id int64 0 458k | file_name stringlengths 4 119 | file_path stringlengths 14 227 | content stringlengths 24 9.96M | size int64 24 9.96M | language stringclasses 1
value | extension stringclasses 14
values | total_lines int64 1 219k | avg_line_length float64 2.52 4.63M | max_line_length int64 5 9.91M | alphanum_fraction float64 0 1 | repo_name stringlengths 7 101 | repo_stars int64 100 139k | repo_forks int64 0 26.4k | repo_open_issues int64 0 2.27k | repo_license stringclasses 12
values | repo_extraction_date stringclasses 433
values |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
13,500 | mytests2.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/test/mytests2.py | from __future__ import annotations
def testtest(data):
return data == 'from_user2'
class TestModule(object):
def tests(self):
return {
'testtest2': testtest
}
| 199 | Python | .py | 8 | 18.875 | 34 | 0.625668 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,501 | mytests.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/test/mytests.py | from __future__ import annotations
def testtest(data):
return data == 'from_user'
class TestModule(object):
def tests(self):
return {
'testtest': testtest
}
| 197 | Python | .py | 8 | 18.625 | 34 | 0.621622 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,502 | my_subdir_tests.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/test/test_subdir/my_subdir_tests.py | from __future__ import annotations
def subdir_test(data):
return data == 'subdir_from_user'
class TestModule(object):
def tests(self):
return {
'subdir_test': subdir_test
}
| 213 | Python | .py | 8 | 20.625 | 38 | 0.631841 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,503 | custom_vars.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/vars/custom_vars.py | # Copyright 2019 RedHat, inc
#
# This file is part of Ansible
#
# Ansible is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# Ansible is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
#############################################
from __future__ import annotations
DOCUMENTATION = """
vars: custom_vars
version_added: "2.10"
short_description: load host and group vars
description: test loading host and group vars from a collection
options:
stage:
choices: ['all', 'inventory', 'task']
type: str
ini:
- key: stage
section: custom_vars
env:
- name: ANSIBLE_VARS_PLUGIN_STAGE
"""
from ansible.plugins.vars import BaseVarsPlugin
class VarsModule(BaseVarsPlugin):
# Vars plugins in collections are only loaded when they are enabled by the user.
# If a vars plugin sets REQUIRES_ENABLED = False, a warning should occur (assuming it is loaded).
REQUIRES_ENABLED = False
def get_vars(self, loader, path, entities, cache=True):
super(VarsModule, self).get_vars(loader, path, entities)
return {'collection': 'collection_root_user'}
| 1,651 | Python | .py | 41 | 36.146341 | 101 | 0.700748 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,504 | uses_redirected_import.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/action/uses_redirected_import.py | from __future__ import annotations
from ansible.plugins.action import ActionBase
from ansible.module_utils.formerly_core import thingtocall
class ActionModule(ActionBase):
TRANSFERS_FILES = False
_VALID_ARGS = frozenset()
def run(self, tmp=None, task_vars=None):
if task_vars is None:
task_vars = dict()
result = super(ActionModule, self).run(None, task_vars)
result = dict(changed=False, ttc_res=thingtocall())
return result
| 489 | Python | .py | 12 | 34.5 | 63 | 0.706383 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,505 | subclassed_normal.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/action/subclassed_normal.py | from __future__ import annotations
from ansible.plugins.action.normal import ActionModule as NormalAction
class ActionModule(NormalAction):
def run(self, *args, **kwargs):
result = super(ActionModule, self).run(*args, **kwargs)
result['hacked'] = 'I got run under a subclassed normal, yay'
return result
| 335 | Python | .py | 7 | 42.428571 | 70 | 0.72 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,506 | bypass_host_loop.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/action/bypass_host_loop.py | # Copyright: (c) 2020, Ansible Project
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
from __future__ import annotations
from ansible.plugins.action import ActionBase
class ActionModule(ActionBase):
BYPASS_HOST_LOOP = True
def run(self, tmp=None, task_vars=None):
result = super(ActionModule, self).run(tmp, task_vars)
result['bypass_inventory_hostname'] = task_vars['inventory_hostname']
return result
| 487 | Python | .py | 10 | 43.9 | 92 | 0.730361 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,507 | plugin_lookup.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/action/plugin_lookup.py | from __future__ import annotations
from ansible.plugins.action import ActionBase
from ansible.plugins import loader
class ActionModule(ActionBase):
TRANSFERS_FILES = False
_VALID_ARGS = frozenset(('type', 'name'))
def run(self, tmp=None, task_vars=None):
if task_vars is None:
task_vars = dict()
result = super(ActionModule, self).run(None, task_vars)
plugin_type = self._task.args.get('type')
name = self._task.args.get('name')
result = dict(changed=False, collection_list=self._task.collections)
if all([plugin_type, name]):
attr_name = '{0}_loader'.format(plugin_type)
typed_loader = getattr(loader, attr_name, None)
if not typed_loader:
return (dict(failed=True, msg='invalid plugin type {0}'.format(plugin_type)))
context = typed_loader.find_plugin_with_context(name, collection_list=self._task.collections)
if not context.resolved:
result['plugin_path'] = None
result['redirect_list'] = []
else:
result['plugin_path'] = context.plugin_resolved_path
result['redirect_list'] = context.redirect_list
return result
| 1,262 | Python | .py | 26 | 38.115385 | 105 | 0.623058 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,508 | subdir_ping_action.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/action/action_subdir/subdir_ping_action.py | from __future__ import annotations
from ansible.plugins.action import ActionBase
class ActionModule(ActionBase):
TRANSFERS_FILES = False
_VALID_ARGS = frozenset()
def run(self, tmp=None, task_vars=None):
if task_vars is None:
task_vars = dict()
result = super(ActionModule, self).run(None, task_vars)
result = dict(changed=False)
return result
| 407 | Python | .py | 11 | 30.272727 | 63 | 0.678663 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,509 | localconn.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/connection/localconn.py | from __future__ import annotations
from ansible.module_utils.common.text.converters import to_native
from ansible.plugins.connection import ConnectionBase
DOCUMENTATION = """
connection: localconn
short_description: do stuff local
description:
- does stuff
options:
connectionvar:
description:
- something we set
default: the_default
vars:
- name: ansible_localconn_connectionvar
"""
class Connection(ConnectionBase):
transport = 'local'
has_pipelining = True
def _connect(self):
return self
def exec_command(self, cmd, in_data=None, sudoable=True):
stdout = 'localconn ran {0}'.format(to_native(cmd))
stderr = 'connectionvar is {0}'.format(to_native(self.get_option('connectionvar')))
return (0, stdout, stderr)
def put_file(self, in_path, out_path):
raise NotImplementedError('just a test')
def fetch_file(self, in_path, out_path):
raise NotImplementedError('just a test')
def close(self):
self._connected = False
| 1,087 | Python | .py | 31 | 28.548387 | 91 | 0.674308 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,510 | uses_nested_same_as_func.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/modules/uses_nested_same_as_func.py | #!/usr/bin/python
from __future__ import annotations
import json
import sys
from ansible_collections.testns.testcoll.plugins.module_utils.nested_same.nested_same.nested_same import nested_same
def main():
mu_result = nested_same()
print(json.dumps(dict(changed=False, source='user', mu_result=mu_result)))
sys.exit()
if __name__ == '__main__':
main()
| 374 | Python | .py | 11 | 30.909091 | 116 | 0.730337 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,511 | uses_leaf_mu_flat_import.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/modules/uses_leaf_mu_flat_import.py | #!/usr/bin/python
from __future__ import annotations
import json
import sys
import ansible_collections.testns.testcoll.plugins.module_utils.leaf
def main():
mu_result = ansible_collections.testns.testcoll.plugins.module_utils.leaf.thingtocall()
print(json.dumps(dict(changed=False, source='user', mu_result=mu_result)))
sys.exit()
if __name__ == '__main__':
main()
| 388 | Python | .py | 11 | 32.181818 | 91 | 0.743243 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,512 | win_selfcontained.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/modules/win_selfcontained.py | # docs for Windows module would go here; just ensure we don't accidentally load this instead of the .ps1
| 105 | Python | .py | 1 | 104 | 104 | 0.788462 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,513 | uses_mu_missing_redirect_collection.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/modules/uses_mu_missing_redirect_collection.py | #!/usr/bin/python
from __future__ import annotations
from ..module_utils import missing_redirect_target_collection # pylint: disable=relative-beyond-top-level,unused-import
def main():
raise Exception('should never get here')
if __name__ == '__main__':
main()
| 274 | Python | .py | 7 | 36.285714 | 120 | 0.729008 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,514 | uses_collection_redirected_mu.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/modules/uses_collection_redirected_mu.py | #!/usr/bin/python
from __future__ import annotations
import json
import sys
from ansible_collections.testns.testcoll.plugins.module_utils.moved_out_root import importme
from ..module_utils.formerly_testcoll_pkg import thing as movedthing # pylint: disable=relative-beyond-top-level
from ..module_utils.formerly_testcoll_pkg.submod import thing as submodmovedthing # pylint: disable=relative-beyond-top-level
def main():
mu_result = importme()
print(json.dumps(dict(changed=False, source='user', mu_result=mu_result, mu_result2=movedthing, mu_result3=submodmovedthing)))
sys.exit()
if __name__ == '__main__':
main()
| 640 | Python | .py | 13 | 46.461538 | 130 | 0.770968 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,515 | ping.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/modules/ping.py | #!/usr/bin/python
from __future__ import annotations
import json
def main():
print(json.dumps(dict(changed=False, source='user')))
if __name__ == '__main__':
main()
| 178 | Python | .py | 7 | 22.571429 | 57 | 0.662651 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,516 | uses_leaf_mu_module_import_from.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/modules/uses_leaf_mu_module_import_from.py | #!/usr/bin/python
from __future__ import annotations
import json
import sys
from ansible_collections.testns.testcoll.plugins.module_utils import leaf, secondary
# FIXME: this one needs pkginit synthesis to work
# from ansible_collections.testns.testcoll.plugins.module_utils.subpkg import submod
from ansible_collections.testns.testcoll.plugins.module_utils.subpkg_with_init import (thingtocall as spwi_thingtocall,
submod_thingtocall as spwi_submod_thingtocall,
cousin_submod_thingtocall as spwi_cousin_submod_thingtocall)
def main():
mu_result = leaf.thingtocall()
mu2_result = secondary.thingtocall()
mu3_result = "thingtocall in subpkg.submod" # FIXME: this one needs pkginit synthesis to work
# mu3_result = submod.thingtocall()
mu4_result = spwi_thingtocall()
mu5_result = spwi_submod_thingtocall()
mu6_result = spwi_cousin_submod_thingtocall()
print(json.dumps(dict(changed=False, source='user', mu_result=mu_result, mu2_result=mu2_result,
mu3_result=mu3_result, mu4_result=mu4_result, mu5_result=mu5_result, mu6_result=mu6_result)))
sys.exit()
if __name__ == '__main__':
main()
| 1,334 | Python | .py | 23 | 46.26087 | 147 | 0.652607 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,517 | deprecated_ping.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/modules/deprecated_ping.py | #!/usr/bin/python
from __future__ import annotations
import json
def main():
print(json.dumps(dict(changed=False, source='user', is_deprecated=True)))
if __name__ == '__main__':
main()
| 198 | Python | .py | 7 | 25.428571 | 77 | 0.677419 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,518 | uses_mu_missing.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/modules/uses_mu_missing.py | #!/usr/bin/python
from __future__ import annotations
from ..module_utils import bogusmu # pylint: disable=relative-beyond-top-level,unused-import
def main():
raise Exception('should never get here')
if __name__ == '__main__':
main()
| 247 | Python | .py | 7 | 32.428571 | 93 | 0.710638 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,519 | uses_base_mu_granular_nested_import.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/modules/uses_base_mu_granular_nested_import.py | #!/usr/bin/python
from __future__ import annotations
import json
import sys
from ansible_collections.testns.testcoll.plugins.module_utils.base import thingtocall
def main():
mu_result = thingtocall()
print(json.dumps(dict(changed=False, source='user', mu_result=mu_result)))
sys.exit()
if __name__ == '__main__':
main()
| 343 | Python | .py | 11 | 28.090909 | 85 | 0.726154 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,520 | uses_core_redirected_mu.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/modules/uses_core_redirected_mu.py | #!/usr/bin/python
from __future__ import annotations
import json
import sys
from ansible.module_utils.formerly_core import thingtocall
def main():
mu_result = thingtocall()
print(json.dumps(dict(changed=False, source='user', mu_result=mu_result)))
sys.exit()
if __name__ == '__main__':
main()
| 316 | Python | .py | 11 | 25.636364 | 78 | 0.711409 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,521 | uses_leaf_mu_granular_import.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/modules/uses_leaf_mu_granular_import.py | #!/usr/bin/python
from __future__ import annotations
import json
import sys
from ansible_collections.testns.testcoll.plugins.module_utils.leaf import thingtocall as aliasedthing
def main():
mu_result = aliasedthing()
print(json.dumps(dict(changed=False, source='user', mu_result=mu_result)))
sys.exit()
if __name__ == '__main__':
main()
| 360 | Python | .py | 11 | 29.636364 | 101 | 0.733918 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,522 | uses_nested_same_as_module.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/modules/uses_nested_same_as_module.py | #!/usr/bin/python
from __future__ import annotations
import json
import sys
from ansible_collections.testns.testcoll.plugins.module_utils.nested_same.nested_same import nested_same
def main():
mu_result = nested_same.nested_same()
print(json.dumps(dict(changed=False, source='user', mu_result=mu_result)))
sys.exit()
if __name__ == '__main__':
main()
| 374 | Python | .py | 11 | 30.909091 | 104 | 0.730337 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,523 | uses_mu_missing_redirect_module.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/modules/uses_mu_missing_redirect_module.py | #!/usr/bin/python
from __future__ import annotations
from ..module_utils import missing_redirect_target_module # pylint: disable=relative-beyond-top-level,unused-import
def main():
raise Exception('should never get here')
if __name__ == '__main__':
main()
| 270 | Python | .py | 7 | 35.714286 | 116 | 0.724806 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,524 | testmodule.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/modules/testmodule.py | #!/usr/bin/python
from __future__ import annotations
import json
DOCUMENTATION = r"""
module: testmodule
description: for testing
extends_documentation_fragment:
- testns.testcoll.frag
- testns.testcoll.frag.other_documentation
"""
def main():
print(json.dumps(dict(changed=False, source='user')))
if __name__ == '__main__':
main()
| 350 | Python | .py | 14 | 22.714286 | 57 | 0.736364 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,525 | testmodule_bad_docfrags.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/modules/testmodule_bad_docfrags.py | #!/usr/bin/python
from __future__ import annotations
import json
DOCUMENTATION = r"""
module: testmodule
description: for testing
extends_documentation_fragment:
- noncollbogusfrag
- noncollbogusfrag.bogusvar
- bogusns.testcoll.frag
- testns.boguscoll.frag
- testns.testcoll.bogusfrag
- testns.testcoll.frag.bogusvar
"""
def main():
print(json.dumps(dict(changed=False, source='user')))
if __name__ == '__main__':
main()
| 447 | Python | .py | 18 | 22.388889 | 57 | 0.747045 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,526 | subdir_ping_module.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/modules/module_subdir/subdir_ping_module.py | #!/usr/bin/python
from __future__ import annotations
import json
def main():
print(json.dumps(dict(changed=False, source='user')))
if __name__ == '__main__':
main()
| 179 | Python | .py | 7 | 22.571429 | 57 | 0.662651 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,527 | secondary.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/module_utils/secondary.py | from __future__ import annotations
def thingtocall():
return "thingtocall in secondary"
| 94 | Python | .py | 3 | 28.333333 | 37 | 0.775281 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,528 | subpkg_with_init.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/module_utils/subpkg_with_init.py | # NB: this module should never be loaded, since we'll see the subpkg_with_init package dir first
from __future__ import annotations
def thingtocall():
raise Exception('this should never be called (loaded discrete module instead of package module)')
def anotherthingtocall():
raise Exception('this should never be called (loaded discrete module instead of package module)')
| 385 | Python | .py | 6 | 61.166667 | 101 | 0.786667 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,529 | base.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/module_utils/base.py | from __future__ import annotations
from ansible_collections.testns.testcoll.plugins.module_utils import secondary
import ansible_collections.testns.testcoll.plugins.module_utils.secondary
def thingtocall():
if secondary != ansible_collections.testns.testcoll.plugins.module_utils.secondary:
raise Exception()
return "thingtocall in base called " + ansible_collections.testns.testcoll.plugins.module_utils.secondary.thingtocall()
| 449 | Python | .py | 7 | 60.285714 | 123 | 0.817352 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,530 | leaf.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/module_utils/leaf.py | from __future__ import annotations
def thingtocall():
return "thingtocall in leaf"
| 89 | Python | .py | 3 | 26.666667 | 34 | 0.761905 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,531 | nested_same.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/module_utils/nested_same/nested_same/nested_same.py | from __future__ import annotations
def nested_same():
return 'hello from nested_same'
| 92 | Python | .py | 3 | 27.666667 | 35 | 0.747126 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,532 | __init__.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/module_utils/subpkg_with_init/__init__.py | from __future__ import annotations
# exercise relative imports in package init; they behave differently
from .mod_in_subpkg_with_init import thingtocall as submod_thingtocall
from ..subpkg.submod import thingtocall as cousin_submod_thingtocall # pylint: disable=relative-beyond-top-level
def thingtocall():
return "thingtocall in subpkg_with_init"
| 356 | Python | .py | 6 | 57.166667 | 113 | 0.815562 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,533 | mod_in_subpkg_with_init.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/module_utils/subpkg_with_init/mod_in_subpkg_with_init.py | from __future__ import annotations
def thingtocall():
return "thingtocall in mod_in_subpkg_with_init"
| 108 | Python | .py | 3 | 33 | 51 | 0.76699 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,534 | submod.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/module_utils/subpkg/submod.py | from __future__ import annotations
def thingtocall():
return "thingtocall in subpkg.submod"
| 98 | Python | .py | 3 | 29.666667 | 41 | 0.774194 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,535 | mylookup.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/lookup/mylookup.py | from __future__ import annotations
from ansible.plugins.lookup import LookupBase
class LookupModule(LookupBase):
def run(self, terms, variables, **kwargs):
return ['mylookup_from_user_dir']
| 207 | Python | .py | 5 | 37 | 46 | 0.756345 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,536 | mylookup2.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/lookup/mylookup2.py | from __future__ import annotations
from ansible.plugins.lookup import LookupBase
class LookupModule(LookupBase):
def run(self, terms, variables, **kwargs):
return ['mylookup2_from_user_dir']
| 209 | Python | .py | 5 | 37.2 | 46 | 0.757576 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,537 | my_subdir_lookup.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/lookup/lookup_subdir/my_subdir_lookup.py | from __future__ import annotations
from ansible.plugins.lookup import LookupBase
class LookupModule(LookupBase):
def run(self, terms, variables, **kwargs):
return ['subdir_lookup_from_user_dir']
| 212 | Python | .py | 5 | 38 | 46 | 0.757426 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,538 | usercallback.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/callback/usercallback.py | from __future__ import annotations
from ansible.plugins.callback import CallbackBase
DOCUMENTATION = """
callback: usercallback
callback_type: notification
short_description: does stuff
description:
- does some stuff
"""
class CallbackModule(CallbackBase):
CALLBACK_VERSION = 2.0
CALLBACK_TYPE = 'aggregate'
CALLBACK_NAME = 'usercallback'
def __init__(self):
super(CallbackModule, self).__init__()
self._display.display("loaded usercallback from collection, yay")
def v2_runner_on_ok(self, result):
self._display.display("usercallback says ok")
| 618 | Python | .py | 18 | 29.277778 | 73 | 0.711636 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,539 | myfilters.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/filter/myfilters.py | from __future__ import annotations
def testfilter(data):
return "{0}_via_testfilter_from_userdir".format(data)
class FilterModule(object):
def filters(self):
return {
'testfilter': testfilter
}
| 235 | Python | .py | 8 | 23.25 | 57 | 0.666667 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,540 | myfilters2.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/filter/myfilters2.py | from __future__ import annotations
def testfilter2(data):
return "{0}_via_testfilter2_from_userdir".format(data)
class FilterModule(object):
def filters(self):
return {
'testfilter2': testfilter2
}
| 239 | Python | .py | 8 | 23.75 | 58 | 0.672566 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,541 | my_subdir_filters.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/filter/filter_subdir/my_subdir_filters.py | from __future__ import annotations
def test_subdir_filter(data):
return "{0}_via_testfilter_from_subdir".format(data)
class FilterModule(object):
def filters(self):
return {
'test_subdir_filter': test_subdir_filter
}
| 258 | Python | .py | 8 | 26.125 | 56 | 0.673469 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,542 | frag.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testcoll/plugins/doc_fragments/frag.py | from __future__ import annotations
class ModuleDocFragment(object):
DOCUMENTATION = r"""
options:
normal_doc_frag:
description:
- an option
"""
OTHER_DOCUMENTATION = r"""
options:
other_doc_frag:
description:
- another option
"""
| 261 | Python | .py | 14 | 15.428571 | 34 | 0.696721 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,543 | broken_filter.py | ansible_ansible/test/integration/targets/collections/collection_root_user/ansible_collections/testns/testbroken/plugins/filter/broken_filter.py | from __future__ import annotations
class FilterModule(object):
def filters(self):
return {
'broken': lambda x: 'broken',
}
raise Exception('This is a broken filter plugin.')
| 211 | Python | .py | 7 | 23.857143 | 50 | 0.643216 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,544 | ping.py | ansible_ansible/test/integration/targets/collections/ansiballz_dupe/collections/ansible_collections/duplicate/name/plugins/modules/ping.py | #!/usr/bin/python
from __future__ import annotations
from ansible.module_utils.basic import AnsibleModule
AnsibleModule({}).exit_json(ping='duplicate.name.pong')
| 163 | Python | .py | 4 | 39.5 | 55 | 0.803797 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,545 | override_formerly_core_masked_test.py | ansible_ansible/test/integration/targets/collections/test_plugins/override_formerly_core_masked_test.py | from __future__ import annotations
def override_formerly_core_masked_test(value, *args, **kwargs):
if value != 'hello override':
raise Exception('expected "hello override" only...')
return True
class TestModule(object):
def tests(self):
return {
'formerly_core_masked_test': override_formerly_core_masked_test
}
| 365 | Python | .py | 10 | 30.2 | 75 | 0.671429 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,546 | testmodule2.py | ansible_ansible/test/integration/targets/collections/testcoll2/plugins/modules/testmodule2.py | #!/usr/bin/python
from __future__ import annotations
ANSIBLE_METADATA = {'metadata_version': '1.1',
'status': ['stableinterface'],
'supported_by': 'core'}
DOCUMENTATION = """
---
module: testmodule2
short_description: Test module
description:
- Test module
author:
- Ansible Core Team
"""
EXAMPLES = """
"""
RETURN = """
"""
import json
def main():
print(json.dumps(dict(changed=False, source='sys')))
if __name__ == '__main__':
main()
| 501 | Python | .py | 23 | 17.956522 | 56 | 0.616205 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,547 | sys_check.py | ansible_ansible/test/integration/targets/ansiballz_python/library/sys_check.py | #!/usr/bin/python
# https://github.com/ansible/ansible/issues/64664
# https://github.com/ansible/ansible/issues/64479
from __future__ import annotations
import sys
from ansible.module_utils.basic import AnsibleModule
def main():
module = AnsibleModule({})
this_module = sys.modules[__name__]
module.exit_json(
failed=not getattr(this_module, 'AnsibleModule', False)
)
if __name__ == '__main__':
main()
| 438 | Python | .py | 14 | 27.714286 | 63 | 0.706731 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,548 | custom_module.py | ansible_ansible/test/integration/targets/ansiballz_python/library/custom_module.py | #!/usr/bin/python
from __future__ import annotations
from ..module_utils.basic import AnsibleModule # pylint: disable=relative-beyond-top-level
from ..module_utils.custom_util import forty_two # pylint: disable=relative-beyond-top-level
def main():
module = AnsibleModule(
argument_spec=dict()
)
module.exit_json(answer=forty_two())
if __name__ == '__main__':
main()
| 400 | Python | .py | 11 | 32.545455 | 93 | 0.709424 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,549 | check_rlimit_and_maxfd.py | ansible_ansible/test/integration/targets/ansiballz_python/library/check_rlimit_and_maxfd.py | #!/usr/bin/python
#
# Copyright 2018 Red Hat | Ansible
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
from __future__ import annotations
import resource
import subprocess
from ansible.module_utils.basic import AnsibleModule
def main():
module = AnsibleModule(
argument_spec=dict()
)
rlimit_nofile = resource.getrlimit(resource.RLIMIT_NOFILE)
try:
maxfd = subprocess.MAXFD
except AttributeError:
maxfd = -1
module.exit_json(rlimit_nofile=rlimit_nofile, maxfd=maxfd, infinity=resource.RLIM_INFINITY)
if __name__ == '__main__':
main()
| 640 | Python | .py | 20 | 27.9 | 95 | 0.719672 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,550 | import_pkg_resources.py | ansible_ansible/test/integration/targets/egg-info/lookup_plugins/import_pkg_resources.py | from __future__ import annotations
import pkg_resources # pylint: disable=unused-import
from ansible.plugins.lookup import LookupBase
class LookupModule(LookupBase):
def run(self, terms, variables, **kwargs):
return ['ok']
| 240 | Python | .py | 6 | 36.333333 | 53 | 0.76087 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,551 | dummy.py | ansible_ansible/test/integration/targets/loop-connection/collections/ansible_collections/ns/name/plugins/connection/dummy.py | # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
from __future__ import annotations
DOCUMENTATION = """
name: dummy
short_description: Used for loop-connection tests
description:
- See above
author: ansible (@core)
"""
from ansible.errors import AnsibleError
from ansible.plugins.connection import ConnectionBase
class Connection(ConnectionBase):
transport = 'ns.name.dummy'
def __init__(self, *args, **kwargs):
self._cmds_run = 0
super().__init__(*args, **kwargs)
@property
def connected(self):
return True
def _connect(self):
return
def exec_command(self, cmd, in_data=None, sudoable=True):
if 'become_test' in cmd:
stderr = f"become - {self.become.name if self.become else None}"
elif 'connected_test' in cmd:
self._cmds_run += 1
stderr = f"ran - {self._cmds_run}"
else:
raise AnsibleError(f"Unknown test cmd {cmd}")
return 0, cmd.encode(), stderr.encode()
def put_file(self, in_path, out_path):
return
def fetch_file(self, in_path, out_path):
return
def close(self):
return
| 1,209 | Python | .py | 36 | 27.388889 | 92 | 0.645941 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,552 | uninstall-Alpine-3-python-3.yml | ansible_ansible/test/integration/targets/setup_paramiko/uninstall-Alpine-3-python-3.yml | - name: Uninstall Paramiko for Python 3 on Alpine
command: apk del py3-paramiko
| 82 | Python | .py | 2 | 39 | 49 | 0.7875 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,553 | uninstall-RedHat-8-python-3.yml | ansible_ansible/test/integration/targets/setup_paramiko/uninstall-RedHat-8-python-3.yml | - name: Uninstall Paramiko for Python 3 on RHEL 8
pip: # no python3-paramiko package exists for RHEL 8
name: paramiko
state: absent
| 142 | Python | .py | 4 | 32 | 54 | 0.73913 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,554 | uninstall-zypper-python-3.yml | ansible_ansible/test/integration/targets/setup_paramiko/uninstall-zypper-python-3.yml | - name: Uninstall Paramiko for Python 3 using zypper
command: zypper --quiet --non-interactive remove --clean-deps python3-paramiko
| 134 | Python | .py | 2 | 65 | 80 | 0.787879 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,555 | uninstall-Darwin-python-3.yml | ansible_ansible/test/integration/targets/setup_paramiko/uninstall-Darwin-python-3.yml | - name: Uninstall Paramiko for Python 3 on MacOS
pip:
name: paramiko
state: absent
| 93 | Python | .py | 4 | 19.75 | 48 | 0.719101 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,556 | install-Alpine-3-python-3.yml | ansible_ansible/test/integration/targets/setup_paramiko/install-Alpine-3-python-3.yml | - name: Install Paramiko for Python 3 on Alpine
command: apk add py3-paramiko
| 80 | Python | .py | 2 | 38 | 47 | 0.782051 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,557 | uninstall-RedHat-9-python-3.yml | ansible_ansible/test/integration/targets/setup_paramiko/uninstall-RedHat-9-python-3.yml | - name: Uninstall Paramiko for Python 3 on RHEL 9
pip: # no python3-paramiko package exists for RHEL 9
name: paramiko
state: absent
- name: Revert the crypto-policy back to DEFAULT
command: update-crypto-policies --set DEFAULT
| 240 | Python | .py | 6 | 36.833333 | 54 | 0.759657 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,558 | install-python-3.yml | ansible_ansible/test/integration/targets/setup_paramiko/install-python-3.yml | - name: Install Paramiko for Python 3
package:
name: python3-paramiko
| 76 | Python | .py | 3 | 22.333333 | 37 | 0.753425 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,559 | uninstall-FreeBSD-python-3.yml | ansible_ansible/test/integration/targets/setup_paramiko/uninstall-FreeBSD-python-3.yml | - name: Uninstall Paramiko for Python 3 on FreeBSD
pip:
name: paramiko
state: absent
| 95 | Python | .py | 4 | 20.25 | 50 | 0.725275 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,560 | install-FreeBSD-python-3.yml | ansible_ansible/test/integration/targets/setup_paramiko/install-FreeBSD-python-3.yml | - name: Setup remote constraints
include_tasks: setup-remote-constraints.yml
- name: Install Paramiko for Python 3 on FreeBSD
pip: # no package in pkg, just use pip
name: paramiko
extra_args: "-c {{ remote_constraints }}"
environment:
SETUPTOOLS_USE_DISTUTILS: stdlib
| 286 | Python | .py | 8 | 32.5 | 48 | 0.741007 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,561 | install-RedHat-9-python-3.yml | ansible_ansible/test/integration/targets/setup_paramiko/install-RedHat-9-python-3.yml | - name: Setup remote constraints
include_tasks: setup-remote-constraints.yml
- name: Install Paramiko for Python 3 on RHEL 9
pip: # no python3-paramiko package exists for RHEL 9
name: paramiko
extra_args: "-c {{ remote_constraints }}"
- name: Drop the crypto-policy to LEGACY for these tests
command: update-crypto-policies --set LEGACY
| 352 | Python | .py | 8 | 41.125 | 56 | 0.755102 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,562 | uninstall-apt-python-3.yml | ansible_ansible/test/integration/targets/setup_paramiko/uninstall-apt-python-3.yml | - name: Uninstall Paramiko for Python 3 using apt
apt:
name: python3-paramiko
state: absent
autoremove: yes
| 122 | Python | .py | 5 | 20.6 | 49 | 0.726496 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,563 | install-Darwin-python-3.yml | ansible_ansible/test/integration/targets/setup_paramiko/install-Darwin-python-3.yml | - name: Setup remote constraints
include_tasks: setup-remote-constraints.yml
- name: Install Paramiko for Python 3 on MacOS
pip: # no homebrew package manager in core, just use pip
name: paramiko
extra_args: "-c {{ remote_constraints }}"
environment:
# Not sure why this fixes the test, but it does.
SETUPTOOLS_USE_DISTUTILS: stdlib
| 355 | Python | .py | 9 | 36 | 58 | 0.736994 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,564 | install-RedHat-8-python-3.yml | ansible_ansible/test/integration/targets/setup_paramiko/install-RedHat-8-python-3.yml | - name: Setup remote constraints
include_tasks: setup-remote-constraints.yml
- name: Install Paramiko for Python 3 on RHEL 8
pip: # no python3-paramiko package exists for RHEL 8
name: paramiko
extra_args: "-c {{ remote_constraints }}"
environment:
SETUPTOOLS_USE_DISTUTILS: stdlib
| 299 | Python | .py | 8 | 34.125 | 54 | 0.749141 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,565 | detect_paramiko.py | ansible_ansible/test/integration/targets/setup_paramiko/library/detect_paramiko.py | #!/usr/bin/python
"""Ansible module to detect the presence of both the normal and Ansible-specific versions of Paramiko."""
from __future__ import annotations
from ansible.module_utils.basic import AnsibleModule
try:
import paramiko
except ImportError:
paramiko = None
try:
import ansible_paramiko
except ImportError:
ansible_paramiko = None
def main():
module = AnsibleModule(argument_spec={})
module.exit_json(**dict(
found=bool(paramiko or ansible_paramiko),
paramiko=bool(paramiko),
ansible_paramiko=bool(ansible_paramiko),
))
if __name__ == '__main__':
main()
| 630 | Python | .py | 21 | 25.904762 | 105 | 0.72 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,566 | async_test.py | ansible_ansible/test/integration/targets/async_fail/library/async_test.py | from __future__ import annotations
import json
import sys
import time
from ansible.module_utils.basic import AnsibleModule
def main():
if "--interactive" in sys.argv:
import ansible.module_utils.basic
ansible.module_utils.basic._ANSIBLE_ARGS = json.dumps(dict(
ANSIBLE_MODULE_ARGS=dict(
fail_mode="graceful"
)
))
module = AnsibleModule(
argument_spec=dict(
fail_mode=dict(type='list', default=['success'])
)
)
result = dict(changed=True)
fail_mode = module.params['fail_mode']
try:
if 'leading_junk' in fail_mode:
print("leading junk before module output")
if 'graceful' in fail_mode:
module.fail_json(msg="failed gracefully")
if 'exception' in fail_mode:
raise Exception('failing via exception')
if 'recovered_fail' in fail_mode:
result = {"msg": "succeeded", "failed": False, "changed": True}
# Wait in the middle to setup a race where the controller reads incomplete data from our
# special async_status the first poll
time.sleep(5)
module.exit_json(**result)
finally:
if 'trailing_junk' in fail_mode:
print("trailing junk after module output")
main()
| 1,334 | Python | .py | 37 | 27.513514 | 100 | 0.619345 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,567 | normal.py | ansible_ansible/test/integration/targets/async_fail/action_plugins/normal.py | # (c) 2012, Michael DeHaan <michael.dehaan@gmail.com>
#
# This file is part of Ansible
#
# Ansible is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# Ansible is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
from __future__ import annotations
from ansible.errors import AnsibleError
from ansible.plugins.action import ActionBase
from ansible.utils.vars import merge_hash
class ActionModule(ActionBase):
def run(self, tmp=None, task_vars=None):
# individual modules might disagree but as the generic the action plugin, pass at this point.
self._supports_check_mode = True
self._supports_async = True
result = super(ActionModule, self).run(tmp, task_vars)
del tmp # tmp no longer has any effect
if not result.get('skipped'):
if result.get('invocation', {}).get('module_args'):
# avoid passing to modules in case of no_log
# should not be set anymore but here for backwards compatibility
del result['invocation']['module_args']
# FUTURE: better to let _execute_module calculate this internally?
wrap_async = self._task.async_val and not self._connection.has_native_async
# do work!
result = merge_hash(result, self._execute_module(task_vars=task_vars, wrap_async=wrap_async))
# hack to keep --verbose from showing all the setup module result
# moved from setup module as now we filter out all _ansible_ from result
if self._task.action == 'setup':
result['_ansible_verbose_override'] = True
# Simulate a transient network failure
if self._task.action == 'async_status' and 'finished' in result and result['finished'] != 1:
raise AnsibleError('Pretend to fail somewhere in executing async_status')
if not wrap_async:
# remove a temporary path we created
self._remove_tmp_path(self._connection._shell.tmpdir)
return result
| 2,513 | Python | .py | 47 | 46.212766 | 105 | 0.691272 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,568 | create_repo.py | ansible_ansible/test/integration/targets/setup_rpm_repo/library/create_repo.py | #!/usr/bin/python
from __future__ import annotations
import tempfile
from dataclasses import dataclass
from ansible.module_utils.basic import AnsibleModule
from ansible.module_utils.common.respawn import has_respawned, probe_interpreters_for_module, respawn_module
HAS_RPMFLUFF = True
try:
from rpmfluff.make import make_gif
from rpmfluff.sourcefile import GeneratedSourceFile
from rpmfluff.rpmbuild import SimpleRpmBuild
from rpmfluff.yumrepobuild import YumRepoBuild
except ImportError:
HAS_RPMFLUFF = False
@dataclass
class RPM:
name: str
version: str
release: str = '1'
epoch: int = 0
arch: list[str] | None = None
recommends: list[str] | None = None
requires: list[str] | None = None
file: str | None = None
SPECS = [
RPM(name='dinginessentail', version='1.0'),
RPM(name='dinginessentail', version='1.0', release='2', epoch=1),
RPM(name='dinginessentail', version='1.1', epoch=1),
RPM(name='dinginessentail-olive', version='1.0'),
RPM(name='dinginessentail-olive', version='1.1'),
RPM(name='multilib-dinginessentail', version='1.0', arch=['i686', 'x86_64']),
RPM(name='multilib-dinginessentail', version='1.1', arch=['i686', 'x86_64']),
RPM(name='landsidescalping', version='1.0',),
RPM(name='landsidescalping', version='1.1',),
RPM(name='dinginessentail-with-weak-dep', version='1.0', recommends=['dinginessentail-weak-dep']),
RPM(name='dinginessentail-weak-dep', version='1.0',),
RPM(name='noarchfake', version='1.0'),
RPM(name='provides_foo_a', version='1.0', file='foo.gif'),
RPM(name='provides_foo_b', version='1.0', file='foo.gif'),
RPM(name='number-11-name', version='11.0',),
RPM(name='number-11-name', version='11.1',),
RPM(name='epochone', version='1.0', epoch=1),
RPM(name='epochone', version='1.1', epoch=1),
RPM(name='broken-a', version='1.2.3',),
RPM(name='broken-a', version='1.2.3.4', requires=['dinginessentail-doesnotexist']),
RPM(name='broken-a', version='1.2.4',),
RPM(name='broken-a', version='2.0.0', requires=['dinginessentail-doesnotexist']),
RPM(name='broken-b', version='1.0', requires=['broken-a = 1.2.3-1']),
RPM(name='broken-c', version='1.0', requires=['broken-c = 1.2.4-1']),
RPM(name='broken-d', version='1.0', requires=['broken-a']),
]
def create_repo():
pkgs = []
for spec in SPECS:
pkg = SimpleRpmBuild(spec.name, spec.version, spec.release, spec.arch or ['noarch'])
pkg.epoch = spec.epoch
for requires in spec.requires or []:
pkg.add_requires(requires)
for recommend in spec.recommends or []:
pkg.add_recommends(recommend)
if spec.file:
pkg.add_installed_file(
"/" + spec.file,
GeneratedSourceFile(
spec.file, make_gif()
)
)
pkgs.append(pkg)
repo = YumRepoBuild(pkgs)
repo.make('noarch', 'i686', 'x86_64')
for pkg in pkgs:
pkg.clean()
return repo.repoDir
def main():
module = AnsibleModule(
argument_spec={
'tempdir': {'type': 'path'},
}
)
if not HAS_RPMFLUFF:
system_interpreters = ['/usr/libexec/platform-python', '/usr/bin/python3', '/usr/bin/python']
interpreter = probe_interpreters_for_module(system_interpreters, 'rpmfluff')
if not interpreter or has_respawned():
module.fail_json('unable to find rpmfluff; tried {0}'.format(system_interpreters))
respawn_module(interpreter)
tempdir = module.params['tempdir']
# Save current temp dir so we can set it back later
original_tempdir = tempfile.tempdir
tempfile.tempdir = tempdir
try:
repo_dir = create_repo()
finally:
tempfile.tempdir = original_tempdir
module.exit_json(repo_dir=repo_dir, tmpfile=tempfile.gettempdir())
if __name__ == "__main__":
main()
| 3,960 | Python | .py | 96 | 34.927083 | 108 | 0.647535 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,569 | do-not-check-me.py | ansible_ansible/test/integration/targets/ansible-test-sanity-no-get-exception/ansible_collections/ns/col/do-not-check-me.py | from __future__ import annotations
from ansible.module_utils.pycompat24 import get_exception
def do_stuff():
get_exception()
| 132 | Python | .py | 4 | 30.25 | 57 | 0.792 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,570 | check-me.py | ansible_ansible/test/integration/targets/ansible-test-sanity-no-get-exception/ansible_collections/ns/col/plugins/modules/check-me.py | from __future__ import annotations
from ansible.module_utils.pycompat24 import get_exception
def do_stuff():
get_exception()
| 132 | Python | .py | 4 | 30.25 | 57 | 0.792 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,571 | fakelocal.py | ansible_ansible/test/integration/targets/delegate_to/connection_plugins/fakelocal.py | # GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
from __future__ import annotations
DOCUMENTATION = """
connection: fakelocal
short_description: dont execute anything
description:
- This connection plugin just verifies parameters passed in
author: ansible (@core)
version_added: histerical
options:
password:
description: Authentication password for the C(remote_user). Can be supplied as CLI option.
vars:
- name: ansible_password
remote_user:
description:
- User name with which to login to the remote server, normally set by the remote_user keyword.
ini:
- section: defaults
key: remote_user
vars:
- name: ansible_user
"""
from ansible.errors import AnsibleConnectionFailure
from ansible.plugins.connection import ConnectionBase
from ansible.utils.display import Display
display = Display()
class Connection(ConnectionBase):
""" Local based connections """
transport = 'fakelocal'
has_pipelining = True
def __init__(self, *args, **kwargs):
super(Connection, self).__init__(*args, **kwargs)
self.cwd = None
def _connect(self):
""" verify """
if self.get_option('remote_user') == 'invaliduser' and self.get_option('password') == 'badpassword':
raise AnsibleConnectionFailure('Got invaliduser and badpassword')
if not self._connected:
display.vvv(u"ESTABLISH FAKELOCAL CONNECTION FOR USER: {0}".format(self._play_context.remote_user), host=self._play_context.remote_addr)
self._connected = True
return self
def exec_command(self, cmd, in_data=None, sudoable=True):
""" run a command on the local host """
super(Connection, self).exec_command(cmd, in_data=in_data, sudoable=sudoable)
return 0, '{"msg": "ALL IS GOOD"}', ''
def put_file(self, in_path, out_path):
""" transfer a file from local to local """
super(Connection, self).put_file(in_path, out_path)
def fetch_file(self, in_path, out_path):
""" fetch a file from local to local -- for compatibility """
super(Connection, self).fetch_file(in_path, out_path)
def close(self):
""" terminate the connection; nothing to do here """
self._connected = False
| 2,426 | Python | .py | 55 | 36.309091 | 148 | 0.653339 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,572 | detect_interpreter.py | ansible_ansible/test/integration/targets/delegate_to/library/detect_interpreter.py | #!/usr/bin/python
from __future__ import annotations
import sys
from ansible.module_utils.basic import AnsibleModule
def main():
module = AnsibleModule(argument_spec={})
module.exit_json(**dict(found=sys.executable))
if __name__ == '__main__':
main()
| 271 | Python | .py | 9 | 26.888889 | 52 | 0.716535 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,573 | test-pause.py | ansible_ansible/test/integration/targets/pause/test-pause.py | #!/usr/bin/env python
from __future__ import annotations
import os
import pexpect
import sys
import termios
from ansible.module_utils.six import PY2
args = sys.argv[1:]
env_vars = {
'ANSIBLE_ROLES_PATH': './roles',
'ANSIBLE_NOCOLOR': 'True',
'ANSIBLE_RETRY_FILES_ENABLED': 'False'
}
try:
backspace = termios.tcgetattr(sys.stdin.fileno())[6][termios.VERASE]
except Exception:
backspace = b'\x7f'
if PY2:
log_buffer = sys.stdout
else:
log_buffer = sys.stdout.buffer
os.environ.update(env_vars)
# -- Plain pause -- #
playbook = 'pause-1.yml'
# Case 1 - Contiune with enter
pause_test = pexpect.spawn(
'ansible-playbook',
args=[playbook] + args,
timeout=10,
env=os.environ
)
pause_test.logfile = log_buffer
pause_test.expect(r'Press enter to continue, Ctrl\+C to interrupt:')
pause_test.send('\r')
pause_test.expect('Task after pause')
pause_test.expect(pexpect.EOF)
pause_test.close()
# Case 2 - Continue with C
pause_test = pexpect.spawn(
'ansible-playbook',
args=[playbook] + args,
timeout=10,
env=os.environ
)
pause_test.logfile = log_buffer
pause_test.expect(r'Press enter to continue, Ctrl\+C to interrupt:')
pause_test.send('\x03')
pause_test.expect("Press 'C' to continue the play or 'A' to abort")
pause_test.send('C')
pause_test.expect('Task after pause')
pause_test.expect(pexpect.EOF)
pause_test.close()
# Case 3 - Abort with A
pause_test = pexpect.spawn(
'ansible-playbook',
args=[playbook] + args,
timeout=10,
env=os.environ
)
pause_test.logfile = log_buffer
pause_test.expect(r'Press enter to continue, Ctrl\+C to interrupt:')
pause_test.send('\x03')
pause_test.expect("Press 'C' to continue the play or 'A' to abort")
pause_test.send('A')
pause_test.expect('user requested abort!')
pause_test.expect(pexpect.EOF)
pause_test.close()
# -- Custom Prompt -- #
playbook = 'pause-2.yml'
# Case 1 - Contiune with enter
pause_test = pexpect.spawn(
'ansible-playbook',
args=[playbook] + args,
timeout=10,
env=os.environ
)
pause_test.logfile = log_buffer
pause_test.expect(r'Custom prompt:')
pause_test.send('\r')
pause_test.expect('Task after pause')
pause_test.expect(pexpect.EOF)
pause_test.close()
# Case 2 - Contiune with C
pause_test = pexpect.spawn(
'ansible-playbook',
args=[playbook] + args,
timeout=10,
env=os.environ
)
pause_test.logfile = log_buffer
pause_test.expect(r'Custom prompt:')
pause_test.send('\x03')
pause_test.expect("Press 'C' to continue the play or 'A' to abort")
pause_test.send('C')
pause_test.expect('Task after pause')
pause_test.expect(pexpect.EOF)
pause_test.close()
# Case 3 - Abort with A
pause_test = pexpect.spawn(
'ansible-playbook',
args=[playbook] + args,
timeout=10,
env=os.environ
)
pause_test.logfile = log_buffer
pause_test.expect(r'Custom prompt:')
pause_test.send('\x03')
pause_test.expect("Press 'C' to continue the play or 'A' to abort")
pause_test.send('A')
pause_test.expect('user requested abort!')
pause_test.expect(pexpect.EOF)
pause_test.close()
# -- Pause for N seconds -- #
playbook = 'pause-3.yml'
# Case 1 - Wait for task to continue after timeout
pause_test = pexpect.spawn(
'ansible-playbook',
args=[playbook] + args,
timeout=10,
env=os.environ
)
pause_test.logfile = log_buffer
pause_test.expect(r'Pausing for \d+ seconds')
pause_test.expect(r"\(ctrl\+C then 'C' = continue early, ctrl\+C then 'A' = abort\)")
pause_test.expect('Task after pause')
pause_test.expect(pexpect.EOF)
pause_test.close()
# Case 2 - Contiune with Ctrl + C, C
pause_test = pexpect.spawn(
'ansible-playbook',
args=[playbook] + args,
timeout=10,
env=os.environ
)
pause_test.logfile = log_buffer
pause_test.expect(r'Pausing for \d+ seconds')
pause_test.expect(r"\(ctrl\+C then 'C' = continue early, ctrl\+C then 'A' = abort\)")
pause_test.send('\n') # test newline does not stop the prompt - waiting for a timeout or ctrl+C
pause_test.send('\x03')
pause_test.expect("Press 'C' to continue the play or 'A' to abort")
pause_test.send('C')
pause_test.expect('Task after pause')
pause_test.expect(pexpect.EOF)
pause_test.close()
# Case 3 - Abort with Ctrl + C, A
pause_test = pexpect.spawn(
'ansible-playbook',
args=[playbook] + args,
timeout=10,
env=os.environ
)
pause_test.logfile = log_buffer
pause_test.expect(r'Pausing for \d+ seconds')
pause_test.expect(r"\(ctrl\+C then 'C' = continue early, ctrl\+C then 'A' = abort\)")
pause_test.send('\x03')
pause_test.expect("Press 'C' to continue the play or 'A' to abort")
pause_test.send('A')
pause_test.expect('user requested abort!')
pause_test.expect(pexpect.EOF)
pause_test.close()
# -- Pause for N seconds with custom prompt -- #
playbook = 'pause-4.yml'
# Case 1 - Wait for task to continue after timeout
pause_test = pexpect.spawn(
'ansible-playbook',
args=[playbook] + args,
timeout=10,
env=os.environ
)
pause_test.logfile = log_buffer
pause_test.expect(r'Pausing for \d+ seconds')
pause_test.expect(r"\(ctrl\+C then 'C' = continue early, ctrl\+C then 'A' = abort\)")
pause_test.expect(r"Waiting for two seconds:")
pause_test.expect('Task after pause')
pause_test.expect(pexpect.EOF)
pause_test.close()
# Case 2 - Contiune with Ctrl + C, C
pause_test = pexpect.spawn(
'ansible-playbook',
args=[playbook] + args,
timeout=10,
env=os.environ
)
pause_test.logfile = log_buffer
pause_test.expect(r'Pausing for \d+ seconds')
pause_test.expect(r"\(ctrl\+C then 'C' = continue early, ctrl\+C then 'A' = abort\)")
pause_test.expect(r"Waiting for two seconds:")
pause_test.send('\x03')
pause_test.expect("Press 'C' to continue the play or 'A' to abort")
pause_test.send('C')
pause_test.expect('Task after pause')
pause_test.expect(pexpect.EOF)
pause_test.close()
# Case 3 - Abort with Ctrl + C, A
pause_test = pexpect.spawn(
'ansible-playbook',
args=[playbook] + args,
timeout=10,
env=os.environ
)
pause_test.logfile = log_buffer
pause_test.expect(r'Pausing for \d+ seconds')
pause_test.expect(r"\(ctrl\+C then 'C' = continue early, ctrl\+C then 'A' = abort\)")
pause_test.expect(r"Waiting for two seconds:")
pause_test.send('\x03')
pause_test.expect("Press 'C' to continue the play or 'A' to abort")
pause_test.send('A')
pause_test.expect('user requested abort!')
pause_test.expect(pexpect.EOF)
pause_test.close()
# -- Enter input and ensure it's captured, echoed, and can be edited -- #
playbook = 'pause-5.yml'
pause_test = pexpect.spawn(
'ansible-playbook',
args=[playbook] + args,
timeout=10,
env=os.environ
)
pause_test.logfile = log_buffer
pause_test.expect(r'Enter some text:')
pause_test.send('hello there')
pause_test.send('\r')
pause_test.expect(r'Enter some text to edit:')
pause_test.send('hello there')
pause_test.send(backspace * 4)
pause_test.send('ommy boy')
pause_test.send('\r')
pause_test.expect(r'Enter some text \(output is hidden\):')
pause_test.send('supersecretpancakes')
pause_test.send('\r')
pause_test.expect(pexpect.EOF)
pause_test.close()
# Test input is not returned if a timeout is given
playbook = 'pause-6.yml'
pause_test = pexpect.spawn(
'ansible-playbook',
args=[playbook] + args,
timeout=10,
env=os.environ
)
pause_test.logfile = log_buffer
pause_test.expect(r'Wait for three seconds:')
pause_test.send('ignored user input')
pause_test.expect('Task after pause')
pause_test.expect(pexpect.EOF)
pause_test.close()
# Test that enter presses may not continue the play when a timeout is set.
pause_test = pexpect.spawn(
'ansible-playbook',
args=["pause-3.yml"] + args,
timeout=10,
env=os.environ
)
pause_test.logfile = log_buffer
pause_test.expect(r"\(ctrl\+C then 'C' = continue early, ctrl\+C then 'A' = abort\)")
pause_test.send('\r')
pause_test.expect(pexpect.EOF)
pause_test.close()
| 7,823 | Python | .py | 258 | 28.065891 | 96 | 0.719537 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,574 | with_yml.py | ansible_ansible/test/integration/targets/ansible-test-sanity-action-plugin-docs/ansible_collections/ns/col/plugins/action/with_yml.py | # Copyright (c) 2024 Ansible Project
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
from __future__ import annotations
from ansible.plugins.action import ActionBase
class ActionModule(ActionBase):
def run(self, tmp, task_vars):
return {"changed": False}
| 316 | Python | .py | 7 | 41.857143 | 92 | 0.75082 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,575 | with_py.py | ansible_ansible/test/integration/targets/ansible-test-sanity-action-plugin-docs/ansible_collections/ns/col/plugins/action/with_py.py | # Copyright (c) 2024 Ansible Project
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
from __future__ import annotations
from ansible.plugins.action import ActionBase
class ActionModule(ActionBase):
def run(self, tmp, task_vars):
return {"changed": False}
| 316 | Python | .py | 7 | 41.857143 | 92 | 0.75082 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,576 | with_yaml.py | ansible_ansible/test/integration/targets/ansible-test-sanity-action-plugin-docs/ansible_collections/ns/col/plugins/action/with_yaml.py | # Copyright (c) 2024 Ansible Project
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
from __future__ import annotations
from ansible.plugins.action import ActionBase
class ActionModule(ActionBase):
def run(self, tmp, task_vars):
return {"changed": False}
| 316 | Python | .py | 7 | 41.857143 | 92 | 0.75082 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,577 | with_py.py | ansible_ansible/test/integration/targets/ansible-test-sanity-action-plugin-docs/ansible_collections/ns/col/plugins/modules/with_py.py | # Copyright (c) 2024 Ansible Project
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
DOCUMENTATION = r"""
---
module: with_py
short_description: Short description
description: Long description
options: {}
author:
- Ansible Core Team (@ansible)
"""
EXAMPLES = r"""
- name: Some example
ns.col.with_py:
"""
RETURNS = ""
| 370 | Python | .py | 16 | 21.6875 | 92 | 0.732194 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,578 | notyaml.py | ansible_ansible/test/integration/targets/rel_plugin_loading/subdir/inventory_plugins/notyaml.py | # Copyright (c) 2017 Ansible Project
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
from __future__ import annotations
DOCUMENTATION = """
inventory: yaml
version_added: "2.4"
short_description: Uses a specific YAML file as an inventory source.
description:
- "YAML-based inventory, should start with the C(all) group and contain hosts/vars/children entries."
- Host entries can have sub-entries defined, which will be treated as variables.
- Vars entries are normal group vars.
- "Children are 'child groups', which can also have their own vars/hosts/children and so on."
- File MUST have a valid extension, defined in configuration.
notes:
- If you want to set vars for the C(all) group inside the inventory file, the C(all) group must be the first entry in the file.
- Enabled in configuration by default.
options:
yaml_extensions:
description: list of 'valid' extensions for files containing YAML
type: list
default: ['.yaml', '.yml', '.json']
env:
- name: ANSIBLE_YAML_FILENAME_EXT
- name: ANSIBLE_INVENTORY_PLUGIN_EXTS
ini:
- key: yaml_valid_extensions
section: defaults
- section: inventory_plugin_yaml
key: yaml_valid_extensions
"""
EXAMPLES = """
all: # keys must be unique, i.e. only one 'hosts' per group
hosts:
test1:
test2:
host_var: value
vars:
group_all_var: value
children: # key order does not matter, indentation does
other_group:
children:
group_x:
hosts:
test5
vars:
g2_var2: value3
hosts:
test4:
ansible_host: 127.0.0.1
last_group:
hosts:
test1 # same host as above, additional group membership
vars:
group_last_var: value
"""
import os
from collections.abc import MutableMapping
from ansible.errors import AnsibleError, AnsibleParserError
from ansible.module_utils.six import string_types
from ansible.module_utils.common.text.converters import to_native, to_text
from ansible.plugins.inventory import BaseFileInventoryPlugin
NoneType = type(None)
class InventoryModule(BaseFileInventoryPlugin):
NAME = 'yaml'
def __init__(self):
super(InventoryModule, self).__init__()
def verify_file(self, path):
valid = False
if super(InventoryModule, self).verify_file(path):
file_name, ext = os.path.splitext(path)
if not ext or ext in self.get_option('yaml_extensions'):
valid = True
return valid
def parse(self, inventory, loader, path, cache=True):
""" parses the inventory file """
super(InventoryModule, self).parse(inventory, loader, path)
self.set_options()
try:
data = self.loader.load_from_file(path, cache='none')
except Exception as e:
raise AnsibleParserError(e)
if not data:
raise AnsibleParserError('Parsed empty YAML file')
elif not isinstance(data, MutableMapping):
raise AnsibleParserError('YAML inventory has invalid structure, it should be a dictionary, got: %s' % type(data))
elif data.get('plugin'):
raise AnsibleParserError('Plugin configuration YAML file, not YAML inventory')
# We expect top level keys to correspond to groups, iterate over them
# to get host, vars and subgroups (which we iterate over recursively)
if isinstance(data, MutableMapping):
for group_name in data:
self._parse_group(group_name, data[group_name])
else:
raise AnsibleParserError("Invalid data from file, expected dictionary and got:\n\n%s" % to_native(data))
def _parse_group(self, group, group_data):
if isinstance(group_data, (MutableMapping, NoneType)):
try:
self.inventory.add_group(group)
except AnsibleError as e:
raise AnsibleParserError("Unable to add group %s: %s" % (group, to_text(e)))
if group_data is not None:
# make sure they are dicts
for section in ['vars', 'children', 'hosts']:
if section in group_data:
# convert strings to dicts as these are allowed
if isinstance(group_data[section], string_types):
group_data[section] = {group_data[section]: None}
if not isinstance(group_data[section], (MutableMapping, NoneType)):
raise AnsibleParserError('Invalid "%s" entry for "%s" group, requires a dictionary, found "%s" instead.' %
(section, group, type(group_data[section])))
for key in group_data:
if not isinstance(group_data[key], (MutableMapping, NoneType)):
self.display.warning('Skipping key (%s) in group (%s) as it is not a mapping, it is a %s' % (key, group, type(group_data[key])))
continue
if isinstance(group_data[key], NoneType):
self.display.vvv('Skipping empty key (%s) in group (%s)' % (key, group))
elif key == 'vars':
for var in group_data[key]:
self.inventory.set_variable(group, var, group_data[key][var])
elif key == 'children':
for subgroup in group_data[key]:
self._parse_group(subgroup, group_data[key][subgroup])
self.inventory.add_child(group, subgroup)
elif key == 'hosts':
for host_pattern in group_data[key]:
hosts, port = self._parse_host(host_pattern)
self._populate_host_vars(hosts, group_data[key][host_pattern] or {}, group, port)
else:
self.display.warning('Skipping unexpected key (%s) in group (%s), only "vars", "children" and "hosts" are valid' % (key, group))
else:
self.display.warning("Skipping '%s' as this is not a valid group definition" % group)
def _parse_host(self, host_pattern):
"""
Each host key can be a pattern, try to process it and add variables as needed
"""
(hostnames, port) = self._expand_hostpattern(host_pattern)
return hostnames, port
| 6,766 | Python | .py | 137 | 36.751825 | 152 | 0.588663 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,579 | ping.py | ansible_ansible/test/integration/targets/module_precedence/multiple_roles/foo/library/ping.py | #!/usr/bin/python
# -*- coding: utf-8 -*-
# (c) 2012, Michael DeHaan <michael.dehaan@gmail.com>
# (c) 2016, Toshio Kuratomi <tkuratomi@ansible.com>
#
# This file is part of Ansible
#
# Ansible is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# Ansible is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
from __future__ import annotations
ANSIBLE_METADATA = {'metadata_version': '1.1',
'status': ['stableinterface'],
'supported_by': 'core'}
DOCUMENTATION = """
---
module: ping
version_added: historical
short_description: Try to connect to host, verify a usable python and return C(pong) on success.
description:
- A trivial test module, this module always returns C(pong) on successful
contact. It does not make sense in playbooks, but it is useful from
C(/usr/bin/ansible) to verify the ability to login and that a usable python is configured.
- This is NOT ICMP ping, this is just a trivial test module.
options: {}
author:
- "Ansible Core Team"
- "Michael DeHaan"
"""
EXAMPLES = """
# Test we can logon to 'webservers' and execute python with json lib.
ansible webservers -m ping
"""
from ansible.module_utils.basic import AnsibleModule
def main():
module = AnsibleModule(
argument_spec=dict(
data=dict(required=False, default=None),
),
supports_check_mode=True
)
result = dict(ping='pong')
if module.params['data']:
if module.params['data'] == 'crash':
raise Exception("boom")
result['ping'] = module.params['data']
result['location'] = 'role: foo'
module.exit_json(**result)
if __name__ == '__main__':
main()
| 2,181 | Python | .py | 59 | 33.135593 | 96 | 0.697774 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,580 | ping.py | ansible_ansible/test/integration/targets/module_precedence/multiple_roles/bar/library/ping.py | #!/usr/bin/python
# -*- coding: utf-8 -*-
# (c) 2012, Michael DeHaan <michael.dehaan@gmail.com>
# (c) 2016, Toshio Kuratomi <tkuratomi@ansible.com>
#
# This file is part of Ansible
#
# Ansible is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# Ansible is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
from __future__ import annotations
ANSIBLE_METADATA = {'metadata_version': '1.1',
'status': ['stableinterface'],
'supported_by': 'core'}
DOCUMENTATION = """
---
module: ping
version_added: historical
short_description: Try to connect to host, verify a usable python and return C(pong) on success.
description:
- A trivial test module, this module always returns C(pong) on successful
contact. It does not make sense in playbooks, but it is useful from
C(/usr/bin/ansible) to verify the ability to login and that a usable python is configured.
- This is NOT ICMP ping, this is just a trivial test module.
options: {}
author:
- "Ansible Core Team"
- "Michael DeHaan"
"""
EXAMPLES = """
# Test we can logon to 'webservers' and execute python with json lib.
ansible webservers -m ping
"""
from ansible.module_utils.basic import AnsibleModule
def main():
module = AnsibleModule(
argument_spec=dict(
data=dict(required=False, default=None),
),
supports_check_mode=True
)
result = dict(ping='pong')
if module.params['data']:
if module.params['data'] == 'crash':
raise Exception("boom")
result['ping'] = module.params['data']
result['location'] = 'role: bar'
module.exit_json(**result)
if __name__ == '__main__':
main()
| 2,181 | Python | .py | 59 | 33.135593 | 96 | 0.697774 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,581 | ping.py | ansible_ansible/test/integration/targets/module_precedence/roles_with_extension/foo/library/ping.py | #!/usr/bin/python
# -*- coding: utf-8 -*-
# (c) 2012, Michael DeHaan <michael.dehaan@gmail.com>
# (c) 2016, Toshio Kuratomi <tkuratomi@ansible.com>
#
# This file is part of Ansible
#
# Ansible is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# Ansible is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
from __future__ import annotations
ANSIBLE_METADATA = {'metadata_version': '1.1',
'status': ['stableinterface'],
'supported_by': 'core'}
DOCUMENTATION = """
---
module: ping
version_added: historical
short_description: Try to connect to host, verify a usable python and return C(pong) on success.
description:
- A trivial test module, this module always returns C(pong) on successful
contact. It does not make sense in playbooks, but it is useful from
C(/usr/bin/ansible) to verify the ability to login and that a usable python is configured.
- This is NOT ICMP ping, this is just a trivial test module.
options: {}
author:
- "Ansible Core Team"
- "Michael DeHaan"
"""
EXAMPLES = """
# Test we can logon to 'webservers' and execute python with json lib.
ansible webservers -m ping
"""
from ansible.module_utils.basic import AnsibleModule
def main():
module = AnsibleModule(
argument_spec=dict(
data=dict(required=False, default=None),
),
supports_check_mode=True
)
result = dict(ping='pong')
if module.params['data']:
if module.params['data'] == 'crash':
raise Exception("boom")
result['ping'] = module.params['data']
result['location'] = 'role: foo'
module.exit_json(**result)
if __name__ == '__main__':
main()
| 2,181 | Python | .py | 59 | 33.135593 | 96 | 0.697774 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,582 | a.py | ansible_ansible/test/integration/targets/module_precedence/roles_with_extension/foo/library/a.py | #!/usr/bin/python
from __future__ import annotations
import json
def main():
print(json.dumps(dict(changed=False, location='role: foo, a.py')))
if __name__ == '__main__':
main()
| 191 | Python | .py | 7 | 24.428571 | 70 | 0.659218 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,583 | ping.py | ansible_ansible/test/integration/targets/module_precedence/lib_with_extension/ping.py | #!/usr/bin/python
# -*- coding: utf-8 -*-
# (c) 2012, Michael DeHaan <michael.dehaan@gmail.com>
# (c) 2016, Toshio Kuratomi <tkuratomi@ansible.com>
#
# This file is part of Ansible
#
# Ansible is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# Ansible is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
from __future__ import annotations
ANSIBLE_METADATA = {'metadata_version': '1.1',
'status': ['stableinterface'],
'supported_by': 'core'}
DOCUMENTATION = """
---
module: ping
version_added: historical
short_description: Try to connect to host, verify a usable python and return C(pong) on success.
description:
- A trivial test module, this module always returns C(pong) on successful
contact. It does not make sense in playbooks, but it is useful from
C(/usr/bin/ansible) to verify the ability to login and that a usable python is configured.
- This is NOT ICMP ping, this is just a trivial test module.
options: {}
author:
- "Ansible Core Team"
- "Michael DeHaan"
"""
EXAMPLES = """
# Test we can logon to 'webservers' and execute python with json lib.
ansible webservers -m ping
"""
from ansible.module_utils.basic import AnsibleModule
def main():
module = AnsibleModule(
argument_spec=dict(
data=dict(required=False, default=None),
),
supports_check_mode=True
)
result = dict(ping='pong')
if module.params['data']:
if module.params['data'] == 'crash':
raise Exception("boom")
result['ping'] = module.params['data']
result['location'] = 'library'
module.exit_json(**result)
if __name__ == '__main__':
main()
| 2,179 | Python | .py | 59 | 33.101695 | 96 | 0.698435 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,584 | a.py | ansible_ansible/test/integration/targets/module_precedence/lib_with_extension/a.py | #!/usr/bin/python
from __future__ import annotations
import json
def main():
print(json.dumps(dict(changed=False, location='a.py')))
if __name__ == '__main__':
main()
| 180 | Python | .py | 7 | 22.857143 | 59 | 0.660714 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,585 | callback_debug.py | ansible_ansible/test/integration/targets/support-callback_plugins/callback_plugins/callback_debug.py | # (c) 2020 Ansible Project
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
from __future__ import annotations
import functools
from ansible.plugins.callback import CallbackBase
class CallbackModule(CallbackBase):
CALLBACK_VERSION = 2.0
CALLBACK_TYPE = 'stdout'
CALLBACK_NAME = 'callback_debug'
def __init__(self, *args, **kwargs):
super(CallbackModule, self).__init__(*args, **kwargs)
self._display.display('__init__')
for name in (cb for cb in dir(self) if cb.startswith('v2_')):
setattr(self, name, functools.partial(self.handle_v2, name))
def handle_v2(self, name, *args, **kwargs):
self._display.display(name)
| 731 | Python | .py | 16 | 40.1875 | 92 | 0.683168 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,586 | legit.py | ansible_ansible/test/integration/targets/module_utils/collections/ansible_collections/testns/testcoll/plugins/module_utils/legit.py | from __future__ import annotations
def importme():
return "successfully imported from testns.testcoll"
| 109 | Python | .py | 3 | 33.333333 | 55 | 0.788462 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,587 | ansible_release.py | ansible_ansible/test/integration/targets/module_utils/module_utils/ansible_release.py | # This file overrides the builtin ansible.module_utils.ansible_release file
# to test that it can be overridden. Previously this was facts.py but caused issues
# with dependencies that may need to execute a module that makes use of facts
data = 'overridden ansible_release.py'
| 277 | Python | .py | 4 | 68.25 | 83 | 0.809524 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,588 | test_override.py | ansible_ansible/test/integration/targets/module_utils/library/test_override.py | #!/usr/bin/python
from __future__ import annotations
from ansible.module_utils.basic import AnsibleModule
# overridden
from ansible.module_utils.ansible_release import data
results = {"data": data}
AnsibleModule(argument_spec=dict()).exit_json(**results)
| 258 | Python | .py | 7 | 35.428571 | 56 | 0.806452 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,589 | test_network.py | ansible_ansible/test/integration/targets/module_utils/library/test_network.py | #!/usr/bin/python
# Copyright: (c) 2021, Ansible Project
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
from __future__ import annotations
from ansible.module_utils.basic import AnsibleModule
from ansible.module_utils.common.network import to_subnet
def main():
module = AnsibleModule(argument_spec=dict(
subnet=dict(),
))
subnet = module.params['subnet']
if subnet is not None:
split_addr = subnet.split('/')
if len(split_addr) != 2:
module.fail_json("Invalid CIDR notation: expected a subnet mask (e.g. 10.0.0.0/32)")
module.exit_json(resolved=to_subnet(split_addr[0], split_addr[1]))
if __name__ == '__main__':
main()
| 740 | Python | .py | 18 | 36.055556 | 96 | 0.677419 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,590 | test.py | ansible_ansible/test/integration/targets/module_utils/library/test.py | #!/usr/bin/python
# Most of these names are only available via PluginLoader so pylint doesn't
# know they exist
# pylint: disable=no-name-in-module
from __future__ import annotations
results = {}
# Test import with no from
import ansible.module_utils.foo0
results['foo0'] = ansible.module_utils.foo0.data
# Test depthful import with no from
import ansible.module_utils.bar0.foo3
results['bar0'] = ansible.module_utils.bar0.foo3.data
# Test import of module_utils/foo1.py
from ansible.module_utils import foo1
results['foo1'] = foo1.data
# Test import of an identifier inside of module_utils/foo2.py
from ansible.module_utils.foo2 import data
results['foo2'] = data
# Test import of module_utils/bar1/__init__.py
from ansible.module_utils import bar1
results['bar1'] = bar1.data
# Test import of an identifier inside of module_utils/bar2/__init__.py
from ansible.module_utils.bar2 import data
results['bar2'] = data
# Test import of module_utils/baz1/one.py
from ansible.module_utils.baz1 import one
results['baz1'] = one.data
# Test import of an identifier inside of module_utils/baz2/one.py
from ansible.module_utils.baz2.one import data
results['baz2'] = data
# Test import of module_utils/spam1/ham/eggs/__init__.py
from ansible.module_utils.spam1.ham import eggs
results['spam1'] = eggs.data
# Test import of an identifier inside module_utils/spam2/ham/eggs/__init__.py
from ansible.module_utils.spam2.ham.eggs import data
results['spam2'] = data
# Test import of module_utils/spam3/ham/bacon.py
from ansible.module_utils.spam3.ham import bacon
results['spam3'] = bacon.data
# Test import of an identifier inside of module_utils/spam4/ham/bacon.py
from ansible.module_utils.spam4.ham.bacon import data
results['spam4'] = data
# Test import of module_utils.spam5.ham bacon and eggs (modules)
from ansible.module_utils.spam5.ham import bacon, eggs
results['spam5'] = (bacon.data, eggs.data)
# Test import of module_utils.spam6.ham bacon and eggs (identifiers)
from ansible.module_utils.spam6.ham import bacon, eggs
results['spam6'] = (bacon, eggs)
# Test import of module_utils.spam7.ham bacon and eggs (module and identifier)
from ansible.module_utils.spam7.ham import bacon, eggs
results['spam7'] = (bacon.data, eggs)
# Test import of module_utils/spam8/ham/bacon.py and module_utils/spam8/ham/eggs.py separately
from ansible.module_utils.spam8.ham import bacon
from ansible.module_utils.spam8.ham import eggs
results['spam8'] = (bacon.data, eggs)
# Test that import of module_utils/qux1/quux.py using as works
from ansible.module_utils.qux1 import quux as two
results['qux1'] = two.data
# Test that importing qux2/quux.py and qux2/quuz.py using as works
from ansible.module_utils.qux2 import quux as three, quuz as four
results['qux2'] = (three.data, four.data)
# Test depth
from ansible.module_utils.a.b.c.d.e.f.g.h import data
results['abcdefgh'] = data
from ansible.module_utils.basic import AnsibleModule
AnsibleModule(argument_spec=dict()).exit_json(**results)
| 2,992 | Python | .py | 66 | 44.015152 | 94 | 0.787608 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,591 | test_cwd_unreadable.py | ansible_ansible/test/integration/targets/module_utils/library/test_cwd_unreadable.py | #!/usr/bin/python
from __future__ import annotations
import os
from ansible.module_utils.basic import AnsibleModule
def main():
# This module verifies that AnsibleModule works when cwd exists but is unreadable.
# This situation can occur when running tasks as an unprivileged user.
try:
cwd = os.getcwd()
except OSError:
# Compensate for macOS being unable to access cwd as an unprivileged user.
# This test is a no-op in this case.
# Testing for os.getcwd() failures is handled by the test_cwd_missing module.
cwd = '/'
os.chdir(cwd)
module = AnsibleModule(argument_spec=dict())
module.exit_json(before=cwd, after=os.getcwd())
if __name__ == '__main__':
main()
| 746 | Python | .py | 19 | 33.842105 | 86 | 0.688456 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,592 | test_recursive_diff.py | ansible_ansible/test/integration/targets/module_utils/library/test_recursive_diff.py | #!/usr/bin/python
# Copyright: (c) 2020, Matt Martz <matt@sivel.net>
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
from __future__ import annotations
from ansible.module_utils.basic import AnsibleModule
from ansible.module_utils.common.dict_transformations import recursive_diff
def main():
module = AnsibleModule(
{
'a': {'type': 'dict'},
'b': {'type': 'dict'},
}
)
module.exit_json(
the_diff=recursive_diff(
module.params['a'],
module.params['b'],
),
)
if __name__ == '__main__':
main()
| 643 | Python | .py | 21 | 24.52381 | 92 | 0.604878 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,593 | test_failure.py | ansible_ansible/test/integration/targets/module_utils/library/test_failure.py | #!/usr/bin/python
from __future__ import annotations
results = {}
# Test that we are rooted correctly
# Following files:
# module_utils/yak/zebra/foo.py
from ansible.module_utils.zebra import foo4
results['zebra'] = foo4.data
from ansible.module_utils.basic import AnsibleModule
AnsibleModule(argument_spec=dict()).exit_json(**results)
| 341 | Python | .py | 10 | 32.8 | 56 | 0.789634 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,594 | test_optional.py | ansible_ansible/test/integration/targets/module_utils/library/test_optional.py | #!/usr/bin/python
# Most of these names are only available via PluginLoader so pylint doesn't
# know they exist
# pylint: disable=no-name-in-module
from __future__ import annotations
from ansible.module_utils.basic import AnsibleModule
# internal constants to keep pylint from griping about constant-valued conditionals
_private_false = False
_private_true = True
# module_utils import statements nested below any block are considered optional "best-effort" for AnsiballZ to include.
# test a number of different import shapes and nesting types to exercise this...
# first, some nested imports that should succeed...
try:
from ansible.module_utils.urls import fetch_url as yep1
except ImportError:
yep1 = None
try:
import ansible.module_utils.common.text.converters as yep2
except ImportError:
yep2 = None
try:
# optional import from a legit collection
from ansible_collections.testns.testcoll.plugins.module_utils.legit import importme as yep3
except ImportError:
yep3 = None
# and a bunch that should fail to be found, but not break the module_utils payload build in the process...
try:
from ansible.module_utils.bogus import fromnope1
except ImportError:
fromnope1 = None
if _private_false:
from ansible.module_utils.alsobogus import fromnope2
else:
fromnope2 = None
try:
import ansible.module_utils.verybogus
nope1 = ansible.module_utils.verybogus
except ImportError:
nope1 = None
# deepish nested with multiple block types- make sure the AST walker made it all the way down
try:
if _private_true:
if _private_true:
if _private_true:
if _private_true:
try:
import ansible.module_utils.stillbogus as nope2
except ImportError:
raise
except ImportError:
nope2 = None
try:
# optional import from a valid collection with an invalid package
from ansible_collections.testns.testcoll.plugins.module_utils.bogus import collnope1
except ImportError:
collnope1 = None
try:
# optional import from a bogus collection
from ansible_collections.bogusns.boguscoll.plugins.module_utils.bogus import collnope2
except ImportError:
collnope2 = None
module = AnsibleModule(argument_spec={})
if not all([yep1, yep2, yep3]):
module.fail_json(msg='one or more existing optional imports did not resolve')
if any([fromnope1, fromnope2, nope1, nope2, collnope1, collnope2]):
module.fail_json(msg='one or more missing optional imports resolved unexpectedly')
module.exit_json(msg='all missing optional imports behaved as expected')
| 2,643 | Python | .py | 67 | 34.925373 | 119 | 0.751953 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,595 | test_datetime.py | ansible_ansible/test/integration/targets/module_utils/library/test_datetime.py | #!/usr/bin/python
# Most of these names are only available via PluginLoader so pylint doesn't
# know they exist
# pylint: disable=no-name-in-module
from __future__ import annotations
from ansible.module_utils.basic import AnsibleModule
import datetime
module = AnsibleModule(argument_spec=dict(
datetime=dict(type=str, required=True),
date=dict(type=str, required=True),
))
result = {
'datetime': datetime.datetime.strptime(module.params.get('datetime'), '%Y-%m-%dT%H:%M:%S'),
'date': datetime.datetime.strptime(module.params.get('date'), '%Y-%m-%d').date(),
}
module.exit_json(**result)
| 606 | Python | .py | 16 | 35.75 | 95 | 0.739796 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,596 | test_env_override.py | ansible_ansible/test/integration/targets/module_utils/library/test_env_override.py | #!/usr/bin/python
# Most of these names are only available via PluginLoader so pylint doesn't
# know they exist
# pylint: disable=no-name-in-module
from __future__ import annotations
from ansible.module_utils.basic import AnsibleModule
from ansible.module_utils.json_utils import data
from ansible.module_utils.mork import data as mork_data
results = {"json_utils": data, "mork": mork_data}
AnsibleModule(argument_spec=dict()).exit_json(**results)
| 451 | Python | .py | 10 | 43.8 | 75 | 0.796804 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,597 | test_no_log.py | ansible_ansible/test/integration/targets/module_utils/library/test_no_log.py | #!/usr/bin/python
# (c) 2021 Ansible Project
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
from __future__ import annotations
from ansible.module_utils.basic import AnsibleModule, env_fallback
def main():
module = AnsibleModule(
argument_spec=dict(
explicit_pass=dict(type='str', no_log=True),
fallback_pass=dict(type='str', no_log=True, fallback=(env_fallback, ['SECRET_ENV'])),
default_pass=dict(type='str', no_log=True, default='zyx'),
normal=dict(type='str', default='plaintext'),
suboption=dict(
type='dict',
options=dict(
explicit_sub_pass=dict(type='str', no_log=True),
fallback_sub_pass=dict(type='str', no_log=True, fallback=(env_fallback, ['SECRET_SUB_ENV'])),
default_sub_pass=dict(type='str', no_log=True, default='xvu'),
normal=dict(type='str', default='plaintext'),
),
),
),
)
module.exit_json(changed=False)
if __name__ == '__main__':
main()
| 1,144 | Python | .py | 26 | 33.769231 | 113 | 0.577477 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,598 | test_cwd_missing.py | ansible_ansible/test/integration/targets/module_utils/library/test_cwd_missing.py | #!/usr/bin/python
from __future__ import annotations
import os
from ansible.module_utils.basic import AnsibleModule
def main():
# This module verifies that AnsibleModule works when cwd does not exist.
# This situation can occur as a race condition when the following conditions are met:
#
# 1) Execute a module which has high startup overhead prior to instantiating AnsibleModule (0.5s is enough in many cases).
# 2) Run the module async as the last task in a playbook using connection=local (a fire-and-forget task).
# 3) Remove the directory containing the playbook immediately after playbook execution ends (playbook in a temp dir).
#
# To ease testing of this race condition the deletion of cwd is handled in this module.
# This avoids race conditions in the test, including timing cwd deletion between AnsiballZ wrapper execution and AnsibleModule instantiation.
# The timing issue with AnsiballZ is due to cwd checking in the wrapper when code coverage is enabled.
temp = os.path.abspath('temp')
os.mkdir(temp)
os.chdir(temp)
os.rmdir(temp)
module = AnsibleModule(argument_spec=dict())
module.exit_json(before=temp, after=os.getcwd())
if __name__ == '__main__':
main()
| 1,252 | Python | .py | 23 | 50.086957 | 145 | 0.746721 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |
13,599 | test_heuristic_log_sanitize.py | ansible_ansible/test/integration/targets/module_utils/library/test_heuristic_log_sanitize.py | #!/usr/bin/python
from __future__ import annotations
from ansible.module_utils import basic
from ansible.module_utils.basic import AnsibleModule
heuristic_log_sanitize = basic.heuristic_log_sanitize
def heuristic_log_sanitize_spy(*args, **kwargs):
heuristic_log_sanitize_spy.return_value = heuristic_log_sanitize(*args, **kwargs)
return heuristic_log_sanitize_spy.return_value
basic.heuristic_log_sanitize = heuristic_log_sanitize_spy
def main():
module = AnsibleModule(
argument_spec={
'data': {
'type': 'str',
'required': True,
}
},
)
# This test module is testing that the data that will be used for logging
# to syslog is properly sanitized when it includes URLs that contain a password.
#
# As such, we build an expected sanitized string from the input, to
# compare it with the output from heuristic_log_sanitize.
#
# To test this in the same way that modules ultimately operate this test
# monkeypatches ansible.module_utils.basic to store the sanitized data
# for later inspection.
data = module.params['data']
left = data.rindex(':') + 1
right = data.rindex('@')
expected = data[:left] + '********' + data[right:]
sanitized = heuristic_log_sanitize_spy.return_value
if sanitized != expected:
module.fail_json(msg='Invalid match', expected=expected, sanitized=sanitized)
module.exit_json(match=True)
if __name__ == '__main__':
main()
| 1,520 | Python | .py | 37 | 35.27027 | 85 | 0.684139 | ansible/ansible | 62,258 | 23,791 | 861 | GPL-3.0 | 9/5/2024, 5:11:58 PM (Europe/Amsterdam) |