summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorAlex Stephen <alexstephen@google.com>2018-05-22 07:53:12 -0700
committerRyan Brown <sb@ryansb.com>2018-05-22 10:53:12 -0400
commitd3222a97c826f2353392e9095f71320a333d443a (patch)
treee6639250e31ea1f5a036ad776db93be82e431232
parent886f930e593e6a6004d114623c488d47417d67eb (diff)
downloadansible-d3222a97c826f2353392e9095f71320a333d443a.tar.gz
New module: GCP Compute Global Forwarding Rules (#38615)
-rw-r--r--lib/ansible/modules/cloud/google/gcp_compute_global_forwarding_rule.py576
-rw-r--r--test/integration/targets/gcp_compute_global_forwarding_rule/aliases2
-rw-r--r--test/integration/targets/gcp_compute_global_forwarding_rule/defaults/main.yml3
-rw-r--r--test/integration/targets/gcp_compute_global_forwarding_rule/meta/main.yml0
-rw-r--r--test/integration/targets/gcp_compute_global_forwarding_rule/tasks/main.yml254
5 files changed, 835 insertions, 0 deletions
diff --git a/lib/ansible/modules/cloud/google/gcp_compute_global_forwarding_rule.py b/lib/ansible/modules/cloud/google/gcp_compute_global_forwarding_rule.py
new file mode 100644
index 0000000000..51cb2870a4
--- /dev/null
+++ b/lib/ansible/modules/cloud/google/gcp_compute_global_forwarding_rule.py
@@ -0,0 +1,576 @@
+#!/usr/bin/python
+# -*- coding: utf-8 -*-
+#
+# Copyright (C) 2017 Google
+# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
+# ----------------------------------------------------------------------------
+#
+# *** AUTO GENERATED CODE *** AUTO GENERATED CODE ***
+#
+# ----------------------------------------------------------------------------
+#
+# This file is automatically generated by Magic Modules and manual
+# changes will be clobbered when the file is regenerated.
+#
+# Please read more about how to change this file at
+# https://www.github.com/GoogleCloudPlatform/magic-modules
+#
+# ----------------------------------------------------------------------------
+
+from __future__ import absolute_import, division, print_function
+__metaclass__ = type
+
+################################################################################
+# Documentation
+################################################################################
+
+ANSIBLE_METADATA = {'metadata_version': '1.1',
+ 'status': ["preview"],
+ 'supported_by': 'community'}
+
+DOCUMENTATION = '''
+---
+module: gcp_compute_global_forwarding_rule
+description:
+ - Represents a GlobalForwardingRule resource. Global forwarding rules are used to
+ forward traffic to the correct load balancer for HTTP load balancing. Global forwarding
+ rules can only be used for HTTP load balancing.
+ - For more information, see U(https://cloud.google.com/compute/docs/load-balancing/http/)
+ .
+short_description: Creates a GCP GlobalForwardingRule
+version_added: 2.6
+author: Google Inc. (@googlecloudplatform)
+requirements:
+ - python >= 2.6
+ - requests >= 2.18.4
+ - google-auth >= 1.3.0
+options:
+ state:
+ description:
+ - Whether the given object should exist in GCP
+ choices: ['present', 'absent']
+ default: 'present'
+ description:
+ description:
+ - An optional description of this resource. Provide this property when you create
+ the resource.
+ required: false
+ ip_address:
+ description:
+ - The IP address that this forwarding rule is serving on behalf of.
+ - Addresses are restricted based on the forwarding rule's load balancing scheme (EXTERNAL
+ or INTERNAL) and scope (global or regional).
+ - When the load balancing scheme is EXTERNAL, for global forwarding rules, the address
+ must be a global IP, and for regional forwarding rules, the address must live in
+ the same region as the forwarding rule. If this field is empty, an ephemeral IPv4
+ address from the same scope (global or regional) will be assigned. A regional forwarding
+ rule supports IPv4 only. A global forwarding rule supports either IPv4 or IPv6.
+ - When the load balancing scheme is INTERNAL, this can only be an RFC 1918 IP address
+ belonging to the network/subnet configured for the forwarding rule. By default,
+ if this field is empty, an ephemeral internal IP address will be automatically allocated
+ from the IP range of the subnet or network configured for this forwarding rule.
+ - 'An address can be specified either by a literal IP address or a URL reference to
+ an existing Address resource. The following examples are all valid: * 100.1.2.3
+ * U(https://www.googleapis.com/compute/v1/projects/project/regions/region/addresses/address)
+ * projects/project/regions/region/addresses/address * regions/region/addresses/address
+ * global/addresses/address * address .'
+ required: false
+ ip_protocol:
+ description:
+ - The IP protocol to which this rule applies. Valid options are TCP, UDP, ESP, AH,
+ SCTP or ICMP.
+ - When the load balancing scheme is INTERNAL, only TCP and UDP are valid.
+ required: false
+ choices: ['TCP', 'UDP', 'ESP', 'AH', 'SCTP', 'ICMP']
+ backend_service:
+ description:
+ - A reference to BackendService resource.
+ required: false
+ ip_version:
+ description:
+ - The IP Version that will be used by this forwarding rule. Valid options are IPV4
+ or IPV6. This can only be specified for a global forwarding rule.
+ required: false
+ choices: ['IPV4', 'IPV6']
+ load_balancing_scheme:
+ description:
+ - 'This signifies what the ForwardingRule will be used for and can only take the following
+ values: INTERNAL, EXTERNAL The value of INTERNAL means that this will be used for
+ Internal Network Load Balancing (TCP, UDP). The value of EXTERNAL means that this
+ will be used for External Load Balancing (HTTP(S) LB, External TCP/UDP LB, SSL Proxy)
+ .'
+ required: false
+ choices: ['INTERNAL', 'EXTERNAL']
+ name:
+ description:
+ - Name of the resource; provided by the client when the resource is created. The name
+ must be 1-63 characters long, and comply with RFC1035. Specifically, the name must
+ be 1-63 characters long and match the regular expression [a-z]([-a-z0-9]*[a-z0-9])?
+ which means the first character must be a lowercase letter, and all following characters
+ must be a dash, lowercase letter, or digit, except the last character, which cannot
+ be a dash.
+ required: true
+ network:
+ description:
+ - A reference to Network resource.
+ required: false
+ port_range:
+ description:
+ - This field is used along with the target field for TargetHttpProxy, TargetHttpsProxy,
+ TargetSslProxy, TargetTcpProxy, TargetVpnGateway, TargetPool, TargetInstance.
+ - Applicable only when IPProtocol is TCP, UDP, or SCTP, only packets addressed to
+ ports in the specified range will be forwarded to target.
+ - Forwarding rules with the same [IPAddress, IPProtocol] pair must have disjoint port
+ ranges.
+ - 'Some types of forwarding target have constraints on the acceptable ports: * TargetHttpProxy:
+ 80, 8080 * TargetHttpsProxy: 443 * TargetTcpProxy: 25, 43, 110, 143, 195, 443, 465,
+ 587, 700, 993, 995, 1883, 5222 * TargetSslProxy: 25, 43, 110,
+ 143, 195, 443, 465, 587, 700, 993, 995, 1883, 5222 * TargetVpnGateway:
+ 500, 4500 .'
+ required: false
+ ports:
+ description:
+ - This field is used along with the backend_service field for internal load balancing.
+ - When the load balancing scheme is INTERNAL, a single port or a comma separated list
+ of ports can be configured. Only packets addressed to these ports will be forwarded
+ to the backends configured with this forwarding rule.
+ - You may specify a maximum of up to 5 ports.
+ required: false
+ subnetwork:
+ description:
+ - A reference to Subnetwork resource.
+ required: false
+ target:
+ description:
+ - This target must be a global load balancing resource. The forwarded traffic must
+ be of a type appropriate to the target object.
+ - 'Valid types: HTTP_PROXY, HTTPS_PROXY, SSL_PROXY, TCP_PROXY .'
+ required: false
+extends_documentation_fragment: gcp
+'''
+
+EXAMPLES = '''
+- name: create a global address
+ gcp_compute_global_address:
+ name: 'globaladdress-globalforwardingrule'
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
+ state: present
+ register: globaladdress
+- name: create a instance group
+ gcp_compute_instance_group:
+ name: 'instancegroup-globalforwardingrule'
+ zone: 'us-central1-a'
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
+ state: present
+ register: instancegroup
+- name: create a http health check
+ gcp_compute_http_health_check:
+ name: 'httphealthcheck-globalforwardingrule'
+ healthy_threshold: 10
+ port: 8080
+ timeout_sec: 2
+ unhealthy_threshold: 5
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
+ state: present
+ register: healthcheck
+- name: create a backend service
+ gcp_compute_backend_service:
+ name: 'backendservice-globalforwardingrule'
+ backends:
+ - group: "{{ instancegroup }}"
+ health_checks:
+ - "{{ healthcheck.selfLink }}"
+ enable_cdn: true
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
+ state: present
+ register: backendservice
+- name: create a url map
+ gcp_compute_url_map:
+ name: 'urlmap-globalforwardingrule'
+ default_service: "{{ backendservice }}"
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
+ state: present
+ register: urlmap
+- name: create a target http proxy
+ gcp_compute_target_http_proxy:
+ name: 'targethttpproxy-globalforwardingrule'
+ url_map: "{{ urlmap }}"
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
+ state: present
+ register: httpproxy
+- name: create a global forwarding rule
+ gcp_compute_global_forwarding_rule:
+ name: testObject
+ ip_address: "{{ globaladdress.address }}"
+ ip_protocol: 'TCP'
+ port_range: '80-80'
+ target: "{{ httpproxy.selfLink }}"
+ project: testProject
+ auth_kind: service_account
+ service_account_file: /tmp/auth.pem
+ scopes:
+ - https://www.googleapis.com/auth/compute
+ state: present
+'''
+
+RETURN = '''
+ creation_timestamp:
+ description:
+ - Creation timestamp in RFC3339 text format.
+ returned: success
+ type: str
+ description:
+ description:
+ - An optional description of this resource. Provide this property when you create
+ the resource.
+ returned: success
+ type: str
+ id:
+ description:
+ - The unique identifier for the resource.
+ returned: success
+ type: int
+ ip_address:
+ description:
+ - The IP address that this forwarding rule is serving on behalf of.
+ - Addresses are restricted based on the forwarding rule's load balancing scheme (EXTERNAL
+ or INTERNAL) and scope (global or regional).
+ - When the load balancing scheme is EXTERNAL, for global forwarding rules, the address
+ must be a global IP, and for regional forwarding rules, the address must live in
+ the same region as the forwarding rule. If this field is empty, an ephemeral IPv4
+ address from the same scope (global or regional) will be assigned. A regional forwarding
+ rule supports IPv4 only. A global forwarding rule supports either IPv4 or IPv6.
+ - When the load balancing scheme is INTERNAL, this can only be an RFC 1918 IP address
+ belonging to the network/subnet configured for the forwarding rule. By default,
+ if this field is empty, an ephemeral internal IP address will be automatically allocated
+ from the IP range of the subnet or network configured for this forwarding rule.
+ - 'An address can be specified either by a literal IP address or a URL reference to
+ an existing Address resource. The following examples are all valid: * 100.1.2.3
+ * U(https://www.googleapis.com/compute/v1/projects/project/regions/region/addresses/address)
+ * projects/project/regions/region/addresses/address * regions/region/addresses/address
+ * global/addresses/address * address .'
+ returned: success
+ type: str
+ ip_protocol:
+ description:
+ - The IP protocol to which this rule applies. Valid options are TCP, UDP, ESP, AH,
+ SCTP or ICMP.
+ - When the load balancing scheme is INTERNAL, only TCP and UDP are valid.
+ returned: success
+ type: str
+ backend_service:
+ description:
+ - A reference to BackendService resource.
+ returned: success
+ type: dict
+ ip_version:
+ description:
+ - The IP Version that will be used by this forwarding rule. Valid options are IPV4
+ or IPV6. This can only be specified for a global forwarding rule.
+ returned: success
+ type: str
+ load_balancing_scheme:
+ description:
+ - 'This signifies what the ForwardingRule will be used for and can only take the following
+ values: INTERNAL, EXTERNAL The value of INTERNAL means that this will be used for
+ Internal Network Load Balancing (TCP, UDP). The value of EXTERNAL means that this
+ will be used for External Load Balancing (HTTP(S) LB, External TCP/UDP LB, SSL Proxy)
+ .'
+ returned: success
+ type: str
+ name:
+ description:
+ - Name of the resource; provided by the client when the resource is created. The name
+ must be 1-63 characters long, and comply with RFC1035. Specifically, the name must
+ be 1-63 characters long and match the regular expression [a-z]([-a-z0-9]*[a-z0-9])?
+ which means the first character must be a lowercase letter, and all following characters
+ must be a dash, lowercase letter, or digit, except the last character, which cannot
+ be a dash.
+ returned: success
+ type: str
+ network:
+ description:
+ - A reference to Network resource.
+ returned: success
+ type: dict
+ port_range:
+ description:
+ - This field is used along with the target field for TargetHttpProxy, TargetHttpsProxy,
+ TargetSslProxy, TargetTcpProxy, TargetVpnGateway, TargetPool, TargetInstance.
+ - Applicable only when IPProtocol is TCP, UDP, or SCTP, only packets addressed to
+ ports in the specified range will be forwarded to target.
+ - Forwarding rules with the same [IPAddress, IPProtocol] pair must have disjoint port
+ ranges.
+ - 'Some types of forwarding target have constraints on the acceptable ports: * TargetHttpProxy:
+ 80, 8080 * TargetHttpsProxy: 443 * TargetTcpProxy: 25, 43, 110, 143, 195, 443, 465,
+ 587, 700, 993, 995, 1883, 5222 * TargetSslProxy: 25, 43, 110,
+ 143, 195, 443, 465, 587, 700, 993, 995, 1883, 5222 * TargetVpnGateway:
+ 500, 4500 .'
+ returned: success
+ type: str
+ ports:
+ description:
+ - This field is used along with the backend_service field for internal load balancing.
+ - When the load balancing scheme is INTERNAL, a single port or a comma separated list
+ of ports can be configured. Only packets addressed to these ports will be forwarded
+ to the backends configured with this forwarding rule.
+ - You may specify a maximum of up to 5 ports.
+ returned: success
+ type: list
+ subnetwork:
+ description:
+ - A reference to Subnetwork resource.
+ returned: success
+ type: dict
+ region:
+ description:
+ - A reference to Region resource.
+ returned: success
+ type: str
+ target:
+ description:
+ - This target must be a global load balancing resource. The forwarded traffic must
+ be of a type appropriate to the target object.
+ - 'Valid types: HTTP_PROXY, HTTPS_PROXY, SSL_PROXY, TCP_PROXY .'
+ returned: success
+ type: str
+'''
+
+################################################################################
+# Imports
+################################################################################
+
+from ansible.module_utils.gcp_utils import navigate_hash, GcpSession, GcpModule, GcpRequest, replace_resource_dict
+import json
+import time
+
+################################################################################
+# Main
+################################################################################
+
+
+def main():
+ """Main function"""
+
+ module = GcpModule(
+ argument_spec=dict(
+ state=dict(default='present', choices=['present', 'absent'], type='str'),
+ description=dict(type='str'),
+ ip_address=dict(type='str'),
+ ip_protocol=dict(type='str', choices=['TCP', 'UDP', 'ESP', 'AH', 'SCTP', 'ICMP']),
+ backend_service=dict(type='dict'),
+ ip_version=dict(type='str', choices=['IPV4', 'IPV6']),
+ load_balancing_scheme=dict(type='str', choices=['INTERNAL', 'EXTERNAL']),
+ name=dict(required=True, type='str'),
+ network=dict(type='dict'),
+ port_range=dict(type='str'),
+ ports=dict(type='list', elements='str'),
+ subnetwork=dict(type='dict'),
+ target=dict(type='str')
+ )
+ )
+
+ state = module.params['state']
+ kind = 'compute#forwardingRule'
+
+ fetch = fetch_resource(module, self_link(module), kind)
+ changed = False
+
+ if fetch:
+ if state == 'present':
+ if is_different(module, fetch):
+ fetch = update(module, self_link(module), kind)
+ changed = True
+ else:
+ delete(module, self_link(module), kind)
+ fetch = {}
+ changed = True
+ else:
+ if state == 'present':
+ fetch = create(module, collection(module), kind)
+ changed = True
+ else:
+ fetch = {}
+
+ fetch.update({'changed': changed})
+
+ module.exit_json(**fetch)
+
+
+def create(module, link, kind):
+ auth = GcpSession(module, 'compute')
+ return wait_for_operation(module, auth.post(link, resource_to_request(module)))
+
+
+def update(module, link, kind):
+ auth = GcpSession(module, 'compute')
+ return wait_for_operation(module, auth.put(link, resource_to_request(module)))
+
+
+def delete(module, link, kind):
+ auth = GcpSession(module, 'compute')
+ return wait_for_operation(module, auth.delete(link))
+
+
+def resource_to_request(module):
+ request = {
+ u'kind': 'compute#forwardingRule',
+ u'description': module.params.get('description'),
+ u'IPAddress': module.params.get('ip_address'),
+ u'IPProtocol': module.params.get('ip_protocol'),
+ u'backendService': replace_resource_dict(module.params.get(u'backend_service', {}), 'selfLink'),
+ u'ipVersion': module.params.get('ip_version'),
+ u'loadBalancingScheme': module.params.get('load_balancing_scheme'),
+ u'name': module.params.get('name'),
+ u'network': replace_resource_dict(module.params.get(u'network', {}), 'selfLink'),
+ u'portRange': module.params.get('port_range'),
+ u'ports': module.params.get('ports'),
+ u'subnetwork': replace_resource_dict(module.params.get(u'subnetwork', {}), 'selfLink'),
+ u'target': module.params.get('target')
+ }
+ return_vals = {}
+ for k, v in request.items():
+ if v:
+ return_vals[k] = v
+
+ return return_vals
+
+
+def fetch_resource(module, link, kind):
+ auth = GcpSession(module, 'compute')
+ return return_if_object(module, auth.get(link), kind)
+
+
+def self_link(module):
+ return "https://www.googleapis.com/compute/v1/projects/{project}/global/forwardingRules/{name}".format(**module.params)
+
+
+def collection(module):
+ return "https://www.googleapis.com/compute/v1/projects/{project}/global/forwardingRules".format(**module.params)
+
+
+def return_if_object(module, response, kind):
+ # If not found, return nothing.
+ if response.status_code == 404:
+ return None
+
+ # If no content, return nothing.
+ if response.status_code == 204:
+ return None
+
+ try:
+ module.raise_for_status(response)
+ result = response.json()
+ except getattr(json.decoder, 'JSONDecodeError', ValueError) as inst:
+ module.fail_json(msg="Invalid JSON response with error: %s" % inst)
+
+ if navigate_hash(result, ['error', 'errors']):
+ module.fail_json(msg=navigate_hash(result, ['error', 'errors']))
+ if result['kind'] != kind:
+ module.fail_json(msg="Incorrect result: {kind}".format(**result))
+
+ return result
+
+
+def is_different(module, response):
+ request = resource_to_request(module)
+ response = response_to_hash(module, response)
+
+ # Remove all output-only from response.
+ response_vals = {}
+ for k, v in response.items():
+ if k in request:
+ response_vals[k] = v
+
+ request_vals = {}
+ for k, v in request.items():
+ if k in response:
+ request_vals[k] = v
+
+ return GcpRequest(request_vals) != GcpRequest(response_vals)
+
+
+# Remove unnecessary properties from the response.
+# This is for doing comparisons with Ansible's current parameters.
+def response_to_hash(module, response):
+ return {
+ u'creationTimestamp': response.get(u'creationTimestamp'),
+ u'description': response.get(u'description'),
+ u'id': response.get(u'id'),
+ u'IPAddress': response.get(u'IPAddress'),
+ u'IPProtocol': response.get(u'IPProtocol'),
+ u'backendService': response.get(u'backendService'),
+ u'ipVersion': response.get(u'ipVersion'),
+ u'loadBalancingScheme': response.get(u'loadBalancingScheme'),
+ u'name': response.get(u'name'),
+ u'network': response.get(u'network'),
+ u'portRange': response.get(u'portRange'),
+ u'ports': response.get(u'ports'),
+ u'subnetwork': response.get(u'subnetwork'),
+ u'region': response.get(u'region'),
+ u'target': response.get(u'target')
+ }
+
+
+def async_op_url(module, extra_data=None):
+ if extra_data is None:
+ extra_data = {}
+ url = "https://www.googleapis.com/compute/v1/projects/{project}/global/operations/{op_id}"
+ combined = extra_data.copy()
+ combined.update(module.params)
+ return url.format(**combined)
+
+
+def wait_for_operation(module, response):
+ op_result = return_if_object(module, response, 'compute#operation')
+ if op_result is None:
+ return None
+ status = navigate_hash(op_result, ['status'])
+ wait_done = wait_for_completion(status, op_result, module)
+ return fetch_resource(module, navigate_hash(wait_done, ['targetLink']), 'compute#forwardingRule')
+
+
+def wait_for_completion(status, op_result, module):
+ op_id = navigate_hash(op_result, ['name'])
+ op_uri = async_op_url(module, {'op_id': op_id})
+ while status != 'DONE':
+ raise_if_errors(op_result, ['error', 'errors'], 'message')
+ time.sleep(1.0)
+ if status not in ['PENDING', 'RUNNING', 'DONE']:
+ module.fail_json(msg="Invalid result %s" % status)
+ op_result = fetch_resource(module, op_uri, 'compute#operation')
+ status = navigate_hash(op_result, ['status'])
+ return op_result
+
+
+def raise_if_errors(response, err_path, module):
+ errors = navigate_hash(response, err_path)
+ if errors is not None:
+ module.fail_json(msg=errors)
+
+if __name__ == '__main__':
+ main()
diff --git a/test/integration/targets/gcp_compute_global_forwarding_rule/aliases b/test/integration/targets/gcp_compute_global_forwarding_rule/aliases
new file mode 100644
index 0000000000..9812f019ca
--- /dev/null
+++ b/test/integration/targets/gcp_compute_global_forwarding_rule/aliases
@@ -0,0 +1,2 @@
+cloud/gcp
+unsupported
diff --git a/test/integration/targets/gcp_compute_global_forwarding_rule/defaults/main.yml b/test/integration/targets/gcp_compute_global_forwarding_rule/defaults/main.yml
new file mode 100644
index 0000000000..aa87a2a8e0
--- /dev/null
+++ b/test/integration/targets/gcp_compute_global_forwarding_rule/defaults/main.yml
@@ -0,0 +1,3 @@
+---
+# defaults file
+resource_name: '{{resource_prefix}}'
diff --git a/test/integration/targets/gcp_compute_global_forwarding_rule/meta/main.yml b/test/integration/targets/gcp_compute_global_forwarding_rule/meta/main.yml
new file mode 100644
index 0000000000..e69de29bb2
--- /dev/null
+++ b/test/integration/targets/gcp_compute_global_forwarding_rule/meta/main.yml
diff --git a/test/integration/targets/gcp_compute_global_forwarding_rule/tasks/main.yml b/test/integration/targets/gcp_compute_global_forwarding_rule/tasks/main.yml
new file mode 100644
index 0000000000..1fbfe2472e
--- /dev/null
+++ b/test/integration/targets/gcp_compute_global_forwarding_rule/tasks/main.yml
@@ -0,0 +1,254 @@
+---
+# ----------------------------------------------------------------------------
+#
+# *** AUTO GENERATED CODE *** AUTO GENERATED CODE ***
+#
+# ----------------------------------------------------------------------------
+#
+# This file is automatically generated by Magic Modules and manual
+# changes will be clobbered when the file is regenerated.
+#
+# Please read more about how to change this file at
+# https://www.github.com/GoogleCloudPlatform/magic-modules
+#
+# ----------------------------------------------------------------------------
+# Pre-test setup
+- name: create a global address
+ gcp_compute_global_address:
+ name: 'globaladdress-globalforwardingrule'
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
+ state: present
+ register: globaladdress
+- name: create a instance group
+ gcp_compute_instance_group:
+ name: 'instancegroup-globalforwardingrule'
+ zone: 'us-central1-a'
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
+ state: present
+ register: instancegroup
+- name: create a http health check
+ gcp_compute_http_health_check:
+ name: 'httphealthcheck-globalforwardingrule'
+ healthy_threshold: 10
+ port: 8080
+ timeout_sec: 2
+ unhealthy_threshold: 5
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
+ state: present
+ register: healthcheck
+- name: create a backend service
+ gcp_compute_backend_service:
+ name: 'backendservice-globalforwardingrule'
+ backends:
+ - group: "{{ instancegroup }}"
+ health_checks:
+ - "{{ healthcheck.selfLink }}"
+ enable_cdn: true
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
+ state: present
+ register: backendservice
+- name: create a url map
+ gcp_compute_url_map:
+ name: 'urlmap-globalforwardingrule'
+ default_service: "{{ backendservice }}"
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
+ state: present
+ register: urlmap
+- name: create a target http proxy
+ gcp_compute_target_http_proxy:
+ name: 'targethttpproxy-globalforwardingrule'
+ url_map: "{{ urlmap }}"
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
+ state: present
+ register: httpproxy
+- name: delete a global forwarding rule
+ gcp_compute_global_forwarding_rule:
+ name: "{{ resource_name }}"
+ ip_address: "{{ globaladdress.address }}"
+ ip_protocol: 'TCP'
+ port_range: '80-80'
+ target: "{{ httpproxy.selfLink }}"
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
+ state: absent
+#----------------------------------------------------------
+- name: create a global forwarding rule
+ gcp_compute_global_forwarding_rule:
+ name: "{{ resource_name }}"
+ ip_address: "{{ globaladdress.address }}"
+ ip_protocol: 'TCP'
+ port_range: '80-80'
+ target: "{{ httpproxy.selfLink }}"
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
+ state: present
+ register: result
+- name: assert changed is true
+ assert:
+ that:
+ - result.changed == true
+ - "result.kind == 'compute#forwardingRule'"
+# ----------------------------------------------------------------------------
+- name: create a global forwarding rule that already exists
+ gcp_compute_global_forwarding_rule:
+ name: "{{ resource_name }}"
+ ip_address: "{{ globaladdress.address }}"
+ ip_protocol: 'TCP'
+ port_range: '80-80'
+ target: "{{ httpproxy.selfLink }}"
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
+ state: present
+ register: result
+- name: assert changed is false
+ assert:
+ that:
+ - result.changed == false
+ - "result.kind == 'compute#forwardingRule'"
+#----------------------------------------------------------
+- name: delete a global forwarding rule
+ gcp_compute_global_forwarding_rule:
+ name: "{{ resource_name }}"
+ ip_address: "{{ globaladdress.address }}"
+ ip_protocol: 'TCP'
+ port_range: '80-80'
+ target: "{{ httpproxy.selfLink }}"
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
+ state: absent
+ register: result
+- name: assert changed is true
+ assert:
+ that:
+ - result.changed == true
+ - result.has_key('kind') == False
+# ----------------------------------------------------------------------------
+- name: delete a global forwarding rule that does not exist
+ gcp_compute_global_forwarding_rule:
+ name: "{{ resource_name }}"
+ ip_address: "{{ globaladdress.address }}"
+ ip_protocol: 'TCP'
+ port_range: '80-80'
+ target: "{{ httpproxy.selfLink }}"
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
+ state: absent
+ register: result
+- name: assert changed is false
+ assert:
+ that:
+ - result.changed == false
+ - result.has_key('kind') == False
+#---------------------------------------------------------
+# Post-test teardown
+- name: delete a target http proxy
+ gcp_compute_target_http_proxy:
+ name: 'targethttpproxy-globalforwardingrule'
+ url_map: "{{ urlmap }}"
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
+ state: absent
+ register: httpproxy
+- name: delete a url map
+ gcp_compute_url_map:
+ name: 'urlmap-globalforwardingrule'
+ default_service: "{{ backendservice }}"
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
+ state: absent
+ register: urlmap
+- name: delete a backend service
+ gcp_compute_backend_service:
+ name: 'backendservice-globalforwardingrule'
+ backends:
+ - group: "{{ instancegroup }}"
+ health_checks:
+ - "{{ healthcheck.selfLink }}"
+ enable_cdn: true
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
+ state: absent
+ register: backendservice
+- name: delete a http health check
+ gcp_compute_http_health_check:
+ name: 'httphealthcheck-globalforwardingrule'
+ healthy_threshold: 10
+ port: 8080
+ timeout_sec: 2
+ unhealthy_threshold: 5
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
+ state: absent
+ register: healthcheck
+- name: delete a instance group
+ gcp_compute_instance_group:
+ name: 'instancegroup-globalforwardingrule'
+ zone: 'us-central1-a'
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
+ state: absent
+ register: instancegroup
+- name: delete a global address
+ gcp_compute_global_address:
+ name: 'globaladdress-globalforwardingrule'
+ project: "{{ gcp_project }}"
+ auth_kind: "{{ gcp_cred_kind }}"
+ service_account_file: "{{ gcp_cred_file }}"
+ scopes:
+ - https://www.googleapis.com/auth/compute
+ state: absent
+ register: globaladdress