mirror of
https://github.com/ansible-collections/community.general.git
synced 2025-10-23 12:33:59 -07:00
Some checks are pending
EOL CI / EOL Sanity (Ⓐ2.17) (push) Waiting to run
EOL CI / EOL Units (Ⓐ2.17+py3.10) (push) Waiting to run
EOL CI / EOL Units (Ⓐ2.17+py3.12) (push) Waiting to run
EOL CI / EOL Units (Ⓐ2.17+py3.7) (push) Waiting to run
EOL CI / EOL I (Ⓐ2.17+alpine319+py:azp/posix/1/) (push) Waiting to run
EOL CI / EOL I (Ⓐ2.17+alpine319+py:azp/posix/2/) (push) Waiting to run
EOL CI / EOL I (Ⓐ2.17+alpine319+py:azp/posix/3/) (push) Waiting to run
EOL CI / EOL I (Ⓐ2.17+fedora39+py:azp/posix/1/) (push) Waiting to run
EOL CI / EOL I (Ⓐ2.17+fedora39+py:azp/posix/2/) (push) Waiting to run
EOL CI / EOL I (Ⓐ2.17+fedora39+py:azp/posix/3/) (push) Waiting to run
EOL CI / EOL I (Ⓐ2.17+ubuntu2004+py:azp/posix/1/) (push) Waiting to run
EOL CI / EOL I (Ⓐ2.17+ubuntu2004+py:azp/posix/2/) (push) Waiting to run
EOL CI / EOL I (Ⓐ2.17+ubuntu2004+py:azp/posix/3/) (push) Waiting to run
nox / Run extra sanity tests (push) Waiting to run
* Adjust all __future__ imports: for i in $(grep -REl "__future__.*absolute_import" plugins/ tests/); do sed -e 's/from __future__ import .*/from __future__ import annotations/g' -i $i; done * Remove all UTF-8 encoding specifications for Python source files: for i in $(grep -REl '[-][*]- coding: utf-8 -[*]-' plugins/ tests/); do sed -e '/^# -\*- coding: utf-8 -\*-/d' -i $i; done * Remove __metaclass__ = type: for i in $(grep -REl '__metaclass__ = type' plugins/ tests/); do sed -e '/^__metaclass__ = type/d' -i $i; done
113 lines
4.4 KiB
Python
113 lines
4.4 KiB
Python
|
|
# Copyright (c) 2019, Guillaume Martinez (lunik@tiwabbit.fr)
|
|
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
|
|
# SPDX-License-Identifier: GPL-3.0-or-later
|
|
|
|
from __future__ import annotations
|
|
|
|
import pytest
|
|
|
|
from ansible_collections.community.general.plugins.module_utils.version import LooseVersion
|
|
|
|
from ansible_collections.community.general.plugins.modules.gitlab_protected_branch import GitlabProtectedBranch
|
|
|
|
|
|
def _dummy(x):
|
|
"""Dummy function. Only used as a placeholder for toplevel definitions when the test is going
|
|
to be skipped anyway"""
|
|
return x
|
|
|
|
|
|
pytestmark = []
|
|
try:
|
|
from .gitlab import (GitlabModuleTestCase,
|
|
python_version_match_requirement, python_gitlab_module_version,
|
|
python_gitlab_version_match_requirement,
|
|
resp_get_protected_branch, resp_get_project_by_name,
|
|
resp_get_protected_branch_not_exist,
|
|
resp_delete_protected_branch, resp_get_user)
|
|
|
|
# GitLab module requirements
|
|
if python_version_match_requirement():
|
|
from gitlab.v4.objects import Project # noqa: F401, pylint: disable=unused-import
|
|
gitlab_req_version = python_gitlab_version_match_requirement()
|
|
gitlab_module_version = python_gitlab_module_version()
|
|
if LooseVersion(gitlab_module_version) < LooseVersion(gitlab_req_version):
|
|
pytestmark.append(pytest.mark.skip("Could not load gitlab module required for testing (Wrong version)"))
|
|
except ImportError:
|
|
pytestmark.append(pytest.mark.skip("Could not load gitlab module required for testing"))
|
|
|
|
# Unit tests requirements
|
|
try:
|
|
from httmock import with_httmock # noqa
|
|
except ImportError:
|
|
pytestmark.append(pytest.mark.skip("Could not load httmock module required for testing"))
|
|
with_httmock = _dummy
|
|
|
|
|
|
class MockProtectedBranch():
|
|
def __init__(self, merge_access_levels, push_access_levels):
|
|
self.merge_access_levels = merge_access_levels
|
|
self.push_access_levels = push_access_levels
|
|
|
|
|
|
class TestGitlabProtectedBranch(GitlabModuleTestCase):
|
|
@with_httmock(resp_get_project_by_name)
|
|
@with_httmock(resp_get_user)
|
|
def setUp(self):
|
|
super(TestGitlabProtectedBranch, self).setUp()
|
|
|
|
self.gitlab_instance.user = self.gitlab_instance.users.get(1)
|
|
self.moduleUtil = GitlabProtectedBranch(module=self.mock_module, project="foo-bar/diaspora-client", gitlab_instance=self.gitlab_instance)
|
|
|
|
@with_httmock(resp_get_protected_branch)
|
|
def test_protected_branch_exist(self):
|
|
rvalue = self.moduleUtil.protected_branch_exist(name="master")
|
|
self.assertEqual(rvalue.name, "master")
|
|
|
|
@with_httmock(resp_get_protected_branch_not_exist)
|
|
def test_protected_branch_exist_not_exist(self):
|
|
rvalue = self.moduleUtil.protected_branch_exist(name="master")
|
|
self.assertEqual(rvalue, False)
|
|
|
|
def test_can_update_zero_delta(self):
|
|
protected_branch = MockProtectedBranch(
|
|
merge_access_levels=[{"access_level": 40}],
|
|
push_access_levels=[{"access_level": 40}],
|
|
)
|
|
options = {
|
|
"merge_access_levels": 40,
|
|
"push_access_level": 40
|
|
}
|
|
rvalue = self.moduleUtil.can_update(protected_branch, options)
|
|
self.assertEqual(rvalue, True)
|
|
|
|
def test_can_update_no_configured(self):
|
|
protected_branch = MockProtectedBranch(
|
|
merge_access_levels=[{"access_level": 40}],
|
|
push_access_levels=[{"access_level": 40}],
|
|
)
|
|
options = {
|
|
"merge_access_levels": None,
|
|
"push_access_level": None
|
|
}
|
|
rvalue = self.moduleUtil.can_update(protected_branch, options)
|
|
self.assertEqual(rvalue, True)
|
|
|
|
def test_can_update_different_settings(self):
|
|
protected_branch = MockProtectedBranch(
|
|
merge_access_levels=[{"access_level": 40}],
|
|
push_access_levels=[{"access_level": 40}],
|
|
)
|
|
options = {
|
|
"merge_access_levels": 40,
|
|
"push_access_level": 30
|
|
}
|
|
rvalue = self.moduleUtil.can_update(protected_branch, options)
|
|
self.assertEqual(rvalue, False)
|
|
|
|
@with_httmock(resp_get_protected_branch)
|
|
@with_httmock(resp_delete_protected_branch)
|
|
def test_delete_protected_branch(self):
|
|
rvalue = self.moduleUtil.delete_protected_branch(name="master")
|
|
self.assertEqual(rvalue, None)
|