summaryrefslogtreecommitdiff
path: root/tests/unit/modules
diff options
context:
space:
mode:
authorGomathiselviS <gomathiselvi@gmail.com>2021-06-14 12:42:05 -0400
committerGitHub <noreply@github.com>2021-06-14 16:42:05 +0000
commiteb46eb529a8bcfaeb5a7e736550d7cfb612b02d7 (patch)
tree0f5c70f399b184594d87090d5fba637cb8a5ddec /tests/unit/modules
parent4b7f5786c0260d43dcdde93e68695a829ab59adb (diff)
downloadvyos.vyos-eb46eb529a8bcfaeb5a7e736550d7cfb612b02d7.tar.gz
vyos.vyos-eb46eb529a8bcfaeb5a7e736550d7cfb612b02d7.zip
Fix keyerror in firewall_rules when state=overridden (#172)
Fix keyerror in firewall_rules when state=overridden Reviewed-by: https://github.com/apps/ansible-zuul
Diffstat (limited to 'tests/unit/modules')
-rw-r--r--tests/unit/modules/network/vyos/.test_vyos_firewall_rules.py.swpbin0 -> 69632 bytes
-rw-r--r--tests/unit/modules/network/vyos/test_vyos_firewall_rules.py10
2 files changed, 10 insertions, 0 deletions
diff --git a/tests/unit/modules/network/vyos/.test_vyos_firewall_rules.py.swp b/tests/unit/modules/network/vyos/.test_vyos_firewall_rules.py.swp
new file mode 100644
index 0000000..b028e81
--- /dev/null
+++ b/tests/unit/modules/network/vyos/.test_vyos_firewall_rules.py.swp
Binary files differ
diff --git a/tests/unit/modules/network/vyos/test_vyos_firewall_rules.py b/tests/unit/modules/network/vyos/test_vyos_firewall_rules.py
index 7219443..682b2da 100644
--- a/tests/unit/modules/network/vyos/test_vyos_firewall_rules.py
+++ b/tests/unit/modules/network/vyos/test_vyos_firewall_rules.py
@@ -963,6 +963,13 @@ class TestVyosFirewallRulesModule(TestVyosModule):
protocol="tcp",
fragment="match-frag",
disabled=False,
+ source=dict(
+ group=dict(
+ address_group="IN-ADDR-GROUP",
+ network_group="IN-NET-GROUP",
+ port_group="IN-PORT-GROUP",
+ )
+ ),
),
dict(
number="2",
@@ -1005,6 +1012,9 @@ class TestVyosFirewallRulesModule(TestVyosModule):
"set firewall name V4-IN rule 1 protocol 'tcp'",
"set firewall name V4-IN rule 1 description 'Rule 1 is configured by Ansible RM'",
"set firewall name V4-IN rule 1 fragment 'match-frag'",
+ "set firewall name V4-IN rule 1 source group address-group IN-ADDR-GROUP",
+ "set firewall name V4-IN rule 1 source group network-group IN-NET-GROUP",
+ "set firewall name V4-IN rule 1 source group port-group IN-PORT-GROUP",
"set firewall name V4-IN rule 1",
"set firewall name V4-IN rule 1 action 'reject'",
"set firewall name V4-IN rule 1 ipsec 'match-ipsec'",