summaryrefslogtreecommitdiff
path: root/test/integration
diff options
context:
space:
mode:
Diffstat (limited to 'test/integration')
-rw-r--r--test/integration/targets/azure_rm_acs/aliases3
-rw-r--r--test/integration/targets/azure_rm_acs/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_acs/tasks/main.yml149
-rw-r--r--test/integration/targets/azure_rm_aks/aliases3
-rw-r--r--test/integration/targets/azure_rm_aks/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_aks/tasks/main.yml213
-rw-r--r--test/integration/targets/azure_rm_appgateway/aliases3
-rw-r--r--test/integration/targets/azure_rm_appgateway/files/cert1.txt1
-rw-r--r--test/integration/targets/azure_rm_appgateway/files/cert2.txt1
-rw-r--r--test/integration/targets/azure_rm_appgateway/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_appgateway/tasks/main.yml401
-rw-r--r--test/integration/targets/azure_rm_appserviceplan/aliases4
-rw-r--r--test/integration/targets/azure_rm_appserviceplan/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_appserviceplan/tasks/main.yml84
-rw-r--r--test/integration/targets/azure_rm_automationaccount/aliases4
-rw-r--r--test/integration/targets/azure_rm_automationaccount/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_automationaccount/tasks/main.yml88
-rw-r--r--test/integration/targets/azure_rm_autoscale/aliases4
-rw-r--r--test/integration/targets/azure_rm_autoscale/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_autoscale/tasks/main.yml219
-rw-r--r--test/integration/targets/azure_rm_availabilityset/aliases4
-rw-r--r--test/integration/targets/azure_rm_availabilityset/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_availabilityset/tasks/main.yml136
-rw-r--r--test/integration/targets/azure_rm_azurefirewall/aliases4
-rw-r--r--test/integration/targets/azure_rm_azurefirewall/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_azurefirewall/tasks/main.yml277
-rw-r--r--test/integration/targets/azure_rm_batchaccount/aliases3
-rw-r--r--test/integration/targets/azure_rm_batchaccount/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_batchaccount/tasks/main.yml76
-rw-r--r--test/integration/targets/azure_rm_cdnprofile/aliases5
-rw-r--r--test/integration/targets/azure_rm_cdnprofile/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_cdnprofile/tasks/main.yml276
-rw-r--r--test/integration/targets/azure_rm_containerinstance/aliases4
-rw-r--r--test/integration/targets/azure_rm_containerinstance/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_containerinstance/tasks/main.yml214
-rw-r--r--test/integration/targets/azure_rm_containerregistry/aliases4
-rw-r--r--test/integration/targets/azure_rm_containerregistry/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_containerregistry/tasks/main.yml116
-rw-r--r--test/integration/targets/azure_rm_cosmosdbaccount/aliases4
-rw-r--r--test/integration/targets/azure_rm_cosmosdbaccount/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_cosmosdbaccount/tasks/main.yml249
-rw-r--r--test/integration/targets/azure_rm_deployment/aliases3
-rw-r--r--test/integration/targets/azure_rm_deployment/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_deployment/tasks/main.yml45
-rw-r--r--test/integration/targets/azure_rm_devtestlab/aliases17
-rw-r--r--test/integration/targets/azure_rm_devtestlab/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_devtestlab/tasks/main.yml766
-rw-r--r--test/integration/targets/azure_rm_dnszone/aliases6
-rw-r--r--test/integration/targets/azure_rm_dnszone/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_dnszone/tasks/main.yml355
-rw-r--r--test/integration/targets/azure_rm_functionapp/aliases3
-rw-r--r--test/integration/targets/azure_rm_functionapp/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_functionapp/tasks/main.yml131
-rw-r--r--test/integration/targets/azure_rm_gallery/aliases6
-rw-r--r--test/integration/targets/azure_rm_gallery/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_gallery/tasks/main.yml342
-rw-r--r--test/integration/targets/azure_rm_hdinsightcluster/aliases6
-rw-r--r--test/integration/targets/azure_rm_hdinsightcluster/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_hdinsightcluster/tasks/main.yml244
-rw-r--r--test/integration/targets/azure_rm_image/aliases4
-rw-r--r--test/integration/targets/azure_rm_image/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_image/tasks/main.yml171
-rw-r--r--test/integration/targets/azure_rm_iothub/aliases4
-rw-r--r--test/integration/targets/azure_rm_iothub/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_iothub/tasks/main.yml172
-rw-r--r--test/integration/targets/azure_rm_keyvault/aliases5
-rw-r--r--test/integration/targets/azure_rm_keyvault/lookup_plugins/azure_service_principal_attribute.py94
-rw-r--r--test/integration/targets/azure_rm_keyvault/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_keyvault/tasks/main.yml270
-rw-r--r--test/integration/targets/azure_rm_loadbalancer/aliases3
-rw-r--r--test/integration/targets/azure_rm_loadbalancer/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_loadbalancer/tasks/main.yml298
-rw-r--r--test/integration/targets/azure_rm_lock/aliases4
-rw-r--r--test/integration/targets/azure_rm_lock/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_lock/tasks/main.yml99
-rw-r--r--test/integration/targets/azure_rm_loganalyticsworkspace/aliases4
-rw-r--r--test/integration/targets/azure_rm_loganalyticsworkspace/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_loganalyticsworkspace/tasks/main.yml128
-rw-r--r--test/integration/targets/azure_rm_manageddisk/aliases4
-rw-r--r--test/integration/targets/azure_rm_manageddisk/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_manageddisk/tasks/main.yml204
-rw-r--r--test/integration/targets/azure_rm_mariadbserver/aliases8
-rw-r--r--test/integration/targets/azure_rm_mariadbserver/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_mariadbserver/tasks/main.yml640
-rw-r--r--test/integration/targets/azure_rm_monitorlogprofile/aliases3
-rw-r--r--test/integration/targets/azure_rm_monitorlogprofile/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_monitorlogprofile/tasks/main.yml104
-rw-r--r--test/integration/targets/azure_rm_mysqlserver/aliases10
-rw-r--r--test/integration/targets/azure_rm_mysqlserver/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_mysqlserver/tasks/main.yml640
-rw-r--r--test/integration/targets/azure_rm_networkinterface/aliases4
-rw-r--r--test/integration/targets/azure_rm_networkinterface/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_networkinterface/tasks/main.yml554
-rw-r--r--test/integration/targets/azure_rm_postgresqlserver/aliases10
-rw-r--r--test/integration/targets/azure_rm_postgresqlserver/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_postgresqlserver/tasks/main.yml610
-rw-r--r--test/integration/targets/azure_rm_publicipaddress/aliases4
-rw-r--r--test/integration/targets/azure_rm_publicipaddress/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_publicipaddress/tasks/main.yml113
-rw-r--r--test/integration/targets/azure_rm_rediscache/aliases5
-rw-r--r--test/integration/targets/azure_rm_rediscache/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_rediscache/tasks/main.yml317
-rw-r--r--test/integration/targets/azure_rm_resource/aliases3
-rw-r--r--test/integration/targets/azure_rm_resource/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_resource/tasks/main.yml158
-rw-r--r--test/integration/targets/azure_rm_resourcegroup/aliases4
-rw-r--r--test/integration/targets/azure_rm_resourcegroup/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_resourcegroup/tasks/main.yml39
-rw-r--r--test/integration/targets/azure_rm_roledefinition/aliases3
-rw-r--r--test/integration/targets/azure_rm_roledefinition/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_roledefinition/tasks/main.yml207
-rw-r--r--test/integration/targets/azure_rm_routetable/aliases3
-rw-r--r--test/integration/targets/azure_rm_routetable/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_routetable/tasks/main.yml183
-rw-r--r--test/integration/targets/azure_rm_securitygroup/aliases4
-rw-r--r--test/integration/targets/azure_rm_securitygroup/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_securitygroup/tasks/main.yml302
-rw-r--r--test/integration/targets/azure_rm_servicebus/aliases3
-rw-r--r--test/integration/targets/azure_rm_servicebus/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_servicebus/tasks/main.yml169
-rw-r--r--test/integration/targets/azure_rm_sqlserver/aliases8
-rw-r--r--test/integration/targets/azure_rm_sqlserver/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_sqlserver/tasks/main.yml419
-rw-r--r--test/integration/targets/azure_rm_storageaccount/aliases4
-rw-r--r--test/integration/targets/azure_rm_storageaccount/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_storageaccount/tasks/main.yml158
-rw-r--r--test/integration/targets/azure_rm_storageblob/aliases4
-rw-r--r--test/integration/targets/azure_rm_storageblob/files/Ratings.pngbin35164 -> 0 bytes
-rw-r--r--test/integration/targets/azure_rm_storageblob/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_storageblob/tasks/main.yml119
-rw-r--r--test/integration/targets/azure_rm_subnet/aliases3
-rw-r--r--test/integration/targets/azure_rm_subnet/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_subnet/tasks/main.yml182
-rw-r--r--test/integration/targets/azure_rm_trafficmanagerprofile/aliases3
-rw-r--r--test/integration/targets/azure_rm_trafficmanagerprofile/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_trafficmanagerprofile/tasks/main.yml289
-rw-r--r--test/integration/targets/azure_rm_virtualmachine/aliases4
-rw-r--r--test/integration/targets/azure_rm_virtualmachine/inventory.yml66
-rw-r--r--test/integration/targets/azure_rm_virtualmachine/main.yml7
-rwxr-xr-xtest/integration/targets/azure_rm_virtualmachine/runme.sh5
-rw-r--r--test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_deallocate.yml90
-rw-r--r--test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_dual_nic.yml131
-rw-r--r--test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_invalid.yml35
-rw-r--r--test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_minimal.yml118
-rw-r--r--test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_no_public_ip.yml41
-rw-r--r--test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_public_ip.yml311
-rw-r--r--test/integration/targets/azure_rm_virtualmachine/tasks/setup.yml26
-rw-r--r--test/integration/targets/azure_rm_virtualmachineextension/aliases4
-rw-r--r--test/integration/targets/azure_rm_virtualmachineextension/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_virtualmachineextension/tasks/main.yml181
-rw-r--r--test/integration/targets/azure_rm_virtualmachineimage_info/aliases4
-rw-r--r--test/integration/targets/azure_rm_virtualmachineimage_info/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_virtualmachineimage_info/tasks/main.yml43
-rw-r--r--test/integration/targets/azure_rm_virtualmachinescaleset/aliases7
-rw-r--r--test/integration/targets/azure_rm_virtualmachinescaleset/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_virtualmachinescaleset/tasks/main.yml617
-rw-r--r--test/integration/targets/azure_rm_virtualnetwork/aliases3
-rw-r--r--test/integration/targets/azure_rm_virtualnetwork/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_virtualnetwork/tasks/main.yml181
-rw-r--r--test/integration/targets/azure_rm_virtualnetworkgateway/aliases3
-rw-r--r--test/integration/targets/azure_rm_virtualnetworkgateway/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_virtualnetworkgateway/tasks/main.yml126
-rw-r--r--test/integration/targets/azure_rm_virtualnetworkpeering/aliases3
-rw-r--r--test/integration/targets/azure_rm_virtualnetworkpeering/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_virtualnetworkpeering/tasks/main.yml126
-rw-r--r--test/integration/targets/azure_rm_webapp/aliases5
-rw-r--r--test/integration/targets/azure_rm_webapp/meta/main.yml2
-rw-r--r--test/integration/targets/azure_rm_webapp/tasks/main.yml434
168 files changed, 0 insertions, 13899 deletions
diff --git a/test/integration/targets/azure_rm_acs/aliases b/test/integration/targets/azure_rm_acs/aliases
deleted file mode 100644
index 70048be663..0000000000
--- a/test/integration/targets/azure_rm_acs/aliases
+++ /dev/null
@@ -1,3 +0,0 @@
-cloud/azure
-destructive
-unsupported
diff --git a/test/integration/targets/azure_rm_acs/meta/main.yml b/test/integration/targets/azure_rm_acs/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_acs/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_acs/tasks/main.yml b/test/integration/targets/azure_rm_acs/tasks/main.yml
deleted file mode 100644
index a35871c09b..0000000000
--- a/test/integration/targets/azure_rm_acs/tasks/main.yml
+++ /dev/null
@@ -1,149 +0,0 @@
- - name: Create an ACS instance - DCOS
- azure_rm_acs:
- name: "acsdcos{{ resource_group | hash('md5') | truncate(7, True, '') }}"
- resource_group: "{{ resource_group }}"
- location: eastus
- orchestration_platform: DCOS
- master_profile:
- - count: 1
- dns_prefix: "acsdcos{{ resource_group | hash('md5') | truncate(10, True, '') }}"
- vm_size: Standard_A0
- linux_profile:
- - admin_username: azureuser
- ssh_key: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqaZoyiz1qbdOQ8xEf6uEu1cCwYowo5FHtsBhqLoDnnp7KUTEBN+io238wdhjkasndq238e2/983289dasjnasey823/YkUCuzxDpsH7DUDhZcwySLKVVe0Qm3+928dfsjsejk298r/+vAnflKebuypNlmocIvakFWoZda18FOmsOoIVXQ8HWFNCuw9ZCunMSN62QGamCe3dL5cXlkgHYv7ekJE15IA9aOJcM7e90oeTqo+dsajda82e78sdja/llas8tsXY85LFqRnr3gJ02bAscjc477+X+j/gkpFoN1QEmt juliens@msft.com
- agent_pool_profiles:
- - name: default
- count: 1
- dns_prefix: "acsdcos{{ resource_group | hash('md5') | truncate(12, True, '') }}"
- vm_size: Standard_A0
- diagnostics_profile: false
- register: output
-
- - name: Assert the ACS instance is well created
- assert:
- that:
- - output.changed
- - output.state.provisioning_state == 'Succeeded'
-
- - name: Scale the ACS instance from 1 to 2 - DCOS
- azure_rm_acs:
- name: "acsdcos{{ resource_group | hash('md5') | truncate(7, True, '') }}"
- resource_group: "{{ resource_group }}"
- location: eastus
- orchestration_platform: DCOS
- master_profile:
- - count: 1
- dns_prefix: "acsdcos{{ resource_group | hash('md5') | truncate(10, True, '') }}"
- vm_size: Standard_A0
- linux_profile:
- - admin_username: azureuser
- ssh_key: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqaZoyiz1qbdOQ8xEf6uEu1cCwYowo5FHtsBhqLoDnnp7KUTEBN+io238wdhjkasndq238e2/983289dasjnasey823/YkUCuzxDpsH7DUDhZcwySLKVVe0Qm3+928dfsjsejk298r/+vAnflKebuypNlmocIvakFWoZda18FOmsOoIVXQ8HWFNCuw9ZCunMSN62QGamCe3dL5cXlkgHYv7ekJE15IA9aOJcM7e90oeTqo+dsajda82e78sdja/llas8tsXY85LFqRnr3gJ02bAscjc477+X+j/gkpFoN1QEmt juliens@msft.com
- agent_pool_profiles:
- - name: default
- count: 2
- dns_prefix: "acsdcos{{ resource_group | hash('md5') | truncate(12, True, '') }}"
- vm_size: Standard_A0
- diagnostics_profile: false
- register: output
-
- - name: Assert the ACS instance is well scaled
- assert:
- that:
- - output.changed
- - output.state.agent_pool_profiles[0].count == 2
-
- - name: Delete the DCOS ACS instance - DCOS
- azure_rm_acs:
- name: "acsdcos{{ resource_group | hash('md5') | truncate(7, True, '') }}"
- resource_group: "{{ resource_group }}"
- location: eastus
- orchestration_platform: DCOS
- state: absent
- master_profile:
- - count: 1
- dns_prefix: "acsdcos{{ resource_group | hash('md5') | truncate(10, True, '') }}"
- vm_size: Standard_A0
- linux_profile:
- - admin_username: azureuser
- ssh_key: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqaZoyiz1qbdOQ8xEf6uEu1cCwYowo5FHtsBhqLoDnnp7KUTEBN+io238wdhjkasndq238e2/983289dasjnasey823/YkUCuzxDpsH7DUDhZcwySLKVVe0Qm3+928dfsjsejk298r/+vAnflKebuypNlmocIvakFWoZda18FOmsOoIVXQ8HWFNCuw9ZCunMSN62QGamCe3dL5cXlkgHYv7ekJE15IA9aOJcM7e90oeTqo+dsajda82e78sdja/llas8tsXY85LFqRnr3gJ02bAscjc477+X+j/gkpFoN1QEmt juliens@msft.com
- agent_pool_profiles:
- - name: default
- count: 2
- dns_prefix: "acsdcos{{ resource_group | hash('md5') | truncate(12, True, '') }}"
- vm_size: Standard_A0
- diagnostics_profile: false
-
- - name: Create an ACS instance - Swarm
- azure_rm_acs:
- name: "acssw{{ resource_group | hash('md5') | truncate(7, True, '') }}"
- resource_group: "{{ resource_group }}"
- location: eastus
- orchestration_platform: Swarm
- master_profile:
- - count: 1
- dns_prefix: "acssw{{ resource_group | hash('md5') | truncate(10, True, '') }}"
- vm_size: Standard_A0
- linux_profile:
- - admin_username: azureuser
- ssh_key: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqaZoyiz1qbdOQ8xEf6uEu1cCwYowo5FHtsBhqLoDnnp7KUTEBN+io238wdhjkasndq238e2/983289dasjnasey823/YkUCuzxDpsH7DUDhZcwySLKVVe0Qm3+928dfsjsejk298r/+vAnflKebuypNlmocIvakFWoZda18FOmsOoIVXQ8HWFNCuw9ZCunMSN62QGamCe3dL5cXlkgHYv7ekJE15IA9aOJcM7e90oeTqo+dsajda82e78sdja/llas8tsXY85LFqRnr3gJ02bAscjc477+X+j/gkpFoN1QEmt juliens@msft.com
- agent_pool_profiles:
- - name: default
- count: 1
- dns_prefix: "acssw{{ resource_group | hash('md5') | truncate(12, True, '') }}"
- vm_size: Standard_A0
- diagnostics_profile: false
- register: output
-
- - name: Assert the ACS instance is well created
- assert:
- that:
- - output.changed
- - output.state.provisioning_state == 'Succeeded'
-
- - name: Scale the ACS instance from 1 to 2 - Swarm
- azure_rm_acs:
- name: "acssw{{ resource_group | hash('md5') | truncate(7, True, '') }}"
- resource_group: "{{ resource_group }}"
- location: eastus
- orchestration_platform: Swarm
- master_profile:
- - count: 1
- dns_prefix: "acssw{{ resource_group | hash('md5') | truncate(10, True, '') }}"
- vm_size: Standard_A0
- linux_profile:
- - admin_username: azureuser
- ssh_key: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqaZoyiz1qbdOQ8xEf6uEu1cCwYowo5FHtsBhqLoDnnp7KUTEBN+io238wdhjkasndq238e2/983289dasjnasey823/YkUCuzxDpsH7DUDhZcwySLKVVe0Qm3+928dfsjsejk298r/+vAnflKebuypNlmocIvakFWoZda18FOmsOoIVXQ8HWFNCuw9ZCunMSN62QGamCe3dL5cXlkgHYv7ekJE15IA9aOJcM7e90oeTqo+dsajda82e78sdja/llas8tsXY85LFqRnr3gJ02bAscjc477+X+j/gkpFoN1QEmt juliens@msft.com
- agent_pool_profiles:
- - name: default
- count: 2
- dns_prefix: "acssw{{ resource_group | hash('md5') | truncate(12, True, '') }}"
- vm_size: Standard_A0
- diagnostics_profile: false
- register: output
-
- - name: Assert the ACS instance is well scaled
- assert:
- that:
- - output.changed
- - output.state.agent_pool_profiles[0].count == 2
-
- - name: Delete the ACS instance - Swarm
- azure_rm_acs:
- name: "acssw{{ resource_group | hash('md5') | truncate(7, True, '') }}"
- resource_group: "{{ resource_group }}"
- location: eastus
- orchestration_platform: Swarm
- state: absent
- master_profile:
- - count: 1
- dns_prefix: "acssw{{ resource_group | hash('md5') | truncate(10, True, '') }}"
- vm_size: Standard_A0
- linux_profile:
- - admin_username: azureuser
- ssh_key: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqaZoyiz1qbdOQ8xEf6uEu1cCwYowo5FHtsBhqLoDnnp7KUTEBN+io238wdhjkasndq238e2/983289dasjnasey823/YkUCuzxDpsH7DUDhZcwySLKVVe0Qm3+928dfsjsejk298r/+vAnflKebuypNlmocIvakFWoZda18FOmsOoIVXQ8HWFNCuw9ZCunMSN62QGamCe3dL5cXlkgHYv7ekJE15IA9aOJcM7e90oeTqo+dsajda82e78sdja/llas8tsXY85LFqRnr3gJ02bAscjc477+X+j/gkpFoN1QEmt juliens@msft.com
- agent_pool_profiles:
- - name: default
- count: 2
- dns_prefix: "acssw{{ resource_group | hash('md5') | truncate(12, True, '') }}"
- vm_size: Standard_A0
- diagnostics_profile: false \ No newline at end of file
diff --git a/test/integration/targets/azure_rm_aks/aliases b/test/integration/targets/azure_rm_aks/aliases
deleted file mode 100644
index e340069a05..0000000000
--- a/test/integration/targets/azure_rm_aks/aliases
+++ /dev/null
@@ -1,3 +0,0 @@
-cloud/azure
-unsupported
-destructive \ No newline at end of file
diff --git a/test/integration/targets/azure_rm_aks/meta/main.yml b/test/integration/targets/azure_rm_aks/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_aks/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_aks/tasks/main.yml b/test/integration/targets/azure_rm_aks/tasks/main.yml
deleted file mode 100644
index 082f8ef185..0000000000
--- a/test/integration/targets/azure_rm_aks/tasks/main.yml
+++ /dev/null
@@ -1,213 +0,0 @@
- - set_fact:
- rpfx: "{{ resource_group | hash('md5') | truncate(8, True, '') }}"
-
- - name: Find available k8s version
- azure_rm_aksversion_info:
- location: eastus
- register: versions
-
- - name: Create an AKS instance (check mode)
- azure_rm_aks:
- name: "aks{{ rpfx }}"
- resource_group: "{{ resource_group }}"
- location: eastus
- dns_prefix: "aks{{ rpfx }}"
- kubernetes_version: "{{ versions.azure_aks_versions[0] }}"
- service_principal:
- client_id: "{{ azure_client_id }}"
- client_secret: "{{ azure_secret }}"
- linux_profile:
- admin_username: azureuser
- ssh_key: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDSPmiqkvDH1/+MDAVDZT8381aYqp73Odz8cnD5hegNhqtXajqtiH0umVg7HybX3wt1HjcrwKJovZURcIbbcDvzdH2bnYbF93T4OLXA0bIfuIp6M86x1iutFtXdpN3TTicINrmSXEE2Ydm51iMu77B08ZERjVaToya2F7vC+egfoPvibf7OLxE336a5tPCywavvNihQjL8sjgpDT5AAScjb3YqK/6VLeQ18Ggt8/ufINsYkb+9/Ji/3OcGFeflnDXq80vPUyF3u4iIylob6RSZenC38cXmQB05tRNxS1B6BXCjMRdy0v4pa7oKM2GA4ADKpNrr0RI9ed+peRFwmsclH test@ansible
- agent_pool_profiles:
- - name: default
- count: 1
- vm_size: Standard_DS1_v2
- enable_rbac: yes
- check_mode: yes
-
- - name: Check there is no AKS created
- azure_rm_aks_info:
- name: "aks{{ rpfx }}"
- resource_group: "{{ resource_group }}"
- register: fact
-
- - name: Check there is no AKS created
- assert:
- that:
- - "fact.aks | length == 0"
-
- - name: Create an AKS instance
- azure_rm_aks:
- name: "aks{{ rpfx }}"
- resource_group: "{{ resource_group }}"
- location: eastus
- dns_prefix: "aks{{ rpfx }}"
- kubernetes_version: "{{ versions.azure_aks_versions[0] }}"
- service_principal:
- client_id: "{{ azure_client_id }}"
- client_secret: "{{ azure_secret }}"
- linux_profile:
- admin_username: azureuser
- ssh_key: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDSPmiqkvDH1/+MDAVDZT8381aYqp73Odz8cnD5hegNhqtXajqtiH0umVg7HybX3wt1HjcrwKJovZURcIbbcDvzdH2bnYbF93T4OLXA0bIfuIp6M86x1iutFtXdpN3TTicINrmSXEE2Ydm51iMu77B08ZERjVaToya2F7vC+egfoPvibf7OLxE336a5tPCywavvNihQjL8sjgpDT5AAScjb3YqK/6VLeQ18Ggt8/ufINsYkb+9/Ji/3OcGFeflnDXq80vPUyF3u4iIylob6RSZenC38cXmQB05tRNxS1B6BXCjMRdy0v4pa7oKM2GA4ADKpNrr0RI9ed+peRFwmsclH test@ansible
- agent_pool_profiles:
- - name: default
- count: 1
- vm_size: Standard_DS1_v2
- enable_rbac: yes
- register: output
-
- - name: Assert the AKS instance is well created
- assert:
- that:
- - output.changed
- - output.provisioning_state == 'Succeeded'
-
- - name: Get AKS fact
- azure_rm_aks_info:
- name: "aks{{ rpfx }}"
- resource_group: "{{ resource_group }}"
- register: fact
-
- - name: Assert fact returns the created one
- assert:
- that:
- - "fact.aks | length == 1"
- - fact.aks[0].id == output.id
-
- - name: Create an AKS instance (idempotent)
- azure_rm_aks:
- name: "aks{{ rpfx }}"
- resource_group: "{{ resource_group }}"
- location: eastus
- dns_prefix: "aks{{ rpfx }}"
- kubernetes_version: "{{ versions.azure_aks_versions[0] }}"
- service_principal:
- client_id: "{{ azure_client_id }}"
- linux_profile:
- admin_username: azureuser
- ssh_key: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDSPmiqkvDH1/+MDAVDZT8381aYqp73Odz8cnD5hegNhqtXajqtiH0umVg7HybX3wt1HjcrwKJovZURcIbbcDvzdH2bnYbF93T4OLXA0bIfuIp6M86x1iutFtXdpN3TTicINrmSXEE2Ydm51iMu77B08ZERjVaToya2F7vC+egfoPvibf7OLxE336a5tPCywavvNihQjL8sjgpDT5AAScjb3YqK/6VLeQ18Ggt8/ufINsYkb+9/Ji/3OcGFeflnDXq80vPUyF3u4iIylob6RSZenC38cXmQB05tRNxS1B6BXCjMRdy0v4pa7oKM2GA4ADKpNrr0RI9ed+peRFwmsclH test@ansible
- agent_pool_profiles:
- - name: default
- count: 1
- vm_size: Standard_DS1_v2
- enable_rbac: yes
- register: output
-
- - name: Assert idempotent
- assert:
- that:
- - not output.changed
-
- - name: Get available version
- azure_rm_aksversion_info:
- location: eastus
- version: "{{ versions.azure_aks_versions[0] }}"
- register: version1
-
- - name: Upgrade the AKS instance with addon
- azure_rm_aks:
- name: "aks{{ rpfx }}"
- resource_group: "{{ resource_group }}"
- location: eastus
- dns_prefix: "aks{{ rpfx }}"
- kubernetes_version: "{{ version1.azure_aks_versions[0] }}"
- service_principal:
- client_id: "{{ azure_client_id }}"
- linux_profile:
- admin_username: azureuser
- ssh_key: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDSPmiqkvDH1/+MDAVDZT8381aYqp73Odz8cnD5hegNhqtXajqtiH0umVg7HybX3wt1HjcrwKJovZURcIbbcDvzdH2bnYbF93T4OLXA0bIfuIp6M86x1iutFtXdpN3TTicINrmSXEE2Ydm51iMu77B08ZERjVaToya2F7vC+egfoPvibf7OLxE336a5tPCywavvNihQjL8sjgpDT5AAScjb3YqK/6VLeQ18Ggt8/ufINsYkb+9/Ji/3OcGFeflnDXq80vPUyF3u4iIylob6RSZenC38cXmQB05tRNxS1B6BXCjMRdy0v4pa7oKM2GA4ADKpNrr0RI9ed+peRFwmsclH test@ansible
- agent_pool_profiles:
- - name: default
- count: 1
- vm_size: Standard_DS1_v2
- addon:
- http_application_routing: {}
- network_profile:
- network_plugin: kubenet
- enable_rbac: yes
- register: output
-
- - name: Assert the AKS instance is upgraded
- assert:
- that:
- - output.changed
- - output.kubernetes_version == version1.azure_aks_versions[0]
- - output.addon.httpApplicationRouting.enabled == True
- - output.agent_pool_profiles[0].count == 1
- - output.network_profile.network_plugin == 'kubenet'
-
- - name: Upgrade the AKS instance with addon (idempontent)
- azure_rm_aks:
- name: "aks{{ rpfx }}"
- resource_group: "{{ resource_group }}"
- location: eastus
- dns_prefix: "aks{{ rpfx }}"
- kubernetes_version: "{{ version1.azure_aks_versions[0] }}"
- service_principal:
- client_id: "{{ azure_client_id }}"
- linux_profile:
- admin_username: azureuser
- ssh_key: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDSPmiqkvDH1/+MDAVDZT8381aYqp73Odz8cnD5hegNhqtXajqtiH0umVg7HybX3wt1HjcrwKJovZURcIbbcDvzdH2bnYbF93T4OLXA0bIfuIp6M86x1iutFtXdpN3TTicINrmSXEE2Ydm51iMu77B08ZERjVaToya2F7vC+egfoPvibf7OLxE336a5tPCywavvNihQjL8sjgpDT5AAScjb3YqK/6VLeQ18Ggt8/ufINsYkb+9/Ji/3OcGFeflnDXq80vPUyF3u4iIylob6RSZenC38cXmQB05tRNxS1B6BXCjMRdy0v4pa7oKM2GA4ADKpNrr0RI9ed+peRFwmsclH test@ansible
- agent_pool_profiles:
- - name: default
- count: 1
- vm_size: Standard_DS1_v2
- addon:
- http_application_routing: {}
- network_profile:
- network_plugin: kubenet
- enable_rbac: yes
- register: output
-
- - assert:
- that:
- - not output.changed
-
- - name: Get AKS fact
- azure_rm_aks_info:
- name: "aks{{ rpfx }}"
- resource_group: "{{ resource_group }}"
- show_kubeconfig: user
- register: fact
-
- - name: Assert fact returns the created one
- assert:
- that:
- - "fact.aks | length == 1"
- - fact.aks[0].kube_config == output.kube_config
-
- - name: Delete the AKS instance
- azure_rm_aks:
- name: "aks{{ rpfx }}"
- resource_group: "{{ resource_group }}"
- state: absent
- register: output
-
- - name: Assert the AKS instance is well deleted
- assert:
- that:
- - output.changed
-
- - name: Delete the AKS instance (idempotent)
- azure_rm_aks:
- name: "aks{{ rpfx }}"
- resource_group: "{{ resource_group }}"
- state: absent
- register: output
-
- - name: Assert idempotent
- assert:
- that:
- - not output.changed
-
- - name: Get AKS fact
- azure_rm_aks_info:
- name: "aks{{ rpfx }}"
- resource_group: "{{ resource_group }}"
- register: fact
-
- - name: Assert fact returns empty
- assert:
- that:
- - "fact.aks | length == 0"
diff --git a/test/integration/targets/azure_rm_appgateway/aliases b/test/integration/targets/azure_rm_appgateway/aliases
deleted file mode 100644
index 3b050cbc18..0000000000
--- a/test/integration/targets/azure_rm_appgateway/aliases
+++ /dev/null
@@ -1,3 +0,0 @@
-cloud/azure
-destructive
-shippable/azure/group6
diff --git a/test/integration/targets/azure_rm_appgateway/files/cert1.txt b/test/integration/targets/azure_rm_appgateway/files/cert1.txt
deleted file mode 100644
index 82a13f4cec..0000000000
--- a/test/integration/targets/azure_rm_appgateway/files/cert1.txt
+++ /dev/null
@@ -1 +0,0 @@
-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
diff --git a/test/integration/targets/azure_rm_appgateway/files/cert2.txt b/test/integration/targets/azure_rm_appgateway/files/cert2.txt
deleted file mode 100644
index a539dbcaf3..0000000000
--- a/test/integration/targets/azure_rm_appgateway/files/cert2.txt
+++ /dev/null
@@ -1 +0,0 @@
-MIIKsQIBAzCCCm0GCSqGSIb3DQEHAaCCCl4EggpaMIIKVjCCBg8GCSqGSIb3DQEHAaCCBgAEggX8MIIF+DCCBfQGCyqGSIb3DQEMCgECoIIE/jCCBPowHAYKKoZIhvcNAQwBAzAOBAj37r+wRsc6/gICB9AEggTY1V5HNscO+2bZb7JSMme1ljERe7DCiRE2cJsPKlwW2/NEiSqAUX7gXKK0ISr6Dto71rFdza0uPwbcQoPN1QwkJHSAkxWg4OcAx2kf7077tlHhf5rzxTn5V3wXM0Q3h6NsDjSqSHjYVISIiXItUzlDaBpMY/NUFNCTyJR5I91MWsljrJ/bQaAIo57HJR9nzjY5DaBA9P3bAhmX5LJRGsJWoCEaGeeVQ3Yn6yD06ordiJnf6dNxqQGN+o2x54gqfmw+RnoC2f8VAsTIfb3fwJPKdg2JiJIa6Ms2Sc8VR7VGmZt34qZwTPBrzeqJjtIMT41bBae46lmma8ypYwErqzOYSrHqXPXzaxlloYy81HYWAsJTWyBxTsVBcLom5m9ru79+SKG35xY1wSkzZmWMNFfVRFCJy/X+h2ErrGYjogCHYaIUmiosvUccwRUXGU083ul9iTcz/Dl79VBz63OFX/CnZMDTQ8ugbqpvW78pAnBU0r8MUubHciD1sJG2zmMlxCAzan6BLm9OMyhTNIbzYOjQQw99MQQys/ZeyNLqTFHTeGRfU2ewqgHjbH2PYCQfjipXSmdmsSsGxlLA9AOtwAk3QKJ77P03HRGOeXmy/I4iIHuIQuaQcjfprNR2fI36dftDo7U4gvRQHkiti+zNVqpi3/hIc2k7O8bCcMeSvfIlUvWIPUrUceZmpVPpLdcFcQbN9+1nZwiFYydOhrPnlp40rSO3RM08EmQUfRYt8fwRFcoWBX3b411vOqZVGeMfMtThMYI53R4Cmh5tUp93FslHNmIfnuewhHfIm+vtCicLcW6TaC2l4EqmNf0flK5m5nANotCfqj87MPsB83qPwol/91BTKaxuH2hKrZDgU1ibPE8NhzBinp2ANi0BHK3Sl0CsC2MPyZpFY+4MWvk/SI9ex4VsKYKmhubOFkhDLLBZH0UEmUdNTH4Gd76GsDnfI9arR2ctM9ecTPeu74hKiHlNZhc4U3TX20FBeqF5tZYnfCLRhvdiNM9AlwEKqqQEe0W7PrALcNVdjhJl0X9+0Br28E3RKZQRITWa10Vjmh0WcYrzEQ3/qEZYbqVpHMp+kdrHxB65v0zlGxjdwyKzafLzqYXmaHOyVlFnkayNaAkVVxOCzNrxB9HfhjvhjWafeMvA0p7O9CxTD2xPEhUaHQ5j7L8F0alfMYcg73SdGHAcY6AV8+eh0jqs3IF68cquXOl5Bm8uYKRjtgl9nY6hYc0lRDdtFHZo8ayNDr0cltNU7XZTaCKVNSDTRn92rTNJY0E3PD5HSKcRi58WJrIgEDGasyleRkRlGTY7512Qut0rg7m1Eyp6MK+sNmSSA7cR70pH7I1dwy4VrJMODdMH11y1QJF2EQWQdN00Js54tjVgTIO3btb5N7jhNYpRedv0a4UZ8TdDI4ZMCMf3SdP3xbQ06M1pFrS8WQzwp3KTk8vmnseJL84n0hC8KqWmGmTWHTa9dwmopeM6Xh/Jm1pkrgrloxqfSlscGEJE0plAnk1mLx29FxswfZ6a7pNKg7CydK4SiDkqM+pWukPbgKODqYPUvS0nk3RGGXvZSIzTbvm77tF+MqXOb6Rn+IflIk4yZsjIBQA0I/bQ78YDzXUVsrtAi9waRoCZs+L48NUy4zpKn25FMqkrziVn+TGB4jANBgkrBgEEAYI3EQIxADATBgkqhkiG9w0BCRUxBgQEAQAAADBdBgkqhkiG9w0BCRQxUB5OAHQAZQAtAGMANwBmADEAYwBhADYAMQAtADQAOAA1ADQALQA0ADgAZQBmAC0AYQAwADgANQAtAGQANABhADIAZgA1AGYAOAAyADcAZAAxMF0GCSsGAQQBgjcRATFQHk4ATQBpAGMAcgBvAHMAbwBmAHQAIABTAHQAcgBvAG4AZwAgAEMAcgB5AHAAdABvAGcAcgBhAHAAaABpAGMAIABQAHIAbwB2AGkAZABlAHIwggQ/BgkqhkiG9w0BBwagggQwMIIELAIBADCCBCUGCSqGSIb3DQEHATAcBgoqhkiG9w0BDAEDMA4ECFcAfrkm3ibUAgIH0ICCA/hlBog8GY9GCpucTwAxBGa0cOGQ29EK0xfrmY/Dv59IeJhRr47Mvl1XNk5PIInb64RsOVr00jrJAbfgLLKMBowcQLT7k6jGbGBdOzC57x9DNP0VuHsIIym0Z+SpJgEWBbtdBTGzgNw/YoXYxT4Rtka9ScSyCFjmmCzXz7bGLqC7yrGb7BzigQ9y4u4bg0pf75pERzN8rJM29Ob2IydkgARfpmbNKjdMCtD6dI7tafG2lQfUX6sgQY+Sy5HTz3ansN8X1yv2WQTu8Drxf2ce55v4WrFbPTTND94ubgDt7jvbCe1DuNP1DAYmQ5pbW0GGqF1x2csK5WWD7J8FD08VaQFM8y8pGIUeUkN4rYU3eTdTAQe+ec2hOr9QZn1Sb/p5u4KqIMn4MSCQ8EU0gXa2JETdUjXPr/5JFZTidJYagRyMIkYnwg9uusikctulaBsHMBKMYQ0Z19CEbcd2phdoxWTrtp7kwwjnu64zPgE6ALe9yJOT8AFEB6H1c16Z+aPGj9hbhkh6tcdGWUvzDYq08wjKjP3nA78StIisUmeZPfAXJUquPzRZr0pmcwYWfyP54TdC2BvPlLW/QXVV44IGxUdLuI6mz4p+O2+xKu9QMFwdcpij2ZK4uMrBLDo7ZoTQ4rBRnn471AMUKgeP0D5tbl8PygUU1RqHv34ok3fwx0WglzdMQJyt53PiPWW4lipwUtUfd0eD8CXoMccf8XJmugVUBCD1wQsyCW6RrR9RX8HXVBrm5O2HKfJcQYznl3qHqXb6ofvbOQ3S+v0ALN+sma8Tn6JceVTAOH+UuMdcu0FIDYnpmrvMecnJ2kbs1Y35mj4rSJyP5PGLg+ygb9VlBPwCCem/jHL+YivN38+0oWqfn2slyI4FNKX+5U8M6xpiEaq6McKwKZC1d51A4dUdMAkO2d1Z6rVjqhKeqE6HWD9A0cyPBFZpNQskUfNDW8qILLEfEjhBi+s1LkHzKDykCN/ReFfRiQS84DekoC59cymM8Hs1geMWCMFWfut4HTd7ItYaiJz5qpYVY4U/8myhyWnrktjLjQ6OkdM9bBDIpRHj95MYEC26NlWQZwjk+yynPTZf0w5p2Ok6Dq2shJFykuJ1VkelgvsPe8qMa55Wp11dpREIFzXouPXNP/vFpziZcl1OKTd7Dwa+ruQFRfsoZGzupsBOYxrmYqr6kOm5mzMW0HAlsWwl5mY2aSQMvXBE6k32xTkPIlIp763Ee4m6cmx4+SDcO5D+a9t05QY4JmssL+x3T9qsbXSXDPEsg0cfVvuQYy9AYkIFOes4G45IagRAvhQQj9bEh8kTvp8CFDDtIrbWjX50zreb51VcAcEkIOLyROtIdLem0zA7MB8wBwYFKw4DAhoEFC0i4I5iwNYQug0vTVS0JC/Qm+/NBBTsUM0D9QxIZYUi+qlDy14sOcEaUwICB9A=
diff --git a/test/integration/targets/azure_rm_appgateway/meta/main.yml b/test/integration/targets/azure_rm_appgateway/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_appgateway/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_appgateway/tasks/main.yml b/test/integration/targets/azure_rm_appgateway/tasks/main.yml
deleted file mode 100644
index ca52c7b036..0000000000
--- a/test/integration/targets/azure_rm_appgateway/tasks/main.yml
+++ /dev/null
@@ -1,401 +0,0 @@
-- name: Prepare random number
- set_fact:
- rpfx: "{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- run_once: yes
-
-- name: Create a virtual network
- azure_rm_virtualnetwork:
- name: vnet{{ rpfx }}
- resource_group: "{{ resource_group }}"
- address_prefixes_cidr:
- - 10.1.0.0/16
- - 172.100.0.0/16
- dns_servers:
- - 127.0.0.1
- - 127.0.0.2
-- name: Create a subnet
- azure_rm_subnet:
- name: subnet{{ rpfx }}
- virtual_network_name: vnet{{ rpfx }}
- resource_group: "{{ resource_group }}"
- address_prefix_cidr: 10.1.0.0/24
- register: subnet_output
-
-- name: Create instance of Application Gateway -- check mode
- azure_rm_appgateway:
- resource_group: "{{ resource_group }}"
- name: "appgateway{{ rpfx }}"
- sku:
- name: standard_small
- tier: standard
- capacity: 2
- ssl_policy:
- policy_type: predefined
- policy_name: ssl_policy20150501
- disabled_ssl_protocols:
- - tls_v1_0
- cipher_suites:
- - tls_ecdhe_ecdsa_with_aes_256_gcm_sha384
- authentication_certificates:
- - name: cert1
- data: "{{ lookup('file', 'cert1.txt') }}"
- ssl_certificates:
- - name: cert2
- password: your-password
- data: "{{ lookup('file', 'cert2.txt') }}"
- gateway_ip_configurations:
- - subnet:
- id: "{{ subnet_output.state.id }}"
- name: app_gateway_ip_config
- frontend_ip_configurations:
- - subnet:
- id: "{{ subnet_output.state.id }}"
- name: sample_gateway_frontend_ip_config
- frontend_ports:
- - port: 90
- name: ag_frontend_port
- - port: 80
- name: http_frontend_port
- backend_address_pools:
- - backend_addresses:
- - ip_address: 10.0.0.4
- name: test_backend_address_pool
- probes:
- - name: custom_probe
- protocol: http
- host: 10.0.0.4
- path: /healthz
- interval: 30
- timeout: 30
- unhealthy_threshold: 3
- backend_http_settings_collection:
- - port: 80
- protocol: http
- cookie_based_affinity: enabled
- probe: custom_probe
- name: sample_appgateway_http_settings
- http_listeners:
- - frontend_ip_configuration: sample_gateway_frontend_ip_config
- frontend_port: ag_frontend_port
- protocol: https
- ssl_certificate: cert2
- name: sample_http_listener
- - frontend_ip_configuration: sample_gateway_frontend_ip_config
- frontend_port: http_frontend_port
- protocol: http
- name: http_listener
- request_routing_rules:
- - rule_type: basic
- backend_address_pool: test_backend_address_pool
- backend_http_settings: sample_appgateway_http_settings
- http_listener: sample_http_listener
- name: rule1
- - rule_type: basic
- http_listener: http_listener
- redirect_configuration: redirect_site_to_https
- name: http_redirect_rule
- redirect_configurations:
- - redirect_type: permanent
- target_listener: sample_http_listener
- include_path: true
- include_query_string: true
- name: redirect_site_to_https
- check_mode: yes
- register: output
-- name: Assert the resource instance is well created
- assert:
- that:
- - output.changed
-
-- name: dump
- debug:
- var: output
-
-- name: Create instance of Application Gateway
- azure_rm_appgateway:
- resource_group: "{{ resource_group }}"
- name: "appgateway{{ rpfx }}"
- sku:
- name: standard_small
- tier: standard
- capacity: 2
- ssl_policy:
- policy_type: predefined
- policy_name: ssl_policy20150501
- disabled_ssl_protocols:
- - tls_v1_0
- cipher_suites:
- - tls_ecdhe_ecdsa_with_aes_256_gcm_sha384
- authentication_certificates:
- - name: cert1
- data: "{{ lookup('file', 'cert1.txt') }}"
- ssl_certificates:
- - name: cert2
- password: your-password
- data: "{{ lookup('file', 'cert2.txt') }}"
- gateway_ip_configurations:
- - subnet:
- id: "{{ subnet_output.state.id }}"
- name: app_gateway_ip_config
- frontend_ip_configurations:
- - subnet:
- id: "{{ subnet_output.state.id }}"
- name: sample_gateway_frontend_ip_config
- frontend_ports:
- - port: 90
- name: ag_frontend_port
- - port: 80
- name: http_frontend_port
- backend_address_pools:
- - backend_addresses:
- - ip_address: 10.0.0.4
- name: test_backend_address_pool
- probes:
- - name: custom_probe
- protocol: http
- host: 10.0.0.4
- path: /healthz
- interval: 30
- timeout: 30
- unhealthy_threshold: 3
- backend_http_settings_collection:
- - port: 80
- protocol: http
- cookie_based_affinity: enabled
- probe: custom_probe
- name: sample_appgateway_http_settings
- http_listeners:
- - frontend_ip_configuration: sample_gateway_frontend_ip_config
- frontend_port: ag_frontend_port
- protocol: https
- ssl_certificate: cert2
- name: sample_http_listener
- - frontend_ip_configuration: sample_gateway_frontend_ip_config
- frontend_port: http_frontend_port
- protocol: http
- name: http_listener
- request_routing_rules:
- - rule_type: Basic
- backend_address_pool: test_backend_address_pool
- backend_http_settings: sample_appgateway_http_settings
- http_listener: sample_http_listener
- name: rule1
- - rule_type: Basic
- http_listener: http_listener
- redirect_configuration: redirect_site_to_https
- name: http_redirect_rule
- redirect_configurations:
- - redirect_type: permanent
- target_listener: sample_http_listener
- include_path: true
- include_query_string: true
- name: redirect_site_to_https
- register: output
-- name: Assert the resource instance is well created
- assert:
- that:
- - output.changed
-
-- name: Try to update instance of Application Gateway - no change
- azure_rm_appgateway:
- resource_group: "{{ resource_group }}"
- name: "appgateway{{ rpfx }}"
- sku:
- name: standard_small
- tier: standard
- capacity: 2
- ssl_policy:
- policy_type: predefined
- policy_name: ssl_policy20150501
- disabled_ssl_protocols:
- - tls_v1_0
- cipher_suites:
- - tls_ecdhe_ecdsa_with_aes_256_gcm_sha384
- authentication_certificates:
- - name: cert1
- data: "{{ lookup('file', 'cert1.txt') }}"
- ssl_certificates:
- - name: cert2
- password: your-password
- data: "{{ lookup('file', 'cert2.txt') }}"
- gateway_ip_configurations:
- - subnet:
- id: "{{ subnet_output.state.id }}"
- name: app_gateway_ip_config
- frontend_ip_configurations:
- - subnet:
- id: "{{ subnet_output.state.id }}"
- name: sample_gateway_frontend_ip_config
- frontend_ports:
- - port: 90
- name: ag_frontend_port
- - port: 80
- name: http_frontend_port
- backend_address_pools:
- - backend_addresses:
- - ip_address: 10.0.0.4
- name: test_backend_address_pool
- probes:
- - name: custom_probe
- protocol: http
- host: 10.0.0.4
- path: /healthz
- interval: 30
- timeout: 30
- unhealthy_threshold: 3
- backend_http_settings_collection:
- - port: 80
- protocol: http
- cookie_based_affinity: enabled
- probe: custom_probe
- name: sample_appgateway_http_settings
- http_listeners:
- - frontend_ip_configuration: sample_gateway_frontend_ip_config
- frontend_port: ag_frontend_port
- protocol: https
- ssl_certificate: cert2
- name: sample_http_listener
- - frontend_ip_configuration: sample_gateway_frontend_ip_config
- frontend_port: http_frontend_port
- protocol: http
- name: http_listener
- request_routing_rules:
- - rule_type: Basic
- backend_address_pool: test_backend_address_pool
- backend_http_settings: sample_appgateway_http_settings
- http_listener: sample_http_listener
- name: rule1
- - rule_type: Basic
- http_listener: http_listener
- redirect_configuration: redirect_site_to_https
- name: http_redirect_rule
- redirect_configurations:
- - redirect_type: permanent
- target_listener: sample_http_listener
- include_path: true
- include_query_string: true
- name: redirect_site_to_https
- register: output
-- name: Assert the resource instance is well created
- assert:
- that:
- - not output.changed
-
-- name: Try to update instance of Application Gateway - single change
- azure_rm_appgateway:
- resource_group: "{{ resource_group }}"
- name: "appgateway{{ rpfx }}"
- sku:
- name: standard_small
- tier: standard
- capacity: 2
- ssl_policy:
- policy_type: predefined
- policy_name: ssl_policy20150501
- disabled_ssl_protocols:
- - tls_v1_0
- cipher_suites:
- - tls_ecdhe_ecdsa_with_aes_256_gcm_sha384
- authentication_certificates:
- - name: cert1
- data: "{{ lookup('file', 'cert1.txt') }}"
- ssl_certificates:
- - name: cert2
- password: your-password
- data: "{{ lookup('file', 'cert2.txt') }}"
- gateway_ip_configurations:
- - subnet:
- id: "{{ subnet_output.state.id }}"
- name: app_gateway_ip_config
- frontend_ip_configurations:
- - subnet:
- id: "{{ subnet_output.state.id }}"
- name: sample_gateway_frontend_ip_config
- frontend_ports:
- - port: 90
- name: ag_frontend_port
- - port: 80
- name: http_frontend_port
- backend_address_pools:
- - backend_addresses:
- - ip_address: 10.0.0.4
- name: test_backend_address_pool
- probes:
- - name: custom_probe
- protocol: http
- host: 10.0.0.4
- path: /healthz
- interval: 30
- timeout: 30
- unhealthy_threshold: 3
- backend_http_settings_collection:
- - port: 81
- protocol: http
- cookie_based_affinity: enabled
- probe: custom_probe
- name: sample_appgateway_http_settings
- http_listeners:
- - frontend_ip_configuration: sample_gateway_frontend_ip_config
- frontend_port: ag_frontend_port
- protocol: https
- ssl_certificate: cert2
- name: sample_http_listener
- - frontend_ip_configuration: sample_gateway_frontend_ip_config
- frontend_port: http_frontend_port
- protocol: http
- name: http_listener
- request_routing_rules:
- - rule_type: Basic
- backend_address_pool: test_backend_address_pool
- backend_http_settings: sample_appgateway_http_settings
- http_listener: sample_http_listener
- name: rule1
- - rule_type: Basic
- http_listener: http_listener
- redirect_configuration: redirect_site_to_https
- name: http_redirect_rule
- redirect_configurations:
- - redirect_type: permanent
- target_listener: sample_http_listener
- include_path: true
- include_query_string: true
- name: redirect_site_to_https
- register: output
-- name: Assert the resource instance is well created
- assert:
- that:
- - output.changed
-
-- name: Delete instance of Application Gateway -- check mode
- azure_rm_appgateway:
- resource_group: "{{ resource_group }}"
- name: "appgateway{{ rpfx }}"
- state: absent
- check_mode: yes
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed
-
-- name: Delete instance of Application Gateway
- azure_rm_appgateway:
- resource_group: "{{ resource_group }}"
- name: "appgateway{{ rpfx }}"
- state: absent
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed
-
-- name: Delete unexisting instance of Application Gateway
- azure_rm_appgateway:
- resource_group: "{{ resource_group }}"
- name: "appgateway{{ rpfx }}"
- state: absent
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed == false
diff --git a/test/integration/targets/azure_rm_appserviceplan/aliases b/test/integration/targets/azure_rm_appserviceplan/aliases
deleted file mode 100644
index a6b233ed02..0000000000
--- a/test/integration/targets/azure_rm_appserviceplan/aliases
+++ /dev/null
@@ -1,4 +0,0 @@
-cloud/azure
-shippable/azure/group4
-unstable
-destructive
diff --git a/test/integration/targets/azure_rm_appserviceplan/meta/main.yml b/test/integration/targets/azure_rm_appserviceplan/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_appserviceplan/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_appserviceplan/tasks/main.yml b/test/integration/targets/azure_rm_appserviceplan/tasks/main.yml
deleted file mode 100644
index f5746232eb..0000000000
--- a/test/integration/targets/azure_rm_appserviceplan/tasks/main.yml
+++ /dev/null
@@ -1,84 +0,0 @@
-- name: Prepare facts
- set_fact:
- linux_plan_resource_group: "{{ resource_group_secondary }}"
- win_plan_name: "{{ (resource_prefix | replace('-','x'))[-8:] }}winplan"
- linux_plan_name: "{{ (resource_prefix | replace('-','x'))[-8:] }}linplan"
-
-- name: create a windows plan
- azure_rm_appserviceplan:
- name: "{{ win_plan_name }}1"
- resource_group: "{{ resource_group }}"
- sku: B1
- register: output
-
-- name: assert app service was created
- assert:
- that:
- - output.changed
- - output.id
-
-- name: create a linux plan
- azure_rm_appserviceplan:
- resource_group: "{{ linux_plan_resource_group }}"
- name: "{{ linux_plan_name }}1"
- sku: S1
- is_linux: true
- number_of_workers: 1
- register: output
-
-- name: assert app service was created
- assert:
- that:
- - output.changed
- - output.id
-
-- name: get app service plan by name
- azure_rm_appserviceplan_info:
- resource_group: "{{ linux_plan_resource_group }}"
- name: "{{ linux_plan_name }}1"
- register: output
-
-- name: assert is_linux is True
- assert:
- that:
- - output.appserviceplans | length == 1
- - output.appserviceplans[0].is_linux == True
-
-- name: create linux app service plan idempotent
- azure_rm_appserviceplan:
- resource_group: "{{ linux_plan_resource_group }}"
- name: "{{ linux_plan_name }}1"
- sku: S1
- is_linux: true
- number_of_workers: 1
- register: output
-
-- name: assert app service was created
- assert:
- that: not output.changed
-
-- name: update a windows plan sku
- azure_rm_appserviceplan:
- name: "{{ win_plan_name }}1"
- resource_group: "{{ resource_group }}"
- sku: B2
- register: output
-
-- name: assert app service was updated
- assert:
- that:
- - output.changed
-
-- name: update a linux plan number of workers
- azure_rm_appserviceplan:
- resource_group: "{{ linux_plan_resource_group }}"
- name: "{{ linux_plan_name }}1"
- sku: S1
- is_linux: true
- number_of_workers: 2
- register: output
-
-- name: assert app service was updated
- assert:
- that:
- - output.changed
diff --git a/test/integration/targets/azure_rm_automationaccount/aliases b/test/integration/targets/azure_rm_automationaccount/aliases
deleted file mode 100644
index 04a2c98ae7..0000000000
--- a/test/integration/targets/azure_rm_automationaccount/aliases
+++ /dev/null
@@ -1,4 +0,0 @@
-cloud/azure
-shippable/azure/group4
-destructive
-azure_rm_automationaccount_facts
diff --git a/test/integration/targets/azure_rm_automationaccount/meta/main.yml b/test/integration/targets/azure_rm_automationaccount/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_automationaccount/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_automationaccount/tasks/main.yml b/test/integration/targets/azure_rm_automationaccount/tasks/main.yml
deleted file mode 100644
index 882693999a..0000000000
--- a/test/integration/targets/azure_rm_automationaccount/tasks/main.yml
+++ /dev/null
@@ -1,88 +0,0 @@
-- name: Prepare random number
- set_fact:
- rpfx: "{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- name: "account{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- run_once: yes
-
-- name: Create automation account
- azure_rm_automationaccount:
- name: "{{ name }}"
- resource_group: "{{ resource_group }}"
- check_mode: yes
- register: output
-
-- assert:
- that:
- - output.changed
-
-- name: Create automation account
- azure_rm_automationaccount:
- name: "{{ name }}"
- resource_group: "{{ resource_group }}"
- register: output
-
-- assert:
- that:
- - output.changed
- - output.id
-
-- name: Create automation account
- azure_rm_automationaccount:
- name: "{{ name }}"
- resource_group: "{{ resource_group }}"
- register: output
-
-- assert:
- that:
- - not output.changed
-
-- name: Get automation account
- azure_rm_automationaccount_facts:
- name: "{{ name }}"
- resource_group: "{{ resource_group }}"
- list_statistics: yes
- list_usages: yes
- list_keys: yes
- register: facts
-
-- assert:
- that:
- - facts.automation_accounts | length == 1
- - facts.automation_accounts[0].keys
- - facts.automation_accounts[0].usages
- - facts.automation_accounts[0].statistics
- - facts.automation_accounts[0].state == "Ok"
-
-- name: Delete account
- azure_rm_automationaccount:
- name: "{{ name }}"
- resource_group: "{{ resource_group }}"
- state: absent
- check_mode: yes
- register: output
-
-- assert:
- that:
- - output.changed
-
-- name: Delete account
- azure_rm_automationaccount:
- name: "{{ name }}"
- resource_group: "{{ resource_group }}"
- state: absent
- register: output
-
-- assert:
- that:
- - output.changed
-
-- name: Delete account
- azure_rm_automationaccount:
- name: "{{ name }}"
- resource_group: "{{ resource_group }}"
- state: absent
- register: output
-
-- assert:
- that:
- - not output.changed
diff --git a/test/integration/targets/azure_rm_autoscale/aliases b/test/integration/targets/azure_rm_autoscale/aliases
deleted file mode 100644
index 19533b3424..0000000000
--- a/test/integration/targets/azure_rm_autoscale/aliases
+++ /dev/null
@@ -1,4 +0,0 @@
-cloud/azure
-shippable/azure/group5
-destructive
-azure_rm_autoscale
diff --git a/test/integration/targets/azure_rm_autoscale/meta/main.yml b/test/integration/targets/azure_rm_autoscale/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_autoscale/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_autoscale/tasks/main.yml b/test/integration/targets/azure_rm_autoscale/tasks/main.yml
deleted file mode 100644
index 9d3b54a3ee..0000000000
--- a/test/integration/targets/azure_rm_autoscale/tasks/main.yml
+++ /dev/null
@@ -1,219 +0,0 @@
-- name: Prepare random number
- set_fact:
- rpfx: "{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- name: "scale{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- run_once: yes
-
-- name: Create virtual network
- azure_rm_virtualnetwork:
- resource_group: "{{ resource_group }}"
- name: testVnet
- address_prefixes: "10.0.0.0/16"
-
-- name: Add subnet
- azure_rm_subnet:
- resource_group: "{{ resource_group }}"
- name: testSubnet
- address_prefix: "10.0.1.0/24"
- virtual_network: testVnet
-
-- name: Create VMSS
- azure_rm_virtualmachinescaleset:
- resource_group: "{{ resource_group }}"
- name: testVMSS{{ rpfx }}
- vm_size: Standard_DS1_v2
- admin_username: testuser
- ssh_password_enabled: true
- admin_password: "Password1234!"
- capacity: 2
- virtual_network_name: testVnet
- subnet_name: testSubnet
- upgrade_policy: Manual
- tier: Standard
- managed_disk_type: Standard_LRS
- os_disk_caching: ReadWrite
- image:
- offer: CoreOS
- publisher: CoreOS
- sku: Stable
- version: latest
- data_disks:
- - lun: 0
- disk_size_gb: 64
- caching: ReadWrite
- managed_disk_type: Standard_LRS
- register: vmss
-
-- name: create auto scaling (check mode)
- azure_rm_autoscale:
- resource_group: "{{ resource_group }}"
- name: "{{ name }}"
- target: "{{ vmss.ansible_facts.azure_vmss.id }}"
- enabled: true
- profiles:
- - count: '1'
- recurrence_days:
- - Monday
- name: Auto created scale condition
- recurrence_timezone: China Standard Time
- recurrence_mins:
- - '0'
- min_count: '1'
- max_count: '1'
- recurrence_frequency: Week
- recurrence_hours:
- - '18'
- check_mode: yes
- register: output
-
-- assert:
- that:
- - output.changed
-
-- name: create auto scaling
- azure_rm_autoscale:
- resource_group: "{{ resource_group }}"
- name: "{{ name }}"
- target:
- name: "testVMSS{{ rpfx }}"
- types: "virtualMachineScaleSets"
- namespace: "Microsoft.Compute"
- enabled: true
- profiles:
- - count: '1'
- recurrence_days:
- - Monday
- name: Auto created scale condition
- recurrence_timezone: China Standard Time
- recurrence_mins:
- - '0'
- min_count: '1'
- max_count: '1'
- recurrence_frequency: Week
- recurrence_hours:
- - '18'
- register: output
-
-- assert:
- that:
- - output.changed
- - output.id
-
-- name: create auto scaling (idemponent)
- azure_rm_autoscale:
- resource_group: "{{ resource_group }}"
- name: "{{ name }}"
- target: "{{ vmss.ansible_facts.azure_vmss.id }}"
- enabled: true
- profiles:
- - count: '1'
- recurrence_days:
- - Monday
- name: Auto created scale condition
- recurrence_timezone: China Standard Time
- recurrence_mins:
- - '0'
- min_count: '1'
- max_count: '1'
- recurrence_frequency: Week
- recurrence_hours:
- - '18'
- register: output
-
-- assert:
- that:
- - not output.changed
- - output.id
-
-- name: update auto scaling
- azure_rm_autoscale:
- resource_group: "{{ resource_group }}"
- name: "{{ name }}"
- target: "{{ vmss.ansible_facts.azure_vmss.id }}"
- enabled: true
- profiles:
- - count: '1'
- recurrence_days:
- - Monday
- name: Auto created scale condition 0
- rules:
- - time_aggregation: Average
- time_window: 10
- direction: Increase
- metric_name: Percentage CPU
- metric_resource_uri: "{{ vmss.ansible_facts.azure_vmss.id }}"
- value: '1'
- threshold: 70
- cooldown: 5
- time_grain: 1
- statistic: Average
- operator: GreaterThan
- type: ChangeCount
- max_count: '1'
- recurrence_mins:
- - '0'
- min_count: '1'
- recurrence_timezone: China Standard Time
- recurrence_frequency: Week
- recurrence_hours:
- - '6'
- register: output
-
-- assert:
- that:
- - output.changed
- - output.profiles[0].rules[0].metric_resource_uri == vmss.ansible_facts.azure_vmss.id
-
-- name: delete auto scaling (check mode)
- azure_rm_autoscale:
- resource_group: "{{ resource_group }}"
- name: "{{ name }}"
- state: absent
- check_mode: yes
- register: output
-
-- assert:
- that:
- - output.changed
-
-- name: delete auto scaling
- azure_rm_autoscale:
- resource_group: "{{ resource_group }}"
- name: "{{ name }}"
- state: absent
- register: output
-
-- assert:
- that:
- - output.changed
-
-- name: delete auto scaling (idemponetent)
- azure_rm_autoscale:
- resource_group: "{{ resource_group }}"
- name: "{{ name }}"
- state: absent
- register: output
-
-- assert:
- that:
- - not output.changed
-
-- name: Clean VMSS
- azure_rm_virtualmachinescaleset:
- resource_group: "{{ resource_group }}"
- vm_size: Standard_DS1_v2
- name: testVMSS{{ rpfx }}
- state: absent
-
-- name: Clean subnet
- azure_rm_subnet:
- resource_group: "{{ resource_group }}"
- name: testSubnet
- virtual_network: testVnet
- state: absent
-
-- name: Clean virtual network
- azure_rm_virtualnetwork:
- resource_group: "{{ resource_group }}"
- name: testVnet
- state: absent
diff --git a/test/integration/targets/azure_rm_availabilityset/aliases b/test/integration/targets/azure_rm_availabilityset/aliases
deleted file mode 100644
index 17456633d2..0000000000
--- a/test/integration/targets/azure_rm_availabilityset/aliases
+++ /dev/null
@@ -1,4 +0,0 @@
-cloud/azure
-shippable/azure/group2
-destructive
-azure_rm_availalibityset_info
diff --git a/test/integration/targets/azure_rm_availabilityset/meta/main.yml b/test/integration/targets/azure_rm_availabilityset/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_availabilityset/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_availabilityset/tasks/main.yml b/test/integration/targets/azure_rm_availabilityset/tasks/main.yml
deleted file mode 100644
index 8127d3c134..0000000000
--- a/test/integration/targets/azure_rm_availabilityset/tasks/main.yml
+++ /dev/null
@@ -1,136 +0,0 @@
-- name: Create an availability set with default options
- azure_rm_availabilityset:
- name: myavailabilityset1
- resource_group: "{{ resource_group }}"
- tags:
- tag1: testtag
- register: results
-
-- assert:
- that: results.changed
-
-- name: Create an availability set with advanced options
- azure_rm_availabilityset:
- name: myavailabilityset2
- resource_group: "{{ resource_group }}"
- platform_update_domain_count: 5
- platform_fault_domain_count: 2
- sku: Aligned
- register: results
-
-- assert:
- that: results.changed
-
-- name: Modify availabilty set immutable options - no changes, fail for immutable options
- azure_rm_availabilityset:
- name: myavailabilityset2
- resource_group: "{{ resource_group }}"
- platform_update_domain_count: 2
- platform_fault_domain_count: 2
- sku: Aligned
- register: results
- ignore_errors: yes
-
-- assert:
- that:
- - not results.changed
- - results.msg == 'You tried to change platform_update_domain_count but is was unsuccessful. An Availability Set is immutable, except tags'
-
-- name: Modify availabilty set immutable options and set tags - change tags and fail for immutable options
- azure_rm_availabilityset:
- name: myavailabilityset2
- resource_group: "{{ resource_group }}"
- platform_update_domain_count: 2
- platform_fault_domain_count: 2
- sku: Aligned
- tags:
- test1: modified
- register: results
- ignore_errors: yes
-
-- assert:
- that:
- - not results.changed
- - results.msg == 'You tried to change platform_update_domain_count but is was unsuccessful. An Availability Set is immutable, except tags'
-
-- name: Modify availabilty set options to update tags
- azure_rm_availabilityset:
- name: myavailabilityset2
- resource_group: "{{ resource_group }}"
- platform_update_domain_count: 5
- platform_fault_domain_count: 2
- sku: Aligned
- tags:
- test2: modified
- register: results
-
-- assert:
- that:
- - results.state.tags.test2 == 'modified'
-
-- name: Create availability set with incorrect fault domain parameter
- azure_rm_availabilityset:
- name: myavailabilityset3
- resource_group: "{{ resource_group }}"
- platform_update_domain_count: 5
- platform_fault_domain_count: 4
- sku: Aligned
- register: results
- ignore_errors: yes
-
-- assert:
- { that: "'The specified fault domain count 4 must fall in the range 1 to' in results['msg']" }
-
-- name: Test check_mode
- azure_rm_availabilityset:
- name: myavailabilityset2
- resource_group: "{{ resource_group }}"
- platform_update_domain_count: 5
- platform_fault_domain_count: 2
- sku: Aligned
- tags:
- checktest1: modified1
- checktest2: modified2
- check_mode: yes
- register: results
-
-- assert:
- that:
- - not results.changed
- - results.state.tags.checktest1 == 'modified1'
-
-#
-# azure_rm_availabilityset_facts tests
-#
-- name: Get facts for created availability set
- azure_rm_availabilityset_info:
- name: myavailabilityset2
- resource_group: "{{ resource_group }}"
- register: results
-
-- assert:
- that:
- - not results.changed
- - not results.failed
- - results.ansible_info.azure_availabilitysets[0].properties.platformFaultDomainCount == 2
- - results.ansible_info.azure_availabilitysets[0].properties.platformUpdateDomainCount == 5
- - results.ansible_info.azure_availabilitysets[0].sku == 'Aligned'
-
-
-- name: Delete an availability set
- azure_rm_availabilityset:
- name: myavailabilityset1
- resource_group: "{{ resource_group }}"
- state: absent
-
-- name: Delete an availability set
- azure_rm_availabilityset:
- name: myavailabilityset2
- resource_group: "{{ resource_group }}"
- state: absent
-
-- name: Delete an availability set
- azure_rm_availabilityset:
- name: myavailabilityset3
- resource_group: "{{ resource_group }}"
- state: absent
diff --git a/test/integration/targets/azure_rm_azurefirewall/aliases b/test/integration/targets/azure_rm_azurefirewall/aliases
deleted file mode 100644
index 4b130f3078..0000000000
--- a/test/integration/targets/azure_rm_azurefirewall/aliases
+++ /dev/null
@@ -1,4 +0,0 @@
-cloud/azure
-shippable/azure/group3
-destructive
-disabled # See: https://github.com/ansible/ansible/issues/62307
diff --git a/test/integration/targets/azure_rm_azurefirewall/meta/main.yml b/test/integration/targets/azure_rm_azurefirewall/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_azurefirewall/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_azurefirewall/tasks/main.yml b/test/integration/targets/azure_rm_azurefirewall/tasks/main.yml
deleted file mode 100644
index face59c2b6..0000000000
--- a/test/integration/targets/azure_rm_azurefirewall/tasks/main.yml
+++ /dev/null
@@ -1,277 +0,0 @@
-- name: Fix resource prefix
- set_fact:
- virtual_network_name: myVirtualNetwork
- subnet_name: AzureFirewallSubnet
- public_ipaddress_name: myPublicIpAddress
- azure_firewall_name: myFirewall
-
-- name: Create virtual network
- azure_rm_virtualnetwork:
- name: "{{ virtual_network_name }}"
- address_prefixes_cidr:
- - 10.1.0.0/16
- - 172.100.0.0/16
- dns_servers:
- - 127.0.0.1
- - 127.0.0.3
- tags:
- testing: testing
- delete: on-exit
- resource_group: "{{ resource_group }}"
-
-- name: Create subnet
- azure_rm_subnet:
- name: "{{ subnet_name }}"
- virtual_network_name: "{{ virtual_network_name }}"
- resource_group: "{{ resource_group }}"
- address_prefix_cidr: "10.1.0.0/24"
-
-- name: Create public IP address
- azure_rm_publicipaddress:
- resource_group: "{{ resource_group }}"
- allocation_method: Static
- name: "{{ public_ipaddress_name }}"
- sku: Standard
- register: pip_output
-
-- debug:
- var: pip_output
-
-- name: Create Azure Firewall
- azure_rm_azurefirewall:
- resource_group: '{{resource_group}}'
- name: '{{azure_firewall_name}}'
- #tags:
- # key1: value1
- application_rule_collections:
- - priority: 110
- action: deny
- rules:
- - name: rule1
- description: Deny inbound rule
- source_addresses:
- - 216.58.216.164
- - 10.0.0.0/25
- protocols:
- - type: https
- port: '443'
- target_fqdns:
- - www.test.com
- name: apprulecoll
- nat_rule_collections:
- - priority: 112
- action: dnat
- rules:
- - name: DNAT-HTTPS-traffic
- description: D-NAT all outbound web traffic for inspection
- source_addresses:
- - '*'
- destination_addresses:
- - "{{ pip_output.state.ip_address }}"
- destination_ports:
- - '443'
- protocols:
- - tcp
- translated_address: 1.2.3.5
- translated_port: '8443'
- name: natrulecoll
- network_rule_collections:
- - priority: 112
- action: deny
- rules:
- - name: L4-traffic
- description: Block traffic based on source IPs and ports
- protocols:
- - tcp
- source_addresses:
- - 192.168.1.1-192.168.1.12
- - 10.1.4.12-10.1.4.255
- destination_addresses:
- - '*'
- destination_ports:
- - 443-444
- - '8443'
- name: netrulecoll
- ip_configurations:
- - subnet:
- virtual_network_name: "{{ virtual_network_name }}"
- name: "{{ subnet_name }}"
- public_ip_address:
- name: "{{ public_ipaddress_name }}"
- name: azureFirewallIpConfiguration
- register: output
-
-- debug:
- var: output
-
-- name: Assert that output has changed
- assert:
- that:
- - output.changed
-
-- name: Create Azure Firewall -- idempotent
- azure_rm_azurefirewall:
- resource_group: '{{resource_group}}'
- name: '{{azure_firewall_name}}'
- application_rule_collections:
- - priority: 110
- action: deny
- rules:
- - name: rule1
- description: Deny inbound rule
- source_addresses:
- - 216.58.216.164
- - 10.0.0.0/25
- protocols:
- - type: https
- port: '443'
- target_fqdns:
- - www.test.com
- name: apprulecoll
- nat_rule_collections:
- - priority: 112
- action: dnat
- rules:
- - name: DNAT-HTTPS-traffic
- description: D-NAT all outbound web traffic for inspection
- source_addresses:
- - '*'
- destination_addresses:
- - "{{ pip_output.state.ip_address }}"
- destination_ports:
- - '443'
- protocols:
- - tcp
- translated_address: 1.2.3.5
- translated_port: '8443'
- name: natrulecoll
- network_rule_collections:
- - priority: 112
- action: deny
- rules:
- - name: L4-traffic
- description: Block traffic based on source IPs and ports
- protocols:
- - tcp
- source_addresses:
- - 192.168.1.1-192.168.1.12
- - 10.1.4.12-10.1.4.255
- destination_addresses:
- - '*'
- destination_ports:
- - 443-444
- - '8443'
- name: netrulecoll
- ip_configurations:
- - subnet:
- virtual_network_name: "{{ virtual_network_name }}"
- name: "{{ subnet_name }}"
- public_ip_address:
- name: "{{ public_ipaddress_name }}"
- name: azureFirewallIpConfiguration
- register: output
-
-- debug:
- var: output
-
-- name: Assert that output has not changed
- assert:
- that:
- - not output.changed
-
-- name: Create Azure Firewall -- change something
- azure_rm_azurefirewall:
- resource_group: '{{resource_group}}'
- name: '{{azure_firewall_name}}'
- application_rule_collections:
- - priority: 110
- action: deny
- rules:
- - name: rule1
- description: Deny inbound rule
- source_addresses:
- - 216.58.216.165
- - 10.0.0.0/25
- protocols:
- - type: https
- port: '443'
- target_fqdns:
- - www.test.com
- name: apprulecoll
- nat_rule_collections:
- - priority: 112
- action: dnat
- rules:
- - name: DNAT-HTTPS-traffic
- description: D-NAT all outbound web traffic for inspection
- source_addresses:
- - '*'
- destination_addresses:
- - "{{ pip_output.state.ip_address }}"
- destination_ports:
- - '443'
- protocols:
- - tcp
- translated_address: 1.2.3.6
- translated_port: '8443'
- name: natrulecoll
- network_rule_collections:
- - priority: 112
- action: deny
- rules:
- - name: L4-traffic
- description: Block traffic based on source IPs and ports
- protocols:
- - tcp
- source_addresses:
- - 192.168.1.1-192.168.1.12
- - 10.1.4.12-10.1.4.255
- destination_addresses:
- - '*'
- destination_ports:
- - 443-445
- - '8443'
- name: netrulecoll
- ip_configurations:
- - subnet:
- virtual_network_name: "{{ virtual_network_name }}"
- name: "{{ subnet_name }}"
- public_ip_address:
- name: "{{ public_ipaddress_name }}"
- name: azureFirewallIpConfiguration
- check_mode: yes
- register: output
-
-- name: Assert that output has changed
- assert:
- that:
- - output.changed
-
-- name: Get info of the Azure Firewall
- azure_rm_azurefirewall_info:
- resource_group: '{{resource_group}}'
- name: '{{azure_firewall_name}}'
- register: output
-
-- assert:
- that:
- - not output.changed
- - output.firewalls['id'] != None
- - output.firewalls['name'] != None
- - output.firewalls['location'] != None
- - output.firewalls['etag'] != None
- - output.firewalls['nat_rule_collections'] != None
- - output.firewalls['network_rule_collections'] != None
- - output.firewalls['ip_configurations'] != None
- - output.firewalls['provisioning_state'] != None
-
-- name: Delete Azure Firewall
- azure_rm_azurefirewall:
- resource_group: '{{resource_group}}'
- name: '{{azure_firewall_name}}'
- state: absent
- register: output
-
-- assert:
- that:
- - output.changed
diff --git a/test/integration/targets/azure_rm_batchaccount/aliases b/test/integration/targets/azure_rm_batchaccount/aliases
deleted file mode 100644
index 49acfee76c..0000000000
--- a/test/integration/targets/azure_rm_batchaccount/aliases
+++ /dev/null
@@ -1,3 +0,0 @@
-cloud/azure
-destructive
-shippable/azure/group2
diff --git a/test/integration/targets/azure_rm_batchaccount/meta/main.yml b/test/integration/targets/azure_rm_batchaccount/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_batchaccount/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_batchaccount/tasks/main.yml b/test/integration/targets/azure_rm_batchaccount/tasks/main.yml
deleted file mode 100644
index e62cb67cfc..0000000000
--- a/test/integration/targets/azure_rm_batchaccount/tasks/main.yml
+++ /dev/null
@@ -1,76 +0,0 @@
----
-# ----------------------------------------------------------------------------
-#
-# *** AUTO GENERATED CODE *** AUTO GENERATED CODE ***
-#
-# ----------------------------------------------------------------------------
-#
-# This file is automatically generated by Magic Modules and manual
-# changes will be clobbered when the file is regenerated.
-#
-#
-# ----------------------------------------------------------------------------
-- name: Prepare random number
- set_fact:
- storage_account_name: "st{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- batch_account_name: "ba{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- run_once: yes
-
-- name: Create Storage Account
- azure_rm_storageaccount:
- resource_group: "{{ resource_group }}"
- name: "{{ storage_account_name }}"
- location: eastus
- account_type: Standard_LRS
-
-- name: Create Batch Account
- azure_rm_batchaccount:
- resource_group: "{{ resource_group }}"
- name: "{{ batch_account_name }}"
- location: eastus
- auto_storage_account:
- name: "{{ storage_account_name }}"
- pool_allocation_mode: batch_service
- register: output
-
-- name: Assert the resource was created
- assert:
- that:
- - output.changed
-
-- name: Create Batch Account -- idempotent
- azure_rm_batchaccount:
- resource_group: "{{ resource_group }}"
- name: "{{ batch_account_name }}"
- location: eastus
- auto_storage_account:
- name: "{{ storage_account_name }}"
- pool_allocation_mode: batch_service
- register: output
-
-- name: Assert the resource was created
- assert:
- that:
- - not output.changed
-
-- name: Delete Batch Account
- azure_rm_batchaccount:
- resource_group: "{{ resource_group }}"
- name: "{{ batch_account_name }}"
- location: eastus
- auto_storage_account:
- name: "{{ storage_account_name }}"
- pool_allocation_mode: batch_service
- state: absent
- register: output
-
-- name: Assert that state has changed
- assert:
- that:
- - output.changed
-
-- name: Clean up storage account
- azure_rm_storageaccount:
- resource_group: "{{ resource_group }}"
- name: "{{ storage_account_name }}"
- state: absent
diff --git a/test/integration/targets/azure_rm_cdnprofile/aliases b/test/integration/targets/azure_rm_cdnprofile/aliases
deleted file mode 100644
index ea347fa407..0000000000
--- a/test/integration/targets/azure_rm_cdnprofile/aliases
+++ /dev/null
@@ -1,5 +0,0 @@
-cloud/azure
-shippable/azure/group2
-destructive
-azure_rm_cdnprofile_info
-azure_rm_cdnendpoint
diff --git a/test/integration/targets/azure_rm_cdnprofile/meta/main.yml b/test/integration/targets/azure_rm_cdnprofile/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_cdnprofile/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_cdnprofile/tasks/main.yml b/test/integration/targets/azure_rm_cdnprofile/tasks/main.yml
deleted file mode 100644
index 657881a507..0000000000
--- a/test/integration/targets/azure_rm_cdnprofile/tasks/main.yml
+++ /dev/null
@@ -1,276 +0,0 @@
-- name: Prepare random number
- set_fact:
- cdnprofilename: "cdnprofile{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- endpointname: "endpoint{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- run_once: yes
-
-
-- name: Create a CDN profile(check mode)
- azure_rm_cdnprofile:
- resource_group: "{{ resource_group }}"
- name: "{{ cdnprofilename }}"
- sku: standard_akamai
- tags:
- testing: testing
- delete: on-exit
- foo: bar
- check_mode: yes
-
-- name: Check there is no CDN profile created
- azure_rm_cdnprofile_info:
- resource_group: "{{ resource_group }}"
- name: "{{ cdnprofilename }}"
- register: fact
-
-- name: Check there is no CDN profile created
- assert: { that: "{{ fact.cdnprofiles | length }} == 0" }
-
-- name: Create a CDN profile
- azure_rm_cdnprofile:
- resource_group: "{{ resource_group }}"
- name: "{{ cdnprofilename }}"
- sku: standard_akamai
- tags:
- testing: testing
- delete: on-exit
- foo: bar
- register: output
-
-- name: Assert the CDN profile is well created
- assert:
- that:
- - output.changed
- - output.id != ''
-
-- name: Gather CDN profile facts
- azure_rm_cdnprofile_info:
- resource_group: "{{ resource_group }}"
- name: "{{ cdnprofilename }}"
- register: fact
-
-- name: Assert fact returns the created one
- assert:
- that:
- - "fact.cdnprofiles | length == 1"
- - fact.cdnprofiles[0].sku == 'Standard_Akamai'
- - fact.cdnprofiles[0].tags.foo == 'bar'
-
-- name: Create a CDN profile (idempotent)
- azure_rm_cdnprofile:
- resource_group: "{{ resource_group }}"
- name: "{{ cdnprofilename }}"
- sku: standard_akamai
- tags:
- testing: testing
- delete: on-exit
- foo: bar
- register: output
-
-- name: Assert idempotent
- assert:
- that:
- - not output.changed
-
-- name: Update the CDN profile
- azure_rm_cdnprofile:
- resource_group: "{{ resource_group }}"
- name: "{{ cdnprofilename }}"
- sku: standard_akamai
- tags:
- testing: testing
- delete: on-exit
- foo: bar
- baz: qux
- register: output
-
-- name: Assert the CDN profile is updated
- assert:
- that:
- - output.changed
-
-- name: Delete the CDN profile(check mode)
- azure_rm_cdnprofile:
- resource_group: "{{ resource_group }}"
- name: "{{ cdnprofilename }}"
- state: absent
- check_mode: yes
-
-- name: Gather CDN profile facts
- azure_rm_cdnprofile_info:
- resource_group: "{{ resource_group }}"
- name: "{{ cdnprofilename }}"
- register: fact
-
-- name: Assert the CDN is still there
- assert:
- that:
- - "fact.cdnprofiles | length == 1"
- - fact.cdnprofiles[0].sku == 'Standard_Akamai'
- - fact.cdnprofiles[0].tags.foo == 'bar'
- - fact.cdnprofiles[0].tags.baz == 'qux'
-
-- name: Create a Azure CDN endpoint(check mode)
- azure_rm_cdnendpoint:
- resource_group: "{{ resource_group }}"
- name: "{{ endpointname }}"
- profile_name: "{{ cdnprofilename }}"
- origins:
- - name: "org{{ endpointname }}"
- host_name: "www.google.com"
- tags:
- testing: testing
- delete: on-exit
- foo: bar
- check_mode: yes
-
-- name: Create a Azure CDN endpoint
- azure_rm_cdnendpoint:
- resource_group: "{{ resource_group }}"
- name: "{{ endpointname }}"
- profile_name: "{{ cdnprofilename }}"
- origins:
- - name: "org{{ endpointname }}"
- host_name: "www.google.com"
- tags:
- testing: testing
- delete: on-exit
- foo: bar
- register: output
-
-- name: Assert the Azure CDN endpoint is well created
- assert:
- that:
- - output.changed
- - output.id
-
-- name: Get facts of a Azure CDN endpoint
- azure_rm_cdnendpoint_info:
- resource_group: "{{ resource_group }}"
- name: "{{ endpointname }}"
- profile_name: "{{ cdnprofilename }}"
- register: facts
-
-- name: Assert facts output
- assert:
- that:
- - facts['cdnendpoints'] | length == 1
- - facts['cdnendpoints'][0]['id']
- - facts['cdnendpoints'][0]['name']
- - facts['cdnendpoints'][0]['profile_name']
- - facts['cdnendpoints'][0]['origin']
- - facts['cdnendpoints'][0]['location']
- - facts['cdnendpoints'][0]['provisioning_state']
- - facts['cdnendpoints'][0]['resource_state']
-
-- name: Create a Azure CDN endpoint(idempotent)
- azure_rm_cdnendpoint:
- resource_group: "{{ resource_group }}"
- name: "{{ endpointname }}"
- profile_name: "{{ cdnprofilename }}"
- origins:
- - name: "org{{ endpointname }}"
- host_name: "www.google.com"
- tags:
- testing: testing
- delete: on-exit
- foo: bar
- register: output
-
-- name: Assert idempotent
- assert:
- that:
- - not output.changed
-
-- name: Stop a Azure CDN endpoint
- azure_rm_cdnendpoint:
- resource_group: "{{ resource_group }}"
- name: "{{ endpointname }}"
- profile_name: "{{ cdnprofilename }}"
- started: False
- register: output
-
-- name: Assert stopped
- assert:
- that:
- - output.changed
-
-- name: Stop a Azure CDN endpoint(idempotent)
- azure_rm_cdnendpoint:
- resource_group: "{{ resource_group }}"
- name: "{{ endpointname }}"
- profile_name: "{{ cdnprofilename }}"
- started: False
- register: output
-
-- name: Assert still stopped and not changed
- assert:
- that:
- - not output.changed
-
-- name: Start a Azure CDN endpoint
- azure_rm_cdnendpoint:
- resource_group: "{{ resource_group }}"
- name: "{{ endpointname }}"
- profile_name: "{{ cdnprofilename }}"
- started: True
- register: output
-
-- name: Assert started
- assert:
- that:
- - output.changed
-
-- name: Update the Azure CDN endpoint
- azure_rm_cdnendpoint:
- resource_group: "{{ resource_group }}"
- name: "{{ endpointname }}"
- profile_name: "{{ cdnprofilename }}"
- origin_path: /test/
- tags:
- testing: testing
- delete: on-exit
- foo: baz
- register: output
-
-- name: Assert the Azure CDN endpoint is updated
- assert:
- that:
- - output.changed
-
-- name: Delete a Azure CDN endpoint(check mode)
- azure_rm_cdnendpoint:
- resource_group: "{{ resource_group }}"
- name: "{{ endpointname }}"
- profile_name: "{{ cdnprofilename }}"
- state: absent
- check_mode: yes
-
-- name: Delete a Azure CDN endpoint
- azure_rm_cdnendpoint:
- resource_group: "{{ resource_group }}"
- name: "{{ endpointname }}"
- profile_name: "{{ cdnprofilename }}"
- state: absent
-
-- name: Delete the CDN profile
- azure_rm_cdnprofile:
- resource_group: "{{ resource_group }}"
- name: "{{ cdnprofilename }}"
- state: absent
- register: output
-
-- name: Assert the CDN profile is well deleted
- assert:
- that:
- - output.changed
-
-- name: Get CDN profile fact
- azure_rm_cdnprofile_info:
- resource_group: "{{ resource_group }}"
- name: "{{ cdnprofilename }}"
- register: fact
-
-- name: Assert fact returns empty
- assert:
- that:
- - "fact.cdnprofiles | length == 0"
diff --git a/test/integration/targets/azure_rm_containerinstance/aliases b/test/integration/targets/azure_rm_containerinstance/aliases
deleted file mode 100644
index 93066dcc2d..0000000000
--- a/test/integration/targets/azure_rm_containerinstance/aliases
+++ /dev/null
@@ -1,4 +0,0 @@
-cloud/azure
-destructive
-shippable/azure/group2
-azure_rm_containerinstance_info
diff --git a/test/integration/targets/azure_rm_containerinstance/meta/main.yml b/test/integration/targets/azure_rm_containerinstance/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_containerinstance/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_containerinstance/tasks/main.yml b/test/integration/targets/azure_rm_containerinstance/tasks/main.yml
deleted file mode 100644
index a76e387a30..0000000000
--- a/test/integration/targets/azure_rm_containerinstance/tasks/main.yml
+++ /dev/null
@@ -1,214 +0,0 @@
-- name: Create sample container instance
- azure_rm_containerinstance:
- resource_group: "{{ resource_group }}"
- name: "aci{{ resource_group | hash('md5') | truncate(7, True, '') }}"
- os_type: linux
- ip_address: public
- location: eastus
- ports:
- - 80
- containers:
- - name: mycontainer1
- image: httpd
- memory: 1.5
- ports:
- - 80
- - 81
- register: output
-
-- debug:
- var: output
-
-- name: Assert the container instance is well created
- assert:
- that:
- - output.changed
- - output.provisioning_state == 'Succeeded'
-
-- name: Create sample container instance -- same parameters
- azure_rm_containerinstance:
- resource_group: "{{ resource_group }}"
- name: "aci{{ resource_group | hash('md5') | truncate(7, True, '') }}"
- os_type: linux
- ip_address: public
- location: eastus
- ports:
- - 80
- containers:
- - name: mycontainer1
- image: httpd
- memory: 1.5
- ports:
- - 80
- - 81
- register: output
-
-- name: Assert the container instance is well created
- assert:
- that:
- - output.changed == False
-
-- name: Create sample container instance -- force update
- azure_rm_containerinstance:
- resource_group: "{{ resource_group }}"
- name: "aci{{ resource_group | hash('md5') | truncate(7, True, '') }}"
- os_type: linux
- ip_address: public
- location: eastus
- ports:
- - 80
- containers:
- - name: mycontainer1
- image: httpd
- memory: 1.5
- ports:
- - 80
- - 81
- force_update: yes
- register: output
-
-- name: Assert the container instance is well created
- assert:
- that:
- - output.changed
- - output.provisioning_state == 'Succeeded'
-
-- name: Create second container instance for testing purposes
- azure_rm_containerinstance:
- resource_group: "{{ resource_group }}"
- name: "aci{{ resource_group | hash('md5') | truncate(7, True, '') }}sec"
- os_type: linux
- ip_address: public
- dns_name_label: mydnslabel{{ resource_group | hash('md5') | truncate(7, True, '') }}
- location: eastus
- restart_policy: on_failure
- ports:
- - 80
- containers:
- - name: mycontainer1
- image: httpd
- memory: 1.5
- ports:
- - 80
- - 81
- commands:
- - echo abc
- - echo cdf
- environment_variables:
- - name: myvar
- value: myvarvalue
- register: output
-
-- name: Gather facts for single Container Instance
- azure_rm_containerinstance_info:
- resource_group: "{{ resource_group }}"
- name: "aci{{ resource_group | hash('md5') | truncate(7, True, '') }}sec"
- register: output
-
-- debug:
- var: output
-
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.containerinstances[0]['resource_group'] != None
- - output.containerinstances[0]['name'] != None
- - output.containerinstances[0]['os_type'] != None
- - output.containerinstances[0]['location'] != None
- - output.containerinstances[0]['ip_address'] != None
- - output.containerinstances[0]['ports'] != None
- - output.containerinstances[0]['containers'] != None
- - output.containerinstances[0]['containers'][0]['commands'] | length == 2
- - output.containerinstances[0]['containers'][0]['environment_variables'] | length == 1
- - output.containerinstances[0]['restart_policy'] == 'on_failure'
-
-- name: Gather facts for all Container Instances in the resource group
- azure_rm_containerinstance_info:
- resource_group: "{{ resource_group }}"
- register: output
-
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.containerinstances[0]['resource_group'] != None
- - output.containerinstances[0]['name'] != None
- - output.containerinstances[0]['os_type'] != None
- - output.containerinstances[0]['location'] != None
- - output.containerinstances[0]['ip_address'] != None
- - output.containerinstances[0]['ports'] != None
- - output.containerinstances[0]['containers'] != None
- - output.containerinstances[1]['resource_group'] != None
- - output.containerinstances[1]['name'] != None
- - output.containerinstances[1]['os_type'] != None
- - output.containerinstances[1]['location'] != None
- - output.containerinstances[1]['ip_address'] != None
- - output.containerinstances[1]['ports'] != None
- - output.containerinstances[1]['containers'] != None
-
-- name: Remove container instance
- azure_rm_containerinstance:
- resource_group: "{{ resource_group }}"
- name: "aci{{ resource_group | hash('md5') | truncate(7, True, '') }}"
- os_type: linux
- ip_address: public
- location: eastus
- ports:
- - 80
- containers:
- - name: mycontainer1
- image: httpd
- memory: 1.5
- ports:
- - 80
- - 81
- state: absent
- register: output
-
-- name: Assert the container instance is deleted
- assert:
- that:
- - output.changed
-
-- name: Remove container instance
- azure_rm_containerinstance:
- resource_group: "{{ resource_group }}"
- name: "aci{{ resource_group | hash('md5') | truncate(7, True, '') }}sec"
- os_type: linux
- ip_address: public
- location: eastus
- ports:
- - 80
- containers:
- - name: mycontainer1
- image: httpd
- memory: 1.5
- ports:
- - 80
- - 81
- state: absent
-
-- name: Remove container instance again
- azure_rm_containerinstance:
- resource_group: "{{ resource_group }}"
- name: "aci{{ resource_group | hash('md5') | truncate(7, True, '') }}"
- os_type: linux
- ip_address: public
- location: eastus
- ports:
- - 80
- containers:
- - name: mycontainer1
- image: httpd
- memory: 1.5
- ports:
- - 80
- - 81
- state: absent
- register: output
-
-- name: Assert the changed is false
- assert:
- that:
- - output.changed == False
diff --git a/test/integration/targets/azure_rm_containerregistry/aliases b/test/integration/targets/azure_rm_containerregistry/aliases
deleted file mode 100644
index 2615d3fe02..0000000000
--- a/test/integration/targets/azure_rm_containerregistry/aliases
+++ /dev/null
@@ -1,4 +0,0 @@
-cloud/azure
-shippable/azure/group2
-destructive
-azure_rm_containerregistry_info
diff --git a/test/integration/targets/azure_rm_containerregistry/meta/main.yml b/test/integration/targets/azure_rm_containerregistry/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_containerregistry/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_containerregistry/tasks/main.yml b/test/integration/targets/azure_rm_containerregistry/tasks/main.yml
deleted file mode 100644
index 7c83c5c5da..0000000000
--- a/test/integration/targets/azure_rm_containerregistry/tasks/main.yml
+++ /dev/null
@@ -1,116 +0,0 @@
- - name: Create an container registry
- azure_rm_containerregistry:
- name: "acr{{ resource_group | hash('md5') | truncate(7, True, '') }}"
- resource_group: "{{ resource_group }}"
- location: eastus2
- admin_user_enabled: true
- sku: Premium
- tags:
- Release: beta1
- Environment: Production
- register: output
-
- - name: Assert the container registry instance is well created
- assert:
- that:
- - output.changed
- - output.admin_user_enabled
- - output.location == 'eastus2'
- - output.sku == 'Premium'
- - output.tags['Environment'] == 'Production'
- - output.tags['Release'] == 'beta1'
- - output.provisioning_state == 'Succeeded'
- - output.credentials['password'] is defined
- - output.credentials['password2'] is defined
-
- - name: Update the ACR instance sku, tags and admin_user_enabled
- azure_rm_containerregistry:
- name: "acr{{ resource_group | hash('md5') | truncate(7, True, '') }}"
- resource_group: "{{ resource_group }}"
- location: eastus2
- admin_user_enabled: false
- sku: Standard
- tags:
- NewTag: newtag
- Release: beta1
- Environment: Production
- register: output
-
- - name: Create second container registry (to test facts)
- azure_rm_containerregistry:
- name: "acr{{ resource_group | hash('md5') | truncate(7, True, '') }}sec"
- resource_group: "{{ resource_group }}"
- location: eastus2
- admin_user_enabled: false
- sku: Premium
- tags:
- Release: beta1
- Environment: Production
-
- - name: Assert the ACR instance is well updated
- assert:
- that:
- - output.changed == True
- - output.admin_user_enabled == False
- - output.sku == 'Standard'
- - output.tags['NewTag'] == 'newtag'
- - output.credentials | length == 0
- - output.credentials['password'] is not defined
- - output.credentials['password2'] is not defined
-
- - name: Gather facts for single Container Registry
- azure_rm_containerregistry_info:
- resource_group: "{{ resource_group }}"
- name: "acr{{ resource_group | hash('md5') | truncate(7, True, '') }}"
- register: output
-
- - name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.registries[0]['name'] != None
- - output.registries[0]['location'] != None
- - output.registries[0]['admin_user_enabled'] != None
- - output.registries[0]['sku'] != None
- - output.registries[0]['provisioning_state'] != None
- - output.registries[0]['login_server'] != None
- - output.registries[0]['id'] != None
- - output.registries[0]['credentials'] != None
-
- - name: Gather facts for all Container Registries in the resource group
- azure_rm_containerregistry_info:
- resource_group: "{{ resource_group }}"
- register: output
-
- - name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.registries[0]['name'] != None
- - output.registries[0]['location'] != None
- - output.registries[0]['admin_user_enabled'] != None
- - output.registries[0]['sku'] != None
- - output.registries[0]['provisioning_state'] != None
- - output.registries[0]['login_server'] != None
- - output.registries[0]['id'] != None
- - output.registries[0]['credentials'] != None
- - output.registries[1]['name'] != None
- - output.registries[1]['location'] != None
- - output.registries[1]['admin_user_enabled'] != None
- - output.registries[1]['sku'] != None
- - output.registries[1]['provisioning_state'] != None
- - output.registries[1]['login_server'] != None
- - output.registries[1]['id'] != None
- - output.registries[1]['credentials'] != None
-
- - name: Delete first container registry
- azure_rm_containerregistry:
- name: "acr{{ resource_group | hash('md5') | truncate(7, True, '') }}"
- resource_group: "{{ resource_group }}"
- state: absent
-
- - name: Delete second container registry
- azure_rm_containerregistry:
- name: "acr{{ resource_group | hash('md5') | truncate(7, True, '') }}sec"
- resource_group: "{{ resource_group }}"
- state: absent
diff --git a/test/integration/targets/azure_rm_cosmosdbaccount/aliases b/test/integration/targets/azure_rm_cosmosdbaccount/aliases
deleted file mode 100644
index 8a081bd43e..0000000000
--- a/test/integration/targets/azure_rm_cosmosdbaccount/aliases
+++ /dev/null
@@ -1,4 +0,0 @@
-cloud/azure
-destructive
-shippable/azure/group1
-azure_rm_cosmosdbaccount_info
diff --git a/test/integration/targets/azure_rm_cosmosdbaccount/meta/main.yml b/test/integration/targets/azure_rm_cosmosdbaccount/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_cosmosdbaccount/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_cosmosdbaccount/tasks/main.yml b/test/integration/targets/azure_rm_cosmosdbaccount/tasks/main.yml
deleted file mode 100644
index f50aa47c55..0000000000
--- a/test/integration/targets/azure_rm_cosmosdbaccount/tasks/main.yml
+++ /dev/null
@@ -1,249 +0,0 @@
-- name: Prepare random number
- set_fact:
- dbname: "cosmos{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- vnname: "vn{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- subnetname: "subnet{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- run_once: yes
-
-- name: Create virtual network
- azure_rm_virtualnetwork:
- resource_group: "{{ resource_group }}"
- name: "{{ vnname }}"
- address_prefixes_cidr:
- - 10.1.0.0/16
- - 172.100.0.0/16
- dns_servers:
- - 127.0.0.1
- - 127.0.0.3
-
-- name: Add subnet
- azure_rm_subnet:
- name: "{{ subnetname }}"
- virtual_network_name: "{{ vnname }}"
- resource_group: "{{ resource_group }}"
- address_prefix_cidr: "10.1.0.0/24"
-
-- name: Create instance of Database Account -- check mode
- azure_rm_cosmosdbaccount:
- resource_group: "{{ resource_group }}"
- name: "{{ dbname }}"
- location: eastus
- geo_rep_locations:
- - name: eastus
- failover_priority: 0
- database_account_offer_type: Standard
- check_mode: yes
- register: output
-- name: Assert the resource instance is well created
- assert:
- that:
- - output.changed
-
-- name: Create instance of Database Account
- azure_rm_cosmosdbaccount:
- resource_group: "{{ resource_group }}"
- name: "{{ dbname }}"
- location: eastus
- kind: global_document_db
- geo_rep_locations:
- - name: eastus
- failover_priority: 0
- - name: westus
- failover_priority: 1
- database_account_offer_type: Standard
- is_virtual_network_filter_enabled: yes
- virtual_network_rules:
- - subnet:
- resource_group: "{{ resource_group }}"
- virtual_network_name: "{{ vnname }}"
- subnet_name: "{{ subnetname }}"
- ignore_missing_vnet_service_endpoint: yes
- register: output
-- name: Assert the resource instance is well created
- assert:
- that:
- - output.changed
-
-- name: Create again instance of Database Account
- azure_rm_cosmosdbaccount:
- resource_group: "{{ resource_group }}"
- name: "{{ dbname }}"
- location: eastus
- kind: global_document_db
- geo_rep_locations:
- - name: eastus
- failover_priority: 0
- - name: westus
- failover_priority: 1
- database_account_offer_type: Standard
- is_virtual_network_filter_enabled: yes
- virtual_network_rules:
- - subnet:
- resource_group: "{{ resource_group }}"
- virtual_network_name: "{{ vnname }}"
- subnet_name: "{{ subnetname }}"
- ignore_missing_vnet_service_endpoint: yes
- register: output
-- name: Assert the state has not changed
- assert:
- that:
- - output.changed == false
-
-- name: Create again instance of Database Account -- change something
- azure_rm_cosmosdbaccount:
- resource_group: "{{ resource_group }}"
- name: "{{ dbname }}"
- location: eastus
- kind: global_document_db
- geo_rep_locations:
- - name: eastus
- failover_priority: 0
- - name: westus
- failover_priority: 1
- database_account_offer_type: Standard
- is_virtual_network_filter_enabled: yes
- virtual_network_rules:
- - subnet:
- resource_group: "{{ resource_group }}"
- virtual_network_name: "{{ vnname }}"
- subnet_name: "{{ subnetname }}"
- ignore_missing_vnet_service_endpoint: yes
- enable_automatic_failover: yes
- register: output
-- name: Assert the state has not changed
- assert:
- that:
- - output.changed
-
-- name: Get facts of single account
- azure_rm_cosmosdbaccount_info:
- resource_group: "{{ resource_group }}"
- name: "{{ dbname }}"
- register: output
-
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.accounts[0]['id'] != None
- - output.accounts[0]['resource_group'] != None
- - output.accounts[0]['name'] != None
- - output.accounts[0]['location'] != None
- - output.accounts[0]['kind'] != None
- - output.accounts[0]['consistency_policy'] != None
- - output.accounts[0]['failover_policies'] != None
- - output.accounts[0]['read_locations'] != None
- - output.accounts[0]['write_locations'] != None
- - output.accounts[0]['database_account_offer_type'] != None
- - output.accounts[0]['ip_range_filter'] != None
- - output.accounts[0]['is_virtual_network_filter_enabled'] != None
- - output.accounts[0]['enable_automatic_failover'] != None
- - output.accounts[0]['enable_cassandra'] != None
- - output.accounts[0]['enable_table'] != None
- - output.accounts[0]['enable_gremlin'] != None
- - output.accounts[0]['virtual_network_rules'] != None
- - output.accounts[0]['enable_multiple_write_locations'] != None
- - output.accounts[0]['document_endpoint'] != None
- - output.accounts[0]['provisioning_state'] != None
- - output.accounts[0]['tags'] != None
-
-- name: Get facts with keys
- azure_rm_cosmosdbaccount_info:
- resource_group: "{{ resource_group }}"
- name: "{{ dbname }}"
- retrieve_keys: all
- register: output
-
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.accounts[0]['primary_master_key'] != None
- - output.accounts[0]['secondary_master_key'] != None
- - output.accounts[0]['primary_readonly_master_key'] != None
- - output.accounts[0]['secondary_readonly_master_key'] != None
-
-- name: Get facts with readonly keys
- azure_rm_cosmosdbaccount_info:
- resource_group: "{{ resource_group }}"
- name: "{{ dbname }}"
- retrieve_keys: readonly
- retrieve_connection_strings: yes
- register: output
-
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - "'primary_master_key' not in output.accounts[0]"
- - "'secondary_master_key' not in output.accounts[0]"
- - output.accounts[0]['primary_readonly_master_key'] != None
- - output.accounts[0]['secondary_readonly_master_key'] != None
- - output.accounts[0]['connection_strings'] | length > 0
-
-- name: List acounts by resource group
- azure_rm_cosmosdbaccount_info:
- resource_group: "{{ resource_group }}"
- name: "{{ dbname }}"
- register: output
-
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.accounts[0]['id'] != None
- - output.accounts[0]['resource_group'] != None
- - output.accounts[0]['name'] != None
- - output.accounts[0]['location'] != None
- - output.accounts[0]['kind'] != None
- - output.accounts[0]['consistency_policy'] != None
- - output.accounts[0]['failover_policies'] != None
- - output.accounts[0]['read_locations'] != None
- - output.accounts[0]['write_locations'] != None
- - output.accounts[0]['database_account_offer_type'] != None
- - output.accounts[0]['ip_range_filter'] != None
- - output.accounts[0]['is_virtual_network_filter_enabled'] != None
- - output.accounts[0]['enable_automatic_failover'] != None
- - output.accounts[0]['enable_cassandra'] != None
- - output.accounts[0]['enable_table'] != None
- - output.accounts[0]['enable_gremlin'] != None
- - output.accounts[0]['virtual_network_rules'] != None
- - output.accounts[0]['enable_multiple_write_locations'] != None
- - output.accounts[0]['document_endpoint'] != None
- - output.accounts[0]['provisioning_state'] != None
- - output.accounts[0]['tags'] != None
-
-- name: Delete instance of Database Account -- check mode
- azure_rm_cosmosdbaccount:
- resource_group: "{{ resource_group }}"
- name: "{{ dbname }}"
- state: absent
- check_mode: yes
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed
-
-- name: Delete instance of Database Account
- azure_rm_cosmosdbaccount:
- resource_group: "{{ resource_group }}"
- name: "{{ dbname }}"
- state: absent
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed
-
-# currently disabled as there's a bug in SDK / Service
-#- name: Delete unexisting instance of Database Account
-# azure_rm_cosmosdbaccount:
-# resource_group: "{{ resource_group }}"
-# name: "{{ dbname }}"
-# state: absent
-# register: output
-#- name: Assert the state has changed
-# assert:
-# that:
-# - output.changed == false
diff --git a/test/integration/targets/azure_rm_deployment/aliases b/test/integration/targets/azure_rm_deployment/aliases
deleted file mode 100644
index 095e5ec347..0000000000
--- a/test/integration/targets/azure_rm_deployment/aliases
+++ /dev/null
@@ -1,3 +0,0 @@
-cloud/azure
-destructive
-shippable/azure/group1
diff --git a/test/integration/targets/azure_rm_deployment/meta/main.yml b/test/integration/targets/azure_rm_deployment/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_deployment/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_deployment/tasks/main.yml b/test/integration/targets/azure_rm_deployment/tasks/main.yml
deleted file mode 100644
index fb3d195151..0000000000
--- a/test/integration/targets/azure_rm_deployment/tasks/main.yml
+++ /dev/null
@@ -1,45 +0,0 @@
-- name: Create random dns label
- set_fact:
- dns_label: "test{{ resource_group | hash('md5') | truncate(16, True, '') + (65535 | random | string) }}"
-
-- name: Create Azure Deploy
- azure_rm_deployment:
- resource_group: "{{ resource_group }}"
- location: "eastus"
- template_link: 'https://raw.githubusercontent.com/Azure/azure-quickstart-templates/d01a5c06f4f1bc03a049ca17bbbd6e06d62657b3/101-vm-simple-linux/azuredeploy.json'
- deployment_name: "{{ dns_label }}"
- parameters:
- adminUsername:
- value: chouseknecht
- adminPassword:
- value: password123!
- dnsLabelPrefix:
- value: "{{ dns_label }}"
- ubuntuOSVersion:
- value: "16.04.0-LTS"
- register: output
-
-- name: Add new instance to host group
- add_host:
- hostname: "{{ item.vm_name }}"
- ansible_host: "{{ item['ips'][0].public_ip }}"
- ansible_user: chouseknecht
- ansible_ssh_pass: password123!
- groupname: azure_vms
- with_items: "{{ output.deployment.instances }}"
-
-- name: Get Deployment Facts
- azure_rm_deployment_info:
- resource_group: "{{ resource_group }}"
- name: "{{ dns_label }}"
- register: output
-- debug:
- var: output
-
-- name: Assert that values are returned
- assert:
- that:
- - not output.changed
- - output.deployments[0]['provisioning_state'] != None
- - output.deployments[0]['output_resources'] | length > 0
- - output.deployments[0]['outputs'] | length > 0
diff --git a/test/integration/targets/azure_rm_devtestlab/aliases b/test/integration/targets/azure_rm_devtestlab/aliases
deleted file mode 100644
index fc6fecf8d5..0000000000
--- a/test/integration/targets/azure_rm_devtestlab/aliases
+++ /dev/null
@@ -1,17 +0,0 @@
-cloud/azure
-destructive
-shippable/azure/group2
-azure_rm_devtestlab_facts
-azure_rm_devtestlabarmtemplate
-azure_rm_devtestlabartifact
-azure_rm_devtestlabartifactsource_facts
-azure_rm_devtestlabartifactsource
-azure_rm_devtestlabcustomimage
-azure_rm_devtestlabpolicy
-azure_rm_devtestlabschedule
-azure_rm_devtestlabvirtualmachine_facts
-azure_rm_devtestlabvirtualmachine_facts
-azure_rm_devtestlabvirtualnetwork_facts
-azure_rm_devtestlabvirtualnetwork
-disabled
-
diff --git a/test/integration/targets/azure_rm_devtestlab/meta/main.yml b/test/integration/targets/azure_rm_devtestlab/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_devtestlab/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_devtestlab/tasks/main.yml b/test/integration/targets/azure_rm_devtestlab/tasks/main.yml
deleted file mode 100644
index e8f8b5b284..0000000000
--- a/test/integration/targets/azure_rm_devtestlab/tasks/main.yml
+++ /dev/null
@@ -1,766 +0,0 @@
-- name: Prepare random number
- set_fact:
- lab_name: "lab{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- vn_name: "vn{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- vm_name: "vn{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- artifacts_name: myartifacts
- github_token: "{{ lookup('env','GITHUB_ACCESS_TOKEN') }}"
- run_once: yes
-
-- name: Create instance of Lab -- check mode
- azure_rm_devtestlab:
- resource_group: "{{ resource_group }}"
- name: "{{ lab_name }}"
- location: eastus
- storage_type: standard
- premium_data_disks: no
- check_mode: yes
- register: output
-- name: Check if the change was correctly reported
- assert:
- that:
- - output.changed
-
-- name: Create instance of Lab
- azure_rm_devtestlab:
- resource_group: "{{ resource_group }}"
- name: "{{ lab_name }}"
- location: eastus
- storage_type: standard
- premium_data_disks: no
- register: output_lab
-- name: Check if the change was correctly reported
- assert:
- that:
- - output.changed
-
-- name: Create again instance of Lab
- azure_rm_devtestlab:
- resource_group: "{{ resource_group }}"
- name: "{{ lab_name }}"
- location: eastus
- storage_type: standard
- premium_data_disks: no
- register: output
-- name: Assert the state has not changed
- assert:
- that:
- - output.changed == false
-
-- name: Update lab - premium_data_disks
- azure_rm_devtestlab:
- resource_group: "{{ resource_group }}"
- name: "{{ lab_name }}"
- location: eastus
- storage_type: standard
- premium_data_disks: yes
- register: output
-- name: Assert the change was registered
- assert:
- that:
- - output.changed
-
-- name: List DevTest Lab in a resource group
- azure_rm_devtestlab_facts:
- resource_group: "{{ resource_group }}"
- register: output_lab
-- name: Assert that facts are returned
- assert:
- that:
- - output_lab.changed == False
- - output_lab.labs[0]['id'] != None
- - output_lab.labs[0]['resource_group'] != None
- - output_lab.labs[0]['name'] != None
- - output_lab.labs[0]['location'] != None
- - output_lab.labs[0]['storage_type'] != None
- - output_lab.labs[0]['premium_data_disks'] != None
- - output_lab.labs[0]['provisioning_state'] != None
- - output_lab.labs[0]['vault_name'] != None
-
-- name: Get DevTest Lab facts
- azure_rm_devtestlab_facts:
- resource_group: "{{ resource_group }}"
- name: "{{ lab_name }}"
- register: output_lab
-- name: Assert that facts are returned
- assert:
- that:
- - output_lab.changed == False
- - output_lab.labs[0]['id'] != None
- - output_lab.labs[0]['resource_group'] != None
- - output_lab.labs[0]['name'] != None
- - output_lab.labs[0]['location'] != None
- - output_lab.labs[0]['storage_type'] != None
- - output_lab.labs[0]['premium_data_disks'] != None
- - output_lab.labs[0]['provisioning_state'] != None
- - output_lab.labs[0]['artifacts_storage_account'] != None
- - output_lab.labs[0]['default_premium_storage_account'] != None
- - output_lab.labs[0]['default_storage_account'] != None
- - output_lab.labs[0]['premium_data_disk_storage_account'] != None
- - output_lab.labs[0]['vault_name'] != None
-
-# azure_rm_devtestlabpolicy
-- name: Create instance of DevTest Lab Policy
- azure_rm_devtestlabpolicy:
- resource_group: "{{ resource_group }}"
- lab_name: "{{ lab_name }}"
- policy_set_name: default
- name: myDtlPolicy
- fact_name: user_owned_lab_vm_count
- threshold: 5
- register: output
-- debug:
- var: output
-- name: Assert if the change was correctly reported
- assert:
- that:
- - output.changed
-
-- name: Create instance of DevTest Lab Policy -- idempotent
- azure_rm_devtestlabpolicy:
- resource_group: "{{ resource_group }}"
- lab_name: "{{ lab_name }}"
- policy_set_name: default
- name: myDtlPolicy
- fact_name: user_owned_lab_vm_count
- threshold: 5
- register: output
-- debug:
- var: output
-- name: Assert if the change was not reported
- assert:
- that:
- - not output.changed
-
-- name: Create instance of DevTest Lab Policy -- change value
- azure_rm_devtestlabpolicy:
- resource_group: "{{ resource_group }}"
- lab_name: "{{ lab_name }}"
- policy_set_name: default
- name: myDtlPolicy
- fact_name: user_owned_lab_vm_count
- threshold: 6
- register: output
-- debug:
- var: output
-- name: Assert if the change was correctly reported
- assert:
- that:
- - output.changed
-
-- name: Delete instance of DevTest Lab Policy
- azure_rm_devtestlabpolicy:
- resource_group: "{{ resource_group }}"
- lab_name: "{{ lab_name }}"
- policy_set_name: default
- name: myDtlPolicy
- state: absent
- register: output
-- debug:
- var: output
-- name: Assert if the change was correctly reported
- assert:
- that:
- - output.changed
-
-# azure_rm_devtestlabschedule
-- name: Create instance of DevTest Lab Schedule
- azure_rm_devtestlabschedule:
- resource_group: "{{ resource_group }}"
- lab_name: "{{ lab_name }}"
- name: lab_vms_shutdown
- time: "1030"
- time_zone_id: "UTC+12"
- register: output
-- debug:
- var: output
-- name: Assert if the change was correctly reported
- assert:
- that:
- - output.changed
-
-- name: Update instance of DevTest Lab Schedule -- idempotent
- azure_rm_devtestlabschedule:
- resource_group: "{{ resource_group }}"
- lab_name: "{{ lab_name }}"
- name: lab_vms_shutdown
- time: "1030"
- time_zone_id: "UTC+12"
- register: output
-- debug:
- var: output
-- name: Assert if the change was correctly reported
- assert:
- that:
- - not output.changed
-
-- name: Update instance of DevTest Lab Schedule -- change time
- azure_rm_devtestlabschedule:
- resource_group: "{{ resource_group }}"
- lab_name: "{{ lab_name }}"
- name: lab_vms_shutdown
- time: "1130"
- time_zone_id: "UTC+12"
- register: output
-- debug:
- var: output
-- name: Assert if the change was correctly reported
- assert:
- that:
- - output.changed
-
-- name: Delete instance of DevTest Lab Schedule
- azure_rm_devtestlabschedule:
- resource_group: "{{ resource_group }}"
- lab_name: "{{ lab_name }}"
- name: lab_vms_shutdown
- state: absent
- register: output
-- debug:
- var: output
-- name: Assert if the change was correctly reported
- assert:
- that:
- - output.changed
-
-- name: Create instance of DevTest Labs virtual network
- azure_rm_devtestlabvirtualnetwork:
- resource_group: "{{ resource_group }}"
- lab_name: "{{ lab_name }}"
- name: "{{ vn_name }}"
- location: eastus
- description: My DevTest Lab
- register: output
-- name: Assert the change was registered
- assert:
- that:
- - output.changed
-
-- name: Update instance of DevTest Labs virtual network with same parameters
- azure_rm_devtestlabvirtualnetwork:
- resource_group: "{{ resource_group }}"
- lab_name: "{{ lab_name }}"
- name: "{{ vn_name }}"
- location: eastus
- description: My DevTest Lab
- register: output
-- name: Assert that nothing was changed
- assert:
- that:
- - output.changed == false
-
-- name: Update instance of DevTest Labs virtual network with changed description
- azure_rm_devtestlabvirtualnetwork:
- resource_group: "{{ resource_group }}"
- lab_name: "{{ lab_name }}"
- name: "{{ vn_name }}"
- location: eastus
- description: My DevTest Lab Updated
- register: output
-- name: Assert that nothing was changed
- assert:
- that:
- - output.changed
-
-- name: Get DevTest Lab Virtual Network facts
- azure_rm_devtestlabvirtualnetwork_facts:
- resource_group: "{{ resource_group }}"
- lab_name: "{{ lab_name }}"
- name: "{{ vn_name }}"
- register: output
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.virtualnetworks[0]['id'] != None
- - output.virtualnetworks[0]['resource_group'] != None
- - output.virtualnetworks[0]['lab_name'] != None
- - output.virtualnetworks[0]['name'] != None
- - output.virtualnetworks[0]['external_provider_resource_id'] != None
- - output.virtualnetworks[0]['description'] != None
- - output.virtualnetworks[0]['provisioning_state'] != None
-
-- name: List all Virtual Networks in DevTest Lab
- azure_rm_devtestlabvirtualnetwork_facts:
- resource_group: "{{ resource_group }}"
- lab_name: "{{ lab_name }}"
- register: output
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.virtualnetworks[0]['id'] != None
- - output.virtualnetworks[0]['resource_group'] != None
- - output.virtualnetworks[0]['lab_name'] != None
- - output.virtualnetworks[0]['name'] != None
- - output.virtualnetworks[0]['external_provider_resource_id'] != None
- - output.virtualnetworks[0]['description'] != None
- - output.virtualnetworks[0]['provisioning_state'] != None
-
-- name: Create instance of DevTest Labs artifacts source
- azure_rm_devtestlabartifactsource:
- resource_group: "{{ resource_group }}"
- lab_name: "{{ lab_name }}"
- name: "{{ artifacts_name }}"
- uri: https://github.com/Azure/azure_preview_modules.git
- source_type: github
- folder_path: /tasks
- security_token: "{{ github_token }}"
- register: output
- when: "github_token | length > 0"
-- name: Assert if the change was correctly reported
- assert:
- that:
- - output.changed
- when: "github_token | length > 0"
-
-- name: Update instance of DevTest Labs artifacts source with same parameters
- azure_rm_devtestlabartifactsource:
- resource_group: "{{ resource_group }}"
- lab_name: "{{ lab_name }}"
- name: "{{ artifacts_name }}"
- uri: https://github.com/Azure/azure_preview_modules.git
- source_type: github
- folder_path: /tasks
- security_token: "{{ github_token }}"
- register: output
- when: "github_token | length > 0"
-- name: Assert that nothing was changed
- assert:
- that:
- - output.changed == false
- when: "github_token | length > 0"
-
-- name: Update instance of DevTest Labs artifacts source, add display name, change folder
- azure_rm_devtestlabartifactsource:
- resource_group: "{{ resource_group }}"
- lab_name: "{{ lab_name }}"
- name: "{{ artifacts_name }}"
- uri: https://github.com/Azure/azure_preview_modules.git
- source_type: github
- folder_path: /library
- security_token: "{{ github_token }}"
- display_name: My Artifacts Source
- register: output
- when: "github_token | length > 0"
-- name: Assert that nothing was changed
- assert:
- that:
- - output.changed
- when: "github_token | length > 0"
-
-- name:
- set_fact:
- artifact_source:
- - source_name: "public repo"
- source_path: "/Artifacts/linux-install-mongodb"
- when: "github_token | length > 0"
-
-- name:
- set_fact:
- artifact_source: null
- when: "github_token | length == 0"
-
-- name: Create instance of DTL Virtual Machine
- azure_rm_devtestlabvirtualmachine:
- resource_group: "{{ resource_group }}"
- lab_name: "{{ lab_name }}"
- name: "{{ vm_name }}"
- notes: Virtual machine notes, just something....
- os_type: linux
- vm_size: Standard_A2_v2
- user_name: dtladmin
- password: ZSasfovobocu$$21!
- lab_subnet:
- virtual_network_name: "{{ vn_name }}"
- name: "{{ vn_name }}Subnet"
- disallow_public_ip_address: no
- image:
- offer: UbuntuServer
- publisher: Canonical
- sku: 16.04-LTS
- os_type: Linux
- version: latest
- artifacts: "{{ artifact_source }}"
- allow_claim: no
- expiration_date: "2029-02-22T01:49:12.117974Z"
- register: output
- when: "github_token | length > 0"
-
-- name: Assert that change was registered
- assert:
- that:
- - output.changed
- when: "github_token | length > 0"
-
-- name: Update instance of DTL Virtual Machine with same parameters
- azure_rm_devtestlabvirtualmachine:
- resource_group: "{{ resource_group }}"
- lab_name: "{{ lab_name }}"
- name: "{{ vm_name }}"
- notes: Virtual machine notes, just something....
- os_type: linux
- vm_size: Standard_A2_v2
- user_name: dtladmin
- password: ZSasfovobocu$$21!
- lab_subnet:
- virtual_network_name: "{{ vn_name }}"
- name: "{{ vn_name }}Subnet"
- disallow_public_ip_address: no
- image:
- offer: UbuntuServer
- publisher: Canonical
- sku: 16.04-LTS
- os_type: Linux
- version: latest
- artifacts: "{{ artifact_source }}"
- allow_claim: no
- expiration_date: "2029-02-22T01:49:12.117974Z"
- register: output
- when: "github_token | length > 0"
-
-- name: Assert that nothing has changed
- assert:
- that:
- - output.changed == false
- when: "github_token | length > 0"
-
-- name: Update instance of DTL Virtual Machine - change notes
- azure_rm_devtestlabvirtualmachine:
- resource_group: "{{ resource_group }}"
- lab_name: "{{ lab_name }}"
- name: "{{ vm_name }}"
- notes: Virtual machine notes, just something.... more text
- os_type: linux
- vm_size: Standard_A2_v2
- user_name: dtladmin
- password: ZSasfovobocu$$21!
- lab_subnet:
- virtual_network_name: "{{ vn_name }}"
- name: "{{ vn_name }}Subnet"
- disallow_public_ip_address: no
- image:
- offer: UbuntuServer
- publisher: Canonical
- sku: 16.04-LTS
- os_type: Linux
- version: latest
- artifacts: "{{ artifact_source }}"
- allow_claim: no
- expiration_date: "2029-02-22T01:49:12.117974Z"
- register: output
- when: "github_token | length > 0"
-
-- name: Assert that change was registered
- assert:
- that:
- - output.changed
- when: "github_token | length > 0"
-
-- name: Get Facts of DTL Virtual Machine
- azure_rm_devtestlabvirtualmachine_facts:
- resource_group: "{{ resource_group }}"
- lab_name: "{{ lab_name }}"
- name: "{{ vm_name }}"
- register: output_vm
-- name: Assert that facts are returned
- assert:
- that:
- - output_vm.changed == False
- - output_vm.virtualmachines[0]['id'] != None
- - output_vm.virtualmachines[0]['resource_group'] != None
- - output_vm.virtualmachines[0]['lab_name'] != None
- - output_vm.virtualmachines[0]['name'] != None
- - output_vm.virtualmachines[0]['compute_vm_id'] != None
- - output_vm.virtualmachines[0]['compute_vm_resource_group'] != None
- - output_vm.virtualmachines[0]['compute_vm_name'] != None
- - output_vm.virtualmachines[0]['disallow_public_ip_address'] != None
- - output_vm.virtualmachines[0]['expiration_date'] != None
- - output_vm.virtualmachines[0]['fqdn'] != None
- - output_vm.virtualmachines[0]['id'] != None
- - output_vm.virtualmachines[0]['image'] != None
- - output_vm.virtualmachines[0]['notes'] != None
- - output_vm.virtualmachines[0]['os_type'] != None
- - output_vm.virtualmachines[0]['provisioning_state'] != None
- - output_vm.virtualmachines[0]['storage_type'] != None
- - output_vm.virtualmachines[0]['user_name'] != None
- - output_vm.virtualmachines[0]['vm_size'] != None
- when: "github_token | length > 0"
-
-- name: List Facts of DTL Virtual Machine
- azure_rm_devtestlabvirtualmachine_facts:
- resource_group: "{{ resource_group }}"
- lab_name: "{{ lab_name }}"
- register: output_vm
-- name: Assert that facts are returned
- assert:
- that:
- - output_vm.changed == False
- - output_vm.virtualmachines[0]['id'] != None
- - output_vm.virtualmachines[0]['resource_group'] != None
- - output_vm.virtualmachines[0]['lab_name'] != None
- - output_vm.virtualmachines[0]['name'] != None
- - output_vm.virtualmachines[0]['compute_vm_id'] != None
- - output_vm.virtualmachines[0]['disallow_public_ip_address'] != None
- - output_vm.virtualmachines[0]['expiration_date'] != None
- - output_vm.virtualmachines[0]['fqdn'] != None
- - output_vm.virtualmachines[0]['id'] != None
- - output_vm.virtualmachines[0]['image'] != None
- - output_vm.virtualmachines[0]['notes'] != None
- - output_vm.virtualmachines[0]['os_type'] != None
- - output_vm.virtualmachines[0]['provisioning_state'] != None
- - output_vm.virtualmachines[0]['storage_type'] != None
- - output_vm.virtualmachines[0]['user_name'] != None
- - output_vm.virtualmachines[0]['vm_size'] != None
- when: "github_token | length > 0"
-
-
-- name: List all artifact sources
- azure_rm_devtestlabartifactsource_facts:
- resource_group: "{{ resource_group }}"
- lab_name: "{{ lab_name }}"
- register: output
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.artifactsources[0]['id'] != None
- - output.artifactsources[0]['resource_group'] != None
- - output.artifactsources[0]['lab_name'] != None
- - output.artifactsources[0]['name'] != None
- - output.artifactsources[0]['display_name'] != None
- - output.artifactsources[0]['source_type'] != None
- - output.artifactsources[0]['is_enabled'] != None
- - output.artifactsources[0]['uri'] != None
- - output.artifactsources[0]['folder_path'] != None
- - output.artifactsources[0]['provisioning_state'] != None
- - output.artifactsources | length >= 2
-
-- name: Get artifacts source facts
- azure_rm_devtestlabartifactsource_facts:
- resource_group: "{{ resource_group }}"
- lab_name: "{{ lab_name }}"
- name: public repo
- register: output
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.artifactsources[0]['id'] != None
- - output.artifactsources[0]['resource_group'] != None
- - output.artifactsources[0]['lab_name'] != None
- - output.artifactsources[0]['name'] != None
- - output.artifactsources[0]['display_name'] != None
- - output.artifactsources[0]['source_type'] != None
- - output.artifactsources[0]['is_enabled'] != None
- - output.artifactsources[0]['uri'] != None
- - output.artifactsources[0]['folder_path'] != None
- - output.artifactsources[0]['provisioning_state'] != None
-
-- name: Delete instance of DevTest Labs artifacts source
- azure_rm_devtestlabartifactsource:
- resource_group: "{{ resource_group }}"
- lab_name: "{{ lab_name }}"
- name: "{{ artifacts_name }}"
- state: absent
- register: output
- when: "github_token | length > 0"
-- name: Assert that change was correctly registered
- assert:
- that:
- - output.changed
- when: "github_token | length > 0"
-
-- name: List ARM Template facts
- azure_rm_devtestlabarmtemplate_facts:
- resource_group: "{{ resource_group }}"
- lab_name: "{{ lab_name }}"
- artifact_source_name: "public environment repo"
- register: output
-- name: Assert that facts are returned
- assert:
- that:
- - output.armtemplates[0]['id'] != None
- - output.armtemplates[0]['resource_group'] != None
- - output.armtemplates[0]['lab_name'] != None
- - output.armtemplates[0]['artifact_source_name'] != None
- - output.armtemplates[0]['name'] != None
- - output.armtemplates[0]['display_name'] != None
- - output.armtemplates[0]['description'] != None
- - output.armtemplates[0]['publisher'] != None
- - "output.armtemplates | length > 1"
-
-- name: Get ARM Template facts
- azure_rm_devtestlabarmtemplate_facts:
- resource_group: "{{ resource_group }}"
- lab_name: "{{ lab_name }}"
- artifact_source_name: "public environment repo"
- name: ServiceFabric-LabCluster
- register: output
-- name: Assert that facts are returned
- assert:
- that:
- - output.armtemplates[0]['id'] != None
- - output.armtemplates[0]['resource_group'] != None
- - output.armtemplates[0]['lab_name'] != None
- - output.armtemplates[0]['artifact_source_name'] != None
- - output.armtemplates[0]['name'] != None
- - output.armtemplates[0]['display_name'] != None
- - output.armtemplates[0]['description'] != None
- - output.armtemplates[0]['publisher'] != None
- - "output.armtemplates | length == 1"
-
-
-
-- name: Get Artifact facts
- azure_rm_devtestlabartifact_facts:
- resource_group: "{{ resource_group }}"
- lab_name: "{{ lab_name }}"
- artifact_source_name: "public repo"
- register: output
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.artifacts[0]['id'] != None
- - output.artifacts[0]['resource_group'] != None
- - output.artifacts[0]['lab_name'] != None
- - output.artifacts[0]['artifact_source_name'] != None
- - output.artifacts[0]['name'] != None
- - output.artifacts[0]['description'] != None
- - output.artifacts[0]['file_path'] != None
- - output.artifacts[0]['publisher'] != None
- - output.artifacts[0]['target_os_type'] != None
- - output.artifacts[0]['publisher'] != None
- - "output.artifacts | length > 1"
-
-- name: Get Artifact facts
- azure_rm_devtestlabartifact_facts:
- resource_group: "{{ resource_group }}"
- lab_name: "{{ lab_name }}"
- artifact_source_name: "public repo"
- name: windows-webdeploy
- register: output
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.artifacts[0]['id'] != None
- - output.artifacts[0]['resource_group'] != None
- - output.artifacts[0]['lab_name'] != None
- - output.artifacts[0]['artifact_source_name'] != None
- - output.artifacts[0]['name'] != None
- - output.artifacts[0]['description'] != None
- - output.artifacts[0]['file_path'] != None
- - output.artifacts[0]['publisher'] != None
- - output.artifacts[0]['target_os_type'] != None
- - output.artifacts[0]['publisher'] != None
- - "output.artifacts | length == 1"
-
-- name: Create instance of DevTest Lab Environment
- azure_rm_devtestlabenvironment:
- resource_group: "{{ resource_group }}"
- lab_name: "{{ lab_name }}"
- user_name: "@me"
- name: myEnvironment
- location: eastus
- deployment_template: "{{ output_lab.labs[0].id }}/artifactSources/public environment repo/armTemplates/WebApp"
- register: output
-- name: Assert if the change was correctly reported
- assert:
- that:
- - output.changed
- when: "github_token | length > 0"
-
-- name: Create instance of DevTest Lab Environment - idempotent
- azure_rm_devtestlabenvironment:
- resource_group: "{{ resource_group }}"
- lab_name: "{{ lab_name }}"
- user_name: "@me"
- name: myEnvironment
- location: eastus
- deployment_template:
- artifact_source_name: public environment repo
- name: WebApp
- register: output
-- name: Assert if the change was not detected
- assert:
- that:
- - not output.changed
- when: "github_token | length > 0"
-
-- name: Delete instance of DevTest Lab Environment
- azure_rm_devtestlabenvironment:
- resource_group: "{{ resource_group }}"
- lab_name: "{{ lab_name }}"
- user_name: "@me"
- name: myEnvironment
- state: absent
- register: output
-- name: Assert that change was detected
- assert:
- that:
- - output.changed
- when: "github_token | length > 0"
-
-- name: Create instance of DevTest Lab Image
- azure_rm_devtestlabcustomimage:
- resource_group: "{{ resource_group }}"
- lab_name: "{{ lab_name }}"
- name: myImage
- source_vm: "{{ output_vm.virtualmachines[0]['name'] }}"
- linux_os_state: non_deprovisioned
- register: output
-- name: Assert that change was detected
- assert:
- that:
- - output.changed
- when: "github_token | length > 0"
-
-- name: Create instance of DevTest Lab Image -- idempotent
- azure_rm_devtestlabcustomimage:
- resource_group: "{{ resource_group }}"
- lab_name: "{{ lab_name }}"
- name: myImage
- source_vm: "{{ output_vm.virtualmachines[0]['name'] }}"
- linux_os_state: non_deprovisioned
- register: output
-- name: Assert that change was detected
- assert:
- that:
- - not output.changed
- when: "github_token | length > 0"
-
-- name: Delete instance of Lab -- check mode
- azure_rm_devtestlab:
- resource_group: "{{ resource_group }}"
- state: absent
- name: "{{ lab_name }}"
- check_mode: yes
- register: output
-- name: Assert if the change was correctly reported in check mode
- assert:
- that:
- - output.changed
-
-- name: Delete instance of Lab
- azure_rm_devtestlab:
- resource_group: "{{ resource_group }}"
- name: "{{ lab_name }}"
- state: absent
- register: output
-- name: Assert the change was correctly reported
- assert:
- that:
- - output.changed
-
-- name: Delete unexisting instance of Lab
- azure_rm_devtestlab:
- resource_group: "{{ resource_group }}"
- name: "{{ lab_name }}unexisting"
- state: absent
- register: output
-- name: Assert thes state has not changed
- assert:
- that:
- - output.changed == false
diff --git a/test/integration/targets/azure_rm_dnszone/aliases b/test/integration/targets/azure_rm_dnszone/aliases
deleted file mode 100644
index b048b01fe2..0000000000
--- a/test/integration/targets/azure_rm_dnszone/aliases
+++ /dev/null
@@ -1,6 +0,0 @@
-cloud/azure
-shippable/azure/group2
-destructive
-azure_rm_dnszone_info
-azure_rm_dnsrecordset
-azure_rm_dnsrecordset_info
diff --git a/test/integration/targets/azure_rm_dnszone/meta/main.yml b/test/integration/targets/azure_rm_dnszone/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_dnszone/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_dnszone/tasks/main.yml b/test/integration/targets/azure_rm_dnszone/tasks/main.yml
deleted file mode 100644
index 03c76397c1..0000000000
--- a/test/integration/targets/azure_rm_dnszone/tasks/main.yml
+++ /dev/null
@@ -1,355 +0,0 @@
-- name: Create random domain name
- set_fact:
- domain_name: "{{ resource_group | hash('md5') | truncate(16, True, '') + (65535 | random | string) }}"
-
-- name: Create a DNS zone (check mode)
- azure_rm_dnszone:
- resource_group: "{{ resource_group }}"
- name: "{{ domain_name }}.com"
- register: results
- check_mode: yes
-
-- assert:
- that: results.changed
-
-- name: Create a DNS zone
- azure_rm_dnszone:
- resource_group: "{{ resource_group }}"
- name: "{{ domain_name }}.com"
- register: results
-
-- assert:
- that: results.changed
-
-- name: Update DNS zone with tags
- azure_rm_dnszone:
- resource_group: "{{ resource_group }}"
- name: "{{ domain_name }}.com"
- tags:
- test: modified
- register: results
-
-- assert:
- that:
- - results.changed
- - results.state.tags.test == 'modified'
-
-- name: Retrieve DNS Zone Facts
- azure_rm_dnszone_info:
- resource_group: "{{ resource_group }}"
- name: "{{ domain_name }}.com"
- register: zones
-
-- name: Assert that facts module returned result
- assert:
- that:
- - zones.dnszones[0].tags.test == 'modified'
- - zones.dnszones[0].type == 'public'
-
-- name: Create virtual network
- azure_rm_virtualnetwork:
- resource_group: "{{ resource_group }}"
- name: "{{ item }}"
- address_prefixes_cidr:
- - 10.1.0.0/16
- - 172.100.0.0/16
- with_items:
- - "{{ domain_name }}registration1"
- - "{{ domain_name }}resolution1"
- - "{{ domain_name }}registration2"
- - "{{ domain_name }}resolution2"
-
-- name: Create private dns zone
- azure_rm_dnszone:
- name: "{{ domain_name }}.private"
- resource_group: "{{ resource_group }}"
- type: private
- registration_virtual_networks:
- - name: "{{ domain_name }}registration1"
- resolution_virtual_networks:
- - name: "{{ domain_name }}resolution1"
- - name: "{{ domain_name }}resolution2"
- register: results
-
-- assert:
- that:
- - "results.state.registration_virtual_networks | length == 1"
- - "results.state.resolution_virtual_networks | length == 2"
- - results.state.type == 'private'
-
-- name: Update private dns zone
- azure_rm_dnszone:
- name: "{{ domain_name }}.private"
- resource_group: "{{ resource_group }}"
- type: private
- registration_virtual_networks:
- - name: "{{ domain_name }}registration1"
- resolution_virtual_networks:
- - name: "{{ domain_name }}resolution1"
- register: results
-
-- assert:
- that:
- - "results.state.registration_virtual_networks | length == 1"
- - "results.state.resolution_virtual_networks | length == 1"
- - results.state.type == 'private'
-
-- name: Test idempotent
- azure_rm_dnszone:
- name: "{{ item }}"
- resource_group: "{{ resource_group }}"
- with_items:
- - "{{ domain_name }}.com"
- - "{{ domain_name }}.private"
- register: results
-
-- assert:
- that:
- - "not {{ item.changed }}"
- with_items: "{{ results.results }}"
-
-#
-# azure_rm_dnsrecordset test
-#
-
-- name: create "A" record set with multiple records
- azure_rm_dnsrecordset:
- resource_group: "{{ resource_group }}"
- relative_name: www
- zone_name: "{{ domain_name }}.com"
- record_type: A
- records:
- - entry: 192.168.100.101
- - entry: 192.168.100.102
- - entry: 192.168.100.103
- register: results
-
-- name: Assert that A record set was created
- assert:
- that:
- - results.changed
- - 'results.state.arecords | length == 3'
-
-- name: re-run "A" record with same values
- azure_rm_dnsrecordset:
- resource_group: "{{ resource_group }}"
- relative_name: www
- zone_name: "{{ domain_name }}.com"
- record_type: A
- records:
- - entry: 192.168.100.101
- - entry: 192.168.100.102
- - entry: 192.168.100.103
- register: results
-
-- name: Assert that A record set was not changed
- assert:
- that: not results.changed
-
-- name: Update "A" record set with additional record
- azure_rm_dnsrecordset:
- resource_group: "{{ resource_group }}"
- relative_name: www
- zone_name: "{{ domain_name }}.com"
- record_type: A
- record_mode: append
- records:
- - entry: 192.168.100.104
- register: results
-
-- name: Assert that new record was appended
- assert:
- that:
- - results.changed
- - 'results.state.arecords | length == 4'
-
-- name: re-update "A" record set with additional record
- azure_rm_dnsrecordset:
- resource_group: "{{ resource_group }}"
- relative_name: www
- zone_name: "{{ domain_name }}.com"
- record_type: A
- record_mode: append
- records:
- - entry: 192.168.100.104
- register: results
-
-- name: Assert that A record set was not changed
- assert:
- that:
- - not results.changed
-
-- name: Remove 1 record from record set
- azure_rm_dnsrecordset:
- resource_group: "{{ resource_group }}"
- relative_name: www
- zone_name: "{{ domain_name }}.com"
- record_type: A
- records:
- - entry: 192.168.100.101
- - entry: 192.168.100.102
- - entry: 192.168.100.103
- register: results
-
-- name: Assert that record was deleted
- assert:
- that:
- - results.changed
- - 'results.state.arecords | length == 3'
-
-- name: Check_mode test
- azure_rm_dnsrecordset:
- resource_group: "{{ resource_group }}"
- relative_name: www
- zone_name: "{{ domain_name }}.com"
- record_type: A
- records:
- - entry: 192.168.100.105
- check_mode: yes
- register: results
-
-- name: Assert that check_mode returns new state
- assert:
- that:
- - results.changed
-
-# FUTURE: add facts module calls to ensure that we really didn't touch anything
-
-- name: create SRV records in a new record set
- azure_rm_dnsrecordset:
- resource_group: "{{ resource_group }}"
- relative_name: "_sip._tcp.{{ domain_name }}.com"
- zone_name: "{{ domain_name }}.com"
- time_to_live: 7200
- record_type: SRV
- records:
- - entry: sip.{{ domain_name }}.com
- priority: 20
- weight: 10
- port: 5060
- register: results
-
-- name: Assert that SRV record set was created
- assert:
- that:
- - results.changed
-
-- name: create TXT records in a new record set
- azure_rm_dnsrecordset:
- resource_group: "{{ resource_group }}"
- relative_name: "_txt.{{ domain_name }}.com"
- zone_name: "{{ domain_name }}.com"
- record_type: TXT
- records:
- - entry: "v=spf1 a -all"
- - entry: "foo"
- - entry:
- - "bar"
- - "baz"
- register: results
-
-- name: Assert that TXT record set was created
- assert:
- that:
- - results.changed
-
-#
-# azure_rm_dnsrecordset_info
-#
-
-- name: Retrieve DNS Record Set Facts for single Record Set
- azure_rm_dnsrecordset_info:
- resource_group: "{{ resource_group }}"
- zone_name: "{{ domain_name }}.com"
- relative_name: www
- record_type: A
- register: results
-
-- name: Assert that facts module returned result for single Record Set
- assert:
- that:
- - not results.changed
-# - azure_dnsrecordset[0].name == 'www'
- - results.dnsrecordsets[0].relative_name == 'www'
- - 'results.dnsrecordsets[0].records | length == 3'
- - results.dnsrecordsets[0].record_type == 'A'
-
-- name: Retrieve DNS Record Set Facts for all Record Sets
- azure_rm_dnsrecordset_info:
- resource_group: "{{ resource_group }}"
- zone_name: "{{ domain_name }}.com"
- register: facts
-
-- name: Assert that facts module returned result for all Record Sets
- assert:
- that:
- - not facts.changed
-# - facts.ansible_facts.azure_dnsrecordset[0].name == '@'
-# - facts.ansible_facts.azure_dnsrecordset[1].name == '@'
-# - facts.ansible_facts.azure_dnsrecordset[4].name == 'www'
-
-#
-# azure_rm_dnsrecordset cleanup
-#
-- name: delete all record sets except for @
- azure_rm_dnsrecordset:
- resource_group: "{{ resource_group }}"
- relative_name: "{{ item.relative_name }}"
- zone_name: "{{ domain_name }}.com"
- record_type: "{{ item.record_type }}"
- state: absent
- with_items: "{{ facts.dnsrecordsets }}"
- when:
- - item.relative_name != '@'
- register: results
-
-- name: Assert that record set deleted
- assert:
- that: results.changed
-
-- name: Retrieve DNS Record Set Facts for all Record Sets
- azure_rm_dnsrecordset_info:
- resource_group: "{{ resource_group }}"
- zone_name: "{{ domain_name }}.com"
- register: facts
-
-- name: Assert all record set deleted
- assert:
- that:
- - item.relative_name == '@'
- with_items: "{{ facts.dnsrecordsets }}"
-
-- name: (idempotence test) re-run record set absent
- azure_rm_dnsrecordset:
- resource_group: "{{ resource_group }}"
- relative_name: www
- zone_name: "{{ domain_name }}.com"
- record_type: A
- state: absent
- register: results
-
-- name:
- assert:
- that: not results.changed
-
-#
-# azure_rm_dnszone cleanup
-#
-- name: Delete DNS zone
- azure_rm_dnszone:
- resource_group: "{{ resource_group }}"
- name: "{{ item }}"
- state: absent
- with_items:
- - "{{ domain_name }}.com"
- - "{{ domain_name }}.private"
-
-- name: Delete DNS zone (idempotent)
- azure_rm_dnszone:
- resource_group: "{{ resource_group }}"
- name: "{{ domain_name }}.com"
- state: absent
- register: results
-
-- assert:
- that: not results.changed \ No newline at end of file
diff --git a/test/integration/targets/azure_rm_functionapp/aliases b/test/integration/targets/azure_rm_functionapp/aliases
deleted file mode 100644
index aa77c071a8..0000000000
--- a/test/integration/targets/azure_rm_functionapp/aliases
+++ /dev/null
@@ -1,3 +0,0 @@
-cloud/azure
-shippable/azure/group2
-destructive
diff --git a/test/integration/targets/azure_rm_functionapp/meta/main.yml b/test/integration/targets/azure_rm_functionapp/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_functionapp/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_functionapp/tasks/main.yml b/test/integration/targets/azure_rm_functionapp/tasks/main.yml
deleted file mode 100644
index cf200fb9c4..0000000000
--- a/test/integration/targets/azure_rm_functionapp/tasks/main.yml
+++ /dev/null
@@ -1,131 +0,0 @@
-- name: Fix resource prefix
- set_fact:
- fixed_resource_prefix: "{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
-
-- name: Fix resource prefix
- set_fact:
- funcapp_name_basic: "fa{{ fixed_resource_prefix }}basic"
- funcapp_name_container: "fa{{ fixed_resource_prefix }}container"
- funcapp_name_params: "fa{{ fixed_resource_prefix }}params"
- storage_account_name: "sa{{ fixed_resource_prefix }}"
- plan_name: "ap{{ fixed_resource_prefix }}"
-
-- name: create storage account for function apps
- azure_rm_storageaccount:
- resource_group: '{{ resource_group }}'
- name: "{{ storage_account_name }}"
- account_type: Standard_LRS
-
-- name: create basic function app
- azure_rm_functionapp:
- resource_group: "{{ resource_group }}"
- name: "{{ funcapp_name_basic }}"
- storage_account: "{{ storage_account_name }}"
- register: output
-
-- name: assert the function was created
- assert:
- that: output.changed
-
-- name: list facts for function
- azure_rm_functionapp_info:
- resource_group: '{{ resource_group }}'
- name: "{{ funcapp_name_basic }}"
- register: results
-
-- name: assert the facts were retrieved
- assert:
- that:
- - results.ansible_info.azure_functionapps|length == 1
- - results.ansible_info.azure_functionapps[0].name == "{{ funcapp_name_basic }}"
-
-- name: delete basic function app
- azure_rm_functionapp:
- resource_group: '{{ resource_group }}'
- name: "{{ funcapp_name_basic }}"
- state: absent
- register: output
-
-- name: assert the function was deleted
- assert:
- that: output.changed
-
-- name: create a function with app settings
- azure_rm_functionapp:
- resource_group: '{{ resource_group }}'
- name: "{{ funcapp_name_params }}"
- storage_account: "{{ storage_account_name }}"
- app_settings:
- hello: world
- things: more stuff
- FUNCTIONS_EXTENSION_VERSION: "~2"
- register: output
-
-- name: assert the function with app settings was created
- assert:
- that: output.changed
-
-- name: change app settings
- azure_rm_functionapp:
- resource_group: '{{ resource_group }}'
- name: "{{ funcapp_name_params }}"
- storage_account: "{{ storage_account_name }}"
- app_settings:
- hello: world
- things: more stuff
- FUNCTIONS_EXTENSION_VERSION: "~2"
- another: one
- register: output
-
-- name: assert the function was changed
- assert:
- that: output.changed
-
-- name: delete the function app
- azure_rm_functionapp:
- resource_group: '{{ resource_group }}'
- name: "{{ funcapp_name_params }}"
- state: absent
- register: output
-
-- name: assert the function was deleted
- assert:
- that: output.changed
-
-- name: Create a linux app service plan
- azure_rm_appserviceplan:
- resource_group: "{{ resource_group }}"
- name: "{{ plan_name }}"
- sku: S1
- is_linux: true
- number_of_workers: 1
-
-- name: "Create azure function app {{ function_app }}"
- azure_rm_functionapp:
- resource_group: "{{ resource_group }}"
- name: "{{ funcapp_name_container }}"
- storage_account: "{{ storage_account_name }}"
- plan:
- resource_group: "{{ resource_group }}"
- name: "{{ plan_name }}"
- container_settings:
- name: httpd
- app_settings:
- FUNCTIONS_EXTENSION_VERSION: "~2"
- register: output
-
-- name: assert the function was changed
- assert:
- that: output.changed
-
-- name: delete the function app
- azure_rm_functionapp:
- resource_group: '{{ resource_group }}'
- name: "{{ funcapp_name_container }}"
- state: absent
-
-- name: delete storage account
- azure_rm_storageaccount:
- resource_group: '{{ resource_group }}'
- name: "{{ storage_account_name }}"
- state: absent
diff --git a/test/integration/targets/azure_rm_gallery/aliases b/test/integration/targets/azure_rm_gallery/aliases
deleted file mode 100644
index df49fa1efc..0000000000
--- a/test/integration/targets/azure_rm_gallery/aliases
+++ /dev/null
@@ -1,6 +0,0 @@
-cloud/azure
-shippable/azure/group4
-destructive
-azure_rm_galleryimage
-azure_rm_galleryimageversion
-azure_rm_snapshot
diff --git a/test/integration/targets/azure_rm_gallery/meta/main.yml b/test/integration/targets/azure_rm_gallery/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_gallery/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_gallery/tasks/main.yml b/test/integration/targets/azure_rm_gallery/tasks/main.yml
deleted file mode 100644
index 000f9e8855..0000000000
--- a/test/integration/targets/azure_rm_gallery/tasks/main.yml
+++ /dev/null
@@ -1,342 +0,0 @@
-- name: Prepare random number
- set_fact:
- rpfx: "{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- run_once: yes
-
-- name: Create virtual network
- azure_rm_virtualnetwork:
- resource_group: "{{ resource_group }}"
- name: testVnet
- address_prefixes: "10.0.0.0/16"
-
-- name: Add subnet
- azure_rm_subnet:
- resource_group: "{{ resource_group }}"
- name: testSubnet
- address_prefix: "10.0.1.0/24"
- virtual_network: testVnet
-
-- name: Create public IP address
- azure_rm_publicipaddress:
- resource_group: "{{ resource_group }}"
- allocation_method: Static
- name: testPublicIP
-
-- name: Create virtual network inteface cards for VM A and B
- azure_rm_networkinterface:
- resource_group: "{{ resource_group }}"
- name: "vmforimage{{ rpfx }}nic"
- virtual_network: testVnet
- subnet: testSubnet
-
-- name: Create VM
- azure_rm_virtualmachine:
- resource_group: "{{ resource_group }}"
- name: "vmforimage{{ rpfx }}"
- location: eastus
- admin_username: testuser
- admin_password: "Password1234!"
- vm_size: Standard_B1ms
- network_interfaces: "vmforimage{{ rpfx }}nic"
- image:
- offer: UbuntuServer
- publisher: Canonical
- sku: 16.04-LTS
- version: latest
-
-- name: Get VM facts
- azure_rm_virtualmachine_facts:
- resource_group: "{{ resource_group }}"
- name: "vmforimage{{ rpfx }}"
- register: output
-
-- name: Create a snapshot by importing an unmanaged blob from the same subscription.
- azure_rm_snapshot:
- resource_group: "{{ resource_group }}"
- name: "mySnapshot-{{ rpfx }}"
- location: eastus
- creation_data:
- create_option: Import
- source_uri: 'https://{{ output.vms[0].storage_account_name }}.blob.core.windows.net/{{ output.vms[0].storage_container_name }}/{{ output.vms[0].storage_blob_name }}'
- register: output
-
-- assert:
- that:
- - output.changed
-
-- name: Generalize VM
- azure_rm_virtualmachine:
- resource_group: "{{ resource_group }}"
- name: "vmforimage{{ rpfx }}"
- generalized: yes
-- name: Create custom image
- azure_rm_image:
- resource_group: "{{ resource_group }}"
- name: testimagea
- source: "vmforimage{{ rpfx }}"
-- name: Create or update a simple gallery.
- azure_rm_gallery:
- resource_group: "{{ resource_group }}"
- name: myGallery{{ rpfx }}
- location: eastus
- description: This is the gallery description.
- register: output
-
-- assert:
- that:
- - output.changed
-
-- name: Create or update a simple gallery - idempotent
- azure_rm_gallery:
- resource_group: "{{ resource_group }}"
- name: myGallery{{ rpfx }}
- location: eastus
- description: This is the gallery description.
- register: output
-
-- assert:
- that:
- - not output.changed
-
-- name: Create or update a simple gallery - change description
- azure_rm_gallery:
- resource_group: "{{ resource_group }}"
- name: myGallery{{ rpfx }}
- location: eastus
- description: This is the gallery description - xxx.
- register: output
-
-- assert:
- that:
- - output.changed
-
-- name: Get a gallery info.
- azure_rm_gallery_info:
- resource_group: "{{ resource_group }}"
- name: myGallery{{ rpfx }}
- register: output
-
-- assert:
- that:
- - not output.changed
- - output.galleries['id'] != None
- - output.galleries['name'] != None
- - output.galleries['location'] != None
- - output.galleries['description'] != None
- - output.galleries['provisioning_state'] != None
-
-- name: Create or update gallery image
- azure_rm_galleryimage:
- resource_group: "{{ resource_group }}"
- gallery_name: myGallery{{ rpfx }}
- name: myImage
- location: eastus
- os_type: linux
- os_state: generalized
- identifier:
- publisher: myPublisherName
- offer: myOfferName
- sku: mySkuName
- description: Image Description
- register: output
-
-- assert:
- that:
- - output.changed
-
-- name: Create or update gallery image - idempotent
- azure_rm_galleryimage:
- resource_group: "{{ resource_group }}"
- gallery_name: myGallery{{ rpfx }}
- name: myImage
- location: eastus
- os_type: linux
- os_state: generalized
- identifier:
- publisher: myPublisherName
- offer: myOfferName
- sku: mySkuName
- description: Image Description
- register: output
-
-- assert:
- that:
- - not output.changed
-
-- name: Create or update gallery image - change description
- azure_rm_galleryimage:
- resource_group: "{{ resource_group }}"
- gallery_name: myGallery{{ rpfx }}
- name: myImage
- location: eastus
- os_type: linux
- os_state: generalized
- identifier:
- publisher: myPublisherName
- offer: myOfferName
- sku: mySkuName
- description: Image Description XXXs
- register: output
-
-- assert:
- that:
- - output.changed
-
-- name: Get a gallery image info.
- azure_rm_galleryimage_info:
- resource_group: "{{ resource_group }}"
- gallery_name: myGallery{{ rpfx }}
- name: myImage
- register: output
-
-- assert:
- that:
- - not output.changed
- - output.images['id'] != None
- - output.images['name'] != None
- - output.images['location'] != None
- - output.images['os_state'] != None
- - output.images['os_type'] != None
- - output.images['identifier'] != None
-
-- name: Create or update a simple gallery Image Version.
- azure_rm_galleryimageversion:
- resource_group: "{{ resource_group }}"
- gallery_name: myGallery{{ rpfx }}
- gallery_image_name: myImage
- name: 10.1.3
- location: eastus
- publishing_profile:
- end_of_life_date: "2020-10-01t00:00:00+00:00"
- exclude_from_latest: yes
- replica_count: 3
- storage_account_type: Standard_LRS
- target_regions:
- - name: eastus
- regional_replica_count: 1
- - name: westus
- regional_replica_count: 2
- storage_account_type: Standard_ZRS
- managed_image:
- name: testimagea
- resource_group: "{{ resource_group }}"
- register: output
-
-- assert:
- that:
- - output.changed
-
-- name: Create or update a simple gallery Image Version - idempotent
- azure_rm_galleryimageversion:
- resource_group: "{{ resource_group }}"
- gallery_name: myGallery{{ rpfx }}
- gallery_image_name: myImage
- name: 10.1.3
- location: eastus
- publishing_profile:
- end_of_life_date: "2020-10-01t00:00:00+00:00"
- exclude_from_latest: yes
- replica_count: 3
- storage_account_type: Standard_LRS
- target_regions:
- - name: eastus
- regional_replica_count: 1
- - name: westus
- regional_replica_count: 2
- storage_account_type: Standard_ZRS
- managed_image:
- name: testimagea
- resource_group: "{{ resource_group }}"
- register: output
-
-- assert:
- that:
- - not output.changed
-
-- name: Create or update a simple gallery Image Version - change end of life
- azure_rm_galleryimageversion:
- resource_group: "{{ resource_group }}"
- gallery_name: myGallery{{ rpfx }}
- gallery_image_name: myImage
- name: 10.1.3
- location: eastus
- publishing_profile:
- end_of_life_date: "2021-10-01t00:00:00+00:00"
- exclude_from_latest: yes
- replica_count: 3
- storage_account_type: Standard_LRS
- target_regions:
- - name: eastus
- regional_replica_count: 1
- - name: westus
- regional_replica_count: 2
- storage_account_type: Standard_ZRS
- managed_image:
- name: testimagea
- resource_group: "{{ resource_group }}"
- register: output
-
-- assert:
- that:
- - output.changed
-
-- name: Get a simple gallery Image Version info.
- azure_rm_galleryimageversion_info:
- resource_group: "{{ resource_group }}"
- gallery_name: myGallery{{ rpfx }}
- gallery_image_name: myImage
- name: 10.1.3
- register: output
-
-- assert:
- that:
- - not output.changed
- - output.versions['id'] != None
- - output.versions['name'] != None
- - output.versions['location'] != None
- - output.versions['publishing_profile'] != None
- - output.versions['provisioning_state'] != None
-
-- name: Delete gallery image Version.
- azure_rm_galleryimageversion:
- resource_group: "{{ resource_group }}"
- gallery_name: myGallery{{ rpfx }}
- gallery_image_name: myImage
- name: 10.1.3
- state: absent
- register: output
-
-- assert:
- that:
- - output.changed
-
-- name: pasue 2 minutes, wait for deletion complete
- pause:
- minutes: 2
-
-- name: Delete gallery image
- azure_rm_galleryimage:
- resource_group: "{{ resource_group }}"
- gallery_name: myGallery{{ rpfx }}
- name: myImage
- state: absent
- register: output
-
-- assert:
- that:
- - output.changed
-
-- name: pasue 2 minutes, wait for deletion complete
- pause:
- minutes: 2
-
-- name: Delete gallery
- azure_rm_gallery:
- resource_group: "{{ resource_group }}"
- name: myGallery{{ rpfx }}
- state: absent
- register: output
-
-- assert:
- that:
- - output.changed
diff --git a/test/integration/targets/azure_rm_hdinsightcluster/aliases b/test/integration/targets/azure_rm_hdinsightcluster/aliases
deleted file mode 100644
index ef98a7be22..0000000000
--- a/test/integration/targets/azure_rm_hdinsightcluster/aliases
+++ /dev/null
@@ -1,6 +0,0 @@
-cloud/azure
-destructive
-shippable/azure/group1
-unstable # test is slow (~30 minute run time), not unstable, but this is better than unsupported
-azure_rm_hdinsightcluster_info
-disabled
diff --git a/test/integration/targets/azure_rm_hdinsightcluster/meta/main.yml b/test/integration/targets/azure_rm_hdinsightcluster/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_hdinsightcluster/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_hdinsightcluster/tasks/main.yml b/test/integration/targets/azure_rm_hdinsightcluster/tasks/main.yml
deleted file mode 100644
index 2bf0a98191..0000000000
--- a/test/integration/targets/azure_rm_hdinsightcluster/tasks/main.yml
+++ /dev/null
@@ -1,244 +0,0 @@
-- name: Prepare random number
- set_fact:
- rpfx: "{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- run_once: yes
-
-- name: Create storage account
- azure_rm_storageaccount:
- resource_group: "{{ resource_group }}"
- name: "storage{{ rpfx }}"
- account_type: Standard_LRS
- location: eastus2
-
-- name: Sample for Azure REST API - StorageAccounts_ListKeys
- azure_rm_resource:
- api_version: '2018-07-01'
- method: POST
- resource_group: "{{ resource_group }}"
- provider: storage
- resource_type: storageaccounts
- resource_name: "storage{{ rpfx }}"
- subresource:
- - type: listkeys
- register: storage_output
-
-- debug:
- var: storage_output
-
-- name: Create instance of Cluster -- check mode
- azure_rm_hdinsightcluster:
- resource_group: "{{ resource_group }}"
- name: "cluster{{ rpfx }}"
- location: eastus2
- cluster_version: 3.6
- os_type: linux
- tier: standard
- cluster_definition:
- kind: spark
- gateway_rest_username: http-user
- gateway_rest_password: MuABCPassword!!@123
- storage_accounts:
- - name: storage{{ rpfx }}.blob.core.windows.net
- is_default: yes
- container: "cluster{{ rpfx }}"
- key: "{{ storage_output['response']['keys'][0]['value'] }}"
- compute_profile_roles:
- - name: headnode
- target_instance_count: 1
- vm_size: Standard_D3
- linux_profile:
- username: sshuser
- password: MuABCPassword!!@123
- - name: workernode
- target_instance_count: 1
- vm_size: Standard_D3
- linux_profile:
- username: sshuser
- password: MuABCPassword!!@123
- - name: zookeepernode
- target_instance_count: 3
- vm_size: Medium
- linux_profile:
- username: sshuser
- password: MuABCPassword!!@123
- check_mode: yes
- register: output
-- name: Assert the resource instance is well created
- assert:
- that:
- - output.changed
-
-- name: Create instance of Cluster
- azure_rm_hdinsightcluster:
- resource_group: "{{ resource_group }}"
- name: "cluster{{ rpfx }}"
- location: eastus2
- cluster_version: 3.6
- os_type: linux
- tier: standard
- cluster_definition:
- kind: spark
- gateway_rest_username: http-user
- gateway_rest_password: MuABCPassword!!@123
- storage_accounts:
- - name: storage{{ rpfx }}.blob.core.windows.net
- is_default: yes
- container: "cluster{{ rpfx }}"
- key: "{{ storage_output['response']['keys'][0]['value'] }}"
- compute_profile_roles:
- - name: headnode
- target_instance_count: 1
- vm_size: Standard_D3
- linux_profile:
- username: sshuser
- password: MuABCPassword!!@123
- - name: workernode
- target_instance_count: 1
- vm_size: Standard_D3
- linux_profile:
- username: sshuser
- password: MuABCPassword!!@123
- - name: zookeepernode
- target_instance_count: 3
- vm_size: Medium
- linux_profile:
- username: sshuser
- password: MuABCPassword!!@123
- register: output
-
-- name: Assert the resource instance is well created
- assert:
- that:
- - output.changed
-
-- name: Create again instance of Cluster -- idempotent
- azure_rm_hdinsightcluster:
- resource_group: "{{ resource_group }}"
- name: "cluster{{ rpfx }}"
- location: eastus2
- cluster_version: 3.6
- os_type: linux
- tier: standard
- cluster_definition:
- kind: spark
- gateway_rest_username: http-user
- gateway_rest_password: MuABCPassword!!@123
- storage_accounts:
- - name: storage{{ rpfx }}.blob.core.windows.net
- is_default: yes
- container: "cluster{{ rpfx }}"
- key: "{{ storage_output['response']['keys'][0]['value'] }}"
- compute_profile_roles:
- - name: headnode
- target_instance_count: 1
- vm_size: Standard_D3
- linux_profile:
- username: sshuser
- password: MuABCPassword!!@123
- - name: workernode
- target_instance_count: 1
- vm_size: Standard_D3
- linux_profile:
- username: sshuser
- password: MuABCPassword!!@123
- - name: zookeepernode
- target_instance_count: 3
- vm_size: Medium
- linux_profile:
- username: sshuser
- password: MuABCPassword!!@123
- register: output
-- name: Assert the state has not changed
- assert:
- that:
- - output.changed == false
-
-- name: Create again instance of Cluster -- resize and add tags
- azure_rm_hdinsightcluster:
- resource_group: "{{ resource_group }}"
- name: "cluster{{ rpfx }}"
- location: eastus2
- cluster_version: 3.6
- os_type: linux
- tier: standard
- cluster_definition:
- kind: spark
- gateway_rest_username: http-user
- gateway_rest_password: MuABCPassword!!@123
- storage_accounts:
- - name: storage{{ rpfx }}.blob.core.windows.net
- is_default: yes
- container: "cluster{{ rpfx }}"
- key: "{{ storage_output['response']['keys'][0]['value'] }}"
- compute_profile_roles:
- - name: headnode
- target_instance_count: 1
- vm_size: Standard_D3
- linux_profile:
- username: sshuser
- password: MuABCPassword!!@123
- - name: workernode
- target_instance_count: 2
- vm_size: Standard_D3
- linux_profile:
- username: sshuser
- password: MuABCPassword!!@123
- - name: zookeepernode
- target_instance_count: 3
- vm_size: Medium
- linux_profile:
- username: sshuser
- password: MuABCPassword!!@123
- tags:
- aaa: bbb
- register: output
-- debug:
- var: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed
-
-- name: Get facts of Cluster
- azure_rm_hdinsightcluster_info:
- resource_group: "{{ resource_group }}"
- name: "cluster{{ rpfx }}"
- register: output
-
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.clusters[0]['id'] != None
- - output.clusters[0]['resource_group'] != None
- - output.clusters[0]['name'] != None
- - output.clusters[0]['location'] != None
- - output.clusters[0]['cluster_version'] != None
- - output.clusters[0]['os_type'] != None
- - output.clusters[0]['tier'] != None
- - output.clusters[0]['cluster_definition'] != None
- - output.clusters[0]['compute_profile_roles'] != None
- - output.clusters[0]['connectivity_endpoints'] != None
-
-- name: Delete instance of Cluster -- check mode
- azure_rm_hdinsightcluster:
- resource_group: "{{ resource_group }}"
- name: "cluster{{ rpfx }}"
- state: absent
- check_mode: yes
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed
-
-- name: Delete instance of Cluster
- azure_rm_hdinsightcluster:
- resource_group: "{{ resource_group }}"
- name: "cluster{{ rpfx }}"
- state: absent
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed
diff --git a/test/integration/targets/azure_rm_image/aliases b/test/integration/targets/azure_rm_image/aliases
deleted file mode 100644
index 2d7dea2cef..0000000000
--- a/test/integration/targets/azure_rm_image/aliases
+++ /dev/null
@@ -1,4 +0,0 @@
-cloud/azure
-shippable/azure/group3
-destructive
-azure_rm_image_info
diff --git a/test/integration/targets/azure_rm_image/meta/main.yml b/test/integration/targets/azure_rm_image/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_image/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_image/tasks/main.yml b/test/integration/targets/azure_rm_image/tasks/main.yml
deleted file mode 100644
index 9b68a92e7a..0000000000
--- a/test/integration/targets/azure_rm_image/tasks/main.yml
+++ /dev/null
@@ -1,171 +0,0 @@
-- name: Create storage account name
- set_fact:
- vm_name: "vm{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}x"
- public_ip_name: "pip{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- security_group_name: "sg{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- empty_disk_name: "emptydisk{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
-
-- name: Create virtual network
- azure_rm_virtualnetwork:
- resource_group: "{{ resource_group }}"
- name: "{{ vm_name }}"
- address_prefixes: "10.10.0.0/16"
-
-- name: Add subnet
- azure_rm_subnet:
- resource_group: "{{ resource_group }}"
- name: "{{ vm_name }}"
- address_prefix: "10.10.0.0/24"
- virtual_network: "{{ vm_name }}"
-
-- name: Create public ip
- azure_rm_publicipaddress:
- resource_group: "{{ resource_group }}"
- allocation_method: Static
- name: "{{ public_ip_name }}"
-
-- name: Create security group
- azure_rm_securitygroup:
- resource_group: "{{ resource_group }}"
- name: "{{ security_group_name }}"
-
-- name: Create NIC
- azure_rm_networkinterface:
- resource_group: "{{ resource_group }}"
- name: "{{ vm_name }}"
- virtual_network: "{{ vm_name }}"
- subnet: "{{ vm_name }}"
- public_ip_name: "{{ public_ip_name }}"
- security_group: "{{ security_group_name }}"
-
-- name: Create virtual machine
- azure_rm_virtualmachine:
- resource_group: "{{ resource_group }}"
- name: "{{ vm_name }}"
- vm_size: Standard_A0
- managed_disk_type: Standard_LRS
- admin_username: adminuser
- admin_password: Password123!
- os_type: Linux
- network_interfaces: "{{ vm_name }}"
- image:
- offer: UbuntuServer
- publisher: Canonical
- sku: 16.04-LTS
- version: latest
- register: vm
-
-- name: Create new empty managed disk
- azure_rm_manageddisk:
- resource_group: "{{ resource_group }}"
- name: "{{ empty_disk_name }}"
- storage_account_type: "Standard_LRS"
- disk_size_gb: 1
- register: emptydisk
-
-- name: Create an image from VM (check mode)
- azure_rm_image:
- resource_group: "{{ resource_group }}"
- source: "{{ vm.ansible_facts.azure_vm.properties.storageProfile.osDisk.managedDisk.id }}"
- name: testimage001
- os_type: Linux
- data_disk_sources:
- - "{{ empty_disk_name }}"
- check_mode: yes
- register: output
-
-- assert:
- that: output.changed
-
-- name: Create an image from VM
- azure_rm_image:
- resource_group: "{{ resource_group }}"
- source:
- name: "{{ vm_name }}"
- type: disks
- name: testimage001
- os_type: Linux
- register: output
-
-- assert:
- that:
- - output.changed
- - output.id
-
-- name: Create an image from VM (idempotent)
- azure_rm_image:
- resource_group: "{{ resource_group }}"
- source: "{{ vm.ansible_facts.azure_vm.properties.storageProfile.osDisk.managedDisk.id }}"
- name: testimage001
- os_type: Linux
- register: output
-
-- assert:
- that:
- - not output.changed
- - output.id
-
-- name: Gather information about image created
- azure_rm_image_info:
- resource_group: "{{ resource_group }}"
- name: testimage001
- register: output
-
-- assert:
- that:
- - output.images != []
-
-- name: Delete image (check mode)
- azure_rm_image:
- resource_group: "{{ resource_group }}"
- name: testimage001
- state: absent
- register: output
- check_mode: yes
-
-- assert:
- that:
- - output.changed
-
-- name: Delete image
- azure_rm_image:
- resource_group: "{{ resource_group }}"
- name: testimage001
- state: absent
- register: output
-
-- assert:
- that:
- - output.changed
-
-- name: Delete image (idempotent)
- azure_rm_image:
- resource_group: "{{ resource_group }}"
- name: testimage001
- state: absent
- register: output
-
-- assert:
- that:
- - not output.changed
-
-- name: Delete empty disk
- azure_rm_manageddisk:
- resource_group: "{{ resource_group }}"
- name: "{{ empty_disk_name }}"
- state: absent
-
-- name: Delete VM
- azure_rm_virtualmachine:
- resource_group: "{{ resource_group }}"
- name: "{{ vm_name }}"
- state: absent
- vm_size: Standard_A0
- register: output
-
-- name: Delete public ip
- azure_rm_publicipaddress:
- resource_group: "{{ resource_group }}"
- allocation_method: Static
- name: "{{ public_ip_name }}"
- state: absent
diff --git a/test/integration/targets/azure_rm_iothub/aliases b/test/integration/targets/azure_rm_iothub/aliases
deleted file mode 100644
index b105765482..0000000000
--- a/test/integration/targets/azure_rm_iothub/aliases
+++ /dev/null
@@ -1,4 +0,0 @@
-cloud/azure
-shippable/azure/group2
-disabled # See: https://github.com/ansible/ansible/issues/61852
-destructive
diff --git a/test/integration/targets/azure_rm_iothub/meta/main.yml b/test/integration/targets/azure_rm_iothub/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_iothub/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_iothub/tasks/main.yml b/test/integration/targets/azure_rm_iothub/tasks/main.yml
deleted file mode 100644
index 6055ea1f85..0000000000
--- a/test/integration/targets/azure_rm_iothub/tasks/main.yml
+++ /dev/null
@@ -1,172 +0,0 @@
-- set_fact:
- rpfx: "{{ resource_group | hash('md5') | truncate(8, True, '') }}"
-
-- name: Create IoT Hub (check mode)
- azure_rm_iothub:
- name: "hub{{ rpfx }}"
- resource_group: "{{ resource_group }}"
- ip_filters:
- - name: filter1
- action: reject
- ip_mask: 40.60.80.10
- check_mode: yes
- register: iothub
-
-- assert:
- that:
- - iothub.changed
-
-- name: Query IoT Hub
- azure_rm_iothub_info:
- name: "hub{{ rpfx }}"
- resource_group: "{{ resource_group }}"
- register: iothub
- ignore_errors: yes
-
-- name: Create IoT Hub
- azure_rm_iothub:
- name: "hub{{ rpfx }}"
- resource_group: "{{ resource_group }}"
- ip_filters:
- - name: filter1
- action: reject
- ip_mask: 40.60.80.10
- register: iothub
-
-- assert:
- that:
- - iothub.changed
-
-- name: Create IoT Hub (idempontent)
- azure_rm_iothub:
- name: "hub{{ rpfx }}"
- resource_group: "{{ resource_group }}"
- ip_filters:
- - name: filter1
- action: reject
- ip_mask: 40.60.80.10
- register: iothub
-
-- assert:
- that:
- - not iothub.changed
-
-- name: Query IoT Hub
- azure_rm_iothub_info:
- name: "hub{{ rpfx }}"
- resource_group: "{{ resource_group }}"
- list_keys: yes
- register: iothub
-
-- assert:
- that:
- - iothub.iothubs | length == 1
-
-- set_fact:
- registry_write_name: "{{ item.key_name }}"
- registry_write_key: "{{ item.primary_key }}"
- with_items: "{{ iothub.iothubs[0]['keys'] }}"
- when: item.rights == 'RegistryWrite, ServiceConnect, DeviceConnect'
-
-- name: Create devices
- azure_rm_iotdevice:
- hub: "hub{{ rpfx }}"
- hub_policy_name: "{{ registry_write_name }}"
- hub_policy_key: "{{ registry_write_key }}"
- name: "mydevice{{ item }}"
- twin_tags:
- location:
- country: US
- city: Redmond
- sensor: humidity
- with_items:
- - 1
- - 2
-
-- name: Query devices
- azure_rm_iotdevice_info:
- hub: "hub{{ rpfx }}"
- hub_policy_name: "{{ registry_write_name }}"
- hub_policy_key: "{{ registry_write_key }}"
- register: devices
-
-- assert:
- that:
- - devices.iot_devices | length == 2
-
-- name: Query devices
- azure_rm_iotdevice_info:
- hub: "hub{{ rpfx }}"
- name: "mydevice1"
- hub_policy_name: "{{ registry_write_name }}"
- hub_policy_key: "{{ registry_write_key }}"
- register: devices
-
-- assert:
- that:
- - devices.iot_devices | length == 1
- - devices.iot_devices[0].deviceId == 'mydevice1'
-
-- name: Query devices twin
- azure_rm_iotdevice_info:
- hub: "hub{{ rpfx }}"
- query: "SELECT * FROM devices WHERE tags.location.country = 'US'"
- hub_policy_name: "{{ registry_write_name }}"
- hub_policy_key: "{{ registry_write_key }}"
- register: devices
-
-- assert:
- that:
- - devices.iot_devices | length == 2
-
-- name: Update devices
- azure_rm_iotdevice:
- hub: "hub{{ rpfx }}"
- hub_policy_name: "{{ registry_write_name }}"
- hub_policy_key: "{{ registry_write_key }}"
- name: "mydevice{{ item }}"
- edge_enabled: yes
- twin_tags:
- location:
- country: China
- city: Shanghai
- sensor: humidity
- with_items:
- - 1
- - 3
-
-- name: Query devices twin
- azure_rm_iotdevice_info:
- hub: "hub{{ rpfx }}"
- query: "SELECT * FROM devices WHERE tags.location.country = 'US'"
- hub_policy_name: "{{ registry_write_name }}"
- hub_policy_key: "{{ registry_write_key }}"
- register: devices
-
-- assert:
- that:
- - devices.iot_devices | length == 1
- - devices.iot_devices[0].deviceId == 'mydevice2'
-
-- name: Delete IoT Hub (check mode)
- azure_rm_iothub:
- name: "hub{{ rpfx }}"
- resource_group: "{{ resource_group }}"
- state: absent
- check_mode: yes
- register: iothub
-
-- assert:
- that:
- - iothub.changed
-
-- name: Delete IoT Hub
- azure_rm_iothub:
- name: "hub{{ rpfx }}"
- resource_group: "{{ resource_group }}"
- state: absent
- register: iothub
-
-- assert:
- that:
- - iothub.changed
diff --git a/test/integration/targets/azure_rm_keyvault/aliases b/test/integration/targets/azure_rm_keyvault/aliases
deleted file mode 100644
index c256751e55..0000000000
--- a/test/integration/targets/azure_rm_keyvault/aliases
+++ /dev/null
@@ -1,5 +0,0 @@
-cloud/azure
-destructive
-shippable/azure/group9
-azure_rm_keyvaultkey
-azure_rm_keyvaultsecret
diff --git a/test/integration/targets/azure_rm_keyvault/lookup_plugins/azure_service_principal_attribute.py b/test/integration/targets/azure_rm_keyvault/lookup_plugins/azure_service_principal_attribute.py
deleted file mode 100644
index 1b7d0318f0..0000000000
--- a/test/integration/targets/azure_rm_keyvault/lookup_plugins/azure_service_principal_attribute.py
+++ /dev/null
@@ -1,94 +0,0 @@
-# (c) 2018 Yunge Zhu, <yungez@microsoft.com>
-# (c) 2017 Ansible Project
-# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
-from __future__ import (absolute_import, division, print_function)
-__metaclass__ = type
-
-DOCUMENTATION = """
-lookup: azure_service_principal_attribute
-
-requirements:
- - azure-graphrbac
-
-author:
- - Yunge Zhu <yungez@microsoft.com>
-
-version_added: "2.7"
-
-short_description: Look up Azure service principal attributes.
-
-description:
- - Describes object id of your Azure service principal account.
-options:
- azure_client_id:
- description: azure service principal client id.
- azure_secret:
- description: azure service principal secret
- azure_tenant:
- description: azure tenant
- azure_cloud_environment:
- description: azure cloud environment
-"""
-
-EXAMPLES = """
-set_fact:
- object_id: "{{ lookup('azure_service_principal_attribute',
- azure_client_id=azure_client_id,
- azure_secret=azure_secret,
- azure_tenant=azure_secret) }}"
-"""
-
-RETURN = """
-_raw:
- description:
- Returns object id of service principal.
-"""
-
-from ansible.errors import AnsibleError
-from ansible.plugins import AnsiblePlugin
-from ansible.plugins.lookup import LookupBase
-from ansible.module_utils._text import to_native
-
-try:
- from azure.common.credentials import ServicePrincipalCredentials
- from azure.graphrbac import GraphRbacManagementClient
- from msrestazure import azure_cloud
- from msrestazure.azure_exceptions import CloudError
-except ImportError:
- raise AnsibleError(
- "The lookup azure_service_principal_attribute requires azure.graphrbac, msrest")
-
-
-class LookupModule(LookupBase):
- def run(self, terms, variables, **kwargs):
-
- self.set_options(direct=kwargs)
-
- credentials = {}
- credentials['azure_client_id'] = self.get_option('azure_client_id', None)
- credentials['azure_secret'] = self.get_option('azure_secret', None)
- credentials['azure_tenant'] = self.get_option('azure_tenant', 'common')
-
- if credentials['azure_client_id'] is None or credentials['azure_secret'] is None:
- raise AnsibleError("Must specify azure_client_id and azure_secret")
-
- _cloud_environment = azure_cloud.AZURE_PUBLIC_CLOUD
- if self.get_option('azure_cloud_environment', None) is not None:
- cloud_environment = azure_cloud.get_cloud_from_metadata_endpoint(credentials['azure_cloud_environment'])
-
- try:
- azure_credentials = ServicePrincipalCredentials(client_id=credentials['azure_client_id'],
- secret=credentials['azure_secret'],
- tenant=credentials['azure_tenant'],
- resource=_cloud_environment.endpoints.active_directory_graph_resource_id)
-
- client = GraphRbacManagementClient(azure_credentials, credentials['azure_tenant'],
- base_url=_cloud_environment.endpoints.active_directory_graph_resource_id)
-
- response = list(client.service_principals.list(filter="appId eq '{0}'".format(credentials['azure_client_id'])))
- sp = response[0]
-
- return sp.object_id.split(',')
- except CloudError as ex:
- raise AnsibleError("Failed to get service principal object id: %s" % to_native(ex))
- return False
diff --git a/test/integration/targets/azure_rm_keyvault/meta/main.yml b/test/integration/targets/azure_rm_keyvault/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_keyvault/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_keyvault/tasks/main.yml b/test/integration/targets/azure_rm_keyvault/tasks/main.yml
deleted file mode 100644
index 88b2cf08cc..0000000000
--- a/test/integration/targets/azure_rm_keyvault/tasks/main.yml
+++ /dev/null
@@ -1,270 +0,0 @@
-- name: Prepare random number
- set_fact:
- rpfx: "{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- tenant_id: "{{ azure_tenant }}"
- run_once: yes
-
-- name: lookup service principal object id
- set_fact:
- object_id: "{{ lookup('azure_service_principal_attribute',
- azure_client_id=azure_client_id,
- azure_secret=azure_secret,
- azure_tenant=tenant_id) }}"
- register: object_id
-
-- name: Create instance of Key Vault -- check mode
- azure_rm_keyvault:
- resource_group: "{{ resource_group }}"
- vault_name: "vault{{ rpfx }}"
- enabled_for_deployment: yes
- vault_tenant: "{{ tenant_id }}"
- sku:
- name: standard
- family: A
- access_policies:
- - tenant_id: "{{ tenant_id }}"
- object_id: "{{ object_id }}"
- keys:
- - get
- - list
- - update
- - create
- - import
- - delete
- - recover
- - backup
- - restore
- secrets:
- - get
- - list
- - set
- - delete
- - recover
- - backup
- - restore
- check_mode: yes
- register: output
-- name: Assert the resource instance is well created
- assert:
- that:
- - output.changed
-
-- name: Create instance of Key Vault
- azure_rm_keyvault:
- resource_group: "{{ resource_group }}"
- vault_name: "vault{{ rpfx }}"
- enabled_for_deployment: yes
- vault_tenant: "{{ tenant_id }}"
- sku:
- name: standard
- family: A
- access_policies:
- - tenant_id: "{{ tenant_id }}"
- object_id: "{{ object_id }}"
- secrets:
- - get
- - list
- - set
- - delete
- - recover
- - backup
- - restore
- register: output
-- name: Assert the resource instance is well created
- assert:
- that:
- - output.changed
-
-- name: Create instance of Key Vault again
- azure_rm_keyvault:
- resource_group: "{{ resource_group }}"
- vault_name: "vault{{ rpfx }}"
- enabled_for_deployment: yes
- vault_tenant: "{{ tenant_id }}"
- sku:
- name: standard
- family: A
- access_policies:
- - tenant_id: "{{ tenant_id }}"
- object_id: "{{ object_id }}"
- secrets:
- - get
- - list
- - set
- - delete
- - recover
- - backup
- - restore
- register: output
-- name: Assert the state has not changed
- assert:
- that:
- - output.changed == false
-
-- name: Update existing Key Vault (add a rule and tags)
- azure_rm_keyvault:
- resource_group: "{{ resource_group }}"
- vault_name: "vault{{ rpfx }}"
- enabled_for_deployment: yes
- vault_tenant: "{{ tenant_id }}"
- sku:
- name: standard
- family: A
- access_policies:
- - tenant_id: "{{ tenant_id }}"
- object_id: "{{ object_id }}"
- keys:
- - get
- - list
- - update
- - create
- - import
- - delete
- - recover
- - backup
- - restore
- secrets:
- - get
- - list
- - set
- - delete
- - recover
- - backup
- - restore
- tags:
- aaa: bbb
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed == true
-
-- name: Get key vault facts
- azure_rm_keyvault_info:
- resource_group: "{{ resource_group }}"
- name: "vault{{ rpfx }}"
- register: facts
-
-- name: Assert the facts are properly set
- assert:
- that:
- - facts['keyvaults'] | length == 1
- - facts['keyvaults'][0]['vault_uri'] != None
- - facts['keyvaults'][0]['name'] != None
- - facts['keyvaults'][0]['access_policies'] != None
- - facts['keyvaults'][0]['sku'] != None
- - facts['keyvaults'][0]['id'] != None
-#
-# azure_rm_keyvaultkey tests
-#
-
-- name: create a keyvault key
- block:
- - azure_rm_keyvaultkey:
- keyvault_uri: https://vault{{ rpfx }}.vault.azure.net
- key_name: testkey
- tags:
- testing: test
- delete: on-exit
- register: output
- - assert:
- that: output.changed
- rescue:
- - azure_rm_keyvaultkey:
- keyvault_uri: https://vault{{ rpfx }}.vault.azure.net
- state: absent
- key_name: testkey
-
-- name: Get key current version
- azure_rm_keyvaultkey_info:
- vault_uri: https://vault{{ rpfx }}.vault.azure.net
- name: testkey
- register: facts
-
-- name: Assert key facts
- assert:
- that:
- - facts['keys'] | length == 1
- - facts['keys'][0]['kid']
- - facts['keys'][0]['permitted_operations'] | length > 0
- - facts['keys'][0]['type']
- - facts['keys'][0]['version']
-
-- name: delete a kevyault key
- azure_rm_keyvaultkey:
- keyvault_uri: https://vault{{ rpfx }}.vault.azure.net
- state: absent
- key_name: testkey
- register: output
-
-- assert:
- that: output.changed
-
-#
-# azure_rm_keyvaultsecret tests
-#
-- name: create a keyvault secret
- block:
- - azure_rm_keyvaultsecret:
- keyvault_uri: https://vault{{ rpfx }}.vault.azure.net
- secret_name: testsecret
- secret_value: 'mysecret'
- tags:
- testing: test
- delete: on-exit
- register: output
- - assert:
- that: output.changed
- rescue:
- - azure_rm_keyvaultsecret:
- keyvault_uri: https://vault{{ rpfx }}.vault.azure.net
- state: absent
- secret_name: testsecret
-
-- name: delete a keyvault secret
- azure_rm_keyvaultsecret:
- keyvault_uri: https://vault{{ rpfx }}.vault.azure.net
- state: absent
- secret_name: testsecret
- register: output
-
-- assert:
- that: output.changed
-
-#
-# azure_rm_keyvault finalize & clean up
-#
-
-- name: Delete instance of Key Vault -- check mode
- azure_rm_keyvault:
- resource_group: "{{ resource_group }}"
- vault_name: "vault{{ rpfx }}"
- state: absent
- check_mode: yes
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed
-
-- name: Delete instance of Key Vault
- azure_rm_keyvault:
- resource_group: "{{ resource_group }}"
- vault_name: "vault{{ rpfx }}"
- state: absent
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed
-
-- name: Delete unexisting instance of Key Vault
- azure_rm_keyvault:
- resource_group: "{{ resource_group }}"
- vault_name: "vault{{ rpfx }}"
- state: absent
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed == false
diff --git a/test/integration/targets/azure_rm_loadbalancer/aliases b/test/integration/targets/azure_rm_loadbalancer/aliases
deleted file mode 100644
index fadef3afa8..0000000000
--- a/test/integration/targets/azure_rm_loadbalancer/aliases
+++ /dev/null
@@ -1,3 +0,0 @@
-cloud/azure
-shippable/azure/group5
-destructive
diff --git a/test/integration/targets/azure_rm_loadbalancer/meta/main.yml b/test/integration/targets/azure_rm_loadbalancer/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_loadbalancer/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_loadbalancer/tasks/main.yml b/test/integration/targets/azure_rm_loadbalancer/tasks/main.yml
deleted file mode 100644
index 3dad1a2e17..0000000000
--- a/test/integration/targets/azure_rm_loadbalancer/tasks/main.yml
+++ /dev/null
@@ -1,298 +0,0 @@
-- name: Prepare random number
- set_fact:
- pipaname: "pipa{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- pipbname: "pipb{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- lbvnname: "lbvn{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- lbname_a: "lba{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- lbname_b: "lbb{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- lbname_c1: "lbc1-{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- lbname_c2: "lbc2-{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- lbname_d: "lbd{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- run_once: yes
-
-- name: create public ip
- azure_rm_publicipaddress:
- name: "{{ pipbname }}"
- sku: Standard
- allocation_method: Static
- resource_group: '{{ resource_group }}'
-
-- name: create public ip
- azure_rm_publicipaddress:
- name: "{{ pipaname }}"
- resource_group: '{{ resource_group }}'
-
-- name: clear load balancer
- azure_rm_loadbalancer:
- resource_group: '{{ resource_group }}'
- name: "{{ lbname_a }}"
- state: absent
-
-- name: create load balancer
- azure_rm_loadbalancer:
- resource_group: '{{ resource_group }}'
- name: "{{ lbname_a }}"
- public_ip: "{{ pipaname }}"
- register: output
-
-- name: assert load balancer created
- assert:
- that: output.changed
-
-- name: delete load balancer
- azure_rm_loadbalancer:
- resource_group: '{{ resource_group }}'
- name: "{{ lbname_a }}"
- state: absent
- register: output
-
-- name: assert load balancer deleted
- assert:
- that: output.changed
-
-- name: delete load balancer (idempotent)
- azure_rm_loadbalancer:
- resource_group: '{{ resource_group }}'
- name: "{{ lbname_a }}"
- state: absent
- register: output
-
-- name: assert load balancer deleted (idempotent)
- assert:
- that: not output.changed
-
-- name: create another load balancer with more options
- azure_rm_loadbalancer:
- resource_group: '{{ resource_group }}'
- name: "{{ lbname_b }}"
- sku: Standard
- public_ip_address: "{{ pipbname }}"
- probe_protocol: Tcp
- probe_port: 80
- probe_interval: 10
- probe_fail_count: 3
- protocol: Tcp
- load_distribution: Default
- frontend_port: 80
- backend_port: 8080
- idle_timeout: 4
- natpool_frontend_port_start: 30
- natpool_frontend_port_end: 40
- natpool_backend_port: 80
- natpool_protocol: Tcp
- register: output
-
-- name: assert complex load balancer created
- assert:
- that:
- - output.changed
- - output.state.sku.name == 'Standard'
-
-- name: create load balancer again to check idempotency
- azure_rm_loadbalancer:
- resource_group: '{{ resource_group }}'
- name: "{{ lbname_b }}"
- sku: Standard
- public_ip_address: "{{ pipbname }}"
- probe_protocol: Tcp
- probe_port: 80
- probe_interval: 10
- probe_fail_count: 3
- protocol: Tcp
- load_distribution: Default
- frontend_port: 80
- backend_port: 8080
- idle_timeout: 4
- natpool_frontend_port_start: 30
- natpool_frontend_port_end: 40
- natpool_backend_port: 80
- natpool_protocol: Tcp
- register: output
-
-- name: assert that output has not changed
- assert:
- that:
- - not output.changed
-
-- name: create load balancer again to check idempotency - change something
- azure_rm_loadbalancer:
- resource_group: '{{ resource_group }}'
- name: "{{ lbname_b }}"
- sku: Standard
- public_ip_address: "{{ pipbname }}"
- probe_protocol: Tcp
- probe_port: 80
- probe_interval: 10
- probe_fail_count: 3
- protocol: Tcp
- load_distribution: Default
- frontend_port: 81
- backend_port: 8080
- idle_timeout: 4
- natpool_frontend_port_start: 30
- natpool_frontend_port_end: 40
- natpool_backend_port: 80
- natpool_protocol: Tcp
- register: output
-
-- name: assert that output has changed
- assert:
- that:
- - output.changed
-
-- name: delete load balancer
- azure_rm_loadbalancer:
- resource_group: '{{ resource_group }}'
- name: "{{ lbname_b }}"
- state: absent
-
-- name: create load balancer with multiple parameters
- azure_rm_loadbalancer:
- resource_group: '{{ resource_group }}'
- name: "{{ lbname_c1 }}"
- frontend_ip_configurations:
- - name: frontendipconf0
- public_ip_address: "{{ pipaname }}"
- backend_address_pools:
- - name: backendaddrpool0
- probes:
- - name: prob0
- port: 80
- inbound_nat_pools:
- - name: inboundnatpool0
- frontend_ip_configuration_name: frontendipconf0
- protocol: Tcp
- frontend_port_range_start: 80
- frontend_port_range_end: 81
- backend_port: 8080
- load_balancing_rules:
- - name: lbrbalancingrule0
- frontend_ip_configuration: frontendipconf0
- backend_address_pool: backendaddrpool0
- frontend_port: 80
- backend_port: 80
- probe: prob0
- register: output
-
-- name: assert complex load balancer created
- assert:
- that: output.changed
-
-- name: delete load balancer
- azure_rm_loadbalancer:
- resource_group: '{{ resource_group }}'
- name: "{{ lbname_c1 }}"
- state: absent
-
-- name: create load balancer with multiple parameters
- azure_rm_loadbalancer:
- resource_group: '{{ resource_group }}'
- name: "{{ lbname_c2 }}"
- frontend_ip_configurations:
- - name: frontendipconf0
- public_ip_address: "{{ pipaname }}"
- backend_address_pools:
- - name: backendaddrpool0
- probes:
- - name: prob0
- port: 80
- load_balancing_rules:
- - name: lbrbalancingrule0
- frontend_ip_configuration: frontendipconf0
- backend_address_pool: backendaddrpool0
- frontend_port: 80
- backend_port: 80
- probe: prob0
- inbound_nat_rules:
- - name: inboundnatrule0
- backend_port: 8080
- protocol: Tcp
- frontend_port: 8080
- frontend_ip_configuration: frontendipconf0
- register: output
-
-- name: assert complex load balancer created
- assert:
- that: output.changed
-
-- name: delete load balancer
- azure_rm_loadbalancer:
- resource_group: '{{ resource_group }}'
- name: "{{ lbname_c2 }}"
- state: absent
-
-- name: Create virtual network
- azure_rm_virtualnetwork:
- resource_group: "{{ resource_group }}"
- name: "{{ lbvnname }}"
- address_prefixes: "10.10.0.0/16"
-
-- name: Add subnet
- azure_rm_subnet:
- resource_group: "{{ resource_group }}"
- name: "lb{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}sb"
- address_prefix: "10.10.0.0/24"
- virtual_network: "{{ lbvnname }}"
- register: subnet
-
-- name: create internal loadbalancer
- azure_rm_loadbalancer:
- resource_group: '{{ resource_group }}'
- name: "{{ lbname_d }}"
- frontend_ip_configurations:
- - name: frontendipconf0
- private_ip_address: 10.10.0.10
- private_ip_allocation_method: Static
- subnet: "{{ subnet.state.id }}"
- backend_address_pools:
- - name: backendaddrpool0
- probes:
- - name: prob0
- port: 80
- inbound_nat_pools:
- - name: inboundnatpool0
- frontend_ip_configuration_name: frontendipconf0
- protocol: Tcp
- frontend_port_range_start: 80
- frontend_port_range_end: 81
- backend_port: 8080
- load_balancing_rules:
- - name: lbrbalancingrule0
- frontend_ip_configuration: frontendipconf0
- backend_address_pool: backendaddrpool0
- frontend_port: 80
- backend_port: 80
- probe: prob0
- register: output
-
-- name: assert complex load balancer created
- assert:
- that: output.changed
-
-- name: delete load balancer
- azure_rm_loadbalancer:
- resource_group: '{{ resource_group }}'
- name: "{{ lbname_d }}"
- state: absent
-
-- name: cleanup public ip
- azure_rm_publicipaddress:
- name: "{{ item }}"
- resource_group: '{{ resource_group }}'
- state: absent
- with_items:
- - "{{ pipaname }}"
- - "{{ pipbname }}"
-
-- name: cleanup subnet
- azure_rm_subnet:
- resource_group: "{{ resource_group }}"
- name: "lb{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}sb"
- virtual_network: "{{ lbvnname }}"
- state: absent
-
-- name: cleanup virtual network
- azure_rm_virtualnetwork:
- resource_group: "{{ resource_group }}"
- name: "{{ lbvnname }}"
- state: absent
diff --git a/test/integration/targets/azure_rm_lock/aliases b/test/integration/targets/azure_rm_lock/aliases
deleted file mode 100644
index 68bf9ddab0..0000000000
--- a/test/integration/targets/azure_rm_lock/aliases
+++ /dev/null
@@ -1,4 +0,0 @@
-cloud/azure
-destructive
-unsupported
-azure_rm_lock_info
diff --git a/test/integration/targets/azure_rm_lock/meta/main.yml b/test/integration/targets/azure_rm_lock/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_lock/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_lock/tasks/main.yml b/test/integration/targets/azure_rm_lock/tasks/main.yml
deleted file mode 100644
index 371e24c2f8..0000000000
--- a/test/integration/targets/azure_rm_lock/tasks/main.yml
+++ /dev/null
@@ -1,99 +0,0 @@
-- name: Create a virtual network
- azure_rm_virtualnetwork:
- name: mytestvirtualnetworklock
- resource_group: "{{ resource_group }}"
- address_prefixes_cidr:
- - "10.1.0.0/16"
- register: vn
-
-- name: Add lock to resource (check_mode)
- azure_rm_lock:
- name: keep
- managed_resource_id: "{{ vn.state.id }}"
- level: read_only
- register: lock
- check_mode: yes
-
-- assert:
- that:
- - lock.changed
-
-- name: Query lock
- azure_rm_lock_info:
- managed_resource_id: "{{ vn.state.id }}"
- register: locks
-
-- assert:
- that:
- - locks.locks | length == 0
-
-- name: Add lock to resource
- azure_rm_lock:
- name: keep
- managed_resource_id: "{{ vn.state.id }}"
- level: read_only
- register: lock
-
-- assert:
- that:
- - lock.changed
- - lock.id
-
-- name: Query lock
- azure_rm_lock_info:
- name: keep
- managed_resource_id: "{{ vn.state.id }}"
- register: locks
-
-- assert:
- that:
- - locks.locks | length == 1
-
-- name: Update lock to resource (idempontent)
- azure_rm_lock:
- name: keep
- managed_resource_id: "{{ vn.state.id }}"
- level: read_only
- register: lock1
-
-- assert:
- that:
- - not lock1.changed
- - lock1.id == lock.id
-
-- name: Update lock level
- azure_rm_lock:
- name: keep
- managed_resource_id: "{{ vn.state.id }}"
- level: can_not_delete
- register: lock
-
-- assert:
- that:
- - lock.changed
- - lock.level == 'can_not_delete'
-
-- name: Delete lock
- azure_rm_lock:
- name: keep
- managed_resource_id: "{{ vn.state.id }}"
- register: lock
-
-- assert:
- that:
- - lock.changed
-
-- name: Query lock
- azure_rm_lock_info:
- managed_resource_id: "{{ vn.state.id }}"
- register: locks
-
-- assert:
- that:
- - locks.locks | length == 0
-
-- name: Clean up
- azure_rm_virtualnetwork:
- name: mytestvirtualnetworklock
- resource_group: "{{ resource_group }}"
- state: absent \ No newline at end of file
diff --git a/test/integration/targets/azure_rm_loganalyticsworkspace/aliases b/test/integration/targets/azure_rm_loganalyticsworkspace/aliases
deleted file mode 100644
index 74e589c56e..0000000000
--- a/test/integration/targets/azure_rm_loganalyticsworkspace/aliases
+++ /dev/null
@@ -1,4 +0,0 @@
-cloud/azure
-shippable/azure/group4
-destructive
-azure_rm_loganalyticsworkspace_info
diff --git a/test/integration/targets/azure_rm_loganalyticsworkspace/meta/main.yml b/test/integration/targets/azure_rm_loganalyticsworkspace/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_loganalyticsworkspace/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_loganalyticsworkspace/tasks/main.yml b/test/integration/targets/azure_rm_loganalyticsworkspace/tasks/main.yml
deleted file mode 100644
index 7f9a05f79d..0000000000
--- a/test/integration/targets/azure_rm_loganalyticsworkspace/tasks/main.yml
+++ /dev/null
@@ -1,128 +0,0 @@
-- name: Prepare random number
- set_fact:
- name: "workspace{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
-
-- name: Create workspace (check mode)
- azure_rm_loganalyticsworkspace:
- name: "{{ name }}"
- resource_group: "{{ resource_group }}"
- retention_in_days: 40
- check_mode: yes
- register: output
-
-- assert:
- that:
- - output.changed
-
-- name: Get workspace
- azure_rm_loganalyticsworkspace_info:
- name: "{{ name }}"
- resource_group: "{{ resource_group }}"
- register: facts
-
-- assert:
- that:
- - facts.workspaces | length == 0
-
-- name: Create workspace
- azure_rm_loganalyticsworkspace:
- name: "{{ name }}"
- resource_group: "{{ resource_group }}"
- retention_in_days: 40
- register: output
-
-- assert:
- that:
- - output.retention_in_days == 40
- - output.changed
- - output.intelligence_packs
-
-- name: Create workspace (idempontent)
- azure_rm_loganalyticsworkspace:
- name: "{{ name }}"
- resource_group: "{{ resource_group }}"
- retention_in_days: 40
- register: output
-
-- assert:
- that:
- - not output.changed
-
-- name: Get workspace
- azure_rm_loganalyticsworkspace_info:
- name: "{{ name }}"
- resource_group: "{{ resource_group }}"
- register: facts
-
-- assert:
- that:
- - facts.workspaces | length == 1
- - facts.workspaces[0].id == output.id
-
-- set_fact:
- pack: "{{ pack | default({}) | combine({output.intelligence_packs[0].name: not output.intelligence_packs[0].enabled}) }}"
-
-- name: Update intelligence pack
- azure_rm_loganalyticsworkspace:
- name: "{{ name }}"
- resource_group: "{{ resource_group }}"
- intelligence_packs: "{{ pack }}"
- register: intelligence
-
-- assert:
- that:
- - intelligence.intelligence_packs[0].enabled != output.intelligence_packs[0].enabled
-
-- name: Remove workspace (check mode)
- azure_rm_loganalyticsworkspace:
- name: "{{ name }}"
- resource_group: "{{ resource_group }}"
- state: absent
- check_mode: yes
- register: output
-
-- assert:
- that:
- - output.changed
-
-- name: Get workspace
- azure_rm_loganalyticsworkspace_info:
- name: "{{ name }}"
- resource_group: "{{ resource_group }}"
- register: facts
-
-- assert:
- that:
- - facts.workspaces | length == 1
-
-- name: Remove workspace
- azure_rm_loganalyticsworkspace:
- name: "{{ name }}"
- resource_group: "{{ resource_group }}"
- state: absent
- register: output
-
-- assert:
- that:
- - output.changed
-
-- name: Get workspace
- azure_rm_loganalyticsworkspace_info:
- name: "{{ name }}"
- resource_group: "{{ resource_group }}"
- register: facts
-
-- assert:
- that:
- - facts.workspaces | length == 0
-
-- name: Remove workspace (idempontent)
- azure_rm_loganalyticsworkspace:
- name: "{{ name }}"
- resource_group: "{{ resource_group }}"
- state: absent
- register: output
-
-- assert:
- that:
- - not output.changed
diff --git a/test/integration/targets/azure_rm_manageddisk/aliases b/test/integration/targets/azure_rm_manageddisk/aliases
deleted file mode 100644
index bf20c612b5..0000000000
--- a/test/integration/targets/azure_rm_manageddisk/aliases
+++ /dev/null
@@ -1,4 +0,0 @@
-cloud/azure
-shippable/azure/group4
-destructive
-azure_rm_manageddisk_info
diff --git a/test/integration/targets/azure_rm_manageddisk/meta/main.yml b/test/integration/targets/azure_rm_manageddisk/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_manageddisk/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_manageddisk/tasks/main.yml b/test/integration/targets/azure_rm_manageddisk/tasks/main.yml
deleted file mode 100644
index 3abaaefb63..0000000000
--- a/test/integration/targets/azure_rm_manageddisk/tasks/main.yml
+++ /dev/null
@@ -1,204 +0,0 @@
- - name: Prepare random number
- set_fact:
- rpfx: "{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- parameter: {}
- run_once: yes
-
- - name: Clearing (if) previous disks were created
- azure_rm_manageddisk:
- resource_group: "{{ resource_group }}"
- name: "md{{ rpfx }}{{ item }}"
- managed_by: ''
- state: absent
- with_items:
- - 1
- - 2
- - 3
-
- - name: Test invalid account name (should give error)
- azure_rm_manageddisk:
- resource_group: "{{ resource_group }}"
- name: "invalid_char$"
- disk_size_gb: 1
- register: output
- ignore_errors: yes
- check_mode: no
-
- - name: Assert task failed
- assert: { that: "output['failed'] == True" }
-
- - name: Create managed disk (Check Mode)
- azure_rm_manageddisk:
- resource_group: "{{ resource_group }}"
- name: "md{{ rpfx }}1"
- storage_account_type: "Standard_LRS"
- disk_size_gb: 1
- tags:
- testing: testing
- delete: never
- register: output
- check_mode: yes
-
- - name: Assert status succeeded (Check Mode)
- assert:
- that:
- - output.changed
- - output.state
-
- - name: Create new managed disk succesfully
- azure_rm_manageddisk:
- resource_group: "{{ resource_group }}"
- name: "md{{ rpfx }}1"
- storage_account_type: "Standard_LRS"
- disk_size_gb: 1
- tags:
- testing: testing
- delete: never
- register: output
-
- - name: Assert status succeeded and results include an Id value
- assert:
- that:
- - output.changed
- - output.state.disk_size_gb == 1
- - output.state.id is defined
- - output.state.os_type == None
- - output.state.storage_account_type == "Standard_LRS"
-
- - name: Copy disk to a new managed disk
- azure_rm_manageddisk:
- resource_group: "{{ resource_group }}"
- name: "md{{ rpfx }}2"
- create_option: "copy"
- source_uri: "{{ output.state.id }}"
- disk_size_gb: 1
- register: disk2
-
- - name: Assert status succeeded and results include an Id value
- assert:
- that:
- - disk2.changed
- - disk2.state.id is defined
-
- - name: Create disk to a new managed disk with zone and os type
- azure_rm_manageddisk:
- resource_group: "{{ resource_group }}"
- name: "md{{ rpfx }}3"
- source_uri: "{{ output.state.id }}"
- disk_size_gb: 1
- zone: "1"
- os_type: windows
- register: disk3
-
- - name: Assert status succeeded and results include an Id value
- assert:
- that:
- - disk3.changed
- - disk3.state.id is defined
- - disk3.state.zone == "1"
- - disk3.state.os_type == "windows"
-
- - name: Change storage account type to an invalid type
- azure_rm_manageddisk:
- resource_group: "{{ resource_group }}"
- name: "md{{ rpfx }}1"
- storage_account_type: "PremiumL"
- disk_size_gb: 1
- register: output
- ignore_errors: yes
-
- - name: Assert storage account type change failed
- assert: { that: "output['failed'] == True" }
-
- - name: Update disk options (os_type, account_type, size, tags)
- azure_rm_manageddisk:
- resource_group: "{{ resource_group }}"
- name: "md{{ rpfx }}1"
- disk_size_gb: 2
- os_type: linux
- storage_account_type: "StandardSSD_LRS"
- tags:
- galaxy: "no"
- delete: never
- register: output
-
- - assert:
- that:
- - output.changed
- - output.state.storage_account_type == "StandardSSD_LRS"
- - output.state.disk_size_gb == 2
- - "output.state.tags | length == 2"
- - "output.state.tags.galaxy == 'no'"
- - output.state.os_type == 'linux'
-
- - name: Gather facts to one specific disk
- azure_rm_manageddisk_info:
- resource_group: "{{ resource_group }}"
- name: "md{{ rpfx }}1"
- register: output
-
- - assert:
- that:
- - "output.ansible_info.azure_managed_disk | length == 1"
- - output.ansible_info.azure_managed_disk[0].storage_account_type == "StandardSSD_LRS"
- - output.ansible_info.azure_managed_disk[0].disk_size_gb == 2
- - "output.ansible_info.azure_managed_disk[0].os_type == 'linux'"
-
- - set_fact:
- parameter: "{{parameter |combine({item.key: item.value})}}"
- when: "{{item.key not in ['id', 'changed'] and item.value != None}}"
- with_dict: "{{ output.ansible_info.azure_managed_disk[0] }}"
-
- - name: Create disk with facts return value
- azure_rm_manageddisk:
- resource_group: "{{ resource_group }}"
- location: "{{ parameter.location }}"
- name: "{{ parameter.name }}"
- storage_account_type: "{{ parameter.storage_account_type }}"
- disk_size_gb: "{{ parameter.disk_size_gb }}"
- create_option: "{{ parameter.create_option }}"
- tags: "{{ parameter.tags }}"
- register: output
-
- - assert:
- that:
- - not output.changed
-
- - name: Delete managed disk (Check Mode)
- azure_rm_manageddisk:
- resource_group: "{{ resource_group }}"
- name: "md{{ rpfx }}1"
- state: absent
- register: output
- check_mode: yes
-
- - name: Assert status succeeded
- assert:
- that:
- - output.changed
- - output.state
-
- - name: Delete all managed disk
- azure_rm_manageddisk:
- resource_group: "{{ resource_group }}"
- name: "md{{ rpfx }}{{ item }}"
- managed_by: ''
- state: absent
- with_items:
- - 1
- - 2
- - 3
-
- - name: Delete virtual machine
- azure_rm_virtualmachine:
- resource_group: "{{ resource_group }}"
- name: "tr{{ rpfx }}"
- state: absent
- vm_size: Standard_DS1_v2
-
- - name: Delete public ip
- azure_rm_publicipaddress:
- resource_group: "{{ resource_group }}"
- allocation_method: Static
- name: "tr{{ rpfx }}"
- state: absent
diff --git a/test/integration/targets/azure_rm_mariadbserver/aliases b/test/integration/targets/azure_rm_mariadbserver/aliases
deleted file mode 100644
index b586dc7c3e..0000000000
--- a/test/integration/targets/azure_rm_mariadbserver/aliases
+++ /dev/null
@@ -1,8 +0,0 @@
-cloud/azure
-destructive
-shippable/azure/group9
-azure_rm_mariadbserver_facts
-azure_rm_mariadbdatabase
-azure_rm_mariadbdatabase_facts
-azure_rm_mariadbfirewallrule
-azure_rm_mariadbfirewallrule_facts
diff --git a/test/integration/targets/azure_rm_mariadbserver/meta/main.yml b/test/integration/targets/azure_rm_mariadbserver/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_mariadbserver/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_mariadbserver/tasks/main.yml b/test/integration/targets/azure_rm_mariadbserver/tasks/main.yml
deleted file mode 100644
index 5b33ffb951..0000000000
--- a/test/integration/targets/azure_rm_mariadbserver/tasks/main.yml
+++ /dev/null
@@ -1,640 +0,0 @@
-- name: Prepare random number
- set_fact:
- rpfx: "{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- run_once: yes
-
-- name: Create instance of MariaDB Server -- check mode
- azure_rm_mariadbserver:
- resource_group: "{{ resource_group }}"
- name: mariadbsrv{{ rpfx }}
- sku:
- name: B_Gen5_1
- tier: Basic
- location: westus2
- storage_mb: 51200
- version: 10.2
- enforce_ssl: True
- admin_username: zimxyz
- admin_password: Testpasswordxyz12!
- check_mode: yes
- register: output
-- name: Assert the resource instance is well created
- assert:
- that:
- - output.changed
-
-- name: Create instance of MariaDB Server
- azure_rm_mariadbserver:
- resource_group: "{{ resource_group }}"
- name: mariadbsrv{{ rpfx }}
- sku:
- name: B_Gen5_1
- tier: Basic
- location: westus2
- storage_mb: 51200
- version: 10.2
- enforce_ssl: True
- admin_username: zimxyz
- admin_password: Testpasswordxyz12!
- register: output
-- name: Assert the resource instance is well created
- assert:
- that:
- - output.changed
- - output.state == 'Ready'
-
-- name: Create again instance of MariaDB Server
- azure_rm_mariadbserver:
- resource_group: "{{ resource_group }}"
- name: mariadbsrv{{ rpfx }}
- sku:
- name: B_Gen5_1
- tier: Basic
- location: westus2
- storage_mb: 51200
- version: 10.2
- enforce_ssl: True
- admin_username: zimxyz
- admin_password: Testpasswordxyz12!
- register: output
-- name: Assert the state has not changed
- assert:
- that:
- - output.changed == false
- - output.state == 'Ready'
-
-- name: Update instance of MariaDB Server, change storage size
- azure_rm_mariadbserver:
- resource_group: "{{ resource_group }}"
- name: mariadbsrv{{ rpfx }}
- sku:
- name: B_Gen5_1
- tier: Basic
- location: westus2
- storage_mb: 128000
- version: 10.2
- enforce_ssl: True
- admin_username: zimxyz
- admin_password: Testpasswordxyz12!
- register: output
-- name: Assert the state has not changed
- assert:
- that:
- - output.changed
- - output.state == 'Ready'
-- debug:
- var: output
-
-- name: Gather facts MariaDB Server
- azure_rm_mariadbserver_facts:
- resource_group: "{{ resource_group }}"
- name: mariadbsrv{{ rpfx }}
- register: output
-- name: Assert that storage size is correct
- assert:
- that:
- - output.servers[0]['storage_mb'] == 128000
-
-- name: Create second instance of MariaDB Server
- azure_rm_mariadbserver:
- resource_group: "{{ resource_group }}"
- name: mariadbsrv{{ rpfx }}second
- sku:
- name: B_Gen5_1
- tier: Basic
- location: westus2
- storage_mb: 51200
- version: 10.2
- enforce_ssl: True
- admin_username: zimxyz
- admin_password: Testpasswordxyz12!
- tags:
- aaa: bbb
-
-- name: Create second instance of MariaDB Server
- azure_rm_mariadbserver:
- resource_group: "{{ resource_group }}"
- name: mariadbsrv{{ rpfx }}second
- sku:
- name: B_Gen5_1
- tier: Basic
- location: westus2
- storage_mb: 51200
- version: 10.2
- enforce_ssl: True
- admin_username: zimxyz
- admin_password: Testpasswordxyz12!
- tags:
- ccc: ddd
-
-- name: Gather facts MariaDB Server
- azure_rm_mariadbserver_facts:
- resource_group: "{{ resource_group }}"
- name: mariadbsrv{{ rpfx }}second
- register: output
-
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.servers[0]['id'] != None
- - output.servers[0]['name'] != None
- - output.servers[0]['location'] != None
- - output.servers[0]['sku']['name'] != None
- - output.servers[0]['sku']['tier'] != None
- - output.servers[0]['sku']['capacity'] != None
- - output.servers[0]['version'] != None
- - output.servers[0]['user_visible_state'] != None
- - output.servers[0]['fully_qualified_domain_name'] != None
- - output.servers[0]['tags']['aaa'] == 'bbb'
- - output.servers[0]['tags']['ccc'] == 'ddd'
-
-- name: Gather facts MariaDB Server
- azure_rm_mariadbserver_facts:
- resource_group: "{{ resource_group }}"
- register: output
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.servers[0]['id'] != None
- - output.servers[0]['name'] != None
- - output.servers[0]['location'] != None
- - output.servers[0]['sku']['name'] != None
- - output.servers[0]['sku']['tier'] != None
- - output.servers[0]['sku']['capacity'] != None
- - output.servers[0]['version'] != None
- - output.servers[0]['user_visible_state'] != None
- - output.servers[0]['fully_qualified_domain_name'] != None
- - output.servers[1]['id'] != None
- - output.servers[1]['name'] != None
- - output.servers[1]['location'] != None
- - output.servers[1]['sku']['name'] != None
- - output.servers[1]['sku']['tier'] != None
- - output.servers[1]['sku']['capacity'] != None
- - output.servers[1]['version'] != None
- - output.servers[1]['user_visible_state'] != None
- - output.servers[1]['fully_qualified_domain_name'] != None
-
-#
-# azure_rm_mariadbdatabase tests below
-#
-- name: Create instance of MariaDB Database -- check mode
- azure_rm_mariadbdatabase:
- resource_group: "{{ resource_group }}"
- server_name: mariadbsrv{{ rpfx }}
- name: testdatabase
- check_mode: yes
- register: output
-- name: Assert the resource instance is well created
- assert:
- that:
- - output.changed
-
-- name: Create instance of MariaDB Database
- azure_rm_mariadbdatabase:
- resource_group: "{{ resource_group }}"
- server_name: mariadbsrv{{ rpfx }}
- name: testdatabase
- collation: latin1_swedish_ci
- charset: latin1
- register: output
-- name: Assert the resource instance is well created
- assert:
- that:
- - output.changed
- - output.name == 'testdatabase'
-
-- name: Create again instance of MariaDB Database
- azure_rm_mariadbdatabase:
- resource_group: "{{ resource_group }}"
- server_name: mariadbsrv{{ rpfx }}
- name: testdatabase
- collation: latin1_swedish_ci
- charset: latin1
- register: output
-- name: Assert the state has not changed
- assert:
- that:
- - output.changed == false
- - output.name == 'testdatabase'
-
-- name: Try to update database without force_update
- azure_rm_mariadbdatabase:
- resource_group: "{{ resource_group }}"
- server_name: mariadbsrv{{ rpfx }}
- name: testdatabase
- collation: latin1_czech_ci
- charset: latin1
- ignore_errors: yes
- register: output
-- name: Assert that nothing has changed
- assert:
- that:
- - output.changed == False
-
-- name: Update instance of database using force_update
- azure_rm_mariadbdatabase:
- resource_group: "{{ resource_group }}"
- server_name: mariadbsrv{{ rpfx }}
- name: testdatabase
- collation: latin1_czech_ci
- charset: latin1
- force_update: yes
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed
- - output.name == 'testdatabase'
-
-- name: Create second instance of MariaDB Database
- azure_rm_mariadbdatabase:
- resource_group: "{{ resource_group }}"
- server_name: mariadbsrv{{ rpfx }}
- name: testdatabase2
-
-- name: Gather facts MariaDB Database
- azure_rm_mariadbdatabase_facts:
- resource_group: "{{ resource_group }}"
- server_name: mariadbsrv{{ rpfx }}
- name: testdatabase
- register: output
-
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.databases[0]['server_name'] != None
- - output.databases[0]['name'] != None
- - output.databases[0]['charset'] != None
- - output.databases[0]['collation'] != None
-
-- name: Gather facts MariaDB Database
- azure_rm_mariadbdatabase_facts:
- resource_group: "{{ resource_group }}"
- server_name: mariadbsrv{{ rpfx }}
- register: output
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.databases[0]['server_name'] != None
- - output.databases[0]['name'] != None
- - output.databases[0]['charset'] != None
- - output.databases[0]['collation'] != None
- - output.databases[1]['server_name'] != None
- - output.databases[1]['name'] != None
- - output.databases[1]['charset'] != None
- - output.databases[1]['collation'] != None
-
-- name: Delete instance of MariaDB Database -- check mode
- azure_rm_mariadbdatabase:
- resource_group: "{{ resource_group }}"
- server_name: mariadbsrv{{ rpfx }}
- name: testdatabase
- state: absent
- check_mode: yes
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed
-
-- name: Delete instance of MariaDB Database
- azure_rm_mariadbdatabase:
- resource_group: "{{ resource_group }}"
- server_name: mariadbsrv{{ rpfx }}
- name: testdatabase
- state: absent
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed
-
-- name: Delete unexisting instance of MariaDB Database
- azure_rm_mariadbdatabase:
- resource_group: "{{ resource_group }}"
- server_name: mariadbsrv{{ rpfx }}
- name: testdatabase
- state: absent
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed == false
-
-#
-# azure_rm_firewallrule tests below
-#
-- name: Create instance of Firewall Rule -- check mode
- azure_rm_mariadbfirewallrule:
- resource_group: "{{ resource_group }}"
- server_name: mariadbsrv{{ rpfx }}
- name: firewallrule{{ rpfx }}
- start_ip_address: 172.28.10.136
- end_ip_address: 172.28.10.138
- check_mode: yes
- register: output
-- name: Assert the resource instance is well created
- assert:
- that:
- - output.changed
-
-- name: Create instance of Firewall Rule
- azure_rm_mariadbfirewallrule:
- resource_group: "{{ resource_group }}"
- server_name: mariadbsrv{{ rpfx }}
- name: firewallrule{{ rpfx }}
- start_ip_address: 172.28.10.136
- end_ip_address: 172.28.10.138
- register: output
-- name: Assert the resource instance is well created
- assert:
- that:
- - output.changed
-
-- name: Create again instance of Firewall Rule
- azure_rm_mariadbfirewallrule:
- resource_group: "{{ resource_group }}"
- server_name: mariadbsrv{{ rpfx }}
- name: firewallrule{{ rpfx }}
- start_ip_address: 172.28.10.136
- end_ip_address: 172.28.10.138
- register: output
-- name: Assert the state has not changed
- assert:
- that:
- - output.changed == false
-
-- name: Delete instance of Firewall Rule -- check mode
- azure_rm_mariadbfirewallrule:
- resource_group: "{{ resource_group }}"
- server_name: mariadbsrv{{ rpfx }}
- name: firewallrule{{ rpfx }}
- state: absent
- check_mode: yes
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed
-
-- name: Create instance of Firewall Rule -- second
- azure_rm_mariadbfirewallrule:
- resource_group: "{{ resource_group }}"
- server_name: mariadbsrv{{ rpfx }}
- name: firewallrule{{ rpfx }}second
- start_ip_address: 172.28.10.136
- end_ip_address: 172.28.10.138
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed
-
-- name: Gather facts MariaDB Firewall Rule
- azure_rm_mariadbfirewallrule_facts:
- resource_group: "{{ resource_group }}"
- server_name: mariadbsrv{{ rpfx }}
- name: firewallrule{{ rpfx }}
- register: output
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.rules[0].id != None
- - output.rules[0].server_name != None
- - output.rules[0].name != None
- - output.rules[0].start_ip_address != None
- - output.rules[0].end_ip_address != None
- - "output.rules | length == 1"
-
-- name: Gather facts MariaDB Firewall Rule
- azure_rm_mariadbfirewallrule_facts:
- resource_group: "{{ resource_group }}"
- server_name: mariadbsrv{{ rpfx }}
- register: output
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.rules[0].id != None
- - output.rules[0].server_name != None
- - output.rules[0].name != None
- - output.rules[0].start_ip_address != None
- - output.rules[0].end_ip_address != None
- - output.rules[1].id != None
- - output.rules[1].name != None
- - output.rules[1].start_ip_address != None
- - output.rules[1].end_ip_address != None
- - "output.rules | length == 2"
-
-- name: Delete instance of Firewall Rule
- azure_rm_mariadbfirewallrule:
- resource_group: "{{ resource_group }}"
- server_name: mariadbsrv{{ rpfx }}
- name: firewallrule{{ rpfx }}
- state: absent
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed
-
-- name: Delete unexisting instance of Firewall Rule
- azure_rm_mariadbfirewallrule:
- resource_group: "{{ resource_group }}"
- server_name: mariadbsrv{{ rpfx }}
- name: firewallrule{{ rpfx }}
- state: absent
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed == false
-
-- name: Delete instance of Firewall Rule - second
- azure_rm_mariadbfirewallrule:
- resource_group: "{{ resource_group }}"
- server_name: mariadbsrv{{ rpfx }}
- name: firewallrule{{ rpfx }}second
- state: absent
-
-- name: Gather facts MariaDB Firewall Rule
- azure_rm_mariadbfirewallrule_facts:
- resource_group: "{{ resource_group }}"
- server_name: mariadbsrv{{ rpfx }}
- name: firewallrule{{ rpfx }}
- register: output
-- name: Assert that empty list was returned
- assert:
- that:
- - output.changed == False
- - "output.rules | length == 0"
-
-#
-# configuration
-#
-- name: Create instance of Configuration -- check mode
- azure_rm_mariadbconfiguration:
- resource_group: "{{ resource_group }}"
- server_name: mariadbsrv{{ rpfx }}
- name: event_scheduler
- value: "ON"
- check_mode: yes
- register: output
-- name: Assert that change was registered
- assert:
- that:
- - output.changed
-
-- name: Try to delete default configuraion
- azure_rm_mariadbconfiguration_facts:
- resource_group: "{{ resource_group }}"
- server_name: mariadbsrv{{ rpfx }}
- name: event_scheduler
- register: output
-- name: Get facts of event_scheduler
- debug:
- var: output
-
-- name: Try to delete default configuraion
- azure_rm_mariadbconfiguration:
- resource_group: "{{ resource_group }}"
- server_name: mariadbsrv{{ rpfx }}
- name: event_scheduler
- state: absent
- register: output
-- name: Assert that change was registered
- assert:
- that:
- - not output.changed
-
-- name: Try to change default configuraion
- azure_rm_mariadbconfiguration:
- resource_group: "{{ resource_group }}"
- server_name: mariadbsrv{{ rpfx }}
- name: event_scheduler
- value: "ON"
- register: output
-- name: Assert that change was registered
- assert:
- that:
- - output.changed
-
-- name: Try to change default configuration -- idempotent
- azure_rm_mariadbconfiguration:
- resource_group: "{{ resource_group }}"
- server_name: mariadbsrv{{ rpfx }}
- name: event_scheduler
- value: "ON"
- register: output
-- name: Assert that change was registered
- assert:
- that:
- - not output.changed
-
-- name: Try to reset configuration
- azure_rm_mariadbconfiguration:
- resource_group: "{{ resource_group }}"
- server_name: mariadbsrv{{ rpfx }}
- name: event_scheduler
- state: absent
- register: output
-- name: Assert that change was registered
- assert:
- that:
- - output.changed
-
-- name: Try to reset configuration -- idempotent
- azure_rm_mariadbconfiguration:
- resource_group: "{{ resource_group }}"
- server_name: mariadbsrv{{ rpfx }}
- name: event_scheduler
- state: absent
- register: output
-- name: Assert that change was registered
- assert:
- that:
- - not output.changed
-
-- name: Gather facts MariaDB Configuration
- azure_rm_mariadbconfiguration_facts:
- resource_group: "{{ resource_group }}"
- server_name: mariadbsrv{{ rpfx }}
- name: event_scheduler
- register: output
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.settings[0].id != None
- - output.settings[0].name != None
- - output.settings[0].value != None
- - output.settings[0].description != None
- - output.settings[0].source != None
- - output.settings | length == 1
-
-- name: Gather facts MariaDB Configuration
- azure_rm_mariadbconfiguration_facts:
- resource_group: "{{ resource_group }}"
- server_name: mariadbsrv{{ rpfx }}
- register: output
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.settings[0].id != None
- - output.settings[0].name != None
- - output.settings[0].value != None
- - output.settings[0].description != None
- - output.settings[0].source != None
- - output.settings | length > 1
-
-#
-# clean up azure_rm_mariadbserver test
-#
-
-- name: Delete instance of MariaDB Server -- check mode
- azure_rm_mariadbserver:
- resource_group: "{{ resource_group }}"
- name: mariadbsrv{{ rpfx }}
- state: absent
- check_mode: yes
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed
-
-- name: Delete instance of MariaDB Server
- azure_rm_mariadbserver:
- resource_group: "{{ resource_group }}"
- name: mariadbsrv{{ rpfx }}
- state: absent
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed
-
-- name: Delete unexisting instance of MariaDB Server
- azure_rm_mariadbserver:
- resource_group: "{{ resource_group }}"
- name: mariadbsrv{{ rpfx }}
- state: absent
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed == false
-
-- name: Delete second instance of MariaDB Server
- azure_rm_mariadbserver:
- resource_group: "{{ resource_group }}"
- name: mariadbsrv{{ rpfx }}second
- state: absent
- async: 400
- poll: 0
diff --git a/test/integration/targets/azure_rm_monitorlogprofile/aliases b/test/integration/targets/azure_rm_monitorlogprofile/aliases
deleted file mode 100644
index 35b9401151..0000000000
--- a/test/integration/targets/azure_rm_monitorlogprofile/aliases
+++ /dev/null
@@ -1,3 +0,0 @@
-cloud/azure
-destructive
-unsupported \ No newline at end of file
diff --git a/test/integration/targets/azure_rm_monitorlogprofile/meta/main.yml b/test/integration/targets/azure_rm_monitorlogprofile/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_monitorlogprofile/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_monitorlogprofile/tasks/main.yml b/test/integration/targets/azure_rm_monitorlogprofile/tasks/main.yml
deleted file mode 100644
index 9019f59b28..0000000000
--- a/test/integration/targets/azure_rm_monitorlogprofile/tasks/main.yml
+++ /dev/null
@@ -1,104 +0,0 @@
-- name: Prepare random number
- set_fact:
- profile_name: "profile{{ resource_group | hash('md5') | truncate(5, True, '') }}{{ 1000 | random }}"
- location: eastus
- run_once: yes
-
-- name: create Azure storage account
- azure_rm_storageaccount:
- name: '{{ profile_name }}'
- resource_group: "{{ resource_group }}"
- account_type: Standard_LRS
-
-- name: create log profile (idempotence)
- azure_rm_monitorlogprofile:
- name: "{{ profile_name }}"
- location: "{{ location }}"
- locations:
- - eastus
- - westus
- categories:
- - Write
- - Action
- retention_policy:
- enabled: False
- days: 1
- storage_account:
- resource_group: "{{ resource_group }}"
- name: "{{ profile_name }}"
- check_mode: yes
- register: output
-
-- name: assert create idempotence
- assert:
- that:
- - output.changed
-
-- name: create log profile
- azure_rm_monitorlogprofile:
- name: "{{ profile_name }}"
- location: "{{ location }}"
- locations:
- - eastus
- - westus
- categories:
- - Write
- - Action
- retention_policy:
- enabled: False
- days: 1
- storage_account:
- resource_group: "{{ resource_group }}"
- name: "{{ profile_name }}"
- register: output
-
-- name: assert create
- assert:
- that:
- - output.changed
- - output.id
-
-- name: update log profile (idempotence)
- azure_rm_monitorlogprofile:
- name: "{{ profile_name }}"
- location: "{{ location }}"
- locations:
- - eastus
- - westus
- categories:
- - Write
- - Action
- retention_policy:
- enabled: False
- days: 1
- storage_account:
- resource_group: "{{ resource_group }}"
- name: "{{ storage_name }}"
- register: output
-
-- name: assert update idempotence
- assert:
- that:
- - output.changed == False
-
-- name: update log profile
- azure_rm_monitorlogprofile:
- name: "{{ profile_name }}"
- location: "{{ location }}"
- locations:
- - eastus
- categories:
- - Write
- - Action
- retention_policy:
- enabled: False
- days: 2
- storage_account:
- resource_group: "{{ resource_group }}"
- name: "{{ profile_name }}"
- register: output
-
-- name: assert update
- assert:
- that:
- - output.changed
diff --git a/test/integration/targets/azure_rm_mysqlserver/aliases b/test/integration/targets/azure_rm_mysqlserver/aliases
deleted file mode 100644
index 9e3fd9ae68..0000000000
--- a/test/integration/targets/azure_rm_mysqlserver/aliases
+++ /dev/null
@@ -1,10 +0,0 @@
-cloud/azure
-destructive
-shippable/azure/group8
-azure_rm_mysqlserver_facts
-azure_rm_mysqldatabase
-azure_rm_mysqldatabase_facts
-azure_rm_mysqlfirewallrule
-azure_rm_mysqlfirewallrule_facts
-azure_rm_mysqlconfiguration
-azure_rm_mysqlconfiguration_facts
diff --git a/test/integration/targets/azure_rm_mysqlserver/meta/main.yml b/test/integration/targets/azure_rm_mysqlserver/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_mysqlserver/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_mysqlserver/tasks/main.yml b/test/integration/targets/azure_rm_mysqlserver/tasks/main.yml
deleted file mode 100644
index 8f51010d82..0000000000
--- a/test/integration/targets/azure_rm_mysqlserver/tasks/main.yml
+++ /dev/null
@@ -1,640 +0,0 @@
-- name: Prepare random number
- set_fact:
- rpfx: "{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- run_once: yes
-
-- name: Create instance of MySQL Server -- check mode
- azure_rm_mysqlserver:
- resource_group: "{{ resource_group }}"
- name: mysqlsrv{{ rpfx }}
- sku:
- name: B_Gen5_1
- tier: Basic
- location: westus2
- storage_mb: 51200
- version: 5.6
- enforce_ssl: True
- admin_username: zimxyz
- admin_password: Testpasswordxyz12!
- check_mode: yes
- register: output
-- name: Assert the resource instance is well created
- assert:
- that:
- - output.changed
-
-- name: Create instance of MySQL Server
- azure_rm_mysqlserver:
- resource_group: "{{ resource_group }}"
- name: mysqlsrv{{ rpfx }}
- sku:
- name: B_Gen5_1
- tier: Basic
- location: westus2
- storage_mb: 51200
- version: 5.6
- enforce_ssl: True
- admin_username: zimxyz
- admin_password: Testpasswordxyz12!
- register: output
-- name: Assert the resource instance is well created
- assert:
- that:
- - output.changed
- - output.state == 'Ready'
-
-- name: Create again instance of MySQL Server
- azure_rm_mysqlserver:
- resource_group: "{{ resource_group }}"
- name: mysqlsrv{{ rpfx }}
- sku:
- name: B_Gen5_1
- tier: Basic
- location: westus2
- storage_mb: 51200
- version: 5.6
- enforce_ssl: True
- admin_username: zimxyz
- admin_password: Testpasswordxyz12!
- register: output
-- name: Assert the state has not changed
- assert:
- that:
- - output.changed == false
- - output.state == 'Ready'
-
-- name: Update instance of MySQL Server, change storage size
- azure_rm_mysqlserver:
- resource_group: "{{ resource_group }}"
- name: mysqlsrv{{ rpfx }}
- sku:
- name: B_Gen5_1
- tier: Basic
- location: westus2
- storage_mb: 128000
- version: 5.6
- enforce_ssl: True
- admin_username: zimxyz
- admin_password: Testpasswordxyz12!
- register: output
-- name: Assert the state has not changed
- assert:
- that:
- - output.changed
- - output.state == 'Ready'
-- debug:
- var: output
-
-- name: Gather facts MySQL Server
- azure_rm_mysqlserver_facts:
- resource_group: "{{ resource_group }}"
- name: mysqlsrv{{ rpfx }}
- register: output
-- name: Assert that storage size is correct
- assert:
- that:
- - output.servers[0]['storage_mb'] == 128000
-
-- name: Create second instance of MySQL Server
- azure_rm_mysqlserver:
- resource_group: "{{ resource_group }}"
- name: mysqlsrv{{ rpfx }}second
- sku:
- name: B_Gen5_1
- tier: Basic
- location: westus2
- storage_mb: 51200
- version: 5.6
- enforce_ssl: True
- admin_username: zimxyz
- admin_password: Testpasswordxyz12!
- tags:
- aaa: bbb
-
-- name: Create second instance of MySQL Server
- azure_rm_mysqlserver:
- resource_group: "{{ resource_group }}"
- name: mysqlsrv{{ rpfx }}second
- sku:
- name: B_Gen5_1
- tier: Basic
- location: westus2
- storage_mb: 51200
- version: 5.6
- enforce_ssl: True
- admin_username: zimxyz
- admin_password: Testpasswordxyz12!
- tags:
- ccc: ddd
-
-- name: Gather facts MySQL Server
- azure_rm_mysqlserver_facts:
- resource_group: "{{ resource_group }}"
- name: mysqlsrv{{ rpfx }}second
- register: output
-
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.servers[0]['id'] != None
- - output.servers[0]['name'] != None
- - output.servers[0]['location'] != None
- - output.servers[0]['sku']['name'] != None
- - output.servers[0]['sku']['tier'] != None
- - output.servers[0]['sku']['capacity'] != None
- - output.servers[0]['version'] != None
- - output.servers[0]['user_visible_state'] != None
- - output.servers[0]['fully_qualified_domain_name'] != None
- - output.servers[0]['tags']['aaa'] == 'bbb'
- - output.servers[0]['tags']['ccc'] == 'ddd'
-
-- name: Gather facts MySQL Server
- azure_rm_mysqlserver_facts:
- resource_group: "{{ resource_group }}"
- register: output
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.servers[0]['id'] != None
- - output.servers[0]['name'] != None
- - output.servers[0]['location'] != None
- - output.servers[0]['sku']['name'] != None
- - output.servers[0]['sku']['tier'] != None
- - output.servers[0]['sku']['capacity'] != None
- - output.servers[0]['version'] != None
- - output.servers[0]['user_visible_state'] != None
- - output.servers[0]['fully_qualified_domain_name'] != None
- - output.servers[1]['id'] != None
- - output.servers[1]['name'] != None
- - output.servers[1]['location'] != None
- - output.servers[1]['sku']['name'] != None
- - output.servers[1]['sku']['tier'] != None
- - output.servers[1]['sku']['capacity'] != None
- - output.servers[1]['version'] != None
- - output.servers[1]['user_visible_state'] != None
- - output.servers[1]['fully_qualified_domain_name'] != None
-
-#
-# azure_rm_mysqldatabase tests below
-#
-- name: Create instance of MySQL Database -- check mode
- azure_rm_mysqldatabase:
- resource_group: "{{ resource_group }}"
- server_name: mysqlsrv{{ rpfx }}
- name: testdatabase
- check_mode: yes
- register: output
-- name: Assert the resource instance is well created
- assert:
- that:
- - output.changed
-
-- name: Create instance of MySQL Database
- azure_rm_mysqldatabase:
- resource_group: "{{ resource_group }}"
- server_name: mysqlsrv{{ rpfx }}
- name: testdatabase
- collation: latin1_swedish_ci
- charset: latin1
- register: output
-- name: Assert the resource instance is well created
- assert:
- that:
- - output.changed
- - output.name == 'testdatabase'
-
-- name: Create again instance of MySQL Database
- azure_rm_mysqldatabase:
- resource_group: "{{ resource_group }}"
- server_name: mysqlsrv{{ rpfx }}
- name: testdatabase
- collation: latin1_swedish_ci
- charset: latin1
- register: output
-- name: Assert the state has not changed
- assert:
- that:
- - output.changed == false
- - output.name == 'testdatabase'
-
-- name: Try to update database without force_update
- azure_rm_mysqldatabase:
- resource_group: "{{ resource_group }}"
- server_name: mysqlsrv{{ rpfx }}
- name: testdatabase
- collation: latin1_czech_ci
- charset: latin1
- ignore_errors: yes
- register: output
-- name: Assert that nothing has changed
- assert:
- that:
- - output.changed == False
-
-- name: Update instance of database using force_update
- azure_rm_mysqldatabase:
- resource_group: "{{ resource_group }}"
- server_name: mysqlsrv{{ rpfx }}
- name: testdatabase
- collation: latin1_czech_ci
- charset: latin1
- force_update: yes
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed
- - output.name == 'testdatabase'
-
-- name: Create second instance of MySQL Database
- azure_rm_mysqldatabase:
- resource_group: "{{ resource_group }}"
- server_name: mysqlsrv{{ rpfx }}
- name: testdatabase2
-
-- name: Gather facts MySQL Database
- azure_rm_mysqldatabase_facts:
- resource_group: "{{ resource_group }}"
- server_name: mysqlsrv{{ rpfx }}
- name: testdatabase
- register: output
-
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.databases[0]['server_name'] != None
- - output.databases[0]['name'] != None
- - output.databases[0]['charset'] != None
- - output.databases[0]['collation'] != None
-
-- name: Gather facts MySQL Database
- azure_rm_mysqldatabase_facts:
- resource_group: "{{ resource_group }}"
- server_name: mysqlsrv{{ rpfx }}
- register: output
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.databases[0]['server_name'] != None
- - output.databases[0]['name'] != None
- - output.databases[0]['charset'] != None
- - output.databases[0]['collation'] != None
- - output.databases[1]['server_name'] != None
- - output.databases[1]['name'] != None
- - output.databases[1]['charset'] != None
- - output.databases[1]['collation'] != None
-
-- name: Delete instance of MySQL Database -- check mode
- azure_rm_mysqldatabase:
- resource_group: "{{ resource_group }}"
- server_name: mysqlsrv{{ rpfx }}
- name: testdatabase
- state: absent
- check_mode: yes
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed
-
-- name: Delete instance of MySQL Database
- azure_rm_mysqldatabase:
- resource_group: "{{ resource_group }}"
- server_name: mysqlsrv{{ rpfx }}
- name: testdatabase
- state: absent
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed
-
-- name: Delete unexisting instance of MySQL Database
- azure_rm_mysqldatabase:
- resource_group: "{{ resource_group }}"
- server_name: mysqlsrv{{ rpfx }}
- name: testdatabase
- state: absent
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed == false
-
-#
-# azure_rm_firewallrule tests below
-#
-- name: Create instance of Firewall Rule -- check mode
- azure_rm_mysqlfirewallrule:
- resource_group: "{{ resource_group }}"
- server_name: mysqlsrv{{ rpfx }}
- name: firewallrule{{ rpfx }}
- start_ip_address: 172.28.10.136
- end_ip_address: 172.28.10.138
- check_mode: yes
- register: output
-- name: Assert the resource instance is well created
- assert:
- that:
- - output.changed
-
-- name: Create instance of Firewall Rule
- azure_rm_mysqlfirewallrule:
- resource_group: "{{ resource_group }}"
- server_name: mysqlsrv{{ rpfx }}
- name: firewallrule{{ rpfx }}
- start_ip_address: 172.28.10.136
- end_ip_address: 172.28.10.138
- register: output
-- name: Assert the resource instance is well created
- assert:
- that:
- - output.changed
-
-- name: Create again instance of Firewall Rule
- azure_rm_mysqlfirewallrule:
- resource_group: "{{ resource_group }}"
- server_name: mysqlsrv{{ rpfx }}
- name: firewallrule{{ rpfx }}
- start_ip_address: 172.28.10.136
- end_ip_address: 172.28.10.138
- register: output
-- name: Assert the state has not changed
- assert:
- that:
- - output.changed == false
-
-- name: Delete instance of Firewall Rule -- check mode
- azure_rm_mysqlfirewallrule:
- resource_group: "{{ resource_group }}"
- server_name: mysqlsrv{{ rpfx }}
- name: firewallrule{{ rpfx }}
- state: absent
- check_mode: yes
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed
-
-- name: Create instance of Firewall Rule -- second
- azure_rm_mysqlfirewallrule:
- resource_group: "{{ resource_group }}"
- server_name: mysqlsrv{{ rpfx }}
- name: firewallrule{{ rpfx }}second
- start_ip_address: 172.28.10.136
- end_ip_address: 172.28.10.138
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed
-
-- name: Gather facts MySQL Firewall Rule
- azure_rm_mysqlfirewallrule_facts:
- resource_group: "{{ resource_group }}"
- server_name: mysqlsrv{{ rpfx }}
- name: firewallrule{{ rpfx }}
- register: output
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.rules[0].id != None
- - output.rules[0].server_name != None
- - output.rules[0].name != None
- - output.rules[0].start_ip_address != None
- - output.rules[0].end_ip_address != None
- - "output.rules | length == 1"
-
-- name: Gather facts MySQL Firewall Rule
- azure_rm_mysqlfirewallrule_facts:
- resource_group: "{{ resource_group }}"
- server_name: mysqlsrv{{ rpfx }}
- register: output
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.rules[0].id != None
- - output.rules[0].server_name != None
- - output.rules[0].name != None
- - output.rules[0].start_ip_address != None
- - output.rules[0].end_ip_address != None
- - output.rules[1].id != None
- - output.rules[1].name != None
- - output.rules[1].start_ip_address != None
- - output.rules[1].end_ip_address != None
- - "output.rules | length == 2"
-
-- name: Delete instance of Firewall Rule
- azure_rm_mysqlfirewallrule:
- resource_group: "{{ resource_group }}"
- server_name: mysqlsrv{{ rpfx }}
- name: firewallrule{{ rpfx }}
- state: absent
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed
-
-- name: Delete unexisting instance of Firewall Rule
- azure_rm_mysqlfirewallrule:
- resource_group: "{{ resource_group }}"
- server_name: mysqlsrv{{ rpfx }}
- name: firewallrule{{ rpfx }}
- state: absent
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed == false
-
-- name: Delete instance of Firewall Rule - second
- azure_rm_mysqlfirewallrule:
- resource_group: "{{ resource_group }}"
- server_name: mysqlsrv{{ rpfx }}
- name: firewallrule{{ rpfx }}second
- state: absent
-
-- name: Gather facts MySQL Firewall Rule
- azure_rm_mysqlfirewallrule_facts:
- resource_group: "{{ resource_group }}"
- server_name: mysqlsrv{{ rpfx }}
- name: firewallrule{{ rpfx }}
- register: output
-- name: Assert that empty list was returned
- assert:
- that:
- - output.changed == False
- - "output.rules | length == 0"
-
-#
-# configuration
-#
-- name: Create instance of Configuration -- check mode
- azure_rm_mysqlconfiguration:
- resource_group: "{{ resource_group }}"
- server_name: mysqlsrv{{ rpfx }}
- name: event_scheduler
- value: "ON"
- check_mode: yes
- register: output
-- name: Assert that change was registered
- assert:
- that:
- - output.changed
-
-- name: Try to delete default configuraion
- azure_rm_mysqlconfiguration_facts:
- resource_group: "{{ resource_group }}"
- server_name: mysqlsrv{{ rpfx }}
- name: event_scheduler
- register: output
-- name: Get facts of event_scheduler
- debug:
- var: output
-
-- name: Try to delete default configuraion
- azure_rm_mysqlconfiguration:
- resource_group: "{{ resource_group }}"
- server_name: mysqlsrv{{ rpfx }}
- name: event_scheduler
- state: absent
- register: output
-- name: Assert that change was registered
- assert:
- that:
- - not output.changed
-
-- name: Try to change default configuraion
- azure_rm_mysqlconfiguration:
- resource_group: "{{ resource_group }}"
- server_name: mysqlsrv{{ rpfx }}
- name: event_scheduler
- value: "ON"
- register: output
-- name: Assert that change was registered
- assert:
- that:
- - output.changed
-
-- name: Try to change default configuration -- idempotent
- azure_rm_mysqlconfiguration:
- resource_group: "{{ resource_group }}"
- server_name: mysqlsrv{{ rpfx }}
- name: event_scheduler
- value: "ON"
- register: output
-- name: Assert that change was registered
- assert:
- that:
- - not output.changed
-
-- name: Try to reset configuration
- azure_rm_mysqlconfiguration:
- resource_group: "{{ resource_group }}"
- server_name: mysqlsrv{{ rpfx }}
- name: event_scheduler
- state: absent
- register: output
-- name: Assert that change was registered
- assert:
- that:
- - output.changed
-
-- name: Try to reset configuration -- idempotent
- azure_rm_mysqlconfiguration:
- resource_group: "{{ resource_group }}"
- server_name: mysqlsrv{{ rpfx }}
- name: event_scheduler
- state: absent
- register: output
-- name: Assert that change was registered
- assert:
- that:
- - not output.changed
-
-- name: Gather facts MySQL Configuration
- azure_rm_mysqlconfiguration_facts:
- resource_group: "{{ resource_group }}"
- server_name: mysqlsrv{{ rpfx }}
- name: event_scheduler
- register: output
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.settings[0].id != None
- - output.settings[0].name != None
- - output.settings[0].value != None
- - output.settings[0].description != None
- - output.settings[0].source != None
- - output.settings | length == 1
-
-- name: Gather facts MySQL Configuration
- azure_rm_mysqlconfiguration_facts:
- resource_group: "{{ resource_group }}"
- server_name: mysqlsrv{{ rpfx }}
- register: output
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.settings[0].id != None
- - output.settings[0].name != None
- - output.settings[0].value != None
- - output.settings[0].description != None
- - output.settings[0].source != None
- - output.settings | length > 1
-
-#
-# clean up azure_rm_mysqlserver test
-#
-
-- name: Delete instance of MySQL Server -- check mode
- azure_rm_mysqlserver:
- resource_group: "{{ resource_group }}"
- name: mysqlsrv{{ rpfx }}
- state: absent
- check_mode: yes
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed
-
-- name: Delete instance of MySQL Server
- azure_rm_mysqlserver:
- resource_group: "{{ resource_group }}"
- name: mysqlsrv{{ rpfx }}
- state: absent
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed
-
-- name: Delete unexisting instance of MySQL Server
- azure_rm_mysqlserver:
- resource_group: "{{ resource_group }}"
- name: mysqlsrv{{ rpfx }}
- state: absent
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed == false
-
-- name: Delete second instance of MySQL Server
- azure_rm_mysqlserver:
- resource_group: "{{ resource_group }}"
- name: mysqlsrv{{ rpfx }}second
- state: absent
- async: 400
- poll: 0
diff --git a/test/integration/targets/azure_rm_networkinterface/aliases b/test/integration/targets/azure_rm_networkinterface/aliases
deleted file mode 100644
index 67f8675677..0000000000
--- a/test/integration/targets/azure_rm_networkinterface/aliases
+++ /dev/null
@@ -1,4 +0,0 @@
-cloud/azure
-shippable/azure/group5
-destructive
-azure_rm_applicationsecuritygroup \ No newline at end of file
diff --git a/test/integration/targets/azure_rm_networkinterface/meta/main.yml b/test/integration/targets/azure_rm_networkinterface/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_networkinterface/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_networkinterface/tasks/main.yml b/test/integration/targets/azure_rm_networkinterface/tasks/main.yml
deleted file mode 100644
index bd7df0a29f..0000000000
--- a/test/integration/targets/azure_rm_networkinterface/tasks/main.yml
+++ /dev/null
@@ -1,554 +0,0 @@
-- name: Prepare random number
- set_fact:
- rpfx: "{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- applicationsecuritygroup_name1: "asg{{ resource_group | hash('md5') | truncate(5, True, '') }}{{ 1000 | random }}"
- applicationsecuritygroup_name2: "asg{{ resource_group | hash('md5') | truncate(5, True, '') }}{{ 1000 | random }}"
- nic_name1: "nic1{{ resource_group | hash('md5') | truncate(5, True, '') }}{{ 1000 | random }}"
- run_once: yes
-
-- name: Create virtual network
- azure_rm_virtualnetwork:
- resource_group: "{{ resource_group_secondary }}"
- name: "tn{{ rpfx }}"
- address_prefixes: "10.10.0.0/16"
- register: vn
-
-- name: Add subnet
- azure_rm_subnet:
- resource_group: "{{ resource_group_secondary }}"
- name: "tn{{ rpfx }}"
- address_prefix: "10.10.0.0/24"
- virtual_network: "tn{{ rpfx }}"
-
-- name: create public ip
- azure_rm_publicipaddress:
- name: "pip{{ rpfx }}"
- resource_group: '{{ resource_group }}'
-
-- name: create load balancer with multiple parameters
- azure_rm_loadbalancer:
- resource_group: '{{ resource_group }}'
- name: "lb{{ rpfx }}"
- frontend_ip_configurations:
- - name: frontendipconf0
- public_ip_address: "pip{{ rpfx }}"
- backend_address_pools:
- - name: backendaddrpool0
- - name: backendaddrpool1
- probes:
- - name: prob0
- port: 80
- inbound_nat_pools:
- - name: inboundnatpool0
- frontend_ip_configuration_name: frontendipconf0
- protocol: Tcp
- frontend_port_range_start: 80
- frontend_port_range_end: 81
- backend_port: 8080
- load_balancing_rules:
- - name: lbrbalancingrule0
- frontend_ip_configuration: frontendipconf0
- backend_address_pool: backendaddrpool0
- frontend_port: 80
- backend_port: 80
- probe: prob0
- register: lb
-
-- name: Create most simple NIC with virtual_network id (check mode)
- azure_rm_networkinterface:
- resource_group: "{{ resource_group }}"
- name: "tn{{ rpfx }}"
- virtual_network: "{{ vn.state.id }}"
- subnet: "tn{{ rpfx }}"
- public_ip: False
- create_with_security_group: False
- register: output
- check_mode: yes
-
-- assert:
- that:
- - output.changed
-
-- name: Create most simple NIC with virtual_network resource_group
- azure_rm_networkinterface:
- resource_group: "{{ resource_group }}"
- name: "tn{{ rpfx }}"
- virtual_network:
- name: "tn{{ rpfx }}"
- resource_group: "{{ resource_group_secondary }}"
- subnet: "tn{{ rpfx }}"
- public_ip: False
- create_with_security_group: False
- register: output
-
-- assert:
- that:
- - output.changed
- - output.state.id
-
-- name: Get fact of the new created NIC
- azure_rm_networkinterface_info:
- resource_group: "{{ resource_group }}"
- name: "tn{{ rpfx }}"
- register: facts
-
-- assert:
- that:
- - "facts.networkinterfaces | length == 1"
- - facts.networkinterfaces[0].id == output.state.id
- - "facts.networkinterfaces[0].ip_configurations | length == 1"
- - not facts.networkinterfaces[0].security_group
- - not facts.networkinterfaces[0].ip_configurations[0].public_ip_address
- - not facts.networkinterfaces[0].enable_ip_forwarding
- - not facts.networkinterfaces[0].enable_accelerated_networking
-
-- name: Create most simple NIC with ip configurations (idempotent)
- azure_rm_networkinterface:
- resource_group: "{{ facts.networkinterfaces[0].resource_group }}"
- name: "{{ facts.networkinterfaces[0].name }}"
- virtual_network: "{{ facts.networkinterfaces[0].virtual_network }}"
- create_with_security_group: False
- ip_configurations:
- - name: "{{ facts.networkinterfaces[0].ip_configurations[0].name }}"
- private_ip_address: "{{ facts.networkinterfaces[0].ip_configurations[0].private_ip_address }}"
- private_ip_allocation_method: "{{ facts.networkinterfaces[0].ip_configurations[0].private_ip_allocation_method }}"
- primary: "{{ facts.networkinterfaces[0].ip_configurations[0].primary }}"
- subnet: "{{ facts.networkinterfaces[0].subnet }}"
- register: output
-
-- assert:
- that:
- - not output.changed
-
-- name: Create most simple NIC (idempotent)
- azure_rm_networkinterface:
- resource_group: "{{ resource_group }}"
- name: "tn{{ rpfx }}"
- virtual_network: "{{ vn.state.id }}"
- subnet: "tn{{ rpfx }}"
- create_with_security_group: False
- public_ip: False
- register: output
-
-- assert:
- that:
- - not output.changed
-
-- name: Update security group (check mode)
- azure_rm_networkinterface:
- resource_group: "{{ resource_group }}"
- name: "tn{{ rpfx }}"
- virtual_network: "{{ vn.state.id }}"
- subnet: "tn{{ rpfx }}"
- public_ip: False
- security_group: "tn{{ rpfx }}sg"
- register: output
- check_mode: yes
-
-- assert:
- that:
- - output.changed
-
-- name: Update public ip address (check mode)
- azure_rm_networkinterface:
- resource_group: "{{ resource_group }}"
- name: "tn{{ rpfx }}"
- virtual_network: "{{ vn.state.id }}"
- subnet: "tn{{ rpfx }}"
- public_ip_address_name: "tn{{ rpfx }}"
- create_with_security_group: False
- register: output
- check_mode: yes
-
-- assert:
- that:
- - output.changed
-
-- name: Update accelerated networking (check mode)
- azure_rm_networkinterface:
- resource_group: "{{ resource_group }}"
- name: "tn{{ rpfx }}"
- virtual_network: "{{ vn.state.id }}"
- subnet: "tn{{ rpfx }}"
- enable_accelerated_networking: True
- create_with_security_group: False
- public_ip: False
- register: output
- check_mode: yes
-
-- assert:
- that:
- - output.changed
-
-- name: Update IP forwarding networking (check mode)
- azure_rm_networkinterface:
- resource_group: "{{ resource_group }}"
- name: "tn{{ rpfx }}"
- virtual_network: "{{ vn.state.id }}"
- subnet: "tn{{ rpfx }}"
- create_with_security_group: False
- enable_ip_forwarding: True
- public_ip: False
- register: output
- check_mode: yes
-
-- assert:
- that:
- - output.changed
-
-- name: Update dns server (check mode)
- azure_rm_networkinterface:
- resource_group: "{{ resource_group }}"
- name: "tn{{ rpfx }}"
- virtual_network: "{{ vn.state.id }}"
- subnet: "tn{{ rpfx }}"
- create_with_security_group: False
- public_ip: False
- dns_servers:
- - 8.9.10.11
- - 7.8.9.10
- register: output
- check_mode: yes
-
-- assert:
- that:
- - output.changed
-
-- name: Update NIC
- azure_rm_networkinterface:
- resource_group: "{{ resource_group }}"
- name: "tn{{ rpfx }}"
- virtual_network: "{{ vn.state.id }}"
- subnet: "tn{{ rpfx }}"
- enable_accelerated_networking: True
- enable_ip_forwarding: True
- security_group: "tn{{ rpfx }}sg"
- dns_servers:
- - 8.9.10.11
- - 7.8.9.10
- ip_configurations:
- - name: "{{ facts.networkinterfaces[0].ip_configurations[0].name }}"
- private_ip_address: "{{ facts.networkinterfaces[0].ip_configurations[0].private_ip_address }}"
- private_ip_allocation_method: "{{ facts.networkinterfaces[0].ip_configurations[0].private_ip_allocation_method }}"
- primary: "{{ facts.networkinterfaces[0].ip_configurations[0].primary }}"
- - name: ipconfig1
- public_ip_name: "tn{{ rpfx }}"
- load_balancer_backend_address_pools:
- - "{{ lb.state.backend_address_pools[0].id }}"
- - name: backendaddrpool1
- load_balancer: "lb{{ rpfx }}"
- register: output
-
-- assert:
- that:
- - output.changed
- - output.state.dns_settings.dns_servers == ['8.9.10.11', '7.8.9.10']
- - output.state.enable_ip_forwarding
- - output.state.network_security_group.name == "tn{{ rpfx }}sg"
- - output.state.enable_accelerated_networking
-
-- name: Complicated NIC (idempontent)
- azure_rm_networkinterface:
- resource_group: "{{ resource_group }}"
- name: "tn{{ rpfx }}"
- virtual_network: "{{ vn.state.id }}"
- subnet: "tn{{ rpfx }}"
- enable_accelerated_networking: True
- security_group: "tn{{ rpfx }}sg"
- enable_ip_forwarding: True
- dns_servers:
- - 8.9.10.11
- - 7.8.9.10
- ip_configurations:
- - name: "{{ facts.networkinterfaces[0].ip_configurations[0].name }}"
- private_ip_address: "{{ facts.networkinterfaces[0].ip_configurations[0].private_ip_address }}"
- private_ip_allocation_method: "{{ facts.networkinterfaces[0].ip_configurations[0].private_ip_allocation_method }}"
- primary: "{{ facts.networkinterfaces[0].ip_configurations[0].primary }}"
- - name: ipconfig1
- public_ip_name: "tn{{ rpfx }}"
- load_balancer_backend_address_pools:
- - "{{ lb.state.backend_address_pools[0].id }}"
- - name: backendaddrpool1
- load_balancer: "lb{{ rpfx }}"
- register: output
-
-- assert:
- that:
- - not output.changed
-
-- name: Get fact of the new created NIC
- azure_rm_networkinterface_info:
- resource_group: "{{ resource_group }}"
- name: "tn{{ rpfx }}"
- register: facts
-
-- assert:
- that:
- - "facts.networkinterfaces | length == 1"
- - facts.networkinterfaces[0].id == output.state.id
- - "facts.networkinterfaces[0].ip_configurations | length == 2"
- - 'facts.networkinterfaces[0].security_group.endswith("tn{{ rpfx }}sg")'
- - facts.networkinterfaces[0].enable_accelerated_networking
- - facts.networkinterfaces[0].enable_ip_forwarding
-
-- name: Remove one dns server and ip configuration
- azure_rm_networkinterface:
- resource_group: "{{ resource_group }}"
- name: "tn{{ rpfx }}"
- virtual_network: "{{ vn.state.id }}"
- subnet: "tn{{ rpfx }}"
- security_group: "tn{{ rpfx }}sg"
- enable_accelerated_networking: True
- enable_ip_forwarding: True
- dns_servers:
- - 8.9.10.11
- ip_configurations:
- - name: ipconfig1
- public_ip_name: "tn{{ rpfx }}"
- primary: True
- load_balancer_backend_address_pools:
- - "{{ lb.state.backend_address_pools[0].id }}"
- - name: backendaddrpool1
- load_balancer: "lb{{ rpfx }}"
- register: output
-
-- assert:
- that:
- - output.changed
- - output.state.dns_settings.dns_servers == ['8.9.10.11']
- - output.state.enable_ip_forwarding
- - output.state.network_security_group.name == "tn{{ rpfx }}sg"
- - "output.state.ip_configurations | length == 1"
- - output.state.ip_configurations[0].public_ip_address.name == "tn{{ rpfx }}"
- - output.state.enable_accelerated_networking
-
-- name: Create application security group(check mode)
- azure_rm_applicationsecuritygroup:
- resource_group: "{{ resource_group }}"
- name: "{{ applicationsecuritygroup_name1 }}"
- tags:
- testing: testing
- check_mode: yes
- register: output
-
-- name: Assert check mode creation
- assert:
- that:
- - output.changed
-
-- name: Create Application security group
- azure_rm_applicationsecuritygroup:
- resource_group: "{{ resource_group }}"
- name: "{{ applicationsecuritygroup_name1 }}"
- tags:
- testing: testing
- register: output
-
-- name: Assert application security group creation
- assert:
- that:
- - output.changed
- - output.id != ''
-
-- name: Get Application security group
- azure_rm_applicationsecuritygroup_info:
- resource_group: "{{ resource_group }}"
- name: "{{ applicationsecuritygroup_name1 }}"
- register: facts
-
-- name: Assert facts
- assert:
- that:
- - facts['applicationsecuritygroups'] | length == 1
- - facts['applicationsecuritygroups'][0]['name'] != None
- - facts['applicationsecuritygroups'][0]['location'] != None
- - facts['applicationsecuritygroups'][0]['provisioning_state'] != None
-
-- name: Create application security group (idempotent)
- azure_rm_applicationsecuritygroup:
- resource_group: "{{ resource_group }}"
- name: "{{ applicationsecuritygroup_name1 }}"
- tags:
- testing: testing
- register: output
-
-- name: Assert idempotent
- assert:
- that:
- - not output.changed
-
-- name: Update application security group
- azure_rm_applicationsecuritygroup:
- resource_group: "{{ resource_group }}"
- name: "{{ applicationsecuritygroup_name1 }}"
- tags:
- testing: testing
- foo: bar
- register: output
-
-- name: Assert update
- assert:
- that:
- - output.changed
-
-- name: Create Application security group in secondary resource group
- azure_rm_applicationsecuritygroup:
- resource_group: "{{ resource_group_secondary }}"
- name: "{{ applicationsecuritygroup_name2 }}"
- register: asg
-
-- name: Create Nic with application security groups
- azure_rm_networkinterface:
- resource_group: "{{ resource_group }}"
- name: "{{ nic_name1 }}"
- virtual_network: "{{ vn.state.id }}"
- subnet: "tn{{ rpfx }}"
- create_with_security_group: True
- public_ip: False
- ip_configurations:
- - name: ipconfig1
- application_security_groups:
- - "{{ applicationsecuritygroup_name1 }}"
- - "{{ asg.id }}"
- primary: True
- register: output
-
-- name: assert creation succeeded
- assert:
- that:
- - output.changed
-
-- name: Create Nic with application security groups (idempotent)
- azure_rm_networkinterface:
- resource_group: "{{ resource_group }}"
- name: "{{ nic_name1 }}"
- virtual_network: "{{ vn.state.id }}"
- subnet: "tn{{ rpfx }}"
- create_with_security_group: True
- public_ip: False
- ip_configurations:
- - name: ipconfig1
- application_security_groups:
- - "{{ asg.id }}"
- - "{{ applicationsecuritygroup_name1 }}"
- primary: True
- register: output
-
-- name: assert idempotent
- assert:
- that:
- - not output.changed
-
-- name: Update Nic with application security groups
- azure_rm_networkinterface:
- resource_group: "{{ resource_group }}"
- name: "{{ nic_name1 }}"
- virtual_network: "{{ vn.state.id }}"
- subnet: "tn{{ rpfx }}"
- create_with_security_group: True
- public_ip: False
- ip_configurations:
- - name: ipconfig1
- application_security_groups:
- - "{{ applicationsecuritygroup_name1 }}"
- primary: True
- register: output
-
-- name: assert update succeeded
- assert:
- that:
- - output.changed
-
-- name: Get fact of the new created NIC
- azure_rm_networkinterface_info:
- resource_group: "{{ resource_group }}"
- name: "{{ nic_name1 }}"
- register: facts
-
-- assert:
- that:
- - "facts.networkinterfaces[0].ip_configurations[0].application_security_groups | length == 1"
-
-- name: Delete the NIC (check mode)
- azure_rm_networkinterface:
- resource_group: "{{ resource_group }}"
- name: "tn{{ rpfx }}"
- state: absent
- check_mode: yes
- register: output
-
-- assert:
- that:
- - output.changed
-
-- name: Delete the NIC
- azure_rm_networkinterface:
- resource_group: "{{ resource_group }}"
- name: "tn{{ rpfx }}"
- state: absent
- register: output
-
-- assert:
- that:
- - output.changed
-
-- name: Delete the NIC (idempotent)
- azure_rm_networkinterface:
- resource_group: "{{ resource_group }}"
- name: "tn{{ rpfx }}"
- state: absent
- register: output
-
-- assert:
- that:
- - not output.changed
-
-- name: delete load balancer
- azure_rm_loadbalancer:
- resource_group: '{{ resource_group }}'
- name: "lb{{ rpfx }}"
- state: absent
-
-- name: delete public ip
- azure_rm_publicipaddress:
- name: "pip{{ rpfx }}"
- resource_group: '{{ resource_group }}'
- state: absent
-
-- name: Delete the NIC
- azure_rm_networkinterface:
- resource_group: "{{ resource_group }}"
- name: "{{ nic_name1 }}"
- state: absent
-
-- name: Delete the application security group (check mode)
- azure_rm_applicationsecuritygroup:
- resource_group: "{{ resource_group }}"
- name: "{{ applicationsecuritygroup_name1 }}"
- state: absent
- check_mode: yes
- register: output
-
-- name: Assert delete check mode
- assert:
- that:
- - output.changed
-
-- name: Delete the application security group
- azure_rm_applicationsecuritygroup:
- resource_group: "{{ resource_group }}"
- name: "{{ applicationsecuritygroup_name1 }}"
- state: absent
- register: output
-
-- name: Assert the deletion
- assert:
- that:
- - output.changed
-
-- name: Delete second application security group
- azure_rm_applicationsecuritygroup:
- resource_group: "{{ resource_group_secondary }}"
- name: "{{ applicationsecuritygroup_name2 }}"
- state: absent
- register: output \ No newline at end of file
diff --git a/test/integration/targets/azure_rm_postgresqlserver/aliases b/test/integration/targets/azure_rm_postgresqlserver/aliases
deleted file mode 100644
index ad065181b3..0000000000
--- a/test/integration/targets/azure_rm_postgresqlserver/aliases
+++ /dev/null
@@ -1,10 +0,0 @@
-cloud/azure
-destructive
-shippable/azure/group11
-azure_rm_postgresqlserver_facts
-azure_rm_postgresqldatabase
-azure_rm_postgresqldatabase_facts
-azure_rm_postgresqlfirewallrule
-azure_rm_postgresqlfirewallrule_facts
-azure_rm_postgresqlserverconfiguration
-azure_rm_postgresqlserverconfiguration_facts
diff --git a/test/integration/targets/azure_rm_postgresqlserver/meta/main.yml b/test/integration/targets/azure_rm_postgresqlserver/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_postgresqlserver/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_postgresqlserver/tasks/main.yml b/test/integration/targets/azure_rm_postgresqlserver/tasks/main.yml
deleted file mode 100644
index 9464e5d5bf..0000000000
--- a/test/integration/targets/azure_rm_postgresqlserver/tasks/main.yml
+++ /dev/null
@@ -1,610 +0,0 @@
-- name: Prepare random number
- set_fact:
- rpfx: "{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- run_once: yes
-
-- name: Create instance of PostgreSQL Server -- check mode
- azure_rm_postgresqlserver:
- resource_group: "{{ resource_group }}"
- name: postgresqlsrv{{ rpfx }}
- sku:
- name: B_Gen5_1
- tier: Basic
- location: westus2
- storage_mb: 51200
- enforce_ssl: True
- admin_username: zimxyz
- admin_password: Testpasswordxyz12!
- check_mode: yes
- register: output
-- name: Assert the resource instance is well created
- assert:
- that:
- - output.changed
-
-- name: Create instance of PostgreSQL Server
- azure_rm_postgresqlserver:
- resource_group: "{{ resource_group }}"
- name: postgresqlsrv{{ rpfx }}
- sku:
- name: B_Gen5_1
- tier: Basic
- location: westus2
- storage_mb: 51200
- enforce_ssl: True
- admin_username: zimxyz
- admin_password: Testpasswordxyz12!
- register: output
-- name: Assert the resource instance is well created
- assert:
- that:
- - output.changed
- - output.state == 'Ready'
-
-- name: Create again instance of PostgreSQL Server
- azure_rm_postgresqlserver:
- resource_group: "{{ resource_group }}"
- name: postgresqlsrv{{ rpfx }}
- sku:
- name: B_Gen5_1
- tier: Basic
- location: westus2
- storage_mb: 51200
- enforce_ssl: True
- admin_username: zimxyz
- admin_password: Testpasswordxyz12!
- register: output
-- name: Assert the state has not changed
- assert:
- that:
- - output.changed == false
- - output.state == 'Ready'
-
-- name: Update instance of PostgreSQL Server, change storage size
- azure_rm_postgresqlserver:
- resource_group: "{{ resource_group }}"
- name: postgresqlsrv{{ rpfx }}
- sku:
- name: B_Gen5_1
- tier: Basic
- location: westus2
- storage_mb: 128000
- enforce_ssl: True
- admin_username: zimxyz
- admin_password: Testpasswordxyz12!
- register: output
-- name: Assert the state has not changed
- assert:
- that:
- - output.changed
- - output.state == 'Ready'
-- debug:
- var: output
-
-- name: Gather facts postgresql Server
- azure_rm_postgresqlserver_facts:
- resource_group: "{{ resource_group }}"
- name: postgresqlsrv{{ rpfx }}
- register: output
-- name: Assert that storage size is correct
- assert:
- that:
- - output.servers[0]['storage_mb'] == 128000
-
-- name: Create second instance of PostgreSQL Server
- azure_rm_postgresqlserver:
- resource_group: "{{ resource_group }}"
- name: postgresqlsrv{{ rpfx }}second
- sku:
- name: B_Gen5_1
- tier: Basic
- location: westus2
- storage_mb: 51200
- enforce_ssl: True
- admin_username: zimxyz
- admin_password: Testpasswordxyz12!
- tags:
- aaa: bbb
-
-- name: Create second instance of PostgreSQL Server -- add tags
- azure_rm_postgresqlserver:
- resource_group: "{{ resource_group }}"
- name: postgresqlsrv{{ rpfx }}second
- sku:
- name: B_Gen5_1
- tier: Basic
- location: westus2
- storage_mb: 51200
- enforce_ssl: True
- admin_username: zimxyz
- admin_password: Testpasswordxyz12!
- tags:
- ccc: ddd
-
-- name: Gather facts PostgreSQL Server
- azure_rm_postgresqlserver_facts:
- resource_group: "{{ resource_group }}"
- name: postgresqlsrv{{ rpfx }}second
- register: output
-
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.servers[0]['id'] != None
- - output.servers[0]['name'] != None
- - output.servers[0]['location'] != None
- - output.servers[0]['sku']['name'] != None
- - output.servers[0]['sku']['tier'] != None
- - output.servers[0]['sku']['capacity'] != None
- - output.servers[0]['version'] != None
- - output.servers[0]['user_visible_state'] != None
- - output.servers[0]['fully_qualified_domain_name'] != None
- - output.servers[0]['tags']['aaa'] == 'bbb'
- - output.servers[0]['tags']['ccc'] == 'ddd'
-
-- name: Gather facts PostgreSQL Server
- azure_rm_postgresqlserver_facts:
- resource_group: "{{ resource_group }}"
- register: output
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.servers[0]['id'] != None
- - output.servers[0]['name'] != None
- - output.servers[0]['location'] != None
- - output.servers[0]['sku']['name'] != None
- - output.servers[0]['sku']['tier'] != None
- - output.servers[0]['sku']['capacity'] != None
- - output.servers[0]['version'] != None
- - output.servers[0]['user_visible_state'] != None
- - output.servers[0]['fully_qualified_domain_name'] != None
- - output.servers[1]['id'] != None
- - output.servers[1]['name'] != None
- - output.servers[1]['location'] != None
- - output.servers[1]['sku']['name'] != None
- - output.servers[1]['sku']['tier'] != None
- - output.servers[1]['sku']['capacity'] != None
- - output.servers[1]['version'] != None
- - output.servers[1]['user_visible_state'] != None
- - output.servers[1]['fully_qualified_domain_name'] != None
-
-#
-# azure_rm_postgresqldatabase tests below
-#
-- name: Create instance of PostgreSQL Database -- check mode
- azure_rm_postgresqldatabase:
- resource_group: "{{ resource_group }}"
- server_name: postgresqlsrv{{ rpfx }}
- name: testdatabase
- charset: UTF8
- collation: English_United States.1252
- check_mode: yes
- register: output
-- name: Assert the resource instance is well created
- assert:
- that:
- - output.changed
-
-- name: Create instance of PostgreSQL Database
- azure_rm_postgresqldatabase:
- resource_group: "{{ resource_group }}"
- server_name: postgresqlsrv{{ rpfx }}
- name: testdatabase
- charset: UTF8
- collation: English_United States.1252
- register: output
-- name: Assert the resource instance is well created
- assert:
- that:
- - output.changed
- - output.name == 'testdatabase'
-
-- name: Create again instance of PostgreSQL Database
- azure_rm_postgresqldatabase:
- resource_group: "{{ resource_group }}"
- server_name: postgresqlsrv{{ rpfx }}
- name: testdatabase
- charset: UTF8
- collation: English_United States.1252
- register: output
-- name: Assert the state has not changed
- assert:
- that:
- - output.changed == false
- - output.name == 'testdatabase'
-
-- name: Try to update PostgreSQL Database without force_update
- azure_rm_postgresqldatabase:
- resource_group: "{{ resource_group }}"
- server_name: postgresqlsrv{{ rpfx }}
- name: testdatabase
- charset: WIN1252
- collation: SQL_Latin1_General_CP1_CS_AS
- ignore_errors: yes
- register: output
-- name: Assert that nothing has changed
- assert:
- that:
- - output.changed == False
-
-- name: Try to update PostgreSQL Database with force_update
- azure_rm_postgresqldatabase:
- resource_group: "{{ resource_group }}"
- server_name: postgresqlsrv{{ rpfx }}
- name: testdatabase
- charset: WIN1252
- collation: SQL_Latin1_General_CP1_CS_AS
- force_update: yes
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed
- - output.name == 'testdatabase'
-
-- name: Create second instance of PostgreSQL Database
- azure_rm_postgresqldatabase:
- resource_group: "{{ resource_group }}"
- server_name: postgresqlsrv{{ rpfx }}
- name: testdatabase2
-
-- name: Gather facts PostgreSQL Database
- azure_rm_postgresqldatabase_facts:
- resource_group: "{{ resource_group }}"
- server_name: postgresqlsrv{{ rpfx }}
- name: testdatabase
- register: output
-
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.databases[0]['server_name'] != None
- - output.databases[0]['name'] != None
- - output.databases[0]['charset'] != None
- - output.databases[0]['collation'] != None
-
-- name: Gather facts PostgreSQL Database
- azure_rm_postgresqldatabase_facts:
- resource_group: "{{ resource_group }}"
- server_name: postgresqlsrv{{ rpfx }}
- register: output
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.databases[0]['server_name'] != None
- - output.databases[0]['name'] != None
- - output.databases[0]['charset'] != None
- - output.databases[0]['collation'] != None
- - output.databases[1]['server_name'] != None
- - output.databases[1]['name'] != None
- - output.databases[1]['charset'] != None
- - output.databases[1]['collation'] != None
-
-- name: Delete instance of PostgreSQL Database -- check mode
- azure_rm_postgresqldatabase:
- resource_group: "{{ resource_group }}"
- server_name: postgresqlsrv{{ rpfx }}
- name: testdatabase
- state: absent
- check_mode: yes
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed
-
-- name: Delete instance of PostgreSQL Database
- azure_rm_postgresqldatabase:
- resource_group: "{{ resource_group }}"
- server_name: postgresqlsrv{{ rpfx }}
- name: testdatabase
- state: absent
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed
-
-- name: Delete unexisting instance of PostgreSQL Database
- azure_rm_postgresqldatabase:
- resource_group: "{{ resource_group }}"
- server_name: postgresqlsrv{{ rpfx }}
- name: testdatabase
- state: absent
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed == false
-
-#
-# azure_rm_postgresqlfirewallrule
-#
-
-- name: Create instance of Firewall Rule -- check mode
- azure_rm_postgresqlfirewallrule:
- resource_group: "{{ resource_group }}"
- server_name: postgresqlsrv{{ rpfx }}
- name: firewallrule{{ rpfx }}
- start_ip_address: 172.28.10.136
- end_ip_address: 172.28.10.138
- check_mode: yes
- register: output
-- name: Assert the resource instance is well created
- assert:
- that:
- - output.changed
-
-- name: Create instance of Firewall Rule
- azure_rm_postgresqlfirewallrule:
- resource_group: "{{ resource_group }}"
- server_name: postgresqlsrv{{ rpfx }}
- name: firewallrule{{ rpfx }}
- start_ip_address: 172.28.10.136
- end_ip_address: 172.28.10.138
- register: output
-- name: Assert the resource instance is well created
- assert:
- that:
- - output.changed
-
-- name: Create again instance of Firewall Rule
- azure_rm_postgresqlfirewallrule:
- resource_group: "{{ resource_group }}"
- server_name: postgresqlsrv{{ rpfx }}
- name: firewallrule{{ rpfx }}
- start_ip_address: 172.28.10.136
- end_ip_address: 172.28.10.138
- register: output
-- name: Assert the state has not changed
- assert:
- that:
- - output.changed == false
-
-- name: Create Firewall Rule - second
- azure_rm_postgresqlfirewallrule:
- resource_group: "{{ resource_group }}"
- server_name: postgresqlsrv{{ rpfx }}
- name: firewallrule{{ rpfx }}second
- start_ip_address: 172.28.10.136
- end_ip_address: 172.28.10.138
-
-- name: Gather facts PostgreSQL Firewall Rule
- azure_rm_postgresqlfirewallrule_facts:
- resource_group: "{{ resource_group }}"
- server_name: postgresqlsrv{{ rpfx }}
- name: firewallrule{{ rpfx }}
- register: output
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.rules[0].id != None
- - output.rules[0].server_name != None
- - output.rules[0].name != None
- - output.rules[0].start_ip_address != None
- - output.rules[0].end_ip_address != None
- - "output.rules | length == 1"
-
-- name: Gather facts PostgreSQL Firewall Rule
- azure_rm_postgresqlfirewallrule_facts:
- resource_group: "{{ resource_group }}"
- server_name: postgresqlsrv{{ rpfx }}
- register: output
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.rules[0].id != None
- - output.rules[0].server_name != None
- - output.rules[0].name != None
- - output.rules[0].start_ip_address != None
- - output.rules[0].end_ip_address != None
- - output.rules[1].id != None
- - output.rules[1].name != None
- - output.rules[1].start_ip_address != None
- - output.rules[1].end_ip_address != None
- - "output.rules | length == 2"
-
-- name: Delete instance of Firewall Rule -- check mode
- azure_rm_postgresqlfirewallrule:
- resource_group: "{{ resource_group }}"
- server_name: postgresqlsrv{{ rpfx }}
- name: firewallrule{{ rpfx }}
- state: absent
- check_mode: yes
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed
-
-- name: Delete instance of Firewall Rule
- azure_rm_postgresqlfirewallrule:
- resource_group: "{{ resource_group }}"
- server_name: postgresqlsrv{{ rpfx }}
- name: firewallrule{{ rpfx }}
- state: absent
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed
-
-- name: Delete unexisting instance of Firewall Rule
- azure_rm_postgresqlfirewallrule:
- resource_group: "{{ resource_group }}"
- server_name: postgresqlsrv{{ rpfx }}
- name: firewallrule{{ rpfx }}
- state: absent
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed == false
-
-- name: Delete instance of Firewall Rule - second
- azure_rm_postgresqlfirewallrule:
- resource_group: "{{ resource_group }}"
- server_name: postgresqlsrv{{ rpfx }}
- name: firewallrule{{ rpfx }}second
- state: absent
-
-- name: Gather facts PostgreSQL Firewall Rule
- azure_rm_postgresqlfirewallrule_facts:
- resource_group: "{{ resource_group }}"
- server_name: postgresqlsrv{{ rpfx }}
- name: firewallrule{{ rpfx }}
- register: output
-- name: Assert that empty list was returned
- assert:
- that:
- - output.changed == False
- - "output.rules | length == 0"
-
-#
-# azure_rm_postgresql_configuration
-#
-- name: Create instance of Configuration -- check mode
- azure_rm_postgresqlconfiguration:
- resource_group: "{{ resource_group }}"
- server_name: postgresqlsrv{{ rpfx }}
- name: deadlock_timeout
- value: 2000
- check_mode: yes
- register: output
-- name: Assert that change was registered
- assert:
- that:
- - output.changed
-
-- name: Try to change default configuration
- azure_rm_postgresqlconfiguration:
- resource_group: "{{ resource_group }}"
- server_name: postgresqlsrv{{ rpfx }}
- name: deadlock_timeout
- value: 2000
- register: output
-- name: Assert that change was registered
- assert:
- that:
- - output.changed
-
-- name: Try to change default configuration -- idempotent
- azure_rm_postgresqlconfiguration:
- resource_group: "{{ resource_group }}"
- server_name: postgresqlsrv{{ rpfx }}
- name: deadlock_timeout
- value: 2000
- register: output
-- name: Assert that change was not registered
- assert:
- that:
- - not output.changed
-
-- name: Try to reset configuration
- azure_rm_postgresqlconfiguration:
- resource_group: "{{ resource_group }}"
- server_name: postgresqlsrv{{ rpfx }}
- name: deadlock_timeout
- state: absent
- register: output
-- name: Assert that change was registered
- assert:
- that:
- - output.changed
-
-- name: Try to reset configuration -- idempotent
- azure_rm_postgresqlconfiguration:
- resource_group: "{{ resource_group }}"
- server_name: postgresqlsrv{{ rpfx }}
- name: deadlock_timeout
- state: absent
- register: output
-- name: Assert that change was registered
- assert:
- that:
- - not output.changed
-
-- name: Gather facts PostgreSQL Configuration
- azure_rm_postgresqlconfiguration_facts:
- resource_group: "{{ resource_group }}"
- server_name: postgresqlsrv{{ rpfx }}
- name: deadlock_timeout
- register: output
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.settings[0].id != None
- - output.settings[0].name != None
- - output.settings[0].value != None
- - output.settings[0].description != None
- - output.settings[0].source != None
- - output.settings | length == 1
-
-- name: Gather facts PostgreSQL Configuration
- azure_rm_postgresqlconfiguration_facts:
- resource_group: "{{ resource_group }}"
- server_name: postgresqlsrv{{ rpfx }}
- register: output
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.settings[0].id != None
- - output.settings[0].name != None
- - output.settings[0].value != None
- - output.settings[0].description != None
- - output.settings[0].source != None
- - output.settings | length > 1
-
-#
-# azure_rm_postgresqlserver continuation / clean up
-#
-
-- name: Delete instance of PostgreSQL Server -- check mode
- azure_rm_postgresqlserver:
- resource_group: "{{ resource_group }}"
- name: postgresqlsrv{{ rpfx }}
- state: absent
- check_mode: yes
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed
-
-- name: Delete instance of PostgreSQL Server
- azure_rm_postgresqlserver:
- resource_group: "{{ resource_group }}"
- name: postgresqlsrv{{ rpfx }}
- state: absent
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed
-
-- name: Delete unexisting instance of PostgreSQL Server
- azure_rm_postgresqlserver:
- resource_group: "{{ resource_group }}"
- name: postgresqlsrv{{ rpfx }}
- state: absent
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed == false
-
-- name: Delete second instance of PostgreSQL Server
- azure_rm_postgresqlserver:
- resource_group: "{{ resource_group }}"
- name: postgresqlsrv{{ rpfx }}second
- state: absent
- async: 400
- poll: 0
diff --git a/test/integration/targets/azure_rm_publicipaddress/aliases b/test/integration/targets/azure_rm_publicipaddress/aliases
deleted file mode 100644
index 7b5d7f9851..0000000000
--- a/test/integration/targets/azure_rm_publicipaddress/aliases
+++ /dev/null
@@ -1,4 +0,0 @@
-cloud/azure
-shippable/azure/group2
-destructive
-azure_rm_publicipaddress_facts
diff --git a/test/integration/targets/azure_rm_publicipaddress/meta/main.yml b/test/integration/targets/azure_rm_publicipaddress/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_publicipaddress/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_publicipaddress/tasks/main.yml b/test/integration/targets/azure_rm_publicipaddress/tasks/main.yml
deleted file mode 100644
index a5f929b0a3..0000000000
--- a/test/integration/targets/azure_rm_publicipaddress/tasks/main.yml
+++ /dev/null
@@ -1,113 +0,0 @@
-- name: Create domain name
- set_fact:
- domain_name: "ansible-{{ resource_group | hash('md5') | truncate(24, True, '') }}"
- rpfx: "{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
-
-- name: Remove public ip
- azure_rm_publicipaddress:
- resource_group: "{{ resource_group }}"
- name: "pip{{ rpfx }}"
- state: absent
-
-- name: Create public ip
- azure_rm_publicipaddress:
- resource_group: "{{ resource_group }}"
- name: "pip{{ rpfx }}"
- allocation_method: Static
- domain_name: "{{ domain_name }}"
- tags:
- testing: testing
- delete: on-exit
- register: output
-
-- assert:
- that:
- - output.state.public_ip_allocation_method == 'static'
- - output.state.dns_settings.domain_name_label == domain_name
- - output.state.tags | length == 2
- - output.state.tags.testing == 'testing'
-
-- name: Should be idempotent
- azure_rm_publicipaddress:
- resource_group: "{{ resource_group }}"
- name: "pip{{ rpfx }}"
- allocation_method: static
- domain_name: "{{ domain_name }}"
- register: output
-
-- assert:
- that: not output.changed
-
-- name: Update tags
- azure_rm_publicipaddress:
- resource_group: "{{ resource_group }}"
- name: "pip{{ rpfx }}"
- allocation_method: static
- domain_name: "{{ domain_name }}"
- append_tags: yes
- tags:
- delete: never
- foo: bar
- register: output
-
-- assert:
- that:
- - output.state.tags | length == 3
- - output.state.tags.delete == 'never'
-
-- name: Gather facts, filtering by tag
- azure_rm_publicipaddress_facts:
- resource_group: "{{ resource_group }}"
- tags:
- - testing
- - foo:bar
-
-- assert:
- that: azure_publicipaddresses | length == 1
-
-- name: Purge all tags
- azure_rm_publicipaddress:
- resource_group: "{{ resource_group }}"
- name: "pip{{ rpfx }}"
- allocation_method: static
- domain_name: "{{ domain_name }}"
- append_tags: no
- register: output
-
-- assert:
- that:
- - output.state.tags | length == 0
-
-- name: Gather facts for a public ip
- azure_rm_publicipaddress_facts:
- resource_group: "{{ resource_group }}"
- name: "pip{{ rpfx }}"
- register: pip
-
-- assert:
- that:
- - "pip.publicipaddresses | length == 1"
- - pip.publicipaddresses[0].name == "pip{{ rpfx }}"
- - pip.publicipaddresses[0].allocation_method == 'static'
- - pip.publicipaddresses[0].dns_settings.domain_name_label == domain_name
-
-- name: Gather facts for all public ips
- azure_rm_publicipaddress_facts:
- resource_group: "{{ resource_group }}"
-
-- assert:
- that: azure_publicipaddresses | length > 0
-
-- name: Remove public ip
- azure_rm_publicipaddress:
- resource_group: "{{ resource_group }}"
- name: "pip{{ rpfx }}"
- state: absent
-
-- name: Gather facts for a public ip
- azure_rm_publicipaddress_facts:
- resource_group: "{{ resource_group }}"
- name: "pip{{ rpfx }}"
-
-- assert:
- that: azure_publicipaddresses | length == 0
diff --git a/test/integration/targets/azure_rm_rediscache/aliases b/test/integration/targets/azure_rm_rediscache/aliases
deleted file mode 100644
index 09552ffcbb..0000000000
--- a/test/integration/targets/azure_rm_rediscache/aliases
+++ /dev/null
@@ -1,5 +0,0 @@
-cloud/azure
-shippable/azure/group2
-destructive
-azure_rm_rediscache_facts
-azure_rm_rediscachefirewallrule
diff --git a/test/integration/targets/azure_rm_rediscache/meta/main.yml b/test/integration/targets/azure_rm_rediscache/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_rediscache/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_rediscache/tasks/main.yml b/test/integration/targets/azure_rm_rediscache/tasks/main.yml
deleted file mode 100644
index dc0c61f39f..0000000000
--- a/test/integration/targets/azure_rm_rediscache/tasks/main.yml
+++ /dev/null
@@ -1,317 +0,0 @@
-- name: Fix resource prefix
- set_fact:
- redis_name: "redis-{{ resource_group | hash('md5') | truncate(7, True, '') }}-{{ 1000 | random }}"
- vnet_name: "vnet-{{ resource_group | hash('md5') | truncate(7, True, '') }}-{{ 1000 | random }}"
- subnet_name: "subnet-{{ resource_group | hash('md5') | truncate(7, True, '') }}-{{ 1000 | random }}"
- rule_name: "rule1"
- run_once: yes
-
-- name: Create a redis cache (Check Mode)
- azure_rm_rediscache:
- resource_group: "{{ resource_group }}"
- name: "{{ redis_name }}"
- sku:
- name: basic
- size: C1
- wait_for_provisioning: False
- check_mode: yes
- register: output
-
-- name: Assert creating redis cache check mode
- assert:
- that:
- - output.changed
-
-- name: Create a redis cache
- azure_rm_rediscache:
- resource_group: "{{ resource_group }}"
- name: "{{ redis_name }}"
- sku:
- name: basic
- size: C1
- wait_for_provisioning: False
- register: output
-
-- name: Assert creating redis cache
- assert:
- that:
- - output.changed
- - output.id
-
-- name: Get facts
- azure_rm_rediscache_facts:
- resource_group: "{{ resource_group }}"
- name: "{{ redis_name }}"
- register: facts
-
-- name: Assert facts
- assert:
- that:
- - facts.rediscaches | length == 1
- - facts.rediscaches[0].id != None
- - facts.rediscaches[0].host_name != None
- - facts.rediscaches[0].provisioning_state != None
- - facts.rediscaches[0].sku.name == 'basic'
- - facts.rediscaches[0].sku.size == 'C1'
-
-- name: Update the redis cache (idempotent)
- azure_rm_rediscache:
- resource_group: "{{ resource_group }}"
- name: "{{ redis_name }}"
- sku:
- name: basic
- size: C1
- wait_for_provisioning: False
- register: output
-
-- name: assert output not changed
- assert:
- that:
- - not output.changed
-
-- name: long-running rediscache tests [run with `--tags long_run,untagged` to enable]
- # creating redis Cache costs about 20 mins async operation,
- # need to poll status from Creating to Running, then able to perform updating/deleting operation,
- # otherwise, will met error:
- # "The resource '<resource_id>' is busy processing a previous update request or is undergoing system maintenance.
- # As such, it is currently unable to accept the update request. Please try again later."
- block:
- - name: Wait for Redis provisioning to complete
- azure_rm_rediscache_facts:
- resource_group: "{{ resource_group }}"
- name: "{{ redis_name }}"
- register: facts
- until: facts.rediscaches[0]['provisioning_state'] == 'Succeeded'
- retries: 30
- delay: 60
-
- - name: (actually) update redis cache
- azure_rm_rediscache:
- resource_group: "{{ resource_group }}"
- name: "{{ redis_name }}"
- sku:
- name: basic
- size: C1
- enable_non_ssl_port: true
- tags:
- testing: foo
- wait_for_provisioning: True
- register: output
-
- - name: assert output changed
- assert:
- that:
- - output.changed
-
- - name: Update redis cache configuration
- azure_rm_rediscache:
- resource_group: "{{ resource_group }}"
- name: "{{ redis_name }}"
- sku:
- name: basic
- size: C1
- enable_non_ssl_port: True
- maxmemory_policy: allkeys_lru
- tags:
- testing: foo
- register: output
-
- - name: assert output changed
- assert:
- that:
- - output.changed
-
- - name: Scale up the redis cache
- azure_rm_rediscache:
- resource_group: "{{ resource_group }}"
- name: "{{ redis_name }}"
- sku:
- name: standard
- size: C1
- tags:
- testing: foo
- wait_for_provisioning: True
- register: output
-
- - assert:
- that:
- - output.changed
-
- - name: Force reboot redis cache
- azure_rm_rediscache:
- resource_group: "{{ resource_group }}"
- name: "{{ redis_name }}"
- reboot:
- reboot_type: all
- register: output
-
- - assert:
- that:
- - output.changed
-
- - name: Delete the redis cache (Check Mode)
- azure_rm_rediscache:
- resource_group: "{{ resource_group }}"
- name: "{{ redis_name }}"
- state: absent
- check_mode: yes
- register: output
-
- - name: assert deleting redis cache check mode
- assert:
- that: output.changed
-
- - name: Delete the redis cache
- azure_rm_rediscache:
- resource_group: "{{ resource_group }}"
- name: "{{ redis_name }}"
- state: absent
- register: output
-
- - assert:
- that:
- - output.changed
- tags: [long_run, never]
-
-
-- name: Create virtual network
- azure_rm_virtualnetwork:
- resource_group: "{{ resource_group }}"
- name: "{{ vnet_name }}"
- address_prefixes: "10.10.0.0/16"
-
-- name: Add subnet
- azure_rm_subnet:
- resource_group: "{{ resource_group }}"
- name: "{{ subnet_name }}"
- address_prefix: "10.10.0.0/24"
- virtual_network: "{{ vnet_name }}"
-
-- name: Create redis with subnet
- azure_rm_rediscache:
- resource_group: "{{ resource_group }}"
- name: "{{ redis_name }}2"
- sku:
- name: premium
- size: P1
- subnet:
- name: "{{ subnet_name }}"
- virtual_network_name: "{{ vnet_name }}"
- wait_for_provisioning: False
- register: output
-
-- name: Assert creating redis cache
- assert:
- that:
- - output.changed
- - output.id
-
-- name: Get facts
- azure_rm_rediscache_facts:
- resource_group: "{{ resource_group }}"
- name: "{{ redis_name }}2"
- return_access_keys: True
- register: facts
-
-- name: Assert facts
- assert:
- that:
- - facts.rediscaches | length == 1
- - facts.rediscaches[0].subnet != None
- - facts.rediscaches[0].access_keys.primary != None
-
-- name: Create firewall rule (Check mode)
- azure_rm_rediscachefirewallrule:
- resource_group: "{{ resource_group }}"
- cache_name: "{{ redis_name }}2"
- name: "{{ rule_name }}"
- start_ip_address: 192.168.1.1
- end_ip_address: 192.168.1.4
- check_mode: yes
- register: output
-
-- name: Assert check mode creation
- assert:
- that:
- - output.changed
-
-
-- name: long-running rediscachefirewallrule tests [run with `--tags long_run,untagged` to enable]
-# Creating firewall rule need Redis status is running, while creating redis Cache costs about 20 mins async operation,
-# need to poll status from Creating to Running, then able to perform firewall rule creating,
-# otherwise, will met error:
-# "Error creating/updating Firewall rule of Azure Cache for Redis: Azure Error: Conflict\nMessage: The resource
-# '/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/myResourceGroup/providers/Microsoft.Cache/Redis/myRedis' is busy processing
-# a previous update request or is undergoing system maintenance. As such, it is currently unable to accept the update request. Please try again later."
- block:
- - name: Wait for Redis provisioning to complete
- azure_rm_rediscache_facts:
- resource_group: "{{ resource_group }}"
- name: "{{ redis_name }}2"
- register: facts
- until: facts.rediscaches[0]['provisioning_state'] == 'Succeeded'
- retries: 30
- delay: 60
-
- - name: Create firewall rule
- azure_rm_rediscachefirewallrule:
- resource_group: "{{ resource_group }}"
- cache_name: "{{ redis_name }}2"
- name: "{{ rule_name }}"
- start_ip_address: 192.168.1.1
- end_ip_address: 192.168.1.4
- register: output
-
- - name: Assert creation
- assert:
- that:
- - output.changed
- - output.id
-
- - name: Update firewall rule idempotence
- azure_rm_rediscachefirewallrule:
- resource_group: "{{ resource_group }}"
- cache_name: "{{ redis_name }}2"
- name: "{{ rule_name }}"
- start_ip_address: 192.168.1.1
- end_ip_address: 192.168.1.4
- register: output
-
- - name: Assert idempotence
- assert:
- that:
- - output.changed == False
-
- - name: Update firewall rule
- azure_rm_rediscachefirewallrule:
- resource_group: "{{ resource_group }}"
- cache_name: "{{ redis_name }}2"
- name: "{{ rule_name }}"
- end_ip_address: 192.168.1.5
- register: output
-
- - name: Assert updating
- assert:
- that:
- - output.changed
-
- - name: Delete firewall rule
- azure_rm_rediscachefirewallrule:
- resource_group: "{{ resource_group }}"
- cache_name: "{{ redis_name }}2"
- name: "{{ rule_name }}"
- state: absent
- register: output
-
- - name: Assert deletion
- assert:
- that:
- - output.changed
-
- - name: Delete the redis cache
- azure_rm_rediscache:
- resource_group: "{{ resource_group }}"
- name: "{{ redis_name }}2"
- state: absent
- register: output
- tags: [long_run, never] \ No newline at end of file
diff --git a/test/integration/targets/azure_rm_resource/aliases b/test/integration/targets/azure_rm_resource/aliases
deleted file mode 100644
index 49acfee76c..0000000000
--- a/test/integration/targets/azure_rm_resource/aliases
+++ /dev/null
@@ -1,3 +0,0 @@
-cloud/azure
-destructive
-shippable/azure/group2
diff --git a/test/integration/targets/azure_rm_resource/meta/main.yml b/test/integration/targets/azure_rm_resource/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_resource/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_resource/tasks/main.yml b/test/integration/targets/azure_rm_resource/tasks/main.yml
deleted file mode 100644
index 7c3024a5ef..0000000000
--- a/test/integration/targets/azure_rm_resource/tasks/main.yml
+++ /dev/null
@@ -1,158 +0,0 @@
-- name: Prepare random number
- set_fact:
- nsgname: "{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- storageaccountname: "stacc{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- dbname: "mdb{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- run_once: yes
-
-- name: Call REST API
- azure_rm_resource:
- api_version: '2018-02-01'
- resource_group: "{{ resource_group }}"
- provider: network
- resource_type: networksecuritygroups
- resource_name: "{{ nsgname }}"
- body:
- location: eastus
- idempotency: yes
- register: output
-
-- name: Assert that something has changed
- assert:
- that: output.changed
-
-- name: Call REST API
- azure_rm_resource:
- api_version: '2018-02-01'
- resource_group: "{{ resource_group }}"
- provider: network
- resource_type: networksecuritygroups
- resource_name: "{{ nsgname }}"
- body:
- location: eastus
- idempotency: yes
- register: output
-
-- name: Assert that nothing has changed
- assert:
- that: not output.changed
-
-- name: Call REST API
- azure_rm_resource:
- api_version: '2018-02-01'
- resource_group: "{{ resource_group }}"
- provider: network
- resource_type: networksecuritygroups
- resource_name: "{{ nsgname }}"
- body:
- location: eastus
- tags:
- a: "abc"
- b: "cde"
- idempotency: yes
- register: output
-
-- name: Assert that something has changed
- assert:
- that: output.changed
-
-- name: Try to get information about account
- azure_rm_resource_facts:
- api_version: '2018-02-01'
- resource_group: "{{ resource_group }}"
- provider: network
- resource_type: networksecuritygroups
- resource_name: "{{ nsgname }}"
- register: output
-
-- name: Assert value was returned
- assert:
- that:
- - not output.changed
- - output.response[0]['name'] != None
- - output.response | length == 1
-
-- name: Try to query a list
- azure_rm_resource_facts:
- api_version: '2018-02-01'
- resource_group: "{{ resource_group }}"
- provider: network
- resource_type: networksecuritygroups
- register: output
-- name: Assert value was returned
- assert:
- that:
- - not output.changed
- - output.response[0]['name'] != None
- - output.response | length >= 1
-
-- name: Try to query a list - same without API version
- azure_rm_resource_facts:
- resource_group: "{{ resource_group }}"
- provider: network
- resource_type: networksecuritygroups
- register: output
-- name: Assert value was returned
- assert:
- that:
- - not output.changed
- - output.response[0]['name'] != None
- - output.response | length >= 1
-
-- name: Query all the resources in the resource group
- azure_rm_resource_facts:
- resource_group: "{{ resource_group }}"
- resource_type: resources
- register: output
-- name: Assert value was returned
- assert:
- that:
- - not output.changed
- - output.response | length >= 1
-
-- name: Create storage account that requires LRO polling
- azure_rm_resource:
- polling_timeout: 600
- polling_interval: 60
- api_version: '2018-07-01'
- resource_group: "{{ resource_group }}"
- provider: Storage
- resource_type: storageAccounts
- resource_name: "{{ storageaccountname }}"
- body:
- sku:
- name: Standard_GRS
- kind: Storage
- location: eastus
- register: output
-
-- name: Assert that storage was successfully created
- assert:
- that: "output['response']['name'] == '{{ storageaccountname }}'"
-
-
-- name: Try to storage keys -- special case when subresource part has no name
- azure_rm_resource:
- resource_group: "{{ resource_group }}"
- provider: storage
- resource_type: storageAccounts
- resource_name: "{{ storageaccountname }}"
- subresource:
- - type: listkeys
- api_version: '2018-03-01-preview'
- method: POST
- register: keys
-
-- name: Assert that key was returned
- assert:
- that: keys['response']['keys'][0]['value'] | length > 0
-
-- name: Delete storage - without API version
- azure_rm_resource:
- polling_timeout: 600
- polling_interval: 60
- method: DELETE
- resource_group: "{{ resource_group }}"
- provider: Storage
- resource_type: storageAccounts
- resource_name: "{{ storageaccountname }}"
diff --git a/test/integration/targets/azure_rm_resourcegroup/aliases b/test/integration/targets/azure_rm_resourcegroup/aliases
deleted file mode 100644
index 0dbbfcebab..0000000000
--- a/test/integration/targets/azure_rm_resourcegroup/aliases
+++ /dev/null
@@ -1,4 +0,0 @@
-cloud/azure
-shippable/azure/group3
-destructive
-azure_rm_resourcegroup_info
diff --git a/test/integration/targets/azure_rm_resourcegroup/meta/main.yml b/test/integration/targets/azure_rm_resourcegroup/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_resourcegroup/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_resourcegroup/tasks/main.yml b/test/integration/targets/azure_rm_resourcegroup/tasks/main.yml
deleted file mode 100644
index 238509695f..0000000000
--- a/test/integration/targets/azure_rm_resourcegroup/tasks/main.yml
+++ /dev/null
@@ -1,39 +0,0 @@
-- name: Get resource group info
- azure_rm_resourcegroup_info:
- register: rg
-
-- assert:
- that:
- - rg.resourcegroups | length >= 1
-
-- name: Get resource group info
- azure_rm_resourcegroup_info:
- name: "{{ resource_group }}"
- list_resources: yes
- register: rg
-
-- assert:
- that:
- - rg.resourcegroups | length == 1
- - rg.resourcegroups[0].resources | length >= 0
-
-- name: Create resource group (idempontent)
- azure_rm_resourcegroup:
- name: "{{ resource_group }}"
- location: "{{ rg.resourcegroups[0].location }}"
- register: output
-
-- assert:
- that:
- - not output.changed
-
-- name: delete resource group
- azure_rm_resourcegroup:
- name: "{{ resource_group }}"
- state: absent
- check_mode: yes
- register: output
-
-- assert:
- that:
- - output.changed \ No newline at end of file
diff --git a/test/integration/targets/azure_rm_roledefinition/aliases b/test/integration/targets/azure_rm_roledefinition/aliases
deleted file mode 100644
index 35b9401151..0000000000
--- a/test/integration/targets/azure_rm_roledefinition/aliases
+++ /dev/null
@@ -1,3 +0,0 @@
-cloud/azure
-destructive
-unsupported \ No newline at end of file
diff --git a/test/integration/targets/azure_rm_roledefinition/meta/main.yml b/test/integration/targets/azure_rm_roledefinition/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_roledefinition/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_roledefinition/tasks/main.yml b/test/integration/targets/azure_rm_roledefinition/tasks/main.yml
deleted file mode 100644
index f024dd5a49..0000000000
--- a/test/integration/targets/azure_rm_roledefinition/tasks/main.yml
+++ /dev/null
@@ -1,207 +0,0 @@
-- name: Fix resource prefix
- set_fact:
- role_name: "{{ (resource_group | replace('-','x'))[-8:] }}{{ 1000 | random }}testrole"
- subscription_id: "{{ lookup('env','AZURE_SUBSCRIPTION_ID') }}"
- principal_id: "{{ lookup('env','AZURE_CLIENT_ID') }}"
- run_once: yes
-
-- name: Create a role definition (Check Mode)
- azure_rm_roledefinition:
- name: "{{ role_name }}"
- scope: "/subscriptions/{{ subscription_id }}/resourceGroups/{{ resource_group }}"
- permissions:
- - actions:
- - "Microsoft.Compute/virtualMachines/read"
- not_actions:
- - "Microsoft.Compute/virtualMachines/write"
- data_actions:
- - "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/read"
- not_data_actions:
- - "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/write"
- assignable_scopes:
- - "/subscriptions/{{ subscription_id }}/resourceGroups/{{ resource_group }}"
- check_mode: yes
- register: output
-
-- name: Assert creating role definition check mode
- assert:
- that:
- - output.changed
-
-- name: Create a role definition
- azure_rm_roledefinition:
- name: "{{ role_name }}"
- scope: "/subscriptions/{{ subscription_id }}/resourceGroups/{{ resource_group }}"
- permissions:
- - actions:
- - "Microsoft.Compute/virtualMachines/read"
- not_actions:
- - "Microsoft.Compute/virtualMachines/write"
- data_actions:
- - "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/read"
- not_data_actions:
- - "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/write"
- assignable_scopes:
- - "/subscriptions/{{ subscription_id }}/resourceGroups/{{ resource_group }}"
- register: output
-
-- name: Assert creating role definition
- assert:
- that:
- - output.changed
-
-- name: Get facts by type
- azure_rm_roledefinition_facts:
- scope: "/subscriptions/{{ subscription_id }}/resourceGroups/{{ resource_group }}"
- type: custom
- register: facts
-
-- name: Assert facts
- assert:
- that:
- - facts['roledefinitions'] | length > 1
-
-- name: Get facts by name
- azure_rm_roledefinition_facts:
- scope: "/subscriptions/{{ subscription_id }}/resourceGroups/{{ resource_group }}"
- role_name: "{{ role_name }}"
- register: facts
- until: facts.roledefinitions | length > 0
- retries: 50
- delay: 60
-
-- name: Assert facts
- assert:
- that:
- - facts['roledefinitions'] | length == 1
- - facts['roledefinitions'][0]['permissions'] | length == 1
- - facts['roledefinitions'][0]['permissions'][0]['not_data_actions'] | length == 1
- - facts['roledefinitions'][0]['permissions'][0]['data_actions'] | length == 1
-
-- name: Update the role definition (idempotent)
- azure_rm_roledefinition:
- name: "{{ role_name }}"
- scope: "/subscriptions/{{ subscription_id }}/resourceGroups/{{ resource_group }}"
- permissions:
- - actions:
- - "Microsoft.Compute/virtualMachines/read"
- not_actions:
- - "Microsoft.Compute/virtualMachines/write"
- data_actions:
- - "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/read"
- not_data_actions:
- - "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/write"
- assignable_scopes:
- - "/subscriptions/{{ subscription_id }}/resourceGroups/{{ resource_group }}"
- register: output
-
-- name: assert output not changed
- assert:
- that:
- - not output.changed
-
-- name: Update the role definition
- azure_rm_roledefinition:
- name: "{{ role_name }}"
- scope: "/subscriptions/{{ subscription_id }}/resourceGroups/{{ resource_group }}"
- permissions:
- - actions:
- - "Microsoft.Compute/virtualMachines/read"
- - "Microsoft.Compute/virtualMachines/start/action"
- not_actions:
- - "Microsoft.Compute/virtualMachines/write"
- data_actions:
- - "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/read"
- not_data_actions:
- - "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/write"
- assignable_scopes:
- - "/subscriptions/{{ subscription_id }}/resourceGroups/{{ resource_group }}"
- register: output
-
-- name: assert output changed
- assert:
- that:
- - output.changed
-
-- name: Get role definition facts
- azure_rm_roledefinition_facts:
- role_name: "{{ role_name }}"
- scope: "/subscriptions/{{ subscription_id }}/resourceGroups/{{ resource_group }}"
- type: custom
- register: roledef
- until: "{{ roledef.roledefinitions | length > 0 }}"
- retries: 50
- delay: 60
-
-- name: Assert role definition facts
- assert:
- that:
- - roledef['roledefinitions'] | length == 1
- - roledef['roledefinitions'][0]['id']
-
-- name: Create a role assignment (Check Mode)
- azure_rm_roleassignment:
- scope: "/subscriptions/{{ subscription_id }}/resourceGroups/{{ resource_group }}"
- assignee_object_id: "{{ principal_id }}"
- role_definition_id: "{{ roledef['roledefinitions'][0]['id'] }}"
- check_mode: yes
- register: output
-
-- name: Assert creating role definition check mode
- assert:
- that:
- - output.changed
-
-- name: Create a role assignment
- azure_rm_roleassignment:
- scope: "/subscriptions/{{ subscription_id }}/resourceGroups/{{ resource_group }}"
- assignee_object_id: "{{ principal_id }}"
- role_definition_id: "{{ roledef['roledefinitions'][0]['id'] }}"
- register: output
-
-- name: Assert creating role assignment
- assert:
- that:
- - output.changed
-
-- name: Get facts
- azure_rm_roleassignment_facts:
- scope: "/subscriptions/{{ subscription_id }}/resourceGroups/{{ resource_group }}"
- assignee: "{{ principal_id }}"
- role_definition_id: "{{ roledef['roledefinitions'][0]['id'] }}"
- register: facts
-
-- name: assert role assignment facts
- assert:
- that:
- - facts['roleassignments'] | length > 0
- - facts['roleassignments'][0]['id']
-
-- name: delete role assignment
- azure_rm_roleassignment:
- name: "{{ facts['roleassignments'][0]['id'].split('/')[-1] }}"
- scope: "/subscriptions/{{ subscription_id }}"
- state: absent
-
-- name: Delete the role definition (Check Mode)
- azure_rm_roledefinition:
- name: "{{ role_name }}"
- scope: "/subscriptions/{{ subscription_id }}/resourceGroups/{{ resource_group }}"
- state: absent
- check_mode: yes
- register: output
-
-- name: assert deleting role definition check mode
- assert:
- that: output.changed
-
-- name: Delete the role definition
- azure_rm_roledefinition:
- name: "{{ role_name }}"
- scope: "/subscriptions/{{ subscription_id }}/resourceGroups/{{ resource_group }}"
- state: absent
- register: output
-
-- assert:
- that:
- - output.changed
diff --git a/test/integration/targets/azure_rm_routetable/aliases b/test/integration/targets/azure_rm_routetable/aliases
deleted file mode 100644
index 759eafa2de..0000000000
--- a/test/integration/targets/azure_rm_routetable/aliases
+++ /dev/null
@@ -1,3 +0,0 @@
-cloud/azure
-shippable/azure/group3
-destructive
diff --git a/test/integration/targets/azure_rm_routetable/meta/main.yml b/test/integration/targets/azure_rm_routetable/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_routetable/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_routetable/tasks/main.yml b/test/integration/targets/azure_rm_routetable/tasks/main.yml
deleted file mode 100644
index 40c4159eac..0000000000
--- a/test/integration/targets/azure_rm_routetable/tasks/main.yml
+++ /dev/null
@@ -1,183 +0,0 @@
-- name: Prepare random number
- set_fact:
- name: "table{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- route_name: "route{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- run_once: yes
-
-- name: Create a route table (check mode)
- azure_rm_routetable:
- name: "{{ name }}"
- resource_group: "{{ resource_group }}"
- tags:
- purpose: testing
- check_mode: yes
- register: output
-
-- assert:
- that:
- - not output.id
- - output.changed
-
-- name: Create a route table
- azure_rm_routetable:
- name: "{{ name }}"
- resource_group: "{{ resource_group }}"
- tags:
- purpose: testing
- register: output
-
-- assert:
- that:
- - output.changed
- - output.id
-
-- name: Create a route table (idemponent)
- azure_rm_routetable:
- name: "{{ name }}"
- resource_group: "{{ resource_group }}"
- tags:
- purpose: testing
- register: output
-
-- assert:
- that:
- - not output.changed
-
-- name: Get facts of the table
- azure_rm_routetable_facts:
- name: "{{ name }}"
- resource_group: "{{ resource_group }}"
- register: output
-
-- assert:
- that:
- - "output.route_tables | length == 1"
- - "output.route_tables[0].routes | length == 0"
-
-- name: Create route (check mode)
- azure_rm_route:
- name: "{{ route_name }}"
- resource_group: "{{ resource_group }}"
- next_hop_type: virtual_network_gateway
- address_prefix: "10.1.0.0/16"
- route_table_name: "{{ name }}"
- check_mode: yes
- register: output
-
-- assert:
- that:
- - output.changed
- - not output.id
-
-- name: Create route
- azure_rm_route:
- name: "{{ route_name }}"
- resource_group: "{{ resource_group }}"
- next_hop_type: virtual_network_gateway
- address_prefix: "10.1.0.0/16"
- route_table_name: "{{ name }}"
- register: output
-
-- assert:
- that:
- - output.changed
- - output.id
-
-- name: Create route (idemponent)
- azure_rm_route:
- name: "{{ route_name }}"
- resource_group: "{{ resource_group }}"
- next_hop_type: virtual_network_gateway
- address_prefix: "10.1.0.0/16"
- route_table_name: "{{ name }}"
- register: output
-
-- assert:
- that:
- - not output.changed
-
-- name: update route
- azure_rm_route:
- name: "{{ route_name }}"
- resource_group: "{{ resource_group }}"
- next_hop_type: virtual_network_gateway
- address_prefix: "10.1.0.0/24"
- route_table_name: "{{ name }}"
- register: output
-
-- assert:
- that:
- - output.changed
-
-- name: Get facts of the table
- azure_rm_routetable_facts:
- name: "{{ name }}"
- resource_group: "{{ resource_group }}"
- register: output
-
-- assert:
- that:
- - "output.route_tables | length == 1"
- - "output.route_tables[0].routes | length == 1"
- - output.route_tables[0].routes[0].address_prefix == '10.1.0.0/24'
-
-- name: Delete route (check mode)
- azure_rm_route:
- name: "{{ route_name }}"
- resource_group: "{{ resource_group }}"
- route_table_name: "{{ name }}"
- state: absent
- check_mode: yes
-
-- name: Delete route
- azure_rm_route:
- name: "{{ route_name }}"
- resource_group: "{{ resource_group }}"
- state: absent
- route_table_name: "{{ name }}"
- register: output
-
-- assert:
- that:
- - output.changed
-
-- name: Delete route (idemponent)
- azure_rm_route:
- name: "{{ route_name }}"
- resource_group: "{{ resource_group }}"
- state: absent
- route_table_name: "{{ name }}"
- register: output
-
-- assert:
- that:
- - not output.changed
-
-- name: Delete route table (check mode)
- azure_rm_routetable:
- name: "{{ name }}"
- resource_group: "{{ resource_group }}"
- state: absent
- check_mode: yes
-
-- name: Delete route table
- azure_rm_routetable:
- name: "{{ name }}"
- resource_group: "{{ resource_group }}"
- state: absent
- register: output
-
-- assert:
- that:
- - output.changed
-
-- name: Delete route table (idemponent)
- azure_rm_routetable:
- name: "{{ name }}"
- resource_group: "{{ resource_group }}"
- state: absent
- register: output
-
-- assert:
- that:
- - not output.changed
diff --git a/test/integration/targets/azure_rm_securitygroup/aliases b/test/integration/targets/azure_rm_securitygroup/aliases
deleted file mode 100644
index 4f09ea58b8..0000000000
--- a/test/integration/targets/azure_rm_securitygroup/aliases
+++ /dev/null
@@ -1,4 +0,0 @@
-cloud/azure
-shippable/azure/group2
-destructive
-azure_rm_securitygroup_facts
diff --git a/test/integration/targets/azure_rm_securitygroup/meta/main.yml b/test/integration/targets/azure_rm_securitygroup/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_securitygroup/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_securitygroup/tasks/main.yml b/test/integration/targets/azure_rm_securitygroup/tasks/main.yml
deleted file mode 100644
index 658c1c9a98..0000000000
--- a/test/integration/targets/azure_rm_securitygroup/tasks/main.yml
+++ /dev/null
@@ -1,302 +0,0 @@
-- name: Prepare random number
- set_fact:
- secgroupname: "sg{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- asg_name1: "asg1{{ resource_group | hash('md5') | truncate(7, True, '') }}"
- asg_name2: "asg2{{ resource_group | hash('md5') | truncate(7, True, '') }}"
- sg_name1: "sgasg{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- run_once: yes
-
-
-- name: Create security group
- azure_rm_securitygroup:
- resource_group: "{{ resource_group }}"
- name: "{{ secgroupname }}"
- tags:
- testing: testing
- delete: on-exit
- foo: bar
- purge_rules: yes
- rules:
- - name: DenySSH
- protocol: Tcp
- destination_port_range: 22
- access: Deny
- priority: 100
- direction: Inbound
- - name: AllowSSH
- protocol: Tcp
- source_address_prefix: 174.109.158.0/24
- destination_port_range: 22
- access: Allow
- priority: 101
- direction: Inbound
- register: output
-
-- assert: { that: "{{ output.state.rules | length }} == 2" }
-
-- name: Gather facts by tags
- azure_rm_securitygroup_info:
- resource_group: "{{ resource_group }}"
- tags:
- - testing
- - foo:bar
- register: output
-
-- assert:
- that: output.securitygroups | length == 1
-
-- name: Add/Update rules on existing security group
- azure_rm_securitygroup:
- resource_group: "{{ resource_group }}"
- name: "{{ secgroupname }}"
- rules:
- - name: AllowSSH
- protocol: Tcp
- source_address_prefix: 174.108.158.0/24
- destination_port_range: 22
- access: Allow
- priority: 101
- - name: AllowSSHFromHome
- protocol: Tcp
- source_address_prefix: 174.109.158.0/24
- destination_port_range: 22-23
- priority: 102
- register: output
-
-- assert:
- that:
- - "{{ output.state.rules | length }} == 3"
- - output.state.rules[0].source_address_prefix == '174.108.158.0/24'
-
-- name: Test idempotence
- azure_rm_securitygroup:
- resource_group: "{{ resource_group }}"
- name: "{{ secgroupname }}"
- rules:
- - name: AllowSSH
- protocol: Tcp
- source_address_prefix: 174.108.158.0/24
- destination_port_range: 22
- access: Allow
- priority: 101
- - name: AllowSSHFromHome
- protocol: Tcp
- source_address_prefix: 174.109.158.0/24
- destination_port_range: 22-23
- priority: 102
- register: output
-
-- assert:
- that: not output.changed
-
-- name: Update tags
- azure_rm_securitygroup:
- resource_group: "{{ resource_group }}"
- name: "{{ secgroupname }}"
- tags:
- testing: testing
- delete: never
- baz: bar
- append_tags: false
- register: output
-
-- assert:
- that:
- - output.state.tags | length == 3
- - output.state.tags.delete == 'never'
-
-- name: Purge tags
- azure_rm_securitygroup:
- resource_group: "{{ resource_group }}"
- name: "{{ secgroupname }}"
- append_tags: false
- tags:
- testing: testing
- delete: on-exit
- register: output
-
-- assert:
- that:
- - output.state.tags | length == 2
- - output.state.tags.delete == 'on-exit'
-
-- name: Gather facts for one accounts
- azure_rm_securitygroup_info:
- resource_group: "{{ resource_group }}"
- name: "{{ secgroupname }}"
- register: output
-
-- assert:
- that:
- - output.securitygroups | length == 1
-
-- name: Gather facts for all accounts
- azure_rm_securitygroup_info:
- resource_group: "{{ resource_group }}"
- register: output_groups
-
-- assert:
- that:
- - output_groups.securitygroups | length > 0
-
-- name: Create security group with source_address_prefixes
- azure_rm_securitygroup:
- resource_group: "{{ resource_group }}"
- name: "{{ secgroupname }}"
- tags:
- testing: testing
- delete: on-exit
- foo: bar
- purge_rules: yes
- rules:
- - name: AllowSSH
- protocol: Tcp
- source_address_prefix:
- - 52.100.120.240
- - 53.100.250.190
- - 54.110.200.200
- destination_port_range: 22
- access: Allow
- priority: 101
- direction: Inbound
- register: output
-
-- assert:
- that:
- - "{{ output.state.rules | length }} == 1"
- - "{{ output.state.rules[0].source_address_prefixes | length }} == 3"
- - not output.state.rules[0].source_address_prefix
-
-- name: Create security group with source_address_prefixes(idempontent)
- azure_rm_securitygroup:
- resource_group: "{{ resource_group }}"
- name: "{{ secgroupname }}"
- tags:
- testing: testing
- delete: on-exit
- foo: bar
- purge_rules: yes
- rules:
- - name: AllowSSH
- protocol: Tcp
- source_address_prefix:
- - 52.100.120.240
- - 53.100.250.190
- - 54.110.200.200
- destination_port_range: 22
- access: Allow
- priority: 101
- direction: Inbound
- register: output
-
-- assert:
- that: not output.changed
-
-- name: Add a single one group
- azure_rm_securitygroup:
- resource_group: "{{ resource_group }}"
- name: "{{ secgroupname }}"
- tags:
- testing: testing
- delete: on-exit
- foo: bar
- rules:
- - name: DenySSH
- protocol: Tcp
- source_address_prefix:
- - 54.120.120.240
- destination_port_range: 22
- access: Deny
- priority: 102
- direction: Inbound
- register: output
-
-- assert:
- that:
- - output.changed
- - "{{ output.state.rules | length }} == 2"
-
-- name: Create Application security group 1
- azure_rm_applicationsecuritygroup:
- resource_group: "{{ resource_group }}"
- name: "{{ asg_name1 }}"
- tags:
- testing: testing
- register: asg1
-
-- name: Create Application security group 2
- azure_rm_applicationsecuritygroup:
- resource_group: "{{ resource_group_secondary }}"
- name: "{{ asg_name2 }}"
- tags:
- testing: testing
- register: asg2
-
-- name: Create security group with application security group
- azure_rm_securitygroup:
- resource_group: "{{ resource_group }}"
- name: "{{ sg_name1 }}"
- purge_rules: yes
- rules:
- - name: AsgToAsg
- protocol: Tcp
- source_application_security_groups:
- - "{{ asg1.id }}"
- destination_application_security_groups:
- - resource_group: "{{ resource_group_secondary }}"
- name: "{{ asg_name2 }}"
- destination_port_range: 22
- access: Allow
- priority: 101
- direction: Inbound
- register: output
-
-- assert:
- that:
- - output.changed
-
-- name: Create security group with application security group - Idempotent
- azure_rm_securitygroup:
- resource_group: "{{ resource_group }}"
- name: "{{ sg_name1 }}"
- purge_rules: yes
- rules:
- - name: AsgToAsg
- protocol: Tcp
- source_application_security_groups:
- - "{{ asg_name1 }}"
- destination_application_security_groups:
- - resource_group: "{{ resource_group_secondary }}"
- name: "{{ asg_name2 }}"
- destination_port_range: 22
- access: Allow
- priority: 101
- direction: Inbound
- register: output
-
-- assert:
- that:
- - not output.changed
-
-
-- name: Delete security group
- azure_rm_securitygroup:
- resource_group: "{{ resource_group }}"
- name: "{{ sg_name1 }}"
- state: absent
-
-- name: Delete all security groups
- azure_rm_securitygroup:
- resource_group: "{{ resource_group }}"
- name: "{{ item.name }}"
- state: absent
- with_items: "{{ output_groups.securitygroups }}"
-
-- name: Should have no security groups remaining
- azure_rm_securitygroup_info:
- resource_group: "{{ resource_group }}"
- register: output
-
-- assert:
- that:
- - output.securitygroups | length == 0
diff --git a/test/integration/targets/azure_rm_servicebus/aliases b/test/integration/targets/azure_rm_servicebus/aliases
deleted file mode 100644
index 239e365779..0000000000
--- a/test/integration/targets/azure_rm_servicebus/aliases
+++ /dev/null
@@ -1,3 +0,0 @@
-cloud/azure
-shippable/azure/group4
-destructive
diff --git a/test/integration/targets/azure_rm_servicebus/meta/main.yml b/test/integration/targets/azure_rm_servicebus/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_servicebus/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_servicebus/tasks/main.yml b/test/integration/targets/azure_rm_servicebus/tasks/main.yml
deleted file mode 100644
index c12d635a1d..0000000000
--- a/test/integration/targets/azure_rm_servicebus/tasks/main.yml
+++ /dev/null
@@ -1,169 +0,0 @@
-- name: Prepare random number
- set_fact:
- rpfx: "{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- run_once: yes
-
-- name: Create a namespace
- azure_rm_servicebus:
- name: "ns{{ rpfx }}"
- resource_group: "{{ resource_group }}"
- register: namespace
-
-- assert:
- that:
- - namespace.id
- - namespace.changed
-
-- name: Create a namespace (idempontent)
- azure_rm_servicebus:
- name: "ns{{ rpfx }}"
- resource_group: "{{ resource_group }}"
- register: namespace
-
-- assert:
- that:
- - not namespace.changed
-
-- name: Create a queue
- azure_rm_servicebusqueue:
- name: "queue{{ rpfx }}"
- namespace: "ns{{ rpfx }}"
- resource_group: "{{ resource_group }}"
- register: queue
-
-- assert:
- that:
- - queue.id
- - queue.changed
-
-- name: Create a topic (check mode)
- azure_rm_servicebustopic:
- name: "topic{{ rpfx }}"
- resource_group: "{{ resource_group }}"
- namespace: "ns{{ rpfx }}"
- duplicate_detection_time_in_seconds: 600
- check_mode: yes
- register: output
-
-- assert:
- that:
- - output.changed
-
-- name: Create a topic
- azure_rm_servicebustopic:
- name: "topic{{ rpfx }}"
- resource_group: "{{ resource_group }}"
- namespace: "ns{{ rpfx }}"
- duplicate_detection_time_in_seconds: 600
- register: output
-
-- assert:
- that:
- - output.changed
- - output.id
- - "'subscription_count' not in output"
-
-- name: Create a topic (idempontent)
- azure_rm_servicebustopic:
- name: "topic{{ rpfx }}"
- resource_group: "{{ resource_group }}"
- namespace: "ns{{ rpfx }}"
- duplicate_detection_time_in_seconds: 600
- register: output
-
-- assert:
- that:
- - not output.changed
-
-- name: Create test policy
- azure_rm_servicebussaspolicy:
- name: testpolicy
- resource_group: "{{ resource_group }}"
- namespace: "ns{{ rpfx }}"
- topic: "topic{{ rpfx }}"
- rights: manage
-
-- name: Create a subscription
- azure_rm_servicebustopicsubscription:
- name: "subs{{ rpfx }}"
- resource_group: "{{ resource_group }}"
- namespace: "ns{{ rpfx }}"
- topic: "topic{{ rpfx }}"
- register: subs
-
-- assert:
- that:
- - subs.id
- - subs.changed
-
-- name: Retrive topic
- azure_rm_servicebus_facts:
- type: topic
- name: "topic{{ rpfx }}"
- resource_group: "{{ resource_group }}"
- namespace: "ns{{ rpfx }}"
- show_sas_policies: yes
- register: facts
-
-- assert:
- that:
- - "facts.servicebuses | length == 1"
- - facts.servicebuses[0].id == output.id
- - facts.servicebuses[0].subscription_count == 1
- - facts.servicebuses[0].sas_policies.testpolicy
- - facts.servicebuses[0].sas_policies.testpolicy.rights == 'manage'
-
-- name: Delete subscription
- azure_rm_servicebustopicsubscription:
- name: "subs{{ rpfx }}"
- resource_group: "{{ resource_group }}"
- namespace: "ns{{ rpfx }}"
- topic: "topic{{ rpfx }}"
- state: absent
-
-- name: Retrive topic
- azure_rm_servicebus_facts:
- type: topic
- name: "topic{{ rpfx }}"
- resource_group: "{{ resource_group }}"
- namespace: "ns{{ rpfx }}"
- show_sas_policies: yes
- register: facts
-
-- assert:
- that:
- - facts.servicebuses[0].subscription_count == 0
- - "facts.servicebuses | length == 1"
-
-- name: Delete topic
- azure_rm_servicebustopic:
- name: "topic{{ rpfx }}"
- resource_group: "{{ resource_group }}"
- namespace: "ns{{ rpfx }}"
- state: absent
-
-- name: Retrive topic
- azure_rm_servicebus_facts:
- name: "topic{{ rpfx }}"
- type: topic
- resource_group: "{{ resource_group }}"
- namespace: "ns{{ rpfx }}"
- show_sas_policies: yes
- register: facts
-
-- assert:
- that:
- - "facts.servicebuses | length == 0"
-
-- name: Delete queue
- azure_rm_servicebusqueue:
- name: "queue{{ rpfx }}"
- resource_group: "{{ resource_group }}"
- namespace: "ns{{ rpfx }}"
- state: absent
-
-- name: Delete namespace
- azure_rm_servicebus:
- name: "ns{{ rpfx }}"
- resource_group: "{{ resource_group }}"
- state: absent \ No newline at end of file
diff --git a/test/integration/targets/azure_rm_sqlserver/aliases b/test/integration/targets/azure_rm_sqlserver/aliases
deleted file mode 100644
index 952e4dac80..0000000000
--- a/test/integration/targets/azure_rm_sqlserver/aliases
+++ /dev/null
@@ -1,8 +0,0 @@
-cloud/azure
-destructive
-shippable/azure/group9
-azure_rm_sqlserver_facts
-azure_rm_sqldatabase
-azure_rm_sqldatabase_facts
-azure_rm_sqlfirewallrule
-azure_rm_sqlfirewallrule_facts
diff --git a/test/integration/targets/azure_rm_sqlserver/meta/main.yml b/test/integration/targets/azure_rm_sqlserver/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_sqlserver/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_sqlserver/tasks/main.yml b/test/integration/targets/azure_rm_sqlserver/tasks/main.yml
deleted file mode 100644
index a85e25efb1..0000000000
--- a/test/integration/targets/azure_rm_sqlserver/tasks/main.yml
+++ /dev/null
@@ -1,419 +0,0 @@
-- name: Prepare random number
- set_fact:
- random_postfix: "{{ 1000 | random }}{{ resource_group | hash('md5') | truncate(7, True, '') }}"
- run_once: yes
-
-- name: Create instance of SQL Server -- check mode
- azure_rm_sqlserver:
- resource_group: "{{ resource_group }}"
- name: "sqlsrv{{ random_postfix }}"
- location: eastus
- admin_username: mylogin
- admin_password: Testpasswordxyz12!
- check_mode: yes
- register: output
-- name: Assert the resource instance is well created
- assert:
- that:
- - output.changed
-
-- name: Create instance of SQL Server
- azure_rm_sqlserver:
- resource_group: "{{ resource_group }}"
- name: "sqlsrv{{ random_postfix }}"
- location: eastus
- admin_username: mylogin
- admin_password: Testpasswordxyz12!
- tags:
- aaa: bbb
- register: output
-- name: Assert the resource instance is well created
- assert:
- that:
- - output.changed
- - output.state == 'Ready'
-
-- name: Create again instance of SQL Server
- azure_rm_sqlserver:
- resource_group: "{{ resource_group }}"
- name: "sqlsrv{{ random_postfix }}"
- location: eastus
- admin_username: mylogin
- admin_password: Testpasswordxyz12!
- register: output
-- name: Assert the state has not changed
- assert:
- that:
- - output.changed == false
- - output.state == 'Ready'
-
-# azure_rm_sqlserver_facts tests
-
-- name: Gather facts SQL Server
- azure_rm_sqlserver_facts:
- resource_group: "{{ resource_group }}"
- server_name: "sqlsrv{{ random_postfix }}"
- register: output
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.servers.sqlsrv{{ random_postfix }}.id != None
- - output.servers.sqlsrv{{ random_postfix }}.name == "sqlsrv{{ random_postfix }}"
- - output.servers.sqlsrv{{ random_postfix }}.type != None
- - output.servers.sqlsrv{{ random_postfix }}.location != None
- - output.servers.sqlsrv{{ random_postfix }}.kind != None
- - output.servers.sqlsrv{{ random_postfix }}.version != None
- - output.servers.sqlsrv{{ random_postfix }}.state != None
- - output.servers.sqlsrv{{ random_postfix }}.fully_qualified_domain_name != None
- - output.servers.sqlsrv{{ random_postfix }}.tags.aaa == 'bbb'
-
-- name: Gather facts SQL Server - unexisting
- azure_rm_sqlserver_facts:
- resource_group: "{{ resource_group }}"
- server_name: "unexisting"
- register: output
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.servers == {}
-
-- name: Gather facts SQL Server - list
- azure_rm_sqlserver_facts:
- resource_group: "{{ resource_group }}"
- register: output
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.servers.sqlsrv{{ random_postfix }}.id != None
- - output.servers.sqlsrv{{ random_postfix }}.name == "sqlsrv{{ random_postfix }}"
- - output.servers.sqlsrv{{ random_postfix }}.type != None
- - output.servers.sqlsrv{{ random_postfix }}.location != None
- - output.servers.sqlsrv{{ random_postfix }}.kind != None
- - output.servers.sqlsrv{{ random_postfix }}.version != None
- - output.servers.sqlsrv{{ random_postfix }}.state != None
- - output.servers.sqlsrv{{ random_postfix }}.fully_qualified_domain_name != None
-
-# azure_rm_sqldatabase tests
-
-- name: Create instance of SQL Database -- check mode
- azure_rm_sqldatabase:
- resource_group: "{{ resource_group }}"
- server_name: sqlsrv{{ random_postfix }}
- name: database{{ random_postfix }}
- location: eastus
- check_mode: yes
- register: output
-- name: Assert the resource instance is well created
- assert:
- that:
- - output.changed
-
-- name: Create instance of SQL Database
- azure_rm_sqldatabase:
- resource_group: "{{ resource_group }}"
- server_name: sqlsrv{{ random_postfix }}
- name: database{{ random_postfix }}
- location: eastus
- tags:
- aaa: bbb
- register: output
-- name: Assert the resource instance is well created
- assert:
- that:
- - output.changed
- - output.status == 'Online'
-
-- name: Create again instance of SQL Database
- azure_rm_sqldatabase:
- resource_group: "{{ resource_group }}"
- server_name: sqlsrv{{ random_postfix }}
- name: database{{ random_postfix }}
- location: eastus
- tags:
- aaa: bbb
- register: output
-- name: Assert the state has not changed
- assert:
- that:
- - output.changed == false
- - output.status == 'Online'
-
-# test database facter:
-- name: Create second SQL Database
- azure_rm_sqldatabase:
- resource_group: "{{ resource_group }}"
- server_name: sqlsrv{{ random_postfix }}
- name: database{{ random_postfix }}second
- location: eastus
-
-- name: Gather facts SQL Database
- azure_rm_sqldatabase_facts:
- resource_group: "{{ resource_group }}"
- server_name: sqlsrv{{ random_postfix }}
- name: database{{ random_postfix }}
- register: output
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.databases[0].id != None
- - output.databases[0].name != None
- - output.databases[0].location != None
- - output.databases[0].sku.name != None
- - output.databases[0].sku.tier != None
- - output.databases[0].sku.capacity != None
- - output.databases[0].kind != None
- - output.databases[0].status != None
-
-- name: Gather facts SQL Database
- azure_rm_sqldatabase_facts:
- resource_group: "{{ resource_group }}"
- server_name: sqlsrv{{ random_postfix }}
- register: output
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.databases[0].id != None
- - output.databases[0].name != None
- - output.databases[0].location != None
- - output.databases[0].sku.name != None
- - output.databases[0].sku.tier != None
- - output.databases[0].sku.capacity != None
- - output.databases[0].kind != None
- - output.databases[0].status != None
- - output.databases[1].id != None
- - output.databases[1].name != None
- - output.databases[1].location != None
- - output.databases[1].sku.name != None
- - output.databases[1].sku.tier != None
- - output.databases[1].sku.capacity != None
- - output.databases[1].kind != None
- - output.databases[1].status != None
-
-- name: Delete instance of secondary database
- azure_rm_sqldatabase:
- resource_group: "{{ resource_group }}"
- server_name: sqlsrv{{ random_postfix }}
- name: database{{ random_postfix }}second
- state: absent
-
-# clean up databases
-- name: Delete instance of SQL Database -- check mode
- azure_rm_sqldatabase:
- resource_group: "{{ resource_group }}"
- server_name: sqlsrv{{ random_postfix }}
- name: database{{ random_postfix }}
- state: absent
- check_mode: yes
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed
-
-- name: Delete instance of SQL Database
- azure_rm_sqldatabase:
- resource_group: "{{ resource_group }}"
- server_name: sqlsrv{{ random_postfix }}
- name: database{{ random_postfix }}
- state: absent
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed
-
-- name: Delete unexisting instance of SQL Database
- azure_rm_sqldatabase:
- resource_group: "{{ resource_group }}"
- server_name: sqlsrv{{ random_postfix }}
- name: database{{ random_postfix }}
- state: absent
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed == false
-
-# test database facts without databases
-- name: Gather facts SQL Database
- azure_rm_sqldatabase_facts:
- resource_group: "{{ resource_group }}"
- server_name: sqlsrv{{ random_postfix }}
- name: database{{ random_postfix }}
- register: output
-- name: Assert that empty dictionary was returned
- assert:
- that:
- - output.changed == False
- - output.databases | length == 0
-
-- name: Gather facts SQL Database
- azure_rm_sqldatabase_facts:
- resource_group: "{{ resource_group }}"
- server_name: sqlsrv{{ random_postfix }}
- register: output
-- name: Assert that empty dictionary was returned (one database is there by default)
- assert:
- that:
- - output.changed == False
- - output.databases | length == 1
-
-# azure_rm_sqlfirewallrule tests
-
-- name: Create instance of Firewall Rule -- check mode
- azure_rm_sqlfirewallrule:
- resource_group: "{{ resource_group }}"
- server_name: "sqlsrv{{ random_postfix }}"
- name: firewallrule{{ random_postfix }}
- start_ip_address: 172.28.10.136
- end_ip_address: 172.28.10.138
- check_mode: yes
- register: output
-- name: Assert the resource instance is well created
- assert:
- that:
- - output.changed
-
-- name: Create instance of Firewall Rule
- azure_rm_sqlfirewallrule:
- resource_group: "{{ resource_group }}"
- server_name: "sqlsrv{{ random_postfix }}"
- name: firewallrule{{ random_postfix }}
- start_ip_address: 172.28.10.136
- end_ip_address: 172.28.10.138
- register: output
-- name: Assert the resource instance is well created
- assert:
- that:
- - output.changed
-
-- name: Create again instance of Firewall Rule
- azure_rm_sqlfirewallrule:
- resource_group: "{{ resource_group }}"
- server_name: "sqlsrv{{ random_postfix }}"
- name: firewallrule{{ random_postfix }}
- start_ip_address: 172.28.10.136
- end_ip_address: 172.28.10.138
- register: output
-- name: Assert the state has not changed
- assert:
- that:
- - output.changed == false
-
-#
-# azure_rm_sqlserverfirewallrule_facts
-#
-
-- name: Create Firewall Rule - second
- azure_rm_sqlfirewallrule:
- resource_group: "{{ resource_group }}"
- server_name: sqlsrv{{ random_postfix }}
- name: firewallrule{{ random_postfix }}second
- start_ip_address: 172.28.10.136
- end_ip_address: 172.28.10.138
-
-- name: Gather facts SQL Firewall Rule
- azure_rm_sqlfirewallrule_facts:
- resource_group: "{{ resource_group }}"
- server_name: sqlsrv{{ random_postfix }}
- name: firewallrule{{ random_postfix }}
- register: output
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.rules[0].id != None
- - output.rules[0].resource_group != None
- - output.rules[0].server_name != None
- - output.rules[0].name != None
- - output.rules[0].start_ip_address != None
- - output.rules[0].end_ip_address != None
-
-- name: Gather facts SQL Firewall Rule
- azure_rm_sqlfirewallrule_facts:
- resource_group: "{{ resource_group }}"
- server_name: sqlsrv{{ random_postfix }}
- register: output
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.rules[0].id != None
- - output.rules[0].id != None
- - output.rules[0].resource_group != None
- - output.rules[0].server_name != None
- - output.rules[0].name != None
- - output.rules[0].start_ip_address != None
- - output.rules[0].end_ip_address != None
- - output.rules[1].id != None
- - output.rules[1].resource_group != None
- - output.rules[1].server_name != None
- - output.rules[1].name != None
- - output.rules[1].start_ip_address != None
- - output.rules[1].end_ip_address != None
-
-- name: Delete instance of Firewall Rule
- azure_rm_sqlfirewallrule:
- resource_group: "{{ resource_group }}"
- server_name: sqlsrv{{ random_postfix }}
- name: firewallrule{{ random_postfix }}
- state: absent
-- name: Delete instance of Firewall Rule
- azure_rm_sqlfirewallrule:
- resource_group: "{{ resource_group }}"
- server_name: sqlsrv{{ random_postfix }}
- name: firewallrule{{ random_postfix }}second
- state: absent
-
-- name: Gather facts SQL Firewall Rule
- azure_rm_sqlfirewallrule_facts:
- resource_group: "{{ resource_group }}"
- server_name: sqlsrv{{ random_postfix }}
- name: firewallrule{{ random_postfix }}
- register: output
-- name: Assert that empty dictionary was returned
- assert:
- that:
- - output.changed == False
- - output.rules | length == 0
-
-# finalise & clean up azure_rm_sqlserver test
-
-- name: Delete instance of SQL Server -- check mode
- azure_rm_sqlserver:
- resource_group: "{{ resource_group }}"
- name: "sqlsrv{{ random_postfix }}"
- state: absent
- check_mode: yes
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed
-
-- name: Delete instance of SQL Server
- azure_rm_sqlserver:
- resource_group: "{{ resource_group }}"
- name: "sqlsrv{{ random_postfix }}"
- state: absent
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed
-
-- name: Delete unexisting instance of SQL Server
- azure_rm_sqlserver:
- resource_group: "{{ resource_group }}"
- name: "sqlsrv{{ random_postfix }}"
- state: absent
- register: output
-- name: Assert the state has changed
- assert:
- that:
- - output.changed == false
diff --git a/test/integration/targets/azure_rm_storageaccount/aliases b/test/integration/targets/azure_rm_storageaccount/aliases
deleted file mode 100644
index cbb31e489d..0000000000
--- a/test/integration/targets/azure_rm_storageaccount/aliases
+++ /dev/null
@@ -1,4 +0,0 @@
-cloud/azure
-shippable/azure/group2
-destructive
-disabled
diff --git a/test/integration/targets/azure_rm_storageaccount/meta/main.yml b/test/integration/targets/azure_rm_storageaccount/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_storageaccount/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_storageaccount/tasks/main.yml b/test/integration/targets/azure_rm_storageaccount/tasks/main.yml
deleted file mode 100644
index 8713dd2c31..0000000000
--- a/test/integration/targets/azure_rm_storageaccount/tasks/main.yml
+++ /dev/null
@@ -1,158 +0,0 @@
- - name: Create storage account name
- set_fact:
- storage_account: "{{ resource_group | hash('md5') | truncate(24, True, '') }}"
-
- - name: Test invalid account name
- azure_rm_storageaccount:
- resource_group: "{{ resource_group }}"
- name: "invalid_char$"
- register: invalid_name
- ignore_errors: yes
-
- - name: Assert task failed
- assert: { that: "invalid_name['failed'] == True" }
-
- - name: Delete storage account
- azure_rm_storageaccount:
- resource_group: "{{ resource_group }}"
- name: "{{ storage_account }}"
- state: absent
- force_delete_nonempty: True
-
- - name: Create new storage account
- azure_rm_storageaccount:
- resource_group: "{{ resource_group }}"
- name: "{{ storage_account }}"
- account_type: Standard_LRS
- append_tags: no
- blob_cors:
- - allowed_origins:
- - http://www.example.com/
- allowed_methods:
- - GET
- - POST
- allowed_headers:
- - x-ms-meta-data*
- - x-ms-meta-target*
- - x-ms-meta-abc
- exposed_headers:
- - x-ms-meta-*
- max_age_in_seconds: 200
- tags:
- test: test
- galaxy: galaxy
- register: output
-
- - name: Assert status succeeded and results include an Id value
- assert:
- that:
- - output.changed
- - output.state.id is defined
- - output.state.blob_cors | length == 1
-
- - name: Create new storage account (idempotence)
- azure_rm_storageaccount:
- resource_group: "{{ resource_group }}"
- name: "{{ storage_account }}"
- account_type: Standard_LRS
- append_tags: no
- blob_cors:
- - allowed_origins:
- - http://www.example.com/
- allowed_methods:
- - GET
- - POST
- allowed_headers:
- - x-ms-meta-data*
- - x-ms-meta-target*
- - x-ms-meta-abc
- exposed_headers:
- - x-ms-meta-*
- max_age_in_seconds: 200
- tags:
- test: test
- galaxy: galaxy
- register: output
-
- - assert:
- that:
- - not output.changed
-
- - name: Gather facts by tags
- azure_rm_storageaccount_facts:
- resource_group: "{{ resource_group }}"
- tags:
- - test
- - galaxy
-
- - assert:
- that: azure_storageaccounts | length >= 1
-
- - name: Change account type
- azure_rm_storageaccount:
- resource_group: "{{ resource_group }}"
- name: "{{ storage_account }}"
- account_type: Premium_LRS
- register: change_account
- ignore_errors: yes
-
- - name: Assert account type change failed
- assert: { that: "change_account['failed'] == True" }
-
- - name: Change account type and add custom domain
- azure_rm_storageaccount:
- resource_group: "{{ resource_group }}"
- name: "{{ storage_account }}"
- account_type: Standard_GRS
- custom_domain: { name: ansible.com, use_sub_domain: no }
- register: change_account
- ignore_errors: yes
-
- - name: Assert CNAME failure
- assert: { that: "'Azure Error: StorageCustomDomainNameNotValid' in change_account['msg']" }
-
- - name: Update account tags
- azure_rm_storageaccount:
- resource_group: "{{ resource_group }}"
- name: "{{ storage_account }}"
- append_tags: no
- tags:
- testing: testing
- delete: never
- register: output
-
- - assert:
- that:
- - "output.state.tags | length == 2"
- - "output.state.tags.testing == 'testing'"
- - "output.state.tags.delete == 'never'"
-
- - name: Gather facts
- azure_rm_storageaccount_facts:
- resource_group: "{{ resource_group }}"
- name: "{{ storage_account }}"
- show_connection_string: True
- show_blob_cors: True
-
- - assert:
- that:
- - "azure_storageaccounts| length == 1"
- - "storageaccounts | length == 1"
- - not storageaccounts[0].custom_domain
- - storageaccounts[0].account_type == "Standard_GRS"
- - storageaccounts[0].primary_endpoints.blob.connectionstring
- - storageaccounts[0].blob_cors
-
- - name: Gather facts
- azure_rm_storageaccount_facts:
- resource_group: "{{ resource_group }}"
-
- - assert:
- that:
- - "azure_storageaccounts | length > 0"
-
- - name: Delete acccount
- azure_rm_storageaccount:
- resource_group: "{{ resource_group }}"
- name: "{{ storage_account }}"
- state: absent
diff --git a/test/integration/targets/azure_rm_storageblob/aliases b/test/integration/targets/azure_rm_storageblob/aliases
deleted file mode 100644
index e823954320..0000000000
--- a/test/integration/targets/azure_rm_storageblob/aliases
+++ /dev/null
@@ -1,4 +0,0 @@
-cloud/azure
-shippable/azure/group2
-destructive
-unstable
diff --git a/test/integration/targets/azure_rm_storageblob/files/Ratings.png b/test/integration/targets/azure_rm_storageblob/files/Ratings.png
deleted file mode 100644
index 8dd3e3dbc1..0000000000
--- a/test/integration/targets/azure_rm_storageblob/files/Ratings.png
+++ /dev/null
Binary files differ
diff --git a/test/integration/targets/azure_rm_storageblob/meta/main.yml b/test/integration/targets/azure_rm_storageblob/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_storageblob/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_storageblob/tasks/main.yml b/test/integration/targets/azure_rm_storageblob/tasks/main.yml
deleted file mode 100644
index 0bbc181fbb..0000000000
--- a/test/integration/targets/azure_rm_storageblob/tasks/main.yml
+++ /dev/null
@@ -1,119 +0,0 @@
-- name: Create storage account name
- set_fact:
- storage_account: "{{ resource_group | hash('md5') | truncate(24, True, '') }}"
-
-- name: Create storage account
- azure_rm_storageaccount:
- resource_group: "{{ resource_group }}"
- name: "{{ storage_account }}"
- account_type: Standard_LRS
-
-- name: Create container
- azure_rm_storageblob:
- resource_group: "{{ resource_group }}"
- account_name: "{{ storage_account }}"
- container_name: my-blobs
-
-- name: Force upload blob
- azure_rm_storageblob:
- resource_group: "{{ resource_group }}"
- account_name: "{{ storage_account }}"
- container_name: my-blobs
- blob: 'Ratings.png'
- src: './targets/azure_rm_storageblob/files/Ratings.png'
- content_type: image/png
- tags:
- val1: foo
- val2: bar
- force: yes
-
-- name: storage blob seems to have some timing issues
- wait_for:
- delay: 10
-
-- name: Upload blob idempotence
- azure_rm_storageblob:
- resource_group: "{{ resource_group }}"
- account_name: "{{ storage_account }}"
- container_name: my-blobs
- blob: 'Ratings.png'
- src: './targets/azure_rm_storageblob/files/Ratings.png'
- content_type: image/png
- tags:
- val1: foo
- val2: bar
- register: upload_facts
-
-- assert:
- that: "not upload_facts.changed"
-
-- name: Download file idempotence
- azure_rm_storageblob:
- resource_group: "{{ resource_group }}"
- account_name: "{{ storage_account }}"
- container_name: my-blobs
- blob: 'Ratings.png'
- dest: './targets/azure_rm_storageblob/files/Ratings.png'
- register: download_results
-
-- assert:
- that: not download_results.changed
-
-- file: path="/tmp/Ratings.png" state=absent
-
-- name: Download file
- azure_rm_storageblob:
- resource_group: "{{ resource_group }}"
- account_name: "{{ storage_account }}"
- container_name: my-blobs
- blob: 'Ratings.png'
- dest: '/tmp/Ratings.png'
- register: download_results
-
-- assert:
- that: "download_results.changed"
-
-- find: paths='/tmp' patterns="Ratings.png"
- register: find_results
-
-- assert: { that: "find_results['matched'] == 1" }
-
-- name: Do not delete container that has blobs
- azure_rm_storageblob:
- resource_group: "{{ resource_group }}"
- account_name: "{{ storage_account }}"
- container_name: my-blobs
- state: absent
- register: output
-
-- assert:
- that: "not output.changed"
-
-- name: Delete blob object
- azure_rm_storageblob:
- resource_group: "{{ resource_group }}"
- account_name: "{{ storage_account }}"
- container_name: my-blobs
- blob: "Ratings.png"
- state: absent
- register: output
-
-- assert:
- that: "output.changed"
-
-- name: Delete container
- azure_rm_storageblob:
- resource_group: "{{ resource_group }}"
- account_name: "{{ storage_account }}"
- container_name: my-blobs
- state: absent
- register: output
-
-- assert:
- that: "output.changed"
-
-- name: Delete storage account
- azure_rm_storageaccount:
- resource_group: "{{ resource_group }}"
- name: "{{ storage_account }}"
- state: absent
diff --git a/test/integration/targets/azure_rm_subnet/aliases b/test/integration/targets/azure_rm_subnet/aliases
deleted file mode 100644
index aa77c071a8..0000000000
--- a/test/integration/targets/azure_rm_subnet/aliases
+++ /dev/null
@@ -1,3 +0,0 @@
-cloud/azure
-shippable/azure/group2
-destructive
diff --git a/test/integration/targets/azure_rm_subnet/meta/main.yml b/test/integration/targets/azure_rm_subnet/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_subnet/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_subnet/tasks/main.yml b/test/integration/targets/azure_rm_subnet/tasks/main.yml
deleted file mode 100644
index 8b4efcc4fe..0000000000
--- a/test/integration/targets/azure_rm_subnet/tasks/main.yml
+++ /dev/null
@@ -1,182 +0,0 @@
-- name: Create virtual network
- azure_rm_virtualnetwork:
- name: My_Virtual_Network
- address_prefixes_cidr:
- - 10.1.0.0/16
- - 172.100.0.0/16
- dns_servers:
- - 127.0.0.1
- - 127.0.0.3
- tags:
- testing: testing
- delete: on-exit
- resource_group: "{{ resource_group }}"
-
-- name: Create route table
- azure_rm_routetable:
- name: routetableforsubnet
- resource_group: "{{ resource_group }}"
- register: route_table
-
-- name: Remove subnet
- azure_rm_subnet:
- state: absent
- name: foobar
- virtual_network_name: My_Virtual_Network
- resource_group: "{{ resource_group }}"
-
-- name: Catch invalid cidr
- azure_rm_subnet:
- name: foobar
- virtual_network_name: My_Virtual_Network
- resource_group: "{{ resource_group }}"
- address_prefix_cidr: "10.1.0/24"
- register: output
- ignore_errors: yes
-
-- assert:
- that: output.failed
-
-- name: Add the subnet back
- azure_rm_subnet:
- name: foobar
- virtual_network_name: My_Virtual_Network
- resource_group: "{{ resource_group }}"
- address_prefix_cidr: "10.1.0.0/24"
- register: output
-
-- assert:
- that: output.changed
-
-- name: Add the subnet back (idempontent)
- azure_rm_subnet:
- name: foobar
- virtual_network_name: My_Virtual_Network
- resource_group: "{{ resource_group }}"
- register: output
-
-- assert:
- that: not output.changed
-
-- name: Create network security group
- azure_rm_securitygroup:
- name: secgroupfoo
- resource_group: "{{ resource_group }}"
- tags:
- testing: testing
-
-- name: Update the subnet
- azure_rm_subnet:
- name: foobar
- virtual_network_name: My_Virtual_Network
- resource_group: "{{ resource_group }}"
- address_prefix_cidr: "10.1.0.0/16"
- security_group: secgroupfoo
- service_endpoints:
- - service: Microsoft.Sql
- locations:
- - eastus
- - westus
-
-- name: Should be idempotent
- azure_rm_subnet:
- name: foobar
- virtual_network_name: My_Virtual_Network
- resource_group: "{{ resource_group }}"
- address_prefix_cidr: "10.1.0.0/16"
- service_endpoints:
- - service: Microsoft.Sql
- locations:
- - eastus
- - westus
- register: output
-
-- assert:
- that: not output.changed
-
-- name: Create network security group in another resource group
- azure_rm_securitygroup:
- name: secgroupfoo
- resource_group: "{{ resource_group_secondary }}"
- register: nsg
-
-- name: Update the subnet
- azure_rm_subnet:
- name: foobar
- virtual_network_name: My_Virtual_Network
- resource_group: "{{ resource_group }}"
- address_prefix_cidr: "10.1.0.0/16"
- route_table: "{{ route_table.id }}"
- security_group:
- name: secgroupfoo
- resource_group: "{{ resource_group_secondary }}"
- register: output
-
-- assert:
- that:
- - output.changed
- - output.state.network_security_group.id == nsg.state.id
-
-- name: Update the subnet (idempotent)
- azure_rm_subnet:
- name: foobar
- virtual_network_name: My_Virtual_Network
- resource_group: "{{ resource_group }}"
- address_prefix_cidr: "10.1.0.0/16"
- security_group: "{{ nsg.state.id }}"
- register: output
-
-- assert:
- that: not output.changed
-
-- name: Get subnet facts
- azure_rm_subnet_facts:
- name: foobar
- virtual_network_name: My_Virtual_Network
- resource_group: "{{ resource_group }}"
- register: output
-
-- debug:
- var: output
-- name: Assert that facts are returned
- assert:
- that:
- - output.changed == False
- - output.subnets[0]['id'] != None
- - output.subnets[0]['resource_group'] != None
- - output.subnets[0]['virtual_network_name'] != None
- - output.subnets[0]['name'] != None
- - output.subnets[0]['address_prefix_cidr'] != None
- - output.subnets[0]['route_table'] != None
- - output.subnets[0]['security_group'] != None
- - output.subnets[0]['provisioning_state'] != None
-
-- name: Remove subnet
- azure_rm_subnet:
- state: absent
- name: foobar
- virtual_network_name: My_Virtual_Network
- resource_group: "{{ resource_group }}"
-
-- name: Remove subnet (idempotent)
- azure_rm_subnet:
- state: absent
- name: foobar
- virtual_network_name: My_Virtual_Network
- resource_group: "{{ resource_group }}"
- register: output
-
-- assert:
- that: not output.changed
-
-- name: Remove security group
- azure_rm_securitygroup:
- resource_group: "{{ resource_group }}"
- name: secgroupfoo
- state: absent
-
-- name: Remove virtual network
- azure_rm_virtualnetwork:
- name: My_Virtual_Network
- resource_group: "{{ resource_group }}"
- state: absent
diff --git a/test/integration/targets/azure_rm_trafficmanagerprofile/aliases b/test/integration/targets/azure_rm_trafficmanagerprofile/aliases
deleted file mode 100644
index a31676ea12..0000000000
--- a/test/integration/targets/azure_rm_trafficmanagerprofile/aliases
+++ /dev/null
@@ -1,3 +0,0 @@
-cloud/azure
-shippable/azure/group6
-destructive
diff --git a/test/integration/targets/azure_rm_trafficmanagerprofile/meta/main.yml b/test/integration/targets/azure_rm_trafficmanagerprofile/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_trafficmanagerprofile/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_trafficmanagerprofile/tasks/main.yml b/test/integration/targets/azure_rm_trafficmanagerprofile/tasks/main.yml
deleted file mode 100644
index dba81c0e25..0000000000
--- a/test/integration/targets/azure_rm_trafficmanagerprofile/tasks/main.yml
+++ /dev/null
@@ -1,289 +0,0 @@
-- name: Prepare random number
- set_fact:
- tmname: "tm{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- endpointname1: "ep1{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- endpointname2: "ep2{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- run_once: yes
-
-
-- name: Create a Traffic Manager profile(check mode)
- azure_rm_trafficmanagerprofile:
- resource_group: "{{ resource_group }}"
- name: "{{ tmname }}"
- tags:
- testing: testing
- delete: on-exit
- foo: bar
- location: global
- profile_status: enabled
- routing_method: performance
- dns_config:
- relative_name: "{{ tmname }}"
- ttl: 60
- monitor_config:
- protocol: HTTPS
- port: 80
- path: '/'
- check_mode: yes
-
-- name: Check there is no Traffic Manager profile created
- azure_rm_trafficmanagerprofile_facts:
- resource_group: "{{ resource_group }}"
- name: "{{ tmname }}"
- register: fact
-
-- name: Check there is no Traffic Manager profile created
- assert: { that: "{{ fact.tms | length }} == 0" }
-
-- name: Create a Traffic Manager profile
- azure_rm_trafficmanagerprofile:
- resource_group: "{{ resource_group }}"
- name: "{{ tmname }}"
- tags:
- testing: testing
- delete: on-exit
- foo: bar
- location: global
- profile_status: enabled
- routing_method: performance
- dns_config:
- relative_name: "{{ tmname }}"
- ttl: 60
- monitor_config:
- protocol: HTTPS
- port: 80
- path: '/'
- register: tm
-
-- name: Assert the Traffic Manager profile is well created
- assert:
- that:
- - tm.changed
-
-- name: Gather Traffic Manager profile facts
- azure_rm_trafficmanagerprofile_facts:
- resource_group: "{{ resource_group }}"
- name: "{{ tmname }}"
- register: fact
-
-- name: Assert fact returns the created one
- assert:
- that:
- - "fact.tms | length == 1"
- - fact.tms[0].id == tm.id
- - fact.tms[0].endpoints | length == 0
-
-- name: Create a Traffic Manager profile (idempotent)
- azure_rm_trafficmanagerprofile:
- resource_group: "{{ resource_group }}"
- name: "{{ tmname }}"
- tags:
- testing: testing
- delete: on-exit
- foo: bar
- location: global
- profile_status: enabled
- routing_method: performance
- dns_config:
- relative_name: "{{ tmname }}"
- ttl: 60
- monitor_config:
- protocol: HTTPS
- port: 80
- path: '/'
- register: output
-
-- name: Assert idempotent
- assert:
- that:
- - not output.changed
-
-- name: Update the Traffic Manager profile
- azure_rm_trafficmanagerprofile:
- resource_group: "{{ resource_group }}"
- name: "{{ tmname }}"
- tags:
- testing: testing
- delete: on-exit
- foo: bar
- location: global
- profile_status: disabled
- routing_method: priority
- dns_config:
- relative_name: "{{ tmname }}"
- ttl: 60
- monitor_config:
- protocol: HTTPS
- port: 80
- path: '/'
- register: output
-
-- name: Assert the Traffic Manager profile is updated
- assert:
- that:
- - output.changed
-
-- name: Create Traffic Manager endpoint(check mode)
- azure_rm_trafficmanagerendpoint:
- resource_group: "{{ resource_group }}"
- profile_name: "{{ tmname }}"
- name: "{{ endpointname1 }}"
- type: external_endpoints
- location: westus
- priority: 2
- weight: 1
- target: 1.2.3.4
- check_mode: yes
- register: output
-
-- name: Assert check mode changed
- assert:
- that:
- - output.changed
-
-- name: Get endpoint
- azure_rm_trafficmanagerendpoint_facts:
- resource_group: "{{ resource_group }}"
- profile_name: "{{ tmname }}"
- register: facts
-
-- name: Check no endpoint created in check mode
- assert:
- that:
- - facts.endpoints | length == 0
-
-- name: Create Traffic Manager endpoint
- azure_rm_trafficmanagerendpoint:
- resource_group: "{{ resource_group }}"
- profile_name: "{{ tmname }}"
- name: "{{ endpointname1 }}"
- type: external_endpoints
- location: westus
- priority: 2
- weight: 1
- target: 1.2.3.4
- register: output
-
-- name: Assert endpoint create changed
- assert:
- that:
- - output.changed
-
-- name: Get endpoint
- azure_rm_trafficmanagerendpoint_facts:
- resource_group: "{{ resource_group }}"
- profile_name: "{{ tmname }}"
- register: facts
-
-- name: Check endpoint created
- assert:
- that:
- - facts.endpoints | length == 1
- - facts.endpoints[0].name == "{{ endpointname1 }}"
-
-- name: Create second Traffic Manager endpoint
- azure_rm_trafficmanagerendpoint:
- resource_group: "{{ resource_group }}"
- profile_name: "{{ tmname }}"
- name: "{{ endpointname2 }}"
- type: external_endpoints
- location: westus
- priority: 1
- weight: 3
- target: 4.3.2.1
-
-- name: Get endpoint
- azure_rm_trafficmanagerendpoint_facts:
- resource_group: "{{ resource_group }}"
- profile_name: "{{ tmname }}"
- register: facts
-
-- name: Check 2 endpoint in profile
- assert:
- that:
- - facts.endpoints | length == 2
-
-- name: Create endpoint (idempotent)
- azure_rm_trafficmanagerendpoint:
- resource_group: "{{ resource_group }}"
- profile_name: "{{ tmname }}"
- name: "{{ endpointname2 }}"
- type: external_endpoints
- location: westus
- priority: 1
- weight: 3
- target: 4.3.2.1
- register: output
-
-- name: Assert endpoint creation idempotent
- assert:
- that:
- - output.changed == False
-
-- name: Delete second endpoint
- azure_rm_trafficmanagerendpoint:
- resource_group: "{{ resource_group }}"
- profile_name: "{{ tmname }}"
- name: "{{ endpointname2 }}"
- type: external_endpoints
- state: absent
- register: output
-
-- name: Assert endpoint deletion changed
- assert:
- that:
- - output.changed
-
-- name: Get endpoint
- azure_rm_trafficmanagerendpoint_facts:
- resource_group: "{{ resource_group }}"
- profile_name: "{{ tmname }}"
- register: facts
-
-- name: Check 1 endpoint left in profile
- assert:
- that:
- - facts.endpoints | length == 1
-
-- name: Delete the Traffic Manager profile(check mode)
- azure_rm_trafficmanagerprofile:
- resource_group: "{{ resource_group }}"
- name: "{{ tmname }}"
- state: absent
- check_mode: yes
-
-- name: Gather Traffic Manager profile facts
- azure_rm_trafficmanagerprofile_facts:
- resource_group: "{{ resource_group }}"
- name: "{{ tmname }}"
- register: fact
-
-- name: Assert the traffic manager profile is still there
- assert:
- that:
- - "fact.tms | length == 1"
- - fact.tms[0].id == tm.id
- - fact.tms[0].endpoints | length == 1
-
-- name: Delete the Traffic Manager profile
- azure_rm_trafficmanagerprofile:
- resource_group: "{{ resource_group }}"
- name: "{{ tmname }}"
- state: absent
- register: output
-
-- name: Assert the Traffic Manager profile is well deleted
- assert:
- that:
- - output.changed
-
-- name: Get Traffic Manager profile fact
- azure_rm_trafficmanagerprofile_facts:
- resource_group: "{{ resource_group }}"
- name: "{{ tmname }}"
- register: fact
-
-- name: Assert fact returns empty
- assert:
- that:
- - "fact.tms | length == 0"
diff --git a/test/integration/targets/azure_rm_virtualmachine/aliases b/test/integration/targets/azure_rm_virtualmachine/aliases
deleted file mode 100644
index a5238c1984..0000000000
--- a/test/integration/targets/azure_rm_virtualmachine/aliases
+++ /dev/null
@@ -1,4 +0,0 @@
-cloud/azure
-shippable/azure/group7
-destructive
-azure_rm_virtualmachine_facts
diff --git a/test/integration/targets/azure_rm_virtualmachine/inventory.yml b/test/integration/targets/azure_rm_virtualmachine/inventory.yml
deleted file mode 100644
index acd98ebf7f..0000000000
--- a/test/integration/targets/azure_rm_virtualmachine/inventory.yml
+++ /dev/null
@@ -1,66 +0,0 @@
-all:
- hosts:
- azure_test_invalid:
- azure_test_public_ip:
- network: 10.42.0.0/24
- subnet: 10.42.0.0/28
-
- azure_test_no_public_ip:
- network: 10.42.1.0/24
- subnet: 10.42.1.0/28
-
- azure_test_deallocate:
- network: 10.42.2.0/24
- subnet: 10.42.2.0/28
-
- azure_test_minimal:
- network: 10.42.3.0/24
- subnet: 10.42.3.0/28
-
- azure_test_dual_nic:
- network: 10.42.4.0/24
- subnet: 10.42.4.0/28
- secondary_network: 10.42.5.0/24
- secondary_subnet: 10.42.5.0/28
- nic_list:
- - name: "{{ 'int' ~ uid_short ~ '-1' }}"
- resource_group: "{{ resource_group_secondary }}"
- - name: "{{ 'int' ~ uid_short ~ '-2' }}"
- resource_group: "{{ resource_group_secondary }}"
-
- vars:
- ansible_connection: local
- ansible_python_interpreter: "{{ ansible_playbook_python }}"
-
- uid: "{{ (resource_group ~ inventory_hostname) | hash('md5') | truncate(18, True, '') }}"
- uid_short: "{{ (resource_group ~ inventory_hostname) | hash('md5') | truncate(10, True, '') }}"
-
- storage_account: "{{ 'stor' ~ uid }}"
- availability_set: "{{ 'avbs' ~ uid_short }}"
- vm_name: "{{ 'vm' ~ uid_short }}"
- network_name: "{{ 'vnet' ~ uid_short }}"
- subnet_name: "{{ 'snet' ~ uid_short }}"
- security_group: "{{ 'sg' ~ uid_short }}"
- public_ip_name: "{{ 'ip' ~ uid_short }}"
- interface_name: "{{ 'int' ~ uid_short }}"
-
- ssh_keys:
- - path: '/home/chouseknecht/.ssh/authorized_keys'
- key_data: "ssh-rsa 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 chouseknecht@ansible.com"
-
- image:
- offer: CentOS
- publisher: OpenLogic
- sku: '7.1'
- version: latest
-
- image_paid:
- publisher: cognosys
- offer: ubuntu-14-04-lts
- sku: hardened-ubuntu-14-04
- version: latest
-
- plan_paid:
- name: hardened-ubuntu-14-04
- product: ubuntu-14-04-lts
- publisher: cognosys
diff --git a/test/integration/targets/azure_rm_virtualmachine/main.yml b/test/integration/targets/azure_rm_virtualmachine/main.yml
deleted file mode 100644
index 7722487bff..0000000000
--- a/test/integration/targets/azure_rm_virtualmachine/main.yml
+++ /dev/null
@@ -1,7 +0,0 @@
-- name: Run Azurue VM tests in parallel
- hosts: all
- gather_facts: no
- strategy: free
- tasks:
- - name: Include tasks based on inventory hostname
- include_tasks: tasks/{{ inventory_hostname }}.yml
diff --git a/test/integration/targets/azure_rm_virtualmachine/runme.sh b/test/integration/targets/azure_rm_virtualmachine/runme.sh
deleted file mode 100755
index c7895c9d26..0000000000
--- a/test/integration/targets/azure_rm_virtualmachine/runme.sh
+++ /dev/null
@@ -1,5 +0,0 @@
-#!/usr/bin/env bash
-
-set -eux
-
-ansible-playbook -i inventory.yml main.yml "$@"
diff --git a/test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_deallocate.yml b/test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_deallocate.yml
deleted file mode 100644
index 52fc0102e8..0000000000
--- a/test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_deallocate.yml
+++ /dev/null
@@ -1,90 +0,0 @@
-- include_tasks: setup.yml
-
-- name: Create minimal VM with defaults
- azure_rm_virtualmachine:
- resource_group: "{{ resource_group }}"
- name: "{{ vm_name }}"
- admin_username: "testuser"
- admin_password: "Pass123$$$abx!"
- vm_size: Standard_A0
- virtual_network: "{{ network_name }}"
- image:
- offer: UbuntuServer
- publisher: Canonical
- sku: 16.04-LTS
- version: latest
- register: vm_output
-
-- name: Restart the virtual machine
- azure_rm_virtualmachine:
- resource_group: "{{ resource_group }}"
- name: "{{ vm_name }}"
- restarted: yes
- vm_size: Standard_A0
- register: restart_result
-
-- name: Ensue VM was restarted
- assert:
- that:
- - "azure_vm.powerstate in ['starting', 'running']"
- - restart_result is changed
-
-- name: Deallocate the virtual machine
- azure_rm_virtualmachine:
- resource_group: "{{ resource_group }}"
- name: "{{ vm_name }}"
- allocated: no
- vm_size: Standard_A0
- register: deallocate_result
-
-- name: Ensure VM was deallocated
- assert:
- that:
- - azure_vm.powerstate == 'deallocated'
- - deallocate_result is changed
-
-- name: Start the virtual machine
- azure_rm_virtualmachine:
- resource_group: "{{ resource_group }}"
- name: "{{ vm_name }}"
- vm_size: Standard_A0
- register: start_result
-
-- name: Ensure VM was started
- assert:
- that:
- - "azure_vm.powerstate in ['starting', 'running']"
- - start_result is changed
-
-- name: Delete VM
- azure_rm_virtualmachine:
- resource_group: "{{ resource_group }}"
- name: "{{ vm_name }}"
- state: absent
- remove_on_absent: all_autocreated
-
-- name: Destroy subnet
- azure_rm_subnet:
- resource_group: "{{ resource_group }}"
- virtual_network: "{{ network_name }}"
- name: "{{ subnet_name }}"
- state: absent
-
-- name: Destroy virtual network
- azure_rm_virtualnetwork:
- resource_group: "{{ resource_group }}"
- name: "{{ network_name }}"
- state: absent
-
-- name: Destroy availability set
- azure_rm_availabilityset:
- resource_group: "{{ resource_group }}"
- name: "{{ availability_set }}"
- state: absent
-
-- name: Destroy storage account
- azure_rm_storageaccount:
- resource_group: "{{ resource_group }}"
- name: "{{ storage_account }}"
- force_delete_nonempty: yes
- state: absent
diff --git a/test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_dual_nic.yml b/test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_dual_nic.yml
deleted file mode 100644
index a5bbbad9a2..0000000000
--- a/test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_dual_nic.yml
+++ /dev/null
@@ -1,131 +0,0 @@
-- include_tasks: setup.yml
-
-- name: Create virtual network in secondary resource group
- azure_rm_virtualnetwork:
- resource_group: "{{ resource_group_secondary }}"
- name: "{{ network_name ~ '-2' }}"
- address_prefixes: "{{ secondary_network }}"
- register: create_virt_net_result
-
-- name: Create subnet in secondary resource group
- azure_rm_subnet:
- resource_group: "{{ resource_group_secondary }}"
- name: "{{ subnet_name ~ '-2' }}"
- address_prefix: "{{ secondary_subnet }}"
- virtual_network: "{{ network_name ~ '-2' }}"
-
-- name: Create NICs for dual NIC VM in secondary resource group
- azure_rm_networkinterface:
- resource_group: "{{ item.resource_group }}"
- name: "{{ item.name }}"
- virtual_network: "{{ network_name ~ '-2' }}"
- subnet: "{{ subnet_name ~ '-2' }}"
- loop: "{{ nic_list }}"
-
-- name: Create virtual machine with two NICs
- azure_rm_virtualmachine:
- resource_group: "{{ resource_group }}" # Should this be resource_group_secondary?
- name: "{{ vm_name }}"
- vm_size: Standard_A0
- storage_account: "{{ storage_account }}"
- storage_container: "{{ vm_name }}"
- storage_blob: "{{ vm_name }}.vhd"
- admin_username: adminuser
- admin_password: Password123!
- short_hostname: testvm
- os_type: Linux
- os_disk_size_gb: 64
- os_disk_name: testosdiskxx
- network_interfaces: "{{ nic_list }}"
- availability_set: "{{ availability_set }}"
- image:
- offer: UbuntuServer
- publisher: Canonical
- sku: 16.04-LTS
- version: latest
- tags:
- abc: def
-
-- name: Ensure VM was created properly
- assert:
- that:
- - azure_vm.properties.availabilitySet.id
- - azure_vm.properties.storageProfile.osDisk.name == 'testosdiskxx'
-
-- name: Retrieve VM facts (filtering by name)
- azure_rm_virtualmachine_facts:
- resource_group: "{{ resource_group }}" # Should this be resource_group_secondary?
- name: "{{ vm_name }}"
- register: vm_facts_results
-
-- name: Ensure facts module returned the second VM
- assert:
- that:
- - vm_facts_results.vms | length == 1
- - vm_facts_results.vms[0].name == "{{ vm_name }}"
- - vm_facts_results.vms[0].location
- - vm_facts_results.vms[0].admin_username == 'adminuser'
- - vm_facts_results.vms[0].resource_group == "{{ resource_group }}"
- - vm_facts_results.vms[0].power_state != None
-
-- name: Retrieve facts by tags
- azure_rm_virtualmachine_facts:
- tags:
- - abc:def
- register: facts_by_tags_results
-
-- name: Assert that facts module returned the second VM
- assert:
- that:
- - facts_by_tags_results.vms | length >= 1
-
-- name: Should be idempotent with a dual NICs
- azure_rm_virtualmachine:
- resource_group: "{{ resource_group }}" # Should this be resource_group_secondary?
- name: "{{ vm_name }}"
- vm_size: Standard_A0
- storage_account: "{{ storage_account }}"
- storage_container: "{{ vm_name }}"
- storage_blob: "{{ vm_name }}.vhd"
- admin_username: adminuser
- admin_password: Password123!
- short_hostname: testvm
- os_type: Linux
- os_disk_size_gb: 64
- network_interfaces: "{{ nic_list }}"
- availability_set: "{{ availability_set }}"
- image:
- offer: UbuntuServer
- publisher: Canonical
- sku: 16.04-LTS
- version: latest
- register: dual_nics_result
-
-- name: Ensure nothing changed
- assert:
- that: dual_nics_result is not changed
-
-- name: Generalize VM
- azure_rm_virtualmachine:
- resource_group: "{{ resource_group }}" # Should this be resource_group_secondary?
- name: "{{ vm_name }}"
- generalized: yes
-
-- name: Gather facts and check if machine is generalized
- azure_rm_virtualmachine_facts:
- resource_group: "{{ resource_group }}" # Should this be resource_group_secondary?
- name: "{{ vm_name }}"
- register: generalized_output
-
-- name: Ensure power state is generalized
- assert:
- that: generalized_output.vms[0].power_state == 'generalized'
-
-- name: Delete dual NIC VM
- azure_rm_virtualmachine:
- resource_group: "{{ resource_group }}" # Should this be resource_group_secondary?
- name: "{{ vm_name }}"
- state: absent
- vm_size: Standard_A0
- async: 5000
- poll: 0
diff --git a/test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_invalid.yml b/test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_invalid.yml
deleted file mode 100644
index 86ec72de1f..0000000000
--- a/test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_invalid.yml
+++ /dev/null
@@ -1,35 +0,0 @@
-# TODO: Until we have a module to create/delete images this is the best tests I can do
-- name: Assert error thrown with invalid image dict
- azure_rm_virtualmachine:
- resource_group: "{{ resource_group }}"
- name: "{{ vm_name }}"
- image:
- offer: UbuntuServer
- register: fail_invalid_image_dict
- failed_when: 'fail_invalid_image_dict.msg != "parameter error: expecting image to contain [publisher, offer, sku, version], [name, resource_group] or [id]"'
-
-- name: Assert error thrown with invalid image type
- azure_rm_virtualmachine:
- resource_group: "{{ resource_group }}"
- name: "{{ vm_name }}"
- image:
- - testing
- register: fail_invalid_image_type
- failed_when: 'fail_invalid_image_type.msg != "parameter error: expecting image to be a string or dict not list"'
-
-- name: Assert error finding missing custom image
- azure_rm_virtualmachine:
- resource_group: "{{ resource_group }}"
- name: "{{ vm_name }}"
- image: invalid-image
- register: fail_missing_custom_image
- failed_when: fail_missing_custom_image.msg != "Error could not find image with name invalid-image"
-
-- name: Assert error finding missing custom image (dict style)
- azure_rm_virtualmachine:
- resource_group: "{{ resource_group }}"
- name: "{{ vm_name }}"
- image:
- name: invalid-image
- register: fail_missing_custom_image_dict
- failed_when: fail_missing_custom_image_dict.msg != "Error could not find image with name invalid-image"
diff --git a/test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_minimal.yml b/test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_minimal.yml
deleted file mode 100644
index 8f2767f34e..0000000000
--- a/test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_minimal.yml
+++ /dev/null
@@ -1,118 +0,0 @@
-- include_tasks: setup.yml
-
-# # Tests possible when CI user acccount setup with required authority
-# - name: Create virtual machine with image and plan which requires acceptance of terms
-# azure_rm_virtualmachine:
-# resource_group: "{{ resource_group }}"
-# name: testvm009
-# vm_size: Standard_A0
-# storage_account: "{{ storage_account }}"
-# storage_container: testvm001
-# storage_blob: testvm003.vhd
-# admin_username: adminuser
-# admin_password: Password123!
-# short_hostname: testvm
-# os_type: Linux
-# availability_set: "{{ availability_set }}"
-# image: "{{ image_paid }}"
-# plan_paid: "{{ plan_paid }}"
-# register: create_image_plan_result
-
-# - assert:
-# that:
-# - create_image_plan_result is changed
-# - create_image_plan_result.ansible_facts.azure_vm.properties.storageProfile.imageReference.publisher == image_paid.publisher
-
-# - name: Should be idempotent with image and plan which requires acceptance of terms
-# azure_rm_virtualmachine:
-# resource_group: "{{ resource_group }}"
-# name: testvm009
-# vm_size: Standard_A0
-# storage_account: "{{ storage_account }}"
-# storage_container: testvm001
-# storage_blob: testvm003.vhd
-# admin_username: adminuser
-# admin_password: Password123!
-# short_hostname: testvm
-# os_type: Linux
-# availability_set: "{{ availability_set }}"
-# image: "{{ image_paid }}"
-# plan_paid: "{{ plan_paid }}"
-# register: create_image_plan_again_result
-
-# - assert:
-# that: create_image_plan_again is not changed
-
-- name: Create minimal VM with defaults
- azure_rm_virtualmachine:
- resource_group: "{{ resource_group }}"
- name: "{{ vm_name }}"
- admin_username: "testuser"
- admin_password: "Pass123$$$abx!"
- vm_size: Standard_B1ms
- virtual_network: "{{ network_name }}"
- image:
- offer: UbuntuServer
- publisher: Canonical
- sku: 16.04-LTS
- version: latest
- register: vm_output
-
-- name: Delete VM
- azure_rm_virtualmachine:
- resource_group: "{{ resource_group }}"
- name: "{{ vm_name }}"
- remove_on_absent: all_autocreated
- state: absent
-
-- name: Query auto created NIC
- azure_rm_networkinterface_info:
- resource_group: "{{ resource_group }}"
- name: "{{ vm_name }}01"
- register: nic_result
-
-- name: Query auto created security group
- azure_rm_securitygroup_info:
- resource_group: "{{ resource_group }}"
- name: "{{ vm_name }}01"
- register: nsg_result
-
-- name: Query auto created public IP
- azure_rm_publicipaddress_info:
- resource_group: "{{ resource_group }}"
- name: "{{ vm_name }}01"
- register: pip_result
-
-- name: Assert that autocreated resources were deleted
- assert:
- that:
- # what about the default storage group?
- - nic_result.networkinterfaces | length == 0
- - nsg_result.securitygroups | length == 0
- - pip_result.publicipaddresses | length == 0
-
-- name: Destroy subnet
- azure_rm_subnet:
- resource_group: "{{ resource_group }}"
- virtual_network: "{{ network_name }}"
- name: "{{ subnet_name }}"
- state: absent
-
-- name: Destroy virtual network
- azure_rm_virtualnetwork:
- resource_group: "{{ resource_group }}"
- name: "{{ network_name }}"
- state: absent
-
-- name: Destroy availability set
- azure_rm_availabilityset:
- resource_group: "{{ resource_group }}"
- name: "{{ availability_set }}"
- state: absent
-
-- name: Destroy storage account
- azure_rm_storageaccount:
- resource_group: "{{ resource_group }}"
- name: "{{ storage_account }}"
- force_delete_nonempty: yes
- state: absent
diff --git a/test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_no_public_ip.yml b/test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_no_public_ip.yml
deleted file mode 100644
index f06eea8524..0000000000
--- a/test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_no_public_ip.yml
+++ /dev/null
@@ -1,41 +0,0 @@
-- include_tasks: setup.yml
-
-- name: Create virtual machine without public ip address and with boot diagnostics enabled
- azure_rm_virtualmachine:
- resource_group: "{{ resource_group }}"
- name: "{{ vm_name }}"
- vm_size: Standard_A0
- admin_username: adminuser
- admin_password: Password123!
- short_hostname: testvm
- os_type: Linux
- public_ip_allocation_method: Disabled
- storage_account_name: "{{ storage_account }}"
- availability_set: "{{ availability_set }}"
- virtual_network: "{{ network_name }}"
- boot_diagnostics:
- enabled: yes
- image:
- offer: UbuntuServer
- publisher: Canonical
- sku: 16.04-LTS
- version: latest
- register: create_vm_public_result
-
-- name: Ensure VM was created properly
- assert:
- that:
- - azure_vm.properties.diagnosticsProfile.bootDiagnostics.enabled
- - azure_vm.properties.diagnosticsProfile.bootDiagnostics.storageUri is defined
- - azure_vm.properties.instanceView.bootDiagnostics.consoleScreenshotBlobUri is defined
- - azure_vm.properties.instanceView.bootDiagnostics.serialConsoleLogBlobUri is defined
- - not 'publicIPAddress' in create_vm_public_result.ansible_facts.azure_vm.properties.networkProfile.networkInterfaces[0].properties.ipConfigurations[0].properties
-
-- name: Delete VM with no public ip
- azure_rm_virtualmachine:
- resource_group: "{{ resource_group }}"
- name: "{{ vm_name }}"
- state: absent
- remove_on_absent: all_autocreated
- async: 5000
- poll: 0
diff --git a/test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_public_ip.yml b/test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_public_ip.yml
deleted file mode 100644
index f25d944a78..0000000000
--- a/test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_public_ip.yml
+++ /dev/null
@@ -1,311 +0,0 @@
-- include_tasks: setup.yml
-
-- name: Create public ip
- azure_rm_publicipaddress:
- resource_group: "{{ resource_group }}"
- allocation_method: Static
- name: "{{ public_ip_name }}"
-
-- name: Create security group
- azure_rm_securitygroup:
- resource_group: "{{ resource_group }}"
- name: "{{ security_group }}"
- purge_rules: yes
- rules:
- - name: ALLOW_SSH
- protocol: Tcp
- destination_port_range: 22
- access: Allow
- priority: 100
- direction: Inbound
-
- - name: ALLOW_HTTP
- protocol: Tcp
- destination_port_range: 80
- access: Allow
- priority: 110
- direction: Inbound
-
-- name: Create network interface
- azure_rm_networkinterface:
- resource_group: "{{ resource_group }}"
- name: "{{ interface_name }}"
- virtual_network: "{{ network_name }}"
- subnet: "{{ subnet_name }}"
- public_ip_name: "{{ public_ip_name }}"
- security_group: "{{ security_group }}"
-
-- name: Create virtual machine with a single NIC and no boot diagnostics
- register: output
- azure_rm_virtualmachine:
- resource_group: "{{ resource_group }}"
- name: "{{ vm_name }}"
- vm_size: Standard_A0
- storage_account: "{{ storage_account }}"
- storage_container: "{{ vm_name }}"
- storage_blob: "{{ vm_name }}.vhd"
- admin_username: adminuser
- admin_password: Password123!
- short_hostname: testvm
- os_type: Linux
- network_interfaces: "{{ interface_name }}"
- availability_set: "{{ availability_set }}"
- image:
- offer: UbuntuServer
- publisher: Canonical
- sku: 16.04-LTS
- version: latest
- custom_data: |
- #!/bin/sh
- echo "custom_data was executed" > /tmp/custom_data.txt
-
-- name: Ensure VM was created properly
- assert:
- that:
- - azure_vm.properties.provisioningState == 'Succeeded'
- - azure_vm.properties.availabilitySet.id
- # initial response from creation has no diagnosticsProfile
- # if you run it again however, there is one in the response
- # so we handle both cases
- - "'diagnosticsProfile' not in azure_vm.properties or not azure_vm.properties.diagnosticsProfile.bootDiagnostics.enabled"
-
-- name: Get facts for virtual machine without boot diagnostics disabled
- azure_rm_virtualmachine_facts:
- resource_group: "{{ resource_group }}"
- name: "{{ vm_name }}"
- register: vm_facts_no_boot_diag_result
-
-- name: Ensure VM facts are correct
- assert:
- that:
- - vm_facts_no_boot_diag_result.vms != []
- - not vm_facts_no_boot_diag_result.vms[0].boot_diagnostics.enabled
- - not vm_facts_no_boot_diag_result.vms[0].boot_diagnostics.storage_uri
-
-- name: Enable boot diagnostics on an existing VM for the first time without specifying a storage account
- azure_rm_virtualmachine:
- resource_group: "{{ resource_group }}"
- name: "{{ vm_name }}"
- boot_diagnostics:
- enabled: yes
- # without specifying storage_account you get a new default storage account for the VM
-
-- name: Ensure VM properties are correct
- assert:
- that:
- - azure_vm.properties.diagnosticsProfile.bootDiagnostics.enabled
- - azure_vm.properties.diagnosticsProfile.bootDiagnostics.storageUri is defined
- - azure_vm.properties.instanceView.bootDiagnostics.consoleScreenshotBlobUri is defined
- - azure_vm.properties.instanceView.bootDiagnostics.serialConsoleLogBlobUri is defined
-
-- name: Get facts for virtual machine with boot diagnostics enabled
- azure_rm_virtualmachine_facts:
- resource_group: "{{ resource_group }}"
- name: "{{ vm_name }}"
- register: vm_facts_boot_diag_result
-
-- name: Ensure VM facts were returned
- assert:
- that:
- - vm_facts_boot_diag_result.vms != []
- - vm_facts_boot_diag_result.vms[0].boot_diagnostics.enabled
- - vm_facts_boot_diag_result.vms[0].boot_diagnostics.storage_uri is defined
- - vm_facts_boot_diag_result.vms[0].boot_diagnostics.console_screenshot_uri is defined
- - vm_facts_boot_diag_result.vms[0].boot_diagnostics.serial_console_log_uri is defined
-
-- name: Change the boot diagnostics storage account while enabled
- azure_rm_virtualmachine:
- resource_group: "{{ resource_group }}"
- name: "{{ vm_name }}"
- boot_diagnostics:
- enabled: yes
- storage_account: "{{ storage_account }}"
- ignore_errors: yes
-
-- name: Disable boot diagnostics and change the storage account at the same time
- azure_rm_virtualmachine:
- resource_group: "{{ resource_group }}"
- name: "{{ vm_name }}"
- boot_diagnostics:
- enabled: no
- storage_account: "{{ storage_account }}"
-
-- name: Ensure boot diagnostics was disabled
- assert:
- that:
- - not azure_vm.properties.diagnosticsProfile.bootDiagnostics.enabled
-
-- name: Re-enable boot diagnostics on an existing VM where it was previously configured
- azure_rm_virtualmachine:
- resource_group: "{{ resource_group }}"
- name: "{{ vm_name }}"
- boot_diagnostics:
- enabled: yes
- register: reenable_boot_diag_result
-
-- name: Ensure boot diagnostics was reenabled
- assert:
- that:
- - azure_vm.properties.diagnosticsProfile.bootDiagnostics.enabled
- - azure_vm.properties.diagnosticsProfile.bootDiagnostics.storageUri is defined
- - azure_vm.properties.instanceView.bootDiagnostics.consoleScreenshotBlobUri is defined
- - azure_vm.properties.instanceView.bootDiagnostics.serialConsoleLogBlobUri is defined
-
-# - add_host:
-# name: new_azure_vm
-# ansible_host: '{{ reenable_boot_diag_result.ansible_facts.azure_vm.properties.networkProfile.networkInterfaces[0].properties.ipConfigurations[0].properties.publicIPAddress.properties.ipAddress }}'
-# ansible_connection: paramiko # not guaranteed to have sshpass...
-# ansible_user: adminuser
-# ansible_password: Password123!
-# ansible_host_key_checking: no
-
-# - name: wait for SSH port to be open
-# wait_for:
-# host: '{{ hostvars["new_azure_vm"].ansible_host }}'
-# port: 22
-# timeout: 60
-# state: started
-
-# # TODO: figure out how to make this work under ansible-test with the coverage injector
-# - block:
-# - name: wait for host to answer on SSH
-# delegate_to: new_azure_vm
-# wait_for_connection:
-
-# - name: get content from custom_data script
-# raw: cat /tmp/custom_data.txt
-# register: custom_data_content
-
-# - name: assert contents
-# assert:
-# that: custom_data_content.stdout | regex_search('custom_data was executed')
-# delegate_to: new_azure_vm
-
-# # TODO: figure out how to make this work under ansible-test with the coverage injector
-# - name: wait for file/content created by custom_data script
-# delegate_to: new_azure_vm
-# vars:
-# ansible_python_interpreter: python
-# wait_for:
-# path: /tmp/custom_data.txt
-# search_regex: ^custom_data was executed$
-# timeout: 20
-
-- name: Should be idempotent with a single NIC
- azure_rm_virtualmachine:
- resource_group: "{{ resource_group }}"
- name: "{{ vm_name }}"
- vm_size: Standard_A0
- storage_account: "{{ storage_account }}"
- storage_container: "{{ vm_name }}"
- storage_blob: "{{ vm_name }}.vhd"
- admin_username: adminuser
- admin_password: Password123!
- short_hostname: testvm
- os_type: Linux
- network_interfaces: "{{ interface_name }}"
- image:
- offer: UbuntuServer
- publisher: Canonical
- sku: 16.04-LTS
- version: latest
- register: single_nic_result
-
-- name: Ensure nothing changed
- assert:
- that: single_nic_result is not changed
-
-- name: Resize VM
- azure_rm_virtualmachine:
- resource_group: "{{ resource_group }}"
- name: "{{ vm_name }}"
- vm_size: Standard_A1
- storage_account: "{{ storage_account }}"
- storage_container: "{{ vm_name }}"
- storage_blob: "{{ vm_name }}.vhd"
- admin_username: adminuser
- admin_password: Password123!
- short_hostname: testvm
- os_type: Linux
- network_interfaces: "{{ interface_name }}"
- image:
- offer: UbuntuServer
- publisher: Canonical
- sku: 16.04-LTS
- version: latest
- register: resize_result
-
-- name: Esure VM was resized
- assert:
- that:
- - resize_result is changed
- - resize_result.ansible_facts.azure_vm.properties.hardwareProfile.vmSize == "Standard_A1"
-
-- name: Delete VM
- azure_rm_virtualmachine:
- resource_group: "{{ resource_group }}"
- name: "{{ vm_name }}"
- state: absent
- vm_size: Standard_A0
-
-- name: NIC should be gone
- azure_rm_networkinterface_facts:
- resource_group: "{{ resource_group }}"
- name: "{{ interface_name }}"
-
-- name: Ensure NIC was removed
- assert:
- that: azure_networkinterfaces | length == 0
-
-- name: Public IP should be gone
- azure_rm_publicipaddress_facts:
- resource_group: "{{ resource_group }}"
- name: "{{ public_ip_name }}"
-
-- name: Ensure public IP was removed
- assert:
- that: azure_publicipaddresses | length == 0
-
-- name: Destroy NIC
- azure_rm_networkinterface:
- resource_group: "{{ resource_group }}"
- name: "{{ interface_name }}"
- state: absent
-
-- name: Destroy security group
- azure_rm_securitygroup:
- resource_group: "{{ resource_group }}"
- name: "{{ security_group }}"
- state: absent
-
-- name: Destroy subnet
- azure_rm_subnet:
- resource_group: "{{ resource_group }}"
- virtual_network: "{{ network_name }}"
- name: "{{ subnet_name }}"
- state: absent
-
-- name: Destroy virtual network
- azure_rm_virtualnetwork:
- resource_group: "{{ resource_group }}"
- name: "{{ network_name }}"
- state: absent
-
-- name: Destroy public ip
- azure_rm_publicipaddress:
- resource_group: "{{ resource_group }}"
- name: "{{ public_ip_name }}"
- state: absent
-
-- name: Destroy availability set
- azure_rm_availabilityset:
- resource_group: "{{ resource_group }}"
- name: "{{ availability_set }}"
- state: absent
-
-- name: Destroy storage account
- azure_rm_storageaccount:
- resource_group: "{{ resource_group }}"
- name: "{{ storage_account }}"
- force_delete_nonempty: true
- state: absent
diff --git a/test/integration/targets/azure_rm_virtualmachine/tasks/setup.yml b/test/integration/targets/azure_rm_virtualmachine/tasks/setup.yml
deleted file mode 100644
index f053cac03d..0000000000
--- a/test/integration/targets/azure_rm_virtualmachine/tasks/setup.yml
+++ /dev/null
@@ -1,26 +0,0 @@
-- debug:
- msg: "UID is {{ uid_short }}"
-
-- name: SETUP | Create storage account
- azure_rm_storageaccount:
- resource_group: "{{ resource_group }}"
- name: "{{ storage_account }}"
- account_type: Standard_LRS
-
-- name: SETUP | Create availability set
- azure_rm_availabilityset:
- name: "{{ availability_set }}"
- resource_group: "{{ resource_group }}"
-
-- name: SETUP | Create virtual network
- azure_rm_virtualnetwork:
- resource_group: "{{ resource_group }}"
- name: "{{ network_name }}"
- address_prefixes: "{{ network }}"
-
-- name: SETUP | Create subnet
- azure_rm_subnet:
- resource_group: "{{ resource_group }}"
- name: "{{ subnet_name }}"
- address_prefix: "{{ subnet }}"
- virtual_network: "{{ network_name }}"
diff --git a/test/integration/targets/azure_rm_virtualmachineextension/aliases b/test/integration/targets/azure_rm_virtualmachineextension/aliases
deleted file mode 100644
index a66cfb4dbb..0000000000
--- a/test/integration/targets/azure_rm_virtualmachineextension/aliases
+++ /dev/null
@@ -1,4 +0,0 @@
-cloud/azure
-shippable/azure/group5
-destructive
-azure_rm_virtualmachineextension_facts
diff --git a/test/integration/targets/azure_rm_virtualmachineextension/meta/main.yml b/test/integration/targets/azure_rm_virtualmachineextension/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_virtualmachineextension/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_virtualmachineextension/tasks/main.yml b/test/integration/targets/azure_rm_virtualmachineextension/tasks/main.yml
deleted file mode 100644
index e195ac731a..0000000000
--- a/test/integration/targets/azure_rm_virtualmachineextension/tasks/main.yml
+++ /dev/null
@@ -1,181 +0,0 @@
-- name: Create Random Storage Account Name
- set_fact:
- storage_account: "{{ resource_group | hash('md5') | truncate(24, True, '') }}"
-
-- name: Create virtual network
- azure_rm_virtualnetwork:
- resource_group: "{{ resource_group }}"
- name: testVnet
- address_prefixes: "10.0.0.0/16"
-
-- name: Add subnet
- azure_rm_subnet:
- resource_group: "{{ resource_group }}"
- name: testSubnet
- address_prefix: "10.0.1.0/24"
- virtual_network: testVnet
-
-- name: Create public IP address
- azure_rm_publicipaddress:
- resource_group: "{{ resource_group }}"
- allocation_method: Dynamic
- name: testPublicIP
-
-- name: Create Network Security Group that allows SSH
- azure_rm_securitygroup:
- resource_group: "{{ resource_group }}"
- name: testNetworkSecurityGroup
- rules:
- - name: SSH
- protocol: Tcp
- destination_port_range: 22
- access: Allow
- priority: 1001
- direction: Inbound
-
-- name: Create virtual network interface card
- azure_rm_networkinterface:
- resource_group: "{{ resource_group }}"
- name: testNIC
- virtual_network: testVnet
- subnet: testSubnet
- public_ip_name: testPublicIP
- security_group_name: testNetworkSecurityGroup
-
-- name: create a storage account
- azure_rm_storageaccount:
- resource_group: "{{ resource_group }}"
- name: "{{ storage_account }}"
- type: Standard_LRS
-
-- name: Create VM
- azure_rm_virtualmachine:
- resource_group: "{{ resource_group }}"
- name: testVM
- vm_size: Standard_DS1_v2
- admin_username: testuser
- ssh_password_enabled: true
- admin_password: "Password1234!"
- network_interfaces: testNIC
- storage_account_name: "{{ storage_account }}"
- storage_container: osdisk
- storage_blob: osdisk.vhd
- os_disk_caching: ReadWrite
- image:
- offer: CoreOS
- publisher: CoreOS
- sku: Stable
- version: latest
-
-- name: Create VM Extension
- azure_rm_virtualmachineextension:
- resource_group: "{{ resource_group }}"
- name: testVMExtension
- virtual_machine_name: testVM
- publisher: Microsoft.Azure.Extensions
- virtual_machine_extension_type: CustomScript
- type_handler_version: 2.0
- auto_upgrade_minor_version: true
- settings: {"commandToExecute": "hostname"}
- register: results
-
-- name: Assert that VM Extension ran
- assert:
- that: results.changed
-
-- name: Query extension
- azure_rm_virtualmachineextension_facts:
- resource_group: "{{ resource_group }}"
- name: testVMExtension
- virtual_machine_name: testVM
- register: results
-- name: Assert that facts are returned
- assert:
- that:
- - results.changed == False
- - results.extensions[0]['id'] != None
- - results.extensions[0]['resource_group'] != None
- - results.extensions[0]['virtual_machine_name'] != None
- - results.extensions[0]['name'] != None
- - results.extensions[0]['location'] != None
- - results.extensions[0]['publisher'] != None
- - results.extensions[0]['type'] != None
- - results.extensions[0]['settings'] != None
- - results.extensions[0]['auto_upgrade_minor_version'] != None
- - results.extensions[0]['provisioning_state'] != None
-
-- name: List extensions
- azure_rm_virtualmachineextension_facts:
- resource_group: "{{ resource_group }}"
- virtual_machine_name: testVM
- register: results
-- name: Assert that facts are returned
- assert:
- that:
- - results.changed == False
- - results.extensions[0]['id'] != None
- - results.extensions[0]['resource_group'] != None
- - results.extensions[0]['virtual_machine_name'] != None
- - results.extensions[0]['name'] != None
- - results.extensions[0]['location'] != None
- - results.extensions[0]['publisher'] != None
- - results.extensions[0]['type'] != None
- - results.extensions[0]['settings'] != None
- - results.extensions[0]['auto_upgrade_minor_version'] != None
- - results.extensions[0]['provisioning_state'] != None
-
-- name: Delete VM Extension
- azure_rm_virtualmachineextension:
- resource_group: "{{ resource_group }}"
- name: testVMExtension
- virtual_machine_name: testVM
- state: absent
- publisher: Microsoft.Azure.Extensions
- virtual_machine_extension_type: CustomScript
- type_handler_version: 2.0
- auto_upgrade_minor_version: true
- settings: {"commandToExecute": "hostname"}
- register: results
-
-- name: Assert that VM Extension deleted
- assert:
- that: results.changed
-
-- name: Delete VM
- azure_rm_virtualmachine:
- resource_group: "{{ resource_group }}"
- name: testVM
- state: absent
- remove_on_absent: ['all']
- vm_size: Standard_DS1_v2
- admin_username: testuser
- network_interfaces: testNIC
- storage_container: osdisk
- storage_blob: osdisk.vhd
- os_disk_caching: ReadWrite
- image:
- offer: CoreOS
- publisher: CoreOS
- sku: Stable
- version: latest
-
-- name: Delete a storage account
- azure_rm_storageaccount:
- resource_group: "{{ resource_group }}"
- name: "{{ storage_account }}"
- type: Standard_LRS
- state: absent
- force_delete_nonempty: true
-
-- name: Delete Network Security Group that allows SSH
- azure_rm_securitygroup:
- resource_group: "{{ resource_group }}"
- name: testNetworkSecurityGroup
- state: absent
-
-- name: Delete virtual network
- azure_rm_virtualnetwork:
- resource_group: "{{ resource_group }}"
- name: testVnet
- state: absent
- address_prefixes: "10.0.0.0/16"
diff --git a/test/integration/targets/azure_rm_virtualmachineimage_info/aliases b/test/integration/targets/azure_rm_virtualmachineimage_info/aliases
deleted file mode 100644
index 9175999b45..0000000000
--- a/test/integration/targets/azure_rm_virtualmachineimage_info/aliases
+++ /dev/null
@@ -1,4 +0,0 @@
-cloud/azure
-shippable/azure/group3
-shippable/azure/smoketest
-destructive
diff --git a/test/integration/targets/azure_rm_virtualmachineimage_info/meta/main.yml b/test/integration/targets/azure_rm_virtualmachineimage_info/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_virtualmachineimage_info/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_virtualmachineimage_info/tasks/main.yml b/test/integration/targets/azure_rm_virtualmachineimage_info/tasks/main.yml
deleted file mode 100644
index 5d16141dfa..0000000000
--- a/test/integration/targets/azure_rm_virtualmachineimage_info/tasks/main.yml
+++ /dev/null
@@ -1,43 +0,0 @@
-- name: set location
- set_fact:
- location: eastus
-
-- name: Get facts for a specific image
- azure_rm_virtualmachineimage_info:
- location: "{{ location }}"
- publisher: OpenLogic
- offer: CentOS
- sku: '7.3'
- version: '7.3.20170707'
- register: output
-
-- assert:
- that: output['vmimages'] | length == 1
-
-- name: List available versions
- azure_rm_virtualmachineimage_info:
- location: "{{ location }}"
- publisher: OpenLogic
- offer: CentOS
- sku: '7.3'
- register: output
-
-- assert:
- that: output['vmimages'] | length > 0
-
-- name: List available offers
- azure_rm_virtualmachineimage_info:
- location: "{{ location }}"
- publisher: OpenLogic
- register: output
-
-- assert:
- that: output['vmimages'] | length > 0
-
-- name: List available publishers
- azure_rm_virtualmachineimage_info:
- location: "{{ location }}"
- register: output
-
-- assert:
- that: output['vmimages'] | length > 0
diff --git a/test/integration/targets/azure_rm_virtualmachinescaleset/aliases b/test/integration/targets/azure_rm_virtualmachinescaleset/aliases
deleted file mode 100644
index 00187fa67a..0000000000
--- a/test/integration/targets/azure_rm_virtualmachinescaleset/aliases
+++ /dev/null
@@ -1,7 +0,0 @@
-cloud/azure
-shippable/azure/group10
-destructive
-azure_rm_virtualmachinescaleset_facts
-azure_rm_virtualmachinescalesetinstance_facts
-azure_rm_virtualmachinescalesetextension
-azure_rm_virtualmachinescalesetextension_facts
diff --git a/test/integration/targets/azure_rm_virtualmachinescaleset/meta/main.yml b/test/integration/targets/azure_rm_virtualmachinescaleset/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_virtualmachinescaleset/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_virtualmachinescaleset/tasks/main.yml b/test/integration/targets/azure_rm_virtualmachinescaleset/tasks/main.yml
deleted file mode 100644
index 67a0b93802..0000000000
--- a/test/integration/targets/azure_rm_virtualmachinescaleset/tasks/main.yml
+++ /dev/null
@@ -1,617 +0,0 @@
-- name: Prepare random number
- set_fact:
- rpfx: "{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- run_once: yes
-
-- name: Create virtual network
- azure_rm_virtualnetwork:
- resource_group: "{{ resource_group }}"
- name: testVnet
- address_prefixes: "10.0.0.0/16"
-
-- name: Add subnet
- azure_rm_subnet:
- resource_group: "{{ resource_group }}"
- name: testSubnet
- address_prefix: "10.0.1.0/24"
- virtual_network: testVnet
-
-- name: Create public IP address
- azure_rm_publicipaddress:
- resource_group: "{{ resource_group }}"
- allocation_method: Static
- name: testPublicIP
-
-- name: Create load balancer
- azure_rm_loadbalancer:
- resource_group: "{{ resource_group }}"
- name: testLB
- public_ip_address_name: testPublicIP
-
-- name: Create public IP address 1
- azure_rm_publicipaddress:
- resource_group: "{{ resource_group }}"
- allocation_method: Static
- name: testPublicIP1
-
-- name: Create load balancer 1
- azure_rm_loadbalancer:
- resource_group: "{{ resource_group }}"
- name: testLB1
- public_ip_address_name: testPublicIP1
-
-- name: Create network security group within same resource group of VMSS.
- azure_rm_securitygroup:
- resource_group: "{{ resource_group }}"
- name: testNetworkSecurityGroup
-
-- name: Create network security group in different resource group of VMSS.
- azure_rm_securitygroup:
- resource_group: "{{ resource_group_secondary }}"
- name: testNetworkSecurityGroup2
-
-- name: Create virtual network inteface cards for VM A and B
- azure_rm_networkinterface:
- resource_group: "{{ resource_group }}"
- name: "vmforimage{{ rpfx }}nic"
- virtual_network: testVnet
- subnet: testSubnet
-
-- name: Create VM
- azure_rm_virtualmachine:
- resource_group: "{{ resource_group }}"
- name: "vmforimage{{ rpfx }}"
- admin_username: testuser
- admin_password: "Password1234!"
- vm_size: Standard_B1ms
- network_interfaces: "vmforimage{{ rpfx }}nic"
- image:
- offer: UbuntuServer
- publisher: Canonical
- sku: 16.04-LTS
- version: latest
-- name: Generalize VM
- azure_rm_virtualmachine:
- resource_group: "{{ resource_group }}"
- name: "vmforimage{{ rpfx }}"
- generalized: yes
-- name: Create image A
- azure_rm_image:
- resource_group: "{{ resource_group }}"
- name: testimagea
- source: "vmforimage{{ rpfx }}"
-- name: Create image B
- azure_rm_image:
- resource_group: "{{ resource_group }}"
- name: testimageb
- source: "vmforimage{{ rpfx }}"
-- name: Delete VM
- azure_rm_virtualmachine:
- resource_group: "{{ resource_group }}"
- name: "vmforimage{{ rpfx }}"
- state: absent
-
-- name: Create VMSS (check mode)
- azure_rm_virtualmachinescaleset:
- resource_group: "{{ resource_group }}"
- name: testVMSS{{ rpfx }}
- vm_size: Standard_B1s
- admin_username: testuser
- ssh_password_enabled: true
- admin_password: "Password1234!"
- capacity: 1
- virtual_network_name: testVnet
- subnet_name: testSubnet
- load_balancer: testLB
- upgrade_policy: Manual
- tier: Standard
- managed_disk_type: Standard_LRS
- os_disk_caching: ReadWrite
- image:
- offer: CoreOS
- publisher: CoreOS
- sku: Stable
- version: latest
- data_disks:
- - lun: 0
- disk_size_gb: 64
- caching: ReadWrite
- managed_disk_type: Standard_LRS
- register: results
- check_mode: yes
-
-- name: Assert that VMSS can be created
- assert:
- that: results.changed
-
-- name: Get VMSS to assert no VMSS is created in check mode
- azure_rm_virtualmachinescaleset_facts:
- resource_group: "{{ resource_group }}"
- name: testVMSS{{ rpfx }}
- format: curated
- register: output_scaleset
-
-- name: Assert no VMSS created in check mode
- assert:
- that:
- - output_scaleset.ansible_facts.azure_vmss | length == 0
-
-- name: Create VMSS
- azure_rm_virtualmachinescaleset:
- resource_group: "{{ resource_group }}"
- name: testVMSS{{ rpfx }}
- vm_size: Standard_B1s
- admin_username: testuser
- ssh_password_enabled: true
- admin_password: "Password1234!"
- capacity: 1
- virtual_network_name: testVnet
- subnet_name: testSubnet
- upgrade_policy: Manual
- load_balancer: testLB
- tier: Standard
- managed_disk_type: Standard_LRS
- os_disk_caching: ReadWrite
- custom_data: "#cloud-config"
- image:
- offer: CoreOS
- publisher: CoreOS
- sku: Stable
- version: latest
- data_disks:
- - lun: 0
- disk_size_gb: 64
- caching: ReadWrite
- managed_disk_type: Standard_LRS
- scale_in_policy: "NewestVM"
- register: results
-
-- name: Assert that VMSS was created
- assert:
- that: results.changed
-
-- name: Create VMSS -- test upgrade_policy idempotence and load balancer
- azure_rm_virtualmachinescaleset:
- resource_group: "{{ resource_group }}"
- name: testVMSS{{ rpfx }}
- vm_size: Standard_B1s
- admin_username: testuser
- ssh_password_enabled: true
- admin_password: "Password1234!"
- capacity: 1
- virtual_network_name: testVnet
- subnet_name: testSubnet
- upgrade_policy: Automatic
- load_balancer: testLB1
- tier: Standard
- managed_disk_type: Standard_LRS
- os_disk_caching: ReadWrite
- custom_data: "#cloud-config"
- image:
- offer: CoreOS
- publisher: CoreOS
- sku: Stable
- version: latest
- data_disks:
- - lun: 0
- disk_size_gb: 64
- caching: ReadWrite
- managed_disk_type: Standard_LRS
- register: results
-
-- name: Assert that VMSS was created
- assert:
- that: results.changed
-
-- name: Retrieve scaleset facts
- azure_rm_virtualmachinescaleset_facts:
- resource_group: "{{ resource_group }}"
- name: testVMSS{{ rpfx }}
- format: curated
- register: output_scaleset
-
-- assert:
- that:
- - output_scaleset.vmss[0].load_balancer == "testLB1"
-
-- name: Retrieve scaleset VMs facts
- azure_rm_virtualmachinescalesetinstance_facts:
- resource_group: "{{ resource_group }}"
- vmss_name: testVMSS{{ rpfx }}
- register: instances
-
-- name: Assert that facts returned correctly
- assert:
- that:
- - instances.instances | length == 1
- - instances.instances[0].id != None
- - instances.instances[0].name != None
- - instances.instances[0].instance_id != None
- - instances.instances[0].provisioning_state != None
- - instances.instances[0].vm_id != None
- - instances.instances[0].latest_model != None
- - instances.instances[0].power_state != None
-
-- name: Get scaleset body
- set_fact:
- body: "{{ output_scaleset.vmss[0] }}"
-
-- name: Try to update VMSS using output as input
- azure_rm_virtualmachinescaleset:
- resource_group: "{{ body.resource_group }}"
- name: "{{ body.name }}"
- vm_size: "{{ body.vm_size }}"
- admin_username: "{{ body.admin_username }}"
- ssh_password_enabled: "{{ body.ssh_password_enabled }}"
- admin_password: "Password1234!"
- capacity: "{{ body.capacity }}"
- virtual_network_name: "{{ body.virtual_network_name }}"
- subnet_name: "{{ body.subnet_name }}"
- upgrade_policy: "{{ body.upgrade_policy }}"
- load_balancer: "{{ body.load_balancer }}"
- tier: "{{ body.tier }}"
- managed_disk_type: "{{ body.managed_disk_type }}"
- os_disk_caching: "{{ body.os_disk_caching }}"
- image: "{{ body.image }}"
- data_disks: "{{ body.data_disks }}"
- overprovision: "{{ body.overprovision }}"
- register: results
-
-- name: Assert that nothing was changed
- assert:
- that: not results.changed
-
-- name: Install VMSS Extension
- azure_rm_virtualmachinescalesetextension:
- resource_group: "{{ resource_group }}"
- vmss_name: testVMSS{{ rpfx }}
- name: testExtension
- publisher: Microsoft.Azure.Extensions
- type: CustomScript
- type_handler_version: 2.0
- auto_upgrade_minor_version: true
- settings: {"commandToExecute": "sudo apt-get -y install apache2"}
- register: results
-
-- name: Assert that something was changed
- assert:
- that: results.changed
-
-- name: Install Again VMSS Extension - again
- azure_rm_virtualmachinescalesetextension:
- resource_group: "{{ resource_group }}"
- vmss_name: testVMSS{{ rpfx }}
- name: testExtension
- publisher: Microsoft.Azure.Extensions
- type: CustomScript
- type_handler_version: 2.0
- auto_upgrade_minor_version: true
- settings: {"commandToExecute": "sudo apt-get -y install apache2"}
- register: results
-
-- name: Assert that nothing was changed
- assert:
- that: not results.changed
-
-- name: Query extension
- azure_rm_virtualmachinescalesetextension_facts:
- resource_group: "{{ resource_group }}"
- vmss_name: testVMSS{{ rpfx }}
- name: testExtension
- register: results
-- name: Assert that facts are returned
- assert:
- that:
- - results.changed == False
- - results.extensions[0]['id'] != None
- - results.extensions[0]['resource_group'] != None
- - results.extensions[0]['vmss_name'] != None
- - results.extensions[0]['name'] != None
- - results.extensions[0]['publisher'] != None
- - results.extensions[0]['type'] != None
- - results.extensions[0]['settings'] != None
- - results.extensions[0]['auto_upgrade_minor_version'] != None
- - results.extensions[0]['provisioning_state'] != None
-
-- name: List extensions
- azure_rm_virtualmachinescalesetextension_facts:
- resource_group: "{{ resource_group }}"
- vmss_name: testVMSS{{ rpfx }}
- register: results
-- name: Assert that facts are returned
- assert:
- that:
- - results.changed == False
- - results.extensions[0]['id'] != None
- - results.extensions[0]['resource_group'] != None
- - results.extensions[0]['vmss_name'] != None
- - results.extensions[0]['name'] != None
- - results.extensions[0]['publisher'] != None
- - results.extensions[0]['type'] != None
- - results.extensions[0]['settings'] != None
- - results.extensions[0]['auto_upgrade_minor_version'] != None
- - results.extensions[0]['provisioning_state'] != None
-
-
-- name: Delete VMSS Extension
- azure_rm_virtualmachinescalesetextension:
- resource_group: "{{ resource_group }}"
- vmss_name: testVMSS{{ rpfx }}
- name: testExtension
- state: absent
- register: results
-
-- name: Assert that change was reported
- assert:
- that: results.changed
-
-- name: Upgrade instance to the latest image
- azure_rm_virtualmachinescalesetinstance:
- resource_group: "{{ resource_group }}"
- vmss_name: testVMSS{{ rpfx }}
- instance_id: "{{ instances.instances[0].instance_id }}"
- latest_model: yes
- register: results
-
-- name: Assert that something has changed
- assert:
- that: results.changed
-
-- name: Stop virtual machine
- azure_rm_virtualmachinescalesetinstance:
- resource_group: "{{ resource_group }}"
- vmss_name: testVMSS{{ rpfx }}
- instance_id: "{{ instances.instances[0].instance_id }}"
- power_state: stopped
- register: results
-
-- name: Assert that something has changed
- assert:
- that: results.changed
-
-- name: Delete instance
- azure_rm_virtualmachinescalesetinstance:
- resource_group: "{{ resource_group }}"
- vmss_name: testVMSS{{ rpfx }}
- instance_id: "{{ instances.instances[0].instance_id }}"
- state: absent
- register: results
-
-- name: Assert that something has changed
- assert:
- that: results.changed
-
-
-- name: Delete VMSS
- azure_rm_virtualmachinescaleset:
- resource_group: "{{ resource_group }}"
- name: testVMSS{{ rpfx }}
- state: absent
-
-- name: Create VMSS with security group in same resource group, with accelerated networking(check mode).
- azure_rm_virtualmachinescaleset:
- resource_group: "{{ resource_group }}"
- name: testVMSS{{ rpfx }}2
- vm_size: Standard_D3_v2
- capacity: 0
- virtual_network_name: testVnet
- subnet_name: testSubnet
- admin_username: testuser
- ssh_password_enabled: true
- admin_password: "Password1234!"
- image:
- name: testimagea
- resource_group: "{{ resource_group }}"
- upgrade_policy: Manual
- security_group: testNetworkSecurityGroup
- enable_accelerated_networking: yes
- register: results
- check_mode: yes
-
-- name: Assert that VMSS can be created
- assert:
- that: results.changed
-
-- name: Create VMSS with security group in same resource group, with accelerated networking.
- azure_rm_virtualmachinescaleset:
- resource_group: "{{ resource_group }}"
- name: testVMSS{{ rpfx }}2
- vm_size: Standard_D3_v2
- capacity: 0
- virtual_network_name: testVnet
- subnet_name: testSubnet
- admin_username: testuser
- ssh_password_enabled: true
- admin_password: "Password1234!"
- image:
- name: testimagea
- resource_group: "{{ resource_group }}"
- upgrade_policy: Manual
- security_group: testNetworkSecurityGroup
- enable_accelerated_networking: yes
- register: results
-
-- name: Assert that VMSS ran
- assert:
- that:
- - 'results.changed'
- - 'results.ansible_facts.azure_vmss.properties.virtualMachineProfile.networkProfile.networkInterfaceConfigurations.0.properties.enableAcceleratedNetworking == true'
- - 'results.ansible_facts.azure_vmss.properties.virtualMachineProfile.networkProfile.networkInterfaceConfigurations.0.properties.networkSecurityGroup != {}'
-
-- name: Create VMSS with security group in same resource group, with accelerated networking.
- azure_rm_virtualmachinescaleset:
- resource_group: "{{ resource_group }}"
- name: testVMSS{{ rpfx }}2
- vm_size: Standard_D3_v2
- capacity: 0
- virtual_network_name: testVnet
- subnet_name: testSubnet
- admin_username: testuser
- ssh_password_enabled: true
- admin_password: "Password1234!"
- image:
- name: testimagea
- resource_group: "{{ resource_group }}"
- upgrade_policy: Manual
- security_group: testNetworkSecurityGroup
- enable_accelerated_networking: yes
- register: results
-
-- name: Assert that nothing has changed
- assert:
- that:
- - not results.changed
-
-- name: Create VMSS with security group in same resource group, with accelerated networking.
- azure_rm_virtualmachinescaleset:
- resource_group: "{{ resource_group }}"
- name: testVMSS{{ rpfx }}2
- vm_size: Standard_D3_v2
- capacity: 0
- virtual_network_name: testVnet
- subnet_name: testSubnet
- admin_username: testuser
- ssh_password_enabled: true
- admin_password: "Password1234!"
- image:
- name: testimageb
- resource_group: "{{ resource_group }}"
- upgrade_policy: Manual
- security_group: testNetworkSecurityGroup
- enable_accelerated_networking: yes
- register: results
-
-- name: Assert that something has changed
- assert:
- that:
- - results.changed
-
-- name: update VMSS with security group in different resource group.
- azure_rm_virtualmachinescaleset:
- resource_group: "{{ resource_group }}"
- name: testVMSS{{ rpfx }}2
- vm_size: Standard_B1s
- capacity: 0
- virtual_network_name: testVnet
- subnet_name: testSubnet
- admin_username: testuser
- ssh_password_enabled: true
- admin_password: "Password1234!"
- image:
- name: testimageb
- resource_group: "{{ resource_group }}"
- upgrade_policy: Manual
- security_group:
- name: testNetworkSecurityGroup2
- resource_group: "{{ resource_group_secondary }}"
- register: results
-
-# disable for now
-#- name: Assert that security group is correct
-# assert:
-# that:
-# - 'results.changed'
-# - '"testNetworkSecurityGroup2" in results.ansible_facts.azure_vmss.properties.virtualMachineProfile.networkProfile.networkInterfaceConfigurations.0.properties.networkSecurityGroup.id'
-
-- name: Delete VMSS
- azure_rm_virtualmachinescaleset:
- resource_group: "{{ resource_group }}"
- name: testVMSS{{ rpfx }}2
- state: absent
-
-- name: Fail when instance type is not supported to enable accelerated networking
- azure_rm_virtualmachinescaleset:
- resource_group: "{{ resource_group }}"
- name: testVMSS{{ rpfx }}4
- vm_size: Standard_B1s
- virtual_network_name: testVnet
- subnet_name: testSubnet
- admin_username: testuser
- ssh_password_enabled: true
- admin_password: "Password1234!"
- image:
- offer: CoreOS
- publisher: CoreOS
- sku: Stable
- version: latest
- upgrade_policy: Manual
- enable_accelerated_networking: yes
- register: results
- ignore_errors: yes
-
-- name: Assert failure to show that accelerated networking is enabled only with supported instance types.
- assert:
- that:
- - '"VMSizeIsNotPermittedToEnableAcceleratedNetworkingForVmss" in results.msg'
-
-- name: Delete network security group
- azure_rm_securitygroup:
- resource_group: "{{ resource_group }}"
- name: testNetworkSecurityGroup
- state: absent
-
-- name: Delete network security group
- azure_rm_securitygroup:
- resource_group: "{{ resource_group_secondary }}"
- name: testNetworkSecurityGroup2
- state: absent
-
-- name: Delete load balancer
- azure_rm_loadbalancer:
- resource_group: "{{ resource_group }}"
- name: testLB
- state: absent
-
-- name: Delete public IP address
- azure_rm_publicipaddress:
- resource_group: "{{ resource_group }}"
- state: absent
- name: testPublicIP
-
-- name: Delete virtual network
- azure_rm_virtualnetwork:
- resource_group: "{{ resource_group }}"
- name: testVnet
- state: absent
- address_prefixes: "10.0.0.0/16"
-
-# TODO: Until we have a module to create/delete images this is the best tests
-# I can do
-- name: assert error thrown with invalid image dict
- azure_rm_virtualmachinescaleset:
- resource_group: "{{ resource_group }}"
- name: testvm002
- vm_size: Standard_B1s
- image:
- offer: UbuntuServer
- register: fail_invalid_image_dict
- failed_when: 'fail_invalid_image_dict.msg != "parameter error: expecting image to contain [publisher, offer, sku, version], [name, resource_group] or [id]"'
-
-- name: assert error thrown with invalid image type
- azure_rm_virtualmachinescaleset:
- resource_group: "{{ resource_group }}"
- name: testvm002
- vm_size: Standard_B1s
- image:
- - testing
- register: fail_invalid_image_type
- failed_when: 'fail_invalid_image_type.msg != "parameter error: expecting image to be a string or dict not list"'
-
-- name: assert error finding missing custom image
- azure_rm_virtualmachinescaleset:
- resource_group: "{{ resource_group }}"
- name: testvm002
- vm_size: Standard_B1s
- image: invalid-image
- register: fail_missing_custom_image
- failed_when: fail_missing_custom_image.msg != "Error could not find image with name invalid-image"
-
-- name: assert error finding missing custom image (dict style)
- azure_rm_virtualmachinescaleset:
- resource_group: "{{ resource_group }}"
- name: testvm002
- vm_size: Standard_B1s
- image:
- name: invalid-image
- register: fail_missing_custom_image_dict
- failed_when: fail_missing_custom_image_dict.msg != "Error could not find image with name invalid-image"
diff --git a/test/integration/targets/azure_rm_virtualnetwork/aliases b/test/integration/targets/azure_rm_virtualnetwork/aliases
deleted file mode 100644
index aa77c071a8..0000000000
--- a/test/integration/targets/azure_rm_virtualnetwork/aliases
+++ /dev/null
@@ -1,3 +0,0 @@
-cloud/azure
-shippable/azure/group2
-destructive
diff --git a/test/integration/targets/azure_rm_virtualnetwork/meta/main.yml b/test/integration/targets/azure_rm_virtualnetwork/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_virtualnetwork/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_virtualnetwork/tasks/main.yml b/test/integration/targets/azure_rm_virtualnetwork/tasks/main.yml
deleted file mode 100644
index ff402462d2..0000000000
--- a/test/integration/targets/azure_rm_virtualnetwork/tasks/main.yml
+++ /dev/null
@@ -1,181 +0,0 @@
-- name: Prepare random number
- set_fact:
- vnetname: "vnet{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
-
-- name: Delete virtual network, if it exists
- azure_rm_virtualnetwork:
- name: "{{ vnetname }}"
- resource_group: "{{ resource_group }}"
- state: absent
-
-- name: Create virtual network
- azure_rm_virtualnetwork:
- name: "{{ vnetname }}"
- address_prefixes_cidr:
- - 10.1.0.0/16
- - 172.100.0.0/16
- tags:
- testing: testing
- delete: on-exit
- resource_group: "{{ resource_group }}"
-
-- name: Create virtual network
- azure_rm_virtualnetwork:
- name: "{{ vnetname }}"
- address_prefixes_cidr:
- - 10.1.0.0/16
- - 172.100.0.0/16
- dns_servers:
- - 127.0.0.1
- - 127.0.0.3
- tags:
- testing: testing
- delete: on-exit
- resource_group: "{{ resource_group }}"
- register: output
-
-- assert:
- that:
- - "output.state.address_prefixes | length == 2"
- - "output.state.dns_servers | length == 2"
- - "output.state.tags.delete == 'on-exit'"
- - "output.state.tags | length == 2"
-
-- name: Attach a subnet
- azure_rm_subnet:
- resource_group: "{{ resource_group }}"
- name: "{{ vnetname }}"
- virtual_network_name: "{{ vnetname }}"
- address_prefix_cidr: "10.1.0.0/24"
-
-- name: Gather facts by name, tags
- azure_rm_virtualnetwork_facts:
- resource_group: "{{ resource_group }}"
- name: "{{ vnetname }}"
- tags:
- - testing
- register: facts
-
-- assert:
- that:
- - "azure_virtualnetworks | length == 1"
- - "facts.virtualnetworks | length == 1"
- - "facts.virtualnetworks[0].dns_servers | length == 2"
- - "facts.virtualnetworks[0].address_prefixes | length == 2"
- - "facts.virtualnetworks[0].subnets | length == 1"
-
-- name: Gather facts by resource group, tags
- azure_rm_virtualnetwork_facts:
- resource_group: "{{ resource_group }}"
- tags:
- - testing
-
-- assert:
- that: "azure_virtualnetworks | length >= 1"
-
-- name: Gather facts by tags
- azure_rm_virtualnetwork_facts:
- tags:
- - testing
-
-- assert:
- that: "azure_virtualnetworks | length >= 1"
-
-- name: Should be idempotent
- azure_rm_virtualnetwork:
- name: "{{ vnetname }}"
- address_prefixes_cidr:
- - 10.1.0.0/16
- - 172.100.0.0/16
- dns_servers:
- - 127.0.0.1
- - 127.0.0.3
- tags:
- testing: testing
- delete: on-exit
- resource_group: "{{ resource_group }}"
- register: output
-
-- assert:
- that: not output.changed
-
-- name: Update tags
- azure_rm_virtualnetwork:
- name: "{{ vnetname }}"
- tags:
- testing: 'no'
- delete: never
- foo: bar
- resource_group: "{{ resource_group }}"
- register: output
-
-- assert:
- that: output.state.tags | length == 3
-
-- name: Purge tags
- azure_rm_virtualnetwork:
- name: "{{ vnetname }}"
- append_tags: no
- tags:
- testing: 'always'
- resource_group: "{{ resource_group }}"
- register: output
-
-- assert:
- that:
- - output.state.tags | length == 1
- - output.state.tags.testing == 'always'
-
-- name: Should require address_prefixes_cidr when purge_address_prefixes
- azure_rm_virtualnetwork:
- name: "{{ vnetname }}"
- purge_address_prefixes: true
- resource_group: "{{ resource_group }}"
- register: output
- ignore_errors: yes
-
-- assert:
- that: output.failed
-
-- name: Purge address prefixes
- azure_rm_virtualnetwork:
- name: "{{ vnetname }}"
- address_prefixes_cidr: 10.1.0.0/16
- purge_address_prefixes: true
- resource_group: "{{ resource_group }}"
- register: output
-
-- assert:
- that:
- - output.state.address_prefixes | length == 1
- - output.state.address_prefixes[0] == '10.1.0.0/16'
- - output.state.dns_servers | length == 2
- - output.state.dns_servers[0] == '127.0.0.1'
-
-- name: Purge DNS servers
- azure_rm_virtualnetwork:
- name: "{{ vnetname }}"
- purge_dns_servers: true
- resource_group: "{{ resource_group }}"
- register: output
-
-- assert:
- that: output.state['dns_servers'] is undefined
-
-- name: Gather facts
- azure_rm_virtualnetwork_facts:
- resource_group: "{{ resource_group }}"
- name: "{{ vnetname }}"
- register: facts
-
-- assert:
- that:
- - azure_virtualnetworks | length == 1
- - facts.virtualnetworks | length == 1
- - "facts.virtualnetworks[0].subnets | length == 1"
-
-- name: Delete virtual network
- azure_rm_virtualnetwork:
- name: "{{ vnetname }}"
- resource_group: "{{ resource_group }}"
- state: absent
diff --git a/test/integration/targets/azure_rm_virtualnetworkgateway/aliases b/test/integration/targets/azure_rm_virtualnetworkgateway/aliases
deleted file mode 100644
index aa77c071a8..0000000000
--- a/test/integration/targets/azure_rm_virtualnetworkgateway/aliases
+++ /dev/null
@@ -1,3 +0,0 @@
-cloud/azure
-shippable/azure/group2
-destructive
diff --git a/test/integration/targets/azure_rm_virtualnetworkgateway/meta/main.yml b/test/integration/targets/azure_rm_virtualnetworkgateway/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_virtualnetworkgateway/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_virtualnetworkgateway/tasks/main.yml b/test/integration/targets/azure_rm_virtualnetworkgateway/tasks/main.yml
deleted file mode 100644
index 146d3769a5..0000000000
--- a/test/integration/targets/azure_rm_virtualnetworkgateway/tasks/main.yml
+++ /dev/null
@@ -1,126 +0,0 @@
-# FIXME: needs minimal tests (check mode?) that can run quickly, VNG creation takes > 20min
-
-- name: Prepare random number
- set_fact:
- vnetname: "vnet{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- vngname: "vng{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
-
-- name: Create virtual network gateway without bgp settings (check mode)
- check_mode: yes
- azure_rm_virtualnetworkgateway:
- resource_group: "{{ resource_group }}"
- name: "{{ vngname }}"
- ip_configurations:
- - name: testipconfig
- private_ip_allocation_method: Dynamic
- public_ip_address_name: testPublicIP
- virtual_network: "{{ vnetname }}"
- tags:
- common: "xyz"
- register: output
-
-- assert:
- that: output.changed
-
-- name: long-running virtualnetworkgateway tests [run with `--tags long_run,untagged` to enable]
- tags: [long_run, never]
- block:
- - name: Create virtual network
- azure_rm_virtualnetwork:
- resource_group: "{{ resource_group }}"
- name: "{{ vnetname }}"
- address_prefixes: "10.0.0.0/16"
-
- - name: Add subnet
- azure_rm_subnet:
- resource_group: "{{ resource_group }}"
- name: GatewaySubnet
- address_prefix: "10.0.2.0/24"
- virtual_network: "{{ vnetname }}"
-
- - name: Create public IP address
- azure_rm_publicipaddress:
- resource_group: "{{ resource_group }}"
- allocation_method: Dynamic
- name: testPublicIP
-
- - name: Create virtual network gateway without bgp settings
- azure_rm_virtualnetworkgateway:
- resource_group: "{{ resource_group }}"
- name: "{{ vngname }}"
- ip_configurations:
- - name: testipconfig
- private_ip_allocation_method: Dynamic
- public_ip_address_name: testPublicIP
- virtual_network: "{{ vnetname }}"
- tags:
- common: "xyz"
- register: output
-
- - assert:
- that: output.changed
-
- - name: Create virtual network gateway without bgp settings
- azure_rm_virtualnetworkgateway:
- resource_group: "{{ resource_group }}"
- name: "{{ vngname }}"
- ip_configurations:
- - name: testipconfig
- private_ip_allocation_method: Dynamic
- public_ip_address_name: testPublicIP
- virtual_network: "{{ vnetname }}"
- tags:
- common: "xyz"
- register: output
-
- - assert:
- that: output.changed
-
- - name: Create virtual network gateway without bgp settings - idempotent
- azure_rm_virtualnetworkgateway:
- resource_group: "{{ resource_group }}"
- name: "{{ vngname }}"
- ip_configurations:
- - name: testipconfig
- private_ip_allocation_method: Dynamic
- public_ip_address_name: testPublicIP
- virtual_network: "{{ vnetname }}"
- tags:
- common: "xyz"
- register: output
-
- - assert:
- that: not output.changed
-
- - name: Update virtual network gateway
- azure_rm_virtualnetworkgateway:
- resource_group: "{{ resource_group }}"
- name: "{{ vngname }}"
- ip_configurations:
- - name: testipconfig
- private_ip_allocation_method: Dynamic
- public_ip_address_name: testPublicIP
- virtual_network: "{{ vnetname }}"
- tags:
- common: "mno"
- register: output
- - assert:
- that: output.changed
-
- - name: Delete virtual network gateway
- azure_rm_virtualnetworkgateway:
- resource_group: "{{ resource_group }}"
- name: "{{ vngname }}"
- state: absent
- register: output
- - assert:
- that: output.changed
-
-- name: Delete virtual network gateway - idempotent
- azure_rm_virtualnetworkgateway:
- resource_group: "{{ resource_group }}"
- name: "{{ vngname }}"
- state: absent
- register: output
-- assert:
- that: not output.changed
diff --git a/test/integration/targets/azure_rm_virtualnetworkpeering/aliases b/test/integration/targets/azure_rm_virtualnetworkpeering/aliases
deleted file mode 100644
index aa77c071a8..0000000000
--- a/test/integration/targets/azure_rm_virtualnetworkpeering/aliases
+++ /dev/null
@@ -1,3 +0,0 @@
-cloud/azure
-shippable/azure/group2
-destructive
diff --git a/test/integration/targets/azure_rm_virtualnetworkpeering/meta/main.yml b/test/integration/targets/azure_rm_virtualnetworkpeering/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_virtualnetworkpeering/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_virtualnetworkpeering/tasks/main.yml b/test/integration/targets/azure_rm_virtualnetworkpeering/tasks/main.yml
deleted file mode 100644
index 9eb0424af3..0000000000
--- a/test/integration/targets/azure_rm_virtualnetworkpeering/tasks/main.yml
+++ /dev/null
@@ -1,126 +0,0 @@
-- name: Prepare random number
- set_fact:
- vnetname1: "vnet1{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- vnetname2: "vnet2{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}"
- peering_name: "peering1{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 100 | random }}"
-
-- name: Create first virtual network
- azure_rm_virtualnetwork:
- name: "{{ vnetname1 }}"
- address_prefixes_cidr:
- - 10.1.0.0/16
- tags:
- testing: testing
- delete: on-exit
- resource_group: "{{ resource_group }}"
- register: vnet1
-
-- name: Create second virtual network
- azure_rm_virtualnetwork:
- name: "{{ vnetname2 }}"
- address_prefixes_cidr:
- - 10.2.0.0/24
- resource_group: "{{ resource_group_secondary }}"
- register: vnet2
-
-- assert:
- that:
- - vnet1.changed
- - vnet2.changed
-
-- name: Create virtual network peering (check mode)
- azure_rm_virtualnetworkpeering:
- resource_group: "{{ resource_group }}"
- name: "{{ peering_name }}"
- virtual_network: "{{ vnetname1 }}"
- remote_virtual_network:
- resource_group: "{{ resource_group_secondary }}"
- name: "{{ vnetname2 }}"
- allow_virtual_network_access: false
- allow_forwarded_traffic: true
- check_mode: yes
- register: output
-
-- assert:
- that: output.changed
-
-- name: Create virtual network peering
- azure_rm_virtualnetworkpeering:
- resource_group: "{{ resource_group }}"
- name: "{{ peering_name }}"
- virtual_network: "{{ vnetname1 }}"
- remote_virtual_network:
- resource_group: "{{ resource_group_secondary }}"
- name: "{{ vnetname2 }}"
- allow_virtual_network_access: false
- allow_forwarded_traffic: true
- register: output
-
-- assert:
- that: output.changed
-
-- name: Update virtual network peering (idempotent)
- azure_rm_virtualnetworkpeering:
- resource_group: "{{ resource_group }}"
- name: "{{ peering_name }}"
- virtual_network: "{{ vnetname1 }}"
- remote_virtual_network:
- resource_group: "{{ resource_group_secondary }}"
- name: "{{ vnetname2 }}"
- allow_virtual_network_access: false
- allow_forwarded_traffic: true
- register: output
-
-- assert:
- that: not output.changed
-
-- name: Update virtual network peering
- azure_rm_virtualnetworkpeering:
- resource_group: "{{ resource_group }}"
- name: "{{ peering_name }}"
- virtual_network: "{{ vnetname1 }}"
- remote_virtual_network:
- resource_group: "{{ resource_group_secondary }}"
- name: "{{ vnetname2 }}"
- allow_virtual_network_access: true
- allow_forwarded_traffic: false
- register: output
-
-- assert:
- that: output.changed
-
-- name: Get facts
- azure_rm_virtualnetworkpeering_facts:
- resource_group: "{{ resource_group }}"
- name: "{{ peering_name }}"
- virtual_network: "{{ vnetname1 }}"
- register: facts
-
-- name: Assert Facts
- assert:
- that:
- - facts['vnetpeerings'] | length == 1
- - facts['vnetpeerings'][0]['id']
- - facts['vnetpeerings'][0]['peering_state']
- - facts['vnetpeerings'][0]['remote_virtual_network']
- - facts['vnetpeerings'][0]['provisioning_state']
-
-- name: Delete virtual network peering
- azure_rm_virtualnetworkpeering:
- resource_group: "{{ resource_group }}"
- name: "{{ peering_name }}"
- virtual_network: "{{ vnetname1 }}"
- state: absent
- register: output
-
-- name: Delete first virtual network
- azure_rm_virtualnetwork:
- name: "{{ vnetname1 }}"
- resource_group: "{{ resource_group }}"
- state: absent
-
-- name: Delete virtual network
- azure_rm_virtualnetwork:
- name: "{{ vnetname2 }}"
- resource_group: "{{ resource_group_secondary }}"
- state: absent \ No newline at end of file
diff --git a/test/integration/targets/azure_rm_webapp/aliases b/test/integration/targets/azure_rm_webapp/aliases
deleted file mode 100644
index c7c2aff0c0..0000000000
--- a/test/integration/targets/azure_rm_webapp/aliases
+++ /dev/null
@@ -1,5 +0,0 @@
-cloud/azure
-shippable/azure/group3
-destructive
-azure_rm_webapp_facts
-azure_rm_webappslot
diff --git a/test/integration/targets/azure_rm_webapp/meta/main.yml b/test/integration/targets/azure_rm_webapp/meta/main.yml
deleted file mode 100644
index 95e1952f98..0000000000
--- a/test/integration/targets/azure_rm_webapp/meta/main.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-dependencies:
- - setup_azure
diff --git a/test/integration/targets/azure_rm_webapp/tasks/main.yml b/test/integration/targets/azure_rm_webapp/tasks/main.yml
deleted file mode 100644
index 8efc6629de..0000000000
--- a/test/integration/targets/azure_rm_webapp/tasks/main.yml
+++ /dev/null
@@ -1,434 +0,0 @@
-- name: Fix resource prefix
- set_fact:
- linux_app_plan_resource_group: "{{ resource_group_secondary }}"
- win_app_name: "{{ (resource_prefix | replace('-','x'))[-8:] }}{{ 1000 | random}}winapp"
- win_plan_name: "{{ (resource_prefix | replace('-','x'))[-8:] }}winplan"
- linux_plan_name: "{{ (resource_group_secondary | replace('-','x'))[-8:] }}linplan"
- slot1_name: "stage1"
-
-- name: Create a windows web app with non-exist app service plan
- azure_rm_webapp:
- resource_group: "{{ resource_group }}"
- name: "{{ win_app_name }}1"
- plan:
- resource_group: "{{ resource_group }}"
- name: "{{ win_plan_name }}"
- is_linux: false
- sku: S1
-
-- name: Create a windows web app with existing app service plan
- azure_rm_webapp:
- resource_group: "{{ resource_group }}"
- name: "{{ win_app_name }}2"
- plan: "{{ win_plan_name }}"
- register: output
-
-- name: stop the web app
- azure_rm_webapp:
- resource_group: "{{ resource_group }}"
- name: "{{ win_app_name }}2"
- plan: "{{ win_plan_name }}"
- app_state: stopped
- register: output
-
-- name: assert output changed
- assert:
- that:
- output.changed
-
-# enable after webapp_facts merged
-# - name: get the web app
-# azure_rm_webapp_facts:
-# resource_group: "{{ resource_group }}"
-# name: "{{ win_app_name }}2"
-# register: stopped
-
-# - name: assert web app is stopped
-# assert:
-# that:
-# - stopped.properties.state == "Stopped"
-
-- name: Create a windows web app with existing app service plan, try to update some root level params
- azure_rm_webapp:
- resource_group: "{{ resource_group }}"
- name: "{{ win_app_name }}3"
- plan: "{{ win_plan_name }}"
- dns_registration: true
- https_only: true
- tags:
- testwebapptag: test
- register: output
-
-- name: get web app with resource group and tag
- azure_rm_webapp_facts:
- resource_group: "{{ resource_group }}"
- name: "{{ win_app_name }}3"
- tags:
- - testwebapptag
- register: output
-
-- assert:
- that:
- - output.webapps | length == 1
-
-- name: Create a win web app with java run time specific
- azure_rm_webapp:
- resource_group: "{{ resource_group }}"
- name: "{{ win_app_name }}4"
- plan: "{{ win_plan_name }}"
- frameworks:
- - name: "java"
- version: "1.8"
- settings:
- java_container: "Tomcat"
- java_container_version: "8.0"
- app_settings:
- testkey: "testvalue"
- register: output
-
-- name: assert the web app was created
- assert:
- that: output.changed
-
-- name: get web app with name
- azure_rm_webapp_facts:
- resource_group: "{{ resource_group }}"
- name: "{{ win_app_name }}4"
- register: output
-
-- assert:
- that:
- - output.webapps | length == 1
- - output.webapps[0].app_settings | length == 1
- - output.webapps[0].frameworks | length > 1 # there's default frameworks eg net_framework
-
-- name: Update app settings and framework
- azure_rm_webapp:
- resource_group: "{{ resource_group }}"
- name: "{{ win_app_name }}4"
- plan: "{{ win_plan_name }}"
- frameworks:
- - name: "java"
- version: "1.7"
- settings:
- java_container: "Tomcat"
- java_container_version: "8.5"
- app_settings:
- testkey2: "testvalue2"
- register: output
-
-- name: Assert the web app was updated
- assert:
- that:
- - output.changed
-
-- name: get web app with name
- azure_rm_webapp_facts:
- resource_group: "{{ resource_group }}"
- name: "{{ win_app_name }}4"
- register: output
-
-- name: Assert updating
- assert:
- that:
- - output.webapps[0].app_settings | length == 2
- - output.webapps[0].app_settings['testkey'] == 'testvalue'
- - output.webapps[0].app_settings['testkey2'] == 'testvalue2'
-
-- name: get web app with return publishing profile
- azure_rm_webapp_facts:
- resource_group: "{{ resource_group }}"
- name: "{{ win_app_name }}4"
- return_publish_profile: true
- register: output
-
-- assert:
- that:
- - output.webapps | length == 1
- - output.webapps[0].publishing_username != ""
- - output.webapps[0].publishing_password != ""
-
-- name: Purge all existing app settings
- azure_rm_webapp:
- resource_group: "{{ resource_group }}"
- name: "{{ win_app_name }}4"
- plan: "{{ win_plan_name }}"
- purge_app_settings: true
- register: output
-
-- name: Assert the web app was updated
- assert:
- that: output.changed
-
-- name: Create a win web app with python run time and php run time
- azure_rm_webapp:
- resource_group: "{{ resource_group }}"
- name: "{{ win_app_name }}5"
- plan: "{{ win_plan_name }}"
- frameworks:
- - name: "python"
- version: "2.7"
- - name: node
- version: "6.6"
- - name: "php"
- version: "7.0"
- register: output
-
-- name: Assert the web app was created
- assert:
- that: output.changed
-
-- name: Create a docker web app with some app settings
- azure_rm_webapp:
- resource_group: "{{ resource_group }}"
- name: "{{ win_app_name }}6"
- plan:
- resource_group: "{{ linux_app_plan_resource_group }}"
- name: "{{ linux_plan_name }}"
- is_linux: true
- sku: S1
- number_of_workers: 1
- container_settings:
- name: "ansible/ansible:ubuntu1404"
- register: output
-
-- name: Assert the web app was created
- assert:
- that: output.changed
-
-- name: Create a docker web app with private acr registry
- azure_rm_webapp:
- resource_group: "{{ resource_group }}"
- name: "{{ win_app_name }}7"
- plan:
- resource_group: "{{ linux_app_plan_resource_group }}"
- name: "{{ linux_plan_name }}"
- container_settings:
- name: "ansible/ansible:ubuntu1404"
- registry_server_url: test.io
- registry_server_user: user
- registry_server_password: password
- register: output
-
-- name: Assert the web app was created
- assert:
- that: output.changed
-
-- name: Create a linux web app with nodejs framework
- azure_rm_webapp:
- resource_group: "{{ resource_group }}"
- name: "{{ win_app_name }}8"
- plan:
- resource_group: "{{ linux_app_plan_resource_group }}"
- name: "{{ linux_plan_name }}"
- frameworks:
- - name: node
- version: "6.6"
- register: output
-
-- name: Should be idempotent with linux web app created
- azure_rm_webapp:
- resource_group: "{{ resource_group }}"
- name: "{{ win_app_name }}8"
- plan:
- resource_group: "{{ linux_app_plan_resource_group }}"
- name: "{{ linux_plan_name }}"
- frameworks:
- - name: node
- version: "6.6"
- register: output
-
-- assert:
- that: not output.changed
-
-- name: Update nodejs framework
- azure_rm_webapp:
- resource_group: "{{ resource_group }}"
- name: "{{ win_app_name }}8"
- plan:
- resource_group: "{{ linux_app_plan_resource_group }}"
- name: "{{ linux_plan_name }}"
- frameworks:
- - name: node
- version: "6.9"
- register: output
-
-- name: Assert the web app was created
- assert:
- that: output.changed
-
-- name: Create a linux web app with deployment source github
- azure_rm_webapp:
- resource_group: "{{ resource_group }}"
- name: "{{ win_app_name }}10"
- plan:
- resource_group: "{{ linux_app_plan_resource_group }}"
- name: "{{ linux_plan_name }}"
- deployment_source:
- url: "https://github.com/test/test"
- branch: master
- scm_type: GitHub
- register: output
-
-- name: Assert the web app was created
- assert:
- that: output.changed
-
-- name: Delete web app
- azure_rm_webapp:
- resource_group: "{{ resource_group }}"
- name: "{{ win_app_name }}8"
- state: absent
- register: output
-
-- name: Assert the web app was deleted
- assert:
- that: output.changed
-
-- name: assert error that java is mutually exclusive with frameworks
- azure_rm_webapp:
- resource_group: "{{ resource_group }}"
- name: "{{ win_app_name }}11"
- plan: "{{ win_plan_name }}"
- frameworks:
- - name: "python"
- version: "2.7"
- - name: "java"
- version: "1.8"
- register: fail_win_java_version_mutual_exclusive
- failed_when: 'fail_win_java_version_mutual_exclusive.msg != "Java is mutually exclusive with other frameworks."'
-
-- name: assert error when linux web app, only can specify one framework
- azure_rm_webapp:
- resource_group: "{{ resource_group }}"
- name: "{{ linux_plan_name }}12"
- plan:
- resource_group: "{{ linux_app_plan_resource_group }}"
- name: "{{ linux_plan_name }}"
- frameworks:
- - name: "python"
- version: "2.7"
- - name: "node"
- version: "6.6"
- register: fail_linux_one_framework_only
- failed_when: fail_linux_one_framework_only.msg != "Can specify one framework only for Linux web app."
-
-- name: Create a linux web app with java tomcat container
- azure_rm_webapp:
- resource_group: "{{ resource_group }}"
- name: "{{ win_app_name }}13"
- plan:
- resource_group: "{{ linux_app_plan_resource_group }}"
- name: "{{ linux_plan_name }}"
- frameworks:
- - name: java
- version: "8"
- settings:
- java_container: "tomcat"
- java_container_version: "8.5"
- register: output
-
-- name: Assert the web app was created
- assert:
- that: output.changed
-
-- name: Get facts with publish profile
- azure_rm_webapp_facts:
- resource_group: "{{ resource_group }}"
- name: "{{ win_app_name }}13"
- no_log: true
- register: facts
-
-- name: Assert publish profile returned
- assert:
- that:
- - facts.webapps[0].ftp_publish_url != ''
-
-- name: Create a webapp slot (Check mode)
- azure_rm_webappslot:
- resource_group: "{{ resource_group }}"
- webapp_name: "{{ win_app_name }}13"
- name: "{{ slot1_name }}"
- configuration_source: "{{ win_app_name }}13"
- app_settings:
- testkey: testvalue
- check_mode: yes
- register: output
-
-- name: Assert slot check mode creation
- assert:
- that:
- - output.changed
-
-- name: Create a webapp slot
- azure_rm_webappslot:
- resource_group: "{{ resource_group }}"
- webapp_name: "{{ win_app_name }}13"
- name: "{{ slot1_name }}"
- configuration_source: "{{ win_app_name }}13"
- app_settings:
- testkey: testvalueslot
- register: output
-
-- name: Assert slot creation
- assert:
- that:
- - output.changed
-
-- name: Update webapp slot (idempotence)
- azure_rm_webappslot:
- resource_group: "{{ resource_group }}"
- webapp_name: "{{ win_app_name }}13"
- name: "{{ slot1_name }}"
- app_settings:
- testkey: testvalueslot
- register: output
-
-- name: Assert idempotence
- assert:
- that:
- - not output.changed
-
-- name: Update webapp slot
- azure_rm_webappslot:
- resource_group: "{{ resource_group }}"
- webapp_name: "{{ win_app_name }}13"
- name: "{{ slot1_name }}"
- frameworks:
- - name: "node"
- version: "10.1"
- app_settings:
- testkey: testvalue2
- register: output
-
-- name: Assert updating
- assert:
- that:
- - output.changed
-
-- name: Swap webapp slot
- azure_rm_webappslot:
- resource_group: "{{ resource_group }}"
- webapp_name: "{{ win_app_name }}13"
- name: "{{ slot1_name }}"
- swap:
- action: swap
- register: output
-
-- name: Assert swap
- assert:
- that:
- - output.changed
-
-- name: Stop webapp slot
- azure_rm_webappslot:
- resource_group: "{{ resource_group }}"
- webapp_name: "{{ win_app_name }}13"
- name: "{{ slot1_name }}"
- app_state: stopped
- register: output
-
-- name: Assert stopped
- assert:
- that:
- - output.changed \ No newline at end of file