mirror of https://github.com/ansible/ansible.git
Adds bigip_firewall_rule module (#44370)
This module can be used to manage rules in either a firewall policy or a firewall rule list in AFM, on BIGIP.pull/44373/head
parent
d8ea154fb8
commit
b54f6cd132
File diff suppressed because it is too large
Load Diff
@ -0,0 +1,153 @@
|
|||||||
|
# -*- coding: utf-8 -*-
|
||||||
|
#
|
||||||
|
# Copyright: (c) 2018, F5 Networks Inc.
|
||||||
|
# GNU General Public License v3.0 (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
|
||||||
|
|
||||||
|
from __future__ import (absolute_import, division, print_function)
|
||||||
|
__metaclass__ = type
|
||||||
|
|
||||||
|
import os
|
||||||
|
import json
|
||||||
|
import pytest
|
||||||
|
import sys
|
||||||
|
|
||||||
|
from nose.plugins.skip import SkipTest
|
||||||
|
if sys.version_info < (2, 7):
|
||||||
|
raise SkipTest("F5 Ansible modules require Python >= 2.7")
|
||||||
|
|
||||||
|
from ansible.compat.tests import unittest
|
||||||
|
from ansible.compat.tests.mock import Mock
|
||||||
|
from ansible.compat.tests.mock import patch
|
||||||
|
from ansible.module_utils.basic import AnsibleModule
|
||||||
|
|
||||||
|
try:
|
||||||
|
from library.modules.bigip_firewall_rule import ApiParameters
|
||||||
|
from library.modules.bigip_firewall_rule import ModuleParameters
|
||||||
|
from library.modules.bigip_firewall_rule import ModuleManager
|
||||||
|
from library.modules.bigip_firewall_rule import ArgumentSpec
|
||||||
|
from library.module_utils.network.f5.common import F5ModuleError
|
||||||
|
from library.module_utils.network.f5.common import iControlUnexpectedHTTPError
|
||||||
|
from test.unit.modules.utils import set_module_args
|
||||||
|
except ImportError:
|
||||||
|
try:
|
||||||
|
from ansible.modules.network.f5.bigip_firewall_rule import ApiParameters
|
||||||
|
from ansible.modules.network.f5.bigip_firewall_rule import ModuleParameters
|
||||||
|
from ansible.modules.network.f5.bigip_firewall_rule import ModuleManager
|
||||||
|
from ansible.modules.network.f5.bigip_firewall_rule import ArgumentSpec
|
||||||
|
from ansible.module_utils.network.f5.common import F5ModuleError
|
||||||
|
from ansible.module_utils.network.f5.common import iControlUnexpectedHTTPError
|
||||||
|
from units.modules.utils import set_module_args
|
||||||
|
except ImportError:
|
||||||
|
raise SkipTest("F5 Ansible modules require the f5-sdk Python library")
|
||||||
|
|
||||||
|
fixture_path = os.path.join(os.path.dirname(__file__), 'fixtures')
|
||||||
|
fixture_data = {}
|
||||||
|
|
||||||
|
|
||||||
|
def load_fixture(name):
|
||||||
|
path = os.path.join(fixture_path, name)
|
||||||
|
|
||||||
|
if path in fixture_data:
|
||||||
|
return fixture_data[path]
|
||||||
|
|
||||||
|
with open(path) as f:
|
||||||
|
data = f.read()
|
||||||
|
|
||||||
|
try:
|
||||||
|
data = json.loads(data)
|
||||||
|
except Exception:
|
||||||
|
pass
|
||||||
|
|
||||||
|
fixture_data[path] = data
|
||||||
|
return data
|
||||||
|
|
||||||
|
|
||||||
|
class TestParameters(unittest.TestCase):
|
||||||
|
def test_module_parameters(self):
|
||||||
|
args = dict(
|
||||||
|
name='foo',
|
||||||
|
parent_policy='policy1',
|
||||||
|
protocol='tcp',
|
||||||
|
source=[
|
||||||
|
dict(address='1.2.3.4'),
|
||||||
|
dict(address='::1'),
|
||||||
|
dict(address_list='foo-list1'),
|
||||||
|
dict(address_range='1.1.1.1-2.2.2.2.'),
|
||||||
|
dict(vlan='vlan1'),
|
||||||
|
dict(country='US'),
|
||||||
|
dict(port='22'),
|
||||||
|
dict(port_list='port-list1'),
|
||||||
|
dict(port_range='80-443'),
|
||||||
|
],
|
||||||
|
destination=[
|
||||||
|
dict(address='1.2.3.4'),
|
||||||
|
dict(address='::1'),
|
||||||
|
dict(address_list='foo-list1'),
|
||||||
|
dict(address_range='1.1.1.1-2.2.2.2.'),
|
||||||
|
dict(country='US'),
|
||||||
|
dict(port='22'),
|
||||||
|
dict(port_list='port-list1'),
|
||||||
|
dict(port_range='80-443'),
|
||||||
|
],
|
||||||
|
irule='irule1',
|
||||||
|
action='accept',
|
||||||
|
logging=True,
|
||||||
|
)
|
||||||
|
|
||||||
|
p = ModuleParameters(params=args)
|
||||||
|
assert p.irule == '/Common/irule1'
|
||||||
|
assert p.action == 'accept'
|
||||||
|
assert p.logging is True
|
||||||
|
|
||||||
|
|
||||||
|
@patch('ansible.module_utils.f5_utils.AnsibleF5Client._get_mgmt_root',
|
||||||
|
return_value=True)
|
||||||
|
class TestManager(unittest.TestCase):
|
||||||
|
|
||||||
|
def setUp(self):
|
||||||
|
self.spec = ArgumentSpec()
|
||||||
|
|
||||||
|
def test_create_monitor(self, *args):
|
||||||
|
set_module_args(dict(
|
||||||
|
name='foo',
|
||||||
|
parent_policy='policy1',
|
||||||
|
protocol='tcp',
|
||||||
|
source=[
|
||||||
|
dict(address='1.2.3.4'),
|
||||||
|
dict(address='::1'),
|
||||||
|
dict(address_list='foo-list1'),
|
||||||
|
dict(address_range='1.1.1.1-2.2.2.2.'),
|
||||||
|
dict(vlan='vlan1'),
|
||||||
|
dict(country='US'),
|
||||||
|
dict(port='22'),
|
||||||
|
dict(port_list='port-list1'),
|
||||||
|
dict(port_range='80-443'),
|
||||||
|
],
|
||||||
|
destination=[
|
||||||
|
dict(address='1.2.3.4'),
|
||||||
|
dict(address='::1'),
|
||||||
|
dict(address_list='foo-list1'),
|
||||||
|
dict(address_range='1.1.1.1-2.2.2.2.'),
|
||||||
|
dict(country='US'),
|
||||||
|
dict(port='22'),
|
||||||
|
dict(port_list='port-list1'),
|
||||||
|
dict(port_range='80-443'),
|
||||||
|
],
|
||||||
|
irule='irule1',
|
||||||
|
action='accept',
|
||||||
|
logging='yes',
|
||||||
|
))
|
||||||
|
|
||||||
|
module = AnsibleModule(
|
||||||
|
argument_spec=self.spec.argument_spec,
|
||||||
|
supports_check_mode=self.spec.supports_check_mode
|
||||||
|
)
|
||||||
|
|
||||||
|
# Override methods in the specific type of manager
|
||||||
|
mm = ModuleManager(module=module)
|
||||||
|
mm.exists = Mock(side_effect=[False, True])
|
||||||
|
mm.create_on_device = Mock(return_value=True)
|
||||||
|
|
||||||
|
results = mm.exec_module()
|
||||||
|
|
||||||
|
assert results['changed'] is True
|
Loading…
Reference in New Issue