summaryrefslogtreecommitdiff
path: root/tests
diff options
context:
space:
mode:
Diffstat (limited to 'tests')
-rw-r--r--tests/unit/modules/network/vyos/fixtures/vyos_firewall_global_config.cfg2
-rw-r--r--tests/unit/modules/network/vyos/fixtures/vyos_firewall_global_config_v14.cfg2
-rw-r--r--tests/unit/modules/network/vyos/test_vyos_firewall_global.py19
-rw-r--r--tests/unit/modules/network/vyos/test_vyos_firewall_global14.py18
4 files changed, 27 insertions, 14 deletions
diff --git a/tests/unit/modules/network/vyos/fixtures/vyos_firewall_global_config.cfg b/tests/unit/modules/network/vyos/fixtures/vyos_firewall_global_config.cfg
index 16b7a14..f54a03d 100644
--- a/tests/unit/modules/network/vyos/fixtures/vyos_firewall_global_config.cfg
+++ b/tests/unit/modules/network/vyos/fixtures/vyos_firewall_global_config.cfg
@@ -11,3 +11,5 @@ set firewall group ipv6-network-group UNIQUE-LOCAL-v6 network fc00::/7
set firewall group ipv6-network-group UNIQUE-LOCAL-v6 description 'This group encompasses the ULA address space in IPv6'
set firewall group port-group SSH port 22
set firewall group port-group SSH description 'This group has the ssh ports'
+set firewall ipv6-src-route 'enable'
+set firewall send-redirects 'enable'
diff --git a/tests/unit/modules/network/vyos/fixtures/vyos_firewall_global_config_v14.cfg b/tests/unit/modules/network/vyos/fixtures/vyos_firewall_global_config_v14.cfg
index 7b281de..0a1247d 100644
--- a/tests/unit/modules/network/vyos/fixtures/vyos_firewall_global_config_v14.cfg
+++ b/tests/unit/modules/network/vyos/fixtures/vyos_firewall_global_config_v14.cfg
@@ -14,3 +14,5 @@ set firewall group port-group SSH description 'This group has the ssh ports'
set firewall global-options all-ping enable
set firewall global-options state-policy related action 'accept'
set firewall global-options state-policy related log-level 'alert'
+set firewall global-options ipv6-src-route 'enable'
+set firewall global-options send-redirects 'enable'
diff --git a/tests/unit/modules/network/vyos/test_vyos_firewall_global.py b/tests/unit/modules/network/vyos/test_vyos_firewall_global.py
index 0cc611c..752bb0d 100644
--- a/tests/unit/modules/network/vyos/test_vyos_firewall_global.py
+++ b/tests/unit/modules/network/vyos/test_vyos_firewall_global.py
@@ -29,11 +29,11 @@ from ansible_collections.vyos.vyos.tests.unit.modules.utils import set_module_ar
from .vyos_module import TestVyosModule, load_fixture
-class TestVyosFirewallRulesModule(TestVyosModule):
+class TestVyosFirewallGlobalModule(TestVyosModule):
module = vyos_firewall_global
def setUp(self):
- super(TestVyosFirewallRulesModule, self).setUp()
+ super(TestVyosFirewallGlobalModule, self).setUp()
self.mock_get_config = patch(
"ansible_collections.ansible.netcommon.plugins.module_utils.network.common.network.Config.get_config",
)
@@ -59,15 +59,16 @@ class TestVyosFirewallRulesModule(TestVyosModule):
)
self.mock_get_os_version = patch(
- "ansible_collections.vyos.vyos.plugins.module_utils.network.vyos.config.firewall_global.firewall_global.get_os_version"
+ "ansible_collections.vyos.vyos.plugins.module_utils.network.vyos.config.firewall_global.firewall_global.get_os_version",
)
self.get_os_version = self.mock_get_os_version.start()
self.get_os_version.return_value = "1.2"
self.execute_show_command = self.mock_execute_show_command.start()
+ self.maxDiff = None
def tearDown(self):
- super(TestVyosFirewallRulesModule, self).tearDown()
+ super(TestVyosFirewallGlobalModule, self).tearDown()
self.mock_get_resource_connection_config.stop()
self.mock_get_resource_connection_facts.stop()
self.mock_get_config.stop()
@@ -101,6 +102,7 @@ class TestVyosFirewallRulesModule(TestVyosModule):
dict(connection_type="invalid", action="reject"),
],
route_redirects=[
+ dict(ip_src_route=True, afi="ipv6"),
dict(
afi="ipv4",
ip_src_route=True,
@@ -177,6 +179,7 @@ class TestVyosFirewallRulesModule(TestVyosModule):
"set firewall group port-group TELNET description 'This group has the telnet ports'",
"set firewall group port-group TELNET",
"set firewall ip-src-route 'enable'",
+ "set firewall ipv6-src-route 'enable'",
"set firewall receive-redirects 'disable'",
"set firewall send-redirects 'enable'",
"set firewall config-trap 'enable'",
@@ -369,7 +372,7 @@ class TestVyosFirewallRulesModule(TestVyosModule):
commands = ["delete firewall"]
self.execute_module(changed=True, commands=commands)
- def test_vyos_firewall_global_set_01_replaced_version(self):
+ def test_vyos_firewall_global_set_01_merged_version14(self):
self.get_os_version.return_value = "1.4"
set_module_args(
dict(
@@ -398,7 +401,7 @@ class TestVyosFirewallRulesModule(TestVyosModule):
afi="ipv6",
ip_src_route=True,
icmp_redirects=dict(receive=False),
- )
+ ),
],
group=dict(
address_group=[
@@ -443,12 +446,12 @@ class TestVyosFirewallRulesModule(TestVyosModule):
name="TELNET",
description="This group has the telnet ports",
members=[dict(port="23")],
- )
+ ),
],
),
),
state="merged",
- )
+ ),
)
commands = [
"set firewall group address-group MGMT-HOSTS address 192.0.1.1",
diff --git a/tests/unit/modules/network/vyos/test_vyos_firewall_global14.py b/tests/unit/modules/network/vyos/test_vyos_firewall_global14.py
index c594a1f..a25da29 100644
--- a/tests/unit/modules/network/vyos/test_vyos_firewall_global14.py
+++ b/tests/unit/modules/network/vyos/test_vyos_firewall_global14.py
@@ -59,7 +59,7 @@ class TestVyosFirewallRulesModule14(TestVyosModule):
)
self.mock_get_os_version = patch(
- "ansible_collections.vyos.vyos.plugins.module_utils.network.vyos.config.firewall_global.firewall_global.get_os_version"
+ "ansible_collections.vyos.vyos.plugins.module_utils.network.vyos.config.firewall_global.firewall_global.get_os_version",
)
self.get_os_version = self.mock_get_os_version.start()
self.get_os_version.return_value = "1.4"
@@ -111,7 +111,7 @@ class TestVyosFirewallRulesModule14(TestVyosModule):
afi="ipv6",
ip_src_route=True,
icmp_redirects=dict(receive=False),
- )
+ ),
],
group=dict(
address_group=[
@@ -156,12 +156,12 @@ class TestVyosFirewallRulesModule14(TestVyosModule):
name="TELNET",
description="This group has the telnet ports",
members=[dict(port="23")],
- )
+ ),
],
),
),
state="merged",
- )
+ ),
)
commands = [
"set firewall group address-group MGMT-HOSTS address 192.0.1.1",
@@ -184,9 +184,7 @@ class TestVyosFirewallRulesModule14(TestVyosModule):
"set firewall group port-group TELNET",
"set firewall global-options ip-src-route 'enable'",
"set firewall global-options receive-redirects 'disable'",
- "set firewall global-options send-redirects 'enable'",
"set firewall global-options config-trap 'enable'",
- "set firewall global-options ipv6-src-route 'enable'",
"set firewall global-options ipv6-receive-redirects 'disable'",
"set firewall global-options state-policy established action 'accept'",
"set firewall global-options state-policy established log 'enable'",
@@ -314,6 +312,8 @@ class TestVyosFirewallRulesModule14(TestVyosModule):
"delete firewall group address-group RND-HOSTS address 192.0.2.5",
"delete firewall global-options all-ping",
"delete firewall global-options state-policy related",
+ "delete firewall global-options ipv6-src-route",
+ "delete firewall global-options send-redirects",
"set firewall global-options state-policy invalid action 'reject'",
"set firewall group address-group RND-HOSTS address 192.0.2.7",
"set firewall group address-group RND-HOSTS address 192.0.2.9",
@@ -329,6 +329,10 @@ class TestVyosFirewallRulesModule14(TestVyosModule):
dict(
config=dict(
ping=dict(all=True),
+ route_redirects=[
+ dict(ip_src_route=True, afi="ipv6"),
+ dict(icmp_redirects=dict(send=True), afi="ipv4"),
+ ],
state_policy=[
dict(connection_type="related", action="accept", log_level="alert"),
],
@@ -442,6 +446,8 @@ class TestVyosFirewallRulesModule14(TestVyosModule):
"delete firewall group address-group RND-HOSTS address 192.0.2.3",
"delete firewall group address-group RND-HOSTS address 192.0.2.5",
"delete firewall global-options all-ping",
+ "delete firewall global-options ipv6-src-route",
+ "delete firewall global-options send-redirects",
"set firewall global-options state-policy related action 'drop'",
"delete firewall global-options state-policy related log-level",
"set firewall global-options state-policy invalid action 'reject'",