1# -*- coding: utf-8 -*- 2# 3# Copyright: (c) 2019, F5 Networks Inc. 4# GNU General Public License v3.0 (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) 5 6from __future__ import (absolute_import, division, print_function) 7__metaclass__ = type 8 9import os 10import json 11import pytest 12import sys 13 14if sys.version_info < (2, 7): 15 pytestmark = pytest.mark.skip("F5 Ansible modules require Python >= 2.7") 16 17from ansible.module_utils.basic import AnsibleModule 18 19from ansible_collections.f5networks.f5_modules.plugins.modules.bigip_device_auth_radius import ( 20 ApiParameters, ModuleManager, ArgumentSpec, ModuleParameters 21) 22from ansible_collections.f5networks.f5_modules.tests.unit.compat import unittest 23from ansible_collections.f5networks.f5_modules.tests.unit.compat.mock import Mock, patch 24from ansible_collections.f5networks.f5_modules.tests.unit.modules.utils import set_module_args 25 26 27fixture_path = os.path.join(os.path.dirname(__file__), 'fixtures') 28fixture_data = {} 29 30 31def load_fixture(name): 32 path = os.path.join(fixture_path, name) 33 34 if path in fixture_data: 35 return fixture_data[path] 36 37 with open(path) as f: 38 data = f.read() 39 40 try: 41 data = json.loads(data) 42 except Exception: 43 pass 44 45 fixture_data[path] = data 46 return data 47 48 49class TestParameters(unittest.TestCase): 50 def test_module_parameters(self): 51 args = dict( 52 servers=['foo1', 'foo2'], 53 retries=5, 54 service_type='login', 55 accounting_bug=False, 56 fallback_to_local=True, 57 use_for_auth=True, 58 ) 59 p = ModuleParameters(params=args) 60 61 assert '/Common/foo1' and '/Common/foo2' in p.servers 62 assert p.retries == 5 63 assert p.use_for_auth == 'yes' 64 assert p.accounting_bug == 'disabled' 65 assert p.service_type == "login" 66 assert p.fallback_to_local == 'yes' 67 68 def test_api_parameters(self): 69 args = load_fixture('load_radius_config.json') 70 71 p = ApiParameters(params=args) 72 assert p.retries == 3 73 assert p.service_type == 'authenticate-only' 74 assert p.accounting_bug == 'disabled' 75 assert p.servers == ['/Common/system_auth_name1'] 76 77 78class TestManager(unittest.TestCase): 79 80 def setUp(self): 81 self.spec = ArgumentSpec() 82 self.p2 = patch('ansible_collections.f5networks.f5_modules.plugins.modules.bigip_device_auth_radius.tmos_version') 83 self.p3 = patch('ansible_collections.f5networks.f5_modules.plugins.modules.bigip_device_auth_radius.send_teem') 84 self.m2 = self.p2.start() 85 self.m2.return_value = '14.1.0' 86 self.m3 = self.p3.start() 87 self.m3.return_value = True 88 89 def tearDown(self): 90 self.p2.stop() 91 self.p3.stop() 92 93 def test_create(self, *args): 94 set_module_args(dict( 95 servers=['foo1', 'foo2'], 96 retries=5, 97 service_type='login', 98 accounting_bug=False, 99 fallback_to_local=True, 100 use_for_auth=True, 101 state='present', 102 provider=dict( 103 password='admin', 104 server='localhost', 105 user='admin' 106 ) 107 )) 108 109 module = AnsibleModule( 110 argument_spec=self.spec.argument_spec, 111 supports_check_mode=self.spec.supports_check_mode 112 ) 113 114 # Override methods to force specific logic in the module to happen 115 mm = ModuleManager(module=module) 116 mm.exists = Mock(return_value=False) 117 mm.create_on_device = Mock(return_value=True) 118 mm.update_auth_source_on_device = Mock(return_value=True) 119 mm.update_fallback_on_device = Mock(return_value=True) 120 121 results = mm.exec_module() 122 assert results['changed'] is True 123 assert '/Common/foo1' and '/Common/foo2' in results['servers'] 124 assert results['retries'] == 5 125 assert results['accounting_bug'] == 'disabled' 126 assert results['service_type'] == 'login' 127 assert results['fallback_to_local'] == 'yes' 128