def test_firewall_interface_policy6_deletion_fails(mocker): schema_method_mock = mocker.patch( 'ansible_collections.fortinet.fortios.plugins.module_utils.network.fortios.fortios.FortiOSHandler.schema' ) delete_method_result = { 'status': 'error', 'http_method': 'POST', 'http_status': 500 } delete_method_mock = mocker.patch( 'ansible_collections.fortinet.fortios.plugins.module_utils.network.fortios.fortios.FortiOSHandler.delete', return_value=delete_method_result) input_data = { 'username': '******', 'state': 'absent', 'firewall_interface_policy6': { 'address_type': 'ipv4', 'application_list': 'test_value_4', 'application_list_status': 'enable', 'av_profile': 'test_value_6', 'av_profile_status': 'enable', 'comments': 'test_value_8', 'dlp_sensor': 'test_value_9', 'dlp_sensor_status': 'enable', 'dsri': 'enable', 'interface': 'test_value_12', 'ips_sensor': 'test_value_13', 'ips_sensor_status': 'enable', 'label': 'test_value_15', 'logtraffic': 'all', 'policyid': '17', 'scan_botnet_connections': 'disable', 'spamfilter_profile': 'test_value_19', 'spamfilter_profile_status': 'enable', 'status': 'enable', 'webfilter_profile': 'test_value_22', 'webfilter_profile_status': 'enable' }, 'vdom': 'root' } is_error, changed, response = fortios_firewall_interface_policy6.fortios_firewall( input_data, fos_instance) delete_method_mock.assert_called_with('firewall', 'interface-policy6', mkey=ANY, vdom='root') schema_method_mock.assert_not_called() assert is_error assert not changed assert response['status'] == 'error' assert response['http_status'] == 500
def test_firewall_interface_policy6_filter_foreign_attributes(mocker): schema_method_mock = mocker.patch( 'ansible_collections.fortinet.fortios.plugins.module_utils.network.fortios.fortios.FortiOSHandler.schema' ) set_method_result = { 'status': 'success', 'http_method': 'POST', 'http_status': 200 } set_method_mock = mocker.patch( 'ansible_collections.fortinet.fortios.plugins.module_utils.network.fortios.fortios.FortiOSHandler.set', return_value=set_method_result) input_data = { 'username': '******', 'state': 'present', 'firewall_interface_policy6': { 'random_attribute_not_valid': 'tag', 'address_type': 'ipv4', 'application_list': 'test_value_4', 'application_list_status': 'enable', 'av_profile': 'test_value_6', 'av_profile_status': 'enable', 'comments': 'test_value_8', 'dlp_sensor': 'test_value_9', 'dlp_sensor_status': 'enable', 'dsri': 'enable', 'interface': 'test_value_12', 'ips_sensor': 'test_value_13', 'ips_sensor_status': 'enable', 'label': 'test_value_15', 'logtraffic': 'all', 'policyid': '17', 'scan_botnet_connections': 'disable', 'spamfilter_profile': 'test_value_19', 'spamfilter_profile_status': 'enable', 'status': 'enable', 'webfilter_profile': 'test_value_22', 'webfilter_profile_status': 'enable' }, 'vdom': 'root' } is_error, changed, response = fortios_firewall_interface_policy6.fortios_firewall( input_data, fos_instance) expected_data = { 'address-type': 'ipv4', 'application-list': 'test_value_4', 'application-list-status': 'enable', 'av-profile': 'test_value_6', 'av-profile-status': 'enable', 'comments': 'test_value_8', 'dlp-sensor': 'test_value_9', 'dlp-sensor-status': 'enable', 'dsri': 'enable', 'interface': 'test_value_12', 'ips-sensor': 'test_value_13', 'ips-sensor-status': 'enable', 'label': 'test_value_15', 'logtraffic': 'all', 'policyid': '17', 'scan-botnet-connections': 'disable', 'spamfilter-profile': 'test_value_19', 'spamfilter-profile-status': 'enable', 'status': 'enable', 'webfilter-profile': 'test_value_22', 'webfilter-profile-status': 'enable' } set_method_mock.assert_called_with('firewall', 'interface-policy6', data=expected_data, vdom='root') schema_method_mock.assert_not_called() assert not is_error assert changed assert response['status'] == 'success' assert response['http_status'] == 200