2018-08-01 21:02:27 +02:00
# Test code for the get_url module
2014-09-03 17:04:02 +02:00
# (c) 2014, Richard Isaacson <richard.c.isaacson@gmail.com>
# This file is part of Ansible
#
# Ansible is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# Ansible is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
2018-05-02 01:28:42 +02:00
# along with Ansible. If not, see <https://www.gnu.org/licenses/>.
2014-09-03 17:04:02 +02:00
2015-12-18 02:51:42 +01:00
- name : Determine if python looks like it will support modern ssl features like SNI
2016-09-03 19:21:22 +02:00
command : "{{ ansible_python.executable }} -c 'from ssl import SSLContext'"
2015-12-18 02:51:42 +01:00
ignore_errors : True
register : python_test
- name : Set python_has_sslcontext if we have it
set_fact :
python_has_ssl_context : True
when : python_test.rc == 0
- name : Set python_has_sslcontext False if we don't have it
set_fact :
python_has_ssl_context : False
when : python_test.rc != 0
2016-04-22 20:38:03 +02:00
- name : Define test files for file schema
set_fact :
2019-01-25 04:25:06 +01:00
geturl_srcfile : "{{ remote_tmp_dir }}/aurlfile.txt"
geturl_dstfile : "{{ remote_tmp_dir }}/aurlfile_copy.txt"
2016-04-22 20:38:03 +02:00
- name : Create source file
2016-04-18 16:47:38 +02:00
copy :
dest : "{{ geturl_srcfile }}"
content : "foobar"
2018-01-05 11:10:44 +01:00
register : source_file_copied
2016-04-22 20:38:03 +02:00
- name : test file fetch
get_url :
2018-01-05 11:10:44 +01:00
url : "file://{{ source_file_copied.dest }}"
2016-04-18 16:47:38 +02:00
dest : "{{ geturl_dstfile }}"
register : result
2016-04-22 20:38:03 +02:00
- name : assert success and change
assert :
that :
2018-08-01 21:02:27 +02:00
- result is changed
- '"OK" in result.msg'
2016-04-22 20:38:03 +02:00
- name : test nonexisting file fetch
get_url :
2018-01-05 11:10:44 +01:00
url : "file://{{ source_file_copied.dest }}NOFILE"
dest : "{{ geturl_dstfile }}NOFILE"
2016-04-18 16:47:38 +02:00
register : result
2016-04-22 20:38:03 +02:00
ignore_errors : True
- name : assert success and change
assert :
that :
2018-08-01 21:02:27 +02:00
- result is failed
2016-04-22 20:38:03 +02:00
2017-04-28 15:43:51 +02:00
- name : test HTTP HEAD request for file in check mode
2018-08-01 21:02:27 +02:00
get_url :
url : "https://{{ httpbin_host }}/get"
2019-01-25 04:25:06 +01:00
dest : "{{ remote_tmp_dir }}/get_url_check.txt"
2018-08-01 21:02:27 +02:00
force : yes
2017-04-28 15:43:51 +02:00
check_mode : True
register : result
- name : assert that the HEAD request was successful in check mode
assert :
that :
2018-08-01 21:02:27 +02:00
- result is changed
2017-04-28 15:43:51 +02:00
- '"OK" in result.msg'
- name : test HTTP HEAD for nonexistent URL in check mode
2018-08-01 21:02:27 +02:00
get_url :
url : "https://{{ httpbin_host }}/DOESNOTEXIST"
2019-01-25 04:25:06 +01:00
dest : "{{ remote_tmp_dir }}/shouldnotexist.html"
2018-08-01 21:02:27 +02:00
force : yes
2017-04-28 15:43:51 +02:00
check_mode : True
register : result
ignore_errors : True
- name : assert that HEAD request for nonexistent URL failed
assert :
that :
2018-08-01 21:02:27 +02:00
- result is failed
2017-04-28 15:43:51 +02:00
2014-09-03 17:04:02 +02:00
- name : test https fetch
2019-01-25 04:25:06 +01:00
get_url : url="https://{{ httpbin_host }}/get" dest={{remote_tmp_dir}}/get_url.txt force=yes
2014-09-03 17:04:02 +02:00
register : result
- name : assert the get_url call was successful
assert :
that :
2018-08-01 21:02:27 +02:00
- result is changed
- '"OK" in result.msg'
2015-05-28 21:35:37 +02:00
2015-05-29 00:35:25 +02:00
- name : test https fetch to a site with mismatched hostname and certificate
2015-05-28 21:35:37 +02:00
get_url :
2016-05-11 05:43:07 +02:00
url : "https://{{ badssl_host }}/"
2019-01-25 04:25:06 +01:00
dest : "{{ remote_tmp_dir }}/shouldnotexist.html"
2015-05-28 21:35:37 +02:00
ignore_errors : True
register : result
- stat :
2019-01-25 04:25:06 +01:00
path : "{{ remote_tmp_dir }}/shouldnotexist.html"
2015-05-28 21:35:37 +02:00
register : stat_result
- name : Assert that the file was not downloaded
assert :
that :
2017-11-27 23:58:08 +01:00
- "result is failed"
2019-05-31 22:35:26 +02:00
- "'Failed to validate the SSL certificate' in result.msg or 'Hostname mismatch' in result.msg or ( result.msg is match('hostname .* doesn.t match .*'))"
2015-05-28 21:35:37 +02:00
- "stat_result.stat.exists == false"
2015-05-29 00:35:25 +02:00
- name : test https fetch to a site with mismatched hostname and certificate and validate_certs=no
get_url :
2016-05-11 05:43:07 +02:00
url : "https://{{ badssl_host }}/"
2019-01-25 04:25:06 +01:00
dest : "{{ remote_tmp_dir }}/get_url_no_validate.html"
2015-05-29 00:35:25 +02:00
validate_certs : no
register : result
- stat :
2019-01-25 04:25:06 +01:00
path : "{{ remote_tmp_dir }}/get_url_no_validate.html"
2015-05-29 00:35:25 +02:00
register : stat_result
2015-05-29 02:01:18 +02:00
- name : Assert that the file was downloaded
2015-05-29 00:35:25 +02:00
assert :
that :
2018-08-01 21:02:27 +02:00
- result is changed
2015-05-29 00:35:25 +02:00
- "stat_result.stat.exists == true"
2015-07-14 20:48:41 +02:00
2016-05-11 05:43:07 +02:00
# SNI Tests
# SNI is only built into the stdlib from python-2.7.9 onwards
- name : Test that SNI works
get_url :
url : 'https://{{ sni_host }}/'
2019-01-25 04:25:06 +01:00
dest : "{{ remote_tmp_dir }}/sni.html"
2016-05-11 05:43:07 +02:00
register : get_url_result
ignore_errors : True
2019-01-25 04:25:06 +01:00
- command : "grep '{{ sni_host }}' {{ remote_tmp_dir}}/sni.html"
2016-05-11 05:43:07 +02:00
register : data_result
2018-08-01 21:02:27 +02:00
when : python_has_ssl_context
- debug :
var : get_url_result
2016-05-11 05:43:07 +02:00
- name : Assert that SNI works with this python version
assert :
that :
- 'data_result.rc == 0'
2018-08-01 21:02:27 +02:00
when : python_has_ssl_context
2016-05-11 05:43:07 +02:00
# If the client doesn't support SNI then get_url should have failed with a certificate mismatch
- name : Assert that hostname verification failed because SNI is not supported on this version of python
assert :
that :
2017-11-27 23:58:08 +01:00
- 'get_url_result is failed'
2018-08-01 21:02:27 +02:00
when : not python_has_ssl_context
2015-12-20 20:33:42 +01:00
# These tests are just side effects of how the site is hosted. It's not
# specifically a test site. So the tests may break due to the hosting changing
2015-07-14 20:48:41 +02:00
- name : Test that SNI works
get_url :
2016-05-11 05:43:07 +02:00
url : 'https://{{ sni_host }}/'
2019-01-25 04:25:06 +01:00
dest : "{{ remote_tmp_dir }}/sni.html"
2015-07-14 20:48:41 +02:00
register : get_url_result
ignore_errors : True
2019-01-25 04:25:06 +01:00
- command : "grep '{{ sni_host }}' {{ remote_tmp_dir}}/sni.html"
2015-07-14 20:48:41 +02:00
register : data_result
2018-08-01 21:02:27 +02:00
when : python_has_ssl_context
- debug :
var : get_url_result
2015-07-14 20:48:41 +02:00
- name : Assert that SNI works with this python version
assert :
that :
- 'data_result.rc == 0'
2017-11-27 23:58:08 +01:00
- 'get_url_result is not failed'
2018-08-01 21:02:27 +02:00
when : python_has_ssl_context
2015-07-14 20:48:41 +02:00
# If the client doesn't support SNI then get_url should have failed with a certificate mismatch
- name : Assert that hostname verification failed because SNI is not supported on this version of python
assert :
that :
2017-11-27 23:58:08 +01:00
- 'get_url_result is failed'
2018-08-01 21:02:27 +02:00
when : not python_has_ssl_context
2015-12-20 20:33:42 +01:00
# End hacky SNI test section
2016-03-07 22:35:20 +01:00
- name : Test get_url with redirect
get_url :
2018-05-02 01:28:42 +02:00
url : 'https://{{ httpbin_host }}/redirect/6'
2019-01-25 04:25:06 +01:00
dest : "{{ remote_tmp_dir }}/redirect.json"
2016-03-20 15:58:23 +01:00
- name : Test that setting file modes work
get_url :
2018-05-02 01:28:42 +02:00
url : 'https://{{ httpbin_host }}/'
2019-01-25 04:25:06 +01:00
dest : '{{ remote_tmp_dir }}/test'
2016-03-20 15:58:23 +01:00
mode : '0707'
register : result
- stat :
2019-01-25 04:25:06 +01:00
path : "{{ remote_tmp_dir }}/test"
2016-03-20 15:58:23 +01:00
register : stat_result
- name : Assert that the file has the right permissions
assert :
that :
2018-08-01 21:02:27 +02:00
- result is changed
2016-03-20 15:58:23 +01:00
- "stat_result.stat.mode == '0707'"
- name : Test that setting file modes on an already downlaoded file work
get_url :
2018-05-02 01:28:42 +02:00
url : 'https://{{ httpbin_host }}/'
2019-01-25 04:25:06 +01:00
dest : '{{ remote_tmp_dir }}/test'
2016-03-20 15:58:23 +01:00
mode : '0070'
register : result
- stat :
2019-01-25 04:25:06 +01:00
path : "{{ remote_tmp_dir }}/test"
2016-03-20 15:58:23 +01:00
register : stat_result
- name : Assert that the file has the right permissions
assert :
that :
2018-08-01 21:02:27 +02:00
- result is changed
2016-03-20 15:58:23 +01:00
- "stat_result.stat.mode == '0070'"
2016-06-13 19:59:42 +02:00
2018-08-01 21:02:27 +02:00
# https://github.com/ansible/ansible/issues/29614
- name : Change mode on an already downloaded file and specify checksum
get_url :
2018-09-11 20:56:13 +02:00
url : 'https://{{ httpbin_host }}/get'
2019-01-25 04:25:06 +01:00
dest : '{{ remote_tmp_dir }}/test'
2018-08-01 21:02:27 +02:00
checksum : 'sha256:7036ede810fad2b5d2e7547ec703cae8da61edbba43c23f9d7203a0239b765c4.'
mode : '0775'
register : result
- stat :
2019-01-25 04:25:06 +01:00
path : "{{ remote_tmp_dir }}/test"
2018-08-01 21:02:27 +02:00
register : stat_result
- name : Assert that file permissions on already downloaded file were changed
assert :
that :
- result is changed
- "stat_result.stat.mode == '0775'"
2019-09-13 19:24:15 +02:00
- name : test checksum match in check mode
2018-09-11 20:56:13 +02:00
get_url :
url : 'https://{{ httpbin_host }}/get'
2019-01-25 04:25:06 +01:00
dest : '{{ remote_tmp_dir }}/test'
2019-09-13 19:24:15 +02:00
checksum : 'sha256:7036ede810fad2b5d2e7547ec703cae8da61edbba43c23f9d7203a0239b765c4.'
check_mode : True
register : result
- name : Assert that check mode was green
assert :
that :
- result is not changed
- name : Get a file that already exists with a checksum
get_url :
url : 'https://{{ httpbin_host }}/cache'
dest : '{{ remote_tmp_dir }}/test'
checksum : 'sha1:{{ stat_result.stat.checksum }}'
register : result
- name : Assert that the file was not downloaded
assert :
that :
- result.msg == 'file already exists'
- name : Get a file that already exists
get_url :
url : 'https://{{ httpbin_host }}/cache'
dest : '{{ remote_tmp_dir }}/test'
2018-09-11 20:56:13 +02:00
register : result
- name : Assert that we didn't re-download unnecessarily
assert :
that :
- result is not changed
2019-09-13 19:24:15 +02:00
- "'304' in result.msg"
2018-09-11 20:56:13 +02:00
2019-09-13 19:24:15 +02:00
- name : get a file that doesn't respond to If-Modified-Since without checksum
2019-03-01 10:53:28 +01:00
get_url :
url : 'https://{{ httpbin_host }}/get'
dest : '{{ remote_tmp_dir }}/test'
register : result
2019-09-13 19:24:15 +02:00
- name : Assert that we downloaded the file
2019-03-01 10:53:28 +01:00
assert :
that :
2019-09-13 19:24:15 +02:00
- result is changed
2019-03-01 10:53:28 +01:00
2018-08-24 18:45:32 +02:00
# https://github.com/ansible/ansible/issues/27617
- name : set role facts
set_fact :
http_port : 27617
2019-01-25 04:25:06 +01:00
files_dir : '{{ remote_tmp_dir }}/files'
2018-08-24 18:45:32 +02:00
- name : create files_dir
file :
dest : "{{ files_dir }}"
state : directory
- name : create src file
copy :
dest : '{{ files_dir }}/27617.txt'
content : "ptux"
- name : create sha1 checksum file of src
copy :
dest : '{{ files_dir }}/sha1sum.txt'
2019-02-26 21:09:42 +01:00
content : |
a97e6837f60cec6da4491bab387296bbcd72bdba 27617.txt
3911340502960ca33aece01129234460bfeb2791 not_target1.txt
1b4b6adf30992cedb0f6edefd6478ff0a593b2e4 not_target2.txt
2018-08-24 18:45:32 +02:00
- name : create sha256 checksum file of src
copy :
dest : '{{ files_dir }}/sha256sum.txt'
2019-02-26 21:09:42 +01:00
content : |
b1b6ce5073c8fac263a8fc5edfffdbd5dec1980c784e09c5bc69f8fb6056f006. 27617.txt
30949cc401e30ac494d695ab8764a9f76aae17c5d73c67f65e9b558f47eff892 not_target1.txt
d0dbfc1945bc83bf6606b770e442035f2c4e15c886ee0c22fb3901ba19900b5b not_target2.txt
2018-08-24 18:45:32 +02:00
2018-09-11 18:47:29 +02:00
- name : create sha256 checksum file of src with a dot leading path
copy :
dest : '{{ files_dir }}/sha256sum_with_dot.txt'
2019-02-26 21:09:42 +01:00
content : |
b1b6ce5073c8fac263a8fc5edfffdbd5dec1980c784e09c5bc69f8fb6056f006. ./27617.txt
30949cc401e30ac494d695ab8764a9f76aae17c5d73c67f65e9b558f47eff892 ./not_target1.txt
d0dbfc1945bc83bf6606b770e442035f2c4e15c886ee0c22fb3901ba19900b5b ./not_target2.txt
2018-09-11 18:47:29 +02:00
2018-08-24 18:45:32 +02:00
- copy :
src : "testserver.py"
2019-01-25 04:25:06 +01:00
dest : "{{ remote_tmp_dir }}/testserver.py"
2018-08-24 18:45:32 +02:00
- name : start SimpleHTTPServer for issues 27617
2019-01-25 04:25:06 +01:00
shell : cd {{ files_dir }} && {{ ansible_python.executable }} {{ remote_tmp_dir}}/testserver.py {{ http_port }}
2018-08-24 18:45:32 +02:00
async : 90
poll : 0
- name : download src with sha1 checksum url
get_url :
url : 'http://localhost:{{ http_port }}/27617.txt'
2019-01-25 04:25:06 +01:00
dest : '{{ remote_tmp_dir }}'
2018-08-24 18:45:32 +02:00
checksum : 'sha1:http://localhost:{{ http_port }}/sha1sum.txt'
register : result_sha1
- stat :
2019-01-25 04:25:06 +01:00
path : "{{ remote_tmp_dir }}/27617.txt"
2018-08-24 18:45:32 +02:00
register : stat_result_sha1
- name : download src with sha256 checksum url
get_url :
url : 'http://localhost:{{ http_port }}/27617.txt'
2019-01-25 04:25:06 +01:00
dest : '{{ remote_tmp_dir }}/27617sha256.txt'
2018-08-24 18:45:32 +02:00
checksum : 'sha256:http://localhost:{{ http_port }}/sha256sum.txt'
register : result_sha256
- stat :
2019-01-25 04:25:06 +01:00
path : "{{ remote_tmp_dir }}/27617.txt"
2018-08-24 18:45:32 +02:00
register : stat_result_sha256
2018-09-11 18:47:29 +02:00
- name : download src with sha256 checksum url with dot leading paths
get_url :
url : 'http://localhost:{{ http_port }}/27617.txt'
2019-01-25 04:25:06 +01:00
dest : '{{ remote_tmp_dir }}/27617sha256_with_dot.txt'
2018-09-11 18:47:29 +02:00
checksum : 'sha256:http://localhost:{{ http_port }}/sha256sum_with_dot.txt'
register : result_sha256_with_dot
- stat :
2019-01-25 04:25:06 +01:00
path : "{{ remote_tmp_dir }}/27617sha256_with_dot.txt"
2018-09-11 18:47:29 +02:00
register : stat_result_sha256_with_dot
2018-08-24 18:45:32 +02:00
- name : Assert that the file was downloaded
assert :
that :
- result_sha1 is changed
- result_sha256 is changed
2018-09-11 18:47:29 +02:00
- result_sha256_with_dot is changed
2018-08-24 18:45:32 +02:00
- "stat_result_sha1.stat.exists == true"
- "stat_result_sha256.stat.exists == true"
2018-09-11 18:47:29 +02:00
- "stat_result_sha256_with_dot.stat.exists == true"
2018-08-24 18:45:32 +02:00
2016-06-13 19:59:42 +02:00
#https://github.com/ansible/ansible/issues/16191
- name : Test url split with no filename
2018-04-10 18:50:39 +02:00
get_url :
2016-09-28 03:11:09 +02:00
url : https://{{ httpbin_host }}
2019-01-25 04:25:06 +01:00
dest : "{{ remote_tmp_dir }}"
2017-04-07 18:54:37 +02:00
2018-04-10 18:50:39 +02:00
- name : Test headers string
get_url :
url : https://{{ httpbin_host }}/headers
headers : Foo:bar,Baz:qux
2019-01-25 04:25:06 +01:00
dest : "{{ remote_tmp_dir }}/headers_string.json"
- name : Get downloaded file
slurp :
src : "{{ remote_tmp_dir }}/headers_string.json"
register : result
2018-04-10 18:50:39 +02:00
- name : Test headers string
assert :
that :
2019-01-26 04:37:56 +01:00
- (result.content | b64decode | from_json).headers.get('Foo') == 'bar'
- (result.content | b64decode | from_json).headers.get('Baz') == 'qux'
2018-04-10 18:50:39 +02:00
- name : Test headers string invalid format
get_url :
url : https://{{ httpbin_host }}/headers
headers : Foo
2019-01-25 04:25:06 +01:00
dest : "{{ remote_tmp_dir }}/headers_string_invalid.json"
2018-04-10 18:50:39 +02:00
register : invalid_string_headers
failed_when :
- invalid_string_headers is successful
- invalid_string_headers.msg != "The string representation for the `headers` parameter requires a key:value,key:value syntax to be properly parsed."
- name : Test headers dict
get_url :
url : https://{{ httpbin_host }}/headers
headers :
Foo : bar
Baz : qux
2019-01-25 04:25:06 +01:00
dest : "{{ remote_tmp_dir }}/headers_dict.json"
- name : Get downloaded file
slurp :
src : "{{ remote_tmp_dir }}/headers_dict.json"
register : result
2018-04-10 18:50:39 +02:00
- name : Test headers dict
assert :
that :
2019-01-26 04:37:56 +01:00
- (result.content | b64decode | from_json).headers.get('Foo') == 'bar'
- (result.content | b64decode | from_json).headers.get('Baz') == 'qux'
2017-04-07 18:54:37 +02:00
- name : Test client cert auth, with certs
get_url :
url : "https://ansible.http.tests/ssl_client_verify"
2019-01-25 04:25:06 +01:00
client_cert : "{{ remote_tmp_dir }}/client.pem"
client_key : "{{ remote_tmp_dir }}/client.key"
dest : "{{ remote_tmp_dir }}/ssl_client_verify"
2017-04-07 18:54:37 +02:00
when : has_httptester
2019-01-25 04:25:06 +01:00
- name : Get downloaded file
slurp :
src : "{{ remote_tmp_dir }}/ssl_client_verify"
register : result
2017-04-07 18:54:37 +02:00
- name : Assert that the ssl_client_verify file contains the correct content
assert :
that :
2019-01-26 04:37:56 +01:00
- '(result.content | b64decode) == "ansible.http.tests:SUCCESS"'
2017-04-07 18:54:37 +02:00
when : has_httptester