diff options
Diffstat (limited to 'lib/ansible/modules/cloud/azure/azure_rm_mysqlfirewallrule_info.py')
-rw-r--r-- | lib/ansible/modules/cloud/azure/azure_rm_mysqlfirewallrule_info.py | 205 |
1 files changed, 0 insertions, 205 deletions
diff --git a/lib/ansible/modules/cloud/azure/azure_rm_mysqlfirewallrule_info.py b/lib/ansible/modules/cloud/azure/azure_rm_mysqlfirewallrule_info.py deleted file mode 100644 index 9fa760ecdb..0000000000 --- a/lib/ansible/modules/cloud/azure/azure_rm_mysqlfirewallrule_info.py +++ /dev/null @@ -1,205 +0,0 @@ -#!/usr/bin/python -# -# Copyright (c) 2018 Zim Kalinowski, <zikalino@microsoft.com> -# -# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) - -from __future__ import absolute_import, division, print_function -__metaclass__ = type - - -ANSIBLE_METADATA = {'metadata_version': '1.1', - 'status': ['preview'], - 'supported_by': 'community'} - - -DOCUMENTATION = ''' ---- -module: azure_rm_mysqlfirewallrule_info -version_added: "2.9" -short_description: Get Azure MySQL Firewall Rule facts -description: - - Get facts of Azure MySQL Firewall Rule. - -options: - resource_group: - description: - - The name of the resource group. - required: True - type: str - server_name: - description: - - The name of the server. - required: True - type: str - name: - description: - - The name of the server firewall rule. - type: str - -extends_documentation_fragment: - - azure - -author: - - Zim Kalinowski (@zikalino) - -''' - -EXAMPLES = ''' - - name: Get instance of MySQL Firewall Rule - azure_rm_mysqlfirewallrule_info: - resource_group: myResourceGroup - server_name: server_name - name: firewall_rule_name - - - name: List instances of MySQL Firewall Rule - azure_rm_mysqlfirewallrule_info: - resource_group: myResourceGroup - server_name: server_name -''' - -RETURN = ''' -rules: - description: - - A list of dictionaries containing facts for MySQL Firewall Rule. - returned: always - type: complex - contains: - id: - description: - - Resource ID. - returned: always - type: str - sample: "/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/TestGroup/providers/Microsoft.DBforMySQL/servers/testserver/fire - wallRules/rule1" - server_name: - description: - - The name of the server. - returned: always - type: str - sample: testserver - name: - description: - - Resource name. - returned: always - type: str - sample: rule1 - start_ip_address: - description: - - The start IP address of the MySQL firewall rule. - returned: always - type: str - sample: 10.0.0.16 - end_ip_address: - description: - - The end IP address of the MySQL firewall rule. - returned: always - type: str - sample: 10.0.0.18 -''' - -from ansible.module_utils.azure_rm_common import AzureRMModuleBase - -try: - from msrestazure.azure_exceptions import CloudError - from msrestazure.azure_operation import AzureOperationPoller - from azure.mgmt.rdbms.mysql import MySQLManagementClient - from msrest.serialization import Model -except ImportError: - # This is handled in azure_rm_common - pass - - -class AzureRMMySqlFirewallRuleInfo(AzureRMModuleBase): - def __init__(self): - # define user inputs into argument - self.module_arg_spec = dict( - resource_group=dict( - type='str', - required=True - ), - server_name=dict( - type='str', - required=True - ), - name=dict( - type='str' - ) - ) - # store the results of the module operation - self.results = dict( - changed=False - ) - self.mgmt_client = None - self.resource_group = None - self.server_name = None - self.name = None - super(AzureRMMySqlFirewallRuleInfo, self).__init__(self.module_arg_spec, supports_tags=False) - - def exec_module(self, **kwargs): - is_old_facts = self.module._name == 'azure_rm_mysqlfirewallrule_facts' - if is_old_facts: - self.module.deprecate("The 'azure_rm_mysqlfirewallrule_facts' module has been renamed to 'azure_rm_mysqlfirewallrule_info'", version='2.13') - - for key in self.module_arg_spec: - setattr(self, key, kwargs[key]) - self.mgmt_client = self.get_mgmt_svc_client(MySQLManagementClient, - base_url=self._cloud_environment.endpoints.resource_manager) - - if (self.name is not None): - self.results['rules'] = self.get() - else: - self.results['rules'] = self.list_by_server() - return self.results - - def get(self): - response = None - results = [] - try: - response = self.mgmt_client.firewall_rules.get(resource_group_name=self.resource_group, - server_name=self.server_name, - firewall_rule_name=self.name) - self.log("Response : {0}".format(response)) - except CloudError as e: - self.log('Could not get facts for FirewallRules.') - - if response is not None: - results.append(self.format_item(response)) - - return results - - def list_by_server(self): - response = None - results = [] - try: - response = self.mgmt_client.firewall_rules.list_by_server(resource_group_name=self.resource_group, - server_name=self.server_name) - self.log("Response : {0}".format(response)) - except CloudError as e: - self.log('Could not get facts for FirewallRules.') - - if response is not None: - for item in response: - results.append(self.format_item(item)) - - return results - - def format_item(self, item): - d = item.as_dict() - d = { - 'resource_group': self.resource_group, - 'id': d['id'], - 'server_name': self.server_name, - 'name': d['name'], - 'start_ip_address': d['start_ip_address'], - 'end_ip_address': d['end_ip_address'] - } - return d - - -def main(): - AzureRMMySqlFirewallRuleInfo() - - -if __name__ == '__main__': - main() |