Skip to content

Commit

Permalink
[ignore] add fqcn to all tasks in testcases
Browse files Browse the repository at this point in the history
  • Loading branch information
akinross authored and lhercot committed Dec 20, 2023
1 parent 61b0904 commit 324327f
Show file tree
Hide file tree
Showing 221 changed files with 2,926 additions and 2,926 deletions.
28 changes: 14 additions & 14 deletions tests/integration/targets/aci_aaa_custom_privilege/tasks/main.yml
Original file line number Diff line number Diff line change
Expand Up @@ -4,13 +4,13 @@
# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)

- name: Test that we have an ACI APIC host, ACI username and ACI password
fail:
ansible.builtin.fail:
msg: 'Please define the following variables: aci_hostname, aci_username and aci_password.'
when: aci_hostname is not defined or aci_username is not defined or aci_password is not defined

# SET VARS
- name: Set vars
set_fact:
ansible.builtin.set_fact:
aci_info: &aci_info
host: '{{ aci_hostname }}'
username: '{{ aci_username }}'
Expand Down Expand Up @@ -47,7 +47,7 @@
register: cm_cp_present

- name: Assertions check for add a custom privilege with check mode
assert:
ansible.builtin.assert:
that:
- cm_cp_present is changed
- cm_cp_present.current | length == 0
Expand All @@ -63,7 +63,7 @@
register: nm_cp_present

- name: Assertions check for add a custom privilege with normal mode
assert:
ansible.builtin.assert:
that:
- nm_cp_present is changed
- nm_cp_present.current | length == 1
Expand All @@ -79,7 +79,7 @@
register: idempotency_cp_present

- name: Idempotency assertions check for add a custom privilege with normal mode
assert:
ansible.builtin.assert:
that:
- idempotency_cp_present is not changed
- idempotency_cp_present.current | length == 1
Expand All @@ -106,7 +106,7 @@
register: cp_with_none_priv

- name: Assertions check for add a custom privilege with none privileges
assert:
ansible.builtin.assert:
that:
- cp_with_none_priv is changed
- cp_with_none_priv.current | length == 1
Expand All @@ -123,7 +123,7 @@
register: update_cp_with_priv

- name: Assertions check for update fv_tenant_present custom privilege with 'custom-privilege-2' privilege
assert:
ansible.builtin.assert:
that:
- update_cp_with_priv is changed
- update_cp_with_priv.current | length == 1
Expand All @@ -141,7 +141,7 @@
register: update_cp_w_priv_check

- name: Assertions check for update fv_tenant_present - write_privilege to 'custom-privilege-3' privilege
assert:
ansible.builtin.assert:
that:
- update_cp_w_priv_check is changed
- update_cp_w_priv_check.current | length == 1
Expand All @@ -161,7 +161,7 @@
register: query_a_cp_with_name

- name: Assertions check for query a custom privilege with name
assert:
ansible.builtin.assert:
that:
- query_a_cp_with_name is not changed
- query_a_cp_with_name.current | length == 1
Expand All @@ -176,7 +176,7 @@
register: query_all_cp

- name: Assertions check for query all custom privileges
assert:
ansible.builtin.assert:
that:
- query_all_cp is not changed
- query_all_cp.current | length >= 2
Expand All @@ -190,7 +190,7 @@
register: cm_cp_absent

- name: Assertions check for remove a custom privilege with check mode
assert:
ansible.builtin.assert:
that:
- cm_cp_absent is changed
- cm_cp_absent.current | length == 1
Expand All @@ -204,7 +204,7 @@
register: nm_cp_absent

- name: Assertions check for remove a custom privilege with normal mode
assert:
ansible.builtin.assert:
that:
- nm_cp_absent is changed
- nm_cp_absent.current == []
Expand All @@ -217,7 +217,7 @@
register: idempotency_cp_absent

- name: Idempotency assertions check for remove a custom privilege with normal mode
assert:
ansible.builtin.assert:
that:
- idempotency_cp_absent is not changed
- idempotency_cp_absent.current == []
Expand All @@ -231,7 +231,7 @@
register: removed_cp_query_result

- name: Assertions check for Removed custom privilege with name
assert:
ansible.builtin.assert:
that:
- removed_cp_query_result is not changed
- removed_cp_query_result.current == []
36 changes: 18 additions & 18 deletions tests/integration/targets/aci_aaa_domain/tasks/main.yml
Original file line number Diff line number Diff line change
Expand Up @@ -4,13 +4,13 @@
# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt)

- name: Test that we have an ACI APIC host, ACI username and ACI password
fail:
ansible.builtin.fail:
msg: 'Please define the following variables: aci_hostname, aci_username and aci_password.'
when: aci_hostname is not defined or aci_username is not defined or aci_password is not defined

# SET VARS
- name: Set vars
set_fact:
ansible.builtin.set_fact:
aci_info: &aci_info
host: '{{ aci_hostname }}'
username: '{{ aci_username }}'
Expand Down Expand Up @@ -42,7 +42,7 @@
register: cm_sec_domain_present

- name: Assertions check for add anstest_sec_domain security domain with check mode
assert:
ansible.builtin.assert:
that:
- cm_sec_domain_present is changed
- cm_sec_domain_present.current | length == 0
Expand All @@ -55,15 +55,15 @@
register: nm_sec_domain_present

- name: Assertions check for add anstest_sec_domain security domain with normal mode
assert:
ansible.builtin.assert:
that:
- nm_sec_domain_present is changed
- nm_sec_domain_present.current | length == 1
- nm_sec_domain_present.previous | length == 0
- nm_sec_domain_present.current.0.aaaDomain.attributes.name == 'anstest_sec_domain'

- name: Assertions check for nm_sec_domain_present in v5.0+
assert:
ansible.builtin.assert:
that:
- nm_sec_domain_present.current.0.aaaDomain.attributes.restrictedRbacDomain == 'no'
when: version.current.0.topSystem.attributes.version is version('5', '>=')
Expand All @@ -74,7 +74,7 @@
register: idempotency_sec_domain_present

- name: Idempotency assertions check for add anstest_sec_domain security domain with normal mode
assert:
ansible.builtin.assert:
that:
- idempotency_sec_domain_present is not changed
- idempotency_sec_domain_present.current | length == 1
Expand All @@ -83,7 +83,7 @@
- idempotency_sec_domain_present.previous.0.aaaDomain.attributes.name == 'anstest_sec_domain'

- name: Assertions check for idempotency_sec_domain_present in v5.0+
assert:
ansible.builtin.assert:
that:
- idempotency_sec_domain_present.current.0.aaaDomain.attributes.restrictedRbacDomain == 'no'
- idempotency_sec_domain_present.previous.0.aaaDomain.attributes.restrictedRbacDomain == 'no'
Expand All @@ -99,7 +99,7 @@
register: update_sec_domain_present_true

- name: Assertions check for update anstest_sec_domain security domain restricted_rbac_domain state to true
assert:
ansible.builtin.assert:
that:
- update_sec_domain_present_true is changed
- update_sec_domain_present_true.current | length == 1
Expand All @@ -116,7 +116,7 @@
register: update_sec_domain_present_false

- name: Assertions check for update anstest_sec_domain security domain restricted_rbac_domain state to false
assert:
ansible.builtin.assert:
that:
- update_sec_domain_present_false is changed
- update_sec_domain_present_false.current | length == 1
Expand All @@ -134,15 +134,15 @@
register: query_sec_domain_with_name

- name: Assertions check for query a security domain with name
assert:
ansible.builtin.assert:
that:
- query_sec_domain_with_name is not changed
- query_sec_domain_with_name.current | length == 1
- query_sec_domain_with_name.current.0.aaaDomain.attributes.name == 'anstest_sec_domain'
- query_sec_domain_with_name.current.0.aaaDomain.attributes.descr == 'Anstest Sec Domain Descr'

- name: Assertions check for query_sec_domain_with_name in v5.0+
assert:
ansible.builtin.assert:
that:
- query_sec_domain_with_name.current.0.aaaDomain.attributes.restrictedRbacDomain == 'no'
when: version.current.0.topSystem.attributes.version is version('5', '>=')
Expand All @@ -154,7 +154,7 @@
register: query_all_sec_domains

- name: Assertions check for query all security domains
assert:
ansible.builtin.assert:
that:
- query_all_sec_domains is not changed
- query_all_sec_domains.current | length >= 1
Expand All @@ -167,7 +167,7 @@
register: cm_sec_domain_absent

- name: Assertions check for remove anstest_sec_domain security domain with check mode
assert:
ansible.builtin.assert:
that:
- cm_sec_domain_absent is changed
- cm_sec_domain_absent.current | length == 1
Expand All @@ -176,7 +176,7 @@
- cm_sec_domain_absent.previous.0.aaaDomain.attributes.name == 'anstest_sec_domain'

- name: Assertions check for cm_sec_domain_absent in v5.0+
assert:
ansible.builtin.assert:
that:
- cm_sec_domain_absent.current.0.aaaDomain.attributes.restrictedRbacDomain == 'no'
- cm_sec_domain_absent.previous.0.aaaDomain.attributes.restrictedRbacDomain == 'no'
Expand All @@ -188,15 +188,15 @@
register: nm_sec_domain_absent

- name: Assertions check for remove anstest_sec_domain security domain with normal mode
assert:
ansible.builtin.assert:
that:
- nm_sec_domain_absent is changed
- nm_sec_domain_absent.current | length == 0
- nm_sec_domain_absent.previous | length == 1
- nm_sec_domain_absent.previous.0.aaaDomain.attributes.name == 'anstest_sec_domain'

- name: Assertions check for nm_sec_domain_absent in v5.0+
assert:
ansible.builtin.assert:
that:
- nm_sec_domain_absent.previous.0.aaaDomain.attributes.restrictedRbacDomain == 'no'
when: version.current.0.topSystem.attributes.version is version('5', '>=')
Expand All @@ -207,7 +207,7 @@
register: idempotency_sec_domain_absent

- name: Idempotency assertions check for remove anstest_sec_domain security domain with normal mode
assert:
ansible.builtin.assert:
that:
- idempotency_sec_domain_absent is not changed
- idempotency_sec_domain_absent.current | length == 0
Expand All @@ -221,7 +221,7 @@
register: removed_sec_domain_with_name

- name: Assertions check for query a removed security domain with name
assert:
ansible.builtin.assert:
that:
- removed_sec_domain_with_name is not changed
- removed_sec_domain_with_name.current | length == 0
Loading

0 comments on commit 324327f

Please sign in to comment.