ansible/test/integration
2014-06-12 13:14:01 -05:00
..
group_vars First pass at ec2 module tests 2014-02-26 16:43:30 -05:00
host_vars Adding an integration test for variable precedence 2014-05-09 11:42:57 -05:00
roles Bugfix to lineinfile to properly handle files with no newline at EOF when using insertafter=EOF. 2014-06-09 19:58:45 +03:00
vars Added integration tests for encrypted vars 2014-05-21 21:06:47 +02:00
all.yml
amazon.yml Added an integration test for the ec2_asg module 2014-06-05 16:18:31 -05:00
check_mode.yml
cleanup_ec2.py Added an integration test for the ec2_asg module 2014-06-05 16:18:31 -05:00
credentials.template Update credentials.yml documentation and handling 2014-03-18 10:17:44 -04:00
destructive.yml Add integration test for apt_repository 2014-03-14 13:07:12 -04:00
integration_config.yml Rename tests to test, use old directory name. 2014-02-20 19:11:15 -05:00
inventory Adding an integration test for the ec2_elb module 2014-04-28 20:37:08 -05:00
inventory.group_by Add integration tests for group_by module. Fixed bug introduced by ansible/ansible#7273 while also fixing issue described in ansible/ansible#6953 2014-05-06 22:30:37 -04:00
inventory.handlers Ensure handlers run when meta tasks are defined and add handler integration tests 2014-03-25 13:33:52 -04:00
Makefile Fixing typo in integration Makefile from an earlier change 2014-06-12 13:14:01 -05:00
non_destructive.yml Fixing some parsing issues in authorized_key module 2014-04-02 15:02:54 -05:00
rackspace.yml
README.md Update credentials.yml documentation and handling 2014-03-18 10:17:44 -04:00
test_group_by.yml Add integration tests for group_by module. Fixed bug introduced by ansible/ansible#7273 while also fixing issue described in ansible/ansible#6953 2014-05-06 22:30:37 -04:00
test_handlers.yml Correct issue of handlers running on all hosts incorrectly 2014-05-27 12:03:08 -05:00
test_hash.yml
test_setup.yml
test_var_precedence.yml Adding an integration test for variable precedence 2014-05-09 11:42:57 -05:00
test_vault.yml Change name of vault integration test 2014-06-10 10:07:50 -05:00
vars_file.yml
vault-password Added integration tests for encrypted vars 2014-05-21 21:06:47 +02:00

Integration tests

The ansible integration system.

Tests for playbooks, by playbooks.

Some tests may require credentials. Credentials may be specified with credentials.yml.

Tests should be run as root.

Configuration

Making your own version of integration_config.yml can allow for setting some tunable parameters to help run the tests better in your environment. Some tests (e.g. cloud) will only run when access credentials are provided. For more information about supported credentials, refer to credentials.template.

Prerequisites

The tests will assume things like hg, svn, and git are installed and in path.

(Complete list pending)

Non-destructive Tests

These tests will modify files in subdirectories, but will not do things that install or remove packages or things outside of those test subdirectories. They will also not reconfigure or bounce system services.

Run as follows:

make non_destructive

You can select specific tests with the --tags parameter.

TEST_FLAGS="--tags test_vars_blending" make

Destructive Tests

These tests are allowed to install and remove some trivial packages. You will likely want to devote these to a virtual environment. They won't reformat your filesystem, however :)

make destructive

Cloud Tests

Cloud tests exercise capabilities of cloud modules (e.g. ec2_key). These are not 'tests run in the cloud' so much as tests that leverage the cloud modules and are organized by cloud provider.

In order to run cloud tests, you must provide access credentials in a file named credentials.yml. A sample credentials file named credentials.template is available for syntax help.

Provide cloud credentials: cp credentials.template credentials.yml ${EDITOR:-vi} credentials.yml

Run the tests: make cloud

WARNING running cloud integration tests will create and destroy cloud resources. Running these tests may result in additional fees associated with your cloud account. Care is taken to ensure that created resources are removed. However, it is advisable to inspect your AWS console to ensure no unexpected resources are running.