Ansible integration test fixes - pt 2 (#147)

<!-- This change is generated by MagicModules. -->
/cc @rambleraptor
This commit is contained in:
The Magician 2018-12-14 12:49:08 -08:00 committed by Alex Stephen
commit 3496923252
12 changed files with 112 additions and 100 deletions

View file

@ -161,8 +161,8 @@ EXAMPLES = '''
state: present
register: gateway
- name: create a vpn-tunnel
gcp_compute_vpn-tunnel:
- name: create a vpn tunnel
gcp_compute_vpn_tunnel:
name: "test_object"
region: us-west1
target_vpn_gateway: "{{ gateway }}"

View file

@ -62,7 +62,9 @@ extends_documentation_fragment: gcp
EXAMPLES = '''
- name: create a service account
gcp_iam_service_account:
name: test-ansible@graphite-playground.google.com.iam.gserviceaccount.com
name: '"{{resource_name}}@{{gcp_project}}.google.com.iam.gserviceaccount.com"
'
display_name: My Ansible test key
project: "test_project"
auth_kind: "serviceaccount"

View file

@ -75,7 +75,7 @@ extends_documentation_fragment: gcp
EXAMPLES = '''
- name: create a instance
gcp_sql_instance:
name: "{{ resource_name }}"
name: "{{resource_name}}-3"
settings:
ip_configuration:
authorized_networks:

View file

@ -272,7 +272,7 @@ extends_documentation_fragment: gcp
EXAMPLES = '''
- name: create a instance
gcp_sql_instance:
name: "test_object"
name: "{{resource_name}}-2"
settings:
ip_configuration:
authorized_networks:

View file

@ -76,7 +76,7 @@ extends_documentation_fragment: gcp
EXAMPLES = '''
- name: create a instance
gcp_sql_instance:
name: "{{ resource_name }}"
name: "{{resource_name}}-1"
settings:
ip_configuration:
authorized_networks:

View file

@ -109,11 +109,11 @@ extends_documentation_fragment: gcp
EXAMPLES = '''
- name: create a bucket
gcp_storage_bucket:
name: "{{ resource_name }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
service_account_file: "{{ gcp_cred_file }}"
state: present
name: "{{ resource_name }}"
project: "{{ gcp_project }}"
auth_kind: "{{ gcp_cred_kind }}"
service_account_file: "{{ gcp_cred_file }}"
state: present
register: bucket
- name: create a bucket access control