mirror of
https://github.com/freeipa/ansible-freeipa.git
synced 2026-03-26 21:33:05 +00:00
pytest provide the means to skip tests based on patterns, but writing these patterns for ansible-freeipa might not be feasible. This PR allows the selection of playbook tests and modules that will be executed with pytest using the environmentt variables IPA_ENABLED_TESTS IPA_ENABLED_MODULES, IPA_DISABLED_TESTS or IPA_DISABLED_MODULES. When using IPA_ENABLED_MODULES, all modules will be disabled, and only the modules in the enabled list will be tested. If using the test filter, IPA_ENABLED_TESTS, all tests are disabled, unless they are in the enabled test lists. If the IPA_DISABLED_* version is used, tests and modules are enabled by default, and the list is used to disable the module or specific test. To disable a test or module in Azure CI, edit the file `tests/azure/variables` and add the desired tests or modules to the parameter variables `enabled_modules`, 'enabled_tests`, `disabled_tests` or `disable_modules`. Note that, if added to the `master` branch, this will affect the tests for every pipeline that it is include (including 'nightly'), so it should be used with care. It can be used with TEMP commits to enable only the desired tests, speeding up upstream tests.
346 lines
10 KiB
Python
346 lines
10 KiB
Python
#!/usr/bin/env python
|
|
|
|
# Authors:
|
|
# Sergio Oliveira Campos <seocam@redhat.com>
|
|
#
|
|
# Copyright (C) 2020 Red Hat
|
|
# see file 'COPYING' for use and warranty information
|
|
#
|
|
# This program is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
import os
|
|
import pytest
|
|
import subprocess
|
|
import tempfile
|
|
import testinfra
|
|
|
|
from unittest import TestCase
|
|
|
|
|
|
SCRIPT_DIR = os.path.dirname(os.path.abspath(__file__))
|
|
|
|
|
|
def is_docker_env():
|
|
if os.getenv("RUN_TESTS_IN_DOCKER", "0") == "0":
|
|
return False
|
|
return True
|
|
|
|
|
|
def get_ssh_password():
|
|
return os.getenv("IPA_SSH_PASSWORD")
|
|
|
|
|
|
def get_server_host():
|
|
return os.getenv("IPA_SERVER_HOST")
|
|
|
|
|
|
def get_disabled_test(group_name, test_name):
|
|
disabled_modules = [
|
|
disabled.strip()
|
|
for disabled in os.environ.get("IPA_DISABLED_MODULES", "").split(",")
|
|
]
|
|
disabled_tests = [
|
|
disabled.strip()
|
|
for disabled in os.environ.get("IPA_DISABLED_TESTS", "").split(",")
|
|
if disabled.strip()
|
|
]
|
|
|
|
if not any([disabled_modules, disabled_tests]):
|
|
return False
|
|
|
|
return group_name in disabled_modules or test_name in disabled_tests
|
|
|
|
|
|
def get_enabled_test(group_name, test_name):
|
|
enabled_modules = [
|
|
enabled.strip()
|
|
for enabled in os.environ.get("IPA_ENABLED_MODULES", "").split(":")
|
|
if enabled.strip()
|
|
]
|
|
enabled_tests = [
|
|
enabled.strip()
|
|
for enabled in os.environ.get("IPA_ENABLED_TESTS", "").split(":")
|
|
if enabled.strip()
|
|
]
|
|
|
|
if not any([enabled_modules, enabled_tests]):
|
|
return True
|
|
|
|
group_enabled = group_name in enabled_modules
|
|
test_enabled = test_name in enabled_tests
|
|
|
|
return group_enabled or test_enabled
|
|
|
|
|
|
def get_skip_conditions(group_name, test_name):
|
|
"""
|
|
Check tests that need to be skipped.
|
|
|
|
The return is a dict containing `condition` and `reason`. For the test
|
|
to be skipped, `condition` must be True, if it is `False`, the test is
|
|
to be skipped. Although "reason" must be always provided, it can be
|
|
`None` if `condition` is True.
|
|
"""
|
|
if not get_server_host():
|
|
return {
|
|
"condition": True,
|
|
"reason": "Environment variable IPA_SERVER_HOST must be set",
|
|
}
|
|
|
|
if not get_enabled_test(group_name, test_name):
|
|
return {"condition": True, "reason": "Test not configured to run"}
|
|
|
|
if get_disabled_test(group_name, test_name):
|
|
return {"condition": True, "reason": "Test configured to not run"}
|
|
|
|
return {"condition": False, "reason": "Test will run."}
|
|
|
|
|
|
def get_inventory_content():
|
|
"""Create the content of an inventory file for a test run."""
|
|
ipa_server_host = get_server_host()
|
|
|
|
if is_docker_env():
|
|
ipa_server_host += " ansible_connection=docker"
|
|
|
|
sshpass = get_ssh_password()
|
|
if sshpass:
|
|
ipa_server_host += " ansible_ssh_pass=%s" % sshpass
|
|
|
|
lines = [
|
|
"[ipaserver]",
|
|
ipa_server_host,
|
|
"[ipaserver:vars]",
|
|
"ipaserver_domain=test.local",
|
|
"ipaserver_realm=TEST.LOCAL",
|
|
]
|
|
return "\n".join(lines).encode("utf8")
|
|
|
|
|
|
def get_test_name_from_playbook_path(playbook):
|
|
"""
|
|
Create a test name based of a playbook path.
|
|
|
|
For example:
|
|
Input: /home/johndoe/ansible-freeipa/tests/dnszone/test_dnszone_mod.yml
|
|
Output: dnszone_test_dnszone_mod
|
|
"""
|
|
playbook_abspath = os.path.abspath(playbook)
|
|
playbook_rel_to_tests_dir = playbook_abspath.replace(SCRIPT_DIR, "")
|
|
playbook_slug = playbook_rel_to_tests_dir.strip("/").replace("/", "_")
|
|
return os.path.splitext(playbook_slug)[0]
|
|
|
|
|
|
def write_logs(result, test_name):
|
|
"""Write logs of a ansible run logs to `test/logs/`."""
|
|
log_dir = os.path.join(SCRIPT_DIR, "logs")
|
|
if not os.path.exists(log_dir):
|
|
os.makedirs(log_dir)
|
|
|
|
# Write stdout log for test
|
|
log_path = os.path.join(log_dir, "ansible_" + test_name + ".log")
|
|
with open(log_path, "w") as log_file:
|
|
log_file.write(result.stdout.decode("utf-8"))
|
|
|
|
# Write stderr log for test
|
|
error_log_path = os.path.join(log_dir, test_name + "-error.log")
|
|
with open(error_log_path, "w") as log_file:
|
|
log_file.write(result.stderr.decode("utf-8"))
|
|
|
|
|
|
def _run_playbook(playbook):
|
|
"""
|
|
Create a inventory using a temporary file and run ansible using it.
|
|
|
|
The logs of the run will be placed in `tests/logs/`.
|
|
"""
|
|
with tempfile.NamedTemporaryFile() as inventory_file:
|
|
inventory_file.write(get_inventory_content())
|
|
inventory_file.flush()
|
|
cmd = [
|
|
"ansible-playbook",
|
|
"-i",
|
|
inventory_file.name,
|
|
playbook,
|
|
]
|
|
process = subprocess.run(
|
|
cmd, cwd=SCRIPT_DIR, stdout=subprocess.PIPE, stderr=subprocess.PIPE
|
|
)
|
|
test_name = get_test_name_from_playbook_path(playbook)
|
|
write_logs(process, test_name)
|
|
|
|
return process
|
|
|
|
|
|
def run_playbook(playbook, allow_failures=False):
|
|
"""
|
|
Run an Ansible playbook and assert the return code.
|
|
|
|
Call ansible (using _run_playbook function) and assert the result of
|
|
the execution.
|
|
|
|
In case of failure the tail of the error message will be displayed
|
|
as an assertion message.
|
|
|
|
The full log of the execution will be available in the directory
|
|
`tests/logs/`.
|
|
"""
|
|
result = _run_playbook(playbook)
|
|
|
|
if allow_failures:
|
|
return result
|
|
|
|
status_code_msg = "ansible-playbook return code: {}".format(
|
|
result.returncode
|
|
)
|
|
assert_msg = "\n".join(
|
|
[
|
|
"",
|
|
"-" * 30 + " Captured stdout " + "-" * 30,
|
|
result.stdout.decode("utf8"),
|
|
"-" * 30 + " Captured stderr " + "-" * 30,
|
|
result.stderr.decode("utf8"),
|
|
"-" * 30 + " Playbook Return Code " + "-" * 30,
|
|
status_code_msg,
|
|
]
|
|
)
|
|
|
|
# Need to get the last bytes of msg otherwise Azure
|
|
# will cut it out.
|
|
assert result.returncode == 0, assert_msg[-2500:]
|
|
|
|
return result
|
|
|
|
|
|
def list_test_yaml(dir_path):
|
|
"""
|
|
List the test playbooks inside a given directory.
|
|
|
|
A test playbook is any file inside the directory which the name starts with
|
|
`test_` and the extension is `.yml`.
|
|
"""
|
|
yamls = []
|
|
for root, _dirs, files in os.walk(dir_path):
|
|
for yaml_name in files:
|
|
if yaml_name.startswith("test_") and yaml_name.endswith(".yml"):
|
|
test_yaml_path = os.path.join(root, yaml_name)
|
|
yamls.append(
|
|
{
|
|
"path": test_yaml_path,
|
|
"name": yaml_name.split(".")[0],
|
|
}
|
|
)
|
|
return yamls
|
|
|
|
|
|
def get_test_playbooks():
|
|
"""
|
|
Get playbook tests grouped by first level directory.
|
|
|
|
This function visits the first level of directories inside `tests/` and
|
|
look for ansible playbooks on them.
|
|
|
|
Returns a dict with the directories found in `tests/` as key and a
|
|
list of test playbook files inside of it.
|
|
|
|
A test playbook is any file inside the directory which the name starts with
|
|
`test_` and the extension is `.yml`.
|
|
"""
|
|
test_dirs = os.listdir(SCRIPT_DIR)
|
|
groups = {}
|
|
for test_group_dir in sorted(test_dirs):
|
|
group_dir_path = os.path.join(SCRIPT_DIR, test_group_dir)
|
|
if not os.path.isdir(group_dir_path):
|
|
continue
|
|
yamls = list_test_yaml(group_dir_path)
|
|
if yamls:
|
|
groups[test_group_dir] = yamls
|
|
return groups
|
|
|
|
|
|
def kinit_admin(host, admin="admin", password="SomeADMINpassword"):
|
|
return host.run_test("kinit " + admin + "<<< " + password)
|
|
|
|
|
|
def kdestroy(host):
|
|
return host.run_test("kdestroy -A")
|
|
|
|
|
|
class AnsibleFreeIPATestCase(TestCase):
|
|
def setUp(self):
|
|
if is_docker_env():
|
|
protocol = "docker://"
|
|
user = ""
|
|
ssh_identity_file = None
|
|
else:
|
|
protocol = "ssh://"
|
|
|
|
password = get_ssh_password() or ""
|
|
if password:
|
|
password = ":" + password
|
|
|
|
current_user = os.getenv("USER")
|
|
ansible_user = os.getenv("ANSIBLE_REMOTE_USER", current_user)
|
|
user = ansible_user + password + "@"
|
|
ssh_identity_file = os.getenv("ANSIBLE_PRIVATE_KEY_FILE", None)
|
|
|
|
host_connection_info = protocol + user + get_server_host()
|
|
self.master = testinfra.get_host(
|
|
host_connection_info, ssh_identity_file=ssh_identity_file,
|
|
)
|
|
|
|
def run_playbook(self, playbook, allow_failures=False):
|
|
return run_playbook(playbook, allow_failures)
|
|
|
|
def run_playbook_with_exp_msg(self, playbook, expected_msg):
|
|
result = self.run_playbook(playbook, allow_failures=True)
|
|
assert (
|
|
expected_msg in result.stdout.decode("utf8")
|
|
or
|
|
expected_msg in result.stderr.decode("utf8")
|
|
)
|
|
|
|
def check_details(self, expected_output, cmd, extra_cmds=None):
|
|
cmd = "ipa " + cmd
|
|
if extra_cmds:
|
|
cmd += " " + " ".join(extra_cmds)
|
|
kinit_admin(self.master)
|
|
res = self.master.run(cmd)
|
|
if res.rc != 0:
|
|
for output in expected_output:
|
|
assert output in res.stderr
|
|
else:
|
|
for output in expected_output:
|
|
assert output in res.stdout
|
|
kdestroy(self.master)
|
|
|
|
def check_notexists(self, members, cmd, extra_cmds=None):
|
|
cmd = "ipa " + cmd
|
|
if extra_cmds:
|
|
cmd += " " + " ".join(extra_cmds)
|
|
kinit_admin(self.master)
|
|
res = self.master.run(cmd)
|
|
for member in members:
|
|
assert member not in res.stdout
|
|
kdestroy(self.master)
|
|
|
|
def mark_xfail_using_ansible_freeipa_version(self, version, reason):
|
|
package = self.master.package("ansible-freeipa")
|
|
|
|
if not package.is_installed:
|
|
return
|
|
|
|
if package.version == version:
|
|
pytest.xfail(reason)
|