winrm - Remove extras lookups

Removed the extras variable lookups for the winrm connection plugin. All
valid options are explicitly documented and will no longer be looked up
with the ansible_winrm_* variable names. This should have any impact of
people using these variables as all existing options have been
explicitly defined and will continue to work as before.
pull/83754/head
Jordan Borean 4 months ago
parent 1a4644ff15
commit ac50ee90c0
No known key found for this signature in database
GPG Key ID: 2AAC89085FBBDAB5

@ -0,0 +1,2 @@
minor_changes:
- winrm - Documented all valid winrm connection plugin options instead of relying on the extras var lookup.

@ -10,15 +10,12 @@ DOCUMENTATION = """
short_description: Run tasks over Microsoft's WinRM short_description: Run tasks over Microsoft's WinRM
description: description:
- Run commands or put/fetch on a target via WinRM - Run commands or put/fetch on a target via WinRM
- This plugin allows extra arguments to be passed that are supported by the protocol but not explicitly defined here.
They should take the form of variables declared with the following pattern C(ansible_winrm_<option>).
version_added: "2.0" version_added: "2.0"
extends_documentation_fragment: extends_documentation_fragment:
- connection_pipelining - connection_pipelining
requirements: requirements:
- pywinrm (python library) - pywinrm >= 0.4.0 (python library)
options: options:
# figure out more elegant 'delegation'
remote_addr: remote_addr:
description: description:
- Address of the windows machine - Address of the windows machine
@ -76,9 +73,11 @@ DOCUMENTATION = """
description: description:
- List of winrm transports to attempt to use (ssl, plaintext, kerberos, etc) - List of winrm transports to attempt to use (ssl, plaintext, kerberos, etc)
- If None (the default) the plugin will try to automatically guess the correct list - If None (the default) the plugin will try to automatically guess the correct list
- The choices available depend on your version of pywinrm - This can be set to C(basic), C(certificate), C(ntlm), C(kerberos), C(credssp).
- It can also be set to C(plaintext) or C(ssl) but these values will use use C(basic)
auth but over a HTTP or HTTPS connection respectively.
type: list type: list
elements: string elements: str
vars: vars:
- name: ansible_winrm_transport - name: ansible_winrm_transport
kerberos_command: kerberos_command:
@ -153,14 +152,151 @@ DOCUMENTATION = """
- Corresponds to the C(operation_timeout_sec) and - Corresponds to the C(operation_timeout_sec) and
C(read_timeout_sec) args in pywinrm so avoid setting these vars C(read_timeout_sec) args in pywinrm so avoid setting these vars
with this one. with this one.
- The default value is whatever is set in the installed version of
pywinrm.
vars: vars:
- name: ansible_winrm_connection_timeout - name: ansible_winrm_connection_timeout
type: int type: int
read_timeout_sec:
description:
- The timeout in seconds to wait for a response from the server.
- See I(connection_timeout) for more information.
default: 30
type: int
vars:
- name: ansible_winrm_read_timeout_sec
operation_timeout_sec:
description:
- The timeout in seconds to wait for a single WSMan operation.
- See I(connection_timeout) for more information.
default: 20
type: int
vars:
- name: ansible_winrm_operation_timeout_sec
message_encryption:
description:
- Sets the WinRM message encryption behaviour.
- WinRM message encryption is the encryption of the WinRM messages when
using the C(ntlm), C(kerberos), or C(credssp) authentication options.
- C(always) will always use message encryption even if running over a
HTTPS connection. This will fail if using an authentication method
that does not support message encryption like C(basic) or
C(certificate).
- C(auto) will enable message encryption if running over a HTTP
listener and the authentication method is C(ntlm), C(kerberos), or
C(credssp). If running over a HTTPS listener, message encryption is
not used as HTTPS already encrypts the data. If using an auth method
that does not support message encryption, no encryption will be used
even over a HTTP listener.
- C(never) will never use message encryption even over a HTTP listener.
This is only recommended for debugging purposes as any data exchanged
will be readable by anyone on the network.
choices:
- always
- auto
- never
default: auto
type: str
vars:
- name: ansible_winrm_message_encryption
proxy:
description:
- Sets the proxy host to use for the WinRM connection.
- This can be set to the string C(None) to disable the proxy and not
lookup any proxy settings from the environment.
type: str
vars:
- name: ansible_winrm_proxy
cert_pem:
description:
- The path to the local file that is a PEM encoded certificate to use
for authentication when C(transport=certificate).
- Use I(cert_key_pem) to specify the path to the PEM encoded private
key file.
type: str
vars:
- name: ansible_winrm_cert_pem
cert_key_pem:
description:
- The path to the local file that is a PEM encoded private key to use
for authentication when C(transport=certificate).
- The PEM encoded private key must not be encrypted as the underlying
WinRM library only supports plaintext keys.
- Use I(cert_pem) to specify the path to the PEM encoded public
certificate.
type: str
vars:
- name: ansible_winrm_cert_key_pem
ca_trust_path:
description:
- The path to a PEM encoded CA file or OpenSSL CA directory bundle to
use for the root CA checks.
- If unset, the default CA trust store set by the C(requests) Python
library will be used.
type: str
vars:
- name: ansible_winrm_ca_trust_path
server_cert_validation:
description:
- The HTTPS server certificate validation behaviour.
- C(validate) will validate the server certificate against the CA trust
store and check that the CN/SAN matches the hostname requested.
- C(ignore) will ignore any CA and CN validation checks.
- Using C(ignore) is not recommended in production environments as it
disables server identity verification checks.
- The I(ca_trust_path) option can be used to specify the path to a
custom CA trust store to be used for validation.
choices:
- ignore
- validate
default: validate
type: str
vars:
- name: ansible_winrm_server_cert_validation
kerberos_delegation:
description:
- Request that Kerberos unconstrained delegation be used with
Kerberos authentication.
- Unconstrained delegation is a way to overcome the double-hop problem
with WinRM.
- If not using a Kerberos ticket managed by Ansible, the credential
stored by kinit must be a forwardable ticket for delegation to be
available.
type: bool
default: false
vars:
- name: ansible_winrm_kerberos_delegation
kerberos_hostname_override:
description:
- Sets the hostname portion of the SPN used when requesting the
Kerberos ticket.
- By default the hostname is the value of the C(remote_addr) option
but this option can be used to set a different hostname for the SPN.
type: str
vars:
- name: ansible_winrm_kerberos_hostname_override
kerberos_service:
description:
- The Kerberos service name, if unset the default service name of
C(HTTP) will be used.
type: str
vars:
# _service is used for backwards compatibility with the old _extras
# lookup.
- name: ansible_winrm_service
- name: ansible_winrm_kerberos_service
send_cbt:
description:
- Controls whether the channel binding token authentication binding is
used with C(ntlm) or C(kerberos) authentication.
- This should be C(true) but can be set to C(false) for debugging
purposes.
type: bool
default: true
vars:
- name: ansible_winrm_send_cbt
""" """
import base64 import base64
import ipaddress
import logging import logging
import os import os
import re import re
@ -236,12 +372,6 @@ try:
except ImportError as e: except ImportError as e:
pass pass
# used to try and parse the hostname and detect if IPv6 is being used
try:
import ipaddress
HAS_IPADDRESS = True
except ImportError:
HAS_IPADDRESS = False
display = Display() display = Display()
@ -253,7 +383,6 @@ class Connection(ConnectionBase):
module_implementation_preferences = ('.ps1', '.exe', '') module_implementation_preferences = ('.ps1', '.exe', '')
allow_executable = False allow_executable = False
has_pipelining = True has_pipelining = True
allow_extras = True
def __init__(self, *args: t.Any, **kwargs: t.Any) -> None: def __init__(self, *args: t.Any, **kwargs: t.Any) -> None:
@ -295,12 +424,6 @@ class Connection(ConnectionBase):
self._winrm_transport = self.get_option('transport') self._winrm_transport = self.get_option('transport')
self._winrm_connection_timeout = self.get_option('connection_timeout') self._winrm_connection_timeout = self.get_option('connection_timeout')
if hasattr(winrm, 'FEATURE_SUPPORTED_AUTHTYPES'):
self._winrm_supported_authtypes = set(winrm.FEATURE_SUPPORTED_AUTHTYPES)
else:
# for legacy versions of pywinrm, use the values we know are supported
self._winrm_supported_authtypes = set(['plaintext', 'ssl', 'kerberos'])
# calculate transport if needed # calculate transport if needed
if self._winrm_transport is None or self._winrm_transport[0] is None: if self._winrm_transport is None or self._winrm_transport[0] is None:
# TODO: figure out what we want to do with auto-transport selection in the face of NTLM/Kerb/CredSSP/Cert/Basic # TODO: figure out what we want to do with auto-transport selection in the face of NTLM/Kerb/CredSSP/Cert/Basic
@ -311,12 +434,6 @@ class Connection(ConnectionBase):
else: else:
self._winrm_transport = transport_selector self._winrm_transport = transport_selector
unsupported_transports = set(self._winrm_transport).difference(self._winrm_supported_authtypes)
if unsupported_transports:
raise AnsibleError('The installed version of WinRM does not support transport(s) %s' %
to_native(list(unsupported_transports), nonstring='simplerepr'))
# if kerberos is among our transports and there's a password specified, we're managing the tickets # if kerberos is among our transports and there's a password specified, we're managing the tickets
kinit_mode = self.get_option('kerberos_mode') kinit_mode = self.get_option('kerberos_mode')
if kinit_mode is None: if kinit_mode is None:
@ -327,23 +444,29 @@ class Connection(ConnectionBase):
elif kinit_mode == "manual": elif kinit_mode == "manual":
self._kerb_managed = False self._kerb_managed = False
# arg names we're going passing directly self._winrm_kwargs = dict(
internal_kwarg_mask = {'self', 'endpoint', 'transport', 'username', 'password', 'scheme', 'path', 'kinit_mode', 'kinit_cmd'} username=self._winrm_user,
password=self._winrm_pass,
self._winrm_kwargs = dict(username=self._winrm_user, password=self._winrm_pass) service=self.get_option('kerberos_service'),
argspec = getfullargspec(Protocol.__init__) cert_pem=self.get_option('cert_pem'),
supported_winrm_args = set(argspec.args) cert_key_pem=self.get_option('cert_key_pem'),
supported_winrm_args.update(internal_kwarg_mask) server_cert_validation=self.get_option('server_cert_validation'),
passed_winrm_args = {v.replace('ansible_winrm_', '') for v in self.get_option('_extras')} kerberos_delegation=self.get_option('kerberos_delegation'),
unsupported_args = passed_winrm_args.difference(supported_winrm_args) read_timeout_sec=self.get_option('read_timeout_sec'),
operation_timeout_sec=self.get_option('operation_timeout_sec'),
# warn for kwargs unsupported by the installed version of pywinrm kerberos_hostname_override=self.get_option('kerberos_hostname_override'),
for arg in unsupported_args: message_encryption=self.get_option('message_encryption'),
display.warning("ansible_winrm_{0} unsupported by pywinrm (is an up-to-date version of pywinrm installed?)".format(arg)) send_cbt=self.get_option('send_cbt'),
)
# pass through matching extras, excluding the list we want to treat specially
for arg in passed_winrm_args.difference(internal_kwarg_mask).intersection(supported_winrm_args): # These two options are special, the default is deprecated and be
self._winrm_kwargs[arg] = self.get_option('_extras')['ansible_winrm_%s' % arg] # removed/changed in a future pywinrm version. We keep it unset in the
# kwargs unless explicitly set.
if ca_trust_path := self.get_option('ca_trust_path'):
self._winrm_kwargs['ca_trust_path'] = ca_trust_path
if proxy := self.get_option('proxy'):
self._winrm_kwargs['proxy'] = None if proxy.lower() == 'none' else proxy
# Until pykerberos has enough goodies to implement a rudimentary kinit/klist, simplest way is to let each connection # Until pykerberos has enough goodies to implement a rudimentary kinit/klist, simplest way is to let each connection
# auth itself with a private CCACHE. # auth itself with a private CCACHE.
@ -371,7 +494,7 @@ class Connection(ConnectionBase):
kinit_args = [to_text(a) for a in shlex.split(kinit_args) if a.strip()] kinit_args = [to_text(a) for a in shlex.split(kinit_args) if a.strip()]
kinit_cmdline.extend(kinit_args) kinit_cmdline.extend(kinit_args)
elif boolean(self.get_option('_extras').get('ansible_winrm_kerberos_delegation', False)): elif boolean(self.get_option('kerberos_delegation')):
kinit_cmdline.append('-f') kinit_cmdline.append('-f')
kinit_cmdline.append(principal) kinit_cmdline.append(principal)
@ -451,14 +574,13 @@ class Connection(ConnectionBase):
(self._winrm_user, self._winrm_port, self._winrm_host), host=self._winrm_host) (self._winrm_user, self._winrm_port, self._winrm_host), host=self._winrm_host)
winrm_host = self._winrm_host winrm_host = self._winrm_host
if HAS_IPADDRESS: display.debug("checking if winrm_host %s is an IPv6 address" % winrm_host)
display.debug("checking if winrm_host %s is an IPv6 address" % winrm_host) try:
try: ipaddress.IPv6Address(winrm_host)
ipaddress.IPv6Address(winrm_host) except ipaddress.AddressValueError:
except ipaddress.AddressValueError: pass
pass else:
else: winrm_host = "[%s]" % winrm_host
winrm_host = "[%s]" % winrm_host
netloc = '%s:%d' % (winrm_host, self._winrm_port) netloc = '%s:%d' % (winrm_host, self._winrm_port)
endpoint = urlunsplit((self._winrm_scheme, netloc, self._winrm_path, '', '')) endpoint = urlunsplit((self._winrm_scheme, netloc, self._winrm_path, '', ''))

@ -25,7 +25,7 @@ class TestConnectionWinRM(object):
OPTIONS_DATA = ( OPTIONS_DATA = (
# default options # default options
( (
{'_extras': {}}, {},
{}, {},
{ {
'_kerb_managed': False, '_kerb_managed': False,
@ -44,7 +44,7 @@ class TestConnectionWinRM(object):
), ),
# http through port # http through port
( (
{'_extras': {}, 'ansible_port': 5985}, {'ansible_port': 5985},
{}, {},
{ {
'_winrm_kwargs': {'username': None, 'password': None}, '_winrm_kwargs': {'username': None, 'password': None},
@ -56,7 +56,7 @@ class TestConnectionWinRM(object):
), ),
# kerberos user with kerb present # kerberos user with kerb present
( (
{'_extras': {}, 'ansible_user': 'user@domain.com'}, {'ansible_user': 'user@domain.com'},
{}, {},
{ {
'_kerb_managed': False, '_kerb_managed': False,
@ -71,7 +71,7 @@ class TestConnectionWinRM(object):
), ),
# kerberos user without kerb present # kerberos user without kerb present
( (
{'_extras': {}, 'ansible_user': 'user@domain.com'}, {'ansible_user': 'user@domain.com'},
{}, {},
{ {
'_kerb_managed': False, '_kerb_managed': False,
@ -86,7 +86,7 @@ class TestConnectionWinRM(object):
), ),
# kerberos user with managed ticket (implicit) # kerberos user with managed ticket (implicit)
( (
{'_extras': {}, 'ansible_user': 'user@domain.com'}, {'ansible_user': 'user@domain.com'},
{'remote_password': 'pass'}, {'remote_password': 'pass'},
{ {
'_kerb_managed': True, '_kerb_managed': True,
@ -101,7 +101,7 @@ class TestConnectionWinRM(object):
), ),
# kerb with managed ticket (explicit) # kerb with managed ticket (explicit)
( (
{'_extras': {}, 'ansible_user': 'user@domain.com', {'ansible_user': 'user@domain.com',
'ansible_winrm_kinit_mode': 'managed'}, 'ansible_winrm_kinit_mode': 'managed'},
{'password': 'pass'}, {'password': 'pass'},
{ {
@ -111,7 +111,7 @@ class TestConnectionWinRM(object):
), ),
# kerb with unmanaged ticket (explicit)) # kerb with unmanaged ticket (explicit))
( (
{'_extras': {}, 'ansible_user': 'user@domain.com', {'ansible_user': 'user@domain.com',
'ansible_winrm_kinit_mode': 'manual'}, 'ansible_winrm_kinit_mode': 'manual'},
{'password': 'pass'}, {'password': 'pass'},
{ {
@ -121,7 +121,7 @@ class TestConnectionWinRM(object):
), ),
# transport override (single) # transport override (single)
( (
{'_extras': {}, 'ansible_user': 'user@domain.com', {'ansible_user': 'user@domain.com',
'ansible_winrm_transport': 'ntlm'}, 'ansible_winrm_transport': 'ntlm'},
{}, {},
{ {
@ -134,7 +134,7 @@ class TestConnectionWinRM(object):
), ),
# transport override (list) # transport override (list)
( (
{'_extras': {}, 'ansible_user': 'user@domain.com', {'ansible_user': 'user@domain.com',
'ansible_winrm_transport': ['ntlm', 'certificate']}, 'ansible_winrm_transport': ['ntlm', 'certificate']},
{}, {},
{ {
@ -147,8 +147,10 @@ class TestConnectionWinRM(object):
), ),
# winrm extras # winrm extras
( (
{'_extras': {'ansible_winrm_server_cert_validation': 'ignore', {
'ansible_winrm_service': 'WSMAN'}}, 'ansible_winrm_server_cert_validation': 'ignore',
'ansible_winrm_service': 'WSMAN',
},
{}, {},
{ {
'_winrm_kwargs': {'username': None, 'password': None, '_winrm_kwargs': {'username': None, 'password': None,
@ -159,7 +161,7 @@ class TestConnectionWinRM(object):
), ),
# direct override # direct override
( (
{'_extras': {}, 'ansible_winrm_connection_timeout': 5}, {'ansible_winrm_connection_timeout': 5},
{'connection_timeout': 10}, {'connection_timeout': 10},
{ {
'_winrm_connection_timeout': 10, '_winrm_connection_timeout': 10,
@ -168,7 +170,7 @@ class TestConnectionWinRM(object):
), ),
# password as ansible_password # password as ansible_password
( (
{'_extras': {}, 'ansible_password': 'pass'}, {'ansible_password': 'pass'},
{}, {},
{ {
'_winrm_pass': 'pass', '_winrm_pass': 'pass',
@ -178,7 +180,7 @@ class TestConnectionWinRM(object):
), ),
# password as ansible_winrm_pass # password as ansible_winrm_pass
( (
{'_extras': {}, 'ansible_winrm_pass': 'pass'}, {'ansible_winrm_pass': 'pass'},
{}, {},
{ {
'_winrm_pass': 'pass', '_winrm_pass': 'pass',
@ -189,7 +191,7 @@ class TestConnectionWinRM(object):
# password as ansible_winrm_password # password as ansible_winrm_password
( (
{'_extras': {}, 'ansible_winrm_password': 'pass'}, {'ansible_winrm_password': 'pass'},
{}, {},
{ {
'_winrm_pass': 'pass', '_winrm_pass': 'pass',
@ -213,23 +215,31 @@ class TestConnectionWinRM(object):
for attr, expected in expected.items(): for attr, expected in expected.items():
actual = getattr(conn, attr) actual = getattr(conn, attr)
assert actual == expected, \
"winrm attr '%s', actual '%s' != expected '%s'"\ if attr == '_winrm_kwargs':
% (attr, actual, expected) for k, v in expected.items():
actual_v = actual[k]
assert actual_v == v, \
f"winrm Protocol kwarg '{k}', actual '{actual_v}' != expected '{v}'"
else:
assert actual == expected, \
"winrm attr '%s', actual '%s' != expected '%s'"\
% (attr, actual, expected)
class TestWinRMKerbAuth(object): class TestWinRMKerbAuth(object):
@pytest.mark.parametrize('options, expected', [ @pytest.mark.parametrize('options, expected', [
[{"_extras": {}}, [{},
(["kinit", "user@domain"],)], (["kinit", "user@domain"],)],
[{"_extras": {}, 'ansible_winrm_kinit_cmd': 'kinit2'}, [{ 'ansible_winrm_kinit_cmd': 'kinit2'},
(["kinit2", "user@domain"],)], (["kinit2", "user@domain"],)],
[{"_extras": {'ansible_winrm_kerberos_delegation': True}}, [{'ansible_winrm_kerberos_delegation': True},
(["kinit", "-f", "user@domain"],)], (["kinit", "-f", "user@domain"],)],
[{"_extras": {}, 'ansible_winrm_kinit_args': '-f -p'}, [{ 'ansible_winrm_kinit_args': '-f -p'},
(["kinit", "-f", "-p", "user@domain"],)], (["kinit", "-f", "-p", "user@domain"],)],
[{"_extras": {}, 'ansible_winrm_kerberos_delegation': True, 'ansible_winrm_kinit_args': '-p'}, [{ 'ansible_winrm_kerberos_delegation': True, 'ansible_winrm_kinit_args': '-p'},
(["kinit", "-p", "user@domain"],)] (["kinit", "-p", "user@domain"],)]
]) ])
def test_kinit_success_subprocess(self, monkeypatch, options, expected): def test_kinit_success_subprocess(self, monkeypatch, options, expected):
@ -258,15 +268,15 @@ class TestWinRMKerbAuth(object):
assert actual_env['PATH'] == os.environ['PATH'] assert actual_env['PATH'] == os.environ['PATH']
@pytest.mark.parametrize('options, expected', [ @pytest.mark.parametrize('options, expected', [
[{"_extras": {}}, [{},
("kinit", ["user@domain"],)], ("kinit", ["user@domain"],)],
[{"_extras": {}, 'ansible_winrm_kinit_cmd': 'kinit2'}, [{ 'ansible_winrm_kinit_cmd': 'kinit2'},
("kinit2", ["user@domain"],)], ("kinit2", ["user@domain"],)],
[{"_extras": {'ansible_winrm_kerberos_delegation': True}}, [{'ansible_winrm_kerberos_delegation': True},
("kinit", ["-f", "user@domain"],)], ("kinit", ["-f", "user@domain"],)],
[{"_extras": {}, 'ansible_winrm_kinit_args': '-f -p'}, [{ 'ansible_winrm_kinit_args': '-f -p'},
("kinit", ["-f", "-p", "user@domain"],)], ("kinit", ["-f", "-p", "user@domain"],)],
[{"_extras": {}, 'ansible_winrm_kerberos_delegation': True, 'ansible_winrm_kinit_args': '-p'}, [{ 'ansible_winrm_kerberos_delegation': True, 'ansible_winrm_kinit_args': '-p'},
("kinit", ["-p", "user@domain"],)] ("kinit", ["-p", "user@domain"],)]
]) ])
def test_kinit_success_pexpect(self, monkeypatch, options, expected): def test_kinit_success_pexpect(self, monkeypatch, options, expected):
@ -308,7 +318,7 @@ class TestWinRMKerbAuth(object):
pc = PlayContext() pc = PlayContext()
new_stdin = StringIO() new_stdin = StringIO()
conn = connection_loader.get('winrm', pc, new_stdin) conn = connection_loader.get('winrm', pc, new_stdin)
options = {"_extras": {}, "ansible_winrm_kinit_cmd": "/fake/kinit"} options = { "ansible_winrm_kinit_cmd": "/fake/kinit"}
conn.set_options(var_options=options) conn.set_options(var_options=options)
conn._build_winrm_kwargs() conn._build_winrm_kwargs()
@ -331,7 +341,7 @@ class TestWinRMKerbAuth(object):
pc = PlayContext() pc = PlayContext()
new_stdin = StringIO() new_stdin = StringIO()
conn = connection_loader.get('winrm', pc, new_stdin) conn = connection_loader.get('winrm', pc, new_stdin)
options = {"_extras": {}, "ansible_winrm_kinit_cmd": "/fake/kinit"} options = { "ansible_winrm_kinit_cmd": "/fake/kinit"}
conn.set_options(var_options=options) conn.set_options(var_options=options)
conn._build_winrm_kwargs() conn._build_winrm_kwargs()
@ -356,7 +366,7 @@ class TestWinRMKerbAuth(object):
pc = PlayContext() pc = PlayContext()
new_stdin = StringIO() new_stdin = StringIO()
conn = connection_loader.get('winrm', pc, new_stdin) conn = connection_loader.get('winrm', pc, new_stdin)
conn.set_options(var_options={"_extras": {}}) conn.set_options(var_options={})
conn._build_winrm_kwargs() conn._build_winrm_kwargs()
with pytest.raises(AnsibleConnectionFailure) as err: with pytest.raises(AnsibleConnectionFailure) as err:
@ -381,7 +391,7 @@ class TestWinRMKerbAuth(object):
pc = PlayContext() pc = PlayContext()
new_stdin = StringIO() new_stdin = StringIO()
conn = connection_loader.get('winrm', pc, new_stdin) conn = connection_loader.get('winrm', pc, new_stdin)
conn.set_options(var_options={"_extras": {}}) conn.set_options(var_options={})
conn._build_winrm_kwargs() conn._build_winrm_kwargs()
with pytest.raises(AnsibleConnectionFailure) as err: with pytest.raises(AnsibleConnectionFailure) as err:
@ -404,7 +414,7 @@ class TestWinRMKerbAuth(object):
pc = PlayContext() pc = PlayContext()
new_stdin = StringIO() new_stdin = StringIO()
conn = connection_loader.get('winrm', pc, new_stdin) conn = connection_loader.get('winrm', pc, new_stdin)
conn.set_options(var_options={"_extras": {}}) conn.set_options(var_options={})
conn._build_winrm_kwargs() conn._build_winrm_kwargs()
with pytest.raises(AnsibleConnectionFailure) as err: with pytest.raises(AnsibleConnectionFailure) as err:
@ -429,7 +439,7 @@ class TestWinRMKerbAuth(object):
pc = PlayContext() pc = PlayContext()
new_stdin = StringIO() new_stdin = StringIO()
conn = connection_loader.get('winrm', pc, new_stdin) conn = connection_loader.get('winrm', pc, new_stdin)
conn.set_options(var_options={"_extras": {}}) conn.set_options(var_options={})
conn._build_winrm_kwargs() conn._build_winrm_kwargs()
with pytest.raises(AnsibleConnectionFailure) as err: with pytest.raises(AnsibleConnectionFailure) as err:
@ -483,7 +493,7 @@ class TestWinRMKerbAuth(object):
pc = PlayContext() pc = PlayContext()
new_stdin = StringIO() new_stdin = StringIO()
conn = connection_loader.get('winrm', pc, new_stdin) conn = connection_loader.get('winrm', pc, new_stdin)
conn.set_options(var_options={"ansible_winrm_transport": "basic", "_extras": {}}) conn.set_options(var_options={"ansible_winrm_transport": "basic", })
mock_proto = MagicMock() mock_proto = MagicMock()
mock_proto.open_shell.side_effect = ValueError("Custom exc Code 401") mock_proto.open_shell.side_effect = ValueError("Custom exc Code 401")
@ -499,7 +509,7 @@ class TestWinRMKerbAuth(object):
pc = PlayContext() pc = PlayContext()
new_stdin = StringIO() new_stdin = StringIO()
conn = connection_loader.get('winrm', pc, new_stdin) conn = connection_loader.get('winrm', pc, new_stdin)
conn.set_options(var_options={"ansible_winrm_transport": "basic", "_extras": {}}) conn.set_options(var_options={"ansible_winrm_transport": "basic", })
mock_proto = MagicMock() mock_proto = MagicMock()
mock_proto.open_shell.side_effect = ValueError("Custom exc") mock_proto.open_shell.side_effect = ValueError("Custom exc")
@ -515,7 +525,7 @@ class TestWinRMKerbAuth(object):
pc = PlayContext() pc = PlayContext()
new_stdin = StringIO() new_stdin = StringIO()
conn = connection_loader.get('winrm', pc, new_stdin) conn = connection_loader.get('winrm', pc, new_stdin)
conn.set_options(var_options={"ansible_winrm_transport": "basic", "_extras": {}}) conn.set_options(var_options={"ansible_winrm_transport": "basic", })
mock_proto = MagicMock() mock_proto = MagicMock()
mock_proto.open_shell.side_effect = ValueError("Custom exc Operation timed out") mock_proto.open_shell.side_effect = ValueError("Custom exc Operation timed out")
@ -531,7 +541,7 @@ class TestWinRMKerbAuth(object):
pc = PlayContext() pc = PlayContext()
new_stdin = StringIO() new_stdin = StringIO()
conn = connection_loader.get('winrm', pc, new_stdin) conn = connection_loader.get('winrm', pc, new_stdin)
conn.set_options(var_options={"_extras": {}}) conn.set_options(var_options={})
conn._build_winrm_kwargs() conn._build_winrm_kwargs()
conn._winrm_transport = [] conn._winrm_transport = []

Loading…
Cancel
Save