Adds the bigip_ssl_ocsp module (#48018)

This module can be used to manage OCSP profiles on a BIG-IP
This commit is contained in:
Tim Rupp
2018-11-02 22:06:16 -07:00
committed by GitHub
parent 32e77c12e0
commit 787b12e016
3 changed files with 926 additions and 0 deletions

View File

@@ -0,0 +1,33 @@
{
"kind": "tm:sys:crypto:cert-validator:ocsp:ocspstate",
"name": "asd",
"partition": "Common",
"fullPath": "/Common/asd",
"generation": 151,
"selfLink": "https://localhost/mgmt/tm/sys/crypto/cert-validator/ocsp/~Common~asd?ver=13.1.0.8",
"cacheErrorTimeout": 3600,
"cacheTimeout": "indefinite",
"clockSkew": 300,
"concurrentConnectionsLimit": 500,
"dnsResolver": "/Common/foo",
"dnsResolverReference": {
"link": "https://localhost/mgmt/tm/net/dns-resolver/~Common~foo?ver=13.1.0.8"
},
"routeDomain": "/Common/0",
"routeDomainReference": {
"link": "https://localhost/mgmt/tm/net/route-domain/~Common~0?ver=13.1.0.8"
},
"signHash": "sha256",
"signerCert": "/Common/default.crt",
"signerCertReference": {
"link": "https://localhost/mgmt/tm/sys/file/ssl-cert/~Common~default.crt?ver=13.1.0.8"
},
"signerKey": "/Common/default.key",
"signerKeyReference": {
"link": "https://localhost/mgmt/tm/sys/file/ssl-key/~Common~default.key?ver=13.1.0.8"
},
"signerKeyPassphrase": "secret",
"statusAge": 0,
"strictRespCertCheck": "enabled",
"timeout": 8
}

View File

@@ -0,0 +1,128 @@
# -*- coding: utf-8 -*-
#
# Copyright: (c) 2018, F5 Networks Inc.
# GNU General Public License v3.0 (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
from __future__ import (absolute_import, division, print_function)
__metaclass__ = type
import os
import json
import sys
from nose.plugins.skip import SkipTest
if sys.version_info < (2, 7):
raise SkipTest("F5 Ansible modules require Python >= 2.7")
from ansible.module_utils.basic import AnsibleModule
try:
from library.modules.bigip_ssl_ocsp import ApiParameters
from library.modules.bigip_ssl_ocsp import ModuleParameters
from library.modules.bigip_ssl_ocsp import ModuleManager
from library.modules.bigip_ssl_ocsp import ArgumentSpec
# In Ansible 2.8, Ansible changed import paths.
from test.units.compat import unittest
from test.units.compat.mock import Mock
from test.units.compat.mock import patch
from test.units.modules.utils import set_module_args
except ImportError:
try:
from ansible.modules.network.f5.bigip_ssl_ocsp import ApiParameters
from ansible.modules.network.f5.bigip_ssl_ocsp import ModuleParameters
from ansible.modules.network.f5.bigip_ssl_ocsp import ModuleManager
from ansible.modules.network.f5.bigip_ssl_ocsp import ArgumentSpec
# Ansible 2.8 imports
from units.compat import unittest
from units.compat.mock import Mock
from units.compat.mock import patch
from units.modules.utils import set_module_args
except ImportError:
raise SkipTest("F5 Ansible modules require the f5-sdk Python library")
fixture_path = os.path.join(os.path.dirname(__file__), 'fixtures')
fixture_data = {}
def load_fixture(name):
path = os.path.join(fixture_path, name)
if path in fixture_data:
return fixture_data[path]
with open(path) as f:
data = f.read()
try:
data = json.loads(data)
except Exception:
pass
fixture_data[path] = data
return data
class TestParameters(unittest.TestCase):
def test_module_parameters(self):
args = dict(
name='foo',
clock_skew=100,
connections_limit=101,
)
p = ModuleParameters(params=args)
assert p.name == 'foo'
assert p.clock_skew == 100
assert p.connections_limit == 101
def test_api_parameters(self):
args = load_fixture('load_sys_crypto_cert_validator_1.json')
p = ApiParameters(params=args)
assert p.name == 'asd'
assert p.clock_skew == 300
class TestManager(unittest.TestCase):
def setUp(self):
self.spec = ArgumentSpec()
try:
self.p1 = patch('library.modules.bigip_ssl_ocsp.tmos_version')
self.m1 = self.p1.start()
self.m1.return_value = '13.0.0'
except Exception:
self.p1 = patch('ansible.modules.network.f5.bigip_ssl_ocsp.tmos_version')
self.m1 = self.p1.start()
self.m1.return_value = '13.0.0'
def tearDown(self):
self.p1.stop()
def test_create(self, *args):
# Configure the arguments that would be sent to the Ansible module
set_module_args(dict(
name='foo',
clock_skew=100,
password='password',
server='localhost',
user='admin'
))
module = AnsibleModule(
argument_spec=self.spec.argument_spec,
supports_check_mode=self.spec.supports_check_mode
)
mm = ModuleManager(module=module)
# Override methods to force specific logic in the module to happen
mm.exists = Mock(return_value=False)
mm.create_on_device = Mock(return_value=True)
results = mm.exec_module()
assert results['changed'] is True