summaryrefslogtreecommitdiff
path: root/test/units/modules/network/fortios/test_fortios_log_memory_filter.py
diff options
context:
space:
mode:
Diffstat (limited to 'test/units/modules/network/fortios/test_fortios_log_memory_filter.py')
-rw-r--r--test/units/modules/network/fortios/test_fortios_log_memory_filter.py399
1 files changed, 0 insertions, 399 deletions
diff --git a/test/units/modules/network/fortios/test_fortios_log_memory_filter.py b/test/units/modules/network/fortios/test_fortios_log_memory_filter.py
deleted file mode 100644
index 488709c52f..0000000000
--- a/test/units/modules/network/fortios/test_fortios_log_memory_filter.py
+++ /dev/null
@@ -1,399 +0,0 @@
-# Copyright 2019 Fortinet, Inc.
-#
-# This program is free software: you can redistribute it and/or modify
-# it under the terms of the GNU General Public License as published by
-# the Free Software Foundation, either version 3 of the License, or
-# (at your option) any later version.
-#
-# This program is distributed in the hope that it will be useful,
-# but WITHOUT ANY WARRANTY; without even the implied warranty of
-# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-# GNU General Public License for more details.
-#
-# You should have received a copy of the GNU General Public License
-# along with Ansible. If not, see <https://www.gnu.org/licenses/>.
-
-# Make coding more python3-ish
-from __future__ import (absolute_import, division, print_function)
-__metaclass__ = type
-
-import os
-import json
-import pytest
-from mock import ANY
-from ansible.module_utils.network.fortios.fortios import FortiOSHandler
-
-try:
- from ansible.modules.network.fortios import fortios_log_memory_filter
-except ImportError:
- pytest.skip("Could not load required modules for testing", allow_module_level=True)
-
-
-@pytest.fixture(autouse=True)
-def connection_mock(mocker):
- connection_class_mock = mocker.patch('ansible.modules.network.fortios.fortios_log_memory_filter.Connection')
- return connection_class_mock
-
-
-fos_instance = FortiOSHandler(connection_mock)
-
-
-def test_log_memory_filter_creation(mocker):
- schema_method_mock = mocker.patch('ansible.module_utils.network.fortios.fortios.FortiOSHandler.schema')
-
- set_method_result = {'status': 'success', 'http_method': 'POST', 'http_status': 200}
- set_method_mock = mocker.patch('ansible.module_utils.network.fortios.fortios.FortiOSHandler.set', return_value=set_method_result)
-
- input_data = {
- 'username': 'admin',
- 'state': 'present',
- 'log_memory_filter': {
- 'admin': 'enable',
- 'anomaly': 'enable',
- 'auth': 'enable',
- 'cpu_memory_usage': 'enable',
- 'dhcp': 'enable',
- 'dns': 'enable',
- 'event': 'enable',
- 'filter': 'test_value_10',
- 'filter_type': 'include',
- 'forward_traffic': 'enable',
- 'gtp': 'enable',
- 'ha': 'enable',
- 'ipsec': 'enable',
- 'ldb_monitor': 'enable',
- 'local_traffic': 'enable',
- 'multicast_traffic': 'enable',
- 'netscan_discovery': 'test_value_19,',
- 'netscan_vulnerability': 'test_value_20,',
- 'pattern': 'enable',
- 'ppp': 'enable',
- 'radius': 'enable',
- 'severity': 'emergency',
- 'sniffer_traffic': 'enable',
- 'ssh': 'enable',
- 'sslvpn_log_adm': 'enable',
- 'sslvpn_log_auth': 'enable',
- 'sslvpn_log_session': 'enable',
- 'system': 'enable',
- 'vip_ssl': 'enable',
- 'voip': 'enable',
- 'wan_opt': 'enable',
- 'wireless_activity': 'enable'
- },
- 'vdom': 'root'}
-
- is_error, changed, response = fortios_log_memory_filter.fortios_log_memory(input_data, fos_instance)
-
- expected_data = {
- 'admin': 'enable',
- 'anomaly': 'enable',
- 'auth': 'enable',
- 'cpu-memory-usage': 'enable',
- 'dhcp': 'enable',
- 'dns': 'enable',
- 'event': 'enable',
- 'filter': 'test_value_10',
- 'filter-type': 'include',
- 'forward-traffic': 'enable',
- 'gtp': 'enable',
- 'ha': 'enable',
- 'ipsec': 'enable',
- 'ldb-monitor': 'enable',
- 'local-traffic': 'enable',
- 'multicast-traffic': 'enable',
- 'netscan-discovery': 'test_value_19,',
- 'netscan-vulnerability': 'test_value_20,',
- 'pattern': 'enable',
- 'ppp': 'enable',
- 'radius': 'enable',
- 'severity': 'emergency',
- 'sniffer-traffic': 'enable',
- 'ssh': 'enable',
- 'sslvpn-log-adm': 'enable',
- 'sslvpn-log-auth': 'enable',
- 'sslvpn-log-session': 'enable',
- 'system': 'enable',
- 'vip-ssl': 'enable',
- 'voip': 'enable',
- 'wan-opt': 'enable',
- 'wireless-activity': 'enable'
- }
-
- set_method_mock.assert_called_with('log.memory', 'filter', data=expected_data, vdom='root')
- schema_method_mock.assert_not_called()
- assert not is_error
- assert changed
- assert response['status'] == 'success'
- assert response['http_status'] == 200
-
-
-def test_log_memory_filter_creation_fails(mocker):
- schema_method_mock = mocker.patch('ansible.module_utils.network.fortios.fortios.FortiOSHandler.schema')
-
- set_method_result = {'status': 'error', 'http_method': 'POST', 'http_status': 500}
- set_method_mock = mocker.patch('ansible.module_utils.network.fortios.fortios.FortiOSHandler.set', return_value=set_method_result)
-
- input_data = {
- 'username': 'admin',
- 'state': 'present',
- 'log_memory_filter': {
- 'admin': 'enable',
- 'anomaly': 'enable',
- 'auth': 'enable',
- 'cpu_memory_usage': 'enable',
- 'dhcp': 'enable',
- 'dns': 'enable',
- 'event': 'enable',
- 'filter': 'test_value_10',
- 'filter_type': 'include',
- 'forward_traffic': 'enable',
- 'gtp': 'enable',
- 'ha': 'enable',
- 'ipsec': 'enable',
- 'ldb_monitor': 'enable',
- 'local_traffic': 'enable',
- 'multicast_traffic': 'enable',
- 'netscan_discovery': 'test_value_19,',
- 'netscan_vulnerability': 'test_value_20,',
- 'pattern': 'enable',
- 'ppp': 'enable',
- 'radius': 'enable',
- 'severity': 'emergency',
- 'sniffer_traffic': 'enable',
- 'ssh': 'enable',
- 'sslvpn_log_adm': 'enable',
- 'sslvpn_log_auth': 'enable',
- 'sslvpn_log_session': 'enable',
- 'system': 'enable',
- 'vip_ssl': 'enable',
- 'voip': 'enable',
- 'wan_opt': 'enable',
- 'wireless_activity': 'enable'
- },
- 'vdom': 'root'}
-
- is_error, changed, response = fortios_log_memory_filter.fortios_log_memory(input_data, fos_instance)
-
- expected_data = {
- 'admin': 'enable',
- 'anomaly': 'enable',
- 'auth': 'enable',
- 'cpu-memory-usage': 'enable',
- 'dhcp': 'enable',
- 'dns': 'enable',
- 'event': 'enable',
- 'filter': 'test_value_10',
- 'filter-type': 'include',
- 'forward-traffic': 'enable',
- 'gtp': 'enable',
- 'ha': 'enable',
- 'ipsec': 'enable',
- 'ldb-monitor': 'enable',
- 'local-traffic': 'enable',
- 'multicast-traffic': 'enable',
- 'netscan-discovery': 'test_value_19,',
- 'netscan-vulnerability': 'test_value_20,',
- 'pattern': 'enable',
- 'ppp': 'enable',
- 'radius': 'enable',
- 'severity': 'emergency',
- 'sniffer-traffic': 'enable',
- 'ssh': 'enable',
- 'sslvpn-log-adm': 'enable',
- 'sslvpn-log-auth': 'enable',
- 'sslvpn-log-session': 'enable',
- 'system': 'enable',
- 'vip-ssl': 'enable',
- 'voip': 'enable',
- 'wan-opt': 'enable',
- 'wireless-activity': 'enable'
- }
-
- set_method_mock.assert_called_with('log.memory', 'filter', data=expected_data, vdom='root')
- schema_method_mock.assert_not_called()
- assert is_error
- assert not changed
- assert response['status'] == 'error'
- assert response['http_status'] == 500
-
-
-def test_log_memory_filter_idempotent(mocker):
- schema_method_mock = mocker.patch('ansible.module_utils.network.fortios.fortios.FortiOSHandler.schema')
-
- set_method_result = {'status': 'error', 'http_method': 'DELETE', 'http_status': 404}
- set_method_mock = mocker.patch('ansible.module_utils.network.fortios.fortios.FortiOSHandler.set', return_value=set_method_result)
-
- input_data = {
- 'username': 'admin',
- 'state': 'present',
- 'log_memory_filter': {
- 'admin': 'enable',
- 'anomaly': 'enable',
- 'auth': 'enable',
- 'cpu_memory_usage': 'enable',
- 'dhcp': 'enable',
- 'dns': 'enable',
- 'event': 'enable',
- 'filter': 'test_value_10',
- 'filter_type': 'include',
- 'forward_traffic': 'enable',
- 'gtp': 'enable',
- 'ha': 'enable',
- 'ipsec': 'enable',
- 'ldb_monitor': 'enable',
- 'local_traffic': 'enable',
- 'multicast_traffic': 'enable',
- 'netscan_discovery': 'test_value_19,',
- 'netscan_vulnerability': 'test_value_20,',
- 'pattern': 'enable',
- 'ppp': 'enable',
- 'radius': 'enable',
- 'severity': 'emergency',
- 'sniffer_traffic': 'enable',
- 'ssh': 'enable',
- 'sslvpn_log_adm': 'enable',
- 'sslvpn_log_auth': 'enable',
- 'sslvpn_log_session': 'enable',
- 'system': 'enable',
- 'vip_ssl': 'enable',
- 'voip': 'enable',
- 'wan_opt': 'enable',
- 'wireless_activity': 'enable'
- },
- 'vdom': 'root'}
-
- is_error, changed, response = fortios_log_memory_filter.fortios_log_memory(input_data, fos_instance)
-
- expected_data = {
- 'admin': 'enable',
- 'anomaly': 'enable',
- 'auth': 'enable',
- 'cpu-memory-usage': 'enable',
- 'dhcp': 'enable',
- 'dns': 'enable',
- 'event': 'enable',
- 'filter': 'test_value_10',
- 'filter-type': 'include',
- 'forward-traffic': 'enable',
- 'gtp': 'enable',
- 'ha': 'enable',
- 'ipsec': 'enable',
- 'ldb-monitor': 'enable',
- 'local-traffic': 'enable',
- 'multicast-traffic': 'enable',
- 'netscan-discovery': 'test_value_19,',
- 'netscan-vulnerability': 'test_value_20,',
- 'pattern': 'enable',
- 'ppp': 'enable',
- 'radius': 'enable',
- 'severity': 'emergency',
- 'sniffer-traffic': 'enable',
- 'ssh': 'enable',
- 'sslvpn-log-adm': 'enable',
- 'sslvpn-log-auth': 'enable',
- 'sslvpn-log-session': 'enable',
- 'system': 'enable',
- 'vip-ssl': 'enable',
- 'voip': 'enable',
- 'wan-opt': 'enable',
- 'wireless-activity': 'enable'
- }
-
- set_method_mock.assert_called_with('log.memory', 'filter', data=expected_data, vdom='root')
- schema_method_mock.assert_not_called()
- assert not is_error
- assert not changed
- assert response['status'] == 'error'
- assert response['http_status'] == 404
-
-
-def test_log_memory_filter_filter_foreign_attributes(mocker):
- schema_method_mock = mocker.patch('ansible.module_utils.network.fortios.fortios.FortiOSHandler.schema')
-
- set_method_result = {'status': 'success', 'http_method': 'POST', 'http_status': 200}
- set_method_mock = mocker.patch('ansible.module_utils.network.fortios.fortios.FortiOSHandler.set', return_value=set_method_result)
-
- input_data = {
- 'username': 'admin',
- 'state': 'present',
- 'log_memory_filter': {
- 'random_attribute_not_valid': 'tag',
- 'admin': 'enable',
- 'anomaly': 'enable',
- 'auth': 'enable',
- 'cpu_memory_usage': 'enable',
- 'dhcp': 'enable',
- 'dns': 'enable',
- 'event': 'enable',
- 'filter': 'test_value_10',
- 'filter_type': 'include',
- 'forward_traffic': 'enable',
- 'gtp': 'enable',
- 'ha': 'enable',
- 'ipsec': 'enable',
- 'ldb_monitor': 'enable',
- 'local_traffic': 'enable',
- 'multicast_traffic': 'enable',
- 'netscan_discovery': 'test_value_19,',
- 'netscan_vulnerability': 'test_value_20,',
- 'pattern': 'enable',
- 'ppp': 'enable',
- 'radius': 'enable',
- 'severity': 'emergency',
- 'sniffer_traffic': 'enable',
- 'ssh': 'enable',
- 'sslvpn_log_adm': 'enable',
- 'sslvpn_log_auth': 'enable',
- 'sslvpn_log_session': 'enable',
- 'system': 'enable',
- 'vip_ssl': 'enable',
- 'voip': 'enable',
- 'wan_opt': 'enable',
- 'wireless_activity': 'enable'
- },
- 'vdom': 'root'}
-
- is_error, changed, response = fortios_log_memory_filter.fortios_log_memory(input_data, fos_instance)
-
- expected_data = {
- 'admin': 'enable',
- 'anomaly': 'enable',
- 'auth': 'enable',
- 'cpu-memory-usage': 'enable',
- 'dhcp': 'enable',
- 'dns': 'enable',
- 'event': 'enable',
- 'filter': 'test_value_10',
- 'filter-type': 'include',
- 'forward-traffic': 'enable',
- 'gtp': 'enable',
- 'ha': 'enable',
- 'ipsec': 'enable',
- 'ldb-monitor': 'enable',
- 'local-traffic': 'enable',
- 'multicast-traffic': 'enable',
- 'netscan-discovery': 'test_value_19,',
- 'netscan-vulnerability': 'test_value_20,',
- 'pattern': 'enable',
- 'ppp': 'enable',
- 'radius': 'enable',
- 'severity': 'emergency',
- 'sniffer-traffic': 'enable',
- 'ssh': 'enable',
- 'sslvpn-log-adm': 'enable',
- 'sslvpn-log-auth': 'enable',
- 'sslvpn-log-session': 'enable',
- 'system': 'enable',
- 'vip-ssl': 'enable',
- 'voip': 'enable',
- 'wan-opt': 'enable',
- 'wireless-activity': 'enable'
- }
-
- set_method_mock.assert_called_with('log.memory', 'filter', data=expected_data, vdom='root')
- schema_method_mock.assert_not_called()
- assert not is_error
- assert changed
- assert response['status'] == 'success'
- assert response['http_status'] == 200