diff options
Diffstat (limited to 'test/integration/targets/cs_securitygroup_rule')
7 files changed, 0 insertions, 406 deletions
diff --git a/test/integration/targets/cs_securitygroup_rule/aliases b/test/integration/targets/cs_securitygroup_rule/aliases deleted file mode 100644 index a315c1b58b..0000000000 --- a/test/integration/targets/cs_securitygroup_rule/aliases +++ /dev/null @@ -1,2 +0,0 @@ -cloud/cs -shippable/cs/group2 diff --git a/test/integration/targets/cs_securitygroup_rule/meta/main.yml b/test/integration/targets/cs_securitygroup_rule/meta/main.yml deleted file mode 100644 index e9a5b9eeae..0000000000 --- a/test/integration/targets/cs_securitygroup_rule/meta/main.yml +++ /dev/null @@ -1,3 +0,0 @@ ---- -dependencies: - - cs_common diff --git a/test/integration/targets/cs_securitygroup_rule/tasks/absent.yml b/test/integration/targets/cs_securitygroup_rule/tasks/absent.yml deleted file mode 100644 index 8f1378e61c..0000000000 --- a/test/integration/targets/cs_securitygroup_rule/tasks/absent.yml +++ /dev/null @@ -1,171 +0,0 @@ ---- -- name: test remove http range rule in check mode - cs_securitygroup_rule: - security_group: default - start_port: 8000 - end_port: 8888 - cidr: 1.2.3.4/32 - state: absent - register: sg_rule - check_mode: true -- name: verify create http range rule in check mode - assert: - that: - - sg_rule is successful - - sg_rule is changed - - sg_rule.type == 'ingress' - - sg_rule.security_group == 'default' - - sg_rule.protocol == 'tcp' - - sg_rule.start_port == 8000 - - sg_rule.end_port == 8888 - - sg_rule.cidr == '1.2.3.4/32' - -- name: test remove http range rule - cs_securitygroup_rule: - security_group: default - start_port: 8000 - end_port: 8888 - cidr: 1.2.3.4/32 - state: absent - register: sg_rule -- name: verify create http range rule - assert: - that: - - sg_rule is successful - - sg_rule is changed - - sg_rule.type == 'ingress' - - sg_rule.security_group == 'default' - - sg_rule.protocol == 'tcp' - - sg_rule.start_port == 8000 - - sg_rule.end_port == 8888 - - sg_rule.cidr == '1.2.3.4/32' - -- name: test remove http range rule idempotence - cs_securitygroup_rule: - security_group: default - start_port: 8000 - end_port: 8888 - cidr: 1.2.3.4/32 - state: absent - register: sg_rule -- name: verify create http range rule idempotence - assert: - that: - - sg_rule is successful - - sg_rule is not changed - -- name: test remove single port udp rule in check mode - cs_securitygroup_rule: - security_group: default - port: 5353 - protocol: udp - type: egress - user_security_group: '{{ cs_resource_prefix }}_sg' - state: absent - register: sg_rule - check_mode: true -- name: verify remove single port udp rule in check mode - assert: - that: - - sg_rule is successful - - sg_rule is changed - - sg_rule.type == 'egress' - - sg_rule.security_group == 'default' - - sg_rule.protocol == 'udp' - - sg_rule.start_port == 5353 - - sg_rule.end_port == 5353 - - sg_rule.user_security_group == '{{ cs_resource_prefix }}_sg' - -- name: test remove single port udp rule - cs_securitygroup_rule: - security_group: default - port: 5353 - protocol: udp - type: egress - user_security_group: '{{ cs_resource_prefix }}_sg' - state: absent - register: sg_rule -- name: verify remove single port udp rule - assert: - that: - - sg_rule is successful - - sg_rule is changed - - sg_rule.type == 'egress' - - sg_rule.security_group == 'default' - - sg_rule.protocol == 'udp' - - sg_rule.start_port == 5353 - - sg_rule.end_port == 5353 - - sg_rule.user_security_group == '{{ cs_resource_prefix }}_sg' - -- name: test remove single port udp rule idempotence - cs_securitygroup_rule: - security_group: default - port: 5353 - protocol: udp - type: egress - user_security_group: '{{ cs_resource_prefix }}_sg' - state: absent - register: sg_rule -- name: verify remove single port udp rule idempotence - assert: - that: - - sg_rule is successful - - sg_rule is not changed - -- name: test remove icmp rule in check mode - cs_securitygroup_rule: - security_group: default - protocol: icmp - type: ingress - icmp_type: -1 - icmp_code: -1 - state: absent - register: sg_rule - check_mode: true -- name: verify icmp rule in check mode - assert: - that: - - sg_rule is successful - - sg_rule is changed - - sg_rule.type == 'ingress' - - sg_rule.security_group == 'default' - - sg_rule.cidr == '0.0.0.0/0' - - sg_rule.protocol == 'icmp' - - sg_rule.icmp_code == -1 - - sg_rule.icmp_type == -1 - -- name: test remove icmp rule - cs_securitygroup_rule: - security_group: default - protocol: icmp - type: ingress - icmp_type: -1 - icmp_code: -1 - state: absent - register: sg_rule -- name: verify icmp rule - assert: - that: - - sg_rule is successful - - sg_rule is changed - - sg_rule.type == 'ingress' - - sg_rule.security_group == 'default' - - sg_rule.cidr == '0.0.0.0/0' - - sg_rule.protocol == 'icmp' - - sg_rule.icmp_code == -1 - - sg_rule.icmp_type == -1 - -- name: test remove icmp rule idempotence - cs_securitygroup_rule: - security_group: default - protocol: icmp - type: ingress - icmp_type: -1 - icmp_code: -1 - state: absent - register: sg_rule -- name: verify icmp rule idempotence - assert: - that: - - sg_rule is successful - - sg_rule is not changed diff --git a/test/integration/targets/cs_securitygroup_rule/tasks/cleanup.yml b/test/integration/targets/cs_securitygroup_rule/tasks/cleanup.yml deleted file mode 100644 index 0fce532837..0000000000 --- a/test/integration/targets/cs_securitygroup_rule/tasks/cleanup.yml +++ /dev/null @@ -1,7 +0,0 @@ -- name: cleanup custom security group - cs_securitygroup: name={{ cs_resource_prefix }}_sg state=absent - register: sg -- name: verify setup - assert: - that: - - sg is successful diff --git a/test/integration/targets/cs_securitygroup_rule/tasks/main.yml b/test/integration/targets/cs_securitygroup_rule/tasks/main.yml deleted file mode 100644 index e76745cb54..0000000000 --- a/test/integration/targets/cs_securitygroup_rule/tasks/main.yml +++ /dev/null @@ -1,4 +0,0 @@ -- include: setup.yml -- include: present.yml -- include: absent.yml -- include: cleanup.yml diff --git a/test/integration/targets/cs_securitygroup_rule/tasks/present.yml b/test/integration/targets/cs_securitygroup_rule/tasks/present.yml deleted file mode 100644 index a2a4e03c85..0000000000 --- a/test/integration/targets/cs_securitygroup_rule/tasks/present.yml +++ /dev/null @@ -1,163 +0,0 @@ ---- -- name: test create http range rule in check mode - cs_securitygroup_rule: - security_group: default - start_port: 8000 - end_port: 8888 - cidr: 1.2.3.4/32 - register: sg_rule - check_mode: true -- name: verify create http range rule in check mode - assert: - that: - - sg_rule is successful - - sg_rule is changed - -- name: test create http range rule - cs_securitygroup_rule: - security_group: default - start_port: 8000 - end_port: 8888 - cidr: 1.2.3.4/32 - register: sg_rule -- name: verify create http range rule - assert: - that: - - sg_rule is successful - - sg_rule is changed - - sg_rule.type == 'ingress' - - sg_rule.security_group == 'default' - - sg_rule.protocol == 'tcp' - - sg_rule.start_port == 8000 - - sg_rule.end_port == 8888 - - sg_rule.cidr == '1.2.3.4/32' - -- name: test create http range rule idempotence - cs_securitygroup_rule: - security_group: default - start_port: 8000 - end_port: 8888 - cidr: 1.2.3.4/32 - register: sg_rule -- name: verify create http range rule idempotence - assert: - that: - - sg_rule is successful - - sg_rule is not changed - - sg_rule.type == 'ingress' - - sg_rule.security_group == 'default' - - sg_rule.protocol == 'tcp' - - sg_rule.start_port == 8000 - - sg_rule.end_port == 8888 - - sg_rule.cidr == '1.2.3.4/32' - -- name: test create single port udp rule in check mode - cs_securitygroup_rule: - security_group: default - port: 5353 - protocol: udp - type: egress - user_security_group: '{{ cs_resource_prefix }}_sg' - register: sg_rule - check_mode: true -- name: verify create single port udp rule in check mode - assert: - that: - - sg_rule is successful - - sg_rule is changed - -- name: test create single port udp rule - cs_securitygroup_rule: - security_group: default - port: 5353 - protocol: udp - type: egress - user_security_group: '{{ cs_resource_prefix }}_sg' - register: sg_rule -- name: verify create single port udp rule - assert: - that: - - sg_rule is successful - - sg_rule is changed - - sg_rule.type == 'egress' - - sg_rule.security_group == 'default' - - sg_rule.protocol == 'udp' - - sg_rule.start_port == 5353 - - sg_rule.end_port == 5353 - - sg_rule.user_security_group == '{{ cs_resource_prefix }}_sg' - - -- name: test single port udp rule idempotence - cs_securitygroup_rule: - security_group: default - port: 5353 - protocol: udp - type: egress - user_security_group: '{{ cs_resource_prefix }}_sg' - register: sg_rule -- name: verify single port udp rule idempotence - assert: - that: - - sg_rule is successful - - sg_rule is not changed - - sg_rule.type == 'egress' - - sg_rule.security_group == 'default' - - sg_rule.protocol == 'udp' - - sg_rule.start_port == 5353 - - sg_rule.end_port == 5353 - - sg_rule.user_security_group == '{{ cs_resource_prefix }}_sg' - -- name: test icmp rule in check mode - cs_securitygroup_rule: - security_group: default - protocol: icmp - type: ingress - icmp_type: -1 - icmp_code: -1 - register: sg_rule - check_mode: true -- name: verify icmp rule in check mode - assert: - that: - - sg_rule is successful - - sg_rule is changed - -- name: test icmp rule - cs_securitygroup_rule: - security_group: default - protocol: icmp - type: ingress - icmp_type: -1 - icmp_code: -1 - register: sg_rule -- name: verify icmp rule - assert: - that: - - sg_rule is successful - - sg_rule is changed - - sg_rule.type == 'ingress' - - sg_rule.security_group == 'default' - - sg_rule.cidr == '0.0.0.0/0' - - sg_rule.protocol == 'icmp' - - sg_rule.icmp_code == -1 - - sg_rule.icmp_type == -1 - -- name: test icmp rule idempotence - cs_securitygroup_rule: - security_group: default - protocol: icmp - type: ingress - icmp_type: -1 - icmp_code: -1 - register: sg_rule -- name: verify icmp rule idempotence - assert: - that: - - sg_rule is successful - - sg_rule is not changed - - sg_rule.type == 'ingress' - - sg_rule.security_group == 'default' - - sg_rule.cidr == '0.0.0.0/0' - - sg_rule.protocol == 'icmp' - - sg_rule.icmp_code == -1 - - sg_rule.icmp_type == -1 diff --git a/test/integration/targets/cs_securitygroup_rule/tasks/setup.yml b/test/integration/targets/cs_securitygroup_rule/tasks/setup.yml deleted file mode 100644 index 8562520510..0000000000 --- a/test/integration/targets/cs_securitygroup_rule/tasks/setup.yml +++ /dev/null @@ -1,56 +0,0 @@ -- name: setup custom security group - cs_securitygroup: name={{ cs_resource_prefix }}_sg - register: sg -- name: verify setup - assert: - that: - - sg is successful - -- name: setup default security group - cs_securitygroup: name=default - register: sg -- name: verify setup - assert: - that: - - sg is successful - -- name: setup remove icmp rule - cs_securitygroup_rule: - security_group: default - protocol: icmp - type: ingress - icmp_type: -1 - icmp_code: -1 - state: absent - register: sg_rule -- name: verify remove icmp rule - assert: - that: - - sg_rule is successful - -- name: setup remove http range rule - cs_securitygroup_rule: - security_group: default - start_port: 8000 - end_port: 8888 - cidr: 1.2.3.4/32 - state: absent - register: sg_rule -- name: verify remove http range rule - assert: - that: - - sg_rule is successful - -- name: setup remove single port udp rule - cs_securitygroup_rule: - security_group: default - port: 5353 - protocol: udp - type: egress - user_security_group: '{{ cs_resource_prefix }}-user-sg' - state: absent - register: sg_rule -- name: verify remove single port udp rule - assert: - that: - - sg_rule is successful |