diff options
author | Ansible Core Team <info@ansible.com> | 2020-03-09 09:40:32 +0000 |
---|---|---|
committer | Ansible Core Team <info@ansible.com> | 2020-03-09 09:40:32 +0000 |
commit | 74c95055e9ed156727e54936fa6034f93e18ae8a (patch) | |
tree | 6e20812e4b95eeb6283e341fba227f1b94c9b3c2 /test/units/modules/network/fortios/test_fortios_firewall_proxy_address.py | |
parent | a73c1da43a113ab268679faaf67bc59882d570d8 (diff) | |
download | ansible-74c95055e9ed156727e54936fa6034f93e18ae8a.tar.gz |
Migrated to fortinet.fortios
Diffstat (limited to 'test/units/modules/network/fortios/test_fortios_firewall_proxy_address.py')
-rw-r--r-- | test/units/modules/network/fortios/test_fortios_firewall_proxy_address.py | 349 |
1 files changed, 0 insertions, 349 deletions
diff --git a/test/units/modules/network/fortios/test_fortios_firewall_proxy_address.py b/test/units/modules/network/fortios/test_fortios_firewall_proxy_address.py deleted file mode 100644 index c0e77cbb8d..0000000000 --- a/test/units/modules/network/fortios/test_fortios_firewall_proxy_address.py +++ /dev/null @@ -1,349 +0,0 @@ -# Copyright 2019 Fortinet, Inc. -# -# This program is free software: you can redistribute it and/or modify -# it under the terms of the GNU General Public License as published by -# the Free Software Foundation, either version 3 of the License, or -# (at your option) any later version. -# -# This program is distributed in the hope that it will be useful, -# but WITHOUT ANY WARRANTY; without even the implied warranty of -# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -# GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with Ansible. If not, see <https://www.gnu.org/licenses/>. - -# Make coding more python3-ish -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - -import os -import json -import pytest -from mock import ANY -from ansible.module_utils.network.fortios.fortios import FortiOSHandler - -try: - from ansible.modules.network.fortios import fortios_firewall_proxy_address -except ImportError: - pytest.skip("Could not load required modules for testing", allow_module_level=True) - - -@pytest.fixture(autouse=True) -def connection_mock(mocker): - connection_class_mock = mocker.patch('ansible.modules.network.fortios.fortios_firewall_proxy_address.Connection') - return connection_class_mock - - -fos_instance = FortiOSHandler(connection_mock) - - -def test_firewall_proxy_address_creation(mocker): - schema_method_mock = mocker.patch('ansible.module_utils.network.fortios.fortios.FortiOSHandler.schema') - - set_method_result = {'status': 'success', 'http_method': 'POST', 'http_status': 200} - set_method_mock = mocker.patch('ansible.module_utils.network.fortios.fortios.FortiOSHandler.set', return_value=set_method_result) - - input_data = { - 'username': 'admin', - 'state': 'present', - 'firewall_proxy_address': { - 'case_sensitivity': 'disable', - 'color': '4', - 'comment': 'Optional comments.', - 'header': 'test_value_6', - 'header_name': 'test_value_7', - 'host': 'myhostname8', - 'host_regex': 'myhostname9', - 'method': 'get', - 'name': 'default_name_11', - 'path': 'test_value_12', - 'query': 'test_value_13', - 'referrer': 'enable', - 'type': 'host-regex', - 'ua': 'chrome', - 'uuid': 'test_value_17', - 'visibility': 'enable' - }, - 'vdom': 'root'} - - is_error, changed, response = fortios_firewall_proxy_address.fortios_firewall(input_data, fos_instance) - - expected_data = { - 'case-sensitivity': 'disable', - 'color': '4', - 'comment': 'Optional comments.', - 'header': 'test_value_6', - 'header-name': 'test_value_7', - 'host': 'myhostname8', - 'host-regex': 'myhostname9', - 'method': 'get', - 'name': 'default_name_11', - 'path': 'test_value_12', - 'query': 'test_value_13', - 'referrer': 'enable', - 'type': 'host-regex', - 'ua': 'chrome', - 'uuid': 'test_value_17', - 'visibility': 'enable' - } - - set_method_mock.assert_called_with('firewall', 'proxy-address', data=expected_data, vdom='root') - schema_method_mock.assert_not_called() - assert not is_error - assert changed - assert response['status'] == 'success' - assert response['http_status'] == 200 - - -def test_firewall_proxy_address_creation_fails(mocker): - schema_method_mock = mocker.patch('ansible.module_utils.network.fortios.fortios.FortiOSHandler.schema') - - set_method_result = {'status': 'error', 'http_method': 'POST', 'http_status': 500} - set_method_mock = mocker.patch('ansible.module_utils.network.fortios.fortios.FortiOSHandler.set', return_value=set_method_result) - - input_data = { - 'username': 'admin', - 'state': 'present', - 'firewall_proxy_address': { - 'case_sensitivity': 'disable', - 'color': '4', - 'comment': 'Optional comments.', - 'header': 'test_value_6', - 'header_name': 'test_value_7', - 'host': 'myhostname8', - 'host_regex': 'myhostname9', - 'method': 'get', - 'name': 'default_name_11', - 'path': 'test_value_12', - 'query': 'test_value_13', - 'referrer': 'enable', - 'type': 'host-regex', - 'ua': 'chrome', - 'uuid': 'test_value_17', - 'visibility': 'enable' - }, - 'vdom': 'root'} - - is_error, changed, response = fortios_firewall_proxy_address.fortios_firewall(input_data, fos_instance) - - expected_data = { - 'case-sensitivity': 'disable', - 'color': '4', - 'comment': 'Optional comments.', - 'header': 'test_value_6', - 'header-name': 'test_value_7', - 'host': 'myhostname8', - 'host-regex': 'myhostname9', - 'method': 'get', - 'name': 'default_name_11', - 'path': 'test_value_12', - 'query': 'test_value_13', - 'referrer': 'enable', - 'type': 'host-regex', - 'ua': 'chrome', - 'uuid': 'test_value_17', - 'visibility': 'enable' - } - - set_method_mock.assert_called_with('firewall', 'proxy-address', data=expected_data, vdom='root') - schema_method_mock.assert_not_called() - assert is_error - assert not changed - assert response['status'] == 'error' - assert response['http_status'] == 500 - - -def test_firewall_proxy_address_removal(mocker): - schema_method_mock = mocker.patch('ansible.module_utils.network.fortios.fortios.FortiOSHandler.schema') - - delete_method_result = {'status': 'success', 'http_method': 'POST', 'http_status': 200} - delete_method_mock = mocker.patch('ansible.module_utils.network.fortios.fortios.FortiOSHandler.delete', return_value=delete_method_result) - - input_data = { - 'username': 'admin', - 'state': 'absent', - 'firewall_proxy_address': { - 'case_sensitivity': 'disable', - 'color': '4', - 'comment': 'Optional comments.', - 'header': 'test_value_6', - 'header_name': 'test_value_7', - 'host': 'myhostname8', - 'host_regex': 'myhostname9', - 'method': 'get', - 'name': 'default_name_11', - 'path': 'test_value_12', - 'query': 'test_value_13', - 'referrer': 'enable', - 'type': 'host-regex', - 'ua': 'chrome', - 'uuid': 'test_value_17', - 'visibility': 'enable' - }, - 'vdom': 'root'} - - is_error, changed, response = fortios_firewall_proxy_address.fortios_firewall(input_data, fos_instance) - - delete_method_mock.assert_called_with('firewall', 'proxy-address', mkey=ANY, vdom='root') - schema_method_mock.assert_not_called() - assert not is_error - assert changed - assert response['status'] == 'success' - assert response['http_status'] == 200 - - -def test_firewall_proxy_address_deletion_fails(mocker): - schema_method_mock = mocker.patch('ansible.module_utils.network.fortios.fortios.FortiOSHandler.schema') - - delete_method_result = {'status': 'error', 'http_method': 'POST', 'http_status': 500} - delete_method_mock = mocker.patch('ansible.module_utils.network.fortios.fortios.FortiOSHandler.delete', return_value=delete_method_result) - - input_data = { - 'username': 'admin', - 'state': 'absent', - 'firewall_proxy_address': { - 'case_sensitivity': 'disable', - 'color': '4', - 'comment': 'Optional comments.', - 'header': 'test_value_6', - 'header_name': 'test_value_7', - 'host': 'myhostname8', - 'host_regex': 'myhostname9', - 'method': 'get', - 'name': 'default_name_11', - 'path': 'test_value_12', - 'query': 'test_value_13', - 'referrer': 'enable', - 'type': 'host-regex', - 'ua': 'chrome', - 'uuid': 'test_value_17', - 'visibility': 'enable' - }, - 'vdom': 'root'} - - is_error, changed, response = fortios_firewall_proxy_address.fortios_firewall(input_data, fos_instance) - - delete_method_mock.assert_called_with('firewall', 'proxy-address', mkey=ANY, vdom='root') - schema_method_mock.assert_not_called() - assert is_error - assert not changed - assert response['status'] == 'error' - assert response['http_status'] == 500 - - -def test_firewall_proxy_address_idempotent(mocker): - schema_method_mock = mocker.patch('ansible.module_utils.network.fortios.fortios.FortiOSHandler.schema') - - set_method_result = {'status': 'error', 'http_method': 'DELETE', 'http_status': 404} - set_method_mock = mocker.patch('ansible.module_utils.network.fortios.fortios.FortiOSHandler.set', return_value=set_method_result) - - input_data = { - 'username': 'admin', - 'state': 'present', - 'firewall_proxy_address': { - 'case_sensitivity': 'disable', - 'color': '4', - 'comment': 'Optional comments.', - 'header': 'test_value_6', - 'header_name': 'test_value_7', - 'host': 'myhostname8', - 'host_regex': 'myhostname9', - 'method': 'get', - 'name': 'default_name_11', - 'path': 'test_value_12', - 'query': 'test_value_13', - 'referrer': 'enable', - 'type': 'host-regex', - 'ua': 'chrome', - 'uuid': 'test_value_17', - 'visibility': 'enable' - }, - 'vdom': 'root'} - - is_error, changed, response = fortios_firewall_proxy_address.fortios_firewall(input_data, fos_instance) - - expected_data = { - 'case-sensitivity': 'disable', - 'color': '4', - 'comment': 'Optional comments.', - 'header': 'test_value_6', - 'header-name': 'test_value_7', - 'host': 'myhostname8', - 'host-regex': 'myhostname9', - 'method': 'get', - 'name': 'default_name_11', - 'path': 'test_value_12', - 'query': 'test_value_13', - 'referrer': 'enable', - 'type': 'host-regex', - 'ua': 'chrome', - 'uuid': 'test_value_17', - 'visibility': 'enable' - } - - set_method_mock.assert_called_with('firewall', 'proxy-address', data=expected_data, vdom='root') - schema_method_mock.assert_not_called() - assert not is_error - assert not changed - assert response['status'] == 'error' - assert response['http_status'] == 404 - - -def test_firewall_proxy_address_filter_foreign_attributes(mocker): - schema_method_mock = mocker.patch('ansible.module_utils.network.fortios.fortios.FortiOSHandler.schema') - - set_method_result = {'status': 'success', 'http_method': 'POST', 'http_status': 200} - set_method_mock = mocker.patch('ansible.module_utils.network.fortios.fortios.FortiOSHandler.set', return_value=set_method_result) - - input_data = { - 'username': 'admin', - 'state': 'present', - 'firewall_proxy_address': { - 'random_attribute_not_valid': 'tag', - 'case_sensitivity': 'disable', - 'color': '4', - 'comment': 'Optional comments.', - 'header': 'test_value_6', - 'header_name': 'test_value_7', - 'host': 'myhostname8', - 'host_regex': 'myhostname9', - 'method': 'get', - 'name': 'default_name_11', - 'path': 'test_value_12', - 'query': 'test_value_13', - 'referrer': 'enable', - 'type': 'host-regex', - 'ua': 'chrome', - 'uuid': 'test_value_17', - 'visibility': 'enable' - }, - 'vdom': 'root'} - - is_error, changed, response = fortios_firewall_proxy_address.fortios_firewall(input_data, fos_instance) - - expected_data = { - 'case-sensitivity': 'disable', - 'color': '4', - 'comment': 'Optional comments.', - 'header': 'test_value_6', - 'header-name': 'test_value_7', - 'host': 'myhostname8', - 'host-regex': 'myhostname9', - 'method': 'get', - 'name': 'default_name_11', - 'path': 'test_value_12', - 'query': 'test_value_13', - 'referrer': 'enable', - 'type': 'host-regex', - 'ua': 'chrome', - 'uuid': 'test_value_17', - 'visibility': 'enable' - } - - set_method_mock.assert_called_with('firewall', 'proxy-address', data=expected_data, vdom='root') - schema_method_mock.assert_not_called() - assert not is_error - assert changed - assert response['status'] == 'success' - assert response['http_status'] == 200 |