diff options
Diffstat (limited to 'test/units/modules/network/fortios/test_fortios_log_memory_filter.py')
-rw-r--r-- | test/units/modules/network/fortios/test_fortios_log_memory_filter.py | 399 |
1 files changed, 0 insertions, 399 deletions
diff --git a/test/units/modules/network/fortios/test_fortios_log_memory_filter.py b/test/units/modules/network/fortios/test_fortios_log_memory_filter.py deleted file mode 100644 index 488709c52f..0000000000 --- a/test/units/modules/network/fortios/test_fortios_log_memory_filter.py +++ /dev/null @@ -1,399 +0,0 @@ -# Copyright 2019 Fortinet, Inc. -# -# This program is free software: you can redistribute it and/or modify -# it under the terms of the GNU General Public License as published by -# the Free Software Foundation, either version 3 of the License, or -# (at your option) any later version. -# -# This program is distributed in the hope that it will be useful, -# but WITHOUT ANY WARRANTY; without even the implied warranty of -# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -# GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with Ansible. If not, see <https://www.gnu.org/licenses/>. - -# Make coding more python3-ish -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - -import os -import json -import pytest -from mock import ANY -from ansible.module_utils.network.fortios.fortios import FortiOSHandler - -try: - from ansible.modules.network.fortios import fortios_log_memory_filter -except ImportError: - pytest.skip("Could not load required modules for testing", allow_module_level=True) - - -@pytest.fixture(autouse=True) -def connection_mock(mocker): - connection_class_mock = mocker.patch('ansible.modules.network.fortios.fortios_log_memory_filter.Connection') - return connection_class_mock - - -fos_instance = FortiOSHandler(connection_mock) - - -def test_log_memory_filter_creation(mocker): - schema_method_mock = mocker.patch('ansible.module_utils.network.fortios.fortios.FortiOSHandler.schema') - - set_method_result = {'status': 'success', 'http_method': 'POST', 'http_status': 200} - set_method_mock = mocker.patch('ansible.module_utils.network.fortios.fortios.FortiOSHandler.set', return_value=set_method_result) - - input_data = { - 'username': 'admin', - 'state': 'present', - 'log_memory_filter': { - 'admin': 'enable', - 'anomaly': 'enable', - 'auth': 'enable', - 'cpu_memory_usage': 'enable', - 'dhcp': 'enable', - 'dns': 'enable', - 'event': 'enable', - 'filter': 'test_value_10', - 'filter_type': 'include', - 'forward_traffic': 'enable', - 'gtp': 'enable', - 'ha': 'enable', - 'ipsec': 'enable', - 'ldb_monitor': 'enable', - 'local_traffic': 'enable', - 'multicast_traffic': 'enable', - 'netscan_discovery': 'test_value_19,', - 'netscan_vulnerability': 'test_value_20,', - 'pattern': 'enable', - 'ppp': 'enable', - 'radius': 'enable', - 'severity': 'emergency', - 'sniffer_traffic': 'enable', - 'ssh': 'enable', - 'sslvpn_log_adm': 'enable', - 'sslvpn_log_auth': 'enable', - 'sslvpn_log_session': 'enable', - 'system': 'enable', - 'vip_ssl': 'enable', - 'voip': 'enable', - 'wan_opt': 'enable', - 'wireless_activity': 'enable' - }, - 'vdom': 'root'} - - is_error, changed, response = fortios_log_memory_filter.fortios_log_memory(input_data, fos_instance) - - expected_data = { - 'admin': 'enable', - 'anomaly': 'enable', - 'auth': 'enable', - 'cpu-memory-usage': 'enable', - 'dhcp': 'enable', - 'dns': 'enable', - 'event': 'enable', - 'filter': 'test_value_10', - 'filter-type': 'include', - 'forward-traffic': 'enable', - 'gtp': 'enable', - 'ha': 'enable', - 'ipsec': 'enable', - 'ldb-monitor': 'enable', - 'local-traffic': 'enable', - 'multicast-traffic': 'enable', - 'netscan-discovery': 'test_value_19,', - 'netscan-vulnerability': 'test_value_20,', - 'pattern': 'enable', - 'ppp': 'enable', - 'radius': 'enable', - 'severity': 'emergency', - 'sniffer-traffic': 'enable', - 'ssh': 'enable', - 'sslvpn-log-adm': 'enable', - 'sslvpn-log-auth': 'enable', - 'sslvpn-log-session': 'enable', - 'system': 'enable', - 'vip-ssl': 'enable', - 'voip': 'enable', - 'wan-opt': 'enable', - 'wireless-activity': 'enable' - } - - set_method_mock.assert_called_with('log.memory', 'filter', data=expected_data, vdom='root') - schema_method_mock.assert_not_called() - assert not is_error - assert changed - assert response['status'] == 'success' - assert response['http_status'] == 200 - - -def test_log_memory_filter_creation_fails(mocker): - schema_method_mock = mocker.patch('ansible.module_utils.network.fortios.fortios.FortiOSHandler.schema') - - set_method_result = {'status': 'error', 'http_method': 'POST', 'http_status': 500} - set_method_mock = mocker.patch('ansible.module_utils.network.fortios.fortios.FortiOSHandler.set', return_value=set_method_result) - - input_data = { - 'username': 'admin', - 'state': 'present', - 'log_memory_filter': { - 'admin': 'enable', - 'anomaly': 'enable', - 'auth': 'enable', - 'cpu_memory_usage': 'enable', - 'dhcp': 'enable', - 'dns': 'enable', - 'event': 'enable', - 'filter': 'test_value_10', - 'filter_type': 'include', - 'forward_traffic': 'enable', - 'gtp': 'enable', - 'ha': 'enable', - 'ipsec': 'enable', - 'ldb_monitor': 'enable', - 'local_traffic': 'enable', - 'multicast_traffic': 'enable', - 'netscan_discovery': 'test_value_19,', - 'netscan_vulnerability': 'test_value_20,', - 'pattern': 'enable', - 'ppp': 'enable', - 'radius': 'enable', - 'severity': 'emergency', - 'sniffer_traffic': 'enable', - 'ssh': 'enable', - 'sslvpn_log_adm': 'enable', - 'sslvpn_log_auth': 'enable', - 'sslvpn_log_session': 'enable', - 'system': 'enable', - 'vip_ssl': 'enable', - 'voip': 'enable', - 'wan_opt': 'enable', - 'wireless_activity': 'enable' - }, - 'vdom': 'root'} - - is_error, changed, response = fortios_log_memory_filter.fortios_log_memory(input_data, fos_instance) - - expected_data = { - 'admin': 'enable', - 'anomaly': 'enable', - 'auth': 'enable', - 'cpu-memory-usage': 'enable', - 'dhcp': 'enable', - 'dns': 'enable', - 'event': 'enable', - 'filter': 'test_value_10', - 'filter-type': 'include', - 'forward-traffic': 'enable', - 'gtp': 'enable', - 'ha': 'enable', - 'ipsec': 'enable', - 'ldb-monitor': 'enable', - 'local-traffic': 'enable', - 'multicast-traffic': 'enable', - 'netscan-discovery': 'test_value_19,', - 'netscan-vulnerability': 'test_value_20,', - 'pattern': 'enable', - 'ppp': 'enable', - 'radius': 'enable', - 'severity': 'emergency', - 'sniffer-traffic': 'enable', - 'ssh': 'enable', - 'sslvpn-log-adm': 'enable', - 'sslvpn-log-auth': 'enable', - 'sslvpn-log-session': 'enable', - 'system': 'enable', - 'vip-ssl': 'enable', - 'voip': 'enable', - 'wan-opt': 'enable', - 'wireless-activity': 'enable' - } - - set_method_mock.assert_called_with('log.memory', 'filter', data=expected_data, vdom='root') - schema_method_mock.assert_not_called() - assert is_error - assert not changed - assert response['status'] == 'error' - assert response['http_status'] == 500 - - -def test_log_memory_filter_idempotent(mocker): - schema_method_mock = mocker.patch('ansible.module_utils.network.fortios.fortios.FortiOSHandler.schema') - - set_method_result = {'status': 'error', 'http_method': 'DELETE', 'http_status': 404} - set_method_mock = mocker.patch('ansible.module_utils.network.fortios.fortios.FortiOSHandler.set', return_value=set_method_result) - - input_data = { - 'username': 'admin', - 'state': 'present', - 'log_memory_filter': { - 'admin': 'enable', - 'anomaly': 'enable', - 'auth': 'enable', - 'cpu_memory_usage': 'enable', - 'dhcp': 'enable', - 'dns': 'enable', - 'event': 'enable', - 'filter': 'test_value_10', - 'filter_type': 'include', - 'forward_traffic': 'enable', - 'gtp': 'enable', - 'ha': 'enable', - 'ipsec': 'enable', - 'ldb_monitor': 'enable', - 'local_traffic': 'enable', - 'multicast_traffic': 'enable', - 'netscan_discovery': 'test_value_19,', - 'netscan_vulnerability': 'test_value_20,', - 'pattern': 'enable', - 'ppp': 'enable', - 'radius': 'enable', - 'severity': 'emergency', - 'sniffer_traffic': 'enable', - 'ssh': 'enable', - 'sslvpn_log_adm': 'enable', - 'sslvpn_log_auth': 'enable', - 'sslvpn_log_session': 'enable', - 'system': 'enable', - 'vip_ssl': 'enable', - 'voip': 'enable', - 'wan_opt': 'enable', - 'wireless_activity': 'enable' - }, - 'vdom': 'root'} - - is_error, changed, response = fortios_log_memory_filter.fortios_log_memory(input_data, fos_instance) - - expected_data = { - 'admin': 'enable', - 'anomaly': 'enable', - 'auth': 'enable', - 'cpu-memory-usage': 'enable', - 'dhcp': 'enable', - 'dns': 'enable', - 'event': 'enable', - 'filter': 'test_value_10', - 'filter-type': 'include', - 'forward-traffic': 'enable', - 'gtp': 'enable', - 'ha': 'enable', - 'ipsec': 'enable', - 'ldb-monitor': 'enable', - 'local-traffic': 'enable', - 'multicast-traffic': 'enable', - 'netscan-discovery': 'test_value_19,', - 'netscan-vulnerability': 'test_value_20,', - 'pattern': 'enable', - 'ppp': 'enable', - 'radius': 'enable', - 'severity': 'emergency', - 'sniffer-traffic': 'enable', - 'ssh': 'enable', - 'sslvpn-log-adm': 'enable', - 'sslvpn-log-auth': 'enable', - 'sslvpn-log-session': 'enable', - 'system': 'enable', - 'vip-ssl': 'enable', - 'voip': 'enable', - 'wan-opt': 'enable', - 'wireless-activity': 'enable' - } - - set_method_mock.assert_called_with('log.memory', 'filter', data=expected_data, vdom='root') - schema_method_mock.assert_not_called() - assert not is_error - assert not changed - assert response['status'] == 'error' - assert response['http_status'] == 404 - - -def test_log_memory_filter_filter_foreign_attributes(mocker): - schema_method_mock = mocker.patch('ansible.module_utils.network.fortios.fortios.FortiOSHandler.schema') - - set_method_result = {'status': 'success', 'http_method': 'POST', 'http_status': 200} - set_method_mock = mocker.patch('ansible.module_utils.network.fortios.fortios.FortiOSHandler.set', return_value=set_method_result) - - input_data = { - 'username': 'admin', - 'state': 'present', - 'log_memory_filter': { - 'random_attribute_not_valid': 'tag', - 'admin': 'enable', - 'anomaly': 'enable', - 'auth': 'enable', - 'cpu_memory_usage': 'enable', - 'dhcp': 'enable', - 'dns': 'enable', - 'event': 'enable', - 'filter': 'test_value_10', - 'filter_type': 'include', - 'forward_traffic': 'enable', - 'gtp': 'enable', - 'ha': 'enable', - 'ipsec': 'enable', - 'ldb_monitor': 'enable', - 'local_traffic': 'enable', - 'multicast_traffic': 'enable', - 'netscan_discovery': 'test_value_19,', - 'netscan_vulnerability': 'test_value_20,', - 'pattern': 'enable', - 'ppp': 'enable', - 'radius': 'enable', - 'severity': 'emergency', - 'sniffer_traffic': 'enable', - 'ssh': 'enable', - 'sslvpn_log_adm': 'enable', - 'sslvpn_log_auth': 'enable', - 'sslvpn_log_session': 'enable', - 'system': 'enable', - 'vip_ssl': 'enable', - 'voip': 'enable', - 'wan_opt': 'enable', - 'wireless_activity': 'enable' - }, - 'vdom': 'root'} - - is_error, changed, response = fortios_log_memory_filter.fortios_log_memory(input_data, fos_instance) - - expected_data = { - 'admin': 'enable', - 'anomaly': 'enable', - 'auth': 'enable', - 'cpu-memory-usage': 'enable', - 'dhcp': 'enable', - 'dns': 'enable', - 'event': 'enable', - 'filter': 'test_value_10', - 'filter-type': 'include', - 'forward-traffic': 'enable', - 'gtp': 'enable', - 'ha': 'enable', - 'ipsec': 'enable', - 'ldb-monitor': 'enable', - 'local-traffic': 'enable', - 'multicast-traffic': 'enable', - 'netscan-discovery': 'test_value_19,', - 'netscan-vulnerability': 'test_value_20,', - 'pattern': 'enable', - 'ppp': 'enable', - 'radius': 'enable', - 'severity': 'emergency', - 'sniffer-traffic': 'enable', - 'ssh': 'enable', - 'sslvpn-log-adm': 'enable', - 'sslvpn-log-auth': 'enable', - 'sslvpn-log-session': 'enable', - 'system': 'enable', - 'vip-ssl': 'enable', - 'voip': 'enable', - 'wan-opt': 'enable', - 'wireless-activity': 'enable' - } - - set_method_mock.assert_called_with('log.memory', 'filter', data=expected_data, vdom='root') - schema_method_mock.assert_not_called() - assert not is_error - assert changed - assert response['status'] == 'success' - assert response['http_status'] == 200 |