ABC',
'client_secret': 'XXX',
'workspace': 'name',
@@ -233,8 +233,8 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
'value': '42',
'state': 'present',
'_ansible_check_mode': True,
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(update_pipeline_variable_mock.call_count, 0)
self.assertEqual(exec_info.exception.args[0]['changed'], True)
@@ -250,15 +250,15 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
def test_delete_variable(self, *args):
with patch.object(self.module, 'delete_pipeline_variable') as delete_pipeline_variable_mock:
with self.assertRaises(AnsibleExitJson) as exec_info:
- set_module_args({
+ with set_module_args({
'client_id': 'ABC',
'client_secret': 'XXX',
'workspace': 'name',
'repository': 'repo',
'name': 'PIPELINE_VAR_NAME',
'state': 'absent',
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(delete_pipeline_variable_mock.call_count, 1)
self.assertEqual(exec_info.exception.args[0]['changed'], True)
@@ -268,15 +268,15 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
def test_delete_absent_variable(self, *args):
with patch.object(self.module, 'delete_pipeline_variable') as delete_pipeline_variable_mock:
with self.assertRaises(AnsibleExitJson) as exec_info:
- set_module_args({
+ with set_module_args({
'client_id': 'ABC',
'client_secret': 'XXX',
'workspace': 'name',
'repository': 'repo',
'name': 'PIPELINE_VAR_NAME',
'state': 'absent',
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(delete_pipeline_variable_mock.call_count, 0)
self.assertEqual(exec_info.exception.args[0]['changed'], False)
@@ -292,7 +292,7 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
def test_delete_variable_check_mode(self, *args):
with patch.object(self.module, 'delete_pipeline_variable') as delete_pipeline_variable_mock:
with self.assertRaises(AnsibleExitJson) as exec_info:
- set_module_args({
+ with set_module_args({
'client_id': 'ABC',
'client_secret': 'XXX',
'workspace': 'name',
@@ -300,8 +300,8 @@ class TestBucketPipelineVariableModule(ModuleTestCase):
'name': 'PIPELINE_VAR_NAME',
'state': 'absent',
'_ansible_check_mode': True,
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(delete_pipeline_variable_mock.call_count, 0)
self.assertEqual(exec_info.exception.args[0]['changed'], True)
diff --git a/tests/unit/plugins/modules/test_bootc_manage.py b/tests/unit/plugins/modules/test_bootc_manage.py
index 5393a57a07..3e5ab7bea2 100644
--- a/tests/unit/plugins/modules/test_bootc_manage.py
+++ b/tests/unit/plugins/modules/test_bootc_manage.py
@@ -21,52 +21,52 @@ class TestBootcManageModule(ModuleTestCase):
def test_switch_without_image(self):
"""Failure if state is 'switch' but no image provided"""
- set_module_args({'state': 'switch'})
- with self.assertRaises(AnsibleFailJson) as result:
- self.module.main()
+ with set_module_args({'state': 'switch'}):
+ with self.assertRaises(AnsibleFailJson) as result:
+ self.module.main()
self.assertEqual(result.exception.args[0]['msg'], "state is switch but all of the following are missing: image")
def test_switch_with_image(self):
"""Test successful switch with image provided"""
- set_module_args({'state': 'switch', 'image': 'example.com/image:latest'})
- with patch('ansible.module_utils.basic.AnsibleModule.run_command') as run_command_mock:
- run_command_mock.return_value = (0, 'Queued for next boot: ', '')
- with self.assertRaises(AnsibleExitJson) as result:
- self.module.main()
+ with set_module_args({'state': 'switch', 'image': 'example.com/image:latest'}):
+ with patch('ansible.module_utils.basic.AnsibleModule.run_command') as run_command_mock:
+ run_command_mock.return_value = (0, 'Queued for next boot: ', '')
+ with self.assertRaises(AnsibleExitJson) as result:
+ self.module.main()
self.assertTrue(result.exception.args[0]['changed'])
def test_latest_state(self):
"""Test successful upgrade to the latest state"""
- set_module_args({'state': 'latest'})
- with patch('ansible.module_utils.basic.AnsibleModule.run_command') as run_command_mock:
- run_command_mock.return_value = (0, 'Queued for next boot: ', '')
- with self.assertRaises(AnsibleExitJson) as result:
- self.module.main()
+ with set_module_args({'state': 'latest'}):
+ with patch('ansible.module_utils.basic.AnsibleModule.run_command') as run_command_mock:
+ run_command_mock.return_value = (0, 'Queued for next boot: ', '')
+ with self.assertRaises(AnsibleExitJson) as result:
+ self.module.main()
self.assertTrue(result.exception.args[0]['changed'])
def test_latest_state_no_change(self):
"""Test no change for latest state"""
- set_module_args({'state': 'latest'})
- with patch('ansible.module_utils.basic.AnsibleModule.run_command') as run_command_mock:
- run_command_mock.return_value = (0, 'No changes in ', '')
- with self.assertRaises(AnsibleExitJson) as result:
- self.module.main()
+ with set_module_args({'state': 'latest'}):
+ with patch('ansible.module_utils.basic.AnsibleModule.run_command') as run_command_mock:
+ run_command_mock.return_value = (0, 'No changes in ', '')
+ with self.assertRaises(AnsibleExitJson) as result:
+ self.module.main()
self.assertFalse(result.exception.args[0]['changed'])
def test_switch_image_failure(self):
"""Test failure during image switch"""
- set_module_args({'state': 'switch', 'image': 'example.com/image:latest'})
- with patch('ansible.module_utils.basic.AnsibleModule.run_command') as run_command_mock:
- run_command_mock.return_value = (1, '', 'ERROR')
- with self.assertRaises(AnsibleFailJson) as result:
- self.module.main()
+ with set_module_args({'state': 'switch', 'image': 'example.com/image:latest'}):
+ with patch('ansible.module_utils.basic.AnsibleModule.run_command') as run_command_mock:
+ run_command_mock.return_value = (1, '', 'ERROR')
+ with self.assertRaises(AnsibleFailJson) as result:
+ self.module.main()
self.assertEqual(result.exception.args[0]['msg'], 'ERROR: Command execution failed.')
def test_latest_state_failure(self):
"""Test failure during upgrade"""
- set_module_args({'state': 'latest'})
- with patch('ansible.module_utils.basic.AnsibleModule.run_command') as run_command_mock:
- run_command_mock.return_value = (1, '', 'ERROR')
- with self.assertRaises(AnsibleFailJson) as result:
- self.module.main()
+ with set_module_args({'state': 'latest'}):
+ with patch('ansible.module_utils.basic.AnsibleModule.run_command') as run_command_mock:
+ run_command_mock.return_value = (1, '', 'ERROR')
+ with self.assertRaises(AnsibleFailJson) as result:
+ self.module.main()
self.assertEqual(result.exception.args[0]['msg'], 'ERROR: Command execution failed.')
diff --git a/tests/unit/plugins/modules/test_campfire.py b/tests/unit/plugins/modules/test_campfire.py
index ef0dca5ed6..8eb30f920c 100644
--- a/tests/unit/plugins/modules/test_campfire.py
+++ b/tests/unit/plugins/modules/test_campfire.py
@@ -27,70 +27,67 @@ class TestCampfireModule(ModuleTestCase):
def test_without_required_parameters(self):
"""Failure must occurs when all parameters are missing"""
with self.assertRaises(AnsibleFailJson):
- set_module_args({})
- self.module.main()
+ with set_module_args({}):
+ self.module.main()
def test_successful_message(self):
"""Test failure message"""
- set_module_args({
+ with set_module_args({
'subscription': 'test',
'token': 'abc',
'room': 'test',
'msg': 'test'
- })
+ }):
+ with patch.object(campfire, "fetch_url") as fetch_url_mock:
+ fetch_url_mock.return_value = (None, {"status": 200})
+ with self.assertRaises(AnsibleExitJson):
+ self.module.main()
- with patch.object(campfire, "fetch_url") as fetch_url_mock:
- fetch_url_mock.return_value = (None, {"status": 200})
- with self.assertRaises(AnsibleExitJson):
- self.module.main()
+ assert fetch_url_mock.call_count == 1
+ url = fetch_url_mock.call_args[0][1]
+ data = fetch_url_mock.call_args[1]['data']
- assert fetch_url_mock.call_count == 1
- url = fetch_url_mock.call_args[0][1]
- data = fetch_url_mock.call_args[1]['data']
-
- assert url == 'https://test.campfirenow.com/room/test/speak.xml'
- assert data == 'test'
+ assert url == 'https://test.campfirenow.com/room/test/speak.xml'
+ assert data == 'test'
def test_successful_message_with_notify(self):
"""Test failure message"""
- set_module_args({
+ with set_module_args({
'subscription': 'test',
'token': 'abc',
'room': 'test',
'msg': 'test',
'notify': 'bell'
- })
+ }):
+ with patch.object(campfire, "fetch_url") as fetch_url_mock:
+ fetch_url_mock.return_value = (None, {"status": 200})
+ with self.assertRaises(AnsibleExitJson):
+ self.module.main()
- with patch.object(campfire, "fetch_url") as fetch_url_mock:
- fetch_url_mock.return_value = (None, {"status": 200})
- with self.assertRaises(AnsibleExitJson):
- self.module.main()
+ assert fetch_url_mock.call_count == 2
+ notify_call = fetch_url_mock.mock_calls[0]
+ url = notify_call[1][1]
+ data = notify_call[2]['data']
- assert fetch_url_mock.call_count == 2
- notify_call = fetch_url_mock.mock_calls[0]
- url = notify_call[1][1]
- data = notify_call[2]['data']
+ assert url == 'https://test.campfirenow.com/room/test/speak.xml'
+ assert data == 'SoundMessagebell'
- assert url == 'https://test.campfirenow.com/room/test/speak.xml'
- assert data == 'SoundMessagebell'
+ message_call = fetch_url_mock.mock_calls[1]
+ url = message_call[1][1]
+ data = message_call[2]['data']
- message_call = fetch_url_mock.mock_calls[1]
- url = message_call[1][1]
- data = message_call[2]['data']
-
- assert url == 'https://test.campfirenow.com/room/test/speak.xml'
- assert data == 'test'
+ assert url == 'https://test.campfirenow.com/room/test/speak.xml'
+ assert data == 'test'
def test_failure_message(self):
"""Test failure message"""
- set_module_args({
+ with set_module_args({
'subscription': 'test',
'token': 'abc',
'room': 'test',
'msg': 'test'
- })
-
- with patch.object(campfire, "fetch_url") as fetch_url_mock:
- fetch_url_mock.return_value = (None, {"status": 403})
- with self.assertRaises(AnsibleFailJson):
- self.module.main()
+ }):
+ with patch.object(campfire, "fetch_url") as fetch_url_mock:
+ fetch_url_mock.return_value = (None, {"status": 403})
+ with self.assertRaises(AnsibleFailJson):
+ self.module.main()
diff --git a/tests/unit/plugins/modules/test_circonus_annotation.py b/tests/unit/plugins/modules/test_circonus_annotation.py
index 7378e62a27..8efcb76ff4 100644
--- a/tests/unit/plugins/modules/test_circonus_annotation.py
+++ b/tests/unit/plugins/modules/test_circonus_annotation.py
@@ -30,45 +30,46 @@ class TestCirconusAnnotation(ModuleTestCase):
def test_without_required_parameters(self):
"""Failure must occurs when all parameters are missing"""
with self.assertRaises(AnsibleFailJson):
- set_module_args({})
- self.module.main()
+ with set_module_args({}):
+ self.module.main()
def test_add_annotation(self):
"""Check that result is changed"""
- set_module_args({
+ with set_module_args({
'category': 'test category',
'description': 'test description',
'title': 'test title',
'api_key': str(uuid.uuid4()),
- })
+ }):
- cid = '/annotation/100000'
+ cid = '/annotation/100000'
- def send(self, request, stream=False, timeout=None, verify=True, cert=None, proxies=None):
- data = {
- '_cid': cid,
- '_created': 1502146995,
- '_last_modified': 1502146995,
- '_last_modified_by': '/user/1000',
- 'category': 'test category',
- 'description': 'test description',
- 'rel_metrics': [],
- 'start': 1502145480,
- 'stop': None,
- 'title': 'test title',
- }
- raw = to_bytes(json.dumps(data))
- resp = HTTPResponse(body=io.BytesIO(raw), preload_content=False)
- resp.status = 200
- resp.reason = 'OK'
- resp.headers = {'X-Circonus-API-Version': '2.00'}
- return self.build_response(request, resp)
+ def send(self, request, stream=False, timeout=None, verify=True, cert=None, proxies=None):
+ data = {
+ '_cid': cid,
+ '_created': 1502146995,
+ '_last_modified': 1502146995,
+ '_last_modified_by': '/user/1000',
+ 'category': 'test category',
+ 'description': 'test description',
+ 'rel_metrics': [],
+ 'start': 1502145480,
+ 'stop': None,
+ 'title': 'test title',
+ }
+ raw = to_bytes(json.dumps(data))
+ resp = HTTPResponse(body=io.BytesIO(raw), preload_content=False)
+ resp.status = 200
+ resp.reason = 'OK'
+ resp.headers = {'X-Circonus-API-Version': '2.00'}
+ return self.build_response(request, resp)
- with patch('requests.adapters.HTTPAdapter.send', autospec=True, side_effect=send) as send:
- with self.assertRaises(AnsibleExitJson) as result:
- self.module.main()
- self.assertTrue(result.exception.args[0]['changed'])
- self.assertEqual(result.exception.args[0]['annotation']['_cid'], cid)
+ with patch('requests.adapters.HTTPAdapter.send', autospec=True, side_effect=send) as send:
+ with self.assertRaises(AnsibleExitJson) as result:
+ self.module.main()
+
+ self.assertTrue(result.exception.args[0]['changed'])
+ self.assertEqual(result.exception.args[0]['annotation']['_cid'], cid)
self.assertEqual(send.call_count, 1)
def test_add_annotation_unicode(self):
@@ -76,78 +77,80 @@ class TestCirconusAnnotation(ModuleTestCase):
Note: it seems there is a bug which prevent to create an annotation
with a non-ASCII category if this category already exists, in such
case an Internal Server Error (500) occurs."""
- set_module_args({
+ with set_module_args({
'category': 'new catégorÿ',
'description': 'test description',
'title': 'test title',
'api_key': str(uuid.uuid4()),
- })
+ }):
- cid = '/annotation/100000'
+ cid = '/annotation/100000'
- def send(self, request, stream=False, timeout=None, verify=True, cert=None, proxies=None):
- data = {
- '_cid': '/annotation/100000',
- '_created': 1502236928,
- '_last_modified': 1502236928,
- '_last_modified_by': '/user/1000',
- # use res['annotation']['category'].encode('latin1').decode('utf8')
- 'category': u'new cat\xc3\xa9gor\xc3\xbf',
- 'description': 'test description',
- 'rel_metrics': [],
- 'start': 1502236927,
- 'stop': 1502236927,
- 'title': 'test title',
- }
+ def send(self, request, stream=False, timeout=None, verify=True, cert=None, proxies=None):
+ data = {
+ '_cid': '/annotation/100000',
+ '_created': 1502236928,
+ '_last_modified': 1502236928,
+ '_last_modified_by': '/user/1000',
+ # use res['annotation']['category'].encode('latin1').decode('utf8')
+ 'category': u'new cat\xc3\xa9gor\xc3\xbf',
+ 'description': 'test description',
+ 'rel_metrics': [],
+ 'start': 1502236927,
+ 'stop': 1502236927,
+ 'title': 'test title',
+ }
- raw = to_bytes(json.dumps(data), encoding='latin1')
- resp = HTTPResponse(body=io.BytesIO(raw), preload_content=False)
- resp.status = 200
- resp.reason = 'OK'
- resp.headers = {'X-Circonus-API-Version': '2.00'}
- return self.build_response(request, resp)
+ raw = to_bytes(json.dumps(data), encoding='latin1')
+ resp = HTTPResponse(body=io.BytesIO(raw), preload_content=False)
+ resp.status = 200
+ resp.reason = 'OK'
+ resp.headers = {'X-Circonus-API-Version': '2.00'}
+ return self.build_response(request, resp)
- with patch('requests.adapters.HTTPAdapter.send', autospec=True, side_effect=send) as send:
- with self.assertRaises(AnsibleExitJson) as result:
- self.module.main()
- self.assertTrue(result.exception.args[0]['changed'])
- self.assertEqual(result.exception.args[0]['annotation']['_cid'], cid)
+ with patch('requests.adapters.HTTPAdapter.send', autospec=True, side_effect=send) as send:
+ with self.assertRaises(AnsibleExitJson) as result:
+ self.module.main()
+
+ self.assertTrue(result.exception.args[0]['changed'])
+ self.assertEqual(result.exception.args[0]['annotation']['_cid'], cid)
self.assertEqual(send.call_count, 1)
def test_auth_failure(self):
"""Check that an error is raised when authentication failed"""
- set_module_args({
+ with set_module_args({
'category': 'test category',
'description': 'test description',
'title': 'test title',
'api_key': str(uuid.uuid4()),
- })
+ }):
- cid = '/annotation/100000'
+ cid = '/annotation/100000'
- def send(self, request, stream=False, timeout=None, verify=True, cert=None, proxies=None):
- data = {
- '_cid': cid,
- '_created': 1502146995,
- '_last_modified': 1502146995,
- '_last_modified_by': '/user/1000',
- 'category': 'test category',
- 'description': 'test description',
- 'rel_metrics': [],
- 'start': 1502145480,
- 'stop': None,
- 'title': 'test title',
- }
- raw = to_bytes(json.dumps(data))
- resp = HTTPResponse(body=io.BytesIO(raw), preload_content=False)
- resp.status = 403
- resp.reason = 'Forbidden'
- resp.headers = {'X-Circonus-API-Version': '2.00'}
- return self.build_response(request, resp)
+ def send(self, request, stream=False, timeout=None, verify=True, cert=None, proxies=None):
+ data = {
+ '_cid': cid,
+ '_created': 1502146995,
+ '_last_modified': 1502146995,
+ '_last_modified_by': '/user/1000',
+ 'category': 'test category',
+ 'description': 'test description',
+ 'rel_metrics': [],
+ 'start': 1502145480,
+ 'stop': None,
+ 'title': 'test title',
+ }
+ raw = to_bytes(json.dumps(data))
+ resp = HTTPResponse(body=io.BytesIO(raw), preload_content=False)
+ resp.status = 403
+ resp.reason = 'Forbidden'
+ resp.headers = {'X-Circonus-API-Version': '2.00'}
+ return self.build_response(request, resp)
- with patch('requests.adapters.HTTPAdapter.send', autospec=True, side_effect=send) as send:
- with self.assertRaises(AnsibleFailJson) as result:
- self.module.main()
- self.assertTrue(result.exception.args[0]['failed'])
- self.assertTrue(re.match(r'\b403\b', result.exception.args[0]['reason']))
+ with patch('requests.adapters.HTTPAdapter.send', autospec=True, side_effect=send) as send:
+ with self.assertRaises(AnsibleFailJson) as result:
+ self.module.main()
+
+ self.assertTrue(result.exception.args[0]['failed'])
+ self.assertTrue(re.match(r'\b403\b', result.exception.args[0]['reason']))
self.assertEqual(send.call_count, 1)
diff --git a/tests/unit/plugins/modules/test_datadog_downtime.py b/tests/unit/plugins/modules/test_datadog_downtime.py
index e1ecbfa66f..1a09563196 100644
--- a/tests/unit/plugins/modules/test_datadog_downtime.py
+++ b/tests/unit/plugins/modules/test_datadog_downtime.py
@@ -33,12 +33,12 @@ class TestDatadogDowntime(ModuleTestCase):
def test_without_required_parameters(self):
"""Failure must occurs when all parameters are missing"""
with self.assertRaises(AnsibleFailJson):
- set_module_args({})
- self.module.main()
+ with set_module_args({}):
+ self.module.main()
@patch("ansible_collections.community.general.plugins.modules.datadog_downtime.DowntimesApi")
def test_create_downtime_when_no_id(self, downtimes_api_mock):
- set_module_args({
+ with set_module_args({
"monitor_tags": ["foo:bar"],
"scope": ["*"],
"monitor_id": 12345,
@@ -49,32 +49,32 @@ class TestDatadogDowntime(ModuleTestCase):
"rrule": "rrule",
"api_key": "an_api_key",
"app_key": "an_app_key",
- })
+ }):
+ downtime = Downtime()
+ downtime.monitor_tags = ["foo:bar"]
+ downtime.scope = ["*"]
+ downtime.monitor_id = 12345
+ downtime.message = "Message"
+ downtime.start = 1111
+ downtime.end = 2222
+ downtime.timezone = "UTC"
+ downtime.recurrence = DowntimeRecurrence(
+ rrule="rrule",
+ type="rrule"
+ )
- downtime = Downtime()
- downtime.monitor_tags = ["foo:bar"]
- downtime.scope = ["*"]
- downtime.monitor_id = 12345
- downtime.message = "Message"
- downtime.start = 1111
- downtime.end = 2222
- downtime.timezone = "UTC"
- downtime.recurrence = DowntimeRecurrence(
- rrule="rrule",
- type="rrule"
- )
+ create_downtime_mock = MagicMock(return_value=self.__downtime_with_id(12345))
+ downtimes_api_mock.return_value = MagicMock(create_downtime=create_downtime_mock)
+ with self.assertRaises(AnsibleExitJson) as result:
+ self.module.main()
- create_downtime_mock = MagicMock(return_value=self.__downtime_with_id(12345))
- downtimes_api_mock.return_value = MagicMock(create_downtime=create_downtime_mock)
- with self.assertRaises(AnsibleExitJson) as result:
- self.module.main()
self.assertTrue(result.exception.args[0]['changed'])
self.assertEqual(result.exception.args[0]['downtime']['id'], 12345)
create_downtime_mock.assert_called_once_with(downtime)
@patch("ansible_collections.community.general.plugins.modules.datadog_downtime.DowntimesApi")
def test_create_downtime_when_id_and_disabled(self, downtimes_api_mock):
- set_module_args({
+ with set_module_args({
"id": 1212,
"monitor_tags": ["foo:bar"],
"scope": ["*"],
@@ -86,32 +86,32 @@ class TestDatadogDowntime(ModuleTestCase):
"rrule": "rrule",
"api_key": "an_api_key",
"app_key": "an_app_key",
- })
+ }):
+ downtime = Downtime()
+ downtime.monitor_tags = ["foo:bar"]
+ downtime.scope = ["*"]
+ downtime.monitor_id = 12345
+ downtime.message = "Message"
+ downtime.start = 1111
+ downtime.end = 2222
+ downtime.timezone = "UTC"
+ downtime.recurrence = DowntimeRecurrence(
+ rrule="rrule",
+ type="rrule"
+ )
- downtime = Downtime()
- downtime.monitor_tags = ["foo:bar"]
- downtime.scope = ["*"]
- downtime.monitor_id = 12345
- downtime.message = "Message"
- downtime.start = 1111
- downtime.end = 2222
- downtime.timezone = "UTC"
- downtime.recurrence = DowntimeRecurrence(
- rrule="rrule",
- type="rrule"
- )
+ disabled_downtime = Downtime()
+ disabled_downtime.disabled = True
+ disabled_downtime.id = 1212
- disabled_downtime = Downtime()
- disabled_downtime.disabled = True
- disabled_downtime.id = 1212
+ create_downtime_mock = MagicMock(return_value=self.__downtime_with_id(12345))
+ get_downtime_mock = MagicMock(return_value=disabled_downtime)
+ downtimes_api_mock.return_value = MagicMock(
+ create_downtime=create_downtime_mock, get_downtime=get_downtime_mock
+ )
+ with self.assertRaises(AnsibleExitJson) as result:
+ self.module.main()
- create_downtime_mock = MagicMock(return_value=self.__downtime_with_id(12345))
- get_downtime_mock = MagicMock(return_value=disabled_downtime)
- downtimes_api_mock.return_value = MagicMock(
- create_downtime=create_downtime_mock, get_downtime=get_downtime_mock
- )
- with self.assertRaises(AnsibleExitJson) as result:
- self.module.main()
self.assertTrue(result.exception.args[0]['changed'])
self.assertEqual(result.exception.args[0]['downtime']['id'], 12345)
create_downtime_mock.assert_called_once_with(downtime)
@@ -119,7 +119,7 @@ class TestDatadogDowntime(ModuleTestCase):
@patch("ansible_collections.community.general.plugins.modules.datadog_downtime.DowntimesApi")
def test_update_downtime_when_not_disabled(self, downtimes_api_mock):
- set_module_args({
+ with set_module_args({
"id": 1212,
"monitor_tags": ["foo:bar"],
"scope": ["*"],
@@ -131,32 +131,32 @@ class TestDatadogDowntime(ModuleTestCase):
"rrule": "rrule",
"api_key": "an_api_key",
"app_key": "an_app_key",
- })
+ }):
+ downtime = Downtime()
+ downtime.monitor_tags = ["foo:bar"]
+ downtime.scope = ["*"]
+ downtime.monitor_id = 12345
+ downtime.message = "Message"
+ downtime.start = 1111
+ downtime.end = 2222
+ downtime.timezone = "UTC"
+ downtime.recurrence = DowntimeRecurrence(
+ rrule="rrule",
+ type="rrule"
+ )
- downtime = Downtime()
- downtime.monitor_tags = ["foo:bar"]
- downtime.scope = ["*"]
- downtime.monitor_id = 12345
- downtime.message = "Message"
- downtime.start = 1111
- downtime.end = 2222
- downtime.timezone = "UTC"
- downtime.recurrence = DowntimeRecurrence(
- rrule="rrule",
- type="rrule"
- )
+ enabled_downtime = Downtime()
+ enabled_downtime.disabled = False
+ enabled_downtime.id = 1212
- enabled_downtime = Downtime()
- enabled_downtime.disabled = False
- enabled_downtime.id = 1212
+ update_downtime_mock = MagicMock(return_value=self.__downtime_with_id(1212))
+ get_downtime_mock = MagicMock(return_value=enabled_downtime)
+ downtimes_api_mock.return_value = MagicMock(
+ update_downtime=update_downtime_mock, get_downtime=get_downtime_mock
+ )
+ with self.assertRaises(AnsibleExitJson) as result:
+ self.module.main()
- update_downtime_mock = MagicMock(return_value=self.__downtime_with_id(1212))
- get_downtime_mock = MagicMock(return_value=enabled_downtime)
- downtimes_api_mock.return_value = MagicMock(
- update_downtime=update_downtime_mock, get_downtime=get_downtime_mock
- )
- with self.assertRaises(AnsibleExitJson) as result:
- self.module.main()
self.assertTrue(result.exception.args[0]['changed'])
self.assertEqual(result.exception.args[0]['downtime']['id'], 1212)
update_downtime_mock.assert_called_once_with(1212, downtime)
@@ -164,7 +164,7 @@ class TestDatadogDowntime(ModuleTestCase):
@patch("ansible_collections.community.general.plugins.modules.datadog_downtime.DowntimesApi")
def test_update_downtime_no_change(self, downtimes_api_mock):
- set_module_args({
+ with set_module_args({
"id": 1212,
"monitor_tags": ["foo:bar"],
"scope": ["*"],
@@ -176,42 +176,42 @@ class TestDatadogDowntime(ModuleTestCase):
"rrule": "rrule",
"api_key": "an_api_key",
"app_key": "an_app_key",
- })
+ }):
+ downtime = Downtime()
+ downtime.monitor_tags = ["foo:bar"]
+ downtime.scope = ["*"]
+ downtime.monitor_id = 12345
+ downtime.message = "Message"
+ downtime.start = 1111
+ downtime.end = 2222
+ downtime.timezone = "UTC"
+ downtime.recurrence = DowntimeRecurrence(
+ rrule="rrule",
+ type="rrule"
+ )
- downtime = Downtime()
- downtime.monitor_tags = ["foo:bar"]
- downtime.scope = ["*"]
- downtime.monitor_id = 12345
- downtime.message = "Message"
- downtime.start = 1111
- downtime.end = 2222
- downtime.timezone = "UTC"
- downtime.recurrence = DowntimeRecurrence(
- rrule="rrule",
- type="rrule"
- )
+ downtime_get = Downtime()
+ downtime_get.id = 1212
+ downtime_get.disabled = False
+ downtime_get.monitor_tags = ["foo:bar"]
+ downtime_get.scope = ["*"]
+ downtime_get.monitor_id = 12345
+ downtime_get.message = "Message"
+ downtime_get.start = 1111
+ downtime_get.end = 2222
+ downtime_get.timezone = "UTC"
+ downtime_get.recurrence = DowntimeRecurrence(
+ rrule="rrule"
+ )
- downtime_get = Downtime()
- downtime_get.id = 1212
- downtime_get.disabled = False
- downtime_get.monitor_tags = ["foo:bar"]
- downtime_get.scope = ["*"]
- downtime_get.monitor_id = 12345
- downtime_get.message = "Message"
- downtime_get.start = 1111
- downtime_get.end = 2222
- downtime_get.timezone = "UTC"
- downtime_get.recurrence = DowntimeRecurrence(
- rrule="rrule"
- )
+ update_downtime_mock = MagicMock(return_value=downtime_get)
+ get_downtime_mock = MagicMock(return_value=downtime_get)
+ downtimes_api_mock.return_value = MagicMock(
+ update_downtime=update_downtime_mock, get_downtime=get_downtime_mock
+ )
+ with self.assertRaises(AnsibleExitJson) as result:
+ self.module.main()
- update_downtime_mock = MagicMock(return_value=downtime_get)
- get_downtime_mock = MagicMock(return_value=downtime_get)
- downtimes_api_mock.return_value = MagicMock(
- update_downtime=update_downtime_mock, get_downtime=get_downtime_mock
- )
- with self.assertRaises(AnsibleExitJson) as result:
- self.module.main()
self.assertFalse(result.exception.args[0]['changed'])
self.assertEqual(result.exception.args[0]['downtime']['id'], 1212)
update_downtime_mock.assert_called_once_with(1212, downtime)
@@ -219,20 +219,20 @@ class TestDatadogDowntime(ModuleTestCase):
@patch("ansible_collections.community.general.plugins.modules.datadog_downtime.DowntimesApi")
def test_delete_downtime(self, downtimes_api_mock):
- set_module_args({
+ with set_module_args({
"id": 1212,
"state": "absent",
"api_key": "an_api_key",
"app_key": "an_app_key",
- })
+ }):
+ cancel_downtime_mock = MagicMock()
+ downtimes_api_mock.return_value = MagicMock(
+ get_downtime=self.__downtime_with_id,
+ cancel_downtime=cancel_downtime_mock
+ )
+ with self.assertRaises(AnsibleExitJson) as result:
+ self.module.main()
- cancel_downtime_mock = MagicMock()
- downtimes_api_mock.return_value = MagicMock(
- get_downtime=self.__downtime_with_id,
- cancel_downtime=cancel_downtime_mock
- )
- with self.assertRaises(AnsibleExitJson) as result:
- self.module.main()
self.assertTrue(result.exception.args[0]['changed'])
cancel_downtime_mock.assert_called_once_with(1212)
diff --git a/tests/unit/plugins/modules/test_discord.py b/tests/unit/plugins/modules/test_discord.py
index 83069d279d..3d4763857d 100644
--- a/tests/unit/plugins/modules/test_discord.py
+++ b/tests/unit/plugins/modules/test_discord.py
@@ -28,30 +28,30 @@ class TestDiscordModule(ModuleTestCase):
def test_without_parameters(self):
"""Failure if no parameters set"""
with self.assertRaises(AnsibleFailJson):
- set_module_args({})
- self.module.main()
+ with set_module_args({}):
+ self.module.main()
def test_without_content(self):
"""Failure if content and embeds both are missing"""
- set_module_args({
+ with set_module_args({
'webhook_id': 'xxx',
'webhook_token': 'xxx'
- })
- with self.assertRaises(AnsibleFailJson):
- self.module.main()
+ }):
+ with self.assertRaises(AnsibleFailJson):
+ self.module.main()
def test_successful_message(self):
"""Test a basic message successfully."""
- set_module_args({
+ with set_module_args({
'webhook_id': 'xxx',
'webhook_token': 'xxx',
'content': 'test'
- })
+ }):
- with patch.object(discord, "fetch_url") as fetch_url_mock:
- fetch_url_mock.return_value = (None, {"status": 204, 'msg': 'OK (0 bytes)'})
- with self.assertRaises(AnsibleExitJson):
- self.module.main()
+ with patch.object(discord, "fetch_url") as fetch_url_mock:
+ fetch_url_mock.return_value = (None, {"status": 204, 'msg': 'OK (0 bytes)'})
+ with self.assertRaises(AnsibleExitJson):
+ self.module.main()
self.assertTrue(fetch_url_mock.call_count, 1)
call_data = json.loads(fetch_url_mock.call_args[1]['data'])
@@ -59,17 +59,17 @@ class TestDiscordModule(ModuleTestCase):
def test_message_with_username(self):
"""Test a message with username set successfully."""
- set_module_args({
+ with set_module_args({
'webhook_id': 'xxx',
'webhook_token': 'xxx',
'content': 'test',
'username': 'Ansible Bot'
- })
+ }):
- with patch.object(discord, "fetch_url") as fetch_url_mock:
- fetch_url_mock.return_value = (None, {"status": 204, 'msg': 'OK (0 bytes)'})
- with self.assertRaises(AnsibleExitJson):
- self.module.main()
+ with patch.object(discord, "fetch_url") as fetch_url_mock:
+ fetch_url_mock.return_value = (None, {"status": 204, 'msg': 'OK (0 bytes)'})
+ with self.assertRaises(AnsibleExitJson):
+ self.module.main()
self.assertTrue(fetch_url_mock.call_count, 1)
call_data = json.loads(fetch_url_mock.call_args[1]['data'])
@@ -79,27 +79,30 @@ class TestDiscordModule(ModuleTestCase):
def test_failed_message(self):
"""Test failure because webhook id is wrong."""
- set_module_args({
+ with set_module_args({
'webhook_id': 'wrong',
'webhook_token': 'xxx',
'content': 'test'
- })
+ }):
- with patch.object(discord, "fetch_url") as fetch_url_mock:
- fetch_url_mock.return_value = (None, {"status": 404, 'msg': 'HTTP Error 404: Not Found', 'body': '{"message": "Unknown Webhook", "code": 10015}'})
- with self.assertRaises(AnsibleFailJson):
- self.module.main()
+ with patch.object(discord, "fetch_url") as fetch_url_mock:
+ fetch_url_mock.return_value = (
+ None,
+ {"status": 404, 'msg': 'HTTP Error 404: Not Found', 'body': '{"message": "Unknown Webhook", "code": 10015}'},
+ )
+ with self.assertRaises(AnsibleFailJson):
+ self.module.main()
def test_failed_message_without_body(self):
"""Test failure with empty response body."""
- set_module_args({
+ with set_module_args({
'webhook_id': 'wrong',
'webhook_token': 'xxx',
'content': 'test'
- })
+ }):
- with patch.object(discord, "fetch_url") as fetch_url_mock:
- fetch_url_mock.return_value = (None, {"status": 404, 'msg': 'HTTP Error 404: Not Found'})
- with self.assertRaises(AnsibleFailJson):
- self.module.main()
+ with patch.object(discord, "fetch_url") as fetch_url_mock:
+ fetch_url_mock.return_value = (None, {"status": 404, 'msg': 'HTTP Error 404: Not Found'})
+ with self.assertRaises(AnsibleFailJson):
+ self.module.main()
diff --git a/tests/unit/plugins/modules/test_dnf_config_manager.py b/tests/unit/plugins/modules/test_dnf_config_manager.py
index 7b231e10a5..2f07030874 100644
--- a/tests/unit/plugins/modules/test_dnf_config_manager.py
+++ b/tests/unit/plugins/modules/test_dnf_config_manager.py
@@ -305,22 +305,22 @@ class TestDNFConfigManager(ModuleTestCase):
return result
def test_get_repo_states(self):
- set_module_args({})
- self.set_command_mock(execute_return=(0, mock_repolist_crb_enabled, ''))
- result = self.execute_module(changed=False)
+ with set_module_args({}):
+ self.set_command_mock(execute_return=(0, mock_repolist_crb_enabled, ''))
+ result = self.execute_module(changed=False)
self.assertEqual(result['repo_states_pre'], expected_repo_states_crb_enabled)
self.assertEqual(result['repo_states_post'], expected_repo_states_crb_enabled)
self.assertEqual(result['changed_repos'], [])
self.run_command.assert_has_calls(calls=[call_get_repo_states, call_get_repo_states], any_order=False)
def test_enable_disabled_repo(self):
- set_module_args({
+ with set_module_args({
'name': ['crb'],
'state': 'enabled'
- })
- side_effects = [(0, mock_repolist_crb_disabled, ''), (0, '', ''), (0, mock_repolist_crb_enabled, '')]
- self.set_command_mock(execute_side_effect=side_effects)
- result = self.execute_module(changed=True)
+ }):
+ side_effects = [(0, mock_repolist_crb_disabled, ''), (0, '', ''), (0, mock_repolist_crb_enabled, '')]
+ self.set_command_mock(execute_side_effect=side_effects)
+ result = self.execute_module(changed=True)
self.assertEqual(result['repo_states_pre'], expected_repo_states_crb_disabled)
self.assertEqual(result['repo_states_post'], expected_repo_states_crb_enabled)
self.assertEqual(result['changed_repos'], ['crb'])
@@ -328,25 +328,25 @@ class TestDNFConfigManager(ModuleTestCase):
self.run_command.assert_has_calls(calls=expected_calls, any_order=False)
def test_enable_disabled_repo_check_mode(self):
- set_module_args({
+ with set_module_args({
'name': ['crb'],
'state': 'enabled',
'_ansible_check_mode': True
- })
- side_effects = [(0, mock_repolist_crb_disabled, ''), (0, mock_repolist_crb_disabled, '')]
- self.set_command_mock(execute_side_effect=side_effects)
- result = self.execute_module(changed=True)
+ }):
+ side_effects = [(0, mock_repolist_crb_disabled, ''), (0, mock_repolist_crb_disabled, '')]
+ self.set_command_mock(execute_side_effect=side_effects)
+ result = self.execute_module(changed=True)
self.assertEqual(result['changed_repos'], ['crb'])
self.run_command.assert_has_calls(calls=[call_get_repo_states], any_order=False)
def test_disable_enabled_repo(self):
- set_module_args({
+ with set_module_args({
'name': ['crb'],
'state': 'disabled'
- })
- side_effects = [(0, mock_repolist_crb_enabled, ''), (0, '', ''), (0, mock_repolist_crb_disabled, '')]
- self.set_command_mock(execute_side_effect=side_effects)
- result = self.execute_module(changed=True)
+ }):
+ side_effects = [(0, mock_repolist_crb_enabled, ''), (0, '', ''), (0, mock_repolist_crb_disabled, '')]
+ self.set_command_mock(execute_side_effect=side_effects)
+ result = self.execute_module(changed=True)
self.assertEqual(result['repo_states_pre'], expected_repo_states_crb_enabled)
self.assertEqual(result['repo_states_post'], expected_repo_states_crb_disabled)
self.assertEqual(result['changed_repos'], ['crb'])
@@ -354,49 +354,49 @@ class TestDNFConfigManager(ModuleTestCase):
self.run_command.assert_has_calls(calls=expected_calls, any_order=False)
def test_crb_already_enabled(self):
- set_module_args({
+ with set_module_args({
'name': ['crb'],
'state': 'enabled'
- })
- side_effects = [(0, mock_repolist_crb_enabled, ''), (0, mock_repolist_crb_enabled, '')]
- self.set_command_mock(execute_side_effect=side_effects)
- result = self.execute_module(changed=False)
+ }):
+ side_effects = [(0, mock_repolist_crb_enabled, ''), (0, mock_repolist_crb_enabled, '')]
+ self.set_command_mock(execute_side_effect=side_effects)
+ result = self.execute_module(changed=False)
self.assertEqual(result['repo_states_pre'], expected_repo_states_crb_enabled)
self.assertEqual(result['repo_states_post'], expected_repo_states_crb_enabled)
self.assertEqual(result['changed_repos'], [])
self.run_command.assert_has_calls(calls=[call_get_repo_states, call_get_repo_states], any_order=False)
def test_get_repo_states_fail_no_status(self):
- set_module_args({})
- self.set_command_mock(execute_return=(0, mock_repolist_no_status, ''))
- result = self.execute_module(failed=True)
+ with set_module_args({}):
+ self.set_command_mock(execute_return=(0, mock_repolist_no_status, ''))
+ result = self.execute_module(failed=True)
self.assertEqual(result['msg'], 'dnf repolist parse failure: parsed another repo id before next status')
self.run_command.assert_has_calls(calls=[call_get_repo_states], any_order=False)
def test_get_repo_states_fail_status_before_id(self):
- set_module_args({})
- self.set_command_mock(execute_return=(0, mock_repolist_status_before_id, ''))
- result = self.execute_module(failed=True)
+ with set_module_args({}):
+ self.set_command_mock(execute_return=(0, mock_repolist_status_before_id, ''))
+ result = self.execute_module(failed=True)
self.assertEqual(result['msg'], 'dnf repolist parse failure: parsed status before repo id')
self.run_command.assert_has_calls(calls=[call_get_repo_states], any_order=False)
def test_failed__unknown_repo_id(self):
- set_module_args({
+ with set_module_args({
'name': ['fake']
- })
- self.set_command_mock(execute_return=(0, mock_repolist_crb_disabled, ''))
- result = self.execute_module(failed=True)
+ }):
+ self.set_command_mock(execute_return=(0, mock_repolist_crb_disabled, ''))
+ result = self.execute_module(failed=True)
self.assertEqual(result['msg'], "did not find repo with ID 'fake' in dnf repolist --all --verbose")
self.run_command.assert_has_calls(calls=[call_get_repo_states], any_order=False)
def test_failed_state_change_ineffective(self):
- set_module_args({
+ with set_module_args({
'name': ['crb'],
'state': 'enabled'
- })
- side_effects = [(0, mock_repolist_crb_disabled, ''), (0, '', ''), (0, mock_repolist_crb_disabled, '')]
- self.set_command_mock(execute_side_effect=side_effects)
- result = self.execute_module(failed=True)
+ }):
+ side_effects = [(0, mock_repolist_crb_disabled, ''), (0, '', ''), (0, mock_repolist_crb_disabled, '')]
+ self.set_command_mock(execute_side_effect=side_effects)
+ result = self.execute_module(failed=True)
self.assertEqual(result['msg'], "dnf config-manager failed to make 'crb' enabled")
expected_calls = [call_get_repo_states, call_enable_crb, call_get_repo_states]
self.run_command.assert_has_calls(calls=expected_calls, any_order=False)
diff --git a/tests/unit/plugins/modules/test_dnsimple.py b/tests/unit/plugins/modules/test_dnsimple.py
index d5578252dc..3a56412aee 100644
--- a/tests/unit/plugins/modules/test_dnsimple.py
+++ b/tests/unit/plugins/modules/test_dnsimple.py
@@ -38,8 +38,8 @@ class TestDNSimple(ModuleTestCase):
def test_without_required_parameters(self):
"""Failure must occurs when all parameters are missing"""
with self.assertRaises(AnsibleFailJson):
- set_module_args({})
- self.module.main()
+ with set_module_args({}):
+ self.module.main()
@patch('dnsimple.service.Identity.whoami')
def test_account_token(self, mock_whoami):
diff --git a/tests/unit/plugins/modules/test_dnsimple_info.py b/tests/unit/plugins/modules/test_dnsimple_info.py
index 08c5296c81..25ac439734 100644
--- a/tests/unit/plugins/modules/test_dnsimple_info.py
+++ b/tests/unit/plugins/modules/test_dnsimple_info.py
@@ -56,19 +56,19 @@ class TestDNSimple_Info(ModuleTestCase):
def test_with_no_parameters(self):
"""Failure must occurs when all parameters are missing"""
with self.assertRaises(AnsibleFailJson):
- set_module_args({})
- self.module.main()
+ with set_module_args({}):
+ self.module.main()
@with_httmock(zones_resp)
def test_only_key_and_account(self):
"""key and account will pass, returns domains"""
account_id = "1234"
with self.assertRaises(AnsibleExitJson) as exc_info:
- set_module_args({
+ with set_module_args({
"api_key": "abcd1324",
"account_id": account_id
- })
- self.module.main()
+ }):
+ self.module.main()
result = exc_info.exception.args[0]
# nothing should change
self.assertFalse(result['changed'])
@@ -80,12 +80,12 @@ class TestDNSimple_Info(ModuleTestCase):
"""name and no record should not fail, returns the record"""
name = "example.com"
with self.assertRaises(AnsibleExitJson) as exc_info:
- set_module_args({
+ with set_module_args({
"api_key": "abcd1324",
"name": "example.com",
"account_id": "1234"
- })
- self.module.main()
+ }):
+ self.module.main()
result = exc_info.exception.args[0]
# nothing should change
self.assertFalse(result['changed'])
@@ -97,13 +97,13 @@ class TestDNSimple_Info(ModuleTestCase):
"""name and record should not fail, returns the record"""
record = "example"
with self.assertRaises(AnsibleExitJson) as exc_info:
- set_module_args({
+ with set_module_args({
"api_key": "abcd1324",
"account_id": "1234",
"name": "example.com",
"record": "example"
- })
- self.module.main()
+ }):
+ self.module.main()
result = exc_info.exception.args[0]
# nothing should change
self.assertFalse(result['changed'])
diff --git a/tests/unit/plugins/modules/test_gem.py b/tests/unit/plugins/modules/test_gem.py
index 10c03e537d..eee6a96d60 100644
--- a/tests/unit/plugins/modules/test_gem.py
+++ b/tests/unit/plugins/modules/test_gem.py
@@ -55,14 +55,13 @@ class TestGem(ModuleTestCase):
return self.mocker.patch(target)
def test_fails_when_user_install_and_install_dir_are_combined(self):
- set_module_args({
+ with set_module_args({
'name': 'dummy',
'user_install': True,
'install_dir': '/opt/dummy',
- })
-
- with pytest.raises(AnsibleFailJson) as exc:
- gem.main()
+ }):
+ with pytest.raises(AnsibleFailJson) as exc:
+ gem.main()
result = exc.value.args[0]
assert result['failed']
@@ -75,18 +74,17 @@ class TestGem(ModuleTestCase):
# test mocks. The only thing that matters is the assertion that this 'gem install' is
# invoked with '--install-dir'.
- set_module_args({
+ with set_module_args({
'name': 'dummy',
'user_install': False,
'install_dir': '/opt/dummy',
- })
+ }):
+ self.patch_rubygems_version()
+ self.patch_installed_versions([])
+ run_command = self.patch_run_command()
- self.patch_rubygems_version()
- self.patch_installed_versions([])
- run_command = self.patch_run_command()
-
- with pytest.raises(AnsibleExitJson) as exc:
- gem.main()
+ with pytest.raises(AnsibleExitJson) as exc:
+ gem.main()
result = exc.value.args[0]
assert result['changed']
@@ -98,20 +96,19 @@ class TestGem(ModuleTestCase):
# XXX: This test is also extremely fragile because of mocking.
# If this breaks, the only that matters is to check whether '--install-dir' is
# in the run command, and that GEM_HOME is passed to the command.
- set_module_args({
+ with set_module_args({
'name': 'dummy',
'user_install': False,
'install_dir': '/opt/dummy',
'state': 'absent',
- })
+ }):
+ self.patch_rubygems_version()
+ self.patch_installed_versions(['1.0.0'])
- self.patch_rubygems_version()
- self.patch_installed_versions(['1.0.0'])
+ run_command = self.patch_run_command()
- run_command = self.patch_run_command()
-
- with pytest.raises(AnsibleExitJson) as exc:
- gem.main()
+ with pytest.raises(AnsibleExitJson) as exc:
+ gem.main()
result = exc.value.args[0]
@@ -124,17 +121,16 @@ class TestGem(ModuleTestCase):
assert update_environ.get('GEM_HOME') == '/opt/dummy'
def test_passes_add_force_option(self):
- set_module_args({
+ with set_module_args({
'name': 'dummy',
'force': True,
- })
+ }):
+ self.patch_rubygems_version()
+ self.patch_installed_versions([])
+ run_command = self.patch_run_command()
- self.patch_rubygems_version()
- self.patch_installed_versions([])
- run_command = self.patch_run_command()
-
- with pytest.raises(AnsibleExitJson) as exc:
- gem.main()
+ with pytest.raises(AnsibleExitJson) as exc:
+ gem.main()
result = exc.value.args[0]
assert result['changed']
diff --git a/tests/unit/plugins/modules/test_icinga2_feature.py b/tests/unit/plugins/modules/test_icinga2_feature.py
index 23c94fad58..7a28705dc0 100644
--- a/tests/unit/plugins/modules/test_icinga2_feature.py
+++ b/tests/unit/plugins/modules/test_icinga2_feature.py
@@ -38,63 +38,63 @@ class TestIcinga2Feature(ModuleTestCase):
def test_without_required_parameters(self):
"""Failure must occurs when all parameters are missing."""
with self.assertRaises(AnsibleFailJson):
- set_module_args({})
- self.module.main()
+ with set_module_args({}):
+ self.module.main()
def test_enable_feature(self):
"""Check that result is changed."""
- set_module_args({
+ with set_module_args({
'name': 'api',
- })
- with patch.object(basic.AnsibleModule, 'run_command') as run_command:
- run_command.return_value = 0, '', '' # successful execution, no output
- with self.assertRaises(AnsibleExitJson) as result:
- icinga2_feature.main()
- self.assertTrue(result.exception.args[0]['changed'])
+ }):
+ with patch.object(basic.AnsibleModule, 'run_command') as run_command:
+ run_command.return_value = 0, '', '' # successful execution, no output
+ with self.assertRaises(AnsibleExitJson) as result:
+ icinga2_feature.main()
+ self.assertTrue(result.exception.args[0]['changed'])
self.assertEqual(run_command.call_count, 2)
self.assertEqual(run_command.call_args[0][0][-1], 'api')
def test_enable_feature_with_check_mode(self):
"""Check that result is changed in check mode."""
- set_module_args({
+ with set_module_args({
'name': 'api',
'_ansible_check_mode': True,
- })
- with patch.object(basic.AnsibleModule, 'run_command') as run_command:
- run_command.return_value = 0, '', '' # successful execution, no output
- with self.assertRaises(AnsibleExitJson) as result:
- icinga2_feature.main()
- self.assertTrue(result.exception.args[0]['changed'])
+ }):
+ with patch.object(basic.AnsibleModule, 'run_command') as run_command:
+ run_command.return_value = 0, '', '' # successful execution, no output
+ with self.assertRaises(AnsibleExitJson) as result:
+ icinga2_feature.main()
+ self.assertTrue(result.exception.args[0]['changed'])
self.assertEqual(run_command.call_count, 1)
def test_disable_feature(self):
"""Check that result is changed."""
- set_module_args({
+ with set_module_args({
'name': 'api',
'state': 'absent'
- })
- with patch.object(basic.AnsibleModule, 'run_command') as run_command:
- run_command.return_value = 0, '', '' # successful execution, no output
- with self.assertRaises(AnsibleExitJson) as result:
- icinga2_feature.main()
- self.assertTrue(result.exception.args[0]['changed'])
+ }):
+ with patch.object(basic.AnsibleModule, 'run_command') as run_command:
+ run_command.return_value = 0, '', '' # successful execution, no output
+ with self.assertRaises(AnsibleExitJson) as result:
+ icinga2_feature.main()
+ self.assertTrue(result.exception.args[0]['changed'])
self.assertEqual(run_command.call_count, 2)
self.assertEqual(run_command.call_args[0][0][-1], 'api')
def test_disable_feature_with_check_mode(self):
"""Check that result is changed in check mode."""
- set_module_args({
+ with set_module_args({
'name': 'api',
'state': 'absent',
'_ansible_check_mode': True,
- })
- with patch.object(basic.AnsibleModule, 'run_command') as run_command:
- run_command.return_value = 0, '', '' # successful execution, no output
- with self.assertRaises(AnsibleExitJson) as result:
- icinga2_feature.main()
- self.assertTrue(result.exception.args[0]['changed'])
+ }):
+ with patch.object(basic.AnsibleModule, 'run_command') as run_command:
+ run_command.return_value = 0, '', '' # successful execution, no output
+ with self.assertRaises(AnsibleExitJson) as result:
+ icinga2_feature.main()
+ self.assertTrue(result.exception.args[0]['changed'])
self.assertEqual(run_command.call_count, 1)
diff --git a/tests/unit/plugins/modules/test_ipa_getkeytab.py b/tests/unit/plugins/modules/test_ipa_getkeytab.py
index e4e8ed2ece..246531ed4f 100644
--- a/tests/unit/plugins/modules/test_ipa_getkeytab.py
+++ b/tests/unit/plugins/modules/test_ipa_getkeytab.py
@@ -34,18 +34,17 @@ class IPAKeytabModuleTestCase(ModuleTestCase):
return exc.exception.args[0]
def test_present(self):
- set_module_args({
+ with set_module_args({
'path': '/tmp/test.keytab',
'principal': 'HTTP/freeipa-dc02.ipa.test',
'ipa_host': 'freeipa-dc01.ipa.test',
'state': 'present'
- })
+ }):
+ self.module_main_command.side_effect = [
+ (0, '{}', ''),
+ ]
- self.module_main_command.side_effect = [
- (0, '{}', ''),
- ]
-
- result = self.module_main(AnsibleExitJson)
+ result = self.module_main(AnsibleExitJson)
self.assertTrue(result['changed'])
self.module_main_command.assert_has_calls([
diff --git a/tests/unit/plugins/modules/test_ipa_otpconfig.py b/tests/unit/plugins/modules/test_ipa_otpconfig.py
index 718359a301..160142732d 100644
--- a/tests/unit/plugins/modules/test_ipa_otpconfig.py
+++ b/tests/unit/plugins/modules/test_ipa_otpconfig.py
@@ -61,12 +61,12 @@ class TestIPAOTPConfig(ModuleTestCase):
changed (bool):
Whether or not the module is supposed to be marked as changed
"""
- set_module_args(module_args)
# Run the module
- with patch_ipa(return_value=return_value) as (mock_login, mock_post):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with patch_ipa(return_value=return_value) as (mock_login, mock_post):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
# Verify that the calls to _post_json match what is expected
expected_call_count = len(mock_calls)
@@ -389,16 +389,15 @@ class TestIPAOTPConfig(ModuleTestCase):
def test_fail_post(self):
"""Fail due to an exception raised from _post_json"""
- set_module_args({
+ with set_module_args({
'ipatokentotpauthwindow': 11,
'ipatokentotpsyncwindow': 12,
'ipatokenhotpauthwindow': 13,
'ipatokenhotpsyncwindow': 14
- })
-
- with patch_ipa(side_effect=Exception('ERROR MESSAGE')) as (mock_login, mock_post):
- with self.assertRaises(AnsibleFailJson) as exec_info:
- self.module.main()
+ }):
+ with patch_ipa(side_effect=Exception('ERROR MESSAGE')) as (mock_login, mock_post):
+ with self.assertRaises(AnsibleFailJson) as exec_info:
+ self.module.main()
self.assertEqual(exec_info.exception.args[0]['msg'], 'ERROR MESSAGE')
diff --git a/tests/unit/plugins/modules/test_ipa_otptoken.py b/tests/unit/plugins/modules/test_ipa_otptoken.py
index 23911e5a5b..c87e9a1514 100644
--- a/tests/unit/plugins/modules/test_ipa_otptoken.py
+++ b/tests/unit/plugins/modules/test_ipa_otptoken.py
@@ -61,12 +61,11 @@ class TestIPAOTPToken(ModuleTestCase):
changed (bool):
Whether or not the module is supposed to be marked as changed
"""
- set_module_args(module_args)
-
- # Run the module
- with patch_ipa(return_value=return_value) as (mock_login, mock_post):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ # Run the module
+ with patch_ipa(return_value=return_value) as (mock_login, mock_post):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
# Verify that the calls to _post_json match what is expected
expected_call_count = len(mock_calls)
@@ -481,13 +480,12 @@ class TestIPAOTPToken(ModuleTestCase):
def test_fail_post(self):
"""Fail due to an exception raised from _post_json"""
- set_module_args({
+ with set_module_args({
'uniqueid': 'NewToken1'
- })
-
- with patch_ipa(side_effect=Exception('ERROR MESSAGE')) as (mock_login, mock_post):
- with self.assertRaises(AnsibleFailJson) as exec_info:
- self.module.main()
+ }):
+ with patch_ipa(side_effect=Exception('ERROR MESSAGE')) as (mock_login, mock_post):
+ with self.assertRaises(AnsibleFailJson) as exec_info:
+ self.module.main()
self.assertEqual(exec_info.exception.args[0]['msg'], 'ERROR MESSAGE')
diff --git a/tests/unit/plugins/modules/test_ipa_pwpolicy.py b/tests/unit/plugins/modules/test_ipa_pwpolicy.py
index 538f61e9aa..aeb750fbc6 100644
--- a/tests/unit/plugins/modules/test_ipa_pwpolicy.py
+++ b/tests/unit/plugins/modules/test_ipa_pwpolicy.py
@@ -62,12 +62,11 @@ class TestIPAPwPolicy(ModuleTestCase):
changed (bool):
Whether or not the module is supposed to be marked as changed
"""
- set_module_args(module_args)
-
- # Run the module
- with patch_ipa(return_value=return_value) as (mock_login, mock_post):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ # Run the module
+ with patch_ipa(return_value=return_value) as (mock_login, mock_post):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
# Verify that the calls to _post_json match what is expected
expected_call_count = len(mock_calls)
@@ -693,14 +692,13 @@ class TestIPAPwPolicy(ModuleTestCase):
def test_fail_post(self):
"""Fail due to an exception raised from _post_json"""
- set_module_args({
+ with set_module_args({
'group': 'admins',
'state': 'absent'
- })
-
- with patch_ipa(side_effect=Exception('ERROR MESSAGE')) as (mock_login, mock_post):
- with self.assertRaises(AnsibleFailJson) as exec_info:
- self.module.main()
+ }):
+ with patch_ipa(side_effect=Exception('ERROR MESSAGE')) as (mock_login, mock_post):
+ with self.assertRaises(AnsibleFailJson) as exec_info:
+ self.module.main()
self.assertEqual(exec_info.exception.args[0]['msg'], 'ERROR MESSAGE')
diff --git a/tests/unit/plugins/modules/test_java_keystore.py b/tests/unit/plugins/modules/test_java_keystore.py
index b2e70404a9..8dd763067e 100644
--- a/tests/unit/plugins/modules/test_java_keystore.py
+++ b/tests/unit/plugins/modules/test_java_keystore.py
@@ -83,20 +83,20 @@ class TestCreateJavaKeystore(ModuleTestCase):
self.mock_os_path_exists.stop()
def test_create_jks_success(self):
- set_module_args(dict(
+ with set_module_args(dict(
certificate='cert-foo',
private_key='private-foo',
dest='/path/to/keystore.jks',
name='test',
password='changeit'
- ))
+ )):
- module = AnsibleModule(
- argument_spec=module_argument_spec,
- supports_check_mode=module_supports_check_mode,
- mutually_exclusive=module_choose_between,
- required_one_of=module_choose_between
- )
+ module = AnsibleModule(
+ argument_spec=module_argument_spec,
+ supports_check_mode=module_supports_check_mode,
+ mutually_exclusive=module_choose_between,
+ required_one_of=module_choose_between
+ )
with patch('os.remove', return_value=True):
self.create_path.side_effect = ['/tmp/tmpgrzm2ah7']
@@ -115,21 +115,21 @@ class TestCreateJavaKeystore(ModuleTestCase):
}
def test_create_jks_keypass_fail_export_pkcs12(self):
- set_module_args(dict(
+ with set_module_args(dict(
certificate='cert-foo',
private_key='private-foo',
private_key_passphrase='passphrase-foo',
dest='/path/to/keystore.jks',
name='test',
password='changeit'
- ))
+ )):
- module = AnsibleModule(
- argument_spec=module_argument_spec,
- supports_check_mode=module_supports_check_mode,
- mutually_exclusive=module_choose_between,
- required_one_of=module_choose_between
- )
+ module = AnsibleModule(
+ argument_spec=module_argument_spec,
+ supports_check_mode=module_supports_check_mode,
+ mutually_exclusive=module_choose_between,
+ required_one_of=module_choose_between
+ )
module.exit_json = Mock()
module.fail_json = Mock()
@@ -154,20 +154,20 @@ class TestCreateJavaKeystore(ModuleTestCase):
)
def test_create_jks_fail_export_pkcs12(self):
- set_module_args(dict(
+ with set_module_args(dict(
certificate='cert-foo',
private_key='private-foo',
dest='/path/to/keystore.jks',
name='test',
password='changeit'
- ))
+ )):
- module = AnsibleModule(
- argument_spec=module_argument_spec,
- supports_check_mode=module_supports_check_mode,
- mutually_exclusive=module_choose_between,
- required_one_of=module_choose_between
- )
+ module = AnsibleModule(
+ argument_spec=module_argument_spec,
+ supports_check_mode=module_supports_check_mode,
+ mutually_exclusive=module_choose_between,
+ required_one_of=module_choose_between
+ )
module.exit_json = Mock()
module.fail_json = Mock()
@@ -191,20 +191,20 @@ class TestCreateJavaKeystore(ModuleTestCase):
)
def test_create_jks_fail_import_key(self):
- set_module_args(dict(
+ with set_module_args(dict(
certificate='cert-foo',
private_key='private-foo',
dest='/path/to/keystore.jks',
name='test',
password='changeit'
- ))
+ )):
- module = AnsibleModule(
- argument_spec=module_argument_spec,
- supports_check_mode=module_supports_check_mode,
- mutually_exclusive=module_choose_between,
- required_one_of=module_choose_between
- )
+ module = AnsibleModule(
+ argument_spec=module_argument_spec,
+ supports_check_mode=module_supports_check_mode,
+ mutually_exclusive=module_choose_between,
+ required_one_of=module_choose_between
+ )
module.exit_json = Mock()
module.fail_json = Mock()
@@ -257,20 +257,20 @@ class TestCertChanged(ModuleTestCase):
self.mock_atomic_move.stop()
def test_cert_unchanged_same_fingerprint(self):
- set_module_args(dict(
+ with set_module_args(dict(
certificate='cert-foo',
private_key='private-foo',
dest='/path/to/keystore.jks',
name='foo',
password='changeit'
- ))
+ )):
- module = AnsibleModule(
- argument_spec=module_argument_spec,
- supports_check_mode=module_supports_check_mode,
- mutually_exclusive=module_choose_between,
- required_one_of=module_choose_between
- )
+ module = AnsibleModule(
+ argument_spec=module_argument_spec,
+ supports_check_mode=module_supports_check_mode,
+ mutually_exclusive=module_choose_between,
+ required_one_of=module_choose_between
+ )
with patch('os.remove', return_value=True):
self.create_file.side_effect = ['/tmp/placeholder', '']
@@ -282,20 +282,20 @@ class TestCertChanged(ModuleTestCase):
self.assertFalse(result, 'Fingerprint is identical')
def test_cert_changed_fingerprint_mismatch(self):
- set_module_args(dict(
+ with set_module_args(dict(
certificate='cert-foo',
private_key='private-foo',
dest='/path/to/keystore.jks',
name='foo',
password='changeit'
- ))
+ )):
- module = AnsibleModule(
- argument_spec=module_argument_spec,
- supports_check_mode=module_supports_check_mode,
- mutually_exclusive=module_choose_between,
- required_one_of=module_choose_between
- )
+ module = AnsibleModule(
+ argument_spec=module_argument_spec,
+ supports_check_mode=module_supports_check_mode,
+ mutually_exclusive=module_choose_between,
+ required_one_of=module_choose_between
+ )
with patch('os.remove', return_value=True):
self.create_file.side_effect = ['/tmp/placeholder', '']
@@ -307,20 +307,20 @@ class TestCertChanged(ModuleTestCase):
self.assertTrue(result, 'Fingerprint mismatch')
def test_cert_changed_alias_does_not_exist(self):
- set_module_args(dict(
+ with set_module_args(dict(
certificate='cert-foo',
private_key='private-foo',
dest='/path/to/keystore.jks',
name='foo',
password='changeit'
- ))
+ )):
- module = AnsibleModule(
- argument_spec=module_argument_spec,
- supports_check_mode=module_supports_check_mode,
- mutually_exclusive=module_choose_between,
- required_one_of=module_choose_between
- )
+ module = AnsibleModule(
+ argument_spec=module_argument_spec,
+ supports_check_mode=module_supports_check_mode,
+ mutually_exclusive=module_choose_between,
+ required_one_of=module_choose_between
+ )
with patch('os.remove', return_value=True):
self.create_file.side_effect = ['/tmp/placeholder', '']
@@ -332,20 +332,20 @@ class TestCertChanged(ModuleTestCase):
self.assertTrue(result, 'Alias mismatch detected')
def test_cert_changed_password_mismatch(self):
- set_module_args(dict(
+ with set_module_args(dict(
certificate='cert-foo',
private_key='private-foo',
dest='/path/to/keystore.jks',
name='foo',
password='changeit'
- ))
+ )):
- module = AnsibleModule(
- argument_spec=module_argument_spec,
- supports_check_mode=module_supports_check_mode,
- mutually_exclusive=module_choose_between,
- required_one_of=module_choose_between
- )
+ module = AnsibleModule(
+ argument_spec=module_argument_spec,
+ supports_check_mode=module_supports_check_mode,
+ mutually_exclusive=module_choose_between,
+ required_one_of=module_choose_between
+ )
with patch('os.remove', return_value=True):
self.create_file.side_effect = ['/tmp/placeholder', '']
@@ -357,20 +357,20 @@ class TestCertChanged(ModuleTestCase):
self.assertTrue(result, 'Password mismatch detected')
def test_cert_changed_fail_read_cert(self):
- set_module_args(dict(
+ with set_module_args(dict(
certificate='cert-foo',
private_key='private-foo',
dest='/path/to/keystore.jks',
name='foo',
password='changeit'
- ))
+ )):
- module = AnsibleModule(
- argument_spec=module_argument_spec,
- supports_check_mode=module_supports_check_mode,
- mutually_exclusive=module_choose_between,
- required_one_of=module_choose_between
- )
+ module = AnsibleModule(
+ argument_spec=module_argument_spec,
+ supports_check_mode=module_supports_check_mode,
+ mutually_exclusive=module_choose_between,
+ required_one_of=module_choose_between
+ )
module.exit_json = Mock()
module.fail_json = Mock()
@@ -390,20 +390,20 @@ class TestCertChanged(ModuleTestCase):
)
def test_cert_changed_fail_read_keystore(self):
- set_module_args(dict(
+ with set_module_args(dict(
certificate='cert-foo',
private_key='private-foo',
dest='/path/to/keystore.jks',
name='foo',
password='changeit'
- ))
+ )):
- module = AnsibleModule(
- argument_spec=module_argument_spec,
- supports_check_mode=module_supports_check_mode,
- mutually_exclusive=module_choose_between,
- required_one_of=module_choose_between
- )
+ module = AnsibleModule(
+ argument_spec=module_argument_spec,
+ supports_check_mode=module_supports_check_mode,
+ mutually_exclusive=module_choose_between,
+ required_one_of=module_choose_between
+ )
module.exit_json = Mock()
module.fail_json = Mock(return_value=True)
diff --git a/tests/unit/plugins/modules/test_jenkins_build.py b/tests/unit/plugins/modules/test_jenkins_build.py
index d9013a0181..78bcfa7c7b 100644
--- a/tests/unit/plugins/modules/test_jenkins_build.py
+++ b/tests/unit/plugins/modules/test_jenkins_build.py
@@ -8,39 +8,8 @@ __metaclass__ = type
from ansible_collections.community.general.tests.unit.compat import unittest
from ansible_collections.community.general.tests.unit.compat.mock import patch
from ansible.module_utils import basic
-from ansible.module_utils.common.text.converters import to_bytes
from ansible_collections.community.general.plugins.modules import jenkins_build
-
-import json
-
-
-def set_module_args(args):
- """prepare arguments so that they will be picked up during module creation"""
- args = json.dumps({'ANSIBLE_MODULE_ARGS': args})
- basic._ANSIBLE_ARGS = to_bytes(args)
-
-
-class AnsibleExitJson(Exception):
- """Exception class to be raised by module.exit_json and caught by the test case"""
- pass
-
-
-class AnsibleFailJson(Exception):
- """Exception class to be raised by module.fail_json and caught by the test case"""
- pass
-
-
-def exit_json(*args, **kwargs):
- """function to patch over exit_json; package return data into an exception"""
- if 'changed' not in kwargs:
- kwargs['changed'] = False
- raise AnsibleExitJson(kwargs)
-
-
-def fail_json(*args, **kwargs):
- """function to patch over fail_json; package return data into an exception"""
- kwargs['failed'] = True
- raise AnsibleFailJson(kwargs)
+from ansible_collections.community.general.tests.unit.plugins.modules.utils import AnsibleExitJson, AnsibleFailJson, set_module_args, exit_json, fail_json
class jenkins:
@@ -131,18 +100,18 @@ class TestJenkinsBuild(unittest.TestCase):
def test_module_fail_when_required_args_missing(self, test_deps):
test_deps.return_value = None
with self.assertRaises(AnsibleFailJson):
- set_module_args({})
- jenkins_build.main()
+ with set_module_args({}):
+ jenkins_build.main()
@patch('ansible_collections.community.general.plugins.modules.jenkins_build.test_dependencies')
def test_module_fail_when_missing_build_number(self, test_deps):
test_deps.return_value = None
with self.assertRaises(AnsibleFailJson):
- set_module_args({
+ with set_module_args({
"name": "required-if",
"state": "stopped"
- })
- jenkins_build.main()
+ }):
+ jenkins_build.main()
@patch('ansible_collections.community.general.plugins.modules.jenkins_build.test_dependencies')
@patch('ansible_collections.community.general.plugins.modules.jenkins_build.JenkinsBuild.get_jenkins_connection')
@@ -151,12 +120,12 @@ class TestJenkinsBuild(unittest.TestCase):
jenkins_connection.return_value = JenkinsMock()
with self.assertRaises(AnsibleExitJson):
- set_module_args({
+ with set_module_args({
"name": "host-check",
"user": "abc",
"token": "xyz"
- })
- jenkins_build.main()
+ }):
+ jenkins_build.main()
@patch('ansible_collections.community.general.plugins.modules.jenkins_build.test_dependencies')
@patch('ansible_collections.community.general.plugins.modules.jenkins_build.JenkinsBuild.get_jenkins_connection')
@@ -165,14 +134,14 @@ class TestJenkinsBuild(unittest.TestCase):
jenkins_connection.return_value = JenkinsMock()
with self.assertRaises(AnsibleExitJson) as return_json:
- set_module_args({
+ with set_module_args({
"name": "host-check",
"build_number": "1234",
"state": "stopped",
"user": "abc",
"token": "xyz"
- })
- jenkins_build.main()
+ }):
+ jenkins_build.main()
self.assertTrue(return_json.exception.args[0]['changed'])
@@ -183,14 +152,14 @@ class TestJenkinsBuild(unittest.TestCase):
jenkins_connection.return_value = JenkinsMockIdempotent()
with self.assertRaises(AnsibleExitJson) as return_json:
- set_module_args({
+ with set_module_args({
"name": "host-check",
"build_number": "1234",
"state": "stopped",
"user": "abc",
"password": "xyz"
- })
- jenkins_build.main()
+ }):
+ jenkins_build.main()
self.assertFalse(return_json.exception.args[0]['changed'])
@@ -203,14 +172,14 @@ class TestJenkinsBuild(unittest.TestCase):
build_status.return_value = JenkinsBuildMock().get_build_status()
with self.assertRaises(AnsibleExitJson):
- set_module_args({
+ with set_module_args({
"name": "host-delete",
"build_number": "1234",
"state": "absent",
"user": "abc",
"token": "xyz"
- })
- jenkins_build.main()
+ }):
+ jenkins_build.main()
@patch('ansible_collections.community.general.plugins.modules.jenkins_build.test_dependencies')
@patch('ansible_collections.community.general.plugins.modules.jenkins_build.JenkinsBuild.get_jenkins_connection')
@@ -219,14 +188,14 @@ class TestJenkinsBuild(unittest.TestCase):
jenkins_connection.return_value = JenkinsMockIdempotent()
with self.assertRaises(AnsibleFailJson):
- set_module_args({
+ with set_module_args({
"name": "host-delete",
"build_number": "1234",
"state": "absent",
"user": "abc",
"token": "xyz"
- })
- jenkins_build.main()
+ }):
+ jenkins_build.main()
@patch('ansible_collections.community.general.plugins.modules.jenkins_build.test_dependencies')
@patch('ansible_collections.community.general.plugins.modules.jenkins_build.JenkinsBuild.get_jenkins_connection')
@@ -237,12 +206,12 @@ class TestJenkinsBuild(unittest.TestCase):
build_status.return_value = JenkinsBuildMock().get_build_status()
with self.assertRaises(AnsibleExitJson) as return_json:
- set_module_args({
+ with set_module_args({
"name": "create-detached",
"user": "abc",
"token": "xyz"
- })
- jenkins_build.main()
+ }):
+ jenkins_build.main()
self.assertFalse(return_json.exception.args[0]['changed'])
@@ -253,12 +222,12 @@ class TestJenkinsBuild(unittest.TestCase):
jenkins_connection.return_value = JenkinsMock()
with self.assertRaises(AnsibleExitJson) as return_json:
- set_module_args({
+ with set_module_args({
"name": "create-detached",
"user": "abc",
"token": "xyz",
"detach": True
- })
- jenkins_build.main()
+ }):
+ jenkins_build.main()
self.assertTrue(return_json.exception.args[0]['changed'])
diff --git a/tests/unit/plugins/modules/test_jenkins_build_info.py b/tests/unit/plugins/modules/test_jenkins_build_info.py
index b5d4126fe0..a0efd63a59 100644
--- a/tests/unit/plugins/modules/test_jenkins_build_info.py
+++ b/tests/unit/plugins/modules/test_jenkins_build_info.py
@@ -8,39 +8,8 @@ __metaclass__ = type
from ansible_collections.community.general.tests.unit.compat import unittest
from ansible_collections.community.general.tests.unit.compat.mock import patch
from ansible.module_utils import basic
-from ansible.module_utils.common.text.converters import to_bytes
from ansible_collections.community.general.plugins.modules import jenkins_build_info
-
-import json
-
-
-def set_module_args(args):
- """prepare arguments so that they will be picked up during module creation"""
- args = json.dumps({'ANSIBLE_MODULE_ARGS': args})
- basic._ANSIBLE_ARGS = to_bytes(args)
-
-
-class AnsibleExitJson(Exception):
- """Exception class to be raised by module.exit_json and caught by the test case"""
- pass
-
-
-class AnsibleFailJson(Exception):
- """Exception class to be raised by module.fail_json and caught by the test case"""
- pass
-
-
-def exit_json(*args, **kwargs):
- """function to patch over exit_json; package return data into an exception"""
- if 'changed' not in kwargs:
- kwargs['changed'] = False
- raise AnsibleExitJson(kwargs)
-
-
-def fail_json(*args, **kwargs):
- """function to patch over fail_json; package return data into an exception"""
- kwargs['failed'] = True
- raise AnsibleFailJson(kwargs)
+from ansible_collections.community.general.tests.unit.plugins.modules.utils import AnsibleExitJson, AnsibleFailJson, set_module_args, exit_json, fail_json
class jenkins:
@@ -101,8 +70,8 @@ class TestJenkinsBuildInfo(unittest.TestCase):
def test_module_fail_when_required_args_missing(self, test_deps):
test_deps.return_value = None
with self.assertRaises(AnsibleFailJson):
- set_module_args({})
- jenkins_build_info.main()
+ with set_module_args({}):
+ jenkins_build_info.main()
@patch('ansible_collections.community.general.plugins.modules.jenkins_build_info.test_dependencies')
@patch('ansible_collections.community.general.plugins.modules.jenkins_build_info.JenkinsBuildInfo.get_jenkins_connection')
@@ -111,13 +80,13 @@ class TestJenkinsBuildInfo(unittest.TestCase):
jenkins_connection.return_value = JenkinsMock()
with self.assertRaises(AnsibleExitJson) as return_json:
- set_module_args({
+ with set_module_args({
"name": "job-present",
"user": "abc",
"token": "xyz",
"build_number": 30
- })
- jenkins_build_info.main()
+ }):
+ jenkins_build_info.main()
self.assertFalse(return_json.exception.args[0]["changed"])
@@ -130,13 +99,13 @@ class TestJenkinsBuildInfo(unittest.TestCase):
build_status.return_value = JenkinsBuildMock("job-absent", 30).get_build_status()
with self.assertRaises(AnsibleExitJson) as return_json:
- set_module_args({
+ with set_module_args({
"name": "job-absent",
"user": "abc",
"token": "xyz",
"build_number": 30
- })
- jenkins_build_info.main()
+ }):
+ jenkins_build_info.main()
self.assertFalse(return_json.exception.args[0]['changed'])
self.assertTrue(return_json.exception.args[0]['failed'])
@@ -149,12 +118,12 @@ class TestJenkinsBuildInfo(unittest.TestCase):
jenkins_connection.return_value = JenkinsMock()
with self.assertRaises(AnsibleExitJson) as return_json:
- set_module_args({
+ with set_module_args({
"name": "job-present",
"user": "abc",
"token": "xyz"
- })
- jenkins_build_info.main()
+ }):
+ jenkins_build_info.main()
self.assertFalse(return_json.exception.args[0]['changed'])
self.assertEqual("SUCCESS", return_json.exception.args[0]['build_info']['result'])
@@ -168,12 +137,12 @@ class TestJenkinsBuildInfo(unittest.TestCase):
build_status.return_value = JenkinsBuildMock("job-absent").get_build_status()
with self.assertRaises(AnsibleExitJson) as return_json:
- set_module_args({
+ with set_module_args({
"name": "job-absent",
"user": "abc",
"token": "xyz"
- })
- jenkins_build_info.main()
+ }):
+ jenkins_build_info.main()
self.assertFalse(return_json.exception.args[0]['changed'])
self.assertTrue(return_json.exception.args[0]['failed'])
diff --git a/tests/unit/plugins/modules/test_jenkins_node.py b/tests/unit/plugins/modules/test_jenkins_node.py
index 7c2634744d..068861407c 100644
--- a/tests/unit/plugins/modules/test_jenkins_node.py
+++ b/tests/unit/plugins/modules/test_jenkins_node.py
@@ -6,16 +6,14 @@ from __future__ import absolute_import, division, print_function
__metaclass__ = type
import jenkins
-import json
from xml.etree import ElementTree as et
import pytest
-from ansible.module_utils import basic
-from ansible.module_utils.common.text.converters import to_bytes
from ansible_collections.community.general.tests.unit.compat.mock import patch, call
from ansible_collections.community.general.plugins.modules import jenkins_node
+from ansible_collections.community.general.tests.unit.plugins.modules.utils import AnsibleExitJson, AnsibleFailJson, set_module_args, exit_json, fail_json
from pytest import fixture, raises, mark, param
@@ -62,35 +60,6 @@ def assert_xml_equal(x, y):
raise AssertionError("{} != {}".format(x, y))
-def set_module_args(args):
- """prepare arguments so that they will be picked up during module creation"""
- args = json.dumps({'ANSIBLE_MODULE_ARGS': args})
- basic._ANSIBLE_ARGS = to_bytes(args)
-
-
-class AnsibleExitJson(Exception):
- def __init__(self, value):
- self.value = value
-
- def __getitem__(self, item):
- return self.value[item]
-
-
-def exit_json(*args, **kwargs):
- if 'changed' not in kwargs:
- kwargs['changed'] = False
- raise AnsibleExitJson(kwargs)
-
-
-class AnsibleFailJson(Exception):
- pass
-
-
-def fail_json(*args, **kwargs):
- kwargs['failed'] = True
- raise AnsibleFailJson(kwargs)
-
-
@fixture(autouse=True)
def module():
with patch.multiple(
@@ -120,16 +89,16 @@ def get_instance(instance):
def test_get_jenkins_instance_with_user_and_token(instance):
instance.node_exists.return_value = False
- set_module_args({
+ with set_module_args({
"name": "my-node",
"state": "absent",
"url": "https://localhost:8080",
"user": "admin",
"token": "password",
- })
+ }):
- with pytest.raises(AnsibleExitJson):
- jenkins_node.main()
+ with pytest.raises(AnsibleExitJson):
+ jenkins_node.main()
assert instance.call_args == call("https://localhost:8080", "admin", "password")
@@ -137,15 +106,15 @@ def test_get_jenkins_instance_with_user_and_token(instance):
def test_get_jenkins_instance_with_user(instance):
instance.node_exists.return_value = False
- set_module_args({
+ with set_module_args({
"name": "my-node",
"state": "absent",
"url": "https://localhost:8080",
"user": "admin",
- })
+ }):
- with pytest.raises(AnsibleExitJson):
- jenkins_node.main()
+ with pytest.raises(AnsibleExitJson):
+ jenkins_node.main()
assert instance.call_args == call("https://localhost:8080", "admin")
@@ -153,14 +122,14 @@ def test_get_jenkins_instance_with_user(instance):
def test_get_jenkins_instance_with_no_credential(instance):
instance.node_exists.return_value = False
- set_module_args({
+ with set_module_args({
"name": "my-node",
"state": "absent",
"url": "https://localhost:8080",
- })
+ }):
- with pytest.raises(AnsibleExitJson):
- jenkins_node.main()
+ with pytest.raises(AnsibleExitJson):
+ jenkins_node.main()
assert instance.call_args == call("https://localhost:8080")
@@ -173,18 +142,18 @@ def test_state_present_when_absent(get_instance, instance, state):
instance.node_exists.return_value = False
instance.get_node_config.return_value = ""
- set_module_args({
+ with set_module_args({
"name": "my-node",
"state": state,
- })
+ }):
- with raises(AnsibleExitJson) as result:
- jenkins_node.main()
+ with raises(AnsibleExitJson) as result:
+ jenkins_node.main()
assert instance.create_node.call_args == call("my-node", launcher=jenkins.LAUNCHER_SSH)
- assert result.value["created"] is True
- assert result.value["changed"] is True
+ assert result.value.args[0]["created"] is True
+ assert result.value.args[0]["changed"] is True
@mark.parametrize(["state"], [param(state) for state in PRESENT_STATES])
@@ -192,19 +161,19 @@ def test_state_present_when_absent_check_mode(get_instance, instance, state):
instance.node_exists.return_value = False
instance.get_node_config.return_value = ""
- set_module_args({
+ with set_module_args({
"name": "my-node",
"state": state,
"_ansible_check_mode": True,
- })
+ }):
- with raises(AnsibleExitJson) as result:
- jenkins_node.main()
+ with raises(AnsibleExitJson) as result:
+ jenkins_node.main()
assert not instance.create_node.called
- assert result.value["created"] is True
- assert result.value["changed"] is True
+ assert result.value.args[0]["created"] is True
+ assert result.value.args[0]["changed"] is True
@mark.parametrize(["state"], [param(state) for state in PRESENT_STATES])
@@ -215,18 +184,18 @@ def test_state_present_when_absent_redirect_auth_error_handled(
instance.get_node_config.return_value = ""
instance.create_node.side_effect = jenkins.JenkinsException
- set_module_args({
+ with set_module_args({
"name": "my-node",
"state": state,
- })
+ }):
- with raises(AnsibleExitJson) as result:
- jenkins_node.main()
+ with raises(AnsibleExitJson) as result:
+ jenkins_node.main()
assert instance.create_node.call_args == call("my-node", launcher=jenkins.LAUNCHER_SSH)
- assert result.value["created"] is True
- assert result.value["changed"] is True
+ assert result.value.args[0]["created"] is True
+ assert result.value.args[0]["changed"] is True
@mark.parametrize(["state"], [param(state) for state in PRESENT_STATES])
@@ -235,72 +204,72 @@ def test_state_present_when_absent_other_error_raised(get_instance, instance, st
instance.get_node_config.return_value = ""
instance.create_node.side_effect = jenkins.JenkinsException
- set_module_args({
+ with set_module_args({
"name": "my-node",
"state": state,
- })
+ }):
- with raises(AnsibleFailJson) as result:
- jenkins_node.main()
+ with raises(AnsibleFailJson) as result:
+ jenkins_node.main()
assert instance.create_node.call_args == call("my-node", launcher=jenkins.LAUNCHER_SSH)
- assert "Create node failed" in str(result.value)
+ assert "Create node failed" in str(result.value.args[0])
def test_state_present_when_present(get_instance, instance):
instance.node_exists.return_value = True
instance.get_node_config.return_value = ""
- set_module_args({
+ with set_module_args({
"name": "my-node",
"state": "present",
- })
+ }):
- with raises(AnsibleExitJson) as result:
- jenkins_node.main()
+ with raises(AnsibleExitJson) as result:
+ jenkins_node.main()
assert not instance.create_node.called
- assert result.value["created"] is False
- assert result.value["changed"] is False
+ assert result.value.args[0]["created"] is False
+ assert result.value.args[0]["changed"] is False
def test_state_absent_when_present(get_instance, instance):
instance.node_exists.return_value = True
instance.get_node_config.return_value = ""
- set_module_args({
+ with set_module_args({
"name": "my-node",
"state": "absent",
- })
+ }):
- with raises(AnsibleExitJson) as result:
- jenkins_node.main()
+ with raises(AnsibleExitJson) as result:
+ jenkins_node.main()
assert instance.delete_node.call_args == call("my-node")
- assert result.value["deleted"] is True
- assert result.value["changed"] is True
+ assert result.value.args[0]["deleted"] is True
+ assert result.value.args[0]["changed"] is True
def test_state_absent_when_present_check_mode(get_instance, instance):
instance.node_exists.return_value = True
instance.get_node_config.return_value = ""
- set_module_args({
+ with set_module_args({
"name": "my-node",
"state": "absent",
"_ansible_check_mode": True,
- })
+ }):
- with raises(AnsibleExitJson) as result:
- jenkins_node.main()
+ with raises(AnsibleExitJson) as result:
+ jenkins_node.main()
assert not instance.delete_node.called
- assert result.value["deleted"] is True
- assert result.value["changed"] is True
+ assert result.value.args[0]["deleted"] is True
+ assert result.value.args[0]["changed"] is True
def test_state_absent_when_present_redirect_auth_error_handled(get_instance, instance):
@@ -308,18 +277,18 @@ def test_state_absent_when_present_redirect_auth_error_handled(get_instance, ins
instance.get_node_config.return_value = ""
instance.delete_node.side_effect = jenkins.JenkinsException
- set_module_args({
+ with set_module_args({
"name": "my-node",
"state": "absent",
- })
+ }):
- with raises(AnsibleExitJson) as result:
- jenkins_node.main()
+ with raises(AnsibleExitJson) as result:
+ jenkins_node.main()
assert instance.delete_node.call_args == call("my-node")
- assert result.value["deleted"] is True
- assert result.value["changed"] is True
+ assert result.value.args[0]["deleted"] is True
+ assert result.value.args[0]["changed"] is True
def test_state_absent_when_present_other_error_raised(get_instance, instance):
@@ -327,35 +296,35 @@ def test_state_absent_when_present_other_error_raised(get_instance, instance):
instance.get_node_config.return_value = ""
instance.delete_node.side_effect = jenkins.JenkinsException
- set_module_args({
+ with set_module_args({
"name": "my-node",
"state": "absent",
- })
+ }):
- with raises(AnsibleFailJson) as result:
- jenkins_node.main()
+ with raises(AnsibleFailJson) as result:
+ jenkins_node.main()
assert instance.delete_node.call_args == call("my-node")
- assert "Delete node failed" in str(result.value)
+ assert "Delete node failed" in str(result.value.args[0])
def test_state_absent_when_absent(get_instance, instance):
instance.node_exists.return_value = False
instance.get_node_config.return_value = ""
- set_module_args({
+ with set_module_args({
"name": "my-node",
"state": "absent",
- })
+ }):
- with raises(AnsibleExitJson) as result:
- jenkins_node.main()
+ with raises(AnsibleExitJson) as result:
+ jenkins_node.main()
assert not instance.delete_node.called
- assert result.value["deleted"] is False
- assert result.value["changed"] is False
+ assert result.value.args[0]["deleted"] is False
+ assert result.value.args[0]["changed"] is False
def test_state_enabled_when_offline(get_instance, instance):
@@ -363,18 +332,18 @@ def test_state_enabled_when_offline(get_instance, instance):
instance.get_node_config.return_value = ""
instance.get_node_info.return_value = {"offline": True}
- set_module_args({
+ with set_module_args({
"name": "my-node",
"state": "enabled",
- })
+ }):
- with raises(AnsibleExitJson) as result:
- jenkins_node.main()
+ with raises(AnsibleExitJson) as result:
+ jenkins_node.main()
assert instance.enable_node.call_args == call("my-node")
- assert result.value["enabled"] is True
- assert result.value["changed"] is True
+ assert result.value.args[0]["enabled"] is True
+ assert result.value.args[0]["changed"] is True
def test_state_enabled_when_offline_check_mode(get_instance, instance):
@@ -382,19 +351,19 @@ def test_state_enabled_when_offline_check_mode(get_instance, instance):
instance.get_node_config.return_value = ""
instance.get_node_info.return_value = {"offline": True}
- set_module_args({
+ with set_module_args({
"name": "my-node",
"state": "enabled",
"_ansible_check_mode": True,
- })
+ }):
- with raises(AnsibleExitJson) as result:
- jenkins_node.main()
+ with raises(AnsibleExitJson) as result:
+ jenkins_node.main()
assert not instance.enable_node.called
- assert result.value["enabled"] is True
- assert result.value["changed"] is True
+ assert result.value.args[0]["enabled"] is True
+ assert result.value.args[0]["changed"] is True
def test_state_enabled_when_offline_redirect_auth_error_handled(get_instance, instance):
@@ -403,18 +372,18 @@ def test_state_enabled_when_offline_redirect_auth_error_handled(get_instance, in
instance.get_node_info.side_effect = [{"offline": True}, {"offline": False}]
instance.enable_node.side_effect = jenkins.JenkinsException
- set_module_args({
+ with set_module_args({
"name": "my-node",
"state": "enabled",
- })
+ }):
- with raises(AnsibleExitJson) as result:
- jenkins_node.main()
+ with raises(AnsibleExitJson) as result:
+ jenkins_node.main()
assert instance.enable_node.call_args == call("my-node")
- assert result.value["enabled"] is True
- assert result.value["changed"] is True
+ assert result.value.args[0]["enabled"] is True
+ assert result.value.args[0]["changed"] is True
def test_state_enabled_when_offline_other_error_raised(get_instance, instance):
@@ -423,17 +392,17 @@ def test_state_enabled_when_offline_other_error_raised(get_instance, instance):
instance.get_node_info.side_effect = [{"offline": True}, {"offline": True}]
instance.enable_node.side_effect = jenkins.JenkinsException
- set_module_args({
+ with set_module_args({
"name": "my-node",
"state": "enabled",
- })
+ }):
- with raises(AnsibleFailJson) as result:
- jenkins_node.main()
+ with raises(AnsibleFailJson) as result:
+ jenkins_node.main()
assert instance.enable_node.call_args == call("my-node")
- assert "Enable node failed" in str(result.value)
+ assert "Enable node failed" in str(result.value.args[0])
def test_state_enabled_when_not_offline(get_instance, instance):
@@ -441,18 +410,18 @@ def test_state_enabled_when_not_offline(get_instance, instance):
instance.get_node_config.return_value = ""
instance.get_node_info.return_value = {"offline": False}
- set_module_args({
+ with set_module_args({
"name": "my-node",
"state": "enabled",
- })
+ }):
- with raises(AnsibleExitJson) as result:
- jenkins_node.main()
+ with raises(AnsibleExitJson) as result:
+ jenkins_node.main()
assert not instance.enable_node.called
- assert result.value["enabled"] is False
- assert result.value["changed"] is False
+ assert result.value.args[0]["enabled"] is False
+ assert result.value.args[0]["changed"] is False
def test_state_disabled_when_not_offline(get_instance, instance):
@@ -463,18 +432,18 @@ def test_state_disabled_when_not_offline(get_instance, instance):
"offlineCauseReason": "",
}
- set_module_args({
+ with set_module_args({
"name": "my-node",
"state": "disabled",
- })
+ }):
- with raises(AnsibleExitJson) as result:
- jenkins_node.main()
+ with raises(AnsibleExitJson) as result:
+ jenkins_node.main()
assert instance.disable_node.call_args == call("my-node", "")
- assert result.value["disabled"] is True
- assert result.value["changed"] is True
+ assert result.value.args[0]["disabled"] is True
+ assert result.value.args[0]["changed"] is True
def test_state_disabled_when_not_offline_redirect_auth_error_handled(
@@ -494,18 +463,18 @@ def test_state_disabled_when_not_offline_redirect_auth_error_handled(
]
instance.disable_node.side_effect = jenkins.JenkinsException
- set_module_args({
+ with set_module_args({
"name": "my-node",
"state": "disabled",
- })
+ }):
- with raises(AnsibleExitJson) as result:
- jenkins_node.main()
+ with raises(AnsibleExitJson) as result:
+ jenkins_node.main()
assert instance.disable_node.call_args == call("my-node", "")
- assert result.value["disabled"] is True
- assert result.value["changed"] is True
+ assert result.value.args[0]["disabled"] is True
+ assert result.value.args[0]["changed"] is True
def test_state_disabled_when_not_offline_other_error_raised(get_instance, instance):
@@ -523,17 +492,17 @@ def test_state_disabled_when_not_offline_other_error_raised(get_instance, instan
]
instance.disable_node.side_effect = jenkins.JenkinsException
- set_module_args({
+ with set_module_args({
"name": "my-node",
"state": "disabled",
- })
+ }):
- with raises(AnsibleFailJson) as result:
- jenkins_node.main()
+ with raises(AnsibleFailJson) as result:
+ jenkins_node.main()
assert instance.disable_node.call_args == call("my-node", "")
- assert "Disable node failed" in str(result.value)
+ assert "Disable node failed" in str(result.value.args[0])
def test_state_disabled_when_not_offline_check_mode(get_instance, instance):
@@ -544,19 +513,19 @@ def test_state_disabled_when_not_offline_check_mode(get_instance, instance):
"offlineCauseReason": "",
}
- set_module_args({
+ with set_module_args({
"name": "my-node",
"state": "disabled",
"_ansible_check_mode": True,
- })
+ }):
- with raises(AnsibleExitJson) as result:
- jenkins_node.main()
+ with raises(AnsibleExitJson) as result:
+ jenkins_node.main()
assert not instance.disable_node.called
- assert result.value["disabled"] is True
- assert result.value["changed"] is True
+ assert result.value.args[0]["disabled"] is True
+ assert result.value.args[0]["changed"] is True
def test_state_disabled_when_offline(get_instance, instance):
@@ -567,32 +536,32 @@ def test_state_disabled_when_offline(get_instance, instance):
"offlineCauseReason": "",
}
- set_module_args({
+ with set_module_args({
"name": "my-node",
"state": "disabled",
- })
+ }):
- with raises(AnsibleExitJson) as result:
- jenkins_node.main()
+ with raises(AnsibleExitJson) as result:
+ jenkins_node.main()
assert not instance.disable_node.called
- assert result.value["disabled"] is False
- assert result.value["changed"] is False
+ assert result.value.args[0]["disabled"] is False
+ assert result.value.args[0]["changed"] is False
def test_configure_num_executors_when_not_configured(get_instance, instance):
instance.node_exists.return_value = True
instance.get_node_config.return_value = ""
- set_module_args({
+ with set_module_args({
"name": "my-node",
"state": "present",
"num_executors": 3,
- })
+ }):
- with raises(AnsibleExitJson) as result:
- jenkins_node.main()
+ with raises(AnsibleExitJson) as result:
+ jenkins_node.main()
assert instance.reconfig_node.call_args[0][0] == "my-node"
assert_xml_equal(instance.reconfig_node.call_args[0][1], """
@@ -601,8 +570,8 @@ def test_configure_num_executors_when_not_configured(get_instance, instance):
""")
- assert result.value["configured"] is True
- assert result.value["changed"] is True
+ assert result.value.args[0]["configured"] is True
+ assert result.value.args[0]["changed"] is True
def test_configure_num_executors_when_not_equal(get_instance, instance):
@@ -613,14 +582,14 @@ def test_configure_num_executors_when_not_equal(get_instance, instance):
"""
- set_module_args({
+ with set_module_args({
"name": "my-node",
"state": "present",
"num_executors": 2,
- })
+ }):
- with raises(AnsibleExitJson) as result:
- jenkins_node.main()
+ with raises(AnsibleExitJson) as result:
+ jenkins_node.main()
assert_xml_equal(instance.reconfig_node.call_args[0][1], """
@@ -628,8 +597,8 @@ def test_configure_num_executors_when_not_equal(get_instance, instance):
""")
- assert result.value["configured"] is True
- assert result.value["changed"] is True
+ assert result.value.args[0]["configured"] is True
+ assert result.value.args[0]["changed"] is True
def test_configure_num_executors_when_equal(get_instance, instance):
@@ -640,26 +609,26 @@ def test_configure_num_executors_when_equal(get_instance, instance):
"""
- set_module_args({
+ with set_module_args({
"name": "my-node",
"state": "present",
"num_executors": 2,
- })
+ }):
- with raises(AnsibleExitJson) as result:
- jenkins_node.main()
+ with raises(AnsibleExitJson) as result:
+ jenkins_node.main()
assert not instance.reconfig_node.called
- assert result.value["configured"] is False
- assert result.value["changed"] is False
+ assert result.value.args[0]["configured"] is False
+ assert result.value.args[0]["changed"] is False
def test_configure_labels_when_not_configured(get_instance, instance):
instance.node_exists.return_value = True
instance.get_node_config.return_value = ""
- set_module_args({
+ with set_module_args({
"name": "my-node",
"state": "present",
"labels": [
@@ -667,10 +636,10 @@ def test_configure_labels_when_not_configured(get_instance, instance):
"b",
"c",
],
- })
+ }):
- with raises(AnsibleExitJson) as result:
- jenkins_node.main()
+ with raises(AnsibleExitJson) as result:
+ jenkins_node.main()
assert instance.reconfig_node.call_args[0][0] == "my-node"
assert_xml_equal(instance.reconfig_node.call_args[0][1], """
@@ -679,8 +648,8 @@ def test_configure_labels_when_not_configured(get_instance, instance):
""")
- assert result.value["configured"] is True
- assert result.value["changed"] is True
+ assert result.value.args[0]["configured"] is True
+ assert result.value.args[0]["changed"] is True
def test_configure_labels_when_not_equal(get_instance, instance):
@@ -691,7 +660,7 @@ def test_configure_labels_when_not_equal(get_instance, instance):
"""
- set_module_args({
+ with set_module_args({
"name": "my-node",
"state": "present",
"labels": [
@@ -699,10 +668,10 @@ def test_configure_labels_when_not_equal(get_instance, instance):
"z",
"c",
],
- })
+ }):
- with raises(AnsibleExitJson) as result:
- jenkins_node.main()
+ with raises(AnsibleExitJson) as result:
+ jenkins_node.main()
assert instance.reconfig_node.call_args[0][0] == "my-node"
assert_xml_equal(instance.reconfig_node.call_args[0][1], """
@@ -711,8 +680,8 @@ def test_configure_labels_when_not_equal(get_instance, instance):
""")
- assert result.value["configured"] is True
- assert result.value["changed"] is True
+ assert result.value.args[0]["configured"] is True
+ assert result.value.args[0]["changed"] is True
def test_configure_labels_when_equal(get_instance, instance):
@@ -723,7 +692,7 @@ def test_configure_labels_when_equal(get_instance, instance):
"""
- set_module_args({
+ with set_module_args({
"name": "my-node",
"state": "present",
"labels": [
@@ -731,45 +700,45 @@ def test_configure_labels_when_equal(get_instance, instance):
"b",
"c",
],
- })
+ }):
- with raises(AnsibleExitJson) as result:
- jenkins_node.main()
+ with raises(AnsibleExitJson) as result:
+ jenkins_node.main()
assert not instance.reconfig_node.called
- assert result.value["configured"] is False
- assert result.value["changed"] is False
+ assert result.value.args[0]["configured"] is False
+ assert result.value.args[0]["changed"] is False
def test_configure_labels_fail_when_contains_space(get_instance, instance):
instance.node_exists.return_value = True
instance.get_node_config.return_value = ""
- set_module_args({
+ with set_module_args({
"name": "my-node",
"state": "present",
"labels": [
"a error",
],
- })
+ }):
- with raises(AnsibleFailJson):
- jenkins_node.main()
+ with raises(AnsibleFailJson):
+ jenkins_node.main()
assert not instance.reconfig_node.called
@mark.parametrize(["state"], [param(state) for state in ["enabled", "present", "absent"]])
def test_raises_error_if_offline_message_when_state_not_disabled(get_instance, instance, state):
- set_module_args({
+ with set_module_args({
"name": "my-node",
"state": state,
"offline_message": "This is a message...",
- })
+ }):
- with raises(AnsibleFailJson):
- jenkins_node.main()
+ with raises(AnsibleFailJson):
+ jenkins_node.main()
assert not instance.disable_node.called
@@ -782,18 +751,18 @@ def test_set_offline_message_when_equal(get_instance, instance):
"offlineCauseReason": "This is an old message...",
}
- set_module_args({
+ with set_module_args({
"name": "my-node",
"state": "disabled",
"offline_message": "This is an old message...",
- })
+ }):
- with raises(AnsibleExitJson) as result:
- jenkins_node.main()
+ with raises(AnsibleExitJson) as result:
+ jenkins_node.main()
assert not instance.disable_node.called
- assert result.value["changed"] is False
+ assert result.value.args[0]["changed"] is False
def test_set_offline_message_when_not_equal_not_offline(get_instance, instance):
@@ -804,18 +773,18 @@ def test_set_offline_message_when_not_equal_not_offline(get_instance, instance):
"offlineCauseReason": "This is an old message...",
}
- set_module_args({
+ with set_module_args({
"name": "my-node",
"state": "disabled",
"offline_message": "This is a new message...",
- })
+ }):
- with raises(AnsibleExitJson) as result:
- jenkins_node.main()
+ with raises(AnsibleExitJson) as result:
+ jenkins_node.main()
assert instance.disable_node.call_args == call("my-node", "This is a new message...")
- assert result.value["changed"] is True
+ assert result.value.args[0]["changed"] is True
# Not calling disable_node when already offline seems like a sensible thing to do.
@@ -829,15 +798,15 @@ def test_set_offline_message_when_not_equal_offline(get_instance, instance):
"offlineCauseReason": "This is an old message...",
}
- set_module_args({
+ with set_module_args({
"name": "my-node",
"state": "disabled",
"offline_message": "This is a new message...",
- })
+ }):
- with raises(AnsibleExitJson) as result:
- jenkins_node.main()
+ with raises(AnsibleExitJson) as result:
+ jenkins_node.main()
assert not instance.disable_node.called
- assert result.value["changed"] is False
+ assert result.value.args[0]["changed"] is False
diff --git a/tests/unit/plugins/modules/test_keycloak_authentication.py b/tests/unit/plugins/modules/test_keycloak_authentication.py
index aaa1fa9b1b..1b7d722f27 100644
--- a/tests/unit/plugins/modules/test_keycloak_authentication.py
+++ b/tests/unit/plugins/modules/test_keycloak_authentication.py
@@ -163,17 +163,16 @@ class TestKeycloakAuthentication(ModuleTestCase):
]
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_authentication_flow_by_alias=return_value_auth_flow_before, copy_auth_flow=return_value_copied,
- get_executions_representation=return_value_executions_after) \
- as (mock_get_authentication_flow_by_alias, mock_copy_auth_flow, mock_create_empty_auth_flow,
- mock_get_executions_representation, mock_delete_authentication_flow_by_id):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_authentication_flow_by_alias=return_value_auth_flow_before, copy_auth_flow=return_value_copied,
+ get_executions_representation=return_value_executions_after) \
+ as (mock_get_authentication_flow_by_alias, mock_copy_auth_flow, mock_create_empty_auth_flow,
+ mock_get_executions_representation, mock_delete_authentication_flow_by_id):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
# Verify number of call on each mock
self.assertEqual(len(mock_get_authentication_flow_by_alias.mock_calls), 1)
@@ -256,17 +255,16 @@ class TestKeycloakAuthentication(ModuleTestCase):
]
changed = False
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_authentication_flow_by_alias=return_value_auth_flow_before,
- get_executions_representation=return_value_executions_after) \
- as (mock_get_authentication_flow_by_alias, mock_copy_auth_flow, mock_create_empty_auth_flow,
- mock_get_executions_representation, mock_delete_authentication_flow_by_id):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_authentication_flow_by_alias=return_value_auth_flow_before,
+ get_executions_representation=return_value_executions_after) \
+ as (mock_get_authentication_flow_by_alias, mock_copy_auth_flow, mock_create_empty_auth_flow,
+ mock_get_executions_representation, mock_delete_authentication_flow_by_id):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
# Verify number of call on each mock
self.assertEqual(len(mock_get_authentication_flow_by_alias.mock_calls), 1)
@@ -328,17 +326,16 @@ class TestKeycloakAuthentication(ModuleTestCase):
]
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_authentication_flow_by_alias=return_value_auth_flow_before,
- get_executions_representation=return_value_executions_after, create_empty_auth_flow=return_value_created_empty_flow) \
- as (mock_get_authentication_flow_by_alias, mock_copy_auth_flow, mock_create_empty_auth_flow,
- mock_get_executions_representation, mock_delete_authentication_flow_by_id):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_authentication_flow_by_alias=return_value_auth_flow_before,
+ get_executions_representation=return_value_executions_after, create_empty_auth_flow=return_value_created_empty_flow) \
+ as (mock_get_authentication_flow_by_alias, mock_copy_auth_flow, mock_create_empty_auth_flow,
+ mock_get_executions_representation, mock_delete_authentication_flow_by_id):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
# Verify number of call on each mock
self.assertEqual(len(mock_get_authentication_flow_by_alias.mock_calls), 1)
@@ -419,17 +416,16 @@ class TestKeycloakAuthentication(ModuleTestCase):
]
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_authentication_flow_by_alias=return_value_auth_flow_before,
- get_executions_representation=return_value_executions_after) \
- as (mock_get_authentication_flow_by_alias, mock_copy_auth_flow, mock_create_empty_auth_flow,
- mock_get_executions_representation, mock_delete_authentication_flow_by_id):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_authentication_flow_by_alias=return_value_auth_flow_before,
+ get_executions_representation=return_value_executions_after) \
+ as (mock_get_authentication_flow_by_alias, mock_copy_auth_flow, mock_create_empty_auth_flow,
+ mock_get_executions_representation, mock_delete_authentication_flow_by_id):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
# Verify number of call on each mock
self.assertEqual(len(mock_get_authentication_flow_by_alias.mock_calls), 1)
@@ -472,16 +468,15 @@ class TestKeycloakAuthentication(ModuleTestCase):
}]
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_authentication_flow_by_alias=return_value_auth_flow_before) \
- as (mock_get_authentication_flow_by_alias, mock_copy_auth_flow, mock_create_empty_auth_flow,
- mock_get_executions_representation, mock_delete_authentication_flow_by_id):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_authentication_flow_by_alias=return_value_auth_flow_before) \
+ as (mock_get_authentication_flow_by_alias, mock_copy_auth_flow, mock_create_empty_auth_flow,
+ mock_get_executions_representation, mock_delete_authentication_flow_by_id):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
# Verify number of call on each mock
self.assertEqual(len(mock_get_authentication_flow_by_alias.mock_calls), 1)
@@ -508,16 +503,15 @@ class TestKeycloakAuthentication(ModuleTestCase):
return_value_auth_flow_before = [{}]
changed = False
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_authentication_flow_by_alias=return_value_auth_flow_before) \
- as (mock_get_authentication_flow_by_alias, mock_copy_auth_flow, mock_create_empty_auth_flow,
- mock_get_executions_representation, mock_delete_authentication_flow_by_id):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_authentication_flow_by_alias=return_value_auth_flow_before) \
+ as (mock_get_authentication_flow_by_alias, mock_copy_auth_flow, mock_create_empty_auth_flow,
+ mock_get_executions_representation, mock_delete_authentication_flow_by_id):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
# Verify number of call on each mock
self.assertEqual(len(mock_get_authentication_flow_by_alias.mock_calls), 1)
@@ -596,17 +590,16 @@ class TestKeycloakAuthentication(ModuleTestCase):
]
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_authentication_flow_by_alias=return_value_auth_flow_before,
- get_executions_representation=return_value_executions_after, create_empty_auth_flow=return_value_created_empty_flow) \
- as (mock_get_authentication_flow_by_alias, mock_copy_auth_flow, mock_create_empty_auth_flow,
- mock_get_executions_representation, mock_delete_authentication_flow_by_id):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_authentication_flow_by_alias=return_value_auth_flow_before,
+ get_executions_representation=return_value_executions_after, create_empty_auth_flow=return_value_created_empty_flow) \
+ as (mock_get_authentication_flow_by_alias, mock_copy_auth_flow, mock_create_empty_auth_flow,
+ mock_get_executions_representation, mock_delete_authentication_flow_by_id):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
# Verify number of call on each mock
self.assertEqual(len(mock_get_authentication_flow_by_alias.mock_calls), 1)
diff --git a/tests/unit/plugins/modules/test_keycloak_authentication_required_actions.py b/tests/unit/plugins/modules/test_keycloak_authentication_required_actions.py
index 2adc3a896b..5713737a66 100644
--- a/tests/unit/plugins/modules/test_keycloak_authentication_required_actions.py
+++ b/tests/unit/plugins/modules/test_keycloak_authentication_required_actions.py
@@ -235,20 +235,19 @@ class TestKeycloakAuthentication(ModuleTestCase):
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(
- get_required_actions=return_value_required_actions,
- ) as (
- mock_get_required_actions,
- mock_register_required_action,
- mock_update_required_action,
- mock_delete_required_action,
- ):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(
+ get_required_actions=return_value_required_actions,
+ ) as (
+ mock_get_required_actions,
+ mock_register_required_action,
+ mock_update_required_action,
+ mock_delete_required_action,
+ ):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
# Verify number of call on each mock
self.assertEqual(len(mock_get_required_actions.mock_calls), 1)
@@ -386,20 +385,19 @@ class TestKeycloakAuthentication(ModuleTestCase):
changed = False
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(
- get_required_actions=return_value_required_actions,
- ) as (
- mock_get_required_actions,
- mock_register_required_action,
- mock_update_required_action,
- mock_delete_required_action,
- ):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(
+ get_required_actions=return_value_required_actions,
+ ) as (
+ mock_get_required_actions,
+ mock_register_required_action,
+ mock_update_required_action,
+ mock_delete_required_action,
+ ):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
# Verify number of call on each mock
self.assertEqual(len(mock_get_required_actions.mock_calls), 1)
@@ -537,20 +535,19 @@ class TestKeycloakAuthentication(ModuleTestCase):
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(
- get_required_actions=return_value_required_actions,
- ) as (
- mock_get_required_actions,
- mock_register_required_action,
- mock_update_required_action,
- mock_delete_required_action,
- ):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(
+ get_required_actions=return_value_required_actions,
+ ) as (
+ mock_get_required_actions,
+ mock_register_required_action,
+ mock_update_required_action,
+ mock_delete_required_action,
+ ):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
# Verify number of call on each mock
self.assertEqual(len(mock_get_required_actions.mock_calls), 1)
@@ -676,20 +673,19 @@ class TestKeycloakAuthentication(ModuleTestCase):
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(
- get_required_actions=return_value_required_actions,
- ) as (
- mock_get_required_actions,
- mock_register_required_action,
- mock_update_required_action,
- mock_delete_required_action,
- ):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(
+ get_required_actions=return_value_required_actions,
+ ) as (
+ mock_get_required_actions,
+ mock_register_required_action,
+ mock_update_required_action,
+ mock_delete_required_action,
+ ):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
# Verify number of call on each mock
self.assertEqual(len(mock_get_required_actions.mock_calls), 1)
@@ -806,20 +802,19 @@ class TestKeycloakAuthentication(ModuleTestCase):
changed = False
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(
- get_required_actions=return_value_required_actions,
- ) as (
- mock_get_required_actions,
- mock_register_required_action,
- mock_update_required_action,
- mock_delete_required_action,
- ):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(
+ get_required_actions=return_value_required_actions,
+ ) as (
+ mock_get_required_actions,
+ mock_register_required_action,
+ mock_update_required_action,
+ mock_delete_required_action,
+ ):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
# Verify number of call on each mock
self.assertEqual(len(mock_get_required_actions.mock_calls), 1)
diff --git a/tests/unit/plugins/modules/test_keycloak_client.py b/tests/unit/plugins/modules/test_keycloak_client.py
index b44013af13..e2fd3b4c73 100644
--- a/tests/unit/plugins/modules/test_keycloak_client.py
+++ b/tests/unit/plugins/modules/test_keycloak_client.py
@@ -126,15 +126,14 @@ class TestKeycloakRealm(ModuleTestCase):
]
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_client_by_clientid=return_value_get_client_by_clientid) \
- as (mock_get_client_by_clientid, mock_get_client_by_id, mock_create_client, mock_update_client, mock_delete_client):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_client_by_clientid=return_value_get_client_by_clientid) \
+ as (mock_get_client_by_clientid, mock_get_client_by_id, mock_create_client, mock_update_client, mock_delete_client):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(mock_get_client_by_clientid.call_count, 2)
self.assertEqual(mock_get_client_by_id.call_count, 0)
diff --git a/tests/unit/plugins/modules/test_keycloak_client_rolemapping.py b/tests/unit/plugins/modules/test_keycloak_client_rolemapping.py
index 359e6304ef..3cf6983d33 100644
--- a/tests/unit/plugins/modules/test_keycloak_client_rolemapping.py
+++ b/tests/unit/plugins/modules/test_keycloak_client_rolemapping.py
@@ -188,20 +188,19 @@ class TestKeycloakRealm(ModuleTestCase):
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_group_by_name=return_value_get_group_by_name, get_client_id=return_value_get_client_id,
- get_client_role_id_by_name=return_value_get_client_role_id_by_name,
- get_client_group_available_rolemappings=return_value_get_client_group_available_rolemappings,
- get_client_group_composite_rolemappings=return_value_get_client_group_composite_rolemappings) \
- as (mock_get_group_by_name, mock_get_client_id, mock_get_client_role_id_by_name, mock_add_group_rolemapping,
- mock_get_client_group_rolemapping_by_id, mock_get_client_group_available_rolemappings, mock_get_client_group_composite_rolemappings,
- mock_delete_group_rolemapping):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_group_by_name=return_value_get_group_by_name, get_client_id=return_value_get_client_id,
+ get_client_role_id_by_name=return_value_get_client_role_id_by_name,
+ get_client_group_available_rolemappings=return_value_get_client_group_available_rolemappings,
+ get_client_group_composite_rolemappings=return_value_get_client_group_composite_rolemappings) \
+ as (mock_get_group_by_name, mock_get_client_id, mock_get_client_role_id_by_name, mock_add_group_rolemapping,
+ mock_get_client_group_rolemapping_by_id, mock_get_client_group_available_rolemappings, mock_get_client_group_composite_rolemappings,
+ mock_delete_group_rolemapping):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(mock_get_group_by_name.call_count, 1)
self.assertEqual(mock_get_client_id.call_count, 1)
@@ -272,20 +271,19 @@ class TestKeycloakRealm(ModuleTestCase):
changed = False
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_group_by_name=return_value_get_group_by_name, get_client_id=return_value_get_client_id,
- get_client_role_id_by_name=return_value_get_client_role_id_by_name,
- get_client_group_available_rolemappings=return_value_get_client_group_available_rolemappings,
- get_client_group_composite_rolemappings=return_value_get_client_group_composite_rolemappings) \
- as (mock_get_group_by_name, mock_get_client_id, mock_get_client_role_id_by_name, mock_add_group_rolemapping,
- mock_get_client_group_rolemapping_by_id, mock_get_client_group_available_rolemappings, mock_get_client_group_composite_rolemappings,
- mock_delete_group_rolemapping):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_group_by_name=return_value_get_group_by_name, get_client_id=return_value_get_client_id,
+ get_client_role_id_by_name=return_value_get_client_role_id_by_name,
+ get_client_group_available_rolemappings=return_value_get_client_group_available_rolemappings,
+ get_client_group_composite_rolemappings=return_value_get_client_group_composite_rolemappings) \
+ as (mock_get_group_by_name, mock_get_client_id, mock_get_client_role_id_by_name, mock_add_group_rolemapping,
+ mock_get_client_group_rolemapping_by_id, mock_get_client_group_available_rolemappings, mock_get_client_group_composite_rolemappings,
+ mock_delete_group_rolemapping):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(mock_get_group_by_name.call_count, 1)
self.assertEqual(mock_get_client_id.call_count, 1)
@@ -374,20 +372,19 @@ class TestKeycloakRealm(ModuleTestCase):
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_group_by_name=return_value_get_group_by_name, get_client_id=return_value_get_client_id,
- get_client_role_id_by_name=return_value_get_client_role_id_by_name,
- get_client_group_available_rolemappings=return_value_get_client_group_available_rolemappings,
- get_client_group_composite_rolemappings=return_value_get_client_group_composite_rolemappings) \
- as (mock_get_group_by_name, mock_get_client_id, mock_get_client_role_id_by_name, mock_add_group_rolemapping,
- mock_get_client_group_rolemapping_by_id, mock_get_client_group_available_rolemappings, mock_get_client_group_composite_rolemappings,
- mock_delete_group_rolemapping):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_group_by_name=return_value_get_group_by_name, get_client_id=return_value_get_client_id,
+ get_client_role_id_by_name=return_value_get_client_role_id_by_name,
+ get_client_group_available_rolemappings=return_value_get_client_group_available_rolemappings,
+ get_client_group_composite_rolemappings=return_value_get_client_group_composite_rolemappings) \
+ as (mock_get_group_by_name, mock_get_client_id, mock_get_client_role_id_by_name, mock_add_group_rolemapping,
+ mock_get_client_group_rolemapping_by_id, mock_get_client_group_available_rolemappings, mock_get_client_group_composite_rolemappings,
+ mock_delete_group_rolemapping):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(mock_get_group_by_name.call_count, 0)
self.assertEqual(mock_get_client_id.call_count, 0)
@@ -461,20 +458,19 @@ class TestKeycloakRealm(ModuleTestCase):
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_group_by_name=return_value_get_group_by_name, get_client_id=return_value_get_client_id,
- get_client_role_id_by_name=return_value_get_client_role_id_by_name,
- get_client_group_available_rolemappings=return_value_get_client_group_available_rolemappings,
- get_client_group_composite_rolemappings=return_value_get_client_group_composite_rolemappings) \
- as (mock_get_group_by_name, mock_get_client_id, mock_get_client_role_id_by_name, mock_add_group_rolemapping,
- mock_get_client_group_rolemapping_by_id, mock_get_client_group_available_rolemappings, mock_get_client_group_composite_rolemappings,
- mock_delete_group_rolemapping):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_group_by_name=return_value_get_group_by_name, get_client_id=return_value_get_client_id,
+ get_client_role_id_by_name=return_value_get_client_role_id_by_name,
+ get_client_group_available_rolemappings=return_value_get_client_group_available_rolemappings,
+ get_client_group_composite_rolemappings=return_value_get_client_group_composite_rolemappings) \
+ as (mock_get_group_by_name, mock_get_client_id, mock_get_client_role_id_by_name, mock_add_group_rolemapping,
+ mock_get_client_group_rolemapping_by_id, mock_get_client_group_available_rolemappings, mock_get_client_group_composite_rolemappings,
+ mock_delete_group_rolemapping):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(mock_get_group_by_name.call_count, 1)
self.assertEqual(mock_get_client_id.call_count, 1)
@@ -547,20 +543,19 @@ class TestKeycloakRealm(ModuleTestCase):
changed = False
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_group_by_name=return_value_get_group_by_name, get_client_id=return_value_get_client_id,
- get_client_role_id_by_name=return_value_get_client_role_id_by_name,
- get_client_group_available_rolemappings=return_value_get_client_group_available_rolemappings,
- get_client_group_composite_rolemappings=return_value_get_client_group_composite_rolemappings) \
- as (mock_get_group_by_name, mock_get_client_id, mock_get_client_role_id_by_name, mock_add_group_rolemapping,
- mock_get_client_group_rolemapping_by_id, mock_get_client_group_available_rolemappings, mock_get_client_group_composite_rolemappings,
- mock_delete_group_rolemapping):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_group_by_name=return_value_get_group_by_name, get_client_id=return_value_get_client_id,
+ get_client_role_id_by_name=return_value_get_client_role_id_by_name,
+ get_client_group_available_rolemappings=return_value_get_client_group_available_rolemappings,
+ get_client_group_composite_rolemappings=return_value_get_client_group_composite_rolemappings) \
+ as (mock_get_group_by_name, mock_get_client_id, mock_get_client_role_id_by_name, mock_add_group_rolemapping,
+ mock_get_client_group_rolemapping_by_id, mock_get_client_group_available_rolemappings, mock_get_client_group_composite_rolemappings,
+ mock_delete_group_rolemapping):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(mock_get_group_by_name.call_count, 1)
self.assertEqual(mock_get_client_id.call_count, 1)
diff --git a/tests/unit/plugins/modules/test_keycloak_clientscope.py b/tests/unit/plugins/modules/test_keycloak_clientscope.py
index ea015b05bf..03eb0e615f 100644
--- a/tests/unit/plugins/modules/test_keycloak_clientscope.py
+++ b/tests/unit/plugins/modules/test_keycloak_clientscope.py
@@ -142,18 +142,17 @@ class TestKeycloakAuthentication(ModuleTestCase):
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_clientscope_by_name=return_value_get_clientscope_by_name) \
- as (mock_get_clientscope_by_name, mock_get_clientscope_by_clientscopeid, mock_create_clientscope,
- mock_update_clientscope, mock_get_clientscope_protocolmapper_by_name,
- mock_update_clientscope_protocolmappers,
- mock_create_clientscope_protocolmapper, mock_delete_clientscope):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_clientscope_by_name=return_value_get_clientscope_by_name) \
+ as (mock_get_clientscope_by_name, mock_get_clientscope_by_clientscopeid, mock_create_clientscope,
+ mock_update_clientscope, mock_get_clientscope_protocolmapper_by_name,
+ mock_update_clientscope_protocolmappers,
+ mock_create_clientscope_protocolmapper, mock_delete_clientscope):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
# Verify number of call on each mock
self.assertEqual(mock_get_clientscope_by_name.call_count, 2)
@@ -188,18 +187,17 @@ class TestKeycloakAuthentication(ModuleTestCase):
changed = False
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_clientscope_by_name=return_value_get_clientscope_by_name) \
- as (mock_get_clientscope_by_name, mock_get_clientscope_by_clientscopeid, mock_create_clientscope,
- mock_update_clientscope, mock_get_clientscope_protocolmapper_by_name,
- mock_update_clientscope_protocolmappers,
- mock_create_clientscope_protocolmapper, mock_delete_clientscope):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_clientscope_by_name=return_value_get_clientscope_by_name) \
+ as (mock_get_clientscope_by_name, mock_get_clientscope_by_clientscopeid, mock_create_clientscope,
+ mock_update_clientscope, mock_get_clientscope_protocolmapper_by_name,
+ mock_update_clientscope_protocolmappers,
+ mock_create_clientscope_protocolmapper, mock_delete_clientscope):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
# Verify number of call on each mock
self.assertEqual(mock_get_clientscope_by_name.call_count, 1)
@@ -234,18 +232,17 @@ class TestKeycloakAuthentication(ModuleTestCase):
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_clientscope_by_name=return_value_get_clientscope_by_name) \
- as (mock_get_clientscope_by_name, mock_get_clientscope_by_clientscopeid, mock_create_clientscope,
- mock_update_clientscope, mock_get_clientscope_protocolmapper_by_name,
- mock_update_clientscope_protocolmappers,
- mock_create_clientscope_protocolmapper, mock_delete_clientscope):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_clientscope_by_name=return_value_get_clientscope_by_name) \
+ as (mock_get_clientscope_by_name, mock_get_clientscope_by_clientscopeid, mock_create_clientscope,
+ mock_update_clientscope, mock_get_clientscope_protocolmapper_by_name,
+ mock_update_clientscope_protocolmappers,
+ mock_create_clientscope_protocolmapper, mock_delete_clientscope):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
# Verify number of call on each mock
self.assertEqual(mock_get_clientscope_by_name.call_count, 1)
@@ -276,18 +273,17 @@ class TestKeycloakAuthentication(ModuleTestCase):
changed = False
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_clientscope_by_name=return_value_get_clientscope_by_name) \
- as (mock_get_clientscope_by_name, mock_get_clientscope_by_clientscopeid, mock_create_clientscope,
- mock_update_clientscope, mock_get_clientscope_protocolmapper_by_name,
- mock_update_clientscope_protocolmappers,
- mock_create_clientscope_protocolmapper, mock_delete_clientscope):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_clientscope_by_name=return_value_get_clientscope_by_name) \
+ as (mock_get_clientscope_by_name, mock_get_clientscope_by_clientscopeid, mock_create_clientscope,
+ mock_update_clientscope, mock_get_clientscope_protocolmapper_by_name,
+ mock_update_clientscope_protocolmappers,
+ mock_create_clientscope_protocolmapper, mock_delete_clientscope):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
# Verify number of call on each mock
self.assertEqual(mock_get_clientscope_by_name.call_count, 1)
@@ -405,18 +401,17 @@ class TestKeycloakAuthentication(ModuleTestCase):
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_clientscope_by_name=return_value_get_clientscope_by_name) \
- as (mock_get_clientscope_by_name, mock_get_clientscope_by_clientscopeid, mock_create_clientscope,
- mock_update_clientscope, mock_get_clientscope_protocolmapper_by_name,
- mock_update_clientscope_protocolmappers,
- mock_create_clientscope_protocolmapper, mock_delete_clientscope):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_clientscope_by_name=return_value_get_clientscope_by_name) \
+ as (mock_get_clientscope_by_name, mock_get_clientscope_by_clientscopeid, mock_create_clientscope,
+ mock_update_clientscope, mock_get_clientscope_protocolmapper_by_name,
+ mock_update_clientscope_protocolmappers,
+ mock_create_clientscope_protocolmapper, mock_delete_clientscope):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
# Verify number of call on each mock
self.assertEqual(mock_get_clientscope_by_name.call_count, 2)
@@ -582,19 +577,18 @@ class TestKeycloakAuthentication(ModuleTestCase):
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_clientscope_by_name=return_value_get_clientscope_by_name,
- get_clientscope_by_clientscopeid=return_value_get_clientscope_by_clientscopeid) \
- as (mock_get_clientscope_by_name, mock_get_clientscope_by_clientscopeid, mock_create_clientscope,
- mock_update_clientscope, mock_get_clientscope_protocolmapper_by_name,
- mock_update_clientscope_protocolmappers,
- mock_create_clientscope_protocolmapper, mock_delete_clientscope):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_clientscope_by_name=return_value_get_clientscope_by_name,
+ get_clientscope_by_clientscopeid=return_value_get_clientscope_by_clientscopeid) \
+ as (mock_get_clientscope_by_name, mock_get_clientscope_by_clientscopeid, mock_create_clientscope,
+ mock_update_clientscope, mock_get_clientscope_protocolmapper_by_name,
+ mock_update_clientscope_protocolmappers,
+ mock_create_clientscope_protocolmapper, mock_delete_clientscope):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
# Verify number of call on each mock
self.assertEqual(mock_get_clientscope_by_name.call_count, 1)
diff --git a/tests/unit/plugins/modules/test_keycloak_component.py b/tests/unit/plugins/modules/test_keycloak_component.py
index e491bf431c..5d0886899f 100644
--- a/tests/unit/plugins/modules/test_keycloak_component.py
+++ b/tests/unit/plugins/modules/test_keycloak_component.py
@@ -126,15 +126,14 @@ class TestKeycloakComponent(ModuleTestCase):
]
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_components=return_value_components_get, create_component=return_value_component_create) \
- as (mock_get_components, mock_create_component, mock_update_component, mock_delete_component):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_components=return_value_components_get, create_component=return_value_component_create) \
+ as (mock_get_components, mock_create_component, mock_update_component, mock_delete_component):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(len(mock_get_components.mock_calls), 1)
self.assertEqual(len(mock_create_component.mock_calls), 1)
@@ -199,16 +198,15 @@ class TestKeycloakComponent(ModuleTestCase):
]
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_components=return_value_components_get,
- update_component=return_value_component_update) \
- as (mock_get_components, mock_create_component, mock_update_component, mock_delete_component):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_components=return_value_components_get,
+ update_component=return_value_component_update) \
+ as (mock_get_components, mock_create_component, mock_update_component, mock_delete_component):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(len(mock_get_components.mock_calls), 1)
self.assertEqual(len(mock_create_component.mock_calls), 0)
@@ -241,15 +239,14 @@ class TestKeycloakComponent(ModuleTestCase):
]
changed = False
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_components=return_value_components_get) \
- as (mock_get_components, mock_create_component, mock_update_component, mock_delete_component):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_components=return_value_components_get) \
+ as (mock_get_components, mock_create_component, mock_update_component, mock_delete_component):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(len(mock_get_components.mock_calls), 1)
self.assertEqual(len(mock_create_component.mock_calls), 0)
@@ -304,15 +301,14 @@ class TestKeycloakComponent(ModuleTestCase):
]
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_components=return_value_components_get, delete_component=return_value_component_delete) \
- as (mock_get_components, mock_create_component, mock_update_component, mock_delete_component):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_components=return_value_components_get, delete_component=return_value_component_delete) \
+ as (mock_get_components, mock_create_component, mock_update_component, mock_delete_component):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(len(mock_get_components.mock_calls), 1)
self.assertEqual(len(mock_create_component.mock_calls), 0)
diff --git a/tests/unit/plugins/modules/test_keycloak_identity_provider.py b/tests/unit/plugins/modules/test_keycloak_identity_provider.py
index a893a130a5..901a41dd4f 100644
--- a/tests/unit/plugins/modules/test_keycloak_identity_provider.py
+++ b/tests/unit/plugins/modules/test_keycloak_identity_provider.py
@@ -238,19 +238,18 @@ class TestKeycloakIdentityProvider(ModuleTestCase):
return_value_mapper_created = [None, None]
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_identity_provider=return_value_idp_get, get_identity_provider_mappers=return_value_mappers_get,
- create_identity_provider=return_value_idp_created, create_identity_provider_mapper=return_value_mapper_created,
- get_realm_by_id=return_value_realm_get) \
- as (mock_get_identity_provider, mock_create_identity_provider, mock_update_identity_provider, mock_delete_identity_provider,
- mock_get_identity_provider_mappers, mock_create_identity_provider_mapper, mock_update_identity_provider_mapper,
- mock_delete_identity_provider_mapper, mock_get_realm_by_id):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_identity_provider=return_value_idp_get, get_identity_provider_mappers=return_value_mappers_get,
+ create_identity_provider=return_value_idp_created, create_identity_provider_mapper=return_value_mapper_created,
+ get_realm_by_id=return_value_realm_get) \
+ as (mock_get_identity_provider, mock_create_identity_provider, mock_update_identity_provider, mock_delete_identity_provider,
+ mock_get_identity_provider_mappers, mock_create_identity_provider_mapper, mock_update_identity_provider_mapper,
+ mock_delete_identity_provider_mapper, mock_get_realm_by_id):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(len(mock_get_identity_provider.mock_calls), 2)
self.assertEqual(len(mock_get_identity_provider_mappers.mock_calls), 1)
@@ -547,19 +546,18 @@ class TestKeycloakIdentityProvider(ModuleTestCase):
return_value_mapper_created = [None]
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_identity_provider=return_value_idp_get, get_identity_provider_mappers=return_value_mappers_get,
- update_identity_provider=return_value_idp_updated, update_identity_provider_mapper=return_value_mapper_updated,
- create_identity_provider_mapper=return_value_mapper_created, get_realm_by_id=return_value_realm_get) \
- as (mock_get_identity_provider, mock_create_identity_provider, mock_update_identity_provider, mock_delete_identity_provider,
- mock_get_identity_provider_mappers, mock_create_identity_provider_mapper, mock_update_identity_provider_mapper,
- mock_delete_identity_provider_mapper, mock_get_realm_by_id):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_identity_provider=return_value_idp_get, get_identity_provider_mappers=return_value_mappers_get,
+ update_identity_provider=return_value_idp_updated, update_identity_provider_mapper=return_value_mapper_updated,
+ create_identity_provider_mapper=return_value_mapper_created, get_realm_by_id=return_value_realm_get) \
+ as (mock_get_identity_provider, mock_create_identity_provider, mock_update_identity_provider, mock_delete_identity_provider,
+ mock_get_identity_provider_mappers, mock_create_identity_provider_mapper, mock_update_identity_provider_mapper,
+ mock_delete_identity_provider_mapper, mock_get_realm_by_id):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(len(mock_get_identity_provider.mock_calls), 2)
self.assertEqual(len(mock_get_identity_provider_mappers.mock_calls), 5)
@@ -697,19 +695,18 @@ class TestKeycloakIdentityProvider(ModuleTestCase):
return_value_mapper_created = [None]
changed = False
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_identity_provider=return_value_idp_get, get_identity_provider_mappers=return_value_mappers_get,
- update_identity_provider=return_value_idp_updated, update_identity_provider_mapper=return_value_mapper_updated,
- create_identity_provider_mapper=return_value_mapper_created, get_realm_by_id=return_value_realm_get) \
- as (mock_get_identity_provider, mock_create_identity_provider, mock_update_identity_provider, mock_delete_identity_provider,
- mock_get_identity_provider_mappers, mock_create_identity_provider_mapper, mock_update_identity_provider_mapper,
- mock_delete_identity_provider_mapper, mock_get_realm_by_id):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_identity_provider=return_value_idp_get, get_identity_provider_mappers=return_value_mappers_get,
+ update_identity_provider=return_value_idp_updated, update_identity_provider_mapper=return_value_mapper_updated,
+ create_identity_provider_mapper=return_value_mapper_created, get_realm_by_id=return_value_realm_get) \
+ as (mock_get_identity_provider, mock_create_identity_provider, mock_update_identity_provider, mock_delete_identity_provider,
+ mock_get_identity_provider_mappers, mock_create_identity_provider_mapper, mock_update_identity_provider_mapper,
+ mock_delete_identity_provider_mapper, mock_get_realm_by_id):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(len(mock_get_identity_provider.mock_calls), 1)
self.assertEqual(len(mock_get_identity_provider_mappers.mock_calls), 2)
@@ -738,17 +735,16 @@ class TestKeycloakIdentityProvider(ModuleTestCase):
return_value_idp_get = [None]
changed = False
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_identity_provider=return_value_idp_get) \
- as (mock_get_identity_provider, mock_create_identity_provider, mock_update_identity_provider, mock_delete_identity_provider,
- mock_get_identity_provider_mappers, mock_create_identity_provider_mapper, mock_update_identity_provider_mapper,
- mock_delete_identity_provider_mapper, mock_get_realm_by_id):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_identity_provider=return_value_idp_get) \
+ as (mock_get_identity_provider, mock_create_identity_provider, mock_update_identity_provider, mock_delete_identity_provider,
+ mock_get_identity_provider_mappers, mock_create_identity_provider_mapper, mock_update_identity_provider_mapper,
+ mock_delete_identity_provider_mapper, mock_get_realm_by_id):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(len(mock_get_identity_provider.mock_calls), 1)
self.assertEqual(len(mock_delete_identity_provider.mock_calls), 0)
@@ -844,18 +840,17 @@ class TestKeycloakIdentityProvider(ModuleTestCase):
return_value_idp_deleted = [None]
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_identity_provider=return_value_idp_get, get_identity_provider_mappers=return_value_mappers_get,
- delete_identity_provider=return_value_idp_deleted, get_realm_by_id=return_value_realm_get) \
- as (mock_get_identity_provider, mock_create_identity_provider, mock_update_identity_provider, mock_delete_identity_provider,
- mock_get_identity_provider_mappers, mock_create_identity_provider_mapper, mock_update_identity_provider_mapper,
- mock_delete_identity_provider_mapper, mock_get_realm_by_id):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_identity_provider=return_value_idp_get, get_identity_provider_mappers=return_value_mappers_get,
+ delete_identity_provider=return_value_idp_deleted, get_realm_by_id=return_value_realm_get) \
+ as (mock_get_identity_provider, mock_create_identity_provider, mock_update_identity_provider, mock_delete_identity_provider,
+ mock_get_identity_provider_mappers, mock_create_identity_provider_mapper, mock_update_identity_provider_mapper,
+ mock_delete_identity_provider_mapper, mock_get_realm_by_id):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(len(mock_get_identity_provider.mock_calls), 1)
self.assertEqual(len(mock_get_identity_provider_mappers.mock_calls), 1)
diff --git a/tests/unit/plugins/modules/test_keycloak_realm.py b/tests/unit/plugins/modules/test_keycloak_realm.py
index 72993cbdfe..7cf2ba48ae 100644
--- a/tests/unit/plugins/modules/test_keycloak_realm.py
+++ b/tests/unit/plugins/modules/test_keycloak_realm.py
@@ -113,15 +113,14 @@ class TestKeycloakRealm(ModuleTestCase):
}]
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_realm_by_id=return_value_absent, create_realm=return_value_created) \
- as (mock_get_realm_by_id, mock_create_realm, mock_update_realm, mock_delete_realm):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_realm_by_id=return_value_absent, create_realm=return_value_created) \
+ as (mock_get_realm_by_id, mock_create_realm, mock_update_realm, mock_delete_realm):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(len(mock_get_realm_by_id.mock_calls), 2)
self.assertEqual(len(mock_create_realm.mock_calls), 1)
@@ -164,15 +163,14 @@ class TestKeycloakRealm(ModuleTestCase):
}]
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_realm_by_id=return_value_absent, update_realm=return_value_updated) \
- as (mock_get_realm_by_id, mock_create_realm, mock_update_realm, mock_delete_realm):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_realm_by_id=return_value_absent, update_realm=return_value_updated) \
+ as (mock_get_realm_by_id, mock_create_realm, mock_update_realm, mock_delete_realm):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(len(mock_get_realm_by_id.mock_calls), 2)
self.assertEqual(len(mock_create_realm.mock_calls), 0)
@@ -215,15 +213,14 @@ class TestKeycloakRealm(ModuleTestCase):
}]
changed = False
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_realm_by_id=return_value_absent, update_realm=return_value_updated) \
- as (mock_get_realm_by_id, mock_create_realm, mock_update_realm, mock_delete_realm):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_realm_by_id=return_value_absent, update_realm=return_value_updated) \
+ as (mock_get_realm_by_id, mock_create_realm, mock_update_realm, mock_delete_realm):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(len(mock_get_realm_by_id.mock_calls), 2)
self.assertEqual(len(mock_create_realm.mock_calls), 0)
@@ -251,15 +248,14 @@ class TestKeycloakRealm(ModuleTestCase):
return_value_deleted = [None]
changed = False
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_realm_by_id=return_value_absent, delete_realm=return_value_deleted) \
- as (mock_get_realm_by_id, mock_create_realm, mock_update_realm, mock_delete_realm):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_realm_by_id=return_value_absent, delete_realm=return_value_deleted) \
+ as (mock_get_realm_by_id, mock_create_realm, mock_update_realm, mock_delete_realm):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(len(mock_get_realm_by_id.mock_calls), 1)
self.assertEqual(len(mock_delete_realm.mock_calls), 0)
@@ -290,15 +286,14 @@ class TestKeycloakRealm(ModuleTestCase):
return_value_deleted = [None]
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_realm_by_id=return_value_absent, delete_realm=return_value_deleted) \
- as (mock_get_realm_by_id, mock_create_realm, mock_update_realm, mock_delete_realm):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_realm_by_id=return_value_absent, delete_realm=return_value_deleted) \
+ as (mock_get_realm_by_id, mock_create_realm, mock_update_realm, mock_delete_realm):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(len(mock_get_realm_by_id.mock_calls), 1)
self.assertEqual(len(mock_delete_realm.mock_calls), 1)
diff --git a/tests/unit/plugins/modules/test_keycloak_realm_info.py b/tests/unit/plugins/modules/test_keycloak_realm_info.py
index 41095a8784..8b20203433 100644
--- a/tests/unit/plugins/modules/test_keycloak_realm_info.py
+++ b/tests/unit/plugins/modules/test_keycloak_realm_info.py
@@ -105,15 +105,14 @@ class TestKeycloakRealmRole(ModuleTestCase):
}
]
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_realm_info_by_id=return_value) \
- as (mock_get_realm_info_by_id):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_realm_info_by_id=return_value) \
+ as (mock_get_realm_info_by_id):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(len(mock_get_realm_info_by_id.mock_calls), 1)
diff --git a/tests/unit/plugins/modules/test_keycloak_realm_keys.py b/tests/unit/plugins/modules/test_keycloak_realm_keys.py
index 628fa54f31..06fe8c44ae 100644
--- a/tests/unit/plugins/modules/test_keycloak_realm_keys.py
+++ b/tests/unit/plugins/modules/test_keycloak_realm_keys.py
@@ -139,15 +139,14 @@ class TestKeycloakRealmKeys(ModuleTestCase):
]
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_components=return_value_components_get, create_component=return_value_component_create) \
- as (mock_get_components, mock_get_component, mock_create_component, mock_update_component, mock_delete_component):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_components=return_value_components_get, create_component=return_value_component_create) \
+ as (mock_get_components, mock_get_component, mock_create_component, mock_update_component, mock_delete_component):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(len(mock_get_components.mock_calls), 1)
self.assertEqual(len(mock_get_component.mock_calls), 0)
@@ -232,16 +231,15 @@ class TestKeycloakRealmKeys(ModuleTestCase):
]
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_components=return_value_components_get,
- update_component=return_value_component_update) \
- as (mock_get_components, mock_get_component, mock_create_component, mock_update_component, mock_delete_component):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_components=return_value_components_get,
+ update_component=return_value_component_update) \
+ as (mock_get_components, mock_get_component, mock_create_component, mock_update_component, mock_delete_component):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(len(mock_get_components.mock_calls), 1)
self.assertEqual(len(mock_get_component.mock_calls), 0)
@@ -277,15 +275,14 @@ class TestKeycloakRealmKeys(ModuleTestCase):
]
changed = False
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_components=return_value_components_get) \
- as (mock_get_components, mock_get_component, mock_create_component, mock_update_component, mock_delete_component):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_components=return_value_components_get) \
+ as (mock_get_components, mock_get_component, mock_create_component, mock_update_component, mock_delete_component):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(len(mock_get_components.mock_calls), 1)
self.assertEqual(len(mock_get_component.mock_calls), 0)
@@ -356,15 +353,14 @@ class TestKeycloakRealmKeys(ModuleTestCase):
]
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_components=return_value_components_get, delete_component=return_value_component_delete) \
- as (mock_get_components, mock_get_component, mock_create_component, mock_update_component, mock_delete_component):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_components=return_value_components_get, delete_component=return_value_component_delete) \
+ as (mock_get_components, mock_get_component, mock_create_component, mock_update_component, mock_delete_component):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(len(mock_get_components.mock_calls), 1)
self.assertEqual(len(mock_get_component.mock_calls), 0)
diff --git a/tests/unit/plugins/modules/test_keycloak_realm_keys_metadata_info.py b/tests/unit/plugins/modules/test_keycloak_realm_keys_metadata_info.py
index 14d36f6aab..b520ea2a85 100644
--- a/tests/unit/plugins/modules/test_keycloak_realm_keys_metadata_info.py
+++ b/tests/unit/plugins/modules/test_keycloak_realm_keys_metadata_info.py
@@ -158,23 +158,22 @@ class TestKeycloakRealmRole(ModuleTestCase):
}
]
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(side_effect=return_value) as (
- mock_get_realm_keys_metadata_by_id
- ):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(side_effect=return_value) as (
+ mock_get_realm_keys_metadata_by_id
+ ):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
- result = exec_info.exception.args[0]
- self.assertIs(result["changed"], False)
- self.assertEqual(
- result["msg"], "Get realm keys metadata successful for ID my-realm"
- )
- self.assertEqual(result["keys_metadata"], return_value[0])
+ result = exec_info.exception.args[0]
+ self.assertIs(result["changed"], False)
+ self.assertEqual(
+ result["msg"], "Get realm keys metadata successful for ID my-realm"
+ )
+ self.assertEqual(result["keys_metadata"], return_value[0])
self.assertEqual(len(mock_get_realm_keys_metadata_by_id.mock_calls), 1)
diff --git a/tests/unit/plugins/modules/test_keycloak_role.py b/tests/unit/plugins/modules/test_keycloak_role.py
index cc2f6e716b..528bb1f500 100644
--- a/tests/unit/plugins/modules/test_keycloak_role.py
+++ b/tests/unit/plugins/modules/test_keycloak_role.py
@@ -129,17 +129,16 @@ class TestKeycloakRealmRole(ModuleTestCase):
return_value_created = [None]
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_realm_role=return_value_absent, create_realm_role=return_value_created) \
- as (mock_get_realm_role, mock_create_realm_role, mock_update_realm_role, mock_delete_realm_role,
- mock_get_client_role, mock_create_client_role, mock_update_client_role, mock_delete_client_role,
- mock_get_client_by_client_id, mock_get_role_composites):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_realm_role=return_value_absent, create_realm_role=return_value_created) \
+ as (mock_get_realm_role, mock_create_realm_role, mock_update_realm_role, mock_delete_realm_role,
+ mock_get_client_role, mock_create_client_role, mock_update_client_role, mock_delete_client_role,
+ mock_get_client_by_client_id, mock_get_role_composites):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(len(mock_get_realm_role.mock_calls), 2)
self.assertEqual(len(mock_create_realm_role.mock_calls), 1)
@@ -185,17 +184,16 @@ class TestKeycloakRealmRole(ModuleTestCase):
return_value_updated = [None]
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_realm_role=return_value_present, update_realm_role=return_value_updated) \
- as (mock_get_realm_role, mock_create_realm_role, mock_update_realm_role, mock_delete_realm_role,
- mock_get_client_role, mock_create_client_role, mock_update_client_role, mock_delete_client_role,
- mock_get_client_by_client_id, mock_get_role_composites):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_realm_role=return_value_present, update_realm_role=return_value_updated) \
+ as (mock_get_realm_role, mock_create_realm_role, mock_update_realm_role, mock_delete_realm_role,
+ mock_get_client_role, mock_create_client_role, mock_update_client_role, mock_delete_client_role,
+ mock_get_client_by_client_id, mock_get_role_composites):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(len(mock_get_realm_role.mock_calls), 2)
self.assertEqual(len(mock_create_realm_role.mock_calls), 0)
@@ -241,17 +239,16 @@ class TestKeycloakRealmRole(ModuleTestCase):
return_value_updated = [None]
changed = False
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_realm_role=return_value_present, update_realm_role=return_value_updated) \
- as (mock_get_realm_role, mock_create_realm_role, mock_update_realm_role, mock_delete_realm_role,
- mock_get_client_role, mock_create_client_role, mock_update_client_role, mock_delete_client_role,
- mock_get_client_by_client_id, mock_get_role_composites):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_realm_role=return_value_present, update_realm_role=return_value_updated) \
+ as (mock_get_realm_role, mock_create_realm_role, mock_update_realm_role, mock_delete_realm_role,
+ mock_get_client_role, mock_create_client_role, mock_update_client_role, mock_delete_client_role,
+ mock_get_client_by_client_id, mock_get_role_composites):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(len(mock_get_realm_role.mock_calls), 1)
self.assertEqual(len(mock_create_realm_role.mock_calls), 0)
@@ -371,19 +368,18 @@ class TestKeycloakRealmRole(ModuleTestCase):
changed = False
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_realm_role=return_value_present, update_realm_role=return_value_updated,
- get_client_by_id=return_get_client_by_client_id,
- get_role_composites=return_get_role_composites) \
- as (mock_get_realm_role, mock_create_realm_role, mock_update_realm_role, mock_delete_realm_role,
- mock_get_client_role, mock_create_client_role, mock_update_client_role, mock_delete_client_role,
- mock_get_client_by_client_id, mock_get_role_composites):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_realm_role=return_value_present, update_realm_role=return_value_updated,
+ get_client_by_id=return_get_client_by_client_id,
+ get_role_composites=return_get_role_composites) \
+ as (mock_get_realm_role, mock_create_realm_role, mock_update_realm_role, mock_delete_realm_role,
+ mock_get_client_role, mock_create_client_role, mock_update_client_role, mock_delete_client_role,
+ mock_get_client_by_client_id, mock_get_role_composites):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(len(mock_get_realm_role.mock_calls), 1)
self.assertEqual(len(mock_create_realm_role.mock_calls), 0)
@@ -412,17 +408,16 @@ class TestKeycloakRealmRole(ModuleTestCase):
return_value_deleted = [None]
changed = False
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_realm_role=return_value_absent, delete_realm_role=return_value_deleted) \
- as (mock_get_realm_role, mock_create_realm_role, mock_update_realm_role, mock_delete_realm_role,
- mock_get_client_role, mock_create_client_role, mock_update_client_role, mock_delete_client_role,
- mock_get_client_by_client_id, mock_get_role_composites):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_realm_role=return_value_absent, delete_realm_role=return_value_deleted) \
+ as (mock_get_realm_role, mock_create_realm_role, mock_update_realm_role, mock_delete_realm_role,
+ mock_get_client_role, mock_create_client_role, mock_update_client_role, mock_delete_client_role,
+ mock_get_client_by_client_id, mock_get_role_composites):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(len(mock_get_realm_role.mock_calls), 1)
self.assertEqual(len(mock_delete_realm_role.mock_calls), 0)
@@ -458,17 +453,16 @@ class TestKeycloakRealmRole(ModuleTestCase):
return_value_deleted = [None]
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_realm_role=return_value_absent, delete_realm_role=return_value_deleted) \
- as (mock_get_realm_role, mock_create_realm_role, mock_update_realm_role, mock_delete_realm_role,
- mock_get_client_role, mock_create_client_role, mock_update_client_role, mock_delete_client_role,
- mock_get_client_by_client_id, mock_get_role_composites):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_realm_role=return_value_absent, delete_realm_role=return_value_deleted) \
+ as (mock_get_realm_role, mock_create_realm_role, mock_update_realm_role, mock_delete_realm_role,
+ mock_get_client_role, mock_create_client_role, mock_update_client_role, mock_delete_client_role,
+ mock_get_client_by_client_id, mock_get_role_composites):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(len(mock_get_realm_role.mock_calls), 1)
self.assertEqual(len(mock_delete_realm_role.mock_calls), 1)
@@ -531,17 +525,16 @@ class TestKeycloakClientRole(ModuleTestCase):
]
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_client_role=return_get_client_role) \
- as (mock_get_realm_role, mock_create_realm_role, mock_update_realm_role, mock_delete_realm_role,
- mock_get_client_role, mock_create_client_role, mock_update_client_role, mock_delete_client_role,
- mock_get_client_by_client_id, mock_get_role_composites):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_client_role=return_get_client_role) \
+ as (mock_get_realm_role, mock_create_realm_role, mock_update_realm_role, mock_delete_realm_role,
+ mock_get_client_role, mock_create_client_role, mock_update_client_role, mock_delete_client_role,
+ mock_get_client_by_client_id, mock_get_role_composites):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(len(mock_get_realm_role.mock_calls), 0)
self.assertEqual(len(mock_create_realm_role.mock_calls), 0)
@@ -653,18 +646,17 @@ class TestKeycloakClientRole(ModuleTestCase):
]
changed = False
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_client_role=return_get_client_role, get_client_by_id=return_get_client_by_client_id,
- get_role_composites=return_get_role_composites) \
- as (mock_get_realm_role, mock_create_realm_role, mock_update_realm_role, mock_delete_realm_role,
- mock_get_client_role, mock_create_client_role, mock_update_client_role, mock_delete_client_role,
- mock_get_client_by_client_id, mock_get_role_composites):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_client_role=return_get_client_role, get_client_by_id=return_get_client_by_client_id,
+ get_role_composites=return_get_role_composites) \
+ as (mock_get_realm_role, mock_create_realm_role, mock_update_realm_role, mock_delete_realm_role,
+ mock_get_client_role, mock_create_client_role, mock_update_client_role, mock_delete_client_role,
+ mock_get_client_by_client_id, mock_get_role_composites):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(len(mock_get_realm_role.mock_calls), 0)
self.assertEqual(len(mock_create_realm_role.mock_calls), 0)
diff --git a/tests/unit/plugins/modules/test_keycloak_user.py b/tests/unit/plugins/modules/test_keycloak_user.py
index 26bc33d826..f0446c5b9c 100644
--- a/tests/unit/plugins/modules/test_keycloak_user.py
+++ b/tests/unit/plugins/modules/test_keycloak_user.py
@@ -114,25 +114,24 @@ class TestKeycloakUser(ModuleTestCase):
return_update_user = None
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_user_by_username=return_value_get_user_by_username,
- create_user=return_create_user,
- update_user_groups_membership=return_value_update_user_groups_membership,
- get_user_groups=return_get_user_groups,
- update_user=return_update_user,
- delete_user=return_delete_user) \
- as (mock_get_user_by_username,
- mock_create_user,
- mock_update_user_groups_membership,
- mock_get_user_groups,
- mock_delete_user,
- mock_update_user):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_user_by_username=return_value_get_user_by_username,
+ create_user=return_create_user,
+ update_user_groups_membership=return_value_update_user_groups_membership,
+ get_user_groups=return_get_user_groups,
+ update_user=return_update_user,
+ delete_user=return_delete_user) \
+ as (mock_get_user_by_username,
+ mock_create_user,
+ mock_update_user_groups_membership,
+ mock_get_user_groups,
+ mock_delete_user,
+ mock_update_user):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(mock_get_user_by_username.call_count, 1)
self.assertEqual(mock_create_user.call_count, 1)
@@ -176,25 +175,24 @@ class TestKeycloakUser(ModuleTestCase):
return_update_user = None
changed = False
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_user_by_username=return_value_get_user_by_username,
- create_user=return_create_user,
- update_user_groups_membership=return_value_update_user_groups_membership,
- get_user_groups=return_get_user_groups,
- update_user=return_update_user,
- delete_user=return_delete_user) \
- as (mock_get_user_by_username,
- mock_create_user,
- mock_update_user_groups_membership,
- mock_get_user_groups,
- mock_delete_user,
- mock_update_user):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_user_by_username=return_value_get_user_by_username,
+ create_user=return_create_user,
+ update_user_groups_membership=return_value_update_user_groups_membership,
+ get_user_groups=return_get_user_groups,
+ update_user=return_update_user,
+ delete_user=return_delete_user) \
+ as (mock_get_user_by_username,
+ mock_create_user,
+ mock_update_user_groups_membership,
+ mock_get_user_groups,
+ mock_delete_user,
+ mock_update_user):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(mock_get_user_by_username.call_count, 1)
self.assertEqual(mock_create_user.call_count, 0)
@@ -257,25 +255,24 @@ class TestKeycloakUser(ModuleTestCase):
]
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_user_by_username=return_value_get_user_by_username,
- create_user=return_create_user,
- update_user_groups_membership=return_value_update_user_groups_membership,
- get_user_groups=return_get_user_groups,
- update_user=return_update_user,
- delete_user=return_delete_user) \
- as (mock_get_user_by_username,
- mock_create_user,
- mock_update_user_groups_membership,
- mock_get_user_groups,
- mock_delete_user,
- mock_update_user):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_user_by_username=return_value_get_user_by_username,
+ create_user=return_create_user,
+ update_user_groups_membership=return_value_update_user_groups_membership,
+ get_user_groups=return_get_user_groups,
+ update_user=return_update_user,
+ delete_user=return_delete_user) \
+ as (mock_get_user_by_username,
+ mock_create_user,
+ mock_update_user_groups_membership,
+ mock_get_user_groups,
+ mock_delete_user,
+ mock_update_user):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(mock_get_user_by_username.call_count, 1)
self.assertEqual(mock_create_user.call_count, 0)
@@ -319,25 +316,24 @@ class TestKeycloakUser(ModuleTestCase):
return_update_user = None
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_user_by_username=return_value_get_user_by_username,
- create_user=return_create_user,
- update_user_groups_membership=return_value_update_user_groups_membership,
- get_user_groups=return_get_user_groups,
- update_user=return_update_user,
- delete_user=return_delete_user) \
- as (mock_get_user_by_username,
- mock_create_user,
- mock_update_user_groups_membership,
- mock_get_user_groups,
- mock_delete_user,
- mock_update_user):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_user_by_username=return_value_get_user_by_username,
+ create_user=return_create_user,
+ update_user_groups_membership=return_value_update_user_groups_membership,
+ get_user_groups=return_get_user_groups,
+ update_user=return_update_user,
+ delete_user=return_delete_user) \
+ as (mock_get_user_by_username,
+ mock_create_user,
+ mock_update_user_groups_membership,
+ mock_get_user_groups,
+ mock_delete_user,
+ mock_update_user):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(mock_get_user_by_username.call_count, 1)
self.assertEqual(mock_create_user.call_count, 0)
diff --git a/tests/unit/plugins/modules/test_keycloak_user_federation.py b/tests/unit/plugins/modules/test_keycloak_user_federation.py
index 81fd65e108..0929868147 100644
--- a/tests/unit/plugins/modules/test_keycloak_user_federation.py
+++ b/tests/unit/plugins/modules/test_keycloak_user_federation.py
@@ -150,15 +150,14 @@ class TestKeycloakUserFederation(ModuleTestCase):
]
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_components=return_value_components_get, create_component=return_value_component_create) \
- as (mock_get_components, mock_get_component, mock_create_component, mock_update_component, mock_delete_component):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_components=return_value_components_get, create_component=return_value_component_create) \
+ as (mock_get_components, mock_get_component, mock_create_component, mock_update_component, mock_delete_component):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(len(mock_get_components.mock_calls), 3)
self.assertEqual(len(mock_get_component.mock_calls), 0)
@@ -272,16 +271,15 @@ class TestKeycloakUserFederation(ModuleTestCase):
]
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_components=return_value_components_get, get_component=return_value_component_get,
- update_component=return_value_component_update) \
- as (mock_get_components, mock_get_component, mock_create_component, mock_update_component, mock_delete_component):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_components=return_value_components_get, get_component=return_value_component_get,
+ update_component=return_value_component_update) \
+ as (mock_get_components, mock_get_component, mock_create_component, mock_update_component, mock_delete_component):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(len(mock_get_components.mock_calls), 3)
self.assertEqual(len(mock_get_component.mock_calls), 1)
@@ -494,15 +492,14 @@ class TestKeycloakUserFederation(ModuleTestCase):
]
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_components=return_value_components_get, create_component=return_value_component_create) \
- as (mock_get_components, mock_get_component, mock_create_component, mock_update_component, mock_delete_component):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_components=return_value_components_get, create_component=return_value_component_create) \
+ as (mock_get_components, mock_get_component, mock_create_component, mock_update_component, mock_delete_component):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(len(mock_get_components.mock_calls), 3)
self.assertEqual(len(mock_get_component.mock_calls), 0)
@@ -530,15 +527,14 @@ class TestKeycloakUserFederation(ModuleTestCase):
]
changed = False
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_components=return_value_components_get) \
- as (mock_get_components, mock_get_component, mock_create_component, mock_update_component, mock_delete_component):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_components=return_value_components_get) \
+ as (mock_get_components, mock_get_component, mock_create_component, mock_update_component, mock_delete_component):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(len(mock_get_components.mock_calls), 1)
self.assertEqual(len(mock_get_component.mock_calls), 0)
@@ -604,15 +600,14 @@ class TestKeycloakUserFederation(ModuleTestCase):
]
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_components=return_value_components_get, delete_component=return_value_component_delete) \
- as (mock_get_components, mock_get_component, mock_create_component, mock_update_component, mock_delete_component):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_components=return_value_components_get, delete_component=return_value_component_delete) \
+ as (mock_get_components, mock_get_component, mock_create_component, mock_update_component, mock_delete_component):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(len(mock_get_components.mock_calls), 2)
self.assertEqual(len(mock_get_component.mock_calls), 0)
diff --git a/tests/unit/plugins/modules/test_keycloak_userprofile.py b/tests/unit/plugins/modules/test_keycloak_userprofile.py
index 3ae01bbb8b..816dc6cea5 100644
--- a/tests/unit/plugins/modules/test_keycloak_userprofile.py
+++ b/tests/unit/plugins/modules/test_keycloak_userprofile.py
@@ -350,15 +350,14 @@ class TestKeycloakUserprofile(ModuleTestCase):
]
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_components=return_value_get_components_get, create_component=return_value_component_create) as (
- mock_get_components, mock_get_component, mock_create_component, mock_update_component, mock_delete_component):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_components=return_value_get_components_get, create_component=return_value_component_create) as (
+ mock_get_components, mock_get_component, mock_create_component, mock_update_component, mock_delete_component):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(len(mock_get_components.mock_calls), 1)
self.assertEqual(len(mock_get_component.mock_calls), 0)
@@ -639,16 +638,15 @@ class TestKeycloakUserprofile(ModuleTestCase):
]
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_components=return_value_get_components_get,
- update_component=return_value_component_update) as (
- mock_get_components, mock_get_component, mock_create_component, mock_update_component, mock_delete_component):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_components=return_value_get_components_get,
+ update_component=return_value_component_update) as (
+ mock_get_components, mock_get_component, mock_create_component, mock_update_component, mock_delete_component):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(len(mock_get_components.mock_calls), 1)
self.assertEqual(len(mock_get_component.mock_calls), 0)
@@ -676,15 +674,14 @@ class TestKeycloakUserprofile(ModuleTestCase):
]
changed = False
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_components=return_value_get_components_get) as (
- mock_get_components, mock_get_component, mock_create_component, mock_update_component, mock_delete_component):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_components=return_value_get_components_get) as (
+ mock_get_components, mock_get_component, mock_create_component, mock_update_component, mock_delete_component):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(len(mock_get_components.mock_calls), 1)
self.assertEqual(len(mock_get_component.mock_calls), 0)
@@ -844,15 +841,14 @@ class TestKeycloakUserprofile(ModuleTestCase):
]
changed = True
- set_module_args(module_args)
-
# Run the module
- with mock_good_connection():
- with patch_keycloak_api(get_components=return_value_get_components_get, delete_component=return_value_component_delete) as (
- mock_get_components, mock_get_component, mock_create_component, mock_update_component, mock_delete_component):
- with self.assertRaises(AnsibleExitJson) as exec_info:
- self.module.main()
+ with set_module_args(module_args):
+ with mock_good_connection():
+ with patch_keycloak_api(get_components=return_value_get_components_get, delete_component=return_value_component_delete) as (
+ mock_get_components, mock_get_component, mock_create_component, mock_update_component, mock_delete_component):
+ with self.assertRaises(AnsibleExitJson) as exec_info:
+ self.module.main()
self.assertEqual(len(mock_get_components.mock_calls), 1)
self.assertEqual(len(mock_get_component.mock_calls), 0)
diff --git a/tests/unit/plugins/modules/test_linode.py b/tests/unit/plugins/modules/test_linode.py
index 9e7b158d8e..737a179ba1 100644
--- a/tests/unit/plugins/modules/test_linode.py
+++ b/tests/unit/plugins/modules/test_linode.py
@@ -18,5 +18,5 @@ if not linode.HAS_LINODE:
def test_name_is_a_required_parameter(api_key, auth):
with pytest.raises(SystemExit):
- set_module_args({})
- linode.main()
+ with set_module_args({}):
+ linode.main()
diff --git a/tests/unit/plugins/modules/test_linode_v4.py b/tests/unit/plugins/modules/test_linode_v4.py
index 915a82f087..62143aa461 100644
--- a/tests/unit/plugins/modules/test_linode_v4.py
+++ b/tests/unit/plugins/modules/test_linode_v4.py
@@ -30,8 +30,8 @@ from .linode_conftest import access_token, no_access_token_in_env, default_args,
def test_mandatory_state_is_validated(capfd):
with pytest.raises(SystemExit):
- set_module_args({'label': 'foo'})
- linode_v4.initialise_module()
+ with set_module_args({'label': 'foo'}):
+ linode_v4.initialise_module()
out, err = capfd.readouterr()
results = json.loads(out)
@@ -42,8 +42,8 @@ def test_mandatory_state_is_validated(capfd):
def test_mandatory_label_is_validated(capfd):
with pytest.raises(SystemExit):
- set_module_args({'state': 'present'})
- linode_v4.initialise_module()
+ with set_module_args({'state': 'present'}):
+ linode_v4.initialise_module()
out, err = capfd.readouterr()
results = json.loads(out)
@@ -56,8 +56,8 @@ def test_mandatory_access_token_is_validated(default_args,
no_access_token_in_env,
capfd):
with pytest.raises(SystemExit):
- set_module_args(default_args)
- linode_v4.initialise_module()
+ with set_module_args(default_args):
+ linode_v4.initialise_module()
out, err = capfd.readouterr()
results = json.loads(out)
@@ -72,12 +72,12 @@ def test_mandatory_access_token_is_validated(default_args,
def test_mandatory_access_token_passed_in_env(default_args,
access_token):
- set_module_args(default_args)
+ with set_module_args(default_args):
- try:
- module = linode_v4.initialise_module()
- except SystemExit:
- pytest.fail("'access_token' is passed in environment")
+ try:
+ module = linode_v4.initialise_module()
+ except SystemExit:
+ pytest.fail("'access_token' is passed in environment")
now_set_token = module.params['access_token']
assert now_set_token == os.environ['LINODE_ACCESS_TOKEN']
@@ -86,26 +86,26 @@ def test_mandatory_access_token_passed_in_env(default_args,
def test_mandatory_access_token_passed_in_as_parameter(default_args,
no_access_token_in_env):
default_args.update({'access_token': 'foo'})
- set_module_args(default_args)
+ with set_module_args(default_args):
- try:
- module = linode_v4.initialise_module()
- except SystemExit:
- pytest.fail("'access_token' is passed in as parameter")
+ try:
+ module = linode_v4.initialise_module()
+ except SystemExit:
+ pytest.fail("'access_token' is passed in as parameter")
assert module.params['access_token'] == 'foo'
def test_instance_by_label_cannot_authenticate(capfd, access_token,
default_args):
- set_module_args(default_args)
- module = linode_v4.initialise_module()
- client = LinodeClient(module.params['access_token'])
+ with set_module_args(default_args):
+ module = linode_v4.initialise_module()
+ client = LinodeClient(module.params['access_token'])
- target = 'linode_api4.linode_client.LinodeGroup.instances'
- with mock.patch(target, side_effect=LinodeApiError('foo')):
- with pytest.raises(SystemExit):
- linode_v4.maybe_instance_from_label(module, client)
+ target = 'linode_api4.linode_client.LinodeGroup.instances'
+ with mock.patch(target, side_effect=LinodeApiError('foo')):
+ with pytest.raises(SystemExit):
+ linode_v4.maybe_instance_from_label(module, client)
out, err = capfd.readouterr()
results = json.loads(out)
@@ -116,23 +116,23 @@ def test_instance_by_label_cannot_authenticate(capfd, access_token,
def test_no_instances_found_with_label_gives_none(default_args,
access_token):
- set_module_args(default_args)
- module = linode_v4.initialise_module()
- client = LinodeClient(module.params['access_token'])
+ with set_module_args(default_args):
+ module = linode_v4.initialise_module()
+ client = LinodeClient(module.params['access_token'])
- target = 'linode_api4.linode_client.LinodeGroup.instances'
- with mock.patch(target, return_value=[]):
- result = linode_v4.maybe_instance_from_label(module, client)
+ target = 'linode_api4.linode_client.LinodeGroup.instances'
+ with mock.patch(target, return_value=[]):
+ result = linode_v4.maybe_instance_from_label(module, client)
assert result is None
def test_optional_region_is_validated(default_args, capfd, access_token):
default_args.update({'type': 'foo', 'image': 'bar'})
- set_module_args(default_args)
+ with set_module_args(default_args):
- with pytest.raises(SystemExit):
- linode_v4.initialise_module()
+ with pytest.raises(SystemExit):
+ linode_v4.initialise_module()
out, err = capfd.readouterr()
results = json.loads(out)
@@ -147,10 +147,10 @@ def test_optional_region_is_validated(default_args, capfd, access_token):
def test_optional_type_is_validated(default_args, capfd, access_token):
default_args.update({'region': 'foo', 'image': 'bar'})
- set_module_args(default_args)
+ with set_module_args(default_args):
- with pytest.raises(SystemExit):
- linode_v4.initialise_module()
+ with pytest.raises(SystemExit):
+ linode_v4.initialise_module()
out, err = capfd.readouterr()
results = json.loads(out)
@@ -165,10 +165,10 @@ def test_optional_type_is_validated(default_args, capfd, access_token):
def test_optional_image_is_validated(default_args, capfd, access_token):
default_args.update({'type': 'foo', 'region': 'bar'})
- set_module_args(default_args)
+ with set_module_args(default_args):
- with pytest.raises(SystemExit):
- linode_v4.initialise_module()
+ with pytest.raises(SystemExit):
+ linode_v4.initialise_module()
out, err = capfd.readouterr()
results = json.loads(out)
@@ -184,9 +184,9 @@ def test_optional_image_is_validated(default_args, capfd, access_token):
@pytest.mark.parametrize('value', [True, False])
def test_private_ip_valid_values(default_args, access_token, value):
default_args.update({'private_ip': value})
- set_module_args(default_args)
+ with set_module_args(default_args):
- module = linode_v4.initialise_module()
+ module = linode_v4.initialise_module()
assert module.params['private_ip'] is value
@@ -194,10 +194,10 @@ def test_private_ip_valid_values(default_args, access_token, value):
@pytest.mark.parametrize('value', ['not-a-bool', 42])
def test_private_ip_invalid_values(default_args, capfd, access_token, value):
default_args.update({'private_ip': value})
- set_module_args(default_args)
+ with set_module_args(default_args):
- with pytest.raises(SystemExit):
- linode_v4.initialise_module()
+ with pytest.raises(SystemExit):
+ linode_v4.initialise_module()
out, err = capfd.readouterr()
results = json.loads(out)
@@ -208,23 +208,23 @@ def test_private_ip_invalid_values(default_args, capfd, access_token, value):
def test_private_ip_default_value(default_args, access_token):
default_args.pop('private_ip', None)
- set_module_args(default_args)
+ with set_module_args(default_args):
- module = linode_v4.initialise_module()
+ module = linode_v4.initialise_module()
assert module.params['private_ip'] is False
def test_private_ip_is_forwarded_to_linode(default_args, mock_linode, access_token):
default_args.update({'private_ip': True})
- set_module_args(default_args)
+ with set_module_args(default_args):
- target = 'linode_api4.linode_client.LinodeGroup.instances'
- with mock.patch(target, return_value=[]):
- with pytest.raises(SystemExit):
- target = 'linode_api4.linode_client.LinodeGroup.instance_create'
- with mock.patch(target, return_value=(mock_linode, 'passw0rd')) as instance_create_mock:
- linode_v4.main()
+ target = 'linode_api4.linode_client.LinodeGroup.instances'
+ with mock.patch(target, return_value=[]):
+ with pytest.raises(SystemExit):
+ target = 'linode_api4.linode_client.LinodeGroup.instance_create'
+ with mock.patch(target, return_value=(mock_linode, 'passw0rd')) as instance_create_mock:
+ linode_v4.main()
args, kwargs = instance_create_mock.call_args
assert kwargs['private_ip'] is True
@@ -239,12 +239,12 @@ def test_instance_already_created(default_args,
'region': 'bar',
'image': 'baz'
})
- set_module_args(default_args)
+ with set_module_args(default_args):
- target = 'linode_api4.linode_client.LinodeGroup.instances'
- with mock.patch(target, return_value=[mock_linode]):
- with pytest.raises(SystemExit) as sys_exit_exc:
- linode_v4.main()
+ target = 'linode_api4.linode_client.LinodeGroup.instances'
+ with mock.patch(target, return_value=[mock_linode]):
+ with pytest.raises(SystemExit) as sys_exit_exc:
+ linode_v4.main()
assert sys_exit_exc.value.code == 0
@@ -268,14 +268,14 @@ def test_instance_to_be_created_without_root_pass(default_args,
'region': 'bar',
'image': 'baz'
})
- set_module_args(default_args)
+ with set_module_args(default_args):
- target = 'linode_api4.linode_client.LinodeGroup.instances'
- with mock.patch(target, return_value=[]):
- with pytest.raises(SystemExit) as sys_exit_exc:
- target = 'linode_api4.linode_client.LinodeGroup.instance_create'
- with mock.patch(target, return_value=(mock_linode, 'passw0rd')):
- linode_v4.main()
+ target = 'linode_api4.linode_client.LinodeGroup.instances'
+ with mock.patch(target, return_value=[]):
+ with pytest.raises(SystemExit) as sys_exit_exc:
+ target = 'linode_api4.linode_client.LinodeGroup.instance_create'
+ with mock.patch(target, return_value=(mock_linode, 'passw0rd')):
+ linode_v4.main()
assert sys_exit_exc.value.code == 0
@@ -300,14 +300,14 @@ def test_instance_to_be_created_with_root_pass(default_args,
'image': 'baz',
'root_pass': 'passw0rd',
})
- set_module_args(default_args)
+ with set_module_args(default_args):
- target = 'linode_api4.linode_client.LinodeGroup.instances'
- with mock.patch(target, return_value=[]):
- with pytest.raises(SystemExit) as sys_exit_exc:
- target = 'linode_api4.linode_client.LinodeGroup.instance_create'
- with mock.patch(target, return_value=mock_linode):
- linode_v4.main()
+ target = 'linode_api4.linode_client.LinodeGroup.instances'
+ with mock.patch(target, return_value=[]):
+ with pytest.raises(SystemExit) as sys_exit_exc:
+ target = 'linode_api4.linode_client.LinodeGroup.instance_create'
+ with mock.patch(target, return_value=mock_linode):
+ linode_v4.main()
assert sys_exit_exc.value.code == 0
@@ -327,12 +327,12 @@ def test_instance_to_be_deleted(default_args,
capfd,
access_token):
default_args.update({'state': 'absent'})
- set_module_args(default_args)
+ with set_module_args(default_args):
- target = 'linode_api4.linode_client.LinodeGroup.instances'
- with mock.patch(target, return_value=[mock_linode]):
- with pytest.raises(SystemExit) as sys_exit_exc:
- linode_v4.main()
+ target = 'linode_api4.linode_client.LinodeGroup.instances'
+ with mock.patch(target, return_value=[mock_linode]):
+ with pytest.raises(SystemExit) as sys_exit_exc:
+ linode_v4.main()
assert sys_exit_exc.value.code == 0
@@ -351,12 +351,12 @@ def test_instance_already_deleted_no_change(default_args,
capfd,
access_token):
default_args.update({'state': 'absent'})
- set_module_args(default_args)
+ with set_module_args(default_args):
- target = 'linode_api4.linode_client.LinodeGroup.instances'
- with mock.patch(target, return_value=[]):
- with pytest.raises(SystemExit) as sys_exit_exc:
- linode_v4.main()
+ target = 'linode_api4.linode_client.LinodeGroup.instances'
+ with mock.patch(target, return_value=[]):
+ with pytest.raises(SystemExit) as sys_exit_exc:
+ linode_v4.main()
assert sys_exit_exc.value.code == 0
diff --git a/tests/unit/plugins/modules/test_lvg_rename.py b/tests/unit/plugins/modules/test_lvg_rename.py
index 0f2fcb7fa7..5b758e9d7e 100644
--- a/tests/unit/plugins/modules/test_lvg_rename.py
+++ b/tests/unit/plugins/modules/test_lvg_rename.py
@@ -48,10 +48,10 @@ class TestLvgRename(ModuleTestCase):
'vg': 'vg_missing',
'vg_new': 'vg_data_testhost2',
}
- set_module_args(args=module_args)
+ with set_module_args(args=module_args):
- with self.assertRaises(AnsibleFailJson) as result:
- self.module.main()
+ with self.assertRaises(AnsibleFailJson) as result:
+ self.module.main()
self.assertEqual(len(self.mock_module_run_command.mock_calls), 1)
self.assertIs(result.exception.args[0]['failed'], failed)
@@ -67,10 +67,10 @@ class TestLvgRename(ModuleTestCase):
'vg': 'Yfj4YG-c8nI-z7w5-B7Fw-i2eM-HqlF-ApFVp0',
'vg_new': 'vg_data_testhost2',
}
- set_module_args(args=module_args)
+ with set_module_args(args=module_args):
- with self.assertRaises(AnsibleFailJson) as result:
- self.module.main()
+ with self.assertRaises(AnsibleFailJson) as result:
+ self.module.main()
self.assertEqual(len(self.mock_module_run_command.mock_calls), 1)
self.assertIs(result.exception.args[0]['failed'], failed)
@@ -86,10 +86,10 @@ class TestLvgRename(ModuleTestCase):
'vg': 'vg_data_testhost1',
'vg_new': 'vg_sys_testhost2',
}
- set_module_args(args=module_args)
+ with set_module_args(args=module_args):
- with self.assertRaises(AnsibleFailJson) as result:
- self.module.main()
+ with self.assertRaises(AnsibleFailJson) as result:
+ self.module.main()
self.assertEqual(len(self.mock_module_run_command.mock_calls), 1)
self.assertIs(result.exception.args[0]['failed'], failed)
@@ -109,10 +109,10 @@ class TestLvgRename(ModuleTestCase):
'vg': '/dev/vg_data_testhost1',
'vg_new': 'vg_data_testhost2',
}
- set_module_args(args=module_args)
+ with set_module_args(args=module_args):
- with self.assertRaises(AnsibleExitJson) as result:
- self.module.main()
+ with self.assertRaises(AnsibleExitJson) as result:
+ self.module.main()
self.assertEqual(len(self.mock_module_run_command.mock_calls), 2)
self.assertIs(result.exception.args[0]['changed'], changed)
@@ -130,10 +130,10 @@ class TestLvgRename(ModuleTestCase):
'vg_new': 'vg_data_testhost2',
'_ansible_check_mode': True,
}
- set_module_args(args=module_args)
+ with set_module_args(args=module_args):
- with self.assertRaises(AnsibleExitJson) as result:
- self.module.main()
+ with self.assertRaises(AnsibleExitJson) as result:
+ self.module.main()
self.assertEqual(len(self.mock_module_run_command.mock_calls), 1)
self.assertIs(result.exception.args[0]['changed'], changed)
@@ -150,10 +150,10 @@ class TestLvgRename(ModuleTestCase):
'vg': 'vg_data_testhostX',
'vg_new': 'vg_data_testhost1',
}
- set_module_args(args=module_args)
+ with set_module_args(args=module_args):
- with self.assertRaises(AnsibleExitJson) as result:
- self.module.main()
+ with self.assertRaises(AnsibleExitJson) as result:
+ self.module.main()
self.assertEqual(len(self.mock_module_run_command.mock_calls), 1)
self.assertIs(result.exception.args[0]['changed'], changed)
diff --git a/tests/unit/plugins/modules/test_modprobe.py b/tests/unit/plugins/modules/test_modprobe.py
index 2ad0831511..eb51f0211b 100644
--- a/tests/unit/plugins/modules/test_modprobe.py
+++ b/tests/unit/plugins/modules/test_modprobe.py
@@ -36,19 +36,18 @@ class TestLoadModule(ModuleTestCase):
self.mock_get_bin_path.stop()
def test_load_module_success(self):
- set_module_args(dict(
+ with set_module_args(dict(
name='test',
state='present',
- ))
+ )):
+ module = build_module()
- module = build_module()
+ self.get_bin_path.side_effect = ['modprobe']
+ self.module_loaded.side_effect = [True]
+ self.run_command.side_effect = [(0, '', '')]
- self.get_bin_path.side_effect = ['modprobe']
- self.module_loaded.side_effect = [True]
- self.run_command.side_effect = [(0, '', '')]
-
- modprobe = Modprobe(module)
- modprobe.load_module()
+ modprobe = Modprobe(module)
+ modprobe.load_module()
assert modprobe.result == {
'changed': True,
@@ -58,21 +57,20 @@ class TestLoadModule(ModuleTestCase):
}
def test_load_module_unchanged(self):
- set_module_args(dict(
+ with set_module_args(dict(
name='test',
state='present',
- ))
+ )):
+ module = build_module()
- module = build_module()
+ module.warn = Mock()
- module.warn = Mock()
+ self.get_bin_path.side_effect = ['modprobe']
+ self.module_loaded.side_effect = [False]
+ self.run_command.side_effect = [(0, '', ''), (1, '', '')]
- self.get_bin_path.side_effect = ['modprobe']
- self.module_loaded.side_effect = [False]
- self.run_command.side_effect = [(0, '', ''), (1, '', '')]
-
- modprobe = Modprobe(module)
- modprobe.load_module()
+ modprobe = Modprobe(module)
+ modprobe.load_module()
module.warn.assert_called_once_with('')
@@ -99,19 +97,18 @@ class TestUnloadModule(ModuleTestCase):
self.mock_get_bin_path.stop()
def test_unload_module_success(self):
- set_module_args(dict(
+ with set_module_args(dict(
name='test',
state='absent',
- ))
+ )):
+ module = build_module()
- module = build_module()
+ self.get_bin_path.side_effect = ['modprobe']
+ self.module_loaded.side_effect = [False]
+ self.run_command.side_effect = [(0, '', '')]
- self.get_bin_path.side_effect = ['modprobe']
- self.module_loaded.side_effect = [False]
- self.run_command.side_effect = [(0, '', '')]
-
- modprobe = Modprobe(module)
- modprobe.unload_module()
+ modprobe = Modprobe(module)
+ modprobe.unload_module()
assert modprobe.result == {
'changed': True,
@@ -121,21 +118,20 @@ class TestUnloadModule(ModuleTestCase):
}
def test_unload_module_failure(self):
- set_module_args(dict(
+ with set_module_args(dict(
name='test',
state='absent',
- ))
+ )):
+ module = build_module()
- module = build_module()
+ module.fail_json = Mock()
- module.fail_json = Mock()
+ self.get_bin_path.side_effect = ['modprobe']
+ self.module_loaded.side_effect = [True]
+ self.run_command.side_effect = [(1, '', '')]
- self.get_bin_path.side_effect = ['modprobe']
- self.module_loaded.side_effect = [True]
- self.run_command.side_effect = [(1, '', '')]
-
- modprobe = Modprobe(module)
- modprobe.unload_module()
+ modprobe = Modprobe(module)
+ modprobe.unload_module()
dummy_result = {
'changed': False,
@@ -168,63 +164,60 @@ class TestModuleIsLoadedPersistently(ModuleTestCase):
def test_module_is_loaded(self):
- set_module_args(dict(
+ with set_module_args(dict(
name='dummy',
state='present',
persistent='present'
- ))
+ )):
+ module = build_module()
- module = build_module()
+ self.get_bin_path.side_effect = ['modprobe']
- self.get_bin_path.side_effect = ['modprobe']
+ modprobe = Modprobe(module)
+ with patch('ansible_collections.community.general.plugins.modules.modprobe.open', mock_open(read_data='dummy')) as mocked_file:
+ with patch('ansible_collections.community.general.plugins.modules.modprobe.Modprobe.modules_files'):
+ modprobe.modules_files = ['/etc/modules-load.d/dummy.conf']
- modprobe = Modprobe(module)
- with patch('ansible_collections.community.general.plugins.modules.modprobe.open', mock_open(read_data='dummy')) as mocked_file:
- with patch('ansible_collections.community.general.plugins.modules.modprobe.Modprobe.modules_files'):
- modprobe.modules_files = ['/etc/modules-load.d/dummy.conf']
-
- assert modprobe.module_is_loaded_persistently
+ assert modprobe.module_is_loaded_persistently
mocked_file.assert_called_once_with('/etc/modules-load.d/dummy.conf')
def test_module_is_not_loaded_empty_file(self):
- set_module_args(dict(
+ with set_module_args(dict(
name='dummy',
state='present',
persistent='present'
- ))
+ )):
+ module = build_module()
- module = build_module()
+ self.get_bin_path.side_effect = ['modprobe']
- self.get_bin_path.side_effect = ['modprobe']
+ modprobe = Modprobe(module)
+ with patch('ansible_collections.community.general.plugins.modules.modprobe.open', mock_open(read_data='')) as mocked_file:
+ with patch('ansible_collections.community.general.plugins.modules.modprobe.Modprobe.modules_files'):
+ modprobe.modules_files = ['/etc/modules-load.d/dummy.conf']
- modprobe = Modprobe(module)
- with patch('ansible_collections.community.general.plugins.modules.modprobe.open', mock_open(read_data='')) as mocked_file:
- with patch('ansible_collections.community.general.plugins.modules.modprobe.Modprobe.modules_files'):
- modprobe.modules_files = ['/etc/modules-load.d/dummy.conf']
-
- assert not modprobe.module_is_loaded_persistently
+ assert not modprobe.module_is_loaded_persistently
mocked_file.assert_called_once_with('/etc/modules-load.d/dummy.conf')
def test_module_is_not_loaded_no_files(self):
- set_module_args(dict(
+ with set_module_args(dict(
name='dummy',
state='present',
persistent='present'
- ))
+ )):
+ module = build_module()
- module = build_module()
+ self.get_bin_path.side_effect = ['modprobe']
- self.get_bin_path.side_effect = ['modprobe']
+ modprobe = Modprobe(module)
+ with patch('ansible_collections.community.general.plugins.modules.modprobe.Modprobe.modules_files'):
+ modprobe.modules_files = []
- modprobe = Modprobe(module)
- with patch('ansible_collections.community.general.plugins.modules.modprobe.Modprobe.modules_files'):
- modprobe.modules_files = []
-
- assert not modprobe.module_is_loaded_persistently
+ assert not modprobe.module_is_loaded_persistently
class TestPermanentParams(ModuleTestCase):
@@ -251,24 +244,23 @@ class TestPermanentParams(ModuleTestCase):
]
mock_files_content = [mock_open(read_data=content).return_value for content in files_content]
- set_module_args(dict(
+ with set_module_args(dict(
name='dummy',
state='present',
persistent='present'
- ))
+ )):
+ module = build_module()
- module = build_module()
+ self.get_bin_path.side_effect = ['modprobe']
- self.get_bin_path.side_effect = ['modprobe']
+ modprobe = Modprobe(module)
- modprobe = Modprobe(module)
+ with patch('ansible_collections.community.general.plugins.modules.modprobe.open', mock_open()) as mocked_file:
+ mocked_file.side_effect = mock_files_content
+ with patch('ansible_collections.community.general.plugins.modules.modprobe.Modprobe.modprobe_files'):
+ modprobe.modprobe_files = ['/etc/modprobe.d/dummy1.conf', '/etc/modprobe.d/dummy2.conf']
- with patch('ansible_collections.community.general.plugins.modules.modprobe.open', mock_open()) as mocked_file:
- mocked_file.side_effect = mock_files_content
- with patch('ansible_collections.community.general.plugins.modules.modprobe.Modprobe.modprobe_files'):
- modprobe.modprobe_files = ['/etc/modprobe.d/dummy1.conf', '/etc/modprobe.d/dummy2.conf']
-
- assert modprobe.permanent_params == set(['numdummies=4', 'dummy_parameter1=6', 'dummy_parameter2=5'])
+ assert modprobe.permanent_params == set(['numdummies=4', 'dummy_parameter1=6', 'dummy_parameter2=5'])
def test_module_permanent_params_empty(self):
@@ -278,24 +270,23 @@ class TestPermanentParams(ModuleTestCase):
]
mock_files_content = [mock_open(read_data=content).return_value for content in files_content]
- set_module_args(dict(
+ with set_module_args(dict(
name='dummy',
state='present',
persistent='present'
- ))
+ )):
+ module = build_module()
- module = build_module()
+ self.get_bin_path.side_effect = ['modprobe']
- self.get_bin_path.side_effect = ['modprobe']
+ modprobe = Modprobe(module)
- modprobe = Modprobe(module)
+ with patch('ansible_collections.community.general.plugins.modules.modprobe.open', mock_open(read_data='')) as mocked_file:
+ mocked_file.side_effect = mock_files_content
+ with patch('ansible_collections.community.general.plugins.modules.modprobe.Modprobe.modprobe_files'):
+ modprobe.modprobe_files = ['/etc/modprobe.d/dummy1.conf', '/etc/modprobe.d/dummy2.conf']
- with patch('ansible_collections.community.general.plugins.modules.modprobe.open', mock_open(read_data='')) as mocked_file:
- mocked_file.side_effect = mock_files_content
- with patch('ansible_collections.community.general.plugins.modules.modprobe.Modprobe.modprobe_files'):
- modprobe.modprobe_files = ['/etc/modprobe.d/dummy1.conf', '/etc/modprobe.d/dummy2.conf']
-
- assert modprobe.permanent_params == set()
+ assert modprobe.permanent_params == set()
class TestCreateModuleFIle(ModuleTestCase):
@@ -314,22 +305,21 @@ class TestCreateModuleFIle(ModuleTestCase):
def test_create_file(self):
- set_module_args(dict(
+ with set_module_args(dict(
name='dummy',
state='present',
persistent='present'
- ))
+ )):
+ module = build_module()
- module = build_module()
+ self.get_bin_path.side_effect = ['modprobe']
- self.get_bin_path.side_effect = ['modprobe']
+ modprobe = Modprobe(module)
- modprobe = Modprobe(module)
-
- with patch('ansible_collections.community.general.plugins.modules.modprobe.open', mock_open()) as mocked_file:
- modprobe.create_module_file()
- mocked_file.assert_called_once_with('/etc/modules-load.d/dummy.conf', 'w')
- mocked_file().write.assert_called_once_with('dummy\n')
+ with patch('ansible_collections.community.general.plugins.modules.modprobe.open', mock_open()) as mocked_file:
+ modprobe.create_module_file()
+ mocked_file.assert_called_once_with('/etc/modules-load.d/dummy.conf', 'w')
+ mocked_file().write.assert_called_once_with('dummy\n')
class TestCreateModuleOptionsFIle(ModuleTestCase):
@@ -348,23 +338,22 @@ class TestCreateModuleOptionsFIle(ModuleTestCase):
def test_create_file(self):
- set_module_args(dict(
+ with set_module_args(dict(
name='dummy',
state='present',
params='numdummies=4',
persistent='present'
- ))
+ )):
+ module = build_module()
- module = build_module()
+ self.get_bin_path.side_effect = ['modprobe']
- self.get_bin_path.side_effect = ['modprobe']
+ modprobe = Modprobe(module)
- modprobe = Modprobe(module)
-
- with patch('ansible_collections.community.general.plugins.modules.modprobe.open', mock_open()) as mocked_file:
- modprobe.create_module_options_file()
- mocked_file.assert_called_once_with('/etc/modprobe.d/dummy.conf', 'w')
- mocked_file().write.assert_called_once_with('options dummy numdummies=4\n')
+ with patch('ansible_collections.community.general.plugins.modules.modprobe.open', mock_open()) as mocked_file:
+ modprobe.create_module_options_file()
+ mocked_file.assert_called_once_with('/etc/modprobe.d/dummy.conf', 'w')
+ mocked_file().write.assert_called_once_with('options dummy numdummies=4\n')
class TestDisableOldParams(ModuleTestCase):
@@ -384,47 +373,45 @@ class TestDisableOldParams(ModuleTestCase):
def test_disable_old_params_file_changed(self):
mock_data = 'options dummy numdummies=4'
- set_module_args(dict(
+ with set_module_args(dict(
name='dummy',
state='present',
params='numdummies=4',
persistent='present'
- ))
+ )):
+ module = build_module()
- module = build_module()
+ self.get_bin_path.side_effect = ['modprobe']
- self.get_bin_path.side_effect = ['modprobe']
+ modprobe = Modprobe(module)
- modprobe = Modprobe(module)
-
- with patch('ansible_collections.community.general.plugins.modules.modprobe.open', mock_open(read_data=mock_data)) as mocked_file:
- with patch('ansible_collections.community.general.plugins.modules.modprobe.Modprobe.modprobe_files'):
- modprobe.modprobe_files = ['/etc/modprobe.d/dummy1.conf']
- modprobe.disable_old_params()
- mocked_file.assert_called_with('/etc/modprobe.d/dummy1.conf', 'w')
- mocked_file().write.assert_called_once_with('#options dummy numdummies=4')
+ with patch('ansible_collections.community.general.plugins.modules.modprobe.open', mock_open(read_data=mock_data)) as mocked_file:
+ with patch('ansible_collections.community.general.plugins.modules.modprobe.Modprobe.modprobe_files'):
+ modprobe.modprobe_files = ['/etc/modprobe.d/dummy1.conf']
+ modprobe.disable_old_params()
+ mocked_file.assert_called_with('/etc/modprobe.d/dummy1.conf', 'w')
+ mocked_file().write.assert_called_once_with('#options dummy numdummies=4')
def test_disable_old_params_file_unchanged(self):
mock_data = 'options notdummy numdummies=4'
- set_module_args(dict(
+ with set_module_args(dict(
name='dummy',
state='present',
params='numdummies=4',
persistent='present'
- ))
+ )):
+ module = build_module()
- module = build_module()
+ self.get_bin_path.side_effect = ['modprobe']
- self.get_bin_path.side_effect = ['modprobe']
+ modprobe = Modprobe(module)
- modprobe = Modprobe(module)
-
- with patch('ansible_collections.community.general.plugins.modules.modprobe.open', mock_open(read_data=mock_data)) as mocked_file:
- with patch('ansible_collections.community.general.plugins.modules.modprobe.Modprobe.modprobe_files'):
- modprobe.modprobe_files = ['/etc/modprobe.d/dummy1.conf']
- modprobe.disable_old_params()
- mocked_file.assert_called_once_with('/etc/modprobe.d/dummy1.conf')
+ with patch('ansible_collections.community.general.plugins.modules.modprobe.open', mock_open(read_data=mock_data)) as mocked_file:
+ with patch('ansible_collections.community.general.plugins.modules.modprobe.Modprobe.modprobe_files'):
+ modprobe.modprobe_files = ['/etc/modprobe.d/dummy1.conf']
+ modprobe.disable_old_params()
+ mocked_file.assert_called_once_with('/etc/modprobe.d/dummy1.conf')
class TestDisableModulePermanent(ModuleTestCase):
@@ -443,43 +430,41 @@ class TestDisableModulePermanent(ModuleTestCase):
def test_disable_module_permanent_file_changed(self):
- set_module_args(dict(
+ with set_module_args(dict(
name='dummy',
state='present',
params='numdummies=4',
persistent='present'
- ))
+ )):
+ module = build_module()
- module = build_module()
+ self.get_bin_path.side_effect = ['modprobe']
- self.get_bin_path.side_effect = ['modprobe']
+ modprobe = Modprobe(module)
- modprobe = Modprobe(module)
-
- with patch('ansible_collections.community.general.plugins.modules.modprobe.open', mock_open(read_data='dummy')) as mocked_file:
- with patch('ansible_collections.community.general.plugins.modules.modprobe.Modprobe.modules_files'):
- modprobe.modules_files = ['/etc/modules-load.d/dummy.conf']
- modprobe.disable_module_permanent()
- mocked_file.assert_called_with('/etc/modules-load.d/dummy.conf', 'w')
- mocked_file().write.assert_called_once_with('#dummy')
+ with patch('ansible_collections.community.general.plugins.modules.modprobe.open', mock_open(read_data='dummy')) as mocked_file:
+ with patch('ansible_collections.community.general.plugins.modules.modprobe.Modprobe.modules_files'):
+ modprobe.modules_files = ['/etc/modules-load.d/dummy.conf']
+ modprobe.disable_module_permanent()
+ mocked_file.assert_called_with('/etc/modules-load.d/dummy.conf', 'w')
+ mocked_file().write.assert_called_once_with('#dummy')
def test_disable_module_permanent_file_unchanged(self):
- set_module_args(dict(
+ with set_module_args(dict(
name='dummy',
state='present',
params='numdummies=4',
persistent='present'
- ))
+ )):
+ module = build_module()
- module = build_module()
+ self.get_bin_path.side_effect = ['modprobe']
- self.get_bin_path.side_effect = ['modprobe']
+ modprobe = Modprobe(module)
- modprobe = Modprobe(module)
-
- with patch('ansible_collections.community.general.plugins.modules.modprobe.open', mock_open(read_data='notdummy')) as mocked_file:
- with patch('ansible_collections.community.general.plugins.modules.modprobe.Modprobe.modules_files'):
- modprobe.modules_files = ['/etc/modules-load.d/dummy.conf']
- modprobe.disable_module_permanent()
- mocked_file.assert_called_once_with('/etc/modules-load.d/dummy.conf')
+ with patch('ansible_collections.community.general.plugins.modules.modprobe.open', mock_open(read_data='notdummy')) as mocked_file:
+ with patch('ansible_collections.community.general.plugins.modules.modprobe.Modprobe.modules_files'):
+ modprobe.modules_files = ['/etc/modules-load.d/dummy.conf']
+ modprobe.disable_module_permanent()
+ mocked_file.assert_called_once_with('/etc/modules-load.d/dummy.conf')
diff --git a/tests/unit/plugins/modules/test_nomad_token.py b/tests/unit/plugins/modules/test_nomad_token.py
index 48f060f8be..7f9b5db96e 100644
--- a/tests/unit/plugins/modules/test_nomad_token.py
+++ b/tests/unit/plugins/modules/test_nomad_token.py
@@ -11,9 +11,7 @@ __metaclass__ = type
import nomad
from ansible_collections.community.general.plugins.modules import nomad_token
from ansible_collections.community.general.tests.unit.compat.mock import patch
-from ansible_collections.community.general.tests.unit.plugins.modules.utils import AnsibleExitJson, AnsibleFailJson, \
- ModuleTestCase, \
- set_module_args
+from ansible_collections.community.general.tests.unit.plugins.modules.utils import AnsibleExitJson, AnsibleFailJson, ModuleTestCase, set_module_args
def mock_acl_get_tokens(empty_list=False):
@@ -102,8 +100,8 @@ class TestNomadTokenModule(ModuleTestCase):
def test_should_fail_without_parameters(self):
with self.assertRaises(AnsibleFailJson):
- set_module_args({})
- self.module.main()
+ with set_module_args({}):
+ self.module.main()
def test_should_create_token_type_client(self):
module_args = {
@@ -113,12 +111,12 @@ class TestNomadTokenModule(ModuleTestCase):
'state': 'present'
}
- set_module_args(module_args)
- with patch.object(nomad.api.acl.Acl, 'get_tokens', return_value=mock_acl_get_tokens()) as mock_get_tokens:
- with patch.object(nomad.api.acl.Acl, 'create_token', return_value=mock_acl_create_update_token()) as \
- mock_create_update_token:
- with self.assertRaises(AnsibleExitJson):
- self.module.main()
+ with set_module_args(module_args):
+ with patch.object(nomad.api.acl.Acl, 'get_tokens', return_value=mock_acl_get_tokens()) as mock_get_tokens:
+ with patch.object(nomad.api.acl.Acl, 'create_token', return_value=mock_acl_create_update_token()) as \
+ mock_create_update_token:
+ with self.assertRaises(AnsibleExitJson):
+ self.module.main()
self.assertIs(mock_get_tokens.call_count, 1)
self.assertIs(mock_create_update_token.call_count, 1)
@@ -130,15 +128,15 @@ class TestNomadTokenModule(ModuleTestCase):
'state': 'present'
}
- set_module_args(module_args)
+ with set_module_args(module_args):
- with patch.object(nomad.api.acl.Acl, 'get_tokens') as mock_get_tokens:
- with patch.object(nomad.api.Acl, 'generate_bootstrap') as mock_generate_bootstrap:
- mock_get_tokens.return_value = mock_acl_get_tokens(empty_list=True)
- mock_generate_bootstrap.return_value = mock_acl_generate_bootstrap()
+ with patch.object(nomad.api.acl.Acl, 'get_tokens') as mock_get_tokens:
+ with patch.object(nomad.api.Acl, 'generate_bootstrap') as mock_generate_bootstrap:
+ mock_get_tokens.return_value = mock_acl_get_tokens(empty_list=True)
+ mock_generate_bootstrap.return_value = mock_acl_generate_bootstrap()
- with self.assertRaises(AnsibleExitJson):
- self.module.main()
+ with self.assertRaises(AnsibleExitJson):
+ self.module.main()
self.assertIs(mock_get_tokens.call_count, 1)
self.assertIs(mock_generate_bootstrap.call_count, 1)
@@ -149,14 +147,14 @@ class TestNomadTokenModule(ModuleTestCase):
'state': 'absent'
}
- set_module_args(module_args)
- with patch.object(nomad.api.acl.Acl, 'get_tokens') as mock_get_tokens:
- with patch.object(nomad.api.acl.Acl, 'delete_token') as mock_delete_token:
- mock_get_tokens.return_value = mock_acl_get_tokens()
- mock_delete_token.return_value = mock_acl_delete_token()
+ with set_module_args(module_args):
+ with patch.object(nomad.api.acl.Acl, 'get_tokens') as mock_get_tokens:
+ with patch.object(nomad.api.acl.Acl, 'delete_token') as mock_delete_token:
+ mock_get_tokens.return_value = mock_acl_get_tokens()
+ mock_delete_token.return_value = mock_acl_delete_token()
- with self.assertRaises(AnsibleFailJson):
- self.module.main()
+ with self.assertRaises(AnsibleFailJson):
+ self.module.main()
def test_should_fail_delete_bootstrap_token(self):
module_args = {
@@ -165,10 +163,10 @@ class TestNomadTokenModule(ModuleTestCase):
'state': 'absent'
}
- set_module_args(module_args)
+ with set_module_args(module_args):
- with self.assertRaises(AnsibleFailJson):
- self.module.main()
+ with self.assertRaises(AnsibleFailJson):
+ self.module.main()
def test_should_fail_delete_boostrap_token_by_name(self):
module_args = {
@@ -177,10 +175,10 @@ class TestNomadTokenModule(ModuleTestCase):
'state': 'absent'
}
- set_module_args(module_args)
+ with set_module_args(module_args):
- with self.assertRaises(AnsibleFailJson):
- self.module.main()
+ with self.assertRaises(AnsibleFailJson):
+ self.module.main()
def test_should_delete_client_token(self):
module_args = {
@@ -189,15 +187,15 @@ class TestNomadTokenModule(ModuleTestCase):
'state': 'absent'
}
- set_module_args(module_args)
+ with set_module_args(module_args):
- with patch.object(nomad.api.acl.Acl, 'get_tokens') as mock_get_tokens:
- with patch.object(nomad.api.acl.Acl, 'delete_token') as mock_delete_token:
- mock_get_tokens.return_value = mock_acl_get_tokens()
- mock_delete_token.return_value = mock_acl_delete_token()
+ with patch.object(nomad.api.acl.Acl, 'get_tokens') as mock_get_tokens:
+ with patch.object(nomad.api.acl.Acl, 'delete_token') as mock_delete_token:
+ mock_get_tokens.return_value = mock_acl_get_tokens()
+ mock_delete_token.return_value = mock_acl_delete_token()
- with self.assertRaises(AnsibleExitJson):
- self.module.main()
+ with self.assertRaises(AnsibleExitJson):
+ self.module.main()
self.assertIs(mock_delete_token.call_count, 1)
@@ -209,14 +207,14 @@ class TestNomadTokenModule(ModuleTestCase):
'state': 'present'
}
- set_module_args(module_args)
+ with set_module_args(module_args):
- with patch.object(nomad.api.acl.Acl, 'get_tokens') as mock_get_tokens:
- with patch.object(nomad.api.acl.Acl, 'update_token') as mock_create_update_token:
- mock_get_tokens.return_value = mock_acl_get_tokens()
- mock_create_update_token.return_value = mock_acl_create_update_token()
+ with patch.object(nomad.api.acl.Acl, 'get_tokens') as mock_get_tokens:
+ with patch.object(nomad.api.acl.Acl, 'update_token') as mock_create_update_token:
+ mock_get_tokens.return_value = mock_acl_get_tokens()
+ mock_create_update_token.return_value = mock_acl_create_update_token()
- with self.assertRaises(AnsibleExitJson):
- self.module.main()
+ with self.assertRaises(AnsibleExitJson):
+ self.module.main()
self.assertIs(mock_get_tokens.call_count, 1)
self.assertIs(mock_create_update_token.call_count, 1)
diff --git a/tests/unit/plugins/modules/test_npm.py b/tests/unit/plugins/modules/test_npm.py
index cc4d651726..df9bb5034a 100644
--- a/tests/unit/plugins/modules/test_npm.py
+++ b/tests/unit/plugins/modules/test_npm.py
@@ -34,17 +34,17 @@ class NPMModuleTestCase(ModuleTestCase):
return exc.exception.args[0]
def test_present(self):
- set_module_args({
+ with set_module_args({
'name': 'coffee-script',
'global': 'true',
'state': 'present'
- })
- self.module_main_command.side_effect = [
- (0, '{}', ''),
- (0, '{}', ''),
- ]
+ }):
+ self.module_main_command.side_effect = [
+ (0, '{}', ''),
+ (0, '{}', ''),
+ ]
- result = self.module_main(AnsibleExitJson)
+ result = self.module_main(AnsibleExitJson)
self.assertTrue(result['changed'])
self.module_main_command.assert_has_calls([
@@ -53,17 +53,17 @@ class NPMModuleTestCase(ModuleTestCase):
])
def test_present_missing(self):
- set_module_args({
+ with set_module_args({
'name': 'coffee-script',
'global': 'true',
'state': 'present',
- })
- self.module_main_command.side_effect = [
- (0, '{"dependencies": {"coffee-script": {"missing" : true}}}', ''),
- (0, '{}', ''),
- ]
+ }):
+ self.module_main_command.side_effect = [
+ (0, '{"dependencies": {"coffee-script": {"missing" : true}}}', ''),
+ (0, '{}', ''),
+ ]
- result = self.module_main(AnsibleExitJson)
+ result = self.module_main(AnsibleExitJson)
self.assertTrue(result['changed'])
self.module_main_command.assert_has_calls([
@@ -72,18 +72,18 @@ class NPMModuleTestCase(ModuleTestCase):
])
def test_present_version(self):
- set_module_args({
+ with set_module_args({
'name': 'coffee-script',
'global': 'true',
'state': 'present',
'version': '2.5.1'
- })
- self.module_main_command.side_effect = [
- (0, '{}', ''),
- (0, '{}', ''),
- ]
+ }):
+ self.module_main_command.side_effect = [
+ (0, '{}', ''),
+ (0, '{}', ''),
+ ]
- result = self.module_main(AnsibleExitJson)
+ result = self.module_main(AnsibleExitJson)
self.assertTrue(result['changed'])
self.module_main_command.assert_has_calls([
@@ -92,18 +92,18 @@ class NPMModuleTestCase(ModuleTestCase):
])
def test_present_version_update(self):
- set_module_args({
+ with set_module_args({
'name': 'coffee-script',
'global': 'true',
'state': 'present',
'version': '2.5.1'
- })
- self.module_main_command.side_effect = [
- (0, '{"dependencies": {"coffee-script": {"version" : "2.5.0"}}}', ''),
- (0, '{}', ''),
- ]
+ }):
+ self.module_main_command.side_effect = [
+ (0, '{"dependencies": {"coffee-script": {"version" : "2.5.0"}}}', ''),
+ (0, '{}', ''),
+ ]
- result = self.module_main(AnsibleExitJson)
+ result = self.module_main(AnsibleExitJson)
self.assertTrue(result['changed'])
self.module_main_command.assert_has_calls([
@@ -112,18 +112,18 @@ class NPMModuleTestCase(ModuleTestCase):
])
def test_present_version_exists(self):
- set_module_args({
+ with set_module_args({
'name': 'coffee-script',
'global': 'true',
'state': 'present',
'version': '2.5.1'
- })
- self.module_main_command.side_effect = [
- (0, '{"dependencies": {"coffee-script": {"version" : "2.5.1"}}}', ''),
- (0, '{}', ''),
- ]
+ }):
+ self.module_main_command.side_effect = [
+ (0, '{"dependencies": {"coffee-script": {"version" : "2.5.1"}}}', ''),
+ (0, '{}', ''),
+ ]
- result = self.module_main(AnsibleExitJson)
+ result = self.module_main(AnsibleExitJson)
self.assertFalse(result['changed'])
self.module_main_command.assert_has_calls([
@@ -131,17 +131,17 @@ class NPMModuleTestCase(ModuleTestCase):
])
def test_absent(self):
- set_module_args({
+ with set_module_args({
'name': 'coffee-script',
'global': 'true',
'state': 'absent'
- })
- self.module_main_command.side_effect = [
- (0, '{"dependencies": {"coffee-script": {"version" : "2.5.1"}}}', ''),
- (0, '{}', ''),
- ]
+ }):
+ self.module_main_command.side_effect = [
+ (0, '{"dependencies": {"coffee-script": {"version" : "2.5.1"}}}', ''),
+ (0, '{}', ''),
+ ]
- result = self.module_main(AnsibleExitJson)
+ result = self.module_main(AnsibleExitJson)
self.assertTrue(result['changed'])
self.module_main_command.assert_has_calls([
@@ -150,18 +150,18 @@ class NPMModuleTestCase(ModuleTestCase):
])
def test_absent_version(self):
- set_module_args({
+ with set_module_args({
'name': 'coffee-script',
'global': 'true',
'state': 'absent',
'version': '2.5.1'
- })
- self.module_main_command.side_effect = [
- (0, '{"dependencies": {"coffee-script": {"version" : "2.5.1"}}}', ''),
- (0, '{}', ''),
- ]
+ }):
+ self.module_main_command.side_effect = [
+ (0, '{"dependencies": {"coffee-script": {"version" : "2.5.1"}}}', ''),
+ (0, '{}', ''),
+ ]
- result = self.module_main(AnsibleExitJson)
+ result = self.module_main(AnsibleExitJson)
self.assertTrue(result['changed'])
self.module_main_command.assert_has_calls([
@@ -170,18 +170,18 @@ class NPMModuleTestCase(ModuleTestCase):
])
def test_absent_version_different(self):
- set_module_args({
+ with set_module_args({
'name': 'coffee-script',
'global': 'true',
'state': 'absent',
'version': '2.5.1'
- })
- self.module_main_command.side_effect = [
- (0, '{"dependencies": {"coffee-script": {"version" : "2.5.0"}}}', ''),
- (0, '{}', ''),
- ]
+ }):
+ self.module_main_command.side_effect = [
+ (0, '{"dependencies": {"coffee-script": {"version" : "2.5.0"}}}', ''),
+ (0, '{}', ''),
+ ]
- result = self.module_main(AnsibleExitJson)
+ result = self.module_main(AnsibleExitJson)
self.assertTrue(result['changed'])
self.module_main_command.assert_has_calls([
@@ -190,16 +190,16 @@ class NPMModuleTestCase(ModuleTestCase):
])
def test_present_package_json(self):
- set_module_args({
+ with set_module_args({
'global': 'true',
'state': 'present'
- })
- self.module_main_command.side_effect = [
- (0, '{}', ''),
- (0, '{}', ''),
- ]
+ }):
+ self.module_main_command.side_effect = [
+ (0, '{}', ''),
+ (0, '{}', ''),
+ ]
- result = self.module_main(AnsibleExitJson)
+ result = self.module_main(AnsibleExitJson)
self.assertTrue(result['changed'])
self.module_main_command.assert_has_calls([
@@ -207,17 +207,17 @@ class NPMModuleTestCase(ModuleTestCase):
])
def test_present_package_json_production(self):
- set_module_args({
+ with set_module_args({
'production': 'true',
'global': 'true',
'state': 'present',
- })
- self.module_main_command.side_effect = [
- (0, '{}', ''),
- (0, '{}', ''),
- ]
+ }):
+ self.module_main_command.side_effect = [
+ (0, '{}', ''),
+ (0, '{}', ''),
+ ]
- result = self.module_main(AnsibleExitJson)
+ result = self.module_main(AnsibleExitJson)
self.assertTrue(result['changed'])
self.module_main_command.assert_has_calls([
@@ -225,17 +225,17 @@ class NPMModuleTestCase(ModuleTestCase):
])
def test_present_package_json_ci(self):
- set_module_args({
+ with set_module_args({
'ci': 'true',
'global': 'true',
'state': 'present'
- })
- self.module_main_command.side_effect = [
- (0, '{}', ''),
- (0, '{}', ''),
- ]
+ }):
+ self.module_main_command.side_effect = [
+ (0, '{}', ''),
+ (0, '{}', ''),
+ ]
- result = self.module_main(AnsibleExitJson)
+ result = self.module_main(AnsibleExitJson)
self.assertTrue(result['changed'])
self.module_main_command.assert_has_calls([
@@ -243,18 +243,18 @@ class NPMModuleTestCase(ModuleTestCase):
])
def test_present_package_json_ci_production(self):
- set_module_args({
+ with set_module_args({
'ci': 'true',
'production': 'true',
'global': 'true',
'state': 'present'
- })
- self.module_main_command.side_effect = [
- (0, '{}', ''),
- (0, '{}', ''),
- ]
+ }):
+ self.module_main_command.side_effect = [
+ (0, '{}', ''),
+ (0, '{}', ''),
+ ]
- result = self.module_main(AnsibleExitJson)
+ result = self.module_main(AnsibleExitJson)
self.assertTrue(result['changed'])
self.module_main_command.assert_has_calls([
diff --git a/tests/unit/plugins/modules/test_ocapi_command.py b/tests/unit/plugins/modules/test_ocapi_command.py
index 3ce267c4e9..35fd928614 100644
--- a/tests/unit/plugins/modules/test_ocapi_command.py
+++ b/tests/unit/plugins/modules/test_ocapi_command.py
@@ -188,20 +188,20 @@ class TestOcapiCommand(unittest.TestCase):
def test_module_fail_when_required_args_missing(self):
with self.assertRaises(AnsibleFailJson) as ansible_fail_json:
- set_module_args({})
- module.main()
+ with set_module_args({}):
+ module.main()
self.assertIn("missing required arguments:", get_exception_message(ansible_fail_json))
def test_module_fail_when_unknown_category(self):
with self.assertRaises(AnsibleFailJson) as ansible_fail_json:
- set_module_args({
+ with set_module_args({
'category': 'unknown',
'command': 'IndicatorLedOn',
'username': 'USERID',
'password': 'PASSW0RD=21',
'baseuri': MOCK_BASE_URI
- })
- module.main()
+ }):
+ module.main()
self.assertIn("Invalid Category 'unknown", get_exception_message(ansible_fail_json))
def test_set_power_mode(self):
@@ -210,14 +210,14 @@ class TestOcapiCommand(unittest.TestCase):
get_request=mock_get_request,
put_request=mock_put_request):
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
- set_module_args({
+ with set_module_args({
'category': 'Chassis',
'command': 'PowerModeLow',
'baseuri': MOCK_BASE_URI,
'username': 'USERID',
'password': 'PASSWORD=21'
- })
- module.main()
+ }):
+ module.main()
self.assertEqual(ACTION_WAS_SUCCESSFUL, get_exception_message(ansible_exit_json))
self.assertTrue(is_changed(ansible_exit_json))
@@ -227,14 +227,14 @@ class TestOcapiCommand(unittest.TestCase):
get_request=mock_get_request,
put_request=mock_put_request):
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
- set_module_args({
+ with set_module_args({
'category': 'Chassis',
'command': 'IndicatorLedOn',
'baseuri': MOCK_BASE_URI,
'username': 'USERID',
'password': 'PASSWORD=21'
- })
- module.main()
+ }):
+ module.main()
self.assertEqual(ACTION_WAS_SUCCESSFUL, get_exception_message(ansible_exit_json))
self.assertTrue(is_changed(ansible_exit_json))
@@ -244,14 +244,14 @@ class TestOcapiCommand(unittest.TestCase):
get_request=mock_get_request,
put_request=mock_invalid_http_request):
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
- set_module_args({
+ with set_module_args({
'category': 'Chassis',
'command': 'PowerModeNormal',
'baseuri': MOCK_BASE_URI,
'username': 'USERID',
'password': 'PASSWORD=21'
- })
- module.main()
+ }):
+ module.main()
self.assertEqual(ACTION_WAS_SUCCESSFUL, get_exception_message(ansible_exit_json))
self.assertFalse(is_changed(ansible_exit_json))
@@ -261,15 +261,15 @@ class TestOcapiCommand(unittest.TestCase):
get_request=mock_get_request,
put_request=mock_invalid_http_request):
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
- set_module_args({
+ with set_module_args({
'category': 'Chassis',
'command': 'IndicatorLedOn',
'baseuri': MOCK_BASE_URI,
'username': 'USERID',
'password': 'PASSWORD=21',
'_ansible_check_mode': True
- })
- module.main()
+ }):
+ module.main()
self.assertEqual(UPDATE_NOT_PERFORMED_IN_CHECK_MODE, get_exception_message(ansible_exit_json))
self.assertTrue(is_changed(ansible_exit_json))
@@ -279,15 +279,15 @@ class TestOcapiCommand(unittest.TestCase):
get_request=mock_get_request,
put_request=mock_invalid_http_request):
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
- set_module_args({
+ with set_module_args({
'category': 'Chassis',
'command': 'IndicatorLedOn',
'baseuri': MOCK_BASE_URI,
'username': 'USERID',
'password': 'PASSWORD=21',
'_ansible_check_mode': True
- })
- module.main()
+ }):
+ module.main()
self.assertEqual(UPDATE_NOT_PERFORMED_IN_CHECK_MODE, get_exception_message(ansible_exit_json))
self.assertTrue(is_changed(ansible_exit_json))
@@ -297,14 +297,14 @@ class TestOcapiCommand(unittest.TestCase):
get_request=mock_get_request,
put_request=mock_invalid_http_request):
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
- set_module_args({
+ with set_module_args({
'category': 'Chassis',
'command': 'IndicatorLedOff',
'baseuri': MOCK_BASE_URI,
'username': 'USERID',
'password': 'PASSWORD=21'
- })
- module.main()
+ }):
+ module.main()
self.assertEqual(ACTION_WAS_SUCCESSFUL, get_exception_message(ansible_exit_json))
self.assertFalse(is_changed(ansible_exit_json))
@@ -314,15 +314,15 @@ class TestOcapiCommand(unittest.TestCase):
get_request=mock_get_request,
put_request=mock_invalid_http_request):
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
- set_module_args({
+ with set_module_args({
'category': 'Chassis',
'command': 'IndicatorLedOff',
'baseuri': MOCK_BASE_URI,
'username': 'USERID',
'password': 'PASSWORD=21',
"_ansible_check_mode": True
- })
- module.main()
+ }):
+ module.main()
self.assertEqual(NO_ACTION_PERFORMED_IN_CHECK_MODE, get_exception_message(ansible_exit_json))
self.assertFalse(is_changed(ansible_exit_json))
@@ -331,14 +331,14 @@ class TestOcapiCommand(unittest.TestCase):
get_request=mock_get_request,
put_request=mock_put_request):
with self.assertRaises(AnsibleFailJson) as ansible_fail_json:
- set_module_args({
+ with set_module_args({
'category': 'Chassis',
'command': 'IndicatorLedBright',
'baseuri': MOCK_BASE_URI,
'username': 'USERID',
'password': 'PASSWORD=21'
- })
- module.main()
+ }):
+ module.main()
self.assertIn("Invalid Command", get_exception_message(ansible_fail_json))
def test_reset_enclosure(self):
@@ -346,14 +346,14 @@ class TestOcapiCommand(unittest.TestCase):
get_request=mock_get_request,
put_request=mock_put_request):
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
- set_module_args({
+ with set_module_args({
'category': 'Systems',
'command': 'PowerGracefulRestart',
'baseuri': MOCK_BASE_URI,
'username': 'USERID',
'password': 'PASSWORD=21'
- })
- module.main()
+ }):
+ module.main()
self.assertEqual(ACTION_WAS_SUCCESSFUL, get_exception_message(ansible_exit_json))
self.assertTrue(is_changed(ansible_exit_json))
@@ -362,15 +362,15 @@ class TestOcapiCommand(unittest.TestCase):
get_request=mock_get_request,
put_request=mock_invalid_http_request):
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
- set_module_args({
+ with set_module_args({
'category': 'Systems',
'command': 'PowerGracefulRestart',
'baseuri': MOCK_BASE_URI,
'username': 'USERID',
'password': 'PASSWORD=21',
"_ansible_check_mode": True
- })
- module.main()
+ }):
+ module.main()
self.assertEqual(UPDATE_NOT_PERFORMED_IN_CHECK_MODE, get_exception_message(ansible_exit_json))
self.assertTrue(is_changed(ansible_exit_json))
@@ -379,14 +379,14 @@ class TestOcapiCommand(unittest.TestCase):
get_request=mock_get_request,
put_request=mock_put_request):
with self.assertRaises(AnsibleFailJson) as ansible_fail_json:
- set_module_args({
+ with set_module_args({
'category': 'Update',
'command': 'FWUpload',
'baseuri': MOCK_BASE_URI,
'username': 'USERID',
'password': 'PASSWORD=21'
- })
- module.main()
+ }):
+ module.main()
self.assertEqual("Missing update_image_path.", get_exception_message(ansible_fail_json))
def test_firmware_upload_file_not_found(self):
@@ -394,15 +394,15 @@ class TestOcapiCommand(unittest.TestCase):
get_request=mock_get_request,
put_request=mock_invalid_http_request):
with self.assertRaises(AnsibleFailJson) as ansible_fail_json:
- set_module_args({
+ with set_module_args({
'category': 'Update',
'command': 'FWUpload',
'update_image_path': 'nonexistentfile.bin',
'baseuri': MOCK_BASE_URI,
'username': 'USERID',
'password': 'PASSWORD=21'
- })
- module.main()
+ }):
+ module.main()
self.assertEqual("File does not exist.", get_exception_message(ansible_fail_json))
def test_firmware_upload(self):
@@ -417,15 +417,15 @@ class TestOcapiCommand(unittest.TestCase):
put_request=mock_put_request,
post_request=mock_post_request):
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
- set_module_args({
+ with set_module_args({
'category': 'Update',
'command': 'FWUpload',
'update_image_path': filepath,
'baseuri': MOCK_BASE_URI,
'username': 'USERID',
'password': 'PASSWORD=21'
- })
- module.main()
+ }):
+ module.main()
self.assertEqual(ACTION_WAS_SUCCESSFUL, get_exception_message(ansible_exit_json))
self.assertTrue(is_changed(ansible_exit_json))
@@ -441,7 +441,7 @@ class TestOcapiCommand(unittest.TestCase):
put_request=mock_put_request,
post_request=mock_invalid_http_request):
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
- set_module_args({
+ with set_module_args({
'category': 'Update',
'command': 'FWUpload',
'update_image_path': filepath,
@@ -449,8 +449,8 @@ class TestOcapiCommand(unittest.TestCase):
'username': 'USERID',
'password': 'PASSWORD=21',
"_ansible_check_mode": True
- })
- module.main()
+ }):
+ module.main()
self.assertEqual(UPDATE_NOT_PERFORMED_IN_CHECK_MODE, get_exception_message(ansible_exit_json))
self.assertTrue(is_changed(ansible_exit_json))
@@ -460,14 +460,14 @@ class TestOcapiCommand(unittest.TestCase):
put_request=mock_put_request,
post_request=mock_invalid_http_request):
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
- set_module_args({
+ with set_module_args({
'category': 'Update',
'command': 'FWUpdate',
'baseuri': MOCK_BASE_URI,
'username': 'USERID',
'password': 'PASSWORD=21'
- })
- module.main()
+ }):
+ module.main()
self.assertEqual(ACTION_WAS_SUCCESSFUL, get_exception_message(ansible_exit_json))
self.assertTrue(is_changed(ansible_exit_json))
@@ -477,15 +477,15 @@ class TestOcapiCommand(unittest.TestCase):
put_request=mock_invalid_http_request,
post_request=mock_invalid_http_request):
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
- set_module_args({
+ with set_module_args({
'category': 'Update',
'command': 'FWUpdate',
'baseuri': MOCK_BASE_URI,
'username': 'USERID',
'password': 'PASSWORD=21',
"_ansible_check_mode": True
- })
- module.main()
+ }):
+ module.main()
self.assertEqual(UPDATE_NOT_PERFORMED_IN_CHECK_MODE, get_exception_message(ansible_exit_json))
self.assertTrue(is_changed(ansible_exit_json))
@@ -495,14 +495,14 @@ class TestOcapiCommand(unittest.TestCase):
put_request=mock_put_request,
post_request=mock_invalid_http_request):
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
- set_module_args({
+ with set_module_args({
'category': 'Update',
'command': 'FWActivate',
'baseuri': MOCK_BASE_URI,
'username': 'USERID',
'password': 'PASSWORD=21'
- })
- module.main()
+ }):
+ module.main()
self.assertEqual(ACTION_WAS_SUCCESSFUL, get_exception_message(ansible_exit_json))
self.assertTrue(is_changed(ansible_exit_json))
@@ -512,15 +512,15 @@ class TestOcapiCommand(unittest.TestCase):
put_request=mock_invalid_http_request,
post_request=mock_invalid_http_request):
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
- set_module_args({
+ with set_module_args({
'category': 'Update',
'command': 'FWActivate',
'baseuri': MOCK_BASE_URI,
'username': 'USERID',
'password': 'PASSWORD=21',
"_ansible_check_mode": True
- })
- module.main()
+ }):
+ module.main()
self.assertEqual(UPDATE_NOT_PERFORMED_IN_CHECK_MODE, get_exception_message(ansible_exit_json))
self.assertTrue(is_changed(ansible_exit_json))
@@ -531,15 +531,15 @@ class TestOcapiCommand(unittest.TestCase):
put_request=mock_invalid_http_request,
post_request=mock_invalid_http_request):
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
- set_module_args({
+ with set_module_args({
'category': 'Jobs',
'command': 'DeleteJob',
'baseuri': MOCK_BASE_URI,
'job_name': MOCK_JOB_NAME,
'username': 'USERID',
'password': 'PASSWORD=21'
- })
- module.main()
+ }):
+ module.main()
self.assertEqual(ACTION_WAS_SUCCESSFUL, get_exception_message(ansible_exit_json))
self.assertTrue(is_changed(ansible_exit_json))
@@ -550,15 +550,15 @@ class TestOcapiCommand(unittest.TestCase):
put_request=mock_invalid_http_request,
post_request=mock_invalid_http_request):
with self.assertRaises(AnsibleFailJson) as ansible_fail_json:
- set_module_args({
+ with set_module_args({
'category': 'Jobs',
'command': 'DeleteJob',
'baseuri': MOCK_BASE_URI,
'job_name': MOCK_JOB_NAME,
'username': 'USERID',
'password': 'PASSWORD=21'
- })
- module.main()
+ }):
+ module.main()
self.assertEqual("Cannot delete job because it is in progress.", get_exception_message(ansible_fail_json))
def test_delete_job_in_progress_only_on_delete(self):
@@ -568,15 +568,15 @@ class TestOcapiCommand(unittest.TestCase):
put_request=mock_invalid_http_request,
post_request=mock_invalid_http_request):
with self.assertRaises(AnsibleFailJson) as ansible_fail_json:
- set_module_args({
+ with set_module_args({
'category': 'Jobs',
'command': 'DeleteJob',
'baseuri': MOCK_BASE_URI,
'job_name': MOCK_JOB_NAME,
'username': 'USERID',
'password': 'PASSWORD=21'
- })
- module.main()
+ }):
+ module.main()
self.assertEqual("Cannot delete job because it is in progress.", get_exception_message(ansible_fail_json))
def test_delete_job_check_mode(self):
@@ -586,7 +586,7 @@ class TestOcapiCommand(unittest.TestCase):
put_request=mock_invalid_http_request,
post_request=mock_invalid_http_request):
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
- set_module_args({
+ with set_module_args({
'category': 'Jobs',
'command': 'DeleteJob',
'baseuri': MOCK_BASE_URI,
@@ -594,8 +594,8 @@ class TestOcapiCommand(unittest.TestCase):
'username': 'USERID',
'password': 'PASSWORD=21',
'_ansible_check_mode': True
- })
- module.main()
+ }):
+ module.main()
self.assertEqual(UPDATE_NOT_PERFORMED_IN_CHECK_MODE, get_exception_message(ansible_exit_json))
self.assertTrue(is_changed(ansible_exit_json))
@@ -606,7 +606,7 @@ class TestOcapiCommand(unittest.TestCase):
put_request=mock_invalid_http_request,
post_request=mock_invalid_http_request):
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
- set_module_args({
+ with set_module_args({
'category': 'Jobs',
'command': 'DeleteJob',
'baseuri': MOCK_BASE_URI,
@@ -614,8 +614,8 @@ class TestOcapiCommand(unittest.TestCase):
'username': 'USERID',
'password': 'PASSWORD=21',
'_ansible_check_mode': True
- })
- module.main()
+ }):
+ module.main()
self.assertEqual("Job already deleted.", get_exception_message(ansible_exit_json))
self.assertFalse(is_changed(ansible_exit_json))
@@ -626,7 +626,7 @@ class TestOcapiCommand(unittest.TestCase):
put_request=mock_invalid_http_request,
post_request=mock_invalid_http_request):
with self.assertRaises(AnsibleFailJson) as ansible_fail_json:
- set_module_args({
+ with set_module_args({
'category': 'Jobs',
'command': 'DeleteJob',
'baseuri': MOCK_BASE_URI,
@@ -634,6 +634,6 @@ class TestOcapiCommand(unittest.TestCase):
'username': 'USERID',
'password': 'PASSWORD=21',
'_ansible_check_mode': True
- })
- module.main()
+ }):
+ module.main()
self.assertEqual("Cannot delete job because it is in progress.", get_exception_message(ansible_fail_json))
diff --git a/tests/unit/plugins/modules/test_ocapi_info.py b/tests/unit/plugins/modules/test_ocapi_info.py
index 5010b328f8..01864570c6 100644
--- a/tests/unit/plugins/modules/test_ocapi_info.py
+++ b/tests/unit/plugins/modules/test_ocapi_info.py
@@ -127,32 +127,32 @@ class TestOcapiInfo(unittest.TestCase):
def test_module_fail_when_required_args_missing(self):
with self.assertRaises(AnsibleFailJson) as ansible_fail_json:
- set_module_args({})
- module.main()
+ with set_module_args({}):
+ module.main()
self.assertIn("missing required arguments:", get_exception_message(ansible_fail_json))
def test_module_fail_when_unknown_category(self):
with self.assertRaises(AnsibleFailJson) as ansible_fail_json:
- set_module_args({
+ with set_module_args({
'category': 'unknown',
'command': 'JobStatus',
'username': 'USERID',
'password': 'PASSW0RD=21',
'baseuri': MOCK_BASE_URI
- })
- module.main()
+ }):
+ module.main()
self.assertIn("Invalid Category 'unknown", get_exception_message(ansible_fail_json))
def test_module_fail_when_unknown_command(self):
with self.assertRaises(AnsibleFailJson) as ansible_fail_json:
- set_module_args({
+ with set_module_args({
'category': 'Jobs',
'command': 'unknown',
'username': 'USERID',
'password': 'PASSW0RD=21',
'baseuri': MOCK_BASE_URI
- })
- module.main()
+ }):
+ module.main()
self.assertIn("Invalid Command 'unknown", get_exception_message(ansible_fail_json))
def test_job_status_in_progress(self):
@@ -162,15 +162,15 @@ class TestOcapiInfo(unittest.TestCase):
delete_request=mock_delete_request,
post_request=mock_post_request):
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
- set_module_args({
+ with set_module_args({
'category': 'Jobs',
'command': 'JobStatus',
'job_name': MOCK_JOB_NAME_IN_PROGRESS,
'baseuri': MOCK_BASE_URI,
'username': 'USERID',
'password': 'PASSWORD=21'
- })
- module.main()
+ }):
+ module.main()
self.assertEqual(ACTION_WAS_SUCCESSFUL, get_exception_message(ansible_exit_json))
response_data = ansible_exit_json.exception.args[0]
self.assertEqual(MOCK_HTTP_RESPONSE_JOB_IN_PROGRESS["data"]["PercentComplete"], response_data["percentComplete"])
@@ -190,15 +190,15 @@ class TestOcapiInfo(unittest.TestCase):
delete_request=mock_delete_request,
post_request=mock_post_request):
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
- set_module_args({
+ with set_module_args({
'category': 'Jobs',
'command': 'JobStatus',
'job_name': MOCK_JOB_NAME_COMPLETE,
'baseuri': MOCK_BASE_URI,
'username': 'USERID',
'password': 'PASSWORD=21'
- })
- module.main()
+ }):
+ module.main()
self.assertEqual(ACTION_WAS_SUCCESSFUL, get_exception_message(ansible_exit_json))
response_data = ansible_exit_json.exception.args[0]
self.assertEqual(MOCK_HTTP_RESPONSE_JOB_COMPLETE["data"]["PercentComplete"], response_data["percentComplete"])
@@ -218,15 +218,15 @@ class TestOcapiInfo(unittest.TestCase):
delete_request=mock_delete_request,
post_request=mock_post_request):
with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
- set_module_args({
+ with set_module_args({
'category': 'Jobs',
'command': 'JobStatus',
'job_name': MOCK_JOB_NAME_DOES_NOT_EXIST,
'baseuri': MOCK_BASE_URI,
'username': 'USERID',
'password': 'PASSWORD=21'
- })
- module.main()
+ }):
+ module.main()
self.assertEqual(ACTION_WAS_SUCCESSFUL, get_exception_message(ansible_exit_json))
response_data = ansible_exit_json.exception.args[0]
self.assertFalse(response_data["jobExists"])
diff --git a/tests/unit/plugins/modules/test_pacman.py b/tests/unit/plugins/modules/test_pacman.py
index 04ff5bb3e8..4533700e05 100644
--- a/tests/unit/plugins/modules/test_pacman.py
+++ b/tests/unit/plugins/modules/test_pacman.py
@@ -152,25 +152,25 @@ class TestPacman:
def test_fail_without_required_args(self):
with pytest.raises(AnsibleFailJson) as e:
- set_module_args({})
- pacman.main()
+ with set_module_args({}):
+ pacman.main()
assert e.match(r"one of the following is required")
def test_success(self, mock_empty_inventory):
- set_module_args({"update_cache": True}) # Simplest args to let init go through
- P = pacman.Pacman(pacman.setup_module())
- with pytest.raises(AnsibleExitJson) as e:
- P.success()
+ with set_module_args({"update_cache": True}): # Simplest args to let init go through
+ P = pacman.Pacman(pacman.setup_module())
+ with pytest.raises(AnsibleExitJson) as e:
+ P.success()
def test_fail(self, mock_empty_inventory):
- set_module_args({"update_cache": True})
- P = pacman.Pacman(pacman.setup_module())
+ with set_module_args({"update_cache": True}):
+ P = pacman.Pacman(pacman.setup_module())
- args = dict(
- msg="msg", stdout="something", stderr="somethingelse", cmd=["command", "with", "args"], rc=1
- )
- with pytest.raises(AnsibleFailJson) as e:
- P.fail(**args)
+ args = dict(
+ msg="msg", stdout="something", stderr="somethingelse", cmd=["command", "with", "args"], rc=1
+ )
+ with pytest.raises(AnsibleFailJson) as e:
+ P.fail(**args)
assert all(item in e.value.args[0] for item in args)
@@ -333,33 +333,33 @@ class TestPacman:
def test_build_inventory(self, expected, run_command_side_effect, raises):
self.mock_run_command.side_effect = run_command_side_effect
- set_module_args({"update_cache": True})
- if raises:
- with pytest.raises(raises):
+ with set_module_args({"update_cache": True}):
+ if raises:
+ with pytest.raises(raises):
+ P = pacman.Pacman(pacman.setup_module())
+ P._build_inventory()
+ else:
P = pacman.Pacman(pacman.setup_module())
- P._build_inventory()
- else:
- P = pacman.Pacman(pacman.setup_module())
- assert P._build_inventory() == expected
+ assert P._build_inventory() == expected
@pytest.mark.parametrize("check_mode_value", [True, False])
def test_upgrade_check_empty_inventory(self, mock_empty_inventory, check_mode_value):
- set_module_args({"upgrade": True, "_ansible_check_mode": check_mode_value})
- P = pacman.Pacman(pacman.setup_module())
- with pytest.raises(AnsibleExitJson) as e:
- P.run()
- self.mock_run_command.call_count == 0
+ with set_module_args({"upgrade": True, "_ansible_check_mode": check_mode_value}):
+ P = pacman.Pacman(pacman.setup_module())
+ with pytest.raises(AnsibleExitJson) as e:
+ P.run()
+ assert self.mock_run_command.call_count == 0
out = e.value.args[0]
assert "packages" not in out
assert not out["changed"]
assert "diff" not in out
def test_update_db_check(self, mock_empty_inventory):
- set_module_args({"update_cache": True, "_ansible_check_mode": True})
- P = pacman.Pacman(pacman.setup_module())
+ with set_module_args({"update_cache": True, "_ansible_check_mode": True}):
+ P = pacman.Pacman(pacman.setup_module())
- with pytest.raises(AnsibleExitJson) as e:
- P.run()
+ with pytest.raises(AnsibleExitJson) as e:
+ P.run()
self.mock_run_command.call_count == 0
out = e.value.args[0]
assert "packages" not in out
@@ -422,14 +422,14 @@ class TestPacman:
def test_update_db(self, module_args, expected_calls, changed):
args = {"update_cache": True}
args.update(module_args)
- set_module_args(args)
+ with set_module_args(args):
- self.mock_run_command.side_effect = [
- (rc, stdout, stderr) for expected_call, kwargs, rc, stdout, stderr in expected_calls
- ]
- with pytest.raises(AnsibleExitJson) as e:
- P = pacman.Pacman(pacman.setup_module())
- P.run()
+ self.mock_run_command.side_effect = [
+ (rc, stdout, stderr) for expected_call, kwargs, rc, stdout, stderr in expected_calls
+ ]
+ with pytest.raises(AnsibleExitJson) as e:
+ P = pacman.Pacman(pacman.setup_module())
+ P.run()
self.mock_run_command.assert_has_calls([
mock.call(mock.ANY, expected_call, **kwargs) for expected_call, kwargs, rc, stdout, stderr in expected_calls
@@ -475,16 +475,16 @@ class TestPacman:
args = {"upgrade": True, "_ansible_check_mode": check_mode_value}
if upgrade_extra_args:
args["upgrade_extra_args"] = upgrade_extra_args
- set_module_args(args)
+ with set_module_args(args):
- if run_command_data and "return_value" in run_command_data:
- self.mock_run_command.return_value = run_command_data["return_value"]
+ if run_command_data and "return_value" in run_command_data:
+ self.mock_run_command.return_value = run_command_data["return_value"]
- P = pacman.Pacman(pacman.setup_module())
+ P = pacman.Pacman(pacman.setup_module())
- with pytest.raises(AnsibleExitJson) as e:
- P.run()
- out = e.value.args[0]
+ with pytest.raises(AnsibleExitJson) as e:
+ P.run()
+ out = e.value.args[0]
if check_mode_value:
self.mock_run_command.call_count == 0
@@ -499,13 +499,13 @@ class TestPacman:
assert out["diff"]["before"] and out["diff"]["after"]
def test_upgrade_fail(self, mock_valid_inventory):
- set_module_args({"upgrade": True})
- self.mock_run_command.return_value = [1, "stdout", "stderr"]
- P = pacman.Pacman(pacman.setup_module())
+ with set_module_args({"upgrade": True}):
+ self.mock_run_command.return_value = [1, "stdout", "stderr"]
+ P = pacman.Pacman(pacman.setup_module())
- with pytest.raises(AnsibleFailJson) as e:
- P.run()
- self.mock_run_command.call_count == 1
+ with pytest.raises(AnsibleFailJson) as e:
+ P.run()
+ assert self.mock_run_command.call_count == 1
out = e.value.args[0]
assert out["failed"]
assert out["stdout"] == "stdout"
@@ -633,19 +633,19 @@ class TestPacman:
def test_package_list(
self, mock_valid_inventory, state, pkg_names, expected, run_command_data, raises
):
- set_module_args({"name": pkg_names, "state": state})
- P = pacman.Pacman(pacman.setup_module())
- P.inventory = P._build_inventory()
- if run_command_data:
- self.mock_run_command.side_effect = run_command_data["side_effect"]
-
- if raises:
- with pytest.raises(raises):
- P.package_list()
- else:
- assert sorted(P.package_list()) == sorted(expected)
+ with set_module_args({"name": pkg_names, "state": state}):
+ P = pacman.Pacman(pacman.setup_module())
+ P.inventory = P._build_inventory()
if run_command_data:
- assert self.mock_run_command.mock_calls == run_command_data["calls"]
+ self.mock_run_command.side_effect = run_command_data["side_effect"]
+
+ if raises:
+ with pytest.raises(raises):
+ P.package_list()
+ else:
+ assert sorted(P.package_list()) == sorted(expected)
+ if run_command_data:
+ assert self.mock_run_command.mock_calls == run_command_data["calls"]
@pytest.mark.parametrize("check_mode_value", [True, False])
@pytest.mark.parametrize(
@@ -658,11 +658,11 @@ class TestPacman:
def test_op_packages_nothing_to_do(
self, mock_valid_inventory, mock_package_list, check_mode_value, name, state, package_list
):
- set_module_args({"name": name, "state": state, "_ansible_check_mode": check_mode_value})
- mock_package_list.return_value = package_list
- P = pacman.Pacman(pacman.setup_module())
- with pytest.raises(AnsibleExitJson) as e:
- P.run()
+ with set_module_args({"name": name, "state": state, "_ansible_check_mode": check_mode_value}):
+ mock_package_list.return_value = package_list
+ P = pacman.Pacman(pacman.setup_module())
+ with pytest.raises(AnsibleExitJson) as e:
+ P.run()
out = e.value.args[0]
assert not out["changed"]
assert "packages" in out
@@ -1079,13 +1079,13 @@ class TestPacman:
run_command_data,
raises,
):
- set_module_args(module_args)
- self.mock_run_command.side_effect = run_command_data["side_effect"]
- mock_package_list.return_value = package_list_out
+ with set_module_args(module_args):
+ self.mock_run_command.side_effect = run_command_data["side_effect"]
+ mock_package_list.return_value = package_list_out
- P = pacman.Pacman(pacman.setup_module())
- with pytest.raises(raises) as e:
- P.run()
+ P = pacman.Pacman(pacman.setup_module())
+ with pytest.raises(raises) as e:
+ P.run()
out = e.value.args[0]
assert self.mock_run_command.mock_calls == run_command_data["calls"]
diff --git a/tests/unit/plugins/modules/test_pagerduty_alert.py b/tests/unit/plugins/modules/test_pagerduty_alert.py
index 7a1e951a24..612c134dc7 100644
--- a/tests/unit/plugins/modules/test_pagerduty_alert.py
+++ b/tests/unit/plugins/modules/test_pagerduty_alert.py
@@ -64,22 +64,22 @@ class TestPagerDutyAlertModule(ModuleTestCase):
def test_module_fail_when_required_args_missing(self):
with self.assertRaises(AnsibleFailJson):
- set_module_args({})
- self.module.main()
+ with set_module_args({}):
+ self.module.main()
def test_ensure_alert_created_with_minimal_data(self):
- set_module_args({
+ with set_module_args({
'state': 'triggered',
'api_version': 'v2',
'integration_key': 'test',
'source': 'My Ansible Script',
'desc': 'Description for alert'
- })
+ }):
- with patch.object(pagerduty_alert, 'fetch_url') as fetch_url_mock:
- fetch_url_mock.return_value = (Response(), {"status": 202})
- with self.assertRaises(AnsibleExitJson):
- self.module.main()
+ with patch.object(pagerduty_alert, 'fetch_url') as fetch_url_mock:
+ fetch_url_mock.return_value = (Response(), {"status": 202})
+ with self.assertRaises(AnsibleExitJson):
+ self.module.main()
assert fetch_url_mock.call_count == 1
url = fetch_url_mock.call_args[0][1]
@@ -95,7 +95,7 @@ class TestPagerDutyAlertModule(ModuleTestCase):
assert data['payload']['timestamp'] is not None
def test_ensure_alert_created_with_full_data(self):
- set_module_args({
+ with set_module_args({
'api_version': 'v2',
'component': 'mysql',
'custom_details': {'environment': 'production', 'notes': 'this is a test note'},
@@ -106,12 +106,12 @@ class TestPagerDutyAlertModule(ModuleTestCase):
'link_text': 'PagerDuty',
'state': 'triggered',
'source': 'My Ansible Script',
- })
+ }):
- with patch.object(pagerduty_alert, 'fetch_url') as fetch_url_mock:
- fetch_url_mock.return_value = (Response(), {"status": 202})
- with self.assertRaises(AnsibleExitJson):
- self.module.main()
+ with patch.object(pagerduty_alert, 'fetch_url') as fetch_url_mock:
+ fetch_url_mock.return_value = (Response(), {"status": 202})
+ with self.assertRaises(AnsibleExitJson):
+ self.module.main()
assert fetch_url_mock.call_count == 1
url = fetch_url_mock.call_args[0][1]
@@ -130,17 +130,17 @@ class TestPagerDutyAlertModule(ModuleTestCase):
assert data['links'][0]['text'] == 'PagerDuty'
def test_ensure_alert_acknowledged(self):
- set_module_args({
+ with set_module_args({
'state': 'acknowledged',
'api_version': 'v2',
'integration_key': 'test',
'incident_key': 'incident_test_id',
- })
+ }):
- with patch.object(pagerduty_alert, 'fetch_url') as fetch_url_mock:
- fetch_url_mock.return_value = (Response(), {"status": 202})
- with self.assertRaises(AnsibleExitJson):
- self.module.main()
+ with patch.object(pagerduty_alert, 'fetch_url') as fetch_url_mock:
+ fetch_url_mock.return_value = (Response(), {"status": 202})
+ with self.assertRaises(AnsibleExitJson):
+ self.module.main()
assert fetch_url_mock.call_count == 1
url = fetch_url_mock.call_args[0][1]
diff --git a/tests/unit/plugins/modules/test_pagerduty_change.py b/tests/unit/plugins/modules/test_pagerduty_change.py
index d596d6ab83..b4632da7ff 100644
--- a/tests/unit/plugins/modules/test_pagerduty_change.py
+++ b/tests/unit/plugins/modules/test_pagerduty_change.py
@@ -26,19 +26,19 @@ class TestPagerDutyChangeModule(ModuleTestCase):
def test_module_fail_when_required_args_missing(self):
with self.assertRaises(AnsibleFailJson):
- set_module_args({})
- self.module.main()
+ with set_module_args({}):
+ self.module.main()
def test_ensure_change_event_created_with_minimal_data(self):
- set_module_args({
+ with set_module_args({
'integration_key': 'test',
'summary': 'Testing'
- })
+ }):
- with patch.object(pagerduty_change, 'fetch_url') as fetch_url_mock:
- fetch_url_mock.return_value = (None, {"status": 202})
- with self.assertRaises(AnsibleExitJson):
- self.module.main()
+ with patch.object(pagerduty_change, 'fetch_url') as fetch_url_mock:
+ fetch_url_mock.return_value = (None, {"status": 202})
+ with self.assertRaises(AnsibleExitJson):
+ self.module.main()
assert fetch_url_mock.call_count == 1
url = fetch_url_mock.call_args[0][1]
@@ -51,7 +51,7 @@ class TestPagerDutyChangeModule(ModuleTestCase):
assert data['payload']['source'] == 'Ansible'
def test_ensure_change_event_created_with_full_data(self):
- set_module_args({
+ with set_module_args({
'integration_key': 'test',
'summary': 'Testing',
'source': 'My Ansible Script',
@@ -61,12 +61,12 @@ class TestPagerDutyChangeModule(ModuleTestCase):
'environment': 'production',
'link_url': 'https://pagerduty.com',
'link_text': 'PagerDuty'
- })
+ }):
- with patch.object(pagerduty_change, 'fetch_url') as fetch_url_mock:
- fetch_url_mock.return_value = (None, {"status": 202})
- with self.assertRaises(AnsibleExitJson):
- self.module.main()
+ with patch.object(pagerduty_change, 'fetch_url') as fetch_url_mock:
+ fetch_url_mock.return_value = (None, {"status": 202})
+ with self.assertRaises(AnsibleExitJson):
+ self.module.main()
assert fetch_url_mock.call_count == 1
url = fetch_url_mock.call_args[0][1]
diff --git a/tests/unit/plugins/modules/test_parted.py b/tests/unit/plugins/modules/test_parted.py
index 1e010343bd..46c08bd1e7 100644
--- a/tests/unit/plugins/modules/test_parted.py
+++ b/tests/unit/plugins/modules/test_parted.py
@@ -187,93 +187,93 @@ class TestParted(ModuleTestCase):
self.assertEqual(parse_partition_info(parted_output2, 'MB'), parted_dict2)
def test_partition_already_exists(self):
- set_module_args({
+ with set_module_args({
'device': '/dev/sdb',
'number': 1,
'state': 'present',
- })
- with patch('ansible_collections.community.general.plugins.modules.parted.get_device_info', return_value=parted_dict1):
- self.execute_module(changed=False)
+ }):
+ with patch('ansible_collections.community.general.plugins.modules.parted.get_device_info', return_value=parted_dict1):
+ self.execute_module(changed=False)
def test_create_new_partition(self):
- set_module_args({
+ with set_module_args({
'device': '/dev/sdb',
'number': 4,
'state': 'present',
- })
- with patch('ansible_collections.community.general.plugins.modules.parted.get_device_info', return_value=parted_dict1):
- self.execute_module(changed=True, script='unit KiB mkpart primary 0% 100%')
+ }):
+ with patch('ansible_collections.community.general.plugins.modules.parted.get_device_info', return_value=parted_dict1):
+ self.execute_module(changed=True, script='unit KiB mkpart primary 0% 100%')
def test_create_new_partition_1G(self):
- set_module_args({
+ with set_module_args({
'device': '/dev/sdb',
'number': 4,
'state': 'present',
'part_end': '1GiB',
- })
- with patch('ansible_collections.community.general.plugins.modules.parted.get_device_info', return_value=parted_dict1):
- self.execute_module(changed=True, script='unit KiB mkpart primary 0% 1GiB')
+ }):
+ with patch('ansible_collections.community.general.plugins.modules.parted.get_device_info', return_value=parted_dict1):
+ self.execute_module(changed=True, script='unit KiB mkpart primary 0% 1GiB')
def test_create_new_partition_minus_1G(self):
- set_module_args({
+ with set_module_args({
'device': '/dev/sdb',
'number': 4,
'state': 'present',
'fs_type': 'ext2',
'part_start': '-1GiB',
- })
- with patch('ansible_collections.community.general.plugins.modules.parted.get_device_info', return_value=parted_dict1):
- self.execute_module(changed=True, script='unit KiB mkpart primary ext2 -1GiB 100%')
+ }):
+ with patch('ansible_collections.community.general.plugins.modules.parted.get_device_info', return_value=parted_dict1):
+ self.execute_module(changed=True, script='unit KiB mkpart primary ext2 -1GiB 100%')
def test_remove_partition_number_1(self):
- set_module_args({
+ with set_module_args({
'device': '/dev/sdb',
'number': 1,
'state': 'absent',
- })
- with patch('ansible_collections.community.general.plugins.modules.parted.get_device_info', return_value=parted_dict1):
- self.execute_module(changed=True, script='rm 1')
+ }):
+ with patch('ansible_collections.community.general.plugins.modules.parted.get_device_info', return_value=parted_dict1):
+ self.execute_module(changed=True, script='rm 1')
def test_resize_partition(self):
- set_module_args({
+ with set_module_args({
'device': '/dev/sdb',
'number': 3,
'state': 'present',
'part_end': '100%',
'resize': True
- })
- with patch('ansible_collections.community.general.plugins.modules.parted.get_device_info', return_value=parted_dict1):
- self.execute_module(changed=True, script='resizepart 3 100%')
+ }):
+ with patch('ansible_collections.community.general.plugins.modules.parted.get_device_info', return_value=parted_dict1):
+ self.execute_module(changed=True, script='resizepart 3 100%')
def test_change_flag(self):
# Flags are set in a second run of parted().
# Between the two runs, the partition dict is updated.
# use checkmode here allow us to continue even if the dictionary is
# not updated.
- set_module_args({
+ with set_module_args({
'device': '/dev/sdb',
'number': 3,
'state': 'present',
'flags': ['lvm', 'boot'],
'_ansible_check_mode': True,
- })
+ }):
- with patch('ansible_collections.community.general.plugins.modules.parted.get_device_info', return_value=parted_dict1):
- self.parted.reset_mock()
- self.execute_module(changed=True)
- # When using multiple flags:
- # order of execution is non deterministic, because set() operations are used in
- # the current implementation.
- expected_calls_order1 = [call('unit KiB set 3 lvm on set 3 boot on ',
- '/dev/sdb', 'optimal')]
- expected_calls_order2 = [call('unit KiB set 3 boot on set 3 lvm on ',
- '/dev/sdb', 'optimal')]
- self.assertTrue(self.parted.mock_calls == expected_calls_order1 or
- self.parted.mock_calls == expected_calls_order2)
+ with patch('ansible_collections.community.general.plugins.modules.parted.get_device_info', return_value=parted_dict1):
+ self.parted.reset_mock()
+ self.execute_module(changed=True)
+ # When using multiple flags:
+ # order of execution is non deterministic, because set() operations are used in
+ # the current implementation.
+ expected_calls_order1 = [call('unit KiB set 3 lvm on set 3 boot on ',
+ '/dev/sdb', 'optimal')]
+ expected_calls_order2 = [call('unit KiB set 3 boot on set 3 lvm on ',
+ '/dev/sdb', 'optimal')]
+ self.assertTrue(self.parted.mock_calls == expected_calls_order1 or
+ self.parted.mock_calls == expected_calls_order2)
def test_create_new_primary_lvm_partition(self):
# use check_mode, see previous test comment
- set_module_args({
+ with set_module_args({
'device': '/dev/sdb',
'number': 4,
'flags': ["boot"],
@@ -281,15 +281,15 @@ class TestParted(ModuleTestCase):
'part_start': '257GiB',
'fs_type': 'ext3',
'_ansible_check_mode': True,
- })
- with patch('ansible_collections.community.general.plugins.modules.parted.get_device_info', return_value=parted_dict1):
- self.execute_module(changed=True, script='unit KiB mkpart primary ext3 257GiB 100% unit KiB set 4 boot on')
+ }):
+ with patch('ansible_collections.community.general.plugins.modules.parted.get_device_info', return_value=parted_dict1):
+ self.execute_module(changed=True, script='unit KiB mkpart primary ext3 257GiB 100% unit KiB set 4 boot on')
def test_create_label_gpt(self):
# Like previous test, current implementation use parted to create the partition and
# then retrieve and update the dictionary. Use check_mode to force to continue even if
# dictionary is not updated.
- set_module_args({
+ with set_module_args({
'device': '/dev/sdb',
'number': 1,
'flags': ["lvm"],
@@ -297,48 +297,48 @@ class TestParted(ModuleTestCase):
'name': 'lvmpartition',
'state': 'present',
'_ansible_check_mode': True,
- })
- with patch('ansible_collections.community.general.plugins.modules.parted.get_device_info', return_value=parted_dict2):
- self.execute_module(changed=True, script='unit KiB mklabel gpt mkpart primary 0% 100% unit KiB name 1 \'"lvmpartition"\' set 1 lvm on')
+ }):
+ with patch('ansible_collections.community.general.plugins.modules.parted.get_device_info', return_value=parted_dict2):
+ self.execute_module(changed=True, script='unit KiB mklabel gpt mkpart primary 0% 100% unit KiB name 1 \'"lvmpartition"\' set 1 lvm on')
def test_change_label_gpt(self):
# When partitions already exists and label is changed, mkpart should be called even when partition already exists,
# because new empty label will be created anyway
- set_module_args({
+ with set_module_args({
'device': '/dev/sdb',
'number': 1,
'state': 'present',
'label': 'gpt',
'_ansible_check_mode': True,
- })
- with patch('ansible_collections.community.general.plugins.modules.parted.get_device_info', return_value=parted_dict1):
- self.execute_module(changed=True, script='unit KiB mklabel gpt mkpart primary 0% 100%')
+ }):
+ with patch('ansible_collections.community.general.plugins.modules.parted.get_device_info', return_value=parted_dict1):
+ self.execute_module(changed=True, script='unit KiB mklabel gpt mkpart primary 0% 100%')
def test_check_mode_unchanged(self):
# Test that get_device_info result is checked in check mode too
# No change on partition 1
- set_module_args({
+ with set_module_args({
'device': '/dev/sdb',
'number': 1,
'state': 'present',
'flags': ['some_flag'],
'_ansible_check_mode': True,
- })
- with patch('ansible_collections.community.general.plugins.modules.parted.get_device_info', return_value=parted_dict3):
- self.execute_module(changed=False)
+ }):
+ with patch('ansible_collections.community.general.plugins.modules.parted.get_device_info', return_value=parted_dict3):
+ self.execute_module(changed=False)
def test_check_mode_changed(self):
# Test that get_device_info result is checked in check mode too
# Flag change on partition 1
- set_module_args({
+ with set_module_args({
'device': '/dev/sdb',
'number': 1,
'state': 'present',
'flags': ['other_flag'],
'_ansible_check_mode': True,
- })
- with patch('ansible_collections.community.general.plugins.modules.parted.get_device_info', return_value=parted_dict3):
- self.execute_module(changed=True)
+ }):
+ with patch('ansible_collections.community.general.plugins.modules.parted.get_device_info', return_value=parted_dict3):
+ self.execute_module(changed=True)
def test_version_info(self):
"""Test that the parse_parted_version returns the expected tuple"""
diff --git a/tests/unit/plugins/modules/test_pmem.py b/tests/unit/plugins/modules/test_pmem.py
index cea673da0b..0ce3ec555b 100644
--- a/tests/unit/plugins/modules/test_pmem.py
+++ b/tests/unit/plugins/modules/test_pmem.py
@@ -321,81 +321,81 @@ class TestPmem(ModuleTestCase):
def test_fail_when_required_args_missing(self):
with self.assertRaises(AnsibleFailJson):
- set_module_args({})
- pmem_module.main()
+ with set_module_args({}):
+ pmem_module.main()
def test_fail_when_appdirect_only(self):
with self.assertRaises(AnsibleFailJson):
- set_module_args({
+ with set_module_args({
'appdirect': 10,
- })
- pmem_module.main()
+ }):
+ pmem_module.main()
def test_fail_when_MemosyMode_only(self):
with self.assertRaises(AnsibleFailJson):
- set_module_args({
+ with set_module_args({
'memorymode': 70,
- })
- pmem_module.main()
+ }):
+ pmem_module.main()
def test_fail_when_reserved_only(self):
with self.assertRaises(AnsibleFailJson):
- set_module_args({
+ with set_module_args({
'reserved': 10,
- })
- pmem_module.main()
+ }):
+ pmem_module.main()
def test_fail_when_appdirect_memorymode_reserved_total_not_100(self):
with self.assertRaises(AnsibleFailJson):
- set_module_args({
+ with set_module_args({
'appdirect': 10,
'memorymode': 70,
'reserved': 10,
- })
- pmem_module.main()
+ }):
+ pmem_module.main()
def test_when_appdirect_memorymode(self):
- set_module_args({
+ with set_module_args({
'appdirect': 10,
'memorymode': 70,
- })
- with patch(
- 'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
- side_effect=[goal_plain, goal, dimmlist]):
- with self.assertRaises(AnsibleExitJson) as result:
- pmem_module.main()
- self.result_check(result, False, [25769803776], [188978561024], [328230764544])
+ }):
+ with patch(
+ 'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
+ side_effect=[goal_plain, goal, dimmlist]):
+ with self.assertRaises(AnsibleExitJson) as result:
+ pmem_module.main()
+ self.result_check(result, False, [25769803776], [188978561024], [328230764544])
def test_when_appdirect_memorymode_reserved(self):
- set_module_args({
+ with set_module_args({
'appdirect': 10,
'memorymode': 70,
'reserved': 20,
- })
- with patch(
- 'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
- side_effect=[goal_plain, goal, dimmlist]):
- with self.assertRaises(AnsibleExitJson) as result:
- pmem_module.main()
- self.result_check(result, False, [25769803776], [188978561024], [328230764544])
+ }):
+ with patch(
+ 'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
+ side_effect=[goal_plain, goal, dimmlist]):
+ with self.assertRaises(AnsibleExitJson) as result:
+ pmem_module.main()
+ self.result_check(result, False, [25769803776], [188978561024], [328230764544])
def test_when_appdirect_notinterleaved_memorymode_reserved(self):
- set_module_args({
+ with set_module_args({
'appdirect': 10,
'appdirect_interleaved': False,
'memorymode': 70,
'reserved': 20,
- })
- with patch(
- 'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
- side_effect=[goal_plain, goal, dimmlist]):
- with self.assertRaises(AnsibleExitJson) as result:
- pmem_module.main()
- self.result_check(result, False, [25769803776], [188978561024], [328230764544])
+ }):
+ with patch(
+ 'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
+ side_effect=[goal_plain, goal, dimmlist]):
+ with self.assertRaises(AnsibleExitJson) as result:
+ pmem_module.main()
+ self.result_check(result, False, [25769803776], [188978561024], [328230764544])
def test_fail_when_socket_id_appdirect(self):
with self.assertRaises(AnsibleFailJson):
- set_module_args({
+ with set_module_args({
'socket': [
{
'id': 0,
@@ -406,12 +406,12 @@ class TestPmem(ModuleTestCase):
'appdirect': 10,
},
],
- })
- pmem_module.main()
+ }):
+ pmem_module.main()
def test_fail_when_socket0_id_memorymode_socket1_id_appdirect(self):
with self.assertRaises(AnsibleFailJson):
- set_module_args({
+ with set_module_args({
'socket': [
{
'id': 0,
@@ -422,12 +422,12 @@ class TestPmem(ModuleTestCase):
'appdirect': 10,
},
],
- })
- pmem_module.main()
+ }):
+ pmem_module.main()
def test_fail_when_socket0_without_id(self):
with self.assertRaises(AnsibleFailJson):
- set_module_args({
+ with set_module_args({
'socket': [
{
'appdirect': 10,
@@ -439,11 +439,11 @@ class TestPmem(ModuleTestCase):
'memorymode': 70,
},
],
- })
- pmem_module.main()
+ }):
+ pmem_module.main()
def test_when_socket0_and_1_appdirect_memorymode(self):
- set_module_args({
+ with set_module_args({
'socket': [
{
'id': 0,
@@ -456,18 +456,18 @@ class TestPmem(ModuleTestCase):
'memorymode': 70,
},
],
- })
- with patch(
- 'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
- side_effect=[
- show_skt, goal_plain_sk0, goal_sk0, dimmlist_sk0, goal_plain_sk1, goal_sk1, dimmlist_sk1]):
- with self.assertRaises(AnsibleExitJson) as result:
- pmem_module.main()
- self.result_check(
- result, True, [12884901888, 12884901888], [94489280512, 94489280512], [164115382272, 164115382272])
+ }):
+ with patch(
+ 'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
+ side_effect=[
+ show_skt, goal_plain_sk0, goal_sk0, dimmlist_sk0, goal_plain_sk1, goal_sk1, dimmlist_sk1]):
+ with self.assertRaises(AnsibleExitJson) as result:
+ pmem_module.main()
+ self.result_check(
+ result, True, [12884901888, 12884901888], [94489280512, 94489280512], [164115382272, 164115382272])
def test_when_socket0_and_1_appdirect_memorymode_reserved(self):
- set_module_args({
+ with set_module_args({
'socket': [
{
'id': 0,
@@ -482,18 +482,18 @@ class TestPmem(ModuleTestCase):
'reserved': 20,
},
],
- })
- with patch(
- 'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
- side_effect=[
- show_skt, goal_plain_sk0, goal_sk0, dimmlist_sk0, goal_plain_sk1, goal_sk1, dimmlist_sk1]):
- with self.assertRaises(AnsibleExitJson) as result:
- pmem_module.main()
- self.result_check(
- result, True, [12884901888, 12884901888], [94489280512, 94489280512], [164115382272, 164115382272])
+ }):
+ with patch(
+ 'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
+ side_effect=[
+ show_skt, goal_plain_sk0, goal_sk0, dimmlist_sk0, goal_plain_sk1, goal_sk1, dimmlist_sk1]):
+ with self.assertRaises(AnsibleExitJson) as result:
+ pmem_module.main()
+ self.result_check(
+ result, True, [12884901888, 12884901888], [94489280512, 94489280512], [164115382272, 164115382272])
def test_when_socket0_appdirect_notinterleaved_memorymode_reserved_socket1_appdirect_memorymode_reserved(self):
- set_module_args({
+ with set_module_args({
'socket': [
{
'id': 0,
@@ -509,19 +509,19 @@ class TestPmem(ModuleTestCase):
'reserved': 20,
},
],
- })
- with patch(
- 'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
- side_effect=[
- show_skt, goal_plain_sk0, goal_sk0, dimmlist_sk0, goal_plain_sk1, goal_sk1, dimmlist_sk1]):
- with self.assertRaises(AnsibleExitJson) as result:
- pmem_module.main()
- self.result_check(
- result, True, [12884901888, 12884901888], [94489280512, 94489280512], [164115382272, 164115382272])
+ }):
+ with patch(
+ 'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
+ side_effect=[
+ show_skt, goal_plain_sk0, goal_sk0, dimmlist_sk0, goal_plain_sk1, goal_sk1, dimmlist_sk1]):
+ with self.assertRaises(AnsibleExitJson) as result:
+ pmem_module.main()
+ self.result_check(
+ result, True, [12884901888, 12884901888], [94489280512, 94489280512], [164115382272, 164115382272])
def test_fail_when_namespace_without_mode(self):
with self.assertRaises(AnsibleFailJson):
- set_module_args({
+ with set_module_args({
'namespace': [
{
'size': '1GB',
@@ -532,12 +532,12 @@ class TestPmem(ModuleTestCase):
'type': 'blk',
},
],
- })
- pmem_module.main()
+ }):
+ pmem_module.main()
def test_fail_when_region_is_empty(self):
with self.assertRaises(AnsibleFailJson):
- set_module_args({
+ with set_module_args({
'namespace': [
{
'size': '1GB',
@@ -545,15 +545,15 @@ class TestPmem(ModuleTestCase):
'mode': 'sector',
},
],
- })
- with patch(
- 'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
- side_effect=[ndctl_region_empty]):
- pmem_module.main()
+ }):
+ with patch(
+ 'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
+ side_effect=[ndctl_region_empty]):
+ pmem_module.main()
def test_fail_when_namespace_invalid_size(self):
with self.assertRaises(AnsibleFailJson):
- set_module_args({
+ with set_module_args({
'namespace': [
{
'size': '1XXX',
@@ -561,15 +561,15 @@ class TestPmem(ModuleTestCase):
'mode': 'sector',
},
],
- })
- with patch(
- 'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
- side_effect=[ndctl_region]):
- pmem_module.main()
+ }):
+ with patch(
+ 'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
+ side_effect=[ndctl_region]):
+ pmem_module.main()
def test_fail_when_size_is_invalid_alignment(self):
with self.assertRaises(AnsibleFailJson):
- set_module_args({
+ with set_module_args({
'namespace': [
{
'size': '400MB',
@@ -582,15 +582,15 @@ class TestPmem(ModuleTestCase):
'mode': 'sector'
},
],
- })
- with patch(
- 'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
- side_effect=[ndctl_region]):
- pmem_module.main()
+ }):
+ with patch(
+ 'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
+ side_effect=[ndctl_region]):
+ pmem_module.main()
def test_fail_when_blk_is_unsupported_type(self):
with self.assertRaises(AnsibleFailJson):
- set_module_args({
+ with set_module_args({
'namespace': [
{
'size': '4GB',
@@ -603,15 +603,15 @@ class TestPmem(ModuleTestCase):
'mode': 'sector'
},
],
- })
- with patch(
- 'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
- side_effect=[ndctl_region]):
- pmem_module.main()
+ }):
+ with patch(
+ 'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
+ side_effect=[ndctl_region]):
+ pmem_module.main()
def test_fail_when_size_isnot_set_to_multiple_namespaces(self):
with self.assertRaises(AnsibleFailJson):
- set_module_args({
+ with set_module_args({
'namespace': [
{
'type': 'pmem',
@@ -623,15 +623,15 @@ class TestPmem(ModuleTestCase):
'mode': 'sector'
},
],
- })
- with patch(
- 'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
- side_effect=[ndctl_region]):
- pmem_module.main()
+ }):
+ with patch(
+ 'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
+ side_effect=[ndctl_region]):
+ pmem_module.main()
def test_fail_when_size_of_namespace_over_available(self):
with self.assertRaises(AnsibleFailJson):
- set_module_args({
+ with set_module_args({
'namespace': [
{
'size': '400GB',
@@ -644,30 +644,30 @@ class TestPmem(ModuleTestCase):
'mode': 'sector'
},
],
- })
- with patch(
- 'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
- side_effect=[ndctl_region]):
- pmem_module.main()
+ }):
+ with patch(
+ 'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
+ side_effect=[ndctl_region]):
+ pmem_module.main()
def test_when_namespace0_without_size(self):
- set_module_args({
+ with set_module_args({
'namespace': [
{
'type': 'pmem',
'mode': 'sector'
},
],
- })
- with patch(
- 'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
- side_effect=[ndctl_region, ndctl_create_without_size, ndctl_list_N]):
- with self.assertRaises(AnsibleExitJson) as result:
- pmem_module.main()
- self.result_check_ns(result, ndctl_list_N)
+ }):
+ with patch(
+ 'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
+ side_effect=[ndctl_region, ndctl_create_without_size, ndctl_list_N]):
+ with self.assertRaises(AnsibleExitJson) as result:
+ pmem_module.main()
+ self.result_check_ns(result, ndctl_list_N)
def test_when_namespace0_with_namespace_append(self):
- set_module_args({
+ with set_module_args({
'namespace': [
{
'size': '640MB',
@@ -676,16 +676,16 @@ class TestPmem(ModuleTestCase):
},
],
'namespace_append': True,
- })
- with patch(
- 'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
- side_effect=[ndctl_region, ndctl_create_640M, ndctl_list_N_two_namespaces]):
- with self.assertRaises(AnsibleExitJson) as result:
- pmem_module.main()
- self.result_check_ns(result, ndctl_list_N_two_namespaces)
+ }):
+ with patch(
+ 'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
+ side_effect=[ndctl_region, ndctl_create_640M, ndctl_list_N_two_namespaces]):
+ with self.assertRaises(AnsibleExitJson) as result:
+ pmem_module.main()
+ self.result_check_ns(result, ndctl_list_N_two_namespaces)
def test_when_namespace0_1GiB_pmem_sector_namespace1_640MiB_pmem_raw(self):
- set_module_args({
+ with set_module_args({
'namespace': [
{
'size': '1GB',
@@ -698,10 +698,10 @@ class TestPmem(ModuleTestCase):
'mode': 'raw',
},
],
- })
- with patch(
- 'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
- side_effect=[ndctl_region, ndctl_create_1G, ndctl_create_640M, ndctl_list_N_two_namespaces]):
- with self.assertRaises(AnsibleExitJson) as result:
- pmem_module.main()
- self.result_check_ns(result, ndctl_list_N_two_namespaces)
+ }):
+ with patch(
+ 'ansible_collections.community.general.plugins.modules.pmem.PersistentMemory.pmem_run_command',
+ side_effect=[ndctl_region, ndctl_create_1G, ndctl_create_640M, ndctl_list_N_two_namespaces]):
+ with self.assertRaises(AnsibleExitJson) as result:
+ pmem_module.main()
+ self.result_check_ns(result, ndctl_list_N_two_namespaces)
diff --git a/tests/unit/plugins/modules/test_pritunl_org.py b/tests/unit/plugins/modules/test_pritunl_org.py
index 94809784b1..9836fd32c8 100644
--- a/tests/unit/plugins/modules/test_pritunl_org.py
+++ b/tests/unit/plugins/modules/test_pritunl_org.py
@@ -64,14 +64,14 @@ class TestPritunlOrg(ModuleTestCase):
def test_without_parameters(self):
"""Test without parameters"""
- set_module_args({})
- with self.assertRaises(AnsibleFailJson):
- self.module.main()
+ with set_module_args({}):
+ with self.assertRaises(AnsibleFailJson):
+ self.module.main()
def test_present(self):
"""Test Pritunl organization creation."""
org_params = {"name": "NewOrg"}
- set_module_args(
+ with set_module_args(
dict_merge(
{
"pritunl_api_token": "token",
@@ -80,32 +80,32 @@ class TestPritunlOrg(ModuleTestCase):
},
org_params,
)
- )
- # Test creation
- with self.patch_get_pritunl_organizations(
- side_effect=PritunlListOrganizationMock
- ) as mock_get:
- with self.patch_add_pritunl_organization(
- side_effect=PritunlPostOrganizationMock
- ) as mock_add:
- with self.assertRaises(AnsibleExitJson) as create_result:
- self.module.main()
+ ):
+ # Test creation
+ with self.patch_get_pritunl_organizations(
+ side_effect=PritunlListOrganizationMock
+ ) as mock_get:
+ with self.patch_add_pritunl_organization(
+ side_effect=PritunlPostOrganizationMock
+ ) as mock_add:
+ with self.assertRaises(AnsibleExitJson) as create_result:
+ self.module.main()
- create_exc = create_result.exception.args[0]
+ create_exc = create_result.exception.args[0]
- self.assertTrue(create_exc["changed"])
- self.assertEqual(create_exc["response"]["name"], org_params["name"])
- self.assertEqual(create_exc["response"]["user_count"], 0)
+ self.assertTrue(create_exc["changed"])
+ self.assertEqual(create_exc["response"]["name"], org_params["name"])
+ self.assertEqual(create_exc["response"]["user_count"], 0)
- # Test module idempotency
- with self.patch_get_pritunl_organizations(
- side_effect=PritunlListOrganizationAfterPostMock
- ) as mock_get:
- with self.patch_add_pritunl_organization(
- side_effect=PritunlPostOrganizationMock
- ) as mock_add:
- with self.assertRaises(AnsibleExitJson) as idempotent_result:
- self.module.main()
+ # Test module idempotency
+ with self.patch_get_pritunl_organizations(
+ side_effect=PritunlListOrganizationAfterPostMock
+ ) as mock_get:
+ with self.patch_add_pritunl_organization(
+ side_effect=PritunlPostOrganizationMock
+ ) as mock_add:
+ with self.assertRaises(AnsibleExitJson) as idempotent_result:
+ self.module.main()
idempotent_exc = idempotent_result.exception.args[0]
@@ -120,7 +120,7 @@ class TestPritunlOrg(ModuleTestCase):
def test_absent(self):
"""Test organization removal from Pritunl."""
org_params = {"name": "NewOrg"}
- set_module_args(
+ with set_module_args(
dict_merge(
{
"state": "absent",
@@ -130,31 +130,31 @@ class TestPritunlOrg(ModuleTestCase):
},
org_params,
)
- )
- # Test deletion
- with self.patch_get_pritunl_organizations(
- side_effect=PritunlListOrganizationAfterPostMock
- ) as mock_get:
- with self.patch_delete_pritunl_organization(
- side_effect=PritunlDeleteOrganizationMock
- ) as mock_delete:
- with self.assertRaises(AnsibleExitJson) as delete_result:
- self.module.main()
+ ):
+ # Test deletion
+ with self.patch_get_pritunl_organizations(
+ side_effect=PritunlListOrganizationAfterPostMock
+ ) as mock_get:
+ with self.patch_delete_pritunl_organization(
+ side_effect=PritunlDeleteOrganizationMock
+ ) as mock_delete:
+ with self.assertRaises(AnsibleExitJson) as delete_result:
+ self.module.main()
- delete_exc = delete_result.exception.args[0]
+ delete_exc = delete_result.exception.args[0]
- self.assertTrue(delete_exc["changed"])
- self.assertEqual(delete_exc["response"], {})
+ self.assertTrue(delete_exc["changed"])
+ self.assertEqual(delete_exc["response"], {})
- # Test module idempotency
- with self.patch_get_pritunl_organizations(
- side_effect=PritunlListOrganizationMock
- ) as mock_get:
- with self.patch_delete_pritunl_organization(
- side_effect=PritunlDeleteOrganizationMock
- ) as mock_add:
- with self.assertRaises(AnsibleExitJson) as idempotent_result:
- self.module.main()
+ # Test module idempotency
+ with self.patch_get_pritunl_organizations(
+ side_effect=PritunlListOrganizationMock
+ ) as mock_get:
+ with self.patch_delete_pritunl_organization(
+ side_effect=PritunlDeleteOrganizationMock
+ ) as mock_add:
+ with self.assertRaises(AnsibleExitJson) as idempotent_result:
+ self.module.main()
idempotent_exc = idempotent_result.exception.args[0]
@@ -172,33 +172,31 @@ class TestPritunlOrg(ModuleTestCase):
"pritunl_url": "https://pritunl.domain.com",
"name": "GumGum",
}
- set_module_args(module_args)
+ with set_module_args(module_args):
+ # Test deletion
+ with self.patch_get_pritunl_organizations(
+ side_effect=PritunlListOrganizationMock
+ ) as mock_get:
+ with self.patch_delete_pritunl_organization(
+ side_effect=PritunlDeleteOrganizationMock
+ ) as mock_delete:
+ with self.assertRaises(AnsibleFailJson) as failure_result:
+ self.module.main()
- # Test deletion
- with self.patch_get_pritunl_organizations(
- side_effect=PritunlListOrganizationMock
- ) as mock_get:
- with self.patch_delete_pritunl_organization(
- side_effect=PritunlDeleteOrganizationMock
- ) as mock_delete:
- with self.assertRaises(AnsibleFailJson) as failure_result:
- self.module.main()
+ failure_exc = failure_result.exception.args[0]
- failure_exc = failure_result.exception.args[0]
+ self.assertRegex(failure_exc["msg"], "Can not remove organization")
- self.assertRegex(failure_exc["msg"], "Can not remove organization")
-
- # Switch force=True which should run successfully
- set_module_args(dict_merge(module_args, {"force": True}))
-
- with self.patch_get_pritunl_organizations(
- side_effect=PritunlListOrganizationMock
- ) as mock_get:
- with self.patch_delete_pritunl_organization(
- side_effect=PritunlDeleteOrganizationMock
- ) as mock_delete:
- with self.assertRaises(AnsibleExitJson) as delete_result:
- self.module.main()
+ # Switch force=True which should run successfully
+ with set_module_args(dict_merge(module_args, {"force": True})):
+ with self.patch_get_pritunl_organizations(
+ side_effect=PritunlListOrganizationMock
+ ) as mock_get:
+ with self.patch_delete_pritunl_organization(
+ side_effect=PritunlDeleteOrganizationMock
+ ) as mock_delete:
+ with self.assertRaises(AnsibleExitJson) as delete_result:
+ self.module.main()
delete_exc = delete_result.exception.args[0]
diff --git a/tests/unit/plugins/modules/test_pritunl_org_info.py b/tests/unit/plugins/modules/test_pritunl_org_info.py
index dc33c3d8c6..3f25b38d2e 100644
--- a/tests/unit/plugins/modules/test_pritunl_org_info.py
+++ b/tests/unit/plugins/modules/test_pritunl_org_info.py
@@ -49,9 +49,9 @@ class TestPritunlOrgInfo(ModuleTestCase):
with self.patch_get_pritunl_organizations(
side_effect=PritunlListOrganizationMock
) as org_mock:
- set_module_args({})
- with self.assertRaises(AnsibleFailJson):
- self.module.main()
+ with set_module_args({}):
+ with self.assertRaises(AnsibleFailJson):
+ self.module.main()
self.assertEqual(org_mock.call_count, 0)
@@ -61,14 +61,14 @@ class TestPritunlOrgInfo(ModuleTestCase):
side_effect=PritunlEmptyOrganizationMock
) as org_mock:
with self.assertRaises(AnsibleExitJson) as result:
- set_module_args(
+ with set_module_args(
{
"pritunl_api_token": "token",
"pritunl_api_secret": "secret",
"pritunl_url": "https://pritunl.domain.com",
}
- )
- self.module.main()
+ ):
+ self.module.main()
self.assertEqual(org_mock.call_count, 1)
@@ -81,15 +81,15 @@ class TestPritunlOrgInfo(ModuleTestCase):
side_effect=PritunlListOrganizationMock
) as org_mock:
with self.assertRaises(AnsibleExitJson) as result:
- set_module_args(
+ with set_module_args(
{
"pritunl_api_token": "token",
"pritunl_api_secret": "secret",
"pritunl_url": "https://pritunl.domain.com",
"org": "GumGum",
}
- )
- self.module.main()
+ ):
+ self.module.main()
self.assertEqual(org_mock.call_count, 1)
@@ -102,15 +102,15 @@ class TestPritunlOrgInfo(ModuleTestCase):
side_effect=PritunlListOrganizationMock
) as org_mock:
with self.assertRaises(AnsibleFailJson) as result:
- set_module_args(
+ with set_module_args(
{
"pritunl_api_token": "token",
"pritunl_api_secret": "secret",
"pritunl_url": "https://pritunl.domain.com",
"org": "Unknown",
}
- )
- self.module.main()
+ ):
+ self.module.main()
self.assertEqual(org_mock.call_count, 1)
@@ -123,14 +123,14 @@ class TestPritunlOrgInfo(ModuleTestCase):
side_effect=PritunlListOrganizationMock
) as org_mock:
with self.assertRaises(AnsibleExitJson) as result:
- set_module_args(
+ with set_module_args(
{
"pritunl_api_token": "token",
"pritunl_api_secret": "secret",
"pritunl_url": "https://pritunl.domain.com",
}
- )
- self.module.main()
+ ):
+ self.module.main()
self.assertEqual(org_mock.call_count, 1)
diff --git a/tests/unit/plugins/modules/test_pritunl_user.py b/tests/unit/plugins/modules/test_pritunl_user.py
index 1120839186..cade205e04 100644
--- a/tests/unit/plugins/modules/test_pritunl_user.py
+++ b/tests/unit/plugins/modules/test_pritunl_user.py
@@ -94,9 +94,9 @@ class TestPritunlUser(ModuleTestCase):
def test_without_parameters(self):
"""Test without parameters"""
- set_module_args({})
- with self.assertRaises(AnsibleFailJson):
- self.module.main()
+ with set_module_args({}):
+ with self.assertRaises(AnsibleFailJson):
+ self.module.main()
@mock_pritunl_api
def test_present(self):
@@ -105,7 +105,7 @@ class TestPritunlUser(ModuleTestCase):
"user_name": "alice",
"user_email": "alice@company.com",
}
- set_module_args(
+ with set_module_args(
dict_merge(
{
"pritunl_api_token": "token",
@@ -115,13 +115,12 @@ class TestPritunlUser(ModuleTestCase):
},
user_params,
)
- )
-
- with self.patch_update_pritunl_users(
- side_effect=PritunlPostUserMock
- ) as post_mock:
- with self.assertRaises(AnsibleExitJson) as create_result:
- self.module.main()
+ ):
+ with self.patch_update_pritunl_users(
+ side_effect=PritunlPostUserMock
+ ) as post_mock:
+ with self.assertRaises(AnsibleExitJson) as create_result:
+ self.module.main()
create_exc = create_result.exception.args[0]
@@ -137,7 +136,7 @@ class TestPritunlUser(ModuleTestCase):
"user_email": "bob@company.com",
"user_disabled": True,
}
- set_module_args(
+ with set_module_args(
dict_merge(
{
"pritunl_api_token": "token",
@@ -147,14 +146,12 @@ class TestPritunlUser(ModuleTestCase):
},
new_user_params,
)
- )
-
- with self.patch_update_pritunl_users(
- side_effect=PritunlPutUserMock
- ) as put_mock:
-
- with self.assertRaises(AnsibleExitJson) as update_result:
- self.module.main()
+ ):
+ with self.patch_update_pritunl_users(
+ side_effect=PritunlPutUserMock
+ ) as put_mock:
+ with self.assertRaises(AnsibleExitJson) as update_result:
+ self.module.main()
update_exc = update_result.exception.args[0]
@@ -168,7 +165,7 @@ class TestPritunlUser(ModuleTestCase):
@mock_pritunl_api
def test_absent(self):
"""Test user removal from Pritunl."""
- set_module_args(
+ with set_module_args(
{
"state": "absent",
"pritunl_api_token": "token",
@@ -177,10 +174,9 @@ class TestPritunlUser(ModuleTestCase):
"organization": "GumGum",
"user_name": "florian",
}
- )
-
- with self.assertRaises(AnsibleExitJson) as result:
- self.module.main()
+ ):
+ with self.assertRaises(AnsibleExitJson) as result:
+ self.module.main()
exc = result.exception.args[0]
@@ -190,7 +186,7 @@ class TestPritunlUser(ModuleTestCase):
@mock_pritunl_api
def test_absent_failure(self):
"""Test user removal from a non existing organization."""
- set_module_args(
+ with set_module_args(
{
"state": "absent",
"pritunl_api_token": "token",
@@ -199,10 +195,9 @@ class TestPritunlUser(ModuleTestCase):
"organization": "Unknown",
"user_name": "floria@company.com",
}
- )
-
- with self.assertRaises(AnsibleFailJson) as result:
- self.module.main()
+ ):
+ with self.assertRaises(AnsibleFailJson) as result:
+ self.module.main()
exc = result.exception.args[0]
diff --git a/tests/unit/plugins/modules/test_pritunl_user_info.py b/tests/unit/plugins/modules/test_pritunl_user_info.py
index 5aae15d966..79823769c7 100644
--- a/tests/unit/plugins/modules/test_pritunl_user_info.py
+++ b/tests/unit/plugins/modules/test_pritunl_user_info.py
@@ -59,9 +59,9 @@ class TestPritunlUserInfo(ModuleTestCase):
with self.patch_get_pritunl_users(
side_effect=PritunlListUserMock
) as user_mock:
- set_module_args({})
- with self.assertRaises(AnsibleFailJson):
- self.module.main()
+ with set_module_args({}):
+ with self.assertRaises(AnsibleFailJson):
+ self.module.main()
self.assertEqual(org_mock.call_count, 0)
self.assertEqual(user_mock.call_count, 0)
@@ -75,15 +75,15 @@ class TestPritunlUserInfo(ModuleTestCase):
side_effect=PritunlListUserMock
) as user_mock:
with self.assertRaises(AnsibleFailJson) as result:
- set_module_args(
+ with set_module_args(
{
"pritunl_api_token": "token",
"pritunl_api_secret": "secret",
"pritunl_url": "https://pritunl.domain.com",
"organization": "Unknown",
}
- )
- self.module.main()
+ ):
+ self.module.main()
self.assertEqual(org_mock.call_count, 1)
self.assertEqual(user_mock.call_count, 0)
@@ -103,15 +103,15 @@ class TestPritunlUserInfo(ModuleTestCase):
side_effect=PritunlListUserMock
) as user_mock:
with self.assertRaises(AnsibleExitJson) as result:
- set_module_args(
+ with set_module_args(
{
"pritunl_api_token": "token",
"pritunl_api_secret": "secret",
"pritunl_url": "https://pritunl.domain.com",
"organization": "GumGum",
}
- )
- self.module.main()
+ ):
+ self.module.main()
self.assertEqual(org_mock.call_count, 1)
self.assertEqual(user_mock.call_count, 1)
@@ -137,7 +137,7 @@ class TestPritunlUserInfo(ModuleTestCase):
side_effect=PritunlListUserMock
) as user_mock:
with self.assertRaises(AnsibleExitJson) as result:
- set_module_args(
+ with set_module_args(
{
"pritunl_api_token": "token",
"pritunl_api_secret": "secret",
@@ -146,8 +146,8 @@ class TestPritunlUserInfo(ModuleTestCase):
"user_name": expected_user_name,
"user_type": expected_user_type,
}
- )
- self.module.main()
+ ):
+ self.module.main()
self.assertEqual(org_mock.call_count, 1)
self.assertEqual(user_mock.call_count, 1)
diff --git a/tests/unit/plugins/modules/test_proxmox_backup.py b/tests/unit/plugins/modules/test_proxmox_backup.py
index 8da4de4dee..ca899c442a 100644
--- a/tests/unit/plugins/modules/test_proxmox_backup.py
+++ b/tests/unit/plugins/modules/test_proxmox_backup.py
@@ -247,20 +247,23 @@ class TestProxmoxBackup(ModuleTestCase):
super(TestProxmoxBackup, self).tearDown()
def test_proxmox_backup_without_argument(self):
- set_module_args({})
- with pytest.raises(AnsibleFailJson):
- proxmox_backup.main()
+ with set_module_args({}):
+ with pytest.raises(AnsibleFailJson):
+ proxmox_backup.main()
def test_create_backup_check_mode(self):
- set_module_args({"api_user": "root@pam",
- "api_password": "secret",
- "api_host": "127.0.0.1",
- "mode": "all",
- "storage": "backup",
- "_ansible_check_mode": True,
- })
- with pytest.raises(AnsibleExitJson) as exc_info:
- proxmox_backup.main()
+ with set_module_args(
+ {
+ "api_user": "root@pam",
+ "api_password": "secret",
+ "api_host": "127.0.0.1",
+ "mode": "all",
+ "storage": "backup",
+ "_ansible_check_mode": True,
+ }
+ ):
+ with pytest.raises(AnsibleExitJson) as exc_info:
+ proxmox_backup.main()
result = exc_info.value.args[0]
@@ -272,14 +275,15 @@ class TestProxmoxBackup(ModuleTestCase):
assert self.mock_post_vzdump.call_count == 0
def test_create_backup_all_mode(self):
- set_module_args({"api_user": "root@pam",
- "api_password": "secret",
- "api_host": "127.0.0.1",
- "mode": "all",
- "storage": "backup",
- })
- with pytest.raises(AnsibleExitJson) as exc_info:
- proxmox_backup.main()
+ with set_module_args({
+ "api_user": "root@pam",
+ "api_password": "secret",
+ "api_host": "127.0.0.1",
+ "mode": "all",
+ "storage": "backup",
+ }):
+ with pytest.raises(AnsibleExitJson) as exc_info:
+ proxmox_backup.main()
result = exc_info.value.args[0]
assert result["changed"] is True
@@ -291,17 +295,18 @@ class TestProxmoxBackup(ModuleTestCase):
assert self.mock_post_vzdump.call_count == 3
def test_create_backup_include_mode_with_wait(self):
- set_module_args({"api_user": "root@pam",
- "api_password": "secret",
- "api_host": "127.0.0.1",
- "mode": "include",
- "node": "node1",
- "storage": "backup",
- "vmids": [100],
- "wait": True
- })
- with pytest.raises(AnsibleExitJson) as exc_info:
- proxmox_backup.main()
+ with set_module_args({
+ "api_user": "root@pam",
+ "api_password": "secret",
+ "api_host": "127.0.0.1",
+ "mode": "include",
+ "node": "node1",
+ "storage": "backup",
+ "vmids": [100],
+ "wait": True
+ }):
+ with pytest.raises(AnsibleExitJson) as exc_info:
+ proxmox_backup.main()
result = exc_info.value.args[0]
assert result["changed"] is True
@@ -313,17 +318,18 @@ class TestProxmoxBackup(ModuleTestCase):
assert self.mock_post_vzdump.call_count == 1
def test_fail_insufficient_permissions(self):
- set_module_args({"api_user": "root@pam",
- "api_password": "secret",
- "api_host": "127.0.0.1",
- "mode": "include",
- "storage": "backup",
- "performance_tweaks": "max-workers=2",
- "vmids": [100],
- "wait": True
- })
- with pytest.raises(AnsibleFailJson) as exc_info:
- proxmox_backup.main()
+ with set_module_args({
+ "api_user": "root@pam",
+ "api_password": "secret",
+ "api_host": "127.0.0.1",
+ "mode": "include",
+ "storage": "backup",
+ "performance_tweaks": "max-workers=2",
+ "vmids": [100],
+ "wait": True
+ }):
+ with pytest.raises(AnsibleFailJson) as exc_info:
+ proxmox_backup.main()
result = exc_info.value.args[0]
assert result["msg"] == "Insufficient permission: Performance_tweaks and bandwidth require 'Sys.Modify' permission for '/'"
@@ -331,17 +337,18 @@ class TestProxmoxBackup(ModuleTestCase):
assert self.mock_post_vzdump.call_count == 0
def test_fail_missing_node(self):
- set_module_args({"api_user": "root@pam",
- "api_password": "secret",
- "api_host": "127.0.0.1",
- "mode": "include",
- "storage": "backup",
- "node": "nonexistingnode",
- "vmids": [100],
- "wait": True
- })
- with pytest.raises(AnsibleFailJson) as exc_info:
- proxmox_backup.main()
+ with set_module_args({
+ "api_user": "root@pam",
+ "api_password": "secret",
+ "api_host": "127.0.0.1",
+ "mode": "include",
+ "storage": "backup",
+ "node": "nonexistingnode",
+ "vmids": [100],
+ "wait": True
+ }):
+ with pytest.raises(AnsibleFailJson) as exc_info:
+ proxmox_backup.main()
result = exc_info.value.args[0]
assert result["msg"] == "Node nonexistingnode was specified, but does not exist on the cluster"
@@ -349,16 +356,17 @@ class TestProxmoxBackup(ModuleTestCase):
assert self.mock_post_vzdump.call_count == 0
def test_fail_missing_storage(self):
- set_module_args({"api_user": "root@pam",
- "api_password": "secret",
- "api_host": "127.0.0.1",
- "mode": "include",
- "storage": "nonexistingstorage",
- "vmids": [100],
- "wait": True
- })
- with pytest.raises(AnsibleFailJson) as exc_info:
- proxmox_backup.main()
+ with set_module_args({
+ "api_user": "root@pam",
+ "api_password": "secret",
+ "api_host": "127.0.0.1",
+ "mode": "include",
+ "storage": "nonexistingstorage",
+ "vmids": [100],
+ "wait": True
+ }):
+ with pytest.raises(AnsibleFailJson) as exc_info:
+ proxmox_backup.main()
result = exc_info.value.args[0]
assert result["msg"] == "Storage nonexistingstorage does not exist in the cluster"
diff --git a/tests/unit/plugins/modules/test_proxmox_backup_info.py b/tests/unit/plugins/modules/test_proxmox_backup_info.py
index 73a15b8ab8..a6d17c51f2 100644
--- a/tests/unit/plugins/modules/test_proxmox_backup_info.py
+++ b/tests/unit/plugins/modules/test_proxmox_backup_info.py
@@ -207,20 +207,20 @@ class TestProxmoxBackupInfoModule(ModuleTestCase):
def test_module_fail_when_required_args_missing(self):
with pytest.raises(AnsibleFailJson) as exc_info:
- set_module_args({})
- self.module.main()
+ with set_module_args({}):
+ self.module.main()
result = exc_info.value.args[0]
assert result["msg"] == "missing required arguments: api_host, api_user"
def test_get_all_backups_information(self):
with pytest.raises(AnsibleExitJson) as exc_info:
- set_module_args({
+ with set_module_args({
'api_host': 'proxmoxhost',
'api_user': 'root@pam',
'api_password': 'supersecret'
- })
- self.module.main()
+ }):
+ self.module.main()
result = exc_info.value.args[0]
assert result["backup_info"] == EXPECTED_BACKUP_OUTPUT
@@ -231,13 +231,13 @@ class TestProxmoxBackupInfoModule(ModuleTestCase):
expected_output = [
backup for backup in EXPECTED_BACKUP_OUTPUT if backup["vm_name"] == vmname
]
- set_module_args({
+ with set_module_args({
'api_host': 'proxmoxhost',
'api_user': 'root@pam',
'api_password': 'supersecret',
'vm_name': vmname
- })
- self.module.main()
+ }):
+ self.module.main()
result = exc_info.value.args[0]
assert result["backup_info"] == expected_output
@@ -249,13 +249,13 @@ class TestProxmoxBackupInfoModule(ModuleTestCase):
expected_output = [
backup for backup in EXPECTED_BACKUP_OUTPUT if backup["vmid"] == vmid
]
- set_module_args({
+ with set_module_args({
'api_host': 'proxmoxhost',
'api_user': 'root@pam',
'api_password': 'supersecret',
'vm_id': vmid
- })
- self.module.main()
+ }):
+ self.module.main()
result = exc_info.value.args[0]
assert result["backup_info"] == expected_output
assert len(result["backup_info"]) == 1
@@ -263,13 +263,13 @@ class TestProxmoxBackupInfoModule(ModuleTestCase):
def test_get_specific_backup_information_by_backupjobs(self):
with pytest.raises(AnsibleExitJson) as exc_info:
backupjobs = True
- set_module_args({
+ with set_module_args({
'api_host': 'proxmoxhost',
'api_user': 'root@pam',
'api_password': 'supersecret',
'backup_jobs': backupjobs
- })
- self.module.main()
+ }):
+ self.module.main()
result = exc_info.value.args[0]
assert result["backup_info"] == EXPECTED_BACKUP_JOBS_OUTPUT
diff --git a/tests/unit/plugins/modules/test_proxmox_kvm.py b/tests/unit/plugins/modules/test_proxmox_kvm.py
index 4e2cf032c1..4a13cbe260 100644
--- a/tests/unit/plugins/modules/test_proxmox_kvm.py
+++ b/tests/unit/plugins/modules/test_proxmox_kvm.py
@@ -57,11 +57,11 @@ class TestProxmoxKvmModule(ModuleTestCase):
def test_module_fail_when_required_args_missing(self):
with self.assertRaises(AnsibleFailJson):
- set_module_args({})
- self.module.main()
+ with set_module_args({}):
+ self.module.main()
def test_module_exits_unchaged_when_provided_vmid_exists(self):
- set_module_args(
+ with set_module_args(
{
"api_host": "host",
"api_user": "user",
@@ -69,10 +69,10 @@ class TestProxmoxKvmModule(ModuleTestCase):
"vmid": "100",
"node": "pve",
}
- )
- self.get_vm_mock.return_value = [{"vmid": "100"}]
- with pytest.raises(AnsibleExitJson) as exc_info:
- self.module.main()
+ ):
+ self.get_vm_mock.return_value = [{"vmid": "100"}]
+ with pytest.raises(AnsibleExitJson) as exc_info:
+ self.module.main()
assert self.get_vm_mock.call_count == 1
result = exc_info.value.args[0]
@@ -80,7 +80,7 @@ class TestProxmoxKvmModule(ModuleTestCase):
assert result["msg"] == "VM with vmid <100> already exists"
def test_vm_created_when_vmid_not_exist_but_name_already_exist(self):
- set_module_args(
+ with set_module_args(
{
"api_host": "host",
"api_user": "user",
@@ -89,10 +89,10 @@ class TestProxmoxKvmModule(ModuleTestCase):
"name": "existing.vm.local",
"node": "pve",
}
- )
- self.get_vm_mock.return_value = None
- with pytest.raises(AnsibleExitJson) as exc_info:
- self.module.main()
+ ):
+ self.get_vm_mock.return_value = None
+ with pytest.raises(AnsibleExitJson) as exc_info:
+ self.module.main()
assert self.get_vm_mock.call_count == 1
assert self.get_node_mock.call_count == 1
@@ -101,7 +101,7 @@ class TestProxmoxKvmModule(ModuleTestCase):
assert result["msg"] == "VM existing.vm.local with vmid 100 deployed"
def test_vm_not_created_when_name_already_exist_and_vmid_not_set(self):
- set_module_args(
+ with set_module_args(
{
"api_host": "host",
"api_user": "user",
@@ -109,21 +109,21 @@ class TestProxmoxKvmModule(ModuleTestCase):
"name": "existing.vm.local",
"node": "pve",
}
- )
- with patch.object(proxmox_utils.ProxmoxAnsible, "get_vmid") as get_vmid_mock:
- get_vmid_mock.return_value = {
- "vmid": 100,
- "name": "existing.vm.local",
- }
- with pytest.raises(AnsibleExitJson) as exc_info:
- self.module.main()
+ ):
+ with patch.object(proxmox_utils.ProxmoxAnsible, "get_vmid") as get_vmid_mock:
+ get_vmid_mock.return_value = {
+ "vmid": 100,
+ "name": "existing.vm.local",
+ }
+ with pytest.raises(AnsibleExitJson) as exc_info:
+ self.module.main()
assert get_vmid_mock.call_count == 1
result = exc_info.value.args[0]
assert result["changed"] is False
def test_vm_created_when_name_doesnt_exist_and_vmid_not_set(self):
- set_module_args(
+ with set_module_args(
{
"api_host": "host",
"api_user": "user",
@@ -131,15 +131,15 @@ class TestProxmoxKvmModule(ModuleTestCase):
"name": "existing.vm.local",
"node": "pve",
}
- )
- self.get_vm_mock.return_value = None
- with patch.multiple(
- proxmox_utils.ProxmoxAnsible, get_vmid=DEFAULT, get_nextvmid=DEFAULT
- ) as utils_mock:
- utils_mock["get_vmid"].return_value = None
- utils_mock["get_nextvmid"].return_value = 101
- with pytest.raises(AnsibleExitJson) as exc_info:
- self.module.main()
+ ):
+ self.get_vm_mock.return_value = None
+ with patch.multiple(
+ proxmox_utils.ProxmoxAnsible, get_vmid=DEFAULT, get_nextvmid=DEFAULT
+ ) as utils_mock:
+ utils_mock["get_vmid"].return_value = None
+ utils_mock["get_nextvmid"].return_value = 101
+ with pytest.raises(AnsibleExitJson) as exc_info:
+ self.module.main()
assert utils_mock["get_vmid"].call_count == 1
assert utils_mock["get_nextvmid"].call_count == 1
diff --git a/tests/unit/plugins/modules/test_proxmox_snap.py b/tests/unit/plugins/modules/test_proxmox_snap.py
index 545fcd1f59..1ac711bf13 100644
--- a/tests/unit/plugins/modules/test_proxmox_snap.py
+++ b/tests/unit/plugins/modules/test_proxmox_snap.py
@@ -51,9 +51,9 @@ def fake_api(mocker):
def test_proxmox_snap_without_argument(capfd):
- set_module_args({})
- with pytest.raises(SystemExit) as results:
- proxmox_snap.main()
+ with set_module_args({}):
+ with pytest.raises(SystemExit) as results:
+ proxmox_snap.main()
out, err = capfd.readouterr()
assert not err
@@ -62,19 +62,21 @@ def test_proxmox_snap_without_argument(capfd):
@patch('ansible_collections.community.general.plugins.module_utils.proxmox.ProxmoxAnsible._connect')
def test_create_snapshot_check_mode(connect_mock, capfd, mocker):
- set_module_args({"hostname": "test-lxc",
- "api_user": "root@pam",
- "api_password": "secret",
- "api_host": "127.0.0.1",
- "state": "present",
- "snapname": "test",
- "timeout": "1",
- "force": True,
- "_ansible_check_mode": True})
- proxmox_utils.HAS_PROXMOXER = True
- connect_mock.side_effect = lambda: fake_api(mocker)
- with pytest.raises(SystemExit) as results:
- proxmox_snap.main()
+ with set_module_args({
+ "hostname": "test-lxc",
+ "api_user": "root@pam",
+ "api_password": "secret",
+ "api_host": "127.0.0.1",
+ "state": "present",
+ "snapname": "test",
+ "timeout": "1",
+ "force": True,
+ "_ansible_check_mode": True
+ }):
+ proxmox_utils.HAS_PROXMOXER = True
+ connect_mock.side_effect = lambda: fake_api(mocker)
+ with pytest.raises(SystemExit) as results:
+ proxmox_snap.main()
out, err = capfd.readouterr()
assert not err
@@ -83,19 +85,21 @@ def test_create_snapshot_check_mode(connect_mock, capfd, mocker):
@patch('ansible_collections.community.general.plugins.module_utils.proxmox.ProxmoxAnsible._connect')
def test_remove_snapshot_check_mode(connect_mock, capfd, mocker):
- set_module_args({"hostname": "test-lxc",
- "api_user": "root@pam",
- "api_password": "secret",
- "api_host": "127.0.0.1",
- "state": "absent",
- "snapname": "test",
- "timeout": "1",
- "force": True,
- "_ansible_check_mode": True})
- proxmox_utils.HAS_PROXMOXER = True
- connect_mock.side_effect = lambda: fake_api(mocker)
- with pytest.raises(SystemExit) as results:
- proxmox_snap.main()
+ with set_module_args({
+ "hostname": "test-lxc",
+ "api_user": "root@pam",
+ "api_password": "secret",
+ "api_host": "127.0.0.1",
+ "state": "absent",
+ "snapname": "test",
+ "timeout": "1",
+ "force": True,
+ "_ansible_check_mode": True
+ }):
+ proxmox_utils.HAS_PROXMOXER = True
+ connect_mock.side_effect = lambda: fake_api(mocker)
+ with pytest.raises(SystemExit) as results:
+ proxmox_snap.main()
out, err = capfd.readouterr()
assert not err
@@ -104,19 +108,21 @@ def test_remove_snapshot_check_mode(connect_mock, capfd, mocker):
@patch('ansible_collections.community.general.plugins.module_utils.proxmox.ProxmoxAnsible._connect')
def test_rollback_snapshot_check_mode(connect_mock, capfd, mocker):
- set_module_args({"hostname": "test-lxc",
- "api_user": "root@pam",
- "api_password": "secret",
- "api_host": "127.0.0.1",
- "state": "rollback",
- "snapname": "test",
- "timeout": "1",
- "force": True,
- "_ansible_check_mode": True})
- proxmox_utils.HAS_PROXMOXER = True
- connect_mock.side_effect = lambda: fake_api(mocker)
- with pytest.raises(SystemExit) as results:
- proxmox_snap.main()
+ with set_module_args({
+ "hostname": "test-lxc",
+ "api_user": "root@pam",
+ "api_password": "secret",
+ "api_host": "127.0.0.1",
+ "state": "rollback",
+ "snapname": "test",
+ "timeout": "1",
+ "force": True,
+ "_ansible_check_mode": True
+ }):
+ proxmox_utils.HAS_PROXMOXER = True
+ connect_mock.side_effect = lambda: fake_api(mocker)
+ with pytest.raises(SystemExit) as results:
+ proxmox_snap.main()
out, err = capfd.readouterr()
assert not err
diff --git a/tests/unit/plugins/modules/test_proxmox_storage_contents_info.py b/tests/unit/plugins/modules/test_proxmox_storage_contents_info.py
index df2625dba6..19544d4281 100644
--- a/tests/unit/plugins/modules/test_proxmox_storage_contents_info.py
+++ b/tests/unit/plugins/modules/test_proxmox_storage_contents_info.py
@@ -76,14 +76,14 @@ class TestProxmoxStorageContentsInfo(ModuleTestCase):
def test_module_fail_when_required_args_missing(self):
with pytest.raises(AnsibleFailJson) as exc_info:
- set_module_args({})
- self.module.main()
+ with set_module_args({}):
+ self.module.main()
def test_storage_contents_info(self):
with pytest.raises(AnsibleExitJson) as exc_info:
- set_module_args(get_module_args(node=NODE1, storage="datastore"))
- expected_output = {}
- self.module.main()
+ with set_module_args(get_module_args(node=NODE1, storage="datastore")):
+ expected_output = {}
+ self.module.main()
result = exc_info.value.args[0]
assert not result["changed"]
diff --git a/tests/unit/plugins/modules/test_proxmox_tasks_info.py b/tests/unit/plugins/modules/test_proxmox_tasks_info.py
index 5c228655be..f8377ddb16 100644
--- a/tests/unit/plugins/modules/test_proxmox_tasks_info.py
+++ b/tests/unit/plugins/modules/test_proxmox_tasks_info.py
@@ -127,9 +127,9 @@ EXPECTED_SINGLE_TASK = [
@patch('ansible_collections.community.general.plugins.module_utils.proxmox.ProxmoxAnsible._connect')
def test_without_required_parameters(connect_mock, capfd, mocker):
- set_module_args({})
- with pytest.raises(SystemExit):
- proxmox_tasks_info.main()
+ with set_module_args({}):
+ with pytest.raises(SystemExit):
+ proxmox_tasks_info.main()
out, err = capfd.readouterr()
assert not err
assert json.loads(out)['failed']
@@ -145,16 +145,17 @@ def mock_api_tasks_response(mocker):
@patch('ansible_collections.community.general.plugins.module_utils.proxmox.ProxmoxAnsible._connect')
def test_get_tasks(connect_mock, capfd, mocker):
- set_module_args({'api_host': 'proxmoxhost',
- 'api_user': 'root@pam',
- 'api_password': 'supersecret',
- 'node': NODE})
+ with set_module_args({
+ 'api_host': 'proxmoxhost',
+ 'api_user': 'root@pam',
+ 'api_password': 'supersecret',
+ 'node': NODE
+ }):
+ connect_mock.side_effect = lambda: mock_api_tasks_response(mocker)
+ proxmox_utils.HAS_PROXMOXER = True
- connect_mock.side_effect = lambda: mock_api_tasks_response(mocker)
- proxmox_utils.HAS_PROXMOXER = True
-
- with pytest.raises(SystemExit):
- proxmox_tasks_info.main()
+ with pytest.raises(SystemExit):
+ proxmox_tasks_info.main()
out, err = capfd.readouterr()
assert not err
assert len(json.loads(out)['proxmox_tasks']) != 0
@@ -163,17 +164,18 @@ def test_get_tasks(connect_mock, capfd, mocker):
@patch('ansible_collections.community.general.plugins.module_utils.proxmox.ProxmoxAnsible._connect')
def test_get_single_task(connect_mock, capfd, mocker):
- set_module_args({'api_host': 'proxmoxhost',
- 'api_user': 'root@pam',
- 'api_password': 'supersecret',
- 'node': NODE,
- 'task': TASK_UPID})
+ with set_module_args({
+ 'api_host': 'proxmoxhost',
+ 'api_user': 'root@pam',
+ 'api_password': 'supersecret',
+ 'node': NODE,
+ 'task': TASK_UPID
+ }):
+ connect_mock.side_effect = lambda: mock_api_tasks_response(mocker)
+ proxmox_utils.HAS_PROXMOXER = True
- connect_mock.side_effect = lambda: mock_api_tasks_response(mocker)
- proxmox_utils.HAS_PROXMOXER = True
-
- with pytest.raises(SystemExit):
- proxmox_tasks_info.main()
+ with pytest.raises(SystemExit):
+ proxmox_tasks_info.main()
out, err = capfd.readouterr()
assert not err
assert len(json.loads(out)['proxmox_tasks']) == 1
@@ -183,17 +185,18 @@ def test_get_single_task(connect_mock, capfd, mocker):
@patch('ansible_collections.community.general.plugins.module_utils.proxmox.ProxmoxAnsible._connect')
def test_get_non_existent_task(connect_mock, capfd, mocker):
- set_module_args({'api_host': 'proxmoxhost',
- 'api_user': 'root@pam',
- 'api_password': 'supersecret',
- 'node': NODE,
- 'task': 'UPID:nonexistent'})
+ with set_module_args({
+ 'api_host': 'proxmoxhost',
+ 'api_user': 'root@pam',
+ 'api_password': 'supersecret',
+ 'node': NODE,
+ 'task': 'UPID:nonexistent'
+ }):
+ connect_mock.side_effect = lambda: mock_api_tasks_response(mocker)
+ proxmox_utils.HAS_PROXMOXER = True
- connect_mock.side_effect = lambda: mock_api_tasks_response(mocker)
- proxmox_utils.HAS_PROXMOXER = True
-
- with pytest.raises(SystemExit):
- proxmox_tasks_info.main()
+ with pytest.raises(SystemExit):
+ proxmox_tasks_info.main()
out, err = capfd.readouterr()
assert not err
assert json.loads(out)['failed']
diff --git a/tests/unit/plugins/modules/test_proxmox_template.py b/tests/unit/plugins/modules/test_proxmox_template.py
index dc09a44b35..4cd40bfe1f 100644
--- a/tests/unit/plugins/modules/test_proxmox_template.py
+++ b/tests/unit/plugins/modules/test_proxmox_template.py
@@ -48,7 +48,7 @@ class TestProxmoxTemplateModule(ModuleTestCase):
def test_module_fail_when_toolbelt_not_installed_and_file_size_is_big(self, mock_stat):
self.module.HAS_REQUESTS_TOOLBELT = False
mock_stat.return_value.st_size = 268435460
- set_module_args(
+ with set_module_args(
{
"api_host": "host",
"api_user": "user",
@@ -57,9 +57,9 @@ class TestProxmoxTemplateModule(ModuleTestCase):
"src": "/tmp/mock.iso",
"content_type": "iso"
}
- )
- with pytest.raises(AnsibleFailJson) as exc_info:
- self.module.main()
+ ):
+ with pytest.raises(AnsibleFailJson) as exc_info:
+ self.module.main()
result = exc_info.value.args[0]
assert result["failed"] is True
diff --git a/tests/unit/plugins/modules/test_proxmox_vm_info.py b/tests/unit/plugins/modules/test_proxmox_vm_info.py
index 94bbbc948d..f59ba9bd1e 100644
--- a/tests/unit/plugins/modules/test_proxmox_vm_info.py
+++ b/tests/unit/plugins/modules/test_proxmox_vm_info.py
@@ -452,17 +452,17 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
def test_module_fail_when_required_args_missing(self):
with pytest.raises(AnsibleFailJson) as exc_info:
- set_module_args({})
- self.module.main()
+ with set_module_args({}):
+ self.module.main()
result = exc_info.value.args[0]
assert result["msg"] == "missing required arguments: api_host, api_user"
def test_get_lxc_vms_information(self):
with pytest.raises(AnsibleExitJson) as exc_info:
- set_module_args(get_module_args(type="lxc"))
- expected_output = [vm for vm in EXPECTED_VMS_OUTPUT if vm["type"] == "lxc"]
- self.module.main()
+ with set_module_args(get_module_args(type="lxc")):
+ expected_output = [vm for vm in EXPECTED_VMS_OUTPUT if vm["type"] == "lxc"]
+ self.module.main()
result = exc_info.value.args[0]
assert result["changed"] is False
@@ -470,25 +470,25 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
def test_get_qemu_vms_information(self):
with pytest.raises(AnsibleExitJson) as exc_info:
- set_module_args(get_module_args(type="qemu"))
- expected_output = [vm for vm in EXPECTED_VMS_OUTPUT if vm["type"] == "qemu"]
- self.module.main()
+ with set_module_args(get_module_args(type="qemu")):
+ expected_output = [vm for vm in EXPECTED_VMS_OUTPUT if vm["type"] == "qemu"]
+ self.module.main()
result = exc_info.value.args[0]
assert result["proxmox_vms"] == expected_output
def test_get_all_vms_information(self):
with pytest.raises(AnsibleExitJson) as exc_info:
- set_module_args(get_module_args())
- self.module.main()
+ with set_module_args(get_module_args()):
+ self.module.main()
result = exc_info.value.args[0]
assert result["proxmox_vms"] == EXPECTED_VMS_OUTPUT
def test_vmid_is_converted_to_int(self):
with pytest.raises(AnsibleExitJson) as exc_info:
- set_module_args(get_module_args(type="lxc"))
- self.module.main()
+ with set_module_args(get_module_args(type="lxc")):
+ self.module.main()
result = exc_info.value.args[0]
assert isinstance(result["proxmox_vms"][0]["vmid"], int)
@@ -501,8 +501,8 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
for vm in EXPECTED_VMS_OUTPUT
if vm["vmid"] == vmid and vm["type"] == "lxc"
]
- set_module_args(get_module_args(type="lxc", vmid=vmid))
- self.module.main()
+ with set_module_args(get_module_args(type="lxc", vmid=vmid)):
+ self.module.main()
result = exc_info.value.args[0]
assert result["proxmox_vms"] == expected_output
@@ -516,8 +516,8 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
for vm in EXPECTED_VMS_OUTPUT
if vm["vmid"] == vmid and vm["type"] == "qemu"
]
- set_module_args(get_module_args(type="qemu", vmid=vmid))
- self.module.main()
+ with set_module_args(get_module_args(type="qemu", vmid=vmid)):
+ self.module.main()
result = exc_info.value.args[0]
assert result["proxmox_vms"] == expected_output
@@ -527,8 +527,8 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
with pytest.raises(AnsibleExitJson) as exc_info:
vmid = 100
expected_output = [vm for vm in EXPECTED_VMS_OUTPUT if vm["vmid"] == vmid]
- set_module_args(get_module_args(type="all", vmid=vmid))
- self.module.main()
+ with set_module_args(get_module_args(type="all", vmid=vmid)):
+ self.module.main()
result = exc_info.value.args[0]
assert result["proxmox_vms"] == expected_output
@@ -542,8 +542,8 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
with pytest.raises(AnsibleExitJson) as exc_info:
expected_output = [vm for vm in EXPECTED_VMS_OUTPUT if vm["name"] == name]
- set_module_args(get_module_args(type="all", name=name))
- self.module.main()
+ with set_module_args(get_module_args(type="all", name=name)):
+ self.module.main()
result = exc_info.value.args[0]
assert result["proxmox_vms"] == expected_output
@@ -558,8 +558,8 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
with pytest.raises(AnsibleExitJson) as exc_info:
expected_output = [vm for vm in EXPECTED_VMS_OUTPUT if vm["name"] == name]
- set_module_args(get_module_args(type="all", name=name))
- self.module.main()
+ with set_module_args(get_module_args(type="all", name=name)):
+ self.module.main()
result = exc_info.value.args[0]
assert result["proxmox_vms"] == expected_output
@@ -573,8 +573,8 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
with pytest.raises(AnsibleExitJson) as exc_info:
expected_output = [vm for vm in EXPECTED_VMS_OUTPUT if vm["name"] == name]
- set_module_args(get_module_args(type="all", name=name))
- self.module.main()
+ with set_module_args(get_module_args(type="all", name=name)):
+ self.module.main()
result = exc_info.value.args[0]
assert result["proxmox_vms"] == expected_output
@@ -587,8 +587,8 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
for vm in EXPECTED_VMS_OUTPUT
if vm["node"] == NODE1 and vm["type"] == "lxc"
]
- set_module_args(get_module_args(type="lxc", node=NODE1))
- self.module.main()
+ with set_module_args(get_module_args(type="lxc", node=NODE1)):
+ self.module.main()
result = exc_info.value.args[0]
assert result["proxmox_vms"] == expected_output
@@ -601,8 +601,8 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
for vm in EXPECTED_VMS_OUTPUT
if vm["node"] == NODE1 and vm["type"] == "qemu"
]
- set_module_args(get_module_args(type="qemu", node=NODE1))
- self.module.main()
+ with set_module_args(get_module_args(type="qemu", node=NODE1)):
+ self.module.main()
result = exc_info.value.args[0]
assert result["proxmox_vms"] == expected_output
@@ -611,8 +611,8 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
def test_get_all_vms_from_specific_node(self):
with pytest.raises(AnsibleExitJson) as exc_info:
expected_output = [vm for vm in EXPECTED_VMS_OUTPUT if vm["node"] == NODE1]
- set_module_args(get_module_args(node=NODE1))
- self.module.main()
+ with set_module_args(get_module_args(node=NODE1)):
+ self.module.main()
result = exc_info.value.args[0]
assert result["proxmox_vms"] == expected_output
@@ -621,8 +621,8 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
def test_module_returns_empty_list_when_vm_does_not_exist(self):
with pytest.raises(AnsibleExitJson) as exc_info:
vmid = 200
- set_module_args(get_module_args(type="all", vmid=vmid))
- self.module.main()
+ with set_module_args(get_module_args(type="all", vmid=vmid)):
+ self.module.main()
result = exc_info.value.args[0]
assert result["proxmox_vms"] == []
@@ -632,8 +632,8 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
"Some mocked connection error."
)
with pytest.raises(AnsibleFailJson) as exc_info:
- set_module_args(get_module_args(type="qemu"))
- self.module.main()
+ with set_module_args(get_module_args(type="qemu")):
+ self.module.main()
result = exc_info.value.args[0]
assert "Failed to retrieve QEMU VMs information:" in result["msg"]
@@ -643,8 +643,8 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
"Some mocked connection error."
)
with pytest.raises(AnsibleFailJson) as exc_info:
- set_module_args(get_module_args(type="lxc"))
- self.module.main()
+ with set_module_args(get_module_args(type="lxc")):
+ self.module.main()
result = exc_info.value.args[0]
assert "Failed to retrieve LXC VMs information:" in result["msg"]
@@ -654,8 +654,8 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
"Some mocked connection error."
)
with pytest.raises(AnsibleFailJson) as exc_info:
- set_module_args(get_module_args())
- self.module.main()
+ with set_module_args(get_module_args()):
+ self.module.main()
result = exc_info.value.args[0]
assert (
@@ -665,8 +665,8 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
def test_module_fail_when_node_does_not_exist(self):
with pytest.raises(AnsibleFailJson) as exc_info:
- set_module_args(get_module_args(type="all", node="NODE3"))
- self.module.main()
+ with set_module_args(get_module_args(type="all", node="NODE3")):
+ self.module.main()
result = exc_info.value.args[0]
assert result["msg"] == "Node NODE3 doesn't exist in PVE cluster"
@@ -677,10 +677,10 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
) as get_vmid_mock:
with pytest.raises(AnsibleExitJson):
vmid = 100
- set_module_args(
+ with set_module_args(
get_module_args(type="all", vmid=vmid, name="something")
- )
- self.module.main()
+ ):
+ self.module.main()
assert get_vmid_mock.call_count == 0
@@ -701,14 +701,14 @@ class TestProxmoxVmInfoModule(ModuleTestCase):
with pytest.raises(AnsibleExitJson) as exc_info:
vmid = 101
- set_module_args(get_module_args(
+ with set_module_args(get_module_args(
type="qemu",
vmid=vmid,
config="current",
- ))
- expected_output = [vm for vm in EXPECTED_VMS_OUTPUT if vm["vmid"] == vmid]
- expected_output[0]["config"] = config_vm_value
- self.module.main()
+ )):
+ expected_output = [vm for vm in EXPECTED_VMS_OUTPUT if vm["vmid"] == vmid]
+ expected_output[0]["config"] = config_vm_value
+ self.module.main()
result = exc_info.value.args[0]
assert result["proxmox_vms"] == expected_output
diff --git a/tests/unit/plugins/modules/test_redis_data.py b/tests/unit/plugins/modules/test_redis_data.py
index da195f70a6..598c8bfd18 100644
--- a/tests/unit/plugins/modules/test_redis_data.py
+++ b/tests/unit/plugins/modules/test_redis_data.py
@@ -21,9 +21,9 @@ if tuple(map(int, __version__.split('.'))) < (3, 4, 0):
def test_redis_data_without_arguments(capfd):
- set_module_args({})
- with pytest.raises(SystemExit) as results:
- redis_data.main()
+ with set_module_args({}):
+ with pytest.raises(SystemExit) as results:
+ redis_data.main()
out, err = capfd.readouterr()
assert not err
assert json.loads(out)['failed']
@@ -31,16 +31,16 @@ def test_redis_data_without_arguments(capfd):
@pytest.mark.skipif(not HAS_REDIS_USERNAME_OPTION, reason="Redis version < 3.4.0")
def test_redis_data_key(capfd, mocker):
- set_module_args({'login_host': 'localhost',
- 'login_user': 'root',
- 'login_password': 'secret',
- 'key': 'foo',
- 'value': 'baz',
- '_ansible_check_mode': False})
- mocker.patch('redis.Redis.get', return_value='bar')
- mocker.patch('redis.Redis.set', return_value=True)
- with pytest.raises(SystemExit):
- redis_data.main()
+ with set_module_args({'login_host': 'localhost',
+ 'login_user': 'root',
+ 'login_password': 'secret',
+ 'key': 'foo',
+ 'value': 'baz',
+ '_ansible_check_mode': False}):
+ mocker.patch('redis.Redis.get', return_value='bar')
+ mocker.patch('redis.Redis.set', return_value=True)
+ with pytest.raises(SystemExit):
+ redis_data.main()
out, err = capfd.readouterr()
print(out)
assert not err
@@ -52,17 +52,17 @@ def test_redis_data_key(capfd, mocker):
@pytest.mark.skipif(not HAS_REDIS_USERNAME_OPTION, reason="Redis version < 3.4.0")
def test_redis_data_existing_key_nx(capfd, mocker):
- set_module_args({'login_host': 'localhost',
- 'login_user': 'root',
- 'login_password': 'secret',
- 'key': 'foo',
- 'value': 'baz',
- 'non_existing': True,
- '_ansible_check_mode': False})
- mocker.patch('redis.Redis.get', return_value='bar')
- mocker.patch('redis.Redis.set', return_value=None)
- with pytest.raises(SystemExit):
- redis_data.main()
+ with set_module_args({'login_host': 'localhost',
+ 'login_user': 'root',
+ 'login_password': 'secret',
+ 'key': 'foo',
+ 'value': 'baz',
+ 'non_existing': True,
+ '_ansible_check_mode': False}):
+ mocker.patch('redis.Redis.get', return_value='bar')
+ mocker.patch('redis.Redis.set', return_value=None)
+ with pytest.raises(SystemExit):
+ redis_data.main()
out, err = capfd.readouterr()
print(out)
assert not err
@@ -76,17 +76,17 @@ def test_redis_data_existing_key_nx(capfd, mocker):
@pytest.mark.skipif(not HAS_REDIS_USERNAME_OPTION, reason="Redis version < 3.4.0")
def test_redis_data_non_existing_key_xx(capfd, mocker):
- set_module_args({'login_host': 'localhost',
- 'login_user': 'root',
- 'login_password': 'secret',
- 'key': 'foo',
- 'value': 'baz',
- 'existing': True,
- '_ansible_check_mode': False})
- mocker.patch('redis.Redis.get', return_value=None)
- mocker.patch('redis.Redis.set', return_value=None)
- with pytest.raises(SystemExit):
- redis_data.main()
+ with set_module_args({'login_host': 'localhost',
+ 'login_user': 'root',
+ 'login_password': 'secret',
+ 'key': 'foo',
+ 'value': 'baz',
+ 'existing': True,
+ '_ansible_check_mode': False}):
+ mocker.patch('redis.Redis.get', return_value=None)
+ mocker.patch('redis.Redis.set', return_value=None)
+ with pytest.raises(SystemExit):
+ redis_data.main()
out, err = capfd.readouterr()
print(out)
assert not err
@@ -100,15 +100,15 @@ def test_redis_data_non_existing_key_xx(capfd, mocker):
@pytest.mark.skipif(not HAS_REDIS_USERNAME_OPTION, reason="Redis version < 3.4.0")
def test_redis_data_delete_present_key(capfd, mocker):
- set_module_args({'login_host': 'localhost',
- 'login_user': 'root',
- 'login_password': 'secret',
- 'key': 'foo',
- 'state': 'absent'})
- mocker.patch('redis.Redis.get', return_value='bar')
- mocker.patch('redis.Redis.delete', return_value=1)
- with pytest.raises(SystemExit):
- redis_data.main()
+ with set_module_args({'login_host': 'localhost',
+ 'login_user': 'root',
+ 'login_password': 'secret',
+ 'key': 'foo',
+ 'state': 'absent'}):
+ mocker.patch('redis.Redis.get', return_value='bar')
+ mocker.patch('redis.Redis.delete', return_value=1)
+ with pytest.raises(SystemExit):
+ redis_data.main()
out, err = capfd.readouterr()
print(out)
assert not err
@@ -118,15 +118,15 @@ def test_redis_data_delete_present_key(capfd, mocker):
@pytest.mark.skipif(not HAS_REDIS_USERNAME_OPTION, reason="Redis version < 3.4.0")
def test_redis_data_delete_absent_key(capfd, mocker):
- set_module_args({'login_host': 'localhost',
- 'login_user': 'root',
- 'login_password': 'secret',
- 'key': 'foo',
- 'state': 'absent'})
- mocker.patch('redis.Redis.delete', return_value=0)
- mocker.patch('redis.Redis.get', return_value=None)
- with pytest.raises(SystemExit):
- redis_data.main()
+ with set_module_args({'login_host': 'localhost',
+ 'login_user': 'root',
+ 'login_password': 'secret',
+ 'key': 'foo',
+ 'state': 'absent'}):
+ mocker.patch('redis.Redis.delete', return_value=0)
+ mocker.patch('redis.Redis.get', return_value=None)
+ with pytest.raises(SystemExit):
+ redis_data.main()
out, err = capfd.readouterr()
print(out)
assert not err
@@ -136,14 +136,14 @@ def test_redis_data_delete_absent_key(capfd, mocker):
@pytest.mark.skipif(HAS_REDIS_USERNAME_OPTION, reason="Redis version > 3.4.0")
def test_redis_data_fail_username(capfd, mocker):
- set_module_args({'login_host': 'localhost',
- 'login_user': 'root',
- 'login_password': 'secret',
- 'key': 'foo',
- 'value': 'baz',
- '_ansible_check_mode': False})
- with pytest.raises(SystemExit):
- redis_data.main()
+ with set_module_args({'login_host': 'localhost',
+ 'login_user': 'root',
+ 'login_password': 'secret',
+ 'key': 'foo',
+ 'value': 'baz',
+ '_ansible_check_mode': False}):
+ with pytest.raises(SystemExit):
+ redis_data.main()
out, err = capfd.readouterr()
print(out)
assert not err
@@ -153,15 +153,15 @@ def test_redis_data_fail_username(capfd, mocker):
def test_redis_data_key_no_username(capfd, mocker):
- set_module_args({'login_host': 'localhost',
- 'login_password': 'secret',
- 'key': 'foo',
- 'value': 'baz',
- '_ansible_check_mode': False})
- mocker.patch('redis.Redis.get', return_value='bar')
- mocker.patch('redis.Redis.set', return_value=True)
- with pytest.raises(SystemExit):
- redis_data.main()
+ with set_module_args({'login_host': 'localhost',
+ 'login_password': 'secret',
+ 'key': 'foo',
+ 'value': 'baz',
+ '_ansible_check_mode': False}):
+ mocker.patch('redis.Redis.get', return_value='bar')
+ mocker.patch('redis.Redis.set', return_value=True)
+ with pytest.raises(SystemExit):
+ redis_data.main()
out, err = capfd.readouterr()
print(out)
assert not err
@@ -172,15 +172,15 @@ def test_redis_data_key_no_username(capfd, mocker):
def test_redis_delete_key_no_username(capfd, mocker):
- set_module_args({'login_host': 'localhost',
- 'login_password': 'secret',
- 'key': 'foo',
- 'state': 'absent',
- '_ansible_check_mode': False})
- mocker.patch('redis.Redis.get', return_value='bar')
- mocker.patch('redis.Redis.delete', return_value=1)
- with pytest.raises(SystemExit):
- redis_data.main()
+ with set_module_args({'login_host': 'localhost',
+ 'login_password': 'secret',
+ 'key': 'foo',
+ 'state': 'absent',
+ '_ansible_check_mode': False}):
+ mocker.patch('redis.Redis.get', return_value='bar')
+ mocker.patch('redis.Redis.delete', return_value=1)
+ with pytest.raises(SystemExit):
+ redis_data.main()
out, err = capfd.readouterr()
print(out)
assert not err
@@ -189,15 +189,15 @@ def test_redis_delete_key_no_username(capfd, mocker):
def test_redis_delete_key_non_existent_key(capfd, mocker):
- set_module_args({'login_host': 'localhost',
- 'login_password': 'secret',
- 'key': 'foo',
- 'state': 'absent',
- '_ansible_check_mode': False})
- mocker.patch('redis.Redis.get', return_value=None)
- mocker.patch('redis.Redis.delete', return_value=0)
- with pytest.raises(SystemExit):
- redis_data.main()
+ with set_module_args({'login_host': 'localhost',
+ 'login_password': 'secret',
+ 'key': 'foo',
+ 'state': 'absent',
+ '_ansible_check_mode': False}):
+ mocker.patch('redis.Redis.get', return_value=None)
+ mocker.patch('redis.Redis.delete', return_value=0)
+ with pytest.raises(SystemExit):
+ redis_data.main()
out, err = capfd.readouterr()
print(out)
assert not err
@@ -206,15 +206,15 @@ def test_redis_delete_key_non_existent_key(capfd, mocker):
def test_redis_set_key_check_mode_nochange(capfd, mocker):
- set_module_args({'login_host': 'localhost',
- 'login_password': 'secret',
- 'key': 'foo',
- 'state': 'present',
- 'value': 'bar',
- '_ansible_check_mode': True})
- mocker.patch('redis.Redis.get', return_value='bar')
- with pytest.raises(SystemExit):
- redis_data.main()
+ with set_module_args({'login_host': 'localhost',
+ 'login_password': 'secret',
+ 'key': 'foo',
+ 'state': 'present',
+ 'value': 'bar',
+ '_ansible_check_mode': True}):
+ mocker.patch('redis.Redis.get', return_value='bar')
+ with pytest.raises(SystemExit):
+ redis_data.main()
out, err = capfd.readouterr()
print(out)
assert not err
@@ -225,15 +225,15 @@ def test_redis_set_key_check_mode_nochange(capfd, mocker):
def test_redis_set_key_check_mode_delete_nx(capfd, mocker):
- set_module_args({'login_host': 'localhost',
- 'login_password': 'secret',
- 'key': 'foo',
- 'state': 'present',
- 'value': 'baz',
- '_ansible_check_mode': True})
- mocker.patch('redis.Redis.get', return_value=None)
- with pytest.raises(SystemExit):
- redis_data.main()
+ with set_module_args({'login_host': 'localhost',
+ 'login_password': 'secret',
+ 'key': 'foo',
+ 'state': 'present',
+ 'value': 'baz',
+ '_ansible_check_mode': True}):
+ mocker.patch('redis.Redis.get', return_value=None)
+ with pytest.raises(SystemExit):
+ redis_data.main()
out, err = capfd.readouterr()
print(out)
assert not err
@@ -243,15 +243,15 @@ def test_redis_set_key_check_mode_delete_nx(capfd, mocker):
def test_redis_set_key_check_mode_delete(capfd, mocker):
- set_module_args({'login_host': 'localhost',
- 'login_password': 'secret',
- 'key': 'foo',
- 'state': 'present',
- 'value': 'baz',
- '_ansible_check_mode': True})
- mocker.patch('redis.Redis.get', return_value='bar')
- with pytest.raises(SystemExit):
- redis_data.main()
+ with set_module_args({'login_host': 'localhost',
+ 'login_password': 'secret',
+ 'key': 'foo',
+ 'state': 'present',
+ 'value': 'baz',
+ '_ansible_check_mode': True}):
+ mocker.patch('redis.Redis.get', return_value='bar')
+ with pytest.raises(SystemExit):
+ redis_data.main()
out, err = capfd.readouterr()
print(out)
assert not err
@@ -261,15 +261,15 @@ def test_redis_set_key_check_mode_delete(capfd, mocker):
def test_redis_set_key_check_mode(capfd, mocker):
- set_module_args({'login_host': 'localhost',
- 'login_password': 'secret',
- 'key': 'foo',
- 'state': 'present',
- 'value': 'baz',
- '_ansible_check_mode': True})
- mocker.patch('redis.Redis.get', return_value='bar')
- with pytest.raises(SystemExit):
- redis_data.main()
+ with set_module_args({'login_host': 'localhost',
+ 'login_password': 'secret',
+ 'key': 'foo',
+ 'state': 'present',
+ 'value': 'baz',
+ '_ansible_check_mode': True}):
+ mocker.patch('redis.Redis.get', return_value='bar')
+ with pytest.raises(SystemExit):
+ redis_data.main()
out, err = capfd.readouterr()
print(out)
assert not err
diff --git a/tests/unit/plugins/modules/test_redis_data_incr.py b/tests/unit/plugins/modules/test_redis_data_incr.py
index d819b2f7e2..d5dc1ad733 100644
--- a/tests/unit/plugins/modules/test_redis_data_incr.py
+++ b/tests/unit/plugins/modules/test_redis_data_incr.py
@@ -25,9 +25,9 @@ if HAS_REDIS_USERNAME_OPTION:
def test_redis_data_incr_without_arguments(capfd):
- set_module_args({})
- with pytest.raises(SystemExit) as results:
- redis_data_incr.main()
+ with set_module_args({}):
+ with pytest.raises(SystemExit) as results:
+ redis_data_incr.main()
out, err = capfd.readouterr()
assert not err
assert json.loads(out)['failed']
@@ -35,13 +35,13 @@ def test_redis_data_incr_without_arguments(capfd):
@pytest.mark.skipif(not HAS_REDIS_USERNAME_OPTION, reason="Redis version < 3.4.0")
def test_redis_data_incr(capfd, mocker):
- set_module_args({'login_host': 'localhost',
- 'login_user': 'root',
- 'login_password': 'secret',
- 'key': 'foo', })
- mocker.patch('redis.Redis.incr', return_value=57)
- with pytest.raises(SystemExit):
- redis_data_incr.main()
+ with set_module_args({'login_host': 'localhost',
+ 'login_user': 'root',
+ 'login_password': 'secret',
+ 'key': 'foo', }):
+ mocker.patch('redis.Redis.incr', return_value=57)
+ with pytest.raises(SystemExit):
+ redis_data_incr.main()
out, err = capfd.readouterr()
print(out)
assert not err
@@ -53,14 +53,14 @@ def test_redis_data_incr(capfd, mocker):
@pytest.mark.skipif(not HAS_REDIS_USERNAME_OPTION, reason="Redis version < 3.4.0")
def test_redis_data_incr_int(capfd, mocker):
- set_module_args({'login_host': 'localhost',
- 'login_user': 'root',
- 'login_password': 'secret',
- 'key': 'foo',
- 'increment_int': 10})
- mocker.patch('redis.Redis.incrby', return_value=57)
- with pytest.raises(SystemExit):
- redis_data_incr.main()
+ with set_module_args({'login_host': 'localhost',
+ 'login_user': 'root',
+ 'login_password': 'secret',
+ 'key': 'foo',
+ 'increment_int': 10}):
+ mocker.patch('redis.Redis.incrby', return_value=57)
+ with pytest.raises(SystemExit):
+ redis_data_incr.main()
out, err = capfd.readouterr()
print(out)
assert not err
@@ -72,14 +72,14 @@ def test_redis_data_incr_int(capfd, mocker):
@pytest.mark.skipif(not HAS_REDIS_USERNAME_OPTION, reason="Redis version < 3.4.0")
def test_redis_data_inc_float(capfd, mocker):
- set_module_args({'login_host': 'localhost',
- 'login_user': 'root',
- 'login_password': 'secret',
- 'key': 'foo',
- 'increment_float': '5.5'})
- mocker.patch('redis.Redis.incrbyfloat', return_value=57.45)
- with pytest.raises(SystemExit):
- redis_data_incr.main()
+ with set_module_args({'login_host': 'localhost',
+ 'login_user': 'root',
+ 'login_password': 'secret',
+ 'key': 'foo',
+ 'increment_float': '5.5'}):
+ mocker.patch('redis.Redis.incrbyfloat', return_value=57.45)
+ with pytest.raises(SystemExit):
+ redis_data_incr.main()
out, err = capfd.readouterr()
print(out)
assert not err
@@ -91,13 +91,15 @@ def test_redis_data_inc_float(capfd, mocker):
@pytest.mark.skipif(not HAS_REDIS_USERNAME_OPTION, reason="Redis version < 3.4.0")
def test_redis_data_incr_float_wrong_value(capfd):
- set_module_args({'login_host': 'localhost',
- 'login_user': 'root',
- 'login_password': 'secret',
- 'key': 'foo',
- 'increment_float': 'not_a_number'})
- with pytest.raises(SystemExit):
- redis_data_incr.main()
+ with set_module_args({
+ 'login_host': 'localhost',
+ 'login_user': 'root',
+ 'login_password': 'secret',
+ 'key': 'foo',
+ 'increment_float': 'not_a_number'
+ }):
+ with pytest.raises(SystemExit):
+ redis_data_incr.main()
out, err = capfd.readouterr()
print(out)
assert not err
@@ -106,13 +108,13 @@ def test_redis_data_incr_float_wrong_value(capfd):
@pytest.mark.skipif(HAS_REDIS_USERNAME_OPTION, reason="Redis version > 3.4.0")
def test_redis_data_incr_fail_username(capfd, mocker):
- set_module_args({'login_host': 'localhost',
- 'login_user': 'root',
- 'login_password': 'secret',
- 'key': 'foo',
- '_ansible_check_mode': False})
- with pytest.raises(SystemExit):
- redis_data_incr.main()
+ with set_module_args({'login_host': 'localhost',
+ 'login_user': 'root',
+ 'login_password': 'secret',
+ 'key': 'foo',
+ '_ansible_check_mode': False}):
+ with pytest.raises(SystemExit):
+ redis_data_incr.main()
out, err = capfd.readouterr()
print(out)
assert not err
@@ -122,12 +124,12 @@ def test_redis_data_incr_fail_username(capfd, mocker):
def test_redis_data_incr_no_username(capfd, mocker):
- set_module_args({'login_host': 'localhost',
- 'login_password': 'secret',
- 'key': 'foo', })
- mocker.patch('redis.Redis.incr', return_value=57)
- with pytest.raises(SystemExit):
- redis_data_incr.main()
+ with set_module_args({'login_host': 'localhost',
+ 'login_password': 'secret',
+ 'key': 'foo', }):
+ mocker.patch('redis.Redis.incr', return_value=57)
+ with pytest.raises(SystemExit):
+ redis_data_incr.main()
out, err = capfd.readouterr()
print(out)
assert not err
@@ -138,13 +140,13 @@ def test_redis_data_incr_no_username(capfd, mocker):
def test_redis_data_incr_float_no_username(capfd, mocker):
- set_module_args({'login_host': 'localhost',
- 'login_password': 'secret',
- 'key': 'foo',
- 'increment_float': '5.5'})
- mocker.patch('redis.Redis.incrbyfloat', return_value=57.45)
- with pytest.raises(SystemExit):
- redis_data_incr.main()
+ with set_module_args({'login_host': 'localhost',
+ 'login_password': 'secret',
+ 'key': 'foo',
+ 'increment_float': '5.5'}):
+ mocker.patch('redis.Redis.incrbyfloat', return_value=57.45)
+ with pytest.raises(SystemExit):
+ redis_data_incr.main()
out, err = capfd.readouterr()
print(out)
assert not err
@@ -155,13 +157,13 @@ def test_redis_data_incr_float_no_username(capfd, mocker):
def test_redis_data_incr_check_mode(capfd, mocker):
- set_module_args({'login_host': 'localhost',
- 'login_password': 'secret',
- 'key': 'foo',
- '_ansible_check_mode': True})
- mocker.patch('redis.Redis.get', return_value=10)
- with pytest.raises(SystemExit):
- redis_data_incr.main()
+ with set_module_args({'login_host': 'localhost',
+ 'login_password': 'secret',
+ 'key': 'foo',
+ '_ansible_check_mode': True}):
+ mocker.patch('redis.Redis.get', return_value=10)
+ with pytest.raises(SystemExit):
+ redis_data_incr.main()
out, err = capfd.readouterr()
print(out)
assert not err
@@ -171,13 +173,13 @@ def test_redis_data_incr_check_mode(capfd, mocker):
def test_redis_data_incr_check_mode_not_incrementable(capfd, mocker):
- set_module_args({'login_host': 'localhost',
- 'login_password': 'secret',
- 'key': 'foo',
- '_ansible_check_mode': True})
- mocker.patch('redis.Redis.get', return_value='bar')
- with pytest.raises(SystemExit):
- redis_data_incr.main()
+ with set_module_args({'login_host': 'localhost',
+ 'login_password': 'secret',
+ 'key': 'foo',
+ '_ansible_check_mode': True}):
+ mocker.patch('redis.Redis.get', return_value='bar')
+ with pytest.raises(SystemExit):
+ redis_data_incr.main()
out, err = capfd.readouterr()
print(out)
assert not err
@@ -190,14 +192,14 @@ def test_redis_data_incr_check_mode_not_incrementable(capfd, mocker):
@pytest.mark.skipif(not HAS_REDIS_USERNAME_OPTION, reason="Redis version < 3.4.0")
def test_redis_data_incr_check_mode_permissions(capfd, mocker):
- set_module_args({'login_host': 'localhost',
- 'login_password': 'secret',
- 'key': 'foo',
- '_ansible_check_mode': True})
- redis.Redis.get = mocker.Mock(side_effect=NoPermissionError(
- "this user has no permissions to run the 'get' command or its subcommand"))
- with pytest.raises(SystemExit):
- redis_data_incr.main()
+ with set_module_args({'login_host': 'localhost',
+ 'login_password': 'secret',
+ 'key': 'foo',
+ '_ansible_check_mode': True}):
+ redis.Redis.get = mocker.Mock(side_effect=NoPermissionError(
+ "this user has no permissions to run the 'get' command or its subcommand"))
+ with pytest.raises(SystemExit):
+ redis_data_incr.main()
out, err = capfd.readouterr()
print(out)
assert not err
diff --git a/tests/unit/plugins/modules/test_redis_data_info.py b/tests/unit/plugins/modules/test_redis_data_info.py
index 302e003bf1..bd6bba4ca3 100644
--- a/tests/unit/plugins/modules/test_redis_data_info.py
+++ b/tests/unit/plugins/modules/test_redis_data_info.py
@@ -23,9 +23,9 @@ if tuple(map(int, __version__.split('.'))) < (3, 4, 0):
def test_redis_data_info_without_arguments(capfd):
- set_module_args({})
- with pytest.raises(SystemExit):
- redis_data_info.main()
+ with set_module_args({}):
+ with pytest.raises(SystemExit):
+ redis_data_info.main()
out, err = capfd.readouterr()
assert not err
assert json.loads(out)['failed']
@@ -33,14 +33,16 @@ def test_redis_data_info_without_arguments(capfd):
@pytest.mark.skipif(not HAS_REDIS_USERNAME_OPTION, reason="Redis version < 3.4.0")
def test_redis_data_info_existing_key(capfd, mocker):
- set_module_args({'login_host': 'localhost',
- 'login_user': 'root',
- 'login_password': 'secret',
- 'key': 'foo',
- '_ansible_check_mode': False})
- mocker.patch('redis.Redis.get', return_value='bar')
- with pytest.raises(SystemExit):
- redis_data_info.main()
+ with set_module_args({
+ 'login_host': 'localhost',
+ 'login_user': 'root',
+ 'login_password': 'secret',
+ 'key': 'foo',
+ '_ansible_check_mode': False
+ }):
+ mocker.patch('redis.Redis.get', return_value='bar')
+ with pytest.raises(SystemExit):
+ redis_data_info.main()
out, err = capfd.readouterr()
print(out)
assert not err
@@ -50,14 +52,16 @@ def test_redis_data_info_existing_key(capfd, mocker):
@pytest.mark.skipif(not HAS_REDIS_USERNAME_OPTION, reason="Redis version < 3.4.0")
def test_redis_data_info_absent_key(capfd, mocker):
- set_module_args({'login_host': 'localhost',
- 'login_user': 'root',
- 'login_password': 'secret',
- 'key': 'foo',
- '_ansible_check_mode': False})
- mocker.patch('redis.Redis.get', return_value=None)
- with pytest.raises(SystemExit):
- redis_data_info.main()
+ with set_module_args({
+ 'login_host': 'localhost',
+ 'login_user': 'root',
+ 'login_password': 'secret',
+ 'key': 'foo',
+ '_ansible_check_mode': False
+ }):
+ mocker.patch('redis.Redis.get', return_value=None)
+ with pytest.raises(SystemExit):
+ redis_data_info.main()
out, err = capfd.readouterr()
print(out)
assert not err
@@ -67,13 +71,15 @@ def test_redis_data_info_absent_key(capfd, mocker):
@pytest.mark.skipif(HAS_REDIS_USERNAME_OPTION, reason="Redis version > 3.4.0")
def test_redis_data_fail_username(capfd, mocker):
- set_module_args({'login_host': 'localhost',
- 'login_user': 'root',
- 'login_password': 'secret',
- 'key': 'foo',
- '_ansible_check_mode': False})
- with pytest.raises(SystemExit):
- redis_data_info.main()
+ with set_module_args({
+ 'login_host': 'localhost',
+ 'login_user': 'root',
+ 'login_password': 'secret',
+ 'key': 'foo',
+ '_ansible_check_mode': False
+ }):
+ with pytest.raises(SystemExit):
+ redis_data_info.main()
out, err = capfd.readouterr()
print(out)
assert not err
@@ -84,13 +90,15 @@ def test_redis_data_fail_username(capfd, mocker):
@pytest.mark.skipif(HAS_REDIS_USERNAME_OPTION, reason="Redis version > 3.4.0")
def test_redis_data_info_absent_key_no_username(capfd, mocker):
- set_module_args({'login_host': 'localhost',
- 'login_password': 'secret',
- 'key': 'foo',
- '_ansible_check_mode': False})
- mocker.patch('redis.Redis.get', return_value=None)
- with pytest.raises(SystemExit):
- redis_data_info.main()
+ with set_module_args({
+ 'login_host': 'localhost',
+ 'login_password': 'secret',
+ 'key': 'foo',
+ '_ansible_check_mode': False
+ }):
+ mocker.patch('redis.Redis.get', return_value=None)
+ with pytest.raises(SystemExit):
+ redis_data_info.main()
out, err = capfd.readouterr()
print(out)
assert not err
@@ -100,13 +108,15 @@ def test_redis_data_info_absent_key_no_username(capfd, mocker):
@pytest.mark.skipif(HAS_REDIS_USERNAME_OPTION, reason="Redis version > 3.4.0")
def test_redis_data_info_existing_key_no_username(capfd, mocker):
- set_module_args({'login_host': 'localhost',
- 'login_password': 'secret',
- 'key': 'foo',
- '_ansible_check_mode': False})
- mocker.patch('redis.Redis.get', return_value='bar')
- with pytest.raises(SystemExit):
- redis_data_info.main()
+ with set_module_args({
+ 'login_host': 'localhost',
+ 'login_password': 'secret',
+ 'key': 'foo',
+ '_ansible_check_mode': False
+ }):
+ mocker.patch('redis.Redis.get', return_value='bar')
+ with pytest.raises(SystemExit):
+ redis_data_info.main()
out, err = capfd.readouterr()
print(out)
assert not err
diff --git a/tests/unit/plugins/modules/test_redis_info.py b/tests/unit/plugins/modules/test_redis_info.py
index 831b8f4052..6c50e094d2 100644
--- a/tests/unit/plugins/modules/test_redis_info.py
+++ b/tests/unit/plugins/modules/test_redis_info.py
@@ -47,8 +47,8 @@ class TestRedisInfoModule(ModuleTestCase):
"""Test without parameters"""
with self.patch_redis_client(side_effect=FakeRedisClient) as redis_client:
with self.assertRaises(AnsibleExitJson) as result:
- set_module_args({})
- self.module.main()
+ with set_module_args({}):
+ self.module.main()
self.assertEqual(redis_client.call_count, 1)
self.assertEqual(redis_client.call_args, ({'host': 'localhost',
'port': 6379,
@@ -64,12 +64,12 @@ class TestRedisInfoModule(ModuleTestCase):
"""Test with all parameters"""
with self.patch_redis_client(side_effect=FakeRedisClient) as redis_client:
with self.assertRaises(AnsibleExitJson) as result:
- set_module_args({
+ with set_module_args({
'login_host': 'test',
'login_port': 1234,
'login_password': 'PASS'
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(redis_client.call_count, 1)
self.assertEqual(redis_client.call_args, ({'host': 'test',
'port': 1234,
@@ -85,7 +85,7 @@ class TestRedisInfoModule(ModuleTestCase):
"""Test with tls parameters"""
with self.patch_redis_client(side_effect=FakeRedisClient) as redis_client:
with self.assertRaises(AnsibleExitJson) as result:
- set_module_args({
+ with set_module_args({
'login_host': 'test',
'login_port': 1234,
'login_password': 'PASS',
@@ -94,8 +94,8 @@ class TestRedisInfoModule(ModuleTestCase):
'client_cert_file': '/etc/ssl/client.pem',
'client_key_file': '/etc/ssl/client.key',
'validate_certs': False
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(redis_client.call_count, 1)
self.assertEqual(redis_client.call_args, ({'host': 'test',
'port': 1234,
@@ -111,7 +111,7 @@ class TestRedisInfoModule(ModuleTestCase):
"""Test failure message"""
with self.patch_redis_client(side_effect=FakeRedisClientFail) as redis_client:
with self.assertRaises(AnsibleFailJson) as result:
- set_module_args({})
- self.module.main()
+ with set_module_args({}):
+ self.module.main()
self.assertEqual(redis_client.call_count, 1)
self.assertEqual(result.exception.args[0]['msg'], 'unable to connect to database: Test Error')
diff --git a/tests/unit/plugins/modules/test_rhsm_release.py b/tests/unit/plugins/modules/test_rhsm_release.py
index e8b2db6fdc..a986cc054a 100644
--- a/tests/unit/plugins/modules/test_rhsm_release.py
+++ b/tests/unit/plugins/modules/test_rhsm_release.py
@@ -52,15 +52,15 @@ class RhsmRepositoryReleaseModuleTestCase(ModuleTestCase):
def test_release_set(self):
# test that the module attempts to change the release when the current
# release is not the same as the user-specific target release
- set_module_args({'release': '7.5'})
- self.module_main_command.side_effect = [
- # first call, get_release: returns different version so set_release is called
- (0, '7.4', ''),
- # second call, set_release: just needs to exit with 0 rc
- (0, '', ''),
- ]
+ with set_module_args({'release': '7.5'}):
+ self.module_main_command.side_effect = [
+ # first call, get_release: returns different version so set_release is called
+ (0, '7.4', ''),
+ # second call, set_release: just needs to exit with 0 rc
+ (0, '', ''),
+ ]
- result = self.module_main(AnsibleExitJson)
+ result = self.module_main(AnsibleExitJson)
self.assertTrue(result['changed'])
self.assertEqual('7.5', result['current_release'])
@@ -72,13 +72,13 @@ class RhsmRepositoryReleaseModuleTestCase(ModuleTestCase):
def test_release_set_idempotent(self):
# test that the module does not attempt to change the release when
# the current release matches the user-specified target release
- set_module_args({'release': '7.5'})
- self.module_main_command.side_effect = [
- # first call, get_release: returns same version, set_release is not called
- (0, '7.5', ''),
- ]
+ with set_module_args({'release': '7.5'}):
+ self.module_main_command.side_effect = [
+ # first call, get_release: returns same version, set_release is not called
+ (0, '7.5', ''),
+ ]
- result = self.module_main(AnsibleExitJson)
+ result = self.module_main(AnsibleExitJson)
self.assertFalse(result['changed'])
self.assertEqual('7.5', result['current_release'])
@@ -89,15 +89,15 @@ class RhsmRepositoryReleaseModuleTestCase(ModuleTestCase):
def test_release_unset(self):
# test that the module attempts to change the release when the current
# release is not the same as the user-specific target release
- set_module_args({'release': None})
- self.module_main_command.side_effect = [
- # first call, get_release: returns version so set_release is called
- (0, '7.5', ''),
- # second call, set_release: just needs to exit with 0 rc
- (0, '', ''),
- ]
+ with set_module_args({'release': None}):
+ self.module_main_command.side_effect = [
+ # first call, get_release: returns version so set_release is called
+ (0, '7.5', ''),
+ # second call, set_release: just needs to exit with 0 rc
+ (0, '', ''),
+ ]
- result = self.module_main(AnsibleExitJson)
+ result = self.module_main(AnsibleExitJson)
self.assertTrue(result['changed'])
self.assertIsNone(result['current_release'])
@@ -109,13 +109,13 @@ class RhsmRepositoryReleaseModuleTestCase(ModuleTestCase):
def test_release_unset_idempotent(self):
# test that the module attempts to change the release when the current
# release is not the same as the user-specific target release
- set_module_args({'release': None})
- self.module_main_command.side_effect = [
- # first call, get_release: returns no version, set_release is not called
- (0, 'Release not set', ''),
- ]
+ with set_module_args({'release': None}):
+ self.module_main_command.side_effect = [
+ # first call, get_release: returns no version, set_release is not called
+ (0, 'Release not set', ''),
+ ]
- result = self.module_main(AnsibleExitJson)
+ result = self.module_main(AnsibleExitJson)
self.assertFalse(result['changed'])
self.assertIsNone(result['current_release'])
@@ -126,9 +126,8 @@ class RhsmRepositoryReleaseModuleTestCase(ModuleTestCase):
def test_release_insane(self):
# test that insane values for release trigger fail_json
insane_value = 'this is an insane release value'
- set_module_args({'release': insane_value})
-
- result = self.module_main(AnsibleFailJson)
+ with set_module_args({'release': insane_value}):
+ result = self.module_main(AnsibleFailJson)
# also ensure that the fail msg includes the insane value
self.assertIn(insane_value, result['msg'])
diff --git a/tests/unit/plugins/modules/test_rpm_ostree_pkg.py b/tests/unit/plugins/modules/test_rpm_ostree_pkg.py
index 4888b64027..1c09eb3a16 100644
--- a/tests/unit/plugins/modules/test_rpm_ostree_pkg.py
+++ b/tests/unit/plugins/modules/test_rpm_ostree_pkg.py
@@ -35,12 +35,12 @@ class RpmOSTreeModuleTestCase(ModuleTestCase):
return exc.exception.args[0]
def test_present(self):
- set_module_args({'name': 'nfs-utils', 'state': 'present'})
- self.module_main_command.side_effect = [
- (0, '', ''),
- ]
+ with set_module_args({'name': 'nfs-utils', 'state': 'present'}):
+ self.module_main_command.side_effect = [
+ (0, '', ''),
+ ]
- result = self.module_main(AnsibleExitJson)
+ result = self.module_main(AnsibleExitJson)
self.assertTrue(result['changed'])
self.assertEqual(['nfs-utils'], result['packages'])
@@ -49,12 +49,12 @@ class RpmOSTreeModuleTestCase(ModuleTestCase):
])
def test_present_unchanged(self):
- set_module_args({'name': 'nfs-utils', 'state': 'present'})
- self.module_main_command.side_effect = [
- (77, '', ''),
- ]
+ with set_module_args({'name': 'nfs-utils', 'state': 'present'}):
+ self.module_main_command.side_effect = [
+ (77, '', ''),
+ ]
- result = self.module_main(AnsibleExitJson)
+ result = self.module_main(AnsibleExitJson)
self.assertFalse(result['changed'])
self.assertEqual(0, result['rc'])
@@ -64,12 +64,12 @@ class RpmOSTreeModuleTestCase(ModuleTestCase):
])
def test_present_failed(self):
- set_module_args({'name': 'nfs-utils', 'state': 'present'})
- self.module_main_command.side_effect = [
- (1, '', ''),
- ]
+ with set_module_args({'name': 'nfs-utils', 'state': 'present'}):
+ self.module_main_command.side_effect = [
+ (1, '', ''),
+ ]
- result = self.module_main(AnsibleFailJson)
+ result = self.module_main(AnsibleFailJson)
self.assertFalse(result['changed'])
self.assertEqual(1, result['rc'])
@@ -79,12 +79,12 @@ class RpmOSTreeModuleTestCase(ModuleTestCase):
])
def test_absent(self):
- set_module_args({'name': 'nfs-utils', 'state': 'absent'})
- self.module_main_command.side_effect = [
- (0, '', ''),
- ]
+ with set_module_args({'name': 'nfs-utils', 'state': 'absent'}):
+ self.module_main_command.side_effect = [
+ (0, '', ''),
+ ]
- result = self.module_main(AnsibleExitJson)
+ result = self.module_main(AnsibleExitJson)
self.assertTrue(result['changed'])
self.assertEqual(['nfs-utils'], result['packages'])
@@ -93,12 +93,12 @@ class RpmOSTreeModuleTestCase(ModuleTestCase):
])
def test_absent_failed(self):
- set_module_args({'name': 'nfs-utils', 'state': 'absent'})
- self.module_main_command.side_effect = [
- (1, '', ''),
- ]
+ with set_module_args({'name': 'nfs-utils', 'state': 'absent'}):
+ self.module_main_command.side_effect = [
+ (1, '', ''),
+ ]
- result = self.module_main(AnsibleFailJson)
+ result = self.module_main(AnsibleFailJson)
self.assertFalse(result['changed'])
self.assertEqual(1, result['rc'])
diff --git a/tests/unit/plugins/modules/test_scaleway_compute_private_network.py b/tests/unit/plugins/modules/test_scaleway_compute_private_network.py
index df6fd91a4a..834688be9f 100644
--- a/tests/unit/plugins/modules/test_scaleway_compute_private_network.py
+++ b/tests/unit/plugins/modules/test_scaleway_compute_private_network.py
@@ -62,9 +62,9 @@ def response_remove_nics():
def test_scaleway_private_network_without_arguments(capfd):
- set_module_args({})
- with pytest.raises(SystemExit) as results:
- scaleway_compute_private_network.main()
+ with set_module_args({}):
+ with pytest.raises(SystemExit) as results:
+ scaleway_compute_private_network.main()
out, err = capfd.readouterr()
assert not err
@@ -77,21 +77,22 @@ def test_scaleway_add_nic(capfd):
cid = 'c004b4cd-ef5g-678h-90i1-jk2345678l90'
url = 'servers/' + cid + '/private_nics'
- set_module_args({"project": "a123b4cd-ef5g-678h-90i1-jk2345678l90",
- "state": "present",
- "region": "par1",
- "compute_id": cid,
- "private_network_id": pnid
- })
+ with set_module_args({
+ "project": "a123b4cd-ef5g-678h-90i1-jk2345678l90",
+ "state": "present",
+ "region": "par1",
+ "compute_id": cid,
+ "private_network_id": pnid
+ }):
- with patch.object(Scaleway, 'get') as mock_scw_get:
- mock_scw_get.return_value = response_without_nics()
- with patch.object(Scaleway, 'post') as mock_scw_post:
- mock_scw_post.return_value = response_when_add_nics()
- with pytest.raises(SystemExit) as results:
- scaleway_compute_private_network.main()
- mock_scw_post.assert_any_call(path=url, data={"private_network_id": pnid})
- mock_scw_get.assert_any_call(url)
+ with patch.object(Scaleway, 'get') as mock_scw_get:
+ mock_scw_get.return_value = response_without_nics()
+ with patch.object(Scaleway, 'post') as mock_scw_post:
+ mock_scw_post.return_value = response_when_add_nics()
+ with pytest.raises(SystemExit) as results:
+ scaleway_compute_private_network.main()
+ mock_scw_post.assert_any_call(path=url, data={"private_network_id": pnid})
+ mock_scw_get.assert_any_call(url)
out, err = capfd.readouterr()
del os.environ['SCW_API_TOKEN']
@@ -105,18 +106,19 @@ def test_scaleway_add_existing_nic(capfd):
cid = 'c004b4cd-ef5g-678h-90i1-jk2345678l90'
url = 'servers/' + cid + '/private_nics'
- set_module_args({"project": "a123b4cd-ef5g-678h-90i1-jk2345678l90",
- "state": "present",
- "region": "par1",
- "compute_id": cid,
- "private_network_id": pnid
- })
+ with set_module_args({
+ "project": "a123b4cd-ef5g-678h-90i1-jk2345678l90",
+ "state": "present",
+ "region": "par1",
+ "compute_id": cid,
+ "private_network_id": pnid
+ }):
- with patch.object(Scaleway, 'get') as mock_scw_get:
- mock_scw_get.return_value = response_with_nics()
- with pytest.raises(SystemExit) as results:
- scaleway_compute_private_network.main()
- mock_scw_get.assert_any_call(url)
+ with patch.object(Scaleway, 'get') as mock_scw_get:
+ mock_scw_get.return_value = response_with_nics()
+ with pytest.raises(SystemExit) as results:
+ scaleway_compute_private_network.main()
+ mock_scw_get.assert_any_call(url)
out, err = capfd.readouterr()
del os.environ['SCW_API_TOKEN']
@@ -132,21 +134,22 @@ def test_scaleway_remove_existing_nic(capfd):
url = 'servers/' + cid + '/private_nics'
urlremove = 'servers/' + cid + '/private_nics/' + nicid
- set_module_args({"project": "a123b4cd-ef5g-678h-90i1-jk2345678l90",
- "state": "absent",
- "region": "par1",
- "compute_id": cid,
- "private_network_id": pnid
- })
+ with set_module_args({
+ "project": "a123b4cd-ef5g-678h-90i1-jk2345678l90",
+ "state": "absent",
+ "region": "par1",
+ "compute_id": cid,
+ "private_network_id": pnid
+ }):
- with patch.object(Scaleway, 'get') as mock_scw_get:
- mock_scw_get.return_value = response_with_nics()
- with patch.object(Scaleway, 'delete') as mock_scw_delete:
- mock_scw_delete.return_value = response_remove_nics()
- with pytest.raises(SystemExit) as results:
- scaleway_compute_private_network.main()
- mock_scw_delete.assert_any_call(urlremove)
- mock_scw_get.assert_any_call(url)
+ with patch.object(Scaleway, 'get') as mock_scw_get:
+ mock_scw_get.return_value = response_with_nics()
+ with patch.object(Scaleway, 'delete') as mock_scw_delete:
+ mock_scw_delete.return_value = response_remove_nics()
+ with pytest.raises(SystemExit) as results:
+ scaleway_compute_private_network.main()
+ mock_scw_delete.assert_any_call(urlremove)
+ mock_scw_get.assert_any_call(url)
out, err = capfd.readouterr()
@@ -161,18 +164,19 @@ def test_scaleway_remove_absent_nic(capfd):
cid = 'c004b4cd-ef5g-678h-90i1-jk2345678l90'
url = 'servers/' + cid + '/private_nics'
- set_module_args({"project": "a123b4cd-ef5g-678h-90i1-jk2345678l90",
- "state": "absent",
- "region": "par1",
- "compute_id": cid,
- "private_network_id": pnid
- })
+ with set_module_args({
+ "project": "a123b4cd-ef5g-678h-90i1-jk2345678l90",
+ "state": "absent",
+ "region": "par1",
+ "compute_id": cid,
+ "private_network_id": pnid
+ }):
- with patch.object(Scaleway, 'get') as mock_scw_get:
- mock_scw_get.return_value = response_without_nics()
- with pytest.raises(SystemExit) as results:
- scaleway_compute_private_network.main()
- mock_scw_get.assert_any_call(url)
+ with patch.object(Scaleway, 'get') as mock_scw_get:
+ mock_scw_get.return_value = response_without_nics()
+ with pytest.raises(SystemExit) as results:
+ scaleway_compute_private_network.main()
+ mock_scw_get.assert_any_call(url)
out, err = capfd.readouterr()
del os.environ['SCW_API_TOKEN']
diff --git a/tests/unit/plugins/modules/test_scaleway_private_network.py b/tests/unit/plugins/modules/test_scaleway_private_network.py
index 21805d3db8..4c0e9ca30a 100644
--- a/tests/unit/plugins/modules/test_scaleway_private_network.py
+++ b/tests/unit/plugins/modules/test_scaleway_private_network.py
@@ -71,9 +71,9 @@ def response_delete():
def test_scaleway_private_network_without_arguments(capfd):
- set_module_args({})
- with pytest.raises(SystemExit) as results:
- scaleway_private_network.main()
+ with set_module_args({}):
+ with pytest.raises(SystemExit) as results:
+ scaleway_private_network.main()
out, err = capfd.readouterr()
assert not err
@@ -81,20 +81,21 @@ def test_scaleway_private_network_without_arguments(capfd):
def test_scaleway_create_pn(capfd):
- set_module_args({"state": "present",
- "project": "a123b4cd-ef5g-678h-90i1-jk2345678l90",
- "region": "par2",
- "name": "new_network_name",
- "tags": ["tag1"]
- })
+ with set_module_args({
+ "state": "present",
+ "project": "a123b4cd-ef5g-678h-90i1-jk2345678l90",
+ "region": "par2",
+ "name": "new_network_name",
+ "tags": ["tag1"]
+ }):
- os.environ['SCW_API_TOKEN'] = 'notrealtoken'
- with patch.object(Scaleway, 'get') as mock_scw_get:
- mock_scw_get.return_value = response_with_zero_network()
- with patch.object(Scaleway, 'post') as mock_scw_post:
- mock_scw_post.return_value = response_create_new()
- with pytest.raises(SystemExit) as results:
- scaleway_private_network.main()
+ os.environ['SCW_API_TOKEN'] = 'notrealtoken'
+ with patch.object(Scaleway, 'get') as mock_scw_get:
+ mock_scw_get.return_value = response_with_zero_network()
+ with patch.object(Scaleway, 'post') as mock_scw_post:
+ mock_scw_post.return_value = response_create_new()
+ with pytest.raises(SystemExit) as results:
+ scaleway_private_network.main()
mock_scw_post.assert_any_call(path='private-networks/', data={'name': 'new_network_name',
'project_id': 'a123b4cd-ef5g-678h-90i1-jk2345678l90',
'tags': ['tag1']})
@@ -105,18 +106,19 @@ def test_scaleway_create_pn(capfd):
def test_scaleway_existing_pn(capfd):
- set_module_args({"state": "present",
- "project": "a123b4cd-ef5g-678h-90i1-jk2345678l90",
- "region": "par2",
- "name": "new_network_name",
- "tags": ["tag1"]
- })
+ with set_module_args({
+ "state": "present",
+ "project": "a123b4cd-ef5g-678h-90i1-jk2345678l90",
+ "region": "par2",
+ "name": "new_network_name",
+ "tags": ["tag1"]
+ }):
- os.environ['SCW_API_TOKEN'] = 'notrealtoken'
- with patch.object(Scaleway, 'get') as mock_scw_get:
- mock_scw_get.return_value = response_with_new_network()
- with pytest.raises(SystemExit) as results:
- scaleway_private_network.main()
+ os.environ['SCW_API_TOKEN'] = 'notrealtoken'
+ with patch.object(Scaleway, 'get') as mock_scw_get:
+ mock_scw_get.return_value = response_with_new_network()
+ with pytest.raises(SystemExit) as results:
+ scaleway_private_network.main()
mock_scw_get.assert_any_call('private-networks', params={'name': 'new_network_name', 'order_by': 'name_asc', 'page': 1, 'page_size': 10})
out, err = capfd.readouterr()
@@ -127,20 +129,21 @@ def test_scaleway_existing_pn(capfd):
def test_scaleway_add_tag_pn(capfd):
- set_module_args({"state": "present",
- "project": "a123b4cd-ef5g-678h-90i1-jk2345678l90",
- "region": "par2",
- "name": "new_network_name",
- "tags": ["newtag"]
- })
+ with set_module_args({
+ "state": "present",
+ "project": "a123b4cd-ef5g-678h-90i1-jk2345678l90",
+ "region": "par2",
+ "name": "new_network_name",
+ "tags": ["newtag"]
+ }):
- os.environ['SCW_API_TOKEN'] = 'notrealtoken'
- with patch.object(Scaleway, 'get') as mock_scw_get:
- mock_scw_get.return_value = response_with_new_network()
- with patch.object(Scaleway, 'patch') as mock_scw_patch:
- mock_scw_patch.return_value = response_create_new_newtag()
- with pytest.raises(SystemExit) as results:
- scaleway_private_network.main()
+ os.environ['SCW_API_TOKEN'] = 'notrealtoken'
+ with patch.object(Scaleway, 'get') as mock_scw_get:
+ mock_scw_get.return_value = response_with_new_network()
+ with patch.object(Scaleway, 'patch') as mock_scw_patch:
+ mock_scw_patch.return_value = response_create_new_newtag()
+ with pytest.raises(SystemExit) as results:
+ scaleway_private_network.main()
mock_scw_patch.assert_any_call(path='private-networks/c123b4cd-ef5g-678h-90i1-jk2345678l90', data={'name': 'new_network_name', 'tags': ['newtag']})
mock_scw_get.assert_any_call('private-networks', params={'name': 'new_network_name', 'order_by': 'name_asc', 'page': 1, 'page_size': 10})
@@ -152,20 +155,21 @@ def test_scaleway_add_tag_pn(capfd):
def test_scaleway_remove_pn(capfd):
- set_module_args({"state": "absent",
- "project": "a123b4cd-ef5g-678h-90i1-jk2345678l90",
- "region": "par2",
- "name": "new_network_name",
- "tags": ["newtag"]
- })
+ with set_module_args({
+ "state": "absent",
+ "project": "a123b4cd-ef5g-678h-90i1-jk2345678l90",
+ "region": "par2",
+ "name": "new_network_name",
+ "tags": ["newtag"]
+ }):
- os.environ['SCW_API_TOKEN'] = 'notrealtoken'
- with patch.object(Scaleway, 'get') as mock_scw_get:
- mock_scw_get.return_value = response_with_new_network()
- with patch.object(Scaleway, 'delete') as mock_scw_delete:
- mock_scw_delete.return_value = response_delete()
- with pytest.raises(SystemExit) as results:
- scaleway_private_network.main()
+ os.environ['SCW_API_TOKEN'] = 'notrealtoken'
+ with patch.object(Scaleway, 'get') as mock_scw_get:
+ mock_scw_get.return_value = response_with_new_network()
+ with patch.object(Scaleway, 'delete') as mock_scw_delete:
+ mock_scw_delete.return_value = response_delete()
+ with pytest.raises(SystemExit) as results:
+ scaleway_private_network.main()
mock_scw_delete.assert_any_call('private-networks/c123b4cd-ef5g-678h-90i1-jk2345678l90')
mock_scw_get.assert_any_call('private-networks', params={'name': 'new_network_name', 'order_by': 'name_asc', 'page': 1, 'page_size': 10})
@@ -177,18 +181,19 @@ def test_scaleway_remove_pn(capfd):
def test_scaleway_absent_pn_not_exists(capfd):
- set_module_args({"state": "absent",
- "project": "a123b4cd-ef5g-678h-90i1-jk2345678l90",
- "region": "par2",
- "name": "new_network_name",
- "tags": ["newtag"]
- })
+ with set_module_args({
+ "state": "absent",
+ "project": "a123b4cd-ef5g-678h-90i1-jk2345678l90",
+ "region": "par2",
+ "name": "new_network_name",
+ "tags": ["newtag"]
+ }):
- os.environ['SCW_API_TOKEN'] = 'notrealtoken'
- with patch.object(Scaleway, 'get') as mock_scw_get:
- mock_scw_get.return_value = response_with_zero_network()
- with pytest.raises(SystemExit) as results:
- scaleway_private_network.main()
+ os.environ['SCW_API_TOKEN'] = 'notrealtoken'
+ with patch.object(Scaleway, 'get') as mock_scw_get:
+ mock_scw_get.return_value = response_with_zero_network()
+ with pytest.raises(SystemExit) as results:
+ scaleway_private_network.main()
mock_scw_get.assert_any_call('private-networks', params={'name': 'new_network_name', 'order_by': 'name_asc', 'page': 1, 'page_size': 10})
out, err = capfd.readouterr()
diff --git a/tests/unit/plugins/modules/test_simpleinit_msb.py b/tests/unit/plugins/modules/test_simpleinit_msb.py
index d97e9b5f29..69e56cd15c 100644
--- a/tests/unit/plugins/modules/test_simpleinit_msb.py
+++ b/tests/unit/plugins/modules/test_simpleinit_msb.py
@@ -91,110 +91,112 @@ class TestSimpleinitMSB(ModuleTestCase):
def tearDown(self):
super(TestSimpleinitMSB, self).tearDown()
- def init_module(self, args):
- set_module_args(args)
-
- return SimpleinitMSB(build_module())
-
@patch('os.path.exists', return_value=True)
@patch('ansible.module_utils.basic.AnsibleModule.get_bin_path', return_value="/sbin/telinit")
def test_get_service_tools(self, *args, **kwargs):
- simpleinit_msb = self.init_module({
+ with set_module_args({
'name': 'smgl-suspend-single',
'state': 'running',
- })
+ }):
+ simpleinit_msb = SimpleinitMSB(build_module())
- simpleinit_msb.get_service_tools()
+ simpleinit_msb.get_service_tools()
- self.assertEqual(simpleinit_msb.telinit_cmd, "/sbin/telinit")
+ self.assertEqual(simpleinit_msb.telinit_cmd, "/sbin/telinit")
@patch('ansible_collections.community.general.plugins.modules.simpleinit_msb.SimpleinitMSB.execute_command')
def test_service_exists(self, execute_command):
- simpleinit_msb = self.init_module({
+ with set_module_args({
'name': 'smgl-suspend-single',
'state': 'running',
- })
+ }):
+ simpleinit_msb = SimpleinitMSB(build_module())
- execute_command.return_value = (0, _TELINIT_LIST, "")
+ execute_command.return_value = (0, _TELINIT_LIST, "")
- simpleinit_msb.service_exists()
+ simpleinit_msb.service_exists()
@patch('ansible_collections.community.general.plugins.modules.simpleinit_msb.SimpleinitMSB.execute_command')
def test_service_exists_not(self, execute_command):
- simpleinit_msb = self.init_module({
+ with set_module_args({
'name': 'ntp',
'state': 'running',
- })
+ }):
+ simpleinit_msb = SimpleinitMSB(build_module())
- execute_command.return_value = (0, _TELINIT_LIST, "")
+ execute_command.return_value = (0, _TELINIT_LIST, "")
- with self.assertRaises(AnsibleFailJson) as context:
- simpleinit_msb.service_exists()
+ with self.assertRaises(AnsibleFailJson) as context:
+ simpleinit_msb.service_exists()
- self.assertEqual("telinit could not find the requested service: ntp", context.exception.args[0]["msg"])
+ self.assertEqual("telinit could not find the requested service: ntp", context.exception.args[0]["msg"])
@patch('ansible_collections.community.general.plugins.modules.simpleinit_msb.SimpleinitMSB.service_exists')
@patch('ansible_collections.community.general.plugins.modules.simpleinit_msb.SimpleinitMSB.execute_command')
def test_check_service_enabled(self, execute_command, service_exists):
- simpleinit_msb = self.init_module({
+ with set_module_args({
'name': 'nscd',
'state': 'running',
'enabled': 'true',
- })
+ }):
+ simpleinit_msb = SimpleinitMSB(build_module())
- service_exists.return_value = True
- execute_command.return_value = (0, _TELINIT_LIST_ENABLED, "")
+ service_exists.return_value = True
+ execute_command.return_value = (0, _TELINIT_LIST_ENABLED, "")
- self.assertTrue(simpleinit_msb.service_enabled())
+ self.assertTrue(simpleinit_msb.service_enabled())
- # Race condition check
- with patch('ansible_collections.community.general.plugins.modules.simpleinit_msb.SimpleinitMSB.service_enabled', return_value=False):
- execute_command.return_value = (0, "", _TELINIT_ALREADY_ENABLED)
+ # Race condition check
+ with patch('ansible_collections.community.general.plugins.modules.simpleinit_msb.SimpleinitMSB.service_enabled', return_value=False):
+ execute_command.return_value = (0, "", _TELINIT_ALREADY_ENABLED)
- simpleinit_msb.service_enable()
+ simpleinit_msb.service_enable()
- self.assertFalse(simpleinit_msb.changed)
+ self.assertFalse(simpleinit_msb.changed)
@patch('ansible_collections.community.general.plugins.modules.simpleinit_msb.SimpleinitMSB.service_exists')
@patch('ansible_collections.community.general.plugins.modules.simpleinit_msb.SimpleinitMSB.execute_command')
def test_check_service_disabled(self, execute_command, service_exists):
- simpleinit_msb = self.init_module({
+ with set_module_args({
'name': 'sysstat',
'state': 'stopped',
'enabled': 'false',
- })
+ }):
+ simpleinit_msb = SimpleinitMSB(build_module())
- service_exists.return_value = True
- execute_command.return_value = (0, _TELINIT_LIST_DISABLED, "")
+ service_exists.return_value = True
+ execute_command.return_value = (0, _TELINIT_LIST_DISABLED, "")
- self.assertFalse(simpleinit_msb.service_enabled())
+ self.assertFalse(simpleinit_msb.service_enabled())
- # Race condition check
- with patch('ansible_collections.community.general.plugins.modules.simpleinit_msb.SimpleinitMSB.service_enabled', return_value=True):
- execute_command.return_value = (0, "", _TELINIT_ALREADY_DISABLED)
+ # Race condition check
+ with patch('ansible_collections.community.general.plugins.modules.simpleinit_msb.SimpleinitMSB.service_enabled', return_value=True):
+ execute_command.return_value = (0, "", _TELINIT_ALREADY_DISABLED)
- simpleinit_msb.service_enable()
+ simpleinit_msb.service_enable()
- self.assertFalse(simpleinit_msb.changed)
+ self.assertFalse(simpleinit_msb.changed)
@patch('ansible_collections.community.general.plugins.modules.simpleinit_msb.SimpleinitMSB.service_control')
def test_check_service_running(self, service_control):
- simpleinit_msb = self.init_module({
+ with set_module_args({
'name': 'sshd',
'state': 'running',
- })
+ }):
+ simpleinit_msb = SimpleinitMSB(build_module())
- service_control.return_value = (0, _TELINIT_STATUS_RUNNING, "")
+ service_control.return_value = (0, _TELINIT_STATUS_RUNNING, "")
- self.assertFalse(simpleinit_msb.get_service_status())
+ self.assertFalse(simpleinit_msb.get_service_status())
@patch('ansible_collections.community.general.plugins.modules.simpleinit_msb.SimpleinitMSB.service_control')
def test_check_service_running_not(self, service_control):
- simpleinit_msb = self.init_module({
+ with set_module_args({
'name': 'smgl-metalog',
'state': 'running',
- })
+ }):
+ simpleinit_msb = SimpleinitMSB(build_module())
- service_control.return_value = (0, _TELINIT_STATUS_RUNNING_NOT, "")
+ service_control.return_value = (0, _TELINIT_STATUS_RUNNING_NOT, "")
- self.assertFalse(simpleinit_msb.get_service_status())
+ self.assertFalse(simpleinit_msb.get_service_status())
diff --git a/tests/unit/plugins/modules/test_slack.py b/tests/unit/plugins/modules/test_slack.py
index 52ac9b7f37..f8c6594262 100644
--- a/tests/unit/plugins/modules/test_slack.py
+++ b/tests/unit/plugins/modules/test_slack.py
@@ -28,110 +28,105 @@ class TestSlackModule(ModuleTestCase):
def test_without_required_parameters(self):
"""Failure must occurs when all parameters are missing"""
with self.assertRaises(AnsibleFailJson):
- set_module_args({})
- self.module.main()
+ with set_module_args({}):
+ self.module.main()
def test_invalid_old_token(self):
"""Failure if there is an old style token"""
- set_module_args({
+ with set_module_args({
'token': 'test',
- })
- with self.assertRaises(AnsibleFailJson):
- self.module.main()
+ }):
+ with self.assertRaises(AnsibleFailJson):
+ self.module.main()
def test_successful_message(self):
"""tests sending a message. This is example 1 from the docs"""
- set_module_args({
+ with set_module_args({
'token': 'XXXX/YYYY/ZZZZ',
'msg': 'test'
- })
+ }):
+ with patch.object(slack, "fetch_url") as fetch_url_mock:
+ fetch_url_mock.return_value = (None, {"status": 200})
+ with self.assertRaises(AnsibleExitJson):
+ self.module.main()
- with patch.object(slack, "fetch_url") as fetch_url_mock:
- fetch_url_mock.return_value = (None, {"status": 200})
- with self.assertRaises(AnsibleExitJson):
- self.module.main()
-
- self.assertTrue(fetch_url_mock.call_count, 1)
- call_data = json.loads(fetch_url_mock.call_args[1]['data'])
- assert call_data['username'] == "Ansible"
- assert call_data['text'] == "test"
- assert fetch_url_mock.call_args[1]['url'] == "https://hooks.slack.com/services/XXXX/YYYY/ZZZZ"
+ self.assertTrue(fetch_url_mock.call_count, 1)
+ call_data = json.loads(fetch_url_mock.call_args[1]['data'])
+ assert call_data['username'] == "Ansible"
+ assert call_data['text'] == "test"
+ assert fetch_url_mock.call_args[1]['url'] == "https://hooks.slack.com/services/XXXX/YYYY/ZZZZ"
def test_failed_message(self):
"""tests failing to send a message"""
- set_module_args({
+ with set_module_args({
'token': 'XXXX/YYYY/ZZZZ',
'msg': 'test'
- })
-
- with patch.object(slack, "fetch_url") as fetch_url_mock:
- fetch_url_mock.return_value = (None, {"status": 404, 'msg': 'test'})
- with self.assertRaises(AnsibleFailJson):
- self.module.main()
+ }):
+ with patch.object(slack, "fetch_url") as fetch_url_mock:
+ fetch_url_mock.return_value = (None, {"status": 404, 'msg': 'test'})
+ with self.assertRaises(AnsibleFailJson):
+ self.module.main()
def test_message_with_thread(self):
"""tests sending a message with a thread"""
- set_module_args({
+ with set_module_args({
'token': 'XXXX/YYYY/ZZZZ',
'msg': 'test',
'thread_id': '100.00'
- })
+ }):
+ with patch.object(slack, "fetch_url") as fetch_url_mock:
+ fetch_url_mock.return_value = (None, {"status": 200})
+ with self.assertRaises(AnsibleExitJson):
+ self.module.main()
- with patch.object(slack, "fetch_url") as fetch_url_mock:
- fetch_url_mock.return_value = (None, {"status": 200})
- with self.assertRaises(AnsibleExitJson):
- self.module.main()
-
- self.assertTrue(fetch_url_mock.call_count, 1)
- call_data = json.loads(fetch_url_mock.call_args[1]['data'])
- assert call_data['username'] == "Ansible"
- assert call_data['text'] == "test"
- assert call_data['thread_ts'] == '100.00'
- assert fetch_url_mock.call_args[1]['url'] == "https://hooks.slack.com/services/XXXX/YYYY/ZZZZ"
+ self.assertTrue(fetch_url_mock.call_count, 1)
+ call_data = json.loads(fetch_url_mock.call_args[1]['data'])
+ assert call_data['username'] == "Ansible"
+ assert call_data['text'] == "test"
+ assert call_data['thread_ts'] == '100.00'
+ assert fetch_url_mock.call_args[1]['url'] == "https://hooks.slack.com/services/XXXX/YYYY/ZZZZ"
# https://github.com/ansible-collections/community.general/issues/1097
def test_ts_in_message_does_not_cause_edit(self):
- set_module_args({
+ with set_module_args({
'token': 'xoxa-123456789abcdef',
'msg': 'test with ts'
- })
+ }):
+ with patch.object(slack, "fetch_url") as fetch_url_mock:
+ mock_response = Mock()
+ mock_response.read.return_value = '{"fake":"data"}'
+ fetch_url_mock.return_value = (mock_response, {"status": 200})
+ with self.assertRaises(AnsibleExitJson):
+ self.module.main()
- with patch.object(slack, "fetch_url") as fetch_url_mock:
- mock_response = Mock()
- mock_response.read.return_value = '{"fake":"data"}'
- fetch_url_mock.return_value = (mock_response, {"status": 200})
- with self.assertRaises(AnsibleExitJson):
- self.module.main()
-
- self.assertTrue(fetch_url_mock.call_count, 1)
- self.assertEqual(fetch_url_mock.call_args[1]['url'], "https://slack.com/api/chat.postMessage")
+ self.assertTrue(fetch_url_mock.call_count, 1)
+ self.assertEqual(fetch_url_mock.call_args[1]['url'], "https://slack.com/api/chat.postMessage")
def test_edit_message(self):
- set_module_args({
+ with set_module_args({
'token': 'xoxa-123456789abcdef',
'msg': 'test2',
'message_id': '12345'
- })
+ }):
+ with patch.object(slack, "fetch_url") as fetch_url_mock:
+ mock_response = Mock()
+ mock_response.read.return_value = '{"messages":[{"ts":"12345","msg":"test1"}]}'
+ fetch_url_mock.side_effect = [
+ (mock_response, {"status": 200}),
+ (mock_response, {"status": 200}),
+ ]
+ with self.assertRaises(AnsibleExitJson):
+ self.module.main()
- with patch.object(slack, "fetch_url") as fetch_url_mock:
- mock_response = Mock()
- mock_response.read.return_value = '{"messages":[{"ts":"12345","msg":"test1"}]}'
- fetch_url_mock.side_effect = [
- (mock_response, {"status": 200}),
- (mock_response, {"status": 200}),
- ]
- with self.assertRaises(AnsibleExitJson):
- self.module.main()
-
- self.assertTrue(fetch_url_mock.call_count, 2)
- self.assertEqual(fetch_url_mock.call_args[1]['url'], "https://slack.com/api/chat.update")
- call_data = json.loads(fetch_url_mock.call_args[1]['data'])
- self.assertEqual(call_data['ts'], "12345")
+ self.assertTrue(fetch_url_mock.call_count, 2)
+ self.assertEqual(fetch_url_mock.call_args[1]['url'], "https://slack.com/api/chat.update")
+ call_data = json.loads(fetch_url_mock.call_args[1]['data'])
+ self.assertEqual(call_data['ts'], "12345")
def test_message_with_blocks(self):
"""tests sending a message with blocks"""
- set_module_args({
+ with set_module_args({
'token': 'XXXX/YYYY/ZZZZ',
'msg': 'test',
'blocks': [{
@@ -153,28 +148,27 @@ class TestSlackModule(ModuleTestCase):
'emoji': True
}
}]
- })
+ }):
+ with patch.object(slack, "fetch_url") as fetch_url_mock:
+ fetch_url_mock.return_value = (None, {"status": 200})
+ with self.assertRaises(AnsibleExitJson):
+ self.module.main()
- with patch.object(slack, "fetch_url") as fetch_url_mock:
- fetch_url_mock.return_value = (None, {"status": 200})
- with self.assertRaises(AnsibleExitJson):
- self.module.main()
-
- self.assertTrue(fetch_url_mock.call_count, 1)
- call_data = json.loads(fetch_url_mock.call_args[1]['data'])
- assert call_data['username'] == "Ansible"
- assert call_data['blocks'][1]['text']['text'] == "test"
- assert fetch_url_mock.call_args[1]['url'] == "https://hooks.slack.com/services/XXXX/YYYY/ZZZZ"
+ self.assertTrue(fetch_url_mock.call_count, 1)
+ call_data = json.loads(fetch_url_mock.call_args[1]['data'])
+ assert call_data['username'] == "Ansible"
+ assert call_data['blocks'][1]['text']['text'] == "test"
+ assert fetch_url_mock.call_args[1]['url'] == "https://hooks.slack.com/services/XXXX/YYYY/ZZZZ"
def test_message_with_invalid_color(self):
"""tests sending invalid color value to module"""
- set_module_args({
+ with set_module_args({
'token': 'XXXX/YYYY/ZZZZ',
'msg': 'test',
'color': 'aa',
- })
- with self.assertRaises(AnsibleFailJson) as exec_info:
- self.module.main()
+ }):
+ with self.assertRaises(AnsibleFailJson) as exec_info:
+ self.module.main()
msg = "Color value specified should be either one of" \
" ['normal', 'good', 'warning', 'danger'] or any valid" \
diff --git a/tests/unit/plugins/modules/test_solaris_zone.py b/tests/unit/plugins/modules/test_solaris_zone.py
index 20b550875c..eea66b3060 100644
--- a/tests/unit/plugins/modules/test_solaris_zone.py
+++ b/tests/unit/plugins/modules/test_solaris_zone.py
@@ -54,16 +54,16 @@ def test_zone_create(mocked_zone_create, capfd):
"""
test zone creation
"""
- set_module_args(
+ with set_module_args(
{
"name": "z1",
"state": "installed",
"path": "/zones/z1",
"_ansible_check_mode": False,
}
- )
- with pytest.raises(SystemExit):
- solaris_zone.main()
+ ):
+ with pytest.raises(SystemExit):
+ solaris_zone.main()
out, err = capfd.readouterr()
results = json.loads(out)
@@ -75,16 +75,16 @@ def test_zone_delete(mocked_zone_delete, capfd):
"""
test zone deletion
"""
- set_module_args(
+ with set_module_args(
{
"name": "z1",
"state": "absent",
"path": "/zones/z1",
"_ansible_check_mode": False,
}
- )
- with pytest.raises(SystemExit):
- solaris_zone.main()
+ ):
+ with pytest.raises(SystemExit):
+ solaris_zone.main()
out, err = capfd.readouterr()
results = json.loads(out)
@@ -100,16 +100,16 @@ def test_zone_create_invalid_names(mocked_zone_create, capfd):
# 2. Zone name > 64 characters.
# 3. Zone name beginning with non-alphanumeric character.
for invalid_name in ('foo!bar', 'z' * 65, '_zone'):
- set_module_args(
+ with set_module_args(
{
"name": invalid_name,
"state": "installed",
"path": "/zones/" + invalid_name,
"_ansible_check_mode": False,
}
- )
- with pytest.raises(SystemExit):
- solaris_zone.main()
+ ):
+ with pytest.raises(SystemExit):
+ solaris_zone.main()
out, err = capfd.readouterr()
results = json.loads(out)
diff --git a/tests/unit/plugins/modules/test_statsd.py b/tests/unit/plugins/modules/test_statsd.py
index 7d458c5eb4..d0f1f3e115 100644
--- a/tests/unit/plugins/modules/test_statsd.py
+++ b/tests/unit/plugins/modules/test_statsd.py
@@ -42,36 +42,36 @@ class TestStatsDModule(ModuleTestCase):
"""Test udp without parameters"""
with self.patch_udp_statsd_client(side_effect=FakeStatsD) as fake_statsd:
with self.assertRaises(AnsibleFailJson) as result:
- set_module_args({})
- self.module.main()
+ with set_module_args({}):
+ self.module.main()
def test_tcp_without_parameters(self):
"""Test tcp without parameters"""
with self.patch_tcp_statsd_client(side_effect=FakeStatsD) as fake_statsd:
with self.assertRaises(AnsibleFailJson) as result:
- set_module_args({})
- self.module.main()
+ with set_module_args({}):
+ self.module.main()
def test_udp_with_parameters(self):
"""Test udp with parameters"""
with self.patch_udp_statsd_client(side_effect=FakeStatsD) as fake_statsd:
with self.assertRaises(AnsibleExitJson) as result:
- set_module_args({
+ with set_module_args({
'metric': 'my_counter',
'metric_type': 'counter',
'value': 1,
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(result.exception.args[0]['msg'], 'Sent counter my_counter -> 1 to StatsD')
self.assertEqual(result.exception.args[0]['changed'], True)
with self.patch_udp_statsd_client(side_effect=FakeStatsD) as fake_statsd:
with self.assertRaises(AnsibleExitJson) as result:
- set_module_args({
+ with set_module_args({
'metric': 'my_gauge',
'metric_type': 'gauge',
'value': 3,
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(result.exception.args[0]['msg'], 'Sent gauge my_gauge -> 3 (delta=False) to StatsD')
self.assertEqual(result.exception.args[0]['changed'], True)
@@ -79,23 +79,23 @@ class TestStatsDModule(ModuleTestCase):
"""Test tcp with parameters"""
with self.patch_tcp_statsd_client(side_effect=FakeStatsD) as fake_statsd:
with self.assertRaises(AnsibleExitJson) as result:
- set_module_args({
+ with set_module_args({
'protocol': 'tcp',
'metric': 'my_counter',
'metric_type': 'counter',
'value': 1,
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(result.exception.args[0]['msg'], 'Sent counter my_counter -> 1 to StatsD')
self.assertEqual(result.exception.args[0]['changed'], True)
with self.patch_tcp_statsd_client(side_effect=FakeStatsD) as fake_statsd:
with self.assertRaises(AnsibleExitJson) as result:
- set_module_args({
+ with set_module_args({
'protocol': 'tcp',
'metric': 'my_gauge',
'metric_type': 'gauge',
'value': 3,
- })
- self.module.main()
+ }):
+ self.module.main()
self.assertEqual(result.exception.args[0]['msg'], 'Sent gauge my_gauge -> 3 (delta=False) to StatsD')
self.assertEqual(result.exception.args[0]['changed'], True)
diff --git a/tests/unit/plugins/modules/test_sysupgrade.py b/tests/unit/plugins/modules/test_sysupgrade.py
index 77d1f1cd06..d711fe0ed0 100644
--- a/tests/unit/plugins/modules/test_sysupgrade.py
+++ b/tests/unit/plugins/modules/test_sysupgrade.py
@@ -7,7 +7,7 @@ __metaclass__ = type
from ansible.module_utils import basic
from ansible_collections.community.general.tests.unit.compat.mock import patch
-from ansible_collections.community.general.tests.unit.plugins.modules.utils import AnsibleExitJson, AnsibleFailJson, ModuleTestCase
+from ansible_collections.community.general.tests.unit.plugins.modules.utils import set_module_args, AnsibleExitJson, AnsibleFailJson, ModuleTestCase
from ansible_collections.community.general.plugins.modules import sysupgrade
@@ -48,11 +48,12 @@ class TestSysupgradeModule(ModuleTestCase):
"""
stderr = ""
- with patch.object(basic.AnsibleModule, "run_command") as run_command:
- run_command.return_value = (rc, stdout, stderr)
- with self.assertRaises(AnsibleExitJson) as result:
- self.module.main()
- self.assertTrue(result.exception.args[0]['changed'])
+ with set_module_args({}):
+ with patch.object(basic.AnsibleModule, "run_command") as run_command:
+ run_command.return_value = (rc, stdout, stderr)
+ with self.assertRaises(AnsibleExitJson) as result:
+ self.module.main()
+ self.assertTrue(result.exception.args[0]['changed'])
def test_upgrade_failed(self):
""" Upgrade failed """
@@ -61,9 +62,10 @@ class TestSysupgradeModule(ModuleTestCase):
stdout = ""
stderr = "sysupgrade: need root privileges"
- with patch.object(basic.AnsibleModule, "run_command") as run_command_mock:
- run_command_mock.return_value = (rc, stdout, stderr)
- with self.assertRaises(AnsibleFailJson) as result:
- self.module.main()
- self.assertTrue(result.exception.args[0]['failed'])
- self.assertIn('need root', result.exception.args[0]['msg'])
+ with set_module_args({}):
+ with patch.object(basic.AnsibleModule, "run_command") as run_command_mock:
+ run_command_mock.return_value = (rc, stdout, stderr)
+ with self.assertRaises(AnsibleFailJson) as result:
+ self.module.main()
+ self.assertTrue(result.exception.args[0]['failed'])
+ self.assertIn('need root', result.exception.args[0]['msg'])
diff --git a/tests/unit/plugins/modules/test_terraform.py b/tests/unit/plugins/modules/test_terraform.py
index f6a0593fd3..deae3ccfb9 100644
--- a/tests/unit/plugins/modules/test_terraform.py
+++ b/tests/unit/plugins/modules/test_terraform.py
@@ -13,9 +13,9 @@ from ansible_collections.community.general.tests.unit.plugins.modules.utils impo
def test_terraform_without_argument(capfd):
- set_module_args({})
- with pytest.raises(SystemExit) as results:
- terraform.main()
+ with set_module_args({}):
+ with pytest.raises(SystemExit) as results:
+ terraform.main()
out, err = capfd.readouterr()
assert not err
diff --git a/tests/unit/plugins/modules/test_ufw.py b/tests/unit/plugins/modules/test_ufw.py
index da8f0f2c80..96eba0f286 100644
--- a/tests/unit/plugins/modules/test_ufw.py
+++ b/tests/unit/plugins/modules/test_ufw.py
@@ -7,10 +7,8 @@ __metaclass__ = type
from ansible_collections.community.general.tests.unit.compat import unittest
from ansible_collections.community.general.tests.unit.compat.mock import patch
from ansible.module_utils import basic
-from ansible.module_utils.common.text.converters import to_bytes
import ansible_collections.community.general.plugins.modules.ufw as module
-
-import json
+from ansible_collections.community.general.tests.unit.plugins.modules.utils import AnsibleExitJson, AnsibleFailJson, set_module_args, exit_json, fail_json
# mock ufw messages
@@ -104,35 +102,6 @@ def do_nothing_func_port_7000(*args, **kwarg):
return 0, dry_mode_cmd_with_port_700[args[0]], ""
-def set_module_args(args):
- args = json.dumps({'ANSIBLE_MODULE_ARGS': args})
- """prepare arguments so that they will be picked up during module creation"""
- basic._ANSIBLE_ARGS = to_bytes(args)
-
-
-class AnsibleExitJson(Exception):
- """Exception class to be raised by module.exit_json and caught by the test case"""
- pass
-
-
-class AnsibleFailJson(Exception):
- """Exception class to be raised by module.fail_json and caught by the test case"""
- pass
-
-
-def exit_json(*args, **kwargs):
- """function to patch over exit_json; package return data into an exception"""
- if 'changed' not in kwargs:
- kwargs['changed'] = False
- raise AnsibleExitJson(kwargs)
-
-
-def fail_json(*args, **kwargs):
- """function to patch over fail_json; package return data into an exception"""
- kwargs['failed'] = True
- raise AnsibleFailJson(kwargs)
-
-
def get_bin_path(self, arg, required=False):
"""Mock AnsibleModule.get_bin_path"""
return arg
@@ -171,28 +140,28 @@ class TestUFW(unittest.TestCase):
self.assertTrue(reg.match("::") is not None)
def test_check_mode_add_rules(self):
- set_module_args({
+ with set_module_args({
'rule': 'allow',
'proto': 'tcp',
'port': '7000',
'_ansible_check_mode': True
- })
- result = self.__getResult(do_nothing_func_port_7000)
+ }):
+ result = self.__getResult(do_nothing_func_port_7000)
self.assertFalse(result.exception.args[0]['changed'])
def test_check_mode_add_insert_rules(self):
- set_module_args({
+ with set_module_args({
'insert': '1',
'rule': 'allow',
'proto': 'tcp',
'port': '7000',
'_ansible_check_mode': True
- })
- result = self.__getResult(do_nothing_func_port_7000)
+ }):
+ result = self.__getResult(do_nothing_func_port_7000)
self.assertFalse(result.exception.args[0]['changed'])
def test_check_mode_add_detailed_route(self):
- set_module_args({
+ with set_module_args({
'rule': 'allow',
'route': 'yes',
'interface_in': 'foo',
@@ -203,13 +172,12 @@ class TestUFW(unittest.TestCase):
'from_port': '7000',
'to_port': '7001',
'_ansible_check_mode': True
- })
-
- result = self.__getResult(do_nothing_func_port_7000)
+ }):
+ result = self.__getResult(do_nothing_func_port_7000)
self.assertTrue(result.exception.args[0]['changed'])
def test_check_mode_add_ambiguous_route(self):
- set_module_args({
+ with set_module_args({
'rule': 'allow',
'route': 'yes',
'interface_in': 'foo',
@@ -217,68 +185,66 @@ class TestUFW(unittest.TestCase):
'direction': 'in',
'interface': 'baz',
'_ansible_check_mode': True
- })
-
- with self.assertRaises(AnsibleFailJson) as result:
- self.__getResult(do_nothing_func_port_7000)
+ }):
+ with self.assertRaises(AnsibleFailJson) as result:
+ self.__getResult(do_nothing_func_port_7000)
exc = result.exception.args[0]
self.assertTrue(exc['failed'])
self.assertIn('mutually exclusive', exc['msg'])
def test_check_mode_add_interface_in(self):
- set_module_args({
+ with set_module_args({
'rule': 'allow',
'proto': 'tcp',
'port': '7003',
'interface_in': 'foo',
'_ansible_check_mode': True
- })
- result = self.__getResult(do_nothing_func_port_7000)
+ }):
+ result = self.__getResult(do_nothing_func_port_7000)
self.assertTrue(result.exception.args[0]['changed'])
def test_check_mode_add_interface_out(self):
- set_module_args({
+ with set_module_args({
'rule': 'allow',
'proto': 'tcp',
'port': '7004',
'interface_out': 'foo',
'_ansible_check_mode': True
- })
- result = self.__getResult(do_nothing_func_port_7000)
+ }):
+ result = self.__getResult(do_nothing_func_port_7000)
self.assertTrue(result.exception.args[0]['changed'])
def test_check_mode_add_non_route_interface_both(self):
- set_module_args({
+ with set_module_args({
'rule': 'allow',
'proto': 'tcp',
'port': '7004',
'interface_in': 'foo',
'interface_out': 'bar',
'_ansible_check_mode': True
- })
-
- with self.assertRaises(AnsibleFailJson) as result:
- self.__getResult(do_nothing_func_port_7000)
+ }):
+ with self.assertRaises(AnsibleFailJson) as result:
+ self.__getResult(do_nothing_func_port_7000)
exc = result.exception.args[0]
self.assertTrue(exc['failed'])
self.assertIn('combine', exc['msg'])
def test_check_mode_add_direction_in(self):
- set_module_args({
+ with set_module_args({
'rule': 'allow',
'proto': 'tcp',
'port': '7003',
'direction': 'in',
'interface': 'foo',
'_ansible_check_mode': True
- })
- result = self.__getResult(do_nothing_func_port_7000)
+ }):
+ result = self.__getResult(do_nothing_func_port_7000)
self.assertTrue(result.exception.args[0]['changed'])
def test_check_mode_add_direction_in_with_ip(self):
- set_module_args({
+ with set_module_args({
'rule': 'allow',
'proto': 'tcp',
'from_ip': '1.1.1.1',
@@ -288,24 +254,24 @@ class TestUFW(unittest.TestCase):
'direction': 'in',
'interface': 'foo',
'_ansible_check_mode': True
- })
- result = self.__getResult(do_nothing_func_port_7000)
+ }):
+ result = self.__getResult(do_nothing_func_port_7000)
self.assertTrue(result.exception.args[0]['changed'])
def test_check_mode_add_direction_out(self):
- set_module_args({
+ with set_module_args({
'rule': 'allow',
'proto': 'tcp',
'port': '7004',
'direction': 'out',
'interface': 'foo',
'_ansible_check_mode': True
- })
- result = self.__getResult(do_nothing_func_port_7000)
+ }):
+ result = self.__getResult(do_nothing_func_port_7000)
self.assertTrue(result.exception.args[0]['changed'])
def test_check_mode_add_direction_out_with_ip(self):
- set_module_args({
+ with set_module_args({
'rule': 'allow',
'proto': 'tcp',
'from_ip': '1.1.1.1',
@@ -315,157 +281,149 @@ class TestUFW(unittest.TestCase):
'direction': 'out',
'interface': 'foo',
'_ansible_check_mode': True
- })
- result = self.__getResult(do_nothing_func_port_7000)
+ }):
+ result = self.__getResult(do_nothing_func_port_7000)
self.assertTrue(result.exception.args[0]['changed'])
def test_check_mode_delete_existing_rules(self):
- set_module_args({
+ with set_module_args({
'rule': 'allow',
'proto': 'tcp',
'port': '7000',
'delete': 'yes',
'_ansible_check_mode': True,
- })
-
- self.assertTrue(self.__getResult(do_nothing_func_port_7000).exception.args[0]['changed'])
+ }):
+ self.assertTrue(self.__getResult(do_nothing_func_port_7000).exception.args[0]['changed'])
def test_check_mode_delete_existing_insert_rules(self):
- set_module_args({
+ with set_module_args({
'insert': '1',
'rule': 'allow',
'proto': 'tcp',
'port': '7000',
'delete': 'yes',
'_ansible_check_mode': True,
- })
-
- self.assertTrue(self.__getResult(do_nothing_func_port_7000).exception.args[0]['changed'])
+ }):
+ self.assertTrue(self.__getResult(do_nothing_func_port_7000).exception.args[0]['changed'])
def test_check_mode_delete_not_existing_rules(self):
- set_module_args({
+ with set_module_args({
'rule': 'allow',
'proto': 'tcp',
'port': '7001',
'delete': 'yes',
'_ansible_check_mode': True,
- })
-
- self.assertFalse(self.__getResult(do_nothing_func_port_7000).exception.args[0]['changed'])
+ }):
+ self.assertFalse(self.__getResult(do_nothing_func_port_7000).exception.args[0]['changed'])
def test_check_mode_delete_not_existing_insert_rules(self):
- set_module_args({
+ with set_module_args({
'insert': '1',
'rule': 'allow',
'proto': 'tcp',
'port': '7001',
'delete': 'yes',
'_ansible_check_mode': True,
- })
-
- self.assertFalse(self.__getResult(do_nothing_func_port_7000).exception.args[0]['changed'])
+ }):
+ self.assertFalse(self.__getResult(do_nothing_func_port_7000).exception.args[0]['changed'])
def test_enable_mode(self):
- set_module_args({
+ with set_module_args({
'state': 'enabled',
'_ansible_check_mode': True
- })
-
- self.assertFalse(self.__getResult(do_nothing_func_port_7000).exception.args[0]['changed'])
+ }):
+ self.assertFalse(self.__getResult(do_nothing_func_port_7000).exception.args[0]['changed'])
def test_disable_mode(self):
- set_module_args({
+ with set_module_args({
'state': 'disabled',
'_ansible_check_mode': True
- })
-
- self.assertTrue(self.__getResult(do_nothing_func_port_7000).exception.args[0]['changed'])
+ }):
+ self.assertTrue(self.__getResult(do_nothing_func_port_7000).exception.args[0]['changed'])
def test_logging_off(self):
- set_module_args({
+ with set_module_args({
'logging': 'off',
'_ansible_check_mode': True
- })
-
- self.assertTrue(self.__getResult(do_nothing_func_port_7000).exception.args[0]['changed'])
+ }):
+ self.assertTrue(self.__getResult(do_nothing_func_port_7000).exception.args[0]['changed'])
def test_logging_on(self):
- set_module_args({
+ with set_module_args({
'logging': 'on',
'_ansible_check_mode': True
- })
-
- self.assertFalse(self.__getResult(do_nothing_func_port_7000).exception.args[0]['changed'])
+ }):
+ self.assertFalse(self.__getResult(do_nothing_func_port_7000).exception.args[0]['changed'])
def test_default_changed(self):
- set_module_args({
+ with set_module_args({
'default': 'allow',
"direction": "incoming",
'_ansible_check_mode': True
- })
- self.assertTrue(self.__getResult(do_nothing_func_port_7000).exception.args[0]['changed'])
+ }):
+ self.assertTrue(self.__getResult(do_nothing_func_port_7000).exception.args[0]['changed'])
def test_default_not_changed(self):
- set_module_args({
+ with set_module_args({
'default': 'deny',
"direction": "incoming",
'_ansible_check_mode': True
- })
- self.assertFalse(self.__getResult(do_nothing_func_port_7000).exception.args[0]['changed'])
+ }):
+ self.assertFalse(self.__getResult(do_nothing_func_port_7000).exception.args[0]['changed'])
def test_ipv6_remove(self):
- set_module_args({
+ with set_module_args({
'rule': 'allow',
'proto': 'udp',
'port': '5353',
'from': 'ff02::fb',
'delete': 'yes',
'_ansible_check_mode': True,
- })
- self.assertTrue(self.__getResult(do_nothing_func_ipv6).exception.args[0]['changed'])
+ }):
+ self.assertTrue(self.__getResult(do_nothing_func_ipv6).exception.args[0]['changed'])
def test_ipv6_add_existing(self):
- set_module_args({
+ with set_module_args({
'rule': 'allow',
'proto': 'udp',
'port': '5353',
'from': 'ff02::fb',
'_ansible_check_mode': True,
- })
- self.assertFalse(self.__getResult(do_nothing_func_ipv6).exception.args[0]['changed'])
+ }):
+ self.assertFalse(self.__getResult(do_nothing_func_ipv6).exception.args[0]['changed'])
def test_add_not_existing_ipv4_submask(self):
- set_module_args({
+ with set_module_args({
'rule': 'allow',
'proto': 'udp',
'port': '1577',
'from': '10.0.0.0/24',
'_ansible_check_mode': True,
- })
- self.assertTrue(self.__getResult(do_nothing_func_ipv6).exception.args[0]['changed'])
+ }):
+ self.assertTrue(self.__getResult(do_nothing_func_ipv6).exception.args[0]['changed'])
def test_ipv4_add_with_existing_ipv6(self):
- set_module_args({
+ with set_module_args({
'rule': 'allow',
'proto': 'udp',
'port': '5353',
'from': '224.0.0.252',
'_ansible_check_mode': True,
- })
- self.assertTrue(self.__getResult(do_nothing_func_ipv6).exception.args[0]['changed'])
+ }):
+ self.assertTrue(self.__getResult(do_nothing_func_ipv6).exception.args[0]['changed'])
def test_ipv6_add_from_nothing(self):
- set_module_args({
+ with set_module_args({
'rule': 'allow',
'port': '23',
'to': '::',
'_ansible_check_mode': True,
- })
- result = self.__getResult(do_nothing_func_nothing).exception.args[0]
+ }):
+ result = self.__getResult(do_nothing_func_nothing).exception.args[0]
print(result)
self.assertTrue(result['changed'])
diff --git a/tests/unit/plugins/modules/test_usb_facts.py b/tests/unit/plugins/modules/test_usb_facts.py
index 084433492f..286a619067 100644
--- a/tests/unit/plugins/modules/test_usb_facts.py
+++ b/tests/unit/plugins/modules/test_usb_facts.py
@@ -5,42 +5,11 @@
from __future__ import (absolute_import, division, print_function)
__metaclass__ = type
-import json
-
from ansible_collections.community.general.tests.unit.compat import mock
from ansible_collections.community.general.tests.unit.compat import unittest
from ansible.module_utils import basic
-from ansible.module_utils.common.text.converters import to_bytes
from ansible_collections.community.general.plugins.modules import usb_facts
-
-
-def set_module_args(args):
- """prepare arguments so that they will be picked up during module creation"""
- args = json.dumps({'ANSIBLE_MODULE_ARGS': args})
- basic._ANSIBLE_ARGS = to_bytes(args)
-
-
-class AnsibleExitJson(Exception):
- """Exception class to be raised by module.exit_json and caught by the test case"""
- pass
-
-
-class AnsibleFailJson(Exception):
- """Exception class to be raised by module.fail_json and caught by the test case"""
- pass
-
-
-def exit_json(*args, **kwargs):
- """function to patch over exit_json; package return data into an exception"""
- if 'changed' not in kwargs:
- kwargs['changed'] = False
- raise AnsibleExitJson(kwargs)
-
-
-def fail_json(*args, **kwargs):
- """function to patch over fail_json; package return data into an exception"""
- kwargs['failed'] = True
- raise AnsibleFailJson(kwargs)
+from ansible_collections.community.general.tests.unit.plugins.modules.utils import AnsibleExitJson, set_module_args, exit_json, fail_json
def get_bin_path(self, arg, required=False):
@@ -85,8 +54,8 @@ class TestUsbFacts(unittest.TestCase):
command_output = data["input"]
mock_run_command.return_value = 0, command_output, None
with self.assertRaises(AnsibleExitJson) as result:
- set_module_args({})
- usb_facts.main()
+ with set_module_args({}):
+ usb_facts.main()
for output_field in self.output_fields:
self.assertEqual(result.exception.args[0]["ansible_facts"]["usb_devices"][0][output_field], data[output_field])
@@ -97,8 +66,8 @@ class TestUsbFacts(unittest.TestCase):
with mock.patch.object(basic.AnsibleModule, 'run_command') as mock_run_command:
mock_run_command.return_value = 0, input, None
with self.assertRaises(AnsibleExitJson) as result:
- set_module_args({})
- usb_facts.main()
+ with set_module_args({}):
+ usb_facts.main()
for index in range(0, len(self.testing_data)):
for output_field in self.output_fields:
self.assertEqual(result.exception.args[0]["ansible_facts"]["usb_devices"][index][output_field],
diff --git a/tests/unit/plugins/modules/test_wdc_redfish_command.py b/tests/unit/plugins/modules/test_wdc_redfish_command.py
index 9f0104042c..9e4d373f42 100644
--- a/tests/unit/plugins/modules/test_wdc_redfish_command.py
+++ b/tests/unit/plugins/modules/test_wdc_redfish_command.py
@@ -309,30 +309,30 @@ class TestWdcRedfishCommand(unittest.TestCase):
def test_module_fail_when_required_args_missing(self):
with self.assertRaises(AnsibleFailJson):
- set_module_args({})
- module.main()
+ with set_module_args({}):
+ module.main()
def test_module_fail_when_unknown_category(self):
with self.assertRaises(AnsibleFailJson):
- set_module_args({
+ with set_module_args({
'category': 'unknown',
'command': 'FWActivate',
'username': 'USERID',
'password': 'PASSW0RD=21',
'ioms': [],
- })
- module.main()
+ }):
+ module.main()
def test_module_fail_when_unknown_command(self):
with self.assertRaises(AnsibleFailJson):
- set_module_args({
+ with set_module_args({
'category': 'Update',
'command': 'unknown',
'username': 'USERID',
'password': 'PASSW0RD=21',
'ioms': [],
- })
- module.main()
+ }):
+ module.main()
def test_module_chassis_power_mode_low(self):
"""Test setting chassis power mode to low (happy path)."""
@@ -344,15 +344,15 @@ class TestWdcRedfishCommand(unittest.TestCase):
'resource_id': 'Enclosure',
'baseuri': 'example.com'
}
- set_module_args(module_args)
- with patch.multiple("ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.WdcRedfishUtils",
- get_request=mock_get_request,
- post_request=mock_post_request):
- with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
- module.main()
- self.assertEqual(ACTION_WAS_SUCCESSFUL_MESSAGE,
- get_exception_message(ansible_exit_json))
- self.assertTrue(is_changed(ansible_exit_json))
+ with set_module_args(module_args):
+ with patch.multiple("ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.WdcRedfishUtils",
+ get_request=mock_get_request,
+ post_request=mock_post_request):
+ with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
+ module.main()
+ self.assertEqual(ACTION_WAS_SUCCESSFUL_MESSAGE,
+ get_exception_message(ansible_exit_json))
+ self.assertTrue(is_changed(ansible_exit_json))
def test_module_chassis_power_mode_normal_when_already_normal(self):
"""Test setting chassis power mode to normal when it already is. Verify we get changed=False."""
@@ -364,14 +364,14 @@ class TestWdcRedfishCommand(unittest.TestCase):
'resource_id': 'Enclosure',
'baseuri': 'example.com'
}
- set_module_args(module_args)
- with patch.multiple("ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.WdcRedfishUtils",
- get_request=mock_get_request):
- with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
- module.main()
- self.assertEqual(ACTION_WAS_SUCCESSFUL_MESSAGE,
- get_exception_message(ansible_exit_json))
- self.assertFalse(is_changed(ansible_exit_json))
+ with set_module_args(module_args):
+ with patch.multiple("ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.WdcRedfishUtils",
+ get_request=mock_get_request):
+ with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
+ module.main()
+ self.assertEqual(ACTION_WAS_SUCCESSFUL_MESSAGE,
+ get_exception_message(ansible_exit_json))
+ self.assertFalse(is_changed(ansible_exit_json))
def test_module_chassis_power_mode_invalid_command(self):
"""Test that we get an error when issuing an invalid PowerMode command."""
@@ -383,14 +383,14 @@ class TestWdcRedfishCommand(unittest.TestCase):
'resource_id': 'Enclosure',
'baseuri': 'example.com'
}
- set_module_args(module_args)
- with patch.multiple("ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.WdcRedfishUtils",
- get_request=mock_get_request):
- with self.assertRaises(AnsibleFailJson) as ansible_fail_json:
- module.main()
- expected_error_message = "Invalid Command 'PowerModeExtraHigh'"
- self.assertIn(expected_error_message,
- get_exception_message(ansible_fail_json))
+ with set_module_args(module_args):
+ with patch.multiple("ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.WdcRedfishUtils",
+ get_request=mock_get_request):
+ with self.assertRaises(AnsibleFailJson) as ansible_fail_json:
+ module.main()
+ expected_error_message = "Invalid Command 'PowerModeExtraHigh'"
+ self.assertIn(expected_error_message,
+ get_exception_message(ansible_fail_json))
def test_module_enclosure_led_indicator_on(self):
"""Test turning on a valid LED indicator (in this case we use the Enclosure resource)."""
@@ -402,16 +402,15 @@ class TestWdcRedfishCommand(unittest.TestCase):
"resource_id": "Enclosure",
"baseuri": "example.com"
}
- set_module_args(module_args)
-
- with patch.multiple("ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.WdcRedfishUtils",
- get_request=mock_get_request,
- post_request=mock_post_request):
- with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
- module.main()
- self.assertEqual(ACTION_WAS_SUCCESSFUL_MESSAGE,
- get_exception_message(ansible_exit_json))
- self.assertTrue(is_changed(ansible_exit_json))
+ with set_module_args(module_args):
+ with patch.multiple("ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.WdcRedfishUtils",
+ get_request=mock_get_request,
+ post_request=mock_post_request):
+ with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
+ module.main()
+ self.assertEqual(ACTION_WAS_SUCCESSFUL_MESSAGE,
+ get_exception_message(ansible_exit_json))
+ self.assertTrue(is_changed(ansible_exit_json))
def test_module_invalid_resource_led_indicator_on(self):
"""Test turning LED on for an invalid resource id."""
@@ -423,16 +422,15 @@ class TestWdcRedfishCommand(unittest.TestCase):
"resource_id": "Disk99",
"baseuri": "example.com"
}
- set_module_args(module_args)
-
- with patch.multiple("ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.WdcRedfishUtils",
- get_request=mock_get_request,
- post_request=mock_post_request):
- with self.assertRaises(AnsibleFailJson) as ansible_fail_json:
- module.main()
- expected_error_message = "Chassis resource Disk99 not found"
- self.assertEqual(expected_error_message,
- get_exception_message(ansible_fail_json))
+ with set_module_args(module_args):
+ with patch.multiple("ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.WdcRedfishUtils",
+ get_request=mock_get_request,
+ post_request=mock_post_request):
+ with self.assertRaises(AnsibleFailJson) as ansible_fail_json:
+ module.main()
+ expected_error_message = "Chassis resource Disk99 not found"
+ self.assertEqual(expected_error_message,
+ get_exception_message(ansible_fail_json))
def test_module_enclosure_led_off_already_off(self):
"""Test turning LED indicator off when it's already off. Confirm changed is False and no POST occurs."""
@@ -444,15 +442,14 @@ class TestWdcRedfishCommand(unittest.TestCase):
"resource_id": "Enclosure",
"baseuri": "example.com"
}
- set_module_args(module_args)
-
- with patch.multiple("ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.WdcRedfishUtils",
- get_request=mock_get_request):
- with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
- module.main()
- self.assertEqual(ACTION_WAS_SUCCESSFUL_MESSAGE,
- get_exception_message(ansible_exit_json))
- self.assertFalse(is_changed(ansible_exit_json))
+ with set_module_args(module_args):
+ with patch.multiple("ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.WdcRedfishUtils",
+ get_request=mock_get_request):
+ with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
+ module.main()
+ self.assertEqual(ACTION_WAS_SUCCESSFUL_MESSAGE,
+ get_exception_message(ansible_exit_json))
+ self.assertFalse(is_changed(ansible_exit_json))
def test_module_fw_activate_first_iom_unavailable(self):
"""Test that if the first IOM is not available, the 2nd one is used."""
@@ -467,26 +464,26 @@ class TestWdcRedfishCommand(unittest.TestCase):
'password': 'PASSW0RD=21',
'ioms': ioms
}
- set_module_args(module_args)
+ with set_module_args(module_args):
- def mock_get_request(*args, **kwargs):
- """Mock for get_request that will fail on the 'bad' IOM."""
- if "bad.example.com" in args[1]:
- return MOCK_URL_ERROR
- else:
- return mock_get_request_enclosure_single_tenant(*args, **kwargs)
+ def mock_get_request(*args, **kwargs):
+ """Mock for get_request that will fail on the 'bad' IOM."""
+ if "bad.example.com" in args[1]:
+ return MOCK_URL_ERROR
+ else:
+ return mock_get_request_enclosure_single_tenant(*args, **kwargs)
- with patch.multiple(module.WdcRedfishUtils,
- _firmware_activate_uri=mock_fw_activate_url,
- _update_uri=mock_update_url,
- _find_updateservice_resource=empty_return,
- _find_updateservice_additional_uris=empty_return,
- get_request=mock_get_request,
- post_request=mock_post_request):
- with self.assertRaises(AnsibleExitJson) as cm:
- module.main()
- self.assertEqual(ACTION_WAS_SUCCESSFUL_MESSAGE,
- get_exception_message(cm))
+ with patch.multiple(module.WdcRedfishUtils,
+ _firmware_activate_uri=mock_fw_activate_url,
+ _update_uri=mock_update_url,
+ _find_updateservice_resource=empty_return,
+ _find_updateservice_additional_uris=empty_return,
+ get_request=mock_get_request,
+ post_request=mock_post_request):
+ with self.assertRaises(AnsibleExitJson) as cm:
+ module.main()
+ self.assertEqual(ACTION_WAS_SUCCESSFUL_MESSAGE,
+ get_exception_message(cm))
def test_module_fw_activate_pass(self):
"""Test the FW Activate command in a passing scenario."""
@@ -508,69 +505,68 @@ class TestWdcRedfishCommand(unittest.TestCase):
'password': 'PASSW0RD=21',
}
module_args.update(uri_specifier)
- set_module_args(module_args)
-
- with patch.multiple("ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.WdcRedfishUtils",
- _firmware_activate_uri=mock_fw_activate_url,
- _update_uri=mock_update_url,
- _find_updateservice_resource=empty_return,
- _find_updateservice_additional_uris=empty_return,
- get_request=mock_get_request_enclosure_single_tenant,
- post_request=mock_post_request):
- with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
- module.main()
- self.assertEqual(ACTION_WAS_SUCCESSFUL_MESSAGE,
- get_exception_message(ansible_exit_json))
- self.assertTrue(is_changed(ansible_exit_json))
+ with set_module_args(module_args):
+ with patch.multiple("ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.WdcRedfishUtils",
+ _firmware_activate_uri=mock_fw_activate_url,
+ _update_uri=mock_update_url,
+ _find_updateservice_resource=empty_return,
+ _find_updateservice_additional_uris=empty_return,
+ get_request=mock_get_request_enclosure_single_tenant,
+ post_request=mock_post_request):
+ with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
+ module.main()
+ self.assertEqual(ACTION_WAS_SUCCESSFUL_MESSAGE,
+ get_exception_message(ansible_exit_json))
+ self.assertTrue(is_changed(ansible_exit_json))
def test_module_fw_activate_service_does_not_support_fw_activate(self):
"""Test FW Activate when it is not supported."""
expected_error_message = "Service does not support FWActivate"
- set_module_args({
+ with set_module_args({
'category': 'Update',
'command': 'FWActivate',
'username': 'USERID',
'password': 'PASSW0RD=21',
'ioms': ["example1.example.com"]
- })
+ }):
- def mock_update_uri_response(*args, **kwargs):
- return {
- "ret": True,
- "data": {} # No Actions
- }
+ def mock_update_uri_response(*args, **kwargs):
+ return {
+ "ret": True,
+ "data": {} # No Actions
+ }
- with patch.multiple(module.WdcRedfishUtils,
- _firmware_activate_uri=mocked_url_response,
- _update_uri=mock_update_url,
- _find_updateservice_resource=empty_return,
- _find_updateservice_additional_uris=empty_return,
- get_request=mock_update_uri_response):
- with self.assertRaises(AnsibleFailJson) as cm:
- module.main()
- self.assertEqual(expected_error_message,
- get_exception_message(cm))
+ with patch.multiple(module.WdcRedfishUtils,
+ _firmware_activate_uri=mocked_url_response,
+ _update_uri=mock_update_url,
+ _find_updateservice_resource=empty_return,
+ _find_updateservice_additional_uris=empty_return,
+ get_request=mock_update_uri_response):
+ with self.assertRaises(AnsibleFailJson) as cm:
+ module.main()
+ self.assertEqual(expected_error_message,
+ get_exception_message(cm))
def test_module_update_and_activate_image_uri_not_http(self):
"""Test Update and Activate when URI is not http(s)"""
expected_error_message = "Bundle URI must be HTTP or HTTPS"
- set_module_args({
+ with set_module_args({
'category': 'Update',
'command': 'UpdateAndActivate',
'username': 'USERID',
'password': 'PASSW0RD=21',
'ioms': ["example1.example.com"],
'update_image_uri': "ftp://example.com/image"
- })
- with patch.multiple(module.WdcRedfishUtils,
- _firmware_activate_uri=mocked_url_response,
- _update_uri=mock_update_url,
- _find_updateservice_resource=empty_return,
- _find_updateservice_additional_uris=empty_return):
- with self.assertRaises(AnsibleFailJson) as cm:
- module.main()
- self.assertEqual(expected_error_message,
- get_exception_message(cm))
+ }):
+ with patch.multiple(module.WdcRedfishUtils,
+ _firmware_activate_uri=mocked_url_response,
+ _update_uri=mock_update_url,
+ _find_updateservice_resource=empty_return,
+ _find_updateservice_additional_uris=empty_return):
+ with self.assertRaises(AnsibleFailJson) as cm:
+ module.main()
+ self.assertEqual(expected_error_message,
+ get_exception_message(cm))
def test_module_update_and_activate_target_not_ready_for_fw_update(self):
"""Test Update and Activate when target is not in the correct state."""
@@ -580,38 +576,38 @@ class TestWdcRedfishCommand(unittest.TestCase):
mock_status_code,
mock_status_description
)
- set_module_args({
+ with set_module_args({
'category': 'Update',
'command': 'UpdateAndActivate',
'username': 'USERID',
'password': 'PASSW0RD=21',
'ioms': ["example1.example.com"],
'update_image_uri': "http://example.com/image"
- })
- with patch.object(module.WdcRedfishUtils, "get_simple_update_status") as mock_get_simple_update_status:
- mock_get_simple_update_status.return_value = {
- "ret": True,
- "entries": {
- "StatusCode": mock_status_code,
- "Description": mock_status_description
+ }):
+ with patch.object(module.WdcRedfishUtils, "get_simple_update_status") as mock_get_simple_update_status:
+ mock_get_simple_update_status.return_value = {
+ "ret": True,
+ "entries": {
+ "StatusCode": mock_status_code,
+ "Description": mock_status_description
+ }
}
- }
- with patch.multiple(module.WdcRedfishUtils,
- _firmware_activate_uri=mocked_url_response,
- _update_uri=mock_update_url,
- _find_updateservice_resource=empty_return,
- _find_updateservice_additional_uris=empty_return):
- with self.assertRaises(AnsibleFailJson) as cm:
- module.main()
- self.assertEqual(expected_error_message,
- get_exception_message(cm))
+ with patch.multiple(module.WdcRedfishUtils,
+ _firmware_activate_uri=mocked_url_response,
+ _update_uri=mock_update_url,
+ _find_updateservice_resource=empty_return,
+ _find_updateservice_additional_uris=empty_return):
+ with self.assertRaises(AnsibleFailJson) as cm:
+ module.main()
+ self.assertEqual(expected_error_message,
+ get_exception_message(cm))
def test_module_update_and_activate_bundle_not_a_tarfile(self):
"""Test Update and Activate when bundle is not a tarfile"""
mock_filename = os.path.abspath(__file__)
expected_error_message = ERROR_MESSAGE_UNABLE_TO_EXTRACT_BUNDLE_VERSION
- set_module_args({
+ with set_module_args({
'category': 'Update',
'command': 'UpdateAndActivate',
'username': 'USERID',
@@ -622,24 +618,24 @@ class TestWdcRedfishCommand(unittest.TestCase):
"username": "image_user",
"password": "image_password"
}
- })
- with patch('ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.fetch_file') as mock_fetch_file:
- mock_fetch_file.return_value = mock_filename
- with patch.multiple(module.WdcRedfishUtils,
- get_simple_update_status=mock_get_simple_update_status_ready_for_fw_update,
- _firmware_activate_uri=mocked_url_response,
- _update_uri=mock_update_url,
- _find_updateservice_resource=empty_return,
- _find_updateservice_additional_uris=empty_return):
- with self.assertRaises(AnsibleFailJson) as cm:
- module.main()
- self.assertEqual(expected_error_message,
- get_exception_message(cm))
+ }):
+ with patch('ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.fetch_file') as mock_fetch_file:
+ mock_fetch_file.return_value = mock_filename
+ with patch.multiple(module.WdcRedfishUtils,
+ get_simple_update_status=mock_get_simple_update_status_ready_for_fw_update,
+ _firmware_activate_uri=mocked_url_response,
+ _update_uri=mock_update_url,
+ _find_updateservice_resource=empty_return,
+ _find_updateservice_additional_uris=empty_return):
+ with self.assertRaises(AnsibleFailJson) as cm:
+ module.main()
+ self.assertEqual(expected_error_message,
+ get_exception_message(cm))
def test_module_update_and_activate_bundle_contains_no_firmware_version(self):
"""Test Update and Activate when bundle contains no firmware version"""
expected_error_message = ERROR_MESSAGE_UNABLE_TO_EXTRACT_BUNDLE_VERSION
- set_module_args({
+ with set_module_args({
'category': 'Update',
'command': 'UpdateAndActivate',
'username': 'USERID',
@@ -650,29 +646,29 @@ class TestWdcRedfishCommand(unittest.TestCase):
"username": "image_user",
"password": "image_password"
}
- })
+ }):
- tar_name = "empty_tarfile{0}.tar".format(uuid.uuid4())
- empty_tarfile = tarfile.open(os.path.join(self.tempdir, tar_name), "w")
- empty_tarfile.close()
- with patch('ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.fetch_file') as mock_fetch_file:
- mock_fetch_file.return_value = os.path.join(self.tempdir, tar_name)
- with patch.multiple(module.WdcRedfishUtils,
- get_simple_update_status=mock_get_simple_update_status_ready_for_fw_update,
- _firmware_activate_uri=mocked_url_response,
- _update_uri=mock_update_url,
- _find_updateservice_resource=empty_return,
- _find_updateservice_additional_uris=empty_return):
- with self.assertRaises(AnsibleFailJson) as cm:
- module.main()
- self.assertEqual(expected_error_message,
- get_exception_message(cm))
+ tar_name = "empty_tarfile{0}.tar".format(uuid.uuid4())
+ empty_tarfile = tarfile.open(os.path.join(self.tempdir, tar_name), "w")
+ empty_tarfile.close()
+ with patch('ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.fetch_file') as mock_fetch_file:
+ mock_fetch_file.return_value = os.path.join(self.tempdir, tar_name)
+ with patch.multiple(module.WdcRedfishUtils,
+ get_simple_update_status=mock_get_simple_update_status_ready_for_fw_update,
+ _firmware_activate_uri=mocked_url_response,
+ _update_uri=mock_update_url,
+ _find_updateservice_resource=empty_return,
+ _find_updateservice_additional_uris=empty_return):
+ with self.assertRaises(AnsibleFailJson) as cm:
+ module.main()
+ self.assertEqual(expected_error_message,
+ get_exception_message(cm))
def test_module_update_and_activate_version_already_installed(self):
"""Test Update and Activate when the bundle version is already installed"""
mock_firmware_version = "1.2.3"
expected_error_message = ACTION_WAS_SUCCESSFUL_MESSAGE
- set_module_args({
+ with set_module_args({
'category': 'Update',
'command': 'UpdateAndActivate',
'username': 'USERID',
@@ -683,31 +679,31 @@ class TestWdcRedfishCommand(unittest.TestCase):
"username": "image_user",
"password": "image_password"
}
- })
+ }):
- tar_name = self.generate_temp_bundlefile(mock_firmware_version=mock_firmware_version,
- is_multi_tenant=False)
- with patch('ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.fetch_file') as mock_fetch_file:
- mock_fetch_file.return_value = os.path.join(self.tempdir, tar_name)
- with patch.multiple(module.WdcRedfishUtils,
- get_firmware_inventory=mock_get_firmware_inventory_version_1_2_3,
- get_simple_update_status=mock_get_simple_update_status_ready_for_fw_update,
- _firmware_activate_uri=mocked_url_response,
- _update_uri=mock_update_url,
- _find_updateservice_resource=empty_return,
- _find_updateservice_additional_uris=empty_return,
- get_request=mock_get_request_enclosure_single_tenant):
- with self.assertRaises(AnsibleExitJson) as result:
- module.main()
- self.assertEqual(expected_error_message,
- get_exception_message(result))
- self.assertFalse(is_changed(result))
+ tar_name = self.generate_temp_bundlefile(mock_firmware_version=mock_firmware_version,
+ is_multi_tenant=False)
+ with patch('ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.fetch_file') as mock_fetch_file:
+ mock_fetch_file.return_value = os.path.join(self.tempdir, tar_name)
+ with patch.multiple(module.WdcRedfishUtils,
+ get_firmware_inventory=mock_get_firmware_inventory_version_1_2_3,
+ get_simple_update_status=mock_get_simple_update_status_ready_for_fw_update,
+ _firmware_activate_uri=mocked_url_response,
+ _update_uri=mock_update_url,
+ _find_updateservice_resource=empty_return,
+ _find_updateservice_additional_uris=empty_return,
+ get_request=mock_get_request_enclosure_single_tenant):
+ with self.assertRaises(AnsibleExitJson) as result:
+ module.main()
+ self.assertEqual(expected_error_message,
+ get_exception_message(result))
+ self.assertFalse(is_changed(result))
def test_module_update_and_activate_version_already_installed_multi_tenant(self):
"""Test Update and Activate on multi-tenant when version is already installed"""
mock_firmware_version = "1.2.3"
expected_error_message = ACTION_WAS_SUCCESSFUL_MESSAGE
- set_module_args({
+ with set_module_args({
'category': 'Update',
'command': 'UpdateAndActivate',
'username': 'USERID',
@@ -718,30 +714,30 @@ class TestWdcRedfishCommand(unittest.TestCase):
"username": "image_user",
"password": "image_password"
}
- })
+ }):
- tar_name = self.generate_temp_bundlefile(mock_firmware_version=mock_firmware_version,
- is_multi_tenant=True)
- with patch('ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.fetch_file') as mock_fetch_file:
- mock_fetch_file.return_value = os.path.join(self.tempdir, tar_name)
- with patch.multiple(module.WdcRedfishUtils,
- get_firmware_inventory=mock_get_firmware_inventory_version_1_2_3,
- get_simple_update_status=mock_get_simple_update_status_ready_for_fw_update,
- _firmware_activate_uri=mocked_url_response,
- _update_uri=mock_update_url,
- _find_updateservice_resource=empty_return,
- _find_updateservice_additional_uris=empty_return,
- get_request=mock_get_request_enclosure_multi_tenant):
- with self.assertRaises(AnsibleExitJson) as result:
- module.main()
- self.assertEqual(expected_error_message,
- get_exception_message(result))
- self.assertFalse(is_changed(result))
+ tar_name = self.generate_temp_bundlefile(mock_firmware_version=mock_firmware_version,
+ is_multi_tenant=True)
+ with patch('ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.fetch_file') as mock_fetch_file:
+ mock_fetch_file.return_value = os.path.join(self.tempdir, tar_name)
+ with patch.multiple(module.WdcRedfishUtils,
+ get_firmware_inventory=mock_get_firmware_inventory_version_1_2_3,
+ get_simple_update_status=mock_get_simple_update_status_ready_for_fw_update,
+ _firmware_activate_uri=mocked_url_response,
+ _update_uri=mock_update_url,
+ _find_updateservice_resource=empty_return,
+ _find_updateservice_additional_uris=empty_return,
+ get_request=mock_get_request_enclosure_multi_tenant):
+ with self.assertRaises(AnsibleExitJson) as result:
+ module.main()
+ self.assertEqual(expected_error_message,
+ get_exception_message(result))
+ self.assertFalse(is_changed(result))
def test_module_update_and_activate_pass(self):
"""Test Update and Activate (happy path)"""
mock_firmware_version = "1.2.2"
- set_module_args({
+ with set_module_args({
'category': 'Update',
'command': 'UpdateAndActivate',
'username': 'USERID',
@@ -752,34 +748,34 @@ class TestWdcRedfishCommand(unittest.TestCase):
"username": "image_user",
"password": "image_password"
}
- })
+ }):
- tar_name = self.generate_temp_bundlefile(mock_firmware_version=mock_firmware_version,
- is_multi_tenant=False)
+ tar_name = self.generate_temp_bundlefile(mock_firmware_version=mock_firmware_version,
+ is_multi_tenant=False)
- with patch('ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.fetch_file') as mock_fetch_file:
- mock_fetch_file.return_value = os.path.join(self.tempdir, tar_name)
- with patch.multiple("ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.WdcRedfishUtils",
- get_firmware_inventory=mock_get_firmware_inventory_version_1_2_3,
- simple_update=mock_simple_update,
- _simple_update_status_uri=mocked_url_response,
- # _find_updateservice_resource=empty_return,
- # _find_updateservice_additional_uris=empty_return,
- get_request=mock_get_request_enclosure_single_tenant,
- post_request=mock_post_request):
+ with patch('ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.fetch_file') as mock_fetch_file:
+ mock_fetch_file.return_value = os.path.join(self.tempdir, tar_name)
+ with patch.multiple("ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.WdcRedfishUtils",
+ get_firmware_inventory=mock_get_firmware_inventory_version_1_2_3,
+ simple_update=mock_simple_update,
+ _simple_update_status_uri=mocked_url_response,
+ # _find_updateservice_resource=empty_return,
+ # _find_updateservice_additional_uris=empty_return,
+ get_request=mock_get_request_enclosure_single_tenant,
+ post_request=mock_post_request):
- with patch("ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.WdcRedfishUtils.get_simple_update_status"
- ) as mock_get_simple_update_status:
- mock_get_simple_update_status.side_effect = MOCK_SIMPLE_UPDATE_STATUS_LIST
- with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
- module.main()
- self.assertTrue(is_changed(ansible_exit_json))
- self.assertEqual(ACTION_WAS_SUCCESSFUL_MESSAGE, get_exception_message(ansible_exit_json))
+ with patch("ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.WdcRedfishUtils.get_simple_update_status"
+ ) as mock_get_simple_update_status:
+ mock_get_simple_update_status.side_effect = MOCK_SIMPLE_UPDATE_STATUS_LIST
+ with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
+ module.main()
+ self.assertTrue(is_changed(ansible_exit_json))
+ self.assertEqual(ACTION_WAS_SUCCESSFUL_MESSAGE, get_exception_message(ansible_exit_json))
def test_module_update_and_activate_pass_multi_tenant(self):
"""Test Update and Activate with multi-tenant (happy path)"""
mock_firmware_version = "1.2.2"
- set_module_args({
+ with set_module_args({
'category': 'Update',
'command': 'UpdateAndActivate',
'username': 'USERID',
@@ -790,34 +786,34 @@ class TestWdcRedfishCommand(unittest.TestCase):
"username": "image_user",
"password": "image_password"
}
- })
+ }):
- tar_name = self.generate_temp_bundlefile(mock_firmware_version=mock_firmware_version,
- is_multi_tenant=True)
+ tar_name = self.generate_temp_bundlefile(mock_firmware_version=mock_firmware_version,
+ is_multi_tenant=True)
- with patch('ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.fetch_file') as mock_fetch_file:
- mock_fetch_file.return_value = os.path.join(self.tempdir, tar_name)
- with patch.multiple(module.WdcRedfishUtils,
- get_firmware_inventory=mock_get_firmware_inventory_version_1_2_3,
- simple_update=mock_simple_update,
- _simple_update_status_uri=mocked_url_response,
- # _find_updateservice_resource=empty_return,
- # _find_updateservice_additional_uris=empty_return,
- get_request=mock_get_request_enclosure_multi_tenant,
- post_request=mock_post_request):
- with patch("ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.WdcRedfishUtils.get_simple_update_status"
- ) as mock_get_simple_update_status:
- mock_get_simple_update_status.side_effect = MOCK_SIMPLE_UPDATE_STATUS_LIST
- with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
- module.main()
- self.assertTrue(is_changed(ansible_exit_json))
- self.assertEqual(ACTION_WAS_SUCCESSFUL_MESSAGE, get_exception_message(ansible_exit_json))
+ with patch('ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.fetch_file') as mock_fetch_file:
+ mock_fetch_file.return_value = os.path.join(self.tempdir, tar_name)
+ with patch.multiple(module.WdcRedfishUtils,
+ get_firmware_inventory=mock_get_firmware_inventory_version_1_2_3,
+ simple_update=mock_simple_update,
+ _simple_update_status_uri=mocked_url_response,
+ # _find_updateservice_resource=empty_return,
+ # _find_updateservice_additional_uris=empty_return,
+ get_request=mock_get_request_enclosure_multi_tenant,
+ post_request=mock_post_request):
+ with patch("ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.WdcRedfishUtils.get_simple_update_status"
+ ) as mock_get_simple_update_status:
+ mock_get_simple_update_status.side_effect = MOCK_SIMPLE_UPDATE_STATUS_LIST
+ with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
+ module.main()
+ self.assertTrue(is_changed(ansible_exit_json))
+ self.assertEqual(ACTION_WAS_SUCCESSFUL_MESSAGE, get_exception_message(ansible_exit_json))
def test_module_fw_update_multi_tenant_firmware_single_tenant_enclosure(self):
"""Test Update and Activate using multi-tenant bundle on single-tenant enclosure"""
mock_firmware_version = "1.1.1"
expected_error_message = "Enclosure multi-tenant is False but bundle multi-tenant is True"
- set_module_args({
+ with set_module_args({
'category': 'Update',
'command': 'UpdateAndActivate',
'username': 'USERID',
@@ -828,30 +824,30 @@ class TestWdcRedfishCommand(unittest.TestCase):
"username": "image_user",
"password": "image_password"
}
- })
+ }):
- tar_name = self.generate_temp_bundlefile(mock_firmware_version=mock_firmware_version,
- is_multi_tenant=True)
- with patch('ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.fetch_file') as mock_fetch_file:
- mock_fetch_file.return_value = os.path.join(self.tempdir, tar_name)
- with patch.multiple(module.WdcRedfishUtils,
- get_firmware_inventory=mock_get_firmware_inventory_version_1_2_3(),
- get_simple_update_status=mock_get_simple_update_status_ready_for_fw_update,
- _firmware_activate_uri=mocked_url_response,
- _update_uri=mock_update_url,
- _find_updateservice_resource=empty_return,
- _find_updateservice_additional_uris=empty_return,
- get_request=mock_get_request_enclosure_single_tenant):
- with self.assertRaises(AnsibleFailJson) as result:
- module.main()
- self.assertEqual(expected_error_message,
- get_exception_message(result))
+ tar_name = self.generate_temp_bundlefile(mock_firmware_version=mock_firmware_version,
+ is_multi_tenant=True)
+ with patch('ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.fetch_file') as mock_fetch_file:
+ mock_fetch_file.return_value = os.path.join(self.tempdir, tar_name)
+ with patch.multiple(module.WdcRedfishUtils,
+ get_firmware_inventory=mock_get_firmware_inventory_version_1_2_3(),
+ get_simple_update_status=mock_get_simple_update_status_ready_for_fw_update,
+ _firmware_activate_uri=mocked_url_response,
+ _update_uri=mock_update_url,
+ _find_updateservice_resource=empty_return,
+ _find_updateservice_additional_uris=empty_return,
+ get_request=mock_get_request_enclosure_single_tenant):
+ with self.assertRaises(AnsibleFailJson) as result:
+ module.main()
+ self.assertEqual(expected_error_message,
+ get_exception_message(result))
def test_module_fw_update_single_tentant_firmware_multi_tenant_enclosure(self):
"""Test Update and Activate using singe-tenant bundle on multi-tenant enclosure"""
mock_firmware_version = "1.1.1"
expected_error_message = "Enclosure multi-tenant is True but bundle multi-tenant is False"
- set_module_args({
+ with set_module_args({
'category': 'Update',
'command': 'UpdateAndActivate',
'username': 'USERID',
@@ -862,24 +858,24 @@ class TestWdcRedfishCommand(unittest.TestCase):
"username": "image_user",
"password": "image_password"
}
- })
+ }):
- tar_name = self.generate_temp_bundlefile(mock_firmware_version=mock_firmware_version,
- is_multi_tenant=False)
- with patch('ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.fetch_file') as mock_fetch_file:
- mock_fetch_file.return_value = os.path.join(self.tempdir, tar_name)
- with patch.multiple(module.WdcRedfishUtils,
- get_firmware_inventory=mock_get_firmware_inventory_version_1_2_3(),
- get_simple_update_status=mock_get_simple_update_status_ready_for_fw_update,
- _firmware_activate_uri=mocked_url_response,
- _update_uri=mock_update_url,
- _find_updateservice_resource=empty_return,
- _find_updateservice_additional_uris=empty_return,
- get_request=mock_get_request_enclosure_multi_tenant):
- with self.assertRaises(AnsibleFailJson) as result:
- module.main()
- self.assertEqual(expected_error_message,
- get_exception_message(result))
+ tar_name = self.generate_temp_bundlefile(mock_firmware_version=mock_firmware_version,
+ is_multi_tenant=False)
+ with patch('ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.fetch_file') as mock_fetch_file:
+ mock_fetch_file.return_value = os.path.join(self.tempdir, tar_name)
+ with patch.multiple(module.WdcRedfishUtils,
+ get_firmware_inventory=mock_get_firmware_inventory_version_1_2_3(),
+ get_simple_update_status=mock_get_simple_update_status_ready_for_fw_update,
+ _firmware_activate_uri=mocked_url_response,
+ _update_uri=mock_update_url,
+ _find_updateservice_resource=empty_return,
+ _find_updateservice_additional_uris=empty_return,
+ get_request=mock_get_request_enclosure_multi_tenant):
+ with self.assertRaises(AnsibleFailJson) as result:
+ module.main()
+ self.assertEqual(expected_error_message,
+ get_exception_message(result))
def generate_temp_bundlefile(self,
mock_firmware_version,
diff --git a/tests/unit/plugins/modules/test_wdc_redfish_info.py b/tests/unit/plugins/modules/test_wdc_redfish_info.py
index e1dfb4a276..b8952f8427 100644
--- a/tests/unit/plugins/modules/test_wdc_redfish_info.py
+++ b/tests/unit/plugins/modules/test_wdc_redfish_info.py
@@ -77,140 +77,140 @@ class TestWdcRedfishInfo(unittest.TestCase):
def test_module_fail_when_required_args_missing(self):
with self.assertRaises(AnsibleFailJson):
- set_module_args({})
- module.main()
+ with set_module_args({}):
+ module.main()
def test_module_fail_when_unknown_category(self):
with self.assertRaises(AnsibleFailJson):
- set_module_args({
+ with set_module_args({
'category': 'unknown',
'command': 'SimpleUpdateStatus',
'username': 'USERID',
'password': 'PASSW0RD=21',
'ioms': [],
- })
- module.main()
+ }):
+ module.main()
def test_module_fail_when_unknown_command(self):
with self.assertRaises(AnsibleFailJson):
- set_module_args({
+ with set_module_args({
'category': 'Update',
'command': 'unknown',
'username': 'USERID',
'password': 'PASSW0RD=21',
'ioms': [],
- })
- module.main()
+ }):
+ module.main()
def test_module_simple_update_status_pass(self):
- set_module_args({
+ with set_module_args({
'category': 'Update',
'command': 'SimpleUpdateStatus',
'username': 'USERID',
'password': 'PASSW0RD=21',
'ioms': ["example1.example.com"],
- })
+ }):
- def mock_simple_update_status(*args, **kwargs):
- return {
- "ret": True,
- "data": {
- "Description": "Ready for FW update",
- "ErrorCode": 0,
- "EstimatedRemainingMinutes": 0,
- "StatusCode": 0
- }
- }
-
- def mocked_string_response(*args, **kwargs):
- return "mockedUrl"
-
- def empty_return(*args, **kwargs):
- return {"ret": True}
-
- with patch.multiple(module.WdcRedfishUtils,
- _simple_update_status_uri=mocked_string_response,
- _find_updateservice_resource=empty_return,
- _find_updateservice_additional_uris=empty_return,
- get_request=mock_simple_update_status):
- with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
- module.main()
- redfish_facts = get_redfish_facts(ansible_exit_json)
- self.assertEqual(mock_simple_update_status()["data"],
- redfish_facts["simple_update_status"]["entries"])
-
- def test_module_simple_update_status_updateservice_resource_not_found(self):
- set_module_args({
- 'category': 'Update',
- 'command': 'SimpleUpdateStatus',
- 'username': 'USERID',
- 'password': 'PASSW0RD=21',
- 'ioms': ["example1.example.com"],
- })
- with patch.object(module.WdcRedfishUtils, 'get_request') as mock_get_request:
- mock_get_request.return_value = {
- "ret": True,
- "data": {} # Missing UpdateService property
- }
- with self.assertRaises(AnsibleFailJson) as ansible_exit_json:
- module.main()
- self.assertEqual("UpdateService resource not found",
- get_exception_message(ansible_exit_json))
-
- def test_module_simple_update_status_service_does_not_support_simple_update(self):
- set_module_args({
- 'category': 'Update',
- 'command': 'SimpleUpdateStatus',
- 'username': 'USERID',
- 'password': 'PASSW0RD=21',
- 'ioms': ["example1.example.com"],
- })
-
- def mock_get_request_function(uri):
- mock_url_string = "mockURL"
- if mock_url_string in uri:
+ def mock_simple_update_status(*args, **kwargs):
return {
"ret": True,
"data": {
- "Actions": { # No #UpdateService.SimpleUpdate
- }
+ "Description": "Ready for FW update",
+ "ErrorCode": 0,
+ "EstimatedRemainingMinutes": 0,
+ "StatusCode": 0
}
}
- else:
- return {
- "ret": True,
- "data": mock_url_string
- }
- with patch.object(module.WdcRedfishUtils, 'get_request') as mock_get_request:
- mock_get_request.side_effect = mock_get_request_function
- with self.assertRaises(AnsibleFailJson) as ansible_exit_json:
- module.main()
- self.assertEqual("UpdateService resource not found",
- get_exception_message(ansible_exit_json))
+ def mocked_string_response(*args, **kwargs):
+ return "mockedUrl"
- def test_module_simple_update_status_service_does_not_support_fw_activate(self):
- set_module_args({
+ def empty_return(*args, **kwargs):
+ return {"ret": True}
+
+ with patch.multiple(module.WdcRedfishUtils,
+ _simple_update_status_uri=mocked_string_response,
+ _find_updateservice_resource=empty_return,
+ _find_updateservice_additional_uris=empty_return,
+ get_request=mock_simple_update_status):
+ with self.assertRaises(AnsibleExitJson) as ansible_exit_json:
+ module.main()
+ redfish_facts = get_redfish_facts(ansible_exit_json)
+ self.assertEqual(mock_simple_update_status()["data"],
+ redfish_facts["simple_update_status"]["entries"])
+
+ def test_module_simple_update_status_updateservice_resource_not_found(self):
+ with set_module_args({
'category': 'Update',
'command': 'SimpleUpdateStatus',
'username': 'USERID',
'password': 'PASSW0RD=21',
'ioms': ["example1.example.com"],
- })
+ }):
+ with patch.object(module.WdcRedfishUtils, 'get_request') as mock_get_request:
+ mock_get_request.return_value = {
+ "ret": True,
+ "data": {} # Missing UpdateService property
+ }
+ with self.assertRaises(AnsibleFailJson) as ansible_exit_json:
+ module.main()
+ self.assertEqual("UpdateService resource not found",
+ get_exception_message(ansible_exit_json))
- def mock_get_request_function(uri):
- if uri.endswith("/redfish/v1") or uri.endswith("/redfish/v1/"):
- return MOCK_SUCCESSFUL_RESPONSE_WITH_UPDATE_SERVICE_RESOURCE
- elif uri.endswith("/mockedUrl"):
- return MOCK_SUCCESSFUL_HTTP_EMPTY_RESPONSE
- elif uri.endswith("/UpdateService"):
- return MOCK_SUCCESSFUL_RESPONSE_WITH_SIMPLE_UPDATE_BUT_NO_FW_ACTIVATE
- else:
- raise RuntimeError("Illegal call to get_request in test: " + uri)
+ def test_module_simple_update_status_service_does_not_support_simple_update(self):
+ with set_module_args({
+ 'category': 'Update',
+ 'command': 'SimpleUpdateStatus',
+ 'username': 'USERID',
+ 'password': 'PASSW0RD=21',
+ 'ioms': ["example1.example.com"],
+ }):
- with patch("ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.WdcRedfishUtils.get_request") as mock_get_request:
- mock_get_request.side_effect = mock_get_request_function
- with self.assertRaises(AnsibleFailJson) as ansible_exit_json:
- module.main()
- self.assertEqual("Service does not support FWActivate",
- get_exception_message(ansible_exit_json))
+ def mock_get_request_function(uri):
+ mock_url_string = "mockURL"
+ if mock_url_string in uri:
+ return {
+ "ret": True,
+ "data": {
+ "Actions": { # No #UpdateService.SimpleUpdate
+ }
+ }
+ }
+ else:
+ return {
+ "ret": True,
+ "data": mock_url_string
+ }
+
+ with patch.object(module.WdcRedfishUtils, 'get_request') as mock_get_request:
+ mock_get_request.side_effect = mock_get_request_function
+ with self.assertRaises(AnsibleFailJson) as ansible_exit_json:
+ module.main()
+ self.assertEqual("UpdateService resource not found",
+ get_exception_message(ansible_exit_json))
+
+ def test_module_simple_update_status_service_does_not_support_fw_activate(self):
+ with set_module_args({
+ 'category': 'Update',
+ 'command': 'SimpleUpdateStatus',
+ 'username': 'USERID',
+ 'password': 'PASSW0RD=21',
+ 'ioms': ["example1.example.com"],
+ }):
+
+ def mock_get_request_function(uri):
+ if uri.endswith("/redfish/v1") or uri.endswith("/redfish/v1/"):
+ return MOCK_SUCCESSFUL_RESPONSE_WITH_UPDATE_SERVICE_RESOURCE
+ elif uri.endswith("/mockedUrl"):
+ return MOCK_SUCCESSFUL_HTTP_EMPTY_RESPONSE
+ elif uri.endswith("/UpdateService"):
+ return MOCK_SUCCESSFUL_RESPONSE_WITH_SIMPLE_UPDATE_BUT_NO_FW_ACTIVATE
+ else:
+ raise RuntimeError("Illegal call to get_request in test: " + uri)
+
+ with patch("ansible_collections.community.general.plugins.module_utils.wdc_redfish_utils.WdcRedfishUtils.get_request") as mock_get_request:
+ mock_get_request.side_effect = mock_get_request_function
+ with self.assertRaises(AnsibleFailJson) as ansible_exit_json:
+ module.main()
+ self.assertEqual("Service does not support FWActivate",
+ get_exception_message(ansible_exit_json))
diff --git a/tests/unit/plugins/modules/test_xcc_redfish_command.py b/tests/unit/plugins/modules/test_xcc_redfish_command.py
index c3902a2f30..eda93f3186 100644
--- a/tests/unit/plugins/modules/test_xcc_redfish_command.py
+++ b/tests/unit/plugins/modules/test_xcc_redfish_command.py
@@ -30,33 +30,33 @@ class TestXCCRedfishCommand(unittest.TestCase):
def test_module_fail_when_required_args_missing(self):
with self.assertRaises(AnsibleFailJson):
- set_module_args({})
- module.main()
+ with set_module_args({}):
+ module.main()
def test_module_fail_when_unknown_category(self):
with self.assertRaises(AnsibleFailJson):
- set_module_args({
+ with set_module_args({
'category': 'unknown',
'command': 'VirtualMediaEject',
'baseuri': '10.245.39.251',
'username': 'USERID',
'password': 'PASSW0RD=21',
- })
- module.main()
+ }):
+ module.main()
def test_module_fail_when_unknown_command(self):
with self.assertRaises(AnsibleFailJson):
- set_module_args({
+ with set_module_args({
'category': 'Manager',
'command': 'unknown',
'baseuri': '10.245.39.251',
'username': 'USERID',
'password': 'PASSW0RD=21',
- })
- module.main()
+ }):
+ module.main()
def test_module_command_VirtualMediaInsert_pass(self):
- set_module_args({
+ with set_module_args({
'category': 'Manager',
'command': 'VirtualMediaInsert',
'baseuri': '10.245.39.251',
@@ -70,20 +70,20 @@ class TestXCCRedfishCommand(unittest.TestCase):
'write_protected': True,
'transfer_protocol_type': 'NFS'
}
- })
- with patch.object(module.XCCRedfishUtils, '_find_systems_resource') as mock__find_systems_resource:
- mock__find_systems_resource.return_value = {'ret': True, 'changed': True, 'msg': 'success'}
- with patch.object(module.XCCRedfishUtils, '_find_managers_resource') as mock__find_managers_resource:
- mock__find_managers_resource.return_value = {'ret': True, 'changed': True, 'msg': 'success'}
+ }):
+ with patch.object(module.XCCRedfishUtils, '_find_systems_resource') as mock__find_systems_resource:
+ mock__find_systems_resource.return_value = {'ret': True, 'changed': True, 'msg': 'success'}
+ with patch.object(module.XCCRedfishUtils, '_find_managers_resource') as mock__find_managers_resource:
+ mock__find_managers_resource.return_value = {'ret': True, 'changed': True, 'msg': 'success'}
- with patch.object(module.XCCRedfishUtils, 'virtual_media_insert') as mock_virtual_media_insert:
- mock_virtual_media_insert.return_value = {'ret': True, 'changed': True, 'msg': 'success'}
+ with patch.object(module.XCCRedfishUtils, 'virtual_media_insert') as mock_virtual_media_insert:
+ mock_virtual_media_insert.return_value = {'ret': True, 'changed': True, 'msg': 'success'}
- with self.assertRaises(AnsibleExitJson) as result:
- module.main()
+ with self.assertRaises(AnsibleExitJson) as result:
+ module.main()
def test_module_command_VirtualMediaEject_pass(self):
- set_module_args({
+ with set_module_args({
'category': 'Manager',
'command': 'VirtualMediaEject',
'baseuri': '10.245.39.251',
@@ -93,194 +93,184 @@ class TestXCCRedfishCommand(unittest.TestCase):
'virtual_media': {
'image_url': "nfs://10.245.52.18:/home/nfs/bootable-sr635-20210111-autorun.iso",
}
- })
- with patch.object(module.XCCRedfishUtils, '_find_systems_resource') as mock__find_systems_resource:
- mock__find_systems_resource.return_value = {'ret': True, 'changed': True, 'msg': 'success'}
- with patch.object(module.XCCRedfishUtils, '_find_managers_resource') as mock__find_managers_resource:
- mock__find_managers_resource.return_value = {'ret': True, 'changed': True, 'msg': 'success'}
+ }):
+ with patch.object(module.XCCRedfishUtils, '_find_systems_resource') as mock__find_systems_resource:
+ mock__find_systems_resource.return_value = {'ret': True, 'changed': True, 'msg': 'success'}
+ with patch.object(module.XCCRedfishUtils, '_find_managers_resource') as mock__find_managers_resource:
+ mock__find_managers_resource.return_value = {'ret': True, 'changed': True, 'msg': 'success'}
- with patch.object(module.XCCRedfishUtils, 'virtual_media_eject') as mock_virtual_media_eject:
- mock_virtual_media_eject.return_value = {'ret': True, 'changed': True, 'msg': 'success'}
+ with patch.object(module.XCCRedfishUtils, 'virtual_media_eject') as mock_virtual_media_eject:
+ mock_virtual_media_eject.return_value = {'ret': True, 'changed': True, 'msg': 'success'}
- with self.assertRaises(AnsibleExitJson) as result:
- module.main()
+ with self.assertRaises(AnsibleExitJson) as result:
+ module.main()
def test_module_command_VirtualMediaEject_fail_when_required_args_missing(self):
with self.assertRaises(AnsibleFailJson):
- set_module_args({
+ with set_module_args({
'category': 'Manager',
'command': 'VirtualMediaEject',
'baseuri': '10.245.39.251',
'username': 'USERID',
'password': 'PASSW0RD=21',
- })
- module.main()
+ }):
+ module.main()
def test_module_command_GetResource_fail_when_required_args_missing(self):
- set_module_args({
+ with set_module_args({
'category': 'Raw',
'command': 'GetResource',
'baseuri': '10.245.39.251',
'username': 'USERID',
'password': 'PASSW0RD=21',
- })
+ }):
+ with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
+ mock_get_request.return_value = {'ret': True, 'data': {'teststr': 'xxxx'}}
- with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
- mock_get_request.return_value = {'ret': True, 'data': {'teststr': 'xxxx'}}
-
- with self.assertRaises(AnsibleFailJson) as result:
- module.main()
+ with self.assertRaises(AnsibleFailJson) as result:
+ module.main()
def test_module_command_GetResource_fail_when_get_return_false(self):
- set_module_args({
+ with set_module_args({
'category': 'Raw',
'command': 'GetResource',
'baseuri': '10.245.39.251',
'username': 'USERID',
'password': 'PASSW0RD=21',
'resource_uri': '/redfish/v1/testuri',
- })
+ }):
+ with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
+ mock_get_request.return_value = {'ret': False, 'msg': '404 error'}
- with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
- mock_get_request.return_value = {'ret': False, 'msg': '404 error'}
-
- with self.assertRaises(AnsibleFailJson) as result:
- module.main()
+ with self.assertRaises(AnsibleFailJson) as result:
+ module.main()
def test_module_command_GetResource_pass(self):
- set_module_args({
+ with set_module_args({
'category': 'Raw',
'command': 'GetResource',
'baseuri': '10.245.39.251',
'username': 'USERID',
'password': 'PASSW0RD=21',
'resource_uri': '/redfish/v1/testuri',
- })
+ }):
+ with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
+ mock_get_request.return_value = {'ret': True, 'data': {'teststr': 'xxxx'}}
- with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
- mock_get_request.return_value = {'ret': True, 'data': {'teststr': 'xxxx'}}
-
- with self.assertRaises(AnsibleExitJson) as result:
- module.main()
+ with self.assertRaises(AnsibleExitJson) as result:
+ module.main()
def test_module_command_GetCollectionResource_fail_when_required_args_missing(self):
- set_module_args({
+ with set_module_args({
'category': 'Raw',
'command': 'GetCollectionResource',
'baseuri': '10.245.39.251',
'username': 'USERID',
'password': 'PASSW0RD=21',
- })
+ }):
+ with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
+ mock_get_request.return_value = {'ret': True, 'data': {'teststr': 'xxxx'}}
- with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
- mock_get_request.return_value = {'ret': True, 'data': {'teststr': 'xxxx'}}
-
- with self.assertRaises(AnsibleFailJson) as result:
- module.main()
+ with self.assertRaises(AnsibleFailJson) as result:
+ module.main()
def test_module_command_GetCollectionResource_fail_when_get_return_false(self):
- set_module_args({
+ with set_module_args({
'category': 'Raw',
'command': 'GetCollectionResource',
'baseuri': '10.245.39.251',
'username': 'USERID',
'password': 'PASSW0RD=21',
'resource_uri': '/redfish/v1/testuri',
- })
+ }):
+ with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
+ mock_get_request.return_value = {'ret': False, 'msg': '404 error'}
- with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
- mock_get_request.return_value = {'ret': False, 'msg': '404 error'}
-
- with self.assertRaises(AnsibleFailJson) as result:
- module.main()
+ with self.assertRaises(AnsibleFailJson) as result:
+ module.main()
def test_module_command_GetCollectionResource_fail_when_get_not_colection(self):
- set_module_args({
+ with set_module_args({
'category': 'Raw',
'command': 'GetCollectionResource',
'baseuri': '10.245.39.251',
'username': 'USERID',
'password': 'PASSW0RD=21',
'resource_uri': '/redfish/v1/testuri',
- })
+ }):
+ with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
+ mock_get_request.return_value = {'ret': True, 'data': {'teststr': 'xxxx'}}
- with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
- mock_get_request.return_value = {'ret': True, 'data': {'teststr': 'xxxx'}}
-
- with self.assertRaises(AnsibleFailJson) as result:
- module.main()
+ with self.assertRaises(AnsibleFailJson) as result:
+ module.main()
def test_module_command_GetCollectionResource_pass_when_get_empty_collection(self):
- set_module_args({
+ with set_module_args({
'category': 'Raw',
'command': 'GetCollectionResource',
'baseuri': '10.245.39.251',
'username': 'USERID',
'password': 'PASSW0RD=21',
'resource_uri': '/redfish/v1/testuri',
- })
+ }):
+ with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
+ mock_get_request.return_value = {'ret': True, 'data': {'Members': [], 'Members@odata.count': 0}}
- with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
- mock_get_request.return_value = {'ret': True, 'data': {'Members': [], 'Members@odata.count': 0}}
-
- with self.assertRaises(AnsibleExitJson) as result:
- module.main()
+ with self.assertRaises(AnsibleExitJson) as result:
+ module.main()
def test_module_command_GetCollectionResource_pass_when_get_collection(self):
- set_module_args({
+ with set_module_args({
'category': 'Raw',
'command': 'GetCollectionResource',
'baseuri': '10.245.39.251',
'username': 'USERID',
'password': 'PASSW0RD=21',
'resource_uri': '/redfish/v1/testuri',
- })
+ }):
+ with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
+ mock_get_request.return_value = {'ret': True, 'data': {'Members': [{'@odata.id': '/redfish/v1/testuri/1'}], 'Members@odata.count': 1}}
- with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
- mock_get_request.return_value = {'ret': True, 'data': {'Members': [{'@odata.id': '/redfish/v1/testuri/1'}], 'Members@odata.count': 1}}
-
- with self.assertRaises(AnsibleExitJson) as result:
- module.main()
+ with self.assertRaises(AnsibleExitJson) as result:
+ module.main()
def test_module_command_PatchResource_fail_when_required_args_missing(self):
- set_module_args({
+ with set_module_args({
'category': 'Raw',
'command': 'PatchResource',
'baseuri': '10.245.39.251',
'username': 'USERID',
'password': 'PASSW0RD=21',
- })
+ }):
+ with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
+ mock_get_request.return_value = {'ret': True, 'data': {'teststr': 'xxxx', '@odata.etag': '27f6eb13fa1c28a2711'}}
- with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
- mock_get_request.return_value = {'ret': True, 'data': {'teststr': 'xxxx', '@odata.etag': '27f6eb13fa1c28a2711'}}
+ with patch.object(module.XCCRedfishUtils, 'patch_request') as mock_patch_request:
+ mock_patch_request.return_value = {'ret': True, 'data': {'teststr': 'xxxx'}}
- with patch.object(module.XCCRedfishUtils, 'patch_request') as mock_patch_request:
- mock_patch_request.return_value = {'ret': True, 'data': {'teststr': 'xxxx'}}
-
- with self.assertRaises(AnsibleFailJson) as result:
- module.main()
+ with self.assertRaises(AnsibleFailJson) as result:
+ module.main()
def test_module_command_PatchResource_fail_when_required_args_missing_no_requestbody(self):
- set_module_args({
+ with set_module_args({
'category': 'Raw',
'command': 'PatchResource',
'baseuri': '10.245.39.251',
'username': 'USERID',
'password': 'PASSW0RD=21',
'resource_uri': '/redfish/v1/testuri',
- })
+ }):
+ with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
+ mock_get_request.return_value = {'ret': True, 'data': {'teststr': 'xxxx', '@odata.etag': '27f6eb13fa1c28a2711'}}
- with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
- mock_get_request.return_value = {'ret': True, 'data': {'teststr': 'xxxx', '@odata.etag': '27f6eb13fa1c28a2711'}}
+ with patch.object(module.XCCRedfishUtils, 'patch_request') as mock_patch_request:
+ mock_patch_request.return_value = {'ret': True, 'data': {'teststr': 'xxxx'}}
- with patch.object(module.XCCRedfishUtils, 'patch_request') as mock_patch_request:
- mock_patch_request.return_value = {'ret': True, 'data': {'teststr': 'xxxx'}}
-
- with self.assertRaises(AnsibleFailJson) as result:
- module.main()
+ with self.assertRaises(AnsibleFailJson) as result:
+ module.main()
def test_module_command_PatchResource_fail_when_noexisting_property_in_requestbody(self):
- set_module_args({
+ with set_module_args({
'category': 'Raw',
'command': 'PatchResource',
'baseuri': '10.245.39.251',
@@ -288,19 +278,18 @@ class TestXCCRedfishCommand(unittest.TestCase):
'password': 'PASSW0RD=21',
'resource_uri': '/redfish/v1/testuri',
'request_body': {'teststr': 'yyyy', 'otherkey': 'unknownkey'}
- })
+ }):
+ with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
+ mock_get_request.return_value = {'ret': True, 'data': {'teststr': 'xxxx', '@odata.etag': '27f6eb13fa1c28a2711'}}
- with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
- mock_get_request.return_value = {'ret': True, 'data': {'teststr': 'xxxx', '@odata.etag': '27f6eb13fa1c28a2711'}}
+ with patch.object(module.XCCRedfishUtils, 'patch_request') as mock_patch_request:
+ mock_patch_request.return_value = {'ret': True, 'data': {'teststr': 'xxxx'}}
- with patch.object(module.XCCRedfishUtils, 'patch_request') as mock_patch_request:
- mock_patch_request.return_value = {'ret': True, 'data': {'teststr': 'xxxx'}}
-
- with self.assertRaises(AnsibleFailJson) as result:
- module.main()
+ with self.assertRaises(AnsibleFailJson) as result:
+ module.main()
def test_module_command_PatchResource_fail_when_get_return_false(self):
- set_module_args({
+ with set_module_args({
'category': 'Raw',
'command': 'PatchResource',
'baseuri': '10.245.39.251',
@@ -308,19 +297,18 @@ class TestXCCRedfishCommand(unittest.TestCase):
'password': 'PASSW0RD=21',
'resource_uri': '/redfish/v1/testuri',
'request_body': {'teststr': 'yyyy'}
- })
+ }):
+ with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
+ mock_get_request.return_value = {'ret': True, 'data': {'teststr': 'xxxx', '@odata.etag': '27f6eb13fa1c28a2711'}}
- with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
- mock_get_request.return_value = {'ret': True, 'data': {'teststr': 'xxxx', '@odata.etag': '27f6eb13fa1c28a2711'}}
+ with patch.object(module.XCCRedfishUtils, 'patch_request') as mock_patch_request:
+ mock_patch_request.return_value = {'ret': False, 'msg': '500 internal error'}
- with patch.object(module.XCCRedfishUtils, 'patch_request') as mock_patch_request:
- mock_patch_request.return_value = {'ret': False, 'msg': '500 internal error'}
-
- with self.assertRaises(AnsibleFailJson) as result:
- module.main()
+ with self.assertRaises(AnsibleFailJson) as result:
+ module.main()
def test_module_command_PatchResource_pass(self):
- set_module_args({
+ with set_module_args({
'category': 'Raw',
'command': 'PatchResource',
'baseuri': '10.245.39.251',
@@ -328,170 +316,165 @@ class TestXCCRedfishCommand(unittest.TestCase):
'password': 'PASSW0RD=21',
'resource_uri': '/redfish/v1/testuri',
'request_body': {'teststr': 'yyyy'}
- })
+ }):
+ with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
+ mock_get_request.return_value = {'ret': True, 'data': {'teststr': 'xxxx', '@odata.etag': '27f6eb13fa1c28a2711'}}
- with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
- mock_get_request.return_value = {'ret': True, 'data': {'teststr': 'xxxx', '@odata.etag': '27f6eb13fa1c28a2711'}}
+ with patch.object(module.XCCRedfishUtils, 'patch_request') as mock_patch_request:
+ mock_patch_request.return_value = {'ret': True, 'data': {'teststr': 'yyyy', '@odata.etag': '322e0d45d9572723c98'}}
- with patch.object(module.XCCRedfishUtils, 'patch_request') as mock_patch_request:
- mock_patch_request.return_value = {'ret': True, 'data': {'teststr': 'yyyy', '@odata.etag': '322e0d45d9572723c98'}}
-
- with self.assertRaises(AnsibleExitJson) as result:
- module.main()
+ with self.assertRaises(AnsibleExitJson) as result:
+ module.main()
def test_module_command_PostResource_fail_when_required_args_missing(self):
- set_module_args({
+ with set_module_args({
'category': 'Raw',
'command': 'PostResource',
'baseuri': '10.245.39.251',
'username': 'USERID',
'password': 'PASSW0RD=21',
- })
-
- with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
- mock_get_request.return_value = {
- 'ret': True,
- 'data': {
- 'Actions': {
- '#Bios.ChangePassword': {
- '@Redfish.ActionInfo': "/redfish/v1/Systems/1/Bios/ChangePasswordActionInfo",
- 'target': "/redfish/v1/Systems/1/Bios/Actions/Bios.ChangePassword",
- 'title': "ChangePassword",
- 'PasswordName@Redfish.AllowableValues': [
- "UefiAdminPassword",
- "UefiPowerOnPassword"
- ]
+ }):
+ with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
+ mock_get_request.return_value = {
+ 'ret': True,
+ 'data': {
+ 'Actions': {
+ '#Bios.ChangePassword': {
+ '@Redfish.ActionInfo': "/redfish/v1/Systems/1/Bios/ChangePasswordActionInfo",
+ 'target': "/redfish/v1/Systems/1/Bios/Actions/Bios.ChangePassword",
+ 'title': "ChangePassword",
+ 'PasswordName@Redfish.AllowableValues': [
+ "UefiAdminPassword",
+ "UefiPowerOnPassword"
+ ]
+ },
+ '#Bios.ResetBios': {
+ 'title': "ResetBios",
+ 'target': "/redfish/v1/Systems/1/Bios/Actions/Bios.ResetBios"
+ }
},
- '#Bios.ResetBios': {
- 'title': "ResetBios",
- 'target': "/redfish/v1/Systems/1/Bios/Actions/Bios.ResetBios"
- }
- },
+ }
}
- }
- with patch.object(module.XCCRedfishUtils, 'post_request') as mock_post_request:
- mock_post_request.return_value = {'ret': True}
+ with patch.object(module.XCCRedfishUtils, 'post_request') as mock_post_request:
+ mock_post_request.return_value = {'ret': True}
- with self.assertRaises(AnsibleFailJson) as result:
- module.main()
+ with self.assertRaises(AnsibleFailJson) as result:
+ module.main()
def test_module_command_PostResource_fail_when_invalid_resourceuri(self):
- set_module_args({
+ with set_module_args({
'category': 'Raw',
'command': 'PostResource',
'baseuri': '10.245.39.251',
'username': 'USERID',
'password': 'PASSW0RD=21',
'resource_uri': '/redfish/v1/testuri',
- })
-
- with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
- mock_get_request.return_value = {
- 'ret': True,
- 'data': {
- 'Actions': {
- '#Bios.ChangePassword': {
- '@Redfish.ActionInfo': "/redfish/v1/Systems/1/Bios/ChangePasswordActionInfo",
- 'target': "/redfish/v1/Systems/1/Bios/Actions/Bios.ChangePassword",
- 'title': "ChangePassword",
- 'PasswordName@Redfish.AllowableValues': [
- "UefiAdminPassword",
- "UefiPowerOnPassword"
- ]
+ }):
+ with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
+ mock_get_request.return_value = {
+ 'ret': True,
+ 'data': {
+ 'Actions': {
+ '#Bios.ChangePassword': {
+ '@Redfish.ActionInfo': "/redfish/v1/Systems/1/Bios/ChangePasswordActionInfo",
+ 'target': "/redfish/v1/Systems/1/Bios/Actions/Bios.ChangePassword",
+ 'title': "ChangePassword",
+ 'PasswordName@Redfish.AllowableValues': [
+ "UefiAdminPassword",
+ "UefiPowerOnPassword"
+ ]
+ },
+ '#Bios.ResetBios': {
+ 'title': "ResetBios",
+ 'target': "/redfish/v1/Systems/1/Bios/Actions/Bios.ResetBios"
+ }
},
- '#Bios.ResetBios': {
- 'title': "ResetBios",
- 'target': "/redfish/v1/Systems/1/Bios/Actions/Bios.ResetBios"
- }
- },
+ }
}
- }
- with patch.object(module.XCCRedfishUtils, 'post_request') as mock_post_request:
- mock_post_request.return_value = {'ret': True}
+ with patch.object(module.XCCRedfishUtils, 'post_request') as mock_post_request:
+ mock_post_request.return_value = {'ret': True}
- with self.assertRaises(AnsibleFailJson) as result:
- module.main()
+ with self.assertRaises(AnsibleFailJson) as result:
+ module.main()
def test_module_command_PostResource_fail_when_no_requestbody(self):
- set_module_args({
+ with set_module_args({
'category': 'Raw',
'command': 'PostResource',
'baseuri': '10.245.39.251',
'username': 'USERID',
'password': 'PASSW0RD=21',
'resource_uri': '/redfish/v1/Systems/1/Bios/Actions/Bios.ChangePassword',
- })
-
- with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
- mock_get_request.return_value = {
- 'ret': True,
- 'data': {
- 'Actions': {
- '#Bios.ChangePassword': {
- '@Redfish.ActionInfo': "/redfish/v1/Systems/1/Bios/ChangePasswordActionInfo",
- 'target': "/redfish/v1/Systems/1/Bios/Actions/Bios.ChangePassword",
- 'title': "ChangePassword",
- 'PasswordName@Redfish.AllowableValues': [
- "UefiAdminPassword",
- "UefiPowerOnPassword"
- ]
+ }):
+ with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
+ mock_get_request.return_value = {
+ 'ret': True,
+ 'data': {
+ 'Actions': {
+ '#Bios.ChangePassword': {
+ '@Redfish.ActionInfo': "/redfish/v1/Systems/1/Bios/ChangePasswordActionInfo",
+ 'target': "/redfish/v1/Systems/1/Bios/Actions/Bios.ChangePassword",
+ 'title': "ChangePassword",
+ 'PasswordName@Redfish.AllowableValues': [
+ "UefiAdminPassword",
+ "UefiPowerOnPassword"
+ ]
+ },
+ '#Bios.ResetBios': {
+ 'title': "ResetBios",
+ 'target': "/redfish/v1/Systems/1/Bios/Actions/Bios.ResetBios"
+ }
},
- '#Bios.ResetBios': {
- 'title': "ResetBios",
- 'target': "/redfish/v1/Systems/1/Bios/Actions/Bios.ResetBios"
- }
- },
+ }
}
- }
- with patch.object(module.XCCRedfishUtils, 'post_request') as mock_post_request:
- mock_post_request.return_value = {'ret': True}
+ with patch.object(module.XCCRedfishUtils, 'post_request') as mock_post_request:
+ mock_post_request.return_value = {'ret': True}
- with self.assertRaises(AnsibleFailJson) as result:
- module.main()
+ with self.assertRaises(AnsibleFailJson) as result:
+ module.main()
def test_module_command_PostResource_fail_when_no_requestbody(self):
- set_module_args({
+ with set_module_args({
'category': 'Raw',
'command': 'PostResource',
'baseuri': '10.245.39.251',
'username': 'USERID',
'password': 'PASSW0RD=21',
'resource_uri': '/redfish/v1/Systems/1/Bios/Actions/Bios.ChangePassword',
- })
-
- with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
- mock_get_request.return_value = {
- 'ret': True,
- 'data': {
- 'Actions': {
- '#Bios.ChangePassword': {
- '@Redfish.ActionInfo': "/redfish/v1/Systems/1/Bios/ChangePasswordActionInfo",
- 'target': "/redfish/v1/Systems/1/Bios/Actions/Bios.ChangePassword",
- 'title': "ChangePassword",
- 'PasswordName@Redfish.AllowableValues': [
- "UefiAdminPassword",
- "UefiPowerOnPassword"
- ]
+ }):
+ with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
+ mock_get_request.return_value = {
+ 'ret': True,
+ 'data': {
+ 'Actions': {
+ '#Bios.ChangePassword': {
+ '@Redfish.ActionInfo': "/redfish/v1/Systems/1/Bios/ChangePasswordActionInfo",
+ 'target': "/redfish/v1/Systems/1/Bios/Actions/Bios.ChangePassword",
+ 'title': "ChangePassword",
+ 'PasswordName@Redfish.AllowableValues': [
+ "UefiAdminPassword",
+ "UefiPowerOnPassword"
+ ]
+ },
+ '#Bios.ResetBios': {
+ 'title': "ResetBios",
+ 'target': "/redfish/v1/Systems/1/Bios/Actions/Bios.ResetBios"
+ }
},
- '#Bios.ResetBios': {
- 'title': "ResetBios",
- 'target': "/redfish/v1/Systems/1/Bios/Actions/Bios.ResetBios"
- }
- },
+ }
}
- }
- with patch.object(module.XCCRedfishUtils, 'post_request') as mock_post_request:
- mock_post_request.return_value = {'ret': True}
+ with patch.object(module.XCCRedfishUtils, 'post_request') as mock_post_request:
+ mock_post_request.return_value = {'ret': True}
- with self.assertRaises(AnsibleFailJson) as result:
- module.main()
+ with self.assertRaises(AnsibleFailJson) as result:
+ module.main()
def test_module_command_PostResource_fail_when_requestbody_mismatch_with_data_from_actioninfo_uri(self):
- set_module_args({
+ with set_module_args({
'category': 'Raw',
'command': 'PostResource',
'baseuri': '10.245.39.251',
@@ -499,39 +482,38 @@ class TestXCCRedfishCommand(unittest.TestCase):
'password': 'PASSW0RD=21',
'resource_uri': '/redfish/v1/Systems/1/Bios/Actions/Bios.ChangePassword',
'request_body': {'PasswordName': 'UefiAdminPassword', 'NewPassword': 'PASSW0RD=='}
- })
-
- with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
- mock_get_request.return_value = {
- 'ret': True,
- 'data': {
- 'Parameters': [],
- 'Actions': {
- '#Bios.ChangePassword': {
- '@Redfish.ActionInfo': "/redfish/v1/Systems/1/Bios/ChangePasswordActionInfo",
- 'target': "/redfish/v1/Systems/1/Bios/Actions/Bios.ChangePassword",
- 'title': "ChangePassword",
- 'PasswordName@Redfish.AllowableValues': [
- "UefiAdminPassword",
- "UefiPowerOnPassword"
- ]
+ }):
+ with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
+ mock_get_request.return_value = {
+ 'ret': True,
+ 'data': {
+ 'Parameters': [],
+ 'Actions': {
+ '#Bios.ChangePassword': {
+ '@Redfish.ActionInfo': "/redfish/v1/Systems/1/Bios/ChangePasswordActionInfo",
+ 'target': "/redfish/v1/Systems/1/Bios/Actions/Bios.ChangePassword",
+ 'title': "ChangePassword",
+ 'PasswordName@Redfish.AllowableValues': [
+ "UefiAdminPassword",
+ "UefiPowerOnPassword"
+ ]
+ },
+ '#Bios.ResetBios': {
+ 'title': "ResetBios",
+ 'target': "/redfish/v1/Systems/1/Bios/Actions/Bios.ResetBios"
+ }
},
- '#Bios.ResetBios': {
- 'title': "ResetBios",
- 'target': "/redfish/v1/Systems/1/Bios/Actions/Bios.ResetBios"
- }
- },
+ }
}
- }
- with patch.object(module.XCCRedfishUtils, 'post_request') as mock_post_request:
- mock_post_request.return_value = {'ret': True}
+ with patch.object(module.XCCRedfishUtils, 'post_request') as mock_post_request:
+ mock_post_request.return_value = {'ret': True}
- with self.assertRaises(AnsibleFailJson) as result:
- module.main()
+ with self.assertRaises(AnsibleFailJson) as result:
+ module.main()
def test_module_command_PostResource_fail_when_get_return_false(self):
- set_module_args({
+ with set_module_args({
'category': 'Raw',
'command': 'PostResource',
'baseuri': '10.245.39.251',
@@ -539,19 +521,18 @@ class TestXCCRedfishCommand(unittest.TestCase):
'password': 'PASSW0RD=21',
'resource_uri': '/redfish/v1/Systems/1/Bios/Actions/Bios.ChangePassword',
'request_body': {'PasswordName': 'UefiAdminPassword', 'NewPassword': 'PASSW0RD=='}
- })
+ }):
+ with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
+ mock_get_request.return_value = {'ret': False, 'msg': '404 error'}
- with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
- mock_get_request.return_value = {'ret': False, 'msg': '404 error'}
+ with patch.object(module.XCCRedfishUtils, 'post_request') as mock_post_request:
+ mock_post_request.return_value = {'ret': True}
- with patch.object(module.XCCRedfishUtils, 'post_request') as mock_post_request:
- mock_post_request.return_value = {'ret': True}
-
- with self.assertRaises(AnsibleFailJson) as result:
- module.main()
+ with self.assertRaises(AnsibleFailJson) as result:
+ module.main()
def test_module_command_PostResource_fail_when_post_return_false(self):
- set_module_args({
+ with set_module_args({
'category': 'Raw',
'command': 'PostResource',
'baseuri': '10.245.39.251',
@@ -559,38 +540,37 @@ class TestXCCRedfishCommand(unittest.TestCase):
'password': 'PASSW0RD=21',
'resource_uri': '/redfish/v1/Systems/1/Bios/Actions/Bios.ResetBios',
'request_body': {}
- })
-
- with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
- mock_get_request.return_value = {
- 'ret': True,
- 'data': {
- 'Actions': {
- '#Bios.ChangePassword': {
- '@Redfish.ActionInfo': "/redfish/v1/Systems/1/Bios/ChangePasswordActionInfo",
- 'target': "/redfish/v1/Systems/1/Bios/Actions/Bios.ChangePassword",
- 'title': "ChangePassword",
- 'PasswordName@Redfish.AllowableValues': [
- "UefiAdminPassword",
- "UefiPowerOnPassword"
- ]
+ }):
+ with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
+ mock_get_request.return_value = {
+ 'ret': True,
+ 'data': {
+ 'Actions': {
+ '#Bios.ChangePassword': {
+ '@Redfish.ActionInfo': "/redfish/v1/Systems/1/Bios/ChangePasswordActionInfo",
+ 'target': "/redfish/v1/Systems/1/Bios/Actions/Bios.ChangePassword",
+ 'title': "ChangePassword",
+ 'PasswordName@Redfish.AllowableValues': [
+ "UefiAdminPassword",
+ "UefiPowerOnPassword"
+ ]
+ },
+ '#Bios.ResetBios': {
+ 'title': "ResetBios",
+ 'target': "/redfish/v1/Systems/1/Bios/Actions/Bios.ResetBios"
+ }
},
- '#Bios.ResetBios': {
- 'title': "ResetBios",
- 'target': "/redfish/v1/Systems/1/Bios/Actions/Bios.ResetBios"
- }
- },
+ }
}
- }
- with patch.object(module.XCCRedfishUtils, 'post_request') as mock_post_request:
- mock_post_request.return_value = {'ret': False, 'msg': '500 internal error'}
+ with patch.object(module.XCCRedfishUtils, 'post_request') as mock_post_request:
+ mock_post_request.return_value = {'ret': False, 'msg': '500 internal error'}
- with self.assertRaises(AnsibleFailJson) as result:
- module.main()
+ with self.assertRaises(AnsibleFailJson) as result:
+ module.main()
def test_module_command_PostResource_pass(self):
- set_module_args({
+ with set_module_args({
'category': 'Raw',
'command': 'PostResource',
'baseuri': '10.245.39.251',
@@ -598,32 +578,31 @@ class TestXCCRedfishCommand(unittest.TestCase):
'password': 'PASSW0RD=21',
'resource_uri': '/redfish/v1/Systems/1/Bios/Actions/Bios.ResetBios',
'request_body': {}
- })
-
- with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
- mock_get_request.return_value = {
- 'ret': True,
- 'data': {
- 'Actions': {
- '#Bios.ChangePassword': {
- '@Redfish.ActionInfo': "/redfish/v1/Systems/1/Bios/ChangePasswordActionInfo",
- 'target': "/redfish/v1/Systems/1/Bios/Actions/Bios.ChangePassword",
- 'title': "ChangePassword",
- 'PasswordName@Redfish.AllowableValues': [
- "UefiAdminPassword",
- "UefiPowerOnPassword"
- ]
+ }):
+ with patch.object(module.XCCRedfishUtils, 'get_request') as mock_get_request:
+ mock_get_request.return_value = {
+ 'ret': True,
+ 'data': {
+ 'Actions': {
+ '#Bios.ChangePassword': {
+ '@Redfish.ActionInfo': "/redfish/v1/Systems/1/Bios/ChangePasswordActionInfo",
+ 'target': "/redfish/v1/Systems/1/Bios/Actions/Bios.ChangePassword",
+ 'title': "ChangePassword",
+ 'PasswordName@Redfish.AllowableValues': [
+ "UefiAdminPassword",
+ "UefiPowerOnPassword"
+ ]
+ },
+ '#Bios.ResetBios': {
+ 'title': "ResetBios",
+ 'target': "/redfish/v1/Systems/1/Bios/Actions/Bios.ResetBios"
+ }
},
- '#Bios.ResetBios': {
- 'title': "ResetBios",
- 'target': "/redfish/v1/Systems/1/Bios/Actions/Bios.ResetBios"
- }
- },
+ }
}
- }
- with patch.object(module.XCCRedfishUtils, 'post_request') as mock_post_request:
- mock_post_request.return_value = {'ret': True, 'msg': 'post success'}
+ with patch.object(module.XCCRedfishUtils, 'post_request') as mock_post_request:
+ mock_post_request.return_value = {'ret': True, 'msg': 'post success'}
- with self.assertRaises(AnsibleExitJson) as result:
- module.main()
+ with self.assertRaises(AnsibleExitJson) as result:
+ module.main()
diff --git a/tests/unit/plugins/modules/utils.py b/tests/unit/plugins/modules/utils.py
index 1f7f14722f..406a2d14f1 100644
--- a/tests/unit/plugins/modules/utils.py
+++ b/tests/unit/plugins/modules/utils.py
@@ -5,6 +5,7 @@
from __future__ import (absolute_import, division, print_function)
__metaclass__ = type
+import contextlib as _contextlib
import json
from ansible_collections.community.general.tests.unit.compat import unittest
@@ -13,14 +14,16 @@ from ansible.module_utils import basic
from ansible.module_utils.common.text.converters import to_bytes
+@_contextlib.contextmanager
def set_module_args(args):
if '_ansible_remote_tmp' not in args:
args['_ansible_remote_tmp'] = '/tmp'
if '_ansible_keep_remote_files' not in args:
args['_ansible_keep_remote_files'] = False
- args = json.dumps({'ANSIBLE_MODULE_ARGS': args})
- basic._ANSIBLE_ARGS = to_bytes(args)
+ serialized_args = to_bytes(json.dumps({'ANSIBLE_MODULE_ARGS': args}))
+ with patch.object(basic, '_ANSIBLE_ARGS', serialized_args):
+ yield
class AnsibleExitJson(Exception):