Pluribus Networks log audit exception module with unit test cases (#60456)
* Pluribus Networks log audit exception module with unit test cases * Documentation fix
This commit is contained in:
parent
e7cb2ddc9c
commit
adb8a0ddc6
2 changed files with 266 additions and 0 deletions
204
lib/ansible/modules/network/netvisor/pn_log_audit_exception.py
Normal file
204
lib/ansible/modules/network/netvisor/pn_log_audit_exception.py
Normal file
|
@ -0,0 +1,204 @@
|
||||||
|
#!/usr/bin/python
|
||||||
|
# Copyright: (c) 2018, Pluribus Networks
|
||||||
|
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/license/gpl-3.0.txt)
|
||||||
|
|
||||||
|
from __future__ import absolute_import, division, print_function
|
||||||
|
__metaclass__ = type
|
||||||
|
|
||||||
|
|
||||||
|
ANSIBLE_METADATA = {'metadata_version': '1.1',
|
||||||
|
'status': ['preview'],
|
||||||
|
'supported_by': 'community'}
|
||||||
|
|
||||||
|
|
||||||
|
DOCUMENTATION = """
|
||||||
|
---
|
||||||
|
module: pn_log_audit_exception
|
||||||
|
author: "Pluribus Networks (@rajaspachipulusu17)"
|
||||||
|
version_added: "2.9"
|
||||||
|
short_description: CLI command to create/delete an audit exception
|
||||||
|
description:
|
||||||
|
- This module can be used to create an audit exception and delete an audit exception.
|
||||||
|
options:
|
||||||
|
pn_cliswitch:
|
||||||
|
description:
|
||||||
|
- Target switch to run the CLI on.
|
||||||
|
required: false
|
||||||
|
type: str
|
||||||
|
pn_audit_type:
|
||||||
|
description:
|
||||||
|
- Specify the type of audit exception.
|
||||||
|
required: false
|
||||||
|
type: str
|
||||||
|
choices: ['cli', 'shell', 'vtysh']
|
||||||
|
state:
|
||||||
|
description:
|
||||||
|
- State the action to perform. Use 'present' to create audit-exception and
|
||||||
|
'absent' to delete audit-exception.
|
||||||
|
required: false
|
||||||
|
type: str
|
||||||
|
choices: ['present', 'absent']
|
||||||
|
default: 'present'
|
||||||
|
pn_pattern:
|
||||||
|
description:
|
||||||
|
- Specify a regular expression to match exceptions.
|
||||||
|
required: false
|
||||||
|
type: str
|
||||||
|
pn_scope:
|
||||||
|
description:
|
||||||
|
- scope - local or fabric.
|
||||||
|
required: false
|
||||||
|
type: str
|
||||||
|
choices: ['local', 'fabric']
|
||||||
|
pn_access:
|
||||||
|
description:
|
||||||
|
- Specify the access type to match exceptions.
|
||||||
|
required: true
|
||||||
|
type: str
|
||||||
|
choices: ['any', 'read-only', 'read-write']
|
||||||
|
"""
|
||||||
|
|
||||||
|
EXAMPLES = """
|
||||||
|
- name: create a log-audit-exception
|
||||||
|
pn_log_audit_exception:
|
||||||
|
pn_audit_type: "cli"
|
||||||
|
pn_pattern: "test"
|
||||||
|
state: "present"
|
||||||
|
pn_access: "any"
|
||||||
|
pn_scope: "local"
|
||||||
|
|
||||||
|
- name: delete a log-audit-exception
|
||||||
|
pn_log_audit_exception:
|
||||||
|
pn_audit_type: "shell"
|
||||||
|
pn_pattern: "test"
|
||||||
|
state: "absent"
|
||||||
|
pn_access: "any"
|
||||||
|
"""
|
||||||
|
|
||||||
|
RETURN = """
|
||||||
|
command:
|
||||||
|
description: the CLI command run on the target node.
|
||||||
|
returned: always
|
||||||
|
type: str
|
||||||
|
stdout:
|
||||||
|
description: set of responses from the pn_log_audit_exceptions command.
|
||||||
|
returned: always
|
||||||
|
type: list
|
||||||
|
stderr:
|
||||||
|
description: set of error responses from the log_audit_exceptions command.
|
||||||
|
returned: on error
|
||||||
|
type: list
|
||||||
|
changed:
|
||||||
|
description: indicates whether the CLI caused changes on the target.
|
||||||
|
returned: always
|
||||||
|
type: bool
|
||||||
|
"""
|
||||||
|
|
||||||
|
from ansible.module_utils.basic import AnsibleModule
|
||||||
|
from ansible.module_utils.network.netvisor.pn_nvos import pn_cli, run_cli
|
||||||
|
from ansible.module_utils.network.netvisor.netvisor import run_commands
|
||||||
|
|
||||||
|
|
||||||
|
def check_cli(module, cli):
|
||||||
|
"""
|
||||||
|
This method checks for idempotency using the log-audit-exception command.
|
||||||
|
If a list with given name exists, return exists as True else False.
|
||||||
|
:param module: The Ansible module to fetch input parameters.
|
||||||
|
:return Booleans: True or False.
|
||||||
|
"""
|
||||||
|
state = module.params['state']
|
||||||
|
audit_type = module.params['pn_audit_type']
|
||||||
|
pattern = module.params['pn_pattern']
|
||||||
|
access = module.params['pn_access']
|
||||||
|
scope = module.params['pn_scope']
|
||||||
|
cli += ' log-audit-exception-show'
|
||||||
|
cli += ' no-show-headers format '
|
||||||
|
cli += ' type,pattern,access,scope parsable-delim DELIM'
|
||||||
|
|
||||||
|
stdout = run_commands(module, cli)[1]
|
||||||
|
|
||||||
|
if stdout:
|
||||||
|
linelist = stdout.strip().split('\n')
|
||||||
|
for line in linelist:
|
||||||
|
wordlist = line.split('DELIM')
|
||||||
|
count = 0
|
||||||
|
|
||||||
|
if wordlist[0] == audit_type:
|
||||||
|
count += 1
|
||||||
|
if wordlist[1] == pattern:
|
||||||
|
count += 1
|
||||||
|
if wordlist[2] == access:
|
||||||
|
count += 1
|
||||||
|
if state == 'present' and wordlist[3] == scope:
|
||||||
|
count += 1
|
||||||
|
elif state == 'absent' and count == 3:
|
||||||
|
return True
|
||||||
|
if state == 'present' and count == 4:
|
||||||
|
return True
|
||||||
|
|
||||||
|
return False
|
||||||
|
|
||||||
|
|
||||||
|
def main():
|
||||||
|
""" This section is for arguments parsing """
|
||||||
|
|
||||||
|
state_map = dict(
|
||||||
|
present='log-audit-exception-create',
|
||||||
|
absent='log-audit-exception-delete',
|
||||||
|
)
|
||||||
|
|
||||||
|
argument_spec = dict(
|
||||||
|
pn_cliswitch=dict(required=False, type='str'),
|
||||||
|
pn_pattern=dict(required=True, type='str'),
|
||||||
|
state=dict(required=False, type='str',
|
||||||
|
choices=state_map.keys(), default='present'),
|
||||||
|
pn_access=dict(required=True, type='str', choices=['any', 'read-only', 'read-write']),
|
||||||
|
pn_audit_type=dict(required=True, type='str', choices=['cli', 'shell', 'vtysh']),
|
||||||
|
pn_scope=dict(required=False, type='str', choices=['local', 'fabric']),
|
||||||
|
)
|
||||||
|
|
||||||
|
module = AnsibleModule(
|
||||||
|
argument_spec=argument_spec,
|
||||||
|
required_if=(
|
||||||
|
["state", "present", ["pn_scope"]],
|
||||||
|
),
|
||||||
|
)
|
||||||
|
|
||||||
|
# Accessing the arguments
|
||||||
|
|
||||||
|
cliswitch = module.params['pn_cliswitch']
|
||||||
|
state = module.params['state']
|
||||||
|
access = module.params['pn_access']
|
||||||
|
audit_type = module.params['pn_audit_type']
|
||||||
|
pattern = module.params['pn_pattern']
|
||||||
|
scope = module.params['pn_scope']
|
||||||
|
|
||||||
|
command = state_map[state]
|
||||||
|
|
||||||
|
# Building the CLI command string
|
||||||
|
cli = pn_cli(module, cliswitch)
|
||||||
|
|
||||||
|
audit_log_exists = check_cli(module, cli)
|
||||||
|
|
||||||
|
cli += ' %s %s pattern %s %s' % (command, audit_type, pattern, access)
|
||||||
|
|
||||||
|
if state == 'absent':
|
||||||
|
if audit_log_exists is False:
|
||||||
|
module.exit_json(
|
||||||
|
skipped=True,
|
||||||
|
msg='This audit log exception entry does not exist'
|
||||||
|
)
|
||||||
|
run_cli(module, cli, state_map)
|
||||||
|
|
||||||
|
elif state == 'present':
|
||||||
|
if audit_log_exists is True:
|
||||||
|
module.exit_json(
|
||||||
|
skipped=True,
|
||||||
|
msg='This audit log exception entry already exists'
|
||||||
|
)
|
||||||
|
cli += ' scope %s ' % scope
|
||||||
|
run_cli(module, cli, state_map)
|
||||||
|
|
||||||
|
|
||||||
|
if __name__ == '__main__':
|
||||||
|
main()
|
|
@ -0,0 +1,62 @@
|
||||||
|
# Copyright: (c) 2018, Pluribus Networks
|
||||||
|
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
|
||||||
|
|
||||||
|
from __future__ import (absolute_import, division, print_function)
|
||||||
|
__metaclass__ = type
|
||||||
|
|
||||||
|
import json
|
||||||
|
|
||||||
|
from units.compat.mock import patch
|
||||||
|
from ansible.modules.network.netvisor import pn_log_audit_exception
|
||||||
|
from units.modules.utils import set_module_args
|
||||||
|
from .nvos_module import TestNvosModule, load_fixture
|
||||||
|
|
||||||
|
|
||||||
|
class TestLogAuditExceptionModule(TestNvosModule):
|
||||||
|
|
||||||
|
module = pn_log_audit_exception
|
||||||
|
|
||||||
|
def setUp(self):
|
||||||
|
self.mock_run_nvos_commands = patch('ansible.modules.network.netvisor.pn_log_audit_exception.run_cli')
|
||||||
|
self.run_nvos_commands = self.mock_run_nvos_commands.start()
|
||||||
|
|
||||||
|
self.mock_run_check_cli = patch('ansible.modules.network.netvisor.pn_log_audit_exception.check_cli')
|
||||||
|
self.run_check_cli = self.mock_run_check_cli.start()
|
||||||
|
|
||||||
|
def tearDown(self):
|
||||||
|
self.mock_run_nvos_commands.stop()
|
||||||
|
self.mock_run_check_cli.stop()
|
||||||
|
|
||||||
|
def run_cli_patch(self, module, cli, state_map):
|
||||||
|
if state_map['present'] == 'log-audit-exception-create':
|
||||||
|
results = dict(
|
||||||
|
changed=True,
|
||||||
|
cli_cmd=cli
|
||||||
|
)
|
||||||
|
elif state_map['absent'] == 'log-audit-exception-delete':
|
||||||
|
results = dict(
|
||||||
|
changed=True,
|
||||||
|
cli_cmd=cli
|
||||||
|
)
|
||||||
|
module.exit_json(**results)
|
||||||
|
|
||||||
|
def load_fixtures(self, commands=None, state=None, transport='cli'):
|
||||||
|
self.run_nvos_commands.side_effect = self.run_cli_patch
|
||||||
|
if state == 'present':
|
||||||
|
self.run_check_cli.return_value = False
|
||||||
|
if state == 'absent':
|
||||||
|
self.run_check_cli.return_value = True
|
||||||
|
|
||||||
|
def test_log_audit_exception_create(self):
|
||||||
|
set_module_args({'pn_cliswitch': 'sw01', 'pn_audit_type': 'cli',
|
||||||
|
'pn_pattern': 'test', 'pn_scope': 'local', 'pn_access': 'any', 'state': 'present'})
|
||||||
|
result = self.execute_module(changed=True, state='present')
|
||||||
|
expected_cmd = ' switch sw01 log-audit-exception-create cli pattern test any scope local '
|
||||||
|
self.assertEqual(result['cli_cmd'], expected_cmd)
|
||||||
|
|
||||||
|
def test_log_audit_exception_delete(self):
|
||||||
|
set_module_args({'pn_cliswitch': 'sw01', 'pn_audit_type': 'cli',
|
||||||
|
'pn_pattern': 'test', 'pn_access': 'any', 'state': 'absent'})
|
||||||
|
result = self.execute_module(changed=True, state='absent')
|
||||||
|
expected_cmd = ' switch sw01 log-audit-exception-delete cli pattern test any'
|
||||||
|
self.assertEqual(result['cli_cmd'], expected_cmd)
|
Loading…
Reference in a new issue