TEST_DIR ?= ~/ansible_testing
INVENTORY ?= inventory
VARS_FILE ?= integration_config.yml
# Create a semi-random string for use when testing cloud-based resources
i f n d e f C L O U D _ R E S O U R C E _ P R E F I X
CLOUD_RESOURCE_PREFIX := $( shell python -c "import string,random; print('ansible-testing-' + ''.join(random.choice(string.ascii_letters + string.digits) for _ in range(8)));" )
e n d i f
CREDENTIALS_FILE ?= credentials.yml
# If credentials.yml exists, use it
i f n e q ( "$(wildcard $(CREDENTIALS_FILE))" , "" )
CREDENTIALS_ARG = -e @$( CREDENTIALS_FILE)
e l s e
CREDENTIALS_ARG =
e n d i f
# http://unix.stackexchange.com/questions/30091/fix-or-alternative-for-mktemp-in-os-x
MYTMPDIR = $( shell mktemp -d 2>/dev/null || mktemp -d -t 'mytmpdir' )
VAULT_PASSWORD_FILE = vault-password
CONSUL_RUNNING := $( shell python consul_running.py)
EUID := $( shell id -u -r)
UNAME := $( shell uname | tr '[:upper:]' '[:lower:]' )
all : setup other non_destructive destructive
other : test_test_infra parsing test_var_precedence unicode test_templating_settings environment test_connection test_async_conditional includes blocks pull check_mode test_hash test_handlers test_group_by test_vault test_tags test_lookup_paths no_log test_gathering_facts test_binary_modules test_hosts_field
test_test_infra :
# ensure fail/assert work locally and can stop execution with non-zero exit code
PB_OUT = $$ ( ansible-playbook -i inventory.local test_test_infra.yml) ; APB_RC = $$ ? ; echo " $$ PB_OUT " ; echo " rc was $$ APB_RC (must be non-zero) " ; [ $$ APB_RC -ne 0 ] ; echo "ensure playbook output shows assert/fail works (True)" ; echo " $$ PB_OUT " | grep "fail works (True)" || exit 1 ; echo " $$ PB_OUT " | fgrep "assert works (True)" || exit 1
# ensure we work using all specified test args, overridden inventory, etc
PB_OUT = $$ ( ansible-playbook -i $( INVENTORY) test_test_infra.yml -e @$( VARS_FILE) $( CREDENTIALS_ARG) $( TEST_FLAGS) ) ; APB_RC = $$ ? ; echo " $$ PB_OUT " ; echo " rc was $$ APB_RC (must be non-zero) " ; [ $$ APB_RC -ne 0 ] ; echo "ensure playbook output shows assert/fail works (True)" ; echo " $$ PB_OUT " | grep "fail works (True)" || exit 1 ; echo " $$ PB_OUT " | fgrep "assert works (True)" || exit 1
setup :
rm -rf $( TEST_DIR)
mkdir -p $( TEST_DIR)
parsing : setup
ansible-playbook bad_parsing.yml -i $( INVENTORY) -e outputdir = $( TEST_DIR) -e @$( VARS_FILE) $( CREDENTIALS_ARG) -vvv $( TEST_FLAGS) --tags prepare,common,scenario5
ansible-playbook good_parsing.yml -i $( INVENTORY) -e outputdir = $( TEST_DIR) -e @$( VARS_FILE) $( CREDENTIALS_ARG) -v $( TEST_FLAGS)
includes : setup
ansible-playbook test_includes.yml -i $( INVENTORY) -e outputdir = $( TEST_DIR) -e @$( VARS_FILE) $( CREDENTIALS_ARG) $( TEST_FLAGS)
pull : pull_run pull_no_ 127 pull_limit_inventory
pull_run :
ansible-pull -d $( MYTMPDIR) -U https://github.com/ansible-test-robinro/pull-integration-test.git $( TEST_FLAGS) | grep MAGICKEYWORD; \
RC = $$ ? ; \
rm -rf $( MYTMPDIR) ; \
exit $$ RC
# test for https://github.com/ansible/ansible/issues/13681
pull_no_127 :
ansible-pull -d $( MYTMPDIR) -U https://github.com/ansible-test-robinro/pull-integration-test.git $( TEST_FLAGS) | grep -v 127\. 0\. 0\. 1; \
RC = $$ ? ; \
rm -rf $( MYTMPDIR) ; \
exit $$ RC
# test for https://github.com/ansible/ansible/issues/13688
pull_limit_inventory :
ansible-pull -d $( MYTMPDIR) -U https://github.com/ansible-test-robinro/pull-integration-test.git $( TEST_FLAGS) ; \
RC = $$ ? ; \
rm -rf $( MYTMPDIR) ; \
exit $$ RC
unicode : setup
ansible-playbook unicode.yml -i $( INVENTORY) -e outputdir = $( TEST_DIR) -e @$( VARS_FILE) -v $( TEST_FLAGS) -e 'extra_var=café'
# Test the start-at-task flag #9571
ansible-playbook unicode.yml -i $( INVENTORY) -e outputdir = $( TEST_DIR) -e @$( VARS_FILE) -v --start-at-task '*¶' -e 'start_at_task=True' $( TEST_FLAGS)
test_templating_settings : setup
ansible-playbook test_templating_settings.yml -i $( INVENTORY) -e outputdir = $( TEST_DIR) -e @$( VARS_FILE) $( CREDENTIALS_ARG) -v $( TEST_FLAGS)
test_gathering_facts : setup
ansible-playbook test_gathering_facts.yml -i $( INVENTORY) -e outputdir = $( TEST_DIR) -e @$( VARS_FILE) -v $( TEST_FLAGS)
environment : setup
ansible-playbook test_environment.yml -i $( INVENTORY) -e outputdir = $( TEST_DIR) -e @$( VARS_FILE) $( CREDENTIALS_ARG) $( TEST_FLAGS)
non_destructive : setup
ansible-playbook non_destructive.yml -i $( INVENTORY) -e outputdir = $( TEST_DIR) -e @$( VARS_FILE) $( CREDENTIALS_ARG) -v $( TEST_FLAGS)
# For our Docker images, which identify themselves with "ENV container=docker", automatically run the test_async target.
# Otherwise, skip it, since we don't know if local ssh is available. You can always run the test_async target manually.
i f e q ( $( container ) , d o c k e r )
test_async_conditional : test_async
e l s e
test_async_conditional :
e n d i f
# For our Docker images, which identify themselves with "ENV container=docker", use the test_docker inventory group.
# Otherwise use the test_default inventory group, which runs fewer tests, but should work on any system.
i f e q ( $( container ) , d o c k e r )
TEST_CONNECTION_FILTER := 'test_docker'
e l s e i f e q ( $( container ) , f r e e b s d )
TEST_CONNECTION_FILTER := 'test_freebsd'
e l s e
TEST_CONNECTION_FILTER := 'test_default'
e n d i f
# Skip connection plugins which require root when not running as root.
i f n e q ( $( EUID ) , 0 )
TEST_CONNECTION_FILTER += !chroot
e n d i f
# Connection plugin test command to repeat with each locale setting.
TEST_CONNECTION_CMD = $( 1) ansible-playbook test_connection.yml -i test_connection.inventory -l '$(TEST_CONNECTION_FILTER)' $( TEST_FLAGS)
test_connection : setup
$( call TEST_CONNECTION_CMD)
$( call TEST_CONNECTION_CMD, LC_ALL = C LANG = C)
# Connection plugin test command to repeat with each locale setting. WinRM specific version.
TEST_CONNECTION_WINRM_CMD = $( 1) ansible-playbook test_connection_winrm.yml -i inventory.winrm $( TEST_FLAGS)
test_connection_winrm : setup
$( call TEST_CONNECTION_WINRM_CMD)
$( call TEST_CONNECTION_WINRM_CMD, LC_ALL = C LANG = C)
destructive : setup
ansible-playbook destructive.yml -i $( INVENTORY) -e outputdir = $( TEST_DIR) -e @$( VARS_FILE) $( CREDENTIALS_ARG) -v $( TEST_FLAGS)
check_mode : setup
ansible-playbook check_mode.yml -i $( INVENTORY) -e outputdir = $( TEST_DIR) -e @$( VARS_FILE) $( CREDENTIALS_ARG) -v --check $( TEST_FLAGS)
test_group_by : setup
ansible-playbook test_group_by.yml -i inventory.group_by -e outputdir = $( TEST_DIR) -e @$( VARS_FILE) $( CREDENTIALS_ARG) -v $( TEST_FLAGS)
test_handlers :
ansible-playbook test_handlers.yml --tags scenario1 -i inventory.handlers -e @$( VARS_FILE) $( CREDENTIALS_ARG) -v $( TEST_FLAGS)
[ " $$ (ansible-playbook test_handlers.yml --tags scenario2 -l A -i inventory.handlers -e @ $( VARS_FILE) $( CREDENTIALS_ARG) -v $( TEST_FLAGS) | egrep -o 'RUNNING HANDLER \[test_handlers : .*?]') " = "RUNNING HANDLER [test_handlers : test handler]" ]
# Not forcing, should only run on successful host
[ " $$ (ansible-playbook test_force_handlers.yml --tags normal -i inventory.handlers -e @ $( VARS_FILE) $( CREDENTIALS_ARG) -v $( TEST_FLAGS) | egrep -o CALLED_HANDLER_. | sort | uniq | xargs) " = "CALLED_HANDLER_B" ]
# Forcing from command line
[ " $$ (ansible-playbook test_force_handlers.yml --tags normal -i inventory.handlers --force-handlers -e @ $( VARS_FILE) $( CREDENTIALS_ARG) -v $( TEST_FLAGS) | egrep -o CALLED_HANDLER_. | sort | uniq | xargs) " = "CALLED_HANDLER_A CALLED_HANDLER_B" ]
# Forcing from command line, should only run later tasks on unfailed hosts
[ " $$ (ansible-playbook test_force_handlers.yml --tags normal -i inventory.handlers --force-handlers -e @ $( VARS_FILE) $( CREDENTIALS_ARG) -v $( TEST_FLAGS) | egrep -o CALLED_TASK_. | sort | uniq | xargs) " = "CALLED_TASK_B CALLED_TASK_D CALLED_TASK_E" ]
# Forcing from command line, should call handlers even if all hosts fail
[ " $$ (ansible-playbook test_force_handlers.yml --tags normal -i inventory.handlers --force-handlers -e @ $( VARS_FILE) $( CREDENTIALS_ARG) -v -e fail_all=yes $( TEST_FLAGS) | egrep -o CALLED_HANDLER_. | sort | uniq | xargs) " = "CALLED_HANDLER_A CALLED_HANDLER_B" ]
# Forcing from ansible.cfg
[ " $$ (ANSIBLE_FORCE_HANDLERS=true ansible-playbook --tags normal test_force_handlers.yml -i inventory.handlers -e @ $( VARS_FILE) $( CREDENTIALS_ARG) -v $( TEST_FLAGS) | egrep -o CALLED_HANDLER_. | sort | uniq | xargs) " = "CALLED_HANDLER_A CALLED_HANDLER_B" ]
# Forcing true in play
[ " $$ (ansible-playbook test_force_handlers.yml --tags force_true_in_play -i inventory.handlers -e @ $( VARS_FILE) $( CREDENTIALS_ARG) -v $( TEST_FLAGS) | egrep -o CALLED_HANDLER_. | sort | uniq | xargs) " = "CALLED_HANDLER_A CALLED_HANDLER_B" ]
# Forcing false in play, which overrides command line
[ " $$ (ansible-playbook test_force_handlers.yml --force-handlers --tags force_false_in_play -i inventory.handlers -e @ $( VARS_FILE) $( CREDENTIALS_ARG) -v $( TEST_FLAGS) | egrep -o CALLED_HANDLER_. | sort | uniq | xargs) " = "CALLED_HANDLER_B" ]
test_hash :
ANSIBLE_HASH_BEHAVIOUR = replace ansible-playbook test_hash.yml -i $( INVENTORY) $( CREDENTIALS_ARG) -v $( TEST_FLAGS) -e '{"test_hash":{"extra_args":"this is an extra arg"}}'
ANSIBLE_HASH_BEHAVIOUR = merge ansible-playbook test_hash.yml -i $( INVENTORY) $( CREDENTIALS_ARG) -v $( TEST_FLAGS) -e '{"test_hash":{"extra_args":"this is an extra arg"}}'
test_var_precedence : setup
ansible-playbook test_var_precedence.yml -i $( INVENTORY) $( CREDENTIALS_ARG) $( TEST_FLAGS) -v -e outputdir = $( TEST_DIR) -e 'extra_var=extra_var' -e 'extra_var_override=extra_var_override'
test_vault : setup
ansible-playbook test_vault.yml -i $( INVENTORY) $( CREDENTIALS_ARG) -v $( TEST_FLAGS) --vault-password-file $( VAULT_PASSWORD_FILE) --list-tasks -e outputdir = $( TEST_DIR) -e @$( VARS_FILE)
ansible-playbook test_vault.yml -i $( INVENTORY) $( CREDENTIALS_ARG) -v $( TEST_FLAGS) --vault-password-file $( VAULT_PASSWORD_FILE) --list-hosts -e outputdir = $( TEST_DIR) -e @$( VARS_FILE)
ansible-playbook test_vault.yml -i $( INVENTORY) $( CREDENTIALS_ARG) -v $( TEST_FLAGS) --vault-password-file $( VAULT_PASSWORD_FILE) --syntax-check -e outputdir = $( TEST_DIR) -e @$( VARS_FILE)
ansible-playbook test_vault.yml -i $( INVENTORY) $( CREDENTIALS_ARG) -v $( TEST_FLAGS) --vault-password-file $( VAULT_PASSWORD_FILE) -e outputdir = $( TEST_DIR) -e @$( VARS_FILE)
ansible-playbook test_vault_embedded.yml -i $( INVENTORY) $( CREDENTIALS_ARG) -v $( TEST_FLAGS) --vault-password-file $( VAULT_PASSWORD_FILE) --syntax-check -e outputdir = $( TEST_DIR) -e @$( VARS_FILE)
ansible-playbook test_vault_embedded.yml -i $( INVENTORY) $( CREDENTIALS_ARG) -v $( TEST_FLAGS) --vault-password-file $( VAULT_PASSWORD_FILE) -e outputdir = $( TEST_DIR) -e @$( VARS_FILE)
# test_delegate_to does not work unless we have permission to ssh to localhost.
# Would take some more effort on our test systems to implement that -- probably
# the test node should create an ssh public-private key pair that allows the
# root user on a node to ssh to itself. Until then, this is not in make all.
# Have to run it manually. Ordinary users should be able to run this test as
# long as they have permissions to login to their local machine via ssh.
test_delegate_to : setup
ansible-playbook test_delegate_to.yml -i $( INVENTORY) -e outputdir = $( TEST_DIR) -e @$( VARS_FILE) $( CREDENTIALS_ARG) -v $( TEST_FLAGS)
# Split Windows CI targets to support parallel execution.
# Targets should be balanced to have similar run times.
ci_win : ci_win 1 ci_win 2 ci_win 3
ci_win1 : test_win_group 1
ci_win2 : test_win_group 2 test_binary_modules_winrm
ci_win3 : test_win_group 3 test_connection_winrm
test_winrm : test_win_group 1 test_win_group 2 test_win_group 3
test_win_group1 : setup
ansible-playbook test_win_group1.yml -i inventory.winrm -e outputdir = $( TEST_DIR) -e @$( VARS_FILE) $( CREDENTIALS_ARG) -v $( TEST_FLAGS)
test_win_group2 : setup
ansible-playbook test_win_group2.yml -i inventory.winrm -e outputdir = $( TEST_DIR) -e @$( VARS_FILE) $( CREDENTIALS_ARG) -v $( TEST_FLAGS)
test_win_group3 : setup
ansible-playbook test_win_group3.yml -i inventory.winrm -e outputdir = $( TEST_DIR) -e @$( VARS_FILE) $( CREDENTIALS_ARG) -v $( TEST_FLAGS)
test_tags : setup
# Run these using en_US.UTF-8 because list-tasks is a user output function and so it tailors its output to the user's locale. For unicode tags, this means replacing non-ascii chars with "?"
# Run everything by default
[ " $$ (LC_ALL=en_US.UTF-8 ansible-playbook --list-tasks test_tags.yml -i $( INVENTORY) -e outputdir= $( TEST_DIR) -e @ $( VARS_FILE) $( CREDENTIALS_ARG) -v | fgrep Task_with | xargs) " = "Task_with_tag TAGS: [tag] Task_with_always_tag TAGS: [always] Task_with_unicode_tag TAGS: [くらとみ] Task_with_list_of_tags TAGS: [café, press] Task_without_tag TAGS: []" ]
# Run the exact tags, and always
[ " $$ (LC_ALL=en_US.UTF-8 ansible-playbook --list-tasks --tags tag test_tags.yml -i $( INVENTORY) -e outputdir= $( TEST_DIR) -e @ $( VARS_FILE) $( CREDENTIALS_ARG) -v | fgrep Task_with | xargs) " = "Task_with_tag TAGS: [tag] Task_with_always_tag TAGS: [always]" ]
# Skip one tag
[ " $$ (LC_ALL=en_US.UTF-8 ansible-playbook --list-tasks --skip-tags tag test_tags.yml -i $( INVENTORY) -e outputdir= $( TEST_DIR) -e @ $( VARS_FILE) $( CREDENTIALS_ARG) -v | fgrep Task_with | xargs) " = "Task_with_always_tag TAGS: [always] Task_with_unicode_tag TAGS: [くらとみ] Task_with_list_of_tags TAGS: [café, press] Task_without_tag TAGS: []" ]
# Skip a unicode tag
[ " $$ (LC_ALL=en_US.UTF-8 ansible-playbook --list-tasks --skip-tags くらとみ test_tags.yml -i $( INVENTORY) -e outputdir= $( TEST_DIR) -e @ $( VARS_FILE) $( CREDENTIALS_ARG) -v | fgrep Task_with | xargs) " = "Task_with_tag TAGS: [tag] Task_with_always_tag TAGS: [always] Task_with_list_of_tags TAGS: [café, press] Task_without_tag TAGS: []" ]
# Run just a unicode tag and always
[ " $$ (LC_ALL=en_US.UTF-8 ansible-playbook --list-tasks --tags くらとみ test_tags.yml -i $( INVENTORY) -e outputdir= $( TEST_DIR) -e @ $( VARS_FILE) $( CREDENTIALS_ARG) -v | fgrep Task_with | xargs) " = "Task_with_always_tag TAGS: [always] Task_with_unicode_tag TAGS: [くらとみ]" ]
# Run a tag from a list of tags and always
[ " $$ (LC_ALL=en_US.UTF-8 ansible-playbook --list-tasks --tags café test_tags.yml -i $( INVENTORY) -e outputdir= $( TEST_DIR) -e @ $( VARS_FILE) $( CREDENTIALS_ARG) -v | fgrep Task_with | xargs) " = "Task_with_always_tag TAGS: [always] Task_with_list_of_tags TAGS: [café, press]" ]
blocks : setup
# remove old output log
rm -f block_test.out
# run the test and check to make sure the right number of completions was logged
ansible-playbook -vv $( TEST_FLAGS) -e outputdir = $( TEST_DIR) test_blocks/main.yml | tee block_test.out
env python -c 'import sys, re; sys.stdout.write(re.sub("\x1B\[([0-9]{1,2}(;[0-9]{1,2})?)?[m|K]", "", sys.stdin.read()))' <block_test.out >block_test_wo_colors.out
[ " $$ (grep 'TEST COMPLETE' block_test.out | wc -l | sed 's/ *//') " = " $$ (egrep '^[0-9]+ plays in' block_test_wo_colors.out | cut -f1 -d' ') " ]
# cleanup the output log again, to make sure the test is clean
rm -f block_test.out block_test_wo_colors.out
# run test with free strategy and again count the completions
ansible-playbook -vv $( TEST_FLAGS) -e outputdir = $( TEST_DIR) test_blocks/main.yml -e test_strategy = free | tee block_test.out
env python -c 'import sys, re; sys.stdout.write(re.sub("\x1B\[([0-9]{1,2}(;[0-9]{1,2})?)?[m|K]", "", sys.stdin.read()))' <block_test.out >block_test_wo_colors.out
[ " $$ (grep 'TEST COMPLETE' block_test.out | wc -l | sed 's/ *//') " = " $$ (egrep '^[0-9]+ plays in' block_test_wo_colors.out | cut -f1 -d' ') " ]
cloud : amazon rackspace azure
cloud_cleanup : amazon_cleanup rackspace_cleanup
amazon_cleanup :
python cleanup_ec2.py -y --match= " ^ $( CLOUD_RESOURCE_PREFIX) "
azure_cleanup :
python cleanup_azure.py -y --match= " ^ $( CLOUD_RESOURCE_PREFIX) "
gce_setup :
python setup_gce.py " $( CLOUD_RESOURCE_PREFIX) "
gce_cleanup :
python cleanup_gce.py -y --match= " ^ $( CLOUD_RESOURCE_PREFIX) "
rackspace_cleanup :
python cleanup_rax.py -y --match= " ^ $( CLOUD_RESOURCE_PREFIX) "
$(CREDENTIALS_FILE) :
@echo " No credentials file found. A file named ' $( CREDENTIALS_FILE) ' is needed to provide credentials needed to run cloud tests. See sample 'credentials.template' file. "
@exit 1
amazon : $( CREDENTIALS_FILE )
ANSIBLE_HOST_KEY_CHECKING = False ANSIBLE_SSH_PIPELINING = no BOTO_CONFIG = /dev/null ansible-playbook amazon.yml -i $( INVENTORY) -e @$( VARS_FILE) $( CREDENTIALS_ARG) -e " resource_prefix= $( CLOUD_RESOURCE_PREFIX) " -v $( TEST_FLAGS) ; \
RC = $$ ? ; \
CLOUD_RESOURCE_PREFIX = " $( CLOUD_RESOURCE_PREFIX) " make amazon_cleanup ; \
exit $$ RC;
azure : $( CREDENTIALS_FILE )
ANSIBLE_HOST_KEY_CHECKING = False ansible-playbook azure.yml -i $( INVENTORY) $( CREDENTIALS_ARG) -e " resource_prefix= $( CLOUD_RESOURCE_PREFIX) " -v $( TEST_FLAGS) ; \
RC = $$ ? ; \
CLOUD_RESOURCE_PREFIX = " $( CLOUD_RESOURCE_PREFIX) " make azure_cleanup ; \
exit $$ RC;
gce : $( CREDENTIALS_FILE )
CLOUD_RESOURCE_PREFIX = " $( CLOUD_RESOURCE_PREFIX) " make gce_setup ; \
ansible-playbook gce.yml -i $( INVENTORY) -e @$( VARS_FILE) $( CREDENTIALS_ARG) -e " resource_prefix= $( CLOUD_RESOURCE_PREFIX) " -v $( TEST_FLAGS) ; \
RC = $$ ? ; \
CLOUD_RESOURCE_PREFIX = " $( CLOUD_RESOURCE_PREFIX) " make gce_cleanup ; \
exit $$ RC;
rackspace : $( CREDENTIALS_FILE )
ansible-playbook rackspace.yml -i $( INVENTORY) -e @$( VARS_FILE) $( CREDENTIALS_ARG) -e " resource_prefix= $( CLOUD_RESOURCE_PREFIX) " -v $( TEST_FLAGS) ; \
RC = $$ ? ; \
CLOUD_RESOURCE_PREFIX = " $( CLOUD_RESOURCE_PREFIX) " make rackspace_cleanup ; \
exit $$ RC;
cloudstack :
ansible-playbook cloudstack.yml -i $( INVENTORY) -e @$( VARS_FILE) -e " resource_prefix= $( CLOUD_RESOURCE_PREFIX) " -v $( TEST_FLAGS) ; \
RC = $$ ? ; \
exit $$ RC;
exoscale :
ansible-playbook exoscale.yml -i $( INVENTORY) -e @$( VARS_FILE) -v $( TEST_FLAGS) ; \
RC = $$ ? ; \
exit $$ RC;
jenkins :
ansible-playbook jenkins.yml -i $( INVENTORY) -e @$( VARS_FILE) -v $( TEST_FLAGS) ; \
RC = $$ ? ; \
exit $$ RC;
cloudflare : $( CREDENTIALS_FILE )
ansible-playbook cloudflare.yml -i $( INVENTORY) -e @$( VARS_FILE) -e @$( CREDENTIALS_FILE) -e " resource_prefix= $( CLOUD_RESOURCE_PREFIX) " -v $( TEST_FLAGS) ; \
RC = $$ ? ; \
exit $$ RC;
$(CONSUL_RUNNING) :
consul :
i f e q ( $( CONSUL_RUNNING ) , T r u e )
ansible-playbook -i $( INVENTORY) consul.yml ; \
ansible-playbook -i ../../contrib/inventory/consul_io.py consul_inventory.yml
e l s e
@echo "Consul agent is not running locally. To run a cluster locally see http://github.com/sgargan/consul-vagrant"
e n d i f
test_galaxy : test_galaxy_spec test_galaxy_yaml test_galaxy_git
test_galaxy_spec : setup
mytmpdir = $( MYTMPDIR) ; \
ansible-galaxy install -r galaxy_rolesfile -p $$ mytmpdir/roles -vvvv ; \
cp galaxy_playbook.yml $$ mytmpdir ; \
ansible-playbook -i $( INVENTORY) $$ mytmpdir/galaxy_playbook.yml -e outputdir = $( TEST_DIR) -v $( TEST_FLAGS) ; \
RC = $$ ? ; \
rm -rf $$ mytmpdir ; \
exit $$ RC
test_galaxy_yaml : setup
mytmpdir = $( MYTMPDIR) ; \
ansible-galaxy install -r galaxy_roles.yml -p $$ mytmpdir/roles -vvvv; \
cp galaxy_playbook.yml $$ mytmpdir ; \
ansible-playbook -i $( INVENTORY) $$ mytmpdir/galaxy_playbook.yml -e outputdir = $( TEST_DIR) -v $( TEST_FLAGS) ; \
RC = $$ ? ; \
rm -rf $$ mytmpdir ; \
exit $$ RC
test_galaxy_git : setup
mytmpdir = $( MYTMPDIR) ; \
ansible-galaxy install git+https://bitbucket.org/willthames/git-ansible-galaxy,v1.6 -p $$ mytmpdir/roles -vvvv; \
cp galaxy_playbook_git.yml $$ mytmpdir ; \
ansible-playbook -i $( INVENTORY) $$ mytmpdir/galaxy_playbook_git.yml -v $( TEST_FLAGS) ; \
RC = $$ ? ; \
rm -rf $$ mytmpdir ; \
exit $$ RC
test_lookup_paths : setup
ansible-playbook lookup_paths/play.yml -i $( INVENTORY) -e outputdir = $( TEST_DIR) -v $( TEST_FLAGS)
no_log : setup
# This test expects 7 loggable vars and 0 non loggable ones, if either mismatches it fails, run the ansible-playbook command to debug
[ " $$ (ansible-playbook no_log_local.yml -i $( INVENTORY) -e outputdir= $( TEST_DIR) $( TEST_FLAGS) -vvvvv | awk --source 'BEGIN { logme = 0; nolog = 0; } /LOG_ME/ { logme += 1;} /DO_NOT_LOG/ { nolog += 1;} END { printf " %d/%d", logme, nolog; }')" = "26/0" ]
test_binary_modules_winrm : INVENTORY = inventory .winrm
test_binary_modules_winrm : test_binary_modules
test_binary_modules :
ANSIBLE_HOST_KEY_CHECKING = false ansible-playbook download_binary_modules.yml -i $( INVENTORY) -v $( TEST_FLAGS)
ANSIBLE_HOST_KEY_CHECKING = false ansible-playbook test_binary_modules.yml -i $( INVENTORY) -v $( TEST_FLAGS)
binary_modules :
# Compiled versions of these binary modules are available at the url below.
# This avoids a dependency on go and keeps the binaries out of our git repository.
# https://ansible-ci-files.s3.amazonaws.com/test/integration/roles/test_binary_modules/
cd library; \
GOOS = linux GOARCH = amd64 go build -o helloworld_linux helloworld.go; \
GOOS = windows GOARCH = amd64 go build -o helloworld_win32nt.exe helloworld.go; \
GOOS = darwin GOARCH = amd64 go build -o helloworld_darwin helloworld.go; \
GOOS = freebsd GOARCH = amd64 go build -o helloworld_freebsd helloworld.go
clean_binary_modules :
rm library/helloworld_*
test_async :
# Verify that extra data before module JSON output during async call is ignored.
ANSIBLE_DEBUG = 0 LC_ALL = bogus ansible-playbook test_async.yml -i localhost, -e ansible_connection = ssh -v $( TEST_FLAGS)
# Verify that the warning exists by examining debug output.
ANSIBLE_DEBUG = 1 LC_ALL = bogus ansible-playbook test_async.yml -i localhost, -e ansible_connection = ssh -v $( TEST_FLAGS) \
| grep 'bash: warning: setlocale: LC_ALL: cannot change locale (bogus)' > /dev/null
test_hosts_field :
# Hosts in playbook has a list of strings consisting solely of digits
ansible-playbook test_hosts_field.yml -i inventory.hosts_field -e'target_kv=42' -e'{ "target_json_cli": "42", "target_json_cli_list": ["42", "localhost"] }' -e "@test_hosts_field.json" -t string_digit_host_in_list -v $( TEST_FLAGS) | tee test_hosts_field.out
grep 'Running on 42' test_hosts_field.out 2>& 1
test ` grep -c 'ok=1' test_hosts_field.out` = 1
# Hosts taken from kv extra_var on the CLI
ansible-playbook test_hosts_field.yml -i inventory.hosts_field -e'target_kv=42' -e'{ "target_json_cli": "42", "target_json_cli_list": ["42", "localhost"] }' -e "@test_hosts_field.json" -t hosts_from_kv_string -v $( TEST_FLAGS) | tee test_hosts_field.out
grep 'Running on 42' test_hosts_field.out 2>& 1
test ` grep -c 'ok=1' test_hosts_field.out` = 1
# hosts is taken from an all digit json extra_vars string on the CLI
ansible-playbook test_hosts_field.yml -i inventory.hosts_field -e'target_kv=42' -e'{ "target_json_cli": "42", "target_json_cli_list": ["42", "localhost"] }' -e "@test_hosts_field.json" -t hosts_from_cli_json_string -v $( TEST_FLAGS) | tee test_hosts_field.out
grep 'Running on 42' test_hosts_field.out 2>& 1
test ` grep -c 'ok=1' test_hosts_field.out` = 1
# hosts is taken from a json list in extra_vars on the CLI
ansible-playbook test_hosts_field.yml -i inventory.hosts_field -e'target_kv=42' -e'{ "target_json_cli": "42", "target_json_cli_list": ["42", "localhost"] }' -e "@test_hosts_field.json" -t hosts_from_cli_json_list -v $( TEST_FLAGS) | tee test_hosts_field.out
grep 'Running on 42' test_hosts_field.out 2>& 1
grep 'Running on localhost' test_hosts_field.out 2>& 1
test ` grep -c 'ok=1' test_hosts_field.out` = 2
# hosts is taken from a json string in an extra_vars file
ansible-playbook test_hosts_field.yml -i inventory.hosts_field -e'target_kv=42' -e'{ "target_json_cli": "42", "target_json_cli_list": ["42", "localhost"] }' -e "@test_hosts_field.json" -t hosts_from_json_file_string -v $( TEST_FLAGS) | tee test_hosts_field.out
grep 'Running on 42' test_hosts_field.out 2>& 1
test ` grep -c 'ok=1' test_hosts_field.out` = 1
# hosts is taken from a json list in an extra_vars file
ansible-playbook test_hosts_field.yml -i inventory.hosts_field -e'target_kv=42' -e'{ "target_json_cli": "42", "target_json_cli_list": ["42", "localhost"] }' -e "@test_hosts_field.json" -t hosts_from_json_file_list -v $( TEST_FLAGS) | tee test_hosts_field.out
grep 'Running on 42' test_hosts_field.out 2>& 1
grep 'Running on localhost' test_hosts_field.out 2>& 1
test ` grep -c 'ok=1' test_hosts_field.out` = 2
rm test_hosts_field.out