From 665257ef1873507dfad9dab1a367604d4ea20e69 Mon Sep 17 00:00:00 2001 From: Dag Wieers Date: Wed, 16 Aug 2017 12:42:33 +0200 Subject: [PATCH] aci_tenant: Integration tests (#28255) --- test/integration/targets/aci_tenant/aliases | 1 + .../targets/aci_tenant/tasks/main.yml | 196 ++++++++++++++++++ 2 files changed, 197 insertions(+) create mode 100644 test/integration/targets/aci_tenant/aliases create mode 100644 test/integration/targets/aci_tenant/tasks/main.yml diff --git a/test/integration/targets/aci_tenant/aliases b/test/integration/targets/aci_tenant/aliases new file mode 100644 index 00000000000..3c1de7e647f --- /dev/null +++ b/test/integration/targets/aci_tenant/aliases @@ -0,0 +1 @@ +# No ACI Simulator yet, so not enabled diff --git a/test/integration/targets/aci_tenant/tasks/main.yml b/test/integration/targets/aci_tenant/tasks/main.yml new file mode 100644 index 00000000000..446645cd370 --- /dev/null +++ b/test/integration/targets/aci_tenant/tasks/main.yml @@ -0,0 +1,196 @@ +# Test code for the ACI modules +# Copyright 2017, Dag Wieers + +# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) + +- name: Test that we have an ACI APIC host, ACI username and ACI password + fail: + msg: 'Please define the following variables: aci_hostname, aci_username and aci_password.' + when: aci_hostname is not defined or aci_username is not defined or aci_password is not defined + +# CLEAN ENVIRONMENT +- name: Remove tenant + aci_tenant: &tenant_absent + hostname: '{{ aci_hostname }}' + username: '{{ aci_username }}' + password: '{{ aci_password }}' + validate_certs: no + tenant: ansible_test + state: absent + +# ADD TENANT +- name: Add tenant (check_mode) + aci_tenant: &tenant_present + hostname: '{{ aci_hostname }}' + username: '{{ aci_username }}' + password: '{{ aci_password }}' + validate_certs: no + tenant: ansible_test + state: present + check_mode: yes + register: cm_add_tenant + +- name: Add tenant again (check_mode) + aci_tenant: *tenant_present + check_mode: yes + register: cm_add_tenant_again + +- name: Add tenant (normal mode) + aci_tenant: *tenant_present + register: nm_add_tenant + +- name: Add tenant again (normal mode) + aci_tenant: *tenant_present + register: nm_add_tenant_again + +- name: Verify add_tenant + assert: + that: + - cm_add_tenant.changed == true + - cm_add_tenant_again.changed == true + - nm_add_tenant.changed == true + - nm_add_tenant_again.changed == false + +# CHANGE TENANT +- name: Change description of tenant (check_mode) + aci_tenant: + <<: *tenant_present + description: Ansible test tenant + check_mode: yes + register: cm_add_tenant_descr + +- name: Change description of tenant again (check_mode) + aci_tenant: + <<: *tenant_present + description: Ansible test tenant + check_mode: yes + register: cm_add_tenant_descr_again + +- name: Change description of tenant (normal mode) + aci_tenant: + <<: *tenant_present + description: Ansible test tenant + register: nm_add_tenant_descr + +- name: Change description of tenant again (normal mode) + aci_tenant: + <<: *tenant_present + description: Ansible test tenant + register: nm_add_tenant_descr_again + +- name: Verify add_tenant_descr + assert: + that: + - cm_add_tenant_descr.changed == true + - cm_add_tenant_descr_again.changed == true + - nm_add_tenant_descr.changed == true + - nm_add_tenant_descr_again.changed == false + +# ADD TENANT AGAIN +- name: Add tenant again with no description (check_mode) + aci_tenant: *tenant_present + check_mode: yes + register: cm_add_tenant_again_no_descr + +- name: Add tenant again with no description (normal mode) + aci_tenant: *tenant_present + register: nm_add_tenant_again_no_descr + +- name: Verify add_tenant_again_no_descr + assert: + that: + - cm_add_tenant_again_no_descr.changed == false + - nm_add_tenant_again_no_descr.changed == false + +# QUERY ALL TENANTS +- name: Query all tenants (check_mode) + aci_tenant: &tenant_query + hostname: '{{ aci_hostname }}' + username: '{{ aci_username }}' + password: '{{ aci_password }}' + validate_certs: no + state: query + check_mode: yes + register: cm_query_all_tenants + +- name: Query all tenants (normal mode) + aci_tenant: *tenant_query + register: nm_query_all_tenants + +- name: Verify query_all_tenants + assert: + that: + - cm_query_all_tenants.changed == false + - nm_query_all_tenants.changed == false + # NOTE: Order of tenants is not stable between calls + #- cm_query_all_tenants == nm_query_all_tenants + +# QUERY A TENANT +- name: Query our tenant + aci_tenant: + <<: *tenant_query + tenant: ansible_test + check_mode: yes + register: cm_query_tenant + +- name: Query our tenant + aci_tenant: + <<: *tenant_query + tenant: ansible_test + register: nm_query_tenant + +- name: Verify query_tenant + assert: + that: + - cm_query_tenant.changed == false + - nm_query_tenant.changed == false + - cm_query_tenant == nm_query_tenant + +# REMOVE TENANT +- name: Remove tenant (check_mode) + aci_tenant: *tenant_absent + check_mode: yes + register: cm_remove_tenant + +- name: Remove tenant again (check_mode) + aci_tenant: *tenant_absent + check_mode: yes + register: cm_remove_tenant_again + +- name: Remove tenant (normal mode) + aci_tenant: *tenant_absent + register: nm_remove_tenant + +- name: Remove tenant again (normal mode) + aci_tenant: *tenant_absent + register: nm_remove_tenant_again + +- name: Verify remove_tenant + assert: + that: + - cm_remove_tenant.changed == true + - cm_remove_tenant_again.changed == true + - nm_remove_tenant.changed == true + - nm_remove_tenant_again.changed == false + +# QUERY NON-EXISTING TENANT +# FIXME: Should this fail or return empty values ? +- name: Query non-existing tenant (check_mode) + aci_tenant: + <<: *tenant_query + tenant: ansible_test + check_mode: yes + register: cm_query_non_tenant + +- name: Query non-existing tenant (normal mode) + aci_tenant: + <<: *tenant_query + tenant: ansible_test + register: nm_query_non_tenant + +- name: Verify query_non_tenant + assert: + that: + - cm_query_non_tenant.changed == false + - nm_query_non_tenant.changed == false + - cm_query_non_tenant == nm_query_non_tenant