From 37ec275f79192ff6a5e2cfe37cc6351a7276a852 Mon Sep 17 00:00:00 2001 From: amol patil Date: Thu, 22 Aug 2024 22:58:19 +0530 Subject: [PATCH] add ansible role sync and delete role --- tests/foreman/ui/test_ansible.py | 24 ++++++++++++------------ 1 file changed, 12 insertions(+), 12 deletions(-) diff --git a/tests/foreman/ui/test_ansible.py b/tests/foreman/ui/test_ansible.py index 2a222beefae..af172b149f0 100644 --- a/tests/foreman/ui/test_ansible.py +++ b/tests/foreman/ui/test_ansible.py @@ -371,7 +371,7 @@ def test_positive_assign_and_remove_ansible_role_to_host(self, target_sat, funct session.location.select(location.name) session.organization.select(organization.name) # add ansible role - session.host_new.add_single_ansible_role(function_host.name) + session.host_new.add_single_ansible_role(function_host.name, SELECTED_ROLE) wait_for(lambda: session.browser.refresh(), timeout=5) # verify ansible role assigned to new UI for the given Host ansible_roles_table = session.host_new.get_ansible_roles(function_host.name) @@ -411,13 +411,10 @@ def test_positive_assign_and_remove_ansible_role_to_hostgroup( 'redhat.satellite.hostgroups', 'redhat.satellite.compute_profiles', ] + proxy_id = target_sat.nailgun_smart_proxy.id + target_sat.api.AnsibleRoles().sync(data={'proxy_id': proxy_id, 'role_names': SELECTED_ROLE}) name = gen_string('alpha').lower() with target_sat.ui_session() as session: - synced_all_role = session.ansibleroles.import_all_roles() - total_imported_roles = session.ansibleroles.imported_roles_count - # verify all roles are synced - assert synced_all_role == total_imported_roles - session.location.select(module_location.name) session.organization.select(module_org.name) # Assign Ansible role(s) while creating the hostgroup. @@ -449,7 +446,10 @@ def test_positive_assign_and_remove_ansible_role_to_hostgroup( @pytest.mark.tier3 def test_positive_non_admin_user_access_with_usergroup( - self, request, target_sat, test_name, module_org, module_location + self, + request, + target_sat, + test_name, ): """Verify non-admin user can access the ansible page on WebUI @@ -476,10 +476,10 @@ def test_positive_non_admin_user_access_with_usergroup( name=gen_string('alpha'), user=[user], admin=True ).create() assert user.login in [u.read().login for u in user_gp.user] - with target_sat.ui_session(test_name, user.login, password) as session: - id = target_sat.nailgun_smart_proxy.id - target_sat.api.AnsibleRoles().sync(data={'proxy_id': id, 'role_names': [SELECTED_ROLE]}) - session.host_new.add_single_ansible_role(target_sat.hostname) + id = target_sat.nailgun_smart_proxy.id + target_sat.api.AnsibleRoles().sync(data={'proxy_id': id, 'role_names': [SELECTED_ROLE]}) + with target_sat.ui_session(test_name, user=user.login, password=password) as session: + session.host_new.add_single_ansible_role(target_sat.hostname, SELECTED_ROLE) wait_for(lambda: session.browser.refresh(), timeout=5) ansible_roles_table = session.host_new.get_ansible_roles(target_sat.hostname) assert ansible_roles_table[0]['Name'] == SELECTED_ROLE @@ -527,7 +527,7 @@ def test_positive_ansible_config_report_changes_notice_and_failed_tasks_errors( with module_target_sat.ui_session() as session: session.location.select(module_location.name) session.organization.select(module_org.name) - session.host_new.add_single_ansible_role(rhel_contenthost.hostname) + session.host_new.add_single_ansible_role(rhel_contenthost.hostname, SELECTED_ROLE) ansible_roles_table = session.host_new.get_ansible_roles(rhel_contenthost.hostname) assert ansible_roles_table[0]['Name'] == SELECTED_ROLE # Verify error log for config report after ansible role is executed