diff options
Diffstat (limited to 'test')
169 files changed, 0 insertions, 14564 deletions
diff --git a/test/integration/targets/azure_rm_acs/aliases b/test/integration/targets/azure_rm_acs/aliases deleted file mode 100644 index 70048be663..0000000000 --- a/test/integration/targets/azure_rm_acs/aliases +++ /dev/null @@ -1,3 +0,0 @@ -cloud/azure -destructive -unsupported diff --git a/test/integration/targets/azure_rm_acs/meta/main.yml b/test/integration/targets/azure_rm_acs/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_acs/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_acs/tasks/main.yml b/test/integration/targets/azure_rm_acs/tasks/main.yml deleted file mode 100644 index a35871c09b..0000000000 --- a/test/integration/targets/azure_rm_acs/tasks/main.yml +++ /dev/null @@ -1,149 +0,0 @@ - - name: Create an ACS instance - DCOS - azure_rm_acs: - name: "acsdcos{{ resource_group | hash('md5') | truncate(7, True, '') }}" - resource_group: "{{ resource_group }}" - location: eastus - orchestration_platform: DCOS - master_profile: - - count: 1 - dns_prefix: "acsdcos{{ resource_group | hash('md5') | truncate(10, True, '') }}" - vm_size: Standard_A0 - linux_profile: - - admin_username: azureuser - ssh_key: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqaZoyiz1qbdOQ8xEf6uEu1cCwYowo5FHtsBhqLoDnnp7KUTEBN+io238wdhjkasndq238e2/983289dasjnasey823/YkUCuzxDpsH7DUDhZcwySLKVVe0Qm3+928dfsjsejk298r/+vAnflKebuypNlmocIvakFWoZda18FOmsOoIVXQ8HWFNCuw9ZCunMSN62QGamCe3dL5cXlkgHYv7ekJE15IA9aOJcM7e90oeTqo+dsajda82e78sdja/llas8tsXY85LFqRnr3gJ02bAscjc477+X+j/gkpFoN1QEmt juliens@msft.com - agent_pool_profiles: - - name: default - count: 1 - dns_prefix: "acsdcos{{ resource_group | hash('md5') | truncate(12, True, '') }}" - vm_size: Standard_A0 - diagnostics_profile: false - register: output - - - name: Assert the ACS instance is well created - assert: - that: - - output.changed - - output.state.provisioning_state == 'Succeeded' - - - name: Scale the ACS instance from 1 to 2 - DCOS - azure_rm_acs: - name: "acsdcos{{ resource_group | hash('md5') | truncate(7, True, '') }}" - resource_group: "{{ resource_group }}" - location: eastus - orchestration_platform: DCOS - master_profile: - - count: 1 - dns_prefix: "acsdcos{{ resource_group | hash('md5') | truncate(10, True, '') }}" - vm_size: Standard_A0 - linux_profile: - - admin_username: azureuser - ssh_key: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqaZoyiz1qbdOQ8xEf6uEu1cCwYowo5FHtsBhqLoDnnp7KUTEBN+io238wdhjkasndq238e2/983289dasjnasey823/YkUCuzxDpsH7DUDhZcwySLKVVe0Qm3+928dfsjsejk298r/+vAnflKebuypNlmocIvakFWoZda18FOmsOoIVXQ8HWFNCuw9ZCunMSN62QGamCe3dL5cXlkgHYv7ekJE15IA9aOJcM7e90oeTqo+dsajda82e78sdja/llas8tsXY85LFqRnr3gJ02bAscjc477+X+j/gkpFoN1QEmt juliens@msft.com - agent_pool_profiles: - - name: default - count: 2 - dns_prefix: "acsdcos{{ resource_group | hash('md5') | truncate(12, True, '') }}" - vm_size: Standard_A0 - diagnostics_profile: false - register: output - - - name: Assert the ACS instance is well scaled - assert: - that: - - output.changed - - output.state.agent_pool_profiles[0].count == 2 - - - name: Delete the DCOS ACS instance - DCOS - azure_rm_acs: - name: "acsdcos{{ resource_group | hash('md5') | truncate(7, True, '') }}" - resource_group: "{{ resource_group }}" - location: eastus - orchestration_platform: DCOS - state: absent - master_profile: - - count: 1 - dns_prefix: "acsdcos{{ resource_group | hash('md5') | truncate(10, True, '') }}" - vm_size: Standard_A0 - linux_profile: - - admin_username: azureuser - ssh_key: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqaZoyiz1qbdOQ8xEf6uEu1cCwYowo5FHtsBhqLoDnnp7KUTEBN+io238wdhjkasndq238e2/983289dasjnasey823/YkUCuzxDpsH7DUDhZcwySLKVVe0Qm3+928dfsjsejk298r/+vAnflKebuypNlmocIvakFWoZda18FOmsOoIVXQ8HWFNCuw9ZCunMSN62QGamCe3dL5cXlkgHYv7ekJE15IA9aOJcM7e90oeTqo+dsajda82e78sdja/llas8tsXY85LFqRnr3gJ02bAscjc477+X+j/gkpFoN1QEmt juliens@msft.com - agent_pool_profiles: - - name: default - count: 2 - dns_prefix: "acsdcos{{ resource_group | hash('md5') | truncate(12, True, '') }}" - vm_size: Standard_A0 - diagnostics_profile: false - - - name: Create an ACS instance - Swarm - azure_rm_acs: - name: "acssw{{ resource_group | hash('md5') | truncate(7, True, '') }}" - resource_group: "{{ resource_group }}" - location: eastus - orchestration_platform: Swarm - master_profile: - - count: 1 - dns_prefix: "acssw{{ resource_group | hash('md5') | truncate(10, True, '') }}" - vm_size: Standard_A0 - linux_profile: - - admin_username: azureuser - ssh_key: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqaZoyiz1qbdOQ8xEf6uEu1cCwYowo5FHtsBhqLoDnnp7KUTEBN+io238wdhjkasndq238e2/983289dasjnasey823/YkUCuzxDpsH7DUDhZcwySLKVVe0Qm3+928dfsjsejk298r/+vAnflKebuypNlmocIvakFWoZda18FOmsOoIVXQ8HWFNCuw9ZCunMSN62QGamCe3dL5cXlkgHYv7ekJE15IA9aOJcM7e90oeTqo+dsajda82e78sdja/llas8tsXY85LFqRnr3gJ02bAscjc477+X+j/gkpFoN1QEmt juliens@msft.com - agent_pool_profiles: - - name: default - count: 1 - dns_prefix: "acssw{{ resource_group | hash('md5') | truncate(12, True, '') }}" - vm_size: Standard_A0 - diagnostics_profile: false - register: output - - - name: Assert the ACS instance is well created - assert: - that: - - output.changed - - output.state.provisioning_state == 'Succeeded' - - - name: Scale the ACS instance from 1 to 2 - Swarm - azure_rm_acs: - name: "acssw{{ resource_group | hash('md5') | truncate(7, True, '') }}" - resource_group: "{{ resource_group }}" - location: eastus - orchestration_platform: Swarm - master_profile: - - count: 1 - dns_prefix: "acssw{{ resource_group | hash('md5') | truncate(10, True, '') }}" - vm_size: Standard_A0 - linux_profile: - - admin_username: azureuser - ssh_key: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqaZoyiz1qbdOQ8xEf6uEu1cCwYowo5FHtsBhqLoDnnp7KUTEBN+io238wdhjkasndq238e2/983289dasjnasey823/YkUCuzxDpsH7DUDhZcwySLKVVe0Qm3+928dfsjsejk298r/+vAnflKebuypNlmocIvakFWoZda18FOmsOoIVXQ8HWFNCuw9ZCunMSN62QGamCe3dL5cXlkgHYv7ekJE15IA9aOJcM7e90oeTqo+dsajda82e78sdja/llas8tsXY85LFqRnr3gJ02bAscjc477+X+j/gkpFoN1QEmt juliens@msft.com - agent_pool_profiles: - - name: default - count: 2 - dns_prefix: "acssw{{ resource_group | hash('md5') | truncate(12, True, '') }}" - vm_size: Standard_A0 - diagnostics_profile: false - register: output - - - name: Assert the ACS instance is well scaled - assert: - that: - - output.changed - - output.state.agent_pool_profiles[0].count == 2 - - - name: Delete the ACS instance - Swarm - azure_rm_acs: - name: "acssw{{ resource_group | hash('md5') | truncate(7, True, '') }}" - resource_group: "{{ resource_group }}" - location: eastus - orchestration_platform: Swarm - state: absent - master_profile: - - count: 1 - dns_prefix: "acssw{{ resource_group | hash('md5') | truncate(10, True, '') }}" - vm_size: Standard_A0 - linux_profile: - - admin_username: azureuser - ssh_key: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqaZoyiz1qbdOQ8xEf6uEu1cCwYowo5FHtsBhqLoDnnp7KUTEBN+io238wdhjkasndq238e2/983289dasjnasey823/YkUCuzxDpsH7DUDhZcwySLKVVe0Qm3+928dfsjsejk298r/+vAnflKebuypNlmocIvakFWoZda18FOmsOoIVXQ8HWFNCuw9ZCunMSN62QGamCe3dL5cXlkgHYv7ekJE15IA9aOJcM7e90oeTqo+dsajda82e78sdja/llas8tsXY85LFqRnr3gJ02bAscjc477+X+j/gkpFoN1QEmt juliens@msft.com - agent_pool_profiles: - - name: default - count: 2 - dns_prefix: "acssw{{ resource_group | hash('md5') | truncate(12, True, '') }}" - vm_size: Standard_A0 - diagnostics_profile: false
\ No newline at end of file diff --git a/test/integration/targets/azure_rm_aks/aliases b/test/integration/targets/azure_rm_aks/aliases deleted file mode 100644 index e340069a05..0000000000 --- a/test/integration/targets/azure_rm_aks/aliases +++ /dev/null @@ -1,3 +0,0 @@ -cloud/azure -unsupported -destructive
\ No newline at end of file diff --git a/test/integration/targets/azure_rm_aks/meta/main.yml b/test/integration/targets/azure_rm_aks/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_aks/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_aks/tasks/main.yml b/test/integration/targets/azure_rm_aks/tasks/main.yml deleted file mode 100644 index 082f8ef185..0000000000 --- a/test/integration/targets/azure_rm_aks/tasks/main.yml +++ /dev/null @@ -1,213 +0,0 @@ - - set_fact: - rpfx: "{{ resource_group | hash('md5') | truncate(8, True, '') }}" - - - name: Find available k8s version - azure_rm_aksversion_info: - location: eastus - register: versions - - - name: Create an AKS instance (check mode) - azure_rm_aks: - name: "aks{{ rpfx }}" - resource_group: "{{ resource_group }}" - location: eastus - dns_prefix: "aks{{ rpfx }}" - kubernetes_version: "{{ versions.azure_aks_versions[0] }}" - service_principal: - client_id: "{{ azure_client_id }}" - client_secret: "{{ azure_secret }}" - linux_profile: - admin_username: azureuser - ssh_key: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDSPmiqkvDH1/+MDAVDZT8381aYqp73Odz8cnD5hegNhqtXajqtiH0umVg7HybX3wt1HjcrwKJovZURcIbbcDvzdH2bnYbF93T4OLXA0bIfuIp6M86x1iutFtXdpN3TTicINrmSXEE2Ydm51iMu77B08ZERjVaToya2F7vC+egfoPvibf7OLxE336a5tPCywavvNihQjL8sjgpDT5AAScjb3YqK/6VLeQ18Ggt8/ufINsYkb+9/Ji/3OcGFeflnDXq80vPUyF3u4iIylob6RSZenC38cXmQB05tRNxS1B6BXCjMRdy0v4pa7oKM2GA4ADKpNrr0RI9ed+peRFwmsclH test@ansible - agent_pool_profiles: - - name: default - count: 1 - vm_size: Standard_DS1_v2 - enable_rbac: yes - check_mode: yes - - - name: Check there is no AKS created - azure_rm_aks_info: - name: "aks{{ rpfx }}" - resource_group: "{{ resource_group }}" - register: fact - - - name: Check there is no AKS created - assert: - that: - - "fact.aks | length == 0" - - - name: Create an AKS instance - azure_rm_aks: - name: "aks{{ rpfx }}" - resource_group: "{{ resource_group }}" - location: eastus - dns_prefix: "aks{{ rpfx }}" - kubernetes_version: "{{ versions.azure_aks_versions[0] }}" - service_principal: - client_id: "{{ azure_client_id }}" - client_secret: "{{ azure_secret }}" - linux_profile: - admin_username: azureuser - ssh_key: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDSPmiqkvDH1/+MDAVDZT8381aYqp73Odz8cnD5hegNhqtXajqtiH0umVg7HybX3wt1HjcrwKJovZURcIbbcDvzdH2bnYbF93T4OLXA0bIfuIp6M86x1iutFtXdpN3TTicINrmSXEE2Ydm51iMu77B08ZERjVaToya2F7vC+egfoPvibf7OLxE336a5tPCywavvNihQjL8sjgpDT5AAScjb3YqK/6VLeQ18Ggt8/ufINsYkb+9/Ji/3OcGFeflnDXq80vPUyF3u4iIylob6RSZenC38cXmQB05tRNxS1B6BXCjMRdy0v4pa7oKM2GA4ADKpNrr0RI9ed+peRFwmsclH test@ansible - agent_pool_profiles: - - name: default - count: 1 - vm_size: Standard_DS1_v2 - enable_rbac: yes - register: output - - - name: Assert the AKS instance is well created - assert: - that: - - output.changed - - output.provisioning_state == 'Succeeded' - - - name: Get AKS fact - azure_rm_aks_info: - name: "aks{{ rpfx }}" - resource_group: "{{ resource_group }}" - register: fact - - - name: Assert fact returns the created one - assert: - that: - - "fact.aks | length == 1" - - fact.aks[0].id == output.id - - - name: Create an AKS instance (idempotent) - azure_rm_aks: - name: "aks{{ rpfx }}" - resource_group: "{{ resource_group }}" - location: eastus - dns_prefix: "aks{{ rpfx }}" - kubernetes_version: "{{ versions.azure_aks_versions[0] }}" - service_principal: - client_id: "{{ azure_client_id }}" - linux_profile: - admin_username: azureuser - ssh_key: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDSPmiqkvDH1/+MDAVDZT8381aYqp73Odz8cnD5hegNhqtXajqtiH0umVg7HybX3wt1HjcrwKJovZURcIbbcDvzdH2bnYbF93T4OLXA0bIfuIp6M86x1iutFtXdpN3TTicINrmSXEE2Ydm51iMu77B08ZERjVaToya2F7vC+egfoPvibf7OLxE336a5tPCywavvNihQjL8sjgpDT5AAScjb3YqK/6VLeQ18Ggt8/ufINsYkb+9/Ji/3OcGFeflnDXq80vPUyF3u4iIylob6RSZenC38cXmQB05tRNxS1B6BXCjMRdy0v4pa7oKM2GA4ADKpNrr0RI9ed+peRFwmsclH test@ansible - agent_pool_profiles: - - name: default - count: 1 - vm_size: Standard_DS1_v2 - enable_rbac: yes - register: output - - - name: Assert idempotent - assert: - that: - - not output.changed - - - name: Get available version - azure_rm_aksversion_info: - location: eastus - version: "{{ versions.azure_aks_versions[0] }}" - register: version1 - - - name: Upgrade the AKS instance with addon - azure_rm_aks: - name: "aks{{ rpfx }}" - resource_group: "{{ resource_group }}" - location: eastus - dns_prefix: "aks{{ rpfx }}" - kubernetes_version: "{{ version1.azure_aks_versions[0] }}" - service_principal: - client_id: "{{ azure_client_id }}" - linux_profile: - admin_username: azureuser - ssh_key: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDSPmiqkvDH1/+MDAVDZT8381aYqp73Odz8cnD5hegNhqtXajqtiH0umVg7HybX3wt1HjcrwKJovZURcIbbcDvzdH2bnYbF93T4OLXA0bIfuIp6M86x1iutFtXdpN3TTicINrmSXEE2Ydm51iMu77B08ZERjVaToya2F7vC+egfoPvibf7OLxE336a5tPCywavvNihQjL8sjgpDT5AAScjb3YqK/6VLeQ18Ggt8/ufINsYkb+9/Ji/3OcGFeflnDXq80vPUyF3u4iIylob6RSZenC38cXmQB05tRNxS1B6BXCjMRdy0v4pa7oKM2GA4ADKpNrr0RI9ed+peRFwmsclH test@ansible - agent_pool_profiles: - - name: default - count: 1 - vm_size: Standard_DS1_v2 - addon: - http_application_routing: {} - network_profile: - network_plugin: kubenet - enable_rbac: yes - register: output - - - name: Assert the AKS instance is upgraded - assert: - that: - - output.changed - - output.kubernetes_version == version1.azure_aks_versions[0] - - output.addon.httpApplicationRouting.enabled == True - - output.agent_pool_profiles[0].count == 1 - - output.network_profile.network_plugin == 'kubenet' - - - name: Upgrade the AKS instance with addon (idempontent) - azure_rm_aks: - name: "aks{{ rpfx }}" - resource_group: "{{ resource_group }}" - location: eastus - dns_prefix: "aks{{ rpfx }}" - kubernetes_version: "{{ version1.azure_aks_versions[0] }}" - service_principal: - client_id: "{{ azure_client_id }}" - linux_profile: - admin_username: azureuser - ssh_key: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDSPmiqkvDH1/+MDAVDZT8381aYqp73Odz8cnD5hegNhqtXajqtiH0umVg7HybX3wt1HjcrwKJovZURcIbbcDvzdH2bnYbF93T4OLXA0bIfuIp6M86x1iutFtXdpN3TTicINrmSXEE2Ydm51iMu77B08ZERjVaToya2F7vC+egfoPvibf7OLxE336a5tPCywavvNihQjL8sjgpDT5AAScjb3YqK/6VLeQ18Ggt8/ufINsYkb+9/Ji/3OcGFeflnDXq80vPUyF3u4iIylob6RSZenC38cXmQB05tRNxS1B6BXCjMRdy0v4pa7oKM2GA4ADKpNrr0RI9ed+peRFwmsclH test@ansible - agent_pool_profiles: - - name: default - count: 1 - vm_size: Standard_DS1_v2 - addon: - http_application_routing: {} - network_profile: - network_plugin: kubenet - enable_rbac: yes - register: output - - - assert: - that: - - not output.changed - - - name: Get AKS fact - azure_rm_aks_info: - name: "aks{{ rpfx }}" - resource_group: "{{ resource_group }}" - show_kubeconfig: user - register: fact - - - name: Assert fact returns the created one - assert: - that: - - "fact.aks | length == 1" - - fact.aks[0].kube_config == output.kube_config - - - name: Delete the AKS instance - azure_rm_aks: - name: "aks{{ rpfx }}" - resource_group: "{{ resource_group }}" - state: absent - register: output - - - name: Assert the AKS instance is well deleted - assert: - that: - - output.changed - - - name: Delete the AKS instance (idempotent) - azure_rm_aks: - name: "aks{{ rpfx }}" - resource_group: "{{ resource_group }}" - state: absent - register: output - - - name: Assert idempotent - assert: - that: - - not output.changed - - - name: Get AKS fact - azure_rm_aks_info: - name: "aks{{ rpfx }}" - resource_group: "{{ resource_group }}" - register: fact - - - name: Assert fact returns empty - assert: - that: - - "fact.aks | length == 0" diff --git a/test/integration/targets/azure_rm_appgateway/aliases b/test/integration/targets/azure_rm_appgateway/aliases deleted file mode 100644 index 3b050cbc18..0000000000 --- a/test/integration/targets/azure_rm_appgateway/aliases +++ /dev/null @@ -1,3 +0,0 @@ -cloud/azure -destructive -shippable/azure/group6 diff --git a/test/integration/targets/azure_rm_appgateway/files/cert1.txt b/test/integration/targets/azure_rm_appgateway/files/cert1.txt deleted file mode 100644 index 82a13f4cec..0000000000 --- a/test/integration/targets/azure_rm_appgateway/files/cert1.txt +++ /dev/null @@ -1 +0,0 @@ -MIIMAjCCCeqgAwIBAgITLQAAMpnXBx230XCKQgAAAAAymTANBgkqhkiG9w0BAQsFADCBizELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEVMBMGA1UECxMMTWljcm9zb2Z0IElUMR4wHAYDVQQDExVNaWNyb3NvZnQgSVQgVExTIENBIDUwHhcNMTcwNzIwMTc0NzA4WhcNMTkwNzEwMTc0NzA4WjAXMRUwEwYDVQQDEwx3d3cuYmluZy5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC6jsg+/7DlIrdgFOcaDlK3RQ9sIgkJsgpj+ZxAbIe3ziyimIxjVlHX87pqgXcNhaYNbCFD0iPm+aUfbv4GDTLR+AIr8eSegqxZ+CBToYM67NhpVYra1KAvY4XgqxorO4FB9IWYJRqhI3SZeZ3lLK5t9XuUMicG8l52nJfpPdXXvBca2wUCq8FHEObG81vJzESA0htLLPTjdUWBQnXPiW5bqzlGHzzv8ISV6jtDLNNa5JRlhSlXho+6pCedhNF7MP4yTaantPvAELLRWX13VhjgoCcRCCu0s8rxW5DuVWl2Pb2iw35MFnNWlcoVwq0AjAfGA+xEba/WLid6qfkQctYjAgMBAAGjggfQMIIHzDAdBgNVHQ4EFgQUCYflhSl4MCAls91+3GztpSmoA3AwCwYDVR0PBAQDAgSwMB8GA1UdIwQYMBaAFAj+JZ906ocEwry7jqg4XzPG0WxlMIGsBgNVHR8EgaQwgaEwgZ6ggZuggZiGS2h0dHA6Ly9tc2NybC5taWNyb3NvZnQuY29tL3BraS9tc2NvcnAvY3JsL01pY3Jvc29mdCUyMElUJTIwVExTJTIwQ0ElMjA1LmNybIZJaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9tc2NvcnAvY3JsL01pY3Jvc29mdCUyMElUJTIwVExTJTIwQ0ElMjA1LmNybDCBhQYIKwYBBQUHAQEEeTB3MFEGCCsGAQUFBzAChkVodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL21zY29ycC9NaWNyb3NvZnQlMjBJVCUyMFRMUyUyMENBJTIwNS5jcnQwIgYIKwYBBQUHMAGGFmh0dHA6Ly9vY3NwLm1zb2NzcC5jb20wPgYJKwYBBAGCNxUHBDEwLwYnKwYBBAGCNxUIh9qGdYPu2QGCyYUbgbWeYYX062CBXYTS30KC55N6AgFkAgEQMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATBNBgNVHSAERjBEMEIGCSsGAQQBgjcqATA1MDMGCCsGAQUFBwIBFidodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL21zY29ycC9jcHMwJwYJKwYBBAGCNxUKBBowGDAKBggrBgEFBQcDAjAKBggrBgEFBQcDATCCBW0GA1UdEQSCBWQwggVgggx3d3cuYmluZy5jb22CEGRpY3QuYmluZy5jb20uY26CEyoucGxhdGZvcm0uYmluZy5jb22CCiouYmluZy5jb22CCGJpbmcuY29tghZpZW9ubGluZS5taWNyb3NvZnQuY29tghMqLndpbmRvd3NzZWFyY2guY29tghljbi5pZW9ubGluZS5taWNyb3NvZnQuY29tghEqLm9yaWdpbi5iaW5nLmNvbYINKi5tbS5iaW5nLm5ldIIOKi5hcGkuYmluZy5jb22CGGVjbi5kZXYudmlydHVhbGVhcnRoLm5ldIINKi5jbi5iaW5nLm5ldIINKi5jbi5iaW5nLmNvbYIQc3NsLWFwaS5iaW5nLmNvbYIQc3NsLWFwaS5iaW5nLm5ldIIOKi5hcGkuYmluZy5uZXSCDiouYmluZ2FwaXMuY29tgg9iaW5nc2FuZGJveC5jb22CFmZlZWRiYWNrLm1pY3Jvc29mdC5jb22CG2luc2VydG1lZGlhLmJpbmcub2ZmaWNlLm5ldIIOci5iYXQuYmluZy5jb22CECouci5iYXQuYmluZy5jb22CEiouZGljdC5iaW5nLmNvbS5jboIPKi5kaWN0LmJpbmcuY29tgg4qLnNzbC5iaW5nLmNvbYIQKi5hcHBleC5iaW5nLmNvbYIWKi5wbGF0Zm9ybS5jbi5iaW5nLmNvbYINd3AubS5iaW5nLmNvbYIMKi5tLmJpbmcuY29tgg9nbG9iYWwuYmluZy5jb22CEXdpbmRvd3NzZWFyY2guY29tgg5zZWFyY2gubXNuLmNvbYIRKi5iaW5nc2FuZGJveC5jb22CGSouYXBpLnRpbGVzLmRpdHUubGl2ZS5jb22CDyouZGl0dS5saXZlLmNvbYIYKi50MC50aWxlcy5kaXR1LmxpdmUuY29tghgqLnQxLnRpbGVzLmRpdHUubGl2ZS5jb22CGCoudDIudGlsZXMuZGl0dS5saXZlLmNvbYIYKi50My50aWxlcy5kaXR1LmxpdmUuY29tghUqLnRpbGVzLmRpdHUubGl2ZS5jb22CCzNkLmxpdmUuY29tghNhcGkuc2VhcmNoLmxpdmUuY29tghRiZXRhLnNlYXJjaC5saXZlLmNvbYIVY253ZWIuc2VhcmNoLmxpdmUuY29tggxkZXYubGl2ZS5jb22CDWRpdHUubGl2ZS5jb22CEWZhcmVjYXN0LmxpdmUuY29tgg5pbWFnZS5saXZlLmNvbYIPaW1hZ2VzLmxpdmUuY29tghFsb2NhbC5saXZlLmNvbS5hdYIUbG9jYWxzZWFyY2gubGl2ZS5jb22CFGxzNGQuc2VhcmNoLmxpdmUuY29tgg1tYWlsLmxpdmUuY29tghFtYXBpbmRpYS5saXZlLmNvbYIObG9jYWwubGl2ZS5jb22CDW1hcHMubGl2ZS5jb22CEG1hcHMubGl2ZS5jb20uYXWCD21pbmRpYS5saXZlLmNvbYINbmV3cy5saXZlLmNvbYIcb3JpZ2luLmNud2ViLnNlYXJjaC5saXZlLmNvbYIWcHJldmlldy5sb2NhbC5saXZlLmNvbYIPc2VhcmNoLmxpdmUuY29tghJ0ZXN0Lm1hcHMubGl2ZS5jb22CDnZpZGVvLmxpdmUuY29tgg92aWRlb3MubGl2ZS5jb22CFXZpcnR1YWxlYXJ0aC5saXZlLmNvbYIMd2FwLmxpdmUuY29tghJ3ZWJtYXN0ZXIubGl2ZS5jb22CE3dlYm1hc3RlcnMubGl2ZS5jb22CFXd3dy5sb2NhbC5saXZlLmNvbS5hdYIUd3d3Lm1hcHMubGl2ZS5jb20uYXUwDQYJKoZIhvcNAQELBQADggIBADTpW/UWeupk40OP6k4yxihKStswxwqPAfMRmx4XyqmTAawAKRNM+6EZth1BQdPdOplwRTvs69kkmUHJH+ZjYXBezEACWkzEiNUQnzkRWajdSQIz08Ubj/mBD6U8xLYD+NXgiB0xNWabd8aiPsqPaj6I3qkNw4JvtgtHZQG1zlwC5/Lu6yV3DM3sKpQMyBmOnX6nVUiS0MTOzLgZOQzRk07nO7EXWGcKTmDBjE8cqv5IA/jQ6gtaxCI5pDxfXK4ct7oQyoChfxOXcEDKMmMndFmg9ch5c4an/FRM2cgzDfjR01A71LNUpLUdOjNV0T+ZEStqEpdyDFfjrHGDtzLyqEz3iyvvQFyjmlGh6OtZXwjCPpnVSrKCmfJKio0kUxyq+6t5tZAQbPVgFKiMrVnU+sgvmNVip1toijyz8vMVCkwJ2G++7xjJukoELMxZ50W4/SAMZLy1Asx02NBwYCu9+CTQPVnmPe7rmxhlQRBOfDNa1+5jwRHY64YudEzKhWR1uqS3ABd/fk+TL86yuNYGAgxnOm1FtOGieRgViV3+NzC+bDbuUOtmbD/GvDGmRwJRcCTHL7jBmkHePh2ABY93NE/IbkaDP6l1Kw98AfqkzSUxhqHXuThe7KIoX9/0zv4AA1WZFis1QvAG7dpl9eio6vCdC/73HvBAlqRL+7Mb1uu0 diff --git a/test/integration/targets/azure_rm_appgateway/files/cert2.txt b/test/integration/targets/azure_rm_appgateway/files/cert2.txt deleted file mode 100644 index a539dbcaf3..0000000000 --- a/test/integration/targets/azure_rm_appgateway/files/cert2.txt +++ /dev/null @@ -1 +0,0 @@ -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 diff --git a/test/integration/targets/azure_rm_appgateway/meta/main.yml b/test/integration/targets/azure_rm_appgateway/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_appgateway/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_appgateway/tasks/main.yml b/test/integration/targets/azure_rm_appgateway/tasks/main.yml deleted file mode 100644 index ca52c7b036..0000000000 --- a/test/integration/targets/azure_rm_appgateway/tasks/main.yml +++ /dev/null @@ -1,401 +0,0 @@ -- name: Prepare random number - set_fact: - rpfx: "{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - run_once: yes - -- name: Create a virtual network - azure_rm_virtualnetwork: - name: vnet{{ rpfx }} - resource_group: "{{ resource_group }}" - address_prefixes_cidr: - - 10.1.0.0/16 - - 172.100.0.0/16 - dns_servers: - - 127.0.0.1 - - 127.0.0.2 -- name: Create a subnet - azure_rm_subnet: - name: subnet{{ rpfx }} - virtual_network_name: vnet{{ rpfx }} - resource_group: "{{ resource_group }}" - address_prefix_cidr: 10.1.0.0/24 - register: subnet_output - -- name: Create instance of Application Gateway -- check mode - azure_rm_appgateway: - resource_group: "{{ resource_group }}" - name: "appgateway{{ rpfx }}" - sku: - name: standard_small - tier: standard - capacity: 2 - ssl_policy: - policy_type: predefined - policy_name: ssl_policy20150501 - disabled_ssl_protocols: - - tls_v1_0 - cipher_suites: - - tls_ecdhe_ecdsa_with_aes_256_gcm_sha384 - authentication_certificates: - - name: cert1 - data: "{{ lookup('file', 'cert1.txt') }}" - ssl_certificates: - - name: cert2 - password: your-password - data: "{{ lookup('file', 'cert2.txt') }}" - gateway_ip_configurations: - - subnet: - id: "{{ subnet_output.state.id }}" - name: app_gateway_ip_config - frontend_ip_configurations: - - subnet: - id: "{{ subnet_output.state.id }}" - name: sample_gateway_frontend_ip_config - frontend_ports: - - port: 90 - name: ag_frontend_port - - port: 80 - name: http_frontend_port - backend_address_pools: - - backend_addresses: - - ip_address: 10.0.0.4 - name: test_backend_address_pool - probes: - - name: custom_probe - protocol: http - host: 10.0.0.4 - path: /healthz - interval: 30 - timeout: 30 - unhealthy_threshold: 3 - backend_http_settings_collection: - - port: 80 - protocol: http - cookie_based_affinity: enabled - probe: custom_probe - name: sample_appgateway_http_settings - http_listeners: - - frontend_ip_configuration: sample_gateway_frontend_ip_config - frontend_port: ag_frontend_port - protocol: https - ssl_certificate: cert2 - name: sample_http_listener - - frontend_ip_configuration: sample_gateway_frontend_ip_config - frontend_port: http_frontend_port - protocol: http - name: http_listener - request_routing_rules: - - rule_type: basic - backend_address_pool: test_backend_address_pool - backend_http_settings: sample_appgateway_http_settings - http_listener: sample_http_listener - name: rule1 - - rule_type: basic - http_listener: http_listener - redirect_configuration: redirect_site_to_https - name: http_redirect_rule - redirect_configurations: - - redirect_type: permanent - target_listener: sample_http_listener - include_path: true - include_query_string: true - name: redirect_site_to_https - check_mode: yes - register: output -- name: Assert the resource instance is well created - assert: - that: - - output.changed - -- name: dump - debug: - var: output - -- name: Create instance of Application Gateway - azure_rm_appgateway: - resource_group: "{{ resource_group }}" - name: "appgateway{{ rpfx }}" - sku: - name: standard_small - tier: standard - capacity: 2 - ssl_policy: - policy_type: predefined - policy_name: ssl_policy20150501 - disabled_ssl_protocols: - - tls_v1_0 - cipher_suites: - - tls_ecdhe_ecdsa_with_aes_256_gcm_sha384 - authentication_certificates: - - name: cert1 - data: "{{ lookup('file', 'cert1.txt') }}" - ssl_certificates: - - name: cert2 - password: your-password - data: "{{ lookup('file', 'cert2.txt') }}" - gateway_ip_configurations: - - subnet: - id: "{{ subnet_output.state.id }}" - name: app_gateway_ip_config - frontend_ip_configurations: - - subnet: - id: "{{ subnet_output.state.id }}" - name: sample_gateway_frontend_ip_config - frontend_ports: - - port: 90 - name: ag_frontend_port - - port: 80 - name: http_frontend_port - backend_address_pools: - - backend_addresses: - - ip_address: 10.0.0.4 - name: test_backend_address_pool - probes: - - name: custom_probe - protocol: http - host: 10.0.0.4 - path: /healthz - interval: 30 - timeout: 30 - unhealthy_threshold: 3 - backend_http_settings_collection: - - port: 80 - protocol: http - cookie_based_affinity: enabled - probe: custom_probe - name: sample_appgateway_http_settings - http_listeners: - - frontend_ip_configuration: sample_gateway_frontend_ip_config - frontend_port: ag_frontend_port - protocol: https - ssl_certificate: cert2 - name: sample_http_listener - - frontend_ip_configuration: sample_gateway_frontend_ip_config - frontend_port: http_frontend_port - protocol: http - name: http_listener - request_routing_rules: - - rule_type: Basic - backend_address_pool: test_backend_address_pool - backend_http_settings: sample_appgateway_http_settings - http_listener: sample_http_listener - name: rule1 - - rule_type: Basic - http_listener: http_listener - redirect_configuration: redirect_site_to_https - name: http_redirect_rule - redirect_configurations: - - redirect_type: permanent - target_listener: sample_http_listener - include_path: true - include_query_string: true - name: redirect_site_to_https - register: output -- name: Assert the resource instance is well created - assert: - that: - - output.changed - -- name: Try to update instance of Application Gateway - no change - azure_rm_appgateway: - resource_group: "{{ resource_group }}" - name: "appgateway{{ rpfx }}" - sku: - name: standard_small - tier: standard - capacity: 2 - ssl_policy: - policy_type: predefined - policy_name: ssl_policy20150501 - disabled_ssl_protocols: - - tls_v1_0 - cipher_suites: - - tls_ecdhe_ecdsa_with_aes_256_gcm_sha384 - authentication_certificates: - - name: cert1 - data: "{{ lookup('file', 'cert1.txt') }}" - ssl_certificates: - - name: cert2 - password: your-password - data: "{{ lookup('file', 'cert2.txt') }}" - gateway_ip_configurations: - - subnet: - id: "{{ subnet_output.state.id }}" - name: app_gateway_ip_config - frontend_ip_configurations: - - subnet: - id: "{{ subnet_output.state.id }}" - name: sample_gateway_frontend_ip_config - frontend_ports: - - port: 90 - name: ag_frontend_port - - port: 80 - name: http_frontend_port - backend_address_pools: - - backend_addresses: - - ip_address: 10.0.0.4 - name: test_backend_address_pool - probes: - - name: custom_probe - protocol: http - host: 10.0.0.4 - path: /healthz - interval: 30 - timeout: 30 - unhealthy_threshold: 3 - backend_http_settings_collection: - - port: 80 - protocol: http - cookie_based_affinity: enabled - probe: custom_probe - name: sample_appgateway_http_settings - http_listeners: - - frontend_ip_configuration: sample_gateway_frontend_ip_config - frontend_port: ag_frontend_port - protocol: https - ssl_certificate: cert2 - name: sample_http_listener - - frontend_ip_configuration: sample_gateway_frontend_ip_config - frontend_port: http_frontend_port - protocol: http - name: http_listener - request_routing_rules: - - rule_type: Basic - backend_address_pool: test_backend_address_pool - backend_http_settings: sample_appgateway_http_settings - http_listener: sample_http_listener - name: rule1 - - rule_type: Basic - http_listener: http_listener - redirect_configuration: redirect_site_to_https - name: http_redirect_rule - redirect_configurations: - - redirect_type: permanent - target_listener: sample_http_listener - include_path: true - include_query_string: true - name: redirect_site_to_https - register: output -- name: Assert the resource instance is well created - assert: - that: - - not output.changed - -- name: Try to update instance of Application Gateway - single change - azure_rm_appgateway: - resource_group: "{{ resource_group }}" - name: "appgateway{{ rpfx }}" - sku: - name: standard_small - tier: standard - capacity: 2 - ssl_policy: - policy_type: predefined - policy_name: ssl_policy20150501 - disabled_ssl_protocols: - - tls_v1_0 - cipher_suites: - - tls_ecdhe_ecdsa_with_aes_256_gcm_sha384 - authentication_certificates: - - name: cert1 - data: "{{ lookup('file', 'cert1.txt') }}" - ssl_certificates: - - name: cert2 - password: your-password - data: "{{ lookup('file', 'cert2.txt') }}" - gateway_ip_configurations: - - subnet: - id: "{{ subnet_output.state.id }}" - name: app_gateway_ip_config - frontend_ip_configurations: - - subnet: - id: "{{ subnet_output.state.id }}" - name: sample_gateway_frontend_ip_config - frontend_ports: - - port: 90 - name: ag_frontend_port - - port: 80 - name: http_frontend_port - backend_address_pools: - - backend_addresses: - - ip_address: 10.0.0.4 - name: test_backend_address_pool - probes: - - name: custom_probe - protocol: http - host: 10.0.0.4 - path: /healthz - interval: 30 - timeout: 30 - unhealthy_threshold: 3 - backend_http_settings_collection: - - port: 81 - protocol: http - cookie_based_affinity: enabled - probe: custom_probe - name: sample_appgateway_http_settings - http_listeners: - - frontend_ip_configuration: sample_gateway_frontend_ip_config - frontend_port: ag_frontend_port - protocol: https - ssl_certificate: cert2 - name: sample_http_listener - - frontend_ip_configuration: sample_gateway_frontend_ip_config - frontend_port: http_frontend_port - protocol: http - name: http_listener - request_routing_rules: - - rule_type: Basic - backend_address_pool: test_backend_address_pool - backend_http_settings: sample_appgateway_http_settings - http_listener: sample_http_listener - name: rule1 - - rule_type: Basic - http_listener: http_listener - redirect_configuration: redirect_site_to_https - name: http_redirect_rule - redirect_configurations: - - redirect_type: permanent - target_listener: sample_http_listener - include_path: true - include_query_string: true - name: redirect_site_to_https - register: output -- name: Assert the resource instance is well created - assert: - that: - - output.changed - -- name: Delete instance of Application Gateway -- check mode - azure_rm_appgateway: - resource_group: "{{ resource_group }}" - name: "appgateway{{ rpfx }}" - state: absent - check_mode: yes - register: output -- name: Assert the state has changed - assert: - that: - - output.changed - -- name: Delete instance of Application Gateway - azure_rm_appgateway: - resource_group: "{{ resource_group }}" - name: "appgateway{{ rpfx }}" - state: absent - register: output -- name: Assert the state has changed - assert: - that: - - output.changed - -- name: Delete unexisting instance of Application Gateway - azure_rm_appgateway: - resource_group: "{{ resource_group }}" - name: "appgateway{{ rpfx }}" - state: absent - register: output -- name: Assert the state has changed - assert: - that: - - output.changed == false diff --git a/test/integration/targets/azure_rm_appserviceplan/aliases b/test/integration/targets/azure_rm_appserviceplan/aliases deleted file mode 100644 index a6b233ed02..0000000000 --- a/test/integration/targets/azure_rm_appserviceplan/aliases +++ /dev/null @@ -1,4 +0,0 @@ -cloud/azure -shippable/azure/group4 -unstable -destructive diff --git a/test/integration/targets/azure_rm_appserviceplan/meta/main.yml b/test/integration/targets/azure_rm_appserviceplan/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_appserviceplan/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_appserviceplan/tasks/main.yml b/test/integration/targets/azure_rm_appserviceplan/tasks/main.yml deleted file mode 100644 index f5746232eb..0000000000 --- a/test/integration/targets/azure_rm_appserviceplan/tasks/main.yml +++ /dev/null @@ -1,84 +0,0 @@ -- name: Prepare facts - set_fact: - linux_plan_resource_group: "{{ resource_group_secondary }}" - win_plan_name: "{{ (resource_prefix | replace('-','x'))[-8:] }}winplan" - linux_plan_name: "{{ (resource_prefix | replace('-','x'))[-8:] }}linplan" - -- name: create a windows plan - azure_rm_appserviceplan: - name: "{{ win_plan_name }}1" - resource_group: "{{ resource_group }}" - sku: B1 - register: output - -- name: assert app service was created - assert: - that: - - output.changed - - output.id - -- name: create a linux plan - azure_rm_appserviceplan: - resource_group: "{{ linux_plan_resource_group }}" - name: "{{ linux_plan_name }}1" - sku: S1 - is_linux: true - number_of_workers: 1 - register: output - -- name: assert app service was created - assert: - that: - - output.changed - - output.id - -- name: get app service plan by name - azure_rm_appserviceplan_info: - resource_group: "{{ linux_plan_resource_group }}" - name: "{{ linux_plan_name }}1" - register: output - -- name: assert is_linux is True - assert: - that: - - output.appserviceplans | length == 1 - - output.appserviceplans[0].is_linux == True - -- name: create linux app service plan idempotent - azure_rm_appserviceplan: - resource_group: "{{ linux_plan_resource_group }}" - name: "{{ linux_plan_name }}1" - sku: S1 - is_linux: true - number_of_workers: 1 - register: output - -- name: assert app service was created - assert: - that: not output.changed - -- name: update a windows plan sku - azure_rm_appserviceplan: - name: "{{ win_plan_name }}1" - resource_group: "{{ resource_group }}" - sku: B2 - register: output - -- name: assert app service was updated - assert: - that: - - output.changed - -- name: update a linux plan number of workers - azure_rm_appserviceplan: - resource_group: "{{ linux_plan_resource_group }}" - name: "{{ linux_plan_name }}1" - sku: S1 - is_linux: true - number_of_workers: 2 - register: output - -- name: assert app service was updated - assert: - that: - - output.changed diff --git a/test/integration/targets/azure_rm_automationaccount/aliases b/test/integration/targets/azure_rm_automationaccount/aliases deleted file mode 100644 index 04a2c98ae7..0000000000 --- a/test/integration/targets/azure_rm_automationaccount/aliases +++ /dev/null @@ -1,4 +0,0 @@ -cloud/azure -shippable/azure/group4 -destructive -azure_rm_automationaccount_facts diff --git a/test/integration/targets/azure_rm_automationaccount/meta/main.yml b/test/integration/targets/azure_rm_automationaccount/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_automationaccount/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_automationaccount/tasks/main.yml b/test/integration/targets/azure_rm_automationaccount/tasks/main.yml deleted file mode 100644 index 882693999a..0000000000 --- a/test/integration/targets/azure_rm_automationaccount/tasks/main.yml +++ /dev/null @@ -1,88 +0,0 @@ -- name: Prepare random number - set_fact: - rpfx: "{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - name: "account{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - run_once: yes - -- name: Create automation account - azure_rm_automationaccount: - name: "{{ name }}" - resource_group: "{{ resource_group }}" - check_mode: yes - register: output - -- assert: - that: - - output.changed - -- name: Create automation account - azure_rm_automationaccount: - name: "{{ name }}" - resource_group: "{{ resource_group }}" - register: output - -- assert: - that: - - output.changed - - output.id - -- name: Create automation account - azure_rm_automationaccount: - name: "{{ name }}" - resource_group: "{{ resource_group }}" - register: output - -- assert: - that: - - not output.changed - -- name: Get automation account - azure_rm_automationaccount_facts: - name: "{{ name }}" - resource_group: "{{ resource_group }}" - list_statistics: yes - list_usages: yes - list_keys: yes - register: facts - -- assert: - that: - - facts.automation_accounts | length == 1 - - facts.automation_accounts[0].keys - - facts.automation_accounts[0].usages - - facts.automation_accounts[0].statistics - - facts.automation_accounts[0].state == "Ok" - -- name: Delete account - azure_rm_automationaccount: - name: "{{ name }}" - resource_group: "{{ resource_group }}" - state: absent - check_mode: yes - register: output - -- assert: - that: - - output.changed - -- name: Delete account - azure_rm_automationaccount: - name: "{{ name }}" - resource_group: "{{ resource_group }}" - state: absent - register: output - -- assert: - that: - - output.changed - -- name: Delete account - azure_rm_automationaccount: - name: "{{ name }}" - resource_group: "{{ resource_group }}" - state: absent - register: output - -- assert: - that: - - not output.changed diff --git a/test/integration/targets/azure_rm_autoscale/aliases b/test/integration/targets/azure_rm_autoscale/aliases deleted file mode 100644 index 19533b3424..0000000000 --- a/test/integration/targets/azure_rm_autoscale/aliases +++ /dev/null @@ -1,4 +0,0 @@ -cloud/azure -shippable/azure/group5 -destructive -azure_rm_autoscale diff --git a/test/integration/targets/azure_rm_autoscale/meta/main.yml b/test/integration/targets/azure_rm_autoscale/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_autoscale/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_autoscale/tasks/main.yml b/test/integration/targets/azure_rm_autoscale/tasks/main.yml deleted file mode 100644 index 9d3b54a3ee..0000000000 --- a/test/integration/targets/azure_rm_autoscale/tasks/main.yml +++ /dev/null @@ -1,219 +0,0 @@ -- name: Prepare random number - set_fact: - rpfx: "{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - name: "scale{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - run_once: yes - -- name: Create virtual network - azure_rm_virtualnetwork: - resource_group: "{{ resource_group }}" - name: testVnet - address_prefixes: "10.0.0.0/16" - -- name: Add subnet - azure_rm_subnet: - resource_group: "{{ resource_group }}" - name: testSubnet - address_prefix: "10.0.1.0/24" - virtual_network: testVnet - -- name: Create VMSS - azure_rm_virtualmachinescaleset: - resource_group: "{{ resource_group }}" - name: testVMSS{{ rpfx }} - vm_size: Standard_DS1_v2 - admin_username: testuser - ssh_password_enabled: true - admin_password: "Password1234!" - capacity: 2 - virtual_network_name: testVnet - subnet_name: testSubnet - upgrade_policy: Manual - tier: Standard - managed_disk_type: Standard_LRS - os_disk_caching: ReadWrite - image: - offer: CoreOS - publisher: CoreOS - sku: Stable - version: latest - data_disks: - - lun: 0 - disk_size_gb: 64 - caching: ReadWrite - managed_disk_type: Standard_LRS - register: vmss - -- name: create auto scaling (check mode) - azure_rm_autoscale: - resource_group: "{{ resource_group }}" - name: "{{ name }}" - target: "{{ vmss.ansible_facts.azure_vmss.id }}" - enabled: true - profiles: - - count: '1' - recurrence_days: - - Monday - name: Auto created scale condition - recurrence_timezone: China Standard Time - recurrence_mins: - - '0' - min_count: '1' - max_count: '1' - recurrence_frequency: Week - recurrence_hours: - - '18' - check_mode: yes - register: output - -- assert: - that: - - output.changed - -- name: create auto scaling - azure_rm_autoscale: - resource_group: "{{ resource_group }}" - name: "{{ name }}" - target: - name: "testVMSS{{ rpfx }}" - types: "virtualMachineScaleSets" - namespace: "Microsoft.Compute" - enabled: true - profiles: - - count: '1' - recurrence_days: - - Monday - name: Auto created scale condition - recurrence_timezone: China Standard Time - recurrence_mins: - - '0' - min_count: '1' - max_count: '1' - recurrence_frequency: Week - recurrence_hours: - - '18' - register: output - -- assert: - that: - - output.changed - - output.id - -- name: create auto scaling (idemponent) - azure_rm_autoscale: - resource_group: "{{ resource_group }}" - name: "{{ name }}" - target: "{{ vmss.ansible_facts.azure_vmss.id }}" - enabled: true - profiles: - - count: '1' - recurrence_days: - - Monday - name: Auto created scale condition - recurrence_timezone: China Standard Time - recurrence_mins: - - '0' - min_count: '1' - max_count: '1' - recurrence_frequency: Week - recurrence_hours: - - '18' - register: output - -- assert: - that: - - not output.changed - - output.id - -- name: update auto scaling - azure_rm_autoscale: - resource_group: "{{ resource_group }}" - name: "{{ name }}" - target: "{{ vmss.ansible_facts.azure_vmss.id }}" - enabled: true - profiles: - - count: '1' - recurrence_days: - - Monday - name: Auto created scale condition 0 - rules: - - time_aggregation: Average - time_window: 10 - direction: Increase - metric_name: Percentage CPU - metric_resource_uri: "{{ vmss.ansible_facts.azure_vmss.id }}" - value: '1' - threshold: 70 - cooldown: 5 - time_grain: 1 - statistic: Average - operator: GreaterThan - type: ChangeCount - max_count: '1' - recurrence_mins: - - '0' - min_count: '1' - recurrence_timezone: China Standard Time - recurrence_frequency: Week - recurrence_hours: - - '6' - register: output - -- assert: - that: - - output.changed - - output.profiles[0].rules[0].metric_resource_uri == vmss.ansible_facts.azure_vmss.id - -- name: delete auto scaling (check mode) - azure_rm_autoscale: - resource_group: "{{ resource_group }}" - name: "{{ name }}" - state: absent - check_mode: yes - register: output - -- assert: - that: - - output.changed - -- name: delete auto scaling - azure_rm_autoscale: - resource_group: "{{ resource_group }}" - name: "{{ name }}" - state: absent - register: output - -- assert: - that: - - output.changed - -- name: delete auto scaling (idemponetent) - azure_rm_autoscale: - resource_group: "{{ resource_group }}" - name: "{{ name }}" - state: absent - register: output - -- assert: - that: - - not output.changed - -- name: Clean VMSS - azure_rm_virtualmachinescaleset: - resource_group: "{{ resource_group }}" - vm_size: Standard_DS1_v2 - name: testVMSS{{ rpfx }} - state: absent - -- name: Clean subnet - azure_rm_subnet: - resource_group: "{{ resource_group }}" - name: testSubnet - virtual_network: testVnet - state: absent - -- name: Clean virtual network - azure_rm_virtualnetwork: - resource_group: "{{ resource_group }}" - name: testVnet - state: absent diff --git a/test/integration/targets/azure_rm_availabilityset/aliases b/test/integration/targets/azure_rm_availabilityset/aliases deleted file mode 100644 index 17456633d2..0000000000 --- a/test/integration/targets/azure_rm_availabilityset/aliases +++ /dev/null @@ -1,4 +0,0 @@ -cloud/azure -shippable/azure/group2 -destructive -azure_rm_availalibityset_info diff --git a/test/integration/targets/azure_rm_availabilityset/meta/main.yml b/test/integration/targets/azure_rm_availabilityset/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_availabilityset/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_availabilityset/tasks/main.yml b/test/integration/targets/azure_rm_availabilityset/tasks/main.yml deleted file mode 100644 index 8127d3c134..0000000000 --- a/test/integration/targets/azure_rm_availabilityset/tasks/main.yml +++ /dev/null @@ -1,136 +0,0 @@ -- name: Create an availability set with default options - azure_rm_availabilityset: - name: myavailabilityset1 - resource_group: "{{ resource_group }}" - tags: - tag1: testtag - register: results - -- assert: - that: results.changed - -- name: Create an availability set with advanced options - azure_rm_availabilityset: - name: myavailabilityset2 - resource_group: "{{ resource_group }}" - platform_update_domain_count: 5 - platform_fault_domain_count: 2 - sku: Aligned - register: results - -- assert: - that: results.changed - -- name: Modify availabilty set immutable options - no changes, fail for immutable options - azure_rm_availabilityset: - name: myavailabilityset2 - resource_group: "{{ resource_group }}" - platform_update_domain_count: 2 - platform_fault_domain_count: 2 - sku: Aligned - register: results - ignore_errors: yes - -- assert: - that: - - not results.changed - - results.msg == 'You tried to change platform_update_domain_count but is was unsuccessful. An Availability Set is immutable, except tags' - -- name: Modify availabilty set immutable options and set tags - change tags and fail for immutable options - azure_rm_availabilityset: - name: myavailabilityset2 - resource_group: "{{ resource_group }}" - platform_update_domain_count: 2 - platform_fault_domain_count: 2 - sku: Aligned - tags: - test1: modified - register: results - ignore_errors: yes - -- assert: - that: - - not results.changed - - results.msg == 'You tried to change platform_update_domain_count but is was unsuccessful. An Availability Set is immutable, except tags' - -- name: Modify availabilty set options to update tags - azure_rm_availabilityset: - name: myavailabilityset2 - resource_group: "{{ resource_group }}" - platform_update_domain_count: 5 - platform_fault_domain_count: 2 - sku: Aligned - tags: - test2: modified - register: results - -- assert: - that: - - results.state.tags.test2 == 'modified' - -- name: Create availability set with incorrect fault domain parameter - azure_rm_availabilityset: - name: myavailabilityset3 - resource_group: "{{ resource_group }}" - platform_update_domain_count: 5 - platform_fault_domain_count: 4 - sku: Aligned - register: results - ignore_errors: yes - -- assert: - { that: "'The specified fault domain count 4 must fall in the range 1 to' in results['msg']" } - -- name: Test check_mode - azure_rm_availabilityset: - name: myavailabilityset2 - resource_group: "{{ resource_group }}" - platform_update_domain_count: 5 - platform_fault_domain_count: 2 - sku: Aligned - tags: - checktest1: modified1 - checktest2: modified2 - check_mode: yes - register: results - -- assert: - that: - - not results.changed - - results.state.tags.checktest1 == 'modified1' - -# -# azure_rm_availabilityset_facts tests -# -- name: Get facts for created availability set - azure_rm_availabilityset_info: - name: myavailabilityset2 - resource_group: "{{ resource_group }}" - register: results - -- assert: - that: - - not results.changed - - not results.failed - - results.ansible_info.azure_availabilitysets[0].properties.platformFaultDomainCount == 2 - - results.ansible_info.azure_availabilitysets[0].properties.platformUpdateDomainCount == 5 - - results.ansible_info.azure_availabilitysets[0].sku == 'Aligned' - - -- name: Delete an availability set - azure_rm_availabilityset: - name: myavailabilityset1 - resource_group: "{{ resource_group }}" - state: absent - -- name: Delete an availability set - azure_rm_availabilityset: - name: myavailabilityset2 - resource_group: "{{ resource_group }}" - state: absent - -- name: Delete an availability set - azure_rm_availabilityset: - name: myavailabilityset3 - resource_group: "{{ resource_group }}" - state: absent diff --git a/test/integration/targets/azure_rm_azurefirewall/aliases b/test/integration/targets/azure_rm_azurefirewall/aliases deleted file mode 100644 index 4b130f3078..0000000000 --- a/test/integration/targets/azure_rm_azurefirewall/aliases +++ /dev/null @@ -1,4 +0,0 @@ -cloud/azure -shippable/azure/group3 -destructive -disabled # See: https://github.com/ansible/ansible/issues/62307 diff --git a/test/integration/targets/azure_rm_azurefirewall/meta/main.yml b/test/integration/targets/azure_rm_azurefirewall/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_azurefirewall/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_azurefirewall/tasks/main.yml b/test/integration/targets/azure_rm_azurefirewall/tasks/main.yml deleted file mode 100644 index face59c2b6..0000000000 --- a/test/integration/targets/azure_rm_azurefirewall/tasks/main.yml +++ /dev/null @@ -1,277 +0,0 @@ -- name: Fix resource prefix - set_fact: - virtual_network_name: myVirtualNetwork - subnet_name: AzureFirewallSubnet - public_ipaddress_name: myPublicIpAddress - azure_firewall_name: myFirewall - -- name: Create virtual network - azure_rm_virtualnetwork: - name: "{{ virtual_network_name }}" - address_prefixes_cidr: - - 10.1.0.0/16 - - 172.100.0.0/16 - dns_servers: - - 127.0.0.1 - - 127.0.0.3 - tags: - testing: testing - delete: on-exit - resource_group: "{{ resource_group }}" - -- name: Create subnet - azure_rm_subnet: - name: "{{ subnet_name }}" - virtual_network_name: "{{ virtual_network_name }}" - resource_group: "{{ resource_group }}" - address_prefix_cidr: "10.1.0.0/24" - -- name: Create public IP address - azure_rm_publicipaddress: - resource_group: "{{ resource_group }}" - allocation_method: Static - name: "{{ public_ipaddress_name }}" - sku: Standard - register: pip_output - -- debug: - var: pip_output - -- name: Create Azure Firewall - azure_rm_azurefirewall: - resource_group: '{{resource_group}}' - name: '{{azure_firewall_name}}' - #tags: - # key1: value1 - application_rule_collections: - - priority: 110 - action: deny - rules: - - name: rule1 - description: Deny inbound rule - source_addresses: - - 216.58.216.164 - - 10.0.0.0/25 - protocols: - - type: https - port: '443' - target_fqdns: - - www.test.com - name: apprulecoll - nat_rule_collections: - - priority: 112 - action: dnat - rules: - - name: DNAT-HTTPS-traffic - description: D-NAT all outbound web traffic for inspection - source_addresses: - - '*' - destination_addresses: - - "{{ pip_output.state.ip_address }}" - destination_ports: - - '443' - protocols: - - tcp - translated_address: 1.2.3.5 - translated_port: '8443' - name: natrulecoll - network_rule_collections: - - priority: 112 - action: deny - rules: - - name: L4-traffic - description: Block traffic based on source IPs and ports - protocols: - - tcp - source_addresses: - - 192.168.1.1-192.168.1.12 - - 10.1.4.12-10.1.4.255 - destination_addresses: - - '*' - destination_ports: - - 443-444 - - '8443' - name: netrulecoll - ip_configurations: - - subnet: - virtual_network_name: "{{ virtual_network_name }}" - name: "{{ subnet_name }}" - public_ip_address: - name: "{{ public_ipaddress_name }}" - name: azureFirewallIpConfiguration - register: output - -- debug: - var: output - -- name: Assert that output has changed - assert: - that: - - output.changed - -- name: Create Azure Firewall -- idempotent - azure_rm_azurefirewall: - resource_group: '{{resource_group}}' - name: '{{azure_firewall_name}}' - application_rule_collections: - - priority: 110 - action: deny - rules: - - name: rule1 - description: Deny inbound rule - source_addresses: - - 216.58.216.164 - - 10.0.0.0/25 - protocols: - - type: https - port: '443' - target_fqdns: - - www.test.com - name: apprulecoll - nat_rule_collections: - - priority: 112 - action: dnat - rules: - - name: DNAT-HTTPS-traffic - description: D-NAT all outbound web traffic for inspection - source_addresses: - - '*' - destination_addresses: - - "{{ pip_output.state.ip_address }}" - destination_ports: - - '443' - protocols: - - tcp - translated_address: 1.2.3.5 - translated_port: '8443' - name: natrulecoll - network_rule_collections: - - priority: 112 - action: deny - rules: - - name: L4-traffic - description: Block traffic based on source IPs and ports - protocols: - - tcp - source_addresses: - - 192.168.1.1-192.168.1.12 - - 10.1.4.12-10.1.4.255 - destination_addresses: - - '*' - destination_ports: - - 443-444 - - '8443' - name: netrulecoll - ip_configurations: - - subnet: - virtual_network_name: "{{ virtual_network_name }}" - name: "{{ subnet_name }}" - public_ip_address: - name: "{{ public_ipaddress_name }}" - name: azureFirewallIpConfiguration - register: output - -- debug: - var: output - -- name: Assert that output has not changed - assert: - that: - - not output.changed - -- name: Create Azure Firewall -- change something - azure_rm_azurefirewall: - resource_group: '{{resource_group}}' - name: '{{azure_firewall_name}}' - application_rule_collections: - - priority: 110 - action: deny - rules: - - name: rule1 - description: Deny inbound rule - source_addresses: - - 216.58.216.165 - - 10.0.0.0/25 - protocols: - - type: https - port: '443' - target_fqdns: - - www.test.com - name: apprulecoll - nat_rule_collections: - - priority: 112 - action: dnat - rules: - - name: DNAT-HTTPS-traffic - description: D-NAT all outbound web traffic for inspection - source_addresses: - - '*' - destination_addresses: - - "{{ pip_output.state.ip_address }}" - destination_ports: - - '443' - protocols: - - tcp - translated_address: 1.2.3.6 - translated_port: '8443' - name: natrulecoll - network_rule_collections: - - priority: 112 - action: deny - rules: - - name: L4-traffic - description: Block traffic based on source IPs and ports - protocols: - - tcp - source_addresses: - - 192.168.1.1-192.168.1.12 - - 10.1.4.12-10.1.4.255 - destination_addresses: - - '*' - destination_ports: - - 443-445 - - '8443' - name: netrulecoll - ip_configurations: - - subnet: - virtual_network_name: "{{ virtual_network_name }}" - name: "{{ subnet_name }}" - public_ip_address: - name: "{{ public_ipaddress_name }}" - name: azureFirewallIpConfiguration - check_mode: yes - register: output - -- name: Assert that output has changed - assert: - that: - - output.changed - -- name: Get info of the Azure Firewall - azure_rm_azurefirewall_info: - resource_group: '{{resource_group}}' - name: '{{azure_firewall_name}}' - register: output - -- assert: - that: - - not output.changed - - output.firewalls['id'] != None - - output.firewalls['name'] != None - - output.firewalls['location'] != None - - output.firewalls['etag'] != None - - output.firewalls['nat_rule_collections'] != None - - output.firewalls['network_rule_collections'] != None - - output.firewalls['ip_configurations'] != None - - output.firewalls['provisioning_state'] != None - -- name: Delete Azure Firewall - azure_rm_azurefirewall: - resource_group: '{{resource_group}}' - name: '{{azure_firewall_name}}' - state: absent - register: output - -- assert: - that: - - output.changed diff --git a/test/integration/targets/azure_rm_batchaccount/aliases b/test/integration/targets/azure_rm_batchaccount/aliases deleted file mode 100644 index 49acfee76c..0000000000 --- a/test/integration/targets/azure_rm_batchaccount/aliases +++ /dev/null @@ -1,3 +0,0 @@ -cloud/azure -destructive -shippable/azure/group2 diff --git a/test/integration/targets/azure_rm_batchaccount/meta/main.yml b/test/integration/targets/azure_rm_batchaccount/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_batchaccount/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_batchaccount/tasks/main.yml b/test/integration/targets/azure_rm_batchaccount/tasks/main.yml deleted file mode 100644 index e62cb67cfc..0000000000 --- a/test/integration/targets/azure_rm_batchaccount/tasks/main.yml +++ /dev/null @@ -1,76 +0,0 @@ ---- -# ---------------------------------------------------------------------------- -# -# *** AUTO GENERATED CODE *** AUTO GENERATED CODE *** -# -# ---------------------------------------------------------------------------- -# -# This file is automatically generated by Magic Modules and manual -# changes will be clobbered when the file is regenerated. -# -# -# ---------------------------------------------------------------------------- -- name: Prepare random number - set_fact: - storage_account_name: "st{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - batch_account_name: "ba{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - run_once: yes - -- name: Create Storage Account - azure_rm_storageaccount: - resource_group: "{{ resource_group }}" - name: "{{ storage_account_name }}" - location: eastus - account_type: Standard_LRS - -- name: Create Batch Account - azure_rm_batchaccount: - resource_group: "{{ resource_group }}" - name: "{{ batch_account_name }}" - location: eastus - auto_storage_account: - name: "{{ storage_account_name }}" - pool_allocation_mode: batch_service - register: output - -- name: Assert the resource was created - assert: - that: - - output.changed - -- name: Create Batch Account -- idempotent - azure_rm_batchaccount: - resource_group: "{{ resource_group }}" - name: "{{ batch_account_name }}" - location: eastus - auto_storage_account: - name: "{{ storage_account_name }}" - pool_allocation_mode: batch_service - register: output - -- name: Assert the resource was created - assert: - that: - - not output.changed - -- name: Delete Batch Account - azure_rm_batchaccount: - resource_group: "{{ resource_group }}" - name: "{{ batch_account_name }}" - location: eastus - auto_storage_account: - name: "{{ storage_account_name }}" - pool_allocation_mode: batch_service - state: absent - register: output - -- name: Assert that state has changed - assert: - that: - - output.changed - -- name: Clean up storage account - azure_rm_storageaccount: - resource_group: "{{ resource_group }}" - name: "{{ storage_account_name }}" - state: absent diff --git a/test/integration/targets/azure_rm_cdnprofile/aliases b/test/integration/targets/azure_rm_cdnprofile/aliases deleted file mode 100644 index ea347fa407..0000000000 --- a/test/integration/targets/azure_rm_cdnprofile/aliases +++ /dev/null @@ -1,5 +0,0 @@ -cloud/azure -shippable/azure/group2 -destructive -azure_rm_cdnprofile_info -azure_rm_cdnendpoint diff --git a/test/integration/targets/azure_rm_cdnprofile/meta/main.yml b/test/integration/targets/azure_rm_cdnprofile/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_cdnprofile/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_cdnprofile/tasks/main.yml b/test/integration/targets/azure_rm_cdnprofile/tasks/main.yml deleted file mode 100644 index 657881a507..0000000000 --- a/test/integration/targets/azure_rm_cdnprofile/tasks/main.yml +++ /dev/null @@ -1,276 +0,0 @@ -- name: Prepare random number - set_fact: - cdnprofilename: "cdnprofile{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - endpointname: "endpoint{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - run_once: yes - - -- name: Create a CDN profile(check mode) - azure_rm_cdnprofile: - resource_group: "{{ resource_group }}" - name: "{{ cdnprofilename }}" - sku: standard_akamai - tags: - testing: testing - delete: on-exit - foo: bar - check_mode: yes - -- name: Check there is no CDN profile created - azure_rm_cdnprofile_info: - resource_group: "{{ resource_group }}" - name: "{{ cdnprofilename }}" - register: fact - -- name: Check there is no CDN profile created - assert: { that: "{{ fact.cdnprofiles | length }} == 0" } - -- name: Create a CDN profile - azure_rm_cdnprofile: - resource_group: "{{ resource_group }}" - name: "{{ cdnprofilename }}" - sku: standard_akamai - tags: - testing: testing - delete: on-exit - foo: bar - register: output - -- name: Assert the CDN profile is well created - assert: - that: - - output.changed - - output.id != '' - -- name: Gather CDN profile facts - azure_rm_cdnprofile_info: - resource_group: "{{ resource_group }}" - name: "{{ cdnprofilename }}" - register: fact - -- name: Assert fact returns the created one - assert: - that: - - "fact.cdnprofiles | length == 1" - - fact.cdnprofiles[0].sku == 'Standard_Akamai' - - fact.cdnprofiles[0].tags.foo == 'bar' - -- name: Create a CDN profile (idempotent) - azure_rm_cdnprofile: - resource_group: "{{ resource_group }}" - name: "{{ cdnprofilename }}" - sku: standard_akamai - tags: - testing: testing - delete: on-exit - foo: bar - register: output - -- name: Assert idempotent - assert: - that: - - not output.changed - -- name: Update the CDN profile - azure_rm_cdnprofile: - resource_group: "{{ resource_group }}" - name: "{{ cdnprofilename }}" - sku: standard_akamai - tags: - testing: testing - delete: on-exit - foo: bar - baz: qux - register: output - -- name: Assert the CDN profile is updated - assert: - that: - - output.changed - -- name: Delete the CDN profile(check mode) - azure_rm_cdnprofile: - resource_group: "{{ resource_group }}" - name: "{{ cdnprofilename }}" - state: absent - check_mode: yes - -- name: Gather CDN profile facts - azure_rm_cdnprofile_info: - resource_group: "{{ resource_group }}" - name: "{{ cdnprofilename }}" - register: fact - -- name: Assert the CDN is still there - assert: - that: - - "fact.cdnprofiles | length == 1" - - fact.cdnprofiles[0].sku == 'Standard_Akamai' - - fact.cdnprofiles[0].tags.foo == 'bar' - - fact.cdnprofiles[0].tags.baz == 'qux' - -- name: Create a Azure CDN endpoint(check mode) - azure_rm_cdnendpoint: - resource_group: "{{ resource_group }}" - name: "{{ endpointname }}" - profile_name: "{{ cdnprofilename }}" - origins: - - name: "org{{ endpointname }}" - host_name: "www.google.com" - tags: - testing: testing - delete: on-exit - foo: bar - check_mode: yes - -- name: Create a Azure CDN endpoint - azure_rm_cdnendpoint: - resource_group: "{{ resource_group }}" - name: "{{ endpointname }}" - profile_name: "{{ cdnprofilename }}" - origins: - - name: "org{{ endpointname }}" - host_name: "www.google.com" - tags: - testing: testing - delete: on-exit - foo: bar - register: output - -- name: Assert the Azure CDN endpoint is well created - assert: - that: - - output.changed - - output.id - -- name: Get facts of a Azure CDN endpoint - azure_rm_cdnendpoint_info: - resource_group: "{{ resource_group }}" - name: "{{ endpointname }}" - profile_name: "{{ cdnprofilename }}" - register: facts - -- name: Assert facts output - assert: - that: - - facts['cdnendpoints'] | length == 1 - - facts['cdnendpoints'][0]['id'] - - facts['cdnendpoints'][0]['name'] - - facts['cdnendpoints'][0]['profile_name'] - - facts['cdnendpoints'][0]['origin'] - - facts['cdnendpoints'][0]['location'] - - facts['cdnendpoints'][0]['provisioning_state'] - - facts['cdnendpoints'][0]['resource_state'] - -- name: Create a Azure CDN endpoint(idempotent) - azure_rm_cdnendpoint: - resource_group: "{{ resource_group }}" - name: "{{ endpointname }}" - profile_name: "{{ cdnprofilename }}" - origins: - - name: "org{{ endpointname }}" - host_name: "www.google.com" - tags: - testing: testing - delete: on-exit - foo: bar - register: output - -- name: Assert idempotent - assert: - that: - - not output.changed - -- name: Stop a Azure CDN endpoint - azure_rm_cdnendpoint: - resource_group: "{{ resource_group }}" - name: "{{ endpointname }}" - profile_name: "{{ cdnprofilename }}" - started: False - register: output - -- name: Assert stopped - assert: - that: - - output.changed - -- name: Stop a Azure CDN endpoint(idempotent) - azure_rm_cdnendpoint: - resource_group: "{{ resource_group }}" - name: "{{ endpointname }}" - profile_name: "{{ cdnprofilename }}" - started: False - register: output - -- name: Assert still stopped and not changed - assert: - that: - - not output.changed - -- name: Start a Azure CDN endpoint - azure_rm_cdnendpoint: - resource_group: "{{ resource_group }}" - name: "{{ endpointname }}" - profile_name: "{{ cdnprofilename }}" - started: True - register: output - -- name: Assert started - assert: - that: - - output.changed - -- name: Update the Azure CDN endpoint - azure_rm_cdnendpoint: - resource_group: "{{ resource_group }}" - name: "{{ endpointname }}" - profile_name: "{{ cdnprofilename }}" - origin_path: /test/ - tags: - testing: testing - delete: on-exit - foo: baz - register: output - -- name: Assert the Azure CDN endpoint is updated - assert: - that: - - output.changed - -- name: Delete a Azure CDN endpoint(check mode) - azure_rm_cdnendpoint: - resource_group: "{{ resource_group }}" - name: "{{ endpointname }}" - profile_name: "{{ cdnprofilename }}" - state: absent - check_mode: yes - -- name: Delete a Azure CDN endpoint - azure_rm_cdnendpoint: - resource_group: "{{ resource_group }}" - name: "{{ endpointname }}" - profile_name: "{{ cdnprofilename }}" - state: absent - -- name: Delete the CDN profile - azure_rm_cdnprofile: - resource_group: "{{ resource_group }}" - name: "{{ cdnprofilename }}" - state: absent - register: output - -- name: Assert the CDN profile is well deleted - assert: - that: - - output.changed - -- name: Get CDN profile fact - azure_rm_cdnprofile_info: - resource_group: "{{ resource_group }}" - name: "{{ cdnprofilename }}" - register: fact - -- name: Assert fact returns empty - assert: - that: - - "fact.cdnprofiles | length == 0" diff --git a/test/integration/targets/azure_rm_containerinstance/aliases b/test/integration/targets/azure_rm_containerinstance/aliases deleted file mode 100644 index 93066dcc2d..0000000000 --- a/test/integration/targets/azure_rm_containerinstance/aliases +++ /dev/null @@ -1,4 +0,0 @@ -cloud/azure -destructive -shippable/azure/group2 -azure_rm_containerinstance_info diff --git a/test/integration/targets/azure_rm_containerinstance/meta/main.yml b/test/integration/targets/azure_rm_containerinstance/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_containerinstance/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_containerinstance/tasks/main.yml b/test/integration/targets/azure_rm_containerinstance/tasks/main.yml deleted file mode 100644 index a76e387a30..0000000000 --- a/test/integration/targets/azure_rm_containerinstance/tasks/main.yml +++ /dev/null @@ -1,214 +0,0 @@ -- name: Create sample container instance - azure_rm_containerinstance: - resource_group: "{{ resource_group }}" - name: "aci{{ resource_group | hash('md5') | truncate(7, True, '') }}" - os_type: linux - ip_address: public - location: eastus - ports: - - 80 - containers: - - name: mycontainer1 - image: httpd - memory: 1.5 - ports: - - 80 - - 81 - register: output - -- debug: - var: output - -- name: Assert the container instance is well created - assert: - that: - - output.changed - - output.provisioning_state == 'Succeeded' - -- name: Create sample container instance -- same parameters - azure_rm_containerinstance: - resource_group: "{{ resource_group }}" - name: "aci{{ resource_group | hash('md5') | truncate(7, True, '') }}" - os_type: linux - ip_address: public - location: eastus - ports: - - 80 - containers: - - name: mycontainer1 - image: httpd - memory: 1.5 - ports: - - 80 - - 81 - register: output - -- name: Assert the container instance is well created - assert: - that: - - output.changed == False - -- name: Create sample container instance -- force update - azure_rm_containerinstance: - resource_group: "{{ resource_group }}" - name: "aci{{ resource_group | hash('md5') | truncate(7, True, '') }}" - os_type: linux - ip_address: public - location: eastus - ports: - - 80 - containers: - - name: mycontainer1 - image: httpd - memory: 1.5 - ports: - - 80 - - 81 - force_update: yes - register: output - -- name: Assert the container instance is well created - assert: - that: - - output.changed - - output.provisioning_state == 'Succeeded' - -- name: Create second container instance for testing purposes - azure_rm_containerinstance: - resource_group: "{{ resource_group }}" - name: "aci{{ resource_group | hash('md5') | truncate(7, True, '') }}sec" - os_type: linux - ip_address: public - dns_name_label: mydnslabel{{ resource_group | hash('md5') | truncate(7, True, '') }} - location: eastus - restart_policy: on_failure - ports: - - 80 - containers: - - name: mycontainer1 - image: httpd - memory: 1.5 - ports: - - 80 - - 81 - commands: - - echo abc - - echo cdf - environment_variables: - - name: myvar - value: myvarvalue - register: output - -- name: Gather facts for single Container Instance - azure_rm_containerinstance_info: - resource_group: "{{ resource_group }}" - name: "aci{{ resource_group | hash('md5') | truncate(7, True, '') }}sec" - register: output - -- debug: - var: output - -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.containerinstances[0]['resource_group'] != None - - output.containerinstances[0]['name'] != None - - output.containerinstances[0]['os_type'] != None - - output.containerinstances[0]['location'] != None - - output.containerinstances[0]['ip_address'] != None - - output.containerinstances[0]['ports'] != None - - output.containerinstances[0]['containers'] != None - - output.containerinstances[0]['containers'][0]['commands'] | length == 2 - - output.containerinstances[0]['containers'][0]['environment_variables'] | length == 1 - - output.containerinstances[0]['restart_policy'] == 'on_failure' - -- name: Gather facts for all Container Instances in the resource group - azure_rm_containerinstance_info: - resource_group: "{{ resource_group }}" - register: output - -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.containerinstances[0]['resource_group'] != None - - output.containerinstances[0]['name'] != None - - output.containerinstances[0]['os_type'] != None - - output.containerinstances[0]['location'] != None - - output.containerinstances[0]['ip_address'] != None - - output.containerinstances[0]['ports'] != None - - output.containerinstances[0]['containers'] != None - - output.containerinstances[1]['resource_group'] != None - - output.containerinstances[1]['name'] != None - - output.containerinstances[1]['os_type'] != None - - output.containerinstances[1]['location'] != None - - output.containerinstances[1]['ip_address'] != None - - output.containerinstances[1]['ports'] != None - - output.containerinstances[1]['containers'] != None - -- name: Remove container instance - azure_rm_containerinstance: - resource_group: "{{ resource_group }}" - name: "aci{{ resource_group | hash('md5') | truncate(7, True, '') }}" - os_type: linux - ip_address: public - location: eastus - ports: - - 80 - containers: - - name: mycontainer1 - image: httpd - memory: 1.5 - ports: - - 80 - - 81 - state: absent - register: output - -- name: Assert the container instance is deleted - assert: - that: - - output.changed - -- name: Remove container instance - azure_rm_containerinstance: - resource_group: "{{ resource_group }}" - name: "aci{{ resource_group | hash('md5') | truncate(7, True, '') }}sec" - os_type: linux - ip_address: public - location: eastus - ports: - - 80 - containers: - - name: mycontainer1 - image: httpd - memory: 1.5 - ports: - - 80 - - 81 - state: absent - -- name: Remove container instance again - azure_rm_containerinstance: - resource_group: "{{ resource_group }}" - name: "aci{{ resource_group | hash('md5') | truncate(7, True, '') }}" - os_type: linux - ip_address: public - location: eastus - ports: - - 80 - containers: - - name: mycontainer1 - image: httpd - memory: 1.5 - ports: - - 80 - - 81 - state: absent - register: output - -- name: Assert the changed is false - assert: - that: - - output.changed == False diff --git a/test/integration/targets/azure_rm_containerregistry/aliases b/test/integration/targets/azure_rm_containerregistry/aliases deleted file mode 100644 index 2615d3fe02..0000000000 --- a/test/integration/targets/azure_rm_containerregistry/aliases +++ /dev/null @@ -1,4 +0,0 @@ -cloud/azure -shippable/azure/group2 -destructive -azure_rm_containerregistry_info diff --git a/test/integration/targets/azure_rm_containerregistry/meta/main.yml b/test/integration/targets/azure_rm_containerregistry/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_containerregistry/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_containerregistry/tasks/main.yml b/test/integration/targets/azure_rm_containerregistry/tasks/main.yml deleted file mode 100644 index 7c83c5c5da..0000000000 --- a/test/integration/targets/azure_rm_containerregistry/tasks/main.yml +++ /dev/null @@ -1,116 +0,0 @@ - - name: Create an container registry - azure_rm_containerregistry: - name: "acr{{ resource_group | hash('md5') | truncate(7, True, '') }}" - resource_group: "{{ resource_group }}" - location: eastus2 - admin_user_enabled: true - sku: Premium - tags: - Release: beta1 - Environment: Production - register: output - - - name: Assert the container registry instance is well created - assert: - that: - - output.changed - - output.admin_user_enabled - - output.location == 'eastus2' - - output.sku == 'Premium' - - output.tags['Environment'] == 'Production' - - output.tags['Release'] == 'beta1' - - output.provisioning_state == 'Succeeded' - - output.credentials['password'] is defined - - output.credentials['password2'] is defined - - - name: Update the ACR instance sku, tags and admin_user_enabled - azure_rm_containerregistry: - name: "acr{{ resource_group | hash('md5') | truncate(7, True, '') }}" - resource_group: "{{ resource_group }}" - location: eastus2 - admin_user_enabled: false - sku: Standard - tags: - NewTag: newtag - Release: beta1 - Environment: Production - register: output - - - name: Create second container registry (to test facts) - azure_rm_containerregistry: - name: "acr{{ resource_group | hash('md5') | truncate(7, True, '') }}sec" - resource_group: "{{ resource_group }}" - location: eastus2 - admin_user_enabled: false - sku: Premium - tags: - Release: beta1 - Environment: Production - - - name: Assert the ACR instance is well updated - assert: - that: - - output.changed == True - - output.admin_user_enabled == False - - output.sku == 'Standard' - - output.tags['NewTag'] == 'newtag' - - output.credentials | length == 0 - - output.credentials['password'] is not defined - - output.credentials['password2'] is not defined - - - name: Gather facts for single Container Registry - azure_rm_containerregistry_info: - resource_group: "{{ resource_group }}" - name: "acr{{ resource_group | hash('md5') | truncate(7, True, '') }}" - register: output - - - name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.registries[0]['name'] != None - - output.registries[0]['location'] != None - - output.registries[0]['admin_user_enabled'] != None - - output.registries[0]['sku'] != None - - output.registries[0]['provisioning_state'] != None - - output.registries[0]['login_server'] != None - - output.registries[0]['id'] != None - - output.registries[0]['credentials'] != None - - - name: Gather facts for all Container Registries in the resource group - azure_rm_containerregistry_info: - resource_group: "{{ resource_group }}" - register: output - - - name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.registries[0]['name'] != None - - output.registries[0]['location'] != None - - output.registries[0]['admin_user_enabled'] != None - - output.registries[0]['sku'] != None - - output.registries[0]['provisioning_state'] != None - - output.registries[0]['login_server'] != None - - output.registries[0]['id'] != None - - output.registries[0]['credentials'] != None - - output.registries[1]['name'] != None - - output.registries[1]['location'] != None - - output.registries[1]['admin_user_enabled'] != None - - output.registries[1]['sku'] != None - - output.registries[1]['provisioning_state'] != None - - output.registries[1]['login_server'] != None - - output.registries[1]['id'] != None - - output.registries[1]['credentials'] != None - - - name: Delete first container registry - azure_rm_containerregistry: - name: "acr{{ resource_group | hash('md5') | truncate(7, True, '') }}" - resource_group: "{{ resource_group }}" - state: absent - - - name: Delete second container registry - azure_rm_containerregistry: - name: "acr{{ resource_group | hash('md5') | truncate(7, True, '') }}sec" - resource_group: "{{ resource_group }}" - state: absent diff --git a/test/integration/targets/azure_rm_cosmosdbaccount/aliases b/test/integration/targets/azure_rm_cosmosdbaccount/aliases deleted file mode 100644 index 8a081bd43e..0000000000 --- a/test/integration/targets/azure_rm_cosmosdbaccount/aliases +++ /dev/null @@ -1,4 +0,0 @@ -cloud/azure -destructive -shippable/azure/group1 -azure_rm_cosmosdbaccount_info diff --git a/test/integration/targets/azure_rm_cosmosdbaccount/meta/main.yml b/test/integration/targets/azure_rm_cosmosdbaccount/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_cosmosdbaccount/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_cosmosdbaccount/tasks/main.yml b/test/integration/targets/azure_rm_cosmosdbaccount/tasks/main.yml deleted file mode 100644 index f50aa47c55..0000000000 --- a/test/integration/targets/azure_rm_cosmosdbaccount/tasks/main.yml +++ /dev/null @@ -1,249 +0,0 @@ -- name: Prepare random number - set_fact: - dbname: "cosmos{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - vnname: "vn{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - subnetname: "subnet{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - run_once: yes - -- name: Create virtual network - azure_rm_virtualnetwork: - resource_group: "{{ resource_group }}" - name: "{{ vnname }}" - address_prefixes_cidr: - - 10.1.0.0/16 - - 172.100.0.0/16 - dns_servers: - - 127.0.0.1 - - 127.0.0.3 - -- name: Add subnet - azure_rm_subnet: - name: "{{ subnetname }}" - virtual_network_name: "{{ vnname }}" - resource_group: "{{ resource_group }}" - address_prefix_cidr: "10.1.0.0/24" - -- name: Create instance of Database Account -- check mode - azure_rm_cosmosdbaccount: - resource_group: "{{ resource_group }}" - name: "{{ dbname }}" - location: eastus - geo_rep_locations: - - name: eastus - failover_priority: 0 - database_account_offer_type: Standard - check_mode: yes - register: output -- name: Assert the resource instance is well created - assert: - that: - - output.changed - -- name: Create instance of Database Account - azure_rm_cosmosdbaccount: - resource_group: "{{ resource_group }}" - name: "{{ dbname }}" - location: eastus - kind: global_document_db - geo_rep_locations: - - name: eastus - failover_priority: 0 - - name: westus - failover_priority: 1 - database_account_offer_type: Standard - is_virtual_network_filter_enabled: yes - virtual_network_rules: - - subnet: - resource_group: "{{ resource_group }}" - virtual_network_name: "{{ vnname }}" - subnet_name: "{{ subnetname }}" - ignore_missing_vnet_service_endpoint: yes - register: output -- name: Assert the resource instance is well created - assert: - that: - - output.changed - -- name: Create again instance of Database Account - azure_rm_cosmosdbaccount: - resource_group: "{{ resource_group }}" - name: "{{ dbname }}" - location: eastus - kind: global_document_db - geo_rep_locations: - - name: eastus - failover_priority: 0 - - name: westus - failover_priority: 1 - database_account_offer_type: Standard - is_virtual_network_filter_enabled: yes - virtual_network_rules: - - subnet: - resource_group: "{{ resource_group }}" - virtual_network_name: "{{ vnname }}" - subnet_name: "{{ subnetname }}" - ignore_missing_vnet_service_endpoint: yes - register: output -- name: Assert the state has not changed - assert: - that: - - output.changed == false - -- name: Create again instance of Database Account -- change something - azure_rm_cosmosdbaccount: - resource_group: "{{ resource_group }}" - name: "{{ dbname }}" - location: eastus - kind: global_document_db - geo_rep_locations: - - name: eastus - failover_priority: 0 - - name: westus - failover_priority: 1 - database_account_offer_type: Standard - is_virtual_network_filter_enabled: yes - virtual_network_rules: - - subnet: - resource_group: "{{ resource_group }}" - virtual_network_name: "{{ vnname }}" - subnet_name: "{{ subnetname }}" - ignore_missing_vnet_service_endpoint: yes - enable_automatic_failover: yes - register: output -- name: Assert the state has not changed - assert: - that: - - output.changed - -- name: Get facts of single account - azure_rm_cosmosdbaccount_info: - resource_group: "{{ resource_group }}" - name: "{{ dbname }}" - register: output - -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.accounts[0]['id'] != None - - output.accounts[0]['resource_group'] != None - - output.accounts[0]['name'] != None - - output.accounts[0]['location'] != None - - output.accounts[0]['kind'] != None - - output.accounts[0]['consistency_policy'] != None - - output.accounts[0]['failover_policies'] != None - - output.accounts[0]['read_locations'] != None - - output.accounts[0]['write_locations'] != None - - output.accounts[0]['database_account_offer_type'] != None - - output.accounts[0]['ip_range_filter'] != None - - output.accounts[0]['is_virtual_network_filter_enabled'] != None - - output.accounts[0]['enable_automatic_failover'] != None - - output.accounts[0]['enable_cassandra'] != None - - output.accounts[0]['enable_table'] != None - - output.accounts[0]['enable_gremlin'] != None - - output.accounts[0]['virtual_network_rules'] != None - - output.accounts[0]['enable_multiple_write_locations'] != None - - output.accounts[0]['document_endpoint'] != None - - output.accounts[0]['provisioning_state'] != None - - output.accounts[0]['tags'] != None - -- name: Get facts with keys - azure_rm_cosmosdbaccount_info: - resource_group: "{{ resource_group }}" - name: "{{ dbname }}" - retrieve_keys: all - register: output - -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.accounts[0]['primary_master_key'] != None - - output.accounts[0]['secondary_master_key'] != None - - output.accounts[0]['primary_readonly_master_key'] != None - - output.accounts[0]['secondary_readonly_master_key'] != None - -- name: Get facts with readonly keys - azure_rm_cosmosdbaccount_info: - resource_group: "{{ resource_group }}" - name: "{{ dbname }}" - retrieve_keys: readonly - retrieve_connection_strings: yes - register: output - -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - "'primary_master_key' not in output.accounts[0]" - - "'secondary_master_key' not in output.accounts[0]" - - output.accounts[0]['primary_readonly_master_key'] != None - - output.accounts[0]['secondary_readonly_master_key'] != None - - output.accounts[0]['connection_strings'] | length > 0 - -- name: List acounts by resource group - azure_rm_cosmosdbaccount_info: - resource_group: "{{ resource_group }}" - name: "{{ dbname }}" - register: output - -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.accounts[0]['id'] != None - - output.accounts[0]['resource_group'] != None - - output.accounts[0]['name'] != None - - output.accounts[0]['location'] != None - - output.accounts[0]['kind'] != None - - output.accounts[0]['consistency_policy'] != None - - output.accounts[0]['failover_policies'] != None - - output.accounts[0]['read_locations'] != None - - output.accounts[0]['write_locations'] != None - - output.accounts[0]['database_account_offer_type'] != None - - output.accounts[0]['ip_range_filter'] != None - - output.accounts[0]['is_virtual_network_filter_enabled'] != None - - output.accounts[0]['enable_automatic_failover'] != None - - output.accounts[0]['enable_cassandra'] != None - - output.accounts[0]['enable_table'] != None - - output.accounts[0]['enable_gremlin'] != None - - output.accounts[0]['virtual_network_rules'] != None - - output.accounts[0]['enable_multiple_write_locations'] != None - - output.accounts[0]['document_endpoint'] != None - - output.accounts[0]['provisioning_state'] != None - - output.accounts[0]['tags'] != None - -- name: Delete instance of Database Account -- check mode - azure_rm_cosmosdbaccount: - resource_group: "{{ resource_group }}" - name: "{{ dbname }}" - state: absent - check_mode: yes - register: output -- name: Assert the state has changed - assert: - that: - - output.changed - -- name: Delete instance of Database Account - azure_rm_cosmosdbaccount: - resource_group: "{{ resource_group }}" - name: "{{ dbname }}" - state: absent - register: output -- name: Assert the state has changed - assert: - that: - - output.changed - -# currently disabled as there's a bug in SDK / Service -#- name: Delete unexisting instance of Database Account -# azure_rm_cosmosdbaccount: -# resource_group: "{{ resource_group }}" -# name: "{{ dbname }}" -# state: absent -# register: output -#- name: Assert the state has changed -# assert: -# that: -# - output.changed == false diff --git a/test/integration/targets/azure_rm_deployment/aliases b/test/integration/targets/azure_rm_deployment/aliases deleted file mode 100644 index 095e5ec347..0000000000 --- a/test/integration/targets/azure_rm_deployment/aliases +++ /dev/null @@ -1,3 +0,0 @@ -cloud/azure -destructive -shippable/azure/group1 diff --git a/test/integration/targets/azure_rm_deployment/meta/main.yml b/test/integration/targets/azure_rm_deployment/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_deployment/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_deployment/tasks/main.yml b/test/integration/targets/azure_rm_deployment/tasks/main.yml deleted file mode 100644 index fb3d195151..0000000000 --- a/test/integration/targets/azure_rm_deployment/tasks/main.yml +++ /dev/null @@ -1,45 +0,0 @@ -- name: Create random dns label - set_fact: - dns_label: "test{{ resource_group | hash('md5') | truncate(16, True, '') + (65535 | random | string) }}" - -- name: Create Azure Deploy - azure_rm_deployment: - resource_group: "{{ resource_group }}" - location: "eastus" - template_link: 'https://raw.githubusercontent.com/Azure/azure-quickstart-templates/d01a5c06f4f1bc03a049ca17bbbd6e06d62657b3/101-vm-simple-linux/azuredeploy.json' - deployment_name: "{{ dns_label }}" - parameters: - adminUsername: - value: chouseknecht - adminPassword: - value: password123! - dnsLabelPrefix: - value: "{{ dns_label }}" - ubuntuOSVersion: - value: "16.04.0-LTS" - register: output - -- name: Add new instance to host group - add_host: - hostname: "{{ item.vm_name }}" - ansible_host: "{{ item['ips'][0].public_ip }}" - ansible_user: chouseknecht - ansible_ssh_pass: password123! - groupname: azure_vms - with_items: "{{ output.deployment.instances }}" - -- name: Get Deployment Facts - azure_rm_deployment_info: - resource_group: "{{ resource_group }}" - name: "{{ dns_label }}" - register: output -- debug: - var: output - -- name: Assert that values are returned - assert: - that: - - not output.changed - - output.deployments[0]['provisioning_state'] != None - - output.deployments[0]['output_resources'] | length > 0 - - output.deployments[0]['outputs'] | length > 0 diff --git a/test/integration/targets/azure_rm_devtestlab/aliases b/test/integration/targets/azure_rm_devtestlab/aliases deleted file mode 100644 index fc6fecf8d5..0000000000 --- a/test/integration/targets/azure_rm_devtestlab/aliases +++ /dev/null @@ -1,17 +0,0 @@ -cloud/azure -destructive -shippable/azure/group2 -azure_rm_devtestlab_facts -azure_rm_devtestlabarmtemplate -azure_rm_devtestlabartifact -azure_rm_devtestlabartifactsource_facts -azure_rm_devtestlabartifactsource -azure_rm_devtestlabcustomimage -azure_rm_devtestlabpolicy -azure_rm_devtestlabschedule -azure_rm_devtestlabvirtualmachine_facts -azure_rm_devtestlabvirtualmachine_facts -azure_rm_devtestlabvirtualnetwork_facts -azure_rm_devtestlabvirtualnetwork -disabled - diff --git a/test/integration/targets/azure_rm_devtestlab/meta/main.yml b/test/integration/targets/azure_rm_devtestlab/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_devtestlab/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_devtestlab/tasks/main.yml b/test/integration/targets/azure_rm_devtestlab/tasks/main.yml deleted file mode 100644 index e8f8b5b284..0000000000 --- a/test/integration/targets/azure_rm_devtestlab/tasks/main.yml +++ /dev/null @@ -1,766 +0,0 @@ -- name: Prepare random number - set_fact: - lab_name: "lab{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - vn_name: "vn{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - vm_name: "vn{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - artifacts_name: myartifacts - github_token: "{{ lookup('env','GITHUB_ACCESS_TOKEN') }}" - run_once: yes - -- name: Create instance of Lab -- check mode - azure_rm_devtestlab: - resource_group: "{{ resource_group }}" - name: "{{ lab_name }}" - location: eastus - storage_type: standard - premium_data_disks: no - check_mode: yes - register: output -- name: Check if the change was correctly reported - assert: - that: - - output.changed - -- name: Create instance of Lab - azure_rm_devtestlab: - resource_group: "{{ resource_group }}" - name: "{{ lab_name }}" - location: eastus - storage_type: standard - premium_data_disks: no - register: output_lab -- name: Check if the change was correctly reported - assert: - that: - - output.changed - -- name: Create again instance of Lab - azure_rm_devtestlab: - resource_group: "{{ resource_group }}" - name: "{{ lab_name }}" - location: eastus - storage_type: standard - premium_data_disks: no - register: output -- name: Assert the state has not changed - assert: - that: - - output.changed == false - -- name: Update lab - premium_data_disks - azure_rm_devtestlab: - resource_group: "{{ resource_group }}" - name: "{{ lab_name }}" - location: eastus - storage_type: standard - premium_data_disks: yes - register: output -- name: Assert the change was registered - assert: - that: - - output.changed - -- name: List DevTest Lab in a resource group - azure_rm_devtestlab_facts: - resource_group: "{{ resource_group }}" - register: output_lab -- name: Assert that facts are returned - assert: - that: - - output_lab.changed == False - - output_lab.labs[0]['id'] != None - - output_lab.labs[0]['resource_group'] != None - - output_lab.labs[0]['name'] != None - - output_lab.labs[0]['location'] != None - - output_lab.labs[0]['storage_type'] != None - - output_lab.labs[0]['premium_data_disks'] != None - - output_lab.labs[0]['provisioning_state'] != None - - output_lab.labs[0]['vault_name'] != None - -- name: Get DevTest Lab facts - azure_rm_devtestlab_facts: - resource_group: "{{ resource_group }}" - name: "{{ lab_name }}" - register: output_lab -- name: Assert that facts are returned - assert: - that: - - output_lab.changed == False - - output_lab.labs[0]['id'] != None - - output_lab.labs[0]['resource_group'] != None - - output_lab.labs[0]['name'] != None - - output_lab.labs[0]['location'] != None - - output_lab.labs[0]['storage_type'] != None - - output_lab.labs[0]['premium_data_disks'] != None - - output_lab.labs[0]['provisioning_state'] != None - - output_lab.labs[0]['artifacts_storage_account'] != None - - output_lab.labs[0]['default_premium_storage_account'] != None - - output_lab.labs[0]['default_storage_account'] != None - - output_lab.labs[0]['premium_data_disk_storage_account'] != None - - output_lab.labs[0]['vault_name'] != None - -# azure_rm_devtestlabpolicy -- name: Create instance of DevTest Lab Policy - azure_rm_devtestlabpolicy: - resource_group: "{{ resource_group }}" - lab_name: "{{ lab_name }}" - policy_set_name: default - name: myDtlPolicy - fact_name: user_owned_lab_vm_count - threshold: 5 - register: output -- debug: - var: output -- name: Assert if the change was correctly reported - assert: - that: - - output.changed - -- name: Create instance of DevTest Lab Policy -- idempotent - azure_rm_devtestlabpolicy: - resource_group: "{{ resource_group }}" - lab_name: "{{ lab_name }}" - policy_set_name: default - name: myDtlPolicy - fact_name: user_owned_lab_vm_count - threshold: 5 - register: output -- debug: - var: output -- name: Assert if the change was not reported - assert: - that: - - not output.changed - -- name: Create instance of DevTest Lab Policy -- change value - azure_rm_devtestlabpolicy: - resource_group: "{{ resource_group }}" - lab_name: "{{ lab_name }}" - policy_set_name: default - name: myDtlPolicy - fact_name: user_owned_lab_vm_count - threshold: 6 - register: output -- debug: - var: output -- name: Assert if the change was correctly reported - assert: - that: - - output.changed - -- name: Delete instance of DevTest Lab Policy - azure_rm_devtestlabpolicy: - resource_group: "{{ resource_group }}" - lab_name: "{{ lab_name }}" - policy_set_name: default - name: myDtlPolicy - state: absent - register: output -- debug: - var: output -- name: Assert if the change was correctly reported - assert: - that: - - output.changed - -# azure_rm_devtestlabschedule -- name: Create instance of DevTest Lab Schedule - azure_rm_devtestlabschedule: - resource_group: "{{ resource_group }}" - lab_name: "{{ lab_name }}" - name: lab_vms_shutdown - time: "1030" - time_zone_id: "UTC+12" - register: output -- debug: - var: output -- name: Assert if the change was correctly reported - assert: - that: - - output.changed - -- name: Update instance of DevTest Lab Schedule -- idempotent - azure_rm_devtestlabschedule: - resource_group: "{{ resource_group }}" - lab_name: "{{ lab_name }}" - name: lab_vms_shutdown - time: "1030" - time_zone_id: "UTC+12" - register: output -- debug: - var: output -- name: Assert if the change was correctly reported - assert: - that: - - not output.changed - -- name: Update instance of DevTest Lab Schedule -- change time - azure_rm_devtestlabschedule: - resource_group: "{{ resource_group }}" - lab_name: "{{ lab_name }}" - name: lab_vms_shutdown - time: "1130" - time_zone_id: "UTC+12" - register: output -- debug: - var: output -- name: Assert if the change was correctly reported - assert: - that: - - output.changed - -- name: Delete instance of DevTest Lab Schedule - azure_rm_devtestlabschedule: - resource_group: "{{ resource_group }}" - lab_name: "{{ lab_name }}" - name: lab_vms_shutdown - state: absent - register: output -- debug: - var: output -- name: Assert if the change was correctly reported - assert: - that: - - output.changed - -- name: Create instance of DevTest Labs virtual network - azure_rm_devtestlabvirtualnetwork: - resource_group: "{{ resource_group }}" - lab_name: "{{ lab_name }}" - name: "{{ vn_name }}" - location: eastus - description: My DevTest Lab - register: output -- name: Assert the change was registered - assert: - that: - - output.changed - -- name: Update instance of DevTest Labs virtual network with same parameters - azure_rm_devtestlabvirtualnetwork: - resource_group: "{{ resource_group }}" - lab_name: "{{ lab_name }}" - name: "{{ vn_name }}" - location: eastus - description: My DevTest Lab - register: output -- name: Assert that nothing was changed - assert: - that: - - output.changed == false - -- name: Update instance of DevTest Labs virtual network with changed description - azure_rm_devtestlabvirtualnetwork: - resource_group: "{{ resource_group }}" - lab_name: "{{ lab_name }}" - name: "{{ vn_name }}" - location: eastus - description: My DevTest Lab Updated - register: output -- name: Assert that nothing was changed - assert: - that: - - output.changed - -- name: Get DevTest Lab Virtual Network facts - azure_rm_devtestlabvirtualnetwork_facts: - resource_group: "{{ resource_group }}" - lab_name: "{{ lab_name }}" - name: "{{ vn_name }}" - register: output -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.virtualnetworks[0]['id'] != None - - output.virtualnetworks[0]['resource_group'] != None - - output.virtualnetworks[0]['lab_name'] != None - - output.virtualnetworks[0]['name'] != None - - output.virtualnetworks[0]['external_provider_resource_id'] != None - - output.virtualnetworks[0]['description'] != None - - output.virtualnetworks[0]['provisioning_state'] != None - -- name: List all Virtual Networks in DevTest Lab - azure_rm_devtestlabvirtualnetwork_facts: - resource_group: "{{ resource_group }}" - lab_name: "{{ lab_name }}" - register: output -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.virtualnetworks[0]['id'] != None - - output.virtualnetworks[0]['resource_group'] != None - - output.virtualnetworks[0]['lab_name'] != None - - output.virtualnetworks[0]['name'] != None - - output.virtualnetworks[0]['external_provider_resource_id'] != None - - output.virtualnetworks[0]['description'] != None - - output.virtualnetworks[0]['provisioning_state'] != None - -- name: Create instance of DevTest Labs artifacts source - azure_rm_devtestlabartifactsource: - resource_group: "{{ resource_group }}" - lab_name: "{{ lab_name }}" - name: "{{ artifacts_name }}" - uri: https://github.com/Azure/azure_preview_modules.git - source_type: github - folder_path: /tasks - security_token: "{{ github_token }}" - register: output - when: "github_token | length > 0" -- name: Assert if the change was correctly reported - assert: - that: - - output.changed - when: "github_token | length > 0" - -- name: Update instance of DevTest Labs artifacts source with same parameters - azure_rm_devtestlabartifactsource: - resource_group: "{{ resource_group }}" - lab_name: "{{ lab_name }}" - name: "{{ artifacts_name }}" - uri: https://github.com/Azure/azure_preview_modules.git - source_type: github - folder_path: /tasks - security_token: "{{ github_token }}" - register: output - when: "github_token | length > 0" -- name: Assert that nothing was changed - assert: - that: - - output.changed == false - when: "github_token | length > 0" - -- name: Update instance of DevTest Labs artifacts source, add display name, change folder - azure_rm_devtestlabartifactsource: - resource_group: "{{ resource_group }}" - lab_name: "{{ lab_name }}" - name: "{{ artifacts_name }}" - uri: https://github.com/Azure/azure_preview_modules.git - source_type: github - folder_path: /library - security_token: "{{ github_token }}" - display_name: My Artifacts Source - register: output - when: "github_token | length > 0" -- name: Assert that nothing was changed - assert: - that: - - output.changed - when: "github_token | length > 0" - -- name: - set_fact: - artifact_source: - - source_name: "public repo" - source_path: "/Artifacts/linux-install-mongodb" - when: "github_token | length > 0" - -- name: - set_fact: - artifact_source: null - when: "github_token | length == 0" - -- name: Create instance of DTL Virtual Machine - azure_rm_devtestlabvirtualmachine: - resource_group: "{{ resource_group }}" - lab_name: "{{ lab_name }}" - name: "{{ vm_name }}" - notes: Virtual machine notes, just something.... - os_type: linux - vm_size: Standard_A2_v2 - user_name: dtladmin - password: ZSasfovobocu$$21! - lab_subnet: - virtual_network_name: "{{ vn_name }}" - name: "{{ vn_name }}Subnet" - disallow_public_ip_address: no - image: - offer: UbuntuServer - publisher: Canonical - sku: 16.04-LTS - os_type: Linux - version: latest - artifacts: "{{ artifact_source }}" - allow_claim: no - expiration_date: "2029-02-22T01:49:12.117974Z" - register: output - when: "github_token | length > 0" - -- name: Assert that change was registered - assert: - that: - - output.changed - when: "github_token | length > 0" - -- name: Update instance of DTL Virtual Machine with same parameters - azure_rm_devtestlabvirtualmachine: - resource_group: "{{ resource_group }}" - lab_name: "{{ lab_name }}" - name: "{{ vm_name }}" - notes: Virtual machine notes, just something.... - os_type: linux - vm_size: Standard_A2_v2 - user_name: dtladmin - password: ZSasfovobocu$$21! - lab_subnet: - virtual_network_name: "{{ vn_name }}" - name: "{{ vn_name }}Subnet" - disallow_public_ip_address: no - image: - offer: UbuntuServer - publisher: Canonical - sku: 16.04-LTS - os_type: Linux - version: latest - artifacts: "{{ artifact_source }}" - allow_claim: no - expiration_date: "2029-02-22T01:49:12.117974Z" - register: output - when: "github_token | length > 0" - -- name: Assert that nothing has changed - assert: - that: - - output.changed == false - when: "github_token | length > 0" - -- name: Update instance of DTL Virtual Machine - change notes - azure_rm_devtestlabvirtualmachine: - resource_group: "{{ resource_group }}" - lab_name: "{{ lab_name }}" - name: "{{ vm_name }}" - notes: Virtual machine notes, just something.... more text - os_type: linux - vm_size: Standard_A2_v2 - user_name: dtladmin - password: ZSasfovobocu$$21! - lab_subnet: - virtual_network_name: "{{ vn_name }}" - name: "{{ vn_name }}Subnet" - disallow_public_ip_address: no - image: - offer: UbuntuServer - publisher: Canonical - sku: 16.04-LTS - os_type: Linux - version: latest - artifacts: "{{ artifact_source }}" - allow_claim: no - expiration_date: "2029-02-22T01:49:12.117974Z" - register: output - when: "github_token | length > 0" - -- name: Assert that change was registered - assert: - that: - - output.changed - when: "github_token | length > 0" - -- name: Get Facts of DTL Virtual Machine - azure_rm_devtestlabvirtualmachine_facts: - resource_group: "{{ resource_group }}" - lab_name: "{{ lab_name }}" - name: "{{ vm_name }}" - register: output_vm -- name: Assert that facts are returned - assert: - that: - - output_vm.changed == False - - output_vm.virtualmachines[0]['id'] != None - - output_vm.virtualmachines[0]['resource_group'] != None - - output_vm.virtualmachines[0]['lab_name'] != None - - output_vm.virtualmachines[0]['name'] != None - - output_vm.virtualmachines[0]['compute_vm_id'] != None - - output_vm.virtualmachines[0]['compute_vm_resource_group'] != None - - output_vm.virtualmachines[0]['compute_vm_name'] != None - - output_vm.virtualmachines[0]['disallow_public_ip_address'] != None - - output_vm.virtualmachines[0]['expiration_date'] != None - - output_vm.virtualmachines[0]['fqdn'] != None - - output_vm.virtualmachines[0]['id'] != None - - output_vm.virtualmachines[0]['image'] != None - - output_vm.virtualmachines[0]['notes'] != None - - output_vm.virtualmachines[0]['os_type'] != None - - output_vm.virtualmachines[0]['provisioning_state'] != None - - output_vm.virtualmachines[0]['storage_type'] != None - - output_vm.virtualmachines[0]['user_name'] != None - - output_vm.virtualmachines[0]['vm_size'] != None - when: "github_token | length > 0" - -- name: List Facts of DTL Virtual Machine - azure_rm_devtestlabvirtualmachine_facts: - resource_group: "{{ resource_group }}" - lab_name: "{{ lab_name }}" - register: output_vm -- name: Assert that facts are returned - assert: - that: - - output_vm.changed == False - - output_vm.virtualmachines[0]['id'] != None - - output_vm.virtualmachines[0]['resource_group'] != None - - output_vm.virtualmachines[0]['lab_name'] != None - - output_vm.virtualmachines[0]['name'] != None - - output_vm.virtualmachines[0]['compute_vm_id'] != None - - output_vm.virtualmachines[0]['disallow_public_ip_address'] != None - - output_vm.virtualmachines[0]['expiration_date'] != None - - output_vm.virtualmachines[0]['fqdn'] != None - - output_vm.virtualmachines[0]['id'] != None - - output_vm.virtualmachines[0]['image'] != None - - output_vm.virtualmachines[0]['notes'] != None - - output_vm.virtualmachines[0]['os_type'] != None - - output_vm.virtualmachines[0]['provisioning_state'] != None - - output_vm.virtualmachines[0]['storage_type'] != None - - output_vm.virtualmachines[0]['user_name'] != None - - output_vm.virtualmachines[0]['vm_size'] != None - when: "github_token | length > 0" - - -- name: List all artifact sources - azure_rm_devtestlabartifactsource_facts: - resource_group: "{{ resource_group }}" - lab_name: "{{ lab_name }}" - register: output -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.artifactsources[0]['id'] != None - - output.artifactsources[0]['resource_group'] != None - - output.artifactsources[0]['lab_name'] != None - - output.artifactsources[0]['name'] != None - - output.artifactsources[0]['display_name'] != None - - output.artifactsources[0]['source_type'] != None - - output.artifactsources[0]['is_enabled'] != None - - output.artifactsources[0]['uri'] != None - - output.artifactsources[0]['folder_path'] != None - - output.artifactsources[0]['provisioning_state'] != None - - output.artifactsources | length >= 2 - -- name: Get artifacts source facts - azure_rm_devtestlabartifactsource_facts: - resource_group: "{{ resource_group }}" - lab_name: "{{ lab_name }}" - name: public repo - register: output -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.artifactsources[0]['id'] != None - - output.artifactsources[0]['resource_group'] != None - - output.artifactsources[0]['lab_name'] != None - - output.artifactsources[0]['name'] != None - - output.artifactsources[0]['display_name'] != None - - output.artifactsources[0]['source_type'] != None - - output.artifactsources[0]['is_enabled'] != None - - output.artifactsources[0]['uri'] != None - - output.artifactsources[0]['folder_path'] != None - - output.artifactsources[0]['provisioning_state'] != None - -- name: Delete instance of DevTest Labs artifacts source - azure_rm_devtestlabartifactsource: - resource_group: "{{ resource_group }}" - lab_name: "{{ lab_name }}" - name: "{{ artifacts_name }}" - state: absent - register: output - when: "github_token | length > 0" -- name: Assert that change was correctly registered - assert: - that: - - output.changed - when: "github_token | length > 0" - -- name: List ARM Template facts - azure_rm_devtestlabarmtemplate_facts: - resource_group: "{{ resource_group }}" - lab_name: "{{ lab_name }}" - artifact_source_name: "public environment repo" - register: output -- name: Assert that facts are returned - assert: - that: - - output.armtemplates[0]['id'] != None - - output.armtemplates[0]['resource_group'] != None - - output.armtemplates[0]['lab_name'] != None - - output.armtemplates[0]['artifact_source_name'] != None - - output.armtemplates[0]['name'] != None - - output.armtemplates[0]['display_name'] != None - - output.armtemplates[0]['description'] != None - - output.armtemplates[0]['publisher'] != None - - "output.armtemplates | length > 1" - -- name: Get ARM Template facts - azure_rm_devtestlabarmtemplate_facts: - resource_group: "{{ resource_group }}" - lab_name: "{{ lab_name }}" - artifact_source_name: "public environment repo" - name: ServiceFabric-LabCluster - register: output -- name: Assert that facts are returned - assert: - that: - - output.armtemplates[0]['id'] != None - - output.armtemplates[0]['resource_group'] != None - - output.armtemplates[0]['lab_name'] != None - - output.armtemplates[0]['artifact_source_name'] != None - - output.armtemplates[0]['name'] != None - - output.armtemplates[0]['display_name'] != None - - output.armtemplates[0]['description'] != None - - output.armtemplates[0]['publisher'] != None - - "output.armtemplates | length == 1" - - - -- name: Get Artifact facts - azure_rm_devtestlabartifact_facts: - resource_group: "{{ resource_group }}" - lab_name: "{{ lab_name }}" - artifact_source_name: "public repo" - register: output -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.artifacts[0]['id'] != None - - output.artifacts[0]['resource_group'] != None - - output.artifacts[0]['lab_name'] != None - - output.artifacts[0]['artifact_source_name'] != None - - output.artifacts[0]['name'] != None - - output.artifacts[0]['description'] != None - - output.artifacts[0]['file_path'] != None - - output.artifacts[0]['publisher'] != None - - output.artifacts[0]['target_os_type'] != None - - output.artifacts[0]['publisher'] != None - - "output.artifacts | length > 1" - -- name: Get Artifact facts - azure_rm_devtestlabartifact_facts: - resource_group: "{{ resource_group }}" - lab_name: "{{ lab_name }}" - artifact_source_name: "public repo" - name: windows-webdeploy - register: output -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.artifacts[0]['id'] != None - - output.artifacts[0]['resource_group'] != None - - output.artifacts[0]['lab_name'] != None - - output.artifacts[0]['artifact_source_name'] != None - - output.artifacts[0]['name'] != None - - output.artifacts[0]['description'] != None - - output.artifacts[0]['file_path'] != None - - output.artifacts[0]['publisher'] != None - - output.artifacts[0]['target_os_type'] != None - - output.artifacts[0]['publisher'] != None - - "output.artifacts | length == 1" - -- name: Create instance of DevTest Lab Environment - azure_rm_devtestlabenvironment: - resource_group: "{{ resource_group }}" - lab_name: "{{ lab_name }}" - user_name: "@me" - name: myEnvironment - location: eastus - deployment_template: "{{ output_lab.labs[0].id }}/artifactSources/public environment repo/armTemplates/WebApp" - register: output -- name: Assert if the change was correctly reported - assert: - that: - - output.changed - when: "github_token | length > 0" - -- name: Create instance of DevTest Lab Environment - idempotent - azure_rm_devtestlabenvironment: - resource_group: "{{ resource_group }}" - lab_name: "{{ lab_name }}" - user_name: "@me" - name: myEnvironment - location: eastus - deployment_template: - artifact_source_name: public environment repo - name: WebApp - register: output -- name: Assert if the change was not detected - assert: - that: - - not output.changed - when: "github_token | length > 0" - -- name: Delete instance of DevTest Lab Environment - azure_rm_devtestlabenvironment: - resource_group: "{{ resource_group }}" - lab_name: "{{ lab_name }}" - user_name: "@me" - name: myEnvironment - state: absent - register: output -- name: Assert that change was detected - assert: - that: - - output.changed - when: "github_token | length > 0" - -- name: Create instance of DevTest Lab Image - azure_rm_devtestlabcustomimage: - resource_group: "{{ resource_group }}" - lab_name: "{{ lab_name }}" - name: myImage - source_vm: "{{ output_vm.virtualmachines[0]['name'] }}" - linux_os_state: non_deprovisioned - register: output -- name: Assert that change was detected - assert: - that: - - output.changed - when: "github_token | length > 0" - -- name: Create instance of DevTest Lab Image -- idempotent - azure_rm_devtestlabcustomimage: - resource_group: "{{ resource_group }}" - lab_name: "{{ lab_name }}" - name: myImage - source_vm: "{{ output_vm.virtualmachines[0]['name'] }}" - linux_os_state: non_deprovisioned - register: output -- name: Assert that change was detected - assert: - that: - - not output.changed - when: "github_token | length > 0" - -- name: Delete instance of Lab -- check mode - azure_rm_devtestlab: - resource_group: "{{ resource_group }}" - state: absent - name: "{{ lab_name }}" - check_mode: yes - register: output -- name: Assert if the change was correctly reported in check mode - assert: - that: - - output.changed - -- name: Delete instance of Lab - azure_rm_devtestlab: - resource_group: "{{ resource_group }}" - name: "{{ lab_name }}" - state: absent - register: output -- name: Assert the change was correctly reported - assert: - that: - - output.changed - -- name: Delete unexisting instance of Lab - azure_rm_devtestlab: - resource_group: "{{ resource_group }}" - name: "{{ lab_name }}unexisting" - state: absent - register: output -- name: Assert thes state has not changed - assert: - that: - - output.changed == false diff --git a/test/integration/targets/azure_rm_dnszone/aliases b/test/integration/targets/azure_rm_dnszone/aliases deleted file mode 100644 index b048b01fe2..0000000000 --- a/test/integration/targets/azure_rm_dnszone/aliases +++ /dev/null @@ -1,6 +0,0 @@ -cloud/azure -shippable/azure/group2 -destructive -azure_rm_dnszone_info -azure_rm_dnsrecordset -azure_rm_dnsrecordset_info diff --git a/test/integration/targets/azure_rm_dnszone/meta/main.yml b/test/integration/targets/azure_rm_dnszone/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_dnszone/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_dnszone/tasks/main.yml b/test/integration/targets/azure_rm_dnszone/tasks/main.yml deleted file mode 100644 index 03c76397c1..0000000000 --- a/test/integration/targets/azure_rm_dnszone/tasks/main.yml +++ /dev/null @@ -1,355 +0,0 @@ -- name: Create random domain name - set_fact: - domain_name: "{{ resource_group | hash('md5') | truncate(16, True, '') + (65535 | random | string) }}" - -- name: Create a DNS zone (check mode) - azure_rm_dnszone: - resource_group: "{{ resource_group }}" - name: "{{ domain_name }}.com" - register: results - check_mode: yes - -- assert: - that: results.changed - -- name: Create a DNS zone - azure_rm_dnszone: - resource_group: "{{ resource_group }}" - name: "{{ domain_name }}.com" - register: results - -- assert: - that: results.changed - -- name: Update DNS zone with tags - azure_rm_dnszone: - resource_group: "{{ resource_group }}" - name: "{{ domain_name }}.com" - tags: - test: modified - register: results - -- assert: - that: - - results.changed - - results.state.tags.test == 'modified' - -- name: Retrieve DNS Zone Facts - azure_rm_dnszone_info: - resource_group: "{{ resource_group }}" - name: "{{ domain_name }}.com" - register: zones - -- name: Assert that facts module returned result - assert: - that: - - zones.dnszones[0].tags.test == 'modified' - - zones.dnszones[0].type == 'public' - -- name: Create virtual network - azure_rm_virtualnetwork: - resource_group: "{{ resource_group }}" - name: "{{ item }}" - address_prefixes_cidr: - - 10.1.0.0/16 - - 172.100.0.0/16 - with_items: - - "{{ domain_name }}registration1" - - "{{ domain_name }}resolution1" - - "{{ domain_name }}registration2" - - "{{ domain_name }}resolution2" - -- name: Create private dns zone - azure_rm_dnszone: - name: "{{ domain_name }}.private" - resource_group: "{{ resource_group }}" - type: private - registration_virtual_networks: - - name: "{{ domain_name }}registration1" - resolution_virtual_networks: - - name: "{{ domain_name }}resolution1" - - name: "{{ domain_name }}resolution2" - register: results - -- assert: - that: - - "results.state.registration_virtual_networks | length == 1" - - "results.state.resolution_virtual_networks | length == 2" - - results.state.type == 'private' - -- name: Update private dns zone - azure_rm_dnszone: - name: "{{ domain_name }}.private" - resource_group: "{{ resource_group }}" - type: private - registration_virtual_networks: - - name: "{{ domain_name }}registration1" - resolution_virtual_networks: - - name: "{{ domain_name }}resolution1" - register: results - -- assert: - that: - - "results.state.registration_virtual_networks | length == 1" - - "results.state.resolution_virtual_networks | length == 1" - - results.state.type == 'private' - -- name: Test idempotent - azure_rm_dnszone: - name: "{{ item }}" - resource_group: "{{ resource_group }}" - with_items: - - "{{ domain_name }}.com" - - "{{ domain_name }}.private" - register: results - -- assert: - that: - - "not {{ item.changed }}" - with_items: "{{ results.results }}" - -# -# azure_rm_dnsrecordset test -# - -- name: create "A" record set with multiple records - azure_rm_dnsrecordset: - resource_group: "{{ resource_group }}" - relative_name: www - zone_name: "{{ domain_name }}.com" - record_type: A - records: - - entry: 192.168.100.101 - - entry: 192.168.100.102 - - entry: 192.168.100.103 - register: results - -- name: Assert that A record set was created - assert: - that: - - results.changed - - 'results.state.arecords | length == 3' - -- name: re-run "A" record with same values - azure_rm_dnsrecordset: - resource_group: "{{ resource_group }}" - relative_name: www - zone_name: "{{ domain_name }}.com" - record_type: A - records: - - entry: 192.168.100.101 - - entry: 192.168.100.102 - - entry: 192.168.100.103 - register: results - -- name: Assert that A record set was not changed - assert: - that: not results.changed - -- name: Update "A" record set with additional record - azure_rm_dnsrecordset: - resource_group: "{{ resource_group }}" - relative_name: www - zone_name: "{{ domain_name }}.com" - record_type: A - record_mode: append - records: - - entry: 192.168.100.104 - register: results - -- name: Assert that new record was appended - assert: - that: - - results.changed - - 'results.state.arecords | length == 4' - -- name: re-update "A" record set with additional record - azure_rm_dnsrecordset: - resource_group: "{{ resource_group }}" - relative_name: www - zone_name: "{{ domain_name }}.com" - record_type: A - record_mode: append - records: - - entry: 192.168.100.104 - register: results - -- name: Assert that A record set was not changed - assert: - that: - - not results.changed - -- name: Remove 1 record from record set - azure_rm_dnsrecordset: - resource_group: "{{ resource_group }}" - relative_name: www - zone_name: "{{ domain_name }}.com" - record_type: A - records: - - entry: 192.168.100.101 - - entry: 192.168.100.102 - - entry: 192.168.100.103 - register: results - -- name: Assert that record was deleted - assert: - that: - - results.changed - - 'results.state.arecords | length == 3' - -- name: Check_mode test - azure_rm_dnsrecordset: - resource_group: "{{ resource_group }}" - relative_name: www - zone_name: "{{ domain_name }}.com" - record_type: A - records: - - entry: 192.168.100.105 - check_mode: yes - register: results - -- name: Assert that check_mode returns new state - assert: - that: - - results.changed - -# FUTURE: add facts module calls to ensure that we really didn't touch anything - -- name: create SRV records in a new record set - azure_rm_dnsrecordset: - resource_group: "{{ resource_group }}" - relative_name: "_sip._tcp.{{ domain_name }}.com" - zone_name: "{{ domain_name }}.com" - time_to_live: 7200 - record_type: SRV - records: - - entry: sip.{{ domain_name }}.com - priority: 20 - weight: 10 - port: 5060 - register: results - -- name: Assert that SRV record set was created - assert: - that: - - results.changed - -- name: create TXT records in a new record set - azure_rm_dnsrecordset: - resource_group: "{{ resource_group }}" - relative_name: "_txt.{{ domain_name }}.com" - zone_name: "{{ domain_name }}.com" - record_type: TXT - records: - - entry: "v=spf1 a -all" - - entry: "foo" - - entry: - - "bar" - - "baz" - register: results - -- name: Assert that TXT record set was created - assert: - that: - - results.changed - -# -# azure_rm_dnsrecordset_info -# - -- name: Retrieve DNS Record Set Facts for single Record Set - azure_rm_dnsrecordset_info: - resource_group: "{{ resource_group }}" - zone_name: "{{ domain_name }}.com" - relative_name: www - record_type: A - register: results - -- name: Assert that facts module returned result for single Record Set - assert: - that: - - not results.changed -# - azure_dnsrecordset[0].name == 'www' - - results.dnsrecordsets[0].relative_name == 'www' - - 'results.dnsrecordsets[0].records | length == 3' - - results.dnsrecordsets[0].record_type == 'A' - -- name: Retrieve DNS Record Set Facts for all Record Sets - azure_rm_dnsrecordset_info: - resource_group: "{{ resource_group }}" - zone_name: "{{ domain_name }}.com" - register: facts - -- name: Assert that facts module returned result for all Record Sets - assert: - that: - - not facts.changed -# - facts.ansible_facts.azure_dnsrecordset[0].name == '@' -# - facts.ansible_facts.azure_dnsrecordset[1].name == '@' -# - facts.ansible_facts.azure_dnsrecordset[4].name == 'www' - -# -# azure_rm_dnsrecordset cleanup -# -- name: delete all record sets except for @ - azure_rm_dnsrecordset: - resource_group: "{{ resource_group }}" - relative_name: "{{ item.relative_name }}" - zone_name: "{{ domain_name }}.com" - record_type: "{{ item.record_type }}" - state: absent - with_items: "{{ facts.dnsrecordsets }}" - when: - - item.relative_name != '@' - register: results - -- name: Assert that record set deleted - assert: - that: results.changed - -- name: Retrieve DNS Record Set Facts for all Record Sets - azure_rm_dnsrecordset_info: - resource_group: "{{ resource_group }}" - zone_name: "{{ domain_name }}.com" - register: facts - -- name: Assert all record set deleted - assert: - that: - - item.relative_name == '@' - with_items: "{{ facts.dnsrecordsets }}" - -- name: (idempotence test) re-run record set absent - azure_rm_dnsrecordset: - resource_group: "{{ resource_group }}" - relative_name: www - zone_name: "{{ domain_name }}.com" - record_type: A - state: absent - register: results - -- name: - assert: - that: not results.changed - -# -# azure_rm_dnszone cleanup -# -- name: Delete DNS zone - azure_rm_dnszone: - resource_group: "{{ resource_group }}" - name: "{{ item }}" - state: absent - with_items: - - "{{ domain_name }}.com" - - "{{ domain_name }}.private" - -- name: Delete DNS zone (idempotent) - azure_rm_dnszone: - resource_group: "{{ resource_group }}" - name: "{{ domain_name }}.com" - state: absent - register: results - -- assert: - that: not results.changed
\ No newline at end of file diff --git a/test/integration/targets/azure_rm_functionapp/aliases b/test/integration/targets/azure_rm_functionapp/aliases deleted file mode 100644 index aa77c071a8..0000000000 --- a/test/integration/targets/azure_rm_functionapp/aliases +++ /dev/null @@ -1,3 +0,0 @@ -cloud/azure -shippable/azure/group2 -destructive diff --git a/test/integration/targets/azure_rm_functionapp/meta/main.yml b/test/integration/targets/azure_rm_functionapp/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_functionapp/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_functionapp/tasks/main.yml b/test/integration/targets/azure_rm_functionapp/tasks/main.yml deleted file mode 100644 index cf200fb9c4..0000000000 --- a/test/integration/targets/azure_rm_functionapp/tasks/main.yml +++ /dev/null @@ -1,131 +0,0 @@ -- name: Fix resource prefix - set_fact: - fixed_resource_prefix: "{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - -- name: Fix resource prefix - set_fact: - funcapp_name_basic: "fa{{ fixed_resource_prefix }}basic" - funcapp_name_container: "fa{{ fixed_resource_prefix }}container" - funcapp_name_params: "fa{{ fixed_resource_prefix }}params" - storage_account_name: "sa{{ fixed_resource_prefix }}" - plan_name: "ap{{ fixed_resource_prefix }}" - -- name: create storage account for function apps - azure_rm_storageaccount: - resource_group: '{{ resource_group }}' - name: "{{ storage_account_name }}" - account_type: Standard_LRS - -- name: create basic function app - azure_rm_functionapp: - resource_group: "{{ resource_group }}" - name: "{{ funcapp_name_basic }}" - storage_account: "{{ storage_account_name }}" - register: output - -- name: assert the function was created - assert: - that: output.changed - -- name: list facts for function - azure_rm_functionapp_info: - resource_group: '{{ resource_group }}' - name: "{{ funcapp_name_basic }}" - register: results - -- name: assert the facts were retrieved - assert: - that: - - results.ansible_info.azure_functionapps|length == 1 - - results.ansible_info.azure_functionapps[0].name == "{{ funcapp_name_basic }}" - -- name: delete basic function app - azure_rm_functionapp: - resource_group: '{{ resource_group }}' - name: "{{ funcapp_name_basic }}" - state: absent - register: output - -- name: assert the function was deleted - assert: - that: output.changed - -- name: create a function with app settings - azure_rm_functionapp: - resource_group: '{{ resource_group }}' - name: "{{ funcapp_name_params }}" - storage_account: "{{ storage_account_name }}" - app_settings: - hello: world - things: more stuff - FUNCTIONS_EXTENSION_VERSION: "~2" - register: output - -- name: assert the function with app settings was created - assert: - that: output.changed - -- name: change app settings - azure_rm_functionapp: - resource_group: '{{ resource_group }}' - name: "{{ funcapp_name_params }}" - storage_account: "{{ storage_account_name }}" - app_settings: - hello: world - things: more stuff - FUNCTIONS_EXTENSION_VERSION: "~2" - another: one - register: output - -- name: assert the function was changed - assert: - that: output.changed - -- name: delete the function app - azure_rm_functionapp: - resource_group: '{{ resource_group }}' - name: "{{ funcapp_name_params }}" - state: absent - register: output - -- name: assert the function was deleted - assert: - that: output.changed - -- name: Create a linux app service plan - azure_rm_appserviceplan: - resource_group: "{{ resource_group }}" - name: "{{ plan_name }}" - sku: S1 - is_linux: true - number_of_workers: 1 - -- name: "Create azure function app {{ function_app }}" - azure_rm_functionapp: - resource_group: "{{ resource_group }}" - name: "{{ funcapp_name_container }}" - storage_account: "{{ storage_account_name }}" - plan: - resource_group: "{{ resource_group }}" - name: "{{ plan_name }}" - container_settings: - name: httpd - app_settings: - FUNCTIONS_EXTENSION_VERSION: "~2" - register: output - -- name: assert the function was changed - assert: - that: output.changed - -- name: delete the function app - azure_rm_functionapp: - resource_group: '{{ resource_group }}' - name: "{{ funcapp_name_container }}" - state: absent - -- name: delete storage account - azure_rm_storageaccount: - resource_group: '{{ resource_group }}' - name: "{{ storage_account_name }}" - state: absent diff --git a/test/integration/targets/azure_rm_gallery/aliases b/test/integration/targets/azure_rm_gallery/aliases deleted file mode 100644 index df49fa1efc..0000000000 --- a/test/integration/targets/azure_rm_gallery/aliases +++ /dev/null @@ -1,6 +0,0 @@ -cloud/azure -shippable/azure/group4 -destructive -azure_rm_galleryimage -azure_rm_galleryimageversion -azure_rm_snapshot diff --git a/test/integration/targets/azure_rm_gallery/meta/main.yml b/test/integration/targets/azure_rm_gallery/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_gallery/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_gallery/tasks/main.yml b/test/integration/targets/azure_rm_gallery/tasks/main.yml deleted file mode 100644 index 000f9e8855..0000000000 --- a/test/integration/targets/azure_rm_gallery/tasks/main.yml +++ /dev/null @@ -1,342 +0,0 @@ -- name: Prepare random number - set_fact: - rpfx: "{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - run_once: yes - -- name: Create virtual network - azure_rm_virtualnetwork: - resource_group: "{{ resource_group }}" - name: testVnet - address_prefixes: "10.0.0.0/16" - -- name: Add subnet - azure_rm_subnet: - resource_group: "{{ resource_group }}" - name: testSubnet - address_prefix: "10.0.1.0/24" - virtual_network: testVnet - -- name: Create public IP address - azure_rm_publicipaddress: - resource_group: "{{ resource_group }}" - allocation_method: Static - name: testPublicIP - -- name: Create virtual network inteface cards for VM A and B - azure_rm_networkinterface: - resource_group: "{{ resource_group }}" - name: "vmforimage{{ rpfx }}nic" - virtual_network: testVnet - subnet: testSubnet - -- name: Create VM - azure_rm_virtualmachine: - resource_group: "{{ resource_group }}" - name: "vmforimage{{ rpfx }}" - location: eastus - admin_username: testuser - admin_password: "Password1234!" - vm_size: Standard_B1ms - network_interfaces: "vmforimage{{ rpfx }}nic" - image: - offer: UbuntuServer - publisher: Canonical - sku: 16.04-LTS - version: latest - -- name: Get VM facts - azure_rm_virtualmachine_facts: - resource_group: "{{ resource_group }}" - name: "vmforimage{{ rpfx }}" - register: output - -- name: Create a snapshot by importing an unmanaged blob from the same subscription. - azure_rm_snapshot: - resource_group: "{{ resource_group }}" - name: "mySnapshot-{{ rpfx }}" - location: eastus - creation_data: - create_option: Import - source_uri: 'https://{{ output.vms[0].storage_account_name }}.blob.core.windows.net/{{ output.vms[0].storage_container_name }}/{{ output.vms[0].storage_blob_name }}' - register: output - -- assert: - that: - - output.changed - -- name: Generalize VM - azure_rm_virtualmachine: - resource_group: "{{ resource_group }}" - name: "vmforimage{{ rpfx }}" - generalized: yes -- name: Create custom image - azure_rm_image: - resource_group: "{{ resource_group }}" - name: testimagea - source: "vmforimage{{ rpfx }}" -- name: Create or update a simple gallery. - azure_rm_gallery: - resource_group: "{{ resource_group }}" - name: myGallery{{ rpfx }} - location: eastus - description: This is the gallery description. - register: output - -- assert: - that: - - output.changed - -- name: Create or update a simple gallery - idempotent - azure_rm_gallery: - resource_group: "{{ resource_group }}" - name: myGallery{{ rpfx }} - location: eastus - description: This is the gallery description. - register: output - -- assert: - that: - - not output.changed - -- name: Create or update a simple gallery - change description - azure_rm_gallery: - resource_group: "{{ resource_group }}" - name: myGallery{{ rpfx }} - location: eastus - description: This is the gallery description - xxx. - register: output - -- assert: - that: - - output.changed - -- name: Get a gallery info. - azure_rm_gallery_info: - resource_group: "{{ resource_group }}" - name: myGallery{{ rpfx }} - register: output - -- assert: - that: - - not output.changed - - output.galleries['id'] != None - - output.galleries['name'] != None - - output.galleries['location'] != None - - output.galleries['description'] != None - - output.galleries['provisioning_state'] != None - -- name: Create or update gallery image - azure_rm_galleryimage: - resource_group: "{{ resource_group }}" - gallery_name: myGallery{{ rpfx }} - name: myImage - location: eastus - os_type: linux - os_state: generalized - identifier: - publisher: myPublisherName - offer: myOfferName - sku: mySkuName - description: Image Description - register: output - -- assert: - that: - - output.changed - -- name: Create or update gallery image - idempotent - azure_rm_galleryimage: - resource_group: "{{ resource_group }}" - gallery_name: myGallery{{ rpfx }} - name: myImage - location: eastus - os_type: linux - os_state: generalized - identifier: - publisher: myPublisherName - offer: myOfferName - sku: mySkuName - description: Image Description - register: output - -- assert: - that: - - not output.changed - -- name: Create or update gallery image - change description - azure_rm_galleryimage: - resource_group: "{{ resource_group }}" - gallery_name: myGallery{{ rpfx }} - name: myImage - location: eastus - os_type: linux - os_state: generalized - identifier: - publisher: myPublisherName - offer: myOfferName - sku: mySkuName - description: Image Description XXXs - register: output - -- assert: - that: - - output.changed - -- name: Get a gallery image info. - azure_rm_galleryimage_info: - resource_group: "{{ resource_group }}" - gallery_name: myGallery{{ rpfx }} - name: myImage - register: output - -- assert: - that: - - not output.changed - - output.images['id'] != None - - output.images['name'] != None - - output.images['location'] != None - - output.images['os_state'] != None - - output.images['os_type'] != None - - output.images['identifier'] != None - -- name: Create or update a simple gallery Image Version. - azure_rm_galleryimageversion: - resource_group: "{{ resource_group }}" - gallery_name: myGallery{{ rpfx }} - gallery_image_name: myImage - name: 10.1.3 - location: eastus - publishing_profile: - end_of_life_date: "2020-10-01t00:00:00+00:00" - exclude_from_latest: yes - replica_count: 3 - storage_account_type: Standard_LRS - target_regions: - - name: eastus - regional_replica_count: 1 - - name: westus - regional_replica_count: 2 - storage_account_type: Standard_ZRS - managed_image: - name: testimagea - resource_group: "{{ resource_group }}" - register: output - -- assert: - that: - - output.changed - -- name: Create or update a simple gallery Image Version - idempotent - azure_rm_galleryimageversion: - resource_group: "{{ resource_group }}" - gallery_name: myGallery{{ rpfx }} - gallery_image_name: myImage - name: 10.1.3 - location: eastus - publishing_profile: - end_of_life_date: "2020-10-01t00:00:00+00:00" - exclude_from_latest: yes - replica_count: 3 - storage_account_type: Standard_LRS - target_regions: - - name: eastus - regional_replica_count: 1 - - name: westus - regional_replica_count: 2 - storage_account_type: Standard_ZRS - managed_image: - name: testimagea - resource_group: "{{ resource_group }}" - register: output - -- assert: - that: - - not output.changed - -- name: Create or update a simple gallery Image Version - change end of life - azure_rm_galleryimageversion: - resource_group: "{{ resource_group }}" - gallery_name: myGallery{{ rpfx }} - gallery_image_name: myImage - name: 10.1.3 - location: eastus - publishing_profile: - end_of_life_date: "2021-10-01t00:00:00+00:00" - exclude_from_latest: yes - replica_count: 3 - storage_account_type: Standard_LRS - target_regions: - - name: eastus - regional_replica_count: 1 - - name: westus - regional_replica_count: 2 - storage_account_type: Standard_ZRS - managed_image: - name: testimagea - resource_group: "{{ resource_group }}" - register: output - -- assert: - that: - - output.changed - -- name: Get a simple gallery Image Version info. - azure_rm_galleryimageversion_info: - resource_group: "{{ resource_group }}" - gallery_name: myGallery{{ rpfx }} - gallery_image_name: myImage - name: 10.1.3 - register: output - -- assert: - that: - - not output.changed - - output.versions['id'] != None - - output.versions['name'] != None - - output.versions['location'] != None - - output.versions['publishing_profile'] != None - - output.versions['provisioning_state'] != None - -- name: Delete gallery image Version. - azure_rm_galleryimageversion: - resource_group: "{{ resource_group }}" - gallery_name: myGallery{{ rpfx }} - gallery_image_name: myImage - name: 10.1.3 - state: absent - register: output - -- assert: - that: - - output.changed - -- name: pasue 2 minutes, wait for deletion complete - pause: - minutes: 2 - -- name: Delete gallery image - azure_rm_galleryimage: - resource_group: "{{ resource_group }}" - gallery_name: myGallery{{ rpfx }} - name: myImage - state: absent - register: output - -- assert: - that: - - output.changed - -- name: pasue 2 minutes, wait for deletion complete - pause: - minutes: 2 - -- name: Delete gallery - azure_rm_gallery: - resource_group: "{{ resource_group }}" - name: myGallery{{ rpfx }} - state: absent - register: output - -- assert: - that: - - output.changed diff --git a/test/integration/targets/azure_rm_hdinsightcluster/aliases b/test/integration/targets/azure_rm_hdinsightcluster/aliases deleted file mode 100644 index ef98a7be22..0000000000 --- a/test/integration/targets/azure_rm_hdinsightcluster/aliases +++ /dev/null @@ -1,6 +0,0 @@ -cloud/azure -destructive -shippable/azure/group1 -unstable # test is slow (~30 minute run time), not unstable, but this is better than unsupported -azure_rm_hdinsightcluster_info -disabled diff --git a/test/integration/targets/azure_rm_hdinsightcluster/meta/main.yml b/test/integration/targets/azure_rm_hdinsightcluster/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_hdinsightcluster/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_hdinsightcluster/tasks/main.yml b/test/integration/targets/azure_rm_hdinsightcluster/tasks/main.yml deleted file mode 100644 index 2bf0a98191..0000000000 --- a/test/integration/targets/azure_rm_hdinsightcluster/tasks/main.yml +++ /dev/null @@ -1,244 +0,0 @@ -- name: Prepare random number - set_fact: - rpfx: "{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - run_once: yes - -- name: Create storage account - azure_rm_storageaccount: - resource_group: "{{ resource_group }}" - name: "storage{{ rpfx }}" - account_type: Standard_LRS - location: eastus2 - -- name: Sample for Azure REST API - StorageAccounts_ListKeys - azure_rm_resource: - api_version: '2018-07-01' - method: POST - resource_group: "{{ resource_group }}" - provider: storage - resource_type: storageaccounts - resource_name: "storage{{ rpfx }}" - subresource: - - type: listkeys - register: storage_output - -- debug: - var: storage_output - -- name: Create instance of Cluster -- check mode - azure_rm_hdinsightcluster: - resource_group: "{{ resource_group }}" - name: "cluster{{ rpfx }}" - location: eastus2 - cluster_version: 3.6 - os_type: linux - tier: standard - cluster_definition: - kind: spark - gateway_rest_username: http-user - gateway_rest_password: MuABCPassword!!@123 - storage_accounts: - - name: storage{{ rpfx }}.blob.core.windows.net - is_default: yes - container: "cluster{{ rpfx }}" - key: "{{ storage_output['response']['keys'][0]['value'] }}" - compute_profile_roles: - - name: headnode - target_instance_count: 1 - vm_size: Standard_D3 - linux_profile: - username: sshuser - password: MuABCPassword!!@123 - - name: workernode - target_instance_count: 1 - vm_size: Standard_D3 - linux_profile: - username: sshuser - password: MuABCPassword!!@123 - - name: zookeepernode - target_instance_count: 3 - vm_size: Medium - linux_profile: - username: sshuser - password: MuABCPassword!!@123 - check_mode: yes - register: output -- name: Assert the resource instance is well created - assert: - that: - - output.changed - -- name: Create instance of Cluster - azure_rm_hdinsightcluster: - resource_group: "{{ resource_group }}" - name: "cluster{{ rpfx }}" - location: eastus2 - cluster_version: 3.6 - os_type: linux - tier: standard - cluster_definition: - kind: spark - gateway_rest_username: http-user - gateway_rest_password: MuABCPassword!!@123 - storage_accounts: - - name: storage{{ rpfx }}.blob.core.windows.net - is_default: yes - container: "cluster{{ rpfx }}" - key: "{{ storage_output['response']['keys'][0]['value'] }}" - compute_profile_roles: - - name: headnode - target_instance_count: 1 - vm_size: Standard_D3 - linux_profile: - username: sshuser - password: MuABCPassword!!@123 - - name: workernode - target_instance_count: 1 - vm_size: Standard_D3 - linux_profile: - username: sshuser - password: MuABCPassword!!@123 - - name: zookeepernode - target_instance_count: 3 - vm_size: Medium - linux_profile: - username: sshuser - password: MuABCPassword!!@123 - register: output - -- name: Assert the resource instance is well created - assert: - that: - - output.changed - -- name: Create again instance of Cluster -- idempotent - azure_rm_hdinsightcluster: - resource_group: "{{ resource_group }}" - name: "cluster{{ rpfx }}" - location: eastus2 - cluster_version: 3.6 - os_type: linux - tier: standard - cluster_definition: - kind: spark - gateway_rest_username: http-user - gateway_rest_password: MuABCPassword!!@123 - storage_accounts: - - name: storage{{ rpfx }}.blob.core.windows.net - is_default: yes - container: "cluster{{ rpfx }}" - key: "{{ storage_output['response']['keys'][0]['value'] }}" - compute_profile_roles: - - name: headnode - target_instance_count: 1 - vm_size: Standard_D3 - linux_profile: - username: sshuser - password: MuABCPassword!!@123 - - name: workernode - target_instance_count: 1 - vm_size: Standard_D3 - linux_profile: - username: sshuser - password: MuABCPassword!!@123 - - name: zookeepernode - target_instance_count: 3 - vm_size: Medium - linux_profile: - username: sshuser - password: MuABCPassword!!@123 - register: output -- name: Assert the state has not changed - assert: - that: - - output.changed == false - -- name: Create again instance of Cluster -- resize and add tags - azure_rm_hdinsightcluster: - resource_group: "{{ resource_group }}" - name: "cluster{{ rpfx }}" - location: eastus2 - cluster_version: 3.6 - os_type: linux - tier: standard - cluster_definition: - kind: spark - gateway_rest_username: http-user - gateway_rest_password: MuABCPassword!!@123 - storage_accounts: - - name: storage{{ rpfx }}.blob.core.windows.net - is_default: yes - container: "cluster{{ rpfx }}" - key: "{{ storage_output['response']['keys'][0]['value'] }}" - compute_profile_roles: - - name: headnode - target_instance_count: 1 - vm_size: Standard_D3 - linux_profile: - username: sshuser - password: MuABCPassword!!@123 - - name: workernode - target_instance_count: 2 - vm_size: Standard_D3 - linux_profile: - username: sshuser - password: MuABCPassword!!@123 - - name: zookeepernode - target_instance_count: 3 - vm_size: Medium - linux_profile: - username: sshuser - password: MuABCPassword!!@123 - tags: - aaa: bbb - register: output -- debug: - var: output -- name: Assert the state has changed - assert: - that: - - output.changed - -- name: Get facts of Cluster - azure_rm_hdinsightcluster_info: - resource_group: "{{ resource_group }}" - name: "cluster{{ rpfx }}" - register: output - -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.clusters[0]['id'] != None - - output.clusters[0]['resource_group'] != None - - output.clusters[0]['name'] != None - - output.clusters[0]['location'] != None - - output.clusters[0]['cluster_version'] != None - - output.clusters[0]['os_type'] != None - - output.clusters[0]['tier'] != None - - output.clusters[0]['cluster_definition'] != None - - output.clusters[0]['compute_profile_roles'] != None - - output.clusters[0]['connectivity_endpoints'] != None - -- name: Delete instance of Cluster -- check mode - azure_rm_hdinsightcluster: - resource_group: "{{ resource_group }}" - name: "cluster{{ rpfx }}" - state: absent - check_mode: yes - register: output -- name: Assert the state has changed - assert: - that: - - output.changed - -- name: Delete instance of Cluster - azure_rm_hdinsightcluster: - resource_group: "{{ resource_group }}" - name: "cluster{{ rpfx }}" - state: absent - register: output -- name: Assert the state has changed - assert: - that: - - output.changed diff --git a/test/integration/targets/azure_rm_image/aliases b/test/integration/targets/azure_rm_image/aliases deleted file mode 100644 index 2d7dea2cef..0000000000 --- a/test/integration/targets/azure_rm_image/aliases +++ /dev/null @@ -1,4 +0,0 @@ -cloud/azure -shippable/azure/group3 -destructive -azure_rm_image_info diff --git a/test/integration/targets/azure_rm_image/meta/main.yml b/test/integration/targets/azure_rm_image/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_image/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_image/tasks/main.yml b/test/integration/targets/azure_rm_image/tasks/main.yml deleted file mode 100644 index 9b68a92e7a..0000000000 --- a/test/integration/targets/azure_rm_image/tasks/main.yml +++ /dev/null @@ -1,171 +0,0 @@ -- name: Create storage account name - set_fact: - vm_name: "vm{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}x" - public_ip_name: "pip{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - security_group_name: "sg{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - empty_disk_name: "emptydisk{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - -- name: Create virtual network - azure_rm_virtualnetwork: - resource_group: "{{ resource_group }}" - name: "{{ vm_name }}" - address_prefixes: "10.10.0.0/16" - -- name: Add subnet - azure_rm_subnet: - resource_group: "{{ resource_group }}" - name: "{{ vm_name }}" - address_prefix: "10.10.0.0/24" - virtual_network: "{{ vm_name }}" - -- name: Create public ip - azure_rm_publicipaddress: - resource_group: "{{ resource_group }}" - allocation_method: Static - name: "{{ public_ip_name }}" - -- name: Create security group - azure_rm_securitygroup: - resource_group: "{{ resource_group }}" - name: "{{ security_group_name }}" - -- name: Create NIC - azure_rm_networkinterface: - resource_group: "{{ resource_group }}" - name: "{{ vm_name }}" - virtual_network: "{{ vm_name }}" - subnet: "{{ vm_name }}" - public_ip_name: "{{ public_ip_name }}" - security_group: "{{ security_group_name }}" - -- name: Create virtual machine - azure_rm_virtualmachine: - resource_group: "{{ resource_group }}" - name: "{{ vm_name }}" - vm_size: Standard_A0 - managed_disk_type: Standard_LRS - admin_username: adminuser - admin_password: Password123! - os_type: Linux - network_interfaces: "{{ vm_name }}" - image: - offer: UbuntuServer - publisher: Canonical - sku: 16.04-LTS - version: latest - register: vm - -- name: Create new empty managed disk - azure_rm_manageddisk: - resource_group: "{{ resource_group }}" - name: "{{ empty_disk_name }}" - storage_account_type: "Standard_LRS" - disk_size_gb: 1 - register: emptydisk - -- name: Create an image from VM (check mode) - azure_rm_image: - resource_group: "{{ resource_group }}" - source: "{{ vm.ansible_facts.azure_vm.properties.storageProfile.osDisk.managedDisk.id }}" - name: testimage001 - os_type: Linux - data_disk_sources: - - "{{ empty_disk_name }}" - check_mode: yes - register: output - -- assert: - that: output.changed - -- name: Create an image from VM - azure_rm_image: - resource_group: "{{ resource_group }}" - source: - name: "{{ vm_name }}" - type: disks - name: testimage001 - os_type: Linux - register: output - -- assert: - that: - - output.changed - - output.id - -- name: Create an image from VM (idempotent) - azure_rm_image: - resource_group: "{{ resource_group }}" - source: "{{ vm.ansible_facts.azure_vm.properties.storageProfile.osDisk.managedDisk.id }}" - name: testimage001 - os_type: Linux - register: output - -- assert: - that: - - not output.changed - - output.id - -- name: Gather information about image created - azure_rm_image_info: - resource_group: "{{ resource_group }}" - name: testimage001 - register: output - -- assert: - that: - - output.images != [] - -- name: Delete image (check mode) - azure_rm_image: - resource_group: "{{ resource_group }}" - name: testimage001 - state: absent - register: output - check_mode: yes - -- assert: - that: - - output.changed - -- name: Delete image - azure_rm_image: - resource_group: "{{ resource_group }}" - name: testimage001 - state: absent - register: output - -- assert: - that: - - output.changed - -- name: Delete image (idempotent) - azure_rm_image: - resource_group: "{{ resource_group }}" - name: testimage001 - state: absent - register: output - -- assert: - that: - - not output.changed - -- name: Delete empty disk - azure_rm_manageddisk: - resource_group: "{{ resource_group }}" - name: "{{ empty_disk_name }}" - state: absent - -- name: Delete VM - azure_rm_virtualmachine: - resource_group: "{{ resource_group }}" - name: "{{ vm_name }}" - state: absent - vm_size: Standard_A0 - register: output - -- name: Delete public ip - azure_rm_publicipaddress: - resource_group: "{{ resource_group }}" - allocation_method: Static - name: "{{ public_ip_name }}" - state: absent diff --git a/test/integration/targets/azure_rm_iothub/aliases b/test/integration/targets/azure_rm_iothub/aliases deleted file mode 100644 index b105765482..0000000000 --- a/test/integration/targets/azure_rm_iothub/aliases +++ /dev/null @@ -1,4 +0,0 @@ -cloud/azure -shippable/azure/group2 -disabled # See: https://github.com/ansible/ansible/issues/61852 -destructive diff --git a/test/integration/targets/azure_rm_iothub/meta/main.yml b/test/integration/targets/azure_rm_iothub/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_iothub/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_iothub/tasks/main.yml b/test/integration/targets/azure_rm_iothub/tasks/main.yml deleted file mode 100644 index 6055ea1f85..0000000000 --- a/test/integration/targets/azure_rm_iothub/tasks/main.yml +++ /dev/null @@ -1,172 +0,0 @@ -- set_fact: - rpfx: "{{ resource_group | hash('md5') | truncate(8, True, '') }}" - -- name: Create IoT Hub (check mode) - azure_rm_iothub: - name: "hub{{ rpfx }}" - resource_group: "{{ resource_group }}" - ip_filters: - - name: filter1 - action: reject - ip_mask: 40.60.80.10 - check_mode: yes - register: iothub - -- assert: - that: - - iothub.changed - -- name: Query IoT Hub - azure_rm_iothub_info: - name: "hub{{ rpfx }}" - resource_group: "{{ resource_group }}" - register: iothub - ignore_errors: yes - -- name: Create IoT Hub - azure_rm_iothub: - name: "hub{{ rpfx }}" - resource_group: "{{ resource_group }}" - ip_filters: - - name: filter1 - action: reject - ip_mask: 40.60.80.10 - register: iothub - -- assert: - that: - - iothub.changed - -- name: Create IoT Hub (idempontent) - azure_rm_iothub: - name: "hub{{ rpfx }}" - resource_group: "{{ resource_group }}" - ip_filters: - - name: filter1 - action: reject - ip_mask: 40.60.80.10 - register: iothub - -- assert: - that: - - not iothub.changed - -- name: Query IoT Hub - azure_rm_iothub_info: - name: "hub{{ rpfx }}" - resource_group: "{{ resource_group }}" - list_keys: yes - register: iothub - -- assert: - that: - - iothub.iothubs | length == 1 - -- set_fact: - registry_write_name: "{{ item.key_name }}" - registry_write_key: "{{ item.primary_key }}" - with_items: "{{ iothub.iothubs[0]['keys'] }}" - when: item.rights == 'RegistryWrite, ServiceConnect, DeviceConnect' - -- name: Create devices - azure_rm_iotdevice: - hub: "hub{{ rpfx }}" - hub_policy_name: "{{ registry_write_name }}" - hub_policy_key: "{{ registry_write_key }}" - name: "mydevice{{ item }}" - twin_tags: - location: - country: US - city: Redmond - sensor: humidity - with_items: - - 1 - - 2 - -- name: Query devices - azure_rm_iotdevice_info: - hub: "hub{{ rpfx }}" - hub_policy_name: "{{ registry_write_name }}" - hub_policy_key: "{{ registry_write_key }}" - register: devices - -- assert: - that: - - devices.iot_devices | length == 2 - -- name: Query devices - azure_rm_iotdevice_info: - hub: "hub{{ rpfx }}" - name: "mydevice1" - hub_policy_name: "{{ registry_write_name }}" - hub_policy_key: "{{ registry_write_key }}" - register: devices - -- assert: - that: - - devices.iot_devices | length == 1 - - devices.iot_devices[0].deviceId == 'mydevice1' - -- name: Query devices twin - azure_rm_iotdevice_info: - hub: "hub{{ rpfx }}" - query: "SELECT * FROM devices WHERE tags.location.country = 'US'" - hub_policy_name: "{{ registry_write_name }}" - hub_policy_key: "{{ registry_write_key }}" - register: devices - -- assert: - that: - - devices.iot_devices | length == 2 - -- name: Update devices - azure_rm_iotdevice: - hub: "hub{{ rpfx }}" - hub_policy_name: "{{ registry_write_name }}" - hub_policy_key: "{{ registry_write_key }}" - name: "mydevice{{ item }}" - edge_enabled: yes - twin_tags: - location: - country: China - city: Shanghai - sensor: humidity - with_items: - - 1 - - 3 - -- name: Query devices twin - azure_rm_iotdevice_info: - hub: "hub{{ rpfx }}" - query: "SELECT * FROM devices WHERE tags.location.country = 'US'" - hub_policy_name: "{{ registry_write_name }}" - hub_policy_key: "{{ registry_write_key }}" - register: devices - -- assert: - that: - - devices.iot_devices | length == 1 - - devices.iot_devices[0].deviceId == 'mydevice2' - -- name: Delete IoT Hub (check mode) - azure_rm_iothub: - name: "hub{{ rpfx }}" - resource_group: "{{ resource_group }}" - state: absent - check_mode: yes - register: iothub - -- assert: - that: - - iothub.changed - -- name: Delete IoT Hub - azure_rm_iothub: - name: "hub{{ rpfx }}" - resource_group: "{{ resource_group }}" - state: absent - register: iothub - -- assert: - that: - - iothub.changed diff --git a/test/integration/targets/azure_rm_keyvault/aliases b/test/integration/targets/azure_rm_keyvault/aliases deleted file mode 100644 index c256751e55..0000000000 --- a/test/integration/targets/azure_rm_keyvault/aliases +++ /dev/null @@ -1,5 +0,0 @@ -cloud/azure -destructive -shippable/azure/group9 -azure_rm_keyvaultkey -azure_rm_keyvaultsecret diff --git a/test/integration/targets/azure_rm_keyvault/lookup_plugins/azure_service_principal_attribute.py b/test/integration/targets/azure_rm_keyvault/lookup_plugins/azure_service_principal_attribute.py deleted file mode 100644 index 1b7d0318f0..0000000000 --- a/test/integration/targets/azure_rm_keyvault/lookup_plugins/azure_service_principal_attribute.py +++ /dev/null @@ -1,94 +0,0 @@ -# (c) 2018 Yunge Zhu, <yungez@microsoft.com> -# (c) 2017 Ansible Project -# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt) -from __future__ import (absolute_import, division, print_function) -__metaclass__ = type - -DOCUMENTATION = """ -lookup: azure_service_principal_attribute - -requirements: - - azure-graphrbac - -author: - - Yunge Zhu <yungez@microsoft.com> - -version_added: "2.7" - -short_description: Look up Azure service principal attributes. - -description: - - Describes object id of your Azure service principal account. -options: - azure_client_id: - description: azure service principal client id. - azure_secret: - description: azure service principal secret - azure_tenant: - description: azure tenant - azure_cloud_environment: - description: azure cloud environment -""" - -EXAMPLES = """ -set_fact: - object_id: "{{ lookup('azure_service_principal_attribute', - azure_client_id=azure_client_id, - azure_secret=azure_secret, - azure_tenant=azure_secret) }}" -""" - -RETURN = """ -_raw: - description: - Returns object id of service principal. -""" - -from ansible.errors import AnsibleError -from ansible.plugins import AnsiblePlugin -from ansible.plugins.lookup import LookupBase -from ansible.module_utils._text import to_native - -try: - from azure.common.credentials import ServicePrincipalCredentials - from azure.graphrbac import GraphRbacManagementClient - from msrestazure import azure_cloud - from msrestazure.azure_exceptions import CloudError -except ImportError: - raise AnsibleError( - "The lookup azure_service_principal_attribute requires azure.graphrbac, msrest") - - -class LookupModule(LookupBase): - def run(self, terms, variables, **kwargs): - - self.set_options(direct=kwargs) - - credentials = {} - credentials['azure_client_id'] = self.get_option('azure_client_id', None) - credentials['azure_secret'] = self.get_option('azure_secret', None) - credentials['azure_tenant'] = self.get_option('azure_tenant', 'common') - - if credentials['azure_client_id'] is None or credentials['azure_secret'] is None: - raise AnsibleError("Must specify azure_client_id and azure_secret") - - _cloud_environment = azure_cloud.AZURE_PUBLIC_CLOUD - if self.get_option('azure_cloud_environment', None) is not None: - cloud_environment = azure_cloud.get_cloud_from_metadata_endpoint(credentials['azure_cloud_environment']) - - try: - azure_credentials = ServicePrincipalCredentials(client_id=credentials['azure_client_id'], - secret=credentials['azure_secret'], - tenant=credentials['azure_tenant'], - resource=_cloud_environment.endpoints.active_directory_graph_resource_id) - - client = GraphRbacManagementClient(azure_credentials, credentials['azure_tenant'], - base_url=_cloud_environment.endpoints.active_directory_graph_resource_id) - - response = list(client.service_principals.list(filter="appId eq '{0}'".format(credentials['azure_client_id']))) - sp = response[0] - - return sp.object_id.split(',') - except CloudError as ex: - raise AnsibleError("Failed to get service principal object id: %s" % to_native(ex)) - return False diff --git a/test/integration/targets/azure_rm_keyvault/meta/main.yml b/test/integration/targets/azure_rm_keyvault/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_keyvault/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_keyvault/tasks/main.yml b/test/integration/targets/azure_rm_keyvault/tasks/main.yml deleted file mode 100644 index 88b2cf08cc..0000000000 --- a/test/integration/targets/azure_rm_keyvault/tasks/main.yml +++ /dev/null @@ -1,270 +0,0 @@ -- name: Prepare random number - set_fact: - rpfx: "{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - tenant_id: "{{ azure_tenant }}" - run_once: yes - -- name: lookup service principal object id - set_fact: - object_id: "{{ lookup('azure_service_principal_attribute', - azure_client_id=azure_client_id, - azure_secret=azure_secret, - azure_tenant=tenant_id) }}" - register: object_id - -- name: Create instance of Key Vault -- check mode - azure_rm_keyvault: - resource_group: "{{ resource_group }}" - vault_name: "vault{{ rpfx }}" - enabled_for_deployment: yes - vault_tenant: "{{ tenant_id }}" - sku: - name: standard - family: A - access_policies: - - tenant_id: "{{ tenant_id }}" - object_id: "{{ object_id }}" - keys: - - get - - list - - update - - create - - import - - delete - - recover - - backup - - restore - secrets: - - get - - list - - set - - delete - - recover - - backup - - restore - check_mode: yes - register: output -- name: Assert the resource instance is well created - assert: - that: - - output.changed - -- name: Create instance of Key Vault - azure_rm_keyvault: - resource_group: "{{ resource_group }}" - vault_name: "vault{{ rpfx }}" - enabled_for_deployment: yes - vault_tenant: "{{ tenant_id }}" - sku: - name: standard - family: A - access_policies: - - tenant_id: "{{ tenant_id }}" - object_id: "{{ object_id }}" - secrets: - - get - - list - - set - - delete - - recover - - backup - - restore - register: output -- name: Assert the resource instance is well created - assert: - that: - - output.changed - -- name: Create instance of Key Vault again - azure_rm_keyvault: - resource_group: "{{ resource_group }}" - vault_name: "vault{{ rpfx }}" - enabled_for_deployment: yes - vault_tenant: "{{ tenant_id }}" - sku: - name: standard - family: A - access_policies: - - tenant_id: "{{ tenant_id }}" - object_id: "{{ object_id }}" - secrets: - - get - - list - - set - - delete - - recover - - backup - - restore - register: output -- name: Assert the state has not changed - assert: - that: - - output.changed == false - -- name: Update existing Key Vault (add a rule and tags) - azure_rm_keyvault: - resource_group: "{{ resource_group }}" - vault_name: "vault{{ rpfx }}" - enabled_for_deployment: yes - vault_tenant: "{{ tenant_id }}" - sku: - name: standard - family: A - access_policies: - - tenant_id: "{{ tenant_id }}" - object_id: "{{ object_id }}" - keys: - - get - - list - - update - - create - - import - - delete - - recover - - backup - - restore - secrets: - - get - - list - - set - - delete - - recover - - backup - - restore - tags: - aaa: bbb - register: output -- name: Assert the state has changed - assert: - that: - - output.changed == true - -- name: Get key vault facts - azure_rm_keyvault_info: - resource_group: "{{ resource_group }}" - name: "vault{{ rpfx }}" - register: facts - -- name: Assert the facts are properly set - assert: - that: - - facts['keyvaults'] | length == 1 - - facts['keyvaults'][0]['vault_uri'] != None - - facts['keyvaults'][0]['name'] != None - - facts['keyvaults'][0]['access_policies'] != None - - facts['keyvaults'][0]['sku'] != None - - facts['keyvaults'][0]['id'] != None -# -# azure_rm_keyvaultkey tests -# - -- name: create a keyvault key - block: - - azure_rm_keyvaultkey: - keyvault_uri: https://vault{{ rpfx }}.vault.azure.net - key_name: testkey - tags: - testing: test - delete: on-exit - register: output - - assert: - that: output.changed - rescue: - - azure_rm_keyvaultkey: - keyvault_uri: https://vault{{ rpfx }}.vault.azure.net - state: absent - key_name: testkey - -- name: Get key current version - azure_rm_keyvaultkey_info: - vault_uri: https://vault{{ rpfx }}.vault.azure.net - name: testkey - register: facts - -- name: Assert key facts - assert: - that: - - facts['keys'] | length == 1 - - facts['keys'][0]['kid'] - - facts['keys'][0]['permitted_operations'] | length > 0 - - facts['keys'][0]['type'] - - facts['keys'][0]['version'] - -- name: delete a kevyault key - azure_rm_keyvaultkey: - keyvault_uri: https://vault{{ rpfx }}.vault.azure.net - state: absent - key_name: testkey - register: output - -- assert: - that: output.changed - -# -# azure_rm_keyvaultsecret tests -# -- name: create a keyvault secret - block: - - azure_rm_keyvaultsecret: - keyvault_uri: https://vault{{ rpfx }}.vault.azure.net - secret_name: testsecret - secret_value: 'mysecret' - tags: - testing: test - delete: on-exit - register: output - - assert: - that: output.changed - rescue: - - azure_rm_keyvaultsecret: - keyvault_uri: https://vault{{ rpfx }}.vault.azure.net - state: absent - secret_name: testsecret - -- name: delete a keyvault secret - azure_rm_keyvaultsecret: - keyvault_uri: https://vault{{ rpfx }}.vault.azure.net - state: absent - secret_name: testsecret - register: output - -- assert: - that: output.changed - -# -# azure_rm_keyvault finalize & clean up -# - -- name: Delete instance of Key Vault -- check mode - azure_rm_keyvault: - resource_group: "{{ resource_group }}" - vault_name: "vault{{ rpfx }}" - state: absent - check_mode: yes - register: output -- name: Assert the state has changed - assert: - that: - - output.changed - -- name: Delete instance of Key Vault - azure_rm_keyvault: - resource_group: "{{ resource_group }}" - vault_name: "vault{{ rpfx }}" - state: absent - register: output -- name: Assert the state has changed - assert: - that: - - output.changed - -- name: Delete unexisting instance of Key Vault - azure_rm_keyvault: - resource_group: "{{ resource_group }}" - vault_name: "vault{{ rpfx }}" - state: absent - register: output -- name: Assert the state has changed - assert: - that: - - output.changed == false diff --git a/test/integration/targets/azure_rm_loadbalancer/aliases b/test/integration/targets/azure_rm_loadbalancer/aliases deleted file mode 100644 index fadef3afa8..0000000000 --- a/test/integration/targets/azure_rm_loadbalancer/aliases +++ /dev/null @@ -1,3 +0,0 @@ -cloud/azure -shippable/azure/group5 -destructive diff --git a/test/integration/targets/azure_rm_loadbalancer/meta/main.yml b/test/integration/targets/azure_rm_loadbalancer/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_loadbalancer/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_loadbalancer/tasks/main.yml b/test/integration/targets/azure_rm_loadbalancer/tasks/main.yml deleted file mode 100644 index 3dad1a2e17..0000000000 --- a/test/integration/targets/azure_rm_loadbalancer/tasks/main.yml +++ /dev/null @@ -1,298 +0,0 @@ -- name: Prepare random number - set_fact: - pipaname: "pipa{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - pipbname: "pipb{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - lbvnname: "lbvn{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - lbname_a: "lba{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - lbname_b: "lbb{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - lbname_c1: "lbc1-{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - lbname_c2: "lbc2-{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - lbname_d: "lbd{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - run_once: yes - -- name: create public ip - azure_rm_publicipaddress: - name: "{{ pipbname }}" - sku: Standard - allocation_method: Static - resource_group: '{{ resource_group }}' - -- name: create public ip - azure_rm_publicipaddress: - name: "{{ pipaname }}" - resource_group: '{{ resource_group }}' - -- name: clear load balancer - azure_rm_loadbalancer: - resource_group: '{{ resource_group }}' - name: "{{ lbname_a }}" - state: absent - -- name: create load balancer - azure_rm_loadbalancer: - resource_group: '{{ resource_group }}' - name: "{{ lbname_a }}" - public_ip: "{{ pipaname }}" - register: output - -- name: assert load balancer created - assert: - that: output.changed - -- name: delete load balancer - azure_rm_loadbalancer: - resource_group: '{{ resource_group }}' - name: "{{ lbname_a }}" - state: absent - register: output - -- name: assert load balancer deleted - assert: - that: output.changed - -- name: delete load balancer (idempotent) - azure_rm_loadbalancer: - resource_group: '{{ resource_group }}' - name: "{{ lbname_a }}" - state: absent - register: output - -- name: assert load balancer deleted (idempotent) - assert: - that: not output.changed - -- name: create another load balancer with more options - azure_rm_loadbalancer: - resource_group: '{{ resource_group }}' - name: "{{ lbname_b }}" - sku: Standard - public_ip_address: "{{ pipbname }}" - probe_protocol: Tcp - probe_port: 80 - probe_interval: 10 - probe_fail_count: 3 - protocol: Tcp - load_distribution: Default - frontend_port: 80 - backend_port: 8080 - idle_timeout: 4 - natpool_frontend_port_start: 30 - natpool_frontend_port_end: 40 - natpool_backend_port: 80 - natpool_protocol: Tcp - register: output - -- name: assert complex load balancer created - assert: - that: - - output.changed - - output.state.sku.name == 'Standard' - -- name: create load balancer again to check idempotency - azure_rm_loadbalancer: - resource_group: '{{ resource_group }}' - name: "{{ lbname_b }}" - sku: Standard - public_ip_address: "{{ pipbname }}" - probe_protocol: Tcp - probe_port: 80 - probe_interval: 10 - probe_fail_count: 3 - protocol: Tcp - load_distribution: Default - frontend_port: 80 - backend_port: 8080 - idle_timeout: 4 - natpool_frontend_port_start: 30 - natpool_frontend_port_end: 40 - natpool_backend_port: 80 - natpool_protocol: Tcp - register: output - -- name: assert that output has not changed - assert: - that: - - not output.changed - -- name: create load balancer again to check idempotency - change something - azure_rm_loadbalancer: - resource_group: '{{ resource_group }}' - name: "{{ lbname_b }}" - sku: Standard - public_ip_address: "{{ pipbname }}" - probe_protocol: Tcp - probe_port: 80 - probe_interval: 10 - probe_fail_count: 3 - protocol: Tcp - load_distribution: Default - frontend_port: 81 - backend_port: 8080 - idle_timeout: 4 - natpool_frontend_port_start: 30 - natpool_frontend_port_end: 40 - natpool_backend_port: 80 - natpool_protocol: Tcp - register: output - -- name: assert that output has changed - assert: - that: - - output.changed - -- name: delete load balancer - azure_rm_loadbalancer: - resource_group: '{{ resource_group }}' - name: "{{ lbname_b }}" - state: absent - -- name: create load balancer with multiple parameters - azure_rm_loadbalancer: - resource_group: '{{ resource_group }}' - name: "{{ lbname_c1 }}" - frontend_ip_configurations: - - name: frontendipconf0 - public_ip_address: "{{ pipaname }}" - backend_address_pools: - - name: backendaddrpool0 - probes: - - name: prob0 - port: 80 - inbound_nat_pools: - - name: inboundnatpool0 - frontend_ip_configuration_name: frontendipconf0 - protocol: Tcp - frontend_port_range_start: 80 - frontend_port_range_end: 81 - backend_port: 8080 - load_balancing_rules: - - name: lbrbalancingrule0 - frontend_ip_configuration: frontendipconf0 - backend_address_pool: backendaddrpool0 - frontend_port: 80 - backend_port: 80 - probe: prob0 - register: output - -- name: assert complex load balancer created - assert: - that: output.changed - -- name: delete load balancer - azure_rm_loadbalancer: - resource_group: '{{ resource_group }}' - name: "{{ lbname_c1 }}" - state: absent - -- name: create load balancer with multiple parameters - azure_rm_loadbalancer: - resource_group: '{{ resource_group }}' - name: "{{ lbname_c2 }}" - frontend_ip_configurations: - - name: frontendipconf0 - public_ip_address: "{{ pipaname }}" - backend_address_pools: - - name: backendaddrpool0 - probes: - - name: prob0 - port: 80 - load_balancing_rules: - - name: lbrbalancingrule0 - frontend_ip_configuration: frontendipconf0 - backend_address_pool: backendaddrpool0 - frontend_port: 80 - backend_port: 80 - probe: prob0 - inbound_nat_rules: - - name: inboundnatrule0 - backend_port: 8080 - protocol: Tcp - frontend_port: 8080 - frontend_ip_configuration: frontendipconf0 - register: output - -- name: assert complex load balancer created - assert: - that: output.changed - -- name: delete load balancer - azure_rm_loadbalancer: - resource_group: '{{ resource_group }}' - name: "{{ lbname_c2 }}" - state: absent - -- name: Create virtual network - azure_rm_virtualnetwork: - resource_group: "{{ resource_group }}" - name: "{{ lbvnname }}" - address_prefixes: "10.10.0.0/16" - -- name: Add subnet - azure_rm_subnet: - resource_group: "{{ resource_group }}" - name: "lb{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}sb" - address_prefix: "10.10.0.0/24" - virtual_network: "{{ lbvnname }}" - register: subnet - -- name: create internal loadbalancer - azure_rm_loadbalancer: - resource_group: '{{ resource_group }}' - name: "{{ lbname_d }}" - frontend_ip_configurations: - - name: frontendipconf0 - private_ip_address: 10.10.0.10 - private_ip_allocation_method: Static - subnet: "{{ subnet.state.id }}" - backend_address_pools: - - name: backendaddrpool0 - probes: - - name: prob0 - port: 80 - inbound_nat_pools: - - name: inboundnatpool0 - frontend_ip_configuration_name: frontendipconf0 - protocol: Tcp - frontend_port_range_start: 80 - frontend_port_range_end: 81 - backend_port: 8080 - load_balancing_rules: - - name: lbrbalancingrule0 - frontend_ip_configuration: frontendipconf0 - backend_address_pool: backendaddrpool0 - frontend_port: 80 - backend_port: 80 - probe: prob0 - register: output - -- name: assert complex load balancer created - assert: - that: output.changed - -- name: delete load balancer - azure_rm_loadbalancer: - resource_group: '{{ resource_group }}' - name: "{{ lbname_d }}" - state: absent - -- name: cleanup public ip - azure_rm_publicipaddress: - name: "{{ item }}" - resource_group: '{{ resource_group }}' - state: absent - with_items: - - "{{ pipaname }}" - - "{{ pipbname }}" - -- name: cleanup subnet - azure_rm_subnet: - resource_group: "{{ resource_group }}" - name: "lb{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}sb" - virtual_network: "{{ lbvnname }}" - state: absent - -- name: cleanup virtual network - azure_rm_virtualnetwork: - resource_group: "{{ resource_group }}" - name: "{{ lbvnname }}" - state: absent diff --git a/test/integration/targets/azure_rm_lock/aliases b/test/integration/targets/azure_rm_lock/aliases deleted file mode 100644 index 68bf9ddab0..0000000000 --- a/test/integration/targets/azure_rm_lock/aliases +++ /dev/null @@ -1,4 +0,0 @@ -cloud/azure -destructive -unsupported -azure_rm_lock_info diff --git a/test/integration/targets/azure_rm_lock/meta/main.yml b/test/integration/targets/azure_rm_lock/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_lock/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_lock/tasks/main.yml b/test/integration/targets/azure_rm_lock/tasks/main.yml deleted file mode 100644 index 371e24c2f8..0000000000 --- a/test/integration/targets/azure_rm_lock/tasks/main.yml +++ /dev/null @@ -1,99 +0,0 @@ -- name: Create a virtual network - azure_rm_virtualnetwork: - name: mytestvirtualnetworklock - resource_group: "{{ resource_group }}" - address_prefixes_cidr: - - "10.1.0.0/16" - register: vn - -- name: Add lock to resource (check_mode) - azure_rm_lock: - name: keep - managed_resource_id: "{{ vn.state.id }}" - level: read_only - register: lock - check_mode: yes - -- assert: - that: - - lock.changed - -- name: Query lock - azure_rm_lock_info: - managed_resource_id: "{{ vn.state.id }}" - register: locks - -- assert: - that: - - locks.locks | length == 0 - -- name: Add lock to resource - azure_rm_lock: - name: keep - managed_resource_id: "{{ vn.state.id }}" - level: read_only - register: lock - -- assert: - that: - - lock.changed - - lock.id - -- name: Query lock - azure_rm_lock_info: - name: keep - managed_resource_id: "{{ vn.state.id }}" - register: locks - -- assert: - that: - - locks.locks | length == 1 - -- name: Update lock to resource (idempontent) - azure_rm_lock: - name: keep - managed_resource_id: "{{ vn.state.id }}" - level: read_only - register: lock1 - -- assert: - that: - - not lock1.changed - - lock1.id == lock.id - -- name: Update lock level - azure_rm_lock: - name: keep - managed_resource_id: "{{ vn.state.id }}" - level: can_not_delete - register: lock - -- assert: - that: - - lock.changed - - lock.level == 'can_not_delete' - -- name: Delete lock - azure_rm_lock: - name: keep - managed_resource_id: "{{ vn.state.id }}" - register: lock - -- assert: - that: - - lock.changed - -- name: Query lock - azure_rm_lock_info: - managed_resource_id: "{{ vn.state.id }}" - register: locks - -- assert: - that: - - locks.locks | length == 0 - -- name: Clean up - azure_rm_virtualnetwork: - name: mytestvirtualnetworklock - resource_group: "{{ resource_group }}" - state: absent
\ No newline at end of file diff --git a/test/integration/targets/azure_rm_loganalyticsworkspace/aliases b/test/integration/targets/azure_rm_loganalyticsworkspace/aliases deleted file mode 100644 index 74e589c56e..0000000000 --- a/test/integration/targets/azure_rm_loganalyticsworkspace/aliases +++ /dev/null @@ -1,4 +0,0 @@ -cloud/azure -shippable/azure/group4 -destructive -azure_rm_loganalyticsworkspace_info diff --git a/test/integration/targets/azure_rm_loganalyticsworkspace/meta/main.yml b/test/integration/targets/azure_rm_loganalyticsworkspace/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_loganalyticsworkspace/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_loganalyticsworkspace/tasks/main.yml b/test/integration/targets/azure_rm_loganalyticsworkspace/tasks/main.yml deleted file mode 100644 index 7f9a05f79d..0000000000 --- a/test/integration/targets/azure_rm_loganalyticsworkspace/tasks/main.yml +++ /dev/null @@ -1,128 +0,0 @@ -- name: Prepare random number - set_fact: - name: "workspace{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - -- name: Create workspace (check mode) - azure_rm_loganalyticsworkspace: - name: "{{ name }}" - resource_group: "{{ resource_group }}" - retention_in_days: 40 - check_mode: yes - register: output - -- assert: - that: - - output.changed - -- name: Get workspace - azure_rm_loganalyticsworkspace_info: - name: "{{ name }}" - resource_group: "{{ resource_group }}" - register: facts - -- assert: - that: - - facts.workspaces | length == 0 - -- name: Create workspace - azure_rm_loganalyticsworkspace: - name: "{{ name }}" - resource_group: "{{ resource_group }}" - retention_in_days: 40 - register: output - -- assert: - that: - - output.retention_in_days == 40 - - output.changed - - output.intelligence_packs - -- name: Create workspace (idempontent) - azure_rm_loganalyticsworkspace: - name: "{{ name }}" - resource_group: "{{ resource_group }}" - retention_in_days: 40 - register: output - -- assert: - that: - - not output.changed - -- name: Get workspace - azure_rm_loganalyticsworkspace_info: - name: "{{ name }}" - resource_group: "{{ resource_group }}" - register: facts - -- assert: - that: - - facts.workspaces | length == 1 - - facts.workspaces[0].id == output.id - -- set_fact: - pack: "{{ pack | default({}) | combine({output.intelligence_packs[0].name: not output.intelligence_packs[0].enabled}) }}" - -- name: Update intelligence pack - azure_rm_loganalyticsworkspace: - name: "{{ name }}" - resource_group: "{{ resource_group }}" - intelligence_packs: "{{ pack }}" - register: intelligence - -- assert: - that: - - intelligence.intelligence_packs[0].enabled != output.intelligence_packs[0].enabled - -- name: Remove workspace (check mode) - azure_rm_loganalyticsworkspace: - name: "{{ name }}" - resource_group: "{{ resource_group }}" - state: absent - check_mode: yes - register: output - -- assert: - that: - - output.changed - -- name: Get workspace - azure_rm_loganalyticsworkspace_info: - name: "{{ name }}" - resource_group: "{{ resource_group }}" - register: facts - -- assert: - that: - - facts.workspaces | length == 1 - -- name: Remove workspace - azure_rm_loganalyticsworkspace: - name: "{{ name }}" - resource_group: "{{ resource_group }}" - state: absent - register: output - -- assert: - that: - - output.changed - -- name: Get workspace - azure_rm_loganalyticsworkspace_info: - name: "{{ name }}" - resource_group: "{{ resource_group }}" - register: facts - -- assert: - that: - - facts.workspaces | length == 0 - -- name: Remove workspace (idempontent) - azure_rm_loganalyticsworkspace: - name: "{{ name }}" - resource_group: "{{ resource_group }}" - state: absent - register: output - -- assert: - that: - - not output.changed diff --git a/test/integration/targets/azure_rm_manageddisk/aliases b/test/integration/targets/azure_rm_manageddisk/aliases deleted file mode 100644 index bf20c612b5..0000000000 --- a/test/integration/targets/azure_rm_manageddisk/aliases +++ /dev/null @@ -1,4 +0,0 @@ -cloud/azure -shippable/azure/group4 -destructive -azure_rm_manageddisk_info diff --git a/test/integration/targets/azure_rm_manageddisk/meta/main.yml b/test/integration/targets/azure_rm_manageddisk/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_manageddisk/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_manageddisk/tasks/main.yml b/test/integration/targets/azure_rm_manageddisk/tasks/main.yml deleted file mode 100644 index 3abaaefb63..0000000000 --- a/test/integration/targets/azure_rm_manageddisk/tasks/main.yml +++ /dev/null @@ -1,204 +0,0 @@ - - name: Prepare random number - set_fact: - rpfx: "{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - parameter: {} - run_once: yes - - - name: Clearing (if) previous disks were created - azure_rm_manageddisk: - resource_group: "{{ resource_group }}" - name: "md{{ rpfx }}{{ item }}" - managed_by: '' - state: absent - with_items: - - 1 - - 2 - - 3 - - - name: Test invalid account name (should give error) - azure_rm_manageddisk: - resource_group: "{{ resource_group }}" - name: "invalid_char$" - disk_size_gb: 1 - register: output - ignore_errors: yes - check_mode: no - - - name: Assert task failed - assert: { that: "output['failed'] == True" } - - - name: Create managed disk (Check Mode) - azure_rm_manageddisk: - resource_group: "{{ resource_group }}" - name: "md{{ rpfx }}1" - storage_account_type: "Standard_LRS" - disk_size_gb: 1 - tags: - testing: testing - delete: never - register: output - check_mode: yes - - - name: Assert status succeeded (Check Mode) - assert: - that: - - output.changed - - output.state - - - name: Create new managed disk succesfully - azure_rm_manageddisk: - resource_group: "{{ resource_group }}" - name: "md{{ rpfx }}1" - storage_account_type: "Standard_LRS" - disk_size_gb: 1 - tags: - testing: testing - delete: never - register: output - - - name: Assert status succeeded and results include an Id value - assert: - that: - - output.changed - - output.state.disk_size_gb == 1 - - output.state.id is defined - - output.state.os_type == None - - output.state.storage_account_type == "Standard_LRS" - - - name: Copy disk to a new managed disk - azure_rm_manageddisk: - resource_group: "{{ resource_group }}" - name: "md{{ rpfx }}2" - create_option: "copy" - source_uri: "{{ output.state.id }}" - disk_size_gb: 1 - register: disk2 - - - name: Assert status succeeded and results include an Id value - assert: - that: - - disk2.changed - - disk2.state.id is defined - - - name: Create disk to a new managed disk with zone and os type - azure_rm_manageddisk: - resource_group: "{{ resource_group }}" - name: "md{{ rpfx }}3" - source_uri: "{{ output.state.id }}" - disk_size_gb: 1 - zone: "1" - os_type: windows - register: disk3 - - - name: Assert status succeeded and results include an Id value - assert: - that: - - disk3.changed - - disk3.state.id is defined - - disk3.state.zone == "1" - - disk3.state.os_type == "windows" - - - name: Change storage account type to an invalid type - azure_rm_manageddisk: - resource_group: "{{ resource_group }}" - name: "md{{ rpfx }}1" - storage_account_type: "PremiumL" - disk_size_gb: 1 - register: output - ignore_errors: yes - - - name: Assert storage account type change failed - assert: { that: "output['failed'] == True" } - - - name: Update disk options (os_type, account_type, size, tags) - azure_rm_manageddisk: - resource_group: "{{ resource_group }}" - name: "md{{ rpfx }}1" - disk_size_gb: 2 - os_type: linux - storage_account_type: "StandardSSD_LRS" - tags: - galaxy: "no" - delete: never - register: output - - - assert: - that: - - output.changed - - output.state.storage_account_type == "StandardSSD_LRS" - - output.state.disk_size_gb == 2 - - "output.state.tags | length == 2" - - "output.state.tags.galaxy == 'no'" - - output.state.os_type == 'linux' - - - name: Gather facts to one specific disk - azure_rm_manageddisk_info: - resource_group: "{{ resource_group }}" - name: "md{{ rpfx }}1" - register: output - - - assert: - that: - - "output.ansible_info.azure_managed_disk | length == 1" - - output.ansible_info.azure_managed_disk[0].storage_account_type == "StandardSSD_LRS" - - output.ansible_info.azure_managed_disk[0].disk_size_gb == 2 - - "output.ansible_info.azure_managed_disk[0].os_type == 'linux'" - - - set_fact: - parameter: "{{parameter |combine({item.key: item.value})}}" - when: "{{item.key not in ['id', 'changed'] and item.value != None}}" - with_dict: "{{ output.ansible_info.azure_managed_disk[0] }}" - - - name: Create disk with facts return value - azure_rm_manageddisk: - resource_group: "{{ resource_group }}" - location: "{{ parameter.location }}" - name: "{{ parameter.name }}" - storage_account_type: "{{ parameter.storage_account_type }}" - disk_size_gb: "{{ parameter.disk_size_gb }}" - create_option: "{{ parameter.create_option }}" - tags: "{{ parameter.tags }}" - register: output - - - assert: - that: - - not output.changed - - - name: Delete managed disk (Check Mode) - azure_rm_manageddisk: - resource_group: "{{ resource_group }}" - name: "md{{ rpfx }}1" - state: absent - register: output - check_mode: yes - - - name: Assert status succeeded - assert: - that: - - output.changed - - output.state - - - name: Delete all managed disk - azure_rm_manageddisk: - resource_group: "{{ resource_group }}" - name: "md{{ rpfx }}{{ item }}" - managed_by: '' - state: absent - with_items: - - 1 - - 2 - - 3 - - - name: Delete virtual machine - azure_rm_virtualmachine: - resource_group: "{{ resource_group }}" - name: "tr{{ rpfx }}" - state: absent - vm_size: Standard_DS1_v2 - - - name: Delete public ip - azure_rm_publicipaddress: - resource_group: "{{ resource_group }}" - allocation_method: Static - name: "tr{{ rpfx }}" - state: absent diff --git a/test/integration/targets/azure_rm_mariadbserver/aliases b/test/integration/targets/azure_rm_mariadbserver/aliases deleted file mode 100644 index b586dc7c3e..0000000000 --- a/test/integration/targets/azure_rm_mariadbserver/aliases +++ /dev/null @@ -1,8 +0,0 @@ -cloud/azure -destructive -shippable/azure/group9 -azure_rm_mariadbserver_facts -azure_rm_mariadbdatabase -azure_rm_mariadbdatabase_facts -azure_rm_mariadbfirewallrule -azure_rm_mariadbfirewallrule_facts diff --git a/test/integration/targets/azure_rm_mariadbserver/meta/main.yml b/test/integration/targets/azure_rm_mariadbserver/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_mariadbserver/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_mariadbserver/tasks/main.yml b/test/integration/targets/azure_rm_mariadbserver/tasks/main.yml deleted file mode 100644 index 5b33ffb951..0000000000 --- a/test/integration/targets/azure_rm_mariadbserver/tasks/main.yml +++ /dev/null @@ -1,640 +0,0 @@ -- name: Prepare random number - set_fact: - rpfx: "{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - run_once: yes - -- name: Create instance of MariaDB Server -- check mode - azure_rm_mariadbserver: - resource_group: "{{ resource_group }}" - name: mariadbsrv{{ rpfx }} - sku: - name: B_Gen5_1 - tier: Basic - location: westus2 - storage_mb: 51200 - version: 10.2 - enforce_ssl: True - admin_username: zimxyz - admin_password: Testpasswordxyz12! - check_mode: yes - register: output -- name: Assert the resource instance is well created - assert: - that: - - output.changed - -- name: Create instance of MariaDB Server - azure_rm_mariadbserver: - resource_group: "{{ resource_group }}" - name: mariadbsrv{{ rpfx }} - sku: - name: B_Gen5_1 - tier: Basic - location: westus2 - storage_mb: 51200 - version: 10.2 - enforce_ssl: True - admin_username: zimxyz - admin_password: Testpasswordxyz12! - register: output -- name: Assert the resource instance is well created - assert: - that: - - output.changed - - output.state == 'Ready' - -- name: Create again instance of MariaDB Server - azure_rm_mariadbserver: - resource_group: "{{ resource_group }}" - name: mariadbsrv{{ rpfx }} - sku: - name: B_Gen5_1 - tier: Basic - location: westus2 - storage_mb: 51200 - version: 10.2 - enforce_ssl: True - admin_username: zimxyz - admin_password: Testpasswordxyz12! - register: output -- name: Assert the state has not changed - assert: - that: - - output.changed == false - - output.state == 'Ready' - -- name: Update instance of MariaDB Server, change storage size - azure_rm_mariadbserver: - resource_group: "{{ resource_group }}" - name: mariadbsrv{{ rpfx }} - sku: - name: B_Gen5_1 - tier: Basic - location: westus2 - storage_mb: 128000 - version: 10.2 - enforce_ssl: True - admin_username: zimxyz - admin_password: Testpasswordxyz12! - register: output -- name: Assert the state has not changed - assert: - that: - - output.changed - - output.state == 'Ready' -- debug: - var: output - -- name: Gather facts MariaDB Server - azure_rm_mariadbserver_facts: - resource_group: "{{ resource_group }}" - name: mariadbsrv{{ rpfx }} - register: output -- name: Assert that storage size is correct - assert: - that: - - output.servers[0]['storage_mb'] == 128000 - -- name: Create second instance of MariaDB Server - azure_rm_mariadbserver: - resource_group: "{{ resource_group }}" - name: mariadbsrv{{ rpfx }}second - sku: - name: B_Gen5_1 - tier: Basic - location: westus2 - storage_mb: 51200 - version: 10.2 - enforce_ssl: True - admin_username: zimxyz - admin_password: Testpasswordxyz12! - tags: - aaa: bbb - -- name: Create second instance of MariaDB Server - azure_rm_mariadbserver: - resource_group: "{{ resource_group }}" - name: mariadbsrv{{ rpfx }}second - sku: - name: B_Gen5_1 - tier: Basic - location: westus2 - storage_mb: 51200 - version: 10.2 - enforce_ssl: True - admin_username: zimxyz - admin_password: Testpasswordxyz12! - tags: - ccc: ddd - -- name: Gather facts MariaDB Server - azure_rm_mariadbserver_facts: - resource_group: "{{ resource_group }}" - name: mariadbsrv{{ rpfx }}second - register: output - -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.servers[0]['id'] != None - - output.servers[0]['name'] != None - - output.servers[0]['location'] != None - - output.servers[0]['sku']['name'] != None - - output.servers[0]['sku']['tier'] != None - - output.servers[0]['sku']['capacity'] != None - - output.servers[0]['version'] != None - - output.servers[0]['user_visible_state'] != None - - output.servers[0]['fully_qualified_domain_name'] != None - - output.servers[0]['tags']['aaa'] == 'bbb' - - output.servers[0]['tags']['ccc'] == 'ddd' - -- name: Gather facts MariaDB Server - azure_rm_mariadbserver_facts: - resource_group: "{{ resource_group }}" - register: output -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.servers[0]['id'] != None - - output.servers[0]['name'] != None - - output.servers[0]['location'] != None - - output.servers[0]['sku']['name'] != None - - output.servers[0]['sku']['tier'] != None - - output.servers[0]['sku']['capacity'] != None - - output.servers[0]['version'] != None - - output.servers[0]['user_visible_state'] != None - - output.servers[0]['fully_qualified_domain_name'] != None - - output.servers[1]['id'] != None - - output.servers[1]['name'] != None - - output.servers[1]['location'] != None - - output.servers[1]['sku']['name'] != None - - output.servers[1]['sku']['tier'] != None - - output.servers[1]['sku']['capacity'] != None - - output.servers[1]['version'] != None - - output.servers[1]['user_visible_state'] != None - - output.servers[1]['fully_qualified_domain_name'] != None - -# -# azure_rm_mariadbdatabase tests below -# -- name: Create instance of MariaDB Database -- check mode - azure_rm_mariadbdatabase: - resource_group: "{{ resource_group }}" - server_name: mariadbsrv{{ rpfx }} - name: testdatabase - check_mode: yes - register: output -- name: Assert the resource instance is well created - assert: - that: - - output.changed - -- name: Create instance of MariaDB Database - azure_rm_mariadbdatabase: - resource_group: "{{ resource_group }}" - server_name: mariadbsrv{{ rpfx }} - name: testdatabase - collation: latin1_swedish_ci - charset: latin1 - register: output -- name: Assert the resource instance is well created - assert: - that: - - output.changed - - output.name == 'testdatabase' - -- name: Create again instance of MariaDB Database - azure_rm_mariadbdatabase: - resource_group: "{{ resource_group }}" - server_name: mariadbsrv{{ rpfx }} - name: testdatabase - collation: latin1_swedish_ci - charset: latin1 - register: output -- name: Assert the state has not changed - assert: - that: - - output.changed == false - - output.name == 'testdatabase' - -- name: Try to update database without force_update - azure_rm_mariadbdatabase: - resource_group: "{{ resource_group }}" - server_name: mariadbsrv{{ rpfx }} - name: testdatabase - collation: latin1_czech_ci - charset: latin1 - ignore_errors: yes - register: output -- name: Assert that nothing has changed - assert: - that: - - output.changed == False - -- name: Update instance of database using force_update - azure_rm_mariadbdatabase: - resource_group: "{{ resource_group }}" - server_name: mariadbsrv{{ rpfx }} - name: testdatabase - collation: latin1_czech_ci - charset: latin1 - force_update: yes - register: output -- name: Assert the state has changed - assert: - that: - - output.changed - - output.name == 'testdatabase' - -- name: Create second instance of MariaDB Database - azure_rm_mariadbdatabase: - resource_group: "{{ resource_group }}" - server_name: mariadbsrv{{ rpfx }} - name: testdatabase2 - -- name: Gather facts MariaDB Database - azure_rm_mariadbdatabase_facts: - resource_group: "{{ resource_group }}" - server_name: mariadbsrv{{ rpfx }} - name: testdatabase - register: output - -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.databases[0]['server_name'] != None - - output.databases[0]['name'] != None - - output.databases[0]['charset'] != None - - output.databases[0]['collation'] != None - -- name: Gather facts MariaDB Database - azure_rm_mariadbdatabase_facts: - resource_group: "{{ resource_group }}" - server_name: mariadbsrv{{ rpfx }} - register: output -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.databases[0]['server_name'] != None - - output.databases[0]['name'] != None - - output.databases[0]['charset'] != None - - output.databases[0]['collation'] != None - - output.databases[1]['server_name'] != None - - output.databases[1]['name'] != None - - output.databases[1]['charset'] != None - - output.databases[1]['collation'] != None - -- name: Delete instance of MariaDB Database -- check mode - azure_rm_mariadbdatabase: - resource_group: "{{ resource_group }}" - server_name: mariadbsrv{{ rpfx }} - name: testdatabase - state: absent - check_mode: yes - register: output -- name: Assert the state has changed - assert: - that: - - output.changed - -- name: Delete instance of MariaDB Database - azure_rm_mariadbdatabase: - resource_group: "{{ resource_group }}" - server_name: mariadbsrv{{ rpfx }} - name: testdatabase - state: absent - register: output -- name: Assert the state has changed - assert: - that: - - output.changed - -- name: Delete unexisting instance of MariaDB Database - azure_rm_mariadbdatabase: - resource_group: "{{ resource_group }}" - server_name: mariadbsrv{{ rpfx }} - name: testdatabase - state: absent - register: output -- name: Assert the state has changed - assert: - that: - - output.changed == false - -# -# azure_rm_firewallrule tests below -# -- name: Create instance of Firewall Rule -- check mode - azure_rm_mariadbfirewallrule: - resource_group: "{{ resource_group }}" - server_name: mariadbsrv{{ rpfx }} - name: firewallrule{{ rpfx }} - start_ip_address: 172.28.10.136 - end_ip_address: 172.28.10.138 - check_mode: yes - register: output -- name: Assert the resource instance is well created - assert: - that: - - output.changed - -- name: Create instance of Firewall Rule - azure_rm_mariadbfirewallrule: - resource_group: "{{ resource_group }}" - server_name: mariadbsrv{{ rpfx }} - name: firewallrule{{ rpfx }} - start_ip_address: 172.28.10.136 - end_ip_address: 172.28.10.138 - register: output -- name: Assert the resource instance is well created - assert: - that: - - output.changed - -- name: Create again instance of Firewall Rule - azure_rm_mariadbfirewallrule: - resource_group: "{{ resource_group }}" - server_name: mariadbsrv{{ rpfx }} - name: firewallrule{{ rpfx }} - start_ip_address: 172.28.10.136 - end_ip_address: 172.28.10.138 - register: output -- name: Assert the state has not changed - assert: - that: - - output.changed == false - -- name: Delete instance of Firewall Rule -- check mode - azure_rm_mariadbfirewallrule: - resource_group: "{{ resource_group }}" - server_name: mariadbsrv{{ rpfx }} - name: firewallrule{{ rpfx }} - state: absent - check_mode: yes - register: output -- name: Assert the state has changed - assert: - that: - - output.changed - -- name: Create instance of Firewall Rule -- second - azure_rm_mariadbfirewallrule: - resource_group: "{{ resource_group }}" - server_name: mariadbsrv{{ rpfx }} - name: firewallrule{{ rpfx }}second - start_ip_address: 172.28.10.136 - end_ip_address: 172.28.10.138 - register: output -- name: Assert the state has changed - assert: - that: - - output.changed - -- name: Gather facts MariaDB Firewall Rule - azure_rm_mariadbfirewallrule_facts: - resource_group: "{{ resource_group }}" - server_name: mariadbsrv{{ rpfx }} - name: firewallrule{{ rpfx }} - register: output -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.rules[0].id != None - - output.rules[0].server_name != None - - output.rules[0].name != None - - output.rules[0].start_ip_address != None - - output.rules[0].end_ip_address != None - - "output.rules | length == 1" - -- name: Gather facts MariaDB Firewall Rule - azure_rm_mariadbfirewallrule_facts: - resource_group: "{{ resource_group }}" - server_name: mariadbsrv{{ rpfx }} - register: output -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.rules[0].id != None - - output.rules[0].server_name != None - - output.rules[0].name != None - - output.rules[0].start_ip_address != None - - output.rules[0].end_ip_address != None - - output.rules[1].id != None - - output.rules[1].name != None - - output.rules[1].start_ip_address != None - - output.rules[1].end_ip_address != None - - "output.rules | length == 2" - -- name: Delete instance of Firewall Rule - azure_rm_mariadbfirewallrule: - resource_group: "{{ resource_group }}" - server_name: mariadbsrv{{ rpfx }} - name: firewallrule{{ rpfx }} - state: absent - register: output -- name: Assert the state has changed - assert: - that: - - output.changed - -- name: Delete unexisting instance of Firewall Rule - azure_rm_mariadbfirewallrule: - resource_group: "{{ resource_group }}" - server_name: mariadbsrv{{ rpfx }} - name: firewallrule{{ rpfx }} - state: absent - register: output -- name: Assert the state has changed - assert: - that: - - output.changed == false - -- name: Delete instance of Firewall Rule - second - azure_rm_mariadbfirewallrule: - resource_group: "{{ resource_group }}" - server_name: mariadbsrv{{ rpfx }} - name: firewallrule{{ rpfx }}second - state: absent - -- name: Gather facts MariaDB Firewall Rule - azure_rm_mariadbfirewallrule_facts: - resource_group: "{{ resource_group }}" - server_name: mariadbsrv{{ rpfx }} - name: firewallrule{{ rpfx }} - register: output -- name: Assert that empty list was returned - assert: - that: - - output.changed == False - - "output.rules | length == 0" - -# -# configuration -# -- name: Create instance of Configuration -- check mode - azure_rm_mariadbconfiguration: - resource_group: "{{ resource_group }}" - server_name: mariadbsrv{{ rpfx }} - name: event_scheduler - value: "ON" - check_mode: yes - register: output -- name: Assert that change was registered - assert: - that: - - output.changed - -- name: Try to delete default configuraion - azure_rm_mariadbconfiguration_facts: - resource_group: "{{ resource_group }}" - server_name: mariadbsrv{{ rpfx }} - name: event_scheduler - register: output -- name: Get facts of event_scheduler - debug: - var: output - -- name: Try to delete default configuraion - azure_rm_mariadbconfiguration: - resource_group: "{{ resource_group }}" - server_name: mariadbsrv{{ rpfx }} - name: event_scheduler - state: absent - register: output -- name: Assert that change was registered - assert: - that: - - not output.changed - -- name: Try to change default configuraion - azure_rm_mariadbconfiguration: - resource_group: "{{ resource_group }}" - server_name: mariadbsrv{{ rpfx }} - name: event_scheduler - value: "ON" - register: output -- name: Assert that change was registered - assert: - that: - - output.changed - -- name: Try to change default configuration -- idempotent - azure_rm_mariadbconfiguration: - resource_group: "{{ resource_group }}" - server_name: mariadbsrv{{ rpfx }} - name: event_scheduler - value: "ON" - register: output -- name: Assert that change was registered - assert: - that: - - not output.changed - -- name: Try to reset configuration - azure_rm_mariadbconfiguration: - resource_group: "{{ resource_group }}" - server_name: mariadbsrv{{ rpfx }} - name: event_scheduler - state: absent - register: output -- name: Assert that change was registered - assert: - that: - - output.changed - -- name: Try to reset configuration -- idempotent - azure_rm_mariadbconfiguration: - resource_group: "{{ resource_group }}" - server_name: mariadbsrv{{ rpfx }} - name: event_scheduler - state: absent - register: output -- name: Assert that change was registered - assert: - that: - - not output.changed - -- name: Gather facts MariaDB Configuration - azure_rm_mariadbconfiguration_facts: - resource_group: "{{ resource_group }}" - server_name: mariadbsrv{{ rpfx }} - name: event_scheduler - register: output -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.settings[0].id != None - - output.settings[0].name != None - - output.settings[0].value != None - - output.settings[0].description != None - - output.settings[0].source != None - - output.settings | length == 1 - -- name: Gather facts MariaDB Configuration - azure_rm_mariadbconfiguration_facts: - resource_group: "{{ resource_group }}" - server_name: mariadbsrv{{ rpfx }} - register: output -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.settings[0].id != None - - output.settings[0].name != None - - output.settings[0].value != None - - output.settings[0].description != None - - output.settings[0].source != None - - output.settings | length > 1 - -# -# clean up azure_rm_mariadbserver test -# - -- name: Delete instance of MariaDB Server -- check mode - azure_rm_mariadbserver: - resource_group: "{{ resource_group }}" - name: mariadbsrv{{ rpfx }} - state: absent - check_mode: yes - register: output -- name: Assert the state has changed - assert: - that: - - output.changed - -- name: Delete instance of MariaDB Server - azure_rm_mariadbserver: - resource_group: "{{ resource_group }}" - name: mariadbsrv{{ rpfx }} - state: absent - register: output -- name: Assert the state has changed - assert: - that: - - output.changed - -- name: Delete unexisting instance of MariaDB Server - azure_rm_mariadbserver: - resource_group: "{{ resource_group }}" - name: mariadbsrv{{ rpfx }} - state: absent - register: output -- name: Assert the state has changed - assert: - that: - - output.changed == false - -- name: Delete second instance of MariaDB Server - azure_rm_mariadbserver: - resource_group: "{{ resource_group }}" - name: mariadbsrv{{ rpfx }}second - state: absent - async: 400 - poll: 0 diff --git a/test/integration/targets/azure_rm_monitorlogprofile/aliases b/test/integration/targets/azure_rm_monitorlogprofile/aliases deleted file mode 100644 index 35b9401151..0000000000 --- a/test/integration/targets/azure_rm_monitorlogprofile/aliases +++ /dev/null @@ -1,3 +0,0 @@ -cloud/azure -destructive -unsupported
\ No newline at end of file diff --git a/test/integration/targets/azure_rm_monitorlogprofile/meta/main.yml b/test/integration/targets/azure_rm_monitorlogprofile/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_monitorlogprofile/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_monitorlogprofile/tasks/main.yml b/test/integration/targets/azure_rm_monitorlogprofile/tasks/main.yml deleted file mode 100644 index 9019f59b28..0000000000 --- a/test/integration/targets/azure_rm_monitorlogprofile/tasks/main.yml +++ /dev/null @@ -1,104 +0,0 @@ -- name: Prepare random number - set_fact: - profile_name: "profile{{ resource_group | hash('md5') | truncate(5, True, '') }}{{ 1000 | random }}" - location: eastus - run_once: yes - -- name: create Azure storage account - azure_rm_storageaccount: - name: '{{ profile_name }}' - resource_group: "{{ resource_group }}" - account_type: Standard_LRS - -- name: create log profile (idempotence) - azure_rm_monitorlogprofile: - name: "{{ profile_name }}" - location: "{{ location }}" - locations: - - eastus - - westus - categories: - - Write - - Action - retention_policy: - enabled: False - days: 1 - storage_account: - resource_group: "{{ resource_group }}" - name: "{{ profile_name }}" - check_mode: yes - register: output - -- name: assert create idempotence - assert: - that: - - output.changed - -- name: create log profile - azure_rm_monitorlogprofile: - name: "{{ profile_name }}" - location: "{{ location }}" - locations: - - eastus - - westus - categories: - - Write - - Action - retention_policy: - enabled: False - days: 1 - storage_account: - resource_group: "{{ resource_group }}" - name: "{{ profile_name }}" - register: output - -- name: assert create - assert: - that: - - output.changed - - output.id - -- name: update log profile (idempotence) - azure_rm_monitorlogprofile: - name: "{{ profile_name }}" - location: "{{ location }}" - locations: - - eastus - - westus - categories: - - Write - - Action - retention_policy: - enabled: False - days: 1 - storage_account: - resource_group: "{{ resource_group }}" - name: "{{ storage_name }}" - register: output - -- name: assert update idempotence - assert: - that: - - output.changed == False - -- name: update log profile - azure_rm_monitorlogprofile: - name: "{{ profile_name }}" - location: "{{ location }}" - locations: - - eastus - categories: - - Write - - Action - retention_policy: - enabled: False - days: 2 - storage_account: - resource_group: "{{ resource_group }}" - name: "{{ profile_name }}" - register: output - -- name: assert update - assert: - that: - - output.changed diff --git a/test/integration/targets/azure_rm_mysqlserver/aliases b/test/integration/targets/azure_rm_mysqlserver/aliases deleted file mode 100644 index 9e3fd9ae68..0000000000 --- a/test/integration/targets/azure_rm_mysqlserver/aliases +++ /dev/null @@ -1,10 +0,0 @@ -cloud/azure -destructive -shippable/azure/group8 -azure_rm_mysqlserver_facts -azure_rm_mysqldatabase -azure_rm_mysqldatabase_facts -azure_rm_mysqlfirewallrule -azure_rm_mysqlfirewallrule_facts -azure_rm_mysqlconfiguration -azure_rm_mysqlconfiguration_facts diff --git a/test/integration/targets/azure_rm_mysqlserver/meta/main.yml b/test/integration/targets/azure_rm_mysqlserver/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_mysqlserver/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_mysqlserver/tasks/main.yml b/test/integration/targets/azure_rm_mysqlserver/tasks/main.yml deleted file mode 100644 index 8f51010d82..0000000000 --- a/test/integration/targets/azure_rm_mysqlserver/tasks/main.yml +++ /dev/null @@ -1,640 +0,0 @@ -- name: Prepare random number - set_fact: - rpfx: "{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - run_once: yes - -- name: Create instance of MySQL Server -- check mode - azure_rm_mysqlserver: - resource_group: "{{ resource_group }}" - name: mysqlsrv{{ rpfx }} - sku: - name: B_Gen5_1 - tier: Basic - location: westus2 - storage_mb: 51200 - version: 5.6 - enforce_ssl: True - admin_username: zimxyz - admin_password: Testpasswordxyz12! - check_mode: yes - register: output -- name: Assert the resource instance is well created - assert: - that: - - output.changed - -- name: Create instance of MySQL Server - azure_rm_mysqlserver: - resource_group: "{{ resource_group }}" - name: mysqlsrv{{ rpfx }} - sku: - name: B_Gen5_1 - tier: Basic - location: westus2 - storage_mb: 51200 - version: 5.6 - enforce_ssl: True - admin_username: zimxyz - admin_password: Testpasswordxyz12! - register: output -- name: Assert the resource instance is well created - assert: - that: - - output.changed - - output.state == 'Ready' - -- name: Create again instance of MySQL Server - azure_rm_mysqlserver: - resource_group: "{{ resource_group }}" - name: mysqlsrv{{ rpfx }} - sku: - name: B_Gen5_1 - tier: Basic - location: westus2 - storage_mb: 51200 - version: 5.6 - enforce_ssl: True - admin_username: zimxyz - admin_password: Testpasswordxyz12! - register: output -- name: Assert the state has not changed - assert: - that: - - output.changed == false - - output.state == 'Ready' - -- name: Update instance of MySQL Server, change storage size - azure_rm_mysqlserver: - resource_group: "{{ resource_group }}" - name: mysqlsrv{{ rpfx }} - sku: - name: B_Gen5_1 - tier: Basic - location: westus2 - storage_mb: 128000 - version: 5.6 - enforce_ssl: True - admin_username: zimxyz - admin_password: Testpasswordxyz12! - register: output -- name: Assert the state has not changed - assert: - that: - - output.changed - - output.state == 'Ready' -- debug: - var: output - -- name: Gather facts MySQL Server - azure_rm_mysqlserver_facts: - resource_group: "{{ resource_group }}" - name: mysqlsrv{{ rpfx }} - register: output -- name: Assert that storage size is correct - assert: - that: - - output.servers[0]['storage_mb'] == 128000 - -- name: Create second instance of MySQL Server - azure_rm_mysqlserver: - resource_group: "{{ resource_group }}" - name: mysqlsrv{{ rpfx }}second - sku: - name: B_Gen5_1 - tier: Basic - location: westus2 - storage_mb: 51200 - version: 5.6 - enforce_ssl: True - admin_username: zimxyz - admin_password: Testpasswordxyz12! - tags: - aaa: bbb - -- name: Create second instance of MySQL Server - azure_rm_mysqlserver: - resource_group: "{{ resource_group }}" - name: mysqlsrv{{ rpfx }}second - sku: - name: B_Gen5_1 - tier: Basic - location: westus2 - storage_mb: 51200 - version: 5.6 - enforce_ssl: True - admin_username: zimxyz - admin_password: Testpasswordxyz12! - tags: - ccc: ddd - -- name: Gather facts MySQL Server - azure_rm_mysqlserver_facts: - resource_group: "{{ resource_group }}" - name: mysqlsrv{{ rpfx }}second - register: output - -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.servers[0]['id'] != None - - output.servers[0]['name'] != None - - output.servers[0]['location'] != None - - output.servers[0]['sku']['name'] != None - - output.servers[0]['sku']['tier'] != None - - output.servers[0]['sku']['capacity'] != None - - output.servers[0]['version'] != None - - output.servers[0]['user_visible_state'] != None - - output.servers[0]['fully_qualified_domain_name'] != None - - output.servers[0]['tags']['aaa'] == 'bbb' - - output.servers[0]['tags']['ccc'] == 'ddd' - -- name: Gather facts MySQL Server - azure_rm_mysqlserver_facts: - resource_group: "{{ resource_group }}" - register: output -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.servers[0]['id'] != None - - output.servers[0]['name'] != None - - output.servers[0]['location'] != None - - output.servers[0]['sku']['name'] != None - - output.servers[0]['sku']['tier'] != None - - output.servers[0]['sku']['capacity'] != None - - output.servers[0]['version'] != None - - output.servers[0]['user_visible_state'] != None - - output.servers[0]['fully_qualified_domain_name'] != None - - output.servers[1]['id'] != None - - output.servers[1]['name'] != None - - output.servers[1]['location'] != None - - output.servers[1]['sku']['name'] != None - - output.servers[1]['sku']['tier'] != None - - output.servers[1]['sku']['capacity'] != None - - output.servers[1]['version'] != None - - output.servers[1]['user_visible_state'] != None - - output.servers[1]['fully_qualified_domain_name'] != None - -# -# azure_rm_mysqldatabase tests below -# -- name: Create instance of MySQL Database -- check mode - azure_rm_mysqldatabase: - resource_group: "{{ resource_group }}" - server_name: mysqlsrv{{ rpfx }} - name: testdatabase - check_mode: yes - register: output -- name: Assert the resource instance is well created - assert: - that: - - output.changed - -- name: Create instance of MySQL Database - azure_rm_mysqldatabase: - resource_group: "{{ resource_group }}" - server_name: mysqlsrv{{ rpfx }} - name: testdatabase - collation: latin1_swedish_ci - charset: latin1 - register: output -- name: Assert the resource instance is well created - assert: - that: - - output.changed - - output.name == 'testdatabase' - -- name: Create again instance of MySQL Database - azure_rm_mysqldatabase: - resource_group: "{{ resource_group }}" - server_name: mysqlsrv{{ rpfx }} - name: testdatabase - collation: latin1_swedish_ci - charset: latin1 - register: output -- name: Assert the state has not changed - assert: - that: - - output.changed == false - - output.name == 'testdatabase' - -- name: Try to update database without force_update - azure_rm_mysqldatabase: - resource_group: "{{ resource_group }}" - server_name: mysqlsrv{{ rpfx }} - name: testdatabase - collation: latin1_czech_ci - charset: latin1 - ignore_errors: yes - register: output -- name: Assert that nothing has changed - assert: - that: - - output.changed == False - -- name: Update instance of database using force_update - azure_rm_mysqldatabase: - resource_group: "{{ resource_group }}" - server_name: mysqlsrv{{ rpfx }} - name: testdatabase - collation: latin1_czech_ci - charset: latin1 - force_update: yes - register: output -- name: Assert the state has changed - assert: - that: - - output.changed - - output.name == 'testdatabase' - -- name: Create second instance of MySQL Database - azure_rm_mysqldatabase: - resource_group: "{{ resource_group }}" - server_name: mysqlsrv{{ rpfx }} - name: testdatabase2 - -- name: Gather facts MySQL Database - azure_rm_mysqldatabase_facts: - resource_group: "{{ resource_group }}" - server_name: mysqlsrv{{ rpfx }} - name: testdatabase - register: output - -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.databases[0]['server_name'] != None - - output.databases[0]['name'] != None - - output.databases[0]['charset'] != None - - output.databases[0]['collation'] != None - -- name: Gather facts MySQL Database - azure_rm_mysqldatabase_facts: - resource_group: "{{ resource_group }}" - server_name: mysqlsrv{{ rpfx }} - register: output -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.databases[0]['server_name'] != None - - output.databases[0]['name'] != None - - output.databases[0]['charset'] != None - - output.databases[0]['collation'] != None - - output.databases[1]['server_name'] != None - - output.databases[1]['name'] != None - - output.databases[1]['charset'] != None - - output.databases[1]['collation'] != None - -- name: Delete instance of MySQL Database -- check mode - azure_rm_mysqldatabase: - resource_group: "{{ resource_group }}" - server_name: mysqlsrv{{ rpfx }} - name: testdatabase - state: absent - check_mode: yes - register: output -- name: Assert the state has changed - assert: - that: - - output.changed - -- name: Delete instance of MySQL Database - azure_rm_mysqldatabase: - resource_group: "{{ resource_group }}" - server_name: mysqlsrv{{ rpfx }} - name: testdatabase - state: absent - register: output -- name: Assert the state has changed - assert: - that: - - output.changed - -- name: Delete unexisting instance of MySQL Database - azure_rm_mysqldatabase: - resource_group: "{{ resource_group }}" - server_name: mysqlsrv{{ rpfx }} - name: testdatabase - state: absent - register: output -- name: Assert the state has changed - assert: - that: - - output.changed == false - -# -# azure_rm_firewallrule tests below -# -- name: Create instance of Firewall Rule -- check mode - azure_rm_mysqlfirewallrule: - resource_group: "{{ resource_group }}" - server_name: mysqlsrv{{ rpfx }} - name: firewallrule{{ rpfx }} - start_ip_address: 172.28.10.136 - end_ip_address: 172.28.10.138 - check_mode: yes - register: output -- name: Assert the resource instance is well created - assert: - that: - - output.changed - -- name: Create instance of Firewall Rule - azure_rm_mysqlfirewallrule: - resource_group: "{{ resource_group }}" - server_name: mysqlsrv{{ rpfx }} - name: firewallrule{{ rpfx }} - start_ip_address: 172.28.10.136 - end_ip_address: 172.28.10.138 - register: output -- name: Assert the resource instance is well created - assert: - that: - - output.changed - -- name: Create again instance of Firewall Rule - azure_rm_mysqlfirewallrule: - resource_group: "{{ resource_group }}" - server_name: mysqlsrv{{ rpfx }} - name: firewallrule{{ rpfx }} - start_ip_address: 172.28.10.136 - end_ip_address: 172.28.10.138 - register: output -- name: Assert the state has not changed - assert: - that: - - output.changed == false - -- name: Delete instance of Firewall Rule -- check mode - azure_rm_mysqlfirewallrule: - resource_group: "{{ resource_group }}" - server_name: mysqlsrv{{ rpfx }} - name: firewallrule{{ rpfx }} - state: absent - check_mode: yes - register: output -- name: Assert the state has changed - assert: - that: - - output.changed - -- name: Create instance of Firewall Rule -- second - azure_rm_mysqlfirewallrule: - resource_group: "{{ resource_group }}" - server_name: mysqlsrv{{ rpfx }} - name: firewallrule{{ rpfx }}second - start_ip_address: 172.28.10.136 - end_ip_address: 172.28.10.138 - register: output -- name: Assert the state has changed - assert: - that: - - output.changed - -- name: Gather facts MySQL Firewall Rule - azure_rm_mysqlfirewallrule_facts: - resource_group: "{{ resource_group }}" - server_name: mysqlsrv{{ rpfx }} - name: firewallrule{{ rpfx }} - register: output -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.rules[0].id != None - - output.rules[0].server_name != None - - output.rules[0].name != None - - output.rules[0].start_ip_address != None - - output.rules[0].end_ip_address != None - - "output.rules | length == 1" - -- name: Gather facts MySQL Firewall Rule - azure_rm_mysqlfirewallrule_facts: - resource_group: "{{ resource_group }}" - server_name: mysqlsrv{{ rpfx }} - register: output -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.rules[0].id != None - - output.rules[0].server_name != None - - output.rules[0].name != None - - output.rules[0].start_ip_address != None - - output.rules[0].end_ip_address != None - - output.rules[1].id != None - - output.rules[1].name != None - - output.rules[1].start_ip_address != None - - output.rules[1].end_ip_address != None - - "output.rules | length == 2" - -- name: Delete instance of Firewall Rule - azure_rm_mysqlfirewallrule: - resource_group: "{{ resource_group }}" - server_name: mysqlsrv{{ rpfx }} - name: firewallrule{{ rpfx }} - state: absent - register: output -- name: Assert the state has changed - assert: - that: - - output.changed - -- name: Delete unexisting instance of Firewall Rule - azure_rm_mysqlfirewallrule: - resource_group: "{{ resource_group }}" - server_name: mysqlsrv{{ rpfx }} - name: firewallrule{{ rpfx }} - state: absent - register: output -- name: Assert the state has changed - assert: - that: - - output.changed == false - -- name: Delete instance of Firewall Rule - second - azure_rm_mysqlfirewallrule: - resource_group: "{{ resource_group }}" - server_name: mysqlsrv{{ rpfx }} - name: firewallrule{{ rpfx }}second - state: absent - -- name: Gather facts MySQL Firewall Rule - azure_rm_mysqlfirewallrule_facts: - resource_group: "{{ resource_group }}" - server_name: mysqlsrv{{ rpfx }} - name: firewallrule{{ rpfx }} - register: output -- name: Assert that empty list was returned - assert: - that: - - output.changed == False - - "output.rules | length == 0" - -# -# configuration -# -- name: Create instance of Configuration -- check mode - azure_rm_mysqlconfiguration: - resource_group: "{{ resource_group }}" - server_name: mysqlsrv{{ rpfx }} - name: event_scheduler - value: "ON" - check_mode: yes - register: output -- name: Assert that change was registered - assert: - that: - - output.changed - -- name: Try to delete default configuraion - azure_rm_mysqlconfiguration_facts: - resource_group: "{{ resource_group }}" - server_name: mysqlsrv{{ rpfx }} - name: event_scheduler - register: output -- name: Get facts of event_scheduler - debug: - var: output - -- name: Try to delete default configuraion - azure_rm_mysqlconfiguration: - resource_group: "{{ resource_group }}" - server_name: mysqlsrv{{ rpfx }} - name: event_scheduler - state: absent - register: output -- name: Assert that change was registered - assert: - that: - - not output.changed - -- name: Try to change default configuraion - azure_rm_mysqlconfiguration: - resource_group: "{{ resource_group }}" - server_name: mysqlsrv{{ rpfx }} - name: event_scheduler - value: "ON" - register: output -- name: Assert that change was registered - assert: - that: - - output.changed - -- name: Try to change default configuration -- idempotent - azure_rm_mysqlconfiguration: - resource_group: "{{ resource_group }}" - server_name: mysqlsrv{{ rpfx }} - name: event_scheduler - value: "ON" - register: output -- name: Assert that change was registered - assert: - that: - - not output.changed - -- name: Try to reset configuration - azure_rm_mysqlconfiguration: - resource_group: "{{ resource_group }}" - server_name: mysqlsrv{{ rpfx }} - name: event_scheduler - state: absent - register: output -- name: Assert that change was registered - assert: - that: - - output.changed - -- name: Try to reset configuration -- idempotent - azure_rm_mysqlconfiguration: - resource_group: "{{ resource_group }}" - server_name: mysqlsrv{{ rpfx }} - name: event_scheduler - state: absent - register: output -- name: Assert that change was registered - assert: - that: - - not output.changed - -- name: Gather facts MySQL Configuration - azure_rm_mysqlconfiguration_facts: - resource_group: "{{ resource_group }}" - server_name: mysqlsrv{{ rpfx }} - name: event_scheduler - register: output -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.settings[0].id != None - - output.settings[0].name != None - - output.settings[0].value != None - - output.settings[0].description != None - - output.settings[0].source != None - - output.settings | length == 1 - -- name: Gather facts MySQL Configuration - azure_rm_mysqlconfiguration_facts: - resource_group: "{{ resource_group }}" - server_name: mysqlsrv{{ rpfx }} - register: output -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.settings[0].id != None - - output.settings[0].name != None - - output.settings[0].value != None - - output.settings[0].description != None - - output.settings[0].source != None - - output.settings | length > 1 - -# -# clean up azure_rm_mysqlserver test -# - -- name: Delete instance of MySQL Server -- check mode - azure_rm_mysqlserver: - resource_group: "{{ resource_group }}" - name: mysqlsrv{{ rpfx }} - state: absent - check_mode: yes - register: output -- name: Assert the state has changed - assert: - that: - - output.changed - -- name: Delete instance of MySQL Server - azure_rm_mysqlserver: - resource_group: "{{ resource_group }}" - name: mysqlsrv{{ rpfx }} - state: absent - register: output -- name: Assert the state has changed - assert: - that: - - output.changed - -- name: Delete unexisting instance of MySQL Server - azure_rm_mysqlserver: - resource_group: "{{ resource_group }}" - name: mysqlsrv{{ rpfx }} - state: absent - register: output -- name: Assert the state has changed - assert: - that: - - output.changed == false - -- name: Delete second instance of MySQL Server - azure_rm_mysqlserver: - resource_group: "{{ resource_group }}" - name: mysqlsrv{{ rpfx }}second - state: absent - async: 400 - poll: 0 diff --git a/test/integration/targets/azure_rm_networkinterface/aliases b/test/integration/targets/azure_rm_networkinterface/aliases deleted file mode 100644 index 67f8675677..0000000000 --- a/test/integration/targets/azure_rm_networkinterface/aliases +++ /dev/null @@ -1,4 +0,0 @@ -cloud/azure -shippable/azure/group5 -destructive -azure_rm_applicationsecuritygroup
\ No newline at end of file diff --git a/test/integration/targets/azure_rm_networkinterface/meta/main.yml b/test/integration/targets/azure_rm_networkinterface/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_networkinterface/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_networkinterface/tasks/main.yml b/test/integration/targets/azure_rm_networkinterface/tasks/main.yml deleted file mode 100644 index bd7df0a29f..0000000000 --- a/test/integration/targets/azure_rm_networkinterface/tasks/main.yml +++ /dev/null @@ -1,554 +0,0 @@ -- name: Prepare random number - set_fact: - rpfx: "{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - applicationsecuritygroup_name1: "asg{{ resource_group | hash('md5') | truncate(5, True, '') }}{{ 1000 | random }}" - applicationsecuritygroup_name2: "asg{{ resource_group | hash('md5') | truncate(5, True, '') }}{{ 1000 | random }}" - nic_name1: "nic1{{ resource_group | hash('md5') | truncate(5, True, '') }}{{ 1000 | random }}" - run_once: yes - -- name: Create virtual network - azure_rm_virtualnetwork: - resource_group: "{{ resource_group_secondary }}" - name: "tn{{ rpfx }}" - address_prefixes: "10.10.0.0/16" - register: vn - -- name: Add subnet - azure_rm_subnet: - resource_group: "{{ resource_group_secondary }}" - name: "tn{{ rpfx }}" - address_prefix: "10.10.0.0/24" - virtual_network: "tn{{ rpfx }}" - -- name: create public ip - azure_rm_publicipaddress: - name: "pip{{ rpfx }}" - resource_group: '{{ resource_group }}' - -- name: create load balancer with multiple parameters - azure_rm_loadbalancer: - resource_group: '{{ resource_group }}' - name: "lb{{ rpfx }}" - frontend_ip_configurations: - - name: frontendipconf0 - public_ip_address: "pip{{ rpfx }}" - backend_address_pools: - - name: backendaddrpool0 - - name: backendaddrpool1 - probes: - - name: prob0 - port: 80 - inbound_nat_pools: - - name: inboundnatpool0 - frontend_ip_configuration_name: frontendipconf0 - protocol: Tcp - frontend_port_range_start: 80 - frontend_port_range_end: 81 - backend_port: 8080 - load_balancing_rules: - - name: lbrbalancingrule0 - frontend_ip_configuration: frontendipconf0 - backend_address_pool: backendaddrpool0 - frontend_port: 80 - backend_port: 80 - probe: prob0 - register: lb - -- name: Create most simple NIC with virtual_network id (check mode) - azure_rm_networkinterface: - resource_group: "{{ resource_group }}" - name: "tn{{ rpfx }}" - virtual_network: "{{ vn.state.id }}" - subnet: "tn{{ rpfx }}" - public_ip: False - create_with_security_group: False - register: output - check_mode: yes - -- assert: - that: - - output.changed - -- name: Create most simple NIC with virtual_network resource_group - azure_rm_networkinterface: - resource_group: "{{ resource_group }}" - name: "tn{{ rpfx }}" - virtual_network: - name: "tn{{ rpfx }}" - resource_group: "{{ resource_group_secondary }}" - subnet: "tn{{ rpfx }}" - public_ip: False - create_with_security_group: False - register: output - -- assert: - that: - - output.changed - - output.state.id - -- name: Get fact of the new created NIC - azure_rm_networkinterface_info: - resource_group: "{{ resource_group }}" - name: "tn{{ rpfx }}" - register: facts - -- assert: - that: - - "facts.networkinterfaces | length == 1" - - facts.networkinterfaces[0].id == output.state.id - - "facts.networkinterfaces[0].ip_configurations | length == 1" - - not facts.networkinterfaces[0].security_group - - not facts.networkinterfaces[0].ip_configurations[0].public_ip_address - - not facts.networkinterfaces[0].enable_ip_forwarding - - not facts.networkinterfaces[0].enable_accelerated_networking - -- name: Create most simple NIC with ip configurations (idempotent) - azure_rm_networkinterface: - resource_group: "{{ facts.networkinterfaces[0].resource_group }}" - name: "{{ facts.networkinterfaces[0].name }}" - virtual_network: "{{ facts.networkinterfaces[0].virtual_network }}" - create_with_security_group: False - ip_configurations: - - name: "{{ facts.networkinterfaces[0].ip_configurations[0].name }}" - private_ip_address: "{{ facts.networkinterfaces[0].ip_configurations[0].private_ip_address }}" - private_ip_allocation_method: "{{ facts.networkinterfaces[0].ip_configurations[0].private_ip_allocation_method }}" - primary: "{{ facts.networkinterfaces[0].ip_configurations[0].primary }}" - subnet: "{{ facts.networkinterfaces[0].subnet }}" - register: output - -- assert: - that: - - not output.changed - -- name: Create most simple NIC (idempotent) - azure_rm_networkinterface: - resource_group: "{{ resource_group }}" - name: "tn{{ rpfx }}" - virtual_network: "{{ vn.state.id }}" - subnet: "tn{{ rpfx }}" - create_with_security_group: False - public_ip: False - register: output - -- assert: - that: - - not output.changed - -- name: Update security group (check mode) - azure_rm_networkinterface: - resource_group: "{{ resource_group }}" - name: "tn{{ rpfx }}" - virtual_network: "{{ vn.state.id }}" - subnet: "tn{{ rpfx }}" - public_ip: False - security_group: "tn{{ rpfx }}sg" - register: output - check_mode: yes - -- assert: - that: - - output.changed - -- name: Update public ip address (check mode) - azure_rm_networkinterface: - resource_group: "{{ resource_group }}" - name: "tn{{ rpfx }}" - virtual_network: "{{ vn.state.id }}" - subnet: "tn{{ rpfx }}" - public_ip_address_name: "tn{{ rpfx }}" - create_with_security_group: False - register: output - check_mode: yes - -- assert: - that: - - output.changed - -- name: Update accelerated networking (check mode) - azure_rm_networkinterface: - resource_group: "{{ resource_group }}" - name: "tn{{ rpfx }}" - virtual_network: "{{ vn.state.id }}" - subnet: "tn{{ rpfx }}" - enable_accelerated_networking: True - create_with_security_group: False - public_ip: False - register: output - check_mode: yes - -- assert: - that: - - output.changed - -- name: Update IP forwarding networking (check mode) - azure_rm_networkinterface: - resource_group: "{{ resource_group }}" - name: "tn{{ rpfx }}" - virtual_network: "{{ vn.state.id }}" - subnet: "tn{{ rpfx }}" - create_with_security_group: False - enable_ip_forwarding: True - public_ip: False - register: output - check_mode: yes - -- assert: - that: - - output.changed - -- name: Update dns server (check mode) - azure_rm_networkinterface: - resource_group: "{{ resource_group }}" - name: "tn{{ rpfx }}" - virtual_network: "{{ vn.state.id }}" - subnet: "tn{{ rpfx }}" - create_with_security_group: False - public_ip: False - dns_servers: - - 8.9.10.11 - - 7.8.9.10 - register: output - check_mode: yes - -- assert: - that: - - output.changed - -- name: Update NIC - azure_rm_networkinterface: - resource_group: "{{ resource_group }}" - name: "tn{{ rpfx }}" - virtual_network: "{{ vn.state.id }}" - subnet: "tn{{ rpfx }}" - enable_accelerated_networking: True - enable_ip_forwarding: True - security_group: "tn{{ rpfx }}sg" - dns_servers: - - 8.9.10.11 - - 7.8.9.10 - ip_configurations: - - name: "{{ facts.networkinterfaces[0].ip_configurations[0].name }}" - private_ip_address: "{{ facts.networkinterfaces[0].ip_configurations[0].private_ip_address }}" - private_ip_allocation_method: "{{ facts.networkinterfaces[0].ip_configurations[0].private_ip_allocation_method }}" - primary: "{{ facts.networkinterfaces[0].ip_configurations[0].primary }}" - - name: ipconfig1 - public_ip_name: "tn{{ rpfx }}" - load_balancer_backend_address_pools: - - "{{ lb.state.backend_address_pools[0].id }}" - - name: backendaddrpool1 - load_balancer: "lb{{ rpfx }}" - register: output - -- assert: - that: - - output.changed - - output.state.dns_settings.dns_servers == ['8.9.10.11', '7.8.9.10'] - - output.state.enable_ip_forwarding - - output.state.network_security_group.name == "tn{{ rpfx }}sg" - - output.state.enable_accelerated_networking - -- name: Complicated NIC (idempontent) - azure_rm_networkinterface: - resource_group: "{{ resource_group }}" - name: "tn{{ rpfx }}" - virtual_network: "{{ vn.state.id }}" - subnet: "tn{{ rpfx }}" - enable_accelerated_networking: True - security_group: "tn{{ rpfx }}sg" - enable_ip_forwarding: True - dns_servers: - - 8.9.10.11 - - 7.8.9.10 - ip_configurations: - - name: "{{ facts.networkinterfaces[0].ip_configurations[0].name }}" - private_ip_address: "{{ facts.networkinterfaces[0].ip_configurations[0].private_ip_address }}" - private_ip_allocation_method: "{{ facts.networkinterfaces[0].ip_configurations[0].private_ip_allocation_method }}" - primary: "{{ facts.networkinterfaces[0].ip_configurations[0].primary }}" - - name: ipconfig1 - public_ip_name: "tn{{ rpfx }}" - load_balancer_backend_address_pools: - - "{{ lb.state.backend_address_pools[0].id }}" - - name: backendaddrpool1 - load_balancer: "lb{{ rpfx }}" - register: output - -- assert: - that: - - not output.changed - -- name: Get fact of the new created NIC - azure_rm_networkinterface_info: - resource_group: "{{ resource_group }}" - name: "tn{{ rpfx }}" - register: facts - -- assert: - that: - - "facts.networkinterfaces | length == 1" - - facts.networkinterfaces[0].id == output.state.id - - "facts.networkinterfaces[0].ip_configurations | length == 2" - - 'facts.networkinterfaces[0].security_group.endswith("tn{{ rpfx }}sg")' - - facts.networkinterfaces[0].enable_accelerated_networking - - facts.networkinterfaces[0].enable_ip_forwarding - -- name: Remove one dns server and ip configuration - azure_rm_networkinterface: - resource_group: "{{ resource_group }}" - name: "tn{{ rpfx }}" - virtual_network: "{{ vn.state.id }}" - subnet: "tn{{ rpfx }}" - security_group: "tn{{ rpfx }}sg" - enable_accelerated_networking: True - enable_ip_forwarding: True - dns_servers: - - 8.9.10.11 - ip_configurations: - - name: ipconfig1 - public_ip_name: "tn{{ rpfx }}" - primary: True - load_balancer_backend_address_pools: - - "{{ lb.state.backend_address_pools[0].id }}" - - name: backendaddrpool1 - load_balancer: "lb{{ rpfx }}" - register: output - -- assert: - that: - - output.changed - - output.state.dns_settings.dns_servers == ['8.9.10.11'] - - output.state.enable_ip_forwarding - - output.state.network_security_group.name == "tn{{ rpfx }}sg" - - "output.state.ip_configurations | length == 1" - - output.state.ip_configurations[0].public_ip_address.name == "tn{{ rpfx }}" - - output.state.enable_accelerated_networking - -- name: Create application security group(check mode) - azure_rm_applicationsecuritygroup: - resource_group: "{{ resource_group }}" - name: "{{ applicationsecuritygroup_name1 }}" - tags: - testing: testing - check_mode: yes - register: output - -- name: Assert check mode creation - assert: - that: - - output.changed - -- name: Create Application security group - azure_rm_applicationsecuritygroup: - resource_group: "{{ resource_group }}" - name: "{{ applicationsecuritygroup_name1 }}" - tags: - testing: testing - register: output - -- name: Assert application security group creation - assert: - that: - - output.changed - - output.id != '' - -- name: Get Application security group - azure_rm_applicationsecuritygroup_info: - resource_group: "{{ resource_group }}" - name: "{{ applicationsecuritygroup_name1 }}" - register: facts - -- name: Assert facts - assert: - that: - - facts['applicationsecuritygroups'] | length == 1 - - facts['applicationsecuritygroups'][0]['name'] != None - - facts['applicationsecuritygroups'][0]['location'] != None - - facts['applicationsecuritygroups'][0]['provisioning_state'] != None - -- name: Create application security group (idempotent) - azure_rm_applicationsecuritygroup: - resource_group: "{{ resource_group }}" - name: "{{ applicationsecuritygroup_name1 }}" - tags: - testing: testing - register: output - -- name: Assert idempotent - assert: - that: - - not output.changed - -- name: Update application security group - azure_rm_applicationsecuritygroup: - resource_group: "{{ resource_group }}" - name: "{{ applicationsecuritygroup_name1 }}" - tags: - testing: testing - foo: bar - register: output - -- name: Assert update - assert: - that: - - output.changed - -- name: Create Application security group in secondary resource group - azure_rm_applicationsecuritygroup: - resource_group: "{{ resource_group_secondary }}" - name: "{{ applicationsecuritygroup_name2 }}" - register: asg - -- name: Create Nic with application security groups - azure_rm_networkinterface: - resource_group: "{{ resource_group }}" - name: "{{ nic_name1 }}" - virtual_network: "{{ vn.state.id }}" - subnet: "tn{{ rpfx }}" - create_with_security_group: True - public_ip: False - ip_configurations: - - name: ipconfig1 - application_security_groups: - - "{{ applicationsecuritygroup_name1 }}" - - "{{ asg.id }}" - primary: True - register: output - -- name: assert creation succeeded - assert: - that: - - output.changed - -- name: Create Nic with application security groups (idempotent) - azure_rm_networkinterface: - resource_group: "{{ resource_group }}" - name: "{{ nic_name1 }}" - virtual_network: "{{ vn.state.id }}" - subnet: "tn{{ rpfx }}" - create_with_security_group: True - public_ip: False - ip_configurations: - - name: ipconfig1 - application_security_groups: - - "{{ asg.id }}" - - "{{ applicationsecuritygroup_name1 }}" - primary: True - register: output - -- name: assert idempotent - assert: - that: - - not output.changed - -- name: Update Nic with application security groups - azure_rm_networkinterface: - resource_group: "{{ resource_group }}" - name: "{{ nic_name1 }}" - virtual_network: "{{ vn.state.id }}" - subnet: "tn{{ rpfx }}" - create_with_security_group: True - public_ip: False - ip_configurations: - - name: ipconfig1 - application_security_groups: - - "{{ applicationsecuritygroup_name1 }}" - primary: True - register: output - -- name: assert update succeeded - assert: - that: - - output.changed - -- name: Get fact of the new created NIC - azure_rm_networkinterface_info: - resource_group: "{{ resource_group }}" - name: "{{ nic_name1 }}" - register: facts - -- assert: - that: - - "facts.networkinterfaces[0].ip_configurations[0].application_security_groups | length == 1" - -- name: Delete the NIC (check mode) - azure_rm_networkinterface: - resource_group: "{{ resource_group }}" - name: "tn{{ rpfx }}" - state: absent - check_mode: yes - register: output - -- assert: - that: - - output.changed - -- name: Delete the NIC - azure_rm_networkinterface: - resource_group: "{{ resource_group }}" - name: "tn{{ rpfx }}" - state: absent - register: output - -- assert: - that: - - output.changed - -- name: Delete the NIC (idempotent) - azure_rm_networkinterface: - resource_group: "{{ resource_group }}" - name: "tn{{ rpfx }}" - state: absent - register: output - -- assert: - that: - - not output.changed - -- name: delete load balancer - azure_rm_loadbalancer: - resource_group: '{{ resource_group }}' - name: "lb{{ rpfx }}" - state: absent - -- name: delete public ip - azure_rm_publicipaddress: - name: "pip{{ rpfx }}" - resource_group: '{{ resource_group }}' - state: absent - -- name: Delete the NIC - azure_rm_networkinterface: - resource_group: "{{ resource_group }}" - name: "{{ nic_name1 }}" - state: absent - -- name: Delete the application security group (check mode) - azure_rm_applicationsecuritygroup: - resource_group: "{{ resource_group }}" - name: "{{ applicationsecuritygroup_name1 }}" - state: absent - check_mode: yes - register: output - -- name: Assert delete check mode - assert: - that: - - output.changed - -- name: Delete the application security group - azure_rm_applicationsecuritygroup: - resource_group: "{{ resource_group }}" - name: "{{ applicationsecuritygroup_name1 }}" - state: absent - register: output - -- name: Assert the deletion - assert: - that: - - output.changed - -- name: Delete second application security group - azure_rm_applicationsecuritygroup: - resource_group: "{{ resource_group_secondary }}" - name: "{{ applicationsecuritygroup_name2 }}" - state: absent - register: output
\ No newline at end of file diff --git a/test/integration/targets/azure_rm_postgresqlserver/aliases b/test/integration/targets/azure_rm_postgresqlserver/aliases deleted file mode 100644 index ad065181b3..0000000000 --- a/test/integration/targets/azure_rm_postgresqlserver/aliases +++ /dev/null @@ -1,10 +0,0 @@ -cloud/azure -destructive -shippable/azure/group11 -azure_rm_postgresqlserver_facts -azure_rm_postgresqldatabase -azure_rm_postgresqldatabase_facts -azure_rm_postgresqlfirewallrule -azure_rm_postgresqlfirewallrule_facts -azure_rm_postgresqlserverconfiguration -azure_rm_postgresqlserverconfiguration_facts diff --git a/test/integration/targets/azure_rm_postgresqlserver/meta/main.yml b/test/integration/targets/azure_rm_postgresqlserver/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_postgresqlserver/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_postgresqlserver/tasks/main.yml b/test/integration/targets/azure_rm_postgresqlserver/tasks/main.yml deleted file mode 100644 index 9464e5d5bf..0000000000 --- a/test/integration/targets/azure_rm_postgresqlserver/tasks/main.yml +++ /dev/null @@ -1,610 +0,0 @@ -- name: Prepare random number - set_fact: - rpfx: "{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - run_once: yes - -- name: Create instance of PostgreSQL Server -- check mode - azure_rm_postgresqlserver: - resource_group: "{{ resource_group }}" - name: postgresqlsrv{{ rpfx }} - sku: - name: B_Gen5_1 - tier: Basic - location: westus2 - storage_mb: 51200 - enforce_ssl: True - admin_username: zimxyz - admin_password: Testpasswordxyz12! - check_mode: yes - register: output -- name: Assert the resource instance is well created - assert: - that: - - output.changed - -- name: Create instance of PostgreSQL Server - azure_rm_postgresqlserver: - resource_group: "{{ resource_group }}" - name: postgresqlsrv{{ rpfx }} - sku: - name: B_Gen5_1 - tier: Basic - location: westus2 - storage_mb: 51200 - enforce_ssl: True - admin_username: zimxyz - admin_password: Testpasswordxyz12! - register: output -- name: Assert the resource instance is well created - assert: - that: - - output.changed - - output.state == 'Ready' - -- name: Create again instance of PostgreSQL Server - azure_rm_postgresqlserver: - resource_group: "{{ resource_group }}" - name: postgresqlsrv{{ rpfx }} - sku: - name: B_Gen5_1 - tier: Basic - location: westus2 - storage_mb: 51200 - enforce_ssl: True - admin_username: zimxyz - admin_password: Testpasswordxyz12! - register: output -- name: Assert the state has not changed - assert: - that: - - output.changed == false - - output.state == 'Ready' - -- name: Update instance of PostgreSQL Server, change storage size - azure_rm_postgresqlserver: - resource_group: "{{ resource_group }}" - name: postgresqlsrv{{ rpfx }} - sku: - name: B_Gen5_1 - tier: Basic - location: westus2 - storage_mb: 128000 - enforce_ssl: True - admin_username: zimxyz - admin_password: Testpasswordxyz12! - register: output -- name: Assert the state has not changed - assert: - that: - - output.changed - - output.state == 'Ready' -- debug: - var: output - -- name: Gather facts postgresql Server - azure_rm_postgresqlserver_facts: - resource_group: "{{ resource_group }}" - name: postgresqlsrv{{ rpfx }} - register: output -- name: Assert that storage size is correct - assert: - that: - - output.servers[0]['storage_mb'] == 128000 - -- name: Create second instance of PostgreSQL Server - azure_rm_postgresqlserver: - resource_group: "{{ resource_group }}" - name: postgresqlsrv{{ rpfx }}second - sku: - name: B_Gen5_1 - tier: Basic - location: westus2 - storage_mb: 51200 - enforce_ssl: True - admin_username: zimxyz - admin_password: Testpasswordxyz12! - tags: - aaa: bbb - -- name: Create second instance of PostgreSQL Server -- add tags - azure_rm_postgresqlserver: - resource_group: "{{ resource_group }}" - name: postgresqlsrv{{ rpfx }}second - sku: - name: B_Gen5_1 - tier: Basic - location: westus2 - storage_mb: 51200 - enforce_ssl: True - admin_username: zimxyz - admin_password: Testpasswordxyz12! - tags: - ccc: ddd - -- name: Gather facts PostgreSQL Server - azure_rm_postgresqlserver_facts: - resource_group: "{{ resource_group }}" - name: postgresqlsrv{{ rpfx }}second - register: output - -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.servers[0]['id'] != None - - output.servers[0]['name'] != None - - output.servers[0]['location'] != None - - output.servers[0]['sku']['name'] != None - - output.servers[0]['sku']['tier'] != None - - output.servers[0]['sku']['capacity'] != None - - output.servers[0]['version'] != None - - output.servers[0]['user_visible_state'] != None - - output.servers[0]['fully_qualified_domain_name'] != None - - output.servers[0]['tags']['aaa'] == 'bbb' - - output.servers[0]['tags']['ccc'] == 'ddd' - -- name: Gather facts PostgreSQL Server - azure_rm_postgresqlserver_facts: - resource_group: "{{ resource_group }}" - register: output -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.servers[0]['id'] != None - - output.servers[0]['name'] != None - - output.servers[0]['location'] != None - - output.servers[0]['sku']['name'] != None - - output.servers[0]['sku']['tier'] != None - - output.servers[0]['sku']['capacity'] != None - - output.servers[0]['version'] != None - - output.servers[0]['user_visible_state'] != None - - output.servers[0]['fully_qualified_domain_name'] != None - - output.servers[1]['id'] != None - - output.servers[1]['name'] != None - - output.servers[1]['location'] != None - - output.servers[1]['sku']['name'] != None - - output.servers[1]['sku']['tier'] != None - - output.servers[1]['sku']['capacity'] != None - - output.servers[1]['version'] != None - - output.servers[1]['user_visible_state'] != None - - output.servers[1]['fully_qualified_domain_name'] != None - -# -# azure_rm_postgresqldatabase tests below -# -- name: Create instance of PostgreSQL Database -- check mode - azure_rm_postgresqldatabase: - resource_group: "{{ resource_group }}" - server_name: postgresqlsrv{{ rpfx }} - name: testdatabase - charset: UTF8 - collation: English_United States.1252 - check_mode: yes - register: output -- name: Assert the resource instance is well created - assert: - that: - - output.changed - -- name: Create instance of PostgreSQL Database - azure_rm_postgresqldatabase: - resource_group: "{{ resource_group }}" - server_name: postgresqlsrv{{ rpfx }} - name: testdatabase - charset: UTF8 - collation: English_United States.1252 - register: output -- name: Assert the resource instance is well created - assert: - that: - - output.changed - - output.name == 'testdatabase' - -- name: Create again instance of PostgreSQL Database - azure_rm_postgresqldatabase: - resource_group: "{{ resource_group }}" - server_name: postgresqlsrv{{ rpfx }} - name: testdatabase - charset: UTF8 - collation: English_United States.1252 - register: output -- name: Assert the state has not changed - assert: - that: - - output.changed == false - - output.name == 'testdatabase' - -- name: Try to update PostgreSQL Database without force_update - azure_rm_postgresqldatabase: - resource_group: "{{ resource_group }}" - server_name: postgresqlsrv{{ rpfx }} - name: testdatabase - charset: WIN1252 - collation: SQL_Latin1_General_CP1_CS_AS - ignore_errors: yes - register: output -- name: Assert that nothing has changed - assert: - that: - - output.changed == False - -- name: Try to update PostgreSQL Database with force_update - azure_rm_postgresqldatabase: - resource_group: "{{ resource_group }}" - server_name: postgresqlsrv{{ rpfx }} - name: testdatabase - charset: WIN1252 - collation: SQL_Latin1_General_CP1_CS_AS - force_update: yes - register: output -- name: Assert the state has changed - assert: - that: - - output.changed - - output.name == 'testdatabase' - -- name: Create second instance of PostgreSQL Database - azure_rm_postgresqldatabase: - resource_group: "{{ resource_group }}" - server_name: postgresqlsrv{{ rpfx }} - name: testdatabase2 - -- name: Gather facts PostgreSQL Database - azure_rm_postgresqldatabase_facts: - resource_group: "{{ resource_group }}" - server_name: postgresqlsrv{{ rpfx }} - name: testdatabase - register: output - -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.databases[0]['server_name'] != None - - output.databases[0]['name'] != None - - output.databases[0]['charset'] != None - - output.databases[0]['collation'] != None - -- name: Gather facts PostgreSQL Database - azure_rm_postgresqldatabase_facts: - resource_group: "{{ resource_group }}" - server_name: postgresqlsrv{{ rpfx }} - register: output -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.databases[0]['server_name'] != None - - output.databases[0]['name'] != None - - output.databases[0]['charset'] != None - - output.databases[0]['collation'] != None - - output.databases[1]['server_name'] != None - - output.databases[1]['name'] != None - - output.databases[1]['charset'] != None - - output.databases[1]['collation'] != None - -- name: Delete instance of PostgreSQL Database -- check mode - azure_rm_postgresqldatabase: - resource_group: "{{ resource_group }}" - server_name: postgresqlsrv{{ rpfx }} - name: testdatabase - state: absent - check_mode: yes - register: output -- name: Assert the state has changed - assert: - that: - - output.changed - -- name: Delete instance of PostgreSQL Database - azure_rm_postgresqldatabase: - resource_group: "{{ resource_group }}" - server_name: postgresqlsrv{{ rpfx }} - name: testdatabase - state: absent - register: output -- name: Assert the state has changed - assert: - that: - - output.changed - -- name: Delete unexisting instance of PostgreSQL Database - azure_rm_postgresqldatabase: - resource_group: "{{ resource_group }}" - server_name: postgresqlsrv{{ rpfx }} - name: testdatabase - state: absent - register: output -- name: Assert the state has changed - assert: - that: - - output.changed == false - -# -# azure_rm_postgresqlfirewallrule -# - -- name: Create instance of Firewall Rule -- check mode - azure_rm_postgresqlfirewallrule: - resource_group: "{{ resource_group }}" - server_name: postgresqlsrv{{ rpfx }} - name: firewallrule{{ rpfx }} - start_ip_address: 172.28.10.136 - end_ip_address: 172.28.10.138 - check_mode: yes - register: output -- name: Assert the resource instance is well created - assert: - that: - - output.changed - -- name: Create instance of Firewall Rule - azure_rm_postgresqlfirewallrule: - resource_group: "{{ resource_group }}" - server_name: postgresqlsrv{{ rpfx }} - name: firewallrule{{ rpfx }} - start_ip_address: 172.28.10.136 - end_ip_address: 172.28.10.138 - register: output -- name: Assert the resource instance is well created - assert: - that: - - output.changed - -- name: Create again instance of Firewall Rule - azure_rm_postgresqlfirewallrule: - resource_group: "{{ resource_group }}" - server_name: postgresqlsrv{{ rpfx }} - name: firewallrule{{ rpfx }} - start_ip_address: 172.28.10.136 - end_ip_address: 172.28.10.138 - register: output -- name: Assert the state has not changed - assert: - that: - - output.changed == false - -- name: Create Firewall Rule - second - azure_rm_postgresqlfirewallrule: - resource_group: "{{ resource_group }}" - server_name: postgresqlsrv{{ rpfx }} - name: firewallrule{{ rpfx }}second - start_ip_address: 172.28.10.136 - end_ip_address: 172.28.10.138 - -- name: Gather facts PostgreSQL Firewall Rule - azure_rm_postgresqlfirewallrule_facts: - resource_group: "{{ resource_group }}" - server_name: postgresqlsrv{{ rpfx }} - name: firewallrule{{ rpfx }} - register: output -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.rules[0].id != None - - output.rules[0].server_name != None - - output.rules[0].name != None - - output.rules[0].start_ip_address != None - - output.rules[0].end_ip_address != None - - "output.rules | length == 1" - -- name: Gather facts PostgreSQL Firewall Rule - azure_rm_postgresqlfirewallrule_facts: - resource_group: "{{ resource_group }}" - server_name: postgresqlsrv{{ rpfx }} - register: output -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.rules[0].id != None - - output.rules[0].server_name != None - - output.rules[0].name != None - - output.rules[0].start_ip_address != None - - output.rules[0].end_ip_address != None - - output.rules[1].id != None - - output.rules[1].name != None - - output.rules[1].start_ip_address != None - - output.rules[1].end_ip_address != None - - "output.rules | length == 2" - -- name: Delete instance of Firewall Rule -- check mode - azure_rm_postgresqlfirewallrule: - resource_group: "{{ resource_group }}" - server_name: postgresqlsrv{{ rpfx }} - name: firewallrule{{ rpfx }} - state: absent - check_mode: yes - register: output -- name: Assert the state has changed - assert: - that: - - output.changed - -- name: Delete instance of Firewall Rule - azure_rm_postgresqlfirewallrule: - resource_group: "{{ resource_group }}" - server_name: postgresqlsrv{{ rpfx }} - name: firewallrule{{ rpfx }} - state: absent - register: output -- name: Assert the state has changed - assert: - that: - - output.changed - -- name: Delete unexisting instance of Firewall Rule - azure_rm_postgresqlfirewallrule: - resource_group: "{{ resource_group }}" - server_name: postgresqlsrv{{ rpfx }} - name: firewallrule{{ rpfx }} - state: absent - register: output -- name: Assert the state has changed - assert: - that: - - output.changed == false - -- name: Delete instance of Firewall Rule - second - azure_rm_postgresqlfirewallrule: - resource_group: "{{ resource_group }}" - server_name: postgresqlsrv{{ rpfx }} - name: firewallrule{{ rpfx }}second - state: absent - -- name: Gather facts PostgreSQL Firewall Rule - azure_rm_postgresqlfirewallrule_facts: - resource_group: "{{ resource_group }}" - server_name: postgresqlsrv{{ rpfx }} - name: firewallrule{{ rpfx }} - register: output -- name: Assert that empty list was returned - assert: - that: - - output.changed == False - - "output.rules | length == 0" - -# -# azure_rm_postgresql_configuration -# -- name: Create instance of Configuration -- check mode - azure_rm_postgresqlconfiguration: - resource_group: "{{ resource_group }}" - server_name: postgresqlsrv{{ rpfx }} - name: deadlock_timeout - value: 2000 - check_mode: yes - register: output -- name: Assert that change was registered - assert: - that: - - output.changed - -- name: Try to change default configuration - azure_rm_postgresqlconfiguration: - resource_group: "{{ resource_group }}" - server_name: postgresqlsrv{{ rpfx }} - name: deadlock_timeout - value: 2000 - register: output -- name: Assert that change was registered - assert: - that: - - output.changed - -- name: Try to change default configuration -- idempotent - azure_rm_postgresqlconfiguration: - resource_group: "{{ resource_group }}" - server_name: postgresqlsrv{{ rpfx }} - name: deadlock_timeout - value: 2000 - register: output -- name: Assert that change was not registered - assert: - that: - - not output.changed - -- name: Try to reset configuration - azure_rm_postgresqlconfiguration: - resource_group: "{{ resource_group }}" - server_name: postgresqlsrv{{ rpfx }} - name: deadlock_timeout - state: absent - register: output -- name: Assert that change was registered - assert: - that: - - output.changed - -- name: Try to reset configuration -- idempotent - azure_rm_postgresqlconfiguration: - resource_group: "{{ resource_group }}" - server_name: postgresqlsrv{{ rpfx }} - name: deadlock_timeout - state: absent - register: output -- name: Assert that change was registered - assert: - that: - - not output.changed - -- name: Gather facts PostgreSQL Configuration - azure_rm_postgresqlconfiguration_facts: - resource_group: "{{ resource_group }}" - server_name: postgresqlsrv{{ rpfx }} - name: deadlock_timeout - register: output -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.settings[0].id != None - - output.settings[0].name != None - - output.settings[0].value != None - - output.settings[0].description != None - - output.settings[0].source != None - - output.settings | length == 1 - -- name: Gather facts PostgreSQL Configuration - azure_rm_postgresqlconfiguration_facts: - resource_group: "{{ resource_group }}" - server_name: postgresqlsrv{{ rpfx }} - register: output -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.settings[0].id != None - - output.settings[0].name != None - - output.settings[0].value != None - - output.settings[0].description != None - - output.settings[0].source != None - - output.settings | length > 1 - -# -# azure_rm_postgresqlserver continuation / clean up -# - -- name: Delete instance of PostgreSQL Server -- check mode - azure_rm_postgresqlserver: - resource_group: "{{ resource_group }}" - name: postgresqlsrv{{ rpfx }} - state: absent - check_mode: yes - register: output -- name: Assert the state has changed - assert: - that: - - output.changed - -- name: Delete instance of PostgreSQL Server - azure_rm_postgresqlserver: - resource_group: "{{ resource_group }}" - name: postgresqlsrv{{ rpfx }} - state: absent - register: output -- name: Assert the state has changed - assert: - that: - - output.changed - -- name: Delete unexisting instance of PostgreSQL Server - azure_rm_postgresqlserver: - resource_group: "{{ resource_group }}" - name: postgresqlsrv{{ rpfx }} - state: absent - register: output -- name: Assert the state has changed - assert: - that: - - output.changed == false - -- name: Delete second instance of PostgreSQL Server - azure_rm_postgresqlserver: - resource_group: "{{ resource_group }}" - name: postgresqlsrv{{ rpfx }}second - state: absent - async: 400 - poll: 0 diff --git a/test/integration/targets/azure_rm_publicipaddress/aliases b/test/integration/targets/azure_rm_publicipaddress/aliases deleted file mode 100644 index 7b5d7f9851..0000000000 --- a/test/integration/targets/azure_rm_publicipaddress/aliases +++ /dev/null @@ -1,4 +0,0 @@ -cloud/azure -shippable/azure/group2 -destructive -azure_rm_publicipaddress_facts diff --git a/test/integration/targets/azure_rm_publicipaddress/meta/main.yml b/test/integration/targets/azure_rm_publicipaddress/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_publicipaddress/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_publicipaddress/tasks/main.yml b/test/integration/targets/azure_rm_publicipaddress/tasks/main.yml deleted file mode 100644 index a5f929b0a3..0000000000 --- a/test/integration/targets/azure_rm_publicipaddress/tasks/main.yml +++ /dev/null @@ -1,113 +0,0 @@ -- name: Create domain name - set_fact: - domain_name: "ansible-{{ resource_group | hash('md5') | truncate(24, True, '') }}" - rpfx: "{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - -- name: Remove public ip - azure_rm_publicipaddress: - resource_group: "{{ resource_group }}" - name: "pip{{ rpfx }}" - state: absent - -- name: Create public ip - azure_rm_publicipaddress: - resource_group: "{{ resource_group }}" - name: "pip{{ rpfx }}" - allocation_method: Static - domain_name: "{{ domain_name }}" - tags: - testing: testing - delete: on-exit - register: output - -- assert: - that: - - output.state.public_ip_allocation_method == 'static' - - output.state.dns_settings.domain_name_label == domain_name - - output.state.tags | length == 2 - - output.state.tags.testing == 'testing' - -- name: Should be idempotent - azure_rm_publicipaddress: - resource_group: "{{ resource_group }}" - name: "pip{{ rpfx }}" - allocation_method: static - domain_name: "{{ domain_name }}" - register: output - -- assert: - that: not output.changed - -- name: Update tags - azure_rm_publicipaddress: - resource_group: "{{ resource_group }}" - name: "pip{{ rpfx }}" - allocation_method: static - domain_name: "{{ domain_name }}" - append_tags: yes - tags: - delete: never - foo: bar - register: output - -- assert: - that: - - output.state.tags | length == 3 - - output.state.tags.delete == 'never' - -- name: Gather facts, filtering by tag - azure_rm_publicipaddress_facts: - resource_group: "{{ resource_group }}" - tags: - - testing - - foo:bar - -- assert: - that: azure_publicipaddresses | length == 1 - -- name: Purge all tags - azure_rm_publicipaddress: - resource_group: "{{ resource_group }}" - name: "pip{{ rpfx }}" - allocation_method: static - domain_name: "{{ domain_name }}" - append_tags: no - register: output - -- assert: - that: - - output.state.tags | length == 0 - -- name: Gather facts for a public ip - azure_rm_publicipaddress_facts: - resource_group: "{{ resource_group }}" - name: "pip{{ rpfx }}" - register: pip - -- assert: - that: - - "pip.publicipaddresses | length == 1" - - pip.publicipaddresses[0].name == "pip{{ rpfx }}" - - pip.publicipaddresses[0].allocation_method == 'static' - - pip.publicipaddresses[0].dns_settings.domain_name_label == domain_name - -- name: Gather facts for all public ips - azure_rm_publicipaddress_facts: - resource_group: "{{ resource_group }}" - -- assert: - that: azure_publicipaddresses | length > 0 - -- name: Remove public ip - azure_rm_publicipaddress: - resource_group: "{{ resource_group }}" - name: "pip{{ rpfx }}" - state: absent - -- name: Gather facts for a public ip - azure_rm_publicipaddress_facts: - resource_group: "{{ resource_group }}" - name: "pip{{ rpfx }}" - -- assert: - that: azure_publicipaddresses | length == 0 diff --git a/test/integration/targets/azure_rm_rediscache/aliases b/test/integration/targets/azure_rm_rediscache/aliases deleted file mode 100644 index 09552ffcbb..0000000000 --- a/test/integration/targets/azure_rm_rediscache/aliases +++ /dev/null @@ -1,5 +0,0 @@ -cloud/azure -shippable/azure/group2 -destructive -azure_rm_rediscache_facts -azure_rm_rediscachefirewallrule diff --git a/test/integration/targets/azure_rm_rediscache/meta/main.yml b/test/integration/targets/azure_rm_rediscache/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_rediscache/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_rediscache/tasks/main.yml b/test/integration/targets/azure_rm_rediscache/tasks/main.yml deleted file mode 100644 index dc0c61f39f..0000000000 --- a/test/integration/targets/azure_rm_rediscache/tasks/main.yml +++ /dev/null @@ -1,317 +0,0 @@ -- name: Fix resource prefix - set_fact: - redis_name: "redis-{{ resource_group | hash('md5') | truncate(7, True, '') }}-{{ 1000 | random }}" - vnet_name: "vnet-{{ resource_group | hash('md5') | truncate(7, True, '') }}-{{ 1000 | random }}" - subnet_name: "subnet-{{ resource_group | hash('md5') | truncate(7, True, '') }}-{{ 1000 | random }}" - rule_name: "rule1" - run_once: yes - -- name: Create a redis cache (Check Mode) - azure_rm_rediscache: - resource_group: "{{ resource_group }}" - name: "{{ redis_name }}" - sku: - name: basic - size: C1 - wait_for_provisioning: False - check_mode: yes - register: output - -- name: Assert creating redis cache check mode - assert: - that: - - output.changed - -- name: Create a redis cache - azure_rm_rediscache: - resource_group: "{{ resource_group }}" - name: "{{ redis_name }}" - sku: - name: basic - size: C1 - wait_for_provisioning: False - register: output - -- name: Assert creating redis cache - assert: - that: - - output.changed - - output.id - -- name: Get facts - azure_rm_rediscache_facts: - resource_group: "{{ resource_group }}" - name: "{{ redis_name }}" - register: facts - -- name: Assert facts - assert: - that: - - facts.rediscaches | length == 1 - - facts.rediscaches[0].id != None - - facts.rediscaches[0].host_name != None - - facts.rediscaches[0].provisioning_state != None - - facts.rediscaches[0].sku.name == 'basic' - - facts.rediscaches[0].sku.size == 'C1' - -- name: Update the redis cache (idempotent) - azure_rm_rediscache: - resource_group: "{{ resource_group }}" - name: "{{ redis_name }}" - sku: - name: basic - size: C1 - wait_for_provisioning: False - register: output - -- name: assert output not changed - assert: - that: - - not output.changed - -- name: long-running rediscache tests [run with `--tags long_run,untagged` to enable] - # creating redis Cache costs about 20 mins async operation, - # need to poll status from Creating to Running, then able to perform updating/deleting operation, - # otherwise, will met error: - # "The resource '<resource_id>' is busy processing a previous update request or is undergoing system maintenance. - # As such, it is currently unable to accept the update request. Please try again later." - block: - - name: Wait for Redis provisioning to complete - azure_rm_rediscache_facts: - resource_group: "{{ resource_group }}" - name: "{{ redis_name }}" - register: facts - until: facts.rediscaches[0]['provisioning_state'] == 'Succeeded' - retries: 30 - delay: 60 - - - name: (actually) update redis cache - azure_rm_rediscache: - resource_group: "{{ resource_group }}" - name: "{{ redis_name }}" - sku: - name: basic - size: C1 - enable_non_ssl_port: true - tags: - testing: foo - wait_for_provisioning: True - register: output - - - name: assert output changed - assert: - that: - - output.changed - - - name: Update redis cache configuration - azure_rm_rediscache: - resource_group: "{{ resource_group }}" - name: "{{ redis_name }}" - sku: - name: basic - size: C1 - enable_non_ssl_port: True - maxmemory_policy: allkeys_lru - tags: - testing: foo - register: output - - - name: assert output changed - assert: - that: - - output.changed - - - name: Scale up the redis cache - azure_rm_rediscache: - resource_group: "{{ resource_group }}" - name: "{{ redis_name }}" - sku: - name: standard - size: C1 - tags: - testing: foo - wait_for_provisioning: True - register: output - - - assert: - that: - - output.changed - - - name: Force reboot redis cache - azure_rm_rediscache: - resource_group: "{{ resource_group }}" - name: "{{ redis_name }}" - reboot: - reboot_type: all - register: output - - - assert: - that: - - output.changed - - - name: Delete the redis cache (Check Mode) - azure_rm_rediscache: - resource_group: "{{ resource_group }}" - name: "{{ redis_name }}" - state: absent - check_mode: yes - register: output - - - name: assert deleting redis cache check mode - assert: - that: output.changed - - - name: Delete the redis cache - azure_rm_rediscache: - resource_group: "{{ resource_group }}" - name: "{{ redis_name }}" - state: absent - register: output - - - assert: - that: - - output.changed - tags: [long_run, never] - - -- name: Create virtual network - azure_rm_virtualnetwork: - resource_group: "{{ resource_group }}" - name: "{{ vnet_name }}" - address_prefixes: "10.10.0.0/16" - -- name: Add subnet - azure_rm_subnet: - resource_group: "{{ resource_group }}" - name: "{{ subnet_name }}" - address_prefix: "10.10.0.0/24" - virtual_network: "{{ vnet_name }}" - -- name: Create redis with subnet - azure_rm_rediscache: - resource_group: "{{ resource_group }}" - name: "{{ redis_name }}2" - sku: - name: premium - size: P1 - subnet: - name: "{{ subnet_name }}" - virtual_network_name: "{{ vnet_name }}" - wait_for_provisioning: False - register: output - -- name: Assert creating redis cache - assert: - that: - - output.changed - - output.id - -- name: Get facts - azure_rm_rediscache_facts: - resource_group: "{{ resource_group }}" - name: "{{ redis_name }}2" - return_access_keys: True - register: facts - -- name: Assert facts - assert: - that: - - facts.rediscaches | length == 1 - - facts.rediscaches[0].subnet != None - - facts.rediscaches[0].access_keys.primary != None - -- name: Create firewall rule (Check mode) - azure_rm_rediscachefirewallrule: - resource_group: "{{ resource_group }}" - cache_name: "{{ redis_name }}2" - name: "{{ rule_name }}" - start_ip_address: 192.168.1.1 - end_ip_address: 192.168.1.4 - check_mode: yes - register: output - -- name: Assert check mode creation - assert: - that: - - output.changed - - -- name: long-running rediscachefirewallrule tests [run with `--tags long_run,untagged` to enable] -# Creating firewall rule need Redis status is running, while creating redis Cache costs about 20 mins async operation, -# need to poll status from Creating to Running, then able to perform firewall rule creating, -# otherwise, will met error: -# "Error creating/updating Firewall rule of Azure Cache for Redis: Azure Error: Conflict\nMessage: The resource -# '/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/myResourceGroup/providers/Microsoft.Cache/Redis/myRedis' is busy processing -# a previous update request or is undergoing system maintenance. As such, it is currently unable to accept the update request. Please try again later." - block: - - name: Wait for Redis provisioning to complete - azure_rm_rediscache_facts: - resource_group: "{{ resource_group }}" - name: "{{ redis_name }}2" - register: facts - until: facts.rediscaches[0]['provisioning_state'] == 'Succeeded' - retries: 30 - delay: 60 - - - name: Create firewall rule - azure_rm_rediscachefirewallrule: - resource_group: "{{ resource_group }}" - cache_name: "{{ redis_name }}2" - name: "{{ rule_name }}" - start_ip_address: 192.168.1.1 - end_ip_address: 192.168.1.4 - register: output - - - name: Assert creation - assert: - that: - - output.changed - - output.id - - - name: Update firewall rule idempotence - azure_rm_rediscachefirewallrule: - resource_group: "{{ resource_group }}" - cache_name: "{{ redis_name }}2" - name: "{{ rule_name }}" - start_ip_address: 192.168.1.1 - end_ip_address: 192.168.1.4 - register: output - - - name: Assert idempotence - assert: - that: - - output.changed == False - - - name: Update firewall rule - azure_rm_rediscachefirewallrule: - resource_group: "{{ resource_group }}" - cache_name: "{{ redis_name }}2" - name: "{{ rule_name }}" - end_ip_address: 192.168.1.5 - register: output - - - name: Assert updating - assert: - that: - - output.changed - - - name: Delete firewall rule - azure_rm_rediscachefirewallrule: - resource_group: "{{ resource_group }}" - cache_name: "{{ redis_name }}2" - name: "{{ rule_name }}" - state: absent - register: output - - - name: Assert deletion - assert: - that: - - output.changed - - - name: Delete the redis cache - azure_rm_rediscache: - resource_group: "{{ resource_group }}" - name: "{{ redis_name }}2" - state: absent - register: output - tags: [long_run, never]
\ No newline at end of file diff --git a/test/integration/targets/azure_rm_resource/aliases b/test/integration/targets/azure_rm_resource/aliases deleted file mode 100644 index 49acfee76c..0000000000 --- a/test/integration/targets/azure_rm_resource/aliases +++ /dev/null @@ -1,3 +0,0 @@ -cloud/azure -destructive -shippable/azure/group2 diff --git a/test/integration/targets/azure_rm_resource/meta/main.yml b/test/integration/targets/azure_rm_resource/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_resource/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_resource/tasks/main.yml b/test/integration/targets/azure_rm_resource/tasks/main.yml deleted file mode 100644 index 7c3024a5ef..0000000000 --- a/test/integration/targets/azure_rm_resource/tasks/main.yml +++ /dev/null @@ -1,158 +0,0 @@ -- name: Prepare random number - set_fact: - nsgname: "{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - storageaccountname: "stacc{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - dbname: "mdb{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - run_once: yes - -- name: Call REST API - azure_rm_resource: - api_version: '2018-02-01' - resource_group: "{{ resource_group }}" - provider: network - resource_type: networksecuritygroups - resource_name: "{{ nsgname }}" - body: - location: eastus - idempotency: yes - register: output - -- name: Assert that something has changed - assert: - that: output.changed - -- name: Call REST API - azure_rm_resource: - api_version: '2018-02-01' - resource_group: "{{ resource_group }}" - provider: network - resource_type: networksecuritygroups - resource_name: "{{ nsgname }}" - body: - location: eastus - idempotency: yes - register: output - -- name: Assert that nothing has changed - assert: - that: not output.changed - -- name: Call REST API - azure_rm_resource: - api_version: '2018-02-01' - resource_group: "{{ resource_group }}" - provider: network - resource_type: networksecuritygroups - resource_name: "{{ nsgname }}" - body: - location: eastus - tags: - a: "abc" - b: "cde" - idempotency: yes - register: output - -- name: Assert that something has changed - assert: - that: output.changed - -- name: Try to get information about account - azure_rm_resource_facts: - api_version: '2018-02-01' - resource_group: "{{ resource_group }}" - provider: network - resource_type: networksecuritygroups - resource_name: "{{ nsgname }}" - register: output - -- name: Assert value was returned - assert: - that: - - not output.changed - - output.response[0]['name'] != None - - output.response | length == 1 - -- name: Try to query a list - azure_rm_resource_facts: - api_version: '2018-02-01' - resource_group: "{{ resource_group }}" - provider: network - resource_type: networksecuritygroups - register: output -- name: Assert value was returned - assert: - that: - - not output.changed - - output.response[0]['name'] != None - - output.response | length >= 1 - -- name: Try to query a list - same without API version - azure_rm_resource_facts: - resource_group: "{{ resource_group }}" - provider: network - resource_type: networksecuritygroups - register: output -- name: Assert value was returned - assert: - that: - - not output.changed - - output.response[0]['name'] != None - - output.response | length >= 1 - -- name: Query all the resources in the resource group - azure_rm_resource_facts: - resource_group: "{{ resource_group }}" - resource_type: resources - register: output -- name: Assert value was returned - assert: - that: - - not output.changed - - output.response | length >= 1 - -- name: Create storage account that requires LRO polling - azure_rm_resource: - polling_timeout: 600 - polling_interval: 60 - api_version: '2018-07-01' - resource_group: "{{ resource_group }}" - provider: Storage - resource_type: storageAccounts - resource_name: "{{ storageaccountname }}" - body: - sku: - name: Standard_GRS - kind: Storage - location: eastus - register: output - -- name: Assert that storage was successfully created - assert: - that: "output['response']['name'] == '{{ storageaccountname }}'" - - -- name: Try to storage keys -- special case when subresource part has no name - azure_rm_resource: - resource_group: "{{ resource_group }}" - provider: storage - resource_type: storageAccounts - resource_name: "{{ storageaccountname }}" - subresource: - - type: listkeys - api_version: '2018-03-01-preview' - method: POST - register: keys - -- name: Assert that key was returned - assert: - that: keys['response']['keys'][0]['value'] | length > 0 - -- name: Delete storage - without API version - azure_rm_resource: - polling_timeout: 600 - polling_interval: 60 - method: DELETE - resource_group: "{{ resource_group }}" - provider: Storage - resource_type: storageAccounts - resource_name: "{{ storageaccountname }}" diff --git a/test/integration/targets/azure_rm_resourcegroup/aliases b/test/integration/targets/azure_rm_resourcegroup/aliases deleted file mode 100644 index 0dbbfcebab..0000000000 --- a/test/integration/targets/azure_rm_resourcegroup/aliases +++ /dev/null @@ -1,4 +0,0 @@ -cloud/azure -shippable/azure/group3 -destructive -azure_rm_resourcegroup_info diff --git a/test/integration/targets/azure_rm_resourcegroup/meta/main.yml b/test/integration/targets/azure_rm_resourcegroup/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_resourcegroup/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_resourcegroup/tasks/main.yml b/test/integration/targets/azure_rm_resourcegroup/tasks/main.yml deleted file mode 100644 index 238509695f..0000000000 --- a/test/integration/targets/azure_rm_resourcegroup/tasks/main.yml +++ /dev/null @@ -1,39 +0,0 @@ -- name: Get resource group info - azure_rm_resourcegroup_info: - register: rg - -- assert: - that: - - rg.resourcegroups | length >= 1 - -- name: Get resource group info - azure_rm_resourcegroup_info: - name: "{{ resource_group }}" - list_resources: yes - register: rg - -- assert: - that: - - rg.resourcegroups | length == 1 - - rg.resourcegroups[0].resources | length >= 0 - -- name: Create resource group (idempontent) - azure_rm_resourcegroup: - name: "{{ resource_group }}" - location: "{{ rg.resourcegroups[0].location }}" - register: output - -- assert: - that: - - not output.changed - -- name: delete resource group - azure_rm_resourcegroup: - name: "{{ resource_group }}" - state: absent - check_mode: yes - register: output - -- assert: - that: - - output.changed
\ No newline at end of file diff --git a/test/integration/targets/azure_rm_roledefinition/aliases b/test/integration/targets/azure_rm_roledefinition/aliases deleted file mode 100644 index 35b9401151..0000000000 --- a/test/integration/targets/azure_rm_roledefinition/aliases +++ /dev/null @@ -1,3 +0,0 @@ -cloud/azure -destructive -unsupported
\ No newline at end of file diff --git a/test/integration/targets/azure_rm_roledefinition/meta/main.yml b/test/integration/targets/azure_rm_roledefinition/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_roledefinition/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_roledefinition/tasks/main.yml b/test/integration/targets/azure_rm_roledefinition/tasks/main.yml deleted file mode 100644 index f024dd5a49..0000000000 --- a/test/integration/targets/azure_rm_roledefinition/tasks/main.yml +++ /dev/null @@ -1,207 +0,0 @@ -- name: Fix resource prefix - set_fact: - role_name: "{{ (resource_group | replace('-','x'))[-8:] }}{{ 1000 | random }}testrole" - subscription_id: "{{ lookup('env','AZURE_SUBSCRIPTION_ID') }}" - principal_id: "{{ lookup('env','AZURE_CLIENT_ID') }}" - run_once: yes - -- name: Create a role definition (Check Mode) - azure_rm_roledefinition: - name: "{{ role_name }}" - scope: "/subscriptions/{{ subscription_id }}/resourceGroups/{{ resource_group }}" - permissions: - - actions: - - "Microsoft.Compute/virtualMachines/read" - not_actions: - - "Microsoft.Compute/virtualMachines/write" - data_actions: - - "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/read" - not_data_actions: - - "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/write" - assignable_scopes: - - "/subscriptions/{{ subscription_id }}/resourceGroups/{{ resource_group }}" - check_mode: yes - register: output - -- name: Assert creating role definition check mode - assert: - that: - - output.changed - -- name: Create a role definition - azure_rm_roledefinition: - name: "{{ role_name }}" - scope: "/subscriptions/{{ subscription_id }}/resourceGroups/{{ resource_group }}" - permissions: - - actions: - - "Microsoft.Compute/virtualMachines/read" - not_actions: - - "Microsoft.Compute/virtualMachines/write" - data_actions: - - "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/read" - not_data_actions: - - "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/write" - assignable_scopes: - - "/subscriptions/{{ subscription_id }}/resourceGroups/{{ resource_group }}" - register: output - -- name: Assert creating role definition - assert: - that: - - output.changed - -- name: Get facts by type - azure_rm_roledefinition_facts: - scope: "/subscriptions/{{ subscription_id }}/resourceGroups/{{ resource_group }}" - type: custom - register: facts - -- name: Assert facts - assert: - that: - - facts['roledefinitions'] | length > 1 - -- name: Get facts by name - azure_rm_roledefinition_facts: - scope: "/subscriptions/{{ subscription_id }}/resourceGroups/{{ resource_group }}" - role_name: "{{ role_name }}" - register: facts - until: facts.roledefinitions | length > 0 - retries: 50 - delay: 60 - -- name: Assert facts - assert: - that: - - facts['roledefinitions'] | length == 1 - - facts['roledefinitions'][0]['permissions'] | length == 1 - - facts['roledefinitions'][0]['permissions'][0]['not_data_actions'] | length == 1 - - facts['roledefinitions'][0]['permissions'][0]['data_actions'] | length == 1 - -- name: Update the role definition (idempotent) - azure_rm_roledefinition: - name: "{{ role_name }}" - scope: "/subscriptions/{{ subscription_id }}/resourceGroups/{{ resource_group }}" - permissions: - - actions: - - "Microsoft.Compute/virtualMachines/read" - not_actions: - - "Microsoft.Compute/virtualMachines/write" - data_actions: - - "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/read" - not_data_actions: - - "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/write" - assignable_scopes: - - "/subscriptions/{{ subscription_id }}/resourceGroups/{{ resource_group }}" - register: output - -- name: assert output not changed - assert: - that: - - not output.changed - -- name: Update the role definition - azure_rm_roledefinition: - name: "{{ role_name }}" - scope: "/subscriptions/{{ subscription_id }}/resourceGroups/{{ resource_group }}" - permissions: - - actions: - - "Microsoft.Compute/virtualMachines/read" - - "Microsoft.Compute/virtualMachines/start/action" - not_actions: - - "Microsoft.Compute/virtualMachines/write" - data_actions: - - "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/read" - not_data_actions: - - "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/write" - assignable_scopes: - - "/subscriptions/{{ subscription_id }}/resourceGroups/{{ resource_group }}" - register: output - -- name: assert output changed - assert: - that: - - output.changed - -- name: Get role definition facts - azure_rm_roledefinition_facts: - role_name: "{{ role_name }}" - scope: "/subscriptions/{{ subscription_id }}/resourceGroups/{{ resource_group }}" - type: custom - register: roledef - until: "{{ roledef.roledefinitions | length > 0 }}" - retries: 50 - delay: 60 - -- name: Assert role definition facts - assert: - that: - - roledef['roledefinitions'] | length == 1 - - roledef['roledefinitions'][0]['id'] - -- name: Create a role assignment (Check Mode) - azure_rm_roleassignment: - scope: "/subscriptions/{{ subscription_id }}/resourceGroups/{{ resource_group }}" - assignee_object_id: "{{ principal_id }}" - role_definition_id: "{{ roledef['roledefinitions'][0]['id'] }}" - check_mode: yes - register: output - -- name: Assert creating role definition check mode - assert: - that: - - output.changed - -- name: Create a role assignment - azure_rm_roleassignment: - scope: "/subscriptions/{{ subscription_id }}/resourceGroups/{{ resource_group }}" - assignee_object_id: "{{ principal_id }}" - role_definition_id: "{{ roledef['roledefinitions'][0]['id'] }}" - register: output - -- name: Assert creating role assignment - assert: - that: - - output.changed - -- name: Get facts - azure_rm_roleassignment_facts: - scope: "/subscriptions/{{ subscription_id }}/resourceGroups/{{ resource_group }}" - assignee: "{{ principal_id }}" - role_definition_id: "{{ roledef['roledefinitions'][0]['id'] }}" - register: facts - -- name: assert role assignment facts - assert: - that: - - facts['roleassignments'] | length > 0 - - facts['roleassignments'][0]['id'] - -- name: delete role assignment - azure_rm_roleassignment: - name: "{{ facts['roleassignments'][0]['id'].split('/')[-1] }}" - scope: "/subscriptions/{{ subscription_id }}" - state: absent - -- name: Delete the role definition (Check Mode) - azure_rm_roledefinition: - name: "{{ role_name }}" - scope: "/subscriptions/{{ subscription_id }}/resourceGroups/{{ resource_group }}" - state: absent - check_mode: yes - register: output - -- name: assert deleting role definition check mode - assert: - that: output.changed - -- name: Delete the role definition - azure_rm_roledefinition: - name: "{{ role_name }}" - scope: "/subscriptions/{{ subscription_id }}/resourceGroups/{{ resource_group }}" - state: absent - register: output - -- assert: - that: - - output.changed diff --git a/test/integration/targets/azure_rm_routetable/aliases b/test/integration/targets/azure_rm_routetable/aliases deleted file mode 100644 index 759eafa2de..0000000000 --- a/test/integration/targets/azure_rm_routetable/aliases +++ /dev/null @@ -1,3 +0,0 @@ -cloud/azure -shippable/azure/group3 -destructive diff --git a/test/integration/targets/azure_rm_routetable/meta/main.yml b/test/integration/targets/azure_rm_routetable/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_routetable/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_routetable/tasks/main.yml b/test/integration/targets/azure_rm_routetable/tasks/main.yml deleted file mode 100644 index 40c4159eac..0000000000 --- a/test/integration/targets/azure_rm_routetable/tasks/main.yml +++ /dev/null @@ -1,183 +0,0 @@ -- name: Prepare random number - set_fact: - name: "table{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - route_name: "route{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - run_once: yes - -- name: Create a route table (check mode) - azure_rm_routetable: - name: "{{ name }}" - resource_group: "{{ resource_group }}" - tags: - purpose: testing - check_mode: yes - register: output - -- assert: - that: - - not output.id - - output.changed - -- name: Create a route table - azure_rm_routetable: - name: "{{ name }}" - resource_group: "{{ resource_group }}" - tags: - purpose: testing - register: output - -- assert: - that: - - output.changed - - output.id - -- name: Create a route table (idemponent) - azure_rm_routetable: - name: "{{ name }}" - resource_group: "{{ resource_group }}" - tags: - purpose: testing - register: output - -- assert: - that: - - not output.changed - -- name: Get facts of the table - azure_rm_routetable_facts: - name: "{{ name }}" - resource_group: "{{ resource_group }}" - register: output - -- assert: - that: - - "output.route_tables | length == 1" - - "output.route_tables[0].routes | length == 0" - -- name: Create route (check mode) - azure_rm_route: - name: "{{ route_name }}" - resource_group: "{{ resource_group }}" - next_hop_type: virtual_network_gateway - address_prefix: "10.1.0.0/16" - route_table_name: "{{ name }}" - check_mode: yes - register: output - -- assert: - that: - - output.changed - - not output.id - -- name: Create route - azure_rm_route: - name: "{{ route_name }}" - resource_group: "{{ resource_group }}" - next_hop_type: virtual_network_gateway - address_prefix: "10.1.0.0/16" - route_table_name: "{{ name }}" - register: output - -- assert: - that: - - output.changed - - output.id - -- name: Create route (idemponent) - azure_rm_route: - name: "{{ route_name }}" - resource_group: "{{ resource_group }}" - next_hop_type: virtual_network_gateway - address_prefix: "10.1.0.0/16" - route_table_name: "{{ name }}" - register: output - -- assert: - that: - - not output.changed - -- name: update route - azure_rm_route: - name: "{{ route_name }}" - resource_group: "{{ resource_group }}" - next_hop_type: virtual_network_gateway - address_prefix: "10.1.0.0/24" - route_table_name: "{{ name }}" - register: output - -- assert: - that: - - output.changed - -- name: Get facts of the table - azure_rm_routetable_facts: - name: "{{ name }}" - resource_group: "{{ resource_group }}" - register: output - -- assert: - that: - - "output.route_tables | length == 1" - - "output.route_tables[0].routes | length == 1" - - output.route_tables[0].routes[0].address_prefix == '10.1.0.0/24' - -- name: Delete route (check mode) - azure_rm_route: - name: "{{ route_name }}" - resource_group: "{{ resource_group }}" - route_table_name: "{{ name }}" - state: absent - check_mode: yes - -- name: Delete route - azure_rm_route: - name: "{{ route_name }}" - resource_group: "{{ resource_group }}" - state: absent - route_table_name: "{{ name }}" - register: output - -- assert: - that: - - output.changed - -- name: Delete route (idemponent) - azure_rm_route: - name: "{{ route_name }}" - resource_group: "{{ resource_group }}" - state: absent - route_table_name: "{{ name }}" - register: output - -- assert: - that: - - not output.changed - -- name: Delete route table (check mode) - azure_rm_routetable: - name: "{{ name }}" - resource_group: "{{ resource_group }}" - state: absent - check_mode: yes - -- name: Delete route table - azure_rm_routetable: - name: "{{ name }}" - resource_group: "{{ resource_group }}" - state: absent - register: output - -- assert: - that: - - output.changed - -- name: Delete route table (idemponent) - azure_rm_routetable: - name: "{{ name }}" - resource_group: "{{ resource_group }}" - state: absent - register: output - -- assert: - that: - - not output.changed diff --git a/test/integration/targets/azure_rm_securitygroup/aliases b/test/integration/targets/azure_rm_securitygroup/aliases deleted file mode 100644 index 4f09ea58b8..0000000000 --- a/test/integration/targets/azure_rm_securitygroup/aliases +++ /dev/null @@ -1,4 +0,0 @@ -cloud/azure -shippable/azure/group2 -destructive -azure_rm_securitygroup_facts diff --git a/test/integration/targets/azure_rm_securitygroup/meta/main.yml b/test/integration/targets/azure_rm_securitygroup/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_securitygroup/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_securitygroup/tasks/main.yml b/test/integration/targets/azure_rm_securitygroup/tasks/main.yml deleted file mode 100644 index 658c1c9a98..0000000000 --- a/test/integration/targets/azure_rm_securitygroup/tasks/main.yml +++ /dev/null @@ -1,302 +0,0 @@ -- name: Prepare random number - set_fact: - secgroupname: "sg{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - asg_name1: "asg1{{ resource_group | hash('md5') | truncate(7, True, '') }}" - asg_name2: "asg2{{ resource_group | hash('md5') | truncate(7, True, '') }}" - sg_name1: "sgasg{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - run_once: yes - - -- name: Create security group - azure_rm_securitygroup: - resource_group: "{{ resource_group }}" - name: "{{ secgroupname }}" - tags: - testing: testing - delete: on-exit - foo: bar - purge_rules: yes - rules: - - name: DenySSH - protocol: Tcp - destination_port_range: 22 - access: Deny - priority: 100 - direction: Inbound - - name: AllowSSH - protocol: Tcp - source_address_prefix: 174.109.158.0/24 - destination_port_range: 22 - access: Allow - priority: 101 - direction: Inbound - register: output - -- assert: { that: "{{ output.state.rules | length }} == 2" } - -- name: Gather facts by tags - azure_rm_securitygroup_info: - resource_group: "{{ resource_group }}" - tags: - - testing - - foo:bar - register: output - -- assert: - that: output.securitygroups | length == 1 - -- name: Add/Update rules on existing security group - azure_rm_securitygroup: - resource_group: "{{ resource_group }}" - name: "{{ secgroupname }}" - rules: - - name: AllowSSH - protocol: Tcp - source_address_prefix: 174.108.158.0/24 - destination_port_range: 22 - access: Allow - priority: 101 - - name: AllowSSHFromHome - protocol: Tcp - source_address_prefix: 174.109.158.0/24 - destination_port_range: 22-23 - priority: 102 - register: output - -- assert: - that: - - "{{ output.state.rules | length }} == 3" - - output.state.rules[0].source_address_prefix == '174.108.158.0/24' - -- name: Test idempotence - azure_rm_securitygroup: - resource_group: "{{ resource_group }}" - name: "{{ secgroupname }}" - rules: - - name: AllowSSH - protocol: Tcp - source_address_prefix: 174.108.158.0/24 - destination_port_range: 22 - access: Allow - priority: 101 - - name: AllowSSHFromHome - protocol: Tcp - source_address_prefix: 174.109.158.0/24 - destination_port_range: 22-23 - priority: 102 - register: output - -- assert: - that: not output.changed - -- name: Update tags - azure_rm_securitygroup: - resource_group: "{{ resource_group }}" - name: "{{ secgroupname }}" - tags: - testing: testing - delete: never - baz: bar - append_tags: false - register: output - -- assert: - that: - - output.state.tags | length == 3 - - output.state.tags.delete == 'never' - -- name: Purge tags - azure_rm_securitygroup: - resource_group: "{{ resource_group }}" - name: "{{ secgroupname }}" - append_tags: false - tags: - testing: testing - delete: on-exit - register: output - -- assert: - that: - - output.state.tags | length == 2 - - output.state.tags.delete == 'on-exit' - -- name: Gather facts for one accounts - azure_rm_securitygroup_info: - resource_group: "{{ resource_group }}" - name: "{{ secgroupname }}" - register: output - -- assert: - that: - - output.securitygroups | length == 1 - -- name: Gather facts for all accounts - azure_rm_securitygroup_info: - resource_group: "{{ resource_group }}" - register: output_groups - -- assert: - that: - - output_groups.securitygroups | length > 0 - -- name: Create security group with source_address_prefixes - azure_rm_securitygroup: - resource_group: "{{ resource_group }}" - name: "{{ secgroupname }}" - tags: - testing: testing - delete: on-exit - foo: bar - purge_rules: yes - rules: - - name: AllowSSH - protocol: Tcp - source_address_prefix: - - 52.100.120.240 - - 53.100.250.190 - - 54.110.200.200 - destination_port_range: 22 - access: Allow - priority: 101 - direction: Inbound - register: output - -- assert: - that: - - "{{ output.state.rules | length }} == 1" - - "{{ output.state.rules[0].source_address_prefixes | length }} == 3" - - not output.state.rules[0].source_address_prefix - -- name: Create security group with source_address_prefixes(idempontent) - azure_rm_securitygroup: - resource_group: "{{ resource_group }}" - name: "{{ secgroupname }}" - tags: - testing: testing - delete: on-exit - foo: bar - purge_rules: yes - rules: - - name: AllowSSH - protocol: Tcp - source_address_prefix: - - 52.100.120.240 - - 53.100.250.190 - - 54.110.200.200 - destination_port_range: 22 - access: Allow - priority: 101 - direction: Inbound - register: output - -- assert: - that: not output.changed - -- name: Add a single one group - azure_rm_securitygroup: - resource_group: "{{ resource_group }}" - name: "{{ secgroupname }}" - tags: - testing: testing - delete: on-exit - foo: bar - rules: - - name: DenySSH - protocol: Tcp - source_address_prefix: - - 54.120.120.240 - destination_port_range: 22 - access: Deny - priority: 102 - direction: Inbound - register: output - -- assert: - that: - - output.changed - - "{{ output.state.rules | length }} == 2" - -- name: Create Application security group 1 - azure_rm_applicationsecuritygroup: - resource_group: "{{ resource_group }}" - name: "{{ asg_name1 }}" - tags: - testing: testing - register: asg1 - -- name: Create Application security group 2 - azure_rm_applicationsecuritygroup: - resource_group: "{{ resource_group_secondary }}" - name: "{{ asg_name2 }}" - tags: - testing: testing - register: asg2 - -- name: Create security group with application security group - azure_rm_securitygroup: - resource_group: "{{ resource_group }}" - name: "{{ sg_name1 }}" - purge_rules: yes - rules: - - name: AsgToAsg - protocol: Tcp - source_application_security_groups: - - "{{ asg1.id }}" - destination_application_security_groups: - - resource_group: "{{ resource_group_secondary }}" - name: "{{ asg_name2 }}" - destination_port_range: 22 - access: Allow - priority: 101 - direction: Inbound - register: output - -- assert: - that: - - output.changed - -- name: Create security group with application security group - Idempotent - azure_rm_securitygroup: - resource_group: "{{ resource_group }}" - name: "{{ sg_name1 }}" - purge_rules: yes - rules: - - name: AsgToAsg - protocol: Tcp - source_application_security_groups: - - "{{ asg_name1 }}" - destination_application_security_groups: - - resource_group: "{{ resource_group_secondary }}" - name: "{{ asg_name2 }}" - destination_port_range: 22 - access: Allow - priority: 101 - direction: Inbound - register: output - -- assert: - that: - - not output.changed - - -- name: Delete security group - azure_rm_securitygroup: - resource_group: "{{ resource_group }}" - name: "{{ sg_name1 }}" - state: absent - -- name: Delete all security groups - azure_rm_securitygroup: - resource_group: "{{ resource_group }}" - name: "{{ item.name }}" - state: absent - with_items: "{{ output_groups.securitygroups }}" - -- name: Should have no security groups remaining - azure_rm_securitygroup_info: - resource_group: "{{ resource_group }}" - register: output - -- assert: - that: - - output.securitygroups | length == 0 diff --git a/test/integration/targets/azure_rm_servicebus/aliases b/test/integration/targets/azure_rm_servicebus/aliases deleted file mode 100644 index 239e365779..0000000000 --- a/test/integration/targets/azure_rm_servicebus/aliases +++ /dev/null @@ -1,3 +0,0 @@ -cloud/azure -shippable/azure/group4 -destructive diff --git a/test/integration/targets/azure_rm_servicebus/meta/main.yml b/test/integration/targets/azure_rm_servicebus/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_servicebus/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_servicebus/tasks/main.yml b/test/integration/targets/azure_rm_servicebus/tasks/main.yml deleted file mode 100644 index c12d635a1d..0000000000 --- a/test/integration/targets/azure_rm_servicebus/tasks/main.yml +++ /dev/null @@ -1,169 +0,0 @@ -- name: Prepare random number - set_fact: - rpfx: "{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - run_once: yes - -- name: Create a namespace - azure_rm_servicebus: - name: "ns{{ rpfx }}" - resource_group: "{{ resource_group }}" - register: namespace - -- assert: - that: - - namespace.id - - namespace.changed - -- name: Create a namespace (idempontent) - azure_rm_servicebus: - name: "ns{{ rpfx }}" - resource_group: "{{ resource_group }}" - register: namespace - -- assert: - that: - - not namespace.changed - -- name: Create a queue - azure_rm_servicebusqueue: - name: "queue{{ rpfx }}" - namespace: "ns{{ rpfx }}" - resource_group: "{{ resource_group }}" - register: queue - -- assert: - that: - - queue.id - - queue.changed - -- name: Create a topic (check mode) - azure_rm_servicebustopic: - name: "topic{{ rpfx }}" - resource_group: "{{ resource_group }}" - namespace: "ns{{ rpfx }}" - duplicate_detection_time_in_seconds: 600 - check_mode: yes - register: output - -- assert: - that: - - output.changed - -- name: Create a topic - azure_rm_servicebustopic: - name: "topic{{ rpfx }}" - resource_group: "{{ resource_group }}" - namespace: "ns{{ rpfx }}" - duplicate_detection_time_in_seconds: 600 - register: output - -- assert: - that: - - output.changed - - output.id - - "'subscription_count' not in output" - -- name: Create a topic (idempontent) - azure_rm_servicebustopic: - name: "topic{{ rpfx }}" - resource_group: "{{ resource_group }}" - namespace: "ns{{ rpfx }}" - duplicate_detection_time_in_seconds: 600 - register: output - -- assert: - that: - - not output.changed - -- name: Create test policy - azure_rm_servicebussaspolicy: - name: testpolicy - resource_group: "{{ resource_group }}" - namespace: "ns{{ rpfx }}" - topic: "topic{{ rpfx }}" - rights: manage - -- name: Create a subscription - azure_rm_servicebustopicsubscription: - name: "subs{{ rpfx }}" - resource_group: "{{ resource_group }}" - namespace: "ns{{ rpfx }}" - topic: "topic{{ rpfx }}" - register: subs - -- assert: - that: - - subs.id - - subs.changed - -- name: Retrive topic - azure_rm_servicebus_facts: - type: topic - name: "topic{{ rpfx }}" - resource_group: "{{ resource_group }}" - namespace: "ns{{ rpfx }}" - show_sas_policies: yes - register: facts - -- assert: - that: - - "facts.servicebuses | length == 1" - - facts.servicebuses[0].id == output.id - - facts.servicebuses[0].subscription_count == 1 - - facts.servicebuses[0].sas_policies.testpolicy - - facts.servicebuses[0].sas_policies.testpolicy.rights == 'manage' - -- name: Delete subscription - azure_rm_servicebustopicsubscription: - name: "subs{{ rpfx }}" - resource_group: "{{ resource_group }}" - namespace: "ns{{ rpfx }}" - topic: "topic{{ rpfx }}" - state: absent - -- name: Retrive topic - azure_rm_servicebus_facts: - type: topic - name: "topic{{ rpfx }}" - resource_group: "{{ resource_group }}" - namespace: "ns{{ rpfx }}" - show_sas_policies: yes - register: facts - -- assert: - that: - - facts.servicebuses[0].subscription_count == 0 - - "facts.servicebuses | length == 1" - -- name: Delete topic - azure_rm_servicebustopic: - name: "topic{{ rpfx }}" - resource_group: "{{ resource_group }}" - namespace: "ns{{ rpfx }}" - state: absent - -- name: Retrive topic - azure_rm_servicebus_facts: - name: "topic{{ rpfx }}" - type: topic - resource_group: "{{ resource_group }}" - namespace: "ns{{ rpfx }}" - show_sas_policies: yes - register: facts - -- assert: - that: - - "facts.servicebuses | length == 0" - -- name: Delete queue - azure_rm_servicebusqueue: - name: "queue{{ rpfx }}" - resource_group: "{{ resource_group }}" - namespace: "ns{{ rpfx }}" - state: absent - -- name: Delete namespace - azure_rm_servicebus: - name: "ns{{ rpfx }}" - resource_group: "{{ resource_group }}" - state: absent
\ No newline at end of file diff --git a/test/integration/targets/azure_rm_sqlserver/aliases b/test/integration/targets/azure_rm_sqlserver/aliases deleted file mode 100644 index 952e4dac80..0000000000 --- a/test/integration/targets/azure_rm_sqlserver/aliases +++ /dev/null @@ -1,8 +0,0 @@ -cloud/azure -destructive -shippable/azure/group9 -azure_rm_sqlserver_facts -azure_rm_sqldatabase -azure_rm_sqldatabase_facts -azure_rm_sqlfirewallrule -azure_rm_sqlfirewallrule_facts diff --git a/test/integration/targets/azure_rm_sqlserver/meta/main.yml b/test/integration/targets/azure_rm_sqlserver/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_sqlserver/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_sqlserver/tasks/main.yml b/test/integration/targets/azure_rm_sqlserver/tasks/main.yml deleted file mode 100644 index a85e25efb1..0000000000 --- a/test/integration/targets/azure_rm_sqlserver/tasks/main.yml +++ /dev/null @@ -1,419 +0,0 @@ -- name: Prepare random number - set_fact: - random_postfix: "{{ 1000 | random }}{{ resource_group | hash('md5') | truncate(7, True, '') }}" - run_once: yes - -- name: Create instance of SQL Server -- check mode - azure_rm_sqlserver: - resource_group: "{{ resource_group }}" - name: "sqlsrv{{ random_postfix }}" - location: eastus - admin_username: mylogin - admin_password: Testpasswordxyz12! - check_mode: yes - register: output -- name: Assert the resource instance is well created - assert: - that: - - output.changed - -- name: Create instance of SQL Server - azure_rm_sqlserver: - resource_group: "{{ resource_group }}" - name: "sqlsrv{{ random_postfix }}" - location: eastus - admin_username: mylogin - admin_password: Testpasswordxyz12! - tags: - aaa: bbb - register: output -- name: Assert the resource instance is well created - assert: - that: - - output.changed - - output.state == 'Ready' - -- name: Create again instance of SQL Server - azure_rm_sqlserver: - resource_group: "{{ resource_group }}" - name: "sqlsrv{{ random_postfix }}" - location: eastus - admin_username: mylogin - admin_password: Testpasswordxyz12! - register: output -- name: Assert the state has not changed - assert: - that: - - output.changed == false - - output.state == 'Ready' - -# azure_rm_sqlserver_facts tests - -- name: Gather facts SQL Server - azure_rm_sqlserver_facts: - resource_group: "{{ resource_group }}" - server_name: "sqlsrv{{ random_postfix }}" - register: output -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.servers.sqlsrv{{ random_postfix }}.id != None - - output.servers.sqlsrv{{ random_postfix }}.name == "sqlsrv{{ random_postfix }}" - - output.servers.sqlsrv{{ random_postfix }}.type != None - - output.servers.sqlsrv{{ random_postfix }}.location != None - - output.servers.sqlsrv{{ random_postfix }}.kind != None - - output.servers.sqlsrv{{ random_postfix }}.version != None - - output.servers.sqlsrv{{ random_postfix }}.state != None - - output.servers.sqlsrv{{ random_postfix }}.fully_qualified_domain_name != None - - output.servers.sqlsrv{{ random_postfix }}.tags.aaa == 'bbb' - -- name: Gather facts SQL Server - unexisting - azure_rm_sqlserver_facts: - resource_group: "{{ resource_group }}" - server_name: "unexisting" - register: output -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.servers == {} - -- name: Gather facts SQL Server - list - azure_rm_sqlserver_facts: - resource_group: "{{ resource_group }}" - register: output -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.servers.sqlsrv{{ random_postfix }}.id != None - - output.servers.sqlsrv{{ random_postfix }}.name == "sqlsrv{{ random_postfix }}" - - output.servers.sqlsrv{{ random_postfix }}.type != None - - output.servers.sqlsrv{{ random_postfix }}.location != None - - output.servers.sqlsrv{{ random_postfix }}.kind != None - - output.servers.sqlsrv{{ random_postfix }}.version != None - - output.servers.sqlsrv{{ random_postfix }}.state != None - - output.servers.sqlsrv{{ random_postfix }}.fully_qualified_domain_name != None - -# azure_rm_sqldatabase tests - -- name: Create instance of SQL Database -- check mode - azure_rm_sqldatabase: - resource_group: "{{ resource_group }}" - server_name: sqlsrv{{ random_postfix }} - name: database{{ random_postfix }} - location: eastus - check_mode: yes - register: output -- name: Assert the resource instance is well created - assert: - that: - - output.changed - -- name: Create instance of SQL Database - azure_rm_sqldatabase: - resource_group: "{{ resource_group }}" - server_name: sqlsrv{{ random_postfix }} - name: database{{ random_postfix }} - location: eastus - tags: - aaa: bbb - register: output -- name: Assert the resource instance is well created - assert: - that: - - output.changed - - output.status == 'Online' - -- name: Create again instance of SQL Database - azure_rm_sqldatabase: - resource_group: "{{ resource_group }}" - server_name: sqlsrv{{ random_postfix }} - name: database{{ random_postfix }} - location: eastus - tags: - aaa: bbb - register: output -- name: Assert the state has not changed - assert: - that: - - output.changed == false - - output.status == 'Online' - -# test database facter: -- name: Create second SQL Database - azure_rm_sqldatabase: - resource_group: "{{ resource_group }}" - server_name: sqlsrv{{ random_postfix }} - name: database{{ random_postfix }}second - location: eastus - -- name: Gather facts SQL Database - azure_rm_sqldatabase_facts: - resource_group: "{{ resource_group }}" - server_name: sqlsrv{{ random_postfix }} - name: database{{ random_postfix }} - register: output -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.databases[0].id != None - - output.databases[0].name != None - - output.databases[0].location != None - - output.databases[0].sku.name != None - - output.databases[0].sku.tier != None - - output.databases[0].sku.capacity != None - - output.databases[0].kind != None - - output.databases[0].status != None - -- name: Gather facts SQL Database - azure_rm_sqldatabase_facts: - resource_group: "{{ resource_group }}" - server_name: sqlsrv{{ random_postfix }} - register: output -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.databases[0].id != None - - output.databases[0].name != None - - output.databases[0].location != None - - output.databases[0].sku.name != None - - output.databases[0].sku.tier != None - - output.databases[0].sku.capacity != None - - output.databases[0].kind != None - - output.databases[0].status != None - - output.databases[1].id != None - - output.databases[1].name != None - - output.databases[1].location != None - - output.databases[1].sku.name != None - - output.databases[1].sku.tier != None - - output.databases[1].sku.capacity != None - - output.databases[1].kind != None - - output.databases[1].status != None - -- name: Delete instance of secondary database - azure_rm_sqldatabase: - resource_group: "{{ resource_group }}" - server_name: sqlsrv{{ random_postfix }} - name: database{{ random_postfix }}second - state: absent - -# clean up databases -- name: Delete instance of SQL Database -- check mode - azure_rm_sqldatabase: - resource_group: "{{ resource_group }}" - server_name: sqlsrv{{ random_postfix }} - name: database{{ random_postfix }} - state: absent - check_mode: yes - register: output -- name: Assert the state has changed - assert: - that: - - output.changed - -- name: Delete instance of SQL Database - azure_rm_sqldatabase: - resource_group: "{{ resource_group }}" - server_name: sqlsrv{{ random_postfix }} - name: database{{ random_postfix }} - state: absent - register: output -- name: Assert the state has changed - assert: - that: - - output.changed - -- name: Delete unexisting instance of SQL Database - azure_rm_sqldatabase: - resource_group: "{{ resource_group }}" - server_name: sqlsrv{{ random_postfix }} - name: database{{ random_postfix }} - state: absent - register: output -- name: Assert the state has changed - assert: - that: - - output.changed == false - -# test database facts without databases -- name: Gather facts SQL Database - azure_rm_sqldatabase_facts: - resource_group: "{{ resource_group }}" - server_name: sqlsrv{{ random_postfix }} - name: database{{ random_postfix }} - register: output -- name: Assert that empty dictionary was returned - assert: - that: - - output.changed == False - - output.databases | length == 0 - -- name: Gather facts SQL Database - azure_rm_sqldatabase_facts: - resource_group: "{{ resource_group }}" - server_name: sqlsrv{{ random_postfix }} - register: output -- name: Assert that empty dictionary was returned (one database is there by default) - assert: - that: - - output.changed == False - - output.databases | length == 1 - -# azure_rm_sqlfirewallrule tests - -- name: Create instance of Firewall Rule -- check mode - azure_rm_sqlfirewallrule: - resource_group: "{{ resource_group }}" - server_name: "sqlsrv{{ random_postfix }}" - name: firewallrule{{ random_postfix }} - start_ip_address: 172.28.10.136 - end_ip_address: 172.28.10.138 - check_mode: yes - register: output -- name: Assert the resource instance is well created - assert: - that: - - output.changed - -- name: Create instance of Firewall Rule - azure_rm_sqlfirewallrule: - resource_group: "{{ resource_group }}" - server_name: "sqlsrv{{ random_postfix }}" - name: firewallrule{{ random_postfix }} - start_ip_address: 172.28.10.136 - end_ip_address: 172.28.10.138 - register: output -- name: Assert the resource instance is well created - assert: - that: - - output.changed - -- name: Create again instance of Firewall Rule - azure_rm_sqlfirewallrule: - resource_group: "{{ resource_group }}" - server_name: "sqlsrv{{ random_postfix }}" - name: firewallrule{{ random_postfix }} - start_ip_address: 172.28.10.136 - end_ip_address: 172.28.10.138 - register: output -- name: Assert the state has not changed - assert: - that: - - output.changed == false - -# -# azure_rm_sqlserverfirewallrule_facts -# - -- name: Create Firewall Rule - second - azure_rm_sqlfirewallrule: - resource_group: "{{ resource_group }}" - server_name: sqlsrv{{ random_postfix }} - name: firewallrule{{ random_postfix }}second - start_ip_address: 172.28.10.136 - end_ip_address: 172.28.10.138 - -- name: Gather facts SQL Firewall Rule - azure_rm_sqlfirewallrule_facts: - resource_group: "{{ resource_group }}" - server_name: sqlsrv{{ random_postfix }} - name: firewallrule{{ random_postfix }} - register: output -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.rules[0].id != None - - output.rules[0].resource_group != None - - output.rules[0].server_name != None - - output.rules[0].name != None - - output.rules[0].start_ip_address != None - - output.rules[0].end_ip_address != None - -- name: Gather facts SQL Firewall Rule - azure_rm_sqlfirewallrule_facts: - resource_group: "{{ resource_group }}" - server_name: sqlsrv{{ random_postfix }} - register: output -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.rules[0].id != None - - output.rules[0].id != None - - output.rules[0].resource_group != None - - output.rules[0].server_name != None - - output.rules[0].name != None - - output.rules[0].start_ip_address != None - - output.rules[0].end_ip_address != None - - output.rules[1].id != None - - output.rules[1].resource_group != None - - output.rules[1].server_name != None - - output.rules[1].name != None - - output.rules[1].start_ip_address != None - - output.rules[1].end_ip_address != None - -- name: Delete instance of Firewall Rule - azure_rm_sqlfirewallrule: - resource_group: "{{ resource_group }}" - server_name: sqlsrv{{ random_postfix }} - name: firewallrule{{ random_postfix }} - state: absent -- name: Delete instance of Firewall Rule - azure_rm_sqlfirewallrule: - resource_group: "{{ resource_group }}" - server_name: sqlsrv{{ random_postfix }} - name: firewallrule{{ random_postfix }}second - state: absent - -- name: Gather facts SQL Firewall Rule - azure_rm_sqlfirewallrule_facts: - resource_group: "{{ resource_group }}" - server_name: sqlsrv{{ random_postfix }} - name: firewallrule{{ random_postfix }} - register: output -- name: Assert that empty dictionary was returned - assert: - that: - - output.changed == False - - output.rules | length == 0 - -# finalise & clean up azure_rm_sqlserver test - -- name: Delete instance of SQL Server -- check mode - azure_rm_sqlserver: - resource_group: "{{ resource_group }}" - name: "sqlsrv{{ random_postfix }}" - state: absent - check_mode: yes - register: output -- name: Assert the state has changed - assert: - that: - - output.changed - -- name: Delete instance of SQL Server - azure_rm_sqlserver: - resource_group: "{{ resource_group }}" - name: "sqlsrv{{ random_postfix }}" - state: absent - register: output -- name: Assert the state has changed - assert: - that: - - output.changed - -- name: Delete unexisting instance of SQL Server - azure_rm_sqlserver: - resource_group: "{{ resource_group }}" - name: "sqlsrv{{ random_postfix }}" - state: absent - register: output -- name: Assert the state has changed - assert: - that: - - output.changed == false diff --git a/test/integration/targets/azure_rm_storageaccount/aliases b/test/integration/targets/azure_rm_storageaccount/aliases deleted file mode 100644 index cbb31e489d..0000000000 --- a/test/integration/targets/azure_rm_storageaccount/aliases +++ /dev/null @@ -1,4 +0,0 @@ -cloud/azure -shippable/azure/group2 -destructive -disabled diff --git a/test/integration/targets/azure_rm_storageaccount/meta/main.yml b/test/integration/targets/azure_rm_storageaccount/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_storageaccount/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_storageaccount/tasks/main.yml b/test/integration/targets/azure_rm_storageaccount/tasks/main.yml deleted file mode 100644 index 8713dd2c31..0000000000 --- a/test/integration/targets/azure_rm_storageaccount/tasks/main.yml +++ /dev/null @@ -1,158 +0,0 @@ - - name: Create storage account name - set_fact: - storage_account: "{{ resource_group | hash('md5') | truncate(24, True, '') }}" - - - name: Test invalid account name - azure_rm_storageaccount: - resource_group: "{{ resource_group }}" - name: "invalid_char$" - register: invalid_name - ignore_errors: yes - - - name: Assert task failed - assert: { that: "invalid_name['failed'] == True" } - - - name: Delete storage account - azure_rm_storageaccount: - resource_group: "{{ resource_group }}" - name: "{{ storage_account }}" - state: absent - force_delete_nonempty: True - - - name: Create new storage account - azure_rm_storageaccount: - resource_group: "{{ resource_group }}" - name: "{{ storage_account }}" - account_type: Standard_LRS - append_tags: no - blob_cors: - - allowed_origins: - - http://www.example.com/ - allowed_methods: - - GET - - POST - allowed_headers: - - x-ms-meta-data* - - x-ms-meta-target* - - x-ms-meta-abc - exposed_headers: - - x-ms-meta-* - max_age_in_seconds: 200 - tags: - test: test - galaxy: galaxy - register: output - - - name: Assert status succeeded and results include an Id value - assert: - that: - - output.changed - - output.state.id is defined - - output.state.blob_cors | length == 1 - - - name: Create new storage account (idempotence) - azure_rm_storageaccount: - resource_group: "{{ resource_group }}" - name: "{{ storage_account }}" - account_type: Standard_LRS - append_tags: no - blob_cors: - - allowed_origins: - - http://www.example.com/ - allowed_methods: - - GET - - POST - allowed_headers: - - x-ms-meta-data* - - x-ms-meta-target* - - x-ms-meta-abc - exposed_headers: - - x-ms-meta-* - max_age_in_seconds: 200 - tags: - test: test - galaxy: galaxy - register: output - - - assert: - that: - - not output.changed - - - name: Gather facts by tags - azure_rm_storageaccount_facts: - resource_group: "{{ resource_group }}" - tags: - - test - - galaxy - - - assert: - that: azure_storageaccounts | length >= 1 - - - name: Change account type - azure_rm_storageaccount: - resource_group: "{{ resource_group }}" - name: "{{ storage_account }}" - account_type: Premium_LRS - register: change_account - ignore_errors: yes - - - name: Assert account type change failed - assert: { that: "change_account['failed'] == True" } - - - name: Change account type and add custom domain - azure_rm_storageaccount: - resource_group: "{{ resource_group }}" - name: "{{ storage_account }}" - account_type: Standard_GRS - custom_domain: { name: ansible.com, use_sub_domain: no } - register: change_account - ignore_errors: yes - - - name: Assert CNAME failure - assert: { that: "'Azure Error: StorageCustomDomainNameNotValid' in change_account['msg']" } - - - name: Update account tags - azure_rm_storageaccount: - resource_group: "{{ resource_group }}" - name: "{{ storage_account }}" - append_tags: no - tags: - testing: testing - delete: never - register: output - - - assert: - that: - - "output.state.tags | length == 2" - - "output.state.tags.testing == 'testing'" - - "output.state.tags.delete == 'never'" - - - name: Gather facts - azure_rm_storageaccount_facts: - resource_group: "{{ resource_group }}" - name: "{{ storage_account }}" - show_connection_string: True - show_blob_cors: True - - - assert: - that: - - "azure_storageaccounts| length == 1" - - "storageaccounts | length == 1" - - not storageaccounts[0].custom_domain - - storageaccounts[0].account_type == "Standard_GRS" - - storageaccounts[0].primary_endpoints.blob.connectionstring - - storageaccounts[0].blob_cors - - - name: Gather facts - azure_rm_storageaccount_facts: - resource_group: "{{ resource_group }}" - - - assert: - that: - - "azure_storageaccounts | length > 0" - - - name: Delete acccount - azure_rm_storageaccount: - resource_group: "{{ resource_group }}" - name: "{{ storage_account }}" - state: absent diff --git a/test/integration/targets/azure_rm_storageblob/aliases b/test/integration/targets/azure_rm_storageblob/aliases deleted file mode 100644 index e823954320..0000000000 --- a/test/integration/targets/azure_rm_storageblob/aliases +++ /dev/null @@ -1,4 +0,0 @@ -cloud/azure -shippable/azure/group2 -destructive -unstable diff --git a/test/integration/targets/azure_rm_storageblob/files/Ratings.png b/test/integration/targets/azure_rm_storageblob/files/Ratings.png Binary files differdeleted file mode 100644 index 8dd3e3dbc1..0000000000 --- a/test/integration/targets/azure_rm_storageblob/files/Ratings.png +++ /dev/null diff --git a/test/integration/targets/azure_rm_storageblob/meta/main.yml b/test/integration/targets/azure_rm_storageblob/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_storageblob/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_storageblob/tasks/main.yml b/test/integration/targets/azure_rm_storageblob/tasks/main.yml deleted file mode 100644 index 0bbc181fbb..0000000000 --- a/test/integration/targets/azure_rm_storageblob/tasks/main.yml +++ /dev/null @@ -1,119 +0,0 @@ -- name: Create storage account name - set_fact: - storage_account: "{{ resource_group | hash('md5') | truncate(24, True, '') }}" - -- name: Create storage account - azure_rm_storageaccount: - resource_group: "{{ resource_group }}" - name: "{{ storage_account }}" - account_type: Standard_LRS - -- name: Create container - azure_rm_storageblob: - resource_group: "{{ resource_group }}" - account_name: "{{ storage_account }}" - container_name: my-blobs - -- name: Force upload blob - azure_rm_storageblob: - resource_group: "{{ resource_group }}" - account_name: "{{ storage_account }}" - container_name: my-blobs - blob: 'Ratings.png' - src: './targets/azure_rm_storageblob/files/Ratings.png' - content_type: image/png - tags: - val1: foo - val2: bar - force: yes - -- name: storage blob seems to have some timing issues - wait_for: - delay: 10 - -- name: Upload blob idempotence - azure_rm_storageblob: - resource_group: "{{ resource_group }}" - account_name: "{{ storage_account }}" - container_name: my-blobs - blob: 'Ratings.png' - src: './targets/azure_rm_storageblob/files/Ratings.png' - content_type: image/png - tags: - val1: foo - val2: bar - register: upload_facts - -- assert: - that: "not upload_facts.changed" - -- name: Download file idempotence - azure_rm_storageblob: - resource_group: "{{ resource_group }}" - account_name: "{{ storage_account }}" - container_name: my-blobs - blob: 'Ratings.png' - dest: './targets/azure_rm_storageblob/files/Ratings.png' - register: download_results - -- assert: - that: not download_results.changed - -- file: path="/tmp/Ratings.png" state=absent - -- name: Download file - azure_rm_storageblob: - resource_group: "{{ resource_group }}" - account_name: "{{ storage_account }}" - container_name: my-blobs - blob: 'Ratings.png' - dest: '/tmp/Ratings.png' - register: download_results - -- assert: - that: "download_results.changed" - -- find: paths='/tmp' patterns="Ratings.png" - register: find_results - -- assert: { that: "find_results['matched'] == 1" } - -- name: Do not delete container that has blobs - azure_rm_storageblob: - resource_group: "{{ resource_group }}" - account_name: "{{ storage_account }}" - container_name: my-blobs - state: absent - register: output - -- assert: - that: "not output.changed" - -- name: Delete blob object - azure_rm_storageblob: - resource_group: "{{ resource_group }}" - account_name: "{{ storage_account }}" - container_name: my-blobs - blob: "Ratings.png" - state: absent - register: output - -- assert: - that: "output.changed" - -- name: Delete container - azure_rm_storageblob: - resource_group: "{{ resource_group }}" - account_name: "{{ storage_account }}" - container_name: my-blobs - state: absent - register: output - -- assert: - that: "output.changed" - -- name: Delete storage account - azure_rm_storageaccount: - resource_group: "{{ resource_group }}" - name: "{{ storage_account }}" - state: absent diff --git a/test/integration/targets/azure_rm_subnet/aliases b/test/integration/targets/azure_rm_subnet/aliases deleted file mode 100644 index aa77c071a8..0000000000 --- a/test/integration/targets/azure_rm_subnet/aliases +++ /dev/null @@ -1,3 +0,0 @@ -cloud/azure -shippable/azure/group2 -destructive diff --git a/test/integration/targets/azure_rm_subnet/meta/main.yml b/test/integration/targets/azure_rm_subnet/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_subnet/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_subnet/tasks/main.yml b/test/integration/targets/azure_rm_subnet/tasks/main.yml deleted file mode 100644 index 8b4efcc4fe..0000000000 --- a/test/integration/targets/azure_rm_subnet/tasks/main.yml +++ /dev/null @@ -1,182 +0,0 @@ -- name: Create virtual network - azure_rm_virtualnetwork: - name: My_Virtual_Network - address_prefixes_cidr: - - 10.1.0.0/16 - - 172.100.0.0/16 - dns_servers: - - 127.0.0.1 - - 127.0.0.3 - tags: - testing: testing - delete: on-exit - resource_group: "{{ resource_group }}" - -- name: Create route table - azure_rm_routetable: - name: routetableforsubnet - resource_group: "{{ resource_group }}" - register: route_table - -- name: Remove subnet - azure_rm_subnet: - state: absent - name: foobar - virtual_network_name: My_Virtual_Network - resource_group: "{{ resource_group }}" - -- name: Catch invalid cidr - azure_rm_subnet: - name: foobar - virtual_network_name: My_Virtual_Network - resource_group: "{{ resource_group }}" - address_prefix_cidr: "10.1.0/24" - register: output - ignore_errors: yes - -- assert: - that: output.failed - -- name: Add the subnet back - azure_rm_subnet: - name: foobar - virtual_network_name: My_Virtual_Network - resource_group: "{{ resource_group }}" - address_prefix_cidr: "10.1.0.0/24" - register: output - -- assert: - that: output.changed - -- name: Add the subnet back (idempontent) - azure_rm_subnet: - name: foobar - virtual_network_name: My_Virtual_Network - resource_group: "{{ resource_group }}" - register: output - -- assert: - that: not output.changed - -- name: Create network security group - azure_rm_securitygroup: - name: secgroupfoo - resource_group: "{{ resource_group }}" - tags: - testing: testing - -- name: Update the subnet - azure_rm_subnet: - name: foobar - virtual_network_name: My_Virtual_Network - resource_group: "{{ resource_group }}" - address_prefix_cidr: "10.1.0.0/16" - security_group: secgroupfoo - service_endpoints: - - service: Microsoft.Sql - locations: - - eastus - - westus - -- name: Should be idempotent - azure_rm_subnet: - name: foobar - virtual_network_name: My_Virtual_Network - resource_group: "{{ resource_group }}" - address_prefix_cidr: "10.1.0.0/16" - service_endpoints: - - service: Microsoft.Sql - locations: - - eastus - - westus - register: output - -- assert: - that: not output.changed - -- name: Create network security group in another resource group - azure_rm_securitygroup: - name: secgroupfoo - resource_group: "{{ resource_group_secondary }}" - register: nsg - -- name: Update the subnet - azure_rm_subnet: - name: foobar - virtual_network_name: My_Virtual_Network - resource_group: "{{ resource_group }}" - address_prefix_cidr: "10.1.0.0/16" - route_table: "{{ route_table.id }}" - security_group: - name: secgroupfoo - resource_group: "{{ resource_group_secondary }}" - register: output - -- assert: - that: - - output.changed - - output.state.network_security_group.id == nsg.state.id - -- name: Update the subnet (idempotent) - azure_rm_subnet: - name: foobar - virtual_network_name: My_Virtual_Network - resource_group: "{{ resource_group }}" - address_prefix_cidr: "10.1.0.0/16" - security_group: "{{ nsg.state.id }}" - register: output - -- assert: - that: not output.changed - -- name: Get subnet facts - azure_rm_subnet_facts: - name: foobar - virtual_network_name: My_Virtual_Network - resource_group: "{{ resource_group }}" - register: output - -- debug: - var: output -- name: Assert that facts are returned - assert: - that: - - output.changed == False - - output.subnets[0]['id'] != None - - output.subnets[0]['resource_group'] != None - - output.subnets[0]['virtual_network_name'] != None - - output.subnets[0]['name'] != None - - output.subnets[0]['address_prefix_cidr'] != None - - output.subnets[0]['route_table'] != None - - output.subnets[0]['security_group'] != None - - output.subnets[0]['provisioning_state'] != None - -- name: Remove subnet - azure_rm_subnet: - state: absent - name: foobar - virtual_network_name: My_Virtual_Network - resource_group: "{{ resource_group }}" - -- name: Remove subnet (idempotent) - azure_rm_subnet: - state: absent - name: foobar - virtual_network_name: My_Virtual_Network - resource_group: "{{ resource_group }}" - register: output - -- assert: - that: not output.changed - -- name: Remove security group - azure_rm_securitygroup: - resource_group: "{{ resource_group }}" - name: secgroupfoo - state: absent - -- name: Remove virtual network - azure_rm_virtualnetwork: - name: My_Virtual_Network - resource_group: "{{ resource_group }}" - state: absent diff --git a/test/integration/targets/azure_rm_trafficmanagerprofile/aliases b/test/integration/targets/azure_rm_trafficmanagerprofile/aliases deleted file mode 100644 index a31676ea12..0000000000 --- a/test/integration/targets/azure_rm_trafficmanagerprofile/aliases +++ /dev/null @@ -1,3 +0,0 @@ -cloud/azure -shippable/azure/group6 -destructive diff --git a/test/integration/targets/azure_rm_trafficmanagerprofile/meta/main.yml b/test/integration/targets/azure_rm_trafficmanagerprofile/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_trafficmanagerprofile/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_trafficmanagerprofile/tasks/main.yml b/test/integration/targets/azure_rm_trafficmanagerprofile/tasks/main.yml deleted file mode 100644 index dba81c0e25..0000000000 --- a/test/integration/targets/azure_rm_trafficmanagerprofile/tasks/main.yml +++ /dev/null @@ -1,289 +0,0 @@ -- name: Prepare random number - set_fact: - tmname: "tm{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - endpointname1: "ep1{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - endpointname2: "ep2{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - run_once: yes - - -- name: Create a Traffic Manager profile(check mode) - azure_rm_trafficmanagerprofile: - resource_group: "{{ resource_group }}" - name: "{{ tmname }}" - tags: - testing: testing - delete: on-exit - foo: bar - location: global - profile_status: enabled - routing_method: performance - dns_config: - relative_name: "{{ tmname }}" - ttl: 60 - monitor_config: - protocol: HTTPS - port: 80 - path: '/' - check_mode: yes - -- name: Check there is no Traffic Manager profile created - azure_rm_trafficmanagerprofile_facts: - resource_group: "{{ resource_group }}" - name: "{{ tmname }}" - register: fact - -- name: Check there is no Traffic Manager profile created - assert: { that: "{{ fact.tms | length }} == 0" } - -- name: Create a Traffic Manager profile - azure_rm_trafficmanagerprofile: - resource_group: "{{ resource_group }}" - name: "{{ tmname }}" - tags: - testing: testing - delete: on-exit - foo: bar - location: global - profile_status: enabled - routing_method: performance - dns_config: - relative_name: "{{ tmname }}" - ttl: 60 - monitor_config: - protocol: HTTPS - port: 80 - path: '/' - register: tm - -- name: Assert the Traffic Manager profile is well created - assert: - that: - - tm.changed - -- name: Gather Traffic Manager profile facts - azure_rm_trafficmanagerprofile_facts: - resource_group: "{{ resource_group }}" - name: "{{ tmname }}" - register: fact - -- name: Assert fact returns the created one - assert: - that: - - "fact.tms | length == 1" - - fact.tms[0].id == tm.id - - fact.tms[0].endpoints | length == 0 - -- name: Create a Traffic Manager profile (idempotent) - azure_rm_trafficmanagerprofile: - resource_group: "{{ resource_group }}" - name: "{{ tmname }}" - tags: - testing: testing - delete: on-exit - foo: bar - location: global - profile_status: enabled - routing_method: performance - dns_config: - relative_name: "{{ tmname }}" - ttl: 60 - monitor_config: - protocol: HTTPS - port: 80 - path: '/' - register: output - -- name: Assert idempotent - assert: - that: - - not output.changed - -- name: Update the Traffic Manager profile - azure_rm_trafficmanagerprofile: - resource_group: "{{ resource_group }}" - name: "{{ tmname }}" - tags: - testing: testing - delete: on-exit - foo: bar - location: global - profile_status: disabled - routing_method: priority - dns_config: - relative_name: "{{ tmname }}" - ttl: 60 - monitor_config: - protocol: HTTPS - port: 80 - path: '/' - register: output - -- name: Assert the Traffic Manager profile is updated - assert: - that: - - output.changed - -- name: Create Traffic Manager endpoint(check mode) - azure_rm_trafficmanagerendpoint: - resource_group: "{{ resource_group }}" - profile_name: "{{ tmname }}" - name: "{{ endpointname1 }}" - type: external_endpoints - location: westus - priority: 2 - weight: 1 - target: 1.2.3.4 - check_mode: yes - register: output - -- name: Assert check mode changed - assert: - that: - - output.changed - -- name: Get endpoint - azure_rm_trafficmanagerendpoint_facts: - resource_group: "{{ resource_group }}" - profile_name: "{{ tmname }}" - register: facts - -- name: Check no endpoint created in check mode - assert: - that: - - facts.endpoints | length == 0 - -- name: Create Traffic Manager endpoint - azure_rm_trafficmanagerendpoint: - resource_group: "{{ resource_group }}" - profile_name: "{{ tmname }}" - name: "{{ endpointname1 }}" - type: external_endpoints - location: westus - priority: 2 - weight: 1 - target: 1.2.3.4 - register: output - -- name: Assert endpoint create changed - assert: - that: - - output.changed - -- name: Get endpoint - azure_rm_trafficmanagerendpoint_facts: - resource_group: "{{ resource_group }}" - profile_name: "{{ tmname }}" - register: facts - -- name: Check endpoint created - assert: - that: - - facts.endpoints | length == 1 - - facts.endpoints[0].name == "{{ endpointname1 }}" - -- name: Create second Traffic Manager endpoint - azure_rm_trafficmanagerendpoint: - resource_group: "{{ resource_group }}" - profile_name: "{{ tmname }}" - name: "{{ endpointname2 }}" - type: external_endpoints - location: westus - priority: 1 - weight: 3 - target: 4.3.2.1 - -- name: Get endpoint - azure_rm_trafficmanagerendpoint_facts: - resource_group: "{{ resource_group }}" - profile_name: "{{ tmname }}" - register: facts - -- name: Check 2 endpoint in profile - assert: - that: - - facts.endpoints | length == 2 - -- name: Create endpoint (idempotent) - azure_rm_trafficmanagerendpoint: - resource_group: "{{ resource_group }}" - profile_name: "{{ tmname }}" - name: "{{ endpointname2 }}" - type: external_endpoints - location: westus - priority: 1 - weight: 3 - target: 4.3.2.1 - register: output - -- name: Assert endpoint creation idempotent - assert: - that: - - output.changed == False - -- name: Delete second endpoint - azure_rm_trafficmanagerendpoint: - resource_group: "{{ resource_group }}" - profile_name: "{{ tmname }}" - name: "{{ endpointname2 }}" - type: external_endpoints - state: absent - register: output - -- name: Assert endpoint deletion changed - assert: - that: - - output.changed - -- name: Get endpoint - azure_rm_trafficmanagerendpoint_facts: - resource_group: "{{ resource_group }}" - profile_name: "{{ tmname }}" - register: facts - -- name: Check 1 endpoint left in profile - assert: - that: - - facts.endpoints | length == 1 - -- name: Delete the Traffic Manager profile(check mode) - azure_rm_trafficmanagerprofile: - resource_group: "{{ resource_group }}" - name: "{{ tmname }}" - state: absent - check_mode: yes - -- name: Gather Traffic Manager profile facts - azure_rm_trafficmanagerprofile_facts: - resource_group: "{{ resource_group }}" - name: "{{ tmname }}" - register: fact - -- name: Assert the traffic manager profile is still there - assert: - that: - - "fact.tms | length == 1" - - fact.tms[0].id == tm.id - - fact.tms[0].endpoints | length == 1 - -- name: Delete the Traffic Manager profile - azure_rm_trafficmanagerprofile: - resource_group: "{{ resource_group }}" - name: "{{ tmname }}" - state: absent - register: output - -- name: Assert the Traffic Manager profile is well deleted - assert: - that: - - output.changed - -- name: Get Traffic Manager profile fact - azure_rm_trafficmanagerprofile_facts: - resource_group: "{{ resource_group }}" - name: "{{ tmname }}" - register: fact - -- name: Assert fact returns empty - assert: - that: - - "fact.tms | length == 0" diff --git a/test/integration/targets/azure_rm_virtualmachine/aliases b/test/integration/targets/azure_rm_virtualmachine/aliases deleted file mode 100644 index a5238c1984..0000000000 --- a/test/integration/targets/azure_rm_virtualmachine/aliases +++ /dev/null @@ -1,4 +0,0 @@ -cloud/azure -shippable/azure/group7 -destructive -azure_rm_virtualmachine_facts diff --git a/test/integration/targets/azure_rm_virtualmachine/inventory.yml b/test/integration/targets/azure_rm_virtualmachine/inventory.yml deleted file mode 100644 index acd98ebf7f..0000000000 --- a/test/integration/targets/azure_rm_virtualmachine/inventory.yml +++ /dev/null @@ -1,66 +0,0 @@ -all: - hosts: - azure_test_invalid: - azure_test_public_ip: - network: 10.42.0.0/24 - subnet: 10.42.0.0/28 - - azure_test_no_public_ip: - network: 10.42.1.0/24 - subnet: 10.42.1.0/28 - - azure_test_deallocate: - network: 10.42.2.0/24 - subnet: 10.42.2.0/28 - - azure_test_minimal: - network: 10.42.3.0/24 - subnet: 10.42.3.0/28 - - azure_test_dual_nic: - network: 10.42.4.0/24 - subnet: 10.42.4.0/28 - secondary_network: 10.42.5.0/24 - secondary_subnet: 10.42.5.0/28 - nic_list: - - name: "{{ 'int' ~ uid_short ~ '-1' }}" - resource_group: "{{ resource_group_secondary }}" - - name: "{{ 'int' ~ uid_short ~ '-2' }}" - resource_group: "{{ resource_group_secondary }}" - - vars: - ansible_connection: local - ansible_python_interpreter: "{{ ansible_playbook_python }}" - - uid: "{{ (resource_group ~ inventory_hostname) | hash('md5') | truncate(18, True, '') }}" - uid_short: "{{ (resource_group ~ inventory_hostname) | hash('md5') | truncate(10, True, '') }}" - - storage_account: "{{ 'stor' ~ uid }}" - availability_set: "{{ 'avbs' ~ uid_short }}" - vm_name: "{{ 'vm' ~ uid_short }}" - network_name: "{{ 'vnet' ~ uid_short }}" - subnet_name: "{{ 'snet' ~ uid_short }}" - security_group: "{{ 'sg' ~ uid_short }}" - public_ip_name: "{{ 'ip' ~ uid_short }}" - interface_name: "{{ 'int' ~ uid_short }}" - - ssh_keys: - - path: '/home/chouseknecht/.ssh/authorized_keys' - key_data: "ssh-rsa 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 chouseknecht@ansible.com" - - image: - offer: CentOS - publisher: OpenLogic - sku: '7.1' - version: latest - - image_paid: - publisher: cognosys - offer: ubuntu-14-04-lts - sku: hardened-ubuntu-14-04 - version: latest - - plan_paid: - name: hardened-ubuntu-14-04 - product: ubuntu-14-04-lts - publisher: cognosys diff --git a/test/integration/targets/azure_rm_virtualmachine/main.yml b/test/integration/targets/azure_rm_virtualmachine/main.yml deleted file mode 100644 index 7722487bff..0000000000 --- a/test/integration/targets/azure_rm_virtualmachine/main.yml +++ /dev/null @@ -1,7 +0,0 @@ -- name: Run Azurue VM tests in parallel - hosts: all - gather_facts: no - strategy: free - tasks: - - name: Include tasks based on inventory hostname - include_tasks: tasks/{{ inventory_hostname }}.yml diff --git a/test/integration/targets/azure_rm_virtualmachine/runme.sh b/test/integration/targets/azure_rm_virtualmachine/runme.sh deleted file mode 100755 index c7895c9d26..0000000000 --- a/test/integration/targets/azure_rm_virtualmachine/runme.sh +++ /dev/null @@ -1,5 +0,0 @@ -#!/usr/bin/env bash - -set -eux - -ansible-playbook -i inventory.yml main.yml "$@" diff --git a/test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_deallocate.yml b/test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_deallocate.yml deleted file mode 100644 index 52fc0102e8..0000000000 --- a/test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_deallocate.yml +++ /dev/null @@ -1,90 +0,0 @@ -- include_tasks: setup.yml - -- name: Create minimal VM with defaults - azure_rm_virtualmachine: - resource_group: "{{ resource_group }}" - name: "{{ vm_name }}" - admin_username: "testuser" - admin_password: "Pass123$$$abx!" - vm_size: Standard_A0 - virtual_network: "{{ network_name }}" - image: - offer: UbuntuServer - publisher: Canonical - sku: 16.04-LTS - version: latest - register: vm_output - -- name: Restart the virtual machine - azure_rm_virtualmachine: - resource_group: "{{ resource_group }}" - name: "{{ vm_name }}" - restarted: yes - vm_size: Standard_A0 - register: restart_result - -- name: Ensue VM was restarted - assert: - that: - - "azure_vm.powerstate in ['starting', 'running']" - - restart_result is changed - -- name: Deallocate the virtual machine - azure_rm_virtualmachine: - resource_group: "{{ resource_group }}" - name: "{{ vm_name }}" - allocated: no - vm_size: Standard_A0 - register: deallocate_result - -- name: Ensure VM was deallocated - assert: - that: - - azure_vm.powerstate == 'deallocated' - - deallocate_result is changed - -- name: Start the virtual machine - azure_rm_virtualmachine: - resource_group: "{{ resource_group }}" - name: "{{ vm_name }}" - vm_size: Standard_A0 - register: start_result - -- name: Ensure VM was started - assert: - that: - - "azure_vm.powerstate in ['starting', 'running']" - - start_result is changed - -- name: Delete VM - azure_rm_virtualmachine: - resource_group: "{{ resource_group }}" - name: "{{ vm_name }}" - state: absent - remove_on_absent: all_autocreated - -- name: Destroy subnet - azure_rm_subnet: - resource_group: "{{ resource_group }}" - virtual_network: "{{ network_name }}" - name: "{{ subnet_name }}" - state: absent - -- name: Destroy virtual network - azure_rm_virtualnetwork: - resource_group: "{{ resource_group }}" - name: "{{ network_name }}" - state: absent - -- name: Destroy availability set - azure_rm_availabilityset: - resource_group: "{{ resource_group }}" - name: "{{ availability_set }}" - state: absent - -- name: Destroy storage account - azure_rm_storageaccount: - resource_group: "{{ resource_group }}" - name: "{{ storage_account }}" - force_delete_nonempty: yes - state: absent diff --git a/test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_dual_nic.yml b/test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_dual_nic.yml deleted file mode 100644 index a5bbbad9a2..0000000000 --- a/test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_dual_nic.yml +++ /dev/null @@ -1,131 +0,0 @@ -- include_tasks: setup.yml - -- name: Create virtual network in secondary resource group - azure_rm_virtualnetwork: - resource_group: "{{ resource_group_secondary }}" - name: "{{ network_name ~ '-2' }}" - address_prefixes: "{{ secondary_network }}" - register: create_virt_net_result - -- name: Create subnet in secondary resource group - azure_rm_subnet: - resource_group: "{{ resource_group_secondary }}" - name: "{{ subnet_name ~ '-2' }}" - address_prefix: "{{ secondary_subnet }}" - virtual_network: "{{ network_name ~ '-2' }}" - -- name: Create NICs for dual NIC VM in secondary resource group - azure_rm_networkinterface: - resource_group: "{{ item.resource_group }}" - name: "{{ item.name }}" - virtual_network: "{{ network_name ~ '-2' }}" - subnet: "{{ subnet_name ~ '-2' }}" - loop: "{{ nic_list }}" - -- name: Create virtual machine with two NICs - azure_rm_virtualmachine: - resource_group: "{{ resource_group }}" # Should this be resource_group_secondary? - name: "{{ vm_name }}" - vm_size: Standard_A0 - storage_account: "{{ storage_account }}" - storage_container: "{{ vm_name }}" - storage_blob: "{{ vm_name }}.vhd" - admin_username: adminuser - admin_password: Password123! - short_hostname: testvm - os_type: Linux - os_disk_size_gb: 64 - os_disk_name: testosdiskxx - network_interfaces: "{{ nic_list }}" - availability_set: "{{ availability_set }}" - image: - offer: UbuntuServer - publisher: Canonical - sku: 16.04-LTS - version: latest - tags: - abc: def - -- name: Ensure VM was created properly - assert: - that: - - azure_vm.properties.availabilitySet.id - - azure_vm.properties.storageProfile.osDisk.name == 'testosdiskxx' - -- name: Retrieve VM facts (filtering by name) - azure_rm_virtualmachine_facts: - resource_group: "{{ resource_group }}" # Should this be resource_group_secondary? - name: "{{ vm_name }}" - register: vm_facts_results - -- name: Ensure facts module returned the second VM - assert: - that: - - vm_facts_results.vms | length == 1 - - vm_facts_results.vms[0].name == "{{ vm_name }}" - - vm_facts_results.vms[0].location - - vm_facts_results.vms[0].admin_username == 'adminuser' - - vm_facts_results.vms[0].resource_group == "{{ resource_group }}" - - vm_facts_results.vms[0].power_state != None - -- name: Retrieve facts by tags - azure_rm_virtualmachine_facts: - tags: - - abc:def - register: facts_by_tags_results - -- name: Assert that facts module returned the second VM - assert: - that: - - facts_by_tags_results.vms | length >= 1 - -- name: Should be idempotent with a dual NICs - azure_rm_virtualmachine: - resource_group: "{{ resource_group }}" # Should this be resource_group_secondary? - name: "{{ vm_name }}" - vm_size: Standard_A0 - storage_account: "{{ storage_account }}" - storage_container: "{{ vm_name }}" - storage_blob: "{{ vm_name }}.vhd" - admin_username: adminuser - admin_password: Password123! - short_hostname: testvm - os_type: Linux - os_disk_size_gb: 64 - network_interfaces: "{{ nic_list }}" - availability_set: "{{ availability_set }}" - image: - offer: UbuntuServer - publisher: Canonical - sku: 16.04-LTS - version: latest - register: dual_nics_result - -- name: Ensure nothing changed - assert: - that: dual_nics_result is not changed - -- name: Generalize VM - azure_rm_virtualmachine: - resource_group: "{{ resource_group }}" # Should this be resource_group_secondary? - name: "{{ vm_name }}" - generalized: yes - -- name: Gather facts and check if machine is generalized - azure_rm_virtualmachine_facts: - resource_group: "{{ resource_group }}" # Should this be resource_group_secondary? - name: "{{ vm_name }}" - register: generalized_output - -- name: Ensure power state is generalized - assert: - that: generalized_output.vms[0].power_state == 'generalized' - -- name: Delete dual NIC VM - azure_rm_virtualmachine: - resource_group: "{{ resource_group }}" # Should this be resource_group_secondary? - name: "{{ vm_name }}" - state: absent - vm_size: Standard_A0 - async: 5000 - poll: 0 diff --git a/test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_invalid.yml b/test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_invalid.yml deleted file mode 100644 index 86ec72de1f..0000000000 --- a/test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_invalid.yml +++ /dev/null @@ -1,35 +0,0 @@ -# TODO: Until we have a module to create/delete images this is the best tests I can do -- name: Assert error thrown with invalid image dict - azure_rm_virtualmachine: - resource_group: "{{ resource_group }}" - name: "{{ vm_name }}" - image: - offer: UbuntuServer - register: fail_invalid_image_dict - failed_when: 'fail_invalid_image_dict.msg != "parameter error: expecting image to contain [publisher, offer, sku, version], [name, resource_group] or [id]"' - -- name: Assert error thrown with invalid image type - azure_rm_virtualmachine: - resource_group: "{{ resource_group }}" - name: "{{ vm_name }}" - image: - - testing - register: fail_invalid_image_type - failed_when: 'fail_invalid_image_type.msg != "parameter error: expecting image to be a string or dict not list"' - -- name: Assert error finding missing custom image - azure_rm_virtualmachine: - resource_group: "{{ resource_group }}" - name: "{{ vm_name }}" - image: invalid-image - register: fail_missing_custom_image - failed_when: fail_missing_custom_image.msg != "Error could not find image with name invalid-image" - -- name: Assert error finding missing custom image (dict style) - azure_rm_virtualmachine: - resource_group: "{{ resource_group }}" - name: "{{ vm_name }}" - image: - name: invalid-image - register: fail_missing_custom_image_dict - failed_when: fail_missing_custom_image_dict.msg != "Error could not find image with name invalid-image" diff --git a/test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_minimal.yml b/test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_minimal.yml deleted file mode 100644 index 8f2767f34e..0000000000 --- a/test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_minimal.yml +++ /dev/null @@ -1,118 +0,0 @@ -- include_tasks: setup.yml - -# # Tests possible when CI user acccount setup with required authority -# - name: Create virtual machine with image and plan which requires acceptance of terms -# azure_rm_virtualmachine: -# resource_group: "{{ resource_group }}" -# name: testvm009 -# vm_size: Standard_A0 -# storage_account: "{{ storage_account }}" -# storage_container: testvm001 -# storage_blob: testvm003.vhd -# admin_username: adminuser -# admin_password: Password123! -# short_hostname: testvm -# os_type: Linux -# availability_set: "{{ availability_set }}" -# image: "{{ image_paid }}" -# plan_paid: "{{ plan_paid }}" -# register: create_image_plan_result - -# - assert: -# that: -# - create_image_plan_result is changed -# - create_image_plan_result.ansible_facts.azure_vm.properties.storageProfile.imageReference.publisher == image_paid.publisher - -# - name: Should be idempotent with image and plan which requires acceptance of terms -# azure_rm_virtualmachine: -# resource_group: "{{ resource_group }}" -# name: testvm009 -# vm_size: Standard_A0 -# storage_account: "{{ storage_account }}" -# storage_container: testvm001 -# storage_blob: testvm003.vhd -# admin_username: adminuser -# admin_password: Password123! -# short_hostname: testvm -# os_type: Linux -# availability_set: "{{ availability_set }}" -# image: "{{ image_paid }}" -# plan_paid: "{{ plan_paid }}" -# register: create_image_plan_again_result - -# - assert: -# that: create_image_plan_again is not changed - -- name: Create minimal VM with defaults - azure_rm_virtualmachine: - resource_group: "{{ resource_group }}" - name: "{{ vm_name }}" - admin_username: "testuser" - admin_password: "Pass123$$$abx!" - vm_size: Standard_B1ms - virtual_network: "{{ network_name }}" - image: - offer: UbuntuServer - publisher: Canonical - sku: 16.04-LTS - version: latest - register: vm_output - -- name: Delete VM - azure_rm_virtualmachine: - resource_group: "{{ resource_group }}" - name: "{{ vm_name }}" - remove_on_absent: all_autocreated - state: absent - -- name: Query auto created NIC - azure_rm_networkinterface_info: - resource_group: "{{ resource_group }}" - name: "{{ vm_name }}01" - register: nic_result - -- name: Query auto created security group - azure_rm_securitygroup_info: - resource_group: "{{ resource_group }}" - name: "{{ vm_name }}01" - register: nsg_result - -- name: Query auto created public IP - azure_rm_publicipaddress_info: - resource_group: "{{ resource_group }}" - name: "{{ vm_name }}01" - register: pip_result - -- name: Assert that autocreated resources were deleted - assert: - that: - # what about the default storage group? - - nic_result.networkinterfaces | length == 0 - - nsg_result.securitygroups | length == 0 - - pip_result.publicipaddresses | length == 0 - -- name: Destroy subnet - azure_rm_subnet: - resource_group: "{{ resource_group }}" - virtual_network: "{{ network_name }}" - name: "{{ subnet_name }}" - state: absent - -- name: Destroy virtual network - azure_rm_virtualnetwork: - resource_group: "{{ resource_group }}" - name: "{{ network_name }}" - state: absent - -- name: Destroy availability set - azure_rm_availabilityset: - resource_group: "{{ resource_group }}" - name: "{{ availability_set }}" - state: absent - -- name: Destroy storage account - azure_rm_storageaccount: - resource_group: "{{ resource_group }}" - name: "{{ storage_account }}" - force_delete_nonempty: yes - state: absent diff --git a/test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_no_public_ip.yml b/test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_no_public_ip.yml deleted file mode 100644 index f06eea8524..0000000000 --- a/test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_no_public_ip.yml +++ /dev/null @@ -1,41 +0,0 @@ -- include_tasks: setup.yml - -- name: Create virtual machine without public ip address and with boot diagnostics enabled - azure_rm_virtualmachine: - resource_group: "{{ resource_group }}" - name: "{{ vm_name }}" - vm_size: Standard_A0 - admin_username: adminuser - admin_password: Password123! - short_hostname: testvm - os_type: Linux - public_ip_allocation_method: Disabled - storage_account_name: "{{ storage_account }}" - availability_set: "{{ availability_set }}" - virtual_network: "{{ network_name }}" - boot_diagnostics: - enabled: yes - image: - offer: UbuntuServer - publisher: Canonical - sku: 16.04-LTS - version: latest - register: create_vm_public_result - -- name: Ensure VM was created properly - assert: - that: - - azure_vm.properties.diagnosticsProfile.bootDiagnostics.enabled - - azure_vm.properties.diagnosticsProfile.bootDiagnostics.storageUri is defined - - azure_vm.properties.instanceView.bootDiagnostics.consoleScreenshotBlobUri is defined - - azure_vm.properties.instanceView.bootDiagnostics.serialConsoleLogBlobUri is defined - - not 'publicIPAddress' in create_vm_public_result.ansible_facts.azure_vm.properties.networkProfile.networkInterfaces[0].properties.ipConfigurations[0].properties - -- name: Delete VM with no public ip - azure_rm_virtualmachine: - resource_group: "{{ resource_group }}" - name: "{{ vm_name }}" - state: absent - remove_on_absent: all_autocreated - async: 5000 - poll: 0 diff --git a/test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_public_ip.yml b/test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_public_ip.yml deleted file mode 100644 index f25d944a78..0000000000 --- a/test/integration/targets/azure_rm_virtualmachine/tasks/azure_test_public_ip.yml +++ /dev/null @@ -1,311 +0,0 @@ -- include_tasks: setup.yml - -- name: Create public ip - azure_rm_publicipaddress: - resource_group: "{{ resource_group }}" - allocation_method: Static - name: "{{ public_ip_name }}" - -- name: Create security group - azure_rm_securitygroup: - resource_group: "{{ resource_group }}" - name: "{{ security_group }}" - purge_rules: yes - rules: - - name: ALLOW_SSH - protocol: Tcp - destination_port_range: 22 - access: Allow - priority: 100 - direction: Inbound - - - name: ALLOW_HTTP - protocol: Tcp - destination_port_range: 80 - access: Allow - priority: 110 - direction: Inbound - -- name: Create network interface - azure_rm_networkinterface: - resource_group: "{{ resource_group }}" - name: "{{ interface_name }}" - virtual_network: "{{ network_name }}" - subnet: "{{ subnet_name }}" - public_ip_name: "{{ public_ip_name }}" - security_group: "{{ security_group }}" - -- name: Create virtual machine with a single NIC and no boot diagnostics - register: output - azure_rm_virtualmachine: - resource_group: "{{ resource_group }}" - name: "{{ vm_name }}" - vm_size: Standard_A0 - storage_account: "{{ storage_account }}" - storage_container: "{{ vm_name }}" - storage_blob: "{{ vm_name }}.vhd" - admin_username: adminuser - admin_password: Password123! - short_hostname: testvm - os_type: Linux - network_interfaces: "{{ interface_name }}" - availability_set: "{{ availability_set }}" - image: - offer: UbuntuServer - publisher: Canonical - sku: 16.04-LTS - version: latest - custom_data: | - #!/bin/sh - echo "custom_data was executed" > /tmp/custom_data.txt - -- name: Ensure VM was created properly - assert: - that: - - azure_vm.properties.provisioningState == 'Succeeded' - - azure_vm.properties.availabilitySet.id - # initial response from creation has no diagnosticsProfile - # if you run it again however, there is one in the response - # so we handle both cases - - "'diagnosticsProfile' not in azure_vm.properties or not azure_vm.properties.diagnosticsProfile.bootDiagnostics.enabled" - -- name: Get facts for virtual machine without boot diagnostics disabled - azure_rm_virtualmachine_facts: - resource_group: "{{ resource_group }}" - name: "{{ vm_name }}" - register: vm_facts_no_boot_diag_result - -- name: Ensure VM facts are correct - assert: - that: - - vm_facts_no_boot_diag_result.vms != [] - - not vm_facts_no_boot_diag_result.vms[0].boot_diagnostics.enabled - - not vm_facts_no_boot_diag_result.vms[0].boot_diagnostics.storage_uri - -- name: Enable boot diagnostics on an existing VM for the first time without specifying a storage account - azure_rm_virtualmachine: - resource_group: "{{ resource_group }}" - name: "{{ vm_name }}" - boot_diagnostics: - enabled: yes - # without specifying storage_account you get a new default storage account for the VM - -- name: Ensure VM properties are correct - assert: - that: - - azure_vm.properties.diagnosticsProfile.bootDiagnostics.enabled - - azure_vm.properties.diagnosticsProfile.bootDiagnostics.storageUri is defined - - azure_vm.properties.instanceView.bootDiagnostics.consoleScreenshotBlobUri is defined - - azure_vm.properties.instanceView.bootDiagnostics.serialConsoleLogBlobUri is defined - -- name: Get facts for virtual machine with boot diagnostics enabled - azure_rm_virtualmachine_facts: - resource_group: "{{ resource_group }}" - name: "{{ vm_name }}" - register: vm_facts_boot_diag_result - -- name: Ensure VM facts were returned - assert: - that: - - vm_facts_boot_diag_result.vms != [] - - vm_facts_boot_diag_result.vms[0].boot_diagnostics.enabled - - vm_facts_boot_diag_result.vms[0].boot_diagnostics.storage_uri is defined - - vm_facts_boot_diag_result.vms[0].boot_diagnostics.console_screenshot_uri is defined - - vm_facts_boot_diag_result.vms[0].boot_diagnostics.serial_console_log_uri is defined - -- name: Change the boot diagnostics storage account while enabled - azure_rm_virtualmachine: - resource_group: "{{ resource_group }}" - name: "{{ vm_name }}" - boot_diagnostics: - enabled: yes - storage_account: "{{ storage_account }}" - ignore_errors: yes - -- name: Disable boot diagnostics and change the storage account at the same time - azure_rm_virtualmachine: - resource_group: "{{ resource_group }}" - name: "{{ vm_name }}" - boot_diagnostics: - enabled: no - storage_account: "{{ storage_account }}" - -- name: Ensure boot diagnostics was disabled - assert: - that: - - not azure_vm.properties.diagnosticsProfile.bootDiagnostics.enabled - -- name: Re-enable boot diagnostics on an existing VM where it was previously configured - azure_rm_virtualmachine: - resource_group: "{{ resource_group }}" - name: "{{ vm_name }}" - boot_diagnostics: - enabled: yes - register: reenable_boot_diag_result - -- name: Ensure boot diagnostics was reenabled - assert: - that: - - azure_vm.properties.diagnosticsProfile.bootDiagnostics.enabled - - azure_vm.properties.diagnosticsProfile.bootDiagnostics.storageUri is defined - - azure_vm.properties.instanceView.bootDiagnostics.consoleScreenshotBlobUri is defined - - azure_vm.properties.instanceView.bootDiagnostics.serialConsoleLogBlobUri is defined - -# - add_host: -# name: new_azure_vm -# ansible_host: '{{ reenable_boot_diag_result.ansible_facts.azure_vm.properties.networkProfile.networkInterfaces[0].properties.ipConfigurations[0].properties.publicIPAddress.properties.ipAddress }}' -# ansible_connection: paramiko # not guaranteed to have sshpass... -# ansible_user: adminuser -# ansible_password: Password123! -# ansible_host_key_checking: no - -# - name: wait for SSH port to be open -# wait_for: -# host: '{{ hostvars["new_azure_vm"].ansible_host }}' -# port: 22 -# timeout: 60 -# state: started - -# # TODO: figure out how to make this work under ansible-test with the coverage injector -# - block: -# - name: wait for host to answer on SSH -# delegate_to: new_azure_vm -# wait_for_connection: - -# - name: get content from custom_data script -# raw: cat /tmp/custom_data.txt -# register: custom_data_content - -# - name: assert contents -# assert: -# that: custom_data_content.stdout | regex_search('custom_data was executed') -# delegate_to: new_azure_vm - -# # TODO: figure out how to make this work under ansible-test with the coverage injector -# - name: wait for file/content created by custom_data script -# delegate_to: new_azure_vm -# vars: -# ansible_python_interpreter: python -# wait_for: -# path: /tmp/custom_data.txt -# search_regex: ^custom_data was executed$ -# timeout: 20 - -- name: Should be idempotent with a single NIC - azure_rm_virtualmachine: - resource_group: "{{ resource_group }}" - name: "{{ vm_name }}" - vm_size: Standard_A0 - storage_account: "{{ storage_account }}" - storage_container: "{{ vm_name }}" - storage_blob: "{{ vm_name }}.vhd" - admin_username: adminuser - admin_password: Password123! - short_hostname: testvm - os_type: Linux - network_interfaces: "{{ interface_name }}" - image: - offer: UbuntuServer - publisher: Canonical - sku: 16.04-LTS - version: latest - register: single_nic_result - -- name: Ensure nothing changed - assert: - that: single_nic_result is not changed - -- name: Resize VM - azure_rm_virtualmachine: - resource_group: "{{ resource_group }}" - name: "{{ vm_name }}" - vm_size: Standard_A1 - storage_account: "{{ storage_account }}" - storage_container: "{{ vm_name }}" - storage_blob: "{{ vm_name }}.vhd" - admin_username: adminuser - admin_password: Password123! - short_hostname: testvm - os_type: Linux - network_interfaces: "{{ interface_name }}" - image: - offer: UbuntuServer - publisher: Canonical - sku: 16.04-LTS - version: latest - register: resize_result - -- name: Esure VM was resized - assert: - that: - - resize_result is changed - - resize_result.ansible_facts.azure_vm.properties.hardwareProfile.vmSize == "Standard_A1" - -- name: Delete VM - azure_rm_virtualmachine: - resource_group: "{{ resource_group }}" - name: "{{ vm_name }}" - state: absent - vm_size: Standard_A0 - -- name: NIC should be gone - azure_rm_networkinterface_facts: - resource_group: "{{ resource_group }}" - name: "{{ interface_name }}" - -- name: Ensure NIC was removed - assert: - that: azure_networkinterfaces | length == 0 - -- name: Public IP should be gone - azure_rm_publicipaddress_facts: - resource_group: "{{ resource_group }}" - name: "{{ public_ip_name }}" - -- name: Ensure public IP was removed - assert: - that: azure_publicipaddresses | length == 0 - -- name: Destroy NIC - azure_rm_networkinterface: - resource_group: "{{ resource_group }}" - name: "{{ interface_name }}" - state: absent - -- name: Destroy security group - azure_rm_securitygroup: - resource_group: "{{ resource_group }}" - name: "{{ security_group }}" - state: absent - -- name: Destroy subnet - azure_rm_subnet: - resource_group: "{{ resource_group }}" - virtual_network: "{{ network_name }}" - name: "{{ subnet_name }}" - state: absent - -- name: Destroy virtual network - azure_rm_virtualnetwork: - resource_group: "{{ resource_group }}" - name: "{{ network_name }}" - state: absent - -- name: Destroy public ip - azure_rm_publicipaddress: - resource_group: "{{ resource_group }}" - name: "{{ public_ip_name }}" - state: absent - -- name: Destroy availability set - azure_rm_availabilityset: - resource_group: "{{ resource_group }}" - name: "{{ availability_set }}" - state: absent - -- name: Destroy storage account - azure_rm_storageaccount: - resource_group: "{{ resource_group }}" - name: "{{ storage_account }}" - force_delete_nonempty: true - state: absent diff --git a/test/integration/targets/azure_rm_virtualmachine/tasks/setup.yml b/test/integration/targets/azure_rm_virtualmachine/tasks/setup.yml deleted file mode 100644 index f053cac03d..0000000000 --- a/test/integration/targets/azure_rm_virtualmachine/tasks/setup.yml +++ /dev/null @@ -1,26 +0,0 @@ -- debug: - msg: "UID is {{ uid_short }}" - -- name: SETUP | Create storage account - azure_rm_storageaccount: - resource_group: "{{ resource_group }}" - name: "{{ storage_account }}" - account_type: Standard_LRS - -- name: SETUP | Create availability set - azure_rm_availabilityset: - name: "{{ availability_set }}" - resource_group: "{{ resource_group }}" - -- name: SETUP | Create virtual network - azure_rm_virtualnetwork: - resource_group: "{{ resource_group }}" - name: "{{ network_name }}" - address_prefixes: "{{ network }}" - -- name: SETUP | Create subnet - azure_rm_subnet: - resource_group: "{{ resource_group }}" - name: "{{ subnet_name }}" - address_prefix: "{{ subnet }}" - virtual_network: "{{ network_name }}" diff --git a/test/integration/targets/azure_rm_virtualmachineextension/aliases b/test/integration/targets/azure_rm_virtualmachineextension/aliases deleted file mode 100644 index a66cfb4dbb..0000000000 --- a/test/integration/targets/azure_rm_virtualmachineextension/aliases +++ /dev/null @@ -1,4 +0,0 @@ -cloud/azure -shippable/azure/group5 -destructive -azure_rm_virtualmachineextension_facts diff --git a/test/integration/targets/azure_rm_virtualmachineextension/meta/main.yml b/test/integration/targets/azure_rm_virtualmachineextension/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_virtualmachineextension/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_virtualmachineextension/tasks/main.yml b/test/integration/targets/azure_rm_virtualmachineextension/tasks/main.yml deleted file mode 100644 index e195ac731a..0000000000 --- a/test/integration/targets/azure_rm_virtualmachineextension/tasks/main.yml +++ /dev/null @@ -1,181 +0,0 @@ -- name: Create Random Storage Account Name - set_fact: - storage_account: "{{ resource_group | hash('md5') | truncate(24, True, '') }}" - -- name: Create virtual network - azure_rm_virtualnetwork: - resource_group: "{{ resource_group }}" - name: testVnet - address_prefixes: "10.0.0.0/16" - -- name: Add subnet - azure_rm_subnet: - resource_group: "{{ resource_group }}" - name: testSubnet - address_prefix: "10.0.1.0/24" - virtual_network: testVnet - -- name: Create public IP address - azure_rm_publicipaddress: - resource_group: "{{ resource_group }}" - allocation_method: Dynamic - name: testPublicIP - -- name: Create Network Security Group that allows SSH - azure_rm_securitygroup: - resource_group: "{{ resource_group }}" - name: testNetworkSecurityGroup - rules: - - name: SSH - protocol: Tcp - destination_port_range: 22 - access: Allow - priority: 1001 - direction: Inbound - -- name: Create virtual network interface card - azure_rm_networkinterface: - resource_group: "{{ resource_group }}" - name: testNIC - virtual_network: testVnet - subnet: testSubnet - public_ip_name: testPublicIP - security_group_name: testNetworkSecurityGroup - -- name: create a storage account - azure_rm_storageaccount: - resource_group: "{{ resource_group }}" - name: "{{ storage_account }}" - type: Standard_LRS - -- name: Create VM - azure_rm_virtualmachine: - resource_group: "{{ resource_group }}" - name: testVM - vm_size: Standard_DS1_v2 - admin_username: testuser - ssh_password_enabled: true - admin_password: "Password1234!" - network_interfaces: testNIC - storage_account_name: "{{ storage_account }}" - storage_container: osdisk - storage_blob: osdisk.vhd - os_disk_caching: ReadWrite - image: - offer: CoreOS - publisher: CoreOS - sku: Stable - version: latest - -- name: Create VM Extension - azure_rm_virtualmachineextension: - resource_group: "{{ resource_group }}" - name: testVMExtension - virtual_machine_name: testVM - publisher: Microsoft.Azure.Extensions - virtual_machine_extension_type: CustomScript - type_handler_version: 2.0 - auto_upgrade_minor_version: true - settings: {"commandToExecute": "hostname"} - register: results - -- name: Assert that VM Extension ran - assert: - that: results.changed - -- name: Query extension - azure_rm_virtualmachineextension_facts: - resource_group: "{{ resource_group }}" - name: testVMExtension - virtual_machine_name: testVM - register: results -- name: Assert that facts are returned - assert: - that: - - results.changed == False - - results.extensions[0]['id'] != None - - results.extensions[0]['resource_group'] != None - - results.extensions[0]['virtual_machine_name'] != None - - results.extensions[0]['name'] != None - - results.extensions[0]['location'] != None - - results.extensions[0]['publisher'] != None - - results.extensions[0]['type'] != None - - results.extensions[0]['settings'] != None - - results.extensions[0]['auto_upgrade_minor_version'] != None - - results.extensions[0]['provisioning_state'] != None - -- name: List extensions - azure_rm_virtualmachineextension_facts: - resource_group: "{{ resource_group }}" - virtual_machine_name: testVM - register: results -- name: Assert that facts are returned - assert: - that: - - results.changed == False - - results.extensions[0]['id'] != None - - results.extensions[0]['resource_group'] != None - - results.extensions[0]['virtual_machine_name'] != None - - results.extensions[0]['name'] != None - - results.extensions[0]['location'] != None - - results.extensions[0]['publisher'] != None - - results.extensions[0]['type'] != None - - results.extensions[0]['settings'] != None - - results.extensions[0]['auto_upgrade_minor_version'] != None - - results.extensions[0]['provisioning_state'] != None - -- name: Delete VM Extension - azure_rm_virtualmachineextension: - resource_group: "{{ resource_group }}" - name: testVMExtension - virtual_machine_name: testVM - state: absent - publisher: Microsoft.Azure.Extensions - virtual_machine_extension_type: CustomScript - type_handler_version: 2.0 - auto_upgrade_minor_version: true - settings: {"commandToExecute": "hostname"} - register: results - -- name: Assert that VM Extension deleted - assert: - that: results.changed - -- name: Delete VM - azure_rm_virtualmachine: - resource_group: "{{ resource_group }}" - name: testVM - state: absent - remove_on_absent: ['all'] - vm_size: Standard_DS1_v2 - admin_username: testuser - network_interfaces: testNIC - storage_container: osdisk - storage_blob: osdisk.vhd - os_disk_caching: ReadWrite - image: - offer: CoreOS - publisher: CoreOS - sku: Stable - version: latest - -- name: Delete a storage account - azure_rm_storageaccount: - resource_group: "{{ resource_group }}" - name: "{{ storage_account }}" - type: Standard_LRS - state: absent - force_delete_nonempty: true - -- name: Delete Network Security Group that allows SSH - azure_rm_securitygroup: - resource_group: "{{ resource_group }}" - name: testNetworkSecurityGroup - state: absent - -- name: Delete virtual network - azure_rm_virtualnetwork: - resource_group: "{{ resource_group }}" - name: testVnet - state: absent - address_prefixes: "10.0.0.0/16" diff --git a/test/integration/targets/azure_rm_virtualmachineimage_info/aliases b/test/integration/targets/azure_rm_virtualmachineimage_info/aliases deleted file mode 100644 index 9175999b45..0000000000 --- a/test/integration/targets/azure_rm_virtualmachineimage_info/aliases +++ /dev/null @@ -1,4 +0,0 @@ -cloud/azure -shippable/azure/group3 -shippable/azure/smoketest -destructive diff --git a/test/integration/targets/azure_rm_virtualmachineimage_info/meta/main.yml b/test/integration/targets/azure_rm_virtualmachineimage_info/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_virtualmachineimage_info/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_virtualmachineimage_info/tasks/main.yml b/test/integration/targets/azure_rm_virtualmachineimage_info/tasks/main.yml deleted file mode 100644 index 5d16141dfa..0000000000 --- a/test/integration/targets/azure_rm_virtualmachineimage_info/tasks/main.yml +++ /dev/null @@ -1,43 +0,0 @@ -- name: set location - set_fact: - location: eastus - -- name: Get facts for a specific image - azure_rm_virtualmachineimage_info: - location: "{{ location }}" - publisher: OpenLogic - offer: CentOS - sku: '7.3' - version: '7.3.20170707' - register: output - -- assert: - that: output['vmimages'] | length == 1 - -- name: List available versions - azure_rm_virtualmachineimage_info: - location: "{{ location }}" - publisher: OpenLogic - offer: CentOS - sku: '7.3' - register: output - -- assert: - that: output['vmimages'] | length > 0 - -- name: List available offers - azure_rm_virtualmachineimage_info: - location: "{{ location }}" - publisher: OpenLogic - register: output - -- assert: - that: output['vmimages'] | length > 0 - -- name: List available publishers - azure_rm_virtualmachineimage_info: - location: "{{ location }}" - register: output - -- assert: - that: output['vmimages'] | length > 0 diff --git a/test/integration/targets/azure_rm_virtualmachinescaleset/aliases b/test/integration/targets/azure_rm_virtualmachinescaleset/aliases deleted file mode 100644 index 00187fa67a..0000000000 --- a/test/integration/targets/azure_rm_virtualmachinescaleset/aliases +++ /dev/null @@ -1,7 +0,0 @@ -cloud/azure -shippable/azure/group10 -destructive -azure_rm_virtualmachinescaleset_facts -azure_rm_virtualmachinescalesetinstance_facts -azure_rm_virtualmachinescalesetextension -azure_rm_virtualmachinescalesetextension_facts diff --git a/test/integration/targets/azure_rm_virtualmachinescaleset/meta/main.yml b/test/integration/targets/azure_rm_virtualmachinescaleset/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_virtualmachinescaleset/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_virtualmachinescaleset/tasks/main.yml b/test/integration/targets/azure_rm_virtualmachinescaleset/tasks/main.yml deleted file mode 100644 index 67a0b93802..0000000000 --- a/test/integration/targets/azure_rm_virtualmachinescaleset/tasks/main.yml +++ /dev/null @@ -1,617 +0,0 @@ -- name: Prepare random number - set_fact: - rpfx: "{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - run_once: yes - -- name: Create virtual network - azure_rm_virtualnetwork: - resource_group: "{{ resource_group }}" - name: testVnet - address_prefixes: "10.0.0.0/16" - -- name: Add subnet - azure_rm_subnet: - resource_group: "{{ resource_group }}" - name: testSubnet - address_prefix: "10.0.1.0/24" - virtual_network: testVnet - -- name: Create public IP address - azure_rm_publicipaddress: - resource_group: "{{ resource_group }}" - allocation_method: Static - name: testPublicIP - -- name: Create load balancer - azure_rm_loadbalancer: - resource_group: "{{ resource_group }}" - name: testLB - public_ip_address_name: testPublicIP - -- name: Create public IP address 1 - azure_rm_publicipaddress: - resource_group: "{{ resource_group }}" - allocation_method: Static - name: testPublicIP1 - -- name: Create load balancer 1 - azure_rm_loadbalancer: - resource_group: "{{ resource_group }}" - name: testLB1 - public_ip_address_name: testPublicIP1 - -- name: Create network security group within same resource group of VMSS. - azure_rm_securitygroup: - resource_group: "{{ resource_group }}" - name: testNetworkSecurityGroup - -- name: Create network security group in different resource group of VMSS. - azure_rm_securitygroup: - resource_group: "{{ resource_group_secondary }}" - name: testNetworkSecurityGroup2 - -- name: Create virtual network inteface cards for VM A and B - azure_rm_networkinterface: - resource_group: "{{ resource_group }}" - name: "vmforimage{{ rpfx }}nic" - virtual_network: testVnet - subnet: testSubnet - -- name: Create VM - azure_rm_virtualmachine: - resource_group: "{{ resource_group }}" - name: "vmforimage{{ rpfx }}" - admin_username: testuser - admin_password: "Password1234!" - vm_size: Standard_B1ms - network_interfaces: "vmforimage{{ rpfx }}nic" - image: - offer: UbuntuServer - publisher: Canonical - sku: 16.04-LTS - version: latest -- name: Generalize VM - azure_rm_virtualmachine: - resource_group: "{{ resource_group }}" - name: "vmforimage{{ rpfx }}" - generalized: yes -- name: Create image A - azure_rm_image: - resource_group: "{{ resource_group }}" - name: testimagea - source: "vmforimage{{ rpfx }}" -- name: Create image B - azure_rm_image: - resource_group: "{{ resource_group }}" - name: testimageb - source: "vmforimage{{ rpfx }}" -- name: Delete VM - azure_rm_virtualmachine: - resource_group: "{{ resource_group }}" - name: "vmforimage{{ rpfx }}" - state: absent - -- name: Create VMSS (check mode) - azure_rm_virtualmachinescaleset: - resource_group: "{{ resource_group }}" - name: testVMSS{{ rpfx }} - vm_size: Standard_B1s - admin_username: testuser - ssh_password_enabled: true - admin_password: "Password1234!" - capacity: 1 - virtual_network_name: testVnet - subnet_name: testSubnet - load_balancer: testLB - upgrade_policy: Manual - tier: Standard - managed_disk_type: Standard_LRS - os_disk_caching: ReadWrite - image: - offer: CoreOS - publisher: CoreOS - sku: Stable - version: latest - data_disks: - - lun: 0 - disk_size_gb: 64 - caching: ReadWrite - managed_disk_type: Standard_LRS - register: results - check_mode: yes - -- name: Assert that VMSS can be created - assert: - that: results.changed - -- name: Get VMSS to assert no VMSS is created in check mode - azure_rm_virtualmachinescaleset_facts: - resource_group: "{{ resource_group }}" - name: testVMSS{{ rpfx }} - format: curated - register: output_scaleset - -- name: Assert no VMSS created in check mode - assert: - that: - - output_scaleset.ansible_facts.azure_vmss | length == 0 - -- name: Create VMSS - azure_rm_virtualmachinescaleset: - resource_group: "{{ resource_group }}" - name: testVMSS{{ rpfx }} - vm_size: Standard_B1s - admin_username: testuser - ssh_password_enabled: true - admin_password: "Password1234!" - capacity: 1 - virtual_network_name: testVnet - subnet_name: testSubnet - upgrade_policy: Manual - load_balancer: testLB - tier: Standard - managed_disk_type: Standard_LRS - os_disk_caching: ReadWrite - custom_data: "#cloud-config" - image: - offer: CoreOS - publisher: CoreOS - sku: Stable - version: latest - data_disks: - - lun: 0 - disk_size_gb: 64 - caching: ReadWrite - managed_disk_type: Standard_LRS - scale_in_policy: "NewestVM" - register: results - -- name: Assert that VMSS was created - assert: - that: results.changed - -- name: Create VMSS -- test upgrade_policy idempotence and load balancer - azure_rm_virtualmachinescaleset: - resource_group: "{{ resource_group }}" - name: testVMSS{{ rpfx }} - vm_size: Standard_B1s - admin_username: testuser - ssh_password_enabled: true - admin_password: "Password1234!" - capacity: 1 - virtual_network_name: testVnet - subnet_name: testSubnet - upgrade_policy: Automatic - load_balancer: testLB1 - tier: Standard - managed_disk_type: Standard_LRS - os_disk_caching: ReadWrite - custom_data: "#cloud-config" - image: - offer: CoreOS - publisher: CoreOS - sku: Stable - version: latest - data_disks: - - lun: 0 - disk_size_gb: 64 - caching: ReadWrite - managed_disk_type: Standard_LRS - register: results - -- name: Assert that VMSS was created - assert: - that: results.changed - -- name: Retrieve scaleset facts - azure_rm_virtualmachinescaleset_facts: - resource_group: "{{ resource_group }}" - name: testVMSS{{ rpfx }} - format: curated - register: output_scaleset - -- assert: - that: - - output_scaleset.vmss[0].load_balancer == "testLB1" - -- name: Retrieve scaleset VMs facts - azure_rm_virtualmachinescalesetinstance_facts: - resource_group: "{{ resource_group }}" - vmss_name: testVMSS{{ rpfx }} - register: instances - -- name: Assert that facts returned correctly - assert: - that: - - instances.instances | length == 1 - - instances.instances[0].id != None - - instances.instances[0].name != None - - instances.instances[0].instance_id != None - - instances.instances[0].provisioning_state != None - - instances.instances[0].vm_id != None - - instances.instances[0].latest_model != None - - instances.instances[0].power_state != None - -- name: Get scaleset body - set_fact: - body: "{{ output_scaleset.vmss[0] }}" - -- name: Try to update VMSS using output as input - azure_rm_virtualmachinescaleset: - resource_group: "{{ body.resource_group }}" - name: "{{ body.name }}" - vm_size: "{{ body.vm_size }}" - admin_username: "{{ body.admin_username }}" - ssh_password_enabled: "{{ body.ssh_password_enabled }}" - admin_password: "Password1234!" - capacity: "{{ body.capacity }}" - virtual_network_name: "{{ body.virtual_network_name }}" - subnet_name: "{{ body.subnet_name }}" - upgrade_policy: "{{ body.upgrade_policy }}" - load_balancer: "{{ body.load_balancer }}" - tier: "{{ body.tier }}" - managed_disk_type: "{{ body.managed_disk_type }}" - os_disk_caching: "{{ body.os_disk_caching }}" - image: "{{ body.image }}" - data_disks: "{{ body.data_disks }}" - overprovision: "{{ body.overprovision }}" - register: results - -- name: Assert that nothing was changed - assert: - that: not results.changed - -- name: Install VMSS Extension - azure_rm_virtualmachinescalesetextension: - resource_group: "{{ resource_group }}" - vmss_name: testVMSS{{ rpfx }} - name: testExtension - publisher: Microsoft.Azure.Extensions - type: CustomScript - type_handler_version: 2.0 - auto_upgrade_minor_version: true - settings: {"commandToExecute": "sudo apt-get -y install apache2"} - register: results - -- name: Assert that something was changed - assert: - that: results.changed - -- name: Install Again VMSS Extension - again - azure_rm_virtualmachinescalesetextension: - resource_group: "{{ resource_group }}" - vmss_name: testVMSS{{ rpfx }} - name: testExtension - publisher: Microsoft.Azure.Extensions - type: CustomScript - type_handler_version: 2.0 - auto_upgrade_minor_version: true - settings: {"commandToExecute": "sudo apt-get -y install apache2"} - register: results - -- name: Assert that nothing was changed - assert: - that: not results.changed - -- name: Query extension - azure_rm_virtualmachinescalesetextension_facts: - resource_group: "{{ resource_group }}" - vmss_name: testVMSS{{ rpfx }} - name: testExtension - register: results -- name: Assert that facts are returned - assert: - that: - - results.changed == False - - results.extensions[0]['id'] != None - - results.extensions[0]['resource_group'] != None - - results.extensions[0]['vmss_name'] != None - - results.extensions[0]['name'] != None - - results.extensions[0]['publisher'] != None - - results.extensions[0]['type'] != None - - results.extensions[0]['settings'] != None - - results.extensions[0]['auto_upgrade_minor_version'] != None - - results.extensions[0]['provisioning_state'] != None - -- name: List extensions - azure_rm_virtualmachinescalesetextension_facts: - resource_group: "{{ resource_group }}" - vmss_name: testVMSS{{ rpfx }} - register: results -- name: Assert that facts are returned - assert: - that: - - results.changed == False - - results.extensions[0]['id'] != None - - results.extensions[0]['resource_group'] != None - - results.extensions[0]['vmss_name'] != None - - results.extensions[0]['name'] != None - - results.extensions[0]['publisher'] != None - - results.extensions[0]['type'] != None - - results.extensions[0]['settings'] != None - - results.extensions[0]['auto_upgrade_minor_version'] != None - - results.extensions[0]['provisioning_state'] != None - - -- name: Delete VMSS Extension - azure_rm_virtualmachinescalesetextension: - resource_group: "{{ resource_group }}" - vmss_name: testVMSS{{ rpfx }} - name: testExtension - state: absent - register: results - -- name: Assert that change was reported - assert: - that: results.changed - -- name: Upgrade instance to the latest image - azure_rm_virtualmachinescalesetinstance: - resource_group: "{{ resource_group }}" - vmss_name: testVMSS{{ rpfx }} - instance_id: "{{ instances.instances[0].instance_id }}" - latest_model: yes - register: results - -- name: Assert that something has changed - assert: - that: results.changed - -- name: Stop virtual machine - azure_rm_virtualmachinescalesetinstance: - resource_group: "{{ resource_group }}" - vmss_name: testVMSS{{ rpfx }} - instance_id: "{{ instances.instances[0].instance_id }}" - power_state: stopped - register: results - -- name: Assert that something has changed - assert: - that: results.changed - -- name: Delete instance - azure_rm_virtualmachinescalesetinstance: - resource_group: "{{ resource_group }}" - vmss_name: testVMSS{{ rpfx }} - instance_id: "{{ instances.instances[0].instance_id }}" - state: absent - register: results - -- name: Assert that something has changed - assert: - that: results.changed - - -- name: Delete VMSS - azure_rm_virtualmachinescaleset: - resource_group: "{{ resource_group }}" - name: testVMSS{{ rpfx }} - state: absent - -- name: Create VMSS with security group in same resource group, with accelerated networking(check mode). - azure_rm_virtualmachinescaleset: - resource_group: "{{ resource_group }}" - name: testVMSS{{ rpfx }}2 - vm_size: Standard_D3_v2 - capacity: 0 - virtual_network_name: testVnet - subnet_name: testSubnet - admin_username: testuser - ssh_password_enabled: true - admin_password: "Password1234!" - image: - name: testimagea - resource_group: "{{ resource_group }}" - upgrade_policy: Manual - security_group: testNetworkSecurityGroup - enable_accelerated_networking: yes - register: results - check_mode: yes - -- name: Assert that VMSS can be created - assert: - that: results.changed - -- name: Create VMSS with security group in same resource group, with accelerated networking. - azure_rm_virtualmachinescaleset: - resource_group: "{{ resource_group }}" - name: testVMSS{{ rpfx }}2 - vm_size: Standard_D3_v2 - capacity: 0 - virtual_network_name: testVnet - subnet_name: testSubnet - admin_username: testuser - ssh_password_enabled: true - admin_password: "Password1234!" - image: - name: testimagea - resource_group: "{{ resource_group }}" - upgrade_policy: Manual - security_group: testNetworkSecurityGroup - enable_accelerated_networking: yes - register: results - -- name: Assert that VMSS ran - assert: - that: - - 'results.changed' - - 'results.ansible_facts.azure_vmss.properties.virtualMachineProfile.networkProfile.networkInterfaceConfigurations.0.properties.enableAcceleratedNetworking == true' - - 'results.ansible_facts.azure_vmss.properties.virtualMachineProfile.networkProfile.networkInterfaceConfigurations.0.properties.networkSecurityGroup != {}' - -- name: Create VMSS with security group in same resource group, with accelerated networking. - azure_rm_virtualmachinescaleset: - resource_group: "{{ resource_group }}" - name: testVMSS{{ rpfx }}2 - vm_size: Standard_D3_v2 - capacity: 0 - virtual_network_name: testVnet - subnet_name: testSubnet - admin_username: testuser - ssh_password_enabled: true - admin_password: "Password1234!" - image: - name: testimagea - resource_group: "{{ resource_group }}" - upgrade_policy: Manual - security_group: testNetworkSecurityGroup - enable_accelerated_networking: yes - register: results - -- name: Assert that nothing has changed - assert: - that: - - not results.changed - -- name: Create VMSS with security group in same resource group, with accelerated networking. - azure_rm_virtualmachinescaleset: - resource_group: "{{ resource_group }}" - name: testVMSS{{ rpfx }}2 - vm_size: Standard_D3_v2 - capacity: 0 - virtual_network_name: testVnet - subnet_name: testSubnet - admin_username: testuser - ssh_password_enabled: true - admin_password: "Password1234!" - image: - name: testimageb - resource_group: "{{ resource_group }}" - upgrade_policy: Manual - security_group: testNetworkSecurityGroup - enable_accelerated_networking: yes - register: results - -- name: Assert that something has changed - assert: - that: - - results.changed - -- name: update VMSS with security group in different resource group. - azure_rm_virtualmachinescaleset: - resource_group: "{{ resource_group }}" - name: testVMSS{{ rpfx }}2 - vm_size: Standard_B1s - capacity: 0 - virtual_network_name: testVnet - subnet_name: testSubnet - admin_username: testuser - ssh_password_enabled: true - admin_password: "Password1234!" - image: - name: testimageb - resource_group: "{{ resource_group }}" - upgrade_policy: Manual - security_group: - name: testNetworkSecurityGroup2 - resource_group: "{{ resource_group_secondary }}" - register: results - -# disable for now -#- name: Assert that security group is correct -# assert: -# that: -# - 'results.changed' -# - '"testNetworkSecurityGroup2" in results.ansible_facts.azure_vmss.properties.virtualMachineProfile.networkProfile.networkInterfaceConfigurations.0.properties.networkSecurityGroup.id' - -- name: Delete VMSS - azure_rm_virtualmachinescaleset: - resource_group: "{{ resource_group }}" - name: testVMSS{{ rpfx }}2 - state: absent - -- name: Fail when instance type is not supported to enable accelerated networking - azure_rm_virtualmachinescaleset: - resource_group: "{{ resource_group }}" - name: testVMSS{{ rpfx }}4 - vm_size: Standard_B1s - virtual_network_name: testVnet - subnet_name: testSubnet - admin_username: testuser - ssh_password_enabled: true - admin_password: "Password1234!" - image: - offer: CoreOS - publisher: CoreOS - sku: Stable - version: latest - upgrade_policy: Manual - enable_accelerated_networking: yes - register: results - ignore_errors: yes - -- name: Assert failure to show that accelerated networking is enabled only with supported instance types. - assert: - that: - - '"VMSizeIsNotPermittedToEnableAcceleratedNetworkingForVmss" in results.msg' - -- name: Delete network security group - azure_rm_securitygroup: - resource_group: "{{ resource_group }}" - name: testNetworkSecurityGroup - state: absent - -- name: Delete network security group - azure_rm_securitygroup: - resource_group: "{{ resource_group_secondary }}" - name: testNetworkSecurityGroup2 - state: absent - -- name: Delete load balancer - azure_rm_loadbalancer: - resource_group: "{{ resource_group }}" - name: testLB - state: absent - -- name: Delete public IP address - azure_rm_publicipaddress: - resource_group: "{{ resource_group }}" - state: absent - name: testPublicIP - -- name: Delete virtual network - azure_rm_virtualnetwork: - resource_group: "{{ resource_group }}" - name: testVnet - state: absent - address_prefixes: "10.0.0.0/16" - -# TODO: Until we have a module to create/delete images this is the best tests -# I can do -- name: assert error thrown with invalid image dict - azure_rm_virtualmachinescaleset: - resource_group: "{{ resource_group }}" - name: testvm002 - vm_size: Standard_B1s - image: - offer: UbuntuServer - register: fail_invalid_image_dict - failed_when: 'fail_invalid_image_dict.msg != "parameter error: expecting image to contain [publisher, offer, sku, version], [name, resource_group] or [id]"' - -- name: assert error thrown with invalid image type - azure_rm_virtualmachinescaleset: - resource_group: "{{ resource_group }}" - name: testvm002 - vm_size: Standard_B1s - image: - - testing - register: fail_invalid_image_type - failed_when: 'fail_invalid_image_type.msg != "parameter error: expecting image to be a string or dict not list"' - -- name: assert error finding missing custom image - azure_rm_virtualmachinescaleset: - resource_group: "{{ resource_group }}" - name: testvm002 - vm_size: Standard_B1s - image: invalid-image - register: fail_missing_custom_image - failed_when: fail_missing_custom_image.msg != "Error could not find image with name invalid-image" - -- name: assert error finding missing custom image (dict style) - azure_rm_virtualmachinescaleset: - resource_group: "{{ resource_group }}" - name: testvm002 - vm_size: Standard_B1s - image: - name: invalid-image - register: fail_missing_custom_image_dict - failed_when: fail_missing_custom_image_dict.msg != "Error could not find image with name invalid-image" diff --git a/test/integration/targets/azure_rm_virtualnetwork/aliases b/test/integration/targets/azure_rm_virtualnetwork/aliases deleted file mode 100644 index aa77c071a8..0000000000 --- a/test/integration/targets/azure_rm_virtualnetwork/aliases +++ /dev/null @@ -1,3 +0,0 @@ -cloud/azure -shippable/azure/group2 -destructive diff --git a/test/integration/targets/azure_rm_virtualnetwork/meta/main.yml b/test/integration/targets/azure_rm_virtualnetwork/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_virtualnetwork/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_virtualnetwork/tasks/main.yml b/test/integration/targets/azure_rm_virtualnetwork/tasks/main.yml deleted file mode 100644 index ff402462d2..0000000000 --- a/test/integration/targets/azure_rm_virtualnetwork/tasks/main.yml +++ /dev/null @@ -1,181 +0,0 @@ -- name: Prepare random number - set_fact: - vnetname: "vnet{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - -- name: Delete virtual network, if it exists - azure_rm_virtualnetwork: - name: "{{ vnetname }}" - resource_group: "{{ resource_group }}" - state: absent - -- name: Create virtual network - azure_rm_virtualnetwork: - name: "{{ vnetname }}" - address_prefixes_cidr: - - 10.1.0.0/16 - - 172.100.0.0/16 - tags: - testing: testing - delete: on-exit - resource_group: "{{ resource_group }}" - -- name: Create virtual network - azure_rm_virtualnetwork: - name: "{{ vnetname }}" - address_prefixes_cidr: - - 10.1.0.0/16 - - 172.100.0.0/16 - dns_servers: - - 127.0.0.1 - - 127.0.0.3 - tags: - testing: testing - delete: on-exit - resource_group: "{{ resource_group }}" - register: output - -- assert: - that: - - "output.state.address_prefixes | length == 2" - - "output.state.dns_servers | length == 2" - - "output.state.tags.delete == 'on-exit'" - - "output.state.tags | length == 2" - -- name: Attach a subnet - azure_rm_subnet: - resource_group: "{{ resource_group }}" - name: "{{ vnetname }}" - virtual_network_name: "{{ vnetname }}" - address_prefix_cidr: "10.1.0.0/24" - -- name: Gather facts by name, tags - azure_rm_virtualnetwork_facts: - resource_group: "{{ resource_group }}" - name: "{{ vnetname }}" - tags: - - testing - register: facts - -- assert: - that: - - "azure_virtualnetworks | length == 1" - - "facts.virtualnetworks | length == 1" - - "facts.virtualnetworks[0].dns_servers | length == 2" - - "facts.virtualnetworks[0].address_prefixes | length == 2" - - "facts.virtualnetworks[0].subnets | length == 1" - -- name: Gather facts by resource group, tags - azure_rm_virtualnetwork_facts: - resource_group: "{{ resource_group }}" - tags: - - testing - -- assert: - that: "azure_virtualnetworks | length >= 1" - -- name: Gather facts by tags - azure_rm_virtualnetwork_facts: - tags: - - testing - -- assert: - that: "azure_virtualnetworks | length >= 1" - -- name: Should be idempotent - azure_rm_virtualnetwork: - name: "{{ vnetname }}" - address_prefixes_cidr: - - 10.1.0.0/16 - - 172.100.0.0/16 - dns_servers: - - 127.0.0.1 - - 127.0.0.3 - tags: - testing: testing - delete: on-exit - resource_group: "{{ resource_group }}" - register: output - -- assert: - that: not output.changed - -- name: Update tags - azure_rm_virtualnetwork: - name: "{{ vnetname }}" - tags: - testing: 'no' - delete: never - foo: bar - resource_group: "{{ resource_group }}" - register: output - -- assert: - that: output.state.tags | length == 3 - -- name: Purge tags - azure_rm_virtualnetwork: - name: "{{ vnetname }}" - append_tags: no - tags: - testing: 'always' - resource_group: "{{ resource_group }}" - register: output - -- assert: - that: - - output.state.tags | length == 1 - - output.state.tags.testing == 'always' - -- name: Should require address_prefixes_cidr when purge_address_prefixes - azure_rm_virtualnetwork: - name: "{{ vnetname }}" - purge_address_prefixes: true - resource_group: "{{ resource_group }}" - register: output - ignore_errors: yes - -- assert: - that: output.failed - -- name: Purge address prefixes - azure_rm_virtualnetwork: - name: "{{ vnetname }}" - address_prefixes_cidr: 10.1.0.0/16 - purge_address_prefixes: true - resource_group: "{{ resource_group }}" - register: output - -- assert: - that: - - output.state.address_prefixes | length == 1 - - output.state.address_prefixes[0] == '10.1.0.0/16' - - output.state.dns_servers | length == 2 - - output.state.dns_servers[0] == '127.0.0.1' - -- name: Purge DNS servers - azure_rm_virtualnetwork: - name: "{{ vnetname }}" - purge_dns_servers: true - resource_group: "{{ resource_group }}" - register: output - -- assert: - that: output.state['dns_servers'] is undefined - -- name: Gather facts - azure_rm_virtualnetwork_facts: - resource_group: "{{ resource_group }}" - name: "{{ vnetname }}" - register: facts - -- assert: - that: - - azure_virtualnetworks | length == 1 - - facts.virtualnetworks | length == 1 - - "facts.virtualnetworks[0].subnets | length == 1" - -- name: Delete virtual network - azure_rm_virtualnetwork: - name: "{{ vnetname }}" - resource_group: "{{ resource_group }}" - state: absent diff --git a/test/integration/targets/azure_rm_virtualnetworkgateway/aliases b/test/integration/targets/azure_rm_virtualnetworkgateway/aliases deleted file mode 100644 index aa77c071a8..0000000000 --- a/test/integration/targets/azure_rm_virtualnetworkgateway/aliases +++ /dev/null @@ -1,3 +0,0 @@ -cloud/azure -shippable/azure/group2 -destructive diff --git a/test/integration/targets/azure_rm_virtualnetworkgateway/meta/main.yml b/test/integration/targets/azure_rm_virtualnetworkgateway/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_virtualnetworkgateway/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_virtualnetworkgateway/tasks/main.yml b/test/integration/targets/azure_rm_virtualnetworkgateway/tasks/main.yml deleted file mode 100644 index 146d3769a5..0000000000 --- a/test/integration/targets/azure_rm_virtualnetworkgateway/tasks/main.yml +++ /dev/null @@ -1,126 +0,0 @@ -# FIXME: needs minimal tests (check mode?) that can run quickly, VNG creation takes > 20min - -- name: Prepare random number - set_fact: - vnetname: "vnet{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - vngname: "vng{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - -- name: Create virtual network gateway without bgp settings (check mode) - check_mode: yes - azure_rm_virtualnetworkgateway: - resource_group: "{{ resource_group }}" - name: "{{ vngname }}" - ip_configurations: - - name: testipconfig - private_ip_allocation_method: Dynamic - public_ip_address_name: testPublicIP - virtual_network: "{{ vnetname }}" - tags: - common: "xyz" - register: output - -- assert: - that: output.changed - -- name: long-running virtualnetworkgateway tests [run with `--tags long_run,untagged` to enable] - tags: [long_run, never] - block: - - name: Create virtual network - azure_rm_virtualnetwork: - resource_group: "{{ resource_group }}" - name: "{{ vnetname }}" - address_prefixes: "10.0.0.0/16" - - - name: Add subnet - azure_rm_subnet: - resource_group: "{{ resource_group }}" - name: GatewaySubnet - address_prefix: "10.0.2.0/24" - virtual_network: "{{ vnetname }}" - - - name: Create public IP address - azure_rm_publicipaddress: - resource_group: "{{ resource_group }}" - allocation_method: Dynamic - name: testPublicIP - - - name: Create virtual network gateway without bgp settings - azure_rm_virtualnetworkgateway: - resource_group: "{{ resource_group }}" - name: "{{ vngname }}" - ip_configurations: - - name: testipconfig - private_ip_allocation_method: Dynamic - public_ip_address_name: testPublicIP - virtual_network: "{{ vnetname }}" - tags: - common: "xyz" - register: output - - - assert: - that: output.changed - - - name: Create virtual network gateway without bgp settings - azure_rm_virtualnetworkgateway: - resource_group: "{{ resource_group }}" - name: "{{ vngname }}" - ip_configurations: - - name: testipconfig - private_ip_allocation_method: Dynamic - public_ip_address_name: testPublicIP - virtual_network: "{{ vnetname }}" - tags: - common: "xyz" - register: output - - - assert: - that: output.changed - - - name: Create virtual network gateway without bgp settings - idempotent - azure_rm_virtualnetworkgateway: - resource_group: "{{ resource_group }}" - name: "{{ vngname }}" - ip_configurations: - - name: testipconfig - private_ip_allocation_method: Dynamic - public_ip_address_name: testPublicIP - virtual_network: "{{ vnetname }}" - tags: - common: "xyz" - register: output - - - assert: - that: not output.changed - - - name: Update virtual network gateway - azure_rm_virtualnetworkgateway: - resource_group: "{{ resource_group }}" - name: "{{ vngname }}" - ip_configurations: - - name: testipconfig - private_ip_allocation_method: Dynamic - public_ip_address_name: testPublicIP - virtual_network: "{{ vnetname }}" - tags: - common: "mno" - register: output - - assert: - that: output.changed - - - name: Delete virtual network gateway - azure_rm_virtualnetworkgateway: - resource_group: "{{ resource_group }}" - name: "{{ vngname }}" - state: absent - register: output - - assert: - that: output.changed - -- name: Delete virtual network gateway - idempotent - azure_rm_virtualnetworkgateway: - resource_group: "{{ resource_group }}" - name: "{{ vngname }}" - state: absent - register: output -- assert: - that: not output.changed diff --git a/test/integration/targets/azure_rm_virtualnetworkpeering/aliases b/test/integration/targets/azure_rm_virtualnetworkpeering/aliases deleted file mode 100644 index aa77c071a8..0000000000 --- a/test/integration/targets/azure_rm_virtualnetworkpeering/aliases +++ /dev/null @@ -1,3 +0,0 @@ -cloud/azure -shippable/azure/group2 -destructive diff --git a/test/integration/targets/azure_rm_virtualnetworkpeering/meta/main.yml b/test/integration/targets/azure_rm_virtualnetworkpeering/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_virtualnetworkpeering/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_virtualnetworkpeering/tasks/main.yml b/test/integration/targets/azure_rm_virtualnetworkpeering/tasks/main.yml deleted file mode 100644 index 9eb0424af3..0000000000 --- a/test/integration/targets/azure_rm_virtualnetworkpeering/tasks/main.yml +++ /dev/null @@ -1,126 +0,0 @@ -- name: Prepare random number - set_fact: - vnetname1: "vnet1{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - vnetname2: "vnet2{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 1000 | random }}" - peering_name: "peering1{{ resource_group | hash('md5') | truncate(7, True, '') }}{{ 100 | random }}" - -- name: Create first virtual network - azure_rm_virtualnetwork: - name: "{{ vnetname1 }}" - address_prefixes_cidr: - - 10.1.0.0/16 - tags: - testing: testing - delete: on-exit - resource_group: "{{ resource_group }}" - register: vnet1 - -- name: Create second virtual network - azure_rm_virtualnetwork: - name: "{{ vnetname2 }}" - address_prefixes_cidr: - - 10.2.0.0/24 - resource_group: "{{ resource_group_secondary }}" - register: vnet2 - -- assert: - that: - - vnet1.changed - - vnet2.changed - -- name: Create virtual network peering (check mode) - azure_rm_virtualnetworkpeering: - resource_group: "{{ resource_group }}" - name: "{{ peering_name }}" - virtual_network: "{{ vnetname1 }}" - remote_virtual_network: - resource_group: "{{ resource_group_secondary }}" - name: "{{ vnetname2 }}" - allow_virtual_network_access: false - allow_forwarded_traffic: true - check_mode: yes - register: output - -- assert: - that: output.changed - -- name: Create virtual network peering - azure_rm_virtualnetworkpeering: - resource_group: "{{ resource_group }}" - name: "{{ peering_name }}" - virtual_network: "{{ vnetname1 }}" - remote_virtual_network: - resource_group: "{{ resource_group_secondary }}" - name: "{{ vnetname2 }}" - allow_virtual_network_access: false - allow_forwarded_traffic: true - register: output - -- assert: - that: output.changed - -- name: Update virtual network peering (idempotent) - azure_rm_virtualnetworkpeering: - resource_group: "{{ resource_group }}" - name: "{{ peering_name }}" - virtual_network: "{{ vnetname1 }}" - remote_virtual_network: - resource_group: "{{ resource_group_secondary }}" - name: "{{ vnetname2 }}" - allow_virtual_network_access: false - allow_forwarded_traffic: true - register: output - -- assert: - that: not output.changed - -- name: Update virtual network peering - azure_rm_virtualnetworkpeering: - resource_group: "{{ resource_group }}" - name: "{{ peering_name }}" - virtual_network: "{{ vnetname1 }}" - remote_virtual_network: - resource_group: "{{ resource_group_secondary }}" - name: "{{ vnetname2 }}" - allow_virtual_network_access: true - allow_forwarded_traffic: false - register: output - -- assert: - that: output.changed - -- name: Get facts - azure_rm_virtualnetworkpeering_facts: - resource_group: "{{ resource_group }}" - name: "{{ peering_name }}" - virtual_network: "{{ vnetname1 }}" - register: facts - -- name: Assert Facts - assert: - that: - - facts['vnetpeerings'] | length == 1 - - facts['vnetpeerings'][0]['id'] - - facts['vnetpeerings'][0]['peering_state'] - - facts['vnetpeerings'][0]['remote_virtual_network'] - - facts['vnetpeerings'][0]['provisioning_state'] - -- name: Delete virtual network peering - azure_rm_virtualnetworkpeering: - resource_group: "{{ resource_group }}" - name: "{{ peering_name }}" - virtual_network: "{{ vnetname1 }}" - state: absent - register: output - -- name: Delete first virtual network - azure_rm_virtualnetwork: - name: "{{ vnetname1 }}" - resource_group: "{{ resource_group }}" - state: absent - -- name: Delete virtual network - azure_rm_virtualnetwork: - name: "{{ vnetname2 }}" - resource_group: "{{ resource_group_secondary }}" - state: absent
\ No newline at end of file diff --git a/test/integration/targets/azure_rm_webapp/aliases b/test/integration/targets/azure_rm_webapp/aliases deleted file mode 100644 index c7c2aff0c0..0000000000 --- a/test/integration/targets/azure_rm_webapp/aliases +++ /dev/null @@ -1,5 +0,0 @@ -cloud/azure -shippable/azure/group3 -destructive -azure_rm_webapp_facts -azure_rm_webappslot diff --git a/test/integration/targets/azure_rm_webapp/meta/main.yml b/test/integration/targets/azure_rm_webapp/meta/main.yml deleted file mode 100644 index 95e1952f98..0000000000 --- a/test/integration/targets/azure_rm_webapp/meta/main.yml +++ /dev/null @@ -1,2 +0,0 @@ -dependencies: - - setup_azure diff --git a/test/integration/targets/azure_rm_webapp/tasks/main.yml b/test/integration/targets/azure_rm_webapp/tasks/main.yml deleted file mode 100644 index 8efc6629de..0000000000 --- a/test/integration/targets/azure_rm_webapp/tasks/main.yml +++ /dev/null @@ -1,434 +0,0 @@ -- name: Fix resource prefix - set_fact: - linux_app_plan_resource_group: "{{ resource_group_secondary }}" - win_app_name: "{{ (resource_prefix | replace('-','x'))[-8:] }}{{ 1000 | random}}winapp" - win_plan_name: "{{ (resource_prefix | replace('-','x'))[-8:] }}winplan" - linux_plan_name: "{{ (resource_group_secondary | replace('-','x'))[-8:] }}linplan" - slot1_name: "stage1" - -- name: Create a windows web app with non-exist app service plan - azure_rm_webapp: - resource_group: "{{ resource_group }}" - name: "{{ win_app_name }}1" - plan: - resource_group: "{{ resource_group }}" - name: "{{ win_plan_name }}" - is_linux: false - sku: S1 - -- name: Create a windows web app with existing app service plan - azure_rm_webapp: - resource_group: "{{ resource_group }}" - name: "{{ win_app_name }}2" - plan: "{{ win_plan_name }}" - register: output - -- name: stop the web app - azure_rm_webapp: - resource_group: "{{ resource_group }}" - name: "{{ win_app_name }}2" - plan: "{{ win_plan_name }}" - app_state: stopped - register: output - -- name: assert output changed - assert: - that: - output.changed - -# enable after webapp_facts merged -# - name: get the web app -# azure_rm_webapp_facts: -# resource_group: "{{ resource_group }}" -# name: "{{ win_app_name }}2" -# register: stopped - -# - name: assert web app is stopped -# assert: -# that: -# - stopped.properties.state == "Stopped" - -- name: Create a windows web app with existing app service plan, try to update some root level params - azure_rm_webapp: - resource_group: "{{ resource_group }}" - name: "{{ win_app_name }}3" - plan: "{{ win_plan_name }}" - dns_registration: true - https_only: true - tags: - testwebapptag: test - register: output - -- name: get web app with resource group and tag - azure_rm_webapp_facts: - resource_group: "{{ resource_group }}" - name: "{{ win_app_name }}3" - tags: - - testwebapptag - register: output - -- assert: - that: - - output.webapps | length == 1 - -- name: Create a win web app with java run time specific - azure_rm_webapp: - resource_group: "{{ resource_group }}" - name: "{{ win_app_name }}4" - plan: "{{ win_plan_name }}" - frameworks: - - name: "java" - version: "1.8" - settings: - java_container: "Tomcat" - java_container_version: "8.0" - app_settings: - testkey: "testvalue" - register: output - -- name: assert the web app was created - assert: - that: output.changed - -- name: get web app with name - azure_rm_webapp_facts: - resource_group: "{{ resource_group }}" - name: "{{ win_app_name }}4" - register: output - -- assert: - that: - - output.webapps | length == 1 - - output.webapps[0].app_settings | length == 1 - - output.webapps[0].frameworks | length > 1 # there's default frameworks eg net_framework - -- name: Update app settings and framework - azure_rm_webapp: - resource_group: "{{ resource_group }}" - name: "{{ win_app_name }}4" - plan: "{{ win_plan_name }}" - frameworks: - - name: "java" - version: "1.7" - settings: - java_container: "Tomcat" - java_container_version: "8.5" - app_settings: - testkey2: "testvalue2" - register: output - -- name: Assert the web app was updated - assert: - that: - - output.changed - -- name: get web app with name - azure_rm_webapp_facts: - resource_group: "{{ resource_group }}" - name: "{{ win_app_name }}4" - register: output - -- name: Assert updating - assert: - that: - - output.webapps[0].app_settings | length == 2 - - output.webapps[0].app_settings['testkey'] == 'testvalue' - - output.webapps[0].app_settings['testkey2'] == 'testvalue2' - -- name: get web app with return publishing profile - azure_rm_webapp_facts: - resource_group: "{{ resource_group }}" - name: "{{ win_app_name }}4" - return_publish_profile: true - register: output - -- assert: - that: - - output.webapps | length == 1 - - output.webapps[0].publishing_username != "" - - output.webapps[0].publishing_password != "" - -- name: Purge all existing app settings - azure_rm_webapp: - resource_group: "{{ resource_group }}" - name: "{{ win_app_name }}4" - plan: "{{ win_plan_name }}" - purge_app_settings: true - register: output - -- name: Assert the web app was updated - assert: - that: output.changed - -- name: Create a win web app with python run time and php run time - azure_rm_webapp: - resource_group: "{{ resource_group }}" - name: "{{ win_app_name }}5" - plan: "{{ win_plan_name }}" - frameworks: - - name: "python" - version: "2.7" - - name: node - version: "6.6" - - name: "php" - version: "7.0" - register: output - -- name: Assert the web app was created - assert: - that: output.changed - -- name: Create a docker web app with some app settings - azure_rm_webapp: - resource_group: "{{ resource_group }}" - name: "{{ win_app_name }}6" - plan: - resource_group: "{{ linux_app_plan_resource_group }}" - name: "{{ linux_plan_name }}" - is_linux: true - sku: S1 - number_of_workers: 1 - container_settings: - name: "ansible/ansible:ubuntu1404" - register: output - -- name: Assert the web app was created - assert: - that: output.changed - -- name: Create a docker web app with private acr registry - azure_rm_webapp: - resource_group: "{{ resource_group }}" - name: "{{ win_app_name }}7" - plan: - resource_group: "{{ linux_app_plan_resource_group }}" - name: "{{ linux_plan_name }}" - container_settings: - name: "ansible/ansible:ubuntu1404" - registry_server_url: test.io - registry_server_user: user - registry_server_password: password - register: output - -- name: Assert the web app was created - assert: - that: output.changed - -- name: Create a linux web app with nodejs framework - azure_rm_webapp: - resource_group: "{{ resource_group }}" - name: "{{ win_app_name }}8" - plan: - resource_group: "{{ linux_app_plan_resource_group }}" - name: "{{ linux_plan_name }}" - frameworks: - - name: node - version: "6.6" - register: output - -- name: Should be idempotent with linux web app created - azure_rm_webapp: - resource_group: "{{ resource_group }}" - name: "{{ win_app_name }}8" - plan: - resource_group: "{{ linux_app_plan_resource_group }}" - name: "{{ linux_plan_name }}" - frameworks: - - name: node - version: "6.6" - register: output - -- assert: - that: not output.changed - -- name: Update nodejs framework - azure_rm_webapp: - resource_group: "{{ resource_group }}" - name: "{{ win_app_name }}8" - plan: - resource_group: "{{ linux_app_plan_resource_group }}" - name: "{{ linux_plan_name }}" - frameworks: - - name: node - version: "6.9" - register: output - -- name: Assert the web app was created - assert: - that: output.changed - -- name: Create a linux web app with deployment source github - azure_rm_webapp: - resource_group: "{{ resource_group }}" - name: "{{ win_app_name }}10" - plan: - resource_group: "{{ linux_app_plan_resource_group }}" - name: "{{ linux_plan_name }}" - deployment_source: - url: "https://github.com/test/test" - branch: master - scm_type: GitHub - register: output - -- name: Assert the web app was created - assert: - that: output.changed - -- name: Delete web app - azure_rm_webapp: - resource_group: "{{ resource_group }}" - name: "{{ win_app_name }}8" - state: absent - register: output - -- name: Assert the web app was deleted - assert: - that: output.changed - -- name: assert error that java is mutually exclusive with frameworks - azure_rm_webapp: - resource_group: "{{ resource_group }}" - name: "{{ win_app_name }}11" - plan: "{{ win_plan_name }}" - frameworks: - - name: "python" - version: "2.7" - - name: "java" - version: "1.8" - register: fail_win_java_version_mutual_exclusive - failed_when: 'fail_win_java_version_mutual_exclusive.msg != "Java is mutually exclusive with other frameworks."' - -- name: assert error when linux web app, only can specify one framework - azure_rm_webapp: - resource_group: "{{ resource_group }}" - name: "{{ linux_plan_name }}12" - plan: - resource_group: "{{ linux_app_plan_resource_group }}" - name: "{{ linux_plan_name }}" - frameworks: - - name: "python" - version: "2.7" - - name: "node" - version: "6.6" - register: fail_linux_one_framework_only - failed_when: fail_linux_one_framework_only.msg != "Can specify one framework only for Linux web app." - -- name: Create a linux web app with java tomcat container - azure_rm_webapp: - resource_group: "{{ resource_group }}" - name: "{{ win_app_name }}13" - plan: - resource_group: "{{ linux_app_plan_resource_group }}" - name: "{{ linux_plan_name }}" - frameworks: - - name: java - version: "8" - settings: - java_container: "tomcat" - java_container_version: "8.5" - register: output - -- name: Assert the web app was created - assert: - that: output.changed - -- name: Get facts with publish profile - azure_rm_webapp_facts: - resource_group: "{{ resource_group }}" - name: "{{ win_app_name }}13" - no_log: true - register: facts - -- name: Assert publish profile returned - assert: - that: - - facts.webapps[0].ftp_publish_url != '' - -- name: Create a webapp slot (Check mode) - azure_rm_webappslot: - resource_group: "{{ resource_group }}" - webapp_name: "{{ win_app_name }}13" - name: "{{ slot1_name }}" - configuration_source: "{{ win_app_name }}13" - app_settings: - testkey: testvalue - check_mode: yes - register: output - -- name: Assert slot check mode creation - assert: - that: - - output.changed - -- name: Create a webapp slot - azure_rm_webappslot: - resource_group: "{{ resource_group }}" - webapp_name: "{{ win_app_name }}13" - name: "{{ slot1_name }}" - configuration_source: "{{ win_app_name }}13" - app_settings: - testkey: testvalueslot - register: output - -- name: Assert slot creation - assert: - that: - - output.changed - -- name: Update webapp slot (idempotence) - azure_rm_webappslot: - resource_group: "{{ resource_group }}" - webapp_name: "{{ win_app_name }}13" - name: "{{ slot1_name }}" - app_settings: - testkey: testvalueslot - register: output - -- name: Assert idempotence - assert: - that: - - not output.changed - -- name: Update webapp slot - azure_rm_webappslot: - resource_group: "{{ resource_group }}" - webapp_name: "{{ win_app_name }}13" - name: "{{ slot1_name }}" - frameworks: - - name: "node" - version: "10.1" - app_settings: - testkey: testvalue2 - register: output - -- name: Assert updating - assert: - that: - - output.changed - -- name: Swap webapp slot - azure_rm_webappslot: - resource_group: "{{ resource_group }}" - webapp_name: "{{ win_app_name }}13" - name: "{{ slot1_name }}" - swap: - action: swap - register: output - -- name: Assert swap - assert: - that: - - output.changed - -- name: Stop webapp slot - azure_rm_webappslot: - resource_group: "{{ resource_group }}" - webapp_name: "{{ win_app_name }}13" - name: "{{ slot1_name }}" - app_state: stopped - register: output - -- name: Assert stopped - assert: - that: - - output.changed
\ No newline at end of file diff --git a/test/sanity/ignore.txt b/test/sanity/ignore.txt index 2922237204..4abc91820e 100644 --- a/test/sanity/ignore.txt +++ b/test/sanity/ignore.txt @@ -57,12 +57,6 @@ lib/ansible/module_utils/_text.py future-import-boilerplate lib/ansible/module_utils/_text.py metaclass-boilerplate lib/ansible/module_utils/api.py future-import-boilerplate lib/ansible/module_utils/api.py metaclass-boilerplate -lib/ansible/module_utils/azure_rm_common.py future-import-boilerplate -lib/ansible/module_utils/azure_rm_common.py metaclass-boilerplate -lib/ansible/module_utils/azure_rm_common_ext.py future-import-boilerplate -lib/ansible/module_utils/azure_rm_common_ext.py metaclass-boilerplate -lib/ansible/module_utils/azure_rm_common_rest.py future-import-boilerplate -lib/ansible/module_utils/azure_rm_common_rest.py metaclass-boilerplate lib/ansible/module_utils/basic.py metaclass-boilerplate lib/ansible/module_utils/common/network.py future-import-boilerplate lib/ansible/module_utils/common/network.py metaclass-boilerplate @@ -115,661 +109,6 @@ lib/ansible/module_utils/urls.py pylint:blacklisted-name lib/ansible/module_utils/urls.py replace-urlopen lib/ansible/module_utils/yumdnf.py future-import-boilerplate lib/ansible/module_utils/yumdnf.py metaclass-boilerplate -lib/ansible/modules/cloud/azure/azure_rm_acs.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_acs.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_acs.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_acs.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_aks.py validate-modules:doc-choices-do-not-match-spec -lib/ansible/modules/cloud/azure/azure_rm_aks.py validate-modules:doc-default-does-not-match-spec -lib/ansible/modules/cloud/azure/azure_rm_aks.py validate-modules:doc-elements-mismatch -lib/ansible/modules/cloud/azure/azure_rm_aks.py validate-modules:doc-required-mismatch -lib/ansible/modules/cloud/azure/azure_rm_aks.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_aks.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_aks.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_aks.py validate-modules:undocumented-parameter -lib/ansible/modules/cloud/azure/azure_rm_aks_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_aks_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_aks_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_aks_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_aksversion_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_aksversion_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_aksversion_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_appgateway.py validate-modules:doc-choices-do-not-match-spec -lib/ansible/modules/cloud/azure/azure_rm_appgateway.py validate-modules:doc-elements-mismatch -lib/ansible/modules/cloud/azure/azure_rm_appgateway.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_appgateway.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_appgateway.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_appgateway.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_applicationsecuritygroup.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_applicationsecuritygroup.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_applicationsecuritygroup.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_applicationsecuritygroup_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_applicationsecuritygroup_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_applicationsecuritygroup_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_applicationsecuritygroup_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_appserviceplan.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_appserviceplan.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_appserviceplan.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_appserviceplan_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_appserviceplan_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_appserviceplan_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_appserviceplan_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_automationaccount.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_automationaccount.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_automationaccount_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_automationaccount_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_automationaccount_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_autoscale.py validate-modules:doc-elements-mismatch -lib/ansible/modules/cloud/azure/azure_rm_autoscale.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_autoscale.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_autoscale.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_autoscale.py validate-modules:undocumented-parameter -lib/ansible/modules/cloud/azure/azure_rm_autoscale_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_autoscale_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_autoscale_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_autoscale_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_availabilityset.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_availabilityset.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_availabilityset.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_availabilityset_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_availabilityset_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_availabilityset_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_availabilityset_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_azurefirewall.py validate-modules:invalid-ansiblemodule-schema -lib/ansible/modules/cloud/azure/azure_rm_azurefirewall.py validate-modules:missing-suboption-docs -lib/ansible/modules/cloud/azure/azure_rm_azurefirewall.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_azurefirewall.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_azurefirewall.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_azurefirewall.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_azurefirewall.py validate-modules:undocumented-parameter -lib/ansible/modules/cloud/azure/azure_rm_azurefirewall_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_azurefirewall_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_batchaccount.py validate-modules:invalid-ansiblemodule-schema -lib/ansible/modules/cloud/azure/azure_rm_batchaccount.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_batchaccount.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_batchaccount.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_cdnendpoint.py validate-modules:doc-elements-mismatch -lib/ansible/modules/cloud/azure/azure_rm_cdnendpoint.py validate-modules:doc-required-mismatch -lib/ansible/modules/cloud/azure/azure_rm_cdnendpoint.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_cdnendpoint.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_cdnendpoint.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_cdnendpoint_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_cdnendpoint_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_cdnendpoint_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_cdnendpoint_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_cdnendpoint_info.py validate-modules:return-syntax-error -lib/ansible/modules/cloud/azure/azure_rm_cdnprofile.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_cdnprofile.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_cdnprofile.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_cdnprofile_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_cdnprofile_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_cdnprofile_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_cdnprofile_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_containerinstance.py validate-modules:doc-elements-mismatch -lib/ansible/modules/cloud/azure/azure_rm_containerinstance.py validate-modules:doc-required-mismatch -lib/ansible/modules/cloud/azure/azure_rm_containerinstance.py validate-modules:doc-type-does-not-match-spec -lib/ansible/modules/cloud/azure/azure_rm_containerinstance.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_containerinstance.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_containerinstance.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_containerinstance.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_containerinstance_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_containerinstance_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_containerinstance_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_containerinstance_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_containerregistry.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_containerregistry.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_containerregistry.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_containerregistry_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_containerregistry_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_containerregistry_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_containerregistry_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_cosmosdbaccount.py validate-modules:doc-required-mismatch -lib/ansible/modules/cloud/azure/azure_rm_cosmosdbaccount.py validate-modules:nonexistent-parameter-documented -lib/ansible/modules/cloud/azure/azure_rm_cosmosdbaccount.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_cosmosdbaccount.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_cosmosdbaccount.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_cosmosdbaccount.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_cosmosdbaccount.py validate-modules:undocumented-parameter -lib/ansible/modules/cloud/azure/azure_rm_cosmosdbaccount_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_cosmosdbaccount_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_cosmosdbaccount_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_cosmosdbaccount_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_deployment.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_deployment.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_deployment.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_deployment.py validate-modules:return-syntax-error -lib/ansible/modules/cloud/azure/azure_rm_deployment.py yamllint:unparsable-with-libyaml -lib/ansible/modules/cloud/azure/azure_rm_deployment_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_deployment_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_deployment_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_deployment_info.py validate-modules:return-syntax-error -lib/ansible/modules/cloud/azure/azure_rm_devtestlab.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_devtestlab.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_devtestlab.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_devtestlab_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_devtestlab_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_devtestlab_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_devtestlab_info.py validate-modules:return-syntax-error -lib/ansible/modules/cloud/azure/azure_rm_devtestlabarmtemplate_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_devtestlabarmtemplate_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_devtestlabarmtemplate_info.py validate-modules:return-syntax-error -lib/ansible/modules/cloud/azure/azure_rm_devtestlabartifact_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_devtestlabartifact_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_devtestlabartifact_info.py validate-modules:return-syntax-error -lib/ansible/modules/cloud/azure/azure_rm_devtestlabartifactsource.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_devtestlabartifactsource.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_devtestlabartifactsource.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_devtestlabartifactsource_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_devtestlabartifactsource_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_devtestlabartifactsource_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_devtestlabartifactsource_info.py validate-modules:return-syntax-error -lib/ansible/modules/cloud/azure/azure_rm_devtestlabcustomimage.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_devtestlabcustomimage.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_devtestlabcustomimage.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_devtestlabcustomimage_info.py validate-modules:doc-required-mismatch -lib/ansible/modules/cloud/azure/azure_rm_devtestlabcustomimage_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_devtestlabcustomimage_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_devtestlabcustomimage_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_devtestlabcustomimage_info.py validate-modules:return-syntax-error -lib/ansible/modules/cloud/azure/azure_rm_devtestlabenvironment.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_devtestlabenvironment.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_devtestlabenvironment.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_devtestlabenvironment.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_devtestlabenvironment_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_devtestlabenvironment_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_devtestlabenvironment_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_devtestlabenvironment_info.py validate-modules:return-syntax-error -lib/ansible/modules/cloud/azure/azure_rm_devtestlabpolicy.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_devtestlabpolicy.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_devtestlabpolicy.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_devtestlabpolicy_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_devtestlabpolicy_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_devtestlabpolicy_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_devtestlabpolicy_info.py validate-modules:return-syntax-error -lib/ansible/modules/cloud/azure/azure_rm_devtestlabschedule.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_devtestlabschedule.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_devtestlabschedule.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_devtestlabschedule_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_devtestlabschedule_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_devtestlabschedule_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_devtestlabschedule_info.py validate-modules:return-syntax-error -lib/ansible/modules/cloud/azure/azure_rm_devtestlabvirtualmachine.py validate-modules:nonexistent-parameter-documented -lib/ansible/modules/cloud/azure/azure_rm_devtestlabvirtualmachine.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_devtestlabvirtualmachine.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_devtestlabvirtualmachine.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_devtestlabvirtualmachine.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_devtestlabvirtualmachine.py validate-modules:undocumented-parameter -lib/ansible/modules/cloud/azure/azure_rm_devtestlabvirtualmachine_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_devtestlabvirtualmachine_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_devtestlabvirtualmachine_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_devtestlabvirtualmachine_info.py validate-modules:return-syntax-error -lib/ansible/modules/cloud/azure/azure_rm_devtestlabvirtualnetwork.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_devtestlabvirtualnetwork.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_devtestlabvirtualnetwork.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_devtestlabvirtualnetwork_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_devtestlabvirtualnetwork_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_dnsrecordset.py validate-modules:doc-elements-mismatch -lib/ansible/modules/cloud/azure/azure_rm_dnsrecordset.py validate-modules:doc-missing-type -lib/ansible/modules/cloud/azure/azure_rm_dnsrecordset.py validate-modules:invalid-ansiblemodule-schema -lib/ansible/modules/cloud/azure/azure_rm_dnsrecordset.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_dnsrecordset.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_dnsrecordset.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_dnsrecordset_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_dnsrecordset_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_dnsrecordset_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_dnsrecordset_info.py validate-modules:return-syntax-error -lib/ansible/modules/cloud/azure/azure_rm_dnszone.py validate-modules:doc-elements-mismatch -lib/ansible/modules/cloud/azure/azure_rm_dnszone.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_dnszone.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_dnszone.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_dnszone_info.py validate-modules:doc-type-does-not-match-spec -lib/ansible/modules/cloud/azure/azure_rm_dnszone_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_dnszone_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_dnszone_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_dnszone_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_dnszone_info.py validate-modules:return-syntax-error -lib/ansible/modules/cloud/azure/azure_rm_functionapp.py validate-modules:doc-required-mismatch -lib/ansible/modules/cloud/azure/azure_rm_functionapp.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_functionapp.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_functionapp.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_functionapp_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_functionapp_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_functionapp_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_functionapp_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_gallery.py validate-modules:invalid-ansiblemodule-schema -lib/ansible/modules/cloud/azure/azure_rm_gallery.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_gallery.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_gallery_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_gallery_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_galleryimage.py validate-modules:doc-required-mismatch -lib/ansible/modules/cloud/azure/azure_rm_galleryimage.py validate-modules:invalid-ansiblemodule-schema -lib/ansible/modules/cloud/azure/azure_rm_galleryimage.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_galleryimage.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_galleryimage.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_galleryimage_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_galleryimage_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_galleryimage_info.py validate-modules:return-syntax-error -lib/ansible/modules/cloud/azure/azure_rm_galleryimageversion.py validate-modules:doc-choices-do-not-match-spec -lib/ansible/modules/cloud/azure/azure_rm_galleryimageversion.py validate-modules:doc-required-mismatch -lib/ansible/modules/cloud/azure/azure_rm_galleryimageversion.py validate-modules:doc-type-does-not-match-spec -lib/ansible/modules/cloud/azure/azure_rm_galleryimageversion.py validate-modules:invalid-ansiblemodule-schema -lib/ansible/modules/cloud/azure/azure_rm_galleryimageversion.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_galleryimageversion.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_galleryimageversion.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_galleryimageversion.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_galleryimageversion_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_galleryimageversion_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_hdinsightcluster.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_hdinsightcluster.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_hdinsightcluster.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_hdinsightcluster.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_hdinsightcluster_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_hdinsightcluster_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_hdinsightcluster_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_hdinsightcluster_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_hdinsightcluster_info.py validate-modules:return-syntax-error -lib/ansible/modules/cloud/azure/azure_rm_image.py validate-modules:doc-required-mismatch -lib/ansible/modules/cloud/azure/azure_rm_image.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_image.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_image.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_image.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_image_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_image_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_image_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_image_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_image_info.py validate-modules:return-syntax-error -lib/ansible/modules/cloud/azure/azure_rm_iotdevice.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_iotdevice.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_iotdevice_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_iotdevice_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_iotdevicemodule.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_iotdevicemodule.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_iothub.py validate-modules:doc-elements-mismatch -lib/ansible/modules/cloud/azure/azure_rm_iothub.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_iothub.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_iothub_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_iothub_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_iothub_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_iothubconsumergroup.py validate-modules:doc-required-mismatch -lib/ansible/modules/cloud/azure/azure_rm_iothubconsumergroup.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_iothubconsumergroup.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_keyvault.py validate-modules:doc-choices-do-not-match-spec -lib/ansible/modules/cloud/azure/azure_rm_keyvault.py validate-modules:doc-elements-mismatch -lib/ansible/modules/cloud/azure/azure_rm_keyvault.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_keyvault.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_keyvault.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_keyvault.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_keyvault_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_keyvault_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_keyvault_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_keyvault_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_keyvaultkey.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_keyvaultkey.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_keyvaultkey.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_keyvaultkey_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_keyvaultkey_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_keyvaultkey_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_keyvaultkey_info.py validate-modules:return-syntax-error -lib/ansible/modules/cloud/azure/azure_rm_keyvaultsecret.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_keyvaultsecret.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_keyvaultsecret.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_loadbalancer.py validate-modules:doc-choices-do-not-match-spec -lib/ansible/modules/cloud/azure/azure_rm_loadbalancer.py validate-modules:doc-default-does-not-match-spec -lib/ansible/modules/cloud/azure/azure_rm_loadbalancer.py validate-modules:doc-elements-mismatch -lib/ansible/modules/cloud/azure/azure_rm_loadbalancer.py validate-modules:doc-required-mismatch -lib/ansible/modules/cloud/azure/azure_rm_loadbalancer.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_loadbalancer.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_loadbalancer.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_loadbalancer_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_loadbalancer_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_loadbalancer_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_loadbalancer_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_lock.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_lock.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_lock_info.py validate-modules:doc-required-mismatch -lib/ansible/modules/cloud/azure/azure_rm_lock_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_lock_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_loganalyticsworkspace.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_loganalyticsworkspace.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_loganalyticsworkspace.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_loganalyticsworkspace_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_loganalyticsworkspace_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_loganalyticsworkspace_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_loganalyticsworkspace_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_manageddisk.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_manageddisk.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_manageddisk.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_manageddisk_info.py validate-modules:doc-type-does-not-match-spec -lib/ansible/modules/cloud/azure/azure_rm_manageddisk_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_manageddisk_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_manageddisk_info.py validate-modules:return-syntax-error -lib/ansible/modules/cloud/azure/azure_rm_mariadbconfiguration.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_mariadbconfiguration.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_mariadbconfiguration.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_mariadbconfiguration_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_mariadbconfiguration_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_mariadbconfiguration_info.py validate-modules:return-syntax-error -lib/ansible/modules/cloud/azure/azure_rm_mariadbdatabase.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_mariadbdatabase.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_mariadbdatabase.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_mariadbdatabase_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_mariadbdatabase_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_mariadbfirewallrule.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_mariadbfirewallrule.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_mariadbfirewallrule.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_mariadbfirewallrule_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_mariadbfirewallrule_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_mariadbserver.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_mariadbserver.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_mariadbserver.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_mariadbserver_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_mariadbserver_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_mariadbserver_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_monitorlogprofile.py validate-modules:doc-elements-mismatch -lib/ansible/modules/cloud/azure/azure_rm_monitorlogprofile.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_monitorlogprofile.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_mysqlconfiguration.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_mysqlconfiguration.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_mysqlconfiguration.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_mysqlconfiguration_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_mysqlconfiguration_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_mysqlconfiguration_info.py validate-modules:return-syntax-error -lib/ansible/modules/cloud/azure/azure_rm_mysqldatabase.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_mysqldatabase.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_mysqldatabase.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_mysqldatabase_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_mysqldatabase_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_mysqlfirewallrule.py validate-modules:doc-required-mismatch -lib/ansible/modules/cloud/azure/azure_rm_mysqlfirewallrule.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_mysqlfirewallrule.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_mysqlfirewallrule.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_mysqlfirewallrule_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_mysqlfirewallrule_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_mysqlserver.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_mysqlserver.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_mysqlserver.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_mysqlserver_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_mysqlserver_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_mysqlserver_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_networkinterface.py validate-modules:doc-elements-mismatch -lib/ansible/modules/cloud/azure/azure_rm_networkinterface.py validate-modules:doc-missing-type -lib/ansible/modules/cloud/azure/azure_rm_networkinterface.py validate-modules:doc-required-mismatch -lib/ansible/modules/cloud/azure/azure_rm_networkinterface.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_networkinterface.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_networkinterface.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_networkinterface.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_networkinterface_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_networkinterface_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_networkinterface_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_networkinterface_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_networkinterface_info.py validate-modules:return-syntax-error -lib/ansible/modules/cloud/azure/azure_rm_postgresqlconfiguration.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_postgresqlconfiguration.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_postgresqlconfiguration.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_postgresqlconfiguration_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_postgresqlconfiguration_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_postgresqlconfiguration_info.py validate-modules:return-syntax-error -lib/ansible/modules/cloud/azure/azure_rm_postgresqldatabase.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_postgresqldatabase.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_postgresqldatabase.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_postgresqldatabase_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_postgresqldatabase_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_postgresqlfirewallrule.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_postgresqlfirewallrule.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_postgresqlfirewallrule.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_postgresqlfirewallrule_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_postgresqlfirewallrule_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_postgresqlserver.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_postgresqlserver.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_postgresqlserver.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_postgresqlserver_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_postgresqlserver_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_postgresqlserver_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_publicipaddress.py validate-modules:doc-elements-mismatch -lib/ansible/modules/cloud/azure/azure_rm_publicipaddress.py validate-modules:doc-required-mismatch -lib/ansible/modules/cloud/azure/azure_rm_publicipaddress.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_publicipaddress.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_publicipaddress.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_publicipaddress_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_publicipaddress_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_publicipaddress_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_publicipaddress_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_rediscache.py validate-modules:doc-default-does-not-match-spec -lib/ansible/modules/cloud/azure/azure_rm_rediscache.py validate-modules:doc-required-mismatch -lib/ansible/modules/cloud/azure/azure_rm_rediscache.py validate-modules:doc-type-does-not-match-spec -lib/ansible/modules/cloud/azure/azure_rm_rediscache.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_rediscache.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_rediscache.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_rediscache_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_rediscache_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_rediscache_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_rediscache_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_rediscachefirewallrule.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_rediscachefirewallrule.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_rediscachefirewallrule.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_resource.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_resource.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_resource.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_resource.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_resource_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_resource_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_resource_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_resource_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_resourcegroup.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_resourcegroup.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_resourcegroup.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_resourcegroup_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_resourcegroup_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_resourcegroup_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_resourcegroup_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_roleassignment.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_roleassignment.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_roleassignment.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_roleassignment_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_roleassignment_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_roleassignment_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_roledefinition.py validate-modules:doc-elements-mismatch -lib/ansible/modules/cloud/azure/azure_rm_roledefinition.py validate-modules:invalid-ansiblemodule-schema -lib/ansible/modules/cloud/azure/azure_rm_roledefinition.py validate-modules:invalid-argument-spec -lib/ansible/modules/cloud/azure/azure_rm_roledefinition.py validate-modules:missing-suboption-docs -lib/ansible/modules/cloud/azure/azure_rm_roledefinition.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_roledefinition.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_roledefinition.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_roledefinition.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_roledefinition_info.py validate-modules:invalid-ansiblemodule-schema -lib/ansible/modules/cloud/azure/azure_rm_roledefinition_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_roledefinition_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_roledefinition_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_roledefinition_info.py validate-modules:return-syntax-error -lib/ansible/modules/cloud/azure/azure_rm_route.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_route.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_route.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_routetable.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_routetable.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_routetable.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_routetable_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_routetable_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_routetable_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_routetable_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_securitygroup.py validate-modules:doc-choices-do-not-match-spec -lib/ansible/modules/cloud/azure/azure_rm_securitygroup.py validate-modules:doc-default-does-not-match-spec -lib/ansible/modules/cloud/azure/azure_rm_securitygroup.py validate-modules:doc-elements-mismatch -lib/ansible/modules/cloud/azure/azure_rm_securitygroup.py validate-modules:doc-required-mismatch -lib/ansible/modules/cloud/azure/azure_rm_securitygroup.py validate-modules:missing-suboption-docs -lib/ansible/modules/cloud/azure/azure_rm_securitygroup.py validate-modules:mutually_exclusive-unknown -lib/ansible/modules/cloud/azure/azure_rm_securitygroup.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_securitygroup.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_securitygroup.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_securitygroup.py validate-modules:undocumented-parameter -lib/ansible/modules/cloud/azure/azure_rm_securitygroup_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_securitygroup_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_securitygroup_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_securitygroup_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_servicebus.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_servicebus.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_servicebus.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_servicebus_info.py validate-modules:doc-required-mismatch -lib/ansible/modules/cloud/azure/azure_rm_servicebus_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_servicebus_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_servicebus_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_servicebus_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_servicebusqueue.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_servicebusqueue.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_servicebusqueue.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_servicebussaspolicy.py validate-modules:doc-required-mismatch -lib/ansible/modules/cloud/azure/azure_rm_servicebussaspolicy.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_servicebussaspolicy.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_servicebussaspolicy.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_servicebustopic.py validate-modules:doc-required-mismatch -lib/ansible/modules/cloud/azure/azure_rm_servicebustopic.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_servicebustopic.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_servicebustopic.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_servicebustopicsubscription.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_servicebustopicsubscription.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_servicebustopicsubscription.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_snapshot.py validate-modules:doc-required-mismatch -lib/ansible/modules/cloud/azure/azure_rm_snapshot.py validate-modules:invalid-ansiblemodule-schema -lib/ansible/modules/cloud/azure/azure_rm_snapshot.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_snapshot.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_sqldatabase.py validate-modules:invalid-ansiblemodule-schema -lib/ansible/modules/cloud/azure/azure_rm_sqldatabase.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_sqldatabase.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_sqldatabase.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_sqldatabase_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_sqldatabase_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_sqldatabase_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_sqldatabase_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_sqlfirewallrule.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_sqlfirewallrule.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_sqlfirewallrule.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_sqlfirewallrule_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_sqlfirewallrule_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_sqlfirewallrule_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_sqlserver.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_sqlserver.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_sqlserver.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_sqlserver_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_sqlserver_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_sqlserver_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_storageaccount.py validate-modules:doc-elements-mismatch -lib/ansible/modules/cloud/azure/azure_rm_storageaccount.py validate-modules:doc-missing-type -lib/ansible/modules/cloud/azure/azure_rm_storageaccount.py validate-modules:doc-required-mismatch -lib/ansible/modules/cloud/azure/azure_rm_storageaccount.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_storageaccount.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_storageaccount.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_storageaccount_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_storageaccount_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_storageaccount_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_storageaccount_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_storageaccount_info.py validate-modules:return-syntax-error -lib/ansible/modules/cloud/azure/azure_rm_storageblob.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_storageblob.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_storageblob.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_subnet.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_subnet.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_subnet.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_subnet.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_subnet_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_subnet_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_subnet_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_trafficmanagerendpoint.py validate-modules:doc-elements-mismatch -lib/ansible/modules/cloud/azure/azure_rm_trafficmanagerendpoint.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_trafficmanagerendpoint.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_trafficmanagerendpoint.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_trafficmanagerendpoint_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_trafficmanagerendpoint_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_trafficmanagerendpoint_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_trafficmanagerprofile.py validate-modules:doc-choices-do-not-match-spec -lib/ansible/modules/cloud/azure/azure_rm_trafficmanagerprofile.py validate-modules:doc-default-does-not-match-spec -lib/ansible/modules/cloud/azure/azure_rm_trafficmanagerprofile.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_trafficmanagerprofile.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_trafficmanagerprofile.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_trafficmanagerprofile.py validate-modules:undocumented-parameter -lib/ansible/modules/cloud/azure/azure_rm_trafficmanagerprofile_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_trafficmanagerprofile_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_trafficmanagerprofile_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_trafficmanagerprofile_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_virtualmachine.py validate-modules:doc-elements-mismatch -lib/ansible/modules/cloud/azure/azure_rm_virtualmachine.py validate-modules:doc-required-mismatch -lib/ansible/modules/cloud/azure/azure_rm_virtualmachine.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_virtualmachine.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_virtualmachine.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_virtualmachine.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_virtualmachine_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_virtualmachine_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_virtualmachine_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_virtualmachine_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_virtualmachineextension.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_virtualmachineextension.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_virtualmachineextension.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_virtualmachineextension_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_virtualmachineextension_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_virtualmachineextension_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_virtualmachineextension_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_virtualmachineimage_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_virtualmachineimage_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_virtualmachineimage_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_virtualmachinescaleset.py validate-modules:doc-required-mismatch -lib/ansible/modules/cloud/azure/azure_rm_virtualmachinescaleset.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_virtualmachinescaleset.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_virtualmachinescaleset.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_virtualmachinescaleset.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_virtualmachinescaleset_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_virtualmachinescaleset_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_virtualmachinescaleset_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_virtualmachinescaleset_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_virtualmachinescalesetextension.py validate-modules:doc-required-mismatch -lib/ansible/modules/cloud/azure/azure_rm_virtualmachinescalesetextension.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_virtualmachinescalesetextension.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_virtualmachinescalesetextension.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_virtualmachinescalesetextension_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_virtualmachinescalesetextension_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_virtualmachinescalesetextension_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_virtualmachinescalesetinstance.py validate-modules:doc-required-mismatch -lib/ansible/modules/cloud/azure/azure_rm_virtualmachinescalesetinstance.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_virtualmachinescalesetinstance.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_virtualmachinescalesetinstance.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_virtualmachinescalesetinstance_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_virtualmachinescalesetinstance_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_virtualmachinescalesetinstance_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_virtualmachinescalesetinstance_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_virtualnetwork.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_virtualnetwork.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_virtualnetwork.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_virtualnetwork.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_virtualnetwork_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_virtualnetwork_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_virtualnetwork_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_virtualnetwork_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_virtualnetworkgateway.py validate-modules:doc-choices-do-not-match-spec -lib/ansible/modules/cloud/azure/azure_rm_virtualnetworkgateway.py validate-modules:doc-default-does-not-match-spec -lib/ansible/modules/cloud/azure/azure_rm_virtualnetworkgateway.py validate-modules:doc-elements-mismatch -lib/ansible/modules/cloud/azure/azure_rm_virtualnetworkgateway.py validate-modules:doc-missing-type -lib/ansible/modules/cloud/azure/azure_rm_virtualnetworkgateway.py validate-modules:doc-required-mismatch -lib/ansible/modules/cloud/azure/azure_rm_virtualnetworkgateway.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_virtualnetworkgateway.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_virtualnetworkgateway.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_virtualnetworkpeering.py validate-modules:doc-required-mismatch -lib/ansible/modules/cloud/azure/azure_rm_virtualnetworkpeering.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_virtualnetworkpeering.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_virtualnetworkpeering.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_virtualnetworkpeering_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_virtualnetworkpeering_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_virtualnetworkpeering_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_webapp.py validate-modules:doc-elements-mismatch -lib/ansible/modules/cloud/azure/azure_rm_webapp.py validate-modules:doc-required-mismatch -lib/ansible/modules/cloud/azure/azure_rm_webapp.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_webapp.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_webapp.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_webapp_info.py validate-modules:parameter-list-no-elements -lib/ansible/modules/cloud/azure/azure_rm_webapp_info.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_webapp_info.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_webapp_info.py validate-modules:required_if-unknown-key -lib/ansible/modules/cloud/azure/azure_rm_webappslot.py validate-modules:doc-elements-mismatch -lib/ansible/modules/cloud/azure/azure_rm_webappslot.py validate-modules:doc-required-mismatch -lib/ansible/modules/cloud/azure/azure_rm_webappslot.py validate-modules:parameter-type-not-in-doc -lib/ansible/modules/cloud/azure/azure_rm_webappslot.py validate-modules:required_if-requirements-unknown -lib/ansible/modules/cloud/azure/azure_rm_webappslot.py validate-modules:required_if-unknown-key lib/ansible/modules/commands/command.py validate-modules:doc-missing-type lib/ansible/modules/commands/command.py validate-modules:nonexistent-parameter-documented lib/ansible/modules/commands/command.py validate-modules:parameter-list-no-elements @@ -1030,10 +369,6 @@ lib/ansible/playbook/role/__init__.py pylint:blacklisted-name lib/ansible/plugins/action/normal.py action-plugin-docs # default action plugin for modules without a dedicated action plugin lib/ansible/plugins/action/vyos.py action-plugin-docs # base class for deprecated network platform modules using `connection: local` lib/ansible/plugins/cache/base.py ansible-doc!skip # not a plugin, but a stub for backwards compatibility -lib/ansible/plugins/doc_fragments/azure.py future-import-boilerplate -lib/ansible/plugins/doc_fragments/azure.py metaclass-boilerplate -lib/ansible/plugins/doc_fragments/azure_tags.py future-import-boilerplate -lib/ansible/plugins/doc_fragments/azure_tags.py metaclass-boilerplate lib/ansible/plugins/doc_fragments/backup.py future-import-boilerplate lib/ansible/plugins/doc_fragments/backup.py metaclass-boilerplate lib/ansible/plugins/doc_fragments/constructed.py future-import-boilerplate |