- name : Test that retrieving a url works
set_fact :
web_data : "{{ lookup('url', 'https://' ~ httpbin_host ~ '/get?one') }}"
- name : Assert that the url was retrieved
assert :
that :
- "'one' in web_data.args"
- name : Test that retrieving a url with invalid cert fails
set_fact :
web_data : "{{ lookup('url', 'https://' ~ badssl_host ~ '/') }}"
ignore_errors : True
register : url_invalid_cert
- assert :
that :
- "url_invalid_cert.failed"
- "'Error validating the server' in url_invalid_cert.msg or 'Hostname mismatch' in url_invalid_cert.msg or ( url_invalid_cert.msg is search('hostname .* doesn.t match .*'))"
- name : Test that retrieving a url with invalid cert with validate_certs=False works
set_fact :
web_data : "{{ lookup('url', 'https://' ~ badssl_host ~ '/', validate_certs=False) }}"
register : url_no_validate_cert
- assert :
that :
- badssl_host_substring in web_data
- name : Test ciphers
import_tasks : ciphers.yml
when : false # skipped until we have a way to disable TLS 1.3 on the client or server, since cipher suite selection won't break TLS 1.3
- name : Test use_netrc=False
import_tasks : use_netrc.yml
- vars :
ansible_lookup_url_agent : ansible-test-lookup-url-agent
block :
- name : Test user agent
set_fact :
web_data : "{{ lookup('url', 'https://' ~ httpbin_host ~ '/user-agent') }}"
- name : Assert that user agent is set
assert :
that :
- ansible_lookup_url_agent in web_data['user-agent']
- vars :
ansible_lookup_url_force_basic_auth : yes
block :
- name : Test force basic auth
set_fact :
web_data : "{{ lookup('url', 'https://' ~ httpbin_host ~ '/headers', username='abc') }}"
- name : Assert that Authorization header is set
assert :
that :
- "'Authorization' in web_data.headers"