1# -*- coding: utf-8 -*- 2# 3# Copyright: (c) 2018, F5 Networks Inc. 4# GNU General Public License v3.0 (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) 5 6from __future__ import (absolute_import, division, print_function) 7__metaclass__ = type 8 9import os 10import json 11import pytest 12import sys 13 14if sys.version_info < (2, 7): 15 pytestmark = pytest.mark.skip("F5 Ansible modules require Python >= 2.7") 16 17from ansible.module_utils.basic import AnsibleModule 18from ansible_collections.f5networks.f5_modules.plugins.modules.bigip_asm_policy_signature_set import ( 19 ModuleParameters, ModuleManager, ArgumentSpec 20) 21from ansible_collections.f5networks.f5_modules.tests.unit.compat import unittest 22from ansible_collections.f5networks.f5_modules.tests.unit.compat.mock import Mock, patch 23from ansible_collections.f5networks.f5_modules.tests.unit.modules.utils import set_module_args 24 25 26fixture_path = os.path.join(os.path.dirname(__file__), 'fixtures') 27fixture_data = {} 28 29 30def load_fixture(name): 31 path = os.path.join(fixture_path, name) 32 33 if path in fixture_data: 34 return fixture_data[path] 35 36 with open(path) as f: 37 data = f.read() 38 39 try: 40 data = json.loads(data) 41 except Exception: 42 pass 43 44 fixture_data[path] = data 45 return data 46 47 48class TestParameters(unittest.TestCase): 49 def test_module_parameters(self): 50 args = dict( 51 name='IIS and Windows Signatures', 52 state='present', 53 policy_name='fake_policy', 54 alarm='yes', 55 block='no', 56 learn='yes' 57 ) 58 self.p1 = patch('ansible_collections.f5networks.f5_modules.plugins.modules.bigip_asm_policy_signature_set.tmos_version') 59 self.m1 = self.p1.start() 60 self.m1.return_value = '13.1.0' 61 62 p = ModuleParameters(params=args) 63 64 assert p.name == 'IIS and Windows Signatures' 65 assert p.state == 'present' 66 assert p.policy_name == 'fake_policy' 67 assert p.alarm is True 68 assert p.block is False 69 assert p.learn is True 70 71 self.p1.stop() 72 73 74class TestManager(unittest.TestCase): 75 def setUp(self): 76 self.spec = ArgumentSpec() 77 self.p1 = patch('ansible_collections.f5networks.f5_modules.plugins.modules.bigip_asm_policy_signature_set.module_provisioned') 78 self.p2 = patch('ansible_collections.f5networks.f5_modules.plugins.modules.bigip_asm_policy_signature_set.tmos_version') 79 self.m1 = self.p1.start() 80 self.m2 = self.p2.start() 81 self.m2.return_value = '13.1.0' 82 self.m1.return_value = True 83 self.p3 = patch('ansible_collections.f5networks.f5_modules.plugins.modules.bigip_asm_policy_signature_set.send_teem') 84 self.m3 = self.p3.start() 85 self.m3.return_value = True 86 87 def tearDown(self): 88 self.p1.stop() 89 self.p2.stop() 90 self.p3.stop() 91 92 def test_add_server_technology(self, *args): 93 set_module_args(dict( 94 policy_name='fake_policy', 95 state='present', 96 name='IIS and Windows Signatures', 97 alarm='yes', 98 block='no', 99 learn='yes', 100 provider=dict( 101 server='localhost', 102 password='password', 103 user='admin' 104 ) 105 )) 106 107 module = AnsibleModule( 108 argument_spec=self.spec.argument_spec, 109 supports_check_mode=self.spec.supports_check_mode 110 ) 111 112 # Override methods to force specific logic in the module to happen 113 mm = ModuleManager(module=module) 114 mm.exists = Mock(return_value=False) 115 mm.create_on_device = Mock(return_value=True) 116 117 results = mm.exec_module() 118 119 assert results['changed'] is True 120 assert results['name'] == 'IIS and Windows Signatures' 121 assert results['policy_name'] == 'fake_policy' 122 assert results['alarm'] == 'yes' 123 assert results['block'] == 'no' 124 assert results['learn'] == 'yes' 125