mirror of
https://github.com/valitydev/salt.git
synced 2024-11-08 01:18:58 +00:00
457d9dd4f5
* Add run_on_start docs to schedule.rst (#32958) Fixes #22580 * Backport #33021 manually to 2015.5 (#33044) * Saltfile with pillar tests (#33045) * add file.managed with pillar data tests * do not require git for other tests * Fix minor document error of test.assertion (#33067) * test pillar.items output (#33060) * File and User test fixes for 2015.5 on Fedora23 (#33055) * Fix file_test.test_symlink on 2015.5 * Fix failing user present test * add test for installing package while using salt-call --local (#33025) * add test for installing package while using salt-call --local * fix pylint * ssh docs: install py-2.6 for RHEL 5 * Bugfix: Restore boolean values from the repo configuration * Add test data for repos * Add repo config test * Bugfix (follow-up): setting priority requires non-positive integer * modules.npm: do not log npm --version at info level (#33084) * salt-cloud: fix ipv6-only virtual machines (#32865) * salt-cloud: fix ipv6-only virtual machines * fix hostname for rsync fallback in scp_file function * use 4 spaces instead of 2 * remove global variable, use direct socket call instead * Use saltstack repo in buildpackage.py on CentOS 5 (#33080) * Lower display of msgpack failure msg to debug (#33078) Closes #33074 * cloud.query needs to define mapper.opts (#33098) * clarify docs that map is designed to be run once. is not stateful (#33102) * Moved _finger_fail method to parent class. Method _finger_fail method from SAuth to AsyncAuth class to make method available in both class and fix an issue where _finger_Fail is called inside AsyncAuth. * Fix 33058 (#33099) * Fix servermanager module - Added check for 2008 version of windows - Added Import-Module ServerManager to _pshell_json. Apparently this needs to run each time we issue a servermanager command. * Fix list_available * salt.utils.gitfs: fix formatting for warning messages (#33064) * salt.utils.gitfs: fix formatting for warning messages When git_pillar support was added to salt.utils.gitfs, the recommendation globals had string formatting placeholders added to them, but the locations where these values are referenced do not call ``.format()`` to properly replace them. This commit fixes that oversight. * Remove more gitfs and master-specific wording from log messages * Add a check that the cmdline of the found proc matches (#33129) * Doc mock decorators (#33132) * Add mock function for mocking decorators * Mock the stdlib user module because importing it will open the repl * Fix broken parsing of usermgmt.conf on OpenBSD (#33135) When creating a new user, if a group of the same name already exists, the usermgmt.conf file is consulted to determine the primary group. It's in these cases that the parsing bug is triggered. This code change addresses several of the existing issues: - The previous split statement explicitly specified a single space. Since a config line may have any number of spaces and/or tabs surrounding the entries, the resulting array's elements may be incorrect. - According to the man pages for usermgmt.conf, the "group" config entry accpets a single parameter -- so we shouldn't iterate. - The "val[1]" was returning the 2nd letter of each word and not the second word on the config line as intended. * Move salt-ssh thin dir location to /var/tmp (#33130) * Move salt-ssh thin dir location to /var/tmp Closes #32771 * Remove performance penelty language * If cache_jobs: True is set, populate the local job cache when running salt-call (#33100) * If cache_jobs: True is set, populate the local job cache Fixes #32834 Allows a masterless minion to query the job cache. * Refactor cache_jobs functionality to be DRY * Skipping salt-call --local test * Back-port #31769 to 2015.8 (#33139) * Handle empty acl_name in linux_acl state Calls to setfacl interpret an empty group or user name to mean to be the owner of the file they're operating on. For example, for a directory owned by group 'admin', the ACL 'default:group::rwx' is equivalent to 'default:group:admin:rwx'. The output of the getfacl execution module returns ACLs in the format of 'group:admin:rwx' instead of 'group::rwx'. This commit changes the acl.present state to look for the owner of the file if the acl_name paremeter is empty. * Fix acl.present/acl.absent changing default ACLs The behaviour of the acl.present and acl.absent is to check the data structure returned by getfacl contains a key by the name of acl_type. However, this data structure does not contain any default ACLs if none exist, so this check will fail. We omit the check if a default ACL was passed into the state functions. Unfortunately, the call to modfacl may fail if the user passes in an acl_type such as 'default:random'. In this case the state will appear to succeed, but do nothing. This fixes the state module to allow setting default ACLs on files which have none. * Fix regression in 2016.3 HEAD when version is specified (#33146) Resolves #33013. * Hash fileclients by opts (#33142) * Hash fileclients by opts There was an issue whereby the cache of the fileclient was being overwritten by dueling minion instances in multimaster mode. This protects them by hashing by the id of opts. Closes #25040 * Silly typo! * Remove tests which do not test any actual functionality or are too tightly coupled to the implementation * Strip ldap fqdn (#33127) * Add option to strip off domain names on computer names that come from LDAP/AD * Add strip_domains option for ldap. * Add documentation for auth.ldap.minion_stripdomains. * [2015.5] Update to latest bootstrap script v2016.05.10 (#33155) * [2015.8] Update to latest bootstrap script v2016.05.10 (#33156) * [2016.3] Update to latest bootstrap script v2016.05.10 (#33157) * add 2015.5.11 release notes (#33160) * add 2015.8.9 release notes (#33161) * Pip fix (#33180) * fix pip!! * make it work with old pip as well * Added resiliency * Don't need to check, just get the right name * [2015.5] Update to latest bootstrap script v2016.05.11 (#33185)
419 lines
18 KiB
Python
419 lines
18 KiB
Python
# -*- coding: utf-8 -*-
|
|
'''
|
|
:codeauthor: :email:`Bo Maryniuk <bo@suse.de>`
|
|
'''
|
|
|
|
# Import Python Libs
|
|
from __future__ import absolute_import
|
|
|
|
# Import Salt Testing Libs
|
|
from salttesting import TestCase, skipIf
|
|
from salttesting.mock import (
|
|
MagicMock,
|
|
patch,
|
|
NO_MOCK,
|
|
NO_MOCK_REASON
|
|
)
|
|
from salt.exceptions import CommandExecutionError
|
|
|
|
import os
|
|
from salt.ext.six.moves import configparser
|
|
import StringIO
|
|
|
|
from salttesting.helpers import ensure_in_syspath
|
|
|
|
ensure_in_syspath('../../')
|
|
|
|
|
|
class ZyppCallMock(object):
|
|
def __init__(self, return_value=None):
|
|
self.__return_value = return_value
|
|
|
|
def __getattr__(self, item):
|
|
return self
|
|
|
|
def __call__(self, *args, **kwargs):
|
|
return MagicMock(return_value=self.__return_value)()
|
|
|
|
|
|
def get_test_data(filename):
|
|
'''
|
|
Return static test data
|
|
'''
|
|
return open(os.path.join(os.path.join(os.path.dirname(os.path.abspath(__file__)), 'zypp'), filename)).read()
|
|
|
|
|
|
# Import Salt Libs
|
|
from salt.modules import zypper
|
|
|
|
# Globals
|
|
zypper.__salt__ = dict()
|
|
zypper.__context__ = dict()
|
|
zypper.rpm = None
|
|
|
|
|
|
@skipIf(NO_MOCK, NO_MOCK_REASON)
|
|
class ZypperTestCase(TestCase):
|
|
'''
|
|
Test cases for salt.modules.zypper
|
|
'''
|
|
|
|
def test_list_upgrades(self):
|
|
'''
|
|
List package upgrades
|
|
:return:
|
|
'''
|
|
ref_out = {
|
|
'stdout': get_test_data('zypper-updates.xml'),
|
|
'stderr': None,
|
|
'retcode': 0
|
|
}
|
|
with patch.dict(zypper.__salt__, {'cmd.run_all': MagicMock(return_value=ref_out)}):
|
|
upgrades = zypper.list_upgrades(refresh=False)
|
|
self.assertEqual(len(upgrades), 3)
|
|
for pkg, version in {'SUSEConnect': '0.2.33-7.1',
|
|
'bind-utils': '9.9.6P1-35.1',
|
|
'bind-libs': '9.9.6P1-35.1'}.items():
|
|
self.assertIn(pkg, upgrades)
|
|
self.assertEqual(upgrades[pkg], version)
|
|
|
|
def test_zypper_caller(self):
|
|
'''
|
|
Test Zypper caller.
|
|
:return:
|
|
'''
|
|
class RunSniffer(object):
|
|
def __init__(self, stdout=None, stderr=None, retcode=None):
|
|
self.calls = list()
|
|
self._stdout = stdout or ''
|
|
self._stderr = stderr or ''
|
|
self._retcode = retcode or 0
|
|
|
|
def __call__(self, *args, **kwargs):
|
|
self.calls.append({'args': args, 'kwargs': kwargs})
|
|
return {'stdout': self._stdout,
|
|
'stderr': self._stderr,
|
|
'retcode': self._retcode}
|
|
|
|
stdout_xml_snippet = '<?xml version="1.0"?><test foo="bar"/>'
|
|
sniffer = RunSniffer(stdout=stdout_xml_snippet)
|
|
with patch.dict('salt.modules.zypper.__salt__', {'cmd.run_all': sniffer}):
|
|
self.assertEqual(zypper.__zypper__.call('foo'), stdout_xml_snippet)
|
|
self.assertEqual(len(sniffer.calls), 1)
|
|
|
|
zypper.__zypper__.call('bar')
|
|
self.assertEqual(len(sniffer.calls), 2)
|
|
self.assertEqual(sniffer.calls[0]['args'][0], ['zypper', '--non-interactive', '--no-refresh', 'foo'])
|
|
self.assertEqual(sniffer.calls[1]['args'][0], ['zypper', '--non-interactive', '--no-refresh', 'bar'])
|
|
|
|
dom = zypper.__zypper__.xml.call('xml-test')
|
|
self.assertEqual(sniffer.calls[2]['args'][0], ['zypper', '--non-interactive', '--xmlout',
|
|
'--no-refresh', 'xml-test'])
|
|
self.assertEqual(dom.getElementsByTagName('test')[0].getAttribute('foo'), 'bar')
|
|
|
|
zypper.__zypper__.refreshable.call('refresh-test')
|
|
self.assertEqual(sniffer.calls[3]['args'][0], ['zypper', '--non-interactive', 'refresh-test'])
|
|
|
|
zypper.__zypper__.nolock.call('no-locking-test')
|
|
self.assertEqual(sniffer.calls[4].get('kwargs', {}).get('env', {}).get('ZYPP_READONLY_HACK'), "1")
|
|
self.assertEqual(sniffer.calls[4].get('kwargs', {}).get('env', {}).get('SALT_RUNNING'), "1")
|
|
|
|
zypper.__zypper__.call('locking-test')
|
|
self.assertEqual(sniffer.calls[5].get('kwargs', {}).get('env', {}).get('ZYPP_READONLY_HACK'), None)
|
|
self.assertEqual(sniffer.calls[5].get('kwargs', {}).get('env', {}).get('SALT_RUNNING'), "1")
|
|
|
|
# Test exceptions
|
|
stdout_xml_snippet = '<?xml version="1.0"?><stream><message type="error">Booya!</message></stream>'
|
|
sniffer = RunSniffer(stdout=stdout_xml_snippet, retcode=1)
|
|
with patch.dict('salt.modules.zypper.__salt__', {'cmd.run_all': sniffer}):
|
|
with self.assertRaisesRegexp(CommandExecutionError, '^Zypper command failure: Booya!$'):
|
|
zypper.__zypper__.xml.call('crashme')
|
|
|
|
with self.assertRaisesRegexp(CommandExecutionError, "^Zypper command failure: Check Zypper's logs.$"):
|
|
zypper.__zypper__.call('crashme again')
|
|
|
|
zypper.__zypper__.noraise.call('stay quiet')
|
|
self.assertEqual(zypper.__zypper__.error_msg, "Check Zypper's logs.")
|
|
|
|
def test_list_upgrades_error_handling(self):
|
|
'''
|
|
Test error handling in the list package upgrades.
|
|
:return:
|
|
'''
|
|
# Test handled errors
|
|
ref_out = {
|
|
'stdout': '''<?xml version='1.0'?>
|
|
<stream>
|
|
<message type="info">Refreshing service 'container-suseconnect'.</message>
|
|
<message type="error">Some handled zypper internal error</message>
|
|
<message type="error">Another zypper internal error</message>
|
|
</stream>
|
|
''',
|
|
'stderr': '',
|
|
'retcode': 1,
|
|
}
|
|
with patch.dict('salt.modules.zypper.__salt__', {'cmd.run_all': MagicMock(return_value=ref_out)}):
|
|
with self.assertRaisesRegexp(CommandExecutionError,
|
|
"^Zypper command failure: Some handled zypper internal error\nAnother zypper internal error$"):
|
|
zypper.list_upgrades(refresh=False)
|
|
|
|
# Test unhandled error
|
|
ref_out = {
|
|
'retcode': 1,
|
|
'stdout': '',
|
|
'stderr': ''
|
|
}
|
|
with patch.dict('salt.modules.zypper.__salt__', {'cmd.run_all': MagicMock(return_value=ref_out)}):
|
|
with self.assertRaisesRegexp(CommandExecutionError, "^Zypper command failure: Check Zypper's logs.$"):
|
|
zypper.list_upgrades(refresh=False)
|
|
|
|
def test_list_products(self):
|
|
'''
|
|
List products test.
|
|
'''
|
|
for filename, test_data in {
|
|
'zypper-products-sle12sp1.xml': {
|
|
'name': ['SLES', 'SLES', 'SUSE-Manager-Proxy',
|
|
'SUSE-Manager-Server', 'sle-manager-tools-beta',
|
|
'sle-manager-tools-beta-broken-eol', 'sle-manager-tools-beta-no-eol'],
|
|
'vendor': 'SUSE LLC <https://www.suse.com/>',
|
|
'release': ['0', '0', '0', '0', '0', '0', '0'],
|
|
'productline': [False, False, False, False, False, False, 'sles'],
|
|
'eol_t': [None, 0, 1509408000, 1522454400, 1522454400, 1730332800, 1730332800],
|
|
'isbase': [False, False, False, False, False, False, True],
|
|
'installed': [False, False, False, False, False, False, True],
|
|
},
|
|
'zypper-products-sle11sp3.xml': {
|
|
'name': ['SUSE-Manager-Server', 'SUSE-Manager-Server', 'SUSE-Manager-Server-Broken-EOL',
|
|
'SUSE_SLES', 'SUSE_SLES', 'SUSE_SLES', 'SUSE_SLES-SP4-migration'],
|
|
'vendor': 'SUSE LINUX Products GmbH, Nuernberg, Germany',
|
|
'release': ['1.138', '1.2', '1.2', '1.2', '1.201', '1.201', '1.4'],
|
|
'productline': [False, False, False, False, False, 'manager', 'manager'],
|
|
'eol_t': [None, 0, 0, 0, 0, 0, 0],
|
|
'isbase': [False, False, False, False, False, True, True],
|
|
'installed': [False, False, False, False, False, True, True],
|
|
}}.items():
|
|
|
|
ref_out = {
|
|
'retcode': 0,
|
|
'stdout': get_test_data(filename)
|
|
}
|
|
|
|
with patch.dict(zypper.__salt__, {'cmd.run_all': MagicMock(return_value=ref_out)}):
|
|
products = zypper.list_products()
|
|
self.assertEqual(len(products), 7)
|
|
self.assertIn(test_data['vendor'], [product['vendor'] for product in products])
|
|
for kwd in ['name', 'isbase', 'installed', 'release', 'productline', 'eol_t']:
|
|
self.assertEqual(test_data[kwd], sorted([prod.get(kwd) for prod in products]))
|
|
|
|
def test_refresh_db(self):
|
|
'''
|
|
Test if refresh DB handled correctly
|
|
'''
|
|
ref_out = [
|
|
"Repository 'openSUSE-Leap-42.1-LATEST' is up to date.",
|
|
"Repository 'openSUSE-Leap-42.1-Update' is up to date.",
|
|
"Retrieving repository 'openSUSE-Leap-42.1-Update-Non-Oss' metadata",
|
|
"Forcing building of repository cache",
|
|
"Building repository 'openSUSE-Leap-42.1-Update-Non-Oss' cache ..........[done]",
|
|
"Building repository 'salt-dev' cache",
|
|
"All repositories have been refreshed."
|
|
]
|
|
|
|
run_out = {
|
|
'stderr': '', 'stdout': '\n'.join(ref_out), 'retcode': 0
|
|
}
|
|
|
|
with patch.dict(zypper.__salt__, {'cmd.run_all': MagicMock(return_value=run_out)}):
|
|
result = zypper.refresh_db()
|
|
self.assertEqual(result.get("openSUSE-Leap-42.1-LATEST"), False)
|
|
self.assertEqual(result.get("openSUSE-Leap-42.1-Update"), False)
|
|
self.assertEqual(result.get("openSUSE-Leap-42.1-Update-Non-Oss"), True)
|
|
|
|
def test_info_installed(self):
|
|
'''
|
|
Test the return information of the named package(s), installed on the system.
|
|
|
|
:return:
|
|
'''
|
|
run_out = {
|
|
'virgo-dummy':
|
|
{'build_date': '2015-07-09T10:55:19Z',
|
|
'vendor': 'openSUSE Build Service',
|
|
'description': 'This is the Virgo dummy package used for testing SUSE Manager',
|
|
'license': 'GPL-2.0', 'build_host': 'sheep05', 'url': 'http://www.suse.com',
|
|
'build_date_time_t': 1436432119, 'relocations': '(not relocatable)',
|
|
'source_rpm': 'virgo-dummy-1.0-1.1.src.rpm', 'install_date': '2016-02-23T16:31:57Z',
|
|
'install_date_time_t': 1456241517, 'summary': 'Virgo dummy package', 'version': '1.0',
|
|
'signature': 'DSA/SHA1, Thu Jul 9 08:55:33 2015, Key ID 27fa41bd8a7c64f9',
|
|
'release': '1.1', 'group': 'Applications/System', 'arch': 'noarch', 'size': '17992'},
|
|
|
|
'libopenssl1_0_0':
|
|
{'build_date': '2015-11-04T23:20:34Z', 'vendor': 'SUSE LLC <https://www.suse.com/>',
|
|
'description': 'The OpenSSL Project is a collaborative effort.',
|
|
'license': 'OpenSSL', 'build_host': 'sheep11', 'url': 'https://www.openssl.org/',
|
|
'build_date_time_t': 1446675634, 'relocations': '(not relocatable)',
|
|
'source_rpm': 'openssl-1.0.1i-34.1.src.rpm', 'install_date': '2016-02-23T16:31:35Z',
|
|
'install_date_time_t': 1456241495, 'summary': 'Secure Sockets and Transport Layer Security',
|
|
'version': '1.0.1i', 'signature': 'RSA/SHA256, Wed Nov 4 22:21:34 2015, Key ID 70af9e8139db7c82',
|
|
'release': '34.1', 'group': 'Productivity/Networking/Security', 'packager': 'https://www.suse.com/',
|
|
'arch': 'x86_64', 'size': '2576912'},
|
|
}
|
|
with patch.dict(zypper.__salt__, {'lowpkg.info': MagicMock(return_value=run_out)}):
|
|
installed = zypper.info_installed()
|
|
# Test overall products length
|
|
self.assertEqual(len(installed), 2)
|
|
|
|
# Test translated fields
|
|
for pkg_name, pkg_info in installed.items():
|
|
self.assertEqual(installed[pkg_name].get('source'), run_out[pkg_name]['source_rpm'])
|
|
|
|
# Test keys transition from the lowpkg.info
|
|
for pn_key, pn_val in run_out['virgo-dummy'].items():
|
|
if pn_key == 'source_rpm':
|
|
continue
|
|
self.assertEqual(installed['virgo-dummy'][pn_key], pn_val)
|
|
|
|
def test_info_available(self):
|
|
'''
|
|
Test return the information of the named package available for the system.
|
|
|
|
:return:
|
|
'''
|
|
test_pkgs = ['vim', 'emacs', 'python']
|
|
with patch('salt.modules.zypper.__zypper__', ZyppCallMock(return_value=get_test_data('zypper-available.txt'))):
|
|
available = zypper.info_available(*test_pkgs, refresh=False)
|
|
self.assertEqual(len(available), 3)
|
|
for pkg_name, pkg_info in available.items():
|
|
self.assertIn(pkg_name, test_pkgs)
|
|
|
|
self.assertEqual(available['emacs']['status'], 'up-to-date')
|
|
self.assertTrue(available['emacs']['installed'])
|
|
self.assertEqual(available['emacs']['support level'], 'Level 3')
|
|
self.assertEqual(available['emacs']['vendor'], 'SUSE LLC <https://www.suse.com/>')
|
|
self.assertEqual(available['emacs']['summary'], 'GNU Emacs Base Package')
|
|
|
|
self.assertEqual(available['vim']['status'], 'not installed')
|
|
self.assertFalse(available['vim']['installed'])
|
|
self.assertEqual(available['vim']['support level'], 'Level 3')
|
|
self.assertEqual(available['vim']['vendor'], 'SUSE LLC <https://www.suse.com/>')
|
|
self.assertEqual(available['vim']['summary'], 'Vi IMproved')
|
|
|
|
@patch('salt.modules.zypper.refresh_db', MagicMock(return_value=True))
|
|
def test_latest_version(self):
|
|
'''
|
|
Test the latest version of the named package available for upgrade or installation.
|
|
|
|
:return:
|
|
'''
|
|
with patch('salt.modules.zypper.__zypper__', ZyppCallMock(return_value=get_test_data('zypper-available.txt'))):
|
|
self.assertEqual(zypper.latest_version('vim'), '7.4.326-2.62')
|
|
|
|
@patch('salt.modules.zypper.refresh_db', MagicMock(return_value=True))
|
|
def test_upgrade_available(self):
|
|
'''
|
|
Test whether or not an upgrade is available for a given package.
|
|
|
|
:return:
|
|
'''
|
|
ref_out = get_test_data('zypper-available.txt')
|
|
with patch('salt.modules.zypper.__zypper__', ZyppCallMock(return_value=get_test_data('zypper-available.txt'))):
|
|
for pkg_name in ['emacs', 'python']:
|
|
self.assertFalse(zypper.upgrade_available(pkg_name))
|
|
self.assertTrue(zypper.upgrade_available('vim'))
|
|
|
|
def test_list_pkgs(self):
|
|
'''
|
|
Test packages listing.
|
|
|
|
:return:
|
|
'''
|
|
def _add_data(data, key, value):
|
|
data[key] = value
|
|
|
|
rpm_out = [
|
|
'protobuf-java_|-2.6.1_|-3.1.develHead_|-',
|
|
'yast2-ftp-server_|-3.1.8_|-8.1_|-',
|
|
'jose4j_|-0.4.4_|-2.1.develHead_|-',
|
|
'apache-commons-cli_|-1.2_|-1.233_|-',
|
|
'jakarta-commons-discovery_|-0.4_|-129.686_|-',
|
|
'susemanager-build-keys-web_|-12.0_|-5.1.develHead_|-',
|
|
]
|
|
with patch.dict(zypper.__salt__, {'cmd.run': MagicMock(return_value=os.linesep.join(rpm_out))}):
|
|
with patch.dict(zypper.__salt__, {'pkg_resource.add_pkg': _add_data}):
|
|
with patch.dict(zypper.__salt__, {'pkg_resource.sort_pkglist': MagicMock()}):
|
|
with patch.dict(zypper.__salt__, {'pkg_resource.stringify': MagicMock()}):
|
|
pkgs = zypper.list_pkgs()
|
|
for pkg_name, pkg_version in {
|
|
'jakarta-commons-discovery': '0.4-129.686',
|
|
'yast2-ftp-server': '3.1.8-8.1',
|
|
'protobuf-java': '2.6.1-3.1.develHead',
|
|
'susemanager-build-keys-web': '12.0-5.1.develHead',
|
|
'apache-commons-cli': '1.2-1.233',
|
|
'jose4j': '0.4.4-2.1.develHead'}.items():
|
|
self.assertTrue(pkgs.get(pkg_name))
|
|
self.assertEqual(pkgs[pkg_name], pkg_version)
|
|
|
|
def test_remove_purge(self):
|
|
'''
|
|
Test package removal
|
|
:return:
|
|
'''
|
|
class ListPackages(object):
|
|
def __init__(self):
|
|
self._packages = ['vim', 'pico']
|
|
self._pkgs = {
|
|
'vim': '0.18.0',
|
|
'emacs': '24.0.1',
|
|
'pico': '0.1.1',
|
|
}
|
|
|
|
def __call__(self):
|
|
pkgs = self._pkgs.copy()
|
|
for target in self._packages:
|
|
if self._pkgs.get(target):
|
|
del self._pkgs[target]
|
|
|
|
return pkgs
|
|
|
|
parsed_targets = [{'vim': None, 'pico': None}, None]
|
|
cmd_out = {
|
|
'retcode': 0,
|
|
'stdout': '',
|
|
'stderr': ''
|
|
}
|
|
|
|
with patch.dict(zypper.__salt__, {'cmd.run_all': MagicMock(return_value=cmd_out)}):
|
|
with patch.dict(zypper.__salt__, {'pkg_resource.parse_targets': MagicMock(return_value=parsed_targets)}):
|
|
with patch.dict(zypper.__salt__, {'pkg_resource.stringify': MagicMock()}):
|
|
with patch('salt.modules.zypper.list_pkgs', ListPackages()):
|
|
diff = zypper.remove(name='vim,pico')
|
|
for pkg_name in ['vim', 'pico']:
|
|
self.assertTrue(diff.get(pkg_name))
|
|
self.assertTrue(diff[pkg_name]['old'])
|
|
self.assertFalse(diff[pkg_name]['new'])
|
|
|
|
def test_repo_value_info(self):
|
|
'''
|
|
Tests if repo info is properly parsed.
|
|
|
|
:return:
|
|
'''
|
|
repos_cfg = configparser.ConfigParser()
|
|
for cfg in ['zypper-repo-1.cfg', 'zypper-repo-2.cfg']:
|
|
repos_cfg.readfp(StringIO.StringIO(get_test_data(cfg)))
|
|
|
|
for alias in repos_cfg.sections():
|
|
r_info = zypper._get_repo_info(alias, repos_cfg=repos_cfg)
|
|
self.assertEqual(type(r_info['type']), type(None))
|
|
self.assertEqual(type(r_info['enabled']), bool)
|
|
self.assertEqual(type(r_info['autorefresh']), bool)
|
|
self.assertEqual(type(r_info['baseurl']), str)
|
|
self.assertEqual(r_info['type'], None)
|
|
self.assertEqual(r_info['enabled'], alias == 'SLE12-SP1-x86_64-Update')
|
|
self.assertEqual(r_info['autorefresh'], alias == 'SLE12-SP1-x86_64-Update')
|
|
|
|
if __name__ == '__main__':
|
|
from integration import run_tests
|
|
run_tests(ZypperTestCase, needs_daemon=False)
|