1# -*- coding: utf-8 -*- 2# 3# Copyright: (c) 2018, F5 Networks Inc. 4# GNU General Public License v3.0 (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) 5 6from __future__ import (absolute_import, division, print_function) 7__metaclass__ = type 8 9import os 10import json 11import pytest 12import sys 13 14if sys.version_info < (2, 7): 15 pytestmark = pytest.mark.skip("F5 Ansible modules require Python >= 2.7") 16 17from ansible.module_utils.basic import AnsibleModule 18 19from ansible_collections.f5networks.f5_modules.plugins.modules.bigip_firewall_global_rules import ( 20 ApiParameters, ModuleParameters, ModuleManager, ArgumentSpec 21) 22from ansible_collections.f5networks.f5_modules.tests.unit.compat import unittest 23from ansible_collections.f5networks.f5_modules.tests.unit.compat.mock import Mock, patch 24from ansible_collections.f5networks.f5_modules.tests.unit.modules.utils import set_module_args 25 26 27fixture_path = os.path.join(os.path.dirname(__file__), 'fixtures') 28fixture_data = {} 29 30 31def load_fixture(name): 32 path = os.path.join(fixture_path, name) 33 34 if path in fixture_data: 35 return fixture_data[path] 36 37 with open(path) as f: 38 data = f.read() 39 40 try: 41 data = json.loads(data) 42 except Exception: 43 pass 44 45 fixture_data[path] = data 46 return data 47 48 49class TestParameters(unittest.TestCase): 50 def test_module_parameters(self): 51 args = dict( 52 enforced_policy='enforced1', 53 staged_policy='staged1', 54 service_policy='service1', 55 ) 56 p = ModuleParameters(params=args) 57 assert p.enforced_policy == '/Common/enforced1' 58 assert p.staged_policy == '/Common/staged1' 59 assert p.service_policy == '/Common/service1' 60 61 def test_api_parameters(self): 62 p = ApiParameters(params=load_fixture('load_security_firewall_global_rules_1.json')) 63 assert p.enforced_policy == '/Common/foo' 64 assert p.service_policy == '/Common/bar' 65 assert p.staged_policy == '/Common/baz' 66 67 68class TestUntypedManager(unittest.TestCase): 69 def setUp(self): 70 self.spec = ArgumentSpec() 71 self.p2 = patch('ansible_collections.f5networks.f5_modules.plugins.modules.bigip_firewall_global_rules.tmos_version') 72 self.p3 = patch('ansible_collections.f5networks.f5_modules.plugins.modules.bigip_firewall_global_rules.send_teem') 73 self.m2 = self.p2.start() 74 self.m2.return_value = '14.1.0' 75 self.m3 = self.p3.start() 76 self.m3.return_value = True 77 78 def tearDown(self): 79 self.p2.stop() 80 self.p3.stop() 81 82 def test_update(self, *args): 83 set_module_args(dict( 84 enforced_policy='enforced1', 85 staged_policy='staged1', 86 service_policy='service1', 87 provider=dict( 88 server='localhost', 89 password='password', 90 user='admin' 91 ) 92 )) 93 94 module = AnsibleModule( 95 argument_spec=self.spec.argument_spec, 96 supports_check_mode=self.spec.supports_check_mode 97 ) 98 99 current = ApiParameters(params=load_fixture('load_security_firewall_global_rules_1.json')) 100 101 # Override methods to force specific logic in the module to happen 102 mm = ModuleManager(module=module) 103 mm.update_on_device = Mock(return_value=True) 104 mm.read_current_from_device = Mock(return_value=current) 105 106 results = mm.exec_module() 107 108 assert results['changed'] is True 109