Esempio n. 1
0
 def test_encrypt_string(self, mock_vault_editor, mock_setup_vault_secrets):
     mock_setup_vault_secrets.return_value = [('default',
                                               TextVaultSecret('password'))]
     cli = VaultCLI(
         args=['ansible-vault', 'encrypt_string', 'some string to encrypt'])
     cli.parse()
     cli.run()
Esempio n. 2
0
 def test_encrypt_missing_file_no_secret(self, mock_setup_vault_secrets):
     mock_setup_vault_secrets.return_value = []
     cli = VaultCLI(args=['ansible-vault', 'encrypt', '/dev/null/foo'])
     cli.parse()
     self.assertRaisesRegexp(errors.AnsibleOptionsError,
                             "A vault password is required to use Ansible's Vault",
                             cli.run)
Esempio n. 3
0
 def test_encrypt_missing_file_no_secret(self, mock_setup_vault_secrets):
     mock_setup_vault_secrets.return_value = []
     cli = VaultCLI(args=['ansible-vault', 'encrypt', '/dev/null/foo'])
     cli.parse()
     self.assertRaisesRegexp(errors.AnsibleOptionsError,
                             "A vault password is required to use Ansible's Vault",
                             cli.run)
Esempio n. 4
0
def run_ansible_vault(command, files):
    vault_password_file = VAULT_PASSWORD_FILENAME
    if os.path.exists(VAULT_PLAIN_PASSWORD_FILENAME):
        vault_password_file = VAULT_PLAIN_PASSWORD_FILENAME
    args = ['ansible-vault', command, '--vault-password-file={}'.format(vault_password_file,)] + files
    cli = VaultCLI(args)
    cli.parse()
    return cli.run()
Esempio n. 5
0
 def test_encrypt_string_prompt(self, mock_display, mock_vault_editor, mock_setup_vault_secrets):
     mock_setup_vault_secrets.return_value = [('default', TextVaultSecret('password'))]
     cli = VaultCLI(args=['ansible-vault',
                          'encrypt_string',
                          '--prompt',
                          'some string to encrypt'])
     cli.parse()
     cli.run()
Esempio n. 6
0
 def test_encrypt_string_more_args_than_names(self, mock_vault_editor, mock_setup_vault_secrets):
     mock_setup_vault_secrets.return_value = [('default', TextVaultSecret('password'))]
     cli = VaultCLI(args=['ansible-vault', 'encrypt_string',
                          '--name', 'foo1',
                          'some string to encrypt',
                          'other strings',
                          'a few more string args'])
     cli.parse()
     cli.run()
Esempio n. 7
0
 def test_encrypt_string_stdin(self, mock_stdin_read, mock_vault_editor, mock_setup_vault_secrets):
     mock_setup_vault_secrets.return_value = [('default', TextVaultSecret('password'))]
     cli = VaultCLI(args=['ansible-vault',
                          'encrypt_string',
                          '--stdin-name',
                          'the_var_from_stdin',
                          '-'])
     cli.parse()
     cli.run()
Esempio n. 8
0
 def test_encrypt_string_more_args_than_names(self, mock_vault_editor, mock_setup_vault_secrets):
     mock_setup_vault_secrets.return_value = [('default', TextVaultSecret('password'))]
     cli = VaultCLI(args=['ansible-vault', 'encrypt_string',
                          '--name', 'foo1',
                          'some string to encrypt',
                          'other strings',
                          'a few more string args'])
     cli.parse()
     cli.run()
Esempio n. 9
0
 def test_encrypt_string_stdin(self, mock_stdin_read, mock_vault_editor, mock_setup_vault_secrets):
     mock_setup_vault_secrets.return_value = [('default', TextVaultSecret('password'))]
     cli = VaultCLI(args=['ansible-vault',
                          'encrypt_string',
                          '--stdin-name',
                          'the_var_from_stdin',
                          '-'])
     cli.parse()
     cli.run()
Esempio n. 10
0
 def test_shadowed_encrypt_string_prompt(self, mock_display, mock_vault_editor, mock_setup_vault_secrets):
     mock_setup_vault_secrets.return_value = [('default', TextVaultSecret('password'))]
     cli = VaultCLI(args=['ansible-vault',
                          'encrypt_string',
                          '--prompt',
                          'some string to encrypt'])
     cli.parse()
     cli.run()
     args, kwargs = mock_display.call_args
     assert kwargs["private"]
Esempio n. 11
0
 def test_encrypt(self, mock_vault_editor, mock_setup_vault_secrets):
     mock_setup_vault_secrets.return_value = [('default', TextVaultSecret('password'))]
     cli = VaultCLI(args=['ansible-vault', 'encrypt', '/dev/null/foo'])
     cli.parse()
     cli.run()
Esempio n. 12
0
 def test_parse_view_file(self):
     cli = VaultCLI(args=['ansible-vault', 'view', '/dev/null/foo'])
     cli.parse()
Esempio n. 13
0
 def test_encrypt(self, mock_vault_editor, mock_setup_vault_secrets):
     mock_setup_vault_secrets.return_value = [('default', TextVaultSecret('password'))]
     cli = VaultCLI(args=['ansible-vault', 'encrypt', '/dev/null/foo'])
     cli.parse()
     cli.run()
Esempio n. 14
0
 def test_parse_view_file(self):
     cli = VaultCLI(args=['ansible-vault', 'view', '/dev/null/foo'])
     cli.parse()
Esempio n. 15
0
 def test_view_missing_file_no_secret(self):
     cli = VaultCLI(args=['ansible-vault', 'view', '/dev/null/foo'])
     cli.parse()
     self.assertRaisesRegexp(errors.AnsibleOptionsError,
                             "A vault password is required to use Ansible's Vault",
                             cli.run)