mirror of
https://github.com/ansible-collections/community.general.git
synced 2025-07-16 01:45:25 -07:00
Deprecate tests used as filters (#32361)
* Warn on tests used as filters * Update docs, add aliases for tests that fit more gramatically with test syntax * Fix rst formatting * Add successful filter, alias of success * Remove renamed_deprecation, it was overkill * Make directory alias for is_dir * Update tests to use proper jinja test syntax * Update additional documentation, living outside of YAML files, to reflect proper jinja test syntax * Add conversion script, porting guide updates, and changelog updates * Update newly added uses of tests as filters * No underscore variable * Convert recent tests as filter changes to win_stat * Fix some changes related to rebasing a few integration tests * Make tests_as_filters_warning explicitly accept the name of the test, instead of inferring the name * Add test for tests_as_filters_warning * Update tests as filters in newly added/modified tests * Address recent changes to several integration tests * Address recent changes in cs_vpc
This commit is contained in:
parent
fd4a6cf7ad
commit
4fe08441be
349 changed files with 4086 additions and 3844 deletions
|
@ -11,8 +11,8 @@
|
|||
- name: verify create http range rule in check mode
|
||||
assert:
|
||||
that:
|
||||
- sg_rule|success
|
||||
- sg_rule|changed
|
||||
- sg_rule is successful
|
||||
- sg_rule is changed
|
||||
- sg_rule.type == 'ingress'
|
||||
- sg_rule.security_group == 'default'
|
||||
- sg_rule.protocol == 'tcp'
|
||||
|
@ -31,8 +31,8 @@
|
|||
- name: verify create http range rule
|
||||
assert:
|
||||
that:
|
||||
- sg_rule|success
|
||||
- sg_rule|changed
|
||||
- sg_rule is successful
|
||||
- sg_rule is changed
|
||||
- sg_rule.type == 'ingress'
|
||||
- sg_rule.security_group == 'default'
|
||||
- sg_rule.protocol == 'tcp'
|
||||
|
@ -51,8 +51,8 @@
|
|||
- name: verify create http range rule idempotence
|
||||
assert:
|
||||
that:
|
||||
- sg_rule|success
|
||||
- not sg_rule|changed
|
||||
- sg_rule is successful
|
||||
- sg_rule is not changed
|
||||
|
||||
- name: test remove single port udp rule in check mode
|
||||
cs_securitygroup_rule:
|
||||
|
@ -67,8 +67,8 @@
|
|||
- name: verify remove single port udp rule in check mode
|
||||
assert:
|
||||
that:
|
||||
- sg_rule|success
|
||||
- sg_rule|changed
|
||||
- sg_rule is successful
|
||||
- sg_rule is changed
|
||||
- sg_rule.type == 'egress'
|
||||
- sg_rule.security_group == 'default'
|
||||
- sg_rule.protocol == 'udp'
|
||||
|
@ -88,8 +88,8 @@
|
|||
- name: verify remove single port udp rule
|
||||
assert:
|
||||
that:
|
||||
- sg_rule|success
|
||||
- sg_rule|changed
|
||||
- sg_rule is successful
|
||||
- sg_rule is changed
|
||||
- sg_rule.type == 'egress'
|
||||
- sg_rule.security_group == 'default'
|
||||
- sg_rule.protocol == 'udp'
|
||||
|
@ -109,8 +109,8 @@
|
|||
- name: verify remove single port udp rule idempotence
|
||||
assert:
|
||||
that:
|
||||
- sg_rule|success
|
||||
- not sg_rule|changed
|
||||
- sg_rule is successful
|
||||
- sg_rule is not changed
|
||||
|
||||
- name: test remove icmp rule in check mode
|
||||
cs_securitygroup_rule:
|
||||
|
@ -125,8 +125,8 @@
|
|||
- name: verify icmp rule in check mode
|
||||
assert:
|
||||
that:
|
||||
- sg_rule|success
|
||||
- sg_rule|changed
|
||||
- sg_rule is successful
|
||||
- sg_rule is changed
|
||||
- sg_rule.type == 'ingress'
|
||||
- sg_rule.security_group == 'default'
|
||||
- sg_rule.cidr == '0.0.0.0/0'
|
||||
|
@ -146,8 +146,8 @@
|
|||
- name: verify icmp rule
|
||||
assert:
|
||||
that:
|
||||
- sg_rule|success
|
||||
- sg_rule|changed
|
||||
- sg_rule is successful
|
||||
- sg_rule is changed
|
||||
- sg_rule.type == 'ingress'
|
||||
- sg_rule.security_group == 'default'
|
||||
- sg_rule.cidr == '0.0.0.0/0'
|
||||
|
@ -167,5 +167,5 @@
|
|||
- name: verify icmp rule idempotence
|
||||
assert:
|
||||
that:
|
||||
- sg_rule|success
|
||||
- not sg_rule|changed
|
||||
- sg_rule is successful
|
||||
- sg_rule is not changed
|
||||
|
|
|
@ -4,4 +4,4 @@
|
|||
- name: verify setup
|
||||
assert:
|
||||
that:
|
||||
- sg|success
|
||||
- sg is successful
|
||||
|
|
|
@ -10,8 +10,8 @@
|
|||
- name: verify create http range rule in check mode
|
||||
assert:
|
||||
that:
|
||||
- sg_rule|success
|
||||
- sg_rule|changed
|
||||
- sg_rule is successful
|
||||
- sg_rule is changed
|
||||
|
||||
- name: test create http range rule
|
||||
cs_securitygroup_rule:
|
||||
|
@ -23,8 +23,8 @@
|
|||
- name: verify create http range rule
|
||||
assert:
|
||||
that:
|
||||
- sg_rule|success
|
||||
- sg_rule|changed
|
||||
- sg_rule is successful
|
||||
- sg_rule is changed
|
||||
- sg_rule.type == 'ingress'
|
||||
- sg_rule.security_group == 'default'
|
||||
- sg_rule.protocol == 'tcp'
|
||||
|
@ -42,8 +42,8 @@
|
|||
- name: verify create http range rule idempotence
|
||||
assert:
|
||||
that:
|
||||
- sg_rule|success
|
||||
- not sg_rule|changed
|
||||
- sg_rule is successful
|
||||
- sg_rule is not changed
|
||||
- sg_rule.type == 'ingress'
|
||||
- sg_rule.security_group == 'default'
|
||||
- sg_rule.protocol == 'tcp'
|
||||
|
@ -63,8 +63,8 @@
|
|||
- name: verify create single port udp rule in check mode
|
||||
assert:
|
||||
that:
|
||||
- sg_rule|success
|
||||
- sg_rule|changed
|
||||
- sg_rule is successful
|
||||
- sg_rule is changed
|
||||
|
||||
- name: test create single port udp rule
|
||||
cs_securitygroup_rule:
|
||||
|
@ -77,8 +77,8 @@
|
|||
- name: verify create single port udp rule
|
||||
assert:
|
||||
that:
|
||||
- sg_rule|success
|
||||
- sg_rule|changed
|
||||
- sg_rule is successful
|
||||
- sg_rule is changed
|
||||
- sg_rule.type == 'egress'
|
||||
- sg_rule.security_group == 'default'
|
||||
- sg_rule.protocol == 'udp'
|
||||
|
@ -98,8 +98,8 @@
|
|||
- name: verify single port udp rule idempotence
|
||||
assert:
|
||||
that:
|
||||
- sg_rule|success
|
||||
- not sg_rule|changed
|
||||
- sg_rule is successful
|
||||
- sg_rule is not changed
|
||||
- sg_rule.type == 'egress'
|
||||
- sg_rule.security_group == 'default'
|
||||
- sg_rule.protocol == 'udp'
|
||||
|
@ -119,8 +119,8 @@
|
|||
- name: verify icmp rule in check mode
|
||||
assert:
|
||||
that:
|
||||
- sg_rule|success
|
||||
- sg_rule|changed
|
||||
- sg_rule is successful
|
||||
- sg_rule is changed
|
||||
|
||||
- name: test icmp rule
|
||||
cs_securitygroup_rule:
|
||||
|
@ -133,8 +133,8 @@
|
|||
- name: verify icmp rule
|
||||
assert:
|
||||
that:
|
||||
- sg_rule|success
|
||||
- sg_rule|changed
|
||||
- sg_rule is successful
|
||||
- sg_rule is changed
|
||||
- sg_rule.type == 'ingress'
|
||||
- sg_rule.security_group == 'default'
|
||||
- sg_rule.cidr == '0.0.0.0/0'
|
||||
|
@ -153,8 +153,8 @@
|
|||
- name: verify icmp rule idempotence
|
||||
assert:
|
||||
that:
|
||||
- sg_rule|success
|
||||
- not sg_rule|changed
|
||||
- sg_rule is successful
|
||||
- sg_rule is not changed
|
||||
- sg_rule.type == 'ingress'
|
||||
- sg_rule.security_group == 'default'
|
||||
- sg_rule.cidr == '0.0.0.0/0'
|
||||
|
|
|
@ -4,7 +4,7 @@
|
|||
- name: verify setup
|
||||
assert:
|
||||
that:
|
||||
- sg|success
|
||||
- sg is successful
|
||||
|
||||
- name: setup default security group
|
||||
cs_securitygroup: name=default
|
||||
|
@ -12,7 +12,7 @@
|
|||
- name: verify setup
|
||||
assert:
|
||||
that:
|
||||
- sg|success
|
||||
- sg is successful
|
||||
|
||||
- name: setup remove icmp rule
|
||||
cs_securitygroup_rule:
|
||||
|
@ -26,7 +26,7 @@
|
|||
- name: verify remove icmp rule
|
||||
assert:
|
||||
that:
|
||||
- sg_rule|success
|
||||
- sg_rule is successful
|
||||
|
||||
- name: setup remove http range rule
|
||||
cs_securitygroup_rule:
|
||||
|
@ -39,7 +39,7 @@
|
|||
- name: verify remove http range rule
|
||||
assert:
|
||||
that:
|
||||
- sg_rule|success
|
||||
- sg_rule is successful
|
||||
|
||||
- name: setup remove single port udp rule
|
||||
cs_securitygroup_rule:
|
||||
|
@ -53,4 +53,4 @@
|
|||
- name: verify remove single port udp rule
|
||||
assert:
|
||||
that:
|
||||
- sg_rule|success
|
||||
- sg_rule is successful
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue