mirror of https://github.com/ansible/ansible.git
You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
124 lines
4.9 KiB
Python
124 lines
4.9 KiB
Python
# coding: utf-8
|
|
# This file is part of Ansible
|
|
#
|
|
# Ansible is free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# Ansible is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
# Make coding more python3-ish
|
|
from __future__ import (absolute_import, division, print_function)
|
|
__metaclass__ = type
|
|
|
|
import io
|
|
import yaml
|
|
|
|
from jinja2.exceptions import UndefinedError
|
|
|
|
from units.compat import unittest
|
|
from ansible.parsing import vault
|
|
from ansible.parsing.yaml import dumper, objects
|
|
from ansible.parsing.yaml.loader import AnsibleLoader
|
|
from ansible.module_utils.six import PY2
|
|
from ansible.template import AnsibleUndefined
|
|
from ansible.utils.unsafe_proxy import AnsibleUnsafeText, AnsibleUnsafeBytes
|
|
|
|
from units.mock.yaml_helper import YamlTestUtils
|
|
from units.mock.vault_helper import TextVaultSecret
|
|
from ansible.vars.manager import VarsWithSources
|
|
|
|
|
|
class TestAnsibleDumper(unittest.TestCase, YamlTestUtils):
|
|
def setUp(self):
|
|
self.vault_password = "hunter42"
|
|
vault_secret = TextVaultSecret(self.vault_password)
|
|
self.vault_secrets = [('vault_secret', vault_secret)]
|
|
self.good_vault = vault.VaultLib(self.vault_secrets)
|
|
self.vault = self.good_vault
|
|
self.stream = self._build_stream()
|
|
self.dumper = dumper.AnsibleDumper
|
|
|
|
def _build_stream(self, yaml_text=None):
|
|
text = yaml_text or u''
|
|
stream = io.StringIO(text)
|
|
return stream
|
|
|
|
def _loader(self, stream):
|
|
return AnsibleLoader(stream, vault_secrets=self.vault.secrets)
|
|
|
|
def test_ansible_vault_encrypted_unicode(self):
|
|
plaintext = 'This is a string we are going to encrypt.'
|
|
avu = objects.AnsibleVaultEncryptedUnicode.from_plaintext(plaintext, vault=self.vault,
|
|
secret=vault.match_secrets(self.vault_secrets, ['vault_secret'])[0][1])
|
|
|
|
yaml_out = self._dump_string(avu, dumper=self.dumper)
|
|
stream = self._build_stream(yaml_out)
|
|
loader = self._loader(stream)
|
|
|
|
data_from_yaml = loader.get_single_data()
|
|
|
|
self.assertEqual(plaintext, data_from_yaml.data)
|
|
|
|
def test_bytes(self):
|
|
b_text = u'tréma'.encode('utf-8')
|
|
unsafe_object = AnsibleUnsafeBytes(b_text)
|
|
yaml_out = self._dump_string(unsafe_object, dumper=self.dumper)
|
|
|
|
stream = self._build_stream(yaml_out)
|
|
loader = self._loader(stream)
|
|
|
|
data_from_yaml = loader.get_single_data()
|
|
|
|
result = b_text
|
|
if PY2:
|
|
# https://pyyaml.org/wiki/PyYAMLDocumentation#string-conversion-python-2-only
|
|
# pyyaml on Python 2 can return either unicode or bytes when given byte strings.
|
|
# We normalize that to always return unicode on Python2 as that's right most of the
|
|
# time. However, this means byte strings can round trip through yaml on Python3 but
|
|
# not on Python2. To make this code work the same on Python2 and Python3 (we want
|
|
# the Python3 behaviour) we need to change the methods in Ansible to:
|
|
# (1) Let byte strings pass through yaml without being converted on Python2
|
|
# (2) Convert byte strings to text strings before being given to pyyaml (Without this,
|
|
# strings would end up as byte strings most of the time which would mostly be wrong)
|
|
# In practice, we mostly read bytes in from files and then pass that to pyyaml, for which
|
|
# the present behavior is correct.
|
|
# This is a workaround for the current behavior.
|
|
result = u'tr\xe9ma'
|
|
|
|
self.assertEqual(result, data_from_yaml)
|
|
|
|
def test_unicode(self):
|
|
u_text = u'nöel'
|
|
unsafe_object = AnsibleUnsafeText(u_text)
|
|
yaml_out = self._dump_string(unsafe_object, dumper=self.dumper)
|
|
|
|
stream = self._build_stream(yaml_out)
|
|
loader = self._loader(stream)
|
|
|
|
data_from_yaml = loader.get_single_data()
|
|
|
|
self.assertEqual(u_text, data_from_yaml)
|
|
|
|
def test_vars_with_sources(self):
|
|
try:
|
|
self._dump_string(VarsWithSources(), dumper=self.dumper)
|
|
except yaml.representer.RepresenterError:
|
|
self.fail("Dump VarsWithSources raised RepresenterError unexpectedly!")
|
|
|
|
def test_undefined(self):
|
|
undefined_object = AnsibleUndefined()
|
|
try:
|
|
yaml_out = self._dump_string(undefined_object, dumper=self.dumper)
|
|
except UndefinedError:
|
|
yaml_out = None
|
|
|
|
self.assertIsNone(yaml_out)
|