Deprecate tests used as filters (#32361)

* Warn on tests used as filters

* Update docs, add aliases for tests that fit more gramatically with test syntax

* Fix rst formatting

* Add successful filter, alias of success

* Remove renamed_deprecation, it was overkill

* Make directory alias for is_dir

* Update tests to use proper jinja test syntax

* Update additional documentation, living outside of YAML files, to reflect proper jinja test syntax

* Add conversion script, porting guide updates, and changelog updates

* Update newly added uses of tests as filters

* No underscore variable

* Convert recent tests as filter changes to win_stat

* Fix some changes related to rebasing a few integration tests

* Make tests_as_filters_warning explicitly accept the name of the test, instead of inferring the name

* Add test for tests_as_filters_warning

* Update tests as filters in newly added/modified tests

* Address recent changes to several integration tests

* Address recent changes in cs_vpc
This commit is contained in:
Matt Martz 2017-11-27 16:58:08 -06:00 committed by ansibot
parent fd4a6cf7ad
commit 4fe08441be
349 changed files with 4086 additions and 3844 deletions

View file

@ -11,8 +11,8 @@
- name: verify create http range rule in check mode
assert:
that:
- sg_rule|success
- sg_rule|changed
- sg_rule is successful
- sg_rule is changed
- sg_rule.type == 'ingress'
- sg_rule.security_group == 'default'
- sg_rule.protocol == 'tcp'
@ -31,8 +31,8 @@
- name: verify create http range rule
assert:
that:
- sg_rule|success
- sg_rule|changed
- sg_rule is successful
- sg_rule is changed
- sg_rule.type == 'ingress'
- sg_rule.security_group == 'default'
- sg_rule.protocol == 'tcp'
@ -51,8 +51,8 @@
- name: verify create http range rule idempotence
assert:
that:
- sg_rule|success
- not sg_rule|changed
- sg_rule is successful
- sg_rule is not changed
- name: test remove single port udp rule in check mode
cs_securitygroup_rule:
@ -67,8 +67,8 @@
- name: verify remove single port udp rule in check mode
assert:
that:
- sg_rule|success
- sg_rule|changed
- sg_rule is successful
- sg_rule is changed
- sg_rule.type == 'egress'
- sg_rule.security_group == 'default'
- sg_rule.protocol == 'udp'
@ -88,8 +88,8 @@
- name: verify remove single port udp rule
assert:
that:
- sg_rule|success
- sg_rule|changed
- sg_rule is successful
- sg_rule is changed
- sg_rule.type == 'egress'
- sg_rule.security_group == 'default'
- sg_rule.protocol == 'udp'
@ -109,8 +109,8 @@
- name: verify remove single port udp rule idempotence
assert:
that:
- sg_rule|success
- not sg_rule|changed
- sg_rule is successful
- sg_rule is not changed
- name: test remove icmp rule in check mode
cs_securitygroup_rule:
@ -125,8 +125,8 @@
- name: verify icmp rule in check mode
assert:
that:
- sg_rule|success
- sg_rule|changed
- sg_rule is successful
- sg_rule is changed
- sg_rule.type == 'ingress'
- sg_rule.security_group == 'default'
- sg_rule.cidr == '0.0.0.0/0'
@ -146,8 +146,8 @@
- name: verify icmp rule
assert:
that:
- sg_rule|success
- sg_rule|changed
- sg_rule is successful
- sg_rule is changed
- sg_rule.type == 'ingress'
- sg_rule.security_group == 'default'
- sg_rule.cidr == '0.0.0.0/0'
@ -167,5 +167,5 @@
- name: verify icmp rule idempotence
assert:
that:
- sg_rule|success
- not sg_rule|changed
- sg_rule is successful
- sg_rule is not changed

View file

@ -4,4 +4,4 @@
- name: verify setup
assert:
that:
- sg|success
- sg is successful

View file

@ -10,8 +10,8 @@
- name: verify create http range rule in check mode
assert:
that:
- sg_rule|success
- sg_rule|changed
- sg_rule is successful
- sg_rule is changed
- name: test create http range rule
cs_securitygroup_rule:
@ -23,8 +23,8 @@
- name: verify create http range rule
assert:
that:
- sg_rule|success
- sg_rule|changed
- sg_rule is successful
- sg_rule is changed
- sg_rule.type == 'ingress'
- sg_rule.security_group == 'default'
- sg_rule.protocol == 'tcp'
@ -42,8 +42,8 @@
- name: verify create http range rule idempotence
assert:
that:
- sg_rule|success
- not sg_rule|changed
- sg_rule is successful
- sg_rule is not changed
- sg_rule.type == 'ingress'
- sg_rule.security_group == 'default'
- sg_rule.protocol == 'tcp'
@ -63,8 +63,8 @@
- name: verify create single port udp rule in check mode
assert:
that:
- sg_rule|success
- sg_rule|changed
- sg_rule is successful
- sg_rule is changed
- name: test create single port udp rule
cs_securitygroup_rule:
@ -77,8 +77,8 @@
- name: verify create single port udp rule
assert:
that:
- sg_rule|success
- sg_rule|changed
- sg_rule is successful
- sg_rule is changed
- sg_rule.type == 'egress'
- sg_rule.security_group == 'default'
- sg_rule.protocol == 'udp'
@ -98,8 +98,8 @@
- name: verify single port udp rule idempotence
assert:
that:
- sg_rule|success
- not sg_rule|changed
- sg_rule is successful
- sg_rule is not changed
- sg_rule.type == 'egress'
- sg_rule.security_group == 'default'
- sg_rule.protocol == 'udp'
@ -119,8 +119,8 @@
- name: verify icmp rule in check mode
assert:
that:
- sg_rule|success
- sg_rule|changed
- sg_rule is successful
- sg_rule is changed
- name: test icmp rule
cs_securitygroup_rule:
@ -133,8 +133,8 @@
- name: verify icmp rule
assert:
that:
- sg_rule|success
- sg_rule|changed
- sg_rule is successful
- sg_rule is changed
- sg_rule.type == 'ingress'
- sg_rule.security_group == 'default'
- sg_rule.cidr == '0.0.0.0/0'
@ -153,8 +153,8 @@
- name: verify icmp rule idempotence
assert:
that:
- sg_rule|success
- not sg_rule|changed
- sg_rule is successful
- sg_rule is not changed
- sg_rule.type == 'ingress'
- sg_rule.security_group == 'default'
- sg_rule.cidr == '0.0.0.0/0'

View file

@ -4,7 +4,7 @@
- name: verify setup
assert:
that:
- sg|success
- sg is successful
- name: setup default security group
cs_securitygroup: name=default
@ -12,7 +12,7 @@
- name: verify setup
assert:
that:
- sg|success
- sg is successful
- name: setup remove icmp rule
cs_securitygroup_rule:
@ -26,7 +26,7 @@
- name: verify remove icmp rule
assert:
that:
- sg_rule|success
- sg_rule is successful
- name: setup remove http range rule
cs_securitygroup_rule:
@ -39,7 +39,7 @@
- name: verify remove http range rule
assert:
that:
- sg_rule|success
- sg_rule is successful
- name: setup remove single port udp rule
cs_securitygroup_rule:
@ -53,4 +53,4 @@
- name: verify remove single port udp rule
assert:
that:
- sg_rule|success
- sg_rule is successful