summaryrefslogtreecommitdiff
path: root/test/integration/targets/cs_securitygroup_rule
diff options
context:
space:
mode:
Diffstat (limited to 'test/integration/targets/cs_securitygroup_rule')
-rw-r--r--test/integration/targets/cs_securitygroup_rule/aliases2
-rw-r--r--test/integration/targets/cs_securitygroup_rule/meta/main.yml3
-rw-r--r--test/integration/targets/cs_securitygroup_rule/tasks/absent.yml171
-rw-r--r--test/integration/targets/cs_securitygroup_rule/tasks/cleanup.yml7
-rw-r--r--test/integration/targets/cs_securitygroup_rule/tasks/main.yml4
-rw-r--r--test/integration/targets/cs_securitygroup_rule/tasks/present.yml163
-rw-r--r--test/integration/targets/cs_securitygroup_rule/tasks/setup.yml56
7 files changed, 0 insertions, 406 deletions
diff --git a/test/integration/targets/cs_securitygroup_rule/aliases b/test/integration/targets/cs_securitygroup_rule/aliases
deleted file mode 100644
index a315c1b58b..0000000000
--- a/test/integration/targets/cs_securitygroup_rule/aliases
+++ /dev/null
@@ -1,2 +0,0 @@
-cloud/cs
-shippable/cs/group2
diff --git a/test/integration/targets/cs_securitygroup_rule/meta/main.yml b/test/integration/targets/cs_securitygroup_rule/meta/main.yml
deleted file mode 100644
index e9a5b9eeae..0000000000
--- a/test/integration/targets/cs_securitygroup_rule/meta/main.yml
+++ /dev/null
@@ -1,3 +0,0 @@
----
-dependencies:
- - cs_common
diff --git a/test/integration/targets/cs_securitygroup_rule/tasks/absent.yml b/test/integration/targets/cs_securitygroup_rule/tasks/absent.yml
deleted file mode 100644
index 8f1378e61c..0000000000
--- a/test/integration/targets/cs_securitygroup_rule/tasks/absent.yml
+++ /dev/null
@@ -1,171 +0,0 @@
----
-- name: test remove http range rule in check mode
- cs_securitygroup_rule:
- security_group: default
- start_port: 8000
- end_port: 8888
- cidr: 1.2.3.4/32
- state: absent
- register: sg_rule
- check_mode: true
-- name: verify create http range rule in check mode
- assert:
- that:
- - sg_rule is successful
- - sg_rule is changed
- - sg_rule.type == 'ingress'
- - sg_rule.security_group == 'default'
- - sg_rule.protocol == 'tcp'
- - sg_rule.start_port == 8000
- - sg_rule.end_port == 8888
- - sg_rule.cidr == '1.2.3.4/32'
-
-- name: test remove http range rule
- cs_securitygroup_rule:
- security_group: default
- start_port: 8000
- end_port: 8888
- cidr: 1.2.3.4/32
- state: absent
- register: sg_rule
-- name: verify create http range rule
- assert:
- that:
- - sg_rule is successful
- - sg_rule is changed
- - sg_rule.type == 'ingress'
- - sg_rule.security_group == 'default'
- - sg_rule.protocol == 'tcp'
- - sg_rule.start_port == 8000
- - sg_rule.end_port == 8888
- - sg_rule.cidr == '1.2.3.4/32'
-
-- name: test remove http range rule idempotence
- cs_securitygroup_rule:
- security_group: default
- start_port: 8000
- end_port: 8888
- cidr: 1.2.3.4/32
- state: absent
- register: sg_rule
-- name: verify create http range rule idempotence
- assert:
- that:
- - sg_rule is successful
- - sg_rule is not changed
-
-- name: test remove single port udp rule in check mode
- cs_securitygroup_rule:
- security_group: default
- port: 5353
- protocol: udp
- type: egress
- user_security_group: '{{ cs_resource_prefix }}_sg'
- state: absent
- register: sg_rule
- check_mode: true
-- name: verify remove single port udp rule in check mode
- assert:
- that:
- - sg_rule is successful
- - sg_rule is changed
- - sg_rule.type == 'egress'
- - sg_rule.security_group == 'default'
- - sg_rule.protocol == 'udp'
- - sg_rule.start_port == 5353
- - sg_rule.end_port == 5353
- - sg_rule.user_security_group == '{{ cs_resource_prefix }}_sg'
-
-- name: test remove single port udp rule
- cs_securitygroup_rule:
- security_group: default
- port: 5353
- protocol: udp
- type: egress
- user_security_group: '{{ cs_resource_prefix }}_sg'
- state: absent
- register: sg_rule
-- name: verify remove single port udp rule
- assert:
- that:
- - sg_rule is successful
- - sg_rule is changed
- - sg_rule.type == 'egress'
- - sg_rule.security_group == 'default'
- - sg_rule.protocol == 'udp'
- - sg_rule.start_port == 5353
- - sg_rule.end_port == 5353
- - sg_rule.user_security_group == '{{ cs_resource_prefix }}_sg'
-
-- name: test remove single port udp rule idempotence
- cs_securitygroup_rule:
- security_group: default
- port: 5353
- protocol: udp
- type: egress
- user_security_group: '{{ cs_resource_prefix }}_sg'
- state: absent
- register: sg_rule
-- name: verify remove single port udp rule idempotence
- assert:
- that:
- - sg_rule is successful
- - sg_rule is not changed
-
-- name: test remove icmp rule in check mode
- cs_securitygroup_rule:
- security_group: default
- protocol: icmp
- type: ingress
- icmp_type: -1
- icmp_code: -1
- state: absent
- register: sg_rule
- check_mode: true
-- name: verify icmp rule in check mode
- assert:
- that:
- - sg_rule is successful
- - sg_rule is changed
- - sg_rule.type == 'ingress'
- - sg_rule.security_group == 'default'
- - sg_rule.cidr == '0.0.0.0/0'
- - sg_rule.protocol == 'icmp'
- - sg_rule.icmp_code == -1
- - sg_rule.icmp_type == -1
-
-- name: test remove icmp rule
- cs_securitygroup_rule:
- security_group: default
- protocol: icmp
- type: ingress
- icmp_type: -1
- icmp_code: -1
- state: absent
- register: sg_rule
-- name: verify icmp rule
- assert:
- that:
- - sg_rule is successful
- - sg_rule is changed
- - sg_rule.type == 'ingress'
- - sg_rule.security_group == 'default'
- - sg_rule.cidr == '0.0.0.0/0'
- - sg_rule.protocol == 'icmp'
- - sg_rule.icmp_code == -1
- - sg_rule.icmp_type == -1
-
-- name: test remove icmp rule idempotence
- cs_securitygroup_rule:
- security_group: default
- protocol: icmp
- type: ingress
- icmp_type: -1
- icmp_code: -1
- state: absent
- register: sg_rule
-- name: verify icmp rule idempotence
- assert:
- that:
- - sg_rule is successful
- - sg_rule is not changed
diff --git a/test/integration/targets/cs_securitygroup_rule/tasks/cleanup.yml b/test/integration/targets/cs_securitygroup_rule/tasks/cleanup.yml
deleted file mode 100644
index 0fce532837..0000000000
--- a/test/integration/targets/cs_securitygroup_rule/tasks/cleanup.yml
+++ /dev/null
@@ -1,7 +0,0 @@
-- name: cleanup custom security group
- cs_securitygroup: name={{ cs_resource_prefix }}_sg state=absent
- register: sg
-- name: verify setup
- assert:
- that:
- - sg is successful
diff --git a/test/integration/targets/cs_securitygroup_rule/tasks/main.yml b/test/integration/targets/cs_securitygroup_rule/tasks/main.yml
deleted file mode 100644
index e76745cb54..0000000000
--- a/test/integration/targets/cs_securitygroup_rule/tasks/main.yml
+++ /dev/null
@@ -1,4 +0,0 @@
-- include: setup.yml
-- include: present.yml
-- include: absent.yml
-- include: cleanup.yml
diff --git a/test/integration/targets/cs_securitygroup_rule/tasks/present.yml b/test/integration/targets/cs_securitygroup_rule/tasks/present.yml
deleted file mode 100644
index a2a4e03c85..0000000000
--- a/test/integration/targets/cs_securitygroup_rule/tasks/present.yml
+++ /dev/null
@@ -1,163 +0,0 @@
----
-- name: test create http range rule in check mode
- cs_securitygroup_rule:
- security_group: default
- start_port: 8000
- end_port: 8888
- cidr: 1.2.3.4/32
- register: sg_rule
- check_mode: true
-- name: verify create http range rule in check mode
- assert:
- that:
- - sg_rule is successful
- - sg_rule is changed
-
-- name: test create http range rule
- cs_securitygroup_rule:
- security_group: default
- start_port: 8000
- end_port: 8888
- cidr: 1.2.3.4/32
- register: sg_rule
-- name: verify create http range rule
- assert:
- that:
- - sg_rule is successful
- - sg_rule is changed
- - sg_rule.type == 'ingress'
- - sg_rule.security_group == 'default'
- - sg_rule.protocol == 'tcp'
- - sg_rule.start_port == 8000
- - sg_rule.end_port == 8888
- - sg_rule.cidr == '1.2.3.4/32'
-
-- name: test create http range rule idempotence
- cs_securitygroup_rule:
- security_group: default
- start_port: 8000
- end_port: 8888
- cidr: 1.2.3.4/32
- register: sg_rule
-- name: verify create http range rule idempotence
- assert:
- that:
- - sg_rule is successful
- - sg_rule is not changed
- - sg_rule.type == 'ingress'
- - sg_rule.security_group == 'default'
- - sg_rule.protocol == 'tcp'
- - sg_rule.start_port == 8000
- - sg_rule.end_port == 8888
- - sg_rule.cidr == '1.2.3.4/32'
-
-- name: test create single port udp rule in check mode
- cs_securitygroup_rule:
- security_group: default
- port: 5353
- protocol: udp
- type: egress
- user_security_group: '{{ cs_resource_prefix }}_sg'
- register: sg_rule
- check_mode: true
-- name: verify create single port udp rule in check mode
- assert:
- that:
- - sg_rule is successful
- - sg_rule is changed
-
-- name: test create single port udp rule
- cs_securitygroup_rule:
- security_group: default
- port: 5353
- protocol: udp
- type: egress
- user_security_group: '{{ cs_resource_prefix }}_sg'
- register: sg_rule
-- name: verify create single port udp rule
- assert:
- that:
- - sg_rule is successful
- - sg_rule is changed
- - sg_rule.type == 'egress'
- - sg_rule.security_group == 'default'
- - sg_rule.protocol == 'udp'
- - sg_rule.start_port == 5353
- - sg_rule.end_port == 5353
- - sg_rule.user_security_group == '{{ cs_resource_prefix }}_sg'
-
-
-- name: test single port udp rule idempotence
- cs_securitygroup_rule:
- security_group: default
- port: 5353
- protocol: udp
- type: egress
- user_security_group: '{{ cs_resource_prefix }}_sg'
- register: sg_rule
-- name: verify single port udp rule idempotence
- assert:
- that:
- - sg_rule is successful
- - sg_rule is not changed
- - sg_rule.type == 'egress'
- - sg_rule.security_group == 'default'
- - sg_rule.protocol == 'udp'
- - sg_rule.start_port == 5353
- - sg_rule.end_port == 5353
- - sg_rule.user_security_group == '{{ cs_resource_prefix }}_sg'
-
-- name: test icmp rule in check mode
- cs_securitygroup_rule:
- security_group: default
- protocol: icmp
- type: ingress
- icmp_type: -1
- icmp_code: -1
- register: sg_rule
- check_mode: true
-- name: verify icmp rule in check mode
- assert:
- that:
- - sg_rule is successful
- - sg_rule is changed
-
-- name: test icmp rule
- cs_securitygroup_rule:
- security_group: default
- protocol: icmp
- type: ingress
- icmp_type: -1
- icmp_code: -1
- register: sg_rule
-- name: verify icmp rule
- assert:
- that:
- - sg_rule is successful
- - sg_rule is changed
- - sg_rule.type == 'ingress'
- - sg_rule.security_group == 'default'
- - sg_rule.cidr == '0.0.0.0/0'
- - sg_rule.protocol == 'icmp'
- - sg_rule.icmp_code == -1
- - sg_rule.icmp_type == -1
-
-- name: test icmp rule idempotence
- cs_securitygroup_rule:
- security_group: default
- protocol: icmp
- type: ingress
- icmp_type: -1
- icmp_code: -1
- register: sg_rule
-- name: verify icmp rule idempotence
- assert:
- that:
- - sg_rule is successful
- - sg_rule is not changed
- - sg_rule.type == 'ingress'
- - sg_rule.security_group == 'default'
- - sg_rule.cidr == '0.0.0.0/0'
- - sg_rule.protocol == 'icmp'
- - sg_rule.icmp_code == -1
- - sg_rule.icmp_type == -1
diff --git a/test/integration/targets/cs_securitygroup_rule/tasks/setup.yml b/test/integration/targets/cs_securitygroup_rule/tasks/setup.yml
deleted file mode 100644
index 8562520510..0000000000
--- a/test/integration/targets/cs_securitygroup_rule/tasks/setup.yml
+++ /dev/null
@@ -1,56 +0,0 @@
-- name: setup custom security group
- cs_securitygroup: name={{ cs_resource_prefix }}_sg
- register: sg
-- name: verify setup
- assert:
- that:
- - sg is successful
-
-- name: setup default security group
- cs_securitygroup: name=default
- register: sg
-- name: verify setup
- assert:
- that:
- - sg is successful
-
-- name: setup remove icmp rule
- cs_securitygroup_rule:
- security_group: default
- protocol: icmp
- type: ingress
- icmp_type: -1
- icmp_code: -1
- state: absent
- register: sg_rule
-- name: verify remove icmp rule
- assert:
- that:
- - sg_rule is successful
-
-- name: setup remove http range rule
- cs_securitygroup_rule:
- security_group: default
- start_port: 8000
- end_port: 8888
- cidr: 1.2.3.4/32
- state: absent
- register: sg_rule
-- name: verify remove http range rule
- assert:
- that:
- - sg_rule is successful
-
-- name: setup remove single port udp rule
- cs_securitygroup_rule:
- security_group: default
- port: 5353
- protocol: udp
- type: egress
- user_security_group: '{{ cs_resource_prefix }}-user-sg'
- state: absent
- register: sg_rule
-- name: verify remove single port udp rule
- assert:
- that:
- - sg_rule is successful