1# -*- coding: utf-8 -*-
2#
3# Copyright: (c) 2018, F5 Networks Inc.
4# GNU General Public License v3.0 (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
5
6from __future__ import (absolute_import, division, print_function)
7__metaclass__ = type
8
9import os
10import json
11import pytest
12import sys
13
14if sys.version_info < (2, 7):
15    pytestmark = pytest.mark.skip("F5 Ansible modules require Python >= 2.7")
16
17from ansible.module_utils.basic import AnsibleModule
18
19from ansible_collections.f5networks.f5_modules.plugins.modules.bigip_firewall_global_rules import (
20    ApiParameters, ModuleParameters, ModuleManager, ArgumentSpec
21)
22from ansible_collections.f5networks.f5_modules.tests.unit.compat import unittest
23from ansible_collections.f5networks.f5_modules.tests.unit.compat.mock import Mock, patch
24from ansible_collections.f5networks.f5_modules.tests.unit.modules.utils import set_module_args
25
26
27fixture_path = os.path.join(os.path.dirname(__file__), 'fixtures')
28fixture_data = {}
29
30
31def load_fixture(name):
32    path = os.path.join(fixture_path, name)
33
34    if path in fixture_data:
35        return fixture_data[path]
36
37    with open(path) as f:
38        data = f.read()
39
40    try:
41        data = json.loads(data)
42    except Exception:
43        pass
44
45    fixture_data[path] = data
46    return data
47
48
49class TestParameters(unittest.TestCase):
50    def test_module_parameters(self):
51        args = dict(
52            enforced_policy='enforced1',
53            staged_policy='staged1',
54            service_policy='service1',
55        )
56        p = ModuleParameters(params=args)
57        assert p.enforced_policy == '/Common/enforced1'
58        assert p.staged_policy == '/Common/staged1'
59        assert p.service_policy == '/Common/service1'
60
61    def test_api_parameters(self):
62        p = ApiParameters(params=load_fixture('load_security_firewall_global_rules_1.json'))
63        assert p.enforced_policy == '/Common/foo'
64        assert p.service_policy == '/Common/bar'
65        assert p.staged_policy == '/Common/baz'
66
67
68class TestUntypedManager(unittest.TestCase):
69    def setUp(self):
70        self.spec = ArgumentSpec()
71        self.p2 = patch('ansible_collections.f5networks.f5_modules.plugins.modules.bigip_firewall_global_rules.tmos_version')
72        self.p3 = patch('ansible_collections.f5networks.f5_modules.plugins.modules.bigip_firewall_global_rules.send_teem')
73        self.m2 = self.p2.start()
74        self.m2.return_value = '14.1.0'
75        self.m3 = self.p3.start()
76        self.m3.return_value = True
77
78    def tearDown(self):
79        self.p2.stop()
80        self.p3.stop()
81
82    def test_update(self, *args):
83        set_module_args(dict(
84            enforced_policy='enforced1',
85            staged_policy='staged1',
86            service_policy='service1',
87            provider=dict(
88                server='localhost',
89                password='password',
90                user='admin'
91            )
92        ))
93
94        module = AnsibleModule(
95            argument_spec=self.spec.argument_spec,
96            supports_check_mode=self.spec.supports_check_mode
97        )
98
99        current = ApiParameters(params=load_fixture('load_security_firewall_global_rules_1.json'))
100
101        # Override methods to force specific logic in the module to happen
102        mm = ModuleManager(module=module)
103        mm.update_on_device = Mock(return_value=True)
104        mm.read_current_from_device = Mock(return_value=current)
105
106        results = mm.exec_module()
107
108        assert results['changed'] is True
109