Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
A
ansible
Overview
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
OpenEdx
ansible
Commits
3d816402
Commit
3d816402
authored
May 18, 2015
by
Rene Moser
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
cloudstack: add tests for cs_firewall
parent
e69c7f54
Hide whitespace changes
Inline
Side-by-side
Showing
4 changed files
with
278 additions
and
0 deletions
+278
-0
test/integration/cloudstack.yml
+1
-0
test/integration/roles/test_cs_firewall/defaults/main.yml
+3
-0
test/integration/roles/test_cs_firewall/meta/main.yml
+3
-0
test/integration/roles/test_cs_firewall/tasks/main.yml
+271
-0
No files found.
test/integration/cloudstack.yml
View file @
3d816402
...
@@ -12,3 +12,4 @@
...
@@ -12,3 +12,4 @@
-
{
role
:
test_cs_instance
,
tags
:
test_cs_instance
}
-
{
role
:
test_cs_instance
,
tags
:
test_cs_instance
}
-
{
role
:
test_cs_instancegroup
,
tags
:
test_cs_instancegroup
}
-
{
role
:
test_cs_instancegroup
,
tags
:
test_cs_instancegroup
}
-
{
role
:
test_cs_account
,
tags
:
test_cs_account
}
-
{
role
:
test_cs_account
,
tags
:
test_cs_account
}
-
{
role
:
test_cs_firewall
,
tags
:
test_cs_firewall
}
test/integration/roles/test_cs_firewall/defaults/main.yml
0 → 100644
View file @
3d816402
---
cs_firewall_ip_address
:
10.100.212.5
cs_firewall_network
:
test
test/integration/roles/test_cs_firewall/meta/main.yml
0 → 100644
View file @
3d816402
---
dependencies
:
-
test_cs_common
test/integration/roles/test_cs_firewall/tasks/main.yml
0 → 100644
View file @
3d816402
---
-
name
:
setup 80
cs_firewall
:
port
:
80
ip_address
:
"
{{
cs_firewall_ip_address
}}"
state
:
absent
register
:
fw
-
name
:
verify setup
assert
:
that
:
-
fw|success
-
name
:
setup 5300
cs_firewall
:
ip_address
:
"
{{
cs_firewall_ip_address
}}"
protocol
:
udp
start_port
:
5300
end_port
:
5333
cidr
:
1.2.3.4/24
state
:
absent
register
:
fw
-
name
:
verify setup
assert
:
that
:
-
fw|success
-
name
:
setup all
cs_firewall
:
network
:
"
{{
cs_firewall_network
}}"
protocol
:
all
type
:
egress
state
:
absent
register
:
fw
-
name
:
verify setup
assert
:
that
:
-
fw|success
-
name
:
test fail if missing params
action
:
cs_firewall
register
:
fw
ignore_errors
:
true
-
name
:
verify results of fail if missing params
assert
:
that
:
-
fw|failed
-
fw.msg == "missing required argument for protocol 'tcp'
:
start_port or end_port"
-
name
:
test fail if missing params ip_address ingress
cs_firewall
:
port
:
80
register
:
fw
ignore_errors
:
true
-
name
:
verify results of fail if missing params ip_address
assert
:
that
:
-
fw|failed
-
fw.msg == "missing required argument for type ingress
:
ip_address"
-
name
:
test fail if missing params network egress
cs_firewall
:
type
:
egress
register
:
fw
ignore_errors
:
true
-
name
:
verify results of fail if missing params ip_address
assert
:
that
:
-
fw|failed
-
fw.msg == "missing required argument for type egress
:
network"
-
name
:
test present firewall rule ingress 80
cs_firewall
:
port
:
80
ip_address
:
"
{{
cs_firewall_ip_address
}}"
register
:
fw
-
name
:
verify results of present firewall rule ingress 80
assert
:
that
:
-
fw|success
-
fw|changed
-
fw.cidr == "0.0.0.0/0"
-
fw.ip_address == "{{ cs_firewall_ip_address }}"
-
fw.protocol == "tcp"
-
fw.start_port == 80
-
fw.end_port == 80
-
fw.type == "ingress"
-
name
:
test present firewall rule ingress 80 idempotence
cs_firewall
:
port
:
80
ip_address
:
"
{{
cs_firewall_ip_address
}}"
register
:
fw
-
name
:
verify results of present firewall rule ingress 80 idempotence
assert
:
that
:
-
fw|success
-
not fw|changed
-
fw.cidr == "0.0.0.0/0"
-
fw.ip_address == "{{ cs_firewall_ip_address }}"
-
fw.protocol == "tcp"
-
fw.start_port == 80
-
fw.end_port == 80
-
fw.type == "ingress"
-
name
:
test present firewall rule ingress 5300
cs_firewall
:
ip_address
:
"
{{
cs_firewall_ip_address
}}"
protocol
:
udp
start_port
:
5300
end_port
:
5333
cidr
:
1.2.3.4/24
register
:
fw
-
name
:
verify results of present firewall rule ingress 5300
assert
:
that
:
-
fw|success
-
fw|changed
-
fw.cidr == "1.2.3.4/24"
-
fw.ip_address == "{{ cs_firewall_ip_address }}"
-
fw.protocol == "udp"
-
fw.start_port == 5300
-
fw.end_port == 5333
-
fw.type == "ingress"
-
name
:
test present firewall rule ingress 5300 idempotence
cs_firewall
:
ip_address
:
"
{{
cs_firewall_ip_address
}}"
protocol
:
udp
start_port
:
5300
end_port
:
5333
cidr
:
1.2.3.4/24
register
:
fw
-
name
:
verify results of present firewall rule ingress 5300 idempotence
assert
:
that
:
-
fw|success
-
not fw|changed
-
fw.cidr == "1.2.3.4/24"
-
fw.ip_address == "{{ cs_firewall_ip_address }}"
-
fw.protocol == "udp"
-
fw.start_port == 5300
-
fw.end_port == 5333
-
fw.type == "ingress"
-
name
:
test present firewall rule egress all
cs_firewall
:
network
:
"
{{
cs_firewall_network
}}"
protocol
:
all
type
:
egress
register
:
fw
-
name
:
verify results of present firewall rule egress all
assert
:
that
:
-
fw|success
-
fw|changed
-
fw.cidr == "0.0.0.0/0"
-
fw.network == "{{ cs_firewall_network }}"
-
fw.protocol == "all"
-
fw.type == "egress"
-
name
:
test present firewall rule egress all idempotence
cs_firewall
:
network
:
"
{{
cs_firewall_network
}}"
protocol
:
all
type
:
egress
register
:
fw
-
name
:
verify results of present firewall rule egress all idempotence
assert
:
that
:
-
fw|success
-
not fw|changed
-
fw.cidr == "0.0.0.0/0"
-
fw.network == "{{ cs_firewall_network }}"
-
fw.protocol == "all"
-
fw.type == "egress"
-
name
:
test absent firewall rule ingress 80
cs_firewall
:
port
:
80
ip_address
:
"
{{
cs_firewall_ip_address
}}"
state
:
absent
register
:
fw
-
name
:
verify results of absent firewall rule ingress 80
assert
:
that
:
-
fw|success
-
fw|changed
-
fw.cidr == "0.0.0.0/0"
-
fw.ip_address == "{{ cs_firewall_ip_address }}"
-
fw.protocol == "tcp"
-
fw.start_port == 80
-
fw.end_port == 80
-
fw.type == "ingress"
-
name
:
test absent firewall rule ingress 80 idempotence
cs_firewall
:
port
:
80
ip_address
:
"
{{
cs_firewall_ip_address
}}"
state
:
absent
register
:
fw
-
name
:
verify results of absent firewall rule ingress 80 idempotence
assert
:
that
:
-
fw|success
-
not fw|changed
-
name
:
test absent firewall rule ingress 5300
cs_firewall
:
ip_address
:
"
{{
cs_firewall_ip_address
}}"
protocol
:
udp
start_port
:
5300
end_port
:
5333
cidr
:
1.2.3.4/24
state
:
absent
register
:
fw
-
name
:
verify results of absent firewall rule ingress 5300
assert
:
that
:
-
fw|success
-
fw|changed
-
fw.cidr == "1.2.3.4/24"
-
fw.ip_address == "{{ cs_firewall_ip_address }}"
-
fw.protocol == "udp"
-
fw.start_port == 5300
-
fw.end_port == 5333
-
fw.type == "ingress"
-
name
:
test absent firewall rule ingress 5300 idempotence
cs_firewall
:
ip_address
:
"
{{
cs_firewall_ip_address
}}"
protocol
:
udp
start_port
:
5300
end_port
:
5333
cidr
:
1.2.3.4/24
state
:
absent
register
:
fw
-
name
:
verify results of absent firewall rule ingress 5300 idempotence
assert
:
that
:
-
fw|success
-
not fw|changed
-
name
:
test absent firewall rule egress all
cs_firewall
:
network
:
"
{{
cs_firewall_network
}}"
protocol
:
all
type
:
egress
state
:
absent
register
:
fw
-
name
:
verify results of absent firewall rule egress all
assert
:
that
:
-
fw|success
-
fw|changed
-
fw.cidr == "0.0.0.0/0"
-
fw.network == "{{ cs_firewall_network }}"
-
fw.protocol == "all"
-
fw.type == "egress"
-
name
:
test absent firewall rule egress all idempotence
cs_firewall
:
network
:
"
{{
cs_firewall_network
}}"
protocol
:
all
type
:
egress
state
:
absent
register
:
fw
-
name
:
verify results of absent firewall rule egress all idempotence
assert
:
that
:
-
fw|success
-
not fw|changed
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment