From 7fda2ec85c42c9e08387e125e98200f103cbb0d3 Mon Sep 17 00:00:00 2001 From: Bertrand Lanson Date: Fri, 7 Jul 2023 18:14:56 +0200 Subject: [PATCH] remove old python tests --- molecule/default/tests/conftest.py | 22 --------- molecule/default/tests/test_default.py | 48 ------------------- molecule/with_custom_config/tests/conftest.py | 22 --------- .../with_custom_config/tests/test_default.py | 48 ------------------- 4 files changed, 140 deletions(-) delete mode 100644 molecule/default/tests/conftest.py delete mode 100644 molecule/default/tests/test_default.py delete mode 100644 molecule/with_custom_config/tests/conftest.py delete mode 100644 molecule/with_custom_config/tests/test_default.py diff --git a/molecule/default/tests/conftest.py b/molecule/default/tests/conftest.py deleted file mode 100644 index f7ddb3f..0000000 --- a/molecule/default/tests/conftest.py +++ /dev/null @@ -1,22 +0,0 @@ -"""PyTest Fixtures.""" -from __future__ import absolute_import - -import os - -import pytest - - -def pytest_runtest_setup(item): - """Run tests only when under molecule with testinfra installed.""" - try: - import testinfra - except ImportError: - pytest.skip("Test requires testinfra", allow_module_level=True) - if "MOLECULE_INVENTORY_FILE" in os.environ: - pytest.testinfra_hosts = testinfra.utils.ansible_runner.AnsibleRunner( - os.environ["MOLECULE_INVENTORY_FILE"] - ).get_hosts("all") - else: - pytest.skip( - "Test should run only from inside molecule.", allow_module_level=True - ) diff --git a/molecule/default/tests/test_default.py b/molecule/default/tests/test_default.py deleted file mode 100644 index 4392887..0000000 --- a/molecule/default/tests/test_default.py +++ /dev/null @@ -1,48 +0,0 @@ -"""Role testing files using testinfra.""" - - -def test_hosts_file(host): - """Validate /etc/hosts file.""" - etc_hosts = host.file("/etc/hosts") - assert etc_hosts.exists - assert etc_hosts.user == "root" - assert etc_hosts.group == "root" - -def test_consul_template_config(host): - """Validate /etc/consul-template.d/vault/ files.""" - etc_consul_template_d_vault_config_hcl = host.file("/etc/consul-template.d/vault/vault_config.hcl") - assert etc_consul_template_d_vault_config_hcl.exists - assert etc_consul_template_d_vault_config_hcl.user == "vault" - assert etc_consul_template_d_vault_config_hcl.group == "vault" - assert etc_consul_template_d_vault_config_hcl.mode == 0o600 - -def test_template_files(host): - """Validate /etc/consul-template.d/vault/templates/ files.""" - vault_cert_pem_tpl = host.file("/etc/consul-template.d/vault/templates/vault_cert.pem.tpl") - vault_key_pem_tpl = host.file("/etc/consul-template.d/vault/templates/vault_key.pem.tpl") - for file in vault_cert_pem_tpl, vault_key_pem_tpl: - assert file.exists - assert file.user == "vault" - assert file.group == "vault" - assert file.mode == 0o600 - assert vault_cert_pem_tpl.content_string == '{{ with secret "pki/issue/your-issuer" "common_name=vault01.example.com" "ttl=90d" "alt_names=localhost" "ip_sans=127.0.0.1,192.168.1.1" }}\n{{ .Data.certificate }}\n{{ .Data.issuing_ca }}\n{{ end }}\n' - assert vault_key_pem_tpl.content_string == '{{ with secret "pki/issue/your-issuer" "common_name=vault01.example.com" "ttl=90d" "alt_names=localhost" "ip_sans=127.0.0.1,192.168.1.1" }}\n{{ .Data.private_key }}\n{{ end }}\n' - -def test_vault_certs_service_file(host): - """Validate vault-certs service file.""" - etc_systemd_system_vault_certs_service = host.file("/etc/systemd/system/vault-certs.service") - assert etc_systemd_system_vault_certs_service.exists - assert etc_systemd_system_vault_certs_service.user == "root" - assert etc_systemd_system_vault_certs_service.group == "root" - assert etc_systemd_system_vault_certs_service.mode == 0o644 - assert etc_systemd_system_vault_certs_service.content_string != "" - -def test_vault_certs_service(host): - """Validate vault-certs service.""" - vault_certs_service = host.service("vault-certs.service") - assert vault_certs_service.is_enabled - assert not vault_certs_service.is_running - assert vault_certs_service.systemd_properties["Restart"] == "on-failure" - assert vault_certs_service.systemd_properties["User"] == "vault" - assert vault_certs_service.systemd_properties["Group"] == "vault" - assert vault_certs_service.systemd_properties["FragmentPath"] == "/etc/systemd/system/vault-certs.service" diff --git a/molecule/with_custom_config/tests/conftest.py b/molecule/with_custom_config/tests/conftest.py deleted file mode 100644 index f7ddb3f..0000000 --- a/molecule/with_custom_config/tests/conftest.py +++ /dev/null @@ -1,22 +0,0 @@ -"""PyTest Fixtures.""" -from __future__ import absolute_import - -import os - -import pytest - - -def pytest_runtest_setup(item): - """Run tests only when under molecule with testinfra installed.""" - try: - import testinfra - except ImportError: - pytest.skip("Test requires testinfra", allow_module_level=True) - if "MOLECULE_INVENTORY_FILE" in os.environ: - pytest.testinfra_hosts = testinfra.utils.ansible_runner.AnsibleRunner( - os.environ["MOLECULE_INVENTORY_FILE"] - ).get_hosts("all") - else: - pytest.skip( - "Test should run only from inside molecule.", allow_module_level=True - ) diff --git a/molecule/with_custom_config/tests/test_default.py b/molecule/with_custom_config/tests/test_default.py deleted file mode 100644 index 6460b92..0000000 --- a/molecule/with_custom_config/tests/test_default.py +++ /dev/null @@ -1,48 +0,0 @@ -"""Role testing files using testinfra.""" - - -def test_hosts_file(host): - """Validate /etc/hosts file.""" - etc_hosts = host.file("/etc/hosts") - assert etc_hosts.exists - assert etc_hosts.user == "root" - assert etc_hosts.group == "root" - -def test_consul_template_config(host): - """Validate /etc/consul-template.d/vault/ files.""" - etc_consul_template_d_vault_config_hcl = host.file("/etc/consul-template.d/vault/vault_config.hcl") - assert etc_consul_template_d_vault_config_hcl.exists - assert etc_consul_template_d_vault_config_hcl.user == "vault" - assert etc_consul_template_d_vault_config_hcl.group == "vault" - assert etc_consul_template_d_vault_config_hcl.mode == 0o600 - -def test_template_files(host): - """Validate /etc/consul-template.d/vault/templates/ files.""" - vault_cert_pem_tpl = host.file("/etc/consul-template.d/vault/templates/vault_cert.pem.tpl") - vault_key_pem_tpl = host.file("/etc/consul-template.d/vault/templates/vault_key.pem.tpl") - for file in vault_cert_pem_tpl, vault_key_pem_tpl: - assert file.exists - assert file.user == "vault" - assert file.group == "vault" - assert file.mode == 0o600 - assert vault_cert_pem_tpl.content_string == '{{ with secret "pki/issue/vault-issuer" "common_name=vault01.example.com" "ttl=90d" "alt_names=localhost,vault.service.consul,active.vault.service.consul,standby.vault.service.consul" "ip_sans=127.0.0.1,192.168.1.1" }}\n{{ .Data.certificate }}\n{{ .Data.issuing_ca }}\n{{ end }}\n' - assert vault_key_pem_tpl.content_string == '{{ with secret "pki/issue/vault-issuer" "common_name=vault01.example.com" "ttl=90d" "alt_names=localhost,vault.service.consul,active.vault.service.consul,standby.vault.service.consul" "ip_sans=127.0.0.1,192.168.1.1" }}\n{{ .Data.private_key }}\n{{ end }}\n' - -def test_vault_certs_service_file(host): - """Validate vault-certs service file.""" - etc_systemd_system_vault_certs_service = host.file("/etc/systemd/system/vault-certs.service") - assert etc_systemd_system_vault_certs_service.exists - assert etc_systemd_system_vault_certs_service.user == "root" - assert etc_systemd_system_vault_certs_service.group == "root" - assert etc_systemd_system_vault_certs_service.mode == 0o644 - assert etc_systemd_system_vault_certs_service.content_string != "" - -def test_vault_certs_service(host): - """Validate vault-certs service.""" - vault_certs_service = host.service("vault-certs.service") - assert vault_certs_service.is_enabled - assert not vault_certs_service.is_running - assert vault_certs_service.systemd_properties["Restart"] == "on-failure" - assert vault_certs_service.systemd_properties["User"] == "vault" - assert vault_certs_service.systemd_properties["Group"] == "vault" - assert vault_certs_service.systemd_properties["FragmentPath"] == "/etc/systemd/system/vault-certs.service"