a85750dc98
* Initial proposal for new parameter option for response format - output_version parameter dictates the response key case - new is snake_case, old is camelCase - If new, conversion is done at the end of module execution - This is purely a proposal and not a final draft * Add support for ANSIBLE_MERAKI_FORMAT env var - If env var is set to 'camelcase' it will output camelcase - Otherwise, will default to snakecase - Added note to documentation fragment - As of now, all module documentation needs to be updated * Fix pep8 errors and remove output_version args * Restructure check in exit_json so it actually works * Add changelog fragment * Change output_format to a parameter with env var fallback - ANSIBLE_MERAKI_FORMAT is the valid env var - Added documentation * Convert to camel_dict_to_snake_dict() which is from Ansible - Fixed integration tests * Fix yaml lint error * exit_json camel_case conversion handles no data - exit_json would fail if data wasn't provided - Updated 3 integration tests for new naming convention * convert_camel_to_snake() handles lists and dicts - The native Ansible method doesn't handle first level lists - convert_camel_to_snake() acts simply as a wrapper for the method - There maybe a situation where nested lists are a problem, must test - Fixed integration tests in some modules * A few integration test fixes * Convert response documentation to snake case
178 lines
3.9 KiB
YAML
178 lines
3.9 KiB
YAML
# Test code for the Meraki Organization module
|
|
# Copyright: (c) 2018, Kevin Breit (@kbreit)
|
|
|
|
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
|
|
---
|
|
- name: Test an API key is provided
|
|
fail:
|
|
msg: Please define an API key
|
|
when: auth_key is not defined
|
|
|
|
- name: Query all SNMP settings
|
|
meraki_snmp:
|
|
auth_key: '{{auth_key}}'
|
|
org_name: '{{test_org_name}}'
|
|
state: query
|
|
delegate_to: localhost
|
|
register: snmp_query
|
|
|
|
- debug:
|
|
msg: '{{snmp_query}}'
|
|
|
|
- name: Enable SNMPv2c
|
|
meraki_snmp:
|
|
auth_key: '{{auth_key}}'
|
|
org_name: '{{test_org_name}}'
|
|
state: present
|
|
v2c_enabled: true
|
|
delegate_to: localhost
|
|
register: snmp_v2_enable
|
|
|
|
- debug:
|
|
msg: '{{snmp_v2_enable}}'
|
|
|
|
- assert:
|
|
that:
|
|
- snmp_v2_enable.data.v2_community_string is defined
|
|
- snmp_v2_enable.data.v2c_enabled == true
|
|
|
|
- name: Disable SNMPv2c
|
|
meraki_snmp:
|
|
auth_key: '{{auth_key}}'
|
|
org_name: '{{test_org_name}}'
|
|
state: present
|
|
v2c_enabled: False
|
|
delegate_to: localhost
|
|
register: snmp_v2_disable
|
|
|
|
- assert:
|
|
that:
|
|
- snmp_v2_disable.data.v2_community_string is not defined
|
|
- snmp_v2_disable.data.v2c_enabled == False
|
|
|
|
- name: Enable SNMPv2c with org_id
|
|
meraki_snmp:
|
|
auth_key: '{{auth_key}}'
|
|
org_id: '{{test_org_id}}'
|
|
state: present
|
|
v2c_enabled: true
|
|
delegate_to: localhost
|
|
register: snmp_v2_enable_id
|
|
|
|
- debug:
|
|
msg: '{{snmp_v2_enable_id}}'
|
|
|
|
- assert:
|
|
that:
|
|
- snmp_v2_enable_id.data.v2_community_string is defined
|
|
- snmp_v2_enable_id.data.v2c_enabled == true
|
|
|
|
- name: Disable SNMPv2c with org_id
|
|
meraki_snmp:
|
|
auth_key: '{{auth_key}}'
|
|
org_id: '{{test_org_id}}'
|
|
state: present
|
|
v2c_enabled: False
|
|
delegate_to: localhost
|
|
register: snmp_v2_disable_id
|
|
|
|
- assert:
|
|
that:
|
|
- snmp_v2_disable_id.data.v2_community_string is not defined
|
|
- snmp_v2_disable_id.data.v2c_enabled == False
|
|
|
|
- name: Enable SNMPv3
|
|
meraki_snmp:
|
|
auth_key: '{{auth_key}}'
|
|
org_name: '{{test_org_name}}'
|
|
state: present
|
|
v3_enabled: true
|
|
v3_auth_mode: SHA
|
|
v3_auth_pass: ansiblepass
|
|
v3_priv_mode: AES128
|
|
v3_priv_pass: ansiblepass
|
|
delegate_to: localhost
|
|
register: snmp_v3_enable
|
|
|
|
- assert:
|
|
that:
|
|
- snmp_v3_enable.data.v3_enabled == True
|
|
- snmp_v3_enable.changed == True
|
|
|
|
- name: Check for idempotency
|
|
meraki_snmp:
|
|
auth_key: '{{auth_key}}'
|
|
org_name: '{{test_org_name}}'
|
|
state: present
|
|
v3_enabled: true
|
|
v3_auth_mode: SHA
|
|
v3_auth_pass: ansiblepass
|
|
v3_priv_mode: AES128
|
|
v3_priv_pass: ansiblepass
|
|
delegate_to: localhost
|
|
register: snmp_idempotent
|
|
|
|
- debug:
|
|
msg: '{{snmp_idempotent}}'
|
|
|
|
- assert:
|
|
that:
|
|
- snmp_idempotent.changed == False
|
|
- snmp_idempotent.data is defined
|
|
|
|
- name: Add peer IPs
|
|
meraki_snmp:
|
|
auth_key: '{{auth_key}}'
|
|
org_name: '{{test_org_name}}'
|
|
state: present
|
|
v3_enabled: true
|
|
v3_auth_mode: SHA
|
|
v3_auth_pass: ansiblepass
|
|
v3_priv_mode: AES128
|
|
v3_priv_pass: ansiblepass
|
|
peer_ips: 1.1.1.1;2.2.2.2
|
|
delegate_to: localhost
|
|
register: peers
|
|
|
|
- debug:
|
|
msg: '{{peers}}'
|
|
|
|
- assert:
|
|
that:
|
|
- peers.data.peer_ips is defined
|
|
|
|
- name: Add invalid peer IPs
|
|
meraki_snmp:
|
|
auth_key: '{{auth_key}}'
|
|
org_name: '{{test_org_name}}'
|
|
state: present
|
|
peer_ips: 1.1.1.1 2.2.2.2
|
|
delegate_to: localhost
|
|
register: invalid_peers
|
|
ignore_errors: yes
|
|
|
|
- assert:
|
|
that:
|
|
'"Peer IP addresses are semi-colon delimited." in invalid_peers.msg'
|
|
|
|
- name: Set short password
|
|
meraki_snmp:
|
|
auth_key: '{{auth_key}}'
|
|
org_name: '{{test_org_name}}'
|
|
state: present
|
|
v3_enabled: true
|
|
v3_auth_mode: SHA
|
|
v3_auth_pass: ansible
|
|
v3_priv_mode: AES128
|
|
v3_priv_pass: ansible
|
|
peer_ips: 1.1.1.1;2.2.2.2
|
|
delegate_to: localhost
|
|
register: short_password
|
|
ignore_errors: yes
|
|
|
|
- debug:
|
|
msg: '{{short_password}}'
|
|
|
|
- assert:
|
|
that:
|
|
- '"at least 8" in short_password.msg'
|