mirror of
https://github.com/ansible-collections/community.general.git
synced 2026-05-06 13:22:48 +00:00
Merge pull request #13771 from sivel/binary-modules
First pass at allowing binary modules
This commit is contained in:
@@ -23,7 +23,9 @@ VAULT_PASSWORD_FILE = vault-password
|
||||
CONSUL_RUNNING := $(shell python consul_running.py)
|
||||
EUID := $(shell id -u -r)
|
||||
|
||||
all: setup test_test_infra parsing test_var_precedence unicode test_templating_settings environment test_connection non_destructive destructive includes blocks pull check_mode test_hash test_handlers test_group_by test_vault test_tags test_lookup_paths no_log test_gathering_facts
|
||||
UNAME := $(shell uname | tr '[:upper:]' '[:lower:]')
|
||||
|
||||
all: setup test_test_infra parsing test_var_precedence unicode test_templating_settings environment test_connection non_destructive destructive includes blocks pull check_mode test_hash test_handlers test_group_by test_vault test_tags test_lookup_paths no_log test_gathering_facts test_binary_modules
|
||||
|
||||
test_test_infra:
|
||||
# ensure fail/assert work locally and can stop execution with non-zero exit code
|
||||
@@ -284,3 +286,17 @@ test_lookup_paths: setup
|
||||
no_log: setup
|
||||
# This test expects 7 loggable vars and 0 non loggable ones, if either mismatches it fails, run the ansible-playbook command to debug
|
||||
[ "$$(ansible-playbook no_log_local.yml -i $(INVENTORY) -e outputdir=$(TEST_DIR) -vvvvv | awk --source 'BEGIN { logme = 0; nolog = 0; } /LOG_ME/ { logme += 1;} /DO_NOT_LOG/ { nolog += 1;} END { printf "%d/%d", logme, nolog; }')" = "6/0" ]
|
||||
|
||||
test_binary_modules:
|
||||
mytmpdir=$(MYTMPDIR); \
|
||||
ls -al $$mytmpdir; \
|
||||
curl https://storage.googleapis.com/golang/go1.6.2.$(UNAME)-amd64.tar.gz | tar -xz -C $$mytmpdir; \
|
||||
[ $$? != 0 ] && wget -qO- https://storage.googleapis.com/golang/go1.6.2.$(UNAME)-amd64.tar.gz | tar -xz -C $$mytmpdir; \
|
||||
ls -al $$mytmpdir; \
|
||||
cd library; \
|
||||
GOROOT=$$mytmpdir/go GOOS=linux GOARCH=amd64 $$mytmpdir/go/bin/go build -o helloworld_linux helloworld.go; \
|
||||
GOROOT=$$mytmpdir/go GOOS=windows GOARCH=amd64 $$mytmpdir/go/bin/go build -o helloworld_win32nt.exe helloworld.go; \
|
||||
GOROOT=$$mytmpdir/go GOOS=darwin GOARCH=amd64 $$mytmpdir/go/bin/go build -o helloworld_darwin helloworld.go; \
|
||||
cd ..; \
|
||||
rm -rf $$mytmpdir; \
|
||||
ANSIBLE_HOST_KEY_CHECKING=false ansible-playbook test_binary_modules.yml -i $(INVENTORY) -v $(TEST_FLAGS)
|
||||
|
||||
1
test/integration/library/.gitignore
vendored
Normal file
1
test/integration/library/.gitignore
vendored
Normal file
@@ -0,0 +1 @@
|
||||
helloworld_*
|
||||
89
test/integration/library/helloworld.go
Normal file
89
test/integration/library/helloworld.go
Normal file
@@ -0,0 +1,89 @@
|
||||
// This file is part of Ansible
|
||||
//
|
||||
// Ansible is free software: you can redistribute it and/or modify
|
||||
// it under the terms of the GNU General Public License as published by
|
||||
// the Free Software Foundation, either version 3 of the License, or
|
||||
// (at your option) any later version.
|
||||
//
|
||||
// Ansible is distributed in the hope that it will be useful,
|
||||
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
// GNU General Public License for more details.
|
||||
//
|
||||
// You should have received a copy of the GNU General Public License
|
||||
// along with Ansible. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
package main
|
||||
|
||||
import (
|
||||
"encoding/json"
|
||||
"fmt"
|
||||
"io/ioutil"
|
||||
"os"
|
||||
)
|
||||
|
||||
type ModuleArgs struct {
|
||||
Name string
|
||||
}
|
||||
|
||||
type Response struct {
|
||||
Msg string `json:"msg"`
|
||||
Changed bool `json:"changed"`
|
||||
Failed bool `json:"failed"`
|
||||
}
|
||||
|
||||
func ExitJson(responseBody Response) {
|
||||
returnResponse(responseBody)
|
||||
}
|
||||
|
||||
func FailJson(responseBody Response) {
|
||||
responseBody.Failed = true
|
||||
returnResponse(responseBody)
|
||||
}
|
||||
|
||||
func returnResponse(responseBody Response) {
|
||||
var response []byte
|
||||
var err error
|
||||
response, err = json.Marshal(responseBody)
|
||||
if err != nil {
|
||||
response, _ = json.Marshal(Response{Msg: "Invalid response object"})
|
||||
}
|
||||
fmt.Println(string(response))
|
||||
if responseBody.Failed {
|
||||
os.Exit(1)
|
||||
} else {
|
||||
os.Exit(0)
|
||||
}
|
||||
}
|
||||
|
||||
func main() {
|
||||
var response Response
|
||||
|
||||
if len(os.Args) != 2 {
|
||||
response.Msg = "No argument file provided"
|
||||
FailJson(response)
|
||||
}
|
||||
|
||||
argsFile := os.Args[1]
|
||||
|
||||
text, err := ioutil.ReadFile(argsFile)
|
||||
if err != nil {
|
||||
response.Msg = "Could not read configuration file: " + argsFile
|
||||
FailJson(response)
|
||||
}
|
||||
|
||||
var moduleArgs ModuleArgs
|
||||
err = json.Unmarshal(text, &moduleArgs)
|
||||
if err != nil {
|
||||
response.Msg = "Configuration file not valid JSON: " + argsFile
|
||||
FailJson(response)
|
||||
}
|
||||
|
||||
var name string = "World"
|
||||
if moduleArgs.Name != "" {
|
||||
name = moduleArgs.Name
|
||||
}
|
||||
|
||||
response.Msg = "Hello, " + name + "!"
|
||||
ExitJson(response)
|
||||
}
|
||||
54
test/integration/roles/test_binary_modules/tasks/main.yml
Normal file
54
test/integration/roles/test_binary_modules/tasks/main.yml
Normal file
@@ -0,0 +1,54 @@
|
||||
- debug: var=ansible_system
|
||||
|
||||
- name: ping
|
||||
ping:
|
||||
when: ansible_system != 'Win32NT'
|
||||
|
||||
- name: win_ping
|
||||
win_ping:
|
||||
when: ansible_system == 'Win32NT'
|
||||
|
||||
- name: Hello, World!
|
||||
action: "helloworld_{{ ansible_system|lower }}"
|
||||
register: hello_world
|
||||
|
||||
- assert:
|
||||
that:
|
||||
- 'hello_world.msg == "Hello, World!"'
|
||||
|
||||
- name: Hello, Ansible!
|
||||
action: "helloworld_{{ ansible_system|lower }}"
|
||||
args:
|
||||
name: Ansible
|
||||
register: hello_ansible
|
||||
|
||||
- assert:
|
||||
that:
|
||||
- 'hello_ansible.msg == "Hello, Ansible!"'
|
||||
|
||||
- name: Async Hello, World!
|
||||
action: "helloworld_{{ ansible_system|lower }}"
|
||||
async: 1
|
||||
poll: 1
|
||||
when: ansible_system != 'Win32NT'
|
||||
register: async_hello_world
|
||||
|
||||
- assert:
|
||||
that:
|
||||
- 'async_hello_world.msg == "Hello, World!"'
|
||||
when: not async_hello_world|skipped
|
||||
|
||||
- name: Async Hello, Ansible!
|
||||
action: "helloworld_{{ ansible_system|lower }}"
|
||||
args:
|
||||
name: Ansible
|
||||
async: 1
|
||||
poll: 1
|
||||
when: ansible_system != 'Win32NT'
|
||||
register: async_hello_ansible
|
||||
|
||||
- assert:
|
||||
that:
|
||||
- 'async_hello_ansible.msg == "Hello, Ansible!"'
|
||||
when: not async_hello_ansible|skipped
|
||||
|
||||
6
test/integration/test_binary_modules.yml
Normal file
6
test/integration/test_binary_modules.yml
Normal file
@@ -0,0 +1,6 @@
|
||||
- hosts: all
|
||||
roles:
|
||||
- role: test_binary_modules
|
||||
tags:
|
||||
- test_binary_modules
|
||||
|
||||
@@ -217,7 +217,7 @@ class TestActionBase(unittest.TestCase):
|
||||
with patch.object(os, 'rename') as m:
|
||||
mock_task.args = dict(a=1, foo='fö〩')
|
||||
mock_connection.module_implementation_preferences = ('',)
|
||||
(style, shebang, data) = action_base._configure_module(mock_task.action, mock_task.args)
|
||||
(style, shebang, data, path) = action_base._configure_module(mock_task.action, mock_task.args)
|
||||
self.assertEqual(style, "new")
|
||||
self.assertEqual(shebang, b"#!/usr/bin/python")
|
||||
|
||||
@@ -229,7 +229,7 @@ class TestActionBase(unittest.TestCase):
|
||||
mock_task.action = 'win_copy'
|
||||
mock_task.args = dict(b=2)
|
||||
mock_connection.module_implementation_preferences = ('.ps1',)
|
||||
(style, shebang, data) = action_base._configure_module('stat', mock_task.args)
|
||||
(style, shebang, data, path) = action_base._configure_module('stat', mock_task.args)
|
||||
self.assertEqual(style, "new")
|
||||
self.assertEqual(shebang, None)
|
||||
|
||||
@@ -572,7 +572,7 @@ class TestActionBase(unittest.TestCase):
|
||||
action_base._low_level_execute_command = MagicMock()
|
||||
action_base._fixup_perms = MagicMock()
|
||||
|
||||
action_base._configure_module.return_value = ('new', '#!/usr/bin/python', 'this is the module data')
|
||||
action_base._configure_module.return_value = ('new', '#!/usr/bin/python', 'this is the module data', 'path')
|
||||
action_base._late_needs_tmp_path.return_value = False
|
||||
action_base._compute_environment_string.return_value = ''
|
||||
action_base._connection.has_pipelining = True
|
||||
@@ -581,12 +581,12 @@ class TestActionBase(unittest.TestCase):
|
||||
self.assertEqual(action_base._execute_module(module_name='foo', module_args=dict(z=9, y=8, x=7), task_vars=dict(a=1)), dict(rc=0, stdout="ok", stdout_lines=['ok']))
|
||||
|
||||
# test with needing/removing a remote tmp path
|
||||
action_base._configure_module.return_value = ('old', '#!/usr/bin/python', 'this is the module data')
|
||||
action_base._configure_module.return_value = ('old', '#!/usr/bin/python', 'this is the module data', 'path')
|
||||
action_base._late_needs_tmp_path.return_value = True
|
||||
action_base._make_tmp_path.return_value = '/the/tmp/path'
|
||||
self.assertEqual(action_base._execute_module(), dict(rc=0, stdout="ok", stdout_lines=['ok']))
|
||||
|
||||
action_base._configure_module.return_value = ('non_native_want_json', '#!/usr/bin/python', 'this is the module data')
|
||||
action_base._configure_module.return_value = ('non_native_want_json', '#!/usr/bin/python', 'this is the module data', 'path')
|
||||
self.assertEqual(action_base._execute_module(), dict(rc=0, stdout="ok", stdout_lines=['ok']))
|
||||
|
||||
play_context.become = True
|
||||
@@ -594,14 +594,14 @@ class TestActionBase(unittest.TestCase):
|
||||
self.assertEqual(action_base._execute_module(), dict(rc=0, stdout="ok", stdout_lines=['ok']))
|
||||
|
||||
# test an invalid shebang return
|
||||
action_base._configure_module.return_value = ('new', '', 'this is the module data')
|
||||
action_base._configure_module.return_value = ('new', '', 'this is the module data', 'path')
|
||||
action_base._late_needs_tmp_path.return_value = False
|
||||
self.assertRaises(AnsibleError, action_base._execute_module)
|
||||
|
||||
# test with check mode enabled, once with support for check
|
||||
# mode and once with support disabled to raise an error
|
||||
play_context.check_mode = True
|
||||
action_base._configure_module.return_value = ('new', '#!/usr/bin/python', 'this is the module data')
|
||||
action_base._configure_module.return_value = ('new', '#!/usr/bin/python', 'this is the module data', 'path')
|
||||
self.assertEqual(action_base._execute_module(), dict(rc=0, stdout="ok", stdout_lines=['ok']))
|
||||
action_base._supports_check_mode = False
|
||||
self.assertRaises(AnsibleError, action_base._execute_module)
|
||||
|
||||
Reference in New Issue
Block a user